caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
107.4s |
106.7s |
103.2s |
116.7s |
58.8s |
59.8s |
59.1s |
58.0s |
60.0s |
58.2s |
58.6s |
58.1s |
test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-derive::proc-macro/caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.5s |
1.8s |
1.8s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
2.0s |
2.0s |
1.4s |
1.4s |
2.0s |
2.0s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_lms_32 |
4.5s |
4.5s |
4.5s |
4.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.2s |
0.2s |
0.3s |
0.2s |
test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.5s |
2.6s |
2.5s |
2.4s |
3.0s |
2.7s |
2.9s |
3.0s |
2.7s |
2.7s |
2.7s |
2.9s |
test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
4.5s |
4.1s |
4.5s |
4.2s |
4.4s |
4.4s |
5.0s |
4.6s |
4.8s |
4.5s |
4.6s |
4.5s |
test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.3s |
3.4s |
3.6s |
3.2s |
3.7s |
3.7s |
3.8s |
3.6s |
3.8s |
3.8s |
3.6s |
3.8s |
test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-derive::proc-macro/caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.5s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.5s |
0.4s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.3s |
0.3s |
0.3s |
0.1s |
0.2s |
0.2s |
0.1s |
0.2s |
0.2s |
0.1s |
0.2s |
asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.8s |
1.5s |
1.6s |
1.2s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.7s |
1.5s |
1.8s |
1.7s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
test_rtalias::test_fht_info |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.8s |
1.4s |
1.5s |
1.8s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.4s |
2.5s |
2.4s |
3.0s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.7s |
caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
helpers::tests::test_get_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
helpers::tests::test_get_data_not_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rv32_unit_tests::test_asm |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_capabilities::test_capabilities |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.8s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_cfi::test_memcpy_not_called_before_cfi_init |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
test_cpu_fault::test_cpu_fault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
test_dice_derivations::test_cold_reset_no_rng |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.3s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
test_dice_derivations::test_cold_reset_status_reporting |
1.4s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.5s |
1.4s |
1.4s |
1.2s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
test_dice_derivations::test_cold_reset_success |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.2s |
1.0s |
0.9s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_fw_load |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.7s |
0.6s |
0.7s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
test_fake_rom::test_fake_rom_production_enabled |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
test_fake_rom::test_fake_rom_production_error |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
test_fake_rom::test_fake_rom_update_reset |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
1.0s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
test_fake_rom::test_fake_rom_version |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
test_fake_rom::test_image_verify |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_fake_rom::test_skip_kats |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
test_fips_hooks::test_fips_hook_exit |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.3s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.3s |
1.2s |
1.3s |
1.6s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_fht_info |
1.2s |
1.2s |
1.2s |
1.2s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.5s |
1.3s |
1.2s |
1.1s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
test_fmcalias_derivation::test_firmware_gt_max_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.8s |
0.9s |
0.8s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_fmcalias_derivation::test_fuse_log |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.4s |
1.2s |
1.2s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log |
1.6s |
1.5s |
1.6s |
1.6s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.4s |
1.3s |
1.6s |
1.5s |
1.2s |
1.1s |
1.3s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_fmcalias_derivation::test_pcr_log_across_update_reset |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.8s |
2.0s |
2.2s |
2.3s |
1.7s |
1.6s |
1.7s |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.5s |
1.2s |
1.5s |
1.4s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
1.6s |
1.5s |
1.6s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.6s |
1.6s |
1.5s |
1.4s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_fmcalias_derivation::test_upload_measurement_limit |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.5s |
1.4s |
1.1s |
1.3s |
1.0s |
0.9s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.7s |
0.5s |
0.6s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
test_fmcalias_derivation::test_upload_no_measurement |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.2s |
1.1s |
1.2s |
1.1s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
1.1s |
test_fmcalias_derivation::test_upload_single_measurement |
1.2s |
1.2s |
1.3s |
1.2s |
1.0s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
1.1s |
1.1s |
1.2s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
test_fmcalias_derivation::test_zero_firmware_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_idevid_derivation::test_generate_csr |
2.0s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.8s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
test_idevid_derivation::test_generate_csr_stress |
1965.0s |
1940.2s |
1961.2s |
1936.9s |
1536.0s |
1511.7s |
1536.2s |
1511.3s |
1536.0s |
1511.7s |
1536.2s |
1511.2s |
932.4s |
896.4s |
915.5s |
874.6s |
905.0s |
858.7s |
886.9s |
856.8s |
896.1s |
860.4s |
892.3s |
859.5s |
test_idevid_derivation::test_idev_subj_key_id_algo |
7.2s |
7.2s |
7.2s |
7.2s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.6s |
5.5s |
5.7s |
5.6s |
4.8s |
4.9s |
4.9s |
5.4s |
5.3s |
4.7s |
5.8s |
5.4s |
test_image_validation::cert_test |
1.7s |
1.9s |
1.7s |
1.8s |
1.7s |
1.7s |
2.1s |
1.6s |
1.2s |
1.9s |
2.2s |
1.8s |
1.3s |
1.2s |
1.3s |
1.2s |
1.1s |
1.2s |
1.2s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::cert_test_with_custom_dates |
1.9s |
1.6s |
2.7s |
2.0s |
1.4s |
1.6s |
1.6s |
1.3s |
1.8s |
1.5s |
1.5s |
1.8s |
1.4s |
1.2s |
1.6s |
1.4s |
1.1s |
1.1s |
1.2s |
1.2s |
1.3s |
1.2s |
1.6s |
1.3s |
test_image_validation::cert_test_with_ueid |
1.4s |
1.3s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.3s |
1.0s |
1.1s |
1.2s |
1.1s |
1.2s |
1.3s |
1.0s |
1.2s |
1.4s |
test_image_validation::test_fmc_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.9s |
0.6s |
0.8s |
0.6s |
0.6s |
0.7s |
0.7s |
0.8s |
0.8s |
test_image_validation::test_fmc_entry_point_unaligned |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_after_iccm |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
0.7s |
0.8s |
0.9s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
test_image_validation::test_fmc_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.7s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
test_image_validation::test_fmc_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.2s |
0.9s |
0.8s |
0.7s |
1.0s |
0.8s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
test_image_validation::test_fmc_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.7s |
1.2s |
0.7s |
0.7s |
0.6s |
0.8s |
0.9s |
0.7s |
0.6s |
test_image_validation::test_fmc_rt_load_address_range_overlap |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.8s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.1s |
1.3s |
1.2s |
test_image_validation::test_fmc_svn_greater_than_32 |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.5s |
0.7s |
0.8s |
0.7s |
0.5s |
test_image_validation::test_fmc_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.5s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.4s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.5s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.6s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.3s |
2.3s |
2.4s |
2.2s |
2.0s |
1.9s |
2.4s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
test_image_validation::test_header_verify_owner_lms_sig_mismatch |
2.3s |
2.3s |
2.4s |
2.3s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.8s |
1.8s |
1.6s |
1.6s |
1.4s |
1.3s |
1.8s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
test_image_validation::test_header_verify_owner_sig_zero_fuses |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
1.3s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.2s |
test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
2.7s |
2.6s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.0s |
2.0s |
2.3s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
1.0s |
1.0s |
1.0s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
2.0s |
1.9s |
2.0s |
2.0s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.1s |
1.3s |
1.2s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
1.7s |
1.6s |
1.7s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_invalid_manifest_marker |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.5s |
0.7s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_invalid_manifest_size |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_max_fw_image |
1.3s |
1.3s |
1.3s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.2s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
3.4s |
3.3s |
3.4s |
3.4s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.8s |
2.7s |
2.7s |
2.5s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.4s |
2.6s |
2.5s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
1.0s |
test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
39.0s |
38.5s |
39.2s |
38.8s |
29.9s |
29.4s |
30.2s |
29.7s |
29.9s |
29.4s |
30.2s |
29.7s |
33.5s |
31.6s |
32.5s |
32.5s |
30.6s |
29.6s |
31.0s |
29.8s |
30.5s |
29.4s |
30.8s |
29.8s |
test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
23.4s |
23.1s |
23.7s |
23.4s |
17.4s |
17.0s |
17.7s |
17.3s |
17.4s |
17.0s |
17.7s |
17.3s |
19.0s |
18.2s |
18.7s |
17.8s |
17.5s |
16.4s |
17.7s |
16.6s |
17.5s |
16.5s |
17.7s |
16.6s |
test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_preamble_zero_vendor_pubkey_digest |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_image_validation::test_runtime_digest_mismatch |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.9s |
1.1s |
0.8s |
0.9s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.8s |
test_image_validation::test_runtime_entry_point_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_entry_point_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_after_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.9s |
0.9s |
1.2s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_invalid_load_addr_before_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_load_addr_unaligned |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_not_contained_in_iccm |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_greater_than_max |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_runtime_svn_less_than_fuse_svn |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
test_image_validation::test_toc_fmc_range_incorrect_order |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_fmc_range_overlap |
2.9s |
2.8s |
2.9s |
2.9s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.0s |
1.9s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
test_image_validation::test_toc_fmc_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_entry_count |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_invalid_toc_digest |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_image_validation::test_toc_rt_size_zero |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_checksum |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_large |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_small |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
test_mailbox_errors::test_mailbox_invalid_req_size_zero |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_mailbox_errors::test_mailbox_reserved_pauser |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox_errors::test_unknown_command_is_fatal |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_rom_integrity::test_read_rom_info_from_fmc |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.9s |
0.7s |
test_rom_integrity::test_rom_integrity_failure |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
test_symbols::test_linker_symbols_match_memory_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_update_reset::test_check_rom_update_reset_status_reg |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_fmc_is_16k |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_update_reset::test_update_reset_boot_status |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_max_fw_image |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
test_update_reset::test_update_reset_no_mailbox_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_update_reset_non_fw_load_cmd |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_update_reset::test_update_reset_success |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
test_update_reset::test_update_reset_verify_image_failure |
1.6s |
1.6s |
1.6s |
1.6s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_version::test_version |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
1.6s |
1.6s |
2.4s |
2.4s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
0.6s |
0.6s |
1.4s |
1.4s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
1.1s |
1.1s |
1.4s |
1.4s |
0.8s |
0.8s |
1.3s |
1.3s |
0.8s |
0.8s |
1.3s |
1.3s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
test_warm_reset::test_warm_reset_during_update_reset |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
2.3s |
2.3s |
1.9s |
1.9s |
2.3s |
2.3s |
2.2s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
test_warm_reset::test_warm_reset_success |
2.4s |
2.4s |
2.7s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests_get_idev_csr::test_get_csr |
1.0s |
0.9s |
1.0s |
0.9s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.6s |
2.7s |
2.3s |
2.2s |
2.3s |
2.6s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.3s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.2s |
2.3s |
2.4s |
2.1s |
2.2s |
2.3s |
2.2s |
2.2s |
2.4s |
2.2s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.6s |
3.7s |
3.6s |
3.7s |
3.0s |
3.0s |
3.0s |
3.0s |
3.0s |
3.1s |
3.0s |
3.0s |
2.6s |
2.5s |
2.6s |
3.3s |
2.5s |
2.4s |
2.5s |
2.5s |
2.7s |
2.7s |
2.5s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.2s |
2.3s |
2.6s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.5s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.3s |
2.2s |
2.3s |
2.5s |
2.1s |
2.2s |
2.3s |
2.2s |
2.2s |
2.7s |
2.3s |
2.2s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.8s |
1.9s |
2.1s |
1.8s |
1.7s |
1.8s |
1.8s |
1.9s |
2.0s |
1.8s |
1.8s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.6s |
1.2s |
1.3s |
1.5s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.6s |
1.2s |
1.3s |
1.5s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.4s |
1.3s |
1.3s |
1.5s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.7s |
3.6s |
3.7s |
3.6s |
3.7s |
3.7s |
3.7s |
3.7s |
2.8s |
2.5s |
2.6s |
2.5s |
2.5s |
2.5s |
3.1s |
2.5s |
2.6s |
2.8s |
2.6s |
2.5s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.1s |
3.1s |
3.1s |
2.6s |
2.5s |
2.6s |
2.5s |
2.6s |
2.6s |
2.6s |
2.6s |
2.4s |
2.1s |
2.2s |
2.1s |
2.0s |
2.0s |
2.6s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.4s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.6s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.6s |
1.2s |
1.4s |
1.3s |
1.3s |
1.3s |
test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
0.9s |
0.8s |
0.8s |
0.8s |
test_boot::test_boot_tci_data |
1.8s |
1.7s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
0.9s |
1.0s |
1.0s |
0.9s |
0.9s |
1.1s |
0.9s |
1.4s |
0.9s |
0.9s |
0.9s |
test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.2s |
1.0s |
1.0s |
1.0s |
test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.4s |
1.1s |
1.1s |
1.1s |
test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.1s |
0.8s |
0.8s |
0.8s |
test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.3s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
test_boot::test_stress_update |
400.2s |
406.7s |
394.5s |
403.2s |
326.8s |
323.0s |
336.0s |
336.0s |
333.8s |
340.3s |
336.0s |
336.0s |
335.2s |
328.2s |
334.7s |
330.0s |
316.8s |
302.7s |
324.2s |
312.0s |
317.3s |
305.3s |
322.4s |
312.9s |
test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.4s |
2.0s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
2.2s |
1.8s |
1.9s |
1.9s |
test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.5s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.7s |
1.2s |
1.3s |
1.3s |
test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.4s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.7s |
5.7s |
5.6s |
4.7s |
4.7s |
5.7s |
5.7s |
4.0s |
3.8s |
4.1s |
3.9s |
3.7s |
3.7s |
3.9s |
3.7s |
4.0s |
3.7s |
4.1s |
3.7s |
test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
1.0s |
test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.3s |
1.0s |
test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.4s |
1.0s |
test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.3s |
3.3s |
3.3s |
2.7s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.3s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.2s |
2.9s |
2.1s |
2.1s |
2.8s |
2.7s |
test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.6s |
1.3s |
1.3s |
1.6s |
1.4s |
test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.5s |
4.5s |
5.6s |
4.5s |
5.2s |
5.2s |
4.4s |
5.0s |
4.5s |
4.5s |
4.6s |
5.1s |
test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.2s |
1.2s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.4s |
test_ecdsa::test_ecdsa_verify_cmd |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.3s |
1.1s |
1.2s |
1.3s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.2s |
test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.3s |
1.0s |
1.2s |
1.2s |
1.1s |
1.2s |
1.0s |
1.0s |
1.0s |
1.1s |
test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.4s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.2s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.2s |
1.1s |
1.4s |
1.2s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_info::test_fw_info |
4.4s |
4.4s |
4.4s |
4.4s |
3.6s |
3.6s |
3.6s |
3.5s |
3.6s |
3.7s |
3.6s |
3.7s |
4.1s |
3.9s |
3.9s |
3.8s |
3.6s |
3.6s |
3.7s |
3.6s |
3.6s |
3.5s |
3.7s |
3.6s |
test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_lms::test_lms_verify_cmd |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.6s |
1.6s |
1.6s |
test_lms::test_lms_verify_failure |
1.8s |
1.9s |
1.8s |
1.9s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_pcr::test_pcr_quote |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.4s |
1.3s |
test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
test_set_auth_manifest::test_set_auth_manifest_cmd |
2.7s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.8s |
1.7s |
1.8s |
1.8s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.8s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.0s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.8s |
1.7s |
1.9s |
1.8s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.6s |
test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.3s |
1.3s |
1.5s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.5s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_fw_info_digest |
2.6s |
2.7s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.4s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.7s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.4s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.6s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.4s |
1.5s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.3s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.5s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.5s |
1.6s |
1.6s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.6s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_disabled_attestation |
2.8s |
2.8s |
2.8s |
2.8s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.3s |
4.3s |
3.5s |
3.4s |
3.5s |
3.4s |
3.5s |
3.6s |
3.5s |
3.5s |
3.7s |
3.6s |
3.8s |
3.5s |
3.4s |
3.3s |
3.7s |
3.5s |
3.7s |
3.3s |
3.5s |
3.4s |
test_stash_measurement::test_stash_measurement |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
test_update_reset::test_context_has_tag_validation |
2.6s |
2.7s |
2.6s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_context_tags_validation |
2.6s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
1.9s |
test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.7s |
2.7s |
2.8s |
2.7s |
2.5s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.7s |
2.6s |
test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.6s |
2.7s |
2.6s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.8s |
1.8s |
test_update_reset::test_tags_persistence |
3.5s |
3.5s |
3.5s |
3.5s |
2.9s |
2.8s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.7s |
2.7s |
2.7s |
2.6s |
2.5s |
2.7s |
2.6s |
2.6s |
2.5s |
2.7s |
2.6s |
test_warm_reset::test_mbox_busy_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.8s |
1.8s |
2.6s |
2.6s |
1.8s |
1.8s |
2.6s |
2.6s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
test_warm_reset::test_mbox_idle_during_warm_reset |
2.4s |
2.4s |
2.8s |
2.8s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
test_warm_reset::test_rt_journey_pcr_validation |
2.6s |
2.6s |
2.9s |
2.9s |
2.0s |
2.0s |
2.7s |
2.7s |
2.0s |
2.0s |
2.7s |
2.7s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.3s |
jtag_test::gdb_test |
6.5s |
6.5s |
6.5s |
6.7s |
6.0s |
5.9s |
6.0s |
5.9s |
6.0s |
6.0s |
6.0s |
6.1s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
smoke_test::smoke_test |
3.3s |
3.2s |
3.2s |
3.2s |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.4s |
2.4s |
2.4s |
2.8s |
3.6s |
2.9s |
3.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.3s |
2.6s |
2.3s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
8.5s |
7.1s |
7.5s |
7.1s |
8.2s |
6.7s |
7.5s |
7.3s |
7.7s |
6.7s |
7.5s |
7.3s |
warm_reset::warm_reset_basic |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.8s |
2.0s |
1.6s |
1.8s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.6s |
warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.6s |
0.6s |
caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
1.2s |
0.9s |
0.9s |
1.0s |
0.8s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.1s |
fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.9s |
0.7s |
0.6s |
0.7s |
0.8s |
fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.8s |
0.6s |
0.6s |
0.9s |
0.7s |
0.6s |
0.7s |
0.9s |
fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.9s |
0.8s |
0.6s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.8s |
0.6s |
0.5s |
0.6s |
0.6s |
0.5s |
0.6s |
0.5s |
fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.6s |
fw_load::fw_load_error_fmc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.8s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.8s |
2.0s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.7s |
2.1s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.8s |
1.8s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.9s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.9s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.8s |
1.7s |
fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.0s |
1.7s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.1s |
1.8s |
1.9s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
2.0s |
1.7s |
1.6s |
1.6s |
1.5s |
1.7s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.7s |
1.8s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.6s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.9s |
1.7s |
1.6s |
fw_load::fw_load_error_header_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.7s |
1.6s |
1.5s |
fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
1.8s |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
2.1s |
1.6s |
1.6s |
fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.5s |
1.7s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.5s |
1.7s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.6s |
1.7s |
1.7s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.5s |
1.7s |
1.6s |
1.5s |
1.5s |
1.6s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
fw_load::fw_load_error_owner_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
fw_load::fw_load_error_owner_lms_signature_invalid |
2.2s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.2s |
2.0s |
2.2s |
2.2s |
1.7s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_owner_lms_verify_failure |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.6s |
fw_load::fw_load_error_owner_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.4s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.4s |
2.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
fw_load::fw_load_error_runtime_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
2.0s |
1.9s |
2.2s |
1.9s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.2s |
1.9s |
2.3s |
2.5s |
1.9s |
1.9s |
2.1s |
1.8s |
2.2s |
1.9s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.2s |
1.9s |
2.0s |
2.2s |
2.0s |
1.9s |
2.3s |
1.9s |
2.4s |
1.9s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
1.9s |
2.0s |
1.8s |
2.3s |
1.9s |
2.3s |
1.9s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.9s |
1.9s |
2.1s |
2.1s |
2.1s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
2.0s |
2.0s |
1.9s |
1.9s |
fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.8s |
1.8s |
1.9s |
1.9s |
1.8s |
1.8s |
fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
1.9s |
1.8s |
1.8s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.8s |
1.8s |
1.9s |
1.9s |
1.8s |
1.9s |
fw_load::fw_load_error_toc_digest_failure |
2.0s |
2.0s |
2.1s |
2.1s |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.8s |
1.8s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
2.0s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
1.7s |
1.7s |
1.6s |
1.5s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.8s |
1.6s |
1.7s |
1.6s |
fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.8s |
2.8s |
2.7s |
2.7s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.9s |
2.6s |
2.6s |
2.8s |
2.6s |
2.9s |
2.6s |
2.7s |
2.6s |
fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
2.9s |
3.0s |
2.4s |
2.4s |
2.7s |
2.7s |
2.5s |
2.5s |
2.7s |
2.7s |
2.8s |
2.6s |
2.6s |
2.7s |
2.5s |
2.5s |
2.7s |
2.5s |
2.8s |
2.4s |
2.5s |
2.5s |
fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.1s |
3.1s |
2.5s |
2.5s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
2.8s |
2.8s |
2.7s |
2.6s |
2.6s |
2.6s |
2.7s |
2.5s |
2.7s |
2.5s |
2.6s |
2.7s |
fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.4s |
3.4s |
3.4s |
3.4s |
2.6s |
2.5s |
2.8s |
2.7s |
2.6s |
2.6s |
2.8s |
2.8s |
3.7s |
3.5s |
3.6s |
3.5s |
2.7s |
2.7s |
2.7s |
2.7s |
2.8s |
2.6s |
2.7s |
2.7s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
2.1s |
2.0s |
1.7s |
1.7s |
2.1s |
2.1s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.7s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.7s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.7s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.7s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_ecc_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.8s |
1.6s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.2s |
2.1s |
2.2s |
2.2s |
1.8s |
1.7s |
2.1s |
2.0s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.8s |
1.9s |
1.9s |
1.6s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.7s |
1.7s |
fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
1.5s |
1.5s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
1.5s |
1.6s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.0s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.5s |
1.7s |
1.5s |
1.6s |
1.6s |
fw_load::fw_load_error_vendor_lms_verify_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_failure |
1.9s |
1.9s |
2.1s |
2.1s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.4s |
1.4s |
1.4s |
1.6s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.6s |
1.4s |
1.5s |
1.4s |
1.9s |
1.4s |
1.4s |
1.3s |
1.5s |
1.4s |
1.4s |
1.4s |
fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.7s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.6s |
1.5s |
1.5s |
1.5s |
fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.6s |
1.4s |
1.5s |
1.4s |
1.5s |
1.3s |
1.5s |
1.3s |
1.5s |
1.4s |
1.4s |
1.4s |
jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.7s |
2.6s |
2.8s |
2.7s |
2.6s |
2.6s |
2.8s |
2.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
security_parameters::attempt_ssp_access_fw_load |
1.1s |
1.1s |
1.1s |
1.1s |
0.9s |
0.8s |
0.9s |
0.9s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.8s |
1.0s |
0.9s |
1.0s |
0.9s |
self_tests::fw_load_halt_check_no_output |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.2s |
2.0s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.2s |
2.0s |
2.2s |
2.1s |
self_tests::kat_ecc384_signature_generate_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.2s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
2.1s |
self_tests::kat_ecc384_signature_verify_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_ecc384_signature_verify_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.0s |
2.3s |
2.1s |
2.1s |
2.1s |
2.2s |
2.0s |
2.2s |
2.1s |
2.2s |
2.1s |
self_tests::kat_halt_check_no_output |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
8.7s |
8.5s |
9.7s |
8.8s |
9.8s |
9.4s |
9.3s |
9.4s |
9.4s |
9.4s |
9.6s |
9.6s |
self_tests::kat_hmac384_failure_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
self_tests::kat_hmac384_failure_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.0s |
2.3s |
2.1s |
2.3s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.4s |
2.7s |
self_tests::kat_hmac384_tag_mismatch_rom |
1.3s |
1.3s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.3s |
1.1s |
1.1s |
1.1s |
1.2s |
1.2s |
1.4s |
1.2s |
self_tests::kat_hmac384_tag_mismatch_rt |
2.8s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.1s |
2.1s |
2.3s |
2.1s |
2.3s |
2.1s |
2.1s |
2.1s |
2.2s |
2.1s |
2.2s |
2.0s |
self_tests::kat_lms_digest_mismatch_rom |
1.4s |
1.4s |
1.9s |
1.9s |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.4s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.8s |
2.3s |
2.3s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.1s |
2.2s |
2.3s |
2.2s |
2.1s |
2.3s |
2.2s |
2.2s |
2.0s |
self_tests::kat_sha1_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.3s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.2s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
2.0s |
self_tests::kat_sha1_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.2s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
1.9s |
self_tests::kat_sha256_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.2s |
2.1s |
2.0s |
1.9s |
2.1s |
2.0s |
2.1s |
2.0s |
2.0s |
2.0s |
self_tests::kat_sha256_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.2s |
2.1s |
2.0s |
1.9s |
2.2s |
2.0s |
2.1s |
2.0s |
2.0s |
1.9s |
self_tests::kat_sha2_512_384acc_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.2s |
2.2s |
2.0s |
1.9s |
2.1s |
2.0s |
2.1s |
2.1s |
2.0s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.3s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.2s |
2.2s |
2.0s |
1.9s |
2.2s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.2s |
2.2s |
2.0s |
1.9s |
2.1s |
2.0s |
2.1s |
2.1s |
2.0s |
2.1s |
self_tests::kat_sha384_digest_failure_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.1s |
2.0s |
2.2s |
2.2s |
2.0s |
2.0s |
2.0s |
2.0s |
2.2s |
2.1s |
2.0s |
2.0s |
self_tests::kat_sha384_digest_mismatch_rom |
1.1s |
1.1s |
1.9s |
1.9s |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.1s |
2.9s |
2.8s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.0s |
2.2s |
2.2s |
2.0s |
2.0s |
2.0s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.4s |
services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.4s |
2.2s |
2.4s |
2.4s |
2.2s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
1.7s |
1.6s |
services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.6s |
caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.44s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.43s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.44s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 107.42s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 106.64s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 103.23s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 116.70s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.76s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.81s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.12s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 57.97s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 59.95s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.23s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.62s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 58.15s
stderr:
Truncated 3754 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.22s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.20s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.01s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
19,896 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,915 UART: csrng::test_entropy_src_seed...[ok]
439,139 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
19,896 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,978 UART: csrng::test_entropy_src_seed...[ok]
439,225 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
20,081 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,185 UART: csrng::test_entropy_src_seed...[ok]
439,397 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
19,941 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
435,579 UART: csrng::test_entropy_src_seed...[ok]
439,214 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
19,828 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,921 UART: csrng::test_entropy_src_seed...[ok]
439,213 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
19,933 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,959 UART: csrng::test_entropy_src_seed...[ok]
439,212 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
16,828 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
16,685 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
16,703 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
16,559 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
16,614 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
16,832 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
15,895 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
15,833 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
16,121 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,545 writing to cptra_bootfsm_go
16,530 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
15,760 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
15,801 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
16,091 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,690 writing to cptra_bootfsm_go
17,635 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
15,854 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
15,938 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
16,084 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
15,929 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,060 writing to cptra_bootfsm_go
17,807 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
15,864 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
15,964 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
16,047 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
15,936 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
15,874 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
16,019 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
16,127 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
15,928 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
15,832 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
16,003 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
15,816 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,137 writing to cptra_bootfsm_go
16,903 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
15,903 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
16,034 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
15,926 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
15,736 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
16,787 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
15,981 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
15,971 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
15,857 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
15,987 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
15,929 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
15,881 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
15,830 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,815 writing to cptra_bootfsm_go
16,470 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
15,884 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
16,267 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
15,922 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
15,801 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
15,966 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
16,096 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
15,832 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
15,896 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
16,057 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
15,969 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
16,023 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
16,063 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
15,972 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
16,196 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
15,959 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
15,870 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
15,866 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
16,060 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
16,048 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
15,892 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
16,044 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
16,196 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
15,746 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
15,837 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
15,911 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,826 writing to cptra_bootfsm_go
16,658 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
16,155 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
16,045 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
15,976 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
15,877 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
15,887 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
15,943 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
15,756 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,524 writing to cptra_bootfsm_go
16,407 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
15,891 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
15,844 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
15,770 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
15,863 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,579 writing to cptra_bootfsm_go
16,392 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
16,010 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
16,229 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
16,030 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
16,018 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
15,882 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
15,850 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,879 writing to cptra_bootfsm_go
16,682 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
15,972 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
15,887 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
16,147 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
16,036 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
15,800 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
15,966 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
21,613 UART: doe::test_decrypt...[ok]
13,247,595 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
21,802 UART: doe::test_decrypt...[ok]
13,269,080 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
21,874 UART: doe::test_decrypt...[ok]
13,457,797 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
21,967 UART: doe::test_decrypt...[ok]
13,451,565 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
21,844 UART: doe::test_decrypt...[ok]
9,945,899 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
21,727 UART: doe::test_decrypt...[ok]
9,942,325 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
22,007 UART: doe::test_decrypt...[ok]
10,202,330 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
22,220 UART: doe::test_decrypt...[ok]
10,194,518 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
21,888 UART: doe::test_decrypt...[ok]
9,935,865 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
21,710 UART: doe::test_decrypt...[ok]
9,948,049 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,985 writing to cptra_bootfsm_go
22,780 UART: doe::test_decrypt...[ok]
10,197,371 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
21,980 UART: doe::test_decrypt...[ok]
10,192,553 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,519 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,103 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,403 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,555 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,155 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,525 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,883 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,743 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
45,717 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,365 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,275 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
48,163 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
22,308 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
22,549 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
22,365 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "093a41fce0b195cf435e5db811ec329ef89056a8a4e0007c418595994ee7fec8ffb547d87af62a63a582244f31323cf6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
22,433 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
22,140 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
22,426 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
22,537 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
22,482 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
22,582 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
22,235 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
22,524 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,374 writing to cptra_bootfsm_go
33,798 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d2845c7c2dcbdaadf6d35ea7bf89a75401bbb3a2e9dc017ddef2266200c61fd88828cd2fc74de3e504a8413b0b28e17c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
29,449 UART: ecc384::test_kat...[ok]
3,331,159 UART: ecc384::test_gen_key_pair...[ok]
6,615,575 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,897,472 UART: ecc384::test_sign...[ok]
12,194,614 UART: ecc384::test_verify...[ok]
15,790,471 UART: ecc384::test_verify_r...[ok]
19,369,285 UART: ecc384::test_verify_failure...[ok]
22,954,057 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,830,172 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
40,003,984 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
29,652 UART: ecc384::test_kat...[ok]
3,330,536 UART: ecc384::test_gen_key_pair...[ok]
6,614,212 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,894,429 UART: ecc384::test_sign...[ok]
12,194,550 UART: ecc384::test_verify...[ok]
15,790,951 UART: ecc384::test_verify_r...[ok]
19,372,354 UART: ecc384::test_verify_failure...[ok]
22,952,801 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,828,967 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,998,509 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
29,886 UART: ecc384::test_kat...[ok]
3,697,798 UART: ecc384::test_gen_key_pair...[ok]
6,954,568 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,209,122 UART: ecc384::test_sign...[ok]
12,495,062 UART: ecc384::test_verify...[ok]
16,074,295 UART: ecc384::test_verify_r...[ok]
23,832,711 UART: ecc384::test_verify_failure...[ok]
27,413,094 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,245,393 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,330,760 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
29,851 UART: ecc384::test_kat...[ok]
3,695,527 UART: ecc384::test_gen_key_pair...[ok]
6,954,799 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,209,745 UART: ecc384::test_sign...[ok]
12,497,759 UART: ecc384::test_verify...[ok]
16,078,572 UART: ecc384::test_verify_r...[ok]
23,841,160 UART: ecc384::test_verify_failure...[ok]
27,419,902 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,253,644 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,344,647 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
29,434 UART: ecc384::test_kat...[ok]
2,502,123 UART: ecc384::test_gen_key_pair...[ok]
4,956,003 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,406,914 UART: ecc384::test_sign...[ok]
9,128,017 UART: ecc384::test_verify...[ok]
11,821,296 UART: ecc384::test_verify_r...[ok]
14,506,343 UART: ecc384::test_verify_failure...[ok]
17,196,444 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,337,121 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,934,972 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
29,524 UART: ecc384::test_kat...[ok]
2,498,239 UART: ecc384::test_gen_key_pair...[ok]
4,951,848 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,321 UART: ecc384::test_sign...[ok]
9,124,016 UART: ecc384::test_verify...[ok]
11,818,913 UART: ecc384::test_verify_r...[ok]
14,505,033 UART: ecc384::test_verify_failure...[ok]
17,195,804 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,340,641 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,930,510 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,672 writing to cptra_bootfsm_go
30,227 UART: ecc384::test_kat...[ok]
2,880,643 UART: ecc384::test_gen_key_pair...[ok]
5,323,552 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,763,997 UART: ecc384::test_sign...[ok]
9,476,300 UART: ecc384::test_verify...[ok]
12,153,096 UART: ecc384::test_verify_r...[ok]
14,829,807 UART: ecc384::test_verify_failure...[ok]
22,938,439 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,057,867 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,613,750 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
29,871 UART: ecc384::test_kat...[ok]
2,881,889 UART: ecc384::test_gen_key_pair...[ok]
5,325,571 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,766,498 UART: ecc384::test_sign...[ok]
9,479,728 UART: ecc384::test_verify...[ok]
12,158,719 UART: ecc384::test_verify_r...[ok]
14,834,431 UART: ecc384::test_verify_failure...[ok]
22,934,816 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,051,056 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,605,443 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
29,520 UART: ecc384::test_kat...[ok]
2,496,434 UART: ecc384::test_gen_key_pair...[ok]
4,953,968 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,635 UART: ecc384::test_sign...[ok]
9,126,190 UART: ecc384::test_verify...[ok]
11,817,700 UART: ecc384::test_verify_r...[ok]
14,505,877 UART: ecc384::test_verify_failure...[ok]
17,188,578 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,340,330 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,932,546 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
29,587 UART: ecc384::test_kat...[ok]
2,498,035 UART: ecc384::test_gen_key_pair...[ok]
4,956,752 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,407,829 UART: ecc384::test_sign...[ok]
9,130,013 UART: ecc384::test_verify...[ok]
11,822,950 UART: ecc384::test_verify_r...[ok]
14,508,943 UART: ecc384::test_verify_failure...[ok]
17,197,575 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,342,906 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,931,767 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
29,878 UART: ecc384::test_kat...[ok]
2,878,660 UART: ecc384::test_gen_key_pair...[ok]
5,325,425 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,765,988 UART: ecc384::test_sign...[ok]
9,480,555 UART: ecc384::test_verify...[ok]
12,160,327 UART: ecc384::test_verify_r...[ok]
14,836,332 UART: ecc384::test_verify_failure...[ok]
22,937,614 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,052,763 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,606,334 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
29,694 UART: ecc384::test_kat...[ok]
2,881,735 UART: ecc384::test_gen_key_pair...[ok]
5,325,372 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,767,862 UART: ecc384::test_sign...[ok]
9,480,506 UART: ecc384::test_verify...[ok]
12,160,977 UART: ecc384::test_verify_r...[ok]
14,838,512 UART: ecc384::test_verify_failure...[ok]
22,933,828 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,050,093 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,606,002 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,549 UART: ecc384::test_gen_key_pair...[ok]
25,667 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,431 UART: ecc384::test_sign...[ok]
43,139 UART: ecc384::test_verify...[ok]
52,041 UART: ecc384::test_verify_r...[ok]
60,984 UART: ecc384::test_verify_failure...[ok]
69,634 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,750 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,737 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,713 UART: ecc384::test_gen_key_pair...[ok]
25,889 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,331 UART: ecc384::test_sign...[ok]
43,021 UART: ecc384::test_verify...[ok]
52,173 UART: ecc384::test_verify_r...[ok]
60,590 UART: ecc384::test_verify_failure...[ok]
69,632 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,164 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,387 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,009 UART: ecc384::test_gen_key_pair...[ok]
26,439 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,889 UART: ecc384::test_sign...[ok]
43,657 UART: ecc384::test_verify...[ok]
52,765 UART: ecc384::test_verify_r...[ok]
61,700 UART: ecc384::test_verify_failure...[ok]
70,580 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,196 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,773 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,813 UART: ecc384::test_gen_key_pair...[ok]
26,101 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,733 UART: ecc384::test_sign...[ok]
43,681 UART: ecc384::test_verify...[ok]
52,893 UART: ecc384::test_verify_r...[ok]
61,478 UART: ecc384::test_verify_failure...[ok]
70,896 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,814 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,277 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,673 UART: ecc384::test_gen_key_pair...[ok]
25,965 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,359 UART: ecc384::test_sign...[ok]
43,229 UART: ecc384::test_verify...[ok]
52,479 UART: ecc384::test_verify_r...[ok]
61,164 UART: ecc384::test_verify_failure...[ok]
69,956 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,704 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,273 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,755 UART: ecc384::test_gen_key_pair...[ok]
25,605 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,013 UART: ecc384::test_sign...[ok]
42,701 UART: ecc384::test_verify...[ok]
51,711 UART: ecc384::test_verify_r...[ok]
60,294 UART: ecc384::test_verify_failure...[ok]
69,372 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,854 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,279 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,693 UART: ecc384::test_gen_key_pair...[ok]
26,115 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,155 UART: ecc384::test_sign...[ok]
43,001 UART: ecc384::test_verify...[ok]
52,363 UART: ecc384::test_verify_r...[ok]
60,932 UART: ecc384::test_verify_failure...[ok]
69,982 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,386 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,693 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,553 UART: ecc384::test_gen_key_pair...[ok]
25,665 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,021 UART: ecc384::test_sign...[ok]
43,057 UART: ecc384::test_verify...[ok]
51,985 UART: ecc384::test_verify_r...[ok]
60,718 UART: ecc384::test_verify_failure...[ok]
69,664 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,202 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,055 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,353 UART: ecc384::test_gen_key_pair...[ok]
25,453 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,911 UART: ecc384::test_sign...[ok]
42,713 UART: ecc384::test_verify...[ok]
51,801 UART: ecc384::test_verify_r...[ok]
59,956 UART: ecc384::test_verify_failure...[ok]
68,118 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,022 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,559 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,775 UART: ecc384::test_gen_key_pair...[ok]
26,023 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,423 UART: ecc384::test_sign...[ok]
43,015 UART: ecc384::test_verify...[ok]
52,031 UART: ecc384::test_verify_r...[ok]
60,596 UART: ecc384::test_verify_failure...[ok]
69,984 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,890 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,691 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,447 UART: ecc384::test_gen_key_pair...[ok]
25,939 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,617 UART: ecc384::test_sign...[ok]
43,347 UART: ecc384::test_verify...[ok]
52,815 UART: ecc384::test_verify_r...[ok]
61,458 UART: ecc384::test_verify_failure...[ok]
70,654 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,194 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,809 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,581 UART: ecc384::test_gen_key_pair...[ok]
25,781 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,419 UART: ecc384::test_sign...[ok]
43,169 UART: ecc384::test_verify...[ok]
52,197 UART: ecc384::test_verify_r...[ok]
60,802 UART: ecc384::test_verify_failure...[ok]
69,580 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,006 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,259 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,156 writing to cptra_bootfsm_go
20,501 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
19,530 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
19,588 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
19,453 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
19,287 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
19,225 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
19,468 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
19,840 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
19,194 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,837 writing to cptra_bootfsm_go
20,166 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
19,679 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
19,453 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
13,633 UART: error_reporter::test_report_fw_error...[ok]
16,563 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
13,699 UART: error_reporter::test_report_fw_error...[ok]
16,677 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
14,100 UART: error_reporter::test_report_fw_error...[ok]
17,077 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
13,963 UART: error_reporter::test_report_fw_error...[ok]
16,915 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
13,633 UART: error_reporter::test_report_fw_error...[ok]
16,633 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
13,744 UART: error_reporter::test_report_fw_error...[ok]
16,719 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
13,932 UART: error_reporter::test_report_fw_error...[ok]
16,901 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
13,840 UART: error_reporter::test_report_fw_error...[ok]
16,779 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
13,601 UART: error_reporter::test_report_fw_error...[ok]
16,606 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,553 writing to cptra_bootfsm_go
15,406 UART: error_reporter::test_report_fw_error...[ok]
18,391 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
14,000 UART: error_reporter::test_report_fw_error...[ok]
16,989 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
14,115 UART: error_reporter::test_report_fw_error...[ok]
17,116 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
30,698 UART: hmac384::test_kat...[ok]
71,523 UART: hmac384::test_hmac0...[ok]
88,911 UART: hmac384::test_hmac1...[ok]
109,598 UART: hmac384::test_hmac2...[ok]
6,677,701 UART: hmac384::test_hmac3...[ok]
13,247,032 UART: hmac384::test_hmac4...[ok]
19,835,685 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,406,108 UART: hmac384::test_hmac5...[ok]
29,776,592 UART: hmac384::test_kdf0...[ok]
33,102,346 UART: hmac384::test_kdf1...[ok]
36,427,213 UART: hmac384::test_kdf2...[ok]
36,456,719 UART: hmac384::test_hmac_multi_block...[ok]
36,475,688 UART: hmac384::test_hmac_exact_single_block...[ok]
36,496,408 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
30,660 UART: hmac384::test_kat...[ok]
70,493 UART: hmac384::test_hmac0...[ok]
87,899 UART: hmac384::test_hmac1...[ok]
110,321 UART: hmac384::test_hmac2...[ok]
6,700,519 UART: hmac384::test_hmac3...[ok]
13,269,308 UART: hmac384::test_hmac4...[ok]
19,861,117 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,431,386 UART: hmac384::test_hmac5...[ok]
29,781,259 UART: hmac384::test_kdf0...[ok]
33,108,175 UART: hmac384::test_kdf1...[ok]
36,437,254 UART: hmac384::test_kdf2...[ok]
36,464,923 UART: hmac384::test_hmac_multi_block...[ok]
36,483,451 UART: hmac384::test_hmac_exact_single_block...[ok]
36,504,300 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
31,009 UART: hmac384::test_kat...[ok]
455,363 UART: hmac384::test_hmac0...[ok]
653,998 UART: hmac384::test_hmac1...[ok]
857,737 UART: hmac384::test_hmac2...[ok]
7,556,440 UART: hmac384::test_hmac3...[ok]
14,065,280 UART: hmac384::test_hmac4...[ok]
20,579,132 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,094,910 UART: hmac384::test_hmac5...[ok]
30,374,080 UART: hmac384::test_kdf0...[ok]
33,643,390 UART: hmac384::test_kdf1...[ok]
36,910,116 UART: hmac384::test_kdf2...[ok]
36,925,547 UART: hmac384::test_hmac_multi_block...[ok]
40,327,444 UART: hmac384::test_hmac_exact_single_block...[ok]
40,531,886 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2caa0c9226944dc8e663056a10dc5f6d22063efeb421f47f7d633f0ab4a96ca0011d7bbe6f9ed972cb9e6abd5b9c4dd2",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
31,103 UART: hmac384::test_kat...[ok]
456,105 UART: hmac384::test_hmac0...[ok]
653,552 UART: hmac384::test_hmac1...[ok]
858,738 UART: hmac384::test_hmac2...[ok]
7,561,654 UART: hmac384::test_hmac3...[ok]
14,070,609 UART: hmac384::test_hmac4...[ok]
20,576,129 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,090,768 UART: hmac384::test_hmac5...[ok]
30,368,933 UART: hmac384::test_kdf0...[ok]
33,640,713 UART: hmac384::test_kdf1...[ok]
36,906,842 UART: hmac384::test_kdf2...[ok]
36,921,188 UART: hmac384::test_hmac_multi_block...[ok]
40,321,432 UART: hmac384::test_hmac_exact_single_block...[ok]
40,525,161 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
30,722 UART: hmac384::test_kat...[ok]
70,404 UART: hmac384::test_hmac0...[ok]
88,606 UART: hmac384::test_hmac1...[ok]
108,828 UART: hmac384::test_hmac2...[ok]
5,037,531 UART: hmac384::test_hmac3...[ok]
9,958,934 UART: hmac384::test_hmac4...[ok]
14,890,742 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,815,476 UART: hmac384::test_hmac5...[ok]
22,353,867 UART: hmac384::test_kdf0...[ok]
24,847,776 UART: hmac384::test_kdf1...[ok]
27,348,019 UART: hmac384::test_kdf2...[ok]
27,373,508 UART: hmac384::test_hmac_multi_block...[ok]
27,391,225 UART: hmac384::test_hmac_exact_single_block...[ok]
27,413,307 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
31,344 UART: hmac384::test_kat...[ok]
69,858 UART: hmac384::test_hmac0...[ok]
87,832 UART: hmac384::test_hmac1...[ok]
107,974 UART: hmac384::test_hmac2...[ok]
5,033,257 UART: hmac384::test_hmac3...[ok]
9,961,343 UART: hmac384::test_hmac4...[ok]
14,887,724 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,816,722 UART: hmac384::test_hmac5...[ok]
22,355,123 UART: hmac384::test_kdf0...[ok]
24,850,863 UART: hmac384::test_kdf1...[ok]
27,346,807 UART: hmac384::test_kdf2...[ok]
27,373,402 UART: hmac384::test_hmac_multi_block...[ok]
27,391,983 UART: hmac384::test_hmac_exact_single_block...[ok]
27,414,553 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
30,821 UART: hmac384::test_kat...[ok]
453,378 UART: hmac384::test_hmac0...[ok]
653,237 UART: hmac384::test_hmac1...[ok]
857,034 UART: hmac384::test_hmac2...[ok]
5,929,997 UART: hmac384::test_hmac3...[ok]
10,807,456 UART: hmac384::test_hmac4...[ok]
15,688,628 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,569,207 UART: hmac384::test_hmac5...[ok]
23,027,560 UART: hmac384::test_kdf0...[ok]
25,485,876 UART: hmac384::test_kdf1...[ok]
27,934,608 UART: hmac384::test_kdf2...[ok]
27,948,764 UART: hmac384::test_hmac_multi_block...[ok]
27,960,704 UART: hmac384::test_hmac_exact_single_block...[ok]
27,973,178 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
30,968 UART: hmac384::test_kat...[ok]
455,410 UART: hmac384::test_hmac0...[ok]
653,323 UART: hmac384::test_hmac1...[ok]
857,311 UART: hmac384::test_hmac2...[ok]
5,926,472 UART: hmac384::test_hmac3...[ok]
10,804,299 UART: hmac384::test_hmac4...[ok]
15,680,028 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,564,276 UART: hmac384::test_hmac5...[ok]
23,024,973 UART: hmac384::test_kdf0...[ok]
25,478,066 UART: hmac384::test_kdf1...[ok]
27,928,680 UART: hmac384::test_kdf2...[ok]
27,942,491 UART: hmac384::test_hmac_multi_block...[ok]
27,955,407 UART: hmac384::test_hmac_exact_single_block...[ok]
27,968,855 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
30,600 UART: hmac384::test_kat...[ok]
69,868 UART: hmac384::test_hmac0...[ok]
87,934 UART: hmac384::test_hmac1...[ok]
108,158 UART: hmac384::test_hmac2...[ok]
5,035,487 UART: hmac384::test_hmac3...[ok]
9,961,217 UART: hmac384::test_hmac4...[ok]
14,892,014 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,815,413 UART: hmac384::test_hmac5...[ok]
22,355,554 UART: hmac384::test_kdf0...[ok]
24,851,840 UART: hmac384::test_kdf1...[ok]
27,344,481 UART: hmac384::test_kdf2...[ok]
27,373,684 UART: hmac384::test_hmac_multi_block...[ok]
27,392,534 UART: hmac384::test_hmac_exact_single_block...[ok]
27,413,303 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
30,732 UART: hmac384::test_kat...[ok]
68,851 UART: hmac384::test_hmac0...[ok]
87,020 UART: hmac384::test_hmac1...[ok]
108,540 UART: hmac384::test_hmac2...[ok]
5,032,475 UART: hmac384::test_hmac3...[ok]
9,957,642 UART: hmac384::test_hmac4...[ok]
14,885,477 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,810,114 UART: hmac384::test_hmac5...[ok]
22,350,390 UART: hmac384::test_kdf0...[ok]
24,845,794 UART: hmac384::test_kdf1...[ok]
27,342,510 UART: hmac384::test_kdf2...[ok]
27,367,285 UART: hmac384::test_hmac_multi_block...[ok]
27,386,495 UART: hmac384::test_hmac_exact_single_block...[ok]
27,407,533 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
30,888 UART: hmac384::test_kat...[ok]
453,816 UART: hmac384::test_hmac0...[ok]
653,249 UART: hmac384::test_hmac1...[ok]
858,671 UART: hmac384::test_hmac2...[ok]
5,927,917 UART: hmac384::test_hmac3...[ok]
10,809,034 UART: hmac384::test_hmac4...[ok]
15,681,262 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,562,186 UART: hmac384::test_hmac5...[ok]
23,022,398 UART: hmac384::test_kdf0...[ok]
25,475,003 UART: hmac384::test_kdf1...[ok]
27,928,324 UART: hmac384::test_kdf2...[ok]
27,942,698 UART: hmac384::test_hmac_multi_block...[ok]
27,954,762 UART: hmac384::test_hmac_exact_single_block...[ok]
27,966,759 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
30,804 UART: hmac384::test_kat...[ok]
454,408 UART: hmac384::test_hmac0...[ok]
653,015 UART: hmac384::test_hmac1...[ok]
857,537 UART: hmac384::test_hmac2...[ok]
5,928,252 UART: hmac384::test_hmac3...[ok]
10,806,665 UART: hmac384::test_hmac4...[ok]
15,684,584 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,567,301 UART: hmac384::test_hmac5...[ok]
23,032,126 UART: hmac384::test_kdf0...[ok]
25,488,068 UART: hmac384::test_kdf1...[ok]
27,938,830 UART: hmac384::test_kdf2...[ok]
27,953,694 UART: hmac384::test_hmac_multi_block...[ok]
27,965,518 UART: hmac384::test_hmac_exact_single_block...[ok]
27,977,917 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,600 UART: hmac384::test_hmac0...[ok]
13,821 UART: hmac384::test_hmac1...[ok]
17,668 UART: hmac384::test_hmac2...[ok]
37,243 UART: hmac384::test_hmac3...[ok]
57,509 UART: hmac384::test_hmac4...[ok]
77,668 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,115 UART: hmac384::test_hmac5...[ok]
121,855 UART: hmac384::test_kdf0...[ok]
137,959 UART: hmac384::test_kdf1...[ok]
153,745 UART: hmac384::test_kdf2...[ok]
159,346 UART: hmac384::test_hmac_multi_block...[ok]
165,247 UART: hmac384::test_hmac_exact_single_block...[ok]
171,163 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,658 UART: hmac384::test_hmac0...[ok]
13,749 UART: hmac384::test_hmac1...[ok]
17,820 UART: hmac384::test_hmac2...[ok]
37,317 UART: hmac384::test_hmac3...[ok]
56,867 UART: hmac384::test_hmac4...[ok]
76,518 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,331 UART: hmac384::test_hmac5...[ok]
120,165 UART: hmac384::test_kdf0...[ok]
136,595 UART: hmac384::test_kdf1...[ok]
151,897 UART: hmac384::test_kdf2...[ok]
157,374 UART: hmac384::test_hmac_multi_block...[ok]
163,249 UART: hmac384::test_hmac_exact_single_block...[ok]
169,037 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,872 UART: hmac384::test_hmac0...[ok]
14,129 UART: hmac384::test_hmac1...[ok]
18,506 UART: hmac384::test_hmac2...[ok]
38,511 UART: hmac384::test_hmac3...[ok]
58,597 UART: hmac384::test_hmac4...[ok]
79,250 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,779 UART: hmac384::test_hmac5...[ok]
123,443 UART: hmac384::test_kdf0...[ok]
140,253 UART: hmac384::test_kdf1...[ok]
155,979 UART: hmac384::test_kdf2...[ok]
161,722 UART: hmac384::test_hmac_multi_block...[ok]
167,697 UART: hmac384::test_hmac_exact_single_block...[ok]
173,883 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,914 UART: hmac384::test_hmac0...[ok]
14,081 UART: hmac384::test_hmac1...[ok]
18,256 UART: hmac384::test_hmac2...[ok]
38,283 UART: hmac384::test_hmac3...[ok]
58,215 UART: hmac384::test_hmac4...[ok]
78,476 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,499 UART: hmac384::test_hmac5...[ok]
122,737 UART: hmac384::test_kdf0...[ok]
139,187 UART: hmac384::test_kdf1...[ok]
154,859 UART: hmac384::test_kdf2...[ok]
160,792 UART: hmac384::test_hmac_multi_block...[ok]
166,721 UART: hmac384::test_hmac_exact_single_block...[ok]
172,785 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,846 UART: hmac384::test_hmac0...[ok]
14,085 UART: hmac384::test_hmac1...[ok]
18,166 UART: hmac384::test_hmac2...[ok]
38,241 UART: hmac384::test_hmac3...[ok]
58,361 UART: hmac384::test_hmac4...[ok]
77,818 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,685 UART: hmac384::test_hmac5...[ok]
121,203 UART: hmac384::test_kdf0...[ok]
137,497 UART: hmac384::test_kdf1...[ok]
153,113 UART: hmac384::test_kdf2...[ok]
158,692 UART: hmac384::test_hmac_multi_block...[ok]
164,421 UART: hmac384::test_hmac_exact_single_block...[ok]
170,399 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,556 UART: hmac384::test_hmac0...[ok]
13,487 UART: hmac384::test_hmac1...[ok]
17,488 UART: hmac384::test_hmac2...[ok]
36,967 UART: hmac384::test_hmac3...[ok]
56,337 UART: hmac384::test_hmac4...[ok]
76,362 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,573 UART: hmac384::test_hmac5...[ok]
120,201 UART: hmac384::test_kdf0...[ok]
136,497 UART: hmac384::test_kdf1...[ok]
152,431 UART: hmac384::test_kdf2...[ok]
157,994 UART: hmac384::test_hmac_multi_block...[ok]
163,887 UART: hmac384::test_hmac_exact_single_block...[ok]
169,943 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,980 UART: hmac384::test_hmac0...[ok]
14,281 UART: hmac384::test_hmac1...[ok]
18,416 UART: hmac384::test_hmac2...[ok]
39,005 UART: hmac384::test_hmac3...[ok]
58,837 UART: hmac384::test_hmac4...[ok]
78,648 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,083 UART: hmac384::test_hmac5...[ok]
122,697 UART: hmac384::test_kdf0...[ok]
139,027 UART: hmac384::test_kdf1...[ok]
154,873 UART: hmac384::test_kdf2...[ok]
160,420 UART: hmac384::test_hmac_multi_block...[ok]
166,375 UART: hmac384::test_hmac_exact_single_block...[ok]
172,519 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,910 UART: hmac384::test_hmac0...[ok]
13,871 UART: hmac384::test_hmac1...[ok]
18,230 UART: hmac384::test_hmac2...[ok]
38,075 UART: hmac384::test_hmac3...[ok]
57,995 UART: hmac384::test_hmac4...[ok]
77,936 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,923 UART: hmac384::test_hmac5...[ok]
121,257 UART: hmac384::test_kdf0...[ok]
137,913 UART: hmac384::test_kdf1...[ok]
154,215 UART: hmac384::test_kdf2...[ok]
159,694 UART: hmac384::test_hmac_multi_block...[ok]
165,569 UART: hmac384::test_hmac_exact_single_block...[ok]
171,649 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,626 UART: hmac384::test_hmac0...[ok]
13,661 UART: hmac384::test_hmac1...[ok]
17,688 UART: hmac384::test_hmac2...[ok]
36,661 UART: hmac384::test_hmac3...[ok]
56,385 UART: hmac384::test_hmac4...[ok]
75,966 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,021 UART: hmac384::test_hmac5...[ok]
119,643 UART: hmac384::test_kdf0...[ok]
136,035 UART: hmac384::test_kdf1...[ok]
151,229 UART: hmac384::test_kdf2...[ok]
156,724 UART: hmac384::test_hmac_multi_block...[ok]
162,529 UART: hmac384::test_hmac_exact_single_block...[ok]
168,499 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,536 UART: hmac384::test_hmac0...[ok]
13,401 UART: hmac384::test_hmac1...[ok]
17,442 UART: hmac384::test_hmac2...[ok]
37,381 UART: hmac384::test_hmac3...[ok]
57,053 UART: hmac384::test_hmac4...[ok]
76,568 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,019 UART: hmac384::test_hmac5...[ok]
121,217 UART: hmac384::test_kdf0...[ok]
137,911 UART: hmac384::test_kdf1...[ok]
152,947 UART: hmac384::test_kdf2...[ok]
158,486 UART: hmac384::test_hmac_multi_block...[ok]
164,379 UART: hmac384::test_hmac_exact_single_block...[ok]
170,419 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,886 UART: hmac384::test_hmac0...[ok]
14,093 UART: hmac384::test_hmac1...[ok]
18,278 UART: hmac384::test_hmac2...[ok]
37,903 UART: hmac384::test_hmac3...[ok]
57,591 UART: hmac384::test_hmac4...[ok]
77,172 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,243 UART: hmac384::test_hmac5...[ok]
121,165 UART: hmac384::test_kdf0...[ok]
138,283 UART: hmac384::test_kdf1...[ok]
153,599 UART: hmac384::test_kdf2...[ok]
159,204 UART: hmac384::test_hmac_multi_block...[ok]
165,045 UART: hmac384::test_hmac_exact_single_block...[ok]
171,117 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ecf1274066efef0149a2f73236628c8eed1f6b8eb216afeaeee2d15d4a4e66cb2ef62d0a18684573a73631037b758b73",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,842 UART: hmac384::test_hmac0...[ok]
14,015 UART: hmac384::test_hmac1...[ok]
18,362 UART: hmac384::test_hmac2...[ok]
38,511 UART: hmac384::test_hmac3...[ok]
58,797 UART: hmac384::test_hmac4...[ok]
78,386 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,583 UART: hmac384::test_hmac5...[ok]
122,541 UART: hmac384::test_kdf0...[ok]
139,529 UART: hmac384::test_kdf1...[ok]
155,007 UART: hmac384::test_kdf2...[ok]
160,566 UART: hmac384::test_hmac_multi_block...[ok]
166,689 UART: hmac384::test_hmac_exact_single_block...[ok]
172,745 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,150 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
23,472 UART: test_lms_24::test_coefficient...[ok]
26,179 UART: test_lms_24::test_get_lms_parameters...[ok]
29,164 UART: test_lms_24::test_hash_message_24...[ok]
41,890 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
23,454 UART: test_lms_24::test_coefficient...[ok]
26,154 UART: test_lms_24::test_get_lms_parameters...[ok]
29,161 UART: test_lms_24::test_hash_message_24...[ok]
41,873 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
23,797 UART: test_lms_24::test_coefficient...[ok]
26,529 UART: test_lms_24::test_get_lms_parameters...[ok]
29,478 UART: test_lms_24::test_hash_message_24...[ok]
42,271 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a868b103e3eac33a78d777d0130220fd9e0ae3e3f70d2dfcdf2231fe29191bdd7e58dad91e3753d3085601669cf9b864",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
23,728 UART: test_lms_24::test_coefficient...[ok]
27,843 UART: test_lms_24::test_get_lms_parameters...[ok]
29,855 UART: test_lms_24::test_hash_message_24...[ok]
42,202 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
23,810 UART: test_lms_24::test_coefficient...[ok]
26,976 UART: test_lms_24::test_get_lms_parameters...[ok]
30,385 UART: test_lms_24::test_hash_message_24...[ok]
43,839 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
23,845 UART: test_lms_24::test_coefficient...[ok]
26,978 UART: test_lms_24::test_get_lms_parameters...[ok]
30,389 UART: test_lms_24::test_hash_message_24...[ok]
43,838 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
25,665 UART: test_lms_24::test_coefficient...[ok]
28,818 UART: test_lms_24::test_get_lms_parameters...[ok]
32,236 UART: test_lms_24::test_hash_message_24...[ok]
45,632 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
24,145 UART: test_lms_24::test_coefficient...[ok]
27,318 UART: test_lms_24::test_get_lms_parameters...[ok]
30,723 UART: test_lms_24::test_hash_message_24...[ok]
44,164 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
23,796 UART: test_lms_24::test_coefficient...[ok]
26,876 UART: test_lms_24::test_get_lms_parameters...[ok]
30,382 UART: test_lms_24::test_hash_message_24...[ok]
43,739 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,618 writing to cptra_bootfsm_go
24,568 UART: test_lms_24::test_coefficient...[ok]
27,681 UART: test_lms_24::test_get_lms_parameters...[ok]
31,175 UART: test_lms_24::test_hash_message_24...[ok]
44,575 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,461 writing to cptra_bootfsm_go
24,288 UART: test_lms_24::test_coefficient...[ok]
28,938 UART: test_lms_24::test_get_lms_parameters...[ok]
30,875 UART: test_lms_24::test_hash_message_24...[ok]
44,253 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
24,249 UART: test_lms_24::test_coefficient...[ok]
27,402 UART: test_lms_24::test_get_lms_parameters...[ok]
30,835 UART: test_lms_24::test_hash_message_24...[ok]
44,272 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "049f0cd62160dcf2a9566655055788d43629d395b2c30c7df09ce03f4e91a3217d32575a54024ed87bf9e2739660b781",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
22,794 UART: test_lms_32::test_hash_message_32...[ok]
41,968 UART: test_lms_32::test_ots_32...[ok]
21,831,071 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,200 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
22,775 UART: test_lms_32::test_hash_message_32...[ok]
41,931 UART: test_lms_32::test_ots_32...[ok]
21,831,028 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,070 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
23,049 UART: test_lms_32::test_hash_message_32...[ok]
42,179 UART: test_lms_32::test_ots_32...[ok]
21,831,394 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,386 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e42d8ece7841db25497fead332afbffd33d95ccc518b7b54f0d56a137742195da822b09ecf0c53a8d66e6adab0843a36",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
22,854 UART: test_lms_32::test_hash_message_32...[ok]
42,018 UART: test_lms_32::test_ots_32...[ok]
21,831,337 UART: test_lms_32::test_lms_lower_32...[ok]
65,500,189 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
22,929 UART: test_lms_32::test_hash_message_32...[ok]
42,235 UART: test_lms_32::test_ots_32...[ok]
653,236 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,138 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
23,068 UART: test_lms_32::test_hash_message_32...[ok]
42,351 UART: test_lms_32::test_ots_32...[ok]
653,422 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,241 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
23,387 UART: test_lms_32::test_hash_message_32...[ok]
42,684 UART: test_lms_32::test_ots_32...[ok]
653,699 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,556 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
23,295 UART: test_lms_32::test_hash_message_32...[ok]
42,553 UART: test_lms_32::test_ots_32...[ok]
653,562 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,459 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,737 writing to cptra_bootfsm_go
23,762 UART: test_lms_32::test_hash_message_32...[ok]
43,068 UART: test_lms_32::test_ots_32...[ok]
654,080 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,978 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
23,123 UART: test_lms_32::test_hash_message_32...[ok]
42,439 UART: test_lms_32::test_ots_32...[ok]
653,438 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,333 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
23,247 UART: test_lms_32::test_hash_message_32...[ok]
42,535 UART: test_lms_32::test_ots_32...[ok]
653,540 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,429 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
23,339 UART: test_lms_32::test_hash_message_32...[ok]
42,617 UART: test_lms_32::test_ots_32...[ok]
653,661 UART: test_lms_32::test_lms_lower_32...[ok]
1,970,501 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b507d09f8502027efccb6bb3d340963cfb312145e8c80af6e2e77f03971f8d8f2f52094f89be942ab7b1c1186a071f27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,108 UART: test_lms_32::test_hash_message_32...[ok]
13,603 UART: test_lms_32::test_ots_32...[ok]
178,941 UART: test_lms_32::test_lms_lower_32...[ok]
562,400 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,173 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,344 UART: cmd: 0x50000000
19,139 UART: dlen: 8
21,159 UART: buf: [ 21,477 >>> mbox cmd response: success
67452301, efcdab89, 00000000, 00000000]
26,559 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,262 UART: cmd: 0x50000000
29,148 UART: dlen: 7
30,215 >>> mbox cmd response: success
30,691 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,657 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,343 UART: cmd: 0x50000000
39,241 UART: dlen: 0
40,237 >>> mbox cmd response: success
40,656 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,933 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,623 UART: cmd: 0x50000001
49,502 UART: dlen: 5
50,549 >>> mbox cmd response: success
51,070 UART: buf: [01, 23, 45, 67, 89]
55,641 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,332 UART: cmd: 0x50000001
58,206 UART: dlen: 6
59,249 >>> mbox cmd response: success
59,772 UART: buf: [01, 23, 45, 67, 89]
64,350 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,047 UART: cmd: 0x50000001
66,928 UART: dlen: 9
67,992 >>> mbox cmd response: success
68,464 UART: buf: [01, 23, 45, 67, 89]
73,060 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,764 UART: cmd: 0x60000000
75,646 UART: dlen: 16
77,176 UART: buf: [67452301, efcdab89]
80,718 UART: buf: [33221100, 77665544]
83,864 >>> mbox cmd response: success
84,124 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,817 UART: cmd: 0x60000000
86,750 UART: dlen: 13
88,221 UART: buf: [67452301, efcdab89]
91,712 UART: buf: [33221100, 00000044]
95,086 >>> mbox cmd response: success
95,345 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,033 UART: cmd: 0x60000000
97,929 UART: dlen: 12
99,562 UART: buf: [67452301, efcdab89]
102,890 UART: buf: [33221100, 00000000]
106,269 >>> mbox cmd response: success
106,532 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,201 UART: cmd: 0x60000000
109,076 UART: dlen: 0
110,128 >>> mbox cmd response: success
110,382 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,055 UART: cmd: 0x70000000
112,645 >>> mbox cmd response: success
112,894 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,596 UART: cmd: 0x60000000
115,471 UART: dlen: 5
117,009 UART: buf: [04050607, 00000003]
120,500 >>> mbox cmd response: success
120,776 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,450 UART: cmd: 0x80000000
122,994 >>> mbox cmd response: failed
123,300 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
123,978 UART: cmd: 0x60000000
125,854 UART: dlen: 5
127,313 UART: buf: [04050607, 00000003]
130,783 >>> mbox cmd response: success
131,032 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,712 UART: cmd: 0x90000000
133,598 UART: dlen: 8
135,035 UART: buf: [08070605]
137,121 >>> mbox cmd response: success
137,374 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,039 UART: cmd: 0xa0000000
139,591 >>> mbox cmd response data (4 bytes)
140,011 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,704 UART: cmd: 0xb0000000
142,579 UART: dlen: 6
144,106 UART: buf: [0c0d0e0f, 00000a0b]
147,661 >>> mbox cmd response data (2 bytes)
148,031 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,709 UART: cmd: 0xc0000000
150,376 >>> mbox cmd response data (9 bytes)
150,757 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,431 UART: cmd: 0xd0000000
152,986 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
3,280 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,464 UART: cmd: 0x50000000
19,252 UART: dlen: 8
20,312 >>> mbox cmd response: success
20,747 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,626 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,322 UART: cmd: 0x50000000
29,201 UART: dlen: 7
30,250 >>> mbox cmd response: success
30,741 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,702 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,386 UART: cmd: 0x50000000
39,290 UART: dlen: 0
40,249 >>> mbox cmd response: success
40,720 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,004 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,703 UART: cmd: 0x50000001
49,582 UART: dlen: 5
50,632 >>> mbox cmd response: success
51,101 UART: buf: [01, 23, 45, 67, 89]
55,740 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,434 UART: cmd: 0x50000001
58,313 UART: dlen: 6
59,358 >>> mbox cmd response: success
59,830 UART: buf: [01, 23, 45, 67, 89]
64,481 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,179 UART: cmd: 0x50000001
67,058 UART: dlen: 9
68,104 >>> mbox cmd response: success
68,574 UART: buf: [01, 23, 45, 67, 89]
73,208 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,911 UART: cmd: 0x60000000
75,789 UART: dlen: 16
77,319 UART: buf: [67452301, efcdab89]
80,863 UART: buf: [33221100, 77665544]
83,954 >>> mbox cmd response: success
84,213 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,908 UART: cmd: 0x60000000
86,840 UART: dlen: 13
88,310 UART: buf: [67452301, efcdab89]
91,791 UART: buf: [33221100, 00000044]
95,188 >>> mbox cmd response: success
95,450 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,136 UART: cmd: 0x60000000
98,011 UART: dlen: 12
99,489 UART: buf: [67452301, efcdab89]
103,020 UART: buf: [33221100, 00000000]
106,384 >>> mbox cmd response: success
106,640 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,307 UART: cmd: 0x60000000
109,233 UART: dlen: 0
110,271 >>> mbox cmd response: success
110,523 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,196 UART: cmd: 0x70000000
112,782 >>> mbox cmd response: success
113,039 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,724 UART: cmd: 0x60000000
115,624 UART: dlen: 5
117,111 UART: buf: [04050607, 00000003]
120,635 >>> mbox cmd response: success
120,910 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,587 UART: cmd: 0x80000000
123,182 >>> mbox cmd response: failed
123,483 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,161 UART: cmd: 0x60000000
126,038 UART: dlen: 5
127,531 UART: buf: [04050607, 00000003]
131,001 >>> mbox cmd response: success
131,260 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,940 UART: cmd: 0x90000000
133,811 UART: dlen: 8
135,302 UART: buf: [08070605]
137,334 >>> mbox cmd response: success
137,609 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,276 UART: cmd: 0xa0000000
139,881 >>> mbox cmd response data (4 bytes)
140,290 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,975 UART: cmd: 0xb0000000
142,849 UART: dlen: 6
144,381 UART: buf: [0c0d0e0f, 00000a0b]
147,925 >>> mbox cmd response data (2 bytes)
148,289 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,966 UART: cmd: 0xc0000000
150,630 >>> mbox cmd response data (9 bytes)
151,015 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,692 UART: cmd: 0xd0000000
153,243 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,577 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,747 UART: cmd: 0x50000000
19,574 UART: dlen: 8
20,626 >>> mbox cmd response: success
21,083 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,985 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,714 UART: cmd: 0x50000000
29,596 UART: dlen: 7
30,693 >>> mbox cmd response: success
31,143 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,179 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,890 UART: cmd: 0x50000000
39,765 UART: dlen: 0
40,784 >>> mbox cmd response: success
41,221 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,566 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,311 UART: cmd: 0x50000001
50,215 UART: dlen: 5
51,273 >>> mbox cmd response: success
51,752 UART: buf: [01, 23, 45, 67, 89]
56,330 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,039 UART: cmd: 0x50000001
58,931 UART: dlen: 6
59,981 >>> mbox cmd response: success
60,457 UART: buf: [01, 23, 45, 67, 89]
65,044 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,756 UART: cmd: 0x50000001
67,639 UART: dlen: 9
68,690 >>> mbox cmd response: success
69,165 UART: buf: [01, 23, 45, 67, 89]
73,756 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,473 UART: cmd: 0x60000000
76,380 UART: dlen: 16
77,858 UART: buf: [67452301, efcdab89]
81,404 UART: buf: [33221100, 77665544]
84,556 >>> mbox cmd response: success
84,821 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,523 UART: cmd: 0x60000000
87,459 UART: dlen: 13
88,935 UART: buf: [67452301, efcdab89]
92,422 UART: buf: [33221100, 00000044]
95,795 >>> mbox cmd response: success
96,060 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,762 UART: cmd: 0x60000000
98,643 UART: dlen: 12
100,121 UART: buf: [67452301, efcdab89]
103,619 UART: buf: [33221100, 00000000]
106,990 >>> mbox cmd response: success
107,276 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,963 UART: cmd: 0x60000000
109,841 UART: dlen: 0
110,883 >>> mbox cmd response: success
111,149 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,837 UART: cmd: 0x70000000
113,423 >>> mbox cmd response: success
113,684 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,374 UART: cmd: 0x60000000
116,250 UART: dlen: 5
117,732 UART: buf: [04050607, 00000003]
121,266 >>> mbox cmd response: success
121,533 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,219 UART: cmd: 0x80000000
123,884 >>> mbox cmd response: failed
124,205 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,911 UART: cmd: 0x60000000
126,803 UART: dlen: 5
128,249 UART: buf: [04050607, 00000003]
131,735 >>> mbox cmd response: success
132,001 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,699 UART: cmd: 0x90000000
134,580 UART: dlen: 8
136,020 UART: buf: [08070605]
138,109 >>> mbox cmd response: success
138,370 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,049 UART: cmd: 0xa0000000
140,612 >>> mbox cmd response data (4 bytes)
141,016 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,718 UART: cmd: 0xb0000000
143,603 UART: dlen: 6
145,086 UART: buf: [0c0d0e0f, 00000a0b]
148,660 >>> mbox cmd response data (2 bytes)
149,037 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,729 UART: cmd: 0xc0000000
151,400 >>> mbox cmd response data (9 bytes)
151,793 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,478 UART: cmd: 0xd0000000
154,035 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,609 writing to cptra_bootfsm_go
5,175 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
19,318 UART: cmd: 0x50000000
21,128 UART: dlen: 8
22,187 >>> mbox cmd response: success
22,637 UART: buf: [67452301, efcdab89, 00000000, 00000000]
28,564 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
29,294 UART: cmd: 0x50000000
31,170 UART: dlen: 7
32,216 >>> mbox cmd response: success
32,711 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
38,763 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
39,475 UART: cmd: 0x50000000
41,373 UART: dlen: 0
42,415 >>> mbox cmd response: success
42,814 UART: buf: [00000000, 00000000, 00000000, 00000000]
49,090 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
49,799 UART: cmd: 0x50000001
51,687 UART: dlen: 5
52,732 >>> mbox cmd response: success
53,209 UART: buf: [01, 23, 45, 67, 89]
57,801 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
58,505 UART: cmd: 0x50000001
60,384 UART: dlen: 6
61,429 >>> mbox cmd response: success
61,906 UART: buf: [01, 23, 45, 67, 89]
66,547 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
67,256 UART: cmd: 0x50000001
69,148 UART: dlen: 9
70,216 >>> mbox cmd response: success
70,690 UART: buf: [01, 23, 45, 67, 89]
75,271 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
75,986 UART: cmd: 0x60000000
77,868 UART: dlen: 16
79,400 UART: buf: [67452301, efcdab89]
82,947 UART: buf: [33221100, 77665544]
86,122 >>> mbox cmd response: success
86,406 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
87,114 UART: cmd: 0x60000000
89,009 UART: dlen: 13
90,506 UART: buf: [67452301, efcdab89]
94,004 UART: buf: [33221100, 00000044]
97,382 >>> mbox cmd response: success
97,647 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
98,346 UART: cmd: 0x60000000
100,248 UART: dlen: 12
101,724 UART: buf: [67452301, efcdab89]
105,216 UART: buf: [33221100, 00000000]
108,588 >>> mbox cmd response: success
108,855 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
109,534 UART: cmd: 0x60000000
111,417 UART: dlen: 0
112,471 >>> mbox cmd response: success
112,734 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
113,422 UART: cmd: 0x70000000
115,008 >>> mbox cmd response: success
115,274 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
115,964 UART: cmd: 0x60000000
117,842 UART: dlen: 5
119,379 UART: buf: [04050607, 00000003]
122,857 >>> mbox cmd response: success
123,142 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,845 UART: cmd: 0x80000000
125,438 >>> mbox cmd response: failed
125,746 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
126,436 UART: cmd: 0x60000000
128,313 UART: dlen: 5
129,809 UART: buf: [04050607, 00000003]
133,301 >>> mbox cmd response: success
133,562 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
134,252 UART: cmd: 0x90000000
136,127 UART: dlen: 8
137,568 UART: buf: [08070605]
139,651 >>> mbox cmd response: success
139,912 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
140,592 UART: cmd: 0xa0000000
142,149 >>> mbox cmd response data (4 bytes)
142,579 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
143,283 UART: cmd: 0xb0000000
145,164 UART: dlen: 6
146,650 UART: buf: [0c0d0e0f, 00000a0b]
150,255 >>> mbox cmd response data (2 bytes)
150,634 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
151,323 UART: cmd: 0xc0000000
153,000 >>> mbox cmd response data (9 bytes)
153,402 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
154,084 UART: cmd: 0xd0000000
155,649 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,414 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,546 UART: cmd: 0x50000000
19,381 UART: dlen: 8
20,404 >>> mbox cmd response: success
20,895 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,776 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,479 UART: cmd: 0x50000000
29,362 UART: dlen: 7
30,416 >>> mbox cmd response: success
30,887 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,905 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,594 UART: cmd: 0x50000000
39,477 UART: dlen: 0
40,475 >>> mbox cmd response: success
40,949 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,226 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,923 UART: cmd: 0x50000001
49,810 UART: dlen: 5
50,876 >>> mbox cmd response: success
51,348 UART: buf: [01, 23, 45, 67, 89]
55,940 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,637 UART: cmd: 0x50000001
58,519 UART: dlen: 6
59,576 >>> mbox cmd response: success
60,051 UART: buf: [01, 23, 45, 67, 89]
64,641 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,341 UART: cmd: 0x50000001
67,220 UART: dlen: 9
68,270 >>> mbox cmd response: success
68,743 UART: buf: [01, 23, 45, 67, 89]
73,375 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,092 UART: cmd: 0x60000000
75,986 UART: dlen: 16
77,469 UART: buf: [67452301, efcdab89]
81,031 UART: buf: [33221100, 77665544]
84,147 >>> mbox cmd response: success
84,412 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,110 UART: cmd: 0x60000000
86,992 UART: dlen: 13
88,474 UART: buf: [67452301, efcdab89]
91,969 UART: buf: [33221100, 00000044]
95,402 >>> mbox cmd response: success
95,664 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,351 UART: cmd: 0x60000000
98,229 UART: dlen: 12
99,708 UART: buf: [67452301, efcdab89]
103,251 UART: buf: [33221100, 00000000]
106,625 >>> mbox cmd response: success
106,884 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,559 UART: cmd: 0x60000000
109,457 UART: dlen: 0
110,501 >>> mbox cmd response: success
110,762 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,436 UART: cmd: 0x70000000
113,030 >>> mbox cmd response: success
113,288 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,970 UART: cmd: 0x60000000
115,847 UART: dlen: 5
117,330 UART: buf: [04050607, 00000003]
120,822 >>> mbox cmd response: success
121,076 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,751 UART: cmd: 0x80000000
123,287 >>> mbox cmd response: failed
123,589 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,271 UART: cmd: 0x60000000
126,149 UART: dlen: 5
127,607 UART: buf: [04050607, 00000003]
131,093 >>> mbox cmd response: success
131,355 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,035 UART: cmd: 0x90000000
133,919 UART: dlen: 8
135,355 UART: buf: [08070605]
137,435 >>> mbox cmd response: success
137,691 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,362 UART: cmd: 0xa0000000
139,922 >>> mbox cmd response data (4 bytes)
140,310 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,000 UART: cmd: 0xb0000000
142,895 UART: dlen: 6
144,376 UART: buf: [0c0d0e0f, 00000a0b]
147,933 >>> mbox cmd response data (2 bytes)
148,306 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,008 UART: cmd: 0xc0000000
150,638 >>> mbox cmd response data (9 bytes)
151,024 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,704 UART: cmd: 0xd0000000
153,306 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,389 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,528 UART: cmd: 0x50000000
19,371 UART: dlen: 8
20,388 >>> mbox cmd response: success
20,879 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,751 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,450 UART: cmd: 0x50000000
29,289 UART: dlen: 7
30,399 >>> mbox cmd response: success
30,875 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,833 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,519 UART: cmd: 0x50000000
39,399 UART: dlen: 0
40,391 >>> mbox cmd response: success
40,859 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,159 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,855 UART: cmd: 0x50000001
49,747 UART: dlen: 5
50,794 >>> mbox cmd response: success
51,268 UART: buf: [01, 23, 45, 67, 89]
55,909 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,605 UART: cmd: 0x50000001
58,484 UART: dlen: 6
59,530 >>> mbox cmd response: success
60,002 UART: buf: [01, 23, 45, 67, 89]
64,639 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,338 UART: cmd: 0x50000001
67,217 UART: dlen: 9
68,260 >>> mbox cmd response: success
68,728 UART: buf: [01, 23, 45, 67, 89]
73,357 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,095 UART: cmd: 0x60000000
75,988 UART: dlen: 16
77,465 UART: buf: [67452301, efcdab89]
81,011 UART: buf: [33221100, 77665544]
84,168 >>> mbox cmd response: success
84,432 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,130 UART: cmd: 0x60000000
87,064 UART: dlen: 13
88,539 UART: buf: [67452301, efcdab89]
92,035 UART: buf: [33221100, 00000044]
95,412 >>> mbox cmd response: success
95,674 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,364 UART: cmd: 0x60000000
98,238 UART: dlen: 12
99,716 UART: buf: [67452301, efcdab89]
103,211 UART: buf: [33221100, 00000000]
106,597 >>> mbox cmd response: success
106,855 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,526 UART: cmd: 0x60000000
109,400 UART: dlen: 0
110,442 >>> mbox cmd response: success
110,705 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,382 UART: cmd: 0x70000000
112,969 >>> mbox cmd response: success
113,222 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,901 UART: cmd: 0x60000000
115,773 UART: dlen: 5
117,307 UART: buf: [04050607, 00000003]
120,785 >>> mbox cmd response: success
121,041 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,720 UART: cmd: 0x80000000
123,308 >>> mbox cmd response: failed
123,631 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,312 UART: cmd: 0x60000000
126,187 UART: dlen: 5
127,672 UART: buf: [04050607, 00000003]
131,153 >>> mbox cmd response: success
131,409 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,130 UART: cmd: 0x90000000
134,016 UART: dlen: 8
135,461 UART: buf: [08070605]
137,545 >>> mbox cmd response: success
137,803 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,474 UART: cmd: 0xa0000000
140,028 >>> mbox cmd response data (4 bytes)
140,434 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,130 UART: cmd: 0xb0000000
143,008 UART: dlen: 6
144,514 UART: buf: [0c0d0e0f, 00000a0b]
148,069 >>> mbox cmd response data (2 bytes)
148,440 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,118 UART: cmd: 0xc0000000
150,778 >>> mbox cmd response data (9 bytes)
151,172 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,042 UART: cmd: 0xd0000000
153,440 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,735 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,892 UART: cmd: 0x50000000
19,726 UART: dlen: 8
20,756 >>> mbox cmd response: success
21,195 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,134 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,841 UART: cmd: 0x50000000
29,713 UART: dlen: 7
30,773 >>> mbox cmd response: success
31,255 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,258 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,955 UART: cmd: 0x50000000
39,814 UART: dlen: 0
40,838 >>> mbox cmd response: success
41,262 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,579 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,279 UART: cmd: 0x50000001
50,159 UART: dlen: 5
51,262 >>> mbox cmd response: success
51,731 UART: buf: [01, 23, 45, 67, 89]
56,305 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,991 UART: cmd: 0x50000001
58,866 UART: dlen: 6
59,918 >>> mbox cmd response: success
60,393 UART: buf: [01, 23, 45, 67, 89]
65,041 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,745 UART: cmd: 0x50000001
67,621 UART: dlen: 9
68,666 >>> mbox cmd response: success
69,134 UART: buf: [01, 23, 45, 67, 89]
73,771 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,493 UART: cmd: 0x60000000
76,374 UART: dlen: 16
77,904 UART: buf: [67452301, efcdab89]
81,444 UART: buf: [33221100, 77665544]
84,585 >>> mbox cmd response: success
84,842 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,536 UART: cmd: 0x60000000
87,464 UART: dlen: 13
88,941 UART: buf: [67452301, efcdab89]
92,425 UART: buf: [33221100, 00000044]
95,787 >>> mbox cmd response: success
96,044 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,736 UART: cmd: 0x60000000
98,610 UART: dlen: 12
100,085 UART: buf: [67452301, efcdab89]
103,625 UART: buf: [33221100, 00000000]
107,011 >>> mbox cmd response: success
107,275 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,949 UART: cmd: 0x60000000
109,825 UART: dlen: 0
110,867 >>> mbox cmd response: success
111,123 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,798 UART: cmd: 0x70000000
113,385 >>> mbox cmd response: success
113,638 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,319 UART: cmd: 0x60000000
116,189 UART: dlen: 5
117,724 UART: buf: [04050607, 00000003]
121,199 >>> mbox cmd response: success
121,458 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,132 UART: cmd: 0x80000000
123,718 >>> mbox cmd response: failed
124,046 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,739 UART: cmd: 0x60000000
126,611 UART: dlen: 5
128,107 UART: buf: [04050607, 00000003]
131,586 >>> mbox cmd response: success
131,843 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,524 UART: cmd: 0x90000000
134,449 UART: dlen: 8
135,881 UART: buf: [08070605]
137,978 >>> mbox cmd response: success
138,252 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,930 UART: cmd: 0xa0000000
140,488 >>> mbox cmd response data (4 bytes)
140,886 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,580 UART: cmd: 0xb0000000
143,461 UART: dlen: 6
144,958 UART: buf: [0c0d0e0f, 00000a0b]
148,522 >>> mbox cmd response data (2 bytes)
148,893 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,572 UART: cmd: 0xc0000000
151,237 >>> mbox cmd response data (9 bytes)
151,621 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,298 UART: cmd: 0xd0000000
153,908 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,760 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,898 UART: cmd: 0x50000000
19,727 UART: dlen: 8
20,786 >>> mbox cmd response: success
21,239 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,163 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,884 UART: cmd: 0x50000000
29,771 UART: dlen: 7
30,851 >>> mbox cmd response: success
31,327 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,333 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,032 UART: cmd: 0x50000000
39,925 UART: dlen: 0
40,894 >>> mbox cmd response: success
41,350 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,631 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,327 UART: cmd: 0x50000001
50,209 UART: dlen: 5
51,312 >>> mbox cmd response: success
51,783 UART: buf: [01, 23, 45, 67, 89]
56,399 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,104 UART: cmd: 0x50000001
58,998 UART: dlen: 6
60,044 >>> mbox cmd response: success
60,519 UART: buf: [01, 23, 45, 67, 89]
65,109 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,809 UART: cmd: 0x50000001
67,689 UART: dlen: 9
68,738 >>> mbox cmd response: success
69,209 UART: buf: [01, 23, 45, 67, 89]
73,859 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,561 UART: cmd: 0x60000000
76,442 UART: dlen: 16
77,918 UART: buf: [67452301, efcdab89]
81,471 UART: buf: [33221100, 77665544]
84,624 >>> mbox cmd response: success
84,886 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,580 UART: cmd: 0x60000000
87,511 UART: dlen: 13
88,986 UART: buf: [67452301, efcdab89]
92,475 UART: buf: [33221100, 00000044]
95,858 >>> mbox cmd response: success
96,116 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,804 UART: cmd: 0x60000000
98,690 UART: dlen: 12
100,168 UART: buf: [67452301, efcdab89]
103,683 UART: buf: [33221100, 00000000]
107,057 >>> mbox cmd response: success
107,323 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,994 UART: cmd: 0x60000000
109,871 UART: dlen: 0
110,916 >>> mbox cmd response: success
111,171 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,861 UART: cmd: 0x70000000
113,400 >>> mbox cmd response: success
113,656 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,344 UART: cmd: 0x60000000
116,218 UART: dlen: 5
117,706 UART: buf: [04050607, 00000003]
121,195 >>> mbox cmd response: success
121,453 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,127 UART: cmd: 0x80000000
123,736 >>> mbox cmd response: failed
124,040 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,725 UART: cmd: 0x60000000
126,599 UART: dlen: 5
128,088 UART: buf: [04050607, 00000003]
131,573 >>> mbox cmd response: success
131,826 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,506 UART: cmd: 0x90000000
134,416 UART: dlen: 8
135,868 UART: buf: [08070605]
137,907 >>> mbox cmd response: success
138,172 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,843 UART: cmd: 0xa0000000
140,404 >>> mbox cmd response data (4 bytes)
140,788 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,474 UART: cmd: 0xb0000000
143,368 UART: dlen: 6
144,851 UART: buf: [0c0d0e0f, 00000a0b]
148,415 >>> mbox cmd response data (2 bytes)
148,785 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,461 UART: cmd: 0xc0000000
151,129 >>> mbox cmd response data (9 bytes)
151,514 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,188 UART: cmd: 0xd0000000
153,745 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,493 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,674 UART: cmd: 0x50000000
19,476 UART: dlen: 8
20,492 >>> mbox cmd response: success
20,981 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,850 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,548 UART: cmd: 0x50000000
29,433 UART: dlen: 7
30,488 >>> mbox cmd response: success
30,959 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,981 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,669 UART: cmd: 0x50000000
39,555 UART: dlen: 0
40,549 >>> mbox cmd response: success
40,971 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,243 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,938 UART: cmd: 0x50000001
49,818 UART: dlen: 5
50,884 >>> mbox cmd response: success
51,356 UART: buf: [01, 23, 45, 67, 89]
56,004 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,704 UART: cmd: 0x50000001
58,581 UART: dlen: 6
59,626 >>> mbox cmd response: success
60,149 UART: buf: [01, 23, 45, 67, 89]
64,725 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,425 UART: cmd: 0x50000001
67,303 UART: dlen: 9
68,349 >>> mbox cmd response: success
68,818 UART: buf: [01, 23, 45, 67, 89]
73,454 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,159 UART: cmd: 0x60000000
76,067 UART: dlen: 16
77,570 UART: buf: [67452301, efcdab89]
81,094 UART: buf: [33221100, 77665544]
84,252 >>> mbox cmd response: success
84,519 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,220 UART: cmd: 0x60000000
87,155 UART: dlen: 13
88,630 UART: buf: [67452301, efcdab89]
92,115 UART: buf: [33221100, 00000044]
95,499 >>> mbox cmd response: success
95,761 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,451 UART: cmd: 0x60000000
98,333 UART: dlen: 12
99,809 UART: buf: [67452301, efcdab89]
103,305 UART: buf: [33221100, 00000000]
106,680 >>> mbox cmd response: success
106,937 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,612 UART: cmd: 0x60000000
109,506 UART: dlen: 0
110,545 >>> mbox cmd response: success
110,811 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,489 UART: cmd: 0x70000000
113,085 >>> mbox cmd response: success
113,344 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,022 UART: cmd: 0x60000000
115,907 UART: dlen: 5
117,396 UART: buf: [04050607, 00000003]
120,885 >>> mbox cmd response: success
121,140 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,818 UART: cmd: 0x80000000
123,351 >>> mbox cmd response: failed
123,659 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,343 UART: cmd: 0x60000000
126,211 UART: dlen: 5
127,672 UART: buf: [04050607, 00000003]
131,161 >>> mbox cmd response: success
131,416 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,094 UART: cmd: 0x90000000
133,973 UART: dlen: 8
135,461 UART: buf: [08070605]
137,495 >>> mbox cmd response: success
137,752 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,421 UART: cmd: 0xa0000000
139,980 >>> mbox cmd response data (4 bytes)
140,382 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,076 UART: cmd: 0xb0000000
142,957 UART: dlen: 6
144,440 UART: buf: [0c0d0e0f, 00000a0b]
147,997 >>> mbox cmd response data (2 bytes)
148,364 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,062 UART: cmd: 0xc0000000
150,738 >>> mbox cmd response data (9 bytes)
151,127 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,803 UART: cmd: 0xd0000000
153,363 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,373 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,517 UART: cmd: 0x50000000
19,360 UART: dlen: 8
20,418 >>> mbox cmd response: success
20,852 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,745 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,447 UART: cmd: 0x50000000
29,299 UART: dlen: 7
30,412 >>> mbox cmd response: success
30,893 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,844 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,528 UART: cmd: 0x50000000
39,410 UART: dlen: 0
40,409 >>> mbox cmd response: success
40,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,165 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,863 UART: cmd: 0x50000001
49,743 UART: dlen: 5
50,845 >>> mbox cmd response: success
51,314 UART: buf: [01, 23, 45, 67, 89]
55,892 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,586 UART: cmd: 0x50000001
58,467 UART: dlen: 6
59,528 >>> mbox cmd response: success
60,004 UART: buf: [01, 23, 45, 67, 89]
64,603 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,306 UART: cmd: 0x50000001
67,193 UART: dlen: 9
68,239 >>> mbox cmd response: success
68,710 UART: buf: [01, 23, 45, 67, 89]
73,290 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,979 UART: cmd: 0x60000000
75,898 UART: dlen: 16
77,392 UART: buf: [67452301, efcdab89]
80,944 UART: buf: [33221100, 77665544]
84,039 >>> mbox cmd response: success
84,309 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,008 UART: cmd: 0x60000000
86,947 UART: dlen: 13
88,389 UART: buf: [67452301, efcdab89]
91,890 UART: buf: [33221100, 00000044]
95,266 >>> mbox cmd response: success
95,528 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,218 UART: cmd: 0x60000000
98,096 UART: dlen: 12
99,574 UART: buf: [67452301, efcdab89]
103,119 UART: buf: [33221100, 00000000]
106,491 >>> mbox cmd response: success
106,746 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,417 UART: cmd: 0x60000000
109,292 UART: dlen: 0
110,335 >>> mbox cmd response: success
110,596 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,271 UART: cmd: 0x70000000
112,801 >>> mbox cmd response: success
113,075 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,761 UART: cmd: 0x60000000
115,636 UART: dlen: 5
117,175 UART: buf: [04050607, 00000003]
120,658 >>> mbox cmd response: success
120,915 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,588 UART: cmd: 0x80000000
123,176 >>> mbox cmd response: failed
123,476 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,156 UART: cmd: 0x60000000
126,026 UART: dlen: 5
127,525 UART: buf: [04050607, 00000003]
131,015 >>> mbox cmd response: success
131,280 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,964 UART: cmd: 0x90000000
133,839 UART: dlen: 8
135,294 UART: buf: [08070605]
137,376 >>> mbox cmd response: success
137,635 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,304 UART: cmd: 0xa0000000
139,854 >>> mbox cmd response data (4 bytes)
140,258 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,952 UART: cmd: 0xb0000000
142,830 UART: dlen: 6
144,310 UART: buf: [0c0d0e0f, 00000a0b]
147,915 >>> mbox cmd response data (2 bytes)
148,287 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,973 UART: cmd: 0xc0000000
150,638 >>> mbox cmd response data (9 bytes)
151,026 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,705 UART: cmd: 0xd0000000
153,261 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,524 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,700 UART: cmd: 0x50000000
19,532 UART: dlen: 8
20,552 >>> mbox cmd response: success
20,998 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,965 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,688 UART: cmd: 0x50000000
29,563 UART: dlen: 7
30,636 >>> mbox cmd response: success
31,084 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,158 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,857 UART: cmd: 0x50000000
39,759 UART: dlen: 0
40,795 >>> mbox cmd response: success
41,180 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,464 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,158 UART: cmd: 0x50000001
50,049 UART: dlen: 5
51,098 >>> mbox cmd response: success
51,571 UART: buf: [01, 23, 45, 67, 89]
56,212 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,908 UART: cmd: 0x50000001
58,785 UART: dlen: 6
59,835 >>> mbox cmd response: success
60,308 UART: buf: [01, 23, 45, 67, 89]
64,966 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,667 UART: cmd: 0x50000001
67,546 UART: dlen: 9
68,593 >>> mbox cmd response: success
69,060 UART: buf: [01, 23, 45, 67, 89]
73,697 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,400 UART: cmd: 0x60000000
76,279 UART: dlen: 16
77,807 UART: buf: [67452301, efcdab89]
81,354 UART: buf: [33221100, 77665544]
84,456 >>> mbox cmd response: success
84,714 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,406 UART: cmd: 0x60000000
87,336 UART: dlen: 13
88,809 UART: buf: [67452301, efcdab89]
92,295 UART: buf: [33221100, 00000044]
95,773 >>> mbox cmd response: success
96,058 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,757 UART: cmd: 0x60000000
98,649 UART: dlen: 12
100,135 UART: buf: [67452301, efcdab89]
103,630 UART: buf: [33221100, 00000000]
107,005 >>> mbox cmd response: success
107,273 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,959 UART: cmd: 0x60000000
109,840 UART: dlen: 0
110,888 >>> mbox cmd response: success
111,148 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,821 UART: cmd: 0x70000000
113,411 >>> mbox cmd response: success
113,665 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,347 UART: cmd: 0x60000000
116,247 UART: dlen: 5
117,736 UART: buf: [04050607, 00000003]
121,242 >>> mbox cmd response: success
121,504 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,190 UART: cmd: 0x80000000
123,783 >>> mbox cmd response: failed
124,082 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,768 UART: cmd: 0x60000000
126,644 UART: dlen: 5
128,134 UART: buf: [04050607, 00000003]
131,615 >>> mbox cmd response: success
131,867 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,549 UART: cmd: 0x90000000
134,429 UART: dlen: 8
135,918 UART: buf: [08070605]
137,946 >>> mbox cmd response: success
138,222 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,894 UART: cmd: 0xa0000000
140,462 >>> mbox cmd response data (4 bytes)
140,870 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,558 UART: cmd: 0xb0000000
143,442 UART: dlen: 6
144,923 UART: buf: [0c0d0e0f, 00000a0b]
148,481 >>> mbox cmd response data (2 bytes)
148,850 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,526 UART: cmd: 0xc0000000
151,194 >>> mbox cmd response data (9 bytes)
151,579 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,255 UART: cmd: 0xd0000000
153,816 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,465 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,606 UART: cmd: 0x50000000
19,423 UART: dlen: 8
20,499 >>> mbox cmd response: success
20,936 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,864 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,580 UART: cmd: 0x50000000
29,465 UART: dlen: 7
30,548 >>> mbox cmd response: success
30,979 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,063 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,773 UART: cmd: 0x50000000
39,641 UART: dlen: 0
42,074 UART: buf: [00000000 42,709 >>> mbox cmd response: success
, 00000000, 00000000, 00000000]
47,394 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,099 UART: cmd: 0x50000001
49,988 UART: dlen: 5
51,047 >>> mbox cmd response: success
51,535 UART: buf: [01, 23, 45, 67, 89]
56,176 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,875 UART: cmd: 0x50000001
58,752 UART: dlen: 6
59,798 >>> mbox cmd response: success
60,289 UART: buf: [01, 23, 45, 67, 89]
64,882 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,583 UART: cmd: 0x50000001
67,463 UART: dlen: 9
68,508 >>> mbox cmd response: success
68,978 UART: buf: [01, 23, 45, 67, 89]
73,615 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,321 UART: cmd: 0x60000000
76,200 UART: dlen: 16
77,682 UART: buf: [67452301, efcdab89]
81,238 UART: buf: [33221100, 77665544]
84,395 >>> mbox cmd response: success
84,653 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,371 UART: cmd: 0x60000000
87,303 UART: dlen: 13
88,732 UART: buf: [67452301, efcdab89]
92,238 UART: buf: [33221100, 00000044]
95,617 >>> mbox cmd response: success
95,876 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,563 UART: cmd: 0x60000000
98,440 UART: dlen: 12
99,916 UART: buf: [67452301, efcdab89]
103,413 UART: buf: [33221100, 00000000]
106,785 >>> mbox cmd response: success
107,042 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,717 UART: cmd: 0x60000000
109,591 UART: dlen: 0
110,627 >>> mbox cmd response: success
110,880 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,555 UART: cmd: 0x70000000
113,143 >>> mbox cmd response: success
113,401 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,103 UART: cmd: 0x60000000
115,986 UART: dlen: 5
117,474 UART: buf: [04050607, 00000003]
121,099 >>> mbox cmd response: success
121,379 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,057 UART: cmd: 0x80000000
123,608 >>> mbox cmd response: failed
123,906 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,589 UART: cmd: 0x60000000
126,465 UART: dlen: 5
127,956 UART: buf: [04050607, 00000003]
131,448 >>> mbox cmd response: success
131,701 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,381 UART: cmd: 0x90000000
134,304 UART: dlen: 8
135,738 UART: buf: [08070605]
137,782 >>> mbox cmd response: success
138,042 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,719 UART: cmd: 0xa0000000
140,324 >>> mbox cmd response data (4 bytes)
140,717 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,408 UART: cmd: 0xb0000000
143,295 UART: dlen: 6
144,777 UART: buf: [0c0d0e0f, 00000a0b]
148,332 >>> mbox cmd response data (2 bytes)
148,696 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,372 UART: cmd: 0xc0000000
151,035 >>> mbox cmd response data (9 bytes)
151,425 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,103 UART: cmd: 0xd0000000
153,665 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,801 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,783 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
22,252 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
22,023 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
22,537 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "70046fd650730e23f7a84d081f3df4a63ad6d71f2620a404c47dd2696c096ed8f28cf1113e5a05e60cefcfb5bbc03d74",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
22,405 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
22,626 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
22,533 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
22,685 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
22,861 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
22,519 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
22,520 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
22,733 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
22,548 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "227acc218b4218b357cbf9c015a8858c624290ecb6af97647f5da01439b7436ee2403fc9644d5c88f6932ff36ddfc1e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
11,770 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,092 UART: pcrbank::test_erase_all_pcrs...[ok]
21,205 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
11,544 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,872 UART: pcrbank::test_erase_all_pcrs...[ok]
21,018 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
12,134 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,415 UART: pcrbank::test_erase_all_pcrs...[ok]
21,583 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
12,086 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,387 UART: pcrbank::test_erase_all_pcrs...[ok]
21,505 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
11,519 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,862 UART: pcrbank::test_erase_all_pcrs...[ok]
21,016 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
11,600 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,932 UART: pcrbank::test_erase_all_pcrs...[ok]
21,078 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
11,856 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,205 UART: pcrbank::test_erase_all_pcrs...[ok]
21,322 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
11,766 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,072 UART: pcrbank::test_erase_all_pcrs...[ok]
21,207 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
11,592 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,865 UART: pcrbank::test_erase_all_pcrs...[ok]
21,047 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
11,600 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,950 UART: pcrbank::test_erase_all_pcrs...[ok]
21,091 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
11,937 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,215 UART: pcrbank::test_erase_all_pcrs...[ok]
21,397 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
12,041 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,329 UART: pcrbank::test_erase_all_pcrs...[ok]
21,471 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,820 writing to cptra_bootfsm_go
11,400 UART: persistent::test_persistent_data_layout...[ok]
14,971 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
11,428 UART: persistent::test_persistent_data_layout...[ok]
15,011 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,895 writing to cptra_bootfsm_go
12,556 UART: persistent::test_persistent_data_layout...[ok]
16,132 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
11,697 UART: persistent::test_persistent_data_layout...[ok]
15,272 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,463 writing to cptra_bootfsm_go
13,076 UART: persistent::test_persistent_data_layout...[ok]
16,723 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
11,345 UART: persistent::test_persistent_data_layout...[ok]
14,889 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
11,760 UART: persistent::test_persistent_data_layout...[ok]
15,321 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
11,812 UART: persistent::test_persistent_data_layout...[ok]
15,347 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
11,416 UART: persistent::test_persistent_data_layout...[ok]
15,011 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,812 writing to cptra_bootfsm_go
11,327 UART: persistent::test_persistent_data_layout...[ok]
14,867 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
11,618 UART: persistent::test_persistent_data_layout...[ok]
15,165 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
11,611 UART: persistent::test_persistent_data_layout...[ok]
15,254 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,806 writing to cptra_bootfsm_go
23,361 UART: sha1::test_kat...[ok]
36,475 UART: sha1::test_digest0...[ok]
50,129 UART: sha1::test_digest1...[ok]
64,207 UART: sha1::test_digest2...[ok]
85,646 UART: sha1::test_digest3...[ok]
107,655 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
22,180 UART: sha1::test_kat...[ok]
34,823 UART: sha1::test_digest0...[ok]
49,195 UART: sha1::test_digest1...[ok]
61,826 UART: sha1::test_digest2...[ok]
83,361 UART: sha1::test_digest3...[ok]
105,842 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
22,632 UART: sha1::test_kat...[ok]
36,397 UART: sha1::test_digest0...[ok]
50,222 UART: sha1::test_digest1...[ok]
64,327 UART: sha1::test_digest2...[ok]
87,228 UART: sha1::test_digest3...[ok]
108,212 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
22,680 UART: sha1::test_kat...[ok]
36,849 UART: sha1::test_digest0...[ok]
50,033 UART: sha1::test_digest1...[ok]
63,711 UART: sha1::test_digest2...[ok]
86,489 UART: sha1::test_digest3...[ok]
107,707 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
22,348 UART: sha1::test_kat...[ok]
34,315 UART: sha1::test_digest0...[ok]
48,176 UART: sha1::test_digest1...[ok]
61,563 UART: sha1::test_digest2...[ok]
83,360 UART: sha1::test_digest3...[ok]
104,418 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
22,711 UART: sha1::test_kat...[ok]
37,840 UART: sha1::test_digest0...[ok]
51,729 UART: sha1::test_digest1...[ok]
66,080 UART: sha1::test_digest2...[ok]
87,455 UART: sha1::test_digest3...[ok]
110,188 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
22,614 UART: sha1::test_kat...[ok]
36,227 UART: sha1::test_digest0...[ok]
48,662 UART: sha1::test_digest1...[ok]
61,367 UART: sha1::test_digest2...[ok]
83,087 UART: sha1::test_digest3...[ok]
105,167 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
22,732 UART: sha1::test_kat...[ok]
36,502 UART: sha1::test_digest0...[ok]
49,126 UART: sha1::test_digest1...[ok]
62,015 UART: sha1::test_digest2...[ok]
84,801 UART: sha1::test_digest3...[ok]
107,553 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
25,752 UART: sha1::test_kat...[ok]
40,098 UART: sha1::test_digest0...[ok]
53,895 UART: sha1::test_digest1...[ok]
67,558 UART: sha1::test_digest2...[ok]
89,890 UART: sha1::test_digest3...[ok]
112,338 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
22,318 UART: sha1::test_kat...[ok]
34,727 UART: sha1::test_digest0...[ok]
48,315 UART: sha1::test_digest1...[ok]
62,386 UART: sha1::test_digest2...[ok]
84,406 UART: sha1::test_digest3...[ok]
106,743 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
22,812 UART: sha1::test_kat...[ok]
36,731 UART: sha1::test_digest0...[ok]
51,707 UART: sha1::test_digest1...[ok]
66,142 UART: sha1::test_digest2...[ok]
88,825 UART: sha1::test_digest3...[ok]
110,124 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
22,616 UART: sha1::test_kat...[ok]
35,517 UART: sha1::test_digest0...[ok]
48,816 UART: sha1::test_digest1...[ok]
60,903 UART: sha1::test_digest2...[ok]
82,159 UART: sha1::test_digest3...[ok]
103,136 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
21,949 UART: sha256::test_kat...[ok]
26,424 UART: sha256::test_digest0...[ok]
30,950 UART: sha256::test_digest1...[ok]
35,472 UART: sha256::test_digest2...[ok]
41,021 UART: sha256::test_digest3...[ok]
46,446 UART: sha256::test_op0...[ok]
51,143 UART: sha256::test_op1...[ok]
55,699 UART: sha256::test_op2...[ok]
60,968 UART: sha256::test_op3...[ok]
69,859 UART: sha256::test_op4...[ok]
81,753 UART: sha256::test_op5...[ok]
65,235,054 UART: sha256::test_op6...[ok]
65,257,725 UART: sha256::test_op7...[ok]
65,273,805 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
22,181 UART: sha256::test_kat...[ok]
26,654 UART: sha256::test_digest0...[ok]
31,171 UART: sha256::test_digest1...[ok]
35,660 UART: sha256::test_digest2...[ok]
41,195 UART: sha256::test_digest3...[ok]
46,726 UART: sha256::test_op0...[ok]
51,357 UART: sha256::test_op1...[ok]
55,947 UART: sha256::test_op2...[ok]
61,182 UART: sha256::test_op3...[ok]
70,071 UART: sha256::test_op4...[ok]
81,975 UART: sha256::test_op5...[ok]
65,235,264 UART: sha256::test_op6...[ok]
65,257,953 UART: sha256::test_op7...[ok]
65,274,041 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,882 writing to cptra_bootfsm_go
23,044 UART: sha256::test_kat...[ok]
27,480 UART: sha256::test_digest0...[ok]
32,045 UART: sha256::test_digest1...[ok]
36,547 UART: sha256::test_digest2...[ok]
42,100 UART: sha256::test_digest3...[ok]
47,573 UART: sha256::test_op0...[ok]
52,208 UART: sha256::test_op1...[ok]
56,805 UART: sha256::test_op2...[ok]
62,048 UART: sha256::test_op3...[ok]
70,955 UART: sha256::test_op4...[ok]
82,902 UART: sha256::test_op5...[ok]
65,236,112 UART: sha256::test_op6...[ok]
65,258,802 UART: sha256::test_op7...[ok]
65,274,887 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c7331953f069905bf92038704e6ba4a5c485fbc3db2b04d4aaeea0bb6c9c4ecade387c13b7baf7d2553b8503a07c4df",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
22,290 UART: sha256::test_kat...[ok]
26,811 UART: sha256::test_digest0...[ok]
31,316 UART: sha256::test_digest1...[ok]
35,838 UART: sha256::test_digest2...[ok]
41,388 UART: sha256::test_digest3...[ok]
46,822 UART: sha256::test_op0...[ok]
51,509 UART: sha256::test_op1...[ok]
56,065 UART: sha256::test_op2...[ok]
61,335 UART: sha256::test_op3...[ok]
70,236 UART: sha256::test_op4...[ok]
82,089 UART: sha256::test_op5...[ok]
65,235,500 UART: sha256::test_op6...[ok]
65,258,098 UART: sha256::test_op7...[ok]
65,274,204 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
21,951 UART: sha256::test_kat...[ok]
26,360 UART: sha256::test_digest0...[ok]
30,818 UART: sha256::test_digest1...[ok]
35,244 UART: sha256::test_digest2...[ok]
40,776 UART: sha256::test_digest3...[ok]
46,157 UART: sha256::test_op0...[ok]
50,714 UART: sha256::test_op1...[ok]
55,260 UART: sha256::test_op2...[ok]
60,428 UART: sha256::test_op3...[ok]
69,294 UART: sha256::test_op4...[ok]
81,072 UART: sha256::test_op5...[ok]
64,968,758 UART: sha256::test_op6...[ok]
64,991,240 UART: sha256::test_op7...[ok]
65,007,202 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
21,872 UART: sha256::test_kat...[ok]
26,274 UART: sha256::test_digest0...[ok]
30,734 UART: sha256::test_digest1...[ok]
35,211 UART: sha256::test_digest2...[ok]
40,663 UART: sha256::test_digest3...[ok]
46,073 UART: sha256::test_op0...[ok]
50,628 UART: sha256::test_op1...[ok]
55,186 UART: sha256::test_op2...[ok]
60,332 UART: sha256::test_op3...[ok]
69,181 UART: sha256::test_op4...[ok]
81,003 UART: sha256::test_op5...[ok]
64,968,675 UART: sha256::test_op6...[ok]
64,991,158 UART: sha256::test_op7...[ok]
65,007,108 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
22,237 UART: sha256::test_kat...[ok]
26,688 UART: sha256::test_digest0...[ok]
31,118 UART: sha256::test_digest1...[ok]
35,537 UART: sha256::test_digest2...[ok]
41,061 UART: sha256::test_digest3...[ok]
46,445 UART: sha256::test_op0...[ok]
50,979 UART: sha256::test_op1...[ok]
55,557 UART: sha256::test_op2...[ok]
60,715 UART: sha256::test_op3...[ok]
69,544 UART: sha256::test_op4...[ok]
81,403 UART: sha256::test_op5...[ok]
64,969,022 UART: sha256::test_op6...[ok]
64,991,511 UART: sha256::test_op7...[ok]
65,007,524 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
22,294 UART: sha256::test_kat...[ok]
26,749 UART: sha256::test_digest0...[ok]
31,202 UART: sha256::test_digest1...[ok]
35,646 UART: sha256::test_digest2...[ok]
41,129 UART: sha256::test_digest3...[ok]
46,557 UART: sha256::test_op0...[ok]
51,114 UART: sha256::test_op1...[ok]
55,606 UART: sha256::test_op2...[ok]
60,794 UART: sha256::test_op3...[ok]
69,625 UART: sha256::test_op4...[ok]
81,446 UART: sha256::test_op5...[ok]
64,969,182 UART: sha256::test_op6...[ok]
64,991,606 UART: sha256::test_op7...[ok]
65,007,577 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
21,848 UART: sha256::test_kat...[ok]
26,274 UART: sha256::test_digest0...[ok]
30,718 UART: sha256::test_digest1...[ok]
35,145 UART: sha256::test_digest2...[ok]
40,627 UART: sha256::test_digest3...[ok]
46,153 UART: sha256::test_op0...[ok]
50,624 UART: sha256::test_op1...[ok]
55,141 UART: sha256::test_op2...[ok]
60,311 UART: sha256::test_op3...[ok]
69,211 UART: sha256::test_op4...[ok]
80,985 UART: sha256::test_op5...[ok]
64,968,676 UART: sha256::test_op6...[ok]
64,991,128 UART: sha256::test_op7...[ok]
65,007,143 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
21,926 UART: sha256::test_kat...[ok]
26,347 UART: sha256::test_digest0...[ok]
30,796 UART: sha256::test_digest1...[ok]
35,221 UART: sha256::test_digest2...[ok]
40,711 UART: sha256::test_digest3...[ok]
46,124 UART: sha256::test_op0...[ok]
50,713 UART: sha256::test_op1...[ok]
55,224 UART: sha256::test_op2...[ok]
60,409 UART: sha256::test_op3...[ok]
69,238 UART: sha256::test_op4...[ok]
81,042 UART: sha256::test_op5...[ok]
64,968,739 UART: sha256::test_op6...[ok]
64,991,210 UART: sha256::test_op7...[ok]
65,007,158 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
22,294 UART: sha256::test_kat...[ok]
26,738 UART: sha256::test_digest0...[ok]
31,170 UART: sha256::test_digest1...[ok]
35,660 UART: sha256::test_digest2...[ok]
41,095 UART: sha256::test_digest3...[ok]
46,505 UART: sha256::test_op0...[ok]
51,064 UART: sha256::test_op1...[ok]
55,621 UART: sha256::test_op2...[ok]
60,769 UART: sha256::test_op3...[ok]
69,609 UART: sha256::test_op4...[ok]
81,431 UART: sha256::test_op5...[ok]
64,969,026 UART: sha256::test_op6...[ok]
64,991,583 UART: sha256::test_op7...[ok]
65,007,540 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
22,350 UART: sha256::test_kat...[ok]
26,779 UART: sha256::test_digest0...[ok]
31,224 UART: sha256::test_digest1...[ok]
35,710 UART: sha256::test_digest2...[ok]
41,179 UART: sha256::test_digest3...[ok]
46,565 UART: sha256::test_op0...[ok]
51,112 UART: sha256::test_op1...[ok]
55,662 UART: sha256::test_op2...[ok]
60,834 UART: sha256::test_op3...[ok]
69,660 UART: sha256::test_op4...[ok]
81,494 UART: sha256::test_op5...[ok]
64,969,134 UART: sha256::test_op6...[ok]
64,991,641 UART: sha256::test_op7...[ok]
65,007,640 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
21,363 UART: sha2_512_384acc::test_kat...[ok]
26,133 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,230 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,020 UART: sha2_512_384acc::test_digest0...[ok]
1,071,308 UART: sha2_512_384acc::test_digest1...[ok]
1,079,250 UART: sha2_512_384acc::test_digest2...[ok]
1,087,307 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
21,497 UART: sha2_512_384acc::test_kat...[ok]
26,246 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,375 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,194 UART: sha2_512_384acc::test_digest0...[ok]
1,071,457 UART: sha2_512_384acc::test_digest1...[ok]
1,079,408 UART: sha2_512_384acc::test_digest2...[ok]
1,087,453 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
21,864 UART: sha2_512_384acc::test_kat...[ok]
26,605 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,736 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,552 UART: sha2_512_384acc::test_digest0...[ok]
1,071,824 UART: sha2_512_384acc::test_digest1...[ok]
1,079,734 UART: sha2_512_384acc::test_digest2...[ok]
1,087,784 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
21,824 UART: sha2_512_384acc::test_kat...[ok]
26,535 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,694 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,504 UART: sha2_512_384acc::test_digest0...[ok]
1,071,800 UART: sha2_512_384acc::test_digest1...[ok]
1,079,707 UART: sha2_512_384acc::test_digest2...[ok]
1,087,750 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
21,515 UART: sha2_512_384acc::test_kat...[ok]
26,241 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,387 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,206 UART: sha2_512_384acc::test_digest0...[ok]
1,071,472 UART: sha2_512_384acc::test_digest1...[ok]
1,079,452 UART: sha2_512_384acc::test_digest2...[ok]
1,087,427 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
21,604 UART: sha2_512_384acc::test_kat...[ok]
26,297 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,495 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,285 UART: sha2_512_384acc::test_digest0...[ok]
1,071,547 UART: sha2_512_384acc::test_digest1...[ok]
1,079,490 UART: sha2_512_384acc::test_digest2...[ok]
1,087,528 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,975 writing to cptra_bootfsm_go
22,467 UART: sha2_512_384acc::test_kat...[ok]
27,199 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,057,311 UART: sha2_512_384acc::test_digest_offset...[ok]
1,065,118 UART: sha2_512_384acc::test_digest0...[ok]
1,072,393 UART: sha2_512_384acc::test_digest1...[ok]
1,080,343 UART: sha2_512_384acc::test_digest2...[ok]
1,088,394 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
21,842 UART: sha2_512_384acc::test_kat...[ok]
26,534 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,708 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,492 UART: sha2_512_384acc::test_digest0...[ok]
1,071,796 UART: sha2_512_384acc::test_digest1...[ok]
1,079,704 UART: sha2_512_384acc::test_digest2...[ok]
1,087,758 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
21,534 UART: sha2_512_384acc::test_kat...[ok]
26,298 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,428 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,200 UART: sha2_512_384acc::test_digest0...[ok]
1,071,498 UART: sha2_512_384acc::test_digest1...[ok]
1,079,446 UART: sha2_512_384acc::test_digest2...[ok]
1,087,492 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
21,488 UART: sha2_512_384acc::test_kat...[ok]
26,264 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,367 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,189 UART: sha2_512_384acc::test_digest0...[ok]
1,071,463 UART: sha2_512_384acc::test_digest1...[ok]
1,079,408 UART: sha2_512_384acc::test_digest2...[ok]
1,087,459 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
21,843 UART: sha2_512_384acc::test_kat...[ok]
26,552 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,710 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,488 UART: sha2_512_384acc::test_digest0...[ok]
1,071,786 UART: sha2_512_384acc::test_digest1...[ok]
1,079,694 UART: sha2_512_384acc::test_digest2...[ok]
1,087,747 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
21,643 UART: sha2_512_384acc::test_kat...[ok]
26,392 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,532 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,304 UART: sha2_512_384acc::test_digest0...[ok]
1,071,593 UART: sha2_512_384acc::test_digest1...[ok]
1,079,568 UART: sha2_512_384acc::test_digest2...[ok]
1,087,583 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
24,709 UART: sha384::test_kat...[ok]
33,064 UART: sha384::test_digest0...[ok]
41,952 UART: sha384::test_digest1...[ok]
50,398 UART: sha384::test_digest2...[ok]
61,164 UART: sha384::test_digest3...[ok]
72,641 UART: sha384::test_op0...[ok]
79,517 UART: sha384::test_op1...[ok]
86,385 UART: sha384::test_op2...[ok]
94,183 UART: sha384::test_op3...[ok]
105,005 UART: sha384::test_op4...[ok]
121,008 UART: sha384::test_op5...[ok]
69,348,686 UART: sha384::test_op6...[ok]
69,379,523 UART: sha384::test_op7...[ok]
69,410,211 UART: sha384::test_op8...[ok]
69,439,640 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,964 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,581 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,242 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
24,382 UART: sha384::test_kat...[ok]
32,690 UART: sha384::test_digest0...[ok]
40,167 UART: sha384::test_digest1...[ok]
48,470 UART: sha384::test_digest2...[ok]
58,251 UART: sha384::test_digest3...[ok]
70,389 UART: sha384::test_op0...[ok]
77,341 UART: sha384::test_op1...[ok]
84,208 UART: sha384::test_op2...[ok]
91,968 UART: sha384::test_op3...[ok]
102,848 UART: sha384::test_op4...[ok]
118,827 UART: sha384::test_op5...[ok]
69,346,469 UART: sha384::test_op6...[ok]
69,377,317 UART: sha384::test_op7...[ok]
69,407,986 UART: sha384::test_op8...[ok]
69,437,393 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,738 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,373 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,047 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
24,652 UART: sha384::test_kat...[ok]
32,972 UART: sha384::test_digest0...[ok]
40,946 UART: sha384::test_digest1...[ok]
48,927 UART: sha384::test_digest2...[ok]
58,133 UART: sha384::test_digest3...[ok]
69,387 UART: sha384::test_op0...[ok]
76,351 UART: sha384::test_op1...[ok]
83,195 UART: sha384::test_op2...[ok]
90,993 UART: sha384::test_op3...[ok]
101,840 UART: sha384::test_op4...[ok]
117,834 UART: sha384::test_op5...[ok]
69,345,382 UART: sha384::test_op6...[ok]
69,376,360 UART: sha384::test_op7...[ok]
69,407,017 UART: sha384::test_op8...[ok]
69,436,411 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,735 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,389 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,051 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
24,770 UART: sha384::test_kat...[ok]
31,750 UART: sha384::test_digest0...[ok]
40,321 UART: sha384::test_digest1...[ok]
49,018 UART: sha384::test_digest2...[ok]
56,712 UART: sha384::test_digest3...[ok]
68,742 UART: sha384::test_op0...[ok]
75,645 UART: sha384::test_op1...[ok]
82,518 UART: sha384::test_op2...[ok]
90,328 UART: sha384::test_op3...[ok]
101,139 UART: sha384::test_op4...[ok]
117,135 UART: sha384::test_op5...[ok]
69,344,837 UART: sha384::test_op6...[ok]
69,375,672 UART: sha384::test_op7...[ok]
69,406,327 UART: sha384::test_op8...[ok]
69,435,717 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,056 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,707 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,376 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
24,336 UART: sha384::test_kat...[ok]
32,093 UART: sha384::test_digest0...[ok]
40,149 UART: sha384::test_digest1...[ok]
48,852 UART: sha384::test_digest2...[ok]
57,850 UART: sha384::test_digest3...[ok]
68,083 UART: sha384::test_op0...[ok]
74,953 UART: sha384::test_op1...[ok]
81,847 UART: sha384::test_op2...[ok]
89,654 UART: sha384::test_op3...[ok]
100,452 UART: sha384::test_op4...[ok]
116,452 UART: sha384::test_op5...[ok]
69,344,037 UART: sha384::test_op6...[ok]
69,375,014 UART: sha384::test_op7...[ok]
69,405,642 UART: sha384::test_op8...[ok]
69,435,032 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,388 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,027 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,484,703 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
24,360 UART: sha384::test_kat...[ok]
31,354 UART: sha384::test_digest0...[ok]
40,963 UART: sha384::test_digest1...[ok]
49,272 UART: sha384::test_digest2...[ok]
57,033 UART: sha384::test_digest3...[ok]
68,998 UART: sha384::test_op0...[ok]
75,939 UART: sha384::test_op1...[ok]
82,845 UART: sha384::test_op2...[ok]
90,607 UART: sha384::test_op3...[ok]
101,451 UART: sha384::test_op4...[ok]
117,461 UART: sha384::test_op5...[ok]
69,345,054 UART: sha384::test_op6...[ok]
69,375,986 UART: sha384::test_op7...[ok]
69,406,640 UART: sha384::test_op8...[ok]
69,436,029 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,356 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,008 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,657 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
24,627 UART: sha384::test_kat...[ok]
34,025 UART: sha384::test_digest0...[ok]
44,000 UART: sha384::test_digest1...[ok]
53,453 UART: sha384::test_digest2...[ok]
61,908 UART: sha384::test_digest3...[ok]
73,658 UART: sha384::test_op0...[ok]
80,552 UART: sha384::test_op1...[ok]
87,416 UART: sha384::test_op2...[ok]
95,205 UART: sha384::test_op3...[ok]
106,035 UART: sha384::test_op4...[ok]
122,094 UART: sha384::test_op5...[ok]
69,349,795 UART: sha384::test_op6...[ok]
69,380,610 UART: sha384::test_op7...[ok]
69,411,248 UART: sha384::test_op8...[ok]
69,440,637 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,458,961 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,474,626 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,490,285 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
24,920 UART: sha384::test_kat...[ok]
33,065 UART: sha384::test_digest0...[ok]
42,697 UART: sha384::test_digest1...[ok]
51,008 UART: sha384::test_digest2...[ok]
59,510 UART: sha384::test_digest3...[ok]
70,668 UART: sha384::test_op0...[ok]
77,586 UART: sha384::test_op1...[ok]
84,473 UART: sha384::test_op2...[ok]
92,267 UART: sha384::test_op3...[ok]
103,089 UART: sha384::test_op4...[ok]
119,158 UART: sha384::test_op5...[ok]
69,346,820 UART: sha384::test_op6...[ok]
69,377,652 UART: sha384::test_op7...[ok]
69,408,259 UART: sha384::test_op8...[ok]
69,437,728 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,013 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,662 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,325 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
24,388 UART: sha384::test_kat...[ok]
33,525 UART: sha384::test_digest0...[ok]
43,116 UART: sha384::test_digest1...[ok]
51,698 UART: sha384::test_digest2...[ok]
61,236 UART: sha384::test_digest3...[ok]
72,920 UART: sha384::test_op0...[ok]
79,886 UART: sha384::test_op1...[ok]
86,726 UART: sha384::test_op2...[ok]
94,510 UART: sha384::test_op3...[ok]
105,377 UART: sha384::test_op4...[ok]
121,371 UART: sha384::test_op5...[ok]
69,349,074 UART: sha384::test_op6...[ok]
69,379,877 UART: sha384::test_op7...[ok]
69,410,528 UART: sha384::test_op8...[ok]
69,439,933 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,458,267 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,931 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,581 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,842 writing to cptra_bootfsm_go
24,352 UART: sha384::test_kat...[ok]
31,266 UART: sha384::test_digest0...[ok]
40,758 UART: sha384::test_digest1...[ok]
49,252 UART: sha384::test_digest2...[ok]
57,343 UART: sha384::test_digest3...[ok]
68,679 UART: sha384::test_op0...[ok]
75,545 UART: sha384::test_op1...[ok]
82,434 UART: sha384::test_op2...[ok]
90,223 UART: sha384::test_op3...[ok]
101,617 UART: sha384::test_op4...[ok]
117,071 UART: sha384::test_op5...[ok]
69,344,705 UART: sha384::test_op6...[ok]
69,375,606 UART: sha384::test_op7...[ok]
69,406,253 UART: sha384::test_op8...[ok]
69,435,656 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,990 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,659 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,303 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
24,770 UART: sha384::test_kat...[ok]
34,472 UART: sha384::test_digest0...[ok]
42,136 UART: sha384::test_digest1...[ok]
50,892 UART: sha384::test_digest2...[ok]
59,611 UART: sha384::test_digest3...[ok]
72,408 UART: sha384::test_op0...[ok]
79,279 UART: sha384::test_op1...[ok]
86,173 UART: sha384::test_op2...[ok]
93,966 UART: sha384::test_op3...[ok]
104,789 UART: sha384::test_op4...[ok]
120,850 UART: sha384::test_op5...[ok]
69,348,500 UART: sha384::test_op6...[ok]
69,379,350 UART: sha384::test_op7...[ok]
69,409,990 UART: sha384::test_op8...[ok]
69,439,384 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,709 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,373 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,026 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
24,687 UART: sha384::test_kat...[ok]
32,367 UART: sha384::test_digest0...[ok]
40,286 UART: sha384::test_digest1...[ok]
49,474 UART: sha384::test_digest2...[ok]
58,285 UART: sha384::test_digest3...[ok]
69,628 UART: sha384::test_op0...[ok]
76,521 UART: sha384::test_op1...[ok]
83,414 UART: sha384::test_op2...[ok]
91,208 UART: sha384::test_op3...[ok]
102,026 UART: sha384::test_op4...[ok]
118,043 UART: sha384::test_op5...[ok]
69,345,731 UART: sha384::test_op6...[ok]
69,376,599 UART: sha384::test_op7...[ok]
69,407,239 UART: sha384::test_op8...[ok]
69,436,634 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,965 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,617 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,285 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
13,769 UART: status_reporter::test_report_boot_status...[ok]
17,610 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,639 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
13,925 UART: status_reporter::test_report_boot_status...[ok]
17,749 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,852 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
14,149 UART: status_reporter::test_report_boot_status...[ok]
17,965 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,062 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
14,206 UART: status_reporter::test_report_boot_status...[ok]
17,964 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,068 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
13,845 UART: status_reporter::test_report_boot_status...[ok]
17,630 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,739 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
13,845 UART: status_reporter::test_report_boot_status...[ok]
17,715 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,745 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
14,205 UART: status_reporter::test_report_boot_status...[ok]
18,046 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,093 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
14,271 UART: status_reporter::test_report_boot_status...[ok]
18,111 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,160 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
13,760 UART: status_reporter::test_report_boot_status...[ok]
17,572 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,657 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
13,820 UART: status_reporter::test_report_boot_status...[ok]
17,625 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,668 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
14,239 UART: status_reporter::test_report_boot_status...[ok]
18,088 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,153 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
14,167 UART: status_reporter::test_report_boot_status...[ok]
17,979 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,045 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
3,146 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,791 >>> mbox cmd response data (48 bytes)
18,449 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,203 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
3,230 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,447 >>> mbox cmd response data (48 bytes)
18,091 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,803 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
3,274 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,268 >>> mbox cmd response data (48 bytes)
17,944 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,661 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,488 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,934 >>> mbox cmd response data (48 bytes)
18,615 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,729 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
3,281 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
16,919 >>> mbox cmd response data (48 bytes)
17,559 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,328 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,250 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
18,178 >>> mbox cmd response data (48 bytes)
18,827 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,540 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,667 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,146 >>> mbox cmd response data (48 bytes)
424,893 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,073 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
4,155 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,462 >>> mbox cmd response data (48 bytes)
425,193 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,366 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,537 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,646 >>> mbox cmd response data (48 bytes)
424,385 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,556 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,744 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,911 >>> mbox cmd response data (48 bytes)
424,668 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,845 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
3,923 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
424,183 >>> mbox cmd response data (48 bytes)
424,943 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
426,112 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,585 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,888 >>> mbox cmd response data (48 bytes)
424,634 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,801 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,783 writing to cptra_bootfsm_go
3,374 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,788 writing to cptra_bootfsm_go
3,387 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,756 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,887 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,804 writing to cptra_bootfsm_go
3,385 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,404 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,732 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,805 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,786 writing to cptra_bootfsm_go
3,434 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,798 writing to cptra_bootfsm_go
3,386 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,671 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,757 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fb530000ed0`,
right: `0x7fb530000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fe31c000ed0`,
right: `0x7fe31c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7ffa10000ed0`,
right: `0x7ffa10000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f24ac000ed0`,
right: `0x7f24ac000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fb420000ed0`,
right: `0x7fb420000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fb41c000ed0`,
right: `0x7fb41c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fbf84000ed0`,
right: `0x7fbf84000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f7eb4000ed0`,
right: `0x7f7eb4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fefc4000ed0`,
right: `0x7fefc4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fb618000ed0`,
right: `0x7fb618000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f3c64000ed0`,
right: `0x7f3c64000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f2890000ed0`,
right: `0x7f2890000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.08s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.04s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 26 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.42s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.48s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.54s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.35s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.43s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.47s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.39s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.53s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.34s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.06s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.05s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.20s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.19s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.03s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.01s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 134 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.01s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,114 UART:
192,474 UART: Running Caliptra ROM ...
193,643 UART:
193,789 UART: [state] CFI Enabled
263,687 UART: [state] LifecycleState = Unprovisioned
265,655 UART: [state] DebugLocked = No
268,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,685 UART: [kat] SHA2-256
442,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,860 UART: [kat] ++
453,457 UART: [kat] sha1
464,494 UART: [kat] SHA2-256
467,208 UART: [kat] SHA2-384
473,187 UART: [kat] SHA2-512-ACC
475,566 UART: [kat] ECC-384
2,767,299 UART: [kat] HMAC-384Kdf
2,799,140 UART: [kat] LMS
3,989,438 UART: [kat] --
3,994,772 UART: [cold-reset] ++
3,996,627 UART: [fht] Storing FHT @ 0x50003400
4,008,097 UART: [idev] ++
4,008,662 UART: [idev] CDI.KEYID = 6
4,009,572 UART: [idev] SUBJECT.KEYID = 7
4,010,812 UART: [idev] UDS.KEYID = 0
4,011,796 ready_for_fw is high
4,011,986 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,052,044 UART: [idev] Erasing UDS.KEYID = 0
7,343,002 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,909 UART: [idev] --
7,368,890 UART: [ldev] ++
7,369,471 UART: [ldev] CDI.KEYID = 6
7,370,453 UART: [ldev] SUBJECT.KEYID = 5
7,371,610 UART: [ldev] AUTHORITY.KEYID = 7
7,372,891 UART: [ldev] FE.KEYID = 1
7,421,122 UART: [ldev] Erasing FE.KEYID = 1
10,755,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,716 UART: [ldev] --
13,136,080 UART: [fwproc] Waiting for Commands...
13,139,312 UART: [fwproc] Received command 0x46574c44
13,141,543 UART: [fwproc] Received Image of size 31676 bytes
16,186,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,261,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,330,821 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,359,548 >>> mbox cmd response: success
16,363,651 UART: [afmc] ++
16,364,260 UART: [afmc] CDI.KEYID = 6
16,365,201 UART: [afmc] SUBJECT.KEYID = 7
16,366,469 UART: [afmc] AUTHORITY.KEYID = 5
19,729,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,028,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,031,172 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,045,553 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,060,424 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,074,956 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,095,183 UART: [afmc] --
22,098,975 UART: [cold-reset] --
22,101,733 UART: [state] Locking Datavault
22,105,508 UART: [state] Locking PCR0, PCR1 and PCR31
22,107,263 UART: [state] Locking ICCM
22,109,132 UART: [exit] Launching FMC @ 0x40000130
22,117,513 UART:
22,117,766 UART: Running Caliptra FMC ...
22,118,892 UART:
22,119,055 UART: [state] CFI Enabled
22,188,664 UART: [fht] FMC Alias Private Key: 7
24,526,737 UART: [art] Extend RT PCRs Done
24,527,993 UART: [art] Lock RT PCRs Done
24,529,475 UART: [art] Populate DV Done
24,534,640 UART: [fht] FMC Alias Private Key: 7
24,536,359 UART: [art] Derive CDI
24,537,120 UART: [art] Store in in slot 0x4
24,596,678 UART: [art] Derive Key Pair
24,597,775 UART: [art] Store priv key in slot 0x5
27,890,205 UART: [art] Derive Key Pair - Done
27,903,470 UART: [art] Signing Cert with AUTHO
27,904,823 UART: RITY.KEYID = 7
30,192,426 UART: [art] Erasing AUTHORITY.KEYID = 7
30,193,978 UART: [art] PUB.X = 77EA6F71960E3C779F160314ABA4ADBC100A94DA34A2B97E6DB46AB01AC0853FCDFF3336A533165231E5D14D9A5F72A5
30,201,194 UART: [art] PUB.Y = 3A7526AC7C40B3E9E9E05776EBF6FAFB18C5D802690A2A3FE5094471544E3C86BE797778C10C53E7FA8826EE385297D8
30,208,420 UART: [art] SIG.R = 3D55EB5CDBBD38EA40D194E65B129DDBE4A312518782866CC27F6E4331428ECDDED7489F0D9B767C93B945C04EDF30B2
30,215,817 UART: [art] SIG.S = 21A02DE1CAAF2587299E64E9774EF10CEAAC49EF41738F136BDCA6237B4F5D606CF7352236CF60449530038972683D8B
31,520,094 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,784,901 ready_for_fw is high
3,785,508 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,174,648 >>> mbox cmd response: success
21,864,457 UART:
21,864,843 UART: Running Caliptra FMC ...
21,865,959 UART:
21,866,103 UART: [state] CFI Enabled
21,931,327 UART: [fht] FMC Alias Private Key: 7
24,269,393 UART: [art] Extend RT PCRs Done
24,270,683 UART: [art] Lock RT PCRs Done
24,271,993 UART: [art] Populate DV Done
24,277,415 UART: [fht] FMC Alias Private Key: 7
24,278,912 UART: [art] Derive CDI
24,279,712 UART: [art] Store in in slot 0x4
24,338,868 UART: [art] Derive Key Pair
24,339,907 UART: [art] Store priv key in slot 0x5
27,632,506 UART: [art] Derive Key Pair - Done
27,645,362 UART: [art] Signing Cert with AUTHO
27,646,698 UART: RITY.KEYID = 7
29,934,478 UART: [art] Erasing AUTHORITY.KEYID = 7
29,936,029 UART: [art] PUB.X = D57DCAAB2DF92E67954CE43BDB9D01E563AAFEF6DFAD754A8AA7AEAE3D2E70A01A188C7319C1926770768C7984137857
29,943,213 UART: [art] PUB.Y = FF2492048713DD6C6AD63F56F51E8DF8E3EE0336C9CE1B5BF53D59EABA3060216BDC7B5DBF02CC14CB4B22EC19A3A4EC
29,950,536 UART: [art] SIG.R = 2BD547B9DFB537B3055CA382803284FADB11CCCD097ECF516402DFD6DE243B5BE53C795247CC7D7D1D667F49EA7BCF71
29,957,970 UART: [art] SIG.S = A187CEA30EA69D8C56426CAB3AC6BDE3E741CEE639A15919A4D7622B4EE0D42EC4F2186572F2E827B360A0117931957D
31,262,168 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,413 UART:
192,764 UART: Running Caliptra ROM ...
193,939 UART:
603,599 UART: [state] CFI Enabled
617,917 UART: [state] LifecycleState = Unprovisioned
619,853 UART: [state] DebugLocked = No
622,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,179 UART: [kat] SHA2-256
795,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,461 UART: [kat] ++
806,982 UART: [kat] sha1
817,925 UART: [kat] SHA2-256
820,656 UART: [kat] SHA2-384
827,424 UART: [kat] SHA2-512-ACC
829,787 UART: [kat] ECC-384
3,114,544 UART: [kat] HMAC-384Kdf
3,125,295 UART: [kat] LMS
4,315,420 UART: [kat] --
4,320,647 UART: [cold-reset] ++
4,321,869 UART: [fht] Storing FHT @ 0x50003400
4,333,056 UART: [idev] ++
4,333,642 UART: [idev] CDI.KEYID = 6
4,334,673 UART: [idev] SUBJECT.KEYID = 7
4,335,850 UART: [idev] UDS.KEYID = 0
4,336,841 ready_for_fw is high
4,337,030 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,376,956 UART: [idev] Erasing UDS.KEYID = 0
7,622,209 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,997 UART: [idev] --
7,649,411 UART: [ldev] ++
7,650,031 UART: [ldev] CDI.KEYID = 6
7,650,966 UART: [ldev] SUBJECT.KEYID = 5
7,652,177 UART: [ldev] AUTHORITY.KEYID = 7
7,653,462 UART: [ldev] FE.KEYID = 1
7,664,075 UART: [ldev] Erasing FE.KEYID = 1
10,950,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,269 UART: [ldev] --
13,312,453 UART: [fwproc] Waiting for Commands...
13,315,628 UART: [fwproc] Received command 0x46574c44
13,317,863 UART: [fwproc] Received Image of size 31676 bytes
16,358,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,434,094 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,503,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,530,862 >>> mbox cmd response: success
16,535,186 UART: [afmc] ++
16,535,798 UART: [afmc] CDI.KEYID = 6
16,536,735 UART: [afmc] SUBJECT.KEYID = 7
16,538,009 UART: [afmc] AUTHORITY.KEYID = 5
19,848,498 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,142,214 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,144,524 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,158,846 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,173,664 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,188,107 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,209,484 UART: [afmc] --
22,213,957 UART: [cold-reset] --
22,218,032 UART: [state] Locking Datavault
22,222,074 UART: [state] Locking PCR0, PCR1 and PCR31
22,223,827 UART: [state] Locking ICCM
22,225,857 UART: [exit] Launching FMC @ 0x40000130
22,234,261 UART:
22,234,548 UART: Running Caliptra FMC ...
22,235,602 UART:
22,235,750 UART: [state] CFI Enabled
22,244,150 UART: [fht] FMC Alias Private Key: 7
24,575,191 UART: [art] Extend RT PCRs Done
24,576,471 UART: [art] Lock RT PCRs Done
24,578,009 UART: [art] Populate DV Done
24,583,183 UART: [fht] FMC Alias Private Key: 7
24,584,909 UART: [art] Derive CDI
24,585,754 UART: [art] Store in in slot 0x4
24,628,165 UART: [art] Derive Key Pair
24,629,188 UART: [art] Store priv key in slot 0x5
27,871,283 UART: [art] Derive Key Pair - Done
27,884,432 UART: [art] Signing Cert with AUTHO
27,885,768 UART: RITY.KEYID = 7
30,165,285 UART: [art] Erasing AUTHORITY.KEYID = 7
30,166,838 UART: [art] PUB.X = 4C85B11B116227F8D7AD656BB92186651B07151C250937279C2A44B2D4C6BC9895CA4401271D66C55F27C26AF113767C
30,173,963 UART: [art] PUB.Y = AAF988169CF0B4106186A368A1A4F2E19E938ACE679986C14D730FA57E57F9832BD552A85125A998687A50C90742340E
30,181,185 UART: [art] SIG.R = 7F90EE0A877F89074025E625C93796D872216446505B457D31FE07DDA46D9E9B0770B46F6BB569B5B9819C253F31F848
30,188,580 UART: [art] SIG.S = 49FF5A1ED38E1AA380DDC5EF17600633290C97D7C372E9FE0F65687B8349CDF1D97FCBB703137D7549BCF3519A0594D9
31,493,093 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
4,128,211 ready_for_fw is high
4,128,969 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,398,241 >>> mbox cmd response: success
22,037,078 UART:
22,037,503 UART: Running Caliptra FMC ...
22,038,650 UART:
22,038,808 UART: [state] CFI Enabled
22,046,773 UART: [fht] FMC Alias Private Key: 7
24,377,531 UART: [art] Extend RT PCRs Done
24,378,797 UART: [art] Lock RT PCRs Done
24,380,477 UART: [art] Populate DV Done
24,385,720 UART: [fht] FMC Alias Private Key: 7
24,387,249 UART: [art] Derive CDI
24,388,036 UART: [art] Store in in slot 0x4
24,430,723 UART: [art] Derive Key Pair
24,431,753 UART: [art] Store priv key in slot 0x5
27,673,537 UART: [art] Derive Key Pair - Done
27,686,478 UART: [art] Signing Cert with AUTHO
27,687,823 UART: RITY.KEYID = 7
29,967,198 UART: [art] Erasing AUTHORITY.KEYID = 7
29,968,757 UART: [art] PUB.X = 4665BA801894EE3F52656B3C46E90CC80760C264351BCDE3CB6F8DE4262CE251F5FCFCD6E1784720B65B3D01A63ED6CC
29,976,036 UART: [art] PUB.Y = 186DE27C9C4CE37A3F7733574866F450E34CA854731E7C161A09BFB1F3B9BF45814B5EA6B79F9073CA1FB45365512101
29,983,176 UART: [art] SIG.R = 0B63D500A0F559D3375BC94323BE04361F9718894B8F65C465297E5407DDC3F4CBE1909EA642616D8C99D6B949DDDF0F
29,990,584 UART: [art] SIG.S = 7B31523DF73C984D5B7726F9B63597557E5267B583507FCE80290F23EB1407EDDC51DF5F111898125C99D7208076A804
31,295,495 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,046 UART:
192,406 UART: Running Caliptra ROM ...
193,589 UART:
193,739 UART: [state] CFI Enabled
265,496 UART: [state] LifecycleState = Unprovisioned
267,392 UART: [state] DebugLocked = No
269,993 UART: [state] WD Timer not started. Device not locked for debugging
273,250 UART: [kat] SHA2-256
452,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,982 UART: [kat] ++
464,425 UART: [kat] sha1
475,432 UART: [kat] SHA2-256
478,441 UART: [kat] SHA2-384
486,081 UART: [kat] SHA2-512-ACC
489,013 UART: [kat] ECC-384
2,949,733 UART: [kat] HMAC-384Kdf
2,973,179 UART: [kat] LMS
3,502,651 UART: [kat] --
3,506,481 UART: [cold-reset] ++
3,508,707 UART: [fht] FHT @ 0x50003400
3,519,820 UART: [idev] ++
3,520,382 UART: [idev] CDI.KEYID = 6
3,521,298 UART: [idev] SUBJECT.KEYID = 7
3,522,543 UART: [idev] UDS.KEYID = 0
3,523,466 ready_for_fw is high
3,523,692 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,564,189 UART: [idev] Erasing UDS.KEYID = 0
6,030,280 UART: [idev] Sha1 KeyId Algorithm
6,053,639 UART: [idev] --
6,058,420 UART: [ldev] ++
6,058,994 UART: [ldev] CDI.KEYID = 6
6,059,920 UART: [ldev] SUBJECT.KEYID = 5
6,061,078 UART: [ldev] AUTHORITY.KEYID = 7
6,062,313 UART: [ldev] FE.KEYID = 1
6,103,132 UART: [ldev] Erasing FE.KEYID = 1
8,607,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,281 UART: [ldev] --
10,418,660 UART: [fwproc] Wait for Commands...
10,421,294 UART: [fwproc] Recv command 0x46574c44
10,423,386 UART: [fwproc] Recv'd Img size: 31656 bytes
12,815,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,889,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,958,649 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,987,159 >>> mbox cmd response: success
12,992,344 UART: [afmc] ++
12,992,960 UART: [afmc] CDI.KEYID = 6
12,993,898 UART: [afmc] SUBJECT.KEYID = 7
12,995,048 UART: [afmc] AUTHORITY.KEYID = 5
15,529,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,253,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,255,329 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,271,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,287,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,302,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,324,554 UART: [afmc] --
17,328,754 UART: [cold-reset] --
17,332,894 UART: [state] Locking Datavault
17,339,653 UART: [state] Locking PCR0, PCR1 and PCR31
17,341,332 UART: [state] Locking ICCM
17,343,028 UART: [exit] Launching FMC @ 0x40000130
17,351,420 UART:
17,351,670 UART: Running Caliptra FMC ...
17,352,803 UART:
17,352,963 UART: [state] CFI Enabled
17,411,806 UART: [fht] FMC Alias Private Key: 7
19,175,865 UART: [art] Extend RT PCRs Done
19,177,128 UART: [art] Lock RT PCRs Done
19,178,939 UART: [art] Populate DV Done
19,184,106 UART: [fht] FMC Alias Private Key: 7
19,185,620 UART: [art] Derive CDI
19,186,381 UART: [art] Store in in slot 0x4
19,244,369 UART: [art] Derive Key Pair
19,245,437 UART: [art] Store priv key in slot 0x5
21,708,349 UART: [art] Derive Key Pair - Done
21,721,002 UART: [art] Signing Cert with AUTHO
21,722,349 UART: RITY.KEYID = 7
23,433,907 UART: [art] Erasing AUTHORITY.KEYID = 7
23,435,466 UART: [art] PUB.X = CD718D2D290318F7682B65DC43890CE0A4439D6212B577CFD1CFDD4CBE937BB8A63D11DA7DAD8B5761E34BEEB235AB28
23,442,697 UART: [art] PUB.Y = 63D3D0AB5B27878F2B87F4119D8627BBEAEA4D74287782C063E1C84040295C3657793AAFC58518CD1371CB89556C5C3C
23,449,924 UART: [art] SIG.R = F9D9EEA7AFA9D9D1DC17EB6E9D9F823B9DDAA0E3FBD912FF546D7BB93E3596804BD606B3AED9F811096F49A379D72402
23,457,375 UART: [art] SIG.S = 17A8F2F7C2DF7FBBB0CA8E81ECB68DE0BF7AB3522D44C86C3A98F07215ADEE63335009A81682215A2AE039305F94CBF6
24,436,424 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,380,906 ready_for_fw is high
3,381,756 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,763,224 >>> mbox cmd response: success
17,040,624 UART:
17,041,024 UART: Running Caliptra FMC ...
17,042,143 UART:
17,042,295 UART: [state] CFI Enabled
17,110,983 UART: [fht] FMC Alias Private Key: 7
18,874,976 UART: [art] Extend RT PCRs Done
18,876,228 UART: [art] Lock RT PCRs Done
18,878,075 UART: [art] Populate DV Done
18,883,479 UART: [fht] FMC Alias Private Key: 7
18,885,004 UART: [art] Derive CDI
18,885,772 UART: [art] Store in in slot 0x4
18,943,438 UART: [art] Derive Key Pair
18,944,514 UART: [art] Store priv key in slot 0x5
21,407,322 UART: [art] Derive Key Pair - Done
21,420,240 UART: [art] Signing Cert with AUTHO
21,421,613 UART: RITY.KEYID = 7
23,133,674 UART: [art] Erasing AUTHORITY.KEYID = 7
23,135,223 UART: [art] PUB.X = DEB14E671571757E2DAACD73702D45574A755A8036CE93113B1BC4C06F34A6339AF7A5DB0E36457E51B53952DE9E79E2
23,142,488 UART: [art] PUB.Y = A5118EC6BCA58FE56AA399AE5674D0A782CD062AE50DBDF7B4B4F188BB9EFC633A90F819D6E17B83DF341355BED104DE
23,149,708 UART: [art] SIG.R = 85217ECEF0764F1A9726FE0094A7E8CDDC642977DF5791FE52CF8C795664B2AE1297E57F7B8401A6A878775601147314
23,157,121 UART: [art] SIG.S = F7BDCD82EDEA72421C4AF6EBAEF166EA022220A82F035E6AF3504A716417F1523BF5BF1F1988A2FDE06C058C73291CD1
24,135,728 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,481 UART:
192,868 UART: Running Caliptra ROM ...
194,058 UART:
603,740 UART: [state] CFI Enabled
618,057 UART: [state] LifecycleState = Unprovisioned
619,913 UART: [state] DebugLocked = No
622,136 UART: [state] WD Timer not started. Device not locked for debugging
625,603 UART: [kat] SHA2-256
804,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,298 UART: [kat] ++
816,740 UART: [kat] sha1
827,748 UART: [kat] SHA2-256
830,752 UART: [kat] SHA2-384
837,233 UART: [kat] SHA2-512-ACC
840,162 UART: [kat] ECC-384
3,285,956 UART: [kat] HMAC-384Kdf
3,298,691 UART: [kat] LMS
3,828,181 UART: [kat] --
3,832,829 UART: [cold-reset] ++
3,834,785 UART: [fht] FHT @ 0x50003400
3,845,974 UART: [idev] ++
3,846,550 UART: [idev] CDI.KEYID = 6
3,847,522 UART: [idev] SUBJECT.KEYID = 7
3,848,693 UART: [idev] UDS.KEYID = 0
3,849,609 ready_for_fw is high
3,849,790 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,889,690 UART: [idev] Erasing UDS.KEYID = 0
6,317,456 UART: [idev] Sha1 KeyId Algorithm
6,340,674 UART: [idev] --
6,344,451 UART: [ldev] ++
6,345,019 UART: [ldev] CDI.KEYID = 6
6,345,924 UART: [ldev] SUBJECT.KEYID = 5
6,347,083 UART: [ldev] AUTHORITY.KEYID = 7
6,348,386 UART: [ldev] FE.KEYID = 1
6,358,274 UART: [ldev] Erasing FE.KEYID = 1
8,830,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,721 UART: [ldev] --
10,619,949 UART: [fwproc] Wait for Commands...
10,622,686 UART: [fwproc] Recv command 0x46574c44
10,624,716 UART: [fwproc] Recv'd Img size: 31656 bytes
13,018,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,086,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,155,474 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,184,718 >>> mbox cmd response: success
13,188,429 UART: [afmc] ++
13,189,051 UART: [afmc] CDI.KEYID = 6
13,189,991 UART: [afmc] SUBJECT.KEYID = 7
13,191,136 UART: [afmc] AUTHORITY.KEYID = 5
15,692,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,412,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,414,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,429,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,445,992 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,461,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,483,732 UART: [afmc] --
17,487,168 UART: [cold-reset] --
17,492,676 UART: [state] Locking Datavault
17,497,071 UART: [state] Locking PCR0, PCR1 and PCR31
17,498,746 UART: [state] Locking ICCM
17,500,103 UART: [exit] Launching FMC @ 0x40000130
17,508,465 UART:
17,508,725 UART: Running Caliptra FMC ...
17,509,774 UART:
17,509,920 UART: [state] CFI Enabled
17,517,616 UART: [fht] FMC Alias Private Key: 7
19,274,658 UART: [art] Extend RT PCRs Done
19,275,913 UART: [art] Lock RT PCRs Done
19,277,402 UART: [art] Populate DV Done
19,282,634 UART: [fht] FMC Alias Private Key: 7
19,284,299 UART: [art] Derive CDI
19,285,152 UART: [art] Store in in slot 0x4
19,327,568 UART: [art] Derive Key Pair
19,328,596 UART: [art] Store priv key in slot 0x5
21,755,280 UART: [art] Derive Key Pair - Done
21,768,138 UART: [art] Signing Cert with AUTHO
21,769,471 UART: RITY.KEYID = 7
23,474,899 UART: [art] Erasing AUTHORITY.KEYID = 7
23,476,479 UART: [art] PUB.X = 546CFD12AD38A4F4F363E03ED07795D083D0F75514E35F2B553E922EA80589611111D9DEA8CF167E09B99A082CD1CB33
23,483,699 UART: [art] PUB.Y = 61B7B33ACAC2378316C87649C53BDE3F505B68001B94E0B70195E30012B5AAFF2D8F7C43F21F52C5EDA8ECBD004400AE
23,490,826 UART: [art] SIG.R = 66E9DFF841BC5BFDCA01BC3FB553A91BD81744EC8024E704161C9EABEE068033691D85E5FD6FFF73EFF24106475B220F
23,498,256 UART: [art] SIG.S = 38FBBDF616614896B5F15D140206911B8FA9556984EAFA9A19B8869B9C76307A8FA91C93D3BF1D65A513806DB1800513
24,476,510 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,698,585 ready_for_fw is high
3,698,998 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,969,224 >>> mbox cmd response: success
17,220,206 UART:
17,220,584 UART: Running Caliptra FMC ...
17,221,774 UART:
17,221,933 UART: [state] CFI Enabled
17,229,708 UART: [fht] FMC Alias Private Key: 7
18,986,363 UART: [art] Extend RT PCRs Done
18,987,628 UART: [art] Lock RT PCRs Done
18,989,090 UART: [art] Populate DV Done
18,994,543 UART: [fht] FMC Alias Private Key: 7
18,996,207 UART: [art] Derive CDI
18,997,053 UART: [art] Store in in slot 0x4
19,039,263 UART: [art] Derive Key Pair
19,040,345 UART: [art] Store priv key in slot 0x5
21,467,046 UART: [art] Derive Key Pair - Done
21,480,110 UART: [art] Signing Cert with AUTHO
21,481,446 UART: RITY.KEYID = 7
23,186,591 UART: [art] Erasing AUTHORITY.KEYID = 7
23,188,150 UART: [art] PUB.X = 3BFBC186D807974F03C5B1B7EAC633ACFD4869B37FE8331B2A324AF2B710448E58D2278AF4D805A022598ABA365DE2D6
23,195,438 UART: [art] PUB.Y = 8C3E68F30749AB3CCC60966C8542F12154D8730B71442928F5CE2B9067866BC14672BEE95495E88293BFB1D4A798444E
23,202,581 UART: [art] SIG.R = F18340FF63C5505177E89ADF6609AE3AD73747E6818FFEAF088DC92B08CA929984EBB6CAB0CC060935FB85046A519CE3
23,210,005 UART: [art] SIG.S = 918528F497B2D2E2EC026E518110DD6C94BDCEA4ED87D0CE506E97512DE071D1A2A4AB70D370F57451D8EBA86A3CD5C5
24,188,619 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,047 UART:
192,433 UART: Running Caliptra ROM ...
193,522 UART:
193,662 UART: [state] CFI Enabled
265,948 UART: [state] LifecycleState = Unprovisioned
268,334 UART: [state] DebugLocked = No
269,776 UART: [state] WD Timer not started. Device not locked for debugging
275,223 UART: [kat] SHA2-256
465,069 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,865 UART: [kat] ++
476,307 UART: [kat] sha1
487,674 UART: [kat] SHA2-256
490,625 UART: [kat] SHA2-384
497,111 UART: [kat] SHA2-512-ACC
499,690 UART: [kat] ECC-384
2,947,962 UART: [kat] HMAC-384Kdf
2,970,714 UART: [kat] LMS
3,502,501 UART: [kat] --
3,507,139 UART: [cold-reset] ++
3,509,776 UART: [fht] FHT @ 0x50003400
3,521,319 UART: [idev] ++
3,521,946 UART: [idev] CDI.KEYID = 6
3,522,892 UART: [idev] SUBJECT.KEYID = 7
3,524,126 UART: [idev] UDS.KEYID = 0
3,525,021 ready_for_fw is high
3,525,207 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,565,440 UART: [idev] Erasing UDS.KEYID = 0
6,043,009 UART: [idev] Sha1 KeyId Algorithm
6,066,523 UART: [idev] --
6,072,571 UART: [ldev] ++
6,073,312 UART: [ldev] CDI.KEYID = 6
6,074,235 UART: [ldev] SUBJECT.KEYID = 5
6,075,394 UART: [ldev] AUTHORITY.KEYID = 7
6,076,570 UART: [ldev] FE.KEYID = 1
6,116,542 UART: [ldev] Erasing FE.KEYID = 1
8,623,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,359,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,390,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,405,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,426,651 UART: [ldev] --
10,431,912 UART: [fwproc] Wait for Commands...
10,434,120 UART: [fwproc] Recv command 0x46574c44
10,436,372 UART: [fwproc] Recv'd Img size: 31656 bytes
12,873,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,949,485 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,065,681 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,111,274 >>> mbox cmd response: success
13,115,766 UART: [afmc] ++
13,116,384 UART: [afmc] CDI.KEYID = 6
13,117,530 UART: [afmc] SUBJECT.KEYID = 7
13,119,125 UART: [afmc] AUTHORITY.KEYID = 5
15,649,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,375,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,377,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,392,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,407,455 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,422,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,444,746 UART: [afmc] --
17,448,665 UART: [cold-reset] --
17,454,476 UART: [state] Locking Datavault
17,459,336 UART: [state] Locking PCR0, PCR1 and PCR31
17,461,544 UART: [state] Locking ICCM
17,463,358 UART: [exit] Launching FMC @ 0x40000130
17,472,029 UART:
17,472,271 UART: Running Caliptra FMC ...
17,473,408 UART:
17,473,560 UART: [state] CFI Enabled
17,532,908 UART: [fht] FMC Alias Private Key: 7
19,297,149 UART: [art] Extend RT PCRs Done
19,298,400 UART: [art] Lock RT PCRs Done
19,300,092 UART: [art] Populate DV Done
19,305,401 UART: [fht] FMC Alias Private Key: 7
19,307,064 UART: [art] Derive CDI
19,307,832 UART: [art] Store in in slot 0x4
19,366,016 UART: [art] Derive Key Pair
19,367,115 UART: [art] Store priv key in slot 0x5
21,830,112 UART: [art] Derive Key Pair - Done
21,843,112 UART: [art] Signing Cert with AUTHO
21,844,456 UART: RITY.KEYID = 7
23,556,197 UART: [art] Erasing AUTHORITY.KEYID = 7
23,557,750 UART: [art] PUB.X = FC4C25815C7E268DD2978091CBAA5A39FDF947DF5A97B4E8E04D17FC1EF71ECF29EE33DA788F50E828A837879908502E
23,564,980 UART: [art] PUB.Y = 37907D103A744039E3C46BB0F72A0180CA7332A48911EB330154F68E6CF573549505B80088DCADD6E24785FD63690AB8
23,572,235 UART: [art] SIG.R = 084E0709CA297134690866F38A3D0B35724663359DD976B1E9F47FEB8E5B004484363C4EC04174914EAEBDB6C392B517
23,579,587 UART: [art] SIG.S = 173DBE85E1EA94F394933CAFDBA1CE954F2CEF03EEF2E3517D12B42EA4BCF776B88E50C947A62D07F92ACD2BE9CB4BF4
24,558,528 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,437,406 ready_for_fw is high
3,437,858 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,958,449 >>> mbox cmd response: success
17,244,421 UART:
17,244,807 UART: Running Caliptra FMC ...
17,245,906 UART:
17,246,055 UART: [state] CFI Enabled
17,314,448 UART: [fht] FMC Alias Private Key: 7
19,078,364 UART: [art] Extend RT PCRs Done
19,079,626 UART: [art] Lock RT PCRs Done
19,081,468 UART: [art] Populate DV Done
19,086,855 UART: [fht] FMC Alias Private Key: 7
19,088,519 UART: [art] Derive CDI
19,089,284 UART: [art] Store in in slot 0x4
19,147,225 UART: [art] Derive Key Pair
19,148,305 UART: [art] Store priv key in slot 0x5
21,611,517 UART: [art] Derive Key Pair - Done
21,624,648 UART: [art] Signing Cert with AUTHO
21,625,994 UART: RITY.KEYID = 7
23,338,038 UART: [art] Erasing AUTHORITY.KEYID = 7
23,339,602 UART: [art] PUB.X = B88D01F6515B4BFD410F8742DC36B6C75CDB9FACBDB56E904C51D67F79F384AC55CD69D6B53F0EA3AE937BFF1048E564
23,346,872 UART: [art] PUB.Y = A107BABC7560F606E91A478FA71583C38536C835BD4B69E2E57A547B19A4A3E4104DA2C6BC1C6016451750A1039633E1
23,354,096 UART: [art] SIG.R = ACD041CF230320A7EA9473FFDE6DBD56805EC6DFC7EEB861739135B628DAE99CFCCD4F3F47A7DF76B40690D570C8DFFF
23,361,499 UART: [art] SIG.S = 50913F030E5A57927B54568A68C7C06B05DFA178B0B3585D9A237C4B3343F5B0AFD9A4F49DF3473DBB3FF406D834B200
24,340,092 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,425 UART:
192,775 UART: Running Caliptra ROM ...
193,858 UART:
603,664 UART: [state] CFI Enabled
619,680 UART: [state] LifecycleState = Unprovisioned
622,041 UART: [state] DebugLocked = No
623,242 UART: [state] WD Timer not started. Device not locked for debugging
626,997 UART: [kat] SHA2-256
816,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,636 UART: [kat] ++
828,237 UART: [kat] sha1
840,460 UART: [kat] SHA2-256
843,467 UART: [kat] SHA2-384
849,879 UART: [kat] SHA2-512-ACC
852,458 UART: [kat] ECC-384
3,294,979 UART: [kat] HMAC-384Kdf
3,306,793 UART: [kat] LMS
3,838,618 UART: [kat] --
3,842,421 UART: [cold-reset] ++
3,844,919 UART: [fht] FHT @ 0x50003400
3,856,956 UART: [idev] ++
3,857,657 UART: [idev] CDI.KEYID = 6
3,858,621 UART: [idev] SUBJECT.KEYID = 7
3,859,795 UART: [idev] UDS.KEYID = 0
3,860,693 ready_for_fw is high
3,860,888 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,900,809 UART: [idev] Erasing UDS.KEYID = 0
6,334,805 UART: [idev] Sha1 KeyId Algorithm
6,357,273 UART: [idev] --
6,360,723 UART: [ldev] ++
6,361,299 UART: [ldev] CDI.KEYID = 6
6,362,267 UART: [ldev] SUBJECT.KEYID = 5
6,363,381 UART: [ldev] AUTHORITY.KEYID = 7
6,364,620 UART: [ldev] FE.KEYID = 1
6,377,378 UART: [ldev] Erasing FE.KEYID = 1
8,857,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,051 UART: [ldev] --
10,645,797 UART: [fwproc] Wait for Commands...
10,647,737 UART: [fwproc] Recv command 0x46574c44
10,650,000 UART: [fwproc] Recv'd Img size: 31656 bytes
13,082,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,163,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,280,030 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,326,247 >>> mbox cmd response: success
13,330,829 UART: [afmc] ++
13,331,441 UART: [afmc] CDI.KEYID = 6
13,332,602 UART: [afmc] SUBJECT.KEYID = 7
13,334,081 UART: [afmc] AUTHORITY.KEYID = 5
15,838,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,562,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,564,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,579,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,594,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,609,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,631,876 UART: [afmc] --
17,634,657 UART: [cold-reset] --
17,640,595 UART: [state] Locking Datavault
17,646,476 UART: [state] Locking PCR0, PCR1 and PCR31
17,648,570 UART: [state] Locking ICCM
17,651,679 UART: [exit] Launching FMC @ 0x40000130
17,660,292 UART:
17,660,435 UART: Running Caliptra FMC ...
17,661,469 UART:
17,661,608 UART: [state] CFI Enabled
17,670,111 UART: [fht] FMC Alias Private Key: 7
19,427,263 UART: [art] Extend RT PCRs Done
19,428,558 UART: [art] Lock RT PCRs Done
19,430,232 UART: [art] Populate DV Done
19,435,782 UART: [fht] FMC Alias Private Key: 7
19,437,330 UART: [art] Derive CDI
19,438,074 UART: [art] Store in in slot 0x4
19,480,392 UART: [art] Derive Key Pair
19,481,315 UART: [art] Store priv key in slot 0x5
21,908,772 UART: [art] Derive Key Pair - Done
21,921,573 UART: [art] Signing Cert with AUTHO
21,922,797 UART: RITY.KEYID = 7
23,628,338 UART: [art] Erasing AUTHORITY.KEYID = 7
23,629,775 UART: [art] PUB.X = 72E7CCC7C059719E083CEE3FA93437DADCC998AB3DF5B20751FEE8356DB47EB17891B3282B3CD423083341AC0D77E37C
23,637,091 UART: [art] PUB.Y = 95386B4995AFFAA5D8AFA0E93C1648047CD7BF6E82F5514F72293609C12775BB68FD5BDF2CD00264DAD503FACF15367D
23,644,406 UART: [art] SIG.R = 0B406E459F6F5DAFF4A6198323AC04BC5CD6738324BCD0567926DB589025452E1C51A95CD28CE44D757BDF178884E855
23,651,726 UART: [art] SIG.S = B1666569ED7ADCB556A2AD0FD38470476DDA008FCB33A079708C03A8061BF91BB665CDAA4A4661598FC648F27DA9F7EB
24,629,811 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,754,087 ready_for_fw is high
3,754,653 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,182,440 >>> mbox cmd response: success
17,438,249 UART:
17,438,643 UART: Running Caliptra FMC ...
17,439,837 UART:
17,440,002 UART: [state] CFI Enabled
17,447,844 UART: [fht] FMC Alias Private Key: 7
19,204,918 UART: [art] Extend RT PCRs Done
19,206,155 UART: [art] Lock RT PCRs Done
19,207,575 UART: [art] Populate DV Done
19,212,821 UART: [fht] FMC Alias Private Key: 7
19,214,340 UART: [art] Derive CDI
19,215,096 UART: [art] Store in in slot 0x4
19,257,922 UART: [art] Derive Key Pair
19,258,991 UART: [art] Store priv key in slot 0x5
21,685,884 UART: [art] Derive Key Pair - Done
21,698,533 UART: [art] Signing Cert with AUTHO
21,699,877 UART: RITY.KEYID = 7
23,405,557 UART: [art] Erasing AUTHORITY.KEYID = 7
23,407,130 UART: [art] PUB.X = 6C7E56E046707E181A19CB4F55CED50DF0CC835335D9C6C49DB5EFB0679247F4CC33B38A3190E53476BF87C7DD2BE15D
23,414,339 UART: [art] PUB.Y = C088B5D1C6B7AD047256B61538CEB42CE256B61275A277C1433725912DDAE6BBE60CA48723DBF13F26B54A153A3141D5
23,421,659 UART: [art] SIG.R = 5AA2C4D378B5A5B4C0B8C9524AC4C94D68AF8FAD9775CB92BF7FB6C00126DF9B16361D047D70044E1880E57EB26647CC
23,429,061 UART: [art] SIG.S = E556D7AD260A8E0A90A704028A1441F6A4D4563B80CA3E418D005102995D3C3B6575FB04EC2FE08FC2810FB907761DD5
24,408,067 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,345 UART: [kat] SHA2-256
892,283 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,460 UART: [kat] LMS
1,475,656 UART: [kat] --
1,476,455 UART: [cold-reset] ++
1,476,819 UART: [fht] Storing FHT @ 0x50003400
1,479,534 UART: [idev] ++
1,479,702 UART: [idev] CDI.KEYID = 6
1,480,062 UART: [idev] SUBJECT.KEYID = 7
1,480,486 UART: [idev] UDS.KEYID = 0
1,480,831 ready_for_fw is high
1,480,831 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,505,210 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,018 UART: [idev] --
1,515,067 UART: [ldev] ++
1,515,235 UART: [ldev] CDI.KEYID = 6
1,515,598 UART: [ldev] SUBJECT.KEYID = 5
1,516,024 UART: [ldev] AUTHORITY.KEYID = 7
1,516,487 UART: [ldev] FE.KEYID = 1
1,521,667 UART: [ldev] Erasing FE.KEYID = 1
1,547,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,188 UART: [ldev] --
1,586,533 UART: [fwproc] Waiting for Commands...
1,587,182 UART: [fwproc] Received command 0x46574c44
1,587,973 UART: [fwproc] Received Image of size 31656 bytes
1,939,172 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,212 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,355 >>> mbox cmd response: success
2,008,537 UART: [afmc] ++
2,008,705 UART: [afmc] CDI.KEYID = 6
2,009,067 UART: [afmc] SUBJECT.KEYID = 7
2,009,492 UART: [afmc] AUTHORITY.KEYID = 5
2,044,691 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,385 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,998 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,688 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,661 UART: [afmc] --
2,087,547 UART: [cold-reset] --
2,088,701 UART: [state] Locking Datavault
2,089,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,468 UART: [state] Locking ICCM
2,091,028 UART: [exit] Launching FMC @ 0x40000130
2,096,357 UART:
2,096,373 UART: Running Caliptra FMC ...
2,096,781 UART:
2,096,835 UART: [state] CFI Enabled
2,107,300 UART: [fht] FMC Alias Private Key: 7
2,215,279 UART: [art] Extend RT PCRs Done
2,215,707 UART: [art] Lock RT PCRs Done
2,217,149 UART: [art] Populate DV Done
2,225,516 UART: [fht] FMC Alias Private Key: 7
2,226,624 UART: [art] Derive CDI
2,226,904 UART: [art] Store in in slot 0x4
2,312,507 UART: [art] Derive Key Pair
2,312,867 UART: [art] Store priv key in slot 0x5
2,326,159 UART: [art] Derive Key Pair - Done
2,341,115 UART: [art] Signing Cert with AUTHO
2,341,595 UART: RITY.KEYID = 7
2,356,803 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,568 UART: [art] PUB.X = D5B2BCCDBE09FA173D42A15391CCF06B1B30348ACC4A97306AB43A6A0F6CDA8232E02C00EA17ECC394D237E39EC7C765
2,364,330 UART: [art] PUB.Y = 7598DAF9D6791B02B08E4855A96B4323ADE7F3070F0A52BDC82325F419D22C72C3DF8F13006458904C49A870306F758F
2,371,242 UART: [art] SIG.R = 5A3E165F6FC21BB4678718E739774C7FFA1FB207F6F0C8F3726D4B0040C64497EE0E295329BC2E99B55C63A95AE8D531
2,377,988 UART: [art] SIG.S = 89EAAC3EA3A80DBDA5CFE38CF3B5510D28DF684C49022231F042BF07F65EAAD92DDE277F61A9443F4E8038EBE92C968F
2,401,056 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,935 ready_for_fw is high
1,362,935 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,525 >>> mbox cmd response: success
1,919,517 UART:
1,919,533 UART: Running Caliptra FMC ...
1,919,941 UART:
1,919,995 UART: [state] CFI Enabled
1,930,676 UART: [fht] FMC Alias Private Key: 7
2,038,311 UART: [art] Extend RT PCRs Done
2,038,739 UART: [art] Lock RT PCRs Done
2,040,095 UART: [art] Populate DV Done
2,048,394 UART: [fht] FMC Alias Private Key: 7
2,049,366 UART: [art] Derive CDI
2,049,646 UART: [art] Store in in slot 0x4
2,135,157 UART: [art] Derive Key Pair
2,135,517 UART: [art] Store priv key in slot 0x5
2,148,953 UART: [art] Derive Key Pair - Done
2,163,918 UART: [art] Signing Cert with AUTHO
2,164,398 UART: RITY.KEYID = 7
2,179,808 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,573 UART: [art] PUB.X = F94A3E56EEDA3440E8FC10B8CBEF56030C495645595746D6CC8D95D6F274DAF97B9417F51403152D97DC6DD043B19C8F
2,187,342 UART: [art] PUB.Y = 962DF000DFCD65AC345D5000246203BC8DCC91CA84E805F52A9A0DD57C7758AFF4880780B450B4C38C1636B664163541
2,194,236 UART: [art] SIG.R = 8E4C789FB65448F3C0C64781C8BF1FCCFA0F3D2C69866F2C8FE17B683FB505222DCB0C89E02FA369B216185BE87127EA
2,201,009 UART: [art] SIG.S = 3A2FABF55B43DB1C06C16A802073462D925A50F51AC07FF0DD800E540482AED5690E86DEF1E354D0CD8B3FBA0D9D499D
2,224,408 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,436 UART: [kat] SHA2-256
892,374 UART: [kat] SHA2-384
895,059 UART: [kat] SHA2-512-ACC
896,960 UART: [kat] ECC-384
902,401 UART: [kat] HMAC-384Kdf
907,089 UART: [kat] LMS
1,475,285 UART: [kat] --
1,476,246 UART: [cold-reset] ++
1,476,606 UART: [fht] Storing FHT @ 0x50003400
1,479,407 UART: [idev] ++
1,479,575 UART: [idev] CDI.KEYID = 6
1,479,935 UART: [idev] SUBJECT.KEYID = 7
1,480,359 UART: [idev] UDS.KEYID = 0
1,480,704 ready_for_fw is high
1,480,704 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,501 UART: [idev] Erasing UDS.KEYID = 0
1,505,209 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,827 UART: [idev] --
1,514,816 UART: [ldev] ++
1,514,984 UART: [ldev] CDI.KEYID = 6
1,515,347 UART: [ldev] SUBJECT.KEYID = 5
1,515,773 UART: [ldev] AUTHORITY.KEYID = 7
1,516,236 UART: [ldev] FE.KEYID = 1
1,521,674 UART: [ldev] Erasing FE.KEYID = 1
1,547,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,033 UART: [ldev] --
1,586,528 UART: [fwproc] Waiting for Commands...
1,587,389 UART: [fwproc] Received command 0x46574c44
1,588,180 UART: [fwproc] Received Image of size 31656 bytes
1,938,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,650 >>> mbox cmd response: success
2,007,894 UART: [afmc] ++
2,008,062 UART: [afmc] CDI.KEYID = 6
2,008,424 UART: [afmc] SUBJECT.KEYID = 7
2,008,849 UART: [afmc] AUTHORITY.KEYID = 5
2,043,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,068 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,060,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,461 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,151 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,998 UART: [afmc] --
2,087,108 UART: [cold-reset] --
2,087,980 UART: [state] Locking Datavault
2,089,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,797 UART: [state] Locking ICCM
2,090,323 UART: [exit] Launching FMC @ 0x40000130
2,095,652 UART:
2,095,668 UART: Running Caliptra FMC ...
2,096,076 UART:
2,096,219 UART: [state] CFI Enabled
2,106,704 UART: [fht] FMC Alias Private Key: 7
2,214,675 UART: [art] Extend RT PCRs Done
2,215,103 UART: [art] Lock RT PCRs Done
2,217,099 UART: [art] Populate DV Done
2,225,382 UART: [fht] FMC Alias Private Key: 7
2,226,544 UART: [art] Derive CDI
2,226,824 UART: [art] Store in in slot 0x4
2,312,207 UART: [art] Derive Key Pair
2,312,567 UART: [art] Store priv key in slot 0x5
2,325,321 UART: [art] Derive Key Pair - Done
2,340,120 UART: [art] Signing Cert with AUTHO
2,340,600 UART: RITY.KEYID = 7
2,355,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,387 UART: [art] PUB.X = DD056BF0A88F37865882B476C0D6B5190ECD6868E43EA97E765B85F5332A2894F752A31764D5180FF744AEA3B9186C93
2,363,146 UART: [art] PUB.Y = 693174D9E5DCC78CF9B67BD36846BB4ECADB25A38BAEBD3051E351ED5E829B1A163EA81CB56B6A6CFC3E7384C887EB99
2,370,118 UART: [art] SIG.R = 65C648E5943C30798D7E4C184EF7B24D2CE560A35D181DB2F9927E71B583EF2786A070B621B361679612C0DC0D1923E3
2,376,881 UART: [art] SIG.S = 3840E253C714B7F37005FFCF7209FABB3F191758958E6E8BEE26D942A7FE8DDE908A426B94EC99E4E4FA095674512193
2,400,324 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,536 ready_for_fw is high
1,362,536 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,370 >>> mbox cmd response: success
1,919,090 UART:
1,919,106 UART: Running Caliptra FMC ...
1,919,514 UART:
1,919,657 UART: [state] CFI Enabled
1,929,888 UART: [fht] FMC Alias Private Key: 7
2,037,873 UART: [art] Extend RT PCRs Done
2,038,301 UART: [art] Lock RT PCRs Done
2,040,107 UART: [art] Populate DV Done
2,048,324 UART: [fht] FMC Alias Private Key: 7
2,049,326 UART: [art] Derive CDI
2,049,606 UART: [art] Store in in slot 0x4
2,135,005 UART: [art] Derive Key Pair
2,135,365 UART: [art] Store priv key in slot 0x5
2,148,381 UART: [art] Derive Key Pair - Done
2,162,935 UART: [art] Signing Cert with AUTHO
2,163,415 UART: RITY.KEYID = 7
2,179,261 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,026 UART: [art] PUB.X = 8A243574F965AAA16BBAE30953634FC850B5A119871C8A3742B957062F9E9E5A2D75BABE2F0A36DF0C07629AC33E37E3
2,186,787 UART: [art] PUB.Y = 759FFF24A79BDD985AD6366070A2F0E190E304A8284D238054388694918DAA7C1305F6F730DAA9223A9A61E12BCE55E0
2,193,731 UART: [art] SIG.R = 1750E765541E75CFA73CCE21D6BA007B9AD2BAF755B5EEE1ED24240A23C5097AC2A7099547B17F06D204A0145708273C
2,200,465 UART: [art] SIG.S = 1D252179AA8E129E93B54620F2D3E20505B433CFD5C328CE4C167865EA16D68416078F619BFCE6FC272BBD061F9C699A
2,224,741 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
893,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,729 UART: [kat] ++
897,881 UART: [kat] sha1
902,091 UART: [kat] SHA2-256
904,031 UART: [kat] SHA2-384
906,690 UART: [kat] SHA2-512-ACC
908,591 UART: [kat] ECC-384
918,388 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,172,159 UART: [cold-reset] ++
1,172,649 UART: [fht] FHT @ 0x50003400
1,175,214 UART: [idev] ++
1,175,382 UART: [idev] CDI.KEYID = 6
1,175,742 UART: [idev] SUBJECT.KEYID = 7
1,176,166 UART: [idev] UDS.KEYID = 0
1,176,511 ready_for_fw is high
1,176,511 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,090 UART: [idev] Erasing UDS.KEYID = 0
1,201,137 UART: [idev] Sha1 KeyId Algorithm
1,209,465 UART: [idev] --
1,210,403 UART: [ldev] ++
1,210,571 UART: [ldev] CDI.KEYID = 6
1,210,934 UART: [ldev] SUBJECT.KEYID = 5
1,211,360 UART: [ldev] AUTHORITY.KEYID = 7
1,211,823 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,527 UART: [ldev] --
1,282,878 UART: [fwproc] Wait for Commands...
1,283,466 UART: [fwproc] Recv command 0x46574c44
1,284,194 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,879 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,772 >>> mbox cmd response: success
1,703,928 UART: [afmc] ++
1,704,096 UART: [afmc] CDI.KEYID = 6
1,704,458 UART: [afmc] SUBJECT.KEYID = 7
1,704,883 UART: [afmc] AUTHORITY.KEYID = 5
1,740,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,497 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,225 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,829 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,869 UART: [afmc] --
1,783,855 UART: [cold-reset] --
1,784,459 UART: [state] Locking Datavault
1,785,722 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,326 UART: [state] Locking ICCM
1,786,818 UART: [exit] Launching FMC @ 0x40000130
1,792,147 UART:
1,792,163 UART: Running Caliptra FMC ...
1,792,571 UART:
1,792,625 UART: [state] CFI Enabled
1,803,100 UART: [fht] FMC Alias Private Key: 7
1,911,255 UART: [art] Extend RT PCRs Done
1,911,683 UART: [art] Lock RT PCRs Done
1,913,101 UART: [art] Populate DV Done
1,921,288 UART: [fht] FMC Alias Private Key: 7
1,922,420 UART: [art] Derive CDI
1,922,700 UART: [art] Store in in slot 0x4
2,008,149 UART: [art] Derive Key Pair
2,008,509 UART: [art] Store priv key in slot 0x5
2,021,247 UART: [art] Derive Key Pair - Done
2,035,724 UART: [art] Signing Cert with AUTHO
2,036,204 UART: RITY.KEYID = 7
2,051,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,052,115 UART: [art] PUB.X = 6B64DA48C3643CFABE25F6754035D10CD46CFBFFE129AC2853CFC81766CC16123EBD25E76636692665009D3FF4A30474
2,058,863 UART: [art] PUB.Y = 256A8F4D3BAD0FBD859B81AB0D4F827E234C0C13200348CDDCF515A790933B28DB428C4CB4A2991E83F89229DC2D6CB6
2,065,813 UART: [art] SIG.R = E441C97E671B67187B7A9610F969ADCCECFBEB994A1CD0E410FDFBFE0F0BF5EF938A82EB41F6179E418E8B3A5D840E7D
2,072,598 UART: [art] SIG.S = 0AEE8BCE748DDD98046F8A88F16EEFB4321AC621CBB79ABBEA7B4A50E1C405844E8481719EBC5323702B5FEE384BBBF1
2,096,697 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,815 ready_for_fw is high
1,059,815 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,554,185 >>> mbox cmd response: success
1,616,275 UART:
1,616,291 UART: Running Caliptra FMC ...
1,616,699 UART:
1,616,753 UART: [state] CFI Enabled
1,627,222 UART: [fht] FMC Alias Private Key: 7
1,734,657 UART: [art] Extend RT PCRs Done
1,735,085 UART: [art] Lock RT PCRs Done
1,736,329 UART: [art] Populate DV Done
1,744,400 UART: [fht] FMC Alias Private Key: 7
1,745,340 UART: [art] Derive CDI
1,745,620 UART: [art] Store in in slot 0x4
1,831,063 UART: [art] Derive Key Pair
1,831,423 UART: [art] Store priv key in slot 0x5
1,844,931 UART: [art] Derive Key Pair - Done
1,859,617 UART: [art] Signing Cert with AUTHO
1,860,097 UART: RITY.KEYID = 7
1,875,325 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,090 UART: [art] PUB.X = AF8FE6E49DFC2DD15AB428914B27936838B456AD3DBBF5ACA3FC6CFD51F0F13CD2F4FFDE7B3C27FB4FC334596B1C19AF
1,882,892 UART: [art] PUB.Y = EA8B45B64DD8F23506DBADD9D2CD7EEE4D94CD69B79877A9896FF14E20298A82137C1B98DBB83BA1C8436580A2A67AAA
1,889,857 UART: [art] SIG.R = DD2247C073BF09ECB913057D558774046D6251DE5626274D9826EDCEB78644C22569E174349CCE67C888B939D6111E48
1,896,610 UART: [art] SIG.S = 0EE83CAEA69145F9C41A2CBF31780B7B280EAF965A374CEF6FEF7492A76B8CBC964F73756588FC7517918713EBA3D8E3
1,920,649 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,937 UART: [kat] SHA2-512-ACC
908,838 UART: [kat] ECC-384
918,267 UART: [kat] HMAC-384Kdf
922,991 UART: [kat] LMS
1,171,319 UART: [kat] --
1,172,218 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,307 UART: [idev] ++
1,175,475 UART: [idev] CDI.KEYID = 6
1,175,835 UART: [idev] SUBJECT.KEYID = 7
1,176,259 UART: [idev] UDS.KEYID = 0
1,176,604 ready_for_fw is high
1,176,604 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,484 UART: [idev] Sha1 KeyId Algorithm
1,209,988 UART: [idev] --
1,211,014 UART: [ldev] ++
1,211,182 UART: [ldev] CDI.KEYID = 6
1,211,545 UART: [ldev] SUBJECT.KEYID = 5
1,211,971 UART: [ldev] AUTHORITY.KEYID = 7
1,212,434 UART: [ldev] FE.KEYID = 1
1,217,786 UART: [ldev] Erasing FE.KEYID = 1
1,243,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,556 UART: [ldev] --
1,283,045 UART: [fwproc] Wait for Commands...
1,283,647 UART: [fwproc] Recv command 0x46574c44
1,284,375 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,114 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,809 >>> mbox cmd response: success
1,703,847 UART: [afmc] ++
1,704,015 UART: [afmc] CDI.KEYID = 6
1,704,377 UART: [afmc] SUBJECT.KEYID = 7
1,704,802 UART: [afmc] AUTHORITY.KEYID = 5
1,739,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,642 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,527 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,774,246 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,094 UART: [afmc] --
1,782,988 UART: [cold-reset] --
1,783,924 UART: [state] Locking Datavault
1,784,903 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,507 UART: [state] Locking ICCM
1,786,157 UART: [exit] Launching FMC @ 0x40000130
1,791,486 UART:
1,791,502 UART: Running Caliptra FMC ...
1,791,910 UART:
1,792,053 UART: [state] CFI Enabled
1,802,808 UART: [fht] FMC Alias Private Key: 7
1,910,797 UART: [art] Extend RT PCRs Done
1,911,225 UART: [art] Lock RT PCRs Done
1,912,645 UART: [art] Populate DV Done
1,920,740 UART: [fht] FMC Alias Private Key: 7
1,921,882 UART: [art] Derive CDI
1,922,162 UART: [art] Store in in slot 0x4
2,008,329 UART: [art] Derive Key Pair
2,008,689 UART: [art] Store priv key in slot 0x5
2,022,363 UART: [art] Derive Key Pair - Done
2,037,186 UART: [art] Signing Cert with AUTHO
2,037,666 UART: RITY.KEYID = 7
2,053,092 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,857 UART: [art] PUB.X = 8A743377088F8007614EE174B445AA735361197EFB2AA8EAA263533C6D668AB1BE30EE04631DA2AEC453AC48643F17D3
2,060,620 UART: [art] PUB.Y = 1958B3DA285CC6EBC0B3C4BA79F0A2C15F2B5031FCC8D7593D05B754C22DBF6FD7EF49966408AE5BA1ECEE11DD701286
2,067,584 UART: [art] SIG.R = B7B1AE9B8245336C279A5025F79E5A20524754F7156D717DDED4365841E787FD2E50B7B46C5610AE3E65187F8E1A4CB8
2,074,354 UART: [art] SIG.S = CAFD0428230483BB3D7E887932629E1A7C054A54FB5D71AE1B1B1C969D0A9DD8541234FB79F03873C1F9E48CD48C21CF
2,098,018 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,190 ready_for_fw is high
1,060,190 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,658 >>> mbox cmd response: success
1,617,330 UART:
1,617,346 UART: Running Caliptra FMC ...
1,617,754 UART:
1,617,897 UART: [state] CFI Enabled
1,628,326 UART: [fht] FMC Alias Private Key: 7
1,736,345 UART: [art] Extend RT PCRs Done
1,736,773 UART: [art] Lock RT PCRs Done
1,738,417 UART: [art] Populate DV Done
1,746,806 UART: [fht] FMC Alias Private Key: 7
1,747,942 UART: [art] Derive CDI
1,748,222 UART: [art] Store in in slot 0x4
1,834,187 UART: [art] Derive Key Pair
1,834,547 UART: [art] Store priv key in slot 0x5
1,847,429 UART: [art] Derive Key Pair - Done
1,862,333 UART: [art] Signing Cert with AUTHO
1,862,813 UART: RITY.KEYID = 7
1,877,761 UART: [art] Erasing AUTHORITY.KEYID = 7
1,878,526 UART: [art] PUB.X = ADE4CF15F71507EFC0DD08418600BC4E8FCF465B9095768FAADFAD44F638790631FB2C093B8CE7565C1F43AFFB8954B0
1,885,278 UART: [art] PUB.Y = BB9B59C5CB80CAD6747C1E0CD59B02B7152E03235498690C31D3A6EEED9E0958B96FF7275DFEB81873758E9978CCC66F
1,892,223 UART: [art] SIG.R = 005029DAE28FBCAC32339A2039099375D9C511A4E9E5EEB7A5BD22714E862FD868F8A9FB75E04DE8F142C25F6307E78C
1,898,973 UART: [art] SIG.S = 17F53F22401AC5C822B4F4703AFDF8A92C7115C7EC8FBC323AEA767FEA966D17CC834E2CE6433DBC3FA7B3F96AB878FE
1,922,487 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,835 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,172,881 UART: [idev] ++
1,173,049 UART: [idev] CDI.KEYID = 6
1,173,410 UART: [idev] SUBJECT.KEYID = 7
1,173,835 UART: [idev] UDS.KEYID = 0
1,174,181 ready_for_fw is high
1,174,181 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,595 UART: [idev] --
1,208,614 UART: [ldev] ++
1,208,782 UART: [ldev] CDI.KEYID = 6
1,209,146 UART: [ldev] SUBJECT.KEYID = 5
1,209,573 UART: [ldev] AUTHORITY.KEYID = 7
1,210,036 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,042 UART: [ldev] --
1,280,340 UART: [fwproc] Wait for Commands...
1,280,991 UART: [fwproc] Recv command 0x46574c44
1,281,724 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,658,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,070 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,699,834 >>> mbox cmd response: success
1,700,973 UART: [afmc] ++
1,701,141 UART: [afmc] CDI.KEYID = 6
1,701,504 UART: [afmc] SUBJECT.KEYID = 7
1,701,930 UART: [afmc] AUTHORITY.KEYID = 5
1,737,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,032 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,760,761 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,766,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,363 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,184 UART: [afmc] --
1,781,216 UART: [cold-reset] --
1,781,770 UART: [state] Locking Datavault
1,782,739 UART: [state] Locking PCR0, PCR1 and PCR31
1,783,343 UART: [state] Locking ICCM
1,783,931 UART: [exit] Launching FMC @ 0x40000130
1,789,260 UART:
1,789,276 UART: Running Caliptra FMC ...
1,789,684 UART:
1,789,738 UART: [state] CFI Enabled
1,800,139 UART: [fht] FMC Alias Private Key: 7
1,907,992 UART: [art] Extend RT PCRs Done
1,908,420 UART: [art] Lock RT PCRs Done
1,909,858 UART: [art] Populate DV Done
1,917,977 UART: [fht] FMC Alias Private Key: 7
1,919,085 UART: [art] Derive CDI
1,919,365 UART: [art] Store in in slot 0x4
2,004,714 UART: [art] Derive Key Pair
2,005,074 UART: [art] Store priv key in slot 0x5
2,018,640 UART: [art] Derive Key Pair - Done
2,033,337 UART: [art] Signing Cert with AUTHO
2,033,817 UART: RITY.KEYID = 7
2,049,113 UART: [art] Erasing AUTHORITY.KEYID = 7
2,049,878 UART: [art] PUB.X = 9EC49622040BD53D7970CBB63731501DFD50B75C2E578D793E84B917A0EA958474CA4BF5A4DFD55D90D0D91D93C7F6A5
2,056,650 UART: [art] PUB.Y = 51981F8A72921E4A77A9F4E6017232EAD75248CCB63DFF13CFBB53A020FFEC09D2B0946B45D896BE627A5E12224E3A5F
2,063,604 UART: [art] SIG.R = B5BCAC3079F1F1AB56F848651F37D356640DED4BD9E930BE4D2191AF90F6D1DD4EDAB85AAA2ED14FBF8708220DF6E029
2,070,387 UART: [art] SIG.S = A0AD3C2DF140F379AA4E8DFB0983AE466689C67960A5D9500507F54422B77D64F5D50D4B75F8A5C59C26065B90931BE3
2,094,220 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,518 ready_for_fw is high
1,056,518 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,848 >>> mbox cmd response: success
1,614,670 UART:
1,614,686 UART: Running Caliptra FMC ...
1,615,094 UART:
1,615,148 UART: [state] CFI Enabled
1,625,385 UART: [fht] FMC Alias Private Key: 7
1,732,374 UART: [art] Extend RT PCRs Done
1,732,802 UART: [art] Lock RT PCRs Done
1,734,330 UART: [art] Populate DV Done
1,742,401 UART: [fht] FMC Alias Private Key: 7
1,743,497 UART: [art] Derive CDI
1,743,777 UART: [art] Store in in slot 0x4
1,829,732 UART: [art] Derive Key Pair
1,830,092 UART: [art] Store priv key in slot 0x5
1,842,666 UART: [art] Derive Key Pair - Done
1,857,459 UART: [art] Signing Cert with AUTHO
1,857,939 UART: RITY.KEYID = 7
1,873,017 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,782 UART: [art] PUB.X = A1E4A4812708A395B3634306D1D752AB7F8B104D182952D8E266741058363C8E7B87C94A6727705911355D1668B04CD5
1,880,530 UART: [art] PUB.Y = 5554C4824A0422B3B985D586A2AD712FECAE78DFA68C32CBE767D732B2D01A66FF1B50A7CAE4CD19BE8EC5328F006CB6
1,887,473 UART: [art] SIG.R = 4C8EBCCB171B0313FF3E4B1DA24E174C9B5C3408FB0AD505DA913CB8CED2B039F1041ED53A02478B2176DF7664FCDFDB
1,894,247 UART: [art] SIG.S = 00D5D4C5C7D09C3D1564AF281624212F25A1C0B204F129372C5978EFDF2FC471D3D0F46F67936DCCCBB3B84DE5A36304
1,918,081 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,169,974 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 ready_for_fw is high
1,174,404 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,555 UART: [ldev] Erasing FE.KEYID = 1
1,242,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,305 UART: [fwproc] Wait for Commands...
1,281,970 UART: [fwproc] Recv command 0x46574c44
1,282,703 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,473 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,297 >>> mbox cmd response: success
1,702,484 UART: [afmc] ++
1,702,652 UART: [afmc] CDI.KEYID = 6
1,703,015 UART: [afmc] SUBJECT.KEYID = 7
1,703,441 UART: [afmc] AUTHORITY.KEYID = 5
1,739,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,756,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,762,364 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,768,247 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,966 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,782,029 UART: [afmc] --
1,783,051 UART: [cold-reset] --
1,783,725 UART: [state] Locking Datavault
1,784,764 UART: [state] Locking PCR0, PCR1 and PCR31
1,785,368 UART: [state] Locking ICCM
1,785,862 UART: [exit] Launching FMC @ 0x40000130
1,791,191 UART:
1,791,207 UART: Running Caliptra FMC ...
1,791,615 UART:
1,791,758 UART: [state] CFI Enabled
1,802,623 UART: [fht] FMC Alias Private Key: 7
1,910,768 UART: [art] Extend RT PCRs Done
1,911,196 UART: [art] Lock RT PCRs Done
1,912,808 UART: [art] Populate DV Done
1,921,055 UART: [fht] FMC Alias Private Key: 7
1,922,101 UART: [art] Derive CDI
1,922,381 UART: [art] Store in in slot 0x4
2,008,282 UART: [art] Derive Key Pair
2,008,642 UART: [art] Store priv key in slot 0x5
2,021,824 UART: [art] Derive Key Pair - Done
2,036,653 UART: [art] Signing Cert with AUTHO
2,037,133 UART: RITY.KEYID = 7
2,052,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,074 UART: [art] PUB.X = 0A5D26B629651586BAF8332E8B9EB532403A2C344AB7541DF605250429B115157B06BCF726D4721D2EA219B8FA38C6C8
2,059,830 UART: [art] PUB.Y = 9DCAA79E10A0E0711DF5926FCF8F96CDCBFB1794EAD3F1AB0E5413F8C480B4A4472F0AC1D59D10DF123798B833CA5F22
2,066,794 UART: [art] SIG.R = 8C998E710C41F03F1481330AE8137ABF9D4F14B456217351494D329C3465326638CC6E150BF9FEDED9C5A85C8A1C7A2A
2,073,557 UART: [art] SIG.S = EA7C993FF49E60808EC09FE5C2B636123369E060BBE836F57595D113167A3DC51AE535EBBBFAC3F2025E35D2B5A895E3
2,097,176 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,723 ready_for_fw is high
1,056,723 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,551,835 >>> mbox cmd response: success
1,614,081 UART:
1,614,097 UART: Running Caliptra FMC ...
1,614,505 UART:
1,614,648 UART: [state] CFI Enabled
1,625,273 UART: [fht] FMC Alias Private Key: 7
1,733,556 UART: [art] Extend RT PCRs Done
1,733,984 UART: [art] Lock RT PCRs Done
1,735,568 UART: [art] Populate DV Done
1,743,563 UART: [fht] FMC Alias Private Key: 7
1,744,519 UART: [art] Derive CDI
1,744,799 UART: [art] Store in in slot 0x4
1,830,216 UART: [art] Derive Key Pair
1,830,576 UART: [art] Store priv key in slot 0x5
1,843,882 UART: [art] Derive Key Pair - Done
1,858,712 UART: [art] Signing Cert with AUTHO
1,859,192 UART: RITY.KEYID = 7
1,874,252 UART: [art] Erasing AUTHORITY.KEYID = 7
1,875,017 UART: [art] PUB.X = AE4B1248D1B8F2FF624C5F9D024634EA48B52B5CFEEFE85329EE5E8C91C321821A45BADF6858826D0BE0CA69EFB0DCA6
1,881,803 UART: [art] PUB.Y = BF9140AEC968F97962AE202775AAFD4EBE7416F89BE9DADAB17C47111A543B7A3F3F3EF2690EA1322155DF0AC676CBFC
1,888,767 UART: [art] SIG.R = 6BAE1C84714326C4E2B3DD1C4EEF096402235FDCD8F0172051100D63041F70ADA626E8516B0FC3F2D2077E382613D6F4
1,895,521 UART: [art] SIG.S = 288AC5343E58BB38987DDAB59FC881C7BB7D5B947488DA1C23EEFFEDC877607241A31BD66F0E0E3C6E9250DA52CD1663
1,919,145 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,129 UART:
192,489 UART: Running Caliptra ROM ...
193,624 UART:
193,766 UART: [state] CFI Enabled
260,312 UART: [state] LifecycleState = Unprovisioned
262,279 UART: [state] DebugLocked = No
263,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,537 UART: [kat] SHA2-256
437,246 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,744 UART: [kat] ++
448,283 UART: [kat] sha1
459,083 UART: [kat] SHA2-256
461,757 UART: [kat] SHA2-384
466,753 UART: [kat] SHA2-512-ACC
469,116 UART: [kat] ECC-384
2,765,543 UART: [kat] HMAC-384Kdf
2,797,230 UART: [kat] LMS
3,987,581 UART: [kat] --
3,991,928 UART: [cold-reset] ++
3,993,498 UART: [fht] Storing FHT @ 0x50003400
4,005,314 UART: [idev] ++
4,005,889 UART: [idev] CDI.KEYID = 6
4,006,842 UART: [idev] SUBJECT.KEYID = 7
4,008,082 UART: [idev] UDS.KEYID = 0
4,009,052 ready_for_fw is high
4,009,247 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,049,336 UART: [idev] Erasing UDS.KEYID = 0
7,342,973 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,724 UART: [idev] --
7,368,970 UART: [ldev] ++
7,369,606 UART: [ldev] CDI.KEYID = 6
7,370,671 UART: [ldev] SUBJECT.KEYID = 5
7,371,773 UART: [ldev] AUTHORITY.KEYID = 7
7,373,001 UART: [ldev] FE.KEYID = 1
7,418,701 UART: [ldev] Erasing FE.KEYID = 1
10,752,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,588 UART: [ldev] --
13,132,513 UART: [fwproc] Waiting for Commands...
13,134,877 UART: [fwproc] Received command 0x46574c44
13,137,119 UART: [fwproc] Received Image of size 31676 bytes
16,184,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,256,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,325,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,354,770 >>> mbox cmd response: success
16,358,073 UART: [afmc] ++
16,358,650 UART: [afmc] CDI.KEYID = 6
16,359,611 UART: [afmc] SUBJECT.KEYID = 7
16,360,879 UART: [afmc] AUTHORITY.KEYID = 5
19,726,682 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,023,896 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,026,150 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,040,568 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,055,399 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,069,794 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,091,234 UART: [afmc] --
22,095,598 UART: [cold-reset] --
22,099,265 UART: [state] Locking Datavault
22,104,622 UART: [state] Locking PCR0, PCR1 and PCR31
22,106,314 UART: [state] Locking ICCM
22,109,104 UART: [exit] Launching FMC @ 0x40000130
22,117,502 UART:
22,117,735 UART: Running Caliptra FMC ...
22,118,832 UART:
22,118,994 UART: [state] CFI Enabled
22,183,023 UART: [fht] FMC Alias Private Key: 7
24,520,671 UART: [art] Extend RT PCRs Done
24,521,888 UART: [art] Lock RT PCRs Done
24,523,640 UART: [art] Populate DV Done
24,529,144 UART: [fht] FMC Alias Private Key: 7
24,530,624 UART: [art] Derive CDI
24,531,351 UART: [art] Store in in slot 0x4
24,591,621 UART: [art] Derive Key Pair
24,592,681 UART: [art] Store priv key in slot 0x5
27,885,408 UART: [art] Derive Key Pair - Done
27,898,479 UART: [art] Signing Cert with AUTHO
27,899,788 UART: RITY.KEYID = 7
30,187,158 UART: [art] Erasing AUTHORITY.KEYID = 7
30,188,661 UART: [art] PUB.X = D40DF8FF95C74BB012105E4BB7BD23E26767053EE81DAE905C99426801192FCA502836C24D4C72D478D47245A22B52FE
30,195,939 UART: [art] PUB.Y = 9FA2914A0E37A880F673945A5E4D66CE78B7F60872374C6B38965DE43942B1818EFFF0AED5FBED072EB2E558F15C4288
30,203,148 UART: [art] SIG.R = 4A98C96A0B4E29DC5E2A86B29E8374679B40A3B495D1386590A5DB0097771404C91FC2C88B93DC657FD92FAF2828A738
30,210,516 UART: [art] SIG.S = 003F7A9B55C710DC798BA1F755B17F7847339E3DB1237A2554BB4AAED07BFC1F4BB2A7A3EB83B49CC9516E3562F53B5E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,786,769 ready_for_fw is high
3,787,152 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,196,587 >>> mbox cmd response: success
21,882,332 UART:
21,882,728 UART: Running Caliptra FMC ...
21,883,867 UART:
21,884,022 UART: [state] CFI Enabled
21,952,684 UART: [fht] FMC Alias Private Key: 7
24,290,726 UART: [art] Extend RT PCRs Done
24,291,947 UART: [art] Lock RT PCRs Done
24,293,884 UART: [art] Populate DV Done
24,299,318 UART: [fht] FMC Alias Private Key: 7
24,301,019 UART: [art] Derive CDI
24,301,753 UART: [art] Store in in slot 0x4
24,361,316 UART: [art] Derive Key Pair
24,362,311 UART: [art] Store priv key in slot 0x5
27,654,412 UART: [art] Derive Key Pair - Done
27,666,979 UART: [art] Signing Cert with AUTHO
27,668,278 UART: RITY.KEYID = 7
29,955,727 UART: [art] Erasing AUTHORITY.KEYID = 7
29,957,250 UART: [art] PUB.X = 760E9CB5F982EB4BCEBFE8E78CAEF8221E0E16268FE9453D2D3353E85841D80CAA83D11D1B680B01A8C9D004BFB43E20
29,964,448 UART: [art] PUB.Y = 3AA8B2718D51286EF470A49B236B5177E8D1A5DD1E39FC3449318C21C21F415E25E897756601C03CDBCDFC2DE51DC727
29,971,740 UART: [art] SIG.R = 9C0B8086E9416F4174DF28A8FEA508514791B147CCF14BBF280B4CC2F81E76352D933F76E11F2CE9612A5C04DEB469CF
29,979,145 UART: [art] SIG.S = E841B29C14C08387FFF3754307C8F07632971870E93308C230FCB8499E4AAE6B40D6536E26F57E9988DFF011B9862354
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,581 writing to cptra_bootfsm_go
193,653 UART:
194,008 UART: Running Caliptra ROM ...
195,188 UART:
604,871 UART: [state] CFI Enabled
617,763 UART: [state] LifecycleState = Unprovisioned
619,682 UART: [state] DebugLocked = No
622,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,537 UART: [kat] SHA2-256
797,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,784 UART: [kat] ++
808,305 UART: [kat] sha1
819,242 UART: [kat] SHA2-256
821,965 UART: [kat] SHA2-384
828,666 UART: [kat] SHA2-512-ACC
831,033 UART: [kat] ECC-384
3,116,034 UART: [kat] HMAC-384Kdf
3,128,682 UART: [kat] LMS
4,318,790 UART: [kat] --
4,324,167 UART: [cold-reset] ++
4,326,413 UART: [fht] Storing FHT @ 0x50003400
4,337,970 UART: [idev] ++
4,338,528 UART: [idev] CDI.KEYID = 6
4,339,557 UART: [idev] SUBJECT.KEYID = 7
4,340,737 UART: [idev] UDS.KEYID = 0
4,341,819 ready_for_fw is high
4,342,037 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,382,029 UART: [idev] Erasing UDS.KEYID = 0
7,630,902 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,152 UART: [idev] --
7,658,273 UART: [ldev] ++
7,658,836 UART: [ldev] CDI.KEYID = 6
7,659,818 UART: [ldev] SUBJECT.KEYID = 5
7,661,030 UART: [ldev] AUTHORITY.KEYID = 7
7,662,264 UART: [ldev] FE.KEYID = 1
7,671,879 UART: [ldev] Erasing FE.KEYID = 1
10,960,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,730 UART: [ldev] --
13,321,083 UART: [fwproc] Waiting for Commands...
13,323,988 UART: [fwproc] Received command 0x46574c44
13,326,171 UART: [fwproc] Received Image of size 31676 bytes
16,367,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,447,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,516,277 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,545,370 >>> mbox cmd response: success
16,549,162 UART: [afmc] ++
16,549,741 UART: [afmc] CDI.KEYID = 6
16,550,703 UART: [afmc] SUBJECT.KEYID = 7
16,551,911 UART: [afmc] AUTHORITY.KEYID = 5
19,865,795 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,161,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,163,663 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,178,041 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,192,863 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,207,324 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,228,631 UART: [afmc] --
22,232,770 UART: [cold-reset] --
22,237,655 UART: [state] Locking Datavault
22,241,712 UART: [state] Locking PCR0, PCR1 and PCR31
22,243,501 UART: [state] Locking ICCM
22,245,330 UART: [exit] Launching FMC @ 0x40000130
22,253,672 UART:
22,253,914 UART: Running Caliptra FMC ...
22,255,014 UART:
22,255,172 UART: [state] CFI Enabled
22,263,300 UART: [fht] FMC Alias Private Key: 7
24,594,269 UART: [art] Extend RT PCRs Done
24,595,481 UART: [art] Lock RT PCRs Done
24,597,204 UART: [art] Populate DV Done
24,602,669 UART: [fht] FMC Alias Private Key: 7
24,604,261 UART: [art] Derive CDI
24,605,071 UART: [art] Store in in slot 0x4
24,647,006 UART: [art] Derive Key Pair
24,648,043 UART: [art] Store priv key in slot 0x5
27,890,060 UART: [art] Derive Key Pair - Done
27,902,738 UART: [art] Signing Cert with AUTHO
27,904,037 UART: RITY.KEYID = 7
30,183,206 UART: [art] Erasing AUTHORITY.KEYID = 7
30,184,719 UART: [art] PUB.X = 9DFC0CFF5193B51F18B06F65DFF3B77BEA09DADCA3E733878AFF995D2127F88003139A20CCFCA4B7EB452B952517CEB2
30,191,969 UART: [art] PUB.Y = 7BBADE076FD986A557748CD680615F077390415786830F97D241D26CF5B05498722FC7575B3B73F4B0C5507FB71500F8
30,199,155 UART: [art] SIG.R = 0D599062680709812D49A3A2F981F70AF3721F7E21FB32056F3008DB4974BF6A28BB17C3DF5307F176BB319D584D816C
30,206,561 UART: [art] SIG.S = 35B02A9FEAFF8E5B2565359D84F2D58738E6FA6243BA6CAB8E5811C1881F581E070134C34BF66625A723C576211A5AFF
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
4,127,022 ready_for_fw is high
4,127,613 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,390,415 >>> mbox cmd response: success
22,030,675 UART:
22,031,068 UART: Running Caliptra FMC ...
22,032,285 UART:
22,032,461 UART: [state] CFI Enabled
22,040,243 UART: [fht] FMC Alias Private Key: 7
24,371,173 UART: [art] Extend RT PCRs Done
24,372,410 UART: [art] Lock RT PCRs Done
24,374,009 UART: [art] Populate DV Done
24,379,360 UART: [fht] FMC Alias Private Key: 7
24,380,854 UART: [art] Derive CDI
24,381,621 UART: [art] Store in in slot 0x4
24,424,264 UART: [art] Derive Key Pair
24,425,309 UART: [art] Store priv key in slot 0x5
27,667,600 UART: [art] Derive Key Pair - Done
27,680,608 UART: [art] Signing Cert with AUTHO
27,681,916 UART: RITY.KEYID = 7
29,961,769 UART: [art] Erasing AUTHORITY.KEYID = 7
29,963,282 UART: [art] PUB.X = 602A7151DBB34405C39F7182E25A620EADDD6AD551D36FC50337E4F1C3790C8E1660A6E0063166FC25503F32FC7A3616
29,970,533 UART: [art] PUB.Y = B7FB1B26818A83AF9F5B296E27251E5369961FF9E1A1D1CCB3A2709BCCB6677F17614590A57C638B62757EAE214EAD40
29,977,739 UART: [art] SIG.R = 0F9072139AC2EDD3FFB8305D72D5886C92C4AA24A42E23EE3EA7A575CC434FEBFB2AD8F084AFC608A8C516D62F2D693F
29,985,140 UART: [art] SIG.S = B1381DA90845206EAE41AC76FA14F794C961879624D0D550C66908C25D2B899969A04FA5A535DB3AC3E8C57A4A5F26DC
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
191,991 UART:
192,355 UART: Running Caliptra ROM ...
193,452 UART:
193,596 UART: [state] CFI Enabled
264,624 UART: [state] LifecycleState = Unprovisioned
266,524 UART: [state] DebugLocked = No
267,913 UART: [state] WD Timer not started. Device not locked for debugging
271,881 UART: [kat] SHA2-256
451,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,566 UART: [kat] ++
463,112 UART: [kat] sha1
472,853 UART: [kat] SHA2-256
475,926 UART: [kat] SHA2-384
481,482 UART: [kat] SHA2-512-ACC
484,484 UART: [kat] ECC-384
2,948,808 UART: [kat] HMAC-384Kdf
2,972,122 UART: [kat] LMS
3,501,589 UART: [kat] --
3,508,136 UART: [cold-reset] ++
3,509,775 UART: [fht] FHT @ 0x50003400
3,521,178 UART: [idev] ++
3,521,739 UART: [idev] CDI.KEYID = 6
3,522,769 UART: [idev] SUBJECT.KEYID = 7
3,523,871 UART: [idev] UDS.KEYID = 0
3,524,766 ready_for_fw is high
3,524,948 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,565,187 UART: [idev] Erasing UDS.KEYID = 0
6,031,431 UART: [idev] Sha1 KeyId Algorithm
6,054,424 UART: [idev] --
6,058,206 UART: [ldev] ++
6,058,782 UART: [ldev] CDI.KEYID = 6
6,059,696 UART: [ldev] SUBJECT.KEYID = 5
6,060,861 UART: [ldev] AUTHORITY.KEYID = 7
6,062,149 UART: [ldev] FE.KEYID = 1
6,099,416 UART: [ldev] Erasing FE.KEYID = 1
8,600,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,070 UART: [ldev] --
10,392,935 UART: [fwproc] Wait for Commands...
10,395,207 UART: [fwproc] Recv command 0x46574c44
10,397,297 UART: [fwproc] Recv'd Img size: 31656 bytes
12,788,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,864,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,933,259 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,961,647 >>> mbox cmd response: success
12,966,338 UART: [afmc] ++
12,966,919 UART: [afmc] CDI.KEYID = 6
12,967,799 UART: [afmc] SUBJECT.KEYID = 7
12,969,018 UART: [afmc] AUTHORITY.KEYID = 5
15,508,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,225,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,227,688 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,243,476 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,259,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,275,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,298,316 UART: [afmc] --
17,302,214 UART: [cold-reset] --
17,305,706 UART: [state] Locking Datavault
17,311,602 UART: [state] Locking PCR0, PCR1 and PCR31
17,313,299 UART: [state] Locking ICCM
17,314,529 UART: [exit] Launching FMC @ 0x40000130
17,322,926 UART:
17,323,168 UART: Running Caliptra FMC ...
17,324,270 UART:
17,324,424 UART: [state] CFI Enabled
17,387,439 UART: [fht] FMC Alias Private Key: 7
19,151,221 UART: [art] Extend RT PCRs Done
19,152,439 UART: [art] Lock RT PCRs Done
19,154,028 UART: [art] Populate DV Done
19,159,374 UART: [fht] FMC Alias Private Key: 7
19,161,017 UART: [art] Derive CDI
19,161,773 UART: [art] Store in in slot 0x4
19,220,373 UART: [art] Derive Key Pair
19,221,416 UART: [art] Store priv key in slot 0x5
21,684,095 UART: [art] Derive Key Pair - Done
21,697,360 UART: [art] Signing Cert with AUTHO
21,698,694 UART: RITY.KEYID = 7
23,410,436 UART: [art] Erasing AUTHORITY.KEYID = 7
23,411,941 UART: [art] PUB.X = B886BC298AF9E479E472A23D80B73DC462EADFE14FD43E6CE9D6ABF4972DA096D19D149E6B408CA7CE3D9C8DA35E8EC6
23,419,184 UART: [art] PUB.Y = 24A7FDE415325D0B820673FD641F75A01F571127C75CFE8A5543116B7AE2DC4A6D0599D91DCE97386A07E6D5047B13E1
23,426,472 UART: [art] SIG.R = 89EC4CBDB6A52E13FFE496EF38B5AB583C2984291FA95EF070AD626D55E38D7FE81AD5EEFF30E29A6A726766330966C9
23,433,867 UART: [art] SIG.S = 1A805A990C932E7CFB4E8A96CE0DF2C65099FF1BA20EB4BB40EAD80B6395A6B739646893A2A83E45613B6481EE4C4760
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,359,220 ready_for_fw is high
3,359,672 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,756,553 >>> mbox cmd response: success
17,041,807 UART:
17,042,177 UART: Running Caliptra FMC ...
17,043,382 UART:
17,043,546 UART: [state] CFI Enabled
17,109,881 UART: [fht] FMC Alias Private Key: 7
18,873,682 UART: [art] Extend RT PCRs Done
18,874,896 UART: [art] Lock RT PCRs Done
18,876,252 UART: [art] Populate DV Done
18,881,594 UART: [fht] FMC Alias Private Key: 7
18,883,256 UART: [art] Derive CDI
18,884,075 UART: [art] Store in in slot 0x4
18,943,188 UART: [art] Derive Key Pair
18,944,232 UART: [art] Store priv key in slot 0x5
21,407,463 UART: [art] Derive Key Pair - Done
21,420,357 UART: [art] Signing Cert with AUTHO
21,421,659 UART: RITY.KEYID = 7
23,133,315 UART: [art] Erasing AUTHORITY.KEYID = 7
23,134,818 UART: [art] PUB.X = 5A8F8269CEF76F4623BAE1F628FAA47F322A2CD6234A271F48C918F057B40559865A7D3E766024EECF702A2EC4A74E33
23,142,104 UART: [art] PUB.Y = 3D887DA12173B45318EB1591C34E38AA993540623622DCAAE44014AF2EF99B4AB688C84535188E13DEE6250D6B6DDFB5
23,149,346 UART: [art] SIG.R = 807635EBD5B374B9C9B944A441720502973ECB539B73305B9F4FE20C24F3A2F63305C508B7944C25DA30079CCEDD21FA
23,156,710 UART: [art] SIG.S = CC98C9AAD8F0D35A0369BB0CD91DF200B65C1FB4C36C7A13BF912958651A0611D80037CA28E5020125BA68A4C9199168
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,402 UART:
192,744 UART: Running Caliptra ROM ...
193,844 UART:
603,496 UART: [state] CFI Enabled
615,807 UART: [state] LifecycleState = Unprovisioned
617,658 UART: [state] DebugLocked = No
619,456 UART: [state] WD Timer not started. Device not locked for debugging
623,691 UART: [kat] SHA2-256
802,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,422 UART: [kat] ++
814,860 UART: [kat] sha1
826,222 UART: [kat] SHA2-256
829,229 UART: [kat] SHA2-384
834,510 UART: [kat] SHA2-512-ACC
837,514 UART: [kat] ECC-384
3,278,213 UART: [kat] HMAC-384Kdf
3,291,144 UART: [kat] LMS
3,820,595 UART: [kat] --
3,824,021 UART: [cold-reset] ++
3,825,547 UART: [fht] FHT @ 0x50003400
3,836,455 UART: [idev] ++
3,837,011 UART: [idev] CDI.KEYID = 6
3,837,960 UART: [idev] SUBJECT.KEYID = 7
3,839,125 UART: [idev] UDS.KEYID = 0
3,840,088 ready_for_fw is high
3,840,301 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,880,469 UART: [idev] Erasing UDS.KEYID = 0
6,318,568 UART: [idev] Sha1 KeyId Algorithm
6,341,579 UART: [idev] --
6,346,426 UART: [ldev] ++
6,346,990 UART: [ldev] CDI.KEYID = 6
6,347,922 UART: [ldev] SUBJECT.KEYID = 5
6,349,128 UART: [ldev] AUTHORITY.KEYID = 7
6,350,275 UART: [ldev] FE.KEYID = 1
6,363,026 UART: [ldev] Erasing FE.KEYID = 1
8,838,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,192 UART: [ldev] --
10,628,212 UART: [fwproc] Wait for Commands...
10,630,192 UART: [fwproc] Recv command 0x46574c44
10,632,278 UART: [fwproc] Recv'd Img size: 31656 bytes
13,025,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,103,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,171,811 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,200,573 >>> mbox cmd response: success
13,205,245 UART: [afmc] ++
13,205,821 UART: [afmc] CDI.KEYID = 6
13,206,725 UART: [afmc] SUBJECT.KEYID = 7
13,207,958 UART: [afmc] AUTHORITY.KEYID = 5
15,704,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,424,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,426,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,442,221 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,458,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,474,100 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,497,702 UART: [afmc] --
17,502,071 UART: [cold-reset] --
17,506,201 UART: [state] Locking Datavault
17,510,583 UART: [state] Locking PCR0, PCR1 and PCR31
17,512,224 UART: [state] Locking ICCM
17,513,667 UART: [exit] Launching FMC @ 0x40000130
17,522,063 UART:
17,522,299 UART: Running Caliptra FMC ...
17,523,394 UART:
17,523,569 UART: [state] CFI Enabled
17,531,724 UART: [fht] FMC Alias Private Key: 7
19,288,425 UART: [art] Extend RT PCRs Done
19,289,645 UART: [art] Lock RT PCRs Done
19,291,409 UART: [art] Populate DV Done
19,296,808 UART: [fht] FMC Alias Private Key: 7
19,298,400 UART: [art] Derive CDI
19,299,144 UART: [art] Store in in slot 0x4
19,341,723 UART: [art] Derive Key Pair
19,342,765 UART: [art] Store priv key in slot 0x5
21,769,257 UART: [art] Derive Key Pair - Done
21,782,524 UART: [art] Signing Cert with AUTHO
21,783,827 UART: RITY.KEYID = 7
23,488,924 UART: [art] Erasing AUTHORITY.KEYID = 7
23,490,429 UART: [art] PUB.X = DFF49077151978EC5CDD8744F57DAD7395A7677BC9C0BD4A4D62967952BA7C252443E647B081F974EEEB800B77E5092D
23,497,736 UART: [art] PUB.Y = 7C126AE8974DDBBC3AFBCBA1A81C3A37F68043D3A63DD8D34B24476AC3291053487D930F4FEFD662245005F551734CBF
23,504,988 UART: [art] SIG.R = D9CA16155996D811B366F0B0EEB270DCA085DC7151322CAADB3BAA991C4F014BB02FBE9436789465F30ACC7D7402BCF3
23,512,389 UART: [art] SIG.S = F58EE8B5806A6E88B612E62C8D8D5D28A416432FEA1BF80BE1CD4BD3CBC6B30187EBCF1CEB02556FF612C3E287C33C42
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,692,303 ready_for_fw is high
3,692,837 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,970,603 >>> mbox cmd response: success
17,218,486 UART:
17,218,864 UART: Running Caliptra FMC ...
17,220,072 UART:
17,220,242 UART: [state] CFI Enabled
17,228,076 UART: [fht] FMC Alias Private Key: 7
18,984,917 UART: [art] Extend RT PCRs Done
18,986,138 UART: [art] Lock RT PCRs Done
18,987,714 UART: [art] Populate DV Done
18,992,844 UART: [fht] FMC Alias Private Key: 7
18,994,491 UART: [art] Derive CDI
18,995,306 UART: [art] Store in in slot 0x4
19,037,697 UART: [art] Derive Key Pair
19,038,742 UART: [art] Store priv key in slot 0x5
21,465,848 UART: [art] Derive Key Pair - Done
21,478,686 UART: [art] Signing Cert with AUTHO
21,479,983 UART: RITY.KEYID = 7
23,185,022 UART: [art] Erasing AUTHORITY.KEYID = 7
23,186,675 UART: [art] PUB.X = F3F253DF5EE65AD9FAB9B5EC6CAED1CE6DFFB5BD54F64C5C2FEDEF614A2E3EF9737CF450A30F6C22BF7718619601AF21
23,193,871 UART: [art] PUB.Y = 52A0C30C6403B74D45D843B53D8A1FE52DDB20156BCC0A0EFE8127204FC4562A12CFD45A08380B14D092C27A9EBCCCF4
23,201,124 UART: [art] SIG.R = EB96EFBD3DA64B8FEDD6F96D71B8F7F24AB24542BDB1F1DD42C34F41754D2C9F079F9AE44E34C0F41E24856E4248500B
23,208,514 UART: [art] SIG.S = C0E0BE7F08ED1C1B912DE044B3DB59725295305C3416E4A0B48345C23A5A6C0EC6F3B0FE1800300093AEAD5C909A7814
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
191,987 UART:
192,350 UART: Running Caliptra ROM ...
193,476 UART:
193,642 UART: [state] CFI Enabled
266,059 UART: [state] LifecycleState = Unprovisioned
268,453 UART: [state] DebugLocked = No
269,633 UART: [state] WD Timer not started. Device not locked for debugging
274,237 UART: [kat] SHA2-256
464,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,883 UART: [kat] ++
475,358 UART: [kat] sha1
487,078 UART: [kat] SHA2-256
490,092 UART: [kat] SHA2-384
495,731 UART: [kat] SHA2-512-ACC
498,305 UART: [kat] ECC-384
2,949,234 UART: [kat] HMAC-384Kdf
2,972,264 UART: [kat] LMS
3,504,041 UART: [kat] --
3,507,276 UART: [cold-reset] ++
3,508,797 UART: [fht] FHT @ 0x50003400
3,519,424 UART: [idev] ++
3,520,127 UART: [idev] CDI.KEYID = 6
3,521,003 UART: [idev] SUBJECT.KEYID = 7
3,522,248 UART: [idev] UDS.KEYID = 0
3,523,141 ready_for_fw is high
3,523,326 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,563,550 UART: [idev] Erasing UDS.KEYID = 0
6,029,346 UART: [idev] Sha1 KeyId Algorithm
6,051,108 UART: [idev] --
6,055,298 UART: [ldev] ++
6,055,986 UART: [ldev] CDI.KEYID = 6
6,056,868 UART: [ldev] SUBJECT.KEYID = 5
6,058,081 UART: [ldev] AUTHORITY.KEYID = 7
6,059,256 UART: [ldev] FE.KEYID = 1
6,099,468 UART: [ldev] Erasing FE.KEYID = 1
8,603,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,045 UART: [ldev] --
10,412,144 UART: [fwproc] Wait for Commands...
10,414,231 UART: [fwproc] Recv command 0x46574c44
10,416,539 UART: [fwproc] Recv'd Img size: 31656 bytes
12,849,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,930,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,046,903 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,092,785 >>> mbox cmd response: success
13,096,198 UART: [afmc] ++
13,096,847 UART: [afmc] CDI.KEYID = 6
13,098,035 UART: [afmc] SUBJECT.KEYID = 7
13,099,497 UART: [afmc] AUTHORITY.KEYID = 5
15,631,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,357,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,359,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,374,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,389,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,404,907 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,429,452 UART: [afmc] --
17,433,323 UART: [cold-reset] --
17,438,270 UART: [state] Locking Datavault
17,444,769 UART: [state] Locking PCR0, PCR1 and PCR31
17,446,913 UART: [state] Locking ICCM
17,448,262 UART: [exit] Launching FMC @ 0x40000130
17,456,944 UART:
17,457,181 UART: Running Caliptra FMC ...
17,458,217 UART:
17,458,380 UART: [state] CFI Enabled
17,515,463 UART: [fht] FMC Alias Private Key: 7
19,279,775 UART: [art] Extend RT PCRs Done
19,280,992 UART: [art] Lock RT PCRs Done
19,282,915 UART: [art] Populate DV Done
19,288,203 UART: [fht] FMC Alias Private Key: 7
19,289,901 UART: [art] Derive CDI
19,290,629 UART: [art] Store in in slot 0x4
19,348,144 UART: [art] Derive Key Pair
19,349,185 UART: [art] Store priv key in slot 0x5
21,812,377 UART: [art] Derive Key Pair - Done
21,825,540 UART: [art] Signing Cert with AUTHO
21,826,838 UART: RITY.KEYID = 7
23,538,105 UART: [art] Erasing AUTHORITY.KEYID = 7
23,539,601 UART: [art] PUB.X = 32619EBAB89E23E6AAFE22B60D825F9672E8CF91369FF6DDA10F5BD1394C34717B38424E48F8ACCC4F66C8910D2744DD
23,546,894 UART: [art] PUB.Y = 001E123B47B668FA60A487F454DFCF700BED3290521ED00F788A05F7D32226F0C7B037D3081E3DB4E605DE2CA9E0F71D
23,554,136 UART: [art] SIG.R = 78CC6BAFEA543F25833599E53375E26D9437223B77ABBA7275981593F76462B6AF2CAEF90FE896132DB09E6E05C1C40C
23,561,556 UART: [art] SIG.S = 5DC097C3BC4C8DC66F970280269967FF6E34E0037DD2844C7402769AD28764DA17278E1AFB633FFE6D4230505C498D31
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,435,286 ready_for_fw is high
3,435,894 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,964,325 >>> mbox cmd response: success
17,250,688 UART:
17,251,090 UART: Running Caliptra FMC ...
17,252,294 UART:
17,252,455 UART: [state] CFI Enabled
17,320,733 UART: [fht] FMC Alias Private Key: 7
19,085,212 UART: [art] Extend RT PCRs Done
19,086,435 UART: [art] Lock RT PCRs Done
19,088,390 UART: [art] Populate DV Done
19,093,894 UART: [fht] FMC Alias Private Key: 7
19,095,542 UART: [art] Derive CDI
19,096,365 UART: [art] Store in in slot 0x4
19,153,284 UART: [art] Derive Key Pair
19,154,325 UART: [art] Store priv key in slot 0x5
21,618,506 UART: [art] Derive Key Pair - Done
21,631,522 UART: [art] Signing Cert with AUTHO
21,632,824 UART: RITY.KEYID = 7
23,344,703 UART: [art] Erasing AUTHORITY.KEYID = 7
23,346,218 UART: [art] PUB.X = 817F8B61BCE261E110671EBC74CD046A7819A9242E3F0C829FBE4D8878F305440F2E0A00A101030AC4BE8401B32B7E4B
23,353,446 UART: [art] PUB.Y = C9EAE657F770A1041DD673FDB3BBB33BFD301D2D48114351E5E8520F72746F0DC11F6C595398D64EFC53060CE5DA425A
23,360,754 UART: [art] SIG.R = 8541990B8F33567C8B0A3878BA372C3B53C53DAF744576F1372BA3DDB3FEED8501685EC4FD4328C945C7D26CEED10D46
23,368,131 UART: [art] SIG.S = 70D77B324D2499D2D8717627CB77C7CB165C5B1105AF1D7BC659093E9147F608E4DB31361E0E277B8184BA51113927CF
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,736 UART:
193,102 UART: Running Caliptra ROM ...
194,187 UART:
603,712 UART: [state] CFI Enabled
616,111 UART: [state] LifecycleState = Unprovisioned
618,460 UART: [state] DebugLocked = No
620,343 UART: [state] WD Timer not started. Device not locked for debugging
624,180 UART: [kat] SHA2-256
814,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,840 UART: [kat] ++
825,357 UART: [kat] sha1
836,648 UART: [kat] SHA2-256
839,654 UART: [kat] SHA2-384
846,289 UART: [kat] SHA2-512-ACC
848,871 UART: [kat] ECC-384
3,290,199 UART: [kat] HMAC-384Kdf
3,303,142 UART: [kat] LMS
3,834,988 UART: [kat] --
3,839,980 UART: [cold-reset] ++
3,842,478 UART: [fht] FHT @ 0x50003400
3,852,953 UART: [idev] ++
3,853,653 UART: [idev] CDI.KEYID = 6
3,854,600 UART: [idev] SUBJECT.KEYID = 7
3,855,862 UART: [idev] UDS.KEYID = 0
3,856,756 ready_for_fw is high
3,856,959 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,896,947 UART: [idev] Erasing UDS.KEYID = 0
6,336,786 UART: [idev] Sha1 KeyId Algorithm
6,360,392 UART: [idev] --
6,365,782 UART: [ldev] ++
6,366,455 UART: [ldev] CDI.KEYID = 6
6,367,333 UART: [ldev] SUBJECT.KEYID = 5
6,368,539 UART: [ldev] AUTHORITY.KEYID = 7
6,369,767 UART: [ldev] FE.KEYID = 1
6,381,616 UART: [ldev] Erasing FE.KEYID = 1
8,860,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,610 UART: [ldev] --
10,650,935 UART: [fwproc] Wait for Commands...
10,652,699 UART: [fwproc] Recv command 0x46574c44
10,655,002 UART: [fwproc] Recv'd Img size: 31656 bytes
13,086,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,163,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,279,519 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,325,103 >>> mbox cmd response: success
13,329,669 UART: [afmc] ++
13,330,310 UART: [afmc] CDI.KEYID = 6
13,331,492 UART: [afmc] SUBJECT.KEYID = 7
13,332,976 UART: [afmc] AUTHORITY.KEYID = 5
15,840,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,561,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,563,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,578,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,593,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,608,648 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,631,729 UART: [afmc] --
17,635,643 UART: [cold-reset] --
17,639,774 UART: [state] Locking Datavault
17,645,240 UART: [state] Locking PCR0, PCR1 and PCR31
17,647,430 UART: [state] Locking ICCM
17,650,013 UART: [exit] Launching FMC @ 0x40000130
17,658,689 UART:
17,658,926 UART: Running Caliptra FMC ...
17,660,026 UART:
17,660,184 UART: [state] CFI Enabled
17,668,504 UART: [fht] FMC Alias Private Key: 7
19,425,590 UART: [art] Extend RT PCRs Done
19,426,792 UART: [art] Lock RT PCRs Done
19,428,455 UART: [art] Populate DV Done
19,433,690 UART: [fht] FMC Alias Private Key: 7
19,435,374 UART: [art] Derive CDI
19,436,196 UART: [art] Store in in slot 0x4
19,478,779 UART: [art] Derive Key Pair
19,479,773 UART: [art] Store priv key in slot 0x5
21,907,081 UART: [art] Derive Key Pair - Done
21,919,709 UART: [art] Signing Cert with AUTHO
21,921,045 UART: RITY.KEYID = 7
23,626,342 UART: [art] Erasing AUTHORITY.KEYID = 7
23,627,828 UART: [art] PUB.X = A73B06A5F2AC357AE057DCD1994EFC6591126D89B737FAD5D225D10783A265EF4928BFB28ED8B33B3EF41C75B9998D1F
23,635,125 UART: [art] PUB.Y = 245712146D18F92C781A4E1DDA6CFF15AA3A49F3973A7B2CE7667A8B2926134E83EA7ABF14A641EF857002885322D1DE
23,642,350 UART: [art] SIG.R = 631B5D7A2C6383D372DD0A2BB17C54558D0C3C3FF5BCEC9402558DDFC46B5D50F22CCF656E0077A565FE01EC0ADDC383
23,649,736 UART: [art] SIG.S = C9053B091E52DBA85FF421ECDCE2E3663649EC383ED43F58D95DB94EFE007F4BC6C0DB345A49957160065B380CFDE20D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,754,667 ready_for_fw is high
3,755,163 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,175,780 >>> mbox cmd response: success
17,432,143 UART:
17,432,514 UART: Running Caliptra FMC ...
17,433,641 UART:
17,433,792 UART: [state] CFI Enabled
17,441,539 UART: [fht] FMC Alias Private Key: 7
19,198,019 UART: [art] Extend RT PCRs Done
19,199,249 UART: [art] Lock RT PCRs Done
19,200,845 UART: [art] Populate DV Done
19,206,186 UART: [fht] FMC Alias Private Key: 7
19,207,729 UART: [art] Derive CDI
19,208,501 UART: [art] Store in in slot 0x4
19,250,589 UART: [art] Derive Key Pair
19,251,588 UART: [art] Store priv key in slot 0x5
21,677,744 UART: [art] Derive Key Pair - Done
21,690,758 UART: [art] Signing Cert with AUTHO
21,692,067 UART: RITY.KEYID = 7
23,397,532 UART: [art] Erasing AUTHORITY.KEYID = 7
23,399,045 UART: [art] PUB.X = 9E4D1E43351752395F99CEFC96A88952F9A479C40ABB6612CB53B771F9CC9B37CEC7F32190BFDD7CF6A0DB40E0C5EAF3
23,406,294 UART: [art] PUB.Y = B936BFD4A2AE39F7657B91560BC3E58B2BB26579B7DE0F03EA60F48E23E61BE510B59478F3B9C0C3B93F6311A6E1282A
23,413,593 UART: [art] SIG.R = 8957F579C76CAF4DA3E02CAD16AA4A70FA7C247864EE49557545E3B49FC1BC1944AA329FBDF7D4F4DE05E1E1CC0AB43B
23,420,964 UART: [art] SIG.S = 58158A3F7E9761DA2CA5B611F5ABF4484C4079797E48C0EB78B6E52939B4D13E41F99566C98EC47A49A75FD3DD92B605
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,661 UART: [kat] SHA2-256
892,599 UART: [kat] SHA2-384
895,460 UART: [kat] SHA2-512-ACC
897,361 UART: [kat] ECC-384
903,112 UART: [kat] HMAC-384Kdf
907,532 UART: [kat] LMS
1,475,728 UART: [kat] --
1,476,517 UART: [cold-reset] ++
1,477,065 UART: [fht] Storing FHT @ 0x50003400
1,479,886 UART: [idev] ++
1,480,054 UART: [idev] CDI.KEYID = 6
1,480,414 UART: [idev] SUBJECT.KEYID = 7
1,480,838 UART: [idev] UDS.KEYID = 0
1,481,183 ready_for_fw is high
1,481,183 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,846 UART: [idev] Erasing UDS.KEYID = 0
1,505,344 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,896 UART: [idev] --
1,515,043 UART: [ldev] ++
1,515,211 UART: [ldev] CDI.KEYID = 6
1,515,574 UART: [ldev] SUBJECT.KEYID = 5
1,516,000 UART: [ldev] AUTHORITY.KEYID = 7
1,516,463 UART: [ldev] FE.KEYID = 1
1,521,425 UART: [ldev] Erasing FE.KEYID = 1
1,546,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,552 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,706 UART: [fwproc] Received command 0x46574c44
1,587,497 UART: [fwproc] Received Image of size 31656 bytes
1,937,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,964,844 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,994,196 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,005,979 >>> mbox cmd response: success
2,007,193 UART: [afmc] ++
2,007,361 UART: [afmc] CDI.KEYID = 6
2,007,723 UART: [afmc] SUBJECT.KEYID = 7
2,008,148 UART: [afmc] AUTHORITY.KEYID = 5
2,042,953 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,059,155 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,059,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,065,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,071,548 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,077,238 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,085,091 UART: [afmc] --
2,086,205 UART: [cold-reset] --
2,086,837 UART: [state] Locking Datavault
2,087,960 UART: [state] Locking PCR0, PCR1 and PCR31
2,088,564 UART: [state] Locking ICCM
2,089,112 UART: [exit] Launching FMC @ 0x40000130
2,094,441 UART:
2,094,457 UART: Running Caliptra FMC ...
2,094,865 UART:
2,094,919 UART: [state] CFI Enabled
2,105,424 UART: [fht] FMC Alias Private Key: 7
2,212,691 UART: [art] Extend RT PCRs Done
2,213,119 UART: [art] Lock RT PCRs Done
2,214,705 UART: [art] Populate DV Done
2,223,302 UART: [fht] FMC Alias Private Key: 7
2,224,230 UART: [art] Derive CDI
2,224,510 UART: [art] Store in in slot 0x4
2,310,035 UART: [art] Derive Key Pair
2,310,395 UART: [art] Store priv key in slot 0x5
2,323,547 UART: [art] Derive Key Pair - Done
2,338,382 UART: [art] Signing Cert with AUTHO
2,338,862 UART: RITY.KEYID = 7
2,354,064 UART: [art] Erasing AUTHORITY.KEYID = 7
2,354,829 UART: [art] PUB.X = 4A37C9471FF98D7B7A20B7954461ACF53D0BDFD425521E72FC0434406431C9D48D15B02D3CF73B4E36EE9A13E25332AF
2,361,599 UART: [art] PUB.Y = A2BAA1363C1D7E9C76A40665D082D1F891DEFA9E8A1EF79215A0E4A594A86AC497312F2D945B1D9128D791AD08008A11
2,368,527 UART: [art] SIG.R = ED0279AB33A96CC6EA0570AD7D98D37C5969E828DF032991A2B1FC55ADE554B9EF9282479EA522278BDB681306515739
2,375,287 UART: [art] SIG.S = A070A6E291C28F4B9A0D5A313E13FD9CB60E70AF303CCBE4BD312CCF436C3228840577B7AABA3CAEBF988B212D464D2F
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,851 ready_for_fw is high
1,362,851 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,857,101 >>> mbox cmd response: success
1,918,295 UART:
1,918,311 UART: Running Caliptra FMC ...
1,918,719 UART:
1,918,773 UART: [state] CFI Enabled
1,929,614 UART: [fht] FMC Alias Private Key: 7
2,037,159 UART: [art] Extend RT PCRs Done
2,037,587 UART: [art] Lock RT PCRs Done
2,039,271 UART: [art] Populate DV Done
2,047,482 UART: [fht] FMC Alias Private Key: 7
2,048,464 UART: [art] Derive CDI
2,048,744 UART: [art] Store in in slot 0x4
2,134,577 UART: [art] Derive Key Pair
2,134,937 UART: [art] Store priv key in slot 0x5
2,148,371 UART: [art] Derive Key Pair - Done
2,163,136 UART: [art] Signing Cert with AUTHO
2,163,616 UART: RITY.KEYID = 7
2,179,056 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,821 UART: [art] PUB.X = 2F206291C7BC6811D0482BFBEE2A60BE0CD1AC7AA6D009B99BC652801EB1CC4BC9E0B0050DA6C3C2525B06020DF0C40C
2,186,585 UART: [art] PUB.Y = 475846BA1143D6B074E9B3F86335B433A6334B954D37A155B9743570A6268B5D065CEA1A63E2956314712291C592E0C7
2,193,518 UART: [art] SIG.R = 9452CB2D240CE8236644FDAE1333BF81960CE423B2BF535F5AC9B157C1E449BBBD249FD0618E992E867FC1548A665834
2,200,286 UART: [art] SIG.S = 1C8DD190EE1AC2CEFFF601085871A2B73C9EA34D05C932FFABF56821794AECEA4662696E2AF37DD489760E01A0022E84
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,512 UART: [kat] SHA2-256
892,450 UART: [kat] SHA2-384
895,161 UART: [kat] SHA2-512-ACC
897,062 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,241 UART: [kat] LMS
1,475,437 UART: [kat] --
1,476,108 UART: [cold-reset] ++
1,476,584 UART: [fht] Storing FHT @ 0x50003400
1,479,389 UART: [idev] ++
1,479,557 UART: [idev] CDI.KEYID = 6
1,479,917 UART: [idev] SUBJECT.KEYID = 7
1,480,341 UART: [idev] UDS.KEYID = 0
1,480,686 ready_for_fw is high
1,480,686 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,707 UART: [idev] Erasing UDS.KEYID = 0
1,505,363 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,043 UART: [idev] --
1,515,112 UART: [ldev] ++
1,515,280 UART: [ldev] CDI.KEYID = 6
1,515,643 UART: [ldev] SUBJECT.KEYID = 5
1,516,069 UART: [ldev] AUTHORITY.KEYID = 7
1,516,532 UART: [ldev] FE.KEYID = 1
1,521,750 UART: [ldev] Erasing FE.KEYID = 1
1,547,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,605 UART: [ldev] --
1,586,922 UART: [fwproc] Waiting for Commands...
1,587,591 UART: [fwproc] Received command 0x46574c44
1,588,382 UART: [fwproc] Received Image of size 31656 bytes
1,938,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,447 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,614 >>> mbox cmd response: success
2,008,846 UART: [afmc] ++
2,009,014 UART: [afmc] CDI.KEYID = 6
2,009,376 UART: [afmc] SUBJECT.KEYID = 7
2,009,801 UART: [afmc] AUTHORITY.KEYID = 5
2,044,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,073,213 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,903 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,722 UART: [afmc] --
2,087,714 UART: [cold-reset] --
2,088,516 UART: [state] Locking Datavault
2,089,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,283 UART: [state] Locking ICCM
2,090,871 UART: [exit] Launching FMC @ 0x40000130
2,096,200 UART:
2,096,216 UART: Running Caliptra FMC ...
2,096,624 UART:
2,096,767 UART: [state] CFI Enabled
2,107,314 UART: [fht] FMC Alias Private Key: 7
2,215,487 UART: [art] Extend RT PCRs Done
2,215,915 UART: [art] Lock RT PCRs Done
2,217,677 UART: [art] Populate DV Done
2,225,940 UART: [fht] FMC Alias Private Key: 7
2,227,034 UART: [art] Derive CDI
2,227,314 UART: [art] Store in in slot 0x4
2,312,933 UART: [art] Derive Key Pair
2,313,293 UART: [art] Store priv key in slot 0x5
2,326,333 UART: [art] Derive Key Pair - Done
2,341,089 UART: [art] Signing Cert with AUTHO
2,341,569 UART: RITY.KEYID = 7
2,356,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,634 UART: [art] PUB.X = EBC1C18B8933349290495A8DC831022B9CDDC14CD731B5C4C8E8E873CBEFE0CA057D4CBD2C989364C6F03F771C44897B
2,364,410 UART: [art] PUB.Y = A70AD44CE3BAB7AEC4316D23CA3E73D0E4497B8A67BF8C0E349971CD6496153BFD9BA1074F2648B057AA73282F7FFC4D
2,371,367 UART: [art] SIG.R = 1C791EF49C68B852A0353FEE17F7B55B4BB2071F5BFBE64EAE8E16D3580CEA9D9C1AE7093868E2BE7761BCF9098E4DFC
2,378,145 UART: [art] SIG.S = AA13240CFF22C827A8CDDB22A411EB90378FDE37AC1175383ACC35A4530D97EDB00D1010CB9080E8DAC3C9F2215C4644
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,078 ready_for_fw is high
1,363,078 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,242 >>> mbox cmd response: success
1,918,106 UART:
1,918,122 UART: Running Caliptra FMC ...
1,918,530 UART:
1,918,673 UART: [state] CFI Enabled
1,929,364 UART: [fht] FMC Alias Private Key: 7
2,037,107 UART: [art] Extend RT PCRs Done
2,037,535 UART: [art] Lock RT PCRs Done
2,039,211 UART: [art] Populate DV Done
2,047,354 UART: [fht] FMC Alias Private Key: 7
2,048,340 UART: [art] Derive CDI
2,048,620 UART: [art] Store in in slot 0x4
2,134,279 UART: [art] Derive Key Pair
2,134,639 UART: [art] Store priv key in slot 0x5
2,148,153 UART: [art] Derive Key Pair - Done
2,162,870 UART: [art] Signing Cert with AUTHO
2,163,350 UART: RITY.KEYID = 7
2,178,424 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,189 UART: [art] PUB.X = 3B096F3940A97BAECDA0E9DE48EF5373C272953E4A964E18E26EFFF9A023A3E4E0AF3868F7A24AB1543D9C03A2BBAB85
2,185,971 UART: [art] PUB.Y = 30FB25A57F5098DB09EAFD3DEBCA9C364D822F7F728F720296BC8352DA075104513B4046E51452704A0B39EC1652EA96
2,192,908 UART: [art] SIG.R = EF6EC3EC370ECCCCDFE010A2BCD39E9522333309C9239A58EC0FA4C328316B808B38B7EA7250F6CD5EA0C506E1246C10
2,199,682 UART: [art] SIG.S = A7DC47A4B019416D4CF895CDBA3D7EF906EBA92032298B98F96AFC867977BF734244DAAE758397DC65FD7C3F003AFF21
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,853 UART: [kat] SHA2-256
903,793 UART: [kat] SHA2-384
906,528 UART: [kat] SHA2-512-ACC
908,429 UART: [kat] ECC-384
918,000 UART: [kat] HMAC-384Kdf
922,386 UART: [kat] LMS
1,170,714 UART: [kat] --
1,171,485 UART: [cold-reset] ++
1,171,931 UART: [fht] FHT @ 0x50003400
1,174,572 UART: [idev] ++
1,174,740 UART: [idev] CDI.KEYID = 6
1,175,100 UART: [idev] SUBJECT.KEYID = 7
1,175,524 UART: [idev] UDS.KEYID = 0
1,175,869 ready_for_fw is high
1,175,869 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,183,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,655 UART: [idev] Sha1 KeyId Algorithm
1,209,107 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,696 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,276 UART: [fwproc] Wait for Commands...
1,282,938 UART: [fwproc] Recv command 0x46574c44
1,283,666 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,689,863 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,662 >>> mbox cmd response: success
1,702,688 UART: [afmc] ++
1,702,856 UART: [afmc] CDI.KEYID = 6
1,703,218 UART: [afmc] SUBJECT.KEYID = 7
1,703,643 UART: [afmc] AUTHORITY.KEYID = 5
1,738,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,772,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,549 UART: [afmc] --
1,781,543 UART: [cold-reset] --
1,782,363 UART: [state] Locking Datavault
1,783,538 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,142 UART: [state] Locking ICCM
1,784,598 UART: [exit] Launching FMC @ 0x40000130
1,789,927 UART:
1,789,943 UART: Running Caliptra FMC ...
1,790,351 UART:
1,790,405 UART: [state] CFI Enabled
1,800,842 UART: [fht] FMC Alias Private Key: 7
1,909,183 UART: [art] Extend RT PCRs Done
1,909,611 UART: [art] Lock RT PCRs Done
1,911,095 UART: [art] Populate DV Done
1,919,394 UART: [fht] FMC Alias Private Key: 7
1,920,368 UART: [art] Derive CDI
1,920,648 UART: [art] Store in in slot 0x4
2,006,803 UART: [art] Derive Key Pair
2,007,163 UART: [art] Store priv key in slot 0x5
2,020,787 UART: [art] Derive Key Pair - Done
2,035,856 UART: [art] Signing Cert with AUTHO
2,036,336 UART: RITY.KEYID = 7
2,051,216 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,981 UART: [art] PUB.X = 3C648858237D078B34124219F4F30FFB5D1954320ED097A34400A00F3B55BFB82EF68255A7A9DA8B4803D5CDC608C51D
2,058,711 UART: [art] PUB.Y = 2222CC290D19D3081A6851A4DC54A7D025E9B21B15E7C1A032B5A3D0039B49853A3AC8B1CDA065EC149A272834A43714
2,065,652 UART: [art] SIG.R = 0D68E2F0D12E36F9AB149594AF1A152B48BE25D664D9869F9943C57736F77797A4AF103A61C229528ECEDAF671E13EA7
2,072,423 UART: [art] SIG.S = E67A2AF70D7CFE40192863089678D7479F89BA70E41327FADB1BF8EF9A5F5379605D091FDF01358C089B2CC9EAF893A9
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,613 ready_for_fw is high
1,059,613 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,161 >>> mbox cmd response: success
1,613,383 UART:
1,613,399 UART: Running Caliptra FMC ...
1,613,807 UART:
1,613,861 UART: [state] CFI Enabled
1,624,400 UART: [fht] FMC Alias Private Key: 7
1,731,867 UART: [art] Extend RT PCRs Done
1,732,295 UART: [art] Lock RT PCRs Done
1,733,925 UART: [art] Populate DV Done
1,742,124 UART: [fht] FMC Alias Private Key: 7
1,743,156 UART: [art] Derive CDI
1,743,436 UART: [art] Store in in slot 0x4
1,829,107 UART: [art] Derive Key Pair
1,829,467 UART: [art] Store priv key in slot 0x5
1,842,005 UART: [art] Derive Key Pair - Done
1,856,896 UART: [art] Signing Cert with AUTHO
1,857,376 UART: RITY.KEYID = 7
1,872,412 UART: [art] Erasing AUTHORITY.KEYID = 7
1,873,177 UART: [art] PUB.X = D85A2C585B432482270ACF7066732D47041AAA9B6AB58E9A38B115D0D588E49EDDFA0930DD3CFF33690C8C88DCAA1555
1,879,945 UART: [art] PUB.Y = 979A96A5BB1CA3A254DB5DA127ADED04DF928407EB48C929B682B0E86F3FE6C0A0D26783ECBB22EDBADE5DE1BFD07C65
1,886,917 UART: [art] SIG.R = 30BA6AEE3DBBF4F7EF7E57893B179B155446DDC56A92648D9BCDDA99212CFD1E5F112C8BCC8387CE8C411079860F81CE
1,893,702 UART: [art] SIG.S = D639F09812E9034ACC830F39BF44D0A53FB65CE63F99E77815CFA9E6721189416ED5B13E8A455DD9FC30E46B92118D6B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
893,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,324 UART: [kat] ++
897,476 UART: [kat] sha1
901,698 UART: [kat] SHA2-256
903,638 UART: [kat] SHA2-384
906,313 UART: [kat] SHA2-512-ACC
908,214 UART: [kat] ECC-384
918,097 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,171,846 UART: [cold-reset] ++
1,172,344 UART: [fht] FHT @ 0x50003400
1,174,951 UART: [idev] ++
1,175,119 UART: [idev] CDI.KEYID = 6
1,175,479 UART: [idev] SUBJECT.KEYID = 7
1,175,903 UART: [idev] UDS.KEYID = 0
1,176,248 ready_for_fw is high
1,176,248 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,205 UART: [idev] Erasing UDS.KEYID = 0
1,201,744 UART: [idev] Sha1 KeyId Algorithm
1,210,150 UART: [idev] --
1,211,266 UART: [ldev] ++
1,211,434 UART: [ldev] CDI.KEYID = 6
1,211,797 UART: [ldev] SUBJECT.KEYID = 5
1,212,223 UART: [ldev] AUTHORITY.KEYID = 7
1,212,686 UART: [ldev] FE.KEYID = 1
1,217,944 UART: [ldev] Erasing FE.KEYID = 1
1,244,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,223 UART: [fwproc] Wait for Commands...
1,284,821 UART: [fwproc] Recv command 0x46574c44
1,285,549 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,093 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,782 >>> mbox cmd response: success
1,704,908 UART: [afmc] ++
1,705,076 UART: [afmc] CDI.KEYID = 6
1,705,438 UART: [afmc] SUBJECT.KEYID = 7
1,705,863 UART: [afmc] AUTHORITY.KEYID = 5
1,740,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,277 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,553 UART: [afmc] --
1,784,651 UART: [cold-reset] --
1,785,401 UART: [state] Locking Datavault
1,786,982 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,586 UART: [state] Locking ICCM
1,788,222 UART: [exit] Launching FMC @ 0x40000130
1,793,551 UART:
1,793,567 UART: Running Caliptra FMC ...
1,793,975 UART:
1,794,118 UART: [state] CFI Enabled
1,804,703 UART: [fht] FMC Alias Private Key: 7
1,912,520 UART: [art] Extend RT PCRs Done
1,912,948 UART: [art] Lock RT PCRs Done
1,914,416 UART: [art] Populate DV Done
1,923,053 UART: [fht] FMC Alias Private Key: 7
1,923,991 UART: [art] Derive CDI
1,924,271 UART: [art] Store in in slot 0x4
2,009,548 UART: [art] Derive Key Pair
2,009,908 UART: [art] Store priv key in slot 0x5
2,023,208 UART: [art] Derive Key Pair - Done
2,038,071 UART: [art] Signing Cert with AUTHO
2,038,551 UART: RITY.KEYID = 7
2,053,709 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,474 UART: [art] PUB.X = 440653CCD56DF2DB1B06F28F2E76EAFC76BB2AEF8C563D66064F001068B580FDD738296A316892AA3559D5F1EEF0F94F
2,061,225 UART: [art] PUB.Y = 5DE883C3EB74C6613A81AA2F113093370E902E2726494627F67100A130D7EB883993BE0398A0C2F5F34663FFDA1E3C1E
2,068,145 UART: [art] SIG.R = AF1774E50EAF3DECCB430063F916B5531DF876C467FEC5FC8C7C9EB9468E67FB23B248106543EC81287FD09EE22EA9EA
2,074,906 UART: [art] SIG.S = FBB0FED93904D72E7BD446A300389BF6BB899D8FDB7048D01A5FA361531D8ABEA635D393399B641A7A5B2F743B17BBC5
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,080 ready_for_fw is high
1,061,080 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,553,830 >>> mbox cmd response: success
1,616,118 UART:
1,616,134 UART: Running Caliptra FMC ...
1,616,542 UART:
1,616,685 UART: [state] CFI Enabled
1,627,050 UART: [fht] FMC Alias Private Key: 7
1,734,449 UART: [art] Extend RT PCRs Done
1,734,877 UART: [art] Lock RT PCRs Done
1,736,415 UART: [art] Populate DV Done
1,744,866 UART: [fht] FMC Alias Private Key: 7
1,745,864 UART: [art] Derive CDI
1,746,144 UART: [art] Store in in slot 0x4
1,832,093 UART: [art] Derive Key Pair
1,832,453 UART: [art] Store priv key in slot 0x5
1,846,375 UART: [art] Derive Key Pair - Done
1,861,366 UART: [art] Signing Cert with AUTHO
1,861,846 UART: RITY.KEYID = 7
1,877,140 UART: [art] Erasing AUTHORITY.KEYID = 7
1,877,905 UART: [art] PUB.X = 71C395DE7E7AF8158A2BB104F75958A1A0D77B6C05E23AF9A544C111D84B060D70968FF47274BD1340D94905F7DD30E5
1,884,662 UART: [art] PUB.Y = 4171F903857FB373EC37851FDF687DFC6B5B46E9FBEFE761A02127912BC0E2E1EF7203CCEA96B6450644FCA037D1FDBD
1,891,619 UART: [art] SIG.R = 7604D818F32EE95E265AC75AC5E0E3521265B4A24BF9522AA110A98F5323F8C8200302236B333DA786D8CF80FDADDD8E
1,898,386 UART: [art] SIG.S = 1D86F05D8DD95490CB484CE9CA9B79B29C7FB9EE6C6A4D2F76EFC45EF87A32308EE69422A4C6FED64FDB0BCFDF1FC3AC
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,448 UART: [state] LifecycleState = Unprovisioned
86,103 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 ready_for_fw is high
1,174,261 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,513 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,576 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,730 UART: [ldev] --
1,280,020 UART: [fwproc] Wait for Commands...
1,280,751 UART: [fwproc] Recv command 0x46574c44
1,281,484 UART: [fwproc] Recv'd Img size: 31656 bytes
1,632,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,659,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,688,796 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,700,566 >>> mbox cmd response: success
1,701,663 UART: [afmc] ++
1,701,831 UART: [afmc] CDI.KEYID = 6
1,702,194 UART: [afmc] SUBJECT.KEYID = 7
1,702,620 UART: [afmc] AUTHORITY.KEYID = 5
1,738,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,754,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,318 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,781,060 UART: [afmc] --
1,781,958 UART: [cold-reset] --
1,782,848 UART: [state] Locking Datavault
1,784,223 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,827 UART: [state] Locking ICCM
1,785,331 UART: [exit] Launching FMC @ 0x40000130
1,790,660 UART:
1,790,676 UART: Running Caliptra FMC ...
1,791,084 UART:
1,791,138 UART: [state] CFI Enabled
1,801,623 UART: [fht] FMC Alias Private Key: 7
1,910,100 UART: [art] Extend RT PCRs Done
1,910,528 UART: [art] Lock RT PCRs Done
1,911,892 UART: [art] Populate DV Done
1,920,413 UART: [fht] FMC Alias Private Key: 7
1,921,357 UART: [art] Derive CDI
1,921,637 UART: [art] Store in in slot 0x4
2,007,456 UART: [art] Derive Key Pair
2,007,816 UART: [art] Store priv key in slot 0x5
2,020,684 UART: [art] Derive Key Pair - Done
2,035,437 UART: [art] Signing Cert with AUTHO
2,035,917 UART: RITY.KEYID = 7
2,051,027 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,792 UART: [art] PUB.X = 275659C3CC3F3147AEF2C98DD5D4842B825C67F1CF4F689C606952ECDCFFB68B3199646B44502E74413A32CBB6B9B490
2,058,568 UART: [art] PUB.Y = 380D589EB7844ADC19EB8A788C9F70C04D169DD51C62EA29BE1A20543E15EB4A35934105E329EF8AD6643D5E38AFDB9A
2,065,524 UART: [art] SIG.R = FB99C6B012861BCCC7F3E9354FF96D00FEEF3C93CDEF395F22A0A35307B72BFF4C2517DE6ED31E3D955EE0CCCEBCA13D
2,072,299 UART: [art] SIG.S = 5B29F4FFC7061479A18D066B1838C26AF754AC44E74EF6F598753C47A680091FAAA835FD0A393B403489B56B0FA9DC0D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,888 ready_for_fw is high
1,055,888 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,550,590 >>> mbox cmd response: success
1,612,232 UART:
1,612,248 UART: Running Caliptra FMC ...
1,612,656 UART:
1,612,710 UART: [state] CFI Enabled
1,623,099 UART: [fht] FMC Alias Private Key: 7
1,730,910 UART: [art] Extend RT PCRs Done
1,731,338 UART: [art] Lock RT PCRs Done
1,732,798 UART: [art] Populate DV Done
1,741,085 UART: [fht] FMC Alias Private Key: 7
1,742,255 UART: [art] Derive CDI
1,742,535 UART: [art] Store in in slot 0x4
1,828,164 UART: [art] Derive Key Pair
1,828,524 UART: [art] Store priv key in slot 0x5
1,841,756 UART: [art] Derive Key Pair - Done
1,856,214 UART: [art] Signing Cert with AUTHO
1,856,694 UART: RITY.KEYID = 7
1,871,774 UART: [art] Erasing AUTHORITY.KEYID = 7
1,872,539 UART: [art] PUB.X = CA08C918FEA9743DF1D8516678B6676BEF69BF47CCA080A1A6C0348D556986178E3BB5E93A4934A43C40ADED5FBE701D
1,879,318 UART: [art] PUB.Y = 1818B26ED2B315BADDFA96ABD7532B28F1A5D54610D933D8C1F6F3A69FE23415B3FC36A88A5CA362C055B510ED11D5E6
1,886,282 UART: [art] SIG.R = 514BFE3A7FA3C6E7969F57C262B7CEA28CF0010BD9C848D11E8F532118EA40DA94901B7082CCE541E1EDC5093FE24E70
1,893,055 UART: [art] SIG.S = 056DDF9275D6C1CC9B939CD51DE64E0E9564511A214C351CF0B4B118D962BBAB0135DB312FC89BA9760DE33A45F49BA3
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,479 UART: [kat] SHA2-512-ACC
906,380 UART: [kat] ECC-384
916,725 UART: [kat] HMAC-384Kdf
921,515 UART: [kat] LMS
1,169,827 UART: [kat] --
1,170,558 UART: [cold-reset] ++
1,170,898 UART: [fht] FHT @ 0x50003400
1,173,630 UART: [idev] ++
1,173,798 UART: [idev] CDI.KEYID = 6
1,174,159 UART: [idev] SUBJECT.KEYID = 7
1,174,584 UART: [idev] UDS.KEYID = 0
1,174,930 ready_for_fw is high
1,174,930 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,182,896 UART: [idev] Erasing UDS.KEYID = 0
1,199,704 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,216,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,389 UART: [ldev] --
1,281,801 UART: [fwproc] Wait for Commands...
1,282,576 UART: [fwproc] Recv command 0x46574c44
1,283,309 UART: [fwproc] Recv'd Img size: 31656 bytes
1,634,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,310 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,619 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,307 >>> mbox cmd response: success
1,703,450 UART: [afmc] ++
1,703,618 UART: [afmc] CDI.KEYID = 6
1,703,981 UART: [afmc] SUBJECT.KEYID = 7
1,704,407 UART: [afmc] AUTHORITY.KEYID = 5
1,740,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,756,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,757,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,418 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,301 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,020 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,027 UART: [afmc] --
1,783,973 UART: [cold-reset] --
1,784,959 UART: [state] Locking Datavault
1,786,244 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,848 UART: [state] Locking ICCM
1,787,414 UART: [exit] Launching FMC @ 0x40000130
1,792,743 UART:
1,792,759 UART: Running Caliptra FMC ...
1,793,167 UART:
1,793,310 UART: [state] CFI Enabled
1,804,243 UART: [fht] FMC Alias Private Key: 7
1,912,096 UART: [art] Extend RT PCRs Done
1,912,524 UART: [art] Lock RT PCRs Done
1,914,068 UART: [art] Populate DV Done
1,922,337 UART: [fht] FMC Alias Private Key: 7
1,923,283 UART: [art] Derive CDI
1,923,563 UART: [art] Store in in slot 0x4
2,009,362 UART: [art] Derive Key Pair
2,009,722 UART: [art] Store priv key in slot 0x5
2,023,214 UART: [art] Derive Key Pair - Done
2,037,891 UART: [art] Signing Cert with AUTHO
2,038,371 UART: RITY.KEYID = 7
2,053,579 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,344 UART: [art] PUB.X = FB99E0E6C6743E73ECF878CD8527787C1D96B740A0867678F47A1C34FBFED3CB3F2848640D05AE5EF739A11BC6E9DFC5
2,061,122 UART: [art] PUB.Y = 9C65BC81CC4E0BE403C70F3E56FE82F64986CDF6EC65242BC57ACBD7FF040A3C475A8206CEFA1353F28BB9302D20E4EB
2,068,074 UART: [art] SIG.R = A8C227CF572DA5794F6636CCD6C0F4F5F338BA1A0DECDC58A93635A836AE4A31F6837246954B68171B6775208B5384C4
2,074,843 UART: [art] SIG.S = AFE0F88CF3723057E9EB252C465B707D58654FF4CD402CEEA728A2711BD7FFEF3590C144D6BDC61801D87127A747019C
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,105 ready_for_fw is high
1,057,105 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,553,275 >>> mbox cmd response: success
1,615,871 UART:
1,615,887 UART: Running Caliptra FMC ...
1,616,295 UART:
1,616,438 UART: [state] CFI Enabled
1,627,309 UART: [fht] FMC Alias Private Key: 7
1,734,688 UART: [art] Extend RT PCRs Done
1,735,116 UART: [art] Lock RT PCRs Done
1,736,602 UART: [art] Populate DV Done
1,744,647 UART: [fht] FMC Alias Private Key: 7
1,745,673 UART: [art] Derive CDI
1,745,953 UART: [art] Store in in slot 0x4
1,831,218 UART: [art] Derive Key Pair
1,831,578 UART: [art] Store priv key in slot 0x5
1,845,236 UART: [art] Derive Key Pair - Done
1,860,026 UART: [art] Signing Cert with AUTHO
1,860,506 UART: RITY.KEYID = 7
1,875,832 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,597 UART: [art] PUB.X = 3F61CD5C8CC54C584B901157F1A1D2CB1C9029E2E9420A1E5557D9A2F4ECFE5D25BB2C2573535C4AF5AEF9C8E10D2056
1,883,375 UART: [art] PUB.Y = 6366883FB2623992EE3DFCE9983D475ED5F16980C0D3F1B5AE624EE1D661E8C1ACF6EBB27092A30F852ED0F6E92114E7
1,890,332 UART: [art] SIG.R = 91119169936F0CA668E623C838B287BB8BF4F1486BFAE72F62379D5C76E796755B2106ADD178CA9F20003CB28BE1332A
1,897,074 UART: [art] SIG.S = 5893320B0E717F0A986009811B16E210C8B562524E935064D6F1A2A3C8B0694228A8160EBD9B6C0FB4416B5DE8A32FD6
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,077 UART:
192,449 UART: Running Caliptra ROM ...
193,626 UART:
193,775 UART: [state] CFI Enabled
263,730 UART: [state] LifecycleState = Unprovisioned
265,654 UART: [state] DebugLocked = No
267,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,966 UART: [kat] SHA2-256
441,691 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,218 UART: [kat] ++
452,659 UART: [kat] sha1
462,334 UART: [kat] SHA2-256
465,020 UART: [kat] SHA2-384
470,663 UART: [kat] SHA2-512-ACC
473,024 UART: [kat] ECC-384
2,766,288 UART: [kat] HMAC-384Kdf
2,798,801 UART: [kat] LMS
3,989,170 UART: [kat] --
3,992,520 UART: [cold-reset] ++
3,993,449 UART: [fht] Storing FHT @ 0x50003400
4,005,846 UART: [idev] ++
4,006,413 UART: [idev] CDI.KEYID = 6
4,007,445 UART: [idev] SUBJECT.KEYID = 7
4,008,618 UART: [idev] UDS.KEYID = 0
4,009,708 ready_for_fw is high
4,009,915 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
4,104,729 UART: [idev] Erasing UDS.KEYID = 0
7,343,696 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,471 UART: [idev] --
7,369,378 UART: [ldev] ++
7,369,998 UART: [ldev] CDI.KEYID = 6
7,370,958 UART: [ldev] SUBJECT.KEYID = 5
7,372,169 UART: [ldev] AUTHORITY.KEYID = 7
7,373,393 UART: [ldev] FE.KEYID = 1
7,421,295 UART: [ldev] Erasing FE.KEYID = 1
10,754,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,626 UART: [ldev] --
13,115,983 UART: [fwproc] Waiting for Commands...
13,118,345 UART: [fwproc] Received command 0x46574c44
13,120,583 UART: [fwproc] Received Image of size 75256 bytes
16,695,489 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,774,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,843,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 50552
17,024,536 >>> mbox cmd response: success
17,024,942 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,028,993 UART: [afmc] ++
17,029,570 UART: [afmc] CDI.KEYID = 6
17,030,592 UART: [afmc] SUBJECT.KEYID = 7
17,031,747 UART: [afmc] AUTHORITY.KEYID = 5
20,381,548 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,686,403 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,688,666 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,703,140 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,717,922 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,732,400 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,753,096 UART: [afmc] --
22,756,608 UART: [cold-reset] --
22,760,250 UART: [state] Locking Datavault
22,765,922 UART: [state] Locking PCR0, PCR1 and PCR31
22,767,675 UART: [state] Locking ICCM
22,769,497 UART: [exit] Launching FMC @ 0x40000130
22,777,888 UART:
22,778,118 UART: Running Caliptra FMC ...
22,779,343 UART:
22,779,495 UART: [state] CFI Enabled
22,846,366 UART: [fht] FMC Alias Private Key: 7
25,184,783 UART: [art] Extend RT PCRs Done
25,186,007 UART: [art] Lock RT PCRs Done
25,187,818 UART: [art] Populate DV Done
25,193,237 UART: [fht] FMC Alias Private Key: 7
25,194,877 UART: [art] Derive CDI
25,195,606 UART: [art] Store in in slot 0x4
25,254,233 UART: [art] Derive Key Pair
25,255,228 UART: [art] Store priv key in slot 0x5
28,548,040 UART: [art] Derive Key Pair - Done
28,560,851 UART: [art] Signing Cert with AUTHO
28,562,157 UART: RITY.KEYID = 7
30,850,289 UART: [art] Erasing AUTHORITY.KEYID = 7
30,851,795 UART: [art] PUB.X = 3DACBFAD416C8AF483D53FD84F2A7D356F519A4F117070A891395554E1E241D6B294EE02BCE6A1523B55BA47368CC7FB
30,859,218 UART: [art] PUB.Y = 7D1EB3162C7E9986C7BC8495BAE32686DA217CD9A8D6258C142E55EB25AF3DFA50A315500DC76C17953C4E9A6DF4392D
30,866,264 UART: [art] SIG.R = 20CD4284049FB0405A5E12D3E9ED809809DE292439B99F577E6BBEF3572CF79A2D90013767C8143DF8E1736EC93BBD50
30,873,629 UART: [art] SIG.S = 968CC38FAF0BDC608962FA7057BE42445759C65B10C78CD14F5843D64B8ED9B4292B12B93D9045370CF5AEA7BD4361BE
32,177,987 UART: mock_rt_interact::rt_entry...FMC Tester
32,294,968 UART: [rt] Runtime listening for mailbox commands...
32,299,195 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,806,119 ready_for_fw is high
3,806,532 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
17,068,526 >>> mbox cmd response: success
17,069,312 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,759,016 UART:
22,759,403 UART: Running Caliptra FMC ...
22,760,571 UART:
22,760,717 UART: [state] CFI Enabled
22,826,832 UART: [fht] FMC Alias Private Key: 7
25,164,501 UART: [art] Extend RT PCRs Done
25,165,723 UART: [art] Lock RT PCRs Done
25,167,093 UART: [art] Populate DV Done
25,172,348 UART: [fht] FMC Alias Private Key: 7
25,174,047 UART: [art] Derive CDI
25,174,779 UART: [art] Store in in slot 0x4
25,235,804 UART: [art] Derive Key Pair
25,236,843 UART: [art] Store priv key in slot 0x5
28,529,400 UART: [art] Derive Key Pair - Done
28,542,402 UART: [art] Signing Cert with AUTHO
28,543,704 UART: RITY.KEYID = 7
30,832,122 UART: [art] Erasing AUTHORITY.KEYID = 7
30,833,630 UART: [art] PUB.X = 5427B44E484C93985269024227088EC441246A965DC8E1B22FD05B5B1BCA75F74C0CDAD19DFA33149C04F4B16DDCBC7F
30,840,904 UART: [art] PUB.Y = 4B14138F12C3517567752556B1A543242E097617E5B8CF54B038EDB2A90894F094E3B9DE375E0378388D19B10514BE39
30,848,135 UART: [art] SIG.R = FA8D9D85573E1001D3F9BFF1429167EE9899EE85D71AD2D96338497E1DACB658C0B9D9EE5E816CF8BA9636409F046BF6
30,855,499 UART: [art] SIG.S = DAC41763542425768710FE8A6B74CEF568F11163CF2F74BD2DD000D7E4BD0F0BF2E93BEF1E8F14822E2CEE22DE6D20D6
32,160,650 UART: mock_rt_interact::rt_entry...FMC Tester
32,278,071 UART: [rt] Runtime listening for mailbox commands...
32,282,314 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
192,581 UART:
192,930 UART: Running Caliptra ROM ...
194,113 UART:
603,656 UART: [state] CFI Enabled
618,797 UART: [state] LifecycleState = Unprovisioned
620,683 UART: [state] DebugLocked = No
623,210 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,847 UART: [kat] SHA2-256
797,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,142 UART: [kat] ++
808,629 UART: [kat] sha1
820,564 UART: [kat] SHA2-256
823,279 UART: [kat] SHA2-384
827,988 UART: [kat] SHA2-512-ACC
830,363 UART: [kat] ECC-384
3,115,324 UART: [kat] HMAC-384Kdf
3,126,347 UART: [kat] LMS
4,316,443 UART: [kat] --
4,321,406 UART: [cold-reset] ++
4,322,620 UART: [fht] Storing FHT @ 0x50003400
4,333,949 UART: [idev] ++
4,334,518 UART: [idev] CDI.KEYID = 6
4,335,422 UART: [idev] SUBJECT.KEYID = 7
4,336,663 UART: [idev] UDS.KEYID = 0
4,337,767 ready_for_fw is high
4,337,997 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
4,432,671 UART: [idev] Erasing UDS.KEYID = 0
7,618,970 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,886 UART: [idev] --
7,644,607 UART: [ldev] ++
7,645,177 UART: [ldev] CDI.KEYID = 6
7,646,190 UART: [ldev] SUBJECT.KEYID = 5
7,647,349 UART: [ldev] AUTHORITY.KEYID = 7
7,648,635 UART: [ldev] FE.KEYID = 1
7,658,792 UART: [ldev] Erasing FE.KEYID = 1
10,947,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,023 UART: [ldev] --
13,307,966 UART: [fwproc] Waiting for Commands...
13,311,029 UART: [fwproc] Received command 0x46574c44
13,313,263 UART: [fwproc] Received Image of size 75256 bytes
16,891,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,975,303 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,044,205 UART: [fwproc] Loading Runtime at address 0x40005000 len 50552
17,225,934 >>> mbox cmd response: success
17,226,337 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,229,256 UART: [afmc] ++
17,229,830 UART: [afmc] CDI.KEYID = 6
17,230,762 UART: [afmc] SUBJECT.KEYID = 7
17,232,024 UART: [afmc] AUTHORITY.KEYID = 5
20,540,804 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,834,137 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,836,408 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,850,805 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,865,621 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,880,137 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,901,218 UART: [afmc] --
22,904,971 UART: [cold-reset] --
22,909,311 UART: [state] Locking Datavault
22,912,724 UART: [state] Locking PCR0, PCR1 and PCR31
22,914,473 UART: [state] Locking ICCM
22,915,599 UART: [exit] Launching FMC @ 0x40000130
22,923,989 UART:
22,924,221 UART: Running Caliptra FMC ...
22,925,265 UART:
22,925,414 UART: [state] CFI Enabled
22,933,893 UART: [fht] FMC Alias Private Key: 7
25,265,001 UART: [art] Extend RT PCRs Done
25,266,234 UART: [art] Lock RT PCRs Done
25,267,691 UART: [art] Populate DV Done
25,273,230 UART: [fht] FMC Alias Private Key: 7
25,274,861 UART: [art] Derive CDI
25,275,683 UART: [art] Store in in slot 0x4
25,318,492 UART: [art] Derive Key Pair
25,319,487 UART: [art] Store priv key in slot 0x5
28,561,516 UART: [art] Derive Key Pair - Done
28,574,616 UART: [art] Signing Cert with AUTHO
28,575,924 UART: RITY.KEYID = 7
30,855,198 UART: [art] Erasing AUTHORITY.KEYID = 7
30,856,711 UART: [art] PUB.X = 06A71DAC82099836C87286B710A1A07EE6EEE8081DDF5BE24EC109A3D0E7F70B6BA1B5273C4950FD10A2445DCBE7B696
30,863,950 UART: [art] PUB.Y = A5F8F95FB621BF36080ECE70C39E1CA027BA4C9F32F13BE69D1ED84D20C82A845553326E778BCDC7BC862C7D39BC1D76
30,871,185 UART: [art] SIG.R = FC2F4C1108CC30EC752A3FCA759305DC06107791B8D836BABBC3B95FBF9507829D0E05EBE6AD76168C8DE6D96ABB2B6B
30,878,624 UART: [art] SIG.S = 1E51DB817B1CBB763D48F33B4D4CFF8345E7CD87CBEEE772938EA006844F12A6E051C3A9D567E6C96100D2D00B41250A
32,183,639 UART: mock_rt_interact::rt_entry...FMC Tester
32,300,218 UART: [rt] Runtime listening for mailbox commands...
32,304,442 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,126,412 ready_for_fw is high
4,126,795 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
17,284,653 >>> mbox cmd response: success
17,285,323 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,926,578 UART:
22,927,173 UART: Running Caliptra FMC ...
22,928,348 UART:
22,928,514 UART: [state] CFI Enabled
22,936,366 UART: [fht] FMC Alias Private Key: 7
25,267,968 UART: [art] Extend RT PCRs Done
25,269,201 UART: [art] Lock RT PCRs Done
25,271,381 UART: [art] Populate DV Done
25,276,741 UART: [fht] FMC Alias Private Key: 7
25,278,384 UART: [art] Derive CDI
25,279,193 UART: [art] Store in in slot 0x4
25,321,730 UART: [art] Derive Key Pair
25,322,747 UART: [art] Store priv key in slot 0x5
28,564,804 UART: [art] Derive Key Pair - Done
28,577,763 UART: [art] Signing Cert with AUTHO
28,579,065 UART: RITY.KEYID = 7
30,858,541 UART: [art] Erasing AUTHORITY.KEYID = 7
30,860,053 UART: [art] PUB.X = 8EB07530DBACAC92E81F2C6F7B233E8C1583199992E2BC0A36B08B838ED0615A170054A2373B44857E8B2C64C2BC76AF
30,867,280 UART: [art] PUB.Y = AE913EDED297BEB9C157A3629BCFFDD2BEA40ED97B98F87369B47882B714A80249118ABFA525120639AF57C147691422
30,874,513 UART: [art] SIG.R = 5764C744B4A02FB74BCF2C2DF1469210BA2E957BE2A050C7D21E769CB150996171A71710F41EB9665A5AEC6A5E5AEBFF
30,881,940 UART: [art] SIG.S = 87AB5CAF7D3346717D7A347D86C6A4870FA6E6106F19551E53C7CCF74DEC02DB4D90CC422F6E3EF0DD37D2E8C71B46B8
32,185,856 UART: mock_rt_interact::rt_entry...FMC Tester
32,303,102 UART: [rt] Runtime listening for mailbox commands...
32,307,331 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,097 UART:
192,452 UART: Running Caliptra ROM ...
193,630 UART:
193,778 UART: [state] CFI Enabled
264,295 UART: [state] LifecycleState = Unprovisioned
266,137 UART: [state] DebugLocked = No
267,387 UART: [state] WD Timer not started. Device not locked for debugging
270,579 UART: [kat] SHA2-256
449,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,280 UART: [kat] ++
461,814 UART: [kat] sha1
473,471 UART: [kat] SHA2-256
476,464 UART: [kat] SHA2-384
482,587 UART: [kat] SHA2-512-ACC
485,540 UART: [kat] ECC-384
2,948,822 UART: [kat] HMAC-384Kdf
2,970,385 UART: [kat] LMS
3,499,842 UART: [kat] --
3,505,774 UART: [cold-reset] ++
3,507,922 UART: [fht] FHT @ 0x50003400
3,518,703 UART: [idev] ++
3,519,303 UART: [idev] CDI.KEYID = 6
3,520,225 UART: [idev] SUBJECT.KEYID = 7
3,521,397 UART: [idev] UDS.KEYID = 0
3,522,385 ready_for_fw is high
3,522,586 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,617,320 UART: [idev] Erasing UDS.KEYID = 0
6,024,573 UART: [idev] Sha1 KeyId Algorithm
6,048,126 UART: [idev] --
6,051,849 UART: [ldev] ++
6,052,417 UART: [ldev] CDI.KEYID = 6
6,053,348 UART: [ldev] SUBJECT.KEYID = 5
6,054,562 UART: [ldev] AUTHORITY.KEYID = 7
6,055,791 UART: [ldev] FE.KEYID = 1
6,098,133 UART: [ldev] Erasing FE.KEYID = 1
8,604,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,173 UART: [ldev] --
10,412,062 UART: [fwproc] Wait for Commands...
10,414,857 UART: [fwproc] Recv command 0x46574c44
10,417,065 UART: [fwproc] Recv'd Img size: 75220 bytes
13,343,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,410,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,478,962 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
13,660,383 >>> mbox cmd response: success
13,660,787 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,664,563 UART: [afmc] ++
13,665,140 UART: [afmc] CDI.KEYID = 6
13,666,047 UART: [afmc] SUBJECT.KEYID = 7
13,667,212 UART: [afmc] AUTHORITY.KEYID = 5
16,211,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,952,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,954,489 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,970,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,986,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,002,166 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,023,795 UART: [afmc] --
18,027,663 UART: [cold-reset] --
18,031,416 UART: [state] Locking Datavault
18,036,453 UART: [state] Locking PCR0, PCR1 and PCR31
18,038,152 UART: [state] Locking ICCM
18,040,679 UART: [exit] Launching FMC @ 0x40000130
18,049,077 UART:
18,049,316 UART: Running Caliptra FMC ...
18,050,415 UART:
18,050,569 UART: [state] CFI Enabled
18,111,788 UART: [fht] FMC Alias Private Key: 7
19,875,423 UART: [art] Extend RT PCRs Done
19,876,665 UART: [art] Lock RT PCRs Done
19,878,419 UART: [art] Populate DV Done
19,884,008 UART: [fht] FMC Alias Private Key: 7
19,885,504 UART: [art] Derive CDI
19,886,259 UART: [art] Store in in slot 0x4
19,943,981 UART: [art] Derive Key Pair
19,945,023 UART: [art] Store priv key in slot 0x5
22,408,163 UART: [art] Derive Key Pair - Done
22,421,225 UART: [art] Signing Cert with AUTHO
22,422,532 UART: RITY.KEYID = 7
24,133,954 UART: [art] Erasing AUTHORITY.KEYID = 7
24,135,436 UART: [art] PUB.X = A8DC855D14D667D30172839473995803054E751B11C85AB7FFAD5C3C4007848BD2879F9586E55F3375A03239BD569B05
24,142,676 UART: [art] PUB.Y = 9F963E4E35536B1335F82535507604D2A40CEE250E4C156CEA0C20278E95E0C1F7BB54722DADC9420A365848650CA64F
24,149,960 UART: [art] SIG.R = 1869CEEEB719E68C17F04443FB565C8EB67523A6C952924EFBE59E6D27AC3F1E984BBCA58D08DC7CB98F15A58F66B6DF
24,157,800 UART: [art] SIG.S = 38175A1555C96B4FF7E89416925F4F6145F31EABA7A80024EEB17BE057CE1967E5543F6C7F4E24F4405706F772660ED5
25,136,038 UART: mock_rt_interact::rt_entry...FMC Tester
25,252,649 UART: [rt] Runtime listening for mailbox commands...
25,256,877 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,385,417 ready_for_fw is high
3,386,009 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
13,474,861 >>> mbox cmd response: success
13,475,753 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,758,461 UART:
17,758,832 UART: Running Caliptra FMC ...
17,760,042 UART:
17,760,200 UART: [state] CFI Enabled
17,823,372 UART: [fht] FMC Alias Private Key: 7
19,587,833 UART: [art] Extend RT PCRs Done
19,589,058 UART: [art] Lock RT PCRs Done
19,590,633 UART: [art] Populate DV Done
19,595,886 UART: [fht] FMC Alias Private Key: 7
19,597,421 UART: [art] Derive CDI
19,598,233 UART: [art] Store in in slot 0x4
19,656,117 UART: [art] Derive Key Pair
19,657,162 UART: [art] Store priv key in slot 0x5
22,119,524 UART: [art] Derive Key Pair - Done
22,132,369 UART: [art] Signing Cert with AUTHO
22,133,669 UART: RITY.KEYID = 7
23,845,661 UART: [art] Erasing AUTHORITY.KEYID = 7
23,847,162 UART: [art] PUB.X = A1F7F4D3B8CC4162362722338A6526B15D20596D2E90665431AB709F861CDF15310F14783A3C8C535DC75B5BD1CB9A3A
23,854,421 UART: [art] PUB.Y = EE446D8124A063537BD49131AFA3538C08115B845BFE3E60A03F61EB79EE5A4854CD873C11E2EDC2673F10E4B2653D4E
23,861,675 UART: [art] SIG.R = C8969A1DD066531704804BE2B4DEE288B5F5558D9C011050BBD42CA22570D191E9877B9CFA3EEA485D98E7ADA0646357
23,869,076 UART: [art] SIG.S = 84F8D8303AA03DB3610C786E2B6A830EE4354118A96E1AA358292C6E1E5D3416EA9073E2420395B7D307EDF00749C541
24,847,763 UART: mock_rt_interact::rt_entry...FMC Tester
24,965,569 UART: [rt] Runtime listening for mailbox commands...
24,969,854 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,380 UART:
192,748 UART: Running Caliptra ROM ...
193,880 UART:
603,662 UART: [state] CFI Enabled
614,091 UART: [state] LifecycleState = Unprovisioned
615,998 UART: [state] DebugLocked = No
618,242 UART: [state] WD Timer not started. Device not locked for debugging
621,775 UART: [kat] SHA2-256
800,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,451 UART: [kat] ++
812,989 UART: [kat] sha1
823,298 UART: [kat] SHA2-256
826,295 UART: [kat] SHA2-384
831,932 UART: [kat] SHA2-512-ACC
834,864 UART: [kat] ECC-384
3,276,274 UART: [kat] HMAC-384Kdf
3,288,171 UART: [kat] LMS
3,817,651 UART: [kat] --
3,820,437 UART: [cold-reset] ++
3,822,935 UART: [fht] FHT @ 0x50003400
3,833,228 UART: [idev] ++
3,833,796 UART: [idev] CDI.KEYID = 6
3,834,709 UART: [idev] SUBJECT.KEYID = 7
3,835,879 UART: [idev] UDS.KEYID = 0
3,836,797 ready_for_fw is high
3,836,988 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,931,542 UART: [idev] Erasing UDS.KEYID = 0
6,307,174 UART: [idev] Sha1 KeyId Algorithm
6,329,750 UART: [idev] --
6,333,480 UART: [ldev] ++
6,334,050 UART: [ldev] CDI.KEYID = 6
6,334,958 UART: [ldev] SUBJECT.KEYID = 5
6,336,167 UART: [ldev] AUTHORITY.KEYID = 7
6,337,405 UART: [ldev] FE.KEYID = 1
6,348,428 UART: [ldev] Erasing FE.KEYID = 1
8,825,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,850 UART: [ldev] --
10,614,804 UART: [fwproc] Wait for Commands...
10,617,443 UART: [fwproc] Recv command 0x46574c44
10,619,541 UART: [fwproc] Recv'd Img size: 75220 bytes
13,547,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,617,319 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,686,145 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
13,867,939 >>> mbox cmd response: success
13,868,361 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,872,643 UART: [afmc] ++
13,873,222 UART: [afmc] CDI.KEYID = 6
13,874,101 UART: [afmc] SUBJECT.KEYID = 7
13,875,332 UART: [afmc] AUTHORITY.KEYID = 5
16,372,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,093,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,095,583 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,111,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,127,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,143,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,165,579 UART: [afmc] --
18,169,928 UART: [cold-reset] --
18,174,710 UART: [state] Locking Datavault
18,179,520 UART: [state] Locking PCR0, PCR1 and PCR31
18,181,215 UART: [state] Locking ICCM
18,182,630 UART: [exit] Launching FMC @ 0x40000130
18,191,017 UART:
18,191,264 UART: Running Caliptra FMC ...
18,192,365 UART:
18,192,535 UART: [state] CFI Enabled
18,200,493 UART: [fht] FMC Alias Private Key: 7
19,956,950 UART: [art] Extend RT PCRs Done
19,958,174 UART: [art] Lock RT PCRs Done
19,960,196 UART: [art] Populate DV Done
19,965,656 UART: [fht] FMC Alias Private Key: 7
19,967,456 UART: [art] Derive CDI
19,968,233 UART: [art] Store in in slot 0x4
20,011,003 UART: [art] Derive Key Pair
20,012,016 UART: [art] Store priv key in slot 0x5
22,438,821 UART: [art] Derive Key Pair - Done
22,451,846 UART: [art] Signing Cert with AUTHO
22,453,187 UART: RITY.KEYID = 7
24,158,531 UART: [art] Erasing AUTHORITY.KEYID = 7
24,160,033 UART: [art] PUB.X = 811134BD12D3680F692719828D27D9EC3850D837FE61BDD80DE3EF90F661D41881532D9B53971B4D7D775402BF9AE1BF
24,167,268 UART: [art] PUB.Y = A63FBE3C354675EFB630850A031DFC5FD34222B765CFBE52ED1817EED15E545A55B6525ACC6D50655A5084644FBD8FCC
24,174,524 UART: [art] SIG.R = 236DBF704597688A124BB4F8BCE13420DFD235EAEFE4D0C5E480FD664799B34C58E8DAF6D6155F53C1E28BA42138B71C
24,181,962 UART: [art] SIG.S = ED7FA1CB2A64C6074D3F13EA7AEE20CE3CB807D038F5F1C8B8406EAA048F421C95EFDE7EC6F8F51963835AB2C54F3BD5
25,160,474 UART: mock_rt_interact::rt_entry...FMC Tester
25,277,193 UART: [rt] Runtime listening for mailbox commands...
25,281,421 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,696,829 ready_for_fw is high
3,697,422 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
13,644,943 >>> mbox cmd response: success
13,645,640 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,905,275 UART:
17,905,693 UART: Running Caliptra FMC ...
17,906,983 UART:
17,907,143 UART: [state] CFI Enabled
17,914,698 UART: [fht] FMC Alias Private Key: 7
19,672,343 UART: [art] Extend RT PCRs Done
19,673,573 UART: [art] Lock RT PCRs Done
19,675,274 UART: [art] Populate DV Done
19,680,790 UART: [fht] FMC Alias Private Key: 7
19,682,220 UART: [art] Derive CDI
19,682,948 UART: [art] Store in in slot 0x4
19,725,590 UART: [art] Derive Key Pair
19,726,588 UART: [art] Store priv key in slot 0x5
22,153,087 UART: [art] Derive Key Pair - Done
22,166,048 UART: [art] Signing Cert with AUTHO
22,167,360 UART: RITY.KEYID = 7
23,872,717 UART: [art] Erasing AUTHORITY.KEYID = 7
23,874,258 UART: [art] PUB.X = 51D55BC71B17F86B858E8AD5EE0B38F0A391B64632DF0B414357FC96ED755B0B8054446D785D20EC24B15A6F2A5A71B3
23,881,455 UART: [art] PUB.Y = 09D8BE495F01A8D6FCD947CC13857801493737F3677B9F8F32DA8100FA8C758AE4F02A2451E70D343383DA6A31B632AF
23,888,727 UART: [art] SIG.R = F382ACEB67585BEFF2B43BBE2350D50C02AF69A25927D54BBA07750843BF5D8B436200A594E1E87C8902CB469D272735
23,896,116 UART: [art] SIG.S = F365E37C7334B033767DC8BF0CFFF16950AA5317591B74B971B26C7BC4E1A00A0F64010B856771C2DB326D49B7AD00E9
24,874,582 UART: mock_rt_interact::rt_entry...FMC Tester
24,990,474 UART: [rt] Runtime listening for mailbox commands...
24,994,715 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,058 UART:
192,440 UART: Running Caliptra ROM ...
193,877 UART:
194,029 UART: [state] CFI Enabled
263,506 UART: [state] LifecycleState = Unprovisioned
265,873 UART: [state] DebugLocked = No
267,684 UART: [state] WD Timer not started. Device not locked for debugging
271,862 UART: [kat] SHA2-256
461,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,514 UART: [kat] ++
472,982 UART: [kat] sha1
485,772 UART: [kat] SHA2-256
488,850 UART: [kat] SHA2-384
495,186 UART: [kat] SHA2-512-ACC
497,831 UART: [kat] ECC-384
2,948,364 UART: [kat] HMAC-384Kdf
2,970,983 UART: [kat] LMS
3,502,774 UART: [kat] --
3,507,148 UART: [cold-reset] ++
3,508,869 UART: [fht] FHT @ 0x50003400
3,519,926 UART: [idev] ++
3,520,561 UART: [idev] CDI.KEYID = 6
3,521,594 UART: [idev] SUBJECT.KEYID = 7
3,522,765 UART: [idev] UDS.KEYID = 0
3,523,683 ready_for_fw is high
3,523,873 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,618,639 UART: [idev] Erasing UDS.KEYID = 0
6,029,331 UART: [idev] Sha1 KeyId Algorithm
6,052,601 UART: [idev] --
6,057,814 UART: [ldev] ++
6,058,555 UART: [ldev] CDI.KEYID = 6
6,059,466 UART: [ldev] SUBJECT.KEYID = 5
6,060,622 UART: [ldev] AUTHORITY.KEYID = 7
6,061,870 UART: [ldev] FE.KEYID = 1
6,099,849 UART: [ldev] Erasing FE.KEYID = 1
8,607,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,546 UART: [ldev] --
10,413,023 UART: [fwproc] Wait for Commands...
10,414,852 UART: [fwproc] Recv command 0x46574c44
10,417,103 UART: [fwproc] Recv'd Img size: 75220 bytes
13,377,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,458,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,574,561 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
13,882,842 >>> mbox cmd response: success
13,883,235 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,886,117 UART: [afmc] ++
13,886,864 UART: [afmc] CDI.KEYID = 6
13,887,963 UART: [afmc] SUBJECT.KEYID = 7
13,889,503 UART: [afmc] AUTHORITY.KEYID = 5
16,426,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,149,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,151,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,166,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,182,091 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,197,186 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,219,820 UART: [afmc] --
18,223,522 UART: [cold-reset] --
18,226,408 UART: [state] Locking Datavault
18,232,735 UART: [state] Locking PCR0, PCR1 and PCR31
18,234,935 UART: [state] Locking ICCM
18,236,547 UART: [exit] Launching FMC @ 0x40000130
18,245,242 UART:
18,245,478 UART: Running Caliptra FMC ...
18,246,575 UART:
18,246,729 UART: [state] CFI Enabled
18,307,576 UART: [fht] FMC Alias Private Key: 7
20,071,896 UART: [art] Extend RT PCRs Done
20,073,117 UART: [art] Lock RT PCRs Done
20,074,766 UART: [art] Populate DV Done
20,080,236 UART: [fht] FMC Alias Private Key: 7
20,081,675 UART: [art] Derive CDI
20,082,412 UART: [art] Store in in slot 0x4
20,139,867 UART: [art] Derive Key Pair
20,140,907 UART: [art] Store priv key in slot 0x5
22,604,307 UART: [art] Derive Key Pair - Done
22,617,793 UART: [art] Signing Cert with AUTHO
22,619,099 UART: RITY.KEYID = 7
24,329,518 UART: [art] Erasing AUTHORITY.KEYID = 7
24,331,478 UART: [art] PUB.X = 41B162381BA8A1CB1884FFE7B4DF25F935DF2E60A55605477EA76B16FFDBBD613D6EEBD4C9252A77695CDD52C8954CC2
24,338,305 UART: [art] PUB.Y = E23B2198614665E3F08C84DD589C9E066C79C1B068BFC77E8BF0B66D8D1299F9BDDE0D807FDBC2A095D95334201BF7DB
24,345,582 UART: [art] SIG.R = 3FD2DFC7BBE5DFC1ABD8358B5C4ADD7659FD4DDB13C025D9F1E7E3225708507F353412BBCEFEBF0145A660BC2469CF25
24,353,062 UART: [art] SIG.S = 7A78C4D208FA3421B7B6CF15FA904F228A808C06A12B9E42E56610D3ECE1FE77A3D6DFDBE8A4F0D68F120C0DE6C12E98
25,331,744 UART: mock_rt_interact::rt_entry...FMC Tester
25,447,611 UART: [rt] Runtime listening for mailbox commands...
25,451,842 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,435,705 ready_for_fw is high
3,436,121 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
13,883,201 >>> mbox cmd response: success
13,883,911 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,183,009 UART:
18,183,429 UART: Running Caliptra FMC ...
18,184,809 UART:
18,184,976 UART: [state] CFI Enabled
18,250,530 UART: [fht] FMC Alias Private Key: 7
20,013,894 UART: [art] Extend RT PCRs Done
20,015,144 UART: [art] Lock RT PCRs Done
20,016,801 UART: [art] Populate DV Done
20,022,113 UART: [fht] FMC Alias Private Key: 7
20,023,784 UART: [art] Derive CDI
20,024,824 UART: [art] Store in in slot 0x4
20,082,574 UART: [art] Derive Key Pair
20,083,587 UART: [art] Store priv key in slot 0x5
22,546,595 UART: [art] Derive Key Pair - Done
22,559,590 UART: [art] Signing Cert with AUTHO
22,560,894 UART: RITY.KEYID = 7
24,271,778 UART: [art] Erasing AUTHORITY.KEYID = 7
24,273,289 UART: [art] PUB.X = 09276A3C47B7A54FECC5D8F9846CEDDE4780E7A650D46C4B5D200E9E48EFC32714AE11921C630AFD5434C33B4F7379EA
24,280,607 UART: [art] PUB.Y = AF25E8C6F8EA019837F5EF8B42CB5F9624365CB65B21FB01CD360ED8A4649EC7725D09C88233EEA3F7024CFC3503A25E
24,287,860 UART: [art] SIG.R = 3E6F7B380DD15C75826E16AB04BD79E62844F9BD798A1D30C0FB7CD36C4B799A23D2CABC727C3E059144158875B804A8
24,295,258 UART: [art] SIG.S = AD9A5353308A6C40285AD6E81B554AF099C94FF6A3A6D9D4C5CB7942FD5B2B7E887D4323815EDAFC46FA2C6B4D9CA819
25,274,092 UART: mock_rt_interact::rt_entry...FMC Tester
25,390,273 UART: [rt] Runtime listening for mailbox commands...
25,394,561 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,449 UART:
192,806 UART: Running Caliptra ROM ...
193,935 UART:
603,708 UART: [state] CFI Enabled
617,866 UART: [state] LifecycleState = Unprovisioned
620,225 UART: [state] DebugLocked = No
622,526 UART: [state] WD Timer not started. Device not locked for debugging
626,842 UART: [kat] SHA2-256
816,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,553 UART: [kat] ++
828,026 UART: [kat] sha1
838,975 UART: [kat] SHA2-256
841,985 UART: [kat] SHA2-384
847,903 UART: [kat] SHA2-512-ACC
850,477 UART: [kat] ECC-384
3,291,214 UART: [kat] HMAC-384Kdf
3,305,359 UART: [kat] LMS
3,837,224 UART: [kat] --
3,840,367 UART: [cold-reset] ++
3,842,314 UART: [fht] FHT @ 0x50003400
3,854,781 UART: [idev] ++
3,855,493 UART: [idev] CDI.KEYID = 6
3,856,525 UART: [idev] SUBJECT.KEYID = 7
3,857,625 UART: [idev] UDS.KEYID = 0
3,858,546 ready_for_fw is high
3,858,731 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,953,266 UART: [idev] Erasing UDS.KEYID = 0
6,335,930 UART: [idev] Sha1 KeyId Algorithm
6,357,507 UART: [idev] --
6,361,985 UART: [ldev] ++
6,362,662 UART: [ldev] CDI.KEYID = 6
6,363,569 UART: [ldev] SUBJECT.KEYID = 5
6,364,775 UART: [ldev] AUTHORITY.KEYID = 7
6,365,996 UART: [ldev] FE.KEYID = 1
6,376,903 UART: [ldev] Erasing FE.KEYID = 1
8,855,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,698 UART: [ldev] --
10,647,268 UART: [fwproc] Wait for Commands...
10,649,094 UART: [fwproc] Recv command 0x46574c44
10,651,403 UART: [fwproc] Recv'd Img size: 75220 bytes
13,619,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,695,855 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,812,001 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
14,119,274 >>> mbox cmd response: success
14,119,678 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,123,300 UART: [afmc] ++
14,123,989 UART: [afmc] CDI.KEYID = 6
14,125,161 UART: [afmc] SUBJECT.KEYID = 7
14,126,645 UART: [afmc] AUTHORITY.KEYID = 5
16,632,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,353,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,355,853 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,371,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,386,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,401,216 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,424,966 UART: [afmc] --
18,428,338 UART: [cold-reset] --
18,431,884 UART: [state] Locking Datavault
18,438,478 UART: [state] Locking PCR0, PCR1 and PCR31
18,440,670 UART: [state] Locking ICCM
18,443,711 UART: [exit] Launching FMC @ 0x40000130
18,452,378 UART:
18,452,616 UART: Running Caliptra FMC ...
18,453,656 UART:
18,453,800 UART: [state] CFI Enabled
18,462,243 UART: [fht] FMC Alias Private Key: 7
20,218,951 UART: [art] Extend RT PCRs Done
20,220,172 UART: [art] Lock RT PCRs Done
20,221,876 UART: [art] Populate DV Done
20,227,347 UART: [fht] FMC Alias Private Key: 7
20,228,976 UART: [art] Derive CDI
20,229,799 UART: [art] Store in in slot 0x4
20,272,608 UART: [art] Derive Key Pair
20,273,602 UART: [art] Store priv key in slot 0x5
22,700,972 UART: [art] Derive Key Pair - Done
22,713,951 UART: [art] Signing Cert with AUTHO
22,715,280 UART: RITY.KEYID = 7
24,420,408 UART: [art] Erasing AUTHORITY.KEYID = 7
24,421,897 UART: [art] PUB.X = 92AD1378E2A53B7E8697E8B27DBC92B433BF920AD93BAC21338FE5145510953EF2E7FEA62E68D48F5261EE3BBC3D63B8
24,429,240 UART: [art] PUB.Y = C57DD54B36E33A73DBF45140397B6C1A5410C5B2A59DD42E822E247C48D53943E69261A38C17228567C21E9695A8EB4E
24,436,426 UART: [art] SIG.R = B6D5FBB765E4DCDE3F264385448DD91016E38F237B6B89FCD39949E34E092AC182F418EC4F0FC67CB95A571228150288
24,443,824 UART: [art] SIG.S = BF243D0E425073467DC0977AE70669E8A3BB0642C78A1D8C0405C227AFF2A10C3BF0594BC168483DDE44DAD20F6E38B5
25,422,124 UART: mock_rt_interact::rt_entry...FMC Tester
25,539,269 UART: [rt] Runtime listening for mailbox commands...
25,543,552 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,756,221 ready_for_fw is high
3,756,631 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
14,112,649 >>> mbox cmd response: success
14,113,297 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,359,789 UART:
18,360,169 UART: Running Caliptra FMC ...
18,361,452 UART:
18,361,606 UART: [state] CFI Enabled
18,369,413 UART: [fht] FMC Alias Private Key: 7
20,126,657 UART: [art] Extend RT PCRs Done
20,127,881 UART: [art] Lock RT PCRs Done
20,129,343 UART: [art] Populate DV Done
20,135,032 UART: [fht] FMC Alias Private Key: 7
20,136,549 UART: [art] Derive CDI
20,137,310 UART: [art] Store in in slot 0x4
20,179,739 UART: [art] Derive Key Pair
20,180,737 UART: [art] Store priv key in slot 0x5
22,607,445 UART: [art] Derive Key Pair - Done
22,620,767 UART: [art] Signing Cert with AUTHO
22,622,072 UART: RITY.KEYID = 7
24,327,340 UART: [art] Erasing AUTHORITY.KEYID = 7
24,328,843 UART: [art] PUB.X = B0EB6EE5960C7B271F67D4C8B464CAEA661BDB52834884DDD9144CD3D50E604470767DE36F24B9091A4FA695326427A3
24,336,153 UART: [art] PUB.Y = D4CF3131727AC3E2EA9DDB21EAE1ADE07E1E14C377CB115668BB4CB8BA87F8798C1611E04532AE2A3EB39C029A026734
24,343,412 UART: [art] SIG.R = 392AB6D899E2724097D056EBE1B4C9E1A5E415313680B89435B2337A5E0F6AFE162F2DE45C97E16BD7FB909C15933B07
24,350,747 UART: [art] SIG.S = 0262F09437D29741D75CA04D6B321934CF12934BCCB63CFBB6721BBA45B40B3657CD2A0284D82F12DB4347766F290405
25,329,038 UART: mock_rt_interact::rt_entry...FMC Tester
25,445,316 UART: [rt] Runtime listening for mailbox commands...
25,449,547 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,377 UART: [kat] SHA2-256
892,315 UART: [kat] SHA2-384
894,960 UART: [kat] SHA2-512-ACC
896,861 UART: [kat] ECC-384
902,320 UART: [kat] HMAC-384Kdf
906,720 UART: [kat] LMS
1,474,916 UART: [kat] --
1,475,551 UART: [cold-reset] ++
1,475,965 UART: [fht] Storing FHT @ 0x50003400
1,478,762 UART: [idev] ++
1,478,930 UART: [idev] CDI.KEYID = 6
1,479,290 UART: [idev] SUBJECT.KEYID = 7
1,479,714 UART: [idev] UDS.KEYID = 0
1,480,059 ready_for_fw is high
1,480,059 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,487,086 UART: [idev] Erasing UDS.KEYID = 0
1,503,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,511,884 UART: [idev] --
1,513,151 UART: [ldev] ++
1,513,319 UART: [ldev] CDI.KEYID = 6
1,513,682 UART: [ldev] SUBJECT.KEYID = 5
1,514,108 UART: [ldev] AUTHORITY.KEYID = 7
1,514,571 UART: [ldev] FE.KEYID = 1
1,519,455 UART: [ldev] Erasing FE.KEYID = 1
1,544,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,224 UART: [ldev] --
1,584,545 UART: [fwproc] Waiting for Commands...
1,585,226 UART: [fwproc] Received command 0x46574c44
1,586,017 UART: [fwproc] Received Image of size 75220 bytes
2,436,029 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,463,999 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,493,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 50536
2,570,564 >>> mbox cmd response: success
2,570,564 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,571,572 UART: [afmc] ++
2,571,740 UART: [afmc] CDI.KEYID = 6
2,572,102 UART: [afmc] SUBJECT.KEYID = 7
2,572,527 UART: [afmc] AUTHORITY.KEYID = 5
2,607,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,623,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,624,686 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,630,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,636,299 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,641,989 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,650,014 UART: [afmc] --
2,650,914 UART: [cold-reset] --
2,651,720 UART: [state] Locking Datavault
2,652,745 UART: [state] Locking PCR0, PCR1 and PCR31
2,653,349 UART: [state] Locking ICCM
2,653,847 UART: [exit] Launching FMC @ 0x40000130
2,659,176 UART:
2,659,192 UART: Running Caliptra FMC ...
2,659,600 UART:
2,659,654 UART: [state] CFI Enabled
2,669,871 UART: [fht] FMC Alias Private Key: 7
2,777,306 UART: [art] Extend RT PCRs Done
2,777,734 UART: [art] Lock RT PCRs Done
2,779,048 UART: [art] Populate DV Done
2,787,153 UART: [fht] FMC Alias Private Key: 7
2,788,223 UART: [art] Derive CDI
2,788,503 UART: [art] Store in in slot 0x4
2,873,536 UART: [art] Derive Key Pair
2,873,896 UART: [art] Store priv key in slot 0x5
2,887,096 UART: [art] Derive Key Pair - Done
2,901,679 UART: [art] Signing Cert with AUTHO
2,902,159 UART: RITY.KEYID = 7
2,917,563 UART: [art] Erasing AUTHORITY.KEYID = 7
2,918,328 UART: [art] PUB.X = EE18AC4401881881549F395172A08885D53B216BF6A552FC2125C1B6B4001DB01C4E1F44E398DD07BB0BA4CA99176705
2,925,062 UART: [art] PUB.Y = 82B04710D620C15B945DA76EF1CE78ED43044C5CB04EBCC64F3E2E8824C2795DFD912A0B1755A414087263F09276A695
2,932,003 UART: [art] SIG.R = EF33E7EEB727C7212EDAB2CE9C2DAE32EA3A4170C025454BC3A408A4D3ED4556B34C86DD87D387DA143422BA67458295
2,938,782 UART: [art] SIG.S = 4533D982C85B1B8450E81D520FC0E4A0C5BD9B556B158B902082997F12DDF0F490EB149C0EF5A6125FA367E60BC797F9
2,962,652 UART: mock_rt_interact::rt_entry...FMC Tester
3,070,420 UART: [rt] Runtime listening for mailbox commands...
3,073,810 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,953 ready_for_fw is high
1,362,953 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,420,088 >>> mbox cmd response: success
2,420,088 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,481,546 UART:
2,481,562 UART: Running Caliptra FMC ...
2,481,970 UART:
2,482,024 UART: [state] CFI Enabled
2,492,461 UART: [fht] FMC Alias Private Key: 7
2,600,680 UART: [art] Extend RT PCRs Done
2,601,108 UART: [art] Lock RT PCRs Done
2,602,624 UART: [art] Populate DV Done
2,610,759 UART: [fht] FMC Alias Private Key: 7
2,611,845 UART: [art] Derive CDI
2,612,125 UART: [art] Store in in slot 0x4
2,697,764 UART: [art] Derive Key Pair
2,698,124 UART: [art] Store priv key in slot 0x5
2,711,976 UART: [art] Derive Key Pair - Done
2,726,607 UART: [art] Signing Cert with AUTHO
2,727,087 UART: RITY.KEYID = 7
2,742,061 UART: [art] Erasing AUTHORITY.KEYID = 7
2,742,826 UART: [art] PUB.X = AE314955590C089663A1D24BF6E01112B4760C72142547E5D5992EF5DD5DABDF870A51A4A098E12144730E54A1E38765
2,749,575 UART: [art] PUB.Y = DE4E4983A9D5DF15F7A0EE9222E16FBE54716B88AA116637ED3F6AE30F648AE5B1980F50F2D64779D7F33CA61DEA7346
2,756,531 UART: [art] SIG.R = 12BD4BD116106F613B6D7254860B030E072C5C62CB6E4B357C8FF45E89939A491F6F267511A3214651F413F718C1526B
2,763,281 UART: [art] SIG.S = FBF41320A098E2B5443F01A3DD3E96C6A338EA429BEB93065947387B4CC1443A9BA5CCD7DF5262B79C3951AE1FBECC80
2,787,338 UART: mock_rt_interact::rt_entry...FMC Tester
2,894,834 UART: [rt] Runtime listening for mailbox commands...
2,898,224 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,142 UART: [kat] SHA2-256
882,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,188 UART: [kat] ++
886,340 UART: [kat] sha1
890,656 UART: [kat] SHA2-256
892,594 UART: [kat] SHA2-384
895,119 UART: [kat] SHA2-512-ACC
897,020 UART: [kat] ECC-384
902,491 UART: [kat] HMAC-384Kdf
907,165 UART: [kat] LMS
1,475,361 UART: [kat] --
1,476,110 UART: [cold-reset] ++
1,476,490 UART: [fht] Storing FHT @ 0x50003400
1,479,501 UART: [idev] ++
1,479,669 UART: [idev] CDI.KEYID = 6
1,480,029 UART: [idev] SUBJECT.KEYID = 7
1,480,453 UART: [idev] UDS.KEYID = 0
1,480,798 ready_for_fw is high
1,480,798 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,488,577 UART: [idev] Erasing UDS.KEYID = 0
1,505,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,867 UART: [idev] --
1,514,810 UART: [ldev] ++
1,514,978 UART: [ldev] CDI.KEYID = 6
1,515,341 UART: [ldev] SUBJECT.KEYID = 5
1,515,767 UART: [ldev] AUTHORITY.KEYID = 7
1,516,230 UART: [ldev] FE.KEYID = 1
1,521,420 UART: [ldev] Erasing FE.KEYID = 1
1,547,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,033 UART: [ldev] --
1,586,374 UART: [fwproc] Waiting for Commands...
1,587,227 UART: [fwproc] Received command 0x46574c44
1,588,018 UART: [fwproc] Received Image of size 75220 bytes
2,437,602 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,465,144 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,494,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 50536
2,571,747 >>> mbox cmd response: success
2,571,747 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,572,809 UART: [afmc] ++
2,572,977 UART: [afmc] CDI.KEYID = 6
2,573,339 UART: [afmc] SUBJECT.KEYID = 7
2,573,764 UART: [afmc] AUTHORITY.KEYID = 5
2,609,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,625,229 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,626,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,631,737 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,637,622 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,643,312 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,651,267 UART: [afmc] --
2,652,173 UART: [cold-reset] --
2,652,845 UART: [state] Locking Datavault
2,653,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,654,528 UART: [state] Locking ICCM
2,655,146 UART: [exit] Launching FMC @ 0x40000130
2,660,475 UART:
2,660,491 UART: Running Caliptra FMC ...
2,660,899 UART:
2,661,042 UART: [state] CFI Enabled
2,672,053 UART: [fht] FMC Alias Private Key: 7
2,779,838 UART: [art] Extend RT PCRs Done
2,780,266 UART: [art] Lock RT PCRs Done
2,781,912 UART: [art] Populate DV Done
2,790,241 UART: [fht] FMC Alias Private Key: 7
2,791,191 UART: [art] Derive CDI
2,791,471 UART: [art] Store in in slot 0x4
2,877,460 UART: [art] Derive Key Pair
2,877,820 UART: [art] Store priv key in slot 0x5
2,890,434 UART: [art] Derive Key Pair - Done
2,904,972 UART: [art] Signing Cert with AUTHO
2,905,452 UART: RITY.KEYID = 7
2,920,638 UART: [art] Erasing AUTHORITY.KEYID = 7
2,921,403 UART: [art] PUB.X = 86DC2D36A4FAA71C624056F477273A45AD21E0F5091118F2C5E9411AA794EB21B55726940C562BF3AE6BB481A122A534
2,928,167 UART: [art] PUB.Y = C73F54C5BF361A5A1B3541B8CE2039D1637A054259C4DD6CF8A798DBB8800383BF0719BA843C717B05E90CF061C67EE2
2,935,108 UART: [art] SIG.R = 09D945D0CA954594DBBC9F0E018051222904BF2EEF3AB12E2DAB86AF7203A9F6622BC3178E04B42BB1AA52C09A2B3AA0
2,941,874 UART: [art] SIG.S = CFCFB266D057C2CAF46920BB0CF33FF04984852CD6FDB32E97CC19DCE242A6777665E9C0E214B49CB279EFB5F2278220
2,965,720 UART: mock_rt_interact::rt_entry...FMC Tester
3,073,916 UART: [rt] Runtime listening for mailbox commands...
3,077,306 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,086 ready_for_fw is high
1,363,086 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,421,005 >>> mbox cmd response: success
2,421,005 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,482,375 UART:
2,482,391 UART: Running Caliptra FMC ...
2,482,799 UART:
2,482,942 UART: [state] CFI Enabled
2,493,417 UART: [fht] FMC Alias Private Key: 7
2,601,740 UART: [art] Extend RT PCRs Done
2,602,168 UART: [art] Lock RT PCRs Done
2,603,538 UART: [art] Populate DV Done
2,611,495 UART: [fht] FMC Alias Private Key: 7
2,612,473 UART: [art] Derive CDI
2,612,753 UART: [art] Store in in slot 0x4
2,698,392 UART: [art] Derive Key Pair
2,698,752 UART: [art] Store priv key in slot 0x5
2,711,966 UART: [art] Derive Key Pair - Done
2,726,310 UART: [art] Signing Cert with AUTHO
2,726,790 UART: RITY.KEYID = 7
2,741,798 UART: [art] Erasing AUTHORITY.KEYID = 7
2,742,563 UART: [art] PUB.X = C4C716CD9CA7EBC8229049D73236EF9AAC048B93C9DD607C0CA4E240B496363918EFD55E3C6BE1AF13C5F649EBF08367
2,749,341 UART: [art] PUB.Y = 9FADC2886C8FC9235080779037C884977D57F086A04EFDB22D9E22CF332DA91F740A94EDBD9EDFF63143F9138FBE01BB
2,756,297 UART: [art] SIG.R = 527CDBAB7B6547B89890A37D605049558ED6E27B44D853CB56E20F2D0355D243AADF1C13B3F8582D1C8C0979831A92AE
2,763,062 UART: [art] SIG.S = FB570565D4957BB935453FAB75F5D2E8BDFD3BBE9966E777E9F111DBFD1378B173997A11AABA81D599CDA530CF8E5F91
2,786,866 UART: mock_rt_interact::rt_entry...FMC Tester
2,895,108 UART: [rt] Runtime listening for mailbox commands...
2,898,498 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
892,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,105 UART: [kat] ++
897,257 UART: [kat] sha1
901,547 UART: [kat] SHA2-256
903,487 UART: [kat] SHA2-384
906,298 UART: [kat] SHA2-512-ACC
908,199 UART: [kat] ECC-384
917,730 UART: [kat] HMAC-384Kdf
922,436 UART: [kat] LMS
1,170,764 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,191 UART: [fht] FHT @ 0x50003400
1,174,650 UART: [idev] ++
1,174,818 UART: [idev] CDI.KEYID = 6
1,175,178 UART: [idev] SUBJECT.KEYID = 7
1,175,602 UART: [idev] UDS.KEYID = 0
1,175,947 ready_for_fw is high
1,175,947 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,183,394 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,113 UART: [idev] --
1,210,225 UART: [ldev] ++
1,210,393 UART: [ldev] CDI.KEYID = 6
1,210,756 UART: [ldev] SUBJECT.KEYID = 5
1,211,182 UART: [ldev] AUTHORITY.KEYID = 7
1,211,645 UART: [ldev] FE.KEYID = 1
1,217,041 UART: [ldev] Erasing FE.KEYID = 1
1,243,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,053 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,194 UART: [fwproc] Recv command 0x46574c44
1,283,922 UART: [fwproc] Recv'd Img size: 75220 bytes
2,132,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,189,032 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,266,215 >>> mbox cmd response: success
2,266,215 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,337 UART: [afmc] ++
2,267,505 UART: [afmc] CDI.KEYID = 6
2,267,867 UART: [afmc] SUBJECT.KEYID = 7
2,268,292 UART: [afmc] AUTHORITY.KEYID = 5
2,303,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,320,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,321,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,327,158 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,333,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,338,762 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,346,704 UART: [afmc] --
2,347,648 UART: [cold-reset] --
2,348,398 UART: [state] Locking Datavault
2,349,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,350,211 UART: [state] Locking ICCM
2,350,849 UART: [exit] Launching FMC @ 0x40000130
2,356,178 UART:
2,356,194 UART: Running Caliptra FMC ...
2,356,602 UART:
2,356,656 UART: [state] CFI Enabled
2,367,421 UART: [fht] FMC Alias Private Key: 7
2,475,640 UART: [art] Extend RT PCRs Done
2,476,068 UART: [art] Lock RT PCRs Done
2,477,360 UART: [art] Populate DV Done
2,485,721 UART: [fht] FMC Alias Private Key: 7
2,486,839 UART: [art] Derive CDI
2,487,119 UART: [art] Store in in slot 0x4
2,572,670 UART: [art] Derive Key Pair
2,573,030 UART: [art] Store priv key in slot 0x5
2,585,932 UART: [art] Derive Key Pair - Done
2,600,664 UART: [art] Signing Cert with AUTHO
2,601,144 UART: RITY.KEYID = 7
2,617,106 UART: [art] Erasing AUTHORITY.KEYID = 7
2,617,871 UART: [art] PUB.X = 36D3546D26B9E9D50963B9D5D3B29E8EDD43535BA5C891C16FC30A54386CD53E3D19195CDCCB7B9FA0C0244325DCFB74
2,624,647 UART: [art] PUB.Y = 65A386D14EADB14B33AED086C13A45CC67C18714CB2856779DF0501DBD723427064AFBC27F3C8132F7A0B3C9584683D6
2,631,598 UART: [art] SIG.R = 42626C3153F346007D9D7EA5C353831B08C7B232B4CCF10B95501C0D063EC5672DB5D81BF7B449A4608E0B528A2BE10F
2,638,330 UART: [art] SIG.S = 85D9E0EFB99BC6E6F239BA8E47583C5C3F4792D3C48A053D22C93774D3AC2E3700A2B1F226EBD52673868CEECE8F44BC
2,662,238 UART: mock_rt_interact::rt_entry...FMC Tester
2,769,138 UART: [rt] Runtime listening for mailbox commands...
2,772,528 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 ready_for_fw is high
1,060,255 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,117,600 >>> mbox cmd response: success
2,117,600 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,179,874 UART:
2,179,890 UART: Running Caliptra FMC ...
2,180,298 UART:
2,180,352 UART: [state] CFI Enabled
2,190,547 UART: [fht] FMC Alias Private Key: 7
2,298,570 UART: [art] Extend RT PCRs Done
2,298,998 UART: [art] Lock RT PCRs Done
2,300,696 UART: [art] Populate DV Done
2,308,739 UART: [fht] FMC Alias Private Key: 7
2,309,825 UART: [art] Derive CDI
2,310,105 UART: [art] Store in in slot 0x4
2,395,570 UART: [art] Derive Key Pair
2,395,930 UART: [art] Store priv key in slot 0x5
2,408,928 UART: [art] Derive Key Pair - Done
2,423,618 UART: [art] Signing Cert with AUTHO
2,424,098 UART: RITY.KEYID = 7
2,439,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,440,241 UART: [art] PUB.X = 8AAE975DEB1C5E67768072C28D9AC6677D1049AC9680E7D33D15AA37BC65F32DE4FB28CA60428DA6897A20498582E194
2,447,015 UART: [art] PUB.Y = D8F24CC48C7E87F1B0E26B02DF9353AB153547F607E1CF24918DED51E0B25A42761C5FBA2CC6940454D032B9575F6EA3
2,453,964 UART: [art] SIG.R = B65984757596B28C032A390F81AD0412860E0E0C8C368ECD05CFFF07647ECA907FE5A7110B194D18E22314E9F1E06F4C
2,460,709 UART: [art] SIG.S = 55DCD7527BB7785CDC51794B36530C521F98E442FDF6CE99351B16AFA6F7CFC98B08AFA0F1131A397DE33856ECF3EADD
2,483,736 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,452 UART: [rt] Runtime listening for mailbox commands...
2,594,842 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,441 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,482 UART: [cold-reset] ++
1,173,000 UART: [fht] FHT @ 0x50003400
1,175,761 UART: [idev] ++
1,175,929 UART: [idev] CDI.KEYID = 6
1,176,289 UART: [idev] SUBJECT.KEYID = 7
1,176,713 UART: [idev] UDS.KEYID = 0
1,177,058 ready_for_fw is high
1,177,058 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,184,955 UART: [idev] Erasing UDS.KEYID = 0
1,202,240 UART: [idev] Sha1 KeyId Algorithm
1,210,674 UART: [idev] --
1,211,872 UART: [ldev] ++
1,212,040 UART: [ldev] CDI.KEYID = 6
1,212,403 UART: [ldev] SUBJECT.KEYID = 5
1,212,829 UART: [ldev] AUTHORITY.KEYID = 7
1,213,292 UART: [ldev] FE.KEYID = 1
1,218,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,692 UART: [ldev] --
1,284,057 UART: [fwproc] Wait for Commands...
1,284,785 UART: [fwproc] Recv command 0x46574c44
1,285,513 UART: [fwproc] Recv'd Img size: 75220 bytes
2,134,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,161,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,191,007 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,268,232 >>> mbox cmd response: success
2,268,232 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,269,484 UART: [afmc] ++
2,269,652 UART: [afmc] CDI.KEYID = 6
2,270,014 UART: [afmc] SUBJECT.KEYID = 7
2,270,439 UART: [afmc] AUTHORITY.KEYID = 5
2,306,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,322,391 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,328,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,334,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,340,471 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,348,337 UART: [afmc] --
2,349,391 UART: [cold-reset] --
2,350,303 UART: [state] Locking Datavault
2,351,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,060 UART: [state] Locking ICCM
2,352,636 UART: [exit] Launching FMC @ 0x40000130
2,357,965 UART:
2,357,981 UART: Running Caliptra FMC ...
2,358,389 UART:
2,358,532 UART: [state] CFI Enabled
2,369,057 UART: [fht] FMC Alias Private Key: 7
2,477,614 UART: [art] Extend RT PCRs Done
2,478,042 UART: [art] Lock RT PCRs Done
2,479,798 UART: [art] Populate DV Done
2,488,077 UART: [fht] FMC Alias Private Key: 7
2,489,251 UART: [art] Derive CDI
2,489,531 UART: [art] Store in in slot 0x4
2,575,084 UART: [art] Derive Key Pair
2,575,444 UART: [art] Store priv key in slot 0x5
2,588,980 UART: [art] Derive Key Pair - Done
2,603,692 UART: [art] Signing Cert with AUTHO
2,604,172 UART: RITY.KEYID = 7
2,619,242 UART: [art] Erasing AUTHORITY.KEYID = 7
2,620,007 UART: [art] PUB.X = D9C05ABA61BAB90296751E5B04AE16364341B268B1009B09D694A505F858A9876B7A56DFD68C6D4AA8F701683E1ECDB5
2,626,746 UART: [art] PUB.Y = 3CDE67D1AB3B252294017679C5D354C55CA19D4B756E1AAF34E10F817A3F35157ABEE0725A1CF280A3676EBA864802E7
2,633,693 UART: [art] SIG.R = 8E6EEA2518887E15578B69BAD3B6DCD263B460315B310723419FC97152AC575732C697572B9442993C40E80EB6240247
2,640,442 UART: [art] SIG.S = 969F178BF918C35DF5E88F55535DA09DB4E4FFD76F18DF1B03D7E87B9278CC7E46AD761D423B07A20FC376F9DBFDC178
2,663,894 UART: mock_rt_interact::rt_entry...FMC Tester
2,771,079 UART: [rt] Runtime listening for mailbox commands...
2,774,469 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,774 ready_for_fw is high
1,060,774 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,122,607 >>> mbox cmd response: success
2,122,607 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,185,303 UART:
2,185,319 UART: Running Caliptra FMC ...
2,185,727 UART:
2,185,870 UART: [state] CFI Enabled
2,195,923 UART: [fht] FMC Alias Private Key: 7
2,303,720 UART: [art] Extend RT PCRs Done
2,304,148 UART: [art] Lock RT PCRs Done
2,305,916 UART: [art] Populate DV Done
2,314,047 UART: [fht] FMC Alias Private Key: 7
2,315,105 UART: [art] Derive CDI
2,315,385 UART: [art] Store in in slot 0x4
2,401,156 UART: [art] Derive Key Pair
2,401,516 UART: [art] Store priv key in slot 0x5
2,415,042 UART: [art] Derive Key Pair - Done
2,429,976 UART: [art] Signing Cert with AUTHO
2,430,456 UART: RITY.KEYID = 7
2,445,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,446,519 UART: [art] PUB.X = 0F9538A2FFEF6AB9B1A526DFD846BABA8060FBFC80425CF2FF98B570DC5D3F4F0050BF1D932C3E4160816B841A76B246
2,453,280 UART: [art] PUB.Y = F60D90B949C19E3DE4BDBC014F8BF97EAF038C90A2E8D0EF63C45A933A806F5B656CFF5584C35EA4B4753E2D0A9B7214
2,460,234 UART: [art] SIG.R = 3B5E65E011AF63275EF0CB9566AF05D31480E299B9F7F7F1965F2C339036F6D0FB2ED33F53BFDC57AFD96DCC93A78DAC
2,467,019 UART: [art] SIG.S = FCA65A672E653708865CDD2A2D5542CB52F4DC581129D076F96811C49EAC7EFA98281DE78544F6032C0F6A084AF671BC
2,491,038 UART: mock_rt_interact::rt_entry...FMC Tester
2,598,024 UART: [rt] Runtime listening for mailbox commands...
2,601,414 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
85,885 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,443 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,174,023 ready_for_fw is high
1,174,023 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,198,643 UART: [idev] Sha1 KeyId Algorithm
1,207,455 UART: [idev] --
1,208,458 UART: [ldev] ++
1,208,626 UART: [ldev] CDI.KEYID = 6
1,208,990 UART: [ldev] SUBJECT.KEYID = 5
1,209,417 UART: [ldev] AUTHORITY.KEYID = 7
1,209,880 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,116 UART: [ldev] --
1,280,538 UART: [fwproc] Wait for Commands...
1,281,331 UART: [fwproc] Recv command 0x46574c44
1,282,064 UART: [fwproc] Recv'd Img size: 75220 bytes
2,131,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,188,533 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,265,747 >>> mbox cmd response: success
2,265,747 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,266,788 UART: [afmc] ++
2,266,956 UART: [afmc] CDI.KEYID = 6
2,267,319 UART: [afmc] SUBJECT.KEYID = 7
2,267,745 UART: [afmc] AUTHORITY.KEYID = 5
2,302,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,319,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,319,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,325,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,331,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,337,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,345,015 UART: [afmc] --
2,346,105 UART: [cold-reset] --
2,346,965 UART: [state] Locking Datavault
2,348,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,348,636 UART: [state] Locking ICCM
2,349,172 UART: [exit] Launching FMC @ 0x40000130
2,354,501 UART:
2,354,517 UART: Running Caliptra FMC ...
2,354,925 UART:
2,354,979 UART: [state] CFI Enabled
2,365,110 UART: [fht] FMC Alias Private Key: 7
2,473,055 UART: [art] Extend RT PCRs Done
2,473,483 UART: [art] Lock RT PCRs Done
2,475,037 UART: [art] Populate DV Done
2,483,046 UART: [fht] FMC Alias Private Key: 7
2,484,206 UART: [art] Derive CDI
2,484,486 UART: [art] Store in in slot 0x4
2,570,193 UART: [art] Derive Key Pair
2,570,553 UART: [art] Store priv key in slot 0x5
2,583,911 UART: [art] Derive Key Pair - Done
2,598,534 UART: [art] Signing Cert with AUTHO
2,599,014 UART: RITY.KEYID = 7
2,613,910 UART: [art] Erasing AUTHORITY.KEYID = 7
2,614,675 UART: [art] PUB.X = 5348AF34788085E57A208A7E327CF27A3293B612F516D7AA5818C6A293A0426E4390484C89A9219ECA092A220FF29BE8
2,621,433 UART: [art] PUB.Y = DE9613CE5EC73C30446CFDDF9797F80F53C0E8C9F696677E895E0C16D865B8E2CEE458C59B6C5650CD73498396C3FBC9
2,628,387 UART: [art] SIG.R = C9471F0AC57E71457816B5BE5D3C4C3A7E7306662DC7F67E81B3F1572C70A85E315596BEE9956BA8C5AF797248DCA03C
2,635,157 UART: [art] SIG.S = EF5FD565F9DA9D958E7334A9EC3BFC35C4F605BEACD936D99FC9EAFDEF86DCC891D946A5A84527EFA16F98CAC1FD98EB
2,659,039 UART: mock_rt_interact::rt_entry...FMC Tester
2,765,516 UART: [rt] Runtime listening for mailbox commands...
2,768,906 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,968 ready_for_fw is high
1,055,968 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,113,817 >>> mbox cmd response: success
2,113,817 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,176,397 UART:
2,176,413 UART: Running Caliptra FMC ...
2,176,821 UART:
2,176,875 UART: [state] CFI Enabled
2,187,572 UART: [fht] FMC Alias Private Key: 7
2,295,489 UART: [art] Extend RT PCRs Done
2,295,917 UART: [art] Lock RT PCRs Done
2,297,215 UART: [art] Populate DV Done
2,305,392 UART: [fht] FMC Alias Private Key: 7
2,306,552 UART: [art] Derive CDI
2,306,832 UART: [art] Store in in slot 0x4
2,392,593 UART: [art] Derive Key Pair
2,392,953 UART: [art] Store priv key in slot 0x5
2,405,597 UART: [art] Derive Key Pair - Done
2,420,231 UART: [art] Signing Cert with AUTHO
2,420,711 UART: RITY.KEYID = 7
2,435,613 UART: [art] Erasing AUTHORITY.KEYID = 7
2,436,378 UART: [art] PUB.X = 4F60A8A5D9EAA42F87490796765BDB2A13FA1B6537A90A9E5EC398E0206F986E6817C835A2C30F01037C931E2E778DB2
2,443,135 UART: [art] PUB.Y = D1B78D14A8F4C2252CA47369398B64D1C134EA4071019DDBD84E01D52D1450F9C355D3E7452D46DD89E40E0D86F925B9
2,450,075 UART: [art] SIG.R = 802D5B13DFF736B8238BB37BBC257E37BE0F3A8685399029A5A2B934C7813174614DF576E0F4306DE0B5D07E97C79436
2,456,840 UART: [art] SIG.S = 460643CAB3FA9E77818138A2185DDA0E2E6727195551FE67D3A95C3CFE45267FC28FAB6F67D5A089F1457498FE1CEA71
2,480,243 UART: mock_rt_interact::rt_entry...FMC Tester
2,587,819 UART: [rt] Runtime listening for mailbox commands...
2,591,209 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,174,492 ready_for_fw is high
1,174,492 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,351 UART: [ldev] ++
1,209,519 UART: [ldev] CDI.KEYID = 6
1,209,883 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,402 UART: [fwproc] Recv command 0x46574c44
1,283,135 UART: [fwproc] Recv'd Img size: 75220 bytes
2,131,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,188,576 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,265,834 >>> mbox cmd response: success
2,265,834 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,266,873 UART: [afmc] ++
2,267,041 UART: [afmc] CDI.KEYID = 6
2,267,404 UART: [afmc] SUBJECT.KEYID = 7
2,267,830 UART: [afmc] AUTHORITY.KEYID = 5
2,302,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,319,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,319,932 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,325,661 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,331,544 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,337,263 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,344,912 UART: [afmc] --
2,346,020 UART: [cold-reset] --
2,346,904 UART: [state] Locking Datavault
2,347,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,348,497 UART: [state] Locking ICCM
2,348,953 UART: [exit] Launching FMC @ 0x40000130
2,354,282 UART:
2,354,298 UART: Running Caliptra FMC ...
2,354,706 UART:
2,354,849 UART: [state] CFI Enabled
2,365,234 UART: [fht] FMC Alias Private Key: 7
2,473,109 UART: [art] Extend RT PCRs Done
2,473,537 UART: [art] Lock RT PCRs Done
2,475,081 UART: [art] Populate DV Done
2,483,276 UART: [fht] FMC Alias Private Key: 7
2,484,416 UART: [art] Derive CDI
2,484,696 UART: [art] Store in in slot 0x4
2,570,551 UART: [art] Derive Key Pair
2,570,911 UART: [art] Store priv key in slot 0x5
2,584,865 UART: [art] Derive Key Pair - Done
2,599,503 UART: [art] Signing Cert with AUTHO
2,599,983 UART: RITY.KEYID = 7
2,614,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,615,682 UART: [art] PUB.X = BEFC7A5ECD40DFAA009373FA7688E6798575C12D43710EC2BA6DEC1280C00380F8D265715B8A02BD839C1747D045163B
2,622,427 UART: [art] PUB.Y = 9AA54ACA2E4B7AF15561976010397A7887DB7D2F75C9FCCC088604342431D671BBD137B977829FFC4C99F961B7978DC0
2,629,373 UART: [art] SIG.R = 89EB14FAC77C9FEAF2852EE6095DE74C3C9A9B14FD5EA77BF75007A563C4A1D78430AAC07A590967D25157E890ED9C5A
2,636,148 UART: [art] SIG.S = 18EBFE9C1A9CE0AE5849E044C8DF88775C9A9558AED87D083E28E28C88A6FB82F60B716BD3A1A1D114BE8D74C91D78EF
2,660,007 UART: mock_rt_interact::rt_entry...FMC Tester
2,767,287 UART: [rt] Runtime listening for mailbox commands...
2,770,677 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,047 ready_for_fw is high
1,056,047 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,113,882 >>> mbox cmd response: success
2,113,882 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,176,312 UART:
2,176,328 UART: Running Caliptra FMC ...
2,176,736 UART:
2,176,879 UART: [state] CFI Enabled
2,187,670 UART: [fht] FMC Alias Private Key: 7
2,295,503 UART: [art] Extend RT PCRs Done
2,295,931 UART: [art] Lock RT PCRs Done
2,297,345 UART: [art] Populate DV Done
2,305,598 UART: [fht] FMC Alias Private Key: 7
2,306,550 UART: [art] Derive CDI
2,306,830 UART: [art] Store in in slot 0x4
2,392,395 UART: [art] Derive Key Pair
2,392,755 UART: [art] Store priv key in slot 0x5
2,406,363 UART: [art] Derive Key Pair - Done
2,420,929 UART: [art] Signing Cert with AUTHO
2,421,409 UART: RITY.KEYID = 7
2,436,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,437,348 UART: [art] PUB.X = 81EEB882B8C6EAA255B9F52483A69B2A3241A6C1ADF0645AA6AC86CA335610A8917B63663E6743A9CE805C7EB228DB1D
2,444,128 UART: [art] PUB.Y = 0F11E5A463535CD395587406BD10330ED6BDBDC5EE7F7B745BB1A40A46A960ABE49FAAC471488F789A366480B11BCA1E
2,451,078 UART: [art] SIG.R = 9F24985E08A95F295B8159E131A8819C70E9E3E1F9EDEDB1660E18F01FBFA4C45F9FB3136AF91FF7121313CF7F21E4EE
2,457,854 UART: [art] SIG.S = C2D62BC9FF4854F27E229114E511EB997125C8A2B573CF24D60FE26379D4761BDC2627C7EF094B73E880DAB7E6C9E8C2
2,481,297 UART: mock_rt_interact::rt_entry...FMC Tester
2,587,438 UART: [rt] Runtime listening for mailbox commands...
2,590,828 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,254 UART:
192,613 UART: Running Caliptra ROM ...
193,807 UART:
193,956 UART: [state] CFI Enabled
265,444 UART: [state] LifecycleState = Unprovisioned
267,437 UART: [state] DebugLocked = No
269,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,461 UART: [kat] SHA2-256
443,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,671 UART: [kat] ++
454,272 UART: [kat] sha1
464,752 UART: [kat] SHA2-256
467,438 UART: [kat] SHA2-384
473,505 UART: [kat] SHA2-512-ACC
475,940 UART: [kat] ECC-384
2,766,720 UART: [kat] HMAC-384Kdf
2,800,428 UART: [kat] LMS
3,990,739 UART: [kat] --
3,996,554 UART: [cold-reset] ++
3,997,707 UART: [fht] Storing FHT @ 0x50003400
4,010,105 UART: [idev] ++
4,010,666 UART: [idev] CDI.KEYID = 6
4,011,618 UART: [idev] SUBJECT.KEYID = 7
4,012,858 UART: [idev] UDS.KEYID = 0
4,013,846 ready_for_fw is high
4,014,041 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
4,108,890 UART: [idev] Erasing UDS.KEYID = 0
7,345,367 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,577 UART: [idev] --
7,370,428 UART: [ldev] ++
7,370,990 UART: [ldev] CDI.KEYID = 6
7,371,919 UART: [ldev] SUBJECT.KEYID = 5
7,373,179 UART: [ldev] AUTHORITY.KEYID = 7
7,374,456 UART: [ldev] FE.KEYID = 1
7,421,985 UART: [ldev] Erasing FE.KEYID = 1
10,753,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,309 UART: [ldev] --
13,112,570 UART: [fwproc] Waiting for Commands...
13,115,368 UART: [fwproc] Received command 0x46574c44
13,117,544 UART: [fwproc] Received Image of size 75256 bytes
16,690,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,763,406 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,832,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 50552
17,013,385 >>> mbox cmd response: success
17,013,793 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,018,448 UART: [afmc] ++
17,019,083 UART: [afmc] CDI.KEYID = 6
17,020,009 UART: [afmc] SUBJECT.KEYID = 7
17,021,175 UART: [afmc] AUTHORITY.KEYID = 5
20,384,686 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,687,708 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,689,961 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,704,365 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,719,221 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,733,631 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,755,121 UART: [afmc] --
22,758,766 UART: [cold-reset] --
22,762,239 UART: [state] Locking Datavault
22,766,664 UART: [state] Locking PCR0, PCR1 and PCR31
22,768,408 UART: [state] Locking ICCM
22,770,283 UART: [exit] Launching FMC @ 0x40000130
22,778,675 UART:
22,778,974 UART: Running Caliptra FMC ...
22,780,002 UART:
22,780,152 UART: [state] CFI Enabled
22,846,168 UART: [fht] FMC Alias Private Key: 7
25,185,206 UART: [art] Extend RT PCRs Done
25,186,420 UART: [art] Lock RT PCRs Done
25,188,011 UART: [art] Populate DV Done
25,193,420 UART: [fht] FMC Alias Private Key: 7
25,195,068 UART: [art] Derive CDI
25,195,879 UART: [art] Store in in slot 0x4
25,254,827 UART: [art] Derive Key Pair
25,255,821 UART: [art] Store priv key in slot 0x5
28,548,726 UART: [art] Derive Key Pair - Done
28,561,831 UART: [art] Signing Cert with AUTHO
28,563,126 UART: RITY.KEYID = 7
30,850,373 UART: [art] Erasing AUTHORITY.KEYID = 7
30,851,895 UART: [art] PUB.X = 0097F7ABDC1947A1B9A4CEE5166FE34FFCFFCC4593DAC311493A9DB8CBE4CEAB8766F005BE66D7586CE71D009C02B42B
30,859,178 UART: [art] PUB.Y = 23FE19424B3D38ADDFAE8650E8A6017707B71BD30CE279A7E0506401140E307393A81AF8AE0BC37AD64BE6487B4159C8
30,866,414 UART: [art] SIG.R = 83D4A309B0510FE1F251E6E68C3D16D40ACAEFBB7BDA95314A89B0CB253A023036B5EE6099AF6045F42989B4681510B9
30,873,811 UART: [art] SIG.S = 151AFAA3EF65A4888D0F75D72AE2BBEA3E4F5ED6D6C0188294ACCFA603DB8BA005352120A25F476B5E0775C62247EED3
32,178,539 UART: mock_rt_interact::rt_entry...FMC Tester
32,296,176 UART: [rt] Runtime listening for mailbox commands...
32,300,447 >>> mbox cmd response data (2048 bytes)
32,310,210 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,311,881 >>> mbox cmd response data (336 bytes)
32,315,709 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,331,516 >>> mbox cmd response data (1536 bytes)
34,388,051 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
34,483,685 UART:
34,484,044 UART: Running Caliptra ROM ...
34,485,090 UART:
34,485,238 UART: [state] CFI Enabled
34,564,004 UART: [state] LifecycleState = Unprovisioned
34,566,005 UART: [state] DebugLocked = No
34,567,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,573,106 UART: [kat] SHA2-256
34,742,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,753,274 UART: [kat] ++
34,753,723 UART: [kat] sha1
34,763,416 UART: [kat] SHA2-256
34,766,109 UART: [kat] SHA2-384
34,770,579 UART: [kat] SHA2-512-ACC
34,772,922 UART: [kat] ECC-384
37,063,872 UART: [kat] HMAC-384Kdf
37,076,573 UART: [kat] LMS
38,266,968 UART: [kat] --
38,271,643 UART: [update-reset] ++
41,931,763 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,936,351 UART: [update-reset] Loading Runtime at address 0x40005000 len 50552
42,182,579 >>> mbox cmd response: success
42,184,083 UART: [update-reset] Copying MAN_2 To MAN_1
42,206,472 UART: [update-reset Success] --
42,211,133 UART: [state] Locking Datavault
42,214,378 UART: [state] Locking PCR0, PCR1 and PCR31
42,216,122 UART: [state] Locking ICCM
42,218,746 UART: [exit] Launching FMC @ 0x40000130
42,227,179 UART:
42,227,416 UART: Running Caliptra FMC ...
42,228,449 UART:
42,228,588 UART: [state] CFI Enabled
42,315,397 UART: [art] Extend RT PCRs Done
42,316,593 UART: [art] Lock RT PCRs Done
42,318,012 UART: [art] Populate DV Done
42,323,417 UART: [fht] FMC Alias Private Key: 7
42,324,895 UART: [art] Derive CDI
42,326,374 UART: [art] Store in in slot 0x4
42,384,422 UART: [art] Derive Key Pair
42,385,462 UART: [art] Store priv key in slot 0x5
45,677,929 UART: [art] Derive Key Pair - Done
45,690,981 UART: [art] Signing Cert with AUTHO
45,692,285 UART: RITY.KEYID = 7
47,981,511 UART: [art] Erasing AUTHORITY.KEYID = 7
47,983,024 UART: [art] PUB.X = 32E2F74C1CB125E0A1CD94AE4F3B53CFA3159ED34D374FD69ACBD890E043B5B8BC055F061F1C2FD37946AE317444891A
47,990,309 UART: [art] PUB.Y = E6743877E48FE9CE55280F68306B8035DD5E0C1C34A5D223960C592BFE2CDA211A363E5070A4AE4827246120C91703B1
47,997,529 UART: [art] SIG.R = 0D8F1366C6FB7AC09410C79EC733AC2B69856689D66575137C9FE213FC4FCC8A9FA11E4F3A14B37DB02896E88DF0ECD8
48,004,897 UART: [art] SIG.S = C18C46EAE336D32C03B6DCD43978D49B0F4845011DA281F95A15E70BF7343144FB581034BC36BD3075C287501291864C
49,308,597 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,309,857 UART: mock_rt_interact::rt_entry...FMC Tester
49,602,767 UART: [rt] Runtime listening for mailbox commands...
49,605,748 >>> mbox cmd response data (336 bytes)
49,609,801 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,625,607 >>> mbox cmd response data (1536 bytes)
49,632,924 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,633,321 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,786,912 ready_for_fw is high
3,787,804 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
17,087,485 >>> mbox cmd response: success
17,088,115 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,780,566 UART:
22,781,133 UART: Running Caliptra FMC ...
22,782,341 UART:
22,782,489 UART: [state] CFI Enabled
22,852,383 UART: [fht] FMC Alias Private Key: 7
25,190,520 UART: [art] Extend RT PCRs Done
25,192,218 UART: [art] Lock RT PCRs Done
25,193,334 UART: [art] Populate DV Done
25,198,510 UART: [fht] FMC Alias Private Key: 7
25,200,156 UART: [art] Derive CDI
25,200,974 UART: [art] Store in in slot 0x4
25,261,512 UART: [art] Derive Key Pair
25,262,550 UART: [art] Store priv key in slot 0x5
28,555,511 UART: [art] Derive Key Pair - Done
28,568,464 UART: [art] Signing Cert with AUTHO
28,569,759 UART: RITY.KEYID = 7
30,855,302 UART: [art] Erasing AUTHORITY.KEYID = 7
30,856,809 UART: [art] PUB.X = B0CBFA0A11DD5A5A2928F96AC5109EC01E82450C70A55A78F3F550E5416927AD88F4E64C025057E25C123047864EB735
30,864,035 UART: [art] PUB.Y = 59562E45F257E7A79AF7CE72A5BBE6EFAE0166F69F6C49EC9CABFB73A36C155B894456DDE8021B72657B2F8FADED27B8
30,871,298 UART: [art] SIG.R = BC7281D06C275CC0D0463B824E025672D6176B7A0E2B8BB0B322491E7DA65E3285E87573D6062CDC60116706A3EF094B
30,878,655 UART: [art] SIG.S = 37A340D6C89DCFBB8CC7F28DC8EBA469A2BF62081E468702611F73D919B7D8DB19BD042ABDF6819EBDAF2614E834A3F8
32,183,548 UART: mock_rt_interact::rt_entry...FMC Tester
32,299,807 UART: [rt] Runtime listening for mailbox commands...
32,304,089 >>> mbox cmd response data (2048 bytes)
32,313,803 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,315,475 >>> mbox cmd response data (336 bytes)
32,319,288 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,335,098 >>> mbox cmd response data (1536 bytes)
34,400,234 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
42,300,037 >>> mbox cmd response: success
42,334,403 UART:
42,334,706 UART: Running Caliptra FMC ...
42,335,820 UART:
42,335,984 UART: [state] CFI Enabled
42,422,645 UART: [art] Extend RT PCRs Done
42,423,841 UART: [art] Lock RT PCRs Done
42,425,223 UART: [art] Populate DV Done
42,430,633 UART: [fht] FMC Alias Private Key: 7
42,432,274 UART: [art] Derive CDI
42,433,084 UART: [art] Store in in slot 0x4
42,491,577 UART: [art] Derive Key Pair
42,492,597 UART: [art] Store priv key in slot 0x5
45,785,526 UART: [art] Derive Key Pair - Done
45,798,349 UART: [art] Signing Cert with AUTHO
45,799,642 UART: RITY.KEYID = 7
48,087,499 UART: [art] Erasing AUTHORITY.KEYID = 7
48,089,011 UART: [art] PUB.X = 62BB8DAAA789AB4D86FC63921E0F2DE961B55EDEBFBE7CFE5D8E82A443DB3908159BC80AD1654C2EDE3F3B4E19C997A7
48,096,468 UART: [art] PUB.Y = FCE30461C7CBF60FCC9EA9457EE1C376E82C8D8BC3615B38928632D2188DC21F08BBCD5C7D8A064FE21D4E065FC3852A
48,103,522 UART: [art] SIG.R = 025BF59C0890CA0B47BE031A000C30E5D2C3D5242AE1998A82078FDFD6B3B01E07A76F3C6B702513D89B050F8794446A
48,110,918 UART: [art] SIG.S = E3A8E7A22217444072441276FD46FCACD4BEDB0409D793A2708E774EAE96D225D63F7AF82ECF9D193054867D02B97073
49,414,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,415,540 UART: mock_rt_interact::rt_entry...FMC Tester
49,707,100 UART: [rt] Runtime listening for mailbox commands...
49,710,027 >>> mbox cmd response data (336 bytes)
49,713,777 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,729,581 >>> mbox cmd response data (1536 bytes)
49,737,130 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,737,576 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,465 UART:
192,829 UART: Running Caliptra ROM ...
194,012 UART:
603,828 UART: [state] CFI Enabled
621,113 UART: [state] LifecycleState = Unprovisioned
623,019 UART: [state] DebugLocked = No
625,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,258 UART: [kat] SHA2-256
800,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,570 UART: [kat] ++
811,054 UART: [kat] sha1
821,929 UART: [kat] SHA2-256
824,656 UART: [kat] SHA2-384
830,215 UART: [kat] SHA2-512-ACC
832,587 UART: [kat] ECC-384
3,116,131 UART: [kat] HMAC-384Kdf
3,128,448 UART: [kat] LMS
4,318,556 UART: [kat] --
4,321,837 UART: [cold-reset] ++
4,323,136 UART: [fht] Storing FHT @ 0x50003400
4,335,047 UART: [idev] ++
4,335,616 UART: [idev] CDI.KEYID = 6
4,336,493 UART: [idev] SUBJECT.KEYID = 7
4,337,804 UART: [idev] UDS.KEYID = 0
4,338,869 ready_for_fw is high
4,339,080 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
4,433,751 UART: [idev] Erasing UDS.KEYID = 0
7,627,193 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,816 UART: [idev] --
7,652,887 UART: [ldev] ++
7,653,455 UART: [ldev] CDI.KEYID = 6
7,654,469 UART: [ldev] SUBJECT.KEYID = 5
7,655,644 UART: [ldev] AUTHORITY.KEYID = 7
7,656,874 UART: [ldev] FE.KEYID = 1
7,666,185 UART: [ldev] Erasing FE.KEYID = 1
10,956,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,479 UART: [ldev] --
13,318,818 UART: [fwproc] Waiting for Commands...
13,321,058 UART: [fwproc] Received command 0x46574c44
13,323,293 UART: [fwproc] Received Image of size 75256 bytes
16,901,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,983,587 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,052,440 UART: [fwproc] Loading Runtime at address 0x40005000 len 50552
17,233,367 >>> mbox cmd response: success
17,233,801 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,237,256 UART: [afmc] ++
17,237,838 UART: [afmc] CDI.KEYID = 6
17,238,741 UART: [afmc] SUBJECT.KEYID = 7
17,240,009 UART: [afmc] AUTHORITY.KEYID = 5
20,556,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,848,575 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,850,833 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,865,267 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,880,066 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,894,481 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,916,063 UART: [afmc] --
22,919,823 UART: [cold-reset] --
22,924,380 UART: [state] Locking Datavault
22,929,351 UART: [state] Locking PCR0, PCR1 and PCR31
22,931,100 UART: [state] Locking ICCM
22,933,481 UART: [exit] Launching FMC @ 0x40000130
22,941,889 UART:
22,942,166 UART: Running Caliptra FMC ...
22,943,271 UART:
22,943,430 UART: [state] CFI Enabled
22,951,421 UART: [fht] FMC Alias Private Key: 7
25,282,547 UART: [art] Extend RT PCRs Done
25,283,767 UART: [art] Lock RT PCRs Done
25,285,492 UART: [art] Populate DV Done
25,290,903 UART: [fht] FMC Alias Private Key: 7
25,292,434 UART: [art] Derive CDI
25,293,245 UART: [art] Store in in slot 0x4
25,335,944 UART: [art] Derive Key Pair
25,336,933 UART: [art] Store priv key in slot 0x5
28,578,762 UART: [art] Derive Key Pair - Done
28,591,432 UART: [art] Signing Cert with AUTHO
28,592,745 UART: RITY.KEYID = 7
30,871,962 UART: [art] Erasing AUTHORITY.KEYID = 7
30,873,471 UART: [art] PUB.X = 00132F6418E254493302FA2B60C495CA1705B7652327007E82019D60AD93986B14099E3BB6087A12A6769F0B6CBB4D45
30,880,591 UART: [art] PUB.Y = FEED5617A03BDA62A39E07D1C1EB21A7F9D83D8520AC734080A7B63770739D1048AE825F1038522C4CDEEF7433259675
30,887,842 UART: [art] SIG.R = 60BFF33356673FC683437E2219999FA0A8ACBF18FE9E83383110A04F0BFFA13B1CF4EFF1E10F0A5ED750BA75E7F3323E
30,895,257 UART: [art] SIG.S = 9C9574610AC40B5664D1DAA2D2FA6A0817017FA7CCC406D4F108C98F772CAE54C9E15F96AEE903BA55379A17E342B413
32,200,448 UART: mock_rt_interact::rt_entry...FMC Tester
32,317,513 UART: [rt] Runtime listening for mailbox commands...
32,321,802 >>> mbox cmd response data (2048 bytes)
32,331,529 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,333,190 >>> mbox cmd response data (336 bytes)
32,336,986 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,352,790 >>> mbox cmd response data (1536 bytes)
34,408,143 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
34,503,730 UART:
34,504,078 UART: Running Caliptra ROM ...
34,505,134 UART:
34,505,398 UART: [state] CFI Enabled
34,518,332 UART: [state] LifecycleState = Unprovisioned
34,520,219 UART: [state] DebugLocked = No
34,522,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,527,359 UART: [kat] SHA2-256
34,697,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,707,579 UART: [kat] ++
34,708,122 UART: [kat] sha1
34,718,798 UART: [kat] SHA2-256
34,721,487 UART: [kat] SHA2-384
34,726,983 UART: [kat] SHA2-512-ACC
34,729,348 UART: [kat] ECC-384
37,012,891 UART: [kat] HMAC-384Kdf
37,023,494 UART: [kat] LMS
38,213,593 UART: [kat] --
38,218,550 UART: [update-reset] ++
41,891,713 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,894,931 UART: [update-reset] Loading Runtime at address 0x40005000 len 50552
42,141,208 >>> mbox cmd response: success
42,142,061 UART: [update-reset] Copying MAN_2 To MAN_1
42,164,457 UART: [update-reset Success] --
42,170,144 UART: [state] Locking Datavault
42,172,695 UART: [state] Locking PCR0, PCR1 and PCR31
42,174,392 UART: [state] Locking ICCM
42,176,594 UART: [exit] Launching FMC @ 0x40000130
42,184,988 UART:
42,185,231 UART: Running Caliptra FMC ...
42,186,348 UART:
42,186,507 UART: [state] CFI Enabled
42,230,673 UART: [art] Extend RT PCRs Done
42,231,867 UART: [art] Lock RT PCRs Done
42,233,378 UART: [art] Populate DV Done
42,238,886 UART: [fht] FMC Alias Private Key: 7
42,240,522 UART: [art] Derive CDI
42,242,099 UART: [art] Store in in slot 0x4
42,284,058 UART: [art] Derive Key Pair
42,285,060 UART: [art] Store priv key in slot 0x5
45,527,148 UART: [art] Derive Key Pair - Done
45,539,932 UART: [art] Signing Cert with AUTHO
45,541,234 UART: RITY.KEYID = 7
47,820,611 UART: [art] Erasing AUTHORITY.KEYID = 7
47,822,119 UART: [art] PUB.X = FC32F3497159776EF4291A558CEDCCA5D74C5690844FF1EF910CCA2F86504BD22DE19B3ED911717FCD307374C787D0A5
47,829,381 UART: [art] PUB.Y = 6EECF4C531B35CBD33779BC8B57E0D4909DBEFA6BE6527BF4164A15E3BCC8FFB4945FAA43894E3896FB1F083D267B09C
47,836,689 UART: [art] SIG.R = 5D8131F710655031258B236E6944977A1C149810F5F15C0D853D032A26A0E606A4CA1A5B3A3B70758FEC9A374A1EAC88
47,844,027 UART: [art] SIG.S = 180E772155AA6EDD7BB88340C36BCE0B46D1EE334BB82135993D86F6B53DA393B51CB731D6AF91B531AA21F00A020D55
49,147,876 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,149,335 UART: mock_rt_interact::rt_entry...FMC Tester
49,440,594 UART: [rt] Runtime listening for mailbox commands...
49,443,523 >>> mbox cmd response data (336 bytes)
49,447,610 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,463,424 >>> mbox cmd response data (1536 bytes)
49,470,740 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,471,134 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,128,212 ready_for_fw is high
4,128,651 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
17,300,632 >>> mbox cmd response: success
17,301,268 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,944,472 UART:
22,944,871 UART: Running Caliptra FMC ...
22,946,154 UART:
22,946,319 UART: [state] CFI Enabled
22,954,241 UART: [fht] FMC Alias Private Key: 7
25,285,234 UART: [art] Extend RT PCRs Done
25,286,469 UART: [art] Lock RT PCRs Done
25,287,850 UART: [art] Populate DV Done
25,293,252 UART: [fht] FMC Alias Private Key: 7
25,294,796 UART: [art] Derive CDI
25,295,529 UART: [art] Store in in slot 0x4
25,338,338 UART: [art] Derive Key Pair
25,339,379 UART: [art] Store priv key in slot 0x5
28,581,014 UART: [art] Derive Key Pair - Done
28,593,769 UART: [art] Signing Cert with AUTHO
28,595,078 UART: RITY.KEYID = 7
30,874,451 UART: [art] Erasing AUTHORITY.KEYID = 7
30,876,441 UART: [art] PUB.X = 9A0A50E6C156838492883F83D2E09A7065BE2E66104C3DBC5FB5D1790AC9917EE0D69F435D9BCCD82D845111C2953F19
30,883,189 UART: [art] PUB.Y = 0D2CF80F60FEEEF2919E640E083AF88F6AB474713F884C49219490D47A64DA2351DAD2078A2152213B3130A02C8BB0E3
30,890,420 UART: [art] SIG.R = 9DD3CB74FCB5785A0479F62CEB3DA65151CD8E31207AF5829CF1D47402FDA9C3FA142BA61660137C1262AB805F722C76
30,897,815 UART: [art] SIG.S = 3C34BAC38C01860638CA18421E1CD3A19C1F85A6086030F38F2259FC45205D75154BE8F877102C202B40ED6BE2AA996C
32,202,257 UART: mock_rt_interact::rt_entry...FMC Tester
32,318,253 UART: [rt] Runtime listening for mailbox commands...
32,322,502 >>> mbox cmd response data (2048 bytes)
32,332,232 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,333,920 >>> mbox cmd response data (336 bytes)
32,337,847 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,353,656 >>> mbox cmd response data (1536 bytes)
34,409,948 <<< Executing mbox cmd 0x46574c44 (75256 bytes) from SoC
42,229,737 >>> mbox cmd response: success
42,265,649 UART:
42,265,962 UART: Running Caliptra FMC ...
42,267,082 UART:
42,267,249 UART: [state] CFI Enabled
42,311,124 UART: [art] Extend RT PCRs Done
42,312,312 UART: [art] Lock RT PCRs Done
42,313,897 UART: [art] Populate DV Done
42,319,256 UART: [fht] FMC Alias Private Key: 7
42,320,788 UART: [art] Derive CDI
42,321,603 UART: [art] Store in in slot 0x4
42,364,480 UART: [art] Derive Key Pair
42,365,518 UART: [art] Store priv key in slot 0x5
45,607,300 UART: [art] Derive Key Pair - Done
45,620,538 UART: [art] Signing Cert with AUTHO
45,621,846 UART: RITY.KEYID = 7
47,901,068 UART: [art] Erasing AUTHORITY.KEYID = 7
47,902,583 UART: [art] PUB.X = 346CC823C743E4A5EAFF33D27A800E10A5BA35FEFAC95AB04A3AB57A642B24B18F1432FD83B9ADC767F77440A69AD250
47,909,844 UART: [art] PUB.Y = 4EF998B229E7642320A9DA05A9C08B682340460EE0DCBBE301FFF156A61D6196ADE6471A18BB0EAB797561F86EAD88A5
47,917,088 UART: [art] SIG.R = 1B680BDD1A2A0E8FF399FA21CFA6FA7EAF805228213ECF7C9B5C91787DF2D17945F69A8670871E7737C2FFC369680028
47,924,443 UART: [art] SIG.S = 92E44BEB86B36FA665FCCEF71448AE4240A3569F90AB6EE59AA06F72CA8C351B6A2122C2BCA2D001EB9676DF8A5D14DC
49,228,108 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,229,074 UART: mock_rt_interact::rt_entry...FMC Tester
49,517,164 UART: [rt] Runtime listening for mailbox commands...
49,520,119 >>> mbox cmd response data (336 bytes)
49,524,187 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,539,988 >>> mbox cmd response data (1536 bytes)
49,547,806 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,548,228 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,468 UART:
193,358 UART: Running Caliptra ROM ...
194,517 UART:
194,661 UART: [state] CFI Enabled
265,889 UART: [state] LifecycleState = Unprovisioned
268,143 UART: [state] DebugLocked = No
269,624 UART: [state] WD Timer not started. Device not locked for debugging
272,879 UART: [kat] SHA2-256
452,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,615 UART: [kat] ++
464,071 UART: [kat] sha1
474,444 UART: [kat] SHA2-256
477,449 UART: [kat] SHA2-384
484,148 UART: [kat] SHA2-512-ACC
487,078 UART: [kat] ECC-384
2,941,435 UART: [kat] HMAC-384Kdf
2,967,030 UART: [kat] LMS
3,496,475 UART: [kat] --
3,500,510 UART: [cold-reset] ++
3,501,605 UART: [fht] FHT @ 0x50003400
3,512,427 UART: [idev] ++
3,513,026 UART: [idev] CDI.KEYID = 6
3,513,925 UART: [idev] SUBJECT.KEYID = 7
3,515,017 UART: [idev] UDS.KEYID = 0
3,516,085 ready_for_fw is high
3,516,306 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,611,403 UART: [idev] Erasing UDS.KEYID = 0
6,025,534 UART: [idev] Sha1 KeyId Algorithm
6,048,700 UART: [idev] --
6,051,898 UART: [ldev] ++
6,052,477 UART: [ldev] CDI.KEYID = 6
6,053,360 UART: [ldev] SUBJECT.KEYID = 5
6,054,593 UART: [ldev] AUTHORITY.KEYID = 7
6,055,827 UART: [ldev] FE.KEYID = 1
6,101,287 UART: [ldev] Erasing FE.KEYID = 1
8,607,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,862 UART: [ldev] --
10,413,411 UART: [fwproc] Wait for Commands...
10,415,924 UART: [fwproc] Recv command 0x46574c44
10,418,024 UART: [fwproc] Recv'd Img size: 75220 bytes
13,349,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,423,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,492,560 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
13,673,600 >>> mbox cmd response: success
13,674,056 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,678,490 UART: [afmc] ++
13,679,078 UART: [afmc] CDI.KEYID = 6
13,679,993 UART: [afmc] SUBJECT.KEYID = 7
13,681,150 UART: [afmc] AUTHORITY.KEYID = 5
16,216,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,939,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,941,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,957,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,973,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,989,397 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,013,105 UART: [afmc] --
18,016,846 UART: [cold-reset] --
18,020,016 UART: [state] Locking Datavault
18,027,604 UART: [state] Locking PCR0, PCR1 and PCR31
18,029,306 UART: [state] Locking ICCM
18,031,798 UART: [exit] Launching FMC @ 0x40000130
18,040,201 UART:
18,040,435 UART: Running Caliptra FMC ...
18,041,540 UART:
18,041,696 UART: [state] CFI Enabled
18,099,013 UART: [fht] FMC Alias Private Key: 7
19,862,904 UART: [art] Extend RT PCRs Done
19,864,136 UART: [art] Lock RT PCRs Done
19,865,951 UART: [art] Populate DV Done
19,871,194 UART: [fht] FMC Alias Private Key: 7
19,872,725 UART: [art] Derive CDI
19,873,455 UART: [art] Store in in slot 0x4
19,932,134 UART: [art] Derive Key Pair
19,933,442 UART: [art] Store priv key in slot 0x5
22,396,341 UART: [art] Derive Key Pair - Done
22,409,650 UART: [art] Signing Cert with AUTHO
22,410,970 UART: RITY.KEYID = 7
24,121,654 UART: [art] Erasing AUTHORITY.KEYID = 7
24,123,173 UART: [art] PUB.X = 18DFB55FDF4B7BD3F158221D53746BEBFE21E743A5FBF97DBE5647D686FB0721FFB30CA15CF336C5A7E99AFBBBC8CC68
24,130,431 UART: [art] PUB.Y = 249D76FE58F6C5BE871589F59D2DCC590CEFE9905A7B04E36B716DC30B7DD4A9C71FAD5CCAD9370F7CBA3D4F0688418D
24,137,724 UART: [art] SIG.R = 54B274F9694A40BEEC5B99DFC39D446812EBFA327FA1300D142E91DD017011ADF7AA7A3D2938F5BBCC7BD5520A9BB5C4
24,145,156 UART: [art] SIG.S = 3A1DE91436EB925F7D1B358418EA70D52ABF25213F4E55C47C3CBF9D3FDCC8F8417D4B6FD0AD106260CB898F8EB582A2
25,123,707 UART: mock_rt_interact::rt_entry...FMC Tester
25,240,826 UART: [rt] Runtime listening for mailbox commands...
25,245,060 >>> mbox cmd response data (2048 bytes)
25,254,800 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,256,462 >>> mbox cmd response data (336 bytes)
25,260,345 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,276,155 >>> mbox cmd response data (1536 bytes)
27,336,300 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
27,431,929 UART:
27,432,302 UART: Running Caliptra ROM ...
27,433,437 UART:
27,433,602 UART: [state] CFI Enabled
27,510,770 UART: [state] LifecycleState = Unprovisioned
27,512,654 UART: [state] DebugLocked = No
27,514,048 UART: [state] WD Timer not started. Device not locked for debugging
27,517,131 UART: [kat] SHA2-256
27,696,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,707,795 UART: [kat] ++
27,708,339 UART: [kat] sha1
27,719,283 UART: [kat] SHA2-256
27,722,286 UART: [kat] SHA2-384
27,728,273 UART: [kat] SHA2-512-ACC
27,731,175 UART: [kat] ECC-384
30,193,106 UART: [kat] HMAC-384Kdf
30,217,320 UART: [kat] LMS
30,746,779 UART: [kat] --
30,749,400 UART: [update-reset] ++
33,701,187 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,705,110 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
33,951,113 >>> mbox cmd response: success
33,951,884 UART: [update-reset] Copying MAN_2 To MAN_1
33,974,220 UART: [update-reset Success] --
33,978,936 UART: [state] Locking Datavault
33,982,673 UART: [state] Locking PCR0, PCR1 and PCR31
33,984,371 UART: [state] Locking ICCM
33,985,353 UART: [exit] Launching FMC @ 0x40000130
33,993,802 UART:
33,994,030 UART: Running Caliptra FMC ...
33,995,076 UART:
33,995,225 UART: [state] CFI Enabled
34,088,256 UART: [art] Extend RT PCRs Done
34,089,445 UART: [art] Lock RT PCRs Done
34,090,816 UART: [art] Populate DV Done
34,096,389 UART: [fht] FMC Alias Private Key: 7
34,098,014 UART: [art] Derive CDI
34,098,761 UART: [art] Store in in slot 0x4
34,157,426 UART: [art] Derive Key Pair
34,158,424 UART: [art] Store priv key in slot 0x5
36,621,464 UART: [art] Derive Key Pair - Done
36,634,332 UART: [art] Signing Cert with AUTHO
36,635,638 UART: RITY.KEYID = 7
38,347,254 UART: [art] Erasing AUTHORITY.KEYID = 7
38,348,762 UART: [art] PUB.X = D55315D60701119AD0F68F79D871C18C6DBAFE31BBA771AC4267EC47FC274B981505E5319F177FDAB120117169073D7C
38,356,064 UART: [art] PUB.Y = 87DEDB88E8832E9EAD3687D66CBF259C566C50D28A193FB80D310399AB877BA9E23BA32D5915AB0FE342EBC1ACA1D659
38,363,330 UART: [art] SIG.R = 0FB22E3DE4C055E448E6353EA5128EC5F8CBA4E3F34B78E87A933CC876427E0124EE28BE072BD29A46B64C66FD277213
38,370,721 UART: [art] SIG.S = 6115E27729BC65E940D9EB0B69AEB25EF2E059E2383045C18144E9582A1E9231DE92486660B65D2BCF945C9C888B358E
39,348,351 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,349,609 UART: mock_rt_interact::rt_entry...FMC Tester
39,637,642 UART: [rt] Runtime listening for mailbox commands...
39,640,576 >>> mbox cmd response data (336 bytes)
39,644,271 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,660,097 >>> mbox cmd response data (1536 bytes)
39,667,397 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,667,803 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,361,698 ready_for_fw is high
3,362,090 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
13,443,960 >>> mbox cmd response: success
13,444,675 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,727,101 UART:
17,727,476 UART: Running Caliptra FMC ...
17,728,752 UART:
17,728,908 UART: [state] CFI Enabled
17,795,688 UART: [fht] FMC Alias Private Key: 7
19,559,555 UART: [art] Extend RT PCRs Done
19,560,756 UART: [art] Lock RT PCRs Done
19,562,434 UART: [art] Populate DV Done
19,567,840 UART: [fht] FMC Alias Private Key: 7
19,569,482 UART: [art] Derive CDI
19,570,293 UART: [art] Store in in slot 0x4
19,628,437 UART: [art] Derive Key Pair
19,629,639 UART: [art] Store priv key in slot 0x5
22,092,269 UART: [art] Derive Key Pair - Done
22,105,109 UART: [art] Signing Cert with AUTHO
22,106,408 UART: RITY.KEYID = 7
23,817,618 UART: [art] Erasing AUTHORITY.KEYID = 7
23,819,110 UART: [art] PUB.X = 4EEBEC0BE5018C89BF799C130EF8ACF85632C935BDD4212919392338624B92DF293C7DBCF892859D4C42F68122586215
23,826,358 UART: [art] PUB.Y = A2D528F587C3403B927455F4F8B15E8B085258A7283EA9BE076FCCE94D89BE624635CE52217B31B64C9BCCBA3D5C43C1
23,833,646 UART: [art] SIG.R = 4A5282F5B32A94B64B4A4F38FE7F94EDBDF8F66743D8F6EDD0BB67FFA537FA67C20CFEF4D42B77C11C04676CC64EA8F3
23,841,054 UART: [art] SIG.S = F93A0D7D4C0C136913774E699D15FE07AF48E0888223952730DC6E44F15D155D3A0440EA48A20282FFBC1819AD661D43
24,819,341 UART: mock_rt_interact::rt_entry...FMC Tester
24,936,130 UART: [rt] Runtime listening for mailbox commands...
24,940,368 >>> mbox cmd response data (2048 bytes)
24,950,065 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,951,729 >>> mbox cmd response data (336 bytes)
24,955,577 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
24,971,381 >>> mbox cmd response data (1536 bytes)
27,028,412 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
33,484,546 >>> mbox cmd response: success
33,519,736 UART:
33,520,052 UART: Running Caliptra FMC ...
33,521,199 UART:
33,521,368 UART: [state] CFI Enabled
33,613,879 UART: [art] Extend RT PCRs Done
33,615,080 UART: [art] Lock RT PCRs Done
33,616,526 UART: [art] Populate DV Done
33,621,800 UART: [fht] FMC Alias Private Key: 7
33,623,344 UART: [art] Derive CDI
33,624,076 UART: [art] Store in in slot 0x4
33,682,973 UART: [art] Derive Key Pair
33,684,019 UART: [art] Store priv key in slot 0x5
36,147,141 UART: [art] Derive Key Pair - Done
36,160,203 UART: [art] Signing Cert with AUTHO
36,161,518 UART: RITY.KEYID = 7
37,872,778 UART: [art] Erasing AUTHORITY.KEYID = 7
37,874,323 UART: [art] PUB.X = 025CB79F1F839F5A5213BBC62A4A5CF7C721055CEBB90F0A07089539547C907AB23572D8D47A139277F306933A7CC565
37,881,563 UART: [art] PUB.Y = 2768A656DD218DE60F739B3FDED985994B6CA982B6DE09A272FF78171BC1A1D0855512F4FD8FBB37C7E30E45F91410C4
37,888,809 UART: [art] SIG.R = 0585E3A20B9FF33C4D982AE31D49B32102A1B11E1CD4E6B2E23C426A66711AEFB0612F5C3A1218CAC8AA8B6FCF8C684E
37,896,181 UART: [art] SIG.S = 36BAEFFC7F3F091826954BAAB00D7B1433D990FD0BBD11ADA79060815234ACEBBA3A9530BDF218F6EC88D2AB2BF7FA40
38,873,755 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,874,839 UART: mock_rt_interact::rt_entry...FMC Tester
39,164,361 UART: [rt] Runtime listening for mailbox commands...
39,167,296 >>> mbox cmd response data (336 bytes)
39,171,457 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,187,273 >>> mbox cmd response data (1536 bytes)
39,194,599 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,195,003 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,458 UART:
192,839 UART: Running Caliptra ROM ...
193,974 UART:
603,560 UART: [state] CFI Enabled
614,823 UART: [state] LifecycleState = Unprovisioned
616,729 UART: [state] DebugLocked = No
617,911 UART: [state] WD Timer not started. Device not locked for debugging
621,382 UART: [kat] SHA2-256
800,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,060 UART: [kat] ++
812,509 UART: [kat] sha1
822,522 UART: [kat] SHA2-256
825,599 UART: [kat] SHA2-384
831,303 UART: [kat] SHA2-512-ACC
834,305 UART: [kat] ECC-384
3,275,538 UART: [kat] HMAC-384Kdf
3,288,343 UART: [kat] LMS
3,817,810 UART: [kat] --
3,822,595 UART: [cold-reset] ++
3,824,377 UART: [fht] FHT @ 0x50003400
3,837,049 UART: [idev] ++
3,837,610 UART: [idev] CDI.KEYID = 6
3,838,640 UART: [idev] SUBJECT.KEYID = 7
3,839,738 UART: [idev] UDS.KEYID = 0
3,840,654 ready_for_fw is high
3,840,849 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,935,409 UART: [idev] Erasing UDS.KEYID = 0
6,317,287 UART: [idev] Sha1 KeyId Algorithm
6,339,436 UART: [idev] --
6,342,730 UART: [ldev] ++
6,343,299 UART: [ldev] CDI.KEYID = 6
6,344,219 UART: [ldev] SUBJECT.KEYID = 5
6,345,432 UART: [ldev] AUTHORITY.KEYID = 7
6,346,656 UART: [ldev] FE.KEYID = 1
6,356,590 UART: [ldev] Erasing FE.KEYID = 1
8,830,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,128 UART: [ldev] --
10,619,591 UART: [fwproc] Wait for Commands...
10,621,361 UART: [fwproc] Recv command 0x46574c44
10,623,451 UART: [fwproc] Recv'd Img size: 75220 bytes
13,550,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,620,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,689,260 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
13,869,672 >>> mbox cmd response: success
13,870,093 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,874,438 UART: [afmc] ++
13,875,015 UART: [afmc] CDI.KEYID = 6
13,875,893 UART: [afmc] SUBJECT.KEYID = 7
13,877,156 UART: [afmc] AUTHORITY.KEYID = 5
16,376,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,097,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,099,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,115,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,131,202 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,147,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,170,878 UART: [afmc] --
18,174,628 UART: [cold-reset] --
18,178,967 UART: [state] Locking Datavault
18,184,260 UART: [state] Locking PCR0, PCR1 and PCR31
18,185,931 UART: [state] Locking ICCM
18,187,762 UART: [exit] Launching FMC @ 0x40000130
18,196,210 UART:
18,196,439 UART: Running Caliptra FMC ...
18,197,535 UART:
18,197,684 UART: [state] CFI Enabled
18,206,021 UART: [fht] FMC Alias Private Key: 7
19,963,607 UART: [art] Extend RT PCRs Done
19,964,812 UART: [art] Lock RT PCRs Done
19,966,316 UART: [art] Populate DV Done
19,971,826 UART: [fht] FMC Alias Private Key: 7
19,973,303 UART: [art] Derive CDI
19,974,069 UART: [art] Store in in slot 0x4
20,016,502 UART: [art] Derive Key Pair
20,017,504 UART: [art] Store priv key in slot 0x5
22,443,756 UART: [art] Derive Key Pair - Done
22,456,832 UART: [art] Signing Cert with AUTHO
22,458,175 UART: RITY.KEYID = 7
24,163,826 UART: [art] Erasing AUTHORITY.KEYID = 7
24,165,323 UART: [art] PUB.X = 0E677C6302558F8D509A36613B539BE4887C560B35F9F997B7939513ADC202F4897EEFC2A12D175D6F3E933550DFD7B6
24,172,608 UART: [art] PUB.Y = 7FAB9FDAD35550155BB9958F7C81B2809EAFDCD46EE5D56F2E1CB12810203D52E0C81662269B747EAB75929ED2EC222F
24,179,890 UART: [art] SIG.R = C7CB7DCC0478ACE49E5CC7937C5BF9362E1FADEB38B70B0B561F1B850BA7E7F67FA8DEFADB4C31783F044E1CA12140F8
24,187,311 UART: [art] SIG.S = B7F1BFD3FC9526B2D9E7DE10F1C1787E5836455D44F313653090261BFB3BC837F2CAD97D9A9F20A4F251014323A54CFA
25,166,238 UART: mock_rt_interact::rt_entry...FMC Tester
25,282,455 UART: [rt] Runtime listening for mailbox commands...
25,286,679 >>> mbox cmd response data (2048 bytes)
25,296,400 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,298,072 >>> mbox cmd response data (336 bytes)
25,301,877 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,317,683 >>> mbox cmd response data (1536 bytes)
27,373,540 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
27,469,167 UART:
27,469,529 UART: Running Caliptra ROM ...
27,470,578 UART:
27,470,725 UART: [state] CFI Enabled
27,485,433 UART: [state] LifecycleState = Unprovisioned
27,487,271 UART: [state] DebugLocked = No
27,490,088 UART: [state] WD Timer not started. Device not locked for debugging
27,493,831 UART: [kat] SHA2-256
27,673,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,684,604 UART: [kat] ++
27,685,056 UART: [kat] sha1
27,696,636 UART: [kat] SHA2-256
27,699,643 UART: [kat] SHA2-384
27,705,377 UART: [kat] SHA2-512-ACC
27,708,324 UART: [kat] ECC-384
30,149,415 UART: [kat] HMAC-384Kdf
30,163,583 UART: [kat] LMS
30,693,140 UART: [kat] --
30,698,492 UART: [update-reset] ++
33,654,923 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,657,864 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
33,903,872 >>> mbox cmd response: success
33,905,553 UART: [update-reset] Copying MAN_2 To MAN_1
33,927,879 UART: [update-reset Success] --
33,930,221 UART: [state] Locking Datavault
33,933,630 UART: [state] Locking PCR0, PCR1 and PCR31
33,935,326 UART: [state] Locking ICCM
33,936,605 UART: [exit] Launching FMC @ 0x40000130
33,944,998 UART:
33,945,250 UART: Running Caliptra FMC ...
33,946,348 UART:
33,946,498 UART: [state] CFI Enabled
33,990,186 UART: [art] Extend RT PCRs Done
33,991,372 UART: [art] Lock RT PCRs Done
33,992,826 UART: [art] Populate DV Done
33,998,230 UART: [fht] FMC Alias Private Key: 7
33,999,768 UART: [art] Derive CDI
34,000,577 UART: [art] Store in in slot 0x4
34,043,332 UART: [art] Derive Key Pair
34,044,331 UART: [art] Store priv key in slot 0x5
36,471,210 UART: [art] Derive Key Pair - Done
36,484,632 UART: [art] Signing Cert with AUTHO
36,485,929 UART: RITY.KEYID = 7
38,191,116 UART: [art] Erasing AUTHORITY.KEYID = 7
38,192,614 UART: [art] PUB.X = 229634B31114B542C5062C83FEEF72170AB37A1FA6ED69E50D4659EC10BD641DE2343AC7A612505B25F33A2725B7CCF2
38,199,897 UART: [art] PUB.Y = 01462E9E6AC7FA17B99D9DCBAD0E1106FD63B7846E28171B5ACEFA2139F56B25FAF8D0332CC2CC973A4E9640B55B0FF6
38,207,194 UART: [art] SIG.R = 5D2ACF4DA3DAB2C9DC59AF04A88AD43B4B7B8B1D0F0B93CCA7642B5BE8296C7F9B73E163F29EC058D57E03FBBA2FB844
38,214,635 UART: [art] SIG.S = 9F094179B819858AE12C39D2D11A27BFD506579787053A11BE4EE6E5029855C63DD352F9CC986147A79DC43263831A51
39,191,640 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,192,652 UART: mock_rt_interact::rt_entry...FMC Tester
39,479,721 UART: [rt] Runtime listening for mailbox commands...
39,482,705 >>> mbox cmd response data (336 bytes)
39,486,473 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,502,245 >>> mbox cmd response data (1536 bytes)
39,509,587 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,509,993 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,694,849 ready_for_fw is high
3,695,696 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
13,646,045 >>> mbox cmd response: success
13,646,864 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,898,716 UART:
17,899,105 UART: Running Caliptra FMC ...
17,900,289 UART:
17,900,437 UART: [state] CFI Enabled
17,908,210 UART: [fht] FMC Alias Private Key: 7
19,664,982 UART: [art] Extend RT PCRs Done
19,666,200 UART: [art] Lock RT PCRs Done
19,668,007 UART: [art] Populate DV Done
19,673,208 UART: [fht] FMC Alias Private Key: 7
19,674,906 UART: [art] Derive CDI
19,675,633 UART: [art] Store in in slot 0x4
19,718,460 UART: [art] Derive Key Pair
19,719,460 UART: [art] Store priv key in slot 0x5
22,145,776 UART: [art] Derive Key Pair - Done
22,158,618 UART: [art] Signing Cert with AUTHO
22,159,916 UART: RITY.KEYID = 7
23,865,486 UART: [art] Erasing AUTHORITY.KEYID = 7
23,866,993 UART: [art] PUB.X = E6883DAA1742F6FCF637A89BE7A19D97B166A7E360EB0CEA449D03B7ABEEB0368CA4DFD30B68F11002C779ABA76705BE
23,874,314 UART: [art] PUB.Y = AE78D04F8D5AD1A5C2F3045F9E7A2BDE10700D3443963CEE3F2CA88A470913793E76F7C17DCF33FD73CA5BB6B541F5D0
23,881,577 UART: [art] SIG.R = 6DAA89114BF5197D465A77E3AD256259E4F66795D73ADB03B1BAD69AAE988376FB6F74E225AFBF4B8DDAE168CFEBC25F
23,889,018 UART: [art] SIG.S = 4E6C7C71FABA7BA2E0AAA881C9051EAB2C71E9960EEC3ECDE70916C46B9B15FE487EA07A5235AB04C6492EBC1F97AEB9
24,867,568 UART: mock_rt_interact::rt_entry...FMC Tester
24,984,441 UART: [rt] Runtime listening for mailbox commands...
24,988,685 >>> mbox cmd response data (2048 bytes)
24,998,381 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,000,049 >>> mbox cmd response data (336 bytes)
25,003,941 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,019,742 >>> mbox cmd response data (1536 bytes)
27,079,128 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
33,458,279 >>> mbox cmd response: success
33,493,495 UART:
33,493,812 UART: Running Caliptra FMC ...
33,494,940 UART:
33,495,099 UART: [state] CFI Enabled
33,539,180 UART: [art] Extend RT PCRs Done
33,540,329 UART: [art] Lock RT PCRs Done
33,541,925 UART: [art] Populate DV Done
33,547,389 UART: [fht] FMC Alias Private Key: 7
33,548,869 UART: [art] Derive CDI
33,549,661 UART: [art] Store in in slot 0x4
33,592,371 UART: [art] Derive Key Pair
33,593,414 UART: [art] Store priv key in slot 0x5
36,020,469 UART: [art] Derive Key Pair - Done
36,033,523 UART: [art] Signing Cert with AUTHO
36,034,838 UART: RITY.KEYID = 7
37,740,184 UART: [art] Erasing AUTHORITY.KEYID = 7
37,741,789 UART: [art] PUB.X = 99AFCF9BBB471AE05FAE3D1F42E1AB24F37B09A08F5B589E30F2CDBECB2F06159660AE91BFFAAC0B289830A4DD5F5D27
37,748,994 UART: [art] PUB.Y = 3EA236FA013A8AB0BCB7341C913844EDF0A943A49401DE697FCBA4D14C60E73785803ED0CD3B9A94D431CE8270B1240C
37,756,221 UART: [art] SIG.R = 9B9B979F51360C41F8ACB0078064299BFA6C2C77921852D2441264FA72540D9A55AFEA170F356FB9E0F6670AEAF2ADB8
37,763,611 UART: [art] SIG.S = 34DEC3CD6296319B356C5D38919D80D8013CFC8DCB4706A219D9A6501D4CBC1B6A9D6B968181D88CDF542D1C77687B20
38,741,304 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
38,742,501 UART: mock_rt_interact::rt_entry...FMC Tester
39,032,414 UART: [rt] Runtime listening for mailbox commands...
39,035,345 >>> mbox cmd response data (336 bytes)
39,039,389 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,055,230 >>> mbox cmd response data (1536 bytes)
39,062,570 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,062,973 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,136 UART:
192,503 UART: Running Caliptra ROM ...
193,613 UART:
193,753 UART: [state] CFI Enabled
263,127 UART: [state] LifecycleState = Unprovisioned
265,540 UART: [state] DebugLocked = No
268,193 UART: [state] WD Timer not started. Device not locked for debugging
272,787 UART: [kat] SHA2-256
462,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,414 UART: [kat] ++
473,854 UART: [kat] sha1
485,503 UART: [kat] SHA2-256
488,512 UART: [kat] SHA2-384
495,351 UART: [kat] SHA2-512-ACC
497,998 UART: [kat] ECC-384
2,946,805 UART: [kat] HMAC-384Kdf
2,971,162 UART: [kat] LMS
3,502,880 UART: [kat] --
3,506,610 UART: [cold-reset] ++
3,508,856 UART: [fht] FHT @ 0x50003400
3,520,405 UART: [idev] ++
3,521,108 UART: [idev] CDI.KEYID = 6
3,522,058 UART: [idev] SUBJECT.KEYID = 7
3,523,242 UART: [idev] UDS.KEYID = 0
3,524,174 ready_for_fw is high
3,524,376 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,619,210 UART: [idev] Erasing UDS.KEYID = 0
6,029,574 UART: [idev] Sha1 KeyId Algorithm
6,052,052 UART: [idev] --
6,056,048 UART: [ldev] ++
6,056,734 UART: [ldev] CDI.KEYID = 6
6,057,642 UART: [ldev] SUBJECT.KEYID = 5
6,058,805 UART: [ldev] AUTHORITY.KEYID = 7
6,060,033 UART: [ldev] FE.KEYID = 1
6,100,194 UART: [ldev] Erasing FE.KEYID = 1
8,605,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,593 UART: [ldev] --
10,414,856 UART: [fwproc] Wait for Commands...
10,417,756 UART: [fwproc] Recv command 0x46574c44
10,420,060 UART: [fwproc] Recv'd Img size: 75220 bytes
13,385,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,463,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,579,456 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
13,886,591 >>> mbox cmd response: success
13,887,000 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,890,683 UART: [afmc] ++
13,891,445 UART: [afmc] CDI.KEYID = 6
13,892,636 UART: [afmc] SUBJECT.KEYID = 7
13,894,070 UART: [afmc] AUTHORITY.KEYID = 5
16,437,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,163,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,165,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,180,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,195,988 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,211,018 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,235,052 UART: [afmc] --
18,237,743 UART: [cold-reset] --
18,242,306 UART: [state] Locking Datavault
18,248,582 UART: [state] Locking PCR0, PCR1 and PCR31
18,250,715 UART: [state] Locking ICCM
18,252,267 UART: [exit] Launching FMC @ 0x40000130
18,260,934 UART:
18,261,185 UART: Running Caliptra FMC ...
18,262,282 UART:
18,262,438 UART: [state] CFI Enabled
18,321,119 UART: [fht] FMC Alias Private Key: 7
20,085,487 UART: [art] Extend RT PCRs Done
20,086,706 UART: [art] Lock RT PCRs Done
20,088,222 UART: [art] Populate DV Done
20,093,688 UART: [fht] FMC Alias Private Key: 7
20,095,289 UART: [art] Derive CDI
20,096,103 UART: [art] Store in in slot 0x4
20,154,071 UART: [art] Derive Key Pair
20,155,105 UART: [art] Store priv key in slot 0x5
22,628,025 UART: [art] Derive Key Pair - Done
22,641,068 UART: [art] Signing Cert with AUTHO
22,642,380 UART: RITY.KEYID = 7
24,363,932 UART: [art] Erasing AUTHORITY.KEYID = 7
24,366,279 UART: [art] PUB.X = 17F9BB076FD771BB9506B45A10C699AA2755CB7BA159942D63147F930878BE30F49E1849ACCD69C605AB0A495FA1C6A2
24,372,771 UART: [art] PUB.Y = 9EBF05623921D12A78AD4881283135E398CB1DB037FE7DC1C3ABE66609FE8E82F2EE87B2BC215B5945833E5E2F0837C1
24,379,967 UART: [art] SIG.R = D547A7A469BB40F38F7BC4DF56067FD5FC14E74BF4DCB8CE98EA77D322D113928EBE3B85103ADD8A997F653C7531223A
24,387,452 UART: [art] SIG.S = 0DA608439CD520E52E7EB76A5A012A110990C580402CA275DF5D745F5A8419CEC4B97599632B36874598C25C7451859F
25,366,012 UART: mock_rt_interact::rt_entry...FMC Tester
25,482,921 UART: [rt] Runtime listening for mailbox commands...
25,487,216 >>> mbox cmd response data (2048 bytes)
25,497,023 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,498,720 >>> mbox cmd response data (336 bytes)
25,502,683 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,518,475 >>> mbox cmd response data (1536 bytes)
27,575,428 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
27,671,069 UART:
27,671,429 UART: Running Caliptra ROM ...
27,672,477 UART:
27,672,627 UART: [state] CFI Enabled
27,730,715 UART: [state] LifecycleState = Unprovisioned
27,732,772 UART: [state] DebugLocked = No
27,734,288 UART: [state] WD Timer not started. Device not locked for debugging
27,739,652 UART: [kat] SHA2-256
27,929,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,940,272 UART: [kat] ++
27,940,723 UART: [kat] sha1
27,952,956 UART: [kat] SHA2-256
27,955,971 UART: [kat] SHA2-384
27,960,715 UART: [kat] SHA2-512-ACC
27,963,335 UART: [kat] ECC-384
30,412,375 UART: [kat] HMAC-384Kdf
30,435,384 UART: [kat] LMS
30,966,960 UART: [kat] --
30,969,693 UART: [update-reset] ++
33,944,405 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,947,449 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
34,319,787 >>> mbox cmd response: success
34,320,616 UART: [update-reset] Copying MAN_2 To MAN_1
34,358,182 UART: [update-reset Success] --
34,361,169 UART: [state] Locking Datavault
34,365,282 UART: [state] Locking PCR0, PCR1 and PCR31
34,367,418 UART: [state] Locking ICCM
34,370,165 UART: [exit] Launching FMC @ 0x40000130
34,378,792 UART:
34,379,027 UART: Running Caliptra FMC ...
34,380,091 UART:
34,380,240 UART: [state] CFI Enabled
34,478,788 UART: [art] Extend RT PCRs Done
34,479,973 UART: [art] Lock RT PCRs Done
34,481,372 UART: [art] Populate DV Done
34,486,997 UART: [fht] FMC Alias Private Key: 7
34,488,583 UART: [art] Derive CDI
34,489,395 UART: [art] Store in in slot 0x4
34,547,407 UART: [art] Derive Key Pair
34,548,434 UART: [art] Store priv key in slot 0x5
37,011,670 UART: [art] Derive Key Pair - Done
37,024,995 UART: [art] Signing Cert with AUTHO
37,026,329 UART: RITY.KEYID = 7
38,737,290 UART: [art] Erasing AUTHORITY.KEYID = 7
38,738,810 UART: [art] PUB.X = 62282D9683F23C0954240F13D419487D4CE9315A2E8AB14380E580F758D0F45A3D39BD81F61A05CE627C9571CE36751E
38,746,058 UART: [art] PUB.Y = 2481EFD7909FA0519886CD0F0B4491FF278E00251E740CFE33EE9327D4D26E0BA041F2B968B83080DD52C54406726B59
38,753,291 UART: [art] SIG.R = 3FF2E2E0A4EC5FA6A49DEB86F1CE9C094657C92C56F131469467F97D45D71A51B880B6E1A35C6A1866E363F102B33A16
38,760,689 UART: [art] SIG.S = 2C85887E94D06B906879861DC6C2E05D259FFBD0ED9DBBC704A0AE5F5E189A1A20B7AFF158CA4AEE87A8BCA4E82CA830
39,737,700 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,739,114 UART: mock_rt_interact::rt_entry...FMC Tester
40,027,429 UART: [rt] Runtime listening for mailbox commands...
40,030,326 >>> mbox cmd response data (336 bytes)
40,034,284 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,050,101 >>> mbox cmd response data (1536 bytes)
40,057,398 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,057,801 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,439,742 ready_for_fw is high
3,440,154 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
13,894,142 >>> mbox cmd response: success
13,894,787 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,170,076 UART:
18,170,735 UART: Running Caliptra FMC ...
18,171,916 UART:
18,172,068 UART: [state] CFI Enabled
18,240,236 UART: [fht] FMC Alias Private Key: 7
20,004,854 UART: [art] Extend RT PCRs Done
20,006,410 UART: [art] Lock RT PCRs Done
20,007,962 UART: [art] Populate DV Done
20,013,531 UART: [fht] FMC Alias Private Key: 7
20,015,071 UART: [art] Derive CDI
20,015,840 UART: [art] Store in in slot 0x4
20,073,116 UART: [art] Derive Key Pair
20,074,156 UART: [art] Store priv key in slot 0x5
22,537,876 UART: [art] Derive Key Pair - Done
22,550,827 UART: [art] Signing Cert with AUTHO
22,552,136 UART: RITY.KEYID = 7
24,263,364 UART: [art] Erasing AUTHORITY.KEYID = 7
24,264,879 UART: [art] PUB.X = 0CABA2CA662C8C3D890478472C0524EA67777D21AD4D2B90AC7F4D85BE80228267A46582FC661901F0F7FA442727A12B
24,272,136 UART: [art] PUB.Y = BFC9CDF8CB5034C938E3E48F417256F09594ADED15FBFBAF0196213F69831AA3606E1E31673B9B47385AB3D296E236A8
24,279,358 UART: [art] SIG.R = 47F788D7C74185F7B6C35B30C970BE4690F2E002376117310A8F3CD2A745B5A7CA5783961D1B7C07647BCD579BE0044C
24,286,809 UART: [art] SIG.S = 535CADF652384C15678A924748BA8088BEF8C912BFBF4FB130AD3074D3AD265756E0CB43128D34C7E96AAFCC0002BE04
25,265,092 UART: mock_rt_interact::rt_entry...FMC Tester
25,381,897 UART: [rt] Runtime listening for mailbox commands...
25,386,185 >>> mbox cmd response data (2048 bytes)
25,395,925 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,397,605 >>> mbox cmd response data (336 bytes)
25,401,656 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,417,492 >>> mbox cmd response data (1536 bytes)
27,473,718 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
34,405,194 >>> mbox cmd response: success
34,438,447 UART:
34,438,741 UART: Running Caliptra FMC ...
34,439,786 UART:
34,439,936 UART: [state] CFI Enabled
34,535,503 UART: [art] Extend RT PCRs Done
34,536,698 UART: [art] Lock RT PCRs Done
34,537,918 UART: [art] Populate DV Done
34,543,336 UART: [fht] FMC Alias Private Key: 7
34,544,980 UART: [art] Derive CDI
34,545,814 UART: [art] Store in in slot 0x4
34,603,936 UART: [art] Derive Key Pair
34,604,975 UART: [art] Store priv key in slot 0x5
37,068,078 UART: [art] Derive Key Pair - Done
37,080,760 UART: [art] Signing Cert with AUTHO
37,082,255 UART: RITY.KEYID = 7
38,794,034 UART: [art] Erasing AUTHORITY.KEYID = 7
38,795,554 UART: [art] PUB.X = 20F31C2515072823BA98C87D140A91BAA1CD1808BB3E04D0C5EC5E0D6782DF7753DD544D19351DAB351204197B3D95CE
38,802,858 UART: [art] PUB.Y = EBC6673828E8F244076310E30D7EDF24714610306A664FCD94CABAF1F48162FFDCC19DDA9760680B336EB9D0484651FA
38,810,070 UART: [art] SIG.R = FF743E34946CF32DB229220D18F59E7D782EB1588BD083089176FCEBFE627BD5A0EF6A90AC10109C7996DEBD82655B9C
38,817,495 UART: [art] SIG.S = 7D6190724355E94F9CD15E62E6C4337BD981281C3FC46143B3F8A08A3A2A9CEC3EE92B13C74BDCEC9754C35990950662
39,794,713 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,795,631 UART: mock_rt_interact::rt_entry...FMC Tester
40,085,359 UART: [rt] Runtime listening for mailbox commands...
40,088,302 >>> mbox cmd response data (336 bytes)
40,092,110 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,107,935 >>> mbox cmd response data (1536 bytes)
40,115,248 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,115,650 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,416 writing to cptra_bootfsm_go
193,693 UART:
194,042 UART: Running Caliptra ROM ...
195,158 UART:
604,717 UART: [state] CFI Enabled
621,084 UART: [state] LifecycleState = Unprovisioned
623,454 UART: [state] DebugLocked = No
626,029 UART: [state] WD Timer not started. Device not locked for debugging
630,853 UART: [kat] SHA2-256
820,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,562 UART: [kat] ++
832,001 UART: [kat] sha1
842,381 UART: [kat] SHA2-256
845,385 UART: [kat] SHA2-384
851,157 UART: [kat] SHA2-512-ACC
853,733 UART: [kat] ECC-384
3,297,672 UART: [kat] HMAC-384Kdf
3,309,697 UART: [kat] LMS
3,841,537 UART: [kat] --
3,848,574 UART: [cold-reset] ++
3,851,234 UART: [fht] FHT @ 0x50003400
3,862,210 UART: [idev] ++
3,862,846 UART: [idev] CDI.KEYID = 6
3,863,877 UART: [idev] SUBJECT.KEYID = 7
3,865,050 UART: [idev] UDS.KEYID = 0
3,865,993 ready_for_fw is high
3,866,187 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,960,753 UART: [idev] Erasing UDS.KEYID = 0
6,338,280 UART: [idev] Sha1 KeyId Algorithm
6,359,735 UART: [idev] --
6,365,187 UART: [ldev] ++
6,365,863 UART: [ldev] CDI.KEYID = 6
6,366,765 UART: [ldev] SUBJECT.KEYID = 5
6,367,975 UART: [ldev] AUTHORITY.KEYID = 7
6,369,200 UART: [ldev] FE.KEYID = 1
6,380,647 UART: [ldev] Erasing FE.KEYID = 1
8,859,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,267 UART: [ldev] --
10,654,817 UART: [fwproc] Wait for Commands...
10,657,727 UART: [fwproc] Recv command 0x46574c44
10,660,029 UART: [fwproc] Recv'd Img size: 75220 bytes
13,624,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,705,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,821,325 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
14,129,219 >>> mbox cmd response: success
14,129,644 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,132,517 UART: [afmc] ++
14,133,208 UART: [afmc] CDI.KEYID = 6
14,134,447 UART: [afmc] SUBJECT.KEYID = 7
14,135,877 UART: [afmc] AUTHORITY.KEYID = 5
16,643,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,361,593 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,363,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,378,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,393,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,408,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,432,654 UART: [afmc] --
18,435,772 UART: [cold-reset] --
18,441,248 UART: [state] Locking Datavault
18,448,007 UART: [state] Locking PCR0, PCR1 and PCR31
18,450,148 UART: [state] Locking ICCM
18,452,683 UART: [exit] Launching FMC @ 0x40000130
18,461,354 UART:
18,461,584 UART: Running Caliptra FMC ...
18,462,681 UART:
18,462,832 UART: [state] CFI Enabled
18,471,007 UART: [fht] FMC Alias Private Key: 7
20,227,898 UART: [art] Extend RT PCRs Done
20,229,119 UART: [art] Lock RT PCRs Done
20,230,710 UART: [art] Populate DV Done
20,236,120 UART: [fht] FMC Alias Private Key: 7
20,237,776 UART: [art] Derive CDI
20,238,588 UART: [art] Store in in slot 0x4
20,281,458 UART: [art] Derive Key Pair
20,282,501 UART: [art] Store priv key in slot 0x5
22,708,944 UART: [art] Derive Key Pair - Done
22,721,935 UART: [art] Signing Cert with AUTHO
22,723,419 UART: RITY.KEYID = 7
24,428,418 UART: [art] Erasing AUTHORITY.KEYID = 7
24,429,922 UART: [art] PUB.X = 5E40F95C7AA695FE48F0C48842AF672938DD53229A2C19849AD2D77454DF9F8BBAE35E7B562408B0992F17ED4136DB9F
24,437,180 UART: [art] PUB.Y = A9B1FAC8EBF80397FC15F1E62C172321D5BE29D6DB04D85F6227BC02D05E586C836127D95ABFAC777640A1E48D5D806F
24,444,469 UART: [art] SIG.R = 609C60BBA94B1EEDAE58345D8E33AA607BEDDFF5BB592B334EDD67142F4BBB3C07842730B9572BD460EEAFB9608D7F0C
24,451,871 UART: [art] SIG.S = 00FB6FA128B5D113E03A032BBBA9D1AD36D2E1E97537AD28C4B234E72EDD3B1CE8140C9E9C683438C2A3EA9485562DA9
25,430,329 UART: mock_rt_interact::rt_entry...FMC Tester
25,545,921 UART: [rt] Runtime listening for mailbox commands...
25,550,203 >>> mbox cmd response data (2048 bytes)
25,559,941 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,561,601 >>> mbox cmd response data (336 bytes)
25,565,405 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,581,209 >>> mbox cmd response data (1536 bytes)
27,637,439 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
27,733,029 UART:
27,733,414 UART: Running Caliptra ROM ...
27,734,465 UART:
27,734,670 UART: [state] CFI Enabled
27,748,676 UART: [state] LifecycleState = Unprovisioned
27,750,519 UART: [state] DebugLocked = No
27,752,650 UART: [state] WD Timer not started. Device not locked for debugging
27,756,496 UART: [kat] SHA2-256
27,946,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,957,150 UART: [kat] ++
27,957,661 UART: [kat] sha1
27,969,408 UART: [kat] SHA2-256
27,972,422 UART: [kat] SHA2-384
27,979,120 UART: [kat] SHA2-512-ACC
27,981,740 UART: [kat] ECC-384
30,424,467 UART: [kat] HMAC-384Kdf
30,437,528 UART: [kat] LMS
30,969,138 UART: [kat] --
30,971,813 UART: [update-reset] ++
33,955,915 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,959,994 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
34,332,865 >>> mbox cmd response: success
34,333,326 UART: [update-reset] Copying MAN_2 To MAN_1
34,370,858 UART: [update-reset Success] --
34,377,098 UART: [state] Locking Datavault
34,381,815 UART: [state] Locking PCR0, PCR1 and PCR31
34,384,009 UART: [state] Locking ICCM
34,386,758 UART: [exit] Launching FMC @ 0x40000130
34,395,383 UART:
34,395,615 UART: Running Caliptra FMC ...
34,396,645 UART:
34,396,790 UART: [state] CFI Enabled
34,440,211 UART: [art] Extend RT PCRs Done
34,441,394 UART: [art] Lock RT PCRs Done
34,443,031 UART: [art] Populate DV Done
34,448,871 UART: [fht] FMC Alias Private Key: 7
34,450,407 UART: [art] Derive CDI
34,451,216 UART: [art] Store in in slot 0x4
34,493,721 UART: [art] Derive Key Pair
34,494,763 UART: [art] Store priv key in slot 0x5
36,921,101 UART: [art] Derive Key Pair - Done
36,933,792 UART: [art] Signing Cert with AUTHO
36,935,116 UART: RITY.KEYID = 7
38,640,923 UART: [art] Erasing AUTHORITY.KEYID = 7
38,642,576 UART: [art] PUB.X = 4E1D4E9EDCB7297912E16DF766472C9E3272BC01E2815F4A3279D4FD60241497508752908F65C0074C19AF5CD4F87E36
38,649,671 UART: [art] PUB.Y = 9192F4586C76017F0A43BEB0F2731B91A2C1719268768C51551376F6F8A288923976B823D74B90F7350D5ED009978FBD
38,656,901 UART: [art] SIG.R = 65B5DD2EAE7ACCA90174F5BF5441421F3667C876B1049C60166864E41F80FA136AD0344FB66DFA2B37732DED6C42CF7B
38,664,232 UART: [art] SIG.S = C09B960C9800477EB6ED297A5C92AD9D9DB7F96F708B7DDC85A3C5582D6A07A45BF88CCE091A091B2CD88943D5F28868
39,641,093 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,642,258 UART: mock_rt_interact::rt_entry...FMC Tester
39,932,152 UART: [rt] Runtime listening for mailbox commands...
39,935,106 >>> mbox cmd response data (336 bytes)
39,939,127 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,954,931 >>> mbox cmd response data (1536 bytes)
39,962,267 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,962,671 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,759,299 ready_for_fw is high
3,759,683 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
14,112,925 >>> mbox cmd response: success
14,113,401 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,366,325 UART:
18,367,168 UART: Running Caliptra FMC ...
18,368,356 UART:
18,368,509 UART: [state] CFI Enabled
18,376,067 UART: [fht] FMC Alias Private Key: 7
20,132,169 UART: [art] Extend RT PCRs Done
20,133,419 UART: [art] Lock RT PCRs Done
20,134,831 UART: [art] Populate DV Done
20,139,834 UART: [fht] FMC Alias Private Key: 7
20,141,438 UART: [art] Derive CDI
20,142,203 UART: [art] Store in in slot 0x4
20,184,850 UART: [art] Derive Key Pair
20,185,852 UART: [art] Store priv key in slot 0x5
22,612,482 UART: [art] Derive Key Pair - Done
22,625,777 UART: [art] Signing Cert with AUTHO
22,627,131 UART: RITY.KEYID = 7
24,332,403 UART: [art] Erasing AUTHORITY.KEYID = 7
24,333,888 UART: [art] PUB.X = D48B4C04054C24C54F6ABB592BB36523CE84FAD41A921E630D1ACFBABAB801D2624D98ACC68217F2D1CF3D2A3DA0CE2B
24,341,233 UART: [art] PUB.Y = BDEE1220126402451D10AB1F6C1EC20FAD474A6A5DE636BD6E179232EE4BDE27FEA96B476B0C8A7758CBFA6574986A35
24,348,488 UART: [art] SIG.R = 9AD5B0920A76CD803A81E86480E27E176FF7483D22B46BE77404046E4328734701C416BA948C8779419B4084B84CAEB1
24,355,828 UART: [art] SIG.S = E3EEF623C8C68BE6B6686A796719A6215C32E78D76A92D9C3C6D801215CB9A0F6D50107398E18CC4626CC1844A870E88
25,334,474 UART: mock_rt_interact::rt_entry...FMC Tester
25,450,678 UART: [rt] Runtime listening for mailbox commands...
25,454,968 >>> mbox cmd response data (2048 bytes)
25,464,693 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,466,385 >>> mbox cmd response data (336 bytes)
25,470,327 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,486,133 >>> mbox cmd response data (1536 bytes)
27,542,995 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
34,380,683 >>> mbox cmd response: success
34,418,007 UART:
34,418,320 UART: Running Caliptra FMC ...
34,419,434 UART:
34,419,590 UART: [state] CFI Enabled
34,463,836 UART: [art] Extend RT PCRs Done
34,465,028 UART: [art] Lock RT PCRs Done
34,466,406 UART: [art] Populate DV Done
34,471,844 UART: [fht] FMC Alias Private Key: 7
34,473,384 UART: [art] Derive CDI
34,474,154 UART: [art] Store in in slot 0x4
34,517,125 UART: [art] Derive Key Pair
34,518,133 UART: [art] Store priv key in slot 0x5
36,944,644 UART: [art] Derive Key Pair - Done
36,957,851 UART: [art] Signing Cert with AUTHO
36,959,162 UART: RITY.KEYID = 7
38,664,845 UART: [art] Erasing AUTHORITY.KEYID = 7
38,666,348 UART: [art] PUB.X = 8A0C64F3F48930BF084741C2858946219F240AC5485BF5BA67FF0B6E0C6786B8C78A6D46E9C875DC7A7F2AEE740662C6
38,673,582 UART: [art] PUB.Y = 1DE7BA79EBB0D86710650095B716CEDDB28DC648D44E4A02DA5C6FED9B1A3DD47180AD2907CEB6EE1D5B2C0C4C020B33
38,680,859 UART: [art] SIG.R = 3CE3AB1F07EFFF5A00D93242DF8736C0ECAC4EB6B9809E2190B779FB2621D043F9DA47FE74DBD543D9CE1A4A77BC4AAE
38,688,272 UART: [art] SIG.S = B154E63074EAF1B654C27A19789636A3293979E412C9AFDDCD859CDA2700C661DB07305D22E4756F4262FD4E1F436617
39,665,617 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,666,758 UART: mock_rt_interact::rt_entry...FMC Tester
39,952,919 UART: [rt] Runtime listening for mailbox commands...
39,955,879 >>> mbox cmd response data (336 bytes)
39,959,803 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,975,605 >>> mbox cmd response data (1536 bytes)
39,983,098 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,983,535 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,693 UART: [kat] SHA2-256
892,631 UART: [kat] SHA2-384
895,384 UART: [kat] SHA2-512-ACC
897,285 UART: [kat] ECC-384
903,140 UART: [kat] HMAC-384Kdf
907,724 UART: [kat] LMS
1,475,920 UART: [kat] --
1,476,849 UART: [cold-reset] ++
1,477,341 UART: [fht] Storing FHT @ 0x50003400
1,480,070 UART: [idev] ++
1,480,238 UART: [idev] CDI.KEYID = 6
1,480,598 UART: [idev] SUBJECT.KEYID = 7
1,481,022 UART: [idev] UDS.KEYID = 0
1,481,367 ready_for_fw is high
1,481,367 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,489,054 UART: [idev] Erasing UDS.KEYID = 0
1,505,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,884 UART: [idev] --
1,515,009 UART: [ldev] ++
1,515,177 UART: [ldev] CDI.KEYID = 6
1,515,540 UART: [ldev] SUBJECT.KEYID = 5
1,515,966 UART: [ldev] AUTHORITY.KEYID = 7
1,516,429 UART: [ldev] FE.KEYID = 1
1,521,743 UART: [ldev] Erasing FE.KEYID = 1
1,547,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,854 UART: [ldev] --
1,587,179 UART: [fwproc] Waiting for Commands...
1,588,020 UART: [fwproc] Received command 0x46574c44
1,588,811 UART: [fwproc] Received Image of size 75220 bytes
2,437,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,465,789 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,495,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 50536
2,572,264 >>> mbox cmd response: success
2,572,264 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,573,304 UART: [afmc] ++
2,573,472 UART: [afmc] CDI.KEYID = 6
2,573,834 UART: [afmc] SUBJECT.KEYID = 7
2,574,259 UART: [afmc] AUTHORITY.KEYID = 5
2,609,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,625,392 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,626,172 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,631,900 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,637,785 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,643,475 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,651,278 UART: [afmc] --
2,652,324 UART: [cold-reset] --
2,653,068 UART: [state] Locking Datavault
2,654,171 UART: [state] Locking PCR0, PCR1 and PCR31
2,654,775 UART: [state] Locking ICCM
2,655,409 UART: [exit] Launching FMC @ 0x40000130
2,660,738 UART:
2,660,754 UART: Running Caliptra FMC ...
2,661,162 UART:
2,661,216 UART: [state] CFI Enabled
2,671,935 UART: [fht] FMC Alias Private Key: 7
2,780,316 UART: [art] Extend RT PCRs Done
2,780,744 UART: [art] Lock RT PCRs Done
2,782,072 UART: [art] Populate DV Done
2,789,989 UART: [fht] FMC Alias Private Key: 7
2,790,997 UART: [art] Derive CDI
2,791,277 UART: [art] Store in in slot 0x4
2,876,486 UART: [art] Derive Key Pair
2,876,846 UART: [art] Store priv key in slot 0x5
2,890,268 UART: [art] Derive Key Pair - Done
2,904,958 UART: [art] Signing Cert with AUTHO
2,905,438 UART: RITY.KEYID = 7
2,920,210 UART: [art] Erasing AUTHORITY.KEYID = 7
2,920,975 UART: [art] PUB.X = C8F1A155422C00389C81EC7D7EA18CB4E7DD520812F96D1813F1AAE908077E83EFA389F206C6791FB23E2134E444F8B0
2,927,715 UART: [art] PUB.Y = 2455D0F55BFF95EBEEF6AD308095D34C438926C32653AA1930B0F06B1CD109BE33ECEC30038A28759CC0667267C965A8
2,934,663 UART: [art] SIG.R = 3448A3FC08656E09E80E12F8E39A89750B5288C2585E46DE35DDA55182489EA9498565937221E8DE873749F4D3011AB2
2,941,408 UART: [art] SIG.S = ECC676E83CD60EEAEBC1510AB4B21DAEFCBDA968DC96DAD6810FBC689756A0875FDD80C8C495587071724B6C2D46CEAA
2,965,298 UART: mock_rt_interact::rt_entry...FMC Tester
3,071,284 UART: [rt] Runtime listening for mailbox commands...
3,074,674 >>> mbox cmd response data (2048 bytes)
3,074,675 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,075,907 >>> mbox cmd response data (336 bytes)
3,075,908 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,088,499 >>> mbox cmd response data (1536 bytes)
3,088,500 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,088,606 UART:
3,088,622 UART: Running Caliptra ROM ...
3,089,030 UART:
3,089,084 UART: [state] CFI Enabled
3,091,948 UART: [state] LifecycleState = Unprovisioned
3,092,603 UART: [state] DebugLocked = No
3,093,207 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,094,764 UART: [kat] SHA2-256
3,888,695 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,892,810 UART: [kat] ++
3,892,962 UART: [kat] sha1
3,897,228 UART: [kat] SHA2-256
3,899,166 UART: [kat] SHA2-384
3,901,911 UART: [kat] SHA2-512-ACC
3,903,811 UART: [kat] ECC-384
3,909,056 UART: [kat] HMAC-384Kdf
3,913,698 UART: [kat] LMS
4,481,894 UART: [kat] --
4,482,903 UART: [update-reset] ++
5,368,197 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,369,241 UART: [update-reset] Loading Runtime at address 0x40005000 len 50536
5,460,449 >>> mbox cmd response: success
5,460,640 UART: [update-reset] Copying MAN_2 To MAN_1
5,468,654 UART: [update-reset Success] --
5,469,515 UART: [state] Locking Datavault
5,470,355 UART: [state] Locking PCR0, PCR1 and PCR31
5,470,959 UART: [state] Locking ICCM
5,471,487 UART: [exit] Launching FMC @ 0x40000130
5,476,816 UART:
5,476,832 UART: Running Caliptra FMC ...
5,477,240 UART:
5,477,294 UART: [state] CFI Enabled
5,566,835 UART: [art] Extend RT PCRs Done
5,567,263 UART: [art] Lock RT PCRs Done
5,568,496 UART: [art] Populate DV Done
5,576,643 UART: [fht] FMC Alias Private Key: 7
5,577,575 UART: [art] Derive CDI
5,577,855 UART: [art] Store in in slot 0x4
5,663,466 UART: [art] Derive Key Pair
5,663,826 UART: [art] Store priv key in slot 0x5
5,677,626 UART: [art] Derive Key Pair - Done
5,692,568 UART: [art] Signing Cert with AUTHO
5,693,048 UART: RITY.KEYID = 7
5,708,226 UART: [art] Erasing AUTHORITY.KEYID = 7
5,708,991 UART: [art] PUB.X = D0D2B17A6F5EADB947EAAA8755210ACB8ADEBF8906F897E22BE584B70EF7FDEDDECD78447129C7E02F94010B821D2D80
5,715,768 UART: [art] PUB.Y = AF3B0DA761DC7A531F1654927D9619A86543C5CFDD654B724FFD96597587A9FA75795B01930AEAB3DF07833E08622205
5,722,700 UART: [art] SIG.R = DFDC62CFC479C38E585FA312DB2F027935C06AD3B3E58AC64EAE0728A24EF1AA5FB61E4711B66023F3D1932CC05D9E4E
5,729,482 UART: [art] SIG.S = 06A0B712F7394F7E2E8C95CB495812ABBA872B15FB98B827FA29A92D3516770B8D7C3E879D8C2870735C51FA5B2101CA
5,752,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,753,022 UART: mock_rt_interact::rt_entry...FMC Tester
6,036,426 UART: [rt] Runtime listening for mailbox commands...
6,038,461 >>> mbox cmd response data (336 bytes)
6,038,462 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,051,053 >>> mbox cmd response data (1536 bytes)
6,051,054 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,051,071 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,943 ready_for_fw is high
1,361,943 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,419,232 >>> mbox cmd response: success
2,419,232 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,481,654 UART:
2,481,670 UART: Running Caliptra FMC ...
2,482,078 UART:
2,482,132 UART: [state] CFI Enabled
2,492,533 UART: [fht] FMC Alias Private Key: 7
2,600,494 UART: [art] Extend RT PCRs Done
2,600,922 UART: [art] Lock RT PCRs Done
2,602,468 UART: [art] Populate DV Done
2,610,475 UART: [fht] FMC Alias Private Key: 7
2,611,557 UART: [art] Derive CDI
2,611,837 UART: [art] Store in in slot 0x4
2,697,660 UART: [art] Derive Key Pair
2,698,020 UART: [art] Store priv key in slot 0x5
2,711,226 UART: [art] Derive Key Pair - Done
2,725,897 UART: [art] Signing Cert with AUTHO
2,726,377 UART: RITY.KEYID = 7
2,741,393 UART: [art] Erasing AUTHORITY.KEYID = 7
2,742,158 UART: [art] PUB.X = 8AE2DBE9E260446E955C25C5A412DA59B178C9ECD5E28315DE30FBCBBA1D87ABAAE81BA358D42D003F39EA07CB946D71
2,748,925 UART: [art] PUB.Y = FAE295DF3C7DEA2F8C673CDF9D92A5A26AEC8DBCBB6E0FE103ADF60857A0488BDDE09DEB22AF44DDAC1210A5F7784EB6
2,755,902 UART: [art] SIG.R = D339DF0860D0A0B0101FC425CA5C3D4AF72BCC4663A872895A13069CF05A751B47116DEC65BBCAB510686CDACAD291B8
2,762,680 UART: [art] SIG.S = 62A2051B49785BE528DF9E51740E397FB1D5201156BB97D14A263D2E366816BCA8D1234032B67AE147D9F58C273BED6C
2,786,531 UART: mock_rt_interact::rt_entry...FMC Tester
2,893,679 UART: [rt] Runtime listening for mailbox commands...
2,897,069 >>> mbox cmd response data (2048 bytes)
2,897,070 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,898,302 >>> mbox cmd response data (336 bytes)
2,898,303 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,910,894 >>> mbox cmd response data (1536 bytes)
2,910,895 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
5,166,354 >>> mbox cmd response: success
5,179,819 UART:
5,179,835 UART: Running Caliptra FMC ...
5,180,243 UART:
5,180,297 UART: [state] CFI Enabled
5,269,682 UART: [art] Extend RT PCRs Done
5,270,110 UART: [art] Lock RT PCRs Done
5,271,493 UART: [art] Populate DV Done
5,279,718 UART: [fht] FMC Alias Private Key: 7
5,280,670 UART: [art] Derive CDI
5,280,950 UART: [art] Store in in slot 0x4
5,366,909 UART: [art] Derive Key Pair
5,367,269 UART: [art] Store priv key in slot 0x5
5,381,081 UART: [art] Derive Key Pair - Done
5,395,641 UART: [art] Signing Cert with AUTHO
5,396,121 UART: RITY.KEYID = 7
5,411,255 UART: [art] Erasing AUTHORITY.KEYID = 7
5,412,020 UART: [art] PUB.X = 985E65ABF94AB38B87BF4C6360F42ED7F119BD1B9AF69FD06C9070F0DF843C4E5841A6DD6C5FC05486AD4E30E1FD009C
5,418,786 UART: [art] PUB.Y = 680EDDE3A3BE0CF0BA438A20A00CFA40405A9D2FCCB01881D4D7FC2680A5F3442CAD093C11A961A7859F42AD96DD7215
5,425,740 UART: [art] SIG.R = D1312BA5A5A1512CFE4C31F2DDA0A2A2D2497668316932781B408E5F9852EF6D3C77E9BCCEA696A57FCE4F707BFF983C
5,432,524 UART: [art] SIG.S = 3DCD15E9C2654C3DD820E7496D534382560FAEE53FC8232886E3789A3018492282D9F0C6D8737108A96D5960DA9DA2ED
5,455,238 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,456,345 UART: mock_rt_interact::rt_entry...FMC Tester
5,743,075 UART: [rt] Runtime listening for mailbox commands...
5,745,110 >>> mbox cmd response data (336 bytes)
5,745,111 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,757,702 >>> mbox cmd response data (1536 bytes)
5,757,703 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,757,720 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,070 UART: [kat] SHA2-256
893,008 UART: [kat] SHA2-384
895,691 UART: [kat] SHA2-512-ACC
897,592 UART: [kat] ECC-384
903,531 UART: [kat] HMAC-384Kdf
908,117 UART: [kat] LMS
1,476,313 UART: [kat] --
1,477,048 UART: [cold-reset] ++
1,477,548 UART: [fht] Storing FHT @ 0x50003400
1,480,133 UART: [idev] ++
1,480,301 UART: [idev] CDI.KEYID = 6
1,480,661 UART: [idev] SUBJECT.KEYID = 7
1,481,085 UART: [idev] UDS.KEYID = 0
1,481,430 ready_for_fw is high
1,481,430 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,489,529 UART: [idev] Erasing UDS.KEYID = 0
1,505,831 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,303 UART: [idev] --
1,515,288 UART: [ldev] ++
1,515,456 UART: [ldev] CDI.KEYID = 6
1,515,819 UART: [ldev] SUBJECT.KEYID = 5
1,516,245 UART: [ldev] AUTHORITY.KEYID = 7
1,516,708 UART: [ldev] FE.KEYID = 1
1,521,780 UART: [ldev] Erasing FE.KEYID = 1
1,547,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,785 UART: [ldev] --
1,586,262 UART: [fwproc] Waiting for Commands...
1,586,901 UART: [fwproc] Received command 0x46574c44
1,587,692 UART: [fwproc] Received Image of size 75220 bytes
2,437,784 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,465,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,494,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 50536
2,571,983 >>> mbox cmd response: success
2,571,983 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,573,119 UART: [afmc] ++
2,573,287 UART: [afmc] CDI.KEYID = 6
2,573,649 UART: [afmc] SUBJECT.KEYID = 7
2,574,074 UART: [afmc] AUTHORITY.KEYID = 5
2,609,533 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,625,901 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,626,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,632,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,638,294 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,643,984 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,651,769 UART: [afmc] --
2,652,883 UART: [cold-reset] --
2,653,847 UART: [state] Locking Datavault
2,655,176 UART: [state] Locking PCR0, PCR1 and PCR31
2,655,780 UART: [state] Locking ICCM
2,656,206 UART: [exit] Launching FMC @ 0x40000130
2,661,535 UART:
2,661,551 UART: Running Caliptra FMC ...
2,661,959 UART:
2,662,102 UART: [state] CFI Enabled
2,672,857 UART: [fht] FMC Alias Private Key: 7
2,780,166 UART: [art] Extend RT PCRs Done
2,780,594 UART: [art] Lock RT PCRs Done
2,782,196 UART: [art] Populate DV Done
2,790,285 UART: [fht] FMC Alias Private Key: 7
2,791,227 UART: [art] Derive CDI
2,791,507 UART: [art] Store in in slot 0x4
2,877,278 UART: [art] Derive Key Pair
2,877,638 UART: [art] Store priv key in slot 0x5
2,890,396 UART: [art] Derive Key Pair - Done
2,905,473 UART: [art] Signing Cert with AUTHO
2,905,953 UART: RITY.KEYID = 7
2,921,101 UART: [art] Erasing AUTHORITY.KEYID = 7
2,921,866 UART: [art] PUB.X = 48C019BD43D839022ADDC5AD025CF5C0A2CAE77F23A2A905A93C09834C36F21F3B51B2DA60ED7FA4BC0634D8CC38DE8C
2,928,641 UART: [art] PUB.Y = EAFE063D1BABDC1CEFFA89FE6526ED292AFAC23F201221EE8D6DACDA89CF8B75B7AA673FF9C3B0F20A71064943B36412
2,935,610 UART: [art] SIG.R = 980698D2430CF18573E946147D82B868DF9FC9FA04FFB64C1A22256BA3F77D2BDC4BB663B929051BAAE33AECF464CE30
2,942,380 UART: [art] SIG.S = D55BFDDA5AA1896C8D935FCBEEEB8F9CE68704A724677257727961D57A192D99E2C2268C4D5CBD0C85C418B6FB269F8C
2,965,661 UART: mock_rt_interact::rt_entry...FMC Tester
3,072,986 UART: [rt] Runtime listening for mailbox commands...
3,076,376 >>> mbox cmd response data (2048 bytes)
3,076,377 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,077,609 >>> mbox cmd response data (336 bytes)
3,077,610 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,090,201 >>> mbox cmd response data (1536 bytes)
3,090,202 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
3,090,308 UART:
3,090,324 UART: Running Caliptra ROM ...
3,090,732 UART:
3,090,873 UART: [state] CFI Enabled
3,093,471 UART: [state] LifecycleState = Unprovisioned
3,094,126 UART: [state] DebugLocked = No
3,094,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,096,215 UART: [kat] SHA2-256
3,890,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,894,261 UART: [kat] ++
3,894,413 UART: [kat] sha1
3,898,651 UART: [kat] SHA2-256
3,900,589 UART: [kat] SHA2-384
3,903,394 UART: [kat] SHA2-512-ACC
3,905,294 UART: [kat] ECC-384
3,910,767 UART: [kat] HMAC-384Kdf
3,915,275 UART: [kat] LMS
4,483,471 UART: [kat] --
4,484,470 UART: [update-reset] ++
5,370,308 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,371,448 UART: [update-reset] Loading Runtime at address 0x40005000 len 50536
5,462,656 >>> mbox cmd response: success
5,462,851 UART: [update-reset] Copying MAN_2 To MAN_1
5,470,865 UART: [update-reset Success] --
5,471,742 UART: [state] Locking Datavault
5,472,546 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,150 UART: [state] Locking ICCM
5,473,692 UART: [exit] Launching FMC @ 0x40000130
5,479,021 UART:
5,479,037 UART: Running Caliptra FMC ...
5,479,445 UART:
5,479,588 UART: [state] CFI Enabled
5,568,377 UART: [art] Extend RT PCRs Done
5,568,805 UART: [art] Lock RT PCRs Done
5,570,100 UART: [art] Populate DV Done
5,578,119 UART: [fht] FMC Alias Private Key: 7
5,579,273 UART: [art] Derive CDI
5,579,553 UART: [art] Store in in slot 0x4
5,665,514 UART: [art] Derive Key Pair
5,665,874 UART: [art] Store priv key in slot 0x5
5,678,956 UART: [art] Derive Key Pair - Done
5,693,662 UART: [art] Signing Cert with AUTHO
5,694,142 UART: RITY.KEYID = 7
5,709,452 UART: [art] Erasing AUTHORITY.KEYID = 7
5,710,217 UART: [art] PUB.X = 9C1C7D9CE83CCFC6C00BEDB12A1B032794F1FD1451BA488994EFB840EDFDD81FB0CD7390F46DE0EDD13D5DC498E3F53F
5,717,009 UART: [art] PUB.Y = FF26D0D8D8BB3DD848D89CC02514D91BB6CD9DE09C1D9940193AD317071A3E2CB1018FAD4665796919F4D07D633106F1
5,723,956 UART: [art] SIG.R = 581E5ECE1B2F37B84E7D5610293B8585619B03BB6F4601AFDB3E3CA2BBF8DAF317C9FE9BB0C16C0C852F554696CC000C
5,730,708 UART: [art] SIG.S = 005BD1F2DBC860B8BCC6E57C48083FBB1A4C15648D6C9371607A873C39E66908890EA32D5D5CF9639CCDBF3816EA55D0
5,753,973 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,754,962 UART: mock_rt_interact::rt_entry...FMC Tester
6,034,681 UART: [rt] Runtime listening for mailbox commands...
6,036,716 >>> mbox cmd response data (336 bytes)
6,036,717 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,049,308 >>> mbox cmd response data (1536 bytes)
6,049,309 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,049,326 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,770 ready_for_fw is high
1,362,770 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,421,093 >>> mbox cmd response: success
2,421,093 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,482,979 UART:
2,482,995 UART: Running Caliptra FMC ...
2,483,403 UART:
2,483,546 UART: [state] CFI Enabled
2,494,471 UART: [fht] FMC Alias Private Key: 7
2,602,406 UART: [art] Extend RT PCRs Done
2,602,834 UART: [art] Lock RT PCRs Done
2,604,426 UART: [art] Populate DV Done
2,612,735 UART: [fht] FMC Alias Private Key: 7
2,613,777 UART: [art] Derive CDI
2,614,057 UART: [art] Store in in slot 0x4
2,699,346 UART: [art] Derive Key Pair
2,699,706 UART: [art] Store priv key in slot 0x5
2,712,936 UART: [art] Derive Key Pair - Done
2,727,595 UART: [art] Signing Cert with AUTHO
2,728,075 UART: RITY.KEYID = 7
2,743,745 UART: [art] Erasing AUTHORITY.KEYID = 7
2,744,510 UART: [art] PUB.X = 0508FB78F3A558E565DB82E25DFC4F208666CB56BE07712479AE7D243757693FA979A205286560F97392F7E6E8003D8E
2,751,240 UART: [art] PUB.Y = 0B102209ECAE91578EE12704AAC33E805E97E4E7D1FED27983E3C3D592E383E926D57891BE21E0CB28B2E1701B311FCF
2,758,189 UART: [art] SIG.R = DB0635695B038CC1A70A53C338230EF5759F2CACF94163EE19A9F42EFAA3AED9FCCC61726FFDDDE98990A31F84F2A397
2,764,965 UART: [art] SIG.S = A973645975EA0CA7251D0AC57C9675898D101E1A5EB387D83D5D17AE32F0E302AED755F9334F64E1E9AD3EEDF67E5657
2,788,683 UART: mock_rt_interact::rt_entry...FMC Tester
2,895,690 UART: [rt] Runtime listening for mailbox commands...
2,899,080 >>> mbox cmd response data (2048 bytes)
2,899,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,900,313 >>> mbox cmd response data (336 bytes)
2,900,314 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,912,905 >>> mbox cmd response data (1536 bytes)
2,912,906 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
5,166,212 >>> mbox cmd response: success
5,179,757 UART:
5,179,773 UART: Running Caliptra FMC ...
5,180,181 UART:
5,180,324 UART: [state] CFI Enabled
5,270,019 UART: [art] Extend RT PCRs Done
5,270,447 UART: [art] Lock RT PCRs Done
5,271,576 UART: [art] Populate DV Done
5,279,873 UART: [fht] FMC Alias Private Key: 7
5,280,801 UART: [art] Derive CDI
5,281,081 UART: [art] Store in in slot 0x4
5,366,964 UART: [art] Derive Key Pair
5,367,324 UART: [art] Store priv key in slot 0x5
5,380,658 UART: [art] Derive Key Pair - Done
5,395,355 UART: [art] Signing Cert with AUTHO
5,395,835 UART: RITY.KEYID = 7
5,410,783 UART: [art] Erasing AUTHORITY.KEYID = 7
5,411,548 UART: [art] PUB.X = EEA4A07584D0E5291E68D904EA655EAE5392DEA296DA69901A3D48ADD36C3F49EF17370EF1C552D25127C6DF702A776F
5,418,322 UART: [art] PUB.Y = 9DFF282673DE827788E04CD555A34705DB016CBBD7B31BB61D01019F6CE67922DA7120CC0262B261DD34540D51596F9F
5,425,256 UART: [art] SIG.R = 09FB18F4467F770A82AC4B1D974D70B53E93638FEE37A206D72800811B3C3147252BC779717A2DA9C66B0562009B236F
5,431,964 UART: [art] SIG.S = 49DC398D601FCF7515DAF6973DBA4A787C65A0079D9F71B9447BB451843D7451F9D3149BE37761B790A4BC3563186BF2
5,454,937 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,456,022 UART: mock_rt_interact::rt_entry...FMC Tester
5,738,671 UART: [rt] Runtime listening for mailbox commands...
5,740,706 >>> mbox cmd response data (336 bytes)
5,740,707 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,753,298 >>> mbox cmd response data (1536 bytes)
5,753,299 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,753,316 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,416 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,171,845 UART: [cold-reset] ++
1,172,331 UART: [fht] FHT @ 0x50003400
1,175,096 UART: [idev] ++
1,175,264 UART: [idev] CDI.KEYID = 6
1,175,624 UART: [idev] SUBJECT.KEYID = 7
1,176,048 UART: [idev] UDS.KEYID = 0
1,176,393 ready_for_fw is high
1,176,393 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,184,338 UART: [idev] Erasing UDS.KEYID = 0
1,201,329 UART: [idev] Sha1 KeyId Algorithm
1,209,659 UART: [idev] --
1,210,621 UART: [ldev] ++
1,210,789 UART: [ldev] CDI.KEYID = 6
1,211,152 UART: [ldev] SUBJECT.KEYID = 5
1,211,578 UART: [ldev] AUTHORITY.KEYID = 7
1,212,041 UART: [ldev] FE.KEYID = 1
1,217,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,589 UART: [ldev] --
1,281,952 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,326 UART: [fwproc] Recv'd Img size: 75220 bytes
2,131,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,159,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,188,626 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,265,879 >>> mbox cmd response: success
2,265,879 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,267,115 UART: [afmc] ++
2,267,283 UART: [afmc] CDI.KEYID = 6
2,267,645 UART: [afmc] SUBJECT.KEYID = 7
2,268,070 UART: [afmc] AUTHORITY.KEYID = 5
2,302,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,319,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,319,904 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,325,632 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,331,517 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,337,236 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,345,028 UART: [afmc] --
2,346,100 UART: [cold-reset] --
2,347,078 UART: [state] Locking Datavault
2,348,159 UART: [state] Locking PCR0, PCR1 and PCR31
2,348,763 UART: [state] Locking ICCM
2,349,419 UART: [exit] Launching FMC @ 0x40000130
2,354,748 UART:
2,354,764 UART: Running Caliptra FMC ...
2,355,172 UART:
2,355,226 UART: [state] CFI Enabled
2,365,675 UART: [fht] FMC Alias Private Key: 7
2,473,066 UART: [art] Extend RT PCRs Done
2,473,494 UART: [art] Lock RT PCRs Done
2,474,906 UART: [art] Populate DV Done
2,483,343 UART: [fht] FMC Alias Private Key: 7
2,484,509 UART: [art] Derive CDI
2,484,789 UART: [art] Store in in slot 0x4
2,570,728 UART: [art] Derive Key Pair
2,571,088 UART: [art] Store priv key in slot 0x5
2,583,796 UART: [art] Derive Key Pair - Done
2,598,411 UART: [art] Signing Cert with AUTHO
2,598,891 UART: RITY.KEYID = 7
2,614,469 UART: [art] Erasing AUTHORITY.KEYID = 7
2,615,234 UART: [art] PUB.X = 6E041FF204CC73C6740C1C968573AB40A8FCA0189C78D173C27315ED2C275481285C1E3FF9A6874B7A4A6313BE59E2F0
2,621,997 UART: [art] PUB.Y = DFC77C4162B26AAB3830F2260D32DD12293F7017BF1E30E01943BD9E2FA2E0B7804AFE34D4445FEB81F52B45C8B32E99
2,628,954 UART: [art] SIG.R = 961287784B35FF260D33875D0A270B21B87220BC3BF2BEF320C6BF8197F5751B2085AA0A4FE0611AD002A3AA8792C4F4
2,635,711 UART: [art] SIG.S = F18433FA05FA6DE2DC910342C1542BF19417EF3197D1FFBD7756CAAEC73CD44894FFD7A329602C2618D664C422B259A2
2,659,834 UART: mock_rt_interact::rt_entry...FMC Tester
2,767,017 UART: [rt] Runtime listening for mailbox commands...
2,770,407 >>> mbox cmd response data (2048 bytes)
2,770,408 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,771,640 >>> mbox cmd response data (336 bytes)
2,771,641 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,784,232 >>> mbox cmd response data (1536 bytes)
2,784,233 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,784,336 UART:
2,784,352 UART: Running Caliptra ROM ...
2,784,760 UART:
2,784,815 UART: [state] CFI Enabled
2,787,265 UART: [state] LifecycleState = Unprovisioned
2,787,920 UART: [state] DebugLocked = No
2,788,482 UART: [state] WD Timer not started. Device not locked for debugging
2,789,672 UART: [kat] SHA2-256
3,595,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,599,447 UART: [kat] ++
3,599,599 UART: [kat] sha1
3,603,863 UART: [kat] SHA2-256
3,605,803 UART: [kat] SHA2-384
3,608,782 UART: [kat] SHA2-512-ACC
3,610,682 UART: [kat] ECC-384
3,620,523 UART: [kat] HMAC-384Kdf
3,624,955 UART: [kat] LMS
3,873,283 UART: [kat] --
3,874,547 UART: [update-reset] ++
4,739,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,740,404 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
4,831,560 >>> mbox cmd response: success
4,831,869 UART: [update-reset] Copying MAN_2 To MAN_1
4,839,883 UART: [update-reset Success] --
4,840,922 UART: [state] Locking Datavault
4,841,824 UART: [state] Locking PCR0, PCR1 and PCR31
4,842,428 UART: [state] Locking ICCM
4,842,994 UART: [exit] Launching FMC @ 0x40000130
4,848,323 UART:
4,848,339 UART: Running Caliptra FMC ...
4,848,747 UART:
4,848,801 UART: [state] CFI Enabled
4,937,932 UART: [art] Extend RT PCRs Done
4,938,360 UART: [art] Lock RT PCRs Done
4,939,569 UART: [art] Populate DV Done
4,947,598 UART: [fht] FMC Alias Private Key: 7
4,948,772 UART: [art] Derive CDI
4,949,052 UART: [art] Store in in slot 0x4
5,034,609 UART: [art] Derive Key Pair
5,034,969 UART: [art] Store priv key in slot 0x5
5,048,373 UART: [art] Derive Key Pair - Done
5,062,744 UART: [art] Signing Cert with AUTHO
5,063,224 UART: RITY.KEYID = 7
5,078,132 UART: [art] Erasing AUTHORITY.KEYID = 7
5,078,897 UART: [art] PUB.X = C995AF7E7EA0117AF9895FA24CC7294F8AA236805B90EB712B0320FA107F62726DD4439DDB7F52FC8C222EE2B2A96B28
5,085,674 UART: [art] PUB.Y = 61F4DBF43CA22C26C05E0588376945739557F94E83E1F24B8A8BC1E2BF5F2F3E5D09A4E899DDA02C2BEDD62733E8DB40
5,092,630 UART: [art] SIG.R = 4FE536E134C7F855BA2DE09C536DC0C78FE4B0ED0D6D122D8ACA9242D6276DE0A880ABCF80A6DB01EC5FDF4A9C9B4713
5,099,418 UART: [art] SIG.S = 15782D8A635BB41EC4183401861FFCBFFFD8B2C8685CF77DCEF104BB636D1FCAEA78605B0FCACC7F9D2A2CFD40156ADB
5,121,797 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,122,980 UART: mock_rt_interact::rt_entry...FMC Tester
5,402,762 UART: [rt] Runtime listening for mailbox commands...
5,404,797 >>> mbox cmd response data (336 bytes)
5,404,798 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,417,389 >>> mbox cmd response data (1536 bytes)
5,417,390 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,417,407 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,593 ready_for_fw is high
1,060,593 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,118,466 >>> mbox cmd response: success
2,118,466 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,102 UART:
2,181,118 UART: Running Caliptra FMC ...
2,181,526 UART:
2,181,580 UART: [state] CFI Enabled
2,191,727 UART: [fht] FMC Alias Private Key: 7
2,299,872 UART: [art] Extend RT PCRs Done
2,300,300 UART: [art] Lock RT PCRs Done
2,302,016 UART: [art] Populate DV Done
2,310,189 UART: [fht] FMC Alias Private Key: 7
2,311,243 UART: [art] Derive CDI
2,311,523 UART: [art] Store in in slot 0x4
2,397,240 UART: [art] Derive Key Pair
2,397,600 UART: [art] Store priv key in slot 0x5
2,410,718 UART: [art] Derive Key Pair - Done
2,425,329 UART: [art] Signing Cert with AUTHO
2,425,809 UART: RITY.KEYID = 7
2,441,049 UART: [art] Erasing AUTHORITY.KEYID = 7
2,441,814 UART: [art] PUB.X = 0E59F18F0BCE763C93910913AEFD06F24A7358A345FB3DD812F258C3E07AA08A48AE69DF3BE378E55DF32B1A071D6C0B
2,448,580 UART: [art] PUB.Y = 6B5FE383AEFD9645D6ACB9CA9A43ECB11609EA08DE7CB91CE874B8BBAB1AD21DB522B1BC244F878A02EBF5643EA5F94B
2,455,551 UART: [art] SIG.R = EAD1903EEF590D18EDC4DF2367B1777B0706F2761F0ECE76BB44984E41C81EAC3AF5096C303E6DD42B4FCFD3CD6D083F
2,462,323 UART: [art] SIG.S = D9995E26D11F106E2A25908D84EB6C5854CF4D1251F5D6ACA49B9B06F51666B26D26EEA4FF0E2070329BAE83B9C09023
2,486,276 UART: mock_rt_interact::rt_entry...FMC Tester
2,593,191 UART: [rt] Runtime listening for mailbox commands...
2,596,581 >>> mbox cmd response data (2048 bytes)
2,596,582 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,597,814 >>> mbox cmd response data (336 bytes)
2,597,815 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,610,406 >>> mbox cmd response data (1536 bytes)
2,610,407 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
4,540,925 >>> mbox cmd response: success
4,554,165 UART:
4,554,181 UART: Running Caliptra FMC ...
4,554,589 UART:
4,554,643 UART: [state] CFI Enabled
4,642,978 UART: [art] Extend RT PCRs Done
4,643,406 UART: [art] Lock RT PCRs Done
4,644,779 UART: [art] Populate DV Done
4,652,894 UART: [fht] FMC Alias Private Key: 7
4,653,980 UART: [art] Derive CDI
4,654,260 UART: [art] Store in in slot 0x4
4,739,513 UART: [art] Derive Key Pair
4,739,873 UART: [art] Store priv key in slot 0x5
4,753,143 UART: [art] Derive Key Pair - Done
4,768,112 UART: [art] Signing Cert with AUTHO
4,768,592 UART: RITY.KEYID = 7
4,783,480 UART: [art] Erasing AUTHORITY.KEYID = 7
4,784,245 UART: [art] PUB.X = ED45C4335D4C92DABE3DD90C947DAC09472DA97976770444BD526783C9F2CF410B1096B7E26799289FB2ED8CEDA46B3D
4,791,013 UART: [art] PUB.Y = 019F00501D371363AB4E4C5FEF7732297F598EBEDFAEB8BF2191E0FA6DED1D59EAC8606C39B7C4DDA31F7918B464F4F3
4,797,956 UART: [art] SIG.R = 838A4E95708B54643AA9222D42EA201A53D593FCB450DF07B288B8E04AC1F9A3080BA74282AA368B6936A4FBC3821953
4,804,717 UART: [art] SIG.S = 47B21951429447A378DCC3EA29A3BEE0894928ADE34EBC5D133D2CDB4DF8793E5C99C1C7ED25598F5B322819BA0EFB82
4,827,216 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,828,291 UART: mock_rt_interact::rt_entry...FMC Tester
5,113,121 UART: [rt] Runtime listening for mailbox commands...
5,115,156 >>> mbox cmd response data (336 bytes)
5,115,157 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,127,748 >>> mbox cmd response data (1536 bytes)
5,127,749 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,127,766 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
901,778 UART: [kat] SHA2-256
903,718 UART: [kat] SHA2-384
906,317 UART: [kat] SHA2-512-ACC
908,218 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
923,187 UART: [kat] LMS
1,171,515 UART: [kat] --
1,172,458 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,399 UART: [idev] ++
1,175,567 UART: [idev] CDI.KEYID = 6
1,175,927 UART: [idev] SUBJECT.KEYID = 7
1,176,351 UART: [idev] UDS.KEYID = 0
1,176,696 ready_for_fw is high
1,176,696 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,184,609 UART: [idev] Erasing UDS.KEYID = 0
1,201,748 UART: [idev] Sha1 KeyId Algorithm
1,210,374 UART: [idev] --
1,211,420 UART: [ldev] ++
1,211,588 UART: [ldev] CDI.KEYID = 6
1,211,951 UART: [ldev] SUBJECT.KEYID = 5
1,212,377 UART: [ldev] AUTHORITY.KEYID = 7
1,212,840 UART: [ldev] FE.KEYID = 1
1,218,176 UART: [ldev] Erasing FE.KEYID = 1
1,244,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,808 UART: [ldev] --
1,284,099 UART: [fwproc] Wait for Commands...
1,284,919 UART: [fwproc] Recv command 0x46574c44
1,285,647 UART: [fwproc] Recv'd Img size: 75220 bytes
2,136,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,163,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,192,503 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,269,600 >>> mbox cmd response: success
2,269,600 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,270,840 UART: [afmc] ++
2,271,008 UART: [afmc] CDI.KEYID = 6
2,271,370 UART: [afmc] SUBJECT.KEYID = 7
2,271,795 UART: [afmc] AUTHORITY.KEYID = 5
2,306,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,323,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,323,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,329,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,335,528 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,341,247 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,349,133 UART: [afmc] --
2,350,205 UART: [cold-reset] --
2,351,113 UART: [state] Locking Datavault
2,352,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,352,924 UART: [state] Locking ICCM
2,353,536 UART: [exit] Launching FMC @ 0x40000130
2,358,865 UART:
2,358,881 UART: Running Caliptra FMC ...
2,359,289 UART:
2,359,432 UART: [state] CFI Enabled
2,369,693 UART: [fht] FMC Alias Private Key: 7
2,478,436 UART: [art] Extend RT PCRs Done
2,478,864 UART: [art] Lock RT PCRs Done
2,480,530 UART: [art] Populate DV Done
2,488,837 UART: [fht] FMC Alias Private Key: 7
2,489,885 UART: [art] Derive CDI
2,490,165 UART: [art] Store in in slot 0x4
2,575,926 UART: [art] Derive Key Pair
2,576,286 UART: [art] Store priv key in slot 0x5
2,589,728 UART: [art] Derive Key Pair - Done
2,604,450 UART: [art] Signing Cert with AUTHO
2,604,930 UART: RITY.KEYID = 7
2,619,930 UART: [art] Erasing AUTHORITY.KEYID = 7
2,620,695 UART: [art] PUB.X = 19F3979320B51F3AAE47976CF8F1F97E4BA6CCBE9A9C31A771E12CD341F03D088D561FBF338CDDE313EC343CD5D308F0
2,627,475 UART: [art] PUB.Y = 2C9345B8C857C5AB4BB8C0811DEB3D14AF8EAE7A77EE692966B6EEA8623E18D5CE1CE0A2337C0281713A573430093863
2,634,425 UART: [art] SIG.R = 221965B4B59EC51C42126DF3C95CDE585CFF24D612ADC18623D8479760F1B59999F551E85DBAA0FBD2B6C8909132A75F
2,641,201 UART: [art] SIG.S = BC6C79E87C6A2EADAB387D5FEF5853B739BFD4DE07FA4789A3C8AE1878013DCFAC4A9A6A78E013E1C9F20AFBEB6ECD2D
2,665,775 UART: mock_rt_interact::rt_entry...FMC Tester
2,773,035 UART: [rt] Runtime listening for mailbox commands...
2,776,425 >>> mbox cmd response data (2048 bytes)
2,776,426 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,777,658 >>> mbox cmd response data (336 bytes)
2,777,659 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,790,250 >>> mbox cmd response data (1536 bytes)
2,790,251 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,790,354 UART:
2,790,370 UART: Running Caliptra ROM ...
2,790,778 UART:
2,790,920 UART: [state] CFI Enabled
2,793,694 UART: [state] LifecycleState = Unprovisioned
2,794,349 UART: [state] DebugLocked = No
2,794,919 UART: [state] WD Timer not started. Device not locked for debugging
2,796,191 UART: [kat] SHA2-256
3,601,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,605,966 UART: [kat] ++
3,606,118 UART: [kat] sha1
3,610,250 UART: [kat] SHA2-256
3,612,190 UART: [kat] SHA2-384
3,614,971 UART: [kat] SHA2-512-ACC
3,616,871 UART: [kat] ECC-384
3,626,732 UART: [kat] HMAC-384Kdf
3,631,286 UART: [kat] LMS
3,879,614 UART: [kat] --
3,880,726 UART: [update-reset] ++
4,743,906 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,744,939 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
4,836,095 >>> mbox cmd response: success
4,836,202 UART: [update-reset] Copying MAN_2 To MAN_1
4,844,216 UART: [update-reset Success] --
4,845,097 UART: [state] Locking Datavault
4,845,873 UART: [state] Locking PCR0, PCR1 and PCR31
4,846,477 UART: [state] Locking ICCM
4,847,117 UART: [exit] Launching FMC @ 0x40000130
4,852,446 UART:
4,852,462 UART: Running Caliptra FMC ...
4,852,870 UART:
4,853,013 UART: [state] CFI Enabled
4,942,742 UART: [art] Extend RT PCRs Done
4,943,170 UART: [art] Lock RT PCRs Done
4,944,641 UART: [art] Populate DV Done
4,952,848 UART: [fht] FMC Alias Private Key: 7
4,954,004 UART: [art] Derive CDI
4,954,284 UART: [art] Store in in slot 0x4
5,040,065 UART: [art] Derive Key Pair
5,040,425 UART: [art] Store priv key in slot 0x5
5,054,131 UART: [art] Derive Key Pair - Done
5,068,914 UART: [art] Signing Cert with AUTHO
5,069,394 UART: RITY.KEYID = 7
5,084,838 UART: [art] Erasing AUTHORITY.KEYID = 7
5,085,603 UART: [art] PUB.X = A850A317870CBE9F7F8F7A09660ED193F4C22CD040211966DEE3FBBFC0503466BBFFA324B5E85B9D9D0C0B1B8ADF8608
5,092,371 UART: [art] PUB.Y = A00F9CD8BBC3AA6A62CBD4B3543FADBEADA1C71EDDD8529036210ADFE797B3DAAE68CF5A34B421E7B67CBE7CF36EFCE8
5,099,355 UART: [art] SIG.R = 75E88BD97F19CDA129E6BD22082B667C0F1F28C3FA55B8E9293144DE8B680AD0435B106660E0B72E7594FB8BAF3D73B6
5,106,124 UART: [art] SIG.S = 176A2F84FF6B7839C026EB88533AF7F0E37716F9F927631168A65053A5E3A1F52C56F3916C46B272158D25FB406AC712
5,128,832 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,130,017 UART: mock_rt_interact::rt_entry...FMC Tester
5,412,069 UART: [rt] Runtime listening for mailbox commands...
5,414,104 >>> mbox cmd response data (336 bytes)
5,414,105 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,426,696 >>> mbox cmd response data (1536 bytes)
5,426,697 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,426,714 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,980 ready_for_fw is high
1,060,980 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,118,837 >>> mbox cmd response: success
2,118,837 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,181,631 UART:
2,181,647 UART: Running Caliptra FMC ...
2,182,055 UART:
2,182,198 UART: [state] CFI Enabled
2,192,869 UART: [fht] FMC Alias Private Key: 7
2,300,940 UART: [art] Extend RT PCRs Done
2,301,368 UART: [art] Lock RT PCRs Done
2,302,812 UART: [art] Populate DV Done
2,311,235 UART: [fht] FMC Alias Private Key: 7
2,312,395 UART: [art] Derive CDI
2,312,675 UART: [art] Store in in slot 0x4
2,398,496 UART: [art] Derive Key Pair
2,398,856 UART: [art] Store priv key in slot 0x5
2,412,146 UART: [art] Derive Key Pair - Done
2,427,017 UART: [art] Signing Cert with AUTHO
2,427,497 UART: RITY.KEYID = 7
2,442,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,443,386 UART: [art] PUB.X = F4AD1CBA287D26761C9C42D15F9B9ABD1E4E0C2D0F20DD727E1BA6AED1406E70293534C6891614EE61FBD8DE0A2C587A
2,450,165 UART: [art] PUB.Y = 0CAF94A38119890F7E405A543744A6FDFC950F6E24C279EAFE1655EA9306BC4720B27C9666A7A1887C4CFB0EA3DB3000
2,457,086 UART: [art] SIG.R = D853088B6383FB39F48F244CE6C22ADB119CEA8D4D8DF4952E39CBD3CE181373C9C856240FD122A8CD617BF1D8C874F5
2,463,862 UART: [art] SIG.S = 144F921F44113B741EEFDE4F427C8FF24906ABEABF262DDA384165B6A609E0C886139E4F0C38158EF71C97D3EEA2A76F
2,487,500 UART: mock_rt_interact::rt_entry...FMC Tester
2,594,580 UART: [rt] Runtime listening for mailbox commands...
2,597,970 >>> mbox cmd response data (2048 bytes)
2,597,971 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,599,203 >>> mbox cmd response data (336 bytes)
2,599,204 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,611,795 >>> mbox cmd response data (1536 bytes)
2,611,796 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
4,542,323 >>> mbox cmd response: success
4,555,499 UART:
4,555,515 UART: Running Caliptra FMC ...
4,555,923 UART:
4,556,066 UART: [state] CFI Enabled
4,645,263 UART: [art] Extend RT PCRs Done
4,645,691 UART: [art] Lock RT PCRs Done
4,646,796 UART: [art] Populate DV Done
4,654,871 UART: [fht] FMC Alias Private Key: 7
4,655,833 UART: [art] Derive CDI
4,656,113 UART: [art] Store in in slot 0x4
4,742,100 UART: [art] Derive Key Pair
4,742,460 UART: [art] Store priv key in slot 0x5
4,755,276 UART: [art] Derive Key Pair - Done
4,770,486 UART: [art] Signing Cert with AUTHO
4,770,966 UART: RITY.KEYID = 7
4,786,430 UART: [art] Erasing AUTHORITY.KEYID = 7
4,787,195 UART: [art] PUB.X = B5C8CA80C06683B6D65339274086BBFAD0648766F318533D11DBA090A0EA05CAD108801C6F4C86B326A33A97EF6BDFF4
4,793,967 UART: [art] PUB.Y = 1825E0F8F3A88577AFA44DBB0C43008C3F36A682FEF72B505167CF38744D9C5E252FB2411C984B48CADE5D68BEA98F1B
4,800,904 UART: [art] SIG.R = 996900F76C25E74F931C491EDA591FBEDC641B1912CA517BFF4087DDC35A188781462FC80B4BC7BDC70C629870AC5C8E
4,807,656 UART: [art] SIG.S = FB13D90F6E8928B3D5DFA7CCACFD0A95364AAC7777E6B82F06B0A86DC7E1207F6713A671BA0B3CFAE20C6D43E3E73505
4,830,698 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,831,555 UART: mock_rt_interact::rt_entry...FMC Tester
5,111,008 UART: [rt] Runtime listening for mailbox commands...
5,113,043 >>> mbox cmd response data (336 bytes)
5,113,044 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,125,635 >>> mbox cmd response data (1536 bytes)
5,125,636 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,125,653 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,997 UART: [state] WD Timer not started. Device not locked for debugging
88,180 UART: [kat] SHA2-256
891,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,859 UART: [kat] ++
896,011 UART: [kat] sha1
900,255 UART: [kat] SHA2-256
902,195 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,746 UART: [kat] HMAC-384Kdf
921,402 UART: [kat] LMS
1,169,714 UART: [kat] --
1,170,807 UART: [cold-reset] ++
1,171,165 UART: [fht] FHT @ 0x50003400
1,173,733 UART: [idev] ++
1,173,901 UART: [idev] CDI.KEYID = 6
1,174,262 UART: [idev] SUBJECT.KEYID = 7
1,174,687 UART: [idev] UDS.KEYID = 0
1,175,033 ready_for_fw is high
1,175,033 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,182,703 UART: [idev] Erasing UDS.KEYID = 0
1,199,505 UART: [idev] Sha1 KeyId Algorithm
1,208,483 UART: [idev] --
1,209,482 UART: [ldev] ++
1,209,650 UART: [ldev] CDI.KEYID = 6
1,210,014 UART: [ldev] SUBJECT.KEYID = 5
1,210,441 UART: [ldev] AUTHORITY.KEYID = 7
1,210,904 UART: [ldev] FE.KEYID = 1
1,216,280 UART: [ldev] Erasing FE.KEYID = 1
1,242,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,462 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,581 UART: [fwproc] Recv command 0x46574c44
1,283,314 UART: [fwproc] Recv'd Img size: 75220 bytes
2,131,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,157,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,186,741 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,263,891 >>> mbox cmd response: success
2,263,891 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,265,110 UART: [afmc] ++
2,265,278 UART: [afmc] CDI.KEYID = 6
2,265,641 UART: [afmc] SUBJECT.KEYID = 7
2,266,067 UART: [afmc] AUTHORITY.KEYID = 5
2,301,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,318,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,318,753 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,324,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,330,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,336,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,343,857 UART: [afmc] --
2,344,963 UART: [cold-reset] --
2,345,951 UART: [state] Locking Datavault
2,347,046 UART: [state] Locking PCR0, PCR1 and PCR31
2,347,650 UART: [state] Locking ICCM
2,348,078 UART: [exit] Launching FMC @ 0x40000130
2,353,407 UART:
2,353,423 UART: Running Caliptra FMC ...
2,353,831 UART:
2,353,885 UART: [state] CFI Enabled
2,364,024 UART: [fht] FMC Alias Private Key: 7
2,471,549 UART: [art] Extend RT PCRs Done
2,471,977 UART: [art] Lock RT PCRs Done
2,473,493 UART: [art] Populate DV Done
2,481,680 UART: [fht] FMC Alias Private Key: 7
2,482,632 UART: [art] Derive CDI
2,482,912 UART: [art] Store in in slot 0x4
2,568,845 UART: [art] Derive Key Pair
2,569,205 UART: [art] Store priv key in slot 0x5
2,582,381 UART: [art] Derive Key Pair - Done
2,597,364 UART: [art] Signing Cert with AUTHO
2,597,844 UART: RITY.KEYID = 7
2,612,800 UART: [art] Erasing AUTHORITY.KEYID = 7
2,613,565 UART: [art] PUB.X = D4C80F734B0D6A5E64429FDDBB2F4CDD7ECB673EB112512F5412977201971F5D1AC4C25798E2F107EF6AF1DA88B4DBAF
2,620,341 UART: [art] PUB.Y = D76EDF585FD6F1208254AE09378010620BD75B343FD5E42459A05BCA10C5281041CF49791485B0785CCAF30ECF0D68DF
2,627,283 UART: [art] SIG.R = D28658A4BC6A58B59F84C8415914764D21F2324194A019410E7F7E11717A95847E5F1A53EF2E8650AC09540700B9C897
2,634,010 UART: [art] SIG.S = E9DD825F0261D76A22FFE26259DF2BC73DDFA0F39FD46B608B20F0C9532174025BB40C42DF196503EED24FC49CBCFA17
2,658,213 UART: mock_rt_interact::rt_entry...FMC Tester
2,765,470 UART: [rt] Runtime listening for mailbox commands...
2,768,860 >>> mbox cmd response data (2048 bytes)
2,768,861 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,770,093 >>> mbox cmd response data (336 bytes)
2,770,094 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,782,685 >>> mbox cmd response data (1536 bytes)
2,782,686 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,782,789 UART:
2,782,805 UART: Running Caliptra ROM ...
2,783,213 UART:
2,783,268 UART: [state] CFI Enabled
2,786,012 UART: [state] LifecycleState = Unprovisioned
2,786,667 UART: [state] DebugLocked = No
2,787,191 UART: [state] WD Timer not started. Device not locked for debugging
2,788,391 UART: [kat] SHA2-256
3,591,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,596,070 UART: [kat] ++
3,596,222 UART: [kat] sha1
3,600,510 UART: [kat] SHA2-256
3,602,450 UART: [kat] SHA2-384
3,605,233 UART: [kat] SHA2-512-ACC
3,607,133 UART: [kat] ECC-384
3,616,734 UART: [kat] HMAC-384Kdf
3,621,100 UART: [kat] LMS
3,869,412 UART: [kat] --
3,870,104 UART: [update-reset] ++
4,733,589 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,734,748 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
4,825,904 >>> mbox cmd response: success
4,826,113 UART: [update-reset] Copying MAN_2 To MAN_1
4,834,127 UART: [update-reset Success] --
4,835,190 UART: [state] Locking Datavault
4,835,958 UART: [state] Locking PCR0, PCR1 and PCR31
4,836,562 UART: [state] Locking ICCM
4,837,198 UART: [exit] Launching FMC @ 0x40000130
4,842,527 UART:
4,842,543 UART: Running Caliptra FMC ...
4,842,951 UART:
4,843,005 UART: [state] CFI Enabled
4,931,978 UART: [art] Extend RT PCRs Done
4,932,406 UART: [art] Lock RT PCRs Done
4,933,439 UART: [art] Populate DV Done
4,941,546 UART: [fht] FMC Alias Private Key: 7
4,942,638 UART: [art] Derive CDI
4,942,918 UART: [art] Store in in slot 0x4
5,028,795 UART: [art] Derive Key Pair
5,029,155 UART: [art] Store priv key in slot 0x5
5,042,503 UART: [art] Derive Key Pair - Done
5,057,617 UART: [art] Signing Cert with AUTHO
5,058,097 UART: RITY.KEYID = 7
5,073,555 UART: [art] Erasing AUTHORITY.KEYID = 7
5,074,320 UART: [art] PUB.X = F05D99595C310D68242611ADB54F4E5B51767F438C0A0E6B0EF07352B4876B153C43319410D8996C05E0AB0C65F58E80
5,081,066 UART: [art] PUB.Y = 02B4144A8F2AD99F48D0AF65B19011C080F9B21BDA31F8B3BDE30FAF407740EB2B4C9596FB5DEAD13351EB569183B40E
5,088,021 UART: [art] SIG.R = F05E0ED402202888D61D42799B108DF2CCE2B48F5D95F1B1E851F5ED2C192189AAA5A222562133F1D2F68630E53130E3
5,094,785 UART: [art] SIG.S = 86E0050E9F4199182C84FAB0E88D1D81907CF875EBF491316BEC22D8EA6D0BD9FEEE7F78BEBDDFB1790DF6CE0842FE3E
5,117,308 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,118,501 UART: mock_rt_interact::rt_entry...FMC Tester
5,401,258 UART: [rt] Runtime listening for mailbox commands...
5,403,293 >>> mbox cmd response data (336 bytes)
5,403,294 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,415,885 >>> mbox cmd response data (1536 bytes)
5,415,886 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,415,903 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,210 ready_for_fw is high
1,056,210 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,113,735 >>> mbox cmd response: success
2,113,735 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,175,301 UART:
2,175,317 UART: Running Caliptra FMC ...
2,175,725 UART:
2,175,779 UART: [state] CFI Enabled
2,186,600 UART: [fht] FMC Alias Private Key: 7
2,294,473 UART: [art] Extend RT PCRs Done
2,294,901 UART: [art] Lock RT PCRs Done
2,296,899 UART: [art] Populate DV Done
2,305,162 UART: [fht] FMC Alias Private Key: 7
2,306,154 UART: [art] Derive CDI
2,306,434 UART: [art] Store in in slot 0x4
2,391,917 UART: [art] Derive Key Pair
2,392,277 UART: [art] Store priv key in slot 0x5
2,405,125 UART: [art] Derive Key Pair - Done
2,419,641 UART: [art] Signing Cert with AUTHO
2,420,121 UART: RITY.KEYID = 7
2,434,709 UART: [art] Erasing AUTHORITY.KEYID = 7
2,435,474 UART: [art] PUB.X = C909EEC7D2DCCECBB661FD530A208277D825BFB37AB1866A411C42E755028A932430385997A8ACE48285F2B296E6E521
2,442,239 UART: [art] PUB.Y = 5667E7EF736425994BC2BD3C97B190213DD50CAD40C618176AA33F3AC399C35B1B09D6EA488E853A1BBB53D6FB6553B8
2,449,191 UART: [art] SIG.R = 74FECC34B0FC126E8FFB5A5261A36EA561F8E8EA9C05B76E4C34C86B72F45AE1D1731A02959EEAC777CA56592946503B
2,455,967 UART: [art] SIG.S = CE6991C5DA4EC85AC6E2B00A1A439D6E546997178F435008FBCDA0EAC634F28EE44FB261AE004E984EB8F2704699637B
2,479,916 UART: mock_rt_interact::rt_entry...FMC Tester
2,587,012 UART: [rt] Runtime listening for mailbox commands...
2,590,402 >>> mbox cmd response data (2048 bytes)
2,590,403 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,591,635 >>> mbox cmd response data (336 bytes)
2,591,636 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,604,227 >>> mbox cmd response data (1536 bytes)
2,604,228 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
4,529,619 >>> mbox cmd response: success
4,543,135 UART:
4,543,151 UART: Running Caliptra FMC ...
4,543,559 UART:
4,543,613 UART: [state] CFI Enabled
4,632,520 UART: [art] Extend RT PCRs Done
4,632,948 UART: [art] Lock RT PCRs Done
4,634,273 UART: [art] Populate DV Done
4,642,592 UART: [fht] FMC Alias Private Key: 7
4,643,644 UART: [art] Derive CDI
4,643,924 UART: [art] Store in in slot 0x4
4,729,353 UART: [art] Derive Key Pair
4,729,713 UART: [art] Store priv key in slot 0x5
4,742,931 UART: [art] Derive Key Pair - Done
4,757,977 UART: [art] Signing Cert with AUTHO
4,758,457 UART: RITY.KEYID = 7
4,773,957 UART: [art] Erasing AUTHORITY.KEYID = 7
4,774,722 UART: [art] PUB.X = D7F477556559D44CFA04BF55BEA8F1DEEE9429CD516473E8750BC3C3321C842168E6913CD38354DCC86B6C9E8EE376E0
4,781,494 UART: [art] PUB.Y = D5DE0CA071E976B05138785E1F0976B84E9BBC6CC953F87D1AE5A948D5F8ADDBDB18826D17E770384BD0249A23F6E654
4,788,448 UART: [art] SIG.R = 2DAA391C65AAF6B552C49CDFC764D7233F1169C92E4CE9A498BAFB4E3A1096ADD1A085EB8388962E2A790D7EB01BE9DF
4,795,235 UART: [art] SIG.S = 553BAE7452C307E766DA19A7875C616CC765230C142E207C5C62F1DF426C7B333DCC4ED7E22E8369FEE77D7B94E7A996
4,817,781 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,819,026 UART: mock_rt_interact::rt_entry...FMC Tester
5,099,146 UART: [rt] Runtime listening for mailbox commands...
5,101,181 >>> mbox cmd response data (336 bytes)
5,101,182 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,113,773 >>> mbox cmd response data (1536 bytes)
5,113,774 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,113,791 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,096 UART: [state] WD Timer not started. Device not locked for debugging
87,301 UART: [kat] SHA2-256
890,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,980 UART: [kat] ++
895,132 UART: [kat] sha1
899,418 UART: [kat] SHA2-256
901,358 UART: [kat] SHA2-384
904,043 UART: [kat] SHA2-512-ACC
905,944 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,292 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 ready_for_fw is high
1,174,314 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
1,181,604 UART: [idev] Erasing UDS.KEYID = 0
1,199,072 UART: [idev] Sha1 KeyId Algorithm
1,207,862 UART: [idev] --
1,208,821 UART: [ldev] ++
1,208,989 UART: [ldev] CDI.KEYID = 6
1,209,353 UART: [ldev] SUBJECT.KEYID = 5
1,209,780 UART: [ldev] AUTHORITY.KEYID = 7
1,210,243 UART: [ldev] FE.KEYID = 1
1,215,273 UART: [ldev] Erasing FE.KEYID = 1
1,241,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,657 UART: [ldev] --
1,281,041 UART: [fwproc] Wait for Commands...
1,281,676 UART: [fwproc] Recv command 0x46574c44
1,282,409 UART: [fwproc] Recv'd Img size: 75220 bytes
2,131,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,158,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,187,376 UART: [fwproc] Load Runtime at address 0x40005000 len 50536
2,264,412 >>> mbox cmd response: success
2,264,412 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,265,527 UART: [afmc] ++
2,265,695 UART: [afmc] CDI.KEYID = 6
2,266,058 UART: [afmc] SUBJECT.KEYID = 7
2,266,484 UART: [afmc] AUTHORITY.KEYID = 5
2,302,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,319,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,319,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,325,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,331,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,337,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,345,312 UART: [afmc] --
2,346,190 UART: [cold-reset] --
2,347,032 UART: [state] Locking Datavault
2,348,501 UART: [state] Locking PCR0, PCR1 and PCR31
2,349,105 UART: [state] Locking ICCM
2,349,605 UART: [exit] Launching FMC @ 0x40000130
2,354,934 UART:
2,354,950 UART: Running Caliptra FMC ...
2,355,358 UART:
2,355,501 UART: [state] CFI Enabled
2,366,492 UART: [fht] FMC Alias Private Key: 7
2,473,953 UART: [art] Extend RT PCRs Done
2,474,381 UART: [art] Lock RT PCRs Done
2,475,455 UART: [art] Populate DV Done
2,483,848 UART: [fht] FMC Alias Private Key: 7
2,484,806 UART: [art] Derive CDI
2,485,086 UART: [art] Store in in slot 0x4
2,570,551 UART: [art] Derive Key Pair
2,570,911 UART: [art] Store priv key in slot 0x5
2,584,503 UART: [art] Derive Key Pair - Done
2,599,451 UART: [art] Signing Cert with AUTHO
2,599,931 UART: RITY.KEYID = 7
2,615,377 UART: [art] Erasing AUTHORITY.KEYID = 7
2,616,142 UART: [art] PUB.X = FA13434321A6EDD54169826D8854CC967CC6A93107EF6C1993EAD88A525B0D67B68A7DDC02B4636F5BBFE4A3EF78B1E3
2,622,915 UART: [art] PUB.Y = 76C74E9818BF531994936D2A8F0C80D99782E8A587ED7A9B79E1E95ED0158077A36302A862FC0777FAD779ECA9956838
2,629,852 UART: [art] SIG.R = 9304CD7FF1DA45703725F9CED704FFE86E51AF244804AA497D1DF53E25D666465E5FE1F79EA46AB74DDE6E8D1561710E
2,636,622 UART: [art] SIG.S = B6A24C1616E12D87928B0A942C60367BE3A5E34B3B817008FF690B0201355EA46C116B9B99C2FDB367803F2C9C16A00A
2,660,161 UART: mock_rt_interact::rt_entry...FMC Tester
2,767,024 UART: [rt] Runtime listening for mailbox commands...
2,770,414 >>> mbox cmd response data (2048 bytes)
2,770,415 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,771,647 >>> mbox cmd response data (336 bytes)
2,771,648 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,784,239 >>> mbox cmd response data (1536 bytes)
2,784,240 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,784,343 UART:
2,784,359 UART: Running Caliptra ROM ...
2,784,767 UART:
2,784,909 UART: [state] CFI Enabled
2,787,569 UART: [state] LifecycleState = Unprovisioned
2,788,224 UART: [state] DebugLocked = No
2,788,824 UART: [state] WD Timer not started. Device not locked for debugging
2,790,076 UART: [kat] SHA2-256
3,593,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,597,755 UART: [kat] ++
3,597,907 UART: [kat] sha1
3,602,093 UART: [kat] SHA2-256
3,604,033 UART: [kat] SHA2-384
3,606,992 UART: [kat] SHA2-512-ACC
3,608,892 UART: [kat] ECC-384
3,618,551 UART: [kat] HMAC-384Kdf
3,623,221 UART: [kat] LMS
3,871,533 UART: [kat] --
3,872,675 UART: [update-reset] ++
4,736,152 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,737,351 UART: [update-reset] Loading Runtime at addr 0x40005000 len 50536
4,828,507 >>> mbox cmd response: success
4,828,624 UART: [update-reset] Copying MAN_2 To MAN_1
4,836,638 UART: [update-reset Success] --
4,837,799 UART: [state] Locking Datavault
4,838,641 UART: [state] Locking PCR0, PCR1 and PCR31
4,839,245 UART: [state] Locking ICCM
4,839,681 UART: [exit] Launching FMC @ 0x40000130
4,845,010 UART:
4,845,026 UART: Running Caliptra FMC ...
4,845,434 UART:
4,845,577 UART: [state] CFI Enabled
4,935,266 UART: [art] Extend RT PCRs Done
4,935,694 UART: [art] Lock RT PCRs Done
4,936,631 UART: [art] Populate DV Done
4,944,726 UART: [fht] FMC Alias Private Key: 7
4,945,672 UART: [art] Derive CDI
4,945,952 UART: [art] Store in in slot 0x4
5,031,579 UART: [art] Derive Key Pair
5,031,939 UART: [art] Store priv key in slot 0x5
5,044,511 UART: [art] Derive Key Pair - Done
5,059,263 UART: [art] Signing Cert with AUTHO
5,059,743 UART: RITY.KEYID = 7
5,075,105 UART: [art] Erasing AUTHORITY.KEYID = 7
5,075,870 UART: [art] PUB.X = 27A30952B02029642C64BFD90044FD6761026A76A1355432E52A8FE9E6BEAA928BB3952B4A3399AD1AEE213EB2EA57CF
5,082,618 UART: [art] PUB.Y = B52F90D183AF5F4B442E03D642D3DCFAC408ED6055BE61517CDBCEB3632BA31A89095B34751DE6281FEDA4D45C402B35
5,089,573 UART: [art] SIG.R = 4388EC26B4F61498E264B5FC0F2C9DEB6C43846394941BE225FBBC13717FAEBA72B47FC9E796F3F41633C9CA64E94358
5,096,348 UART: [art] SIG.S = 97EA122BE9AD23A11C20C0CEE85E4FA3C6AF1256D4C614AA271493BF458D4CEF944A8903D2770353DEE585AD5E6295EE
5,118,784 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,119,603 UART: mock_rt_interact::rt_entry...FMC Tester
5,401,205 UART: [rt] Runtime listening for mailbox commands...
5,403,240 >>> mbox cmd response data (336 bytes)
5,403,241 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,415,832 >>> mbox cmd response data (1536 bytes)
5,415,833 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,415,850 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,609 ready_for_fw is high
1,056,609 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
2,116,554 >>> mbox cmd response: success
2,116,554 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,179,004 UART:
2,179,020 UART: Running Caliptra FMC ...
2,179,428 UART:
2,179,571 UART: [state] CFI Enabled
2,189,814 UART: [fht] FMC Alias Private Key: 7
2,297,657 UART: [art] Extend RT PCRs Done
2,298,085 UART: [art] Lock RT PCRs Done
2,299,603 UART: [art] Populate DV Done
2,307,806 UART: [fht] FMC Alias Private Key: 7
2,308,950 UART: [art] Derive CDI
2,309,230 UART: [art] Store in in slot 0x4
2,394,951 UART: [art] Derive Key Pair
2,395,311 UART: [art] Store priv key in slot 0x5
2,408,645 UART: [art] Derive Key Pair - Done
2,423,017 UART: [art] Signing Cert with AUTHO
2,423,497 UART: RITY.KEYID = 7
2,438,873 UART: [art] Erasing AUTHORITY.KEYID = 7
2,439,638 UART: [art] PUB.X = 7FACEC9D7AF778FB698B19D8F8D17778E00D65CDFFFEA191D60B4BBCEC0AA1B130069F947C4A360AA58049A848BF581F
2,446,415 UART: [art] PUB.Y = 6043A92659161B02B67A4FB58C7E8F7D3A24244AFB649603DCD0A2B5625C39725BA8EE4E1934267DA4C9602451A4BB98
2,453,359 UART: [art] SIG.R = A8789E98D8DB85CE59A284B6181215B49A169B077F73648A47E29F7D342564903BCDD80AA81606978A4AAFDF3AE9A9FE
2,460,126 UART: [art] SIG.S = AAAA0D41B25A469A168C33A1C2E81A57AE60BDDBED1FA60638571BDDB8DE69829E354C477F6587048F193E38A62309EA
2,483,933 UART: mock_rt_interact::rt_entry...FMC Tester
2,591,958 UART: [rt] Runtime listening for mailbox commands...
2,595,348 >>> mbox cmd response data (2048 bytes)
2,595,349 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,596,581 >>> mbox cmd response data (336 bytes)
2,596,582 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,609,173 >>> mbox cmd response data (1536 bytes)
2,609,174 <<< Executing mbox cmd 0x46574c44 (75220 bytes) from SoC
4,534,714 >>> mbox cmd response: success
4,548,104 UART:
4,548,120 UART: Running Caliptra FMC ...
4,548,528 UART:
4,548,671 UART: [state] CFI Enabled
4,637,784 UART: [art] Extend RT PCRs Done
4,638,212 UART: [art] Lock RT PCRs Done
4,639,585 UART: [art] Populate DV Done
4,647,716 UART: [fht] FMC Alias Private Key: 7
4,648,856 UART: [art] Derive CDI
4,649,136 UART: [art] Store in in slot 0x4
4,734,599 UART: [art] Derive Key Pair
4,734,959 UART: [art] Store priv key in slot 0x5
4,747,913 UART: [art] Derive Key Pair - Done
4,762,566 UART: [art] Signing Cert with AUTHO
4,763,046 UART: RITY.KEYID = 7
4,778,122 UART: [art] Erasing AUTHORITY.KEYID = 7
4,778,887 UART: [art] PUB.X = C9B8AE33D4E27D49BE013A23CA7715B1A5FE29948ECBD194C18C7718433E49FD26ED2C101A9FDC6877833B8E4DB6971A
4,785,666 UART: [art] PUB.Y = F4801CC51ADAD49DA646656C73F9D7247CE20C41B654E7CC3DD67306DFC7FFCD2BE2D87FCF304C81CB4F87B75042F8B1
4,792,630 UART: [art] SIG.R = F9B3A322FE0B4D7EAF494E4E6391EEE6C5F584227887E5929C02128F3F623885BA59D31EEBF549F2D1433833F3EB222A
4,799,400 UART: [art] SIG.S = BC2A286EDFFC5225BE6FD39CC425F72779E39C849108C0C4F108CA0D23D376CA1E8BA22FE06E324585B56F2AED854043
4,822,139 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,823,312 UART: mock_rt_interact::rt_entry...FMC Tester
5,104,643 UART: [rt] Runtime listening for mailbox commands...
5,106,678 >>> mbox cmd response data (336 bytes)
5,106,679 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,119,270 >>> mbox cmd response data (1536 bytes)
5,119,271 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,119,288 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.73s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,402 UART: hii* TESTCASE PASSED
Initializing fuses
875 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,833 writing to cptra_bootfsm_go
3,130 UART: hii* TESTCASE PASSED
Initializing fuses
2,476 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
3,170 UART: hii* TESTCASE PASSED
Initializing fuses
873 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
3,195 UART: hii* TESTCASE PASSED
Initializing fuses
872 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,192 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,776 writing to cptra_bootfsm_go
3,185 UART: hii* TESTCASE PASSED
Initializing fuses
886 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,809 writing to cptra_bootfsm_go
3,116 UART: hii* TESTCASE PASSED
Initializing fuses
868 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,816 writing to cptra_bootfsm_go
3,230 UART: hii* TESTCASE PASSED
Initializing fuses
872 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,834 writing to cptra_bootfsm_go
3,133 UART: hii* TESTCASE PASSED
Initializing fuses
866 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,198 UART: hii* TESTCASE PASSED
Initializing fuses
886 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,611 writing to cptra_bootfsm_go
4,034 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,826 writing to cptra_bootfsm_go
3,126 UART: hii* TESTCASE PASSED
Initializing fuses
877 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,193 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,172 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
3,141 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,289 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
3,146 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,837 writing to cptra_bootfsm_go
3,238 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,799 writing to cptra_bootfsm_go
3,099 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
3,176 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
3,147 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,158 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
3,129 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,823 writing to cptra_bootfsm_go
3,231 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,345 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,207 >>> mbox cmd response data (14 bytes)
35,699 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,347 >>> mbox cmd response data (12 bytes)
36,653 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,997 >>> mbox cmd response data (7 bytes)
37,286 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,589 >>> mbox cmd response data (7 bytes)
37,870 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,211 >>> mbox cmd response data (0 bytes)
38,439 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,705 >>> mbox cmd response: success
38,884 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,217 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,363 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,235 >>> mbox cmd response data (14 bytes)
35,725 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,425 >>> mbox cmd response data (12 bytes)
36,732 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,079 >>> mbox cmd response data (7 bytes)
37,368 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,716 >>> mbox cmd response data (7 bytes)
37,993 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,339 >>> mbox cmd response data (0 bytes)
38,570 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,832 >>> mbox cmd response: success
39,031 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,372 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,605 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,425 >>> mbox cmd response data (14 bytes)
35,986 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,642 >>> mbox cmd response data (12 bytes)
36,965 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,328 >>> mbox cmd response data (7 bytes)
37,621 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,926 >>> mbox cmd response data (7 bytes)
38,246 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,604 >>> mbox cmd response data (0 bytes)
39,407 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,704 >>> mbox cmd response: success
39,909 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,260 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,497 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,314 >>> mbox cmd response data (14 bytes)
35,986 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,659 >>> mbox cmd response data (12 bytes)
36,987 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,347 >>> mbox cmd response data (7 bytes)
37,690 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,000 >>> mbox cmd response data (7 bytes)
38,307 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,658 >>> mbox cmd response data (0 bytes)
38,900 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,180 >>> mbox cmd response: success
39,383 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,739 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,274 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,138 >>> mbox cmd response data (14 bytes)
35,624 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,271 >>> mbox cmd response data (12 bytes)
36,675 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,032 >>> mbox cmd response data (7 bytes)
37,323 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,676 >>> mbox cmd response data (7 bytes)
37,956 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,319 >>> mbox cmd response data (0 bytes)
38,557 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,822 >>> mbox cmd response: success
39,000 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,338 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,673 writing to cptra_bootfsm_go
4,014 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,879 >>> mbox cmd response data (14 bytes)
36,371 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
37,071 >>> mbox cmd response data (12 bytes)
37,478 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,832 >>> mbox cmd response data (7 bytes)
38,121 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,420 >>> mbox cmd response data (7 bytes)
38,736 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
39,029 >>> mbox cmd response data (0 bytes)
39,265 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,532 >>> mbox cmd response: success
39,714 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,992 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
3,588 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,454 >>> mbox cmd response data (14 bytes)
36,130 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,845 >>> mbox cmd response data (12 bytes)
37,189 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,684 >>> mbox cmd response data (7 bytes)
38,011 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,324 >>> mbox cmd response data (7 bytes)
38,679 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
39,034 >>> mbox cmd response data (0 bytes)
39,276 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,556 >>> mbox cmd response: success
39,757 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,052 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,569 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,444 >>> mbox cmd response data (14 bytes)
36,044 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,724 >>> mbox cmd response data (12 bytes)
37,056 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,427 >>> mbox cmd response data (7 bytes)
37,729 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,045 >>> mbox cmd response data (7 bytes)
38,341 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,690 >>> mbox cmd response data (0 bytes)
38,937 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,215 >>> mbox cmd response: success
39,418 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,764 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,281 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,122 >>> mbox cmd response data (14 bytes)
35,684 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,397 >>> mbox cmd response data (12 bytes)
36,764 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,063 >>> mbox cmd response data (7 bytes)
37,349 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,644 >>> mbox cmd response data (7 bytes)
37,925 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,212 >>> mbox cmd response data (0 bytes)
38,443 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,744 >>> mbox cmd response: success
38,935 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,271 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,161 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,016 >>> mbox cmd response data (14 bytes)
35,513 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,157 >>> mbox cmd response data (12 bytes)
36,504 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,853 >>> mbox cmd response data (7 bytes)
37,138 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,505 >>> mbox cmd response data (7 bytes)
37,792 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,136 >>> mbox cmd response data (0 bytes)
38,368 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,628 >>> mbox cmd response: success
38,806 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,138 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,517 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,382 >>> mbox cmd response data (14 bytes)
35,979 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,641 >>> mbox cmd response data (12 bytes)
36,965 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,275 >>> mbox cmd response data (7 bytes)
37,589 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,947 >>> mbox cmd response data (7 bytes)
38,248 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,551 >>> mbox cmd response data (0 bytes)
38,800 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,072 >>> mbox cmd response: success
39,271 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,620 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,905 writing to cptra_bootfsm_go
4,244 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
36,108 >>> mbox cmd response data (14 bytes)
36,707 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
37,401 >>> mbox cmd response data (12 bytes)
37,734 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
38,097 >>> mbox cmd response data (7 bytes)
38,399 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,768 >>> mbox cmd response data (7 bytes)
39,070 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
39,428 >>> mbox cmd response data (0 bytes)
39,679 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,961 >>> mbox cmd response: success
40,172 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,517 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,336 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,873 >>> mbox cmd response: success
35,345 UART: |dcfeffff48692121| 37,278 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,787 >>> mbox cmd response: success
|dcfeffff48692121| 40,018 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,467 >>> mbox cmd response: success
|dcfeffff48692121| 42,641 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,074 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,447 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,943 >>> mbox cmd response: success
35,409 UART: |dcfeffff48692121| 37,351 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,863 >>> mbox cmd response: success
|dcfeffff48692121| 40,059 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,564 >>> mbox cmd response: success
|dcfeffff48692121| 42,795 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,229 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,490 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,993 >>> mbox cmd response: success
35,596 UART: |dcfeffff48692121| 37,559 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,150 >>> mbox cmd response: success
|dcfeffff48692121| 40,385 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,888 >>> mbox cmd response: success
|dcfeffff48692121| 43,162 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,730 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,558 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,076 >>> mbox cmd response: success
35,636 UART: |dcfeffff48692121| 37,652 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,224 >>> mbox cmd response: success
|dcfeffff48692121| 40,489 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,001 >>> mbox cmd response: success
|dcfeffff48692121| 43,250 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,746 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,284 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,796 >>> mbox cmd response: success
35,326 UART: |dcfeffff48692121| 37,265 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,781 >>> mbox cmd response: success
|dcfeffff48692121| 39,971 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,420 >>> mbox cmd response: success
|dcfeffff48692121| 42,598 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,039 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,308 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,851 >>> mbox cmd response: success
35,387 UART: |dcfeffff48692121| 37,312 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,832 >>> mbox cmd response: success
|dcfeffff48692121| 40,025 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,478 >>> mbox cmd response: success
|dcfeffff48692121| 42,707 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,147 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,437 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,975 >>> mbox cmd response: success
35,529 UART: |dcfeffff48692121| 37,525 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,046 >>> mbox cmd response: success
|dcfeffff48692121| 40,309 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,850 >>> mbox cmd response: success
|dcfeffff48692121| 43,121 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,593 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,647 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,145 >>> mbox cmd response: success
35,763 UART: |dcfeffff48692121| 37,712 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,288 >>> mbox cmd response: success
|dcfeffff48692121| 40,524 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,109 >>> mbox cmd response: success
|dcfeffff48692121| 43,355 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,882 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,382 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,906 >>> mbox cmd response: success
35,427 UART: |dcfeffff48692121| 37,311 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,823 >>> mbox cmd response: success
|dcfeffff48692121| 40,017 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,463 >>> mbox cmd response: success
|dcfeffff48692121| 42,691 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,160 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,369 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,885 >>> mbox cmd response: success
35,406 UART: |dcfeffff48692121| 37,285 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,798 >>> mbox cmd response: success
|dcfeffff48692121| 39,986 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,425 >>> mbox cmd response: success
|dcfeffff48692121| 42,671 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,174 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,550 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,084 >>> mbox cmd response: success
35,775 UART: |dcfeffff48692121| 37,797 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,376 >>> mbox cmd response: success
|dcfeffff48692121| 40,645 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,163 >>> mbox cmd response: success
|dcfeffff48692121| 43,477 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,994 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,618 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,172 >>> mbox cmd response: success
35,784 UART: |dcfeffff48692121| 37,760 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,318 >>> mbox cmd response: success
|dcfeffff48692121| 40,605 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,118 >>> mbox cmd response: success
|dcfeffff48692121| 43,425 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,937 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,746 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
3,172 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,439 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,203 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
3,107 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,170 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,730 writing to cptra_bootfsm_go
3,087 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,809 writing to cptra_bootfsm_go
3,109 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
3,148 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,197 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
3,132 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,212 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,183 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,209 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,593 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,290 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,682 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,751 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,098 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,347 writing to cptra_bootfsm_go
5,000 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
36,299 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,357 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,723 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,424 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,767 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,483 writing to cptra_bootfsm_go
3,897 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,248 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,544 writing to cptra_bootfsm_go
6,172 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,491 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,347 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,704 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,235 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,595 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,655 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,982 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,708 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,058 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,236 writing to cptra_bootfsm_go
4,702 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,251 >>> mbox cmd response: success
36,769 UART: |dcfeffff48692121| 38,693 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,212 >>> mbox cmd response: success
|dcfeffff48692121| 41,405 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,848 >>> mbox cmd response: success
|dcfeffff48692121| 44,085 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,529 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,432 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,939 >>> mbox cmd response: success
35,464 UART: |dcfeffff48692121| 37,387 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,897 >>> mbox cmd response: success
|dcfeffff48692121| 40,103 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,555 >>> mbox cmd response: success
|dcfeffff48692121| 42,785 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,225 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,914 writing to cptra_bootfsm_go
4,258 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,774 >>> mbox cmd response: success
36,405 UART: |dcfeffff48692121| 38,381 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,981 >>> mbox cmd response: success
|dcfeffff48692121| 41,198 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,716 >>> mbox cmd response: success
|dcfeffff48692121| 44,018 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,532 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,001 writing to cptra_bootfsm_go
4,361 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,855 >>> mbox cmd response: success
36,509 UART: |dcfeffff48692121| 38,474 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,081 >>> mbox cmd response: success
|dcfeffff48692121| 41,312 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,830 >>> mbox cmd response: success
|dcfeffff48692121| 44,092 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,620 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,225 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,735 >>> mbox cmd response: success
35,215 UART: |dcfeffff48692121| 37,144 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,299 >>> mbox cmd response: success
|dcfeffff48692121| 41,671 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,202 >>> mbox cmd response: success
|dcfeffff48692121| 44,450 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,894 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,332 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,839 >>> mbox cmd response: success
35,368 UART: |dcfeffff48692121| 37,241 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,750 >>> mbox cmd response: success
|dcfeffff48692121| 39,942 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,442 >>> mbox cmd response: success
|dcfeffff48692121| 42,672 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,130 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,546 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,089 >>> mbox cmd response: success
37,599 UART: |dcfeffff48692121| 39,587 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
41,646 >>> mbox cmd response: success
|dcfeffff48692121| 45,284 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,924 >>> mbox cmd response: success
|dcfeffff48692121| 48,197 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
48,664 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,552 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,093 >>> mbox cmd response: success
35,762 UART: |dcfeffff48692121| 37,758 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,375 >>> mbox cmd response: success
|dcfeffff48692121| 40,601 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,116 >>> mbox cmd response: success
|dcfeffff48692121| 43,365 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,856 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,374 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,887 >>> mbox cmd response: success
35,355 UART: |dcfeffff48692121| 37,283 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,792 >>> mbox cmd response: success
|dcfeffff48692121| 40,029 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,481 >>> mbox cmd response: success
|dcfeffff48692121| 42,711 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,149 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
3,150 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,661 >>> mbox cmd response: success
35,198 UART: |dcfeffff48692121| 37,079 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,599 >>> mbox cmd response: success
|dcfeffff48692121| 39,791 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,240 >>> mbox cmd response: success
|dcfeffff48692121| 42,489 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,932 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,688 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,164 >>> mbox cmd response: success
35,781 UART: |dcfeffff48692121| 40,288 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
40,940 >>> mbox cmd response: success
|dcfeffff48692121| 43,187 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,671 >>> mbox cmd response: success
|dcfeffff48692121| 45,916 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
46,406 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,617 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,130 >>> mbox cmd response: success
35,742 UART: |dcfeffff48692121| 37,683 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,311 >>> mbox cmd response: success
|dcfeffff48692121| 40,563 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,082 >>> mbox cmd response: success
|dcfeffff48692121| 43,373 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,898 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,899 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,181 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.08s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.14s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.01s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
1,302,002 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,594 writing to cptra_bootfsm_go
1,305,813 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
1,302,407 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
1,302,340 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
1,302,078 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
1,302,070 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
1,302,311 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
1,302,413 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
1,302,040 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
1,302,046 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
1,302,622 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
1,302,222 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0a03bb58630c12c503cc2e773a3a6ce75c67399038de35b357f5a294f4aa29318a9d411dea1185e402755b3d1912e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,823 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,093 UART:
192,467 UART: Running Caliptra ROM ...
193,664 UART:
193,819 UART: [state] CFI Enabled
263,577 UART: [state] LifecycleState = Unprovisioned
265,939 UART: [state] DebugLocked = No
268,083 UART: [state] WD Timer not started. Device not locked for debugging
272,692 UART: [kat] SHA2-256
454,603 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,115 UART: [kat] ++
466,648 UART: [kat] sha1
477,691 UART: [kat] SHA2-256
480,706 UART: [kat] SHA2-384
487,006 UART: [kat] SHA2-512-ACC
489,626 UART: [kat] ECC-384
3,774,211 UART: [kat] HMAC-384Kdf
3,803,523 UART: [kat] LMS
4,876,673 UART: [kat] --
4,880,205 UART: [cold-reset] ++
4,881,722 UART: [fht] FHT @ 0x50003400
4,893,037 UART: [idev] ++
4,893,716 UART: [idev] CDI.KEYID = 6
4,894,953 UART: [idev] SUBJECT.KEYID = 7
4,896,113 UART: [idev] UDS.KEYID = 0
4,930,860 UART: [idev] Erasing UDS.KEYID = 0
8,244,555 UART: [idev] Sha1 KeyId Algorithm
8,266,241 UART: [idev] --
8,269,583 UART: [ldev] ++
8,270,148 UART: [ldev] CDI.KEYID = 6
8,271,382 UART: [ldev] SUBJECT.KEYID = 5
8,272,482 UART: [ldev] AUTHORITY.KEYID = 7
8,273,714 UART: [ldev] FE.KEYID = 1
8,319,960 UART: [ldev] Erasing FE.KEYID = 1
11,651,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,993,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,014,997 UART: [ldev] --
14,019,560 UART: [fwproc] Wait for Commands...
14,021,710 UART: [fwproc] Recv command 0x43415053
14,024,757 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,702 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,856,040 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
4,041 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,256 UART:
192,618 UART: Running Caliptra ROM ...
193,730 UART:
603,557 UART: [state] CFI Enabled
619,714 UART: [state] LifecycleState = Unprovisioned
622,050 UART: [state] DebugLocked = No
624,641 UART: [state] WD Timer not started. Device not locked for debugging
629,812 UART: [kat] SHA2-256
811,802 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,357 UART: [kat] ++
823,935 UART: [kat] sha1
833,410 UART: [kat] SHA2-256
836,468 UART: [kat] SHA2-384
842,125 UART: [kat] SHA2-512-ACC
844,730 UART: [kat] ECC-384
4,103,357 UART: [kat] HMAC-384Kdf
4,116,524 UART: [kat] LMS
5,189,675 UART: [kat] --
5,194,318 UART: [cold-reset] ++
5,196,961 UART: [fht] FHT @ 0x50003400
5,208,638 UART: [idev] ++
5,209,304 UART: [idev] CDI.KEYID = 6
5,210,528 UART: [idev] SUBJECT.KEYID = 7
5,211,947 UART: [idev] UDS.KEYID = 0
5,227,156 UART: [idev] Erasing UDS.KEYID = 0
8,502,887 UART: [idev] Sha1 KeyId Algorithm
8,524,750 UART: [idev] --
8,528,966 UART: [ldev] ++
8,529,538 UART: [ldev] CDI.KEYID = 6
8,530,795 UART: [ldev] SUBJECT.KEYID = 5
8,532,147 UART: [ldev] AUTHORITY.KEYID = 7
8,533,688 UART: [ldev] FE.KEYID = 1
8,543,167 UART: [ldev] Erasing FE.KEYID = 1
11,833,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,839 UART: [ldev] --
14,200,235 UART: [fwproc] Wait for Commands...
14,202,538 UART: [fwproc] Recv command 0x43415053
14,205,606 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,297 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,013,046 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,889 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,161 UART:
192,524 UART: Running Caliptra ROM ...
193,728 UART:
193,884 UART: [state] CFI Enabled
267,014 UART: [state] LifecycleState = Unprovisioned
268,881 UART: [state] DebugLocked = No
270,427 UART: [state] WD Timer not started. Device not locked for debugging
273,707 UART: [kat] SHA2-256
452,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,406 UART: [kat] ++
464,949 UART: [kat] sha1
474,968 UART: [kat] SHA2-256
478,029 UART: [kat] SHA2-384
485,195 UART: [kat] SHA2-512-ACC
488,125 UART: [kat] ECC-384
2,950,213 UART: [kat] HMAC-384Kdf
2,974,750 UART: [kat] LMS
3,504,227 UART: [kat] --
3,510,709 UART: [cold-reset] ++
3,511,991 UART: [fht] FHT @ 0x50003400
3,523,077 UART: [idev] ++
3,523,642 UART: [idev] CDI.KEYID = 6
3,524,557 UART: [idev] SUBJECT.KEYID = 7
3,525,714 UART: [idev] UDS.KEYID = 0
3,545,421 UART: [idev] Erasing UDS.KEYID = 0
6,028,436 UART: [idev] Sha1 KeyId Algorithm
6,051,846 UART: [idev] --
6,056,604 UART: [ldev] ++
6,057,175 UART: [ldev] CDI.KEYID = 6
6,058,085 UART: [ldev] SUBJECT.KEYID = 5
6,059,317 UART: [ldev] AUTHORITY.KEYID = 7
6,060,524 UART: [ldev] FE.KEYID = 1
6,103,494 UART: [ldev] Erasing FE.KEYID = 1
8,605,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,731 UART: [ldev] --
10,416,191 UART: [fwproc] Wait for Commands...
10,418,514 UART: [fwproc] Recv command 0x43415053
10,421,319 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,779 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,182,933 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
4,275 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,471 UART:
192,843 UART: Running Caliptra ROM ...
193,956 UART:
603,607 UART: [state] CFI Enabled
619,853 UART: [state] LifecycleState = Unprovisioned
621,712 UART: [state] DebugLocked = No
623,584 UART: [state] WD Timer not started. Device not locked for debugging
627,297 UART: [kat] SHA2-256
806,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,987 UART: [kat] ++
818,516 UART: [kat] sha1
828,322 UART: [kat] SHA2-256
831,388 UART: [kat] SHA2-384
836,874 UART: [kat] SHA2-512-ACC
839,800 UART: [kat] ECC-384
3,277,649 UART: [kat] HMAC-384Kdf
3,290,218 UART: [kat] LMS
3,819,701 UART: [kat] --
3,824,442 UART: [cold-reset] ++
3,825,394 UART: [fht] FHT @ 0x50003400
3,837,426 UART: [idev] ++
3,837,985 UART: [idev] CDI.KEYID = 6
3,838,864 UART: [idev] SUBJECT.KEYID = 7
3,840,077 UART: [idev] UDS.KEYID = 0
3,856,963 UART: [idev] Erasing UDS.KEYID = 0
6,311,106 UART: [idev] Sha1 KeyId Algorithm
6,333,801 UART: [idev] --
6,339,149 UART: [ldev] ++
6,339,714 UART: [ldev] CDI.KEYID = 6
6,340,618 UART: [ldev] SUBJECT.KEYID = 5
6,341,829 UART: [ldev] AUTHORITY.KEYID = 7
6,343,059 UART: [ldev] FE.KEYID = 1
6,353,761 UART: [ldev] Erasing FE.KEYID = 1
8,829,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,936 UART: [ldev] --
10,622,214 UART: [fwproc] Wait for Commands...
10,624,828 UART: [fwproc] Recv command 0x43415053
10,627,637 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,129 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,406,283 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,817 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,068 UART:
192,475 UART: Running Caliptra ROM ...
193,687 UART:
193,842 UART: [state] CFI Enabled
263,292 UART: [state] LifecycleState = Unprovisioned
265,170 UART: [state] DebugLocked = No
266,612 UART: [state] WD Timer not started. Device not locked for debugging
270,396 UART: [kat] SHA2-256
449,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,091 UART: [kat] ++
461,545 UART: [kat] sha1
472,097 UART: [kat] SHA2-256
475,117 UART: [kat] SHA2-384
481,746 UART: [kat] SHA2-512-ACC
484,731 UART: [kat] ECC-384
2,948,929 UART: [kat] HMAC-384Kdf
2,971,504 UART: [kat] LMS
3,500,975 UART: [kat] --
3,507,066 UART: [cold-reset] ++
3,508,140 UART: [fht] FHT @ 0x50003400
3,518,038 UART: [idev] ++
3,518,605 UART: [idev] CDI.KEYID = 6
3,519,577 UART: [idev] SUBJECT.KEYID = 7
3,520,736 UART: [idev] UDS.KEYID = 0
3,544,334 UART: [idev] Erasing UDS.KEYID = 0
6,027,512 UART: [idev] Sha1 KeyId Algorithm
6,050,898 UART: [idev] --
6,055,245 UART: [ldev] ++
6,055,825 UART: [ldev] CDI.KEYID = 6
6,056,733 UART: [ldev] SUBJECT.KEYID = 5
6,057,894 UART: [ldev] AUTHORITY.KEYID = 7
6,059,184 UART: [ldev] FE.KEYID = 1
6,099,123 UART: [ldev] Erasing FE.KEYID = 1
8,601,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,854 UART: [ldev] --
10,413,262 UART: [fwproc] Wait for Commands...
10,416,388 UART: [fwproc] Recv command 0x43415053
10,419,144 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
4,026 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,193,611 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
4,216 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,436 UART:
192,799 UART: Running Caliptra ROM ...
194,019 UART:
603,437 UART: [state] CFI Enabled
612,738 UART: [state] LifecycleState = Unprovisioned
614,643 UART: [state] DebugLocked = No
616,457 UART: [state] WD Timer not started. Device not locked for debugging
619,600 UART: [kat] SHA2-256
798,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,291 UART: [kat] ++
810,823 UART: [kat] sha1
822,351 UART: [kat] SHA2-256
825,403 UART: [kat] SHA2-384
831,638 UART: [kat] SHA2-512-ACC
834,565 UART: [kat] ECC-384
3,274,334 UART: [kat] HMAC-384Kdf
3,287,062 UART: [kat] LMS
3,816,591 UART: [kat] --
3,819,864 UART: [cold-reset] ++
3,821,466 UART: [fht] FHT @ 0x50003400
3,831,739 UART: [idev] ++
3,832,307 UART: [idev] CDI.KEYID = 6
3,833,230 UART: [idev] SUBJECT.KEYID = 7
3,834,463 UART: [idev] UDS.KEYID = 0
3,847,689 UART: [idev] Erasing UDS.KEYID = 0
6,303,259 UART: [idev] Sha1 KeyId Algorithm
6,326,215 UART: [idev] --
6,329,449 UART: [ldev] ++
6,330,010 UART: [ldev] CDI.KEYID = 6
6,330,953 UART: [ldev] SUBJECT.KEYID = 5
6,332,160 UART: [ldev] AUTHORITY.KEYID = 7
6,333,387 UART: [ldev] FE.KEYID = 1
6,342,579 UART: [ldev] Erasing FE.KEYID = 1
8,816,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,535,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,551,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,567,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,582,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,603,543 UART: [ldev] --
10,607,532 UART: [fwproc] Wait for Commands...
10,609,961 UART: [fwproc] Recv command 0x43415053
10,612,734 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
4,500 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,411,407 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
915,664 UART: [kat] HMAC-384Kdf
920,248 UART: [kat] LMS
1,168,560 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,883 UART: [idev] ++
1,173,051 UART: [idev] CDI.KEYID = 6
1,173,412 UART: [idev] SUBJECT.KEYID = 7
1,173,837 UART: [idev] UDS.KEYID = 0
1,182,289 UART: [idev] Erasing UDS.KEYID = 0
1,199,359 UART: [idev] Sha1 KeyId Algorithm
1,208,449 UART: [idev] --
1,209,478 UART: [ldev] ++
1,209,646 UART: [ldev] CDI.KEYID = 6
1,210,010 UART: [ldev] SUBJECT.KEYID = 5
1,210,437 UART: [ldev] AUTHORITY.KEYID = 7
1,210,900 UART: [ldev] FE.KEYID = 1
1,216,036 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,564 UART: [ldev] --
1,280,952 UART: [fwproc] Wait for Commands...
1,281,549 UART: [fwproc] Recv command 0x43415053
1,282,544 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,135,525 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
891,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,966 UART: [kat] ++
896,118 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
904,923 UART: [kat] SHA2-512-ACC
906,824 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
921,131 UART: [kat] LMS
1,169,443 UART: [kat] --
1,170,126 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,168 UART: [idev] ++
1,173,336 UART: [idev] CDI.KEYID = 6
1,173,697 UART: [idev] SUBJECT.KEYID = 7
1,174,122 UART: [idev] UDS.KEYID = 0
1,181,878 UART: [idev] Erasing UDS.KEYID = 0
1,198,730 UART: [idev] Sha1 KeyId Algorithm
1,207,468 UART: [idev] --
1,208,383 UART: [ldev] ++
1,208,551 UART: [ldev] CDI.KEYID = 6
1,208,915 UART: [ldev] SUBJECT.KEYID = 5
1,209,342 UART: [ldev] AUTHORITY.KEYID = 7
1,209,805 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,591 UART: [ldev] --
1,281,055 UART: [fwproc] Wait for Commands...
1,281,674 UART: [fwproc] Recv command 0x43415053
1,282,669 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,494 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,514 UART: [kat] LMS
1,168,826 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,198,057 UART: [idev] Sha1 KeyId Algorithm
1,206,859 UART: [idev] --
1,207,940 UART: [ldev] ++
1,208,108 UART: [ldev] CDI.KEYID = 6
1,208,472 UART: [ldev] SUBJECT.KEYID = 5
1,208,899 UART: [ldev] AUTHORITY.KEYID = 7
1,209,362 UART: [ldev] FE.KEYID = 1
1,214,644 UART: [ldev] Erasing FE.KEYID = 1
1,240,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,530 UART: [ldev] --
1,279,896 UART: [fwproc] Wait for Commands...
1,280,589 UART: [fwproc] Recv command 0x43415053
1,281,584 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,073 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,193 UART: [kat] LMS
1,169,505 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,372 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,241,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,369 UART: [fwproc] Wait for Commands...
1,282,044 UART: [fwproc] Recv command 0x43415053
1,283,039 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,968 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
88,046 UART: [kat] SHA2-256
891,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
905,006 UART: [kat] SHA2-512-ACC
906,907 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
920,914 UART: [kat] LMS
1,169,226 UART: [kat] --
1,170,161 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,243 UART: [idev] ++
1,173,411 UART: [idev] CDI.KEYID = 6
1,173,772 UART: [idev] SUBJECT.KEYID = 7
1,174,197 UART: [idev] UDS.KEYID = 0
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,299 UART: [idev] Sha1 KeyId Algorithm
1,208,309 UART: [idev] --
1,209,402 UART: [ldev] ++
1,209,570 UART: [ldev] CDI.KEYID = 6
1,209,934 UART: [ldev] SUBJECT.KEYID = 5
1,210,361 UART: [ldev] AUTHORITY.KEYID = 7
1,210,824 UART: [ldev] FE.KEYID = 1
1,216,104 UART: [ldev] Erasing FE.KEYID = 1
1,242,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,456 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,527 UART: [fwproc] Recv command 0x43415053
1,283,522 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,136,135 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
891,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,900 UART: [kat] ++
896,052 UART: [kat] sha1
900,414 UART: [kat] SHA2-256
902,354 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,682 UART: [idev] ++
1,173,850 UART: [idev] CDI.KEYID = 6
1,174,211 UART: [idev] SUBJECT.KEYID = 7
1,174,636 UART: [idev] UDS.KEYID = 0
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,583 UART: [ldev] ++
1,209,751 UART: [ldev] CDI.KEYID = 6
1,210,115 UART: [ldev] SUBJECT.KEYID = 5
1,210,542 UART: [ldev] AUTHORITY.KEYID = 7
1,211,005 UART: [ldev] FE.KEYID = 1
1,215,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,434 UART: [fwproc] Recv command 0x43415053
1,283,429 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,137,970 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.13s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.14s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.15s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
192,086 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,788 UART: ROM Fatal Error: 0x01050002test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "48194c94cd849d39d5c3d8ede3242cf0c51d4132b338581001ef9bf656ca6776bda1adf0a091eed1ac9a06d487d232b5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,391 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
198,081 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "91a215c9b28537a78cbd90807565ae92940b50b39aa6d9d255dd1c9728eaa8ebb58d1479c6e938faf4f49b6778dfb04b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,235 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,706 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,392 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,849 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,129 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,621 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "18f4c6df5850ffa2e9e2a9047a6e9e3815c7a116eb8c9d347ea83e46a70292172ac8cf4a9fb02549f0b2d1258dde9163",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,543 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,968 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "627e78fcdae9d388a231fc00e51f6b291f67b0c497f6075ac44b08d3823b5ddabd1434cdaf88f1e685597096dc2c483b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3a58aa4353a31c3be00fd3702186ce4540e1e6114d5a036ee1302cfa3c5d35fa4341d3de753787812419f9ce64800601",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "03df43957f9e46d464296ca5eed08630222d93fdec5446a31e5118443e6c5c33511e04a58ff9c858024c4f7f1d010902",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3a58aa4353a31c3be00fd3702186ce4540e1e6114d5a036ee1302cfa3c5d35fa4341d3de753787812419f9ce64800601",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "03df43957f9e46d464296ca5eed08630222d93fdec5446a31e5118443e6c5c33511e04a58ff9c858024c4f7f1d010902",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3a58aa4353a31c3be00fd3702186ce4540e1e6114d5a036ee1302cfa3c5d35fa4341d3de753787812419f9ce64800601",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "03df43957f9e46d464296ca5eed08630222d93fdec5446a31e5118443e6c5c33511e04a58ff9c858024c4f7f1d010902",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3a58aa4353a31c3be00fd3702186ce4540e1e6114d5a036ee1302cfa3c5d35fa4341d3de753787812419f9ce64800601",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "03df43957f9e46d464296ca5eed08630222d93fdec5446a31e5118443e6c5c33511e04a58ff9c858024c4f7f1d010902",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3a58aa4353a31c3be00fd3702186ce4540e1e6114d5a036ee1302cfa3c5d35fa4341d3de753787812419f9ce64800601",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "03df43957f9e46d464296ca5eed08630222d93fdec5446a31e5118443e6c5c33511e04a58ff9c858024c4f7f1d010902",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3a58aa4353a31c3be00fd3702186ce4540e1e6114d5a036ee1302cfa3c5d35fa4341d3de753787812419f9ce64800601",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "03df43957f9e46d464296ca5eed08630222d93fdec5446a31e5118443e6c5c33511e04a58ff9c858024c4f7f1d010902",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,276 UART:
192,637 UART: Running Caliptra ROM ...
193,726 UART:
193,867 UART: [state] CFI Enabled
208,940 UART: [state] LifecycleState = Unprovisioned
211,295 UART: [state] DebugLocked = No
213,307 UART: [state] WD Timer not started. Device not locked for debugging
218,757 UART: [kat] SHA2-256
400,689 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,217 UART: [kat] ++
412,737 UART: [kat] sha1
423,200 UART: [kat] SHA2-256
426,243 UART: [kat] SHA2-384
432,876 UART: [kat] SHA2-512-ACC
435,459 UART: [kat] ECC-384
3,690,612 UART: [kat] HMAC-384Kdf
3,702,161 UART: [kat] LMS
4,775,348 UART: [kat] --
4,781,181 UART: [cold-reset] ++
4,782,891 UART: [fht] FHT @ 0x50003400
4,793,797 UART: [idev] ++
4,794,509 UART: [idev] CDI.KEYID = 6
4,795,680 UART: [idev] SUBJECT.KEYID = 7
4,797,140 UART: [idev] UDS.KEYID = 0
4,798,324 ready_for_fw is high
4,798,506 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
4,932,537 UART: [idev] Erasing UDS.KEYID = 0
8,088,354 UART: [idev] Sha1 KeyId Algorithm
8,110,334 UART: [idev] --
8,113,977 UART: [ldev] ++
8,114,554 UART: [ldev] CDI.KEYID = 6
8,115,728 UART: [ldev] SUBJECT.KEYID = 5
8,116,941 UART: [ldev] AUTHORITY.KEYID = 7
8,118,168 UART: [ldev] FE.KEYID = 1
8,130,671 UART: [ldev] Erasing FE.KEYID = 1
11,422,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,733,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,785,135 UART: [ldev] --
13,789,729 UART: [fwproc] Wait for Commands...
13,792,477 UART: [fwproc] Recv command 0x46574c44
13,794,726 UART: [fwproc] Recv'd Img size: 106340 bytes
17,770,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,851,040 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,893,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,209,898 >>> mbox cmd response: success
18,213,158 UART: [afmc] ++
18,213,766 UART: [afmc] CDI.KEYID = 6
18,214,877 UART: [afmc] SUBJECT.KEYID = 7
18,216,096 UART: [afmc] AUTHORITY.KEYID = 5
21,533,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,829,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,831,486 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,847,521 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,863,582 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,879,667 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,902,106 UART: [afmc] --
23,905,079 UART: [cold-reset] --
23,909,767 UART: [state] Locking Datavault
23,915,889 UART: [state] Locking PCR0, PCR1 and PCR31
23,917,543 UART: [state] Locking ICCM
23,919,644 UART: [exit] Launching FMC @ 0x40000000
23,928,243 UART:
23,928,483 UART: Running Caliptra FMC ...
23,929,627 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
4,693,516 ready_for_fw is high
4,693,981 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,014,022 >>> mbox cmd response: success
23,652,779 UART:
23,653,198 UART: Running Caliptra FMC ...
23,654,422 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,337 UART:
192,706 UART: Running Caliptra ROM ...
193,798 UART:
193,933 UART: [state] CFI Enabled
209,001 UART: [state] LifecycleState = Unprovisioned
211,365 UART: [state] DebugLocked = No
213,464 UART: [state] WD Timer not started. Device not locked for debugging
218,893 UART: [kat] SHA2-256
400,819 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
412,328 UART: [kat] ++
412,945 UART: [kat] sha1
423,326 UART: [kat] SHA2-256
426,327 UART: [kat] SHA2-384
432,949 UART: [kat] SHA2-512-ACC
435,594 UART: [kat] ECC-384
3,690,677 UART: [kat] HMAC-384Kdf
3,702,296 UART: [kat] LMS
4,775,481 UART: [kat] --
4,781,329 UART: [cold-reset] ++
4,783,041 UART: [fht] FHT @ 0x50003400
4,793,924 UART: [idev] ++
4,794,626 UART: [idev] CDI.KEYID = 6
4,795,811 UART: [idev] SUBJECT.KEYID = 7
4,797,268 UART: [idev] UDS.KEYID = 0
4,798,526 ready_for_fw is high
4,798,716 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
4,932,201 UART: [idev] Erasing UDS.KEYID = 0
8,088,463 UART: [idev] Sha1 KeyId Algorithm
8,110,458 UART: [idev] --
8,114,071 UART: [ldev] ++
8,114,639 UART: [ldev] CDI.KEYID = 6
8,115,864 UART: [ldev] SUBJECT.KEYID = 5
8,117,014 UART: [ldev] AUTHORITY.KEYID = 7
8,118,237 UART: [ldev] FE.KEYID = 1
8,130,824 UART: [ldev] Erasing FE.KEYID = 1
11,422,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,716,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,732,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,748,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,764,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,785,265 UART: [ldev] --
13,789,818 UART: [fwproc] Wait for Commands...
13,792,571 UART: [fwproc] Recv command 0x46574c44
13,794,875 UART: [fwproc] Recv'd Img size: 106340 bytes
17,770,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,851,165 UART: [fwproc] Load FMC at address 0x40000000 len 11316
17,893,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,210,024 >>> mbox cmd response: success
18,213,283 UART: [afmc] ++
18,213,895 UART: [afmc] CDI.KEYID = 6
18,215,082 UART: [afmc] SUBJECT.KEYID = 7
18,216,182 UART: [afmc] AUTHORITY.KEYID = 5
21,533,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,829,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,831,630 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
23,847,627 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
23,863,711 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
23,879,798 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
23,902,256 UART: [afmc] --
23,905,177 UART: [cold-reset] --
23,909,891 UART: [state] Locking Datavault
23,915,969 UART: [state] Locking PCR0, PCR1 and PCR31
23,917,682 UART: [state] Locking ICCM
23,919,789 UART: [exit] Launching FMC @ 0x40000000
23,928,429 UART:
23,928,674 UART: Running Caliptra FMC ...
23,929,814 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
4,694,000 ready_for_fw is high
4,694,480 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,014,510 >>> mbox cmd response: success
23,653,263 UART:
23,653,690 UART: Running Caliptra FMC ...
23,654,971 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,486 UART:
192,863 UART: Running Caliptra ROM ...
194,300 UART:
194,492 UART: [state] CFI Enabled
209,014 UART: [state] LifecycleState = Unprovisioned
210,825 UART: [state] DebugLocked = No
212,918 UART: [state] WD Timer not started. Device not locked for debugging
217,446 UART: [kat] SHA2-256
396,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,174 UART: [kat] ++
408,733 UART: [kat] sha1
419,685 UART: [kat] SHA2-256
422,694 UART: [kat] SHA2-384
429,676 UART: [kat] SHA2-512-ACC
432,614 UART: [kat] ECC-384
2,874,104 UART: [kat] HMAC-384Kdf
2,886,276 UART: [kat] LMS
3,415,665 UART: [kat] --
3,421,360 UART: [cold-reset] ++
3,422,870 UART: [fht] FHT @ 0x50003400
3,433,425 UART: [idev] ++
3,433,990 UART: [idev] CDI.KEYID = 6
3,434,970 UART: [idev] SUBJECT.KEYID = 7
3,436,143 UART: [idev] UDS.KEYID = 0
3,437,064 ready_for_fw is high
3,437,264 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,571,323 UART: [idev] Erasing UDS.KEYID = 0
5,910,375 UART: [idev] Sha1 KeyId Algorithm
5,933,323 UART: [idev] --
5,936,931 UART: [ldev] ++
5,937,498 UART: [ldev] CDI.KEYID = 6
5,938,407 UART: [ldev] SUBJECT.KEYID = 5
5,939,617 UART: [ldev] AUTHORITY.KEYID = 7
5,940,845 UART: [ldev] FE.KEYID = 1
5,953,107 UART: [ldev] Erasing FE.KEYID = 1
8,427,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,863 UART: [ldev] --
10,219,467 UART: [fwproc] Wait for Commands...
10,222,239 UART: [fwproc] Recv command 0x46574c44
10,224,282 UART: [fwproc] Recv'd Img size: 106684 bytes
13,532,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,610,621 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,653,229 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
13,970,904 >>> mbox cmd response: success
13,974,348 UART: [afmc] ++
13,974,956 UART: [afmc] CDI.KEYID = 6
13,975,839 UART: [afmc] SUBJECT.KEYID = 7
13,976,937 UART: [afmc] AUTHORITY.KEYID = 5
16,476,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,198,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,200,462 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,216,450 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,232,368 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,248,290 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,270,747 UART: [afmc] --
18,273,893 UART: [cold-reset] --
18,278,323 UART: [state] Locking Datavault
18,283,991 UART: [state] Locking PCR0, PCR1 and PCR31
18,285,681 UART: [state] Locking ICCM
18,287,537 UART: [exit] Launching FMC @ 0x40000000
18,295,914 UART:
18,296,162 UART: Running Caliptra FMC ...
18,297,306 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,288,438 ready_for_fw is high
3,288,840 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,750,796 >>> mbox cmd response: success
18,000,774 UART:
18,001,180 UART: Running Caliptra FMC ...
18,002,391 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,477 UART:
192,841 UART: Running Caliptra ROM ...
194,028 UART:
194,189 UART: [state] CFI Enabled
208,983 UART: [state] LifecycleState = Unprovisioned
210,845 UART: [state] DebugLocked = No
212,939 UART: [state] WD Timer not started. Device not locked for debugging
217,458 UART: [kat] SHA2-256
396,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,164 UART: [kat] ++
408,698 UART: [kat] sha1
419,718 UART: [kat] SHA2-256
422,727 UART: [kat] SHA2-384
429,655 UART: [kat] SHA2-512-ACC
432,588 UART: [kat] ECC-384
2,874,102 UART: [kat] HMAC-384Kdf
2,886,270 UART: [kat] LMS
3,415,676 UART: [kat] --
3,421,395 UART: [cold-reset] ++
3,422,861 UART: [fht] FHT @ 0x50003400
3,433,415 UART: [idev] ++
3,433,975 UART: [idev] CDI.KEYID = 6
3,434,929 UART: [idev] SUBJECT.KEYID = 7
3,436,101 UART: [idev] UDS.KEYID = 0
3,437,073 ready_for_fw is high
3,437,274 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,571,140 UART: [idev] Erasing UDS.KEYID = 0
5,910,374 UART: [idev] Sha1 KeyId Algorithm
5,933,376 UART: [idev] --
5,936,956 UART: [ldev] ++
5,937,523 UART: [ldev] CDI.KEYID = 6
5,938,411 UART: [ldev] SUBJECT.KEYID = 5
5,939,617 UART: [ldev] AUTHORITY.KEYID = 7
5,940,844 UART: [ldev] FE.KEYID = 1
5,953,113 UART: [ldev] Erasing FE.KEYID = 1
8,427,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,885 UART: [ldev] --
10,219,449 UART: [fwproc] Wait for Commands...
10,222,231 UART: [fwproc] Recv command 0x46574c44
10,224,330 UART: [fwproc] Recv'd Img size: 106684 bytes
13,532,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,610,677 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,653,295 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
13,970,939 >>> mbox cmd response: success
13,974,359 UART: [afmc] ++
13,974,967 UART: [afmc] CDI.KEYID = 6
13,975,878 UART: [afmc] SUBJECT.KEYID = 7
13,977,038 UART: [afmc] AUTHORITY.KEYID = 5
16,476,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,198,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,200,487 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,216,475 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,232,394 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,248,330 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,270,765 UART: [afmc] --
18,273,972 UART: [cold-reset] --
18,278,399 UART: [state] Locking Datavault
18,284,066 UART: [state] Locking PCR0, PCR1 and PCR31
18,285,757 UART: [state] Locking ICCM
18,287,564 UART: [exit] Launching FMC @ 0x40000000
18,295,959 UART:
18,296,203 UART: Running Caliptra FMC ...
18,297,341 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,288,857 ready_for_fw is high
3,289,235 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,751,225 >>> mbox cmd response: success
18,001,212 UART:
18,001,648 UART: Running Caliptra FMC ...
18,002,843 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,068 UART:
192,450 UART: Running Caliptra ROM ...
193,635 UART:
193,788 UART: [state] CFI Enabled
208,570 UART: [state] LifecycleState = Unprovisioned
210,440 UART: [state] DebugLocked = No
212,461 UART: [state] WD Timer not started. Device not locked for debugging
217,053 UART: [kat] SHA2-256
396,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
407,721 UART: [kat] ++
408,255 UART: [kat] sha1
419,241 UART: [kat] SHA2-256
422,299 UART: [kat] SHA2-384
429,224 UART: [kat] SHA2-512-ACC
432,161 UART: [kat] ECC-384
2,873,616 UART: [kat] HMAC-384Kdf
2,885,804 UART: [kat] LMS
3,415,256 UART: [kat] --
3,420,962 UART: [cold-reset] ++
3,422,468 UART: [fht] FHT @ 0x50003400
3,433,023 UART: [idev] ++
3,433,666 UART: [idev] CDI.KEYID = 6
3,434,579 UART: [idev] SUBJECT.KEYID = 7
3,435,634 UART: [idev] UDS.KEYID = 0
3,436,696 ready_for_fw is high
3,436,925 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,571,089 UART: [idev] Erasing UDS.KEYID = 0
5,909,939 UART: [idev] Sha1 KeyId Algorithm
5,932,908 UART: [idev] --
5,936,501 UART: [ldev] ++
5,937,086 UART: [ldev] CDI.KEYID = 6
5,938,025 UART: [ldev] SUBJECT.KEYID = 5
5,939,140 UART: [ldev] AUTHORITY.KEYID = 7
5,940,425 UART: [ldev] FE.KEYID = 1
5,952,635 UART: [ldev] Erasing FE.KEYID = 1
8,426,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,162,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,422 UART: [ldev] --
10,219,039 UART: [fwproc] Wait for Commands...
10,221,789 UART: [fwproc] Recv command 0x46574c44
10,223,881 UART: [fwproc] Recv'd Img size: 106684 bytes
13,531,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,610,212 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,652,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
13,970,459 >>> mbox cmd response: success
13,973,922 UART: [afmc] ++
13,974,540 UART: [afmc] CDI.KEYID = 6
13,975,456 UART: [afmc] SUBJECT.KEYID = 7
13,976,563 UART: [afmc] AUTHORITY.KEYID = 5
16,476,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,198,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,200,010 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,216,020 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,231,905 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,247,866 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,270,308 UART: [afmc] --
18,273,473 UART: [cold-reset] --
18,277,911 UART: [state] Locking Datavault
18,283,597 UART: [state] Locking PCR0, PCR1 and PCR31
18,285,282 UART: [state] Locking ICCM
18,287,122 UART: [exit] Launching FMC @ 0x40000000
18,295,515 UART:
18,295,766 UART: Running Caliptra FMC ...
18,296,919 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,288,546 ready_for_fw is high
3,289,026 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,750,925 >>> mbox cmd response: success
18,000,920 UART:
18,001,338 UART: Running Caliptra FMC ...
18,002,525 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,585 UART:
192,942 UART: Running Caliptra ROM ...
194,036 UART:
194,182 UART: [state] CFI Enabled
209,038 UART: [state] LifecycleState = Unprovisioned
210,914 UART: [state] DebugLocked = No
212,995 UART: [state] WD Timer not started. Device not locked for debugging
217,525 UART: [kat] SHA2-256
396,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
408,280 UART: [kat] ++
408,827 UART: [kat] sha1
419,776 UART: [kat] SHA2-256
422,783 UART: [kat] SHA2-384
429,759 UART: [kat] SHA2-512-ACC
432,688 UART: [kat] ECC-384
2,874,162 UART: [kat] HMAC-384Kdf
2,886,297 UART: [kat] LMS
3,415,747 UART: [kat] --
3,421,472 UART: [cold-reset] ++
3,422,973 UART: [fht] FHT @ 0x50003400
3,433,523 UART: [idev] ++
3,434,080 UART: [idev] CDI.KEYID = 6
3,435,002 UART: [idev] SUBJECT.KEYID = 7
3,436,187 UART: [idev] UDS.KEYID = 0
3,437,090 ready_for_fw is high
3,437,302 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,571,252 UART: [idev] Erasing UDS.KEYID = 0
5,910,471 UART: [idev] Sha1 KeyId Algorithm
5,933,440 UART: [idev] --
5,937,004 UART: [ldev] ++
5,937,576 UART: [ldev] CDI.KEYID = 6
5,938,468 UART: [ldev] SUBJECT.KEYID = 5
5,939,675 UART: [ldev] AUTHORITY.KEYID = 7
5,940,902 UART: [ldev] FE.KEYID = 1
5,953,147 UART: [ldev] Erasing FE.KEYID = 1
8,427,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,146,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,163,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,178,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,194,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,214,956 UART: [ldev] --
10,219,551 UART: [fwproc] Wait for Commands...
10,222,263 UART: [fwproc] Recv command 0x46574c44
10,224,356 UART: [fwproc] Recv'd Img size: 106684 bytes
13,532,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,610,695 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,653,301 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
13,970,965 >>> mbox cmd response: success
13,974,427 UART: [afmc] ++
13,975,065 UART: [afmc] CDI.KEYID = 6
13,975,986 UART: [afmc] SUBJECT.KEYID = 7
13,977,094 UART: [afmc] AUTHORITY.KEYID = 5
16,476,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,198,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,200,514 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,216,544 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,232,423 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,248,368 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,270,786 UART: [afmc] --
18,273,975 UART: [cold-reset] --
18,278,407 UART: [state] Locking Datavault
18,284,074 UART: [state] Locking PCR0, PCR1 and PCR31
18,285,759 UART: [state] Locking ICCM
18,287,593 UART: [exit] Launching FMC @ 0x40000000
18,295,957 UART:
18,296,247 UART: Running Caliptra FMC ...
18,297,316 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,693 writing to cptra_bootfsm_go
3,290,332 ready_for_fw is high
3,290,715 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,752,695 >>> mbox cmd response: success
18,002,686 UART:
18,003,251 UART: Running Caliptra FMC ...
18,004,435 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,884 >>> mbox cmd response: success
2,676,905 UART: [afmc] ++
2,677,073 UART: [afmc] CDI.KEYID = 6
2,677,436 UART: [afmc] SUBJECT.KEYID = 7
2,677,862 UART: [afmc] AUTHORITY.KEYID = 5
2,713,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,044 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,764 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,657 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,350 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,153 UART: [afmc] --
2,757,065 UART: [cold-reset] --
2,758,003 UART: [state] Locking Datavault
2,759,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,848 UART: [state] Locking ICCM
2,760,388 UART: [exit] Launching FMC @ 0x40000000
2,765,685 UART:
2,765,701 UART: Running Caliptra FMC ...
2,766,109 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,750 >>> mbox cmd response: success
2,588,218 UART:
2,588,234 UART: Running Caliptra FMC ...
2,588,642 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,884 >>> mbox cmd response: success
2,676,905 UART: [afmc] ++
2,677,073 UART: [afmc] CDI.KEYID = 6
2,677,436 UART: [afmc] SUBJECT.KEYID = 7
2,677,862 UART: [afmc] AUTHORITY.KEYID = 5
2,713,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,044 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,764 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,657 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,350 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,153 UART: [afmc] --
2,757,065 UART: [cold-reset] --
2,758,003 UART: [state] Locking Datavault
2,759,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,848 UART: [state] Locking ICCM
2,760,388 UART: [exit] Launching FMC @ 0x40000000
2,765,685 UART:
2,765,701 UART: Running Caliptra FMC ...
2,766,109 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,750 >>> mbox cmd response: success
2,588,218 UART:
2,588,234 UART: Running Caliptra FMC ...
2,588,642 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,884 >>> mbox cmd response: success
2,676,905 UART: [afmc] ++
2,677,073 UART: [afmc] CDI.KEYID = 6
2,677,436 UART: [afmc] SUBJECT.KEYID = 7
2,677,862 UART: [afmc] AUTHORITY.KEYID = 5
2,713,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,044 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,764 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,657 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,350 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,153 UART: [afmc] --
2,757,065 UART: [cold-reset] --
2,758,003 UART: [state] Locking Datavault
2,759,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,848 UART: [state] Locking ICCM
2,760,388 UART: [exit] Launching FMC @ 0x40000000
2,765,685 UART:
2,765,701 UART: Running Caliptra FMC ...
2,766,109 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,750 >>> mbox cmd response: success
2,588,218 UART:
2,588,234 UART: Running Caliptra FMC ...
2,588,642 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,884 >>> mbox cmd response: success
2,676,905 UART: [afmc] ++
2,677,073 UART: [afmc] CDI.KEYID = 6
2,677,436 UART: [afmc] SUBJECT.KEYID = 7
2,677,862 UART: [afmc] AUTHORITY.KEYID = 5
2,713,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,044 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,764 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,657 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,350 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,153 UART: [afmc] --
2,757,065 UART: [cold-reset] --
2,758,003 UART: [state] Locking Datavault
2,759,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,848 UART: [state] Locking ICCM
2,760,388 UART: [exit] Launching FMC @ 0x40000000
2,765,685 UART:
2,765,701 UART: Running Caliptra FMC ...
2,766,109 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,750 >>> mbox cmd response: success
2,588,218 UART:
2,588,234 UART: Running Caliptra FMC ...
2,588,642 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,884 >>> mbox cmd response: success
2,676,905 UART: [afmc] ++
2,677,073 UART: [afmc] CDI.KEYID = 6
2,677,436 UART: [afmc] SUBJECT.KEYID = 7
2,677,862 UART: [afmc] AUTHORITY.KEYID = 5
2,713,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,044 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,764 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,657 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,350 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,153 UART: [afmc] --
2,757,065 UART: [cold-reset] --
2,758,003 UART: [state] Locking Datavault
2,759,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,848 UART: [state] Locking ICCM
2,760,388 UART: [exit] Launching FMC @ 0x40000000
2,765,685 UART:
2,765,701 UART: Running Caliptra FMC ...
2,766,109 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,750 >>> mbox cmd response: success
2,588,218 UART:
2,588,234 UART: Running Caliptra FMC ...
2,588,642 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,480 UART: [kat] SHA2-256
902,420 UART: [kat] SHA2-384
905,283 UART: [kat] SHA2-512-ACC
907,184 UART: [kat] ECC-384
917,003 UART: [kat] HMAC-384Kdf
921,606 UART: [kat] LMS
1,169,918 UART: [kat] --
1,170,983 UART: [cold-reset] ++
1,171,405 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,248 UART: [idev] Erasing UDS.KEYID = 0
1,200,421 UART: [idev] Sha1 KeyId Algorithm
1,209,295 UART: [idev] --
1,210,288 UART: [ldev] ++
1,210,456 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,994 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,284,133 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,884 >>> mbox cmd response: success
2,676,905 UART: [afmc] ++
2,677,073 UART: [afmc] CDI.KEYID = 6
2,677,436 UART: [afmc] SUBJECT.KEYID = 7
2,677,862 UART: [afmc] AUTHORITY.KEYID = 5
2,713,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,730,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,731,044 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,764 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,657 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,748,350 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,756,153 UART: [afmc] --
2,757,065 UART: [cold-reset] --
2,758,003 UART: [state] Locking Datavault
2,759,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,848 UART: [state] Locking ICCM
2,760,388 UART: [exit] Launching FMC @ 0x40000000
2,765,685 UART:
2,765,701 UART: Running Caliptra FMC ...
2,766,109 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,110 ready_for_fw is high
1,057,110 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,750 >>> mbox cmd response: success
2,588,218 UART:
2,588,234 UART: Running Caliptra FMC ...
2,588,642 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,031 UART:
192,428 UART: Running Caliptra ROM ...
193,635 UART:
193,791 UART: [state] CFI Enabled
264,714 UART: [state] LifecycleState = Unprovisioned
267,133 UART: [state] DebugLocked = No
269,323 UART: [state] WD Timer not started. Device not locked for debugging
273,067 UART: [kat] SHA2-256
454,782 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,307 UART: [kat] ++
466,810 UART: [kat] sha1
477,164 UART: [kat] SHA2-256
480,186 UART: [kat] SHA2-384
486,373 UART: [kat] SHA2-512-ACC
488,992 UART: [kat] ECC-384
3,778,314 UART: [kat] HMAC-384Kdf
3,805,577 UART: [kat] LMS
4,878,742 UART: [kat] --
4,884,018 UART: [cold-reset] ++
4,885,419 UART: [fht] FHT @ 0x50003400
4,896,938 UART: [idev] ++
4,897,652 UART: [idev] CDI.KEYID = 6
4,898,844 UART: [idev] SUBJECT.KEYID = 7
4,899,948 UART: [idev] UDS.KEYID = 0
4,932,021 UART: [idev] Erasing UDS.KEYID = 0
8,246,660 UART: [idev] Sha1 KeyId Algorithm
8,268,585 UART: [idev] --
8,271,261 UART: [ldev] ++
8,271,836 UART: [ldev] CDI.KEYID = 6
8,273,006 UART: [ldev] SUBJECT.KEYID = 5
8,274,142 UART: [ldev] AUTHORITY.KEYID = 7
8,275,377 UART: [ldev] FE.KEYID = 1
8,320,465 UART: [ldev] Erasing FE.KEYID = 1
11,654,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,371 UART: [ldev] --
14,180,116 UART: [fwproc] Wait for Commands...
14,181,505 UART: [fwproc] Recv command 0x46574c44
14,182,919 UART: [fwproc] Recv'd Img size: 113844 bytes
18,250,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,319,637 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,388,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,708,966 UART: [afmc] ++
18,709,597 UART: [afmc] CDI.KEYID = 6
18,710,658 UART: [afmc] SUBJECT.KEYID = 7
18,711,876 UART: [afmc] AUTHORITY.KEYID = 5
22,075,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,376,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,378,585 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,394,737 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,410,815 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,426,796 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,450,611 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,453 UART:
192,832 UART: Running Caliptra ROM ...
194,072 UART:
603,666 UART: [state] CFI Enabled
617,722 UART: [state] LifecycleState = Unprovisioned
620,156 UART: [state] DebugLocked = No
621,649 UART: [state] WD Timer not started. Device not locked for debugging
625,892 UART: [kat] SHA2-256
807,882 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,415 UART: [kat] ++
819,943 UART: [kat] sha1
830,115 UART: [kat] SHA2-256
833,129 UART: [kat] SHA2-384
837,532 UART: [kat] SHA2-512-ACC
840,157 UART: [kat] ECC-384
4,096,516 UART: [kat] HMAC-384Kdf
4,107,215 UART: [kat] LMS
5,180,381 UART: [kat] --
5,185,467 UART: [cold-reset] ++
5,186,691 UART: [fht] FHT @ 0x50003400
5,197,939 UART: [idev] ++
5,198,665 UART: [idev] CDI.KEYID = 6
5,199,841 UART: [idev] SUBJECT.KEYID = 7
5,201,328 UART: [idev] UDS.KEYID = 0
5,218,765 UART: [idev] Erasing UDS.KEYID = 0
8,488,865 UART: [idev] Sha1 KeyId Algorithm
8,511,634 UART: [idev] --
8,516,247 UART: [ldev] ++
8,516,817 UART: [ldev] CDI.KEYID = 6
8,518,053 UART: [ldev] SUBJECT.KEYID = 5
8,519,487 UART: [ldev] AUTHORITY.KEYID = 7
8,521,047 UART: [ldev] FE.KEYID = 1
8,534,521 UART: [ldev] Erasing FE.KEYID = 1
11,828,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,722 UART: [ldev] --
14,335,571 UART: [fwproc] Wait for Commands...
14,336,966 UART: [fwproc] Recv command 0x46574c44
14,338,369 UART: [fwproc] Recv'd Img size: 113844 bytes
18,405,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,478,479 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,547,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,866,011 UART: [afmc] ++
18,866,630 UART: [afmc] CDI.KEYID = 6
18,867,817 UART: [afmc] SUBJECT.KEYID = 7
18,868,932 UART: [afmc] AUTHORITY.KEYID = 5
22,188,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,481,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,484,264 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,500,464 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,516,526 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,532,474 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,555,830 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,433 UART:
192,825 UART: Running Caliptra ROM ...
193,972 UART:
194,140 UART: [state] CFI Enabled
264,697 UART: [state] LifecycleState = Unprovisioned
266,629 UART: [state] DebugLocked = No
268,384 UART: [state] WD Timer not started. Device not locked for debugging
271,612 UART: [kat] SHA2-256
450,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,301 UART: [kat] ++
462,843 UART: [kat] sha1
473,508 UART: [kat] SHA2-256
476,523 UART: [kat] SHA2-384
482,015 UART: [kat] SHA2-512-ACC
484,954 UART: [kat] ECC-384
2,947,231 UART: [kat] HMAC-384Kdf
2,971,090 UART: [kat] LMS
3,500,506 UART: [kat] --
3,506,376 UART: [cold-reset] ++
3,508,908 UART: [fht] FHT @ 0x50003400
3,519,682 UART: [idev] ++
3,520,246 UART: [idev] CDI.KEYID = 6
3,521,129 UART: [idev] SUBJECT.KEYID = 7
3,522,345 UART: [idev] UDS.KEYID = 0
3,543,626 UART: [idev] Erasing UDS.KEYID = 0
6,025,685 UART: [idev] Sha1 KeyId Algorithm
6,048,367 UART: [idev] --
6,052,778 UART: [ldev] ++
6,053,390 UART: [ldev] CDI.KEYID = 6
6,054,278 UART: [ldev] SUBJECT.KEYID = 5
6,055,385 UART: [ldev] AUTHORITY.KEYID = 7
6,056,677 UART: [ldev] FE.KEYID = 1
6,099,676 UART: [ldev] Erasing FE.KEYID = 1
8,603,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,053 UART: [ldev] --
10,555,034 UART: [fwproc] Wait for Commands...
10,556,428 UART: [fwproc] Recv command 0x46574c44
10,558,005 UART: [fwproc] Recv'd Img size: 114168 bytes
13,956,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,030,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,098,838 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,420,760 UART: [afmc] ++
14,421,384 UART: [afmc] CDI.KEYID = 6
14,422,275 UART: [afmc] SUBJECT.KEYID = 7
14,423,378 UART: [afmc] AUTHORITY.KEYID = 5
16,957,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,678,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,680,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,695,942 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,711,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,727,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,751,233 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,471 UART:
192,851 UART: Running Caliptra ROM ...
194,053 UART:
603,779 UART: [state] CFI Enabled
615,967 UART: [state] LifecycleState = Unprovisioned
617,791 UART: [state] DebugLocked = No
619,596 UART: [state] WD Timer not started. Device not locked for debugging
623,789 UART: [kat] SHA2-256
802,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,531 UART: [kat] ++
815,064 UART: [kat] sha1
825,247 UART: [kat] SHA2-256
828,312 UART: [kat] SHA2-384
835,253 UART: [kat] SHA2-512-ACC
838,199 UART: [kat] ECC-384
3,278,147 UART: [kat] HMAC-384Kdf
3,289,900 UART: [kat] LMS
3,819,401 UART: [kat] --
3,825,211 UART: [cold-reset] ++
3,826,800 UART: [fht] FHT @ 0x50003400
3,837,775 UART: [idev] ++
3,838,371 UART: [idev] CDI.KEYID = 6
3,839,255 UART: [idev] SUBJECT.KEYID = 7
3,840,468 UART: [idev] UDS.KEYID = 0
3,855,396 UART: [idev] Erasing UDS.KEYID = 0
6,309,674 UART: [idev] Sha1 KeyId Algorithm
6,332,016 UART: [idev] --
6,336,021 UART: [ldev] ++
6,336,609 UART: [ldev] CDI.KEYID = 6
6,337,529 UART: [ldev] SUBJECT.KEYID = 5
6,338,710 UART: [ldev] AUTHORITY.KEYID = 7
6,339,940 UART: [ldev] FE.KEYID = 1
6,350,909 UART: [ldev] Erasing FE.KEYID = 1
8,823,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,777 UART: [ldev] --
10,756,797 UART: [fwproc] Wait for Commands...
10,758,191 UART: [fwproc] Recv command 0x46574c44
10,759,881 UART: [fwproc] Recv'd Img size: 114168 bytes
14,162,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,242,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,311,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,634,504 UART: [afmc] ++
14,635,325 UART: [afmc] CDI.KEYID = 6
14,636,220 UART: [afmc] SUBJECT.KEYID = 7
14,637,243 UART: [afmc] AUTHORITY.KEYID = 5
17,139,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,859,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,861,161 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,876,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,892,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,908,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,932,246 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,838 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,393 UART:
192,776 UART: Running Caliptra ROM ...
193,982 UART:
194,135 UART: [state] CFI Enabled
264,801 UART: [state] LifecycleState = Unprovisioned
266,673 UART: [state] DebugLocked = No
269,078 UART: [state] WD Timer not started. Device not locked for debugging
273,605 UART: [kat] SHA2-256
452,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,265 UART: [kat] ++
464,805 UART: [kat] sha1
476,608 UART: [kat] SHA2-256
479,616 UART: [kat] SHA2-384
486,886 UART: [kat] SHA2-512-ACC
489,825 UART: [kat] ECC-384
2,949,978 UART: [kat] HMAC-384Kdf
2,972,646 UART: [kat] LMS
3,502,094 UART: [kat] --
3,507,098 UART: [cold-reset] ++
3,508,101 UART: [fht] FHT @ 0x50003400
3,519,190 UART: [idev] ++
3,519,761 UART: [idev] CDI.KEYID = 6
3,520,671 UART: [idev] SUBJECT.KEYID = 7
3,521,886 UART: [idev] UDS.KEYID = 0
3,545,574 UART: [idev] Erasing UDS.KEYID = 0
6,028,925 UART: [idev] Sha1 KeyId Algorithm
6,053,412 UART: [idev] --
6,058,748 UART: [ldev] ++
6,059,324 UART: [ldev] CDI.KEYID = 6
6,060,211 UART: [ldev] SUBJECT.KEYID = 5
6,061,427 UART: [ldev] AUTHORITY.KEYID = 7
6,062,659 UART: [ldev] FE.KEYID = 1
6,102,100 UART: [ldev] Erasing FE.KEYID = 1
8,607,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,430 UART: [ldev] --
10,558,692 UART: [fwproc] Wait for Commands...
10,560,097 UART: [fwproc] Recv command 0x46574c44
10,561,535 UART: [fwproc] Recv'd Img size: 114168 bytes
13,966,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,034,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,103,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,425,028 UART: [afmc] ++
14,425,648 UART: [afmc] CDI.KEYID = 6
14,426,527 UART: [afmc] SUBJECT.KEYID = 7
14,427,623 UART: [afmc] AUTHORITY.KEYID = 5
16,956,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,679,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,681,260 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,697,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,713,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,728,929 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,752,406 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
192,568 UART:
192,942 UART: Running Caliptra ROM ...
194,047 UART:
603,803 UART: [state] CFI Enabled
616,222 UART: [state] LifecycleState = Unprovisioned
618,120 UART: [state] DebugLocked = No
619,636 UART: [state] WD Timer not started. Device not locked for debugging
623,738 UART: [kat] SHA2-256
802,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,434 UART: [kat] ++
814,883 UART: [kat] sha1
826,834 UART: [kat] SHA2-256
829,845 UART: [kat] SHA2-384
836,140 UART: [kat] SHA2-512-ACC
839,117 UART: [kat] ECC-384
3,283,463 UART: [kat] HMAC-384Kdf
3,296,283 UART: [kat] LMS
3,825,797 UART: [kat] --
3,832,469 UART: [cold-reset] ++
3,834,520 UART: [fht] FHT @ 0x50003400
3,845,455 UART: [idev] ++
3,846,025 UART: [idev] CDI.KEYID = 6
3,847,043 UART: [idev] SUBJECT.KEYID = 7
3,848,165 UART: [idev] UDS.KEYID = 0
3,864,142 UART: [idev] Erasing UDS.KEYID = 0
6,322,292 UART: [idev] Sha1 KeyId Algorithm
6,345,733 UART: [idev] --
6,349,926 UART: [ldev] ++
6,350,489 UART: [ldev] CDI.KEYID = 6
6,351,451 UART: [ldev] SUBJECT.KEYID = 5
6,352,607 UART: [ldev] AUTHORITY.KEYID = 7
6,353,892 UART: [ldev] FE.KEYID = 1
6,364,597 UART: [ldev] Erasing FE.KEYID = 1
8,841,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,074 UART: [ldev] --
10,774,170 UART: [fwproc] Wait for Commands...
10,775,587 UART: [fwproc] Recv command 0x46574c44
10,777,385 UART: [fwproc] Recv'd Img size: 114168 bytes
14,176,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,251,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,320,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,640,935 UART: [afmc] ++
14,641,551 UART: [afmc] CDI.KEYID = 6
14,642,623 UART: [afmc] SUBJECT.KEYID = 7
14,643,725 UART: [afmc] AUTHORITY.KEYID = 5
17,139,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,860,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,862,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,878,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,894,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,910,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,932,183 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
891,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,603 UART: [kat] ++
895,755 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,672 UART: [kat] SHA2-512-ACC
906,573 UART: [kat] ECC-384
915,800 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,198,759 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,428 UART: [ldev] --
1,280,802 UART: [fwproc] Wait for Commands...
1,281,451 UART: [fwproc] Recv command 0x46574c44
1,282,184 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,987 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,644 UART: [afmc] ++
2,771,812 UART: [afmc] CDI.KEYID = 6
2,772,175 UART: [afmc] SUBJECT.KEYID = 7
2,772,601 UART: [afmc] AUTHORITY.KEYID = 5
2,807,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,173 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,892 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,849 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,453 UART: [kat] SHA2-512-ACC
906,354 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,658 UART: [cold-reset] ++
1,171,188 UART: [fht] FHT @ 0x50003400
1,173,846 UART: [idev] ++
1,174,014 UART: [idev] CDI.KEYID = 6
1,174,375 UART: [idev] SUBJECT.KEYID = 7
1,174,800 UART: [idev] UDS.KEYID = 0
1,182,830 UART: [idev] Erasing UDS.KEYID = 0
1,199,830 UART: [idev] Sha1 KeyId Algorithm
1,208,576 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,195 UART: [ldev] Erasing FE.KEYID = 1
1,242,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,831 UART: [fwproc] Wait for Commands...
1,282,532 UART: [fwproc] Recv command 0x46574c44
1,283,265 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,631 UART: [afmc] ++
2,772,799 UART: [afmc] CDI.KEYID = 6
2,773,162 UART: [afmc] SUBJECT.KEYID = 7
2,773,588 UART: [afmc] AUTHORITY.KEYID = 5
2,809,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,692 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,421 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,304 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,023 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,902 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,353 UART: [kat] SHA2-256
901,293 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,555 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,748 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,892 UART: [ldev] --
1,281,302 UART: [fwproc] Wait for Commands...
1,281,953 UART: [fwproc] Recv command 0x46574c44
1,282,686 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,863 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,428 UART: [afmc] ++
2,771,596 UART: [afmc] CDI.KEYID = 6
2,771,959 UART: [afmc] SUBJECT.KEYID = 7
2,772,385 UART: [afmc] AUTHORITY.KEYID = 5
2,807,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,019 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,631 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,350 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,219 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,098 UART: [state] WD Timer not started. Device not locked for debugging
88,459 UART: [kat] SHA2-256
892,009 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,138 UART: [kat] ++
896,290 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,465 UART: [kat] LMS
1,169,777 UART: [kat] --
1,170,948 UART: [cold-reset] ++
1,171,314 UART: [fht] FHT @ 0x50003400
1,174,136 UART: [idev] ++
1,174,304 UART: [idev] CDI.KEYID = 6
1,174,665 UART: [idev] SUBJECT.KEYID = 7
1,175,090 UART: [idev] UDS.KEYID = 0
1,183,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,524 UART: [idev] Sha1 KeyId Algorithm
1,209,390 UART: [idev] --
1,210,423 UART: [ldev] ++
1,210,591 UART: [ldev] CDI.KEYID = 6
1,210,955 UART: [ldev] SUBJECT.KEYID = 5
1,211,382 UART: [ldev] AUTHORITY.KEYID = 7
1,211,845 UART: [ldev] FE.KEYID = 1
1,217,121 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,807 UART: [ldev] --
1,283,161 UART: [fwproc] Wait for Commands...
1,283,942 UART: [fwproc] Recv command 0x46574c44
1,284,675 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,609 UART: [afmc] ++
2,773,777 UART: [afmc] CDI.KEYID = 6
2,774,140 UART: [afmc] SUBJECT.KEYID = 7
2,774,566 UART: [afmc] AUTHORITY.KEYID = 5
2,810,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,794 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,930 UART: [kat] LMS
1,169,242 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,673 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,181,957 UART: [idev] Erasing UDS.KEYID = 0
1,198,233 UART: [idev] Sha1 KeyId Algorithm
1,207,235 UART: [idev] --
1,208,392 UART: [ldev] ++
1,208,560 UART: [ldev] CDI.KEYID = 6
1,208,924 UART: [ldev] SUBJECT.KEYID = 5
1,209,351 UART: [ldev] AUTHORITY.KEYID = 7
1,209,814 UART: [ldev] FE.KEYID = 1
1,214,672 UART: [ldev] Erasing FE.KEYID = 1
1,241,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,840 UART: [ldev] --
1,280,356 UART: [fwproc] Wait for Commands...
1,281,067 UART: [fwproc] Recv command 0x46574c44
1,281,800 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,814 UART: [afmc] ++
2,769,982 UART: [afmc] CDI.KEYID = 6
2,770,345 UART: [afmc] SUBJECT.KEYID = 7
2,770,771 UART: [afmc] AUTHORITY.KEYID = 5
2,806,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,324 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,804 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,687 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,233 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,833 UART: [kat] LMS
1,169,145 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,198,398 UART: [idev] Sha1 KeyId Algorithm
1,207,132 UART: [idev] --
1,208,175 UART: [ldev] ++
1,208,343 UART: [ldev] CDI.KEYID = 6
1,208,707 UART: [ldev] SUBJECT.KEYID = 5
1,209,134 UART: [ldev] AUTHORITY.KEYID = 7
1,209,597 UART: [ldev] FE.KEYID = 1
1,214,667 UART: [ldev] Erasing FE.KEYID = 1
1,241,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,127 UART: [ldev] --
1,280,573 UART: [fwproc] Wait for Commands...
1,281,188 UART: [fwproc] Recv command 0x46574c44
1,281,921 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,313 UART: [afmc] ++
2,770,481 UART: [afmc] CDI.KEYID = 6
2,770,844 UART: [afmc] SUBJECT.KEYID = 7
2,771,270 UART: [afmc] AUTHORITY.KEYID = 5
2,806,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,598 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,009 UART:
192,374 UART: Running Caliptra ROM ...
193,503 UART:
193,653 UART: [state] CFI Enabled
270,444 UART: [state] LifecycleState = Unprovisioned
272,855 UART: [state] DebugLocked = No
275,825 UART: [state] WD Timer not started. Device not locked for debugging
279,576 UART: [kat] SHA2-256
461,307 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
472,813 UART: [kat] ++
473,346 UART: [kat] sha1
482,830 UART: [kat] SHA2-256
485,833 UART: [kat] SHA2-384
490,541 UART: [kat] SHA2-512-ACC
493,115 UART: [kat] ECC-384
3,786,465 UART: [kat] HMAC-384Kdf
3,813,161 UART: [kat] LMS
4,886,338 UART: [kat] --
4,892,256 UART: [cold-reset] ++
4,893,548 UART: [fht] FHT @ 0x50003400
4,904,880 UART: [idev] ++
4,905,594 UART: [idev] CDI.KEYID = 6
4,906,769 UART: [idev] SUBJECT.KEYID = 7
4,907,956 UART: [idev] UDS.KEYID = 0
4,908,851 ready_for_fw is high
4,909,036 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,042,957 UART: [idev] Erasing UDS.KEYID = 0
8,252,055 UART: [idev] Sha1 KeyId Algorithm
8,272,942 UART: [idev] --
8,277,367 UART: [ldev] ++
8,277,989 UART: [ldev] CDI.KEYID = 6
8,279,098 UART: [ldev] SUBJECT.KEYID = 5
8,280,320 UART: [ldev] AUTHORITY.KEYID = 7
8,281,622 UART: [ldev] FE.KEYID = 1
8,308,889 UART: [ldev] Erasing FE.KEYID = 1
11,644,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,954,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,970,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,986,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,002,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,023,940 UART: [ldev] --
14,028,620 UART: [fwproc] Wait for Commands...
14,031,370 UART: [fwproc] Recv command 0x46574c44
14,033,703 UART: [fwproc] Recv'd Img size: 106340 bytes
18,007,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,081,316 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,123,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,439,612 >>> mbox cmd response: success
18,443,112 UART: [afmc] ++
18,443,743 UART: [afmc] CDI.KEYID = 6
18,444,856 UART: [afmc] SUBJECT.KEYID = 7
18,446,074 UART: [afmc] AUTHORITY.KEYID = 5
21,807,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,103,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,105,403 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,121,615 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,137,516 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,153,593 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,175,369 UART: [afmc] --
24,179,452 UART: [cold-reset] --
24,181,302 UART: [state] Locking Datavault
24,186,258 UART: [state] Locking PCR0, PCR1 and PCR31
24,187,966 UART: [state] Locking ICCM
24,189,248 UART: [exit] Launching FMC @ 0x40000000
24,197,829 UART:
24,198,075 UART: Running Caliptra FMC ...
24,199,222 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
4,779,783 ready_for_fw is high
4,780,397 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,205,400 >>> mbox cmd response: success
23,899,696 UART:
23,900,138 UART: Running Caliptra FMC ...
23,901,364 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,551 UART:
192,907 UART: Running Caliptra ROM ...
194,085 UART:
603,792 UART: [state] CFI Enabled
617,838 UART: [state] LifecycleState = Unprovisioned
620,250 UART: [state] DebugLocked = No
621,412 UART: [state] WD Timer not started. Device not locked for debugging
625,829 UART: [kat] SHA2-256
807,844 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,355 UART: [kat] ++
819,869 UART: [kat] sha1
830,164 UART: [kat] SHA2-256
833,167 UART: [kat] SHA2-384
839,717 UART: [kat] SHA2-512-ACC
842,369 UART: [kat] ECC-384
4,097,673 UART: [kat] HMAC-384Kdf
4,109,629 UART: [kat] LMS
5,182,784 UART: [kat] --
5,187,652 UART: [cold-reset] ++
5,188,799 UART: [fht] FHT @ 0x50003400
5,201,546 UART: [idev] ++
5,202,252 UART: [idev] CDI.KEYID = 6
5,203,425 UART: [idev] SUBJECT.KEYID = 7
5,204,878 UART: [idev] UDS.KEYID = 0
5,206,131 ready_for_fw is high
5,206,323 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,339,913 UART: [idev] Erasing UDS.KEYID = 0
8,490,749 UART: [idev] Sha1 KeyId Algorithm
8,514,081 UART: [idev] --
8,516,942 UART: [ldev] ++
8,517,507 UART: [ldev] CDI.KEYID = 6
8,518,751 UART: [ldev] SUBJECT.KEYID = 5
8,520,230 UART: [ldev] AUTHORITY.KEYID = 7
8,521,778 UART: [ldev] FE.KEYID = 1
8,534,207 UART: [ldev] Erasing FE.KEYID = 1
11,826,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,183 UART: [ldev] --
14,192,379 UART: [fwproc] Wait for Commands...
14,194,138 UART: [fwproc] Recv command 0x46574c44
14,196,436 UART: [fwproc] Recv'd Img size: 106340 bytes
18,170,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,246,773 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,289,229 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,604,990 >>> mbox cmd response: success
18,608,896 UART: [afmc] ++
18,609,508 UART: [afmc] CDI.KEYID = 6
18,610,611 UART: [afmc] SUBJECT.KEYID = 7
18,611,816 UART: [afmc] AUTHORITY.KEYID = 5
21,929,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,223,763 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,226,052 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,242,054 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,258,151 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,274,233 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,296,133 UART: [afmc] --
24,300,288 UART: [cold-reset] --
24,306,027 UART: [state] Locking Datavault
24,313,051 UART: [state] Locking PCR0, PCR1 and PCR31
24,314,706 UART: [state] Locking ICCM
24,317,009 UART: [exit] Launching FMC @ 0x40000000
24,325,677 UART:
24,325,924 UART: Running Caliptra FMC ...
24,327,064 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
5,098,628 ready_for_fw is high
5,099,029 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,409,276 >>> mbox cmd response: success
24,046,182 UART:
24,046,593 UART: Running Caliptra FMC ...
24,047,899 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,182 UART:
192,552 UART: Running Caliptra ROM ...
193,745 UART:
193,896 UART: [state] CFI Enabled
262,143 UART: [state] LifecycleState = Unprovisioned
263,978 UART: [state] DebugLocked = No
266,717 UART: [state] WD Timer not started. Device not locked for debugging
269,907 UART: [kat] SHA2-256
449,052 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,581 UART: [kat] ++
461,112 UART: [kat] sha1
473,365 UART: [kat] SHA2-256
476,443 UART: [kat] SHA2-384
483,150 UART: [kat] SHA2-512-ACC
486,103 UART: [kat] ECC-384
2,944,124 UART: [kat] HMAC-384Kdf
2,967,510 UART: [kat] LMS
3,496,910 UART: [kat] --
3,502,049 UART: [cold-reset] ++
3,504,413 UART: [fht] FHT @ 0x50003400
3,516,101 UART: [idev] ++
3,516,668 UART: [idev] CDI.KEYID = 6
3,517,595 UART: [idev] SUBJECT.KEYID = 7
3,518,768 UART: [idev] UDS.KEYID = 0
3,519,819 ready_for_fw is high
3,520,016 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,654,294 UART: [idev] Erasing UDS.KEYID = 0
6,022,979 UART: [idev] Sha1 KeyId Algorithm
6,047,083 UART: [idev] --
6,051,520 UART: [ldev] ++
6,052,093 UART: [ldev] CDI.KEYID = 6
6,053,009 UART: [ldev] SUBJECT.KEYID = 5
6,054,178 UART: [ldev] AUTHORITY.KEYID = 7
6,055,466 UART: [ldev] FE.KEYID = 1
6,095,254 UART: [ldev] Erasing FE.KEYID = 1
8,597,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,654 UART: [ldev] --
10,406,837 UART: [fwproc] Wait for Commands...
10,409,850 UART: [fwproc] Recv command 0x46574c44
10,411,977 UART: [fwproc] Recv'd Img size: 106684 bytes
13,719,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,798,156 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,840,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,158,485 >>> mbox cmd response: success
14,162,917 UART: [afmc] ++
14,163,529 UART: [afmc] CDI.KEYID = 6
14,164,411 UART: [afmc] SUBJECT.KEYID = 7
14,165,572 UART: [afmc] AUTHORITY.KEYID = 5
16,700,105 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,439,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,440,865 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,456,859 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,472,782 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,488,781 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,512,841 UART: [afmc] --
18,517,087 UART: [cold-reset] --
18,520,214 UART: [state] Locking Datavault
18,527,228 UART: [state] Locking PCR0, PCR1 and PCR31
18,528,923 UART: [state] Locking ICCM
18,530,088 UART: [exit] Launching FMC @ 0x40000000
18,538,471 UART:
18,538,713 UART: Running Caliptra FMC ...
18,539,855 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,377,026 ready_for_fw is high
3,377,561 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,929,649 >>> mbox cmd response: success
18,217,836 UART:
18,218,234 UART: Running Caliptra FMC ...
18,219,495 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,493 UART:
192,865 UART: Running Caliptra ROM ...
194,173 UART:
603,768 UART: [state] CFI Enabled
618,984 UART: [state] LifecycleState = Unprovisioned
620,871 UART: [state] DebugLocked = No
622,610 UART: [state] WD Timer not started. Device not locked for debugging
626,704 UART: [kat] SHA2-256
805,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,408 UART: [kat] ++
817,855 UART: [kat] sha1
828,301 UART: [kat] SHA2-256
831,306 UART: [kat] SHA2-384
836,863 UART: [kat] SHA2-512-ACC
839,791 UART: [kat] ECC-384
3,282,985 UART: [kat] HMAC-384Kdf
3,295,269 UART: [kat] LMS
3,824,739 UART: [kat] --
3,829,704 UART: [cold-reset] ++
3,831,777 UART: [fht] FHT @ 0x50003400
3,842,321 UART: [idev] ++
3,842,879 UART: [idev] CDI.KEYID = 6
3,843,764 UART: [idev] SUBJECT.KEYID = 7
3,845,002 UART: [idev] UDS.KEYID = 0
3,846,139 ready_for_fw is high
3,846,351 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,980,370 UART: [idev] Erasing UDS.KEYID = 0
6,313,843 UART: [idev] Sha1 KeyId Algorithm
6,335,787 UART: [idev] --
6,340,029 UART: [ldev] ++
6,340,610 UART: [ldev] CDI.KEYID = 6
6,341,520 UART: [ldev] SUBJECT.KEYID = 5
6,342,746 UART: [ldev] AUTHORITY.KEYID = 7
6,343,975 UART: [ldev] FE.KEYID = 1
6,356,185 UART: [ldev] Erasing FE.KEYID = 1
8,829,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,843 UART: [ldev] --
10,620,294 UART: [fwproc] Wait for Commands...
10,622,706 UART: [fwproc] Recv command 0x46574c44
10,624,753 UART: [fwproc] Recv'd Img size: 106684 bytes
13,934,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,964 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,046,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,363,502 >>> mbox cmd response: success
14,367,626 UART: [afmc] ++
14,368,234 UART: [afmc] CDI.KEYID = 6
14,369,120 UART: [afmc] SUBJECT.KEYID = 7
14,370,333 UART: [afmc] AUTHORITY.KEYID = 5
16,872,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,533 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,611,385 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,627,331 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,643,265 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,665,946 UART: [afmc] --
18,669,827 UART: [cold-reset] --
18,673,234 UART: [state] Locking Datavault
18,677,303 UART: [state] Locking PCR0, PCR1 and PCR31
18,678,998 UART: [state] Locking ICCM
18,681,258 UART: [exit] Launching FMC @ 0x40000000
18,689,655 UART:
18,689,899 UART: Running Caliptra FMC ...
18,691,040 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,695,555 ready_for_fw is high
3,695,976 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,136,965 >>> mbox cmd response: success
18,390,451 UART:
18,390,871 UART: Running Caliptra FMC ...
18,392,047 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,423 UART:
192,779 UART: Running Caliptra ROM ...
193,956 UART:
194,113 UART: [state] CFI Enabled
260,190 UART: [state] LifecycleState = Unprovisioned
262,044 UART: [state] DebugLocked = No
263,397 UART: [state] WD Timer not started. Device not locked for debugging
267,785 UART: [kat] SHA2-256
446,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,503 UART: [kat] ++
458,947 UART: [kat] sha1
471,404 UART: [kat] SHA2-256
474,376 UART: [kat] SHA2-384
480,510 UART: [kat] SHA2-512-ACC
483,457 UART: [kat] ECC-384
2,943,534 UART: [kat] HMAC-384Kdf
2,969,199 UART: [kat] LMS
3,498,642 UART: [kat] --
3,503,351 UART: [cold-reset] ++
3,504,886 UART: [fht] FHT @ 0x50003400
3,516,011 UART: [idev] ++
3,516,583 UART: [idev] CDI.KEYID = 6
3,517,512 UART: [idev] SUBJECT.KEYID = 7
3,518,694 UART: [idev] UDS.KEYID = 0
3,519,690 ready_for_fw is high
3,519,869 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,653,936 UART: [idev] Erasing UDS.KEYID = 0
6,023,444 UART: [idev] Sha1 KeyId Algorithm
6,046,518 UART: [idev] --
6,050,193 UART: [ldev] ++
6,050,771 UART: [ldev] CDI.KEYID = 6
6,051,685 UART: [ldev] SUBJECT.KEYID = 5
6,052,852 UART: [ldev] AUTHORITY.KEYID = 7
6,054,089 UART: [ldev] FE.KEYID = 1
6,097,315 UART: [ldev] Erasing FE.KEYID = 1
8,597,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,759 UART: [ldev] --
10,389,953 UART: [fwproc] Wait for Commands...
10,391,407 UART: [fwproc] Recv command 0x46574c44
10,393,509 UART: [fwproc] Recv'd Img size: 106684 bytes
13,699,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,773,467 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,816,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,134,206 >>> mbox cmd response: success
14,138,054 UART: [afmc] ++
14,138,665 UART: [afmc] CDI.KEYID = 6
14,139,549 UART: [afmc] SUBJECT.KEYID = 7
14,140,769 UART: [afmc] AUTHORITY.KEYID = 5
16,676,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,400,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,401,991 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,417,988 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,433,903 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,449,872 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,473,254 UART: [afmc] --
18,476,894 UART: [cold-reset] --
18,480,698 UART: [state] Locking Datavault
18,486,345 UART: [state] Locking PCR0, PCR1 and PCR31
18,488,028 UART: [state] Locking ICCM
18,489,673 UART: [exit] Launching FMC @ 0x40000000
18,498,054 UART:
18,498,301 UART: Running Caliptra FMC ...
18,499,361 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,379,573 ready_for_fw is high
3,379,989 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,966,581 >>> mbox cmd response: success
18,248,353 UART:
18,249,242 UART: Running Caliptra FMC ...
18,250,434 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,557 UART:
192,920 UART: Running Caliptra ROM ...
194,101 UART:
603,818 UART: [state] CFI Enabled
616,832 UART: [state] LifecycleState = Unprovisioned
618,706 UART: [state] DebugLocked = No
621,645 UART: [state] WD Timer not started. Device not locked for debugging
624,602 UART: [kat] SHA2-256
803,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,279 UART: [kat] ++
815,723 UART: [kat] sha1
827,087 UART: [kat] SHA2-256
830,091 UART: [kat] SHA2-384
836,222 UART: [kat] SHA2-512-ACC
839,221 UART: [kat] ECC-384
3,282,222 UART: [kat] HMAC-384Kdf
3,295,232 UART: [kat] LMS
3,824,732 UART: [kat] --
3,829,859 UART: [cold-reset] ++
3,832,079 UART: [fht] FHT @ 0x50003400
3,843,069 UART: [idev] ++
3,843,671 UART: [idev] CDI.KEYID = 6
3,844,594 UART: [idev] SUBJECT.KEYID = 7
3,845,699 UART: [idev] UDS.KEYID = 0
3,846,766 ready_for_fw is high
3,846,984 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,980,926 UART: [idev] Erasing UDS.KEYID = 0
6,319,742 UART: [idev] Sha1 KeyId Algorithm
6,342,528 UART: [idev] --
6,346,350 UART: [ldev] ++
6,346,923 UART: [ldev] CDI.KEYID = 6
6,347,892 UART: [ldev] SUBJECT.KEYID = 5
6,349,049 UART: [ldev] AUTHORITY.KEYID = 7
6,350,278 UART: [ldev] FE.KEYID = 1
6,362,757 UART: [ldev] Erasing FE.KEYID = 1
8,836,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,197 UART: [ldev] --
10,630,300 UART: [fwproc] Wait for Commands...
10,631,903 UART: [fwproc] Recv command 0x46574c44
10,633,988 UART: [fwproc] Recv'd Img size: 106684 bytes
13,945,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,016,289 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,058,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,375,410 >>> mbox cmd response: success
14,378,850 UART: [afmc] ++
14,379,452 UART: [afmc] CDI.KEYID = 6
14,380,363 UART: [afmc] SUBJECT.KEYID = 7
14,381,521 UART: [afmc] AUTHORITY.KEYID = 5
16,882,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,604,505 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,620,483 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,636,408 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,652,428 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,675,567 UART: [afmc] --
18,678,554 UART: [cold-reset] --
18,683,538 UART: [state] Locking Datavault
18,687,199 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,885 UART: [state] Locking ICCM
18,691,500 UART: [exit] Launching FMC @ 0x40000000
18,699,882 UART:
18,700,135 UART: Running Caliptra FMC ...
18,701,283 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,696,858 ready_for_fw is high
3,697,288 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,143,818 >>> mbox cmd response: success
18,388,076 UART:
18,388,492 UART: Running Caliptra FMC ...
18,389,760 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,340 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,605 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,174,491 ready_for_fw is high
1,174,491 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,955 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,390 UART: [ldev] Erasing FE.KEYID = 1
1,241,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,952 UART: [ldev] --
1,280,310 UART: [fwproc] Wait for Commands...
1,280,901 UART: [fwproc] Recv command 0x46574c44
1,281,634 UART: [fwproc] Recv'd Img size: 106684 bytes
2,490,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,517,071 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,535,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,670,742 >>> mbox cmd response: success
2,671,931 UART: [afmc] ++
2,672,099 UART: [afmc] CDI.KEYID = 6
2,672,462 UART: [afmc] SUBJECT.KEYID = 7
2,672,888 UART: [afmc] AUTHORITY.KEYID = 5
2,708,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,725,985 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,705 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,598 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,291 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,064 UART: [afmc] --
2,751,954 UART: [cold-reset] --
2,752,932 UART: [state] Locking Datavault
2,754,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,667 UART: [state] Locking ICCM
2,755,269 UART: [exit] Launching FMC @ 0x40000000
2,760,566 UART:
2,760,582 UART: Running Caliptra FMC ...
2,760,990 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,732 ready_for_fw is high
1,055,732 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,432 >>> mbox cmd response: success
2,584,575 UART:
2,584,591 UART: Running Caliptra FMC ...
2,584,999 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,442 UART: [cold-reset] ++
1,170,930 UART: [fht] FHT @ 0x50003400
1,173,624 UART: [idev] ++
1,173,792 UART: [idev] CDI.KEYID = 6
1,174,153 UART: [idev] SUBJECT.KEYID = 7
1,174,578 UART: [idev] UDS.KEYID = 0
1,174,924 ready_for_fw is high
1,174,924 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,630 UART: [idev] Erasing UDS.KEYID = 0
1,199,348 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,411 UART: [ldev] --
1,281,883 UART: [fwproc] Wait for Commands...
1,282,662 UART: [fwproc] Recv command 0x46574c44
1,283,395 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,082 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,674,731 >>> mbox cmd response: success
2,675,944 UART: [afmc] ++
2,676,112 UART: [afmc] CDI.KEYID = 6
2,676,475 UART: [afmc] SUBJECT.KEYID = 7
2,676,901 UART: [afmc] AUTHORITY.KEYID = 5
2,712,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,490 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,210 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,103 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,796 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,643 UART: [afmc] --
2,755,625 UART: [cold-reset] --
2,756,625 UART: [state] Locking Datavault
2,757,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,344 UART: [state] Locking ICCM
2,758,914 UART: [exit] Launching FMC @ 0x40000000
2,764,211 UART:
2,764,227 UART: Running Caliptra FMC ...
2,764,635 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,495 ready_for_fw is high
1,056,495 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,211 >>> mbox cmd response: success
2,585,244 UART:
2,585,260 UART: Running Caliptra FMC ...
2,585,668 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,595 UART: [cold-reset] ++
1,170,127 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,174,083 ready_for_fw is high
1,174,083 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,198,703 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,554 UART: [ldev] ++
1,208,722 UART: [ldev] CDI.KEYID = 6
1,209,086 UART: [ldev] SUBJECT.KEYID = 5
1,209,513 UART: [ldev] AUTHORITY.KEYID = 7
1,209,976 UART: [ldev] FE.KEYID = 1
1,215,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,542 UART: [fwproc] Wait for Commands...
1,282,191 UART: [fwproc] Recv command 0x46574c44
1,282,924 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,525 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,170 >>> mbox cmd response: success
2,673,243 UART: [afmc] ++
2,673,411 UART: [afmc] CDI.KEYID = 6
2,673,774 UART: [afmc] SUBJECT.KEYID = 7
2,674,200 UART: [afmc] AUTHORITY.KEYID = 5
2,709,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,971 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,691 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,584 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,277 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,220 UART: [afmc] --
2,753,228 UART: [cold-reset] --
2,754,104 UART: [state] Locking Datavault
2,755,379 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,983 UART: [state] Locking ICCM
2,756,439 UART: [exit] Launching FMC @ 0x40000000
2,761,736 UART:
2,761,752 UART: Running Caliptra FMC ...
2,762,160 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,234 ready_for_fw is high
1,056,234 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,482 >>> mbox cmd response: success
2,583,509 UART:
2,583,525 UART: Running Caliptra FMC ...
2,583,933 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,575 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,654 UART: [idev] ++
1,173,822 UART: [idev] CDI.KEYID = 6
1,174,183 UART: [idev] SUBJECT.KEYID = 7
1,174,608 UART: [idev] UDS.KEYID = 0
1,174,954 ready_for_fw is high
1,174,954 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,566 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,409 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,537 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,710 UART: [fwproc] Recv command 0x46574c44
1,283,443 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,872 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,475 >>> mbox cmd response: success
2,674,522 UART: [afmc] ++
2,674,690 UART: [afmc] CDI.KEYID = 6
2,675,053 UART: [afmc] SUBJECT.KEYID = 7
2,675,479 UART: [afmc] AUTHORITY.KEYID = 5
2,711,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,426 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,146 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,039 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,732 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,547 UART: [afmc] --
2,755,465 UART: [cold-reset] --
2,756,361 UART: [state] Locking Datavault
2,757,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,160 UART: [state] Locking ICCM
2,758,780 UART: [exit] Launching FMC @ 0x40000000
2,764,077 UART:
2,764,093 UART: Running Caliptra FMC ...
2,764,501 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,951 ready_for_fw is high
1,055,951 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,081 >>> mbox cmd response: success
2,585,166 UART:
2,585,182 UART: Running Caliptra FMC ...
2,585,590 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
891,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,823 UART: [kat] ++
895,975 UART: [kat] sha1
900,295 UART: [kat] SHA2-256
902,235 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
917,070 UART: [kat] HMAC-384Kdf
921,760 UART: [kat] LMS
1,170,072 UART: [kat] --
1,171,119 UART: [cold-reset] ++
1,171,693 UART: [fht] FHT @ 0x50003400
1,174,419 UART: [idev] ++
1,174,587 UART: [idev] CDI.KEYID = 6
1,174,948 UART: [idev] SUBJECT.KEYID = 7
1,175,373 UART: [idev] UDS.KEYID = 0
1,175,719 ready_for_fw is high
1,175,719 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,845 UART: [idev] Sha1 KeyId Algorithm
1,208,571 UART: [idev] --
1,209,728 UART: [ldev] ++
1,209,896 UART: [ldev] CDI.KEYID = 6
1,210,260 UART: [ldev] SUBJECT.KEYID = 5
1,210,687 UART: [ldev] AUTHORITY.KEYID = 7
1,211,150 UART: [ldev] FE.KEYID = 1
1,216,396 UART: [ldev] Erasing FE.KEYID = 1
1,242,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,438 UART: [ldev] --
1,281,820 UART: [fwproc] Wait for Commands...
1,282,587 UART: [fwproc] Recv command 0x46574c44
1,283,320 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,063 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,146 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,684 >>> mbox cmd response: success
2,674,847 UART: [afmc] ++
2,675,015 UART: [afmc] CDI.KEYID = 6
2,675,378 UART: [afmc] SUBJECT.KEYID = 7
2,675,804 UART: [afmc] AUTHORITY.KEYID = 5
2,711,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,559 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,279 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,172 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,865 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,776 UART: [afmc] --
2,754,858 UART: [cold-reset] --
2,755,860 UART: [state] Locking Datavault
2,756,959 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,563 UART: [state] Locking ICCM
2,758,011 UART: [exit] Launching FMC @ 0x40000000
2,763,308 UART:
2,763,324 UART: Running Caliptra FMC ...
2,763,732 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,158 ready_for_fw is high
1,056,158 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,918 >>> mbox cmd response: success
2,586,173 UART:
2,586,189 UART: Running Caliptra FMC ...
2,586,597 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,228 UART: [kat] SHA2-256
902,168 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,008 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,172,850 UART: [idev] ++
1,173,018 UART: [idev] CDI.KEYID = 6
1,173,379 UART: [idev] SUBJECT.KEYID = 7
1,173,804 UART: [idev] UDS.KEYID = 0
1,174,150 ready_for_fw is high
1,174,150 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,812 UART: [idev] Erasing UDS.KEYID = 0
1,198,612 UART: [idev] Sha1 KeyId Algorithm
1,207,374 UART: [idev] --
1,208,309 UART: [ldev] ++
1,208,477 UART: [ldev] CDI.KEYID = 6
1,208,841 UART: [ldev] SUBJECT.KEYID = 5
1,209,268 UART: [ldev] AUTHORITY.KEYID = 7
1,209,731 UART: [ldev] FE.KEYID = 1
1,215,081 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,933 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,898 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,515 >>> mbox cmd response: success
2,674,766 UART: [afmc] ++
2,674,934 UART: [afmc] CDI.KEYID = 6
2,675,297 UART: [afmc] SUBJECT.KEYID = 7
2,675,723 UART: [afmc] AUTHORITY.KEYID = 5
2,710,865 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,350 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,070 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,963 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,656 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,429 UART: [afmc] --
2,754,329 UART: [cold-reset] --
2,755,317 UART: [state] Locking Datavault
2,756,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,928 UART: [state] Locking ICCM
2,757,552 UART: [exit] Launching FMC @ 0x40000000
2,762,849 UART:
2,762,865 UART: Running Caliptra FMC ...
2,763,273 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,831 ready_for_fw is high
1,055,831 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,159 >>> mbox cmd response: success
2,586,226 UART:
2,586,242 UART: Running Caliptra FMC ...
2,586,650 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
2,223,324 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,364,232 UART:
2,364,666 UART: Running Caliptra ROM ...
2,365,742 UART:
2,365,898 UART: [state] CFI Enabled
2,366,873 UART: [state] LifecycleState = Unprovisioned
2,368,529 UART: [state] DebugLocked = No
2,369,553 UART: [state] WD Timer not started. Device not locked for debugging
2,372,017 UART: [fake-rom-cold-reset] ++
2,373,046 UART: [fht] FHT @ 0x50003400
2,374,077 UART: [fwproc] Wait for Commands...
2,375,386 UART: [fwproc] Recv command 0x46574c44
2,376,739 UART: [fwproc] Recv'd Img size: 111408 bytes
3,779,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,855,094 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,965,124 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,548,967 >>> mbox cmd response: success
4,555,011 UART: [fake-rom-cold-reset] --
4,558,238 UART: [state] Locking Datavault
4,561,360 UART: [state] Locking PCR0, PCR1 and PCR31
4,563,548 UART: [state] Locking ICCM
4,565,991 UART: [exit] Launching FMC @ 0x40000000
4,574,746 UART:
4,574,995 UART: Running Caliptra FMC ...
4,576,124 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,214,015 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,354,711 UART:
2,355,113 UART: Running Caliptra ROM ...
2,356,273 UART:
2,356,444 UART: [state] CFI Enabled
2,357,410 UART: [state] LifecycleState = Unprovisioned
2,359,422 UART: [state] DebugLocked = No
2,360,542 UART: [state] WD Timer not started. Device not locked for debugging
2,363,039 UART: [fake-rom-cold-reset] ++
2,364,148 UART: [fht] FHT @ 0x50003400
2,365,174 UART: [fwproc] Wait for Commands...
2,366,454 UART: [fwproc] Recv command 0x46574c44
2,367,884 UART: [fwproc] Recv'd Img size: 111408 bytes
3,775,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,850,763 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,960,739 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,545,594 >>> mbox cmd response: success
4,551,628 UART: [fake-rom-cold-reset] --
4,554,348 UART: [state] Locking Datavault
4,560,124 UART: [state] Locking PCR0, PCR1 and PCR31
4,562,315 UART: [state] Locking ICCM
4,564,320 UART: [exit] Launching FMC @ 0x40000000
4,573,041 UART:
4,573,295 UART: Running Caliptra FMC ...
4,574,367 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,234,811 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,375,588 UART:
2,376,034 UART: Running Caliptra ROM ...
2,377,207 UART:
2,377,374 UART: [state] CFI Enabled
2,378,329 UART: [state] LifecycleState = Unprovisioned
2,379,979 UART: [state] DebugLocked = No
2,381,081 UART: [state] WD Timer not started. Device not locked for debugging
2,383,549 UART: [fake-rom-cold-reset] ++
2,384,650 UART: [fht] FHT @ 0x50003400
2,385,630 UART: [fwproc] Wait for Commands...
2,386,909 UART: [fwproc] Recv command 0x46574c44
2,388,330 UART: [fwproc] Recv'd Img size: 111408 bytes
3,790,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,862,041 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,972,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,556,796 >>> mbox cmd response: success
4,562,828 UART: [fake-rom-cold-reset] --
4,566,848 UART: [state] Locking Datavault
4,570,241 UART: [state] Locking PCR0, PCR1 and PCR31
4,572,427 UART: [state] Locking ICCM
4,573,753 UART: [exit] Launching FMC @ 0x40000000
4,582,479 UART:
4,582,727 UART: Running Caliptra FMC ...
4,583,857 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
2,222,521 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,363,318 UART:
2,363,741 UART: Running Caliptra ROM ...
2,364,911 UART:
2,365,081 UART: [state] CFI Enabled
2,366,012 UART: [state] LifecycleState = Unprovisioned
2,367,659 UART: [state] DebugLocked = No
2,368,762 UART: [state] WD Timer not started. Device not locked for debugging
2,371,228 UART: [fake-rom-cold-reset] ++
2,372,243 UART: [fht] FHT @ 0x50003400
2,373,184 UART: [fwproc] Wait for Commands...
2,374,470 UART: [fwproc] Recv command 0x46574c44
2,375,806 UART: [fwproc] Recv'd Img size: 111408 bytes
3,782,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,861,589 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,971,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,556,270 >>> mbox cmd response: success
4,562,320 UART: [fake-rom-cold-reset] --
4,567,208 UART: [state] Locking Datavault
4,572,410 UART: [state] Locking PCR0, PCR1 and PCR31
4,574,601 UART: [state] Locking ICCM
4,577,533 UART: [exit] Launching FMC @ 0x40000000
4,586,326 UART:
4,586,572 UART: Running Caliptra FMC ...
4,587,620 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,223,838 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,365,188 UART:
2,365,600 UART: Running Caliptra ROM ...
2,366,770 UART:
2,366,944 UART: [state] CFI Enabled
2,367,919 UART: [state] LifecycleState = Unprovisioned
2,369,582 UART: [state] DebugLocked = No
2,370,638 UART: [state] WD Timer not started. Device not locked for debugging
2,373,132 UART: [fake-rom-cold-reset] ++
2,374,246 UART: [fht] FHT @ 0x50003400
2,375,280 UART: [fwproc] Wait for Commands...
2,376,561 UART: [fwproc] Recv command 0x46574c44
2,377,994 UART: [fwproc] Recv'd Img size: 111752 bytes
3,817,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,890,734 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,950,792 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,268,424 >>> mbox cmd response: success
4,274,275 UART: [fake-rom-cold-reset] --
4,278,265 UART: [state] Locking Datavault
4,283,489 UART: [state] Locking PCR0, PCR1 and PCR31
4,285,095 UART: [state] Locking ICCM
4,287,599 UART: [exit] Launching FMC @ 0x40000000
4,295,813 UART:
4,296,068 UART: Running Caliptra FMC ...
4,297,228 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
2,220,875 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,362,804 UART:
2,363,280 UART: Running Caliptra ROM ...
2,364,357 UART:
2,364,514 UART: [state] CFI Enabled
2,365,398 UART: [state] LifecycleState = Unprovisioned
2,367,054 UART: [state] DebugLocked = No
2,368,118 UART: [state] WD Timer not started. Device not locked for debugging
2,370,602 UART: [fake-rom-cold-reset] ++
2,371,732 UART: [fht] FHT @ 0x50003400
2,372,770 UART: [fwproc] Wait for Commands...
2,374,056 UART: [fwproc] Recv command 0x46574c44
2,375,488 UART: [fwproc] Recv'd Img size: 111752 bytes
3,818,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,891,511 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,951,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,268,287 >>> mbox cmd response: success
4,274,110 UART: [fake-rom-cold-reset] --
4,277,792 UART: [state] Locking Datavault
4,282,296 UART: [state] Locking PCR0, PCR1 and PCR31
4,283,937 UART: [state] Locking ICCM
4,286,183 UART: [exit] Launching FMC @ 0x40000000
4,294,402 UART:
4,294,667 UART: Running Caliptra FMC ...
4,295,806 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
2,222,500 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,363,904 UART:
2,364,334 UART: Running Caliptra ROM ...
2,365,447 UART:
2,365,612 UART: [state] CFI Enabled
2,366,593 UART: [state] LifecycleState = Unprovisioned
2,368,251 UART: [state] DebugLocked = No
2,369,373 UART: [state] WD Timer not started. Device not locked for debugging
2,371,766 UART: [fake-rom-cold-reset] ++
2,372,868 UART: [fht] FHT @ 0x50003400
2,373,917 UART: [fwproc] Wait for Commands...
2,375,197 UART: [fwproc] Recv command 0x46574c44
2,376,625 UART: [fwproc] Recv'd Img size: 111752 bytes
3,810,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,882,094 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,942,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,259,203 >>> mbox cmd response: success
4,265,028 UART: [fake-rom-cold-reset] --
4,267,033 UART: [state] Locking Datavault
4,271,793 UART: [state] Locking PCR0, PCR1 and PCR31
4,273,397 UART: [state] Locking ICCM
4,275,712 UART: [exit] Launching FMC @ 0x40000000
4,283,911 UART:
4,284,158 UART: Running Caliptra FMC ...
4,285,209 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,222,386 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,363,748 UART:
2,364,176 UART: Running Caliptra ROM ...
2,365,364 UART:
2,365,535 UART: [state] CFI Enabled
2,366,519 UART: [state] LifecycleState = Unprovisioned
2,368,167 UART: [state] DebugLocked = No
2,369,274 UART: [state] WD Timer not started. Device not locked for debugging
2,371,746 UART: [fake-rom-cold-reset] ++
2,372,851 UART: [fht] FHT @ 0x50003400
2,373,879 UART: [fwproc] Wait for Commands...
2,375,160 UART: [fwproc] Recv command 0x46574c44
2,376,586 UART: [fwproc] Recv'd Img size: 111752 bytes
3,819,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,890,781 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,950,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,267,270 >>> mbox cmd response: success
4,273,097 UART: [fake-rom-cold-reset] --
4,276,222 UART: [state] Locking Datavault
4,281,041 UART: [state] Locking PCR0, PCR1 and PCR31
4,282,650 UART: [state] Locking ICCM
4,285,110 UART: [exit] Launching FMC @ 0x40000000
4,293,325 UART:
4,293,583 UART: Running Caliptra FMC ...
4,294,723 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
2,216,730 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,358,705 UART:
2,359,139 UART: Running Caliptra ROM ...
2,360,227 UART:
2,360,380 UART: [state] CFI Enabled
2,361,368 UART: [state] LifecycleState = Unprovisioned
2,363,047 UART: [state] DebugLocked = No
2,364,077 UART: [state] WD Timer not started. Device not locked for debugging
2,366,546 UART: [fake-rom-cold-reset] ++
2,367,576 UART: [fht] FHT @ 0x50003400
2,368,550 UART: [fwproc] Wait for Commands...
2,369,839 UART: [fwproc] Recv command 0x46574c44
2,371,180 UART: [fwproc] Recv'd Img size: 111752 bytes
3,815,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,887,908 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,947,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,264,745 >>> mbox cmd response: success
4,270,597 UART: [fake-rom-cold-reset] --
4,272,941 UART: [state] Locking Datavault
4,279,221 UART: [state] Locking PCR0, PCR1 and PCR31
4,280,836 UART: [state] Locking ICCM
4,282,372 UART: [exit] Launching FMC @ 0x40000000
4,290,610 UART:
4,290,864 UART: Running Caliptra FMC ...
4,292,000 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,228,595 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,369,736 UART:
2,370,139 UART: Running Caliptra ROM ...
2,371,301 UART:
2,371,485 UART: [state] CFI Enabled
2,372,669 UART: [state] LifecycleState = Unprovisioned
2,374,337 UART: [state] DebugLocked = No
2,375,453 UART: [state] WD Timer not started. Device not locked for debugging
2,377,932 UART: [fake-rom-cold-reset] ++
2,379,044 UART: [fht] FHT @ 0x50003400
2,380,084 UART: [fwproc] Wait for Commands...
2,381,368 UART: [fwproc] Recv command 0x46574c44
2,382,819 UART: [fwproc] Recv'd Img size: 111752 bytes
3,817,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,887,995 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,948,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,265,978 >>> mbox cmd response: success
4,271,830 UART: [fake-rom-cold-reset] --
4,275,611 UART: [state] Locking Datavault
4,281,557 UART: [state] Locking PCR0, PCR1 and PCR31
4,283,162 UART: [state] Locking ICCM
4,284,393 UART: [exit] Launching FMC @ 0x40000000
4,292,572 UART:
4,292,862 UART: Running Caliptra FMC ...
4,293,923 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
2,224,395 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,365,621 UART:
2,366,032 UART: Running Caliptra ROM ...
2,367,122 UART:
2,367,274 UART: [state] CFI Enabled
2,368,258 UART: [state] LifecycleState = Unprovisioned
2,369,906 UART: [state] DebugLocked = No
2,370,936 UART: [state] WD Timer not started. Device not locked for debugging
2,373,398 UART: [fake-rom-cold-reset] ++
2,374,640 UART: [fht] FHT @ 0x50003400
2,375,632 UART: [fwproc] Wait for Commands...
2,376,932 UART: [fwproc] Recv command 0x46574c44
2,378,282 UART: [fwproc] Recv'd Img size: 111752 bytes
3,820,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,892,772 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,952,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,270,280 >>> mbox cmd response: success
4,276,115 UART: [fake-rom-cold-reset] --
4,281,013 UART: [state] Locking Datavault
4,287,807 UART: [state] Locking PCR0, PCR1 and PCR31
4,289,411 UART: [state] Locking ICCM
4,291,983 UART: [exit] Launching FMC @ 0x40000000
4,300,165 UART:
4,300,452 UART: Running Caliptra FMC ...
4,301,517 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,220,698 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,362,108 UART:
2,362,538 UART: Running Caliptra ROM ...
2,363,662 UART:
2,363,826 UART: [state] CFI Enabled
2,364,808 UART: [state] LifecycleState = Unprovisioned
2,366,459 UART: [state] DebugLocked = No
2,367,559 UART: [state] WD Timer not started. Device not locked for debugging
2,370,031 UART: [fake-rom-cold-reset] ++
2,371,138 UART: [fht] FHT @ 0x50003400
2,372,171 UART: [fwproc] Wait for Commands...
2,373,447 UART: [fwproc] Recv command 0x46574c44
2,374,871 UART: [fwproc] Recv'd Img size: 111752 bytes
3,808,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,880,564 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,940,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,257,784 >>> mbox cmd response: success
4,263,652 UART: [fake-rom-cold-reset] --
4,267,039 UART: [state] Locking Datavault
4,271,944 UART: [state] Locking PCR0, PCR1 and PCR31
4,273,537 UART: [state] Locking ICCM
4,275,433 UART: [exit] Launching FMC @ 0x40000000
4,283,631 UART:
4,283,877 UART: Running Caliptra FMC ...
4,284,933 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [fake-rom-cold-reset] ++
88,986 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,126 UART: [fht] FHT @ 0x50003400
92,575 UART: [fwproc] Wait for Commands...
93,342 UART: [fwproc] Recv command 0x46574c44
94,070 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,485 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,673 >>> mbox cmd response: success
1,546,831 UART: [fake-rom-cold-reset] --
1,547,707 UART: [state] Locking Datavault
1,548,722 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,326 UART: [state] Locking ICCM
1,549,842 UART: [exit] Launching FMC @ 0x40000000
1,555,139 UART:
1,555,155 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [fake-rom-cold-reset] ++
88,548 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,864 UART: [fht] FHT @ 0x50003400
92,147 UART: [fwproc] Wait for Commands...
92,794 UART: [fwproc] Recv command 0x46574c44
93,522 UART: [fwproc] Recv'd Img size: 111752 bytes
1,356,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,135 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,817 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,544,471 >>> mbox cmd response: success
1,545,629 UART: [fake-rom-cold-reset] --
1,546,343 UART: [state] Locking Datavault
1,547,320 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,924 UART: [state] Locking ICCM
1,548,368 UART: [exit] Launching FMC @ 0x40000000
1,553,665 UART:
1,553,681 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,897 UART: [state] WD Timer not started. Device not locked for debugging
88,495 UART: [fake-rom-cold-reset] ++
89,423 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,607 UART: [fht] FHT @ 0x50003400
93,048 UART: [fwproc] Wait for Commands...
93,887 UART: [fwproc] Recv command 0x46574c44
94,615 UART: [fwproc] Recv'd Img size: 111752 bytes
1,359,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,236 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,918 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,546,498 >>> mbox cmd response: success
1,547,656 UART: [fake-rom-cold-reset] --
1,548,486 UART: [state] Locking Datavault
1,549,889 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,493 UART: [state] Locking ICCM
1,551,149 UART: [exit] Launching FMC @ 0x40000000
1,556,446 UART:
1,556,462 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [fake-rom-cold-reset] ++
88,971 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,243 UART: [fht] FHT @ 0x50003400
92,560 UART: [fwproc] Wait for Commands...
93,177 UART: [fwproc] Recv command 0x46574c44
93,905 UART: [fwproc] Recv'd Img size: 111752 bytes
1,358,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,112 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,794 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,546,254 >>> mbox cmd response: success
1,547,412 UART: [fake-rom-cold-reset] --
1,548,200 UART: [state] Locking Datavault
1,549,319 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,923 UART: [state] Locking ICCM
1,550,515 UART: [exit] Launching FMC @ 0x40000000
1,555,812 UART:
1,555,828 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
88,136 UART: [fake-rom-cold-reset] ++
89,064 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,302 UART: [fht] FHT @ 0x50003400
92,683 UART: [fwproc] Wait for Commands...
93,280 UART: [fwproc] Recv command 0x46574c44
94,008 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,647 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,547,015 >>> mbox cmd response: success
1,548,173 UART: [fake-rom-cold-reset] --
1,549,031 UART: [state] Locking Datavault
1,550,388 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,992 UART: [state] Locking ICCM
1,551,558 UART: [exit] Launching FMC @ 0x40000000
1,556,855 UART:
1,556,871 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [fake-rom-cold-reset] ++
88,844 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,948 UART: [fht] FHT @ 0x50003400
92,403 UART: [fwproc] Wait for Commands...
93,214 UART: [fwproc] Recv command 0x46574c44
93,942 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,369 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,544,751 >>> mbox cmd response: success
1,545,909 UART: [fake-rom-cold-reset] --
1,546,727 UART: [state] Locking Datavault
1,547,730 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,334 UART: [state] Locking ICCM
1,548,836 UART: [exit] Launching FMC @ 0x40000000
1,554,133 UART:
1,554,149 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Unprovisioned
85,548 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [fake-rom-cold-reset] ++
88,551 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,855 UART: [fht] FHT @ 0x50003400
92,118 UART: [fwproc] Wait for Commands...
92,819 UART: [fwproc] Recv command 0x46574c44
93,547 UART: [fwproc] Recv'd Img size: 111752 bytes
1,356,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,070 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,544,442 >>> mbox cmd response: success
1,545,600 UART: [fake-rom-cold-reset] --
1,546,276 UART: [state] Locking Datavault
1,547,471 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,075 UART: [state] Locking ICCM
1,548,643 UART: [exit] Launching FMC @ 0x40000000
1,553,940 UART:
1,553,956 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,863 UART: [state] WD Timer not started. Device not locked for debugging
88,499 UART: [fake-rom-cold-reset] ++
89,427 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,641 UART: [fht] FHT @ 0x50003400
92,916 UART: [fwproc] Wait for Commands...
93,547 UART: [fwproc] Recv command 0x46574c44
94,275 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,186 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,502 >>> mbox cmd response: success
1,546,660 UART: [fake-rom-cold-reset] --
1,547,466 UART: [state] Locking Datavault
1,548,851 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,455 UART: [state] Locking ICCM
1,549,933 UART: [exit] Launching FMC @ 0x40000000
1,555,230 UART:
1,555,246 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [fake-rom-cold-reset] ++
88,434 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,744 UART: [fht] FHT @ 0x50003400
91,979 UART: [fwproc] Wait for Commands...
92,708 UART: [fwproc] Recv command 0x46574c44
93,436 UART: [fwproc] Recv'd Img size: 111752 bytes
1,356,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,101 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,544,233 >>> mbox cmd response: success
1,545,391 UART: [fake-rom-cold-reset] --
1,546,175 UART: [state] Locking Datavault
1,547,262 UART: [state] Locking PCR0, PCR1 and PCR31
1,547,866 UART: [state] Locking ICCM
1,548,520 UART: [exit] Launching FMC @ 0x40000000
1,553,817 UART:
1,553,833 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [fake-rom-cold-reset] ++
88,636 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,756 UART: [fht] FHT @ 0x50003400
92,219 UART: [fwproc] Wait for Commands...
92,880 UART: [fwproc] Recv command 0x46574c44
93,608 UART: [fwproc] Recv'd Img size: 111752 bytes
1,356,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,601 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,544,979 >>> mbox cmd response: success
1,546,137 UART: [fake-rom-cold-reset] --
1,546,905 UART: [state] Locking Datavault
1,548,054 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,658 UART: [state] Locking ICCM
1,549,174 UART: [exit] Launching FMC @ 0x40000000
1,554,471 UART:
1,554,487 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,899 UART: [state] LifecycleState = Unprovisioned
85,558 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [fake-rom-cold-reset] ++
88,439 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,709 UART: [fht] FHT @ 0x50003400
91,976 UART: [fwproc] Wait for Commands...
92,673 UART: [fwproc] Recv command 0x46574c44
93,401 UART: [fwproc] Recv'd Img size: 111752 bytes
1,356,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,134 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,398 >>> mbox cmd response: success
1,546,556 UART: [fake-rom-cold-reset] --
1,547,454 UART: [state] Locking Datavault
1,548,637 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,241 UART: [state] Locking ICCM
1,549,767 UART: [exit] Launching FMC @ 0x40000000
1,555,064 UART:
1,555,080 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [fake-rom-cold-reset] ++
89,269 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,595 UART: [fht] FHT @ 0x50003400
92,864 UART: [fwproc] Wait for Commands...
93,611 UART: [fwproc] Recv command 0x46574c44
94,339 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,526 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,544,660 >>> mbox cmd response: success
1,545,818 UART: [fake-rom-cold-reset] --
1,546,672 UART: [state] Locking Datavault
1,547,939 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,543 UART: [state] Locking ICCM
1,549,127 UART: [exit] Launching FMC @ 0x40000000
1,554,424 UART:
1,554,440 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,126 UART:
192,507 UART: Running Caliptra ROM ...
193,687 UART:
193,837 UART: [state] CFI Enabled
263,838 UART: [state] LifecycleState = Production
266,054 UART: [state] DebugLocked = No
267,869 UART: [state] WD Timer not started. Device not locked for debugging
273,519 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,362 UART:
192,729 UART: Running Caliptra ROM ...
193,949 UART:
194,099 UART: [state] CFI Enabled
263,209 UART: [state] LifecycleState = Production
265,482 UART: [state] DebugLocked = No
268,371 UART: [state] WD Timer not started. Device not locked for debugging
274,088 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,499 UART:
192,893 UART: Running Caliptra ROM ...
194,024 UART:
604,014 UART: [state] CFI Enabled
617,245 UART: [state] LifecycleState = Production
619,422 UART: [state] DebugLocked = No
621,563 UART: [state] WD Timer not started. Device not locked for debugging
626,794 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,415 UART:
192,793 UART: Running Caliptra ROM ...
194,024 UART:
603,837 UART: [state] CFI Enabled
617,988 UART: [state] LifecycleState = Production
620,231 UART: [state] DebugLocked = No
622,678 UART: [state] WD Timer not started. Device not locked for debugging
627,232 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,241 UART:
192,603 UART: Running Caliptra ROM ...
193,790 UART:
193,941 UART: [state] CFI Enabled
263,075 UART: [state] LifecycleState = Production
264,722 UART: [state] DebugLocked = No
266,968 UART: [state] WD Timer not started. Device not locked for debugging
271,632 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,576 UART:
193,000 UART: Running Caliptra ROM ...
194,140 UART:
194,287 UART: [state] CFI Enabled
261,556 UART: [state] LifecycleState = Production
263,186 UART: [state] DebugLocked = No
265,533 UART: [state] WD Timer not started. Device not locked for debugging
268,846 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
192,492 UART:
192,868 UART: Running Caliptra ROM ...
194,073 UART:
603,587 UART: [state] CFI Enabled
619,478 UART: [state] LifecycleState = Production
621,039 UART: [state] DebugLocked = No
622,476 UART: [state] WD Timer not started. Device not locked for debugging
626,176 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,425 UART:
192,788 UART: Running Caliptra ROM ...
193,980 UART:
603,550 UART: [state] CFI Enabled
618,558 UART: [state] LifecycleState = Production
620,135 UART: [state] DebugLocked = No
622,963 UART: [state] WD Timer not started. Device not locked for debugging
628,649 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
192,253 UART:
192,625 UART: Running Caliptra ROM ...
193,810 UART:
193,964 UART: [state] CFI Enabled
262,789 UART: [state] LifecycleState = Production
264,401 UART: [state] DebugLocked = No
266,641 UART: [state] WD Timer not started. Device not locked for debugging
272,984 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,116 UART:
192,521 UART: Running Caliptra ROM ...
193,650 UART:
193,800 UART: [state] CFI Enabled
260,024 UART: [state] LifecycleState = Production
261,659 UART: [state] DebugLocked = No
262,873 UART: [state] WD Timer not started. Device not locked for debugging
266,289 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
192,541 UART:
192,923 UART: Running Caliptra ROM ...
194,020 UART:
603,668 UART: [state] CFI Enabled
617,269 UART: [state] LifecycleState = Production
618,904 UART: [state] DebugLocked = No
620,870 UART: [state] WD Timer not started. Device not locked for debugging
625,423 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,481 UART:
192,850 UART: Running Caliptra ROM ...
194,049 UART:
603,369 UART: [state] CFI Enabled
614,381 UART: [state] LifecycleState = Production
615,961 UART: [state] DebugLocked = No
617,870 UART: [state] WD Timer not started. Device not locked for debugging
622,045 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Production
85,805 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Production
86,203 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
88,331 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
86,027 UART: [state] LifecycleState = Production
86,642 UART: [state] DebugLocked = No
87,259 UART: [state] WD Timer not started. Device not locked for debugging
88,718 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Production
85,592 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Production
85,415 UART: [state] DebugLocked = No
86,036 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,640 UART: [state] LifecycleState = Production
85,255 UART: [state] DebugLocked = No
85,884 UART: [state] WD Timer not started. Device not locked for debugging
87,365 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Production
86,292 UART: [state] DebugLocked = No
86,963 UART: [state] WD Timer not started. Device not locked for debugging
88,546 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Production
85,750 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Production
85,801 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Production
85,969 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Production
85,854 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,695 UART: [state] LifecycleState = Production
86,310 UART: [state] DebugLocked = No
86,861 UART: [state] WD Timer not started. Device not locked for debugging
88,414 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,059 UART:
192,433 UART: Running Caliptra ROM ...
193,660 UART:
193,809 UART: [state] CFI Enabled
265,593 UART: [state] LifecycleState = Production
267,834 UART: Fake ROM in Prod lifecycle disabled
269,836 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,513 writing to cptra_bootfsm_go
193,819 UART:
194,181 UART: Running Caliptra ROM ...
195,420 UART:
195,576 UART: [state] CFI Enabled
263,856 UART: [state] LifecycleState = Production
266,080 UART: Fake ROM in Prod lifecycle disabled
268,075 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,538 UART:
192,901 UART: Running Caliptra ROM ...
194,061 UART:
603,928 UART: [state] CFI Enabled
618,013 UART: [state] LifecycleState = Production
620,199 UART: Fake ROM in Prod lifecycle disabled
622,231 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
192,481 UART:
192,856 UART: Running Caliptra ROM ...
193,998 UART:
603,964 UART: [state] CFI Enabled
613,147 UART: [state] LifecycleState = Production
615,366 UART: Fake ROM in Prod lifecycle disabled
617,357 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,315 UART:
192,686 UART: Running Caliptra ROM ...
193,870 UART:
194,025 UART: [state] CFI Enabled
260,503 UART: [state] LifecycleState = Production
262,151 UART: Fake ROM in Prod lifecycle disabled
263,662 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,338 UART:
192,689 UART: Running Caliptra ROM ...
193,868 UART:
194,026 UART: [state] CFI Enabled
262,255 UART: [state] LifecycleState = Production
263,927 UART: Fake ROM in Prod lifecycle disabled
265,432 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,452 UART:
192,856 UART: Running Caliptra ROM ...
193,968 UART:
603,405 UART: [state] CFI Enabled
613,445 UART: [state] LifecycleState = Production
615,091 UART: Fake ROM in Prod lifecycle disabled
616,588 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,420 UART:
192,776 UART: Running Caliptra ROM ...
193,895 UART:
603,597 UART: [state] CFI Enabled
614,759 UART: [state] LifecycleState = Production
616,441 UART: Fake ROM in Prod lifecycle disabled
617,945 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
192,175 UART:
192,592 UART: Running Caliptra ROM ...
193,788 UART:
193,947 UART: [state] CFI Enabled
268,751 UART: [state] LifecycleState = Production
270,442 UART: Fake ROM in Prod lifecycle disabled
271,949 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,230 UART:
192,583 UART: Running Caliptra ROM ...
193,768 UART:
193,924 UART: [state] CFI Enabled
261,373 UART: [state] LifecycleState = Production
263,058 UART: Fake ROM in Prod lifecycle disabled
264,573 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,271 UART:
192,657 UART: Running Caliptra ROM ...
193,779 UART:
603,298 UART: [state] CFI Enabled
618,203 UART: [state] LifecycleState = Production
619,809 UART: Fake ROM in Prod lifecycle disabled
621,305 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,513 UART:
192,902 UART: Running Caliptra ROM ...
194,093 UART:
603,348 UART: [state] CFI Enabled
617,852 UART: [state] LifecycleState = Production
619,430 UART: Fake ROM in Prod lifecycle disabled
620,916 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Production
85,902 UART: Fake ROM in Prod lifecycle disabled
86,496 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Production
86,100 UART: Fake ROM in Prod lifecycle disabled
86,694 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Production
85,765 UART: Fake ROM in Prod lifecycle disabled
86,359 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Production
85,807 UART: Fake ROM in Prod lifecycle disabled
86,401 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Production
86,028 UART: Fake ROM in Prod lifecycle disabled
86,622 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Production
85,862 UART: Fake ROM in Prod lifecycle disabled
86,456 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Production
86,061 UART: Fake ROM in Prod lifecycle disabled
86,655 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Production
86,043 UART: Fake ROM in Prod lifecycle disabled
86,637 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Production
85,594 UART: Fake ROM in Prod lifecycle disabled
86,188 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Production
86,030 UART: Fake ROM in Prod lifecycle disabled
86,624 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,759 UART: [state] LifecycleState = Production
85,367 UART: Fake ROM in Prod lifecycle disabled
85,961 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Production
85,991 UART: Fake ROM in Prod lifecycle disabled
86,585 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,213,521 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,354,302 UART:
2,354,719 UART: Running Caliptra ROM ...
2,355,890 UART:
2,356,069 UART: [state] CFI Enabled
2,357,036 UART: [state] LifecycleState = Unprovisioned
2,358,692 UART: [state] DebugLocked = No
2,359,798 UART: [state] WD Timer not started. Device not locked for debugging
2,362,511 UART: [fake-rom-cold-reset] ++
2,363,634 UART: [fht] FHT @ 0x50003400
2,364,666 UART: [fwproc] Wait for Commands...
2,365,954 UART: [fwproc] Recv command 0x46574c44
2,367,383 UART: [fwproc] Recv'd Img size: 111408 bytes
3,774,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,851,730 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,961,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,546,104 >>> mbox cmd response: success
4,552,160 UART: [fake-rom-cold-reset] --
4,554,747 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
4,694,802 UART: [state] Locking Datavault
4,696,067 UART: [state] Locking PCR0, PCR1 and PCR31
4,697,546 UART: [state] Locking ICCM
4,698,519 UART: [exit] Launching FMC @ 0x40000000
4,699,868 UART:
4,700,015 UART: Running Caliptra FMC ...
4,701,035 UART:
4,701,187 UART: [fmc] Received command: 0x46574C44
4,702,645 UART:
4,702,801 UART: Running Caliptra ROM ...
4,703,816 UART:
4,703,964 UART: [state] CFI Enabled
4,766,658 UART: [state] LifecycleState = Unprovisioned
4,769,068 UART: [state] DebugLocked = No
4,770,660 UART: [state] WD Timer not started. Device not locked for debugging
4,777,629 UART: [update-reset] ++
6,215,632 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,220,074 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
6,862,716 UART: [update-reset] Copying MAN_2 To MAN_1
6,885,631 UART: [update-reset Success] --
6,887,315 >>> mbox cmd response: success
6,887,556 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,891,344 UART: [state] Locking Datavault
6,895,153 UART: [state] Locking PCR0, PCR1 and PCR31
6,897,297 UART: [state] Locking ICCM
6,900,261 UART: [exit] Launching FMC @ 0x40000000
6,909,051 UART:
6,909,292 UART: Running Caliptra FMC ...
6,910,394 UART:
6,910,550 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,912,203 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,215,300 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,355,919 UART:
2,356,307 UART: Running Caliptra ROM ...
2,357,382 UART:
2,357,541 UART: [state] CFI Enabled
2,358,762 UART: [state] LifecycleState = Unprovisioned
2,360,443 UART: [state] DebugLocked = No
2,361,555 UART: [state] WD Timer not started. Device not locked for debugging
2,364,043 UART: [fake-rom-cold-reset] ++
2,365,158 UART: [fht] FHT @ 0x50003400
2,366,189 UART: [fwproc] Wait for Commands...
2,367,468 UART: [fwproc] Recv command 0x46574c44
2,368,894 UART: [fwproc] Recv'd Img size: 111408 bytes
3,778,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,851,861 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,961,878 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,545,523 >>> mbox cmd response: success
4,551,578 UART: [fake-rom-cold-reset] --
4,554,102 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
4,694,122 UART: [state] Locking Datavault
4,695,382 UART: [state] Locking PCR0, PCR1 and PCR31
4,696,936 UART: [state] Locking ICCM
4,697,842 UART: [exit] Launching FMC @ 0x40000000
4,699,266 UART:
4,699,434 UART: Running Caliptra FMC ...
4,700,530 UART:
4,700,688 UART: [fmc] Received command: 0x46574C44
4,702,145 UART:
4,702,301 UART: Running Caliptra ROM ...
4,703,393 UART:
4,703,567 UART: [state] CFI Enabled
4,765,369 UART: [state] LifecycleState = Unprovisioned
4,767,732 UART: [state] DebugLocked = No
4,770,415 UART: [state] WD Timer not started. Device not locked for debugging
4,777,829 UART: [update-reset] ++
6,223,957 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,228,250 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
6,869,291 UART: [update-reset] Copying MAN_2 To MAN_1
6,892,207 UART: [update-reset Success] --
6,893,838 >>> mbox cmd response: success
6,894,050 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,896,964 UART: [state] Locking Datavault
6,901,351 UART: [state] Locking PCR0, PCR1 and PCR31
6,903,486 UART: [state] Locking ICCM
6,905,720 UART: [exit] Launching FMC @ 0x40000000
6,914,492 UART:
6,914,753 UART: Running Caliptra FMC ...
6,915,782 UART:
6,915,926 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,917,557 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
2,223,234 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,364,142 UART:
2,364,566 UART: Running Caliptra ROM ...
2,365,682 UART:
2,365,842 UART: [state] CFI Enabled
2,366,797 UART: [state] LifecycleState = Unprovisioned
2,368,455 UART: [state] DebugLocked = No
2,369,560 UART: [state] WD Timer not started. Device not locked for debugging
2,372,025 UART: [fake-rom-cold-reset] ++
2,373,131 UART: [fht] FHT @ 0x50003400
2,374,156 UART: [fwproc] Wait for Commands...
2,375,432 UART: [fwproc] Recv command 0x46574c44
2,376,850 UART: [fwproc] Recv'd Img size: 111408 bytes
3,781,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,858,365 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,968,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,553,245 >>> mbox cmd response: success
4,559,299 UART: [fake-rom-cold-reset] --
4,562,101 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
4,701,986 UART: [state] Locking Datavault
4,703,248 UART: [state] Locking PCR0, PCR1 and PCR31
4,704,797 UART: [state] Locking ICCM
4,705,677 UART: [exit] Launching FMC @ 0x40000000
4,707,019 UART:
4,707,162 UART: Running Caliptra FMC ...
4,708,256 UART:
4,708,410 UART: [fmc] Received command: 0x46574C44
4,709,868 UART:
4,710,018 UART: Running Caliptra ROM ...
4,711,030 UART:
4,711,171 UART: [state] CFI Enabled
4,721,249 UART: [state] LifecycleState = Unprovisioned
4,723,625 UART: [state] DebugLocked = No
4,726,771 UART: [state] WD Timer not started. Device not locked for debugging
4,731,853 UART: [update-reset] ++
6,177,492 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,181,847 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
6,824,463 UART: [update-reset] Copying MAN_2 To MAN_1
6,847,375 UART: [update-reset Success] --
6,849,014 >>> mbox cmd response: success
6,849,227 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,851,102 UART: [state] Locking Datavault
6,855,058 UART: [state] Locking PCR0, PCR1 and PCR31
6,857,194 UART: [state] Locking ICCM
6,858,670 UART: [exit] Launching FMC @ 0x40000000
6,867,494 UART:
6,867,722 UART: Running Caliptra FMC ...
6,868,739 UART:
6,868,899 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,870,524 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
2,221,151 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,362,061 UART:
2,362,478 UART: Running Caliptra ROM ...
2,363,638 UART:
2,363,801 UART: [state] CFI Enabled
2,364,759 UART: [state] LifecycleState = Unprovisioned
2,366,406 UART: [state] DebugLocked = No
2,367,530 UART: [state] WD Timer not started. Device not locked for debugging
2,370,001 UART: [fake-rom-cold-reset] ++
2,371,107 UART: [fht] FHT @ 0x50003400
2,372,129 UART: [fwproc] Wait for Commands...
2,373,402 UART: [fwproc] Recv command 0x46574c44
2,374,816 UART: [fwproc] Recv'd Img size: 111408 bytes
3,787,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,862,481 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,972,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
4,556,877 >>> mbox cmd response: success
4,562,934 UART: [fake-rom-cold-reset] --
4,565,541 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
4,705,451 UART: [state] Locking Datavault
4,706,704 UART: [state] Locking PCR0, PCR1 and PCR31
4,708,168 UART: [state] Locking ICCM
4,709,036 UART: [exit] Launching FMC @ 0x40000000
4,710,482 UART:
4,710,633 UART: Running Caliptra FMC ...
4,711,638 UART:
4,711,775 UART: [fmc] Received command: 0x46574C44
4,713,232 UART:
4,713,381 UART: Running Caliptra ROM ...
4,714,384 UART:
4,714,521 UART: [state] CFI Enabled
4,723,607 UART: [state] LifecycleState = Unprovisioned
4,725,912 UART: [state] DebugLocked = No
4,727,713 UART: [state] WD Timer not started. Device not locked for debugging
4,734,745 UART: [update-reset] ++
6,173,643 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,177,784 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
6,820,427 UART: [update-reset] Copying MAN_2 To MAN_1
6,843,333 UART: [update-reset Success] --
6,845,054 >>> mbox cmd response: success
6,845,307 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,847,254 UART: [state] Locking Datavault
6,851,534 UART: [state] Locking PCR0, PCR1 and PCR31
6,853,662 UART: [state] Locking ICCM
6,856,146 UART: [exit] Launching FMC @ 0x40000000
6,864,744 UART:
6,864,984 UART: Running Caliptra FMC ...
6,866,081 UART:
6,866,236 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,867,851 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
2,224,939 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,366,322 UART:
2,366,755 UART: Running Caliptra ROM ...
2,367,926 UART:
2,368,097 UART: [state] CFI Enabled
2,369,077 UART: [state] LifecycleState = Unprovisioned
2,370,732 UART: [state] DebugLocked = No
2,371,841 UART: [state] WD Timer not started. Device not locked for debugging
2,374,314 UART: [fake-rom-cold-reset] ++
2,375,421 UART: [fht] FHT @ 0x50003400
2,376,454 UART: [fwproc] Wait for Commands...
2,377,736 UART: [fwproc] Recv command 0x46574c44
2,379,165 UART: [fwproc] Recv'd Img size: 111752 bytes
3,820,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,894,504 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,954,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,270,772 >>> mbox cmd response: success
4,276,649 UART: [fake-rom-cold-reset] --
4,279,036 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,419,377 UART: [state] Locking Datavault
4,420,651 UART: [state] Locking PCR0, PCR1 and PCR31
4,422,207 UART: [state] Locking ICCM
4,423,133 UART: [exit] Launching FMC @ 0x40000000
4,424,568 UART:
4,424,732 UART: Running Caliptra FMC ...
4,425,833 UART:
4,425,988 UART: [fmc] Received command: 0x46574C44
4,427,451 UART:
4,427,607 UART: Running Caliptra ROM ...
4,428,703 UART:
4,428,856 UART: [state] CFI Enabled
4,486,635 UART: [state] LifecycleState = Unprovisioned
4,488,412 UART: [state] DebugLocked = No
4,490,291 UART: [state] WD Timer not started. Device not locked for debugging
4,496,625 UART: [update-reset] ++
5,968,302 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,971,938 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,346,977 UART: [update-reset] Copying MAN_2 To MAN_1
6,369,224 UART: [update-reset Success] --
6,370,538 >>> mbox cmd response: success
6,370,758 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,373,668 UART: [state] Locking Datavault
6,375,579 UART: [state] Locking PCR0, PCR1 and PCR31
6,377,183 UART: [state] Locking ICCM
6,378,849 UART: [exit] Launching FMC @ 0x40000000
6,387,088 UART:
6,387,330 UART: Running Caliptra FMC ...
6,388,452 UART:
6,388,611 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,390,244 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,224,426 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,365,751 UART:
2,366,160 UART: Running Caliptra ROM ...
2,367,332 UART:
2,367,506 UART: [state] CFI Enabled
2,368,486 UART: [state] LifecycleState = Unprovisioned
2,370,135 UART: [state] DebugLocked = No
2,371,245 UART: [state] WD Timer not started. Device not locked for debugging
2,373,720 UART: [fake-rom-cold-reset] ++
2,374,827 UART: [fht] FHT @ 0x50003400
2,375,811 UART: [fwproc] Wait for Commands...
2,377,093 UART: [fwproc] Recv command 0x46574c44
2,378,519 UART: [fwproc] Recv'd Img size: 111752 bytes
3,821,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,896,676 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,956,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,274,050 >>> mbox cmd response: success
4,279,893 UART: [fake-rom-cold-reset] --
4,281,910 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,422,262 UART: [state] Locking Datavault
4,423,514 UART: [state] Locking PCR0, PCR1 and PCR31
4,424,984 UART: [state] Locking ICCM
4,425,857 UART: [exit] Launching FMC @ 0x40000000
4,427,288 UART:
4,427,444 UART: Running Caliptra FMC ...
4,428,458 UART:
4,428,600 UART: [fmc] Received command: 0x46574C44
4,430,060 UART:
4,430,221 UART: Running Caliptra ROM ...
4,431,321 UART:
4,431,477 UART: [state] CFI Enabled
4,486,352 UART: [state] LifecycleState = Unprovisioned
4,488,082 UART: [state] DebugLocked = No
4,490,347 UART: [state] WD Timer not started. Device not locked for debugging
4,496,590 UART: [update-reset] ++
5,973,615 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,976,396 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,351,474 UART: [update-reset] Copying MAN_2 To MAN_1
6,373,735 UART: [update-reset Success] --
6,375,003 >>> mbox cmd response: success
6,375,220 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,377,906 UART: [state] Locking Datavault
6,381,550 UART: [state] Locking PCR0, PCR1 and PCR31
6,383,092 UART: [state] Locking ICCM
6,384,056 UART: [exit] Launching FMC @ 0x40000000
6,392,293 UART:
6,392,532 UART: Running Caliptra FMC ...
6,393,634 UART:
6,393,788 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,395,444 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,222,980 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,364,126 UART:
2,364,535 UART: Running Caliptra ROM ...
2,365,701 UART:
2,365,876 UART: [state] CFI Enabled
2,366,847 UART: [state] LifecycleState = Unprovisioned
2,368,487 UART: [state] DebugLocked = No
2,369,594 UART: [state] WD Timer not started. Device not locked for debugging
2,372,458 UART: [fake-rom-cold-reset] ++
2,373,572 UART: [fht] FHT @ 0x50003400
2,374,602 UART: [fwproc] Wait for Commands...
2,375,878 UART: [fwproc] Recv command 0x46574c44
2,377,302 UART: [fwproc] Recv'd Img size: 111752 bytes
3,829,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,905,221 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,965,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,282,838 >>> mbox cmd response: success
4,288,681 UART: [fake-rom-cold-reset] --
4,291,016 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,431,320 UART: [state] Locking Datavault
4,432,582 UART: [state] Locking PCR0, PCR1 and PCR31
4,434,134 UART: [state] Locking ICCM
4,435,044 UART: [exit] Launching FMC @ 0x40000000
4,436,474 UART:
4,436,630 UART: Running Caliptra FMC ...
4,437,765 UART:
4,437,929 UART: [fmc] Received command: 0x46574C44
4,439,390 UART:
4,439,543 UART: Running Caliptra ROM ...
4,440,642 UART:
4,440,818 UART: [state] CFI Enabled
4,443,789 UART: [state] LifecycleState = Unprovisioned
4,445,510 UART: [state] DebugLocked = No
4,447,422 UART: [state] WD Timer not started. Device not locked for debugging
4,455,212 UART: [update-reset] ++
5,926,952 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,929,989 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,304,918 UART: [update-reset] Copying MAN_2 To MAN_1
6,327,148 UART: [update-reset Success] --
6,328,423 >>> mbox cmd response: success
6,328,639 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,332,301 UART: [state] Locking Datavault
6,336,853 UART: [state] Locking PCR0, PCR1 and PCR31
6,338,382 UART: [state] Locking ICCM
6,340,716 UART: [exit] Launching FMC @ 0x40000000
6,348,945 UART:
6,349,198 UART: Running Caliptra FMC ...
6,350,225 UART:
6,350,370 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,352,003 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
2,224,023 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,365,159 UART:
2,365,564 UART: Running Caliptra ROM ...
2,366,645 UART:
2,366,805 UART: [state] CFI Enabled
2,368,128 UART: [state] LifecycleState = Unprovisioned
2,369,794 UART: [state] DebugLocked = No
2,370,823 UART: [state] WD Timer not started. Device not locked for debugging
2,373,309 UART: [fake-rom-cold-reset] ++
2,374,337 UART: [fht] FHT @ 0x50003400
2,375,313 UART: [fwproc] Wait for Commands...
2,376,601 UART: [fwproc] Recv command 0x46574c44
2,377,943 UART: [fwproc] Recv'd Img size: 111752 bytes
3,818,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,891,432 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,951,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,269,161 >>> mbox cmd response: success
4,274,961 UART: [fake-rom-cold-reset] --
4,276,991 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,417,352 UART: [state] Locking Datavault
4,418,619 UART: [state] Locking PCR0, PCR1 and PCR31
4,420,095 UART: [state] Locking ICCM
4,420,976 UART: [exit] Launching FMC @ 0x40000000
4,422,400 UART:
4,422,556 UART: Running Caliptra FMC ...
4,423,569 UART:
4,423,711 UART: [fmc] Received command: 0x46574C44
4,425,174 UART:
4,425,327 UART: Running Caliptra ROM ...
4,426,340 UART:
4,426,486 UART: [state] CFI Enabled
4,432,566 UART: [state] LifecycleState = Unprovisioned
4,434,279 UART: [state] DebugLocked = No
4,436,518 UART: [state] WD Timer not started. Device not locked for debugging
4,442,103 UART: [update-reset] ++
5,915,656 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,919,579 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,294,245 UART: [update-reset] Copying MAN_2 To MAN_1
6,316,520 UART: [update-reset Success] --
6,317,815 >>> mbox cmd response: success
6,318,035 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,319,979 UART: [state] Locking Datavault
6,324,374 UART: [state] Locking PCR0, PCR1 and PCR31
6,325,913 UART: [state] Locking ICCM
6,328,387 UART: [exit] Launching FMC @ 0x40000000
6,336,564 UART:
6,336,805 UART: Running Caliptra FMC ...
6,337,904 UART:
6,338,056 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,339,709 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,219,765 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,361,065 UART:
2,361,516 UART: Running Caliptra ROM ...
2,362,694 UART:
2,362,867 UART: [state] CFI Enabled
2,363,850 UART: [state] LifecycleState = Unprovisioned
2,365,497 UART: [state] DebugLocked = No
2,366,611 UART: [state] WD Timer not started. Device not locked for debugging
2,369,088 UART: [fake-rom-cold-reset] ++
2,370,202 UART: [fht] FHT @ 0x50003400
2,371,239 UART: [fwproc] Wait for Commands...
2,372,523 UART: [fwproc] Recv command 0x46574c44
2,373,950 UART: [fwproc] Recv'd Img size: 111752 bytes
3,817,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,891,902 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,951,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,268,364 >>> mbox cmd response: success
4,274,176 UART: [fake-rom-cold-reset] --
4,276,545 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,416,867 UART: [state] Locking Datavault
4,418,294 UART: [state] Locking PCR0, PCR1 and PCR31
4,419,853 UART: [state] Locking ICCM
4,420,765 UART: [exit] Launching FMC @ 0x40000000
4,422,194 UART:
4,422,360 UART: Running Caliptra FMC ...
4,423,461 UART:
4,423,620 UART: [fmc] Received command: 0x46574C44
4,425,082 UART:
4,425,243 UART: Running Caliptra ROM ...
4,426,344 UART:
4,426,502 UART: [state] CFI Enabled
4,489,070 UART: [state] LifecycleState = Unprovisioned
4,490,807 UART: [state] DebugLocked = No
4,492,349 UART: [state] WD Timer not started. Device not locked for debugging
4,497,005 UART: [update-reset] ++
5,972,115 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,976,195 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,350,302 UART: [update-reset] Copying MAN_2 To MAN_1
6,372,507 UART: [update-reset Success] --
6,373,802 >>> mbox cmd response: success
6,374,019 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,376,172 UART: [state] Locking Datavault
6,379,212 UART: [state] Locking PCR0, PCR1 and PCR31
6,380,756 UART: [state] Locking ICCM
6,381,987 UART: [exit] Launching FMC @ 0x40000000
6,390,221 UART:
6,390,459 UART: Running Caliptra FMC ...
6,391,582 UART:
6,391,742 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,393,385 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,222,279 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,363,876 UART:
2,364,288 UART: Running Caliptra ROM ...
2,365,367 UART:
2,365,526 UART: [state] CFI Enabled
2,366,523 UART: [state] LifecycleState = Unprovisioned
2,368,177 UART: [state] DebugLocked = No
2,369,281 UART: [state] WD Timer not started. Device not locked for debugging
2,371,765 UART: [fake-rom-cold-reset] ++
2,372,874 UART: [fht] FHT @ 0x50003400
2,373,908 UART: [fwproc] Wait for Commands...
2,375,191 UART: [fwproc] Recv command 0x46574c44
2,376,615 UART: [fwproc] Recv'd Img size: 111752 bytes
3,809,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,882,066 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,942,125 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,259,547 >>> mbox cmd response: success
4,265,361 UART: [fake-rom-cold-reset] --
4,267,506 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,407,724 UART: [state] Locking Datavault
4,408,979 UART: [state] Locking PCR0, PCR1 and PCR31
4,410,469 UART: [state] Locking ICCM
4,411,351 UART: [exit] Launching FMC @ 0x40000000
4,412,782 UART:
4,412,935 UART: Running Caliptra FMC ...
4,414,334 UART:
4,414,499 UART: [fmc] Received command: 0x46574C44
4,415,978 UART:
4,416,141 UART: Running Caliptra ROM ...
4,417,244 UART:
4,417,401 UART: [state] CFI Enabled
4,468,120 UART: [state] LifecycleState = Unprovisioned
4,469,847 UART: [state] DebugLocked = No
4,472,090 UART: [state] WD Timer not started. Device not locked for debugging
4,477,287 UART: [update-reset] ++
5,945,613 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,949,479 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,324,933 UART: [update-reset] Copying MAN_2 To MAN_1
6,347,181 UART: [update-reset Success] --
6,348,484 >>> mbox cmd response: success
6,348,699 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,351,495 UART: [state] Locking Datavault
6,354,102 UART: [state] Locking PCR0, PCR1 and PCR31
6,355,704 UART: [state] Locking ICCM
6,357,057 UART: [exit] Launching FMC @ 0x40000000
6,365,295 UART:
6,365,531 UART: Running Caliptra FMC ...
6,366,633 UART:
6,366,788 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,368,421 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
2,221,021 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,362,418 UART:
2,362,843 UART: Running Caliptra ROM ...
2,364,013 UART:
2,364,186 UART: [state] CFI Enabled
2,365,166 UART: [state] LifecycleState = Unprovisioned
2,366,811 UART: [state] DebugLocked = No
2,367,848 UART: [state] WD Timer not started. Device not locked for debugging
2,370,299 UART: [fake-rom-cold-reset] ++
2,371,408 UART: [fht] FHT @ 0x50003400
2,372,444 UART: [fwproc] Wait for Commands...
2,373,727 UART: [fwproc] Recv command 0x46574c44
2,375,152 UART: [fwproc] Recv'd Img size: 111752 bytes
3,815,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,884,377 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,944,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,260,686 >>> mbox cmd response: success
4,266,515 UART: [fake-rom-cold-reset] --
4,268,578 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,409,003 UART: [state] Locking Datavault
4,410,266 UART: [state] Locking PCR0, PCR1 and PCR31
4,411,820 UART: [state] Locking ICCM
4,412,710 UART: [exit] Launching FMC @ 0x40000000
4,414,141 UART:
4,414,299 UART: Running Caliptra FMC ...
4,415,402 UART:
4,415,559 UART: [fmc] Received command: 0x46574C44
4,417,014 UART:
4,417,171 UART: Running Caliptra ROM ...
4,418,268 UART:
4,418,420 UART: [state] CFI Enabled
4,428,793 UART: [state] LifecycleState = Unprovisioned
4,430,532 UART: [state] DebugLocked = No
4,433,038 UART: [state] WD Timer not started. Device not locked for debugging
4,436,992 UART: [update-reset] ++
5,911,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,914,246 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,289,152 UART: [update-reset] Copying MAN_2 To MAN_1
6,311,388 UART: [update-reset Success] --
6,312,857 >>> mbox cmd response: success
6,313,087 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,315,097 UART: [state] Locking Datavault
6,318,248 UART: [state] Locking PCR0, PCR1 and PCR31
6,319,845 UART: [state] Locking ICCM
6,321,057 UART: [exit] Launching FMC @ 0x40000000
6,329,241 UART:
6,329,476 UART: Running Caliptra FMC ...
6,330,576 UART:
6,330,751 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,332,394 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,224,041 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,365,221 UART:
2,365,636 UART: Running Caliptra ROM ...
2,366,712 UART:
2,366,877 UART: [state] CFI Enabled
2,367,878 UART: [state] LifecycleState = Unprovisioned
2,369,530 UART: [state] DebugLocked = No
2,370,559 UART: [state] WD Timer not started. Device not locked for debugging
2,373,389 UART: [fake-rom-cold-reset] ++
2,374,512 UART: [fht] FHT @ 0x50003400
2,375,546 UART: [fwproc] Wait for Commands...
2,376,849 UART: [fwproc] Recv command 0x46574c44
2,378,282 UART: [fwproc] Recv'd Img size: 111752 bytes
3,818,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,894,130 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,954,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
4,270,867 >>> mbox cmd response: success
4,276,695 UART: [fake-rom-cold-reset] --
4,278,773 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
4,419,230 UART: [state] Locking Datavault
4,420,495 UART: [state] Locking PCR0, PCR1 and PCR31
4,421,972 UART: [state] Locking ICCM
4,422,950 UART: [exit] Launching FMC @ 0x40000000
4,424,294 UART:
4,424,441 UART: Running Caliptra FMC ...
4,425,457 UART:
4,425,607 UART: [fmc] Received command: 0x46574C44
4,427,081 UART:
4,427,239 UART: Running Caliptra ROM ...
4,428,249 UART:
4,428,396 UART: [state] CFI Enabled
4,436,608 UART: [state] LifecycleState = Unprovisioned
4,438,321 UART: [state] DebugLocked = No
4,440,552 UART: [state] WD Timer not started. Device not locked for debugging
4,445,575 UART: [update-reset] ++
5,919,287 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,922,621 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,298,287 UART: [update-reset] Copying MAN_2 To MAN_1
6,320,495 UART: [update-reset Success] --
6,321,775 >>> mbox cmd response: success
6,321,992 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,324,140 UART: [state] Locking Datavault
6,326,795 UART: [state] Locking PCR0, PCR1 and PCR31
6,328,405 UART: [state] Locking ICCM
6,329,830 UART: [exit] Launching FMC @ 0x40000000
6,338,065 UART:
6,338,298 UART: Running Caliptra FMC ...
6,339,322 UART:
6,339,467 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,341,095 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [fake-rom-cold-reset] ++
88,774 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,100 UART: [fht] FHT @ 0x50003400
92,481 UART: [fwproc] Wait for Commands...
93,234 UART: [fwproc] Recv command 0x46574c44
93,962 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,087 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,457 >>> mbox cmd response: success
1,546,615 UART: [fake-rom-cold-reset] --
1,547,010 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,549 UART: [state] Locking Datavault
1,548,586 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,190 UART: [state] Locking ICCM
1,549,670 UART: [exit] Launching FMC @ 0x40000000
1,554,967 UART:
1,554,983 UART: Running Caliptra FMC ...
1,555,391 UART:
1,555,532 UART: [fmc] Received command: 0x46574C44
1,556,356 UART:
1,556,372 UART: Running Caliptra ROM ...
1,556,780 UART:
1,556,835 UART: [state] CFI Enabled
1,559,227 UART: [state] LifecycleState = Unprovisioned
1,559,886 UART: [state] DebugLocked = No
1,560,509 UART: [state] WD Timer not started. Device not locked for debugging
1,562,003 UART: [update-reset] ++
2,840,321 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,841,321 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,989,372 UART: [update-reset] Copying MAN_2 To MAN_1
2,997,386 UART: [update-reset Success] --
2,997,795 >>> mbox cmd response: success
2,997,795 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,998,406 UART: [state] Locking Datavault
2,999,158 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,762 UART: [state] Locking ICCM
3,000,374 UART: [exit] Launching FMC @ 0x40000000
3,005,671 UART:
3,005,687 UART: Running Caliptra FMC ...
3,006,095 UART:
3,006,236 UART: [fmc] Received command: 0x1000000C
3,006,971 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [fake-rom-cold-reset] ++
88,758 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,868 UART: [fht] FHT @ 0x50003400
92,159 UART: [fwproc] Wait for Commands...
93,008 UART: [fwproc] Recv command 0x46574c44
93,736 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,773 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,546,031 >>> mbox cmd response: success
1,547,189 UART: [fake-rom-cold-reset] --
1,547,584 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,548,023 UART: [state] Locking Datavault
1,549,124 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,728 UART: [state] Locking ICCM
1,550,190 UART: [exit] Launching FMC @ 0x40000000
1,555,487 UART:
1,555,503 UART: Running Caliptra FMC ...
1,555,911 UART:
1,556,052 UART: [fmc] Received command: 0x46574C44
1,556,876 UART:
1,556,892 UART: Running Caliptra ROM ...
1,557,300 UART:
1,557,355 UART: [state] CFI Enabled
1,559,889 UART: [state] LifecycleState = Unprovisioned
1,560,548 UART: [state] DebugLocked = No
1,561,085 UART: [state] WD Timer not started. Device not locked for debugging
1,562,585 UART: [update-reset] ++
2,840,111 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,841,251 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,989,214 UART: [update-reset] Copying MAN_2 To MAN_1
2,997,228 UART: [update-reset Success] --
2,997,637 >>> mbox cmd response: success
2,997,637 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,998,094 UART: [state] Locking Datavault
2,998,854 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,458 UART: [state] Locking ICCM
3,000,106 UART: [exit] Launching FMC @ 0x40000000
3,005,403 UART:
3,005,419 UART: Running Caliptra FMC ...
3,005,827 UART:
3,005,968 UART: [fmc] Received command: 0x1000000C
3,006,703 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [fake-rom-cold-reset] ++
88,563 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,635 UART: [fht] FHT @ 0x50003400
91,968 UART: [fwproc] Wait for Commands...
92,567 UART: [fwproc] Recv command 0x46574c44
93,295 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,383,712 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,006 >>> mbox cmd response: success
1,546,164 UART: [fake-rom-cold-reset] --
1,546,559 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,034 UART: [state] Locking Datavault
1,548,209 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,813 UART: [state] Locking ICCM
1,549,401 UART: [exit] Launching FMC @ 0x40000000
1,554,698 UART:
1,554,714 UART: Running Caliptra FMC ...
1,555,122 UART:
1,555,263 UART: [fmc] Received command: 0x46574C44
1,556,087 UART:
1,556,103 UART: Running Caliptra ROM ...
1,556,511 UART:
1,556,653 UART: [state] CFI Enabled
1,559,693 UART: [state] LifecycleState = Unprovisioned
1,560,352 UART: [state] DebugLocked = No
1,561,019 UART: [state] WD Timer not started. Device not locked for debugging
1,562,593 UART: [update-reset] ++
2,840,415 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,841,427 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,989,340 UART: [update-reset] Copying MAN_2 To MAN_1
2,997,354 UART: [update-reset Success] --
2,997,763 >>> mbox cmd response: success
2,997,763 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,998,284 UART: [state] Locking Datavault
2,999,100 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,704 UART: [state] Locking ICCM
3,000,374 UART: [exit] Launching FMC @ 0x40000000
3,005,671 UART:
3,005,687 UART: Running Caliptra FMC ...
3,006,095 UART:
3,006,236 UART: [fmc] Received command: 0x1000000C
3,006,971 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
87,017 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [fake-rom-cold-reset] ++
89,349 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,595 UART: [fht] FHT @ 0x50003400
92,830 UART: [fwproc] Wait for Commands...
93,577 UART: [fwproc] Recv command 0x46574c44
94,305 UART: [fwproc] Recv'd Img size: 111752 bytes
1,358,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,476 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,674 >>> mbox cmd response: success
1,546,832 UART: [fake-rom-cold-reset] --
1,547,227 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,544 UART: [state] Locking Datavault
1,548,995 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,599 UART: [state] Locking ICCM
1,550,161 UART: [exit] Launching FMC @ 0x40000000
1,555,458 UART:
1,555,474 UART: Running Caliptra FMC ...
1,555,882 UART:
1,556,023 UART: [fmc] Received command: 0x46574C44
1,556,847 UART:
1,556,863 UART: Running Caliptra ROM ...
1,557,271 UART:
1,557,413 UART: [state] CFI Enabled
1,560,377 UART: [state] LifecycleState = Unprovisioned
1,561,036 UART: [state] DebugLocked = No
1,561,617 UART: [state] WD Timer not started. Device not locked for debugging
1,563,137 UART: [update-reset] ++
2,841,205 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,842,171 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,990,138 UART: [update-reset] Copying MAN_2 To MAN_1
2,998,152 UART: [update-reset Success] --
2,998,561 >>> mbox cmd response: success
2,998,561 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,998,904 UART: [state] Locking Datavault
2,999,602 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,206 UART: [state] Locking ICCM
3,000,740 UART: [exit] Launching FMC @ 0x40000000
3,006,037 UART:
3,006,053 UART: Running Caliptra FMC ...
3,006,461 UART:
3,006,602 UART: [fmc] Received command: 0x1000000C
3,007,337 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [fake-rom-cold-reset] ++
88,778 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,032 UART: [fht] FHT @ 0x50003400
92,287 UART: [fwproc] Wait for Commands...
92,882 UART: [fwproc] Recv command 0x46574c44
93,610 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,551 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,925 >>> mbox cmd response: success
1,547,083 UART: [fake-rom-cold-reset] --
1,547,478 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,943 UART: [state] Locking Datavault
1,549,222 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,826 UART: [state] Locking ICCM
1,550,314 UART: [exit] Launching FMC @ 0x40000000
1,555,611 UART:
1,555,627 UART: Running Caliptra FMC ...
1,556,035 UART:
1,556,176 UART: [fmc] Received command: 0x46574C44
1,557,000 UART:
1,557,016 UART: Running Caliptra ROM ...
1,557,424 UART:
1,557,479 UART: [state] CFI Enabled
1,560,361 UART: [state] LifecycleState = Unprovisioned
1,561,020 UART: [state] DebugLocked = No
1,561,669 UART: [state] WD Timer not started. Device not locked for debugging
1,563,081 UART: [update-reset] ++
2,841,025 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,842,035 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,989,978 UART: [update-reset] Copying MAN_2 To MAN_1
2,997,992 UART: [update-reset Success] --
2,998,401 >>> mbox cmd response: success
2,998,401 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,998,950 UART: [state] Locking Datavault
2,999,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,356 UART: [state] Locking ICCM
3,000,788 UART: [exit] Launching FMC @ 0x40000000
3,006,085 UART:
3,006,101 UART: Running Caliptra FMC ...
3,006,509 UART:
3,006,650 UART: [fmc] Received command: 0x1000000C
3,007,385 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,182 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [fake-rom-cold-reset] ++
88,402 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,572 UART: [fht] FHT @ 0x50003400
91,793 UART: [fwproc] Wait for Commands...
92,440 UART: [fwproc] Recv command 0x46574c44
93,168 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,213 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,583 >>> mbox cmd response: success
1,546,741 UART: [fake-rom-cold-reset] --
1,547,136 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,561 UART: [state] Locking Datavault
1,548,628 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,232 UART: [state] Locking ICCM
1,549,756 UART: [exit] Launching FMC @ 0x40000000
1,555,053 UART:
1,555,069 UART: Running Caliptra FMC ...
1,555,477 UART:
1,555,618 UART: [fmc] Received command: 0x46574C44
1,556,442 UART:
1,556,458 UART: Running Caliptra ROM ...
1,556,866 UART:
1,556,921 UART: [state] CFI Enabled
1,559,535 UART: [state] LifecycleState = Unprovisioned
1,560,194 UART: [state] DebugLocked = No
1,560,785 UART: [state] WD Timer not started. Device not locked for debugging
1,562,209 UART: [update-reset] ++
2,839,719 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,840,867 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,988,870 UART: [update-reset] Copying MAN_2 To MAN_1
2,996,884 UART: [update-reset Success] --
2,997,293 >>> mbox cmd response: success
2,997,293 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,997,912 UART: [state] Locking Datavault
2,998,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,258 UART: [state] Locking ICCM
2,999,876 UART: [exit] Launching FMC @ 0x40000000
3,005,173 UART:
3,005,189 UART: Running Caliptra FMC ...
3,005,597 UART:
3,005,738 UART: [fmc] Received command: 0x1000000C
3,006,473 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [fake-rom-cold-reset] ++
88,755 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,955 UART: [fht] FHT @ 0x50003400
92,358 UART: [fwproc] Wait for Commands...
93,027 UART: [fwproc] Recv command 0x46574c44
93,755 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,382,998 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,408,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,544,320 >>> mbox cmd response: success
1,545,478 UART: [fake-rom-cold-reset] --
1,545,873 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,546,282 UART: [state] Locking Datavault
1,547,565 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,169 UART: [state] Locking ICCM
1,548,723 UART: [exit] Launching FMC @ 0x40000000
1,554,020 UART:
1,554,036 UART: Running Caliptra FMC ...
1,554,444 UART:
1,554,585 UART: [fmc] Received command: 0x46574C44
1,555,409 UART:
1,555,425 UART: Running Caliptra ROM ...
1,555,833 UART:
1,555,975 UART: [state] CFI Enabled
1,558,371 UART: [state] LifecycleState = Unprovisioned
1,559,030 UART: [state] DebugLocked = No
1,559,563 UART: [state] WD Timer not started. Device not locked for debugging
1,561,139 UART: [update-reset] ++
2,838,995 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,840,027 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,988,124 UART: [update-reset] Copying MAN_2 To MAN_1
2,996,138 UART: [update-reset Success] --
2,996,547 >>> mbox cmd response: success
2,996,547 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,997,182 UART: [state] Locking Datavault
2,998,040 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,644 UART: [state] Locking ICCM
2,999,218 UART: [exit] Launching FMC @ 0x40000000
3,004,515 UART:
3,004,531 UART: Running Caliptra FMC ...
3,004,939 UART:
3,005,080 UART: [fmc] Received command: 0x1000000C
3,005,815 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [fake-rom-cold-reset] ++
89,249 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,433 UART: [fht] FHT @ 0x50003400
92,654 UART: [fwproc] Wait for Commands...
93,273 UART: [fwproc] Recv command 0x46574c44
94,001 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,174 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,304 >>> mbox cmd response: success
1,546,462 UART: [fake-rom-cold-reset] --
1,546,857 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,426 UART: [state] Locking Datavault
1,548,759 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,363 UART: [state] Locking ICCM
1,550,011 UART: [exit] Launching FMC @ 0x40000000
1,555,308 UART:
1,555,324 UART: Running Caliptra FMC ...
1,555,732 UART:
1,555,873 UART: [fmc] Received command: 0x46574C44
1,556,697 UART:
1,556,713 UART: Running Caliptra ROM ...
1,557,121 UART:
1,557,263 UART: [state] CFI Enabled
1,559,455 UART: [state] LifecycleState = Unprovisioned
1,560,114 UART: [state] DebugLocked = No
1,560,743 UART: [state] WD Timer not started. Device not locked for debugging
1,562,531 UART: [update-reset] ++
2,840,117 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,841,247 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,989,228 UART: [update-reset] Copying MAN_2 To MAN_1
2,997,242 UART: [update-reset Success] --
2,997,651 >>> mbox cmd response: success
2,997,651 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,998,294 UART: [state] Locking Datavault
2,999,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,796 UART: [state] Locking ICCM
3,000,328 UART: [exit] Launching FMC @ 0x40000000
3,005,625 UART:
3,005,641 UART: Running Caliptra FMC ...
3,006,049 UART:
3,006,190 UART: [fmc] Received command: 0x1000000C
3,006,925 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
88,048 UART: [fake-rom-cold-reset] ++
88,976 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,272 UART: [fht] FHT @ 0x50003400
92,623 UART: [fwproc] Wait for Commands...
93,390 UART: [fwproc] Recv command 0x46574c44
94,118 UART: [fwproc] Recv'd Img size: 111752 bytes
1,358,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,569 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,410,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,873 >>> mbox cmd response: success
1,547,031 UART: [fake-rom-cold-reset] --
1,547,426 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,869 UART: [state] Locking Datavault
1,548,916 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,520 UART: [state] Locking ICCM
1,550,124 UART: [exit] Launching FMC @ 0x40000000
1,555,421 UART:
1,555,437 UART: Running Caliptra FMC ...
1,555,845 UART:
1,555,986 UART: [fmc] Received command: 0x46574C44
1,556,810 UART:
1,556,826 UART: Running Caliptra ROM ...
1,557,234 UART:
1,557,289 UART: [state] CFI Enabled
1,559,415 UART: [state] LifecycleState = Unprovisioned
1,560,074 UART: [state] DebugLocked = No
1,560,669 UART: [state] WD Timer not started. Device not locked for debugging
1,562,343 UART: [update-reset] ++
2,839,505 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,840,465 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,988,504 UART: [update-reset] Copying MAN_2 To MAN_1
2,996,518 UART: [update-reset Success] --
2,996,927 >>> mbox cmd response: success
2,996,927 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,997,416 UART: [state] Locking Datavault
2,998,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,880 UART: [state] Locking ICCM
2,999,340 UART: [exit] Launching FMC @ 0x40000000
3,004,637 UART:
3,004,653 UART: Running Caliptra FMC ...
3,005,061 UART:
3,005,202 UART: [fmc] Received command: 0x1000000C
3,005,937 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,606 UART: [state] LifecycleState = Unprovisioned
85,265 UART: [state] DebugLocked = No
85,962 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [fake-rom-cold-reset] ++
88,244 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
88,558 UART: [fht] FHT @ 0x50003400
91,865 UART: [fwproc] Wait for Commands...
92,640 UART: [fwproc] Recv command 0x46574c44
93,368 UART: [fwproc] Recv'd Img size: 111752 bytes
1,357,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,031 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,195 >>> mbox cmd response: success
1,546,353 UART: [fake-rom-cold-reset] --
1,546,748 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,175 UART: [state] Locking Datavault
1,548,232 UART: [state] Locking PCR0, PCR1 and PCR31
1,548,836 UART: [state] Locking ICCM
1,549,264 UART: [exit] Launching FMC @ 0x40000000
1,554,561 UART:
1,554,577 UART: Running Caliptra FMC ...
1,554,985 UART:
1,555,126 UART: [fmc] Received command: 0x46574C44
1,555,950 UART:
1,555,966 UART: Running Caliptra ROM ...
1,556,374 UART:
1,556,429 UART: [state] CFI Enabled
1,559,185 UART: [state] LifecycleState = Unprovisioned
1,559,844 UART: [state] DebugLocked = No
1,560,357 UART: [state] WD Timer not started. Device not locked for debugging
1,561,747 UART: [update-reset] ++
2,840,103 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,841,145 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,989,234 UART: [update-reset] Copying MAN_2 To MAN_1
2,997,248 UART: [update-reset Success] --
2,997,657 >>> mbox cmd response: success
2,997,657 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,998,290 UART: [state] Locking Datavault
2,999,158 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,762 UART: [state] Locking ICCM
3,000,416 UART: [exit] Launching FMC @ 0x40000000
3,005,713 UART:
3,005,729 UART: Running Caliptra FMC ...
3,006,137 UART:
3,006,278 UART: [fmc] Received command: 0x1000000C
3,007,013 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,572 UART: [state] DebugLocked = No
87,287 UART: [state] WD Timer not started. Device not locked for debugging
88,699 UART: [fake-rom-cold-reset] ++
89,627 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,707 UART: [fht] FHT @ 0x50003400
93,030 UART: [fwproc] Wait for Commands...
93,779 UART: [fwproc] Recv command 0x46574c44
94,507 UART: [fwproc] Recv'd Img size: 111752 bytes
1,358,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,385,500 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,411,182 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,546,710 >>> mbox cmd response: success
1,547,868 UART: [fake-rom-cold-reset] --
1,548,263 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,548,746 UART: [state] Locking Datavault
1,549,737 UART: [state] Locking PCR0, PCR1 and PCR31
1,550,341 UART: [state] Locking ICCM
1,550,777 UART: [exit] Launching FMC @ 0x40000000
1,556,074 UART:
1,556,090 UART: Running Caliptra FMC ...
1,556,498 UART:
1,556,639 UART: [fmc] Received command: 0x46574C44
1,557,463 UART:
1,557,479 UART: Running Caliptra ROM ...
1,557,887 UART:
1,558,029 UART: [state] CFI Enabled
1,560,919 UART: [state] LifecycleState = Unprovisioned
1,561,578 UART: [state] DebugLocked = No
1,562,155 UART: [state] WD Timer not started. Device not locked for debugging
1,563,607 UART: [update-reset] ++
2,842,125 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,843,271 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,991,336 UART: [update-reset] Copying MAN_2 To MAN_1
2,999,350 UART: [update-reset Success] --
2,999,759 >>> mbox cmd response: success
2,999,759 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,000,416 UART: [state] Locking Datavault
3,001,226 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,830 UART: [state] Locking ICCM
3,002,366 UART: [exit] Launching FMC @ 0x40000000
3,007,663 UART:
3,007,679 UART: Running Caliptra FMC ...
3,008,087 UART:
3,008,228 UART: [fmc] Received command: 0x1000000C
3,008,963 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [fake-rom-cold-reset] ++
88,915 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
89,155 UART: [fht] FHT @ 0x50003400
92,564 UART: [fwproc] Wait for Commands...
93,379 UART: [fwproc] Recv command 0x46574c44
94,107 UART: [fwproc] Recv'd Img size: 111752 bytes
1,358,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,384,076 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,409,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,545,332 >>> mbox cmd response: success
1,546,490 UART: [fake-rom-cold-reset] --
1,546,885 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,547,328 UART: [state] Locking Datavault
1,548,661 UART: [state] Locking PCR0, PCR1 and PCR31
1,549,265 UART: [state] Locking ICCM
1,549,717 UART: [exit] Launching FMC @ 0x40000000
1,555,014 UART:
1,555,030 UART: Running Caliptra FMC ...
1,555,438 UART:
1,555,579 UART: [fmc] Received command: 0x46574C44
1,556,403 UART:
1,556,419 UART: Running Caliptra ROM ...
1,556,827 UART:
1,556,969 UART: [state] CFI Enabled
1,559,881 UART: [state] LifecycleState = Unprovisioned
1,560,540 UART: [state] DebugLocked = No
1,561,025 UART: [state] WD Timer not started. Device not locked for debugging
1,562,651 UART: [update-reset] ++
2,841,303 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,842,357 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,990,336 UART: [update-reset] Copying MAN_2 To MAN_1
2,998,350 UART: [update-reset Success] --
2,998,759 >>> mbox cmd response: success
2,998,759 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
2,999,382 UART: [state] Locking Datavault
3,000,084 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,688 UART: [state] Locking ICCM
3,001,264 UART: [exit] Launching FMC @ 0x40000000
3,006,561 UART:
3,006,577 UART: Running Caliptra FMC ...
3,006,985 UART:
3,007,126 UART: [fmc] Received command: 0x1000000C
3,007,861 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,013 UART:
192,385 UART: Running Caliptra ROM ...
193,635 UART:
193,791 UART: [state] CFI Enabled
264,013 UART: [state] LifecycleState = Unprovisioned
266,425 UART: [state] DebugLocked = No
268,513 UART: [state] WD Timer not started. Device not locked for debugging
272,494 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,008 UART:
192,388 UART: Running Caliptra ROM ...
193,625 UART:
193,774 UART: [state] CFI Enabled
261,502 UART: [state] LifecycleState = Unprovisioned
263,909 UART: [state] DebugLocked = No
265,776 UART: [state] WD Timer not started. Device not locked for debugging
270,665 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,331 UART:
192,689 UART: Running Caliptra ROM ...
193,930 UART:
603,810 UART: [state] CFI Enabled
617,028 UART: [state] LifecycleState = Unprovisioned
619,424 UART: [state] DebugLocked = No
621,709 UART: [state] WD Timer not started. Device not locked for debugging
627,351 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,481 UART:
192,883 UART: Running Caliptra ROM ...
194,068 UART:
604,176 UART: [state] CFI Enabled
616,866 UART: [state] LifecycleState = Unprovisioned
619,208 UART: [state] DebugLocked = No
621,550 UART: [state] WD Timer not started. Device not locked for debugging
627,618 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,161 UART:
192,558 UART: Running Caliptra ROM ...
193,748 UART:
193,905 UART: [state] CFI Enabled
265,654 UART: [state] LifecycleState = Unprovisioned
267,443 UART: [state] DebugLocked = No
269,533 UART: [state] WD Timer not started. Device not locked for debugging
275,495 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,187 UART:
192,559 UART: Running Caliptra ROM ...
193,680 UART:
193,825 UART: [state] CFI Enabled
260,089 UART: [state] LifecycleState = Unprovisioned
261,821 UART: [state] DebugLocked = No
264,334 UART: [state] WD Timer not started. Device not locked for debugging
269,052 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,454 UART:
192,819 UART: Running Caliptra ROM ...
194,006 UART:
603,522 UART: [state] CFI Enabled
616,989 UART: [state] LifecycleState = Unprovisioned
618,740 UART: [state] DebugLocked = No
620,731 UART: [state] WD Timer not started. Device not locked for debugging
625,588 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,507 writing to cptra_bootfsm_go
192,557 UART:
192,959 UART: Running Caliptra ROM ...
194,156 UART:
603,574 UART: [state] CFI Enabled
615,698 UART: [state] LifecycleState = Unprovisioned
617,419 UART: [state] DebugLocked = No
618,797 UART: [state] WD Timer not started. Device not locked for debugging
623,949 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,218 UART:
192,606 UART: Running Caliptra ROM ...
193,796 UART:
193,947 UART: [state] CFI Enabled
265,283 UART: [state] LifecycleState = Unprovisioned
267,008 UART: [state] DebugLocked = No
269,423 UART: [state] WD Timer not started. Device not locked for debugging
274,592 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,044 UART:
192,465 UART: Running Caliptra ROM ...
193,613 UART:
193,757 UART: [state] CFI Enabled
262,753 UART: [state] LifecycleState = Unprovisioned
264,482 UART: [state] DebugLocked = No
265,918 UART: [state] WD Timer not started. Device not locked for debugging
269,341 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,287 UART:
192,675 UART: Running Caliptra ROM ...
193,870 UART:
603,339 UART: [state] CFI Enabled
616,302 UART: [state] LifecycleState = Unprovisioned
617,997 UART: [state] DebugLocked = No
620,338 UART: [state] WD Timer not started. Device not locked for debugging
624,469 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,070 writing to cptra_bootfsm_go
194,361 UART:
194,721 UART: Running Caliptra ROM ...
195,902 UART:
605,496 UART: [state] CFI Enabled
619,535 UART: [state] LifecycleState = Unprovisioned
621,287 UART: [state] DebugLocked = No
623,032 UART: [state] WD Timer not started. Device not locked for debugging
627,695 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,724 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
86,100 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,059 UART: [state] WD Timer not started. Device not locked for debugging
88,461 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
87,023 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,847 UART: [state] LifecycleState = Unprovisioned
85,506 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,210,229 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,351,199 UART:
2,351,620 UART: Running Caliptra ROM ...
2,352,727 UART:
2,352,881 UART: [state] CFI Enabled
2,353,790 UART: [state] LifecycleState = Unprovisioned
2,355,450 UART: [state] DebugLocked = No
2,356,569 UART: [state] WD Timer not started. Device not locked for debugging
2,359,041 UART: [fake-rom-cold-reset] ++
2,360,145 UART: [fht] FHT @ 0x50003400
2,361,120 UART: [fwproc] Wait for Commands...
2,362,398 UART: [fwproc] Recv command 0x46574c44
2,363,826 UART: [fwproc] Recv'd Img size: 111408 bytes
3,762,135 UART: ROM Fatal Error: 0x000B000C
3,765,962 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
2,211,190 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,352,023 UART:
2,352,445 UART: Running Caliptra ROM ...
2,353,617 UART:
2,353,786 UART: [state] CFI Enabled
2,354,772 UART: [state] LifecycleState = Unprovisioned
2,356,428 UART: [state] DebugLocked = No
2,357,532 UART: [state] WD Timer not started. Device not locked for debugging
2,360,003 UART: [fake-rom-cold-reset] ++
2,361,069 UART: [fht] FHT @ 0x50003400
2,362,194 UART: [fwproc] Wait for Commands...
2,363,473 UART: [fwproc] Recv command 0x46574c44
2,364,901 UART: [fwproc] Recv'd Img size: 111408 bytes
3,757,798 UART: ROM Fatal Error: 0x000B000C
3,761,680 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,869 writing to cptra_bootfsm_go
2,219,429 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,360,380 UART:
2,360,818 UART: Running Caliptra ROM ...
2,361,993 UART:
2,362,159 UART: [state] CFI Enabled
2,363,115 UART: [state] LifecycleState = Unprovisioned
2,364,767 UART: [state] DebugLocked = No
2,365,864 UART: [state] WD Timer not started. Device not locked for debugging
2,368,334 UART: [fake-rom-cold-reset] ++
2,369,432 UART: [fht] FHT @ 0x50003400
2,370,457 UART: [fwproc] Wait for Commands...
2,371,751 UART: [fwproc] Recv command 0x46574c44
2,373,174 UART: [fwproc] Recv'd Img size: 111408 bytes
3,774,461 UART: ROM Fatal Error: 0x000B000C
3,778,306 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,191 writing to cptra_bootfsm_go
2,219,126 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,360,059 UART:
2,360,485 UART: Running Caliptra ROM ...
2,361,648 UART:
2,361,814 UART: [state] CFI Enabled
2,362,766 UART: [state] LifecycleState = Unprovisioned
2,364,411 UART: [state] DebugLocked = No
2,365,515 UART: [state] WD Timer not started. Device not locked for debugging
2,367,982 UART: [fake-rom-cold-reset] ++
2,369,080 UART: [fht] FHT @ 0x50003400
2,370,105 UART: [fwproc] Wait for Commands...
2,371,382 UART: [fwproc] Recv command 0x46574c44
2,372,800 UART: [fwproc] Recv'd Img size: 111408 bytes
3,769,899 UART: ROM Fatal Error: 0x000B000C
3,773,738 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,212,745 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,353,997 UART:
2,354,416 UART: Running Caliptra ROM ...
2,355,600 UART:
2,355,779 UART: [state] CFI Enabled
2,356,758 UART: [state] LifecycleState = Unprovisioned
2,358,407 UART: [state] DebugLocked = No
2,359,518 UART: [state] WD Timer not started. Device not locked for debugging
2,361,994 UART: [fake-rom-cold-reset] ++
2,363,103 UART: [fht] FHT @ 0x50003400
2,364,088 UART: [fwproc] Wait for Commands...
2,365,400 UART: [fwproc] Recv command 0x46574c44
2,366,831 UART: [fwproc] Recv'd Img size: 111752 bytes
3,417,091 UART: ROM Fatal Error: 0x000B000C
3,420,076 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,223,744 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,365,095 UART:
2,365,505 UART: Running Caliptra ROM ...
2,366,678 UART:
2,366,847 UART: [state] CFI Enabled
2,367,831 UART: [state] LifecycleState = Unprovisioned
2,369,478 UART: [state] DebugLocked = No
2,370,587 UART: [state] WD Timer not started. Device not locked for debugging
2,373,054 UART: [fake-rom-cold-reset] ++
2,374,162 UART: [fht] FHT @ 0x50003400
2,375,194 UART: [fwproc] Wait for Commands...
2,376,479 UART: [fwproc] Recv command 0x46574c44
2,377,906 UART: [fwproc] Recv'd Img size: 111752 bytes
3,430,155 UART: ROM Fatal Error: 0x000B000C
3,433,150 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,217,907 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,359,030 UART:
2,359,437 UART: Running Caliptra ROM ...
2,360,527 UART:
2,360,682 UART: [state] CFI Enabled
2,361,666 UART: [state] LifecycleState = Unprovisioned
2,363,317 UART: [state] DebugLocked = No
2,364,339 UART: [state] WD Timer not started. Device not locked for debugging
2,366,803 UART: [fake-rom-cold-reset] ++
2,367,927 UART: [fht] FHT @ 0x50003400
2,369,319 UART: [fwproc] Wait for Commands...
2,370,615 UART: [fwproc] Recv command 0x46574c44
2,372,053 UART: [fwproc] Recv'd Img size: 111752 bytes
3,423,327 UART: ROM Fatal Error: 0x000B000C
3,426,302 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,216,372 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,357,702 UART:
2,358,125 UART: Running Caliptra ROM ...
2,359,303 UART:
2,359,496 UART: [state] CFI Enabled
2,360,490 UART: [state] LifecycleState = Unprovisioned
2,362,137 UART: [state] DebugLocked = No
2,363,241 UART: [state] WD Timer not started. Device not locked for debugging
2,365,711 UART: [fake-rom-cold-reset] ++
2,366,814 UART: [fht] FHT @ 0x50003400
2,367,841 UART: [fwproc] Wait for Commands...
2,369,124 UART: [fwproc] Recv command 0x46574c44
2,370,549 UART: [fwproc] Recv'd Img size: 111752 bytes
3,415,183 UART: ROM Fatal Error: 0x000B000C
3,418,158 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,213,479 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,354,817 UART:
2,355,227 UART: Running Caliptra ROM ...
2,356,397 UART:
2,356,571 UART: [state] CFI Enabled
2,357,556 UART: [state] LifecycleState = Unprovisioned
2,359,201 UART: [state] DebugLocked = No
2,360,310 UART: [state] WD Timer not started. Device not locked for debugging
2,362,787 UART: [fake-rom-cold-reset] ++
2,363,893 UART: [fht] FHT @ 0x50003400
2,364,929 UART: [fwproc] Wait for Commands...
2,366,212 UART: [fwproc] Recv command 0x46574c44
2,367,642 UART: [fwproc] Recv'd Img size: 111752 bytes
3,421,243 UART: ROM Fatal Error: 0x000B000C
3,424,218 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,219,714 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,360,820 UART:
2,361,216 UART: Running Caliptra ROM ...
2,362,388 UART:
2,362,562 UART: [state] CFI Enabled
2,363,533 UART: [state] LifecycleState = Unprovisioned
2,365,188 UART: [state] DebugLocked = No
2,366,686 UART: [state] WD Timer not started. Device not locked for debugging
2,369,208 UART: [fake-rom-cold-reset] ++
2,370,340 UART: [fht] FHT @ 0x50003400
2,371,377 UART: [fwproc] Wait for Commands...
2,372,659 UART: [fwproc] Recv command 0x46574c44
2,374,090 UART: [fwproc] Recv'd Img size: 111752 bytes
3,427,794 UART: ROM Fatal Error: 0x000B000C
3,430,768 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,217,713 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,359,078 UART:
2,359,514 UART: Running Caliptra ROM ...
2,360,592 UART:
2,360,743 UART: [state] CFI Enabled
2,361,725 UART: [state] LifecycleState = Unprovisioned
2,363,377 UART: [state] DebugLocked = No
2,364,404 UART: [state] WD Timer not started. Device not locked for debugging
2,366,876 UART: [fake-rom-cold-reset] ++
2,367,903 UART: [fht] FHT @ 0x50003400
2,368,899 UART: [fwproc] Wait for Commands...
2,370,188 UART: [fwproc] Recv command 0x46574c44
2,371,530 UART: [fwproc] Recv'd Img size: 111752 bytes
3,425,764 UART: ROM Fatal Error: 0x000B000C
3,428,791 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
2,219,557 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,361,035 UART:
2,361,620 UART: Running Caliptra ROM ...
2,362,715 UART:
2,362,877 UART: [state] CFI Enabled
2,363,832 UART: [state] LifecycleState = Unprovisioned
2,365,432 UART: [state] DebugLocked = No
2,366,475 UART: [state] WD Timer not started. Device not locked for debugging
2,368,964 UART: [fake-rom-cold-reset] ++
2,370,073 UART: [fht] FHT @ 0x50003400
2,371,104 UART: [fwproc] Wait for Commands...
2,372,389 UART: [fwproc] Recv command 0x46574c44
2,373,821 UART: [fwproc] Recv'd Img size: 111752 bytes
3,428,300 UART: ROM Fatal Error: 0x000B000C
3,431,282 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [fake-rom-cold-reset] ++
88,930 UART: [fht] FHT @ 0x50003400
92,259 UART: [fwproc] Wait for Commands...
92,880 UART: [fwproc] Recv command 0x46574c44
93,608 UART: [fwproc] Recv'd Img size: 111752 bytes
131,025 UART: ROM Fatal Error: 0x000B000C
132,194 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [fake-rom-cold-reset] ++
89,020 UART: [fht] FHT @ 0x50003400
92,381 UART: [fwproc] Wait for Commands...
92,980 UART: [fwproc] Recv command 0x46574c44
93,708 UART: [fwproc] Recv'd Img size: 111752 bytes
130,761 UART: ROM Fatal Error: 0x000B000C
131,930 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,053 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [fake-rom-cold-reset] ++
89,473 UART: [fht] FHT @ 0x50003400
92,910 UART: [fwproc] Wait for Commands...
93,557 UART: [fwproc] Recv command 0x46574c44
94,285 UART: [fwproc] Recv'd Img size: 111752 bytes
130,672 UART: ROM Fatal Error: 0x000B000C
131,841 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [fake-rom-cold-reset] ++
89,089 UART: [fht] FHT @ 0x50003400
92,498 UART: [fwproc] Wait for Commands...
93,139 UART: [fwproc] Recv command 0x46574c44
93,867 UART: [fwproc] Recv'd Img size: 111752 bytes
131,326 UART: ROM Fatal Error: 0x000B000C
132,495 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
88,182 UART: [fake-rom-cold-reset] ++
89,232 UART: [fht] FHT @ 0x50003400
92,489 UART: [fwproc] Wait for Commands...
93,214 UART: [fwproc] Recv command 0x46574c44
93,942 UART: [fwproc] Recv'd Img size: 111752 bytes
130,583 UART: ROM Fatal Error: 0x000B000C
131,752 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [fake-rom-cold-reset] ++
89,184 UART: [fht] FHT @ 0x50003400
92,459 UART: [fwproc] Wait for Commands...
93,256 UART: [fwproc] Recv command 0x46574c44
93,984 UART: [fwproc] Recv'd Img size: 111752 bytes
131,951 UART: ROM Fatal Error: 0x000B000C
133,120 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,963 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [fake-rom-cold-reset] ++
89,399 UART: [fht] FHT @ 0x50003400
92,722 UART: [fwproc] Wait for Commands...
93,503 UART: [fwproc] Recv command 0x46574c44
94,231 UART: [fwproc] Recv'd Img size: 111752 bytes
130,618 UART: ROM Fatal Error: 0x000B000C
131,787 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [fake-rom-cold-reset] ++
88,877 UART: [fht] FHT @ 0x50003400
92,258 UART: [fwproc] Wait for Commands...
93,107 UART: [fwproc] Recv command 0x46574c44
93,835 UART: [fwproc] Recv'd Img size: 111752 bytes
130,912 UART: ROM Fatal Error: 0x000B000C
132,081 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [fake-rom-cold-reset] ++
88,616 UART: [fht] FHT @ 0x50003400
91,923 UART: [fwproc] Wait for Commands...
92,714 UART: [fwproc] Recv command 0x46574c44
93,442 UART: [fwproc] Recv'd Img size: 111752 bytes
130,609 UART: ROM Fatal Error: 0x000B000C
131,778 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,192 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [fake-rom-cold-reset] ++
88,866 UART: [fht] FHT @ 0x50003400
92,189 UART: [fwproc] Wait for Commands...
92,794 UART: [fwproc] Recv command 0x46574c44
93,522 UART: [fwproc] Recv'd Img size: 111752 bytes
131,229 UART: ROM Fatal Error: 0x000B000C
132,398 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [fake-rom-cold-reset] ++
88,881 UART: [fht] FHT @ 0x50003400
92,314 UART: [fwproc] Wait for Commands...
93,155 UART: [fwproc] Recv command 0x46574c44
93,883 UART: [fwproc] Recv'd Img size: 111752 bytes
130,718 UART: ROM Fatal Error: 0x000B000C
131,887 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [fake-rom-cold-reset] ++
89,029 UART: [fht] FHT @ 0x50003400
92,368 UART: [fwproc] Wait for Commands...
93,201 UART: [fwproc] Recv command 0x46574c44
93,929 UART: [fwproc] Recv'd Img size: 111752 bytes
130,782 UART: ROM Fatal Error: 0x000B000C
131,951 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,091 UART:
192,488 UART: Running Caliptra ROM ...
193,672 UART:
194,009 UART: [state] CFI Enabled
266,141 UART: [state] LifecycleState = Unprovisioned
268,545 UART: [state] DebugLocked = No
270,463 UART: [state] WD Timer not started. Device not locked for debugging
277,796 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
191,933 UART:
192,321 UART: Running Caliptra ROM ...
193,468 UART:
193,631 UART: [state] CFI Enabled
265,542 UART: [state] LifecycleState = Unprovisioned
268,375 UART: [state] DebugLocked = No
269,512 UART: [state] WD Timer not started. Device not locked for debugging
274,665 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,333 UART:
192,714 UART: Running Caliptra ROM ...
193,945 UART:
603,689 UART: [state] CFI Enabled
618,939 UART: [state] LifecycleState = Unprovisioned
621,311 UART: [state] DebugLocked = No
622,845 UART: [state] WD Timer not started. Device not locked for debugging
628,371 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
192,613 UART:
192,994 UART: Running Caliptra ROM ...
194,172 UART:
604,089 UART: [state] CFI Enabled
617,466 UART: [state] LifecycleState = Unprovisioned
619,861 UART: [state] DebugLocked = No
623,120 UART: [state] WD Timer not started. Device not locked for debugging
629,083 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,005 UART:
192,393 UART: Running Caliptra ROM ...
193,594 UART:
193,748 UART: [state] CFI Enabled
264,292 UART: [state] LifecycleState = Unprovisioned
266,072 UART: [state] DebugLocked = No
268,749 UART: [state] WD Timer not started. Device not locked for debugging
274,180 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,380 UART:
192,753 UART: Running Caliptra ROM ...
193,852 UART:
193,995 UART: [state] CFI Enabled
265,276 UART: [state] LifecycleState = Unprovisioned
267,031 UART: [state] DebugLocked = No
269,760 UART: [state] WD Timer not started. Device not locked for debugging
275,943 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,502 UART:
192,884 UART: Running Caliptra ROM ...
194,011 UART:
603,588 UART: [state] CFI Enabled
620,205 UART: [state] LifecycleState = Unprovisioned
621,959 UART: [state] DebugLocked = No
623,112 UART: [state] WD Timer not started. Device not locked for debugging
627,128 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,909 writing to cptra_bootfsm_go
192,965 UART:
193,350 UART: Running Caliptra ROM ...
194,537 UART:
604,179 UART: [state] CFI Enabled
617,556 UART: [state] LifecycleState = Unprovisioned
619,329 UART: [state] DebugLocked = No
622,053 UART: [state] WD Timer not started. Device not locked for debugging
625,913 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,279 UART:
192,662 UART: Running Caliptra ROM ...
193,850 UART:
194,003 UART: [state] CFI Enabled
262,756 UART: [state] LifecycleState = Unprovisioned
264,529 UART: [state] DebugLocked = No
266,307 UART: [state] WD Timer not started. Device not locked for debugging
272,107 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,111 UART:
192,507 UART: Running Caliptra ROM ...
193,801 UART:
193,952 UART: [state] CFI Enabled
263,063 UART: [state] LifecycleState = Unprovisioned
264,790 UART: [state] DebugLocked = No
266,981 UART: [state] WD Timer not started. Device not locked for debugging
271,646 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,248 UART:
192,639 UART: Running Caliptra ROM ...
193,769 UART:
603,470 UART: [state] CFI Enabled
618,593 UART: [state] LifecycleState = Unprovisioned
620,381 UART: [state] DebugLocked = No
622,844 UART: [state] WD Timer not started. Device not locked for debugging
627,561 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,397 UART:
192,783 UART: Running Caliptra ROM ...
193,871 UART:
603,452 UART: [state] CFI Enabled
617,629 UART: [state] LifecycleState = Unprovisioned
619,383 UART: [state] DebugLocked = No
621,032 UART: [state] WD Timer not started. Device not locked for debugging
625,590 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,222 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
88,260 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,207 UART: [state] WD Timer not started. Device not locked for debugging
88,607 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,063 UART: [state] WD Timer not started. Device not locked for debugging
88,493 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,326 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,258 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
4,873,483 ready_for_fw is high
4,873,960 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,460,687 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
4,870,324 ready_for_fw is high
4,870,740 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,448,580 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
5,189,202 ready_for_fw is high
5,189,593 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,627,900 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
5,179,190 ready_for_fw is high
5,179,727 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,611,059 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,459,641 ready_for_fw is high
3,460,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,319,178 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,464,645 ready_for_fw is high
3,465,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,282,493 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
3,786,950 ready_for_fw is high
3,787,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,511,459 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,787,746 ready_for_fw is high
3,788,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,482,005 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,465,699 ready_for_fw is high
3,466,143 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,336,092 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,458,485 ready_for_fw is high
3,458,875 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,283,646 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,780,484 ready_for_fw is high
3,781,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,494,770 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,780,186 ready_for_fw is high
3,780,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,499,538 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,631 ready_for_fw is high
1,077,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,575 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,247 ready_for_fw is high
1,077,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,039 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,038 ready_for_fw is high
1,078,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,064 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,594 ready_for_fw is high
1,078,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,456 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,383 ready_for_fw is high
1,077,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,181 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,679 ready_for_fw is high
1,077,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,989 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,610 ready_for_fw is high
1,078,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,972 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,122 ready_for_fw is high
1,078,122 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,680 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,095 ready_for_fw is high
1,078,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,393 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,449 ready_for_fw is high
1,077,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,383 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,182 ready_for_fw is high
1,078,182 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,284 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,646 ready_for_fw is high
1,078,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,440 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
2,211,788 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,346,470 UART:
2,346,899 UART: Running Caliptra ROM ...
2,348,064 UART:
2,348,261 UART: [state] CFI Enabled
2,349,240 UART: [state] LifecycleState = Unprovisioned
2,350,889 UART: [state] DebugLocked = No
2,351,993 UART: [state] WD Timer not started. Device not locked for debugging
2,354,461 UART: [kat] SHA2-256
2,355,130 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,358,139 UART: [kat] ++
2,358,591 UART: [kat] sha1
2,359,104 UART: [kat] SHA2-256
2,359,844 UART: [kat] SHA2-384
2,360,511 UART: [kat] SHA2-512-ACC
2,361,313 UART: [kat] ECC-384
3,775,708 UART: [kat] HMAC-384Kdf
3,801,888 UART: [kat] LMS
4,875,041 UART: [kat] --
4,879,427 UART: [cold-reset] ++
4,880,899 UART: [fht] FHT @ 0x50003400
4,891,777 UART: [idev] ++
4,892,452 UART: [idev] CDI.KEYID = 6
4,893,683 UART: [idev] SUBJECT.KEYID = 7
4,894,782 UART: [idev] UDS.KEYID = 0
4,929,341 UART: [idev] Erasing UDS.KEYID = 0
8,242,202 UART: [idev] Sha1 KeyId Algorithm
8,264,255 UART: [idev] --
8,267,817 UART: [ldev] ++
8,268,386 UART: [ldev] CDI.KEYID = 6
8,269,623 UART: [ldev] SUBJECT.KEYID = 5
8,270,779 UART: [ldev] AUTHORITY.KEYID = 7
8,272,007 UART: [ldev] FE.KEYID = 1
8,316,468 UART: [ldev] Erasing FE.KEYID = 1
11,651,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,884 UART: [ldev] --
14,035,689 UART: [fwproc] Wait for Commands...
14,038,269 UART: [fwproc] Recv command 0x46574c44
14,040,584 UART: [fwproc] Recv'd Img size: 106340 bytes
18,018,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,097,472 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,139,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,456,446 >>> mbox cmd response: success
18,461,438 UART: [afmc] ++
18,462,023 UART: [afmc] CDI.KEYID = 6
18,463,214 UART: [afmc] SUBJECT.KEYID = 7
18,464,367 UART: [afmc] AUTHORITY.KEYID = 5
21,839,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,155,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,158,179 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,174,242 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,190,293 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,206,382 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,228,513 UART: [afmc] --
24,231,240 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,231,622 UART: [cold-reset] --
24,236,171 UART: [state] Locking Datavault
24,241,380 UART: [state] Locking PCR0, PCR1 and PCR31
24,243,088 UART: [state] Locking ICCM
24,245,028 UART: [exit] Launching FMC @ 0x40000000
24,253,645 UART:
24,253,875 UART: Running Caliptra FMC ...
24,254,969 UART:
24,255,131 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,256,724 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,212,040 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,193,866 >>> mbox cmd response: success
23,862,832 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,879,043 UART:
23,879,405 UART: Running Caliptra FMC ...
23,880,601 UART:
23,880,767 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,882,522 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,218,027 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,352,859 UART:
2,353,253 UART: Running Caliptra ROM ...
2,354,353 UART:
2,354,509 UART: [state] CFI Enabled
2,355,484 UART: [state] LifecycleState = Unprovisioned
2,357,126 UART: [state] DebugLocked = No
2,358,151 UART: [state] WD Timer not started. Device not locked for debugging
2,360,609 UART: [kat] SHA2-256
2,361,270 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,364,273 UART: [kat] ++
2,364,741 UART: [kat] sha1
2,365,249 UART: [kat] SHA2-256
2,365,984 UART: [kat] SHA2-384
2,366,645 UART: [kat] SHA2-512-ACC
2,367,518 UART: [kat] ECC-384
4,095,706 UART: [kat] HMAC-384Kdf
4,108,327 UART: [kat] LMS
5,181,479 UART: [kat] --
5,186,201 UART: [cold-reset] ++
5,188,463 UART: [fht] FHT @ 0x50003400
5,201,549 UART: [idev] ++
5,202,224 UART: [idev] CDI.KEYID = 6
5,203,451 UART: [idev] SUBJECT.KEYID = 7
5,204,875 UART: [idev] UDS.KEYID = 0
5,223,490 UART: [idev] Erasing UDS.KEYID = 0
8,495,517 UART: [idev] Sha1 KeyId Algorithm
8,517,310 UART: [idev] --
8,520,383 UART: [ldev] ++
8,520,944 UART: [ldev] CDI.KEYID = 6
8,522,174 UART: [ldev] SUBJECT.KEYID = 5
8,523,594 UART: [ldev] AUTHORITY.KEYID = 7
8,525,193 UART: [ldev] FE.KEYID = 1
8,536,319 UART: [ldev] Erasing FE.KEYID = 1
11,828,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,054 UART: [ldev] --
14,197,095 UART: [fwproc] Wait for Commands...
14,199,519 UART: [fwproc] Recv command 0x46574c44
14,201,824 UART: [fwproc] Recv'd Img size: 106340 bytes
18,175,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,255,544 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,298,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,613,561 >>> mbox cmd response: success
18,617,038 UART: [afmc] ++
18,617,620 UART: [afmc] CDI.KEYID = 6
18,618,781 UART: [afmc] SUBJECT.KEYID = 7
18,619,988 UART: [afmc] AUTHORITY.KEYID = 5
21,933,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,227,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,229,760 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,245,817 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,261,836 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,277,977 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,300,644 UART: [afmc] --
24,304,999 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,305,384 UART: [cold-reset] --
24,308,944 UART: [state] Locking Datavault
24,314,506 UART: [state] Locking PCR0, PCR1 and PCR31
24,316,143 UART: [state] Locking ICCM
24,317,885 UART: [exit] Launching FMC @ 0x40000000
24,326,491 UART:
24,326,720 UART: Running Caliptra FMC ...
24,327,737 UART:
24,327,877 UART: [fmc] Received command: 0x10000005
24,329,359 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,219,579 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,414,385 >>> mbox cmd response: success
24,037,391 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,052,564 UART:
24,052,944 UART: Running Caliptra FMC ...
24,054,051 UART:
24,054,201 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,055,969 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,215,435 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,350,353 UART:
2,350,790 UART: Running Caliptra ROM ...
2,351,952 UART:
2,352,126 UART: [state] CFI Enabled
2,353,107 UART: [state] LifecycleState = Unprovisioned
2,354,768 UART: [state] DebugLocked = No
2,355,878 UART: [state] WD Timer not started. Device not locked for debugging
2,358,355 UART: [kat] SHA2-256
2,359,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,362,270 UART: [kat] ++
2,362,734 UART: [kat] sha1
2,363,248 UART: [kat] SHA2-256
2,363,937 UART: [kat] SHA2-384
2,364,597 UART: [kat] SHA2-512-ACC
2,365,456 UART: [kat] ECC-384
2,944,977 UART: [kat] HMAC-384Kdf
2,971,903 UART: [kat] LMS
3,501,396 UART: [kat] --
3,507,328 UART: [cold-reset] ++
3,508,665 UART: [fht] FHT @ 0x50003400
3,519,266 UART: [idev] ++
3,519,832 UART: [idev] CDI.KEYID = 6
3,520,796 UART: [idev] SUBJECT.KEYID = 7
3,521,956 UART: [idev] UDS.KEYID = 0
3,545,167 UART: [idev] Erasing UDS.KEYID = 0
6,027,937 UART: [idev] Sha1 KeyId Algorithm
6,051,175 UART: [idev] --
6,054,667 UART: [ldev] ++
6,055,248 UART: [ldev] CDI.KEYID = 6
6,056,133 UART: [ldev] SUBJECT.KEYID = 5
6,057,375 UART: [ldev] AUTHORITY.KEYID = 7
6,058,618 UART: [ldev] FE.KEYID = 1
6,100,563 UART: [ldev] Erasing FE.KEYID = 1
8,600,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,002 UART: [ldev] --
10,393,462 UART: [fwproc] Wait for Commands...
10,396,537 UART: [fwproc] Recv command 0x46574c44
10,398,585 UART: [fwproc] Recv'd Img size: 106684 bytes
13,714,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,787,334 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,829,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,147,984 >>> mbox cmd response: success
14,152,871 UART: [afmc] ++
14,153,470 UART: [afmc] CDI.KEYID = 6
14,154,391 UART: [afmc] SUBJECT.KEYID = 7
14,155,561 UART: [afmc] AUTHORITY.KEYID = 5
16,676,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,400,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,402,592 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,418,584 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,434,512 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,450,477 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,474,485 UART: [afmc] --
18,478,416 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,478,787 UART: [cold-reset] --
18,481,923 UART: [state] Locking Datavault
18,487,711 UART: [state] Locking PCR0, PCR1 and PCR31
18,489,413 UART: [state] Locking ICCM
18,491,293 UART: [exit] Launching FMC @ 0x40000000
18,499,640 UART:
18,499,875 UART: Running Caliptra FMC ...
18,500,982 UART:
18,501,153 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,502,728 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,838 writing to cptra_bootfsm_go
2,217,630 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,937,963 >>> mbox cmd response: success
18,216,815 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,230,672 UART:
18,231,024 UART: Running Caliptra FMC ...
18,232,204 UART:
18,232,376 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,234,124 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
2,220,444 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,355,521 UART:
2,355,947 UART: Running Caliptra ROM ...
2,357,118 UART:
2,357,289 UART: [state] CFI Enabled
2,358,258 UART: [state] LifecycleState = Unprovisioned
2,359,898 UART: [state] DebugLocked = No
2,360,925 UART: [state] WD Timer not started. Device not locked for debugging
2,363,392 UART: [kat] SHA2-256
2,364,080 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,367,087 UART: [kat] ++
2,367,539 UART: [kat] sha1
2,368,050 UART: [kat] SHA2-256
2,368,789 UART: [kat] SHA2-384
2,369,456 UART: [kat] SHA2-512-ACC
2,370,333 UART: [kat] ECC-384
3,281,148 UART: [kat] HMAC-384Kdf
3,293,756 UART: [kat] LMS
3,823,265 UART: [kat] --
3,827,878 UART: [cold-reset] ++
3,829,054 UART: [fht] FHT @ 0x50003400
3,840,177 UART: [idev] ++
3,840,739 UART: [idev] CDI.KEYID = 6
3,841,673 UART: [idev] SUBJECT.KEYID = 7
3,842,883 UART: [idev] UDS.KEYID = 0
3,859,768 UART: [idev] Erasing UDS.KEYID = 0
6,315,057 UART: [idev] Sha1 KeyId Algorithm
6,338,343 UART: [idev] --
6,341,417 UART: [ldev] ++
6,341,981 UART: [ldev] CDI.KEYID = 6
6,342,948 UART: [ldev] SUBJECT.KEYID = 5
6,344,107 UART: [ldev] AUTHORITY.KEYID = 7
6,345,336 UART: [ldev] FE.KEYID = 1
6,355,777 UART: [ldev] Erasing FE.KEYID = 1
8,828,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,294 UART: [ldev] --
10,617,234 UART: [fwproc] Wait for Commands...
10,619,290 UART: [fwproc] Recv command 0x46574c44
10,621,328 UART: [fwproc] Recv'd Img size: 106684 bytes
13,933,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,317 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,045,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,362,914 >>> mbox cmd response: success
14,367,410 UART: [afmc] ++
14,367,997 UART: [afmc] CDI.KEYID = 6
14,368,877 UART: [afmc] SUBJECT.KEYID = 7
14,370,028 UART: [afmc] AUTHORITY.KEYID = 5
16,867,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,591,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,593,470 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,609,417 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,625,354 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,641,283 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,664,564 UART: [afmc] --
18,668,490 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,668,892 UART: [cold-reset] --
18,673,601 UART: [state] Locking Datavault
18,680,901 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,597 UART: [state] Locking ICCM
18,683,689 UART: [exit] Launching FMC @ 0x40000000
18,692,077 UART:
18,692,307 UART: Running Caliptra FMC ...
18,693,332 UART:
18,693,479 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,695,047 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
2,218,719 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,138,917 >>> mbox cmd response: success
18,372,089 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,388,411 UART:
18,388,767 UART: Running Caliptra FMC ...
18,389,975 UART:
18,390,143 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,391,924 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,224,459 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,359,697 UART:
2,360,123 UART: Running Caliptra ROM ...
2,361,207 UART:
2,361,360 UART: [state] CFI Enabled
2,362,366 UART: [state] LifecycleState = Unprovisioned
2,364,023 UART: [state] DebugLocked = No
2,365,050 UART: [state] WD Timer not started. Device not locked for debugging
2,367,519 UART: [kat] SHA2-256
2,368,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,371,193 UART: [kat] ++
2,371,638 UART: [kat] sha1
2,372,147 UART: [kat] SHA2-256
2,372,799 UART: [kat] SHA2-384
2,373,456 UART: [kat] SHA2-512-ACC
2,374,293 UART: [kat] ECC-384
2,947,194 UART: [kat] HMAC-384Kdf
2,971,518 UART: [kat] LMS
3,500,990 UART: [kat] --
3,506,141 UART: [cold-reset] ++
3,507,488 UART: [fht] FHT @ 0x50003400
3,518,594 UART: [idev] ++
3,519,170 UART: [idev] CDI.KEYID = 6
3,520,079 UART: [idev] SUBJECT.KEYID = 7
3,521,300 UART: [idev] UDS.KEYID = 0
3,544,626 UART: [idev] Erasing UDS.KEYID = 0
6,026,399 UART: [idev] Sha1 KeyId Algorithm
6,049,256 UART: [idev] --
6,052,499 UART: [ldev] ++
6,053,073 UART: [ldev] CDI.KEYID = 6
6,053,958 UART: [ldev] SUBJECT.KEYID = 5
6,055,175 UART: [ldev] AUTHORITY.KEYID = 7
6,056,410 UART: [ldev] FE.KEYID = 1
6,099,164 UART: [ldev] Erasing FE.KEYID = 1
8,601,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,811 UART: [ldev] --
10,394,048 UART: [fwproc] Wait for Commands...
10,396,855 UART: [fwproc] Recv command 0x46574c44
10,398,894 UART: [fwproc] Recv'd Img size: 106684 bytes
13,702,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,778,754 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,821,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,138,007 >>> mbox cmd response: success
14,141,560 UART: [afmc] ++
14,142,144 UART: [afmc] CDI.KEYID = 6
14,143,029 UART: [afmc] SUBJECT.KEYID = 7
14,144,245 UART: [afmc] AUTHORITY.KEYID = 5
16,677,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,401,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,403,329 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,419,273 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,435,220 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,451,192 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,474,993 UART: [afmc] --
18,479,401 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,479,766 UART: [cold-reset] --
18,482,414 UART: [state] Locking Datavault
18,488,470 UART: [state] Locking PCR0, PCR1 and PCR31
18,490,177 UART: [state] Locking ICCM
18,492,680 UART: [exit] Launching FMC @ 0x40000000
18,501,072 UART:
18,501,309 UART: Running Caliptra FMC ...
18,502,412 UART:
18,502,568 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,504,333 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,214,978 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,926,928 >>> mbox cmd response: success
18,199,140 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,215,781 UART:
18,216,122 UART: Running Caliptra FMC ...
18,217,297 UART:
18,217,462 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,219,219 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
2,222,328 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,357,928 UART:
2,358,333 UART: Running Caliptra ROM ...
2,359,449 UART:
2,359,633 UART: [state] CFI Enabled
2,360,630 UART: [state] LifecycleState = Unprovisioned
2,362,284 UART: [state] DebugLocked = No
2,363,396 UART: [state] WD Timer not started. Device not locked for debugging
2,365,866 UART: [kat] SHA2-256
2,366,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,369,536 UART: [kat] ++
2,369,984 UART: [kat] sha1
2,370,495 UART: [kat] SHA2-256
2,371,155 UART: [kat] SHA2-384
2,371,811 UART: [kat] SHA2-512-ACC
2,372,613 UART: [kat] ECC-384
3,284,802 UART: [kat] HMAC-384Kdf
3,297,007 UART: [kat] LMS
3,826,486 UART: [kat] --
3,829,348 UART: [cold-reset] ++
3,831,618 UART: [fht] FHT @ 0x50003400
3,842,058 UART: [idev] ++
3,842,667 UART: [idev] CDI.KEYID = 6
3,843,580 UART: [idev] SUBJECT.KEYID = 7
3,844,740 UART: [idev] UDS.KEYID = 0
3,862,063 UART: [idev] Erasing UDS.KEYID = 0
6,318,509 UART: [idev] Sha1 KeyId Algorithm
6,341,951 UART: [idev] --
6,346,105 UART: [ldev] ++
6,346,670 UART: [ldev] CDI.KEYID = 6
6,347,576 UART: [ldev] SUBJECT.KEYID = 5
6,348,790 UART: [ldev] AUTHORITY.KEYID = 7
6,350,018 UART: [ldev] FE.KEYID = 1
6,360,885 UART: [ldev] Erasing FE.KEYID = 1
8,835,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,785 UART: [ldev] --
10,623,803 UART: [fwproc] Wait for Commands...
10,625,896 UART: [fwproc] Recv command 0x46574c44
10,627,992 UART: [fwproc] Recv'd Img size: 106684 bytes
13,937,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,315 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,053,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,371,091 >>> mbox cmd response: success
14,375,270 UART: [afmc] ++
14,375,858 UART: [afmc] CDI.KEYID = 6
14,376,769 UART: [afmc] SUBJECT.KEYID = 7
14,377,983 UART: [afmc] AUTHORITY.KEYID = 5
16,875,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,884 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,612,886 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,628,773 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,644,750 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,667,136 UART: [afmc] --
18,670,516 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,670,895 UART: [cold-reset] --
18,674,191 UART: [state] Locking Datavault
18,679,809 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,460 UART: [state] Locking ICCM
18,682,638 UART: [exit] Launching FMC @ 0x40000000
18,691,040 UART:
18,691,277 UART: Running Caliptra FMC ...
18,692,377 UART:
18,692,538 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,694,129 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
2,218,755 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,133,118 >>> mbox cmd response: success
18,365,883 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,378,948 UART:
18,379,297 UART: Running Caliptra FMC ...
18,380,393 UART:
18,380,544 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,382,302 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
891,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,275 UART: [kat] ++
895,427 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,242 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,535 UART: [fht] FHT @ 0x50003400
1,173,299 UART: [idev] ++
1,173,467 UART: [idev] CDI.KEYID = 6
1,173,828 UART: [idev] SUBJECT.KEYID = 7
1,174,253 UART: [idev] UDS.KEYID = 0
1,182,229 UART: [idev] Erasing UDS.KEYID = 0
1,199,513 UART: [idev] Sha1 KeyId Algorithm
1,208,485 UART: [idev] --
1,209,578 UART: [ldev] ++
1,209,746 UART: [ldev] CDI.KEYID = 6
1,210,110 UART: [ldev] SUBJECT.KEYID = 5
1,210,537 UART: [ldev] AUTHORITY.KEYID = 7
1,211,000 UART: [ldev] FE.KEYID = 1
1,216,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,870 UART: [fwproc] Wait for Commands...
1,281,645 UART: [fwproc] Recv command 0x46574c44
1,282,378 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,371 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,094 >>> mbox cmd response: success
2,673,215 UART: [afmc] ++
2,673,383 UART: [afmc] CDI.KEYID = 6
2,673,746 UART: [afmc] SUBJECT.KEYID = 7
2,674,172 UART: [afmc] AUTHORITY.KEYID = 5
2,709,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,373 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,093 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,986 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,679 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,544 UART: [afmc] --
2,753,622 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,644 UART: [cold-reset] --
2,754,416 UART: [state] Locking Datavault
2,755,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,287 UART: [state] Locking ICCM
2,756,769 UART: [exit] Launching FMC @ 0x40000000
2,762,066 UART:
2,762,082 UART: Running Caliptra FMC ...
2,762,490 UART:
2,762,628 UART: [fmc] Received command: 0x10000005
2,763,729 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,814 >>> mbox cmd response: success
2,578,386 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,707 UART:
2,584,723 UART: Running Caliptra FMC ...
2,585,131 UART:
2,585,269 UART: [fmc] Received command: 0x10000005
2,586,370 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
915,891 UART: [kat] HMAC-384Kdf
920,519 UART: [kat] LMS
1,168,831 UART: [kat] --
1,169,658 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,181,718 UART: [idev] Erasing UDS.KEYID = 0
1,198,784 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,937 UART: [ldev] ++
1,209,105 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,896 UART: [ldev] AUTHORITY.KEYID = 7
1,210,359 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,859 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,804 UART: [fwproc] Recv command 0x46574c44
1,282,537 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,655 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,228 >>> mbox cmd response: success
2,674,363 UART: [afmc] ++
2,674,531 UART: [afmc] CDI.KEYID = 6
2,674,894 UART: [afmc] SUBJECT.KEYID = 7
2,675,320 UART: [afmc] AUTHORITY.KEYID = 5
2,711,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,495 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,215 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,108 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,801 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,844 UART: [afmc] --
2,754,816 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,838 UART: [cold-reset] --
2,755,688 UART: [state] Locking Datavault
2,756,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,487 UART: [state] Locking ICCM
2,757,959 UART: [exit] Launching FMC @ 0x40000000
2,763,256 UART:
2,763,272 UART: Running Caliptra FMC ...
2,763,680 UART:
2,763,818 UART: [fmc] Received command: 0x10000005
2,764,919 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,959 >>> mbox cmd response: success
2,579,349 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,026 UART:
2,585,042 UART: Running Caliptra FMC ...
2,585,450 UART:
2,585,588 UART: [fmc] Received command: 0x10000005
2,586,689 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,377 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,241,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,722 UART: [ldev] --
1,281,106 UART: [fwproc] Wait for Commands...
1,281,747 UART: [fwproc] Recv command 0x46574c44
1,282,480 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,037 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,120 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,671,788 >>> mbox cmd response: success
2,672,943 UART: [afmc] ++
2,673,111 UART: [afmc] CDI.KEYID = 6
2,673,474 UART: [afmc] SUBJECT.KEYID = 7
2,673,900 UART: [afmc] AUTHORITY.KEYID = 5
2,709,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,817 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,537 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,430 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,123 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,938 UART: [afmc] --
2,753,006 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,028 UART: [cold-reset] --
2,753,820 UART: [state] Locking Datavault
2,754,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,565 UART: [state] Locking ICCM
2,756,117 UART: [exit] Launching FMC @ 0x40000000
2,761,414 UART:
2,761,430 UART: Running Caliptra FMC ...
2,761,838 UART:
2,761,976 UART: [fmc] Received command: 0x10000005
2,763,077 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,578 >>> mbox cmd response: success
2,578,090 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,583,955 UART:
2,583,971 UART: Running Caliptra FMC ...
2,584,379 UART:
2,584,517 UART: [fmc] Received command: 0x10000005
2,585,618 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,406 UART: [kat] SHA2-256
902,346 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,208,843 UART: [ldev] ++
1,209,011 UART: [ldev] CDI.KEYID = 6
1,209,375 UART: [ldev] SUBJECT.KEYID = 5
1,209,802 UART: [ldev] AUTHORITY.KEYID = 7
1,210,265 UART: [ldev] FE.KEYID = 1
1,215,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,965 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,282,046 UART: [fwproc] Recv command 0x46574c44
1,282,779 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,190 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,817 >>> mbox cmd response: success
2,673,868 UART: [afmc] ++
2,674,036 UART: [afmc] CDI.KEYID = 6
2,674,399 UART: [afmc] SUBJECT.KEYID = 7
2,674,825 UART: [afmc] AUTHORITY.KEYID = 5
2,710,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,872 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,592 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,485 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,178 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,881 UART: [afmc] --
2,753,745 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,767 UART: [cold-reset] --
2,754,641 UART: [state] Locking Datavault
2,755,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,330 UART: [state] Locking ICCM
2,756,976 UART: [exit] Launching FMC @ 0x40000000
2,762,273 UART:
2,762,289 UART: Running Caliptra FMC ...
2,762,697 UART:
2,762,835 UART: [fmc] Received command: 0x10000005
2,763,936 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,539 >>> mbox cmd response: success
2,581,121 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,587,026 UART:
2,587,042 UART: Running Caliptra FMC ...
2,587,450 UART:
2,587,588 UART: [fmc] Received command: 0x10000005
2,588,689 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,934 UART: [kat] SHA2-512-ACC
906,835 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,455 UART: [cold-reset] ++
1,170,907 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,182,485 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,718 UART: [ldev] ++
1,209,886 UART: [ldev] CDI.KEYID = 6
1,210,250 UART: [ldev] SUBJECT.KEYID = 5
1,210,677 UART: [ldev] AUTHORITY.KEYID = 7
1,211,140 UART: [ldev] FE.KEYID = 1
1,216,214 UART: [ldev] Erasing FE.KEYID = 1
1,242,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,808 UART: [ldev] --
1,282,240 UART: [fwproc] Wait for Commands...
1,282,977 UART: [fwproc] Recv command 0x46574c44
1,283,710 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,865 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,948 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,584 >>> mbox cmd response: success
2,674,735 UART: [afmc] ++
2,674,903 UART: [afmc] CDI.KEYID = 6
2,675,266 UART: [afmc] SUBJECT.KEYID = 7
2,675,692 UART: [afmc] AUTHORITY.KEYID = 5
2,711,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,311 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,031 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,924 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,617 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,690 UART: [afmc] --
2,754,614 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,636 UART: [cold-reset] --
2,755,680 UART: [state] Locking Datavault
2,756,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,301 UART: [state] Locking ICCM
2,757,827 UART: [exit] Launching FMC @ 0x40000000
2,763,124 UART:
2,763,140 UART: Running Caliptra FMC ...
2,763,548 UART:
2,763,686 UART: [fmc] Received command: 0x10000005
2,764,787 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,248 >>> mbox cmd response: success
2,580,496 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,875 UART:
2,586,891 UART: Running Caliptra FMC ...
2,587,299 UART:
2,587,437 UART: [fmc] Received command: 0x10000005
2,588,538 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,078 UART: [idev] Sha1 KeyId Algorithm
1,209,090 UART: [idev] --
1,210,081 UART: [ldev] ++
1,210,249 UART: [ldev] CDI.KEYID = 6
1,210,613 UART: [ldev] SUBJECT.KEYID = 5
1,211,040 UART: [ldev] AUTHORITY.KEYID = 7
1,211,503 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,243,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,115 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,204 UART: [fwproc] Recv command 0x46574c44
1,283,937 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,336 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,419 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,674,077 >>> mbox cmd response: success
2,675,140 UART: [afmc] ++
2,675,308 UART: [afmc] CDI.KEYID = 6
2,675,671 UART: [afmc] SUBJECT.KEYID = 7
2,676,097 UART: [afmc] AUTHORITY.KEYID = 5
2,712,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,273 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,024 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,744 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,637 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,330 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,123 UART: [afmc] --
2,754,993 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,015 UART: [cold-reset] --
2,755,981 UART: [state] Locking Datavault
2,756,996 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,600 UART: [state] Locking ICCM
2,758,258 UART: [exit] Launching FMC @ 0x40000000
2,763,555 UART:
2,763,571 UART: Running Caliptra FMC ...
2,763,979 UART:
2,764,117 UART: [fmc] Received command: 0x10000005
2,765,218 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,581 >>> mbox cmd response: success
2,580,083 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,586,114 UART:
2,586,130 UART: Running Caliptra FMC ...
2,586,538 UART:
2,586,676 UART: [fmc] Received command: 0x10000005
2,587,777 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,216,886 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,352,008 UART:
2,352,429 UART: Running Caliptra ROM ...
2,353,513 UART:
2,353,664 UART: [state] CFI Enabled
2,354,652 UART: [state] LifecycleState = Unprovisioned
2,356,296 UART: [state] DebugLocked = No
2,357,340 UART: [state] WD Timer not started. Device not locked for debugging
2,359,809 UART: [kat] SHA2-256
2,360,472 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,363,480 UART: [kat] ++
2,363,925 UART: [kat] sha1
2,364,435 UART: [kat] SHA2-256
2,365,091 UART: [kat] SHA2-384
2,365,754 UART: [kat] SHA2-512-ACC
2,366,587 UART: [kat] ECC-384
3,776,260 UART: [kat] HMAC-384Kdf
3,801,292 UART: [kat] LMS
4,874,444 UART: [kat] --
4,877,245 UART: [cold-reset] ++
4,878,758 UART: [fht] FHT @ 0x50003400
4,890,609 UART: [idev] ++
4,891,288 UART: [idev] CDI.KEYID = 6
4,892,413 UART: [idev] SUBJECT.KEYID = 7
4,893,629 UART: [idev] UDS.KEYID = 0
4,927,948 UART: [idev] Erasing UDS.KEYID = 0
8,242,398 UART: [idev] Sha1 KeyId Algorithm
8,263,541 UART: [idev] --
8,267,780 UART: [ldev] ++
8,268,362 UART: [ldev] CDI.KEYID = 6
8,269,602 UART: [ldev] SUBJECT.KEYID = 5
8,270,686 UART: [ldev] AUTHORITY.KEYID = 7
8,271,980 UART: [ldev] FE.KEYID = 1
8,315,979 UART: [ldev] Erasing FE.KEYID = 1
11,651,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,160 UART: [ldev] --
14,034,364 UART: [fwproc] Wait for Commands...
14,037,546 UART: [fwproc] Recv command 0x46574c44
14,039,809 UART: [fwproc] Recv'd Img size: 106340 bytes
18,015,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,088,324 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,130,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,446,627 >>> mbox cmd response: success
18,449,838 UART: [afmc] ++
18,450,542 UART: [afmc] CDI.KEYID = 6
18,451,426 UART: [afmc] SUBJECT.KEYID = 7
18,452,645 UART: [afmc] AUTHORITY.KEYID = 5
21,812,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,113,426 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,115,749 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,131,742 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,147,840 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,163,919 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,186,560 UART: [afmc] --
24,190,161 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,190,582 UART: [cold-reset] --
24,194,645 UART: [state] Locking Datavault
24,200,110 UART: [state] Locking PCR0, PCR1 and PCR31
24,201,757 UART: [state] Locking ICCM
24,203,805 UART: [exit] Launching FMC @ 0x40000000
24,212,427 UART:
24,212,660 UART: Running Caliptra FMC ...
24,213,759 UART:
24,213,922 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,215,492 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,214,384 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,225,548 >>> mbox cmd response: success
23,897,414 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
23,914,281 UART:
23,914,627 UART: Running Caliptra FMC ...
23,915,729 UART:
23,915,882 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
23,917,642 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,222,521 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,356,901 UART:
2,357,326 UART: Running Caliptra ROM ...
2,358,505 UART:
2,358,664 UART: [state] CFI Enabled
2,359,980 UART: [state] LifecycleState = Unprovisioned
2,361,656 UART: [state] DebugLocked = No
2,362,767 UART: [state] WD Timer not started. Device not locked for debugging
2,365,243 UART: [kat] SHA2-256
2,365,903 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,368,908 UART: [kat] ++
2,369,354 UART: [kat] sha1
2,369,859 UART: [kat] SHA2-256
2,370,589 UART: [kat] SHA2-384
2,371,251 UART: [kat] SHA2-512-ACC
2,372,045 UART: [kat] ECC-384
4,095,193 UART: [kat] HMAC-384Kdf
4,107,978 UART: [kat] LMS
5,181,167 UART: [kat] --
5,185,632 UART: [cold-reset] ++
5,188,338 UART: [fht] FHT @ 0x50003400
5,199,480 UART: [idev] ++
5,200,151 UART: [idev] CDI.KEYID = 6
5,201,380 UART: [idev] SUBJECT.KEYID = 7
5,202,804 UART: [idev] UDS.KEYID = 0
5,217,854 UART: [idev] Erasing UDS.KEYID = 0
8,494,046 UART: [idev] Sha1 KeyId Algorithm
8,516,040 UART: [idev] --
8,518,906 UART: [ldev] ++
8,519,471 UART: [ldev] CDI.KEYID = 6
8,520,643 UART: [ldev] SUBJECT.KEYID = 5
8,522,139 UART: [ldev] AUTHORITY.KEYID = 7
8,523,718 UART: [ldev] FE.KEYID = 1
8,534,312 UART: [ldev] Erasing FE.KEYID = 1
11,822,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,114,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,842 UART: [ldev] --
14,188,623 UART: [fwproc] Wait for Commands...
14,190,279 UART: [fwproc] Recv command 0x46574c44
14,192,531 UART: [fwproc] Recv'd Img size: 106340 bytes
18,166,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,240,281 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,282,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,599,683 >>> mbox cmd response: success
18,604,073 UART: [afmc] ++
18,604,722 UART: [afmc] CDI.KEYID = 6
18,605,849 UART: [afmc] SUBJECT.KEYID = 7
18,606,943 UART: [afmc] AUTHORITY.KEYID = 5
21,923,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,217,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,219,988 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,236,016 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,252,045 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,268,150 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,289,728 UART: [afmc] --
24,292,635 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,293,040 UART: [cold-reset] --
24,297,201 UART: [state] Locking Datavault
24,303,951 UART: [state] Locking PCR0, PCR1 and PCR31
24,305,641 UART: [state] Locking ICCM
24,307,544 UART: [exit] Launching FMC @ 0x40000000
24,316,162 UART:
24,316,399 UART: Running Caliptra FMC ...
24,317,418 UART:
24,317,557 UART: [fmc] Received command: 0x10000005
24,319,038 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,219,687 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,410,213 >>> mbox cmd response: success
24,032,731 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
24,045,929 UART:
24,046,306 UART: Running Caliptra FMC ...
24,047,524 UART:
24,047,689 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
24,049,433 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
2,214,169 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,349,106 UART:
2,349,522 UART: Running Caliptra ROM ...
2,350,639 UART:
2,350,800 UART: [state] CFI Enabled
2,351,792 UART: [state] LifecycleState = Unprovisioned
2,353,446 UART: [state] DebugLocked = No
2,354,574 UART: [state] WD Timer not started. Device not locked for debugging
2,357,061 UART: [kat] SHA2-256
2,357,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,360,763 UART: [kat] ++
2,361,219 UART: [kat] sha1
2,361,730 UART: [kat] SHA2-256
2,362,422 UART: [kat] SHA2-384
2,363,272 UART: [kat] SHA2-512-ACC
2,364,082 UART: [kat] ECC-384
2,948,134 UART: [kat] HMAC-384Kdf
2,972,926 UART: [kat] LMS
3,502,406 UART: [kat] --
3,507,319 UART: [cold-reset] ++
3,509,200 UART: [fht] FHT @ 0x50003400
3,520,386 UART: [idev] ++
3,521,027 UART: [idev] CDI.KEYID = 6
3,521,972 UART: [idev] SUBJECT.KEYID = 7
3,523,089 UART: [idev] UDS.KEYID = 0
3,544,802 UART: [idev] Erasing UDS.KEYID = 0
6,027,494 UART: [idev] Sha1 KeyId Algorithm
6,050,413 UART: [idev] --
6,054,629 UART: [ldev] ++
6,055,202 UART: [ldev] CDI.KEYID = 6
6,056,111 UART: [ldev] SUBJECT.KEYID = 5
6,057,274 UART: [ldev] AUTHORITY.KEYID = 7
6,058,511 UART: [ldev] FE.KEYID = 1
6,099,990 UART: [ldev] Erasing FE.KEYID = 1
8,603,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,748 UART: [ldev] --
10,410,899 UART: [fwproc] Wait for Commands...
10,413,163 UART: [fwproc] Recv command 0x46574c44
10,415,260 UART: [fwproc] Recv'd Img size: 106684 bytes
13,728,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,807,284 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,849,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,166,737 >>> mbox cmd response: success
14,171,550 UART: [afmc] ++
14,172,143 UART: [afmc] CDI.KEYID = 6
14,173,054 UART: [afmc] SUBJECT.KEYID = 7
14,174,218 UART: [afmc] AUTHORITY.KEYID = 5
16,698,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,422,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,424,373 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,440,369 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,456,256 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,472,263 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,494,390 UART: [afmc] --
18,497,506 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,497,864 UART: [cold-reset] --
18,499,922 UART: [state] Locking Datavault
18,506,519 UART: [state] Locking PCR0, PCR1 and PCR31
18,508,219 UART: [state] Locking ICCM
18,510,610 UART: [exit] Launching FMC @ 0x40000000
18,519,006 UART:
18,519,254 UART: Running Caliptra FMC ...
18,520,280 UART:
18,520,424 UART: [fmc] Received command: 0x10000005
18,521,861 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,213,821 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,940,071 >>> mbox cmd response: success
18,222,168 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,237,665 UART:
18,238,030 UART: Running Caliptra FMC ...
18,239,133 UART:
18,239,286 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,241,047 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
2,222,468 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,357,490 UART:
2,357,895 UART: Running Caliptra ROM ...
2,359,054 UART:
2,359,228 UART: [state] CFI Enabled
2,360,204 UART: [state] LifecycleState = Unprovisioned
2,361,846 UART: [state] DebugLocked = No
2,362,949 UART: [state] WD Timer not started. Device not locked for debugging
2,365,417 UART: [kat] SHA2-256
2,366,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,369,093 UART: [kat] ++
2,369,544 UART: [kat] sha1
2,370,078 UART: [kat] SHA2-256
2,370,816 UART: [kat] SHA2-384
2,371,483 UART: [kat] SHA2-512-ACC
2,372,287 UART: [kat] ECC-384
3,280,341 UART: [kat] HMAC-384Kdf
3,292,990 UART: [kat] LMS
3,822,453 UART: [kat] --
3,826,305 UART: [cold-reset] ++
3,828,892 UART: [fht] FHT @ 0x50003400
3,839,972 UART: [idev] ++
3,840,534 UART: [idev] CDI.KEYID = 6
3,841,440 UART: [idev] SUBJECT.KEYID = 7
3,842,650 UART: [idev] UDS.KEYID = 0
3,859,545 UART: [idev] Erasing UDS.KEYID = 0
6,319,544 UART: [idev] Sha1 KeyId Algorithm
6,341,135 UART: [idev] --
6,346,202 UART: [ldev] ++
6,346,781 UART: [ldev] CDI.KEYID = 6
6,347,690 UART: [ldev] SUBJECT.KEYID = 5
6,348,845 UART: [ldev] AUTHORITY.KEYID = 7
6,350,130 UART: [ldev] FE.KEYID = 1
6,360,667 UART: [ldev] Erasing FE.KEYID = 1
8,835,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,524 UART: [ldev] --
10,627,844 UART: [fwproc] Wait for Commands...
10,630,046 UART: [fwproc] Recv command 0x46574c44
10,632,141 UART: [fwproc] Recv'd Img size: 106684 bytes
13,939,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,574 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,050,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,366,724 >>> mbox cmd response: success
14,370,902 UART: [afmc] ++
14,371,483 UART: [afmc] CDI.KEYID = 6
14,372,387 UART: [afmc] SUBJECT.KEYID = 7
14,373,538 UART: [afmc] AUTHORITY.KEYID = 5
16,878,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,873 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,616,812 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,632,750 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,648,704 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,670,076 UART: [afmc] --
18,674,375 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,674,751 UART: [cold-reset] --
18,678,444 UART: [state] Locking Datavault
18,682,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,459 UART: [state] Locking ICCM
18,686,228 UART: [exit] Launching FMC @ 0x40000000
18,694,622 UART:
18,694,852 UART: Running Caliptra FMC ...
18,695,949 UART:
18,696,121 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,697,688 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,221,842 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,156,474 >>> mbox cmd response: success
18,389,055 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,403,328 UART:
18,403,702 UART: Running Caliptra FMC ...
18,404,815 UART:
18,404,965 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,406,732 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,215,858 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,352,485 UART:
2,352,940 UART: Running Caliptra ROM ...
2,354,117 UART:
2,354,289 UART: [state] CFI Enabled
2,355,274 UART: [state] LifecycleState = Unprovisioned
2,356,918 UART: [state] DebugLocked = No
2,357,969 UART: [state] WD Timer not started. Device not locked for debugging
2,360,413 UART: [kat] SHA2-256
2,361,074 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,364,088 UART: [kat] ++
2,364,541 UART: [kat] sha1
2,365,057 UART: [kat] SHA2-256
2,365,798 UART: [kat] SHA2-384
2,366,462 UART: [kat] SHA2-512-ACC
2,367,346 UART: [kat] ECC-384
2,958,091 UART: [kat] HMAC-384Kdf
2,981,985 UART: [kat] LMS
3,511,402 UART: [kat] --
3,514,635 UART: [cold-reset] ++
3,515,812 UART: [fht] FHT @ 0x50003400
3,525,576 UART: [idev] ++
3,526,143 UART: [idev] CDI.KEYID = 6
3,527,045 UART: [idev] SUBJECT.KEYID = 7
3,528,262 UART: [idev] UDS.KEYID = 0
3,552,771 UART: [idev] Erasing UDS.KEYID = 0
6,034,297 UART: [idev] Sha1 KeyId Algorithm
6,057,089 UART: [idev] --
6,060,956 UART: [ldev] ++
6,061,536 UART: [ldev] CDI.KEYID = 6
6,062,447 UART: [ldev] SUBJECT.KEYID = 5
6,063,611 UART: [ldev] AUTHORITY.KEYID = 7
6,064,841 UART: [ldev] FE.KEYID = 1
6,108,972 UART: [ldev] Erasing FE.KEYID = 1
8,614,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,817 UART: [ldev] --
10,422,948 UART: [fwproc] Wait for Commands...
10,424,619 UART: [fwproc] Recv command 0x46574c44
10,426,718 UART: [fwproc] Recv'd Img size: 106684 bytes
13,742,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,815,916 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,858,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,175,510 >>> mbox cmd response: success
14,179,168 UART: [afmc] ++
14,179,759 UART: [afmc] CDI.KEYID = 6
14,180,669 UART: [afmc] SUBJECT.KEYID = 7
14,181,881 UART: [afmc] AUTHORITY.KEYID = 5
16,709,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,433,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,435,152 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,451,133 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,467,047 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,483,036 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,506,991 UART: [afmc] --
18,510,213 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,510,568 UART: [cold-reset] --
18,515,377 UART: [state] Locking Datavault
18,520,185 UART: [state] Locking PCR0, PCR1 and PCR31
18,521,823 UART: [state] Locking ICCM
18,523,458 UART: [exit] Launching FMC @ 0x40000000
18,531,845 UART:
18,532,075 UART: Running Caliptra FMC ...
18,533,102 UART:
18,533,248 UART: [fmc] Received command: 0x10000005
18,534,680 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
2,224,944 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,921,507 >>> mbox cmd response: success
18,199,703 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,212,396 UART:
18,212,728 UART: Running Caliptra FMC ...
18,213,908 UART:
18,214,077 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,215,845 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,522 writing to cptra_bootfsm_go
2,222,115 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,357,149 UART:
2,357,575 UART: Running Caliptra ROM ...
2,358,750 UART:
2,358,922 UART: [state] CFI Enabled
2,359,923 UART: [state] LifecycleState = Unprovisioned
2,361,573 UART: [state] DebugLocked = No
2,362,684 UART: [state] WD Timer not started. Device not locked for debugging
2,365,157 UART: [kat] SHA2-256
2,365,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,368,833 UART: [kat] ++
2,369,280 UART: [kat] sha1
2,369,875 UART: [kat] SHA2-256
2,370,541 UART: [kat] SHA2-384
2,371,200 UART: [kat] SHA2-512-ACC
2,372,083 UART: [kat] ECC-384
3,279,747 UART: [kat] HMAC-384Kdf
3,291,624 UART: [kat] LMS
3,821,154 UART: [kat] --
3,827,103 UART: [cold-reset] ++
3,829,625 UART: [fht] FHT @ 0x50003400
3,840,299 UART: [idev] ++
3,840,859 UART: [idev] CDI.KEYID = 6
3,841,918 UART: [idev] SUBJECT.KEYID = 7
3,843,035 UART: [idev] UDS.KEYID = 0
3,860,481 UART: [idev] Erasing UDS.KEYID = 0
6,315,090 UART: [idev] Sha1 KeyId Algorithm
6,337,144 UART: [idev] --
6,341,816 UART: [ldev] ++
6,342,389 UART: [ldev] CDI.KEYID = 6
6,343,299 UART: [ldev] SUBJECT.KEYID = 5
6,344,458 UART: [ldev] AUTHORITY.KEYID = 7
6,345,741 UART: [ldev] FE.KEYID = 1
6,357,359 UART: [ldev] Erasing FE.KEYID = 1
8,835,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,757 UART: [ldev] --
10,626,744 UART: [fwproc] Wait for Commands...
10,629,486 UART: [fwproc] Recv command 0x46574c44
10,631,581 UART: [fwproc] Recv'd Img size: 106684 bytes
13,938,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,016,227 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,058,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,375,700 >>> mbox cmd response: success
14,379,334 UART: [afmc] ++
14,379,923 UART: [afmc] CDI.KEYID = 6
14,380,832 UART: [afmc] SUBJECT.KEYID = 7
14,382,042 UART: [afmc] AUTHORITY.KEYID = 5
16,883,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,603,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,605,588 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,621,592 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,637,533 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,653,517 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,675,440 UART: [afmc] --
18,680,016 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,680,389 UART: [cold-reset] --
18,682,766 UART: [state] Locking Datavault
18,687,578 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,279 UART: [state] Locking ICCM
18,691,269 UART: [exit] Launching FMC @ 0x40000000
18,699,665 UART:
18,699,899 UART: Running Caliptra FMC ...
18,700,993 UART:
18,701,148 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,702,747 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
2,218,258 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,154,143 >>> mbox cmd response: success
18,394,925 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,410,355 UART:
18,410,696 UART: Running Caliptra FMC ...
18,411,893 UART:
18,412,058 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,413,832 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,407 UART: [kat] ++
895,559 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,173,023 UART: [idev] ++
1,173,191 UART: [idev] CDI.KEYID = 6
1,173,552 UART: [idev] SUBJECT.KEYID = 7
1,173,977 UART: [idev] UDS.KEYID = 0
1,182,275 UART: [idev] Erasing UDS.KEYID = 0
1,199,001 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,394 UART: [ldev] --
1,280,862 UART: [fwproc] Wait for Commands...
1,281,589 UART: [fwproc] Recv command 0x46574c44
1,282,322 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,441 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,671,994 >>> mbox cmd response: success
2,673,155 UART: [afmc] ++
2,673,323 UART: [afmc] CDI.KEYID = 6
2,673,686 UART: [afmc] SUBJECT.KEYID = 7
2,674,112 UART: [afmc] AUTHORITY.KEYID = 5
2,709,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,079 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,731,799 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,692 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,385 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,258 UART: [afmc] --
2,752,128 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,752,150 UART: [cold-reset] --
2,752,852 UART: [state] Locking Datavault
2,754,005 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,609 UART: [state] Locking ICCM
2,755,085 UART: [exit] Launching FMC @ 0x40000000
2,760,382 UART:
2,760,398 UART: Running Caliptra FMC ...
2,760,806 UART:
2,760,944 UART: [fmc] Received command: 0x10000005
2,762,045 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,310 >>> mbox cmd response: success
2,579,388 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,091 UART:
2,585,107 UART: Running Caliptra FMC ...
2,585,515 UART:
2,585,653 UART: [fmc] Received command: 0x10000005
2,586,754 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,897 UART: [kat] HMAC-384Kdf
921,537 UART: [kat] LMS
1,169,849 UART: [kat] --
1,170,692 UART: [cold-reset] ++
1,171,094 UART: [fht] FHT @ 0x50003400
1,173,722 UART: [idev] ++
1,173,890 UART: [idev] CDI.KEYID = 6
1,174,251 UART: [idev] SUBJECT.KEYID = 7
1,174,676 UART: [idev] UDS.KEYID = 0
1,182,762 UART: [idev] Erasing UDS.KEYID = 0
1,200,250 UART: [idev] Sha1 KeyId Algorithm
1,209,318 UART: [idev] --
1,210,385 UART: [ldev] ++
1,210,553 UART: [ldev] CDI.KEYID = 6
1,210,917 UART: [ldev] SUBJECT.KEYID = 5
1,211,344 UART: [ldev] AUTHORITY.KEYID = 7
1,211,807 UART: [ldev] FE.KEYID = 1
1,217,175 UART: [ldev] Erasing FE.KEYID = 1
1,243,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,405 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x46574c44
1,283,711 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,090 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,627 >>> mbox cmd response: success
2,673,658 UART: [afmc] ++
2,673,826 UART: [afmc] CDI.KEYID = 6
2,674,189 UART: [afmc] SUBJECT.KEYID = 7
2,674,615 UART: [afmc] AUTHORITY.KEYID = 5
2,710,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,368 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,088 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,981 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,674 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,459 UART: [afmc] --
2,753,489 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,753,511 UART: [cold-reset] --
2,754,191 UART: [state] Locking Datavault
2,755,408 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,012 UART: [state] Locking ICCM
2,756,662 UART: [exit] Launching FMC @ 0x40000000
2,761,959 UART:
2,761,975 UART: Running Caliptra FMC ...
2,762,383 UART:
2,762,521 UART: [fmc] Received command: 0x10000005
2,763,622 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,059 >>> mbox cmd response: success
2,579,019 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,176 UART:
2,585,192 UART: Running Caliptra FMC ...
2,585,600 UART:
2,585,738 UART: [fmc] Received command: 0x10000005
2,586,839 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
915,876 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,653 UART: [idev] ++
1,172,821 UART: [idev] CDI.KEYID = 6
1,173,182 UART: [idev] SUBJECT.KEYID = 7
1,173,607 UART: [idev] UDS.KEYID = 0
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,049 UART: [idev] --
1,208,280 UART: [ldev] ++
1,208,448 UART: [ldev] CDI.KEYID = 6
1,208,812 UART: [ldev] SUBJECT.KEYID = 5
1,209,239 UART: [ldev] AUTHORITY.KEYID = 7
1,209,702 UART: [ldev] FE.KEYID = 1
1,214,824 UART: [ldev] Erasing FE.KEYID = 1
1,240,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,440 UART: [ldev] --
1,279,946 UART: [fwproc] Wait for Commands...
1,280,589 UART: [fwproc] Recv command 0x46574c44
1,281,322 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,373 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,122 >>> mbox cmd response: success
2,673,141 UART: [afmc] ++
2,673,309 UART: [afmc] CDI.KEYID = 6
2,673,672 UART: [afmc] SUBJECT.KEYID = 7
2,674,098 UART: [afmc] AUTHORITY.KEYID = 5
2,709,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,533 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,253 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,146 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,839 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,656 UART: [afmc] --
2,752,650 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,752,672 UART: [cold-reset] --
2,753,388 UART: [state] Locking Datavault
2,754,487 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,091 UART: [state] Locking ICCM
2,755,611 UART: [exit] Launching FMC @ 0x40000000
2,760,908 UART:
2,760,924 UART: Running Caliptra FMC ...
2,761,332 UART:
2,761,470 UART: [fmc] Received command: 0x10000005
2,762,571 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,460 >>> mbox cmd response: success
2,577,516 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,583,979 UART:
2,583,995 UART: Running Caliptra FMC ...
2,584,403 UART:
2,584,541 UART: [fmc] Received command: 0x10000005
2,585,642 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,772 UART: [kat] ++
895,924 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,169,710 UART: [cold-reset] ++
1,170,254 UART: [fht] FHT @ 0x50003400
1,172,754 UART: [idev] ++
1,172,922 UART: [idev] CDI.KEYID = 6
1,173,283 UART: [idev] SUBJECT.KEYID = 7
1,173,708 UART: [idev] UDS.KEYID = 0
1,181,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,209,275 UART: [ldev] ++
1,209,443 UART: [ldev] CDI.KEYID = 6
1,209,807 UART: [ldev] SUBJECT.KEYID = 5
1,210,234 UART: [ldev] AUTHORITY.KEYID = 7
1,210,697 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,471 UART: [ldev] --
1,281,881 UART: [fwproc] Wait for Commands...
1,282,520 UART: [fwproc] Recv command 0x46574c44
1,283,253 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,440 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,523 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,169 >>> mbox cmd response: success
2,674,298 UART: [afmc] ++
2,674,466 UART: [afmc] CDI.KEYID = 6
2,674,829 UART: [afmc] SUBJECT.KEYID = 7
2,675,255 UART: [afmc] AUTHORITY.KEYID = 5
2,711,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,586 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,306 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,199 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,892 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,753 UART: [afmc] --
2,754,815 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,754,837 UART: [cold-reset] --
2,755,735 UART: [state] Locking Datavault
2,757,018 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,622 UART: [state] Locking ICCM
2,758,162 UART: [exit] Launching FMC @ 0x40000000
2,763,459 UART:
2,763,475 UART: Running Caliptra FMC ...
2,763,883 UART:
2,764,021 UART: [fmc] Received command: 0x10000005
2,765,122 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,965 >>> mbox cmd response: success
2,579,771 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,578 UART:
2,585,594 UART: Running Caliptra FMC ...
2,586,002 UART:
2,586,140 UART: [fmc] Received command: 0x10000005
2,587,241 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,707 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,687 UART: [idev] ++
1,172,855 UART: [idev] CDI.KEYID = 6
1,173,216 UART: [idev] SUBJECT.KEYID = 7
1,173,641 UART: [idev] UDS.KEYID = 0
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,407 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,648 UART: [ldev] ++
1,209,816 UART: [ldev] CDI.KEYID = 6
1,210,180 UART: [ldev] SUBJECT.KEYID = 5
1,210,607 UART: [ldev] AUTHORITY.KEYID = 7
1,211,070 UART: [ldev] FE.KEYID = 1
1,216,100 UART: [ldev] Erasing FE.KEYID = 1
1,242,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,330 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,522,121 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,540,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,882 >>> mbox cmd response: success
2,677,101 UART: [afmc] ++
2,677,269 UART: [afmc] CDI.KEYID = 6
2,677,632 UART: [afmc] SUBJECT.KEYID = 7
2,678,058 UART: [afmc] AUTHORITY.KEYID = 5
2,713,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,479 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,199 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,092 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,785 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,692 UART: [afmc] --
2,756,596 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,756,618 UART: [cold-reset] --
2,757,438 UART: [state] Locking Datavault
2,758,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,407 UART: [state] Locking ICCM
2,760,073 UART: [exit] Launching FMC @ 0x40000000
2,765,370 UART:
2,765,386 UART: Running Caliptra FMC ...
2,765,794 UART:
2,765,932 UART: [fmc] Received command: 0x10000005
2,767,033 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,544 >>> mbox cmd response: success
2,578,162 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,584,381 UART:
2,584,397 UART: Running Caliptra FMC ...
2,584,805 UART:
2,584,943 UART: [fmc] Received command: 0x10000005
2,586,044 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,389 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,440 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,672 UART: [idev] ++
1,173,840 UART: [idev] CDI.KEYID = 6
1,174,201 UART: [idev] SUBJECT.KEYID = 7
1,174,626 UART: [idev] UDS.KEYID = 0
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,146 UART: [idev] Sha1 KeyId Algorithm
1,209,100 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,599 UART: [fwproc] Wait for Commands...
1,283,422 UART: [fwproc] Recv command 0x46574c44
1,284,155 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,044 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,637 >>> mbox cmd response: success
2,674,884 UART: [afmc] ++
2,675,052 UART: [afmc] CDI.KEYID = 6
2,675,415 UART: [afmc] SUBJECT.KEYID = 7
2,675,841 UART: [afmc] AUTHORITY.KEYID = 5
2,711,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,744 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,464 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,357 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,050 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,053 UART: [afmc] --
2,755,009 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,755,031 UART: [cold-reset] --
2,755,817 UART: [state] Locking Datavault
2,757,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,654 UART: [state] Locking ICCM
2,758,226 UART: [exit] Launching FMC @ 0x40000000
2,763,523 UART:
2,763,539 UART: Running Caliptra FMC ...
2,763,947 UART:
2,764,085 UART: [fmc] Received command: 0x10000005
2,765,186 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,117 >>> mbox cmd response: success
2,579,139 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,585,234 UART:
2,585,250 UART: Running Caliptra FMC ...
2,585,658 UART:
2,585,796 UART: [fmc] Received command: 0x10000005
2,586,897 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,223,224 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,357,898 UART:
2,358,335 UART: Running Caliptra ROM ...
2,359,449 UART:
2,359,635 UART: [state] CFI Enabled
2,360,624 UART: [state] LifecycleState = Unprovisioned
2,362,279 UART: [state] DebugLocked = No
2,363,310 UART: [state] WD Timer not started. Device not locked for debugging
2,365,782 UART: [kat] SHA2-256
2,366,451 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,369,468 UART: [kat] ++
2,369,914 UART: [kat] sha1
2,370,510 UART: [kat] SHA2-256
2,371,198 UART: [kat] SHA2-384
2,371,857 UART: [kat] SHA2-512-ACC
2,372,680 UART: [kat] ECC-384
3,775,248 UART: [kat] HMAC-384Kdf
3,803,928 UART: [kat] LMS
4,877,041 UART: [kat] --
4,881,714 UART: [cold-reset] ++
4,883,408 UART: [fht] FHT @ 0x50003400
4,894,555 UART: [idev] ++
4,895,275 UART: [idev] CDI.KEYID = 6
4,896,462 UART: [idev] SUBJECT.KEYID = 7
4,897,567 UART: [idev] UDS.KEYID = 0
4,930,410 UART: [idev] Erasing UDS.KEYID = 0
8,245,698 UART: [idev] Sha1 KeyId Algorithm
8,266,881 UART: [idev] --
8,271,505 UART: [ldev] ++
8,272,078 UART: [ldev] CDI.KEYID = 6
8,273,251 UART: [ldev] SUBJECT.KEYID = 5
8,274,465 UART: [ldev] AUTHORITY.KEYID = 7
8,275,617 UART: [ldev] FE.KEYID = 1
8,317,723 UART: [ldev] Erasing FE.KEYID = 1
11,654,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,426 UART: [ldev] --
14,038,746 UART: [fwproc] Wait for Commands...
14,040,949 UART: [fwproc] Recv command 0x46574c44
14,043,263 UART: [fwproc] Recv'd Img size: 106340 bytes
18,019,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,094,842 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,137,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,453,592 >>> mbox cmd response: success
18,458,118 UART: [afmc] ++
18,458,700 UART: [afmc] CDI.KEYID = 6
18,459,933 UART: [afmc] SUBJECT.KEYID = 7
18,461,032 UART: [afmc] AUTHORITY.KEYID = 5
21,822,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,120,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,123,224 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,139,248 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,155,322 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,171,426 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,194,519 UART: [afmc] --
24,198,552 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,198,929 UART: [cold-reset] --
24,203,313 UART: [state] Locking Datavault
24,209,585 UART: [state] Locking PCR0, PCR1 and PCR31
24,211,282 UART: [state] Locking ICCM
24,214,292 UART: [exit] Launching FMC @ 0x40000000
24,222,904 UART:
24,223,133 UART: Running Caliptra FMC ...
24,224,228 UART:
24,224,387 UART: [fmc] Received command: 0x10000003
24,233,952 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,212,625 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,238,456 >>> mbox cmd response: success
23,912,514 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
23,928,385 UART:
23,928,729 UART: Running Caliptra FMC ...
23,929,918 UART:
23,930,089 UART: [fmc] Received command: 0x10000003
23,939,494 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,224,842 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,359,520 UART:
2,359,976 UART: Running Caliptra ROM ...
2,361,149 UART:
2,361,318 UART: [state] CFI Enabled
2,362,303 UART: [state] LifecycleState = Unprovisioned
2,363,945 UART: [state] DebugLocked = No
2,365,050 UART: [state] WD Timer not started. Device not locked for debugging
2,367,518 UART: [kat] SHA2-256
2,368,177 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,371,181 UART: [kat] ++
2,371,627 UART: [kat] sha1
2,372,170 UART: [kat] SHA2-256
2,372,826 UART: [kat] SHA2-384
2,373,475 UART: [kat] SHA2-512-ACC
2,374,350 UART: [kat] ECC-384
4,097,265 UART: [kat] HMAC-384Kdf
4,110,241 UART: [kat] LMS
5,183,352 UART: [kat] --
5,188,112 UART: [cold-reset] ++
5,190,638 UART: [fht] FHT @ 0x50003400
5,202,255 UART: [idev] ++
5,202,931 UART: [idev] CDI.KEYID = 6
5,204,155 UART: [idev] SUBJECT.KEYID = 7
5,205,848 UART: [idev] UDS.KEYID = 0
5,225,082 UART: [idev] Erasing UDS.KEYID = 0
8,498,067 UART: [idev] Sha1 KeyId Algorithm
8,520,058 UART: [idev] --
8,523,678 UART: [ldev] ++
8,524,245 UART: [ldev] CDI.KEYID = 6
8,525,394 UART: [ldev] SUBJECT.KEYID = 5
8,526,919 UART: [ldev] AUTHORITY.KEYID = 7
8,528,466 UART: [ldev] FE.KEYID = 1
8,541,014 UART: [ldev] Erasing FE.KEYID = 1
11,829,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,127 UART: [ldev] --
14,193,929 UART: [fwproc] Wait for Commands...
14,196,984 UART: [fwproc] Recv command 0x46574c44
14,199,286 UART: [fwproc] Recv'd Img size: 106340 bytes
18,171,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,250,509 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,292,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,609,478 >>> mbox cmd response: success
18,613,097 UART: [afmc] ++
18,613,682 UART: [afmc] CDI.KEYID = 6
18,614,807 UART: [afmc] SUBJECT.KEYID = 7
18,616,017 UART: [afmc] AUTHORITY.KEYID = 5
21,935,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,229,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,232,129 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,248,164 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,264,180 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,280,268 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,303,245 UART: [afmc] --
24,307,538 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,307,904 UART: [cold-reset] --
24,311,680 UART: [state] Locking Datavault
24,316,647 UART: [state] Locking PCR0, PCR1 and PCR31
24,318,340 UART: [state] Locking ICCM
24,320,973 UART: [exit] Launching FMC @ 0x40000000
24,329,583 UART:
24,329,885 UART: Running Caliptra FMC ...
24,330,994 UART:
24,331,143 UART: [fmc] Received command: 0x10000003
24,340,681 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,220,605 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,397,701 >>> mbox cmd response: success
24,021,629 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,034,844 UART:
24,035,186 UART: Running Caliptra FMC ...
24,036,371 UART:
24,036,540 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
24,046,237 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,680 writing to cptra_bootfsm_go
2,226,255 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,361,465 UART:
2,361,894 UART: Running Caliptra ROM ...
2,362,979 UART:
2,363,132 UART: [state] CFI Enabled
2,364,122 UART: [state] LifecycleState = Unprovisioned
2,365,775 UART: [state] DebugLocked = No
2,366,801 UART: [state] WD Timer not started. Device not locked for debugging
2,369,270 UART: [kat] SHA2-256
2,369,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,372,948 UART: [kat] ++
2,373,396 UART: [kat] sha1
2,373,907 UART: [kat] SHA2-256
2,374,567 UART: [kat] SHA2-384
2,375,223 UART: [kat] SHA2-512-ACC
2,376,083 UART: [kat] ECC-384
2,945,984 UART: [kat] HMAC-384Kdf
2,971,110 UART: [kat] LMS
3,500,571 UART: [kat] --
3,506,588 UART: [cold-reset] ++
3,508,316 UART: [fht] FHT @ 0x50003400
3,520,275 UART: [idev] ++
3,521,072 UART: [idev] CDI.KEYID = 6
3,521,964 UART: [idev] SUBJECT.KEYID = 7
3,522,982 UART: [idev] UDS.KEYID = 0
3,542,899 UART: [idev] Erasing UDS.KEYID = 0
6,024,525 UART: [idev] Sha1 KeyId Algorithm
6,048,896 UART: [idev] --
6,053,005 UART: [ldev] ++
6,053,622 UART: [ldev] CDI.KEYID = 6
6,054,519 UART: [ldev] SUBJECT.KEYID = 5
6,055,709 UART: [ldev] AUTHORITY.KEYID = 7
6,056,949 UART: [ldev] FE.KEYID = 1
6,098,143 UART: [ldev] Erasing FE.KEYID = 1
8,602,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,965 UART: [ldev] --
10,411,544 UART: [fwproc] Wait for Commands...
10,413,224 UART: [fwproc] Recv command 0x46574c44
10,415,325 UART: [fwproc] Recv'd Img size: 106684 bytes
13,723,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,795,525 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,838,103 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,156,108 >>> mbox cmd response: success
14,160,283 UART: [afmc] ++
14,161,057 UART: [afmc] CDI.KEYID = 6
14,161,954 UART: [afmc] SUBJECT.KEYID = 7
14,163,002 UART: [afmc] AUTHORITY.KEYID = 5
16,699,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,423,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,424,974 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,440,900 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,456,860 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,472,781 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,496,012 UART: [afmc] --
18,500,548 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,500,914 UART: [cold-reset] --
18,504,697 UART: [state] Locking Datavault
18,509,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,511,547 UART: [state] Locking ICCM
18,514,096 UART: [exit] Launching FMC @ 0x40000000
18,522,449 UART:
18,522,686 UART: Running Caliptra FMC ...
18,523,788 UART:
18,523,943 UART: [fmc] Received command: 0x10000003
18,533,540 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,216,221 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,928,262 >>> mbox cmd response: success
18,201,120 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,213,645 UART:
18,214,010 UART: Running Caliptra FMC ...
18,215,122 UART:
18,215,275 UART: [fmc] Received command: 0x10000003
18,224,806 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,218,342 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,353,410 UART:
2,353,823 UART: Running Caliptra ROM ...
2,354,991 UART:
2,355,162 UART: [state] CFI Enabled
2,356,134 UART: [state] LifecycleState = Unprovisioned
2,357,782 UART: [state] DebugLocked = No
2,358,808 UART: [state] WD Timer not started. Device not locked for debugging
2,361,272 UART: [kat] SHA2-256
2,361,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,364,945 UART: [kat] ++
2,365,396 UART: [kat] sha1
2,365,990 UART: [kat] SHA2-256
2,366,834 UART: [kat] SHA2-384
2,367,520 UART: [kat] SHA2-512-ACC
2,368,406 UART: [kat] ECC-384
3,279,475 UART: [kat] HMAC-384Kdf
3,291,816 UART: [kat] LMS
3,821,347 UART: [kat] --
3,825,498 UART: [cold-reset] ++
3,827,694 UART: [fht] FHT @ 0x50003400
3,838,128 UART: [idev] ++
3,838,696 UART: [idev] CDI.KEYID = 6
3,839,612 UART: [idev] SUBJECT.KEYID = 7
3,840,824 UART: [idev] UDS.KEYID = 0
3,859,500 UART: [idev] Erasing UDS.KEYID = 0
6,318,989 UART: [idev] Sha1 KeyId Algorithm
6,341,473 UART: [idev] --
6,345,338 UART: [ldev] ++
6,345,913 UART: [ldev] CDI.KEYID = 6
6,346,843 UART: [ldev] SUBJECT.KEYID = 5
6,348,003 UART: [ldev] AUTHORITY.KEYID = 7
6,349,238 UART: [ldev] FE.KEYID = 1
6,359,397 UART: [ldev] Erasing FE.KEYID = 1
8,832,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,687 UART: [ldev] --
10,621,675 UART: [fwproc] Wait for Commands...
10,624,198 UART: [fwproc] Recv command 0x46574c44
10,626,292 UART: [fwproc] Recv'd Img size: 106684 bytes
13,937,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,073 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,051,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,369,818 >>> mbox cmd response: success
14,374,047 UART: [afmc] ++
14,374,634 UART: [afmc] CDI.KEYID = 6
14,375,542 UART: [afmc] SUBJECT.KEYID = 7
14,376,758 UART: [afmc] AUTHORITY.KEYID = 5
16,879,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,601,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,916 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,618,920 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,634,856 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,650,789 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,672,396 UART: [afmc] --
18,676,924 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,677,301 UART: [cold-reset] --
18,682,112 UART: [state] Locking Datavault
18,685,626 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,350 UART: [state] Locking ICCM
18,689,444 UART: [exit] Launching FMC @ 0x40000000
18,697,836 UART:
18,698,064 UART: Running Caliptra FMC ...
18,699,167 UART:
18,699,327 UART: [fmc] Received command: 0x10000003
18,708,886 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,217,235 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,152,640 >>> mbox cmd response: success
18,394,101 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,407,419 UART:
18,407,784 UART: Running Caliptra FMC ...
18,408,976 UART:
18,409,152 UART: [fmc] Received command: 0x10000003
18,418,562 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,215,879 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,350,872 UART:
2,351,305 UART: Running Caliptra ROM ...
2,352,483 UART:
2,352,655 UART: [state] CFI Enabled
2,353,644 UART: [state] LifecycleState = Unprovisioned
2,355,293 UART: [state] DebugLocked = No
2,356,408 UART: [state] WD Timer not started. Device not locked for debugging
2,358,883 UART: [kat] SHA2-256
2,359,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,362,560 UART: [kat] ++
2,363,012 UART: [kat] sha1
2,363,616 UART: [kat] SHA2-256
2,364,282 UART: [kat] SHA2-384
2,364,940 UART: [kat] SHA2-512-ACC
2,365,763 UART: [kat] ECC-384
2,948,990 UART: [kat] HMAC-384Kdf
2,971,515 UART: [kat] LMS
3,500,942 UART: [kat] --
3,505,880 UART: [cold-reset] ++
3,507,875 UART: [fht] FHT @ 0x50003400
3,520,144 UART: [idev] ++
3,520,711 UART: [idev] CDI.KEYID = 6
3,521,683 UART: [idev] SUBJECT.KEYID = 7
3,522,781 UART: [idev] UDS.KEYID = 0
3,542,972 UART: [idev] Erasing UDS.KEYID = 0
6,022,351 UART: [idev] Sha1 KeyId Algorithm
6,045,049 UART: [idev] --
6,048,296 UART: [ldev] ++
6,048,872 UART: [ldev] CDI.KEYID = 6
6,049,788 UART: [ldev] SUBJECT.KEYID = 5
6,050,974 UART: [ldev] AUTHORITY.KEYID = 7
6,052,212 UART: [ldev] FE.KEYID = 1
6,100,786 UART: [ldev] Erasing FE.KEYID = 1
8,601,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,655 UART: [ldev] --
10,391,531 UART: [fwproc] Wait for Commands...
10,393,418 UART: [fwproc] Recv command 0x46574c44
10,395,516 UART: [fwproc] Recv'd Img size: 106684 bytes
13,704,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,771,780 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,814,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,132,139 >>> mbox cmd response: success
14,136,952 UART: [afmc] ++
14,137,725 UART: [afmc] CDI.KEYID = 6
14,138,643 UART: [afmc] SUBJECT.KEYID = 7
14,139,690 UART: [afmc] AUTHORITY.KEYID = 5
16,678,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,404,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,406,337 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,422,335 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,438,267 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,454,187 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,476,409 UART: [afmc] --
18,479,382 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,479,752 UART: [cold-reset] --
18,483,480 UART: [state] Locking Datavault
18,488,084 UART: [state] Locking PCR0, PCR1 and PCR31
18,489,734 UART: [state] Locking ICCM
18,492,389 UART: [exit] Launching FMC @ 0x40000000
18,500,737 UART:
18,500,984 UART: Running Caliptra FMC ...
18,502,085 UART:
18,502,247 UART: [fmc] Received command: 0x10000003
18,511,825 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,213,956 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,947,844 >>> mbox cmd response: success
18,217,703 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,231,180 UART:
18,231,547 UART: Running Caliptra FMC ...
18,232,748 UART:
18,232,915 UART: [fmc] Received command: 0x10000003
18,242,255 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
2,224,215 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,359,109 UART:
2,359,524 UART: Running Caliptra ROM ...
2,360,642 UART:
2,360,802 UART: [state] CFI Enabled
2,361,794 UART: [state] LifecycleState = Unprovisioned
2,363,447 UART: [state] DebugLocked = No
2,364,474 UART: [state] WD Timer not started. Device not locked for debugging
2,366,947 UART: [kat] SHA2-256
2,367,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,370,626 UART: [kat] ++
2,371,095 UART: [kat] sha1
2,371,611 UART: [kat] SHA2-256
2,372,269 UART: [kat] SHA2-384
2,372,929 UART: [kat] SHA2-512-ACC
2,373,813 UART: [kat] ECC-384
3,278,963 UART: [kat] HMAC-384Kdf
3,291,445 UART: [kat] LMS
3,820,952 UART: [kat] --
3,825,551 UART: [cold-reset] ++
3,826,866 UART: [fht] FHT @ 0x50003400
3,837,100 UART: [idev] ++
3,837,664 UART: [idev] CDI.KEYID = 6
3,838,567 UART: [idev] SUBJECT.KEYID = 7
3,839,779 UART: [idev] UDS.KEYID = 0
3,854,674 UART: [idev] Erasing UDS.KEYID = 0
6,311,258 UART: [idev] Sha1 KeyId Algorithm
6,334,554 UART: [idev] --
6,340,226 UART: [ldev] ++
6,340,791 UART: [ldev] CDI.KEYID = 6
6,341,701 UART: [ldev] SUBJECT.KEYID = 5
6,342,913 UART: [ldev] AUTHORITY.KEYID = 7
6,344,138 UART: [ldev] FE.KEYID = 1
6,354,836 UART: [ldev] Erasing FE.KEYID = 1
8,831,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,881 UART: [ldev] --
10,620,951 UART: [fwproc] Wait for Commands...
10,623,374 UART: [fwproc] Recv command 0x46574c44
10,625,510 UART: [fwproc] Recv'd Img size: 106684 bytes
13,926,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,983 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,041,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,358,586 >>> mbox cmd response: success
14,362,494 UART: [afmc] ++
14,363,076 UART: [afmc] CDI.KEYID = 6
14,363,963 UART: [afmc] SUBJECT.KEYID = 7
14,365,115 UART: [afmc] AUTHORITY.KEYID = 5
16,860,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,581,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,583,663 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,599,600 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,615,547 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,631,510 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,653,011 UART: [afmc] --
18,657,364 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,657,749 UART: [cold-reset] --
18,660,938 UART: [state] Locking Datavault
18,664,829 UART: [state] Locking PCR0, PCR1 and PCR31
18,666,470 UART: [state] Locking ICCM
18,668,270 UART: [exit] Launching FMC @ 0x40000000
18,676,663 UART:
18,676,899 UART: Running Caliptra FMC ...
18,677,919 UART:
18,678,065 UART: [fmc] Received command: 0x10000003
18,687,690 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,221,249 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,161,463 >>> mbox cmd response: success
18,394,920 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,410,048 UART:
18,410,391 UART: Running Caliptra FMC ...
18,411,586 UART:
18,411,751 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,421,476 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,615 UART: [kat] SHA2-256
901,555 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,478 UART: [kat] LMS
1,168,790 UART: [kat] --
1,169,585 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,729 UART: [idev] ++
1,172,897 UART: [idev] CDI.KEYID = 6
1,173,258 UART: [idev] SUBJECT.KEYID = 7
1,173,683 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,199,121 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,252 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,257 UART: [fwproc] Recv command 0x46574c44
1,281,990 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,643 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,414 >>> mbox cmd response: success
2,673,503 UART: [afmc] ++
2,673,671 UART: [afmc] CDI.KEYID = 6
2,674,034 UART: [afmc] SUBJECT.KEYID = 7
2,674,460 UART: [afmc] AUTHORITY.KEYID = 5
2,709,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,069 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,789 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,682 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,375 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,280 UART: [afmc] --
2,753,162 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,753,184 UART: [cold-reset] --
2,754,062 UART: [state] Locking Datavault
2,755,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,121 UART: [state] Locking ICCM
2,756,647 UART: [exit] Launching FMC @ 0x40000000
2,761,944 UART:
2,761,960 UART: Running Caliptra FMC ...
2,762,368 UART:
2,762,506 UART: [fmc] Received command: 0x10000003
2,771,982 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,950 >>> mbox cmd response: success
2,578,608 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,584,837 UART:
2,584,853 UART: Running Caliptra FMC ...
2,585,261 UART:
2,585,399 UART: [fmc] Received command: 0x10000003
2,594,875 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,752 UART: [kat] ++
895,904 UART: [kat] sha1
900,052 UART: [kat] SHA2-256
901,992 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,101 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,360 UART: [fht] FHT @ 0x50003400
1,172,946 UART: [idev] ++
1,173,114 UART: [idev] CDI.KEYID = 6
1,173,475 UART: [idev] SUBJECT.KEYID = 7
1,173,900 UART: [idev] UDS.KEYID = 0
1,181,834 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,924 UART: [idev] --
1,209,127 UART: [ldev] ++
1,209,295 UART: [ldev] CDI.KEYID = 6
1,209,659 UART: [ldev] SUBJECT.KEYID = 5
1,210,086 UART: [ldev] AUTHORITY.KEYID = 7
1,210,549 UART: [ldev] FE.KEYID = 1
1,215,915 UART: [ldev] Erasing FE.KEYID = 1
1,241,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,621 UART: [fwproc] Wait for Commands...
1,282,254 UART: [fwproc] Recv command 0x46574c44
1,282,987 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,582 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,171 >>> mbox cmd response: success
2,674,248 UART: [afmc] ++
2,674,416 UART: [afmc] CDI.KEYID = 6
2,674,779 UART: [afmc] SUBJECT.KEYID = 7
2,675,205 UART: [afmc] AUTHORITY.KEYID = 5
2,711,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,914 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,634 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,527 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,220 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,073 UART: [afmc] --
2,755,057 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,079 UART: [cold-reset] --
2,755,987 UART: [state] Locking Datavault
2,756,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,534 UART: [state] Locking ICCM
2,758,106 UART: [exit] Launching FMC @ 0x40000000
2,763,403 UART:
2,763,419 UART: Running Caliptra FMC ...
2,763,827 UART:
2,763,965 UART: [fmc] Received command: 0x10000003
2,773,441 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,526,093 >>> mbox cmd response: success
2,581,839 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,587,882 UART:
2,587,898 UART: Running Caliptra FMC ...
2,588,306 UART:
2,588,444 UART: [fmc] Received command: 0x10000003
2,597,920 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,338 UART: [kat] SHA2-512-ACC
906,239 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,390 UART: [kat] LMS
1,168,702 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,928 UART: [ldev] ++
1,209,096 UART: [ldev] CDI.KEYID = 6
1,209,460 UART: [ldev] SUBJECT.KEYID = 5
1,209,887 UART: [ldev] AUTHORITY.KEYID = 7
1,210,350 UART: [ldev] FE.KEYID = 1
1,215,474 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,742 UART: [ldev] --
1,281,062 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,899 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,510 >>> mbox cmd response: success
2,674,679 UART: [afmc] ++
2,674,847 UART: [afmc] CDI.KEYID = 6
2,675,210 UART: [afmc] SUBJECT.KEYID = 7
2,675,636 UART: [afmc] AUTHORITY.KEYID = 5
2,711,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,373 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,093 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,986 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,679 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,488 UART: [afmc] --
2,754,384 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,754,406 UART: [cold-reset] --
2,755,326 UART: [state] Locking Datavault
2,756,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,797 UART: [state] Locking ICCM
2,757,323 UART: [exit] Launching FMC @ 0x40000000
2,762,620 UART:
2,762,636 UART: Running Caliptra FMC ...
2,763,044 UART:
2,763,182 UART: [fmc] Received command: 0x10000003
2,772,658 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,520,602 >>> mbox cmd response: success
2,577,244 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,583,307 UART:
2,583,323 UART: Running Caliptra FMC ...
2,583,731 UART:
2,583,869 UART: [fmc] Received command: 0x10000003
2,593,345 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
87,991 UART: [kat] SHA2-256
891,541 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,276 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,182,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,264 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,216,057 UART: [ldev] Erasing FE.KEYID = 1
1,242,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,915 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,353 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,358 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,935 >>> mbox cmd response: success
2,675,038 UART: [afmc] ++
2,675,206 UART: [afmc] CDI.KEYID = 6
2,675,569 UART: [afmc] SUBJECT.KEYID = 7
2,675,995 UART: [afmc] AUTHORITY.KEYID = 5
2,710,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,998 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,718 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,611 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,304 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,087 UART: [afmc] --
2,754,151 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,754,173 UART: [cold-reset] --
2,754,777 UART: [state] Locking Datavault
2,756,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,782 UART: [state] Locking ICCM
2,757,286 UART: [exit] Launching FMC @ 0x40000000
2,762,583 UART:
2,762,599 UART: Running Caliptra FMC ...
2,763,007 UART:
2,763,145 UART: [fmc] Received command: 0x10000003
2,772,621 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,037 >>> mbox cmd response: success
2,580,357 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,586,392 UART:
2,586,408 UART: Running Caliptra FMC ...
2,586,816 UART:
2,586,954 UART: [fmc] Received command: 0x10000003
2,596,430 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,735 UART: [cold-reset] ++
1,170,063 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,209,016 UART: [ldev] ++
1,209,184 UART: [ldev] CDI.KEYID = 6
1,209,548 UART: [ldev] SUBJECT.KEYID = 5
1,209,975 UART: [ldev] AUTHORITY.KEYID = 7
1,210,438 UART: [ldev] FE.KEYID = 1
1,215,826 UART: [ldev] Erasing FE.KEYID = 1
1,242,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,238 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,909 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,686 >>> mbox cmd response: success
2,674,827 UART: [afmc] ++
2,674,995 UART: [afmc] CDI.KEYID = 6
2,675,358 UART: [afmc] SUBJECT.KEYID = 7
2,675,784 UART: [afmc] AUTHORITY.KEYID = 5
2,710,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,101 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,821 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,714 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,407 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,356 UART: [afmc] --
2,754,414 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,754,436 UART: [cold-reset] --
2,755,340 UART: [state] Locking Datavault
2,756,403 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,007 UART: [state] Locking ICCM
2,757,521 UART: [exit] Launching FMC @ 0x40000000
2,762,818 UART:
2,762,834 UART: Running Caliptra FMC ...
2,763,242 UART:
2,763,380 UART: [fmc] Received command: 0x10000003
2,772,856 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,402 >>> mbox cmd response: success
2,576,070 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,582,073 UART:
2,582,089 UART: Running Caliptra FMC ...
2,582,497 UART:
2,582,635 UART: [fmc] Received command: 0x10000003
2,592,111 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
891,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,926 UART: [kat] ++
896,078 UART: [kat] sha1
900,424 UART: [kat] SHA2-256
902,364 UART: [kat] SHA2-384
905,123 UART: [kat] SHA2-512-ACC
907,024 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,556 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,960 UART: [idev] Sha1 KeyId Algorithm
1,208,828 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,667 UART: [ldev] Erasing FE.KEYID = 1
1,243,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,543 UART: [fwproc] Wait for Commands...
1,283,144 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,774 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,463 >>> mbox cmd response: success
2,674,690 UART: [afmc] ++
2,674,858 UART: [afmc] CDI.KEYID = 6
2,675,221 UART: [afmc] SUBJECT.KEYID = 7
2,675,647 UART: [afmc] AUTHORITY.KEYID = 5
2,711,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,000 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,720 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,613 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,306 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,281 UART: [afmc] --
2,755,389 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,755,411 UART: [cold-reset] --
2,756,225 UART: [state] Locking Datavault
2,757,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,142 UART: [state] Locking ICCM
2,758,810 UART: [exit] Launching FMC @ 0x40000000
2,764,107 UART:
2,764,123 UART: Running Caliptra FMC ...
2,764,531 UART:
2,764,669 UART: [fmc] Received command: 0x10000003
2,774,145 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,861 >>> mbox cmd response: success
2,579,103 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,585,454 UART:
2,585,470 UART: Running Caliptra FMC ...
2,585,878 UART:
2,586,016 UART: [fmc] Received command: 0x10000003
2,595,492 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,038 UART:
192,453 UART: Running Caliptra ROM ...
193,578 UART:
193,723 UART: [state] CFI Enabled
264,352 UART: [state] LifecycleState = Unprovisioned
266,760 UART: [state] DebugLocked = No
268,998 UART: [state] WD Timer not started. Device not locked for debugging
273,881 UART: [kat] SHA2-256
455,825 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,356 UART: [kat] ++
467,885 UART: [kat] sha1
479,739 UART: [kat] SHA2-256
482,806 UART: [kat] SHA2-384
488,506 UART: [kat] SHA2-512-ACC
491,120 UART: [kat] ECC-384
3,774,026 UART: [kat] HMAC-384Kdf
3,803,460 UART: [kat] LMS
4,876,642 UART: [kat] --
4,882,377 UART: [cold-reset] ++
4,884,598 UART: [fht] FHT @ 0x50003400
4,896,073 UART: [idev] ++
4,896,749 UART: [idev] CDI.KEYID = 6
4,897,982 UART: [idev] SUBJECT.KEYID = 7
4,899,159 UART: [idev] UDS.KEYID = 0
4,930,273 UART: [idev] Erasing UDS.KEYID = 0
8,246,867 UART: [idev] Sha1 KeyId Algorithm
8,269,714 UART: [idev] --
8,273,524 UART: [ldev] ++
8,274,097 UART: [ldev] CDI.KEYID = 6
8,275,293 UART: [ldev] SUBJECT.KEYID = 5
8,276,450 UART: [ldev] AUTHORITY.KEYID = 7
8,277,678 UART: [ldev] FE.KEYID = 1
8,317,703 UART: [ldev] Erasing FE.KEYID = 1
11,652,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,385 UART: [ldev] --
14,037,799 UART: [fwproc] Wait for Commands...
14,040,732 UART: [fwproc] Recv command 0x46574c44
14,043,071 UART: Invalid Img size: 131073 bytes
14,045,858 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,721 UART:
193,099 UART: Running Caliptra ROM ...
194,336 UART:
604,002 UART: [state] CFI Enabled
616,296 UART: [state] LifecycleState = Unprovisioned
618,643 UART: [state] DebugLocked = No
619,854 UART: [state] WD Timer not started. Device not locked for debugging
623,630 UART: [kat] SHA2-256
805,626 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,180 UART: [kat] ++
817,788 UART: [kat] sha1
827,371 UART: [kat] SHA2-256
830,432 UART: [kat] SHA2-384
835,590 UART: [kat] SHA2-512-ACC
838,202 UART: [kat] ECC-384
4,089,440 UART: [kat] HMAC-384Kdf
4,101,742 UART: [kat] LMS
5,174,897 UART: [kat] --
5,177,464 UART: [cold-reset] ++
5,178,922 UART: [fht] FHT @ 0x50003400
5,190,722 UART: [idev] ++
5,191,446 UART: [idev] CDI.KEYID = 6
5,192,634 UART: [idev] SUBJECT.KEYID = 7
5,194,073 UART: [idev] UDS.KEYID = 0
5,209,298 UART: [idev] Erasing UDS.KEYID = 0
8,479,484 UART: [idev] Sha1 KeyId Algorithm
8,500,913 UART: [idev] --
8,504,156 UART: [ldev] ++
8,504,789 UART: [ldev] CDI.KEYID = 6
8,505,971 UART: [ldev] SUBJECT.KEYID = 5
8,507,416 UART: [ldev] AUTHORITY.KEYID = 7
8,508,909 UART: [ldev] FE.KEYID = 1
8,519,777 UART: [ldev] Erasing FE.KEYID = 1
11,813,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,104,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,121,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,137,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,153,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,173,173 UART: [ldev] --
14,177,900 UART: [fwproc] Wait for Commands...
14,179,987 UART: [fwproc] Recv command 0x46574c44
14,182,255 UART: Invalid Img size: 131073 bytes
14,186,654 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,153 UART:
192,669 UART: Running Caliptra ROM ...
193,858 UART:
194,008 UART: [state] CFI Enabled
267,276 UART: [state] LifecycleState = Unprovisioned
269,173 UART: [state] DebugLocked = No
271,541 UART: [state] WD Timer not started. Device not locked for debugging
276,082 UART: [kat] SHA2-256
455,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,770 UART: [kat] ++
467,302 UART: [kat] sha1
477,380 UART: [kat] SHA2-256
480,452 UART: [kat] SHA2-384
487,451 UART: [kat] SHA2-512-ACC
490,440 UART: [kat] ECC-384
2,949,420 UART: [kat] HMAC-384Kdf
2,973,008 UART: [kat] LMS
3,502,442 UART: [kat] --
3,505,929 UART: [cold-reset] ++
3,507,753 UART: [fht] FHT @ 0x50003400
3,518,081 UART: [idev] ++
3,518,652 UART: [idev] CDI.KEYID = 6
3,519,613 UART: [idev] SUBJECT.KEYID = 7
3,520,773 UART: [idev] UDS.KEYID = 0
3,545,402 UART: [idev] Erasing UDS.KEYID = 0
6,027,380 UART: [idev] Sha1 KeyId Algorithm
6,051,037 UART: [idev] --
6,054,219 UART: [ldev] ++
6,054,789 UART: [ldev] CDI.KEYID = 6
6,055,700 UART: [ldev] SUBJECT.KEYID = 5
6,056,805 UART: [ldev] AUTHORITY.KEYID = 7
6,058,159 UART: [ldev] FE.KEYID = 1
6,103,402 UART: [ldev] Erasing FE.KEYID = 1
8,608,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,798 UART: [ldev] --
10,417,521 UART: [fwproc] Wait for Commands...
10,420,162 UART: [fwproc] Recv command 0x46574c44
10,422,209 UART: Invalid Img size: 131073 bytes
10,425,499 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,369 UART:
192,754 UART: Running Caliptra ROM ...
193,891 UART:
603,513 UART: [state] CFI Enabled
616,008 UART: [state] LifecycleState = Unprovisioned
617,903 UART: [state] DebugLocked = No
619,982 UART: [state] WD Timer not started. Device not locked for debugging
623,379 UART: [kat] SHA2-256
802,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,052 UART: [kat] ++
814,593 UART: [kat] sha1
826,662 UART: [kat] SHA2-256
829,719 UART: [kat] SHA2-384
837,149 UART: [kat] SHA2-512-ACC
840,078 UART: [kat] ECC-384
3,281,280 UART: [kat] HMAC-384Kdf
3,293,852 UART: [kat] LMS
3,823,333 UART: [kat] --
3,827,625 UART: [cold-reset] ++
3,829,932 UART: [fht] FHT @ 0x50003400
3,840,375 UART: [idev] ++
3,840,937 UART: [idev] CDI.KEYID = 6
3,841,899 UART: [idev] SUBJECT.KEYID = 7
3,843,057 UART: [idev] UDS.KEYID = 0
3,863,466 UART: [idev] Erasing UDS.KEYID = 0
6,319,906 UART: [idev] Sha1 KeyId Algorithm
6,342,385 UART: [idev] --
6,345,760 UART: [ldev] ++
6,346,337 UART: [ldev] CDI.KEYID = 6
6,347,219 UART: [ldev] SUBJECT.KEYID = 5
6,348,430 UART: [ldev] AUTHORITY.KEYID = 7
6,349,659 UART: [ldev] FE.KEYID = 1
6,360,297 UART: [ldev] Erasing FE.KEYID = 1
8,836,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,136 UART: [ldev] --
10,627,346 UART: [fwproc] Wait for Commands...
10,629,279 UART: [fwproc] Recv command 0x46574c44
10,631,369 UART: Invalid Img size: 131073 bytes
10,634,694 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,297 UART:
192,692 UART: Running Caliptra ROM ...
193,892 UART:
194,051 UART: [state] CFI Enabled
263,703 UART: [state] LifecycleState = Unprovisioned
265,610 UART: [state] DebugLocked = No
267,962 UART: [state] WD Timer not started. Device not locked for debugging
271,199 UART: [kat] SHA2-256
450,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,894 UART: [kat] ++
462,427 UART: [kat] sha1
472,929 UART: [kat] SHA2-256
475,934 UART: [kat] SHA2-384
483,638 UART: [kat] SHA2-512-ACC
486,625 UART: [kat] ECC-384
2,981,355 UART: [kat] HMAC-384Kdf
3,006,051 UART: [kat] LMS
3,535,532 UART: [kat] --
3,539,206 UART: [cold-reset] ++
3,541,107 UART: [fht] FHT @ 0x50003400
3,550,928 UART: [idev] ++
3,551,511 UART: [idev] CDI.KEYID = 6
3,552,425 UART: [idev] SUBJECT.KEYID = 7
3,553,643 UART: [idev] UDS.KEYID = 0
3,578,529 UART: [idev] Erasing UDS.KEYID = 0
6,074,362 UART: [idev] Sha1 KeyId Algorithm
6,097,324 UART: [idev] --
6,100,835 UART: [ldev] ++
6,101,444 UART: [ldev] CDI.KEYID = 6
6,102,359 UART: [ldev] SUBJECT.KEYID = 5
6,103,465 UART: [ldev] AUTHORITY.KEYID = 7
6,104,670 UART: [ldev] FE.KEYID = 1
6,150,042 UART: [ldev] Erasing FE.KEYID = 1
8,656,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,391,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,407,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,422,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,438,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,458,536 UART: [ldev] --
10,462,343 UART: [fwproc] Wait for Commands...
10,464,281 UART: [fwproc] Recv command 0x46574c44
10,466,331 UART: Invalid Img size: 131073 bytes
10,470,680 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,434 UART:
192,828 UART: Running Caliptra ROM ...
194,033 UART:
603,743 UART: [state] CFI Enabled
616,434 UART: [state] LifecycleState = Unprovisioned
618,316 UART: [state] DebugLocked = No
621,206 UART: [state] WD Timer not started. Device not locked for debugging
625,031 UART: [kat] SHA2-256
804,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,751 UART: [kat] ++
816,291 UART: [kat] sha1
826,697 UART: [kat] SHA2-256
829,750 UART: [kat] SHA2-384
835,534 UART: [kat] SHA2-512-ACC
838,470 UART: [kat] ECC-384
3,278,958 UART: [kat] HMAC-384Kdf
3,291,144 UART: [kat] LMS
3,820,634 UART: [kat] --
3,826,841 UART: [cold-reset] ++
3,829,100 UART: [fht] FHT @ 0x50003400
3,839,317 UART: [idev] ++
3,839,870 UART: [idev] CDI.KEYID = 6
3,840,810 UART: [idev] SUBJECT.KEYID = 7
3,842,021 UART: [idev] UDS.KEYID = 0
3,856,085 UART: [idev] Erasing UDS.KEYID = 0
6,316,376 UART: [idev] Sha1 KeyId Algorithm
6,339,388 UART: [idev] --
6,344,382 UART: [ldev] ++
6,344,960 UART: [ldev] CDI.KEYID = 6
6,345,911 UART: [ldev] SUBJECT.KEYID = 5
6,347,071 UART: [ldev] AUTHORITY.KEYID = 7
6,348,304 UART: [ldev] FE.KEYID = 1
6,360,736 UART: [ldev] Erasing FE.KEYID = 1
8,836,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,262 UART: [ldev] --
10,625,441 UART: [fwproc] Wait for Commands...
10,627,486 UART: [fwproc] Recv command 0x46574c44
10,629,580 UART: Invalid Img size: 131073 bytes
10,634,393 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,540 UART: [kat] SHA2-512-ACC
906,441 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,180,943 UART: [idev] Erasing UDS.KEYID = 0
1,197,763 UART: [idev] Sha1 KeyId Algorithm
1,206,519 UART: [idev] --
1,207,622 UART: [ldev] ++
1,207,790 UART: [ldev] CDI.KEYID = 6
1,208,154 UART: [ldev] SUBJECT.KEYID = 5
1,208,581 UART: [ldev] AUTHORITY.KEYID = 7
1,209,044 UART: [ldev] FE.KEYID = 1
1,213,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,236 UART: [ldev] --
1,279,542 UART: [fwproc] Wait for Commands...
1,280,135 UART: [fwproc] Recv command 0x46574c44
1,280,869 UART: Invalid Img size: 131073 bytes
1,282,083 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Unprovisioned
86,336 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,546 UART: [idev] Sha1 KeyId Algorithm
1,208,546 UART: [idev] --
1,209,497 UART: [ldev] ++
1,209,665 UART: [ldev] CDI.KEYID = 6
1,210,029 UART: [ldev] SUBJECT.KEYID = 5
1,210,456 UART: [ldev] AUTHORITY.KEYID = 7
1,210,919 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,975 UART: [ldev] --
1,281,267 UART: [fwproc] Wait for Commands...
1,281,950 UART: [fwproc] Recv command 0x46574c44
1,282,684 UART: Invalid Img size: 131073 bytes
1,283,622 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,710 UART: [kat] LMS
1,169,022 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,182,219 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,208,103 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,544 UART: [ldev] Erasing FE.KEYID = 1
1,241,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,790 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,891 UART: [fwproc] Recv command 0x46574c44
1,281,625 UART: Invalid Img size: 131073 bytes
1,282,641 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,206 UART: [state] WD Timer not started. Device not locked for debugging
88,481 UART: [kat] SHA2-256
892,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,160 UART: [kat] ++
896,312 UART: [kat] sha1
900,438 UART: [kat] SHA2-256
902,378 UART: [kat] SHA2-384
905,077 UART: [kat] SHA2-512-ACC
906,978 UART: [kat] ECC-384
917,157 UART: [kat] HMAC-384Kdf
921,875 UART: [kat] LMS
1,170,187 UART: [kat] --
1,171,150 UART: [cold-reset] ++
1,171,618 UART: [fht] FHT @ 0x50003400
1,174,084 UART: [idev] ++
1,174,252 UART: [idev] CDI.KEYID = 6
1,174,613 UART: [idev] SUBJECT.KEYID = 7
1,175,038 UART: [idev] UDS.KEYID = 0
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,200,186 UART: [idev] Sha1 KeyId Algorithm
1,209,106 UART: [idev] --
1,210,151 UART: [ldev] ++
1,210,319 UART: [ldev] CDI.KEYID = 6
1,210,683 UART: [ldev] SUBJECT.KEYID = 5
1,211,110 UART: [ldev] AUTHORITY.KEYID = 7
1,211,573 UART: [ldev] FE.KEYID = 1
1,216,957 UART: [ldev] Erasing FE.KEYID = 1
1,243,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,399 UART: [fwproc] Wait for Commands...
1,283,146 UART: [fwproc] Recv command 0x46574c44
1,283,880 UART: Invalid Img size: 131073 bytes
1,284,946 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
900,187 UART: [kat] SHA2-256
902,127 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,093 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,609 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,215,484 UART: [ldev] Erasing FE.KEYID = 1
1,242,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,382 UART: [fwproc] Wait for Commands...
1,282,201 UART: [fwproc] Recv command 0x46574c44
1,282,935 UART: Invalid Img size: 131073 bytes
1,283,985 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,307 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,336 UART: [cold-reset] ++
1,170,708 UART: [fht] FHT @ 0x50003400
1,173,314 UART: [idev] ++
1,173,482 UART: [idev] CDI.KEYID = 6
1,173,843 UART: [idev] SUBJECT.KEYID = 7
1,174,268 UART: [idev] UDS.KEYID = 0
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,208,126 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,243,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,447 UART: [fwproc] Wait for Commands...
1,283,246 UART: [fwproc] Recv command 0x46574c44
1,283,980 UART: Invalid Img size: 131073 bytes
1,284,864 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
2,212,137 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,346,818 UART:
2,347,555 UART: Running Caliptra ROM ...
2,348,769 UART:
2,348,965 UART: [state] CFI Enabled
2,349,941 UART: [state] LifecycleState = Unprovisioned
2,351,589 UART: [state] DebugLocked = No
2,352,696 UART: [state] WD Timer not started. Device not locked for debugging
2,355,168 UART: [kat] SHA2-256
2,355,835 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,358,845 UART: [kat] ++
2,359,297 UART: [kat] sha1
2,359,812 UART: [kat] SHA2-256
2,360,468 UART: [kat] SHA2-384
2,361,123 UART: [kat] SHA2-512-ACC
2,362,017 UART: [kat] ECC-384
3,774,203 UART: [kat] HMAC-384Kdf
3,801,504 UART: [kat] LMS
4,874,654 UART: [kat] --
4,879,159 UART: [cold-reset] ++
4,880,680 UART: [fht] FHT @ 0x50003400
4,893,449 UART: [idev] ++
4,894,125 UART: [idev] CDI.KEYID = 6
4,895,363 UART: [idev] SUBJECT.KEYID = 7
4,896,468 UART: [idev] UDS.KEYID = 0
4,930,739 UART: [idev] Erasing UDS.KEYID = 0
8,240,300 UART: [idev] Sha1 KeyId Algorithm
8,261,169 UART: [idev] --
8,264,139 UART: [ldev] ++
8,264,703 UART: [ldev] CDI.KEYID = 6
8,265,935 UART: [ldev] SUBJECT.KEYID = 5
8,267,032 UART: [ldev] AUTHORITY.KEYID = 7
8,268,413 UART: [ldev] FE.KEYID = 1
8,297,442 UART: [ldev] Erasing FE.KEYID = 1
11,632,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,962,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,978,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,994,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,762 UART: [ldev] --
14,017,948 UART: [fwproc] Wait for Commands...
14,020,480 UART: [fwproc] Recv command 0x46574c44
14,022,798 UART: [fwproc] Recv'd Img size: 106340 bytes
22,267,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,344,771 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,387,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,703,914 >>> mbox cmd response: success
22,708,753 UART: [afmc] ++
22,709,457 UART: [afmc] CDI.KEYID = 6
22,710,642 UART: [afmc] SUBJECT.KEYID = 7
22,711,801 UART: [afmc] AUTHORITY.KEYID = 5
26,089,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,405,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,407,642 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,423,622 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,439,687 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,455,716 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,478,460 UART: [afmc] --
28,481,685 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,482,069 UART: [cold-reset] --
28,485,426 UART: [state] Locking Datavault
28,488,302 UART: [state] Locking PCR0, PCR1 and PCR31
28,489,996 UART: [state] Locking ICCM
28,491,175 UART: [exit] Launching FMC @ 0x40000000
28,499,789 UART:
28,500,026 UART: Running Caliptra FMC ...
28,501,131 UART:
28,501,289 UART: [fmc] Received command: 0x10000002
28,503,202 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,213,192 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
22,427,218 >>> mbox cmd response: success
28,115,690 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,128,451 UART:
28,128,803 UART: Running Caliptra FMC ...
28,129,897 UART:
28,130,045 UART: [fmc] Received command: 0x10000002
28,131,885 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,221,432 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
2,356,237 UART:
2,356,917 UART: Running Caliptra ROM ...
2,358,032 UART:
2,358,198 UART: [state] CFI Enabled
2,359,095 UART: [state] LifecycleState = Unprovisioned
2,360,765 UART: [state] DebugLocked = No
2,361,875 UART: [state] WD Timer not started. Device not locked for debugging
2,364,338 UART: [kat] SHA2-256
2,364,998 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,368,019 UART: [kat] ++
2,368,466 UART: [kat] sha1
2,368,970 UART: [kat] SHA2-256
2,369,650 UART: [kat] SHA2-384
2,370,301 UART: [kat] SHA2-512-ACC
2,371,118 UART: [kat] ECC-384
4,099,444 UART: [kat] HMAC-384Kdf
4,111,858 UART: [kat] LMS
5,185,001 UART: [kat] --
5,190,632 UART: [cold-reset] ++
5,191,971 UART: [fht] FHT @ 0x50003400
5,203,727 UART: [idev] ++
5,204,497 UART: [idev] CDI.KEYID = 6
5,205,556 UART: [idev] SUBJECT.KEYID = 7
5,207,096 UART: [idev] UDS.KEYID = 0
5,220,829 UART: [idev] Erasing UDS.KEYID = 0
8,495,465 UART: [idev] Sha1 KeyId Algorithm
8,518,368 UART: [idev] --
8,522,356 UART: [ldev] ++
8,522,918 UART: [ldev] CDI.KEYID = 6
8,524,147 UART: [ldev] SUBJECT.KEYID = 5
8,525,574 UART: [ldev] AUTHORITY.KEYID = 7
8,527,119 UART: [ldev] FE.KEYID = 1
8,538,889 UART: [ldev] Erasing FE.KEYID = 1
11,827,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,563 UART: [ldev] --
14,195,585 UART: [fwproc] Wait for Commands...
14,197,680 UART: [fwproc] Recv command 0x46574c44
14,199,985 UART: [fwproc] Recv'd Img size: 106340 bytes
22,097,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,175,361 UART: [fwproc] Load FMC at address 0x40000000 len 11316
22,217,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,534,688 >>> mbox cmd response: success
22,538,493 UART: [afmc] ++
22,539,241 UART: [afmc] CDI.KEYID = 6
22,540,422 UART: [afmc] SUBJECT.KEYID = 7
22,541,585 UART: [afmc] AUTHORITY.KEYID = 5
25,855,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,152,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,154,632 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
28,170,699 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
28,186,699 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
28,202,724 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
28,225,018 UART: [afmc] --
28,228,243 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,228,607 UART: [cold-reset] --
28,232,494 UART: [state] Locking Datavault
28,238,555 UART: [state] Locking PCR0, PCR1 and PCR31
28,240,239 UART: [state] Locking ICCM
28,242,169 UART: [exit] Launching FMC @ 0x40000000
28,250,779 UART:
28,251,006 UART: Running Caliptra FMC ...
28,252,109 UART:
28,252,254 UART: [fmc] Received command: 0x10000002
28,254,192 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,221,055 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
22,423,498 >>> mbox cmd response: success
28,052,426 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
28,067,380 UART:
28,067,759 UART: Running Caliptra FMC ...
28,068,934 UART:
28,069,098 UART: [fmc] Received command: 0x10000002
28,070,819 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
2,217,363 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,352,454 UART:
2,352,876 UART: Running Caliptra ROM ...
2,353,962 UART:
2,354,117 UART: [state] CFI Enabled
2,355,002 UART: [state] LifecycleState = Unprovisioned
2,356,662 UART: [state] DebugLocked = No
2,357,687 UART: [state] WD Timer not started. Device not locked for debugging
2,360,160 UART: [kat] SHA2-256
2,360,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,363,836 UART: [kat] ++
2,364,284 UART: [kat] sha1
2,364,794 UART: [kat] SHA2-256
2,365,450 UART: [kat] SHA2-384
2,366,105 UART: [kat] SHA2-512-ACC
2,366,909 UART: [kat] ECC-384
2,926,227 UART: [kat] HMAC-384Kdf
2,950,149 UART: [kat] LMS
3,479,618 UART: [kat] --
3,481,609 UART: [cold-reset] ++
3,482,580 UART: [fht] FHT @ 0x50003400
3,493,479 UART: [idev] ++
3,494,242 UART: [idev] CDI.KEYID = 6
3,495,132 UART: [idev] SUBJECT.KEYID = 7
3,496,187 UART: [idev] UDS.KEYID = 0
3,522,338 UART: [idev] Erasing UDS.KEYID = 0
6,003,025 UART: [idev] Sha1 KeyId Algorithm
6,027,294 UART: [idev] --
6,030,913 UART: [ldev] ++
6,031,483 UART: [ldev] CDI.KEYID = 6
6,032,365 UART: [ldev] SUBJECT.KEYID = 5
6,033,588 UART: [ldev] AUTHORITY.KEYID = 7
6,034,827 UART: [ldev] FE.KEYID = 1
6,078,528 UART: [ldev] Erasing FE.KEYID = 1
8,583,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,284 UART: [ldev] --
10,388,382 UART: [fwproc] Wait for Commands...
10,391,019 UART: [fwproc] Recv command 0x46574c44
10,393,067 UART: [fwproc] Recv'd Img size: 106684 bytes
14,861,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,937,796 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,980,342 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,297,617 >>> mbox cmd response: success
15,301,731 UART: [afmc] ++
15,302,321 UART: [afmc] CDI.KEYID = 6
15,303,255 UART: [afmc] SUBJECT.KEYID = 7
15,304,423 UART: [afmc] AUTHORITY.KEYID = 5
17,829,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,555,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,557,413 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,573,399 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,589,347 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,605,231 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,628,759 UART: [afmc] --
19,632,744 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,633,112 UART: [cold-reset] --
19,638,463 UART: [state] Locking Datavault
19,643,277 UART: [state] Locking PCR0, PCR1 and PCR31
19,644,977 UART: [state] Locking ICCM
19,647,179 UART: [exit] Launching FMC @ 0x40000000
19,655,631 UART:
19,655,930 UART: Running Caliptra FMC ...
19,656,964 UART:
19,657,112 UART: [fmc] Received command: 0x10000002
19,658,960 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
2,214,387 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,934,702 >>> mbox cmd response: success
19,204,448 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,222,625 UART:
19,222,953 UART: Running Caliptra FMC ...
19,224,130 UART:
19,224,295 UART: [fmc] Received command: 0x10000002
19,226,130 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,219,314 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,354,327 UART:
2,354,739 UART: Running Caliptra ROM ...
2,355,922 UART:
2,356,090 UART: [state] CFI Enabled
2,357,076 UART: [state] LifecycleState = Unprovisioned
2,358,726 UART: [state] DebugLocked = No
2,359,827 UART: [state] WD Timer not started. Device not locked for debugging
2,362,305 UART: [kat] SHA2-256
2,362,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,980 UART: [kat] ++
2,366,428 UART: [kat] sha1
2,366,939 UART: [kat] SHA2-256
2,367,677 UART: [kat] SHA2-384
2,368,344 UART: [kat] SHA2-512-ACC
2,369,183 UART: [kat] ECC-384
3,281,176 UART: [kat] HMAC-384Kdf
3,293,594 UART: [kat] LMS
3,823,096 UART: [kat] --
3,828,894 UART: [cold-reset] ++
3,831,476 UART: [fht] FHT @ 0x50003400
3,843,428 UART: [idev] ++
3,843,989 UART: [idev] CDI.KEYID = 6
3,844,904 UART: [idev] SUBJECT.KEYID = 7
3,846,113 UART: [idev] UDS.KEYID = 0
3,862,298 UART: [idev] Erasing UDS.KEYID = 0
6,320,503 UART: [idev] Sha1 KeyId Algorithm
6,344,230 UART: [idev] --
6,348,435 UART: [ldev] ++
6,348,994 UART: [ldev] CDI.KEYID = 6
6,349,875 UART: [ldev] SUBJECT.KEYID = 5
6,351,033 UART: [ldev] AUTHORITY.KEYID = 7
6,352,323 UART: [ldev] FE.KEYID = 1
6,361,966 UART: [ldev] Erasing FE.KEYID = 1
8,834,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,269 UART: [ldev] --
10,626,195 UART: [fwproc] Wait for Commands...
10,627,811 UART: [fwproc] Recv command 0x46574c44
10,629,911 UART: [fwproc] Recv'd Img size: 106684 bytes
15,126,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,205,517 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,248,032 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,565,546 >>> mbox cmd response: success
15,569,194 UART: [afmc] ++
15,569,784 UART: [afmc] CDI.KEYID = 6
15,570,693 UART: [afmc] SUBJECT.KEYID = 7
15,571,904 UART: [afmc] AUTHORITY.KEYID = 5
18,073,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,792,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,794,545 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,810,483 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,826,500 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,842,333 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,866,032 UART: [afmc] --
19,869,902 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,870,277 UART: [cold-reset] --
19,874,222 UART: [state] Locking Datavault
19,880,432 UART: [state] Locking PCR0, PCR1 and PCR31
19,882,126 UART: [state] Locking ICCM
19,884,002 UART: [exit] Launching FMC @ 0x40000000
19,892,398 UART:
19,892,637 UART: Running Caliptra FMC ...
19,893,735 UART:
19,893,909 UART: [fmc] Received command: 0x10000002
* TESTCASE PASSED
19,895,944 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
2,219,631 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
15,132,407 >>> mbox cmd response: success
19,365,622 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,376,610 UART:
19,376,966 UART: Running Caliptra FMC ...
19,378,150 UART:
19,378,339 UART: [fmc] Received command: 0x10000002
19,380,115 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,832 writing to cptra_bootfsm_go
2,214,419 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,349,961 UART:
2,350,386 UART: Running Caliptra ROM ...
2,351,504 UART:
2,351,669 UART: [state] CFI Enabled
2,352,657 UART: [state] LifecycleState = Unprovisioned
2,354,317 UART: [state] DebugLocked = No
2,355,348 UART: [state] WD Timer not started. Device not locked for debugging
2,357,817 UART: [kat] SHA2-256
2,358,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,361,494 UART: [kat] ++
2,361,948 UART: [kat] sha1
2,362,462 UART: [kat] SHA2-256
2,363,207 UART: [kat] SHA2-384
2,363,873 UART: [kat] SHA2-512-ACC
2,364,676 UART: [kat] ECC-384
2,945,557 UART: [kat] HMAC-384Kdf
2,971,661 UART: [kat] LMS
3,501,105 UART: [kat] --
3,504,043 UART: [cold-reset] ++
3,505,065 UART: [fht] FHT @ 0x50003400
3,516,617 UART: [idev] ++
3,517,188 UART: [idev] CDI.KEYID = 6
3,518,065 UART: [idev] SUBJECT.KEYID = 7
3,519,283 UART: [idev] UDS.KEYID = 0
3,544,348 UART: [idev] Erasing UDS.KEYID = 0
6,024,535 UART: [idev] Sha1 KeyId Algorithm
6,047,979 UART: [idev] --
6,051,491 UART: [ldev] ++
6,052,070 UART: [ldev] CDI.KEYID = 6
6,052,984 UART: [ldev] SUBJECT.KEYID = 5
6,054,147 UART: [ldev] AUTHORITY.KEYID = 7
6,055,404 UART: [ldev] FE.KEYID = 1
6,100,334 UART: [ldev] Erasing FE.KEYID = 1
8,604,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,043 UART: [ldev] --
10,415,402 UART: [fwproc] Wait for Commands...
10,417,282 UART: [fwproc] Recv command 0x46574c44
10,419,379 UART: [fwproc] Recv'd Img size: 106684 bytes
14,907,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,978,449 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,020,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,337,488 >>> mbox cmd response: success
15,341,136 UART: [afmc] ++
15,341,750 UART: [afmc] CDI.KEYID = 6
15,342,667 UART: [afmc] SUBJECT.KEYID = 7
15,343,831 UART: [afmc] AUTHORITY.KEYID = 5
17,876,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,598,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,601,080 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,616,900 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,632,825 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,648,722 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,670,640 UART: [afmc] --
19,673,978 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,674,357 UART: [cold-reset] --
19,676,799 UART: [state] Locking Datavault
19,683,432 UART: [state] Locking PCR0, PCR1 and PCR31
19,685,154 UART: [state] Locking ICCM
19,686,535 UART: [exit] Launching FMC @ 0x40000000
19,694,912 UART:
19,695,153 UART: Running Caliptra FMC ...
19,696,256 UART:
19,696,421 UART: [fmc] Received command: 0x10000002
19,698,319 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,224,917 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,931,065 >>> mbox cmd response: success
19,223,902 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,239,061 UART:
19,239,395 UART: Running Caliptra FMC ...
19,240,794 UART:
19,240,975 UART: [fmc] Received command: 0x10000002
* TESTCASE PASSED
19,242,731 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,621 writing to cptra_bootfsm_go
2,223,594 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,359,068 UART:
2,359,504 UART: Running Caliptra ROM ...
2,360,680 UART:
2,360,852 UART: [state] CFI Enabled
2,361,843 UART: [state] LifecycleState = Unprovisioned
2,363,513 UART: [state] DebugLocked = No
2,364,621 UART: [state] WD Timer not started. Device not locked for debugging
2,367,097 UART: [kat] SHA2-256
2,367,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,370,784 UART: [kat] ++
2,371,230 UART: [kat] sha1
2,371,745 UART: [kat] SHA2-256
2,372,402 UART: [kat] SHA2-384
2,373,059 UART: [kat] SHA2-512-ACC
2,373,859 UART: [kat] ECC-384
3,283,206 UART: [kat] HMAC-384Kdf
3,296,086 UART: [kat] LMS
3,825,550 UART: [kat] --
3,830,621 UART: [cold-reset] ++
3,831,530 UART: [fht] FHT @ 0x50003400
3,842,778 UART: [idev] ++
3,843,362 UART: [idev] CDI.KEYID = 6
3,844,322 UART: [idev] SUBJECT.KEYID = 7
3,845,426 UART: [idev] UDS.KEYID = 0
3,862,260 UART: [idev] Erasing UDS.KEYID = 0
6,318,752 UART: [idev] Sha1 KeyId Algorithm
6,341,336 UART: [idev] --
6,346,032 UART: [ldev] ++
6,346,606 UART: [ldev] CDI.KEYID = 6
6,347,515 UART: [ldev] SUBJECT.KEYID = 5
6,348,676 UART: [ldev] AUTHORITY.KEYID = 7
6,349,960 UART: [ldev] FE.KEYID = 1
6,359,739 UART: [ldev] Erasing FE.KEYID = 1
8,832,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,275 UART: [ldev] --
10,621,241 UART: [fwproc] Wait for Commands...
10,624,425 UART: [fwproc] Recv command 0x46574c44
10,626,564 UART: [fwproc] Recv'd Img size: 106684 bytes
15,124,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,199,709 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,242,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,559,137 >>> mbox cmd response: success
15,563,078 UART: [afmc] ++
15,563,670 UART: [afmc] CDI.KEYID = 6
15,564,579 UART: [afmc] SUBJECT.KEYID = 7
15,565,795 UART: [afmc] AUTHORITY.KEYID = 5
18,062,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,783,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,785,114 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,801,092 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,817,087 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,832,957 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,856,372 UART: [afmc] --
19,859,761 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,860,128 UART: [cold-reset] --
19,862,345 UART: [state] Locking Datavault
19,865,757 UART: [state] Locking PCR0, PCR1 and PCR31
19,867,404 UART: [state] Locking ICCM
19,868,794 UART: [exit] Launching FMC @ 0x40000000
19,877,196 UART:
19,877,427 UART: Running Caliptra FMC ...
19,878,528 UART:
19,878,684 UART: [fmc] Received command: 0x10000002
19,880,551 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
2,220,347 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
15,142,315 >>> mbox cmd response: success
19,379,736 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,395,651 UART:
19,395,997 UART: Running Caliptra FMC ...
19,397,187 UART:
19,397,358 UART: [fmc] Received command: 0x10000002
19,399,146 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,452 UART: [kat] HMAC-384Kdf
921,278 UART: [kat] LMS
1,169,590 UART: [kat] --
1,170,543 UART: [cold-reset] ++
1,170,909 UART: [fht] FHT @ 0x50003400
1,173,669 UART: [idev] ++
1,173,837 UART: [idev] CDI.KEYID = 6
1,174,198 UART: [idev] SUBJECT.KEYID = 7
1,174,623 UART: [idev] UDS.KEYID = 0
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,189 UART: [idev] --
1,209,312 UART: [ldev] ++
1,209,480 UART: [ldev] CDI.KEYID = 6
1,209,844 UART: [ldev] SUBJECT.KEYID = 5
1,210,271 UART: [ldev] AUTHORITY.KEYID = 7
1,210,734 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,242,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,292 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,587 UART: [fwproc] Recv command 0x46574c44
1,283,320 UART: [fwproc] Recv'd Img size: 106684 bytes
3,042,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,070,046 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,088,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,223,753 >>> mbox cmd response: success
3,224,978 UART: [afmc] ++
3,225,146 UART: [afmc] CDI.KEYID = 6
3,225,509 UART: [afmc] SUBJECT.KEYID = 7
3,225,935 UART: [afmc] AUTHORITY.KEYID = 5
3,261,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,277,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,278,332 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,284,009 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,289,902 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,295,612 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,303,558 UART: [afmc] --
3,304,434 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,304,456 UART: [cold-reset] --
3,305,144 UART: [state] Locking Datavault
3,306,409 UART: [state] Locking PCR0, PCR1 and PCR31
3,307,013 UART: [state] Locking ICCM
3,307,465 UART: [exit] Launching FMC @ 0x40000000
3,312,762 UART:
3,312,778 UART: Running Caliptra FMC ...
3,313,186 UART:
3,313,324 UART: [fmc] Received command: 0x10000002
3,315,068 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,064,122 >>> mbox cmd response: success
3,119,728 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,125,689 UART:
3,125,705 UART: Running Caliptra FMC ...
3,126,113 UART:
3,126,251 UART: [fmc] Received command: 0x10000002
3,127,995 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,122 UART: [state] WD Timer not started. Device not locked for debugging
88,351 UART: [kat] SHA2-256
891,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,030 UART: [kat] ++
896,182 UART: [kat] sha1
900,416 UART: [kat] SHA2-256
902,356 UART: [kat] SHA2-384
905,193 UART: [kat] SHA2-512-ACC
907,094 UART: [kat] ECC-384
917,123 UART: [kat] HMAC-384Kdf
921,645 UART: [kat] LMS
1,169,957 UART: [kat] --
1,171,082 UART: [cold-reset] ++
1,171,542 UART: [fht] FHT @ 0x50003400
1,174,098 UART: [idev] ++
1,174,266 UART: [idev] CDI.KEYID = 6
1,174,627 UART: [idev] SUBJECT.KEYID = 7
1,175,052 UART: [idev] UDS.KEYID = 0
1,183,096 UART: [idev] Erasing UDS.KEYID = 0
1,200,626 UART: [idev] Sha1 KeyId Algorithm
1,209,732 UART: [idev] --
1,210,879 UART: [ldev] ++
1,211,047 UART: [ldev] CDI.KEYID = 6
1,211,411 UART: [ldev] SUBJECT.KEYID = 5
1,211,838 UART: [ldev] AUTHORITY.KEYID = 7
1,212,301 UART: [ldev] FE.KEYID = 1
1,217,519 UART: [ldev] Erasing FE.KEYID = 1
1,243,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,953 UART: [fwproc] Wait for Commands...
1,283,648 UART: [fwproc] Recv command 0x46574c44
1,284,381 UART: [fwproc] Recv'd Img size: 106684 bytes
3,035,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,064,294 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,082,377 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,217,995 >>> mbox cmd response: success
3,219,092 UART: [afmc] ++
3,219,260 UART: [afmc] CDI.KEYID = 6
3,219,623 UART: [afmc] SUBJECT.KEYID = 7
3,220,049 UART: [afmc] AUTHORITY.KEYID = 5
3,255,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,271,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,272,416 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,278,093 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,283,986 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,289,696 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,297,378 UART: [afmc] --
3,298,442 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,298,464 UART: [cold-reset] --
3,299,272 UART: [state] Locking Datavault
3,300,665 UART: [state] Locking PCR0, PCR1 and PCR31
3,301,269 UART: [state] Locking ICCM
3,301,835 UART: [exit] Launching FMC @ 0x40000000
3,307,132 UART:
3,307,148 UART: Running Caliptra FMC ...
3,307,556 UART:
3,307,694 UART: [fmc] Received command: 0x10000002
3,309,438 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,063,624 >>> mbox cmd response: success
3,119,734 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,125,811 UART:
3,125,827 UART: Running Caliptra FMC ...
3,126,235 UART:
3,126,373 UART: [fmc] Received command: 0x10000002
3,128,117 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
891,046 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,175 UART: [kat] ++
895,327 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,334 UART: [kat] LMS
1,168,646 UART: [kat] --
1,169,323 UART: [cold-reset] ++
1,169,807 UART: [fht] FHT @ 0x50003400
1,172,493 UART: [idev] ++
1,172,661 UART: [idev] CDI.KEYID = 6
1,173,022 UART: [idev] SUBJECT.KEYID = 7
1,173,447 UART: [idev] UDS.KEYID = 0
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,513 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,446 UART: [ldev] ++
1,208,614 UART: [ldev] CDI.KEYID = 6
1,208,978 UART: [ldev] SUBJECT.KEYID = 5
1,209,405 UART: [ldev] AUTHORITY.KEYID = 7
1,209,868 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,114 UART: [ldev] --
1,280,406 UART: [fwproc] Wait for Commands...
1,281,193 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: [fwproc] Recv'd Img size: 106684 bytes
3,044,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,071,486 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,089,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,225,269 >>> mbox cmd response: success
3,226,530 UART: [afmc] ++
3,226,698 UART: [afmc] CDI.KEYID = 6
3,227,061 UART: [afmc] SUBJECT.KEYID = 7
3,227,487 UART: [afmc] AUTHORITY.KEYID = 5
3,262,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,279,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,280,032 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,285,709 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,291,602 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,297,312 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,305,154 UART: [afmc] --
3,306,228 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,306,250 UART: [cold-reset] --
3,307,364 UART: [state] Locking Datavault
3,308,427 UART: [state] Locking PCR0, PCR1 and PCR31
3,309,031 UART: [state] Locking ICCM
3,309,681 UART: [exit] Launching FMC @ 0x40000000
3,314,978 UART:
3,314,994 UART: Running Caliptra FMC ...
3,315,402 UART:
3,315,540 UART: [fmc] Received command: 0x10000002
3,317,284 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,061,020 >>> mbox cmd response: success
3,116,856 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,122,839 UART:
3,122,855 UART: Running Caliptra FMC ...
3,123,263 UART:
3,123,401 UART: [fmc] Received command: 0x10000002
3,125,145 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
921,023 UART: [kat] LMS
1,169,335 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,182,304 UART: [idev] Erasing UDS.KEYID = 0
1,199,770 UART: [idev] Sha1 KeyId Algorithm
1,208,792 UART: [idev] --
1,209,875 UART: [ldev] ++
1,210,043 UART: [ldev] CDI.KEYID = 6
1,210,407 UART: [ldev] SUBJECT.KEYID = 5
1,210,834 UART: [ldev] AUTHORITY.KEYID = 7
1,211,297 UART: [ldev] FE.KEYID = 1
1,216,515 UART: [ldev] Erasing FE.KEYID = 1
1,242,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,283,028 UART: [fwproc] Recv command 0x46574c44
1,283,761 UART: [fwproc] Recv'd Img size: 106684 bytes
3,032,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,061,883 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,079,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,215,630 >>> mbox cmd response: success
3,216,771 UART: [afmc] ++
3,216,939 UART: [afmc] CDI.KEYID = 6
3,217,302 UART: [afmc] SUBJECT.KEYID = 7
3,217,728 UART: [afmc] AUTHORITY.KEYID = 5
3,253,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,270,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,270,763 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,276,440 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,282,333 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,288,043 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,295,875 UART: [afmc] --
3,296,837 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,296,859 UART: [cold-reset] --
3,297,817 UART: [state] Locking Datavault
3,298,990 UART: [state] Locking PCR0, PCR1 and PCR31
3,299,594 UART: [state] Locking ICCM
3,300,074 UART: [exit] Launching FMC @ 0x40000000
3,305,371 UART:
3,305,387 UART: Running Caliptra FMC ...
3,305,795 UART:
3,305,933 UART: [fmc] Received command: 0x10000002
3,307,677 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,058,021 >>> mbox cmd response: success
3,114,183 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,120,262 UART:
3,120,278 UART: Running Caliptra FMC ...
3,120,686 UART:
3,120,824 UART: [fmc] Received command: 0x10000002
3,122,568 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,498 UART: [kat] HMAC-384Kdf
920,068 UART: [kat] LMS
1,168,380 UART: [kat] --
1,169,295 UART: [cold-reset] ++
1,169,787 UART: [fht] FHT @ 0x50003400
1,172,577 UART: [idev] ++
1,172,745 UART: [idev] CDI.KEYID = 6
1,173,106 UART: [idev] SUBJECT.KEYID = 7
1,173,531 UART: [idev] UDS.KEYID = 0
1,181,201 UART: [idev] Erasing UDS.KEYID = 0
1,197,939 UART: [idev] Sha1 KeyId Algorithm
1,206,837 UART: [idev] --
1,207,778 UART: [ldev] ++
1,207,946 UART: [ldev] CDI.KEYID = 6
1,208,310 UART: [ldev] SUBJECT.KEYID = 5
1,208,737 UART: [ldev] AUTHORITY.KEYID = 7
1,209,200 UART: [ldev] FE.KEYID = 1
1,214,294 UART: [ldev] Erasing FE.KEYID = 1
1,240,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,650 UART: [ldev] --
1,280,100 UART: [fwproc] Wait for Commands...
1,280,715 UART: [fwproc] Recv command 0x46574c44
1,281,448 UART: [fwproc] Recv'd Img size: 106684 bytes
3,025,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,053,234 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,071,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,206,933 >>> mbox cmd response: success
3,208,066 UART: [afmc] ++
3,208,234 UART: [afmc] CDI.KEYID = 6
3,208,597 UART: [afmc] SUBJECT.KEYID = 7
3,209,023 UART: [afmc] AUTHORITY.KEYID = 5
3,244,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,260,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,261,220 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,266,897 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,272,790 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,278,500 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,286,342 UART: [afmc] --
3,287,386 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,287,408 UART: [cold-reset] --
3,288,242 UART: [state] Locking Datavault
3,289,691 UART: [state] Locking PCR0, PCR1 and PCR31
3,290,295 UART: [state] Locking ICCM
3,290,763 UART: [exit] Launching FMC @ 0x40000000
3,296,060 UART:
3,296,076 UART: Running Caliptra FMC ...
3,296,484 UART:
3,296,622 UART: [fmc] Received command: 0x10000002
3,298,366 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,066,331 >>> mbox cmd response: success
3,122,311 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,128,140 UART:
3,128,156 UART: Running Caliptra FMC ...
3,128,564 UART:
3,128,702 UART: [fmc] Received command: 0x10000002
3,130,446 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,457 UART: [kat] LMS
1,169,769 UART: [kat] --
1,170,842 UART: [cold-reset] ++
1,171,230 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,562 UART: [idev] Sha1 KeyId Algorithm
1,209,504 UART: [idev] --
1,210,531 UART: [ldev] ++
1,210,699 UART: [ldev] CDI.KEYID = 6
1,211,063 UART: [ldev] SUBJECT.KEYID = 5
1,211,490 UART: [ldev] AUTHORITY.KEYID = 7
1,211,953 UART: [ldev] FE.KEYID = 1
1,217,189 UART: [ldev] Erasing FE.KEYID = 1
1,243,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,511 UART: [ldev] --
1,282,913 UART: [fwproc] Wait for Commands...
1,283,678 UART: [fwproc] Recv command 0x46574c44
1,284,411 UART: [fwproc] Recv'd Img size: 106684 bytes
3,033,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,061,631 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,079,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,215,412 >>> mbox cmd response: success
3,216,659 UART: [afmc] ++
3,216,827 UART: [afmc] CDI.KEYID = 6
3,217,190 UART: [afmc] SUBJECT.KEYID = 7
3,217,616 UART: [afmc] AUTHORITY.KEYID = 5
3,252,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,269,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,270,215 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,275,892 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,281,785 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,287,495 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,295,451 UART: [afmc] --
3,296,367 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,296,389 UART: [cold-reset] --
3,297,179 UART: [state] Locking Datavault
3,298,364 UART: [state] Locking PCR0, PCR1 and PCR31
3,298,968 UART: [state] Locking ICCM
3,299,496 UART: [exit] Launching FMC @ 0x40000000
3,304,793 UART:
3,304,809 UART: Running Caliptra FMC ...
3,305,217 UART:
3,305,355 UART: [fmc] Received command: 0x10000002
3,307,099 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,071,873 >>> mbox cmd response: success
3,128,339 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,134,502 UART:
3,134,518 UART: Running Caliptra FMC ...
3,134,926 UART:
3,135,064 UART: [fmc] Received command: 0x10000002
3,136,808 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
2,060,393 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,201,488 UART:
2,201,907 UART: Running Caliptra ROM ...
2,202,986 UART:
2,203,145 UART: [state] CFI Enabled
2,204,121 UART: [state] LifecycleState = Unprovisioned
2,205,783 UART: [state] DebugLocked = No
2,206,813 UART: [state] WD Timer not started. Device not locked for debugging
2,209,279 UART: [kat] SHA2-256
2,209,942 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,946 UART: [kat] ++
2,213,394 UART: [kat] sha1
2,213,925 UART: [kat] SHA2-256
2,214,585 UART: [kat] SHA2-384
2,215,247 UART: [kat] SHA2-512-ACC
2,216,046 UART: [kat] ECC-384
3,775,116 UART: [kat] HMAC-384Kdf
3,804,558 UART: [kat] LMS
4,877,699 UART: [kat] --
4,882,529 UART: [cold-reset] ++
4,885,145 UART: [fht] FHT @ 0x50003400
4,896,728 UART: [idev] ++
4,897,405 UART: [idev] CDI.KEYID = 6
4,898,641 UART: [idev] SUBJECT.KEYID = 7
4,899,747 UART: [idev] UDS.KEYID = 0
4,930,795 UART: [idev] Erasing UDS.KEYID = 0
8,245,290 UART: [idev] Sha1 KeyId Algorithm
8,267,287 UART: [idev] --
8,272,703 UART: [ldev] ++
8,273,272 UART: [ldev] CDI.KEYID = 6
8,274,441 UART: [ldev] SUBJECT.KEYID = 5
8,275,652 UART: [ldev] AUTHORITY.KEYID = 7
8,276,805 UART: [ldev] FE.KEYID = 1
8,318,255 UART: [ldev] Erasing FE.KEYID = 1
11,653,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,451 UART: [ldev] --
14,039,262 UART: [fwproc] Wait for Commands...
14,041,302 UART: [fwproc] Recv command 0x46574c44
14,043,567 UART: [fwproc] Recv'd Img size: 111408 bytes
22,422,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,501,319 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,561,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,878,329 >>> mbox cmd response: success
22,882,457 UART: [afmc] ++
22,883,178 UART: [afmc] CDI.KEYID = 6
22,884,291 UART: [afmc] SUBJECT.KEYID = 7
22,885,507 UART: [afmc] AUTHORITY.KEYID = 5
26,254,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,549,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,551,452 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,567,615 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,583,526 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,599,513 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,623,040 UART: [afmc] --
28,627,404 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,627,780 UART: [cold-reset] --
28,631,529 UART: [state] Locking Datavault
28,635,320 UART: [state] Locking PCR0, PCR1 and PCR31
28,636,961 UART: [state] Locking ICCM
28,639,741 UART: [exit] Launching FMC @ 0x40000000
28,648,377 UART:
28,648,640 UART: Running Caliptra FMC ...
28,649,666 UART:
28,649,809 UART: [fmc] Received command: 0x10000000
28,652,292 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,061,131 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
22,462,544 >>> mbox cmd response: success
28,144,393 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,159,298 UART:
28,159,637 UART: Running Caliptra FMC ...
28,160,733 UART:
28,160,883 UART: [fmc] Received command: 0x10000000
28,163,268 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
2,066,715 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,207,595 UART:
2,207,997 UART: Running Caliptra ROM ...
2,209,163 UART:
2,209,331 UART: [state] CFI Enabled
2,210,291 UART: [state] LifecycleState = Unprovisioned
2,211,946 UART: [state] DebugLocked = No
2,213,244 UART: [state] WD Timer not started. Device not locked for debugging
2,215,739 UART: [kat] SHA2-256
2,216,408 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,419 UART: [kat] ++
2,219,868 UART: [kat] sha1
2,220,374 UART: [kat] SHA2-256
2,221,104 UART: [kat] SHA2-384
2,221,762 UART: [kat] SHA2-512-ACC
2,222,557 UART: [kat] ECC-384
4,100,693 UART: [kat] HMAC-384Kdf
4,112,116 UART: [kat] LMS
5,185,270 UART: [kat] --
5,187,230 UART: [cold-reset] ++
5,188,738 UART: [fht] FHT @ 0x50003400
5,199,120 UART: [idev] ++
5,199,785 UART: [idev] CDI.KEYID = 6
5,201,028 UART: [idev] SUBJECT.KEYID = 7
5,202,461 UART: [idev] UDS.KEYID = 0
5,220,586 UART: [idev] Erasing UDS.KEYID = 0
8,492,264 UART: [idev] Sha1 KeyId Algorithm
8,514,235 UART: [idev] --
8,518,336 UART: [ldev] ++
8,518,902 UART: [ldev] CDI.KEYID = 6
8,520,132 UART: [ldev] SUBJECT.KEYID = 5
8,521,553 UART: [ldev] AUTHORITY.KEYID = 7
8,523,152 UART: [ldev] FE.KEYID = 1
8,535,475 UART: [ldev] Erasing FE.KEYID = 1
11,829,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,125 UART: [ldev] --
14,196,090 UART: [fwproc] Wait for Commands...
14,198,290 UART: [fwproc] Recv command 0x46574c44
14,200,598 UART: [fwproc] Recv'd Img size: 111408 bytes
22,585,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,673,627 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,733,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
23,049,686 >>> mbox cmd response: success
23,053,992 UART: [afmc] ++
23,054,748 UART: [afmc] CDI.KEYID = 6
23,055,855 UART: [afmc] SUBJECT.KEYID = 7
23,057,069 UART: [afmc] AUTHORITY.KEYID = 5
26,374,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,668,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,670,860 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
28,687,030 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
28,702,987 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
28,718,949 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
28,741,477 UART: [afmc] --
28,744,706 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,745,074 UART: [cold-reset] --
28,748,479 UART: [state] Locking Datavault
28,753,990 UART: [state] Locking PCR0, PCR1 and PCR31
28,755,687 UART: [state] Locking ICCM
28,757,130 UART: [exit] Launching FMC @ 0x40000000
28,765,735 UART:
28,765,964 UART: Running Caliptra FMC ...
28,767,054 UART:
28,767,206 UART: [fmc] Received command: 0x10000000
28,769,660 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,072,660 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
22,714,745 >>> mbox cmd response: success
28,335,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,346,902 UART:
28,347,237 UART: Running Caliptra FMC ...
28,348,335 UART:
28,348,481 UART: [fmc] Received command: 0x10000000
28,350,870 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,064,447 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,206,464 UART:
2,206,902 UART: Running Caliptra ROM ...
2,208,008 UART:
2,208,173 UART: [state] CFI Enabled
2,209,159 UART: [state] LifecycleState = Unprovisioned
2,210,820 UART: [state] DebugLocked = No
2,211,849 UART: [state] WD Timer not started. Device not locked for debugging
2,214,318 UART: [kat] SHA2-256
2,214,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,991 UART: [kat] ++
2,218,438 UART: [kat] sha1
2,218,947 UART: [kat] SHA2-256
2,219,606 UART: [kat] SHA2-384
2,220,259 UART: [kat] SHA2-512-ACC
2,221,087 UART: [kat] ECC-384
2,947,789 UART: [kat] HMAC-384Kdf
2,969,466 UART: [kat] LMS
3,498,902 UART: [kat] --
3,502,367 UART: [cold-reset] ++
3,503,652 UART: [fht] FHT @ 0x50003400
3,515,074 UART: [idev] ++
3,515,666 UART: [idev] CDI.KEYID = 6
3,516,553 UART: [idev] SUBJECT.KEYID = 7
3,517,769 UART: [idev] UDS.KEYID = 0
3,541,883 UART: [idev] Erasing UDS.KEYID = 0
6,023,242 UART: [idev] Sha1 KeyId Algorithm
6,047,132 UART: [idev] --
6,051,836 UART: [ldev] ++
6,052,413 UART: [ldev] CDI.KEYID = 6
6,053,329 UART: [ldev] SUBJECT.KEYID = 5
6,054,549 UART: [ldev] AUTHORITY.KEYID = 7
6,055,790 UART: [ldev] FE.KEYID = 1
6,098,317 UART: [ldev] Erasing FE.KEYID = 1
8,603,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,116 UART: [ldev] --
10,413,653 UART: [fwproc] Wait for Commands...
10,416,039 UART: [fwproc] Recv command 0x46574c44
10,418,154 UART: [fwproc] Recv'd Img size: 111752 bytes
14,963,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,039,151 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,099,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,416,478 >>> mbox cmd response: success
15,420,665 UART: [afmc] ++
15,421,250 UART: [afmc] CDI.KEYID = 6
15,422,180 UART: [afmc] SUBJECT.KEYID = 7
15,423,342 UART: [afmc] AUTHORITY.KEYID = 5
17,959,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,700,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,702,126 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,718,125 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,734,052 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,749,887 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,771,822 UART: [afmc] --
19,775,965 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,776,349 UART: [cold-reset] --
19,778,730 UART: [state] Locking Datavault
19,785,054 UART: [state] Locking PCR0, PCR1 and PCR31
19,786,767 UART: [state] Locking ICCM
19,788,973 UART: [exit] Launching FMC @ 0x40000000
19,797,368 UART:
19,797,604 UART: Running Caliptra FMC ...
19,798,705 UART:
19,798,900 UART: [fmc] Received command: 0x10000000
19,801,312 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,061,071 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,011,260 >>> mbox cmd response: success
19,287,345 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,300,516 UART:
19,300,842 UART: Running Caliptra FMC ...
19,301,960 UART:
19,302,117 UART: [fmc] Received command: 0x10000000
19,304,562 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,065,108 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,206,557 UART:
2,206,981 UART: Running Caliptra ROM ...
2,208,063 UART:
2,208,224 UART: [state] CFI Enabled
2,209,205 UART: [state] LifecycleState = Unprovisioned
2,210,850 UART: [state] DebugLocked = No
2,211,876 UART: [state] WD Timer not started. Device not locked for debugging
2,214,342 UART: [kat] SHA2-256
2,215,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,101 UART: [kat] ++
2,218,562 UART: [kat] sha1
2,219,081 UART: [kat] SHA2-256
2,219,741 UART: [kat] SHA2-384
2,220,517 UART: [kat] SHA2-512-ACC
2,221,325 UART: [kat] ECC-384
3,283,287 UART: [kat] HMAC-384Kdf
3,297,018 UART: [kat] LMS
3,826,489 UART: [kat] --
3,830,916 UART: [cold-reset] ++
3,832,951 UART: [fht] FHT @ 0x50003400
3,844,519 UART: [idev] ++
3,845,087 UART: [idev] CDI.KEYID = 6
3,845,965 UART: [idev] SUBJECT.KEYID = 7
3,847,755 UART: [idev] UDS.KEYID = 0
3,861,632 UART: [idev] Erasing UDS.KEYID = 0
6,318,055 UART: [idev] Sha1 KeyId Algorithm
6,339,963 UART: [idev] --
6,344,138 UART: [ldev] ++
6,344,710 UART: [ldev] CDI.KEYID = 6
6,345,677 UART: [ldev] SUBJECT.KEYID = 5
6,346,777 UART: [ldev] AUTHORITY.KEYID = 7
6,348,061 UART: [ldev] FE.KEYID = 1
6,358,374 UART: [ldev] Erasing FE.KEYID = 1
8,832,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,097 UART: [ldev] --
10,622,390 UART: [fwproc] Wait for Commands...
10,625,581 UART: [fwproc] Recv command 0x46574c44
10,627,674 UART: [fwproc] Recv'd Img size: 111752 bytes
15,144,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,222,687 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,283,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,599,537 >>> mbox cmd response: success
15,603,825 UART: [afmc] ++
15,604,416 UART: [afmc] CDI.KEYID = 6
15,605,325 UART: [afmc] SUBJECT.KEYID = 7
15,606,692 UART: [afmc] AUTHORITY.KEYID = 5
18,108,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,829,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,831,016 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,847,063 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,862,897 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,878,715 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,901,049 UART: [afmc] --
19,904,272 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,904,666 UART: [cold-reset] --
19,907,693 UART: [state] Locking Datavault
19,913,581 UART: [state] Locking PCR0, PCR1 and PCR31
19,915,219 UART: [state] Locking ICCM
19,916,768 UART: [exit] Launching FMC @ 0x40000000
19,925,158 UART:
19,925,397 UART: Running Caliptra FMC ...
19,926,655 UART:
19,926,832 UART: [fmc] Received command: 0x10000000
19,929,078 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
2,065,087 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,201,201 >>> mbox cmd response: success
19,432,682 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,447,567 UART:
19,447,905 UART: Running Caliptra FMC ...
19,449,092 UART:
19,449,271 UART: [fmc] Received command: 0x10000000
19,451,598 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,060,898 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,202,376 UART:
2,202,803 UART: Running Caliptra ROM ...
2,203,984 UART:
2,204,157 UART: [state] CFI Enabled
2,205,134 UART: [state] LifecycleState = Unprovisioned
2,206,780 UART: [state] DebugLocked = No
2,207,891 UART: [state] WD Timer not started. Device not locked for debugging
2,210,372 UART: [kat] SHA2-256
2,211,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,080 UART: [kat] ++
2,214,534 UART: [kat] sha1
2,215,048 UART: [kat] SHA2-256
2,215,793 UART: [kat] SHA2-384
2,216,461 UART: [kat] SHA2-512-ACC
2,217,344 UART: [kat] ECC-384
2,948,451 UART: [kat] HMAC-384Kdf
2,974,065 UART: [kat] LMS
3,503,519 UART: [kat] --
3,508,496 UART: [cold-reset] ++
3,510,117 UART: [fht] FHT @ 0x50003400
3,521,106 UART: [idev] ++
3,521,674 UART: [idev] CDI.KEYID = 6
3,522,583 UART: [idev] SUBJECT.KEYID = 7
3,523,800 UART: [idev] UDS.KEYID = 0
3,545,203 UART: [idev] Erasing UDS.KEYID = 0
6,027,948 UART: [idev] Sha1 KeyId Algorithm
6,052,225 UART: [idev] --
6,057,200 UART: [ldev] ++
6,057,775 UART: [ldev] CDI.KEYID = 6
6,058,685 UART: [ldev] SUBJECT.KEYID = 5
6,059,853 UART: [ldev] AUTHORITY.KEYID = 7
6,061,148 UART: [ldev] FE.KEYID = 1
6,101,302 UART: [ldev] Erasing FE.KEYID = 1
8,607,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,867 UART: [ldev] --
10,411,806 UART: [fwproc] Wait for Commands...
10,415,059 UART: [fwproc] Recv command 0x46574c44
10,417,163 UART: [fwproc] Recv'd Img size: 111752 bytes
14,969,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,044,777 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,105,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,422,984 >>> mbox cmd response: success
15,427,776 UART: [afmc] ++
15,428,366 UART: [afmc] CDI.KEYID = 6
15,429,276 UART: [afmc] SUBJECT.KEYID = 7
15,430,493 UART: [afmc] AUTHORITY.KEYID = 5
17,954,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,681,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,683,008 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,699,007 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,714,923 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,730,726 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,753,711 UART: [afmc] --
19,757,325 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,757,696 UART: [cold-reset] --
19,759,921 UART: [state] Locking Datavault
19,766,309 UART: [state] Locking PCR0, PCR1 and PCR31
19,767,958 UART: [state] Locking ICCM
19,769,029 UART: [exit] Launching FMC @ 0x40000000
19,777,426 UART:
19,777,657 UART: Running Caliptra FMC ...
19,778,760 UART:
19,778,915 UART: [fmc] Received command: 0x10000000
19,781,376 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
2,062,116 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,026,137 >>> mbox cmd response: success
19,294,076 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,310,131 UART:
19,310,465 UART: Running Caliptra FMC ...
19,311,642 UART:
19,311,814 UART: [fmc] Received command: 0x10000000
19,314,150 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,065,320 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,206,724 UART:
2,207,131 UART: Running Caliptra ROM ...
2,208,214 UART:
2,208,369 UART: [state] CFI Enabled
2,209,346 UART: [state] LifecycleState = Unprovisioned
2,210,995 UART: [state] DebugLocked = No
2,212,020 UART: [state] WD Timer not started. Device not locked for debugging
2,214,486 UART: [kat] SHA2-256
2,215,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,166 UART: [kat] ++
2,218,611 UART: [kat] sha1
2,219,121 UART: [kat] SHA2-256
2,219,801 UART: [kat] SHA2-384
2,220,461 UART: [kat] SHA2-512-ACC
2,221,295 UART: [kat] ECC-384
3,277,649 UART: [kat] HMAC-384Kdf
3,289,775 UART: [kat] LMS
3,819,284 UART: [kat] --
3,823,274 UART: [cold-reset] ++
3,824,226 UART: [fht] FHT @ 0x50003400
3,835,133 UART: [idev] ++
3,835,697 UART: [idev] CDI.KEYID = 6
3,836,576 UART: [idev] SUBJECT.KEYID = 7
3,837,789 UART: [idev] UDS.KEYID = 0
3,854,790 UART: [idev] Erasing UDS.KEYID = 0
6,312,110 UART: [idev] Sha1 KeyId Algorithm
6,335,662 UART: [idev] --
6,340,250 UART: [ldev] ++
6,340,872 UART: [ldev] CDI.KEYID = 6
6,341,759 UART: [ldev] SUBJECT.KEYID = 5
6,342,862 UART: [ldev] AUTHORITY.KEYID = 7
6,344,209 UART: [ldev] FE.KEYID = 1
6,355,042 UART: [ldev] Erasing FE.KEYID = 1
8,830,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,500 UART: [ldev] --
10,618,954 UART: [fwproc] Wait for Commands...
10,620,888 UART: [fwproc] Recv command 0x46574c44
10,622,941 UART: [fwproc] Recv'd Img size: 111752 bytes
15,141,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,222,950 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,283,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,599,700 >>> mbox cmd response: success
15,603,428 UART: [afmc] ++
15,604,010 UART: [afmc] CDI.KEYID = 6
15,604,924 UART: [afmc] SUBJECT.KEYID = 7
15,606,139 UART: [afmc] AUTHORITY.KEYID = 5
18,103,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,825,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,827,493 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,843,515 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,859,423 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,875,239 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,896,366 UART: [afmc] --
19,899,584 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,899,945 UART: [cold-reset] --
19,903,837 UART: [state] Locking Datavault
19,909,744 UART: [state] Locking PCR0, PCR1 and PCR31
19,911,384 UART: [state] Locking ICCM
19,913,531 UART: [exit] Launching FMC @ 0x40000000
19,921,924 UART:
19,922,151 UART: Running Caliptra FMC ...
19,923,244 UART:
19,923,394 UART: [fmc] Received command: 0x10000000
19,925,860 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,066,748 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,184,091 >>> mbox cmd response: success
19,414,980 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,430,251 UART:
19,430,589 UART: Running Caliptra FMC ...
19,431,768 UART:
19,431,933 UART: [fmc] Received command: 0x10000000
19,434,257 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,492 UART: [state] LifecycleState = Unprovisioned
85,147 UART: [state] DebugLocked = No
85,651 UART: [state] WD Timer not started. Device not locked for debugging
86,992 UART: [kat] SHA2-256
890,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,671 UART: [kat] ++
894,823 UART: [kat] sha1
899,117 UART: [kat] SHA2-256
901,057 UART: [kat] SHA2-384
903,994 UART: [kat] SHA2-512-ACC
905,895 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,143 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,182,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,312 UART: [ldev] ++
1,208,480 UART: [ldev] CDI.KEYID = 6
1,208,844 UART: [ldev] SUBJECT.KEYID = 5
1,209,271 UART: [ldev] AUTHORITY.KEYID = 7
1,209,734 UART: [ldev] FE.KEYID = 1
1,214,686 UART: [ldev] Erasing FE.KEYID = 1
1,241,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,984 UART: [ldev] --
1,280,274 UART: [fwproc] Wait for Commands...
1,281,037 UART: [fwproc] Recv command 0x46574c44
1,281,770 UART: [fwproc] Recv'd Img size: 111752 bytes
3,091,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,119,863 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,145,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,281,218 >>> mbox cmd response: success
3,282,341 UART: [afmc] ++
3,282,509 UART: [afmc] CDI.KEYID = 6
3,282,872 UART: [afmc] SUBJECT.KEYID = 7
3,283,298 UART: [afmc] AUTHORITY.KEYID = 5
3,318,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,334,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,335,702 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,341,396 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,347,296 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,353,005 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,360,907 UART: [afmc] --
3,362,017 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,362,039 UART: [cold-reset] --
3,363,013 UART: [state] Locking Datavault
3,364,368 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,972 UART: [state] Locking ICCM
3,365,450 UART: [exit] Launching FMC @ 0x40000000
3,370,747 UART:
3,370,763 UART: Running Caliptra FMC ...
3,371,171 UART:
3,371,401 UART: [fmc] Received command: 0x10000000
3,373,570 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,137,982 >>> mbox cmd response: success
3,194,031 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,038 UART:
3,200,054 UART: Running Caliptra FMC ...
3,200,462 UART:
3,200,692 UART: [fmc] Received command: 0x10000000
3,202,861 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,136 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,182,128 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,208,416 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,869 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,061 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,515 UART: [fwproc] Recv'd Img size: 111752 bytes
3,093,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,121,388 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,147,073 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,282,541 >>> mbox cmd response: success
3,283,610 UART: [afmc] ++
3,283,778 UART: [afmc] CDI.KEYID = 6
3,284,141 UART: [afmc] SUBJECT.KEYID = 7
3,284,567 UART: [afmc] AUTHORITY.KEYID = 5
3,319,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,336,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,336,777 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,342,471 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,348,371 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,354,080 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,362,044 UART: [afmc] --
3,363,140 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,363,162 UART: [cold-reset] --
3,364,062 UART: [state] Locking Datavault
3,365,399 UART: [state] Locking PCR0, PCR1 and PCR31
3,366,003 UART: [state] Locking ICCM
3,366,521 UART: [exit] Launching FMC @ 0x40000000
3,371,818 UART:
3,371,834 UART: Running Caliptra FMC ...
3,372,242 UART:
3,372,472 UART: [fmc] Received command: 0x10000000
3,374,641 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,129,297 >>> mbox cmd response: success
3,185,562 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,191,691 UART:
3,191,707 UART: Running Caliptra FMC ...
3,192,115 UART:
3,192,345 UART: [fmc] Received command: 0x10000000
3,194,514 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Unprovisioned
86,273 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,104 UART: [kat] SHA2-256
891,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,783 UART: [kat] ++
895,935 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,983 UART: [idev] Sha1 KeyId Algorithm
1,207,825 UART: [idev] --
1,208,756 UART: [ldev] ++
1,208,924 UART: [ldev] CDI.KEYID = 6
1,209,288 UART: [ldev] SUBJECT.KEYID = 5
1,209,715 UART: [ldev] AUTHORITY.KEYID = 7
1,210,178 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,241,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,682 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,931 UART: [fwproc] Recv command 0x46574c44
1,282,664 UART: [fwproc] Recv'd Img size: 111752 bytes
3,089,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,117,918 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,143,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,279,207 >>> mbox cmd response: success
3,280,440 UART: [afmc] ++
3,280,608 UART: [afmc] CDI.KEYID = 6
3,280,971 UART: [afmc] SUBJECT.KEYID = 7
3,281,397 UART: [afmc] AUTHORITY.KEYID = 5
3,316,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,333,797 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,339,491 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,345,391 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,351,100 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,358,870 UART: [afmc] --
3,359,796 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,359,818 UART: [cold-reset] --
3,360,810 UART: [state] Locking Datavault
3,361,993 UART: [state] Locking PCR0, PCR1 and PCR31
3,362,597 UART: [state] Locking ICCM
3,363,145 UART: [exit] Launching FMC @ 0x40000000
3,368,442 UART:
3,368,458 UART: Running Caliptra FMC ...
3,368,866 UART:
3,369,096 UART: [fmc] Received command: 0x10000000
3,371,265 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,132,065 >>> mbox cmd response: success
3,188,102 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,194,259 UART:
3,194,275 UART: Running Caliptra FMC ...
3,194,683 UART:
3,194,913 UART: [fmc] Received command: 0x10000000
3,197,082 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
904,971 UART: [kat] SHA2-512-ACC
906,872 UART: [kat] ECC-384
916,711 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,496 UART: [idev] ++
1,173,664 UART: [idev] CDI.KEYID = 6
1,174,025 UART: [idev] SUBJECT.KEYID = 7
1,174,450 UART: [idev] UDS.KEYID = 0
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,200,334 UART: [idev] Sha1 KeyId Algorithm
1,209,202 UART: [idev] --
1,210,239 UART: [ldev] ++
1,210,407 UART: [ldev] CDI.KEYID = 6
1,210,771 UART: [ldev] SUBJECT.KEYID = 5
1,211,198 UART: [ldev] AUTHORITY.KEYID = 7
1,211,661 UART: [ldev] FE.KEYID = 1
1,216,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 111752 bytes
3,092,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,120,808 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,282,191 >>> mbox cmd response: success
3,283,208 UART: [afmc] ++
3,283,376 UART: [afmc] CDI.KEYID = 6
3,283,739 UART: [afmc] SUBJECT.KEYID = 7
3,284,165 UART: [afmc] AUTHORITY.KEYID = 5
3,319,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,336,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,337,223 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,342,917 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,348,817 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,354,526 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,362,462 UART: [afmc] --
3,363,570 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,363,592 UART: [cold-reset] --
3,364,340 UART: [state] Locking Datavault
3,365,375 UART: [state] Locking PCR0, PCR1 and PCR31
3,365,979 UART: [state] Locking ICCM
3,366,647 UART: [exit] Launching FMC @ 0x40000000
3,371,944 UART:
3,371,960 UART: Running Caliptra FMC ...
3,372,368 UART:
3,372,598 UART: [fmc] Received command: 0x10000000
3,374,767 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,138,494 >>> mbox cmd response: success
3,194,173 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,392 UART:
3,200,408 UART: Running Caliptra FMC ...
3,200,816 UART:
3,201,046 UART: [fmc] Received command: 0x10000000
3,203,215 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,378 UART: [kat] LMS
1,168,690 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,035 UART: [idev] Sha1 KeyId Algorithm
1,206,901 UART: [idev] --
1,208,024 UART: [ldev] ++
1,208,192 UART: [ldev] CDI.KEYID = 6
1,208,556 UART: [ldev] SUBJECT.KEYID = 5
1,208,983 UART: [ldev] AUTHORITY.KEYID = 7
1,209,446 UART: [ldev] FE.KEYID = 1
1,214,722 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,934 UART: [fwproc] Wait for Commands...
1,281,611 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 111752 bytes
3,094,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,122,274 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,147,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,283,525 >>> mbox cmd response: success
3,284,694 UART: [afmc] ++
3,284,862 UART: [afmc] CDI.KEYID = 6
3,285,225 UART: [afmc] SUBJECT.KEYID = 7
3,285,651 UART: [afmc] AUTHORITY.KEYID = 5
3,321,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,337,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,338,271 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,343,965 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,349,865 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,355,574 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,363,570 UART: [afmc] --
3,364,650 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,364,672 UART: [cold-reset] --
3,365,732 UART: [state] Locking Datavault
3,366,727 UART: [state] Locking PCR0, PCR1 and PCR31
3,367,331 UART: [state] Locking ICCM
3,367,857 UART: [exit] Launching FMC @ 0x40000000
3,373,154 UART:
3,373,170 UART: Running Caliptra FMC ...
3,373,578 UART:
3,373,808 UART: [fmc] Received command: 0x10000000
3,375,977 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,139,117 >>> mbox cmd response: success
3,194,794 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,201,357 UART:
3,201,373 UART: Running Caliptra FMC ...
3,201,781 UART:
3,202,011 UART: [fmc] Received command: 0x10000000
3,204,180 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
891,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,926 UART: [kat] ++
896,078 UART: [kat] sha1
900,324 UART: [kat] SHA2-256
902,264 UART: [kat] SHA2-384
905,219 UART: [kat] SHA2-512-ACC
907,120 UART: [kat] ECC-384
917,057 UART: [kat] HMAC-384Kdf
921,655 UART: [kat] LMS
1,169,967 UART: [kat] --
1,170,800 UART: [cold-reset] ++
1,171,222 UART: [fht] FHT @ 0x50003400
1,173,870 UART: [idev] ++
1,174,038 UART: [idev] CDI.KEYID = 6
1,174,399 UART: [idev] SUBJECT.KEYID = 7
1,174,824 UART: [idev] UDS.KEYID = 0
1,183,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,004 UART: [idev] Sha1 KeyId Algorithm
1,208,898 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,401 UART: [ldev] SUBJECT.KEYID = 5
1,210,828 UART: [ldev] AUTHORITY.KEYID = 7
1,211,291 UART: [ldev] FE.KEYID = 1
1,216,609 UART: [ldev] Erasing FE.KEYID = 1
1,243,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,775 UART: [fwproc] Wait for Commands...
1,283,450 UART: [fwproc] Recv command 0x46574c44
1,284,183 UART: [fwproc] Recv'd Img size: 111752 bytes
3,099,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,127,871 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,153,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,289,106 >>> mbox cmd response: success
3,290,159 UART: [afmc] ++
3,290,327 UART: [afmc] CDI.KEYID = 6
3,290,690 UART: [afmc] SUBJECT.KEYID = 7
3,291,116 UART: [afmc] AUTHORITY.KEYID = 5
3,326,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,343,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,344,242 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,349,936 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,355,836 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,361,545 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,369,209 UART: [afmc] --
3,370,277 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,370,299 UART: [cold-reset] --
3,370,905 UART: [state] Locking Datavault
3,371,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,372,522 UART: [state] Locking ICCM
3,373,092 UART: [exit] Launching FMC @ 0x40000000
3,378,389 UART:
3,378,405 UART: Running Caliptra FMC ...
3,378,813 UART:
3,379,043 UART: [fmc] Received command: 0x10000000
3,381,212 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,135,441 >>> mbox cmd response: success
3,191,418 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,197,681 UART:
3,197,697 UART: Running Caliptra FMC ...
3,198,105 UART:
3,198,335 UART: [fmc] Received command: 0x10000000
3,200,504 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,051,137 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,192,152 UART:
2,192,588 UART: Running Caliptra ROM ...
2,193,720 UART:
2,193,886 UART: [state] CFI Enabled
2,194,782 UART: [state] LifecycleState = Unprovisioned
2,196,541 UART: [state] DebugLocked = No
2,197,580 UART: [state] WD Timer not started. Device not locked for debugging
2,200,109 UART: [kat] SHA2-256
2,200,787 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,203,805 UART: [kat] ++
2,204,259 UART: [kat] sha1
2,204,776 UART: [kat] SHA2-256
2,205,580 UART: [kat] SHA2-384
2,206,658 UART: [kat] SHA2-512-ACC
2,207,581 UART: [kat] ECC-384
3,776,593 UART: [kat] HMAC-384Kdf
3,802,094 UART: [kat] LMS
4,875,284 UART: [kat] --
4,878,179 UART: [cold-reset] ++
4,879,901 UART: [fht] FHT @ 0x50003400
4,892,352 UART: [idev] ++
4,893,026 UART: [idev] CDI.KEYID = 6
4,894,263 UART: [idev] SUBJECT.KEYID = 7
4,895,373 UART: [idev] UDS.KEYID = 0
4,930,767 UART: [idev] Erasing UDS.KEYID = 0
8,245,478 UART: [idev] Sha1 KeyId Algorithm
8,266,118 UART: [idev] --
8,270,600 UART: [ldev] ++
8,271,220 UART: [ldev] CDI.KEYID = 6
8,272,328 UART: [ldev] SUBJECT.KEYID = 5
8,273,597 UART: [ldev] AUTHORITY.KEYID = 7
8,274,692 UART: [ldev] FE.KEYID = 1
8,318,329 UART: [ldev] Erasing FE.KEYID = 1
11,656,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,035 UART: [ldev] --
14,038,436 UART: [fwproc] Wait for Commands...
14,041,016 UART: [fwproc] Recv command 0x46574c44
14,043,332 UART: [fwproc] Recv'd Img size: 111408 bytes
18,086,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,162,868 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,223,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,539,090 >>> mbox cmd response: success
18,542,735 UART: [afmc] ++
18,543,319 UART: [afmc] CDI.KEYID = 6
18,544,522 UART: [afmc] SUBJECT.KEYID = 7
18,545,624 UART: [afmc] AUTHORITY.KEYID = 5
21,901,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,200,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,202,912 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,218,946 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,234,948 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,251,042 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,272,938 UART: [afmc] --
24,277,023 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,277,405 UART: [cold-reset] --
24,281,057 UART: [state] Locking Datavault
24,285,890 UART: [state] Locking PCR0, PCR1 and PCR31
24,287,536 UART: [state] Locking ICCM
24,289,905 UART: [exit] Launching FMC @ 0x40000000
24,298,523 UART:
24,298,770 UART: Running Caliptra FMC ...
24,299,868 UART:
24,300,023 UART: [fmc] Received command: 0x10000000
24,302,489 >>> mbox cmd response data (224 bytes)
24,303,974 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,304,386 UART: [fmc] Received command: 0x10000006
24,325,638 >>> mbox cmd response data (1536 bytes)
24,336,108 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,476,233 UART: [fmc] Received command: 0x46574C44
24,477,788 UART:
24,477,959 UART: Running Caliptra ROM ...
24,479,064 UART:
24,479,222 UART: [state] CFI Enabled
24,534,745 UART: [state] LifecycleState = Unprovisioned
24,536,579 UART: [state] DebugLocked = No
24,539,574 UART: [state] WD Timer not started. Device not locked for debugging
24,543,936 UART: [kat] SHA2-256
24,725,912 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,737,383 UART: [kat] ++
24,737,900 UART: [kat] sha1
24,748,251 UART: [kat] SHA2-256
24,751,322 UART: [kat] SHA2-384
24,757,519 UART: [kat] SHA2-512-ACC
24,760,084 UART: [kat] ECC-384
28,049,258 UART: [kat] HMAC-384Kdf
28,073,755 UART: [kat] LMS
29,146,924 UART: [kat] --
29,151,260 UART: [update-reset] ++
33,223,587 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,227,723 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,600,366 >>> mbox cmd response: success
33,601,845 UART: [update-reset] Copying MAN_2 To MAN_1
33,624,758 UART: [update-reset Success] --
33,626,354 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,628,469 UART: [state] Locking Datavault
33,632,001 UART: [state] Locking PCR0, PCR1 and PCR31
33,633,711 UART: [state] Locking ICCM
33,636,137 UART: [exit] Launching FMC @ 0x40000000
33,644,808 UART:
33,645,040 UART: Running Caliptra FMC ...
33,646,144 UART:
33,646,300 UART: [fmc] Received command: 0x10000000
33,648,725 >>> mbox cmd response data (224 bytes)
33,650,153 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,650,568 UART: [fmc] Received command: 0x10000006
33,671,815 >>> mbox cmd response data (1536 bytes)
33,680,234 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,680,714 UART: [fmc] Received command: 0x10000007
33,682,198 >>> mbox cmd response data (4 bytes)
33,682,514 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,682,832 UART: [fmc] Received command: 0x10000006
33,704,075 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,054,509 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,290,418 >>> mbox cmd response: success
23,960,864 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,974,528 UART:
23,974,854 UART: Running Caliptra FMC ...
23,975,946 UART:
23,976,095 UART: [fmc] Received command: 0x10000000
23,978,478 >>> mbox cmd response data (224 bytes)
23,979,874 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
23,980,293 UART: [fmc] Received command: 0x10000006
24,001,543 >>> mbox cmd response data (1536 bytes)
24,011,632 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,151,774 UART: [fmc] Received command: 0x46574C44
33,149,953 >>> mbox cmd response: success
33,171,998 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,185,402 UART:
33,185,658 UART: Running Caliptra FMC ...
33,186,690 UART:
33,186,858 UART: [fmc] Received command: 0x10000000
33,189,345 >>> mbox cmd response data (224 bytes)
33,190,675 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,191,091 UART: [fmc] Received command: 0x10000006
33,212,359 >>> mbox cmd response data (1536 bytes)
33,220,723 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,221,190 UART: [fmc] Received command: 0x10000007
33,222,700 >>> mbox cmd response data (4 bytes)
33,223,008 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,223,332 UART: [fmc] Received command: 0x10000006
33,244,546 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,059,260 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,200,302 UART:
2,200,754 UART: Running Caliptra ROM ...
2,201,894 UART:
2,202,063 UART: [state] CFI Enabled
2,203,035 UART: [state] LifecycleState = Unprovisioned
2,204,712 UART: [state] DebugLocked = No
2,205,738 UART: [state] WD Timer not started. Device not locked for debugging
2,208,202 UART: [kat] SHA2-256
2,208,863 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,868 UART: [kat] ++
2,212,309 UART: [kat] sha1
2,212,813 UART: [kat] SHA2-256
2,213,546 UART: [kat] SHA2-384
2,214,204 UART: [kat] SHA2-512-ACC
2,215,078 UART: [kat] ECC-384
4,093,997 UART: [kat] HMAC-384Kdf
4,105,653 UART: [kat] LMS
5,178,779 UART: [kat] --
5,183,018 UART: [cold-reset] ++
5,185,226 UART: [fht] FHT @ 0x50003400
5,196,685 UART: [idev] ++
5,197,361 UART: [idev] CDI.KEYID = 6
5,198,586 UART: [idev] SUBJECT.KEYID = 7
5,200,009 UART: [idev] UDS.KEYID = 0
5,218,048 UART: [idev] Erasing UDS.KEYID = 0
8,492,929 UART: [idev] Sha1 KeyId Algorithm
8,514,551 UART: [idev] --
8,518,438 UART: [ldev] ++
8,519,065 UART: [ldev] CDI.KEYID = 6
8,520,245 UART: [ldev] SUBJECT.KEYID = 5
8,521,726 UART: [ldev] AUTHORITY.KEYID = 7
8,523,279 UART: [ldev] FE.KEYID = 1
8,533,762 UART: [ldev] Erasing FE.KEYID = 1
11,823,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,013 UART: [ldev] --
14,190,127 UART: [fwproc] Wait for Commands...
14,192,018 UART: [fwproc] Recv command 0x46574c44
14,194,283 UART: [fwproc] Recv'd Img size: 111408 bytes
18,233,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,311,664 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,371,882 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,687,623 >>> mbox cmd response: success
18,691,825 UART: [afmc] ++
18,692,412 UART: [afmc] CDI.KEYID = 6
18,693,646 UART: [afmc] SUBJECT.KEYID = 7
18,694,741 UART: [afmc] AUTHORITY.KEYID = 5
22,016,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,313,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,315,680 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
24,331,709 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
24,347,764 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
24,363,811 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
24,388,112 UART: [afmc] --
24,390,958 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,391,326 UART: [cold-reset] --
24,395,482 UART: [state] Locking Datavault
24,399,158 UART: [state] Locking PCR0, PCR1 and PCR31
24,400,796 UART: [state] Locking ICCM
24,402,289 UART: [exit] Launching FMC @ 0x40000000
24,410,910 UART:
24,411,184 UART: Running Caliptra FMC ...
24,412,281 UART:
24,412,457 UART: [fmc] Received command: 0x10000000
24,414,856 >>> mbox cmd response data (224 bytes)
24,416,333 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,416,746 UART: [fmc] Received command: 0x10000006
24,437,982 >>> mbox cmd response data (1536 bytes)
24,448,451 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,588,557 UART: [fmc] Received command: 0x46574C44
24,590,104 UART:
24,590,265 UART: Running Caliptra ROM ...
24,591,365 UART:
24,591,678 UART: [state] CFI Enabled
24,605,444 UART: [state] LifecycleState = Unprovisioned
24,607,314 UART: [state] DebugLocked = No
24,609,329 UART: [state] WD Timer not started. Device not locked for debugging
24,614,189 UART: [kat] SHA2-256
24,796,126 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,807,689 UART: [kat] ++
24,808,342 UART: [kat] sha1
24,819,556 UART: [kat] SHA2-256
24,822,563 UART: [kat] SHA2-384
24,828,869 UART: [kat] SHA2-512-ACC
24,831,425 UART: [kat] ECC-384
28,084,439 UART: [kat] HMAC-384Kdf
28,096,205 UART: [kat] LMS
29,169,383 UART: [kat] --
29,174,044 UART: [update-reset] ++
33,242,634 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
33,245,411 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,618,032 >>> mbox cmd response: success
33,618,624 UART: [update-reset] Copying MAN_2 To MAN_1
33,641,509 UART: [update-reset Success] --
33,643,090 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,645,650 UART: [state] Locking Datavault
33,650,308 UART: [state] Locking PCR0, PCR1 and PCR31
33,651,957 UART: [state] Locking ICCM
33,653,998 UART: [exit] Launching FMC @ 0x40000000
33,662,604 UART:
33,662,831 UART: Running Caliptra FMC ...
33,663,875 UART:
33,664,017 UART: [fmc] Received command: 0x10000000
33,666,557 >>> mbox cmd response data (224 bytes)
33,667,966 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,668,372 UART: [fmc] Received command: 0x10000006
33,689,619 >>> mbox cmd response data (1536 bytes)
33,697,902 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,698,365 UART: [fmc] Received command: 0x10000007
33,699,902 >>> mbox cmd response data (4 bytes)
33,700,220 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,700,549 UART: [fmc] Received command: 0x10000006
33,721,784 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,060,202 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,502,767 >>> mbox cmd response: success
24,127,136 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,142,675 UART:
24,143,011 UART: Running Caliptra FMC ...
24,144,195 UART:
24,144,363 UART: [fmc] Received command: 0x10000000
24,146,645 >>> mbox cmd response data (224 bytes)
24,148,171 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
24,148,574 UART: [fmc] Received command: 0x10000006
24,169,797 >>> mbox cmd response data (1536 bytes)
24,180,080 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,320,192 UART: [fmc] Received command: 0x46574C44
33,245,618 >>> mbox cmd response: success
33,267,220 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
33,280,072 UART:
33,280,330 UART: Running Caliptra FMC ...
33,281,359 UART:
33,281,520 UART: [fmc] Received command: 0x10000000
33,284,002 >>> mbox cmd response data (224 bytes)
33,285,320 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,285,722 UART: [fmc] Received command: 0x10000006
33,306,982 >>> mbox cmd response data (1536 bytes)
33,315,226 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
33,315,682 UART: [fmc] Received command: 0x10000007
33,317,184 >>> mbox cmd response data (4 bytes)
33,317,477 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
33,317,784 UART: [fmc] Received command: 0x10000006
33,339,024 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,055,604 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,197,048 UART:
2,197,480 UART: Running Caliptra ROM ...
2,198,568 UART:
2,198,720 UART: [state] CFI Enabled
2,199,704 UART: [state] LifecycleState = Unprovisioned
2,201,354 UART: [state] DebugLocked = No
2,202,380 UART: [state] WD Timer not started. Device not locked for debugging
2,204,860 UART: [kat] SHA2-256
2,205,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,550 UART: [kat] ++
2,209,004 UART: [kat] sha1
2,209,521 UART: [kat] SHA2-256
2,210,260 UART: [kat] SHA2-384
2,210,927 UART: [kat] SHA2-512-ACC
2,211,811 UART: [kat] ECC-384
2,949,645 UART: [kat] HMAC-384Kdf
2,973,475 UART: [kat] LMS
3,502,934 UART: [kat] --
3,508,761 UART: [cold-reset] ++
3,511,172 UART: [fht] FHT @ 0x50003400
3,521,502 UART: [idev] ++
3,522,074 UART: [idev] CDI.KEYID = 6
3,523,013 UART: [idev] SUBJECT.KEYID = 7
3,524,228 UART: [idev] UDS.KEYID = 0
3,544,994 UART: [idev] Erasing UDS.KEYID = 0
6,028,724 UART: [idev] Sha1 KeyId Algorithm
6,051,961 UART: [idev] --
6,056,511 UART: [ldev] ++
6,057,110 UART: [ldev] CDI.KEYID = 6
6,058,194 UART: [ldev] SUBJECT.KEYID = 5
6,059,270 UART: [ldev] AUTHORITY.KEYID = 7
6,060,391 UART: [ldev] FE.KEYID = 1
6,106,828 UART: [ldev] Erasing FE.KEYID = 1
8,609,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,143 UART: [ldev] --
10,404,816 UART: [fwproc] Wait for Commands...
10,407,781 UART: [fwproc] Recv command 0x46574c44
10,409,879 UART: [fwproc] Recv'd Img size: 111752 bytes
13,778,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,851,771 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,912,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,228,975 >>> mbox cmd response: success
14,234,116 UART: [afmc] ++
14,234,715 UART: [afmc] CDI.KEYID = 6
14,235,602 UART: [afmc] SUBJECT.KEYID = 7
14,236,841 UART: [afmc] AUTHORITY.KEYID = 5
16,778,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,498,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,500,253 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,516,149 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,532,072 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,547,982 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,570,262 UART: [afmc] --
18,573,655 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,574,030 UART: [cold-reset] --
18,576,303 UART: [state] Locking Datavault
18,582,466 UART: [state] Locking PCR0, PCR1 and PCR31
18,584,110 UART: [state] Locking ICCM
18,585,288 UART: [exit] Launching FMC @ 0x40000000
18,593,646 UART:
18,593,923 UART: Running Caliptra FMC ...
18,595,061 UART:
18,595,228 UART: [fmc] Received command: 0x10000000
18,597,616 >>> mbox cmd response data (224 bytes)
18,599,122 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,599,528 UART: [fmc] Received command: 0x10000006
18,620,771 >>> mbox cmd response data (1536 bytes)
18,631,830 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,772,374 UART: [fmc] Received command: 0x46574C44
18,773,923 UART:
18,774,090 UART: Running Caliptra ROM ...
18,775,108 UART:
18,775,296 UART: [state] CFI Enabled
18,833,452 UART: [state] LifecycleState = Unprovisioned
18,835,328 UART: [state] DebugLocked = No
18,837,690 UART: [state] WD Timer not started. Device not locked for debugging
18,842,186 UART: [kat] SHA2-256
19,021,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,032,908 UART: [kat] ++
19,033,454 UART: [kat] sha1
19,044,022 UART: [kat] SHA2-256
19,047,049 UART: [kat] SHA2-384
19,053,145 UART: [kat] SHA2-512-ACC
19,056,092 UART: [kat] ECC-384
21,519,125 UART: [kat] HMAC-384Kdf
21,541,389 UART: [kat] LMS
22,070,849 UART: [kat] --
22,075,048 UART: [update-reset] ++
25,471,874 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,475,716 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,849,604 >>> mbox cmd response: success
25,850,915 UART: [update-reset] Copying MAN_2 To MAN_1
25,873,267 UART: [update-reset Success] --
25,874,589 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,876,881 UART: [state] Locking Datavault
25,879,981 UART: [state] Locking PCR0, PCR1 and PCR31
25,881,682 UART: [state] Locking ICCM
25,883,739 UART: [exit] Launching FMC @ 0x40000000
25,892,138 UART:
25,892,376 UART: Running Caliptra FMC ...
25,893,478 UART:
25,893,633 UART: [fmc] Received command: 0x10000000
25,896,066 >>> mbox cmd response data (224 bytes)
25,897,570 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,897,971 UART: [fmc] Received command: 0x10000006
25,919,212 >>> mbox cmd response data (1536 bytes)
25,927,712 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,928,159 UART: [fmc] Received command: 0x10000007
25,929,701 >>> mbox cmd response data (4 bytes)
25,930,038 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,930,351 UART: [fmc] Received command: 0x10000006
25,951,600 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,056,073 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,019,749 >>> mbox cmd response: success
18,287,228 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,299,090 UART:
18,299,428 UART: Running Caliptra FMC ...
18,300,595 UART:
18,300,769 UART: [fmc] Received command: 0x10000000
18,303,092 >>> mbox cmd response data (224 bytes)
18,304,572 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,304,981 UART: [fmc] Received command: 0x10000006
18,326,277 >>> mbox cmd response data (1536 bytes)
18,336,574 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,477,349 UART: [fmc] Received command: 0x46574C44
25,409,979 >>> mbox cmd response: success
25,431,908 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,444,010 UART:
25,444,288 UART: Running Caliptra FMC ...
25,445,401 UART:
25,445,563 UART: [fmc] Received command: 0x10000000
25,448,004 >>> mbox cmd response data (224 bytes)
25,449,405 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,449,824 UART: [fmc] Received command: 0x10000006
25,471,093 >>> mbox cmd response data (1536 bytes)
25,479,268 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,479,726 UART: [fmc] Received command: 0x10000007
25,481,316 >>> mbox cmd response data (4 bytes)
25,481,633 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,481,946 UART: [fmc] Received command: 0x10000006
25,503,137 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,057,858 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,199,823 UART:
2,200,258 UART: Running Caliptra ROM ...
2,201,429 UART:
2,201,602 UART: [state] CFI Enabled
2,202,577 UART: [state] LifecycleState = Unprovisioned
2,204,225 UART: [state] DebugLocked = No
2,205,326 UART: [state] WD Timer not started. Device not locked for debugging
2,207,796 UART: [kat] SHA2-256
2,208,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,466 UART: [kat] ++
2,211,916 UART: [kat] sha1
2,212,429 UART: [kat] SHA2-256
2,213,168 UART: [kat] SHA2-384
2,213,834 UART: [kat] SHA2-512-ACC
2,214,735 UART: [kat] ECC-384
3,279,783 UART: [kat] HMAC-384Kdf
3,291,863 UART: [kat] LMS
3,821,338 UART: [kat] --
3,827,272 UART: [cold-reset] ++
3,829,471 UART: [fht] FHT @ 0x50003400
3,840,990 UART: [idev] ++
3,841,549 UART: [idev] CDI.KEYID = 6
3,842,515 UART: [idev] SUBJECT.KEYID = 7
3,843,669 UART: [idev] UDS.KEYID = 0
3,860,613 UART: [idev] Erasing UDS.KEYID = 0
6,316,428 UART: [idev] Sha1 KeyId Algorithm
6,338,422 UART: [idev] --
6,343,628 UART: [ldev] ++
6,344,202 UART: [ldev] CDI.KEYID = 6
6,345,271 UART: [ldev] SUBJECT.KEYID = 5
6,346,394 UART: [ldev] AUTHORITY.KEYID = 7
6,347,564 UART: [ldev] FE.KEYID = 1
6,356,909 UART: [ldev] Erasing FE.KEYID = 1
8,828,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,339 UART: [ldev] --
10,620,006 UART: [fwproc] Wait for Commands...
10,621,570 UART: [fwproc] Recv command 0x46574c44
10,623,663 UART: [fwproc] Recv'd Img size: 111752 bytes
14,001,068 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,071,972 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,132,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,449,170 >>> mbox cmd response: success
14,453,973 UART: [afmc] ++
14,454,558 UART: [afmc] CDI.KEYID = 6
14,455,467 UART: [afmc] SUBJECT.KEYID = 7
14,456,626 UART: [afmc] AUTHORITY.KEYID = 5
16,960,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,684,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,686,470 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,702,419 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,718,306 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,734,321 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,757,639 UART: [afmc] --
18,761,410 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,761,780 UART: [cold-reset] --
18,765,782 UART: [state] Locking Datavault
18,770,161 UART: [state] Locking PCR0, PCR1 and PCR31
18,771,855 UART: [state] Locking ICCM
18,772,996 UART: [exit] Launching FMC @ 0x40000000
18,781,392 UART:
18,781,621 UART: Running Caliptra FMC ...
18,782,720 UART:
18,782,874 UART: [fmc] Received command: 0x10000000
18,785,304 >>> mbox cmd response data (224 bytes)
18,786,752 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,787,160 UART: [fmc] Received command: 0x10000006
18,808,413 >>> mbox cmd response data (1536 bytes)
18,818,668 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,959,076 UART: [fmc] Received command: 0x46574C44
18,960,616 UART:
18,960,783 UART: Running Caliptra ROM ...
18,961,883 UART:
18,962,148 UART: [state] CFI Enabled
18,977,039 UART: [state] LifecycleState = Unprovisioned
18,978,935 UART: [state] DebugLocked = No
18,981,666 UART: [state] WD Timer not started. Device not locked for debugging
18,985,239 UART: [kat] SHA2-256
19,164,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,176,001 UART: [kat] ++
19,176,538 UART: [kat] sha1
19,188,343 UART: [kat] SHA2-256
19,191,347 UART: [kat] SHA2-384
19,197,861 UART: [kat] SHA2-512-ACC
19,200,801 UART: [kat] ECC-384
21,642,462 UART: [kat] HMAC-384Kdf
21,656,521 UART: [kat] LMS
22,186,027 UART: [kat] --
22,192,550 UART: [update-reset] ++
25,587,512 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,590,564 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,964,430 >>> mbox cmd response: success
25,966,188 UART: [update-reset] Copying MAN_2 To MAN_1
25,988,520 UART: [update-reset Success] --
25,989,784 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,992,216 UART: [state] Locking Datavault
25,996,544 UART: [state] Locking PCR0, PCR1 and PCR31
25,998,187 UART: [state] Locking ICCM
26,000,063 UART: [exit] Launching FMC @ 0x40000000
26,008,474 UART:
26,008,757 UART: Running Caliptra FMC ...
26,009,867 UART:
26,010,029 UART: [fmc] Received command: 0x10000000
26,012,420 >>> mbox cmd response data (224 bytes)
26,013,832 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,014,249 UART: [fmc] Received command: 0x10000006
26,035,517 >>> mbox cmd response data (1536 bytes)
26,043,728 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,044,181 UART: [fmc] Received command: 0x10000007
26,045,635 >>> mbox cmd response data (4 bytes)
26,045,950 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,046,269 UART: [fmc] Received command: 0x10000006
26,067,508 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
2,061,598 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,221,955 >>> mbox cmd response: success
18,456,227 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,469,746 UART:
18,470,078 UART: Running Caliptra FMC ...
18,471,261 UART:
18,471,434 UART: [fmc] Received command: 0x10000000
18,473,776 >>> mbox cmd response data (224 bytes)
18,475,244 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,475,651 UART: [fmc] Received command: 0x10000006
18,496,928 >>> mbox cmd response data (1536 bytes)
18,506,899 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,647,305 UART: [fmc] Received command: 0x46574C44
25,503,605 >>> mbox cmd response: success
25,526,093 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,536,715 UART:
25,536,981 UART: Running Caliptra FMC ...
25,538,017 UART:
25,538,168 UART: [fmc] Received command: 0x10000000
25,540,712 >>> mbox cmd response data (224 bytes)
25,542,052 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,542,469 UART: [fmc] Received command: 0x10000006
25,563,737 >>> mbox cmd response data (1536 bytes)
25,571,910 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,572,369 UART: [fmc] Received command: 0x10000007
25,573,882 >>> mbox cmd response data (4 bytes)
25,574,210 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,574,531 UART: [fmc] Received command: 0x10000006
25,595,735 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
2,054,560 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,195,871 UART:
2,196,267 UART: Running Caliptra ROM ...
2,197,437 UART:
2,197,608 UART: [state] CFI Enabled
2,198,585 UART: [state] LifecycleState = Unprovisioned
2,200,230 UART: [state] DebugLocked = No
2,201,337 UART: [state] WD Timer not started. Device not locked for debugging
2,204,040 UART: [kat] SHA2-256
2,204,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,207,758 UART: [kat] ++
2,208,210 UART: [kat] sha1
2,208,722 UART: [kat] SHA2-256
2,209,379 UART: [kat] SHA2-384
2,210,053 UART: [kat] SHA2-512-ACC
2,210,895 UART: [kat] ECC-384
2,947,040 UART: [kat] HMAC-384Kdf
2,971,681 UART: [kat] LMS
3,501,131 UART: [kat] --
3,505,411 UART: [cold-reset] ++
3,506,802 UART: [fht] FHT @ 0x50003400
3,517,519 UART: [idev] ++
3,518,086 UART: [idev] CDI.KEYID = 6
3,519,050 UART: [idev] SUBJECT.KEYID = 7
3,520,216 UART: [idev] UDS.KEYID = 0
3,544,729 UART: [idev] Erasing UDS.KEYID = 0
6,025,835 UART: [idev] Sha1 KeyId Algorithm
6,049,050 UART: [idev] --
6,054,437 UART: [ldev] ++
6,055,019 UART: [ldev] CDI.KEYID = 6
6,055,952 UART: [ldev] SUBJECT.KEYID = 5
6,057,066 UART: [ldev] AUTHORITY.KEYID = 7
6,058,362 UART: [ldev] FE.KEYID = 1
6,100,247 UART: [ldev] Erasing FE.KEYID = 1
8,604,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,600 UART: [ldev] --
10,414,062 UART: [fwproc] Wait for Commands...
10,416,651 UART: [fwproc] Recv command 0x46574c44
10,418,755 UART: [fwproc] Recv'd Img size: 111752 bytes
13,792,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,866,606 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,926,979 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,245,027 >>> mbox cmd response: success
14,248,599 UART: [afmc] ++
14,249,188 UART: [afmc] CDI.KEYID = 6
14,250,075 UART: [afmc] SUBJECT.KEYID = 7
14,251,292 UART: [afmc] AUTHORITY.KEYID = 5
16,784,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,657 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,526,634 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,542,514 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,558,441 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,581,986 UART: [afmc] --
18,585,861 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,586,234 UART: [cold-reset] --
18,589,528 UART: [state] Locking Datavault
18,595,584 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,248 UART: [state] Locking ICCM
18,599,400 UART: [exit] Launching FMC @ 0x40000000
18,607,803 UART:
18,608,087 UART: Running Caliptra FMC ...
18,609,203 UART:
18,609,360 UART: [fmc] Received command: 0x10000000
18,611,738 >>> mbox cmd response data (224 bytes)
18,613,236 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,613,636 UART: [fmc] Received command: 0x10000006
18,634,876 >>> mbox cmd response data (1536 bytes)
18,645,647 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,786,223 UART: [fmc] Received command: 0x46574C44
18,787,774 UART:
18,787,941 UART: Running Caliptra ROM ...
18,789,048 UART:
18,789,207 UART: [state] CFI Enabled
18,863,392 UART: [state] LifecycleState = Unprovisioned
18,865,332 UART: [state] DebugLocked = No
18,867,153 UART: [state] WD Timer not started. Device not locked for debugging
18,871,487 UART: [kat] SHA2-256
19,050,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,062,163 UART: [kat] ++
19,062,618 UART: [kat] sha1
19,074,962 UART: [kat] SHA2-256
19,077,979 UART: [kat] SHA2-384
19,084,285 UART: [kat] SHA2-512-ACC
19,087,213 UART: [kat] ECC-384
21,549,270 UART: [kat] HMAC-384Kdf
21,571,975 UART: [kat] LMS
22,101,385 UART: [kat] --
22,104,504 UART: [update-reset] ++
25,492,871 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,495,567 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,869,397 >>> mbox cmd response: success
25,870,540 UART: [update-reset] Copying MAN_2 To MAN_1
25,892,879 UART: [update-reset Success] --
25,894,187 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,897,484 UART: [state] Locking Datavault
25,901,007 UART: [state] Locking PCR0, PCR1 and PCR31
25,902,658 UART: [state] Locking ICCM
25,905,293 UART: [exit] Launching FMC @ 0x40000000
25,913,699 UART:
25,913,933 UART: Running Caliptra FMC ...
25,915,031 UART:
25,915,189 UART: [fmc] Received command: 0x10000000
25,917,629 >>> mbox cmd response data (224 bytes)
25,919,049 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,919,454 UART: [fmc] Received command: 0x10000006
25,940,708 >>> mbox cmd response data (1536 bytes)
25,948,891 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,949,352 UART: [fmc] Received command: 0x10000007
25,950,892 >>> mbox cmd response data (4 bytes)
25,951,215 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,951,527 UART: [fmc] Received command: 0x10000006
25,972,745 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
2,061,159 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
13,994,310 >>> mbox cmd response: success
18,265,093 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,280,843 UART:
18,281,200 UART: Running Caliptra FMC ...
18,282,379 UART:
18,282,544 UART: [fmc] Received command: 0x10000000
18,284,895 >>> mbox cmd response data (224 bytes)
18,286,384 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,286,790 UART: [fmc] Received command: 0x10000006
18,308,052 >>> mbox cmd response data (1536 bytes)
18,318,218 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,458,788 UART: [fmc] Received command: 0x46574C44
25,384,090 >>> mbox cmd response: success
25,405,207 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,416,772 UART:
25,417,061 UART: Running Caliptra FMC ...
25,418,183 UART:
25,418,346 UART: [fmc] Received command: 0x10000000
25,420,781 >>> mbox cmd response data (224 bytes)
25,422,206 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,422,612 UART: [fmc] Received command: 0x10000006
25,443,907 >>> mbox cmd response data (1536 bytes)
25,452,085 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,452,538 UART: [fmc] Received command: 0x10000007
25,454,125 >>> mbox cmd response data (4 bytes)
25,454,443 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,454,752 UART: [fmc] Received command: 0x10000006
25,475,996 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,059,491 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,200,958 UART:
2,201,377 UART: Running Caliptra ROM ...
2,202,473 UART:
2,202,647 UART: [state] CFI Enabled
2,203,638 UART: [state] LifecycleState = Unprovisioned
2,205,285 UART: [state] DebugLocked = No
2,206,313 UART: [state] WD Timer not started. Device not locked for debugging
2,208,782 UART: [kat] SHA2-256
2,209,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,453 UART: [kat] ++
2,212,900 UART: [kat] sha1
2,213,409 UART: [kat] SHA2-256
2,214,063 UART: [kat] SHA2-384
2,214,719 UART: [kat] SHA2-512-ACC
2,215,520 UART: [kat] ECC-384
3,285,465 UART: [kat] HMAC-384Kdf
3,298,117 UART: [kat] LMS
3,827,636 UART: [kat] --
3,829,732 UART: [cold-reset] ++
3,831,304 UART: [fht] FHT @ 0x50003400
3,843,151 UART: [idev] ++
3,843,713 UART: [idev] CDI.KEYID = 6
3,844,681 UART: [idev] SUBJECT.KEYID = 7
3,846,004 UART: [idev] UDS.KEYID = 0
3,861,192 UART: [idev] Erasing UDS.KEYID = 0
6,316,709 UART: [idev] Sha1 KeyId Algorithm
6,341,058 UART: [idev] --
6,344,753 UART: [ldev] ++
6,345,326 UART: [ldev] CDI.KEYID = 6
6,346,236 UART: [ldev] SUBJECT.KEYID = 5
6,347,450 UART: [ldev] AUTHORITY.KEYID = 7
6,348,682 UART: [ldev] FE.KEYID = 1
6,359,484 UART: [ldev] Erasing FE.KEYID = 1
8,833,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,625 UART: [ldev] --
10,620,532 UART: [fwproc] Wait for Commands...
10,622,408 UART: [fwproc] Recv command 0x46574c44
10,624,500 UART: [fwproc] Recv'd Img size: 111752 bytes
13,993,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,066,371 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,444,464 >>> mbox cmd response: success
14,448,601 UART: [afmc] ++
14,449,187 UART: [afmc] CDI.KEYID = 6
14,450,070 UART: [afmc] SUBJECT.KEYID = 7
14,451,286 UART: [afmc] AUTHORITY.KEYID = 5
16,954,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,674,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,676,451 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,692,328 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,708,245 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,724,201 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,747,197 UART: [afmc] --
18,750,970 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,751,338 UART: [cold-reset] --
18,753,660 UART: [state] Locking Datavault
18,758,900 UART: [state] Locking PCR0, PCR1 and PCR31
18,760,542 UART: [state] Locking ICCM
18,763,095 UART: [exit] Launching FMC @ 0x40000000
18,771,494 UART:
18,771,732 UART: Running Caliptra FMC ...
18,772,827 UART:
18,772,980 UART: [fmc] Received command: 0x10000000
18,775,406 >>> mbox cmd response data (224 bytes)
18,776,899 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,777,306 UART: [fmc] Received command: 0x10000006
18,798,594 >>> mbox cmd response data (1536 bytes)
18,809,443 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,949,843 UART: [fmc] Received command: 0x46574C44
18,951,386 UART:
18,951,550 UART: Running Caliptra ROM ...
18,952,569 UART:
18,952,921 UART: [state] CFI Enabled
18,967,152 UART: [state] LifecycleState = Unprovisioned
18,969,029 UART: [state] DebugLocked = No
18,971,743 UART: [state] WD Timer not started. Device not locked for debugging
18,976,130 UART: [kat] SHA2-256
19,155,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,166,885 UART: [kat] ++
19,167,359 UART: [kat] sha1
19,178,567 UART: [kat] SHA2-256
19,181,629 UART: [kat] SHA2-384
19,188,577 UART: [kat] SHA2-512-ACC
19,191,518 UART: [kat] ECC-384
21,633,186 UART: [kat] HMAC-384Kdf
21,644,660 UART: [kat] LMS
22,174,169 UART: [kat] --
22,179,098 UART: [update-reset] ++
25,580,854 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,584,559 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,958,425 >>> mbox cmd response: success
25,959,752 UART: [update-reset] Copying MAN_2 To MAN_1
25,982,094 UART: [update-reset Success] --
25,983,420 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,987,430 UART: [state] Locking Datavault
25,990,003 UART: [state] Locking PCR0, PCR1 and PCR31
25,991,659 UART: [state] Locking ICCM
25,993,000 UART: [exit] Launching FMC @ 0x40000000
26,001,399 UART:
26,001,635 UART: Running Caliptra FMC ...
26,002,738 UART:
26,002,900 UART: [fmc] Received command: 0x10000000
26,005,335 >>> mbox cmd response data (224 bytes)
26,006,947 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,007,394 UART: [fmc] Received command: 0x10000006
26,028,645 >>> mbox cmd response data (1536 bytes)
26,036,859 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,037,317 UART: [fmc] Received command: 0x10000007
26,038,857 >>> mbox cmd response data (4 bytes)
26,039,187 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,039,512 UART: [fmc] Received command: 0x10000006
26,060,722 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
2,059,318 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,235,913 >>> mbox cmd response: success
18,469,742 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,484,423 UART:
18,484,760 UART: Running Caliptra FMC ...
18,485,935 UART:
18,486,125 UART: [fmc] Received command: 0x10000000
18,488,405 >>> mbox cmd response data (224 bytes)
18,489,809 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,490,222 UART: [fmc] Received command: 0x10000006
18,511,519 >>> mbox cmd response data (1536 bytes)
18,521,671 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,662,233 UART: [fmc] Received command: 0x46574C44
25,523,224 >>> mbox cmd response: success
25,544,937 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,555,641 UART:
25,555,892 UART: Running Caliptra FMC ...
25,557,002 UART:
25,557,168 UART: [fmc] Received command: 0x10000000
25,559,658 >>> mbox cmd response data (224 bytes)
25,561,047 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,561,459 UART: [fmc] Received command: 0x10000006
25,582,727 >>> mbox cmd response data (1536 bytes)
25,590,988 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,591,447 UART: [fmc] Received command: 0x10000007
25,593,033 >>> mbox cmd response data (4 bytes)
25,593,354 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,593,673 UART: [fmc] Received command: 0x10000006
25,614,860 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,938 UART: [state] LifecycleState = Unprovisioned
86,593 UART: [state] DebugLocked = No
87,169 UART: [state] WD Timer not started. Device not locked for debugging
88,352 UART: [kat] SHA2-256
891,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,031 UART: [kat] ++
896,183 UART: [kat] sha1
900,451 UART: [kat] SHA2-256
902,391 UART: [kat] SHA2-384
905,126 UART: [kat] SHA2-512-ACC
907,027 UART: [kat] ECC-384
916,522 UART: [kat] HMAC-384Kdf
920,956 UART: [kat] LMS
1,169,268 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,205 UART: [idev] ++
1,173,373 UART: [idev] CDI.KEYID = 6
1,173,734 UART: [idev] SUBJECT.KEYID = 7
1,174,159 UART: [idev] UDS.KEYID = 0
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,460 UART: [ldev] ++
1,208,628 UART: [ldev] CDI.KEYID = 6
1,208,992 UART: [ldev] SUBJECT.KEYID = 5
1,209,419 UART: [ldev] AUTHORITY.KEYID = 7
1,209,882 UART: [ldev] FE.KEYID = 1
1,215,022 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,018 UART: [ldev] --
1,281,390 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,173 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,342 >>> mbox cmd response: success
2,740,591 UART: [afmc] ++
2,740,759 UART: [afmc] CDI.KEYID = 6
2,741,122 UART: [afmc] SUBJECT.KEYID = 7
2,741,548 UART: [afmc] AUTHORITY.KEYID = 5
2,777,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,251 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,971 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,863 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,557 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,304 UART: [afmc] --
2,820,324 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,346 UART: [cold-reset] --
2,821,282 UART: [state] Locking Datavault
2,822,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,037 UART: [state] Locking ICCM
2,823,481 UART: [exit] Launching FMC @ 0x40000000
2,828,778 UART:
2,828,794 UART: Running Caliptra FMC ...
2,829,202 UART:
2,829,432 UART: [fmc] Received command: 0x10000000
2,831,601 >>> mbox cmd response data (224 bytes)
2,831,602 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,831,631 UART: [fmc] Received command: 0x10000006
2,849,648 >>> mbox cmd response data (1536 bytes)
2,849,649 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,849,677 UART: [fmc] Received command: 0x46574C44
2,850,503 UART:
2,850,519 UART: Running Caliptra ROM ...
2,850,927 UART:
2,850,982 UART: [state] CFI Enabled
2,853,494 UART: [state] LifecycleState = Unprovisioned
2,854,149 UART: [state] DebugLocked = No
2,854,631 UART: [state] WD Timer not started. Device not locked for debugging
2,855,881 UART: [kat] SHA2-256
3,659,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,663,560 UART: [kat] ++
3,663,712 UART: [kat] sha1
3,667,890 UART: [kat] SHA2-256
3,669,830 UART: [kat] SHA2-384
3,672,783 UART: [kat] SHA2-512-ACC
3,674,683 UART: [kat] ECC-384
3,684,514 UART: [kat] HMAC-384Kdf
3,689,020 UART: [kat] LMS
3,937,332 UART: [kat] --
3,938,190 UART: [update-reset] ++
5,220,838 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,221,807 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,369,573 >>> mbox cmd response: success
5,369,778 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,792 UART: [update-reset Success] --
5,378,201 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,378,673 UART: [state] Locking Datavault
5,379,483 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,087 UART: [state] Locking ICCM
5,380,659 UART: [exit] Launching FMC @ 0x40000000
5,385,956 UART:
5,385,972 UART: Running Caliptra FMC ...
5,386,380 UART:
5,386,602 UART: [fmc] Received command: 0x10000000
5,388,771 >>> mbox cmd response data (224 bytes)
5,388,772 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,388,801 UART: [fmc] Received command: 0x10000006
5,406,818 >>> mbox cmd response data (1536 bytes)
5,406,819 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,406,847 UART: [fmc] Received command: 0x10000007
5,407,639 >>> mbox cmd response data (4 bytes)
5,407,640 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,407,668 UART: [fmc] Received command: 0x10000006
5,425,685 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,466 >>> mbox cmd response: success
2,643,484 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,323 UART:
2,649,339 UART: Running Caliptra FMC ...
2,649,747 UART:
2,649,977 UART: [fmc] Received command: 0x10000000
2,652,146 >>> mbox cmd response data (224 bytes)
2,652,147 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,652,176 UART: [fmc] Received command: 0x10000006
2,670,193 >>> mbox cmd response data (1536 bytes)
2,670,194 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,670,222 UART: [fmc] Received command: 0x46574C44
5,071,035 >>> mbox cmd response: success
5,078,645 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,084,203 UART:
5,084,219 UART: Running Caliptra FMC ...
5,084,627 UART:
5,084,849 UART: [fmc] Received command: 0x10000000
5,087,018 >>> mbox cmd response data (224 bytes)
5,087,019 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,087,048 UART: [fmc] Received command: 0x10000006
5,105,065 >>> mbox cmd response data (1536 bytes)
5,105,066 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,105,094 UART: [fmc] Received command: 0x10000007
5,105,886 >>> mbox cmd response data (4 bytes)
5,105,887 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,105,915 UART: [fmc] Received command: 0x10000006
5,123,932 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,689 UART: [kat] LMS
1,169,001 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,182,134 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,208,671 UART: [ldev] ++
1,208,839 UART: [ldev] CDI.KEYID = 6
1,209,203 UART: [ldev] SUBJECT.KEYID = 5
1,209,630 UART: [ldev] AUTHORITY.KEYID = 7
1,210,093 UART: [ldev] FE.KEYID = 1
1,215,137 UART: [ldev] Erasing FE.KEYID = 1
1,240,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,721 UART: [ldev] --
1,280,131 UART: [fwproc] Wait for Commands...
1,280,914 UART: [fwproc] Recv command 0x46574c44
1,281,647 UART: [fwproc] Recv'd Img size: 111752 bytes
2,548,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,576,136 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,473 >>> mbox cmd response: success
2,738,726 UART: [afmc] ++
2,738,894 UART: [afmc] CDI.KEYID = 6
2,739,257 UART: [afmc] SUBJECT.KEYID = 7
2,739,683 UART: [afmc] AUTHORITY.KEYID = 5
2,774,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,198 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,797,918 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,803,810 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,809,504 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,817,359 UART: [afmc] --
2,818,273 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,818,295 UART: [cold-reset] --
2,818,907 UART: [state] Locking Datavault
2,819,910 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,514 UART: [state] Locking ICCM
2,821,030 UART: [exit] Launching FMC @ 0x40000000
2,826,327 UART:
2,826,343 UART: Running Caliptra FMC ...
2,826,751 UART:
2,826,981 UART: [fmc] Received command: 0x10000000
2,829,150 >>> mbox cmd response data (224 bytes)
2,829,151 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,829,180 UART: [fmc] Received command: 0x10000006
2,847,197 >>> mbox cmd response data (1536 bytes)
2,847,198 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,847,226 UART: [fmc] Received command: 0x46574C44
2,848,052 UART:
2,848,068 UART: Running Caliptra ROM ...
2,848,476 UART:
2,848,618 UART: [state] CFI Enabled
2,851,734 UART: [state] LifecycleState = Unprovisioned
2,852,389 UART: [state] DebugLocked = No
2,852,941 UART: [state] WD Timer not started. Device not locked for debugging
2,854,235 UART: [kat] SHA2-256
3,657,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,914 UART: [kat] ++
3,662,066 UART: [kat] sha1
3,666,270 UART: [kat] SHA2-256
3,668,210 UART: [kat] SHA2-384
3,671,169 UART: [kat] SHA2-512-ACC
3,673,069 UART: [kat] ECC-384
3,682,712 UART: [kat] HMAC-384Kdf
3,687,356 UART: [kat] LMS
3,935,668 UART: [kat] --
3,936,626 UART: [update-reset] ++
5,218,358 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,219,443 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,367,209 >>> mbox cmd response: success
5,367,430 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,444 UART: [update-reset Success] --
5,375,853 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,376,271 UART: [state] Locking Datavault
5,377,083 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,687 UART: [state] Locking ICCM
5,378,133 UART: [exit] Launching FMC @ 0x40000000
5,383,430 UART:
5,383,446 UART: Running Caliptra FMC ...
5,383,854 UART:
5,384,076 UART: [fmc] Received command: 0x10000000
5,386,245 >>> mbox cmd response data (224 bytes)
5,386,246 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,386,275 UART: [fmc] Received command: 0x10000006
5,404,292 >>> mbox cmd response data (1536 bytes)
5,404,293 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,404,321 UART: [fmc] Received command: 0x10000007
5,405,113 >>> mbox cmd response data (4 bytes)
5,405,114 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,405,142 UART: [fmc] Received command: 0x10000006
5,423,159 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,589 >>> mbox cmd response: success
2,643,983 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,142 UART:
2,650,158 UART: Running Caliptra FMC ...
2,650,566 UART:
2,650,796 UART: [fmc] Received command: 0x10000000
2,652,965 >>> mbox cmd response data (224 bytes)
2,652,966 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,652,995 UART: [fmc] Received command: 0x10000006
2,671,012 >>> mbox cmd response data (1536 bytes)
2,671,013 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,671,041 UART: [fmc] Received command: 0x46574C44
5,072,357 >>> mbox cmd response: success
5,080,009 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,085,699 UART:
5,085,715 UART: Running Caliptra FMC ...
5,086,123 UART:
5,086,345 UART: [fmc] Received command: 0x10000000
5,088,514 >>> mbox cmd response data (224 bytes)
5,088,515 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,088,544 UART: [fmc] Received command: 0x10000006
5,106,561 >>> mbox cmd response data (1536 bytes)
5,106,562 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,106,590 UART: [fmc] Received command: 0x10000007
5,107,382 >>> mbox cmd response data (4 bytes)
5,107,383 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,107,411 UART: [fmc] Received command: 0x10000006
5,125,428 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,285 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,639 UART: [idev] --
1,208,810 UART: [ldev] ++
1,208,978 UART: [ldev] CDI.KEYID = 6
1,209,342 UART: [ldev] SUBJECT.KEYID = 5
1,209,769 UART: [ldev] AUTHORITY.KEYID = 7
1,210,232 UART: [ldev] FE.KEYID = 1
1,215,300 UART: [ldev] Erasing FE.KEYID = 1
1,241,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,748 UART: [ldev] --
1,281,068 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,035 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,720 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,364 >>> mbox cmd response: success
2,739,599 UART: [afmc] ++
2,739,767 UART: [afmc] CDI.KEYID = 6
2,740,130 UART: [afmc] SUBJECT.KEYID = 7
2,740,556 UART: [afmc] AUTHORITY.KEYID = 5
2,775,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,115 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,798,835 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,804,727 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,810,421 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,818,198 UART: [afmc] --
2,819,078 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,819,100 UART: [cold-reset] --
2,819,808 UART: [state] Locking Datavault
2,821,095 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,699 UART: [state] Locking ICCM
2,822,273 UART: [exit] Launching FMC @ 0x40000000
2,827,570 UART:
2,827,586 UART: Running Caliptra FMC ...
2,827,994 UART:
2,828,224 UART: [fmc] Received command: 0x10000000
2,830,393 >>> mbox cmd response data (224 bytes)
2,830,394 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,830,423 UART: [fmc] Received command: 0x10000006
2,848,440 >>> mbox cmd response data (1536 bytes)
2,848,441 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,848,469 UART: [fmc] Received command: 0x46574C44
2,849,295 UART:
2,849,311 UART: Running Caliptra ROM ...
2,849,719 UART:
2,849,774 UART: [state] CFI Enabled
2,852,366 UART: [state] LifecycleState = Unprovisioned
2,853,021 UART: [state] DebugLocked = No
2,853,675 UART: [state] WD Timer not started. Device not locked for debugging
2,854,955 UART: [kat] SHA2-256
3,658,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,634 UART: [kat] ++
3,662,786 UART: [kat] sha1
3,667,112 UART: [kat] SHA2-256
3,669,052 UART: [kat] SHA2-384
3,671,745 UART: [kat] SHA2-512-ACC
3,673,645 UART: [kat] ECC-384
3,683,530 UART: [kat] HMAC-384Kdf
3,688,128 UART: [kat] LMS
3,936,440 UART: [kat] --
3,937,404 UART: [update-reset] ++
5,219,682 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,220,673 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,368,439 >>> mbox cmd response: success
5,368,794 UART: [update-reset] Copying MAN_2 To MAN_1
5,376,808 UART: [update-reset Success] --
5,377,217 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,377,657 UART: [state] Locking Datavault
5,378,403 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,007 UART: [state] Locking ICCM
5,379,607 UART: [exit] Launching FMC @ 0x40000000
5,384,904 UART:
5,384,920 UART: Running Caliptra FMC ...
5,385,328 UART:
5,385,550 UART: [fmc] Received command: 0x10000000
5,387,719 >>> mbox cmd response data (224 bytes)
5,387,720 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,387,749 UART: [fmc] Received command: 0x10000006
5,405,766 >>> mbox cmd response data (1536 bytes)
5,405,767 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,405,795 UART: [fmc] Received command: 0x10000007
5,406,587 >>> mbox cmd response data (4 bytes)
5,406,588 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,406,616 UART: [fmc] Received command: 0x10000006
5,424,633 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,690 >>> mbox cmd response: success
2,643,812 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,727 UART:
2,649,743 UART: Running Caliptra FMC ...
2,650,151 UART:
2,650,381 UART: [fmc] Received command: 0x10000000
2,652,550 >>> mbox cmd response data (224 bytes)
2,652,551 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,652,580 UART: [fmc] Received command: 0x10000006
2,670,597 >>> mbox cmd response data (1536 bytes)
2,670,598 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,670,626 UART: [fmc] Received command: 0x46574C44
5,071,937 >>> mbox cmd response: success
5,079,605 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,085,417 UART:
5,085,433 UART: Running Caliptra FMC ...
5,085,841 UART:
5,086,063 UART: [fmc] Received command: 0x10000000
5,088,232 >>> mbox cmd response data (224 bytes)
5,088,233 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,088,262 UART: [fmc] Received command: 0x10000006
5,106,279 >>> mbox cmd response data (1536 bytes)
5,106,280 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,106,308 UART: [fmc] Received command: 0x10000007
5,107,100 >>> mbox cmd response data (4 bytes)
5,107,101 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,107,129 UART: [fmc] Received command: 0x10000006
5,125,146 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
891,793 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,922 UART: [kat] ++
896,074 UART: [kat] sha1
900,324 UART: [kat] SHA2-256
902,264 UART: [kat] SHA2-384
904,871 UART: [kat] SHA2-512-ACC
906,772 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,325 UART: [kat] LMS
1,169,637 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,962 UART: [fht] FHT @ 0x50003400
1,173,670 UART: [idev] ++
1,173,838 UART: [idev] CDI.KEYID = 6
1,174,199 UART: [idev] SUBJECT.KEYID = 7
1,174,624 UART: [idev] UDS.KEYID = 0
1,182,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,791 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,343 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,098 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,279 >>> mbox cmd response: success
2,740,422 UART: [afmc] ++
2,740,590 UART: [afmc] CDI.KEYID = 6
2,740,953 UART: [afmc] SUBJECT.KEYID = 7
2,741,379 UART: [afmc] AUTHORITY.KEYID = 5
2,777,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,112 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,799,832 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,805,724 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,811,418 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,499 UART: [afmc] --
2,820,591 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,613 UART: [cold-reset] --
2,821,365 UART: [state] Locking Datavault
2,822,480 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,084 UART: [state] Locking ICCM
2,823,546 UART: [exit] Launching FMC @ 0x40000000
2,828,843 UART:
2,828,859 UART: Running Caliptra FMC ...
2,829,267 UART:
2,829,497 UART: [fmc] Received command: 0x10000000
2,831,666 >>> mbox cmd response data (224 bytes)
2,831,667 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,831,696 UART: [fmc] Received command: 0x10000006
2,849,713 >>> mbox cmd response data (1536 bytes)
2,849,714 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,849,742 UART: [fmc] Received command: 0x46574C44
2,850,568 UART:
2,850,584 UART: Running Caliptra ROM ...
2,850,992 UART:
2,851,134 UART: [state] CFI Enabled
2,854,224 UART: [state] LifecycleState = Unprovisioned
2,854,879 UART: [state] DebugLocked = No
2,855,419 UART: [state] WD Timer not started. Device not locked for debugging
2,856,641 UART: [kat] SHA2-256
3,660,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,320 UART: [kat] ++
3,664,472 UART: [kat] sha1
3,668,774 UART: [kat] SHA2-256
3,670,714 UART: [kat] SHA2-384
3,673,397 UART: [kat] SHA2-512-ACC
3,675,297 UART: [kat] ECC-384
3,685,270 UART: [kat] HMAC-384Kdf
3,689,682 UART: [kat] LMS
3,937,994 UART: [kat] --
3,938,770 UART: [update-reset] ++
5,221,844 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,222,871 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,370,637 >>> mbox cmd response: success
5,370,862 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,876 UART: [update-reset Success] --
5,379,285 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,379,801 UART: [state] Locking Datavault
5,380,619 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,223 UART: [state] Locking ICCM
5,381,793 UART: [exit] Launching FMC @ 0x40000000
5,387,090 UART:
5,387,106 UART: Running Caliptra FMC ...
5,387,514 UART:
5,387,736 UART: [fmc] Received command: 0x10000000
5,389,905 >>> mbox cmd response data (224 bytes)
5,389,906 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,389,935 UART: [fmc] Received command: 0x10000006
5,407,952 >>> mbox cmd response data (1536 bytes)
5,407,953 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,407,981 UART: [fmc] Received command: 0x10000007
5,408,773 >>> mbox cmd response data (4 bytes)
5,408,774 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,408,802 UART: [fmc] Received command: 0x10000006
5,426,819 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,627 >>> mbox cmd response: success
2,646,439 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,560 UART:
2,652,576 UART: Running Caliptra FMC ...
2,652,984 UART:
2,653,214 UART: [fmc] Received command: 0x10000000
2,655,383 >>> mbox cmd response data (224 bytes)
2,655,384 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,655,413 UART: [fmc] Received command: 0x10000006
2,673,430 >>> mbox cmd response data (1536 bytes)
2,673,431 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,673,459 UART: [fmc] Received command: 0x46574C44
5,075,717 >>> mbox cmd response: success
5,083,387 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,089,459 UART:
5,089,475 UART: Running Caliptra FMC ...
5,089,883 UART:
5,090,105 UART: [fmc] Received command: 0x10000000
5,092,274 >>> mbox cmd response data (224 bytes)
5,092,275 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,092,304 UART: [fmc] Received command: 0x10000006
5,110,321 >>> mbox cmd response data (1536 bytes)
5,110,322 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,110,350 UART: [fmc] Received command: 0x10000007
5,111,142 >>> mbox cmd response data (4 bytes)
5,111,143 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,111,171 UART: [fmc] Received command: 0x10000006
5,129,188 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,270 UART: [kat] SHA2-512-ACC
906,171 UART: [kat] ECC-384
915,568 UART: [kat] HMAC-384Kdf
920,096 UART: [kat] LMS
1,168,408 UART: [kat] --
1,169,571 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,647 UART: [idev] ++
1,172,815 UART: [idev] CDI.KEYID = 6
1,173,176 UART: [idev] SUBJECT.KEYID = 7
1,173,601 UART: [idev] UDS.KEYID = 0
1,181,457 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,363 UART: [idev] --
1,208,372 UART: [ldev] ++
1,208,540 UART: [ldev] CDI.KEYID = 6
1,208,904 UART: [ldev] SUBJECT.KEYID = 5
1,209,331 UART: [ldev] AUTHORITY.KEYID = 7
1,209,794 UART: [ldev] FE.KEYID = 1
1,215,020 UART: [ldev] Erasing FE.KEYID = 1
1,240,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,636 UART: [ldev] --
1,279,988 UART: [fwproc] Wait for Commands...
1,280,601 UART: [fwproc] Recv command 0x46574c44
1,281,334 UART: [fwproc] Recv'd Img size: 111752 bytes
2,548,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,575,565 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,736,708 >>> mbox cmd response: success
2,737,835 UART: [afmc] ++
2,738,003 UART: [afmc] CDI.KEYID = 6
2,738,366 UART: [afmc] SUBJECT.KEYID = 7
2,738,792 UART: [afmc] AUTHORITY.KEYID = 5
2,773,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,097 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,796,817 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,802,709 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,808,403 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,816,152 UART: [afmc] --
2,817,228 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,817,250 UART: [cold-reset] --
2,818,276 UART: [state] Locking Datavault
2,819,471 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,075 UART: [state] Locking ICCM
2,820,507 UART: [exit] Launching FMC @ 0x40000000
2,825,804 UART:
2,825,820 UART: Running Caliptra FMC ...
2,826,228 UART:
2,826,458 UART: [fmc] Received command: 0x10000000
2,828,627 >>> mbox cmd response data (224 bytes)
2,828,628 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,828,657 UART: [fmc] Received command: 0x10000006
2,846,674 >>> mbox cmd response data (1536 bytes)
2,846,675 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,846,703 UART: [fmc] Received command: 0x46574C44
2,847,529 UART:
2,847,545 UART: Running Caliptra ROM ...
2,847,953 UART:
2,848,008 UART: [state] CFI Enabled
2,850,968 UART: [state] LifecycleState = Unprovisioned
2,851,623 UART: [state] DebugLocked = No
2,852,203 UART: [state] WD Timer not started. Device not locked for debugging
2,853,515 UART: [kat] SHA2-256
3,657,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,661,194 UART: [kat] ++
3,661,346 UART: [kat] sha1
3,665,594 UART: [kat] SHA2-256
3,667,534 UART: [kat] SHA2-384
3,670,419 UART: [kat] SHA2-512-ACC
3,672,319 UART: [kat] ECC-384
3,682,048 UART: [kat] HMAC-384Kdf
3,686,828 UART: [kat] LMS
3,935,140 UART: [kat] --
3,936,196 UART: [update-reset] ++
5,220,338 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,221,355 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,369,121 >>> mbox cmd response: success
5,369,286 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,300 UART: [update-reset Success] --
5,377,709 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,378,303 UART: [state] Locking Datavault
5,379,037 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,641 UART: [state] Locking ICCM
5,380,067 UART: [exit] Launching FMC @ 0x40000000
5,385,364 UART:
5,385,380 UART: Running Caliptra FMC ...
5,385,788 UART:
5,386,010 UART: [fmc] Received command: 0x10000000
5,388,179 >>> mbox cmd response data (224 bytes)
5,388,180 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,388,209 UART: [fmc] Received command: 0x10000006
5,406,226 >>> mbox cmd response data (1536 bytes)
5,406,227 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,406,255 UART: [fmc] Received command: 0x10000007
5,407,047 >>> mbox cmd response data (4 bytes)
5,407,048 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,407,076 UART: [fmc] Received command: 0x10000006
5,425,093 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,586,352 >>> mbox cmd response: success
2,642,420 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,648,985 UART:
2,649,001 UART: Running Caliptra FMC ...
2,649,409 UART:
2,649,639 UART: [fmc] Received command: 0x10000000
2,651,808 >>> mbox cmd response data (224 bytes)
2,651,809 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,651,838 UART: [fmc] Received command: 0x10000006
2,669,855 >>> mbox cmd response data (1536 bytes)
2,669,856 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,669,884 UART: [fmc] Received command: 0x46574C44
5,071,279 >>> mbox cmd response: success
5,078,907 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,084,187 UART:
5,084,203 UART: Running Caliptra FMC ...
5,084,611 UART:
5,084,833 UART: [fmc] Received command: 0x10000000
5,087,002 >>> mbox cmd response data (224 bytes)
5,087,003 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,087,032 UART: [fmc] Received command: 0x10000006
5,105,049 >>> mbox cmd response data (1536 bytes)
5,105,050 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,105,078 UART: [fmc] Received command: 0x10000007
5,105,870 >>> mbox cmd response data (4 bytes)
5,105,871 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,105,899 UART: [fmc] Received command: 0x10000006
5,123,916 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,968 UART: [fht] FHT @ 0x50003400
1,173,584 UART: [idev] ++
1,173,752 UART: [idev] CDI.KEYID = 6
1,174,113 UART: [idev] SUBJECT.KEYID = 7
1,174,538 UART: [idev] UDS.KEYID = 0
1,182,760 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,208,944 UART: [idev] --
1,209,875 UART: [ldev] ++
1,210,043 UART: [ldev] CDI.KEYID = 6
1,210,407 UART: [ldev] SUBJECT.KEYID = 5
1,210,834 UART: [ldev] AUTHORITY.KEYID = 7
1,211,297 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,209 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,934 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,740,237 >>> mbox cmd response: success
2,741,418 UART: [afmc] ++
2,741,586 UART: [afmc] CDI.KEYID = 6
2,741,949 UART: [afmc] SUBJECT.KEYID = 7
2,742,375 UART: [afmc] AUTHORITY.KEYID = 5
2,777,863 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,010 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,800,730 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,806,622 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,812,316 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,819,977 UART: [afmc] --
2,821,051 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,073 UART: [cold-reset] --
2,821,927 UART: [state] Locking Datavault
2,823,180 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,784 UART: [state] Locking ICCM
2,824,282 UART: [exit] Launching FMC @ 0x40000000
2,829,579 UART:
2,829,595 UART: Running Caliptra FMC ...
2,830,003 UART:
2,830,233 UART: [fmc] Received command: 0x10000000
2,832,402 >>> mbox cmd response data (224 bytes)
2,832,403 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,832,432 UART: [fmc] Received command: 0x10000006
2,850,449 >>> mbox cmd response data (1536 bytes)
2,850,450 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,850,478 UART: [fmc] Received command: 0x46574C44
2,851,304 UART:
2,851,320 UART: Running Caliptra ROM ...
2,851,728 UART:
2,851,870 UART: [state] CFI Enabled
2,854,814 UART: [state] LifecycleState = Unprovisioned
2,855,469 UART: [state] DebugLocked = No
2,856,045 UART: [state] WD Timer not started. Device not locked for debugging
2,857,283 UART: [kat] SHA2-256
3,660,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,962 UART: [kat] ++
3,665,114 UART: [kat] sha1
3,669,152 UART: [kat] SHA2-256
3,671,092 UART: [kat] SHA2-384
3,673,831 UART: [kat] SHA2-512-ACC
3,675,731 UART: [kat] ECC-384
3,685,510 UART: [kat] HMAC-384Kdf
3,690,126 UART: [kat] LMS
3,938,438 UART: [kat] --
3,939,058 UART: [update-reset] ++
5,220,944 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,221,931 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,369,697 >>> mbox cmd response: success
5,369,804 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,818 UART: [update-reset Success] --
5,378,227 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,378,823 UART: [state] Locking Datavault
5,379,607 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,211 UART: [state] Locking ICCM
5,380,677 UART: [exit] Launching FMC @ 0x40000000
5,385,974 UART:
5,385,990 UART: Running Caliptra FMC ...
5,386,398 UART:
5,386,620 UART: [fmc] Received command: 0x10000000
5,388,789 >>> mbox cmd response data (224 bytes)
5,388,790 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,388,819 UART: [fmc] Received command: 0x10000006
5,406,836 >>> mbox cmd response data (1536 bytes)
5,406,837 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,406,865 UART: [fmc] Received command: 0x10000007
5,407,657 >>> mbox cmd response data (4 bytes)
5,407,658 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,407,686 UART: [fmc] Received command: 0x10000006
5,425,703 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,097 >>> mbox cmd response: success
2,645,657 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,996 UART:
2,652,012 UART: Running Caliptra FMC ...
2,652,420 UART:
2,652,650 UART: [fmc] Received command: 0x10000000
2,654,819 >>> mbox cmd response data (224 bytes)
2,654,820 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,654,849 UART: [fmc] Received command: 0x10000006
2,672,866 >>> mbox cmd response data (1536 bytes)
2,672,867 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,672,895 UART: [fmc] Received command: 0x46574C44
5,074,765 >>> mbox cmd response: success
5,082,327 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,088,323 UART:
5,088,339 UART: Running Caliptra FMC ...
5,088,747 UART:
5,088,969 UART: [fmc] Received command: 0x10000000
5,091,138 >>> mbox cmd response data (224 bytes)
5,091,139 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,091,168 UART: [fmc] Received command: 0x10000006
5,109,185 >>> mbox cmd response data (1536 bytes)
5,109,186 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,109,214 UART: [fmc] Received command: 0x10000007
5,110,006 >>> mbox cmd response data (4 bytes)
5,110,007 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,110,035 UART: [fmc] Received command: 0x10000006
5,128,052 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
2,058,870 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,199,920 UART:
2,200,338 UART: Running Caliptra ROM ...
2,201,514 UART:
2,201,693 UART: [state] CFI Enabled
2,202,656 UART: [state] LifecycleState = Unprovisioned
2,204,313 UART: [state] DebugLocked = No
2,205,415 UART: [state] WD Timer not started. Device not locked for debugging
2,207,883 UART: [kat] SHA2-256
2,208,550 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,211,562 UART: [kat] ++
2,212,009 UART: [kat] sha1
2,212,528 UART: [kat] SHA2-256
2,213,262 UART: [kat] SHA2-384
2,213,926 UART: [kat] SHA2-512-ACC
2,214,803 UART: [kat] ECC-384
3,772,744 UART: [kat] HMAC-384Kdf
3,800,222 UART: [kat] LMS
4,873,331 UART: [kat] --
4,877,975 UART: [cold-reset] ++
4,880,665 UART: [fht] FHT @ 0x50003400
4,891,804 UART: [idev] ++
4,892,475 UART: [idev] CDI.KEYID = 6
4,893,633 UART: [idev] SUBJECT.KEYID = 7
4,894,840 UART: [idev] UDS.KEYID = 0
4,926,497 UART: [idev] Erasing UDS.KEYID = 0
8,239,175 UART: [idev] Sha1 KeyId Algorithm
8,260,897 UART: [idev] --
8,266,077 UART: [ldev] ++
8,266,705 UART: [ldev] CDI.KEYID = 6
8,267,814 UART: [ldev] SUBJECT.KEYID = 5
8,269,028 UART: [ldev] AUTHORITY.KEYID = 7
8,270,183 UART: [ldev] FE.KEYID = 1
8,315,493 UART: [ldev] Erasing FE.KEYID = 1
11,649,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,988,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,007,468 UART: [ldev] --
14,011,601 UART: [fwproc] Wait for Commands...
14,014,288 UART: [fwproc] Recv command 0x46574c44
14,016,548 UART: [fwproc] Recv'd Img size: 111408 bytes
18,057,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,132,867 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,193,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,509,520 >>> mbox cmd response: success
18,513,030 UART: [afmc] ++
18,513,615 UART: [afmc] CDI.KEYID = 6
18,514,755 UART: [afmc] SUBJECT.KEYID = 7
18,515,951 UART: [afmc] AUTHORITY.KEYID = 5
21,881,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,178,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,181,242 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,197,340 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,213,369 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,229,284 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,250,795 UART: [afmc] --
24,253,530 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,253,906 UART: [cold-reset] --
24,255,742 UART: [state] Locking Datavault
24,261,314 UART: [state] Locking PCR0, PCR1 and PCR31
24,263,016 UART: [state] Locking ICCM
24,265,041 UART: [exit] Launching FMC @ 0x40000000
24,273,654 UART:
24,274,094 UART: Running Caliptra FMC ...
24,275,147 UART:
24,275,297 UART: [fmc] Received command: 0x10000000
24,277,593 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,056,801 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,293,281 >>> mbox cmd response: success
23,965,508 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,981,551 UART:
23,981,895 UART: Running Caliptra FMC ...
23,983,078 UART:
23,983,247 UART: [fmc] Received command: 0x10000000
23,985,526 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,060,244 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,201,220 UART:
2,201,630 UART: Running Caliptra ROM ...
2,202,712 UART:
2,202,859 UART: [state] CFI Enabled
2,203,772 UART: [state] LifecycleState = Unprovisioned
2,205,431 UART: [state] DebugLocked = No
2,206,452 UART: [state] WD Timer not started. Device not locked for debugging
2,208,919 UART: [kat] SHA2-256
2,209,581 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,602 UART: [kat] ++
2,213,070 UART: [kat] sha1
2,213,578 UART: [kat] SHA2-256
2,214,318 UART: [kat] SHA2-384
2,214,979 UART: [kat] SHA2-512-ACC
2,215,802 UART: [kat] ECC-384
4,100,073 UART: [kat] HMAC-384Kdf
4,112,727 UART: [kat] LMS
5,185,874 UART: [kat] --
5,192,117 UART: [cold-reset] ++
5,194,658 UART: [fht] FHT @ 0x50003400
5,206,823 UART: [idev] ++
5,207,547 UART: [idev] CDI.KEYID = 6
5,208,724 UART: [idev] SUBJECT.KEYID = 7
5,210,215 UART: [idev] UDS.KEYID = 0
5,229,320 UART: [idev] Erasing UDS.KEYID = 0
8,501,660 UART: [idev] Sha1 KeyId Algorithm
8,522,532 UART: [idev] --
8,526,284 UART: [ldev] ++
8,526,909 UART: [ldev] CDI.KEYID = 6
8,528,086 UART: [ldev] SUBJECT.KEYID = 5
8,529,574 UART: [ldev] AUTHORITY.KEYID = 7
8,531,129 UART: [ldev] FE.KEYID = 1
8,543,385 UART: [ldev] Erasing FE.KEYID = 1
11,834,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,508 UART: [ldev] --
14,199,514 UART: [fwproc] Wait for Commands...
14,201,114 UART: [fwproc] Recv command 0x46574c44
14,203,435 UART: [fwproc] Recv'd Img size: 111408 bytes
18,241,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
18,314,448 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,374,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,690,783 >>> mbox cmd response: success
18,694,987 UART: [afmc] ++
18,695,580 UART: [afmc] CDI.KEYID = 6
18,696,818 UART: [afmc] SUBJECT.KEYID = 7
18,697,920 UART: [afmc] AUTHORITY.KEYID = 5
22,009,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,304,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,306,584 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
24,322,654 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
24,338,710 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
24,354,633 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
24,377,046 UART: [afmc] --
24,381,096 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,381,487 UART: [cold-reset] --
24,385,269 UART: [state] Locking Datavault
24,391,648 UART: [state] Locking PCR0, PCR1 and PCR31
24,393,346 UART: [state] Locking ICCM
24,396,030 UART: [exit] Launching FMC @ 0x40000000
24,404,641 UART:
24,404,868 UART: Running Caliptra FMC ...
24,405,963 UART:
24,406,119 UART: [fmc] Received command: 0x10000000
24,408,603 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
2,062,461 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,492,311 >>> mbox cmd response: success
24,116,245 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
24,130,013 UART:
24,130,360 UART: Running Caliptra FMC ...
24,131,543 UART:
24,131,703 UART: [fmc] Received command: 0x10000000
24,133,925 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
2,064,379 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,205,782 UART:
2,206,202 UART: Running Caliptra ROM ...
2,207,390 UART:
2,207,558 UART: [state] CFI Enabled
2,208,536 UART: [state] LifecycleState = Unprovisioned
2,210,179 UART: [state] DebugLocked = No
2,211,287 UART: [state] WD Timer not started. Device not locked for debugging
2,213,761 UART: [kat] SHA2-256
2,214,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,442 UART: [kat] ++
2,217,893 UART: [kat] sha1
2,218,405 UART: [kat] SHA2-256
2,219,262 UART: [kat] SHA2-384
2,219,930 UART: [kat] SHA2-512-ACC
2,220,731 UART: [kat] ECC-384
2,949,495 UART: [kat] HMAC-384Kdf
2,973,170 UART: [kat] LMS
3,502,615 UART: [kat] --
3,505,366 UART: [cold-reset] ++
3,507,959 UART: [fht] FHT @ 0x50003400
3,518,836 UART: [idev] ++
3,519,443 UART: [idev] CDI.KEYID = 6
3,520,370 UART: [idev] SUBJECT.KEYID = 7
3,521,542 UART: [idev] UDS.KEYID = 0
3,545,504 UART: [idev] Erasing UDS.KEYID = 0
6,025,210 UART: [idev] Sha1 KeyId Algorithm
6,048,850 UART: [idev] --
6,053,751 UART: [ldev] ++
6,054,335 UART: [ldev] CDI.KEYID = 6
6,055,222 UART: [ldev] SUBJECT.KEYID = 5
6,056,443 UART: [ldev] AUTHORITY.KEYID = 7
6,057,679 UART: [ldev] FE.KEYID = 1
6,101,647 UART: [ldev] Erasing FE.KEYID = 1
8,604,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,617 UART: [ldev] --
10,414,766 UART: [fwproc] Wait for Commands...
10,416,873 UART: [fwproc] Recv command 0x46574c44
10,418,969 UART: [fwproc] Recv'd Img size: 111752 bytes
13,790,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,860,701 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,921,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,238,814 >>> mbox cmd response: success
14,243,546 UART: [afmc] ++
14,244,136 UART: [afmc] CDI.KEYID = 6
14,245,044 UART: [afmc] SUBJECT.KEYID = 7
14,246,264 UART: [afmc] AUTHORITY.KEYID = 5
16,786,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,033 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,529,038 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,545,032 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,560,787 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,582,387 UART: [afmc] --
18,586,378 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,586,754 UART: [cold-reset] --
18,590,755 UART: [state] Locking Datavault
18,593,462 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,105 UART: [state] Locking ICCM
18,597,579 UART: [exit] Launching FMC @ 0x40000000
18,605,977 UART:
18,606,213 UART: Running Caliptra FMC ...
18,607,318 UART:
18,607,499 UART: [fmc] Received command: 0x10000000
18,609,909 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,060,043 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,005,543 >>> mbox cmd response: success
18,287,918 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,302,265 UART:
18,302,605 UART: Running Caliptra FMC ...
18,303,778 UART:
18,303,944 UART: [fmc] Received command: 0x10000000
18,306,281 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,060,248 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,201,692 UART:
2,202,108 UART: Running Caliptra ROM ...
2,203,190 UART:
2,203,344 UART: [state] CFI Enabled
2,204,432 UART: [state] LifecycleState = Unprovisioned
2,206,078 UART: [state] DebugLocked = No
2,207,105 UART: [state] WD Timer not started. Device not locked for debugging
2,209,574 UART: [kat] SHA2-256
2,210,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,246 UART: [kat] ++
2,213,695 UART: [kat] sha1
2,214,204 UART: [kat] SHA2-256
2,214,941 UART: [kat] SHA2-384
2,215,624 UART: [kat] SHA2-512-ACC
2,216,463 UART: [kat] ECC-384
3,284,779 UART: [kat] HMAC-384Kdf
3,297,939 UART: [kat] LMS
3,827,462 UART: [kat] --
3,833,338 UART: [cold-reset] ++
3,835,427 UART: [fht] FHT @ 0x50003400
3,847,585 UART: [idev] ++
3,848,342 UART: [idev] CDI.KEYID = 6
3,849,228 UART: [idev] SUBJECT.KEYID = 7
3,850,274 UART: [idev] UDS.KEYID = 0
3,868,540 UART: [idev] Erasing UDS.KEYID = 0
6,322,498 UART: [idev] Sha1 KeyId Algorithm
6,345,067 UART: [idev] --
6,349,847 UART: [ldev] ++
6,350,419 UART: [ldev] CDI.KEYID = 6
6,351,376 UART: [ldev] SUBJECT.KEYID = 5
6,352,535 UART: [ldev] AUTHORITY.KEYID = 7
6,353,763 UART: [ldev] FE.KEYID = 1
6,364,296 UART: [ldev] Erasing FE.KEYID = 1
8,838,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,146 UART: [ldev] --
10,626,454 UART: [fwproc] Wait for Commands...
10,628,276 UART: [fwproc] Recv command 0x46574c44
10,630,372 UART: [fwproc] Recv'd Img size: 111752 bytes
14,002,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,078,974 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,139,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,457,382 >>> mbox cmd response: success
14,460,929 UART: [afmc] ++
14,461,510 UART: [afmc] CDI.KEYID = 6
14,462,390 UART: [afmc] SUBJECT.KEYID = 7
14,463,599 UART: [afmc] AUTHORITY.KEYID = 5
16,961,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,684,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,685,928 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,701,920 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,717,900 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,733,711 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,755,918 UART: [afmc] --
18,759,620 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,760,035 UART: [cold-reset] --
18,764,475 UART: [state] Locking Datavault
18,769,451 UART: [state] Locking PCR0, PCR1 and PCR31
18,771,167 UART: [state] Locking ICCM
18,773,373 UART: [exit] Launching FMC @ 0x40000000
18,781,762 UART:
18,781,992 UART: Running Caliptra FMC ...
18,783,091 UART:
18,783,245 UART: [fmc] Received command: 0x10000000
18,785,677 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
2,061,273 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,221,826 >>> mbox cmd response: success
18,456,921 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,471,931 UART:
18,472,277 UART: Running Caliptra FMC ...
18,473,461 UART:
18,473,627 UART: [fmc] Received command: 0x10000000
18,475,959 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,057,668 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,199,157 UART:
2,199,566 UART: Running Caliptra ROM ...
2,200,739 UART:
2,200,912 UART: [state] CFI Enabled
2,201,839 UART: [state] LifecycleState = Unprovisioned
2,203,500 UART: [state] DebugLocked = No
2,204,612 UART: [state] WD Timer not started. Device not locked for debugging
2,207,088 UART: [kat] SHA2-256
2,207,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,773 UART: [kat] ++
2,211,223 UART: [kat] sha1
2,211,762 UART: [kat] SHA2-256
2,212,422 UART: [kat] SHA2-384
2,213,077 UART: [kat] SHA2-512-ACC
2,213,878 UART: [kat] ECC-384
2,946,855 UART: [kat] HMAC-384Kdf
2,972,377 UART: [kat] LMS
3,501,856 UART: [kat] --
3,505,900 UART: [cold-reset] ++
3,508,208 UART: [fht] FHT @ 0x50003400
3,520,152 UART: [idev] ++
3,520,742 UART: [idev] CDI.KEYID = 6
3,521,626 UART: [idev] SUBJECT.KEYID = 7
3,522,845 UART: [idev] UDS.KEYID = 0
3,544,141 UART: [idev] Erasing UDS.KEYID = 0
6,025,031 UART: [idev] Sha1 KeyId Algorithm
6,047,894 UART: [idev] --
6,052,435 UART: [ldev] ++
6,053,009 UART: [ldev] CDI.KEYID = 6
6,053,921 UART: [ldev] SUBJECT.KEYID = 5
6,055,083 UART: [ldev] AUTHORITY.KEYID = 7
6,056,316 UART: [ldev] FE.KEYID = 1
6,099,262 UART: [ldev] Erasing FE.KEYID = 1
8,602,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,602 UART: [ldev] --
10,412,918 UART: [fwproc] Wait for Commands...
10,415,013 UART: [fwproc] Recv command 0x46574c44
10,417,108 UART: [fwproc] Recv'd Img size: 111752 bytes
13,787,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,862,059 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,922,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,239,902 >>> mbox cmd response: success
14,244,314 UART: [afmc] ++
14,244,897 UART: [afmc] CDI.KEYID = 6
14,245,806 UART: [afmc] SUBJECT.KEYID = 7
14,247,016 UART: [afmc] AUTHORITY.KEYID = 5
16,782,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,394 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,526,409 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,542,338 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,558,094 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,579,741 UART: [afmc] --
18,583,889 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,584,483 UART: [cold-reset] --
18,588,655 UART: [state] Locking Datavault
18,595,253 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,961 UART: [state] Locking ICCM
18,598,516 UART: [exit] Launching FMC @ 0x40000000
18,606,910 UART:
18,607,146 UART: Running Caliptra FMC ...
18,608,245 UART:
18,608,400 UART: [fmc] Received command: 0x10000000
18,610,807 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
2,072,122 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,001,899 >>> mbox cmd response: success
18,285,149 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,300,959 UART:
18,301,298 UART: Running Caliptra FMC ...
18,302,395 UART:
18,302,546 UART: [fmc] Received command: 0x10000000
18,304,988 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,060,430 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,201,795 UART:
2,202,198 UART: Running Caliptra ROM ...
2,203,392 UART:
2,203,567 UART: [state] CFI Enabled
2,204,547 UART: [state] LifecycleState = Unprovisioned
2,206,188 UART: [state] DebugLocked = No
2,207,294 UART: [state] WD Timer not started. Device not locked for debugging
2,209,769 UART: [kat] SHA2-256
2,210,438 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,449 UART: [kat] ++
2,213,899 UART: [kat] sha1
2,214,413 UART: [kat] SHA2-256
2,215,154 UART: [kat] SHA2-384
2,215,817 UART: [kat] SHA2-512-ACC
2,216,700 UART: [kat] ECC-384
3,280,221 UART: [kat] HMAC-384Kdf
3,292,442 UART: [kat] LMS
3,821,932 UART: [kat] --
3,827,092 UART: [cold-reset] ++
3,829,565 UART: [fht] FHT @ 0x50003400
3,840,486 UART: [idev] ++
3,841,054 UART: [idev] CDI.KEYID = 6
3,841,974 UART: [idev] SUBJECT.KEYID = 7
3,843,185 UART: [idev] UDS.KEYID = 0
3,862,619 UART: [idev] Erasing UDS.KEYID = 0
6,317,119 UART: [idev] Sha1 KeyId Algorithm
6,339,955 UART: [idev] --
6,342,248 UART: [ldev] ++
6,342,822 UART: [ldev] CDI.KEYID = 6
6,343,727 UART: [ldev] SUBJECT.KEYID = 5
6,344,881 UART: [ldev] AUTHORITY.KEYID = 7
6,346,165 UART: [ldev] FE.KEYID = 1
6,357,354 UART: [ldev] Erasing FE.KEYID = 1
8,828,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,790 UART: [ldev] --
10,620,214 UART: [fwproc] Wait for Commands...
10,623,443 UART: [fwproc] Recv command 0x46574c44
10,625,538 UART: [fwproc] Recv'd Img size: 111752 bytes
13,996,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,066,813 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,127,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,445,084 >>> mbox cmd response: success
14,449,249 UART: [afmc] ++
14,449,829 UART: [afmc] CDI.KEYID = 6
14,450,717 UART: [afmc] SUBJECT.KEYID = 7
14,451,927 UART: [afmc] AUTHORITY.KEYID = 5
16,955,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,677,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,679,235 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,695,244 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,711,181 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,726,953 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,749,941 UART: [afmc] --
18,753,276 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,753,648 UART: [cold-reset] --
18,757,329 UART: [state] Locking Datavault
18,763,053 UART: [state] Locking PCR0, PCR1 and PCR31
18,764,699 UART: [state] Locking ICCM
18,767,441 UART: [exit] Launching FMC @ 0x40000000
18,775,839 UART:
18,776,079 UART: Running Caliptra FMC ...
18,777,184 UART:
18,777,357 UART: [fmc] Received command: 0x10000000
18,779,788 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,061,888 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,233,913 >>> mbox cmd response: success
18,467,863 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,481,760 UART:
18,482,104 UART: Running Caliptra FMC ...
18,483,330 UART:
18,483,498 UART: [fmc] Received command: 0x10000000
18,485,763 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,664 UART: [state] LifecycleState = Unprovisioned
85,319 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,206 UART: [kat] SHA2-256
890,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,885 UART: [kat] ++
895,037 UART: [kat] sha1
899,075 UART: [kat] SHA2-256
901,015 UART: [kat] SHA2-384
903,814 UART: [kat] SHA2-512-ACC
905,715 UART: [kat] ECC-384
914,970 UART: [kat] HMAC-384Kdf
919,494 UART: [kat] LMS
1,167,806 UART: [kat] --
1,168,645 UART: [cold-reset] ++
1,169,129 UART: [fht] FHT @ 0x50003400
1,171,727 UART: [idev] ++
1,171,895 UART: [idev] CDI.KEYID = 6
1,172,256 UART: [idev] SUBJECT.KEYID = 7
1,172,681 UART: [idev] UDS.KEYID = 0
1,180,583 UART: [idev] Erasing UDS.KEYID = 0
1,197,823 UART: [idev] Sha1 KeyId Algorithm
1,206,689 UART: [idev] --
1,207,780 UART: [ldev] ++
1,207,948 UART: [ldev] CDI.KEYID = 6
1,208,312 UART: [ldev] SUBJECT.KEYID = 5
1,208,739 UART: [ldev] AUTHORITY.KEYID = 7
1,209,202 UART: [ldev] FE.KEYID = 1
1,214,482 UART: [ldev] Erasing FE.KEYID = 1
1,240,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,210 UART: [ldev] --
1,279,618 UART: [fwproc] Wait for Commands...
1,280,427 UART: [fwproc] Recv command 0x46574c44
1,281,160 UART: [fwproc] Recv'd Img size: 111752 bytes
2,548,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,575,443 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,736,684 >>> mbox cmd response: success
2,737,781 UART: [afmc] ++
2,737,949 UART: [afmc] CDI.KEYID = 6
2,738,312 UART: [afmc] SUBJECT.KEYID = 7
2,738,738 UART: [afmc] AUTHORITY.KEYID = 5
2,774,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,402 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,797,108 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,802,995 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,808,714 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,816,500 UART: [afmc] --
2,817,486 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,817,508 UART: [cold-reset] --
2,818,374 UART: [state] Locking Datavault
2,819,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,455 UART: [state] Locking ICCM
2,821,099 UART: [exit] Launching FMC @ 0x40000000
2,826,396 UART:
2,826,412 UART: Running Caliptra FMC ...
2,826,820 UART:
2,827,050 UART: [fmc] Received command: 0x10000000
2,829,219 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,190 >>> mbox cmd response: success
2,644,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,650,428 UART:
2,650,444 UART: Running Caliptra FMC ...
2,650,852 UART:
2,651,082 UART: [fmc] Received command: 0x10000000
2,653,251 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,472 UART: [idev] ++
1,173,640 UART: [idev] CDI.KEYID = 6
1,174,001 UART: [idev] SUBJECT.KEYID = 7
1,174,426 UART: [idev] UDS.KEYID = 0
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,916 UART: [idev] Sha1 KeyId Algorithm
1,208,862 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,525 UART: [ldev] SUBJECT.KEYID = 5
1,210,952 UART: [ldev] AUTHORITY.KEYID = 7
1,211,415 UART: [ldev] FE.KEYID = 1
1,216,417 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,691 UART: [ldev] --
1,283,075 UART: [fwproc] Wait for Commands...
1,283,730 UART: [fwproc] Recv command 0x46574c44
1,284,463 UART: [fwproc] Recv'd Img size: 111752 bytes
2,552,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,478 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,163 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,651 >>> mbox cmd response: success
2,740,708 UART: [afmc] ++
2,740,876 UART: [afmc] CDI.KEYID = 6
2,741,239 UART: [afmc] SUBJECT.KEYID = 7
2,741,665 UART: [afmc] AUTHORITY.KEYID = 5
2,777,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,591 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,297 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,184 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,811,903 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,709 UART: [afmc] --
2,820,585 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,607 UART: [cold-reset] --
2,821,209 UART: [state] Locking Datavault
2,822,274 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,878 UART: [state] Locking ICCM
2,823,500 UART: [exit] Launching FMC @ 0x40000000
2,828,797 UART:
2,828,813 UART: Running Caliptra FMC ...
2,829,221 UART:
2,829,451 UART: [fmc] Received command: 0x10000000
2,831,620 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,233 >>> mbox cmd response: success
2,644,808 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,195 UART:
2,651,211 UART: Running Caliptra FMC ...
2,651,619 UART:
2,651,849 UART: [fmc] Received command: 0x10000000
2,654,018 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,394 UART: [kat] LMS
1,168,706 UART: [kat] --
1,169,563 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,613 UART: [idev] ++
1,172,781 UART: [idev] CDI.KEYID = 6
1,173,142 UART: [idev] SUBJECT.KEYID = 7
1,173,567 UART: [idev] UDS.KEYID = 0
1,181,701 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] --
1,208,806 UART: [ldev] ++
1,208,974 UART: [ldev] CDI.KEYID = 6
1,209,338 UART: [ldev] SUBJECT.KEYID = 5
1,209,765 UART: [ldev] AUTHORITY.KEYID = 7
1,210,228 UART: [ldev] FE.KEYID = 1
1,215,698 UART: [ldev] Erasing FE.KEYID = 1
1,242,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,286 UART: [ldev] --
1,281,726 UART: [fwproc] Wait for Commands...
1,282,323 UART: [fwproc] Recv command 0x46574c44
1,283,056 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,695 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,928 >>> mbox cmd response: success
2,741,163 UART: [afmc] ++
2,741,331 UART: [afmc] CDI.KEYID = 6
2,741,694 UART: [afmc] SUBJECT.KEYID = 7
2,742,120 UART: [afmc] AUTHORITY.KEYID = 5
2,777,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,236 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,942 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,829 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,812,548 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,820,460 UART: [afmc] --
2,821,384 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,821,406 UART: [cold-reset] --
2,822,144 UART: [state] Locking Datavault
2,823,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,761 UART: [state] Locking ICCM
2,824,369 UART: [exit] Launching FMC @ 0x40000000
2,829,666 UART:
2,829,682 UART: Running Caliptra FMC ...
2,830,090 UART:
2,830,320 UART: [fmc] Received command: 0x10000000
2,832,489 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,528 >>> mbox cmd response: success
2,642,739 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,649,040 UART:
2,649,056 UART: Running Caliptra FMC ...
2,649,464 UART:
2,649,694 UART: [fmc] Received command: 0x10000000
2,651,863 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,238 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
891,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,054 UART: [kat] ++
896,206 UART: [kat] sha1
900,332 UART: [kat] SHA2-256
902,272 UART: [kat] SHA2-384
904,835 UART: [kat] SHA2-512-ACC
906,736 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,181 UART: [kat] LMS
1,169,493 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,552 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,037 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,656 UART: [fwproc] Recv command 0x46574c44
1,283,389 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,578,188 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,873 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,457 >>> mbox cmd response: success
2,740,622 UART: [afmc] ++
2,740,790 UART: [afmc] CDI.KEYID = 6
2,741,153 UART: [afmc] SUBJECT.KEYID = 7
2,741,579 UART: [afmc] AUTHORITY.KEYID = 5
2,777,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,523 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,229 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,806,116 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,811,835 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,711 UART: [afmc] --
2,820,571 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,593 UART: [cold-reset] --
2,821,397 UART: [state] Locking Datavault
2,822,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,478 UART: [state] Locking ICCM
2,823,908 UART: [exit] Launching FMC @ 0x40000000
2,829,205 UART:
2,829,221 UART: Running Caliptra FMC ...
2,829,629 UART:
2,829,859 UART: [fmc] Received command: 0x10000000
2,832,028 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,973 >>> mbox cmd response: success
2,646,060 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,017 UART:
2,652,033 UART: Running Caliptra FMC ...
2,652,441 UART:
2,652,671 UART: [fmc] Received command: 0x10000000
2,654,840 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,334 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,198,823 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,242,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,136 UART: [ldev] --
1,281,628 UART: [fwproc] Wait for Commands...
1,282,225 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,901 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,276 >>> mbox cmd response: success
2,740,535 UART: [afmc] ++
2,740,703 UART: [afmc] CDI.KEYID = 6
2,741,066 UART: [afmc] SUBJECT.KEYID = 7
2,741,492 UART: [afmc] AUTHORITY.KEYID = 5
2,777,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,390 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,096 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,805,983 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,811,702 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,588 UART: [afmc] --
2,820,610 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,632 UART: [cold-reset] --
2,821,398 UART: [state] Locking Datavault
2,822,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,909 UART: [state] Locking ICCM
2,823,573 UART: [exit] Launching FMC @ 0x40000000
2,828,870 UART:
2,828,886 UART: Running Caliptra FMC ...
2,829,294 UART:
2,829,524 UART: [fmc] Received command: 0x10000000
2,831,693 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,930 >>> mbox cmd response: success
2,646,017 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,651,984 UART:
2,652,000 UART: Running Caliptra FMC ...
2,652,408 UART:
2,652,638 UART: [fmc] Received command: 0x10000000
2,654,807 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,930 UART: [kat] SHA2-256
901,870 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,169,816 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,181,716 UART: [idev] Erasing UDS.KEYID = 0
1,198,510 UART: [idev] Sha1 KeyId Algorithm
1,207,466 UART: [idev] --
1,208,461 UART: [ldev] ++
1,208,629 UART: [ldev] CDI.KEYID = 6
1,208,993 UART: [ldev] SUBJECT.KEYID = 5
1,209,420 UART: [ldev] AUTHORITY.KEYID = 7
1,209,883 UART: [ldev] FE.KEYID = 1
1,215,279 UART: [ldev] Erasing FE.KEYID = 1
1,241,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,106 UART: [fwproc] Recv command 0x46574c44
1,282,839 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,577,953 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,190 >>> mbox cmd response: success
2,740,265 UART: [afmc] ++
2,740,433 UART: [afmc] CDI.KEYID = 6
2,740,796 UART: [afmc] SUBJECT.KEYID = 7
2,741,222 UART: [afmc] AUTHORITY.KEYID = 5
2,777,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,406 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,800,112 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,805,999 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,811,718 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,819,568 UART: [afmc] --
2,820,630 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,820,652 UART: [cold-reset] --
2,821,572 UART: [state] Locking Datavault
2,822,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,233 UART: [state] Locking ICCM
2,823,753 UART: [exit] Launching FMC @ 0x40000000
2,829,050 UART:
2,829,066 UART: Running Caliptra FMC ...
2,829,474 UART:
2,829,704 UART: [fmc] Received command: 0x10000000
2,831,873 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,587 >>> mbox cmd response: success
2,647,054 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,652,963 UART:
2,652,979 UART: Running Caliptra FMC ...
2,653,387 UART:
2,653,617 UART: [fmc] Received command: 0x10000000
2,655,786 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
2,055,963 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,197,578 UART:
2,198,009 UART: Running Caliptra ROM ...
2,199,149 UART:
2,199,320 UART: [state] CFI Enabled
2,200,224 UART: [state] LifecycleState = Unprovisioned
2,201,880 UART: [state] DebugLocked = No
2,202,990 UART: [state] WD Timer not started. Device not locked for debugging
2,205,465 UART: [kat] SHA2-256
2,206,135 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,143 UART: [kat] ++
2,209,598 UART: [kat] sha1
2,210,115 UART: [kat] SHA2-256
2,210,855 UART: [kat] SHA2-384
2,211,520 UART: [kat] SHA2-512-ACC
2,212,348 UART: [kat] ECC-384
3,774,460 UART: [kat] HMAC-384Kdf
3,801,302 UART: [kat] LMS
4,874,429 UART: [kat] --
4,880,541 UART: [cold-reset] ++
4,883,318 UART: [fht] FHT @ 0x50003400
4,893,604 UART: [idev] ++
4,894,277 UART: [idev] CDI.KEYID = 6
4,895,511 UART: [idev] SUBJECT.KEYID = 7
4,896,664 UART: [idev] UDS.KEYID = 0
4,928,631 UART: [idev] Erasing UDS.KEYID = 0
8,240,267 UART: [idev] Sha1 KeyId Algorithm
8,262,106 UART: [idev] --
8,266,427 UART: [ldev] ++
8,266,998 UART: [ldev] CDI.KEYID = 6
8,268,234 UART: [ldev] SUBJECT.KEYID = 5
8,269,332 UART: [ldev] AUTHORITY.KEYID = 7
8,270,611 UART: [ldev] FE.KEYID = 1
8,317,522 UART: [ldev] Erasing FE.KEYID = 1
11,652,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,719 UART: [ldev] --
14,037,149 UART: [fwproc] Wait for Commands...
14,040,380 UART: [fwproc] Recv command 0x46574c44
14,042,651 UART: [fwproc] Recv'd Img size: 111408 bytes
22,347,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,427,477 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,487,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,803,874 >>> mbox cmd response: success
22,807,541 UART: [afmc] ++
22,808,240 UART: [afmc] CDI.KEYID = 6
22,809,494 UART: [afmc] SUBJECT.KEYID = 7
22,810,599 UART: [afmc] AUTHORITY.KEYID = 5
26,187,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,485,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,487,762 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,503,957 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,520,081 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,536,044 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,558,248 UART: [afmc] --
28,561,267 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,561,652 UART: [cold-reset] --
28,565,503 UART: [state] Locking Datavault
28,571,186 UART: [state] Locking PCR0, PCR1 and PCR31
28,572,834 UART: [state] Locking ICCM
28,575,306 UART: [exit] Launching FMC @ 0x40000000
28,583,916 UART:
28,584,166 UART: Running Caliptra FMC ...
28,585,264 UART:
28,585,418 UART: [fmc] Received command: 0x10000000
28,587,904 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
2,055,447 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
22,603,071 >>> mbox cmd response: success
28,274,290 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,290,521 UART:
28,290,878 UART: Running Caliptra FMC ...
28,292,065 UART:
28,292,233 UART: [fmc] Received command: 0x10000000
28,294,456 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,061,293 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,202,362 UART:
2,202,799 UART: Running Caliptra ROM ...
2,203,966 UART:
2,204,134 UART: [state] CFI Enabled
2,205,110 UART: [state] LifecycleState = Unprovisioned
2,206,760 UART: [state] DebugLocked = No
2,207,825 UART: [state] WD Timer not started. Device not locked for debugging
2,210,301 UART: [kat] SHA2-256
2,210,963 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,971 UART: [kat] ++
2,214,417 UART: [kat] sha1
2,214,923 UART: [kat] SHA2-256
2,215,656 UART: [kat] SHA2-384
2,216,336 UART: [kat] SHA2-512-ACC
2,217,217 UART: [kat] ECC-384
4,094,814 UART: [kat] HMAC-384Kdf
4,106,979 UART: [kat] LMS
5,180,141 UART: [kat] --
5,183,475 UART: [cold-reset] ++
5,185,475 UART: [fht] FHT @ 0x50003400
5,196,773 UART: [idev] ++
5,197,509 UART: [idev] CDI.KEYID = 6
5,198,685 UART: [idev] SUBJECT.KEYID = 7
5,200,164 UART: [idev] UDS.KEYID = 0
5,214,776 UART: [idev] Erasing UDS.KEYID = 0
8,487,639 UART: [idev] Sha1 KeyId Algorithm
8,509,783 UART: [idev] --
8,512,200 UART: [ldev] ++
8,512,786 UART: [ldev] CDI.KEYID = 6
8,513,965 UART: [ldev] SUBJECT.KEYID = 5
8,515,441 UART: [ldev] AUTHORITY.KEYID = 7
8,516,920 UART: [ldev] FE.KEYID = 1
8,526,864 UART: [ldev] Erasing FE.KEYID = 1
11,815,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,107,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,123,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,139,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,155,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,176,583 UART: [ldev] --
14,181,737 UART: [fwproc] Wait for Commands...
14,184,568 UART: [fwproc] Recv command 0x46574c44
14,186,894 UART: [fwproc] Recv'd Img size: 111408 bytes
22,357,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
22,436,542 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,496,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,812,812 >>> mbox cmd response: success
22,817,779 UART: [afmc] ++
22,818,474 UART: [afmc] CDI.KEYID = 6
22,819,713 UART: [afmc] SUBJECT.KEYID = 7
22,820,871 UART: [afmc] AUTHORITY.KEYID = 5
26,136,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,431,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,433,168 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
28,449,336 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
28,465,436 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
28,481,371 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
28,505,028 UART: [afmc] --
28,509,207 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,509,589 UART: [cold-reset] --
28,515,257 UART: [state] Locking Datavault
28,521,203 UART: [state] Locking PCR0, PCR1 and PCR31
28,522,862 UART: [state] Locking ICCM
28,524,631 UART: [exit] Launching FMC @ 0x40000000
28,533,233 UART:
28,533,462 UART: Running Caliptra FMC ...
28,534,557 UART:
28,534,707 UART: [fmc] Received command: 0x10000000
28,537,184 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
2,066,749 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
22,518,056 >>> mbox cmd response: success
28,133,599 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
28,149,251 UART:
28,149,584 UART: Running Caliptra FMC ...
28,150,759 UART:
28,150,918 UART: [fmc] Received command: 0x10000000
28,153,188 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,057,256 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,198,754 UART:
2,199,192 UART: Running Caliptra ROM ...
2,200,371 UART:
2,200,570 UART: [state] CFI Enabled
2,201,549 UART: [state] LifecycleState = Unprovisioned
2,203,192 UART: [state] DebugLocked = No
2,204,299 UART: [state] WD Timer not started. Device not locked for debugging
2,206,773 UART: [kat] SHA2-256
2,207,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,453 UART: [kat] ++
2,210,903 UART: [kat] sha1
2,211,498 UART: [kat] SHA2-256
2,212,161 UART: [kat] SHA2-384
2,212,818 UART: [kat] SHA2-512-ACC
2,213,701 UART: [kat] ECC-384
2,949,017 UART: [kat] HMAC-384Kdf
2,972,557 UART: [kat] LMS
3,502,018 UART: [kat] --
3,504,170 UART: [cold-reset] ++
3,506,153 UART: [fht] FHT @ 0x50003400
3,516,481 UART: [idev] ++
3,517,051 UART: [idev] CDI.KEYID = 6
3,518,213 UART: [idev] SUBJECT.KEYID = 7
3,519,245 UART: [idev] UDS.KEYID = 0
3,545,718 UART: [idev] Erasing UDS.KEYID = 0
6,029,004 UART: [idev] Sha1 KeyId Algorithm
6,051,180 UART: [idev] --
6,054,476 UART: [ldev] ++
6,055,057 UART: [ldev] CDI.KEYID = 6
6,055,995 UART: [ldev] SUBJECT.KEYID = 5
6,057,044 UART: [ldev] AUTHORITY.KEYID = 7
6,058,392 UART: [ldev] FE.KEYID = 1
6,100,496 UART: [ldev] Erasing FE.KEYID = 1
8,603,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,656 UART: [ldev] --
10,413,677 UART: [fwproc] Wait for Commands...
10,416,476 UART: [fwproc] Recv command 0x46574c44
10,418,518 UART: [fwproc] Recv'd Img size: 111752 bytes
14,924,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,000,572 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,060,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,377,876 >>> mbox cmd response: success
15,382,543 UART: [afmc] ++
15,383,157 UART: [afmc] CDI.KEYID = 6
15,384,092 UART: [afmc] SUBJECT.KEYID = 7
15,385,206 UART: [afmc] AUTHORITY.KEYID = 5
17,913,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,639,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,641,805 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,657,727 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,673,674 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,689,474 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,712,708 UART: [afmc] --
19,716,830 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,717,251 UART: [cold-reset] --
19,721,197 UART: [state] Locking Datavault
19,726,823 UART: [state] Locking PCR0, PCR1 and PCR31
19,728,537 UART: [state] Locking ICCM
19,730,448 UART: [exit] Launching FMC @ 0x40000000
19,738,848 UART:
19,739,101 UART: Running Caliptra FMC ...
19,740,212 UART:
19,740,378 UART: [fmc] Received command: 0x10000000
19,742,818 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,072,289 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,001,199 >>> mbox cmd response: success
19,280,942 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,295,489 UART:
19,295,820 UART: Running Caliptra FMC ...
19,296,995 UART:
19,297,165 UART: [fmc] Received command: 0x10000000
19,299,554 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,060,338 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,201,683 UART:
2,202,087 UART: Running Caliptra ROM ...
2,203,179 UART:
2,203,336 UART: [state] CFI Enabled
2,204,320 UART: [state] LifecycleState = Unprovisioned
2,205,975 UART: [state] DebugLocked = No
2,207,004 UART: [state] WD Timer not started. Device not locked for debugging
2,209,476 UART: [kat] SHA2-256
2,210,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,149 UART: [kat] ++
2,213,593 UART: [kat] sha1
2,214,105 UART: [kat] SHA2-256
2,214,762 UART: [kat] SHA2-384
2,215,416 UART: [kat] SHA2-512-ACC
2,216,431 UART: [kat] ECC-384
3,284,083 UART: [kat] HMAC-384Kdf
3,296,753 UART: [kat] LMS
3,826,192 UART: [kat] --
3,830,938 UART: [cold-reset] ++
3,833,302 UART: [fht] FHT @ 0x50003400
3,844,758 UART: [idev] ++
3,845,324 UART: [idev] CDI.KEYID = 6
3,846,334 UART: [idev] SUBJECT.KEYID = 7
3,847,436 UART: [idev] UDS.KEYID = 0
3,862,440 UART: [idev] Erasing UDS.KEYID = 0
6,317,458 UART: [idev] Sha1 KeyId Algorithm
6,340,048 UART: [idev] --
6,345,041 UART: [ldev] ++
6,345,621 UART: [ldev] CDI.KEYID = 6
6,346,534 UART: [ldev] SUBJECT.KEYID = 5
6,347,658 UART: [ldev] AUTHORITY.KEYID = 7
6,348,944 UART: [ldev] FE.KEYID = 1
6,359,156 UART: [ldev] Erasing FE.KEYID = 1
8,832,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,385 UART: [ldev] --
10,623,540 UART: [fwproc] Wait for Commands...
10,625,312 UART: [fwproc] Recv command 0x46574c44
10,627,402 UART: [fwproc] Recv'd Img size: 111752 bytes
15,167,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,240,878 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,301,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,619,023 >>> mbox cmd response: success
15,624,101 UART: [afmc] ++
15,624,699 UART: [afmc] CDI.KEYID = 6
15,625,609 UART: [afmc] SUBJECT.KEYID = 7
15,626,770 UART: [afmc] AUTHORITY.KEYID = 5
18,124,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,844,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,846,795 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,862,880 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,878,821 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,894,573 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,918,323 UART: [afmc] --
19,922,831 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,923,215 UART: [cold-reset] --
19,926,843 UART: [state] Locking Datavault
19,932,190 UART: [state] Locking PCR0, PCR1 and PCR31
19,933,831 UART: [state] Locking ICCM
19,936,271 UART: [exit] Launching FMC @ 0x40000000
19,944,669 UART:
19,944,921 UART: Running Caliptra FMC ...
19,945,947 UART:
19,946,093 UART: [fmc] Received command: 0x10000000
19,948,585 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,062,891 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,205,796 >>> mbox cmd response: success
19,434,614 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,454,060 UART:
19,454,428 UART: Running Caliptra FMC ...
19,455,620 UART:
19,455,790 UART: [fmc] Received command: 0x10000000
19,458,091 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,060,274 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,201,565 UART:
2,201,996 UART: Running Caliptra ROM ...
2,203,083 UART:
2,203,241 UART: [state] CFI Enabled
2,204,222 UART: [state] LifecycleState = Unprovisioned
2,205,871 UART: [state] DebugLocked = No
2,206,896 UART: [state] WD Timer not started. Device not locked for debugging
2,209,613 UART: [kat] SHA2-256
2,210,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,306 UART: [kat] ++
2,213,760 UART: [kat] sha1
2,214,272 UART: [kat] SHA2-256
2,214,930 UART: [kat] SHA2-384
2,215,585 UART: [kat] SHA2-512-ACC
2,216,408 UART: [kat] ECC-384
2,950,636 UART: [kat] HMAC-384Kdf
2,971,452 UART: [kat] LMS
3,500,925 UART: [kat] --
3,505,618 UART: [cold-reset] ++
3,506,859 UART: [fht] FHT @ 0x50003400
3,517,870 UART: [idev] ++
3,518,431 UART: [idev] CDI.KEYID = 6
3,519,313 UART: [idev] SUBJECT.KEYID = 7
3,520,529 UART: [idev] UDS.KEYID = 0
3,543,158 UART: [idev] Erasing UDS.KEYID = 0
6,024,325 UART: [idev] Sha1 KeyId Algorithm
6,048,127 UART: [idev] --
6,053,181 UART: [ldev] ++
6,053,764 UART: [ldev] CDI.KEYID = 6
6,054,651 UART: [ldev] SUBJECT.KEYID = 5
6,055,891 UART: [ldev] AUTHORITY.KEYID = 7
6,057,134 UART: [ldev] FE.KEYID = 1
6,099,466 UART: [ldev] Erasing FE.KEYID = 1
8,604,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,562 UART: [ldev] --
10,413,861 UART: [fwproc] Wait for Commands...
10,416,612 UART: [fwproc] Recv command 0x46574c44
10,418,656 UART: [fwproc] Recv'd Img size: 111752 bytes
14,969,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,045,847 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,106,138 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,423,784 >>> mbox cmd response: success
15,427,867 UART: [afmc] ++
15,428,456 UART: [afmc] CDI.KEYID = 6
15,429,366 UART: [afmc] SUBJECT.KEYID = 7
15,430,579 UART: [afmc] AUTHORITY.KEYID = 5
17,957,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,684,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,686,840 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,702,946 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,718,879 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,734,670 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,757,138 UART: [afmc] --
19,761,285 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,761,683 UART: [cold-reset] --
19,765,362 UART: [state] Locking Datavault
19,771,738 UART: [state] Locking PCR0, PCR1 and PCR31
19,773,381 UART: [state] Locking ICCM
19,774,554 UART: [exit] Launching FMC @ 0x40000000
19,782,902 UART:
19,783,144 UART: Running Caliptra FMC ...
19,784,245 UART:
19,784,404 UART: [fmc] Received command: 0x10000000
19,786,875 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,058,472 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,998,247 >>> mbox cmd response: success
19,264,116 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,279,715 UART:
19,280,060 UART: Running Caliptra FMC ...
19,281,171 UART:
19,281,321 UART: [fmc] Received command: 0x10000000
19,283,736 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,063,720 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,205,085 UART:
2,205,507 UART: Running Caliptra ROM ...
2,206,697 UART:
2,206,871 UART: [state] CFI Enabled
2,207,851 UART: [state] LifecycleState = Unprovisioned
2,209,502 UART: [state] DebugLocked = No
2,210,607 UART: [state] WD Timer not started. Device not locked for debugging
2,213,090 UART: [kat] SHA2-256
2,213,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,216,786 UART: [kat] ++
2,217,239 UART: [kat] sha1
2,217,752 UART: [kat] SHA2-256
2,218,492 UART: [kat] SHA2-384
2,219,155 UART: [kat] SHA2-512-ACC
2,219,992 UART: [kat] ECC-384
3,278,014 UART: [kat] HMAC-384Kdf
3,290,087 UART: [kat] LMS
3,819,558 UART: [kat] --
3,824,812 UART: [cold-reset] ++
3,826,477 UART: [fht] FHT @ 0x50003400
3,838,328 UART: [idev] ++
3,838,890 UART: [idev] CDI.KEYID = 6
3,839,795 UART: [idev] SUBJECT.KEYID = 7
3,841,009 UART: [idev] UDS.KEYID = 0
3,859,636 UART: [idev] Erasing UDS.KEYID = 0
6,311,858 UART: [idev] Sha1 KeyId Algorithm
6,335,091 UART: [idev] --
6,339,342 UART: [ldev] ++
6,339,956 UART: [ldev] CDI.KEYID = 6
6,340,850 UART: [ldev] SUBJECT.KEYID = 5
6,342,007 UART: [ldev] AUTHORITY.KEYID = 7
6,343,248 UART: [ldev] FE.KEYID = 1
6,353,277 UART: [ldev] Erasing FE.KEYID = 1
8,826,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,648 UART: [ldev] --
10,617,627 UART: [fwproc] Wait for Commands...
10,620,483 UART: [fwproc] Recv command 0x46574c44
10,622,585 UART: [fwproc] Recv'd Img size: 111752 bytes
15,164,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,244,455 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,304,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,621,686 >>> mbox cmd response: success
15,625,848 UART: [afmc] ++
15,626,436 UART: [afmc] CDI.KEYID = 6
15,627,347 UART: [afmc] SUBJECT.KEYID = 7
15,628,558 UART: [afmc] AUTHORITY.KEYID = 5
18,130,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,850,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,852,694 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,868,745 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,884,727 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,900,519 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,923,105 UART: [afmc] --
19,925,999 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,926,370 UART: [cold-reset] --
19,930,637 UART: [state] Locking Datavault
19,936,796 UART: [state] Locking PCR0, PCR1 and PCR31
19,938,443 UART: [state] Locking ICCM
19,939,729 UART: [exit] Launching FMC @ 0x40000000
19,948,124 UART:
19,948,352 UART: Running Caliptra FMC ...
19,949,445 UART:
19,949,622 UART: [fmc] Received command: 0x10000000
19,952,058 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,062,287 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,187,310 >>> mbox cmd response: success
19,422,675 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,439,125 UART:
19,439,468 UART: Running Caliptra FMC ...
19,440,576 UART:
19,440,729 UART: [fmc] Received command: 0x10000000
19,443,174 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,719 UART: [kat] ++
895,871 UART: [kat] sha1
900,289 UART: [kat] SHA2-256
902,229 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
921,170 UART: [kat] LMS
1,169,482 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,095 UART: [fht] FHT @ 0x50003400
1,173,515 UART: [idev] ++
1,173,683 UART: [idev] CDI.KEYID = 6
1,174,044 UART: [idev] SUBJECT.KEYID = 7
1,174,469 UART: [idev] UDS.KEYID = 0
1,182,571 UART: [idev] Erasing UDS.KEYID = 0
1,199,917 UART: [idev] Sha1 KeyId Algorithm
1,208,905 UART: [idev] --
1,209,752 UART: [ldev] ++
1,209,920 UART: [ldev] CDI.KEYID = 6
1,210,284 UART: [ldev] SUBJECT.KEYID = 5
1,210,711 UART: [ldev] AUTHORITY.KEYID = 7
1,211,174 UART: [ldev] FE.KEYID = 1
1,216,212 UART: [ldev] Erasing FE.KEYID = 1
1,243,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,424 UART: [ldev] --
1,282,940 UART: [fwproc] Wait for Commands...
1,283,549 UART: [fwproc] Recv command 0x46574c44
1,284,282 UART: [fwproc] Recv'd Img size: 111752 bytes
3,091,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,117,991 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,143,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,279,176 >>> mbox cmd response: success
3,280,315 UART: [afmc] ++
3,280,483 UART: [afmc] CDI.KEYID = 6
3,280,846 UART: [afmc] SUBJECT.KEYID = 7
3,281,272 UART: [afmc] AUTHORITY.KEYID = 5
3,316,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,333,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,333,948 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,339,651 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,345,533 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,351,239 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,358,923 UART: [afmc] --
3,359,901 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,359,923 UART: [cold-reset] --
3,360,803 UART: [state] Locking Datavault
3,362,070 UART: [state] Locking PCR0, PCR1 and PCR31
3,362,674 UART: [state] Locking ICCM
3,363,206 UART: [exit] Launching FMC @ 0x40000000
3,368,503 UART:
3,368,519 UART: Running Caliptra FMC ...
3,368,927 UART:
3,369,157 UART: [fmc] Received command: 0x10000000
3,371,326 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,139,785 >>> mbox cmd response: success
3,195,818 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,201,831 UART:
3,201,847 UART: Running Caliptra FMC ...
3,202,255 UART:
3,202,485 UART: [fmc] Received command: 0x10000000
3,204,654 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,307 UART: [kat] SHA2-256
891,857 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,294 UART: [kat] SHA2-256
902,234 UART: [kat] SHA2-384
905,039 UART: [kat] SHA2-512-ACC
906,940 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,275 UART: [kat] LMS
1,169,587 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,724 UART: [idev] Sha1 KeyId Algorithm
1,208,424 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,025 UART: [ldev] --
1,282,473 UART: [fwproc] Wait for Commands...
1,283,250 UART: [fwproc] Recv command 0x46574c44
1,283,983 UART: [fwproc] Recv'd Img size: 111752 bytes
3,106,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,134,168 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,159,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,295,451 >>> mbox cmd response: success
3,296,696 UART: [afmc] ++
3,296,864 UART: [afmc] CDI.KEYID = 6
3,297,227 UART: [afmc] SUBJECT.KEYID = 7
3,297,653 UART: [afmc] AUTHORITY.KEYID = 5
3,333,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,350,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,351,015 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,356,718 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,362,600 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,368,306 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,376,036 UART: [afmc] --
3,376,956 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,376,978 UART: [cold-reset] --
3,377,808 UART: [state] Locking Datavault
3,378,807 UART: [state] Locking PCR0, PCR1 and PCR31
3,379,411 UART: [state] Locking ICCM
3,379,969 UART: [exit] Launching FMC @ 0x40000000
3,385,266 UART:
3,385,282 UART: Running Caliptra FMC ...
3,385,690 UART:
3,385,920 UART: [fmc] Received command: 0x10000000
3,388,089 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,137,264 >>> mbox cmd response: success
3,193,481 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,199,370 UART:
3,199,386 UART: Running Caliptra FMC ...
3,199,794 UART:
3,200,024 UART: [fmc] Received command: 0x10000000
3,202,193 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
921,036 UART: [kat] LMS
1,169,348 UART: [kat] --
1,170,285 UART: [cold-reset] ++
1,170,787 UART: [fht] FHT @ 0x50003400
1,173,601 UART: [idev] ++
1,173,769 UART: [idev] CDI.KEYID = 6
1,174,130 UART: [idev] SUBJECT.KEYID = 7
1,174,555 UART: [idev] UDS.KEYID = 0
1,182,743 UART: [idev] Erasing UDS.KEYID = 0
1,200,403 UART: [idev] Sha1 KeyId Algorithm
1,209,107 UART: [idev] --
1,210,202 UART: [ldev] ++
1,210,370 UART: [ldev] CDI.KEYID = 6
1,210,734 UART: [ldev] SUBJECT.KEYID = 5
1,211,161 UART: [ldev] AUTHORITY.KEYID = 7
1,211,624 UART: [ldev] FE.KEYID = 1
1,216,612 UART: [ldev] Erasing FE.KEYID = 1
1,243,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,522 UART: [ldev] --
1,283,028 UART: [fwproc] Wait for Commands...
1,283,771 UART: [fwproc] Recv command 0x46574c44
1,284,504 UART: [fwproc] Recv'd Img size: 111752 bytes
3,086,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,114,495 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,140,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,275,710 >>> mbox cmd response: success
3,276,731 UART: [afmc] ++
3,276,899 UART: [afmc] CDI.KEYID = 6
3,277,262 UART: [afmc] SUBJECT.KEYID = 7
3,277,688 UART: [afmc] AUTHORITY.KEYID = 5
3,312,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,329,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,329,834 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,335,537 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,341,419 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,347,125 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,355,061 UART: [afmc] --
3,355,971 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,355,993 UART: [cold-reset] --
3,356,721 UART: [state] Locking Datavault
3,357,762 UART: [state] Locking PCR0, PCR1 and PCR31
3,358,366 UART: [state] Locking ICCM
3,358,824 UART: [exit] Launching FMC @ 0x40000000
3,364,121 UART:
3,364,137 UART: Running Caliptra FMC ...
3,364,545 UART:
3,364,775 UART: [fmc] Received command: 0x10000000
3,366,944 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,140,643 >>> mbox cmd response: success
3,196,578 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,202,321 UART:
3,202,337 UART: Running Caliptra FMC ...
3,202,745 UART:
3,202,975 UART: [fmc] Received command: 0x10000000
3,205,144 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,887 UART: [kat] LMS
1,169,199 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,182,096 UART: [idev] Erasing UDS.KEYID = 0
1,198,888 UART: [idev] Sha1 KeyId Algorithm
1,207,710 UART: [idev] --
1,208,791 UART: [ldev] ++
1,208,959 UART: [ldev] CDI.KEYID = 6
1,209,323 UART: [ldev] SUBJECT.KEYID = 5
1,209,750 UART: [ldev] AUTHORITY.KEYID = 7
1,210,213 UART: [ldev] FE.KEYID = 1
1,215,333 UART: [ldev] Erasing FE.KEYID = 1
1,241,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,245 UART: [ldev] --
1,280,547 UART: [fwproc] Wait for Commands...
1,281,238 UART: [fwproc] Recv command 0x46574c44
1,281,971 UART: [fwproc] Recv'd Img size: 111752 bytes
3,099,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,127,170 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,855 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,288,343 >>> mbox cmd response: success
3,289,536 UART: [afmc] ++
3,289,704 UART: [afmc] CDI.KEYID = 6
3,290,067 UART: [afmc] SUBJECT.KEYID = 7
3,290,493 UART: [afmc] AUTHORITY.KEYID = 5
3,326,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,342,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,343,039 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,348,742 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,354,624 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,360,330 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,368,138 UART: [afmc] --
3,369,018 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,369,040 UART: [cold-reset] --
3,369,898 UART: [state] Locking Datavault
3,371,035 UART: [state] Locking PCR0, PCR1 and PCR31
3,371,639 UART: [state] Locking ICCM
3,372,297 UART: [exit] Launching FMC @ 0x40000000
3,377,594 UART:
3,377,610 UART: Running Caliptra FMC ...
3,378,018 UART:
3,378,248 UART: [fmc] Received command: 0x10000000
3,380,417 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,137,924 >>> mbox cmd response: success
3,194,509 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,200,596 UART:
3,200,612 UART: Running Caliptra FMC ...
3,201,020 UART:
3,201,250 UART: [fmc] Received command: 0x10000000
3,203,419 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,150 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,330 UART: [ldev] --
1,280,690 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 111752 bytes
3,086,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,114,396 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,140,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,275,565 >>> mbox cmd response: success
3,276,802 UART: [afmc] ++
3,276,970 UART: [afmc] CDI.KEYID = 6
3,277,333 UART: [afmc] SUBJECT.KEYID = 7
3,277,759 UART: [afmc] AUTHORITY.KEYID = 5
3,312,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,329,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,329,947 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,335,650 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,341,532 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,347,238 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,354,936 UART: [afmc] --
3,355,950 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,355,972 UART: [cold-reset] --
3,356,756 UART: [state] Locking Datavault
3,358,089 UART: [state] Locking PCR0, PCR1 and PCR31
3,358,693 UART: [state] Locking ICCM
3,359,143 UART: [exit] Launching FMC @ 0x40000000
3,364,440 UART:
3,364,456 UART: Running Caliptra FMC ...
3,364,864 UART:
3,365,094 UART: [fmc] Received command: 0x10000000
3,367,263 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,125,249 >>> mbox cmd response: success
3,180,794 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,187,025 UART:
3,187,041 UART: Running Caliptra FMC ...
3,187,449 UART:
3,187,679 UART: [fmc] Received command: 0x10000000
3,189,848 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,202 UART: [state] WD Timer not started. Device not locked for debugging
88,433 UART: [kat] SHA2-256
891,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,112 UART: [kat] ++
896,264 UART: [kat] sha1
900,512 UART: [kat] SHA2-256
902,452 UART: [kat] SHA2-384
905,191 UART: [kat] SHA2-512-ACC
907,092 UART: [kat] ECC-384
916,923 UART: [kat] HMAC-384Kdf
921,417 UART: [kat] LMS
1,169,729 UART: [kat] --
1,170,878 UART: [cold-reset] ++
1,171,416 UART: [fht] FHT @ 0x50003400
1,174,090 UART: [idev] ++
1,174,258 UART: [idev] CDI.KEYID = 6
1,174,619 UART: [idev] SUBJECT.KEYID = 7
1,175,044 UART: [idev] UDS.KEYID = 0
1,183,244 UART: [idev] Erasing UDS.KEYID = 0
1,200,208 UART: [idev] Sha1 KeyId Algorithm
1,209,068 UART: [idev] --
1,210,025 UART: [ldev] ++
1,210,193 UART: [ldev] CDI.KEYID = 6
1,210,557 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,243,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,899 UART: [ldev] --
1,282,163 UART: [fwproc] Wait for Commands...
1,282,940 UART: [fwproc] Recv command 0x46574c44
1,283,673 UART: [fwproc] Recv'd Img size: 111752 bytes
3,092,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,120,425 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,146,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,281,586 >>> mbox cmd response: success
3,282,759 UART: [afmc] ++
3,282,927 UART: [afmc] CDI.KEYID = 6
3,283,290 UART: [afmc] SUBJECT.KEYID = 7
3,283,716 UART: [afmc] AUTHORITY.KEYID = 5
3,319,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,336,356 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,342,059 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,347,941 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,353,647 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,361,237 UART: [afmc] --
3,362,277 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,362,299 UART: [cold-reset] --
3,363,135 UART: [state] Locking Datavault
3,364,292 UART: [state] Locking PCR0, PCR1 and PCR31
3,364,896 UART: [state] Locking ICCM
3,365,436 UART: [exit] Launching FMC @ 0x40000000
3,370,733 UART:
3,370,749 UART: Running Caliptra FMC ...
3,371,157 UART:
3,371,387 UART: [fmc] Received command: 0x10000000
3,373,556 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,133,887 >>> mbox cmd response: success
3,190,162 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,196,395 UART:
3,196,411 UART: Running Caliptra FMC ...
3,196,819 UART:
3,197,049 UART: [fmc] Received command: 0x10000000
3,199,218 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
2,214,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,215,808 UART:
2,216,069 UART: Running Caliptra ROM ...
2,217,141 UART:
2,217,296 UART: [state] CFI Enabled
2,218,164 UART: [state] LifecycleState = Unprovisioned
2,219,831 UART: [state] DebugLocked = No
2,220,948 UART: [state] WD Timer not started. Device not locked for debugging
2,223,435 UART: [kat] SHA2-256
2,224,100 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,227,114 UART: [kat] ++
2,227,564 UART: [kat] sha1
2,228,080 UART: [kat] SHA2-256
2,228,737 UART: [kat] SHA2-384
2,229,445 UART: [kat] SHA2-512-ACC
2,230,338 UART: [kat] ECC-384
3,776,889 UART: [kat] HMAC-384Kdf
3,789,500 UART: [kat] LMS
4,862,653 UART: [kat] --
4,867,850 UART: [cold-reset] ++
4,870,004 UART: [fht] FHT @ 0x50003400
4,880,609 UART: [idev] ++
4,881,279 UART: [idev] CDI.KEYID = 6
4,882,512 UART: [idev] SUBJECT.KEYID = 7
4,883,612 UART: [idev] UDS.KEYID = 0
4,916,057 UART: [idev] Erasing UDS.KEYID = 0
8,228,929 UART: [idev] Sha1 KeyId Algorithm
8,251,301 UART: [idev] --
8,256,377 UART: [ldev] ++
8,257,002 UART: [ldev] CDI.KEYID = 6
8,258,210 UART: [ldev] SUBJECT.KEYID = 5
8,259,366 UART: [ldev] AUTHORITY.KEYID = 7
8,260,597 UART: [ldev] FE.KEYID = 1
8,305,144 UART: [ldev] Erasing FE.KEYID = 1
11,637,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,951,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,967,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,983,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,999,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,019,955 UART: [ldev] --
14,025,483 UART: [fwproc] Wait for Commands...
14,027,341 UART: [fwproc] Recv command 0x4d454153
14,036,081 >>> mbox cmd response data (12 bytes)
14,036,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,038,382 UART: [fwproc] Recv command 0x4d454153
14,047,367 >>> mbox cmd response data (12 bytes)
14,047,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,048,547 UART: [fwproc] Recv command 0x4d454153
14,057,472 >>> mbox cmd response data (12 bytes)
14,057,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,058,686 UART: [fwproc] Recv command 0x4d454153
14,067,559 >>> mbox cmd response data (12 bytes)
14,067,978 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,068,821 UART: [fwproc] Recv command 0x4d454153
14,077,736 >>> mbox cmd response data (12 bytes)
14,078,164 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,079,329 UART: [fwproc] Recv command 0x4d454153
14,088,254 >>> mbox cmd response data (12 bytes)
14,088,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,090,492 UART: [fwproc] Recv command 0x4d454153
14,099,354 >>> mbox cmd response data (12 bytes)
14,099,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,101,132 UART: [fwproc] Recv command 0x4d454153
14,110,022 >>> mbox cmd response data (12 bytes)
14,111,741 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
14,251,874 UART: [fwproc] Recv command 0x46574c44
14,254,213 UART: [fwproc] Recv'd Img size: 111408 bytes
18,280,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,353,208 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,413,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,729,651 >>> mbox cmd response: success
18,734,104 UART: [afmc] ++
18,734,690 UART: [afmc] CDI.KEYID = 6
18,735,928 UART: [afmc] SUBJECT.KEYID = 7
18,737,028 UART: [afmc] AUTHORITY.KEYID = 5
22,102,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,400,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,402,749 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,418,911 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,435,016 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,450,831 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,472,250 UART: [afmc] --
24,475,573 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,475,936 UART: [cold-reset] --
24,479,129 UART: [state] Locking Datavault
24,485,295 UART: [state] Locking PCR0, PCR1 and PCR31
24,486,931 UART: [state] Locking ICCM
24,488,216 UART: [exit] Launching FMC @ 0x40000000
24,496,829 UART:
24,497,065 UART: Running Caliptra FMC ...
24,498,166 UART:
24,498,326 UART: [fmc] Received command: 0x1000000A
24,504,863 >>> mbox cmd response data (928 bytes)
24,510,289 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,510,768 UART: [fmc] Received command: 0x10000009
24,512,580 >>> mbox cmd response data (48 bytes)
24,514,781 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,515,253 UART: [fmc] Received command: 0x10000003
24,525,172 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,215,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,847,948 >>> mbox cmd response data (12 bytes)
13,848,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,857,105 >>> mbox cmd response data (12 bytes)
13,857,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,865,323 >>> mbox cmd response data (12 bytes)
13,865,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,872,856 >>> mbox cmd response data (12 bytes)
13,873,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,881,362 >>> mbox cmd response data (12 bytes)
13,881,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,888,936 >>> mbox cmd response data (12 bytes)
13,889,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,896,678 >>> mbox cmd response data (12 bytes)
13,897,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,905,470 >>> mbox cmd response data (12 bytes)
13,907,352 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,523,485 >>> mbox cmd response: success
24,212,943 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,225,915 UART:
24,226,251 UART: Running Caliptra FMC ...
24,227,326 UART:
24,227,474 UART: [fmc] Received command: 0x1000000A
24,233,955 >>> mbox cmd response data (928 bytes)
24,239,160 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,239,601 UART: [fmc] Received command: 0x10000009
24,241,374 >>> mbox cmd response data (48 bytes)
24,243,529 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,244,002 UART: [fmc] Received command: 0x10000003
24,253,939 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,219,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,220,492 UART:
2,220,742 UART: Running Caliptra ROM ...
2,221,804 UART:
2,221,950 UART: [state] CFI Enabled
2,222,811 UART: [state] LifecycleState = Unprovisioned
2,224,497 UART: [state] DebugLocked = No
2,225,579 UART: [state] WD Timer not started. Device not locked for debugging
2,228,060 UART: [kat] SHA2-256
2,228,732 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,231,736 UART: [kat] ++
2,232,180 UART: [kat] sha1
2,232,686 UART: [kat] SHA2-256
2,233,422 UART: [kat] SHA2-384
2,234,079 UART: [kat] SHA2-512-ACC
2,235,056 UART: [kat] ECC-384
4,096,345 UART: [kat] HMAC-384Kdf
4,109,053 UART: [kat] LMS
5,182,199 UART: [kat] --
5,185,403 UART: [cold-reset] ++
5,186,742 UART: [fht] FHT @ 0x50003400
5,199,633 UART: [idev] ++
5,200,294 UART: [idev] CDI.KEYID = 6
5,201,470 UART: [idev] SUBJECT.KEYID = 7
5,202,956 UART: [idev] UDS.KEYID = 0
5,219,346 UART: [idev] Erasing UDS.KEYID = 0
8,489,813 UART: [idev] Sha1 KeyId Algorithm
8,511,089 UART: [idev] --
8,516,031 UART: [ldev] ++
8,516,615 UART: [ldev] CDI.KEYID = 6
8,517,793 UART: [ldev] SUBJECT.KEYID = 5
8,519,278 UART: [ldev] AUTHORITY.KEYID = 7
8,520,828 UART: [ldev] FE.KEYID = 1
8,532,496 UART: [ldev] Erasing FE.KEYID = 1
11,822,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,144,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,160,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,810 UART: [ldev] --
14,185,900 UART: [fwproc] Wait for Commands...
14,189,122 UART: [fwproc] Recv command 0x4d454153
14,198,128 >>> mbox cmd response data (12 bytes)
14,198,732 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,199,430 UART: [fwproc] Recv command 0x4d454153
14,208,392 >>> mbox cmd response data (12 bytes)
14,208,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,209,858 UART: [fwproc] Recv command 0x4d454153
14,218,765 >>> mbox cmd response data (12 bytes)
14,219,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,220,865 UART: [fwproc] Recv command 0x4d454153
14,229,449 >>> mbox cmd response data (12 bytes)
14,229,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,230,575 UART: [fwproc] Recv command 0x4d454153
14,239,154 >>> mbox cmd response data (12 bytes)
14,239,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,240,833 UART: [fwproc] Recv command 0x4d454153
14,249,429 >>> mbox cmd response data (12 bytes)
14,249,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,251,854 UART: [fwproc] Recv command 0x4d454153
14,260,445 >>> mbox cmd response data (12 bytes)
14,260,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,261,488 UART: [fwproc] Recv command 0x4d454153
14,270,081 >>> mbox cmd response data (12 bytes)
14,271,760 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
14,411,920 UART: [fwproc] Recv command 0x46574c44
14,414,093 UART: [fwproc] Recv'd Img size: 111408 bytes
18,456,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,534,471 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,594,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,909,993 >>> mbox cmd response: success
18,914,651 UART: [afmc] ++
18,915,155 UART: [afmc] CDI.KEYID = 6
18,916,341 UART: [afmc] SUBJECT.KEYID = 7
18,917,465 UART: [afmc] AUTHORITY.KEYID = 5
22,232,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,527,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,529,999 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,546,170 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,562,305 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,578,122 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,601,510 UART: [afmc] --
24,604,954 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,605,343 UART: [cold-reset] --
24,608,422 UART: [state] Locking Datavault
24,614,796 UART: [state] Locking PCR0, PCR1 and PCR31
24,616,430 UART: [state] Locking ICCM
24,618,400 UART: [exit] Launching FMC @ 0x40000000
24,627,003 UART:
24,627,231 UART: Running Caliptra FMC ...
24,628,247 UART:
24,628,385 UART: [fmc] Received command: 0x1000000A
24,635,022 >>> mbox cmd response data (928 bytes)
24,640,336 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,640,775 UART: [fmc] Received command: 0x10000009
24,642,572 >>> mbox cmd response data (48 bytes)
24,644,755 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,645,219 UART: [fmc] Received command: 0x10000003
24,655,173 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,215,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,017,962 >>> mbox cmd response data (12 bytes)
14,019,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,027,644 >>> mbox cmd response data (12 bytes)
14,028,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,035,566 >>> mbox cmd response data (12 bytes)
14,036,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,043,211 >>> mbox cmd response data (12 bytes)
14,043,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,050,992 >>> mbox cmd response data (12 bytes)
14,051,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,059,042 >>> mbox cmd response data (12 bytes)
14,059,483 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,067,449 >>> mbox cmd response data (12 bytes)
14,067,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,075,607 >>> mbox cmd response data (12 bytes)
14,077,497 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,693,095 >>> mbox cmd response: success
24,314,743 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,331,492 UART:
24,331,816 UART: Running Caliptra FMC ...
24,332,963 UART:
24,333,142 UART: [fmc] Received command: 0x1000000A
24,339,507 >>> mbox cmd response data (928 bytes)
24,344,732 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,345,169 UART: [fmc] Received command: 0x10000009
24,346,981 >>> mbox cmd response data (48 bytes)
24,349,170 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,349,638 UART: [fmc] Received command: 0x10000003
24,359,608 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,225,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,227,152 UART:
2,227,421 UART: Running Caliptra ROM ...
2,228,493 UART:
2,228,666 UART: [state] CFI Enabled
2,229,542 UART: [state] LifecycleState = Unprovisioned
2,231,219 UART: [state] DebugLocked = No
2,232,244 UART: [state] WD Timer not started. Device not locked for debugging
2,234,722 UART: [kat] SHA2-256
2,235,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,238,794 UART: [kat] ++
2,239,259 UART: [kat] sha1
2,239,772 UART: [kat] SHA2-256
2,240,429 UART: [kat] SHA2-384
2,241,084 UART: [kat] SHA2-512-ACC
2,241,889 UART: [kat] ECC-384
2,947,329 UART: [kat] HMAC-384Kdf
2,970,704 UART: [kat] LMS
3,500,188 UART: [kat] --
3,504,779 UART: [cold-reset] ++
3,507,115 UART: [fht] FHT @ 0x50003400
3,518,482 UART: [idev] ++
3,519,085 UART: [idev] CDI.KEYID = 6
3,519,975 UART: [idev] SUBJECT.KEYID = 7
3,521,139 UART: [idev] UDS.KEYID = 0
3,542,952 UART: [idev] Erasing UDS.KEYID = 0
6,021,973 UART: [idev] Sha1 KeyId Algorithm
6,044,485 UART: [idev] --
6,048,917 UART: [ldev] ++
6,049,490 UART: [ldev] CDI.KEYID = 6
6,050,415 UART: [ldev] SUBJECT.KEYID = 5
6,051,635 UART: [ldev] AUTHORITY.KEYID = 7
6,052,873 UART: [ldev] FE.KEYID = 1
6,098,805 UART: [ldev] Erasing FE.KEYID = 1
8,603,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,869 UART: [ldev] --
10,412,118 UART: [fwproc] Wait for Commands...
10,414,921 UART: [fwproc] Recv command 0x4d454153
10,423,453 >>> mbox cmd response data (12 bytes)
10,424,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,425,018 UART: [fwproc] Recv command 0x4d454153
10,433,512 >>> mbox cmd response data (12 bytes)
10,433,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,435,479 UART: [fwproc] Recv command 0x4d454153
10,443,962 >>> mbox cmd response data (12 bytes)
10,444,378 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,445,904 UART: [fwproc] Recv command 0x4d454153
10,454,342 >>> mbox cmd response data (12 bytes)
10,454,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,455,558 UART: [fwproc] Recv command 0x4d454153
10,463,985 >>> mbox cmd response data (12 bytes)
10,464,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,465,608 UART: [fwproc] Recv command 0x4d454153
10,474,044 >>> mbox cmd response data (12 bytes)
10,474,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,476,003 UART: [fwproc] Recv command 0x4d454153
10,484,436 >>> mbox cmd response data (12 bytes)
10,484,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,485,653 UART: [fwproc] Recv command 0x4d454153
10,494,089 >>> mbox cmd response data (12 bytes)
10,495,800 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,636,254 UART: [fwproc] Recv command 0x46574c44
10,638,381 UART: [fwproc] Recv'd Img size: 111752 bytes
14,005,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,083,614 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,143,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,460,668 >>> mbox cmd response: success
14,464,469 UART: [afmc] ++
14,465,060 UART: [afmc] CDI.KEYID = 6
14,465,982 UART: [afmc] SUBJECT.KEYID = 7
14,467,088 UART: [afmc] AUTHORITY.KEYID = 5
16,997,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,033 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,737,082 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,753,110 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,768,814 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,790,079 UART: [afmc] --
18,794,706 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,795,058 UART: [cold-reset] --
18,798,226 UART: [state] Locking Datavault
18,802,547 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,198 UART: [state] Locking ICCM
18,805,267 UART: [exit] Launching FMC @ 0x40000000
18,813,668 UART:
18,813,913 UART: Running Caliptra FMC ...
18,815,015 UART:
18,815,175 UART: [fmc] Received command: 0x1000000A
18,821,661 >>> mbox cmd response data (928 bytes)
18,826,712 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,827,147 UART: [fmc] Received command: 0x10000009
18,828,957 >>> mbox cmd response data (48 bytes)
18,831,061 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,831,523 UART: [fmc] Received command: 0x10000003
18,841,448 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
2,210,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,206,791 >>> mbox cmd response data (12 bytes)
10,207,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,215,104 >>> mbox cmd response data (12 bytes)
10,215,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,223,107 >>> mbox cmd response data (12 bytes)
10,223,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,231,202 >>> mbox cmd response data (12 bytes)
10,231,633 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,239,272 >>> mbox cmd response data (12 bytes)
10,239,692 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,248,193 >>> mbox cmd response data (12 bytes)
10,248,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,256,144 >>> mbox cmd response data (12 bytes)
10,256,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,264,141 >>> mbox cmd response data (12 bytes)
10,265,824 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,231,581 >>> mbox cmd response: success
18,499,187 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,511,505 UART:
18,511,834 UART: Running Caliptra FMC ...
18,512,907 UART:
18,513,078 UART: [fmc] Received command: 0x1000000A
18,519,573 >>> mbox cmd response data (928 bytes)
18,524,748 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,525,180 UART: [fmc] Received command: 0x10000009
18,526,948 >>> mbox cmd response data (48 bytes)
18,529,085 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,529,565 UART: [fmc] Received command: 0x10000003
18,539,533 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
2,220,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,221,907 UART:
2,222,172 UART: Running Caliptra ROM ...
2,223,255 UART:
2,223,409 UART: [state] CFI Enabled
2,224,316 UART: [state] LifecycleState = Unprovisioned
2,225,919 UART: [state] DebugLocked = No
2,227,043 UART: [state] WD Timer not started. Device not locked for debugging
2,229,527 UART: [kat] SHA2-256
2,230,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,233,213 UART: [kat] ++
2,233,661 UART: [kat] sha1
2,234,173 UART: [kat] SHA2-256
2,234,924 UART: [kat] SHA2-384
2,235,590 UART: [kat] SHA2-512-ACC
2,236,417 UART: [kat] ECC-384
3,278,596 UART: [kat] HMAC-384Kdf
3,291,844 UART: [kat] LMS
3,821,367 UART: [kat] --
3,824,858 UART: [cold-reset] ++
3,826,088 UART: [fht] FHT @ 0x50003400
3,837,282 UART: [idev] ++
3,837,852 UART: [idev] CDI.KEYID = 6
3,838,757 UART: [idev] SUBJECT.KEYID = 7
3,839,967 UART: [idev] UDS.KEYID = 0
3,855,696 UART: [idev] Erasing UDS.KEYID = 0
6,311,637 UART: [idev] Sha1 KeyId Algorithm
6,335,466 UART: [idev] --
6,339,515 UART: [ldev] ++
6,340,083 UART: [ldev] CDI.KEYID = 6
6,340,993 UART: [ldev] SUBJECT.KEYID = 5
6,342,201 UART: [ldev] AUTHORITY.KEYID = 7
6,343,426 UART: [ldev] FE.KEYID = 1
6,355,317 UART: [ldev] Erasing FE.KEYID = 1
8,827,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,976 UART: [ldev] --
10,618,753 UART: [fwproc] Wait for Commands...
10,621,118 UART: [fwproc] Recv command 0x4d454153
10,629,642 >>> mbox cmd response data (12 bytes)
10,630,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,631,016 UART: [fwproc] Recv command 0x4d454153
10,639,498 >>> mbox cmd response data (12 bytes)
10,639,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,641,042 UART: [fwproc] Recv command 0x4d454153
10,649,521 >>> mbox cmd response data (12 bytes)
10,649,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,651,816 UART: [fwproc] Recv command 0x4d454153
10,660,258 >>> mbox cmd response data (12 bytes)
10,660,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,661,687 UART: [fwproc] Recv command 0x4d454153
10,670,152 >>> mbox cmd response data (12 bytes)
10,670,610 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,671,775 UART: [fwproc] Recv command 0x4d454153
10,680,203 >>> mbox cmd response data (12 bytes)
10,680,624 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,682,047 UART: [fwproc] Recv command 0x4d454153
10,690,475 >>> mbox cmd response data (12 bytes)
10,690,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,691,699 UART: [fwproc] Recv command 0x4d454153
10,700,121 >>> mbox cmd response data (12 bytes)
10,701,813 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,843,135 UART: [fwproc] Recv command 0x46574c44
10,845,310 UART: [fwproc] Recv'd Img size: 111752 bytes
14,217,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,290,933 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,351,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,669,270 >>> mbox cmd response: success
14,673,479 UART: [afmc] ++
14,674,078 UART: [afmc] CDI.KEYID = 6
14,674,993 UART: [afmc] SUBJECT.KEYID = 7
14,676,151 UART: [afmc] AUTHORITY.KEYID = 5
17,175,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,628 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,915,725 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,931,721 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,947,398 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,969,979 UART: [afmc] --
18,974,390 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,974,757 UART: [cold-reset] --
18,979,511 UART: [state] Locking Datavault
18,985,038 UART: [state] Locking PCR0, PCR1 and PCR31
18,986,726 UART: [state] Locking ICCM
18,988,233 UART: [exit] Launching FMC @ 0x40000000
18,996,629 UART:
18,996,859 UART: Running Caliptra FMC ...
18,997,957 UART:
18,998,113 UART: [fmc] Received command: 0x1000000A
19,004,651 >>> mbox cmd response data (928 bytes)
19,009,870 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,010,313 UART: [fmc] Received command: 0x10000009
19,012,122 >>> mbox cmd response data (48 bytes)
19,014,303 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,014,771 UART: [fmc] Received command: 0x10000003
19,024,692 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
2,217,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,405,990 >>> mbox cmd response data (12 bytes)
10,407,272 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,414,908 >>> mbox cmd response data (12 bytes)
10,415,362 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,422,796 >>> mbox cmd response data (12 bytes)
10,423,231 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,430,687 >>> mbox cmd response data (12 bytes)
10,431,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,438,639 >>> mbox cmd response data (12 bytes)
10,439,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,446,440 >>> mbox cmd response data (12 bytes)
10,446,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,454,558 >>> mbox cmd response data (12 bytes)
10,454,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,462,148 >>> mbox cmd response data (12 bytes)
10,463,894 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,426,808 >>> mbox cmd response: success
18,661,342 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,677,064 UART:
18,677,384 UART: Running Caliptra FMC ...
18,678,546 UART:
18,678,704 UART: [fmc] Received command: 0x1000000A
18,685,179 >>> mbox cmd response data (928 bytes)
18,690,356 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,690,800 UART: [fmc] Received command: 0x10000009
18,692,596 >>> mbox cmd response data (48 bytes)
18,694,711 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,695,168 UART: [fmc] Received command: 0x10000003
18,705,110 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,215,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,163 UART:
2,217,439 UART: Running Caliptra ROM ...
2,218,518 UART:
2,218,668 UART: [state] CFI Enabled
2,219,655 UART: [state] LifecycleState = Unprovisioned
2,221,329 UART: [state] DebugLocked = No
2,222,461 UART: [state] WD Timer not started. Device not locked for debugging
2,224,945 UART: [kat] SHA2-256
2,225,618 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,228,626 UART: [kat] ++
2,229,074 UART: [kat] sha1
2,229,589 UART: [kat] SHA2-256
2,230,331 UART: [kat] SHA2-384
2,230,997 UART: [kat] SHA2-512-ACC
2,231,822 UART: [kat] ECC-384
2,945,671 UART: [kat] HMAC-384Kdf
2,969,284 UART: [kat] LMS
3,498,770 UART: [kat] --
3,503,567 UART: [cold-reset] ++
3,504,523 UART: [fht] FHT @ 0x50003400
3,517,122 UART: [idev] ++
3,517,730 UART: [idev] CDI.KEYID = 6
3,518,662 UART: [idev] SUBJECT.KEYID = 7
3,519,828 UART: [idev] UDS.KEYID = 0
3,541,583 UART: [idev] Erasing UDS.KEYID = 0
6,024,905 UART: [idev] Sha1 KeyId Algorithm
6,048,638 UART: [idev] --
6,053,668 UART: [ldev] ++
6,054,240 UART: [ldev] CDI.KEYID = 6
6,055,155 UART: [ldev] SUBJECT.KEYID = 5
6,056,318 UART: [ldev] AUTHORITY.KEYID = 7
6,057,610 UART: [ldev] FE.KEYID = 1
6,097,928 UART: [ldev] Erasing FE.KEYID = 1
8,602,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,326 UART: [ldev] --
10,411,818 UART: [fwproc] Wait for Commands...
10,413,336 UART: [fwproc] Recv command 0x4d454153
10,421,871 >>> mbox cmd response data (12 bytes)
10,422,480 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,423,768 UART: [fwproc] Recv command 0x4d454153
10,432,256 >>> mbox cmd response data (12 bytes)
10,432,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,433,807 UART: [fwproc] Recv command 0x4d454153
10,442,292 >>> mbox cmd response data (12 bytes)
10,442,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,443,648 UART: [fwproc] Recv command 0x4d454153
10,452,075 >>> mbox cmd response data (12 bytes)
10,452,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,453,284 UART: [fwproc] Recv command 0x4d454153
10,461,717 >>> mbox cmd response data (12 bytes)
10,462,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,463,418 UART: [fwproc] Recv command 0x4d454153
10,471,848 >>> mbox cmd response data (12 bytes)
10,472,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,473,448 UART: [fwproc] Recv command 0x4d454153
10,481,703 >>> mbox cmd response data (12 bytes)
10,482,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,483,398 UART: [fwproc] Recv command 0x4d454153
10,491,825 >>> mbox cmd response data (12 bytes)
10,493,520 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,634,562 UART: [fwproc] Recv command 0x46574c44
10,636,747 UART: [fwproc] Recv'd Img size: 111752 bytes
14,005,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,072,273 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,132,617 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,450,186 >>> mbox cmd response: success
14,453,851 UART: [afmc] ++
14,454,439 UART: [afmc] CDI.KEYID = 6
14,455,320 UART: [afmc] SUBJECT.KEYID = 7
14,456,538 UART: [afmc] AUTHORITY.KEYID = 5
16,997,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,964 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,739,006 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,755,074 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,770,723 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,792,742 UART: [afmc] --
18,795,567 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,795,932 UART: [cold-reset] --
18,799,503 UART: [state] Locking Datavault
18,804,914 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,617 UART: [state] Locking ICCM
18,808,573 UART: [exit] Launching FMC @ 0x40000000
18,816,976 UART:
18,817,213 UART: Running Caliptra FMC ...
18,818,314 UART:
18,818,469 UART: [fmc] Received command: 0x1000000A
18,825,010 >>> mbox cmd response data (928 bytes)
18,830,234 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,830,667 UART: [fmc] Received command: 0x10000009
18,832,475 >>> mbox cmd response data (48 bytes)
18,834,640 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,835,106 UART: [fmc] Received command: 0x10000003
18,845,026 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,210,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,197,213 >>> mbox cmd response data (12 bytes)
10,198,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,205,539 >>> mbox cmd response data (12 bytes)
10,205,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,212,933 >>> mbox cmd response data (12 bytes)
10,213,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,220,839 >>> mbox cmd response data (12 bytes)
10,221,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,229,647 >>> mbox cmd response data (12 bytes)
10,230,074 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,237,903 >>> mbox cmd response data (12 bytes)
10,238,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,245,982 >>> mbox cmd response data (12 bytes)
10,246,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,254,087 >>> mbox cmd response data (12 bytes)
10,255,843 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,212,004 >>> mbox cmd response: success
18,494,326 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,510,742 UART:
18,511,088 UART: Running Caliptra FMC ...
18,512,282 UART:
18,512,456 UART: [fmc] Received command: 0x1000000A
18,518,840 >>> mbox cmd response data (928 bytes)
18,524,160 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,524,602 UART: [fmc] Received command: 0x10000009
18,526,412 >>> mbox cmd response data (48 bytes)
18,528,616 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,529,102 UART: [fmc] Received command: 0x10000003
18,539,062 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,219,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,221,271 UART:
2,221,541 UART: Running Caliptra ROM ...
2,222,617 UART:
2,222,769 UART: [state] CFI Enabled
2,223,750 UART: [state] LifecycleState = Unprovisioned
2,225,419 UART: [state] DebugLocked = No
2,226,475 UART: [state] WD Timer not started. Device not locked for debugging
2,228,939 UART: [kat] SHA2-256
2,229,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,232,605 UART: [kat] ++
2,233,073 UART: [kat] sha1
2,233,591 UART: [kat] SHA2-256
2,234,251 UART: [kat] SHA2-384
2,234,907 UART: [kat] SHA2-512-ACC
2,235,732 UART: [kat] ECC-384
3,278,672 UART: [kat] HMAC-384Kdf
3,291,657 UART: [kat] LMS
3,821,132 UART: [kat] --
3,822,721 UART: [cold-reset] ++
3,825,137 UART: [fht] FHT @ 0x50003400
3,835,411 UART: [idev] ++
3,835,980 UART: [idev] CDI.KEYID = 6
3,836,995 UART: [idev] SUBJECT.KEYID = 7
3,838,096 UART: [idev] UDS.KEYID = 0
3,852,993 UART: [idev] Erasing UDS.KEYID = 0
6,307,033 UART: [idev] Sha1 KeyId Algorithm
6,329,326 UART: [idev] --
6,334,081 UART: [ldev] ++
6,334,651 UART: [ldev] CDI.KEYID = 6
6,335,563 UART: [ldev] SUBJECT.KEYID = 5
6,336,728 UART: [ldev] AUTHORITY.KEYID = 7
6,337,883 UART: [ldev] FE.KEYID = 1
6,350,547 UART: [ldev] Erasing FE.KEYID = 1
8,824,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,942 UART: [ldev] --
10,617,423 UART: [fwproc] Wait for Commands...
10,619,777 UART: [fwproc] Recv command 0x4d454153
10,628,277 >>> mbox cmd response data (12 bytes)
10,628,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,629,957 UART: [fwproc] Recv command 0x4d454153
10,638,440 >>> mbox cmd response data (12 bytes)
10,638,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,639,929 UART: [fwproc] Recv command 0x4d454153
10,648,415 >>> mbox cmd response data (12 bytes)
10,648,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,650,593 UART: [fwproc] Recv command 0x4d454153
10,659,081 >>> mbox cmd response data (12 bytes)
10,659,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,661,688 UART: [fwproc] Recv command 0x4d454153
10,670,115 >>> mbox cmd response data (12 bytes)
10,670,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,671,558 UART: [fwproc] Recv command 0x4d454153
10,679,985 >>> mbox cmd response data (12 bytes)
10,680,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,681,746 UART: [fwproc] Recv command 0x4d454153
10,690,179 >>> mbox cmd response data (12 bytes)
10,690,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,692,093 UART: [fwproc] Recv command 0x4d454153
10,700,526 >>> mbox cmd response data (12 bytes)
10,702,256 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,843,239 UART: [fwproc] Recv command 0x46574c44
10,845,407 UART: [fwproc] Recv'd Img size: 111752 bytes
14,219,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,291,149 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,351,478 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,668,228 >>> mbox cmd response: success
14,672,287 UART: [afmc] ++
14,672,876 UART: [afmc] CDI.KEYID = 6
14,673,791 UART: [afmc] SUBJECT.KEYID = 7
14,674,952 UART: [afmc] AUTHORITY.KEYID = 5
17,172,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,115 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,911,182 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,927,236 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,942,947 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,965,213 UART: [afmc] --
18,968,542 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,968,899 UART: [cold-reset] --
18,972,901 UART: [state] Locking Datavault
18,976,685 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,326 UART: [state] Locking ICCM
18,980,070 UART: [exit] Launching FMC @ 0x40000000
18,988,414 UART:
18,988,643 UART: Running Caliptra FMC ...
18,989,735 UART:
18,989,908 UART: [fmc] Received command: 0x1000000A
18,996,454 >>> mbox cmd response data (928 bytes)
19,001,696 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,002,137 UART: [fmc] Received command: 0x10000009
19,003,947 >>> mbox cmd response data (48 bytes)
19,006,138 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,006,606 UART: [fmc] Received command: 0x10000003
19,016,566 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,216,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,411,114 >>> mbox cmd response data (12 bytes)
10,412,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,419,237 >>> mbox cmd response data (12 bytes)
10,419,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,427,399 >>> mbox cmd response data (12 bytes)
10,427,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,435,541 >>> mbox cmd response data (12 bytes)
10,435,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,443,015 >>> mbox cmd response data (12 bytes)
10,443,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,451,079 >>> mbox cmd response data (12 bytes)
10,451,513 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,459,203 >>> mbox cmd response data (12 bytes)
10,459,626 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,466,667 >>> mbox cmd response data (12 bytes)
10,468,431 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,436,129 >>> mbox cmd response: success
18,668,553 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,681,240 UART:
18,681,549 UART: Running Caliptra FMC ...
18,682,699 UART:
18,682,864 UART: [fmc] Received command: 0x1000000A
18,689,365 >>> mbox cmd response data (928 bytes)
18,694,541 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,694,986 UART: [fmc] Received command: 0x10000009
18,696,789 >>> mbox cmd response data (48 bytes)
18,698,925 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,699,396 UART: [fmc] Received command: 0x10000003
18,709,344 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,395 UART: [idev] ++
1,173,563 UART: [idev] CDI.KEYID = 6
1,173,924 UART: [idev] SUBJECT.KEYID = 7
1,174,349 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,827 UART: [idev] --
1,208,872 UART: [ldev] ++
1,209,040 UART: [ldev] CDI.KEYID = 6
1,209,404 UART: [ldev] SUBJECT.KEYID = 5
1,209,831 UART: [ldev] AUTHORITY.KEYID = 7
1,210,294 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,058 UART: [ldev] --
1,280,360 UART: [fwproc] Wait for Commands...
1,281,159 UART: [fwproc] Recv command 0x4d454153
1,285,186 >>> mbox cmd response data (12 bytes)
1,285,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,468 UART: [fwproc] Recv command 0x4d454153
1,289,495 >>> mbox cmd response data (12 bytes)
1,289,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,717 UART: [fwproc] Recv command 0x4d454153
1,293,744 >>> mbox cmd response data (12 bytes)
1,293,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,052 UART: [fwproc] Recv command 0x4d454153
1,298,079 >>> mbox cmd response data (12 bytes)
1,298,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,309 UART: [fwproc] Recv command 0x4d454153
1,302,336 >>> mbox cmd response data (12 bytes)
1,302,337 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,468 UART: [fwproc] Recv command 0x4d454153
1,306,495 >>> mbox cmd response data (12 bytes)
1,306,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,803 UART: [fwproc] Recv command 0x4d454153
1,310,830 >>> mbox cmd response data (12 bytes)
1,310,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,122 UART: [fwproc] Recv command 0x4d454153
1,315,149 >>> mbox cmd response data (12 bytes)
1,315,150 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,315,413 UART: [fwproc] Recv command 0x46574c44
1,316,146 UART: [fwproc] Recv'd Img size: 111752 bytes
2,584,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,066 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,635,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,227 >>> mbox cmd response: success
2,772,322 UART: [afmc] ++
2,772,490 UART: [afmc] CDI.KEYID = 6
2,772,853 UART: [afmc] SUBJECT.KEYID = 7
2,773,279 UART: [afmc] AUTHORITY.KEYID = 5
2,808,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,651 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,831,347 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,837,246 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,842,939 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,850,967 UART: [afmc] --
2,851,841 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,851,863 UART: [cold-reset] --
2,852,489 UART: [state] Locking Datavault
2,853,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,170 UART: [state] Locking ICCM
2,854,668 UART: [exit] Launching FMC @ 0x40000000
2,859,965 UART:
2,859,981 UART: Running Caliptra FMC ...
2,860,389 UART:
2,860,619 UART: [fmc] Received command: 0x1000000A
2,866,850 >>> mbox cmd response data (928 bytes)
2,866,851 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,866,880 UART: [fmc] Received command: 0x10000009
2,868,078 >>> mbox cmd response data (48 bytes)
2,868,079 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,868,108 UART: [fmc] Received command: 0x10000003
2,877,564 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,648 >>> mbox cmd response data (12 bytes)
1,138,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,050 >>> mbox cmd response data (12 bytes)
1,142,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,464 >>> mbox cmd response data (12 bytes)
1,145,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,040 >>> mbox cmd response data (12 bytes)
1,149,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,444 >>> mbox cmd response data (12 bytes)
1,152,445 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,948 >>> mbox cmd response data (12 bytes)
1,155,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,328 >>> mbox cmd response data (12 bytes)
1,159,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,824 >>> mbox cmd response data (12 bytes)
1,162,825 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,615,333 >>> mbox cmd response: success
2,671,264 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,677,191 UART:
2,677,207 UART: Running Caliptra FMC ...
2,677,615 UART:
2,677,845 UART: [fmc] Received command: 0x1000000A
2,684,076 >>> mbox cmd response data (928 bytes)
2,684,077 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,684,106 UART: [fmc] Received command: 0x10000009
2,685,304 >>> mbox cmd response data (48 bytes)
2,685,305 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,685,334 UART: [fmc] Received command: 0x10000003
2,694,790 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
891,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,885 UART: [kat] SHA2-512-ACC
906,786 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,829 UART: [kat] LMS
1,169,141 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,656 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,181,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,182 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,819 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,061 UART: [ldev] --
1,281,523 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x4d454153
1,286,207 >>> mbox cmd response data (12 bytes)
1,286,208 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,331 UART: [fwproc] Recv command 0x4d454153
1,290,358 >>> mbox cmd response data (12 bytes)
1,290,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,492 UART: [fwproc] Recv command 0x4d454153
1,294,519 >>> mbox cmd response data (12 bytes)
1,294,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,659 UART: [fwproc] Recv command 0x4d454153
1,298,686 >>> mbox cmd response data (12 bytes)
1,298,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,802 UART: [fwproc] Recv command 0x4d454153
1,302,829 >>> mbox cmd response data (12 bytes)
1,302,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,055 UART: [fwproc] Recv command 0x4d454153
1,307,082 >>> mbox cmd response data (12 bytes)
1,307,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,198 UART: [fwproc] Recv command 0x4d454153
1,311,225 >>> mbox cmd response data (12 bytes)
1,311,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,509 UART: [fwproc] Recv command 0x4d454153
1,315,536 >>> mbox cmd response data (12 bytes)
1,315,537 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,315,802 UART: [fwproc] Recv command 0x46574c44
1,316,535 UART: [fwproc] Recv'd Img size: 111752 bytes
2,583,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,761 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,074 >>> mbox cmd response: success
2,773,327 UART: [afmc] ++
2,773,495 UART: [afmc] CDI.KEYID = 6
2,773,858 UART: [afmc] SUBJECT.KEYID = 7
2,774,284 UART: [afmc] AUTHORITY.KEYID = 5
2,809,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,078 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,832,774 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,838,673 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,844,366 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,852,220 UART: [afmc] --
2,853,108 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,853,130 UART: [cold-reset] --
2,854,042 UART: [state] Locking Datavault
2,855,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,843 UART: [state] Locking ICCM
2,856,509 UART: [exit] Launching FMC @ 0x40000000
2,861,806 UART:
2,861,822 UART: Running Caliptra FMC ...
2,862,230 UART:
2,862,460 UART: [fmc] Received command: 0x1000000A
2,868,691 >>> mbox cmd response data (928 bytes)
2,868,692 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,868,721 UART: [fmc] Received command: 0x10000009
2,869,919 >>> mbox cmd response data (48 bytes)
2,869,920 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,949 UART: [fmc] Received command: 0x10000003
2,879,405 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,357 >>> mbox cmd response data (12 bytes)
1,140,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,765 >>> mbox cmd response data (12 bytes)
1,143,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,155 >>> mbox cmd response data (12 bytes)
1,147,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,705 >>> mbox cmd response data (12 bytes)
1,150,706 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,121 >>> mbox cmd response data (12 bytes)
1,154,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,649 >>> mbox cmd response data (12 bytes)
1,157,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,149 >>> mbox cmd response data (12 bytes)
1,161,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,717 >>> mbox cmd response data (12 bytes)
1,164,718 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,618,628 >>> mbox cmd response: success
2,673,761 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,679,654 UART:
2,679,670 UART: Running Caliptra FMC ...
2,680,078 UART:
2,680,308 UART: [fmc] Received command: 0x1000000A
2,686,539 >>> mbox cmd response data (928 bytes)
2,686,540 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,686,569 UART: [fmc] Received command: 0x10000009
2,687,767 >>> mbox cmd response data (48 bytes)
2,687,768 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,687,797 UART: [fmc] Received command: 0x10000003
2,697,253 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,000 UART: [kat] SHA2-512-ACC
905,901 UART: [kat] ECC-384
915,248 UART: [kat] HMAC-384Kdf
919,774 UART: [kat] LMS
1,168,086 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,569 UART: [fht] FHT @ 0x50003400
1,172,159 UART: [idev] ++
1,172,327 UART: [idev] CDI.KEYID = 6
1,172,688 UART: [idev] SUBJECT.KEYID = 7
1,173,113 UART: [idev] UDS.KEYID = 0
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,231 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,214,888 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,286 UART: [ldev] --
1,280,608 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x4d454153
1,285,254 >>> mbox cmd response data (12 bytes)
1,285,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,402 UART: [fwproc] Recv command 0x4d454153
1,289,429 >>> mbox cmd response data (12 bytes)
1,289,430 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,517 UART: [fwproc] Recv command 0x4d454153
1,293,544 >>> mbox cmd response data (12 bytes)
1,293,545 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,650 UART: [fwproc] Recv command 0x4d454153
1,297,677 >>> mbox cmd response data (12 bytes)
1,297,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,915 UART: [fwproc] Recv command 0x4d454153
1,301,942 >>> mbox cmd response data (12 bytes)
1,301,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,216 UART: [fwproc] Recv command 0x4d454153
1,306,243 >>> mbox cmd response data (12 bytes)
1,306,244 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,407 UART: [fwproc] Recv command 0x4d454153
1,310,434 >>> mbox cmd response data (12 bytes)
1,310,435 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,630 UART: [fwproc] Recv command 0x4d454153
1,314,657 >>> mbox cmd response data (12 bytes)
1,314,658 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,314,931 UART: [fwproc] Recv command 0x46574c44
1,315,664 UART: [fwproc] Recv'd Img size: 111752 bytes
2,583,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,126 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,483 >>> mbox cmd response: success
2,773,596 UART: [afmc] ++
2,773,764 UART: [afmc] CDI.KEYID = 6
2,774,127 UART: [afmc] SUBJECT.KEYID = 7
2,774,553 UART: [afmc] AUTHORITY.KEYID = 5
2,809,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,085 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,832,781 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,838,680 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,844,373 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,852,267 UART: [afmc] --
2,853,307 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,853,329 UART: [cold-reset] --
2,854,169 UART: [state] Locking Datavault
2,855,506 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,110 UART: [state] Locking ICCM
2,856,544 UART: [exit] Launching FMC @ 0x40000000
2,861,841 UART:
2,861,857 UART: Running Caliptra FMC ...
2,862,265 UART:
2,862,495 UART: [fmc] Received command: 0x1000000A
2,868,726 >>> mbox cmd response data (928 bytes)
2,868,727 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,868,756 UART: [fmc] Received command: 0x10000009
2,869,954 >>> mbox cmd response data (48 bytes)
2,869,955 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,984 UART: [fmc] Received command: 0x10000003
2,879,440 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,356 >>> mbox cmd response data (12 bytes)
1,139,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,838 >>> mbox cmd response data (12 bytes)
1,142,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,440 >>> mbox cmd response data (12 bytes)
1,146,441 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,956 >>> mbox cmd response data (12 bytes)
1,149,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,520 >>> mbox cmd response data (12 bytes)
1,153,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,926 >>> mbox cmd response data (12 bytes)
1,156,927 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,300 >>> mbox cmd response data (12 bytes)
1,160,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,774 >>> mbox cmd response data (12 bytes)
1,163,775 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,617,239 >>> mbox cmd response: success
2,673,988 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,131 UART:
2,680,147 UART: Running Caliptra FMC ...
2,680,555 UART:
2,680,785 UART: [fmc] Received command: 0x1000000A
2,687,016 >>> mbox cmd response data (928 bytes)
2,687,017 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,046 UART: [fmc] Received command: 0x10000009
2,688,244 >>> mbox cmd response data (48 bytes)
2,688,245 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,274 UART: [fmc] Received command: 0x10000003
2,697,730 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,902 UART: [kat] SHA2-256
901,842 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,444 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,575 UART: [ldev] ++
1,210,743 UART: [ldev] CDI.KEYID = 6
1,211,107 UART: [ldev] SUBJECT.KEYID = 5
1,211,534 UART: [ldev] AUTHORITY.KEYID = 7
1,211,997 UART: [ldev] FE.KEYID = 1
1,217,203 UART: [ldev] Erasing FE.KEYID = 1
1,244,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,809 UART: [ldev] --
1,283,319 UART: [fwproc] Wait for Commands...
1,284,106 UART: [fwproc] Recv command 0x4d454153
1,288,133 >>> mbox cmd response data (12 bytes)
1,288,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,383 UART: [fwproc] Recv command 0x4d454153
1,292,410 >>> mbox cmd response data (12 bytes)
1,292,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,634 UART: [fwproc] Recv command 0x4d454153
1,296,661 >>> mbox cmd response data (12 bytes)
1,296,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,817 UART: [fwproc] Recv command 0x4d454153
1,300,844 >>> mbox cmd response data (12 bytes)
1,300,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,922 UART: [fwproc] Recv command 0x4d454153
1,304,949 >>> mbox cmd response data (12 bytes)
1,304,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,103 UART: [fwproc] Recv command 0x4d454153
1,309,130 >>> mbox cmd response data (12 bytes)
1,309,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,374 UART: [fwproc] Recv command 0x4d454153
1,313,401 >>> mbox cmd response data (12 bytes)
1,313,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,475 UART: [fwproc] Recv command 0x4d454153
1,317,502 >>> mbox cmd response data (12 bytes)
1,317,503 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,317,646 UART: [fwproc] Recv command 0x46574c44
1,318,379 UART: [fwproc] Recv'd Img size: 111752 bytes
2,586,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,519 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,662 >>> mbox cmd response: success
2,775,819 UART: [afmc] ++
2,775,987 UART: [afmc] CDI.KEYID = 6
2,776,350 UART: [afmc] SUBJECT.KEYID = 7
2,776,776 UART: [afmc] AUTHORITY.KEYID = 5
2,812,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,568 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,835,264 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,841,163 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,846,856 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,854,472 UART: [afmc] --
2,855,346 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,855,368 UART: [cold-reset] --
2,856,254 UART: [state] Locking Datavault
2,857,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,073 UART: [state] Locking ICCM
2,858,577 UART: [exit] Launching FMC @ 0x40000000
2,863,874 UART:
2,863,890 UART: Running Caliptra FMC ...
2,864,298 UART:
2,864,528 UART: [fmc] Received command: 0x1000000A
2,870,759 >>> mbox cmd response data (928 bytes)
2,870,760 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,870,789 UART: [fmc] Received command: 0x10000009
2,871,987 >>> mbox cmd response data (48 bytes)
2,871,988 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,017 UART: [fmc] Received command: 0x10000003
2,881,473 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,299 >>> mbox cmd response data (12 bytes)
1,140,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,825 >>> mbox cmd response data (12 bytes)
1,143,826 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,389 >>> mbox cmd response data (12 bytes)
1,147,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,969 >>> mbox cmd response data (12 bytes)
1,150,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,513 >>> mbox cmd response data (12 bytes)
1,154,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,945 >>> mbox cmd response data (12 bytes)
1,157,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,521 >>> mbox cmd response data (12 bytes)
1,161,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,907 >>> mbox cmd response data (12 bytes)
1,164,908 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,618,040 >>> mbox cmd response: success
2,674,645 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,680,642 UART:
2,680,658 UART: Running Caliptra FMC ...
2,681,066 UART:
2,681,296 UART: [fmc] Received command: 0x1000000A
2,687,527 >>> mbox cmd response data (928 bytes)
2,687,528 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,687,557 UART: [fmc] Received command: 0x10000009
2,688,755 >>> mbox cmd response data (48 bytes)
2,688,756 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,688,785 UART: [fmc] Received command: 0x10000003
2,698,241 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,612 UART: [kat] SHA2-512-ACC
906,513 UART: [kat] ECC-384
916,308 UART: [kat] HMAC-384Kdf
920,988 UART: [kat] LMS
1,169,300 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,753 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,182,593 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,669 UART: [idev] --
1,209,724 UART: [ldev] ++
1,209,892 UART: [ldev] CDI.KEYID = 6
1,210,256 UART: [ldev] SUBJECT.KEYID = 5
1,210,683 UART: [ldev] AUTHORITY.KEYID = 7
1,211,146 UART: [ldev] FE.KEYID = 1
1,216,044 UART: [ldev] Erasing FE.KEYID = 1
1,241,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,281,066 UART: [fwproc] Wait for Commands...
1,281,645 UART: [fwproc] Recv command 0x4d454153
1,285,672 >>> mbox cmd response data (12 bytes)
1,285,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,864 UART: [fwproc] Recv command 0x4d454153
1,289,891 >>> mbox cmd response data (12 bytes)
1,289,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,173 UART: [fwproc] Recv command 0x4d454153
1,294,200 >>> mbox cmd response data (12 bytes)
1,294,201 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,348 UART: [fwproc] Recv command 0x4d454153
1,298,375 >>> mbox cmd response data (12 bytes)
1,298,376 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,565 UART: [fwproc] Recv command 0x4d454153
1,302,592 >>> mbox cmd response data (12 bytes)
1,302,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,822 UART: [fwproc] Recv command 0x4d454153
1,306,849 >>> mbox cmd response data (12 bytes)
1,306,850 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,947 UART: [fwproc] Recv command 0x4d454153
1,310,974 >>> mbox cmd response data (12 bytes)
1,310,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,274 UART: [fwproc] Recv command 0x4d454153
1,315,301 >>> mbox cmd response data (12 bytes)
1,315,302 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,315,557 UART: [fwproc] Recv command 0x46574c44
1,316,290 UART: [fwproc] Recv'd Img size: 111752 bytes
2,583,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,624 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,309 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,781 >>> mbox cmd response: success
2,772,952 UART: [afmc] ++
2,773,120 UART: [afmc] CDI.KEYID = 6
2,773,483 UART: [afmc] SUBJECT.KEYID = 7
2,773,909 UART: [afmc] AUTHORITY.KEYID = 5
2,809,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,493 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,832,189 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,838,088 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,843,781 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,851,553 UART: [afmc] --
2,852,575 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,852,597 UART: [cold-reset] --
2,853,627 UART: [state] Locking Datavault
2,854,734 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,338 UART: [state] Locking ICCM
2,855,842 UART: [exit] Launching FMC @ 0x40000000
2,861,139 UART:
2,861,155 UART: Running Caliptra FMC ...
2,861,563 UART:
2,861,793 UART: [fmc] Received command: 0x1000000A
2,868,024 >>> mbox cmd response data (928 bytes)
2,868,025 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,868,054 UART: [fmc] Received command: 0x10000009
2,869,252 >>> mbox cmd response data (48 bytes)
2,869,253 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,869,282 UART: [fmc] Received command: 0x10000003
2,878,738 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,006 >>> mbox cmd response data (12 bytes)
1,140,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,604 >>> mbox cmd response data (12 bytes)
1,143,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,130 >>> mbox cmd response data (12 bytes)
1,147,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,646 >>> mbox cmd response data (12 bytes)
1,150,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,162 >>> mbox cmd response data (12 bytes)
1,154,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,746 >>> mbox cmd response data (12 bytes)
1,157,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,180 >>> mbox cmd response data (12 bytes)
1,161,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,672 >>> mbox cmd response data (12 bytes)
1,164,673 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,617,687 >>> mbox cmd response: success
2,672,836 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,678,903 UART:
2,678,919 UART: Running Caliptra FMC ...
2,679,327 UART:
2,679,557 UART: [fmc] Received command: 0x1000000A
2,685,788 >>> mbox cmd response data (928 bytes)
2,685,789 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,685,818 UART: [fmc] Received command: 0x10000009
2,687,016 >>> mbox cmd response data (48 bytes)
2,687,017 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,687,046 UART: [fmc] Received command: 0x10000003
2,696,502 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,450 UART: [idev] ++
1,173,618 UART: [idev] CDI.KEYID = 6
1,173,979 UART: [idev] SUBJECT.KEYID = 7
1,174,404 UART: [idev] UDS.KEYID = 0
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,814 UART: [idev] Sha1 KeyId Algorithm
1,208,828 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,235 UART: [ldev] --
1,282,683 UART: [fwproc] Wait for Commands...
1,283,334 UART: [fwproc] Recv command 0x4d454153
1,287,361 >>> mbox cmd response data (12 bytes)
1,287,362 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,597 UART: [fwproc] Recv command 0x4d454153
1,291,624 >>> mbox cmd response data (12 bytes)
1,291,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,790 UART: [fwproc] Recv command 0x4d454153
1,295,817 >>> mbox cmd response data (12 bytes)
1,295,818 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,093 UART: [fwproc] Recv command 0x4d454153
1,300,120 >>> mbox cmd response data (12 bytes)
1,300,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,286 UART: [fwproc] Recv command 0x4d454153
1,304,313 >>> mbox cmd response data (12 bytes)
1,304,314 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,625 UART: [fwproc] Recv command 0x4d454153
1,308,652 >>> mbox cmd response data (12 bytes)
1,308,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,806 UART: [fwproc] Recv command 0x4d454153
1,312,833 >>> mbox cmd response data (12 bytes)
1,312,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,129 UART: [fwproc] Recv command 0x4d454153
1,317,156 >>> mbox cmd response data (12 bytes)
1,317,157 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,317,452 UART: [fwproc] Recv command 0x46574c44
1,318,185 UART: [fwproc] Recv'd Img size: 111752 bytes
2,585,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,913 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,222 >>> mbox cmd response: success
2,775,255 UART: [afmc] ++
2,775,423 UART: [afmc] CDI.KEYID = 6
2,775,786 UART: [afmc] SUBJECT.KEYID = 7
2,776,212 UART: [afmc] AUTHORITY.KEYID = 5
2,811,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,580 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,834,276 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,840,175 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,845,868 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,853,712 UART: [afmc] --
2,854,710 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,854,732 UART: [cold-reset] --
2,855,470 UART: [state] Locking Datavault
2,856,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,455 UART: [state] Locking ICCM
2,857,893 UART: [exit] Launching FMC @ 0x40000000
2,863,190 UART:
2,863,206 UART: Running Caliptra FMC ...
2,863,614 UART:
2,863,844 UART: [fmc] Received command: 0x1000000A
2,870,075 >>> mbox cmd response data (928 bytes)
2,870,076 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,870,105 UART: [fmc] Received command: 0x10000009
2,871,303 >>> mbox cmd response data (48 bytes)
2,871,304 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,333 UART: [fmc] Received command: 0x10000003
2,880,789 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,255 >>> mbox cmd response data (12 bytes)
1,139,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,865 >>> mbox cmd response data (12 bytes)
1,142,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,399 >>> mbox cmd response data (12 bytes)
1,146,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,949 >>> mbox cmd response data (12 bytes)
1,149,950 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,435 >>> mbox cmd response data (12 bytes)
1,153,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,045 >>> mbox cmd response data (12 bytes)
1,157,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,579 >>> mbox cmd response data (12 bytes)
1,160,580 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,093 >>> mbox cmd response data (12 bytes)
1,164,094 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,616,542 >>> mbox cmd response: success
2,672,345 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,678,444 UART:
2,678,460 UART: Running Caliptra FMC ...
2,678,868 UART:
2,679,098 UART: [fmc] Received command: 0x1000000A
2,685,329 >>> mbox cmd response data (928 bytes)
2,685,330 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,685,359 UART: [fmc] Received command: 0x10000009
2,686,557 >>> mbox cmd response data (48 bytes)
2,686,558 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,686,587 UART: [fmc] Received command: 0x10000003
2,696,043 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,087 UART:
192,455 UART: Running Caliptra ROM ...
193,633 UART:
193,788 UART: [state] CFI Enabled
265,590 UART: [state] LifecycleState = Unprovisioned
267,963 UART: [state] DebugLocked = No
270,688 UART: [state] WD Timer not started. Device not locked for debugging
275,311 UART: [kat] SHA2-256
457,245 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,756 UART: [kat] ++
469,336 UART: [kat] sha1
480,162 UART: [kat] SHA2-256
483,162 UART: [kat] SHA2-384
489,565 UART: [kat] SHA2-512-ACC
492,193 UART: [kat] ECC-384
3,773,392 UART: [kat] HMAC-384Kdf
3,793,947 UART: [kat] LMS
4,867,105 UART: [kat] --
4,874,182 UART: [cold-reset] ++
4,875,301 UART: [fht] FHT @ 0x50003400
4,887,357 UART: [idev] ++
4,888,025 UART: [idev] CDI.KEYID = 6
4,889,255 UART: [idev] SUBJECT.KEYID = 7
4,890,355 UART: [idev] UDS.KEYID = 0
4,922,759 UART: [idev] Erasing UDS.KEYID = 0
8,236,046 UART: [idev] Sha1 KeyId Algorithm
8,259,136 UART: [idev] --
8,264,829 UART: [ldev] ++
8,265,459 UART: [ldev] CDI.KEYID = 6
8,266,639 UART: [ldev] SUBJECT.KEYID = 5
8,267,815 UART: [ldev] AUTHORITY.KEYID = 7
8,269,043 UART: [ldev] FE.KEYID = 1
8,310,967 UART: [ldev] Erasing FE.KEYID = 1
11,644,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,956,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,972,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,988,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,004,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,024,662 UART: [ldev] --
14,029,025 UART: [fwproc] Wait for Commands...
14,032,047 UART: [fwproc] Recv command 0x4d454153
14,041,080 >>> mbox cmd response data (12 bytes)
14,041,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,042,601 UART: [fwproc] Recv command 0x4d454153
14,051,523 >>> mbox cmd response data (12 bytes)
14,051,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,053,668 UART: [fwproc] Recv command 0x4d454153
14,062,597 >>> mbox cmd response data (12 bytes)
14,063,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,063,529 UART: [fwproc] Recv command 0x4d454153
14,072,392 >>> mbox cmd response data (12 bytes)
14,072,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,074,182 UART: [fwproc] Recv command 0x4d454153
14,083,056 >>> mbox cmd response data (12 bytes)
14,083,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,084,250 UART: [fwproc] Recv command 0x4d454153
14,093,113 >>> mbox cmd response data (12 bytes)
14,093,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,094,520 UART: [fwproc] Recv command 0x4d454153
14,103,453 >>> mbox cmd response data (12 bytes)
14,103,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,105,686 UART: [fwproc] Recv command 0x4d454153
14,114,567 >>> mbox cmd response data (12 bytes)
14,114,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,116,791 UART: [fwproc] Recv command 0x4d454153
14,119,122 UART: [fwproc] Max # of measurements received.
14,120,946 >>> mbox cmd response: failed
14,122,945 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,812,608 >>> mbox cmd response data (12 bytes)
13,813,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,822,374 >>> mbox cmd response data (12 bytes)
13,822,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,830,208 >>> mbox cmd response data (12 bytes)
13,830,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,838,380 >>> mbox cmd response data (12 bytes)
13,838,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,846,555 >>> mbox cmd response data (12 bytes)
13,846,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,854,609 >>> mbox cmd response data (12 bytes)
13,855,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,862,912 >>> mbox cmd response data (12 bytes)
13,863,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,871,057 >>> mbox cmd response data (12 bytes)
13,871,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,872,439 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,519 UART:
192,901 UART: Running Caliptra ROM ...
194,023 UART:
603,674 UART: [state] CFI Enabled
617,961 UART: [state] LifecycleState = Unprovisioned
620,331 UART: [state] DebugLocked = No
623,222 UART: [state] WD Timer not started. Device not locked for debugging
628,319 UART: [kat] SHA2-256
810,293 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,829 UART: [kat] ++
822,329 UART: [kat] sha1
833,553 UART: [kat] SHA2-256
836,607 UART: [kat] SHA2-384
841,938 UART: [kat] SHA2-512-ACC
844,550 UART: [kat] ECC-384
4,101,502 UART: [kat] HMAC-384Kdf
4,114,349 UART: [kat] LMS
5,187,489 UART: [kat] --
5,192,432 UART: [cold-reset] ++
5,194,319 UART: [fht] FHT @ 0x50003400
5,205,997 UART: [idev] ++
5,206,698 UART: [idev] CDI.KEYID = 6
5,207,884 UART: [idev] SUBJECT.KEYID = 7
5,209,319 UART: [idev] UDS.KEYID = 0
5,224,509 UART: [idev] Erasing UDS.KEYID = 0
8,500,222 UART: [idev] Sha1 KeyId Algorithm
8,522,367 UART: [idev] --
8,525,091 UART: [ldev] ++
8,525,672 UART: [ldev] CDI.KEYID = 6
8,526,858 UART: [ldev] SUBJECT.KEYID = 5
8,528,342 UART: [ldev] AUTHORITY.KEYID = 7
8,529,890 UART: [ldev] FE.KEYID = 1
8,540,527 UART: [ldev] Erasing FE.KEYID = 1
11,832,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,396 UART: [ldev] --
14,200,883 UART: [fwproc] Wait for Commands...
14,203,681 UART: [fwproc] Recv command 0x4d454153
14,212,697 >>> mbox cmd response data (12 bytes)
14,213,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,213,964 UART: [fwproc] Recv command 0x4d454153
14,222,879 >>> mbox cmd response data (12 bytes)
14,223,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,224,336 UART: [fwproc] Recv command 0x4d454153
14,233,253 >>> mbox cmd response data (12 bytes)
14,233,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,235,183 UART: [fwproc] Recv command 0x4d454153
14,244,092 >>> mbox cmd response data (12 bytes)
14,244,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,245,984 UART: [fwproc] Recv command 0x4d454153
14,254,912 >>> mbox cmd response data (12 bytes)
14,255,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,256,630 UART: [fwproc] Recv command 0x4d454153
14,265,531 >>> mbox cmd response data (12 bytes)
14,265,942 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,266,609 UART: [fwproc] Recv command 0x4d454153
14,275,535 >>> mbox cmd response data (12 bytes)
14,276,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,277,381 UART: [fwproc] Recv command 0x4d454153
14,285,967 >>> mbox cmd response data (12 bytes)
14,286,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,287,273 UART: [fwproc] Recv command 0x4d454153
14,289,268 UART: [fwproc] Max # of measurements received.
14,291,090 >>> mbox cmd response: failed
14,294,004 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,015,984 >>> mbox cmd response data (12 bytes)
14,017,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,024,594 >>> mbox cmd response data (12 bytes)
14,025,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,033,769 >>> mbox cmd response data (12 bytes)
14,034,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,041,339 >>> mbox cmd response data (12 bytes)
14,041,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,049,400 >>> mbox cmd response data (12 bytes)
14,049,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,057,821 >>> mbox cmd response data (12 bytes)
14,058,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,066,639 >>> mbox cmd response data (12 bytes)
14,067,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,074,273 >>> mbox cmd response data (12 bytes)
14,074,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,075,293 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,209 UART:
192,580 UART: Running Caliptra ROM ...
193,755 UART:
193,914 UART: [state] CFI Enabled
263,633 UART: [state] LifecycleState = Unprovisioned
265,518 UART: [state] DebugLocked = No
267,431 UART: [state] WD Timer not started. Device not locked for debugging
271,609 UART: [kat] SHA2-256
450,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,290 UART: [kat] ++
462,818 UART: [kat] sha1
473,714 UART: [kat] SHA2-256
476,769 UART: [kat] SHA2-384
483,132 UART: [kat] SHA2-512-ACC
486,067 UART: [kat] ECC-384
2,946,397 UART: [kat] HMAC-384Kdf
2,968,971 UART: [kat] LMS
3,498,428 UART: [kat] --
3,502,152 UART: [cold-reset] ++
3,504,513 UART: [fht] FHT @ 0x50003400
3,514,670 UART: [idev] ++
3,515,253 UART: [idev] CDI.KEYID = 6
3,516,135 UART: [idev] SUBJECT.KEYID = 7
3,517,403 UART: [idev] UDS.KEYID = 0
3,542,111 UART: [idev] Erasing UDS.KEYID = 0
6,022,860 UART: [idev] Sha1 KeyId Algorithm
6,045,089 UART: [idev] --
6,048,448 UART: [ldev] ++
6,049,020 UART: [ldev] CDI.KEYID = 6
6,049,944 UART: [ldev] SUBJECT.KEYID = 5
6,051,106 UART: [ldev] AUTHORITY.KEYID = 7
6,052,394 UART: [ldev] FE.KEYID = 1
6,096,397 UART: [ldev] Erasing FE.KEYID = 1
8,600,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,836 UART: [ldev] --
10,411,087 UART: [fwproc] Wait for Commands...
10,413,839 UART: [fwproc] Recv command 0x4d454153
10,422,370 >>> mbox cmd response data (12 bytes)
10,422,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,423,576 UART: [fwproc] Recv command 0x4d454153
10,432,065 >>> mbox cmd response data (12 bytes)
10,432,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,433,707 UART: [fwproc] Recv command 0x4d454153
10,442,190 >>> mbox cmd response data (12 bytes)
10,442,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,443,215 UART: [fwproc] Recv command 0x4d454153
10,451,644 >>> mbox cmd response data (12 bytes)
10,452,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,452,913 UART: [fwproc] Recv command 0x4d454153
10,461,399 >>> mbox cmd response data (12 bytes)
10,461,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,462,960 UART: [fwproc] Recv command 0x4d454153
10,471,416 >>> mbox cmd response data (12 bytes)
10,471,881 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,472,448 UART: [fwproc] Recv command 0x4d454153
10,480,887 >>> mbox cmd response data (12 bytes)
10,481,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,483,329 UART: [fwproc] Recv command 0x4d454153
10,491,765 >>> mbox cmd response data (12 bytes)
10,492,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,493,293 UART: [fwproc] Recv command 0x4d454153
10,495,346 UART: [fwproc] Max # of measurements received.
10,497,178 >>> mbox cmd response: failed
10,499,553 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,207,795 >>> mbox cmd response data (12 bytes)
10,208,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,216,743 >>> mbox cmd response data (12 bytes)
10,217,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,224,523 >>> mbox cmd response data (12 bytes)
10,224,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,232,578 >>> mbox cmd response data (12 bytes)
10,232,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,240,461 >>> mbox cmd response data (12 bytes)
10,240,870 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,247,965 >>> mbox cmd response data (12 bytes)
10,248,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,255,726 >>> mbox cmd response data (12 bytes)
10,256,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,263,094 >>> mbox cmd response data (12 bytes)
10,263,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,264,719 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
4,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,430 UART:
192,801 UART: Running Caliptra ROM ...
193,978 UART:
603,737 UART: [state] CFI Enabled
614,266 UART: [state] LifecycleState = Unprovisioned
616,118 UART: [state] DebugLocked = No
618,408 UART: [state] WD Timer not started. Device not locked for debugging
621,286 UART: [kat] SHA2-256
800,398 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,972 UART: [kat] ++
812,501 UART: [kat] sha1
822,305 UART: [kat] SHA2-256
825,309 UART: [kat] SHA2-384
831,281 UART: [kat] SHA2-512-ACC
834,263 UART: [kat] ECC-384
3,272,331 UART: [kat] HMAC-384Kdf
3,284,521 UART: [kat] LMS
3,814,010 UART: [kat] --
3,819,751 UART: [cold-reset] ++
3,822,224 UART: [fht] FHT @ 0x50003400
3,832,842 UART: [idev] ++
3,833,445 UART: [idev] CDI.KEYID = 6
3,834,361 UART: [idev] SUBJECT.KEYID = 7
3,835,572 UART: [idev] UDS.KEYID = 0
3,853,001 UART: [idev] Erasing UDS.KEYID = 0
6,310,732 UART: [idev] Sha1 KeyId Algorithm
6,334,660 UART: [idev] --
6,339,787 UART: [ldev] ++
6,340,351 UART: [ldev] CDI.KEYID = 6
6,341,257 UART: [ldev] SUBJECT.KEYID = 5
6,342,412 UART: [ldev] AUTHORITY.KEYID = 7
6,343,692 UART: [ldev] FE.KEYID = 1
6,353,969 UART: [ldev] Erasing FE.KEYID = 1
8,829,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,628 UART: [ldev] --
10,620,347 UART: [fwproc] Wait for Commands...
10,623,410 UART: [fwproc] Recv command 0x4d454153
10,631,938 >>> mbox cmd response data (12 bytes)
10,632,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,633,511 UART: [fwproc] Recv command 0x4d454153
10,641,995 >>> mbox cmd response data (12 bytes)
10,642,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,643,795 UART: [fwproc] Recv command 0x4d454153
10,652,269 >>> mbox cmd response data (12 bytes)
10,652,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,654,114 UART: [fwproc] Recv command 0x4d454153
10,662,593 >>> mbox cmd response data (12 bytes)
10,663,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,663,964 UART: [fwproc] Recv command 0x4d454153
10,672,388 >>> mbox cmd response data (12 bytes)
10,672,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,674,063 UART: [fwproc] Recv command 0x4d454153
10,682,496 >>> mbox cmd response data (12 bytes)
10,682,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,683,470 UART: [fwproc] Recv command 0x4d454153
10,691,891 >>> mbox cmd response data (12 bytes)
10,692,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,692,873 UART: [fwproc] Recv command 0x4d454153
10,701,357 >>> mbox cmd response data (12 bytes)
10,701,778 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,702,289 UART: [fwproc] Recv command 0x4d454153
10,704,387 UART: [fwproc] Max # of measurements received.
10,706,215 >>> mbox cmd response: failed
10,709,521 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,331 writing to cptra_bootfsm_go
6,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,408,612 >>> mbox cmd response data (12 bytes)
10,409,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,416,904 >>> mbox cmd response data (12 bytes)
10,417,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,424,749 >>> mbox cmd response data (12 bytes)
10,425,171 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,433,081 >>> mbox cmd response data (12 bytes)
10,433,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,441,308 >>> mbox cmd response data (12 bytes)
10,441,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,449,040 >>> mbox cmd response data (12 bytes)
10,449,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,456,667 >>> mbox cmd response data (12 bytes)
10,457,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,464,796 >>> mbox cmd response data (12 bytes)
10,465,227 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,466,641 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,967 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,360 UART:
192,722 UART: Running Caliptra ROM ...
193,899 UART:
194,052 UART: [state] CFI Enabled
260,707 UART: [state] LifecycleState = Unprovisioned
262,589 UART: [state] DebugLocked = No
264,289 UART: [state] WD Timer not started. Device not locked for debugging
267,768 UART: [kat] SHA2-256
446,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,448 UART: [kat] ++
458,979 UART: [kat] sha1
469,568 UART: [kat] SHA2-256
472,580 UART: [kat] SHA2-384
479,538 UART: [kat] SHA2-512-ACC
482,471 UART: [kat] ECC-384
2,945,966 UART: [kat] HMAC-384Kdf
2,970,191 UART: [kat] LMS
3,499,674 UART: [kat] --
3,503,671 UART: [cold-reset] ++
3,505,768 UART: [fht] FHT @ 0x50003400
3,516,429 UART: [idev] ++
3,516,998 UART: [idev] CDI.KEYID = 6
3,518,060 UART: [idev] SUBJECT.KEYID = 7
3,519,167 UART: [idev] UDS.KEYID = 0
3,542,872 UART: [idev] Erasing UDS.KEYID = 0
6,027,370 UART: [idev] Sha1 KeyId Algorithm
6,049,835 UART: [idev] --
6,053,991 UART: [ldev] ++
6,054,586 UART: [ldev] CDI.KEYID = 6
6,055,478 UART: [ldev] SUBJECT.KEYID = 5
6,056,596 UART: [ldev] AUTHORITY.KEYID = 7
6,057,800 UART: [ldev] FE.KEYID = 1
6,099,629 UART: [ldev] Erasing FE.KEYID = 1
8,605,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,900 UART: [ldev] --
10,413,271 UART: [fwproc] Wait for Commands...
10,415,261 UART: [fwproc] Recv command 0x4d454153
10,423,796 >>> mbox cmd response data (12 bytes)
10,424,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,425,554 UART: [fwproc] Recv command 0x4d454153
10,434,059 >>> mbox cmd response data (12 bytes)
10,434,488 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,435,478 UART: [fwproc] Recv command 0x4d454153
10,443,964 >>> mbox cmd response data (12 bytes)
10,444,373 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,445,689 UART: [fwproc] Recv command 0x4d454153
10,454,120 >>> mbox cmd response data (12 bytes)
10,454,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,455,038 UART: [fwproc] Recv command 0x4d454153
10,463,437 >>> mbox cmd response data (12 bytes)
10,463,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,465,263 UART: [fwproc] Recv command 0x4d454153
10,473,703 >>> mbox cmd response data (12 bytes)
10,474,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,474,790 UART: [fwproc] Recv command 0x4d454153
10,483,271 >>> mbox cmd response data (12 bytes)
10,483,710 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,485,287 UART: [fwproc] Recv command 0x4d454153
10,493,720 >>> mbox cmd response data (12 bytes)
10,494,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,494,640 UART: [fwproc] Recv command 0x4d454153
10,496,689 UART: [fwproc] Max # of measurements received. 10,498,327 >>> mbox cmd response: failed
10,501,247 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,211,518 >>> mbox cmd response data (12 bytes)
10,212,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,219,800 >>> mbox cmd response data (12 bytes)
10,220,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,228,038 >>> mbox cmd response data (12 bytes)
10,228,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,235,519 >>> mbox cmd response data (12 bytes)
10,235,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,243,574 >>> mbox cmd response data (12 bytes)
10,243,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,251,825 >>> mbox cmd response data (12 bytes)
10,252,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,259,225 >>> mbox cmd response data (12 bytes)
10,259,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,266,896 >>> mbox cmd response data (12 bytes)
10,267,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,268,228 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
4,095 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,431 UART:
192,823 UART: Running Caliptra ROM ...
194,007 UART:
603,609 UART: [state] CFI Enabled
618,830 UART: [state] LifecycleState = Unprovisioned
620,688 UART: [state] DebugLocked = No
622,546 UART: [state] WD Timer not started. Device not locked for debugging
625,972 UART: [kat] SHA2-256
805,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,692 UART: [kat] ++
817,145 UART: [kat] sha1
826,883 UART: [kat] SHA2-256
829,948 UART: [kat] SHA2-384
835,433 UART: [kat] SHA2-512-ACC
838,361 UART: [kat] ECC-384
3,279,143 UART: [kat] HMAC-384Kdf
3,291,813 UART: [kat] LMS
3,821,302 UART: [kat] --
3,826,269 UART: [cold-reset] ++
3,828,581 UART: [fht] FHT @ 0x50003400
3,839,556 UART: [idev] ++
3,840,123 UART: [idev] CDI.KEYID = 6
3,841,092 UART: [idev] SUBJECT.KEYID = 7
3,842,255 UART: [idev] UDS.KEYID = 0
3,859,310 UART: [idev] Erasing UDS.KEYID = 0
6,317,306 UART: [idev] Sha1 KeyId Algorithm
6,341,136 UART: [idev] --
6,343,619 UART: [ldev] ++
6,344,183 UART: [ldev] CDI.KEYID = 6
6,345,090 UART: [ldev] SUBJECT.KEYID = 5
6,346,253 UART: [ldev] AUTHORITY.KEYID = 7
6,347,538 UART: [ldev] FE.KEYID = 1
6,358,454 UART: [ldev] Erasing FE.KEYID = 1
8,828,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,973 UART: [ldev] --
10,621,494 UART: [fwproc] Wait for Commands...
10,623,810 UART: [fwproc] Recv command 0x4d454153
10,632,309 >>> mbox cmd response data (12 bytes)
10,632,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,634,575 UART: [fwproc] Recv command 0x4d454153
10,643,066 >>> mbox cmd response data (12 bytes)
10,643,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,644,764 UART: [fwproc] Recv command 0x4d454153
10,653,248 >>> mbox cmd response data (12 bytes)
10,653,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,654,667 UART: [fwproc] Recv command 0x4d454153
10,663,146 >>> mbox cmd response data (12 bytes)
10,663,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,664,497 UART: [fwproc] Recv command 0x4d454153
10,672,974 >>> mbox cmd response data (12 bytes)
10,673,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,674,224 UART: [fwproc] Recv command 0x4d454153
10,682,666 >>> mbox cmd response data (12 bytes)
10,683,140 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,683,710 UART: [fwproc] Recv command 0x4d454153
10,692,143 >>> mbox cmd response data (12 bytes)
10,692,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,693,562 UART: [fwproc] Recv command 0x4d454153
10,701,999 >>> mbox cmd response data (12 bytes)
10,702,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,704,064 UART: [fwproc] Recv command 0x4d454153
10,706,116 UART: [fwproc] Max # of measurements received.
10,707,943 >>> mbox cmd response: failed
10,710,102 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,411,051 >>> mbox cmd response data (12 bytes)
10,412,125 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,419,999 >>> mbox cmd response data (12 bytes)
10,420,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,428,769 >>> mbox cmd response data (12 bytes)
10,429,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,436,831 >>> mbox cmd response data (12 bytes)
10,437,245 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,445,155 >>> mbox cmd response data (12 bytes)
10,445,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,453,176 >>> mbox cmd response data (12 bytes)
10,453,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,461,602 >>> mbox cmd response data (12 bytes)
10,462,034 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,469,029 >>> mbox cmd response data (12 bytes)
10,469,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,470,928 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
891,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,024 UART: [kat] SHA2-512-ACC
905,925 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,342 UART: [kat] LMS
1,168,654 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,651 UART: [idev] ++
1,172,819 UART: [idev] CDI.KEYID = 6
1,173,180 UART: [idev] SUBJECT.KEYID = 7
1,173,605 UART: [idev] UDS.KEYID = 0
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,199,061 UART: [idev] Sha1 KeyId Algorithm
1,207,973 UART: [idev] --
1,208,950 UART: [ldev] ++
1,209,118 UART: [ldev] CDI.KEYID = 6
1,209,482 UART: [ldev] SUBJECT.KEYID = 5
1,209,909 UART: [ldev] AUTHORITY.KEYID = 7
1,210,372 UART: [ldev] FE.KEYID = 1
1,215,450 UART: [ldev] Erasing FE.KEYID = 1
1,241,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,280,966 UART: [fwproc] Wait for Commands...
1,281,789 UART: [fwproc] Recv command 0x4d454153
1,285,816 >>> mbox cmd response data (12 bytes)
1,285,817 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,078 UART: [fwproc] Recv command 0x4d454153
1,290,105 >>> mbox cmd response data (12 bytes)
1,290,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,283 UART: [fwproc] Recv command 0x4d454153
1,294,310 >>> mbox cmd response data (12 bytes)
1,294,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,468 UART: [fwproc] Recv command 0x4d454153
1,298,495 >>> mbox cmd response data (12 bytes)
1,298,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,655 UART: [fwproc] Recv command 0x4d454153
1,302,682 >>> mbox cmd response data (12 bytes)
1,302,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,992 UART: [fwproc] Recv command 0x4d454153
1,307,019 >>> mbox cmd response data (12 bytes)
1,307,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,169 UART: [fwproc] Recv command 0x4d454153
1,311,196 >>> mbox cmd response data (12 bytes)
1,311,197 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,506 UART: [fwproc] Recv command 0x4d454153
1,315,533 >>> mbox cmd response data (12 bytes)
1,315,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,623 UART: [fwproc] Recv command 0x4d454153
1,316,366 UART: [fwproc] Max # of measurements received.
1,317,011 >>> mbox cmd response: failed
1,317,421 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,662 >>> mbox cmd response data (12 bytes)
1,139,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,182 >>> mbox cmd response data (12 bytes)
1,143,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,744 >>> mbox cmd response data (12 bytes)
1,146,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,282 >>> mbox cmd response data (12 bytes)
1,150,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,846 >>> mbox cmd response data (12 bytes)
1,153,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,232 >>> mbox cmd response data (12 bytes)
1,157,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,760 >>> mbox cmd response data (12 bytes)
1,160,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,248 >>> mbox cmd response data (12 bytes)
1,164,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,520 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,857 UART: [kat] LMS
1,169,169 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,284 UART: [idev] ++
1,173,452 UART: [idev] CDI.KEYID = 6
1,173,813 UART: [idev] SUBJECT.KEYID = 7
1,174,238 UART: [idev] UDS.KEYID = 0
1,182,594 UART: [idev] Erasing UDS.KEYID = 0
1,199,862 UART: [idev] Sha1 KeyId Algorithm
1,208,766 UART: [idev] --
1,209,867 UART: [ldev] ++
1,210,035 UART: [ldev] CDI.KEYID = 6
1,210,399 UART: [ldev] SUBJECT.KEYID = 5
1,210,826 UART: [ldev] AUTHORITY.KEYID = 7
1,211,289 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,243,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,409 UART: [ldev] --
1,282,715 UART: [fwproc] Wait for Commands...
1,283,404 UART: [fwproc] Recv command 0x4d454153
1,287,431 >>> mbox cmd response data (12 bytes)
1,287,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,681 UART: [fwproc] Recv command 0x4d454153
1,291,708 >>> mbox cmd response data (12 bytes)
1,291,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,916 UART: [fwproc] Recv command 0x4d454153
1,295,943 >>> mbox cmd response data (12 bytes)
1,295,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,047 UART: [fwproc] Recv command 0x4d454153
1,300,074 >>> mbox cmd response data (12 bytes)
1,300,075 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,362 UART: [fwproc] Recv command 0x4d454153
1,304,389 >>> mbox cmd response data (12 bytes)
1,304,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,701 UART: [fwproc] Recv command 0x4d454153
1,308,728 >>> mbox cmd response data (12 bytes)
1,308,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,000 UART: [fwproc] Recv command 0x4d454153
1,313,027 >>> mbox cmd response data (12 bytes)
1,313,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,335 UART: [fwproc] Recv command 0x4d454153
1,317,362 >>> mbox cmd response data (12 bytes)
1,317,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,562 UART: [fwproc] Recv command 0x4d454153
1,318,305 UART: [fwproc] Max # of measurements received.
1,318,950 >>> mbox cmd response: failed
1,319,482 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,095 >>> mbox cmd response data (12 bytes)
1,141,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,567 >>> mbox cmd response data (12 bytes)
1,144,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,003 >>> mbox cmd response data (12 bytes)
1,148,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,451 >>> mbox cmd response data (12 bytes)
1,151,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,873 >>> mbox cmd response data (12 bytes)
1,154,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,269 >>> mbox cmd response data (12 bytes)
1,158,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,725 >>> mbox cmd response data (12 bytes)
1,161,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,173 >>> mbox cmd response data (12 bytes)
1,165,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,365 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,105 UART: [kat] ++
895,257 UART: [kat] sha1
899,371 UART: [kat] SHA2-256
901,311 UART: [kat] SHA2-384
903,892 UART: [kat] SHA2-512-ACC
905,793 UART: [kat] ECC-384
915,412 UART: [kat] HMAC-384Kdf
920,148 UART: [kat] LMS
1,168,460 UART: [kat] --
1,169,123 UART: [cold-reset] ++
1,169,451 UART: [fht] FHT @ 0x50003400
1,172,097 UART: [idev] ++
1,172,265 UART: [idev] CDI.KEYID = 6
1,172,626 UART: [idev] SUBJECT.KEYID = 7
1,173,051 UART: [idev] UDS.KEYID = 0
1,181,231 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,233 UART: [idev] --
1,208,178 UART: [ldev] ++
1,208,346 UART: [ldev] CDI.KEYID = 6
1,208,710 UART: [ldev] SUBJECT.KEYID = 5
1,209,137 UART: [ldev] AUTHORITY.KEYID = 7
1,209,600 UART: [ldev] FE.KEYID = 1
1,214,656 UART: [ldev] Erasing FE.KEYID = 1
1,240,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,310 UART: [ldev] --
1,279,640 UART: [fwproc] Wait for Commands...
1,280,319 UART: [fwproc] Recv command 0x4d454153
1,284,346 >>> mbox cmd response data (12 bytes)
1,284,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,514 UART: [fwproc] Recv command 0x4d454153
1,288,541 >>> mbox cmd response data (12 bytes)
1,288,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,653 UART: [fwproc] Recv command 0x4d454153
1,292,680 >>> mbox cmd response data (12 bytes)
1,292,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,932 UART: [fwproc] Recv command 0x4d454153
1,296,959 >>> mbox cmd response data (12 bytes)
1,296,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,231 UART: [fwproc] Recv command 0x4d454153
1,301,258 >>> mbox cmd response data (12 bytes)
1,301,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,434 UART: [fwproc] Recv command 0x4d454153
1,305,461 >>> mbox cmd response data (12 bytes)
1,305,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,681 UART: [fwproc] Recv command 0x4d454153
1,309,708 >>> mbox cmd response data (12 bytes)
1,309,709 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,828 UART: [fwproc] Recv command 0x4d454153
1,313,855 >>> mbox cmd response data (12 bytes)
1,313,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,947 UART: [fwproc] Recv command 0x4d454153
1,314,690 UART: [fwproc] Max # of measurements received.
1,315,335 >>> mbox cmd response: failed
1,315,727 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,400 >>> mbox cmd response data (12 bytes)
1,138,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,794 >>> mbox cmd response data (12 bytes)
1,141,795 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,202 >>> mbox cmd response data (12 bytes)
1,145,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,798 >>> mbox cmd response data (12 bytes)
1,148,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,206 >>> mbox cmd response data (12 bytes)
1,152,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,606 >>> mbox cmd response data (12 bytes)
1,155,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,084 >>> mbox cmd response data (12 bytes)
1,159,085 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,662 >>> mbox cmd response data (12 bytes)
1,162,663 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,972 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,078 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [kat] SHA2-256
891,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,896 UART: [kat] ++
896,048 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
905,161 UART: [kat] SHA2-512-ACC
907,062 UART: [kat] ECC-384
916,717 UART: [kat] HMAC-384Kdf
921,215 UART: [kat] LMS
1,169,527 UART: [kat] --
1,170,438 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,572 UART: [idev] ++
1,173,740 UART: [idev] CDI.KEYID = 6
1,174,101 UART: [idev] SUBJECT.KEYID = 7
1,174,526 UART: [idev] UDS.KEYID = 0
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,862 UART: [idev] Sha1 KeyId Algorithm
1,208,908 UART: [idev] --
1,209,927 UART: [ldev] ++
1,210,095 UART: [ldev] CDI.KEYID = 6
1,210,459 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,243,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,081 UART: [ldev] --
1,282,543 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x4d454153
1,287,161 >>> mbox cmd response data (12 bytes)
1,287,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,399 UART: [fwproc] Recv command 0x4d454153
1,291,426 >>> mbox cmd response data (12 bytes)
1,291,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,720 UART: [fwproc] Recv command 0x4d454153
1,295,747 >>> mbox cmd response data (12 bytes)
1,295,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,871 UART: [fwproc] Recv command 0x4d454153
1,299,898 >>> mbox cmd response data (12 bytes)
1,299,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,164 UART: [fwproc] Recv command 0x4d454153
1,304,191 >>> mbox cmd response data (12 bytes)
1,304,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,499 UART: [fwproc] Recv command 0x4d454153
1,308,526 >>> mbox cmd response data (12 bytes)
1,308,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,590 UART: [fwproc] Recv command 0x4d454153
1,312,617 >>> mbox cmd response data (12 bytes)
1,312,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,733 UART: [fwproc] Recv command 0x4d454153
1,316,760 >>> mbox cmd response data (12 bytes)
1,316,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,040 UART: [fwproc] Recv command 0x4d454153
1,317,783 UART: [fwproc] Max # of measurements received.
1,318,428 >>> mbox cmd response: failed
1,318,836 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,597 >>> mbox cmd response data (12 bytes)
1,140,598 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,215 >>> mbox cmd response data (12 bytes)
1,144,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,829 >>> mbox cmd response data (12 bytes)
1,147,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,227 >>> mbox cmd response data (12 bytes)
1,151,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,689 >>> mbox cmd response data (12 bytes)
1,154,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,149 >>> mbox cmd response data (12 bytes)
1,158,150 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,761 >>> mbox cmd response data (12 bytes)
1,161,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,281 >>> mbox cmd response data (12 bytes)
1,165,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,415 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,529 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,586 UART: [ldev] ++
1,208,754 UART: [ldev] CDI.KEYID = 6
1,209,118 UART: [ldev] SUBJECT.KEYID = 5
1,209,545 UART: [ldev] AUTHORITY.KEYID = 7
1,210,008 UART: [ldev] FE.KEYID = 1
1,215,328 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,444 UART: [ldev] --
1,280,958 UART: [fwproc] Wait for Commands...
1,281,745 UART: [fwproc] Recv command 0x4d454153
1,285,772 >>> mbox cmd response data (12 bytes)
1,285,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,004 UART: [fwproc] Recv command 0x4d454153
1,290,031 >>> mbox cmd response data (12 bytes)
1,290,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,259 UART: [fwproc] Recv command 0x4d454153
1,294,286 >>> mbox cmd response data (12 bytes)
1,294,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,546 UART: [fwproc] Recv command 0x4d454153
1,298,573 >>> mbox cmd response data (12 bytes)
1,298,574 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,679 UART: [fwproc] Recv command 0x4d454153
1,302,706 >>> mbox cmd response data (12 bytes)
1,302,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,874 UART: [fwproc] Recv command 0x4d454153
1,306,901 >>> mbox cmd response data (12 bytes)
1,306,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,107 UART: [fwproc] Recv command 0x4d454153
1,311,134 >>> mbox cmd response data (12 bytes)
1,311,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,426 UART: [fwproc] Recv command 0x4d454153
1,315,453 >>> mbox cmd response data (12 bytes)
1,315,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,677 UART: [fwproc] Recv command 0x4d454153
1,316,420 UART: [fwproc] Max # of measurements received.
1,317,065 >>> mbox cmd response: failed
1,317,749 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,132 >>> mbox cmd response data (12 bytes)
1,140,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,634 >>> mbox cmd response data (12 bytes)
1,143,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,140 >>> mbox cmd response data (12 bytes)
1,147,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,574 >>> mbox cmd response data (12 bytes)
1,150,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,188 >>> mbox cmd response data (12 bytes)
1,154,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,792 >>> mbox cmd response data (12 bytes)
1,157,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,248 >>> mbox cmd response data (12 bytes)
1,161,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,778 >>> mbox cmd response data (12 bytes)
1,164,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,036 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,181,912 UART: [idev] Erasing UDS.KEYID = 0
1,199,592 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,371 UART: [fwproc] Wait for Commands...
1,283,062 UART: [fwproc] Recv command 0x4d454153
1,287,089 >>> mbox cmd response data (12 bytes)
1,287,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,299 UART: [fwproc] Recv command 0x4d454153
1,291,326 >>> mbox cmd response data (12 bytes)
1,291,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,606 UART: [fwproc] Recv command 0x4d454153
1,295,633 >>> mbox cmd response data (12 bytes)
1,295,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,905 UART: [fwproc] Recv command 0x4d454153
1,299,932 >>> mbox cmd response data (12 bytes)
1,299,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,088 UART: [fwproc] Recv command 0x4d454153
1,304,115 >>> mbox cmd response data (12 bytes)
1,304,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,327 UART: [fwproc] Recv command 0x4d454153
1,308,354 >>> mbox cmd response data (12 bytes)
1,308,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,560 UART: [fwproc] Recv command 0x4d454153
1,312,587 >>> mbox cmd response data (12 bytes)
1,312,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,855 UART: [fwproc] Recv command 0x4d454153
1,316,882 >>> mbox cmd response data (12 bytes)
1,316,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,176 UART: [fwproc] Recv command 0x4d454153
1,317,919 UART: [fwproc] Max # of measurements received.
1,318,564 >>> mbox cmd response: failed
1,319,166 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,301 >>> mbox cmd response data (12 bytes)
1,140,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,757 >>> mbox cmd response data (12 bytes)
1,143,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,129 >>> mbox cmd response data (12 bytes)
1,147,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,649 >>> mbox cmd response data (12 bytes)
1,150,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,039 >>> mbox cmd response data (12 bytes)
1,154,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,547 >>> mbox cmd response data (12 bytes)
1,157,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,151 >>> mbox cmd response data (12 bytes)
1,161,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,749 >>> mbox cmd response data (12 bytes)
1,164,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,817 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,214,389 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,355,346 UART:
2,355,766 UART: Running Caliptra ROM ...
2,356,942 UART:
2,357,115 UART: [state] CFI Enabled
2,358,074 UART: [state] LifecycleState = Unprovisioned
2,359,737 UART: [state] DebugLocked = No
2,360,846 UART: [state] WD Timer not started. Device not locked for debugging
2,363,317 UART: [kat] SHA2-256
2,364,006 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,367,028 UART: [kat] ++
2,367,484 UART: [kat] sha1
2,367,999 UART: [kat] SHA2-256
2,368,736 UART: [kat] SHA2-384
2,369,402 UART: [kat] SHA2-512-ACC
2,370,241 UART: [kat] ECC-384
3,773,910 UART: [kat] HMAC-384Kdf
3,802,922 UART: [kat] LMS
4,876,048 UART: [kat] --
4,881,047 UART: [cold-reset] ++
4,882,183 UART: [fht] FHT @ 0x50003400
4,892,408 UART: [idev] ++
4,893,079 UART: [idev] CDI.KEYID = 6
4,894,316 UART: [idev] SUBJECT.KEYID = 7
4,895,472 UART: [idev] UDS.KEYID = 0
4,929,083 UART: [idev] Erasing UDS.KEYID = 0
8,241,667 UART: [idev] Sha1 KeyId Algorithm
8,263,223 UART: [idev] --
8,266,185 UART: [ldev] ++
8,266,751 UART: [ldev] CDI.KEYID = 6
8,267,912 UART: [ldev] SUBJECT.KEYID = 5
8,269,124 UART: [ldev] AUTHORITY.KEYID = 7
8,270,275 UART: [ldev] FE.KEYID = 1
8,317,145 UART: [ldev] Erasing FE.KEYID = 1
11,651,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,993 UART: [ldev] --
14,035,950 UART: [fwproc] Wait for Commands...
14,039,190 UART: [fwproc] Recv command 0x46574c44
14,041,460 UART: [fwproc] Recv'd Img size: 111408 bytes
18,081,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,157,798 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,218,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,534,495 >>> mbox cmd response: success
18,537,689 UART: [afmc] ++
18,538,399 UART: [afmc] CDI.KEYID = 6
18,539,314 UART: [afmc] SUBJECT.KEYID = 7
18,540,474 UART: [afmc] AUTHORITY.KEYID = 5
21,901,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,200,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,202,444 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,218,634 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,234,763 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,250,569 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,273,135 UART: [afmc] --
24,277,120 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,277,559 UART: [cold-reset] --
24,281,407 UART: [state] Locking Datavault
24,285,473 UART: [state] Locking PCR0, PCR1 and PCR31
24,287,115 UART: [state] Locking ICCM
24,289,643 UART: [exit] Launching FMC @ 0x40000000
24,298,260 UART:
24,298,496 UART: Running Caliptra FMC ...
24,299,594 UART:
24,299,759 UART: [fmc] Received command: 0x10000009
24,301,305 >>> mbox cmd response data (48 bytes)
24,301,919 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,302,244 UART: [fmc] Received command: 0x1000000A
24,303,769 >>> mbox cmd response data (0 bytes)
24,304,038 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,304,370 UART: [fmc] Received command: 0x10000003
24,314,325 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,210,862 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,280,736 >>> mbox cmd response: success
23,956,764 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
23,971,373 UART:
23,971,709 UART: Running Caliptra FMC ...
23,972,798 UART:
23,972,951 UART: [fmc] Received command: 0x10000009
23,974,515 >>> mbox cmd response data (48 bytes)
23,975,069 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
23,975,391 UART: [fmc] Received command: 0x1000000A
23,976,988 >>> mbox cmd response data (0 bytes)
23,977,256 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
23,977,566 UART: [fmc] Received command: 0x10000003
23,987,535 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,223,938 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
2,365,053 UART:
2,365,463 UART: Running Caliptra ROM ...
2,366,629 UART:
2,366,795 UART: [state] CFI Enabled
2,367,751 UART: [state] LifecycleState = Unprovisioned
2,369,403 UART: [state] DebugLocked = No
2,370,519 UART: [state] WD Timer not started. Device not locked for debugging
2,372,992 UART: [kat] SHA2-256
2,373,652 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,376,653 UART: [kat] ++
2,377,098 UART: [kat] sha1
2,377,608 UART: [kat] SHA2-256
2,378,293 UART: [kat] SHA2-384
2,378,946 UART: [kat] SHA2-512-ACC
2,379,737 UART: [kat] ECC-384
4,098,713 UART: [kat] HMAC-384Kdf
4,110,860 UART: [kat] LMS
5,183,994 UART: [kat] --
5,188,184 UART: [cold-reset] ++
5,189,312 UART: [fht] FHT @ 0x50003400
5,199,936 UART: [idev] ++
5,200,655 UART: [idev] CDI.KEYID = 6
5,201,824 UART: [idev] SUBJECT.KEYID = 7
5,203,296 UART: [idev] UDS.KEYID = 0
5,217,843 UART: [idev] Erasing UDS.KEYID = 0
8,492,325 UART: [idev] Sha1 KeyId Algorithm
8,513,789 UART: [idev] --
8,517,187 UART: [ldev] ++
8,517,750 UART: [ldev] CDI.KEYID = 6
8,518,952 UART: [ldev] SUBJECT.KEYID = 5
8,520,451 UART: [ldev] AUTHORITY.KEYID = 7
8,521,928 UART: [ldev] FE.KEYID = 1
8,531,761 UART: [ldev] Erasing FE.KEYID = 1
11,820,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,146,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,625 UART: [ldev] --
14,187,615 UART: [fwproc] Wait for Commands...
14,189,874 UART: [fwproc] Recv command 0x46574c44
14,192,184 UART: [fwproc] Recv'd Img size: 111408 bytes
18,234,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,312,838 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,373,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,689,999 >>> mbox cmd response: success
18,693,906 UART: [afmc] ++
18,694,488 UART: [afmc] CDI.KEYID = 6
18,695,722 UART: [afmc] SUBJECT.KEYID = 7
18,696,821 UART: [afmc] AUTHORITY.KEYID = 5
22,018,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,314,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,316,452 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,332,620 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,348,788 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,364,595 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,386,422 UART: [afmc] --
24,389,535 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,389,895 UART: [cold-reset] --
24,394,754 UART: [state] Locking Datavault
24,400,533 UART: [state] Locking PCR0, PCR1 and PCR31
24,402,177 UART: [state] Locking ICCM
24,404,892 UART: [exit] Launching FMC @ 0x40000000
24,413,490 UART:
24,413,718 UART: Running Caliptra FMC ...
24,414,811 UART:
24,414,960 UART: [fmc] Received command: 0x10000009
24,416,523 >>> mbox cmd response data (48 bytes)
24,417,116 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,417,428 UART: [fmc] Received command: 0x1000000A
24,418,969 >>> mbox cmd response data (0 bytes)
24,419,226 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,419,520 UART: [fmc] Received command: 0x10000003
24,429,461 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,214,591 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,491,256 >>> mbox cmd response: success
24,112,932 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,127,183 UART:
24,127,544 UART: Running Caliptra FMC ...
24,128,630 UART:
24,128,776 UART: [fmc] Received command: 0x10000009
24,130,345 >>> mbox cmd response data (48 bytes)
24,130,920 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,131,233 UART: [fmc] Received command: 0x1000000A
24,132,833 >>> mbox cmd response data (0 bytes)
24,133,096 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,133,404 UART: [fmc] Received command: 0x10000003
24,143,348 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,215,863 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,357,432 UART:
2,357,852 UART: Running Caliptra ROM ...
2,359,014 UART:
2,359,196 UART: [state] CFI Enabled
2,360,158 UART: [state] LifecycleState = Unprovisioned
2,361,817 UART: [state] DebugLocked = No
2,362,931 UART: [state] WD Timer not started. Device not locked for debugging
2,365,429 UART: [kat] SHA2-256
2,366,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,369,120 UART: [kat] ++
2,369,571 UART: [kat] sha1
2,370,084 UART: [kat] SHA2-256
2,370,832 UART: [kat] SHA2-384
2,371,499 UART: [kat] SHA2-512-ACC
2,372,327 UART: [kat] ECC-384
2,949,050 UART: [kat] HMAC-384Kdf
2,971,447 UART: [kat] LMS
3,500,894 UART: [kat] --
3,505,156 UART: [cold-reset] ++
3,507,091 UART: [fht] FHT @ 0x50003400
3,518,292 UART: [idev] ++
3,518,858 UART: [idev] CDI.KEYID = 6
3,519,820 UART: [idev] SUBJECT.KEYID = 7
3,521,001 UART: [idev] UDS.KEYID = 0
3,543,581 UART: [idev] Erasing UDS.KEYID = 0
6,025,552 UART: [idev] Sha1 KeyId Algorithm
6,048,727 UART: [idev] --
6,051,866 UART: [ldev] ++
6,052,450 UART: [ldev] CDI.KEYID = 6
6,053,364 UART: [ldev] SUBJECT.KEYID = 5
6,054,529 UART: [ldev] AUTHORITY.KEYID = 7
6,055,766 UART: [ldev] FE.KEYID = 1
6,100,231 UART: [ldev] Erasing FE.KEYID = 1
8,608,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,796 UART: [ldev] --
10,414,786 UART: [fwproc] Wait for Commands...
10,416,515 UART: [fwproc] Recv command 0x46574c44
10,418,565 UART: [fwproc] Recv'd Img size: 111752 bytes
13,784,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,858,164 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,918,473 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,235,552 >>> mbox cmd response: success
14,239,471 UART: [afmc] ++
14,240,065 UART: [afmc] CDI.KEYID = 6
14,240,977 UART: [afmc] SUBJECT.KEYID = 7
14,242,140 UART: [afmc] AUTHORITY.KEYID = 5
16,787,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,542 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,527,587 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,543,661 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,559,330 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,581,623 UART: [afmc] --
18,585,276 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,585,823 UART: [cold-reset] --
18,590,400 UART: [state] Locking Datavault
18,594,054 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,709 UART: [state] Locking ICCM
18,596,809 UART: [exit] Launching FMC @ 0x40000000
18,605,206 UART:
18,605,440 UART: Running Caliptra FMC ...
18,606,544 UART:
18,606,703 UART: [fmc] Received command: 0x10000009
18,608,224 >>> mbox cmd response data (48 bytes)
18,608,823 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,609,168 UART: [fmc] Received command: 0x1000000A
18,610,695 >>> mbox cmd response data (0 bytes)
18,610,980 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,611,289 UART: [fmc] Received command: 0x10000003
18,621,251 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,213,175 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
13,999,107 >>> mbox cmd response: success
18,262,676 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,275,147 UART:
18,275,554 UART: Running Caliptra FMC ...
18,276,887 UART:
18,277,058 UART: [fmc] Received command: 0x10000009
18,278,645 >>> mbox cmd response data (48 bytes)
18,279,234 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,279,545 UART: [fmc] Received command: 0x1000000A
18,281,088 >>> mbox cmd response data (0 bytes)
18,281,352 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,281,656 UART: [fmc] Received command: 0x10000003
18,291,607 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
2,218,958 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,360,068 UART:
2,360,497 UART: Running Caliptra ROM ...
2,361,581 UART:
2,361,738 UART: [state] CFI Enabled
2,362,638 UART: [state] LifecycleState = Unprovisioned
2,364,327 UART: [state] DebugLocked = No
2,365,352 UART: [state] WD Timer not started. Device not locked for debugging
2,367,818 UART: [kat] SHA2-256
2,368,484 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,371,497 UART: [kat] ++
2,371,948 UART: [kat] sha1
2,372,492 UART: [kat] SHA2-256
2,373,157 UART: [kat] SHA2-384
2,373,813 UART: [kat] SHA2-512-ACC
2,374,610 UART: [kat] ECC-384
3,277,389 UART: [kat] HMAC-384Kdf
3,291,096 UART: [kat] LMS
3,820,600 UART: [kat] --
3,825,619 UART: [cold-reset] ++
3,828,142 UART: [fht] FHT @ 0x50003400
3,838,789 UART: [idev] ++
3,839,377 UART: [idev] CDI.KEYID = 6
3,840,251 UART: [idev] SUBJECT.KEYID = 7
3,841,461 UART: [idev] UDS.KEYID = 0
3,857,383 UART: [idev] Erasing UDS.KEYID = 0
6,313,129 UART: [idev] Sha1 KeyId Algorithm
6,335,931 UART: [idev] --
6,339,158 UART: [ldev] ++
6,339,724 UART: [ldev] CDI.KEYID = 6
6,340,604 UART: [ldev] SUBJECT.KEYID = 5
6,341,769 UART: [ldev] AUTHORITY.KEYID = 7
6,343,060 UART: [ldev] FE.KEYID = 1
6,351,897 UART: [ldev] Erasing FE.KEYID = 1
8,824,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,971 UART: [ldev] --
10,617,019 UART: [fwproc] Wait for Commands...
10,620,078 UART: [fwproc] Recv command 0x46574c44
10,622,125 UART: [fwproc] Recv'd Img size: 111752 bytes
13,995,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,068,923 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,129,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,445,897 >>> mbox cmd response: success
14,450,773 UART: [afmc] ++
14,451,359 UART: [afmc] CDI.KEYID = 6
14,452,244 UART: [afmc] SUBJECT.KEYID = 7
14,453,401 UART: [afmc] AUTHORITY.KEYID = 5
16,950,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,670,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,672,597 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,688,633 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,704,697 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,720,374 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,743,689 UART: [afmc] --
18,746,744 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,747,109 UART: [cold-reset] --
18,750,458 UART: [state] Locking Datavault
18,756,574 UART: [state] Locking PCR0, PCR1 and PCR31
18,758,271 UART: [state] Locking ICCM
18,759,661 UART: [exit] Launching FMC @ 0x40000000
18,768,057 UART:
18,768,291 UART: Running Caliptra FMC ...
18,769,391 UART:
18,769,547 UART: [fmc] Received command: 0x10000009
18,771,091 >>> mbox cmd response data (48 bytes)
18,771,690 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,772,031 UART: [fmc] Received command: 0x1000000A
18,773,475 >>> mbox cmd response data (0 bytes)
18,773,731 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,774,040 UART: [fmc] Received command: 0x10000003
18,783,999 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,216,625 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,228,436 >>> mbox cmd response: success
18,463,906 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,481,258 UART:
18,481,589 UART: Running Caliptra FMC ...
18,482,799 UART:
18,482,978 UART: [fmc] Received command: 0x10000009
18,484,461 >>> mbox cmd response data (48 bytes)
18,485,036 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,485,359 UART: [fmc] Received command: 0x1000000A
18,486,937 >>> mbox cmd response data (0 bytes)
18,487,203 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,487,506 UART: [fmc] Received command: 0x10000003
18,497,473 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
2,221,906 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,363,278 UART:
2,363,707 UART: Running Caliptra ROM ...
2,364,788 UART:
2,364,972 UART: [state] CFI Enabled
2,365,941 UART: [state] LifecycleState = Unprovisioned
2,367,602 UART: [state] DebugLocked = No
2,368,713 UART: [state] WD Timer not started. Device not locked for debugging
2,371,185 UART: [kat] SHA2-256
2,371,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,374,857 UART: [kat] ++
2,375,365 UART: [kat] sha1
2,375,880 UART: [kat] SHA2-256
2,376,534 UART: [kat] SHA2-384
2,377,191 UART: [kat] SHA2-512-ACC
2,377,993 UART: [kat] ECC-384
2,946,358 UART: [kat] HMAC-384Kdf
2,972,016 UART: [kat] LMS
3,501,472 UART: [kat] --
3,505,085 UART: [cold-reset] ++
3,507,092 UART: [fht] FHT @ 0x50003400
3,517,808 UART: [idev] ++
3,518,377 UART: [idev] CDI.KEYID = 6
3,519,310 UART: [idev] SUBJECT.KEYID = 7
3,520,526 UART: [idev] UDS.KEYID = 0
3,544,966 UART: [idev] Erasing UDS.KEYID = 0
6,026,270 UART: [idev] Sha1 KeyId Algorithm
6,048,918 UART: [idev] --
6,052,166 UART: [ldev] ++
6,052,741 UART: [ldev] CDI.KEYID = 6
6,053,629 UART: [ldev] SUBJECT.KEYID = 5
6,054,852 UART: [ldev] AUTHORITY.KEYID = 7
6,056,095 UART: [ldev] FE.KEYID = 1
6,100,802 UART: [ldev] Erasing FE.KEYID = 1
8,604,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,714 UART: [ldev] --
10,413,249 UART: [fwproc] Wait for Commands...
10,415,235 UART: [fwproc] Recv command 0x46574c44
10,417,339 UART: [fwproc] Recv'd Img size: 111752 bytes
13,785,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,860,912 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,921,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,238,732 >>> mbox cmd response: success
14,242,691 UART: [afmc] ++
14,243,278 UART: [afmc] CDI.KEYID = 6
14,244,159 UART: [afmc] SUBJECT.KEYID = 7
14,245,370 UART: [afmc] AUTHORITY.KEYID = 5
16,785,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,281 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,528,366 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,544,396 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,560,099 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,581,928 UART: [afmc] --
18,584,833 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,585,215 UART: [cold-reset] --
18,589,537 UART: [state] Locking Datavault
18,594,842 UART: [state] Locking PCR0, PCR1 and PCR31
18,596,551 UART: [state] Locking ICCM
18,597,972 UART: [exit] Launching FMC @ 0x40000000
18,606,372 UART:
18,606,607 UART: Running Caliptra FMC ...
18,607,708 UART:
18,607,862 UART: [fmc] Received command: 0x10000009
18,609,395 >>> mbox cmd response data (48 bytes)
18,610,001 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,610,357 UART: [fmc] Received command: 0x1000000A
18,611,885 >>> mbox cmd response data (0 bytes)
18,612,150 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,612,455 UART: [fmc] Received command: 0x10000003
18,622,407 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
2,224,104 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,028,778 >>> mbox cmd response: success
18,308,385 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,324,950 UART:
18,325,303 UART: Running Caliptra FMC ...
18,326,490 UART:
18,326,660 UART: [fmc] Received command: 0x10000009
18,328,228 >>> mbox cmd response data (48 bytes)
18,328,817 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,329,135 UART: [fmc] Received command: 0x1000000A
18,330,726 >>> mbox cmd response data (0 bytes)
18,330,996 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,331,311 UART: [fmc] Received command: 0x10000003
18,341,244 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,218,128 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,359,506 UART:
2,359,939 UART: Running Caliptra ROM ...
2,361,121 UART:
2,361,320 UART: [state] CFI Enabled
2,362,298 UART: [state] LifecycleState = Unprovisioned
2,363,964 UART: [state] DebugLocked = No
2,365,073 UART: [state] WD Timer not started. Device not locked for debugging
2,367,550 UART: [kat] SHA2-256
2,368,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,371,238 UART: [kat] ++
2,371,688 UART: [kat] sha1
2,372,247 UART: [kat] SHA2-256
2,373,097 UART: [kat] SHA2-384
2,373,766 UART: [kat] SHA2-512-ACC
2,374,652 UART: [kat] ECC-384
3,278,263 UART: [kat] HMAC-384Kdf
3,291,931 UART: [kat] LMS
3,821,397 UART: [kat] --
3,827,141 UART: [cold-reset] ++
3,828,556 UART: [fht] FHT @ 0x50003400
3,839,160 UART: [idev] ++
3,839,732 UART: [idev] CDI.KEYID = 6
3,840,649 UART: [idev] SUBJECT.KEYID = 7
3,841,859 UART: [idev] UDS.KEYID = 0
3,857,886 UART: [idev] Erasing UDS.KEYID = 0
6,313,127 UART: [idev] Sha1 KeyId Algorithm
6,336,062 UART: [idev] --
6,340,333 UART: [ldev] ++
6,340,945 UART: [ldev] CDI.KEYID = 6
6,341,865 UART: [ldev] SUBJECT.KEYID = 5
6,342,976 UART: [ldev] AUTHORITY.KEYID = 7
6,344,210 UART: [ldev] FE.KEYID = 1
6,355,613 UART: [ldev] Erasing FE.KEYID = 1
8,827,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,510 UART: [ldev] --
10,618,315 UART: [fwproc] Wait for Commands...
10,620,514 UART: [fwproc] Recv command 0x46574c44
10,622,605 UART: [fwproc] Recv'd Img size: 111752 bytes
13,998,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,068,599 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,128,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,446,075 >>> mbox cmd response: success
14,449,488 UART: [afmc] ++
14,450,077 UART: [afmc] CDI.KEYID = 6
14,450,996 UART: [afmc] SUBJECT.KEYID = 7
14,452,159 UART: [afmc] AUTHORITY.KEYID = 5
16,952,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,674,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,675,971 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,692,036 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,708,080 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,723,729 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,746,396 UART: [afmc] --
18,749,826 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,750,210 UART: [cold-reset] --
18,753,190 UART: [state] Locking Datavault
18,758,704 UART: [state] Locking PCR0, PCR1 and PCR31
18,760,404 UART: [state] Locking ICCM
18,762,068 UART: [exit] Launching FMC @ 0x40000000
18,770,425 UART:
18,770,662 UART: Running Caliptra FMC ...
18,771,758 UART:
18,771,931 UART: [fmc] Received command: 0x10000009
18,773,444 >>> mbox cmd response data (48 bytes)
18,774,041 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,774,357 UART: [fmc] Received command: 0x1000000A
18,775,798 >>> mbox cmd response data (0 bytes)
18,776,055 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,776,362 UART: [fmc] Received command: 0x10000003
18,786,326 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
2,217,748 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,224,614 >>> mbox cmd response: success
18,452,866 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,468,498 UART:
18,468,837 UART: Running Caliptra FMC ...
18,470,024 UART:
18,470,193 UART: [fmc] Received command: 0x10000009
18,471,774 >>> mbox cmd response data (48 bytes)
18,472,372 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,472,892 UART: [fmc] Received command: 0x1000000A
18,474,496 >>> mbox cmd response data (0 bytes)
18,474,767 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,475,077 UART: [fmc] Received command: 0x10000003
18,485,025 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,682 UART: [state] LifecycleState = Unprovisioned
85,337 UART: [state] DebugLocked = No
86,061 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,399 UART: [kat] SHA2-256
901,339 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
915,826 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,605 UART: [cold-reset] ++
1,170,173 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,198,891 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,662 UART: [ldev] ++
1,208,830 UART: [ldev] CDI.KEYID = 6
1,209,194 UART: [ldev] SUBJECT.KEYID = 5
1,209,621 UART: [ldev] AUTHORITY.KEYID = 7
1,210,084 UART: [ldev] FE.KEYID = 1
1,215,304 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,162 UART: [ldev] --
1,281,564 UART: [fwproc] Wait for Commands...
1,282,305 UART: [fwproc] Recv command 0x46574c44
1,283,038 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,432 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,683 >>> mbox cmd response: success
2,739,782 UART: [afmc] ++
2,739,950 UART: [afmc] CDI.KEYID = 6
2,740,313 UART: [afmc] SUBJECT.KEYID = 7
2,740,739 UART: [afmc] AUTHORITY.KEYID = 5
2,775,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,103 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,799 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,698 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,391 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,321 UART: [afmc] --
2,819,405 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,819,427 UART: [cold-reset] --
2,820,165 UART: [state] Locking Datavault
2,821,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,828 UART: [state] Locking ICCM
2,822,448 UART: [exit] Launching FMC @ 0x40000000
2,827,745 UART:
2,827,761 UART: Running Caliptra FMC ...
2,828,169 UART:
2,828,399 UART: [fmc] Received command: 0x10000009
2,829,597 >>> mbox cmd response data (48 bytes)
2,829,598 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,829,627 UART: [fmc] Received command: 0x1000000A
2,830,367 >>> mbox cmd response data (0 bytes)
2,830,368 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,830,397 UART: [fmc] Received command: 0x10000003
2,839,853 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,059 >>> mbox cmd response: success
2,644,066 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,650,581 UART:
2,650,597 UART: Running Caliptra FMC ...
2,651,005 UART:
2,651,235 UART: [fmc] Received command: 0x10000009
2,652,433 >>> mbox cmd response data (48 bytes)
2,652,434 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,652,463 UART: [fmc] Received command: 0x1000000A
2,653,203 >>> mbox cmd response data (0 bytes)
2,653,204 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,653,233 UART: [fmc] Received command: 0x10000003
2,662,689 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,169,910 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,181,478 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,478 UART: [idev] --
1,208,441 UART: [ldev] ++
1,208,609 UART: [ldev] CDI.KEYID = 6
1,208,973 UART: [ldev] SUBJECT.KEYID = 5
1,209,400 UART: [ldev] AUTHORITY.KEYID = 7
1,209,863 UART: [ldev] FE.KEYID = 1
1,215,395 UART: [ldev] Erasing FE.KEYID = 1
1,241,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,955 UART: [ldev] --
1,280,415 UART: [fwproc] Wait for Commands...
1,281,016 UART: [fwproc] Recv command 0x46574c44
1,281,749 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,721 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,864 >>> mbox cmd response: success
2,738,939 UART: [afmc] ++
2,739,107 UART: [afmc] CDI.KEYID = 6
2,739,470 UART: [afmc] SUBJECT.KEYID = 7
2,739,896 UART: [afmc] AUTHORITY.KEYID = 5
2,775,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,624 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,320 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,219 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,912 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,672 UART: [afmc] --
2,818,718 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,818,740 UART: [cold-reset] --
2,819,662 UART: [state] Locking Datavault
2,820,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,551 UART: [state] Locking ICCM
2,822,147 UART: [exit] Launching FMC @ 0x40000000
2,827,444 UART:
2,827,460 UART: Running Caliptra FMC ...
2,827,868 UART:
2,828,098 UART: [fmc] Received command: 0x10000009
2,829,296 >>> mbox cmd response data (48 bytes)
2,829,297 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,829,326 UART: [fmc] Received command: 0x1000000A
2,830,066 >>> mbox cmd response data (0 bytes)
2,830,067 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,830,096 UART: [fmc] Received command: 0x10000003
2,839,552 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,244 >>> mbox cmd response: success
2,645,787 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,652,074 UART:
2,652,090 UART: Running Caliptra FMC ...
2,652,498 UART:
2,652,728 UART: [fmc] Received command: 0x10000009
2,653,926 >>> mbox cmd response data (48 bytes)
2,653,927 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,653,956 UART: [fmc] Received command: 0x1000000A
2,654,696 >>> mbox cmd response data (0 bytes)
2,654,697 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,726 UART: [fmc] Received command: 0x10000003
2,664,182 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,450 UART: [kat] SHA2-256
891,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,129 UART: [kat] ++
895,281 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
903,974 UART: [kat] SHA2-512-ACC
905,875 UART: [kat] ECC-384
915,488 UART: [kat] HMAC-384Kdf
920,098 UART: [kat] LMS
1,168,410 UART: [kat] --
1,169,249 UART: [cold-reset] ++
1,169,655 UART: [fht] FHT @ 0x50003400
1,172,153 UART: [idev] ++
1,172,321 UART: [idev] CDI.KEYID = 6
1,172,682 UART: [idev] SUBJECT.KEYID = 7
1,173,107 UART: [idev] UDS.KEYID = 0
1,181,089 UART: [idev] Erasing UDS.KEYID = 0
1,197,995 UART: [idev] Sha1 KeyId Algorithm
1,206,719 UART: [idev] --
1,207,788 UART: [ldev] ++
1,207,956 UART: [ldev] CDI.KEYID = 6
1,208,320 UART: [ldev] SUBJECT.KEYID = 5
1,208,747 UART: [ldev] AUTHORITY.KEYID = 7
1,209,210 UART: [ldev] FE.KEYID = 1
1,214,108 UART: [ldev] Erasing FE.KEYID = 1
1,240,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,808 UART: [ldev] --
1,280,220 UART: [fwproc] Wait for Commands...
1,280,793 UART: [fwproc] Recv command 0x46574c44
1,281,526 UART: [fwproc] Recv'd Img size: 111752 bytes
2,548,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,444 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,783 >>> mbox cmd response: success
2,738,980 UART: [afmc] ++
2,739,148 UART: [afmc] CDI.KEYID = 6
2,739,511 UART: [afmc] SUBJECT.KEYID = 7
2,739,937 UART: [afmc] AUTHORITY.KEYID = 5
2,775,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,757 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,453 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,352 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,045 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,759 UART: [afmc] --
2,818,693 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,818,715 UART: [cold-reset] --
2,819,803 UART: [state] Locking Datavault
2,821,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,848 UART: [state] Locking ICCM
2,822,300 UART: [exit] Launching FMC @ 0x40000000
2,827,597 UART:
2,827,613 UART: Running Caliptra FMC ...
2,828,021 UART:
2,828,251 UART: [fmc] Received command: 0x10000009
2,829,449 >>> mbox cmd response data (48 bytes)
2,829,450 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,829,479 UART: [fmc] Received command: 0x1000000A
2,830,219 >>> mbox cmd response data (0 bytes)
2,830,220 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,830,249 UART: [fmc] Received command: 0x10000003
2,839,705 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,701 >>> mbox cmd response: success
2,644,448 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,650,565 UART:
2,650,581 UART: Running Caliptra FMC ...
2,650,989 UART:
2,651,219 UART: [fmc] Received command: 0x10000009
2,652,417 >>> mbox cmd response data (48 bytes)
2,652,418 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,652,447 UART: [fmc] Received command: 0x1000000A
2,653,187 >>> mbox cmd response data (0 bytes)
2,653,188 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,653,217 UART: [fmc] Received command: 0x10000003
2,662,673 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,170,064 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,352 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,777 UART: [ldev] SUBJECT.KEYID = 5
1,210,204 UART: [ldev] AUTHORITY.KEYID = 7
1,210,667 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,557 UART: [fwproc] Wait for Commands...
1,282,294 UART: [fwproc] Recv command 0x46574c44
1,283,027 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,243 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,472 >>> mbox cmd response: success
2,740,623 UART: [afmc] ++
2,740,791 UART: [afmc] CDI.KEYID = 6
2,741,154 UART: [afmc] SUBJECT.KEYID = 7
2,741,580 UART: [afmc] AUTHORITY.KEYID = 5
2,777,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,176 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,872 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,771 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,464 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,386 UART: [afmc] --
2,820,344 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,820,366 UART: [cold-reset] --
2,821,298 UART: [state] Locking Datavault
2,822,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,905 UART: [state] Locking ICCM
2,823,345 UART: [exit] Launching FMC @ 0x40000000
2,828,642 UART:
2,828,658 UART: Running Caliptra FMC ...
2,829,066 UART:
2,829,296 UART: [fmc] Received command: 0x10000009
2,830,494 >>> mbox cmd response data (48 bytes)
2,830,495 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,524 UART: [fmc] Received command: 0x1000000A
2,831,264 >>> mbox cmd response data (0 bytes)
2,831,265 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,831,294 UART: [fmc] Received command: 0x10000003
2,840,750 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,302 >>> mbox cmd response: success
2,645,455 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,651,790 UART:
2,651,806 UART: Running Caliptra FMC ...
2,652,214 UART:
2,652,444 UART: [fmc] Received command: 0x10000009
2,653,642 >>> mbox cmd response data (48 bytes)
2,653,643 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,653,672 UART: [fmc] Received command: 0x1000000A
2,654,412 >>> mbox cmd response data (0 bytes)
2,654,413 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,442 UART: [fmc] Received command: 0x10000003
2,663,898 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
915,890 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,539 UART: [cold-reset] ++
1,169,961 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,733 UART: [idev] Sha1 KeyId Algorithm
1,207,581 UART: [idev] --
1,208,532 UART: [ldev] ++
1,208,700 UART: [ldev] CDI.KEYID = 6
1,209,064 UART: [ldev] SUBJECT.KEYID = 5
1,209,491 UART: [ldev] AUTHORITY.KEYID = 7
1,209,954 UART: [ldev] FE.KEYID = 1
1,215,160 UART: [ldev] Erasing FE.KEYID = 1
1,241,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,794 UART: [ldev] --
1,280,238 UART: [fwproc] Wait for Commands...
1,280,903 UART: [fwproc] Recv command 0x46574c44
1,281,636 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,266 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,651 >>> mbox cmd response: success
2,739,712 UART: [afmc] ++
2,739,880 UART: [afmc] CDI.KEYID = 6
2,740,243 UART: [afmc] SUBJECT.KEYID = 7
2,740,669 UART: [afmc] AUTHORITY.KEYID = 5
2,776,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,597 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,293 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,192 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,885 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,699 UART: [afmc] --
2,819,653 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,819,675 UART: [cold-reset] --
2,820,433 UART: [state] Locking Datavault
2,821,854 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,458 UART: [state] Locking ICCM
2,823,054 UART: [exit] Launching FMC @ 0x40000000
2,828,351 UART:
2,828,367 UART: Running Caliptra FMC ...
2,828,775 UART:
2,829,005 UART: [fmc] Received command: 0x10000009
2,830,203 >>> mbox cmd response data (48 bytes)
2,830,204 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,830,233 UART: [fmc] Received command: 0x1000000A
2,830,973 >>> mbox cmd response data (0 bytes)
2,830,974 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,831,003 UART: [fmc] Received command: 0x10000003
2,840,459 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,849 >>> mbox cmd response: success
2,646,260 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,652,759 UART:
2,652,775 UART: Running Caliptra FMC ...
2,653,183 UART:
2,653,413 UART: [fmc] Received command: 0x10000009
2,654,611 >>> mbox cmd response data (48 bytes)
2,654,612 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,641 UART: [fmc] Received command: 0x1000000A
2,655,381 >>> mbox cmd response data (0 bytes)
2,655,382 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,655,411 UART: [fmc] Received command: 0x10000003
2,664,867 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,697 UART: [ldev] ++
1,209,865 UART: [ldev] CDI.KEYID = 6
1,210,229 UART: [ldev] SUBJECT.KEYID = 5
1,210,656 UART: [ldev] AUTHORITY.KEYID = 7
1,211,119 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,797 UART: [fwproc] Wait for Commands...
1,283,526 UART: [fwproc] Recv command 0x46574c44
1,284,259 UART: [fwproc] Recv'd Img size: 111752 bytes
2,553,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,643 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,328 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,742,908 >>> mbox cmd response: success
2,744,063 UART: [afmc] ++
2,744,231 UART: [afmc] CDI.KEYID = 6
2,744,594 UART: [afmc] SUBJECT.KEYID = 7
2,745,020 UART: [afmc] AUTHORITY.KEYID = 5
2,781,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,358 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,054 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,953 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,646 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,436 UART: [afmc] --
2,824,306 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,824,328 UART: [cold-reset] --
2,824,924 UART: [state] Locking Datavault
2,826,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,735 UART: [state] Locking ICCM
2,827,171 UART: [exit] Launching FMC @ 0x40000000
2,832,468 UART:
2,832,484 UART: Running Caliptra FMC ...
2,832,892 UART:
2,833,122 UART: [fmc] Received command: 0x10000009
2,834,320 >>> mbox cmd response data (48 bytes)
2,834,321 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,834,350 UART: [fmc] Received command: 0x1000000A
2,835,090 >>> mbox cmd response data (0 bytes)
2,835,091 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,835,120 UART: [fmc] Received command: 0x10000003
2,844,576 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,776 >>> mbox cmd response: success
2,645,943 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,652,018 UART:
2,652,034 UART: Running Caliptra FMC ...
2,652,442 UART:
2,652,672 UART: [fmc] Received command: 0x10000009
2,653,870 >>> mbox cmd response data (48 bytes)
2,653,871 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,653,900 UART: [fmc] Received command: 0x1000000A
2,654,640 >>> mbox cmd response data (0 bytes)
2,654,641 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,654,670 UART: [fmc] Received command: 0x10000003
2,664,126 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,215,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,332 UART:
2,217,596 UART: Running Caliptra ROM ...
2,218,680 UART:
2,218,894 UART: [state] CFI Enabled
2,219,762 UART: [state] LifecycleState = Unprovisioned
2,221,437 UART: [state] DebugLocked = No
2,222,547 UART: [state] WD Timer not started. Device not locked for debugging
2,225,024 UART: [kat] SHA2-256
2,225,699 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,228,704 UART: [kat] ++
2,229,154 UART: [kat] sha1
2,229,667 UART: [kat] SHA2-256
2,230,405 UART: [kat] SHA2-384
2,231,068 UART: [kat] SHA2-512-ACC
2,231,900 UART: [kat] ECC-384
3,774,129 UART: [kat] HMAC-384Kdf
3,803,506 UART: [kat] LMS
4,876,661 UART: [kat] --
4,880,853 UART: [cold-reset] ++
4,882,309 UART: [fht] FHT @ 0x50003400
4,894,806 UART: [idev] ++
4,895,518 UART: [idev] CDI.KEYID = 6
4,896,709 UART: [idev] SUBJECT.KEYID = 7
4,897,865 UART: [idev] UDS.KEYID = 0
4,930,911 UART: [idev] Erasing UDS.KEYID = 0
8,241,933 UART: [idev] Sha1 KeyId Algorithm
8,265,561 UART: [idev] --
8,268,294 UART: [ldev] ++
8,268,874 UART: [ldev] CDI.KEYID = 6
8,270,114 UART: [ldev] SUBJECT.KEYID = 5
8,271,278 UART: [ldev] AUTHORITY.KEYID = 7
8,272,441 UART: [ldev] FE.KEYID = 1
8,317,630 UART: [ldev] Erasing FE.KEYID = 1
11,652,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,960,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,976,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,992,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,013,415 UART: [ldev] --
14,017,780 UART: [fwproc] Wait for Commands...
14,019,935 UART: [fwproc] Recv command 0x4d454153
14,028,955 >>> mbox cmd response data (12 bytes)
14,030,817 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
14,171,691 UART: [fwproc] Recv command 0x46574c44
14,174,093 UART: [fwproc] Recv'd Img size: 111408 bytes
18,210,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,289,501 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,349,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,666,015 >>> mbox cmd response: success
18,670,794 UART: [afmc] ++
18,671,404 UART: [afmc] CDI.KEYID = 6
18,672,597 UART: [afmc] SUBJECT.KEYID = 7
18,673,705 UART: [afmc] AUTHORITY.KEYID = 5
22,033,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,332,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,334,592 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,350,793 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,366,925 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,382,716 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,403,843 UART: [afmc] --
24,408,260 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,408,656 UART: [cold-reset] --
24,413,416 UART: [state] Locking Datavault
24,418,453 UART: [state] Locking PCR0, PCR1 and PCR31
24,420,152 UART: [state] Locking ICCM
24,421,846 UART: [exit] Launching FMC @ 0x40000000
24,430,480 UART:
24,430,724 UART: Running Caliptra FMC ...
24,431,819 UART:
24,431,978 UART: [fmc] Received command: 0x1000000A
24,433,654 >>> mbox cmd response data (116 bytes)
24,435,155 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,435,590 UART: [fmc] Received command: 0x10000009
24,437,393 >>> mbox cmd response data (48 bytes)
24,438,870 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,439,325 UART: [fmc] Received command: 0x10000003
24,449,288 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,212,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,831,568 >>> mbox cmd response data (12 bytes)
13,834,051 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,449,294 >>> mbox cmd response: success
24,126,087 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,140,524 UART:
24,140,852 UART: Running Caliptra FMC ...
24,142,020 UART:
24,142,203 UART: [fmc] Received command: 0x1000000A
24,143,766 >>> mbox cmd response data (116 bytes)
24,145,215 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,145,654 UART: [fmc] Received command: 0x10000009
24,147,438 >>> mbox cmd response data (48 bytes)
24,148,932 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,149,393 UART: [fmc] Received command: 0x10000003
24,159,360 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,226,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,227,827 UART:
2,228,085 UART: Running Caliptra ROM ...
2,229,151 UART:
2,229,296 UART: [state] CFI Enabled
2,230,158 UART: [state] LifecycleState = Unprovisioned
2,231,722 UART: [state] DebugLocked = No
2,232,842 UART: [state] WD Timer not started. Device not locked for debugging
2,235,339 UART: [kat] SHA2-256
2,236,003 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,239,009 UART: [kat] ++
2,239,459 UART: [kat] sha1
2,239,996 UART: [kat] SHA2-256
2,240,652 UART: [kat] SHA2-384
2,241,300 UART: [kat] SHA2-512-ACC
2,242,116 UART: [kat] ECC-384
4,101,578 UART: [kat] HMAC-384Kdf
4,114,127 UART: [kat] LMS
5,187,320 UART: [kat] --
5,192,331 UART: [cold-reset] ++
5,194,860 UART: [fht] FHT @ 0x50003400
5,206,479 UART: [idev] ++
5,207,156 UART: [idev] CDI.KEYID = 6
5,208,307 UART: [idev] SUBJECT.KEYID = 7
5,209,801 UART: [idev] UDS.KEYID = 0
5,225,157 UART: [idev] Erasing UDS.KEYID = 0
8,498,037 UART: [idev] Sha1 KeyId Algorithm
8,520,090 UART: [idev] --
8,523,688 UART: [ldev] ++
8,524,264 UART: [ldev] CDI.KEYID = 6
8,525,492 UART: [ldev] SUBJECT.KEYID = 5
8,526,921 UART: [ldev] AUTHORITY.KEYID = 7
8,528,473 UART: [ldev] FE.KEYID = 1
8,540,793 UART: [ldev] Erasing FE.KEYID = 1
11,828,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,406 UART: [ldev] --
14,194,522 UART: [fwproc] Wait for Commands...
14,197,260 UART: [fwproc] Recv command 0x4d454153
14,206,282 >>> mbox cmd response data (12 bytes)
14,208,183 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
14,348,330 UART: [fwproc] Recv command 0x46574c44
14,350,660 UART: [fwproc] Recv'd Img size: 111408 bytes
18,387,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,458,532 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,518,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,834,752 >>> mbox cmd response: success
18,839,653 UART: [afmc] ++
18,840,431 UART: [afmc] CDI.KEYID = 6
18,841,409 UART: [afmc] SUBJECT.KEYID = 7
18,842,562 UART: [afmc] AUTHORITY.KEYID = 5
22,159,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,454,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,456,366 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,472,526 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,488,673 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,504,485 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,528,402 UART: [afmc] --
24,532,545 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,532,892 UART: [cold-reset] --
24,535,918 UART: [state] Locking Datavault
24,543,588 UART: [state] Locking PCR0, PCR1 and PCR31
24,545,287 UART: [state] Locking ICCM
24,547,838 UART: [exit] Launching FMC @ 0x40000000
24,556,437 UART:
24,556,661 UART: Running Caliptra FMC ...
24,557,752 UART:
24,557,903 UART: [fmc] Received command: 0x1000000A
24,559,628 >>> mbox cmd response data (116 bytes)
24,561,013 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,561,450 UART: [fmc] Received command: 0x10000009
24,563,259 >>> mbox cmd response data (48 bytes)
24,564,735 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,565,182 UART: [fmc] Received command: 0x10000003
24,575,144 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,220,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,024,040 >>> mbox cmd response data (12 bytes)
14,026,654 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,655,276 >>> mbox cmd response: success
24,280,886 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
24,295,427 UART:
24,295,753 UART: Running Caliptra FMC ...
24,296,902 UART:
24,297,064 UART: [fmc] Received command: 0x1000000A
24,298,637 >>> mbox cmd response data (116 bytes)
24,300,059 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
24,300,499 UART: [fmc] Received command: 0x10000009
24,302,268 >>> mbox cmd response data (48 bytes)
24,303,741 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
24,304,197 UART: [fmc] Received command: 0x10000003
24,314,159 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,233,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,234,782 UART:
2,235,042 UART: Running Caliptra ROM ...
2,236,129 UART:
2,236,281 UART: [state] CFI Enabled
2,237,144 UART: [state] LifecycleState = Unprovisioned
2,238,709 UART: [state] DebugLocked = No
2,239,941 UART: [state] WD Timer not started. Device not locked for debugging
2,242,427 UART: [kat] SHA2-256
2,243,096 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,246,114 UART: [kat] ++
2,246,566 UART: [kat] sha1
2,247,078 UART: [kat] SHA2-256
2,248,106 UART: [kat] SHA2-384
2,248,791 UART: [kat] SHA2-512-ACC
2,249,623 UART: [kat] ECC-384
2,926,102 UART: [kat] HMAC-384Kdf
2,950,858 UART: [kat] LMS
3,480,325 UART: [kat] --
3,484,134 UART: [cold-reset] ++
3,485,366 UART: [fht] FHT @ 0x50003400
3,496,459 UART: [idev] ++
3,497,032 UART: [idev] CDI.KEYID = 6
3,497,943 UART: [idev] SUBJECT.KEYID = 7
3,499,161 UART: [idev] UDS.KEYID = 0
3,523,190 UART: [idev] Erasing UDS.KEYID = 0
6,002,567 UART: [idev] Sha1 KeyId Algorithm
6,025,236 UART: [idev] --
6,028,081 UART: [ldev] ++
6,028,686 UART: [ldev] CDI.KEYID = 6
6,029,603 UART: [ldev] SUBJECT.KEYID = 5
6,030,769 UART: [ldev] AUTHORITY.KEYID = 7
6,032,004 UART: [ldev] FE.KEYID = 1
6,057,895 UART: [ldev] Erasing FE.KEYID = 1
8,564,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,552 UART: [ldev] --
10,372,222 UART: [fwproc] Wait for Commands...
10,375,397 UART: [fwproc] Recv command 0x4d454153
10,383,885 >>> mbox cmd response data (12 bytes)
10,385,770 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,527,365 UART: [fwproc] Recv command 0x46574c44
10,529,520 UART: [fwproc] Recv'd Img size: 111752 bytes
13,901,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,974,378 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,034,710 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,352,944 >>> mbox cmd response: success
14,357,794 UART: [afmc] ++
14,358,382 UART: [afmc] CDI.KEYID = 6
14,359,293 UART: [afmc] SUBJECT.KEYID = 7
14,360,453 UART: [afmc] AUTHORITY.KEYID = 5
16,896,645 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,207 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,637,249 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,653,309 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,669,022 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,692,071 UART: [afmc] --
18,695,921 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,696,278 UART: [cold-reset] --
18,699,850 UART: [state] Locking Datavault
18,703,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,333 UART: [state] Locking ICCM
18,707,996 UART: [exit] Launching FMC @ 0x40000000
18,716,390 UART:
18,716,623 UART: Running Caliptra FMC ...
18,717,649 UART:
18,717,794 UART: [fmc] Received command: 0x1000000A
18,719,580 >>> mbox cmd response data (116 bytes)
18,720,993 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,721,331 UART: [fmc] Received command: 0x10000009
18,723,140 >>> mbox cmd response data (48 bytes)
18,724,675 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,725,033 UART: [fmc] Received command: 0x10000003
18,734,971 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,217,912 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,188,038 >>> mbox cmd response data (12 bytes)
10,190,503 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,153,452 >>> mbox cmd response: success
18,434,606 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,447,802 UART:
18,448,136 UART: Running Caliptra FMC ...
18,449,235 UART:
18,449,398 UART: [fmc] Received command: 0x1000000A
18,451,072 >>> mbox cmd response data (116 bytes)
18,452,512 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,452,961 UART: [fmc] Received command: 0x10000009
18,454,748 >>> mbox cmd response data (48 bytes)
18,456,282 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,456,742 UART: [fmc] Received command: 0x10000003
18,466,715 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
2,226,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,228,262 UART:
2,228,528 UART: Running Caliptra ROM ...
2,229,619 UART:
2,229,770 UART: [state] CFI Enabled
2,230,636 UART: [state] LifecycleState = Unprovisioned
2,232,312 UART: [state] DebugLocked = No
2,233,424 UART: [state] WD Timer not started. Device not locked for debugging
2,235,898 UART: [kat] SHA2-256
2,236,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,239,571 UART: [kat] ++
2,240,024 UART: [kat] sha1
2,240,539 UART: [kat] SHA2-256
2,241,274 UART: [kat] SHA2-384
2,241,939 UART: [kat] SHA2-512-ACC
2,242,772 UART: [kat] ECC-384
3,282,070 UART: [kat] HMAC-384Kdf
3,293,661 UART: [kat] LMS
3,823,114 UART: [kat] --
3,828,037 UART: [cold-reset] ++
3,829,003 UART: [fht] FHT @ 0x50003400
3,840,962 UART: [idev] ++
3,841,525 UART: [idev] CDI.KEYID = 6
3,842,427 UART: [idev] SUBJECT.KEYID = 7
3,843,640 UART: [idev] UDS.KEYID = 0
3,855,076 UART: [idev] Erasing UDS.KEYID = 0
6,309,402 UART: [idev] Sha1 KeyId Algorithm
6,333,422 UART: [idev] --
6,336,885 UART: [ldev] ++
6,337,458 UART: [ldev] CDI.KEYID = 6
6,338,383 UART: [ldev] SUBJECT.KEYID = 5
6,339,542 UART: [ldev] AUTHORITY.KEYID = 7
6,340,769 UART: [ldev] FE.KEYID = 1
6,350,601 UART: [ldev] Erasing FE.KEYID = 1
8,823,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,876 UART: [ldev] --
10,614,177 UART: [fwproc] Wait for Commands...
10,617,187 UART: [fwproc] Recv command 0x4d454153
10,625,714 >>> mbox cmd response data (12 bytes)
10,627,632 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,768,680 UART: [fwproc] Recv command 0x46574c44
10,770,799 UART: [fwproc] Recv'd Img size: 111752 bytes
14,144,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,215,661 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,275,990 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,594,141 >>> mbox cmd response: success
14,599,146 UART: [afmc] ++
14,599,747 UART: [afmc] CDI.KEYID = 6
14,600,660 UART: [afmc] SUBJECT.KEYID = 7
14,601,815 UART: [afmc] AUTHORITY.KEYID = 5
17,099,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,823,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,825,166 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,841,239 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,857,296 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,872,962 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,894,840 UART: [afmc] --
18,898,325 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,898,680 UART: [cold-reset] --
18,901,708 UART: [state] Locking Datavault
18,907,273 UART: [state] Locking PCR0, PCR1 and PCR31
18,908,922 UART: [state] Locking ICCM
18,911,585 UART: [exit] Launching FMC @ 0x40000000
18,919,948 UART:
18,920,198 UART: Running Caliptra FMC ...
18,921,298 UART:
18,921,458 UART: [fmc] Received command: 0x1000000A
18,923,134 >>> mbox cmd response data (116 bytes)
18,924,491 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,924,927 UART: [fmc] Received command: 0x10000009
18,926,735 >>> mbox cmd response data (48 bytes)
18,928,245 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,928,701 UART: [fmc] Received command: 0x10000003
18,938,666 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,219,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,407,156 >>> mbox cmd response data (12 bytes)
10,409,492 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,368,005 >>> mbox cmd response: success
18,602,780 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,617,593 UART:
18,617,931 UART: Running Caliptra FMC ...
18,619,090 UART:
18,619,279 UART: [fmc] Received command: 0x1000000A
18,620,851 >>> mbox cmd response data (116 bytes)
18,622,276 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,622,710 UART: [fmc] Received command: 0x10000009
18,624,474 >>> mbox cmd response data (48 bytes)
18,625,961 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,626,422 UART: [fmc] Received command: 0x10000003
18,636,387 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,660 writing to cptra_bootfsm_go
2,225,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,226,401 UART:
2,226,657 UART: Running Caliptra ROM ...
2,227,726 UART:
2,227,877 UART: [state] CFI Enabled
2,228,744 UART: [state] LifecycleState = Unprovisioned
2,230,422 UART: [state] DebugLocked = No
2,231,542 UART: [state] WD Timer not started. Device not locked for debugging
2,234,018 UART: [kat] SHA2-256
2,234,688 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,237,695 UART: [kat] ++
2,238,146 UART: [kat] sha1
2,238,660 UART: [kat] SHA2-256
2,239,405 UART: [kat] SHA2-384
2,240,073 UART: [kat] SHA2-512-ACC
2,240,960 UART: [kat] ECC-384
2,948,893 UART: [kat] HMAC-384Kdf
2,970,660 UART: [kat] LMS
3,500,098 UART: [kat] --
3,505,449 UART: [cold-reset] ++
3,506,945 UART: [fht] FHT @ 0x50003400
3,518,631 UART: [idev] ++
3,519,200 UART: [idev] CDI.KEYID = 6
3,520,111 UART: [idev] SUBJECT.KEYID = 7
3,521,331 UART: [idev] UDS.KEYID = 0
3,542,824 UART: [idev] Erasing UDS.KEYID = 0
6,024,527 UART: [idev] Sha1 KeyId Algorithm
6,046,436 UART: [idev] --
6,050,867 UART: [ldev] ++
6,051,441 UART: [ldev] CDI.KEYID = 6
6,052,328 UART: [ldev] SUBJECT.KEYID = 5
6,053,548 UART: [ldev] AUTHORITY.KEYID = 7
6,054,790 UART: [ldev] FE.KEYID = 1
6,098,601 UART: [ldev] Erasing FE.KEYID = 1
8,600,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,344 UART: [ldev] --
10,411,246 UART: [fwproc] Wait for Commands...
10,412,868 UART: [fwproc] Recv command 0x4d454153
10,421,357 >>> mbox cmd response data (12 bytes)
10,423,214 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,563,734 UART: [fwproc] Recv command 0x46574c44
10,565,865 UART: [fwproc] Recv'd Img size: 111752 bytes
13,939,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,013,459 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,073,821 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,390,714 >>> mbox cmd response: success
14,395,778 UART: [afmc] ++
14,396,373 UART: [afmc] CDI.KEYID = 6
14,397,282 UART: [afmc] SUBJECT.KEYID = 7
14,398,449 UART: [afmc] AUTHORITY.KEYID = 5
16,931,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,651,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,653,174 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,669,268 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,685,313 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,700,973 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,722,627 UART: [afmc] --
18,726,109 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,726,478 UART: [cold-reset] --
18,730,751 UART: [state] Locking Datavault
18,736,435 UART: [state] Locking PCR0, PCR1 and PCR31
18,738,098 UART: [state] Locking ICCM
18,740,656 UART: [exit] Launching FMC @ 0x40000000
18,749,050 UART:
18,749,298 UART: Running Caliptra FMC ...
18,750,402 UART:
18,750,559 UART: [fmc] Received command: 0x1000000A
18,752,237 >>> mbox cmd response data (116 bytes)
18,753,593 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,754,025 UART: [fmc] Received command: 0x10000009
18,755,831 >>> mbox cmd response data (48 bytes)
18,757,292 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,757,745 UART: [fmc] Received command: 0x10000003
18,767,713 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,219,763 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,184,299 >>> mbox cmd response data (12 bytes)
10,186,692 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,141,140 >>> mbox cmd response: success
18,414,523 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,428,288 UART:
18,428,637 UART: Running Caliptra FMC ...
18,429,807 UART:
18,429,972 UART: [fmc] Received command: 0x1000000A
18,431,544 >>> mbox cmd response data (116 bytes)
18,433,038 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,433,476 UART: [fmc] Received command: 0x10000009
18,435,255 >>> mbox cmd response data (48 bytes)
18,436,837 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,437,294 UART: [fmc] Received command: 0x10000003
18,447,247 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,724 writing to cptra_bootfsm_go
2,229,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,230,975 UART:
2,231,265 UART: Running Caliptra ROM ...
2,232,457 UART:
2,232,615 UART: [state] CFI Enabled
2,233,487 UART: [state] LifecycleState = Unprovisioned
2,235,173 UART: [state] DebugLocked = No
2,236,292 UART: [state] WD Timer not started. Device not locked for debugging
2,238,769 UART: [kat] SHA2-256
2,239,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,242,712 UART: [kat] ++
2,243,173 UART: [kat] sha1
2,243,689 UART: [kat] SHA2-256
2,244,347 UART: [kat] SHA2-384
2,245,003 UART: [kat] SHA2-512-ACC
2,245,905 UART: [kat] ECC-384
3,282,551 UART: [kat] HMAC-384Kdf
3,294,174 UART: [kat] LMS
3,823,684 UART: [kat] --
3,826,562 UART: [cold-reset] ++
3,828,011 UART: [fht] FHT @ 0x50003400
3,838,611 UART: [idev] ++
3,839,171 UART: [idev] CDI.KEYID = 6
3,840,182 UART: [idev] SUBJECT.KEYID = 7
3,841,607 UART: [idev] UDS.KEYID = 0
3,857,472 UART: [idev] Erasing UDS.KEYID = 0
6,316,955 UART: [idev] Sha1 KeyId Algorithm
6,339,695 UART: [idev] --
6,343,506 UART: [ldev] ++
6,344,081 UART: [ldev] CDI.KEYID = 6
6,345,001 UART: [ldev] SUBJECT.KEYID = 5
6,346,165 UART: [ldev] AUTHORITY.KEYID = 7
6,347,451 UART: [ldev] FE.KEYID = 1
6,357,557 UART: [ldev] Erasing FE.KEYID = 1
8,830,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,921 UART: [ldev] --
10,620,070 UART: [fwproc] Wait for Commands...
10,622,436 UART: [fwproc] Recv command 0x4d454153
10,630,968 >>> mbox cmd response data (12 bytes)
10,632,890 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
10,774,706 UART: [fwproc] Recv command 0x46574c44
10,776,867 UART: [fwproc] Recv'd Img size: 111752 bytes
14,148,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,410 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,282,741 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,600,148 >>> mbox cmd response: success
14,604,898 UART: [afmc] ++
14,605,491 UART: [afmc] CDI.KEYID = 6
14,606,407 UART: [afmc] SUBJECT.KEYID = 7
14,607,609 UART: [afmc] AUTHORITY.KEYID = 5
17,104,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,822,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,823,938 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,840,007 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,856,055 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,871,735 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,893,969 UART: [afmc] --
18,897,734 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,898,092 UART: [cold-reset] --
18,900,722 UART: [state] Locking Datavault
18,906,412 UART: [state] Locking PCR0, PCR1 and PCR31
18,908,115 UART: [state] Locking ICCM
18,910,747 UART: [exit] Launching FMC @ 0x40000000
18,919,142 UART:
18,919,375 UART: Running Caliptra FMC ...
18,920,472 UART:
18,920,633 UART: [fmc] Received command: 0x1000000A
18,922,307 >>> mbox cmd response data (116 bytes)
18,923,792 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,924,227 UART: [fmc] Received command: 0x10000009
18,926,026 >>> mbox cmd response data (48 bytes)
18,927,551 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,928,011 UART: [fmc] Received command: 0x10000003
18,937,931 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
2,219,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,409,150 >>> mbox cmd response data (12 bytes)
10,411,630 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,382,993 >>> mbox cmd response: success
18,617,731 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,634,317 UART:
18,634,652 UART: Running Caliptra FMC ...
18,635,818 UART:
18,636,168 UART: [fmc] Received command: 0x1000000A
18,637,759 >>> mbox cmd response data (116 bytes)
18,639,224 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,639,672 UART: [fmc] Received command: 0x10000009
18,641,460 >>> mbox cmd response data (48 bytes)
18,642,954 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,643,413 UART: [fmc] Received command: 0x10000003
18,653,339 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,288 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,173,103 UART: [idev] ++
1,173,271 UART: [idev] CDI.KEYID = 6
1,173,632 UART: [idev] SUBJECT.KEYID = 7
1,174,057 UART: [idev] UDS.KEYID = 0
1,181,943 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,518 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,577 UART: [fwproc] Recv command 0x4d454153
1,285,604 >>> mbox cmd response data (12 bytes)
1,285,605 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,285,674 UART: [fwproc] Recv command 0x46574c44
1,286,407 UART: [fwproc] Recv'd Img size: 111752 bytes
2,554,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,681 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,744,034 >>> mbox cmd response: success
2,745,089 UART: [afmc] ++
2,745,257 UART: [afmc] CDI.KEYID = 6
2,745,620 UART: [afmc] SUBJECT.KEYID = 7
2,746,046 UART: [afmc] AUTHORITY.KEYID = 5
2,781,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,392 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,088 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,987 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,680 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,572 UART: [afmc] --
2,824,440 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,462 UART: [cold-reset] --
2,825,140 UART: [state] Locking Datavault
2,826,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,831 UART: [state] Locking ICCM
2,827,433 UART: [exit] Launching FMC @ 0x40000000
2,832,730 UART:
2,832,746 UART: Running Caliptra FMC ...
2,833,154 UART:
2,833,384 UART: [fmc] Received command: 0x1000000A
2,834,813 >>> mbox cmd response data (116 bytes)
2,834,814 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,843 UART: [fmc] Received command: 0x10000009
2,836,041 >>> mbox cmd response data (48 bytes)
2,836,042 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,071 UART: [fmc] Received command: 0x10000003
2,845,527 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,462 >>> mbox cmd response data (12 bytes)
1,139,463 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,592,469 >>> mbox cmd response: success
2,649,052 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,107 UART:
2,655,123 UART: Running Caliptra FMC ...
2,655,531 UART:
2,655,761 UART: [fmc] Received command: 0x1000000A
2,657,190 >>> mbox cmd response data (116 bytes)
2,657,191 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,220 UART: [fmc] Received command: 0x10000009
2,658,418 >>> mbox cmd response data (48 bytes)
2,658,419 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,448 UART: [fmc] Received command: 0x10000003
2,667,904 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,602 UART: [kat] SHA2-256
901,542 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
920,335 UART: [kat] LMS
1,168,647 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,181,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,132 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,216,207 UART: [ldev] Erasing FE.KEYID = 1
1,242,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,282,081 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x4d454153
1,286,723 >>> mbox cmd response data (12 bytes)
1,286,724 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,286,951 UART: [fwproc] Recv command 0x46574c44
1,287,684 UART: [fwproc] Recv'd Img size: 111752 bytes
2,555,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,152 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,744,493 >>> mbox cmd response: success
2,745,606 UART: [afmc] ++
2,745,774 UART: [afmc] CDI.KEYID = 6
2,746,137 UART: [afmc] SUBJECT.KEYID = 7
2,746,563 UART: [afmc] AUTHORITY.KEYID = 5
2,782,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,798,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,725 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,421 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,320 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,013 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,825 UART: [afmc] --
2,825,883 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,825,905 UART: [cold-reset] --
2,826,601 UART: [state] Locking Datavault
2,827,840 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,444 UART: [state] Locking ICCM
2,829,104 UART: [exit] Launching FMC @ 0x40000000
2,834,401 UART:
2,834,417 UART: Running Caliptra FMC ...
2,834,825 UART:
2,835,055 UART: [fmc] Received command: 0x1000000A
2,836,484 >>> mbox cmd response data (116 bytes)
2,836,485 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,836,514 UART: [fmc] Received command: 0x10000009
2,837,712 >>> mbox cmd response data (48 bytes)
2,837,713 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,837,742 UART: [fmc] Received command: 0x10000003
2,847,198 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,777 >>> mbox cmd response data (12 bytes)
1,139,778 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,593,672 >>> mbox cmd response: success
2,650,701 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,798 UART:
2,656,814 UART: Running Caliptra FMC ...
2,657,222 UART:
2,657,452 UART: [fmc] Received command: 0x1000000A
2,658,881 >>> mbox cmd response data (116 bytes)
2,658,882 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,911 UART: [fmc] Received command: 0x10000009
2,660,109 >>> mbox cmd response data (48 bytes)
2,660,110 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,139 UART: [fmc] Received command: 0x10000003
2,669,595 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
916,650 UART: [kat] HMAC-384Kdf
921,408 UART: [kat] LMS
1,169,720 UART: [kat] --
1,170,679 UART: [cold-reset] ++
1,171,043 UART: [fht] FHT @ 0x50003400
1,173,695 UART: [idev] ++
1,173,863 UART: [idev] CDI.KEYID = 6
1,174,224 UART: [idev] SUBJECT.KEYID = 7
1,174,649 UART: [idev] UDS.KEYID = 0
1,182,379 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,275 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,216,012 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,281,020 UART: [fwproc] Wait for Commands...
1,281,709 UART: [fwproc] Recv command 0x4d454153
1,285,736 >>> mbox cmd response data (12 bytes)
1,285,737 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,285,950 UART: [fwproc] Recv command 0x46574c44
1,286,683 UART: [fwproc] Recv'd Img size: 111752 bytes
2,555,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,582,595 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,608,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,743,792 >>> mbox cmd response: success
2,744,829 UART: [afmc] ++
2,744,997 UART: [afmc] CDI.KEYID = 6
2,745,360 UART: [afmc] SUBJECT.KEYID = 7
2,745,786 UART: [afmc] AUTHORITY.KEYID = 5
2,780,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,130 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,826 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,725 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,418 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,484 UART: [afmc] --
2,824,356 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,378 UART: [cold-reset] --
2,825,354 UART: [state] Locking Datavault
2,826,289 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,893 UART: [state] Locking ICCM
2,827,437 UART: [exit] Launching FMC @ 0x40000000
2,832,734 UART:
2,832,750 UART: Running Caliptra FMC ...
2,833,158 UART:
2,833,388 UART: [fmc] Received command: 0x1000000A
2,834,817 >>> mbox cmd response data (116 bytes)
2,834,818 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,834,847 UART: [fmc] Received command: 0x10000009
2,836,045 >>> mbox cmd response data (48 bytes)
2,836,046 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,075 UART: [fmc] Received command: 0x10000003
2,845,531 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,858 >>> mbox cmd response data (12 bytes)
1,138,859 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,591,717 >>> mbox cmd response: success
2,648,736 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,035 UART:
2,655,051 UART: Running Caliptra FMC ...
2,655,459 UART:
2,655,689 UART: [fmc] Received command: 0x1000000A
2,657,118 >>> mbox cmd response data (116 bytes)
2,657,119 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,148 UART: [fmc] Received command: 0x10000009
2,658,346 >>> mbox cmd response data (48 bytes)
2,658,347 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,376 UART: [fmc] Received command: 0x10000003
2,667,832 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,224 UART: [kat] SHA2-256
902,164 UART: [kat] SHA2-384
905,015 UART: [kat] SHA2-512-ACC
906,916 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,418 UART: [cold-reset] ++
1,170,908 UART: [fht] FHT @ 0x50003400
1,173,470 UART: [idev] ++
1,173,638 UART: [idev] CDI.KEYID = 6
1,173,999 UART: [idev] SUBJECT.KEYID = 7
1,174,424 UART: [idev] UDS.KEYID = 0
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,538 UART: [idev] --
1,209,705 UART: [ldev] ++
1,209,873 UART: [ldev] CDI.KEYID = 6
1,210,237 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,282,095 UART: [fwproc] Wait for Commands...
1,282,890 UART: [fwproc] Recv command 0x4d454153
1,286,917 >>> mbox cmd response data (12 bytes)
1,286,918 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,287,089 UART: [fwproc] Recv command 0x46574c44
1,287,822 UART: [fwproc] Recv'd Img size: 111752 bytes
2,556,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,583,920 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,609,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,745,305 >>> mbox cmd response: success
2,746,384 UART: [afmc] ++
2,746,552 UART: [afmc] CDI.KEYID = 6
2,746,915 UART: [afmc] SUBJECT.KEYID = 7
2,747,341 UART: [afmc] AUTHORITY.KEYID = 5
2,782,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,799,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,799,811 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,805,507 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,811,406 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,817,099 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,824,851 UART: [afmc] --
2,825,743 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,825,765 UART: [cold-reset] --
2,826,339 UART: [state] Locking Datavault
2,827,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,828,280 UART: [state] Locking ICCM
2,828,768 UART: [exit] Launching FMC @ 0x40000000
2,834,065 UART:
2,834,081 UART: Running Caliptra FMC ...
2,834,489 UART:
2,834,719 UART: [fmc] Received command: 0x1000000A
2,836,148 >>> mbox cmd response data (116 bytes)
2,836,149 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,836,178 UART: [fmc] Received command: 0x10000009
2,837,376 >>> mbox cmd response data (48 bytes)
2,837,377 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,837,406 UART: [fmc] Received command: 0x10000003
2,846,862 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,885 >>> mbox cmd response data (12 bytes)
1,139,886 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,593,142 >>> mbox cmd response: success
2,649,363 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,655,330 UART:
2,655,346 UART: Running Caliptra FMC ...
2,655,754 UART:
2,655,984 UART: [fmc] Received command: 0x1000000A
2,657,413 >>> mbox cmd response data (116 bytes)
2,657,414 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,443 UART: [fmc] Received command: 0x10000009
2,658,641 >>> mbox cmd response data (48 bytes)
2,658,642 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,671 UART: [fmc] Received command: 0x10000003
2,668,127 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,470 UART: [state] LifecycleState = Unprovisioned
85,125 UART: [state] DebugLocked = No
85,839 UART: [state] WD Timer not started. Device not locked for debugging
87,104 UART: [kat] SHA2-256
890,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,783 UART: [kat] ++
894,935 UART: [kat] sha1
899,381 UART: [kat] SHA2-256
901,321 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,738 UART: [kat] HMAC-384Kdf
920,268 UART: [kat] LMS
1,168,580 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,665 UART: [fht] FHT @ 0x50003400
1,172,229 UART: [idev] ++
1,172,397 UART: [idev] CDI.KEYID = 6
1,172,758 UART: [idev] SUBJECT.KEYID = 7
1,173,183 UART: [idev] UDS.KEYID = 0
1,181,071 UART: [idev] Erasing UDS.KEYID = 0
1,197,933 UART: [idev] Sha1 KeyId Algorithm
1,206,999 UART: [idev] --
1,208,104 UART: [ldev] ++
1,208,272 UART: [ldev] CDI.KEYID = 6
1,208,636 UART: [ldev] SUBJECT.KEYID = 5
1,209,063 UART: [ldev] AUTHORITY.KEYID = 7
1,209,526 UART: [ldev] FE.KEYID = 1
1,214,396 UART: [ldev] Erasing FE.KEYID = 1
1,241,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,574 UART: [fwproc] Wait for Commands...
1,281,303 UART: [fwproc] Recv command 0x4d454153
1,285,330 >>> mbox cmd response data (12 bytes)
1,285,331 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,285,494 UART: [fwproc] Recv command 0x46574c44
1,286,227 UART: [fwproc] Recv'd Img size: 111752 bytes
2,554,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,425 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,742,748 >>> mbox cmd response: success
2,743,821 UART: [afmc] ++
2,743,989 UART: [afmc] CDI.KEYID = 6
2,744,352 UART: [afmc] SUBJECT.KEYID = 7
2,744,778 UART: [afmc] AUTHORITY.KEYID = 5
2,780,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,962 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,803,658 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,809,557 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,250 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,108 UART: [afmc] --
2,824,158 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,180 UART: [cold-reset] --
2,825,244 UART: [state] Locking Datavault
2,826,415 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,019 UART: [state] Locking ICCM
2,827,691 UART: [exit] Launching FMC @ 0x40000000
2,832,988 UART:
2,833,004 UART: Running Caliptra FMC ...
2,833,412 UART:
2,833,642 UART: [fmc] Received command: 0x1000000A
2,835,071 >>> mbox cmd response data (116 bytes)
2,835,072 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,835,101 UART: [fmc] Received command: 0x10000009
2,836,299 >>> mbox cmd response data (48 bytes)
2,836,300 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,329 UART: [fmc] Received command: 0x10000003
2,845,785 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,430 >>> mbox cmd response data (12 bytes)
1,139,431 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,592,845 >>> mbox cmd response: success
2,648,678 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,654,977 UART:
2,654,993 UART: Running Caliptra FMC ...
2,655,401 UART:
2,655,631 UART: [fmc] Received command: 0x1000000A
2,657,060 >>> mbox cmd response data (116 bytes)
2,657,061 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,657,090 UART: [fmc] Received command: 0x10000009
2,658,288 >>> mbox cmd response data (48 bytes)
2,658,289 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,658,318 UART: [fmc] Received command: 0x10000003
2,667,774 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
915,691 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,282 UART: [cold-reset] ++
1,169,740 UART: [fht] FHT @ 0x50003400
1,172,256 UART: [idev] ++
1,172,424 UART: [idev] CDI.KEYID = 6
1,172,785 UART: [idev] SUBJECT.KEYID = 7
1,173,210 UART: [idev] UDS.KEYID = 0
1,181,406 UART: [idev] Erasing UDS.KEYID = 0
1,198,344 UART: [idev] Sha1 KeyId Algorithm
1,207,096 UART: [idev] --
1,208,195 UART: [ldev] ++
1,208,363 UART: [ldev] CDI.KEYID = 6
1,208,727 UART: [ldev] SUBJECT.KEYID = 5
1,209,154 UART: [ldev] AUTHORITY.KEYID = 7
1,209,617 UART: [ldev] FE.KEYID = 1
1,214,569 UART: [ldev] Erasing FE.KEYID = 1
1,240,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,897 UART: [ldev] --
1,280,245 UART: [fwproc] Wait for Commands...
1,280,900 UART: [fwproc] Recv command 0x4d454153
1,284,927 >>> mbox cmd response data (12 bytes)
1,284,928 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,285,049 UART: [fwproc] Recv command 0x46574c44
1,285,782 UART: [fwproc] Recv'd Img size: 111752 bytes
2,554,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,576 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,607,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,742,943 >>> mbox cmd response: success
2,744,188 UART: [afmc] ++
2,744,356 UART: [afmc] CDI.KEYID = 6
2,744,719 UART: [afmc] SUBJECT.KEYID = 7
2,745,145 UART: [afmc] AUTHORITY.KEYID = 5
2,781,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,797,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,798,479 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,804,175 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,810,074 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,815,767 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,823,615 UART: [afmc] --
2,824,579 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,824,601 UART: [cold-reset] --
2,825,399 UART: [state] Locking Datavault
2,826,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,827,378 UART: [state] Locking ICCM
2,827,808 UART: [exit] Launching FMC @ 0x40000000
2,833,105 UART:
2,833,121 UART: Running Caliptra FMC ...
2,833,529 UART:
2,833,759 UART: [fmc] Received command: 0x1000000A
2,835,188 >>> mbox cmd response data (116 bytes)
2,835,189 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,835,218 UART: [fmc] Received command: 0x10000009
2,836,416 >>> mbox cmd response data (48 bytes)
2,836,417 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,836,446 UART: [fmc] Received command: 0x10000003
2,845,902 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,661 >>> mbox cmd response data (12 bytes)
1,141,662 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,594,102 >>> mbox cmd response: success
2,650,355 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,656,720 UART:
2,656,736 UART: Running Caliptra FMC ...
2,657,144 UART:
2,657,374 UART: [fmc] Received command: 0x1000000A
2,658,803 >>> mbox cmd response data (116 bytes)
2,658,804 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,658,833 UART: [fmc] Received command: 0x10000009
2,660,031 >>> mbox cmd response data (48 bytes)
2,660,032 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,660,061 UART: [fmc] Received command: 0x10000003
2,669,517 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,858 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,097 UART:
192,473 UART: Running Caliptra ROM ...
193,683 UART:
193,837 UART: [state] CFI Enabled
263,442 UART: [state] LifecycleState = Unprovisioned
265,799 UART: [state] DebugLocked = No
267,347 UART: [state] WD Timer not started. Device not locked for debugging
271,279 UART: [kat] SHA2-256
453,203 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,759 UART: [kat] ++
465,238 UART: [kat] sha1
475,802 UART: [kat] SHA2-256
478,825 UART: [kat] SHA2-384
483,990 UART: [kat] SHA2-512-ACC
486,607 UART: [kat] ECC-384
3,776,738 UART: [kat] HMAC-384Kdf
3,801,781 UART: [kat] LMS
4,874,974 UART: [kat] --
4,878,933 UART: [cold-reset] ++
4,880,926 UART: [fht] FHT @ 0x50003400
4,892,562 UART: [idev] ++
4,893,237 UART: [idev] CDI.KEYID = 6
4,894,476 UART: [idev] SUBJECT.KEYID = 7
4,895,604 UART: [idev] UDS.KEYID = 0
4,928,095 UART: [idev] Erasing UDS.KEYID = 0
8,241,086 UART: [idev] Sha1 KeyId Algorithm
8,263,466 UART: [idev] --
8,267,957 UART: [ldev] ++
8,268,564 UART: [ldev] CDI.KEYID = 6
8,269,758 UART: [ldev] SUBJECT.KEYID = 5
8,270,919 UART: [ldev] AUTHORITY.KEYID = 7
8,272,152 UART: [ldev] FE.KEYID = 1
8,315,576 UART: [ldev] Erasing FE.KEYID = 1
11,644,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,084 UART: [ldev] --
14,015,477 UART: [fwproc] Wait for Commands...
14,017,578 UART: [fwproc] Recv command 0x46574c44
14,019,858 UART: Invalid Img size: 0 bytes
14,023,417 UART: ROM Fatal Error: 0x01020002
14,026,732 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,796 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,831,890 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
4,133 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,348 UART:
192,733 UART: Running Caliptra ROM ...
193,944 UART:
603,408 UART: [state] CFI Enabled
616,700 UART: [state] LifecycleState = Unprovisioned
619,033 UART: [state] DebugLocked = No
620,897 UART: [state] WD Timer not started. Device not locked for debugging
625,908 UART: [kat] SHA2-256
807,921 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,449 UART: [kat] ++
820,036 UART: [kat] sha1
828,922 UART: [kat] SHA2-256
831,945 UART: [kat] SHA2-384
837,274 UART: [kat] SHA2-512-ACC
839,888 UART: [kat] ECC-384
4,094,992 UART: [kat] HMAC-384Kdf
4,107,827 UART: [kat] LMS
5,181,005 UART: [kat] --
5,187,086 UART: [cold-reset] ++
5,188,538 UART: [fht] FHT @ 0x50003400
5,198,762 UART: [idev] ++
5,199,437 UART: [idev] CDI.KEYID = 6
5,200,593 UART: [idev] SUBJECT.KEYID = 7
5,202,129 UART: [idev] UDS.KEYID = 0
5,220,518 UART: [idev] Erasing UDS.KEYID = 0
8,492,534 UART: [idev] Sha1 KeyId Algorithm
8,514,955 UART: [idev] --
8,518,829 UART: [ldev] ++
8,519,410 UART: [ldev] CDI.KEYID = 6
8,520,645 UART: [ldev] SUBJECT.KEYID = 5
8,522,073 UART: [ldev] AUTHORITY.KEYID = 7
8,523,637 UART: [ldev] FE.KEYID = 1
8,536,118 UART: [ldev] Erasing FE.KEYID = 1
11,827,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,491 UART: [ldev] --
14,189,950 UART: [fwproc] Wait for Commands...
14,192,913 UART: [fwproc] Recv command 0x46574c44
14,195,240 UART: Invalid Img size: 0 bytes
14,197,462 UART: ROM Fatal Error: 0x01020002
14,200,770 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,185 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,012,728 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,969 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,249 UART:
192,619 UART: Running Caliptra ROM ...
193,826 UART:
193,975 UART: [state] CFI Enabled
262,020 UART: [state] LifecycleState = Unprovisioned
263,888 UART: [state] DebugLocked = No
266,679 UART: [state] WD Timer not started. Device not locked for debugging
271,048 UART: [kat] SHA2-256
450,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,777 UART: [kat] ++
462,313 UART: [kat] sha1
472,928 UART: [kat] SHA2-256
475,924 UART: [kat] SHA2-384
481,930 UART: [kat] SHA2-512-ACC
484,924 UART: [kat] ECC-384
2,950,641 UART: [kat] HMAC-384Kdf
2,970,064 UART: [kat] LMS
3,499,536 UART: [kat] --
3,503,157 UART: [cold-reset] ++
3,505,787 UART: [fht] FHT @ 0x50003400
3,516,176 UART: [idev] ++
3,516,781 UART: [idev] CDI.KEYID = 6
3,517,694 UART: [idev] SUBJECT.KEYID = 7
3,518,860 UART: [idev] UDS.KEYID = 0
3,541,595 UART: [idev] Erasing UDS.KEYID = 0
6,027,149 UART: [idev] Sha1 KeyId Algorithm
6,051,402 UART: [idev] --
6,056,968 UART: [ldev] ++
6,057,540 UART: [ldev] CDI.KEYID = 6
6,058,475 UART: [ldev] SUBJECT.KEYID = 5
6,059,642 UART: [ldev] AUTHORITY.KEYID = 7
6,060,876 UART: [ldev] FE.KEYID = 1
6,097,947 UART: [ldev] Erasing FE.KEYID = 1
8,601,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,678 UART: [ldev] --
10,411,772 UART: [fwproc] Wait for Commands...
10,413,335 UART: [fwproc] Recv command 0x46574c44
10,415,435 UART: Invalid Img size: 0 bytes
10,417,769 UART: ROM Fatal Error: 0x01020002
10,420,872 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,957 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,206,268 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,091 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,339 UART:
192,705 UART: Running Caliptra ROM ...
193,856 UART:
603,514 UART: [state] CFI Enabled
616,856 UART: [state] LifecycleState = Unprovisioned
618,733 UART: [state] DebugLocked = No
619,898 UART: [state] WD Timer not started. Device not locked for debugging
622,831 UART: [kat] SHA2-256
801,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,529 UART: [kat] ++
814,060 UART: [kat] sha1
824,632 UART: [kat] SHA2-256
827,689 UART: [kat] SHA2-384
832,687 UART: [kat] SHA2-512-ACC
835,671 UART: [kat] ECC-384
3,273,897 UART: [kat] HMAC-384Kdf
3,286,722 UART: [kat] LMS
3,816,235 UART: [kat] --
3,819,774 UART: [cold-reset] ++
3,822,041 UART: [fht] FHT @ 0x50003400
3,833,401 UART: [idev] ++
3,833,966 UART: [idev] CDI.KEYID = 6
3,834,877 UART: [idev] SUBJECT.KEYID = 7
3,836,085 UART: [idev] UDS.KEYID = 0
3,853,597 UART: [idev] Erasing UDS.KEYID = 0
6,309,812 UART: [idev] Sha1 KeyId Algorithm
6,332,886 UART: [idev] --
6,336,831 UART: [ldev] ++
6,337,399 UART: [ldev] CDI.KEYID = 6
6,338,378 UART: [ldev] SUBJECT.KEYID = 5
6,339,477 UART: [ldev] AUTHORITY.KEYID = 7
6,340,760 UART: [ldev] FE.KEYID = 1
6,351,852 UART: [ldev] Erasing FE.KEYID = 1
8,826,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,194 UART: [ldev] --
10,615,007 UART: [fwproc] Wait for Commands...
10,616,758 UART: [fwproc] Recv command 0x46574c44
10,618,864 UART: Invalid Img size: 0 bytes
10,622,597 UART: ROM Fatal Error: 0x01020002
10,625,696 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,250 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,410,568 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
3,943 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,194 UART:
192,589 UART: Running Caliptra ROM ...
193,751 UART:
193,920 UART: [state] CFI Enabled
267,009 UART: [state] LifecycleState = Unprovisioned
268,895 UART: [state] DebugLocked = No
271,246 UART: [state] WD Timer not started. Device not locked for debugging
275,730 UART: [kat] SHA2-256
454,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,404 UART: [kat] ++
466,941 UART: [kat] sha1
477,127 UART: [kat] SHA2-256
480,185 UART: [kat] SHA2-384
487,345 UART: [kat] SHA2-512-ACC
490,280 UART: [kat] ECC-384
2,949,414 UART: [kat] HMAC-384Kdf
2,971,418 UART: [kat] LMS
3,500,862 UART: [kat] --
3,506,038 UART: [cold-reset] ++
3,507,668 UART: [fht] FHT @ 0x50003400
3,518,759 UART: [idev] ++
3,519,325 UART: [idev] CDI.KEYID = 6
3,520,235 UART: [idev] SUBJECT.KEYID = 7
3,521,448 UART: [idev] UDS.KEYID = 0
3,544,009 UART: [idev] Erasing UDS.KEYID = 0
6,025,428 UART: [idev] Sha1 KeyId Algorithm
6,047,662 UART: [idev] --
6,049,966 UART: [ldev] ++
6,050,544 UART: [ldev] CDI.KEYID = 6
6,051,458 UART: [ldev] SUBJECT.KEYID = 5
6,052,625 UART: [ldev] AUTHORITY.KEYID = 7
6,053,895 UART: [ldev] FE.KEYID = 1
6,079,999 UART: [ldev] Erasing FE.KEYID = 1
8,585,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,054 UART: [ldev] --
10,397,052 UART: [fwproc] Wait for Commands...
10,399,259 UART: [fwproc] Recv command 0x46574c44
10,401,310 UART: Invalid Img size: 0 bytes
10,404,491 UART: ROM Fatal Error: 0x01020002
10,407,585 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,983 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,206,695 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
4,298 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,495 UART:
192,879 UART: Running Caliptra ROM ...
194,065 UART:
603,747 UART: [state] CFI Enabled
616,347 UART: [state] LifecycleState = Unprovisioned
618,252 UART: [state] DebugLocked = No
620,706 UART: [state] WD Timer not started. Device not locked for debugging
623,941 UART: [kat] SHA2-256
803,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,632 UART: [kat] ++
815,080 UART: [kat] sha1
826,203 UART: [kat] SHA2-256
829,260 UART: [kat] SHA2-384
834,151 UART: [kat] SHA2-512-ACC
837,095 UART: [kat] ECC-384
3,279,424 UART: [kat] HMAC-384Kdf
3,291,851 UART: [kat] LMS
3,821,357 UART: [kat] --
3,826,384 UART: [cold-reset] ++
3,828,963 UART: [fht] FHT @ 0x50003400
3,838,970 UART: [idev] ++
3,839,560 UART: [idev] CDI.KEYID = 6
3,840,481 UART: [idev] SUBJECT.KEYID = 7
3,841,693 UART: [idev] UDS.KEYID = 0
3,855,563 UART: [idev] Erasing UDS.KEYID = 0
6,313,132 UART: [idev] Sha1 KeyId Algorithm
6,335,923 UART: [idev] --
6,339,752 UART: [ldev] ++
6,340,352 UART: [ldev] CDI.KEYID = 6
6,341,237 UART: [ldev] SUBJECT.KEYID = 5
6,342,396 UART: [ldev] AUTHORITY.KEYID = 7
6,343,677 UART: [ldev] FE.KEYID = 1
6,354,759 UART: [ldev] Erasing FE.KEYID = 1
8,827,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,210 UART: [ldev] --
10,618,828 UART: [fwproc] Wait for Commands...
10,621,839 UART: [fwproc] Recv command 0x46574c44
10,623,930 UART: Invalid Img size: 0 bytes
10,628,311 UART: ROM Fatal Error: 0x01020002
10,631,454 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
4,493 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,414,731 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
891,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,867 UART: [kat] ++
896,019 UART: [kat] sha1
900,155 UART: [kat] SHA2-256
902,095 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,654 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,631 UART: [cold-reset] ++
1,171,163 UART: [fht] FHT @ 0x50003400
1,173,949 UART: [idev] ++
1,174,117 UART: [idev] CDI.KEYID = 6
1,174,478 UART: [idev] SUBJECT.KEYID = 7
1,174,903 UART: [idev] UDS.KEYID = 0
1,182,815 UART: [idev] Erasing UDS.KEYID = 0
1,200,161 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,358 UART: [ldev] ++
1,210,526 UART: [ldev] CDI.KEYID = 6
1,210,890 UART: [ldev] SUBJECT.KEYID = 5
1,211,317 UART: [ldev] AUTHORITY.KEYID = 7
1,211,780 UART: [ldev] FE.KEYID = 1
1,216,966 UART: [ldev] Erasing FE.KEYID = 1
1,243,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,428 UART: [ldev] --
1,282,928 UART: [fwproc] Wait for Commands...
1,283,585 UART: [fwproc] Recv command 0x46574c44
1,284,314 UART: Invalid Img size: 0 bytes
1,285,152 UART: ROM Fatal Error: 0x01020002
1,286,311 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,135,803 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,051 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,181,890 UART: [idev] Erasing UDS.KEYID = 0
1,199,068 UART: [idev] Sha1 KeyId Algorithm
1,207,918 UART: [idev] --
1,209,033 UART: [ldev] ++
1,209,201 UART: [ldev] CDI.KEYID = 6
1,209,565 UART: [ldev] SUBJECT.KEYID = 5
1,209,992 UART: [ldev] AUTHORITY.KEYID = 7
1,210,455 UART: [ldev] FE.KEYID = 1
1,215,737 UART: [ldev] Erasing FE.KEYID = 1
1,241,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,543 UART: [ldev] --
1,280,901 UART: [fwproc] Wait for Commands...
1,281,492 UART: [fwproc] Recv command 0x46574c44
1,282,221 UART: Invalid Img size: 0 bytes
1,283,109 UART: ROM Fatal Error: 0x01020002
1,284,268 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,910 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,803 UART: [cold-reset] ++
1,170,365 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,181,927 UART: [idev] Erasing UDS.KEYID = 0
1,198,971 UART: [idev] Sha1 KeyId Algorithm
1,207,693 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,308 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,204 UART: [ldev] --
1,280,506 UART: [fwproc] Wait for Commands...
1,281,187 UART: [fwproc] Recv command 0x46574c44
1,281,916 UART: Invalid Img size: 0 bytes
1,282,832 UART: ROM Fatal Error: 0x01020002
1,283,991 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,063 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,768 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,182,110 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,417 UART: [ldev] ++
1,209,585 UART: [ldev] CDI.KEYID = 6
1,209,949 UART: [ldev] SUBJECT.KEYID = 5
1,210,376 UART: [ldev] AUTHORITY.KEYID = 7
1,210,839 UART: [ldev] FE.KEYID = 1
1,215,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,375 UART: [fwproc] Wait for Commands...
1,282,026 UART: [fwproc] Recv command 0x46574c44
1,282,755 UART: Invalid Img size: 0 bytes
1,283,721 UART: ROM Fatal Error: 0x01020002
1,284,880 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,280 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,181,573 UART: [idev] Erasing UDS.KEYID = 0
1,198,269 UART: [idev] Sha1 KeyId Algorithm
1,207,069 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,718 UART: [ldev] Erasing FE.KEYID = 1
1,240,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,398 UART: [ldev] --
1,279,808 UART: [fwproc] Wait for Commands...
1,280,385 UART: [fwproc] Recv command 0x46574c44
1,281,114 UART: Invalid Img size: 0 bytes
1,282,012 UART: ROM Fatal Error: 0x01020002
1,283,171 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,871 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,807 UART: [kat] LMS
1,169,119 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,418 UART: [idev] Sha1 KeyId Algorithm
1,208,434 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,331 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,994 UART: [fwproc] Recv command 0x46574c44
1,283,723 UART: Invalid Img size: 0 bytes
1,284,803 UART: ROM Fatal Error: 0x01020002
1,285,962 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,030 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,023 UART:
192,408 UART: Running Caliptra ROM ...
193,553 UART:
193,730 UART: [state] CFI Enabled
261,554 UART: [state] LifecycleState = Unprovisioned
263,909 UART: [state] DebugLocked = No
265,512 UART: [state] WD Timer not started. Device not locked for debugging
269,995 UART: [kat] SHA2-256
451,918 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,441 UART: [kat] ++
464,023 UART: [kat] sha1
473,402 UART: [kat] SHA2-256
476,407 UART: [kat] SHA2-384
482,599 UART: [kat] SHA2-512-ACC
485,203 UART: [kat] ECC-384
3,773,085 UART: [kat] HMAC-384Kdf
3,803,226 UART: [kat] LMS
4,876,415 UART: [kat] --
4,878,119 UART: [cold-reset] ++
4,880,463 UART: [fht] FHT @ 0x50003400
4,892,050 UART: [idev] ++
4,892,771 UART: [idev] CDI.KEYID = 6
4,893,964 UART: [idev] SUBJECT.KEYID = 7
4,895,071 UART: [idev] UDS.KEYID = 0
4,930,825 UART: [idev] Erasing UDS.KEYID = 0
8,246,248 UART: [idev] Sha1 KeyId Algorithm
8,266,886 UART: [idev] CSR upload begun
8,272,358 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,574,204 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,590,543 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,606,615 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,622,592 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,647,196 UART: [idev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
10,793,260 UART: [idev] CSR uploaded
10,810,407 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,953,701 UART: [idev] --
10,954,343 UART: [ldev] ++
10,954,840 UART: [ldev] CDI.KEYID = 6
10,955,716 UART: [ldev] SUBJECT.KEYID = 5
10,956,890 UART: [ldev] AUTHORITY.KEYID = 7
10,958,073 UART: [ldev] FE.KEYID = 1
10,958,957 UART: [ldev] Erasing FE.KEYID = 1
14,190,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,501,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,517,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,533,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,549,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,569,237 UART: [ldev] --
16,574,165 UART: [fwproc] Wait for Commands...
16,575,673 UART: [fwproc] Recv command 0x46574c44
16,577,993 UART: [fwproc] Recv'd Img size: 113844 bytes
20,651,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,730,846 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,799,615 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
21,116,525 >>> mbox cmd response: success
21,120,820 UART: [afmc] ++
21,121,402 UART: [afmc] CDI.KEYID = 6
21,122,511 UART: [afmc] SUBJECT.KEYID = 7
21,123,717 UART: [afmc] AUTHORITY.KEYID = 5
24,483,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,782,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,784,338 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,800,481 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,816,554 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,832,542 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,855,692 UART: [afmc] --
26,858,903 UART: [cold-reset] --
26,863,485 UART: [state] Locking Datavault
26,869,001 UART: [state] Locking PCR0, PCR1 and PCR31
26,870,653 UART: [state] Locking ICCM
26,872,725 UART: [exit] Launching FMC @ 0x40000130
26,881,391 UART:
26,881,622 UART: Running Caliptra FMC ...
26,882,722 UART:
26,882,876 UART: [state] CFI Enabled
26,939,467 UART: [fht] FMC Alias Private Key: 7
29,277,707 UART: [art] Extend RT PCRs Done
29,278,930 UART: [art] Lock RT PCRs Done
29,280,577 UART: [art] Populate DV Done
29,285,663 UART: [fht] FMC Alias Private Key: 7
29,287,178 UART: [art] Derive CDI
29,287,921 UART: [art] Store in in slot 0x4
29,347,423 UART: [art] Derive Key Pair
29,348,428 UART: [art] Store priv key in slot 0x5
32,640,794 UART: [art] Derive Key Pair - Done
32,653,950 UART: [art] Signing Cert with AUTHO
32,655,278 UART: RITY.KEYID = 7
34,942,503 UART: [art] Erasing AUTHORITY.KEYID = 7
34,944,007 UART: [art] PUB.X = 6E27FB19A351CB9A109564C237B519BBAC8910D8F377135C9E0E4DA0E0656244A329F5578291413CCD051EE6D13DEDBA
34,951,243 UART: [art] PUB.Y = B8A220872294FD09DB8D3389D623E146908BAFF78CE836712CD14FD758BA858729B69FF995100F246933B80EBBB5F07C
34,958,470 UART: [art] SIG.R = 1AAD9EA671F2D1456878E462DCF211422518DB03B46082CFC381ECD5AC320D81787273F9F2E90DB713DEEBD40C572348
34,965,864 UART: [art] SIG.S = F03617DDB0835EE44FCEA495673B997A0F7881AFA2014BDC5DF8902FAF73DC94B56FE1A36128E7790211D7B1D490608F
36,271,344 UART: Caliptra RT
36,272,056 UART: [state] CFI Enabled
36,431,337 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
10,501,390 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,705,450 >>> mbox cmd response: success
26,411,168 UART:
26,411,574 UART: Running Caliptra FMC ...
26,412,729 UART:
26,412,900 UART: [state] CFI Enabled
26,477,107 UART: [fht] FMC Alias Private Key: 7
28,814,411 UART: [art] Extend RT PCRs Done
28,815,638 UART: [art] Lock RT PCRs Done
28,817,402 UART: [art] Populate DV Done
28,822,674 UART: [fht] FMC Alias Private Key: 7
28,824,327 UART: [art] Derive CDI
28,825,063 UART: [art] Store in in slot 0x4
28,885,900 UART: [art] Derive Key Pair
28,886,943 UART: [art] Store priv key in slot 0x5
32,180,045 UART: [art] Derive Key Pair - Done
32,192,990 UART: [art] Signing Cert with AUTHO
32,194,288 UART: RITY.KEYID = 7
34,482,241 UART: [art] Erasing AUTHORITY.KEYID = 7
34,483,747 UART: [art] PUB.X = 2927D0CCF3BDF9722E65B90CFDF7F40A65218F2D3179A12F1250BED92CF10C90A2D9129D32D098A2FF5AFE7C61789B64
34,491,012 UART: [art] PUB.Y = 4170C744092D459F8A164452215922467ECAAD027969CBF7C0B2ADEDD621B2233F0D056035176B1DFB138B83CD565331
34,498,218 UART: [art] SIG.R = 6FB03C06BD70137456B797C345B2879A72376274161C9F023332D19928D4B59FF0F2C785E91CA8FC74DB861CFE9D52A2
34,505,578 UART: [art] SIG.S = 8955B1AD891B6EE5B22C1C39E661BE71DD593E5A6E38FCC3A521A997D2CF60F4CB5F0DF5639172DED00F70CFCB9836D4
35,811,054 UART: Caliptra RT
35,811,779 UART: [state] CFI Enabled
35,974,803 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,529 UART:
192,917 UART: Running Caliptra ROM ...
194,157 UART:
603,854 UART: [state] CFI Enabled
618,712 UART: [state] LifecycleState = Unprovisioned
621,072 UART: [state] DebugLocked = No
622,777 UART: [state] WD Timer not started. Device not locked for debugging
628,114 UART: [kat] SHA2-256
810,082 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,634 UART: [kat] ++
822,168 UART: [kat] sha1
832,722 UART: [kat] SHA2-256
835,764 UART: [kat] SHA2-384
841,311 UART: [kat] SHA2-512-ACC
843,920 UART: [kat] ECC-384
4,098,295 UART: [kat] HMAC-384Kdf
4,111,067 UART: [kat] LMS
5,184,034 UART: [kat] --
5,187,874 UART: [cold-reset] ++
5,190,495 UART: [fht] FHT @ 0x50003400
5,202,019 UART: [idev] ++
5,202,699 UART: [idev] CDI.KEYID = 6
5,203,937 UART: [idev] SUBJECT.KEYID = 7
5,205,378 UART: [idev] UDS.KEYID = 0
5,221,695 UART: [idev] Erasing UDS.KEYID = 0
8,493,037 UART: [idev] Sha1 KeyId Algorithm
8,513,177 UART: [idev] CSR upload begun
8,518,664 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,809,664 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,826,064 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,842,157 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,858,155 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,882,684 UART: [idev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
11,028,589 UART: [idev] CSR uploaded
11,045,702 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
11,188,860 UART: [idev] --
11,189,499 UART: [ldev] ++
11,190,030 UART: [ldev] CDI.KEYID = 6
11,190,931 UART: [ldev] SUBJECT.KEYID = 5
11,192,001 UART: [ldev] AUTHORITY.KEYID = 7
11,193,087 UART: [ldev] FE.KEYID = 1
11,193,916 UART: [ldev] Erasing FE.KEYID = 1
14,350,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,641,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,657,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,673,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,689,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,710,358 UART: [ldev] --
16,715,779 UART: [fwproc] Wait for Commands...
16,717,444 UART: [fwproc] Recv command 0x46574c44
16,719,769 UART: [fwproc] Recv'd Img size: 113844 bytes
20,788,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,862,974 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,931,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
21,248,144 >>> mbox cmd response: success
21,251,395 UART: [afmc] ++
21,251,988 UART: [afmc] CDI.KEYID = 6
21,253,223 UART: [afmc] SUBJECT.KEYID = 7
21,254,319 UART: [afmc] AUTHORITY.KEYID = 5
24,572,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,865,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,867,467 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,883,629 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,899,711 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,915,678 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,937,448 UART: [afmc] --
26,941,754 UART: [cold-reset] --
26,945,177 UART: [state] Locking Datavault
26,951,715 UART: [state] Locking PCR0, PCR1 and PCR31
26,953,349 UART: [state] Locking ICCM
26,955,198 UART: [exit] Launching FMC @ 0x40000130
26,963,849 UART:
26,964,076 UART: Running Caliptra FMC ...
26,965,172 UART:
26,965,322 UART: [state] CFI Enabled
26,973,572 UART: [fht] FMC Alias Private Key: 7
29,304,135 UART: [art] Extend RT PCRs Done
29,305,362 UART: [art] Lock RT PCRs Done
29,306,951 UART: [art] Populate DV Done
29,312,405 UART: [fht] FMC Alias Private Key: 7
29,313,887 UART: [art] Derive CDI
29,314,627 UART: [art] Store in in slot 0x4
29,357,230 UART: [art] Derive Key Pair
29,358,228 UART: [art] Store priv key in slot 0x5
32,599,996 UART: [art] Derive Key Pair - Done
32,612,886 UART: [art] Signing Cert with AUTHO
32,614,187 UART: RITY.KEYID = 7
34,893,797 UART: [art] Erasing AUTHORITY.KEYID = 7
34,895,324 UART: [art] PUB.X = 924137E4B5311E044900540B0F3E6432956A640AC979A8DAD7EBA5481FF338F6A08406D12DB5A8D54EDD5B364482839A
34,902,536 UART: [art] PUB.Y = 494534EB891379845801D1D80C5C2AFA33C83A4BE4EFFD277B468BE02F77CCF1014682AE2D8C6128B64816E80533957E
34,909,776 UART: [art] SIG.R = F160406B6290F37EDC7565D012001C58C6CFD0F624E56A2AED24188C71C7166518B0517C5602EC636289FEF19DF2792B
34,917,177 UART: [art] SIG.S = 2273D23248823507E428C5E666004E8A3E8610FD3D52D01A5131044D48F55FFEE91D350A12F24BE3D9D21AACB4139EC0
36,222,511 UART: Caliptra RT
36,223,224 UART: [state] CFI Enabled
36,340,231 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,834 writing to cptra_bootfsm_go
10,740,626 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,870,577 >>> mbox cmd response: success
26,511,930 UART:
26,512,324 UART: Running Caliptra FMC ...
26,513,439 UART:
26,513,585 UART: [state] CFI Enabled
26,521,369 UART: [fht] FMC Alias Private Key: 7
28,852,311 UART: [art] Extend RT PCRs Done
28,853,531 UART: [art] Lock RT PCRs Done
28,855,258 UART: [art] Populate DV Done
28,860,832 UART: [fht] FMC Alias Private Key: 7
28,862,474 UART: [art] Derive CDI
28,863,205 UART: [art] Store in in slot 0x4
28,906,016 UART: [art] Derive Key Pair
28,907,055 UART: [art] Store priv key in slot 0x5
32,148,502 UART: [art] Derive Key Pair - Done
32,161,555 UART: [art] Signing Cert with AUTHO
32,163,058 UART: RITY.KEYID = 7
34,442,462 UART: [art] Erasing AUTHORITY.KEYID = 7
34,443,966 UART: [art] PUB.X = A4076BB1144B1B098D45EB2C0153DF43D59662483FACC27FEF6163EC687934C18906BC2C39756133018CF1844CBC50B1
34,451,211 UART: [art] PUB.Y = A39872B59AFFFD8C5D777940FFCC3085C1C80362DF1F199895AE6F50DA2965CF5554B6CDF059D26DEAE0ABF5EE314E33
34,458,447 UART: [art] SIG.R = 0F4A0D5875904A4FBE27F101497977805C4906B7B45D0EA41D7D938BDFA9A79AB305E69427673B2E502DD3A072016A27
34,465,847 UART: [art] SIG.S = ECD34C0C9985C9B682944C3ADB1C6591DE4ED01D84E73048CC3DCA5A57E7EC0CD02214A0954E76DF85908A6956C7C0A4
35,771,291 UART: Caliptra RT
35,771,990 UART: [state] CFI Enabled
35,888,958 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,397 UART:
192,784 UART: Running Caliptra ROM ...
193,900 UART:
194,062 UART: [state] CFI Enabled
264,173 UART: [state] LifecycleState = Unprovisioned
266,033 UART: [state] DebugLocked = No
268,300 UART: [state] WD Timer not started. Device not locked for debugging
271,316 UART: [kat] SHA2-256
450,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,004 UART: [kat] ++
462,544 UART: [kat] sha1
473,913 UART: [kat] SHA2-256
476,920 UART: [kat] SHA2-384
482,194 UART: [kat] SHA2-512-ACC
485,127 UART: [kat] ECC-384
2,948,172 UART: [kat] HMAC-384Kdf
2,971,356 UART: [kat] LMS
3,500,778 UART: [kat] --
3,504,716 UART: [cold-reset] ++
3,506,021 UART: [fht] FHT @ 0x50003400
3,516,738 UART: [idev] ++
3,517,311 UART: [idev] CDI.KEYID = 6
3,518,217 UART: [idev] SUBJECT.KEYID = 7
3,519,375 UART: [idev] UDS.KEYID = 0
3,543,831 UART: [idev] Erasing UDS.KEYID = 0
6,024,157 UART: [idev] Sha1 KeyId Algorithm
6,044,744 UART: [idev] CSR upload begun
6,049,471 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,779,519 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,795,558 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,811,560 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,827,386 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,851,228 UART: [idev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
7,996,312 UART: [idev] CSR uploaded
8,014,455 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,158,680 UART: [idev] --
8,159,343 UART: [ldev] ++
8,159,843 UART: [ldev] CDI.KEYID = 6
8,160,744 UART: [ldev] SUBJECT.KEYID = 5
8,161,828 UART: [ldev] AUTHORITY.KEYID = 7
8,162,918 UART: [ldev] FE.KEYID = 1
8,163,858 UART: [ldev] Erasing FE.KEYID = 1
10,566,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,303,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,319,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,335,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,351,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,371,228 UART: [ldev] --
12,376,802 UART: [fwproc] Wait for Commands...
12,379,611 UART: [fwproc] Recv command 0x46574c44
12,381,711 UART: [fwproc] Recv'd Img size: 114168 bytes
15,788,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,863,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,932,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,250,037 >>> mbox cmd response: success
16,253,703 UART: [afmc] ++
16,254,296 UART: [afmc] CDI.KEYID = 6
16,255,206 UART: [afmc] SUBJECT.KEYID = 7
16,256,364 UART: [afmc] AUTHORITY.KEYID = 5
18,793,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,516,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,518,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,534,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,550,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,566,109 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,587,640 UART: [afmc] --
20,592,152 UART: [cold-reset] --
20,595,925 UART: [state] Locking Datavault
20,600,957 UART: [state] Locking PCR0, PCR1 and PCR31
20,602,656 UART: [state] Locking ICCM
20,605,416 UART: [exit] Launching FMC @ 0x40000130
20,613,845 UART:
20,614,147 UART: Running Caliptra FMC ...
20,615,267 UART:
20,615,424 UART: [state] CFI Enabled
20,677,456 UART: [fht] FMC Alias Private Key: 7
22,441,748 UART: [art] Extend RT PCRs Done
22,442,947 UART: [art] Lock RT PCRs Done
22,444,509 UART: [art] Populate DV Done
22,450,176 UART: [fht] FMC Alias Private Key: 7
22,451,664 UART: [art] Derive CDI
22,452,436 UART: [art] Store in in slot 0x4
22,509,584 UART: [art] Derive Key Pair
22,510,606 UART: [art] Store priv key in slot 0x5
24,973,850 UART: [art] Derive Key Pair - Done
24,986,742 UART: [art] Signing Cert with AUTHO
24,988,046 UART: RITY.KEYID = 7
26,699,105 UART: [art] Erasing AUTHORITY.KEYID = 7
26,700,588 UART: [art] PUB.X = A4A6084657D6210AE9E96579D790CA01F2CCEED0E2569A5B5D8FAA6A64597976BD0677674FE32E72C18A6777DB713DD9
26,707,897 UART: [art] PUB.Y = 0D88FD9938E5EAF359E0518019909559FFD2338CC5F38D09BABF8498142CAA07B7AE5A3A88332CC9B6D5BD383C0995C7
26,715,135 UART: [art] SIG.R = EBA1FC4DF4B4CD4F02E213DD247AB5F68F203653F649F320EC208B3B4BEC97947107BA2A9C27F6AF641F7370D6A80C24
26,722,525 UART: [art] SIG.S = 745B48E3EBFFCE264D52CF47347B5F6A241F3087030F252F477D21144B466EE712DE9CC3E2D30506B40427CB595394BB
27,701,439 UART: Caliptra RT
27,702,159 UART: [state] CFI Enabled
27,866,473 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
7,690,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,837,187 >>> mbox cmd response: success
20,120,217 UART:
20,120,602 UART: Running Caliptra FMC ...
20,121,830 UART:
20,122,017 UART: [state] CFI Enabled
20,186,321 UART: [fht] FMC Alias Private Key: 7
21,950,006 UART: [art] Extend RT PCRs Done
21,951,240 UART: [art] Lock RT PCRs Done
21,952,701 UART: [art] Populate DV Done
21,958,014 UART: [fht] FMC Alias Private Key: 7
21,959,670 UART: [art] Derive CDI
21,960,487 UART: [art] Store in in slot 0x4
22,019,381 UART: [art] Derive Key Pair
22,020,418 UART: [art] Store priv key in slot 0x5
24,483,121 UART: [art] Derive Key Pair - Done
24,495,850 UART: [art] Signing Cert with AUTHO
24,497,164 UART: RITY.KEYID = 7
26,209,545 UART: [art] Erasing AUTHORITY.KEYID = 7
26,211,187 UART: [art] PUB.X = 1C57CE21B99335E94C2F32F020F99A553E7C38EAE704D6DA1913A93CACA26D6953F0E2F604A36D0C662EE3D318409154
26,218,336 UART: [art] PUB.Y = 3AEB79C3AD80EE83AD2A81F7EEC7A08E0B1952278B199694D9735B3746E5489242518823C5FDC84E74FB4048EBDE99B6
26,225,563 UART: [art] SIG.R = 1730429EE6D7ACB39843398F9A6C876A0B6F4D53113F0D2B8B048DC25B54140D12581A44D1BB4E5BCD778D3E922B0C66
26,232,962 UART: [art] SIG.S = 1CA21DF3EB3AE91B956AF13D34474BD888C03E2A14B530BA1BDE805564CD828069F0F07D09CFCD2E02AB3848E20536D5
27,212,034 UART: Caliptra RT
27,212,754 UART: [state] CFI Enabled
27,377,378 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,579 UART:
192,946 UART: Running Caliptra ROM ...
194,148 UART:
603,544 UART: [state] CFI Enabled
618,870 UART: [state] LifecycleState = Unprovisioned
620,749 UART: [state] DebugLocked = No
623,015 UART: [state] WD Timer not started. Device not locked for debugging
627,429 UART: [kat] SHA2-256
806,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,130 UART: [kat] ++
818,575 UART: [kat] sha1
829,990 UART: [kat] SHA2-256
832,986 UART: [kat] SHA2-384
838,416 UART: [kat] SHA2-512-ACC
841,403 UART: [kat] ECC-384
3,285,476 UART: [kat] HMAC-384Kdf
3,298,481 UART: [kat] LMS
3,827,992 UART: [kat] --
3,832,412 UART: [cold-reset] ++
3,833,361 UART: [fht] FHT @ 0x50003400
3,843,727 UART: [idev] ++
3,844,292 UART: [idev] CDI.KEYID = 6
3,845,171 UART: [idev] SUBJECT.KEYID = 7
3,846,381 UART: [idev] UDS.KEYID = 0
3,864,329 UART: [idev] Erasing UDS.KEYID = 0
6,325,853 UART: [idev] Sha1 KeyId Algorithm
6,346,055 UART: [idev] CSR upload begun
6,350,768 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,067,899 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,083,988 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,099,898 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,115,734 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,139,590 UART: [idev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
8,284,704 UART: [idev] CSR uploaded
8,302,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,446,411 UART: [idev] --
8,447,057 UART: [ldev] ++
8,447,555 UART: [ldev] CDI.KEYID = 6
8,448,459 UART: [ldev] SUBJECT.KEYID = 5
8,449,638 UART: [ldev] AUTHORITY.KEYID = 7
8,450,814 UART: [ldev] FE.KEYID = 1
8,451,683 UART: [ldev] Erasing FE.KEYID = 1
10,791,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,512,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,528,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,543,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,559,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,580,746 UART: [ldev] --
12,584,708 UART: [fwproc] Wait for Commands...
12,587,394 UART: [fwproc] Recv command 0x46574c44
12,589,483 UART: [fwproc] Recv'd Img size: 114168 bytes
15,987,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,061,906 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,130,702 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,447,691 >>> mbox cmd response: success
16,451,120 UART: [afmc] ++
16,451,703 UART: [afmc] CDI.KEYID = 6
16,452,587 UART: [afmc] SUBJECT.KEYID = 7
16,453,793 UART: [afmc] AUTHORITY.KEYID = 5
18,948,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,670,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,672,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,688,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,704,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,720,212 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,743,496 UART: [afmc] --
20,748,115 UART: [cold-reset] --
20,752,095 UART: [state] Locking Datavault
20,755,075 UART: [state] Locking PCR0, PCR1 and PCR31
20,756,769 UART: [state] Locking ICCM
20,758,780 UART: [exit] Launching FMC @ 0x40000130
20,767,221 UART:
20,767,453 UART: Running Caliptra FMC ...
20,768,547 UART:
20,768,702 UART: [state] CFI Enabled
20,777,067 UART: [fht] FMC Alias Private Key: 7
22,534,328 UART: [art] Extend RT PCRs Done
22,535,547 UART: [art] Lock RT PCRs Done
22,537,249 UART: [art] Populate DV Done
22,542,548 UART: [fht] FMC Alias Private Key: 7
22,544,187 UART: [art] Derive CDI
22,544,919 UART: [art] Store in in slot 0x4
22,587,505 UART: [art] Derive Key Pair
22,588,559 UART: [art] Store priv key in slot 0x5
25,014,343 UART: [art] Derive Key Pair - Done
25,027,768 UART: [art] Signing Cert with AUTHO
25,029,263 UART: RITY.KEYID = 7
26,734,623 UART: [art] Erasing AUTHORITY.KEYID = 7
26,736,122 UART: [art] PUB.X = A3653CA309DD11670639C95E49B0CAFF1BE95D7AC15FE1058287D4B440FCF59FECA60CB4E32C89C05FC5EEDB89C429AF
26,743,420 UART: [art] PUB.Y = 836ADAC468D30227ADF25F1639C0756A85EDADB14643BE29759AC8C3F6A8193A615AA959C01CFF95D55AA2D5FB9EF588
26,750,719 UART: [art] SIG.R = 410B38F77D02B286513A9ED9AD280867434D6BA812F15A4F053D966C1E3C5AEC0E83FFD8D3804835F301C6DF2C91E47B
26,758,114 UART: [art] SIG.S = FDD7E2ED4CD8647B98911A88196DA76DAC6EB5309FE13697E43D7C2DF5F55E2DED3DEA78B0F4709DFE32F8AEF0043D8B
27,737,364 UART: Caliptra RT
27,738,063 UART: [state] CFI Enabled
27,855,890 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
7,947,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,031,812 >>> mbox cmd response: success
20,280,459 UART:
20,280,845 UART: Running Caliptra FMC ...
20,282,063 UART:
20,282,237 UART: [state] CFI Enabled
20,289,952 UART: [fht] FMC Alias Private Key: 7
22,046,887 UART: [art] Extend RT PCRs Done
22,048,116 UART: [art] Lock RT PCRs Done
22,049,748 UART: [art] Populate DV Done
22,055,369 UART: [fht] FMC Alias Private Key: 7
22,057,071 UART: [art] Derive CDI
22,057,905 UART: [art] Store in in slot 0x4
22,100,829 UART: [art] Derive Key Pair
22,101,872 UART: [art] Store priv key in slot 0x5
24,529,027 UART: [art] Derive Key Pair - Done
24,541,864 UART: [art] Signing Cert with AUTHO
24,543,172 UART: RITY.KEYID = 7
26,248,751 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,254 UART: [art] PUB.X = BE9A8DDD19536FA946010153FB38CEAA8396110C42FF48624FC39AA4F9E6E84243267E05C8A0D2D61C70D2C477FCE4C7
26,257,519 UART: [art] PUB.Y = F310A7D39C0FC76684B05A2F3335A5B8D315F86719CC2D8BD7D7EBC50B628F1492C516B269E9C0C071887DF3C358D663
26,264,806 UART: [art] SIG.R = 08210AED1F0EE9FE3139623BAF8282E7FA82479D474CFC92FA8197783167533988D8BAD84C39FF802C3F57B792AEA071
26,272,163 UART: [art] SIG.S = 642EA0C9165C365C5DDE2770AA258B5A641848276901F8068067E0218E8C1718C59F93BEDAAFE493FE170626BF29BAFE
27,251,421 UART: Caliptra RT
27,252,104 UART: [state] CFI Enabled
27,369,430 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,149 UART:
192,539 UART: Running Caliptra ROM ...
193,746 UART:
193,903 UART: [state] CFI Enabled
263,850 UART: [state] LifecycleState = Unprovisioned
265,667 UART: [state] DebugLocked = No
268,612 UART: [state] WD Timer not started. Device not locked for debugging
272,781 UART: [kat] SHA2-256
451,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,449 UART: [kat] ++
463,978 UART: [kat] sha1
475,349 UART: [kat] SHA2-256
478,351 UART: [kat] SHA2-384
485,841 UART: [kat] SHA2-512-ACC
488,784 UART: [kat] ECC-384
2,952,551 UART: [kat] HMAC-384Kdf
2,974,531 UART: [kat] LMS
3,503,940 UART: [kat] --
3,508,318 UART: [cold-reset] ++
3,509,821 UART: [fht] FHT @ 0x50003400
3,521,301 UART: [idev] ++
3,521,867 UART: [idev] CDI.KEYID = 6
3,522,781 UART: [idev] SUBJECT.KEYID = 7
3,523,994 UART: [idev] UDS.KEYID = 0
3,546,067 UART: [idev] Erasing UDS.KEYID = 0
6,025,822 UART: [idev] Sha1 KeyId Algorithm
6,046,730 UART: [idev] CSR upload begun
6,051,427 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,783,904 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,799,961 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,815,902 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,831,726 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,855,568 UART: [idev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
8,000,772 UART: [idev] CSR uploaded
8,018,880 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,162,713 UART: [idev] --
8,163,399 UART: [ldev] ++
8,163,900 UART: [ldev] CDI.KEYID = 6
8,164,872 UART: [ldev] SUBJECT.KEYID = 5
8,165,968 UART: [ldev] AUTHORITY.KEYID = 7
8,167,069 UART: [ldev] FE.KEYID = 1
8,167,907 UART: [ldev] Erasing FE.KEYID = 1
10,568,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,286,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,302,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,318,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,333,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,353,863 UART: [ldev] --
12,358,703 UART: [fwproc] Wait for Commands...
12,360,311 UART: [fwproc] Recv command 0x46574c44
12,362,407 UART: [fwproc] Recv'd Img size: 114168 bytes
15,771,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,845,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,914,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,231,369 >>> mbox cmd response: success
16,235,892 UART: [afmc] ++
16,236,485 UART: [afmc] CDI.KEYID = 6
16,237,365 UART: [afmc] SUBJECT.KEYID = 7
16,238,529 UART: [afmc] AUTHORITY.KEYID = 5
18,774,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,496,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,498,293 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,514,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,530,244 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,546,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,568,460 UART: [afmc] --
20,572,591 UART: [cold-reset] --
20,576,775 UART: [state] Locking Datavault
20,582,376 UART: [state] Locking PCR0, PCR1 and PCR31
20,584,027 UART: [state] Locking ICCM
20,586,235 UART: [exit] Launching FMC @ 0x40000130
20,594,631 UART:
20,594,906 UART: Running Caliptra FMC ...
20,596,019 UART:
20,596,182 UART: [state] CFI Enabled
20,655,246 UART: [fht] FMC Alias Private Key: 7
22,419,407 UART: [art] Extend RT PCRs Done
22,420,619 UART: [art] Lock RT PCRs Done
22,421,973 UART: [art] Populate DV Done
22,427,606 UART: [fht] FMC Alias Private Key: 7
22,429,142 UART: [art] Derive CDI
22,430,094 UART: [art] Store in in slot 0x4
22,488,311 UART: [art] Derive Key Pair
22,489,317 UART: [art] Store priv key in slot 0x5
24,952,611 UART: [art] Derive Key Pair - Done
24,965,237 UART: [art] Signing Cert with AUTHO
24,966,543 UART: RITY.KEYID = 7
26,678,120 UART: [art] Erasing AUTHORITY.KEYID = 7
26,679,624 UART: [art] PUB.X = 2E51650B62355CC584105281ED7CE50667DDA28202FAC2C1B7C5168888072119926105D1275070002C1749CD93E26F52
26,686,823 UART: [art] PUB.Y = 24FF66E75478D7C9B77606EC4C70FEA5ABF81E78D0DC86A5EBF5E312ED1D7E0FD8523D909A3FF9ADD2083C3F3737D667
26,694,114 UART: [art] SIG.R = 9126E1F28642FC79BCB9F4D0989371358F11D3E1883E944F833D38D1F57E9FB9C5F1A85AC87CE471A2311CF38C33B231
26,701,515 UART: [art] SIG.S = 90425B895756E6365406F871D1D7626ED8860D474D94F32480A5B63E6991D2F0597956A0BF7AC015CF228FCC8A347EA4
27,680,833 UART: Caliptra RT
27,681,530 UART: [state] CFI Enabled
27,845,990 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
7,667,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,815,863 >>> mbox cmd response: success
20,111,500 UART:
20,111,887 UART: Running Caliptra FMC ...
20,113,110 UART:
20,113,285 UART: [state] CFI Enabled
20,180,143 UART: [fht] FMC Alias Private Key: 7
21,944,024 UART: [art] Extend RT PCRs Done
21,945,231 UART: [art] Lock RT PCRs Done
21,946,852 UART: [art] Populate DV Done
21,952,095 UART: [fht] FMC Alias Private Key: 7
21,953,816 UART: [art] Derive CDI
21,954,640 UART: [art] Store in in slot 0x4
22,012,565 UART: [art] Derive Key Pair
22,013,613 UART: [art] Store priv key in slot 0x5
24,476,299 UART: [art] Derive Key Pair - Done
24,489,305 UART: [art] Signing Cert with AUTHO
24,490,787 UART: RITY.KEYID = 7
26,201,998 UART: [art] Erasing AUTHORITY.KEYID = 7
26,203,520 UART: [art] PUB.X = 69DD610F77FF6C4DB81489471C975B88F425C877C16C9C21B147CF523240BC576B1B5F08FBB47FB1E8BC167C8966AF34
26,210,772 UART: [art] PUB.Y = 7FAB700317CB649B2B1628EB60C7A3BB7A9AB563C3D21138BCD07BB2D99471EBB357291D16F410BB30BBBE685ED924CC
26,218,027 UART: [art] SIG.R = 8D26F0C09867808568844AA44CEAFA34F98D0BF8A8278AB1BE6590756A7D8757DB841C12E232755EFE7A2E52743849ED
26,225,431 UART: [art] SIG.S = 2D2EAD8CEC7AC94778BF02E947C4DE9457D85AB6EE3325FDBCA649D6DD0324DD4663B04D07552EEE3754CA769FE911D0
27,204,445 UART: Caliptra RT
27,205,166 UART: [state] CFI Enabled
27,370,066 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,538 UART:
192,933 UART: Running Caliptra ROM ...
194,151 UART:
603,758 UART: [state] CFI Enabled
617,501 UART: [state] LifecycleState = Unprovisioned
619,348 UART: [state] DebugLocked = No
621,564 UART: [state] WD Timer not started. Device not locked for debugging
625,332 UART: [kat] SHA2-256
804,444 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,054 UART: [kat] ++
816,506 UART: [kat] sha1
826,950 UART: [kat] SHA2-256
829,991 UART: [kat] SHA2-384
837,482 UART: [kat] SHA2-512-ACC
840,418 UART: [kat] ECC-384
3,283,553 UART: [kat] HMAC-384Kdf
3,296,833 UART: [kat] LMS
3,826,353 UART: [kat] --
3,830,666 UART: [cold-reset] ++
3,832,268 UART: [fht] FHT @ 0x50003400
3,844,106 UART: [idev] ++
3,844,696 UART: [idev] CDI.KEYID = 6
3,845,610 UART: [idev] SUBJECT.KEYID = 7
3,846,818 UART: [idev] UDS.KEYID = 0
3,864,259 UART: [idev] Erasing UDS.KEYID = 0
6,322,066 UART: [idev] Sha1 KeyId Algorithm
6,342,810 UART: [idev] CSR upload begun
6,347,520 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,064,022 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,080,087 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,096,044 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,111,914 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,135,694 UART: [idev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
8,280,826 UART: [idev] CSR uploaded
8,299,011 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,442,936 UART: [idev] --
8,443,592 UART: [ldev] ++
8,444,114 UART: [ldev] CDI.KEYID = 6
8,444,993 UART: [ldev] SUBJECT.KEYID = 5
8,446,078 UART: [ldev] AUTHORITY.KEYID = 7
8,447,279 UART: [ldev] FE.KEYID = 1
8,448,209 UART: [ldev] Erasing FE.KEYID = 1
10,787,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,506,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,523,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,538,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,554,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,574,009 UART: [ldev] --
12,578,304 UART: [fwproc] Wait for Commands...
12,580,466 UART: [fwproc] Recv command 0x46574c44
12,582,599 UART: [fwproc] Recv'd Img size: 114168 bytes
15,986,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,053,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,122,289 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,439,764 >>> mbox cmd response: success
16,443,582 UART: [afmc] ++
16,444,165 UART: [afmc] CDI.KEYID = 6
16,445,076 UART: [afmc] SUBJECT.KEYID = 7
16,446,241 UART: [afmc] AUTHORITY.KEYID = 5
18,946,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,666,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,667,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,683,861 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,699,914 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,715,739 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,738,539 UART: [afmc] --
20,742,189 UART: [cold-reset] --
20,747,173 UART: [state] Locking Datavault
20,752,262 UART: [state] Locking PCR0, PCR1 and PCR31
20,753,981 UART: [state] Locking ICCM
20,756,185 UART: [exit] Launching FMC @ 0x40000130
20,764,583 UART:
20,764,819 UART: Running Caliptra FMC ...
20,765,919 UART:
20,766,080 UART: [state] CFI Enabled
20,774,295 UART: [fht] FMC Alias Private Key: 7
22,530,869 UART: [art] Extend RT PCRs Done
22,532,099 UART: [art] Lock RT PCRs Done
22,533,811 UART: [art] Populate DV Done
22,539,004 UART: [fht] FMC Alias Private Key: 7
22,540,485 UART: [art] Derive CDI
22,541,246 UART: [art] Store in in slot 0x4
22,584,007 UART: [art] Derive Key Pair
22,585,049 UART: [art] Store priv key in slot 0x5
25,011,864 UART: [art] Derive Key Pair - Done
25,024,725 UART: [art] Signing Cert with AUTHO
25,026,034 UART: RITY.KEYID = 7
26,731,326 UART: [art] Erasing AUTHORITY.KEYID = 7
26,732,823 UART: [art] PUB.X = FF05083037138B67176B9059541F3422CA8554CEC4DB9F3EAFB90E316904CC0DB4FCBC1A43AC3D8EB9E207D687042C05
26,740,163 UART: [art] PUB.Y = 58E6891B6B6183F92681F8DA032A2857E0617453E980952BEB8996B1226B7026F68106AF5DB7C5E9B8D95259474B95B0
26,747,323 UART: [art] SIG.R = 29F04947F2F409CBAAD408E8030AEEF3788DF79820B13E021D08EF4DF3836813EA91A6E9075FD1DFB98E514C9600DCA6
26,754,684 UART: [art] SIG.S = BB10B57EB60EAD44201BFEA1FD370B3E2C3AED5132CD490D3EE2DFA798D5DE06759D17D75BB44EEA0B587D8F2C2D9662
27,734,262 UART: Caliptra RT
27,734,981 UART: [state] CFI Enabled
27,852,253 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
7,948,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,032,866 >>> mbox cmd response: success
20,284,890 UART:
20,285,438 UART: Running Caliptra FMC ...
20,286,666 UART:
20,286,857 UART: [state] CFI Enabled
20,294,627 UART: [fht] FMC Alias Private Key: 7
22,052,007 UART: [art] Extend RT PCRs Done
22,053,218 UART: [art] Lock RT PCRs Done
22,055,278 UART: [art] Populate DV Done
22,060,574 UART: [fht] FMC Alias Private Key: 7
22,062,274 UART: [art] Derive CDI
22,063,085 UART: [art] Store in in slot 0x4
22,105,459 UART: [art] Derive Key Pair
22,106,456 UART: [art] Store priv key in slot 0x5
24,533,661 UART: [art] Derive Key Pair - Done
24,546,604 UART: [art] Signing Cert with AUTHO
24,547,913 UART: RITY.KEYID = 7
26,253,567 UART: [art] Erasing AUTHORITY.KEYID = 7
26,255,072 UART: [art] PUB.X = 3D03323C710268F6D5CB9F9019780902FCA9E02D8D901AEB64E6A6779EC7B107B2813839A8A63226FF182D1C0BA632C4
26,262,318 UART: [art] PUB.Y = 0110568F3E8FD841EABD7E6B3289EECA5F0369DCD46D77C83F2850F71A66F2A13D09B79A2CDB61D563D72CF5E5514140
26,269,596 UART: [art] SIG.R = F2DD84B51466BAA19E3F0F7439324B4ECF99D9589EFC2368993B10C9C809BB12847F0CEAECD5F9DC092A501954BA6E55
26,276,987 UART: [art] SIG.S = AC56A5315C2C03A50AFA295FCA9226CECAFE6982FD20F964F759CF17BB993EB669732FEBF42C578D696E0477F4586DBC
27,256,086 UART: Caliptra RT
27,256,803 UART: [state] CFI Enabled
27,372,929 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,797 UART: [state] WD Timer not started. Device not locked for debugging
88,136 UART: [kat] SHA2-256
891,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,815 UART: [kat] ++
895,967 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,511 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,206,733 UART: [idev] CSR upload begun
1,208,512 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,261 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,969 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,854 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,560 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,989 UART: [idev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
1,296,486 UART: [idev] CSR uploaded
1,299,531 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,700 UART: [idev] --
1,300,745 UART: [ldev] ++
1,300,913 UART: [ldev] CDI.KEYID = 6
1,301,277 UART: [ldev] SUBJECT.KEYID = 5
1,301,704 UART: [ldev] AUTHORITY.KEYID = 7
1,302,167 UART: [ldev] FE.KEYID = 1
1,307,337 UART: [ldev] Erasing FE.KEYID = 1
1,334,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,227 UART: [ldev] --
1,373,629 UART: [fwproc] Wait for Commands...
1,374,438 UART: [fwproc] Recv command 0x46574c44
1,375,171 UART: [fwproc] Recv'd Img size: 114168 bytes
2,670,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,799 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,862,600 >>> mbox cmd response: success
2,863,669 UART: [afmc] ++
2,863,837 UART: [afmc] CDI.KEYID = 6
2,864,200 UART: [afmc] SUBJECT.KEYID = 7
2,864,626 UART: [afmc] AUTHORITY.KEYID = 5
2,900,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,443 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,326 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,045 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,744 UART: [afmc] --
2,943,650 UART: [cold-reset] --
2,944,318 UART: [state] Locking Datavault
2,945,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,211 UART: [state] Locking ICCM
2,946,653 UART: [exit] Launching FMC @ 0x40000130
2,951,982 UART:
2,951,998 UART: Running Caliptra FMC ...
2,952,406 UART:
2,952,460 UART: [state] CFI Enabled
2,963,215 UART: [fht] FMC Alias Private Key: 7
3,071,348 UART: [art] Extend RT PCRs Done
3,071,776 UART: [art] Lock RT PCRs Done
3,073,684 UART: [art] Populate DV Done
3,081,933 UART: [fht] FMC Alias Private Key: 7
3,083,041 UART: [art] Derive CDI
3,083,321 UART: [art] Store in in slot 0x4
3,168,880 UART: [art] Derive Key Pair
3,169,240 UART: [art] Store priv key in slot 0x5
3,182,280 UART: [art] Derive Key Pair - Done
3,196,928 UART: [art] Signing Cert with AUTHO
3,197,408 UART: RITY.KEYID = 7
3,212,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,215 UART: [art] PUB.X = CAC4F10DA36FF1A96F1952F450C92B908AB1D84BBA7812F22A28D219D360425DCEA28F05A905405F44E49033837DCD06
3,219,979 UART: [art] PUB.Y = FCDEA962ED89702C67262F01FAB953C07E6FAC64CF3D584483578397C2CF864858478CDD132B83D0F056597308D33EA3
3,226,925 UART: [art] SIG.R = 18C5DDFC9A646AEF8CEFF02141A8DDB200C085987A71793577C7BC904A89E7F7D9F59683BFA78586DFC14290C07BE543
3,233,683 UART: [art] SIG.S = C42A2B3AE74D884C84DFBA51002E1E5A9F45B93E6E1F5388558B099D6C95B03311F010D23D723E12E0D3AA1D866B5C58
3,257,737 UART: Caliptra RT
3,257,990 UART: [state] CFI Enabled
3,365,881 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,409 >>> mbox cmd response: success
2,702,009 UART:
2,702,025 UART: Running Caliptra FMC ...
2,702,433 UART:
2,702,487 UART: [state] CFI Enabled
2,713,014 UART: [fht] FMC Alias Private Key: 7
2,821,311 UART: [art] Extend RT PCRs Done
2,821,739 UART: [art] Lock RT PCRs Done
2,823,573 UART: [art] Populate DV Done
2,831,788 UART: [fht] FMC Alias Private Key: 7
2,832,730 UART: [art] Derive CDI
2,833,010 UART: [art] Store in in slot 0x4
2,918,331 UART: [art] Derive Key Pair
2,918,691 UART: [art] Store priv key in slot 0x5
2,932,029 UART: [art] Derive Key Pair - Done
2,946,851 UART: [art] Signing Cert with AUTHO
2,947,331 UART: RITY.KEYID = 7
2,962,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,170 UART: [art] PUB.X = 7570444A51E6B7ECB5BB67CA16FE2ED6E35B7CF4F5417686C8AF3F6D8E18C8CB3B3FCA28ED7B7B59714D408CE91A6038
2,969,958 UART: [art] PUB.Y = B7F1A5CA93B0CFFAB2AB5FAFB6F35DD3E6A37780CB5BD9DF8A8A908D22891DD2DA08CC2DD33DC4EDF35EF535E7BD5EF6
2,976,945 UART: [art] SIG.R = EC41B66392CEF6B583F849EE1E718C676A0ADA8DDA60E3089FE6B15E8497CB99B4D24DF2EF8DB01F63C23F654AFBCA6B
2,983,733 UART: [art] SIG.S = AC23D5551C9ED0360CFD2CEF7FA0308F8A36DD851C389CC81222FDA0B9C72352FD1C40000603B19AAE29A2E96A5A11BA
3,007,883 UART: Caliptra RT
3,008,136 UART: [state] CFI Enabled
3,115,360 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
917,047 UART: [kat] HMAC-384Kdf
921,877 UART: [kat] LMS
1,170,189 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,180 UART: [fht] FHT @ 0x50003400
1,173,758 UART: [idev] ++
1,173,926 UART: [idev] CDI.KEYID = 6
1,174,287 UART: [idev] SUBJECT.KEYID = 7
1,174,712 UART: [idev] UDS.KEYID = 0
1,182,662 UART: [idev] Erasing UDS.KEYID = 0
1,199,050 UART: [idev] Sha1 KeyId Algorithm
1,207,372 UART: [idev] CSR upload begun
1,209,151 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,108 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,816 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,701 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,407 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,836 UART: [idev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
1,297,333 UART: [idev] CSR uploaded
1,300,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,547 UART: [idev] --
1,301,620 UART: [ldev] ++
1,301,788 UART: [ldev] CDI.KEYID = 6
1,302,152 UART: [ldev] SUBJECT.KEYID = 5
1,302,579 UART: [ldev] AUTHORITY.KEYID = 7
1,303,042 UART: [ldev] FE.KEYID = 1
1,308,438 UART: [ldev] Erasing FE.KEYID = 1
1,334,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,782 UART: [ldev] --
1,374,098 UART: [fwproc] Wait for Commands...
1,374,873 UART: [fwproc] Recv command 0x46574c44
1,375,606 UART: [fwproc] Recv'd Img size: 114168 bytes
2,671,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,600 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,863,401 >>> mbox cmd response: success
2,864,664 UART: [afmc] ++
2,864,832 UART: [afmc] CDI.KEYID = 6
2,865,195 UART: [afmc] SUBJECT.KEYID = 7
2,865,621 UART: [afmc] AUTHORITY.KEYID = 5
2,900,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,055 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,615 UART: [afmc] --
2,944,693 UART: [cold-reset] --
2,945,817 UART: [state] Locking Datavault
2,946,902 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,506 UART: [state] Locking ICCM
2,948,166 UART: [exit] Launching FMC @ 0x40000130
2,953,495 UART:
2,953,511 UART: Running Caliptra FMC ...
2,953,919 UART:
2,954,062 UART: [state] CFI Enabled
2,964,737 UART: [fht] FMC Alias Private Key: 7
3,072,856 UART: [art] Extend RT PCRs Done
3,073,284 UART: [art] Lock RT PCRs Done
3,074,768 UART: [art] Populate DV Done
3,082,585 UART: [fht] FMC Alias Private Key: 7
3,083,665 UART: [art] Derive CDI
3,083,945 UART: [art] Store in in slot 0x4
3,169,438 UART: [art] Derive Key Pair
3,169,798 UART: [art] Store priv key in slot 0x5
3,183,796 UART: [art] Derive Key Pair - Done
3,198,547 UART: [art] Signing Cert with AUTHO
3,199,027 UART: RITY.KEYID = 7
3,214,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,392 UART: [art] PUB.X = A460DD533E1463FD63314289D21C5A1BE01D18BDAD9B8391B339E7CE30D316C1137259FC839241B99FAB89B721943DC5
3,222,164 UART: [art] PUB.Y = 53661A7AE29D5E98C3A97777C3F4FF9C74916E48B9B4F2A0B01A9F2C32E4A495E4D0A22788139F23B3E583EC228F54C3
3,229,118 UART: [art] SIG.R = 50930FE8D125209E668C3B064A5D78C30A12C8B6227E5DDED1E9D64788AC70FC4E0B9F7DEFB969DFECE31EE250AE8AEE
3,235,898 UART: [art] SIG.S = F68CB061FF888FFA65D0BCF142A9B39B215858C56D7C31C05AF69CCC3E9BF71A31F1D2A8F0668B31D221D395F2A3C4D6
3,260,593 UART: Caliptra RT
3,260,938 UART: [state] CFI Enabled
3,369,537 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,638,520 >>> mbox cmd response: success
2,701,758 UART:
2,701,774 UART: Running Caliptra FMC ...
2,702,182 UART:
2,702,325 UART: [state] CFI Enabled
2,713,342 UART: [fht] FMC Alias Private Key: 7
2,820,707 UART: [art] Extend RT PCRs Done
2,821,135 UART: [art] Lock RT PCRs Done
2,822,713 UART: [art] Populate DV Done
2,830,950 UART: [fht] FMC Alias Private Key: 7
2,831,942 UART: [art] Derive CDI
2,832,222 UART: [art] Store in in slot 0x4
2,917,975 UART: [art] Derive Key Pair
2,918,335 UART: [art] Store priv key in slot 0x5
2,932,017 UART: [art] Derive Key Pair - Done
2,946,702 UART: [art] Signing Cert with AUTHO
2,947,182 UART: RITY.KEYID = 7
2,962,760 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,525 UART: [art] PUB.X = 170167CF1B00005A0FECED9381C8FA9D060CB1B98D6F0C560F2B3ADB8D72CC67CD860285A3FB409D777EFF7F3605862B
2,970,241 UART: [art] PUB.Y = A6D9E01B8BCB2E29C7AD2213E786E5E1F9F33D4346B7C70346AF7D5B70B09537607DCFDDE51F275B50F2D980BFC642D9
2,977,202 UART: [art] SIG.R = 2D16AF4A534D936DA0EABF19DD9AB088587BBB19FEA2156EA30DDE653BD2EBCCED271FF7074C03120D00EE43DE1ADC7F
2,983,968 UART: [art] SIG.S = 50985B6781C21C3C50E9B7F2B1CA6FE21342F756F43DE4655E3DEB4FAE9FC739F7EAA841F0F2DD05C6B4533A3A6968BE
3,007,708 UART: Caliptra RT
3,008,053 UART: [state] CFI Enabled
3,116,584 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Unprovisioned
85,275 UART: [state] DebugLocked = No
85,929 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
890,658 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,787 UART: [kat] ++
894,939 UART: [kat] sha1
899,079 UART: [kat] SHA2-256
901,019 UART: [kat] SHA2-384
903,712 UART: [kat] SHA2-512-ACC
905,613 UART: [kat] ECC-384
915,660 UART: [kat] HMAC-384Kdf
920,122 UART: [kat] LMS
1,168,434 UART: [kat] --
1,169,341 UART: [cold-reset] ++
1,169,693 UART: [fht] FHT @ 0x50003400
1,172,461 UART: [idev] ++
1,172,629 UART: [idev] CDI.KEYID = 6
1,172,990 UART: [idev] SUBJECT.KEYID = 7
1,173,415 UART: [idev] UDS.KEYID = 0
1,181,773 UART: [idev] Erasing UDS.KEYID = 0
1,198,681 UART: [idev] Sha1 KeyId Algorithm
1,207,155 UART: [idev] CSR upload begun
1,208,934 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,723 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,431 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,316 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,022 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,451 UART: [idev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
1,296,948 UART: [idev] CSR uploaded
1,299,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,162 UART: [idev] --
1,301,083 UART: [ldev] ++
1,301,251 UART: [ldev] CDI.KEYID = 6
1,301,615 UART: [ldev] SUBJECT.KEYID = 5
1,302,042 UART: [ldev] AUTHORITY.KEYID = 7
1,302,505 UART: [ldev] FE.KEYID = 1
1,307,831 UART: [ldev] Erasing FE.KEYID = 1
1,333,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,773 UART: [ldev] --
1,373,111 UART: [fwproc] Wait for Commands...
1,373,786 UART: [fwproc] Recv command 0x46574c44
1,374,519 UART: [fwproc] Recv'd Img size: 114168 bytes
2,670,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,172 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,861,654 >>> mbox cmd response: success
2,862,785 UART: [afmc] ++
2,862,953 UART: [afmc] CDI.KEYID = 6
2,863,316 UART: [afmc] SUBJECT.KEYID = 7
2,863,742 UART: [afmc] AUTHORITY.KEYID = 5
2,898,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,915,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,921,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,596 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,933,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,024 UART: [afmc] --
2,941,946 UART: [cold-reset] --
2,942,534 UART: [state] Locking Datavault
2,943,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,944,407 UART: [state] Locking ICCM
2,944,855 UART: [exit] Launching FMC @ 0x40000130
2,950,184 UART:
2,950,200 UART: Running Caliptra FMC ...
2,950,608 UART:
2,950,662 UART: [state] CFI Enabled
2,961,353 UART: [fht] FMC Alias Private Key: 7
3,069,424 UART: [art] Extend RT PCRs Done
3,069,852 UART: [art] Lock RT PCRs Done
3,071,340 UART: [art] Populate DV Done
3,079,735 UART: [fht] FMC Alias Private Key: 7
3,080,857 UART: [art] Derive CDI
3,081,137 UART: [art] Store in in slot 0x4
3,166,424 UART: [art] Derive Key Pair
3,166,784 UART: [art] Store priv key in slot 0x5
3,179,506 UART: [art] Derive Key Pair - Done
3,194,197 UART: [art] Signing Cert with AUTHO
3,194,677 UART: RITY.KEYID = 7
3,209,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,574 UART: [art] PUB.X = BF48645E3B601B56178243AEF014E91CA976E5D99D561E0755750F43E03A035A30861C80C68997D35F3983F608418317
3,217,318 UART: [art] PUB.Y = FF59C3A0F6EEEA0A9D70ABAA5C52B3AF7499217951B31BA01D01728B269C56209BE88EC68D719D7AA503A3F5A806C98D
3,224,270 UART: [art] SIG.R = F783185E4450547141ED53D4C62D477E04F8EE7D3104D84ADF7E6B3BF3D21A3A6DA067E6C203988677EFD0963FE385B0
3,231,035 UART: [art] SIG.S = 1EB07F646F368C1890E8D23B8386EB18DD2CB4DB5A1872DBEFC3C0960591D572AE6673EA23D4CCAD473951A53D57EB27
3,254,901 UART: Caliptra RT
3,255,154 UART: [state] CFI Enabled
3,361,967 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,220 >>> mbox cmd response: success
2,701,084 UART:
2,701,100 UART: Running Caliptra FMC ...
2,701,508 UART:
2,701,562 UART: [state] CFI Enabled
2,712,359 UART: [fht] FMC Alias Private Key: 7
2,821,020 UART: [art] Extend RT PCRs Done
2,821,448 UART: [art] Lock RT PCRs Done
2,823,012 UART: [art] Populate DV Done
2,831,067 UART: [fht] FMC Alias Private Key: 7
2,832,123 UART: [art] Derive CDI
2,832,403 UART: [art] Store in in slot 0x4
2,918,102 UART: [art] Derive Key Pair
2,918,462 UART: [art] Store priv key in slot 0x5
2,931,190 UART: [art] Derive Key Pair - Done
2,945,832 UART: [art] Signing Cert with AUTHO
2,946,312 UART: RITY.KEYID = 7
2,961,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,785 UART: [art] PUB.X = 2B1C6E0E6D38B499E9EE09B0B6C37F5528A567A24660846342E13F908A50F5018C57AB9E56348E03ED4A684698DA1EE0
2,968,543 UART: [art] PUB.Y = 9E1174E9B5AC4678D38DEFBF62C57ACEE40A8DFF0115DCEAA51B4353485C8EDB3A27075E811BCFD67B5D38C5A9911D5F
2,975,506 UART: [art] SIG.R = 99827B5B7D4B95EB0E9278B3CDABB54A81BEA76513B88EFC911AA683A98DA384FA8C10915FD71DA61F3833E588BF1FDF
2,982,291 UART: [art] SIG.S = 5894FEFC6A7800D484E209C54B81E72A09DAEFFC85837CD44E4BEE2BF93C788D7486CB65B088734F3927745C467A57AC
3,006,354 UART: Caliptra RT
3,006,607 UART: [state] CFI Enabled
3,114,488 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,467 UART: [kat] SHA2-512-ACC
906,368 UART: [kat] ECC-384
916,067 UART: [kat] HMAC-384Kdf
920,803 UART: [kat] LMS
1,169,115 UART: [kat] --
1,169,892 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,172,946 UART: [idev] ++
1,173,114 UART: [idev] CDI.KEYID = 6
1,173,475 UART: [idev] SUBJECT.KEYID = 7
1,173,900 UART: [idev] UDS.KEYID = 0
1,181,932 UART: [idev] Erasing UDS.KEYID = 0
1,198,750 UART: [idev] Sha1 KeyId Algorithm
1,206,906 UART: [idev] CSR upload begun
1,208,685 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,330 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,038 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,923 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,629 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,058 UART: [idev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
1,296,555 UART: [idev] CSR uploaded
1,299,600 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,769 UART: [idev] --
1,300,758 UART: [ldev] ++
1,300,926 UART: [ldev] CDI.KEYID = 6
1,301,290 UART: [ldev] SUBJECT.KEYID = 5
1,301,717 UART: [ldev] AUTHORITY.KEYID = 7
1,302,180 UART: [ldev] FE.KEYID = 1
1,307,618 UART: [ldev] Erasing FE.KEYID = 1
1,334,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,152 UART: [ldev] --
1,373,488 UART: [fwproc] Wait for Commands...
1,374,305 UART: [fwproc] Recv command 0x46574c44
1,375,038 UART: [fwproc] Recv'd Img size: 114168 bytes
2,671,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,863,363 >>> mbox cmd response: success
2,864,462 UART: [afmc] ++
2,864,630 UART: [afmc] CDI.KEYID = 6
2,864,993 UART: [afmc] SUBJECT.KEYID = 7
2,865,419 UART: [afmc] AUTHORITY.KEYID = 5
2,901,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,937 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,549 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,268 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,015 UART: [afmc] --
2,944,905 UART: [cold-reset] --
2,945,671 UART: [state] Locking Datavault
2,946,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,468 UART: [state] Locking ICCM
2,948,048 UART: [exit] Launching FMC @ 0x40000130
2,953,377 UART:
2,953,393 UART: Running Caliptra FMC ...
2,953,801 UART:
2,953,944 UART: [state] CFI Enabled
2,964,649 UART: [fht] FMC Alias Private Key: 7
3,073,320 UART: [art] Extend RT PCRs Done
3,073,748 UART: [art] Lock RT PCRs Done
3,075,440 UART: [art] Populate DV Done
3,083,515 UART: [fht] FMC Alias Private Key: 7
3,084,573 UART: [art] Derive CDI
3,084,853 UART: [art] Store in in slot 0x4
3,170,846 UART: [art] Derive Key Pair
3,171,206 UART: [art] Store priv key in slot 0x5
3,183,956 UART: [art] Derive Key Pair - Done
3,198,577 UART: [art] Signing Cert with AUTHO
3,199,057 UART: RITY.KEYID = 7
3,214,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,814 UART: [art] PUB.X = 11C3CB976BC9DA551453780F8D7BF802D6E4147EBCA97B9E81962C6322B6AF75BEAEF3C13C491235C1A78AD1C6CD32ED
3,221,594 UART: [art] PUB.Y = 11231989726BF26D888DBAFE8A948B9A4348A86C81C590F5A486E9A1365E11B8429D7DD32166F1E9C89CC9AA990EF378
3,228,543 UART: [art] SIG.R = E6C8B70EF7E71C18DD83DFFAA7FEF70ED9A320BF3718D1902037A3085B7C7220920A67EFAA9C9444C0DBDF4E57651195
3,235,315 UART: [art] SIG.S = 24C497EE67FF35B0A6ADDCAB01603EFC6E796357F23036B8F8DE6383DB78CD6ACA9BA55FDC74583EE30C6B4094FB6E07
3,258,937 UART: Caliptra RT
3,259,282 UART: [state] CFI Enabled
3,367,261 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,762 >>> mbox cmd response: success
2,701,984 UART:
2,702,000 UART: Running Caliptra FMC ...
2,702,408 UART:
2,702,551 UART: [state] CFI Enabled
2,713,206 UART: [fht] FMC Alias Private Key: 7
2,821,469 UART: [art] Extend RT PCRs Done
2,821,897 UART: [art] Lock RT PCRs Done
2,823,327 UART: [art] Populate DV Done
2,831,698 UART: [fht] FMC Alias Private Key: 7
2,832,832 UART: [art] Derive CDI
2,833,112 UART: [art] Store in in slot 0x4
2,918,829 UART: [art] Derive Key Pair
2,919,189 UART: [art] Store priv key in slot 0x5
2,932,541 UART: [art] Derive Key Pair - Done
2,947,440 UART: [art] Signing Cert with AUTHO
2,947,920 UART: RITY.KEYID = 7
2,962,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,357 UART: [art] PUB.X = EA74FBEC389C20F7C2B4D9625B87EDE51AAB48DE479625FB6F4A69F5B75935405C20ED5C9F20CF5A7FC2A64C6FC300E8
2,970,125 UART: [art] PUB.Y = D918827434EBD4FF55CC430DB4D1D8B020885ECC5F313666CEFCDC3681F8ECEB910423B075B9A245FD1EAE9A4B6E89BC
2,977,089 UART: [art] SIG.R = 3A24831DED2FBEF62A667F42A160FC3197BCAE8764C5F4E0C3A25BD3945119E9968F220E0A9A0CE559B18A97A2D700B8
2,983,838 UART: [art] SIG.S = 124750067A39E9C3FD3EFED80BF436A1AA0B25BC7082B6F9BDAF0C77A13C513C54EE01F887D9A4CA12F1663850337B43
3,007,150 UART: Caliptra RT
3,007,495 UART: [state] CFI Enabled
3,115,018 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,985 UART: [kat] ++
895,137 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
920,950 UART: [kat] LMS
1,169,262 UART: [kat] --
1,170,435 UART: [cold-reset] ++
1,170,923 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,199,729 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] CSR upload begun
1,209,656 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,227 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,935 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,820 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,526 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,955 UART: [idev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
1,297,452 UART: [idev] CSR uploaded
1,300,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,666 UART: [idev] --
1,301,845 UART: [ldev] ++
1,302,013 UART: [ldev] CDI.KEYID = 6
1,302,377 UART: [ldev] SUBJECT.KEYID = 5
1,302,804 UART: [ldev] AUTHORITY.KEYID = 7
1,303,267 UART: [ldev] FE.KEYID = 1
1,308,183 UART: [ldev] Erasing FE.KEYID = 1
1,334,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,589 UART: [ldev] --
1,373,921 UART: [fwproc] Wait for Commands...
1,374,690 UART: [fwproc] Recv command 0x46574c44
1,375,423 UART: [fwproc] Recv'd Img size: 114168 bytes
2,672,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,865,154 >>> mbox cmd response: success
2,866,237 UART: [afmc] ++
2,866,405 UART: [afmc] CDI.KEYID = 6
2,866,768 UART: [afmc] SUBJECT.KEYID = 7
2,867,194 UART: [afmc] AUTHORITY.KEYID = 5
2,902,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,344 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,063 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,730 UART: [afmc] --
2,945,646 UART: [cold-reset] --
2,946,622 UART: [state] Locking Datavault
2,947,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,535 UART: [state] Locking ICCM
2,949,173 UART: [exit] Launching FMC @ 0x40000130
2,954,502 UART:
2,954,518 UART: Running Caliptra FMC ...
2,954,926 UART:
2,954,980 UART: [state] CFI Enabled
2,965,197 UART: [fht] FMC Alias Private Key: 7
3,073,440 UART: [art] Extend RT PCRs Done
3,073,868 UART: [art] Lock RT PCRs Done
3,075,384 UART: [art] Populate DV Done
3,083,563 UART: [fht] FMC Alias Private Key: 7
3,084,561 UART: [art] Derive CDI
3,084,841 UART: [art] Store in in slot 0x4
3,170,236 UART: [art] Derive Key Pair
3,170,596 UART: [art] Store priv key in slot 0x5
3,183,848 UART: [art] Derive Key Pair - Done
3,198,638 UART: [art] Signing Cert with AUTHO
3,199,118 UART: RITY.KEYID = 7
3,214,594 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,359 UART: [art] PUB.X = 2508A66A9ACE359A86C34297E71CA9C5BE0638BB01E4F5ECBDC714BF1AD77F2F2AA8A1A9DA9A4B216B59C3CF1A753F61
3,222,142 UART: [art] PUB.Y = DA159689FC82D77CFBF956534D2A3B347D973FB34CB3E61B152E24A914C7C328180204BF7E7A17FD61798BBB8BA9C4C7
3,229,096 UART: [art] SIG.R = 870311A725AFAC882D00944D424941B1BAD3C8F581068ED87273DA7C65B34B588EBF05633368C66A4679368ABC4A4BDE
3,235,837 UART: [art] SIG.S = BD4D9859C8EA43DF594585B4826A9AF4F4C1586622E3758B6808DDFD7B5DDC4C7C8C2E61AC84FBBA70D9E3396323030C
3,258,677 UART: Caliptra RT
3,258,930 UART: [state] CFI Enabled
3,367,056 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,641 >>> mbox cmd response: success
2,701,917 UART:
2,701,933 UART: Running Caliptra FMC ...
2,702,341 UART:
2,702,395 UART: [state] CFI Enabled
2,712,772 UART: [fht] FMC Alias Private Key: 7
2,820,935 UART: [art] Extend RT PCRs Done
2,821,363 UART: [art] Lock RT PCRs Done
2,823,015 UART: [art] Populate DV Done
2,831,290 UART: [fht] FMC Alias Private Key: 7
2,832,424 UART: [art] Derive CDI
2,832,704 UART: [art] Store in in slot 0x4
2,918,307 UART: [art] Derive Key Pair
2,918,667 UART: [art] Store priv key in slot 0x5
2,932,477 UART: [art] Derive Key Pair - Done
2,947,081 UART: [art] Signing Cert with AUTHO
2,947,561 UART: RITY.KEYID = 7
2,962,913 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,678 UART: [art] PUB.X = 74A6168C5917598FE5CAE2242D2AEAC4432D5FD3520022751F37C62BEAB4D46F5BC8D7FFDAA0A4729A404C694E2A2AEF
2,970,442 UART: [art] PUB.Y = D551C55B9039FCFB5D41441B672937C38AD1A129762750D51A25F7F3526E5394CCB648E6DF31704E652E766FD205E283
2,977,385 UART: [art] SIG.R = BE1994D5CEA1A3B77A14C0B41A068D692CECBE04265795B3FA39D4062D5BE2030D2A4684B24B916264075847ECEC24E7
2,984,143 UART: [art] SIG.S = 8C4AA66EE44803CFEB2E6F127DD5482D3A70F1EBF80495106E522627A472A219CA048E96371F0589A4DCC740CEC6877E
3,008,162 UART: Caliptra RT
3,008,415 UART: [state] CFI Enabled
3,116,285 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,567 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,170,972 UART: [fht] FHT @ 0x50003400
1,173,684 UART: [idev] ++
1,173,852 UART: [idev] CDI.KEYID = 6
1,174,213 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,182,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,207,808 UART: [idev] CSR upload begun
1,209,587 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,902 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,610 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,495 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,201 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,630 UART: [idev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
1,297,127 UART: [idev] CSR uploaded
1,300,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,341 UART: [idev] --
1,301,232 UART: [ldev] ++
1,301,400 UART: [ldev] CDI.KEYID = 6
1,301,764 UART: [ldev] SUBJECT.KEYID = 5
1,302,191 UART: [ldev] AUTHORITY.KEYID = 7
1,302,654 UART: [ldev] FE.KEYID = 1
1,307,724 UART: [ldev] Erasing FE.KEYID = 1
1,334,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,778 UART: [ldev] --
1,373,074 UART: [fwproc] Wait for Commands...
1,373,817 UART: [fwproc] Recv command 0x46574c44
1,374,550 UART: [fwproc] Recv'd Img size: 114168 bytes
2,671,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,698,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,497 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,863,135 >>> mbox cmd response: success
2,864,334 UART: [afmc] ++
2,864,502 UART: [afmc] CDI.KEYID = 6
2,864,865 UART: [afmc] SUBJECT.KEYID = 7
2,865,291 UART: [afmc] AUTHORITY.KEYID = 5
2,900,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,561 UART: [afmc] --
2,943,547 UART: [cold-reset] --
2,944,181 UART: [state] Locking Datavault
2,945,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,724 UART: [state] Locking ICCM
2,946,180 UART: [exit] Launching FMC @ 0x40000130
2,951,509 UART:
2,951,525 UART: Running Caliptra FMC ...
2,951,933 UART:
2,952,076 UART: [state] CFI Enabled
2,962,575 UART: [fht] FMC Alias Private Key: 7
3,070,442 UART: [art] Extend RT PCRs Done
3,070,870 UART: [art] Lock RT PCRs Done
3,072,330 UART: [art] Populate DV Done
3,080,459 UART: [fht] FMC Alias Private Key: 7
3,081,471 UART: [art] Derive CDI
3,081,751 UART: [art] Store in in slot 0x4
3,167,860 UART: [art] Derive Key Pair
3,168,220 UART: [art] Store priv key in slot 0x5
3,181,236 UART: [art] Derive Key Pair - Done
3,195,921 UART: [art] Signing Cert with AUTHO
3,196,401 UART: RITY.KEYID = 7
3,211,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,332 UART: [art] PUB.X = 5234A7A1D1B75E96AE7E7ADC116470234529510E14D129217FF80E68020D345ABA71B0B2868521BC103FCC83B9A1890E
3,219,085 UART: [art] PUB.Y = 68A7D72645DC3CB0F6956FEC34CF96F4B138CC40D283573FD961C4869153B8F0BBEFAB630CBEA8E9813584AC52A3BCCF
3,226,050 UART: [art] SIG.R = BFD6F419630E5AE6B823E9E2A16E90201F99D2AECB45C10BE5576B62090FEA75DED5DC18B3527A2ABDBE6E063E9D5AE6
3,232,827 UART: [art] SIG.S = DE2361DE1752BC99208CA30B1120DFB56B1AC8E9B6FA5BD6F8D20A57E1CDE79D432EC3C7257169468F0CFE0BD7FB2EE4
3,256,832 UART: Caliptra RT
3,257,177 UART: [state] CFI Enabled
3,364,141 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,394 >>> mbox cmd response: success
2,702,158 UART:
2,702,174 UART: Running Caliptra FMC ...
2,702,582 UART:
2,702,725 UART: [state] CFI Enabled
2,713,534 UART: [fht] FMC Alias Private Key: 7
2,821,705 UART: [art] Extend RT PCRs Done
2,822,133 UART: [art] Lock RT PCRs Done
2,823,715 UART: [art] Populate DV Done
2,831,856 UART: [fht] FMC Alias Private Key: 7
2,832,966 UART: [art] Derive CDI
2,833,246 UART: [art] Store in in slot 0x4
2,918,603 UART: [art] Derive Key Pair
2,918,963 UART: [art] Store priv key in slot 0x5
2,932,809 UART: [art] Derive Key Pair - Done
2,947,425 UART: [art] Signing Cert with AUTHO
2,947,905 UART: RITY.KEYID = 7
2,963,127 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,892 UART: [art] PUB.X = 1770D50A9CDE6801D84C591CAAF7AB138480E647701A13A0CEA273DC4D83EA270519FF6087958D618862A461AC312CF1
2,970,655 UART: [art] PUB.Y = 130C256D986AD90E00E975E4A5E4E4A95712E48630F4DBB4381D599D4A7C5318EE74B4962135B35764F8D6B3C736BAB3
2,977,577 UART: [art] SIG.R = F1A4FA410A38CDB3F9A13A66B4165E25789490C1B0B295883780E6FFAB9EF2227D55226F9480FD1A22AAC6A3347BBD0B
2,984,351 UART: [art] SIG.S = 35813574D320AD933760BC2328E81AEB67CEE6D5E10DC829643271077D6047EDE585B993526A9ED964B8800A370F276E
3,007,688 UART: Caliptra RT
3,008,033 UART: [state] CFI Enabled
3,115,996 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
Truncated 7343978 bytes from beginning
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
10,793,071 UART: [idev] CSR uploaded
10,809,376 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,952,727 UART: [idev] --
10,953,356 UART: [ldev] ++
10,953,855 UART: [ldev] CDI.KEYID = 6
10,954,729 UART: [ldev] SUBJECT.KEYID = 5
10,955,913 UART: [ldev] AUTHORITY.KEYID = 7
10,957,011 UART: [ldev] FE.KEYID = 1
10,957,848 UART: [ldev] Erasing FE.KEYID = 1
14,195,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,504,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,520,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,536,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,552,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,572,170 UART: [ldev] --
16,577,432 UART: [fwproc] Wait for Commands...
16,580,549 UART: [fwproc] Recv command 0x46574c44
16,582,864 UART: [fwproc] Recv'd Img size: 113844 bytes
20,651,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,730,028 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,798,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
21,115,269 >>> mbox cmd response: success
21,118,525 UART: [afmc] ++
21,119,113 UART: [afmc] CDI.KEYID = 6
21,120,356 UART: [afmc] SUBJECT.KEYID = 7
21,121,382 UART: [afmc] AUTHORITY.KEYID = 5
24,485,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,783,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,786,142 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,802,359 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,818,397 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,834,353 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,857,716 UART: [afmc] --
26,861,678 UART: [cold-reset] --
26,866,730 UART: [state] Locking Datavault
26,872,821 UART: [state] Locking PCR0, PCR1 and PCR31
26,874,470 UART: [state] Locking ICCM
26,876,399 UART: [exit] Launching FMC @ 0x40000130
26,885,070 UART:
26,885,312 UART: Running Caliptra FMC ...
26,886,410 UART:
26,886,566 UART: [state] CFI Enabled
26,941,672 UART: [fht] FMC Alias Private Key: 7
29,278,906 UART: [art] Extend RT PCRs Done
29,280,134 UART: [art] Lock RT PCRs Done
29,281,707 UART: [art] Populate DV Done
29,287,007 UART: [fht] FMC Alias Private Key: 7
29,288,541 UART: [art] Derive CDI
29,289,303 UART: [art] Store in in slot 0x4
29,349,369 UART: [art] Derive Key Pair
29,350,410 UART: [art] Store priv key in slot 0x5
32,642,475 UART: [art] Derive Key Pair - Done
32,655,734 UART: [art] Signing Cert with AUTHO
32,657,041 UART: RITY.KEYID = 7
34,943,853 UART: [art] Erasing AUTHORITY.KEYID = 7
34,945,366 UART: [art] PUB.X = FA55F3189A48E77F71BBD73180611FDF4795070E6FB292A479CAF79322CEF898317FC4FAC9867705348BA3E6CB5B0382
34,952,641 UART: [art] PUB.Y = 216EDCA12490AD3EB2E14316757A35FB9AD1C9D4B3806BDD6D58A65DDD3B2908FB8201E103BA44A95979EFFBF5DCA3AD
34,959,885 UART: [art] SIG.R = B38C5185621BD020F7925CDD3E2E33B99FD2511DED8C6F2FB16EBBF58F38226232CF4B8ADA43D90F2AD42E6F324FCA97
34,967,272 UART: [art] SIG.S = 4A437E4833E7F4D0F0B2E93AD960018E2492CC48B784882497FA6A032C74197EECE73977C85CAA862CD6196B08016E60
36,272,402 UART: Caliptra RT
36,273,112 UART: [state] CFI Enabled
36,434,704 UART: [rt] RT listening for mailbox commands...
36,585,719 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,615,627 UART: [rt]cmd =0x4c444556, len=4
36,626,698 >>> mbox cmd response data (687 bytes)
36,771,839 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,801,914 UART: [rt]cmd =0x43455246, len=4
36,814,499 >>> mbox cmd response data (886 bytes)
36,957,956 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,987,930 UART: [rt]cmd =0x43455252, len=4
36,999,128 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,055 UART:
192,415 UART: Running Caliptra ROM ...
193,519 UART:
193,670 UART: [state] CFI Enabled
261,615 UART: [state] LifecycleState = Unprovisioned
264,014 UART: [state] DebugLocked = No
265,985 UART: [state] WD Timer not started. Device not locked for debugging
271,373 UART: [kat] SHA2-256
453,313 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,826 UART: [kat] ++
465,324 UART: [kat] sha1
475,931 UART: [kat] SHA2-256
478,985 UART: [kat] SHA2-384
484,790 UART: [kat] SHA2-512-ACC
487,451 UART: [kat] ECC-384
3,777,338 UART: [kat] HMAC-384Kdf
3,802,114 UART: [kat] LMS
4,875,241 UART: [kat] --
4,880,561 UART: [cold-reset] ++
4,883,255 UART: [fht] FHT @ 0x50003400
4,893,912 UART: [idev] ++
4,894,582 UART: [idev] CDI.KEYID = 6
4,895,812 UART: [idev] SUBJECT.KEYID = 7
4,896,915 UART: [idev] UDS.KEYID = 0
4,930,953 UART: [idev] Erasing UDS.KEYID = 0
8,243,532 UART: [idev] Sha1 KeyId Algorithm
8,262,231 UART: [idev] CSR upload begun
8,267,705 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,573,194 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,589,474 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,605,575 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,621,590 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,646,139 UART: [idev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
10,791,556 UART: [idev] CSR uploaded
10,807,925 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,951,282 UART: [idev] --
10,951,919 UART: [ldev] ++
10,952,414 UART: [ldev] CDI.KEYID = 6
10,953,300 UART: [ldev] SUBJECT.KEYID = 5
10,954,384 UART: [ldev] AUTHORITY.KEYID = 7
10,955,477 UART: [ldev] FE.KEYID = 1
10,956,413 UART: [ldev] Erasing FE.KEYID = 1
14,189,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,503,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,520,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,536,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,552,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,571,450 UART: [ldev] --
16,575,955 UART: [fwproc] Wait for Commands...
16,578,968 UART: [fwproc] Recv command 0x46574c44
16,581,250 UART: [fwproc] Recv'd Img size: 113844 bytes
20,648,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,728,179 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,796,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
21,113,337 >>> mbox cmd response: success
21,117,847 UART: [afmc] ++
21,118,436 UART: [afmc] CDI.KEYID = 6
21,119,615 UART: [afmc] SUBJECT.KEYID = 7
21,120,716 UART: [afmc] AUTHORITY.KEYID = 5
24,485,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,785,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,787,453 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,803,602 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,819,667 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,835,632 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,858,707 UART: [afmc] --
26,861,899 UART: [cold-reset] --
26,864,048 UART: [state] Locking Datavault
26,869,467 UART: [state] Locking PCR0, PCR1 and PCR31
26,871,164 UART: [state] Locking ICCM
26,872,503 UART: [exit] Launching FMC @ 0x40000130
26,881,170 UART:
26,881,398 UART: Running Caliptra FMC ...
26,882,494 UART:
26,882,655 UART: [state] CFI Enabled
26,944,048 UART: [fht] FMC Alias Private Key: 7
29,281,327 UART: [art] Extend RT PCRs Done
29,282,551 UART: [art] Lock RT PCRs Done
29,284,288 UART: [art] Populate DV Done
29,289,748 UART: [fht] FMC Alias Private Key: 7
29,291,439 UART: [art] Derive CDI
29,292,251 UART: [art] Store in in slot 0x4
29,352,355 UART: [art] Derive Key Pair
29,353,397 UART: [art] Store priv key in slot 0x5
32,646,320 UART: [art] Derive Key Pair - Done
32,659,369 UART: [art] Signing Cert with AUTHO
32,660,676 UART: RITY.KEYID = 7
34,947,905 UART: [art] Erasing AUTHORITY.KEYID = 7
34,949,409 UART: [art] PUB.X = E51235E8F8AF27FCF5C91B70E31E7AB1ABFD2A8CF08CE026DC8452A1DE281B5F9095969FF0A0FB208C636EB68E4D1BAC
34,956,692 UART: [art] PUB.Y = 435D4662886DF880A3A8092EDA49B6AE40B3DDAC5EDE10BABB0D671CB0ED0D7DB363884A33F867511D65AD96E5B02A4E
34,963,973 UART: [art] SIG.R = 96205C956C0D4681C8F71A24FBE5136E48DDC084882744DA2ED3A4E9D08F1625B65E1B7341A8E1E8155A61735DD6DC05
34,971,360 UART: [art] SIG.S = 6FB9001F02DB7906EA7CAD6F2A4B04A101791E142A8856EC8C6C9D802A44253FED5DD6352E1DF61F7BE972B8E29B6334
36,276,633 UART: Caliptra RT
36,277,323 UART: [state] CFI Enabled
36,436,244 UART: [rt] RT listening for mailbox commands...
36,587,315 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,617,214 UART: [rt]cmd =0x4c444556, len=4
36,628,269 >>> mbox cmd response data (687 bytes)
36,773,742 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,803,724 UART: [rt]cmd =0x43455246, len=4
36,816,384 >>> mbox cmd response data (886 bytes)
36,960,119 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,990,157 UART: [rt]cmd =0x43455252, len=4
37,001,460 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1964.97s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
10,475,134 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,667,110 >>> mbox cmd response: success
26,359,836 UART:
26,360,267 UART: Running Caliptra FMC ...
26,361,401 UART:
26,361,560 UART: [state] CFI Enabled
26,428,431 UART: [fht] FMC Alias Private Key: 7
28,765,573 UART: [art] Extend RT PCRs Done
28,766,797 UART: [art] Lock RT PCRs Done
28,768,417 UART: [art] Populate DV Done
28,773,777 UART: [fht] FMC Alias Private Key: 7
28,775,421 UART: [art] Derive CDI
28,776,230 UART: [art] Store in in slot 0x4
28,837,754 UART: [art] Derive Key Pair
28,838,810 UART: [art] Store priv key in slot 0x5
32,131,367 UART: [art] Derive Key Pair - Done
32,144,583 UART: [art] Signing Cert with AUTHO
32,145,915 UART: RITY.KEYID = 7
34,433,621 UART: [art] Erasing AUTHORITY.KEYID = 7
34,435,129 UART: [art] PUB.X = 6AA18CD617A40CED24D9B6173D8E425670A31F21B7EBB1BB63859AF09ABA7FADD195A7C0FB9DCF5684919E8345B64F4D
34,442,393 UART: [art] PUB.Y = 43A0F1D7E035DC55076A85F9E0A1669721080BE76A16F999BA6C2D36A0BAC6743FF1C8918F660DC2E0E12C3261C3AEE7
34,449,641 UART: [art] SIG.R = 7045D5D4E97823087AA7BB9A317FAD28172337D38923F6557EFDD6B23DDB04E516C3844D87AFC50D2915B2B7983953B8
34,456,992 UART: [art] SIG.S = 0FACB2CEE4A173772A91E788747A7AF6E5AE6FB41BC8D62F84900576F77DBE8DA312E3CA8BB25E5C47FD57D9B6307428
35,762,185 UART: Caliptra RT
35,762,897 UART: [state] CFI Enabled
35,922,658 UART: [rt] RT listening for mailbox commands...
36,072,719 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,102,873 UART: [rt]cmd =0x4c444556, len=4
36,113,993 >>> mbox cmd response data (687 bytes)
36,259,664 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,289,598 UART: [rt]cmd =0x43455246, len=4
36,302,269 >>> mbox cmd response data (886 bytes)
36,445,932 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,475,965 UART: [rt]cmd =0x43455252, len=4
36,487,374 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,074 writing to cptra_bootfsm_go
10,496,188 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,689,948 >>> mbox cmd response: success
26,380,997 UART:
26,381,400 UART: Running Caliptra FMC ...
26,382,499 UART:
26,382,649 UART: [state] CFI Enabled
26,446,870 UART: [fht] FMC Alias Private Key: 7
28,785,059 UART: [art] Extend RT PCRs Done
28,786,285 UART: [art] Lock RT PCRs Done
28,788,012 UART: [art] Populate DV Done
28,793,527 UART: [fht] FMC Alias Private Key: 7
28,795,060 UART: [art] Derive CDI
28,795,793 UART: [art] Store in in slot 0x4
28,855,979 UART: [art] Derive Key Pair
28,857,043 UART: [art] Store priv key in slot 0x5
32,149,835 UART: [art] Derive Key Pair - Done
32,162,877 UART: [art] Signing Cert with AUTHO
32,164,206 UART: RITY.KEYID = 7
34,451,804 UART: [art] Erasing AUTHORITY.KEYID = 7
34,453,306 UART: [art] PUB.X = F4D9325FDE317EE67362407904CEDC2B8AA47079F6FF6A30548D2427531B4075B5B13A424028AD2085720A525F8CB49C
34,460,520 UART: [art] PUB.Y = 835C7A49763805693574E814F6E50FA8481B1A6C081E85739EC36531923336E2FC0036AD3B8EABD35D52442B886C3449
34,467,766 UART: [art] SIG.R = 85A85A879DCC3899652C87BE963548856499AE20A7A31E5A63FE4F890078BECABDE77DD9A891CBA755D06447B3B518F0
34,475,114 UART: [art] SIG.S = 77B8E6B7AAB89A7F20DFCC0819B771C5F74C0468FA3D846C0DEA9201E9FF85A24B55CD70AFA3773B814567E9B2D3659C
35,779,989 UART: Caliptra RT
35,780,689 UART: [state] CFI Enabled
35,944,422 UART: [rt] RT listening for mailbox commands...
36,094,580 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,124,392 UART: [rt]cmd =0x4c444556, len=4
36,135,346 >>> mbox cmd response data (687 bytes)
36,280,534 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,310,520 UART: [rt]cmd =0x43455246, len=4
36,323,163 >>> mbox cmd response data (886 bytes)
36,466,888 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,496,859 UART: [rt]cmd =0x43455252, len=4
36,508,179 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
10,497,054 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,715,512 >>> mbox cmd response: success
26,405,683 UART:
26,406,074 UART: Running Caliptra FMC ...
26,407,224 UART:
26,407,407 UART: [state] CFI Enabled
26,472,214 UART: [fht] FMC Alias Private Key: 7
28,810,075 UART: [art] Extend RT PCRs Done
28,811,302 UART: [art] Lock RT PCRs Done
28,813,140 UART: [art] Populate DV Done
28,818,575 UART: [fht] FMC Alias Private Key: 7
28,820,222 UART: [art] Derive CDI
28,821,029 UART: [art] Store in in slot 0x4
28,878,827 UART: [art] Derive Key Pair
28,879,867 UART: [art] Store priv key in slot 0x5
32,173,110 UART: [art] Derive Key Pair - Done
32,186,223 UART: [art] Signing Cert with AUTHO
32,187,527 UART: RITY.KEYID = 7
34,475,203 UART: [art] Erasing AUTHORITY.KEYID = 7
34,476,711 UART: [art] PUB.X = 381F471E26AFB7CE6A5D565D994BD5A336B61FCC7249F4B2D8B176B0DBB38D366B6CF3D09453FB794FB260890C2941E6
34,484,024 UART: [art] PUB.Y = 6C429B3429EA27750F0509332B66A64DEA7A911F5E1E73000E627BD893B56B4CA2D249034195F6E7B72252FBD90EEA06
34,491,161 UART: [art] SIG.R = 40E55298B3BE58A4AAB11D81D515F453B03B6328952981D923D80C624B0B2C598C365DAC1C1796A7BC0E15418A7B884F
34,498,578 UART: [art] SIG.S = ED49A3D7BB8D66765A0A93C48217B3E3EFBB32F23FD540F35D5FECF3927A4B7E4495FD1C8836A55BA78641349517583E
35,804,183 UART: Caliptra RT
35,804,878 UART: [state] CFI Enabled
35,964,377 UART: [rt] RT listening for mailbox commands...
36,114,165 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,144,115 UART: [rt]cmd =0x4c444556, len=4
36,155,289 >>> mbox cmd response data (687 bytes)
36,300,600 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,330,624 UART: [rt]cmd =0x43455246, len=4
36,343,213 >>> mbox cmd response data (886 bytes)
36,486,577 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,516,628 UART: [rt]cmd =0x43455252, len=4
36,527,837 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
10,499,580 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,699,296 >>> mbox cmd response: success
26,402,701 UART:
26,403,097 UART: Running Caliptra FMC ...
26,404,198 UART:
26,404,347 UART: [state] CFI Enabled
26,465,863 UART: [fht] FMC Alias Private Key: 7
28,803,637 UART: [art] Extend RT PCRs Done
28,804,858 UART: [art] Lock RT PCRs Done
28,807,004 UART: [art] Populate DV Done
28,812,520 UART: [fht] FMC Alias Private Key: 7
28,814,057 UART: [art] Derive CDI
28,814,792 UART: [art] Store in in slot 0x4
28,873,543 UART: [art] Derive Key Pair
28,874,587 UART: [art] Store priv key in slot 0x5
32,167,207 UART: [art] Derive Key Pair - Done
32,180,210 UART: [art] Signing Cert with AUTHO
32,181,516 UART: RITY.KEYID = 7
34,468,235 UART: [art] Erasing AUTHORITY.KEYID = 7
34,469,737 UART: [art] PUB.X = 9AB41A76ADD5FDF09D1168114C1272B18B1D66F95A2981EC3C29129587017797CBD10D562B2F3E656320BA528BCD9ADD
34,477,003 UART: [art] PUB.Y = D244263B08584A9736542458CBA72CCE170C2F44209CBFC80EFC46CB6D6D5217A703989E920732DB533519B1DB2AE7E8
34,484,244 UART: [art] SIG.R = 9B66B37B06F27A5B45B177356FE2B3D3CCE7D178B72AAF828BDA4F227F2395DC2E20A3B3BF29CD6043DED2778A07609C
34,491,649 UART: [art] SIG.S = A14FD561D02BCEC93E84C262993FE53DDCA22A2E6A1793DBFAD6A345D25AF5E2B766C0E056B3399AAC87B5F3F1A32486
35,797,227 UART: Caliptra RT
35,797,938 UART: [state] CFI Enabled
35,956,725 UART: [rt] RT listening for mailbox commands...
36,106,515 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,136,527 UART: [rt]cmd =0x4c444556, len=4
36,147,635 >>> mbox cmd response data (687 bytes)
36,293,005 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,323,101 UART: [rt]cmd =0x43455246, len=4
36,335,900 >>> mbox cmd response data (886 bytes)
36,479,946 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,509,882 UART: [rt]cmd =0x43455252, len=4
36,521,108 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
10,477,004 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,669,158 >>> mbox cmd response: success
26,354,606 UART:
26,354,996 UART: Running Caliptra FMC ...
26,356,133 UART:
26,356,296 UART: [state] CFI Enabled
26,423,041 UART: [fht] FMC Alias Private Key: 7
28,760,448 UART: [art] Extend RT PCRs Done
28,761,673 UART: [art] Lock RT PCRs Done
28,763,594 UART: [art] Populate DV Done
28,768,753 UART: [fht] FMC Alias Private Key: 7
28,770,240 UART: [art] Derive CDI
28,771,002 UART: [art] Store in in slot 0x4
28,833,287 UART: [art] Derive Key Pair
28,834,285 UART: [art] Store priv key in slot 0x5
32,126,897 UART: [art] Derive Key Pair - Done
32,140,055 UART: [art] Signing Cert with AUTHO
32,141,364 UART: RITY.KEYID = 7
34,428,568 UART: [art] Erasing AUTHORITY.KEYID = 7
34,430,077 UART: [art] PUB.X = 2F21763F665E312AA583F64036AB387FDAB5E64D12F8165A3C94CDD62CD083550CD3CEAAA11831077F99FCE80CE0D0DD
34,437,495 UART: [art] PUB.Y = C3767AF3767172BE4E32C7323D97728849CF9C0DA2A5617406CFF40F24D7AA0607AA21C4903E7E9AC4436DDFFE84F85F
34,444,589 UART: [art] SIG.R = 0448E81A26F2AAA4C726AE81558F1287F5B91F929DD8D7CD14531659F27C873881E025A7F3187AB911A9E27612B3C6E9
34,451,947 UART: [art] SIG.S = 285AF79FEE6A703A1719B6CCFCEFCADC8E639E45F81608FDB2694E9BBC52FADD27A5C783417F9FEA55FCA96EF6DA1377
35,756,600 UART: Caliptra RT
35,757,286 UART: [state] CFI Enabled
35,919,035 UART: [rt] RT listening for mailbox commands...
36,069,201 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,099,156 UART: [rt]cmd =0x4c444556, len=4
36,110,385 >>> mbox cmd response data (687 bytes)
36,255,899 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,285,758 UART: [rt]cmd =0x43455246, len=4
36,298,445 >>> mbox cmd response data (886 bytes)
36,442,538 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,472,361 UART: [rt]cmd =0x43455252, len=4
36,483,611 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1940.14s
Truncated 7343978 bytes from beginning
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
11,033,029 UART: [idev] CSR uploaded
11,049,604 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
11,192,559 UART: [idev] --
11,193,185 UART: [ldev] ++
11,193,670 UART: [ldev] CDI.KEYID = 6
11,194,643 UART: [ldev] SUBJECT.KEYID = 5
11,195,713 UART: [ldev] AUTHORITY.KEYID = 7
11,196,894 UART: [ldev] FE.KEYID = 1
11,197,732 UART: [ldev] Erasing FE.KEYID = 1
14,355,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,646,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,662,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,678,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,694,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,716,369 UART: [ldev] --
16,721,200 UART: [fwproc] Wait for Commands...
16,723,405 UART: [fwproc] Recv command 0x46574c44
16,725,715 UART: [fwproc] Recv'd Img size: 113844 bytes
20,800,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,875,294 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,944,047 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
21,259,339 >>> mbox cmd response: success
21,263,476 UART: [afmc] ++
21,264,062 UART: [afmc] CDI.KEYID = 6
21,265,244 UART: [afmc] SUBJECT.KEYID = 7
21,266,393 UART: [afmc] AUTHORITY.KEYID = 5
24,587,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,882,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,884,791 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,901,027 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,917,036 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,933,029 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,956,151 UART: [afmc] --
26,959,041 UART: [cold-reset] --
26,963,170 UART: [state] Locking Datavault
26,969,380 UART: [state] Locking PCR0, PCR1 and PCR31
26,971,061 UART: [state] Locking ICCM
26,974,079 UART: [exit] Launching FMC @ 0x40000130
26,982,751 UART:
26,982,983 UART: Running Caliptra FMC ...
26,984,080 UART:
26,984,236 UART: [state] CFI Enabled
26,992,162 UART: [fht] FMC Alias Private Key: 7
29,323,180 UART: [art] Extend RT PCRs Done
29,324,396 UART: [art] Lock RT PCRs Done
29,325,901 UART: [art] Populate DV Done
29,331,357 UART: [fht] FMC Alias Private Key: 7
29,332,936 UART: [art] Derive CDI
29,333,662 UART: [art] Store in in slot 0x4
29,376,299 UART: [art] Derive Key Pair
29,377,336 UART: [art] Store priv key in slot 0x5
32,619,542 UART: [art] Derive Key Pair - Done
32,632,538 UART: [art] Signing Cert with AUTHO
32,633,835 UART: RITY.KEYID = 7
34,912,874 UART: [art] Erasing AUTHORITY.KEYID = 7
34,914,376 UART: [art] PUB.X = E2DEE9818D0FBE5B82E2F3707F5FCA6357C754C3D8CE55F654E798E8845D3426DD8A8FD705289DF19533DD3737BB84FC
34,921,680 UART: [art] PUB.Y = F6A6AF302A93C9AA5CC76ABB8E7899503B4FF5CA056E0CB13FFF1BD23794CBBC786E88FB36539E394D50AA294B75F77F
34,928,923 UART: [art] SIG.R = 26D63C032FCC8D75661C0259EFEAD38C38148D62270F1A57C2537C98B0267DC2F706D6AC7EB83C433749234A713CA5C5
34,936,256 UART: [art] SIG.S = C8E5FD2EDEA313B2790A6B3A0069F5E60D0B3BC2D31A3A8E429A9626D1AE424AD13F59B63812FF5AB98436115B924D7C
36,241,649 UART: Caliptra RT
36,242,359 UART: [state] CFI Enabled
36,360,201 UART: [rt] RT listening for mailbox commands...
36,511,033 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,541,132 UART: [rt]cmd =0x4c444556, len=4
36,552,205 >>> mbox cmd response data (687 bytes)
36,697,648 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,727,481 UART: [rt]cmd =0x43455246, len=4
36,740,010 >>> mbox cmd response data (886 bytes)
36,883,263 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,912,972 UART: [rt]cmd =0x43455252, len=4
36,924,326 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,391 UART:
192,763 UART: Running Caliptra ROM ...
193,942 UART:
603,455 UART: [state] CFI Enabled
619,351 UART: [state] LifecycleState = Unprovisioned
621,725 UART: [state] DebugLocked = No
623,835 UART: [state] WD Timer not started. Device not locked for debugging
629,012 UART: [kat] SHA2-256
810,958 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,524 UART: [kat] ++
823,021 UART: [kat] sha1
832,382 UART: [kat] SHA2-256
835,440 UART: [kat] SHA2-384
842,541 UART: [kat] SHA2-512-ACC
845,196 UART: [kat] ECC-384
4,101,456 UART: [kat] HMAC-384Kdf
4,113,756 UART: [kat] LMS
5,186,904 UART: [kat] --
5,191,419 UART: [cold-reset] ++
5,193,157 UART: [fht] FHT @ 0x50003400
5,204,731 UART: [idev] ++
5,205,400 UART: [idev] CDI.KEYID = 6
5,206,546 UART: [idev] SUBJECT.KEYID = 7
5,208,072 UART: [idev] UDS.KEYID = 0
5,224,638 UART: [idev] Erasing UDS.KEYID = 0
8,501,228 UART: [idev] Sha1 KeyId Algorithm
8,520,840 UART: [idev] CSR upload begun
8,526,309 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,814,585 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,830,970 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,847,025 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,863,063 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,887,617 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
11,033,004 UART: [idev] CSR uploaded
11,049,387 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
11,192,515 UART: [idev] --
11,193,147 UART: [ldev] ++
11,193,635 UART: [ldev] CDI.KEYID = 6
11,194,530 UART: [ldev] SUBJECT.KEYID = 5
11,195,601 UART: [ldev] AUTHORITY.KEYID = 7
11,196,780 UART: [ldev] FE.KEYID = 1
11,197,804 UART: [ldev] Erasing FE.KEYID = 1
14,361,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,654,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,670,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,686,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,702,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,723,664 UART: [ldev] --
16,728,875 UART: [fwproc] Wait for Commands...
16,730,542 UART: [fwproc] Recv command 0x46574c44
16,732,797 UART: [fwproc] Recv'd Img size: 113844 bytes
20,799,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,880,316 UART: [fwproc] Load FMC at address 0x40000000 len 18820
20,949,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
21,264,498 >>> mbox cmd response: success
21,268,898 UART: [afmc] ++
21,269,481 UART: [afmc] CDI.KEYID = 6
21,270,660 UART: [afmc] SUBJECT.KEYID = 7
21,271,812 UART: [afmc] AUTHORITY.KEYID = 5
24,590,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,886,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,889,245 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
26,905,371 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
26,921,474 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
26,937,441 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
26,959,196 UART: [afmc] --
26,963,234 UART: [cold-reset] --
26,966,423 UART: [state] Locking Datavault
26,973,185 UART: [state] Locking PCR0, PCR1 and PCR31
26,974,874 UART: [state] Locking ICCM
26,976,907 UART: [exit] Launching FMC @ 0x40000130
26,985,565 UART:
26,985,799 UART: Running Caliptra FMC ...
26,986,897 UART:
26,987,048 UART: [state] CFI Enabled
26,995,195 UART: [fht] FMC Alias Private Key: 7
29,325,924 UART: [art] Extend RT PCRs Done
29,327,140 UART: [art] Lock RT PCRs Done
29,328,707 UART: [art] Populate DV Done
29,334,325 UART: [fht] FMC Alias Private Key: 7
29,335,811 UART: [art] Derive CDI
29,336,546 UART: [art] Store in in slot 0x4
29,379,348 UART: [art] Derive Key Pair
29,380,405 UART: [art] Store priv key in slot 0x5
32,622,743 UART: [art] Derive Key Pair - Done
32,635,683 UART: [art] Signing Cert with AUTHO
32,636,982 UART: RITY.KEYID = 7
34,916,244 UART: [art] Erasing AUTHORITY.KEYID = 7
34,917,749 UART: [art] PUB.X = 8C091DB4CC0CFD05C4FEE46841315799635FCB8C6263E82C86A092CA52CC43A547C73DDA46348454B14441B858609AB1
34,924,998 UART: [art] PUB.Y = B4F8170EF981E8F113A68FFC56445C992CB476D9EE9FD3DC7235EDFA5EAC40A4D35CFD15F8870506686B60889358142E
34,932,241 UART: [art] SIG.R = 885D42337812D5399B630E2D3B556BD895A985AF13CC0DFE2B09D6B44354291D855633E5651DD8161C10BB7F5A545F9A
34,939,581 UART: [art] SIG.S = 22D66A6F52F602075038952CB9CD5336E782194A36612EB68C448646B54A5D6A3626E5E12D6A11C69ADA552627DD0228
36,244,951 UART: Caliptra RT
36,245,665 UART: [state] CFI Enabled
36,362,603 UART: [rt] RT listening for mailbox commands...
36,513,743 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,543,932 UART: [rt]cmd =0x4c444556, len=4
36,555,184 >>> mbox cmd response data (687 bytes)
36,700,424 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,730,631 UART: [rt]cmd =0x43455246, len=4
36,743,204 >>> mbox cmd response data (886 bytes)
36,886,603 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,916,373 UART: [rt]cmd =0x43455252, len=4
36,927,598 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1961.15s
Truncated 2467978 bytes from beginning
811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
10,729,560 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,852,847 >>> mbox cmd response: success
26,486,356 UART:
26,486,750 UART: Running Caliptra FMC ...
26,487,949 UART:
26,488,114 UART: [state] CFI Enabled
26,496,382 UART: [fht] FMC Alias Private Key: 7
28,827,263 UART: [art] Extend RT PCRs Done
28,828,649 UART: [art] Lock RT PCRs Done
28,830,229 UART: [art] Populate DV Done
28,835,585 UART: [fht] FMC Alias Private Key: 7
28,837,228 UART: [art] Derive CDI
28,838,032 UART: [art] Store in in slot 0x4
28,880,744 UART: [art] Derive Key Pair
28,881,737 UART: [art] Store priv key in slot 0x5
32,123,355 UART: [art] Derive Key Pair - Done
32,136,570 UART: [art] Signing Cert with AUTHO
32,137,866 UART: RITY.KEYID = 7
34,417,099 UART: [art] Erasing AUTHORITY.KEYID = 7
34,418,617 UART: [art] PUB.X = 6F745FB83BA3381C448CD216FD9159069BB54D48F57375884F9618370204E50BBA82C8DB4D948DBA09AB0473E1A133E0
34,425,870 UART: [art] PUB.Y = 88B155557ACFAECF44995C28BFA10E7118A9E62B9E78AAB7F584BCB2E7276E02BA5A7F8DEB86E71000F7F578B341C767
34,433,099 UART: [art] SIG.R = 98F7913CF3470FEDBBE16C8398F6CE3BE1B1D345934F47A49092A91B9908CE7EAB1FBF33217609E1380E9ADACDE99F53
34,440,510 UART: [art] SIG.S = E84ABA90E68FF0F12D65D93D021D8323730FC7762F4E7F416E2FBD96AB39E2C8D064EBB964B23CC1C5EF592BA6FDD062
35,745,967 UART: Caliptra RT
35,746,682 UART: [state] CFI Enabled
35,862,865 UART: [rt] RT listening for mailbox commands...
36,012,463 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,042,618 UART: [rt]cmd =0x4c444556, len=4
36,053,727 >>> mbox cmd response data (687 bytes)
36,199,352 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,229,172 UART: [rt]cmd =0x43455246, len=4
36,242,110 >>> mbox cmd response data (886 bytes)
36,385,545 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,415,433 UART: [rt]cmd =0x43455252, len=4
36,426,808 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
10,735,560 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,864,896 >>> mbox cmd response: success
26,510,744 UART:
26,511,150 UART: Running Caliptra FMC ...
26,512,271 UART:
26,512,426 UART: [state] CFI Enabled
26,520,362 UART: [fht] FMC Alias Private Key: 7
28,851,023 UART: [art] Extend RT PCRs Done
28,852,269 UART: [art] Lock RT PCRs Done
28,853,782 UART: [art] Populate DV Done
28,859,182 UART: [fht] FMC Alias Private Key: 7
28,860,776 UART: [art] Derive CDI
28,861,590 UART: [art] Store in in slot 0x4
28,903,974 UART: [art] Derive Key Pair
28,905,007 UART: [art] Store priv key in slot 0x5
32,146,935 UART: [art] Derive Key Pair - Done
32,160,098 UART: [art] Signing Cert with AUTHO
32,161,391 UART: RITY.KEYID = 7
34,440,818 UART: [art] Erasing AUTHORITY.KEYID = 7
34,442,321 UART: [art] PUB.X = 26BA07E066256FA21D481DF31EFF8C620EA2AB38FE7C8DA36A756040B75008368FF2B72C8381302D2C451D43796117BB
34,449,523 UART: [art] PUB.Y = 847C09745E1203755EA9E15A3BCB9378262D1C6DFBB2CDA7287CD09FA2100ADE3A1240DB561FF4049130C7DD75B4379A
34,456,796 UART: [art] SIG.R = 7CC8484151B5A880F6C09D10D30A949AEA3A9EBE0EDAAEAE2F54643BB1D160B78303E5F1F55348FC03345F032730EF7F
34,464,192 UART: [art] SIG.S = E1BFE2EC036A1460082A5FE208E738F81B81698D64D874777BA7D0DD1F3FF9B2731A110E6F8F80D3FBCA22EE34A81791
35,769,561 UART: Caliptra RT
35,770,278 UART: [state] CFI Enabled
35,887,434 UART: [rt] RT listening for mailbox commands...
36,036,823 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,067,037 UART: [rt]cmd =0x4c444556, len=4
36,077,939 >>> mbox cmd response data (687 bytes)
36,223,168 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,253,264 UART: [rt]cmd =0x43455246, len=4
36,266,168 >>> mbox cmd response data (886 bytes)
36,410,211 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,440,275 UART: [rt]cmd =0x43455252, len=4
36,451,656 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
10,729,989 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,849,245 >>> mbox cmd response: success
26,491,079 UART:
26,491,486 UART: Running Caliptra FMC ...
26,492,674 UART:
26,492,841 UART: [state] CFI Enabled
26,500,722 UART: [fht] FMC Alias Private Key: 7
28,831,311 UART: [art] Extend RT PCRs Done
28,832,552 UART: [art] Lock RT PCRs Done
28,834,147 UART: [art] Populate DV Done
28,839,555 UART: [fht] FMC Alias Private Key: 7
28,841,142 UART: [art] Derive CDI
28,841,948 UART: [art] Store in in slot 0x4
28,884,491 UART: [art] Derive Key Pair
28,885,530 UART: [art] Store priv key in slot 0x5
32,127,120 UART: [art] Derive Key Pair - Done
32,140,176 UART: [art] Signing Cert with AUTHO
32,141,481 UART: RITY.KEYID = 7
34,420,849 UART: [art] Erasing AUTHORITY.KEYID = 7
34,422,378 UART: [art] PUB.X = 83F1ACF056CDA824D2A08ED7C83BCE2BE978DC6B5E94A3A89A315755D003E4E01FD8EC202C9B8966059B05C20440A8F4
34,429,633 UART: [art] PUB.Y = AECB2E75EC3DAE1C18DAED7387B3F01A9A650F03531C032F3FC59D5E914957F3769D5081A5631FEF282FB8C70467C8E4
34,436,867 UART: [art] SIG.R = 1FCC2BC636E8642D87B665311C2B9AB400B52A4AF0CD38B59794F83EC8900245FC4A27EE6BC02C27C90B8714D93AF753
34,444,267 UART: [art] SIG.S = D4BE91A5BCB29C752C767BF7B2D2F7332D0B88584B5631AA0E73C39064B32F402386CCD6B79D29E43B46D9C2CEDB26C7
35,749,047 UART: Caliptra RT
35,749,765 UART: [state] CFI Enabled
35,866,670 UART: [rt] RT listening for mailbox commands...
36,016,748 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,046,861 UART: [rt]cmd =0x4c444556, len=4
36,057,873 >>> mbox cmd response data (687 bytes)
36,202,818 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,232,461 UART: [rt]cmd =0x43455246, len=4
36,245,199 >>> mbox cmd response data (886 bytes)
36,388,009 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,417,912 UART: [rt]cmd =0x43455252, len=4
36,429,211 >>> mbox cmd response data (783 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
10,724,924 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,841,429 >>> mbox cmd response: success
26,482,373 UART:
26,482,797 UART: Running Caliptra FMC ...
26,483,897 UART:
26,484,047 UART: [state] CFI Enabled
26,491,895 UART: [fht] FMC Alias Private Key: 7
28,822,983 UART: [art] Extend RT PCRs Done
28,824,205 UART: [art] Lock RT PCRs Done
28,825,907 UART: [art] Populate DV Done
28,831,585 UART: [fht] FMC Alias Private Key: 7
28,833,173 UART: [art] Derive CDI
28,833,982 UART: [art] Store in in slot 0x4
28,876,688 UART: [art] Derive Key Pair
28,877,755 UART: [art] Store priv key in slot 0x5
32,119,368 UART: [art] Derive Key Pair - Done
32,132,051 UART: [art] Signing Cert with AUTHO
32,133,356 UART: RITY.KEYID = 7
34,412,571 UART: [art] Erasing AUTHORITY.KEYID = 7
34,414,078 UART: [art] PUB.X = 40F576ED2CB3BC3A7B78277B4751AEDB6C9C5CD4B0FF4DCFB633EE7CB732B543E76137EB02153B129128EDD8BD811F81
34,421,332 UART: [art] PUB.Y = 7EC28CA500A02B7ED3D3C5396D07413B02CC6331AAFAE062FAE5D582D410173B51B231530E77B732A1BB7676FEE6968E
34,428,562 UART: [art] SIG.R = 390737784D0D21A031BBF738EA69CDEDF5C045DCB5F4888CB230275008243143DA866E4043A5F848941E0201B58B18D0
34,435,954 UART: [art] SIG.S = 5547C724789AC3F7EFC7AECDA177053AEAF62F99E078BB58893F95ED403AFD1FD82F54CBD2E04E4B3C1F850DCF30CD49
35,740,789 UART: Caliptra RT
35,741,500 UART: [state] CFI Enabled
35,858,937 UART: [rt] RT listening for mailbox commands...
36,008,913 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,038,969 UART: [rt]cmd =0x4c444556, len=4
36,050,094 >>> mbox cmd response data (687 bytes)
36,195,444 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,225,663 UART: [rt]cmd =0x43455246, len=4
36,238,567 >>> mbox cmd response data (886 bytes)
36,381,864 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,411,679 UART: [rt]cmd =0x43455252, len=4
36,423,116 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
10,742,272 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,871,626 >>> mbox cmd response: success
26,514,054 UART:
26,514,449 UART: Running Caliptra FMC ...
26,515,648 UART:
26,515,816 UART: [state] CFI Enabled
26,523,697 UART: [fht] FMC Alias Private Key: 7
28,854,304 UART: [art] Extend RT PCRs Done
28,855,525 UART: [art] Lock RT PCRs Done
28,857,164 UART: [art] Populate DV Done
28,862,453 UART: [fht] FMC Alias Private Key: 7
28,864,041 UART: [art] Derive CDI
28,864,855 UART: [art] Store in in slot 0x4
28,907,386 UART: [art] Derive Key Pair
28,908,378 UART: [art] Store priv key in slot 0x5
32,150,895 UART: [art] Derive Key Pair - Done
32,164,002 UART: [art] Signing Cert with AUTHO
32,165,303 UART: RITY.KEYID = 7
34,444,560 UART: [art] Erasing AUTHORITY.KEYID = 7
34,446,067 UART: [art] PUB.X = D3A1A1ECC6F66E2D4275856605E2CAA40F07F1BAABD57B7B197956CE15B8295FA3706BDB3D990E9CE3B8E8C2E28C0563
34,453,350 UART: [art] PUB.Y = 97C90A7D12D65E8C1705F08AEE9937C0C0467F4A91C94DD9168E67DD47878F25975BE486D4FCBBEC6EB88820F8A509E3
34,460,539 UART: [art] SIG.R = EF7F89C8CC778520184CA81F7C8136ED0565F7C79DD172BFBB6FFF42D8980B4004235BFE5472D9BB9196A43812810D46
34,467,981 UART: [art] SIG.S = AA64A8DEECE96169D708D0156FBEDEDE45BFF33B4D8188B818952F0824D482FB8FB6305E725ADDF73B4A34623FA62D9C
35,773,423 UART: Caliptra RT
35,774,121 UART: [state] CFI Enabled
35,891,752 UART: [rt] RT listening for mailbox commands...
36,041,599 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
36,071,604 UART: [rt]cmd =0x4c444556, len=4
36,082,772 >>> mbox cmd response data (687 bytes)
36,227,722 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
36,257,602 UART: [rt]cmd =0x43455246, len=4
36,270,260 >>> mbox cmd response data (886 bytes)
36,413,392 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
36,443,490 UART: [rt]cmd =0x43455252, len=4
36,454,900 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1936.89s
Truncated 7343978 bytes from beginning
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
7,996,668 UART: [idev] CSR uploaded
8,014,053 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,157,840 UART: [idev] --
8,158,481 UART: [ldev] ++
8,158,977 UART: [ldev] CDI.KEYID = 6
8,159,854 UART: [ldev] SUBJECT.KEYID = 5
8,161,022 UART: [ldev] AUTHORITY.KEYID = 7
8,162,206 UART: [ldev] FE.KEYID = 1
8,163,090 UART: [ldev] Erasing FE.KEYID = 1
10,566,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,301,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,317,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,332,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,348,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,370,075 UART: [ldev] --
12,374,919 UART: [fwproc] Wait for Commands...
12,378,153 UART: [fwproc] Recv command 0x46574c44
12,380,252 UART: [fwproc] Recv'd Img size: 114168 bytes
15,784,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,853,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,922,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,240,467 >>> mbox cmd response: success
16,244,923 UART: [afmc] ++
16,245,508 UART: [afmc] CDI.KEYID = 6
16,246,415 UART: [afmc] SUBJECT.KEYID = 7
16,247,577 UART: [afmc] AUTHORITY.KEYID = 5
18,788,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,512,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,514,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,530,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,546,237 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,562,045 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,584,392 UART: [afmc] --
20,588,796 UART: [cold-reset] --
20,591,900 UART: [state] Locking Datavault
20,598,714 UART: [state] Locking PCR0, PCR1 and PCR31
20,600,358 UART: [state] Locking ICCM
20,602,114 UART: [exit] Launching FMC @ 0x40000130
20,610,529 UART:
20,610,770 UART: Running Caliptra FMC ...
20,611,871 UART:
20,612,029 UART: [state] CFI Enabled
20,671,858 UART: [fht] FMC Alias Private Key: 7
22,436,692 UART: [art] Extend RT PCRs Done
22,437,907 UART: [art] Lock RT PCRs Done
22,439,760 UART: [art] Populate DV Done
22,445,145 UART: [fht] FMC Alias Private Key: 7
22,446,693 UART: [art] Derive CDI
22,447,507 UART: [art] Store in in slot 0x4
22,504,979 UART: [art] Derive Key Pair
22,505,976 UART: [art] Store priv key in slot 0x5
24,969,076 UART: [art] Derive Key Pair - Done
24,982,127 UART: [art] Signing Cert with AUTHO
24,983,430 UART: RITY.KEYID = 7
26,695,010 UART: [art] Erasing AUTHORITY.KEYID = 7
26,696,516 UART: [art] PUB.X = 5351A1EF2A520FE2D5A5F8A098CFB7772C4FDFC50DB1CF32DEAB2CE0EB46A0A0332831AF6F471A075F08BFEF8BE5C4A2
26,703,809 UART: [art] PUB.Y = D2E31E5252BF7791A29F892EB38161F48D32B519332992C34FDC18270AEE79DE4FA5D6A77294CEFDF1FE253139CC2D42
26,711,043 UART: [art] SIG.R = 74D4B1C7ECC81D4FDE33489B65B68704A6E94E59CB9319E27600A85846C0FD7B90A757B73F92981C71E9A68E111ED7B0
26,718,435 UART: [art] SIG.S = 109BDFA2B614A8B51365058FD629A9866A2B8325A3A9A3AA1F18D796BF13A3F864387561BA8BBC4788B4F03B0DF23345
27,697,241 UART: Caliptra RT
27,697,926 UART: [state] CFI Enabled
27,863,602 UART: [rt] RT listening for mailbox commands...
28,014,002 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,043,997 UART: [rt]cmd =0x4c444556, len=4
28,054,985 >>> mbox cmd response data (687 bytes)
28,200,377 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,230,827 UART: [rt]cmd =0x43455246, len=4
28,243,493 >>> mbox cmd response data (887 bytes)
28,386,407 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,416,221 UART: [rt]cmd =0x43455252, len=4
28,427,554 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,011 UART:
192,397 UART: Running Caliptra ROM ...
193,533 UART:
193,699 UART: [state] CFI Enabled
261,531 UART: [state] LifecycleState = Unprovisioned
263,352 UART: [state] DebugLocked = No
265,107 UART: [state] WD Timer not started. Device not locked for debugging
269,479 UART: [kat] SHA2-256
448,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,142 UART: [kat] ++
460,730 UART: [kat] sha1
471,182 UART: [kat] SHA2-256
474,247 UART: [kat] SHA2-384
479,303 UART: [kat] SHA2-512-ACC
482,237 UART: [kat] ECC-384
2,928,568 UART: [kat] HMAC-384Kdf
2,949,991 UART: [kat] LMS
3,479,465 UART: [kat] --
3,484,554 UART: [cold-reset] ++
3,485,975 UART: [fht] FHT @ 0x50003400
3,497,125 UART: [idev] ++
3,497,693 UART: [idev] CDI.KEYID = 6
3,498,597 UART: [idev] SUBJECT.KEYID = 7
3,499,814 UART: [idev] UDS.KEYID = 0
3,522,926 UART: [idev] Erasing UDS.KEYID = 0
6,002,614 UART: [idev] Sha1 KeyId Algorithm
6,022,506 UART: [idev] CSR upload begun
6,027,228 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,762,000 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,778,035 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,794,054 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,809,887 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,833,709 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,978,173 UART: [idev] CSR uploaded
7,995,516 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,139,332 UART: [idev] --
8,139,970 UART: [ldev] ++
8,140,465 UART: [ldev] CDI.KEYID = 6
8,141,344 UART: [ldev] SUBJECT.KEYID = 5
8,142,427 UART: [ldev] AUTHORITY.KEYID = 7
8,143,550 UART: [ldev] FE.KEYID = 1
8,144,392 UART: [ldev] Erasing FE.KEYID = 1
10,545,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,281,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,297,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,313,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,329,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,350,158 UART: [ldev] --
12,355,670 UART: [fwproc] Wait for Commands...
12,358,544 UART: [fwproc] Recv command 0x46574c44
12,360,643 UART: [fwproc] Recv'd Img size: 114168 bytes
15,766,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,841,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,910,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,227,703 >>> mbox cmd response: success
16,232,391 UART: [afmc] ++
16,232,983 UART: [afmc] CDI.KEYID = 6
16,233,893 UART: [afmc] SUBJECT.KEYID = 7
16,235,108 UART: [afmc] AUTHORITY.KEYID = 5
18,770,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,494,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,496,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,512,288 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,528,324 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,544,195 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,568,166 UART: [afmc] --
20,572,458 UART: [cold-reset] --
20,575,739 UART: [state] Locking Datavault
20,581,857 UART: [state] Locking PCR0, PCR1 and PCR31
20,583,555 UART: [state] Locking ICCM
20,585,810 UART: [exit] Launching FMC @ 0x40000130
20,594,208 UART:
20,594,482 UART: Running Caliptra FMC ...
20,595,530 UART:
20,595,684 UART: [state] CFI Enabled
20,651,507 UART: [fht] FMC Alias Private Key: 7
22,414,963 UART: [art] Extend RT PCRs Done
22,416,169 UART: [art] Lock RT PCRs Done
22,417,628 UART: [art] Populate DV Done
22,422,986 UART: [fht] FMC Alias Private Key: 7
22,424,640 UART: [art] Derive CDI
22,425,458 UART: [art] Store in in slot 0x4
22,484,078 UART: [art] Derive Key Pair
22,485,168 UART: [art] Store priv key in slot 0x5
24,947,924 UART: [art] Derive Key Pair - Done
24,961,084 UART: [art] Signing Cert with AUTHO
24,962,402 UART: RITY.KEYID = 7
26,674,205 UART: [art] Erasing AUTHORITY.KEYID = 7
26,675,712 UART: [art] PUB.X = 989A2375DF9756DD640C84A31A6B2A6215B90C31E555FA7B126FE4061EA5C8B02D8218F0AFA426B150A17362B4F9CC81
26,682,947 UART: [art] PUB.Y = 6FFB0282684493363368265B3FB2EAFEE73C9A91855310850400EA8BFB7F9DC183691CC9F3901F1F2AF4A7625E6F005A
26,690,180 UART: [art] SIG.R = B850A73D4C69934BF126D247ED6E255D1A7955F3DA337D914053EF7C27E8DC463E9BA86AC4BB57937F4E5782B58930FF
26,697,574 UART: [art] SIG.S = 03BE8920D39FE5E486D9302D1F508D7F044604ECB30340C7AB00EE416A29DFE0482F0DE5B19BEAEF6D4E6AA93E6BAE97
27,677,159 UART: Caliptra RT
27,677,849 UART: [state] CFI Enabled
27,841,876 UART: [rt] RT listening for mailbox commands...
27,992,962 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,022,803 UART: [rt]cmd =0x4c444556, len=4
28,033,745 >>> mbox cmd response data (687 bytes)
28,179,148 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,209,319 UART: [rt]cmd =0x43455246, len=4
28,221,865 >>> mbox cmd response data (887 bytes)
28,365,051 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,394,976 UART: [rt]cmd =0x43455252, len=4
28,406,243 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.03s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
7,686,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,838,843 >>> mbox cmd response: success
20,131,462 UART:
20,131,852 UART: Running Caliptra FMC ...
20,132,953 UART:
20,133,110 UART: [state] CFI Enabled
20,201,010 UART: [fht] FMC Alias Private Key: 7
21,964,612 UART: [art] Extend RT PCRs Done
21,965,853 UART: [art] Lock RT PCRs Done
21,967,562 UART: [art] Populate DV Done
21,972,808 UART: [fht] FMC Alias Private Key: 7
21,974,567 UART: [art] Derive CDI
21,975,305 UART: [art] Store in in slot 0x4
22,034,342 UART: [art] Derive Key Pair
22,035,389 UART: [art] Store priv key in slot 0x5
24,497,573 UART: [art] Derive Key Pair - Done
24,510,499 UART: [art] Signing Cert with AUTHO
24,511,834 UART: RITY.KEYID = 7
26,224,217 UART: [art] Erasing AUTHORITY.KEYID = 7
26,225,728 UART: [art] PUB.X = F791FE944F56CAE3F3C0519132CC396E761115AD2A2B4C66D099CD902A9DE9AD0FCC506A70A0765D870E20FC673317E9
26,232,977 UART: [art] PUB.Y = E5E9EAE58503A879697521D937ECC71DBF1C22215C47FFBECA8C16ACAEF29AC797DB6C6C09269D9DEC62CEAFC46C76EA
26,240,267 UART: [art] SIG.R = 74D75C9D96FD5E9C6B7A0963ADA0EB92B7B4652D0E35F938427C3F46C67B382B10A6C017E28B4F2997AE60929EC942C8
26,247,668 UART: [art] SIG.S = 8597563B4CDEFDCF3B0B15B245473FDF548B564176DFC25C940C73834CC1592494F072865285797F42BDA8038B643ACA
27,226,592 UART: Caliptra RT
27,227,319 UART: [state] CFI Enabled
27,390,601 UART: [rt] RT listening for mailbox commands...
27,541,017 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,571,183 UART: [rt]cmd =0x4c444556, len=4
27,582,059 >>> mbox cmd response data (687 bytes)
27,727,398 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,757,552 UART: [rt]cmd =0x43455246, len=4
27,770,225 >>> mbox cmd response data (887 bytes)
27,913,181 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,943,205 UART: [rt]cmd =0x43455252, len=4
27,954,402 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
7,642,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,798,354 >>> mbox cmd response: success
20,087,865 UART:
20,088,279 UART: Running Caliptra FMC ...
20,089,392 UART:
20,089,546 UART: [state] CFI Enabled
20,155,064 UART: [fht] FMC Alias Private Key: 7
21,919,331 UART: [art] Extend RT PCRs Done
21,920,558 UART: [art] Lock RT PCRs Done
21,922,115 UART: [art] Populate DV Done
21,927,625 UART: [fht] FMC Alias Private Key: 7
21,929,224 UART: [art] Derive CDI
21,929,963 UART: [art] Store in in slot 0x4
21,987,333 UART: [art] Derive Key Pair
21,988,377 UART: [art] Store priv key in slot 0x5
24,451,142 UART: [art] Derive Key Pair - Done
24,464,034 UART: [art] Signing Cert with AUTHO
24,465,342 UART: RITY.KEYID = 7
26,176,646 UART: [art] Erasing AUTHORITY.KEYID = 7
26,178,144 UART: [art] PUB.X = 58A406C770F21D43FDFF64D22754E9ED7FB2A5BBB04BC3A44EB7E0A16EEB245FD6C282CDE6D40D8B342045C326E53EB2
26,185,447 UART: [art] PUB.Y = CF7342710EF3EB199CA8AD8E80ED7D843E034901A96ABA6548B3CA1CF4DC0EDECBFABB25A79AA6EA4A8225F3A223F83C
26,192,725 UART: [art] SIG.R = 2C3E5066A16059CFC6013B3007870DBE88AF24505C5F27B24CF84626655B56CD81E1C83C2A9F4F3FDA10E1091B18514A
26,200,119 UART: [art] SIG.S = DCFC6A081B30041F1F9D3820B939B82249B1CC4DAB1A8D8BD742456819BF1330CCAF45DEA7258F302081C197C1941162
27,178,732 UART: Caliptra RT
27,179,452 UART: [state] CFI Enabled
27,344,676 UART: [rt] RT listening for mailbox commands...
27,494,762 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,524,869 UART: [rt]cmd =0x4c444556, len=4
27,535,900 >>> mbox cmd response data (687 bytes)
27,681,118 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,710,923 UART: [rt]cmd =0x43455246, len=4
27,723,779 >>> mbox cmd response data (887 bytes)
27,866,480 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,896,571 UART: [rt]cmd =0x43455252, len=4
27,908,216 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
7,686,387 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,833,349 >>> mbox cmd response: success
20,130,930 UART:
20,131,305 UART: Running Caliptra FMC ...
20,132,414 UART:
20,132,565 UART: [state] CFI Enabled
20,197,544 UART: [fht] FMC Alias Private Key: 7
21,962,721 UART: [art] Extend RT PCRs Done
21,963,947 UART: [art] Lock RT PCRs Done
21,965,497 UART: [art] Populate DV Done
21,970,739 UART: [fht] FMC Alias Private Key: 7
21,972,229 UART: [art] Derive CDI
21,972,961 UART: [art] Store in in slot 0x4
22,029,674 UART: [art] Derive Key Pair
22,030,700 UART: [art] Store priv key in slot 0x5
24,493,397 UART: [art] Derive Key Pair - Done
24,506,396 UART: [art] Signing Cert with AUTHO
24,507,705 UART: RITY.KEYID = 7
26,219,300 UART: [art] Erasing AUTHORITY.KEYID = 7
26,220,818 UART: [art] PUB.X = DC6A5930048F7CA87F16A99C7B5C662C1FC9ABEECE50220CAED19F96DB76FC7DEB628C3711DBB217176D67F5B915ADD4
26,228,124 UART: [art] PUB.Y = 69DB0621B9134F71548A89A802A75043D5634887C0BF5490611E42BE7F660B83F5A1674E1EE923A44ED0682C5036B60C
26,235,341 UART: [art] SIG.R = 11C62A934754EC23ED9D8BE43502A060C6862375C644C7F754750179DAF93EF79AA421B59B0D5609263147B20E22E0D9
26,242,733 UART: [art] SIG.S = 5BCC1555F805CA44FA7A792AFE5B86244E91CFA8F9069A72A9A73CA9D24787625B6714C938EDD8C2A11C136BDDBC5574
27,221,558 UART: Caliptra RT
27,222,254 UART: [state] CFI Enabled
27,388,431 UART: [rt] RT listening for mailbox commands...
27,538,442 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,568,530 UART: [rt]cmd =0x4c444556, len=4
27,579,790 >>> mbox cmd response data (687 bytes)
27,725,556 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,755,550 UART: [rt]cmd =0x43455246, len=4
27,768,268 >>> mbox cmd response data (887 bytes)
27,911,044 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,940,755 UART: [rt]cmd =0x43455252, len=4
27,952,192 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
7,685,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,837,628 >>> mbox cmd response: success
20,130,909 UART:
20,131,300 UART: Running Caliptra FMC ...
20,132,412 UART:
20,132,577 UART: [state] CFI Enabled
20,201,216 UART: [fht] FMC Alias Private Key: 7
21,964,775 UART: [art] Extend RT PCRs Done
21,965,987 UART: [art] Lock RT PCRs Done
21,967,791 UART: [art] Populate DV Done
21,973,207 UART: [fht] FMC Alias Private Key: 7
21,974,699 UART: [art] Derive CDI
21,975,434 UART: [art] Store in in slot 0x4
22,033,333 UART: [art] Derive Key Pair
22,034,411 UART: [art] Store priv key in slot 0x5
24,496,254 UART: [art] Derive Key Pair - Done
24,508,705 UART: [art] Signing Cert with AUTHO
24,510,040 UART: RITY.KEYID = 7
26,222,562 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,061 UART: [art] PUB.X = 8FEA7D1E23EC3390CA6EFF136127B4E97C75C6333A05770602326CB3674CF56286C96A7B3997CFBBDCB98762B98F83A6
26,231,370 UART: [art] PUB.Y = 009062DD1EA07A13BD280D5B8BEE860791BD2AEF3E701DCF3A169E716800DF0A69B44DF7D402A47E8D417B676CC6007F
26,238,583 UART: [art] SIG.R = F32EBA8BEDD3F8C8A7C5AEFDD1E24E2F92DE9242A97CEDC032C81F242669CE952CBD9C09BB88DF2F067CF8539B38015F
26,245,974 UART: [art] SIG.S = 3BE813891FEE081373E6DB3488575F1F8E360E25F136F9B6A232E7C0D784F6898C43B386C72800ACFC9A5862B0547ACA
27,224,751 UART: Caliptra RT
27,225,448 UART: [state] CFI Enabled
27,390,410 UART: [rt] RT listening for mailbox commands...
27,539,342 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,569,434 UART: [rt]cmd =0x4c444556, len=4
27,580,372 >>> mbox cmd response data (687 bytes)
27,727,185 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,756,963 UART: [rt]cmd =0x43455246, len=4
27,769,681 >>> mbox cmd response data (887 bytes)
27,913,132 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,943,108 UART: [rt]cmd =0x43455252, len=4
27,954,551 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
7,667,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,797,581 >>> mbox cmd response: success
20,095,005 UART:
20,095,399 UART: Running Caliptra FMC ...
20,096,518 UART:
20,096,675 UART: [state] CFI Enabled
20,160,881 UART: [fht] FMC Alias Private Key: 7
21,924,566 UART: [art] Extend RT PCRs Done
21,925,792 UART: [art] Lock RT PCRs Done
21,927,475 UART: [art] Populate DV Done
21,932,671 UART: [fht] FMC Alias Private Key: 7
21,934,410 UART: [art] Derive CDI
21,935,245 UART: [art] Store in in slot 0x4
21,993,695 UART: [art] Derive Key Pair
21,994,688 UART: [art] Store priv key in slot 0x5
24,457,700 UART: [art] Derive Key Pair - Done
24,470,604 UART: [art] Signing Cert with AUTHO
24,471,909 UART: RITY.KEYID = 7
26,183,551 UART: [art] Erasing AUTHORITY.KEYID = 7
26,185,064 UART: [art] PUB.X = 820DE1E409F78085A4FB1D0637F094103650AB190360F153D61B4EEBC133AE7F155F4700FF0E0BB1EEEBE7C884D9B689
26,192,338 UART: [art] PUB.Y = 5DA96584112F89F5E359559B9052845F273A655ED364E69B212DBBCFDEFB44DFA10C7D7CCAD9CD1CB9CEDC6F5B202577
26,199,598 UART: [art] SIG.R = 6D3313C04A855ED6254D2EEEDB813A2BDEBF5E353FF74730B9193BA30EAC6FDD72A821F3330464FB6EC5DCF566277B50
26,206,988 UART: [art] SIG.S = A5CFF6B550A6439053A150370EFBA4F98F6DB12537D5E0BB039803704EB71003BA0971F003AAACFE04AC277F240325A8
27,185,759 UART: Caliptra RT
27,186,452 UART: [state] CFI Enabled
27,350,701 UART: [rt] RT listening for mailbox commands...
27,500,497 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,530,507 UART: [rt]cmd =0x4c444556, len=4
27,541,681 >>> mbox cmd response data (687 bytes)
27,686,706 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,716,724 UART: [rt]cmd =0x43455246, len=4
27,729,486 >>> mbox cmd response data (887 bytes)
27,872,492 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,902,287 UART: [rt]cmd =0x43455252, len=4
27,913,727 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.67s
Truncated 7343978 bytes from beginning
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
8,267,207 UART: [idev] CSR uploaded
8,284,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,428,055 UART: [idev] --
8,428,693 UART: [ldev] ++
8,429,186 UART: [ldev] CDI.KEYID = 6
8,430,062 UART: [ldev] SUBJECT.KEYID = 5
8,431,149 UART: [ldev] AUTHORITY.KEYID = 7
8,432,352 UART: [ldev] FE.KEYID = 1
8,433,225 UART: [ldev] Erasing FE.KEYID = 1
10,776,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,493,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,509,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,525,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,541,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,562,531 UART: [ldev] --
12,566,984 UART: [fwproc] Wait for Commands...
12,570,264 UART: [fwproc] Recv command 0x46574c44
12,572,301 UART: [fwproc] Recv'd Img size: 114168 bytes
15,972,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,116,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,435,002 >>> mbox cmd response: success
16,438,856 UART: [afmc] ++
16,439,463 UART: [afmc] CDI.KEYID = 6
16,440,371 UART: [afmc] SUBJECT.KEYID = 7
16,441,580 UART: [afmc] AUTHORITY.KEYID = 5
18,943,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,662,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,664,202 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,680,097 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,696,145 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,712,016 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,734,708 UART: [afmc] --
20,738,245 UART: [cold-reset] --
20,742,208 UART: [state] Locking Datavault
20,747,230 UART: [state] Locking PCR0, PCR1 and PCR31
20,748,868 UART: [state] Locking ICCM
20,751,393 UART: [exit] Launching FMC @ 0x40000130
20,759,844 UART:
20,760,093 UART: Running Caliptra FMC ...
20,761,192 UART:
20,761,352 UART: [state] CFI Enabled
20,769,447 UART: [fht] FMC Alias Private Key: 7
22,525,901 UART: [art] Extend RT PCRs Done
22,527,138 UART: [art] Lock RT PCRs Done
22,528,788 UART: [art] Populate DV Done
22,534,464 UART: [fht] FMC Alias Private Key: 7
22,536,002 UART: [art] Derive CDI
22,536,820 UART: [art] Store in in slot 0x4
22,579,653 UART: [art] Derive Key Pair
22,580,665 UART: [art] Store priv key in slot 0x5
25,007,157 UART: [art] Derive Key Pair - Done
25,019,989 UART: [art] Signing Cert with AUTHO
25,021,315 UART: RITY.KEYID = 7
26,726,424 UART: [art] Erasing AUTHORITY.KEYID = 7
26,727,944 UART: [art] PUB.X = 23AA8787D6441193E636F9CB3793427909DA19248412580D23E501AC75DC82860E318BA793469949FF01C76DFA4DA537
26,735,143 UART: [art] PUB.Y = 26499EEDD781BDFFF9A0EEE421928D6544FF5AE7795D99181B8BDFFE181C3860FB617105D9EA0311BBA5ED7F88F8B209
26,742,433 UART: [art] SIG.R = C99398CEC0325225779E4805F3C1DFF402C0432AB6CC81A1DFEFEFCFBBCA312FDE6D4836E2B187C199EEE7C1DED5026B
26,749,843 UART: [art] SIG.S = 3AAC5AC05D0EC826B3432D3B47C78162248F53107FF9794C5EEA148D65C881F82B05BD7124022B0F597A2985162B62A6
27,728,755 UART: Caliptra RT
27,729,474 UART: [state] CFI Enabled
27,846,136 UART: [rt] RT listening for mailbox commands...
27,996,808 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,027,105 UART: [rt]cmd =0x4c444556, len=4
28,038,285 >>> mbox cmd response data (687 bytes)
28,183,573 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,213,801 UART: [rt]cmd =0x43455246, len=4
28,226,502 >>> mbox cmd response data (887 bytes)
28,370,648 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,400,673 UART: [rt]cmd =0x43455252, len=4
28,412,081 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,439 UART:
192,811 UART: Running Caliptra ROM ...
194,005 UART:
603,650 UART: [state] CFI Enabled
620,821 UART: [state] LifecycleState = Unprovisioned
622,685 UART: [state] DebugLocked = No
624,393 UART: [state] WD Timer not started. Device not locked for debugging
628,223 UART: [kat] SHA2-256
807,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,910 UART: [kat] ++
819,441 UART: [kat] sha1
830,324 UART: [kat] SHA2-256
833,373 UART: [kat] SHA2-384
839,939 UART: [kat] SHA2-512-ACC
842,884 UART: [kat] ECC-384
3,283,556 UART: [kat] HMAC-384Kdf
3,296,116 UART: [kat] LMS
3,825,626 UART: [kat] --
3,829,819 UART: [cold-reset] ++
3,831,200 UART: [fht] FHT @ 0x50003400
3,840,768 UART: [idev] ++
3,841,326 UART: [idev] CDI.KEYID = 6
3,842,249 UART: [idev] SUBJECT.KEYID = 7
3,843,459 UART: [idev] UDS.KEYID = 0
3,858,190 UART: [idev] Erasing UDS.KEYID = 0
6,314,090 UART: [idev] Sha1 KeyId Algorithm
6,335,196 UART: [idev] CSR upload begun
6,339,859 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,056,295 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,072,350 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,088,276 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,104,118 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,127,938 UART: [idev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
8,272,656 UART: [idev] CSR uploaded
8,289,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,433,473 UART: [idev] --
8,434,110 UART: [ldev] ++
8,434,612 UART: [ldev] CDI.KEYID = 6
8,435,580 UART: [ldev] SUBJECT.KEYID = 5
8,436,663 UART: [ldev] AUTHORITY.KEYID = 7
8,437,848 UART: [ldev] FE.KEYID = 1
8,438,725 UART: [ldev] Erasing FE.KEYID = 1
10,783,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,504,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,520,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,535,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,551,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,573,030 UART: [ldev] --
12,577,000 UART: [fwproc] Wait for Commands...
12,578,835 UART: [fwproc] Recv command 0x46574c44
12,580,927 UART: [fwproc] Recv'd Img size: 114168 bytes
15,989,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,057,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,126,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,443,790 >>> mbox cmd response: success
16,447,470 UART: [afmc] ++
16,448,056 UART: [afmc] CDI.KEYID = 6
16,448,944 UART: [afmc] SUBJECT.KEYID = 7
16,450,157 UART: [afmc] AUTHORITY.KEYID = 5
18,944,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,667,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,669,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,685,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,701,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,716,914 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,739,164 UART: [afmc] --
20,742,537 UART: [cold-reset] --
20,745,470 UART: [state] Locking Datavault
20,750,222 UART: [state] Locking PCR0, PCR1 and PCR31
20,751,918 UART: [state] Locking ICCM
20,753,418 UART: [exit] Launching FMC @ 0x40000130
20,761,866 UART:
20,762,106 UART: Running Caliptra FMC ...
20,763,206 UART:
20,763,362 UART: [state] CFI Enabled
20,771,458 UART: [fht] FMC Alias Private Key: 7
22,528,028 UART: [art] Extend RT PCRs Done
22,529,245 UART: [art] Lock RT PCRs Done
22,530,829 UART: [art] Populate DV Done
22,536,238 UART: [fht] FMC Alias Private Key: 7
22,537,821 UART: [art] Derive CDI
22,538,630 UART: [art] Store in in slot 0x4
22,581,112 UART: [art] Derive Key Pair
22,582,117 UART: [art] Store priv key in slot 0x5
25,008,919 UART: [art] Derive Key Pair - Done
25,022,070 UART: [art] Signing Cert with AUTHO
25,023,409 UART: RITY.KEYID = 7
26,729,176 UART: [art] Erasing AUTHORITY.KEYID = 7
26,730,686 UART: [art] PUB.X = 459EE7079726CD89F52D2E94A5D0042E355EF19BD1927FAE5120AC4A63176BD7FEB98B0901313B6A7FC10C0E410A7C2C
26,737,949 UART: [art] PUB.Y = C46A44C3B3126CD1544F8F501943C0FB7CCA47AFF598F2E8D38A904E17872B2746085BE8D348972E7FF237C4AE5CB01E
26,745,206 UART: [art] SIG.R = A9843FFB5BAD4566C828145A01E45077066D18C12AECBDCEC207B71680A358F61AB61D9B192C6450BD8B04763E3FE781
26,752,632 UART: [art] SIG.S = CA2DA1E9034A49BE37FD14E94B6A28D29493E859C0336570EE7FB8FCC45B051560163ED24D05DB52075EF0D1A7E1A3C5
27,732,064 UART: Caliptra RT
27,732,765 UART: [state] CFI Enabled
27,850,778 UART: [rt] RT listening for mailbox commands...
28,001,620 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,031,471 UART: [rt]cmd =0x4c444556, len=4
28,042,540 >>> mbox cmd response data (687 bytes)
28,188,754 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,218,515 UART: [rt]cmd =0x43455246, len=4
28,231,071 >>> mbox cmd response data (887 bytes)
28,374,159 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,404,057 UART: [rt]cmd =0x43455252, len=4
28,415,241 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.16s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
7,939,311 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,017,178 >>> mbox cmd response: success
20,272,157 UART:
20,272,533 UART: Running Caliptra FMC ...
20,273,633 UART:
20,273,785 UART: [state] CFI Enabled
20,281,845 UART: [fht] FMC Alias Private Key: 7
22,038,817 UART: [art] Extend RT PCRs Done
22,040,028 UART: [art] Lock RT PCRs Done
22,041,625 UART: [art] Populate DV Done
22,046,951 UART: [fht] FMC Alias Private Key: 7
22,048,442 UART: [art] Derive CDI
22,049,176 UART: [art] Store in in slot 0x4
22,091,628 UART: [art] Derive Key Pair
22,092,626 UART: [art] Store priv key in slot 0x5
24,519,255 UART: [art] Derive Key Pair - Done
24,532,192 UART: [art] Signing Cert with AUTHO
24,533,530 UART: RITY.KEYID = 7
26,239,093 UART: [art] Erasing AUTHORITY.KEYID = 7
26,240,576 UART: [art] PUB.X = 9474E935E9E4DB6707F2DD712623346965BCEAA5ED575048DCC0F01558EA178B0913C4E2AAEC1C0FBB63194E5B13BAD6
26,247,904 UART: [art] PUB.Y = 1AC320011E766F0E26780109B0BB679A15288AE5EA8999FDFCF95FC7749155B5B706737DF469DFBD454CCFC0FFBC244D
26,255,168 UART: [art] SIG.R = 44DD71593B1F94902581F4357138991F4125A106BE6B776AF22B20F3AFAAA67A07F3F245FAECF6EF59268DBA3876E55E
26,262,579 UART: [art] SIG.S = F92D056A7B66C24236919EB8F5395D69FA43E21BB8A9B25A1B71D1B6557748477CB0D44F0B2DC4F21BA1631DE84CF9D4
27,241,369 UART: Caliptra RT
27,242,089 UART: [state] CFI Enabled
27,358,723 UART: [rt] RT listening for mailbox commands...
27,508,612 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,538,762 UART: [rt]cmd =0x4c444556, len=4
27,549,844 >>> mbox cmd response data (687 bytes)
27,695,384 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,725,297 UART: [rt]cmd =0x43455246, len=4
27,737,996 >>> mbox cmd response data (887 bytes)
27,880,520 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,910,597 UART: [rt]cmd =0x43455252, len=4
27,922,182 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
7,940,660 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,020,592 >>> mbox cmd response: success
20,266,257 UART:
20,266,662 UART: Running Caliptra FMC ...
20,267,832 UART:
20,267,991 UART: [state] CFI Enabled
20,275,463 UART: [fht] FMC Alias Private Key: 7
22,032,119 UART: [art] Extend RT PCRs Done
22,033,364 UART: [art] Lock RT PCRs Done
22,035,071 UART: [art] Populate DV Done
22,040,548 UART: [fht] FMC Alias Private Key: 7
22,042,196 UART: [art] Derive CDI
22,042,932 UART: [art] Store in in slot 0x4
22,085,478 UART: [art] Derive Key Pair
22,086,523 UART: [art] Store priv key in slot 0x5
24,512,702 UART: [art] Derive Key Pair - Done
24,525,489 UART: [art] Signing Cert with AUTHO
24,526,793 UART: RITY.KEYID = 7
26,232,421 UART: [art] Erasing AUTHORITY.KEYID = 7
26,233,928 UART: [art] PUB.X = 7FB24587067CB0D8AD3AC5B5F78CE4200EABF26EFD2F2E2FD560554512F084CA0869970FA9A72C05D58EDE41A8A147DC
26,241,190 UART: [art] PUB.Y = D81124638A0937EAAA23C8755AD32F5AFB8DDF5EA5CB1DEE64634A8421165C62827B2E1410DF2DBCFE682E26AC912EC6
26,248,501 UART: [art] SIG.R = 7A700FE51241B55172BBEA84C3911CB78C874F0C4A7CAD80AD9BBD5D297EF10BD7EEFE9E9A6BE4C553684845F241516B
26,255,863 UART: [art] SIG.S = 574C00B72770D8A4C666DC814EBA969DF869EACDA13EDF05BCFC10DC29E68B9A6ECFE3761BF6E77AEC3543B8606484AD
27,235,259 UART: Caliptra RT
27,235,979 UART: [state] CFI Enabled
27,353,593 UART: [rt] RT listening for mailbox commands...
27,503,887 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,533,942 UART: [rt]cmd =0x4c444556, len=4
27,545,231 >>> mbox cmd response data (687 bytes)
27,690,662 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,720,534 UART: [rt]cmd =0x43455246, len=4
27,733,308 >>> mbox cmd response data (887 bytes)
27,876,445 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,906,127 UART: [rt]cmd =0x43455252, len=4
27,917,435 >>> mbox cmd response data (782 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
7,936,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,021,891 >>> mbox cmd response: success
20,269,204 UART:
20,269,629 UART: Running Caliptra FMC ...
20,270,751 UART:
20,270,912 UART: [state] CFI Enabled
20,278,863 UART: [fht] FMC Alias Private Key: 7
22,036,156 UART: [art] Extend RT PCRs Done
22,037,368 UART: [art] Lock RT PCRs Done
22,038,943 UART: [art] Populate DV Done
22,044,457 UART: [fht] FMC Alias Private Key: 7
22,046,112 UART: [art] Derive CDI
22,046,925 UART: [art] Store in in slot 0x4
22,089,260 UART: [art] Derive Key Pair
22,090,301 UART: [art] Store priv key in slot 0x5
24,517,494 UART: [art] Derive Key Pair - Done
24,530,226 UART: [art] Signing Cert with AUTHO
24,531,520 UART: RITY.KEYID = 7
26,237,229 UART: [art] Erasing AUTHORITY.KEYID = 7
26,238,738 UART: [art] PUB.X = 66B233D78FC29E44A8571E0352434FF2C0640719D00EADC8F1238DEB85C0E598B20D0C210F815B1129F788B0408B7A32
26,245,999 UART: [art] PUB.Y = A828CED6EBFBEC31ACF4AAEE059708597D882E3450EF8BA1D32184573F9AAFFC6D840AEA82CBF9678CFFFE80BEE81A3C
26,253,308 UART: [art] SIG.R = 0B3A52C3646BA1EA9AD4E4378748066D7F8D84DD714A2EDC9AB02CA42B859BD1738453F8FD1F2F89C6D95DAB0560169B
26,260,722 UART: [art] SIG.S = 6CE6CCC9B7764FCBAD170F35365B81D614040E5C98DBE558158F491BAA85A656B343F1FE0A3105BA3A793629AF6E470B
27,239,782 UART: Caliptra RT
27,240,504 UART: [state] CFI Enabled
27,357,621 UART: [rt] RT listening for mailbox commands...
27,507,015 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,536,824 UART: [rt]cmd =0x4c444556, len=4
27,548,071 >>> mbox cmd response data (687 bytes)
27,692,891 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,723,030 UART: [rt]cmd =0x43455246, len=4
27,735,756 >>> mbox cmd response data (887 bytes)
27,878,450 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,908,486 UART: [rt]cmd =0x43455252, len=4
27,919,970 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
7,935,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,018,213 >>> mbox cmd response: success
20,262,405 UART:
20,262,790 UART: Running Caliptra FMC ...
20,263,932 UART:
20,264,094 UART: [state] CFI Enabled
20,272,209 UART: [fht] FMC Alias Private Key: 7
22,028,979 UART: [art] Extend RT PCRs Done
22,030,200 UART: [art] Lock RT PCRs Done
22,032,037 UART: [art] Populate DV Done
22,037,340 UART: [fht] FMC Alias Private Key: 7
22,038,994 UART: [art] Derive CDI
22,039,812 UART: [art] Store in in slot 0x4
22,082,462 UART: [art] Derive Key Pair
22,083,482 UART: [art] Store priv key in slot 0x5
24,510,495 UART: [art] Derive Key Pair - Done
24,523,375 UART: [art] Signing Cert with AUTHO
24,524,673 UART: RITY.KEYID = 7
26,230,347 UART: [art] Erasing AUTHORITY.KEYID = 7
26,231,852 UART: [art] PUB.X = CE9F8851318B161A5DFA9D438C9CBC4A7753DD2AA1D0718F8118480C8A18E0ECB5C5E2236204573B6DB2CE1CBFC5982B
26,239,117 UART: [art] PUB.Y = 39D32E71B866020A1CA1ADDBA085CE4A31CF04A5023C406E88DBF047D2ACF6CA662A7ACEEDEAB230C08246E4B13E2460
26,246,451 UART: [art] SIG.R = AB252445151A83E56D4782B3C250770DFCE13DE554ED779216AC260AE75691516B227779A0C36E3996BDB45522EE26AB
26,253,786 UART: [art] SIG.S = 263D974C52E417F347B6F7282797596DE074EC342C4BCF6AF0D5906F25F798625083826107848AADEBF0FA910A67282E
27,232,343 UART: Caliptra RT
27,233,035 UART: [state] CFI Enabled
27,350,256 UART: [rt] RT listening for mailbox commands...
27,499,949 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,530,202 UART: [rt]cmd =0x4c444556, len=4
27,541,124 >>> mbox cmd response data (687 bytes)
27,686,521 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,716,448 UART: [rt]cmd =0x43455246, len=4
27,729,272 >>> mbox cmd response data (887 bytes)
27,872,182 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,902,104 UART: [rt]cmd =0x43455252, len=4
27,913,327 >>> mbox cmd response data (783 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
7,944,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,035,947 >>> mbox cmd response: success
20,286,302 UART:
20,286,695 UART: Running Caliptra FMC ...
20,287,827 UART:
20,287,990 UART: [state] CFI Enabled
20,296,308 UART: [fht] FMC Alias Private Key: 7
22,053,567 UART: [art] Extend RT PCRs Done
22,054,788 UART: [art] Lock RT PCRs Done
22,056,329 UART: [art] Populate DV Done
22,061,580 UART: [fht] FMC Alias Private Key: 7
22,063,065 UART: [art] Derive CDI
22,063,833 UART: [art] Store in in slot 0x4
22,106,119 UART: [art] Derive Key Pair
22,107,157 UART: [art] Store priv key in slot 0x5
24,533,464 UART: [art] Derive Key Pair - Done
24,546,401 UART: [art] Signing Cert with AUTHO
24,547,705 UART: RITY.KEYID = 7
26,253,462 UART: [art] Erasing AUTHORITY.KEYID = 7
26,255,121 UART: [art] PUB.X = A09EA2C939A2F26CB723C013D4BAD54F485FF827CEA7C4EED47D2393F53D6936AD5C96899C11D32AE8225A099E19A07A
26,262,222 UART: [art] PUB.Y = 4EF6BC9CB872F7CD4092ED2AD0E32E5FC7BDFD668D905C4C22B8EFDFDF20D44F54A5FC64B44647DD17860F0460235A6C
26,269,526 UART: [art] SIG.R = 3190039379C9FAB5DDA35410EA39DCC1BF512D4EE31D4E75A0E9705B83FFB703CC8EB2EDF9E7032D8F8B28F509677A50
26,276,940 UART: [art] SIG.S = C7A7CA35EEAA217727B71237ED8BC384312F438E5035B5F6F4FB351522B91EEA03BA2EC622CF8FFB632BB343DD9A05AA
27,256,100 UART: Caliptra RT
27,256,818 UART: [state] CFI Enabled
27,374,204 UART: [rt] RT listening for mailbox commands...
27,524,025 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,553,996 UART: [rt]cmd =0x4c444556, len=4
27,565,041 >>> mbox cmd response data (687 bytes)
27,710,446 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,740,366 UART: [rt]cmd =0x43455246, len=4
27,752,976 >>> mbox cmd response data (887 bytes)
27,896,279 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,926,314 UART: [rt]cmd =0x43455252, len=4
27,937,773 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.24s
Truncated 7343978 bytes from beginning
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
7,997,167 UART: [idev] CSR uploaded
8,014,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,158,352 UART: [idev] --
8,158,991 UART: [ldev] ++
8,159,489 UART: [ldev] CDI.KEYID = 6
8,160,367 UART: [ldev] SUBJECT.KEYID = 5
8,161,445 UART: [ldev] AUTHORITY.KEYID = 7
8,162,633 UART: [ldev] FE.KEYID = 1
8,163,478 UART: [ldev] Erasing FE.KEYID = 1
10,567,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,304,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,320,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,336,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,352,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,373,984 UART: [ldev] --
12,379,034 UART: [fwproc] Wait for Commands...
12,380,702 UART: [fwproc] Recv command 0x46574c44
12,382,832 UART: [fwproc] Recv'd Img size: 114168 bytes
15,786,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,861,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,930,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,246,987 >>> mbox cmd response: success
16,251,344 UART: [afmc] ++
16,251,936 UART: [afmc] CDI.KEYID = 6
16,252,816 UART: [afmc] SUBJECT.KEYID = 7
16,254,030 UART: [afmc] AUTHORITY.KEYID = 5
18,788,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,514,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,516,913 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,532,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,548,825 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,564,686 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,587,265 UART: [afmc] --
20,590,535 UART: [cold-reset] --
20,593,584 UART: [state] Locking Datavault
20,597,156 UART: [state] Locking PCR0, PCR1 and PCR31
20,598,796 UART: [state] Locking ICCM
20,600,376 UART: [exit] Launching FMC @ 0x40000130
20,608,826 UART:
20,609,065 UART: Running Caliptra FMC ...
20,610,095 UART:
20,610,242 UART: [state] CFI Enabled
20,671,480 UART: [fht] FMC Alias Private Key: 7
22,435,266 UART: [art] Extend RT PCRs Done
22,436,489 UART: [art] Lock RT PCRs Done
22,438,165 UART: [art] Populate DV Done
22,443,707 UART: [fht] FMC Alias Private Key: 7
22,445,410 UART: [art] Derive CDI
22,446,225 UART: [art] Store in in slot 0x4
22,504,734 UART: [art] Derive Key Pair
22,505,775 UART: [art] Store priv key in slot 0x5
24,968,567 UART: [art] Derive Key Pair - Done
24,981,294 UART: [art] Signing Cert with AUTHO
24,982,591 UART: RITY.KEYID = 7
26,694,075 UART: [art] Erasing AUTHORITY.KEYID = 7
26,695,579 UART: [art] PUB.X = 37D09FB9CEC2ADCAF6C3A3F3F005FFEA8EB2E92DE5F8348D2363A5A5659A5203CF89F40CB62A4CBEE306026A30E09282
26,702,906 UART: [art] PUB.Y = 8AB6CA96C76F73B602C4DA6DD13497AB47798C56272F2EE2095E06CBDF9A17E96B4158CFA0684644CE7B52A249387077
26,710,153 UART: [art] SIG.R = F8E9EB374ADE333035F1F275737CF3015475F24EA88266DAAE60581E5DC05987F2A2BC97843E1F2D6B9B96C9478F4F4D
26,717,490 UART: [art] SIG.S = 2886A8C75F3E5D20C995060F0E35708DA9DF22B58DA100D36A1192A38801FEA80A7584709EBBD6E9C45A2FA3A3BA04BF
27,696,594 UART: Caliptra RT
27,697,312 UART: [state] CFI Enabled
27,861,423 UART: [rt] RT listening for mailbox commands...
28,012,805 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,042,907 UART: [rt]cmd =0x4c444556, len=4
28,053,928 >>> mbox cmd response data (687 bytes)
28,199,732 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,229,645 UART: [rt]cmd =0x43455246, len=4
28,242,227 >>> mbox cmd response data (887 bytes)
28,385,558 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,415,555 UART: [rt]cmd =0x43455252, len=4
28,426,716 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,224 UART:
192,602 UART: Running Caliptra ROM ...
193,772 UART:
193,927 UART: [state] CFI Enabled
264,144 UART: [state] LifecycleState = Unprovisioned
266,076 UART: [state] DebugLocked = No
268,274 UART: [state] WD Timer not started. Device not locked for debugging
271,200 UART: [kat] SHA2-256
450,339 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,911 UART: [kat] ++
462,457 UART: [kat] sha1
474,319 UART: [kat] SHA2-256
477,331 UART: [kat] SHA2-384
483,953 UART: [kat] SHA2-512-ACC
486,943 UART: [kat] ECC-384
2,946,060 UART: [kat] HMAC-384Kdf
2,970,025 UART: [kat] LMS
3,499,456 UART: [kat] --
3,504,381 UART: [cold-reset] ++
3,505,289 UART: [fht] FHT @ 0x50003400
3,515,894 UART: [idev] ++
3,516,490 UART: [idev] CDI.KEYID = 6
3,517,401 UART: [idev] SUBJECT.KEYID = 7
3,518,617 UART: [idev] UDS.KEYID = 0
3,541,233 UART: [idev] Erasing UDS.KEYID = 0
6,022,101 UART: [idev] Sha1 KeyId Algorithm
6,042,957 UART: [idev] CSR upload begun
6,047,670 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,778,365 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,794,481 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,810,424 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,826,273 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,850,106 UART: [idev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
7,994,560 UART: [idev] CSR uploaded
8,011,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,155,656 UART: [idev] --
8,156,295 UART: [ldev] ++
8,156,808 UART: [ldev] CDI.KEYID = 6
8,157,687 UART: [ldev] SUBJECT.KEYID = 5
8,158,799 UART: [ldev] AUTHORITY.KEYID = 7
8,159,995 UART: [ldev] FE.KEYID = 1
8,160,864 UART: [ldev] Erasing FE.KEYID = 1
10,562,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,299,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,315,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,331,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,347,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,368,680 UART: [ldev] --
12,372,917 UART: [fwproc] Wait for Commands...
12,374,359 UART: [fwproc] Recv command 0x46574c44
12,376,447 UART: [fwproc] Recv'd Img size: 114168 bytes
15,774,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,846,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,915,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,232,330 >>> mbox cmd response: success
16,236,685 UART: [afmc] ++
16,237,276 UART: [afmc] CDI.KEYID = 6
16,238,162 UART: [afmc] SUBJECT.KEYID = 7
16,239,375 UART: [afmc] AUTHORITY.KEYID = 5
18,767,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,489,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,491,736 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,507,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,523,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,539,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,562,392 UART: [afmc] --
20,566,845 UART: [cold-reset] --
20,570,648 UART: [state] Locking Datavault
20,573,356 UART: [state] Locking PCR0, PCR1 and PCR31
20,575,071 UART: [state] Locking ICCM
20,577,091 UART: [exit] Launching FMC @ 0x40000130
20,585,544 UART:
20,585,783 UART: Running Caliptra FMC ...
20,586,809 UART:
20,586,953 UART: [state] CFI Enabled
20,646,287 UART: [fht] FMC Alias Private Key: 7
22,410,533 UART: [art] Extend RT PCRs Done
22,411,751 UART: [art] Lock RT PCRs Done
22,413,448 UART: [art] Populate DV Done
22,418,864 UART: [fht] FMC Alias Private Key: 7
22,420,451 UART: [art] Derive CDI
22,421,192 UART: [art] Store in in slot 0x4
22,478,661 UART: [art] Derive Key Pair
22,479,693 UART: [art] Store priv key in slot 0x5
24,942,252 UART: [art] Derive Key Pair - Done
24,955,045 UART: [art] Signing Cert with AUTHO
24,956,360 UART: RITY.KEYID = 7
26,668,199 UART: [art] Erasing AUTHORITY.KEYID = 7
26,669,705 UART: [art] PUB.X = 54529D37351F4578C6B9EC21B95F50CA750DB14C97309FD14E6CE8D28EF859110F235B7840DCDD8B2D8F0599E2AF6B16
26,677,001 UART: [art] PUB.Y = A65B35701D6F83C9BCC8FDC314231F70911C9B46D953EBBADB3555F866FF2E1618765A5E5024FEB6BA6CDF0D5A02CF62
26,684,247 UART: [art] SIG.R = 7A389CB5A889EFAD3580B6C965C8688B6878669EAFE39161A442B0A89F706F75230E4846B304DEB83D0C4D54722162D2
26,691,646 UART: [art] SIG.S = 41D77289114779D25C36DD03FF82D920AF3B325D8020FFC6E77D7FDE79C4CB10C107DBE1E9CD171D55684C750CC872CB
27,669,863 UART: Caliptra RT
27,670,554 UART: [state] CFI Enabled
27,835,184 UART: [rt] RT listening for mailbox commands...
27,986,178 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,016,363 UART: [rt]cmd =0x4c444556, len=4
28,027,386 >>> mbox cmd response data (687 bytes)
28,173,051 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,203,007 UART: [rt]cmd =0x43455246, len=4
28,215,830 >>> mbox cmd response data (887 bytes)
28,359,077 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,388,938 UART: [rt]cmd =0x43455252, len=4
28,400,289 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.03s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
7,685,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,806,516 >>> mbox cmd response: success
20,092,056 UART:
20,092,459 UART: Running Caliptra FMC ...
20,093,657 UART:
20,093,833 UART: [state] CFI Enabled
20,159,934 UART: [fht] FMC Alias Private Key: 7
21,922,867 UART: [art] Extend RT PCRs Done
21,924,090 UART: [art] Lock RT PCRs Done
21,925,610 UART: [art] Populate DV Done
21,931,010 UART: [fht] FMC Alias Private Key: 7
21,932,459 UART: [art] Derive CDI
21,933,226 UART: [art] Store in in slot 0x4
21,992,645 UART: [art] Derive Key Pair
21,993,687 UART: [art] Store priv key in slot 0x5
24,456,604 UART: [art] Derive Key Pair - Done
24,469,788 UART: [art] Signing Cert with AUTHO
24,471,103 UART: RITY.KEYID = 7
26,182,354 UART: [art] Erasing AUTHORITY.KEYID = 7
26,183,835 UART: [art] PUB.X = CFC230B3355F4A60DF1D3CA13A4FA1E7C0E3FC251CD210DF5103BC068D7A7AFA82C9CFDCEFE72113F0D5E6F6CB347E36
26,191,182 UART: [art] PUB.Y = DCBC7C9D6D418EC72EF17F6FF5C6596DADF88BB96CD42C3078D39DB1FF1763B27316C3506AAF8ED8E092A3C202795C16
26,198,467 UART: [art] SIG.R = 8048F1156BD0039723CC6C59B4C29E861C0C8F484E790D25B31AE1C5FE09554899387DB289037B5A67FC496FC5384D33
26,205,835 UART: [art] SIG.S = 33D29FE5C57C80AB7DB31A8430A3DCFC425D1313EB6F86512961464F0460354CBBEDDB2E0DA80C691DE28CAE8CCAB9F9
27,184,914 UART: Caliptra RT
27,185,630 UART: [state] CFI Enabled
27,350,466 UART: [rt] RT listening for mailbox commands...
27,500,324 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,530,444 UART: [rt]cmd =0x4c444556, len=4
27,541,355 >>> mbox cmd response data (687 bytes)
27,686,924 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,716,933 UART: [rt]cmd =0x43455246, len=4
27,729,530 >>> mbox cmd response data (887 bytes)
27,873,337 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,903,290 UART: [rt]cmd =0x43455252, len=4
27,914,676 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
7,683,792 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,834,213 >>> mbox cmd response: success
20,132,091 UART:
20,132,531 UART: Running Caliptra FMC ...
20,133,660 UART:
20,133,831 UART: [state] CFI Enabled
20,200,514 UART: [fht] FMC Alias Private Key: 7
21,964,478 UART: [art] Extend RT PCRs Done
21,965,706 UART: [art] Lock RT PCRs Done
21,967,498 UART: [art] Populate DV Done
21,973,017 UART: [fht] FMC Alias Private Key: 7
21,974,679 UART: [art] Derive CDI
21,975,484 UART: [art] Store in in slot 0x4
22,033,455 UART: [art] Derive Key Pair
22,034,466 UART: [art] Store priv key in slot 0x5
24,497,753 UART: [art] Derive Key Pair - Done
24,510,492 UART: [art] Signing Cert with AUTHO
24,511,796 UART: RITY.KEYID = 7
26,223,067 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,583 UART: [art] PUB.X = 9EF5E11E2533164EF0FE4D54BDD3DE0BD8DBFD88CCF57E548EC2A136488D2DE64AAB15F7161AFA67481830A7928B5C6A
26,231,886 UART: [art] PUB.Y = CBDF5B640A7E7CC10E05462FDB65516D0D027EBEF49FF1BE41C34166CEE9DC637E47F275FBDA0AAA0294F4118E42C1ED
26,239,170 UART: [art] SIG.R = 729D890DEC009ED066CC741160F2460B68B503EE1485D41CD7294355226396D3EDEFF36AE17557EFA521F32935A7A571
26,246,510 UART: [art] SIG.S = 763CE233F0DD0B4AEF9B3EEF36F4069F854F5F043AD6227DA821A9A7359196C2BEF5F9FC25FA3BA758864759E2D5D60A
27,225,604 UART: Caliptra RT
27,226,294 UART: [state] CFI Enabled
27,390,969 UART: [rt] RT listening for mailbox commands...
27,540,974 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,571,045 UART: [rt]cmd =0x4c444556, len=4
27,582,153 >>> mbox cmd response data (687 bytes)
27,727,783 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,757,650 UART: [rt]cmd =0x43455246, len=4
27,770,446 >>> mbox cmd response data (887 bytes)
27,914,181 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,944,121 UART: [rt]cmd =0x43455252, len=4
27,955,692 >>> mbox cmd response data (782 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
7,665,138 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,784,413 >>> mbox cmd response: success
20,072,142 UART:
20,072,532 UART: Running Caliptra FMC ...
20,073,678 UART:
20,073,867 UART: [state] CFI Enabled
20,138,932 UART: [fht] FMC Alias Private Key: 7
21,903,378 UART: [art] Extend RT PCRs Done
21,904,591 UART: [art] Lock RT PCRs Done
21,906,046 UART: [art] Populate DV Done
21,911,591 UART: [fht] FMC Alias Private Key: 7
21,913,183 UART: [art] Derive CDI
21,913,998 UART: [art] Store in in slot 0x4
21,971,370 UART: [art] Derive Key Pair
21,972,413 UART: [art] Store priv key in slot 0x5
24,435,487 UART: [art] Derive Key Pair - Done
24,448,440 UART: [art] Signing Cert with AUTHO
24,449,757 UART: RITY.KEYID = 7
26,160,828 UART: [art] Erasing AUTHORITY.KEYID = 7
26,162,319 UART: [art] PUB.X = 2D4198E6AA4073A5B986B01F9D852C471696FD24D36C36827560AB3AEDA5E6DE5FBD58DE8A822C4D5AECE0B1A20689E6
26,169,615 UART: [art] PUB.Y = C275E7F097F910735141B099098B9BE46877D518B15DF31D3E430884AB6FE7CA96419C6D138ABBF3E2887B6DF8F48381
26,176,878 UART: [art] SIG.R = 9CBD5862AC84B244D667282A36AA1B14BD14EEA1EE8F6ABDA212D9C1ABB64C3ADAE051F6BE0D56DD18A664360B85646F
26,184,334 UART: [art] SIG.S = A4E66FAC9168A17EE155E36338FBAE0F47813022D03F671124FD458CA6DEF880940D4A097AD707CFE13E3499F2AE18C3
27,163,331 UART: Caliptra RT
27,164,037 UART: [state] CFI Enabled
27,328,616 UART: [rt] RT listening for mailbox commands...
27,478,102 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,507,989 UART: [rt]cmd =0x4c444556, len=4
27,518,944 >>> mbox cmd response data (687 bytes)
27,664,309 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,694,186 UART: [rt]cmd =0x43455246, len=4
27,706,692 >>> mbox cmd response data (887 bytes)
27,850,252 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,880,238 UART: [rt]cmd =0x43455252, len=4
27,891,557 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,867 writing to cptra_bootfsm_go
7,690,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,832,024 >>> mbox cmd response: success
20,115,448 UART:
20,115,832 UART: Running Caliptra FMC ...
20,116,935 UART:
20,117,085 UART: [state] CFI Enabled
20,180,940 UART: [fht] FMC Alias Private Key: 7
21,945,368 UART: [art] Extend RT PCRs Done
21,946,597 UART: [art] Lock RT PCRs Done
21,948,253 UART: [art] Populate DV Done
21,953,634 UART: [fht] FMC Alias Private Key: 7
21,955,186 UART: [art] Derive CDI
21,955,920 UART: [art] Store in in slot 0x4
22,013,242 UART: [art] Derive Key Pair
22,014,294 UART: [art] Store priv key in slot 0x5
24,476,984 UART: [art] Derive Key Pair - Done
24,489,997 UART: [art] Signing Cert with AUTHO
24,491,336 UART: RITY.KEYID = 7
26,202,631 UART: [art] Erasing AUTHORITY.KEYID = 7
26,204,146 UART: [art] PUB.X = 3919CB9C15F805AED6EDF09F88709D12C23BA0D482B551418F946858453B77CE527B96EEDA334023D1B3604975188A9F
26,211,404 UART: [art] PUB.Y = 7FC71EFCB11BEE9013A3DC413B2DC037A210C95773EF6DA2FECC102BFCDFB3606850973FCD041772DF64AFFC19AA6170
26,218,699 UART: [art] SIG.R = 74D4F2207E9145D8FDCC93374C6FDF7595DD601444549F863AAE55A55376E75208A6507C9001259AD5873343786A2CE3
26,226,084 UART: [art] SIG.S = A3D53A0C8B558067303287F34585D6D328A65A89949728C23B941E0F70AF26231000DEA161E064353CB384757CA1E61A
27,205,108 UART: Caliptra RT
27,205,799 UART: [state] CFI Enabled
27,370,020 UART: [rt] RT listening for mailbox commands...
27,519,457 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,549,458 UART: [rt]cmd =0x4c444556, len=4
27,560,558 >>> mbox cmd response data (687 bytes)
27,705,748 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,735,854 UART: [rt]cmd =0x43455246, len=4
27,748,462 >>> mbox cmd response data (887 bytes)
27,891,212 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,921,245 UART: [rt]cmd =0x43455252, len=4
27,932,609 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
7,689,215 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,832,027 >>> mbox cmd response: success
20,110,475 UART:
20,110,869 UART: Running Caliptra FMC ...
20,112,001 UART:
20,112,166 UART: [state] CFI Enabled
20,180,549 UART: [fht] FMC Alias Private Key: 7
21,944,927 UART: [art] Extend RT PCRs Done
21,946,134 UART: [art] Lock RT PCRs Done
21,947,859 UART: [art] Populate DV Done
21,953,229 UART: [fht] FMC Alias Private Key: 7
21,954,736 UART: [art] Derive CDI
21,955,475 UART: [art] Store in in slot 0x4
22,013,814 UART: [art] Derive Key Pair
22,014,855 UART: [art] Store priv key in slot 0x5
24,477,939 UART: [art] Derive Key Pair - Done
24,490,980 UART: [art] Signing Cert with AUTHO
24,492,315 UART: RITY.KEYID = 7
26,203,720 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,217 UART: [art] PUB.X = C97589232D4AE15B61ED6FE06C5A5DFD9BC0E14ABB2ECCDC2C76D0233100DE5F98C0A9A3EF8F98D793CC77295A12C30F
26,212,518 UART: [art] PUB.Y = CCBB3DFDC107B5CB78D55A201828CF08BBAAC8B773E8865AB61B35AF37F48D4C15CA6652AABAB164C96DA6240C773B0F
26,219,810 UART: [art] SIG.R = 23804F1BFCE2884784F9DC8FB312D827D561E157DB0EEE9808C347A94CCA4BD26B707200CFC46894956B343F89689C46
26,227,207 UART: [art] SIG.S = E1F4E780D0177F714CCFA388A43A148F0F0C4EA5974796C828412CE814964228F701054909D2042B2466D02A2B16251C
27,206,307 UART: Caliptra RT
27,207,023 UART: [state] CFI Enabled
27,373,563 UART: [rt] RT listening for mailbox commands...
27,523,501 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,553,643 UART: [rt]cmd =0x4c444556, len=4
27,564,899 >>> mbox cmd response data (687 bytes)
27,710,376 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,740,271 UART: [rt]cmd =0x43455246, len=4
27,752,837 >>> mbox cmd response data (887 bytes)
27,895,838 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,925,856 UART: [rt]cmd =0x43455252, len=4
27,937,389 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.66s
Truncated 7343978 bytes from beginning
4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,275,722 UART: [idev] CSR uploaded
8,293,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,436,511 UART: [idev] --
8,437,141 UART: [ldev] ++
8,437,635 UART: [ldev] CDI.KEYID = 6
8,438,508 UART: [ldev] SUBJECT.KEYID = 5
8,439,690 UART: [ldev] AUTHORITY.KEYID = 7
8,440,871 UART: [ldev] FE.KEYID = 1
8,441,742 UART: [ldev] Erasing FE.KEYID = 1
10,784,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,501,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,517,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,533,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,549,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,569,604 UART: [ldev] --
12,575,030 UART: [fwproc] Wait for Commands...
12,578,218 UART: [fwproc] Recv command 0x46574c44
12,580,279 UART: [fwproc] Recv'd Img size: 114168 bytes
15,990,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,063,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,131,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,449,934 >>> mbox cmd response: success
16,454,169 UART: [afmc] ++
16,454,751 UART: [afmc] CDI.KEYID = 6
16,455,656 UART: [afmc] SUBJECT.KEYID = 7
16,456,863 UART: [afmc] AUTHORITY.KEYID = 5
18,958,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,680,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,682,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,698,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,714,669 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,730,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,753,447 UART: [afmc] --
20,757,661 UART: [cold-reset] --
20,763,520 UART: [state] Locking Datavault
20,769,250 UART: [state] Locking PCR0, PCR1 and PCR31
20,770,948 UART: [state] Locking ICCM
20,772,555 UART: [exit] Launching FMC @ 0x40000130
20,780,952 UART:
20,781,191 UART: Running Caliptra FMC ...
20,782,287 UART:
20,782,443 UART: [state] CFI Enabled
20,790,754 UART: [fht] FMC Alias Private Key: 7
22,547,547 UART: [art] Extend RT PCRs Done
22,548,769 UART: [art] Lock RT PCRs Done
22,550,144 UART: [art] Populate DV Done
22,555,715 UART: [fht] FMC Alias Private Key: 7
22,557,355 UART: [art] Derive CDI
22,558,089 UART: [art] Store in in slot 0x4
22,600,805 UART: [art] Derive Key Pair
22,601,844 UART: [art] Store priv key in slot 0x5
25,029,017 UART: [art] Derive Key Pair - Done
25,042,179 UART: [art] Signing Cert with AUTHO
25,043,484 UART: RITY.KEYID = 7
26,749,226 UART: [art] Erasing AUTHORITY.KEYID = 7
26,750,737 UART: [art] PUB.X = 0BC43DCD0835F1270C51F917FDC0661705C7BE24E0A9FACA9EE23DC3D1FDEB691B51C498C276B5047D1B89DA53E5581D
26,758,049 UART: [art] PUB.Y = D965CA1277CDBC98390A6F751AAD10311F2E29B92948CEAED19080B3FADE9C9EC2E7BFC7FCE32EE376F9345E89375BA9
26,765,303 UART: [art] SIG.R = 1B47F975E7EA507572273868FB304E3D2397AC2D1F0B0FC99A1EB8852541C0C35F5AA68F4ACDBD5B13F35D2522EBF4BB
26,772,709 UART: [art] SIG.S = B4248078C55D3CED5E5D57298536658D09A85225843EFFB9D07C2A84C6FB7760A33913474BD5FDED55F50F7F616701A2
27,751,608 UART: Caliptra RT
27,752,325 UART: [state] CFI Enabled
27,868,641 UART: [rt] RT listening for mailbox commands...
28,019,243 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,049,269 UART: [rt]cmd =0x4c444556, len=4
28,060,177 >>> mbox cmd response data (687 bytes)
28,205,452 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,235,341 UART: [rt]cmd =0x43455246, len=4
28,247,959 >>> mbox cmd response data (887 bytes)
28,391,341 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,421,275 UART: [rt]cmd =0x43455252, len=4
28,432,647 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,321 UART:
192,708 UART: Running Caliptra ROM ...
193,802 UART:
603,475 UART: [state] CFI Enabled
615,416 UART: [state] LifecycleState = Unprovisioned
617,232 UART: [state] DebugLocked = No
619,175 UART: [state] WD Timer not started. Device not locked for debugging
622,239 UART: [kat] SHA2-256
801,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,893 UART: [kat] ++
813,425 UART: [kat] sha1
823,226 UART: [kat] SHA2-256
826,238 UART: [kat] SHA2-384
832,370 UART: [kat] SHA2-512-ACC
835,353 UART: [kat] ECC-384
3,276,698 UART: [kat] HMAC-384Kdf
3,289,286 UART: [kat] LMS
3,818,769 UART: [kat] --
3,823,753 UART: [cold-reset] ++
3,824,933 UART: [fht] FHT @ 0x50003400
3,835,154 UART: [idev] ++
3,835,721 UART: [idev] CDI.KEYID = 6
3,836,625 UART: [idev] SUBJECT.KEYID = 7
3,837,837 UART: [idev] UDS.KEYID = 0
3,855,872 UART: [idev] Erasing UDS.KEYID = 0
6,316,336 UART: [idev] Sha1 KeyId Algorithm
6,337,077 UART: [idev] CSR upload begun
6,341,768 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,058,905 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,074,997 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,090,916 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,106,766 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,130,572 UART: [idev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
8,275,167 UART: [idev] CSR uploaded
8,292,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,436,154 UART: [idev] --
8,436,803 UART: [ldev] ++
8,437,302 UART: [ldev] CDI.KEYID = 6
8,438,178 UART: [ldev] SUBJECT.KEYID = 5
8,439,363 UART: [ldev] AUTHORITY.KEYID = 7
8,440,568 UART: [ldev] FE.KEYID = 1
8,441,490 UART: [ldev] Erasing FE.KEYID = 1
10,786,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,503,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,519,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,535,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,551,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,572,400 UART: [ldev] --
12,577,297 UART: [fwproc] Wait for Commands...
12,580,260 UART: [fwproc] Recv command 0x46574c44
12,582,363 UART: [fwproc] Recv'd Img size: 114168 bytes
15,987,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,059,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,128,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,446,720 >>> mbox cmd response: success
16,451,285 UART: [afmc] ++
16,451,899 UART: [afmc] CDI.KEYID = 6
16,452,828 UART: [afmc] SUBJECT.KEYID = 7
16,453,984 UART: [afmc] AUTHORITY.KEYID = 5
18,953,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,672,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,674,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,690,653 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,706,658 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,722,520 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,745,544 UART: [afmc] --
20,750,173 UART: [cold-reset] --
20,754,792 UART: [state] Locking Datavault
20,760,145 UART: [state] Locking PCR0, PCR1 and PCR31
20,761,795 UART: [state] Locking ICCM
20,763,404 UART: [exit] Launching FMC @ 0x40000130
20,771,798 UART:
20,772,050 UART: Running Caliptra FMC ...
20,773,152 UART:
20,773,308 UART: [state] CFI Enabled
20,781,891 UART: [fht] FMC Alias Private Key: 7
22,538,552 UART: [art] Extend RT PCRs Done
22,539,772 UART: [art] Lock RT PCRs Done
22,541,328 UART: [art] Populate DV Done
22,546,798 UART: [fht] FMC Alias Private Key: 7
22,548,447 UART: [art] Derive CDI
22,549,257 UART: [art] Store in in slot 0x4
22,592,333 UART: [art] Derive Key Pair
22,593,371 UART: [art] Store priv key in slot 0x5
25,019,668 UART: [art] Derive Key Pair - Done
25,032,823 UART: [art] Signing Cert with AUTHO
25,034,117 UART: RITY.KEYID = 7
26,739,842 UART: [art] Erasing AUTHORITY.KEYID = 7
26,741,357 UART: [art] PUB.X = F842FCCD0A8D5E84E83D686F3635EC7037004EA3A18ACCC1442A0AC2D8B1BFB5E6CA04B08CBC48FB32E294FA405B0085
26,748,605 UART: [art] PUB.Y = BC58AFDFECE3C455C35E2362F3169D75D0367775D9E19CF8F738A76A947B6123A808C2D2F0E7AD68179194669FBC979C
26,755,857 UART: [art] SIG.R = 074D86BA42E07FBEB887B577898B900E3EFA3FE9136013D9EFB0C047AB84B551EB9B510C06CBE2DD7FED72005001B88F
26,763,208 UART: [art] SIG.S = 3FC49325E4318D771AFEA9D36A54E0C9BB7C4AEAFA44D2928046BF85C764DE71B1A6686890D56161F62D40F7F7CF0F3A
27,742,432 UART: Caliptra RT
27,743,132 UART: [state] CFI Enabled
27,859,933 UART: [rt] RT listening for mailbox commands...
28,010,797 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,040,837 UART: [rt]cmd =0x4c444556, len=4
28,052,077 >>> mbox cmd response data (687 bytes)
28,197,419 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,227,252 UART: [rt]cmd =0x43455246, len=4
28,239,973 >>> mbox cmd response data (887 bytes)
28,384,115 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,413,983 UART: [rt]cmd =0x43455252, len=4
28,425,374 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1536.20s
Truncated 2467978 bytes from beginning
573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
7,939,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,027,501 >>> mbox cmd response: success
20,273,737 UART:
20,274,130 UART: Running Caliptra FMC ...
20,275,245 UART:
20,275,400 UART: [state] CFI Enabled
20,283,024 UART: [fht] FMC Alias Private Key: 7
22,039,817 UART: [art] Extend RT PCRs Done
22,041,042 UART: [art] Lock RT PCRs Done
22,043,073 UART: [art] Populate DV Done
22,048,705 UART: [fht] FMC Alias Private Key: 7
22,050,362 UART: [art] Derive CDI
22,051,199 UART: [art] Store in in slot 0x4
22,093,961 UART: [art] Derive Key Pair
22,095,007 UART: [art] Store priv key in slot 0x5
24,521,786 UART: [art] Derive Key Pair - Done
24,534,848 UART: [art] Signing Cert with AUTHO
24,536,147 UART: RITY.KEYID = 7
26,241,643 UART: [art] Erasing AUTHORITY.KEYID = 7
26,243,156 UART: [art] PUB.X = D06C09533364CABB71576677EDBFEB063AE124CB4F69492913C624F17CF0A5C84790243E2C6D166146980CBC5F9DB468
26,250,404 UART: [art] PUB.Y = 6AE9CFD8DC89CF48D1BE567135DDF5E74E6D18E035DABD1504E9F2C4F3899BAAF4A27D86A2A20C9B7DD7C613B7042735
26,257,690 UART: [art] SIG.R = 9B5380B5AB90F4335E65F88CE929F29FF86F1A2B8B8182D1D26A013185585155CBF7C197042C420A0642F18219A13D2B
26,265,032 UART: [art] SIG.S = DFFD3AB2F9D88BBC95D61BDF7D0167FACFA28AC5E666549B510F8A2A87F52F1EA98953D7831AD445897CBDA32471DAEC
27,243,661 UART: Caliptra RT
27,244,375 UART: [state] CFI Enabled
27,362,588 UART: [rt] RT listening for mailbox commands...
27,512,407 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,542,122 UART: [rt]cmd =0x4c444556, len=4
27,553,030 >>> mbox cmd response data (687 bytes)
27,698,791 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,728,657 UART: [rt]cmd =0x43455246, len=4
27,741,367 >>> mbox cmd response data (887 bytes)
27,884,446 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,914,223 UART: [rt]cmd =0x43455252, len=4
27,925,645 >>> mbox cmd response data (784 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
7,950,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,026,048 >>> mbox cmd response: success
20,279,179 UART:
20,279,581 UART: Running Caliptra FMC ...
20,280,679 UART:
20,280,840 UART: [state] CFI Enabled
20,288,685 UART: [fht] FMC Alias Private Key: 7
22,045,332 UART: [art] Extend RT PCRs Done
22,046,563 UART: [art] Lock RT PCRs Done
22,048,597 UART: [art] Populate DV Done
22,054,003 UART: [fht] FMC Alias Private Key: 7
22,055,548 UART: [art] Derive CDI
22,056,279 UART: [art] Store in in slot 0x4
22,099,198 UART: [art] Derive Key Pair
22,100,239 UART: [art] Store priv key in slot 0x5
24,527,438 UART: [art] Derive Key Pair - Done
24,540,213 UART: [art] Signing Cert with AUTHO
24,541,519 UART: RITY.KEYID = 7
26,247,131 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,636 UART: [art] PUB.X = A6E8AEFCE5CE461CB1A3ECABB792061B46514A10350F24051A65AFCA5193FDE14D83F0DAC2F45ECFF8FF2E8F2AC9E43C
26,255,934 UART: [art] PUB.Y = 4D45B52F77E3A00CF55EDF4FA009EDB4A7C0589BC29BFCCCA2D1DE80ADADE6F64EF5EBF80148B12ACDEF2173E174A439
26,263,209 UART: [art] SIG.R = D5AA91C75B31856C38BABD0A6FE8C3D0ED8B16EB4F1E626F1495241654EF75F1C721E7D106ACB18F57899FDD0094D473
26,270,598 UART: [art] SIG.S = 4EBE2416518FD5C292F1D5C3F477446FBE1C2B40EBB1A44E15C98089AB80DED8156F9744B85009CFBFF9B717BFCF9AB2
27,249,154 UART: Caliptra RT
27,249,844 UART: [state] CFI Enabled
27,366,486 UART: [rt] RT listening for mailbox commands...
27,515,850 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,545,877 UART: [rt]cmd =0x4c444556, len=4
27,557,079 >>> mbox cmd response data (687 bytes)
27,702,466 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,732,451 UART: [rt]cmd =0x43455246, len=4
27,745,353 >>> mbox cmd response data (887 bytes)
27,888,930 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,918,920 UART: [rt]cmd =0x43455252, len=4
27,930,399 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
7,940,935 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,017,848 >>> mbox cmd response: success
20,262,331 UART:
20,262,724 UART: Running Caliptra FMC ...
20,263,838 UART:
20,263,986 UART: [state] CFI Enabled
20,272,212 UART: [fht] FMC Alias Private Key: 7
22,028,772 UART: [art] Extend RT PCRs Done
22,029,991 UART: [art] Lock RT PCRs Done
22,031,751 UART: [art] Populate DV Done
22,037,058 UART: [fht] FMC Alias Private Key: 7
22,038,655 UART: [art] Derive CDI
22,039,393 UART: [art] Store in in slot 0x4
22,081,927 UART: [art] Derive Key Pair
22,082,925 UART: [art] Store priv key in slot 0x5
24,509,496 UART: [art] Derive Key Pair - Done
24,522,288 UART: [art] Signing Cert with AUTHO
24,523,601 UART: RITY.KEYID = 7
26,229,163 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,675 UART: [art] PUB.X = 9937757CF0B75BD610406F85048034C67CCD89821B312F599744AECDCBC305C74F71F52069787C10F8D59B2204439F73
26,237,918 UART: [art] PUB.Y = B9D4C019650000A229732D54F62A2876C3221371BD2FEE65755AEAB7DB73B29D59843D301C883A2D1F213D3748219D12
26,245,101 UART: [art] SIG.R = 7EE0E879E1643F6318E5ADCF775DCDB6032DA9FE8304BFD482BFF584C8DC1764309B1CD0345C64F3FA4FE2259D2A78F9
26,252,545 UART: [art] SIG.S = F0B21BE1220CA49979CBE89009594027D39FA356F61617C9495B2E6D1A007FC6F8F49789CDB463496067A128EE606F15
27,231,958 UART: Caliptra RT
27,232,669 UART: [state] CFI Enabled
27,349,715 UART: [rt] RT listening for mailbox commands...
27,499,219 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,529,264 UART: [rt]cmd =0x4c444556, len=4
27,540,313 >>> mbox cmd response data (687 bytes)
27,685,057 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,714,915 UART: [rt]cmd =0x43455246, len=4
27,727,770 >>> mbox cmd response data (887 bytes)
27,870,644 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,900,732 UART: [rt]cmd =0x43455252, len=4
27,912,010 >>> mbox cmd response data (783 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
7,942,256 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,018,014 >>> mbox cmd response: success
20,265,388 UART:
20,265,770 UART: Running Caliptra FMC ...
20,266,901 UART:
20,267,066 UART: [state] CFI Enabled
20,274,962 UART: [fht] FMC Alias Private Key: 7
22,031,308 UART: [art] Extend RT PCRs Done
22,032,529 UART: [art] Lock RT PCRs Done
22,033,993 UART: [art] Populate DV Done
22,039,352 UART: [fht] FMC Alias Private Key: 7
22,041,108 UART: [art] Derive CDI
22,041,934 UART: [art] Store in in slot 0x4
22,084,333 UART: [art] Derive Key Pair
22,085,336 UART: [art] Store priv key in slot 0x5
24,512,297 UART: [art] Derive Key Pair - Done
24,524,856 UART: [art] Signing Cert with AUTHO
24,526,183 UART: RITY.KEYID = 7
26,231,439 UART: [art] Erasing AUTHORITY.KEYID = 7
26,232,941 UART: [art] PUB.X = 4CBF9D204F63D3B5D5DA63C9B1ED817616D021982D382A874600AAC3E2863BA2BA10C95B932AD2F47DEB90B2352B6034
26,240,181 UART: [art] PUB.Y = DDE7D2037A2A38030BBCD63A9F2EE018D7F856F16AFC47B34C20E23780CEB09A0243AD026D667B7CD7F3604D687D4808
26,247,459 UART: [art] SIG.R = 6BEE2356AF9FC1EC44279F3B7D7A8BC3DE28F5DD9AEE28B6CE2F789D686CE5CE4C432DBFBE363E79E83F76C6D4857C4F
26,254,903 UART: [art] SIG.S = 6AC8D9733C556A181D2556B01CD90F61F29AC7A365DD02D2AA9F2C8DD7FF2000F7127B73D9DD18745646F9B2E212CE88
27,233,819 UART: Caliptra RT
27,234,516 UART: [state] CFI Enabled
27,352,339 UART: [rt] RT listening for mailbox commands...
27,502,101 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,532,103 UART: [rt]cmd =0x4c444556, len=4
27,543,136 >>> mbox cmd response data (687 bytes)
27,688,687 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,718,376 UART: [rt]cmd =0x43455246, len=4
27,731,071 >>> mbox cmd response data (887 bytes)
27,874,043 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,903,959 UART: [rt]cmd =0x43455252, len=4
27,915,273 >>> mbox cmd response data (782 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,918 writing to cptra_bootfsm_go
7,939,977 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,019,543 >>> mbox cmd response: success
20,268,562 UART:
20,268,976 UART: Running Caliptra FMC ...
20,270,077 UART:
20,270,241 UART: [state] CFI Enabled
20,277,814 UART: [fht] FMC Alias Private Key: 7
22,034,349 UART: [art] Extend RT PCRs Done
22,035,614 UART: [art] Lock RT PCRs Done
22,036,999 UART: [art] Populate DV Done
22,042,484 UART: [fht] FMC Alias Private Key: 7
22,044,185 UART: [art] Derive CDI
22,044,923 UART: [art] Store in in slot 0x4
22,087,686 UART: [art] Derive Key Pair
22,088,731 UART: [art] Store priv key in slot 0x5
24,515,760 UART: [art] Derive Key Pair - Done
24,528,812 UART: [art] Signing Cert with AUTHO
24,530,110 UART: RITY.KEYID = 7
26,235,473 UART: [art] Erasing AUTHORITY.KEYID = 7
26,236,977 UART: [art] PUB.X = 9AA82064B2CD5CB70FA296F00161B7712F04A186D0C6301A369C86CBDB796669B8280EB8A88455046FB650AC77D4018E
26,244,219 UART: [art] PUB.Y = 41D07B8A75C971DEE13B864DDD83C623389CE613CB122C99B0BB86037CABB7451B7C37A05BE5FFFD6937E4103B7CBED4
26,251,521 UART: [art] SIG.R = 5D5C1317EE5D2C94B6FB2B4F42C07CE5D6CB12557D291CF0DA156303F91650F2D89DFCA5A047DE11A0363FD5F15DC1D5
26,258,908 UART: [art] SIG.S = 274C6E6F89A98B193BB8929AA8351AD3DB39A1B406825CF818EC02CE4934830C37211BBBE0494E7C8376DD7633ABB63F
27,238,289 UART: Caliptra RT
27,239,019 UART: [state] CFI Enabled
27,356,960 UART: [rt] RT listening for mailbox commands...
27,506,560 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,536,391 UART: [rt]cmd =0x4c444556, len=4
27,547,458 >>> mbox cmd response data (687 bytes)
27,692,771 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,722,651 UART: [rt]cmd =0x43455246, len=4
27,735,402 >>> mbox cmd response data (887 bytes)
27,878,725 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
27,908,743 UART: [rt]cmd =0x43455252, len=4
27,920,226 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1511.20s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,788 UART: [idev] CSR uploaded
1,299,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,002 UART: [idev] --
1,301,051 UART: [ldev] ++
1,301,219 UART: [ldev] CDI.KEYID = 6
1,301,583 UART: [ldev] SUBJECT.KEYID = 5
1,302,010 UART: [ldev] AUTHORITY.KEYID = 7
1,302,473 UART: [ldev] FE.KEYID = 1
1,307,835 UART: [ldev] Erasing FE.KEYID = 1
1,333,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,597 UART: [ldev] --
1,373,051 UART: [fwproc] Wait for Commands...
1,373,718 UART: [fwproc] Recv command 0x46574c44
1,374,451 UART: [fwproc] Recv'd Img size: 114168 bytes
2,670,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,861,992 >>> mbox cmd response: success
2,863,137 UART: [afmc] ++
2,863,305 UART: [afmc] CDI.KEYID = 6
2,863,668 UART: [afmc] SUBJECT.KEYID = 7
2,864,094 UART: [afmc] AUTHORITY.KEYID = 5
2,899,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,690 UART: [afmc] --
2,942,630 UART: [cold-reset] --
2,943,808 UART: [state] Locking Datavault
2,945,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,875 UART: [state] Locking ICCM
2,946,335 UART: [exit] Launching FMC @ 0x40000130
2,951,664 UART:
2,951,680 UART: Running Caliptra FMC ...
2,952,088 UART:
2,952,142 UART: [state] CFI Enabled
2,962,851 UART: [fht] FMC Alias Private Key: 7
3,071,116 UART: [art] Extend RT PCRs Done
3,071,544 UART: [art] Lock RT PCRs Done
3,073,160 UART: [art] Populate DV Done
3,081,237 UART: [fht] FMC Alias Private Key: 7
3,082,215 UART: [art] Derive CDI
3,082,495 UART: [art] Store in in slot 0x4
3,168,430 UART: [art] Derive Key Pair
3,168,790 UART: [art] Store priv key in slot 0x5
3,182,686 UART: [art] Derive Key Pair - Done
3,197,286 UART: [art] Signing Cert with AUTHO
3,197,766 UART: RITY.KEYID = 7
3,212,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,477 UART: [art] PUB.X = 5C5312E8AACA91E764C7E75927C633DC26C126501B721314B7530C0F2D39EC6A44BFAC7932EFD9018D76E880783A11BF
3,220,242 UART: [art] PUB.Y = BC47D4FB8A47478BAA097060626C9BA0B94DC0DDDA6EC0879A0E17F8E3E6B27040B827690FE2FE7F7094D200108582A4
3,227,169 UART: [art] SIG.R = 64FB1F09B287C3F4E3B215202BE37205F36B4A200D4CDC9D9596585A1A34EB019140303915335317C5C57F5795DD4DC4
3,233,923 UART: [art] SIG.S = 76F095676126E644A98D2D7324423A6D5583A580C6838691A090C19F87D5E04A9E821C1E32F4388A577D8FA3D56D60E1
3,257,622 UART: Caliptra RT
3,257,875 UART: [state] CFI Enabled
3,366,006 UART: [rt] RT listening for mailbox commands...
3,366,676 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,440 UART: [rt]cmd =0x4c444556, len=4
3,407,039 >>> mbox cmd response data (687 bytes)
3,407,040 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,395 UART: [rt]cmd =0x43455246, len=4
3,448,308 >>> mbox cmd response data (887 bytes)
3,448,309 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,700 UART: [rt]cmd =0x43455252, len=4
3,488,500 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
915,904 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,821 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,181,343 UART: [idev] Erasing UDS.KEYID = 0
1,198,053 UART: [idev] Sha1 KeyId Algorithm
1,206,611 UART: [idev] CSR upload begun
1,208,390 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,027 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,735 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,620 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,326 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,755 UART: [idev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
1,296,252 UART: [idev] CSR uploaded
1,299,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,466 UART: [idev] --
1,300,403 UART: [ldev] ++
1,300,571 UART: [ldev] CDI.KEYID = 6
1,300,935 UART: [ldev] SUBJECT.KEYID = 5
1,301,362 UART: [ldev] AUTHORITY.KEYID = 7
1,301,825 UART: [ldev] FE.KEYID = 1
1,306,921 UART: [ldev] Erasing FE.KEYID = 1
1,333,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,649 UART: [ldev] --
1,371,915 UART: [fwproc] Wait for Commands...
1,372,616 UART: [fwproc] Recv command 0x46574c44
1,373,349 UART: [fwproc] Recv'd Img size: 114168 bytes
2,669,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,277 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,725,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,861,058 >>> mbox cmd response: success
2,862,251 UART: [afmc] ++
2,862,419 UART: [afmc] CDI.KEYID = 6
2,862,782 UART: [afmc] SUBJECT.KEYID = 7
2,863,208 UART: [afmc] AUTHORITY.KEYID = 5
2,898,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,915,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,921,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,927,584 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,933,303 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,162 UART: [afmc] --
2,942,066 UART: [cold-reset] --
2,942,910 UART: [state] Locking Datavault
2,943,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,944,581 UART: [state] Locking ICCM
2,945,207 UART: [exit] Launching FMC @ 0x40000130
2,950,536 UART:
2,950,552 UART: Running Caliptra FMC ...
2,950,960 UART:
2,951,014 UART: [state] CFI Enabled
2,961,569 UART: [fht] FMC Alias Private Key: 7
3,069,110 UART: [art] Extend RT PCRs Done
3,069,538 UART: [art] Lock RT PCRs Done
3,071,362 UART: [art] Populate DV Done
3,079,477 UART: [fht] FMC Alias Private Key: 7
3,080,477 UART: [art] Derive CDI
3,080,757 UART: [art] Store in in slot 0x4
3,166,000 UART: [art] Derive Key Pair
3,166,360 UART: [art] Store priv key in slot 0x5
3,179,548 UART: [art] Derive Key Pair - Done
3,194,491 UART: [art] Signing Cert with AUTHO
3,194,971 UART: RITY.KEYID = 7
3,210,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,328 UART: [art] PUB.X = 5C86B2B72F0137B98A397A673A7EF7F5CE712E51EB0962B8AA2003048A232E3E4CB674D49A446CED7E16DDD91F2E5D98
3,218,096 UART: [art] PUB.Y = 0A338A88EDF1A84B8DCF15A2351A005F404AD44A290B6F073B5549B60B36C449A3EEB4AF5174EE5E5F742A8E16A59B53
3,225,022 UART: [art] SIG.R = E4989EA4D9C38D7104DFA48B4F44DC3CBCF094AEAC8B07FA95392B0ABFB858864C7DDEF473DAE5CB06070AFA4AE39469
3,231,800 UART: [art] SIG.S = D3BEB2A92C753FC0D90FD416F849D4BA91D5C366D2C98AC5FFDDD177D08F064DA96E6867B9EE7ABAE90151FE9F6A5720
3,255,684 UART: Caliptra RT
3,255,937 UART: [state] CFI Enabled
3,364,225 UART: [rt] RT listening for mailbox commands...
3,364,895 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,599 UART: [rt]cmd =0x4c444556, len=4
3,405,176 >>> mbox cmd response data (687 bytes)
3,405,177 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,506 UART: [rt]cmd =0x43455246, len=4
3,446,505 >>> mbox cmd response data (887 bytes)
3,446,506 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,969 UART: [rt]cmd =0x43455252, len=4
3,486,882 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 932.44s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,820,217 UART: [art] Lock RT PCRs Done
2,821,561 UART: [art] Populate DV Done
2,829,826 UART: [fht] FMC Alias Private Key: 7
2,830,956 UART: [art] Derive CDI
2,831,236 UART: [art] Store in in slot 0x4
2,917,089 UART: [art] Derive Key Pair
2,917,449 UART: [art] Store priv key in slot 0x5
2,930,985 UART: [art] Derive Key Pair - Done
2,945,965 UART: [art] Signing Cert with AUTHO
2,946,445 UART: RITY.KEYID = 7
2,961,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,310 UART: [art] PUB.X = 79E0B9FABDB1D00FCE131F9D3A8BDE09D1ABC7C94F9A0C9E28DA1C05C7124D55D16C8C1DAE73F59322DDCFDD941E79E5
2,969,098 UART: [art] PUB.Y = F2FCED9A659E1E39A469D220EBD81D961D431AC6E93C6B543E5A8F56434317A766208EC43A338B17B15FF15C884C6F60
2,976,054 UART: [art] SIG.R = CC751001A0DC8794BAFF134256C82ED21857FE4B60EA0D8E4568F560557F9CE3E9ACC8BA78AEB18431EC8D0970FF1A0B
2,982,828 UART: [art] SIG.S = 63F160D3B8A3236620CEEB64671024ECBB03FFA6FABED8A3969146BC7A4144EACA735BFE90B98C956FDC46CB9A9421A3
3,006,582 UART: Caliptra RT
3,006,835 UART: [state] CFI Enabled
3,114,162 UART: [rt] RT listening for mailbox commands...
3,114,832 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,806 UART: [rt]cmd =0x4c444556, len=4
3,155,175 >>> mbox cmd response data (687 bytes)
3,155,176 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,487 UART: [rt]cmd =0x43455246, len=4
3,196,424 >>> mbox cmd response data (887 bytes)
3,196,425 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,722 UART: [rt]cmd =0x43455252, len=4
3,236,554 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,985 >>> mbox cmd response: success
2,701,273 UART:
2,701,289 UART: Running Caliptra FMC ...
2,701,697 UART:
2,701,751 UART: [state] CFI Enabled
2,711,938 UART: [fht] FMC Alias Private Key: 7
2,820,015 UART: [art] Extend RT PCRs Done
2,820,443 UART: [art] Lock RT PCRs Done
2,821,757 UART: [art] Populate DV Done
2,829,844 UART: [fht] FMC Alias Private Key: 7
2,830,954 UART: [art] Derive CDI
2,831,234 UART: [art] Store in in slot 0x4
2,917,111 UART: [art] Derive Key Pair
2,917,471 UART: [art] Store priv key in slot 0x5
2,930,337 UART: [art] Derive Key Pair - Done
2,944,976 UART: [art] Signing Cert with AUTHO
2,945,456 UART: RITY.KEYID = 7
2,960,524 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,289 UART: [art] PUB.X = A28BCF498A615BEAEAF8D41E17C37AC5B423617E5598F4A5628B1227A522173429C436B740262294B780389F12691ACB
2,968,055 UART: [art] PUB.Y = 9BFDD82976CEC61430CE61C8CBD5CE73167AC403264F17224DB6B21A8F74410022C683F2600A237531C943B9E4DDA00B
2,974,978 UART: [art] SIG.R = 852410CC8E5F2FD396B5F8133328B02355A6B4AA819090FBF2882EF083F624CF52F854D1A56F409161173D0297227147
2,981,735 UART: [art] SIG.S = B24BEC02A02FB90231B0D34C52914A5092986745A1CA288F1636FF9A929A8C71A1D7B3ED6930EE0C832B3767B98036D4
3,005,923 UART: Caliptra RT
3,006,176 UART: [state] CFI Enabled
3,113,838 UART: [rt] RT listening for mailbox commands...
3,114,508 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,312 UART: [rt]cmd =0x4c444556, len=4
3,154,711 >>> mbox cmd response data (687 bytes)
3,154,712 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,101 UART: [rt]cmd =0x43455246, len=4
3,196,042 >>> mbox cmd response data (887 bytes)
3,196,043 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,170 UART: [rt]cmd =0x43455252, len=4
3,235,867 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,860 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,638,767 >>> mbox cmd response: success
2,700,597 UART:
2,700,613 UART: Running Caliptra FMC ...
2,701,021 UART:
2,701,075 UART: [state] CFI Enabled
2,711,378 UART: [fht] FMC Alias Private Key: 7
2,819,777 UART: [art] Extend RT PCRs Done
2,820,205 UART: [art] Lock RT PCRs Done
2,821,937 UART: [art] Populate DV Done
2,830,234 UART: [fht] FMC Alias Private Key: 7
2,831,372 UART: [art] Derive CDI
2,831,652 UART: [art] Store in in slot 0x4
2,917,151 UART: [art] Derive Key Pair
2,917,511 UART: [art] Store priv key in slot 0x5
2,930,757 UART: [art] Derive Key Pair - Done
2,945,337 UART: [art] Signing Cert with AUTHO
2,945,817 UART: RITY.KEYID = 7
2,961,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,072 UART: [art] PUB.X = F9C6621156E6C26047AF95521519F02F2BFC2B8607F0AC3CCCC892636D91F1D510D95FD78B018D58E7A1A0DDBBE3B9FB
2,968,850 UART: [art] PUB.Y = 2AE0B113F79589260EBC77F402F640A5F7B90DC67D1CF9FCA2C410CF4B26D69DCA1CB309194E31D5BB661B9BFEB338CA
2,975,808 UART: [art] SIG.R = D30907D1A0DA7F757D45C5AE0D5A22001BA721C676EAD0E639585B76718DD7F87BDFE4B68F6E25E5C52505390103855D
2,982,542 UART: [art] SIG.S = CBCDA0057A357888F4530ABC24A55372785D8FD092629F0A968B710414A1526631526AC0162A193D384EF16F38776A04
3,006,958 UART: Caliptra RT
3,007,211 UART: [state] CFI Enabled
3,114,953 UART: [rt] RT listening for mailbox commands...
3,115,623 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,403 UART: [rt]cmd =0x4c444556, len=4
3,155,932 >>> mbox cmd response data (687 bytes)
3,155,933 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,246 UART: [rt]cmd =0x43455246, len=4
3,197,153 >>> mbox cmd response data (887 bytes)
3,197,154 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,553 UART: [rt]cmd =0x43455252, len=4
3,237,302 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,706 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,771 >>> mbox cmd response: success
2,702,197 UART:
2,702,213 UART: Running Caliptra FMC ...
2,702,621 UART:
2,702,675 UART: [state] CFI Enabled
2,712,824 UART: [fht] FMC Alias Private Key: 7
2,820,677 UART: [art] Extend RT PCRs Done
2,821,105 UART: [art] Lock RT PCRs Done
2,822,625 UART: [art] Populate DV Done
2,830,804 UART: [fht] FMC Alias Private Key: 7
2,831,954 UART: [art] Derive CDI
2,832,234 UART: [art] Store in in slot 0x4
2,917,831 UART: [art] Derive Key Pair
2,918,191 UART: [art] Store priv key in slot 0x5
2,931,105 UART: [art] Derive Key Pair - Done
2,945,721 UART: [art] Signing Cert with AUTHO
2,946,201 UART: RITY.KEYID = 7
2,960,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,764 UART: [art] PUB.X = EE8B0FE4D0025568CC5E925FE63423CDDE74D191651D548554A04BC7E68F88A8B78F02A4185C6C2E724B3E34476F8E11
2,968,529 UART: [art] PUB.Y = 91A5A3E9A58D2B40B2111064AA7AFFE89533839DE76861D267FBA05A3F138C95586A0D5AD047663F90D0816DD28FF9D3
2,975,480 UART: [art] SIG.R = C3D2DDFF50EF430F6786A38362F281CB08612BB8D73F3A511C26A0A24FA64D2346277A2A01FD3C6E4C14E7B5987D4273
2,982,247 UART: [art] SIG.S = 63FF3FF5454C0E7EC9776A0A03DCD94535A5C88E17AF183A2039BC82B7021134E0A2EEDD5D37FB4A1606C43F4232FD96
3,005,983 UART: Caliptra RT
3,006,236 UART: [state] CFI Enabled
3,114,055 UART: [rt] RT listening for mailbox commands...
3,114,725 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,625 UART: [rt]cmd =0x4c444556, len=4
3,155,098 >>> mbox cmd response data (687 bytes)
3,155,099 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,808 UART: [rt]cmd =0x43455246, len=4
3,196,797 >>> mbox cmd response data (887 bytes)
3,196,798 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,337 UART: [rt]cmd =0x43455252, len=4
3,237,193 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,639 >>> mbox cmd response: success
2,701,949 UART:
2,701,965 UART: Running Caliptra FMC ...
2,702,373 UART:
2,702,427 UART: [state] CFI Enabled
2,712,534 UART: [fht] FMC Alias Private Key: 7
2,821,541 UART: [art] Extend RT PCRs Done
2,821,969 UART: [art] Lock RT PCRs Done
2,823,459 UART: [art] Populate DV Done
2,831,484 UART: [fht] FMC Alias Private Key: 7
2,832,426 UART: [art] Derive CDI
2,832,706 UART: [art] Store in in slot 0x4
2,918,133 UART: [art] Derive Key Pair
2,918,493 UART: [art] Store priv key in slot 0x5
2,931,579 UART: [art] Derive Key Pair - Done
2,946,682 UART: [art] Signing Cert with AUTHO
2,947,162 UART: RITY.KEYID = 7
2,962,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,179 UART: [art] PUB.X = 6987A928584818289102FF2B773DD9FD6D259E89975455004B473E796CBCC0F47984798C05EA42FE8E0B37E551D49174
2,969,908 UART: [art] PUB.Y = C6584FEFB7DF106ACAADBF5C06502C8A326A263500566616C66C9D4783CFA1CA7B0D8E2F8163A9F48BC8F5B94E534A00
2,976,822 UART: [art] SIG.R = 310BE2B31AD1EB5500B7708221B5CA666FC796965B7655E66C5821068405FE6C89E342E721968ABB527A641E2052AC54
2,983,555 UART: [art] SIG.S = 9BCDB800EB6C4E405B913C1D7255C5D103A0930285BB755B20DAAC7FE9F599F3B35D1E6F4AA964EF79F17B033E7B4E36
3,007,273 UART: Caliptra RT
3,007,526 UART: [state] CFI Enabled
3,115,057 UART: [rt] RT listening for mailbox commands...
3,115,727 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,379 UART: [rt]cmd =0x4c444556, len=4
3,155,898 >>> mbox cmd response data (687 bytes)
3,155,899 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,356 UART: [rt]cmd =0x43455246, len=4
3,197,445 >>> mbox cmd response data (887 bytes)
3,197,446 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,799 UART: [rt]cmd =0x43455252, len=4
3,237,605 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 896.34s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,643 UART: [idev] CSR uploaded
1,301,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,301,857 UART: [idev] --
1,303,016 UART: [ldev] ++
1,303,184 UART: [ldev] CDI.KEYID = 6
1,303,548 UART: [ldev] SUBJECT.KEYID = 5
1,303,975 UART: [ldev] AUTHORITY.KEYID = 7
1,304,438 UART: [ldev] FE.KEYID = 1
1,309,598 UART: [ldev] Erasing FE.KEYID = 1
1,335,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,582 UART: [ldev] --
1,374,956 UART: [fwproc] Wait for Commands...
1,375,547 UART: [fwproc] Recv command 0x46574c44
1,376,280 UART: [fwproc] Recv'd Img size: 114168 bytes
2,673,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,865,139 >>> mbox cmd response: success
2,866,356 UART: [afmc] ++
2,866,524 UART: [afmc] CDI.KEYID = 6
2,866,887 UART: [afmc] SUBJECT.KEYID = 7
2,867,313 UART: [afmc] AUTHORITY.KEYID = 5
2,903,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,697 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,426 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,938,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,809 UART: [afmc] --
2,946,859 UART: [cold-reset] --
2,947,941 UART: [state] Locking Datavault
2,949,172 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,776 UART: [state] Locking ICCM
2,950,312 UART: [exit] Launching FMC @ 0x40000130
2,955,641 UART:
2,955,657 UART: Running Caliptra FMC ...
2,956,065 UART:
2,956,208 UART: [state] CFI Enabled
2,967,003 UART: [fht] FMC Alias Private Key: 7
3,075,542 UART: [art] Extend RT PCRs Done
3,075,970 UART: [art] Lock RT PCRs Done
3,077,672 UART: [art] Populate DV Done
3,085,921 UART: [fht] FMC Alias Private Key: 7
3,086,947 UART: [art] Derive CDI
3,087,227 UART: [art] Store in in slot 0x4
3,172,768 UART: [art] Derive Key Pair
3,173,128 UART: [art] Store priv key in slot 0x5
3,186,418 UART: [art] Derive Key Pair - Done
3,201,525 UART: [art] Signing Cert with AUTHO
3,202,005 UART: RITY.KEYID = 7
3,217,343 UART: [art] Erasing AUTHORITY.KEYID = 7
3,218,108 UART: [art] PUB.X = 3A2B40EFA63AE63A6BA00E746C7AF5EC8F802B5C759A7B33615303D8A68DC3C6C46013E6045B8C7B762B1498C4759BA8
3,224,877 UART: [art] PUB.Y = EF2D73E0D45FF388949D67875897DBE750B9098CBC9CD67AF5603DC4E1BDA3984BF62396F84346D4200A2C28CB16929C
3,231,827 UART: [art] SIG.R = C290648772D5A49059D8FDC3B524B6F45F9024FD404117D7CDCC95A7B248C764D3BC968E01448D385C1EE40635C40E82
3,238,588 UART: [art] SIG.S = DEED388315DDA385D2DC47D2436646ABD6A8090D12A1B5448256846641E7E1168C2EE5EBEF4FF92042B78DFB6DEA8CED
3,262,099 UART: Caliptra RT
3,262,444 UART: [state] CFI Enabled
3,370,614 UART: [rt] RT listening for mailbox commands...
3,371,284 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,084 UART: [rt]cmd =0x4c444556, len=4
3,411,713 >>> mbox cmd response data (687 bytes)
3,411,714 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,941 UART: [rt]cmd =0x43455246, len=4
3,453,080 >>> mbox cmd response data (887 bytes)
3,453,081 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,410 UART: [rt]cmd =0x43455252, len=4
3,493,199 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,681 UART: [kat] SHA2-512-ACC
906,582 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,206,816 UART: [idev] CSR upload begun
1,208,595 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,404 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,112 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,997 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,703 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,132 UART: [idev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
1,296,629 UART: [idev] CSR uploaded
1,299,674 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,843 UART: [idev] --
1,300,910 UART: [ldev] ++
1,301,078 UART: [ldev] CDI.KEYID = 6
1,301,442 UART: [ldev] SUBJECT.KEYID = 5
1,301,869 UART: [ldev] AUTHORITY.KEYID = 7
1,302,332 UART: [ldev] FE.KEYID = 1
1,307,682 UART: [ldev] Erasing FE.KEYID = 1
1,333,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,268 UART: [ldev] --
1,372,778 UART: [fwproc] Wait for Commands...
1,373,537 UART: [fwproc] Recv command 0x46574c44
1,374,270 UART: [fwproc] Recv'd Img size: 114168 bytes
2,669,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,861,899 >>> mbox cmd response: success
2,862,962 UART: [afmc] ++
2,863,130 UART: [afmc] CDI.KEYID = 6
2,863,493 UART: [afmc] SUBJECT.KEYID = 7
2,863,919 UART: [afmc] AUTHORITY.KEYID = 5
2,899,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,915,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,149 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,933,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,941,781 UART: [afmc] --
2,942,851 UART: [cold-reset] --
2,943,731 UART: [state] Locking Datavault
2,944,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,430 UART: [state] Locking ICCM
2,945,970 UART: [exit] Launching FMC @ 0x40000130
2,951,299 UART:
2,951,315 UART: Running Caliptra FMC ...
2,951,723 UART:
2,951,866 UART: [state] CFI Enabled
2,962,427 UART: [fht] FMC Alias Private Key: 7
3,070,508 UART: [art] Extend RT PCRs Done
3,070,936 UART: [art] Lock RT PCRs Done
3,072,544 UART: [art] Populate DV Done
3,081,063 UART: [fht] FMC Alias Private Key: 7
3,082,191 UART: [art] Derive CDI
3,082,471 UART: [art] Store in in slot 0x4
3,168,492 UART: [art] Derive Key Pair
3,168,852 UART: [art] Store priv key in slot 0x5
3,182,426 UART: [art] Derive Key Pair - Done
3,196,788 UART: [art] Signing Cert with AUTHO
3,197,268 UART: RITY.KEYID = 7
3,212,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,141 UART: [art] PUB.X = E5B1A3EF68FF6289AB2E72C9E1C27FA8A3C6CD94589A506E346A3FC6ED544030396C610D700AE6050F407DFE19672A26
3,219,907 UART: [art] PUB.Y = C7A72DFDF6845014163B5EA805A191BA2A0EFFBABA4C72113DB79F52E6A70762F9151032144EA7AB9EF9E98D809B9DB9
3,226,862 UART: [art] SIG.R = 948D3321173B4F31AE292DE38F27D66AF43B4B4EE04800C6CC075E1DF08C5B7E3014FEBD4F20729663FB12661C26A5AE
3,233,615 UART: [art] SIG.S = E0837E08666B0DC21BF0138DEEC1F672B1B920F096EEEC9F3B9AB96B333BE9BB15CC29532B5895BD466B2E5D544DB2DF
3,257,232 UART: Caliptra RT
3,257,577 UART: [state] CFI Enabled
3,365,505 UART: [rt] RT listening for mailbox commands...
3,366,175 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,007 UART: [rt]cmd =0x4c444556, len=4
3,406,352 >>> mbox cmd response data (687 bytes)
3,406,353 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,476 UART: [rt]cmd =0x43455246, len=4
3,447,585 >>> mbox cmd response data (887 bytes)
3,447,586 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,477,101 UART: [rt]cmd =0x43455252, len=4
3,487,918 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 915.46s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,185 UART: [art] Lock RT PCRs Done
2,823,937 UART: [art] Populate DV Done
2,832,006 UART: [fht] FMC Alias Private Key: 7
2,833,174 UART: [art] Derive CDI
2,833,454 UART: [art] Store in in slot 0x4
2,919,425 UART: [art] Derive Key Pair
2,919,785 UART: [art] Store priv key in slot 0x5
2,933,037 UART: [art] Derive Key Pair - Done
2,947,948 UART: [art] Signing Cert with AUTHO
2,948,428 UART: RITY.KEYID = 7
2,963,464 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,229 UART: [art] PUB.X = 0B5871335C0B80CE89F19BB6B217084A62870AFEED4655DED4271E3891B149D7CA39F1812037690869DBEE5951144AC7
2,970,982 UART: [art] PUB.Y = 261604B27C07FD512C24E25391C2FC892DA7BB71B4220E768568CE856D7CF7C66BA108635BA90544065E5E8E4A176848
2,977,910 UART: [art] SIG.R = 32A2732157D12CEBEEF980380F16A086C193FCD101E4F97A57D557A1C50AB6A2B6BECCDCFDB3CA623D8E383A6E151790
2,984,687 UART: [art] SIG.S = C5E86F73368BCA894186D4A2B68307680BF4BF6F05F72E5D6866E209DE10E1959D2B5259D03557107AD4D4A0162AE7E5
3,009,008 UART: Caliptra RT
3,009,353 UART: [state] CFI Enabled
3,116,222 UART: [rt] RT listening for mailbox commands...
3,116,892 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,772 UART: [rt]cmd =0x4c444556, len=4
3,157,007 >>> mbox cmd response data (687 bytes)
3,157,008 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,667 UART: [rt]cmd =0x43455246, len=4
3,198,818 >>> mbox cmd response data (887 bytes)
3,198,819 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,208 UART: [rt]cmd =0x43455252, len=4
3,238,972 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,060 >>> mbox cmd response: success
2,700,718 UART:
2,700,734 UART: Running Caliptra FMC ...
2,701,142 UART:
2,701,285 UART: [state] CFI Enabled
2,711,600 UART: [fht] FMC Alias Private Key: 7
2,820,023 UART: [art] Extend RT PCRs Done
2,820,451 UART: [art] Lock RT PCRs Done
2,822,255 UART: [art] Populate DV Done
2,830,884 UART: [fht] FMC Alias Private Key: 7
2,831,908 UART: [art] Derive CDI
2,832,188 UART: [art] Store in in slot 0x4
2,917,883 UART: [art] Derive Key Pair
2,918,243 UART: [art] Store priv key in slot 0x5
2,931,783 UART: [art] Derive Key Pair - Done
2,946,668 UART: [art] Signing Cert with AUTHO
2,947,148 UART: RITY.KEYID = 7
2,961,910 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,675 UART: [art] PUB.X = AC176C90DECB98D446929161656E79476E3EB96F7B88869FB19908F9CACE95078A92B449E37D0287FE1EC6DFE05065ED
2,969,442 UART: [art] PUB.Y = FD120B0B5388152AD85F4CA0CD276850487B6CAA4738B94205B46CE3ECF2F2D49756517EA86A370967671BB60D2A1937
2,976,377 UART: [art] SIG.R = D406E05D48BCBB3008D7343487E0A4923BD3853F07E249C605546937815A29481BED7C04673815C87324E64D460E3238
2,983,115 UART: [art] SIG.S = 0D47CDE43081A5D44B8AE8F8116222EF79EB248BBF05BEBC0521C4077BF4F445A3E9FAE93CE515B7CA02724F2774C983
3,006,243 UART: Caliptra RT
3,006,588 UART: [state] CFI Enabled
3,114,729 UART: [rt] RT listening for mailbox commands...
3,115,399 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,053 UART: [rt]cmd =0x4c444556, len=4
3,155,402 >>> mbox cmd response data (687 bytes)
3,155,403 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,772 UART: [rt]cmd =0x43455246, len=4
3,196,925 >>> mbox cmd response data (887 bytes)
3,196,926 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,123 UART: [rt]cmd =0x43455252, len=4
3,237,033 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,802 >>> mbox cmd response: success
2,702,278 UART:
2,702,294 UART: Running Caliptra FMC ...
2,702,702 UART:
2,702,845 UART: [state] CFI Enabled
2,713,402 UART: [fht] FMC Alias Private Key: 7
2,821,299 UART: [art] Extend RT PCRs Done
2,821,727 UART: [art] Lock RT PCRs Done
2,822,867 UART: [art] Populate DV Done
2,830,852 UART: [fht] FMC Alias Private Key: 7
2,831,846 UART: [art] Derive CDI
2,832,126 UART: [art] Store in in slot 0x4
2,917,733 UART: [art] Derive Key Pair
2,918,093 UART: [art] Store priv key in slot 0x5
2,931,199 UART: [art] Derive Key Pair - Done
2,946,027 UART: [art] Signing Cert with AUTHO
2,946,507 UART: RITY.KEYID = 7
2,961,739 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,504 UART: [art] PUB.X = B837ECEB97FACE57C34C1BB22F30E14D1D2CE49995DAFB5CE3F9D3D003E4E6375EB8933CE897A23320E472FA36080E09
2,969,278 UART: [art] PUB.Y = A3DEA07723F57888756EB40D7BE3BF0B5FE8C4A1A32798B84C095D1FFF04D199E2B1BBDB94E4B796F2B158EF2647D00D
2,976,229 UART: [art] SIG.R = 6C843B7DB61BB6D1AC6E9E783600FA2A59D0F0B730A51D14CA4606F591EA6C11106208BC209FA997FD079B17D7ED80C4
2,982,978 UART: [art] SIG.S = EE1AFFC17758653BD211D523537A4BEC875E478E0AAE48F7A0A02A4D04734CC91FD4F06EBE7D2087F657F29FAFBF4739
3,006,455 UART: Caliptra RT
3,006,800 UART: [state] CFI Enabled
3,114,791 UART: [rt] RT listening for mailbox commands...
3,115,461 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,473 UART: [rt]cmd =0x4c444556, len=4
3,155,916 >>> mbox cmd response data (687 bytes)
3,155,917 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,182 UART: [rt]cmd =0x43455246, len=4
3,197,291 >>> mbox cmd response data (887 bytes)
3,197,292 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,499 UART: [rt]cmd =0x43455252, len=4
3,237,263 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,641,372 >>> mbox cmd response: success
2,703,666 UART:
2,703,682 UART: Running Caliptra FMC ...
2,704,090 UART:
2,704,233 UART: [state] CFI Enabled
2,714,792 UART: [fht] FMC Alias Private Key: 7
2,823,033 UART: [art] Extend RT PCRs Done
2,823,461 UART: [art] Lock RT PCRs Done
2,825,187 UART: [art] Populate DV Done
2,833,156 UART: [fht] FMC Alias Private Key: 7
2,834,290 UART: [art] Derive CDI
2,834,570 UART: [art] Store in in slot 0x4
2,919,999 UART: [art] Derive Key Pair
2,920,359 UART: [art] Store priv key in slot 0x5
2,933,753 UART: [art] Derive Key Pair - Done
2,948,432 UART: [art] Signing Cert with AUTHO
2,948,912 UART: RITY.KEYID = 7
2,964,026 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,791 UART: [art] PUB.X = 63C0F6BEE51DE6A945ECB2B99D33B4D095E14A8AB9B3983A0632D89E6D5969E993710EEF3B0F1EF35C98ED334DB16BBE
2,971,570 UART: [art] PUB.Y = B90AD3E9DE2BC22A921132FABE78BF9F534E4FEDED8FA2DF928965F78A17BACF7FC5EF8F739F755D0176530D1821C3C8
2,978,533 UART: [art] SIG.R = C31D2680A75079413BE3527A9A59F2A6828E538108C63EDA7FAE06C35A19A78AE616EBCD1F74D4FE4E708C1C1F575904
2,985,300 UART: [art] SIG.S = 3D5C34833796E4CCEBF5A5EA594EC4D77CB534884D2C3ECDD15A7865CE2CDFCCA42665FBB86ECFACDE823BEF62D22B19
3,008,633 UART: Caliptra RT
3,008,978 UART: [state] CFI Enabled
3,116,841 UART: [rt] RT listening for mailbox commands...
3,117,511 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,435 UART: [rt]cmd =0x4c444556, len=4
3,157,712 >>> mbox cmd response data (687 bytes)
3,157,713 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,316 UART: [rt]cmd =0x43455246, len=4
3,199,355 >>> mbox cmd response data (887 bytes)
3,199,356 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,723 UART: [rt]cmd =0x43455252, len=4
3,239,577 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,641,132 >>> mbox cmd response: success
2,703,964 UART:
2,703,980 UART: Running Caliptra FMC ...
2,704,388 UART:
2,704,531 UART: [state] CFI Enabled
2,715,012 UART: [fht] FMC Alias Private Key: 7
2,822,615 UART: [art] Extend RT PCRs Done
2,823,043 UART: [art] Lock RT PCRs Done
2,824,829 UART: [art] Populate DV Done
2,833,162 UART: [fht] FMC Alias Private Key: 7
2,834,148 UART: [art] Derive CDI
2,834,428 UART: [art] Store in in slot 0x4
2,920,141 UART: [art] Derive Key Pair
2,920,501 UART: [art] Store priv key in slot 0x5
2,933,679 UART: [art] Derive Key Pair - Done
2,948,335 UART: [art] Signing Cert with AUTHO
2,948,815 UART: RITY.KEYID = 7
2,963,879 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,644 UART: [art] PUB.X = EB8E2D09CF3A749E160E1ED9568C161039C5C3F8B2FFCE4C9F12CA35BBBA95A45FD6EF1C3BEE3622D02E99B710D7E023
2,971,430 UART: [art] PUB.Y = 04C8208EEECF080B0C37895A56CF3E31B34A993C1267F7CCD47AF1E8AB16F64E6B7517BFEE4737CEF8E77F8499DB74C1
2,978,384 UART: [art] SIG.R = 329C6490D801738EB25EE242B90B36CFA546AFE30BE8268652819299869E4BA2EE9377EAD5BD68E09715F5AF69269776
2,985,143 UART: [art] SIG.S = CC23F5DF0F75FEB892C8B585433318518F50C3206BBD6C3ECCDC06E188CA8048052ED6938CFC20F6CC6475C40C757D4F
3,008,624 UART: Caliptra RT
3,008,969 UART: [state] CFI Enabled
3,116,686 UART: [rt] RT listening for mailbox commands...
3,117,356 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,224 UART: [rt]cmd =0x4c444556, len=4
3,157,699 >>> mbox cmd response data (687 bytes)
3,157,700 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,133 UART: [rt]cmd =0x43455246, len=4
3,199,280 >>> mbox cmd response data (887 bytes)
3,199,281 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,490 UART: [rt]cmd =0x43455252, len=4
3,239,194 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 874.57s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,295,912 UART: [idev] CSR uploaded
1,298,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,126 UART: [idev] --
1,300,177 UART: [ldev] ++
1,300,345 UART: [ldev] CDI.KEYID = 6
1,300,709 UART: [ldev] SUBJECT.KEYID = 5
1,301,136 UART: [ldev] AUTHORITY.KEYID = 7
1,301,599 UART: [ldev] FE.KEYID = 1
1,306,955 UART: [ldev] Erasing FE.KEYID = 1
1,333,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,101 UART: [ldev] --
1,372,617 UART: [fwproc] Wait for Commands...
1,373,298 UART: [fwproc] Recv command 0x46574c44
1,374,031 UART: [fwproc] Recv'd Img size: 114168 bytes
2,670,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,153 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,861,926 >>> mbox cmd response: success
2,863,083 UART: [afmc] ++
2,863,251 UART: [afmc] CDI.KEYID = 6
2,863,614 UART: [afmc] SUBJECT.KEYID = 7
2,864,040 UART: [afmc] AUTHORITY.KEYID = 5
2,900,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,451 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,334 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,053 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,002 UART: [afmc] --
2,943,984 UART: [cold-reset] --
2,944,982 UART: [state] Locking Datavault
2,946,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,703 UART: [state] Locking ICCM
2,947,377 UART: [exit] Launching FMC @ 0x40000130
2,952,706 UART:
2,952,722 UART: Running Caliptra FMC ...
2,953,130 UART:
2,953,184 UART: [state] CFI Enabled
2,963,853 UART: [fht] FMC Alias Private Key: 7
3,070,938 UART: [art] Extend RT PCRs Done
3,071,366 UART: [art] Lock RT PCRs Done
3,073,076 UART: [art] Populate DV Done
3,081,079 UART: [fht] FMC Alias Private Key: 7
3,082,175 UART: [art] Derive CDI
3,082,455 UART: [art] Store in in slot 0x4
3,168,052 UART: [art] Derive Key Pair
3,168,412 UART: [art] Store priv key in slot 0x5
3,181,658 UART: [art] Derive Key Pair - Done
3,196,485 UART: [art] Signing Cert with AUTHO
3,196,965 UART: RITY.KEYID = 7
3,211,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,674 UART: [art] PUB.X = 15638565B2C3E28CBEDD36B2EA452223FDC217FDCA65A33569FC78ECD2C7198CC8E09328C4438CF724E6A2DD5C93755E
3,219,456 UART: [art] PUB.Y = 55982052DD8192012AF6E5A41D3C9EE662721B4E250794A3D988EEEA6207ECF64A7D54F21CED5DFDDBA1DF3CC8AE358E
3,226,415 UART: [art] SIG.R = E1B984BB882C8305E284CFD1967E4970330554BD0A16B73DD1731AC0B5F251E56069637E62DFAFB2A24CF22279BB07CB
3,233,179 UART: [art] SIG.S = D8AF065259640A1ACC0F9D58796081653E138A881982DBA0CF2B3F8D689EDAC5222BFD1AA4349F1B37EE878CFBA748FB
3,257,131 UART: Caliptra RT
3,257,384 UART: [state] CFI Enabled
3,365,266 UART: [rt] RT listening for mailbox commands...
3,365,936 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,862 UART: [rt]cmd =0x4c444556, len=4
3,406,373 >>> mbox cmd response data (687 bytes)
3,406,374 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,707 UART: [rt]cmd =0x43455246, len=4
3,447,670 >>> mbox cmd response data (887 bytes)
3,447,671 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,904 UART: [rt]cmd =0x43455252, len=4
3,487,581 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,823 UART: [kat] SHA2-256
901,763 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,253 UART: [idev] ++
1,173,421 UART: [idev] CDI.KEYID = 6
1,173,782 UART: [idev] SUBJECT.KEYID = 7
1,174,207 UART: [idev] UDS.KEYID = 0
1,182,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,267 UART: [idev] CSR upload begun
1,209,046 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,885 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,593 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,478 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,184 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,613 UART: [idev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
1,297,110 UART: [idev] CSR uploaded
1,300,155 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,324 UART: [idev] --
1,301,517 UART: [ldev] ++
1,301,685 UART: [ldev] CDI.KEYID = 6
1,302,049 UART: [ldev] SUBJECT.KEYID = 5
1,302,476 UART: [ldev] AUTHORITY.KEYID = 7
1,302,939 UART: [ldev] FE.KEYID = 1
1,308,245 UART: [ldev] Erasing FE.KEYID = 1
1,334,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,385 UART: [ldev] --
1,373,751 UART: [fwproc] Wait for Commands...
1,374,536 UART: [fwproc] Recv command 0x46574c44
1,375,269 UART: [fwproc] Recv'd Img size: 114168 bytes
2,671,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,697,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,727,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,862,936 >>> mbox cmd response: success
2,864,089 UART: [afmc] ++
2,864,257 UART: [afmc] CDI.KEYID = 6
2,864,620 UART: [afmc] SUBJECT.KEYID = 7
2,865,046 UART: [afmc] AUTHORITY.KEYID = 5
2,900,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,917,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,917,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,923,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,929,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,935,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,110 UART: [afmc] --
2,944,234 UART: [cold-reset] --
2,945,218 UART: [state] Locking Datavault
2,946,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,946,887 UART: [state] Locking ICCM
2,947,427 UART: [exit] Launching FMC @ 0x40000130
2,952,756 UART:
2,952,772 UART: Running Caliptra FMC ...
2,953,180 UART:
2,953,234 UART: [state] CFI Enabled
2,963,749 UART: [fht] FMC Alias Private Key: 7
3,070,726 UART: [art] Extend RT PCRs Done
3,071,154 UART: [art] Lock RT PCRs Done
3,072,616 UART: [art] Populate DV Done
3,080,763 UART: [fht] FMC Alias Private Key: 7
3,081,833 UART: [art] Derive CDI
3,082,113 UART: [art] Store in in slot 0x4
3,167,600 UART: [art] Derive Key Pair
3,167,960 UART: [art] Store priv key in slot 0x5
3,180,572 UART: [art] Derive Key Pair - Done
3,195,273 UART: [art] Signing Cert with AUTHO
3,195,753 UART: RITY.KEYID = 7
3,211,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,166 UART: [art] PUB.X = 51EA64ABCC7DC61E1FC261E72354E580A72C241A60C15B0FD67EA79A636B5ED57E4C4C4F6A303A6E4933872556BC585B
3,218,943 UART: [art] PUB.Y = CA943E2E09367AEB50F20EEAC5BD4874C4CB88A65752656E1338D84A1D93BAD6FB14F9A5D9F650055508185C35B36E14
3,225,887 UART: [art] SIG.R = 5DBA9F6D176BF7F136AD88A6FC02BDFC6B9032D08D1CDEB2684972659F49770793AE18135E54B82F07EC336B013F90C5
3,232,653 UART: [art] SIG.S = 0D594BBD63824514033A5C7C2B78A2886156D32E52ADB6E44E6D2E50DB711BEFF862430DD86A6566689C353BCBD694AD
3,256,895 UART: Caliptra RT
3,257,148 UART: [state] CFI Enabled
3,364,149 UART: [rt] RT listening for mailbox commands...
3,364,819 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,425 UART: [rt]cmd =0x4c444556, len=4
3,404,666 >>> mbox cmd response data (687 bytes)
3,404,667 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,012 UART: [rt]cmd =0x43455246, len=4
3,445,935 >>> mbox cmd response data (887 bytes)
3,445,936 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,419 UART: [rt]cmd =0x43455252, len=4
3,486,115 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 905.01s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,820,367 UART: [art] Lock RT PCRs Done
2,821,935 UART: [art] Populate DV Done
2,830,550 UART: [fht] FMC Alias Private Key: 7
2,831,524 UART: [art] Derive CDI
2,831,804 UART: [art] Store in in slot 0x4
2,917,661 UART: [art] Derive Key Pair
2,918,021 UART: [art] Store priv key in slot 0x5
2,930,873 UART: [art] Derive Key Pair - Done
2,945,352 UART: [art] Signing Cert with AUTHO
2,945,832 UART: RITY.KEYID = 7
2,961,358 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,123 UART: [art] PUB.X = 8C8CDA561B58B293F752B5AAD68B92D72E08DF5AAB88CAB805909D1E767481D4F818D4093893D4585779EBA46BBFC4F6
2,968,894 UART: [art] PUB.Y = 652D7D038F75B6EC0E59340206D354F8C59109AE6989FFA4663611CE969AB764A162A513168617412616046D9FA7C8EB
2,975,818 UART: [art] SIG.R = 79A10652CA912525159B9155962767AEC2B239B2726AD6037283E154BF8C85B59D92576042D15B9E376A2E6D19A06206
2,982,565 UART: [art] SIG.S = 81E5BF5AA9616BB38B2D0036A77CC851BE37E46B3A8124911FEDBC81043671CC4735B576742A5F54FE46B92364DE35EE
3,007,031 UART: Caliptra RT
3,007,284 UART: [state] CFI Enabled
3,115,717 UART: [rt] RT listening for mailbox commands...
3,116,387 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,823 UART: [rt]cmd =0x4c444556, len=4
3,156,326 >>> mbox cmd response data (687 bytes)
3,156,327 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,810 UART: [rt]cmd =0x43455246, len=4
3,197,881 >>> mbox cmd response data (887 bytes)
3,197,882 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,179 UART: [rt]cmd =0x43455252, len=4
3,237,965 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,212 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,638,937 >>> mbox cmd response: success
2,700,627 UART:
2,700,643 UART: Running Caliptra FMC ...
2,701,051 UART:
2,701,105 UART: [state] CFI Enabled
2,711,566 UART: [fht] FMC Alias Private Key: 7
2,819,863 UART: [art] Extend RT PCRs Done
2,820,291 UART: [art] Lock RT PCRs Done
2,822,003 UART: [art] Populate DV Done
2,830,062 UART: [fht] FMC Alias Private Key: 7
2,831,178 UART: [art] Derive CDI
2,831,458 UART: [art] Store in in slot 0x4
2,917,367 UART: [art] Derive Key Pair
2,917,727 UART: [art] Store priv key in slot 0x5
2,930,435 UART: [art] Derive Key Pair - Done
2,945,065 UART: [art] Signing Cert with AUTHO
2,945,545 UART: RITY.KEYID = 7
2,960,893 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,658 UART: [art] PUB.X = 00A3874A77038BC7F895E0F4385B620911ECFFD0BEAD6957FDAD1D3C8FC6F0FC7F2D1DF691390860F1F0A3C0AB6A9D0E
2,968,414 UART: [art] PUB.Y = 5D289484B62B0E735118E494CDC0972659D0DDE70399060AFE34635DD8336919996B8313BF017030EE5D33CBFBE07608
2,975,340 UART: [art] SIG.R = 528BDF3FFA54F2B2D1358E90BA8ABFB0172A215BBF09D1551EE729E02CA8F8AFB47911D54DEB0403BB69D7D93EEDC97C
2,982,125 UART: [art] SIG.S = 4D9FB7821A15791E7C1911741A799C554F6D232D51E028238E19B3AF530267C904A8F587ABC64B9135D191F997927EE3
3,005,646 UART: Caliptra RT
3,005,899 UART: [state] CFI Enabled
3,112,300 UART: [rt] RT listening for mailbox commands...
3,112,970 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,840 UART: [rt]cmd =0x4c444556, len=4
3,153,333 >>> mbox cmd response data (687 bytes)
3,153,334 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,771 UART: [rt]cmd =0x43455246, len=4
3,194,798 >>> mbox cmd response data (887 bytes)
3,194,799 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,184 UART: [rt]cmd =0x43455252, len=4
3,235,032 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,183 >>> mbox cmd response: success
2,700,793 UART:
2,700,809 UART: Running Caliptra FMC ...
2,701,217 UART:
2,701,271 UART: [state] CFI Enabled
2,711,666 UART: [fht] FMC Alias Private Key: 7
2,819,781 UART: [art] Extend RT PCRs Done
2,820,209 UART: [art] Lock RT PCRs Done
2,821,427 UART: [art] Populate DV Done
2,829,692 UART: [fht] FMC Alias Private Key: 7
2,830,730 UART: [art] Derive CDI
2,831,010 UART: [art] Store in in slot 0x4
2,916,269 UART: [art] Derive Key Pair
2,916,629 UART: [art] Store priv key in slot 0x5
2,930,021 UART: [art] Derive Key Pair - Done
2,944,896 UART: [art] Signing Cert with AUTHO
2,945,376 UART: RITY.KEYID = 7
2,960,438 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,203 UART: [art] PUB.X = DE28178D871CBCE8EC2AC072B76AD6EADF8F93483C3904B1FF1E7089787D57669AB14FCD80267504F51E0177CDA64DB4
2,967,976 UART: [art] PUB.Y = 8213E7472E0F5FAE875D8EC9D77D5F3161B37B755500FAA317C4E9B8AE0378894EBB3877C46BA2C1121EB38CEA896AB3
2,974,908 UART: [art] SIG.R = 5AA7ADB7DA7BB7F0DAAA151268C38BDF83F9E8A2BED7D1DDABDF8F53E080571B6FA93D3BF434441CC4F21DDDA9A27B37
2,981,712 UART: [art] SIG.S = 78ABE49E9B38A63110F172B1B4A266ED1C381D81724481C50F58F3BF6CF10F5EE9991603571520DF5BE82C2CAF988508
3,005,563 UART: Caliptra RT
3,005,816 UART: [state] CFI Enabled
3,113,843 UART: [rt] RT listening for mailbox commands...
3,114,513 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,285 UART: [rt]cmd =0x4c444556, len=4
3,154,638 >>> mbox cmd response data (687 bytes)
3,154,639 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,966 UART: [rt]cmd =0x43455246, len=4
3,196,025 >>> mbox cmd response data (887 bytes)
3,196,026 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,361 UART: [rt]cmd =0x43455252, len=4
3,236,095 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,638,195 >>> mbox cmd response: success
2,701,067 UART:
2,701,083 UART: Running Caliptra FMC ...
2,701,491 UART:
2,701,545 UART: [state] CFI Enabled
2,711,848 UART: [fht] FMC Alias Private Key: 7
2,819,591 UART: [art] Extend RT PCRs Done
2,820,019 UART: [art] Lock RT PCRs Done
2,821,347 UART: [art] Populate DV Done
2,829,668 UART: [fht] FMC Alias Private Key: 7
2,830,774 UART: [art] Derive CDI
2,831,054 UART: [art] Store in in slot 0x4
2,916,537 UART: [art] Derive Key Pair
2,916,897 UART: [art] Store priv key in slot 0x5
2,930,743 UART: [art] Derive Key Pair - Done
2,945,551 UART: [art] Signing Cert with AUTHO
2,946,031 UART: RITY.KEYID = 7
2,960,851 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,616 UART: [art] PUB.X = A4E0E2E634D9ECE73C7132CC74F67CE6C91B71AB0FD091B24552B3C53799099DCB044D4CD1735DF836DC0C156AAC9C6D
2,968,390 UART: [art] PUB.Y = EC212924FE3B8082B3E0214E3023072383AC5B6A475D07C2E6379F2736A7BA28F7A597646849BB24569E30CE58B7CB95
2,975,330 UART: [art] SIG.R = 58F967F96B72932CA70285CF21511CFDEA02486A90C0C971EE6DB5F59D8698E5123E7DAF0323307649A8AC05533A54D3
2,982,088 UART: [art] SIG.S = EF25A2EB274DE48E16C7B653B07C8C3775D01491A0B063ABC6BD7F6E2939E711F32C2CB01D49DCB2CD26D52C71468118
3,005,465 UART: Caliptra RT
3,005,718 UART: [state] CFI Enabled
3,113,345 UART: [rt] RT listening for mailbox commands...
3,114,015 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,967 UART: [rt]cmd =0x4c444556, len=4
3,154,402 >>> mbox cmd response data (687 bytes)
3,154,403 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,628 UART: [rt]cmd =0x43455246, len=4
3,195,739 >>> mbox cmd response data (887 bytes)
3,195,740 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,343 UART: [rt]cmd =0x43455252, len=4
3,236,197 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,930 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,879 >>> mbox cmd response: success
2,702,773 UART:
2,702,789 UART: Running Caliptra FMC ...
2,703,197 UART:
2,703,251 UART: [state] CFI Enabled
2,713,746 UART: [fht] FMC Alias Private Key: 7
2,821,509 UART: [art] Extend RT PCRs Done
2,821,937 UART: [art] Lock RT PCRs Done
2,823,289 UART: [art] Populate DV Done
2,831,376 UART: [fht] FMC Alias Private Key: 7
2,832,478 UART: [art] Derive CDI
2,832,758 UART: [art] Store in in slot 0x4
2,917,939 UART: [art] Derive Key Pair
2,918,299 UART: [art] Store priv key in slot 0x5
2,931,275 UART: [art] Derive Key Pair - Done
2,946,155 UART: [art] Signing Cert with AUTHO
2,946,635 UART: RITY.KEYID = 7
2,962,159 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,924 UART: [art] PUB.X = 6958B215EEEB65213BA194DE7B5D16F15FFCAB63B35530BB0E0E04D67A4A11AD8B24D1DA005C836220A928F38727E29C
2,969,673 UART: [art] PUB.Y = 426FE526E6D2030AF16199F50D9CC95D865AF942C40754EEB0E23C67C6DE913CDFF019EA27FC0C507F6FAF5492B8CACD
2,976,626 UART: [art] SIG.R = CDF041506B91C09DD5B8BE838458D30A89FCEDC37823D44647E16F0417D5B836065242A47A2315CBBBB31954D1F29D17
2,983,389 UART: [art] SIG.S = 239FBD6631C3731D8AF69E2203AB033392538119E84A7D2605B3E0C5C43AA123415C658F621CF890E6688317BCD1F4C2
3,007,435 UART: Caliptra RT
3,007,688 UART: [state] CFI Enabled
3,115,287 UART: [rt] RT listening for mailbox commands...
3,115,957 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,821 UART: [rt]cmd =0x4c444556, len=4
3,156,062 >>> mbox cmd response data (687 bytes)
3,156,063 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,610 UART: [rt]cmd =0x43455246, len=4
3,197,755 >>> mbox cmd response data (887 bytes)
3,197,756 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,137 UART: [rt]cmd =0x43455252, len=4
3,237,921 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 858.68s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,521 UART: [idev] CSR uploaded
1,301,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,301,735 UART: [idev] --
1,302,666 UART: [ldev] ++
1,302,834 UART: [ldev] CDI.KEYID = 6
1,303,198 UART: [ldev] SUBJECT.KEYID = 5
1,303,625 UART: [ldev] AUTHORITY.KEYID = 7
1,304,088 UART: [ldev] FE.KEYID = 1
1,308,952 UART: [ldev] Erasing FE.KEYID = 1
1,335,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,228 UART: [ldev] --
1,374,626 UART: [fwproc] Wait for Commands...
1,375,259 UART: [fwproc] Recv command 0x46574c44
1,375,992 UART: [fwproc] Recv'd Img size: 114168 bytes
2,672,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,864,841 >>> mbox cmd response: success
2,865,864 UART: [afmc] ++
2,866,032 UART: [afmc] CDI.KEYID = 6
2,866,395 UART: [afmc] SUBJECT.KEYID = 7
2,866,821 UART: [afmc] AUTHORITY.KEYID = 5
2,902,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,309 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,921 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,513 UART: [afmc] --
2,946,513 UART: [cold-reset] --
2,947,337 UART: [state] Locking Datavault
2,948,728 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,332 UART: [state] Locking ICCM
2,949,920 UART: [exit] Launching FMC @ 0x40000130
2,955,249 UART:
2,955,265 UART: Running Caliptra FMC ...
2,955,673 UART:
2,955,816 UART: [state] CFI Enabled
2,966,273 UART: [fht] FMC Alias Private Key: 7
3,073,674 UART: [art] Extend RT PCRs Done
3,074,102 UART: [art] Lock RT PCRs Done
3,075,830 UART: [art] Populate DV Done
3,083,831 UART: [fht] FMC Alias Private Key: 7
3,084,835 UART: [art] Derive CDI
3,085,115 UART: [art] Store in in slot 0x4
3,170,650 UART: [art] Derive Key Pair
3,171,010 UART: [art] Store priv key in slot 0x5
3,184,750 UART: [art] Derive Key Pair - Done
3,199,565 UART: [art] Signing Cert with AUTHO
3,200,045 UART: RITY.KEYID = 7
3,215,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,320 UART: [art] PUB.X = 50AFE61A2EFE984654F387D66D1F260FD29BA1380C66DE09D362C00A3ACD53288A39B1A7F3BA12724F963FA9F6480E2A
3,223,085 UART: [art] PUB.Y = A23E9DA2B8569709F1262FA901C5841A36E70BCD9F4876E37CC005741AA00290942A2AFD6F05A1ED6266E660960205C9
3,230,009 UART: [art] SIG.R = D3299D6F62F592D4739760B5CD31B28150B5AB464BA3A044331A1820FBCF2A7F116133D145672560B1946D80EFBF29E0
3,236,777 UART: [art] SIG.S = 633AEE9B8AD36A03862F99D4B55510FC137EF2DE5A0473436DBCC3DF147439D9BC00EAE777977BB8299B569244D656BE
3,261,070 UART: Caliptra RT
3,261,415 UART: [state] CFI Enabled
3,368,924 UART: [rt] RT listening for mailbox commands...
3,369,594 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,318 UART: [rt]cmd =0x4c444556, len=4
3,409,613 >>> mbox cmd response data (687 bytes)
3,409,614 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,911 UART: [rt]cmd =0x43455246, len=4
3,451,076 >>> mbox cmd response data (887 bytes)
3,451,077 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,480,318 UART: [rt]cmd =0x43455252, len=4
3,490,930 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,939 UART: [state] LifecycleState = Unprovisioned
85,594 UART: [state] DebugLocked = No
86,110 UART: [state] WD Timer not started. Device not locked for debugging
87,319 UART: [kat] SHA2-256
890,869 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,998 UART: [kat] ++
895,150 UART: [kat] sha1
899,368 UART: [kat] SHA2-256
901,308 UART: [kat] SHA2-384
903,893 UART: [kat] SHA2-512-ACC
905,794 UART: [kat] ECC-384
915,531 UART: [kat] HMAC-384Kdf
920,039 UART: [kat] LMS
1,168,351 UART: [kat] --
1,169,082 UART: [cold-reset] ++
1,169,418 UART: [fht] FHT @ 0x50003400
1,172,260 UART: [idev] ++
1,172,428 UART: [idev] CDI.KEYID = 6
1,172,789 UART: [idev] SUBJECT.KEYID = 7
1,173,214 UART: [idev] UDS.KEYID = 0
1,181,364 UART: [idev] Erasing UDS.KEYID = 0
1,198,274 UART: [idev] Sha1 KeyId Algorithm
1,206,400 UART: [idev] CSR upload begun
1,208,179 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,820 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,528 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,413 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,119 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,548 UART: [idev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
1,296,045 UART: [idev] CSR uploaded
1,299,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,259 UART: [idev] --
1,300,298 UART: [ldev] ++
1,300,466 UART: [ldev] CDI.KEYID = 6
1,300,830 UART: [ldev] SUBJECT.KEYID = 5
1,301,257 UART: [ldev] AUTHORITY.KEYID = 7
1,301,720 UART: [ldev] FE.KEYID = 1
1,306,834 UART: [ldev] Erasing FE.KEYID = 1
1,333,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,918 UART: [ldev] --
1,372,266 UART: [fwproc] Wait for Commands...
1,372,879 UART: [fwproc] Recv command 0x46574c44
1,373,612 UART: [fwproc] Recv'd Img size: 114168 bytes
2,669,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,696,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,726,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,861,685 >>> mbox cmd response: success
2,862,832 UART: [afmc] ++
2,863,000 UART: [afmc] CDI.KEYID = 6
2,863,363 UART: [afmc] SUBJECT.KEYID = 7
2,863,789 UART: [afmc] AUTHORITY.KEYID = 5
2,899,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,916,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,916,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,922,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,928,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,934,304 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,942,229 UART: [afmc] --
2,943,195 UART: [cold-reset] --
2,943,997 UART: [state] Locking Datavault
2,945,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,945,658 UART: [state] Locking ICCM
2,946,320 UART: [exit] Launching FMC @ 0x40000130
2,951,649 UART:
2,951,665 UART: Running Caliptra FMC ...
2,952,073 UART:
2,952,216 UART: [state] CFI Enabled
2,962,661 UART: [fht] FMC Alias Private Key: 7
3,070,442 UART: [art] Extend RT PCRs Done
3,070,870 UART: [art] Lock RT PCRs Done
3,072,586 UART: [art] Populate DV Done
3,080,899 UART: [fht] FMC Alias Private Key: 7
3,081,893 UART: [art] Derive CDI
3,082,173 UART: [art] Store in in slot 0x4
3,167,566 UART: [art] Derive Key Pair
3,167,926 UART: [art] Store priv key in slot 0x5
3,180,802 UART: [art] Derive Key Pair - Done
3,195,394 UART: [art] Signing Cert with AUTHO
3,195,874 UART: RITY.KEYID = 7
3,211,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,969 UART: [art] PUB.X = FCFBBBED857A6FA9AE7ABF127EE21FDA774EBF5A81BADA6B1602BE18DBCF4B4177D03ED0C646F44FBACFD6E2C11A6F0D
3,218,777 UART: [art] PUB.Y = 0FE1F308028E3176FF9EFA4AD87776DCEA0F646C261C9586DC90C97A1620A3546CCCB5E24565AA7C3EF11A152210E775
3,225,723 UART: [art] SIG.R = B9AAA3E1DC3CB3949C3DE55AD1B42F456E4FE9D351DA0D61A5A7227BE827DE78280A8904DB018548DBBD05ACB5BFDA99
3,232,502 UART: [art] SIG.S = 0E04A12B613E2FDB544EBEBFB80334D912C44891B0A92EDFA8575298E23B2290D22301730911C58DD5A164C2085C2AD3
3,256,309 UART: Caliptra RT
3,256,654 UART: [state] CFI Enabled
3,364,467 UART: [rt] RT listening for mailbox commands...
3,365,137 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,615 UART: [rt]cmd =0x4c444556, len=4
3,405,144 >>> mbox cmd response data (687 bytes)
3,405,145 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,392 UART: [rt]cmd =0x43455246, len=4
3,446,457 >>> mbox cmd response data (887 bytes)
3,446,458 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,621 UART: [rt]cmd =0x43455252, len=4
3,486,369 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 886.94s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,822,495 UART: [art] Lock RT PCRs Done
2,823,819 UART: [art] Populate DV Done
2,831,874 UART: [fht] FMC Alias Private Key: 7
2,832,958 UART: [art] Derive CDI
2,833,238 UART: [art] Store in in slot 0x4
2,919,055 UART: [art] Derive Key Pair
2,919,415 UART: [art] Store priv key in slot 0x5
2,933,395 UART: [art] Derive Key Pair - Done
2,948,378 UART: [art] Signing Cert with AUTHO
2,948,858 UART: RITY.KEYID = 7
2,964,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,979 UART: [art] PUB.X = 46DAE2088FB81A340401365453E14209B4F0C2C472931AFAC33ECE31E3BBCE30A089D681F89617AB571D343EBF788B73
2,971,741 UART: [art] PUB.Y = C0061A688098988E16B6E66CB003A8561EEECAC1A5EC01D82F6A6AA379AA22439942AC19C40D338862882FB99189ADC5
2,978,683 UART: [art] SIG.R = 4502647C8182AC2D02458DAF2CF5EEEFCE2082989ECBCC14FCB1084E80A87C4AC652D870753300806F0D6011C307C83E
2,985,422 UART: [art] SIG.S = D0053CA778B6888F9F20D79577FDAE461D12C43200AF36AD7C1AD18B21D5255DA41A5A6D45FF18633D0976E1FD47C571
3,009,319 UART: Caliptra RT
3,009,664 UART: [state] CFI Enabled
3,117,615 UART: [rt] RT listening for mailbox commands...
3,118,285 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,209 UART: [rt]cmd =0x4c444556, len=4
3,158,420 >>> mbox cmd response data (687 bytes)
3,158,421 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,782 UART: [rt]cmd =0x43455246, len=4
3,199,823 >>> mbox cmd response data (887 bytes)
3,199,824 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,081 UART: [rt]cmd =0x43455252, len=4
3,239,867 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,174 >>> mbox cmd response: success
2,702,634 UART:
2,702,650 UART: Running Caliptra FMC ...
2,703,058 UART:
2,703,201 UART: [state] CFI Enabled
2,713,742 UART: [fht] FMC Alias Private Key: 7
2,822,133 UART: [art] Extend RT PCRs Done
2,822,561 UART: [art] Lock RT PCRs Done
2,823,943 UART: [art] Populate DV Done
2,831,882 UART: [fht] FMC Alias Private Key: 7
2,832,858 UART: [art] Derive CDI
2,833,138 UART: [art] Store in in slot 0x4
2,918,809 UART: [art] Derive Key Pair
2,919,169 UART: [art] Store priv key in slot 0x5
2,933,005 UART: [art] Derive Key Pair - Done
2,947,804 UART: [art] Signing Cert with AUTHO
2,948,284 UART: RITY.KEYID = 7
2,963,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,583 UART: [art] PUB.X = B0366F8840685306C6F5A11A3373DC9823F5F570859864F9DE9BBAA119C0E91B07A92036525D8274E90F9A474E86B6A4
2,971,338 UART: [art] PUB.Y = 3FB2017B793381A01022DCEFCCD1CBE65C74219DB26AB108564CEE1C0C3F61060C4E9BA0CFF05AFFB69E55FB45C7BF66
2,978,295 UART: [art] SIG.R = DD4BE4DC7435284447F7C2E233500726401C349BE36A3DDA7FB26A9637C2FA184E8C44D199CD8E9A02BA4FA7C2DA1ABA
2,985,075 UART: [art] SIG.S = FCB1D7976BC524A65F6CDD6DF0B569DDF12E2C0D0796787AEDB0C81BAF2D3EE1814FB83EFF4ABAD9F76A8436D1F33201
3,008,653 UART: Caliptra RT
3,008,998 UART: [state] CFI Enabled
3,117,290 UART: [rt] RT listening for mailbox commands...
3,117,960 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,530 UART: [rt]cmd =0x4c444556, len=4
3,158,205 >>> mbox cmd response data (687 bytes)
3,158,206 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,417 UART: [rt]cmd =0x43455246, len=4
3,199,528 >>> mbox cmd response data (887 bytes)
3,199,529 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,680 UART: [rt]cmd =0x43455252, len=4
3,239,465 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,641,130 >>> mbox cmd response: success
2,704,494 UART:
2,704,510 UART: Running Caliptra FMC ...
2,704,918 UART:
2,705,061 UART: [state] CFI Enabled
2,715,710 UART: [fht] FMC Alias Private Key: 7
2,823,969 UART: [art] Extend RT PCRs Done
2,824,397 UART: [art] Lock RT PCRs Done
2,825,887 UART: [art] Populate DV Done
2,834,038 UART: [fht] FMC Alias Private Key: 7
2,835,216 UART: [art] Derive CDI
2,835,496 UART: [art] Store in in slot 0x4
2,920,917 UART: [art] Derive Key Pair
2,921,277 UART: [art] Store priv key in slot 0x5
2,934,197 UART: [art] Derive Key Pair - Done
2,949,077 UART: [art] Signing Cert with AUTHO
2,949,557 UART: RITY.KEYID = 7
2,964,419 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,184 UART: [art] PUB.X = FD414AB6FEDCE056DBCD4139B25E727C841F6143F6F915D7A9B518195DFE34028658F013BD1CAF100200658D51ED341B
2,971,934 UART: [art] PUB.Y = 88B49F392487F0A80F57CDDFFF219C85ACEAE34C062F564E9143D09EE9E0EBA389C1B66D6E420C59995562E76C7C459A
2,978,885 UART: [art] SIG.R = 956AC7A38C52A480BF8A5900C1FBB789394884ED2491DFB83AB06AE0E846A0D0A7069D758ED5508D0EDD0550EC03E816
2,985,629 UART: [art] SIG.S = F2F85FCDBA70FB9629B52BBF19BE87D54A977CDECF904EFF420CDAA6C54AAAFB299AA43439D6487A530D7D51570197FF
3,009,335 UART: Caliptra RT
3,009,680 UART: [state] CFI Enabled
3,117,564 UART: [rt] RT listening for mailbox commands...
3,118,234 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,010 UART: [rt]cmd =0x4c444556, len=4
3,158,605 >>> mbox cmd response data (687 bytes)
3,158,606 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,871 UART: [rt]cmd =0x43455246, len=4
3,199,808 >>> mbox cmd response data (887 bytes)
3,199,809 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,984 UART: [rt]cmd =0x43455252, len=4
3,239,849 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,461 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,640,384 >>> mbox cmd response: success
2,702,840 UART:
2,702,856 UART: Running Caliptra FMC ...
2,703,264 UART:
2,703,407 UART: [state] CFI Enabled
2,714,144 UART: [fht] FMC Alias Private Key: 7
2,821,949 UART: [art] Extend RT PCRs Done
2,822,377 UART: [art] Lock RT PCRs Done
2,823,969 UART: [art] Populate DV Done
2,832,068 UART: [fht] FMC Alias Private Key: 7
2,833,040 UART: [art] Derive CDI
2,833,320 UART: [art] Store in in slot 0x4
2,918,699 UART: [art] Derive Key Pair
2,919,059 UART: [art] Store priv key in slot 0x5
2,932,219 UART: [art] Derive Key Pair - Done
2,946,986 UART: [art] Signing Cert with AUTHO
2,947,466 UART: RITY.KEYID = 7
2,962,850 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,615 UART: [art] PUB.X = 55708B393C15D2284E9564CAB11A702A0787EFFAE78341B6E0008E0139072AF117EF2042D4BF6C673E52C896CD08959B
2,970,349 UART: [art] PUB.Y = A1BD353EB705EF5AAB876870F70C81D986C160C31B098123570767FC876B5BEE68667423313B3D8DA1209B317821B08D
2,977,283 UART: [art] SIG.R = EE57667FF15EFF8A2349263B663DF139E48BC12F625BD1F01038513474E4605A33E531EC063BCE7F2386B85D2E18FE9F
2,984,054 UART: [art] SIG.S = CA8E22A843C586CA7CB0F9681A63E4D527F8E88BB96654FC7D57D35AA77E051DC6709DD1F17B1390E9555844E62ADA58
3,007,916 UART: Caliptra RT
3,008,261 UART: [state] CFI Enabled
3,115,909 UART: [rt] RT listening for mailbox commands...
3,116,579 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,209 UART: [rt]cmd =0x4c444556, len=4
3,156,562 >>> mbox cmd response data (687 bytes)
3,156,563 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,126 UART: [rt]cmd =0x43455246, len=4
3,198,279 >>> mbox cmd response data (887 bytes)
3,198,280 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,449 UART: [rt]cmd =0x43455252, len=4
3,238,202 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,056 >>> mbox cmd response: success
2,701,424 UART:
2,701,440 UART: Running Caliptra FMC ...
2,701,848 UART:
2,701,991 UART: [state] CFI Enabled
2,712,482 UART: [fht] FMC Alias Private Key: 7
2,820,939 UART: [art] Extend RT PCRs Done
2,821,367 UART: [art] Lock RT PCRs Done
2,822,905 UART: [art] Populate DV Done
2,830,932 UART: [fht] FMC Alias Private Key: 7
2,831,930 UART: [art] Derive CDI
2,832,210 UART: [art] Store in in slot 0x4
2,917,923 UART: [art] Derive Key Pair
2,918,283 UART: [art] Store priv key in slot 0x5
2,931,719 UART: [art] Derive Key Pair - Done
2,946,355 UART: [art] Signing Cert with AUTHO
2,946,835 UART: RITY.KEYID = 7
2,962,087 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,852 UART: [art] PUB.X = 6718C1A4842FCFE6BA1F4B2ED54699C388F69EFDBB440652B4215A9C957E5319D4D6AA4BB7B2D306DFE433E87F1CD401
2,969,627 UART: [art] PUB.Y = BA64F8B41C5A73DEE399A0530E62855B274FC0E63CED4BD167B7F22D9E3B7F7651D164663719E1F57AF4933FAE5F66A4
2,976,584 UART: [art] SIG.R = 4191EF76AF4F5C53B77354DABB4EFA349377CCAC154B274AB20A2FA148DBF7BE5EA422DECA4C673EC74D9E3B3A879C87
2,983,375 UART: [art] SIG.S = 70889ABAA366980BF2E9CC7F4258A41FE75F6CBBD82C68B02F9E6125643BAA56F0B838CD4286B0D8468504005BCCB7AA
3,007,184 UART: Caliptra RT
3,007,529 UART: [state] CFI Enabled
3,115,202 UART: [rt] RT listening for mailbox commands...
3,115,872 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,572 UART: [rt]cmd =0x4c444556, len=4
3,156,133 >>> mbox cmd response data (687 bytes)
3,156,134 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,491 UART: [rt]cmd =0x43455246, len=4
3,197,502 >>> mbox cmd response data (887 bytes)
3,197,503 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,992 UART: [rt]cmd =0x43455252, len=4
3,237,818 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 856.76s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,296,010 UART: [idev] CSR uploaded
1,299,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,224 UART: [idev] --
1,300,381 UART: [ldev] ++
1,300,549 UART: [ldev] CDI.KEYID = 6
1,300,913 UART: [ldev] SUBJECT.KEYID = 5
1,301,340 UART: [ldev] AUTHORITY.KEYID = 7
1,301,803 UART: [ldev] FE.KEYID = 1
1,307,019 UART: [ldev] Erasing FE.KEYID = 1
1,332,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,531 UART: [ldev] --
1,371,855 UART: [fwproc] Wait for Commands...
1,372,428 UART: [fwproc] Recv command 0x46574c44
1,373,161 UART: [fwproc] Recv'd Img size: 114168 bytes
2,668,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,695,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,725,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,860,614 >>> mbox cmd response: success
2,861,787 UART: [afmc] ++
2,861,955 UART: [afmc] CDI.KEYID = 6
2,862,318 UART: [afmc] SUBJECT.KEYID = 7
2,862,744 UART: [afmc] AUTHORITY.KEYID = 5
2,898,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,914,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,915,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,921,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,926,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,932,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,940,320 UART: [afmc] --
2,941,376 UART: [cold-reset] --
2,942,112 UART: [state] Locking Datavault
2,943,399 UART: [state] Locking PCR0, PCR1 and PCR31
2,944,003 UART: [state] Locking ICCM
2,944,457 UART: [exit] Launching FMC @ 0x40000130
2,949,786 UART:
2,949,802 UART: Running Caliptra FMC ...
2,950,210 UART:
2,950,264 UART: [state] CFI Enabled
2,960,985 UART: [fht] FMC Alias Private Key: 7
3,069,806 UART: [art] Extend RT PCRs Done
3,070,234 UART: [art] Lock RT PCRs Done
3,071,842 UART: [art] Populate DV Done
3,080,327 UART: [fht] FMC Alias Private Key: 7
3,081,473 UART: [art] Derive CDI
3,081,753 UART: [art] Store in in slot 0x4
3,167,284 UART: [art] Derive Key Pair
3,167,644 UART: [art] Store priv key in slot 0x5
3,180,714 UART: [art] Derive Key Pair - Done
3,195,665 UART: [art] Signing Cert with AUTHO
3,196,145 UART: RITY.KEYID = 7
3,210,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,702 UART: [art] PUB.X = 1DCFD02B8260B0691691AB790F3A3CAA42A675F6D6AFD891F27A08D0AB88A1728A5E60FB9B11AC478B8D46F1AD69D089
3,218,480 UART: [art] PUB.Y = 1D2C5C249F0111193A0C9CCF76C40B07C0C0270604A4EC35B392385E2A2CBE6BF01B1E43A5335D146CCAA02049538B74
3,225,416 UART: [art] SIG.R = 3402DFE21CD2464F22E12BFC5C9FEC4DEEE60175656445E7AD2619A196D5FA28D77E49BE275D286429120724EBD5D632
3,232,183 UART: [art] SIG.S = 609E6E658BB681B3CA2B5BF8474E6AF675044EFB53A0F0B23AFBB4E5AE71CD5E16214E3C9C3B2895C29C0EACBB732F1F
3,256,096 UART: Caliptra RT
3,256,349 UART: [state] CFI Enabled
3,364,432 UART: [rt] RT listening for mailbox commands...
3,365,102 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,062 UART: [rt]cmd =0x4c444556, len=4
3,405,467 >>> mbox cmd response data (687 bytes)
3,405,468 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,027 UART: [rt]cmd =0x43455246, len=4
3,447,182 >>> mbox cmd response data (887 bytes)
3,447,183 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,476,680 UART: [rt]cmd =0x43455252, len=4
3,487,410 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,253 UART: [idev] ++
1,173,421 UART: [idev] CDI.KEYID = 6
1,173,782 UART: [idev] SUBJECT.KEYID = 7
1,174,207 UART: [idev] UDS.KEYID = 0
1,182,109 UART: [idev] Erasing UDS.KEYID = 0
1,199,681 UART: [idev] Sha1 KeyId Algorithm
1,208,167 UART: [idev] CSR upload begun
1,209,946 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,517 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,225 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,110 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,816 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,245 UART: [idev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
1,297,742 UART: [idev] CSR uploaded
1,300,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,956 UART: [idev] --
1,302,075 UART: [ldev] ++
1,302,243 UART: [ldev] CDI.KEYID = 6
1,302,607 UART: [ldev] SUBJECT.KEYID = 5
1,303,034 UART: [ldev] AUTHORITY.KEYID = 7
1,303,497 UART: [ldev] FE.KEYID = 1
1,308,821 UART: [ldev] Erasing FE.KEYID = 1
1,334,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,317 UART: [ldev] --
1,373,707 UART: [fwproc] Wait for Commands...
1,374,470 UART: [fwproc] Recv command 0x46574c44
1,375,203 UART: [fwproc] Recv'd Img size: 114168 bytes
2,672,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,864,230 >>> mbox cmd response: success
2,865,263 UART: [afmc] ++
2,865,431 UART: [afmc] CDI.KEYID = 6
2,865,794 UART: [afmc] SUBJECT.KEYID = 7
2,866,220 UART: [afmc] AUTHORITY.KEYID = 5
2,902,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,028 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,757 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,640 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,359 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,128 UART: [afmc] --
2,946,158 UART: [cold-reset] --
2,946,946 UART: [state] Locking Datavault
2,947,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,573 UART: [state] Locking ICCM
2,949,135 UART: [exit] Launching FMC @ 0x40000130
2,954,464 UART:
2,954,480 UART: Running Caliptra FMC ...
2,954,888 UART:
2,954,942 UART: [state] CFI Enabled
2,965,687 UART: [fht] FMC Alias Private Key: 7
3,072,652 UART: [art] Extend RT PCRs Done
3,073,080 UART: [art] Lock RT PCRs Done
3,074,792 UART: [art] Populate DV Done
3,082,923 UART: [fht] FMC Alias Private Key: 7
3,084,053 UART: [art] Derive CDI
3,084,333 UART: [art] Store in in slot 0x4
3,170,226 UART: [art] Derive Key Pair
3,170,586 UART: [art] Store priv key in slot 0x5
3,184,060 UART: [art] Derive Key Pair - Done
3,198,921 UART: [art] Signing Cert with AUTHO
3,199,401 UART: RITY.KEYID = 7
3,214,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,172 UART: [art] PUB.X = AABF69ABB62C6696B85CEA1FE2231202062497797DAF69EF1B16CC586BD27C62BE22BFD6ACED83E09FE36E0BEBB81F95
3,221,957 UART: [art] PUB.Y = B955328096AF645F37799A88E8C65E396B008F21F49A1A270AD190C2AEFB0242226985D8057205B9FA1F05B4007D627A
3,228,842 UART: [art] SIG.R = 0FBFC62241E479154F87FC68D19CDAEA9DB492431441B01D1A6E51B3545F3CFCF2C57F0E460669E0BF78D25BDADFDE11
3,235,621 UART: [art] SIG.S = 660973B26F2419403A1625E853704AAFDAD99651F4023A7452F1019145E93B7FE654097A29A539B80FFF42AFA406ECFC
3,259,372 UART: Caliptra RT
3,259,625 UART: [state] CFI Enabled
3,367,456 UART: [rt] RT listening for mailbox commands...
3,368,126 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,876 UART: [rt]cmd =0x4c444556, len=4
3,408,359 >>> mbox cmd response data (687 bytes)
3,408,360 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,585 UART: [rt]cmd =0x43455246, len=4
3,449,614 >>> mbox cmd response data (887 bytes)
3,449,615 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,994 UART: [rt]cmd =0x43455252, len=4
3,489,824 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 896.05s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,820,227 UART: [art] Lock RT PCRs Done
2,822,073 UART: [art] Populate DV Done
2,830,034 UART: [fht] FMC Alias Private Key: 7
2,830,968 UART: [art] Derive CDI
2,831,248 UART: [art] Store in in slot 0x4
2,917,343 UART: [art] Derive Key Pair
2,917,703 UART: [art] Store priv key in slot 0x5
2,930,727 UART: [art] Derive Key Pair - Done
2,945,496 UART: [art] Signing Cert with AUTHO
2,945,976 UART: RITY.KEYID = 7
2,961,194 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,959 UART: [art] PUB.X = 48C268252974665FD0C0396E31CC1EE085C130EE00CEE8E532374180E2D78C026AB4B703F6B51C8DE0EBA33AB7A8E7C2
2,968,709 UART: [art] PUB.Y = C28C56B72BE00FC6C0925355FBA056343B90C8957C0B130172440686CF327C3245EE51ED797189D76B1C26AC6C4F8C79
2,975,645 UART: [art] SIG.R = 62ACEE7A8DEC34B0DCE99C2F0406535C2268B2453D30A810737A43231542BFA3E927AF709940D1F1F2461628AE3F15A6
2,982,411 UART: [art] SIG.S = C50067555806C9716DA94EA01661C7BD97B7EDD78D0515F3E31768E9625ABEDA197870037EFA8D45464A50F7629F9A92
3,006,195 UART: Caliptra RT
3,006,448 UART: [state] CFI Enabled
3,114,481 UART: [rt] RT listening for mailbox commands...
3,115,151 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,081 UART: [rt]cmd =0x4c444556, len=4
3,155,388 >>> mbox cmd response data (687 bytes)
3,155,389 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,584 UART: [rt]cmd =0x43455246, len=4
3,196,571 >>> mbox cmd response data (887 bytes)
3,196,572 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,915 UART: [rt]cmd =0x43455252, len=4
3,236,855 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,640,043 >>> mbox cmd response: success
2,701,535 UART:
2,701,551 UART: Running Caliptra FMC ...
2,701,959 UART:
2,702,013 UART: [state] CFI Enabled
2,712,720 UART: [fht] FMC Alias Private Key: 7
2,820,285 UART: [art] Extend RT PCRs Done
2,820,713 UART: [art] Lock RT PCRs Done
2,822,313 UART: [art] Populate DV Done
2,830,568 UART: [fht] FMC Alias Private Key: 7
2,831,700 UART: [art] Derive CDI
2,831,980 UART: [art] Store in in slot 0x4
2,918,045 UART: [art] Derive Key Pair
2,918,405 UART: [art] Store priv key in slot 0x5
2,931,449 UART: [art] Derive Key Pair - Done
2,946,125 UART: [art] Signing Cert with AUTHO
2,946,605 UART: RITY.KEYID = 7
2,961,837 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,602 UART: [art] PUB.X = 815F2B2EACC1F27D5C7AC057AF0DA971147B5DF5F02EC0E2AB2E30EADC8A1CC017DB965A77FCA0F561665B6CF99AB583
2,969,395 UART: [art] PUB.Y = EECD791437C0031A68154BA7B1C1D042A05AE3F9FD3EC93CD35E1DC7A29B4F28A0C2BD3A6178EC57F00F8058FA0DB08B
2,976,356 UART: [art] SIG.R = 891E7126F6F968B6A6C0A53682229F1427E890A4B0A189E9AC399DF4ABBA4A0FFC93D1870B2EE39292FE0F0F541ACA93
2,983,124 UART: [art] SIG.S = 02F6FDBB6F4696C70FBBB98C4B9C8E452D0F87A45DDC2704671FBEB96C30CBA18C4FD2899C56A3EAB13F0C2DDDBF46D7
3,006,566 UART: Caliptra RT
3,006,819 UART: [state] CFI Enabled
3,114,848 UART: [rt] RT listening for mailbox commands...
3,115,518 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,548 UART: [rt]cmd =0x4c444556, len=4
3,155,899 >>> mbox cmd response data (687 bytes)
3,155,900 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,255 UART: [rt]cmd =0x43455246, len=4
3,197,340 >>> mbox cmd response data (887 bytes)
3,197,341 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,736 UART: [rt]cmd =0x43455252, len=4
3,237,582 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,217 >>> mbox cmd response: success
2,701,651 UART:
2,701,667 UART: Running Caliptra FMC ...
2,702,075 UART:
2,702,129 UART: [state] CFI Enabled
2,712,426 UART: [fht] FMC Alias Private Key: 7
2,820,109 UART: [art] Extend RT PCRs Done
2,820,537 UART: [art] Lock RT PCRs Done
2,822,125 UART: [art] Populate DV Done
2,830,352 UART: [fht] FMC Alias Private Key: 7
2,831,436 UART: [art] Derive CDI
2,831,716 UART: [art] Store in in slot 0x4
2,916,927 UART: [art] Derive Key Pair
2,917,287 UART: [art] Store priv key in slot 0x5
2,930,489 UART: [art] Derive Key Pair - Done
2,945,135 UART: [art] Signing Cert with AUTHO
2,945,615 UART: RITY.KEYID = 7
2,960,825 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,590 UART: [art] PUB.X = 7A9ECC07F6BCFE9989C89EFB399FD52B4D6F480F3A674A19569035CFB4EAAE2614D8C275279EBD056DF9F86937A97689
2,968,363 UART: [art] PUB.Y = 601EA8235010A88A77500E33A4E7E436FA36DD2F84021DA54663D5D7461601785A3FBE65F867554F12DF7CDA32983AB8
2,975,302 UART: [art] SIG.R = C20B2FC0FBE9F77E68EF6BB2BBC1F08B13C4CB9A94462C4191A6895B01F264452C5FC41FF6A90CBB8C0077A52F86FC74
2,982,059 UART: [art] SIG.S = 1736674FB1C2351099E452A503A934D1CAF728807941065561A895E36EC18CB4E28BC905CDE8D185DC394B719CF905B8
3,005,156 UART: Caliptra RT
3,005,409 UART: [state] CFI Enabled
3,112,456 UART: [rt] RT listening for mailbox commands...
3,113,126 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,712 UART: [rt]cmd =0x4c444556, len=4
3,153,215 >>> mbox cmd response data (687 bytes)
3,153,216 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,675 UART: [rt]cmd =0x43455246, len=4
3,194,772 >>> mbox cmd response data (887 bytes)
3,194,773 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,110 UART: [rt]cmd =0x43455252, len=4
3,234,934 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,640,575 >>> mbox cmd response: success
2,702,405 UART:
2,702,421 UART: Running Caliptra FMC ...
2,702,829 UART:
2,702,883 UART: [state] CFI Enabled
2,713,484 UART: [fht] FMC Alias Private Key: 7
2,821,751 UART: [art] Extend RT PCRs Done
2,822,179 UART: [art] Lock RT PCRs Done
2,823,289 UART: [art] Populate DV Done
2,831,662 UART: [fht] FMC Alias Private Key: 7
2,832,756 UART: [art] Derive CDI
2,833,036 UART: [art] Store in in slot 0x4
2,918,517 UART: [art] Derive Key Pair
2,918,877 UART: [art] Store priv key in slot 0x5
2,931,971 UART: [art] Derive Key Pair - Done
2,946,556 UART: [art] Signing Cert with AUTHO
2,947,036 UART: RITY.KEYID = 7
2,961,718 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,483 UART: [art] PUB.X = 023C8E9E28EE8E4F76B6A6052B27E160D9C2A7A8D52D326B558555CC0CFB4976B3705827C6879FCEBA9F0C3E88E75700
2,969,225 UART: [art] PUB.Y = 3ADDDB03AFCDF17B04999839ACC920D4B553C3A514302C2E482D602E9238D19CDF02BF24532AADA66D729393DA5B58D0
2,976,178 UART: [art] SIG.R = A6040F849B711AA9F1CF9F6E5A5F0B624325294A1A9E34CE79DE37CFA83C49BF982FCAF60761EA24307451033E94A18A
2,982,941 UART: [art] SIG.S = 28C0D9F2E38C3D1DBCDF7A400216C4EF0E92D9EF04B973FC2A437FE21F4F3170231CB6975A1B49E19B9109D5D8DCA652
3,007,332 UART: Caliptra RT
3,007,585 UART: [state] CFI Enabled
3,114,890 UART: [rt] RT listening for mailbox commands...
3,115,560 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,496 UART: [rt]cmd =0x4c444556, len=4
3,155,885 >>> mbox cmd response data (687 bytes)
3,155,886 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,003 UART: [rt]cmd =0x43455246, len=4
3,196,988 >>> mbox cmd response data (887 bytes)
3,196,989 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,490 UART: [rt]cmd =0x43455252, len=4
3,237,276 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,499 >>> mbox cmd response: success
2,702,207 UART:
2,702,223 UART: Running Caliptra FMC ...
2,702,631 UART:
2,702,685 UART: [state] CFI Enabled
2,713,040 UART: [fht] FMC Alias Private Key: 7
2,821,427 UART: [art] Extend RT PCRs Done
2,821,855 UART: [art] Lock RT PCRs Done
2,823,309 UART: [art] Populate DV Done
2,831,754 UART: [fht] FMC Alias Private Key: 7
2,832,736 UART: [art] Derive CDI
2,833,016 UART: [art] Store in in slot 0x4
2,918,493 UART: [art] Derive Key Pair
2,918,853 UART: [art] Store priv key in slot 0x5
2,932,001 UART: [art] Derive Key Pair - Done
2,946,662 UART: [art] Signing Cert with AUTHO
2,947,142 UART: RITY.KEYID = 7
2,962,374 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,139 UART: [art] PUB.X = ABBAD8C20911012B8FA5ECB9E11BAB3BF612D1A5FDD4F7C77A99AAAFB2A46892C8A41E95189AE7A9C74E29729D66BF21
2,969,927 UART: [art] PUB.Y = EA88843019FCD4CBDD49632FB4FDCAB4CE1EC87AC53C3DD926E4F44591587164FD1D8EA9B0D6FED34CF0954BDCEC625C
2,976,905 UART: [art] SIG.R = C8FEDB212DEFC6C8992A42EBE2467805499FCD02EBEF2EA065C450D3D1CF7D47A2C4E1EB2E51F05A7CC5DD86523D2BB3
2,983,695 UART: [art] SIG.S = 5734F230AF912C9CA42816A332AE3F6CCB0B816EDFD75B12CDA2526DAEBA38483F7394F9F82C37B4FD4FDE627EA8C482
3,007,227 UART: Caliptra RT
3,007,480 UART: [state] CFI Enabled
3,114,663 UART: [rt] RT listening for mailbox commands...
3,115,333 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,017 UART: [rt]cmd =0x4c444556, len=4
3,155,488 >>> mbox cmd response data (687 bytes)
3,155,489 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,728 UART: [rt]cmd =0x43455246, len=4
3,196,829 >>> mbox cmd response data (887 bytes)
3,196,830 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,179 UART: [rt]cmd =0x43455252, len=4
3,237,093 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 860.39s
Truncated 7443977 bytes from beginning
00000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,893 UART: [idev] CSR uploaded
1,301,938 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,302,107 UART: [idev] --
1,303,334 UART: [ldev] ++
1,303,502 UART: [ldev] CDI.KEYID = 6
1,303,866 UART: [ldev] SUBJECT.KEYID = 5
1,304,293 UART: [ldev] AUTHORITY.KEYID = 7
1,304,756 UART: [ldev] FE.KEYID = 1
1,310,108 UART: [ldev] Erasing FE.KEYID = 1
1,337,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,350,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,356,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,362,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,368,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,375,344 UART: [ldev] --
1,376,702 UART: [fwproc] Wait for Commands...
1,377,329 UART: [fwproc] Recv command 0x46574c44
1,378,062 UART: [fwproc] Recv'd Img size: 114168 bytes
2,675,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,701,850 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,731,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,866,747 >>> mbox cmd response: success
2,867,956 UART: [afmc] ++
2,868,124 UART: [afmc] CDI.KEYID = 6
2,868,487 UART: [afmc] SUBJECT.KEYID = 7
2,868,913 UART: [afmc] AUTHORITY.KEYID = 5
2,904,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,921,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,921,951 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,927,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,933,563 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,939,282 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,946,999 UART: [afmc] --
2,947,887 UART: [cold-reset] --
2,948,779 UART: [state] Locking Datavault
2,950,050 UART: [state] Locking PCR0, PCR1 and PCR31
2,950,654 UART: [state] Locking ICCM
2,951,246 UART: [exit] Launching FMC @ 0x40000130
2,956,575 UART:
2,956,591 UART: Running Caliptra FMC ...
2,956,999 UART:
2,957,142 UART: [state] CFI Enabled
2,967,621 UART: [fht] FMC Alias Private Key: 7
3,074,980 UART: [art] Extend RT PCRs Done
3,075,408 UART: [art] Lock RT PCRs Done
3,076,982 UART: [art] Populate DV Done
3,084,863 UART: [fht] FMC Alias Private Key: 7
3,085,793 UART: [art] Derive CDI
3,086,073 UART: [art] Store in in slot 0x4
3,171,610 UART: [art] Derive Key Pair
3,171,970 UART: [art] Store priv key in slot 0x5
3,185,402 UART: [art] Derive Key Pair - Done
3,200,260 UART: [art] Signing Cert with AUTHO
3,200,740 UART: RITY.KEYID = 7
3,216,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,915 UART: [art] PUB.X = 5F2482A1B8333DC72AA5DF288CE91BF3BC5945AC4F750270DC01ABCFB676C34C798C020B9297A5AC0DE7543A8A2FE2CA
3,223,688 UART: [art] PUB.Y = F35E23F39552AD278CDF228AA338A6C54A9AD29C115BC0AFC47F8A2F90A8A27F2B77305127C3D834488D6F914D04F27E
3,230,643 UART: [art] SIG.R = 17BC267F7D805BC8A324411C7F8C339BC09EB0273929763CD30118672082502166888CAF569E190EE843C2EC2D4F7C9C
3,237,403 UART: [art] SIG.S = C8E99FA268DF482A6707B46DEF62F31A3CC5E1E791A3ABC2570D09585AB749A8F22DDA4C752E5D5F4599EE7FDA781838
3,261,635 UART: Caliptra RT
3,261,980 UART: [state] CFI Enabled
3,370,061 UART: [rt] RT listening for mailbox commands...
3,370,731 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,915 UART: [rt]cmd =0x4c444556, len=4
3,411,396 >>> mbox cmd response data (687 bytes)
3,411,397 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,704 UART: [rt]cmd =0x43455246, len=4
3,452,871 >>> mbox cmd response data (887 bytes)
3,452,872 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,375 UART: [rt]cmd =0x43455252, len=4
3,493,201 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,657 UART: [kat] LMS
1,168,969 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,970 UART: [idev] ++
1,173,138 UART: [idev] CDI.KEYID = 6
1,173,499 UART: [idev] SUBJECT.KEYID = 7
1,173,924 UART: [idev] UDS.KEYID = 0
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,600 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] CSR upload begun
1,209,629 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,478 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,186 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,071 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,777 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,206 UART: [idev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
1,297,703 UART: [idev] CSR uploaded
1,300,748 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,917 UART: [idev] --
1,301,950 UART: [ldev] ++
1,302,118 UART: [ldev] CDI.KEYID = 6
1,302,482 UART: [ldev] SUBJECT.KEYID = 5
1,302,909 UART: [ldev] AUTHORITY.KEYID = 7
1,303,372 UART: [ldev] FE.KEYID = 1
1,308,564 UART: [ldev] Erasing FE.KEYID = 1
1,335,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,994 UART: [ldev] --
1,374,378 UART: [fwproc] Wait for Commands...
1,375,189 UART: [fwproc] Recv command 0x46574c44
1,375,922 UART: [fwproc] Recv'd Img size: 114168 bytes
2,672,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,864,639 >>> mbox cmd response: success
2,865,844 UART: [afmc] ++
2,866,012 UART: [afmc] CDI.KEYID = 6
2,866,375 UART: [afmc] SUBJECT.KEYID = 7
2,866,801 UART: [afmc] AUTHORITY.KEYID = 5
2,902,884 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,920,413 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,926,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,932,025 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,744 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,945,611 UART: [afmc] --
2,946,733 UART: [cold-reset] --
2,947,609 UART: [state] Locking Datavault
2,948,610 UART: [state] Locking PCR0, PCR1 and PCR31
2,949,214 UART: [state] Locking ICCM
2,949,788 UART: [exit] Launching FMC @ 0x40000130
2,955,117 UART:
2,955,133 UART: Running Caliptra FMC ...
2,955,541 UART:
2,955,684 UART: [state] CFI Enabled
2,966,217 UART: [fht] FMC Alias Private Key: 7
3,074,222 UART: [art] Extend RT PCRs Done
3,074,650 UART: [art] Lock RT PCRs Done
3,076,132 UART: [art] Populate DV Done
3,084,281 UART: [fht] FMC Alias Private Key: 7
3,085,403 UART: [art] Derive CDI
3,085,683 UART: [art] Store in in slot 0x4
3,171,390 UART: [art] Derive Key Pair
3,171,750 UART: [art] Store priv key in slot 0x5
3,185,040 UART: [art] Derive Key Pair - Done
3,199,867 UART: [art] Signing Cert with AUTHO
3,200,347 UART: RITY.KEYID = 7
3,215,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,786 UART: [art] PUB.X = 9E8C254D19070A9D40F13298CBE0E5692281BBC985B5B2F94EFB15641B72414B864C6F96655369F092A7361320437AE7
3,222,542 UART: [art] PUB.Y = 37E82775CFAEC7BF6E3DDAF61487A17F369981F64083324705A0B73E9514C4398F39787255B68FDFB8BA449D25B8C687
3,229,489 UART: [art] SIG.R = BE27C97C8187B66DF568664B6ECC942176A5EB2809AE9EA68688BACB75B84CE501510586183A6012CC1F8E4CC6377738
3,236,252 UART: [art] SIG.S = 9678EB10BEF6FA21B95806C25D119F855ADE416C6E71AF0F0B5682D7B209DB11DE9D41BDE552C106285549063BE7E124
3,260,031 UART: Caliptra RT
3,260,376 UART: [state] CFI Enabled
3,367,936 UART: [rt] RT listening for mailbox commands...
3,368,606 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,238 UART: [rt]cmd =0x4c444556, len=4
3,408,649 >>> mbox cmd response data (687 bytes)
3,408,650 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,438,009 UART: [rt]cmd =0x43455246, len=4
3,450,108 >>> mbox cmd response data (887 bytes)
3,450,109 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,479,436 UART: [rt]cmd =0x43455252, len=4
3,490,315 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 892.27s
Truncated 2567977 bytes from beginning
] Extend RT PCRs Done
2,820,245 UART: [art] Lock RT PCRs Done
2,822,087 UART: [art] Populate DV Done
2,830,506 UART: [fht] FMC Alias Private Key: 7
2,831,506 UART: [art] Derive CDI
2,831,786 UART: [art] Store in in slot 0x4
2,917,363 UART: [art] Derive Key Pair
2,917,723 UART: [art] Store priv key in slot 0x5
2,930,615 UART: [art] Derive Key Pair - Done
2,945,555 UART: [art] Signing Cert with AUTHO
2,946,035 UART: RITY.KEYID = 7
2,961,143 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,908 UART: [art] PUB.X = 3C26B4F2BD77E413FDA8EB8CBBF08FE3CFE94E72DBAFB1BC08CBDA1D7A302AEA863034FD345730229BC3AB34E2B0121A
2,968,705 UART: [art] PUB.Y = 01B31FF8C94D623CD39DF56F8EB679092EE2D79B478AC15E15BDE610BD6BB23E3DD0983C75BBAE6AD9FF5620BDF8AC53
2,975,673 UART: [art] SIG.R = 2F1D44DE9C19700341E3268F911E207CF1DB9D20CF9B474CF4D028FF66923D3D365FFB0261FB7A79F1E3AC908C3BD89D
2,982,449 UART: [art] SIG.S = D3F2987CDB5DD260A5881A5D7B5391AE18F3E355D7BEC38731AAF897F9FB2DF37209B50A837136D6D29307541881E512
3,006,603 UART: Caliptra RT
3,006,948 UART: [state] CFI Enabled
3,115,017 UART: [rt] RT listening for mailbox commands...
3,115,687 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,339 UART: [rt]cmd =0x4c444556, len=4
3,155,686 >>> mbox cmd response data (687 bytes)
3,155,687 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,080 UART: [rt]cmd =0x43455246, len=4
3,197,033 >>> mbox cmd response data (887 bytes)
3,197,034 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,539 UART: [rt]cmd =0x43455252, len=4
3,237,435 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,475 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,178 >>> mbox cmd response: success
2,701,314 UART:
2,701,330 UART: Running Caliptra FMC ...
2,701,738 UART:
2,701,881 UART: [state] CFI Enabled
2,712,706 UART: [fht] FMC Alias Private Key: 7
2,820,725 UART: [art] Extend RT PCRs Done
2,821,153 UART: [art] Lock RT PCRs Done
2,822,975 UART: [art] Populate DV Done
2,831,484 UART: [fht] FMC Alias Private Key: 7
2,832,612 UART: [art] Derive CDI
2,832,892 UART: [art] Store in in slot 0x4
2,918,539 UART: [art] Derive Key Pair
2,918,899 UART: [art] Store priv key in slot 0x5
2,932,433 UART: [art] Derive Key Pair - Done
2,947,425 UART: [art] Signing Cert with AUTHO
2,947,905 UART: RITY.KEYID = 7
2,962,911 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,676 UART: [art] PUB.X = 6588EB3CE1B3B9107B961D6D22128CB1C45D9E3168365E1E91D5B2B35F4688B495E439638A18D8F399341A664F9B5AF5
2,970,444 UART: [art] PUB.Y = 017ACC3A83023CDCC676D008F1A0FA1FB312D389C0EDA2410D93E6944A1262AE5A7A44C10DCABE6C057A559B0B748389
2,977,385 UART: [art] SIG.R = 6FEFD239A02EB8AF1DAFB3CA7896A3FE13F0697CA56C59641DCDC9D7FA57F7F2AA2D1DEC496FDB416E0191787207446C
2,984,171 UART: [art] SIG.S = 5EEBD9B712C91B96406ACE441A7F8FB409349A1F4BB43D9AB58FBDEDB122171EDD36E34C8E168C8B5F42859AF787A42E
3,007,575 UART: Caliptra RT
3,007,920 UART: [state] CFI Enabled
3,115,447 UART: [rt] RT listening for mailbox commands...
3,116,117 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,037 UART: [rt]cmd =0x4c444556, len=4
3,156,688 >>> mbox cmd response data (687 bytes)
3,156,689 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,952 UART: [rt]cmd =0x43455246, len=4
3,198,071 >>> mbox cmd response data (887 bytes)
3,198,072 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,553 UART: [rt]cmd =0x43455252, len=4
3,238,433 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,640,516 >>> mbox cmd response: success
2,704,004 UART:
2,704,020 UART: Running Caliptra FMC ...
2,704,428 UART:
2,704,571 UART: [state] CFI Enabled
2,715,048 UART: [fht] FMC Alias Private Key: 7
2,823,155 UART: [art] Extend RT PCRs Done
2,823,583 UART: [art] Lock RT PCRs Done
2,824,955 UART: [art] Populate DV Done
2,833,414 UART: [fht] FMC Alias Private Key: 7
2,834,526 UART: [art] Derive CDI
2,834,806 UART: [art] Store in in slot 0x4
2,920,553 UART: [art] Derive Key Pair
2,920,913 UART: [art] Store priv key in slot 0x5
2,933,891 UART: [art] Derive Key Pair - Done
2,948,369 UART: [art] Signing Cert with AUTHO
2,948,849 UART: RITY.KEYID = 7
2,963,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,760 UART: [art] PUB.X = 5A63AA1974C2B64AD7F5FBA3C76C95F6622DA8D56E0CF0434F5817052895BC978BF7DFC955F8F22DB3EED8820A452665
2,971,531 UART: [art] PUB.Y = 9DE2E0B218F5F165F3848D6B9EA0CA26ED939CD46F364868063960BF3CC450B9A1C7CC8CCA4B4A15C1ED319E763CD08F
2,978,494 UART: [art] SIG.R = 32142E3EFC8A878B5BA655D92112F7E8423F3422D1B980B8A07683C07BD477760535E39E66A385C78EB8E320D335F8F5
2,985,257 UART: [art] SIG.S = 1F683D3A4718D0D4AF57C4084EE1E952D30C71CDA9AF5FEE5DEA7428E9F97E2C95E6E79363A69A0AA1181D68C4821BFB
3,009,061 UART: Caliptra RT
3,009,406 UART: [state] CFI Enabled
3,117,547 UART: [rt] RT listening for mailbox commands...
3,118,217 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,148,301 UART: [rt]cmd =0x4c444556, len=4
3,158,824 >>> mbox cmd response data (687 bytes)
3,158,825 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,282 UART: [rt]cmd =0x43455246, len=4
3,200,347 >>> mbox cmd response data (887 bytes)
3,200,348 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,229,739 UART: [rt]cmd =0x43455252, len=4
3,240,725 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,748 >>> mbox cmd response: success
2,706,498 UART:
2,706,514 UART: Running Caliptra FMC ...
2,706,922 UART:
2,707,065 UART: [state] CFI Enabled
2,717,706 UART: [fht] FMC Alias Private Key: 7
2,825,595 UART: [art] Extend RT PCRs Done
2,826,023 UART: [art] Lock RT PCRs Done
2,827,287 UART: [art] Populate DV Done
2,835,538 UART: [fht] FMC Alias Private Key: 7
2,836,508 UART: [art] Derive CDI
2,836,788 UART: [art] Store in in slot 0x4
2,922,491 UART: [art] Derive Key Pair
2,922,851 UART: [art] Store priv key in slot 0x5
2,936,353 UART: [art] Derive Key Pair - Done
2,951,099 UART: [art] Signing Cert with AUTHO
2,951,579 UART: RITY.KEYID = 7
2,966,887 UART: [art] Erasing AUTHORITY.KEYID = 7
2,967,652 UART: [art] PUB.X = C186D4A4F1B599E6C91A38B92D3F518D6854B121C864DB45609C0160379D9DE557C7CE19991468919726F80CB5CD1518
2,974,410 UART: [art] PUB.Y = F53558EFE8F10F81D2CFD5C59EABF4DD99DBAF1D2E59C10CD3A7453F4FDAFAD0A21AC7B0A45F145E3C8149C1E4ADA7A5
2,981,388 UART: [art] SIG.R = 2D7AE32087184DC5D26945254C8ED267AADD5E788CB8498312153F102034848A1AFE7AB3CBE0C0D8435E616DF3A654CC
2,988,164 UART: [art] SIG.S = 9DA141FDF0650EB83F56C04FB8A1639DDE3F80836B197A12AE32916BC07B0EF4F61AC13A5C096B675FD6E60F3D77E56E
3,012,533 UART: Caliptra RT
3,012,878 UART: [state] CFI Enabled
3,121,635 UART: [rt] RT listening for mailbox commands...
3,122,305 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,152,183 UART: [rt]cmd =0x4c444556, len=4
3,162,604 >>> mbox cmd response data (687 bytes)
3,162,605 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,936 UART: [rt]cmd =0x43455246, len=4
3,203,893 >>> mbox cmd response data (887 bytes)
3,203,894 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,233,115 UART: [rt]cmd =0x43455252, len=4
3,243,959 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,606 >>> mbox cmd response: success
2,701,156 UART:
2,701,172 UART: Running Caliptra FMC ...
2,701,580 UART:
2,701,723 UART: [state] CFI Enabled
2,712,268 UART: [fht] FMC Alias Private Key: 7
2,820,475 UART: [art] Extend RT PCRs Done
2,820,903 UART: [art] Lock RT PCRs Done
2,822,211 UART: [art] Populate DV Done
2,830,682 UART: [fht] FMC Alias Private Key: 7
2,831,720 UART: [art] Derive CDI
2,832,000 UART: [art] Store in in slot 0x4
2,917,641 UART: [art] Derive Key Pair
2,918,001 UART: [art] Store priv key in slot 0x5
2,931,967 UART: [art] Derive Key Pair - Done
2,946,575 UART: [art] Signing Cert with AUTHO
2,947,055 UART: RITY.KEYID = 7
2,962,197 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,962 UART: [art] PUB.X = 0BF5700966CF0D8FCA1BB1C74834D75675DE9F685FFC1C7A2C1CF640F3F1F6BC3D429ADE9C95DF660C7B4777D169D060
2,969,736 UART: [art] PUB.Y = 2FF55CF74F39CF45EC609289D573FC74591CE61101ECB5C6093E677EC3FAE3D30852E1441DFEA3B73D86024DC508DFCB
2,976,685 UART: [art] SIG.R = 77A49C314D612794AE6DF9EE2F97F3CEAF0B4798B800D1EEECD88212D7F5EB18A5CB5E2973B01EE19530F7EB14C7EAC2
2,983,450 UART: [art] SIG.S = 0B5D8FFAE41E5021A0A0D6BE9881132E5F20E829D1044EF1D19425E6EC4D7A9D009004EA391632B2610F5BE9237147AB
3,007,491 UART: Caliptra RT
3,007,836 UART: [state] CFI Enabled
3,116,625 UART: [rt] RT listening for mailbox commands...
3,117,295 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,199 UART: [rt]cmd =0x4c444556, len=4
3,157,696 >>> mbox cmd response data (687 bytes)
3,157,697 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,092 UART: [rt]cmd =0x43455246, len=4
3,199,013 >>> mbox cmd response data (887 bytes)
3,199,014 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,443 UART: [rt]cmd =0x43455252, len=4
3,239,437 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 859.49s
Truncated 9072 bytes from beginning
24,296,072 UART: [state] Locking Datavault
24,302,131 UART: [state] Locking PCR0, PCR1 and PCR31
24,303,775 UART: [state] Locking ICCM
24,305,978 UART: [exit] Launching FMC @ 0x40000130
24,314,651 UART:
24,314,884 UART: Running Caliptra FMC ...
24,315,983 UART:
24,316,135 UART: [state] CFI Enabled
24,373,250 UART: [fht] FMC Alias Private Key: 7
26,710,662 UART: [art] Extend RT PCRs Done
26,711,882 UART: [art] Lock RT PCRs Done
26,713,402 UART: [art] Populate DV Done
26,718,757 UART: [fht] FMC Alias Private Key: 7
26,720,416 UART: [art] Derive CDI
26,721,230 UART: [art] Store in in slot 0x4
26,781,190 UART: [art] Derive Key Pair
26,782,227 UART: [art] Store priv key in slot 0x5
30,074,405 UART: [art] Derive Key Pair - Done
30,087,405 UART: [art] Signing Cert with AUTHO
30,088,717 UART: RITY.KEYID = 7
32,376,225 UART: [art] Erasing AUTHORITY.KEYID = 7
32,377,733 UART: [art] PUB.X = F4DBAABD63BC00276F92FA98C62B8F4D5569C667A45505AA69A772319A3070A9F209E7FB88F381BC61662A57ACADD4FB
32,384,977 UART: [art] PUB.Y = 0C0436745FEA59F9ED92E8D21DB379C98A86B28766EDE0CA974921106D65A70B043B666768C4F5176E977E203F229C68
32,392,261 UART: [art] SIG.R = 2FDA70CC3C011ADCBEF0718F0E8F951B73A93B9554998D95C67D8794A78CD7DF41598258A252406B2004ADF184AF46FC
32,399,594 UART: [art] SIG.S = F7D276B1B12BD90BCACD1D9ADEB5A4C96310D462EB46187DE81118C42F1371BF4FC09F4BDE0A168DE58453554590F29F
33,704,671 UART: Caliptra RT
33,705,387 UART: [state] CFI Enabled
33,865,631 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
4,733 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
191,990 UART:
192,372 UART: Running Caliptra ROM ...
193,491 UART:
193,655 UART: [state] CFI Enabled
262,466 UART: [state] LifecycleState = Unprovisioned
264,826 UART: [state] DebugLocked = No
267,500 UART: [state] WD Timer not started. Device not locked for debugging
271,791 UART: [kat] SHA2-256
453,720 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,268 UART: [kat] ++
465,802 UART: [kat] sha1
475,501 UART: [kat] SHA2-256
478,556 UART: [kat] SHA2-384
483,713 UART: [kat] SHA2-512-ACC
486,320 UART: [kat] ECC-384
3,775,789 UART: [kat] HMAC-384Kdf
3,801,264 UART: [kat] LMS
4,874,445 UART: [kat] --
4,878,973 UART: [cold-reset] ++
4,881,518 UART: [fht] FHT @ 0x50003400
4,893,628 UART: [idev] ++
4,894,306 UART: [idev] CDI.KEYID = 6
4,895,540 UART: [idev] SUBJECT.KEYID = 7
4,896,643 UART: [idev] UDS.KEYID = 0
4,927,643 UART: [idev] Erasing UDS.KEYID = 0
8,240,850 UART: [idev] Sha384 KeyId Algorithm
8,249,573 UART: [idev] --
8,252,650 UART: [ldev] ++
8,253,217 UART: [ldev] CDI.KEYID = 6
8,254,374 UART: [ldev] SUBJECT.KEYID = 5
8,255,580 UART: [ldev] AUTHORITY.KEYID = 7
8,256,809 UART: [ldev] FE.KEYID = 1
8,293,713 UART: [ldev] Erasing FE.KEYID = 1
11,626,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,916,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,933,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,948,964 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
13,964,975 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
13,985,928 UART: [ldev] --
13,991,301 UART: [fwproc] Wait for Commands...
13,994,483 UART: [fwproc] Recv command 0x46574c44
13,996,797 UART: [fwproc] Recv'd Img size: 113844 bytes
18,070,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,150,564 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,219,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,534,736 >>> mbox cmd response: success
18,538,249 UART: [afmc] ++
18,538,831 UART: [afmc] CDI.KEYID = 6
18,539,939 UART: [afmc] SUBJECT.KEYID = 7
18,541,156 UART: [afmc] AUTHORITY.KEYID = 5
21,899,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,215,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,217,990 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,234,185 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,250,216 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,266,176 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,288,158 UART: [afmc] --
24,292,412 UART: [cold-reset] --
24,297,197 UART: [state] Locking Datavault
24,302,174 UART: [state] Locking PCR0, PCR1 and PCR31
24,303,813 UART: [state] Locking ICCM
24,306,862 UART: [exit] Launching FMC @ 0x40000130
24,315,530 UART:
24,315,761 UART: Running Caliptra FMC ...
24,316,793 UART:
24,316,939 UART: [state] CFI Enabled
24,377,282 UART: [fht] FMC Alias Private Key: 7
26,715,787 UART: [art] Extend RT PCRs Done
26,717,003 UART: [art] Lock RT PCRs Done
26,718,653 UART: [art] Populate DV Done
26,724,012 UART: [fht] FMC Alias Private Key: 7
26,725,665 UART: [art] Derive CDI
26,726,402 UART: [art] Store in in slot 0x4
26,785,339 UART: [art] Derive Key Pair
26,786,375 UART: [art] Store priv key in slot 0x5
30,060,012 UART: [art] Derive Key Pair - Done
30,072,926 UART: [art] Signing Cert with AUTHO
30,074,233 UART: RITY.KEYID = 7
32,361,829 UART: [art] Erasing AUTHORITY.KEYID = 7
32,363,347 UART: [art] PUB.X = 41C76DB5314529A94D94874F1E711DD06F76EBF19E49CD7661457C3B4160CC7C6D9C8C710D194C210F6777EE29A465DF
32,370,527 UART: [art] PUB.Y = 21C45FA93F9EFB2149B77F2FCCC704AA1E1329B1929748D1A4A71FEBF0B84F1DB5489A3F37F58F3DC8045D637C72E6C7
32,377,802 UART: [art] SIG.R = 669701DDE5D28302DFB266E984E1A99415B9106E03EC61108F1C4C35E12B0E08F296607C504F7E34A595B00A97BBB828
32,385,191 UART: [art] SIG.S = 6C56783F60C8A9B82FA12B4364BAC625817E23C18D8A17B221CCA88CF9E84CB5A2D116A5117C307BF3F827A8C889FEB4
33,690,001 UART: Caliptra RT
33,690,724 UART: [state] CFI Enabled
33,850,718 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
4,847 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,143 UART:
192,893 UART: Running Caliptra ROM ...
194,053 UART:
194,219 UART: [state] CFI Enabled
261,748 UART: [state] LifecycleState = Unprovisioned
264,084 UART: [state] DebugLocked = No
265,572 UART: [state] WD Timer not started. Device not locked for debugging
270,776 UART: [kat] SHA2-256
452,708 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,228 UART: [kat] ++
464,755 UART: [kat] sha1
474,449 UART: [kat] SHA2-256
477,470 UART: [kat] SHA2-384
483,337 UART: [kat] SHA2-512-ACC
485,943 UART: [kat] ECC-384
3,776,379 UART: [kat] HMAC-384Kdf
3,801,728 UART: [kat] LMS
4,874,911 UART: [kat] --
4,879,822 UART: [cold-reset] ++
4,881,919 UART: [fht] FHT @ 0x50003400
4,894,464 UART: [idev] ++
4,895,132 UART: [idev] CDI.KEYID = 6
4,896,366 UART: [idev] SUBJECT.KEYID = 7
4,897,517 UART: [idev] UDS.KEYID = 0
4,931,103 UART: [idev] Erasing UDS.KEYID = 0
8,246,863 UART: [idev] Fuse KeyId
8,251,091 UART: [idev] --
8,254,979 UART: [ldev] ++
8,255,549 UART: [ldev] CDI.KEYID = 6
8,256,781 UART: [ldev] SUBJECT.KEYID = 5
8,257,936 UART: [ldev] AUTHORITY.KEYID = 7
8,259,164 UART: [ldev] FE.KEYID = 1
8,299,326 UART: [ldev] Erasing FE.KEYID = 1
11,633,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,945,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,961,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,977,358 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
13,993,344 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,014,009 UART: [ldev] --
14,018,907 UART: [fwproc] Wait for Commands...
14,021,661 UART: [fwproc] Recv command 0x46574c44
14,023,649 UART: [fwproc] Recv'd Img size: 113844 bytes
18,086,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,161,635 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,230,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,546,883 >>> mbox cmd response: success
18,550,765 UART: [afmc] ++
18,551,352 UART: [afmc] CDI.KEYID = 6
18,552,556 UART: [afmc] SUBJECT.KEYID = 7
18,553,713 UART: [afmc] AUTHORITY.KEYID = 5
21,910,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,206,831 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,209,131 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,225,328 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,241,352 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,257,366 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,279,449 UART: [afmc] --
24,283,374 UART: [cold-reset] --
24,286,527 UART: [state] Locking Datavault
24,292,637 UART: [state] Locking PCR0, PCR1 and PCR31
24,294,338 UART: [state] Locking ICCM
24,295,625 UART: [exit] Launching FMC @ 0x40000130
24,304,296 UART:
24,304,525 UART: Running Caliptra FMC ...
24,305,643 UART:
24,305,803 UART: [state] CFI Enabled
24,365,473 UART: [fht] FMC Alias Private Key: 7
26,703,535 UART: [art] Extend RT PCRs Done
26,704,754 UART: [art] Lock RT PCRs Done
26,706,295 UART: [art] Populate DV Done
26,711,973 UART: [fht] FMC Alias Private Key: 7
26,713,507 UART: [art] Derive CDI
26,714,268 UART: [art] Store in in slot 0x4
26,776,447 UART: [art] Derive Key Pair
26,777,483 UART: [art] Store priv key in slot 0x5
30,069,839 UART: [art] Derive Key Pair - Done
30,082,836 UART: [art] Signing Cert with AUTHO
30,084,146 UART: RITY.KEYID = 7
32,371,363 UART: [art] Erasing AUTHORITY.KEYID = 7
32,372,864 UART: [art] PUB.X = 8B512809C2FA1B12CE818F6712D3CAD78AEAD6A632143A3D8C0401B5B91DDDEA1E0BD4A97BA28804393D68E8820B2E35
32,380,211 UART: [art] PUB.Y = 99471B81E5FBE81C2E2636DF9143DCC3CFC5CA13A7E3822D4961A093F26B15A4BFB13F341A66D4A2810B011BE0FD35DA
32,387,443 UART: [art] SIG.R = 46AE1AD7803D65F0E8A679371779656785D1F6DCEFD397B18C8A4668EE02F4E88404E70804CDDEE9857685DB858D68E4
32,394,778 UART: [art] SIG.S = E6148CA77CC937AE11BBB63DF69DC181362D8FF47AC0AFE3911828F62DEC7AFA353860BD4E4ACAF78427376B99DFAD7A
33,699,843 UART: Caliptra RT
33,700,541 UART: [state] CFI Enabled
33,862,300 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
5,133 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,345,662 >>> mbox cmd response: success
24,042,343 UART:
24,042,754 UART: Running Caliptra FMC ...
24,043,937 UART:
24,044,103 UART: [state] CFI Enabled
24,108,122 UART: [fht] FMC Alias Private Key: 7
26,445,695 UART: [art] Extend RT PCRs Done
26,446,919 UART: [art] Lock RT PCRs Done
26,448,654 UART: [art] Populate DV Done
26,453,999 UART: [fht] FMC Alias Private Key: 7
26,455,652 UART: [art] Derive CDI
26,456,391 UART: [art] Store in in slot 0x4
26,515,812 UART: [art] Derive Key Pair
26,516,805 UART: [art] Store priv key in slot 0x5
29,809,527 UART: [art] Derive Key Pair - Done
29,822,662 UART: [art] Signing Cert with AUTHO
29,823,967 UART: RITY.KEYID = 7
32,111,586 UART: [art] Erasing AUTHORITY.KEYID = 7
32,113,089 UART: [art] PUB.X = 2CB774C621942C344486CEC1C4D9D98C5409455950241FFA8567DAA05173F3932045DDB3122176956650C5C34C507E97
32,120,298 UART: [art] PUB.Y = ED3965D042916E54435E2F1760863CE19A261A32A1109EFC984CFEA5A2D35635A968DA9FDD15B1E339026BF5E5C46B82
32,127,567 UART: [art] SIG.R = 9AEFCF4E41475AEF308D11C1320AB9E594384F033B3C666F614AE415AB1A830B97730A1C55E6A256A918E628C8FE01C5
32,134,977 UART: [art] SIG.S = 42EFF34AA3B50D6EBBF511F7A14A8EE82294024BC4EEBE3E5B3EC5722DEE2068B669C5E415AFAB6B4EF98C7B6BA79F52
33,439,770 UART: Caliptra RT
33,440,487 UART: [state] CFI Enabled
33,601,660 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
4,862 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,341,593 >>> mbox cmd response: success
24,042,269 UART:
24,042,658 UART: Running Caliptra FMC ...
24,043,859 UART:
24,044,026 UART: [state] CFI Enabled
24,109,049 UART: [fht] FMC Alias Private Key: 7
26,447,033 UART: [art] Extend RT PCRs Done
26,448,267 UART: [art] Lock RT PCRs Done
26,450,006 UART: [art] Populate DV Done
26,455,318 UART: [fht] FMC Alias Private Key: 7
26,456,962 UART: [art] Derive CDI
26,457,776 UART: [art] Store in in slot 0x4
26,517,535 UART: [art] Derive Key Pair
26,518,583 UART: [art] Store priv key in slot 0x5
29,811,070 UART: [art] Derive Key Pair - Done
29,824,014 UART: [art] Signing Cert with AUTHO
29,825,356 UART: RITY.KEYID = 7
32,112,010 UART: [art] Erasing AUTHORITY.KEYID = 7
32,113,523 UART: [art] PUB.X = 443A6414D261386C5C506FD43C0536862D12418DE9B0251D18E24C1754502E2EF029A105A340A12AA1A1431D6AECB9CB
32,120,796 UART: [art] PUB.Y = 2A2F624D4FDAB18CDBD37C90E809A2F6157081BE0AFE1AE0EB29B1D48B008E6B3AE87D68455DBEAA7D896276AC277AE6
32,128,016 UART: [art] SIG.R = E12D5A4138D659F2D95D1EB665F30F72293AF4A76313775C44897053483279AD0721F52120A0C7F4340F1CAF5F6C8BAE
32,135,418 UART: [art] SIG.S = 5464EF67286738B6AA1C41699C9CAC6CB338A5393A569FF7E0941D48AD891513764EA62DB741CD99DBEA474A1E6ABA97
33,440,996 UART: Caliptra RT
33,441,710 UART: [state] CFI Enabled
33,601,539 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
5,398 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,323,674 >>> mbox cmd response: success
24,018,490 UART:
24,018,892 UART: Running Caliptra FMC ...
24,020,092 UART:
24,020,263 UART: [state] CFI Enabled
24,085,688 UART: [fht] FMC Alias Private Key: 7
26,423,190 UART: [art] Extend RT PCRs Done
26,424,421 UART: [art] Lock RT PCRs Done
26,426,249 UART: [art] Populate DV Done
26,431,643 UART: [fht] FMC Alias Private Key: 7
26,433,338 UART: [art] Derive CDI
26,434,075 UART: [art] Store in in slot 0x4
26,495,077 UART: [art] Derive Key Pair
26,496,125 UART: [art] Store priv key in slot 0x5
29,788,631 UART: [art] Derive Key Pair - Done
29,801,626 UART: [art] Signing Cert with AUTHO
29,802,923 UART: RITY.KEYID = 7
32,090,778 UART: [art] Erasing AUTHORITY.KEYID = 7
32,092,285 UART: [art] PUB.X = 7A3F28AF66A01AACE2E0CD75B9C68AD85BA3C0A7C6BB66EC91E16843E9F3E9980F3CD11ED592D82BF3A7EDB583EEE3BD
32,099,549 UART: [art] PUB.Y = ECA7754CA617C84E464FC7993EBF74512C4FAFB63EF48787575D88B82980A23682D1C5D48D270AD0EC6E4B839E0A8035
32,106,816 UART: [art] SIG.R = EC9035563A90F25322391AF689713515BDC264D886EA3C4106C3772AE3354069601C945ECE4C6A92AC842ED0DA6396B5
32,114,188 UART: [art] SIG.S = 142E1EAC688FD23AF180757837F45CA3BFE13C94251184575B8950587681B406ECE615CCAA9CCD2667FF5AA79B872158
33,419,088 UART: Caliptra RT
33,419,791 UART: [state] CFI Enabled
33,580,410 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
4,800 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,315,412 >>> mbox cmd response: success
24,013,442 UART:
24,013,872 UART: Running Caliptra FMC ...
24,015,005 UART:
24,015,166 UART: [state] CFI Enabled
24,083,302 UART: [fht] FMC Alias Private Key: 7
26,420,901 UART: [art] Extend RT PCRs Done
26,422,127 UART: [art] Lock RT PCRs Done
26,423,725 UART: [art] Populate DV Done
26,428,984 UART: [fht] FMC Alias Private Key: 7
26,430,686 UART: [art] Derive CDI
26,431,423 UART: [art] Store in in slot 0x4
26,492,534 UART: [art] Derive Key Pair
26,493,578 UART: [art] Store priv key in slot 0x5
29,786,807 UART: [art] Derive Key Pair - Done
29,799,710 UART: [art] Signing Cert with AUTHO
29,801,050 UART: RITY.KEYID = 7
32,088,060 UART: [art] Erasing AUTHORITY.KEYID = 7
32,089,572 UART: [art] PUB.X = 12EB66A9D5289B61E675719D909A75AE09B9DF3FB301ABAEED17ED3D2C7125DE101B27C43174BB080C2344341EBAC87F
32,096,832 UART: [art] PUB.Y = 6BF418C2C469ED0678D93CC9DCB9F41125D13B6A8949B68EDAA595489DD4BE1C3A433EC3018AFFBFAC5EC6C98756BBF9
32,104,109 UART: [art] SIG.R = 992BD391194FA9B0CBD2816BC674789E60F013956E4F9E83503D94A5236F54A504A81C5738F2DE80FBBAE1BFB4E6B9A9
32,111,451 UART: [art] SIG.S = 833CCC040B163A896280E2E2A221460FE74D15C7577123911B4E17592CCDBBA4DFE5A5141123AD97D30E50B675C5D4A0
33,416,900 UART: Caliptra RT
33,417,590 UART: [state] CFI Enabled
33,577,987 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.16s
Truncated 9072 bytes from beginning
24,414,315 UART: [state] Locking Datavault
24,421,591 UART: [state] Locking PCR0, PCR1 and PCR31
24,423,247 UART: [state] Locking ICCM
24,425,988 UART: [exit] Launching FMC @ 0x40000130
24,434,656 UART:
24,434,887 UART: Running Caliptra FMC ...
24,435,978 UART:
24,436,134 UART: [state] CFI Enabled
24,444,281 UART: [fht] FMC Alias Private Key: 7
26,775,354 UART: [art] Extend RT PCRs Done
26,776,580 UART: [art] Lock RT PCRs Done
26,778,472 UART: [art] Populate DV Done
26,783,932 UART: [fht] FMC Alias Private Key: 7
26,785,458 UART: [art] Derive CDI
26,786,188 UART: [art] Store in in slot 0x4
26,828,939 UART: [art] Derive Key Pair
26,829,976 UART: [art] Store priv key in slot 0x5
30,071,759 UART: [art] Derive Key Pair - Done
30,084,808 UART: [art] Signing Cert with AUTHO
30,086,107 UART: RITY.KEYID = 7
32,365,240 UART: [art] Erasing AUTHORITY.KEYID = 7
32,366,745 UART: [art] PUB.X = C66F2079C97A2CBDB22805B02EE9A6B18CB4F0588FA9B48D8F669129B7661AB86898CC80B7BA662E2CFFB9B68D18A7EF
32,373,997 UART: [art] PUB.Y = AA9866701577440FDFA907F1A044FD54D87725C206EAA7F39BC78484767E4473B2B78DCA3D91A4334242BA2A419FB122
32,381,284 UART: [art] SIG.R = 1DDE70C1FC62D886099056D8A0800182F9A04027C0BAC3E52D2BA2F4DE8D204AFAFA8470C1EDB846D5168F7E510DCEE7
32,388,683 UART: [art] SIG.S = D0F4BB506B24759295972881BA97A203290A255F0B613226D7BDBC80201717A66AEA0A9E05E8DF18F6600D5D3B0E26BE
33,693,780 UART: Caliptra RT
33,694,490 UART: [state] CFI Enabled
33,811,997 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
5,679 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,537 UART:
192,925 UART: Running Caliptra ROM ...
194,027 UART:
603,853 UART: [state] CFI Enabled
619,577 UART: [state] LifecycleState = Unprovisioned
621,949 UART: [state] DebugLocked = No
623,701 UART: [state] WD Timer not started. Device not locked for debugging
628,871 UART: [kat] SHA2-256
810,825 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,386 UART: [kat] ++
822,970 UART: [kat] sha1
833,366 UART: [kat] SHA2-256
836,426 UART: [kat] SHA2-384
841,586 UART: [kat] SHA2-512-ACC
844,244 UART: [kat] ECC-384
4,101,561 UART: [kat] HMAC-384Kdf
4,113,865 UART: [kat] LMS
5,187,010 UART: [kat] --
5,192,357 UART: [cold-reset] ++
5,193,964 UART: [fht] FHT @ 0x50003400
5,206,456 UART: [idev] ++
5,207,124 UART: [idev] CDI.KEYID = 6
5,208,356 UART: [idev] SUBJECT.KEYID = 7
5,209,787 UART: [idev] UDS.KEYID = 0
5,224,337 UART: [idev] Erasing UDS.KEYID = 0
8,498,337 UART: [idev] Sha384 KeyId Algorithm
8,507,542 UART: [idev] --
8,512,128 UART: [ldev] ++
8,512,696 UART: [ldev] CDI.KEYID = 6
8,513,852 UART: [ldev] SUBJECT.KEYID = 5
8,515,382 UART: [ldev] AUTHORITY.KEYID = 7
8,516,952 UART: [ldev] FE.KEYID = 1
8,526,791 UART: [ldev] Erasing FE.KEYID = 1
11,818,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,128,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,967 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
14,159,942 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
14,179,453 UART: [ldev] --
14,183,476 UART: [fwproc] Wait for Commands...
14,185,355 UART: [fwproc] Recv command 0x46574c44
14,187,661 UART: [fwproc] Recv'd Img size: 113844 bytes
18,252,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,333,375 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,402,120 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,718,051 >>> mbox cmd response: success
18,721,671 UART: [afmc] ++
18,722,276 UART: [afmc] CDI.KEYID = 6
18,723,462 UART: [afmc] SUBJECT.KEYID = 7
18,724,573 UART: [afmc] AUTHORITY.KEYID = 5
22,036,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,331,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,333,407 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,349,565 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,365,663 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,381,595 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,404,693 UART: [afmc] --
24,409,154 UART: [cold-reset] --
24,412,740 UART: [state] Locking Datavault
24,418,951 UART: [state] Locking PCR0, PCR1 and PCR31
24,420,596 UART: [state] Locking ICCM
24,423,044 UART: [exit] Launching FMC @ 0x40000130
24,431,703 UART:
24,431,946 UART: Running Caliptra FMC ...
24,432,964 UART:
24,433,102 UART: [state] CFI Enabled
24,441,358 UART: [fht] FMC Alias Private Key: 7
26,771,956 UART: [art] Extend RT PCRs Done
26,773,181 UART: [art] Lock RT PCRs Done
26,775,040 UART: [art] Populate DV Done
26,780,233 UART: [fht] FMC Alias Private Key: 7
26,781,713 UART: [art] Derive CDI
26,782,467 UART: [art] Store in in slot 0x4
26,825,763 UART: [art] Derive Key Pair
26,826,769 UART: [art] Store priv key in slot 0x5
30,068,840 UART: [art] Derive Key Pair - Done
30,081,790 UART: [art] Signing Cert with AUTHO
30,083,097 UART: RITY.KEYID = 7
32,362,271 UART: [art] Erasing AUTHORITY.KEYID = 7
32,363,797 UART: [art] PUB.X = D436097130EF389BB499B6EBFC038EA48C015768792E7A0099C46B449713240CC332EEBCE67906C3CABFEA682A2A1674
32,371,012 UART: [art] PUB.Y = 66D3045E7145423AE9444C75FF0EBADBFA0CC017A8C70AEE1A73725F5BDF2112E9B5947CD1264B2268DE510C23A405D6
32,378,249 UART: [art] SIG.R = D0C476D6BCA074DF9B892B4BE26DCA096E63F9C0EBF19FE95D60072F9DAA9E7D58CD5E887D559E8DB659A6E15ED3449B
32,385,690 UART: [art] SIG.S = F18C338868AE604F1C8AA72466D26A8FFFA89A0D8385508812386E2B6891F2E9D96C74C1D10E9C8B24DF706114C7A4B9
33,691,454 UART: Caliptra RT
33,692,164 UART: [state] CFI Enabled
33,809,759 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
5,488 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,414 UART:
192,805 UART: Running Caliptra ROM ...
193,908 UART:
603,476 UART: [state] CFI Enabled
617,208 UART: [state] LifecycleState = Unprovisioned
619,609 UART: [state] DebugLocked = No
622,029 UART: [state] WD Timer not started. Device not locked for debugging
626,043 UART: [kat] SHA2-256
808,011 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,559 UART: [kat] ++
820,055 UART: [kat] sha1
830,769 UART: [kat] SHA2-256
833,793 UART: [kat] SHA2-384
841,171 UART: [kat] SHA2-512-ACC
843,761 UART: [kat] ECC-384
4,097,208 UART: [kat] HMAC-384Kdf
4,109,522 UART: [kat] LMS
5,182,666 UART: [kat] --
5,187,226 UART: [cold-reset] ++
5,188,783 UART: [fht] FHT @ 0x50003400
5,199,546 UART: [idev] ++
5,200,213 UART: [idev] CDI.KEYID = 6
5,201,363 UART: [idev] SUBJECT.KEYID = 7
5,202,887 UART: [idev] UDS.KEYID = 0
5,219,692 UART: [idev] Erasing UDS.KEYID = 0
8,490,927 UART: [idev] Fuse KeyId
8,495,108 UART: [idev] --
8,498,552 UART: [ldev] ++
8,499,132 UART: [ldev] CDI.KEYID = 6
8,500,309 UART: [ldev] SUBJECT.KEYID = 5
8,501,787 UART: [ldev] AUTHORITY.KEYID = 7
8,503,342 UART: [ldev] FE.KEYID = 1
8,514,901 UART: [ldev] Erasing FE.KEYID = 1
11,807,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,098,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,114,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,130,544 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
14,146,549 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
14,167,405 UART: [ldev] --
14,171,451 UART: [fwproc] Wait for Commands...
14,173,246 UART: [fwproc] Recv command 0x46574c44
14,175,252 UART: [fwproc] Recv'd Img size: 113844 bytes
18,245,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,319,562 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,388,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,704,001 >>> mbox cmd response: success
18,708,777 UART: [afmc] ++
18,709,359 UART: [afmc] CDI.KEYID = 6
18,710,536 UART: [afmc] SUBJECT.KEYID = 7
18,711,684 UART: [afmc] AUTHORITY.KEYID = 5
22,030,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,323,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,325,498 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,341,678 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,357,730 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,373,769 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,395,648 UART: [afmc] --
24,399,724 UART: [cold-reset] --
24,403,371 UART: [state] Locking Datavault
24,408,828 UART: [state] Locking PCR0, PCR1 and PCR31
24,410,482 UART: [state] Locking ICCM
24,412,842 UART: [exit] Launching FMC @ 0x40000130
24,421,495 UART:
24,421,728 UART: Running Caliptra FMC ...
24,422,823 UART:
24,422,970 UART: [state] CFI Enabled
24,431,440 UART: [fht] FMC Alias Private Key: 7
26,762,414 UART: [art] Extend RT PCRs Done
26,763,643 UART: [art] Lock RT PCRs Done
26,765,291 UART: [art] Populate DV Done
26,770,536 UART: [fht] FMC Alias Private Key: 7
26,772,288 UART: [art] Derive CDI
26,773,017 UART: [art] Store in in slot 0x4
26,815,819 UART: [art] Derive Key Pair
26,816,811 UART: [art] Store priv key in slot 0x5
30,058,551 UART: [art] Derive Key Pair - Done
30,071,248 UART: [art] Signing Cert with AUTHO
30,072,556 UART: RITY.KEYID = 7
32,352,408 UART: [art] Erasing AUTHORITY.KEYID = 7
32,353,907 UART: [art] PUB.X = 99403F7C3F31C8CB6E553770D6141AD6D71609136F1061D8672BA252955DC7629E3E2C6123787DD016CF9B6BEC20E96C
32,361,130 UART: [art] PUB.Y = 821A2FAD30FF8083718ABBC096E901B414B23A6EBFF82127FD306A29DB41A92970E0E6D74920B2E214D479B78149E8A5
32,368,363 UART: [art] SIG.R = E1D7EF1A983787746942B292F6161529F6F34F3C980AC373E609F06B3A9777C13CA1BDF6C022F2A9E0713F56FB5AAA92
32,375,755 UART: [art] SIG.S = 2E9E73E9FC763805B54D9429DE322A0C1653C06AA2E14DEA44F2380B237ECC1CEBA71BCE669446C7D99F8C0D61367D52
33,680,849 UART: Caliptra RT
33,681,558 UART: [state] CFI Enabled
33,798,833 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
5,823 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,528,383 >>> mbox cmd response: success
24,169,339 UART:
24,169,753 UART: Running Caliptra FMC ...
24,170,988 UART:
24,171,154 UART: [state] CFI Enabled
24,178,762 UART: [fht] FMC Alias Private Key: 7
26,510,137 UART: [art] Extend RT PCRs Done
26,511,364 UART: [art] Lock RT PCRs Done
26,513,153 UART: [art] Populate DV Done
26,518,616 UART: [fht] FMC Alias Private Key: 7
26,520,201 UART: [art] Derive CDI
26,521,009 UART: [art] Store in in slot 0x4
26,563,631 UART: [art] Derive Key Pair
26,564,666 UART: [art] Store priv key in slot 0x5
29,806,728 UART: [art] Derive Key Pair - Done
29,819,882 UART: [art] Signing Cert with AUTHO
29,821,176 UART: RITY.KEYID = 7
32,100,343 UART: [art] Erasing AUTHORITY.KEYID = 7
32,101,839 UART: [art] PUB.X = 92E56E2A699C6AFCE1CF1F46A97EEE8E3D0D00A7467C025737D1C8B4603CEA17F4BE4FAC1AD13D9B2BF836E5D62AF524
32,109,095 UART: [art] PUB.Y = C801876147A8299D47E4B15501E102E127736FF260BA5C6A153123DD64738733783B674AE3CA8B42EA1ED19C347910DC
32,116,360 UART: [art] SIG.R = 2D7A761BDD948D4D6A6DAAF981BE3A9836020B642EE010C686FD2676910B832BDEE891E6E38579A9CF1DAC2C5265665C
32,123,748 UART: [art] SIG.S = 626C0650D9D01ACBF75379A141BB6DE5E87A43856E08D8F98F8E85D0B8E4C4DA00AD9A5E342913A819D42DA8D8930C85
33,428,764 UART: Caliptra RT
33,429,473 UART: [state] CFI Enabled
33,546,011 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
5,494 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,525,257 >>> mbox cmd response: success
24,159,121 UART:
24,159,518 UART: Running Caliptra FMC ...
24,160,676 UART:
24,160,830 UART: [state] CFI Enabled
24,168,714 UART: [fht] FMC Alias Private Key: 7
26,499,739 UART: [art] Extend RT PCRs Done
26,500,973 UART: [art] Lock RT PCRs Done
26,502,754 UART: [art] Populate DV Done
26,508,053 UART: [fht] FMC Alias Private Key: 7
26,509,650 UART: [art] Derive CDI
26,510,461 UART: [art] Store in in slot 0x4
26,553,545 UART: [art] Derive Key Pair
26,554,585 UART: [art] Store priv key in slot 0x5
29,797,136 UART: [art] Derive Key Pair - Done
29,809,967 UART: [art] Signing Cert with AUTHO
29,811,264 UART: RITY.KEYID = 7
32,090,764 UART: [art] Erasing AUTHORITY.KEYID = 7
32,092,275 UART: [art] PUB.X = 0D55D80D37842C8E26E12248DF54BCCE597E65DA0EC3A6211C6F2E0F6C0D78410A31268782C9A4D1BFA259FEBAA6432D
32,099,558 UART: [art] PUB.Y = F907A5747693F3CD834EF64A20FAF03E491CC80D2474577AAFB20835481907BD4950FB8E987A3BE1B6836326AF6950E5
32,106,789 UART: [art] SIG.R = 34FE4D56BF57ADFC94CD3ABA80301928B7925ABC29EA6B35F9F0FC0AC8F72B75921B1778E92DB53195DF8FA8C7F8C688
32,114,177 UART: [art] SIG.S = DE456D9DEB70B5246F6970A1C0140F0E28D94E053EE74A7F29DE29406DFAFA5B306AA436C5AB1A609475C2F7D6789540
33,419,109 UART: Caliptra RT
33,419,803 UART: [state] CFI Enabled
33,537,088 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
5,796 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,519,129 >>> mbox cmd response: success
24,160,525 UART:
24,160,939 UART: Running Caliptra FMC ...
24,162,065 UART:
24,162,222 UART: [state] CFI Enabled
24,170,321 UART: [fht] FMC Alias Private Key: 7
26,501,300 UART: [art] Extend RT PCRs Done
26,502,527 UART: [art] Lock RT PCRs Done
26,504,046 UART: [art] Populate DV Done
26,509,477 UART: [fht] FMC Alias Private Key: 7
26,511,012 UART: [art] Derive CDI
26,511,824 UART: [art] Store in in slot 0x4
26,554,178 UART: [art] Derive Key Pair
26,555,223 UART: [art] Store priv key in slot 0x5
29,797,526 UART: [art] Derive Key Pair - Done
29,810,257 UART: [art] Signing Cert with AUTHO
29,811,555 UART: RITY.KEYID = 7
32,090,907 UART: [art] Erasing AUTHORITY.KEYID = 7
32,092,426 UART: [art] PUB.X = C1416953EBB8E52FEFB1E7A8BAD5A242B2BA86A7334E4513F9DDC0BE90C9E4F9A29424C9C29A64FA9B57681C422E49A2
32,099,684 UART: [art] PUB.Y = CAEA5D9C0D6DF022D9F6DFA70330A09441A9C8AA7DAD6B006C451705E1D0AB2B73757F1321D01F3F93579822C6D63F04
32,106,948 UART: [art] SIG.R = 7616CD2CBCD3287372D1211C1F56A1EEF24DB2F8BCF7B21738E24B066D50C0C8B51EB0E6F7CC26BF4BE2D4568A527207
32,114,344 UART: [art] SIG.S = ADB5E7AE7CC60C9546E23AEC19FE88E852840D5D04A306ADF8E57A95561E190B30DC4CDA94E57D96487B230BD4E41C14
33,419,520 UART: Caliptra RT
33,420,223 UART: [state] CFI Enabled
33,537,122 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
5,665 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,511,757 >>> mbox cmd response: success
24,147,112 UART:
24,147,505 UART: Running Caliptra FMC ...
24,148,836 UART:
24,149,003 UART: [state] CFI Enabled
24,156,674 UART: [fht] FMC Alias Private Key: 7
26,487,561 UART: [art] Extend RT PCRs Done
26,488,786 UART: [art] Lock RT PCRs Done
26,490,783 UART: [art] Populate DV Done
26,496,146 UART: [fht] FMC Alias Private Key: 7
26,497,734 UART: [art] Derive CDI
26,498,567 UART: [art] Store in in slot 0x4
26,541,011 UART: [art] Derive Key Pair
26,542,054 UART: [art] Store priv key in slot 0x5
29,783,838 UART: [art] Derive Key Pair - Done
29,797,156 UART: [art] Signing Cert with AUTHO
29,798,464 UART: RITY.KEYID = 7
32,077,972 UART: [art] Erasing AUTHORITY.KEYID = 7
32,079,484 UART: [art] PUB.X = 38B8C5F1CAC82CF34FD7E5325834A1BD6A5B4F8422A61024B6160458E817295A0305497EED12A026FDCEDDA9ACE59679
32,086,741 UART: [art] PUB.Y = 65E6A8FD427289C3B9CBFF32FF7A4418411CE6FD7A7928B5707BC679E481D0A01E93E211B24B0C3E8748C76ADF9FAAEA
32,094,008 UART: [art] SIG.R = 6BA903A5E52FE77E34C8D966CB26C0E51DD203E6F993960C4F08E3C8B60481FD02036C163D966987A5639415E8A5FD47
32,101,366 UART: [art] SIG.S = A565067AAFEDDDFC2859FE5A1D3B8F2420C654DF347DA0F16132EB4EA0AF56906E7ACEF914EA6D919314A004E2D1C4F0
33,406,317 UART: Caliptra RT
33,407,028 UART: [state] CFI Enabled
33,524,225 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 7.15s
Truncated 9072 bytes from beginning
18,564,639 UART: [state] Locking Datavault
18,569,186 UART: [state] Locking PCR0, PCR1 and PCR31
18,570,828 UART: [state] Locking ICCM
18,573,362 UART: [exit] Launching FMC @ 0x40000130
18,581,758 UART:
18,581,999 UART: Running Caliptra FMC ...
18,583,098 UART:
18,583,257 UART: [state] CFI Enabled
18,635,294 UART: [fht] FMC Alias Private Key: 7
20,399,455 UART: [art] Extend RT PCRs Done
20,400,691 UART: [art] Lock RT PCRs Done
20,402,485 UART: [art] Populate DV Done
20,407,899 UART: [fht] FMC Alias Private Key: 7
20,409,447 UART: [art] Derive CDI
20,410,262 UART: [art] Store in in slot 0x4
20,467,986 UART: [art] Derive Key Pair
20,469,028 UART: [art] Store priv key in slot 0x5
22,932,438 UART: [art] Derive Key Pair - Done
22,945,547 UART: [art] Signing Cert with AUTHO
22,946,884 UART: RITY.KEYID = 7
24,657,676 UART: [art] Erasing AUTHORITY.KEYID = 7
24,659,172 UART: [art] PUB.X = 2B293A6D3A35D5D89D24EA0F4B0C89C9F94DC7B2B70DF9D56F175A2A53C56F584BA36360CFDB077F87B5780F761E3488
24,666,479 UART: [art] PUB.Y = EFFBAF38B34C525D33A73A0E841D2E89C3E6CC23065B76BD342462F7467004A573FF7881BE83F4D1BD7D50AE42A6A295
24,673,709 UART: [art] SIG.R = 27EE08DC4DFAD22EEF40F1EB6B1C4F916D2639E2E4A24ACCE4307FC8738156A47AA09013258BF5AF31EC95BC20504828
24,681,102 UART: [art] SIG.S = 642F89322EA198BC619318A512C493B555A3C280DD170FF3802B655E531BA42382A5D387B36F370D182E3EE91F60E579
25,659,552 UART: Caliptra RT
25,660,263 UART: [state] CFI Enabled
25,823,699 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
4,990 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,278 UART:
192,657 UART: Running Caliptra ROM ...
193,831 UART:
193,988 UART: [state] CFI Enabled
266,842 UART: [state] LifecycleState = Unprovisioned
268,722 UART: [state] DebugLocked = No
269,876 UART: [state] WD Timer not started. Device not locked for debugging
273,387 UART: [kat] SHA2-256
452,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,082 UART: [kat] ++
464,539 UART: [kat] sha1
475,575 UART: [kat] SHA2-256
478,635 UART: [kat] SHA2-384
485,202 UART: [kat] SHA2-512-ACC
488,191 UART: [kat] ECC-384
2,950,563 UART: [kat] HMAC-384Kdf
2,972,789 UART: [kat] LMS
3,502,216 UART: [kat] --
3,506,233 UART: [cold-reset] ++
3,508,658 UART: [fht] FHT @ 0x50003400
3,518,132 UART: [idev] ++
3,518,717 UART: [idev] CDI.KEYID = 6
3,519,632 UART: [idev] SUBJECT.KEYID = 7
3,520,791 UART: [idev] UDS.KEYID = 0
3,542,962 UART: [idev] Erasing UDS.KEYID = 0
6,026,100 UART: [idev] Sha384 KeyId Algorithm
6,035,902 UART: [idev] --
6,040,971 UART: [ldev] ++
6,041,541 UART: [ldev] CDI.KEYID = 6
6,042,426 UART: [ldev] SUBJECT.KEYID = 5
6,043,560 UART: [ldev] AUTHORITY.KEYID = 7
6,044,903 UART: [ldev] FE.KEYID = 1
6,077,377 UART: [ldev] Erasing FE.KEYID = 1
8,578,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,249 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,343,153 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,362,493 UART: [ldev] --
10,366,411 UART: [fwproc] Wait for Commands...
10,368,887 UART: [fwproc] Recv command 0x46574c44
10,370,985 UART: [fwproc] Recv'd Img size: 114168 bytes
13,774,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,847,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,915,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,233,736 >>> mbox cmd response: success
14,237,685 UART: [afmc] ++
14,238,274 UART: [afmc] CDI.KEYID = 6
14,239,182 UART: [afmc] SUBJECT.KEYID = 7
14,240,392 UART: [afmc] AUTHORITY.KEYID = 5
16,781,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,595 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,374 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,579,741 UART: [afmc] --
18,583,211 UART: [cold-reset] --
18,587,018 UART: [state] Locking Datavault
18,592,535 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,231 UART: [state] Locking ICCM
18,596,467 UART: [exit] Launching FMC @ 0x40000130
18,604,861 UART:
18,605,093 UART: Running Caliptra FMC ...
18,606,124 UART:
18,606,272 UART: [state] CFI Enabled
18,665,975 UART: [fht] FMC Alias Private Key: 7
20,430,158 UART: [art] Extend RT PCRs Done
20,431,375 UART: [art] Lock RT PCRs Done
20,432,936 UART: [art] Populate DV Done
20,438,188 UART: [fht] FMC Alias Private Key: 7
20,439,776 UART: [art] Derive CDI
20,440,588 UART: [art] Store in in slot 0x4
20,498,910 UART: [art] Derive Key Pair
20,499,937 UART: [art] Store priv key in slot 0x5
22,962,715 UART: [art] Derive Key Pair - Done
22,975,427 UART: [art] Signing Cert with AUTHO
22,976,765 UART: RITY.KEYID = 7
24,688,728 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,236 UART: [art] PUB.X = 98372E9413F4CB8605D55B3B69798F3F4A95675544F2336BE20D7E626273F3401098337F308962654D6776103817AFA9
24,697,427 UART: [art] PUB.Y = BE9F727605E592589C41A604A08786243D04787416CB8F047E85920AB1609072207F92579908483DA4C6094B4624E4EF
24,704,660 UART: [art] SIG.R = 89BE64456ACDE3A9DCEED9DC4C6C5A9F979D337A5501DCE5305068C2907E0951B23A30F5CBEC08EA8DB781CF82881DE6
24,712,060 UART: [art] SIG.S = 6B0CCD55621BECA1E1EC180DD2DAAEC800BEEC7729B1F85646D2A02EB620C6EC7FDA208B297ACC0C21CBA12F4F8673E7
25,690,863 UART: Caliptra RT
25,691,553 UART: [state] CFI Enabled
25,856,109 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
5,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,292 UART:
192,664 UART: Running Caliptra ROM ...
193,864 UART:
194,020 UART: [state] CFI Enabled
259,870 UART: [state] LifecycleState = Unprovisioned
261,737 UART: [state] DebugLocked = No
263,985 UART: [state] WD Timer not started. Device not locked for debugging
268,317 UART: [kat] SHA2-256
447,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,991 UART: [kat] ++
459,441 UART: [kat] sha1
471,284 UART: [kat] SHA2-256
474,293 UART: [kat] SHA2-384
480,283 UART: [kat] SHA2-512-ACC
483,257 UART: [kat] ECC-384
2,946,461 UART: [kat] HMAC-384Kdf
2,971,012 UART: [kat] LMS
3,500,444 UART: [kat] --
3,502,697 UART: [cold-reset] ++
3,504,476 UART: [fht] FHT @ 0x50003400
3,515,489 UART: [idev] ++
3,516,058 UART: [idev] CDI.KEYID = 6
3,516,997 UART: [idev] SUBJECT.KEYID = 7
3,518,213 UART: [idev] UDS.KEYID = 0
3,541,859 UART: [idev] Erasing UDS.KEYID = 0
6,026,755 UART: [idev] Fuse KeyId
6,030,780 UART: [idev] --
6,034,504 UART: [ldev] ++
6,035,077 UART: [ldev] CDI.KEYID = 6
6,035,963 UART: [ldev] SUBJECT.KEYID = 5
6,037,177 UART: [ldev] AUTHORITY.KEYID = 7
6,038,415 UART: [ldev] FE.KEYID = 1
6,076,910 UART: [ldev] Erasing FE.KEYID = 1
8,579,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,974 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,366,772 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,387,327 UART: [ldev] --
10,391,669 UART: [fwproc] Wait for Commands...
10,393,717 UART: [fwproc] Recv command 0x46574c44
10,395,819 UART: [fwproc] Recv'd Img size: 114168 bytes
13,789,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,856,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,924,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,242,030 >>> mbox cmd response: success
14,246,341 UART: [afmc] ++
14,246,925 UART: [afmc] CDI.KEYID = 6
14,247,811 UART: [afmc] SUBJECT.KEYID = 7
14,248,964 UART: [afmc] AUTHORITY.KEYID = 5
16,778,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,509,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,524,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,867 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,579,697 UART: [afmc] --
18,583,678 UART: [cold-reset] --
18,589,054 UART: [state] Locking Datavault
18,592,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,448 UART: [state] Locking ICCM
18,596,110 UART: [exit] Launching FMC @ 0x40000130
18,604,506 UART:
18,604,739 UART: Running Caliptra FMC ...
18,605,839 UART:
18,605,997 UART: [state] CFI Enabled
18,665,566 UART: [fht] FMC Alias Private Key: 7
20,429,755 UART: [art] Extend RT PCRs Done
20,430,975 UART: [art] Lock RT PCRs Done
20,432,518 UART: [art] Populate DV Done
20,437,766 UART: [fht] FMC Alias Private Key: 7
20,439,466 UART: [art] Derive CDI
20,440,282 UART: [art] Store in in slot 0x4
20,490,179 UART: [art] Derive Key Pair
20,491,218 UART: [art] Store priv key in slot 0x5
22,954,243 UART: [art] Derive Key Pair - Done
22,967,067 UART: [art] Signing Cert with AUTHO
22,968,397 UART: RITY.KEYID = 7
24,679,583 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,094 UART: [art] PUB.X = A590854A7D0FAB1AEB543C363829E7828713F51107308AEE43B44189659DBFE1718A327417EEF1A577A7FE2F1271275A
24,688,286 UART: [art] PUB.Y = 4E11699FB71D44E57688E3816F2F5568BB553F6D9AED2A9D92412BAF1DD39BBF46BC018EEC806F0C05CF5698582E2736
24,695,581 UART: [art] SIG.R = FD88F88E8BB94BE2579FF7D9BC92CCF93B1CCBAED79996F7D5B345A72AEC3CA1B930EE12CFA2F5CB956CF6DECB4C2B07
24,703,052 UART: [art] SIG.S = BB1399B7515F2E833025CF75D0BBD36C61128E087CD14213ABD5C46440D1F76C49A261B0F459727F3355720D8A4D0EAC
25,681,845 UART: Caliptra RT
25,682,562 UART: [state] CFI Enabled
25,846,837 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
4,929 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,077,055 >>> mbox cmd response: success
18,360,842 UART:
18,361,276 UART: Running Caliptra FMC ...
18,362,433 UART:
18,362,587 UART: [state] CFI Enabled
18,427,707 UART: [fht] FMC Alias Private Key: 7
20,191,565 UART: [art] Extend RT PCRs Done
20,192,926 UART: [art] Lock RT PCRs Done
20,194,530 UART: [art] Populate DV Done
20,199,839 UART: [fht] FMC Alias Private Key: 7
20,201,335 UART: [art] Derive CDI
20,202,073 UART: [art] Store in in slot 0x4
20,260,201 UART: [art] Derive Key Pair
20,261,199 UART: [art] Store priv key in slot 0x5
22,723,938 UART: [art] Derive Key Pair - Done
22,736,939 UART: [art] Signing Cert with AUTHO
22,738,252 UART: RITY.KEYID = 7
24,449,543 UART: [art] Erasing AUTHORITY.KEYID = 7
24,451,072 UART: [art] PUB.X = 6F054BE1396A60A860D8A8B577B84C5F6705C01E13C4AAC7CE0667BF26AF51A051D526370DCBA96D0335B07FFA3414AA
24,458,328 UART: [art] PUB.Y = FF5782C76534FFFDAE889115991F3409E5DE824E9F4777D7CEF849749918957D428AD3B6E9826B1DBAFAC8F653D60CF8
24,465,537 UART: [art] SIG.R = 93090377F85A1F3B72F92C8B8D268B6403A7FC406C484D2BEED7F634B6061CA97652A261B19DC3FBB6202BCAA98F7F5E
24,472,922 UART: [art] SIG.S = 317182E52BF15667E8F6FB47148B8238DFAEA255CBC8505D1041BF3774718ACD86D192524018E79CB16DA2E34756D49B
25,451,825 UART: Caliptra RT
25,452,528 UART: [state] CFI Enabled
25,616,076 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
4,778 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,039,968 >>> mbox cmd response: success
18,319,573 UART:
18,319,962 UART: Running Caliptra FMC ...
18,321,160 UART:
18,321,343 UART: [state] CFI Enabled
18,386,071 UART: [fht] FMC Alias Private Key: 7
20,149,870 UART: [art] Extend RT PCRs Done
20,151,099 UART: [art] Lock RT PCRs Done
20,152,836 UART: [art] Populate DV Done
20,158,309 UART: [fht] FMC Alias Private Key: 7
20,159,821 UART: [art] Derive CDI
20,160,580 UART: [art] Store in in slot 0x4
20,218,059 UART: [art] Derive Key Pair
20,219,106 UART: [art] Store priv key in slot 0x5
22,682,244 UART: [art] Derive Key Pair - Done
22,695,797 UART: [art] Signing Cert with AUTHO
22,697,100 UART: RITY.KEYID = 7
24,407,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,408,980 UART: [art] PUB.X = 7BD3C755907E4783630A2D9F3871B2FDD34F8B60E4D49ACFBD07904D59CEE7A9032F1C0690C015A189E6DF401DE5A0B4
24,416,283 UART: [art] PUB.Y = 012A74367DFAC992BA2E53568C24E2F570D52CFD5F6547A4E09BFE0B0E1ACCF45336D79FF55D3DDACFB7F5E585A53E8E
24,423,544 UART: [art] SIG.R = EB3D66BB150F00255A669272E2A9E31523757282E6246F3A22B72073B2FEC1DFBE4D9CD27897037B5A002732EC66B793
24,430,914 UART: [art] SIG.S = 05D70A260AC5C7C1437C1FCA27B8114B2B0AB7BAE471BF23FD8B489CBA2F8DBF123453A2FDA7E5D5657FF3B022585994
25,410,225 UART: Caliptra RT
25,410,960 UART: [state] CFI Enabled
25,574,122 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
4,865 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,059,968 >>> mbox cmd response: success
18,342,373 UART:
18,342,771 UART: Running Caliptra FMC ...
18,343,923 UART:
18,344,084 UART: [state] CFI Enabled
18,410,361 UART: [fht] FMC Alias Private Key: 7
20,174,348 UART: [art] Extend RT PCRs Done
20,175,559 UART: [art] Lock RT PCRs Done
20,177,079 UART: [art] Populate DV Done
20,182,333 UART: [fht] FMC Alias Private Key: 7
20,183,981 UART: [art] Derive CDI
20,184,793 UART: [art] Store in in slot 0x4
20,242,729 UART: [art] Derive Key Pair
20,243,799 UART: [art] Store priv key in slot 0x5
22,706,821 UART: [art] Derive Key Pair - Done
22,719,613 UART: [art] Signing Cert with AUTHO
22,720,919 UART: RITY.KEYID = 7
24,432,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,670 UART: [art] PUB.X = EA5F099F6B30CA816CAB7F9356C23014215C37E5D2E9FFFD07CCFE057A7C7BCF1AFB90B333BF789E07672113E7D05E1D
24,440,994 UART: [art] PUB.Y = AC31E3FE2D149495C8C15D383FD6F1A10EE6DFFC818A8E9B423F6CC23A498CF7F0704457D7F54F13ECBD392928959706
24,448,242 UART: [art] SIG.R = 6D44DB460AD497EB0117831712846B5FF1C82EACD2823EBE5E80F061BA19B3C277BA64309F48B594451477713148BB59
24,455,634 UART: [art] SIG.S = 774EA645C8C0BB5D6BA6C0885BC02A4EF56D540B819DA7D757EFD443876948EEA6229590B71B9FD7E3FC0984D43E4536
25,433,957 UART: Caliptra RT
25,434,653 UART: [state] CFI Enabled
25,600,501 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,017 writing to cptra_bootfsm_go
6,094 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,052,086 >>> mbox cmd response: success
18,343,419 UART:
18,343,813 UART: Running Caliptra FMC ...
18,344,941 UART:
18,345,104 UART: [state] CFI Enabled
18,408,917 UART: [fht] FMC Alias Private Key: 7
20,172,485 UART: [art] Extend RT PCRs Done
20,173,710 UART: [art] Lock RT PCRs Done
20,175,626 UART: [art] Populate DV Done
20,180,934 UART: [fht] FMC Alias Private Key: 7
20,182,418 UART: [art] Derive CDI
20,183,156 UART: [art] Store in in slot 0x4
20,242,050 UART: [art] Derive Key Pair
20,243,095 UART: [art] Store priv key in slot 0x5
22,705,748 UART: [art] Derive Key Pair - Done
22,718,694 UART: [art] Signing Cert with AUTHO
22,720,005 UART: RITY.KEYID = 7
24,432,113 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,623 UART: [art] PUB.X = 6C29C7B4202D276CC918B6FF3EE6126BEA90CCFC75CF2D9308CB0E44B2F2386290F71C1397011E0915C88D8E3600136D
24,440,873 UART: [art] PUB.Y = E97F433423321F6BE1E1B74356B4B533428D6B646587C6B21710F9C7A0B62F1FAF8ACA9C30EFDA893D3C17BBE91FAEE8
24,448,134 UART: [art] SIG.R = AA8B49BB9D79C8AB7949432B56995AE802D6A6D0E7A9DD27D9661005072B2445C296D9154E6DF19F14C526C3045FB015
24,455,525 UART: [art] SIG.S = 5693F5AF281F883CEE00B19737632A9E8E2C4440135E8830F4A74DD6FD058DA919011EE712F6C51529E68446A8C2ABDB
25,433,999 UART: Caliptra RT
25,434,690 UART: [state] CFI Enabled
25,601,107 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,782,739 UART: [state] Locking Datavault
18,788,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,859 UART: [state] Locking ICCM
18,791,794 UART: [exit] Launching FMC @ 0x40000130
18,800,249 UART:
18,800,482 UART: Running Caliptra FMC ...
18,801,578 UART:
18,801,737 UART: [state] CFI Enabled
18,809,776 UART: [fht] FMC Alias Private Key: 7
20,566,588 UART: [art] Extend RT PCRs Done
20,567,806 UART: [art] Lock RT PCRs Done
20,569,415 UART: [art] Populate DV Done
20,575,039 UART: [fht] FMC Alias Private Key: 7
20,576,578 UART: [art] Derive CDI
20,577,312 UART: [art] Store in in slot 0x4
20,620,165 UART: [art] Derive Key Pair
20,621,162 UART: [art] Store priv key in slot 0x5
23,048,216 UART: [art] Derive Key Pair - Done
23,060,950 UART: [art] Signing Cert with AUTHO
23,062,250 UART: RITY.KEYID = 7
24,767,639 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,142 UART: [art] PUB.X = 7888F7712ADAABC81334AEA7E2CED89A86DBB568246F8EE4A3CACFCCE1A1D435BF125CCFD525E4D49BAD85EED8497F6C
24,776,455 UART: [art] PUB.Y = E70076B6F312C420317161D8869AF49733E28B3F3298F2C8ECEC77CF5E759ED98DB82ED1EBC4EBF64D1AAF127F581E4B
24,783,741 UART: [art] SIG.R = 2CE534B4EB52B1947786D6A354D4304A1204FB51241792E7FA9D5BA59A7A2949377DEEAF1CD0B9D7FCBC05FF6B866DA9
24,791,141 UART: [art] SIG.S = 5D637F72AAA7B269E3E73AD7FA845AC8493DCCB9B46410A75A100D1840CDAC73E9389AA6DA579E7DEE3887BE390261FF
25,771,051 UART: Caliptra RT
25,771,744 UART: [state] CFI Enabled
25,888,423 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
5,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,476 UART:
192,855 UART: Running Caliptra ROM ...
194,020 UART:
603,732 UART: [state] CFI Enabled
617,042 UART: [state] LifecycleState = Unprovisioned
618,946 UART: [state] DebugLocked = No
620,213 UART: [state] WD Timer not started. Device not locked for debugging
623,230 UART: [kat] SHA2-256
802,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,913 UART: [kat] ++
814,502 UART: [kat] sha1
824,787 UART: [kat] SHA2-256
827,845 UART: [kat] SHA2-384
833,270 UART: [kat] SHA2-512-ACC
836,252 UART: [kat] ECC-384
3,279,154 UART: [kat] HMAC-384Kdf
3,292,240 UART: [kat] LMS
3,821,703 UART: [kat] --
3,827,074 UART: [cold-reset] ++
3,827,872 UART: [fht] FHT @ 0x50003400
3,839,714 UART: [idev] ++
3,840,277 UART: [idev] CDI.KEYID = 6
3,841,186 UART: [idev] SUBJECT.KEYID = 7
3,842,406 UART: [idev] UDS.KEYID = 0
3,861,317 UART: [idev] Erasing UDS.KEYID = 0
6,317,366 UART: [idev] Sha384 KeyId Algorithm
6,325,758 UART: [idev] --
6,330,282 UART: [ldev] ++
6,330,845 UART: [ldev] CDI.KEYID = 6
6,331,728 UART: [ldev] SUBJECT.KEYID = 5
6,332,940 UART: [ldev] AUTHORITY.KEYID = 7
6,334,219 UART: [ldev] FE.KEYID = 1
6,343,726 UART: [ldev] Erasing FE.KEYID = 1
8,817,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,533,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,549,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,564,920 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,580,695 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,600,255 UART: [ldev] --
10,604,055 UART: [fwproc] Wait for Commands...
10,606,809 UART: [fwproc] Recv command 0x46574c44
10,608,917 UART: [fwproc] Recv'd Img size: 114168 bytes
14,009,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,082,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,151,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,468,010 >>> mbox cmd response: success
14,471,937 UART: [afmc] ++
14,472,518 UART: [afmc] CDI.KEYID = 6
14,473,398 UART: [afmc] SUBJECT.KEYID = 7
14,474,609 UART: [afmc] AUTHORITY.KEYID = 5
16,970,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,691,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,693,049 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,708,787 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,724,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,740,668 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,763,854 UART: [afmc] --
18,768,366 UART: [cold-reset] --
18,773,347 UART: [state] Locking Datavault
18,777,956 UART: [state] Locking PCR0, PCR1 and PCR31
18,779,599 UART: [state] Locking ICCM
18,781,747 UART: [exit] Launching FMC @ 0x40000130
18,790,140 UART:
18,790,371 UART: Running Caliptra FMC ...
18,791,467 UART:
18,791,621 UART: [state] CFI Enabled
18,800,146 UART: [fht] FMC Alias Private Key: 7
20,557,068 UART: [art] Extend RT PCRs Done
20,558,291 UART: [art] Lock RT PCRs Done
20,559,914 UART: [art] Populate DV Done
20,565,538 UART: [fht] FMC Alias Private Key: 7
20,567,016 UART: [art] Derive CDI
20,567,797 UART: [art] Store in in slot 0x4
20,610,558 UART: [art] Derive Key Pair
20,611,598 UART: [art] Store priv key in slot 0x5
23,038,372 UART: [art] Derive Key Pair - Done
23,051,590 UART: [art] Signing Cert with AUTHO
23,052,898 UART: RITY.KEYID = 7
24,758,622 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,132 UART: [art] PUB.X = 504B6FD13BBFDAFF8DCD3311D631E0DB6DEB038D470DE2B3E8C15F38AED92FEBB531AFE31860B194D6865B5D798166F5
24,767,422 UART: [art] PUB.Y = 95BB9CD7805518C606C88D677EB0E3BC447727A1D640BD9ABB4204349290B60023C8A2D82CA52DA4BFA4414D37614487
24,774,623 UART: [art] SIG.R = A800C8846542957B086640091AF835C439E7E4A558E3CAB3AED741994BFCD39BC8F25180860B4980AA87BA5F993396C6
24,781,968 UART: [art] SIG.S = F3794F746EC1647D9E6B42B7ED008B2C4DAAA897E5DD809BB0FEA4977576A0D68425EA0BA5D6700BB45004AD788734D4
25,760,835 UART: Caliptra RT
25,761,549 UART: [state] CFI Enabled
25,877,916 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
5,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,408 UART:
192,779 UART: Running Caliptra ROM ...
193,856 UART:
603,548 UART: [state] CFI Enabled
617,117 UART: [state] LifecycleState = Unprovisioned
618,958 UART: [state] DebugLocked = No
620,740 UART: [state] WD Timer not started. Device not locked for debugging
623,698 UART: [kat] SHA2-256
802,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,374 UART: [kat] ++
814,814 UART: [kat] sha1
826,388 UART: [kat] SHA2-256
829,435 UART: [kat] SHA2-384
835,630 UART: [kat] SHA2-512-ACC
838,616 UART: [kat] ECC-384
3,278,848 UART: [kat] HMAC-384Kdf
3,292,052 UART: [kat] LMS
3,821,523 UART: [kat] --
3,826,647 UART: [cold-reset] ++
3,829,168 UART: [fht] FHT @ 0x50003400
3,839,014 UART: [idev] ++
3,839,603 UART: [idev] CDI.KEYID = 6
3,840,513 UART: [idev] SUBJECT.KEYID = 7
3,841,669 UART: [idev] UDS.KEYID = 0
3,858,666 UART: [idev] Erasing UDS.KEYID = 0
6,315,694 UART: [idev] Fuse KeyId
6,319,658 UART: [idev] --
6,324,396 UART: [ldev] ++
6,324,960 UART: [ldev] CDI.KEYID = 6
6,325,864 UART: [ldev] SUBJECT.KEYID = 5
6,327,072 UART: [ldev] AUTHORITY.KEYID = 7
6,328,303 UART: [ldev] FE.KEYID = 1
6,339,700 UART: [ldev] Erasing FE.KEYID = 1
8,815,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,172 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,584,977 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,603,795 UART: [ldev] --
10,608,462 UART: [fwproc] Wait for Commands...
10,610,446 UART: [fwproc] Recv command 0x46574c44
10,612,534 UART: [fwproc] Recv'd Img size: 114168 bytes
14,018,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,477,971 >>> mbox cmd response: success
14,481,872 UART: [afmc] ++
14,482,459 UART: [afmc] CDI.KEYID = 6
14,483,367 UART: [afmc] SUBJECT.KEYID = 7
14,484,523 UART: [afmc] AUTHORITY.KEYID = 5
16,985,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,511 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,476 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,315 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,273 UART: [afmc] --
18,782,272 UART: [cold-reset] --
18,786,614 UART: [state] Locking Datavault
18,790,777 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,425 UART: [state] Locking ICCM
18,794,356 UART: [exit] Launching FMC @ 0x40000130
18,802,753 UART:
18,802,984 UART: Running Caliptra FMC ...
18,804,080 UART:
18,804,239 UART: [state] CFI Enabled
18,812,280 UART: [fht] FMC Alias Private Key: 7
20,569,052 UART: [art] Extend RT PCRs Done
20,570,281 UART: [art] Lock RT PCRs Done
20,571,978 UART: [art] Populate DV Done
20,577,125 UART: [fht] FMC Alias Private Key: 7
20,578,824 UART: [art] Derive CDI
20,579,561 UART: [art] Store in in slot 0x4
20,622,601 UART: [art] Derive Key Pair
20,623,646 UART: [art] Store priv key in slot 0x5
23,050,716 UART: [art] Derive Key Pair - Done
23,063,652 UART: [art] Signing Cert with AUTHO
23,064,984 UART: RITY.KEYID = 7
24,770,689 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,192 UART: [art] PUB.X = 2AA1C35BEB37384C78C6CE3FC687FFC47E8BCF427A4F88D25D465A975EF3E6DF6661B714A6E7150EE7EA0D1F0D8D2837
24,779,496 UART: [art] PUB.Y = 290D253A1E90EFE8672CC3B51F3EF7FBB1A6EF8DCDB92BADB1B1665D1294FC68F19E46D70501F1726B6513B66079214B
24,786,784 UART: [art] SIG.R = ADF6D1621A8814F123F6BA40429043DE461C87E44D13CCD06B95F4B7A044089CFE8150C835881948202CCC1E0157A2A6
24,794,127 UART: [art] SIG.S = E11E131A534312F11321CA321F7FCDD586B5BDD60F18E2084AF2D75BE1E15E66B7E3E34078482C1EA1222E844619B7F7
25,773,817 UART: Caliptra RT
25,774,518 UART: [state] CFI Enabled
25,891,506 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,930 writing to cptra_bootfsm_go
6,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,278,255 >>> mbox cmd response: success
18,533,503 UART:
18,533,920 UART: Running Caliptra FMC ...
18,535,172 UART:
18,535,347 UART: [state] CFI Enabled
18,543,164 UART: [fht] FMC Alias Private Key: 7
20,300,058 UART: [art] Extend RT PCRs Done
20,301,293 UART: [art] Lock RT PCRs Done
20,302,921 UART: [art] Populate DV Done
20,308,112 UART: [fht] FMC Alias Private Key: 7
20,309,646 UART: [art] Derive CDI
20,310,473 UART: [art] Store in in slot 0x4
20,352,796 UART: [art] Derive Key Pair
20,353,831 UART: [art] Store priv key in slot 0x5
22,780,287 UART: [art] Derive Key Pair - Done
22,793,124 UART: [art] Signing Cert with AUTHO
22,794,421 UART: RITY.KEYID = 7
24,500,091 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,599 UART: [art] PUB.X = 0E18DAB459A5B19724281943EE0A75EDB059CBAD590CAE9C6D44BF5BD55A31A880E8FC365BEDBC7BBEA2661437D7B7A9
24,508,919 UART: [art] PUB.Y = 14DF900B247D751267E2E651BA97DFBD83932783FF5C81B6CCC35FD004995136C30CF1472B705213EEB06BE92760C876
24,516,139 UART: [art] SIG.R = 5B09A363B6FAC36382F287039F673D4F1B08C5072CB0186E949F61AB774D3B14F001ABF57B262EE3A4374BA4CE004AA0
24,523,494 UART: [art] SIG.S = 9F83BEEB6423ACCC457DAC89D5F7D8545CFC9BCE4B433B98D08A3A9BE6E5B49EF635A4643AD2C47F65DD26623A7ACB01
25,502,860 UART: Caliptra RT
25,503,571 UART: [state] CFI Enabled
25,620,596 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
7,094 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,272,546 >>> mbox cmd response: success
18,514,122 UART:
18,514,524 UART: Running Caliptra FMC ...
18,515,658 UART:
18,515,808 UART: [state] CFI Enabled
18,524,006 UART: [fht] FMC Alias Private Key: 7
20,281,119 UART: [art] Extend RT PCRs Done
20,282,344 UART: [art] Lock RT PCRs Done
20,284,058 UART: [art] Populate DV Done
20,289,526 UART: [fht] FMC Alias Private Key: 7
20,291,021 UART: [art] Derive CDI
20,291,790 UART: [art] Store in in slot 0x4
20,334,584 UART: [art] Derive Key Pair
20,335,616 UART: [art] Store priv key in slot 0x5
22,762,271 UART: [art] Derive Key Pair - Done
22,774,936 UART: [art] Signing Cert with AUTHO
22,776,233 UART: RITY.KEYID = 7
24,481,604 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,100 UART: [art] PUB.X = A1609CA1DD5D1F089B055AD3B8D4E0B8A3842D097EFE9DB349965DB7DE20F3587EE9217B539C1ABC5B2A94A2F062E80B
24,490,480 UART: [art] PUB.Y = DFF5761A72361FE05284DCF5D78E234FDDF3F27CE09F14042FB66E393E61BBEA2DEBE3C2BDE22381651A0241B27BE584
24,497,719 UART: [art] SIG.R = 263FB58AC0DBFC6584BA0530EDDCD433F25C8E956F362A2BBDE2C734CA9642DBAB1245B1AC30722FF4A396D0211B519E
24,505,079 UART: [art] SIG.S = 95B6BCC83F1DED19042A9496B91F2E3696859542D64A182BCBB759D7D16B78C91013845929034D325BBBE8E808615427
25,484,292 UART: Caliptra RT
25,484,983 UART: [state] CFI Enabled
25,601,926 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
5,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,251,765 >>> mbox cmd response: success
18,503,093 UART:
18,503,502 UART: Running Caliptra FMC ...
18,504,653 UART:
18,504,818 UART: [state] CFI Enabled
18,513,132 UART: [fht] FMC Alias Private Key: 7
20,269,593 UART: [art] Extend RT PCRs Done
20,270,823 UART: [art] Lock RT PCRs Done
20,272,394 UART: [art] Populate DV Done
20,277,975 UART: [fht] FMC Alias Private Key: 7
20,279,459 UART: [art] Derive CDI
20,280,219 UART: [art] Store in in slot 0x4
20,322,997 UART: [art] Derive Key Pair
20,323,988 UART: [art] Store priv key in slot 0x5
22,751,180 UART: [art] Derive Key Pair - Done
22,764,346 UART: [art] Signing Cert with AUTHO
22,765,654 UART: RITY.KEYID = 7
24,471,239 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,749 UART: [art] PUB.X = 0CD761D131D1E7144566EBEA5CE8E6C996BAA81C8EB85EADB559BBFED904E28958610FBD753E6B1D69C18358A7390FBD
24,480,069 UART: [art] PUB.Y = 9818C6E2C4218389F5ACECF29DE64CE2FE9FBB0AD8D9658A65A00EECD3745209DDF3E847DDF2265AAC028A4C109DDEF2
24,487,358 UART: [art] SIG.R = FDF81CA6D790E2A1DE60439FE2198118BD3EFA40F4E97A77402794812CCCC3E2E38BC2AB1B9BA250C56F4C79EB973C66
24,494,762 UART: [art] SIG.S = 8A46D914B708AE2FBD475CCF0B0E50A5E2729A068A835A9E0BC168B2CFB9DC6471DF747B6217B66EC474D645CC5E58FE
25,474,104 UART: Caliptra RT
25,474,795 UART: [state] CFI Enabled
25,591,851 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,503 writing to cptra_bootfsm_go
5,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,850 >>> mbox cmd response: success
18,511,625 UART:
18,512,041 UART: Running Caliptra FMC ...
18,513,152 UART:
18,513,305 UART: [state] CFI Enabled
18,521,519 UART: [fht] FMC Alias Private Key: 7
20,278,592 UART: [art] Extend RT PCRs Done
20,279,812 UART: [art] Lock RT PCRs Done
20,281,571 UART: [art] Populate DV Done
20,286,979 UART: [fht] FMC Alias Private Key: 7
20,288,738 UART: [art] Derive CDI
20,289,475 UART: [art] Store in in slot 0x4
20,332,057 UART: [art] Derive Key Pair
20,333,091 UART: [art] Store priv key in slot 0x5
22,759,443 UART: [art] Derive Key Pair - Done
22,772,540 UART: [art] Signing Cert with AUTHO
22,773,872 UART: RITY.KEYID = 7
24,479,350 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,858 UART: [art] PUB.X = D448CEEECCAFBF5CB248CE3C6CB303C85F6AAD491C8355051F2A8F4FD5F4DB6A3EB1C540D47DC4DEFCA2DC99680A87CC
24,488,121 UART: [art] PUB.Y = AF5780B30BEDEA0F541127E37B93F2D7A8C93E3703DFA96144A8C35870E92EA94C0487A69B835248AFBE1D6DB202CDC4
24,495,398 UART: [art] SIG.R = E04A0F9179C881F91AB2935D824FB9219DAD067D10F628B5E5824892079049FF03A4406556B46F21B65A660B912EDA13
24,502,754 UART: [art] SIG.S = 9B62D9F287E05916FD28CA9D8BF8B679A5A349C45B0AA267C59C76F0AAD0C607E87382BE38E451C15379E63DCB7E3183
25,481,243 UART: Caliptra RT
25,481,951 UART: [state] CFI Enabled
25,599,123 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,609,010 UART: [state] Locking Datavault
18,614,853 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,506 UART: [state] Locking ICCM
18,618,976 UART: [exit] Launching FMC @ 0x40000130
18,627,373 UART:
18,627,607 UART: Running Caliptra FMC ...
18,628,705 UART:
18,628,860 UART: [state] CFI Enabled
18,685,545 UART: [fht] FMC Alias Private Key: 7
20,449,496 UART: [art] Extend RT PCRs Done
20,450,732 UART: [art] Lock RT PCRs Done
20,452,147 UART: [art] Populate DV Done
20,457,505 UART: [fht] FMC Alias Private Key: 7
20,459,202 UART: [art] Derive CDI
20,460,016 UART: [art] Store in in slot 0x4
20,517,822 UART: [art] Derive Key Pair
20,518,856 UART: [art] Store priv key in slot 0x5
22,981,477 UART: [art] Derive Key Pair - Done
22,994,740 UART: [art] Signing Cert with AUTHO
22,996,071 UART: RITY.KEYID = 7
24,706,793 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,301 UART: [art] PUB.X = EC1FB7DA53D637EEFA300981E1AC6C644C32EEC08DF9965107976DDB7E6B3BD2CA4FE409BAA75F870A5EC564CC5C8ECA
24,715,606 UART: [art] PUB.Y = 7C5C8CFCB3F4841192F9830F735D1B028A8F4401BD33AFE021495F3A25B0BA743FA050FF0C72622D2E8B404C811544B0
24,722,898 UART: [art] SIG.R = CBE8BEFDBF25BAF96555BA224C78F3D54A28D8459640B7D5837EFEB8561C7DE94492C89A236EC495B1E5562C49CF53ED
24,730,291 UART: [art] SIG.S = 073FE64963A56B32D3A2EC035ABA1EA4737C5EFF6A4D4F146B043C84EA7C8DDCD28CCD5CC5DB2726E1DB05BAEE11201E
25,709,070 UART: Caliptra RT
25,709,808 UART: [state] CFI Enabled
25,873,322 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
4,752 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,075 UART:
192,476 UART: Running Caliptra ROM ...
193,554 UART:
193,699 UART: [state] CFI Enabled
265,505 UART: [state] LifecycleState = Unprovisioned
267,373 UART: [state] DebugLocked = No
270,074 UART: [state] WD Timer not started. Device not locked for debugging
273,588 UART: [kat] SHA2-256
452,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,326 UART: [kat] ++
464,772 UART: [kat] sha1
475,864 UART: [kat] SHA2-256
478,871 UART: [kat] SHA2-384
485,660 UART: [kat] SHA2-512-ACC
488,649 UART: [kat] ECC-384
2,948,402 UART: [kat] HMAC-384Kdf
2,971,523 UART: [kat] LMS
3,501,002 UART: [kat] --
3,506,527 UART: [cold-reset] ++
3,508,672 UART: [fht] FHT @ 0x50003400
3,519,429 UART: [idev] ++
3,519,997 UART: [idev] CDI.KEYID = 6
3,520,934 UART: [idev] SUBJECT.KEYID = 7
3,522,146 UART: [idev] UDS.KEYID = 0
3,543,391 UART: [idev] Erasing UDS.KEYID = 0
6,025,742 UART: [idev] Sha384 KeyId Algorithm
6,035,282 UART: [idev] --
6,039,390 UART: [ldev] ++
6,039,963 UART: [ldev] CDI.KEYID = 6
6,040,847 UART: [ldev] SUBJECT.KEYID = 5
6,042,063 UART: [ldev] AUTHORITY.KEYID = 7
6,043,300 UART: [ldev] FE.KEYID = 1
6,077,523 UART: [ldev] Erasing FE.KEYID = 1
8,583,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,796 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,365,644 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,386,821 UART: [ldev] --
10,391,548 UART: [fwproc] Wait for Commands...
10,393,872 UART: [fwproc] Recv command 0x46574c44
10,395,912 UART: [fwproc] Recv'd Img size: 114168 bytes
13,797,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,255,486 >>> mbox cmd response: success
14,259,031 UART: [afmc] ++
14,259,623 UART: [afmc] CDI.KEYID = 6
14,260,530 UART: [afmc] SUBJECT.KEYID = 7
14,261,693 UART: [afmc] AUTHORITY.KEYID = 5
16,784,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,077 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,525,814 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,541,865 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,557,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,581,095 UART: [afmc] --
18,584,839 UART: [cold-reset] --
18,589,247 UART: [state] Locking Datavault
18,596,490 UART: [state] Locking PCR0, PCR1 and PCR31
18,598,136 UART: [state] Locking ICCM
18,599,746 UART: [exit] Launching FMC @ 0x40000130
18,608,199 UART:
18,608,430 UART: Running Caliptra FMC ...
18,609,550 UART:
18,609,707 UART: [state] CFI Enabled
18,666,767 UART: [fht] FMC Alias Private Key: 7
20,430,851 UART: [art] Extend RT PCRs Done
20,432,065 UART: [art] Lock RT PCRs Done
20,433,737 UART: [art] Populate DV Done
20,439,150 UART: [fht] FMC Alias Private Key: 7
20,440,695 UART: [art] Derive CDI
20,441,428 UART: [art] Store in in slot 0x4
20,499,923 UART: [art] Derive Key Pair
20,500,951 UART: [art] Store priv key in slot 0x5
22,963,608 UART: [art] Derive Key Pair - Done
22,976,433 UART: [art] Signing Cert with AUTHO
22,977,768 UART: RITY.KEYID = 7
24,689,714 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,211 UART: [art] PUB.X = 84985308D752E8DBACCF36F44C8DB8D5DF21A50BBDDB19B08B636C8B665E782E4F5BE0A77BD52E8FDEF07057E0B4BE51
24,698,535 UART: [art] PUB.Y = 3955CF3A5FFF1A0FC25E729BD006D3C4C1488BF0B8B2D741C07D7EC78357429ED8A9121B9898C311CF4559958C0DF233
24,705,767 UART: [art] SIG.R = 988A0648B85BAFC7942861DC6C4CB153222C35C3D53E651F40B3ECFFF8EE8D9FB93F94D79D36BBA6657379F2E98E437A
24,713,212 UART: [art] SIG.S = CEB218D297F4D0B7E1A6C01B489E31EA86A1C16BD318F12373B463ED7FEED22490FAFA092CBD92D445F0D26DFA58887D
25,692,357 UART: Caliptra RT
25,693,043 UART: [state] CFI Enabled
25,858,108 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
4,791 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,080 UART:
192,470 UART: Running Caliptra ROM ...
193,555 UART:
193,696 UART: [state] CFI Enabled
259,286 UART: [state] LifecycleState = Unprovisioned
261,208 UART: [state] DebugLocked = No
263,533 UART: [state] WD Timer not started. Device not locked for debugging
266,900 UART: [kat] SHA2-256
445,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,567 UART: [kat] ++
458,106 UART: [kat] sha1
469,368 UART: [kat] SHA2-256
472,379 UART: [kat] SHA2-384
478,050 UART: [kat] SHA2-512-ACC
481,045 UART: [kat] ECC-384
2,927,593 UART: [kat] HMAC-384Kdf
2,950,705 UART: [kat] LMS
3,480,118 UART: [kat] --
3,484,600 UART: [cold-reset] ++
3,486,426 UART: [fht] FHT @ 0x50003400
3,498,328 UART: [idev] ++
3,498,892 UART: [idev] CDI.KEYID = 6
3,499,797 UART: [idev] SUBJECT.KEYID = 7
3,501,015 UART: [idev] UDS.KEYID = 0
3,522,555 UART: [idev] Erasing UDS.KEYID = 0
6,006,655 UART: [idev] Fuse KeyId
6,010,637 UART: [idev] --
6,015,860 UART: [ldev] ++
6,016,455 UART: [ldev] CDI.KEYID = 6
6,017,392 UART: [ldev] SUBJECT.KEYID = 5
6,018,560 UART: [ldev] AUTHORITY.KEYID = 7
6,019,795 UART: [ldev] FE.KEYID = 1
6,056,540 UART: [ldev] Erasing FE.KEYID = 1
8,557,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,770 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,323,520 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,344,826 UART: [ldev] --
10,348,814 UART: [fwproc] Wait for Commands...
10,350,482 UART: [fwproc] Recv command 0x46574c44
10,352,584 UART: [fwproc] Recv'd Img size: 114168 bytes
13,756,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,832,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,901,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,217,732 >>> mbox cmd response: success
14,221,929 UART: [afmc] ++
14,222,518 UART: [afmc] CDI.KEYID = 6
14,223,402 UART: [afmc] SUBJECT.KEYID = 7
14,224,620 UART: [afmc] AUTHORITY.KEYID = 5
16,763,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,487,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,489,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,505,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,521,235 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,537,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,559,847 UART: [afmc] --
18,562,899 UART: [cold-reset] --
18,567,296 UART: [state] Locking Datavault
18,572,768 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,508 UART: [state] Locking ICCM
18,576,904 UART: [exit] Launching FMC @ 0x40000130
18,585,307 UART:
18,585,543 UART: Running Caliptra FMC ...
18,586,646 UART:
18,586,809 UART: [state] CFI Enabled
18,648,079 UART: [fht] FMC Alias Private Key: 7
20,412,277 UART: [art] Extend RT PCRs Done
20,413,490 UART: [art] Lock RT PCRs Done
20,415,298 UART: [art] Populate DV Done
20,420,764 UART: [fht] FMC Alias Private Key: 7
20,422,462 UART: [art] Derive CDI
20,423,274 UART: [art] Store in in slot 0x4
20,480,753 UART: [art] Derive Key Pair
20,481,753 UART: [art] Store priv key in slot 0x5
22,944,769 UART: [art] Derive Key Pair - Done
22,958,042 UART: [art] Signing Cert with AUTHO
22,959,369 UART: RITY.KEYID = 7
24,670,710 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,215 UART: [art] PUB.X = 13E8BBAD6EA25509150C181590D2EB278A32129AC1397601AC1F24E0EC44C1F2D02D4B4915193DE3B37772869B4565CB
24,679,461 UART: [art] PUB.Y = 4CDB8B13B0982046419A7B6AADDB044291D99CD5705EE6029B9C4836803AA3E1EB4C496BD1CFFB64272A6E9A249E2AA7
24,686,748 UART: [art] SIG.R = 5F7C6FE6AB5D74A2CEF5AB4DB3EC1B3D0E6BD964B4B57FEFA28987D8C09E6778EF7EA1F681E6F97B011F742911015E92
24,694,146 UART: [art] SIG.S = AF72B0A576C311AEE8A45D5B8E88615CF6865F5D3682D1A4A03B57880A407AC21A3571C8BE3BD589C1C7EF9B490C4CA5
25,673,234 UART: Caliptra RT
25,673,952 UART: [state] CFI Enabled
25,840,103 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
5,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,072,329 >>> mbox cmd response: success
18,370,085 UART:
18,370,518 UART: Running Caliptra FMC ...
18,371,705 UART:
18,371,869 UART: [state] CFI Enabled
18,437,448 UART: [fht] FMC Alias Private Key: 7
20,201,576 UART: [art] Extend RT PCRs Done
20,203,311 UART: [art] Lock RT PCRs Done
20,204,321 UART: [art] Populate DV Done
20,209,456 UART: [fht] FMC Alias Private Key: 7
20,211,001 UART: [art] Derive CDI
20,211,776 UART: [art] Store in in slot 0x4
20,272,061 UART: [art] Derive Key Pair
20,273,116 UART: [art] Store priv key in slot 0x5
22,736,312 UART: [art] Derive Key Pair - Done
22,749,453 UART: [art] Signing Cert with AUTHO
22,750,759 UART: RITY.KEYID = 7
24,461,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,463,333 UART: [art] PUB.X = E8C678F6BB824F553DE428466D8D1EC207A68F6BF40E8C5E299B95DC503987D07A869E1B3E018DC5AF4E66F1F6099384
24,470,630 UART: [art] PUB.Y = 86CA3CDA4D64A4903219BA5F1F287BC595CBF10064A4DCEB3834FF0D474345791D328D16E2AD7B4CCEE020C1E40FBC9E
24,477,889 UART: [art] SIG.R = 88099CE931889247CC9E80998C0250793AD2D5800D34EA6B1E2494D81F797483371965E6DD50DFF34370A37C44116091
24,485,230 UART: [art] SIG.S = 06FC1ED6B12AA7289C97B28C214DB3A00A3F058C6F9E7D57645C68EFA9B3CF6EFC90DB559177A25D5502311F136B6E0C
25,464,112 UART: Caliptra RT
25,464,832 UART: [state] CFI Enabled
25,628,156 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
5,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,059,142 >>> mbox cmd response: success
18,342,376 UART:
18,342,784 UART: Running Caliptra FMC ...
18,343,989 UART:
18,344,162 UART: [state] CFI Enabled
18,412,776 UART: [fht] FMC Alias Private Key: 7
20,176,269 UART: [art] Extend RT PCRs Done
20,177,494 UART: [art] Lock RT PCRs Done
20,179,116 UART: [art] Populate DV Done
20,184,316 UART: [fht] FMC Alias Private Key: 7
20,185,861 UART: [art] Derive CDI
20,186,680 UART: [art] Store in in slot 0x4
20,245,400 UART: [art] Derive Key Pair
20,246,443 UART: [art] Store priv key in slot 0x5
22,709,474 UART: [art] Derive Key Pair - Done
22,722,046 UART: [art] Signing Cert with AUTHO
22,723,385 UART: RITY.KEYID = 7
24,435,131 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,635 UART: [art] PUB.X = 844FBE8A7121F3CCB5E07E1B3BE005E50B9BB4F701B09C28FAD5EB6E840D6F7803F4B5AB1B4BECF92EBDAC6B2EFAA4AB
24,443,937 UART: [art] PUB.Y = 5F7570E3416D640FB95099458CF7E6D08923522DD95EE34DA42A0DD5E71F74A12E3045E59BEE77EE40DFA16F11EAF726
24,451,207 UART: [art] SIG.R = E8CAB7D5125755A511DC7C5DF6FE906BF77B9911E8079ED42829D4935D9DC16DC7A9468F1BF758FBC21A3C28046C8589
24,458,604 UART: [art] SIG.S = 053C24A5237FBBDE2FA547574957B631215024BDC9226BB84D63088D6C11ABEF8B06F478CE6A4DADD0B73A21F6D7B871
25,437,866 UART: Caliptra RT
25,438,574 UART: [state] CFI Enabled
25,603,917 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
5,073 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,046,422 >>> mbox cmd response: success
18,340,360 UART:
18,340,750 UART: Running Caliptra FMC ...
18,341,954 UART:
18,342,137 UART: [state] CFI Enabled
18,409,966 UART: [fht] FMC Alias Private Key: 7
20,174,475 UART: [art] Extend RT PCRs Done
20,175,695 UART: [art] Lock RT PCRs Done
20,177,425 UART: [art] Populate DV Done
20,182,566 UART: [fht] FMC Alias Private Key: 7
20,184,270 UART: [art] Derive CDI
20,185,086 UART: [art] Store in in slot 0x4
20,242,505 UART: [art] Derive Key Pair
20,243,546 UART: [art] Store priv key in slot 0x5
22,706,518 UART: [art] Derive Key Pair - Done
22,719,644 UART: [art] Signing Cert with AUTHO
22,720,984 UART: RITY.KEYID = 7
24,432,007 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,524 UART: [art] PUB.X = 1802657B3A6BDF7A7AD92DDE19D31DADBEF8ADB37991B3CD555DFEC63E3EBE041DC4A574B71CE0B22A09794C22BA56DE
24,440,828 UART: [art] PUB.Y = 02DBA74C042F32B957F10C30C1F60555A828519267CDEC18694006C9444FFB0011645750884F53952646CE8FE6986A28
24,448,027 UART: [art] SIG.R = A5C8D499E7EBD06ADBE08BAD99909B6049C722D3945FE12EBC99FC9E5183AC68B33718FD05FBDA0389C2DA1B65A19024
24,455,427 UART: [art] SIG.S = 8353298D51DF4E7BD5059D9DE42554B8818CAB3ADD3A983624661326EA88134EB208DF6DA8E98A938796767C98750E65
25,434,653 UART: Caliptra RT
25,435,366 UART: [state] CFI Enabled
25,599,394 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
4,656 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,560 >>> mbox cmd response: success
18,365,852 UART:
18,366,429 UART: Running Caliptra FMC ...
18,367,568 UART:
18,367,730 UART: [state] CFI Enabled
18,435,696 UART: [fht] FMC Alias Private Key: 7
20,199,400 UART: [art] Extend RT PCRs Done
20,200,619 UART: [art] Lock RT PCRs Done
20,202,612 UART: [art] Populate DV Done
20,208,137 UART: [fht] FMC Alias Private Key: 7
20,209,787 UART: [art] Derive CDI
20,210,520 UART: [art] Store in in slot 0x4
20,267,944 UART: [art] Derive Key Pair
20,268,985 UART: [art] Store priv key in slot 0x5
22,731,483 UART: [art] Derive Key Pair - Done
22,744,489 UART: [art] Signing Cert with AUTHO
22,745,795 UART: RITY.KEYID = 7
24,458,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,678 UART: [art] PUB.X = 6E62960AC974F955AB1C4BC54802246ECB86BE454BDD33F74D7428A9159C0BD68C728471F43304D5594502184B197579
24,466,918 UART: [art] PUB.Y = F24EE91AE90BB50CAF647BAAE258DD5E6062BD7147E113CBD621659C65DBE4981C2E94002C1A805D82C910580CDAF451
24,474,179 UART: [art] SIG.R = F02B75441F93C6EAA672D4CFA02DED5B12005271D2FCC48D40DCF08E21CE827758EE2D693FC8AC82E756E1231267B8F2
24,481,580 UART: [art] SIG.S = A83CC47CFBD522C54FCD26E2A7F472A3CD4F5F9230ABCAC75A68A892A68A73D0BA4AC9CA7A1305A3E3D24EBC78B19B5F
25,460,586 UART: Caliptra RT
25,461,305 UART: [state] CFI Enabled
25,625,823 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 9072 bytes from beginning
18,769,921 UART: [state] Locking Datavault
18,776,134 UART: [state] Locking PCR0, PCR1 and PCR31
18,777,775 UART: [state] Locking ICCM
18,779,007 UART: [exit] Launching FMC @ 0x40000130
18,787,400 UART:
18,787,671 UART: Running Caliptra FMC ...
18,788,776 UART:
18,788,957 UART: [state] CFI Enabled
18,796,954 UART: [fht] FMC Alias Private Key: 7
20,554,132 UART: [art] Extend RT PCRs Done
20,555,341 UART: [art] Lock RT PCRs Done
20,556,854 UART: [art] Populate DV Done
20,562,310 UART: [fht] FMC Alias Private Key: 7
20,564,003 UART: [art] Derive CDI
20,564,816 UART: [art] Store in in slot 0x4
20,607,563 UART: [art] Derive Key Pair
20,608,559 UART: [art] Store priv key in slot 0x5
23,035,453 UART: [art] Derive Key Pair - Done
23,048,502 UART: [art] Signing Cert with AUTHO
23,049,802 UART: RITY.KEYID = 7
24,755,056 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,551 UART: [art] PUB.X = 864010E518932E4CD3AB7CC893A0DB16E9A0BAFF7BC36B6D49B3E4A2B4778A84F36A31AB13644B893F07AEBBFE058F27
24,763,807 UART: [art] PUB.Y = 618AB989721AA02BB5802FC0E38BAC1233B86E9B605A7B05AEB8EA558AB077F54E1FA40D1A0FB09FF119D624CFD209E2
24,771,130 UART: [art] SIG.R = 4D33756CEC327E85C087C76566F8BFE20659D968A9794C7D8CD103C842021806745382D3C4C6527E33FA597C27DE4766
24,778,485 UART: [art] SIG.S = 3BE458AEBCD3B6DA7418FC690F476747634E3CF03A6B26F6AA00C390BAD4ED9E0915A428348905AFAC2668A68D2C1E4C
25,757,086 UART: Caliptra RT
25,757,799 UART: [state] CFI Enabled
25,874,431 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
5,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,567 UART:
192,947 UART: Running Caliptra ROM ...
194,122 UART:
603,813 UART: [state] CFI Enabled
616,156 UART: [state] LifecycleState = Unprovisioned
618,064 UART: [state] DebugLocked = No
619,669 UART: [state] WD Timer not started. Device not locked for debugging
623,346 UART: [kat] SHA2-256
802,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,091 UART: [kat] ++
814,622 UART: [kat] sha1
826,152 UART: [kat] SHA2-256
829,161 UART: [kat] SHA2-384
836,281 UART: [kat] SHA2-512-ACC
839,263 UART: [kat] ECC-384
3,281,118 UART: [kat] HMAC-384Kdf
3,293,736 UART: [kat] LMS
3,823,226 UART: [kat] --
3,826,799 UART: [cold-reset] ++
3,829,011 UART: [fht] FHT @ 0x50003400
3,838,857 UART: [idev] ++
3,839,418 UART: [idev] CDI.KEYID = 6
3,840,387 UART: [idev] SUBJECT.KEYID = 7
3,841,543 UART: [idev] UDS.KEYID = 0
3,856,653 UART: [idev] Erasing UDS.KEYID = 0
6,312,220 UART: [idev] Sha384 KeyId Algorithm
6,321,261 UART: [idev] --
6,325,519 UART: [ldev] ++
6,326,078 UART: [ldev] CDI.KEYID = 6
6,326,979 UART: [ldev] SUBJECT.KEYID = 5
6,328,189 UART: [ldev] AUTHORITY.KEYID = 7
6,329,413 UART: [ldev] FE.KEYID = 1
6,340,379 UART: [ldev] Erasing FE.KEYID = 1
8,815,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,534,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,550,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,566,404 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,582,209 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,602,154 UART: [ldev] --
10,606,010 UART: [fwproc] Wait for Commands...
10,608,280 UART: [fwproc] Recv command 0x46574c44
10,610,413 UART: [fwproc] Recv'd Img size: 114168 bytes
14,009,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,080,377 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,149,143 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,465,938 >>> mbox cmd response: success
14,469,941 UART: [afmc] ++
14,470,527 UART: [afmc] CDI.KEYID = 6
14,471,412 UART: [afmc] SUBJECT.KEYID = 7
14,472,626 UART: [afmc] AUTHORITY.KEYID = 5
16,973,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,694,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,696,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,712,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,728,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,744,060 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,767,099 UART: [afmc] --
18,771,180 UART: [cold-reset] --
18,776,589 UART: [state] Locking Datavault
18,782,334 UART: [state] Locking PCR0, PCR1 and PCR31
18,783,980 UART: [state] Locking ICCM
18,786,421 UART: [exit] Launching FMC @ 0x40000130
18,794,876 UART:
18,795,105 UART: Running Caliptra FMC ...
18,796,204 UART:
18,796,361 UART: [state] CFI Enabled
18,804,468 UART: [fht] FMC Alias Private Key: 7
20,562,199 UART: [art] Extend RT PCRs Done
20,563,413 UART: [art] Lock RT PCRs Done
20,565,087 UART: [art] Populate DV Done
20,570,609 UART: [fht] FMC Alias Private Key: 7
20,572,197 UART: [art] Derive CDI
20,573,009 UART: [art] Store in in slot 0x4
20,615,715 UART: [art] Derive Key Pair
20,616,748 UART: [art] Store priv key in slot 0x5
23,043,708 UART: [art] Derive Key Pair - Done
23,056,924 UART: [art] Signing Cert with AUTHO
23,058,251 UART: RITY.KEYID = 7
24,763,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,765,142 UART: [art] PUB.X = 6BD3A58A1B4714FAACA9D2A724FF62B489736D749D3F202E3FF30AECAB0A45CE3B3D14397AFB95CD6F6C9173ECF5D1FA
24,772,478 UART: [art] PUB.Y = 355846FF3EE96DFC864490A9760EBC04B3392DC29CF1536E27EAF665DE8E9525B5960444C47E5FCF4FE93E8835435DF9
24,779,745 UART: [art] SIG.R = 5315C8EA85BB439A3C5ABB8F8436E3A961955ABFA5C0FB3B207AF97BE1CD2D60E1425A6395761FCE07FFF44A16751258
24,787,155 UART: [art] SIG.S = 3FB1537D31E45BD705D3CC1FF44A30C0EAB1469DC1E60A7A1FCD97A3E9443AB7F62336619366B5663092BA9B474258B7
25,766,512 UART: Caliptra RT
25,767,194 UART: [state] CFI Enabled
25,883,494 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
5,318 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,325 UART:
192,733 UART: Running Caliptra ROM ...
193,924 UART:
603,370 UART: [state] CFI Enabled
619,062 UART: [state] LifecycleState = Unprovisioned
620,891 UART: [state] DebugLocked = No
622,621 UART: [state] WD Timer not started. Device not locked for debugging
627,262 UART: [kat] SHA2-256
806,386 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,952 UART: [kat] ++
818,399 UART: [kat] sha1
828,084 UART: [kat] SHA2-256
831,077 UART: [kat] SHA2-384
838,041 UART: [kat] SHA2-512-ACC
841,031 UART: [kat] ECC-384
3,279,775 UART: [kat] HMAC-384Kdf
3,292,819 UART: [kat] LMS
3,822,330 UART: [kat] --
3,826,268 UART: [cold-reset] ++
3,827,709 UART: [fht] FHT @ 0x50003400
3,838,957 UART: [idev] ++
3,839,513 UART: [idev] CDI.KEYID = 6
3,840,424 UART: [idev] SUBJECT.KEYID = 7
3,841,638 UART: [idev] UDS.KEYID = 0
3,860,204 UART: [idev] Erasing UDS.KEYID = 0
6,314,754 UART: [idev] Fuse KeyId
6,318,721 UART: [idev] --
6,322,445 UART: [ldev] ++
6,323,014 UART: [ldev] CDI.KEYID = 6
6,323,923 UART: [ldev] SUBJECT.KEYID = 5
6,325,140 UART: [ldev] AUTHORITY.KEYID = 7
6,326,367 UART: [ldev] FE.KEYID = 1
6,334,795 UART: [ldev] Erasing FE.KEYID = 1
8,805,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,555,518 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,571,336 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,590,969 UART: [ldev] --
10,596,106 UART: [fwproc] Wait for Commands...
10,597,783 UART: [fwproc] Recv command 0x46574c44
10,599,844 UART: [fwproc] Recv'd Img size: 114168 bytes
13,995,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,071,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,139,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,458,114 >>> mbox cmd response: success
14,462,666 UART: [afmc] ++
14,463,248 UART: [afmc] CDI.KEYID = 6
14,464,158 UART: [afmc] SUBJECT.KEYID = 7
14,465,371 UART: [afmc] AUTHORITY.KEYID = 5
16,963,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,683,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,685,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,701,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,717,697 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,733,573 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,755,195 UART: [afmc] --
18,759,145 UART: [cold-reset] --
18,762,951 UART: [state] Locking Datavault
18,769,809 UART: [state] Locking PCR0, PCR1 and PCR31
18,771,446 UART: [state] Locking ICCM
18,772,672 UART: [exit] Launching FMC @ 0x40000130
18,781,126 UART:
18,781,353 UART: Running Caliptra FMC ...
18,782,448 UART:
18,782,605 UART: [state] CFI Enabled
18,790,973 UART: [fht] FMC Alias Private Key: 7
20,547,891 UART: [art] Extend RT PCRs Done
20,549,586 UART: [art] Lock RT PCRs Done
20,550,596 UART: [art] Populate DV Done
20,556,134 UART: [fht] FMC Alias Private Key: 7
20,557,829 UART: [art] Derive CDI
20,558,566 UART: [art] Store in in slot 0x4
20,600,817 UART: [art] Derive Key Pair
20,601,855 UART: [art] Store priv key in slot 0x5
23,029,311 UART: [art] Derive Key Pair - Done
23,042,375 UART: [art] Signing Cert with AUTHO
23,043,683 UART: RITY.KEYID = 7
24,749,422 UART: [art] Erasing AUTHORITY.KEYID = 7
24,750,907 UART: [art] PUB.X = 1A854B5693A5EBAD5E0595E5830A2BBC831FF92FC9ECC29B1A04757F4DD4A8E55A41AD45421DE005A3E0A7E4159C90BF
24,758,224 UART: [art] PUB.Y = DBD73BF0910AC1459CADAB5F13AFBD42C11E0CAB4492363C7711A7EC2AA393CF040A85A0DC414A7768EE35BB96918191
24,765,467 UART: [art] SIG.R = 8315F607311E2681D42B03784D15393B7CF9FE2A9D90F53B277ABBCBB03D97193E758879E331BBBDB6D58A903B159459
24,772,831 UART: [art] SIG.S = ADEB2E224E173CFBEA13F3DEAC821383980B0E1EC294846261C83BE4487BB759D9A4847DA65D8EDB56590E1296F0D937
25,751,854 UART: Caliptra RT
25,752,570 UART: [state] CFI Enabled
25,870,136 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
5,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,834 >>> mbox cmd response: success
18,521,093 UART:
18,521,546 UART: Running Caliptra FMC ...
18,522,740 UART:
18,522,903 UART: [state] CFI Enabled
18,530,922 UART: [fht] FMC Alias Private Key: 7
20,287,781 UART: [art] Extend RT PCRs Done
20,289,005 UART: [art] Lock RT PCRs Done
20,290,768 UART: [art] Populate DV Done
20,296,041 UART: [fht] FMC Alias Private Key: 7
20,297,591 UART: [art] Derive CDI
20,298,353 UART: [art] Store in in slot 0x4
20,340,930 UART: [art] Derive Key Pair
20,341,966 UART: [art] Store priv key in slot 0x5
22,768,940 UART: [art] Derive Key Pair - Done
22,781,828 UART: [art] Signing Cert with AUTHO
22,783,122 UART: RITY.KEYID = 7
24,488,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,659 UART: [art] PUB.X = C798704B9F746BB0AAC5746E06E4CC0926486B6BFF5CB3C2471742A0A7B02485BEFFC99A2F9321C7C2A18E0C455C3510
24,496,959 UART: [art] PUB.Y = B87EE4E1198B3C4868C56FD39F622A71F4BCD6B564793DB76DF454EC2450E4785C4B06ECBCBE332EF0D79183AA045851
24,504,216 UART: [art] SIG.R = 309B4531200C7ADEA35FAE6C886B30A32721414A8F278158822EBB11BA9DEEFB0CCC25892744A676120871173AE9C4C8
24,511,553 UART: [art] SIG.S = 1CD5C080082E47F237E4201A45865E5AF3843B8C5D7E40EDE18E13350741AE4880E92E7F1F4851AC6722C02AA2EA35EB
25,490,374 UART: Caliptra RT
25,491,083 UART: [state] CFI Enabled
25,608,267 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,323 writing to cptra_bootfsm_go
6,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,257,531 >>> mbox cmd response: success
18,504,248 UART:
18,504,634 UART: Running Caliptra FMC ...
18,505,746 UART:
18,505,899 UART: [state] CFI Enabled
18,513,727 UART: [fht] FMC Alias Private Key: 7
20,270,871 UART: [art] Extend RT PCRs Done
20,272,092 UART: [art] Lock RT PCRs Done
20,273,909 UART: [art] Populate DV Done
20,279,158 UART: [fht] FMC Alias Private Key: 7
20,280,641 UART: [art] Derive CDI
20,281,375 UART: [art] Store in in slot 0x4
20,324,080 UART: [art] Derive Key Pair
20,325,123 UART: [art] Store priv key in slot 0x5
22,752,092 UART: [art] Derive Key Pair - Done
22,765,196 UART: [art] Signing Cert with AUTHO
22,766,494 UART: RITY.KEYID = 7
24,472,051 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,560 UART: [art] PUB.X = F493880700D3791708CAFBA048F0E53A3D8F468876CF9C40E69D5EC2DFF2EE9E1DF458F508831E09F6CE5BD165315A93
24,481,100 UART: [art] PUB.Y = E00A5665FC11CE3AB2837809304DFB92697464A61B29CBAB5D6482E1505E8EC6B09D4FF6BD084A72A8FA4551FD83E613
24,488,063 UART: [art] SIG.R = D3F9182B88A28FCBB4AFE41933AC0E14E199BF2CE28B9DCAB4E85BE2C120255240DA8F44DBA7429BEC2AA894388F9CE4
24,495,507 UART: [art] SIG.S = 2A529E59AFF242B704413A83EFDEA15E9AE2E7C249B13E08C8D58EBDAE48877F0AA5A037B3410D25D69810BD9CC3A9F1
25,475,061 UART: Caliptra RT
25,475,756 UART: [state] CFI Enabled
25,592,645 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
5,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,256,082 >>> mbox cmd response: success
18,505,523 UART:
18,505,930 UART: Running Caliptra FMC ...
18,507,050 UART:
18,507,207 UART: [state] CFI Enabled
18,515,250 UART: [fht] FMC Alias Private Key: 7
20,272,789 UART: [art] Extend RT PCRs Done
20,274,009 UART: [art] Lock RT PCRs Done
20,275,666 UART: [art] Populate DV Done
20,280,970 UART: [fht] FMC Alias Private Key: 7
20,282,582 UART: [art] Derive CDI
20,283,316 UART: [art] Store in in slot 0x4
20,325,796 UART: [art] Derive Key Pair
20,326,793 UART: [art] Store priv key in slot 0x5
22,753,886 UART: [art] Derive Key Pair - Done
22,766,772 UART: [art] Signing Cert with AUTHO
22,768,065 UART: RITY.KEYID = 7
24,473,740 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,245 UART: [art] PUB.X = 9B3A1034660E5D9B7E159F83DF6B9D3A43B87213D61DA6EF0CFA0B64C2291801FE45A4E81C71E611932101422B0D7EE3
24,482,496 UART: [art] PUB.Y = D5307BB57CDD63156DEEF6960CE1C7A7AB2D9A961FFF677AE9317D74C6AA51EF9E6EA3903CD089743EE14E83AF8BEEC6
24,489,813 UART: [art] SIG.R = FD06EC9AFFB933A7B88F6AC5DFF04E79AB84AECEBC078A506663B86F052CA621433544B3040588A32F203A4415FE5492
24,497,204 UART: [art] SIG.S = 8CD4C1EC45335442C7110949270E592A854A1FF73D1CED9FCD3BFDCEEEBB4E9120458ACCC8E665A1A64591F99A78CEA1
25,476,294 UART: Caliptra RT
25,476,994 UART: [state] CFI Enabled
25,593,673 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
5,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,236,282 >>> mbox cmd response: success
18,482,175 UART:
18,482,580 UART: Running Caliptra FMC ...
18,483,682 UART:
18,483,856 UART: [state] CFI Enabled
18,491,854 UART: [fht] FMC Alias Private Key: 7
20,248,454 UART: [art] Extend RT PCRs Done
20,249,681 UART: [art] Lock RT PCRs Done
20,251,232 UART: [art] Populate DV Done
20,256,584 UART: [fht] FMC Alias Private Key: 7
20,258,175 UART: [art] Derive CDI
20,258,910 UART: [art] Store in in slot 0x4
20,301,396 UART: [art] Derive Key Pair
20,302,434 UART: [art] Store priv key in slot 0x5
22,729,267 UART: [art] Derive Key Pair - Done
22,742,480 UART: [art] Signing Cert with AUTHO
22,743,784 UART: RITY.KEYID = 7
24,448,921 UART: [art] Erasing AUTHORITY.KEYID = 7
24,450,421 UART: [art] PUB.X = D04380EDB4E81C60E3C574EFD0404333FB4A390260F743257685FE9466C60FD39EA20255423CCAD38F9AFEADB8AEEF77
24,457,671 UART: [art] PUB.Y = B5312E0E6F3D42C53BEF4B01392692CD958FAC0B4F515BFB348E4F0AD7302DE3ED9111B87FCEDA4E54465184B659EF5D
24,464,947 UART: [art] SIG.R = 5DF70BDC4BD9EBC97AE44718F7EDFC94E2A26FA148C81685C0E4D42554258BFB405B5FAAE8ADC3532E6100289498AA35
24,472,392 UART: [art] SIG.S = 5AE72DC79C002C2A7C58DE0B46E6051C5AE468591B1F626BEDEC0FA12B4D4D0D3EF80351F6E8940F4E31100CC114651F
25,450,736 UART: Caliptra RT
25,451,447 UART: [state] CFI Enabled
25,569,057 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.56s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,233 UART: [afmc] --
2,846,329 UART: [cold-reset] --
2,847,117 UART: [state] Locking Datavault
2,848,230 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,834 UART: [state] Locking ICCM
2,849,496 UART: [exit] Launching FMC @ 0x40000130
2,854,825 UART:
2,854,841 UART: Running Caliptra FMC ...
2,855,249 UART:
2,855,303 UART: [state] CFI Enabled
2,865,786 UART: [fht] FMC Alias Private Key: 7
2,974,269 UART: [art] Extend RT PCRs Done
2,974,697 UART: [art] Lock RT PCRs Done
2,976,047 UART: [art] Populate DV Done
2,984,318 UART: [fht] FMC Alias Private Key: 7
2,985,422 UART: [art] Derive CDI
2,985,702 UART: [art] Store in in slot 0x4
3,071,291 UART: [art] Derive Key Pair
3,071,651 UART: [art] Store priv key in slot 0x5
3,084,367 UART: [art] Derive Key Pair - Done
3,099,165 UART: [art] Signing Cert with AUTHO
3,099,645 UART: RITY.KEYID = 7
3,114,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,262 UART: [art] PUB.X = 7EAF7549F21E7C21294F63B4B98859D1D83DC1DF6AEB5C5AB3674C132B05C50B44093290A62C57516DBA1D87858610E1
3,122,025 UART: [art] PUB.Y = 50EBE3C36EA6BCCE8A3409A3829948424BE4E6BC01CF796CB3861A49835E2B8808C644F059F08A38AB945947FB0FCFCD
3,128,975 UART: [art] SIG.R = DB7E1DFAC0F12B48D35A7BFAFDA00D96A02A5197DA0532B76C1EDC15EA9671E129D1146B95750FB10BAE399FF3D2EF44
3,135,755 UART: [art] SIG.S = EDBABB422F634DB8B63FD1B89453AD37D17594C0AAFAB479C93641C5E9B3C5063A17F75BB61DF1824F30CF26A89F80A5
3,159,631 UART: Caliptra RT
3,159,884 UART: [state] CFI Enabled
3,267,095 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,130 UART: [kat] SHA2-512-ACC
906,031 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,401 UART: [cold-reset] ++
1,169,895 UART: [fht] FHT @ 0x50003400
1,172,563 UART: [idev] ++
1,172,731 UART: [idev] CDI.KEYID = 6
1,173,092 UART: [idev] SUBJECT.KEYID = 7
1,173,517 UART: [idev] UDS.KEYID = 0
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,440 UART: [idev] Sha384 KeyId Algorithm
1,202,205 UART: [idev] --
1,203,344 UART: [ldev] ++
1,203,512 UART: [ldev] CDI.KEYID = 6
1,203,876 UART: [ldev] SUBJECT.KEYID = 5
1,204,303 UART: [ldev] AUTHORITY.KEYID = 7
1,204,766 UART: [ldev] FE.KEYID = 1
1,210,250 UART: [ldev] Erasing FE.KEYID = 1
1,236,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,400 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,122 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,146 UART: [ldev] --
1,275,642 UART: [fwproc] Wait for Commands...
1,276,261 UART: [fwproc] Recv command 0x46574c44
1,276,994 UART: [fwproc] Recv'd Img size: 114168 bytes
2,573,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,181 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,764,813 >>> mbox cmd response: success
2,765,918 UART: [afmc] ++
2,766,086 UART: [afmc] CDI.KEYID = 6
2,766,449 UART: [afmc] SUBJECT.KEYID = 7
2,766,875 UART: [afmc] AUTHORITY.KEYID = 5
2,802,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,845,125 UART: [afmc] --
2,846,213 UART: [cold-reset] --
2,847,295 UART: [state] Locking Datavault
2,848,380 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,984 UART: [state] Locking ICCM
2,849,512 UART: [exit] Launching FMC @ 0x40000130
2,854,841 UART:
2,854,857 UART: Running Caliptra FMC ...
2,855,265 UART:
2,855,319 UART: [state] CFI Enabled
2,865,542 UART: [fht] FMC Alias Private Key: 7
2,973,595 UART: [art] Extend RT PCRs Done
2,974,023 UART: [art] Lock RT PCRs Done
2,975,835 UART: [art] Populate DV Done
2,984,048 UART: [fht] FMC Alias Private Key: 7
2,985,116 UART: [art] Derive CDI
2,985,396 UART: [art] Store in in slot 0x4
3,070,619 UART: [art] Derive Key Pair
3,070,979 UART: [art] Store priv key in slot 0x5
3,083,971 UART: [art] Derive Key Pair - Done
3,099,163 UART: [art] Signing Cert with AUTHO
3,099,643 UART: RITY.KEYID = 7
3,114,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,590 UART: [art] PUB.X = ABD17D98BC9DD062DCC78B6AAA4F93E5253ED61677780A7053DDA1EB63CEBEEAD49C8A4ECF86CDD7EC745A74C054674F
3,122,385 UART: [art] PUB.Y = 56C5451F30DBFAAA5C23AE82CA38C4240303888387840FDF002D0993E7803A4B4129E525E10E597B53581E974181CC00
3,129,270 UART: [art] SIG.R = 0B1FBB1FD2A82576611BC662E18D6E3143033A3DF31FF47A72F39AADFCBC25D16B33B33E62AB4A28FEB77691CBB04005
3,136,047 UART: [art] SIG.S = 4AB5C0F123FDE0A2A142EAF7C292F76F2BB88AE7B6EA2494F84FA0A00188E50EB6B27B31ED0798009C35CA123B54CDE6
3,159,459 UART: Caliptra RT
3,159,712 UART: [state] CFI Enabled
3,266,939 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,118 UART: [kat] SHA2-256
891,668 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,600 UART: [kat] LMS
1,168,912 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,186 UART: [idev] Fuse KeyId
1,200,408 UART: [idev] --
1,201,343 UART: [ldev] ++
1,201,511 UART: [ldev] CDI.KEYID = 6
1,201,875 UART: [ldev] SUBJECT.KEYID = 5
1,202,302 UART: [ldev] AUTHORITY.KEYID = 7
1,202,765 UART: [ldev] FE.KEYID = 1
1,207,883 UART: [ldev] Erasing FE.KEYID = 1
1,233,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,301 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,263,983 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,040 UART: [ldev] --
1,272,392 UART: [fwproc] Wait for Commands...
1,273,097 UART: [fwproc] Recv command 0x46574c44
1,273,830 UART: [fwproc] Recv'd Img size: 114168 bytes
2,569,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,596,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,626,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,761,907 >>> mbox cmd response: success
2,763,128 UART: [afmc] ++
2,763,296 UART: [afmc] CDI.KEYID = 6
2,763,659 UART: [afmc] SUBJECT.KEYID = 7
2,764,085 UART: [afmc] AUTHORITY.KEYID = 5
2,798,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,814,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,815,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,821,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,827,161 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,832,880 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,840,513 UART: [afmc] --
2,841,497 UART: [cold-reset] --
2,842,553 UART: [state] Locking Datavault
2,843,700 UART: [state] Locking PCR0, PCR1 and PCR31
2,844,304 UART: [state] Locking ICCM
2,844,780 UART: [exit] Launching FMC @ 0x40000130
2,850,109 UART:
2,850,125 UART: Running Caliptra FMC ...
2,850,533 UART:
2,850,587 UART: [state] CFI Enabled
2,861,186 UART: [fht] FMC Alias Private Key: 7
2,969,503 UART: [art] Extend RT PCRs Done
2,969,931 UART: [art] Lock RT PCRs Done
2,971,447 UART: [art] Populate DV Done
2,979,474 UART: [fht] FMC Alias Private Key: 7
2,980,532 UART: [art] Derive CDI
2,980,812 UART: [art] Store in in slot 0x4
3,066,345 UART: [art] Derive Key Pair
3,066,705 UART: [art] Store priv key in slot 0x5
3,079,687 UART: [art] Derive Key Pair - Done
3,094,468 UART: [art] Signing Cert with AUTHO
3,094,948 UART: RITY.KEYID = 7
3,109,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,110,627 UART: [art] PUB.X = C08A22B03DD763BE971DB2AD200608EB4F203C85A2AC09926B4648B670ADD937C1CEDAE2569446AE6984706E79BE66D7
3,117,396 UART: [art] PUB.Y = 807D7A1D592054DA72592DB13B0514B29AB54F80240E780989ED206C31210CC1C824436E1226CAB4797498FBF2B22031
3,124,326 UART: [art] SIG.R = 9B44C7C7AEBA8CEBE9E89055AB9A628840FE4DC7748DC2A3358B05E9C0E14D99A11F7277683A95FFC120DFCB24848A80
3,131,107 UART: [art] SIG.S = 8E8BA54DD8090BDBB3FB4C2F727B961EC436CF9941C69A3C105A754C592661764D4D32FB2F31871418F8A41D6BFA9A09
3,155,009 UART: Caliptra RT
3,155,262 UART: [state] CFI Enabled
3,263,182 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,211 >>> mbox cmd response: success
2,683,669 UART:
2,683,685 UART: Running Caliptra FMC ...
2,684,093 UART:
2,684,147 UART: [state] CFI Enabled
2,695,090 UART: [fht] FMC Alias Private Key: 7
2,802,091 UART: [art] Extend RT PCRs Done
2,802,519 UART: [art] Lock RT PCRs Done
2,803,979 UART: [art] Populate DV Done
2,812,510 UART: [fht] FMC Alias Private Key: 7
2,813,592 UART: [art] Derive CDI
2,813,872 UART: [art] Store in in slot 0x4
2,899,119 UART: [art] Derive Key Pair
2,899,479 UART: [art] Store priv key in slot 0x5
2,912,563 UART: [art] Derive Key Pair - Done
2,927,535 UART: [art] Signing Cert with AUTHO
2,928,015 UART: RITY.KEYID = 7
2,943,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,114 UART: [art] PUB.X = AB78E52B5E74FCACCE7F56C818C338D5AF0C896A0EC55BB9F1C8B25AE04410A113370090E48EFE6D1A5C66AB1FDB7562
2,950,876 UART: [art] PUB.Y = 16723682C4694408BEDA12B317E411D82934BBDBA1C7E213DF5ED30C8A48E04F949D54C1C5CCE8211D5BA4F91CEA38B4
2,957,832 UART: [art] SIG.R = 7A9B404F328F4204CF0A4F633E879B184A3C6214C86DC773B2703BE9A4FEC7C983214EEB179C8B6646AE214352E00847
2,964,593 UART: [art] SIG.S = 95BE35E0492A13F93A418BC78CCC7BA8778BBF143DEFBB8FEFB91AEDB946DE25EA85C3972EA944D738735FFC27116E0E
2,988,191 UART: Caliptra RT
2,988,444 UART: [state] CFI Enabled
3,096,509 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,613,685 >>> mbox cmd response: success
2,675,427 UART:
2,675,443 UART: Running Caliptra FMC ...
2,675,851 UART:
2,675,905 UART: [state] CFI Enabled
2,686,712 UART: [fht] FMC Alias Private Key: 7
2,794,467 UART: [art] Extend RT PCRs Done
2,794,895 UART: [art] Lock RT PCRs Done
2,796,457 UART: [art] Populate DV Done
2,804,600 UART: [fht] FMC Alias Private Key: 7
2,805,548 UART: [art] Derive CDI
2,805,828 UART: [art] Store in in slot 0x4
2,891,747 UART: [art] Derive Key Pair
2,892,107 UART: [art] Store priv key in slot 0x5
2,905,089 UART: [art] Derive Key Pair - Done
2,919,722 UART: [art] Signing Cert with AUTHO
2,920,202 UART: RITY.KEYID = 7
2,935,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,935,985 UART: [art] PUB.X = 0D7AAA34519DC1CD0DF4A08D10B07B5A876E1EA32B164C5795D8FB96AB6996F24CAACF43BD5F148F88A95EEAC5ECE44D
2,942,775 UART: [art] PUB.Y = 54E4632EEC801052549D0F9823B9E5F8D083E28BA188C609ABE8E7F8A29798745FC1FADF8BF133BE394AC658560D7A46
2,949,722 UART: [art] SIG.R = 28DEFDD4259828BBD0963DD75E6F75B3FC97597E9CC2C38580D830B41236DD1E645C38A50A0908683AC3CD0D98AE883C
2,956,488 UART: [art] SIG.S = C2C9D9A08845439510B919AD731F404D06921F83A8CBBC9C53C6711F3DD608CB3C2CD814EBB12FF2F5A67553ED2CF41D
2,980,123 UART: Caliptra RT
2,980,376 UART: [state] CFI Enabled
3,087,056 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,145 >>> mbox cmd response: success
2,679,613 UART:
2,679,629 UART: Running Caliptra FMC ...
2,680,037 UART:
2,680,091 UART: [state] CFI Enabled
2,690,380 UART: [fht] FMC Alias Private Key: 7
2,798,085 UART: [art] Extend RT PCRs Done
2,798,513 UART: [art] Lock RT PCRs Done
2,800,237 UART: [art] Populate DV Done
2,808,650 UART: [fht] FMC Alias Private Key: 7
2,809,756 UART: [art] Derive CDI
2,810,036 UART: [art] Store in in slot 0x4
2,895,481 UART: [art] Derive Key Pair
2,895,841 UART: [art] Store priv key in slot 0x5
2,909,105 UART: [art] Derive Key Pair - Done
2,923,805 UART: [art] Signing Cert with AUTHO
2,924,285 UART: RITY.KEYID = 7
2,939,487 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,252 UART: [art] PUB.X = 436CA6FC53314822B6CF3BF0157FC00954D6F4E87EBE27620D65E570E8FF56AFACA475D664F89768451F44BC75B5B8C3
2,947,024 UART: [art] PUB.Y = 28E3181E1C537120B8D72F2E7FF185A76218E552B8DC1EF903AB5EB94E1FA5E4E4F33D2721BF5902BC659184D0E0499E
2,953,974 UART: [art] SIG.R = 138817586C7C49DEA62449CCDD4CD25E64E7003968E6FE2D0989D8E8CA2ADEE2D26AE93A4AE1549B96E64FA8FD0C4408
2,960,727 UART: [art] SIG.S = 0321E455996A8ABA928C5DD45493CCA6E0C11C15B5AFDAB5003E72B5EF0659D0F642323F73E44165259DB56476E564CB
2,984,646 UART: Caliptra RT
2,984,899 UART: [state] CFI Enabled
3,091,602 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,613,203 >>> mbox cmd response: success
2,675,389 UART:
2,675,405 UART: Running Caliptra FMC ...
2,675,813 UART:
2,675,867 UART: [state] CFI Enabled
2,686,196 UART: [fht] FMC Alias Private Key: 7
2,794,229 UART: [art] Extend RT PCRs Done
2,794,657 UART: [art] Lock RT PCRs Done
2,796,195 UART: [art] Populate DV Done
2,804,662 UART: [fht] FMC Alias Private Key: 7
2,805,596 UART: [art] Derive CDI
2,805,876 UART: [art] Store in in slot 0x4
2,891,411 UART: [art] Derive Key Pair
2,891,771 UART: [art] Store priv key in slot 0x5
2,905,181 UART: [art] Derive Key Pair - Done
2,920,227 UART: [art] Signing Cert with AUTHO
2,920,707 UART: RITY.KEYID = 7
2,935,969 UART: [art] Erasing AUTHORITY.KEYID = 7
2,936,734 UART: [art] PUB.X = 1A20A8CA5D09E898D558A0043D02C07783AC9D5C596C25D16597C8F7189396CD95C4D5F2DACF2D46A7091CA3F1A26AE8
2,943,500 UART: [art] PUB.Y = 6C6BCCB0D0D73F722B7F89C68F170A998ED8CB0517022C57B6E4F4E5412A094E55ECD31BF22F56A9D334BC93ED9BEE3F
2,950,456 UART: [art] SIG.R = FBF7813C214F13327E3C83AE0FF22F3113DD5CD160E678D8A224735637D53FE7788F31FF5E9C8F30C56A67C8CF51F428
2,957,229 UART: [art] SIG.S = 05E50EF471077587AA8ABDFFA8E021B37467A5A21580D86318609D14EF1994461DECCFBC5C73089136578536BA98E30B
2,980,985 UART: Caliptra RT
2,981,238 UART: [state] CFI Enabled
3,089,465 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.47s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,618 UART: [afmc] --
2,847,714 UART: [cold-reset] --
2,848,568 UART: [state] Locking Datavault
2,849,659 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,263 UART: [state] Locking ICCM
2,850,839 UART: [exit] Launching FMC @ 0x40000130
2,856,168 UART:
2,856,184 UART: Running Caliptra FMC ...
2,856,592 UART:
2,856,735 UART: [state] CFI Enabled
2,867,474 UART: [fht] FMC Alias Private Key: 7
2,975,071 UART: [art] Extend RT PCRs Done
2,975,499 UART: [art] Lock RT PCRs Done
2,977,065 UART: [art] Populate DV Done
2,985,294 UART: [fht] FMC Alias Private Key: 7
2,986,344 UART: [art] Derive CDI
2,986,624 UART: [art] Store in in slot 0x4
3,072,311 UART: [art] Derive Key Pair
3,072,671 UART: [art] Store priv key in slot 0x5
3,085,309 UART: [art] Derive Key Pair - Done
3,100,348 UART: [art] Signing Cert with AUTHO
3,100,828 UART: RITY.KEYID = 7
3,116,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,805 UART: [art] PUB.X = 48F24D0DEA4D28F3A5A6A295B903A87CF357DB7910A2BEA96981AF869289748607E553F7AC612B679B38171874CA9D46
3,123,566 UART: [art] PUB.Y = 52293B1CB4F23D428A02AF8E587DCAD943ADEB20FC3822B8B4E22F459B2E185897EC6FB5D86EB914FB716C8BA377CF3F
3,130,531 UART: [art] SIG.R = 4DB45416E7FF343AB9C72F4FB2A1C0076181B31EA5296D0AD956F6EAA95F04345A60C2BCFA5FC3700D0C5DFD1DC560CC
3,137,306 UART: [art] SIG.S = 0A96596C4DA822E123BDB698CD86DB8345DC9402F8D0349CF53D6C63C6E3DB950AE04ED2AA97B20C61B9B14CAAC6E356
3,161,321 UART: Caliptra RT
3,161,666 UART: [state] CFI Enabled
3,268,201 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha384 KeyId Algorithm
1,203,086 UART: [idev] --
1,204,099 UART: [ldev] ++
1,204,267 UART: [ldev] CDI.KEYID = 6
1,204,631 UART: [ldev] SUBJECT.KEYID = 5
1,205,058 UART: [ldev] AUTHORITY.KEYID = 7
1,205,521 UART: [ldev] FE.KEYID = 1
1,210,895 UART: [ldev] Erasing FE.KEYID = 1
1,237,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,233 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,955 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,003 UART: [ldev] --
1,276,463 UART: [fwproc] Wait for Commands...
1,277,134 UART: [fwproc] Recv command 0x46574c44
1,277,867 UART: [fwproc] Recv'd Img size: 114168 bytes
2,573,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,601,525 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,630,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,766,476 >>> mbox cmd response: success
2,767,677 UART: [afmc] ++
2,767,845 UART: [afmc] CDI.KEYID = 6
2,768,208 UART: [afmc] SUBJECT.KEYID = 7
2,768,634 UART: [afmc] AUTHORITY.KEYID = 5
2,804,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,827,095 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,832,978 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,838,697 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,488 UART: [afmc] --
2,847,418 UART: [cold-reset] --
2,848,462 UART: [state] Locking Datavault
2,849,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,411 UART: [state] Locking ICCM
2,850,949 UART: [exit] Launching FMC @ 0x40000130
2,856,278 UART:
2,856,294 UART: Running Caliptra FMC ...
2,856,702 UART:
2,856,845 UART: [state] CFI Enabled
2,867,366 UART: [fht] FMC Alias Private Key: 7
2,975,557 UART: [art] Extend RT PCRs Done
2,975,985 UART: [art] Lock RT PCRs Done
2,977,643 UART: [art] Populate DV Done
2,985,692 UART: [fht] FMC Alias Private Key: 7
2,986,692 UART: [art] Derive CDI
2,986,972 UART: [art] Store in in slot 0x4
3,072,671 UART: [art] Derive Key Pair
3,073,031 UART: [art] Store priv key in slot 0x5
3,086,471 UART: [art] Derive Key Pair - Done
3,101,043 UART: [art] Signing Cert with AUTHO
3,101,523 UART: RITY.KEYID = 7
3,117,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,104 UART: [art] PUB.X = B9C38DC293FEBD3AD2BE5E22498C46B11F204ADB6F868B2346A9A60AB8F5F803F084B8F4DBD109C7EEFD1742F608425E
3,124,880 UART: [art] PUB.Y = 634F800B67807323A6B03FF7D17CB79599B5BE77410F60EE4331C4BE88623316FC96267529B7C808FDF355E505701E07
3,131,807 UART: [art] SIG.R = 1A12205CB79E613FFAB21B9EBA8DAAE7995C162DC4236913608EF68A470F04A36CBFE7DD92E7F37FB2D0CF5FFDCD990F
3,138,592 UART: [art] SIG.S = 38C2A6AE3CDF0EA3658C138A0D2F91E6E2B92CFA91783E132CE113DBCEE02BE94CCFA53A3029A06F3332BDA7A56F4338
3,162,759 UART: Caliptra RT
3,163,104 UART: [state] CFI Enabled
3,270,153 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
905,031 UART: [kat] SHA2-512-ACC
906,932 UART: [kat] ECC-384
916,843 UART: [kat] HMAC-384Kdf
921,463 UART: [kat] LMS
1,169,775 UART: [kat] --
1,170,602 UART: [cold-reset] ++
1,170,974 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,391 UART: [idev] Fuse KeyId
1,200,613 UART: [idev] --
1,201,660 UART: [ldev] ++
1,201,828 UART: [ldev] CDI.KEYID = 6
1,202,192 UART: [ldev] SUBJECT.KEYID = 5
1,202,619 UART: [ldev] AUTHORITY.KEYID = 7
1,203,082 UART: [ldev] FE.KEYID = 1
1,208,006 UART: [ldev] Erasing FE.KEYID = 1
1,234,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,044 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,726 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,941 UART: [ldev] --
1,274,379 UART: [fwproc] Wait for Commands...
1,275,048 UART: [fwproc] Recv command 0x46574c44
1,275,781 UART: [fwproc] Recv'd Img size: 114168 bytes
2,571,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,597,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,627,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,762,888 >>> mbox cmd response: success
2,764,099 UART: [afmc] ++
2,764,267 UART: [afmc] CDI.KEYID = 6
2,764,630 UART: [afmc] SUBJECT.KEYID = 7
2,765,056 UART: [afmc] AUTHORITY.KEYID = 5
2,800,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,430 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,042 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,834,761 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,842,688 UART: [afmc] --
2,843,600 UART: [cold-reset] --
2,844,354 UART: [state] Locking Datavault
2,845,415 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,019 UART: [state] Locking ICCM
2,846,521 UART: [exit] Launching FMC @ 0x40000130
2,851,850 UART:
2,851,866 UART: Running Caliptra FMC ...
2,852,274 UART:
2,852,417 UART: [state] CFI Enabled
2,863,218 UART: [fht] FMC Alias Private Key: 7
2,971,621 UART: [art] Extend RT PCRs Done
2,972,049 UART: [art] Lock RT PCRs Done
2,973,627 UART: [art] Populate DV Done
2,981,880 UART: [fht] FMC Alias Private Key: 7
2,982,808 UART: [art] Derive CDI
2,983,088 UART: [art] Store in in slot 0x4
3,069,091 UART: [art] Derive Key Pair
3,069,451 UART: [art] Store priv key in slot 0x5
3,082,971 UART: [art] Derive Key Pair - Done
3,097,566 UART: [art] Signing Cert with AUTHO
3,098,046 UART: RITY.KEYID = 7
3,113,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,411 UART: [art] PUB.X = 91BC7DF96AC7599E3600A67C9FF066A5FD1661E40699FD36D6664451D4D84098C5B6D641B9C477F0E0CCD6F00C86AB96
3,121,159 UART: [art] PUB.Y = 96780B143920D1EF30901A934C0CBF381DDFE588B97CA36F7F5E1400DC93F5050887424FDFE451AAE2F637729DB74079
3,128,077 UART: [art] SIG.R = 65FC635DE67662F93177CC97C13CCC2F7DC03E4989608F225FF7F523AA5E8CA4FA7BF33C6AFE233C17F248A7A144CD81
3,134,861 UART: [art] SIG.S = 02D53E6D6CF6521EA102851A45F837182AD9F830DCCCC8D7114246202ED60685A66C9E18A5751F870F94DC33406D552D
3,158,636 UART: Caliptra RT
3,158,981 UART: [state] CFI Enabled
3,266,778 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,712 >>> mbox cmd response: success
2,684,694 UART:
2,684,710 UART: Running Caliptra FMC ...
2,685,118 UART:
2,685,261 UART: [state] CFI Enabled
2,695,722 UART: [fht] FMC Alias Private Key: 7
2,803,929 UART: [art] Extend RT PCRs Done
2,804,357 UART: [art] Lock RT PCRs Done
2,805,835 UART: [art] Populate DV Done
2,813,942 UART: [fht] FMC Alias Private Key: 7
2,814,956 UART: [art] Derive CDI
2,815,236 UART: [art] Store in in slot 0x4
2,901,047 UART: [art] Derive Key Pair
2,901,407 UART: [art] Store priv key in slot 0x5
2,915,043 UART: [art] Derive Key Pair - Done
2,929,896 UART: [art] Signing Cert with AUTHO
2,930,376 UART: RITY.KEYID = 7
2,945,738 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,503 UART: [art] PUB.X = 4D533960E8C847FBD3C4255A790924EF2A6B71B08CA43231659F4CF5E0BFF73BC80B376C710A8977D95C330AA8EEFBC7
2,953,271 UART: [art] PUB.Y = 75E675BD1AD03D389354B2FCF160E974A783C9D814214AE5E133E39C70C4C6D080966E54A1F7D4FDC8A60337FA0C6E8B
2,960,223 UART: [art] SIG.R = C1DCAF11B350C54CA5EA239D711360CE37B187E3B6968C542FE11B7E21632083FEA94DB8B53D39BA952B0AD91B3CB3F2
2,967,004 UART: [art] SIG.S = BB20FF1498B2DCF24DABA0A6882688D5D208D64DF1C2A65B262C02781903F1AA511A431DD83CFDEDB17C32ABB499DDEE
2,990,680 UART: Caliptra RT
2,991,025 UART: [state] CFI Enabled
3,099,847 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,616,066 >>> mbox cmd response: success
2,679,156 UART:
2,679,172 UART: Running Caliptra FMC ...
2,679,580 UART:
2,679,723 UART: [state] CFI Enabled
2,690,500 UART: [fht] FMC Alias Private Key: 7
2,798,269 UART: [art] Extend RT PCRs Done
2,798,697 UART: [art] Lock RT PCRs Done
2,800,409 UART: [art] Populate DV Done
2,808,448 UART: [fht] FMC Alias Private Key: 7
2,809,570 UART: [art] Derive CDI
2,809,850 UART: [art] Store in in slot 0x4
2,895,683 UART: [art] Derive Key Pair
2,896,043 UART: [art] Store priv key in slot 0x5
2,909,349 UART: [art] Derive Key Pair - Done
2,924,175 UART: [art] Signing Cert with AUTHO
2,924,655 UART: RITY.KEYID = 7
2,939,849 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,614 UART: [art] PUB.X = 53E424236E0473FD58B0826B9A42A718F7909B41DACC5BE2AE81D6AEE97A6343B0F62461D46EBA0C7A3A5BB6D688B082
2,947,388 UART: [art] PUB.Y = 34921F4975C1181BD0C86B669AF9CE2BFACEC19525478E243262DFCEF0A5A0F5C46AE592CBBF66297F36B4A984EFEDDE
2,954,358 UART: [art] SIG.R = 9C08B0FA3A34825DE63C54F1787C48553F0E1C6A8FF027EC3035D8F182A78302546C3CF5313FF46B66D0184DEC1B1945
2,961,121 UART: [art] SIG.S = A59EA881CFD2A85D35F2AF9CBDB1B966CECDEF587D7326D5F3061562954722FC413D27C349F5F0FAF1D9F3308A0E3BBC
2,984,972 UART: Caliptra RT
2,985,317 UART: [state] CFI Enabled
3,092,528 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,615,516 >>> mbox cmd response: success
2,677,782 UART:
2,677,798 UART: Running Caliptra FMC ...
2,678,206 UART:
2,678,349 UART: [state] CFI Enabled
2,689,082 UART: [fht] FMC Alias Private Key: 7
2,797,125 UART: [art] Extend RT PCRs Done
2,797,553 UART: [art] Lock RT PCRs Done
2,799,283 UART: [art] Populate DV Done
2,807,676 UART: [fht] FMC Alias Private Key: 7
2,808,778 UART: [art] Derive CDI
2,809,058 UART: [art] Store in in slot 0x4
2,894,887 UART: [art] Derive Key Pair
2,895,247 UART: [art] Store priv key in slot 0x5
2,908,405 UART: [art] Derive Key Pair - Done
2,923,414 UART: [art] Signing Cert with AUTHO
2,923,894 UART: RITY.KEYID = 7
2,939,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,831 UART: [art] PUB.X = F04F6F1D55AD67E0BE4AD0791405C3AD49500EBFCA2D846F3A43F16404BF4F127B63DCA4686431B1D7FFB038E340DA1C
2,946,608 UART: [art] PUB.Y = 6A731A7DB940CFFE2851A3EBD968DAECCDBB0C2428FBFEF42C0CFCB82A0BDCAFC81BE1F8FFB3CEB60BB8964F566186B2
2,953,586 UART: [art] SIG.R = EFA36B7C1103CDAF898AC1A7EB9E295ADB7049092D6F67F9447B5F04927ADFC042ECA715270B7D5EC92A3E565C8274C2
2,960,358 UART: [art] SIG.S = 85FFCFF3E0158B29FAA3CC4BB138495FF2EA738C14D53B21EE1CDDAF6D119A626EE214DA479FB29E6B8B159E9FEC1BFA
2,983,795 UART: Caliptra RT
2,984,140 UART: [state] CFI Enabled
3,090,821 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,612,706 >>> mbox cmd response: success
2,675,580 UART:
2,675,596 UART: Running Caliptra FMC ...
2,676,004 UART:
2,676,147 UART: [state] CFI Enabled
2,687,162 UART: [fht] FMC Alias Private Key: 7
2,795,035 UART: [art] Extend RT PCRs Done
2,795,463 UART: [art] Lock RT PCRs Done
2,797,117 UART: [art] Populate DV Done
2,805,252 UART: [fht] FMC Alias Private Key: 7
2,806,332 UART: [art] Derive CDI
2,806,612 UART: [art] Store in in slot 0x4
2,892,481 UART: [art] Derive Key Pair
2,892,841 UART: [art] Store priv key in slot 0x5
2,905,823 UART: [art] Derive Key Pair - Done
2,920,862 UART: [art] Signing Cert with AUTHO
2,921,342 UART: RITY.KEYID = 7
2,936,708 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,473 UART: [art] PUB.X = A29AF7FB3AABE81A4AB542E907DA0B69A48FAFFE80B1648C9B8114DEEE706CDB66E0D25954278E771F8155B6993974B8
2,944,251 UART: [art] PUB.Y = 44C63FD4BE9371C1D42DFAC26CDEAC34B699FAAA2015DE88F0C6D92DCD75762764F4AE4AFC3D3FAC43E4E94A20016678
2,951,220 UART: [art] SIG.R = 1A699C5B34DAECDF4807AA21945A7C3661233FD132EF0A360D85B2BB843C802DA3FFF971194698D38696EA2A4A2E6B50
2,957,989 UART: [art] SIG.S = A9A1FF08A6BFAB03AB406E37D173242874DC23F7C964D6F29C3533F6565C2821FD8244F2BE0898B2EA57911CFA3DE83E
2,981,601 UART: Caliptra RT
2,981,946 UART: [state] CFI Enabled
3,090,153 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.56s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,641 UART: [afmc] --
2,847,629 UART: [cold-reset] --
2,848,595 UART: [state] Locking Datavault
2,849,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,420 UART: [state] Locking ICCM
2,851,016 UART: [exit] Launching FMC @ 0x40000130
2,856,345 UART:
2,856,361 UART: Running Caliptra FMC ...
2,856,769 UART:
2,856,823 UART: [state] CFI Enabled
2,867,496 UART: [fht] FMC Alias Private Key: 7
2,974,875 UART: [art] Extend RT PCRs Done
2,975,303 UART: [art] Lock RT PCRs Done
2,976,991 UART: [art] Populate DV Done
2,985,282 UART: [fht] FMC Alias Private Key: 7
2,986,444 UART: [art] Derive CDI
2,986,724 UART: [art] Store in in slot 0x4
3,072,505 UART: [art] Derive Key Pair
3,072,865 UART: [art] Store priv key in slot 0x5
3,085,603 UART: [art] Derive Key Pair - Done
3,100,458 UART: [art] Signing Cert with AUTHO
3,100,938 UART: RITY.KEYID = 7
3,116,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,275 UART: [art] PUB.X = 0CF7D873FE081C3D5737F38BD8F045E08FE66B0F4B5E7B7D7041F86C864453ADEACC8BBE011CC143092F2C3CC3A704B9
3,124,043 UART: [art] PUB.Y = 70B6667F5C295499481D69E492A101246CCC457B3D8A627F233697824EF9FCF757012E88A0D2B1897BC1BDF07B12762A
3,130,983 UART: [art] SIG.R = A07C8984595983BA8F8BC668E78DCF540E11D74FB6605DEAC643BCCD2901CED3DD34F0A2E52C068EE4E998BF9E33917A
3,137,760 UART: [art] SIG.S = CD17EE834672CA633E897CF4F002EFF3F4F26A6645AE5ED5CA64C9BECB5098B5B18050CFA19E8100D2664F6170C3C214
3,162,088 UART: Caliptra RT
3,162,341 UART: [state] CFI Enabled
3,270,480 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,351 UART: [kat] SHA2-256
901,291 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,445 UART: [idev] ++
1,173,613 UART: [idev] CDI.KEYID = 6
1,173,974 UART: [idev] SUBJECT.KEYID = 7
1,174,399 UART: [idev] UDS.KEYID = 0
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,982 UART: [idev] Sha384 KeyId Algorithm
1,202,683 UART: [idev] --
1,203,628 UART: [ldev] ++
1,203,796 UART: [ldev] CDI.KEYID = 6
1,204,160 UART: [ldev] SUBJECT.KEYID = 5
1,204,587 UART: [ldev] AUTHORITY.KEYID = 7
1,205,050 UART: [ldev] FE.KEYID = 1
1,210,050 UART: [ldev] Erasing FE.KEYID = 1
1,235,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,936 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,658 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,686 UART: [ldev] --
1,274,976 UART: [fwproc] Wait for Commands...
1,275,571 UART: [fwproc] Recv command 0x46574c44
1,276,304 UART: [fwproc] Recv'd Img size: 114168 bytes
2,573,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,764,227 >>> mbox cmd response: success
2,765,424 UART: [afmc] ++
2,765,592 UART: [afmc] CDI.KEYID = 6
2,765,955 UART: [afmc] SUBJECT.KEYID = 7
2,766,381 UART: [afmc] AUTHORITY.KEYID = 5
2,801,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,712 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,830,595 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,314 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,843,959 UART: [afmc] --
2,844,839 UART: [cold-reset] --
2,845,761 UART: [state] Locking Datavault
2,846,946 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,550 UART: [state] Locking ICCM
2,848,158 UART: [exit] Launching FMC @ 0x40000130
2,853,487 UART:
2,853,503 UART: Running Caliptra FMC ...
2,853,911 UART:
2,853,965 UART: [state] CFI Enabled
2,864,936 UART: [fht] FMC Alias Private Key: 7
2,972,999 UART: [art] Extend RT PCRs Done
2,973,427 UART: [art] Lock RT PCRs Done
2,974,879 UART: [art] Populate DV Done
2,983,090 UART: [fht] FMC Alias Private Key: 7
2,984,098 UART: [art] Derive CDI
2,984,378 UART: [art] Store in in slot 0x4
3,070,071 UART: [art] Derive Key Pair
3,070,431 UART: [art] Store priv key in slot 0x5
3,083,367 UART: [art] Derive Key Pair - Done
3,098,158 UART: [art] Signing Cert with AUTHO
3,098,638 UART: RITY.KEYID = 7
3,113,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,561 UART: [art] PUB.X = 77EE201DBDA524BA16710C311DD162098FF6F4A3CFD9F174880ACDFB96481EAFC0B5FA86BE3A16D28684946DCA6B2C56
3,121,340 UART: [art] PUB.Y = 563E19718A091624D95AD32D46E2A7FB7A9187A61E7B4C3320167B7CA50108BCEAB0C0AEE206C309A2ABEB6F2134886D
3,128,283 UART: [art] SIG.R = A0B13266AC5E2D5AAE9F8AD33139B890BE06D6D46C62B49691937897CB778A70160123B135DF2775DC2C4838624044E2
3,135,043 UART: [art] SIG.S = 0322C2229A17472F10C0975C2C808D3BFD77A38734D8B2291C5B6FB949DE63A3F1DD1DBB2486D20D145A3945590ADE53
3,159,323 UART: Caliptra RT
3,159,576 UART: [state] CFI Enabled
3,267,112 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
890,860 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,989 UART: [kat] ++
895,141 UART: [kat] sha1
899,517 UART: [kat] SHA2-256
901,457 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,217 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,488 UART: [idev] Fuse KeyId
1,199,710 UART: [idev] --
1,200,795 UART: [ldev] ++
1,200,963 UART: [ldev] CDI.KEYID = 6
1,201,327 UART: [ldev] SUBJECT.KEYID = 5
1,201,754 UART: [ldev] AUTHORITY.KEYID = 7
1,202,217 UART: [ldev] FE.KEYID = 1
1,207,339 UART: [ldev] Erasing FE.KEYID = 1
1,233,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,347 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,029 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,196 UART: [ldev] --
1,272,686 UART: [fwproc] Wait for Commands...
1,273,429 UART: [fwproc] Recv command 0x46574c44
1,274,162 UART: [fwproc] Recv'd Img size: 114168 bytes
2,570,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,597,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,627,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,762,859 >>> mbox cmd response: success
2,764,056 UART: [afmc] ++
2,764,224 UART: [afmc] CDI.KEYID = 6
2,764,587 UART: [afmc] SUBJECT.KEYID = 7
2,765,013 UART: [afmc] AUTHORITY.KEYID = 5
2,799,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,817,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,822,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,828,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,834,582 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,842,447 UART: [afmc] --
2,843,557 UART: [cold-reset] --
2,844,529 UART: [state] Locking Datavault
2,845,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,846,102 UART: [state] Locking ICCM
2,846,640 UART: [exit] Launching FMC @ 0x40000130
2,851,969 UART:
2,851,985 UART: Running Caliptra FMC ...
2,852,393 UART:
2,852,447 UART: [state] CFI Enabled
2,862,434 UART: [fht] FMC Alias Private Key: 7
2,970,407 UART: [art] Extend RT PCRs Done
2,970,835 UART: [art] Lock RT PCRs Done
2,972,801 UART: [art] Populate DV Done
2,981,136 UART: [fht] FMC Alias Private Key: 7
2,982,284 UART: [art] Derive CDI
2,982,564 UART: [art] Store in in slot 0x4
3,068,151 UART: [art] Derive Key Pair
3,068,511 UART: [art] Store priv key in slot 0x5
3,081,639 UART: [art] Derive Key Pair - Done
3,096,286 UART: [art] Signing Cert with AUTHO
3,096,766 UART: RITY.KEYID = 7
3,111,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,112,607 UART: [art] PUB.X = B87583491F4D3719834DC7BFCE56EDD5E104AB994DDA1637ED24E90B9AFAD7C40AEA61CA017BF0802D17D162EBC80AEE
3,119,384 UART: [art] PUB.Y = 68EE887199F389E26BE1838ED4C6336789E144705D5E9D6E6AF96BC358F4834E90BDF8E6FEE7F60E1A3F903D82308AA9
3,126,337 UART: [art] SIG.R = 58AA82353D8616DA38004A368FF4B084880C449E1C5752475E7C76AFB771AED97CF19910E8992D03AF4238E1DB4BDE05
3,133,078 UART: [art] SIG.S = 8C18F7E837D8E1DEE6A078E85BFCA5395CF3CC375F7092A9093B57025ABB1C08B15FA483843BA8FAB85AA85243786072
3,157,038 UART: Caliptra RT
3,157,291 UART: [state] CFI Enabled
3,263,762 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,695 >>> mbox cmd response: success
2,683,555 UART:
2,683,571 UART: Running Caliptra FMC ...
2,683,979 UART:
2,684,033 UART: [state] CFI Enabled
2,694,852 UART: [fht] FMC Alias Private Key: 7
2,802,655 UART: [art] Extend RT PCRs Done
2,803,083 UART: [art] Lock RT PCRs Done
2,804,537 UART: [art] Populate DV Done
2,812,834 UART: [fht] FMC Alias Private Key: 7
2,813,786 UART: [art] Derive CDI
2,814,066 UART: [art] Store in in slot 0x4
2,899,833 UART: [art] Derive Key Pair
2,900,193 UART: [art] Store priv key in slot 0x5
2,913,455 UART: [art] Derive Key Pair - Done
2,928,370 UART: [art] Signing Cert with AUTHO
2,928,850 UART: RITY.KEYID = 7
2,943,998 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,763 UART: [art] PUB.X = E3832E92EACE2B5EA8AD3A8FD91E00BAB5DAD7003E9486880ADE0A97654EAE1FD289967816770EF1AC30584C0DFE96E3
2,951,495 UART: [art] PUB.Y = 97E43811A51799F2115C34334A3DE181FB4C8B45634E00327A91D4E4DC99A4E88FFCBB59D363CC92FB5BEBE8FCB179B1
2,958,435 UART: [art] SIG.R = B2C1FE4FA1717031D08E793D12D0B54F30758A57CA016C404962E06F63AE0A5389FA125BAA84618CE7970BE5F3F12102
2,965,195 UART: [art] SIG.S = 9DAC751B162126ECCC7880A2A26D95644CDAA5A047BBFEDD773834A98A0EF863E4F08A4CC629A0B2C48395B9E2B51B03
2,988,878 UART: Caliptra RT
2,989,131 UART: [state] CFI Enabled
3,095,853 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,616,759 >>> mbox cmd response: success
2,678,603 UART:
2,678,619 UART: Running Caliptra FMC ...
2,679,027 UART:
2,679,081 UART: [state] CFI Enabled
2,689,180 UART: [fht] FMC Alias Private Key: 7
2,797,041 UART: [art] Extend RT PCRs Done
2,797,469 UART: [art] Lock RT PCRs Done
2,798,907 UART: [art] Populate DV Done
2,806,966 UART: [fht] FMC Alias Private Key: 7
2,808,022 UART: [art] Derive CDI
2,808,302 UART: [art] Store in in slot 0x4
2,894,189 UART: [art] Derive Key Pair
2,894,549 UART: [art] Store priv key in slot 0x5
2,907,605 UART: [art] Derive Key Pair - Done
2,922,211 UART: [art] Signing Cert with AUTHO
2,922,691 UART: RITY.KEYID = 7
2,937,695 UART: [art] Erasing AUTHORITY.KEYID = 7
2,938,460 UART: [art] PUB.X = 92795E7EB75A69FA8F86D265EB9BB54F2D5435D865308203DA577552E39415730103AC89854C7280FC945668D110297B
2,945,209 UART: [art] PUB.Y = 52E32077B2132CB321A55B6B3D7E98635A64F875558E021D62BF7A632FCB737EC88B4408FF31DCAC019E599DA80916EA
2,952,151 UART: [art] SIG.R = 292814556797BCF939FF5AFD7030169D726954BBA0B26446C0EB87A69EEFB0B76EBE10441D0CF15A8A5BCBED6BFA9087
2,958,932 UART: [art] SIG.S = 20D9E658C84AF4699906983EF5B55372D1CB5AD58CAC07D7BA65806EB5F7A2F1F47357F81F9339F44EFB571D4D3165DB
2,982,995 UART: Caliptra RT
2,983,248 UART: [state] CFI Enabled
3,090,487 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,612,805 >>> mbox cmd response: success
2,674,413 UART:
2,674,429 UART: Running Caliptra FMC ...
2,674,837 UART:
2,674,891 UART: [state] CFI Enabled
2,685,492 UART: [fht] FMC Alias Private Key: 7
2,793,499 UART: [art] Extend RT PCRs Done
2,793,927 UART: [art] Lock RT PCRs Done
2,795,791 UART: [art] Populate DV Done
2,803,870 UART: [fht] FMC Alias Private Key: 7
2,804,898 UART: [art] Derive CDI
2,805,178 UART: [art] Store in in slot 0x4
2,890,515 UART: [art] Derive Key Pair
2,890,875 UART: [art] Store priv key in slot 0x5
2,904,065 UART: [art] Derive Key Pair - Done
2,918,862 UART: [art] Signing Cert with AUTHO
2,919,342 UART: RITY.KEYID = 7
2,934,744 UART: [art] Erasing AUTHORITY.KEYID = 7
2,935,509 UART: [art] PUB.X = 7A9DEA9BA8149AA5A6742F079BA3BE8128B6B91B990DA8F739FC88527B4489DED00679BC0E468378C7C2C984078FAEC8
2,942,274 UART: [art] PUB.Y = CC1E056997D5B1866D18D2C988B2517FDBBF7ACF887DEE89DE3E91885B0D7E417E3EC70057A1E832B2BD580C08549DF0
2,949,202 UART: [art] SIG.R = 4661CB9AB8DA67C591730EF45E89AB349B0902596E2081D01EA997C46B728364994FAE4D0843AB86F665C4223AC20AB8
2,955,957 UART: [art] SIG.S = E1B06DC7DF63BE5D8F3D9D0D6E8F0C7816913D2A8F70B876514ABC91A2D0BB806D388DCD2173705A21C2DA21431C3C36
2,979,392 UART: Caliptra RT
2,979,645 UART: [state] CFI Enabled
3,087,935 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,613,301 >>> mbox cmd response: success
2,675,179 UART:
2,675,195 UART: Running Caliptra FMC ...
2,675,603 UART:
2,675,657 UART: [state] CFI Enabled
2,686,672 UART: [fht] FMC Alias Private Key: 7
2,794,817 UART: [art] Extend RT PCRs Done
2,795,245 UART: [art] Lock RT PCRs Done
2,796,785 UART: [art] Populate DV Done
2,805,028 UART: [fht] FMC Alias Private Key: 7
2,806,206 UART: [art] Derive CDI
2,806,486 UART: [art] Store in in slot 0x4
2,891,893 UART: [art] Derive Key Pair
2,892,253 UART: [art] Store priv key in slot 0x5
2,905,811 UART: [art] Derive Key Pair - Done
2,920,843 UART: [art] Signing Cert with AUTHO
2,921,323 UART: RITY.KEYID = 7
2,936,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,348 UART: [art] PUB.X = F0D2D68EB746393BFFBD003DB60AAC332F75DE7097F7A04DB37308EDB83691EE63B6D7DAAC2E985CCD3CD55EE50822BC
2,944,111 UART: [art] PUB.Y = 8A07668D901D10FFFBFDB30569B9F0E5B8C94F3C8F3E687CEF56CE2624E82555BAE89EFEE484D551FF9FD67E6198D974
2,951,071 UART: [art] SIG.R = 2CD11C1D4548EAEC4AC529CBD3642B373077DC01B58D2922C3B44BC6D62622BDD8F2A9019DBE396B086EE2A023339698
2,957,840 UART: [art] SIG.S = 51E05BBD2CB8082EC8A4ECAE12693B6F176B03727B51F1DBF09A8A30BD323EEED99BB593E51BE19F572C1FA3673A456B
2,981,977 UART: Caliptra RT
2,982,230 UART: [state] CFI Enabled
3,090,889 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.88s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,898 UART: [afmc] --
2,848,928 UART: [cold-reset] --
2,849,768 UART: [state] Locking Datavault
2,851,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,633 UART: [state] Locking ICCM
2,852,233 UART: [exit] Launching FMC @ 0x40000130
2,857,562 UART:
2,857,578 UART: Running Caliptra FMC ...
2,857,986 UART:
2,858,129 UART: [state] CFI Enabled
2,868,420 UART: [fht] FMC Alias Private Key: 7
2,976,505 UART: [art] Extend RT PCRs Done
2,976,933 UART: [art] Lock RT PCRs Done
2,978,577 UART: [art] Populate DV Done
2,987,150 UART: [fht] FMC Alias Private Key: 7
2,988,158 UART: [art] Derive CDI
2,988,438 UART: [art] Store in in slot 0x4
3,074,095 UART: [art] Derive Key Pair
3,074,455 UART: [art] Store priv key in slot 0x5
3,088,169 UART: [art] Derive Key Pair - Done
3,102,953 UART: [art] Signing Cert with AUTHO
3,103,433 UART: RITY.KEYID = 7
3,118,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,760 UART: [art] PUB.X = 2134F69379C343EEFD3C4592AE458EBDFDEEB7BDB005643E1AB46A48DB95DC633CC3A620535E1E06CD9D308EA0F5A9AA
3,126,546 UART: [art] PUB.Y = 134A9FDB6F8427A43E63E5DD424C83AC4BC475EC6859F32B44ACECB380A78E51B92C6AD92D79438444B5BDF564F488BC
3,133,510 UART: [art] SIG.R = 2C9AA72C6DFAF4369D9D4D771D3E46D8B102919424F8AA0037D074BA29F35B47F40D5EA42382EE1E97A085AF7C413ABC
3,140,264 UART: [art] SIG.S = 08A21BBB05152AD746BBCBA999A76416D1FBA891F8D09F1A9710D72BE28D371DE7B3700905DA68627510BFDE4FA4E4D4
3,163,453 UART: Caliptra RT
3,163,798 UART: [state] CFI Enabled
3,271,853 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
916,039 UART: [kat] HMAC-384Kdf
920,693 UART: [kat] LMS
1,169,005 UART: [kat] --
1,169,772 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,918 UART: [idev] ++
1,173,086 UART: [idev] CDI.KEYID = 6
1,173,447 UART: [idev] SUBJECT.KEYID = 7
1,173,872 UART: [idev] UDS.KEYID = 0
1,181,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,387 UART: [idev] Sha384 KeyId Algorithm
1,203,084 UART: [idev] --
1,204,141 UART: [ldev] ++
1,204,309 UART: [ldev] CDI.KEYID = 6
1,204,673 UART: [ldev] SUBJECT.KEYID = 5
1,205,100 UART: [ldev] AUTHORITY.KEYID = 7
1,205,563 UART: [ldev] FE.KEYID = 1
1,210,993 UART: [ldev] Erasing FE.KEYID = 1
1,237,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,883 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,605 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,511 UART: [ldev] --
1,276,841 UART: [fwproc] Wait for Commands...
1,277,484 UART: [fwproc] Recv command 0x46574c44
1,278,217 UART: [fwproc] Recv'd Img size: 114168 bytes
2,573,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,600,433 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,765,282 >>> mbox cmd response: success
2,766,343 UART: [afmc] ++
2,766,511 UART: [afmc] CDI.KEYID = 6
2,766,874 UART: [afmc] SUBJECT.KEYID = 7
2,767,300 UART: [afmc] AUTHORITY.KEYID = 5
2,802,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,825,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,831,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,837,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,858 UART: [afmc] --
2,845,796 UART: [cold-reset] --
2,846,658 UART: [state] Locking Datavault
2,847,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,401 UART: [state] Locking ICCM
2,848,865 UART: [exit] Launching FMC @ 0x40000130
2,854,194 UART:
2,854,210 UART: Running Caliptra FMC ...
2,854,618 UART:
2,854,761 UART: [state] CFI Enabled
2,865,376 UART: [fht] FMC Alias Private Key: 7
2,973,229 UART: [art] Extend RT PCRs Done
2,973,657 UART: [art] Lock RT PCRs Done
2,975,223 UART: [art] Populate DV Done
2,983,670 UART: [fht] FMC Alias Private Key: 7
2,984,720 UART: [art] Derive CDI
2,985,000 UART: [art] Store in in slot 0x4
3,070,721 UART: [art] Derive Key Pair
3,071,081 UART: [art] Store priv key in slot 0x5
3,084,557 UART: [art] Derive Key Pair - Done
3,099,455 UART: [art] Signing Cert with AUTHO
3,099,935 UART: RITY.KEYID = 7
3,115,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,826 UART: [art] PUB.X = 5380FEF2DCC7084F9E2269134838661FFDBC516138FA34068819FFC3B4B4D2955BDBCD138E575867295236EEDF578302
3,122,587 UART: [art] PUB.Y = 10CE16C54F6913CC552EFF9C1D38BBE3BD6FEEED3F1CFE02A146CDC8BF54DF4392BAE7CE9DE78C4BAEF37901AEF33EA8
3,129,569 UART: [art] SIG.R = 1C58FC3C7EC18EAE8994E331B3833D93F071586E0B94DEB9FD695E84E0E7BC882AEE4235575635E8F14D6D4C56691116
3,136,340 UART: [art] SIG.S = 3119E0BD921C573C5E57242097B567709BB426AF4F4D78CEC80389CF816170A67569061432D619387326079F6C8E6A24
3,160,278 UART: Caliptra RT
3,160,623 UART: [state] CFI Enabled
3,268,712 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [kat] SHA2-256
890,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,104 UART: [kat] ++
895,256 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,761 UART: [idev] Fuse KeyId
1,200,983 UART: [idev] --
1,201,964 UART: [ldev] ++
1,202,132 UART: [ldev] CDI.KEYID = 6
1,202,496 UART: [ldev] SUBJECT.KEYID = 5
1,202,923 UART: [ldev] AUTHORITY.KEYID = 7
1,203,386 UART: [ldev] FE.KEYID = 1
1,208,474 UART: [ldev] Erasing FE.KEYID = 1
1,234,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,276 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,958 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,037 UART: [ldev] --
1,273,471 UART: [fwproc] Wait for Commands...
1,274,154 UART: [fwproc] Recv command 0x46574c44
1,274,887 UART: [fwproc] Recv'd Img size: 114168 bytes
2,571,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,677 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,986 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,764,666 >>> mbox cmd response: success
2,765,805 UART: [afmc] ++
2,765,973 UART: [afmc] CDI.KEYID = 6
2,766,336 UART: [afmc] SUBJECT.KEYID = 7
2,766,762 UART: [afmc] AUTHORITY.KEYID = 5
2,802,041 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,982 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,830,594 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,313 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,358 UART: [afmc] --
2,845,278 UART: [cold-reset] --
2,845,876 UART: [state] Locking Datavault
2,847,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,843 UART: [state] Locking ICCM
2,848,393 UART: [exit] Launching FMC @ 0x40000130
2,853,722 UART:
2,853,738 UART: Running Caliptra FMC ...
2,854,146 UART:
2,854,289 UART: [state] CFI Enabled
2,864,970 UART: [fht] FMC Alias Private Key: 7
2,972,703 UART: [art] Extend RT PCRs Done
2,973,131 UART: [art] Lock RT PCRs Done
2,974,575 UART: [art] Populate DV Done
2,983,020 UART: [fht] FMC Alias Private Key: 7
2,984,188 UART: [art] Derive CDI
2,984,468 UART: [art] Store in in slot 0x4
3,070,015 UART: [art] Derive Key Pair
3,070,375 UART: [art] Store priv key in slot 0x5
3,083,801 UART: [art] Derive Key Pair - Done
3,098,854 UART: [art] Signing Cert with AUTHO
3,099,334 UART: RITY.KEYID = 7
3,114,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,115,531 UART: [art] PUB.X = C29BDE43067C0ED65922209F435F5ADDA669C5A0348D913CA67C197F2322BD467B4940DFF1FFE2B08A09A9D62068784A
3,122,298 UART: [art] PUB.Y = D06F1E18C9C8169D35513AF72164FC5CB2D0E78111D32864EA6B85D5A95B1683CA0C34BFD181314B913CA3999054C41C
3,129,247 UART: [art] SIG.R = A77AE9BE4AFB4E8334BA36FAE4C71B509C641FDB6DE953383D82BB59D6B0B43FB583BDA586DE8D554A340858ED9591D7
3,136,032 UART: [art] SIG.S = F74EADA1F8567C48F72FD6D56E69B63EFE5D1143263EC0838C4F981CB6BFA170D47B72FDECF9A0511BBE1E5197A41ECF
3,160,425 UART: Caliptra RT
3,160,770 UART: [state] CFI Enabled
3,267,296 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,532 >>> mbox cmd response: success
2,682,280 UART:
2,682,296 UART: Running Caliptra FMC ...
2,682,704 UART:
2,682,847 UART: [state] CFI Enabled
2,693,204 UART: [fht] FMC Alias Private Key: 7
2,801,411 UART: [art] Extend RT PCRs Done
2,801,839 UART: [art] Lock RT PCRs Done
2,803,477 UART: [art] Populate DV Done
2,811,684 UART: [fht] FMC Alias Private Key: 7
2,812,750 UART: [art] Derive CDI
2,813,030 UART: [art] Store in in slot 0x4
2,899,087 UART: [art] Derive Key Pair
2,899,447 UART: [art] Store priv key in slot 0x5
2,913,093 UART: [art] Derive Key Pair - Done
2,928,029 UART: [art] Signing Cert with AUTHO
2,928,509 UART: RITY.KEYID = 7
2,943,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,336 UART: [art] PUB.X = EEA87021B6D0260C22F363776B51F5E50A714A7151DA7C7FCEFF7DED48CA37B3E854F71AC0F2A2FB86B655A08FB51687
2,951,114 UART: [art] PUB.Y = 2306EA0BA1A17A47F15DDF4DF82BE710036B8B1C0B4EA5D4046E3AA381D9D0A2D62B427DABA5C4460A3F8F27D33F4FC5
2,958,066 UART: [art] SIG.R = C4A08DB9B3DE2D66C30F115E80A5C48CF047C2186667E62C5403BF2D21B0204A25EEDF2C00438DA93A3D36FBCB7542FD
2,964,822 UART: [art] SIG.S = 268747B4CDC10D9D202F9680FC78F3C11601682CA54356C1FF859DD06DE848D128D41F5284FB90C66C039EAB286F896E
2,988,346 UART: Caliptra RT
2,988,691 UART: [state] CFI Enabled
3,097,278 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,658 >>> mbox cmd response: success
2,679,000 UART:
2,679,016 UART: Running Caliptra FMC ...
2,679,424 UART:
2,679,567 UART: [state] CFI Enabled
2,690,308 UART: [fht] FMC Alias Private Key: 7
2,798,651 UART: [art] Extend RT PCRs Done
2,799,079 UART: [art] Lock RT PCRs Done
2,800,393 UART: [art] Populate DV Done
2,808,600 UART: [fht] FMC Alias Private Key: 7
2,809,560 UART: [art] Derive CDI
2,809,840 UART: [art] Store in in slot 0x4
2,895,575 UART: [art] Derive Key Pair
2,895,935 UART: [art] Store priv key in slot 0x5
2,909,549 UART: [art] Derive Key Pair - Done
2,924,240 UART: [art] Signing Cert with AUTHO
2,924,720 UART: RITY.KEYID = 7
2,939,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,729 UART: [art] PUB.X = CCB1090A6672EAB0D5736692CC248AEBE278EF3AE9650DFFC6A0ECD95798FE603F9A4C2F3190AE71F6D108092414B472
2,947,496 UART: [art] PUB.Y = B176697E4F74E159D7829DBC6B5EBD4D9DB6BF2D342D608A3D11D9BA8807503A9E265858987A5B75D2E688CFD70C3FB6
2,954,450 UART: [art] SIG.R = CD9C878A60CF63C9CE439452B752962D3C6651989414F314F98FC8A539420F76619E96ABA2DCE4ED77E8A7963DB6C5ED
2,961,223 UART: [art] SIG.S = 1893095471123234FD96264ACD089AE02938E40403E508F71907EB2BAD510095977779FA9820757D84BA630DED59E3C1
2,984,547 UART: Caliptra RT
2,984,892 UART: [state] CFI Enabled
3,092,578 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,614,834 >>> mbox cmd response: success
2,676,332 UART:
2,676,348 UART: Running Caliptra FMC ...
2,676,756 UART:
2,676,899 UART: [state] CFI Enabled
2,687,344 UART: [fht] FMC Alias Private Key: 7
2,795,427 UART: [art] Extend RT PCRs Done
2,795,855 UART: [art] Lock RT PCRs Done
2,797,547 UART: [art] Populate DV Done
2,805,904 UART: [fht] FMC Alias Private Key: 7
2,806,844 UART: [art] Derive CDI
2,807,124 UART: [art] Store in in slot 0x4
2,892,955 UART: [art] Derive Key Pair
2,893,315 UART: [art] Store priv key in slot 0x5
2,906,591 UART: [art] Derive Key Pair - Done
2,921,369 UART: [art] Signing Cert with AUTHO
2,921,849 UART: RITY.KEYID = 7
2,936,867 UART: [art] Erasing AUTHORITY.KEYID = 7
2,937,632 UART: [art] PUB.X = 6EA0339EC2F668B9C31804BE9D0C6C391ED8E562C1F05E1919F3BFAB196EE941760755FDB1AF18F93362CCC37DEB31C1
2,944,407 UART: [art] PUB.Y = DE394C6E36A90C013EE19BA6B1AFE9FE65739D9CB5638D3F7DD237C3413A53768A3A5B562B97D807700BEC6BB11C7DB8
2,951,359 UART: [art] SIG.R = AF05131694C0E5615DBC0A5445CC72E7D873313190114670BC6C57121C3227C5F97F37DB147F0AC0FAB3FF82DA830B6A
2,958,121 UART: [art] SIG.S = 5E9C3731FF5B8FAB7D7644458978990C2EFC5BF4F466A0CDD4A9D68A13AC29BED7A471B5E3110667C3F3BC5314495E20
2,982,346 UART: Caliptra RT
2,982,691 UART: [state] CFI Enabled
3,090,375 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,613,628 >>> mbox cmd response: success
2,676,604 UART:
2,676,620 UART: Running Caliptra FMC ...
2,677,028 UART:
2,677,171 UART: [state] CFI Enabled
2,688,166 UART: [fht] FMC Alias Private Key: 7
2,796,269 UART: [art] Extend RT PCRs Done
2,796,697 UART: [art] Lock RT PCRs Done
2,798,339 UART: [art] Populate DV Done
2,806,578 UART: [fht] FMC Alias Private Key: 7
2,807,700 UART: [art] Derive CDI
2,807,980 UART: [art] Store in in slot 0x4
2,894,127 UART: [art] Derive Key Pair
2,894,487 UART: [art] Store priv key in slot 0x5
2,907,755 UART: [art] Derive Key Pair - Done
2,922,574 UART: [art] Signing Cert with AUTHO
2,923,054 UART: RITY.KEYID = 7
2,938,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,599 UART: [art] PUB.X = 6B140C1CD95F574983D28DD91FEBAF538737A18B0A22B7AAD6F28A44B5F990D6282299B07E490F423F5D430958848411
2,946,355 UART: [art] PUB.Y = 9A917846CC35238F0A4A1265106111A3C68B35A2B9155E7AD9DD6F6D0D253E7CCE57A62374D063B46B4B77BE7B156A23
2,953,301 UART: [art] SIG.R = 4FFEC89B88F0282D5B6B93F0DBBB5925F05B12F4CF3C95C516BC359BABD491743A6B02B11DCF051362886233D41A0DB8
2,960,074 UART: [art] SIG.S = C4202ED2B9AA686D51D328F786CF078C9733D1A19C0A05F6F6F3DFFA7B92E961A545C3D3275262909920EC2BA06FE8CE
2,983,276 UART: Caliptra RT
2,983,621 UART: [state] CFI Enabled
3,091,418 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.43s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,327 UART: [afmc] --
2,848,309 UART: [cold-reset] --
2,849,173 UART: [state] Locking Datavault
2,850,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,752 UART: [state] Locking ICCM
2,851,298 UART: [exit] Launching FMC @ 0x40000130
2,856,627 UART:
2,856,643 UART: Running Caliptra FMC ...
2,857,051 UART:
2,857,105 UART: [state] CFI Enabled
2,867,612 UART: [fht] FMC Alias Private Key: 7
2,976,315 UART: [art] Extend RT PCRs Done
2,976,743 UART: [art] Lock RT PCRs Done
2,978,253 UART: [art] Populate DV Done
2,986,366 UART: [fht] FMC Alias Private Key: 7
2,987,472 UART: [art] Derive CDI
2,987,752 UART: [art] Store in in slot 0x4
3,073,777 UART: [art] Derive Key Pair
3,074,137 UART: [art] Store priv key in slot 0x5
3,086,797 UART: [art] Derive Key Pair - Done
3,101,759 UART: [art] Signing Cert with AUTHO
3,102,239 UART: RITY.KEYID = 7
3,117,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,172 UART: [art] PUB.X = BAEA9E88D2A9176A41F8CA5DF0F2CEE459855D75A0EE868C13E9C69481E5196CF0624579A18098822B7DEB2FC00315BA
3,124,949 UART: [art] PUB.Y = 6A317909C8EF7A31818E3407245DDD5EC21705B5F0D35C4EB7E12F4357F46ECB00623C75EB5E7573A8A4F5A939B3B470
3,131,872 UART: [art] SIG.R = 6523B8813D5E61F1E00F56F852B55323ECF58F46D655D37145711EBC5A55EAF1F88F1533DA40406E7E2378B5F49BF3E5
3,138,641 UART: [art] SIG.S = EA4BA766E86A5F78A7E8358A1364A223EA7BFDF8AE5DFEAD223EB81670E2002080B022A7618696E81935E6CFB5DFAB0C
3,162,131 UART: Caliptra RT
3,162,384 UART: [state] CFI Enabled
3,269,582 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,509 UART: [kat] SHA2-256
901,449 UART: [kat] SHA2-384
904,284 UART: [kat] SHA2-512-ACC
906,185 UART: [kat] ECC-384
915,564 UART: [kat] HMAC-384Kdf
920,138 UART: [kat] LMS
1,168,450 UART: [kat] --
1,169,471 UART: [cold-reset] ++
1,170,001 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,181,373 UART: [idev] Erasing UDS.KEYID = 0
1,197,972 UART: [idev] Sha384 KeyId Algorithm
1,201,617 UART: [idev] --
1,202,558 UART: [ldev] ++
1,202,726 UART: [ldev] CDI.KEYID = 6
1,203,090 UART: [ldev] SUBJECT.KEYID = 5
1,203,517 UART: [ldev] AUTHORITY.KEYID = 7
1,203,980 UART: [ldev] FE.KEYID = 1
1,209,272 UART: [ldev] Erasing FE.KEYID = 1
1,235,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,386 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,108 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,248 UART: [ldev] --
1,274,646 UART: [fwproc] Wait for Commands...
1,275,465 UART: [fwproc] Recv command 0x46574c44
1,276,198 UART: [fwproc] Recv'd Img size: 114168 bytes
2,572,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,599,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,629,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,764,765 >>> mbox cmd response: success
2,765,928 UART: [afmc] ++
2,766,096 UART: [afmc] CDI.KEYID = 6
2,766,459 UART: [afmc] SUBJECT.KEYID = 7
2,766,885 UART: [afmc] AUTHORITY.KEYID = 5
2,802,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,818,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,237 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,824,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,830,849 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,836,568 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,844,303 UART: [afmc] --
2,845,249 UART: [cold-reset] --
2,845,989 UART: [state] Locking Datavault
2,847,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,960 UART: [state] Locking ICCM
2,848,500 UART: [exit] Launching FMC @ 0x40000130
2,853,829 UART:
2,853,845 UART: Running Caliptra FMC ...
2,854,253 UART:
2,854,307 UART: [state] CFI Enabled
2,864,926 UART: [fht] FMC Alias Private Key: 7
2,972,921 UART: [art] Extend RT PCRs Done
2,973,349 UART: [art] Lock RT PCRs Done
2,975,057 UART: [art] Populate DV Done
2,983,232 UART: [fht] FMC Alias Private Key: 7
2,984,164 UART: [art] Derive CDI
2,984,444 UART: [art] Store in in slot 0x4
3,070,235 UART: [art] Derive Key Pair
3,070,595 UART: [art] Store priv key in slot 0x5
3,083,579 UART: [art] Derive Key Pair - Done
3,098,120 UART: [art] Signing Cert with AUTHO
3,098,600 UART: RITY.KEYID = 7
3,113,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,487 UART: [art] PUB.X = 423E65DE4AC7B0BACE9FF63A9404574DF3A362B2D63303A662E8F4B218AA9FFF3F2C15F188EA73370B55E4C150C2E405
3,121,257 UART: [art] PUB.Y = E3CF607C026DDF5919917483F08456ECCBC7EFCBD34EDAD8579C0F7F75FCED8BA4967072A0844759EC6C4C3DF103709F
3,128,214 UART: [art] SIG.R = B2F25EE9F2C418029E0809A9EFDCDA7402F52325D792C9EADFC4FE7D4AFC9B6BA29B8E1156DDC4CC70916C9EB829C06A
3,134,996 UART: [art] SIG.S = 101BFFC73C83029792E20B130DBCF1D10743E6BA697A2853EEA0350484BD0DD1CA38901A54E2421F13995A7906957F82
3,158,438 UART: Caliptra RT
3,158,691 UART: [state] CFI Enabled
3,265,753 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,573 UART: [kat] SHA2-256
901,513 UART: [kat] SHA2-384
904,038 UART: [kat] SHA2-512-ACC
905,939 UART: [kat] ECC-384
914,944 UART: [kat] HMAC-384Kdf
919,394 UART: [kat] LMS
1,167,706 UART: [kat] --
1,168,557 UART: [cold-reset] ++
1,169,051 UART: [fht] FHT @ 0x50003400
1,171,883 UART: [idev] ++
1,172,051 UART: [idev] CDI.KEYID = 6
1,172,412 UART: [idev] SUBJECT.KEYID = 7
1,172,837 UART: [idev] UDS.KEYID = 0
1,180,773 UART: [idev] Erasing UDS.KEYID = 0
1,197,910 UART: [idev] Fuse KeyId
1,199,132 UART: [idev] --
1,200,173 UART: [ldev] ++
1,200,341 UART: [ldev] CDI.KEYID = 6
1,200,705 UART: [ldev] SUBJECT.KEYID = 5
1,201,132 UART: [ldev] AUTHORITY.KEYID = 7
1,201,595 UART: [ldev] FE.KEYID = 1
1,206,713 UART: [ldev] Erasing FE.KEYID = 1
1,233,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,335 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,017 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,271,208 UART: [ldev] --
1,272,722 UART: [fwproc] Wait for Commands...
1,273,533 UART: [fwproc] Recv command 0x46574c44
1,274,266 UART: [fwproc] Recv'd Img size: 114168 bytes
2,570,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,597,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,627,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,762,891 >>> mbox cmd response: success
2,764,088 UART: [afmc] ++
2,764,256 UART: [afmc] CDI.KEYID = 6
2,764,619 UART: [afmc] SUBJECT.KEYID = 7
2,765,045 UART: [afmc] AUTHORITY.KEYID = 5
2,799,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,816,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,816,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,822,630 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,828,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,834,232 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,842,193 UART: [afmc] --
2,843,077 UART: [cold-reset] --
2,843,949 UART: [state] Locking Datavault
2,845,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,845,740 UART: [state] Locking ICCM
2,846,344 UART: [exit] Launching FMC @ 0x40000130
2,851,673 UART:
2,851,689 UART: Running Caliptra FMC ...
2,852,097 UART:
2,852,151 UART: [state] CFI Enabled
2,862,986 UART: [fht] FMC Alias Private Key: 7
2,970,435 UART: [art] Extend RT PCRs Done
2,970,863 UART: [art] Lock RT PCRs Done
2,972,223 UART: [art] Populate DV Done
2,980,386 UART: [fht] FMC Alias Private Key: 7
2,981,538 UART: [art] Derive CDI
2,981,818 UART: [art] Store in in slot 0x4
3,067,895 UART: [art] Derive Key Pair
3,068,255 UART: [art] Store priv key in slot 0x5
3,081,439 UART: [art] Derive Key Pair - Done
3,096,326 UART: [art] Signing Cert with AUTHO
3,096,806 UART: RITY.KEYID = 7
3,111,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,112,623 UART: [art] PUB.X = F622D648E8780B5801E11F6F54DAE2859252FD24D4F4B8230930C62DF99E70C7F0DE90AFC3A397AF905B8871E1756062
3,119,384 UART: [art] PUB.Y = 7DEFB1843E889DE9480CE81246FEDBC7BC19DEA128A35C14629BC4BDC7A4B39AFE822989CBEA7ACADC7AE25D71704087
3,126,355 UART: [art] SIG.R = C23639E007CDC30D4E43BAE7D962B626D725D46493BC3E5D19E1A4F11C808BB8269878DB70D82D8EF13216A479B136DB
3,133,125 UART: [art] SIG.S = B33761D21BC80FC78FEF07CE47E4A8C298EF81B813FF25A0DD4F23BA820929ABADFFA7125ECC0A6DC76E5E0A0A7E45C5
3,156,692 UART: Caliptra RT
3,156,945 UART: [state] CFI Enabled
3,264,975 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,945 >>> mbox cmd response: success
2,683,473 UART:
2,683,489 UART: Running Caliptra FMC ...
2,683,897 UART:
2,683,951 UART: [state] CFI Enabled
2,694,048 UART: [fht] FMC Alias Private Key: 7
2,802,207 UART: [art] Extend RT PCRs Done
2,802,635 UART: [art] Lock RT PCRs Done
2,804,085 UART: [art] Populate DV Done
2,812,054 UART: [fht] FMC Alias Private Key: 7
2,813,072 UART: [art] Derive CDI
2,813,352 UART: [art] Store in in slot 0x4
2,898,649 UART: [art] Derive Key Pair
2,899,009 UART: [art] Store priv key in slot 0x5
2,912,409 UART: [art] Derive Key Pair - Done
2,927,269 UART: [art] Signing Cert with AUTHO
2,927,749 UART: RITY.KEYID = 7
2,943,017 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,782 UART: [art] PUB.X = 66D0EEB4AE1A4C09EB8DBD6A4D1549146ED1B2733A4E179084B91C41D016B7DCFF7917D9B95233F5F0065672733A8AF3
2,950,554 UART: [art] PUB.Y = 11E99087556DFE17C7B517486D0A249833C74AB8646D90933D2C01FBEC4901A779930617D842218F3A7D39DDD6DA1E3F
2,957,490 UART: [art] SIG.R = 8719ED535C0BBBB5D22B07FA03414E0AA863A43D5722FCA9C519B98C24E5E93C9C758818A20E49AD8A40CE79A5C2738B
2,964,255 UART: [art] SIG.S = 8F4A66AEC9AF74123771AD32691BB3DCC6882BD4E71972DCA622D7D2131810DA15D0C4E2C72382E75F0E82BB432CA1A2
2,987,785 UART: Caliptra RT
2,988,038 UART: [state] CFI Enabled
3,096,614 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,615,475 >>> mbox cmd response: success
2,678,217 UART:
2,678,233 UART: Running Caliptra FMC ...
2,678,641 UART:
2,678,695 UART: [state] CFI Enabled
2,689,242 UART: [fht] FMC Alias Private Key: 7
2,797,845 UART: [art] Extend RT PCRs Done
2,798,273 UART: [art] Lock RT PCRs Done
2,799,905 UART: [art] Populate DV Done
2,808,064 UART: [fht] FMC Alias Private Key: 7
2,809,136 UART: [art] Derive CDI
2,809,416 UART: [art] Store in in slot 0x4
2,895,099 UART: [art] Derive Key Pair
2,895,459 UART: [art] Store priv key in slot 0x5
2,908,205 UART: [art] Derive Key Pair - Done
2,922,916 UART: [art] Signing Cert with AUTHO
2,923,396 UART: RITY.KEYID = 7
2,938,322 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,087 UART: [art] PUB.X = 86636F387BAF380C827812A12AB0B4F6EBD294244484DE5FE9EEDA5E263FED319D95AEBC125946D7E5AFC68F260ADCA6
2,945,869 UART: [art] PUB.Y = F71CFC839A6AFC4D0B09A5BBE87A6305260A779108365EE388E3B0B03DBD752C75931B78C0530ECB39DCFE91C54850B1
2,952,811 UART: [art] SIG.R = F60F8582C5A453134E6002351EEC97C8ED2B36D3956364F385607C6D62F7351E40DF4FFBF07AB8E3DB756A67EE7B30AF
2,959,583 UART: [art] SIG.S = 5A3F93F318BF45216B942241E267E3DC3279D17E636075751F8946A8AB00CB25DA535FEF227D67D6B68F3652ECFAAC36
2,983,826 UART: Caliptra RT
2,984,079 UART: [state] CFI Enabled
3,090,825 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,615,057 >>> mbox cmd response: success
2,677,863 UART:
2,677,879 UART: Running Caliptra FMC ...
2,678,287 UART:
2,678,341 UART: [state] CFI Enabled
2,689,004 UART: [fht] FMC Alias Private Key: 7
2,797,985 UART: [art] Extend RT PCRs Done
2,798,413 UART: [art] Lock RT PCRs Done
2,800,017 UART: [art] Populate DV Done
2,808,134 UART: [fht] FMC Alias Private Key: 7
2,809,212 UART: [art] Derive CDI
2,809,492 UART: [art] Store in in slot 0x4
2,894,895 UART: [art] Derive Key Pair
2,895,255 UART: [art] Store priv key in slot 0x5
2,908,441 UART: [art] Derive Key Pair - Done
2,923,194 UART: [art] Signing Cert with AUTHO
2,923,674 UART: RITY.KEYID = 7
2,939,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,979 UART: [art] PUB.X = 7BD50453401DA9ECBAE4610EAC504A6AA3BBCF50645C8E3F4BF3550CB06A39A4658B85EAC0F4BF826DC13DDEDDD99DF3
2,946,768 UART: [art] PUB.Y = FE8E7C8621B405697B24A9EC0F470166C724B63C3A7A02860D112D63E08257E095D564BFF7C35595009E5C61CD9016C5
2,953,677 UART: [art] SIG.R = 7DFD135DE88ADFE9D98F30ADB26A9F95A833C5F62E385560AA1D4DFF848AC92BCAF4F254DC05D2B26C00E7E6B08D231C
2,960,446 UART: [art] SIG.S = 85C235EE061E8C9BAC44D6E713BFAD07CA33574201D31FEF1D7FAB9BE4A8A01B3E185476F8EE2197A4F9243971777693
2,984,356 UART: Caliptra RT
2,984,609 UART: [state] CFI Enabled
3,091,301 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,611,271 >>> mbox cmd response: success
2,672,769 UART:
2,672,785 UART: Running Caliptra FMC ...
2,673,193 UART:
2,673,247 UART: [state] CFI Enabled
2,683,832 UART: [fht] FMC Alias Private Key: 7
2,792,051 UART: [art] Extend RT PCRs Done
2,792,479 UART: [art] Lock RT PCRs Done
2,794,085 UART: [art] Populate DV Done
2,802,298 UART: [fht] FMC Alias Private Key: 7
2,803,228 UART: [art] Derive CDI
2,803,508 UART: [art] Store in in slot 0x4
2,889,463 UART: [art] Derive Key Pair
2,889,823 UART: [art] Store priv key in slot 0x5
2,902,709 UART: [art] Derive Key Pair - Done
2,917,747 UART: [art] Signing Cert with AUTHO
2,918,227 UART: RITY.KEYID = 7
2,933,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,934,114 UART: [art] PUB.X = 706BC357900761AD9E82A2FD48E1F1BD86FAB3CC26647A2D568B9C24CAA2C65437AA8D228C035747383EC2D774073EF1
2,940,881 UART: [art] PUB.Y = C1855E887146F01FA8E8CE249F14DEB3BB6423C182392E818A4D04EDB89A0BC6F09905FAC6FC71CE879E522F0DB08644
2,947,829 UART: [art] SIG.R = F697F02DC303347B18F68B989D18BBE2EBA8BFD5F4B7D4569BE10E7B4692C41FAABC65A2F0165EAF1F0010C0AD6B7709
2,954,586 UART: [art] SIG.S = 710C8EF27EA4BEC301BACFD6DCC65284D3D06D3B13413DA606A04A3E06CD9A39BBF2AE0217ABD6A0FA61B3E15CCD1A70
2,978,932 UART: Caliptra RT
2,979,185 UART: [state] CFI Enabled
3,086,606 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 4.67s
Truncated 8812 bytes from beginning
803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,846,898 UART: [afmc] --
2,847,964 UART: [cold-reset] --
2,848,792 UART: [state] Locking Datavault
2,849,941 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,545 UART: [state] Locking ICCM
2,851,005 UART: [exit] Launching FMC @ 0x40000130
2,856,334 UART:
2,856,350 UART: Running Caliptra FMC ...
2,856,758 UART:
2,856,901 UART: [state] CFI Enabled
2,867,836 UART: [fht] FMC Alias Private Key: 7
2,976,585 UART: [art] Extend RT PCRs Done
2,977,013 UART: [art] Lock RT PCRs Done
2,978,651 UART: [art] Populate DV Done
2,986,944 UART: [fht] FMC Alias Private Key: 7
2,988,072 UART: [art] Derive CDI
2,988,352 UART: [art] Store in in slot 0x4
3,074,041 UART: [art] Derive Key Pair
3,074,401 UART: [art] Store priv key in slot 0x5
3,087,461 UART: [art] Derive Key Pair - Done
3,102,482 UART: [art] Signing Cert with AUTHO
3,102,962 UART: RITY.KEYID = 7
3,117,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,593 UART: [art] PUB.X = FE120048565845532584BC6A2A3ECAF8E74D4770750717437F628457DA38FFD7C68D51DE9D81342748066DD16D7BE8AD
3,125,333 UART: [art] PUB.Y = 50B092BAD0B8AA9FADAB1A322AF9C1C5499C8202B02DA7DE5A238AB82F8FD3EB45A98B66794D7F69A7D5877E3C883AB1
3,132,300 UART: [art] SIG.R = A22ABCEB3AE2D366D4963752C81616282B85D3FD9032AA7FAFD63B96B886F87348DAD6DE519342864D4336AD71986045
3,139,072 UART: [art] SIG.S = 03FAE276FAFBD16DAE02EDD812D8D0BF8B09B6EC145200980EC3341A4A7F193D5F845FF2CA39D95526D5A154D5BC23BD
3,162,881 UART: Caliptra RT
3,163,226 UART: [state] CFI Enabled
3,270,556 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
916,475 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,063 UART: [idev] Sha384 KeyId Algorithm
1,203,932 UART: [idev] --
1,205,121 UART: [ldev] ++
1,205,289 UART: [ldev] CDI.KEYID = 6
1,205,653 UART: [ldev] SUBJECT.KEYID = 5
1,206,080 UART: [ldev] AUTHORITY.KEYID = 7
1,206,543 UART: [ldev] FE.KEYID = 1
1,211,991 UART: [ldev] Erasing FE.KEYID = 1
1,238,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,597 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,269,319 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,276,433 UART: [ldev] --
1,277,839 UART: [fwproc] Wait for Commands...
1,278,520 UART: [fwproc] Recv command 0x46574c44
1,279,253 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,096 >>> mbox cmd response: success
2,769,275 UART: [afmc] ++
2,769,443 UART: [afmc] CDI.KEYID = 6
2,769,806 UART: [afmc] SUBJECT.KEYID = 7
2,770,232 UART: [afmc] AUTHORITY.KEYID = 5
2,805,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,526 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,245 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,138 UART: [afmc] --
2,849,128 UART: [cold-reset] --
2,849,922 UART: [state] Locking Datavault
2,851,251 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,855 UART: [state] Locking ICCM
2,852,375 UART: [exit] Launching FMC @ 0x40000130
2,857,704 UART:
2,857,720 UART: Running Caliptra FMC ...
2,858,128 UART:
2,858,271 UART: [state] CFI Enabled
2,868,530 UART: [fht] FMC Alias Private Key: 7
2,976,687 UART: [art] Extend RT PCRs Done
2,977,115 UART: [art] Lock RT PCRs Done
2,978,895 UART: [art] Populate DV Done
2,987,314 UART: [fht] FMC Alias Private Key: 7
2,988,342 UART: [art] Derive CDI
2,988,622 UART: [art] Store in in slot 0x4
3,074,573 UART: [art] Derive Key Pair
3,074,933 UART: [art] Store priv key in slot 0x5
3,088,349 UART: [art] Derive Key Pair - Done
3,102,918 UART: [art] Signing Cert with AUTHO
3,103,398 UART: RITY.KEYID = 7
3,118,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,275 UART: [art] PUB.X = D11A743C5D37B68AA3A9AACC617EB4321674B34947DBC39640BFEF1183C711ABCAF73C515C0DA02F29FC4E9D727F6FF4
3,126,060 UART: [art] PUB.Y = D48F2E2CE1650E9B492B16B65D2C6630BF3738185AAB34530C6B1A3C4C31356671CAC973D85C89616C3E82F35C099247
3,132,999 UART: [art] SIG.R = E6828680D1C53DB4B7E94188526E1A92206A2AD59A60563180894CC5E8E689D3B71491D65250566A17B40052E997D6B7
3,139,735 UART: [art] SIG.S = BBB5C92C2D2297B4B44E59F3A8EABBA113AD93A9D748F4CCF6403CECA3D9C068C0AD440C91DE8A9382A9EE9716FD9A2C
3,163,331 UART: Caliptra RT
3,163,676 UART: [state] CFI Enabled
3,270,813 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
87,010 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,952 UART: [kat] ++
896,104 UART: [kat] sha1
900,394 UART: [kat] SHA2-256
902,334 UART: [kat] SHA2-384
905,315 UART: [kat] SHA2-512-ACC
907,216 UART: [kat] ECC-384
917,181 UART: [kat] HMAC-384Kdf
922,043 UART: [kat] LMS
1,170,355 UART: [kat] --
1,171,006 UART: [cold-reset] ++
1,171,454 UART: [fht] FHT @ 0x50003400
1,174,256 UART: [idev] ++
1,174,424 UART: [idev] CDI.KEYID = 6
1,174,785 UART: [idev] SUBJECT.KEYID = 7
1,175,210 UART: [idev] UDS.KEYID = 0
1,183,052 UART: [idev] Erasing UDS.KEYID = 0
1,199,949 UART: [idev] Fuse KeyId
1,201,171 UART: [idev] --
1,202,250 UART: [ldev] ++
1,202,418 UART: [ldev] CDI.KEYID = 6
1,202,782 UART: [ldev] SUBJECT.KEYID = 5
1,203,209 UART: [ldev] AUTHORITY.KEYID = 7
1,203,672 UART: [ldev] FE.KEYID = 1
1,208,828 UART: [ldev] Erasing FE.KEYID = 1
1,235,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,164 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,846 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,937 UART: [ldev] --
1,274,207 UART: [fwproc] Wait for Commands...
1,274,932 UART: [fwproc] Recv command 0x46574c44
1,275,665 UART: [fwproc] Recv'd Img size: 114168 bytes
2,571,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,598,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,628,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,763,764 >>> mbox cmd response: success
2,764,805 UART: [afmc] ++
2,764,973 UART: [afmc] CDI.KEYID = 6
2,765,336 UART: [afmc] SUBJECT.KEYID = 7
2,765,762 UART: [afmc] AUTHORITY.KEYID = 5
2,800,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,817,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,818,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,823,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,829,678 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,835,397 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,843,196 UART: [afmc] --
2,844,264 UART: [cold-reset] --
2,845,150 UART: [state] Locking Datavault
2,846,411 UART: [state] Locking PCR0, PCR1 and PCR31
2,847,015 UART: [state] Locking ICCM
2,847,541 UART: [exit] Launching FMC @ 0x40000130
2,852,870 UART:
2,852,886 UART: Running Caliptra FMC ...
2,853,294 UART:
2,853,437 UART: [state] CFI Enabled
2,863,986 UART: [fht] FMC Alias Private Key: 7
2,971,819 UART: [art] Extend RT PCRs Done
2,972,247 UART: [art] Lock RT PCRs Done
2,973,773 UART: [art] Populate DV Done
2,981,976 UART: [fht] FMC Alias Private Key: 7
2,983,042 UART: [art] Derive CDI
2,983,322 UART: [art] Store in in slot 0x4
3,068,619 UART: [art] Derive Key Pair
3,068,979 UART: [art] Store priv key in slot 0x5
3,082,525 UART: [art] Derive Key Pair - Done
3,097,129 UART: [art] Signing Cert with AUTHO
3,097,609 UART: RITY.KEYID = 7
3,113,241 UART: [art] Erasing AUTHORITY.KEYID = 7
3,114,006 UART: [art] PUB.X = 26C34EB276431FA09AB32A072D2D6708E213B442C54849EB8C937AAD47B3C309DFCF64C7AFB4D61262D721CB38628810
3,120,771 UART: [art] PUB.Y = F45B45C73B72D82CA91B8E93F56D7642213E9958E1EFF637895F9C001447965B89F6B2F58126DA5DCB5C06D98D952221
3,127,694 UART: [art] SIG.R = 65E887964D758EEC3D9CA240E81173F05B46020A89F0C1D1CD683D52395179D58A2FAC1EA9190EBD551B3EEAC2040C74
3,134,455 UART: [art] SIG.S = ED43DA47425A79F71758B6E58C5BDDC9EBCE11E723312F2DE4AD4FEDAE62B2D5BAE42BC0B51968259BF70A0E931186DE
3,157,816 UART: Caliptra RT
3,158,161 UART: [state] CFI Enabled
3,265,256 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,206 >>> mbox cmd response: success
2,683,290 UART:
2,683,306 UART: Running Caliptra FMC ...
2,683,714 UART:
2,683,857 UART: [state] CFI Enabled
2,694,788 UART: [fht] FMC Alias Private Key: 7
2,802,619 UART: [art] Extend RT PCRs Done
2,803,047 UART: [art] Lock RT PCRs Done
2,804,445 UART: [art] Populate DV Done
2,812,578 UART: [fht] FMC Alias Private Key: 7
2,813,680 UART: [art] Derive CDI
2,813,960 UART: [art] Store in in slot 0x4
2,900,019 UART: [art] Derive Key Pair
2,900,379 UART: [art] Store priv key in slot 0x5
2,913,411 UART: [art] Derive Key Pair - Done
2,928,104 UART: [art] Signing Cert with AUTHO
2,928,584 UART: RITY.KEYID = 7
2,943,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,599 UART: [art] PUB.X = 71FC1DF99DDD81544CF5333F0258B24B4F190D0352F4FECAEDB968AB44BA601DC9EDFB4D4CC9B8AB60175EB2D3415DC7
2,951,384 UART: [art] PUB.Y = 68679DF54346E4439CF517AF9FABDDAA2DD347BCAF0FEC7EB64A6E17D480BE481754F8B4B3FA5654FA805EA2263951D6
2,958,349 UART: [art] SIG.R = A0ED2A30D4775DE73129C460FDAA202F5438C94947F0553CED7E0EBB5FCDF2F532E45DE203619A0C10E4ECD48D0CD80A
2,965,122 UART: [art] SIG.S = 36DEBD361B5EDC6D7297A4F79BC96A6316EC001843ECD9059E37BD418BD956DAF5A9387A7E73F0992AB1D3E28A381AB5
2,988,552 UART: Caliptra RT
2,988,897 UART: [state] CFI Enabled
3,096,718 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,076 >>> mbox cmd response: success
2,679,926 UART:
2,679,942 UART: Running Caliptra FMC ...
2,680,350 UART:
2,680,493 UART: [state] CFI Enabled
2,691,258 UART: [fht] FMC Alias Private Key: 7
2,799,645 UART: [art] Extend RT PCRs Done
2,800,073 UART: [art] Lock RT PCRs Done
2,801,609 UART: [art] Populate DV Done
2,809,934 UART: [fht] FMC Alias Private Key: 7
2,811,008 UART: [art] Derive CDI
2,811,288 UART: [art] Store in in slot 0x4
2,897,029 UART: [art] Derive Key Pair
2,897,389 UART: [art] Store priv key in slot 0x5
2,910,423 UART: [art] Derive Key Pair - Done
2,925,515 UART: [art] Signing Cert with AUTHO
2,925,995 UART: RITY.KEYID = 7
2,940,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,190 UART: [art] PUB.X = 7F54F7B1FC92BDE563DF7892F3D692D1B8364307DA218F22F6BCEBA44B7119D9743F774D2432752783CCDA0DB6FE8FE4
2,947,966 UART: [art] PUB.Y = 09F7AB66EDFF1BFA51857FBD0212AB8D2578A8D22CCEC9984CFF866FA5221480504DA8AF37DA34B76275D3492A2B59EF
2,954,926 UART: [art] SIG.R = AC4ED87098B66D6FEB6ECB4E7DCEBC4C97D48768E23FC1BEF37D60920216C3B297385313C9FEC208EE656AFBA8E1BDBA
2,961,716 UART: [art] SIG.S = ACD410005FD5260AB413633FFC24FF5FA5A1723236D78A89FC0110472D6E84665DE5BB4ECBC85D4E2297595A075E7751
2,985,426 UART: Caliptra RT
2,985,771 UART: [state] CFI Enabled
3,092,984 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,616,630 >>> mbox cmd response: success
2,678,780 UART:
2,678,796 UART: Running Caliptra FMC ...
2,679,204 UART:
2,679,347 UART: [state] CFI Enabled
2,689,852 UART: [fht] FMC Alias Private Key: 7
2,798,091 UART: [art] Extend RT PCRs Done
2,798,519 UART: [art] Lock RT PCRs Done
2,800,075 UART: [art] Populate DV Done
2,808,298 UART: [fht] FMC Alias Private Key: 7
2,809,388 UART: [art] Derive CDI
2,809,668 UART: [art] Store in in slot 0x4
2,894,871 UART: [art] Derive Key Pair
2,895,231 UART: [art] Store priv key in slot 0x5
2,908,649 UART: [art] Derive Key Pair - Done
2,923,366 UART: [art] Signing Cert with AUTHO
2,923,846 UART: RITY.KEYID = 7
2,938,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,579 UART: [art] PUB.X = 6528E1F43328AC94F0BED3DFD401851F4C4E475D755794BEC7587C01B25F14466C60F144DF8F344647F34FD235921162
2,946,339 UART: [art] PUB.Y = 51468B3642B5E2D8FBFCFD15F1C4296144E8BAC1D1993863982DBB5479567EB651A8C59C42337A13A8866970F0E83DAD
2,953,291 UART: [art] SIG.R = 9004E71E378F0ED68DF42D2FBFCF9EFF141CF135D5EA45770078A35442B8B2B712E3763075E0F41B8EB735ADAB5AB3DB
2,960,049 UART: [art] SIG.S = F9AD669E79EC46A81DA4CEA1FA2DC3FBF973BE4F3549C3AB9A61D361871B60804DC639254F5013E93CCBD83907205C0D
2,983,462 UART: Caliptra RT
2,983,807 UART: [state] CFI Enabled
3,090,790 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,614,578 >>> mbox cmd response: success
2,677,564 UART:
2,677,580 UART: Running Caliptra FMC ...
2,677,988 UART:
2,678,131 UART: [state] CFI Enabled
2,688,844 UART: [fht] FMC Alias Private Key: 7
2,796,999 UART: [art] Extend RT PCRs Done
2,797,427 UART: [art] Lock RT PCRs Done
2,798,939 UART: [art] Populate DV Done
2,807,202 UART: [fht] FMC Alias Private Key: 7
2,808,182 UART: [art] Derive CDI
2,808,462 UART: [art] Store in in slot 0x4
2,894,097 UART: [art] Derive Key Pair
2,894,457 UART: [art] Store priv key in slot 0x5
2,908,071 UART: [art] Derive Key Pair - Done
2,922,750 UART: [art] Signing Cert with AUTHO
2,923,230 UART: RITY.KEYID = 7
2,938,762 UART: [art] Erasing AUTHORITY.KEYID = 7
2,939,527 UART: [art] PUB.X = 08A80167F26F54F88A5EDA84BE24B3B290CF5E5C1A31E4B3686AF6D0622DDE3C1B4A487E05A9B924EBDB8C34D9386BB6
2,946,304 UART: [art] PUB.Y = ED367EBAE9E39F0612924F40331E8DBCBD2C8F3CFBE09EBE029F538842F164E8CCDB32B748BC88379749542E0C4E6933
2,953,257 UART: [art] SIG.R = CDA28215262343E98BF4EE5EFFB1BA5CC02D0B40CA98C6393F9456E19A4A8ED098E218A2C5A2584C69D861FC831E224A
2,960,036 UART: [art] SIG.S = 88698F7C0475D05B453C3C9163D7F380D361FDDD26E7855C2C25B002F167B7780B9B3543DF818E515D9EF7F66CDA482B
2,983,900 UART: Caliptra RT
2,984,245 UART: [state] CFI Enabled
3,092,785 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 5.44s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
27,030,877 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:59:52 2025 GMT
Not After : Jun 30 10:59:52 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a8:be:f2:6a:65:2e:6c:f5:c6:14:e5:27:fb:19:
da:34:db:c9:62:2e:58:82:6a:12:c8:c1:c7:f7:db:
13:ad:2f:ef:08:83:7a:14:4a:91:c9:30:7f:f8:b0:
59:7b:a3:d1:7b:7a:e4:a9:21:4e:97:e8:47:a4:4d:
66:3a:82:f6:1d:1d:d6:48:b5:1f:79:b3:04:7f:1a:
89:1e:b1:78:35:a0:d2:4d:1f:0c:fb:c1:99:96:47:
2d:81:82:27:34:08:28:ae:54:7c:b9:0b:08:8b:05:
1d:e3:2e:73:e3:8b:ae:6b:77:58:b7:27:8e:c9:d4:
10:f1:33:d7:6d:7b:a3:45:bb:84:48:92:9e:14:09:
ef:8e:cc:d0:ec:a9:18:ac:c1:3f:6e:e3:20:69:62:
ae:0c:0e:aa:cd:99:0d:ab:76:36:05:37:2c:b6:4a:
e1:e3:bc:4b:bf:a2:36:0a:26:30:3a:cb:e2:70:0b:
9b:e1:aa:a8:36:09:39:1f:34:e8:8d:63:e9:e2:84:
dd:81:14:9a:11:f7:ea:5d:0f:e5:f4:30:f4:8a:18:
c1:c0:b2:8a:a9:d3:ed:8c:34:6d:da:0b:7c:a8:ed:
e4:9d:cf:ae:23:36:eb:4d:d5:5b:5a:da:ff:4e:31:
15:da:d0:7a:53:07:28:bd:cb:b9:5e:c6:27:c1:ab:
ab:79
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
57:e8:da:fd:62:21:77:4c:a3:07:06:73:da:04:56:8c:e9:47:
e7:5e:19:31:53:32:14:e2:78:00:20:67:d2:ae:93:a9:f4:bc:
68:6e:ab:8d:19:0e:80:59:bb:5e:b6:a0:56:37:66:92:e9:ce:
0c:fb:69:9a:07:6a:3f:8f:13:17:04:43:e5:97:04:74:57:c6:
7a:e7:65:17:f9:08:27:86:11:d3:54:ad:8f:27:3a:b6:fd:8c:
67:21:ad:bf:e2:39:e0:50:80:c5:4b:c8:67:5e:a0:0d:79:f4:
ff:cd:37:5f:4b:d6:6e:81:a0:a3:0e:c0:22:ca:d7:a6:4b:d8:
e2:31:04:4d:e9:53:e1:15:d3:43:9d:1d:6c:b6:59:d7:90:00:
cf:2a:60:37:ef:b3:dc:20:7e:7e:c6:6e:3e:2c:09:20:51:d9:
38:c4:1f:16:e6:19:90:ca:5d:72:c1:a9:07:35:db:86:39:74:
26:ef:1f:ca:bf:2b:9f:21:11:c0:48:77:9a:10:7e:09:9e:b9:
19:db:83:f1:26:9b:16:63:b5:8d:82:43:42:f3:37:bb:1f:10:
17:ec:7f:ff:1c:61:a9:66:e2:c1:54:90:79:50:68:2b:43:bc:
af:b7:8f:92:2a:6d:ff:43:3a:50:0e:83:cc:f5:22:fa:69:9e:
23:3f:34:f3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:59:53 2025 GMT
Not After : Jun 1 10:59:53 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
87:02:63:71:49:45:a4:ec:1b:a2:b2:ce:07:7a:b4:be:4e:b9:
d5:dd:30:32:26:2f:6f:9c:f9:9e:c1:d2:f5:f0:4c:ff:90:1b:
39:3a:7c:73:18:ab:7e:48:43:a4:7a:26:47:01:72:2a:a9:3c:
08:90:46:80:b3:27:f2:db:7b:11:37:ac:93:b4:9a:7b:bb:22:
81:d1:56:75:e8:60:58:73:83:b2:06:53:c9:50:ef:da:45:96:
1d:f8:4c:42:95:a0:02:c2:1b:d9:92:71:d4:3a:7e:8d:67:cd:
d6:2d:1f:b2:99:47:97:c9:4f:21:d6:c5:6a:ad:5b:63:f7:39:
14:07:28:a7:64:d3:11:bb:5d:5c:7c:c8:e1:ae:bc:23:e6:73:
4c:ba:07:66:46:7e:62:2e:80:59:3e:e2:4b:80:bc:47:35:88:
7e:c0:7a:d2:25:15:75:86:51:17:28:c2:a9:86:28:31:bf:ce:
3b:7b:71:a8:76:85:6b:a1:42:bd:02:91:fa:2a:60:02:a9:02:
25:a5:54:9c:d4:b1:e2:77:8d:31:29:25:db:0e:9f:45:e8:7f:
13:d3:d8:e3:be:b4:a9:29:86:ba:55:53:68:4b:88:1c:21:95:
7c:1e:25:11:1c:54:96:d1:76:eb:35:76:6f:2b:39:19:95:eb:
e2:75:58:39
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.67s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
26,536,817 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:29:08 2025 GMT
Not After : Jun 30 13:29:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a8:4d:0e:4f:16:e1:68:15:b9:a0:47:bc:92:6e:
a3:d8:a9:e3:22:55:62:cd:4c:ac:1f:12:17:f8:d2:
9d:11:a5:da:3d:a0:ce:cc:30:ed:fb:78:23:15:b1:
90:bb:6d:32:29:f2:7f:92:01:54:21:d5:cd:b5:0e:
64:ac:f4:0b:97:4c:f4:1e:87:bb:e4:5f:99:6a:ae:
a9:d9:6c:8d:86:1a:b6:9b:a3:41:ff:ef:c3:1c:97:
56:99:c1:45:1e:30:50:dc:6b:78:46:5d:45:20:70:
ca:c6:4c:e1:b5:fa:fb:a9:8e:f1:21:e4:d9:68:b1:
56:b1:54:96:15:7d:85:69:bc:14:45:dd:39:3b:ec:
bd:7c:78:a8:09:73:94:85:66:55:f9:b6:d1:6b:9f:
04:59:86:14:e7:25:08:cd:d9:d6:0b:b7:78:e2:14:
dc:67:f6:7c:20:a4:f9:85:58:ae:e7:96:7f:9f:0b:
c9:b3:fd:18:b7:e7:53:4e:07:e3:07:3f:73:17:e0:
6f:ea:01:9a:3a:a2:62:ba:4d:8e:38:f9:40:d6:42:
2d:cc:8c:5c:cd:5e:95:20:8d:da:ed:3b:d0:0c:3d:
9f:d5:0f:e2:56:2a:e6:62:17:81:a7:93:02:e6:26:
79:ad:ec:06:a7:ed:c5:c2:21:d3:d2:c9:96:f2:28:
e0:91
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9e:0a:50:03:47:46:88:e2:3f:e5:dc:18:18:52:21:35:0d:57:
aa:5c:84:68:24:9c:d9:13:2b:5e:6f:85:1f:d2:2d:a8:46:be:
53:bb:72:e1:9b:9d:36:ec:06:7b:4b:51:14:e1:52:ac:48:6c:
8f:4d:11:ed:a2:be:c0:cd:9d:ed:4e:11:b6:05:28:45:f2:2f:
29:34:3b:1e:0b:e6:8a:18:10:67:36:f2:fa:3e:c5:e7:84:7e:
fe:a8:e8:20:c5:67:b3:a0:64:a9:3b:df:84:6d:45:02:b4:14:
f9:77:90:99:46:41:99:22:44:74:29:51:61:29:fe:6b:55:f9:
32:95:d1:c4:85:56:ae:27:15:40:0b:08:e1:e1:d5:1f:ae:cd:
4f:86:00:1f:60:96:d0:e1:24:d2:f1:68:70:39:ef:98:c1:3b:
02:64:92:b9:86:cb:a0:4f:6e:0a:20:fd:2c:6c:75:a3:56:4d:
bb:2b:a7:e0:fd:19:b6:14:0f:8d:79:2e:5f:73:6c:34:53:a8:
be:6b:11:f3:95:37:3f:e6:d0:d5:ce:e0:39:7b:93:fc:9c:47:
e1:64:48:11:51:d1:1e:88:66:3b:60:83:36:05:86:ec:80:28:
58:9c:33:f3:af:8b:28:53:bc:51:e7:f3:3e:4d:0e:fd:1b:fd:
0f:cd:83:7b
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:29:09 2025 GMT
Not After : Jun 1 13:29:09 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6e:e1:df:dd:e7:01:67:73:db:d1:40:d9:65:5e:20:9d:b6:56:
d4:72:36:ec:97:e6:ef:6f:f1:1b:dd:c5:70:ac:82:d9:04:e9:
0a:3e:6d:97:42:36:2f:ff:ba:dc:d0:ee:ab:41:98:65:74:54:
3b:d8:19:29:ca:08:13:b6:16:63:be:69:23:0f:24:c8:6d:d9:
6c:0b:79:50:4e:2a:12:3b:89:7c:8a:6f:27:76:08:e0:54:2e:
a7:4a:35:b1:5d:4d:ab:8b:05:9b:0d:b7:49:94:02:75:a6:3b:
ea:26:bb:cc:2b:85:1f:1b:55:b5:1c:54:cf:98:38:63:e3:64:
e7:4b:c6:e1:8a:84:58:11:6f:58:21:6a:4a:4f:d3:72:6b:96:
65:90:00:2e:ed:3d:f4:b3:55:9a:f7:7d:96:5b:e7:98:6c:c9:
7a:20:08:3c:b3:38:7a:e4:07:f1:28:3f:20:4a:be:bb:0d:95:
18:9b:17:64:cd:c8:dd:02:2e:db:14:a9:fd:85:82:da:91:c3:
31:59:d0:13:25:14:2d:fe:d5:13:9f:5f:e1:3a:51:49:69:89:
c5:6b:e4:9f:02:8a:a8:44:de:2e:75:e5:28:70:0a:e9:9c:a1:
c5:68:ed:dc:75:7d:64:f4:1a:c4:c1:21:a2:95:d2:8b:25:ed:
29:39:3b:05
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
27,113,983 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:26:04 2025 GMT
Not After : Jun 30 14:26:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ce:15:a3:d4:c2:c6:b0:68:5e:c6:4a:dd:5b:74:
71:27:aa:03:98:75:4b:84:cf:d3:3e:46:e5:50:98:
ed:e1:1a:bd:72:b1:6c:dc:26:e2:96:19:ae:aa:b7:
58:1c:eb:7b:89:8b:a0:90:0a:49:5d:09:f0:0e:d0:
b7:e6:0b:e0:a2:78:23:ee:4d:28:36:83:da:8b:ad:
34:b5:a0:b9:4d:49:e0:35:e0:9b:87:3e:d0:be:49:
59:5d:27:29:69:6e:8f:fe:46:9c:31:f2:af:53:59:
77:b1:29:ee:bd:e7:5d:a3:87:75:43:ae:eb:c8:8d:
d4:5f:94:bb:7e:ba:d0:fc:f8:61:f8:b7:bb:76:a0:
21:d9:f4:47:8f:49:4a:5b:72:fa:6d:7a:b0:69:b0:
43:2f:e3:0e:d9:20:44:b6:98:65:44:0f:ef:5f:c4:
62:a1:96:43:e7:df:21:35:d0:a8:d0:01:79:ba:2e:
5b:3d:78:30:43:83:88:8e:27:84:22:cf:e7:2c:70:
c7:fd:8e:ef:c3:03:71:9a:52:2d:82:90:01:7d:ab:
0e:77:05:8e:20:4e:ae:7e:c7:77:43:9a:76:34:94:
dc:99:72:37:4b:8e:24:69:28:ab:27:bd:e1:95:a9:
b1:39:46:f8:98:14:0e:f7:00:f5:df:a4:77:0e:f3:
e4:c1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
13:2f:10:f7:61:46:cc:7c:8e:d4:bf:ed:36:e5:95:99:a7:d5:
50:bc:46:f8:83:2c:14:c6:29:8f:af:2a:c4:48:4f:a0:a7:87:
c3:b1:a4:c8:15:d5:11:be:65:85:0a:a2:c3:8c:00:33:af:94:
bd:51:a3:00:75:d5:04:e1:d1:54:8e:7f:09:cd:08:83:d6:95:
89:03:bf:8d:51:24:75:24:07:35:36:58:1b:57:65:dc:5e:a5:
00:63:ad:6f:e1:47:4b:6a:0e:e4:73:1c:33:bb:a6:fb:cd:b0:
e4:84:09:ed:77:65:a5:15:21:f0:7e:a5:f1:d6:e4:a8:2a:97:
c4:d6:19:a3:52:a4:25:06:69:6e:11:33:79:3d:75:fb:60:a2:
0a:8c:a0:e2:a5:55:35:e7:fb:04:02:b8:63:c2:80:22:e6:8a:
f2:c1:ab:5d:74:66:bb:73:27:16:e7:d4:5b:2f:0e:e2:d3:00:
82:cd:87:9d:ad:12:3b:14:1c:31:17:f9:78:f3:b5:f6:07:09:
ba:2b:09:2a:1d:e6:4b:58:f8:11:b9:d9:6a:a9:d3:39:64:b4:
e1:35:93:9a:43:25:48:13:07:49:06:61:80:84:ac:f3:16:82:
db:3a:15:17:47:61:4d:93:cb:3d:eb:89:f1:84:fc:3a:a0:81:
05:6c:a7:af
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:26:04 2025 GMT
Not After : Jun 1 14:26:04 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
69:1a:f5:9e:9d:fd:7f:06:84:08:72:7b:04:44:d9:2f:99:94:
c6:c7:ab:b1:5f:38:ae:de:0d:39:d3:8b:7c:20:d1:07:37:7c:
03:c9:48:cf:f8:72:b2:22:c5:8b:f5:44:b2:75:9c:a7:de:51:
ff:15:58:a5:a5:75:ab:7f:f6:d3:67:1e:61:fb:42:94:9d:85:
47:3f:82:60:a2:d7:5e:a9:fb:1c:8f:20:e5:1c:74:4b:40:85:
eb:09:b3:67:ea:47:b9:5a:85:e5:bf:56:f8:63:bf:f4:3a:7e:
9b:10:42:ee:ed:f8:69:28:2f:26:eb:d1:05:f2:c0:7e:ee:61:
ff:bd:b3:4c:bc:af:d3:cb:1a:36:ff:c5:90:0e:ef:1e:c7:88:
9c:2b:07:b9:39:08:68:71:09:1b:04:75:a8:bd:82:f4:4c:42:
c4:72:fe:d7:3d:db:f5:0d:14:69:21:a3:29:de:dc:0f:f3:d5:
ef:51:6a:dd:b1:10:10:5a:60:88:95:fc:a7:21:77:55:48:5e:
84:46:f8:84:3b:d8:6a:fb:71:87:48:1b:96:72:59:71:6e:ee:
d3:ff:90:2a:85:e3:fd:36:00:46:5a:84:76:db:db:f7:a4:18:
48:d7:62:60:0d:ea:85:cf:6a:6d:d6:51:c5:1b:54:d4:b9:66:
3f:08:09:3e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.64s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
26,628,464 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:45:04 2025 GMT
Not After : Jun 30 11:45:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d4:67:20:41:b8:bd:c8:21:05:76:08:12:cf:32:
3c:a7:c0:d8:65:a2:57:dd:aa:ce:04:db:fd:a4:b7:
dd:98:d7:02:4b:2d:46:2f:4d:98:a4:bb:98:7d:9f:
08:cc:bc:35:f5:c6:17:4c:67:79:99:1d:f4:5f:b8:
db:dd:72:aa:d3:be:94:50:ea:7d:c4:5b:d6:7c:47:
0d:7b:75:8e:0e:4a:e7:e0:ce:7c:c6:56:66:2b:5b:
fb:8e:45:5e:b4:32:c6:c7:5a:4e:49:39:d0:83:f4:
de:c9:74:3f:44:4a:bb:b5:ba:95:d5:21:72:3f:e9:
69:0a:b6:9c:66:47:36:8a:43:1f:38:bb:f7:47:42:
39:1a:ef:c7:8f:1d:b8:81:fe:d0:05:0d:53:9c:9e:
06:55:c7:50:7f:84:1f:59:e1:9d:5b:1f:15:de:13:
4f:11:1a:dc:56:d3:4c:d7:db:ed:d4:a3:b5:5b:ed:
df:84:ce:ff:39:c1:d5:9a:76:4b:ad:df:f0:40:76:
dc:ac:31:19:a3:02:a8:15:01:39:40:87:f8:3d:fa:
ee:e2:d2:da:b0:7e:1d:c6:a6:9a:29:d0:9b:0c:8a:
6d:eb:d9:11:43:37:ad:93:30:31:20:3c:7c:cf:0b:
ab:1e:79:2b:56:e5:73:60:a6:f9:f2:58:87:20:3c:
6f:09
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
91:72:0e:e4:b7:d3:67:02:76:e3:93:5f:94:c1:04:a9:94:d7:
bb:ea:df:45:74:a5:f3:70:ac:41:6e:16:76:cb:d5:9b:97:02:
2b:c0:72:b5:be:f5:b2:22:69:0a:ff:db:9c:33:a4:99:a6:df:
8b:c6:83:35:71:3b:c4:fb:43:fe:e2:d3:89:67:af:10:46:6c:
67:87:98:4b:2f:59:80:88:a4:5e:a9:75:bb:ef:82:5a:50:ce:
3e:69:d8:a4:76:73:49:bc:c3:aa:7d:27:a8:17:bd:d2:51:dd:
68:f1:de:11:46:6e:eb:b0:0c:e0:91:2a:37:e0:ef:fd:de:3c:
87:0c:79:ce:47:37:8d:51:f5:1d:d3:25:26:d1:29:4c:5a:4d:
27:48:86:e3:8e:f6:8a:0c:ab:0d:b6:61:9e:f7:eb:57:a0:8c:
22:ec:85:e1:c3:07:22:05:3e:1c:7d:87:3c:cf:b7:62:48:63:
4a:b9:41:c1:5a:f3:05:2c:71:4c:82:6e:7e:3f:0e:76:66:01:
85:06:8a:07:6c:39:86:95:4a:2e:cf:21:93:d2:01:da:87:fc:
f2:8c:fa:0e:d3:83:85:d1:ab:b2:a0:59:da:a7:0d:75:34:b7:
19:86:bd:21:e2:84:4c:16:e2:b8:94:8d:bf:2e:79:f5:6e:34:
8c:95:d3:65
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:45:04 2025 GMT
Not After : Jun 1 11:45:04 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1c:7f:5f:fa:7c:47:35:6f:72:c8:50:e4:2c:86:4b:96:73:df:
7b:30:75:a2:12:cc:9a:60:ee:d5:60:76:09:45:ae:89:76:d9:
2a:e4:ae:bc:4b:a0:c8:f5:dd:07:34:9e:fb:99:d9:7e:e4:2f:
25:79:28:d8:55:eb:79:bc:d8:ab:af:3b:0d:26:4a:6a:59:2b:
26:07:ff:79:86:fc:e6:09:9b:70:5f:2c:26:0c:91:2c:e9:0a:
cd:83:ed:b9:a3:0e:8b:11:40:4e:8b:09:67:e4:77:0d:ce:46:
40:b4:6b:bc:53:e6:f0:c5:00:dc:34:35:f5:6c:b4:08:14:28:
23:27:29:57:ab:67:19:d2:17:da:77:8a:3c:4d:52:5c:81:4a:
1f:fb:67:ba:f6:32:38:03:28:74:b8:96:00:ae:b5:cf:bc:1c:
d1:31:86:ba:e2:79:86:d7:8d:af:06:d1:3b:68:c5:3d:f2:b0:
fe:12:a4:dc:cf:61:f1:ff:d8:d4:78:c6:74:ad:54:64:53:21:
1b:0d:14:db:3f:74:bf:85:70:cb:0b:57:42:85:2c:60:5f:87:
3a:64:4f:7b:20:53:51:fe:c4:3f:44:82:9d:01:22:81:70:25:
b8:28:31:8a:45:27:5c:bc:2e:90:0f:eb:12:f5:01:97:b5:df:
d0:68:05:99
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,743,577 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:10:14 2025 GMT
Not After : Jun 30 14:10:14 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d6:67:d1:42:b5:24:09:e5:b2:bf:7a:8d:9b:56:
7e:31:73:f3:5c:d9:cc:9d:24:aa:2b:20:58:6a:91:
3c:5e:ae:12:56:83:d8:07:ce:80:95:bf:fd:c9:1a:
06:97:20:67:8e:b6:64:51:9b:2c:2c:a8:40:74:08:
78:81:e9:a0:25:c4:51:36:36:17:d9:16:95:8e:de:
bf:3c:b7:82:1a:fc:ba:4d:9e:08:41:d7:9d:bf:52:
c5:33:ac:a5:c8:81:4b:6f:d0:2d:24:02:8b:55:13:
48:88:d0:c5:28:34:11:35:a8:bc:ad:8a:e1:0c:90:
67:24:14:f2:11:e0:72:b8:29:d8:aa:f9:9c:05:de:
60:e3:2f:6c:58:e0:b5:71:31:c1:5f:0b:7f:6d:2c:
18:b3:c4:d0:c8:c4:32:97:80:9e:a1:af:19:ee:f9:
14:be:0d:6c:9a:26:d5:98:48:6b:83:72:62:7d:0d:
a7:b2:fe:2c:e7:d8:fe:b4:f0:7c:a7:0d:d3:43:bb:
d1:44:3c:06:51:09:ce:6b:06:e9:fc:05:32:46:ed:
b3:86:60:3a:10:53:bc:02:b3:46:15:bc:76:5c:a3:
d7:54:51:dd:b8:bf:7a:e7:cf:9b:ae:82:7d:93:c2:
7a:7d:d2:3f:55:6b:d4:8d:4a:94:7a:0f:14:bb:59:
dc:77
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b8:20:84:81:7e:f9:06:53:53:4e:8a:e9:b1:cb:5b:5d:f4:51:
64:be:1b:fc:39:13:9b:68:7d:d2:8d:32:aa:45:7f:79:9b:21:
91:8b:7a:ff:e8:bd:17:0c:9c:d8:91:7d:a9:93:37:0c:87:4c:
b0:55:50:82:90:bc:93:e1:73:ab:a8:63:70:e2:f5:bf:0e:cc:
c5:ba:a5:4a:09:f6:df:47:75:9b:0c:80:e3:f6:a3:b9:cf:4d:
cc:d8:c9:6c:83:a0:52:84:af:40:bb:28:d3:72:f7:ae:a6:d1:
86:d7:95:cd:ef:07:8b:c9:70:e7:a6:dc:1f:e0:81:95:22:03:
1d:3b:f8:bf:a5:1c:81:e3:61:3d:ff:9c:a7:93:dd:9a:31:ed:
66:e8:e2:17:b4:f6:71:9c:41:21:37:4c:3e:23:d9:bc:76:06:
7c:93:d8:f0:1a:41:79:9c:c5:b3:cd:9a:22:2f:84:11:c6:14:
03:b5:ef:49:89:8b:b8:2a:50:a4:be:70:a1:fc:da:ed:5d:f4:
e5:73:0c:0a:28:72:b1:31:4f:bd:4a:6d:a3:ad:1a:bc:82:b2:
5b:c6:a6:6d:88:d4:7a:e1:38:94:1a:92:cb:d5:ee:55:9c:83:
0e:0f:e5:3a:c9:78:08:c8:7d:81:9e:06:e3:ff:b5:34:9d:6d:
bc:b3:c2:dc
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:10:15 2025 GMT
Not After : Jun 1 14:10:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
07:ef:66:74:f5:c2:31:b4:34:4f:fd:0d:07:b1:56:d5:f4:77:
fc:4e:d3:f9:df:30:c5:07:44:2c:6a:04:f5:02:c7:06:a3:70:
9d:12:fd:e2:8a:cd:1d:cc:47:cd:4d:50:10:19:50:61:56:a1:
01:5b:f1:8e:da:9d:35:35:16:22:37:75:c4:a2:be:5c:80:94:
fe:44:c7:c4:8c:d7:5e:f0:83:ef:6b:90:91:e5:39:27:fc:e7:
99:c9:ba:2f:56:5f:a7:66:18:44:ad:ea:32:34:f0:80:e7:6d:
bd:bd:63:13:6f:ad:55:9f:a0:2c:35:6c:5c:19:18:91:2f:d9:
d0:20:f1:19:f6:ad:b9:89:60:43:42:d2:4a:8d:c6:c4:8a:67:
ad:7a:11:fe:f8:80:80:7d:91:89:07:4d:9b:82:16:84:28:5c:
63:aa:4b:58:24:ce:63:ee:bd:45:7e:fa:01:48:b9:ca:14:6d:
e5:e2:6e:0f:03:e7:a8:5f:60:7d:23:f6:ff:c6:98:de:f9:66:
48:4d:02:44:59:96:37:ca:9f:2f:d1:6b:3d:e9:57:a4:e5:fd:
ec:25:e2:55:09:54:74:9f:4f:ee:4f:35:47:ca:b2:2c:98:f2:
fa:77:ce:07:55:73:c4:ee:c2:72:09:99:b4:ef:43:06:fd:4a:
82:62:3c:dd
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.72s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,241,345 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:51:55 2025 GMT
Not After : Jun 30 10:51:55 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e3:77:28:4b:06:51:cb:1a:54:35:03:51:9d:75:
77:cd:e5:0e:4d:a3:2e:21:03:da:f0:24:75:96:f4:
32:ba:a4:aa:d8:03:8f:07:a1:31:7e:c4:99:87:bf:
26:43:ae:dd:e2:46:18:f9:80:db:cf:cd:ab:13:46:
ab:04:f1:c6:55:73:62:62:a5:f5:4d:dc:88:2d:80:
7d:91:cb:be:4a:50:f9:61:03:93:64:ba:37:43:e7:
49:b9:89:8c:92:0b:7e:f4:11:3a:b9:14:3c:29:8c:
90:14:77:36:d0:70:2a:c9:20:34:d7:21:57:af:95:
33:2a:a9:7a:21:42:e9:43:63:9c:38:eb:f1:8d:2c:
58:26:51:98:ec:a1:de:3f:71:b7:ab:c7:ca:5b:6b:
54:d5:8e:91:d9:d0:16:fd:be:1b:8a:32:16:81:dc:
a2:4e:ab:82:12:16:e1:94:58:23:a9:0f:d9:15:77:
50:15:99:52:ee:9f:9b:0e:8c:bb:8f:74:ea:e0:fe:
03:82:e9:04:16:cd:fe:2c:92:28:52:d0:19:a7:40:
1c:c5:90:29:6e:e3:11:b9:f1:c8:b2:74:24:86:2a:
82:01:29:5a:23:9b:1e:6c:50:bd:53:39:a5:ac:a5:
4c:f6:ca:a4:1a:e9:bf:88:53:2a:06:60:26:64:8d:
7e:19
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7f:ac:03:e5:4e:52:5f:a7:09:8d:9f:e4:04:23:3c:3d:55:19:
82:29:84:8d:74:eb:6c:43:cd:43:3c:93:1e:cd:f3:25:89:52:
97:38:88:d1:8e:8f:b0:34:49:eb:39:5e:06:c6:7b:13:f1:16:
c4:2f:63:22:7e:8b:1b:8b:d0:59:34:91:1e:85:bf:2d:11:73:
b3:60:e1:09:ba:27:7e:8a:13:bd:3a:d0:44:7f:9a:ca:4a:f3:
cf:d1:b2:4c:f9:8b:41:79:74:db:b8:a3:ba:1a:7a:2e:a9:44:
28:ba:5a:81:12:ae:dd:28:3d:ba:4a:8c:78:be:32:3c:cd:d1:
6e:dc:ec:cf:dc:a7:aa:b6:db:a8:89:c5:3c:bf:79:0c:c6:9c:
5b:ca:d4:a9:d8:87:01:4d:02:2f:37:cc:58:1c:4d:f9:11:24:
3a:80:a1:6c:35:f5:df:5d:e7:0a:09:70:4f:97:11:1f:3d:6b:
3f:ef:b9:ed:05:59:bb:51:b9:45:72:f2:24:41:99:6d:51:6f:
42:10:c0:f1:4a:8f:51:e7:7b:d5:18:ba:e7:2d:0f:dc:c2:f3:
a4:88:79:61:e0:5c:2f:85:a2:0f:37:6b:2d:1c:de:1e:d6:49:
01:17:bf:0f:38:c5:ca:d2:c3:ee:c4:3e:94:08:e3:cf:c0:67:
1a:45:4d:02
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:51:55 2025 GMT
Not After : Jun 1 10:51:55 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1d:ff:cb:ac:c9:f6:d6:be:fd:05:19:53:7c:2f:1c:cf:90:aa:
fd:c3:30:89:9a:cb:17:dd:17:83:14:a0:80:c7:48:cf:5e:00:
a9:fc:03:4a:30:2f:56:09:c7:88:07:7e:8a:7d:4a:37:06:c7:
ec:f3:66:c5:19:2c:48:1b:56:03:cc:30:72:20:27:4f:54:3a:
49:c2:13:6b:72:13:83:c0:f8:24:4b:6d:b2:7a:2f:a0:eb:31:
75:0f:49:ca:b6:9a:ad:89:3c:b5:9c:dd:f2:d4:d6:bb:bd:c9:
74:83:f2:ec:28:8b:ce:be:9f:8f:16:93:93:7f:4e:c9:b1:34:
01:46:51:fd:ac:e1:25:b1:09:1f:87:9d:d7:4b:fb:d9:f7:62:
65:86:a6:e3:9b:6e:5d:f6:3e:dc:b5:23:a4:02:26:01:bf:ab:
cb:43:c3:fe:c7:ad:c2:a6:27:f0:f0:61:a8:15:76:59:e9:8f:
cd:8e:e2:1c:d4:47:05:e3:ab:62:e9:06:78:30:13:30:9c:91:
a9:ff:86:95:4d:dd:96:d4:98:1e:23:dc:bd:ac:74:04:a4:2a:
a8:f0:ea:ef:09:37:11:aa:37:19:0a:37:91:7d:13:af:99:cb:
39:19:11:99:e5:b6:99:ee:4c:a3:cd:04:26:d9:65:ca:31:8d:
8c:03:94:7c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.67s
Truncated 8000 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,887,944 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:56:06 2025 GMT
Not After : Jun 30 14:56:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:66:a5:4a:5f:ab:eb:8a:dd:cf:cb:b1:69:13:
2f:d5:1d:ab:28:d2:d6:f3:39:12:3e:6f:cd:cb:4f:
f4:99:d9:8f:55:8e:2f:0c:ce:14:6e:45:2d:a5:53:
40:b9:88:9d:2e:7f:b2:a2:dd:c4:48:f6:c4:75:0e:
0e:c4:44:6a:0d:11:5c:37:da:4f:db:1d:4f:87:d3:
88:5a:34:ab:35:68:09:2d:de:5e:36:35:73:95:64:
fa:8b:05:ee:ee:5c:87:90:1c:01:0c:3f:f8:85:a5:
25:a1:68:99:87:6c:6c:e0:04:3c:af:7d:20:9f:77:
9d:94:45:3f:8d:41:f0:33:4e:1f:db:88:c6:70:27:
bb:e8:3c:c3:a0:5a:f6:d9:fa:43:2a:44:a6:e3:fe:
58:79:6f:14:cb:cc:ed:b7:d5:57:50:2d:02:c4:36:
51:d1:2d:1a:de:8d:9f:6c:e1:4a:db:29:e3:99:e1:
45:e0:f3:e7:4b:bc:5f:a8:bc:fd:6f:ec:c1:c1:85:
8d:9f:b5:9a:9f:e6:0b:a4:30:10:2b:95:47:1e:3b:
5b:e7:c8:85:cd:0d:6c:33:0d:d8:e4:47:94:7b:4c:
7c:fb:0f:dd:72:3b:2c:67:42:96:c9:6a:0b:80:23:
ac:70:79:72:98:bd:a7:1a:5a:6f:e2:1d:73:27:d0:
75:29
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
97:61:5f:36:1a:02:28:71:c6:ba:3f:4e:4e:ec:18:88:26:02:
9d:a5:be:51:5a:1a:be:c4:18:c0:a1:b1:3a:ec:25:33:f4:9d:
a5:bd:b3:c9:31:f8:e0:38:48:ce:75:60:f6:d6:90:94:9b:57:
73:af:a9:4e:86:d5:a7:22:f1:68:a5:1f:91:f2:de:36:cb:6b:
b5:80:26:01:9a:2e:c1:c2:65:42:80:5e:75:04:f0:a9:67:f9:
f2:f8:f8:13:0f:51:c5:86:df:d0:80:da:fe:0d:cf:b3:3a:86:
ac:c2:5e:2b:52:1e:c3:3a:f2:f2:3f:2c:5f:db:eb:5c:04:ed:
14:12:4c:be:dd:44:de:58:c3:ab:e5:b3:4f:34:3c:df:8c:56:
33:58:4f:89:cd:dd:a0:7e:9d:c9:26:f3:5f:44:bf:a3:75:cc:
cc:49:38:6d:de:f6:2e:c6:cd:db:55:63:08:6c:7e:3d:a6:21:
8b:36:63:6a:c4:65:25:df:bb:51:0c:4c:b2:01:a5:11:48:b0:
f5:94:ec:c3:d2:f6:ef:de:d3:66:8a:35:bb:2d:a6:ca:c6:d0:
7e:9a:b9:6b:4b:56:5e:e4:3c:46:52:6d:28:cb:d2:ed:44:2f:
78:94:af:9a:75:c2:b6:4a:0d:25:97:c3:5f:d5:1f:4a:fa:40:
28:4f:18:8e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:56:07 2025 GMT
Not After : Jun 1 14:56:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
00:c7:49:78:93:ee:2d:3c:53:b1:2b:7f:c2:76:07:a2:c3:ed:
f3:44:ce:f4:74:c9:ca:d3:9e:b6:db:9a:de:06:13:8e:a1:af:
ea:21:3d:3e:32:72:c6:d0:4e:30:1a:d3:c8:b6:9e:5f:67:6d:
42:06:2d:91:d7:3f:06:70:ef:d5:e5:52:e5:c4:ea:8d:ad:e4:
c9:29:13:17:9f:2a:70:aa:01:36:1e:a9:91:eb:b3:58:32:42:
9a:a8:0c:b2:5a:5d:06:9e:f1:1b:e7:69:f1:59:31:65:92:f7:
af:ce:a5:f7:f4:8c:bd:29:15:01:99:c3:dd:ff:c0:8d:8c:9f:
a9:0a:54:49:8e:5a:08:34:2f:20:74:7b:3b:0d:1a:c2:92:ed:
2b:d8:3a:f9:2e:47:f4:95:e9:c2:5b:40:ed:bb:ea:71:72:b4:
e5:70:2c:4f:4b:c4:6b:90:1f:3f:2d:bb:7b:92:a5:79:57:39:
57:ec:0e:9f:7e:c4:81:cf:ef:39:17:21:a4:05:6d:8c:ef:00:
cd:2d:41:0a:d4:52:dc:39:c0:60:1d:69:f0:f0:ed:a4:2e:0c:
50:01:80:ef:e8:22:8b:12:5b:48:9b:f7:8b:b7:03:a6:43:00:
f3:69:45:e6:69:20:36:1f:02:e8:5f:5a:8d:c3:e6:43:5d:e8:
b1:75:3c:e4
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.06s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,410,041 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 15:15:39 2025 GMT
Not After : Jun 30 15:15:39 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:58:21:ba:7d:b2:e9:af:af:8b:72:bb:50:75:
27:30:93:1b:96:b4:82:b4:1d:d7:eb:eb:c0:69:cc:
c8:13:7a:b1:03:79:62:e5:f2:f6:7e:18:ad:20:e1:
8d:68:ec:f9:77:9a:e8:0e:36:4b:7b:02:7d:9f:52:
4e:cd:21:94:64:16:23:3f:6f:6f:70:a7:9a:44:95:
5e:fe:c9:64:91:96:87:26:5b:02:ed:f1:92:c3:90:
23:52:6a:83:f7:e9:f8:f1:98:11:6a:20:79:65:4c:
0e:4b:88:32:52:53:6a:04:06:1a:bd:c6:1b:2b:5e:
8c:8b:2e:dd:5f:ac:c1:b5:bd:4b:ef:b3:39:30:02:
81:a3:ca:58:5f:27:ca:a7:11:8e:b5:fa:2a:df:2f:
b3:8e:3f:ac:90:62:d8:09:b0:7b:67:0c:31:ed:66:
fa:b7:9e:46:2b:41:7e:52:b8:2d:e4:12:f6:41:05:
f0:3e:31:63:be:b8:6a:66:ef:1e:15:d2:95:cc:97:
22:92:61:fd:96:aa:3a:89:4f:f5:76:0a:d3:0f:c3:
25:3c:84:64:7a:6f:2b:2d:c7:9e:c4:59:15:58:ee:
41:f5:44:6a:df:6c:81:0b:93:b4:73:50:6d:9c:4a:
1d:cc:63:91:39:55:4d:21:10:ec:c0:f8:4e:0a:60:
34:c7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
40:7c:c1:66:42:46:a5:cd:66:ed:af:a7:d0:9f:2f:49:8e:88:
44:67:85:0e:ca:0c:9b:49:48:32:b3:0c:68:7e:de:3d:32:01:
34:82:8c:9d:91:17:bc:0c:a9:ef:da:e6:92:70:36:79:59:bf:
7f:9d:ef:98:5d:1e:23:f0:67:65:b3:be:b1:8a:b5:e0:be:6d:
cf:6b:f2:f2:54:90:e6:42:07:c5:a9:c2:22:35:84:bf:9e:cd:
4f:67:0b:22:9b:ea:40:73:ca:3e:e3:da:04:24:59:a0:c5:f1:
29:7f:dd:0d:00:2d:cc:39:bf:c8:f7:19:dd:db:60:b1:52:f9:
53:75:76:6c:e2:ab:57:11:cd:a6:9b:c2:c0:6d:93:9c:ad:43:
a3:e7:07:49:c6:55:57:ed:68:3a:14:df:53:16:4e:07:10:16:
e0:1f:f0:fb:ca:28:e7:f1:80:32:ba:6c:54:e2:83:b6:35:cf:
da:bf:c8:c8:d8:84:fa:ba:5d:ac:19:e2:e8:cb:22:2f:41:c9:
88:b9:22:6d:e0:a6:0f:e9:c1:8d:f8:0f:42:77:c7:9f:22:0b:
ef:91:98:08:e7:9a:b9:45:3c:8b:0a:0c:9c:aa:7d:f2:29:63:
a3:b3:1f:8b:a6:e7:5c:ad:cf:49:6e:82:69:c5:a9:b4:58:08:
07:8d:20:c0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 15:15:40 2025 GMT
Not After : Jun 1 15:15:40 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
85:26:fd:46:1a:17:a2:28:d3:d5:38:e2:3c:f3:76:eb:22:d7:
8f:cb:ba:d6:1f:4c:15:3e:b4:f9:5c:8b:1d:bb:2e:b4:24:4a:
77:1c:24:9b:da:10:70:fb:25:ff:e1:f7:a8:1d:56:ac:76:95:
89:6b:69:6a:d6:1e:b1:db:86:75:65:98:b6:12:71:38:08:e5:
37:4f:89:a5:fc:e6:17:fa:39:7c:18:1d:4a:4e:3d:10:24:82:
2b:10:c5:f6:d7:f5:e7:89:05:68:c5:cf:90:ce:ba:91:0e:87:
d9:ed:5e:54:03:63:8c:e1:71:50:55:5e:c0:db:f4:58:cd:84:
9a:c2:3d:81:4d:e3:83:78:47:7c:3e:45:a4:dd:d7:15:ed:74:
63:5c:fc:b4:3d:d9:61:42:80:46:11:23:a0:3e:38:c7:d5:51:
6a:08:26:10:cd:6b:e1:83:f2:6f:5a:c5:6a:38:d0:46:1f:87:
b1:cf:ea:85:54:e6:0f:cd:cd:6f:f8:2e:50:d2:c7:00:22:c4:
68:72:47:8f:72:67:bd:00:e9:6e:7a:f5:59:d7:3a:0a:dd:aa:
72:b4:d0:47:45:d5:90:80:30:35:c5:93:b7:cd:97:18:bc:02:
5e:4d:8a:6a:19:81:1a:8a:30:f8:98:f2:86:94:b6:04:6b:7b:
b0:c3:a9:a7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,737,782 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:50:29 2025 GMT
Not After : Jun 30 11:50:29 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:84:d7:99:6d:58:41:ca:13:14:93:93:bf:0f:b5:
e5:33:3e:b0:38:0b:41:2a:7b:97:b9:ec:31:7c:58:
dc:89:c3:90:d7:26:d5:b3:25:f0:aa:ff:68:10:49:
7a:e3:88:c3:b0:e5:29:72:64:a5:18:0f:08:58:b3:
d6:8e:24:d1:70:ad:84:03:0c:9d:eb:e6:3e:89:48:
58:c6:25:95:8b:5c:8b:c4:d2:80:2e:32:b4:24:ec:
02:73:ae:d8:c5:f5:05:8c:a7:f7:a7:f9:81:e7:89:
49:ed:b4:a5:fc:05:9e:47:f2:3e:d0:56:65:3d:05:
6d:73:a5:8f:c4:f3:fc:d9:f5:4c:49:94:d8:ec:b6:
0f:aa:d0:19:6c:40:33:d1:c2:00:64:66:b3:57:c8:
cf:0d:aa:2e:6d:7f:5b:04:67:a8:2f:ed:a1:3d:d3:
64:0a:9f:7a:92:80:d2:35:dd:b8:b8:2e:e9:42:79:
cb:92:d9:2d:ce:6a:fe:30:0a:83:57:c5:b4:db:ca:
85:5b:b1:2c:46:ec:03:7f:4f:df:e1:69:d2:dc:0f:
06:03:33:e2:06:d5:69:32:fb:02:c9:44:14:f7:39:
99:25:7b:b7:0c:6b:cf:b1:58:64:2e:7b:36:1e:31:
13:fb:68:5e:09:d9:c0:a9:26:9c:b9:21:24:72:a8:
bc:5f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3b:43:cf:9b:e1:32:b6:3e:c6:49:e9:a9:20:28:b4:a8:b0:1c:
32:cf:ac:47:12:88:07:28:ba:a5:7b:b3:56:33:9c:17:57:b6:
62:47:07:73:f1:60:4c:ad:55:83:9d:92:16:06:60:33:f6:00:
d8:97:2c:fd:b8:31:3c:de:84:00:04:c8:5d:65:a9:70:69:15:
92:06:54:1d:63:18:25:34:5d:d3:3b:21:46:07:0f:9a:80:a9:
7f:e8:49:6e:c6:b9:54:6e:df:56:c3:ca:14:5d:e3:b7:f6:4b:
f9:3d:4e:41:6d:34:fe:16:39:03:19:bd:60:a2:99:8f:58:3b:
50:de:f1:8c:e3:8d:12:5e:43:fd:45:54:9d:49:78:49:0b:4e:
a0:94:a9:ce:af:0c:52:1a:02:87:3c:36:6d:a8:e4:91:5f:1b:
62:37:74:c6:90:11:1c:15:ec:93:6c:fe:c9:c1:8a:39:d7:f6:
23:56:0f:34:25:19:49:ea:72:94:d3:fb:ff:c0:5e:5b:b4:4d:
bd:3c:20:3d:ca:79:dd:c6:65:a0:38:8f:4b:03:bc:ac:4c:bc:
c9:8e:2a:1d:16:e9:53:9e:a2:d1:b0:c2:34:18:69:14:02:db:
3a:6e:70:58:23:21:70:26:2e:cd:04:2c:8c:e3:1d:a2:45:62:
3e:af:b3:29
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:50:29 2025 GMT
Not After : Jun 1 11:50:29 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6b:60:59:c8:ba:de:50:ee:98:6e:20:ab:54:18:43:81:16:a3:
43:48:ef:a1:42:b0:10:79:0f:52:d3:52:16:2d:de:b3:f2:1a:
ed:f8:0b:b0:82:42:0a:59:3f:67:d5:62:bb:c2:e6:20:12:d8:
28:28:74:93:96:cf:64:fa:8b:fe:bf:89:b8:ef:39:8d:91:34:
27:75:17:67:9c:8c:67:3c:8e:13:1e:03:6c:a8:ed:0e:98:f7:
0b:24:ba:f6:83:05:b1:8e:e9:5c:aa:45:11:d1:5c:6c:d1:59:
4b:c0:65:23:1a:db:43:f0:dd:30:e9:60:35:76:ab:1e:85:9a:
47:35:da:9a:51:29:0b:e1:72:6f:ff:9d:3c:14:c2:97:7f:9b:
2b:2a:3c:53:e2:15:13:5d:55:80:83:92:81:2c:ae:24:99:91:
8a:0f:9a:f3:d6:1f:d6:30:96:3f:d0:70:5b:cf:9b:50:c9:dd:
94:51:50:60:97:b8:49:88:4b:7c:f6:74:27:bf:a2:1e:8e:ba:
60:be:00:d0:2a:32:25:f0:40:e5:61:7f:1c:f3:45:10:68:8d:
5e:a8:d8:04:29:d1:01:bb:1e:36:bc:33:26:eb:d4:09:6c:02:
5c:13:eb:2b:d8:f4:05:46:1e:55:e2:f0:ce:4b:79:4f:4d:b9:
47:5a:c1:ab
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,220,852 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:24:04 2025 GMT
Not After : Jun 30 13:24:04 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c4:03:5c:95:62:9d:9d:65:44:76:ab:1c:72:a5:
0f:ba:96:e3:d1:56:39:4b:11:be:58:9d:37:18:fb:
99:1c:ca:79:39:b4:f7:ee:d8:b6:d5:e6:7d:26:4a:
49:2b:37:7c:6c:e0:f2:ad:ea:81:b0:f8:4c:a9:f5:
9c:f7:a2:ec:11:65:b7:dc:29:c3:ab:d0:cd:8e:fc:
1e:77:c4:85:50:d5:5f:fa:bb:91:00:2c:21:36:23:
70:03:18:70:2b:dd:ee:49:c3:f4:c1:0f:6e:91:4c:
c2:41:bb:a7:f2:1f:58:ef:4e:70:70:f2:be:af:c3:
b6:2e:d3:be:41:67:a7:12:6a:63:b1:2c:9a:d1:40:
f6:23:ee:60:57:ad:bf:c9:91:71:c8:35:aa:d3:72:
c4:53:5d:a6:9e:aa:3c:15:17:50:2a:d5:ef:03:b5:
6d:b2:a4:5c:6d:7b:20:f4:90:68:f1:59:fb:8f:ac:
e9:05:d1:cb:f6:d0:98:19:a7:2f:c1:2c:ad:5a:20:
7f:25:10:9a:4e:09:35:10:7b:ec:d4:02:d8:60:20:
3a:59:a2:cf:b4:b4:c9:fb:73:00:da:38:6e:8a:c1:
04:fd:e8:e7:bf:3d:e9:76:7b:4f:12:7c:17:33:85:
94:c5:d4:83:37:a7:29:24:14:75:13:37:cf:09:7a:
95:43
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a3:50:92:de:58:70:f2:cf:dc:4a:ce:40:ed:c8:cc:ba:a3:a6:
2a:a7:0d:dc:bc:14:85:7b:75:94:aa:50:47:08:24:b4:65:2a:
d7:72:4a:fa:40:75:2f:77:21:8e:88:d6:b0:bd:6b:a9:9f:f1:
0f:fb:7e:e9:90:86:8f:78:7c:ce:a1:f1:af:f4:cf:e5:ec:26:
01:c8:66:7c:f9:b6:99:e6:f7:a0:0e:7f:9f:03:a7:8f:9b:af:
6a:c8:f4:5f:a9:2b:4d:55:23:ac:28:fe:40:ce:cb:f1:d0:99:
c2:9c:33:4e:ad:f9:6b:06:9f:be:a0:2e:02:24:6c:19:75:d4:
51:e9:bc:02:3b:61:96:42:93:f4:56:ec:6c:04:d3:95:b1:09:
0c:83:14:37:5e:2e:17:42:26:50:6d:29:10:a4:76:04:b8:61:
fb:27:69:bf:b3:ed:e7:b4:48:4c:8c:85:99:af:90:cf:02:53:
ef:b2:db:00:b7:b6:e6:71:bd:d9:17:ca:ab:18:76:b7:3c:f9:
54:5b:26:65:fe:df:b7:f7:0a:cf:48:31:48:91:03:bf:88:7d:
33:ef:0b:0d:c6:d6:8a:cd:37:c0:db:c1:f2:92:18:19:c0:9e:
a2:80:33:6b:29:df:62:1f:d1:2c:ae:80:2e:76:73:c0:8d:9d:
8c:ee:61:0f
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:24:04 2025 GMT
Not After : Jun 1 13:24:04 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
84:1d:69:a9:34:6e:63:7f:65:34:be:9d:24:39:eb:15:6d:a5:
60:e9:49:ec:dd:4f:e5:d3:f7:ae:d1:aa:40:ee:1d:88:4b:de:
51:12:8e:79:e1:91:c9:73:5e:2f:e7:ab:5c:b3:70:40:b2:17:
76:2e:74:83:23:7c:da:ee:81:5a:29:cb:5d:da:03:74:99:2f:
c0:4c:25:59:26:85:bd:d0:5b:bd:90:63:bf:fa:69:0f:5d:d0:
4a:25:ed:bb:51:be:1d:f0:02:a4:cc:02:e1:14:dc:59:f0:5b:
77:8c:38:4d:15:14:70:e4:c4:92:ae:24:ec:f9:1a:17:bc:8e:
6a:11:a9:87:79:29:1d:98:3e:dd:63:3e:c5:41:50:c7:fe:1b:
d5:46:54:a7:6f:71:14:51:64:e3:76:22:90:8d:8d:34:ed:c6:
9e:51:6d:03:98:25:29:18:ab:8b:90:62:cd:56:3c:4c:3a:6d:
b6:20:1a:46:60:a3:49:6f:05:e3:6b:12:3a:ba:81:0a:8a:66:
ff:e9:d2:32:1d:ac:55:42:af:7f:7f:15:c2:73:76:e5:e6:ad:
8d:f3:be:46:79:a9:e3:57:f9:a1:37:98:82:0d:4f:7c:31:87:
76:ec:f5:76:f7:af:b2:26:fe:d4:ab:02:26:4b:16:eb:72:2d:
88:61:66:74
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
Truncated 8000 bytes from beginning
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
* TESTCASE PASSED
20,900,075 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:37:03 2025 GMT
Not After : Jun 30 12:37:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bd:0a:30:b7:a0:1c:ef:26:4d:b1:98:0f:ba:bf:
54:73:11:73:b7:e5:d6:16:55:c6:6e:2c:a3:27:96:
dd:71:69:72:eb:b8:43:35:61:2d:23:77:4b:32:ae:
90:8e:12:e0:a4:f2:d1:86:a7:ab:5e:f1:d4:6d:9f:
b9:e9:98:66:ab:31:18:a5:0f:eb:f8:5b:05:ae:df:
3e:f4:1a:f5:00:50:ba:af:e3:44:d3:a5:c1:1a:9c:
80:c3:e2:41:5f:04:05:7a:99:9b:b0:76:3b:c4:47:
98:40:1b:c4:53:f0:c9:ad:98:96:b2:1e:5d:31:2e:
c5:46:5d:6d:39:bf:37:4a:34:e9:f2:4a:fc:cc:84:
80:d1:1c:3c:1c:9b:6a:e6:93:3d:71:27:68:a6:68:
24:37:13:2f:26:e8:8c:9e:5a:fa:1e:40:c4:33:9d:
72:4d:8b:ec:4c:62:5d:df:c7:d4:bd:6c:ab:3c:ec:
67:b8:54:49:29:bc:32:74:80:90:ac:ca:24:b6:4d:
04:cd:2b:a0:9b:c3:cb:5f:ca:04:9f:4b:cf:f1:68:
9e:0b:01:fe:de:a2:ea:c6:e5:8b:12:b1:70:98:98:
6f:41:b8:c1:f3:5a:e8:eb:3f:f5:1d:f8:91:ce:84:
e1:38:26:31:63:11:d0:29:e9:00:99:65:ca:ce:ca:
48:95
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
30:e1:0b:63:9d:24:87:aa:ba:ff:1e:29:15:15:39:5e:c5:6e:
9a:f4:30:9a:ff:74:59:7a:34:28:91:f5:b8:e8:15:e2:c8:d4:
1a:85:c3:2a:e1:a4:e7:a4:5a:d1:3b:25:2b:c2:1a:af:bf:60:
da:af:67:bb:0c:a3:df:52:74:8c:02:9f:e0:a4:11:91:eb:49:
77:75:4a:2d:5f:9f:3e:27:e9:55:0d:3e:48:bc:38:1d:d5:5e:
f5:33:8a:b7:54:66:ee:38:07:1a:7e:d6:5c:19:fa:2e:07:90:
33:bc:8d:9f:9a:ab:af:9a:05:af:7e:08:91:e5:b5:1d:6d:5c:
ff:49:ff:64:e3:37:a3:d2:b6:31:16:29:26:72:28:3a:ca:75:
0d:12:cb:fd:99:e4:4a:7c:c3:d8:e4:4c:d2:dc:a3:70:03:66:
5d:48:ec:f1:07:1a:08:a8:6e:d0:c6:92:86:ab:f5:7e:a7:97:
11:43:0a:4d:8d:e6:3d:88:7c:75:f5:eb:63:79:b9:de:c2:e6:
65:7e:19:a8:9a:5a:19:7d:54:e7:9f:ec:28:93:98:fd:19:12:
fa:e8:c1:17:15:46:15:bd:cd:d5:cf:68:28:8f:2b:f8:49:a1:
10:e0:3b:ee:49:58:80:02:a6:ac:45:e5:96:e5:26:bf:05:e0:
03:8a:df:93
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:37:04 2025 GMT
Not After : Jun 1 12:37:04 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:5a:3f:39:c3:6f:b4:1b:68:d6:12:61:a2:65:9c:1b:02:b5:
4e:f6:d6:4b:c0:ac:e2:48:04:1c:95:91:9e:ff:18:f1:9f:59:
e4:38:96:63:94:41:72:39:52:97:84:8b:3f:86:ed:14:6c:2e:
cf:c6:66:4e:61:76:c3:54:72:46:29:ed:10:9a:fe:3f:49:61:
7c:8c:c3:2f:dc:aa:df:34:5e:4e:54:c7:5f:c2:9d:9c:ba:da:
e2:64:ba:2f:74:11:02:25:f1:c9:09:b9:66:27:72:da:03:34:
6f:39:ec:3f:1c:3c:53:f2:03:8d:70:f6:83:bb:83:51:e2:14:
c5:14:a4:f5:c5:7c:11:05:2e:a1:89:18:35:77:d3:06:1a:8f:
73:bc:31:0a:58:52:bc:3a:64:3a:7f:5b:02:b3:79:9d:6d:9e:
ab:82:56:50:81:f9:96:f7:ae:43:a0:f2:5b:62:b3:9f:22:a3:
ef:ac:e9:2a:e6:77:b0:85:b9:42:05:f1:43:cf:56:a4:88:af:
f7:7a:63:13:af:1d:fa:67:70:d9:a9:98:e4:79:8a:3c:5e:58:
8d:67:ae:a1:e3:49:ef:84:00:54:9d:4d:60:a7:f2:4a:52:d1:
06:c4:83:59:80:29:d3:ef:5b:19:77:36:25:d5:9c:22:62:a8:
5e:15:77:a8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.14s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,413,331 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:35:14 2025 GMT
Not After : Jun 30 12:35:14 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9b:c1:65:a6:6e:26:1a:b2:32:ea:5b:82:ff:fe:
b6:11:ca:e9:91:0a:67:9b:63:7c:74:17:41:9e:13:
86:16:b4:e9:43:64:44:dd:93:a5:ce:aa:1d:de:82:
44:4f:34:84:c7:19:e5:5c:93:15:60:ab:d7:03:d9:
f1:40:5d:47:ba:77:77:2a:56:f7:10:f2:f3:ee:40:
46:6d:c5:8a:2f:73:c0:32:4b:69:61:0c:87:ac:8e:
90:8d:b3:26:38:d6:d8:b5:5e:53:fb:55:a6:b3:ab:
63:ac:75:3a:30:de:c4:d1:0b:89:71:82:ba:57:df:
23:db:87:ed:03:1c:95:39:96:c1:b2:86:e5:8c:a4:
6e:22:e4:28:f5:04:06:45:a0:a4:b2:42:7a:9c:e4:
98:20:46:ec:90:14:8e:59:97:ee:df:59:2e:7e:b6:
86:d6:cb:b3:ff:cc:a5:2b:f4:74:91:24:38:98:dc:
2b:ac:58:2d:50:57:fd:fe:9c:10:8e:9f:02:8e:e2:
cf:56:7e:00:47:23:f3:1e:8f:60:c1:7b:da:a3:bb:
c7:0c:a9:0a:35:24:8e:7b:c3:c4:4e:f7:f6:45:22:
e1:cf:2d:75:db:a9:5c:d6:d6:57:cb:fb:e8:0d:c0:
33:0f:4e:b9:c3:c6:41:60:5c:ac:72:b4:cb:7f:51:
48:93
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:5d:a3:a4:8e:da:9b:01:24:65:e4:44:e5:14:6c:10:77:5c:
d1:9d:47:0c:50:4b:bc:56:c9:8f:c8:0e:43:2a:9b:29:6c:ac:
d0:10:98:25:12:1c:ba:3d:6e:83:9c:8e:ec:a3:00:34:c6:77:
a1:91:23:7c:eb:e2:11:8a:cd:9a:eb:fe:61:be:b8:7c:15:34:
bf:20:96:55:36:c0:e5:b2:fe:89:82:8e:8c:4e:a9:34:0b:57:
80:51:d0:87:2b:5b:59:03:72:77:b2:f2:7b:42:0f:79:56:53:
e6:03:cc:f9:44:32:cd:d1:b7:a0:bb:2a:a3:91:44:50:fd:09:
15:fe:14:55:f0:44:de:f0:cd:db:88:03:16:0a:ef:1f:ed:03:
3a:e7:1c:94:f5:9c:ac:74:4a:41:48:1a:c9:23:a1:01:66:35:
ab:e7:4d:70:ce:eb:b3:4a:bd:68:08:f0:b7:c1:31:29:7f:e3:
9c:bd:b2:2e:3a:5a:39:9f:8d:6a:c7:59:a0:42:53:ef:a5:ff:
37:37:ee:8d:0f:5b:c4:fa:34:60:c2:95:af:25:e4:33:29:ef:
2d:47:cb:2e:58:cc:ae:d7:db:17:d2:ca:7a:7d:45:f2:66:c0:
31:43:0e:a6:91:73:aa:f4:0a:d5:06:b9:70:dc:dd:08:a8:b7:
cd:63:73:41
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:35:15 2025 GMT
Not After : Jun 1 12:35:15 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
76:cf:57:52:60:eb:77:a3:ce:79:a4:bc:16:40:c9:8c:a0:4b:
d2:e3:28:f9:a4:d1:09:a0:89:ab:03:9c:15:d5:67:ec:06:7f:
90:31:d8:63:6f:bc:aa:1b:14:ce:48:c1:eb:e3:af:4f:d2:18:
5a:34:12:ac:3a:7d:e6:5b:3e:4a:b8:d7:41:c7:10:f7:32:eb:
36:04:2e:19:fd:b5:9a:c3:c5:40:b8:17:52:5c:09:43:64:16:
b0:e5:b0:ec:d8:9f:6f:3b:f8:1c:80:24:3e:89:7c:9e:bb:ad:
e7:8a:7d:ab:bd:89:08:74:20:7d:10:02:12:a4:b7:56:b9:4b:
a4:d1:8f:85:49:c1:49:35:e4:b0:a4:24:33:41:47:b9:c7:5a:
13:f1:fa:b0:e3:3b:00:4c:b2:f2:f1:2a:d3:9b:0a:86:59:4a:
95:a4:4a:cf:ca:59:b5:5e:79:87:73:b7:65:40:fc:06:02:c1:
c0:2a:08:e0:b6:38:f5:a3:04:dc:a8:fc:7a:24:13:2e:76:89:
03:68:a7:bd:6d:a2:1a:92:1e:55:50:40:be:c2:ae:66:77:42:
30:3c:08:56:76:f4:a7:b7:fd:8d:9b:8e:62:f4:64:24:69:85:
4d:65:97:ec:fa:26:09:90:51:ee:59:5a:3d:0b:92:4e:5a:04:
ae:b8:68:eb
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.79s
Truncated 7935 bytes from beginning
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
3,104,901 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:03 2025 GMT
Not After : Jun 30 10:25:03 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:a3:05:ed:7f:1e:66:cb:33:97:d9:8e:97:78:
e5:e3:2a:45:79:ee:85:5d:ec:9d:92:50:6e:c3:fe:
eb:d4:b2:6a:2e:70:fb:04:56:0e:59:e2:51:6e:b2:
d1:f3:f3:35:28:6d:ce:b9:5c:2a:c6:00:36:8c:07:
d6:7d:af:c8:05:40:f6:fd:00:70:d6:bd:c7:ec:f8:
af:85:8d:26:a0:61:55:3e:1f:7f:60:19:0a:5d:2f:
8a:18:9f:06:1c:13:80:e5:d9:7e:62:d1:98:df:e1:
40:f6:85:e3:51:21:36:16:ac:0a:89:9c:81:28:53:
e2:7f:77:b1:04:dc:05:3a:c3:2e:aa:06:69:30:a5:
fb:62:07:a6:9c:34:75:c0:db:94:c7:3f:06:bf:e0:
4d:ec:e0:37:c7:96:c8:70:dd:c2:b8:c9:bf:02:e9:
ec:f8:11:4e:3a:04:c7:7f:0a:4f:f8:08:e6:05:cc:
c7:f2:0e:2b:31:f8:e1:cc:0a:30:c8:f2:c7:44:b8:
81:a5:63:5e:4f:24:09:dc:9e:96:26:15:8d:49:53:
18:ae:8f:24:d8:e9:75:ab:d3:80:49:4f:18:0a:d2:
82:12:5e:6b:7e:40:14:1f:40:27:ce:91:f9:83:ac:
ae:d9:15:4d:db:01:fd:c3:a8:ca:5c:66:42:e7:ee:
f7:c5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ae:76:d3:92:a3:70:57:08:31:8c:2a:6d:d6:3b:e7:8d:eb:26:
1b:31:3a:85:ee:5a:2a:48:15:e0:85:f6:10:46:15:5a:81:f0:
bf:38:5a:00:5e:88:b0:09:f8:7f:9a:1b:8e:f9:c7:78:62:94:
95:3d:ee:90:c8:25:b6:a6:70:c6:2a:71:ce:70:46:5d:75:f1:
e8:c2:67:70:45:97:24:d2:ed:bc:1b:24:79:5c:7b:cc:38:79:
8c:0e:5a:84:20:c6:e7:aa:bc:ac:cd:81:51:49:a1:b2:c6:39:
66:ba:8e:99:4b:41:26:a0:c4:de:99:db:ac:87:00:b8:eb:07:
f1:92:43:02:66:4b:91:72:8a:8a:0a:ae:48:08:5c:32:df:96:
5c:0f:4e:dc:0e:5c:f3:87:b9:a5:7b:02:2e:20:93:95:8a:69:
ae:88:6b:03:0a:dc:53:a6:c2:c4:ac:a5:22:bd:52:71:87:c6:
9b:91:b9:fb:1b:09:1f:9b:35:da:8c:43:10:1e:ec:0a:80:f3:
76:cc:ec:b8:ff:4f:5d:a9:5a:56:c8:1f:f8:93:a9:94:73:b2:
fb:5b:53:4b:67:f7:64:3f:2d:92:52:95:5a:93:8a:1a:ac:6d:
9f:9a:13:15:f2:04:99:99:47:ac:f1:7f:5d:96:df:b0:76:ab:
82:cd:ed:f8
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:03 2025 GMT
Not After : Jun 1 10:25:03 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
55:29:75:88:bc:1d:24:af:45:73:ba:e9:ce:dd:bf:b9:6b:12:
60:32:b1:40:d0:12:61:98:88:b1:0d:bb:79:ac:c0:7c:04:a4:
f4:35:57:4f:18:c6:97:64:93:f3:75:4a:45:37:9a:8e:5f:3d:
46:2a:22:26:42:8c:83:bb:03:52:b7:30:f0:94:77:2f:52:e0:
67:91:12:a2:58:5e:66:a6:23:5b:81:e2:2f:7f:07:ca:03:bd:
69:23:7f:c7:1e:43:c8:fb:d5:5d:35:3c:89:91:5b:b0:32:bb:
ad:d7:cb:d1:79:1f:d6:d8:d7:ed:c8:cc:c5:24:5d:f4:bc:f3:
4b:88:51:73:55:c1:a1:ad:00:76:a3:eb:e5:55:df:20:62:14:
ff:0f:50:c1:7f:2f:2e:cf:6e:43:08:7a:64:b6:30:22:62:00:
99:eb:93:b9:74:a7:ff:3e:33:c7:00:ad:70:e7:1c:5e:7a:db:
44:79:b5:47:5c:c4:0c:f2:8c:c9:5e:22:4c:ca:5e:27:71:bc:
f9:d3:98:dd:6f:20:14:7f:45:f8:43:1f:5e:b3:2a:d0:a6:cd:
cb:67:01:aa:77:bb:f8:c3:93:55:41:6c:61:b0:5c:4d:eb:c3:
30:02:1f:21:7b:a7:a0:2b:12:62:c5:15:ed:9b:e4:b7:e1:eb:
03:81:39:d1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
Truncated 3059 bytes from beginning
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
2,850,457 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:53 2025 GMT
Not After : Jun 30 10:24:53 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:af:ff:5a:61:eb:a7:d8:67:b6:b6:17:0b:b4:a6:
19:a5:78:a5:b4:fb:5f:7c:e9:35:8a:3d:43:e5:a8:
1c:bb:8e:87:11:92:cc:11:40:26:a8:bd:2f:67:23:
b3:17:7f:f4:de:7c:0c:4b:04:9b:a9:cd:72:71:a6:
e9:3a:32:31:67:b6:c9:4e:9a:64:81:dc:9d:6e:d5:
85:ca:0c:b9:2b:f1:8e:17:27:55:1d:e3:c9:4a:f7:
7a:a3:ba:c0:cb:8f:eb:0f:91:cb:bf:f8:83:0b:df:
63:a8:92:85:1f:6b:ba:4c:b2:b6:5f:84:30:75:9a:
0a:34:85:03:5c:af:9f:a3:a7:16:40:f1:86:79:7d:
db:5d:73:50:45:18:0f:09:8b:b6:ad:48:88:7b:df:
99:43:06:da:fc:6e:74:5c:c4:37:25:91:bf:8d:9d:
a8:d5:62:37:51:8f:f2:31:f8:39:c9:fb:44:85:40:
02:30:5e:a5:6b:bd:58:6d:b0:47:1b:6e:e4:76:ca:
3c:44:de:bc:8c:cb:47:4c:4c:95:c6:ec:72:9d:e3:
59:e6:71:97:30:a3:2e:b8:5e:1e:15:6f:fc:8d:53:
00:d1:00:93:e2:f1:80:b2:0a:1b:75:86:b8:4b:30:
a0:de:80:86:16:a9:4b:95:2d:7c:b4:b8:7f:5a:cf:
1b:0b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
41:0e:04:a0:30:c1:3e:38:02:dc:8d:45:11:c8:3f:14:a6:57:
f1:b6:89:10:77:1a:92:a9:31:37:56:51:4e:3f:cb:0d:ad:9e:
f5:df:9c:17:bb:e9:89:88:2b:55:89:50:c4:79:02:9e:da:2e:
ba:f7:90:88:4c:a8:bf:b9:e9:09:fc:7c:51:70:b3:e0:93:b2:
6b:7e:9b:2a:dc:d7:b1:67:cd:81:28:11:80:7f:02:42:d1:08:
54:f8:4f:23:2f:8e:fc:dd:a5:4a:04:a8:b0:8a:50:8d:5b:59:
17:0d:66:69:a7:93:4d:e9:31:c0:88:8e:a2:9c:20:32:57:0d:
46:eb:21:a4:04:8b:01:20:40:14:fa:f4:d9:3b:88:ef:50:ac:
63:84:9c:c9:fc:db:89:96:ca:50:b3:73:81:f1:2c:79:cc:b8:
22:67:8a:0e:1f:c6:e9:2a:04:3a:cc:98:ff:ab:ba:c6:23:c0:
3f:b7:74:e6:24:9e:a5:e1:68:dc:84:8b:3b:dd:f8:7a:24:c8:
46:bb:d3:7c:40:14:88:1d:62:45:2f:d4:61:84:ff:b9:64:f2:
88:11:40:db:11:21:12:b0:8e:79:1f:37:b8:a4:e7:8e:1c:35:
02:c1:36:cb:76:bb:ae:d3:a4:0e:c1:45:bc:2c:47:8d:e0:e1:
be:75:60:ee
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:53 2025 GMT
Not After : Jun 1 10:24:53 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
62:29:d9:3f:c7:48:01:f4:17:a4:a2:83:3e:1a:f0:21:37:97:
2f:f7:cc:87:25:6d:88:01:e7:5b:ed:78:d0:e8:64:c3:5c:3f:
25:c1:7c:35:dc:72:39:e2:6d:c8:9d:2a:f1:b2:33:b4:91:2f:
e5:14:30:ea:2c:8a:ba:a1:38:15:a2:18:1b:8f:c7:ea:5f:5b:
3b:64:2e:e6:77:1e:55:0d:03:23:4e:b7:a6:2b:22:bc:b1:53:
9e:4b:52:ce:18:c1:08:16:25:83:6a:b4:fe:90:f1:98:3b:40:
b2:ea:b8:57:f4:8a:9a:f2:7b:ad:c8:4f:9e:20:25:53:a8:52:
77:2d:33:66:d3:02:43:68:92:36:cd:f4:98:de:c6:25:32:5b:
59:ef:20:34:1a:49:80:44:73:e6:c5:6d:41:8d:2e:f2:c2:8b:
dd:e8:60:f8:83:49:fb:ab:45:5f:fc:7f:84:ec:0e:c0:1d:a4:
73:b5:99:e3:b3:fe:62:14:44:c9:29:2c:98:30:d1:0e:60:ad:
09:f2:59:1a:aa:89:89:2b:fb:37:84:0d:9c:22:0d:5f:a2:cf:
d2:39:d4:4f:01:4f:bc:c0:0b:93:4b:c1:aa:74:e7:2d:1b:33:
e9:3d:23:96:38:45:46:1f:48:97:17:9b:61:14:78:40:29:9f:
a4:d4:d4:ee
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
Truncated 7935 bytes from beginning
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
3,105,266 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:46 2025 GMT
Not After : Jun 30 10:24:46 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ba:e7:cf:cb:77:2d:eb:55:08:c1:7d:37:5c:34:
94:04:4b:fb:6e:59:80:ae:44:57:c9:2f:1c:dd:ac:
e7:0e:de:96:52:00:64:3e:d3:6d:d1:a0:2a:64:67:
15:04:9a:f9:82:e8:0a:bd:b1:67:e5:78:01:ac:96:
83:3d:1c:71:59:12:75:42:a9:94:1e:6c:16:7e:5b:
6c:19:a0:e9:99:b8:e8:b9:05:21:fe:57:cd:9a:5c:
04:db:02:39:9f:5b:61:35:f2:36:f2:b6:37:29:91:
6c:20:26:f4:32:ae:81:23:17:72:60:02:0e:c8:55:
a0:4a:a9:0a:de:29:35:49:fb:3f:0a:8c:65:98:94:
53:a1:ba:ab:a7:3a:dc:a6:a8:fb:d9:db:a7:51:7c:
4b:22:a5:c7:28:b6:d0:aa:76:8d:c7:47:b2:6f:02:
81:c2:7a:62:d3:6d:ed:20:b8:73:87:d6:ef:85:73:
89:86:c4:56:2f:6c:c8:b3:b9:88:24:f9:4f:cd:2c:
c4:b2:8b:a4:ae:a8:cc:e5:d3:7d:09:33:4b:c4:dc:
1b:2b:d9:cc:51:28:bc:7f:09:de:75:f8:ae:6b:e2:
1a:e8:1c:20:be:ef:73:97:9f:9a:3b:e5:c6:89:98:
24:7c:df:a3:5a:48:29:32:06:83:19:ac:6d:01:94:
9a:e9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a3:d8:28:9d:4a:dc:67:85:17:c1:20:8d:68:70:ca:6d:0c:59:
f5:49:14:91:50:9d:5b:cb:cf:a6:3c:17:3e:f7:10:9c:f0:dd:
97:07:45:cc:95:78:8a:37:0a:ff:b2:79:4a:20:7d:d6:c5:7f:
30:6a:0c:6d:9d:75:20:bf:0c:57:23:d4:4a:8a:be:64:b0:56:
44:79:57:a6:d2:d1:35:a8:b5:5e:a2:94:d9:96:ed:47:29:14:
3e:7c:34:66:1e:cc:7e:25:19:c6:da:da:a3:15:69:8d:4f:8d:
0b:a2:ce:7a:d7:36:39:80:2d:b2:16:3c:8c:d6:25:0e:37:c3:
e8:58:7c:f4:26:e9:c5:d7:4a:80:37:23:54:32:dc:09:80:07:
b1:28:07:39:14:97:53:45:74:57:aa:b4:91:7b:f7:fb:5f:e3:
4e:b8:88:46:7a:e5:d6:87:12:5a:c9:3a:a4:17:89:9c:34:76:
e3:8e:68:94:1d:f6:12:8b:da:49:5c:36:99:52:c0:b2:bd:ad:
51:8b:a9:c2:d2:10:de:81:d9:ce:0a:8e:e1:60:08:14:6f:a3:
17:94:51:e7:e1:58:70:9f:df:51:ea:31:77:76:c6:19:0d:63:
ed:66:17:7a:12:43:ea:fb:ba:78:a5:e8:68:da:97:e9:81:99:
97:21:1e:21
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:46 2025 GMT
Not After : Jun 1 10:24:46 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6e:3e:ea:6d:01:fc:21:37:3e:d9:81:da:fc:d3:72:2b:f8:eb:
ff:c0:59:f8:19:cf:e0:30:18:98:66:77:91:66:ee:74:6d:7a:
3a:ba:73:db:09:23:d3:f7:eb:9b:84:7e:0a:28:20:ef:09:83:
6e:f9:a8:7d:1d:1f:1b:9c:38:18:21:29:30:39:2d:63:ac:c2:
c7:42:81:7c:e1:49:74:d4:1f:6a:90:8e:b1:e0:62:66:2c:1d:
80:4b:db:77:84:11:86:5d:9f:b7:0a:9d:d6:8d:bc:a6:df:29:
d7:05:16:07:e3:01:73:65:26:5e:4d:46:1c:5f:4e:93:65:21:
93:03:31:36:4b:e6:3c:c7:49:bb:d9:85:c5:eb:2d:d4:87:c4:
c3:3b:82:69:5c:f4:42:42:cc:95:b5:ed:c9:39:d7:54:03:c1:
78:c1:db:c5:d3:ef:dc:c1:0d:b6:64:f4:70:9f:d5:91:a1:9a:
b1:b5:68:88:f5:d3:17:80:40:2f:db:51:73:55:39:40:a7:57:
97:59:4b:67:2f:83:52:1b:ba:95:36:d4:89:d0:8a:2f:39:1e:
04:54:7f:1f:55:b4:78:a9:c9:4f:ed:c5:bf:be:9f:de:c4:48:
77:3b:89:78:2f:34:91:46:83:60:77:c9:c4:03:16:5b:00:91:
1b:80:2b:4c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,852,314 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:21 2025 GMT
Not After : Jun 30 10:25:21 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9c:35:b5:52:46:dc:ba:9d:5a:88:17:b2:6d:38:
19:75:7f:51:d5:33:8e:b6:af:6a:25:77:9d:d3:2f:
51:80:9b:52:3d:89:db:47:33:23:d1:72:2a:5a:f5:
46:19:0d:52:11:f1:a5:5a:00:a2:75:d9:f9:77:03:
2f:20:1c:0b:66:67:62:06:d1:c6:2d:81:6b:aa:e6:
93:a1:c9:4d:c9:3f:f5:66:4d:4b:82:6a:3f:3a:80:
95:54:0e:6f:ef:54:37:e8:46:71:b4:f1:49:2f:74:
59:80:c8:7d:5f:1c:15:95:1d:76:c0:e8:6d:34:1a:
ca:ef:7a:d6:72:33:2a:51:8b:9b:37:48:31:2c:29:
88:35:13:1f:ff:20:6b:c5:08:6a:8f:87:7d:0d:19:
ad:8f:dd:a2:be:3d:ca:fb:1f:90:3c:0a:d4:fd:b7:
59:61:cb:34:a9:ff:a4:14:a9:22:f5:7b:6c:e4:86:
d0:90:a1:f1:f5:35:46:b7:2a:6f:d2:46:15:56:4d:
09:f0:9f:cc:96:e7:ad:64:80:b0:e5:01:95:6c:de:
cf:b9:f6:81:da:7e:0c:6b:77:3f:e4:76:7a:eb:67:
a0:2a:65:be:96:aa:b8:bd:59:3b:4e:61:bb:20:79:
31:d8:42:44:5b:96:d7:e4:a5:cb:99:a3:96:c9:27:
d7:03
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4e:3e:27:92:b4:a2:9a:9d:fd:27:c2:d8:f9:d8:2a:a8:8d:a6:
a0:a3:f5:fb:b9:94:39:03:41:e3:e0:08:e6:bd:00:50:71:05:
ef:5d:e7:35:a2:99:f9:23:a9:e8:e9:4d:51:bc:64:e4:4a:e2:
c5:2a:e5:78:c9:6e:d7:40:f8:58:95:3d:cb:28:65:c6:fc:34:
a0:a6:a7:ac:2c:ed:76:b0:48:32:e6:c3:f8:bf:10:88:b7:b5:
80:cd:87:72:fc:83:cb:25:bc:eb:d4:cf:11:f1:06:f6:bc:05:
19:86:cc:42:81:33:5a:6a:b5:d8:fa:39:12:1b:10:f8:37:c1:
3f:bd:73:4b:54:29:28:10:fb:da:ca:c5:0a:e9:7f:8e:d0:a1:
97:d9:ae:cd:26:ec:5b:d9:6b:20:17:ae:89:46:45:80:40:ca:
a4:40:49:6c:d5:45:3a:1b:94:cf:2c:9f:7e:68:52:ae:8a:43:
88:d9:17:c3:49:c5:3b:7c:58:e8:e4:56:ae:1e:c8:72:aa:15:
26:be:a2:ee:0a:1e:12:d7:73:36:52:65:4a:53:97:bf:e4:8a:
b8:36:d2:4e:a7:6b:5f:7f:a9:ba:34:90:47:be:39:48:ab:81:
b8:75:24:54:93:3e:12:37:62:7f:88:4f:c1:82:94:c7:2d:ae:
ca:d1:9e:3e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:21 2025 GMT
Not After : Jun 1 10:25:21 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:5a:2b:75:07:56:e1:86:fc:e3:58:0a:0a:13:34:dd:17:de:
ad:75:1e:45:04:7b:65:6e:6f:1f:c6:77:a0:ac:9f:bc:61:44:
b0:03:a3:a8:6a:48:cc:48:6d:aa:18:46:4c:37:26:14:d7:9d:
c9:af:8c:33:d2:ba:5f:54:60:c3:90:f9:0e:a7:af:7b:93:60:
1f:9a:87:f4:85:09:61:dc:5f:56:8d:1d:c5:7b:3a:52:f6:7f:
8e:39:54:d7:cf:51:26:45:62:72:c0:3e:5e:60:ff:7f:86:95:
2d:ac:6b:a1:6e:c1:66:f0:75:af:04:3c:09:7a:88:7e:a1:0d:
98:d1:7e:0b:5f:02:24:ea:5f:25:7c:a5:7f:1f:ee:74:a0:7f:
8c:82:fa:70:d8:15:c0:5b:8f:3b:69:a5:5b:eb:88:dd:df:d4:
2b:25:bb:da:cb:e4:61:a1:7e:a1:20:c7:4f:80:3c:a5:b8:e2:
ec:71:97:3d:4f:5b:4d:6c:9d:ca:24:55:67:97:b3:b3:12:20:
f3:08:37:6c:48:d9:52:c6:af:a3:f5:c6:61:1d:1a:d1:85:f9:
48:a7:40:28:84:91:32:4d:07:ee:0c:f4:5c:0b:48:5d:a1:34:
6d:7d:42:61:67:97:e2:f5:ba:be:d3:14:78:60:ef:26:6c:c8:
ba:a4:26:30
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
Truncated 7935 bytes from beginning
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
3,104,833 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:54 2025 GMT
Not After : Jun 30 10:24:54 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ae:0d:04:5e:38:15:97:95:62:48:f3:f1:6b:28:
17:5d:ff:d5:8f:01:cd:b4:08:6c:dd:84:1c:8b:2a:
a1:2c:30:55:d5:0b:84:a5:c7:f3:aa:b2:76:f4:ba:
d1:87:d3:bd:51:89:d4:ed:ba:f0:24:c9:dd:5d:cb:
e1:06:f0:32:3c:e5:d0:3f:ee:6a:35:0a:23:07:17:
3f:ee:9e:17:b3:2e:de:d2:1a:d7:12:f5:e6:9a:69:
4a:aa:b0:60:9a:c0:c1:9a:e7:5c:36:1b:09:ac:32:
d9:dc:ba:43:92:0d:d3:73:a3:60:05:0e:c8:e1:17:
3e:9f:34:75:3c:29:33:a9:e2:d7:dc:77:5e:38:ec:
e3:81:71:24:4c:de:bc:58:38:9c:ef:d2:b2:86:ce:
3e:6f:fc:76:9e:ab:82:05:b3:3a:35:38:08:7e:2a:
6f:41:6b:00:88:25:88:8d:fc:db:94:af:f6:9e:16:
b8:26:a5:48:6c:9d:67:54:61:ca:61:3e:50:aa:ee:
7a:a5:a1:ab:74:9a:43:f6:d5:0a:29:9d:19:ab:06:
d4:97:71:3a:c6:00:42:74:8e:83:5a:c6:3a:90:18:
ab:ac:d9:0b:96:41:75:e4:d6:73:25:42:02:df:fc:
99:4e:1b:18:4f:de:98:fa:b7:1a:53:97:1a:ba:3c:
85:8d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7c:7d:a3:e1:bf:19:3e:1f:ec:78:4b:0b:ba:83:ff:1e:5d:d2:
94:7b:27:1e:d8:d7:19:ff:0e:73:9f:15:7e:eb:65:cc:0f:43:
78:33:fb:d4:88:43:72:b1:14:7d:63:03:a8:46:76:c6:d2:87:
c4:eb:e6:c2:49:0e:fc:7f:53:ad:a3:a2:4b:ab:54:67:03:8d:
7b:c7:48:db:eb:96:8a:20:33:47:7a:8b:fb:25:17:31:60:69:
61:f1:fc:9f:ef:52:53:f8:62:64:37:9c:8c:66:a1:df:10:7b:
dc:9c:61:13:14:16:25:ab:87:a8:9a:24:2a:1b:48:c1:b4:f5:
89:6d:b1:91:53:d1:fe:04:16:ca:fb:b0:11:50:6b:f9:59:28:
c3:6c:34:4f:e7:5f:b1:8a:2f:fc:65:a7:32:3a:6a:c1:e7:d9:
f6:cf:98:05:48:bd:ab:43:72:45:d2:47:e2:15:05:3f:b9:24:
17:70:7a:c6:0a:9a:0b:1b:1d:57:3e:1a:c7:a5:36:cc:c2:1a:
05:01:31:30:3e:d0:92:4f:24:c2:6a:59:b9:27:a8:05:82:fd:
c6:31:e6:e6:98:3e:19:52:8e:fa:6f:aa:06:bc:a9:37:86:b9:
4d:53:b6:12:53:6d:11:d2:96:f1:6a:23:81:42:b2:80:c3:7a:
06:1a:7c:c5
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:54 2025 GMT
Not After : Jun 1 10:24:54 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
04:79:bc:85:40:9e:fa:3f:a3:b8:26:40:89:09:81:6e:1d:a3:
07:0c:ab:71:4d:83:ab:82:a7:b7:3c:34:16:a2:5d:e7:11:8a:
ac:5f:c1:a5:12:b2:bd:4e:b8:23:eb:06:2f:84:88:7a:c4:c1:
32:8d:4f:8b:57:85:ef:f4:1a:7a:b7:d8:4c:df:a2:00:bc:03:
72:66:e5:5c:c4:ff:4d:32:12:4f:e6:84:41:70:bf:18:0d:5d:
8a:56:07:1d:aa:b1:1c:a9:c8:2d:0f:4b:ef:d1:af:da:2d:a3:
67:31:96:f1:51:af:b4:ad:20:e4:17:39:b8:41:95:7b:9d:71:
89:8b:c7:10:2a:5a:ab:02:09:c2:19:42:1d:73:2f:a2:f9:4a:
7a:10:1e:8b:6c:df:0a:ca:be:0c:34:9a:72:dc:3d:97:fc:53:
d2:b4:28:c4:ad:b2:0e:4e:8d:ed:87:0e:c1:40:37:ed:c5:cf:
f8:99:66:85:18:f7:64:36:39:f9:4c:ec:d2:06:d7:eb:69:ce:
52:cc:a0:77:1c:2b:1a:f0:c2:c5:c4:d6:a8:b9:0b:e3:e6:97:
f2:24:c2:b2:c7:c2:33:60:c0:f3:b0:41:4f:64:94:82:6f:93:
0b:bd:8c:1d:b1:8f:47:08:95:06:df:25:06:9c:65:34:ba:60:
ca:64:ca:6e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 3059 bytes from beginning
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
2,853,653 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:55 2025 GMT
Not After : Jun 30 10:24:55 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9c:db:01:23:6a:26:8b:9c:0a:c9:58:a5:da:66:
ff:95:78:a3:55:4e:8c:c2:af:37:f2:d9:fd:f8:0b:
79:64:21:33:e1:f2:c8:cf:09:2a:32:33:7f:28:89:
44:81:93:a7:f4:50:56:bc:51:c0:12:ff:0e:d0:c8:
f2:3e:52:8e:6a:e0:de:1d:57:e6:66:bf:a9:3f:cd:
53:5d:69:91:fe:63:8d:70:d3:43:e8:80:17:13:d0:
23:2f:f2:61:40:e6:eb:3a:37:c1:09:c0:76:7c:ef:
04:19:70:56:20:99:59:24:4b:c5:5d:d5:f6:3c:62:
b2:83:2f:61:e8:63:88:91:80:61:12:4c:f3:89:e9:
d1:66:b7:0a:cb:9e:81:80:67:8f:7a:ac:61:c7:14:
1a:5e:60:a4:c3:a9:df:a7:3d:5a:9b:53:0c:51:37:
ed:85:bb:c5:85:d3:25:c6:e4:ea:e1:c3:69:ae:62:
98:70:52:43:f4:4f:44:ee:e1:b2:67:b5:86:fc:20:
7d:8c:02:35:35:9a:e4:5f:be:f8:46:72:ae:ff:f4:
d8:e2:aa:0c:6e:e2:68:f6:c0:79:d1:94:9f:6a:8e:
8b:5a:57:12:30:34:37:cc:0f:9a:5f:b6:85:4c:bb:
13:e0:68:e8:aa:a0:c2:dd:fa:4a:c0:2a:a5:1d:c3:
4b:89
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4d:b6:f5:f9:bb:9e:60:a0:77:27:51:41:0c:6a:bc:41:e7:54:
58:a6:fb:24:1c:4e:84:b2:c1:3b:f5:cb:76:12:88:e4:7f:1b:
7c:72:b6:ea:69:51:62:e8:42:03:dc:26:92:41:c6:f1:6a:8f:
fd:d0:38:1d:be:23:35:ca:42:5a:a7:b5:3e:dc:9c:41:26:1c:
cd:11:fd:31:e3:b3:88:e5:0c:8c:86:93:fc:f8:ff:0d:c9:f9:
78:44:7d:2b:9e:68:47:48:0a:d3:03:d0:24:94:a8:74:a5:3e:
f5:0b:29:02:e0:5a:96:dd:1d:56:ce:6e:4d:67:78:f9:88:8b:
4d:2e:dc:c6:0e:02:41:5c:f3:1b:ce:6c:7d:f8:1c:38:ca:cf:
29:09:c4:80:68:a6:c7:cf:84:cc:1a:6b:69:1d:2a:bf:c8:b1:
9c:36:85:cc:90:69:ce:45:1f:61:05:ec:2f:05:96:7a:ce:1c:
9a:79:78:6f:64:36:54:55:86:e7:1d:29:55:29:52:b1:7d:76:
23:5e:1b:33:a7:04:f0:a4:a0:2a:d9:16:32:5d:75:de:29:7d:
62:81:d5:f2:79:53:cb:1d:70:89:df:01:4d:ae:d5:07:71:04:
2f:5c:47:6d:6f:ea:88:ae:c6:b1:c9:a1:3a:16:82:d3:ce:63:
14:bf:3d:53
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:55 2025 GMT
Not After : Jun 1 10:24:55 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:d7:a5:91:20:bb:66:53:f0:1f:7d:83:8f:f9:28:ff:d1:dd:
70:8a:ec:60:ed:1e:9a:5b:73:6d:1f:83:e6:f6:de:c8:03:2f:
4d:bb:c7:17:f9:3a:e9:cf:e4:a6:ce:75:1d:bc:3f:49:1b:23:
24:ed:b4:4f:3f:39:4f:30:da:85:f3:82:61:45:c9:16:6e:89:
9d:35:cc:e3:3c:b1:39:57:93:30:7c:91:ed:c5:fd:f8:c7:7d:
ab:e6:9e:76:fb:2b:24:01:b1:d1:21:54:a7:e1:16:01:05:2c:
76:0e:4f:f5:03:21:4b:32:11:c3:6e:0c:22:45:cf:10:ab:0a:
14:61:92:50:ca:39:7c:8e:8e:51:f6:54:03:36:87:eb:92:fb:
92:74:ea:7d:25:c1:8b:1e:4d:6d:78:a5:17:6e:dc:70:d6:49:
cc:f5:9c:c9:15:02:9c:b0:82:d1:e4:01:c4:26:17:5d:6b:53:
5d:6b:dd:2b:a4:35:70:06:94:0e:e0:d6:b9:e8:b3:3b:b9:da:
c5:d4:12:aa:22:30:32:42:cd:bf:e9:f7:3d:2c:df:bc:50:a2:
a6:7c:2a:d8:30:77:a3:fd:61:28:89:e8:2c:59:3f:e0:ac:07:
3c:b4:c8:c3:21:37:ed:fb:3b:17:1a:b7:53:69:ca:e3:ba:aa:
f1:b6:89:49
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
Truncated 7935 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,102,168 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 30 10:24:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d8:11:db:00:c3:00:b3:b3:e1:a8:60:f3:34:a4:
d6:b0:cb:6d:f6:3b:0a:19:b1:82:e7:cd:03:d0:18:
97:64:fa:30:72:89:f8:71:74:85:11:a7:c5:5b:24:
35:41:3e:1c:18:09:b0:d3:ba:77:81:b1:e6:71:61:
8c:6f:b8:00:9e:9b:b9:66:43:6f:2a:50:13:ec:d1:
d9:8c:f6:45:c8:2a:ab:d4:d2:7d:08:ef:8b:98:96:
26:f8:fb:8b:e5:80:f7:e1:2e:95:ee:a9:13:49:b6:
6b:7c:a5:db:b6:23:5d:a1:04:05:15:bb:5a:52:d3:
67:76:6a:71:19:c2:6c:1c:70:e6:35:52:ce:8d:c3:
ac:33:7f:9b:e9:f0:b1:97:82:b0:17:9e:20:cf:bc:
c2:b2:e5:78:ba:ad:fa:77:1a:90:48:fc:9a:d1:47:
f8:98:c6:c4:02:7a:6c:fe:3c:f3:7b:e2:a0:92:04:
e3:9c:3c:df:89:24:83:bd:1f:e1:99:16:85:a6:01:
23:37:87:4f:0a:44:68:22:f0:4d:34:29:4f:91:0d:
c4:d6:2f:c5:7f:ff:7c:08:35:d4:b3:f1:e3:bb:d5:
15:2d:4a:5a:ab:f1:d7:74:ee:41:de:d2:11:7f:24:
35:75:11:b3:23:a0:b4:72:92:69:0a:0d:e1:3c:41:
30:6f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d7:1b:09:95:73:98:bc:78:ad:2f:48:97:87:26:2d:79:06:37:
ea:19:71:c7:5f:d4:1d:5e:2b:fd:33:3e:ff:4a:d3:a2:30:09:
e8:b2:96:e5:4e:83:73:dd:b2:f4:10:76:73:95:14:24:78:48:
7d:2b:c4:47:b8:20:34:5e:e9:eb:b2:1e:ac:78:2d:8a:ca:2c:
28:9c:85:0b:4e:98:66:8a:04:02:63:56:2e:25:97:e7:c0:1b:
23:6a:cb:b9:52:75:22:10:4b:6b:40:f0:76:be:b1:8d:64:07:
8e:a5:8b:bc:0d:22:58:55:6f:cf:b1:6e:9c:8e:9b:45:b2:3c:
37:0e:a2:c2:c5:f9:ca:29:ab:e2:2e:e2:4d:07:10:7c:f3:ad:
ff:95:00:ed:2f:88:a3:b6:a5:85:dd:85:d5:11:71:eb:86:39:
71:19:98:45:db:c8:b3:9e:9a:c3:f2:3a:ca:6e:af:c2:92:69:
05:1d:e3:e6:35:45:e3:eb:c2:77:a2:b6:77:27:16:6e:97:2b:
8d:81:00:ea:5d:5b:e3:dd:e1:18:9a:a0:b7:23:c4:06:49:b9:
24:b0:a6:bb:78:bb:39:c6:0a:cf:bd:64:aa:b8:f2:04:5a:c7:
c8:ea:ea:76:82:b8:48:2a:3a:b9:af:37:b6:87:64:be:72:28:
f3:9e:cf:a8
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 1 10:24:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c9:28:f7:ca:67:a2:d1:ff:b3:d3:a5:bd:83:3a:42:31:14:8c:
0d:9d:ac:7e:4d:c0:f8:3b:11:91:84:62:1b:23:c2:08:20:c4:
36:b2:83:cf:c0:1f:47:14:fa:e5:b8:ab:c2:1e:35:d2:fd:02:
10:9c:f6:f6:30:b4:64:b7:e4:9a:19:05:50:39:51:09:2c:fa:
0a:23:ef:49:6f:28:8b:40:36:80:29:d0:a6:ed:e0:d0:94:68:
1d:be:45:77:05:a4:57:65:5a:41:18:bf:2f:32:3f:40:44:a1:
a8:7b:f4:8b:4b:81:8b:bb:4d:c2:0e:db:e1:53:6a:9d:29:e9:
73:80:8f:2f:2e:cd:be:0f:47:4f:cb:5a:66:59:18:63:4a:48:
be:93:90:d3:35:de:1a:3f:df:40:dd:1d:34:8e:51:cb:8e:76:
bd:7e:fd:87:2c:f7:87:82:fa:33:fa:30:5c:1d:10:14:86:c0:
ce:bd:a7:52:c0:ff:c2:68:5a:41:c8:50:1c:20:35:8c:04:ae:
c9:61:bf:d1:ce:0f:ee:17:d9:f4:47:77:c2:35:80:31:8b:79:
ea:8e:92:9b:35:46:9b:53:ca:22:7a:9c:89:7d:46:1d:d6:de:
1a:c8:2c:a1:7b:e9:9a:ac:25:20:dc:b7:2c:d5:5c:1e:8a:25:
11:8b:de:99
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
Truncated 3059 bytes from beginning
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
2,855,010 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:47 2025 GMT
Not After : Jun 30 10:24:47 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d7:5c:a6:0e:25:66:60:fa:2d:4a:5e:74:e1:98:
07:8c:43:39:1b:36:84:6f:a2:80:8f:aa:4c:48:cb:
8d:50:c0:d6:d6:ce:ef:83:13:f2:54:2e:c6:b6:4e:
3d:0b:72:cd:a7:75:af:24:6d:d5:4d:7a:54:c7:92:
4d:68:19:de:27:e6:32:40:a2:1e:f0:62:ef:2f:35:
a1:7f:63:b2:ff:c2:e6:35:24:4a:ad:af:d7:04:4b:
26:5c:c9:8b:6e:79:1c:b2:b7:6f:92:b8:4f:5b:25:
62:ef:f9:3b:d0:74:e5:a3:24:1d:df:71:88:90:01:
18:da:d8:62:bd:56:78:f5:65:f7:db:90:6a:68:7e:
fc:cb:dc:93:d3:71:dc:2f:0d:44:a0:e5:b8:12:d0:
80:51:e5:f6:97:5e:8b:3a:ef:11:99:f4:cb:b6:1e:
6f:d1:19:50:b3:58:e1:af:92:f6:35:19:c1:f7:67:
16:48:1e:db:8f:89:69:0f:e7:4a:7b:a5:96:00:20:
3d:eb:76:99:8b:17:94:cb:dc:39:7d:e5:34:27:d4:
1f:88:5c:17:a9:74:55:88:52:e9:ad:8c:fc:68:e6:
8e:6d:9d:39:39:22:47:5b:44:5f:5a:82:68:8e:29:
e7:9a:24:45:06:69:03:fe:c1:52:ce:65:a4:16:41:
1a:8b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
81:fc:84:6c:f2:a0:c9:c9:10:84:f4:89:71:92:9b:b4:a9:be:
12:e4:c9:13:96:16:f9:21:2f:6a:ed:77:00:63:a9:1e:2a:4c:
86:dd:27:e8:7f:68:9a:bb:80:a2:ba:be:f2:7c:23:9c:15:a1:
88:76:52:cb:db:9f:42:ad:40:5a:87:c5:16:20:38:b2:c3:a5:
d2:e6:eb:b5:e5:6f:fc:a6:4d:01:0f:da:1b:65:fc:4f:90:e5:
09:c5:a7:da:f1:29:61:a1:93:37:bd:47:e4:4c:a5:90:bf:a9:
fd:87:6e:ad:d5:3b:f4:78:a2:d9:66:b2:b7:08:99:9a:7d:26:
6d:fa:8d:e8:d4:2c:5d:3d:2e:45:18:e9:31:bd:3d:da:3d:a7:
c5:a8:a5:b2:c7:72:2a:55:d9:e8:ac:db:b2:f1:84:5d:90:f7:
44:b3:62:83:9c:22:41:22:ff:ca:8b:1d:4e:ac:50:5d:6a:b0:
a7:f4:41:fc:2a:27:38:2a:79:84:bd:a8:c7:73:7e:c4:e4:ae:
87:95:fa:cb:e9:8a:fe:d1:3f:67:7a:b0:82:e0:70:20:1d:b3:
45:78:f7:52:e2:3b:f3:cb:69:70:17:41:9d:19:da:9f:ff:7b:
c1:4c:95:b8:3e:b8:e0:e6:ca:73:8b:98:89:7b:7c:6a:6c:94:
82:dd:aa:cd
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:48 2025 GMT
Not After : Jun 1 10:24:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c2:3c:40:85:e5:aa:49:30:68:bf:f0:d1:d4:bc:23:cc:22:b6:
0a:18:99:06:ff:18:d3:19:aa:9b:61:67:95:6e:46:41:3a:bf:
f3:cc:de:fa:46:66:1a:64:10:fb:3f:8f:28:f1:09:b1:64:9c:
37:84:37:c1:86:66:d2:35:ea:5a:7d:98:2b:bc:de:d0:54:10:
11:5a:02:f9:51:b9:86:91:4d:2a:11:ef:30:b8:a4:81:c6:f0:
84:d6:17:93:b2:6d:9b:f8:2d:80:7a:af:5e:89:9f:4e:d4:dc:
9b:b5:46:01:63:f6:88:ec:0a:f8:8c:4a:00:ad:f4:ee:8f:96:
74:b2:77:bd:d6:d5:31:44:b7:38:0a:3b:bb:b9:79:41:b6:95:
3c:4b:33:a8:24:0e:c1:38:9e:02:bf:fc:fb:08:dc:78:36:f5:
21:90:57:b0:6a:32:30:a9:e0:33:8e:c2:b7:12:0a:ed:88:88:
8d:35:b9:34:8d:17:a7:39:f4:f3:4c:ae:44:23:c7:34:cb:1b:
a7:75:9c:fe:04:1a:9b:02:63:c9:50:64:e8:42:b9:34:a3:a9:
27:d8:18:db:71:8d:b3:7d:8f:84:7b:f3:d2:45:51:7e:e5:91:
49:4c:7a:58:c2:b4:d7:1b:63:e1:21:9e:7d:8e:d8:18:4a:e4:
d0:2f:0b:91
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.29s
Truncated 7935 bytes from beginning
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
3,102,105 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:54 2025 GMT
Not After : Jun 30 10:24:54 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c3:4b:6a:3b:58:c0:cc:1b:db:18:1b:33:63:89:
05:06:b3:1d:4e:d7:5d:4b:b5:09:78:73:21:5d:b8:
7d:a1:24:ca:41:c9:6b:94:19:dd:e1:a8:6a:7a:14:
a3:97:28:55:5d:e1:d4:df:9a:a0:e1:9a:f4:d1:e4:
56:66:f4:29:12:09:d2:13:87:e8:4a:ab:cf:3a:6c:
f5:57:35:17:ad:7d:1e:c5:c2:1d:8f:4e:ff:92:c5:
08:10:18:30:c3:36:88:9c:51:10:1d:f9:08:93:e3:
79:ff:70:41:cb:d8:f7:de:74:31:b6:23:49:7d:fe:
f4:fc:b6:b3:7e:8d:36:ea:8f:fe:fa:3a:2d:d3:7b:
1b:9a:e3:36:8d:89:27:b5:04:3b:a9:0f:a9:74:b7:
38:c8:3a:9e:5a:d0:0d:8c:2e:08:db:ad:f5:0e:6f:
a3:90:94:5b:b3:25:0f:45:77:1a:62:2d:0d:62:b1:
e6:f1:e2:48:97:d5:2c:7e:80:53:50:28:48:92:6c:
13:28:19:9d:8b:23:9b:4c:c4:01:59:32:42:2c:1a:
d1:f1:82:fc:40:8e:ea:8f:94:8e:29:c5:f2:15:78:
f6:5c:87:bb:67:a2:e5:ec:bc:7f:9b:b0:16:ca:09:
ea:0d:8e:e0:82:68:59:51:c8:a7:d1:d6:64:66:7c:
67:db
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3f:d4:ae:7f:a8:7b:4d:d4:13:0f:f3:01:84:ec:f0:70:a2:3a:
13:53:13:d8:5c:70:be:d2:ed:23:69:61:e1:30:88:40:90:27:
98:25:3d:fd:e3:23:6d:dd:84:3f:21:b2:24:2d:a3:71:2a:52:
55:af:58:1b:09:8f:75:81:10:8d:b4:8d:50:89:d7:32:4b:a7:
42:b0:b3:f3:bb:4a:f2:77:81:2f:16:17:dd:4f:79:a7:56:96:
17:73:57:1e:57:73:e3:87:2b:59:c7:ad:c5:b9:08:02:93:d2:
14:03:62:90:72:89:c4:e2:eb:38:e0:8d:40:17:29:b7:ae:e8:
bc:d3:28:80:bb:18:11:b8:dd:46:9c:5a:a7:cb:15:36:06:41:
12:40:d5:90:a1:72:6b:ad:51:05:a3:dd:06:a8:12:e2:23:cd:
c5:95:47:08:ce:8b:be:f7:69:c0:3a:44:3f:18:59:b8:51:e0:
e5:fe:b4:f3:7f:b7:55:a0:e7:bf:98:b3:9c:f4:d2:e4:b0:de:
b8:b5:01:5f:95:94:a8:5e:9b:16:39:06:f0:88:15:af:ad:86:
56:d6:58:97:f8:b2:b1:77:e4:ab:55:ca:b6:1b:8d:3a:8f:f2:
d4:39:8b:48:1a:d6:43:80:fa:1a:3b:c2:5b:14:57:fd:92:9e:
e2:52:6d:a2
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:54 2025 GMT
Not After : Jun 1 10:24:54 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5c:2f:ce:1b:86:8d:77:a1:d9:e1:44:6a:7e:29:c6:a4:28:4d:
b8:a8:00:37:a1:4b:25:d8:48:69:82:c4:c6:8a:2d:b1:68:bf:
b2:0e:db:ac:c8:c2:5a:80:08:38:1b:76:67:d8:6a:c7:2c:f7:
ee:d0:fd:2a:43:a3:50:e0:2b:49:cf:13:c3:f8:2d:ef:e0:29:
1d:27:64:16:79:cd:a4:93:91:63:ea:c7:98:b0:f6:3e:e1:1b:
85:06:2e:fe:81:12:2b:e4:0b:91:26:78:00:3f:41:14:41:c0:
f3:c6:94:6b:a0:91:3d:26:32:dc:da:aa:83:f5:05:aa:88:45:
cf:a0:ed:0c:8f:35:3e:25:6b:96:9f:f5:a0:a3:b4:c6:04:fa:
62:82:27:af:4c:67:e8:72:de:50:5f:7b:ee:a7:25:1e:ab:0a:
64:64:97:53:f6:79:b5:b4:23:15:fe:1c:22:d8:92:7f:5c:8c:
16:7f:a4:c2:16:87:d0:59:99:a0:cb:c8:06:e7:e0:79:e1:ac:
89:ef:08:f0:fa:19:f4:6e:e4:eb:3e:f7:0c:1d:22:9a:f0:f8:
37:a2:46:ce:fb:81:ca:0a:cf:7d:94:29:e0:42:bd:20:b8:d8:
81:af:49:84:02:2a:da:78:65:74:f8:5f:86:f1:75:ed:35:5f:
47:ba:2c:9f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
Truncated 3059 bytes from beginning
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
2,853,477 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:54 2025 GMT
Not After : Jun 30 10:24:54 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a7:72:1f:a5:74:3c:ea:be:2b:83:3b:58:b1:74:
22:01:4e:cd:d5:ce:b6:b6:69:92:20:3c:b4:aa:05:
e0:f6:03:c6:cb:99:81:53:de:28:2c:23:9b:3d:3d:
47:56:75:44:9a:71:04:e8:ca:b3:dc:50:a0:21:f5:
de:dd:3e:b4:9d:17:1d:a9:13:48:0a:68:7a:98:65:
5c:4d:e3:bf:89:89:c0:81:9f:81:52:6f:c3:54:61:
9e:0f:dc:b4:da:73:6e:59:6a:b0:f8:a0:ab:7e:c7:
bd:c6:84:00:e8:ea:39:e3:0a:6d:05:ac:0a:15:10:
dd:1c:4d:f8:bb:09:1b:ff:3c:b0:5c:f6:5e:e0:48:
f6:fa:fd:fe:b6:74:11:ea:21:9f:b8:05:e3:49:76:
ce:89:9f:80:30:40:05:a1:86:ed:15:ee:5f:08:fd:
e5:6a:4e:21:20:9a:ba:1a:31:da:ca:29:2d:36:b6:
a1:b4:65:85:42:ea:ed:f8:49:a5:a5:6c:ab:d8:6a:
f5:ba:2d:fb:2d:80:ac:d2:ca:0e:3f:14:9c:d1:a9:
63:ea:4c:00:dc:98:35:8d:ff:c2:73:56:03:4f:f8:
77:af:e7:28:d8:58:25:69:87:aa:2a:28:a6:51:2c:
06:2c:ff:9f:3e:c0:a9:1c:00:29:3f:8d:90:1b:7e:
36:e1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
29:e7:8c:87:7a:d2:83:ed:4e:54:2c:c7:47:52:16:a4:9f:16:
c1:61:aa:19:a9:05:28:2f:8d:b7:e7:f0:f9:c3:32:b1:56:be:
e8:2e:08:57:ef:fb:3c:35:18:53:22:1b:5d:07:68:3a:d9:d8:
1d:db:9d:5b:fa:e8:96:f3:a4:b0:54:5d:92:1b:01:98:2e:f4:
06:eb:0f:08:8a:29:93:56:8e:ad:9a:59:30:df:04:1e:08:72:
00:04:d5:19:d2:32:7b:67:01:59:13:b5:a7:04:c7:a5:13:64:
58:1e:c1:f0:d1:8e:bc:e2:02:ad:c1:1f:2e:e3:a1:0f:99:e7:
68:de:6b:49:93:81:50:c9:46:ab:1f:9b:57:b9:a9:ed:25:df:
90:d2:f3:43:ea:cb:a2:0b:40:66:f2:8d:c6:0a:fd:70:27:d3:
8e:7d:c9:88:48:ee:9f:8c:b2:97:dc:d6:ad:1e:29:62:c8:75:
2e:f8:2f:8f:d2:d3:64:bd:f9:2a:9e:a3:63:61:88:a9:50:83:
24:21:9c:c5:cd:a4:c0:29:10:ec:44:a9:39:26:fc:6b:cb:8e:
99:7c:71:e2:b1:47:ff:6a:ce:f5:85:d2:7e:95:5c:05:a0:59:
ee:c5:de:d8:66:7d:4f:a3:7a:66:ab:0a:d3:7a:17:48:bb:d2:
28:e2:c6:69
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:55 2025 GMT
Not After : Jun 1 10:24:55 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
69:95:00:e5:2c:d5:7f:b7:4a:88:ec:24:04:12:2f:72:9b:7b:
64:11:56:6e:4e:27:74:e1:ad:ba:2f:70:ae:8e:95:fb:0a:44:
7e:b1:0c:e6:c1:ec:88:4e:f4:bc:0d:74:96:d9:e3:cf:63:e0:
4d:d2:fb:40:e4:09:c5:2e:0b:63:5c:6d:9c:22:a1:76:a7:ee:
bd:d6:79:f3:dc:34:c4:bf:cf:ae:2e:3c:9b:04:fb:76:03:c7:
d2:87:6d:02:15:24:44:21:4e:a6:72:b7:83:08:c9:3c:c8:98:
92:42:5b:e6:74:46:05:b0:ce:6b:1d:c8:b5:fe:f2:0e:5d:ca:
dd:b1:6c:62:4b:c4:89:92:df:91:9a:a6:9c:bf:89:5b:0c:ec:
53:00:e7:bf:c1:ab:79:6b:28:d1:b0:a2:da:2e:25:f8:58:4a:
54:22:93:4b:54:cd:00:f1:1d:ee:12:ec:71:cf:3d:55:0c:63:
09:80:13:6e:df:02:e5:78:6b:8b:09:11:7d:77:78:72:cd:48:
f8:f8:35:46:0d:60:da:e2:da:98:81:d3:1e:eb:4d:52:54:ad:
0b:f7:27:56:e0:26:6d:1c:f4:7e:b4:3f:af:c7:12:70:c8:ec:
1c:7b:26:6a:43:99:f7:63:d8:d3:c1:f4:d3:64:05:9a:dd:4e:
c7:9a:7a:5b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
Truncated 7935 bytes from beginning
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
3,105,630 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:44 2025 GMT
Not After : Jun 30 10:24:44 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:41:9a:88:81:4d:23:84:a2:1c:1e:4f:b9:92:
3d:8e:65:67:53:ec:6c:64:c4:ed:3d:3f:e2:db:27:
3d:c8:8d:bf:2a:38:28:a3:1f:66:93:ed:5a:98:49:
bb:20:5f:1c:ad:ef:04:95:8b:3c:05:2d:f4:a7:d5:
ec:54:ca:9b:70:03:d3:95:80:22:92:72:9a:90:02:
f4:1f:0d:b7:75:bb:bc:ba:7e:fa:7d:e7:d5:ef:b8:
49:04:ce:5c:6a:34:57:fe:79:00:b4:fd:69:8f:a6:
25:98:15:9a:57:76:a6:45:07:30:3b:48:b0:78:c6:
b6:25:92:14:11:71:47:df:b2:22:6e:22:eb:36:64:
54:10:9d:94:c2:72:0b:a6:15:b5:fc:34:8e:7a:52:
a3:40:f3:bf:b1:7a:f4:5f:fc:67:a4:28:64:35:58:
af:de:e9:70:cd:43:f9:c0:ae:bf:23:e1:51:a2:e9:
51:ae:3f:92:53:93:87:b9:71:ca:4c:bb:c7:40:52:
ac:91:87:62:40:42:3e:e8:d9:2b:6e:f4:d5:4b:f9:
0d:ed:b9:29:90:c6:72:df:70:90:5f:24:44:2d:5f:
90:10:87:da:20:c5:55:18:e3:bb:95:6b:ff:09:0e:
0d:0d:c3:e3:5d:9f:9c:c2:b5:fe:26:08:30:e9:e6:
7e:2f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
01:21:58:80:c3:89:c6:a5:d6:cd:e3:55:3b:bb:13:26:87:aa:
21:3e:24:15:e3:1a:70:55:9f:b0:95:d8:c3:f1:24:b5:2c:7c:
56:7b:b1:9d:f7:12:17:04:fc:99:51:04:bf:e8:c2:22:15:63:
e4:32:bd:dc:25:e8:03:a2:8e:f0:76:f3:d3:c0:f4:48:09:4b:
a0:82:86:35:e6:50:4a:66:8f:d2:8e:b7:c2:57:c6:37:fb:d9:
09:3a:16:60:07:81:dc:18:3e:43:7f:fc:f9:32:c1:2a:fe:70:
bb:de:8d:65:3d:af:6a:d2:58:08:57:8a:f9:fc:b8:63:39:aa:
7c:2a:ae:a6:a2:8e:73:04:9b:01:66:2d:65:e4:b8:c5:a0:ff:
9d:fa:f0:cd:9d:5f:f2:52:40:cd:0f:cc:e0:99:2e:9f:a1:93:
a1:d9:87:91:60:af:cd:99:a4:b6:96:b4:86:a5:b4:4a:2c:f1:
1c:6a:e5:9a:15:0a:47:c6:be:3e:6d:ed:74:01:ee:c7:15:56:
64:70:0f:e5:cd:13:0b:43:81:fb:af:2a:22:b8:74:73:7f:6f:
0e:c8:b6:e5:e8:07:79:e9:a2:17:21:0a:26:71:82:27:cf:52:
cd:ec:b5:80:18:82:f2:3c:38:b3:c1:a4:7e:e7:92:cf:56:b1:
8f:ca:4c:a6
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:44 2025 GMT
Not After : Jun 1 10:24:44 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
69:74:70:c1:08:fc:30:46:68:c4:71:58:97:56:59:8a:ea:d3:
e4:38:44:fb:d9:71:c0:e4:ce:47:07:b2:4c:1e:15:2a:fb:f3:
a4:13:06:96:48:70:a9:ee:9d:e3:60:71:6f:dd:b6:54:72:7a:
f0:d2:36:21:8d:4b:7d:71:60:9d:b0:6c:a0:c0:d6:3b:79:73:
15:5d:0b:71:50:06:61:ae:47:8c:81:23:22:d9:9e:92:14:d5:
f5:fe:6a:cc:7f:6c:29:c9:fe:a2:10:b7:ac:54:f3:b6:66:bb:
0d:0f:de:b0:64:83:69:0c:99:f5:37:d3:ca:d2:b7:5d:af:74:
c4:16:16:9d:30:6b:a8:f3:29:98:25:84:d0:09:56:46:c7:27:
cf:81:83:44:81:cb:84:46:31:0a:24:74:56:3d:c4:2a:39:d0:
ab:41:dc:39:4a:cc:cc:b6:ad:71:a2:36:f8:3d:01:54:47:bc:
76:19:8a:7b:94:62:17:2d:3e:2a:03:0d:0f:83:6c:e8:5b:7a:
bd:c3:e3:b6:29:32:c3:82:18:e9:5f:53:00:18:ec:02:90:47:
47:08:98:61:a0:d2:05:93:d1:b5:14:52:16:8d:8c:64:fe:3d:
4e:a3:d7:10:18:19:65:e0:22:2c:50:f5:5d:4d:89:1c:2e:af:
ac:8a:49:ab
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,851,790 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:55 2025 GMT
Not After : Jun 30 10:24:55 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ab:4b:28:1c:b2:1a:68:2b:59:bf:6f:4d:33:4b:
bc:f8:d6:f9:49:cc:44:a3:42:7d:0e:3b:83:47:14:
ca:81:12:8b:96:a6:cb:d7:77:5a:c3:d4:b9:25:4c:
57:5b:c8:20:11:2d:9d:34:74:db:07:ab:8e:a8:72:
e5:d0:ef:c3:22:8b:35:8a:e2:ca:fa:83:24:11:8c:
5a:cd:0a:0e:ae:77:90:08:2f:5d:ba:8a:9c:fb:bb:
74:da:95:6e:ab:1f:a5:ef:0c:7f:65:69:97:4b:37:
17:1e:c1:5c:7d:b5:41:cb:80:aa:3f:c5:8c:d2:fa:
67:8a:c7:ac:81:95:31:ef:22:82:8a:2b:65:a8:e5:
22:45:4d:c1:5d:b0:9f:e2:39:94:74:83:a9:cd:31:
32:2f:ba:c6:9f:b4:49:a6:8f:4e:8e:a4:06:1f:5c:
00:03:5a:8b:ca:19:11:5f:74:72:5a:3a:64:bd:88:
0c:d1:83:cb:6c:77:5b:24:c3:0c:09:e7:6d:51:e1:
3f:2d:ae:40:05:8e:de:97:f4:c0:46:43:3a:56:1a:
ee:51:01:30:9b:9a:75:14:fc:76:51:32:e0:fa:d6:
0d:fc:74:d3:11:75:ed:60:95:d3:06:be:87:ab:7d:
cd:48:28:b0:bb:ea:d7:c3:1b:3a:d4:4d:b3:1f:3d:
e6:fb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:7c:11:a3:03:fd:77:58:d3:e0:f6:e4:74:a5:44:e7:cf:fa:
17:4a:f2:ad:48:69:2e:0f:18:25:a3:ab:86:df:9b:15:e9:8f:
88:7b:ce:5e:00:6e:d6:00:2a:f9:0c:8d:aa:5f:fd:cc:59:d3:
9b:1d:3f:bb:53:ba:a6:bc:ec:14:18:34:f6:d4:d7:5c:bf:33:
13:4f:3c:43:0d:5c:90:e3:52:61:ee:fb:aa:df:7a:66:0c:91:
36:a3:98:05:28:e5:2d:e6:98:ff:88:65:2e:39:02:4a:03:ac:
1b:a0:fe:1b:41:15:a7:2f:9e:e2:a4:bf:c8:c7:36:43:66:4b:
47:74:8a:da:bb:47:eb:6e:2f:30:05:67:50:37:25:0a:7b:e4:
58:2d:7a:c2:3d:c1:ed:17:09:83:92:e9:b0:d1:74:3e:6c:c4:
56:7d:73:e6:21:45:79:f8:bd:d0:63:ee:0e:48:17:ce:d0:59:
4c:c8:eb:d6:79:08:9b:d2:c0:bc:57:87:87:16:52:e9:c7:b0:
74:d7:1f:a6:86:80:f1:fc:89:ee:b8:56:ea:8e:f0:be:10:de:
57:94:ea:08:68:04:d7:94:67:e0:6d:5d:ea:54:33:69:41:53:
f3:97:71:77:90:86:44:da:14:99:50:b6:52:83:fb:48:ca:63:
ff:1a:79:d4
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:55 2025 GMT
Not After : Jun 1 10:24:55 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
40:25:cc:0f:d0:f5:54:82:74:96:5e:8b:e3:7f:37:0a:be:24:
16:46:f9:c2:7b:95:9d:1f:32:67:7b:a7:93:aa:8a:1f:34:53:
2d:7d:db:48:eb:e8:9f:0a:77:84:41:49:65:a4:50:f8:cc:22:
1a:f5:69:fb:5f:f7:e6:66:65:9e:05:11:bb:57:9f:0e:e3:bf:
0b:b6:71:0e:ac:84:39:fc:bb:54:89:19:9e:af:81:fc:98:00:
a4:b2:1b:58:e1:8a:21:9d:0d:e0:14:45:42:9c:d3:b7:bd:3e:
83:f6:0d:fb:87:d2:9b:fd:ee:c8:25:1d:2b:2c:42:46:36:cb:
d7:fe:ed:2f:66:53:a2:e4:cd:13:3b:1f:62:2d:2b:f5:0d:96:
a0:0e:e2:d4:8b:40:61:55:3b:d0:55:6f:c4:59:4a:d6:48:9f:
c6:95:6e:0f:48:e7:7b:a2:a8:5f:99:98:7a:a0:c9:98:55:b6:
ed:e7:98:4f:f6:4c:18:4e:cc:1c:50:4f:00:8b:1a:3f:28:ad:
42:59:47:3b:95:15:c7:78:c4:01:54:f8:fa:97:bf:76:6d:d7:
18:f8:f5:a7:d5:0f:36:5c:5c:d1:3d:73:2a:5d:2d:05:98:52:
44:5b:fa:3e:d1:8c:1d:50:18:bb:4d:c5:45:f0:55:3e:1e:d8:
a6:f6:22:56
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
26,994,332 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:59:54 2025 GMT
Not After : Jun 30 10:59:54 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a4:9d:8f:ef:ae:bc:ca:45:79:a5:e2:19:98:93:
60:2b:f2:98:9e:d9:23:ce:48:84:a4:c2:4e:99:60:
94:63:01:ac:91:81:be:0b:92:0f:33:78:c3:c7:c4:
1d:ea:41:33:8a:5e:cc:aa:74:a7:6a:96:9f:e0:b6:
39:60:e9:1f:c0:f3:14:80:44:42:19:30:09:da:68:
31:63:0d:08:0c:86:e7:93:17:69:64:70:a6:cd:9b:
0d:5b:3b:4b:e7:aa:4b:97:41:b2:05:cd:c2:1d:45:
3c:04:fc:56:fa:13:da:ba:8f:33:e6:60:18:73:ff:
ae:9d:02:d1:2a:6b:8a:cf:07:c8:c8:51:12:e5:cc:
34:4f:d9:6c:d2:c1:5c:59:f9:48:ff:3f:f9:c4:63:
1e:c9:5f:4e:8a:c8:88:d4:4d:af:ee:ad:63:a3:c9:
e2:f4:06:27:5d:45:17:64:a0:4e:6d:e4:63:8e:ce:
18:fa:ce:ef:1a:fd:fe:2b:b0:f0:a8:63:3c:93:76:
29:19:90:9e:20:6b:a3:19:e6:c9:e6:8a:66:72:68:
89:15:28:29:e4:87:b2:dc:d2:d3:63:63:29:91:27:
ad:22:55:07:b7:96:1b:db:82:8e:e2:70:72:b1:bc:
56:05:a8:2a:ce:b2:f7:6d:21:04:62:59:03:f9:f6:
13:fd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
86:fb:1e:7c:f3:fb:f5:34:34:62:19:09:78:a4:99:02:91:a8:
e2:9b:7d:cf:81:52:5c:94:ca:a4:50:ef:c4:88:f8:53:51:da:
5a:a7:60:36:7e:97:c5:38:9e:a9:86:6f:1d:f9:15:e4:27:b7:
a3:53:6c:49:96:02:9c:5c:a5:5e:66:c2:28:bf:d1:3e:0a:73:
21:4c:ab:64:cf:e9:8b:74:ec:3c:77:b4:08:41:56:72:fb:ef:
c5:80:72:9d:1a:8b:d6:38:4e:c2:ac:0b:b4:18:fc:aa:f3:eb:
cc:02:9b:ff:08:cc:a8:17:0c:88:6e:69:e5:1a:73:3f:87:90:
ef:c6:a5:4d:80:3b:4e:9d:23:4a:78:e6:e7:2e:85:b5:19:ab:
3a:40:58:3e:47:52:40:eb:73:43:82:3a:72:9f:63:e4:2b:aa:
27:c1:be:b6:3b:0e:3f:5a:57:b5:57:fd:bf:31:a0:48:92:92:
e6:88:e8:05:89:1e:1c:f6:72:e8:0f:7b:be:5e:aa:c7:fd:7c:
7b:28:36:5c:4e:27:bd:fc:4e:c3:6e:c6:38:d4:ce:37:c0:22:
06:4d:ae:91:68:7c:16:5d:d3:90:b3:b8:56:14:ab:67:e9:80:
c2:b2:61:30:5b:7f:c3:a6:a0:d7:25:22:44:46:ef:97:6b:d9:
b1:b7:9a:35
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:59:54 2025 GMT
Not After : Jun 1 10:59:54 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3f:f5:bb:78:fd:b1:88:de:0c:01:5b:fb:78:18:c6:89:b7:ea:
1a:1e:71:0b:1b:8f:78:ed:7e:9b:02:e7:e4:8d:7d:c8:86:bc:
ea:51:32:08:17:88:1b:39:e6:95:1f:47:d6:33:e8:3e:75:b8:
0f:aa:00:71:7c:e2:0d:aa:f4:87:55:7c:d9:30:0a:cb:e6:d5:
8e:c3:11:5f:e8:5f:f3:b5:53:be:22:59:4a:46:0d:19:ea:e7:
56:fb:9b:16:c7:e0:39:08:71:2a:5e:be:01:1f:fc:7e:0d:91:
49:a3:c8:ac:32:b5:b4:98:d4:9b:07:bc:0f:14:cc:2f:43:2a:
98:e0:18:db:47:27:72:a3:d3:f9:6a:75:e4:d2:ba:04:e6:c3:
ae:3b:e4:c1:60:27:a2:77:dd:81:1c:93:56:47:71:c5:08:0f:
be:5f:23:b5:e1:c1:04:37:12:22:32:61:79:e7:01:1c:76:25:
f6:91:cb:f0:0b:4b:03:bb:bc:34:af:05:6f:d7:b5:03:0b:f3:
5b:d4:42:91:52:d2:11:6f:43:3a:45:74:e0:0c:e0:bf:c9:40:
9f:d6:aa:de:7e:dd:01:41:24:a6:a6:c4:9d:5f:73:2b:96:4e:
9e:5f:05:be:b9:70:77:3f:be:5a:f7:69:75:cb:a8:59:40:a1:
2d:ce:60:00
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
26,485,857 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:29:10 2025 GMT
Not After : Jun 30 13:29:10 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ab:85:f9:1c:8f:e8:c0:33:fc:d7:a1:ef:c8:ee:
26:be:6b:49:e5:f3:b7:f1:05:ed:71:5a:35:75:f1:
51:d0:b5:dc:23:53:95:d7:49:96:93:de:6f:50:1c:
82:08:ba:ae:b3:4d:3c:c0:19:ae:40:6e:cc:3d:49:
a7:53:f2:a9:b3:42:c5:ab:fc:2e:d2:f9:d6:9c:a7:
d9:ca:81:89:86:c1:d7:af:be:5d:0c:6f:68:9a:80:
9c:bb:c6:91:35:64:39:43:e4:a3:b3:7a:8c:49:9e:
11:9c:d4:ea:43:26:9e:fc:20:5a:d6:e7:1d:25:c1:
99:f3:11:ef:2e:85:99:c2:bb:33:1e:82:eb:9b:b6:
45:6b:12:3c:9b:95:a1:1f:db:e8:0f:d8:f1:18:06:
dd:01:f4:53:be:99:0c:78:59:03:40:8c:6c:e5:1f:
66:05:a0:a8:03:fa:66:67:8a:d4:f9:e1:53:ef:4f:
76:e8:8a:97:76:d6:9f:67:16:3d:56:05:45:b4:7e:
e2:8c:b5:2f:d2:52:d4:28:88:bd:86:7e:0c:df:9d:
f7:94:82:0d:63:04:e7:ef:56:8a:9d:a2:1e:18:3c:
50:22:91:52:a7:60:db:91:56:bd:ad:90:26:49:54:
11:69:c1:2b:53:27:5e:b0:fa:f4:8d:7b:2f:3b:7c:
08:f9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8b:d8:ad:4c:75:94:b6:c4:4b:19:b6:29:2f:9c:92:eb:d6:d5:
38:93:28:e0:2e:ba:93:07:1d:b1:7c:b2:ab:ea:83:54:f4:63:
76:3e:d8:6c:60:48:46:ac:2f:c0:55:81:d9:b5:3d:72:47:37:
b4:c7:f4:5f:a8:b5:ac:52:88:96:d6:ec:f4:6d:6a:6a:cc:c9:
9f:77:9a:e8:d7:e6:84:fa:30:92:22:0b:44:c9:ff:b8:cb:fb:
2c:89:21:2e:d7:f9:c7:5b:06:9f:c5:47:b2:71:39:1f:9c:df:
8b:54:5b:21:12:62:b6:a6:4c:bb:9c:0a:89:ca:d7:4a:1f:57:
b1:b3:e0:ed:8c:e7:c1:75:82:eb:a2:03:57:48:24:2b:22:fd:
99:4e:01:f6:bb:1e:b6:b2:ba:3a:0b:c2:22:09:38:88:33:45:
96:1d:72:0b:17:5e:06:ca:bb:7e:59:50:78:ec:cd:ad:65:61:
6b:78:8a:46:43:82:2b:3c:54:07:00:92:6e:d3:71:5d:72:db:
29:72:49:c7:b3:0c:22:17:3c:18:3f:a5:bd:7f:e3:c7:c2:fb:
03:78:5f:a1:23:b9:3f:a5:c5:21:af:00:39:ce:fd:0d:b5:58:
d6:9b:60:ac:56:2b:0b:1d:1d:2b:86:eb:2c:37:76:5f:55:2e:
96:da:b3:4c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:29:10 2025 GMT
Not After : Jun 1 13:29:10 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a0:ff:34:5a:eb:89:9d:fe:19:c5:e9:d5:57:5f:d1:f3:e6:88:
a6:fd:30:5b:b3:19:e5:8e:61:6a:a0:97:21:30:fb:fe:ba:1f:
6e:be:51:83:77:eb:b9:2d:12:f4:10:9a:65:f5:cc:9f:17:9b:
3e:a8:d6:bf:f9:92:7c:47:91:b5:34:2b:63:39:65:11:d3:54:
e3:6a:82:34:d9:2c:12:5a:8c:79:c2:6e:4c:d9:cc:d4:51:69:
95:f0:55:60:e1:2d:bd:0e:f5:85:e7:5e:03:3e:e5:ba:8d:56:
fb:87:85:ae:d3:f6:57:c9:fb:f7:12:e1:bb:71:82:b2:54:9e:
88:fe:87:36:a8:47:ef:10:57:bb:a1:5c:75:3a:2c:08:30:fe:
a2:09:15:2d:ac:ea:30:6e:b4:ec:2a:af:c3:f3:bf:f6:22:f3:
87:8d:88:80:80:cf:80:96:29:3a:7b:ef:ea:08:a6:78:0e:f5:
79:2e:c8:61:5f:d2:cb:f8:62:51:7b:e4:67:eb:ec:46:e1:30:
5c:fb:a0:0a:29:a4:ff:fb:fa:48:c4:dd:c1:ed:45:ef:ce:78:
24:36:c5:35:57:04:97:e6:ef:b3:ef:08:69:19:20:00:f5:ca:
93:fa:6b:75:e0:4e:bc:04:38:94:53:99:40:78:b7:58:ec:88:
ed:10:76:87
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
27,107,319 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:26:05 2025 GMT
Not After : Jun 30 14:26:05 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9d:0f:70:3b:96:8f:48:d4:84:73:fb:d8:e1:27:
2f:81:fa:4c:30:9e:6c:19:a0:b5:29:73:da:cb:ad:
2e:34:77:1b:87:5a:5b:6c:0b:ab:f1:22:6e:d7:17:
bd:d2:57:0c:79:82:43:24:3b:2e:ef:7b:83:96:c9:
6b:f4:79:8b:f0:9e:3d:fe:bf:eb:75:aa:e2:73:98:
79:cd:8d:26:9f:1f:b1:a1:f2:d0:00:e1:62:7d:83:
ed:04:66:71:a1:9c:48:93:24:ce:e1:7c:39:fe:30:
0d:15:bc:76:8d:1c:e2:47:3f:bd:c9:e6:73:d8:3c:
de:f9:2a:80:07:8e:ef:7c:da:97:61:6a:ab:86:67:
5a:2f:5f:ae:7c:ac:c2:ab:38:a9:57:9d:72:2c:29:
5c:d0:b8:62:c7:54:b6:a3:56:67:6c:c5:57:07:72:
ff:3d:a1:4a:87:ae:b2:40:a1:6d:0b:66:af:c8:90:
0b:86:a6:4a:c3:2c:96:e4:3e:f7:8d:c8:da:38:d3:
be:44:66:33:38:a9:64:b4:a4:20:0f:dd:0e:40:dd:
f7:d4:ea:2b:2b:8b:85:49:15:5e:25:d2:99:a2:8d:
23:f2:98:d3:22:16:b7:83:e4:28:e5:4e:6e:fb:c4:
46:de:8a:b5:07:39:d6:0e:2f:2f:33:c7:16:90:fb:
01:0d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
13:69:3d:34:96:49:a3:28:78:a3:e0:85:b5:8f:d1:df:c5:00:
72:9e:de:50:02:f1:2d:9b:4b:b4:4f:af:f3:59:6e:21:4f:bb:
7d:12:ca:96:26:d6:65:60:07:43:5d:cb:f1:ad:c1:02:e5:4c:
c9:a6:61:0b:b4:39:3b:80:9c:e1:b0:cd:ec:46:8e:f5:62:30:
b6:eb:b3:c0:1b:11:2b:c0:22:2f:c4:02:1f:b3:72:bf:f1:3e:
ac:17:90:3f:e4:25:62:c0:41:2b:bd:6f:ba:57:fd:8e:3c:8e:
4d:5a:72:4a:56:93:f7:e9:db:f9:51:cc:99:ed:61:38:9f:95:
42:60:66:36:53:20:b9:c6:18:16:90:1e:fa:2d:90:bc:e5:03:
2b:8a:e2:6e:70:a7:92:c8:80:b2:79:bc:9f:d3:62:9c:ad:ad:
37:68:90:b0:49:37:29:9c:d5:dd:e4:d9:51:71:13:9c:26:67:
12:2d:dc:58:7d:f2:dc:3b:2f:db:09:dd:ca:be:04:36:83:a1:
f0:8d:94:71:18:7a:af:e3:d6:7f:90:6a:bc:c0:59:f1:55:d5:
4c:e8:22:32:96:c0:1f:fb:f9:d5:7d:7e:b8:41:98:a7:1d:14:
78:1d:32:76:23:94:f6:f6:a1:c8:bc:15:ae:32:de:b3:70:c1:
6f:b4:18:a8
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:26:07 2025 GMT
Not After : Jun 1 14:26:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5b:37:89:2a:f2:e9:12:7f:7e:c9:c1:da:a3:59:4f:3b:8a:76:
a5:30:b0:b4:48:7a:82:5f:63:1e:84:40:71:b0:21:55:79:0f:
1a:82:3b:5d:10:31:c5:7a:e0:ac:e3:e0:21:bf:18:8c:eb:a8:
7b:3c:db:89:72:55:36:ce:31:6a:3d:9c:10:14:87:db:06:b7:
32:4a:1b:50:d4:68:32:75:a0:ee:fc:c7:46:b1:71:02:20:67:
db:58:6c:03:99:37:dc:b3:62:91:94:cf:ac:82:3a:cf:30:a2:
a0:b4:32:09:d0:d6:71:9a:f7:c1:1a:4c:b7:6e:a8:5a:a5:33:
93:fd:06:40:27:ee:0f:18:5a:32:04:c2:ac:36:7c:ed:f3:36:
aa:f1:b4:7a:c3:a3:27:a6:10:ff:d0:4d:ce:55:68:48:a7:cf:
30:23:72:52:f3:4e:f7:01:1d:7a:16:2a:c3:a3:51:00:1a:e8:
19:b5:dc:91:11:f4:00:6c:85:c8:ad:df:56:eb:43:c2:12:d4:
79:3e:cf:d1:af:bc:fa:cd:70:d0:8e:bd:31:42:ae:60:1b:57:
59:37:32:16:23:a4:ab:4e:74:2e:85:45:08:15:86:f1:09:d6:
ab:90:d0:51:79:4b:d9:9c:9d:ef:b2:01:5b:ff:d3:0b:eb:62:
16:34:a3:b6
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.68s
Truncated 3147 bytes from beginning
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mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:45:05 2025 GMT
Not After : Jun 30 11:45:05 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c2:43:82:f5:67:95:7b:97:42:24:b4:3d:10:ef:
12:4c:ce:5a:16:91:33:be:d4:74:c0:cb:49:5b:fa:
9d:00:c7:6f:1f:99:46:2d:b2:39:be:d8:ee:05:f1:
ee:be:e1:25:5d:0d:94:e3:6e:31:6f:ee:a2:b6:4a:
41:88:4d:27:c3:ba:b8:70:82:e6:f4:1c:b4:a6:70:
4c:1a:28:9a:b9:a3:62:9f:7b:f6:37:5a:84:52:24:
cd:73:58:7c:bb:cd:1d:ce:86:58:8a:a4:3b:2f:7a:
f2:76:ba:af:22:d8:f4:cd:8e:38:42:c9:83:6c:44:
f1:d8:88:91:63:c7:9c:fe:88:6c:46:ea:0a:0b:87:
cc:73:ed:df:e8:8b:db:af:41:23:82:95:53:44:48:
33:d3:69:ea:cc:3f:1c:41:71:f1:6f:1b:d3:f0:92:
37:23:08:31:37:bf:1e:dd:c5:a9:9b:08:5f:46:4b:
5c:3b:04:31:7d:6b:bc:ca:fd:bb:cc:df:9e:72:42:
b8:aa:49:38:a4:e8:a4:88:90:ae:14:be:5a:1e:24:
29:06:7a:df:62:d7:c5:88:a3:94:f4:49:2c:57:d8:
99:75:a8:c9:09:e6:85:22:31:06:ce:f6:76:1c:cf:
4b:d4:4e:89:f1:53:a9:6e:57:33:93:a0:cc:84:3a:
be:a9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
71:42:bd:09:c1:a0:f2:ba:c2:19:f1:a2:b2:cd:5f:89:b5:da:
82:b2:39:9c:2c:ac:68:dc:08:71:8e:5b:61:02:2e:86:31:1f:
b3:31:53:39:9d:13:b1:00:fd:25:58:46:45:f9:3b:3e:71:31:
1c:5d:c9:e6:fa:9e:4a:83:77:68:ec:67:7e:ad:23:ad:cd:08:
34:0f:b2:a8:72:66:0d:d8:75:43:71:42:1a:c1:03:39:07:21:
27:45:1e:17:01:80:01:f0:31:61:93:03:ec:02:83:24:20:9e:
3b:13:41:16:51:70:77:71:9b:90:4f:09:63:00:6f:9b:aa:dc:
04:b8:11:8b:5d:f4:da:3f:1c:0c:52:a8:7a:9a:ca:08:62:96:
60:fd:ba:e2:b2:ee:03:43:bb:08:fc:68:68:c4:13:d0:b7:be:
89:5d:20:2a:2b:f8:9e:5d:a2:d7:d8:56:78:d8:d6:fb:d7:27:
cd:a9:b9:8d:02:56:5e:0f:f2:c5:bc:42:e4:76:ac:40:68:d9:
8a:e4:8a:51:6b:67:06:52:ca:59:21:3a:28:a6:5c:9c:90:4e:
2f:7f:d2:10:0f:f4:12:e3:07:ed:1f:3b:d4:d6:8d:82:e4:8d:
13:3a:8e:e1:29:1d:8a:24:2d:48:e1:68:54:c5:26:56:11:2f:
3a:3e:84:12
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:45:06 2025 GMT
Not After : Jun 1 11:45:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
c0:95:a3:40:0b:8a:a7:e6:5c:97:88:fc:72:e6:16:8a:27:57:
dd:a5:74:5b:7c:d2:12:09:4b:78:b9:f5:69:4c:b5:92:a3:57:
9f:26:b9:f5:65:67:be:c9:2e:44:eb:4b:f5:ac:2c:b1:31:6e:
16:93:6a:57:63:45:f6:c7:0d:94:d8:3b:9b:34:87:a1:34:b9:
95:e2:43:80:20:92:dd:91:42:f7:bc:95:c5:bc:20:47:06:6d:
b7:1c:b5:44:ae:9b:e1:d2:24:70:46:fc:7f:41:6d:c3:7e:c5:
3b:2b:fa:3f:7a:c1:7b:e2:54:03:b9:b1:4d:f4:9a:fc:4f:b8:
b1:2e:08:90:1c:5f:c9:f5:95:8e:1b:c5:ed:46:c8:8c:2e:97:
c9:a7:17:ff:2b:f4:84:6e:00:a8:9a:d8:15:72:f7:71:48:a9:
6b:ca:67:0c:74:b0:9c:d2:83:f7:3b:bc:50:f4:c1:8f:bb:23:
cb:6f:10:6d:7b:dd:07:39:c8:7a:f6:58:4e:2e:fe:54:23:56:
cb:95:0d:00:68:53:c4:79:f5:56:04:be:b3:11:b2:06:fb:83:
4f:97:f0:d6:72:0a:5b:82:23:3c:07:f3:a8:0b:28:ef:f8:80:
bf:78:38:e9:d4:1e:a1:b9:29:7f:76:64:e5:18:de:2d:f3:cf:
1f:dc:39:db
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,723,830 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:10:16 2025 GMT
Not After : Jun 30 14:10:16 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c0:05:c2:45:88:91:14:bb:04:36:32:d2:ed:91:
0f:a3:d8:66:32:0b:0f:8c:e8:36:46:21:23:3f:0c:
76:80:4f:18:2f:34:90:76:ba:0c:4d:8e:e5:56:7f:
43:d0:5f:d5:b5:49:2f:8c:87:11:49:b6:39:80:ff:
f2:49:d1:6d:3c:6a:e2:e0:59:57:ec:86:46:c4:27:
f3:da:12:60:d4:8d:ed:2a:2e:c8:f1:f4:32:25:22:
3f:f6:9d:4c:05:91:c1:6b:a3:7d:1a:b4:28:c5:98:
ec:6d:1c:83:c9:c7:60:20:2a:a9:b2:90:b0:c9:7e:
8b:eb:83:dc:8a:ae:37:e4:2e:89:9f:29:05:fb:ca:
9e:b7:fb:dc:4a:18:06:b6:40:ec:53:e0:9a:ec:fc:
9b:5c:7d:55:3a:7e:c9:be:f5:2d:00:83:36:9a:c9:
e9:71:3b:0c:50:7b:3b:06:8f:64:0d:68:33:6a:2e:
c0:8d:c9:8f:9f:15:21:45:89:6b:db:fb:da:46:41:
2d:d5:29:48:1d:5b:9d:86:b5:55:e5:be:50:ec:c2:
f7:ff:18:71:9d:78:9d:fa:51:f3:06:d7:52:8c:38:
73:f9:64:a7:b3:9d:de:ac:f9:31:47:44:85:cf:f5:
7c:9b:13:2c:4b:34:6d:5e:62:2e:a1:87:10:31:68:
0b:a5
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1c:f8:36:3f:ba:dd:a4:7d:a5:ee:c9:ee:e7:f4:3d:48:23:93:
57:1b:3e:76:e5:d6:98:3c:76:5a:6b:f1:a7:e0:c1:f1:79:1d:
25:94:6a:27:ba:8c:a3:e9:92:a5:87:c2:59:4e:0b:36:02:0f:
61:de:e0:ee:aa:f5:33:41:11:a3:e2:12:b3:73:e0:2b:3a:8f:
01:59:6f:fe:b5:54:3c:5f:a4:77:6c:b6:d4:1a:43:dc:91:1f:
26:d0:04:e0:33:a0:ed:f2:77:8f:11:85:0e:2e:3b:75:0a:b1:
4f:d5:6d:f6:4b:53:8a:a5:78:74:49:71:64:c2:16:44:69:29:
8d:28:b8:25:8f:9b:4e:4c:90:6c:1f:a4:53:f9:76:11:43:cf:
d7:88:2f:ae:46:02:f0:2f:10:51:cd:f5:fe:60:2d:0e:48:18:
91:27:f0:11:81:18:be:ed:b1:aa:2b:11:1a:a2:d8:c4:f6:38:
12:29:c6:4b:0b:a0:bb:46:36:3f:dc:06:8a:bc:fc:47:9a:04:
1a:b1:bb:3d:6b:2f:49:8a:9c:2d:be:b8:0c:d5:22:d1:94:c6:
9c:a6:e1:e3:66:0a:e2:96:47:f3:c5:5e:d2:72:a3:ec:67:7b:
d3:91:ec:ae:e3:22:99:9b:0c:fc:2e:00:b7:a7:6b:27:71:04:
b7:c4:1f:95
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:10:17 2025 GMT
Not After : Jun 1 14:10:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1e:28:f7:ed:1e:42:32:bc:86:eb:f0:47:75:ef:0a:82:6f:23:
c2:29:7a:5d:ce:76:f7:36:37:9f:cd:ab:f3:bb:57:67:51:3a:
0e:9f:60:b4:0c:56:be:89:f0:36:86:28:ff:70:6e:1e:1c:54:
39:09:c8:b8:f3:c4:d5:6b:af:a3:a2:56:a6:e0:2c:41:1b:4a:
e1:9c:d7:31:dd:10:fe:0d:fc:bf:93:df:ac:00:67:0d:c3:56:
57:c4:d0:80:ad:69:b3:94:20:46:3d:67:f8:f0:5d:18:01:5d:
97:71:04:7d:5c:5e:fb:9f:23:0f:53:2a:06:8d:43:47:77:86:
48:b3:74:e4:e9:69:aa:0e:78:3d:0f:76:c1:2b:01:a0:f2:3a:
da:94:a7:b0:a1:91:5e:f8:bc:ea:6d:ed:5a:bf:8a:01:41:a5:
52:98:bf:23:75:41:84:11:08:86:68:34:1c:22:68:82:27:cc:
95:a4:c5:8c:79:29:be:d0:7a:eb:f0:e5:78:99:31:0b:ca:a0:
95:56:9f:04:0a:b1:fe:3e:ee:6d:06:47:46:0c:4e:84:cb:81:
4a:44:12:13:62:c4:8f:f2:8a:b4:1c:55:9b:f2:b8:36:72:5f:
23:2c:d8:7a:f6:c7:14:8a:de:a8:95:bc:b3:67:86:31:5b:03:
1f:51:3e:23
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,202,364 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:51:56 2025 GMT
Not After : Jun 30 10:51:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:8a:be:23:c2:35:e9:b2:5f:2d:b2:32:66:3b:17:
98:fc:ff:be:9e:31:c0:1b:d0:47:14:1a:3e:33:87:
1d:08:bb:e8:63:9b:64:1c:25:87:da:21:39:2b:c1:
18:90:03:4f:2d:fb:ad:23:85:a8:65:ab:6c:e5:88:
5a:0b:fc:bf:88:97:fb:99:8e:34:2a:08:55:3e:05:
ca:a0:74:d5:1a:5a:f6:30:6c:7b:e2:c7:6f:4f:cd:
b8:9e:75:c5:c1:5f:94:d3:1d:d4:d8:b7:c5:a1:bc:
9e:f2:e6:8a:1b:9b:e4:85:a8:65:37:bd:90:34:c9:
bc:b1:26:5f:77:81:db:16:6e:88:a0:9f:d9:95:b2:
26:5f:b8:3e:11:0f:3e:2d:66:7f:c6:18:3d:04:c2:
4c:11:57:62:10:67:3f:93:a9:d8:aa:7d:25:54:bc:
59:c9:d3:fc:0d:13:12:8f:59:11:b7:65:64:51:dd:
b7:4e:d3:16:16:ae:92:32:68:74:a9:48:00:a0:1e:
48:6d:08:70:34:37:d3:20:7e:45:c7:20:58:26:96:
0d:7e:e1:25:1e:c0:64:9d:ed:ff:41:80:7e:3e:eb:
fb:45:08:dd:0f:f5:f4:14:1d:dc:d5:87:ad:9c:17:
7c:c1:b9:85:64:17:b5:41:9b:d6:a4:cd:8d:31:84:
cb:49
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
38:14:6b:1b:93:3b:30:bb:ae:1a:1a:00:69:57:25:a9:1e:58:
75:84:0d:93:4c:f6:40:86:e9:59:87:13:d5:68:c1:ee:57:a5:
2d:29:4c:82:77:8c:1a:8e:df:3d:67:d5:34:41:f5:f6:44:a4:
f2:a0:56:ba:8f:e2:a4:90:18:03:27:6e:95:52:21:96:58:06:
3c:e4:1f:cc:df:e7:bd:53:90:82:70:52:e3:47:f1:ef:30:fe:
a8:d2:e4:ba:7a:c9:c5:32:69:16:bc:88:4f:43:53:6b:1b:7d:
c8:e1:ad:c0:99:58:e1:49:60:b2:13:e4:c8:fe:aa:7c:fe:fa:
17:44:3f:59:25:2f:88:b1:3a:19:94:85:c6:d4:e8:86:8f:27:
36:d9:05:af:3e:70:b6:f8:d0:05:70:32:8c:6b:f1:72:91:91:
e4:cc:9b:88:97:0f:8a:28:63:1d:76:50:02:bb:4d:53:74:c9:
5e:65:06:0f:df:65:7f:17:c6:42:e9:4d:91:03:bb:8c:db:7c:
f6:75:fe:57:ae:8e:30:fe:9e:85:7e:d1:60:62:be:79:91:6a:
e2:47:a5:6d:b3:91:21:a4:30:d4:b4:e0:7f:82:ce:b6:dc:58:
99:97:58:4e:3d:d8:14:b9:78:b4:87:18:55:f6:32:d7:52:ef:
33:b9:cf:23
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:51:57 2025 GMT
Not After : Jun 1 10:51:57 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:32:b6:ed:92:99:f1:ff:21:e7:42:00:62:c9:72:e4:26:7e:
c1:e8:2b:54:d7:a4:aa:9d:c9:9c:55:4b:63:05:ce:18:e3:dd:
59:30:c0:55:1f:1c:64:53:e8:2c:28:72:cb:42:5e:a0:be:c2:
e5:5f:56:3c:84:76:ae:95:e9:74:a3:14:b9:59:dc:d7:38:ac:
57:08:1c:18:b9:ee:ea:73:3b:01:73:d8:79:98:f6:15:de:23:
13:a9:9b:eb:bc:c3:93:a5:6c:ac:60:2d:ca:94:3b:71:35:13:
2e:e0:cb:ce:8e:9d:11:3b:17:49:8e:0f:69:64:08:ea:25:cc:
c8:a2:4b:4e:f1:38:c2:54:8b:5f:d8:79:3b:02:4b:81:3a:c1:
d6:f6:e6:d0:9d:0c:9e:b1:9d:44:90:50:ee:6c:ac:6f:8f:5d:
17:a6:17:49:0e:88:88:74:ca:d8:0b:27:11:3f:c0:ec:36:03:
e5:99:77:71:46:13:92:b5:04:f5:00:64:9e:25:57:be:53:1e:
11:6e:c5:2f:c8:b7:42:06:37:ea:be:91:fd:18:29:b7:0b:a1:
4f:95:f8:34:14:2a:65:88:44:ec:52:31:64:84:47:90:65:76:
a3:b8:78:7a:79:be:ff:41:24:1b:12:e1:95:03:82:53:f0:21:
76:10:be:57
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,904,107 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:56:08 2025 GMT
Not After : Jun 30 14:56:08 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9a:05:7a:fd:11:48:51:da:97:d7:af:bc:37:d6:
3d:77:00:4c:ca:30:bf:b2:c3:24:f7:ad:d4:e7:5a:
8a:d9:f9:6e:04:eb:af:3c:a8:71:f5:da:f6:03:31:
ed:44:41:f3:4f:32:1f:f4:98:8e:05:59:88:b0:ba:
3b:3b:9c:9a:b9:0d:94:91:56:77:fb:fe:c5:4f:a2:
ca:9a:a4:f8:ca:a5:a8:b1:28:1b:65:8d:25:3a:8c:
ef:84:c0:8d:e7:53:6f:2f:d9:af:d7:fe:a2:49:bd:
05:bc:60:51:41:d8:82:fd:15:67:08:73:03:04:ea:
31:45:7c:9f:19:ad:91:fb:76:fe:da:c5:5f:24:97:
c1:fb:a4:ba:71:1c:4d:97:54:4e:14:d4:3e:34:99:
2d:60:e3:b5:65:23:df:66:ad:c3:c8:57:6a:40:01:
07:94:b0:9a:c5:85:74:8a:b1:43:a9:f2:ee:4e:14:
e7:c4:d3:d8:a0:11:67:e7:9c:66:f1:2c:cd:86:78:
e9:a9:48:37:be:ac:c4:75:1b:40:a1:48:4a:29:56:
78:93:5b:a0:d8:29:88:19:36:37:96:1d:8c:c7:5f:
15:80:f9:b9:25:c3:67:7b:32:0f:89:50:64:69:f5:
39:ea:d1:34:3f:82:28:48:e5:b7:3e:86:f3:45:cf:
fb:77
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8b:bb:03:08:c7:97:51:c6:4a:7e:98:ab:5c:9c:34:c6:41:fb:
30:96:8c:c4:dd:c5:06:d5:2a:1c:f8:cc:a6:7a:40:e7:b8:47:
d8:73:08:ff:f3:37:a8:59:4d:32:db:16:56:f8:6c:b2:97:00:
46:df:2e:a7:2a:04:ea:6e:79:8c:41:3b:00:6b:b7:8a:35:9a:
f4:4a:56:54:bc:12:4b:36:f2:db:58:8c:38:9e:0e:13:bf:d3:
a8:55:fe:22:44:07:83:d1:45:e8:d4:74:99:33:59:bd:44:1c:
b0:94:f9:c3:d9:79:64:18:a9:d0:dc:ae:d6:59:cc:bc:36:3c:
d1:84:88:c8:05:23:98:55:5d:9a:e1:69:b0:b7:05:9f:b6:75:
d7:c4:a4:5c:2b:58:72:54:f7:8c:8b:8e:13:9f:f3:a9:93:67:
8b:ea:c2:46:de:3f:bc:67:85:3b:34:5d:94:01:62:7d:61:c1:
f5:b5:25:82:ad:26:fe:c5:5e:00:f2:f1:fa:b3:b2:c2:8d:a7:
02:1d:f1:33:1a:cc:4f:bd:d4:37:ba:18:e1:05:df:c1:e2:45:
9a:e7:3e:3b:37:6b:87:26:90:26:32:dc:d2:19:22:06:b0:ea:
33:ec:99:97:2f:7c:16:3f:a6:dc:2e:bf:f1:6b:65:02:be:ba:
18:1d:33:3c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 14:56:08 2025 GMT
Not After : Jun 1 14:56:08 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
19:b6:76:bc:45:b9:0d:f6:68:71:16:f8:18:23:df:86:6d:86:
af:1c:a7:1b:63:15:0d:2f:59:1c:19:84:ea:33:d2:f3:fa:4e:
37:1e:e8:73:d3:71:05:49:51:34:72:39:64:c1:43:e2:d7:15:
b9:ed:af:0f:b4:ce:d0:a1:8e:1d:67:d9:e8:e0:6b:66:fa:be:
2e:fa:fe:e7:5b:be:c0:25:72:9b:17:79:73:5c:b0:6c:27:df:
cb:5e:fd:ba:92:ea:10:4d:d2:c9:99:d3:ba:05:ef:bc:c6:3e:
68:bf:2a:8e:83:04:15:32:e3:8a:11:9b:ce:30:53:f9:ee:6c:
24:25:86:dc:04:dd:28:a1:40:91:95:0a:78:64:66:b0:b9:09:
e9:67:61:86:a1:cf:bd:19:02:a2:39:2f:34:7f:dc:8b:9d:05:
e6:e9:46:6e:e7:e6:0a:15:39:2a:21:07:02:4d:6e:40:ce:81:
89:26:d5:d7:88:0d:79:2b:6b:1e:0d:4b:6c:82:dc:61:70:83:
08:ec:3e:60:10:57:1c:c7:3b:7c:d4:5a:0f:38:71:88:65:97:
26:67:c7:11:ff:0f:ea:d1:25:71:aa:aa:86:08:e8:f3:85:b3:
ca:7b:21:0d:06:9e:4c:79:34:10:5f:9c:7d:bd:27:ef:96:85:
03:bf:f0:db
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,418,026 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 15:15:41 2025 GMT
Not After : Jun 30 15:15:41 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:99:31:a3:bb:3d:f7:95:73:4b:a3:bc:37:08:63:
8d:da:a2:d6:c4:e6:70:97:a9:2f:ce:6a:27:b0:2e:
a7:57:91:2d:23:8d:de:11:0d:a1:b1:8d:25:25:34:
59:fe:b6:ac:af:dd:62:0b:4d:80:64:10:c2:ec:b8:
0a:87:9d:90:a3:a4:4e:4c:0a:26:c2:73:13:a3:d2:
a1:42:c7:c9:be:98:e9:d6:da:16:84:df:ba:89:95:
08:bf:02:45:61:82:50:c1:2c:e3:c9:88:b0:ad:20:
03:57:51:da:3e:aa:57:31:a9:ff:ff:90:73:9e:ea:
13:b5:3c:b4:96:95:b5:09:e1:6d:f2:b9:fe:2f:24:
4a:86:1a:cc:cc:d9:c0:36:2d:32:a0:12:51:fa:c8:
d0:64:ff:98:41:d8:b6:9d:fa:ec:c2:dd:72:90:6b:
a5:e1:e0:cf:7b:bc:7f:1f:97:ec:c7:eb:84:0a:b9:
ce:f6:17:ed:b1:b7:67:62:1a:b4:9b:a5:be:1e:b1:
3a:f6:25:61:6c:9b:c8:f6:de:b1:72:a1:e9:4b:23:
14:bf:43:e8:da:ea:bd:e0:d6:c4:03:1f:bb:78:dd:
b2:5b:6f:3d:8d:67:99:fc:8d:0a:0a:02:75:25:27:
aa:fd:06:89:c3:a2:b9:a7:b4:d3:b9:e0:70:4b:13:
e2:49
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
95:e8:d5:0b:46:1b:02:18:13:f1:ff:20:e5:99:ff:83:42:12:
27:28:c8:4f:17:02:4b:f0:ce:13:8f:50:7a:f6:f9:cb:31:75:
be:d4:4d:ab:a9:ef:48:8f:e7:60:1c:fe:11:f3:53:d2:97:28:
0c:00:12:40:d9:91:0d:9b:49:b9:4e:05:1a:36:d0:0f:8c:8e:
54:c1:1f:fe:52:63:db:89:d6:00:d6:24:42:1a:ef:47:5d:92:
a6:2a:17:3a:83:b3:17:8c:1b:9c:a9:3e:9f:6e:06:61:63:e8:
c7:1b:0b:de:4f:b0:1b:05:7f:d5:13:e0:4c:42:ae:96:c9:cd:
da:6b:69:8f:43:95:fe:c1:6e:4d:e2:3b:96:12:ea:0f:03:e5:
12:dc:1c:2e:97:2c:5f:27:c9:5a:6b:6f:cf:9b:b1:98:42:11:
2a:5c:7f:aa:0e:92:20:88:dc:d9:f7:08:6c:0f:1b:b7:79:b4:
6f:8b:48:bf:2c:ea:a7:43:f3:4c:6b:9d:fd:ba:9d:99:b2:eb:
c7:c7:8f:af:b1:e9:db:a0:ee:31:25:4a:c3:93:8f:f4:b6:d2:
7c:08:72:c0:85:73:48:a7:15:8a:da:18:7f:5e:34:5b:eb:dc:
f4:19:49:6f:3a:aa:48:90:52:54:22:88:31:1e:9b:c3:a0:63:
ed:36:cf:39
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 15:15:41 2025 GMT
Not After : Jun 1 15:15:41 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
41:59:3c:35:9a:0a:51:83:57:a2:9e:c7:de:36:09:06:ad:80:
49:4b:d3:9b:19:02:b8:2c:7d:bf:b7:5b:dd:05:82:4a:28:11:
9e:67:22:07:fc:bb:4a:29:e9:f5:af:64:4d:cf:ba:6b:be:c2:
2d:9a:22:e8:98:05:88:0a:d4:b3:66:ce:0a:9f:67:c2:54:81:
5b:45:da:40:df:5a:71:d8:07:2d:62:cc:4b:3f:de:71:68:1e:
f4:5f:fc:ca:6e:40:ef:8c:09:3b:49:00:cf:a3:80:1e:25:10:
db:59:00:3e:2b:61:f2:ca:b1:a9:23:03:ce:8b:ba:a5:92:4c:
a0:cb:ab:f8:a0:a7:10:e8:5b:f8:ba:54:44:9b:4a:cd:c1:73:
3d:48:16:c2:4f:a3:c3:cc:53:5b:00:75:f2:55:f1:c9:6c:07:
ae:d7:3f:06:e0:68:01:e6:f3:97:01:da:3d:72:c1:be:ae:60:
fe:98:79:33:ad:df:c3:b3:22:4e:2f:83:8a:83:64:66:3e:9b:
fa:2b:40:91:85:9e:05:cd:c8:de:0c:bf:86:f5:e3:bf:9c:57:
68:49:b7:20:c4:6c:fd:85:3e:90:7d:78:3c:13:1f:49:9d:c9:
96:f3:c9:e2:06:75:39:69:b4:5b:c1:80:36:d3:03:b3:89:2a:
38:13:f1:11
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,715,608 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:50:30 2025 GMT
Not After : Jun 30 11:50:30 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:7f:8c:2e:13:42:1f:98:64:1f:3a:1e:18:28:
65:a1:53:98:9c:8f:40:b8:a1:e0:8c:d9:0a:b7:95:
9e:46:21:bf:06:4b:5a:cb:55:06:c3:5d:4d:0e:d8:
96:ba:8b:38:ce:f1:26:90:d4:37:f0:de:45:8f:04:
7f:25:1c:29:e8:6e:d8:47:2a:53:03:e6:af:29:3a:
9d:a0:4c:cf:e6:1e:d7:4b:df:39:34:07:2b:8d:50:
cd:d9:71:73:41:8f:c4:98:a9:6f:1b:2b:4f:ca:a8:
f4:c6:30:25:ea:d9:a5:f3:62:bd:9e:63:22:83:2d:
c0:ed:e9:e7:ea:36:eb:23:65:17:ba:43:46:59:9d:
c0:4e:e6:c4:b5:66:8f:c8:b8:1a:b6:4c:e3:76:4d:
29:23:84:f7:03:7a:b7:7b:88:a0:ba:fc:f7:0b:07:
5a:2f:7b:77:66:f2:aa:8e:4f:da:31:2d:92:4c:2e:
00:08:11:26:df:f8:ee:df:c6:75:bf:9d:87:b2:a6:
79:58:07:d1:ff:e5:21:95:bf:37:24:df:1b:51:66:
50:ed:be:89:55:11:67:5b:54:a6:a0:69:49:6c:44:
00:69:22:06:36:75:80:25:4c:e2:8d:b6:05:de:f2:
ff:cd:44:40:bf:54:71:df:73:75:c2:c1:44:df:26:
f4:2d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
52:5b:21:7b:7f:72:16:b6:79:7f:84:e6:57:86:8d:be:ad:63:
e7:fd:5f:83:39:da:8c:09:39:57:91:0b:cf:36:b0:11:14:e3:
81:7b:70:3c:87:b7:1e:67:83:36:de:05:f9:9d:1a:f4:57:b8:
07:55:57:98:f1:96:c6:87:18:16:66:19:41:76:bf:a8:3b:3f:
26:1a:62:78:ec:3a:f8:e5:0d:29:c7:18:e5:1c:1b:3d:81:45:
30:e9:47:28:68:55:57:5a:4a:13:2f:45:f1:5e:dc:15:47:6e:
55:27:ec:c4:b4:dd:dc:34:0d:f0:c7:cf:6b:3f:50:5e:2f:66:
5c:34:fb:81:ed:8b:94:b3:23:2e:47:0e:56:da:5c:f3:3c:97:
ac:c7:ca:98:ee:7b:95:ee:a2:ca:c3:16:fe:bf:df:bb:58:b4:
ab:7f:16:ad:32:0c:a3:ab:e4:d5:f2:2d:64:66:6f:9e:0a:ff:
62:d1:69:d6:1f:7f:b7:b0:1e:7e:58:13:da:3f:a5:4d:23:d6:
d9:23:df:08:ce:a9:59:2d:54:65:c3:ee:b1:0b:07:d7:bb:4e:
64:1c:f1:f8:d5:6a:95:19:e7:e8:33:99:85:64:44:3b:07:66:
94:06:10:ac:97:6b:9c:06:49:c0:a8:47:da:6c:f3:f3:3b:47:
77:58:77:1e
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 11:50:31 2025 GMT
Not After : Jun 1 11:50:31 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9a:8c:a2:e4:15:9b:09:51:f2:bc:00:5f:e3:f0:96:ec:4e:f7:
e9:33:0b:af:e5:5b:cb:20:89:14:c4:c3:d8:c5:c0:1e:70:f4:
98:e5:2a:92:5d:b4:0e:f1:66:ee:62:69:29:90:85:e7:75:df:
98:a3:ef:93:c1:2b:03:23:36:1b:88:cb:49:c1:39:18:58:2e:
5a:c2:9e:1b:15:43:04:74:c9:67:87:a7:e2:fa:4e:7d:dc:a8:
90:93:69:5e:9d:61:f6:26:c7:d0:a0:c0:70:bb:76:cf:49:9a:
95:05:cc:09:49:a7:01:92:6f:4c:ec:0c:59:01:d7:d4:09:e4:
5b:d9:9e:32:45:00:01:90:eb:42:4d:f9:76:8c:ab:42:48:55:
12:e8:80:bb:b2:ad:f7:f8:04:21:e0:a1:fc:2f:e6:e2:1e:f1:
f7:88:c1:72:4e:5a:92:b4:ac:16:e9:30:7e:a2:d3:f3:a7:0e:
34:0e:0a:06:f6:0e:d5:47:4e:e0:9f:67:8d:e3:d0:65:1a:3a:
04:9b:8a:ba:14:c0:83:f4:2e:09:03:fc:70:6f:8c:b7:93:67:
3a:14:46:9d:3f:01:e2:d0:9c:c1:c7:f9:c7:fb:52:2c:d1:33:
76:d4:9e:da:18:f9:8c:67:9f:49:b9:3a:8c:ac:e5:86:f5:38:
78:cb:e4:0f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
Truncated 3147 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,242,458 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:24:06 2025 GMT
Not After : Jun 30 13:24:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b0:e3:3a:47:a9:c7:95:3e:a0:83:0e:4a:15:4a:
66:fb:98:7e:aa:1a:a5:55:f9:ba:3a:75:da:97:01:
51:73:56:33:c0:45:0d:54:c8:3f:f9:da:8d:98:27:
6c:df:ec:4c:69:11:df:60:ab:9f:91:62:0e:68:7f:
8b:80:f1:0e:31:15:64:a4:bd:37:f1:16:07:e4:a6:
8e:f1:94:d6:6e:67:ce:0a:b1:85:4b:f1:b4:b7:08:
2b:ac:dd:0d:53:2c:d0:71:75:fe:fc:b7:28:30:cb:
19:e1:da:99:59:6d:d6:59:3a:14:6c:0c:9f:5f:ba:
be:0b:f3:0d:b3:b5:09:3d:71:f7:6f:82:89:f4:39:
a8:16:83:cf:66:39:0a:9b:2f:b1:fd:f8:c6:49:af:
3f:6b:0c:9d:ae:6e:6f:ed:23:51:b2:23:eb:3a:e2:
e4:dc:24:d7:1c:8e:9f:16:e2:34:d0:a2:a3:3c:1c:
58:7f:48:82:4f:71:ac:a3:8d:75:66:b5:0c:82:f4:
69:6b:20:bf:73:07:37:5c:59:a7:81:49:b5:d3:2b:
80:de:3b:e3:ec:86:96:6a:9c:9a:65:b4:84:7a:37:
87:bd:55:a5:39:c6:aa:d2:1a:97:b3:78:46:d5:79:
0a:d2:58:b6:d4:33:66:4c:99:93:ac:bd:bd:7b:d9:
2d:99
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8b:f8:58:f8:10:b1:4d:38:3a:e8:b1:e0:d3:bf:0f:e1:be:2a:
76:03:88:d7:e8:c3:9c:f8:ab:b1:44:b7:61:55:b9:0b:12:2d:
c7:80:e6:67:0b:28:77:92:a0:ee:a3:9e:de:fa:a6:90:7e:19:
5f:bc:c3:21:fc:46:ce:8a:1b:dc:17:4f:01:ed:12:8e:4f:12:
c0:ed:b0:cb:04:c2:b8:16:2e:82:3a:05:65:b2:95:a9:88:cd:
3c:82:24:67:08:42:75:31:39:ca:d6:14:97:c4:5a:32:37:60:
74:0c:af:71:8b:dc:55:d1:ca:67:a8:b6:c7:d9:cf:9a:67:1e:
55:38:ea:5b:c1:05:39:dd:5b:dc:fd:99:12:82:ef:04:1a:38:
37:32:04:3a:31:4b:de:2d:d2:ed:64:99:ac:18:ab:7d:20:08:
21:6d:e2:e6:3b:e5:36:ae:79:4b:38:ab:f7:f8:3b:98:f3:cd:
72:ed:9e:17:9a:6c:06:cd:29:3f:6d:a8:0c:19:db:21:e8:35:
cb:d8:85:10:79:29:b9:dd:e1:ad:3d:31:f0:9a:19:d8:35:5e:
a8:ca:be:3e:54:8a:db:4a:f7:a9:13:6b:e6:52:30:36:41:92:
90:a0:58:24:05:cd:68:6f:3e:b2:ea:88:50:68:9e:2c:b3:21:
78:08:18:37
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 13:24:06 2025 GMT
Not After : Jun 1 13:24:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:40:7a:ec:de:1d:78:e1:80:eb:c5:2f:6b:ca:31:e3:5d:3b:
71:4b:38:5d:57:d2:43:06:46:ec:d9:a9:74:6b:2f:22:f0:bc:
ca:7b:c7:1d:19:94:c4:ad:41:8f:56:aa:f6:8f:78:dd:2f:2b:
9c:6c:00:2a:a4:d7:39:05:a3:f4:6a:da:a8:02:ff:65:cb:79:
8b:b9:7e:00:ca:d9:d2:0b:b7:90:55:bc:f3:de:5f:71:de:a9:
75:6a:ac:20:fd:c9:73:79:3e:63:c3:ba:9f:cb:cb:ff:c3:3f:
dd:a2:d0:7e:29:41:1e:ce:7e:08:07:bd:4e:c5:34:f5:3f:96:
51:0a:3a:12:7f:fd:cf:b7:f5:f6:d3:b9:6b:6c:d2:54:17:09:
4f:c6:55:06:81:63:57:10:fa:77:31:0f:93:81:85:fd:b5:9a:
bb:80:e7:62:53:00:f9:5d:42:ab:fa:4e:69:e5:08:02:c5:bc:
b6:ce:78:e5:30:6c:a4:21:9d:bf:5f:b9:7b:b2:7c:ab:4e:94:
60:2b:7f:00:15:d2:91:fd:2d:75:0d:16:fd:d1:bb:29:40:3e:
17:b1:e2:53:74:98:bd:1f:5a:3e:5d:6a:3f:e7:00:1b:9c:b4:
80:a4:42:2d:f7:3b:f8:c4:e2:2c:86:98:5a:aa:ae:e2:fd:01:
a0:d1:28:63
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
Truncated 8023 bytes from beginning
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
* TESTCASE PASSED
20,916,046 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:37:05 2025 GMT
Not After : Jun 30 12:37:05 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9e:bf:4a:11:24:fb:2d:ec:d0:fe:ed:33:19:e5:
58:b0:72:dc:be:12:23:21:9e:51:d3:39:bb:b7:d5:
d2:ea:b6:90:32:85:e1:f0:65:86:f9:64:98:a2:2c:
01:fe:9e:09:72:6d:92:f9:0b:43:48:0d:24:6f:26:
a1:74:6c:85:7d:be:fa:0b:7f:a7:b6:26:8e:25:78:
2c:5a:f8:91:36:f1:0f:f8:06:d1:96:9c:d8:8a:7b:
e0:15:51:72:8f:1a:99:2e:35:4b:3c:5c:42:61:59:
d2:ad:b2:04:91:d7:0d:9d:40:3b:63:43:43:12:97:
36:49:1c:f1:19:a0:d9:4b:86:f5:6a:70:af:46:87:
51:e9:59:c2:51:7c:51:b3:3e:7f:16:f9:bc:0d:f4:
af:f8:ee:ec:d1:20:80:d7:cb:5c:5a:9c:47:1e:a2:
f7:dc:2e:5d:9f:3f:99:80:1a:23:15:8e:6f:4e:1f:
27:c0:96:56:6d:52:2c:f5:a3:9c:4e:3d:6c:2b:a6:
52:f9:19:62:a3:f1:38:67:6a:ef:a9:0a:26:42:dc:
5d:99:58:b1:7c:68:25:dd:a0:17:13:0f:f0:f3:df:
ae:69:ca:51:84:e8:1e:b9:35:fa:7a:2f:4a:19:47:
93:6a:6f:c3:10:41:bb:ff:77:f2:72:df:de:88:8d:
8f:5d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
52:c7:a7:b3:63:4f:55:24:df:bf:cf:07:68:18:e2:f9:df:e1:
0a:20:b0:b1:13:21:fa:9a:4c:8a:45:b7:e9:23:03:c7:51:96:
88:2c:6c:6c:ba:1c:e6:03:e3:15:92:ab:77:9f:b6:25:72:3d:
29:98:ce:b9:4c:f3:6a:aa:9d:5a:80:a2:4a:a1:e2:17:5e:b6:
3f:20:03:96:f7:64:bc:11:f9:69:09:3a:ba:13:41:ab:33:01:
55:33:93:84:4a:f8:ff:3f:31:8c:bd:f7:60:f5:69:ef:e8:b1:
bd:fa:ad:71:db:d1:0a:fb:dc:09:ed:5e:98:70:00:f1:e6:f2:
07:32:0a:87:62:6d:85:27:18:e9:3f:08:21:7a:c3:42:5e:98:
86:9c:8a:01:c4:fb:21:61:74:fa:b1:ee:09:44:e4:1c:6e:67:
f2:92:2d:f8:a8:65:e6:78:81:ed:5a:18:14:ee:be:cc:13:dd:
7c:c3:f0:88:7d:4d:77:9c:e4:f9:7c:fa:fe:6d:74:70:d5:a8:
c0:c8:c3:b9:87:2d:a6:9a:91:05:c3:bc:61:72:64:53:0d:e4:
cc:e4:85:95:40:94:31:5f:36:bd:e8:42:83:2d:e9:72:35:69:
10:d1:2a:f2:e5:8c:39:c5:eb:90:72:d7:e5:3d:43:51:79:45:
d7:2a:72:dd
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:37:05 2025 GMT
Not After : Jun 1 12:37:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
68:ae:43:72:59:23:bb:4b:0d:51:a4:80:35:bd:2d:40:79:a2:
8c:9a:ee:e3:bc:48:4f:c5:88:94:24:df:37:f1:05:8b:5c:52:
93:53:95:fd:1e:7c:1b:c0:1b:fb:d4:f1:ef:c6:e3:21:df:9b:
a8:1f:02:9c:7e:a9:80:85:a0:de:a1:7e:e6:35:1a:26:3c:f8:
98:81:8b:ac:20:bd:67:27:9f:5e:ca:78:83:19:d6:32:4d:c7:
3a:b8:75:5d:90:27:64:0f:73:a1:d2:11:d3:04:a3:aa:c0:cd:
b5:21:52:b5:db:5d:14:a2:a1:14:87:ae:43:8d:9b:b7:da:53:
a9:1d:99:b7:02:97:8a:11:63:b7:7d:95:41:f8:80:8e:31:01:
73:62:77:de:c1:fb:03:88:41:1b:10:26:b0:8b:17:dc:48:ef:
43:f7:2b:b9:a8:2f:db:2b:42:3c:3e:08:dc:bc:df:4a:b1:d4:
05:8d:28:77:57:ed:00:46:d6:19:98:28:40:ac:3c:e3:61:a4:
a0:97:3b:0a:55:e0:ed:34:58:cc:6e:4b:03:68:d3:20:4e:e1:
f8:c6:07:1a:97:71:ed:12:82:e5:3a:a3:e4:bc:0b:d7:b0:ec:
2b:2c:26:26:90:e4:99:f7:1a:31:79:1f:cb:a5:e4:ac:d7:cc:
b1:10:de:53
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
Truncated 3147 bytes from beginning
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
* TESTCASE PASSED
20,415,964 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:35:16 2025 GMT
Not After : Jun 30 12:35:16 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c7:ff:bd:64:b0:24:cc:65:56:99:dc:01:32:cf:
b7:98:0e:a5:6b:2b:77:d3:21:56:3f:74:fa:cd:5b:
9a:31:3b:0c:9e:63:ee:c8:3f:98:17:94:cd:cd:d5:
17:5e:d9:35:31:06:12:e9:b5:d6:21:64:c8:09:62:
90:c5:25:3d:a9:4e:98:fb:cd:a9:f4:a3:48:90:3d:
fc:6f:41:a3:59:b4:00:39:89:88:c1:a4:57:eb:70:
64:b4:46:cf:69:af:5e:61:e9:7a:57:eb:e4:48:b8:
7f:4f:11:36:7b:5c:4f:ea:51:a4:ce:46:6d:3e:e3:
97:9c:d7:70:3d:88:8a:5c:88:29:8b:45:f5:d3:12:
a5:0b:28:0b:c5:57:19:93:bb:bb:59:34:eb:c3:f5:
4a:6a:de:32:15:38:2a:7b:64:85:f2:17:10:02:cc:
b6:39:f0:a5:d8:45:83:36:69:fd:b9:09:2a:45:28:
74:ec:ae:60:e8:fe:b3:3e:d5:d4:54:bd:14:2d:6e:
84:18:9f:04:d9:0f:7e:5f:cc:b1:8c:f3:9d:94:82:
e6:59:11:be:31:1e:cf:e8:c4:8d:3f:96:62:6f:ea:
76:06:ee:6c:0d:2f:10:c4:35:e4:9d:cd:f0:4c:ba:
ba:6a:79:33:30:c6:7d:ab:70:02:d0:a6:dd:7d:86:
18:4b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
87:85:9f:a3:af:2f:8f:c8:69:07:35:4e:37:bb:50:e9:2e:65:
f6:95:d2:17:bf:a9:bd:92:e6:b9:5a:7d:83:1a:dd:dc:4f:7d:
a2:39:db:9d:a8:7d:1c:c2:2d:f0:c8:1f:d7:6b:a6:26:1b:34:
f5:9b:d5:fa:68:1e:32:91:2f:5b:2f:c2:0a:1e:02:59:06:ea:
2f:8f:a8:ee:d7:9f:e8:c2:db:4d:39:61:fb:09:6a:12:01:67:
2f:8c:a7:a0:9a:18:cb:5c:c6:74:58:0b:9d:64:de:15:82:03:
36:39:c7:8c:ac:4e:7c:bd:d7:48:e3:a5:7f:87:a6:9d:9f:f8:
04:4b:c3:a3:68:f5:0a:60:78:ec:e2:b7:91:aa:47:04:83:7c:
3c:c1:0f:e6:5c:43:65:21:16:8f:d2:09:a0:bc:62:b9:5f:64:
01:3d:71:2d:0a:06:f6:c7:4c:2e:3f:d9:8e:fe:d8:5d:8f:3f:
f0:b3:64:69:04:2f:99:6c:55:75:aa:60:54:6d:25:c5:14:fb:
ca:73:20:93:3b:87:05:ec:59:bd:55:e4:86:a3:9e:79:84:56:
12:ac:8a:e1:07:6f:20:8a:4b:2a:9e:ca:f1:b0:e7:20:ce:1d:
b7:85:14:66:d6:ca:f1:bf:eb:1b:de:50:6f:cf:4c:d7:a4:c5:
fd:7f:b7:de
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 12:35:17 2025 GMT
Not After : Jun 1 12:35:17 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
18:5e:8c:66:61:62:80:a2:4e:25:fc:5d:9e:23:1e:22:05:17:
10:9b:a5:45:30:fd:26:b2:fa:8f:e2:a4:bb:db:b2:e5:a0:8f:
fb:6b:64:b7:b7:72:45:ad:f0:c9:fa:c0:8a:c3:5d:3e:4b:cb:
eb:cd:cd:33:03:20:e3:b5:16:77:a2:12:88:2b:0a:f3:51:16:
03:2f:8c:56:71:8a:2c:cc:15:4e:73:e2:41:cd:46:66:85:fb:
30:25:70:39:8d:56:80:98:13:97:76:c6:6f:2c:6d:2f:d6:d6:
fa:ae:99:10:6a:a9:fd:d9:2e:ab:bd:af:5c:d9:26:24:bb:82:
83:c8:0a:01:dc:63:44:c4:b7:f6:a0:bf:b3:dd:56:33:3d:05:
56:6c:d7:10:76:89:45:45:73:a4:28:39:dc:e1:d7:7f:75:d4:
5c:40:d2:ea:4e:0d:71:bc:94:2a:5b:7b:ec:f4:75:0f:99:0a:
a7:08:92:8d:03:36:0f:82:18:4c:d2:e4:2d:b9:96:47:00:43:
af:a0:aa:56:8e:31:60:97:ae:54:38:78:05:e3:b8:d1:52:e4:
3a:52:50:49:d7:b5:a5:c2:89:66:b5:f0:64:48:d0:49:8b:7e:
98:18:08:06:0f:8a:f8:e1:9e:0f:f3:80:c1:74:82:8c:54:0e:
c0:31:62:45
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.76s
Truncated 7958 bytes from beginning
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
3,106,323 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:05 2025 GMT
Not After : Jun 30 10:25:05 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:dc:5f:0e:9d:6d:9f:e8:4b:e3:a9:e8:b3:a3:01:
83:c3:a2:c5:5f:52:1c:f7:a8:50:8c:45:72:48:5b:
3b:67:66:ea:43:e0:b5:ac:3b:ba:b7:57:98:37:98:
90:34:f1:60:a6:43:0c:54:66:9b:12:4b:18:bb:ab:
30:2c:a7:42:45:5e:c1:d8:32:2e:ad:ca:4f:74:65:
00:ea:0f:2a:68:48:52:64:32:03:3f:4f:13:ff:cc:
d8:5e:49:db:ce:52:e3:dd:36:40:2f:d9:2e:33:bf:
1e:4e:7a:ef:10:88:0b:3a:0b:1c:45:0b:f1:f0:40:
34:b9:b8:78:4a:48:52:2d:49:54:2a:11:9c:19:b1:
16:db:7c:c5:a5:87:b4:f5:2d:2c:ab:f5:2c:45:df:
1c:31:85:ef:fe:0c:4c:b0:a2:c0:bb:93:f4:0a:97:
b5:a9:c5:2a:c3:f2:12:21:a0:a0:93:04:f6:10:06:
31:be:25:77:2e:93:7e:84:78:e8:85:99:eb:3b:66:
6f:d0:0f:59:4d:91:97:3c:21:95:85:66:09:cb:2d:
5a:8b:6c:40:f3:23:f0:9a:2e:f7:d5:3e:a5:6b:4f:
5e:49:0f:10:95:e1:cd:57:f1:44:95:e6:5f:23:bb:
85:c9:a6:b6:ea:d0:6f:66:70:1a:a6:b5:00:ab:74:
95:7d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d2:4c:13:44:26:80:bc:06:ac:54:09:49:c8:78:ab:2f:d2:aa:
33:a0:65:61:03:5d:df:28:7f:05:09:03:af:b4:70:ed:ee:47:
38:75:d0:a6:f0:a4:e7:93:b4:be:42:a9:de:52:eb:a9:97:00:
f0:89:b3:cc:f5:c2:3c:13:0f:d1:d0:36:46:33:18:2c:db:43:
f2:00:f3:6f:50:46:06:74:f4:44:9b:17:3e:21:31:86:6a:25:
db:93:eb:a1:03:e4:7e:18:00:78:79:78:bb:b3:e3:f8:c9:11:
56:30:12:3a:d6:c1:d4:79:1d:7e:7c:c4:1c:45:4f:0b:e8:3e:
90:1e:54:6e:c6:01:0a:20:20:78:b4:40:c4:3a:96:e9:6a:63:
4b:8c:40:d2:13:0f:c3:ad:a7:08:bf:49:9b:89:1b:ae:50:59:
35:d2:a1:2b:0c:d4:67:a5:61:1a:70:bd:c2:54:65:f6:b4:6c:
a8:d9:58:ad:e1:9e:25:7f:70:a9:16:be:8a:32:7e:5a:78:e2:
e0:06:87:73:66:d6:ff:b8:6b:c2:c4:55:cb:80:cb:43:0f:b3:
6c:1d:3d:ea:bb:e8:3a:cf:4b:b7:79:96:a8:44:ff:18:9f:77:
c0:a2:0e:06:7d:ca:e9:9c:0b:57:aa:ec:e0:07:1f:fb:1e:bc:
e3:a2:7d:a7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:05 2025 GMT
Not After : Jun 1 10:25:05 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
31:8b:3c:45:ec:23:52:3d:ed:af:79:a8:5a:7e:cb:92:c1:90:
e8:f9:4c:e4:32:97:8d:ab:ed:71:6b:7b:4b:92:d2:27:85:3b:
f0:25:c0:54:f3:33:44:5d:dd:28:eb:5d:87:42:bc:4c:7c:1f:
82:c2:cd:a1:dc:af:eb:e1:02:36:83:1f:81:de:1c:77:99:8c:
61:5c:8a:01:2d:2a:0e:36:3a:5e:9a:47:8c:9d:d0:db:18:1e:
7a:0e:2e:07:18:f9:7c:03:0d:46:8e:57:79:0d:a0:88:9d:17:
f6:99:8a:fb:ae:e1:d0:b6:81:66:a7:22:0d:52:a7:ee:41:50:
1b:d5:5f:6b:ff:9f:6f:2d:18:5c:eb:f5:c3:eb:30:15:9c:59:
a4:93:a2:7e:06:5c:c9:29:63:0b:ce:5c:fc:ee:c1:9e:19:59:
36:ed:34:00:f3:b4:f5:8e:47:d3:3e:44:19:e9:1d:5e:ea:ac:
3d:d6:0e:18:39:f4:ab:9c:99:29:65:fe:cc:45:ac:ac:29:79:
b8:28:fd:3d:f2:5a:c0:db:be:49:49:2e:59:78:99:df:f1:7e:
9c:4c:8e:7d:f2:0c:97:53:bb:a1:a9:ea:a8:55:de:37:ba:0d:
76:ed:3b:26:64:8d:81:89:a5:b6:bb:c8:7d:bd:1a:37:15:23:
d5:7f:f1:27
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
Truncated 3082 bytes from beginning
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
2,850,728 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:54 2025 GMT
Not After : Jun 30 10:24:54 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d1:31:f7:c1:64:40:39:ff:e0:b7:e7:35:fd:6f:
c6:36:36:cc:68:36:aa:80:ac:df:0e:fe:0f:04:98:
87:94:e6:78:f2:1f:3b:ea:da:b7:86:b6:22:cc:52:
6b:53:ee:89:4d:03:57:ce:cb:cc:9c:9e:26:3d:67:
6f:e8:46:37:6a:d6:87:71:ae:d0:c5:2e:8b:6a:bb:
80:90:f4:ce:d5:b8:be:35:d4:ec:f5:6f:78:b0:c1:
7a:0d:71:8a:be:9a:90:d7:ab:02:58:61:d4:83:72:
b5:bf:0f:5b:7d:95:e3:3b:be:52:54:72:b3:69:4b:
d7:32:89:41:b8:61:2a:e7:bb:35:af:92:3a:e1:ae:
55:e2:f3:8f:7a:31:88:90:ce:8f:58:4b:de:06:fd:
c3:83:3e:8f:2b:11:df:26:f4:af:0a:4f:59:d9:12:
0a:c9:cd:ae:f9:b6:ab:2f:6d:38:4a:3b:64:16:4c:
0b:fd:ac:be:cf:60:90:01:c6:14:db:2c:be:db:d6:
f3:82:2e:a7:c8:05:a3:e8:5d:47:26:00:b3:9f:32:
88:d3:c1:16:e9:05:e3:18:de:6c:ae:6e:d1:a7:ea:
36:0e:96:6f:53:a5:99:71:cc:8d:e2:0a:0e:f5:07:
0d:d7:d2:f5:55:17:ba:b8:79:67:63:c6:28:7d:a4:
40:65
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
12:5b:6b:35:9b:f4:f1:38:69:9f:d7:b9:1f:13:c0:53:ea:36:
4a:ae:98:de:c2:18:73:de:0d:7a:69:5f:ce:85:4a:7d:f2:04:
7e:15:14:60:89:9d:a6:87:97:b2:cc:10:09:32:68:5c:35:73:
f7:23:7b:b4:e7:35:4f:02:9e:16:98:fd:fe:39:d4:8e:e6:88:
5a:c1:89:ed:b7:70:fc:a1:fb:58:73:3f:f7:1d:87:cd:cb:d1:
c3:53:e7:ab:ee:d1:f2:f6:5e:ee:df:28:c9:68:d9:04:67:27:
9d:cc:1a:1b:a9:99:02:aa:f2:39:5f:7b:44:4b:37:73:4f:03:
6d:6a:40:65:91:f5:18:af:b2:b8:de:b2:19:15:4b:22:c6:d5:
c2:01:a8:fc:e2:fa:a6:07:6a:b4:b2:d2:83:19:82:d7:e3:2b:
d6:16:44:c7:ae:9b:6d:15:a5:3e:17:b6:21:99:6e:5f:56:8b:
db:54:47:4e:28:e9:f4:f5:83:6a:92:63:60:cd:e0:c1:bf:cb:
8d:63:46:0e:fd:d0:c8:57:dc:0b:e9:59:f6:83:7d:91:be:a0:
e5:66:aa:e7:b4:6c:5c:91:25:dd:ee:94:99:a7:d7:51:87:5a:
bf:f5:a8:35:1e:65:12:43:c4:f3:ec:d1:f1:9a:59:65:c3:fb:
7f:d8:71:81
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:54 2025 GMT
Not After : Jun 1 10:24:54 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
54:38:af:d4:c0:84:d6:e4:61:69:e4:f8:21:ac:11:8a:14:d5:
f9:21:0a:c8:af:c6:30:3e:7c:9c:0f:c9:8e:0d:13:26:19:da:
a8:9d:de:f6:d0:34:b0:e2:10:e2:39:02:5d:85:c7:39:17:2b:
00:15:b7:39:e6:38:ed:d2:ac:4f:ff:9f:a6:f7:01:77:7a:e6:
94:14:ac:d6:a9:31:ec:c2:01:ab:23:a3:1f:de:74:ac:32:fb:
a5:07:af:08:99:6c:1a:11:81:e7:7c:71:8a:f3:ec:91:7f:30:
ec:da:28:e5:ef:01:7d:72:bc:3c:f4:fb:bb:d6:c9:b7:f5:44:
8a:6f:d9:c7:eb:d3:97:0f:c0:57:67:cd:43:24:10:e0:ab:73:
08:1a:16:4f:74:53:eb:aa:dc:c5:1d:12:4d:91:de:9d:d9:23:
af:9f:e4:f6:7d:29:7a:2b:40:1f:3a:2b:66:9e:dc:c5:42:8d:
eb:09:3f:8e:76:f5:e9:dd:22:b1:d8:86:73:40:43:bf:ce:59:
60:e2:04:94:19:1c:9a:9a:6f:66:13:4a:8a:c1:3b:21:a3:e6:
c0:21:a5:f6:89:6f:7b:9d:b5:47:77:cb:60:e8:82:26:c8:a6:
8b:2a:b6:58:4c:7e:7d:fd:6c:16:f0:23:53:d7:39:b6:e6:24:
54:f4:ae:62
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
Truncated 7958 bytes from beginning
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
3,104,074 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:47 2025 GMT
Not After : Jun 30 10:24:47 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:96:25:c6:e2:74:d2:7f:b4:cd:84:7e:38:cd:8f:
31:00:3b:d3:e2:6a:d1:9e:46:04:97:ee:fd:06:c2:
43:53:19:9a:e3:12:09:0e:ff:1b:24:dd:07:8c:6a:
96:02:6c:e4:b1:13:57:86:93:c2:eb:fd:89:f9:a2:
2c:5a:fc:75:75:44:1c:01:76:0c:62:b6:f1:e6:6d:
45:12:5c:a4:07:90:be:e6:af:1f:9a:d7:ed:2b:6e:
83:bd:28:40:f5:67:9e:fc:b2:ca:19:32:65:c9:36:
5a:78:d1:2b:89:b5:95:c4:70:6c:fa:51:b2:8b:d6:
1a:d1:b2:11:3e:54:87:c5:7b:79:70:d5:90:0a:00:
bf:06:42:05:cc:82:4e:3f:a2:4e:9b:ce:11:ef:14:
df:c1:6d:c1:2e:e3:1f:4a:25:cc:39:de:da:e5:0a:
20:34:c5:c5:42:7f:ff:9b:58:7e:b6:f3:6b:56:da:
a8:e2:2b:28:13:53:d8:f5:59:01:cb:07:57:16:35:
31:7f:16:ec:b6:74:02:1d:37:ba:47:51:65:a3:f5:
ff:9b:6f:87:7e:a9:c4:8a:b9:88:5a:3c:00:a9:bc:
1d:7a:1b:98:2a:5d:0f:98:29:f8:e5:c6:de:8f:e0:
eb:fe:93:a3:2a:22:bd:d0:39:2d:e1:e3:e2:9d:6b:
56:57
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
64:cc:17:3a:85:d8:73:eb:72:1e:25:b4:36:2b:14:16:29:cd:
f3:7a:2a:0d:26:ff:cf:24:e3:3f:b1:41:b4:a1:1a:8e:d4:63:
00:13:e4:85:cb:fa:5f:94:e8:a1:e0:27:8a:1d:8d:e9:f7:50:
03:7d:c3:bf:11:a9:63:f8:0b:97:93:ee:93:93:37:21:48:6a:
ba:60:f0:0d:0d:6a:aa:37:ed:b4:cf:af:36:44:66:60:d7:8f:
37:96:ce:4d:dc:be:0a:a6:0e:8a:75:a3:4d:8f:99:78:4a:d2:
de:3e:83:00:e9:e6:d1:dd:13:65:54:7c:aa:75:60:5b:23:9f:
6b:1d:aa:21:96:91:c5:e2:8c:1d:05:f6:0d:77:a4:ca:13:f3:
61:ff:89:a2:99:36:53:77:de:fa:e5:14:8f:b8:c0:1e:98:b4:
87:69:6f:92:07:dc:b9:0a:23:c7:bb:72:5c:09:98:e4:89:60:
d0:6a:c7:b1:ea:cc:04:13:80:8a:14:75:54:bc:8b:f1:1d:30:
15:91:8c:c9:a3:b8:6b:e2:14:42:e6:8f:23:5b:36:72:97:8b:
6a:43:75:92:4e:fb:5e:68:b2:2c:bd:62:4c:1d:75:07:4c:90:
0e:27:64:a0:77:11:ed:ad:d3:c5:49:e9:15:96:da:94:fa:72:
35:67:71:c6
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:48 2025 GMT
Not After : Jun 1 10:24:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7d:86:88:17:55:f2:1e:69:c4:c9:6c:13:a4:31:33:21:7c:06:
d3:a2:56:9b:21:c0:93:02:34:7f:91:ff:47:71:f7:11:c2:73:
82:69:6b:5a:e1:0e:93:a7:55:4b:d8:09:38:c6:9f:5b:a8:87:
61:a8:00:20:db:fe:ec:75:24:94:4e:fa:1d:01:14:0e:5c:da:
ca:75:29:27:5a:94:0a:83:80:dd:95:5c:8c:12:71:3b:fd:5e:
13:24:b8:c7:29:9d:61:f2:10:54:ed:5c:a2:33:ef:9b:08:c4:
a5:44:f6:bd:05:89:d8:19:2b:9c:41:ee:66:84:5e:32:80:8e:
8d:9b:30:f1:10:e5:51:8d:24:32:dd:30:d0:16:29:44:7f:62:
83:bf:1b:33:57:97:6e:ca:ba:14:d8:0e:d0:2b:46:3b:88:6b:
19:a3:e0:9a:7d:8c:9a:93:11:e4:50:55:ef:f9:08:74:34:78:
36:c4:02:6d:ad:c9:68:e9:18:ec:74:3c:b0:74:a9:2e:5d:ea:
91:bb:8f:19:ad:02:8b:24:fb:ea:00:11:01:ea:93:4a:6e:10:
a4:99:58:32:1b:5b:ea:43:10:4a:f0:b5:a6:0a:64:71:60:d7:
5a:04:2b:d0:55:e3:63:20:f1:5f:05:90:cc:dd:c2:04:13:0e:
ce:be:a4:15
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.59s
Truncated 3082 bytes from beginning
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
2,852,815 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:22 2025 GMT
Not After : Jun 30 10:25:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9a:d3:9c:d1:21:d7:52:bd:20:ae:d0:8b:3a:df:
be:92:00:10:17:c5:38:ff:9e:59:5e:93:22:d9:c6:
3c:f0:45:af:21:a9:34:4e:b7:3e:d4:44:96:31:52:
78:ea:53:61:72:d8:da:3a:2d:f5:33:80:92:a0:02:
17:27:06:c0:7f:24:99:62:bc:22:c6:a9:fe:d8:89:
da:ca:45:22:e4:2f:5b:43:cb:4a:7b:fc:ac:e0:ac:
02:4b:55:a3:b3:5d:6b:07:05:05:5f:ce:71:d4:52:
a0:4c:17:e6:57:fa:89:5e:19:ac:ec:31:2e:34:14:
3b:09:a7:7e:05:53:f9:97:b8:fe:52:d2:4b:3e:70:
05:fb:35:d3:dd:da:0b:43:1e:22:a5:67:a5:2b:80:
8d:28:2d:a0:e6:5e:aa:e8:80:02:ba:86:54:61:6a:
9e:4b:93:a9:e0:32:81:e9:f0:84:5b:14:26:97:71:
99:3b:15:f7:80:2b:e9:fd:26:db:2a:3e:1e:1b:46:
75:52:34:de:5a:21:15:21:47:2a:7e:a0:33:30:27:
10:dc:6e:93:f4:a8:14:1e:96:db:2e:4a:34:98:6b:
ee:01:17:74:4a:f9:f8:82:48:48:2d:a5:32:82:ec:
e8:1c:0b:21:4e:41:af:b9:11:cf:88:41:33:3e:25:
ab:9d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
90:14:1d:c6:f6:a9:bd:c7:5a:38:94:d5:51:e0:bb:36:24:16:
e1:df:e3:d9:a3:df:cd:14:b0:71:7a:33:4c:f0:79:ee:9f:85:
9e:c1:99:11:3c:b8:55:58:40:98:6c:d3:7c:6f:9b:18:11:fe:
9f:e5:84:20:42:67:73:9e:83:c1:bb:6b:00:0b:da:89:6b:da:
fd:f3:c9:1a:02:6a:13:91:b0:b9:7f:77:49:3c:07:30:6a:93:
f7:ed:b4:6e:f0:84:ec:fb:6e:f6:60:d6:c5:6a:5d:b3:e7:0c:
47:a2:4b:64:12:ca:e3:aa:85:1f:7f:9e:0a:29:32:83:5e:e8:
8a:9e:93:a9:ea:80:99:4d:df:b9:de:10:04:b0:a6:a4:3a:ab:
70:41:c8:be:74:77:ba:ed:24:bb:3b:7d:60:2e:93:ef:11:c0:
4b:13:4b:87:f0:a7:79:94:9d:cb:56:3b:7e:01:a6:7f:c3:cc:
59:c7:e8:44:4f:00:60:86:a4:9c:5d:38:9b:47:6c:68:3d:68:
4d:82:04:1c:e5:d8:41:d6:27:f0:66:35:98:55:ad:50:3e:43:
4c:06:f5:85:c5:93:2b:2d:8d:56:85:f9:97:6d:38:f3:e6:09:
87:5b:3c:60:00:8e:e6:68:b0:a4:df:3a:f8:ed:00:7c:13:b4:
ed:be:79:fc
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:25:22 2025 GMT
Not After : Jun 1 10:25:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6a:a6:35:fd:98:9c:04:6f:88:8a:07:34:df:36:f6:3b:a2:e3:
37:e1:9a:c4:96:c6:aa:93:a2:ca:f0:03:70:90:c5:00:92:48:
db:bb:e8:95:62:ce:b8:71:47:85:4d:a7:a3:60:ce:6a:e2:58:
b7:ce:a5:c8:9c:1e:82:14:32:49:89:08:0e:bf:c9:90:df:c8:
05:cf:e1:f0:20:c9:46:61:c8:14:99:c2:a8:39:09:9d:c3:60:
2d:18:ab:33:61:f0:90:f8:17:ed:b9:6b:d7:80:2e:8c:56:3d:
50:ca:a3:03:0f:3a:c7:d0:f4:87:37:42:bb:5b:2e:98:b8:76:
8e:61:c0:b4:c8:17:92:2a:f7:56:ff:cc:a3:5d:f4:c0:b8:c1:
67:3c:45:a0:58:1e:53:20:57:63:1d:d7:60:74:95:50:af:eb:
24:a2:19:89:1d:c3:78:e9:65:dd:00:cf:0f:14:a3:d1:7b:e0:
56:3e:b4:03:b9:28:c7:b4:89:ac:f5:f8:a3:09:5e:9c:97:a8:
43:72:15:4d:5d:d2:e5:97:5b:fb:7f:f3:9a:54:9b:db:64:aa:
13:4f:c2:71:85:2b:c9:10:ec:39:52:72:0f:4c:d8:92:85:81:
5b:7c:34:9b:76:8e:ea:ea:cd:f1:9d:04:ed:45:9b:5c:5b:af:
4f:88:e9:00
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.40s
Truncated 7958 bytes from beginning
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
3,105,881 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:55 2025 GMT
Not After : Jun 30 10:24:55 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b7:e3:8d:98:1a:a4:22:3b:f3:b8:07:5a:ed:64:
39:7c:89:db:f9:d1:72:2c:33:cc:23:a3:d5:f8:e4:
76:d7:7d:01:aa:fe:96:af:c3:f3:e2:49:e7:4b:c7:
99:ff:77:c5:45:6e:a3:67:dc:8f:5a:be:a1:76:59:
14:91:e4:eb:c7:80:ad:f2:5d:51:ce:c5:cc:3b:df:
22:2b:3e:c8:1b:3b:a4:bd:d3:24:55:ae:48:42:14:
f9:83:1c:97:29:d8:79:27:ca:d4:e8:fa:ab:57:01:
f9:7e:32:ab:ae:59:76:65:d6:8e:83:6e:34:c4:0f:
fd:5e:8c:d4:1c:ca:ef:a9:67:82:0e:23:9f:a3:f6:
0c:7a:a5:2d:6b:a4:4a:41:98:3b:48:81:3e:f4:a6:
02:23:5a:0f:99:02:7d:b7:e2:8d:9b:ea:cc:84:07:
14:1f:bc:ee:30:2b:6d:c3:ff:c5:f1:2e:16:ce:40:
1c:b3:d4:fb:94:b2:55:53:1c:da:b0:90:01:44:a6:
a7:b9:6d:6d:d4:15:d1:64:c7:96:3b:d8:da:3d:2c:
2f:ef:8f:7d:6c:ed:6b:a2:2b:89:7e:c7:2e:ac:db:
cc:b3:c2:5c:d1:b4:37:bf:b3:ef:ea:74:b4:35:34:
08:7e:59:a1:db:76:68:e5:a9:2e:57:18:0e:9d:f4:
15:e3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
89:3b:8f:b0:38:0e:fc:ce:00:1e:ed:b5:bb:0b:a5:66:1c:9d:
4c:e3:7b:d6:9a:e4:44:09:e7:fa:99:1c:40:c5:62:1e:6e:67:
43:ee:84:ab:2b:31:ab:1d:6c:e9:79:97:da:7c:96:18:a3:bf:
6b:05:f7:ca:56:94:b8:7e:c9:91:f3:e5:ff:18:7f:81:c1:ff:
30:db:0e:7b:c9:30:ec:19:01:e6:9f:73:47:ce:5f:41:50:9a:
2a:91:34:8d:b5:39:0e:21:f6:77:e9:fd:07:49:30:40:66:15:
4c:7c:08:14:c3:e1:9a:91:d2:df:93:d3:be:56:19:e7:07:13:
f2:80:1c:8f:c4:8c:4f:ee:d3:9f:67:ef:4d:6e:f8:19:17:5a:
71:d2:51:d6:5c:e9:bb:8e:63:e9:10:84:71:32:16:62:e5:97:
8a:a7:4e:00:df:35:29:21:89:65:cb:dd:a9:41:56:96:c5:f3:
d5:36:9c:38:15:72:62:80:1e:4a:84:8d:63:0b:5c:71:43:9f:
35:a5:e7:aa:aa:59:38:9a:8c:b0:e7:54:4a:00:d7:61:0b:09:
cd:ca:a8:4a:81:67:cb:65:23:fc:18:1b:a8:42:64:ff:5a:40:
82:aa:bb:81:e5:4a:8c:b3:7a:e6:c8:6e:03:87:65:ea:3c:01:
4d:32:17:99
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:55 2025 GMT
Not After : Jun 1 10:24:55 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
81:3c:17:02:bf:5b:bd:5a:4b:5d:99:e7:9d:9d:4b:29:d6:c4:
fb:93:a8:2e:5c:7a:2d:fb:23:f8:a5:9a:94:fc:4e:db:53:0e:
07:48:94:34:8d:38:e0:8c:71:64:1a:01:1f:a2:ad:c3:3e:55:
a8:4b:99:33:c5:db:ca:b4:e9:98:33:ea:5b:52:90:62:e1:cc:
91:c3:cb:18:8a:3c:bf:51:0d:85:13:35:2c:7b:4a:8e:d4:4b:
96:0a:47:2a:cf:67:50:17:17:60:ba:23:fa:26:9d:60:cd:ef:
39:35:89:c8:09:4f:73:f2:5f:85:7b:b8:ad:f2:ea:7e:df:f9:
28:26:6c:1f:41:94:3c:ff:3e:28:ac:0a:a7:52:bf:c1:d0:bb:
84:dd:60:27:a7:3f:7f:2b:c4:2c:cc:45:32:29:11:a3:7d:70:
0f:23:98:ea:4d:42:03:f7:b8:b1:20:7c:c6:1a:67:fd:d5:ac:
b1:39:c2:b7:32:8e:e3:f0:14:be:4d:37:1f:bc:fa:93:a3:bf:
f1:65:46:08:4c:26:a9:92:94:55:f0:1c:ad:d1:a4:8d:81:7a:
7a:b3:18:af:c3:de:32:ad:c5:68:72:07:8e:f4:29:c3:85:f9:
2b:21:1a:82:f7:ff:6f:30:de:a0:ee:8f:50:ea:30:9e:4d:e8:
30:24:ac:07
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,851,826 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 30 10:24:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bd:c6:ff:79:38:a0:10:ca:ec:a2:2e:25:c4:00:
b5:52:a9:07:09:a2:f6:e7:bd:34:73:2c:33:3e:81:
17:b4:d3:18:35:16:50:31:8c:3e:9d:80:d9:ce:68:
be:cb:08:a3:f1:c7:e6:04:bb:74:f1:bb:64:93:c7:
d5:c8:94:a0:d7:ef:8e:c6:89:6a:ce:74:37:3f:81:
69:36:50:bf:49:73:a0:0c:18:7b:d9:24:9a:4a:98:
ca:60:64:09:99:5e:d4:f6:40:db:3a:90:71:f1:88:
8c:92:18:5e:09:4c:e8:ed:93:9b:e7:2e:1f:2f:9b:
ef:7d:07:e7:3a:10:86:e4:61:e0:a4:45:6b:59:d2:
70:66:12:94:94:45:95:c2:65:39:ed:91:b2:f4:1d:
36:7c:68:cb:e2:db:38:89:9b:fb:aa:8c:6d:b3:17:
a6:6b:cb:08:9e:59:63:1b:32:1f:ee:78:58:fb:9b:
84:a5:e6:1d:eb:ac:85:0b:2d:46:4e:81:8a:1e:eb:
e8:10:61:38:c0:cb:a8:68:12:50:d3:9e:f8:2e:d6:
56:66:f8:4a:a3:e1:93:7e:0c:bd:21:7a:a0:d5:e8:
0a:38:04:33:a3:5f:2b:b3:4c:f6:0c:49:c0:b8:02:
49:e7:dd:70:c9:26:08:2b:77:e6:1c:f2:f4:ac:b4:
9e:7b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
08:de:34:5b:49:22:55:f7:2d:e9:55:c0:87:ab:5d:c4:ee:3b:
23:52:7e:25:f7:ae:1b:63:79:4a:1e:c8:d0:08:23:09:5e:16:
aa:9a:23:c2:2b:21:6f:28:d2:e7:75:18:1f:ca:a8:8e:21:06:
a2:df:60:83:47:53:91:7b:d5:40:e3:46:e5:7c:f5:82:3b:e4:
01:ed:18:61:8b:b0:4f:91:ba:ea:ba:5e:51:9f:6d:b2:f1:a3:
c4:f6:28:d3:e5:95:de:0f:b3:33:36:f2:eb:52:f0:c0:fd:85:
60:34:b5:e7:8b:8f:35:28:9b:f5:18:86:c4:75:04:07:4a:68:
57:c2:c8:31:11:bc:b2:20:b7:66:98:ee:bb:94:ec:bd:42:f2:
4a:ae:ba:3f:5c:8e:c1:5d:f7:9a:21:e0:d5:90:c1:cf:a7:8c:
71:12:05:2a:6f:b6:87:a2:a0:b8:00:62:e4:14:5f:c7:6f:20:
93:34:a1:f7:8e:33:a9:04:64:bb:ba:06:ad:39:73:29:58:8f:
3f:86:ed:4c:46:40:95:98:2c:db:f6:29:04:6d:c2:e8:45:a9:
f1:cc:b4:9f:fb:2f:ad:9b:f4:cd:31:32:de:c6:ba:38:18:4b:
d6:eb:25:70:ac:57:f8:10:d5:d3:bd:fa:3f:7f:b1:29:07:e6:
03:7b:b3:c0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 1 10:24:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a4:08:03:a2:26:9d:51:a2:cb:b1:11:93:cb:ec:01:54:7f:03:
18:25:3e:2e:56:8d:77:d1:b5:c3:2b:5d:bb:af:1a:5f:4d:59:
ef:e2:a8:11:7b:32:57:5a:de:54:3e:73:52:cd:9e:fe:33:19:
b1:03:29:3c:8f:e4:b7:87:ba:69:af:46:69:b5:79:b2:59:8d:
c9:de:86:9d:b6:1e:c0:09:17:a3:05:c8:b0:ab:fb:4f:ed:c8:
74:67:d4:63:14:c8:8d:7e:57:a3:85:1b:77:2e:9b:63:a1:65:
2a:06:30:e7:53:8b:26:75:57:27:60:a3:27:94:89:78:8c:16:
93:38:ac:80:1c:d8:33:66:90:f6:61:04:fa:2a:f7:9a:a4:ec:
77:ac:92:fd:44:eb:48:7a:50:83:dd:0d:bf:05:35:4a:ef:0e:
f9:74:5a:fa:63:85:4b:cf:cf:d5:a5:57:1b:b8:d1:0f:50:8c:
ee:22:29:23:51:b4:b8:b7:6d:35:a0:fe:95:cd:e5:f5:79:58:
82:e2:38:92:7a:2e:89:2e:0e:59:be:7a:48:18:ab:e8:34:25:
75:dd:46:7a:d6:08:3c:a4:37:33:a9:4a:5b:b3:d8:47:b7:93:
4d:ff:13:56:8b:b2:66:3d:63:fc:61:80:48:7e:6f:21:e0:a8:
4e:9f:27:2f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
Truncated 7958 bytes from beginning
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
3,105,974 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:57 2025 GMT
Not After : Jun 30 10:24:57 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:f3:b6:de:74:22:ec:19:75:bb:97:65:60:1a:
5b:4b:d4:62:8f:65:b3:14:d2:6d:76:b0:38:e9:6d:
43:5b:19:1d:34:f4:ef:7f:7a:c1:f1:f5:58:e2:03:
f0:fa:81:db:8d:51:a7:bd:5e:94:5e:a2:7d:5e:22:
47:0a:a4:1c:9d:d1:b6:47:98:a6:83:e3:79:d9:45:
74:ef:50:9d:6f:c6:8e:51:7c:2a:83:c3:40:67:05:
a3:d8:fc:50:b8:f0:1a:56:6d:9d:7f:e1:17:d0:a1:
5d:24:1b:78:79:d1:26:c4:4a:1d:44:98:ef:25:30:
b1:a2:9e:10:98:63:9c:73:45:68:59:f4:e2:c0:c2:
38:c6:06:66:8a:cb:0a:8b:20:e9:7e:d7:d8:14:f8:
c3:b0:5c:d5:51:4b:e3:e6:23:ad:3d:c4:31:de:89:
a7:22:c9:62:ac:db:30:fd:f2:1f:b9:35:fa:78:8c:
78:13:6f:ba:f5:24:fe:43:8d:30:0d:d9:7d:5e:69:
33:53:bf:13:14:c5:f6:50:a4:c9:a6:4d:40:93:1e:
0b:17:6a:e5:12:75:d0:51:e5:0a:06:71:1d:61:02:
90:4c:0c:d8:4c:24:cb:a8:d6:1e:ce:5d:05:c9:42:
b1:14:d4:28:28:49:57:d7:5b:5b:e8:ad:02:c7:7d:
28:83
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b0:b4:c7:d8:ff:d9:ff:c4:20:63:73:b3:94:c4:ac:d8:57:ee:
7b:f9:f7:1c:64:65:c5:6d:31:12:3c:34:33:17:10:f9:97:ef:
01:f9:48:1c:a5:59:af:76:fb:2a:21:20:37:89:d0:5d:5c:55:
43:a9:2b:1e:75:61:6f:59:4c:a2:d3:e3:6c:a5:8a:b8:2c:6e:
49:2d:2d:af:fd:ff:73:51:7f:f2:5a:5c:5f:e5:09:c6:d5:8f:
fa:1b:39:47:76:42:f7:2e:71:6b:66:2e:71:aa:db:a3:e3:46:
9c:df:64:f5:fd:49:7c:58:ba:3e:e2:e7:55:3c:97:17:5f:72:
a2:29:e0:1a:30:f9:97:a5:5c:13:1c:b4:78:89:4c:bc:ff:d0:
75:98:36:56:cc:57:f4:1d:3e:6d:bc:21:2f:d5:12:b2:e7:45:
8d:1f:36:a2:22:b8:2d:d7:c3:d2:c7:33:76:3e:b0:d6:54:6f:
92:b4:12:fa:bf:41:16:3e:b9:b5:29:a0:1a:c8:0d:7f:f4:19:
d6:59:90:04:ee:97:6b:71:90:5d:ed:bd:e4:f7:5d:02:e8:7f:
97:7d:22:6d:1f:98:0c:8e:84:42:b8:20:5c:88:4d:3e:7b:68:
64:58:15:29:47:5d:88:3e:d4:4f:53:41:07:00:a2:af:74:11:
9d:40:17:f3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:57 2025 GMT
Not After : Jun 1 10:24:57 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b4:ae:1c:c2:72:7f:f8:90:ef:7a:9c:24:ea:e2:d2:05:f4:dc:
51:fe:4d:c2:28:15:f3:b7:b8:57:06:08:21:fb:a8:4f:2c:dd:
d4:94:9f:07:f8:c0:df:96:0c:bf:4f:1c:ec:98:c8:07:c3:dc:
15:20:02:15:d8:8c:74:4e:f0:c0:c3:c9:19:9d:39:92:f1:02:
33:e7:d1:fa:bd:d6:90:28:0c:02:c1:d5:c8:4f:90:7a:8f:43:
98:36:0b:eb:66:19:c4:43:73:55:04:95:86:5d:a7:14:ab:9e:
43:37:c9:a0:fd:f1:58:2f:85:93:59:89:3d:05:72:1b:21:08:
46:0f:55:d7:22:7f:fb:f3:39:78:85:54:d8:6f:b0:fe:f7:c3:
ca:46:c5:37:03:dd:d9:eb:5b:d1:3c:92:d1:1f:00:60:f6:7e:
49:6d:c1:9f:3a:6e:12:0b:c7:81:f3:04:b5:11:2c:f6:8d:09:
10:27:ab:21:60:aa:38:8e:e6:fc:0d:4c:3c:49:54:ff:ab:a2:
1b:18:98:75:01:3e:14:8d:82:fb:51:c4:84:bb:e8:cc:c4:92:
03:c6:33:12:71:4e:c5:59:9b:09:75:b3:e4:44:44:7b:47:52:
06:ff:a0:40:1c:35:d2:53:b7:dd:cb:aa:fd:9b:e8:95:c8:63:
17:fd:47:6b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
Truncated 3082 bytes from beginning
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
2,852,463 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:49 2025 GMT
Not After : Jun 30 10:24:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:aa:56:27:29:1f:44:cf:a3:45:21:28:16:13:65:
76:aa:05:00:b2:d2:00:d7:0a:6e:89:d4:70:4b:e2:
63:d8:7b:5a:36:1d:f2:de:2d:a7:c4:3d:2b:98:4a:
55:77:fd:f6:b1:c4:71:21:85:b6:9c:55:f6:ae:3f:
9e:e8:bf:b7:d7:e1:dc:3c:02:99:6b:76:c2:27:37:
39:4c:60:92:95:3f:86:8d:91:5c:95:2a:96:8d:91:
85:31:a6:d6:9e:10:3f:13:a7:76:89:b3:11:d3:35:
bd:b3:c8:20:39:2a:f9:2e:cd:ab:54:89:5c:92:31:
34:97:26:2d:d8:8e:5d:a2:1b:e1:27:93:95:25:25:
79:b3:cf:5d:02:ba:c3:a2:55:6f:e5:80:dd:a7:8d:
22:ba:85:b5:29:3f:25:bb:dd:ab:b4:d6:49:98:3d:
06:34:74:e7:43:4a:ea:d1:56:e4:5a:23:54:f8:5d:
57:4b:9c:73:49:e0:61:85:bf:ae:d1:e9:f9:86:30:
23:b9:cd:6c:c3:9a:81:15:14:1b:19:31:e2:c1:40:
fc:c9:44:d7:76:92:ea:3f:36:03:d8:f6:69:c6:d9:
08:47:38:24:de:75:75:44:35:83:b8:0c:c2:1a:e7:
5c:48:5e:4a:38:7a:b7:b8:51:18:4c:cd:f8:a4:92:
52:5b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
92:5a:98:a2:df:37:eb:5a:04:2a:4a:94:2f:3d:65:1a:ac:c7:
40:f6:65:8e:84:60:ed:6c:ed:9e:c2:e8:24:26:72:2f:48:c3:
cb:4f:90:f0:00:9d:65:12:7a:e0:c6:9e:18:b8:43:c3:b2:e6:
70:80:00:69:09:92:4e:8a:bd:b7:8d:a6:2c:fb:92:59:98:69:
72:a7:80:b5:99:98:5b:c1:84:f1:67:06:fd:c3:2f:7e:e9:9d:
de:36:d4:ac:49:48:02:c7:72:c7:0a:93:2a:ba:f6:37:4e:bd:
dc:01:41:23:35:0b:a8:fe:c3:e1:46:50:56:69:c4:22:2d:e3:
36:bf:68:dd:92:84:06:36:8f:4a:be:25:fa:be:c2:34:11:8e:
78:2a:6e:af:39:7c:f5:ea:81:b1:cb:44:66:57:82:2f:fa:d1:
ba:50:42:a3:79:28:15:e9:8c:5b:f8:01:4e:9e:e8:9f:79:d5:
d1:0b:2b:20:97:ed:e3:bc:53:2a:c8:0f:79:3c:3e:01:4d:3c:
d6:90:46:8b:59:6d:90:31:36:84:70:0c:2a:8d:d8:e2:8b:4a:
52:3c:9a:2c:aa:34:c0:8c:27:a2:77:45:97:41:09:dd:ff:dc:
5b:db:75:8c:f1:23:b3:68:65:dc:8e:ed:e3:f0:cc:e3:b9:f0:
4b:e6:8a:c2
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:49 2025 GMT
Not After : Jun 1 10:24:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
43:bc:13:a1:e4:b3:35:01:30:43:4f:f8:fb:4e:5e:39:89:1c:
00:1d:03:01:5a:5d:ab:78:3f:59:e9:c5:6a:02:47:eb:2a:84:
87:43:94:85:54:b4:08:3f:1a:54:3d:0b:e1:f3:69:f7:b5:19:
2e:7e:1b:a4:a4:82:4e:0a:5e:78:1d:b0:9f:db:21:bb:0f:fc:
78:ee:19:b3:5a:18:5b:52:76:4a:a2:fe:73:bf:a3:90:e9:43:
b6:cc:36:4c:2a:18:7a:4c:4c:a6:eb:3a:67:7b:dc:fe:49:7b:
05:ac:03:ba:7f:90:a6:2d:73:25:5e:a1:43:3a:fe:25:bd:c4:
9b:16:ad:a2:7a:b1:54:80:18:fc:cb:c2:48:1f:25:d4:5e:20:
c3:c4:5d:51:f4:10:61:0c:1e:91:ed:a2:73:51:57:8a:33:f7:
74:dd:bc:90:c8:c2:9a:58:2d:9d:52:0f:3f:41:64:50:be:0b:
4a:ca:58:4a:51:e8:0d:d3:06:23:4d:5d:f4:c7:c6:49:dd:d3:
9a:e8:86:df:3b:96:2f:b1:2c:7d:06:38:4f:97:c1:61:f4:64:
14:30:9f:bc:81:c9:a9:89:57:57:b8:f8:81:ca:6a:da:4d:c3:
07:97:6e:1c:36:ac:0a:7d:1a:45:fc:59:40:d3:7e:33:15:a9:
b0:5e:29:33
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
Truncated 7958 bytes from beginning
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
3,105,307 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 30 10:24:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a5:eb:27:2e:c6:61:a8:88:9e:0f:bc:fd:02:76:
75:3c:3d:28:f1:c4:01:71:02:40:2d:f0:e6:2d:7d:
a6:5c:6e:5e:ef:e8:d2:8c:d7:44:d3:70:d7:5c:27:
c2:d9:43:01:c1:ac:91:56:9f:5c:df:f8:8f:f1:38:
66:ea:54:d2:9a:da:22:35:fc:62:62:5c:d0:1f:ab:
8b:61:f8:b1:77:73:d2:e5:ec:cd:c0:5d:f0:31:3b:
0a:13:23:04:34:31:c2:7e:97:bb:72:7f:18:7c:6e:
00:d4:c4:5f:e7:11:c3:f5:82:d5:bd:c7:e4:ee:f8:
85:9a:cb:23:40:27:aa:c0:90:37:f3:5d:98:cd:d9:
c8:ef:f0:29:bd:38:8d:95:83:b1:c7:d8:51:30:fd:
ae:5e:84:46:0f:dd:01:26:e3:c7:9d:e0:90:7f:88:
84:a1:19:ac:2f:65:fd:85:61:58:7e:49:fb:f8:6f:
90:ad:71:4b:53:8d:95:0a:09:d9:da:03:2d:90:09:
4d:4c:1e:91:56:df:73:5a:23:d7:98:04:09:d6:49:
da:16:bb:ae:6b:24:e0:c1:bb:50:5a:4d:e1:38:80:
d8:0c:93:a4:be:54:2f:0c:ea:04:86:c5:9d:1a:53:
80:53:a8:a8:d9:45:86:f7:af:5a:2c:33:3c:db:f3:
99:b1
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0a:9b:41:3a:f7:1c:87:c4:e8:f3:72:21:b1:d8:bb:f9:8d:39:
fa:01:4b:31:c4:bd:ec:d8:23:5f:24:cc:5f:48:dc:f6:9b:59:
b6:ae:67:ab:bc:83:1b:31:e9:b2:c9:6b:56:14:86:a4:65:16:
3a:3c:cf:08:58:a4:bf:d1:4a:c5:68:d0:4d:9a:60:04:fa:36:
5d:36:6c:fa:0e:09:a5:16:3a:af:bc:29:87:ec:2a:e1:09:44:
b3:e7:e2:84:f1:95:1c:0f:66:51:25:e3:03:78:1a:b8:37:9d:
56:1c:47:a1:be:ab:9c:1d:c9:2b:c7:57:52:00:62:96:45:4b:
13:7a:0b:34:37:6a:52:b4:be:7f:1b:db:9d:22:41:81:11:53:
79:46:2b:a1:3f:10:09:4b:f0:2a:50:b5:12:95:d2:f7:bb:12:
d9:fc:1f:fa:cb:84:60:36:91:2c:4c:fa:4c:1a:be:c8:ba:35:
b9:cf:16:c5:f3:1c:0f:45:d1:18:7a:cd:0a:5e:26:c5:f8:30:
e2:43:67:af:9b:ba:2c:c1:f9:4f:94:c6:b5:8b:b0:0e:91:3f:
a8:35:0d:ca:b5:81:ac:18:4d:7e:7c:67:7c:37:09:df:f1:e4:
4a:26:3e:ae:41:d9:12:b9:16:f3:80:e3:a6:c0:5a:67:c5:ab:
2c:c8:a9:b0
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 1 10:24:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
77:04:63:42:6b:74:d4:a3:25:1a:60:53:43:4f:9e:93:4a:cf:
07:4f:43:88:80:7a:94:b7:f2:58:49:59:f0:9a:de:d7:d6:42:
eb:20:b0:a6:16:84:06:12:22:6e:86:7c:7b:fb:c9:7a:2b:7b:
86:29:b6:39:72:42:1b:e1:3e:e3:85:3f:8c:45:bd:9e:4b:a2:
73:21:c9:37:e4:3a:9e:92:1b:fd:25:cf:56:db:1e:24:85:20:
7a:fa:1a:17:63:f7:40:3d:5e:c6:09:59:dc:2e:e6:11:f9:d0:
67:1d:88:85:f5:29:77:22:ba:e0:92:42:db:a4:2f:45:5f:81:
3d:fb:48:91:35:87:98:40:ba:9c:1f:bb:cf:cc:0d:b9:15:8a:
f7:14:fc:06:d4:22:97:70:ef:8a:a4:bf:6b:00:3d:9e:33:5f:
6e:3f:5f:6d:a9:da:8e:ba:f8:27:76:c6:f6:e1:f9:81:23:2a:
a4:c1:a4:41:4b:7e:2b:d6:57:d3:42:8b:72:7e:33:99:c6:1e:
a7:ea:25:4f:fe:11:11:f2:f3:53:a7:93:dd:76:81:9a:c8:99:
3d:e4:8f:de:b5:5b:c8:40:ad:f1:44:20:a7:45:0a:a8:c0:ec:
37:de:f6:07:46:78:9b:9c:59:0f:66:8f:63:e6:56:88:6c:ee:
cc:e0:a5:3d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
Truncated 3082 bytes from beginning
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
2,852,760 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 30 10:24:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b4:95:50:9a:c9:dc:5b:01:e7:26:f3:64:80:3a:
bf:a9:d5:aa:61:98:4d:e0:bd:7b:21:bd:1d:bf:f2:
5f:52:98:76:4d:1b:2f:80:3b:fb:3e:0e:3d:98:41:
fb:df:43:88:e3:4c:32:61:4d:2c:77:ed:c1:0f:24:
4c:d1:51:90:b1:f9:dc:65:f1:fb:62:8a:cd:18:00:
1c:4e:f1:df:c2:c0:6d:32:dd:4d:ec:b2:b3:45:ab:
7c:de:e8:b3:5b:af:fd:84:38:29:63:d5:5d:ae:7a:
b1:76:0e:a1:7a:47:df:2c:76:b4:05:47:e5:bd:c2:
1e:51:1d:0a:c2:69:58:2e:c7:3f:92:d6:f6:f7:79:
f7:c0:4d:29:f3:41:af:07:ba:6a:0a:76:02:9e:ee:
39:cb:c3:2b:e9:c6:1d:28:6c:aa:c8:4e:23:86:8e:
4b:69:0d:4c:d0:7e:1e:4a:fb:5f:05:2a:08:82:55:
22:bf:03:c2:8c:4e:dc:79:2e:29:4c:63:dd:ac:13:
c9:6d:40:59:e9:96:9c:7c:05:84:69:7a:88:90:96:
42:14:80:e8:8b:1f:c9:96:ce:f8:2e:33:8a:9c:f2:
01:be:da:62:8b:a3:c7:5e:09:7c:f0:51:6f:78:0f:
f0:57:25:f7:88:92:5d:a6:e4:55:33:05:09:b7:f3:
08:07
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
60:61:02:66:c4:ca:3a:0b:6a:01:bf:b2:3c:f2:38:d0:28:0c:
96:d5:a4:5b:d7:88:ff:a5:35:5e:b9:ae:38:26:87:c0:c3:94:
16:bd:a0:d2:d3:35:26:c0:89:a6:b7:a5:9b:44:00:42:ef:f2:
36:34:12:17:68:61:0c:72:0a:66:87:af:fb:c4:19:2c:b9:31:
18:e3:e1:f4:67:db:9c:d5:78:d0:f6:63:11:73:be:d0:4e:10:
9f:56:23:e6:b3:5c:74:18:ea:1c:2e:72:9b:04:05:01:ec:65:
cb:87:b0:1c:40:fb:b0:94:f2:20:fa:92:b9:bc:28:d1:43:cb:
6e:78:ef:ca:82:5a:85:e9:f9:08:b7:d2:86:f3:e2:95:cf:65:
43:6b:22:8c:cc:ef:33:9b:db:02:63:be:f7:e3:ee:4d:81:5e:
bb:dd:fb:b1:6a:b8:cf:95:a4:85:de:a4:e5:af:f1:72:dc:08:
2c:fb:88:b4:66:60:36:4a:8c:52:93:df:a7:bc:6c:6b:d6:b1:
f0:9d:79:a5:9b:69:30:28:d9:42:96:4a:5e:78:9b:2c:1f:d8:
d3:f8:e0:ce:4c:7b:1d:16:7a:a5:56:13:1e:40:bd:c1:6d:7e:
73:6f:d7:70:1c:a1:59:95:78:18:e2:cb:87:48:18:53:1c:1a:
9b:2d:96:e7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 1 10:24:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
55:53:47:8d:b4:35:56:0e:08:1c:17:f8:7e:e9:8f:ee:c6:8a:
30:f0:42:10:00:92:de:5d:74:fd:2f:22:b8:79:4f:39:3c:be:
c3:31:57:0e:a2:ed:09:74:9b:fd:cb:e4:10:24:81:f5:8a:51:
0e:14:17:6b:ef:96:1d:7e:42:5e:6f:d9:d2:97:77:9b:79:99:
b2:b8:3e:5d:19:75:b3:7c:1d:9b:3f:b2:5f:cc:09:7e:59:68:
12:02:dd:e7:64:06:f9:d4:ee:dd:35:17:2c:21:a8:1f:8b:d3:
f4:f1:46:91:66:d8:12:28:4e:24:7f:ac:e5:9e:1e:86:26:7d:
6e:61:33:b4:a0:76:b0:52:5d:ec:6b:64:5e:d4:8e:de:c6:f8:
cd:b9:80:74:82:95:35:9c:d2:51:4e:88:5d:7b:69:65:6e:83:
2a:28:07:24:30:ca:91:9c:40:8f:5e:a0:0e:7b:9e:ba:eb:67:
fa:aa:ed:36:4b:ef:7c:fe:bf:2b:b5:aa:94:07:51:a2:1d:74:
fd:2f:4b:7d:50:ec:10:29:dc:db:02:ad:60:8f:88:12:ca:64:
5d:f7:52:c8:67:1d:6a:79:e2:1b:ef:fd:b5:1c:fe:b2:66:24:
bd:f3:a0:db:8b:0d:0d:ab:b9:4a:f3:41:d8:4e:c6:74:48:72:
86:b5:95:7f
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
Truncated 7958 bytes from beginning
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
3,103,432 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:46 2025 GMT
Not After : Jun 30 10:24:46 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:be:d3:6a:2b:c2:33:8d:5f:fc:76:6e:91:a5:07:
ea:10:fc:51:29:50:dc:47:4d:94:ae:bb:12:ce:17:
f9:a2:ba:65:50:1e:00:1f:58:4e:c7:d7:14:d9:a9:
82:6d:2b:b5:5f:a2:d9:4a:af:bd:ca:d8:19:b5:19:
b3:2a:92:88:1a:c5:ec:6a:17:d0:3d:e5:e7:31:e4:
f2:29:11:99:d6:c5:b9:f4:a0:41:46:b2:3e:8a:e1:
6a:89:d1:99:14:a3:a8:1a:f4:aa:db:08:6f:73:c3:
36:62:2c:7a:aa:fe:b1:f8:64:64:c9:5e:04:15:f9:
8d:fb:f1:12:3a:07:52:34:98:24:05:4f:a6:36:3d:
bc:52:1e:da:32:0f:09:73:80:a7:6d:12:48:4b:73:
86:f8:53:3c:09:9b:a2:ef:9e:7c:06:ca:26:9f:a7:
5b:83:da:7e:10:cd:2a:c4:8f:2f:41:dc:ed:8e:c9:
0f:8d:68:cb:74:e1:9f:a9:a1:e9:69:d7:eb:74:1e:
19:4e:65:19:a0:28:df:d6:0c:77:7d:9d:91:16:81:
10:23:42:91:87:1e:b5:1c:17:11:f2:ee:4f:77:c2:
51:06:7a:75:9e:f7:26:1a:c9:8e:4d:0d:6a:5b:2e:
2b:62:99:11:8a:75:e3:71:c8:5a:71:38:fc:de:aa:
af:6b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
64:39:ac:a5:9e:e6:f5:70:4e:f6:08:3a:90:33:10:8a:a8:16:
8d:e1:67:2e:4e:08:ff:e0:17:ea:d3:77:00:06:39:b2:31:b1:
51:07:52:42:4a:c4:0d:ce:e6:fe:55:f7:3d:14:65:92:9b:53:
f5:7d:ad:47:af:38:5e:62:bf:7c:f4:5d:87:b0:cb:96:a4:a5:
dc:33:d1:47:f4:e4:05:a3:db:13:8b:16:a2:87:b7:3a:90:0c:
b8:a2:ae:f6:08:b4:e3:01:35:0b:65:b6:9e:c5:45:b9:43:22:
84:65:b1:29:db:06:b6:a9:8f:e8:a4:97:e9:6f:fd:53:b9:50:
dd:85:d1:8a:19:79:70:02:ba:01:f2:c3:69:99:10:6d:3e:70:
f3:88:fc:dc:3e:96:c8:eb:5d:6b:e3:dd:80:79:08:b6:41:c2:
c9:d3:c4:56:50:3c:69:b9:b9:13:9b:17:be:25:d3:37:34:56:
68:09:e8:ca:98:ef:53:2f:53:34:18:f7:ad:9d:4a:98:5d:69:
23:ec:ea:5f:08:05:65:eb:50:30:04:92:54:91:95:ed:f6:bc:
00:c8:b8:27:0d:7a:ca:d9:4b:9a:df:27:16:8f:03:7a:94:c2:
74:66:d8:62:33:36:b1:a0:36:2d:4f:9c:37:57:bd:71:e1:07:
c0:b5:02:c8
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:46 2025 GMT
Not After : Jun 1 10:24:46 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a7:e8:5e:ab:69:f3:41:07:91:4f:7b:cd:ac:f4:1c:20:81:e0:
25:bf:a5:e1:da:d1:46:52:ca:84:c5:16:bd:78:dc:81:27:a7:
fb:df:4f:1f:ca:2d:0f:8b:6f:ea:e7:1c:92:c1:2b:b6:7a:11:
a4:b6:18:00:b6:6f:7c:8f:6c:68:14:07:a8:ad:02:a3:03:92:
6d:ed:99:77:ed:88:e5:c3:8c:b4:20:7b:42:eb:0f:f8:7f:d5:
17:d5:e0:31:38:19:65:cb:d9:c4:da:c1:6b:ea:59:90:0f:e3:
ab:44:c5:c0:95:4e:25:89:e7:59:38:e4:0e:ff:9e:75:df:4f:
10:28:eb:30:f6:2f:a4:91:cb:78:50:46:cc:91:7c:29:da:47:
e1:46:e9:ea:ed:47:55:1c:4a:77:59:3a:31:82:39:5d:b5:db:
0d:16:76:30:81:bd:82:5c:43:54:48:1d:fa:98:e9:5f:f9:57:
f3:cf:4c:c9:6d:d2:87:25:ab:70:cb:87:8f:1c:e1:42:24:1d:
6e:65:8a:76:bd:0c:3b:d6:d7:76:46:63:26:09:20:4e:1c:4d:
da:c3:e7:f7:13:19:d1:69:26:d6:ce:4e:25:ab:98:d6:10:92:
b9:06:dd:67:9d:02:15:5e:93:46:29:45:f7:4c:cf:7b:0d:ee:
8e:3f:17:32
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.54s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,854,193 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 30 10:24:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c8:ab:50:c9:5d:93:f4:ff:3e:e2:97:90:6d:a8:
75:96:30:95:24:bb:f4:41:6d:cf:8e:da:1a:a0:cd:
97:56:b7:c3:86:76:bf:19:00:a6:d8:58:7a:36:9e:
05:79:d9:13:9b:b9:66:fe:31:d8:45:1f:6d:e1:22:
72:10:67:2c:5b:ca:aa:c8:77:e7:57:9b:db:14:08:
b8:5b:7b:10:35:a1:0c:72:cf:28:fe:2a:6b:e6:17:
11:ff:ea:fe:52:0c:e1:5b:89:85:7d:69:16:03:f6:
68:a9:ad:62:da:65:7c:4c:8c:37:23:a5:c0:ca:43:
f9:5e:95:2e:24:5d:5c:4f:38:f5:59:89:cf:f3:b1:
a4:48:3a:40:b5:9c:f1:03:91:2a:7c:b6:e0:9f:4a:
9b:7f:f0:a0:00:07:c5:1a:6c:37:e1:04:5a:6e:00:
25:06:6b:73:96:ca:54:15:44:16:8a:61:83:08:e8:
f6:51:1d:4e:62:5f:34:49:73:64:60:a4:24:44:cc:
64:98:b8:0b:2a:27:39:64:b8:2b:38:f0:8b:af:54:
be:89:01:a6:52:2a:29:a1:06:df:f8:ea:d7:aa:8f:
81:ec:5a:d8:b8:7e:51:3a:d0:e6:c3:ea:2f:a9:5c:
b1:28:0e:51:40:7d:8e:01:25:fb:d2:0e:81:43:6b:
77:4f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
5a:93:bb:3a:a5:dc:af:00:3c:82:e3:e1:49:37:de:7b:e3:a3:
02:29:72:33:9c:42:7e:d3:24:69:59:41:55:d4:2e:23:3f:96:
e5:6d:1c:6a:27:3c:54:94:26:04:e8:a4:e1:33:f7:49:4a:a5:
79:46:5b:7f:be:e6:01:ad:56:bc:f9:31:92:51:b9:d5:0e:d2:
37:00:1c:72:1a:54:81:00:ae:89:db:c2:b4:65:75:c1:2c:fe:
72:47:10:ec:fb:d3:b8:ba:4c:6b:4b:e4:78:fa:c3:b8:d7:6a:
ba:cf:f3:7d:17:96:9d:19:92:5b:08:9b:30:58:d0:ec:fe:69:
f9:fc:2b:ff:ee:80:f6:b4:5a:2e:59:81:55:09:14:64:0f:21:
c5:1f:27:85:b3:07:99:fe:3f:b3:fc:d2:bb:60:dc:af:00:99:
e0:f1:54:67:74:2a:6e:64:e3:aa:ff:9e:bc:31:ef:f9:f4:02:
94:2a:26:e9:08:04:44:67:89:19:cb:1c:fd:b0:bf:2a:e8:98:
b2:bd:69:ae:8b:10:bb:72:f7:90:10:ec:b6:c2:d8:f2:aa:68:
b2:4a:7d:5a:a7:f6:e6:7d:03:25:23:31:c8:62:9f:32:00:06:
02:12:6a:ac:eb:d4:ae:73:c9:0d:f4:84:7b:2e:32:f3:ec:4f:
1b:f8:5e:00
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: May 31 10:24:56 2025 GMT
Not After : Jun 1 10:24:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
77:59:ed:24:97:76:67:f6:75:02:75:8a:e2:11:2a:f4:21:3c:
42:4a:60:c1:21:34:59:e2:bf:23:a7:3d:af:78:c0:cc:cd:ca:
25:db:ee:8a:ad:3b:27:09:6f:df:37:6d:64:ec:3d:e9:bd:9a:
0c:b0:5d:44:a6:60:84:13:7c:b2:d4:51:b5:56:c7:ce:55:94:
17:35:d6:1b:81:e3:d4:5a:43:2b:8b:e4:9d:8d:e1:b6:76:46:
0b:08:c0:ea:cd:76:87:92:cb:fa:f0:1f:b0:f7:d9:f9:46:cf:
d8:c9:17:a9:01:a5:ae:d0:ec:40:ed:15:58:f3:d5:d3:49:57:
34:98:00:40:d3:81:d5:a5:e9:6e:33:b3:ea:2e:24:ca:67:a7:
90:4a:76:f3:9e:65:d3:b8:b0:a4:e7:68:64:61:6f:f7:55:2b:
6b:3e:65:b3:d7:08:be:07:23:26:a6:bb:1c:6f:f7:1c:84:b6:
f6:c6:24:7b:ce:31:c6:fe:19:2a:59:cd:ce:92:fe:02:3f:ee:
fe:ff:40:4d:c3:eb:0d:d0:22:13:0e:20:da:86:c3:51:6e:63:
83:80:86:08:ec:47:f8:63:9b:10:f7:3d:98:84:f5:43:67:34:
d6:e4:11:55:fa:3a:f6:58:1d:2a:a4:66:fa:e3:b7:be:cd:10:
e7:e7:31:66
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
2,214,328 UART:
2,215,228 UART: Running Caliptra ROM ...
2,216,353 UART:
2,216,517 UART: [state] CFI Enabled
2,217,414 UART: [state] LifecycleState = Unprovisioned
2,219,074 UART: [state] DebugLocked = No
2,220,186 UART: [state] WD Timer not started. Device not locked for debugging
2,222,662 UART: [kat] SHA2-256
2,223,333 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,226,358 UART: [kat] ++
2,226,811 UART: [kat] sha1
2,227,326 UART: [kat] SHA2-256
2,228,063 UART: [kat] SHA2-384
2,228,754 UART: [kat] SHA2-512-ACC
2,229,596 UART: [kat] ECC-384
3,772,066 UART: [kat] HMAC-384Kdf
3,802,233 UART: [kat] LMS
4,875,384 UART: [kat] --
4,879,122 UART: [cold-reset] ++
4,880,594 UART: [fht] FHT @ 0x50003400
4,892,064 UART: [idev] ++
4,892,747 UART: [idev] CDI.KEYID = 6
4,893,976 UART: [idev] SUBJECT.KEYID = 7
4,895,074 UART: [idev] UDS.KEYID = 0
4,928,666 UART: [idev] Erasing UDS.KEYID = 0
8,240,313 UART: [idev] Sha1 KeyId Algorithm
8,260,301 UART: [idev] CSR upload begun
8,265,762 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,573,103 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,589,398 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,605,470 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,621,517 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,645,935 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,792,699 UART: [idev] CSR uploaded
10,809,365 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
10,943,403 UART: [idev] --
10,944,048 UART: [ldev] ++
10,944,554 UART: [ldev] CDI.KEYID = 6
10,945,431 UART: [ldev] SUBJECT.KEYID = 5
10,946,479 UART: [ldev] AUTHORITY.KEYID = 7
10,947,664 UART: [ldev] FE.KEYID = 1
10,948,513 UART: [ldev] Erasing FE.KEYID = 1
14,190,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,503,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,519,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,535,391 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,551,264 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,572,894 UART: [ldev] --
16,577,675 UART: [fwproc] Wait for Commands...
16,580,739 UART: [fwproc] Recv command 0x46574c44
16,583,049 UART: [fwproc] Recv'd Img size: 106340 bytes
20,558,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,640,467 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,682,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
20,999,315 >>> mbox cmd response: success
20,999,678 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
21,003,468 UART: [afmc] ++
21,004,082 UART: [afmc] CDI.KEYID = 6
21,005,195 UART: [afmc] SUBJECT.KEYID = 7
21,006,414 UART: [afmc] AUTHORITY.KEYID = 5
24,382,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,697,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,700,173 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,716,249 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,732,319 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,748,276 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,771,030 UART: [afmc] --
26,774,090 UART: [cold-reset] --
26,780,007 UART: [state] Locking Datavault
26,784,230 UART: [state] Locking PCR0, PCR1 and PCR31
26,786,415 UART: [state] Locking ICCM
26,788,546 UART: [exit] Launching FMC @ 0x40000000
26,797,160 UART:
26,797,389 UART: Running Caliptra FMC ...
26,798,487 UART:
26,798,640 UART: [fmc] Received command: 0x10000001
26,800,093 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,819,826 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
26,912,643 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,933,330 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,054,384 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
10,480,915 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
20,574,096 >>> mbox cmd response: success
20,574,567 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,275,483 UART:
26,275,878 UART: Running Caliptra FMC ...
26,276,987 UART:
26,277,145 UART: [fmc] Received command: 0x10000001
26,278,665 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,298,082 UART: [fmc] LDEVID cert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
26,390,861 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,411,505 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,532,574 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,215,918 UART:
2,216,952 UART: Running Caliptra ROM ...
2,218,066 UART:
2,218,222 UART: [state] CFI Enabled
2,219,103 UART: [state] LifecycleState = Unprovisioned
2,220,763 UART: [state] DebugLocked = No
2,221,897 UART: [state] WD Timer not started. Device not locked for debugging
2,224,372 UART: [kat] SHA2-256
2,225,034 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,228,042 UART: [kat] ++
2,228,488 UART: [kat] sha1
2,229,079 UART: [kat] SHA2-256
2,229,744 UART: [kat] SHA2-384
2,230,394 UART: [kat] SHA2-512-ACC
2,231,178 UART: [kat] ECC-384
4,100,210 UART: [kat] HMAC-384Kdf
4,112,972 UART: [kat] LMS
5,186,102 UART: [kat] --
5,189,455 UART: [cold-reset] ++
5,191,757 UART: [fht] FHT @ 0x50003400
5,201,809 UART: [idev] ++
5,202,542 UART: [idev] CDI.KEYID = 6
5,203,736 UART: [idev] SUBJECT.KEYID = 7
5,205,164 UART: [idev] UDS.KEYID = 0
5,223,396 UART: [idev] Erasing UDS.KEYID = 0
8,496,895 UART: [idev] Sha1 KeyId Algorithm
8,517,633 UART: [idev] CSR upload begun
8,523,101 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,814,514 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,830,896 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,846,993 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
10,863,030 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
10,887,370 UART: [idev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
11,034,365 UART: [idev] CSR uploaded
11,051,167 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
11,184,805 UART: [idev] --
11,185,435 UART: [ldev] ++
11,185,930 UART: [ldev] CDI.KEYID = 6
11,186,905 UART: [ldev] SUBJECT.KEYID = 5
11,188,043 UART: [ldev] AUTHORITY.KEYID = 7
11,189,214 UART: [ldev] FE.KEYID = 1
11,190,227 UART: [ldev] Erasing FE.KEYID = 1
14,361,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,654,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,670,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,686,828 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
16,702,722 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
16,722,536 UART: [ldev] --
16,728,018 UART: [fwproc] Wait for Commands...
16,730,480 UART: [fwproc] Recv command 0x46574c44
16,732,793 UART: [fwproc] Recv'd Img size: 106340 bytes
20,710,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,782,765 UART: [fwproc] Load FMC at address 0x40000000 len 11316
20,825,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
21,140,702 >>> mbox cmd response: success
21,141,075 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
21,144,486 UART: [afmc] ++
21,145,059 UART: [afmc] CDI.KEYID = 6
21,146,246 UART: [afmc] SUBJECT.KEYID = 7
21,147,396 UART: [afmc] AUTHORITY.KEYID = 5
24,463,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
26,757,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
26,759,788 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
26,775,902 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,791,952 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
26,807,892 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
26,829,615 UART: [afmc] --
26,832,773 UART: [cold-reset] --
26,837,763 UART: [state] Locking Datavault
26,844,248 UART: [state] Locking PCR0, PCR1 and PCR31
26,845,963 UART: [state] Locking ICCM
26,848,436 UART: [exit] Launching FMC @ 0x40000000
26,857,097 UART:
26,857,327 UART: Running Caliptra FMC ...
26,858,420 UART:
26,858,571 UART: [fmc] Received command: 0x10000001
26,860,020 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,879,762 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
26,972,556 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,993,253 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
27,114,222 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
10,729,498 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
20,725,456 >>> mbox cmd response: success
20,725,962 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
26,363,707 UART:
26,364,126 UART: Running Caliptra FMC ...
26,365,308 UART:
26,365,486 UART: [fmc] Received command: 0x10000001
26,367,021 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
26,386,305 UART: [fmc] LDEVID cert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
26,479,090 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
26,499,763 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
26,620,796 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,211,097 UART:
2,211,996 UART: Running Caliptra ROM ...
2,213,598 UART:
2,213,777 UART: [state] CFI Enabled
2,214,677 UART: [state] LifecycleState = Unprovisioned
2,216,337 UART: [state] DebugLocked = No
2,217,454 UART: [state] WD Timer not started. Device not locked for debugging
2,219,939 UART: [kat] SHA2-256
2,220,605 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,223,624 UART: [kat] ++
2,224,071 UART: [kat] sha1
2,224,610 UART: [kat] SHA2-256
2,225,300 UART: [kat] SHA2-384
2,225,960 UART: [kat] SHA2-512-ACC
2,226,760 UART: [kat] ECC-384
2,953,993 UART: [kat] HMAC-384Kdf
2,976,762 UART: [kat] LMS
3,506,179 UART: [kat] --
3,508,601 UART: [cold-reset] ++
3,510,749 UART: [fht] FHT @ 0x50003400
3,521,679 UART: [idev] ++
3,522,244 UART: [idev] CDI.KEYID = 6
3,523,207 UART: [idev] SUBJECT.KEYID = 7
3,524,368 UART: [idev] UDS.KEYID = 0
3,547,749 UART: [idev] Erasing UDS.KEYID = 0
6,030,700 UART: [idev] Sha1 KeyId Algorithm
6,050,205 UART: [idev] CSR upload begun
6,054,939 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,785,659 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,801,770 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,817,698 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,833,565 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,857,269 UART: [idev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
8,002,995 UART: [idev] CSR uploaded
8,020,596 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
8,155,063 UART: [idev] --
8,155,713 UART: [ldev] ++
8,156,207 UART: [ldev] CDI.KEYID = 6
8,157,112 UART: [ldev] SUBJECT.KEYID = 5
8,158,164 UART: [ldev] AUTHORITY.KEYID = 7
8,159,352 UART: [ldev] FE.KEYID = 1
8,160,394 UART: [ldev] Erasing FE.KEYID = 1
10,573,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,308,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,324,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,340,412 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,356,162 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,375,981 UART: [ldev] --
12,379,884 UART: [fwproc] Wait for Commands...
12,381,337 UART: [fwproc] Recv command 0x46574c44
12,383,437 UART: [fwproc] Recv'd Img size: 106684 bytes
15,698,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,769,120 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,811,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,128,883 >>> mbox cmd response: success
16,129,265 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,133,722 UART: [afmc] ++
16,134,336 UART: [afmc] CDI.KEYID = 6
16,135,252 UART: [afmc] SUBJECT.KEYID = 7
16,136,430 UART: [afmc] AUTHORITY.KEYID = 5
18,661,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,382,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,384,239 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,400,279 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,416,230 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,432,037 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,455,794 UART: [afmc] --
20,459,479 UART: [cold-reset] --
20,463,137 UART: [state] Locking Datavault
20,469,624 UART: [state] Locking PCR0, PCR1 and PCR31
20,471,270 UART: [state] Locking ICCM
20,473,394 UART: [exit] Launching FMC @ 0x40000000
20,481,792 UART:
20,482,032 UART: Running Caliptra FMC ...
20,483,084 UART:
20,483,254 UART: [fmc] Received command: 0x10000001
20,484,724 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,504,454 UART: [fmc] LDEVID cert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
20,597,236 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,617,909 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,739,035 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
7,664,760 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
15,694,974 >>> mbox cmd response: success
15,695,448 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
19,986,838 UART:
19,987,235 UART: Running Caliptra FMC ...
19,988,322 UART:
19,988,475 UART: [fmc] Received command: 0x10000001
19,990,015 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,009,530 UART: [fmc] LDEVID cert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
20,102,396 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,123,090 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,244,322 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,215,530 UART:
2,216,540 UART: Running Caliptra ROM ...
2,217,637 UART:
2,217,793 UART: [state] CFI Enabled
2,218,680 UART: [state] LifecycleState = Unprovisioned
2,220,331 UART: [state] DebugLocked = No
2,221,448 UART: [state] WD Timer not started. Device not locked for debugging
2,223,937 UART: [kat] SHA2-256
2,224,601 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,633 UART: [kat] ++
2,228,088 UART: [kat] sha1
2,228,602 UART: [kat] SHA2-256
2,229,292 UART: [kat] SHA2-384
2,229,955 UART: [kat] SHA2-512-ACC
2,230,778 UART: [kat] ECC-384
3,281,635 UART: [kat] HMAC-384Kdf
3,294,737 UART: [kat] LMS
3,824,248 UART: [kat] --
3,829,098 UART: [cold-reset] ++
3,830,598 UART: [fht] FHT @ 0x50003400
3,840,010 UART: [idev] ++
3,840,581 UART: [idev] CDI.KEYID = 6
3,841,464 UART: [idev] SUBJECT.KEYID = 7
3,842,674 UART: [idev] UDS.KEYID = 0
3,858,755 UART: [idev] Erasing UDS.KEYID = 0
6,317,109 UART: [idev] Sha1 KeyId Algorithm
6,337,887 UART: [idev] CSR upload begun
6,342,597 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,058,534 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,074,621 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,090,580 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,106,404 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,130,100 UART: [idev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
8,276,019 UART: [idev] CSR uploaded
8,293,833 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
8,427,883 UART: [idev] --
8,428,515 UART: [ldev] ++
8,429,012 UART: [ldev] CDI.KEYID = 6
8,429,931 UART: [ldev] SUBJECT.KEYID = 5
8,431,310 UART: [ldev] AUTHORITY.KEYID = 7
8,432,421 UART: [ldev] FE.KEYID = 1
8,433,313 UART: [ldev] Erasing FE.KEYID = 1
10,783,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,500,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,516,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,532,232 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,547,953 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,568,751 UART: [ldev] --
12,573,743 UART: [fwproc] Wait for Commands...
12,575,730 UART: [fwproc] Recv command 0x46574c44
12,577,821 UART: [fwproc] Recv'd Img size: 106684 bytes
15,893,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,962,061 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,004,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,321,754 >>> mbox cmd response: success
16,322,176 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,326,739 UART: [afmc] ++
16,327,337 UART: [afmc] CDI.KEYID = 6
16,328,247 UART: [afmc] SUBJECT.KEYID = 7
16,329,407 UART: [afmc] AUTHORITY.KEYID = 5
18,827,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,545,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,547,597 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,563,709 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,579,648 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,595,462 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,618,535 UART: [afmc] --
20,623,042 UART: [cold-reset] --
20,626,089 UART: [state] Locking Datavault
20,633,711 UART: [state] Locking PCR0, PCR1 and PCR31
20,635,405 UART: [state] Locking ICCM
20,637,390 UART: [exit] Launching FMC @ 0x40000000
20,645,779 UART:
20,646,029 UART: Running Caliptra FMC ...
20,647,132 UART:
20,647,285 UART: [fmc] Received command: 0x10000001
20,648,737 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,668,394 UART: [fmc] LDEVID cert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
20,761,197 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,781,885 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,902,851 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
7,932,000 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
15,892,116 >>> mbox cmd response: success
15,892,589 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,137,680 UART:
20,138,055 UART: Running Caliptra FMC ...
20,139,169 UART:
20,139,326 UART: [fmc] Received command: 0x10000001
20,140,841 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,160,379 UART: [fmc] LDEVID cert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
20,253,257 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,273,914 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,395,195 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,215,483 UART:
2,216,475 UART: Running Caliptra ROM ...
2,217,569 UART:
2,217,746 UART: [state] CFI Enabled
2,218,633 UART: [state] LifecycleState = Unprovisioned
2,220,296 UART: [state] DebugLocked = No
2,221,415 UART: [state] WD Timer not started. Device not locked for debugging
2,223,891 UART: [kat] SHA2-256
2,224,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,578 UART: [kat] ++
2,228,028 UART: [kat] sha1
2,228,544 UART: [kat] SHA2-256
2,229,200 UART: [kat] SHA2-384
2,229,857 UART: [kat] SHA2-512-ACC
2,230,689 UART: [kat] ECC-384
2,944,581 UART: [kat] HMAC-384Kdf
2,970,524 UART: [kat] LMS
3,499,987 UART: [kat] --
3,505,547 UART: [cold-reset] ++
3,507,606 UART: [fht] FHT @ 0x50003400
3,518,810 UART: [idev] ++
3,519,376 UART: [idev] CDI.KEYID = 6
3,520,256 UART: [idev] SUBJECT.KEYID = 7
3,521,467 UART: [idev] UDS.KEYID = 0
3,541,863 UART: [idev] Erasing UDS.KEYID = 0
6,024,237 UART: [idev] Sha1 KeyId Algorithm
6,044,887 UART: [idev] CSR upload begun
6,049,616 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,779,776 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,795,837 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,811,777 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,827,643 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,851,314 UART: [idev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
7,997,018 UART: [idev] CSR uploaded
8,014,671 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
8,149,041 UART: [idev] --
8,149,691 UART: [ldev] ++
8,150,188 UART: [ldev] CDI.KEYID = 6
8,151,090 UART: [ldev] SUBJECT.KEYID = 5
8,152,145 UART: [ldev] AUTHORITY.KEYID = 7
8,153,261 UART: [ldev] FE.KEYID = 1
8,154,096 UART: [ldev] Erasing FE.KEYID = 1
10,562,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,279,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,295,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,311,212 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,327,007 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,348,186 UART: [ldev] --
12,353,345 UART: [fwproc] Wait for Commands...
12,355,605 UART: [fwproc] Recv command 0x46574c44
12,357,700 UART: [fwproc] Recv'd Img size: 106684 bytes
15,664,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,741,406 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,783,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,101,251 >>> mbox cmd response: success
16,101,634 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,106,293 UART: [afmc] ++
16,106,869 UART: [afmc] CDI.KEYID = 6
16,107,750 UART: [afmc] SUBJECT.KEYID = 7
16,108,970 UART: [afmc] AUTHORITY.KEYID = 5
18,639,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,363,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,365,596 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,381,698 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,397,623 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,413,493 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,435,093 UART: [afmc] --
20,438,871 UART: [cold-reset] --
20,443,545 UART: [state] Locking Datavault
20,449,929 UART: [state] Locking PCR0, PCR1 and PCR31
20,451,628 UART: [state] Locking ICCM
20,453,993 UART: [exit] Launching FMC @ 0x40000000
20,462,387 UART:
20,462,623 UART: Running Caliptra FMC ...
20,463,726 UART:
20,463,883 UART: [fmc] Received command: 0x10000001
20,465,334 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,485,012 UART: [fmc] LDEVID cert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
20,577,821 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,598,507 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,719,529 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
7,684,505 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
15,711,184 >>> mbox cmd response: success
15,711,676 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,003,360 UART:
20,003,764 UART: Running Caliptra FMC ...
20,004,956 UART:
20,005,144 UART: [fmc] Received command: 0x10000001
20,006,682 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,025,978 UART: [fmc] LDEVID cert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
20,118,872 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,139,563 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,260,823 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
2,218,694 UART:
2,219,643 UART: Running Caliptra ROM ...
2,220,743 UART:
2,220,902 UART: [state] CFI Enabled
2,221,795 UART: [state] LifecycleState = Unprovisioned
2,223,442 UART: [state] DebugLocked = No
2,224,558 UART: [state] WD Timer not started. Device not locked for debugging
2,227,278 UART: [kat] SHA2-256
2,227,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,231,006 UART: [kat] ++
2,231,468 UART: [kat] sha1
2,231,982 UART: [kat] SHA2-256
2,232,670 UART: [kat] SHA2-384
2,233,360 UART: [kat] SHA2-512-ACC
2,234,162 UART: [kat] ECC-384
3,285,211 UART: [kat] HMAC-384Kdf
3,297,818 UART: [kat] LMS
3,827,352 UART: [kat] --
3,832,043 UART: [cold-reset] ++
3,833,324 UART: [fht] FHT @ 0x50003400
3,844,519 UART: [idev] ++
3,845,077 UART: [idev] CDI.KEYID = 6
3,845,992 UART: [idev] SUBJECT.KEYID = 7
3,847,202 UART: [idev] UDS.KEYID = 0
3,864,062 UART: [idev] Erasing UDS.KEYID = 0
6,325,242 UART: [idev] Sha1 KeyId Algorithm
6,344,855 UART: [idev] CSR upload begun
6,349,514 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,065,734 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,081,793 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,097,771 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,113,611 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,137,300 UART: [idev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
8,283,198 UART: [idev] CSR uploaded
8,300,924 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
8,435,120 UART: [idev] --
8,435,764 UART: [ldev] ++
8,436,262 UART: [ldev] CDI.KEYID = 6
8,437,164 UART: [ldev] SUBJECT.KEYID = 5
8,438,217 UART: [ldev] AUTHORITY.KEYID = 7
8,439,426 UART: [ldev] FE.KEYID = 1
8,440,303 UART: [ldev] Erasing FE.KEYID = 1
10,800,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,518,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,534,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,550,337 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,566,074 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,585,369 UART: [ldev] --
12,590,737 UART: [fwproc] Wait for Commands...
12,593,264 UART: [fwproc] Recv command 0x46574c44
12,595,366 UART: [fwproc] Recv'd Img size: 106684 bytes
15,903,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,389 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,023,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,340,367 >>> mbox cmd response: success
16,340,775 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,343,894 UART: [afmc] ++
16,344,475 UART: [afmc] CDI.KEYID = 6
16,345,541 UART: [afmc] SUBJECT.KEYID = 7
16,346,591 UART: [afmc] AUTHORITY.KEYID = 5
18,846,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,565,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,567,821 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,583,876 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,599,808 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,615,638 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,637,331 UART: [afmc] --
20,641,844 UART: [cold-reset] --
20,645,702 UART: [state] Locking Datavault
20,651,711 UART: [state] Locking PCR0, PCR1 and PCR31
20,653,408 UART: [state] Locking ICCM
20,655,177 UART: [exit] Launching FMC @ 0x40000000
20,663,534 UART:
20,663,769 UART: Running Caliptra FMC ...
20,664,866 UART:
20,665,022 UART: [fmc] Received command: 0x10000001
20,666,478 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,686,193 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,778,998 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,799,679 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,920,671 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
7,938,346 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
15,896,989 >>> mbox cmd response: success
15,897,459 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,143,174 UART:
20,143,556 UART: Running Caliptra FMC ...
20,144,682 UART:
20,144,839 UART: [fmc] Received command: 0x10000001
20,146,364 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,165,851 UART: [fmc] LDEVID cert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
20,258,737 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,279,450 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,400,730 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,182,229 UART: [idev] Erasing UDS.KEYID = 0
1,199,311 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] CSR upload begun
1,209,464 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,287 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,995 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,880 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,596 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,061 UART: [idev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
1,297,851 UART: [idev] CSR uploaded
1,300,896 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,301,065 UART: [idev] --
1,301,994 UART: [ldev] ++
1,302,162 UART: [ldev] CDI.KEYID = 6
1,302,526 UART: [ldev] SUBJECT.KEYID = 5
1,302,953 UART: [ldev] AUTHORITY.KEYID = 7
1,303,416 UART: [ldev] FE.KEYID = 1
1,308,730 UART: [ldev] Erasing FE.KEYID = 1
1,334,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,390 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,114 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,343 UART: [ldev] --
1,373,689 UART: [fwproc] Wait for Commands...
1,374,374 UART: [fwproc] Recv command 0x46574c44
1,375,107 UART: [fwproc] Recv'd Img size: 106684 bytes
2,584,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,844 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,629,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,765,419 >>> mbox cmd response: success
2,765,419 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,766,482 UART: [afmc] ++
2,766,650 UART: [afmc] CDI.KEYID = 6
2,767,013 UART: [afmc] SUBJECT.KEYID = 7
2,767,439 UART: [afmc] AUTHORITY.KEYID = 5
2,802,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,820,302 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,826,022 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,831,915 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,837,620 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,845,421 UART: [afmc] --
2,846,403 UART: [cold-reset] --
2,847,293 UART: [state] Locking Datavault
2,848,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,818 UART: [state] Locking ICCM
2,849,282 UART: [exit] Launching FMC @ 0x40000000
2,854,579 UART:
2,854,595 UART: Running Caliptra FMC ...
2,855,003 UART:
2,855,141 UART: [fmc] Received command: 0x10000001
2,856,234 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,875,094 UART: [fmc] LDEVID cert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
2,966,071 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,985,662 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,104,197 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,712 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,541,914 >>> mbox cmd response: success
2,541,914 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,604,653 UART:
2,604,669 UART: Running Caliptra FMC ...
2,605,077 UART:
2,605,215 UART: [fmc] Received command: 0x10000001
2,606,308 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,168 UART: [fmc] LDEVID cert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
2,716,145 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,735,736 UART: [fmc] FMCALIAS cert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
2,854,271 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,784 UART: [fht] FHT @ 0x50003400
1,173,536 UART: [idev] ++
1,173,704 UART: [idev] CDI.KEYID = 6
1,174,065 UART: [idev] SUBJECT.KEYID = 7
1,174,490 UART: [idev] UDS.KEYID = 0
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,250 UART: [idev] Sha1 KeyId Algorithm
1,207,558 UART: [idev] CSR upload begun
1,209,337 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,254 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,962 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,847 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,563 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,028 UART: [idev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
1,297,818 UART: [idev] CSR uploaded
1,300,863 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,301,032 UART: [idev] --
1,302,115 UART: [ldev] ++
1,302,283 UART: [ldev] CDI.KEYID = 6
1,302,647 UART: [ldev] SUBJECT.KEYID = 5
1,303,074 UART: [ldev] AUTHORITY.KEYID = 7
1,303,537 UART: [ldev] FE.KEYID = 1
1,308,825 UART: [ldev] Erasing FE.KEYID = 1
1,334,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,103 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,827 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,968 UART: [ldev] --
1,374,316 UART: [fwproc] Wait for Commands...
1,374,891 UART: [fwproc] Recv command 0x46574c44
1,375,624 UART: [fwproc] Recv'd Img size: 106684 bytes
2,585,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,263 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,630,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,765,836 >>> mbox cmd response: success
2,765,836 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,003 UART: [afmc] ++
2,767,171 UART: [afmc] CDI.KEYID = 6
2,767,534 UART: [afmc] SUBJECT.KEYID = 7
2,767,960 UART: [afmc] AUTHORITY.KEYID = 5
2,804,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,651 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,371 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,264 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,838,969 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,846,784 UART: [afmc] --
2,847,834 UART: [cold-reset] --
2,848,620 UART: [state] Locking Datavault
2,849,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,271 UART: [state] Locking ICCM
2,850,885 UART: [exit] Launching FMC @ 0x40000000
2,856,182 UART:
2,856,198 UART: Running Caliptra FMC ...
2,856,606 UART:
2,856,744 UART: [fmc] Received command: 0x10000001
2,857,837 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,876,697 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,967,674 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,265 UART: [fmc] FMCALIAS cert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
3,105,800 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,029 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,541,331 >>> mbox cmd response: success
2,541,331 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,603,482 UART:
2,603,498 UART: Running Caliptra FMC ...
2,603,906 UART:
2,604,044 UART: [fmc] Received command: 0x10000001
2,605,137 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,623,997 UART: [fmc] LDEVID cert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
2,714,974 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,734,565 UART: [fmc] FMCALIAS cert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
2,853,100 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,064 UART: [kat] SHA2-256
891,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
900,273 UART: [kat] SHA2-256
902,213 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,652 UART: [kat] HMAC-384Kdf
921,236 UART: [kat] LMS
1,169,548 UART: [kat] --
1,170,499 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,765 UART: [idev] ++
1,173,933 UART: [idev] CDI.KEYID = 6
1,174,294 UART: [idev] SUBJECT.KEYID = 7
1,174,719 UART: [idev] UDS.KEYID = 0
1,182,731 UART: [idev] Erasing UDS.KEYID = 0
1,199,887 UART: [idev] Sha1 KeyId Algorithm
1,208,241 UART: [idev] CSR upload begun
1,210,020 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,573 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,281 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,166 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,882 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,347 UART: [idev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
1,298,137 UART: [idev] CSR uploaded
1,301,182 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,301,351 UART: [idev] --
1,302,454 UART: [ldev] ++
1,302,622 UART: [ldev] CDI.KEYID = 6
1,302,986 UART: [ldev] SUBJECT.KEYID = 5
1,303,413 UART: [ldev] AUTHORITY.KEYID = 7
1,303,876 UART: [ldev] FE.KEYID = 1
1,308,846 UART: [ldev] Erasing FE.KEYID = 1
1,335,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,290 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,014 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,093 UART: [ldev] --
1,374,537 UART: [fwproc] Wait for Commands...
1,375,282 UART: [fwproc] Recv command 0x46574c44
1,376,015 UART: [fwproc] Recv'd Img size: 106684 bytes
2,585,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,640 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,630,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,766,209 >>> mbox cmd response: success
2,766,209 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,767,458 UART: [afmc] ++
2,767,626 UART: [afmc] CDI.KEYID = 6
2,767,989 UART: [afmc] SUBJECT.KEYID = 7
2,768,415 UART: [afmc] AUTHORITY.KEYID = 5
2,804,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,804 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,524 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,417 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,839,122 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,847,065 UART: [afmc] --
2,848,147 UART: [cold-reset] --
2,849,047 UART: [state] Locking Datavault
2,850,226 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,830 UART: [state] Locking ICCM
2,851,326 UART: [exit] Launching FMC @ 0x40000000
2,856,623 UART:
2,856,639 UART: Running Caliptra FMC ...
2,857,047 UART:
2,857,185 UART: [fmc] Received command: 0x10000001
2,858,278 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,877,138 UART: [fmc] LDEVID cert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
2,968,115 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,987,706 UART: [fmc] FMCALIAS cert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
3,106,241 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,586 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,543,850 >>> mbox cmd response: success
2,543,850 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,447 UART:
2,605,463 UART: Running Caliptra FMC ...
2,605,871 UART:
2,606,009 UART: [fmc] Received command: 0x10000001
2,607,102 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,962 UART: [fmc] LDEVID cert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
2,716,939 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,530 UART: [fmc] FMCALIAS cert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
2,855,065 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Unprovisioned
86,528 UART: [state] DebugLocked = No
87,168 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,542 UART: [kat] SHA2-256
902,482 UART: [kat] SHA2-384
905,189 UART: [kat] SHA2-512-ACC
907,090 UART: [kat] ECC-384
916,441 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,352 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,928 UART: [idev] Sha1 KeyId Algorithm
1,208,240 UART: [idev] CSR upload begun
1,210,019 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,480 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,188 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,073 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,789 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,254 UART: [idev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
1,298,044 UART: [idev] CSR uploaded
1,301,089 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,301,258 UART: [idev] --
1,302,389 UART: [ldev] ++
1,302,557 UART: [ldev] CDI.KEYID = 6
1,302,921 UART: [ldev] SUBJECT.KEYID = 5
1,303,348 UART: [ldev] AUTHORITY.KEYID = 7
1,303,811 UART: [ldev] FE.KEYID = 1
1,308,927 UART: [ldev] Erasing FE.KEYID = 1
1,335,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,825 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,549 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,638 UART: [ldev] --
1,375,058 UART: [fwproc] Wait for Commands...
1,375,735 UART: [fwproc] Recv command 0x46574c44
1,376,468 UART: [fwproc] Recv'd Img size: 106684 bytes
2,586,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,549 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,631,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,767,242 >>> mbox cmd response: success
2,767,242 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,768,349 UART: [afmc] ++
2,768,517 UART: [afmc] CDI.KEYID = 6
2,768,880 UART: [afmc] SUBJECT.KEYID = 7
2,769,306 UART: [afmc] AUTHORITY.KEYID = 5
2,804,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,820,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,821,569 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,827,289 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,833,182 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,838,887 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,846,758 UART: [afmc] --
2,847,742 UART: [cold-reset] --
2,848,404 UART: [state] Locking Datavault
2,849,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,849,981 UART: [state] Locking ICCM
2,850,609 UART: [exit] Launching FMC @ 0x40000000
2,855,906 UART:
2,855,922 UART: Running Caliptra FMC ...
2,856,330 UART:
2,856,468 UART: [fmc] Received command: 0x10000001
2,857,561 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,876,421 UART: [fmc] LDEVID cert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
2,967,398 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,986,989 UART: [fmc] FMCALIAS cert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
3,105,524 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,271 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,542,857 >>> mbox cmd response: success
2,542,857 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,605,176 UART:
2,605,192 UART: Running Caliptra FMC ...
2,605,600 UART:
2,605,738 UART: [fmc] Received command: 0x10000001
2,606,831 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,625,691 UART: [fmc] LDEVID cert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
2,716,668 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,736,259 UART: [fmc] FMCALIAS cert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
2,854,794 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,657 UART: [fht] FHT @ 0x50003400
1,173,447 UART: [idev] ++
1,173,615 UART: [idev] CDI.KEYID = 6
1,173,976 UART: [idev] SUBJECT.KEYID = 7
1,174,401 UART: [idev] UDS.KEYID = 0
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,259 UART: [idev] CSR upload begun
1,209,038 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,853 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,561 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,446 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,162 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,627 UART: [idev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
1,297,417 UART: [idev] CSR uploaded
1,300,462 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,300,631 UART: [idev] --
1,301,730 UART: [ldev] ++
1,301,898 UART: [ldev] CDI.KEYID = 6
1,302,262 UART: [ldev] SUBJECT.KEYID = 5
1,302,689 UART: [ldev] AUTHORITY.KEYID = 7
1,303,152 UART: [ldev] FE.KEYID = 1
1,308,286 UART: [ldev] Erasing FE.KEYID = 1
1,333,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,986 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,710 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,803 UART: [ldev] --
1,373,095 UART: [fwproc] Wait for Commands...
1,373,854 UART: [fwproc] Recv command 0x46574c44
1,374,587 UART: [fwproc] Recv'd Img size: 106684 bytes
2,583,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,582 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,629,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,765,149 >>> mbox cmd response: success
2,765,149 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,766,190 UART: [afmc] ++
2,766,358 UART: [afmc] CDI.KEYID = 6
2,766,721 UART: [afmc] SUBJECT.KEYID = 7
2,767,147 UART: [afmc] AUTHORITY.KEYID = 5
2,802,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,819,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,819,892 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,825,612 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,831,505 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,837,210 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,845,031 UART: [afmc] --
2,846,057 UART: [cold-reset] --
2,846,983 UART: [state] Locking Datavault
2,848,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,848,852 UART: [state] Locking ICCM
2,849,350 UART: [exit] Launching FMC @ 0x40000000
2,854,647 UART:
2,854,663 UART: Running Caliptra FMC ...
2,855,071 UART:
2,855,209 UART: [fmc] Received command: 0x10000001
2,856,302 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,875,162 UART: [fmc] LDEVID cert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
2,966,139 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,985,730 UART: [fmc] FMCALIAS cert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
3,104,265 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,105,138 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,538,568 >>> mbox cmd response: success
2,538,568 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,600,253 UART:
2,600,269 UART: Running Caliptra FMC ...
2,600,677 UART:
2,600,815 UART: [fmc] Received command: 0x10000001
2,601,908 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,620,768 UART: [fmc] LDEVID cert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
2,711,745 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,731,336 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,849,871 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,258 UART: [kat] SHA2-256
902,198 UART: [kat] SHA2-384
905,063 UART: [kat] SHA2-512-ACC
906,964 UART: [kat] ECC-384
917,055 UART: [kat] HMAC-384Kdf
921,623 UART: [kat] LMS
1,169,935 UART: [kat] --
1,170,676 UART: [cold-reset] ++
1,171,222 UART: [fht] FHT @ 0x50003400
1,173,870 UART: [idev] ++
1,174,038 UART: [idev] CDI.KEYID = 6
1,174,399 UART: [idev] SUBJECT.KEYID = 7
1,174,824 UART: [idev] UDS.KEYID = 0
1,182,712 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,074 UART: [idev] CSR upload begun
1,209,853 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,648 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,356 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,241 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,957 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,246,422 UART: [idev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
1,298,212 UART: [idev] CSR uploaded
1,301,257 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,301,426 UART: [idev] --
1,302,369 UART: [ldev] ++
1,302,537 UART: [ldev] CDI.KEYID = 6
1,302,901 UART: [ldev] SUBJECT.KEYID = 5
1,303,328 UART: [ldev] AUTHORITY.KEYID = 7
1,303,791 UART: [ldev] FE.KEYID = 1
1,309,015 UART: [ldev] Erasing FE.KEYID = 1
1,335,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,355,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,361,187 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,366,911 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,373,816 UART: [ldev] --
1,375,318 UART: [fwproc] Wait for Commands...
1,375,989 UART: [fwproc] Recv command 0x46574c44
1,376,722 UART: [fwproc] Recv'd Img size: 106684 bytes
2,586,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,801 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,632,884 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,528 >>> mbox cmd response: success
2,768,528 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,769,665 UART: [afmc] ++
2,769,833 UART: [afmc] CDI.KEYID = 6
2,770,196 UART: [afmc] SUBJECT.KEYID = 7
2,770,622 UART: [afmc] AUTHORITY.KEYID = 5
2,806,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,959 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,829,679 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,835,572 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,841,277 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,849,144 UART: [afmc] --
2,850,158 UART: [cold-reset] --
2,851,104 UART: [state] Locking Datavault
2,852,171 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,775 UART: [state] Locking ICCM
2,853,217 UART: [exit] Launching FMC @ 0x40000000
2,858,514 UART:
2,858,530 UART: Running Caliptra FMC ...
2,858,938 UART:
2,859,076 UART: [fmc] Received command: 0x10000001
2,860,169 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,879,029 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,970,006 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,989,597 UART: [fmc] FMCALIAS cert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
3,108,132 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,529 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,540,425 >>> mbox cmd response: success
2,540,425 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,602,086 UART:
2,602,102 UART: Running Caliptra FMC ...
2,602,510 UART:
2,602,648 UART: [fmc] Received command: 0x10000001
2,603,741 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,622,601 UART: [fmc] LDEVID cert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
2,713,578 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,733,169 UART: [fmc] FMCALIAS cert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
2,851,704 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
5,516 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,212 UART:
192,617 UART: Running Caliptra ROM ...
193,804 UART:
193,957 UART: [state] CFI Enabled
262,001 UART: [state] LifecycleState = Unprovisioned
264,353 UART: [state] DebugLocked = No
267,188 UART: [state] WD Timer not started. Device not locked for debugging
272,677 UART: [kat] SHA2-256
454,619 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,106 UART: [kat] ++
466,658 UART: [kat] sha1
476,189 UART: [kat] SHA2-256
479,216 UART: [kat] SHA2-384
485,082 UART: [kat] SHA2-512-ACC
487,701 UART: [kat] ECC-384
3,779,948 UART: [kat] HMAC-384Kdf
3,805,834 UART: [kat] LMS
4,879,009 UART: [kat] --
4,883,516 UART: [cold-reset] ++
4,885,564 UART: [fht] FHT @ 0x50003400
4,898,009 UART: [idev] ++
4,898,714 UART: [idev] CDI.KEYID = 6
4,899,900 UART: [idev] SUBJECT.KEYID = 7
4,900,999 UART: [idev] UDS.KEYID = 0
4,932,595 UART: [idev] Erasing UDS.KEYID = 0
8,245,340 UART: [idev] Sha1 KeyId Algorithm
8,266,682 UART: [idev] --
8,271,761 UART: [ldev] ++
8,273,043 UART: [ldev] CDI.KEYID = 6
8,273,980 UART: [ldev] SUBJECT.KEYID = 5
8,275,094 UART: [ldev] AUTHORITY.KEYID = 7
8,276,271 UART: [ldev] FE.KEYID = 1
8,319,478 UART: [ldev] Erasing FE.KEYID = 1
11,656,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,906 UART: [ldev] --
14,037,673 UART: [fwproc] Wait for Commands...
14,039,891 UART: [fwproc] Recv command 0x46574c44
14,042,216 UART: [fwproc] Recv'd Img size: 113844 bytes
16,990,881 UART: ROM Fatal Error: 0x000B0014
16,994,307 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
5,382 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,768,318 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
6,465 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,338 UART:
192,723 UART: Running Caliptra ROM ...
193,910 UART:
603,337 UART: [state] CFI Enabled
614,429 UART: [state] LifecycleState = Unprovisioned
616,415 UART: [state] DebugLocked = No
618,887 UART: [state] WD Timer not started. Device not locked for debugging
623,037 UART: [kat] SHA2-256
805,046 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,578 UART: [kat] ++
817,159 UART: [kat] sha1
828,145 UART: [kat] SHA2-256
831,153 UART: [kat] SHA2-384
837,173 UART: [kat] SHA2-512-ACC
839,790 UART: [kat] ECC-384
4,094,015 UART: [kat] HMAC-384Kdf
4,107,149 UART: [kat] LMS
5,180,260 UART: [kat] --
5,185,850 UART: [cold-reset] ++
5,187,515 UART: [fht] FHT @ 0x50003400
5,198,064 UART: [idev] ++
5,198,799 UART: [idev] CDI.KEYID = 6
5,199,977 UART: [idev] SUBJECT.KEYID = 7
5,201,410 UART: [idev] UDS.KEYID = 0
5,220,732 UART: [idev] Erasing UDS.KEYID = 0
8,491,609 UART: [idev] Sha1 KeyId Algorithm
8,513,482 UART: [idev] --
8,517,577 UART: [ldev] ++
8,518,142 UART: [ldev] CDI.KEYID = 6
8,519,376 UART: [ldev] SUBJECT.KEYID = 5
8,520,815 UART: [ldev] AUTHORITY.KEYID = 7
8,522,296 UART: [ldev] FE.KEYID = 1
8,534,039 UART: [ldev] Erasing FE.KEYID = 1
11,827,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,201 UART: [ldev] --
14,191,079 UART: [fwproc] Wait for Commands...
14,193,390 UART: [fwproc] Recv command 0x46574c44
14,195,651 UART: [fwproc] Recv'd Img size: 113844 bytes
17,135,667 UART: ROM Fatal Error: 0x000B0014
17,139,141 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
5,913 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,958,356 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
5,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,152 UART:
192,556 UART: Running Caliptra ROM ...
193,741 UART:
193,899 UART: [state] CFI Enabled
266,373 UART: [state] LifecycleState = Unprovisioned
268,225 UART: [state] DebugLocked = No
269,628 UART: [state] WD Timer not started. Device not locked for debugging
272,814 UART: [kat] SHA2-256
451,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,492 UART: [kat] ++
463,996 UART: [kat] sha1
474,815 UART: [kat] SHA2-256
477,851 UART: [kat] SHA2-384
484,268 UART: [kat] SHA2-512-ACC
487,259 UART: [kat] ECC-384
2,947,699 UART: [kat] HMAC-384Kdf
2,970,631 UART: [kat] LMS
3,500,083 UART: [kat] --
3,505,862 UART: [cold-reset] ++
3,506,721 UART: [fht] FHT @ 0x50003400
3,518,215 UART: [idev] ++
3,518,772 UART: [idev] CDI.KEYID = 6
3,519,653 UART: [idev] SUBJECT.KEYID = 7
3,520,864 UART: [idev] UDS.KEYID = 0
3,542,203 UART: [idev] Erasing UDS.KEYID = 0
6,029,635 UART: [idev] Sha1 KeyId Algorithm
6,051,578 UART: [idev] --
6,055,901 UART: [ldev] ++
6,056,494 UART: [ldev] CDI.KEYID = 6
6,057,406 UART: [ldev] SUBJECT.KEYID = 5
6,058,568 UART: [ldev] AUTHORITY.KEYID = 7
6,059,804 UART: [ldev] FE.KEYID = 1
6,105,848 UART: [ldev] Erasing FE.KEYID = 1
8,612,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,945 UART: [ldev] --
10,417,777 UART: [fwproc] Wait for Commands...
10,420,749 UART: [fwproc] Recv command 0x46574c44
10,422,833 UART: [fwproc] Recv'd Img size: 114168 bytes
12,704,925 UART: ROM Fatal Error: 0x000B0014
12,708,017 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
5,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,508,940 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
7,288 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
193,309 UART:
193,682 UART: Running Caliptra ROM ...
194,870 UART:
604,258 UART: [state] CFI Enabled
620,026 UART: [state] LifecycleState = Unprovisioned
621,862 UART: [state] DebugLocked = No
623,185 UART: [state] WD Timer not started. Device not locked for debugging
626,694 UART: [kat] SHA2-256
805,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,427 UART: [kat] ++
817,956 UART: [kat] sha1
829,540 UART: [kat] SHA2-256
832,562 UART: [kat] SHA2-384
838,697 UART: [kat] SHA2-512-ACC
841,622 UART: [kat] ECC-384
3,285,788 UART: [kat] HMAC-384Kdf
3,297,518 UART: [kat] LMS
3,826,994 UART: [kat] --
3,831,491 UART: [cold-reset] ++
3,833,800 UART: [fht] FHT @ 0x50003400
3,845,213 UART: [idev] ++
3,845,826 UART: [idev] CDI.KEYID = 6
3,846,744 UART: [idev] SUBJECT.KEYID = 7
3,847,902 UART: [idev] UDS.KEYID = 0
3,864,258 UART: [idev] Erasing UDS.KEYID = 0
6,317,806 UART: [idev] Sha1 KeyId Algorithm
6,339,132 UART: [idev] --
6,342,566 UART: [ldev] ++
6,343,165 UART: [ldev] CDI.KEYID = 6
6,344,072 UART: [ldev] SUBJECT.KEYID = 5
6,345,233 UART: [ldev] AUTHORITY.KEYID = 7
6,346,463 UART: [ldev] FE.KEYID = 1
6,358,241 UART: [ldev] Erasing FE.KEYID = 1
8,831,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,722 UART: [ldev] --
10,623,631 UART: [fwproc] Wait for Commands...
10,625,345 UART: [fwproc] Recv command 0x46574c44
10,627,387 UART: [fwproc] Recv'd Img size: 114168 bytes
12,920,179 UART: ROM Fatal Error: 0x000B0014
12,923,256 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
6,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,694,698 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,272 UART:
192,657 UART: Running Caliptra ROM ...
193,855 UART:
194,008 UART: [state] CFI Enabled
264,271 UART: [state] LifecycleState = Unprovisioned
266,142 UART: [state] DebugLocked = No
267,305 UART: [state] WD Timer not started. Device not locked for debugging
271,196 UART: [kat] SHA2-256
450,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,892 UART: [kat] ++
462,429 UART: [kat] sha1
473,958 UART: [kat] SHA2-256
476,969 UART: [kat] SHA2-384
482,946 UART: [kat] SHA2-512-ACC
485,947 UART: [kat] ECC-384
2,949,658 UART: [kat] HMAC-384Kdf
2,971,948 UART: [kat] LMS
3,501,422 UART: [kat] --
3,505,575 UART: [cold-reset] ++
3,507,021 UART: [fht] FHT @ 0x50003400
3,519,085 UART: [idev] ++
3,519,662 UART: [idev] CDI.KEYID = 6
3,520,568 UART: [idev] SUBJECT.KEYID = 7
3,521,788 UART: [idev] UDS.KEYID = 0
3,543,606 UART: [idev] Erasing UDS.KEYID = 0
6,025,903 UART: [idev] Sha1 KeyId Algorithm
6,050,005 UART: [idev] --
6,053,961 UART: [ldev] ++
6,054,543 UART: [ldev] CDI.KEYID = 6
6,055,450 UART: [ldev] SUBJECT.KEYID = 5
6,056,634 UART: [ldev] AUTHORITY.KEYID = 7
6,057,873 UART: [ldev] FE.KEYID = 1
6,099,473 UART: [ldev] Erasing FE.KEYID = 1
8,603,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,832 UART: [ldev] --
10,412,250 UART: [fwproc] Wait for Commands...
10,414,519 UART: [fwproc] Recv command 0x46574c44
10,416,567 UART: [fwproc] Recv'd Img size: 114168 bytes
12,707,927 UART: ROM Fatal Error: 0x000B0014
12,711,016 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
5,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,488,687 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
6,305 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,479 UART:
193,044 UART: Running Caliptra ROM ...
194,228 UART:
603,737 UART: [state] CFI Enabled
614,754 UART: [state] LifecycleState = Unprovisioned
616,589 UART: [state] DebugLocked = No
619,046 UART: [state] WD Timer not started. Device not locked for debugging
622,615 UART: [kat] SHA2-256
801,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,347 UART: [kat] ++
813,871 UART: [kat] sha1
825,238 UART: [kat] SHA2-256
828,283 UART: [kat] SHA2-384
834,155 UART: [kat] SHA2-512-ACC
837,105 UART: [kat] ECC-384
3,280,770 UART: [kat] HMAC-384Kdf
3,293,571 UART: [kat] LMS
3,823,079 UART: [kat] --
3,828,336 UART: [cold-reset] ++
3,829,461 UART: [fht] FHT @ 0x50003400
3,840,487 UART: [idev] ++
3,841,054 UART: [idev] CDI.KEYID = 6
3,841,985 UART: [idev] SUBJECT.KEYID = 7
3,843,141 UART: [idev] UDS.KEYID = 0
3,860,901 UART: [idev] Erasing UDS.KEYID = 0
6,318,789 UART: [idev] Sha1 KeyId Algorithm
6,341,316 UART: [idev] --
6,344,833 UART: [ldev] ++
6,345,451 UART: [ldev] CDI.KEYID = 6
6,346,370 UART: [ldev] SUBJECT.KEYID = 5
6,347,495 UART: [ldev] AUTHORITY.KEYID = 7
6,348,726 UART: [ldev] FE.KEYID = 1
6,357,536 UART: [ldev] Erasing FE.KEYID = 1
8,830,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,332 UART: [ldev] --
10,624,321 UART: [fwproc] Wait for Commands...
10,626,637 UART: [fwproc] Recv command 0x46574c44
10,628,737 UART: [fwproc] Recv'd Img size: 114168 bytes
12,921,178 UART: ROM Fatal Error: 0x000B0014
12,924,305 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
6,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,700,761 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,199,015 UART: [idev] Sha1 KeyId Algorithm
1,207,945 UART: [idev] --
1,209,112 UART: [ldev] ++
1,209,280 UART: [ldev] CDI.KEYID = 6
1,209,644 UART: [ldev] SUBJECT.KEYID = 5
1,210,071 UART: [ldev] AUTHORITY.KEYID = 7
1,210,534 UART: [ldev] FE.KEYID = 1
1,215,384 UART: [ldev] Erasing FE.KEYID = 1
1,241,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,922 UART: [ldev] --
1,281,286 UART: [fwproc] Wait for Commands...
1,281,995 UART: [fwproc] Recv command 0x46574c44
1,282,728 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,055 UART: ROM Fatal Error: 0x000B0014
1,551,212 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,211 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,296 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,310 UART: [idev] ++
1,173,478 UART: [idev] CDI.KEYID = 6
1,173,839 UART: [idev] SUBJECT.KEYID = 7
1,174,264 UART: [idev] UDS.KEYID = 0
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,883 UART: [fwproc] Wait for Commands...
1,282,622 UART: [fwproc] Recv command 0x46574c44
1,283,355 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,450 UART: ROM Fatal Error: 0x000B0014
1,550,607 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,340 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,616 UART: [state] LifecycleState = Unprovisioned
86,271 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
88,154 UART: [kat] SHA2-256
891,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,259 UART: [kat] SHA2-256
902,199 UART: [kat] SHA2-384
904,832 UART: [kat] SHA2-512-ACC
906,733 UART: [kat] ECC-384
916,422 UART: [kat] HMAC-384Kdf
921,086 UART: [kat] LMS
1,169,398 UART: [kat] --
1,170,293 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,253 UART: [idev] ++
1,173,421 UART: [idev] CDI.KEYID = 6
1,173,782 UART: [idev] SUBJECT.KEYID = 7
1,174,207 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,232 UART: [ldev] ++
1,209,400 UART: [ldev] CDI.KEYID = 6
1,209,764 UART: [ldev] SUBJECT.KEYID = 5
1,210,191 UART: [ldev] AUTHORITY.KEYID = 7
1,210,654 UART: [ldev] FE.KEYID = 1
1,215,886 UART: [ldev] Erasing FE.KEYID = 1
1,242,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,634 UART: [ldev] --
1,282,140 UART: [fwproc] Wait for Commands...
1,282,871 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,271 UART: ROM Fatal Error: 0x000B0014
1,551,428 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,105 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
891,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,806 UART: [fht] FHT @ 0x50003400
1,173,408 UART: [idev] ++
1,173,576 UART: [idev] CDI.KEYID = 6
1,173,937 UART: [idev] SUBJECT.KEYID = 7
1,174,362 UART: [idev] UDS.KEYID = 0
1,181,646 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,095 UART: [ldev] --
1,281,597 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,952 UART: ROM Fatal Error: 0x000B0014
1,549,109 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,776 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,181,973 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,572 UART: [ldev] ++
1,208,740 UART: [ldev] CDI.KEYID = 6
1,209,104 UART: [ldev] SUBJECT.KEYID = 5
1,209,531 UART: [ldev] AUTHORITY.KEYID = 7
1,209,994 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,812 UART: [ldev] --
1,281,198 UART: [fwproc] Wait for Commands...
1,281,875 UART: [fwproc] Recv command 0x46574c44
1,282,608 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,293 UART: ROM Fatal Error: 0x000B0014
1,549,450 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,387 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,377 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,468 UART: [idev] ++
1,173,636 UART: [idev] CDI.KEYID = 6
1,173,997 UART: [idev] SUBJECT.KEYID = 7
1,174,422 UART: [idev] UDS.KEYID = 0
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,385 UART: [ldev] ++
1,209,553 UART: [ldev] CDI.KEYID = 6
1,209,917 UART: [ldev] SUBJECT.KEYID = 5
1,210,344 UART: [ldev] AUTHORITY.KEYID = 7
1,210,807 UART: [ldev] FE.KEYID = 1
1,216,123 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,571 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,570 UART: [fwproc] Recv command 0x46574c44
1,283,303 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,654 UART: ROM Fatal Error: 0x000B0014
1,549,811 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,130 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
3,404 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,125 UART:
192,509 UART: Running Caliptra ROM ...
193,617 UART:
193,760 UART: [state] CFI Enabled
264,319 UART: [state] LifecycleState = Unprovisioned
266,704 UART: [state] DebugLocked = No
268,816 UART: [state] WD Timer not started. Device not locked for debugging
272,940 UART: [kat] SHA2-256
454,877 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,348 UART: [kat] ++
467,167 UART: [kat] sha1
478,650 UART: [kat] SHA2-256
481,692 UART: [kat] SHA2-384
488,803 UART: [kat] SHA2-512-ACC
491,422 UART: [kat] ECC-384
3,778,117 UART: [kat] HMAC-384Kdf
3,803,858 UART: [kat] LMS
4,877,044 UART: [kat] --
4,883,067 UART: [cold-reset] ++
4,885,932 UART: [fht] FHT @ 0x50003400
4,896,534 UART: [idev] ++
4,897,212 UART: [idev] CDI.KEYID = 6
4,898,450 UART: [idev] SUBJECT.KEYID = 7
4,899,563 UART: [idev] UDS.KEYID = 0
4,932,255 UART: [idev] Erasing UDS.KEYID = 0
8,245,222 UART: [idev] Sha1 KeyId Algorithm
8,266,074 UART: [idev] --
8,270,394 UART: [ldev] ++
8,270,981 UART: [ldev] CDI.KEYID = 6
8,272,221 UART: [ldev] SUBJECT.KEYID = 5
8,273,325 UART: [ldev] AUTHORITY.KEYID = 7
8,274,506 UART: [ldev] FE.KEYID = 1
8,320,343 UART: [ldev] Erasing FE.KEYID = 1
11,653,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,949,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,965,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,981,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,997,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,017,306 UART: [ldev] --
14,022,204 UART: [fwproc] Wait for Commands...
14,024,196 UART: [fwproc] Recv command 0x46574c44
14,026,511 UART: [fwproc] Recv'd Img size: 113844 bytes
16,969,595 UART: ROM Fatal Error: 0x000B0024
16,973,048 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,583 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,763,368 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,641 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,393 UART:
192,805 UART: Running Caliptra ROM ...
194,178 UART:
603,470 UART: [state] CFI Enabled
616,880 UART: [state] LifecycleState = Unprovisioned
619,240 UART: [state] DebugLocked = No
621,741 UART: [state] WD Timer not started. Device not locked for debugging
626,923 UART: [kat] SHA2-256
808,911 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,416 UART: [kat] ++
820,951 UART: [kat] sha1
830,476 UART: [kat] SHA2-256
833,536 UART: [kat] SHA2-384
840,906 UART: [kat] SHA2-512-ACC
843,518 UART: [kat] ECC-384
4,099,005 UART: [kat] HMAC-384Kdf
4,110,703 UART: [kat] LMS
5,183,832 UART: [kat] --
5,188,279 UART: [cold-reset] ++
5,189,345 UART: [fht] FHT @ 0x50003400
5,200,098 UART: [idev] ++
5,200,775 UART: [idev] CDI.KEYID = 6
5,201,928 UART: [idev] SUBJECT.KEYID = 7
5,203,454 UART: [idev] UDS.KEYID = 0
5,222,617 UART: [idev] Erasing UDS.KEYID = 0
8,494,847 UART: [idev] Sha1 KeyId Algorithm
8,517,536 UART: [idev] --
8,520,799 UART: [ldev] ++
8,521,434 UART: [ldev] CDI.KEYID = 6
8,522,613 UART: [ldev] SUBJECT.KEYID = 5
8,524,086 UART: [ldev] AUTHORITY.KEYID = 7
8,525,636 UART: [ldev] FE.KEYID = 1
8,536,924 UART: [ldev] Erasing FE.KEYID = 1
11,830,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,604 UART: [ldev] --
14,198,090 UART: [fwproc] Wait for Commands...
14,200,789 UART: [fwproc] Recv command 0x46574c44
14,203,095 UART: [fwproc] Recv'd Img size: 113844 bytes
17,144,827 UART: ROM Fatal Error: 0x000B0024
17,148,226 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,663 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,974,714 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,229 UART:
192,596 UART: Running Caliptra ROM ...
193,840 UART:
193,994 UART: [state] CFI Enabled
266,642 UART: [state] LifecycleState = Unprovisioned
268,564 UART: [state] DebugLocked = No
271,023 UART: [state] WD Timer not started. Device not locked for debugging
274,321 UART: [kat] SHA2-256
453,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,981 UART: [kat] ++
465,520 UART: [kat] sha1
476,154 UART: [kat] SHA2-256
479,173 UART: [kat] SHA2-384
484,653 UART: [kat] SHA2-512-ACC
487,599 UART: [kat] ECC-384
2,950,395 UART: [kat] HMAC-384Kdf
2,974,461 UART: [kat] LMS
3,503,900 UART: [kat] --
3,507,423 UART: [cold-reset] ++
3,508,924 UART: [fht] FHT @ 0x50003400
3,518,717 UART: [idev] ++
3,519,325 UART: [idev] CDI.KEYID = 6
3,520,244 UART: [idev] SUBJECT.KEYID = 7
3,521,407 UART: [idev] UDS.KEYID = 0
3,546,514 UART: [idev] Erasing UDS.KEYID = 0
6,029,985 UART: [idev] Sha1 KeyId Algorithm
6,053,226 UART: [idev] --
6,057,727 UART: [ldev] ++
6,058,299 UART: [ldev] CDI.KEYID = 6
6,059,182 UART: [ldev] SUBJECT.KEYID = 5
6,060,398 UART: [ldev] AUTHORITY.KEYID = 7
6,061,697 UART: [ldev] FE.KEYID = 1
6,102,625 UART: [ldev] Erasing FE.KEYID = 1
8,606,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,575 UART: [ldev] --
10,418,853 UART: [fwproc] Wait for Commands...
10,421,819 UART: [fwproc] Recv command 0x46574c44
10,423,862 UART: [fwproc] Recv'd Img size: 114168 bytes
12,716,380 UART: ROM Fatal Error: 0x000B0024
12,719,524 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,486,684 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,789 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,510 UART:
192,881 UART: Running Caliptra ROM ...
194,011 UART:
603,520 UART: [state] CFI Enabled
617,954 UART: [state] LifecycleState = Unprovisioned
619,782 UART: [state] DebugLocked = No
621,451 UART: [state] WD Timer not started. Device not locked for debugging
625,327 UART: [kat] SHA2-256
804,464 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,020 UART: [kat] ++
816,475 UART: [kat] sha1
828,483 UART: [kat] SHA2-256
831,553 UART: [kat] SHA2-384
838,176 UART: [kat] SHA2-512-ACC
841,105 UART: [kat] ECC-384
3,281,722 UART: [kat] HMAC-384Kdf
3,295,479 UART: [kat] LMS
3,824,989 UART: [kat] --
3,831,410 UART: [cold-reset] ++
3,832,308 UART: [fht] FHT @ 0x50003400
3,843,258 UART: [idev] ++
3,843,819 UART: [idev] CDI.KEYID = 6
3,844,750 UART: [idev] SUBJECT.KEYID = 7
3,845,956 UART: [idev] UDS.KEYID = 0
3,862,981 UART: [idev] Erasing UDS.KEYID = 0
6,320,772 UART: [idev] Sha1 KeyId Algorithm
6,343,540 UART: [idev] --
6,347,564 UART: [ldev] ++
6,348,139 UART: [ldev] CDI.KEYID = 6
6,349,048 UART: [ldev] SUBJECT.KEYID = 5
6,350,262 UART: [ldev] AUTHORITY.KEYID = 7
6,351,488 UART: [ldev] FE.KEYID = 1
6,360,316 UART: [ldev] Erasing FE.KEYID = 1
8,832,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,929 UART: [ldev] --
10,624,352 UART: [fwproc] Wait for Commands...
10,626,229 UART: [fwproc] Recv command 0x46574c44
10,628,322 UART: [fwproc] Recv'd Img size: 114168 bytes
12,913,712 UART: ROM Fatal Error: 0x000B0024
12,916,834 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
3,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,702,821 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,145 UART:
192,534 UART: Running Caliptra ROM ...
193,733 UART:
193,887 UART: [state] CFI Enabled
266,805 UART: [state] LifecycleState = Unprovisioned
268,718 UART: [state] DebugLocked = No
271,081 UART: [state] WD Timer not started. Device not locked for debugging
274,534 UART: [kat] SHA2-256
453,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,246 UART: [kat] ++
465,694 UART: [kat] sha1
476,944 UART: [kat] SHA2-256
479,999 UART: [kat] SHA2-384
485,272 UART: [kat] SHA2-512-ACC
488,262 UART: [kat] ECC-384
2,945,139 UART: [kat] HMAC-384Kdf
2,971,045 UART: [kat] LMS
3,500,497 UART: [kat] --
3,504,339 UART: [cold-reset] ++
3,505,575 UART: [fht] FHT @ 0x50003400
3,516,506 UART: [idev] ++
3,517,067 UART: [idev] CDI.KEYID = 6
3,517,950 UART: [idev] SUBJECT.KEYID = 7
3,519,170 UART: [idev] UDS.KEYID = 0
3,543,359 UART: [idev] Erasing UDS.KEYID = 0
6,026,728 UART: [idev] Sha1 KeyId Algorithm
6,048,873 UART: [idev] --
6,052,901 UART: [ldev] ++
6,053,479 UART: [ldev] CDI.KEYID = 6
6,054,390 UART: [ldev] SUBJECT.KEYID = 5
6,055,607 UART: [ldev] AUTHORITY.KEYID = 7
6,056,875 UART: [ldev] FE.KEYID = 1
6,098,965 UART: [ldev] Erasing FE.KEYID = 1
8,603,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,247 UART: [ldev] --
10,412,975 UART: [fwproc] Wait for Commands...
10,415,778 UART: [fwproc] Recv command 0x46574c44
10,417,876 UART: [fwproc] Recv'd Img size: 114168 bytes
12,709,737 UART: ROM Fatal Error: 0x000B0024
12,712,867 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,020 writing to cptra_bootfsm_go
4,495 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,472,881 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,759 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,505 UART:
192,907 UART: Running Caliptra ROM ...
194,060 UART:
603,497 UART: [state] CFI Enabled
617,454 UART: [state] LifecycleState = Unprovisioned
619,337 UART: [state] DebugLocked = No
621,530 UART: [state] WD Timer not started. Device not locked for debugging
624,770 UART: [kat] SHA2-256
803,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,505 UART: [kat] ++
816,043 UART: [kat] sha1
826,607 UART: [kat] SHA2-256
829,620 UART: [kat] SHA2-384
836,192 UART: [kat] SHA2-512-ACC
839,179 UART: [kat] ECC-384
3,282,465 UART: [kat] HMAC-384Kdf
3,294,852 UART: [kat] LMS
3,824,312 UART: [kat] --
3,828,467 UART: [cold-reset] ++
3,830,564 UART: [fht] FHT @ 0x50003400
3,842,512 UART: [idev] ++
3,843,074 UART: [idev] CDI.KEYID = 6
3,843,992 UART: [idev] SUBJECT.KEYID = 7
3,845,206 UART: [idev] UDS.KEYID = 0
3,861,096 UART: [idev] Erasing UDS.KEYID = 0
6,313,626 UART: [idev] Sha1 KeyId Algorithm
6,336,693 UART: [idev] --
6,341,603 UART: [ldev] ++
6,342,170 UART: [ldev] CDI.KEYID = 6
6,343,050 UART: [ldev] SUBJECT.KEYID = 5
6,344,270 UART: [ldev] AUTHORITY.KEYID = 7
6,345,500 UART: [ldev] FE.KEYID = 1
6,357,009 UART: [ldev] Erasing FE.KEYID = 1
8,826,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,022 UART: [ldev] --
10,616,227 UART: [fwproc] Wait for Commands...
10,619,208 UART: [fwproc] Recv command 0x46574c44
10,621,254 UART: [fwproc] Recv'd Img size: 114168 bytes
12,905,591 UART: ROM Fatal Error: 0x000B0024
12,908,724 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,692,017 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,721 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,042 UART: [ldev] ++
1,209,210 UART: [ldev] CDI.KEYID = 6
1,209,574 UART: [ldev] SUBJECT.KEYID = 5
1,210,001 UART: [ldev] AUTHORITY.KEYID = 7
1,210,464 UART: [ldev] FE.KEYID = 1
1,215,702 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,350 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,739 UART: ROM Fatal Error: 0x000B0024
1,549,896 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,400,917 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
916,063 UART: [kat] HMAC-384Kdf
920,779 UART: [kat] LMS
1,169,091 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,486 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,438 UART: [idev] Sha1 KeyId Algorithm
1,208,336 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,063 UART: [ldev] --
1,282,373 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,907 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,186 UART: ROM Fatal Error: 0x000B0024
1,550,343 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,588 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,630 UART: [ldev] ++
1,208,798 UART: [ldev] CDI.KEYID = 6
1,209,162 UART: [ldev] SUBJECT.KEYID = 5
1,209,589 UART: [ldev] AUTHORITY.KEYID = 7
1,210,052 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,586 UART: [fwproc] Wait for Commands...
1,281,305 UART: [fwproc] Recv command 0x46574c44
1,282,038 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,117 UART: ROM Fatal Error: 0x000B0024
1,549,274 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,851 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,997 UART: [state] LifecycleState = Unprovisioned
85,652 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
891,131 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,602 UART: [kat] SHA2-256
901,542 UART: [kat] SHA2-384
904,321 UART: [kat] SHA2-512-ACC
906,222 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,170 UART: [idev] ++
1,173,338 UART: [idev] CDI.KEYID = 6
1,173,699 UART: [idev] SUBJECT.KEYID = 7
1,174,124 UART: [idev] UDS.KEYID = 0
1,181,782 UART: [idev] Erasing UDS.KEYID = 0
1,199,278 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,869 UART: [ldev] --
1,281,175 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,708 UART: ROM Fatal Error: 0x000B0024
1,550,865 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,822 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,682 UART: [kat] HMAC-384Kdf
921,442 UART: [kat] LMS
1,169,754 UART: [kat] --
1,170,721 UART: [cold-reset] ++
1,171,159 UART: [fht] FHT @ 0x50003400
1,173,943 UART: [idev] ++
1,174,111 UART: [idev] CDI.KEYID = 6
1,174,472 UART: [idev] SUBJECT.KEYID = 7
1,174,897 UART: [idev] UDS.KEYID = 0
1,183,321 UART: [idev] Erasing UDS.KEYID = 0
1,200,477 UART: [idev] Sha1 KeyId Algorithm
1,209,481 UART: [idev] --
1,210,438 UART: [ldev] ++
1,210,606 UART: [ldev] CDI.KEYID = 6
1,210,970 UART: [ldev] SUBJECT.KEYID = 5
1,211,397 UART: [ldev] AUTHORITY.KEYID = 7
1,211,860 UART: [ldev] FE.KEYID = 1
1,216,838 UART: [ldev] Erasing FE.KEYID = 1
1,243,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,834 UART: [ldev] --
1,282,312 UART: [fwproc] Wait for Commands...
1,282,997 UART: [fwproc] Recv command 0x46574c44
1,283,730 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,007 UART: ROM Fatal Error: 0x000B0024
1,550,164 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,725 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
915,589 UART: [kat] HMAC-384Kdf
920,251 UART: [kat] LMS
1,168,563 UART: [kat] --
1,169,648 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,862 UART: [idev] ++
1,173,030 UART: [idev] CDI.KEYID = 6
1,173,391 UART: [idev] SUBJECT.KEYID = 7
1,173,816 UART: [idev] UDS.KEYID = 0
1,181,768 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,208,006 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,049 UART: [ldev] --
1,281,323 UART: [fwproc] Wait for Commands...
1,281,926 UART: [fwproc] Recv command 0x46574c44
1,282,659 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,402 UART: ROM Fatal Error: 0x000B0024
1,549,559 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,898 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,247 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,001 UART:
192,386 UART: Running Caliptra ROM ...
193,574 UART:
193,727 UART: [state] CFI Enabled
251,960 UART: [state] LifecycleState = Unprovisioned
254,381 UART: [state] DebugLocked = No
257,113 UART: [state] WD Timer not started. Device not locked for debugging
261,290 UART: [kat] SHA2-256
443,234 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
454,756 UART: [kat] ++
455,253 UART: [kat] sha1
465,072 UART: [kat] SHA2-256
468,094 UART: [kat] SHA2-384
473,854 UART: [kat] SHA2-512-ACC
476,514 UART: [kat] ECC-384
3,764,686 UART: [kat] HMAC-384Kdf
3,791,415 UART: [kat] LMS
4,864,573 UART: [kat] --
4,870,079 UART: [cold-reset] ++
4,871,483 UART: [fht] FHT @ 0x50003400
4,881,438 UART: [idev] ++
4,882,110 UART: [idev] CDI.KEYID = 6
4,883,353 UART: [idev] SUBJECT.KEYID = 7
4,884,513 UART: [idev] UDS.KEYID = 0
4,918,122 UART: [idev] Erasing UDS.KEYID = 0
8,229,464 UART: [idev] Sha1 KeyId Algorithm
8,251,286 UART: [idev] --
8,254,802 UART: [ldev] ++
8,255,369 UART: [ldev] CDI.KEYID = 6
8,256,604 UART: [ldev] SUBJECT.KEYID = 5
8,257,717 UART: [ldev] AUTHORITY.KEYID = 7
8,258,875 UART: [ldev] FE.KEYID = 1
8,306,485 UART: [ldev] Erasing FE.KEYID = 1
11,642,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,953,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,969,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,985,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,001,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,022,092 UART: [ldev] --
14,027,568 UART: [fwproc] Wait for Commands...
14,029,833 UART: [fwproc] Recv command 0x46574c44
14,032,145 UART: [fwproc] Recv'd Img size: 113844 bytes
16,968,963 UART: ROM Fatal Error: 0x000B0023
16,972,379 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,040 writing to cptra_bootfsm_go
4,494 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,745,977 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
3,898 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,645 UART:
193,024 UART: Running Caliptra ROM ...
194,146 UART:
603,876 UART: [state] CFI Enabled
620,689 UART: [state] LifecycleState = Unprovisioned
623,091 UART: [state] DebugLocked = No
625,904 UART: [state] WD Timer not started. Device not locked for debugging
630,305 UART: [kat] SHA2-256
812,305 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,833 UART: [kat] ++
824,346 UART: [kat] sha1
835,058 UART: [kat] SHA2-256
838,127 UART: [kat] SHA2-384
843,934 UART: [kat] SHA2-512-ACC
846,541 UART: [kat] ECC-384
4,099,804 UART: [kat] HMAC-384Kdf
4,112,038 UART: [kat] LMS
5,185,206 UART: [kat] --
5,189,718 UART: [cold-reset] ++
5,192,257 UART: [fht] FHT @ 0x50003400
5,202,417 UART: [idev] ++
5,203,141 UART: [idev] CDI.KEYID = 6
5,204,311 UART: [idev] SUBJECT.KEYID = 7
5,205,809 UART: [idev] UDS.KEYID = 0
5,220,439 UART: [idev] Erasing UDS.KEYID = 0
8,494,570 UART: [idev] Sha1 KeyId Algorithm
8,516,126 UART: [idev] --
8,520,444 UART: [ldev] ++
8,521,069 UART: [ldev] CDI.KEYID = 6
8,522,248 UART: [ldev] SUBJECT.KEYID = 5
8,523,726 UART: [ldev] AUTHORITY.KEYID = 7
8,525,275 UART: [ldev] FE.KEYID = 1
8,538,080 UART: [ldev] Erasing FE.KEYID = 1
11,828,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,120,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,194 UART: [ldev] --
14,191,670 UART: [fwproc] Wait for Commands...
14,193,332 UART: [fwproc] Recv command 0x46574c44
14,195,588 UART: [fwproc] Recv'd Img size: 113844 bytes
17,140,585 UART: ROM Fatal Error: 0x000B0023
17,144,035 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,674 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,948,488 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,117 UART:
192,520 UART: Running Caliptra ROM ...
194,062 UART:
194,255 UART: [state] CFI Enabled
263,701 UART: [state] LifecycleState = Unprovisioned
265,585 UART: [state] DebugLocked = No
267,395 UART: [state] WD Timer not started. Device not locked for debugging
270,895 UART: [kat] SHA2-256
449,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,591 UART: [kat] ++
462,135 UART: [kat] sha1
473,829 UART: [kat] SHA2-256
476,832 UART: [kat] SHA2-384
482,975 UART: [kat] SHA2-512-ACC
485,906 UART: [kat] ECC-384
2,950,515 UART: [kat] HMAC-384Kdf
2,974,687 UART: [kat] LMS
3,504,145 UART: [kat] --
3,509,302 UART: [cold-reset] ++
3,511,619 UART: [fht] FHT @ 0x50003400
3,522,385 UART: [idev] ++
3,522,951 UART: [idev] CDI.KEYID = 6
3,523,855 UART: [idev] SUBJECT.KEYID = 7
3,525,071 UART: [idev] UDS.KEYID = 0
3,546,456 UART: [idev] Erasing UDS.KEYID = 0
6,025,426 UART: [idev] Sha1 KeyId Algorithm
6,049,412 UART: [idev] --
6,053,272 UART: [ldev] ++
6,053,845 UART: [ldev] CDI.KEYID = 6
6,054,757 UART: [ldev] SUBJECT.KEYID = 5
6,055,922 UART: [ldev] AUTHORITY.KEYID = 7
6,057,158 UART: [ldev] FE.KEYID = 1
6,102,046 UART: [ldev] Erasing FE.KEYID = 1
8,604,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,965 UART: [ldev] --
10,415,235 UART: [fwproc] Wait for Commands...
10,417,333 UART: [fwproc] Recv command 0x46574c44
10,419,428 UART: [fwproc] Recv'd Img size: 114168 bytes
12,713,458 UART: ROM Fatal Error: 0x000B0023
12,716,598 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,406 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,519,746 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,400 UART:
192,796 UART: Running Caliptra ROM ...
193,966 UART:
603,443 UART: [state] CFI Enabled
616,811 UART: [state] LifecycleState = Unprovisioned
618,639 UART: [state] DebugLocked = No
619,934 UART: [state] WD Timer not started. Device not locked for debugging
623,377 UART: [kat] SHA2-256
802,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,052 UART: [kat] ++
814,511 UART: [kat] sha1
826,521 UART: [kat] SHA2-256
829,527 UART: [kat] SHA2-384
835,233 UART: [kat] SHA2-512-ACC
838,214 UART: [kat] ECC-384
3,280,212 UART: [kat] HMAC-384Kdf
3,293,248 UART: [kat] LMS
3,822,741 UART: [kat] --
3,826,028 UART: [cold-reset] ++
3,828,284 UART: [fht] FHT @ 0x50003400
3,840,012 UART: [idev] ++
3,840,575 UART: [idev] CDI.KEYID = 6
3,841,593 UART: [idev] SUBJECT.KEYID = 7
3,842,689 UART: [idev] UDS.KEYID = 0
3,857,257 UART: [idev] Erasing UDS.KEYID = 0
6,315,987 UART: [idev] Sha1 KeyId Algorithm
6,339,419 UART: [idev] --
6,343,064 UART: [ldev] ++
6,343,637 UART: [ldev] CDI.KEYID = 6
6,344,515 UART: [ldev] SUBJECT.KEYID = 5
6,345,728 UART: [ldev] AUTHORITY.KEYID = 7
6,347,012 UART: [ldev] FE.KEYID = 1
6,358,118 UART: [ldev] Erasing FE.KEYID = 1
8,823,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,249 UART: [ldev] --
10,615,266 UART: [fwproc] Wait for Commands...
10,617,686 UART: [fwproc] Recv command 0x46574c44
10,619,796 UART: [fwproc] Recv'd Img size: 114168 bytes
12,907,690 UART: ROM Fatal Error: 0x000B0023
12,910,823 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,660 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,695,549 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,160 UART:
192,527 UART: Running Caliptra ROM ...
193,759 UART:
193,913 UART: [state] CFI Enabled
265,532 UART: [state] LifecycleState = Unprovisioned
267,400 UART: [state] DebugLocked = No
268,756 UART: [state] WD Timer not started. Device not locked for debugging
272,752 UART: [kat] SHA2-256
451,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,486 UART: [kat] ++
464,020 UART: [kat] sha1
473,509 UART: [kat] SHA2-256
476,563 UART: [kat] SHA2-384
483,043 UART: [kat] SHA2-512-ACC
485,983 UART: [kat] ECC-384
2,950,265 UART: [kat] HMAC-384Kdf
2,972,002 UART: [kat] LMS
3,501,419 UART: [kat] --
3,505,577 UART: [cold-reset] ++
3,507,186 UART: [fht] FHT @ 0x50003400
3,517,732 UART: [idev] ++
3,518,334 UART: [idev] CDI.KEYID = 6
3,519,255 UART: [idev] SUBJECT.KEYID = 7
3,520,416 UART: [idev] UDS.KEYID = 0
3,542,656 UART: [idev] Erasing UDS.KEYID = 0
6,023,078 UART: [idev] Sha1 KeyId Algorithm
6,045,129 UART: [idev] --
6,049,126 UART: [ldev] ++
6,049,705 UART: [ldev] CDI.KEYID = 6
6,050,618 UART: [ldev] SUBJECT.KEYID = 5
6,051,784 UART: [ldev] AUTHORITY.KEYID = 7
6,053,095 UART: [ldev] FE.KEYID = 1
6,099,141 UART: [ldev] Erasing FE.KEYID = 1
8,604,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,827 UART: [ldev] --
10,414,295 UART: [fwproc] Wait for Commands...
10,416,937 UART: [fwproc] Recv command 0x46574c44
10,419,034 UART: [fwproc] Recv'd Img size: 114168 bytes
12,708,442 UART: ROM Fatal Error: 0x000B0023
12,711,573 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,470,999 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,405 UART:
192,796 UART: Running Caliptra ROM ...
194,013 UART:
603,361 UART: [state] CFI Enabled
618,816 UART: [state] LifecycleState = Unprovisioned
620,696 UART: [state] DebugLocked = No
623,282 UART: [state] WD Timer not started. Device not locked for debugging
627,045 UART: [kat] SHA2-256
806,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,765 UART: [kat] ++
818,211 UART: [kat] sha1
829,086 UART: [kat] SHA2-256
832,099 UART: [kat] SHA2-384
839,372 UART: [kat] SHA2-512-ACC
842,355 UART: [kat] ECC-384
3,287,692 UART: [kat] HMAC-384Kdf
3,299,539 UART: [kat] LMS
3,829,004 UART: [kat] --
3,832,887 UART: [cold-reset] ++
3,835,029 UART: [fht] FHT @ 0x50003400
3,846,006 UART: [idev] ++
3,846,576 UART: [idev] CDI.KEYID = 6
3,847,482 UART: [idev] SUBJECT.KEYID = 7
3,848,694 UART: [idev] UDS.KEYID = 0
3,865,660 UART: [idev] Erasing UDS.KEYID = 0
6,324,517 UART: [idev] Sha1 KeyId Algorithm
6,347,937 UART: [idev] --
6,352,251 UART: [ldev] ++
6,352,812 UART: [ldev] CDI.KEYID = 6
6,353,720 UART: [ldev] SUBJECT.KEYID = 5
6,354,931 UART: [ldev] AUTHORITY.KEYID = 7
6,356,157 UART: [ldev] FE.KEYID = 1
6,364,592 UART: [ldev] Erasing FE.KEYID = 1
8,842,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,366 UART: [ldev] --
10,633,400 UART: [fwproc] Wait for Commands...
10,634,974 UART: [fwproc] Recv command 0x46574c44
10,637,070 UART: [fwproc] Recv'd Img size: 114168 bytes
12,933,193 UART: ROM Fatal Error: 0x000B0023
12,936,325 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,695,564 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,827 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
904,936 UART: [kat] SHA2-512-ACC
906,837 UART: [kat] ECC-384
916,318 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,809 UART: [fht] FHT @ 0x50003400
1,173,551 UART: [idev] ++
1,173,719 UART: [idev] CDI.KEYID = 6
1,174,080 UART: [idev] SUBJECT.KEYID = 7
1,174,505 UART: [idev] UDS.KEYID = 0
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,199,021 UART: [idev] Sha1 KeyId Algorithm
1,208,053 UART: [idev] --
1,209,202 UART: [ldev] ++
1,209,370 UART: [ldev] CDI.KEYID = 6
1,209,734 UART: [ldev] SUBJECT.KEYID = 5
1,210,161 UART: [ldev] AUTHORITY.KEYID = 7
1,210,624 UART: [ldev] FE.KEYID = 1
1,215,992 UART: [ldev] Erasing FE.KEYID = 1
1,242,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,440 UART: [ldev] --
1,281,856 UART: [fwproc] Wait for Commands...
1,282,481 UART: [fwproc] Recv command 0x46574c44
1,283,214 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,802 UART: ROM Fatal Error: 0x000B0023
1,549,959 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,400,102 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,067 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,928 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,172,762 UART: [idev] ++
1,172,930 UART: [idev] CDI.KEYID = 6
1,173,291 UART: [idev] SUBJECT.KEYID = 7
1,173,716 UART: [idev] UDS.KEYID = 0
1,181,964 UART: [idev] Erasing UDS.KEYID = 0
1,199,856 UART: [idev] Sha1 KeyId Algorithm
1,208,762 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,479 UART: [ldev] Erasing FE.KEYID = 1
1,243,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,299 UART: [ldev] --
1,282,745 UART: [fwproc] Wait for Commands...
1,283,470 UART: [fwproc] Recv command 0x46574c44
1,284,203 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,867 UART: ROM Fatal Error: 0x000B0023
1,551,024 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,985 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
1,169,132 UART: [kat] --
1,170,315 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,759 UART: [idev] --
1,208,924 UART: [ldev] ++
1,209,092 UART: [ldev] CDI.KEYID = 6
1,209,456 UART: [ldev] SUBJECT.KEYID = 5
1,209,883 UART: [ldev] AUTHORITY.KEYID = 7
1,210,346 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,242,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,650 UART: [ldev] --
1,281,132 UART: [fwproc] Wait for Commands...
1,281,881 UART: [fwproc] Recv command 0x46574c44
1,282,614 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,216 UART: ROM Fatal Error: 0x000B0023
1,550,373 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,924 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,803 UART: [state] LifecycleState = Unprovisioned
85,458 UART: [state] DebugLocked = No
85,940 UART: [state] WD Timer not started. Device not locked for debugging
87,279 UART: [kat] SHA2-256
890,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,958 UART: [kat] ++
895,110 UART: [kat] sha1
899,506 UART: [kat] SHA2-256
901,446 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,181,976 UART: [idev] Erasing UDS.KEYID = 0
1,198,994 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,925 UART: [ldev] ++
1,209,093 UART: [ldev] CDI.KEYID = 6
1,209,457 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,681 UART: [fwproc] Wait for Commands...
1,282,428 UART: [fwproc] Recv command 0x46574c44
1,283,161 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,823 UART: ROM Fatal Error: 0x000B0023
1,549,980 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,385 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,750 UART: [kat] HMAC-384Kdf
920,420 UART: [kat] LMS
1,168,732 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,697 UART: [idev] ++
1,172,865 UART: [idev] CDI.KEYID = 6
1,173,226 UART: [idev] SUBJECT.KEYID = 7
1,173,651 UART: [idev] UDS.KEYID = 0
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,239 UART: [idev] Sha1 KeyId Algorithm
1,207,137 UART: [idev] --
1,208,092 UART: [ldev] ++
1,208,260 UART: [ldev] CDI.KEYID = 6
1,208,624 UART: [ldev] SUBJECT.KEYID = 5
1,209,051 UART: [ldev] AUTHORITY.KEYID = 7
1,209,514 UART: [ldev] FE.KEYID = 1
1,214,534 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,124 UART: [ldev] --
1,280,414 UART: [fwproc] Wait for Commands...
1,281,095 UART: [fwproc] Recv command 0x46574c44
1,281,828 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,082 UART: ROM Fatal Error: 0x000B0023
1,548,239 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,122 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,877 UART: [state] LifecycleState = Unprovisioned
85,532 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,355 UART: [kat] SHA2-256
890,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,034 UART: [kat] ++
895,186 UART: [kat] sha1
899,430 UART: [kat] SHA2-256
901,370 UART: [kat] SHA2-384
903,973 UART: [kat] SHA2-512-ACC
905,874 UART: [kat] ECC-384
915,699 UART: [kat] HMAC-384Kdf
920,345 UART: [kat] LMS
1,168,657 UART: [kat] --
1,169,366 UART: [cold-reset] ++
1,169,816 UART: [fht] FHT @ 0x50003400
1,172,494 UART: [idev] ++
1,172,662 UART: [idev] CDI.KEYID = 6
1,173,023 UART: [idev] SUBJECT.KEYID = 7
1,173,448 UART: [idev] UDS.KEYID = 0
1,181,356 UART: [idev] Erasing UDS.KEYID = 0
1,198,594 UART: [idev] Sha1 KeyId Algorithm
1,207,436 UART: [idev] --
1,208,301 UART: [ldev] ++
1,208,469 UART: [ldev] CDI.KEYID = 6
1,208,833 UART: [ldev] SUBJECT.KEYID = 5
1,209,260 UART: [ldev] AUTHORITY.KEYID = 7
1,209,723 UART: [ldev] FE.KEYID = 1
1,214,915 UART: [ldev] Erasing FE.KEYID = 1
1,241,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,109 UART: [ldev] --
1,280,463 UART: [fwproc] Wait for Commands...
1,281,090 UART: [fwproc] Recv command 0x46574c44
1,281,823 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,835 UART: ROM Fatal Error: 0x000B0023
1,549,992 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,319 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,023,504 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,167,897 UART:
2,168,307 UART: Running Caliptra ROM ...
2,169,393 UART:
2,169,568 UART: [state] CFI Enabled
2,170,536 UART: [state] LifecycleState = Unprovisioned
2,172,186 UART: [state] DebugLocked = No
2,173,213 UART: [state] WD Timer not started. Device not locked for debugging
2,175,678 UART: [kat] SHA2-256
2,176,340 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,352 UART: [kat] ++
2,179,800 UART: [kat] sha1
2,180,306 UART: [kat] SHA2-256
2,180,963 UART: [kat] SHA2-384
2,181,619 UART: [kat] SHA2-512-ACC
2,182,418 UART: [kat] ECC-384
3,778,010 UART: [kat] HMAC-384Kdf
3,803,630 UART: [kat] LMS
4,876,755 UART: [kat] --
4,882,606 UART: [cold-reset] ++
4,885,273 UART: [fht] FHT @ 0x50003400
4,897,072 UART: [idev] ++
4,897,755 UART: [idev] CDI.KEYID = 6
4,898,943 UART: [idev] SUBJECT.KEYID = 7
4,900,107 UART: [idev] UDS.KEYID = 0
4,930,692 UART: [idev] Erasing UDS.KEYID = 0
8,240,698 UART: [idev] Sha1 KeyId Algorithm
8,261,503 UART: [idev] --
8,265,880 UART: [ldev] ++
8,266,487 UART: [ldev] CDI.KEYID = 6
8,267,680 UART: [ldev] SUBJECT.KEYID = 5
8,268,841 UART: [ldev] AUTHORITY.KEYID = 7
8,270,066 UART: [ldev] FE.KEYID = 1
8,317,583 UART: [ldev] Erasing FE.KEYID = 1
11,652,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,010 UART: [ldev] --
14,035,212 UART: [fwproc] Wait for Commands...
14,036,879 UART: [fwproc] Recv command 0x46574c44
14,039,150 UART: [fwproc] Recv'd Img size: 113844 bytes
16,989,844 UART: ROM Fatal Error: 0x000B0023
16,993,301 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,019,011 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,814,025 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
2,025,707 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,169,557 UART:
2,169,966 UART: Running Caliptra ROM ...
2,171,125 UART:
2,171,296 UART: [state] CFI Enabled
2,172,251 UART: [state] LifecycleState = Unprovisioned
2,173,901 UART: [state] DebugLocked = No
2,175,001 UART: [state] WD Timer not started. Device not locked for debugging
2,177,473 UART: [kat] SHA2-256
2,178,137 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,142 UART: [kat] ++
2,181,587 UART: [kat] sha1
2,182,139 UART: [kat] SHA2-256
2,182,789 UART: [kat] SHA2-384
2,183,520 UART: [kat] SHA2-512-ACC
2,184,360 UART: [kat] ECC-384
4,098,342 UART: [kat] HMAC-384Kdf
4,110,928 UART: [kat] LMS
5,184,076 UART: [kat] --
5,189,431 UART: [cold-reset] ++
5,191,060 UART: [fht] FHT @ 0x50003400
5,201,458 UART: [idev] ++
5,202,129 UART: [idev] CDI.KEYID = 6
5,203,363 UART: [idev] SUBJECT.KEYID = 7
5,204,791 UART: [idev] UDS.KEYID = 0
5,218,117 UART: [idev] Erasing UDS.KEYID = 0
8,493,547 UART: [idev] Sha1 KeyId Algorithm
8,515,645 UART: [idev] --
8,518,012 UART: [ldev] ++
8,518,576 UART: [ldev] CDI.KEYID = 6
8,519,973 UART: [ldev] SUBJECT.KEYID = 5
8,521,263 UART: [ldev] AUTHORITY.KEYID = 7
8,522,829 UART: [ldev] FE.KEYID = 1
8,533,602 UART: [ldev] Erasing FE.KEYID = 1
11,826,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,069 UART: [ldev] --
14,189,151 UART: [fwproc] Wait for Commands...
14,192,323 UART: [fwproc] Recv command 0x46574c44
14,194,584 UART: [fwproc] Recv'd Img size: 113844 bytes
17,144,358 UART: ROM Fatal Error: 0x000B0023
17,147,771 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
2,022,164 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,970,882 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
2,023,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,413 UART:
2,167,828 UART: Running Caliptra ROM ...
2,168,909 UART:
2,169,065 UART: [state] CFI Enabled
2,170,048 UART: [state] LifecycleState = Unprovisioned
2,171,697 UART: [state] DebugLocked = No
2,172,725 UART: [state] WD Timer not started. Device not locked for debugging
2,175,188 UART: [kat] SHA2-256
2,175,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,884 UART: [kat] ++
2,179,336 UART: [kat] sha1
2,179,847 UART: [kat] SHA2-256
2,180,505 UART: [kat] SHA2-384
2,181,161 UART: [kat] SHA2-512-ACC
2,182,173 UART: [kat] ECC-384
2,928,796 UART: [kat] HMAC-384Kdf
2,950,592 UART: [kat] LMS
3,480,068 UART: [kat] --
3,482,498 UART: [cold-reset] ++
3,483,889 UART: [fht] FHT @ 0x50003400
3,494,578 UART: [idev] ++
3,495,151 UART: [idev] CDI.KEYID = 6
3,496,038 UART: [idev] SUBJECT.KEYID = 7
3,497,258 UART: [idev] UDS.KEYID = 0
3,522,255 UART: [idev] Erasing UDS.KEYID = 0
6,004,380 UART: [idev] Sha1 KeyId Algorithm
6,027,349 UART: [idev] --
6,030,755 UART: [ldev] ++
6,031,334 UART: [ldev] CDI.KEYID = 6
6,032,218 UART: [ldev] SUBJECT.KEYID = 5
6,033,537 UART: [ldev] AUTHORITY.KEYID = 7
6,034,729 UART: [ldev] FE.KEYID = 1
6,078,657 UART: [ldev] Erasing FE.KEYID = 1
8,581,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,739 UART: [ldev] --
10,386,958 UART: [fwproc] Wait for Commands...
10,388,843 UART: [fwproc] Recv command 0x46574c44
10,390,965 UART: [fwproc] Recv'd Img size: 114168 bytes
12,683,976 UART: ROM Fatal Error: 0x000B0023
12,687,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,027,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,454,204 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,021,961 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,400 UART:
2,166,793 UART: Running Caliptra ROM ...
2,167,964 UART:
2,168,135 UART: [state] CFI Enabled
2,169,112 UART: [state] LifecycleState = Unprovisioned
2,170,755 UART: [state] DebugLocked = No
2,171,860 UART: [state] WD Timer not started. Device not locked for debugging
2,174,337 UART: [kat] SHA2-256
2,175,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,020 UART: [kat] ++
2,178,472 UART: [kat] sha1
2,179,008 UART: [kat] SHA2-256
2,179,750 UART: [kat] SHA2-384
2,180,416 UART: [kat] SHA2-512-ACC
2,181,263 UART: [kat] ECC-384
3,282,779 UART: [kat] HMAC-384Kdf
3,294,728 UART: [kat] LMS
3,824,197 UART: [kat] --
3,828,157 UART: [cold-reset] ++
3,829,763 UART: [fht] FHT @ 0x50003400
3,840,848 UART: [idev] ++
3,841,445 UART: [idev] CDI.KEYID = 6
3,842,358 UART: [idev] SUBJECT.KEYID = 7
3,843,523 UART: [idev] UDS.KEYID = 0
3,859,660 UART: [idev] Erasing UDS.KEYID = 0
6,315,720 UART: [idev] Sha1 KeyId Algorithm
6,338,192 UART: [idev] --
6,343,013 UART: [ldev] ++
6,343,584 UART: [ldev] CDI.KEYID = 6
6,344,489 UART: [ldev] SUBJECT.KEYID = 5
6,345,702 UART: [ldev] AUTHORITY.KEYID = 7
6,346,931 UART: [ldev] FE.KEYID = 1
6,358,925 UART: [ldev] Erasing FE.KEYID = 1
8,834,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,972 UART: [ldev] --
10,628,509 UART: [fwproc] Wait for Commands...
10,631,685 UART: [fwproc] Recv command 0x46574c44
10,633,721 UART: [fwproc] Recv'd Img size: 114168 bytes
12,922,172 UART: ROM Fatal Error: 0x000B0023
12,925,270 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,020,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,694,241 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,021,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,026 UART:
2,166,417 UART: Running Caliptra ROM ...
2,167,493 UART:
2,167,649 UART: [state] CFI Enabled
2,168,631 UART: [state] LifecycleState = Unprovisioned
2,170,294 UART: [state] DebugLocked = No
2,171,319 UART: [state] WD Timer not started. Device not locked for debugging
2,173,788 UART: [kat] SHA2-256
2,174,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,473 UART: [kat] ++
2,177,924 UART: [kat] sha1
2,178,437 UART: [kat] SHA2-256
2,179,093 UART: [kat] SHA2-384
2,179,753 UART: [kat] SHA2-512-ACC
2,180,638 UART: [kat] ECC-384
2,946,488 UART: [kat] HMAC-384Kdf
2,971,605 UART: [kat] LMS
3,501,039 UART: [kat] --
3,504,330 UART: [cold-reset] ++
3,506,368 UART: [fht] FHT @ 0x50003400
3,518,198 UART: [idev] ++
3,518,795 UART: [idev] CDI.KEYID = 6
3,519,710 UART: [idev] SUBJECT.KEYID = 7
3,520,925 UART: [idev] UDS.KEYID = 0
3,542,679 UART: [idev] Erasing UDS.KEYID = 0
6,025,323 UART: [idev] Sha1 KeyId Algorithm
6,049,971 UART: [idev] --
6,055,535 UART: [ldev] ++
6,056,103 UART: [ldev] CDI.KEYID = 6
6,056,984 UART: [ldev] SUBJECT.KEYID = 5
6,058,204 UART: [ldev] AUTHORITY.KEYID = 7
6,059,418 UART: [ldev] FE.KEYID = 1
6,098,559 UART: [ldev] Erasing FE.KEYID = 1
8,602,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,652 UART: [ldev] --
10,410,790 UART: [fwproc] Wait for Commands...
10,413,599 UART: [fwproc] Recv command 0x46574c44
10,415,696 UART: [fwproc] Recv'd Img size: 114168 bytes
12,694,924 UART: ROM Fatal Error: 0x000B0023
12,698,062 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,022,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,515,012 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,375 writing to cptra_bootfsm_go
2,027,778 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,172,044 UART:
2,172,433 UART: Running Caliptra ROM ...
2,173,519 UART:
2,173,695 UART: [state] CFI Enabled
2,174,683 UART: [state] LifecycleState = Unprovisioned
2,176,333 UART: [state] DebugLocked = No
2,177,358 UART: [state] WD Timer not started. Device not locked for debugging
2,179,820 UART: [kat] SHA2-256
2,180,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,486 UART: [kat] ++
2,183,929 UART: [kat] sha1
2,184,435 UART: [kat] SHA2-256
2,185,091 UART: [kat] SHA2-384
2,185,749 UART: [kat] SHA2-512-ACC
2,186,555 UART: [kat] ECC-384
3,278,084 UART: [kat] HMAC-384Kdf
3,290,368 UART: [kat] LMS
3,819,861 UART: [kat] --
3,823,979 UART: [cold-reset] ++
3,826,100 UART: [fht] FHT @ 0x50003400
3,837,195 UART: [idev] ++
3,837,757 UART: [idev] CDI.KEYID = 6
3,838,665 UART: [idev] SUBJECT.KEYID = 7
3,839,881 UART: [idev] UDS.KEYID = 0
3,856,890 UART: [idev] Erasing UDS.KEYID = 0
6,315,352 UART: [idev] Sha1 KeyId Algorithm
6,339,488 UART: [idev] --
6,344,854 UART: [ldev] ++
6,345,425 UART: [ldev] CDI.KEYID = 6
6,346,305 UART: [ldev] SUBJECT.KEYID = 5
6,347,511 UART: [ldev] AUTHORITY.KEYID = 7
6,348,802 UART: [ldev] FE.KEYID = 1
6,358,879 UART: [ldev] Erasing FE.KEYID = 1
8,830,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,561 UART: [ldev] --
10,622,504 UART: [fwproc] Wait for Commands...
10,625,521 UART: [fwproc] Recv command 0x46574c44
10,627,620 UART: [fwproc] Recv'd Img size: 114168 bytes
12,919,468 UART: ROM Fatal Error: 0x000B0023
12,922,605 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
2,022,903 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,702,359 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: [kat] ++
895,215 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,640 UART: [kat] HMAC-384Kdf
920,136 UART: [kat] LMS
1,168,448 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,431 UART: [idev] ++
1,172,599 UART: [idev] CDI.KEYID = 6
1,172,960 UART: [idev] SUBJECT.KEYID = 7
1,173,385 UART: [idev] UDS.KEYID = 0
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,505 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,400 UART: [ldev] ++
1,208,568 UART: [ldev] CDI.KEYID = 6
1,208,932 UART: [ldev] SUBJECT.KEYID = 5
1,209,359 UART: [ldev] AUTHORITY.KEYID = 7
1,209,822 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,241,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,460 UART: [ldev] --
1,280,824 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46574c44
1,282,354 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,026 UART: ROM Fatal Error: 0x000B0023
1,549,183 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,658 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,183 UART: [kat] LMS
1,169,495 UART: [kat] --
1,170,332 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,398 UART: [idev] ++
1,173,566 UART: [idev] CDI.KEYID = 6
1,173,927 UART: [idev] SUBJECT.KEYID = 7
1,174,352 UART: [idev] UDS.KEYID = 0
1,182,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,490 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,319 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,821 UART: ROM Fatal Error: 0x000B0023
1,550,978 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,091 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,441 UART: [kat] SHA2-256
901,381 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,058 UART: [kat] LMS
1,168,370 UART: [kat] --
1,169,445 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,758 UART: [ldev] Erasing FE.KEYID = 1
1,242,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,922 UART: [ldev] --
1,282,428 UART: [fwproc] Wait for Commands...
1,283,035 UART: [fwproc] Recv command 0x46574c44
1,283,768 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,208 UART: ROM Fatal Error: 0x000B0023
1,551,365 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,786 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,243 UART: [kat] LMS
1,169,555 UART: [kat] --
1,170,800 UART: [cold-reset] ++
1,171,264 UART: [fht] FHT @ 0x50003400
1,173,766 UART: [idev] ++
1,173,934 UART: [idev] CDI.KEYID = 6
1,174,295 UART: [idev] SUBJECT.KEYID = 7
1,174,720 UART: [idev] UDS.KEYID = 0
1,182,970 UART: [idev] Erasing UDS.KEYID = 0
1,200,000 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,210,061 UART: [ldev] ++
1,210,229 UART: [ldev] CDI.KEYID = 6
1,210,593 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,243,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,833 UART: [ldev] --
1,283,183 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,563 UART: [fwproc] Recv'd Img size: 114168 bytes
1,551,673 UART: ROM Fatal Error: 0x000B0023
1,552,830 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,849 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,181,547 UART: [idev] Erasing UDS.KEYID = 0
1,198,557 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,476 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,260 UART: [ldev] --
1,280,738 UART: [fwproc] Wait for Commands...
1,281,493 UART: [fwproc] Recv command 0x46574c44
1,282,226 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,338 UART: ROM Fatal Error: 0x000B0023
1,549,495 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,090 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,910 UART: [kat] ++
896,062 UART: [kat] sha1
900,392 UART: [kat] SHA2-256
902,332 UART: [kat] SHA2-384
905,249 UART: [kat] SHA2-512-ACC
907,150 UART: [kat] ECC-384
916,801 UART: [kat] HMAC-384Kdf
921,441 UART: [kat] LMS
1,169,753 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,171,090 UART: [fht] FHT @ 0x50003400
1,173,612 UART: [idev] ++
1,173,780 UART: [idev] CDI.KEYID = 6
1,174,141 UART: [idev] SUBJECT.KEYID = 7
1,174,566 UART: [idev] UDS.KEYID = 0
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,208,208 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,216,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,257 UART: [ldev] --
1,281,617 UART: [fwproc] Wait for Commands...
1,282,424 UART: [fwproc] Recv command 0x46574c44
1,283,157 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,565 UART: ROM Fatal Error: 0x000B0023
1,550,722 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,673 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,026,797 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,170,731 UART:
2,171,122 UART: Running Caliptra ROM ...
2,172,286 UART:
2,172,476 UART: [state] CFI Enabled
2,173,433 UART: [state] LifecycleState = Unprovisioned
2,175,084 UART: [state] DebugLocked = No
2,176,195 UART: [state] WD Timer not started. Device not locked for debugging
2,178,669 UART: [kat] SHA2-256
2,179,337 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,372 UART: [kat] ++
2,182,828 UART: [kat] sha1
2,183,384 UART: [kat] SHA2-256
2,184,042 UART: [kat] SHA2-384
2,184,702 UART: [kat] SHA2-512-ACC
2,185,548 UART: [kat] ECC-384
3,772,716 UART: [kat] HMAC-384Kdf
3,799,494 UART: [kat] LMS
4,872,645 UART: [kat] --
4,877,013 UART: [cold-reset] ++
4,879,536 UART: [fht] FHT @ 0x50003400
4,889,856 UART: [idev] ++
4,890,589 UART: [idev] CDI.KEYID = 6
4,891,694 UART: [idev] SUBJECT.KEYID = 7
4,892,912 UART: [idev] UDS.KEYID = 0
4,927,005 UART: [idev] Erasing UDS.KEYID = 0
8,239,065 UART: [idev] Sha1 KeyId Algorithm
8,260,464 UART: [idev] --
8,264,238 UART: [ldev] ++
8,264,809 UART: [ldev] CDI.KEYID = 6
8,266,053 UART: [ldev] SUBJECT.KEYID = 5
8,267,164 UART: [ldev] AUTHORITY.KEYID = 7
8,268,322 UART: [ldev] FE.KEYID = 1
8,315,723 UART: [ldev] Erasing FE.KEYID = 1
11,648,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,184 UART: [ldev] --
14,036,855 UART: [fwproc] Wait for Commands...
14,038,737 UART: [fwproc] Recv command 0x46574c44
14,041,024 UART: [fwproc] Recv'd Img size: 113844 bytes
16,984,761 UART: ROM Fatal Error: 0x000B0021
16,988,165 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,019,093 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,791,335 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,021,322 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,107 UART:
2,165,507 UART: Running Caliptra ROM ...
2,166,674 UART:
2,166,839 UART: [state] CFI Enabled
2,167,794 UART: [state] LifecycleState = Unprovisioned
2,169,446 UART: [state] DebugLocked = No
2,170,775 UART: [state] WD Timer not started. Device not locked for debugging
2,173,263 UART: [kat] SHA2-256
2,173,926 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,937 UART: [kat] ++
2,177,382 UART: [kat] sha1
2,177,889 UART: [kat] SHA2-256
2,178,638 UART: [kat] SHA2-384
2,179,300 UART: [kat] SHA2-512-ACC
2,180,096 UART: [kat] ECC-384
4,094,751 UART: [kat] HMAC-384Kdf
4,105,542 UART: [kat] LMS
5,178,673 UART: [kat] --
5,183,323 UART: [cold-reset] ++
5,185,258 UART: [fht] FHT @ 0x50003400
5,196,280 UART: [idev] ++
5,197,011 UART: [idev] CDI.KEYID = 6
5,198,117 UART: [idev] SUBJECT.KEYID = 7
5,199,654 UART: [idev] UDS.KEYID = 0
5,215,822 UART: [idev] Erasing UDS.KEYID = 0
8,485,413 UART: [idev] Sha1 KeyId Algorithm
8,508,890 UART: [idev] --
8,513,076 UART: [ldev] ++
8,513,670 UART: [ldev] CDI.KEYID = 6
8,514,773 UART: [ldev] SUBJECT.KEYID = 5
8,516,310 UART: [ldev] AUTHORITY.KEYID = 7
8,517,788 UART: [ldev] FE.KEYID = 1
8,529,896 UART: [ldev] Erasing FE.KEYID = 1
11,825,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,468 UART: [ldev] --
14,190,472 UART: [fwproc] Wait for Commands...
14,192,737 UART: [fwproc] Recv command 0x46574c44
14,195,060 UART: [fwproc] Recv'd Img size: 113844 bytes
17,143,653 UART: ROM Fatal Error: 0x000B0021
17,147,058 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,021,804 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,963,191 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,021,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,013 UART:
2,166,438 UART: Running Caliptra ROM ...
2,167,616 UART:
2,167,815 UART: [state] CFI Enabled
2,168,796 UART: [state] LifecycleState = Unprovisioned
2,170,449 UART: [state] DebugLocked = No
2,171,522 UART: [state] WD Timer not started. Device not locked for debugging
2,173,999 UART: [kat] SHA2-256
2,174,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,679 UART: [kat] ++
2,178,134 UART: [kat] sha1
2,178,651 UART: [kat] SHA2-256
2,179,393 UART: [kat] SHA2-384
2,180,057 UART: [kat] SHA2-512-ACC
2,180,886 UART: [kat] ECC-384
2,948,128 UART: [kat] HMAC-384Kdf
2,971,761 UART: [kat] LMS
3,501,198 UART: [kat] --
3,506,005 UART: [cold-reset] ++
3,507,024 UART: [fht] FHT @ 0x50003400
3,518,965 UART: [idev] ++
3,519,533 UART: [idev] CDI.KEYID = 6
3,520,494 UART: [idev] SUBJECT.KEYID = 7
3,521,656 UART: [idev] UDS.KEYID = 0
3,543,897 UART: [idev] Erasing UDS.KEYID = 0
6,026,750 UART: [idev] Sha1 KeyId Algorithm
6,050,368 UART: [idev] --
6,055,344 UART: [ldev] ++
6,055,920 UART: [ldev] CDI.KEYID = 6
6,056,828 UART: [ldev] SUBJECT.KEYID = 5
6,058,053 UART: [ldev] AUTHORITY.KEYID = 7
6,059,296 UART: [ldev] FE.KEYID = 1
6,100,473 UART: [ldev] Erasing FE.KEYID = 1
8,604,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,110 UART: [ldev] --
10,411,624 UART: [fwproc] Wait for Commands...
10,413,291 UART: [fwproc] Recv command 0x46574c44
10,415,342 UART: [fwproc] Recv'd Img size: 114168 bytes
12,705,811 UART: ROM Fatal Error: 0x000B0021
12,708,940 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,020,475 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,471,441 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,021,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,527 UART:
2,165,914 UART: Running Caliptra ROM ...
2,167,088 UART:
2,167,267 UART: [state] CFI Enabled
2,168,236 UART: [state] LifecycleState = Unprovisioned
2,169,877 UART: [state] DebugLocked = No
2,170,977 UART: [state] WD Timer not started. Device not locked for debugging
2,173,450 UART: [kat] SHA2-256
2,174,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,117 UART: [kat] ++
2,177,565 UART: [kat] sha1
2,178,075 UART: [kat] SHA2-256
2,178,812 UART: [kat] SHA2-384
2,179,475 UART: [kat] SHA2-512-ACC
2,180,331 UART: [kat] ECC-384
3,282,317 UART: [kat] HMAC-384Kdf
3,294,540 UART: [kat] LMS
3,823,997 UART: [kat] --
3,828,848 UART: [cold-reset] ++
3,830,400 UART: [fht] FHT @ 0x50003400
3,841,922 UART: [idev] ++
3,842,479 UART: [idev] CDI.KEYID = 6
3,843,489 UART: [idev] SUBJECT.KEYID = 7
3,844,585 UART: [idev] UDS.KEYID = 0
3,860,988 UART: [idev] Erasing UDS.KEYID = 0
6,320,630 UART: [idev] Sha1 KeyId Algorithm
6,344,434 UART: [idev] --
6,348,841 UART: [ldev] ++
6,349,418 UART: [ldev] CDI.KEYID = 6
6,350,336 UART: [ldev] SUBJECT.KEYID = 5
6,351,515 UART: [ldev] AUTHORITY.KEYID = 7
6,352,745 UART: [ldev] FE.KEYID = 1
6,365,000 UART: [ldev] Erasing FE.KEYID = 1
8,842,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,528 UART: [ldev] --
10,634,520 UART: [fwproc] Wait for Commands...
10,637,212 UART: [fwproc] Recv command 0x46574c44
10,639,308 UART: [fwproc] Recv'd Img size: 114168 bytes
12,930,638 UART: ROM Fatal Error: 0x000B0021
12,933,766 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,294 writing to cptra_bootfsm_go
2,022,130 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,691,986 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
2,029,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,173,852 UART:
2,174,266 UART: Running Caliptra ROM ...
2,175,351 UART:
2,175,500 UART: [state] CFI Enabled
2,176,484 UART: [state] LifecycleState = Unprovisioned
2,178,130 UART: [state] DebugLocked = No
2,179,152 UART: [state] WD Timer not started. Device not locked for debugging
2,182,383 UART: [kat] SHA2-256
2,183,067 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,186,110 UART: [kat] ++
2,186,561 UART: [kat] sha1
2,187,070 UART: [kat] SHA2-256
2,187,731 UART: [kat] SHA2-384
2,188,385 UART: [kat] SHA2-512-ACC
2,189,218 UART: [kat] ECC-384
2,950,495 UART: [kat] HMAC-384Kdf
2,972,292 UART: [kat] LMS
3,501,761 UART: [kat] --
3,507,438 UART: [cold-reset] ++
3,508,727 UART: [fht] FHT @ 0x50003400
3,520,139 UART: [idev] ++
3,520,703 UART: [idev] CDI.KEYID = 6
3,521,640 UART: [idev] SUBJECT.KEYID = 7
3,522,854 UART: [idev] UDS.KEYID = 0
3,542,644 UART: [idev] Erasing UDS.KEYID = 0
6,022,991 UART: [idev] Sha1 KeyId Algorithm
6,045,094 UART: [idev] --
6,049,311 UART: [ldev] ++
6,049,883 UART: [ldev] CDI.KEYID = 6
6,050,770 UART: [ldev] SUBJECT.KEYID = 5
6,051,889 UART: [ldev] AUTHORITY.KEYID = 7
6,053,096 UART: [ldev] FE.KEYID = 1
6,098,829 UART: [ldev] Erasing FE.KEYID = 1
8,603,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,968 UART: [ldev] --
10,412,836 UART: [fwproc] Wait for Commands...
10,414,399 UART: [fwproc] Recv command 0x46574c44
10,416,445 UART: [fwproc] Recv'd Img size: 114168 bytes
12,700,889 UART: ROM Fatal Error: 0x000B0021
12,704,027 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,021,352 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,474,284 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,545 writing to cptra_bootfsm_go
2,028,881 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,173,055 UART:
2,173,444 UART: Running Caliptra ROM ...
2,174,617 UART:
2,174,787 UART: [state] CFI Enabled
2,175,754 UART: [state] LifecycleState = Unprovisioned
2,177,393 UART: [state] DebugLocked = No
2,178,496 UART: [state] WD Timer not started. Device not locked for debugging
2,180,990 UART: [kat] SHA2-256
2,181,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,674 UART: [kat] ++
2,185,122 UART: [kat] sha1
2,185,634 UART: [kat] SHA2-256
2,186,372 UART: [kat] SHA2-384
2,187,036 UART: [kat] SHA2-512-ACC
2,187,863 UART: [kat] ECC-384
3,275,640 UART: [kat] HMAC-384Kdf
3,287,707 UART: [kat] LMS
3,817,207 UART: [kat] --
3,821,145 UART: [cold-reset] ++
3,822,960 UART: [fht] FHT @ 0x50003400
3,833,183 UART: [idev] ++
3,833,743 UART: [idev] CDI.KEYID = 6
3,834,754 UART: [idev] SUBJECT.KEYID = 7
3,835,927 UART: [idev] UDS.KEYID = 0
3,851,824 UART: [idev] Erasing UDS.KEYID = 0
6,309,308 UART: [idev] Sha1 KeyId Algorithm
6,332,405 UART: [idev] --
6,335,802 UART: [ldev] ++
6,336,368 UART: [ldev] CDI.KEYID = 6
6,337,277 UART: [ldev] SUBJECT.KEYID = 5
6,338,484 UART: [ldev] AUTHORITY.KEYID = 7
6,339,709 UART: [ldev] FE.KEYID = 1
6,351,380 UART: [ldev] Erasing FE.KEYID = 1
8,826,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,563 UART: [ldev] --
10,617,632 UART: [fwproc] Wait for Commands...
10,620,052 UART: [fwproc] Recv command 0x46574c44
10,622,151 UART: [fwproc] Recv'd Img size: 114168 bytes
12,907,603 UART: ROM Fatal Error: 0x000B0021
12,910,730 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,021,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,698,155 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,685 UART: [cold-reset] ++
1,170,181 UART: [fht] FHT @ 0x50003400
1,172,677 UART: [idev] ++
1,172,845 UART: [idev] CDI.KEYID = 6
1,173,206 UART: [idev] SUBJECT.KEYID = 7
1,173,631 UART: [idev] UDS.KEYID = 0
1,181,367 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,454 UART: [ldev] ++
1,208,622 UART: [ldev] CDI.KEYID = 6
1,208,986 UART: [ldev] SUBJECT.KEYID = 5
1,209,413 UART: [ldev] AUTHORITY.KEYID = 7
1,209,876 UART: [ldev] FE.KEYID = 1
1,214,634 UART: [ldev] Erasing FE.KEYID = 1
1,240,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,172 UART: [ldev] --
1,279,570 UART: [fwproc] Wait for Commands...
1,280,377 UART: [fwproc] Recv command 0x46574c44
1,281,110 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,551 UART: ROM Fatal Error: 0x000B0021
1,548,708 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,123 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,903 UART: [kat] SHA2-512-ACC
906,804 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,115 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,202 UART: [fwproc] Recv command 0x46574c44
1,282,935 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,956 UART: ROM Fatal Error: 0x000B0021
1,551,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,652 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,830 UART: [kat] HMAC-384Kdf
920,420 UART: [kat] LMS
1,168,732 UART: [kat] --
1,169,599 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,199,301 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,150 UART: [ldev] ++
1,209,318 UART: [ldev] CDI.KEYID = 6
1,209,682 UART: [ldev] SUBJECT.KEYID = 5
1,210,109 UART: [ldev] AUTHORITY.KEYID = 7
1,210,572 UART: [ldev] FE.KEYID = 1
1,215,452 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,958 UART: [ldev] --
1,280,458 UART: [fwproc] Wait for Commands...
1,281,123 UART: [fwproc] Recv command 0x46574c44
1,281,856 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,947 UART: ROM Fatal Error: 0x000B0021
1,549,104 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,867 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,493 UART: [kat] SHA2-256
891,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,542 UART: [kat] SHA2-256
901,482 UART: [kat] SHA2-384
904,281 UART: [kat] SHA2-512-ACC
906,182 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,935 UART: [ldev] ++
1,209,103 UART: [ldev] CDI.KEYID = 6
1,209,467 UART: [ldev] SUBJECT.KEYID = 5
1,209,894 UART: [ldev] AUTHORITY.KEYID = 7
1,210,357 UART: [ldev] FE.KEYID = 1
1,215,401 UART: [ldev] Erasing FE.KEYID = 1
1,241,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,983 UART: [ldev] --
1,280,431 UART: [fwproc] Wait for Commands...
1,281,250 UART: [fwproc] Recv command 0x46574c44
1,281,983 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,646 UART: ROM Fatal Error: 0x000B0021
1,548,803 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,464 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: [kat] ++
895,145 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
904,016 UART: [kat] SHA2-512-ACC
905,917 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,390 UART: [kat] LMS
1,168,702 UART: [kat] --
1,169,487 UART: [cold-reset] ++
1,169,909 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,181,191 UART: [idev] Erasing UDS.KEYID = 0
1,198,043 UART: [idev] Sha1 KeyId Algorithm
1,206,989 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,594 UART: [ldev] Erasing FE.KEYID = 1
1,241,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,994 UART: [ldev] --
1,280,398 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x46574c44
1,281,948 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,677 UART: ROM Fatal Error: 0x000B0021
1,549,834 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,221 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,163 UART: [kat] LMS
1,169,475 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,744 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,182,170 UART: [idev] Erasing UDS.KEYID = 0
1,199,674 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,216,053 UART: [ldev] Erasing FE.KEYID = 1
1,242,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,335 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,470 UART: [fwproc] Recv command 0x46574c44
1,283,203 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,956 UART: ROM Fatal Error: 0x000B0021
1,550,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,404,174 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
2,022,383 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,166,237 UART:
2,166,636 UART: Running Caliptra ROM ...
2,167,717 UART:
2,167,869 UART: [state] CFI Enabled
2,168,838 UART: [state] LifecycleState = Unprovisioned
2,170,497 UART: [state] DebugLocked = No
2,171,520 UART: [state] WD Timer not started. Device not locked for debugging
2,173,992 UART: [kat] SHA2-256
2,174,661 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,674 UART: [kat] ++
2,178,122 UART: [kat] sha1
2,178,682 UART: [kat] SHA2-256
2,179,341 UART: [kat] SHA2-384
2,179,999 UART: [kat] SHA2-512-ACC
2,180,797 UART: [kat] ECC-384
3,775,708 UART: [kat] HMAC-384Kdf
3,799,617 UART: [kat] LMS
4,872,740 UART: [kat] --
4,876,971 UART: [cold-reset] ++
4,879,559 UART: [fht] FHT @ 0x50003400
4,890,871 UART: [idev] ++
4,891,553 UART: [idev] CDI.KEYID = 6
4,892,718 UART: [idev] SUBJECT.KEYID = 7
4,893,880 UART: [idev] UDS.KEYID = 0
4,926,736 UART: [idev] Erasing UDS.KEYID = 0
8,239,021 UART: [idev] Sha1 KeyId Algorithm
8,260,122 UART: [idev] --
8,262,661 UART: [ldev] ++
8,263,226 UART: [ldev] CDI.KEYID = 6
8,264,475 UART: [ldev] SUBJECT.KEYID = 5
8,265,641 UART: [ldev] AUTHORITY.KEYID = 7
8,266,760 UART: [ldev] FE.KEYID = 1
8,294,002 UART: [ldev] Erasing FE.KEYID = 1
11,630,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,070 UART: [ldev] --
14,014,804 UART: [fwproc] Wait for Commands...
14,016,470 UART: [fwproc] Recv command 0x46574c44
14,018,790 UART: [fwproc] Recv'd Img size: 113844 bytes
16,968,159 UART: ROM Fatal Error: 0x000B0021
16,971,561 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,018,934 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,774,371 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,020,604 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,372 UART:
2,164,779 UART: Running Caliptra ROM ...
2,165,850 UART:
2,166,002 UART: [state] CFI Enabled
2,166,967 UART: [state] LifecycleState = Unprovisioned
2,168,614 UART: [state] DebugLocked = No
2,169,636 UART: [state] WD Timer not started. Device not locked for debugging
2,172,094 UART: [kat] SHA2-256
2,172,756 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,762 UART: [kat] ++
2,176,207 UART: [kat] sha1
2,176,711 UART: [kat] SHA2-256
2,177,359 UART: [kat] SHA2-384
2,178,006 UART: [kat] SHA2-512-ACC
2,178,823 UART: [kat] ECC-384
4,098,954 UART: [kat] HMAC-384Kdf
4,110,929 UART: [kat] LMS
5,184,067 UART: [kat] --
5,188,349 UART: [cold-reset] ++
5,190,502 UART: [fht] FHT @ 0x50003400
5,201,481 UART: [idev] ++
5,202,149 UART: [idev] CDI.KEYID = 6
5,203,305 UART: [idev] SUBJECT.KEYID = 7
5,204,796 UART: [idev] UDS.KEYID = 0
5,220,533 UART: [idev] Erasing UDS.KEYID = 0
8,495,916 UART: [idev] Sha1 KeyId Algorithm
8,517,854 UART: [idev] --
8,521,423 UART: [ldev] ++
8,522,046 UART: [ldev] CDI.KEYID = 6
8,523,230 UART: [ldev] SUBJECT.KEYID = 5
8,524,742 UART: [ldev] AUTHORITY.KEYID = 7
8,526,246 UART: [ldev] FE.KEYID = 1
8,537,274 UART: [ldev] Erasing FE.KEYID = 1
11,826,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,407 UART: [ldev] --
14,189,749 UART: [fwproc] Wait for Commands...
14,192,541 UART: [fwproc] Recv command 0x46574c44
14,194,860 UART: [fwproc] Recv'd Img size: 113844 bytes
17,142,093 UART: ROM Fatal Error: 0x000B0021
17,145,509 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,022,714 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,973,171 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,024,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,168,549 UART:
2,169,116 UART: Running Caliptra ROM ...
2,170,311 UART:
2,170,481 UART: [state] CFI Enabled
2,171,466 UART: [state] LifecycleState = Unprovisioned
2,173,025 UART: [state] DebugLocked = No
2,174,050 UART: [state] WD Timer not started. Device not locked for debugging
2,176,529 UART: [kat] SHA2-256
2,177,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,241 UART: [kat] ++
2,180,690 UART: [kat] sha1
2,181,203 UART: [kat] SHA2-256
2,181,948 UART: [kat] SHA2-384
2,182,618 UART: [kat] SHA2-512-ACC
2,183,500 UART: [kat] ECC-384
2,949,520 UART: [kat] HMAC-384Kdf
2,972,911 UART: [kat] LMS
3,502,373 UART: [kat] --
3,507,011 UART: [cold-reset] ++
3,508,940 UART: [fht] FHT @ 0x50003400
3,520,624 UART: [idev] ++
3,521,195 UART: [idev] CDI.KEYID = 6
3,522,080 UART: [idev] SUBJECT.KEYID = 7
3,523,294 UART: [idev] UDS.KEYID = 0
3,543,714 UART: [idev] Erasing UDS.KEYID = 0
6,027,321 UART: [idev] Sha1 KeyId Algorithm
6,049,960 UART: [idev] --
6,052,878 UART: [ldev] ++
6,053,453 UART: [ldev] CDI.KEYID = 6
6,054,377 UART: [ldev] SUBJECT.KEYID = 5
6,055,550 UART: [ldev] AUTHORITY.KEYID = 7
6,056,791 UART: [ldev] FE.KEYID = 1
6,100,453 UART: [ldev] Erasing FE.KEYID = 1
8,601,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,305 UART: [ldev] --
10,413,801 UART: [fwproc] Wait for Commands...
10,416,467 UART: [fwproc] Recv command 0x46574c44
10,418,524 UART: [fwproc] Recv'd Img size: 114168 bytes
12,710,964 UART: ROM Fatal Error: 0x000B0021
12,714,098 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
2,038,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,517,849 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
2,023,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,929 UART:
2,168,324 UART: Running Caliptra ROM ...
2,169,443 UART:
2,169,605 UART: [state] CFI Enabled
2,170,586 UART: [state] LifecycleState = Unprovisioned
2,172,240 UART: [state] DebugLocked = No
2,173,268 UART: [state] WD Timer not started. Device not locked for debugging
2,175,739 UART: [kat] SHA2-256
2,176,404 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,413 UART: [kat] ++
2,179,882 UART: [kat] sha1
2,180,399 UART: [kat] SHA2-256
2,181,137 UART: [kat] SHA2-384
2,181,804 UART: [kat] SHA2-512-ACC
2,182,678 UART: [kat] ECC-384
3,285,846 UART: [kat] HMAC-384Kdf
3,298,557 UART: [kat] LMS
3,828,103 UART: [kat] --
3,833,040 UART: [cold-reset] ++
3,835,410 UART: [fht] FHT @ 0x50003400
3,847,299 UART: [idev] ++
3,847,866 UART: [idev] CDI.KEYID = 6
3,848,797 UART: [idev] SUBJECT.KEYID = 7
3,850,003 UART: [idev] UDS.KEYID = 0
3,862,936 UART: [idev] Erasing UDS.KEYID = 0
6,321,881 UART: [idev] Sha1 KeyId Algorithm
6,344,151 UART: [idev] --
6,348,413 UART: [ldev] ++
6,348,980 UART: [ldev] CDI.KEYID = 6
6,349,947 UART: [ldev] SUBJECT.KEYID = 5
6,351,104 UART: [ldev] AUTHORITY.KEYID = 7
6,352,331 UART: [ldev] FE.KEYID = 1
6,363,893 UART: [ldev] Erasing FE.KEYID = 1
8,836,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,731 UART: [ldev] --
10,625,145 UART: [fwproc] Wait for Commands...
10,626,591 UART: [fwproc] Recv command 0x46574c44
10,628,683 UART: [fwproc] Recv'd Img size: 114168 bytes
12,923,206 UART: ROM Fatal Error: 0x000B0021
12,926,339 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,020,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,708,485 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,023,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,168,051 UART:
2,168,472 UART: Running Caliptra ROM ...
2,169,564 UART:
2,169,717 UART: [state] CFI Enabled
2,170,714 UART: [state] LifecycleState = Unprovisioned
2,172,372 UART: [state] DebugLocked = No
2,173,404 UART: [state] WD Timer not started. Device not locked for debugging
2,175,877 UART: [kat] SHA2-256
2,176,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,566 UART: [kat] ++
2,180,018 UART: [kat] sha1
2,180,534 UART: [kat] SHA2-256
2,181,279 UART: [kat] SHA2-384
2,181,947 UART: [kat] SHA2-512-ACC
2,182,940 UART: [kat] ECC-384
2,948,698 UART: [kat] HMAC-384Kdf
2,971,160 UART: [kat] LMS
3,500,575 UART: [kat] --
3,504,739 UART: [cold-reset] ++
3,507,000 UART: [fht] FHT @ 0x50003400
3,517,446 UART: [idev] ++
3,518,019 UART: [idev] CDI.KEYID = 6
3,518,903 UART: [idev] SUBJECT.KEYID = 7
3,520,172 UART: [idev] UDS.KEYID = 0
3,542,935 UART: [idev] Erasing UDS.KEYID = 0
6,027,548 UART: [idev] Sha1 KeyId Algorithm
6,049,906 UART: [idev] --
6,053,729 UART: [ldev] ++
6,054,318 UART: [ldev] CDI.KEYID = 6
6,055,201 UART: [ldev] SUBJECT.KEYID = 5
6,056,418 UART: [ldev] AUTHORITY.KEYID = 7
6,057,662 UART: [ldev] FE.KEYID = 1
6,100,004 UART: [ldev] Erasing FE.KEYID = 1
8,601,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,244 UART: [ldev] --
10,390,463 UART: [fwproc] Wait for Commands...
10,392,941 UART: [fwproc] Recv command 0x46574c44
10,395,048 UART: [fwproc] Recv'd Img size: 114168 bytes
12,678,764 UART: ROM Fatal Error: 0x000B0021
12,681,872 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
2,023,065 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,493,367 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,020,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,164,552 UART:
2,164,945 UART: Running Caliptra ROM ...
2,166,127 UART:
2,166,298 UART: [state] CFI Enabled
2,167,270 UART: [state] LifecycleState = Unprovisioned
2,168,910 UART: [state] DebugLocked = No
2,170,017 UART: [state] WD Timer not started. Device not locked for debugging
2,172,489 UART: [kat] SHA2-256
2,173,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,165 UART: [kat] ++
2,176,665 UART: [kat] sha1
2,177,180 UART: [kat] SHA2-256
2,177,918 UART: [kat] SHA2-384
2,178,583 UART: [kat] SHA2-512-ACC
2,179,391 UART: [kat] ECC-384
3,279,767 UART: [kat] HMAC-384Kdf
3,292,361 UART: [kat] LMS
3,821,852 UART: [kat] --
3,825,328 UART: [cold-reset] ++
3,827,159 UART: [fht] FHT @ 0x50003400
3,837,925 UART: [idev] ++
3,838,526 UART: [idev] CDI.KEYID = 6
3,839,414 UART: [idev] SUBJECT.KEYID = 7
3,840,628 UART: [idev] UDS.KEYID = 0
3,854,798 UART: [idev] Erasing UDS.KEYID = 0
6,308,193 UART: [idev] Sha1 KeyId Algorithm
6,330,499 UART: [idev] --
6,335,761 UART: [ldev] ++
6,336,340 UART: [ldev] CDI.KEYID = 6
6,337,257 UART: [ldev] SUBJECT.KEYID = 5
6,338,418 UART: [ldev] AUTHORITY.KEYID = 7
6,339,724 UART: [ldev] FE.KEYID = 1
6,352,369 UART: [ldev] Erasing FE.KEYID = 1
8,827,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,598 UART: [ldev] --
10,620,113 UART: [fwproc] Wait for Commands...
10,623,127 UART: [fwproc] Recv command 0x46574c44
10,625,168 UART: [fwproc] Recv'd Img size: 114168 bytes
12,918,073 UART: ROM Fatal Error: 0x000B0021
12,921,211 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,021,418 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,697,179 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
88,044 UART: [kat] SHA2-256
891,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,723 UART: [kat] ++
895,875 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,932 UART: [kat] SHA2-512-ACC
906,833 UART: [kat] ECC-384
916,848 UART: [kat] HMAC-384Kdf
921,346 UART: [kat] LMS
1,169,658 UART: [kat] --
1,170,667 UART: [cold-reset] ++
1,171,047 UART: [fht] FHT @ 0x50003400
1,173,813 UART: [idev] ++
1,173,981 UART: [idev] CDI.KEYID = 6
1,174,342 UART: [idev] SUBJECT.KEYID = 7
1,174,767 UART: [idev] UDS.KEYID = 0
1,182,623 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,366 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,453 UART: [fwproc] Recv command 0x46574c44
1,282,186 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,277 UART: ROM Fatal Error: 0x000B0021
1,549,434 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,571 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,701 UART: [kat] SHA2-512-ACC
906,602 UART: [kat] ECC-384
916,685 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,450 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,039 UART: [idev] SUBJECT.KEYID = 7
1,174,464 UART: [idev] UDS.KEYID = 0
1,182,584 UART: [idev] Erasing UDS.KEYID = 0
1,199,562 UART: [idev] Sha1 KeyId Algorithm
1,208,614 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,205 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,605 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,282,143 UART: [fwproc] Wait for Commands...
1,282,858 UART: [fwproc] Recv command 0x46574c44
1,283,591 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,198 UART: ROM Fatal Error: 0x000B0021
1,550,355 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,554 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,750 UART: [kat] SHA2-512-ACC
906,651 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
921,036 UART: [kat] LMS
1,169,348 UART: [kat] --
1,170,295 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,331 UART: [idev] ++
1,173,499 UART: [idev] CDI.KEYID = 6
1,173,860 UART: [idev] SUBJECT.KEYID = 7
1,174,285 UART: [idev] UDS.KEYID = 0
1,182,057 UART: [idev] Erasing UDS.KEYID = 0
1,199,491 UART: [idev] Sha1 KeyId Algorithm
1,208,389 UART: [idev] --
1,209,510 UART: [ldev] ++
1,209,678 UART: [ldev] CDI.KEYID = 6
1,210,042 UART: [ldev] SUBJECT.KEYID = 5
1,210,469 UART: [ldev] AUTHORITY.KEYID = 7
1,210,932 UART: [ldev] FE.KEYID = 1
1,215,890 UART: [ldev] Erasing FE.KEYID = 1
1,242,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,142 UART: [ldev] --
1,281,636 UART: [fwproc] Wait for Commands...
1,282,369 UART: [fwproc] Recv command 0x46574c44
1,283,102 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,169 UART: ROM Fatal Error: 0x000B0021
1,551,326 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,941 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,290 UART: [kat] SHA2-256
902,230 UART: [kat] SHA2-384
904,955 UART: [kat] SHA2-512-ACC
906,856 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,375 UART: [kat] LMS
1,169,687 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,359 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,673 UART: [ldev] Erasing FE.KEYID = 1
1,243,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,361 UART: [ldev] --
1,282,767 UART: [fwproc] Wait for Commands...
1,283,574 UART: [fwproc] Recv command 0x46574c44
1,284,307 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,400 UART: ROM Fatal Error: 0x000B0021
1,550,557 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,932 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,849 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,199,211 UART: [idev] Sha1 KeyId Algorithm
1,208,053 UART: [idev] --
1,209,274 UART: [ldev] ++
1,209,442 UART: [ldev] CDI.KEYID = 6
1,209,806 UART: [ldev] SUBJECT.KEYID = 5
1,210,233 UART: [ldev] AUTHORITY.KEYID = 7
1,210,696 UART: [ldev] FE.KEYID = 1
1,216,028 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,160 UART: [fwproc] Wait for Commands...
1,281,893 UART: [fwproc] Recv command 0x46574c44
1,282,626 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,839 UART: ROM Fatal Error: 0x000B0021
1,549,996 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,400,917 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,474 UART: [kat] SHA2-256
902,414 UART: [kat] SHA2-384
905,173 UART: [kat] SHA2-512-ACC
907,074 UART: [kat] ECC-384
916,823 UART: [kat] HMAC-384Kdf
921,465 UART: [kat] LMS
1,169,777 UART: [kat] --
1,170,630 UART: [cold-reset] ++
1,171,076 UART: [fht] FHT @ 0x50003400
1,173,760 UART: [idev] ++
1,173,928 UART: [idev] CDI.KEYID = 6
1,174,289 UART: [idev] SUBJECT.KEYID = 7
1,174,714 UART: [idev] UDS.KEYID = 0
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,995 UART: [ldev] --
1,281,329 UART: [fwproc] Wait for Commands...
1,282,040 UART: [fwproc] Recv command 0x46574c44
1,282,773 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,554 UART: ROM Fatal Error: 0x000B0021
1,549,711 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,688 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
2,024,584 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,168,490 UART:
2,168,908 UART: Running Caliptra ROM ...
2,170,082 UART:
2,170,271 UART: [state] CFI Enabled
2,171,230 UART: [state] LifecycleState = Unprovisioned
2,172,881 UART: [state] DebugLocked = No
2,173,982 UART: [state] WD Timer not started. Device not locked for debugging
2,176,465 UART: [kat] SHA2-256
2,177,135 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,152 UART: [kat] ++
2,180,608 UART: [kat] sha1
2,181,123 UART: [kat] SHA2-256
2,181,881 UART: [kat] SHA2-384
2,182,547 UART: [kat] SHA2-512-ACC
2,183,348 UART: [kat] ECC-384
3,774,925 UART: [kat] HMAC-384Kdf
3,801,535 UART: [kat] LMS
4,874,698 UART: [kat] --
4,879,552 UART: [cold-reset] ++
4,882,035 UART: [fht] FHT @ 0x50003400
4,894,209 UART: [idev] ++
4,894,884 UART: [idev] CDI.KEYID = 6
4,896,118 UART: [idev] SUBJECT.KEYID = 7
4,897,274 UART: [idev] UDS.KEYID = 0
4,928,868 UART: [idev] Erasing UDS.KEYID = 0
8,241,864 UART: [idev] Sha1 KeyId Algorithm
8,264,232 UART: [idev] --
8,269,193 UART: [ldev] ++
8,269,780 UART: [ldev] CDI.KEYID = 6
8,270,960 UART: [ldev] SUBJECT.KEYID = 5
8,272,121 UART: [ldev] AUTHORITY.KEYID = 7
8,273,347 UART: [ldev] FE.KEYID = 1
8,317,158 UART: [ldev] Erasing FE.KEYID = 1
11,652,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,046 UART: [ldev] --
14,036,178 UART: [fwproc] Wait for Commands...
14,038,384 UART: [fwproc] Recv command 0x46574c44
14,040,707 UART: [fwproc] Recv'd Img size: 113844 bytes
16,991,733 UART: ROM Fatal Error: 0x000B0022
16,995,135 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,020,642 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,761,541 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
2,027,005 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,170,917 UART:
2,171,325 UART: Running Caliptra ROM ...
2,172,492 UART:
2,172,654 UART: [state] CFI Enabled
2,173,612 UART: [state] LifecycleState = Unprovisioned
2,175,263 UART: [state] DebugLocked = No
2,176,360 UART: [state] WD Timer not started. Device not locked for debugging
2,178,830 UART: [kat] SHA2-256
2,179,491 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,522 UART: [kat] ++
2,182,971 UART: [kat] sha1
2,183,514 UART: [kat] SHA2-256
2,184,164 UART: [kat] SHA2-384
2,184,814 UART: [kat] SHA2-512-ACC
2,185,605 UART: [kat] ECC-384
4,096,593 UART: [kat] HMAC-384Kdf
4,110,079 UART: [kat] LMS
5,183,224 UART: [kat] --
5,187,708 UART: [cold-reset] ++
5,190,019 UART: [fht] FHT @ 0x50003400
5,201,596 UART: [idev] ++
5,202,272 UART: [idev] CDI.KEYID = 6
5,203,456 UART: [idev] SUBJECT.KEYID = 7
5,204,943 UART: [idev] UDS.KEYID = 0
5,220,188 UART: [idev] Erasing UDS.KEYID = 0
8,494,142 UART: [idev] Sha1 KeyId Algorithm
8,516,101 UART: [idev] --
8,521,639 UART: [ldev] ++
8,522,214 UART: [ldev] CDI.KEYID = 6
8,523,452 UART: [ldev] SUBJECT.KEYID = 5
8,524,886 UART: [ldev] AUTHORITY.KEYID = 7
8,526,448 UART: [ldev] FE.KEYID = 1
8,537,258 UART: [ldev] Erasing FE.KEYID = 1
11,827,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,684 UART: [ldev] --
14,193,106 UART: [fwproc] Wait for Commands...
14,194,774 UART: [fwproc] Recv command 0x46574c44
14,197,100 UART: [fwproc] Recv'd Img size: 113844 bytes
17,137,522 UART: ROM Fatal Error: 0x000B0022
17,140,928 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,026,664 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,953,072 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,035,400 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,179,931 UART:
2,180,324 UART: Running Caliptra ROM ...
2,181,405 UART:
2,181,562 UART: [state] CFI Enabled
2,182,550 UART: [state] LifecycleState = Unprovisioned
2,184,201 UART: [state] DebugLocked = No
2,185,306 UART: [state] WD Timer not started. Device not locked for debugging
2,187,784 UART: [kat] SHA2-256
2,188,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,496 UART: [kat] ++
2,191,949 UART: [kat] sha1
2,192,465 UART: [kat] SHA2-256
2,193,210 UART: [kat] SHA2-384
2,193,877 UART: [kat] SHA2-512-ACC
2,194,723 UART: [kat] ECC-384
2,949,901 UART: [kat] HMAC-384Kdf
2,974,829 UART: [kat] LMS
3,504,245 UART: [kat] --
3,508,182 UART: [cold-reset] ++
3,509,840 UART: [fht] FHT @ 0x50003400
3,520,662 UART: [idev] ++
3,521,238 UART: [idev] CDI.KEYID = 6
3,522,153 UART: [idev] SUBJECT.KEYID = 7
3,523,370 UART: [idev] UDS.KEYID = 0
3,546,066 UART: [idev] Erasing UDS.KEYID = 0
6,032,267 UART: [idev] Sha1 KeyId Algorithm
6,056,372 UART: [idev] --
6,059,352 UART: [ldev] ++
6,059,926 UART: [ldev] CDI.KEYID = 6
6,060,831 UART: [ldev] SUBJECT.KEYID = 5
6,061,999 UART: [ldev] AUTHORITY.KEYID = 7
6,063,235 UART: [ldev] FE.KEYID = 1
6,101,870 UART: [ldev] Erasing FE.KEYID = 1
8,604,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,763 UART: [ldev] --
10,397,871 UART: [fwproc] Wait for Commands...
10,401,074 UART: [fwproc] Recv command 0x46574c44
10,403,179 UART: [fwproc] Recv'd Img size: 114168 bytes
12,694,659 UART: ROM Fatal Error: 0x000B0022
12,697,796 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
2,032,067 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,458,375 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,022,130 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,311 UART:
2,166,700 UART: Running Caliptra ROM ...
2,167,875 UART:
2,168,042 UART: [state] CFI Enabled
2,168,957 UART: [state] LifecycleState = Unprovisioned
2,170,818 UART: [state] DebugLocked = No
2,171,857 UART: [state] WD Timer not started. Device not locked for debugging
2,174,336 UART: [kat] SHA2-256
2,175,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,025 UART: [kat] ++
2,178,478 UART: [kat] sha1
2,178,987 UART: [kat] SHA2-256
2,179,750 UART: [kat] SHA2-384
2,180,417 UART: [kat] SHA2-512-ACC
2,181,297 UART: [kat] ECC-384
3,282,582 UART: [kat] HMAC-384Kdf
3,295,789 UART: [kat] LMS
3,825,266 UART: [kat] --
3,827,482 UART: [cold-reset] ++
3,828,982 UART: [fht] FHT @ 0x50003400
3,839,360 UART: [idev] ++
3,839,915 UART: [idev] CDI.KEYID = 6
3,840,885 UART: [idev] SUBJECT.KEYID = 7
3,842,037 UART: [idev] UDS.KEYID = 0
3,860,445 UART: [idev] Erasing UDS.KEYID = 0
6,316,261 UART: [idev] Sha1 KeyId Algorithm
6,339,003 UART: [idev] --
6,344,057 UART: [ldev] ++
6,344,657 UART: [ldev] CDI.KEYID = 6
6,345,571 UART: [ldev] SUBJECT.KEYID = 5
6,346,730 UART: [ldev] AUTHORITY.KEYID = 7
6,347,959 UART: [ldev] FE.KEYID = 1
6,359,196 UART: [ldev] Erasing FE.KEYID = 1
8,835,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,271 UART: [ldev] --
10,625,177 UART: [fwproc] Wait for Commands...
10,627,916 UART: [fwproc] Recv command 0x46574c44
10,629,954 UART: [fwproc] Recv'd Img size: 114168 bytes
12,917,094 UART: ROM Fatal Error: 0x000B0022
12,920,230 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
2,021,455 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,684,855 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,033,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,178,039 UART:
2,178,454 UART: Running Caliptra ROM ...
2,179,531 UART:
2,179,685 UART: [state] CFI Enabled
2,180,684 UART: [state] LifecycleState = Unprovisioned
2,182,334 UART: [state] DebugLocked = No
2,183,360 UART: [state] WD Timer not started. Device not locked for debugging
2,185,825 UART: [kat] SHA2-256
2,186,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,501 UART: [kat] ++
2,189,957 UART: [kat] sha1
2,190,464 UART: [kat] SHA2-256
2,191,121 UART: [kat] SHA2-384
2,191,776 UART: [kat] SHA2-512-ACC
2,192,617 UART: [kat] ECC-384
2,948,204 UART: [kat] HMAC-384Kdf
2,971,606 UART: [kat] LMS
3,501,066 UART: [kat] --
3,507,030 UART: [cold-reset] ++
3,508,213 UART: [fht] FHT @ 0x50003400
3,519,275 UART: [idev] ++
3,519,845 UART: [idev] CDI.KEYID = 6
3,520,752 UART: [idev] SUBJECT.KEYID = 7
3,521,968 UART: [idev] UDS.KEYID = 0
3,543,632 UART: [idev] Erasing UDS.KEYID = 0
6,027,570 UART: [idev] Sha1 KeyId Algorithm
6,050,699 UART: [idev] --
6,053,569 UART: [ldev] ++
6,054,148 UART: [ldev] CDI.KEYID = 6
6,055,057 UART: [ldev] SUBJECT.KEYID = 5
6,056,220 UART: [ldev] AUTHORITY.KEYID = 7
6,057,452 UART: [ldev] FE.KEYID = 1
6,099,379 UART: [ldev] Erasing FE.KEYID = 1
8,604,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,410 UART: [ldev] --
10,412,614 UART: [fwproc] Wait for Commands...
10,414,175 UART: [fwproc] Recv command 0x46574c44
10,416,279 UART: [fwproc] Recv'd Img size: 114168 bytes
12,706,149 UART: ROM Fatal Error: 0x000B0022
12,709,283 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,022,304 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,478,506 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,022,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,574 UART:
2,166,975 UART: Running Caliptra ROM ...
2,168,147 UART:
2,168,316 UART: [state] CFI Enabled
2,169,292 UART: [state] LifecycleState = Unprovisioned
2,170,934 UART: [state] DebugLocked = No
2,172,041 UART: [state] WD Timer not started. Device not locked for debugging
2,174,515 UART: [kat] SHA2-256
2,175,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,189 UART: [kat] ++
2,178,638 UART: [kat] sha1
2,179,150 UART: [kat] SHA2-256
2,179,889 UART: [kat] SHA2-384
2,180,555 UART: [kat] SHA2-512-ACC
2,181,388 UART: [kat] ECC-384
3,286,541 UART: [kat] HMAC-384Kdf
3,298,796 UART: [kat] LMS
3,828,254 UART: [kat] --
3,832,787 UART: [cold-reset] ++
3,834,825 UART: [fht] FHT @ 0x50003400
3,847,261 UART: [idev] ++
3,847,823 UART: [idev] CDI.KEYID = 6
3,848,836 UART: [idev] SUBJECT.KEYID = 7
3,849,934 UART: [idev] UDS.KEYID = 0
3,861,480 UART: [idev] Erasing UDS.KEYID = 0
6,316,167 UART: [idev] Sha1 KeyId Algorithm
6,338,851 UART: [idev] --
6,342,244 UART: [ldev] ++
6,342,812 UART: [ldev] CDI.KEYID = 6
6,343,726 UART: [ldev] SUBJECT.KEYID = 5
6,344,886 UART: [ldev] AUTHORITY.KEYID = 7
6,346,136 UART: [ldev] FE.KEYID = 1
6,357,913 UART: [ldev] Erasing FE.KEYID = 1
8,829,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,282 UART: [ldev] --
10,622,465 UART: [fwproc] Wait for Commands...
10,623,970 UART: [fwproc] Recv command 0x46574c44
10,626,072 UART: [fwproc] Recv'd Img size: 114168 bytes
12,913,427 UART: ROM Fatal Error: 0x000B0022
12,916,568 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
2,020,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,696,132 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,302 UART: [kat] SHA2-512-ACC
906,203 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,603 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,199,411 UART: [idev] Sha1 KeyId Algorithm
1,208,327 UART: [idev] --
1,209,392 UART: [ldev] ++
1,209,560 UART: [ldev] CDI.KEYID = 6
1,209,924 UART: [ldev] SUBJECT.KEYID = 5
1,210,351 UART: [ldev] AUTHORITY.KEYID = 7
1,210,814 UART: [ldev] FE.KEYID = 1
1,215,918 UART: [ldev] Erasing FE.KEYID = 1
1,241,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,978 UART: [fwproc] Wait for Commands...
1,281,609 UART: [fwproc] Recv command 0x46574c44
1,282,342 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,043 UART: ROM Fatal Error: 0x000B0022
1,549,200 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,147 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,819 UART: [kat] LMS
1,169,131 UART: [kat] --
1,170,264 UART: [cold-reset] ++
1,170,748 UART: [fht] FHT @ 0x50003400
1,173,440 UART: [idev] ++
1,173,608 UART: [idev] CDI.KEYID = 6
1,173,969 UART: [idev] SUBJECT.KEYID = 7
1,174,394 UART: [idev] UDS.KEYID = 0
1,182,156 UART: [idev] Erasing UDS.KEYID = 0
1,199,570 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,455 UART: [ldev] ++
1,209,623 UART: [ldev] CDI.KEYID = 6
1,209,987 UART: [ldev] SUBJECT.KEYID = 5
1,210,414 UART: [ldev] AUTHORITY.KEYID = 7
1,210,877 UART: [ldev] FE.KEYID = 1
1,216,215 UART: [ldev] Erasing FE.KEYID = 1
1,242,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,493 UART: [fwproc] Wait for Commands...
1,283,242 UART: [fwproc] Recv command 0x46574c44
1,283,975 UART: [fwproc] Recv'd Img size: 114168 bytes
1,551,110 UART: ROM Fatal Error: 0x000B0022
1,552,267 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,692 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,199,211 UART: [idev] Sha1 KeyId Algorithm
1,208,097 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,942 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,768 UART: [ldev] --
1,281,086 UART: [fwproc] Wait for Commands...
1,281,881 UART: [fwproc] Recv command 0x46574c44
1,282,614 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,901 UART: ROM Fatal Error: 0x000B0022
1,550,058 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,603 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
917,017 UART: [kat] HMAC-384Kdf
921,553 UART: [kat] LMS
1,169,865 UART: [kat] --
1,170,622 UART: [cold-reset] ++
1,171,072 UART: [fht] FHT @ 0x50003400
1,173,926 UART: [idev] ++
1,174,094 UART: [idev] CDI.KEYID = 6
1,174,455 UART: [idev] SUBJECT.KEYID = 7
1,174,880 UART: [idev] UDS.KEYID = 0
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,060 UART: [idev] Sha1 KeyId Algorithm
1,209,044 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,243,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,418 UART: [fwproc] Recv command 0x46574c44
1,284,151 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,626 UART: ROM Fatal Error: 0x000B0022
1,551,783 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,454 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,519 UART: [kat] SHA2-256
901,459 UART: [kat] SHA2-384
904,156 UART: [kat] SHA2-512-ACC
906,057 UART: [kat] ECC-384
915,774 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,055 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,198,041 UART: [idev] Sha1 KeyId Algorithm
1,207,093 UART: [idev] --
1,208,156 UART: [ldev] ++
1,208,324 UART: [ldev] CDI.KEYID = 6
1,208,688 UART: [ldev] SUBJECT.KEYID = 5
1,209,115 UART: [ldev] AUTHORITY.KEYID = 7
1,209,578 UART: [ldev] FE.KEYID = 1
1,214,752 UART: [ldev] Erasing FE.KEYID = 1
1,242,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,154 UART: [ldev] --
1,281,456 UART: [fwproc] Wait for Commands...
1,282,251 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,485 UART: ROM Fatal Error: 0x000B0022
1,549,642 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,207 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,146 UART: [idev] ++
1,173,314 UART: [idev] CDI.KEYID = 6
1,173,675 UART: [idev] SUBJECT.KEYID = 7
1,174,100 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,674 UART: [idev] Sha1 KeyId Algorithm
1,208,614 UART: [idev] --
1,209,683 UART: [ldev] ++
1,209,851 UART: [ldev] CDI.KEYID = 6
1,210,215 UART: [ldev] SUBJECT.KEYID = 5
1,210,642 UART: [ldev] AUTHORITY.KEYID = 7
1,211,105 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,241,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,395 UART: [ldev] --
1,280,723 UART: [fwproc] Wait for Commands...
1,281,454 UART: [fwproc] Recv command 0x46574c44
1,282,187 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,364 UART: ROM Fatal Error: 0x000B0022
1,549,521 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,510 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
2,026,786 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,170,720 UART:
2,171,126 UART: Running Caliptra ROM ...
2,172,296 UART:
2,172,469 UART: [state] CFI Enabled
2,173,454 UART: [state] LifecycleState = Unprovisioned
2,175,307 UART: [state] DebugLocked = No
2,176,441 UART: [state] WD Timer not started. Device not locked for debugging
2,178,935 UART: [kat] SHA2-256
2,179,614 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,182,647 UART: [kat] ++
2,183,104 UART: [kat] sha1
2,183,617 UART: [kat] SHA2-256
2,184,274 UART: [kat] SHA2-384
2,184,931 UART: [kat] SHA2-512-ACC
2,185,782 UART: [kat] ECC-384
3,776,087 UART: [kat] HMAC-384Kdf
3,803,031 UART: [kat] LMS
4,876,206 UART: [kat] --
4,881,388 UART: [cold-reset] ++
4,882,901 UART: [fht] FHT @ 0x50003400
4,895,647 UART: [idev] ++
4,896,273 UART: [idev] CDI.KEYID = 6
4,897,196 UART: [idev] SUBJECT.KEYID = 7
4,898,360 UART: [idev] UDS.KEYID = 0
4,931,755 UART: [idev] Erasing UDS.KEYID = 0
8,244,209 UART: [idev] Sha1 KeyId Algorithm
8,266,733 UART: [idev] --
8,271,242 UART: [ldev] ++
8,271,819 UART: [ldev] CDI.KEYID = 6
8,273,004 UART: [ldev] SUBJECT.KEYID = 5
8,274,117 UART: [ldev] AUTHORITY.KEYID = 7
8,275,401 UART: [ldev] FE.KEYID = 1
8,318,994 UART: [ldev] Erasing FE.KEYID = 1
11,655,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,147 UART: [ldev] --
14,039,995 UART: [fwproc] Wait for Commands...
14,042,798 UART: [fwproc] Recv command 0x46574c44
14,045,088 UART: [fwproc] Recv'd Img size: 113844 bytes
16,983,709 UART: ROM Fatal Error: 0x000B0021
16,987,115 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,023,588 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,769,490 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
2,025,710 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,169,549 UART:
2,169,951 UART: Running Caliptra ROM ...
2,171,029 UART:
2,171,181 UART: [state] CFI Enabled
2,172,144 UART: [state] LifecycleState = Unprovisioned
2,173,793 UART: [state] DebugLocked = No
2,174,896 UART: [state] WD Timer not started. Device not locked for debugging
2,177,363 UART: [kat] SHA2-256
2,178,023 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,030 UART: [kat] ++
2,181,479 UART: [kat] sha1
2,181,986 UART: [kat] SHA2-256
2,182,718 UART: [kat] SHA2-384
2,183,379 UART: [kat] SHA2-512-ACC
2,184,273 UART: [kat] ECC-384
4,096,502 UART: [kat] HMAC-384Kdf
4,110,078 UART: [kat] LMS
5,183,200 UART: [kat] --
5,187,688 UART: [cold-reset] ++
5,189,418 UART: [fht] FHT @ 0x50003400
5,199,881 UART: [idev] ++
5,200,588 UART: [idev] CDI.KEYID = 6
5,201,693 UART: [idev] SUBJECT.KEYID = 7
5,203,238 UART: [idev] UDS.KEYID = 0
5,221,186 UART: [idev] Erasing UDS.KEYID = 0
8,494,186 UART: [idev] Sha1 KeyId Algorithm
8,516,036 UART: [idev] --
8,520,252 UART: [ldev] ++
8,520,824 UART: [ldev] CDI.KEYID = 6
8,522,061 UART: [ldev] SUBJECT.KEYID = 5
8,523,518 UART: [ldev] AUTHORITY.KEYID = 7
8,525,085 UART: [ldev] FE.KEYID = 1
8,535,084 UART: [ldev] Erasing FE.KEYID = 1
11,830,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,452 UART: [ldev] --
14,195,955 UART: [fwproc] Wait for Commands...
14,197,883 UART: [fwproc] Recv command 0x46574c44
14,200,206 UART: [fwproc] Recv'd Img size: 113844 bytes
17,145,648 UART: ROM Fatal Error: 0x000B0021
17,149,076 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,026,243 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,948,422 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,025,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,545 UART:
2,169,955 UART: Running Caliptra ROM ...
2,171,036 UART:
2,171,190 UART: [state] CFI Enabled
2,172,170 UART: [state] LifecycleState = Unprovisioned
2,173,818 UART: [state] DebugLocked = No
2,174,846 UART: [state] WD Timer not started. Device not locked for debugging
2,177,311 UART: [kat] SHA2-256
2,177,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,981 UART: [kat] ++
2,181,430 UART: [kat] sha1
2,181,935 UART: [kat] SHA2-256
2,182,591 UART: [kat] SHA2-384
2,183,244 UART: [kat] SHA2-512-ACC
2,184,062 UART: [kat] ECC-384
2,927,157 UART: [kat] HMAC-384Kdf
2,950,021 UART: [kat] LMS
3,479,435 UART: [kat] --
3,483,748 UART: [cold-reset] ++
3,485,780 UART: [fht] FHT @ 0x50003400
3,496,321 UART: [idev] ++
3,496,883 UART: [idev] CDI.KEYID = 6
3,497,790 UART: [idev] SUBJECT.KEYID = 7
3,499,007 UART: [idev] UDS.KEYID = 0
3,521,902 UART: [idev] Erasing UDS.KEYID = 0
6,006,716 UART: [idev] Sha1 KeyId Algorithm
6,029,881 UART: [idev] --
6,033,829 UART: [ldev] ++
6,034,400 UART: [ldev] CDI.KEYID = 6
6,035,313 UART: [ldev] SUBJECT.KEYID = 5
6,036,625 UART: [ldev] AUTHORITY.KEYID = 7
6,037,827 UART: [ldev] FE.KEYID = 1
6,077,914 UART: [ldev] Erasing FE.KEYID = 1
8,580,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,859 UART: [ldev] --
10,392,888 UART: [fwproc] Wait for Commands...
10,395,147 UART: [fwproc] Recv command 0x46574c44
10,397,239 UART: [fwproc] Recv'd Img size: 114168 bytes
12,689,691 UART: ROM Fatal Error: 0x000B0021
12,692,830 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,039,821 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,492,408 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,026,266 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,170,572 UART:
2,170,979 UART: Running Caliptra ROM ...
2,172,058 UART:
2,172,213 UART: [state] CFI Enabled
2,173,192 UART: [state] LifecycleState = Unprovisioned
2,174,839 UART: [state] DebugLocked = No
2,175,866 UART: [state] WD Timer not started. Device not locked for debugging
2,178,332 UART: [kat] SHA2-256
2,178,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,001 UART: [kat] ++
2,182,454 UART: [kat] sha1
2,182,989 UART: [kat] SHA2-256
2,183,648 UART: [kat] SHA2-384
2,184,302 UART: [kat] SHA2-512-ACC
2,185,144 UART: [kat] ECC-384
3,276,940 UART: [kat] HMAC-384Kdf
3,289,171 UART: [kat] LMS
3,818,644 UART: [kat] --
3,822,153 UART: [cold-reset] ++
3,823,597 UART: [fht] FHT @ 0x50003400
3,835,598 UART: [idev] ++
3,836,166 UART: [idev] CDI.KEYID = 6
3,837,075 UART: [idev] SUBJECT.KEYID = 7
3,838,292 UART: [idev] UDS.KEYID = 0
3,852,969 UART: [idev] Erasing UDS.KEYID = 0
6,311,988 UART: [idev] Sha1 KeyId Algorithm
6,334,888 UART: [idev] --
6,339,492 UART: [ldev] ++
6,340,066 UART: [ldev] CDI.KEYID = 6
6,340,952 UART: [ldev] SUBJECT.KEYID = 5
6,342,166 UART: [ldev] AUTHORITY.KEYID = 7
6,343,398 UART: [ldev] FE.KEYID = 1
6,354,076 UART: [ldev] Erasing FE.KEYID = 1
8,824,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,407 UART: [ldev] --
10,614,758 UART: [fwproc] Wait for Commands...
10,616,692 UART: [fwproc] Recv command 0x46574c44
10,618,781 UART: [fwproc] Recv'd Img size: 114168 bytes
12,907,009 UART: ROM Fatal Error: 0x000B0021
12,910,105 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,024,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,689,422 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,956 writing to cptra_bootfsm_go
2,027,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,171,545 UART:
2,171,943 UART: Running Caliptra ROM ...
2,173,113 UART:
2,173,291 UART: [state] CFI Enabled
2,174,272 UART: [state] LifecycleState = Unprovisioned
2,175,915 UART: [state] DebugLocked = No
2,177,025 UART: [state] WD Timer not started. Device not locked for debugging
2,179,501 UART: [kat] SHA2-256
2,180,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,179 UART: [kat] ++
2,183,650 UART: [kat] sha1
2,184,167 UART: [kat] SHA2-256
2,184,910 UART: [kat] SHA2-384
2,185,579 UART: [kat] SHA2-512-ACC
2,186,462 UART: [kat] ECC-384
2,948,713 UART: [kat] HMAC-384Kdf
2,971,458 UART: [kat] LMS
3,500,913 UART: [kat] --
3,505,007 UART: [cold-reset] ++
3,506,135 UART: [fht] FHT @ 0x50003400
3,517,880 UART: [idev] ++
3,518,453 UART: [idev] CDI.KEYID = 6
3,519,336 UART: [idev] SUBJECT.KEYID = 7
3,520,698 UART: [idev] UDS.KEYID = 0
3,543,926 UART: [idev] Erasing UDS.KEYID = 0
6,024,665 UART: [idev] Sha1 KeyId Algorithm
6,048,225 UART: [idev] --
6,051,904 UART: [ldev] ++
6,052,482 UART: [ldev] CDI.KEYID = 6
6,053,394 UART: [ldev] SUBJECT.KEYID = 5
6,054,614 UART: [ldev] AUTHORITY.KEYID = 7
6,055,861 UART: [ldev] FE.KEYID = 1
6,098,748 UART: [ldev] Erasing FE.KEYID = 1
8,603,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,768 UART: [ldev] --
10,411,072 UART: [fwproc] Wait for Commands...
10,413,554 UART: [fwproc] Recv command 0x46574c44
10,415,662 UART: [fwproc] Recv'd Img size: 114168 bytes
12,706,326 UART: ROM Fatal Error: 0x000B0021
12,709,458 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
2,029,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,490,020 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,031,561 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,175,658 UART:
2,176,060 UART: Running Caliptra ROM ...
2,177,146 UART:
2,177,303 UART: [state] CFI Enabled
2,178,292 UART: [state] LifecycleState = Unprovisioned
2,179,941 UART: [state] DebugLocked = No
2,180,969 UART: [state] WD Timer not started. Device not locked for debugging
2,183,436 UART: [kat] SHA2-256
2,184,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,187,132 UART: [kat] ++
2,187,578 UART: [kat] sha1
2,188,087 UART: [kat] SHA2-256
2,188,745 UART: [kat] SHA2-384
2,189,402 UART: [kat] SHA2-512-ACC
2,190,237 UART: [kat] ECC-384
3,285,981 UART: [kat] HMAC-384Kdf
3,299,068 UART: [kat] LMS
3,828,528 UART: [kat] --
3,834,720 UART: [cold-reset] ++
3,837,107 UART: [fht] FHT @ 0x50003400
3,847,447 UART: [idev] ++
3,848,015 UART: [idev] CDI.KEYID = 6
3,848,899 UART: [idev] SUBJECT.KEYID = 7
3,850,109 UART: [idev] UDS.KEYID = 0
3,865,455 UART: [idev] Erasing UDS.KEYID = 0
6,323,064 UART: [idev] Sha1 KeyId Algorithm
6,345,488 UART: [idev] --
6,348,884 UART: [ldev] ++
6,349,449 UART: [ldev] CDI.KEYID = 6
6,350,383 UART: [ldev] SUBJECT.KEYID = 5
6,351,541 UART: [ldev] AUTHORITY.KEYID = 7
6,352,828 UART: [ldev] FE.KEYID = 1
6,363,775 UART: [ldev] Erasing FE.KEYID = 1
8,838,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,658 UART: [ldev] --
10,632,760 UART: [fwproc] Wait for Commands...
10,634,443 UART: [fwproc] Recv command 0x46574c44
10,636,506 UART: [fwproc] Recv'd Img size: 114168 bytes
12,926,113 UART: ROM Fatal Error: 0x000B0021
12,929,190 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
2,026,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,697,098 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
916,002 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,524 UART: [ldev] ++
1,208,692 UART: [ldev] CDI.KEYID = 6
1,209,056 UART: [ldev] SUBJECT.KEYID = 5
1,209,483 UART: [ldev] AUTHORITY.KEYID = 7
1,209,946 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,820 UART: [ldev] --
1,281,134 UART: [fwproc] Wait for Commands...
1,281,739 UART: [fwproc] Recv command 0x46574c44
1,282,472 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,101 UART: ROM Fatal Error: 0x000B0021
1,550,258 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,400,825 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
87,078 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
891,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,096 UART: [kat] ++
896,248 UART: [kat] sha1
900,402 UART: [kat] SHA2-256
902,342 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,663 UART: [kat] HMAC-384Kdf
921,475 UART: [kat] LMS
1,169,787 UART: [kat] --
1,170,384 UART: [cold-reset] ++
1,170,826 UART: [fht] FHT @ 0x50003400
1,173,576 UART: [idev] ++
1,173,744 UART: [idev] CDI.KEYID = 6
1,174,105 UART: [idev] SUBJECT.KEYID = 7
1,174,530 UART: [idev] UDS.KEYID = 0
1,182,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,012 UART: [idev] Sha1 KeyId Algorithm
1,208,804 UART: [idev] --
1,209,805 UART: [ldev] ++
1,209,973 UART: [ldev] CDI.KEYID = 6
1,210,337 UART: [ldev] SUBJECT.KEYID = 5
1,210,764 UART: [ldev] AUTHORITY.KEYID = 7
1,211,227 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,327 UART: [ldev] --
1,282,679 UART: [fwproc] Wait for Commands...
1,283,440 UART: [fwproc] Recv command 0x46574c44
1,284,173 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,927 UART: ROM Fatal Error: 0x000B0021
1,551,084 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,302 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,844 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,169,941 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,610 UART: [ldev] ++
1,208,778 UART: [ldev] CDI.KEYID = 6
1,209,142 UART: [ldev] SUBJECT.KEYID = 5
1,209,569 UART: [ldev] AUTHORITY.KEYID = 7
1,210,032 UART: [ldev] FE.KEYID = 1
1,215,528 UART: [ldev] Erasing FE.KEYID = 1
1,242,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,074 UART: [ldev] --
1,281,498 UART: [fwproc] Wait for Commands...
1,282,305 UART: [fwproc] Recv command 0x46574c44
1,283,038 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,028 UART: ROM Fatal Error: 0x000B0021
1,550,185 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,329 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,509 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,181,736 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,208,146 UART: [idev] --
1,209,047 UART: [ldev] ++
1,209,215 UART: [ldev] CDI.KEYID = 6
1,209,579 UART: [ldev] SUBJECT.KEYID = 5
1,210,006 UART: [ldev] AUTHORITY.KEYID = 7
1,210,469 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,915 UART: [fwproc] Wait for Commands...
1,282,502 UART: [fwproc] Recv command 0x46574c44
1,283,235 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,378 UART: ROM Fatal Error: 0x000B0021
1,550,535 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,980 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,591 UART: [kat] SHA2-256
901,531 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,169,917 UART: [fht] FHT @ 0x50003400
1,172,651 UART: [idev] ++
1,172,819 UART: [idev] CDI.KEYID = 6
1,173,180 UART: [idev] SUBJECT.KEYID = 7
1,173,605 UART: [idev] UDS.KEYID = 0
1,181,811 UART: [idev] Erasing UDS.KEYID = 0
1,199,473 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,358 UART: [ldev] ++
1,209,526 UART: [ldev] CDI.KEYID = 6
1,209,890 UART: [ldev] SUBJECT.KEYID = 5
1,210,317 UART: [ldev] AUTHORITY.KEYID = 7
1,210,780 UART: [ldev] FE.KEYID = 1
1,215,740 UART: [ldev] Erasing FE.KEYID = 1
1,242,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,216 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,289 UART: [fwproc] Recv command 0x46574c44
1,283,022 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,797 UART: ROM Fatal Error: 0x000B0021
1,550,954 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,400,865 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
891,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,442 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,199,948 UART: [idev] Sha1 KeyId Algorithm
1,209,026 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,657 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,216,723 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,753 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,506 UART: ROM Fatal Error: 0x000B0021
1,550,663 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,594 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,021,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,873 UART:
2,166,268 UART: Running Caliptra ROM ...
2,167,445 UART:
2,167,632 UART: [state] CFI Enabled
2,168,599 UART: [state] LifecycleState = Unprovisioned
2,170,250 UART: [state] DebugLocked = No
2,171,295 UART: [state] WD Timer not started. Device not locked for debugging
2,173,768 UART: [kat] SHA2-256
2,174,437 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,452 UART: [kat] ++
2,177,901 UART: [kat] sha1
2,178,602 UART: [kat] SHA2-256
2,179,273 UART: [kat] SHA2-384
2,179,968 UART: [kat] SHA2-512-ACC
2,180,793 UART: [kat] ECC-384
3,773,841 UART: [kat] HMAC-384Kdf
3,802,663 UART: [kat] LMS
4,875,802 UART: [kat] --
4,879,539 UART: [cold-reset] ++
4,882,123 UART: [fht] FHT @ 0x50003400
4,893,909 UART: [idev] ++
4,894,642 UART: [idev] CDI.KEYID = 6
4,895,844 UART: [idev] SUBJECT.KEYID = 7
4,896,946 UART: [idev] UDS.KEYID = 0
4,930,147 UART: [idev] Erasing UDS.KEYID = 0
8,241,438 UART: [idev] Sha1 KeyId Algorithm
8,262,898 UART: [idev] --
8,267,808 UART: [ldev] ++
8,268,371 UART: [ldev] CDI.KEYID = 6
8,269,477 UART: [ldev] SUBJECT.KEYID = 5
8,270,745 UART: [ldev] AUTHORITY.KEYID = 7
8,271,895 UART: [ldev] FE.KEYID = 1
8,318,107 UART: [ldev] Erasing FE.KEYID = 1
11,653,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,245 UART: [ldev] --
14,036,484 UART: [fwproc] Wait for Commands...
14,039,721 UART: [fwproc] Recv command 0x46574c44
14,041,985 UART: [fwproc] Recv'd Img size: 113844 bytes
16,748,803 UART: ROM Fatal Error: 0x000B0034
16,752,191 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
2,019,470 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,163,320 UART:
2,163,728 UART: Running Caliptra ROM ...
2,164,921 UART:
2,165,097 UART: [state] CFI Enabled
2,166,066 UART: [state] LifecycleState = Unprovisioned
2,167,731 UART: [state] DebugLocked = No
2,168,841 UART: [state] WD Timer not started. Device not locked for debugging
2,171,310 UART: [kat] SHA2-256
2,171,976 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,986 UART: [kat] ++
2,175,436 UART: [kat] sha1
2,175,951 UART: [kat] SHA2-256
2,176,688 UART: [kat] SHA2-384
2,177,352 UART: [kat] SHA2-512-ACC
2,178,185 UART: [kat] ECC-384
3,773,822 UART: [kat] HMAC-384Kdf
3,804,583 UART: [kat] LMS
4,877,720 UART: [kat] --
4,881,542 UART: [cold-reset] ++
4,883,094 UART: [fht] FHT @ 0x50003400
4,893,386 UART: [idev] ++
4,894,127 UART: [idev] CDI.KEYID = 6
4,895,308 UART: [idev] SUBJECT.KEYID = 7
4,896,466 UART: [idev] UDS.KEYID = 0
4,931,125 UART: [idev] Erasing UDS.KEYID = 0
8,246,494 UART: [idev] Sha1 KeyId Algorithm
8,268,429 UART: [idev] --
8,273,770 UART: [ldev] ++
8,274,337 UART: [ldev] CDI.KEYID = 6
8,275,576 UART: [ldev] SUBJECT.KEYID = 5
8,276,734 UART: [ldev] AUTHORITY.KEYID = 7
8,277,962 UART: [ldev] FE.KEYID = 1
8,319,346 UART: [ldev] Erasing FE.KEYID = 1
11,655,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,210 UART: [ldev] --
14,038,939 UART: [fwproc] Wait for Commands...
14,041,364 UART: [fwproc] Recv command 0x46574c44
14,043,632 UART: [fwproc] Recv'd Img size: 113844 bytes
16,747,769 UART: ROM Fatal Error: 0x000B0034
16,751,165 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
2,019,297 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,524,237 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
2,018,887 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,545,394 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
2,021,204 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,240 UART:
2,165,651 UART: Running Caliptra ROM ...
2,166,812 UART:
2,166,983 UART: [state] CFI Enabled
2,167,947 UART: [state] LifecycleState = Unprovisioned
2,169,592 UART: [state] DebugLocked = No
2,170,691 UART: [state] WD Timer not started. Device not locked for debugging
2,173,161 UART: [kat] SHA2-256
2,173,825 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,837 UART: [kat] ++
2,177,284 UART: [kat] sha1
2,177,791 UART: [kat] SHA2-256
2,178,524 UART: [kat] SHA2-384
2,179,182 UART: [kat] SHA2-512-ACC
2,180,077 UART: [kat] ECC-384
4,095,392 UART: [kat] HMAC-384Kdf
4,108,560 UART: [kat] LMS
5,181,695 UART: [kat] --
5,186,073 UART: [cold-reset] ++
5,188,493 UART: [fht] FHT @ 0x50003400
5,200,599 UART: [idev] ++
5,201,271 UART: [idev] CDI.KEYID = 6
5,202,500 UART: [idev] SUBJECT.KEYID = 7
5,203,920 UART: [idev] UDS.KEYID = 0
5,217,998 UART: [idev] Erasing UDS.KEYID = 0
8,487,582 UART: [idev] Sha1 KeyId Algorithm
8,509,078 UART: [idev] --
8,513,018 UART: [ldev] ++
8,513,579 UART: [ldev] CDI.KEYID = 6
8,514,740 UART: [ldev] SUBJECT.KEYID = 5
8,516,282 UART: [ldev] AUTHORITY.KEYID = 7
8,517,703 UART: [ldev] FE.KEYID = 1
8,530,565 UART: [ldev] Erasing FE.KEYID = 1
11,824,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,132,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,148,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,164,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,343 UART: [ldev] --
14,190,362 UART: [fwproc] Wait for Commands...
14,192,993 UART: [fwproc] Recv command 0x46574c44
14,195,297 UART: [fwproc] Recv'd Img size: 113844 bytes
16,902,155 UART: ROM Fatal Error: 0x000B0034
16,905,553 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
2,029,508 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,173,103 UART:
2,173,510 UART: Running Caliptra ROM ...
2,174,591 UART:
2,174,747 UART: [state] CFI Enabled
2,175,712 UART: [state] LifecycleState = Unprovisioned
2,177,369 UART: [state] DebugLocked = No
2,178,391 UART: [state] WD Timer not started. Device not locked for debugging
2,180,852 UART: [kat] SHA2-256
2,181,514 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,184,520 UART: [kat] ++
2,184,982 UART: [kat] sha1
2,185,488 UART: [kat] SHA2-256
2,186,137 UART: [kat] SHA2-384
2,186,782 UART: [kat] SHA2-512-ACC
2,187,574 UART: [kat] ECC-384
4,091,149 UART: [kat] HMAC-384Kdf
4,103,179 UART: [kat] LMS
5,176,312 UART: [kat] --
5,182,361 UART: [cold-reset] ++
5,184,723 UART: [fht] FHT @ 0x50003400
5,195,157 UART: [idev] ++
5,195,887 UART: [idev] CDI.KEYID = 6
5,197,060 UART: [idev] SUBJECT.KEYID = 7
5,198,540 UART: [idev] UDS.KEYID = 0
5,214,508 UART: [idev] Erasing UDS.KEYID = 0
8,487,562 UART: [idev] Sha1 KeyId Algorithm
8,510,221 UART: [idev] --
8,513,241 UART: [ldev] ++
8,513,807 UART: [ldev] CDI.KEYID = 6
8,514,957 UART: [ldev] SUBJECT.KEYID = 5
8,516,486 UART: [ldev] AUTHORITY.KEYID = 7
8,517,965 UART: [ldev] FE.KEYID = 1
8,529,107 UART: [ldev] Erasing FE.KEYID = 1
11,822,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,326 UART: [ldev] --
14,191,477 UART: [fwproc] Wait for Commands...
14,194,440 UART: [fwproc] Recv command 0x46574c44
14,196,748 UART: [fwproc] Recv'd Img size: 113844 bytes
16,900,933 UART: ROM Fatal Error: 0x000B0034
16,904,375 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,026,826 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,721,137 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,024,107 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,712,825 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
2,027,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,171,838 UART:
2,172,246 UART: Running Caliptra ROM ...
2,173,526 UART:
2,173,704 UART: [state] CFI Enabled
2,174,678 UART: [state] LifecycleState = Unprovisioned
2,176,323 UART: [state] DebugLocked = No
2,177,368 UART: [state] WD Timer not started. Device not locked for debugging
2,179,837 UART: [kat] SHA2-256
2,180,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,511 UART: [kat] ++
2,183,982 UART: [kat] sha1
2,184,500 UART: [kat] SHA2-256
2,185,245 UART: [kat] SHA2-384
2,185,912 UART: [kat] SHA2-512-ACC
2,186,797 UART: [kat] ECC-384
2,948,107 UART: [kat] HMAC-384Kdf
2,972,714 UART: [kat] LMS
3,502,147 UART: [kat] --
3,505,328 UART: [cold-reset] ++
3,507,686 UART: [fht] FHT @ 0x50003400
3,518,557 UART: [idev] ++
3,519,132 UART: [idev] CDI.KEYID = 6
3,520,055 UART: [idev] SUBJECT.KEYID = 7
3,521,218 UART: [idev] UDS.KEYID = 0
3,543,729 UART: [idev] Erasing UDS.KEYID = 0
6,026,482 UART: [idev] Sha1 KeyId Algorithm
6,049,247 UART: [idev] --
6,052,708 UART: [ldev] ++
6,053,771 UART: [ldev] CDI.KEYID = 6
6,054,674 UART: [ldev] SUBJECT.KEYID = 5
6,055,724 UART: [ldev] AUTHORITY.KEYID = 7
6,056,905 UART: [ldev] FE.KEYID = 1
6,100,745 UART: [ldev] Erasing FE.KEYID = 1
8,601,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,335 UART: [ldev] --
10,391,179 UART: [fwproc] Wait for Commands...
10,394,044 UART: [fwproc] Recv command 0x46574c44
10,396,146 UART: [fwproc] Recv'd Img size: 114168 bytes
12,449,589 UART: ROM Fatal Error: 0x000B0034
12,452,712 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,020,043 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,163,774 UART:
2,164,159 UART: Running Caliptra ROM ...
2,165,241 UART:
2,165,393 UART: [state] CFI Enabled
2,166,363 UART: [state] LifecycleState = Unprovisioned
2,168,004 UART: [state] DebugLocked = No
2,169,057 UART: [state] WD Timer not started. Device not locked for debugging
2,171,540 UART: [kat] SHA2-256
2,172,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,215 UART: [kat] ++
2,175,664 UART: [kat] sha1
2,176,172 UART: [kat] SHA2-256
2,176,829 UART: [kat] SHA2-384
2,177,484 UART: [kat] SHA2-512-ACC
2,178,489 UART: [kat] ECC-384
2,947,237 UART: [kat] HMAC-384Kdf
2,969,899 UART: [kat] LMS
3,499,338 UART: [kat] --
3,503,864 UART: [cold-reset] ++
3,505,206 UART: [fht] FHT @ 0x50003400
3,516,019 UART: [idev] ++
3,516,594 UART: [idev] CDI.KEYID = 6
3,517,696 UART: [idev] SUBJECT.KEYID = 7
3,518,826 UART: [idev] UDS.KEYID = 0
3,542,176 UART: [idev] Erasing UDS.KEYID = 0
6,024,445 UART: [idev] Sha1 KeyId Algorithm
6,047,413 UART: [idev] --
6,051,092 UART: [ldev] ++
6,051,666 UART: [ldev] CDI.KEYID = 6
6,052,607 UART: [ldev] SUBJECT.KEYID = 5
6,053,773 UART: [ldev] AUTHORITY.KEYID = 7
6,055,008 UART: [ldev] FE.KEYID = 1
6,098,619 UART: [ldev] Erasing FE.KEYID = 1
8,599,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,734 UART: [ldev] --
10,410,563 UART: [fwproc] Wait for Commands...
10,412,932 UART: [fwproc] Recv command 0x46574c44
10,415,039 UART: [fwproc] Recv'd Img size: 114168 bytes
12,468,399 UART: ROM Fatal Error: 0x000B0034
12,471,521 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,203 writing to cptra_bootfsm_go
2,026,244 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,258,413 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,034,024 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,265,496 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
2,021,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,025 UART:
2,166,423 UART: Running Caliptra ROM ...
2,167,505 UART:
2,167,683 UART: [state] CFI Enabled
2,168,665 UART: [state] LifecycleState = Unprovisioned
2,170,306 UART: [state] DebugLocked = No
2,171,333 UART: [state] WD Timer not started. Device not locked for debugging
2,174,537 UART: [kat] SHA2-256
2,175,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,248 UART: [kat] ++
2,178,704 UART: [kat] sha1
2,179,220 UART: [kat] SHA2-256
2,179,877 UART: [kat] SHA2-384
2,180,530 UART: [kat] SHA2-512-ACC
2,181,550 UART: [kat] ECC-384
3,279,305 UART: [kat] HMAC-384Kdf
3,292,703 UART: [kat] LMS
3,822,155 UART: [kat] --
3,826,252 UART: [cold-reset] ++
3,828,750 UART: [fht] FHT @ 0x50003400
3,840,484 UART: [idev] ++
3,841,048 UART: [idev] CDI.KEYID = 6
3,841,986 UART: [idev] SUBJECT.KEYID = 7
3,843,194 UART: [idev] UDS.KEYID = 0
3,856,755 UART: [idev] Erasing UDS.KEYID = 0
6,311,209 UART: [idev] Sha1 KeyId Algorithm
6,333,908 UART: [idev] --
6,337,416 UART: [ldev] ++
6,337,998 UART: [ldev] CDI.KEYID = 6
6,338,910 UART: [ldev] SUBJECT.KEYID = 5
6,340,063 UART: [ldev] AUTHORITY.KEYID = 7
6,341,294 UART: [ldev] FE.KEYID = 1
6,353,020 UART: [ldev] Erasing FE.KEYID = 1
8,833,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,116 UART: [ldev] --
10,624,548 UART: [fwproc] Wait for Commands...
10,626,749 UART: [fwproc] Recv command 0x46574c44
10,628,837 UART: [fwproc] Recv'd Img size: 114168 bytes
12,683,909 UART: ROM Fatal Error: 0x000B0034
12,687,031 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
2,020,492 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,164,302 UART:
2,164,691 UART: Running Caliptra ROM ...
2,165,779 UART:
2,165,932 UART: [state] CFI Enabled
2,166,894 UART: [state] LifecycleState = Unprovisioned
2,168,545 UART: [state] DebugLocked = No
2,169,568 UART: [state] WD Timer not started. Device not locked for debugging
2,172,030 UART: [kat] SHA2-256
2,172,690 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,704 UART: [kat] ++
2,176,151 UART: [kat] sha1
2,176,662 UART: [kat] SHA2-256
2,177,318 UART: [kat] SHA2-384
2,177,977 UART: [kat] SHA2-512-ACC
2,178,978 UART: [kat] ECC-384
3,279,097 UART: [kat] HMAC-384Kdf
3,292,903 UART: [kat] LMS
3,822,365 UART: [kat] --
3,826,281 UART: [cold-reset] ++
3,828,394 UART: [fht] FHT @ 0x50003400
3,839,210 UART: [idev] ++
3,839,769 UART: [idev] CDI.KEYID = 6
3,840,650 UART: [idev] SUBJECT.KEYID = 7
3,841,913 UART: [idev] UDS.KEYID = 0
3,856,672 UART: [idev] Erasing UDS.KEYID = 0
6,312,801 UART: [idev] Sha1 KeyId Algorithm
6,336,302 UART: [idev] --
6,341,217 UART: [ldev] ++
6,341,790 UART: [ldev] CDI.KEYID = 6
6,342,667 UART: [ldev] SUBJECT.KEYID = 5
6,343,883 UART: [ldev] AUTHORITY.KEYID = 7
6,345,114 UART: [ldev] FE.KEYID = 1
6,357,429 UART: [ldev] Erasing FE.KEYID = 1
8,831,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,751 UART: [ldev] --
10,619,686 UART: [fwproc] Wait for Commands...
10,622,055 UART: [fwproc] Recv command 0x46574c44
10,624,149 UART: [fwproc] Recv'd Img size: 114168 bytes
12,671,255 UART: ROM Fatal Error: 0x000B0034
12,674,389 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,024,381 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,467,055 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,019,223 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,442,015 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,021,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,654 UART:
2,166,045 UART: Running Caliptra ROM ...
2,167,128 UART:
2,167,282 UART: [state] CFI Enabled
2,168,260 UART: [state] LifecycleState = Unprovisioned
2,169,932 UART: [state] DebugLocked = No
2,170,962 UART: [state] WD Timer not started. Device not locked for debugging
2,173,427 UART: [kat] SHA2-256
2,174,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,105 UART: [kat] ++
2,177,552 UART: [kat] sha1
2,178,063 UART: [kat] SHA2-256
2,178,722 UART: [kat] SHA2-384
2,179,606 UART: [kat] SHA2-512-ACC
2,180,420 UART: [kat] ECC-384
2,948,280 UART: [kat] HMAC-384Kdf
2,970,920 UART: [kat] LMS
3,500,339 UART: [kat] --
3,503,331 UART: [cold-reset] ++
3,504,574 UART: [fht] FHT @ 0x50003400
3,515,773 UART: [idev] ++
3,516,361 UART: [idev] CDI.KEYID = 6
3,517,438 UART: [idev] SUBJECT.KEYID = 7
3,518,494 UART: [idev] UDS.KEYID = 0
3,543,714 UART: [idev] Erasing UDS.KEYID = 0
6,025,777 UART: [idev] Sha1 KeyId Algorithm
6,047,991 UART: [idev] --
6,052,051 UART: [ldev] ++
6,052,629 UART: [ldev] CDI.KEYID = 6
6,053,516 UART: [ldev] SUBJECT.KEYID = 5
6,054,648 UART: [ldev] AUTHORITY.KEYID = 7
6,055,901 UART: [ldev] FE.KEYID = 1
6,097,916 UART: [ldev] Erasing FE.KEYID = 1
8,603,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,051 UART: [ldev] --
10,411,839 UART: [fwproc] Wait for Commands...
10,413,831 UART: [fwproc] Recv command 0x46574c44
10,415,930 UART: [fwproc] Recv'd Img size: 114168 bytes
12,471,036 UART: ROM Fatal Error: 0x000B0034
12,474,162 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,022,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,642 UART:
2,167,027 UART: Running Caliptra ROM ...
2,168,224 UART:
2,168,395 UART: [state] CFI Enabled
2,169,365 UART: [state] LifecycleState = Unprovisioned
2,171,009 UART: [state] DebugLocked = No
2,172,123 UART: [state] WD Timer not started. Device not locked for debugging
2,174,610 UART: [kat] SHA2-256
2,175,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,284 UART: [kat] ++
2,178,736 UART: [kat] sha1
2,179,248 UART: [kat] SHA2-256
2,179,990 UART: [kat] SHA2-384
2,180,656 UART: [kat] SHA2-512-ACC
2,181,539 UART: [kat] ECC-384
2,949,968 UART: [kat] HMAC-384Kdf
2,972,460 UART: [kat] LMS
3,501,948 UART: [kat] --
3,505,908 UART: [cold-reset] ++
3,508,061 UART: [fht] FHT @ 0x50003400
3,519,806 UART: [idev] ++
3,520,366 UART: [idev] CDI.KEYID = 6
3,521,383 UART: [idev] SUBJECT.KEYID = 7
3,522,487 UART: [idev] UDS.KEYID = 0
3,543,916 UART: [idev] Erasing UDS.KEYID = 0
6,027,376 UART: [idev] Sha1 KeyId Algorithm
6,051,528 UART: [idev] --
6,056,227 UART: [ldev] ++
6,056,801 UART: [ldev] CDI.KEYID = 6
6,057,719 UART: [ldev] SUBJECT.KEYID = 5
6,058,884 UART: [ldev] AUTHORITY.KEYID = 7
6,060,118 UART: [ldev] FE.KEYID = 1
6,099,983 UART: [ldev] Erasing FE.KEYID = 1
8,604,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,802 UART: [ldev] --
10,413,071 UART: [fwproc] Wait for Commands...
10,415,554 UART: [fwproc] Recv command 0x46574c44
10,417,656 UART: [fwproc] Recv'd Img size: 114168 bytes
12,472,951 UART: ROM Fatal Error: 0x000B0034
12,476,089 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,024,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,240,243 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,025,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,254,128 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,022,417 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,950 UART:
2,167,354 UART: Running Caliptra ROM ...
2,168,543 UART:
2,168,713 UART: [state] CFI Enabled
2,169,690 UART: [state] LifecycleState = Unprovisioned
2,171,344 UART: [state] DebugLocked = No
2,172,448 UART: [state] WD Timer not started. Device not locked for debugging
2,174,920 UART: [kat] SHA2-256
2,175,586 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,602 UART: [kat] ++
2,179,053 UART: [kat] sha1
2,179,569 UART: [kat] SHA2-256
2,180,303 UART: [kat] SHA2-384
2,180,968 UART: [kat] SHA2-512-ACC
2,181,855 UART: [kat] ECC-384
3,282,501 UART: [kat] HMAC-384Kdf
3,294,408 UART: [kat] LMS
3,823,880 UART: [kat] --
3,828,161 UART: [cold-reset] ++
3,829,227 UART: [fht] FHT @ 0x50003400
3,840,688 UART: [idev] ++
3,841,261 UART: [idev] CDI.KEYID = 6
3,842,175 UART: [idev] SUBJECT.KEYID = 7
3,843,390 UART: [idev] UDS.KEYID = 0
3,858,880 UART: [idev] Erasing UDS.KEYID = 0
6,319,114 UART: [idev] Sha1 KeyId Algorithm
6,342,178 UART: [idev] --
6,346,173 UART: [ldev] ++
6,346,778 UART: [ldev] CDI.KEYID = 6
6,347,694 UART: [ldev] SUBJECT.KEYID = 5
6,348,856 UART: [ldev] AUTHORITY.KEYID = 7
6,350,085 UART: [ldev] FE.KEYID = 1
6,359,818 UART: [ldev] Erasing FE.KEYID = 1
8,834,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,933 UART: [ldev] --
10,624,200 UART: [fwproc] Wait for Commands...
10,625,756 UART: [fwproc] Recv command 0x46574c44
10,627,809 UART: [fwproc] Recv'd Img size: 114168 bytes
12,683,748 UART: ROM Fatal Error: 0x000B0034
12,686,881 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
2,019,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,163,788 UART:
2,164,192 UART: Running Caliptra ROM ...
2,165,365 UART:
2,165,539 UART: [state] CFI Enabled
2,166,507 UART: [state] LifecycleState = Unprovisioned
2,168,080 UART: [state] DebugLocked = No
2,169,104 UART: [state] WD Timer not started. Device not locked for debugging
2,171,574 UART: [kat] SHA2-256
2,172,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,260 UART: [kat] ++
2,175,709 UART: [kat] sha1
2,176,221 UART: [kat] SHA2-256
2,176,957 UART: [kat] SHA2-384
2,177,624 UART: [kat] SHA2-512-ACC
2,178,504 UART: [kat] ECC-384
3,281,453 UART: [kat] HMAC-384Kdf
3,294,481 UART: [kat] LMS
3,823,998 UART: [kat] --
3,826,578 UART: [cold-reset] ++
3,828,503 UART: [fht] FHT @ 0x50003400
3,840,668 UART: [idev] ++
3,841,241 UART: [idev] CDI.KEYID = 6
3,842,159 UART: [idev] SUBJECT.KEYID = 7
3,843,370 UART: [idev] UDS.KEYID = 0
3,861,397 UART: [idev] Erasing UDS.KEYID = 0
6,317,529 UART: [idev] Sha1 KeyId Algorithm
6,341,675 UART: [idev] --
6,345,394 UART: [ldev] ++
6,345,956 UART: [ldev] CDI.KEYID = 6
6,346,841 UART: [ldev] SUBJECT.KEYID = 5
6,348,054 UART: [ldev] AUTHORITY.KEYID = 7
6,349,302 UART: [ldev] FE.KEYID = 1
6,359,171 UART: [ldev] Erasing FE.KEYID = 1
8,832,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,481 UART: [ldev] --
10,622,531 UART: [fwproc] Wait for Commands...
10,624,773 UART: [fwproc] Recv command 0x46574c44
10,626,880 UART: [fwproc] Recv'd Img size: 114168 bytes
12,684,640 UART: ROM Fatal Error: 0x000B0034
12,687,713 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,022,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,460,915 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
2,020,238 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,450,532 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,121 UART: [kat] ++
895,273 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,208,153 UART: [idev] --
1,209,120 UART: [ldev] ++
1,209,288 UART: [ldev] CDI.KEYID = 6
1,209,652 UART: [ldev] SUBJECT.KEYID = 5
1,210,079 UART: [ldev] AUTHORITY.KEYID = 7
1,210,542 UART: [ldev] FE.KEYID = 1
1,215,930 UART: [ldev] Erasing FE.KEYID = 1
1,242,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,358 UART: [ldev] --
1,281,828 UART: [fwproc] Wait for Commands...
1,282,547 UART: [fwproc] Recv command 0x46574c44
1,283,280 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,174 UART: ROM Fatal Error: 0x000B0034
1,330,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,763 UART: [idev] ++
1,172,931 UART: [idev] CDI.KEYID = 6
1,173,292 UART: [idev] SUBJECT.KEYID = 7
1,173,717 UART: [idev] UDS.KEYID = 0
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,580 UART: [ldev] --
1,280,932 UART: [fwproc] Wait for Commands...
1,281,541 UART: [fwproc] Recv command 0x46574c44
1,282,274 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,348 UART: ROM Fatal Error: 0x000B0034
1,329,505 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,996 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,246 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
891,715 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,844 UART: [kat] ++
895,996 UART: [kat] sha1
900,232 UART: [kat] SHA2-256
902,172 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,867 UART: [kat] HMAC-384Kdf
921,287 UART: [kat] LMS
1,169,599 UART: [kat] --
1,170,670 UART: [cold-reset] ++
1,171,030 UART: [fht] FHT @ 0x50003400
1,173,680 UART: [idev] ++
1,173,848 UART: [idev] CDI.KEYID = 6
1,174,209 UART: [idev] SUBJECT.KEYID = 7
1,174,634 UART: [idev] UDS.KEYID = 0
1,182,510 UART: [idev] Erasing UDS.KEYID = 0
1,199,330 UART: [idev] Sha1 KeyId Algorithm
1,208,352 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,241,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,529 UART: [ldev] --
1,280,827 UART: [fwproc] Wait for Commands...
1,281,482 UART: [fwproc] Recv command 0x46574c44
1,282,215 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,173 UART: ROM Fatal Error: 0x000B0034
1,330,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,733 UART: [kat] SHA2-512-ACC
906,634 UART: [kat] ECC-384
916,311 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,136 UART: [cold-reset] ++
1,170,518 UART: [fht] FHT @ 0x50003400
1,173,106 UART: [idev] ++
1,173,274 UART: [idev] CDI.KEYID = 6
1,173,635 UART: [idev] SUBJECT.KEYID = 7
1,174,060 UART: [idev] UDS.KEYID = 0
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,207,842 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,347 UART: [ldev] Erasing FE.KEYID = 1
1,242,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,343 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,376 UART: [fwproc] Recv command 0x46574c44
1,283,109 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,853 UART: ROM Fatal Error: 0x000B0034
1,331,010 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,497 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,565 UART: [kat] ++
895,717 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,138 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,173,031 UART: [idev] ++
1,173,199 UART: [idev] CDI.KEYID = 6
1,173,560 UART: [idev] SUBJECT.KEYID = 7
1,173,985 UART: [idev] UDS.KEYID = 0
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,698 UART: [ldev] ++
1,208,866 UART: [ldev] CDI.KEYID = 6
1,209,230 UART: [ldev] SUBJECT.KEYID = 5
1,209,657 UART: [ldev] AUTHORITY.KEYID = 7
1,210,120 UART: [ldev] FE.KEYID = 1
1,215,432 UART: [ldev] Erasing FE.KEYID = 1
1,241,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,174 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,355 UART: [fwproc] Recv command 0x46574c44
1,282,088 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,190 UART: ROM Fatal Error: 0x000B0034
1,330,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,314 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,182,067 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,477 UART: [idev] --
1,208,654 UART: [ldev] ++
1,208,822 UART: [ldev] CDI.KEYID = 6
1,209,186 UART: [ldev] SUBJECT.KEYID = 5
1,209,613 UART: [ldev] AUTHORITY.KEYID = 7
1,210,076 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,140 UART: [ldev] --
1,280,438 UART: [fwproc] Wait for Commands...
1,281,249 UART: [fwproc] Recv command 0x46574c44
1,281,982 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,564 UART: ROM Fatal Error: 0x000B0034
1,331,721 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,574 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
890,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,596 UART: [kat] SHA2-256
901,536 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
1,169,703 UART: [kat] --
1,170,536 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,072 UART: [idev] Sha1 KeyId Algorithm
1,207,964 UART: [idev] --
1,208,981 UART: [ldev] ++
1,209,149 UART: [ldev] CDI.KEYID = 6
1,209,513 UART: [ldev] SUBJECT.KEYID = 5
1,209,940 UART: [ldev] AUTHORITY.KEYID = 7
1,210,403 UART: [ldev] FE.KEYID = 1
1,215,417 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,879 UART: [ldev] --
1,282,311 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,709 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,181 UART: ROM Fatal Error: 0x000B0034
1,331,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,526 UART: [kat] ++
895,678 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,599 UART: [kat] SHA2-512-ACC
906,500 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,199,290 UART: [idev] Sha1 KeyId Algorithm
1,208,230 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,919 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,738 UART: [fwproc] Recv command 0x46574c44
1,283,471 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,369 UART: ROM Fatal Error: 0x000B0034
1,331,526 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,811 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,415 UART: [kat] SHA2-256
901,355 UART: [kat] SHA2-384
904,092 UART: [kat] SHA2-512-ACC
905,993 UART: [kat] ECC-384
915,606 UART: [kat] HMAC-384Kdf
920,162 UART: [kat] LMS
1,168,474 UART: [kat] --
1,169,267 UART: [cold-reset] ++
1,169,653 UART: [fht] FHT @ 0x50003400
1,172,291 UART: [idev] ++
1,172,459 UART: [idev] CDI.KEYID = 6
1,172,820 UART: [idev] SUBJECT.KEYID = 7
1,173,245 UART: [idev] UDS.KEYID = 0
1,181,283 UART: [idev] Erasing UDS.KEYID = 0
1,198,363 UART: [idev] Sha1 KeyId Algorithm
1,207,239 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,240,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,826 UART: [ldev] --
1,280,126 UART: [fwproc] Wait for Commands...
1,280,845 UART: [fwproc] Recv command 0x46574c44
1,281,578 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,006 UART: ROM Fatal Error: 0x000B0034
1,331,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,050 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,689 UART: [idev] ++
1,172,857 UART: [idev] CDI.KEYID = 6
1,173,218 UART: [idev] SUBJECT.KEYID = 7
1,173,643 UART: [idev] UDS.KEYID = 0
1,181,371 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,628 UART: [ldev] ++
1,208,796 UART: [ldev] CDI.KEYID = 6
1,209,160 UART: [ldev] SUBJECT.KEYID = 5
1,209,587 UART: [ldev] AUTHORITY.KEYID = 7
1,210,050 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,240,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,098 UART: [ldev] --
1,280,438 UART: [fwproc] Wait for Commands...
1,281,169 UART: [fwproc] Recv command 0x46574c44
1,281,902 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,016 UART: ROM Fatal Error: 0x000B0034
1,330,173 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,688 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,782 UART: [kat] ++
895,934 UART: [kat] sha1
900,164 UART: [kat] SHA2-256
902,104 UART: [kat] SHA2-384
904,941 UART: [kat] SHA2-512-ACC
906,842 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,633 UART: [kat] LMS
1,169,945 UART: [kat] --
1,170,962 UART: [cold-reset] ++
1,171,332 UART: [fht] FHT @ 0x50003400
1,173,880 UART: [idev] ++
1,174,048 UART: [idev] CDI.KEYID = 6
1,174,409 UART: [idev] SUBJECT.KEYID = 7
1,174,834 UART: [idev] UDS.KEYID = 0
1,182,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,426 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,175 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0x46574c44
1,283,503 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,055 UART: ROM Fatal Error: 0x000B0034
1,331,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
890,983 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
903,817 UART: [kat] SHA2-512-ACC
905,718 UART: [kat] ECC-384
915,753 UART: [kat] HMAC-384Kdf
920,309 UART: [kat] LMS
1,168,621 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,193 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,227 UART: [ldev] Erasing FE.KEYID = 1
1,242,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,211 UART: [ldev] --
1,281,567 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,111 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,373 UART: ROM Fatal Error: 0x000B0034
1,331,530 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,373 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
5,368 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,134 UART:
192,599 UART: Running Caliptra ROM ...
193,703 UART:
193,847 UART: [state] CFI Enabled
267,881 UART: [state] LifecycleState = Manufacturing
270,269 UART: [state] DebugLocked = No
271,655 UART: [state] WD Timer not started. Device not locked for debugging
277,025 UART: [kat] SHA2-256
458,963 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,481 UART: [kat] ++
470,990 UART: [kat] sha1
482,520 UART: [kat] SHA2-256
485,526 UART: [kat] SHA2-384
491,338 UART: [kat] SHA2-512-ACC
493,941 UART: [kat] ECC-384
3,780,166 UART: [kat] HMAC-384Kdf
3,801,761 UART: [kat] LMS
4,874,892 UART: [kat] --
4,879,205 UART: [cold-reset] ++
4,881,460 UART: [fht] FHT @ 0x50003400
4,893,297 UART: [idev] ++
4,893,995 UART: [idev] CDI.KEYID = 6
4,895,177 UART: [idev] SUBJECT.KEYID = 7
4,896,336 UART: [idev] UDS.KEYID = 0
4,929,273 UART: [idev] Erasing UDS.KEYID = 0
8,241,259 UART: [idev] Sha1 KeyId Algorithm
8,263,308 UART: [idev] --
8,267,573 UART: [ldev] ++
8,268,142 UART: [ldev] CDI.KEYID = 6
8,269,323 UART: [ldev] SUBJECT.KEYID = 5
8,270,482 UART: [ldev] AUTHORITY.KEYID = 7
8,271,710 UART: [ldev] FE.KEYID = 1
8,315,584 UART: [ldev] Erasing FE.KEYID = 1
11,648,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,292 UART: [ldev] --
14,034,689 UART: [fwproc] Wait for Commands...
14,037,111 UART: [fwproc] Recv command 0x46574c44
14,039,429 UART: [fwproc] Recv'd Img size: 113844 bytes
17,024,821 UART: ROM Fatal Error: 0x000B0025
17,028,172 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
5,365 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,807,976 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
6,396 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,645 UART:
193,052 UART: Running Caliptra ROM ...
194,181 UART:
603,746 UART: [state] CFI Enabled
621,092 UART: [state] LifecycleState = Manufacturing
623,484 UART: [state] DebugLocked = No
624,749 UART: [state] WD Timer not started. Device not locked for debugging
630,200 UART: [kat] SHA2-256
812,183 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,754 UART: [kat] ++
824,341 UART: [kat] sha1
835,060 UART: [kat] SHA2-256
838,019 UART: [kat] SHA2-384
842,815 UART: [kat] SHA2-512-ACC
845,422 UART: [kat] ECC-384
4,101,732 UART: [kat] HMAC-384Kdf
4,115,116 UART: [kat] LMS
5,188,267 UART: [kat] --
5,191,525 UART: [cold-reset] ++
5,194,054 UART: [fht] FHT @ 0x50003400
5,206,019 UART: [idev] ++
5,206,691 UART: [idev] CDI.KEYID = 6
5,207,919 UART: [idev] SUBJECT.KEYID = 7
5,209,399 UART: [idev] UDS.KEYID = 0
5,227,714 UART: [idev] Erasing UDS.KEYID = 0
8,501,676 UART: [idev] Sha1 KeyId Algorithm
8,523,220 UART: [idev] --
8,527,455 UART: [ldev] ++
8,528,023 UART: [ldev] CDI.KEYID = 6
8,529,254 UART: [ldev] SUBJECT.KEYID = 5
8,530,727 UART: [ldev] AUTHORITY.KEYID = 7
8,532,279 UART: [ldev] FE.KEYID = 1
8,545,133 UART: [ldev] Erasing FE.KEYID = 1
11,839,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,131,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,147,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,163,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,179,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,201,262 UART: [ldev] --
14,206,492 UART: [fwproc] Wait for Commands...
14,208,974 UART: [fwproc] Recv command 0x46574c44
14,211,282 UART: [fwproc] Recv'd Img size: 113844 bytes
17,192,353 UART: ROM Fatal Error: 0x000B0025
17,195,748 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
5,873 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,003,481 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,015 writing to cptra_bootfsm_go
6,572 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
193,087 UART:
193,471 UART: Running Caliptra ROM ...
194,655 UART:
194,814 UART: [state] CFI Enabled
264,397 UART: [state] LifecycleState = Manufacturing
266,325 UART: [state] DebugLocked = No
268,300 UART: [state] WD Timer not started. Device not locked for debugging
272,510 UART: [kat] SHA2-256
451,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,187 UART: [kat] ++
463,715 UART: [kat] sha1
474,024 UART: [kat] SHA2-256
477,095 UART: [kat] SHA2-384
483,022 UART: [kat] SHA2-512-ACC
485,951 UART: [kat] ECC-384
2,950,662 UART: [kat] HMAC-384Kdf
2,973,822 UART: [kat] LMS
3,503,265 UART: [kat] --
3,506,997 UART: [cold-reset] ++
3,508,442 UART: [fht] FHT @ 0x50003400
3,518,455 UART: [idev] ++
3,519,031 UART: [idev] CDI.KEYID = 6
3,519,923 UART: [idev] SUBJECT.KEYID = 7
3,521,136 UART: [idev] UDS.KEYID = 0
3,545,870 UART: [idev] Erasing UDS.KEYID = 0
6,032,138 UART: [idev] Sha1 KeyId Algorithm
6,055,371 UART: [idev] --
6,059,397 UART: [ldev] ++
6,059,972 UART: [ldev] CDI.KEYID = 6
6,060,884 UART: [ldev] SUBJECT.KEYID = 5
6,062,051 UART: [ldev] AUTHORITY.KEYID = 7
6,063,288 UART: [ldev] FE.KEYID = 1
6,102,675 UART: [ldev] Erasing FE.KEYID = 1
8,607,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,413 UART: [ldev] --
10,412,145 UART: [fwproc] Wait for Commands...
10,413,973 UART: [fwproc] Recv command 0x46574c44
10,416,015 UART: [fwproc] Recv'd Img size: 114168 bytes
12,738,049 UART: ROM Fatal Error: 0x000B0025
12,741,149 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
6,487 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,534,982 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
6,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,598 UART:
192,976 UART: Running Caliptra ROM ...
194,141 UART:
603,680 UART: [state] CFI Enabled
617,916 UART: [state] LifecycleState = Manufacturing
619,787 UART: [state] DebugLocked = No
621,883 UART: [state] WD Timer not started. Device not locked for debugging
624,952 UART: [kat] SHA2-256
804,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,638 UART: [kat] ++
816,106 UART: [kat] sha1
826,278 UART: [kat] SHA2-256
829,280 UART: [kat] SHA2-384
833,857 UART: [kat] SHA2-512-ACC
836,781 UART: [kat] ECC-384
3,277,191 UART: [kat] HMAC-384Kdf
3,290,629 UART: [kat] LMS
3,820,142 UART: [kat] --
3,824,131 UART: [cold-reset] ++
3,826,497 UART: [fht] FHT @ 0x50003400
3,838,048 UART: [idev] ++
3,838,622 UART: [idev] CDI.KEYID = 6
3,839,542 UART: [idev] SUBJECT.KEYID = 7
3,840,757 UART: [idev] UDS.KEYID = 0
3,856,189 UART: [idev] Erasing UDS.KEYID = 0
6,309,499 UART: [idev] Sha1 KeyId Algorithm
6,332,796 UART: [idev] --
6,336,624 UART: [ldev] ++
6,337,188 UART: [ldev] CDI.KEYID = 6
6,338,126 UART: [ldev] SUBJECT.KEYID = 5
6,339,280 UART: [ldev] AUTHORITY.KEYID = 7
6,340,565 UART: [ldev] FE.KEYID = 1
6,351,508 UART: [ldev] Erasing FE.KEYID = 1
8,828,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,879 UART: [ldev] --
10,620,088 UART: [fwproc] Wait for Commands...
10,622,562 UART: [fwproc] Recv command 0x46574c44
10,624,660 UART: [fwproc] Recv'd Img size: 114168 bytes
12,949,879 UART: ROM Fatal Error: 0x000B0025
12,952,965 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
6,248 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,725,383 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
5,527 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,385 UART:
192,776 UART: Running Caliptra ROM ...
193,947 UART:
194,101 UART: [state] CFI Enabled
264,715 UART: [state] LifecycleState = Manufacturing
266,569 UART: [state] DebugLocked = No
269,087 UART: [state] WD Timer not started. Device not locked for debugging
272,816 UART: [kat] SHA2-256
451,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,492 UART: [kat] ++
464,032 UART: [kat] sha1
475,522 UART: [kat] SHA2-256
478,530 UART: [kat] SHA2-384
484,019 UART: [kat] SHA2-512-ACC
486,954 UART: [kat] ECC-384
2,948,664 UART: [kat] HMAC-384Kdf
2,972,452 UART: [kat] LMS
3,501,899 UART: [kat] --
3,506,385 UART: [cold-reset] ++
3,507,943 UART: [fht] FHT @ 0x50003400
3,517,360 UART: [idev] ++
3,517,928 UART: [idev] CDI.KEYID = 6
3,518,862 UART: [idev] SUBJECT.KEYID = 7
3,520,071 UART: [idev] UDS.KEYID = 0
3,545,663 UART: [idev] Erasing UDS.KEYID = 0
6,024,976 UART: [idev] Sha1 KeyId Algorithm
6,046,963 UART: [idev] --
6,051,824 UART: [ldev] ++
6,052,443 UART: [ldev] CDI.KEYID = 6
6,053,333 UART: [ldev] SUBJECT.KEYID = 5
6,054,438 UART: [ldev] AUTHORITY.KEYID = 7
6,055,734 UART: [ldev] FE.KEYID = 1
6,101,950 UART: [ldev] Erasing FE.KEYID = 1
8,607,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,233 UART: [ldev] --
10,413,418 UART: [fwproc] Wait for Commands...
10,415,163 UART: [fwproc] Recv command 0x46574c44
10,417,265 UART: [fwproc] Recv'd Img size: 114168 bytes
12,740,518 UART: ROM Fatal Error: 0x000B0025
12,743,605 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
5,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,493,378 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
6,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,385 UART:
192,790 UART: Running Caliptra ROM ...
193,964 UART:
603,341 UART: [state] CFI Enabled
616,804 UART: [state] LifecycleState = Manufacturing
618,674 UART: [state] DebugLocked = No
621,200 UART: [state] WD Timer not started. Device not locked for debugging
625,371 UART: [kat] SHA2-256
804,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,063 UART: [kat] ++
816,598 UART: [kat] sha1
827,211 UART: [kat] SHA2-256
830,270 UART: [kat] SHA2-384
836,400 UART: [kat] SHA2-512-ACC
839,385 UART: [kat] ECC-384
3,281,192 UART: [kat] HMAC-384Kdf
3,293,873 UART: [kat] LMS
3,823,379 UART: [kat] --
3,825,582 UART: [cold-reset] ++
3,826,372 UART: [fht] FHT @ 0x50003400
3,836,684 UART: [idev] ++
3,837,236 UART: [idev] CDI.KEYID = 6
3,838,170 UART: [idev] SUBJECT.KEYID = 7
3,839,377 UART: [idev] UDS.KEYID = 0
3,855,974 UART: [idev] Erasing UDS.KEYID = 0
6,310,320 UART: [idev] Sha1 KeyId Algorithm
6,333,116 UART: [idev] --
6,337,266 UART: [ldev] ++
6,337,830 UART: [ldev] CDI.KEYID = 6
6,338,712 UART: [ldev] SUBJECT.KEYID = 5
6,339,921 UART: [ldev] AUTHORITY.KEYID = 7
6,341,099 UART: [ldev] FE.KEYID = 1
6,351,009 UART: [ldev] Erasing FE.KEYID = 1
8,825,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,844 UART: [ldev] --
10,615,093 UART: [fwproc] Wait for Commands...
10,617,683 UART: [fwproc] Recv command 0x46574c44
10,619,725 UART: [fwproc] Recv'd Img size: 114168 bytes
12,948,837 UART: ROM Fatal Error: 0x000B0025
12,951,959 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
6,420 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,731,275 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Manufacturing
85,797 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,693 UART: [kat] SHA2-256
901,633 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,612 UART: [kat] LMS
1,168,924 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,545 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,439 UART: [idev] --
1,208,606 UART: [ldev] ++
1,208,774 UART: [ldev] CDI.KEYID = 6
1,209,138 UART: [ldev] SUBJECT.KEYID = 5
1,209,565 UART: [ldev] AUTHORITY.KEYID = 7
1,210,028 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,724 UART: [ldev] --
1,281,154 UART: [fwproc] Wait for Commands...
1,281,959 UART: [fwproc] Recv command 0x46574c44
1,282,692 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,569 UART: ROM Fatal Error: 0x000B0025
1,574,726 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,428,611 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Manufacturing
85,848 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,829 UART: [kat] HMAC-384Kdf
920,393 UART: [kat] LMS
1,168,705 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,218 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,248 UART: [idev] Sha1 KeyId Algorithm
1,207,268 UART: [idev] --
1,208,361 UART: [ldev] ++
1,208,529 UART: [ldev] CDI.KEYID = 6
1,208,893 UART: [ldev] SUBJECT.KEYID = 5
1,209,320 UART: [ldev] AUTHORITY.KEYID = 7
1,209,783 UART: [ldev] FE.KEYID = 1
1,215,247 UART: [ldev] Erasing FE.KEYID = 1
1,241,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,771 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,886 UART: [fwproc] Recv command 0x46574c44
1,282,619 UART: [fwproc] Recv'd Img size: 114168 bytes
1,574,258 UART: ROM Fatal Error: 0x000B0025
1,575,415 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,150 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Manufacturing
85,929 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,173,025 UART: [idev] ++
1,173,193 UART: [idev] CDI.KEYID = 6
1,173,554 UART: [idev] SUBJECT.KEYID = 7
1,173,979 UART: [idev] UDS.KEYID = 0
1,182,141 UART: [idev] Erasing UDS.KEYID = 0
1,199,057 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,208,850 UART: [ldev] ++
1,209,018 UART: [ldev] CDI.KEYID = 6
1,209,382 UART: [ldev] SUBJECT.KEYID = 5
1,209,809 UART: [ldev] AUTHORITY.KEYID = 7
1,210,272 UART: [ldev] FE.KEYID = 1
1,215,242 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,750 UART: [ldev] --
1,281,036 UART: [fwproc] Wait for Commands...
1,281,827 UART: [fwproc] Recv command 0x46574c44
1,282,560 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,849 UART: ROM Fatal Error: 0x000B0025
1,575,006 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,426,435 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Manufacturing
86,000 UART: [state] DebugLocked = No
86,492 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
891,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,791 UART: [kat] HMAC-384Kdf
921,367 UART: [kat] LMS
1,169,679 UART: [kat] --
1,170,498 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,818 UART: [idev] ++
1,173,986 UART: [idev] CDI.KEYID = 6
1,174,347 UART: [idev] SUBJECT.KEYID = 7
1,174,772 UART: [idev] UDS.KEYID = 0
1,182,634 UART: [idev] Erasing UDS.KEYID = 0
1,199,934 UART: [idev] Sha1 KeyId Algorithm
1,208,898 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,273 UART: [ldev] SUBJECT.KEYID = 5
1,210,700 UART: [ldev] AUTHORITY.KEYID = 7
1,211,163 UART: [ldev] FE.KEYID = 1
1,216,333 UART: [ldev] Erasing FE.KEYID = 1
1,243,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,345 UART: [ldev] --
1,282,667 UART: [fwproc] Wait for Commands...
1,283,404 UART: [fwproc] Recv command 0x46574c44
1,284,137 UART: [fwproc] Recv'd Img size: 114168 bytes
1,574,374 UART: ROM Fatal Error: 0x000B0025
1,575,531 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,368 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,768 UART: [state] LifecycleState = Manufacturing
85,423 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
890,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,009 UART: [kat] ++
895,161 UART: [kat] sha1
899,295 UART: [kat] SHA2-256
901,235 UART: [kat] SHA2-384
903,924 UART: [kat] SHA2-512-ACC
905,825 UART: [kat] ECC-384
915,290 UART: [kat] HMAC-384Kdf
919,896 UART: [kat] LMS
1,168,208 UART: [kat] --
1,169,391 UART: [cold-reset] ++
1,169,759 UART: [fht] FHT @ 0x50003400
1,172,367 UART: [idev] ++
1,172,535 UART: [idev] CDI.KEYID = 6
1,172,896 UART: [idev] SUBJECT.KEYID = 7
1,173,321 UART: [idev] UDS.KEYID = 0
1,181,373 UART: [idev] Erasing UDS.KEYID = 0
1,198,245 UART: [idev] Sha1 KeyId Algorithm
1,207,003 UART: [idev] --
1,208,278 UART: [ldev] ++
1,208,446 UART: [ldev] CDI.KEYID = 6
1,208,810 UART: [ldev] SUBJECT.KEYID = 5
1,209,237 UART: [ldev] AUTHORITY.KEYID = 7
1,209,700 UART: [ldev] FE.KEYID = 1
1,214,814 UART: [ldev] Erasing FE.KEYID = 1
1,240,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,982 UART: [ldev] --
1,280,252 UART: [fwproc] Wait for Commands...
1,280,999 UART: [fwproc] Recv command 0x46574c44
1,281,732 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,081 UART: ROM Fatal Error: 0x000B0025
1,574,238 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,237 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Manufacturing
85,764 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,151 UART: [kat] SHA2-512-ACC
906,052 UART: [kat] ECC-384
915,825 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,488 UART: [cold-reset] ++
1,169,946 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,181,678 UART: [idev] Erasing UDS.KEYID = 0
1,198,880 UART: [idev] Sha1 KeyId Algorithm
1,207,790 UART: [idev] --
1,208,821 UART: [ldev] ++
1,208,989 UART: [ldev] CDI.KEYID = 6
1,209,353 UART: [ldev] SUBJECT.KEYID = 5
1,209,780 UART: [ldev] AUTHORITY.KEYID = 7
1,210,243 UART: [ldev] FE.KEYID = 1
1,215,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,419 UART: [fwproc] Wait for Commands...
1,282,006 UART: [fwproc] Recv command 0x46574c44
1,282,739 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,808 UART: ROM Fatal Error: 0x000B0025
1,574,965 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,428,612 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
5,257 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,006 UART:
192,416 UART: Running Caliptra ROM ...
193,492 UART:
193,635 UART: [state] CFI Enabled
264,087 UART: [state] LifecycleState = Manufacturing
266,461 UART: [state] DebugLocked = No
268,132 UART: [state] WD Timer not started. Device not locked for debugging
271,892 UART: [kat] SHA2-256
453,605 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,117 UART: [kat] ++
465,620 UART: [kat] sha1
474,823 UART: [kat] SHA2-256
477,829 UART: [kat] SHA2-384
482,561 UART: [kat] SHA2-512-ACC
485,167 UART: [kat] ECC-384
3,776,984 UART: [kat] HMAC-384Kdf
3,802,296 UART: [kat] LMS
4,875,436 UART: [kat] --
4,881,659 UART: [cold-reset] ++
4,884,413 UART: [fht] FHT @ 0x50003400
4,895,574 UART: [idev] ++
4,896,299 UART: [idev] CDI.KEYID = 6
4,897,400 UART: [idev] SUBJECT.KEYID = 7
4,898,611 UART: [idev] UDS.KEYID = 0
4,928,988 UART: [idev] Erasing UDS.KEYID = 0
8,244,131 UART: [idev] Sha1 KeyId Algorithm
8,266,116 UART: [idev] --
8,270,267 UART: [ldev] ++
8,271,098 UART: [ldev] CDI.KEYID = 6
8,272,007 UART: [ldev] SUBJECT.KEYID = 5
8,273,237 UART: [ldev] AUTHORITY.KEYID = 7
8,274,465 UART: [ldev] FE.KEYID = 1
8,317,356 UART: [ldev] Erasing FE.KEYID = 1
11,646,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,237 UART: [ldev] --
14,014,314 UART: [fwproc] Wait for Commands...
14,015,924 UART: [fwproc] Recv command 0x46574c44
14,018,182 UART: [fwproc] Recv'd Img size: 113844 bytes
16,996,131 UART: ROM Fatal Error: 0x000B0027
16,999,521 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
5,583 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,817,191 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
6,386 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,576 UART:
192,951 UART: Running Caliptra ROM ...
194,122 UART:
603,963 UART: [state] CFI Enabled
616,894 UART: [state] LifecycleState = Manufacturing
619,312 UART: [state] DebugLocked = No
621,883 UART: [state] WD Timer not started. Device not locked for debugging
626,281 UART: [kat] SHA2-256
808,272 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,804 UART: [kat] ++
820,386 UART: [kat] sha1
831,098 UART: [kat] SHA2-256
834,103 UART: [kat] SHA2-384
840,232 UART: [kat] SHA2-512-ACC
842,835 UART: [kat] ECC-384
4,098,362 UART: [kat] HMAC-384Kdf
4,111,026 UART: [kat] LMS
5,184,181 UART: [kat] --
5,189,368 UART: [cold-reset] ++
5,192,064 UART: [fht] FHT @ 0x50003400
5,204,125 UART: [idev] ++
5,204,847 UART: [idev] CDI.KEYID = 6
5,206,072 UART: [idev] SUBJECT.KEYID = 7
5,207,523 UART: [idev] UDS.KEYID = 0
5,225,223 UART: [idev] Erasing UDS.KEYID = 0
8,496,102 UART: [idev] Sha1 KeyId Algorithm
8,518,007 UART: [idev] --
8,521,684 UART: [ldev] ++
8,522,312 UART: [ldev] CDI.KEYID = 6
8,523,487 UART: [ldev] SUBJECT.KEYID = 5
8,524,963 UART: [ldev] AUTHORITY.KEYID = 7
8,526,514 UART: [ldev] FE.KEYID = 1
8,538,729 UART: [ldev] Erasing FE.KEYID = 1
11,830,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,060 UART: [ldev] --
14,196,447 UART: [fwproc] Wait for Commands...
14,199,510 UART: [fwproc] Recv command 0x46574c44
14,201,814 UART: [fwproc] Recv'd Img size: 113844 bytes
17,186,655 UART: ROM Fatal Error: 0x000B0027
17,190,051 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
6,541 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,001,226 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
5,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,071 UART:
192,457 UART: Running Caliptra ROM ...
193,587 UART:
193,733 UART: [state] CFI Enabled
261,312 UART: [state] LifecycleState = Manufacturing
263,178 UART: [state] DebugLocked = No
265,811 UART: [state] WD Timer not started. Device not locked for debugging
269,375 UART: [kat] SHA2-256
448,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,109 UART: [kat] ++
460,648 UART: [kat] sha1
470,371 UART: [kat] SHA2-256
473,386 UART: [kat] SHA2-384
479,526 UART: [kat] SHA2-512-ACC
482,458 UART: [kat] ECC-384
2,927,308 UART: [kat] HMAC-384Kdf
2,949,538 UART: [kat] LMS
3,478,972 UART: [kat] --
3,483,135 UART: [cold-reset] ++
3,484,153 UART: [fht] FHT @ 0x50003400
3,495,885 UART: [idev] ++
3,496,453 UART: [idev] CDI.KEYID = 6
3,497,470 UART: [idev] SUBJECT.KEYID = 7
3,498,572 UART: [idev] UDS.KEYID = 0
3,521,623 UART: [idev] Erasing UDS.KEYID = 0
6,006,420 UART: [idev] Sha1 KeyId Algorithm
6,028,799 UART: [idev] --
6,032,117 UART: [ldev] ++
6,032,693 UART: [ldev] CDI.KEYID = 6
6,033,580 UART: [ldev] SUBJECT.KEYID = 5
6,034,796 UART: [ldev] AUTHORITY.KEYID = 7
6,036,034 UART: [ldev] FE.KEYID = 1
6,078,145 UART: [ldev] Erasing FE.KEYID = 1
8,580,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,705 UART: [ldev] --
10,391,026 UART: [fwproc] Wait for Commands...
10,392,918 UART: [fwproc] Recv command 0x46574c44
10,395,016 UART: [fwproc] Recv'd Img size: 114168 bytes
12,713,959 UART: ROM Fatal Error: 0x000B0027
12,717,056 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
5,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,479,912 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
6,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,346 UART:
192,754 UART: Running Caliptra ROM ...
194,090 UART:
603,565 UART: [state] CFI Enabled
617,862 UART: [state] LifecycleState = Manufacturing
619,744 UART: [state] DebugLocked = No
621,169 UART: [state] WD Timer not started. Device not locked for debugging
624,254 UART: [kat] SHA2-256
803,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,949 UART: [kat] ++
815,480 UART: [kat] sha1
825,449 UART: [kat] SHA2-256
828,447 UART: [kat] SHA2-384
834,484 UART: [kat] SHA2-512-ACC
837,467 UART: [kat] ECC-384
3,279,713 UART: [kat] HMAC-384Kdf
3,292,284 UART: [kat] LMS
3,821,803 UART: [kat] --
3,826,448 UART: [cold-reset] ++
3,828,758 UART: [fht] FHT @ 0x50003400
3,838,705 UART: [idev] ++
3,839,266 UART: [idev] CDI.KEYID = 6
3,840,148 UART: [idev] SUBJECT.KEYID = 7
3,841,356 UART: [idev] UDS.KEYID = 0
3,855,814 UART: [idev] Erasing UDS.KEYID = 0
6,309,177 UART: [idev] Sha1 KeyId Algorithm
6,331,437 UART: [idev] --
6,336,187 UART: [ldev] ++
6,336,758 UART: [ldev] CDI.KEYID = 6
6,337,679 UART: [ldev] SUBJECT.KEYID = 5
6,338,837 UART: [ldev] AUTHORITY.KEYID = 7
6,340,122 UART: [ldev] FE.KEYID = 1
6,351,831 UART: [ldev] Erasing FE.KEYID = 1
8,825,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,930 UART: [ldev] --
10,614,739 UART: [fwproc] Wait for Commands...
10,617,914 UART: [fwproc] Recv command 0x46574c44
10,620,015 UART: [fwproc] Recv'd Img size: 114168 bytes
12,949,733 UART: ROM Fatal Error: 0x000B0027
12,952,852 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
6,011 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,724,797 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
5,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,109 UART:
192,484 UART: Running Caliptra ROM ...
193,651 UART:
193,811 UART: [state] CFI Enabled
266,695 UART: [state] LifecycleState = Manufacturing
268,539 UART: [state] DebugLocked = No
271,277 UART: [state] WD Timer not started. Device not locked for debugging
274,752 UART: [kat] SHA2-256
453,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,446 UART: [kat] ++
465,902 UART: [kat] sha1
478,184 UART: [kat] SHA2-256
481,245 UART: [kat] SHA2-384
487,187 UART: [kat] SHA2-512-ACC
490,131 UART: [kat] ECC-384
2,953,232 UART: [kat] HMAC-384Kdf
2,976,490 UART: [kat] LMS
3,505,904 UART: [kat] --
3,511,788 UART: [cold-reset] ++
3,513,447 UART: [fht] FHT @ 0x50003400
3,522,980 UART: [idev] ++
3,523,541 UART: [idev] CDI.KEYID = 6
3,524,480 UART: [idev] SUBJECT.KEYID = 7
3,525,690 UART: [idev] UDS.KEYID = 0
3,548,450 UART: [idev] Erasing UDS.KEYID = 0
6,031,769 UART: [idev] Sha1 KeyId Algorithm
6,054,086 UART: [idev] --
6,058,717 UART: [ldev] ++
6,059,302 UART: [ldev] CDI.KEYID = 6
6,060,234 UART: [ldev] SUBJECT.KEYID = 5
6,061,404 UART: [ldev] AUTHORITY.KEYID = 7
6,062,639 UART: [ldev] FE.KEYID = 1
6,104,399 UART: [ldev] Erasing FE.KEYID = 1
8,620,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,396,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,417,399 UART: [ldev] --
10,422,178 UART: [fwproc] Wait for Commands...
10,424,122 UART: [fwproc] Recv command 0x46574c44
10,426,224 UART: [fwproc] Recv'd Img size: 114168 bytes
12,752,286 UART: ROM Fatal Error: 0x000B0027
12,755,406 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
5,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,528,399 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
6,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,556 UART:
192,931 UART: Running Caliptra ROM ...
194,104 UART:
603,607 UART: [state] CFI Enabled
614,712 UART: [state] LifecycleState = Manufacturing
616,581 UART: [state] DebugLocked = No
618,362 UART: [state] WD Timer not started. Device not locked for debugging
621,818 UART: [kat] SHA2-256
800,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,530 UART: [kat] ++
812,975 UART: [kat] sha1
822,605 UART: [kat] SHA2-256
825,633 UART: [kat] SHA2-384
831,393 UART: [kat] SHA2-512-ACC
834,375 UART: [kat] ECC-384
3,274,870 UART: [kat] HMAC-384Kdf
3,287,085 UART: [kat] LMS
3,816,583 UART: [kat] --
3,820,092 UART: [cold-reset] ++
3,821,857 UART: [fht] FHT @ 0x50003400
3,833,919 UART: [idev] ++
3,834,477 UART: [idev] CDI.KEYID = 6
3,835,357 UART: [idev] SUBJECT.KEYID = 7
3,836,566 UART: [idev] UDS.KEYID = 0
3,849,217 UART: [idev] Erasing UDS.KEYID = 0
6,308,072 UART: [idev] Sha1 KeyId Algorithm
6,329,620 UART: [idev] --
6,334,390 UART: [ldev] ++
6,334,980 UART: [ldev] CDI.KEYID = 6
6,335,891 UART: [ldev] SUBJECT.KEYID = 5
6,337,050 UART: [ldev] AUTHORITY.KEYID = 7
6,338,280 UART: [ldev] FE.KEYID = 1
6,349,144 UART: [ldev] Erasing FE.KEYID = 1
8,825,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,298 UART: [ldev] --
10,616,018 UART: [fwproc] Wait for Commands...
10,617,627 UART: [fwproc] Recv command 0x46574c44
10,619,722 UART: [fwproc] Recv'd Img size: 114168 bytes
12,942,780 UART: ROM Fatal Error: 0x000B0027
12,945,898 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
6,049 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,737,971 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Manufacturing
85,415 UART: [state] DebugLocked = No
85,933 UART: [state] WD Timer not started. Device not locked for debugging
87,132 UART: [kat] SHA2-256
890,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,811 UART: [kat] ++
894,963 UART: [kat] sha1
899,165 UART: [kat] SHA2-256
901,105 UART: [kat] SHA2-384
903,886 UART: [kat] SHA2-512-ACC
905,787 UART: [kat] ECC-384
915,064 UART: [kat] HMAC-384Kdf
919,796 UART: [kat] LMS
1,168,108 UART: [kat] --
1,168,973 UART: [cold-reset] ++
1,169,395 UART: [fht] FHT @ 0x50003400
1,172,047 UART: [idev] ++
1,172,215 UART: [idev] CDI.KEYID = 6
1,172,576 UART: [idev] SUBJECT.KEYID = 7
1,173,001 UART: [idev] UDS.KEYID = 0
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,292 UART: [ldev] ++
1,208,460 UART: [ldev] CDI.KEYID = 6
1,208,824 UART: [ldev] SUBJECT.KEYID = 5
1,209,251 UART: [ldev] AUTHORITY.KEYID = 7
1,209,714 UART: [ldev] FE.KEYID = 1
1,214,408 UART: [ldev] Erasing FE.KEYID = 1
1,240,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,904 UART: [ldev] --
1,280,310 UART: [fwproc] Wait for Commands...
1,281,059 UART: [fwproc] Recv command 0x46574c44
1,281,792 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,119 UART: ROM Fatal Error: 0x000B0027
1,574,276 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,823 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Manufacturing
86,140 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,708 UART: [kat] ++
895,860 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,195 UART: [kat] LMS
1,169,507 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,410 UART: [idev] ++
1,173,578 UART: [idev] CDI.KEYID = 6
1,173,939 UART: [idev] SUBJECT.KEYID = 7
1,174,364 UART: [idev] UDS.KEYID = 0
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,372 UART: [idev] Sha1 KeyId Algorithm
1,208,214 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,242,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,281,865 UART: [fwproc] Wait for Commands...
1,282,656 UART: [fwproc] Recv command 0x46574c44
1,283,389 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,498 UART: ROM Fatal Error: 0x000B0027
1,574,655 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,428,030 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Manufacturing
85,865 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,632 UART: [kat] SHA2-256
891,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,308 UART: [kat] LMS
1,168,620 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,169,971 UART: [fht] FHT @ 0x50003400
1,172,511 UART: [idev] ++
1,172,679 UART: [idev] CDI.KEYID = 6
1,173,040 UART: [idev] SUBJECT.KEYID = 7
1,173,465 UART: [idev] UDS.KEYID = 0
1,181,381 UART: [idev] Erasing UDS.KEYID = 0
1,198,179 UART: [idev] Sha1 KeyId Algorithm
1,206,971 UART: [idev] --
1,207,984 UART: [ldev] ++
1,208,152 UART: [ldev] CDI.KEYID = 6
1,208,516 UART: [ldev] SUBJECT.KEYID = 5
1,208,943 UART: [ldev] AUTHORITY.KEYID = 7
1,209,406 UART: [ldev] FE.KEYID = 1
1,214,898 UART: [ldev] Erasing FE.KEYID = 1
1,241,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,479 UART: [fwproc] Recv command 0x46574c44
1,282,212 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,987 UART: ROM Fatal Error: 0x000B0027
1,575,144 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,426,295 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Manufacturing
85,702 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
891,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,534 UART: [idev] ++
1,172,702 UART: [idev] CDI.KEYID = 6
1,173,063 UART: [idev] SUBJECT.KEYID = 7
1,173,488 UART: [idev] UDS.KEYID = 0
1,181,618 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,241,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,515 UART: [ldev] --
1,280,813 UART: [fwproc] Wait for Commands...
1,281,594 UART: [fwproc] Recv command 0x46574c44
1,282,327 UART: [fwproc] Recv'd Img size: 114168 bytes
1,574,054 UART: ROM Fatal Error: 0x000B0027
1,575,211 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,334 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Manufacturing
85,655 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,402 UART: [kat] SHA2-512-ACC
906,303 UART: [kat] ECC-384
915,722 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,903 UART: [idev] ++
1,173,071 UART: [idev] CDI.KEYID = 6
1,173,432 UART: [idev] SUBJECT.KEYID = 7
1,173,857 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,198,569 UART: [idev] Sha1 KeyId Algorithm
1,207,401 UART: [idev] --
1,208,420 UART: [ldev] ++
1,208,588 UART: [ldev] CDI.KEYID = 6
1,208,952 UART: [ldev] SUBJECT.KEYID = 5
1,209,379 UART: [ldev] AUTHORITY.KEYID = 7
1,209,842 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,466 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 114168 bytes
1,574,189 UART: ROM Fatal Error: 0x000B0027
1,575,346 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,424,351 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,855 UART: [state] LifecycleState = Manufacturing
85,510 UART: [state] DebugLocked = No
86,098 UART: [state] WD Timer not started. Device not locked for debugging
87,415 UART: [kat] SHA2-256
890,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,094 UART: [kat] ++
895,246 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
903,991 UART: [kat] SHA2-512-ACC
905,892 UART: [kat] ECC-384
915,853 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,080 UART: [fht] FHT @ 0x50003400
1,172,884 UART: [idev] ++
1,173,052 UART: [idev] CDI.KEYID = 6
1,173,413 UART: [idev] SUBJECT.KEYID = 7
1,173,838 UART: [idev] UDS.KEYID = 0
1,181,824 UART: [idev] Erasing UDS.KEYID = 0
1,198,626 UART: [idev] Sha1 KeyId Algorithm
1,207,332 UART: [idev] --
1,208,487 UART: [ldev] ++
1,208,655 UART: [ldev] CDI.KEYID = 6
1,209,019 UART: [ldev] SUBJECT.KEYID = 5
1,209,446 UART: [ldev] AUTHORITY.KEYID = 7
1,209,909 UART: [ldev] FE.KEYID = 1
1,215,093 UART: [ldev] Erasing FE.KEYID = 1
1,241,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,703 UART: [ldev] --
1,281,207 UART: [fwproc] Wait for Commands...
1,281,914 UART: [fwproc] Recv command 0x46574c44
1,282,647 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,862 UART: ROM Fatal Error: 0x000B0027
1,575,019 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,428,960 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,031,417 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,175,203 UART:
2,175,604 UART: Running Caliptra ROM ...
2,176,774 UART:
2,176,947 UART: [state] CFI Enabled
2,177,913 UART: [state] LifecycleState = Unprovisioned
2,179,547 UART: [state] DebugLocked = No
2,180,653 UART: [state] WD Timer not started. Device not locked for debugging
2,183,115 UART: [kat] SHA2-256
2,183,785 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,186,774 UART: [kat] ++
2,187,221 UART: [kat] sha1
2,187,816 UART: [kat] SHA2-256
2,188,479 UART: [kat] SHA2-384
2,189,178 UART: [kat] SHA2-512-ACC
2,190,022 UART: [kat] ECC-384
3,772,262 UART: [kat] HMAC-384Kdf
3,802,926 UART: [kat] LMS
4,876,090 UART: [kat] --
4,881,940 UART: [cold-reset] ++
4,883,987 UART: [fht] FHT @ 0x50003400
4,896,857 UART: [idev] ++
4,897,535 UART: [idev] CDI.KEYID = 6
4,898,771 UART: [idev] SUBJECT.KEYID = 7
4,899,869 UART: [idev] UDS.KEYID = 0
4,929,668 UART: [idev] Erasing UDS.KEYID = 0
8,240,252 UART: [idev] Sha1 KeyId Algorithm
8,262,584 UART: [idev] --
8,266,148 UART: [ldev] ++
8,266,714 UART: [ldev] CDI.KEYID = 6
8,267,951 UART: [ldev] SUBJECT.KEYID = 5
8,269,108 UART: [ldev] AUTHORITY.KEYID = 7
8,270,335 UART: [ldev] FE.KEYID = 1
8,317,525 UART: [ldev] Erasing FE.KEYID = 1
11,650,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,646 UART: [ldev] --
14,015,644 UART: [fwproc] Wait for Commands...
14,017,418 UART: [fwproc] Recv command 0x46574c44
14,019,696 UART: [fwproc] Recv'd Img size: 113844 bytes
15,410,173 UART: ROM Fatal Error: 0x000B000D
15,413,574 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
2,028,699 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,249,108 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,023,043 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,167,084 UART:
2,167,507 UART: Running Caliptra ROM ...
2,168,603 UART:
2,168,752 UART: [state] CFI Enabled
2,169,717 UART: [state] LifecycleState = Unprovisioned
2,171,351 UART: [state] DebugLocked = No
2,172,367 UART: [state] WD Timer not started. Device not locked for debugging
2,174,816 UART: [kat] SHA2-256
2,175,471 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,458 UART: [kat] ++
2,178,898 UART: [kat] sha1
2,179,400 UART: [kat] SHA2-256
2,180,049 UART: [kat] SHA2-384
2,180,700 UART: [kat] SHA2-512-ACC
2,181,492 UART: [kat] ECC-384
4,100,409 UART: [kat] HMAC-384Kdf
4,111,841 UART: [kat] LMS
5,184,975 UART: [kat] --
5,191,799 UART: [cold-reset] ++
5,192,879 UART: [fht] FHT @ 0x50003400
5,205,042 UART: [idev] ++
5,205,714 UART: [idev] CDI.KEYID = 6
5,206,947 UART: [idev] SUBJECT.KEYID = 7
5,208,382 UART: [idev] UDS.KEYID = 0
5,226,059 UART: [idev] Erasing UDS.KEYID = 0
8,502,631 UART: [idev] Sha1 KeyId Algorithm
8,523,980 UART: [idev] --
8,529,160 UART: [ldev] ++
8,529,765 UART: [ldev] CDI.KEYID = 6
8,531,009 UART: [ldev] SUBJECT.KEYID = 5
8,532,446 UART: [ldev] AUTHORITY.KEYID = 7
8,534,004 UART: [ldev] FE.KEYID = 1
8,542,871 UART: [ldev] Erasing FE.KEYID = 1
11,838,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,130,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,147,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,163,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,179,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,199,751 UART: [ldev] --
14,203,872 UART: [fwproc] Wait for Commands...
14,206,394 UART: [fwproc] Recv command 0x46574c44
14,208,726 UART: [fwproc] Recv'd Img size: 113844 bytes
15,605,178 UART: ROM Fatal Error: 0x000B000D
15,608,591 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,036,886 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,409,392 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,565 writing to cptra_bootfsm_go
2,023,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,812 UART:
2,168,199 UART: Running Caliptra ROM ...
2,169,275 UART:
2,169,431 UART: [state] CFI Enabled
2,170,409 UART: [state] LifecycleState = Unprovisioned
2,172,062 UART: [state] DebugLocked = No
2,173,175 UART: [state] WD Timer not started. Device not locked for debugging
2,175,648 UART: [kat] SHA2-256
2,176,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,347 UART: [kat] ++
2,179,800 UART: [kat] sha1
2,180,356 UART: [kat] SHA2-256
2,181,061 UART: [kat] SHA2-384
2,181,722 UART: [kat] SHA2-512-ACC
2,182,612 UART: [kat] ECC-384
2,947,964 UART: [kat] HMAC-384Kdf
2,969,139 UART: [kat] LMS
3,498,575 UART: [kat] --
3,503,995 UART: [cold-reset] ++
3,506,259 UART: [fht] FHT @ 0x50003400
3,517,887 UART: [idev] ++
3,518,462 UART: [idev] CDI.KEYID = 6
3,519,343 UART: [idev] SUBJECT.KEYID = 7
3,520,556 UART: [idev] UDS.KEYID = 0
3,541,684 UART: [idev] Erasing UDS.KEYID = 0
6,023,140 UART: [idev] Sha1 KeyId Algorithm
6,047,243 UART: [idev] --
6,050,699 UART: [ldev] ++
6,051,269 UART: [ldev] CDI.KEYID = 6
6,052,181 UART: [ldev] SUBJECT.KEYID = 5
6,053,345 UART: [ldev] AUTHORITY.KEYID = 7
6,054,579 UART: [ldev] FE.KEYID = 1
6,097,647 UART: [ldev] Erasing FE.KEYID = 1
8,599,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,760 UART: [ldev] --
10,402,065 UART: [fwproc] Wait for Commands...
10,404,534 UART: [fwproc] Recv command 0x46574c44
10,406,660 UART: [fwproc] Recv'd Img size: 114168 bytes
11,473,278 UART: ROM Fatal Error: 0x000B000D
11,476,387 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
2,025,966 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,247,995 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
2,022,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,014 UART:
2,167,420 UART: Running Caliptra ROM ...
2,168,588 UART:
2,168,770 UART: [state] CFI Enabled
2,169,748 UART: [state] LifecycleState = Unprovisioned
2,171,395 UART: [state] DebugLocked = No
2,172,525 UART: [state] WD Timer not started. Device not locked for debugging
2,174,993 UART: [kat] SHA2-256
2,175,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,664 UART: [kat] ++
2,179,116 UART: [kat] sha1
2,179,628 UART: [kat] SHA2-256
2,180,287 UART: [kat] SHA2-384
2,180,946 UART: [kat] SHA2-512-ACC
2,181,749 UART: [kat] ECC-384
3,284,026 UART: [kat] HMAC-384Kdf
3,296,705 UART: [kat] LMS
3,826,231 UART: [kat] --
3,830,274 UART: [cold-reset] ++
3,831,558 UART: [fht] FHT @ 0x50003400
3,842,323 UART: [idev] ++
3,842,890 UART: [idev] CDI.KEYID = 6
3,843,787 UART: [idev] SUBJECT.KEYID = 7
3,844,947 UART: [idev] UDS.KEYID = 0
3,859,402 UART: [idev] Erasing UDS.KEYID = 0
6,315,790 UART: [idev] Sha1 KeyId Algorithm
6,338,806 UART: [idev] --
6,344,148 UART: [ldev] ++
6,344,713 UART: [ldev] CDI.KEYID = 6
6,345,723 UART: [ldev] SUBJECT.KEYID = 5
6,346,819 UART: [ldev] AUTHORITY.KEYID = 7
6,348,100 UART: [ldev] FE.KEYID = 1
6,358,477 UART: [ldev] Erasing FE.KEYID = 1
8,834,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,707 UART: [ldev] --
10,625,233 UART: [fwproc] Wait for Commands...
10,627,003 UART: [fwproc] Recv command 0x46574c44
10,629,052 UART: [fwproc] Recv'd Img size: 114168 bytes
11,695,657 UART: ROM Fatal Error: 0x000B000D
11,698,765 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,028,473 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,472,688 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,032,786 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,176,931 UART:
2,177,318 UART: Running Caliptra ROM ...
2,179,240 UART:
2,179,426 UART: [state] CFI Enabled
2,180,408 UART: [state] LifecycleState = Unprovisioned
2,182,069 UART: [state] DebugLocked = No
2,183,187 UART: [state] WD Timer not started. Device not locked for debugging
2,185,660 UART: [kat] SHA2-256
2,186,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,333 UART: [kat] ++
2,189,782 UART: [kat] sha1
2,190,381 UART: [kat] SHA2-256
2,191,044 UART: [kat] SHA2-384
2,191,702 UART: [kat] SHA2-512-ACC
2,192,502 UART: [kat] ECC-384
2,946,996 UART: [kat] HMAC-384Kdf
2,970,071 UART: [kat] LMS
3,499,555 UART: [kat] --
3,503,404 UART: [cold-reset] ++
3,504,588 UART: [fht] FHT @ 0x50003400
3,515,303 UART: [idev] ++
3,515,868 UART: [idev] CDI.KEYID = 6
3,516,781 UART: [idev] SUBJECT.KEYID = 7
3,517,997 UART: [idev] UDS.KEYID = 0
3,543,104 UART: [idev] Erasing UDS.KEYID = 0
6,028,249 UART: [idev] Sha1 KeyId Algorithm
6,050,827 UART: [idev] --
6,054,672 UART: [ldev] ++
6,055,243 UART: [ldev] CDI.KEYID = 6
6,056,149 UART: [ldev] SUBJECT.KEYID = 5
6,057,315 UART: [ldev] AUTHORITY.KEYID = 7
6,058,572 UART: [ldev] FE.KEYID = 1
6,098,916 UART: [ldev] Erasing FE.KEYID = 1
8,599,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,486 UART: [ldev] --
10,391,319 UART: [fwproc] Wait for Commands...
10,392,994 UART: [fwproc] Recv command 0x46574c44
10,395,039 UART: [fwproc] Recv'd Img size: 114168 bytes
11,461,911 UART: ROM Fatal Error: 0x000B000D
11,465,042 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
2,021,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,226,063 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
2,022,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,019 UART:
2,167,423 UART: Running Caliptra ROM ...
2,168,503 UART:
2,168,660 UART: [state] CFI Enabled
2,169,633 UART: [state] LifecycleState = Unprovisioned
2,171,279 UART: [state] DebugLocked = No
2,172,385 UART: [state] WD Timer not started. Device not locked for debugging
2,174,858 UART: [kat] SHA2-256
2,175,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,555 UART: [kat] ++
2,179,007 UART: [kat] sha1
2,179,574 UART: [kat] SHA2-256
2,180,324 UART: [kat] SHA2-384
2,180,990 UART: [kat] SHA2-512-ACC
2,181,789 UART: [kat] ECC-384
3,280,459 UART: [kat] HMAC-384Kdf
3,291,611 UART: [kat] LMS
3,821,116 UART: [kat] --
3,825,967 UART: [cold-reset] ++
3,827,734 UART: [fht] FHT @ 0x50003400
3,837,577 UART: [idev] ++
3,838,141 UART: [idev] CDI.KEYID = 6
3,839,022 UART: [idev] SUBJECT.KEYID = 7
3,840,238 UART: [idev] UDS.KEYID = 0
3,857,189 UART: [idev] Erasing UDS.KEYID = 0
6,315,977 UART: [idev] Sha1 KeyId Algorithm
6,338,763 UART: [idev] --
6,342,166 UART: [ldev] ++
6,342,733 UART: [ldev] CDI.KEYID = 6
6,343,656 UART: [ldev] SUBJECT.KEYID = 5
6,344,820 UART: [ldev] AUTHORITY.KEYID = 7
6,346,048 UART: [ldev] FE.KEYID = 1
6,354,970 UART: [ldev] Erasing FE.KEYID = 1
8,831,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,688 UART: [ldev] --
10,619,371 UART: [fwproc] Wait for Commands...
10,622,493 UART: [fwproc] Recv command 0x46574c44
10,624,606 UART: [fwproc] Recv'd Img size: 114168 bytes
11,693,555 UART: ROM Fatal Error: 0x000B000D
11,696,686 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
2,028,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,478,975 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
890,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,983 UART: [kat] ++
895,135 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
904,036 UART: [kat] SHA2-512-ACC
905,937 UART: [kat] ECC-384
915,536 UART: [kat] HMAC-384Kdf
920,104 UART: [kat] LMS
1,168,416 UART: [kat] --
1,169,265 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,619 UART: [idev] ++
1,172,787 UART: [idev] CDI.KEYID = 6
1,173,148 UART: [idev] SUBJECT.KEYID = 7
1,173,573 UART: [idev] UDS.KEYID = 0
1,181,279 UART: [idev] Erasing UDS.KEYID = 0
1,197,989 UART: [idev] Sha1 KeyId Algorithm
1,206,791 UART: [idev] --
1,207,830 UART: [ldev] ++
1,207,998 UART: [ldev] CDI.KEYID = 6
1,208,362 UART: [ldev] SUBJECT.KEYID = 5
1,208,789 UART: [ldev] AUTHORITY.KEYID = 7
1,209,252 UART: [ldev] FE.KEYID = 1
1,214,560 UART: [ldev] Erasing FE.KEYID = 1
1,241,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,558 UART: [fwproc] Wait for Commands...
1,281,195 UART: [fwproc] Recv command 0x46574c44
1,281,928 UART: [fwproc] Recv'd Img size: 114168 bytes
1,319,969 UART: ROM Fatal Error: 0x000B000D
1,321,128 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,174,411 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,917 UART: [kat] LMS
1,169,229 UART: [kat] --
1,170,080 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,181,968 UART: [idev] Erasing UDS.KEYID = 0
1,198,768 UART: [idev] Sha1 KeyId Algorithm
1,207,630 UART: [idev] --
1,208,713 UART: [ldev] ++
1,208,881 UART: [ldev] CDI.KEYID = 6
1,209,245 UART: [ldev] SUBJECT.KEYID = 5
1,209,672 UART: [ldev] AUTHORITY.KEYID = 7
1,210,135 UART: [ldev] FE.KEYID = 1
1,215,407 UART: [ldev] Erasing FE.KEYID = 1
1,241,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,899 UART: [ldev] --
1,281,203 UART: [fwproc] Wait for Commands...
1,281,780 UART: [fwproc] Recv command 0x46574c44
1,282,513 UART: [fwproc] Recv'd Img size: 114168 bytes
1,321,110 UART: ROM Fatal Error: 0x000B000D
1,322,269 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,175,698 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,636 UART: [kat] HMAC-384Kdf
921,230 UART: [kat] LMS
1,169,542 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,141 UART: [idev] ++
1,173,309 UART: [idev] CDI.KEYID = 6
1,173,670 UART: [idev] SUBJECT.KEYID = 7
1,174,095 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,534 UART: [ldev] Erasing FE.KEYID = 1
1,242,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,482 UART: [ldev] --
1,281,862 UART: [fwproc] Wait for Commands...
1,282,485 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 114168 bytes
1,321,557 UART: ROM Fatal Error: 0x000B000D
1,322,716 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,172,695 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,110 UART: [kat] SHA2-256
902,050 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,062 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,182,416 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,243,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,697 UART: [ldev] --
1,282,993 UART: [fwproc] Wait for Commands...
1,283,728 UART: [fwproc] Recv command 0x46574c44
1,284,461 UART: [fwproc] Recv'd Img size: 114168 bytes
1,322,122 UART: ROM Fatal Error: 0x000B000D
1,323,281 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,174,198 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,580 UART: [kat] HMAC-384Kdf
921,202 UART: [kat] LMS
1,169,514 UART: [kat] --
1,170,339 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,182,647 UART: [idev] Erasing UDS.KEYID = 0
1,199,717 UART: [idev] Sha1 KeyId Algorithm
1,208,649 UART: [idev] --
1,209,936 UART: [ldev] ++
1,210,104 UART: [ldev] CDI.KEYID = 6
1,210,468 UART: [ldev] SUBJECT.KEYID = 5
1,210,895 UART: [ldev] AUTHORITY.KEYID = 7
1,211,358 UART: [ldev] FE.KEYID = 1
1,216,524 UART: [ldev] Erasing FE.KEYID = 1
1,242,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,528 UART: [ldev] --
1,282,030 UART: [fwproc] Wait for Commands...
1,282,653 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 114168 bytes
1,321,919 UART: ROM Fatal Error: 0x000B000D
1,323,078 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,175,227 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,832 UART: [fht] FHT @ 0x50003400
1,173,500 UART: [idev] ++
1,173,668 UART: [idev] CDI.KEYID = 6
1,174,029 UART: [idev] SUBJECT.KEYID = 7
1,174,454 UART: [idev] UDS.KEYID = 0
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,207,812 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,525 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,941 UART: [ldev] --
1,281,255 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,799 UART: [fwproc] Recv'd Img size: 114168 bytes
1,320,250 UART: ROM Fatal Error: 0x000B000D
1,321,409 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,173,722 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
2,021,979 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,940 UART:
2,166,356 UART: Running Caliptra ROM ...
2,167,520 UART:
2,167,690 UART: [state] CFI Enabled
2,168,659 UART: [state] LifecycleState = Unprovisioned
2,170,287 UART: [state] DebugLocked = No
2,171,389 UART: [state] WD Timer not started. Device not locked for debugging
2,173,851 UART: [kat] SHA2-256
2,174,519 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,523 UART: [kat] ++
2,178,001 UART: [kat] sha1
2,178,527 UART: [kat] SHA2-256
2,179,186 UART: [kat] SHA2-384
2,179,887 UART: [kat] SHA2-512-ACC
2,180,693 UART: [kat] ECC-384
3,775,411 UART: [kat] HMAC-384Kdf
3,802,328 UART: [kat] LMS
4,875,476 UART: [kat] --
4,880,714 UART: [cold-reset] ++
4,883,292 UART: [fht] FHT @ 0x50003400
4,893,134 UART: [idev] ++
4,893,811 UART: [idev] CDI.KEYID = 6
4,894,976 UART: [idev] SUBJECT.KEYID = 7
4,896,188 UART: [idev] UDS.KEYID = 0
4,929,575 UART: [idev] Erasing UDS.KEYID = 0
8,241,695 UART: [idev] Sha1 KeyId Algorithm
8,262,625 UART: [idev] --
8,265,487 UART: [ldev] ++
8,266,058 UART: [ldev] CDI.KEYID = 6
8,267,297 UART: [ldev] SUBJECT.KEYID = 5
8,268,392 UART: [ldev] AUTHORITY.KEYID = 7
8,269,672 UART: [ldev] FE.KEYID = 1
8,316,304 UART: [ldev] Erasing FE.KEYID = 1
11,652,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,977,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,993,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,009,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,018 UART: [ldev] --
14,033,797 UART: [fwproc] Wait for Commands...
14,036,545 UART: [fwproc] Recv command 0x46574c44
14,038,863 UART: [fwproc] Recv'd Img size: 113844 bytes
18,105,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,180,399 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,249,165 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,564,583 >>> mbox cmd response: success
18,568,070 UART: [afmc] ++
18,568,659 UART: [afmc] CDI.KEYID = 6
18,569,842 UART: [afmc] SUBJECT.KEYID = 7
18,570,996 UART: [afmc] AUTHORITY.KEYID = 5
21,942,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,244,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,246,442 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,262,591 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,278,714 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,294,682 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,318,859 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,027,181 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,334,140 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,035,481 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,179,915 UART:
2,180,313 UART: Running Caliptra ROM ...
2,181,394 UART:
2,181,541 UART: [state] CFI Enabled
2,182,539 UART: [state] LifecycleState = Unprovisioned
2,184,176 UART: [state] DebugLocked = No
2,185,274 UART: [state] WD Timer not started. Device not locked for debugging
2,187,732 UART: [kat] SHA2-256
2,188,391 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,191,378 UART: [kat] ++
2,191,824 UART: [kat] sha1
2,192,326 UART: [kat] SHA2-256
2,193,056 UART: [kat] SHA2-384
2,193,719 UART: [kat] SHA2-512-ACC
2,194,546 UART: [kat] ECC-384
4,097,592 UART: [kat] HMAC-384Kdf
4,110,956 UART: [kat] LMS
5,184,119 UART: [kat] --
5,189,326 UART: [cold-reset] ++
5,191,699 UART: [fht] FHT @ 0x50003400
5,203,067 UART: [idev] ++
5,203,778 UART: [idev] CDI.KEYID = 6
5,204,960 UART: [idev] SUBJECT.KEYID = 7
5,206,388 UART: [idev] UDS.KEYID = 0
5,220,303 UART: [idev] Erasing UDS.KEYID = 0
8,497,175 UART: [idev] Sha1 KeyId Algorithm
8,518,449 UART: [idev] --
8,522,826 UART: [ldev] ++
8,523,390 UART: [ldev] CDI.KEYID = 6
8,524,618 UART: [ldev] SUBJECT.KEYID = 5
8,526,045 UART: [ldev] AUTHORITY.KEYID = 7
8,527,661 UART: [ldev] FE.KEYID = 1
8,539,981 UART: [ldev] Erasing FE.KEYID = 1
11,831,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,203 UART: [ldev] --
14,197,252 UART: [fwproc] Wait for Commands...
14,199,829 UART: [fwproc] Recv command 0x46574c44
14,202,078 UART: [fwproc] Recv'd Img size: 113844 bytes
18,272,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,351,749 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,420,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,737,005 >>> mbox cmd response: success
18,740,744 UART: [afmc] ++
18,741,341 UART: [afmc] CDI.KEYID = 6
18,742,523 UART: [afmc] SUBJECT.KEYID = 7
18,743,674 UART: [afmc] AUTHORITY.KEYID = 5
22,060,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,356,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,358,879 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,375,048 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,391,085 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,407,118 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,428,943 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,022,283 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,543,243 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,022,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,761 UART:
2,167,160 UART: Running Caliptra ROM ...
2,168,334 UART:
2,168,504 UART: [state] CFI Enabled
2,169,477 UART: [state] LifecycleState = Unprovisioned
2,171,127 UART: [state] DebugLocked = No
2,172,236 UART: [state] WD Timer not started. Device not locked for debugging
2,174,710 UART: [kat] SHA2-256
2,175,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,382 UART: [kat] ++
2,178,834 UART: [kat] sha1
2,179,348 UART: [kat] SHA2-256
2,180,087 UART: [kat] SHA2-384
2,180,778 UART: [kat] SHA2-512-ACC
2,181,612 UART: [kat] ECC-384
2,929,253 UART: [kat] HMAC-384Kdf
2,952,164 UART: [kat] LMS
3,481,591 UART: [kat] --
3,486,930 UART: [cold-reset] ++
3,488,056 UART: [fht] FHT @ 0x50003400
3,497,794 UART: [idev] ++
3,498,359 UART: [idev] CDI.KEYID = 6
3,499,375 UART: [idev] SUBJECT.KEYID = 7
3,500,476 UART: [idev] UDS.KEYID = 0
3,524,121 UART: [idev] Erasing UDS.KEYID = 0
6,002,802 UART: [idev] Sha1 KeyId Algorithm
6,024,802 UART: [idev] --
6,028,808 UART: [ldev] ++
6,029,381 UART: [ldev] CDI.KEYID = 6
6,030,311 UART: [ldev] SUBJECT.KEYID = 5
6,031,479 UART: [ldev] AUTHORITY.KEYID = 7
6,032,771 UART: [ldev] FE.KEYID = 1
6,077,246 UART: [ldev] Erasing FE.KEYID = 1
8,586,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,320,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,336,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,054 UART: [ldev] --
10,376,579 UART: [fwproc] Wait for Commands...
10,379,759 UART: [fwproc] Recv command 0x46574c44
10,381,807 UART: [fwproc] Recv'd Img size: 114168 bytes
13,777,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,853,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,921,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,239,387 >>> mbox cmd response: success
14,242,905 UART: [afmc] ++
14,243,503 UART: [afmc] CDI.KEYID = 6
14,244,416 UART: [afmc] SUBJECT.KEYID = 7
14,245,578 UART: [afmc] AUTHORITY.KEYID = 5
16,771,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,495,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,497,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,513,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,529,211 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,545,078 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,568,225 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,023,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,061,749 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
2,023,303 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,303 UART:
2,167,890 UART: Running Caliptra ROM ...
2,169,079 UART:
2,169,269 UART: [state] CFI Enabled
2,170,155 UART: [state] LifecycleState = Unprovisioned
2,171,798 UART: [state] DebugLocked = No
2,172,823 UART: [state] WD Timer not started. Device not locked for debugging
2,175,286 UART: [kat] SHA2-256
2,175,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,958 UART: [kat] ++
2,179,405 UART: [kat] sha1
2,179,916 UART: [kat] SHA2-256
2,180,574 UART: [kat] SHA2-384
2,181,226 UART: [kat] SHA2-512-ACC
2,182,024 UART: [kat] ECC-384
3,281,568 UART: [kat] HMAC-384Kdf
3,294,697 UART: [kat] LMS
3,824,158 UART: [kat] --
3,827,859 UART: [cold-reset] ++
3,829,961 UART: [fht] FHT @ 0x50003400
3,841,695 UART: [idev] ++
3,842,264 UART: [idev] CDI.KEYID = 6
3,843,177 UART: [idev] SUBJECT.KEYID = 7
3,844,388 UART: [idev] UDS.KEYID = 0
3,859,971 UART: [idev] Erasing UDS.KEYID = 0
6,314,937 UART: [idev] Sha1 KeyId Algorithm
6,337,220 UART: [idev] --
6,341,993 UART: [ldev] ++
6,342,567 UART: [ldev] CDI.KEYID = 6
6,343,472 UART: [ldev] SUBJECT.KEYID = 5
6,344,683 UART: [ldev] AUTHORITY.KEYID = 7
6,345,910 UART: [ldev] FE.KEYID = 1
6,355,957 UART: [ldev] Erasing FE.KEYID = 1
8,832,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,722 UART: [ldev] --
10,623,818 UART: [fwproc] Wait for Commands...
10,626,612 UART: [fwproc] Recv command 0x46574c44
10,628,700 UART: [fwproc] Recv'd Img size: 114168 bytes
14,030,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,988 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,491,610 >>> mbox cmd response: success
14,495,582 UART: [afmc] ++
14,496,166 UART: [afmc] CDI.KEYID = 6
14,497,078 UART: [afmc] SUBJECT.KEYID = 7
14,498,310 UART: [afmc] AUTHORITY.KEYID = 5
16,995,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,536 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,374 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,190 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,603 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
2,022,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,172 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,022,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,144 UART:
2,167,552 UART: Running Caliptra ROM ...
2,168,632 UART:
2,168,785 UART: [state] CFI Enabled
2,169,763 UART: [state] LifecycleState = Unprovisioned
2,171,412 UART: [state] DebugLocked = No
2,172,436 UART: [state] WD Timer not started. Device not locked for debugging
2,174,900 UART: [kat] SHA2-256
2,175,574 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,581 UART: [kat] ++
2,179,029 UART: [kat] sha1
2,179,540 UART: [kat] SHA2-256
2,180,195 UART: [kat] SHA2-384
2,180,847 UART: [kat] SHA2-512-ACC
2,181,643 UART: [kat] ECC-384
2,928,443 UART: [kat] HMAC-384Kdf
2,950,555 UART: [kat] LMS
3,480,014 UART: [kat] --
3,484,440 UART: [cold-reset] ++
3,485,721 UART: [fht] FHT @ 0x50003400
3,497,951 UART: [idev] ++
3,498,557 UART: [idev] CDI.KEYID = 6
3,499,444 UART: [idev] SUBJECT.KEYID = 7
3,500,660 UART: [idev] UDS.KEYID = 0
3,521,499 UART: [idev] Erasing UDS.KEYID = 0
6,007,576 UART: [idev] Sha1 KeyId Algorithm
6,029,787 UART: [idev] --
6,033,298 UART: [ldev] ++
6,033,873 UART: [ldev] CDI.KEYID = 6
6,034,785 UART: [ldev] SUBJECT.KEYID = 5
6,036,004 UART: [ldev] AUTHORITY.KEYID = 7
6,037,242 UART: [ldev] FE.KEYID = 1
6,078,116 UART: [ldev] Erasing FE.KEYID = 1
8,580,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,177 UART: [ldev] --
10,391,858 UART: [fwproc] Wait for Commands...
10,393,801 UART: [fwproc] Recv command 0x46574c44
10,395,895 UART: [fwproc] Recv'd Img size: 114168 bytes
13,801,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,065 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,260,329 >>> mbox cmd response: success
14,264,196 UART: [afmc] ++
14,264,779 UART: [afmc] CDI.KEYID = 6
14,265,687 UART: [afmc] SUBJECT.KEYID = 7
14,266,850 UART: [afmc] AUTHORITY.KEYID = 5
16,806,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,107 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,941 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,512 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,035,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,043,805 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,024,329 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,168,973 UART:
2,169,390 UART: Running Caliptra ROM ...
2,170,564 UART:
2,170,756 UART: [state] CFI Enabled
2,171,732 UART: [state] LifecycleState = Unprovisioned
2,173,397 UART: [state] DebugLocked = No
2,174,506 UART: [state] WD Timer not started. Device not locked for debugging
2,176,974 UART: [kat] SHA2-256
2,177,639 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,644 UART: [kat] ++
2,181,090 UART: [kat] sha1
2,181,609 UART: [kat] SHA2-256
2,182,344 UART: [kat] SHA2-384
2,183,007 UART: [kat] SHA2-512-ACC
2,183,891 UART: [kat] ECC-384
3,285,741 UART: [kat] HMAC-384Kdf
3,298,611 UART: [kat] LMS
3,828,071 UART: [kat] --
3,832,294 UART: [cold-reset] ++
3,834,172 UART: [fht] FHT @ 0x50003400
3,845,470 UART: [idev] ++
3,846,049 UART: [idev] CDI.KEYID = 6
3,846,977 UART: [idev] SUBJECT.KEYID = 7
3,848,133 UART: [idev] UDS.KEYID = 0
3,863,705 UART: [idev] Erasing UDS.KEYID = 0
6,320,206 UART: [idev] Sha1 KeyId Algorithm
6,343,762 UART: [idev] --
6,347,912 UART: [ldev] ++
6,348,481 UART: [ldev] CDI.KEYID = 6
6,349,392 UART: [ldev] SUBJECT.KEYID = 5
6,350,604 UART: [ldev] AUTHORITY.KEYID = 7
6,351,830 UART: [ldev] FE.KEYID = 1
6,359,736 UART: [ldev] Erasing FE.KEYID = 1
8,834,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,618 UART: [ldev] --
10,627,692 UART: [fwproc] Wait for Commands...
10,629,414 UART: [fwproc] Recv command 0x46574c44
10,631,456 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,498,711 >>> mbox cmd response: success
14,503,147 UART: [afmc] ++
14,503,731 UART: [afmc] CDI.KEYID = 6
14,504,645 UART: [afmc] SUBJECT.KEYID = 7
14,505,802 UART: [afmc] AUTHORITY.KEYID = 5
17,008,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,462 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,502 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,771 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
2,021,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,778 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,181,257 UART: [idev] Erasing UDS.KEYID = 0
1,198,405 UART: [idev] Sha1 KeyId Algorithm
1,207,283 UART: [idev] --
1,208,334 UART: [ldev] ++
1,208,502 UART: [ldev] CDI.KEYID = 6
1,208,866 UART: [ldev] SUBJECT.KEYID = 5
1,209,293 UART: [ldev] AUTHORITY.KEYID = 7
1,209,756 UART: [ldev] FE.KEYID = 1
1,214,772 UART: [ldev] Erasing FE.KEYID = 1
1,240,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,908 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,179 UART: [fwproc] Recv command 0x46574c44
1,281,912 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,611 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,127 >>> mbox cmd response: success
2,771,306 UART: [afmc] ++
2,771,474 UART: [afmc] CDI.KEYID = 6
2,771,837 UART: [afmc] SUBJECT.KEYID = 7
2,772,263 UART: [afmc] AUTHORITY.KEYID = 5
2,807,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,499 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,959 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,483 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,359 UART: [kat] LMS
1,168,671 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,646 UART: [idev] ++
1,172,814 UART: [idev] CDI.KEYID = 6
1,173,175 UART: [idev] SUBJECT.KEYID = 7
1,173,600 UART: [idev] UDS.KEYID = 0
1,181,714 UART: [idev] Erasing UDS.KEYID = 0
1,198,842 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,685 UART: [ldev] ++
1,208,853 UART: [ldev] CDI.KEYID = 6
1,209,217 UART: [ldev] SUBJECT.KEYID = 5
1,209,644 UART: [ldev] AUTHORITY.KEYID = 7
1,210,107 UART: [ldev] FE.KEYID = 1
1,215,477 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,639 UART: [fwproc] Wait for Commands...
1,282,294 UART: [fwproc] Recv command 0x46574c44
1,283,027 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,832 >>> mbox cmd response: success
2,773,095 UART: [afmc] ++
2,773,263 UART: [afmc] CDI.KEYID = 6
2,773,626 UART: [afmc] SUBJECT.KEYID = 7
2,774,052 UART: [afmc] AUTHORITY.KEYID = 5
2,809,409 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,724 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,204 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,098 UART: [kat] SHA2-256
891,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,165 UART: [kat] SHA2-256
902,105 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,128 UART: [kat] LMS
1,169,440 UART: [kat] --
1,170,159 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,182,057 UART: [idev] Erasing UDS.KEYID = 0
1,198,953 UART: [idev] Sha1 KeyId Algorithm
1,207,963 UART: [idev] --
1,209,062 UART: [ldev] ++
1,209,230 UART: [ldev] CDI.KEYID = 6
1,209,594 UART: [ldev] SUBJECT.KEYID = 5
1,210,021 UART: [ldev] AUTHORITY.KEYID = 7
1,210,484 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,241,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,086 UART: [ldev] --
1,280,602 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46574c44
1,281,960 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,272 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,209 >>> mbox cmd response: success
2,772,376 UART: [afmc] ++
2,772,544 UART: [afmc] CDI.KEYID = 6
2,772,907 UART: [afmc] SUBJECT.KEYID = 7
2,773,333 UART: [afmc] AUTHORITY.KEYID = 5
2,808,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,829 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,558 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,160 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,015 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,399 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,074 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,156 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,179 UART: [ldev] ++
1,209,347 UART: [ldev] CDI.KEYID = 6
1,209,711 UART: [ldev] SUBJECT.KEYID = 5
1,210,138 UART: [ldev] AUTHORITY.KEYID = 7
1,210,601 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,281,995 UART: [fwproc] Wait for Commands...
1,282,614 UART: [fwproc] Recv command 0x46574c44
1,283,347 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,413 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,220 >>> mbox cmd response: success
2,773,465 UART: [afmc] ++
2,773,633 UART: [afmc] CDI.KEYID = 6
2,773,996 UART: [afmc] SUBJECT.KEYID = 7
2,774,422 UART: [afmc] AUTHORITY.KEYID = 5
2,809,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,799 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,744 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,504 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
915,430 UART: [kat] HMAC-384Kdf
920,102 UART: [kat] LMS
1,168,414 UART: [kat] --
1,169,303 UART: [cold-reset] ++
1,169,857 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,182,089 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,338 UART: [ldev] ++
1,208,506 UART: [ldev] CDI.KEYID = 6
1,208,870 UART: [ldev] SUBJECT.KEYID = 5
1,209,297 UART: [ldev] AUTHORITY.KEYID = 7
1,209,760 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,526 UART: [ldev] --
1,279,850 UART: [fwproc] Wait for Commands...
1,280,575 UART: [fwproc] Recv command 0x46574c44
1,281,308 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,661 >>> mbox cmd response: success
2,771,870 UART: [afmc] ++
2,772,038 UART: [afmc] CDI.KEYID = 6
2,772,401 UART: [afmc] SUBJECT.KEYID = 7
2,772,827 UART: [afmc] AUTHORITY.KEYID = 5
2,808,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,499 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,228 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,830 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,571 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,179 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,182,428 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,327 UART: [ldev] ++
1,209,495 UART: [ldev] CDI.KEYID = 6
1,209,859 UART: [ldev] SUBJECT.KEYID = 5
1,210,286 UART: [ldev] AUTHORITY.KEYID = 7
1,210,749 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,255 UART: [ldev] --
1,281,665 UART: [fwproc] Wait for Commands...
1,282,298 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,618 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,078 >>> mbox cmd response: success
2,773,279 UART: [afmc] ++
2,773,447 UART: [afmc] CDI.KEYID = 6
2,773,810 UART: [afmc] SUBJECT.KEYID = 7
2,774,236 UART: [afmc] AUTHORITY.KEYID = 5
2,809,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,308 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,037 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,639 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,412 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,110 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,021,094 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,054 UART:
2,165,570 UART: Running Caliptra ROM ...
2,166,676 UART:
2,166,831 UART: [state] CFI Enabled
2,167,723 UART: [state] LifecycleState = Unprovisioned
2,169,377 UART: [state] DebugLocked = No
2,170,450 UART: [state] WD Timer not started. Device not locked for debugging
2,172,915 UART: [kat] SHA2-256
2,173,581 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,582 UART: [kat] ++
2,177,033 UART: [kat] sha1
2,177,549 UART: [kat] SHA2-256
2,178,287 UART: [kat] SHA2-384
2,178,952 UART: [kat] SHA2-512-ACC
2,179,832 UART: [kat] ECC-384
3,772,855 UART: [kat] HMAC-384Kdf
3,799,220 UART: [kat] LMS
4,872,380 UART: [kat] --
4,878,099 UART: [cold-reset] ++
4,879,604 UART: [fht] FHT @ 0x50003400
4,891,393 UART: [idev] ++
4,892,073 UART: [idev] CDI.KEYID = 6
4,893,254 UART: [idev] SUBJECT.KEYID = 7
4,894,411 UART: [idev] UDS.KEYID = 0
4,927,615 UART: [idev] Erasing UDS.KEYID = 0
8,240,195 UART: [idev] Sha1 KeyId Algorithm
8,261,209 UART: [idev] --
8,264,011 UART: [ldev] ++
8,264,583 UART: [ldev] CDI.KEYID = 6
8,265,745 UART: [ldev] SUBJECT.KEYID = 5
8,266,956 UART: [ldev] AUTHORITY.KEYID = 7
8,268,187 UART: [ldev] FE.KEYID = 1
8,314,155 UART: [ldev] Erasing FE.KEYID = 1
11,649,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,958,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,975,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,990,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,006,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,027,069 UART: [ldev] --
14,031,525 UART: [fwproc] Wait for Commands...
14,033,133 UART: [fwproc] Recv command 0x46574c44
14,035,399 UART: [fwproc] Recv'd Img size: 113844 bytes
17,566,809 UART: ROM Fatal Error: 0x000B0030
17,569,923 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,021,654 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,259,489 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,497 writing to cptra_bootfsm_go
2,025,657 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,169,797 UART:
2,170,199 UART: Running Caliptra ROM ...
2,171,366 UART:
2,171,533 UART: [state] CFI Enabled
2,172,497 UART: [state] LifecycleState = Unprovisioned
2,174,130 UART: [state] DebugLocked = No
2,175,230 UART: [state] WD Timer not started. Device not locked for debugging
2,177,695 UART: [kat] SHA2-256
2,178,356 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,350 UART: [kat] ++
2,181,817 UART: [kat] sha1
2,182,327 UART: [kat] SHA2-256
2,183,062 UART: [kat] SHA2-384
2,183,727 UART: [kat] SHA2-512-ACC
2,184,603 UART: [kat] ECC-384
4,101,150 UART: [kat] HMAC-384Kdf
4,112,069 UART: [kat] LMS
5,185,260 UART: [kat] --
5,188,956 UART: [cold-reset] ++
5,190,736 UART: [fht] FHT @ 0x50003400
5,202,250 UART: [idev] ++
5,202,926 UART: [idev] CDI.KEYID = 6
5,204,102 UART: [idev] SUBJECT.KEYID = 7
5,205,582 UART: [idev] UDS.KEYID = 0
5,221,390 UART: [idev] Erasing UDS.KEYID = 0
8,490,713 UART: [idev] Sha1 KeyId Algorithm
8,513,703 UART: [idev] --
8,516,891 UART: [ldev] ++
8,517,459 UART: [ldev] CDI.KEYID = 6
8,518,686 UART: [ldev] SUBJECT.KEYID = 5
8,520,108 UART: [ldev] AUTHORITY.KEYID = 7
8,521,713 UART: [ldev] FE.KEYID = 1
8,533,862 UART: [ldev] Erasing FE.KEYID = 1
11,828,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,159 UART: [ldev] --
14,195,519 UART: [fwproc] Wait for Commands...
14,198,423 UART: [fwproc] Recv command 0x46574c44
14,200,727 UART: [fwproc] Recv'd Img size: 113844 bytes
17,591,332 UART: ROM Fatal Error: 0x000B0030
17,594,470 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
2,020,523 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,396,385 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,025,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,865 UART:
2,170,257 UART: Running Caliptra ROM ...
2,171,433 UART:
2,171,611 UART: [state] CFI Enabled
2,172,499 UART: [state] LifecycleState = Unprovisioned
2,174,148 UART: [state] DebugLocked = No
2,175,284 UART: [state] WD Timer not started. Device not locked for debugging
2,177,762 UART: [kat] SHA2-256
2,178,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,456 UART: [kat] ++
2,181,908 UART: [kat] sha1
2,182,419 UART: [kat] SHA2-256
2,183,162 UART: [kat] SHA2-384
2,183,828 UART: [kat] SHA2-512-ACC
2,184,712 UART: [kat] ECC-384
2,943,517 UART: [kat] HMAC-384Kdf
2,966,398 UART: [kat] LMS
3,495,880 UART: [kat] --
3,500,647 UART: [cold-reset] ++
3,501,668 UART: [fht] FHT @ 0x50003400
3,513,199 UART: [idev] ++
3,513,799 UART: [idev] CDI.KEYID = 6
3,514,708 UART: [idev] SUBJECT.KEYID = 7
3,515,876 UART: [idev] UDS.KEYID = 0
3,538,129 UART: [idev] Erasing UDS.KEYID = 0
6,021,041 UART: [idev] Sha1 KeyId Algorithm
6,043,202 UART: [idev] --
6,047,852 UART: [ldev] ++
6,048,428 UART: [ldev] CDI.KEYID = 6
6,049,312 UART: [ldev] SUBJECT.KEYID = 5
6,050,428 UART: [ldev] AUTHORITY.KEYID = 7
6,051,638 UART: [ldev] FE.KEYID = 1
6,094,447 UART: [ldev] Erasing FE.KEYID = 1
8,594,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,359,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,380 UART: [ldev] --
10,385,226 UART: [fwproc] Wait for Commands...
10,387,910 UART: [fwproc] Recv command 0x46574c44
10,390,015 UART: [fwproc] Recv'd Img size: 114168 bytes
12,034,633 UART: ROM Fatal Error: 0x000B0030
12,037,714 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
2,021,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,736,216 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,023,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,520 UART:
2,167,919 UART: Running Caliptra ROM ...
2,169,090 UART:
2,169,264 UART: [state] CFI Enabled
2,170,240 UART: [state] LifecycleState = Unprovisioned
2,171,889 UART: [state] DebugLocked = No
2,172,997 UART: [state] WD Timer not started. Device not locked for debugging
2,175,465 UART: [kat] SHA2-256
2,176,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,165 UART: [kat] ++
2,179,613 UART: [kat] sha1
2,180,172 UART: [kat] SHA2-256
2,180,829 UART: [kat] SHA2-384
2,181,484 UART: [kat] SHA2-512-ACC
2,182,281 UART: [kat] ECC-384
3,280,530 UART: [kat] HMAC-384Kdf
3,293,951 UART: [kat] LMS
3,823,456 UART: [kat] --
3,829,820 UART: [cold-reset] ++
3,831,531 UART: [fht] FHT @ 0x50003400
3,843,370 UART: [idev] ++
3,843,938 UART: [idev] CDI.KEYID = 6
3,844,843 UART: [idev] SUBJECT.KEYID = 7
3,846,055 UART: [idev] UDS.KEYID = 0
3,861,998 UART: [idev] Erasing UDS.KEYID = 0
6,322,447 UART: [idev] Sha1 KeyId Algorithm
6,345,349 UART: [idev] --
6,350,420 UART: [ldev] ++
6,350,983 UART: [ldev] CDI.KEYID = 6
6,351,888 UART: [ldev] SUBJECT.KEYID = 5
6,353,046 UART: [ldev] AUTHORITY.KEYID = 7
6,354,333 UART: [ldev] FE.KEYID = 1
6,363,304 UART: [ldev] Erasing FE.KEYID = 1
8,838,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,797 UART: [ldev] --
10,624,817 UART: [fwproc] Wait for Commands...
10,627,145 UART: [fwproc] Recv command 0x46574c44
10,629,240 UART: [fwproc] Recv'd Img size: 114168 bytes
12,288,180 UART: ROM Fatal Error: 0x000B0030
12,291,307 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
2,022,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,967,480 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,025,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,760 UART:
2,170,199 UART: Running Caliptra ROM ...
2,171,316 UART:
2,171,475 UART: [state] CFI Enabled
2,172,466 UART: [state] LifecycleState = Unprovisioned
2,174,119 UART: [state] DebugLocked = No
2,175,152 UART: [state] WD Timer not started. Device not locked for debugging
2,177,615 UART: [kat] SHA2-256
2,178,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,287 UART: [kat] ++
2,181,736 UART: [kat] sha1
2,182,244 UART: [kat] SHA2-256
2,182,900 UART: [kat] SHA2-384
2,183,558 UART: [kat] SHA2-512-ACC
2,184,358 UART: [kat] ECC-384
2,944,057 UART: [kat] HMAC-384Kdf
2,970,655 UART: [kat] LMS
3,500,067 UART: [kat] --
3,501,648 UART: [cold-reset] ++
3,503,715 UART: [fht] FHT @ 0x50003400
3,515,287 UART: [idev] ++
3,515,852 UART: [idev] CDI.KEYID = 6
3,516,731 UART: [idev] SUBJECT.KEYID = 7
3,517,946 UART: [idev] UDS.KEYID = 0
3,541,458 UART: [idev] Erasing UDS.KEYID = 0
6,021,893 UART: [idev] Sha1 KeyId Algorithm
6,045,435 UART: [idev] --
6,049,383 UART: [ldev] ++
6,049,970 UART: [ldev] CDI.KEYID = 6
6,050,850 UART: [ldev] SUBJECT.KEYID = 5
6,052,068 UART: [ldev] AUTHORITY.KEYID = 7
6,053,309 UART: [ldev] FE.KEYID = 1
6,097,522 UART: [ldev] Erasing FE.KEYID = 1
8,598,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,672 UART: [ldev] --
10,390,936 UART: [fwproc] Wait for Commands...
10,393,625 UART: [fwproc] Recv command 0x46574c44
10,395,665 UART: [fwproc] Recv'd Img size: 114168 bytes
12,038,768 UART: ROM Fatal Error: 0x000B0030
12,041,875 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,021,786 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,768,509 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,023,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,956 UART:
2,168,343 UART: Running Caliptra ROM ...
2,169,508 UART:
2,169,683 UART: [state] CFI Enabled
2,170,660 UART: [state] LifecycleState = Unprovisioned
2,172,297 UART: [state] DebugLocked = No
2,173,404 UART: [state] WD Timer not started. Device not locked for debugging
2,175,867 UART: [kat] SHA2-256
2,176,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,534 UART: [kat] ++
2,179,983 UART: [kat] sha1
2,180,575 UART: [kat] SHA2-256
2,181,240 UART: [kat] SHA2-384
2,181,919 UART: [kat] SHA2-512-ACC
2,182,798 UART: [kat] ECC-384
3,286,125 UART: [kat] HMAC-384Kdf
3,298,139 UART: [kat] LMS
3,827,591 UART: [kat] --
3,830,229 UART: [cold-reset] ++
3,831,993 UART: [fht] FHT @ 0x50003400
3,842,268 UART: [idev] ++
3,842,828 UART: [idev] CDI.KEYID = 6
3,843,838 UART: [idev] SUBJECT.KEYID = 7
3,844,992 UART: [idev] UDS.KEYID = 0
3,861,292 UART: [idev] Erasing UDS.KEYID = 0
6,319,619 UART: [idev] Sha1 KeyId Algorithm
6,341,717 UART: [idev] --
6,345,600 UART: [ldev] ++
6,346,165 UART: [ldev] CDI.KEYID = 6
6,347,144 UART: [ldev] SUBJECT.KEYID = 5
6,348,303 UART: [ldev] AUTHORITY.KEYID = 7
6,349,531 UART: [ldev] FE.KEYID = 1
6,361,589 UART: [ldev] Erasing FE.KEYID = 1
8,837,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,498 UART: [ldev] --
10,628,902 UART: [fwproc] Wait for Commands...
10,631,644 UART: [fwproc] Recv command 0x46574c44
10,633,735 UART: [fwproc] Recv'd Img size: 114168 bytes
12,271,616 UART: ROM Fatal Error: 0x000B0030
12,274,743 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
2,023,417 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,955,576 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
85,993 UART: [state] WD Timer not started. Device not locked for debugging
87,248 UART: [kat] SHA2-256
890,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,927 UART: [kat] ++
895,079 UART: [kat] sha1
899,225 UART: [kat] SHA2-256
901,165 UART: [kat] SHA2-384
903,892 UART: [kat] SHA2-512-ACC
905,793 UART: [kat] ECC-384
915,472 UART: [kat] HMAC-384Kdf
920,112 UART: [kat] LMS
1,168,424 UART: [kat] --
1,169,295 UART: [cold-reset] ++
1,169,709 UART: [fht] FHT @ 0x50003400
1,172,351 UART: [idev] ++
1,172,519 UART: [idev] CDI.KEYID = 6
1,172,880 UART: [idev] SUBJECT.KEYID = 7
1,173,305 UART: [idev] UDS.KEYID = 0
1,181,321 UART: [idev] Erasing UDS.KEYID = 0
1,198,539 UART: [idev] Sha1 KeyId Algorithm
1,207,591 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,154 UART: [ldev] Erasing FE.KEYID = 1
1,241,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,200 UART: [ldev] --
1,280,698 UART: [fwproc] Wait for Commands...
1,281,429 UART: [fwproc] Recv command 0x46574c44
1,282,162 UART: [fwproc] Recv'd Img size: 114168 bytes
1,592,671 UART: ROM Fatal Error: 0x000B0030
1,593,828 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,446,628 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
891,093 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,925 UART: [kat] LMS
1,169,237 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,408 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,182,226 UART: [idev] Erasing UDS.KEYID = 0
1,198,928 UART: [idev] Sha1 KeyId Algorithm
1,207,884 UART: [idev] --
1,208,783 UART: [ldev] ++
1,208,951 UART: [ldev] CDI.KEYID = 6
1,209,315 UART: [ldev] SUBJECT.KEYID = 5
1,209,742 UART: [ldev] AUTHORITY.KEYID = 7
1,210,205 UART: [ldev] FE.KEYID = 1
1,215,267 UART: [ldev] Erasing FE.KEYID = 1
1,241,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,505 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,564 UART: [fwproc] Recv command 0x46574c44
1,282,297 UART: [fwproc] Recv'd Img size: 114168 bytes
1,588,188 UART: ROM Fatal Error: 0x000B0030
1,589,345 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,444,161 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,261 UART: [kat] ++
895,413 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
915,630 UART: [kat] HMAC-384Kdf
920,062 UART: [kat] LMS
1,168,374 UART: [kat] --
1,169,369 UART: [cold-reset] ++
1,169,797 UART: [fht] FHT @ 0x50003400
1,172,423 UART: [idev] ++
1,172,591 UART: [idev] CDI.KEYID = 6
1,172,952 UART: [idev] SUBJECT.KEYID = 7
1,173,377 UART: [idev] UDS.KEYID = 0
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,198,549 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,214,868 UART: [ldev] Erasing FE.KEYID = 1
1,241,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,774 UART: [ldev] --
1,280,276 UART: [fwproc] Wait for Commands...
1,281,087 UART: [fwproc] Recv command 0x46574c44
1,281,820 UART: [fwproc] Recv'd Img size: 114168 bytes
1,592,791 UART: ROM Fatal Error: 0x000B0030
1,593,948 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,441,655 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,181,578 UART: [idev] Erasing UDS.KEYID = 0
1,198,302 UART: [idev] Sha1 KeyId Algorithm
1,207,016 UART: [idev] --
1,208,133 UART: [ldev] ++
1,208,301 UART: [ldev] CDI.KEYID = 6
1,208,665 UART: [ldev] SUBJECT.KEYID = 5
1,209,092 UART: [ldev] AUTHORITY.KEYID = 7
1,209,555 UART: [ldev] FE.KEYID = 1
1,214,853 UART: [ldev] Erasing FE.KEYID = 1
1,241,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,621 UART: [fwproc] Wait for Commands...
1,282,286 UART: [fwproc] Recv command 0x46574c44
1,283,019 UART: [fwproc] Recv'd Img size: 114168 bytes
1,581,477 UART: ROM Fatal Error: 0x000B0030
1,582,634 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,444,419 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,405 UART: [kat] SHA2-256
901,345 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,542 UART: [kat] HMAC-384Kdf
920,130 UART: [kat] LMS
1,168,442 UART: [kat] --
1,169,501 UART: [cold-reset] ++
1,170,037 UART: [fht] FHT @ 0x50003400
1,172,553 UART: [idev] ++
1,172,721 UART: [idev] CDI.KEYID = 6
1,173,082 UART: [idev] SUBJECT.KEYID = 7
1,173,507 UART: [idev] UDS.KEYID = 0
1,181,387 UART: [idev] Erasing UDS.KEYID = 0
1,197,955 UART: [idev] Sha1 KeyId Algorithm
1,206,893 UART: [idev] --
1,207,832 UART: [ldev] ++
1,208,000 UART: [ldev] CDI.KEYID = 6
1,208,364 UART: [ldev] SUBJECT.KEYID = 5
1,208,791 UART: [ldev] AUTHORITY.KEYID = 7
1,209,254 UART: [ldev] FE.KEYID = 1
1,214,462 UART: [ldev] Erasing FE.KEYID = 1
1,240,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,698 UART: [ldev] --
1,280,204 UART: [fwproc] Wait for Commands...
1,280,833 UART: [fwproc] Recv command 0x46574c44
1,281,566 UART: [fwproc] Recv'd Img size: 114168 bytes
1,596,893 UART: ROM Fatal Error: 0x000B0030
1,598,050 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,448,634 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,833 UART: [kat] SHA2-256
891,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,194 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,182,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,002 UART: [idev] Sha1 KeyId Algorithm
1,207,872 UART: [idev] --
1,208,813 UART: [ldev] ++
1,208,981 UART: [ldev] CDI.KEYID = 6
1,209,345 UART: [ldev] SUBJECT.KEYID = 5
1,209,772 UART: [ldev] AUTHORITY.KEYID = 7
1,210,235 UART: [ldev] FE.KEYID = 1
1,215,283 UART: [ldev] Erasing FE.KEYID = 1
1,241,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,409 UART: [ldev] --
1,280,801 UART: [fwproc] Wait for Commands...
1,281,556 UART: [fwproc] Recv command 0x46574c44
1,282,289 UART: [fwproc] Recv'd Img size: 114168 bytes
1,597,376 UART: ROM Fatal Error: 0x000B0030
1,598,533 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,448,558 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
5,596 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,132 UART:
192,531 UART: Running Caliptra ROM ...
193,713 UART:
193,869 UART: [state] CFI Enabled
265,816 UART: [state] LifecycleState = Unprovisioned
268,179 UART: [state] DebugLocked = No
270,480 UART: [state] WD Timer not started. Device not locked for debugging
275,157 UART: [kat] SHA2-256
457,074 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,595 UART: [kat] ++
469,131 UART: [kat] sha1
480,068 UART: [kat] SHA2-256
483,087 UART: [kat] SHA2-384
487,991 UART: [kat] SHA2-512-ACC
490,610 UART: [kat] ECC-384
3,777,543 UART: [kat] HMAC-384Kdf
3,803,323 UART: [kat] LMS
4,876,511 UART: [kat] --
4,880,208 UART: [cold-reset] ++
4,882,691 UART: [fht] FHT @ 0x50003400
4,894,543 UART: [idev] ++
4,895,225 UART: [idev] CDI.KEYID = 6
4,896,462 UART: [idev] SUBJECT.KEYID = 7
4,897,569 UART: [idev] UDS.KEYID = 0
4,929,567 UART: [idev] Erasing UDS.KEYID = 0
8,241,324 UART: [idev] Sha1 KeyId Algorithm
8,263,616 UART: [idev] --
8,267,350 UART: [ldev] ++
8,267,916 UART: [ldev] CDI.KEYID = 6
8,269,080 UART: [ldev] SUBJECT.KEYID = 5
8,270,301 UART: [ldev] AUTHORITY.KEYID = 7
8,271,451 UART: [ldev] FE.KEYID = 1
8,317,272 UART: [ldev] Erasing FE.KEYID = 1
11,654,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,350 UART: [ldev] --
14,038,566 UART: [fwproc] Wait for Commands...
14,040,500 UART: [fwproc] Recv command 0x46574c44
14,042,824 UART: [fwproc] Recv'd Img size: 113844 bytes
14,097,553 UART: ROM Fatal Error: 0x000B0001
14,100,930 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
6,038 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,884,598 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
6,432 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,450 UART:
192,835 UART: Running Caliptra ROM ...
193,960 UART:
603,744 UART: [state] CFI Enabled
616,886 UART: [state] LifecycleState = Unprovisioned
619,224 UART: [state] DebugLocked = No
620,753 UART: [state] WD Timer not started. Device not locked for debugging
625,230 UART: [kat] SHA2-256
807,212 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,768 UART: [kat] ++
819,272 UART: [kat] sha1
830,695 UART: [kat] SHA2-256
833,702 UART: [kat] SHA2-384
838,330 UART: [kat] SHA2-512-ACC
840,945 UART: [kat] ECC-384
4,096,672 UART: [kat] HMAC-384Kdf
4,107,614 UART: [kat] LMS
5,180,766 UART: [kat] --
5,186,899 UART: [cold-reset] ++
5,188,517 UART: [fht] FHT @ 0x50003400
5,200,473 UART: [idev] ++
5,201,197 UART: [idev] CDI.KEYID = 6
5,202,378 UART: [idev] SUBJECT.KEYID = 7
5,203,755 UART: [idev] UDS.KEYID = 0
5,222,028 UART: [idev] Erasing UDS.KEYID = 0
8,495,698 UART: [idev] Sha1 KeyId Algorithm
8,518,004 UART: [idev] --
8,522,951 UART: [ldev] ++
8,523,579 UART: [ldev] CDI.KEYID = 6
8,524,683 UART: [ldev] SUBJECT.KEYID = 5
8,526,228 UART: [ldev] AUTHORITY.KEYID = 7
8,527,788 UART: [ldev] FE.KEYID = 1
8,541,240 UART: [ldev] Erasing FE.KEYID = 1
11,830,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,300 UART: [ldev] --
14,196,405 UART: [fwproc] Wait for Commands...
14,198,774 UART: [fwproc] Recv command 0x46574c44
14,201,039 UART: [fwproc] Recv'd Img size: 113844 bytes
14,255,249 UART: ROM Fatal Error: 0x000B0001
14,258,630 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
6,312 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,078,668 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
5,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,319 UART:
192,702 UART: Running Caliptra ROM ...
193,800 UART:
193,944 UART: [state] CFI Enabled
266,588 UART: [state] LifecycleState = Unprovisioned
268,451 UART: [state] DebugLocked = No
270,830 UART: [state] WD Timer not started. Device not locked for debugging
274,607 UART: [kat] SHA2-256
453,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,313 UART: [kat] ++
465,765 UART: [kat] sha1
476,316 UART: [kat] SHA2-256
479,337 UART: [kat] SHA2-384
484,704 UART: [kat] SHA2-512-ACC
487,644 UART: [kat] ECC-384
2,947,169 UART: [kat] HMAC-384Kdf
2,971,313 UART: [kat] LMS
3,500,751 UART: [kat] --
3,505,120 UART: [cold-reset] ++
3,506,353 UART: [fht] FHT @ 0x50003400
3,516,150 UART: [idev] ++
3,516,720 UART: [idev] CDI.KEYID = 6
3,517,772 UART: [idev] SUBJECT.KEYID = 7
3,518,894 UART: [idev] UDS.KEYID = 0
3,544,243 UART: [idev] Erasing UDS.KEYID = 0
6,027,074 UART: [idev] Sha1 KeyId Algorithm
6,048,478 UART: [idev] --
6,052,965 UART: [ldev] ++
6,053,538 UART: [ldev] CDI.KEYID = 6
6,054,449 UART: [ldev] SUBJECT.KEYID = 5
6,055,669 UART: [ldev] AUTHORITY.KEYID = 7
6,056,904 UART: [ldev] FE.KEYID = 1
6,099,366 UART: [ldev] Erasing FE.KEYID = 1
8,603,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,408 UART: [ldev] --
10,412,467 UART: [fwproc] Wait for Commands...
10,414,641 UART: [fwproc] Recv command 0x46574c44
10,416,690 UART: [fwproc] Recv'd Img size: 114168 bytes
10,474,718 UART: ROM Fatal Error: 0x000B0001
10,477,819 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
5,304 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,279,021 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
6,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,634 UART:
193,016 UART: Running Caliptra ROM ...
194,217 UART:
603,539 UART: [state] CFI Enabled
617,634 UART: [state] LifecycleState = Unprovisioned
619,459 UART: [state] DebugLocked = No
622,158 UART: [state] WD Timer not started. Device not locked for debugging
626,695 UART: [kat] SHA2-256
805,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,346 UART: [kat] ++
817,794 UART: [kat] sha1
829,424 UART: [kat] SHA2-256
832,433 UART: [kat] SHA2-384
839,490 UART: [kat] SHA2-512-ACC
842,471 UART: [kat] ECC-384
3,285,910 UART: [kat] HMAC-384Kdf
3,299,491 UART: [kat] LMS
3,828,963 UART: [kat] --
3,833,286 UART: [cold-reset] ++
3,834,733 UART: [fht] FHT @ 0x50003400
3,844,469 UART: [idev] ++
3,845,032 UART: [idev] CDI.KEYID = 6
3,845,943 UART: [idev] SUBJECT.KEYID = 7
3,847,153 UART: [idev] UDS.KEYID = 0
3,859,507 UART: [idev] Erasing UDS.KEYID = 0
6,317,002 UART: [idev] Sha1 KeyId Algorithm
6,339,783 UART: [idev] --
6,344,696 UART: [ldev] ++
6,345,269 UART: [ldev] CDI.KEYID = 6
6,346,178 UART: [ldev] SUBJECT.KEYID = 5
6,347,391 UART: [ldev] AUTHORITY.KEYID = 7
6,348,622 UART: [ldev] FE.KEYID = 1
6,358,730 UART: [ldev] Erasing FE.KEYID = 1
8,834,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,010 UART: [ldev] --
10,624,257 UART: [fwproc] Wait for Commands...
10,626,887 UART: [fwproc] Recv command 0x46574c44
10,629,010 UART: [fwproc] Recv'd Img size: 114168 bytes
10,685,716 UART: ROM Fatal Error: 0x000B0001
10,688,822 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
6,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,455,502 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
5,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,106 UART:
192,498 UART: Running Caliptra ROM ...
193,630 UART:
193,776 UART: [state] CFI Enabled
265,337 UART: [state] LifecycleState = Unprovisioned
267,285 UART: [state] DebugLocked = No
268,775 UART: [state] WD Timer not started. Device not locked for debugging
272,614 UART: [kat] SHA2-256
451,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,322 UART: [kat] ++
463,859 UART: [kat] sha1
473,930 UART: [kat] SHA2-256
476,938 UART: [kat] SHA2-384
482,613 UART: [kat] SHA2-512-ACC
485,552 UART: [kat] ECC-384
2,949,055 UART: [kat] HMAC-384Kdf
2,974,430 UART: [kat] LMS
3,503,843 UART: [kat] --
3,507,451 UART: [cold-reset] ++
3,510,026 UART: [fht] FHT @ 0x50003400
3,520,842 UART: [idev] ++
3,521,406 UART: [idev] CDI.KEYID = 6
3,522,467 UART: [idev] SUBJECT.KEYID = 7
3,523,575 UART: [idev] UDS.KEYID = 0
3,546,680 UART: [idev] Erasing UDS.KEYID = 0
6,026,346 UART: [idev] Sha1 KeyId Algorithm
6,049,472 UART: [idev] --
6,053,140 UART: [ldev] ++
6,053,717 UART: [ldev] CDI.KEYID = 6
6,054,648 UART: [ldev] SUBJECT.KEYID = 5
6,055,815 UART: [ldev] AUTHORITY.KEYID = 7
6,057,118 UART: [ldev] FE.KEYID = 1
6,102,729 UART: [ldev] Erasing FE.KEYID = 1
8,600,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,586 UART: [ldev] --
10,396,418 UART: [fwproc] Wait for Commands...
10,398,089 UART: [fwproc] Recv command 0x46574c44
10,400,140 UART: [fwproc] Recv'd Img size: 114168 bytes
10,455,980 UART: ROM Fatal Error: 0x000B0001
10,459,080 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
5,209 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,272,250 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
6,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,556 UART:
192,960 UART: Running Caliptra ROM ...
194,151 UART:
603,753 UART: [state] CFI Enabled
618,234 UART: [state] LifecycleState = Unprovisioned
620,064 UART: [state] DebugLocked = No
623,000 UART: [state] WD Timer not started. Device not locked for debugging
627,622 UART: [kat] SHA2-256
806,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,317 UART: [kat] ++
818,763 UART: [kat] sha1
830,450 UART: [kat] SHA2-256
833,453 UART: [kat] SHA2-384
838,728 UART: [kat] SHA2-512-ACC
841,660 UART: [kat] ECC-384
3,282,934 UART: [kat] HMAC-384Kdf
3,294,877 UART: [kat] LMS
3,824,377 UART: [kat] --
3,827,843 UART: [cold-reset] ++
3,829,015 UART: [fht] FHT @ 0x50003400
3,840,673 UART: [idev] ++
3,841,242 UART: [idev] CDI.KEYID = 6
3,842,178 UART: [idev] SUBJECT.KEYID = 7
3,843,389 UART: [idev] UDS.KEYID = 0
3,861,768 UART: [idev] Erasing UDS.KEYID = 0
6,319,271 UART: [idev] Sha1 KeyId Algorithm
6,341,737 UART: [idev] --
6,344,591 UART: [ldev] ++
6,345,154 UART: [ldev] CDI.KEYID = 6
6,346,032 UART: [ldev] SUBJECT.KEYID = 5
6,347,168 UART: [ldev] AUTHORITY.KEYID = 7
6,348,498 UART: [ldev] FE.KEYID = 1
6,357,545 UART: [ldev] Erasing FE.KEYID = 1
8,827,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,866 UART: [ldev] --
10,620,265 UART: [fwproc] Wait for Commands...
10,621,916 UART: [fwproc] Recv command 0x46574c44
10,623,977 UART: [fwproc] Recv'd Img size: 114168 bytes
10,678,136 UART: ROM Fatal Error: 0x000B0001
10,681,240 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,911 writing to cptra_bootfsm_go
7,868 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,470,029 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,170,337 UART: [cold-reset] ++
1,170,887 UART: [fht] FHT @ 0x50003400
1,173,541 UART: [idev] ++
1,173,709 UART: [idev] CDI.KEYID = 6
1,174,070 UART: [idev] SUBJECT.KEYID = 7
1,174,495 UART: [idev] UDS.KEYID = 0
1,182,535 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,207,905 UART: [idev] --
1,208,848 UART: [ldev] ++
1,209,016 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,807 UART: [ldev] AUTHORITY.KEYID = 7
1,210,270 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,954 UART: [fwproc] Wait for Commands...
1,281,771 UART: [fwproc] Recv command 0x46574c44
1,282,504 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,845 UART: ROM Fatal Error: 0x000B0001
1,303,002 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,154,779 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,863 UART: [state] LifecycleState = Unprovisioned
86,518 UART: [state] DebugLocked = No
87,218 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,106 UART: [kat] ++
896,258 UART: [kat] sha1
900,526 UART: [kat] SHA2-256
902,466 UART: [kat] SHA2-384
905,173 UART: [kat] SHA2-512-ACC
907,074 UART: [kat] ECC-384
916,843 UART: [kat] HMAC-384Kdf
921,363 UART: [kat] LMS
1,169,675 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,182,266 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,694 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,313 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,352 UART: [fwproc] Recv command 0x46574c44
1,284,085 UART: [fwproc] Recv'd Img size: 114168 bytes
1,303,062 UART: ROM Fatal Error: 0x000B0001
1,304,219 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,157,228 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
891,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
915,712 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,731 UART: [idev] ++
1,172,899 UART: [idev] CDI.KEYID = 6
1,173,260 UART: [idev] SUBJECT.KEYID = 7
1,173,685 UART: [idev] UDS.KEYID = 0
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,885 UART: [idev] --
1,208,842 UART: [ldev] ++
1,209,010 UART: [ldev] CDI.KEYID = 6
1,209,374 UART: [ldev] SUBJECT.KEYID = 5
1,209,801 UART: [ldev] AUTHORITY.KEYID = 7
1,210,264 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,241,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,204 UART: [ldev] --
1,280,550 UART: [fwproc] Wait for Commands...
1,281,239 UART: [fwproc] Recv command 0x46574c44
1,281,972 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,319 UART: ROM Fatal Error: 0x000B0001
1,302,476 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,154,807 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,198,838 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,805 UART: [ldev] Erasing FE.KEYID = 1
1,242,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,307 UART: [ldev] --
1,281,753 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,281 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,898 UART: ROM Fatal Error: 0x000B0001
1,304,055 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,800 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
891,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
921,170 UART: [kat] LMS
1,169,482 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,737 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,182,767 UART: [idev] Erasing UDS.KEYID = 0
1,199,233 UART: [idev] Sha1 KeyId Algorithm
1,208,137 UART: [idev] --
1,208,980 UART: [ldev] ++
1,209,148 UART: [ldev] CDI.KEYID = 6
1,209,512 UART: [ldev] SUBJECT.KEYID = 5
1,209,939 UART: [ldev] AUTHORITY.KEYID = 7
1,210,402 UART: [ldev] FE.KEYID = 1
1,215,770 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,532 UART: [ldev] --
1,280,980 UART: [fwproc] Wait for Commands...
1,281,787 UART: [fwproc] Recv command 0x46574c44
1,282,520 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,881 UART: ROM Fatal Error: 0x000B0001
1,303,038 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,154,393 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,909 UART: [state] LifecycleState = Unprovisioned
85,564 UART: [state] DebugLocked = No
86,170 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,550 UART: [kat] SHA2-256
901,490 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,181,696 UART: [idev] Erasing UDS.KEYID = 0
1,198,574 UART: [idev] Sha1 KeyId Algorithm
1,207,288 UART: [idev] --
1,208,347 UART: [ldev] ++
1,208,515 UART: [ldev] CDI.KEYID = 6
1,208,879 UART: [ldev] SUBJECT.KEYID = 5
1,209,306 UART: [ldev] AUTHORITY.KEYID = 7
1,209,769 UART: [ldev] FE.KEYID = 1
1,215,105 UART: [ldev] Erasing FE.KEYID = 1
1,241,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,919 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x46574c44
1,282,623 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,824 UART: ROM Fatal Error: 0x000B0001
1,302,981 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,864 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
5,494 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,058 UART:
192,510 UART: Running Caliptra ROM ...
193,620 UART:
193,772 UART: [state] CFI Enabled
266,046 UART: [state] LifecycleState = Unprovisioned
268,426 UART: [state] DebugLocked = No
270,996 UART: [state] WD Timer not started. Device not locked for debugging
275,182 UART: [kat] SHA2-256
457,120 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,651 UART: [kat] ++
469,240 UART: [kat] sha1
479,634 UART: [kat] SHA2-256
482,649 UART: [kat] SHA2-384
488,237 UART: [kat] SHA2-512-ACC
490,851 UART: [kat] ECC-384
3,776,940 UART: [kat] HMAC-384Kdf
3,801,876 UART: [kat] LMS
4,875,032 UART: [kat] --
4,880,384 UART: [cold-reset] ++
4,881,999 UART: [fht] FHT @ 0x50003400
4,893,363 UART: [idev] ++
4,894,036 UART: [idev] CDI.KEYID = 6
4,895,280 UART: [idev] SUBJECT.KEYID = 7
4,896,384 UART: [idev] UDS.KEYID = 0
4,929,056 UART: [idev] Erasing UDS.KEYID = 0
8,243,427 UART: [idev] Sha1 KeyId Algorithm
8,265,410 UART: [idev] --
8,270,185 UART: [ldev] ++
8,270,757 UART: [ldev] CDI.KEYID = 6
8,271,995 UART: [ldev] SUBJECT.KEYID = 5
8,273,151 UART: [ldev] AUTHORITY.KEYID = 7
8,274,378 UART: [ldev] FE.KEYID = 1
8,308,790 UART: [ldev] Erasing FE.KEYID = 1
11,644,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,956,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,972,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,988,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,004,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,025,813 UART: [ldev] --
14,030,043 UART: [fwproc] Wait for Commands...
14,032,204 UART: [fwproc] Recv command 0x46574c44
14,034,555 UART: [fwproc] Recv'd Img size: 113844 bytes
14,088,063 UART: ROM Fatal Error: 0x000B0002
14,091,451 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
5,293 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,861,951 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
6,460 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,457 UART:
193,062 UART: Running Caliptra ROM ...
194,244 UART:
603,726 UART: [state] CFI Enabled
618,268 UART: [state] LifecycleState = Unprovisioned
620,593 UART: [state] DebugLocked = No
622,454 UART: [state] WD Timer not started. Device not locked for debugging
627,258 UART: [kat] SHA2-256
809,255 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,784 UART: [kat] ++
821,282 UART: [kat] sha1
830,968 UART: [kat] SHA2-256
833,978 UART: [kat] SHA2-384
839,810 UART: [kat] SHA2-512-ACC
842,426 UART: [kat] ECC-384
4,094,797 UART: [kat] HMAC-384Kdf
4,105,775 UART: [kat] LMS
5,178,949 UART: [kat] --
5,183,542 UART: [cold-reset] ++
5,186,291 UART: [fht] FHT @ 0x50003400
5,198,294 UART: [idev] ++
5,198,968 UART: [idev] CDI.KEYID = 6
5,200,146 UART: [idev] SUBJECT.KEYID = 7
5,201,629 UART: [idev] UDS.KEYID = 0
5,217,123 UART: [idev] Erasing UDS.KEYID = 0
8,494,726 UART: [idev] Sha1 KeyId Algorithm
8,516,387 UART: [idev] --
8,520,650 UART: [ldev] ++
8,521,216 UART: [ldev] CDI.KEYID = 6
8,522,470 UART: [ldev] SUBJECT.KEYID = 5
8,523,910 UART: [ldev] AUTHORITY.KEYID = 7
8,525,471 UART: [ldev] FE.KEYID = 1
8,538,328 UART: [ldev] Erasing FE.KEYID = 1
11,832,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,552 UART: [ldev] --
14,199,570 UART: [fwproc] Wait for Commands...
14,202,151 UART: [fwproc] Recv command 0x46574c44
14,204,467 UART: [fwproc] Recv'd Img size: 113844 bytes
14,261,864 UART: ROM Fatal Error: 0x000B0002
14,265,286 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,401 writing to cptra_bootfsm_go
7,495 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,068,501 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
5,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,284 UART:
192,656 UART: Running Caliptra ROM ...
193,841 UART:
194,022 UART: [state] CFI Enabled
267,315 UART: [state] LifecycleState = Unprovisioned
269,193 UART: [state] DebugLocked = No
272,030 UART: [state] WD Timer not started. Device not locked for debugging
275,703 UART: [kat] SHA2-256
454,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,393 UART: [kat] ++
466,922 UART: [kat] sha1
478,048 UART: [kat] SHA2-256
481,116 UART: [kat] SHA2-384
488,504 UART: [kat] SHA2-512-ACC
491,439 UART: [kat] ECC-384
2,948,450 UART: [kat] HMAC-384Kdf
2,963,664 UART: [kat] LMS
3,493,110 UART: [kat] --
3,498,423 UART: [cold-reset] ++
3,500,737 UART: [fht] FHT @ 0x50003400
3,511,608 UART: [idev] ++
3,512,190 UART: [idev] CDI.KEYID = 6
3,513,075 UART: [idev] SUBJECT.KEYID = 7
3,514,297 UART: [idev] UDS.KEYID = 0
3,534,833 UART: [idev] Erasing UDS.KEYID = 0
6,016,202 UART: [idev] Sha1 KeyId Algorithm
6,038,742 UART: [idev] --
6,042,735 UART: [ldev] ++
6,043,308 UART: [ldev] CDI.KEYID = 6
6,044,222 UART: [ldev] SUBJECT.KEYID = 5
6,045,444 UART: [ldev] AUTHORITY.KEYID = 7
6,046,679 UART: [ldev] FE.KEYID = 1
6,093,090 UART: [ldev] Erasing FE.KEYID = 1
8,601,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,547 UART: [ldev] --
10,404,906 UART: [fwproc] Wait for Commands...
10,406,790 UART: [fwproc] Recv command 0x46574c44
10,408,889 UART: [fwproc] Recv'd Img size: 114168 bytes
10,464,456 UART: ROM Fatal Error: 0x000B0002
10,467,567 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
5,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,235,775 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,911 writing to cptra_bootfsm_go
7,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
193,165 UART:
193,552 UART: Running Caliptra ROM ...
194,737 UART:
604,278 UART: [state] CFI Enabled
616,554 UART: [state] LifecycleState = Unprovisioned
618,439 UART: [state] DebugLocked = No
620,731 UART: [state] WD Timer not started. Device not locked for debugging
623,634 UART: [kat] SHA2-256
802,773 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,338 UART: [kat] ++
814,874 UART: [kat] sha1
826,189 UART: [kat] SHA2-256
829,190 UART: [kat] SHA2-384
836,024 UART: [kat] SHA2-512-ACC
838,957 UART: [kat] ECC-384
3,281,446 UART: [kat] HMAC-384Kdf
3,293,755 UART: [kat] LMS
3,823,245 UART: [kat] --
3,826,921 UART: [cold-reset] ++
3,828,695 UART: [fht] FHT @ 0x50003400
3,838,558 UART: [idev] ++
3,839,123 UART: [idev] CDI.KEYID = 6
3,840,100 UART: [idev] SUBJECT.KEYID = 7
3,841,253 UART: [idev] UDS.KEYID = 0
3,856,669 UART: [idev] Erasing UDS.KEYID = 0
6,310,935 UART: [idev] Sha1 KeyId Algorithm
6,335,241 UART: [idev] --
6,338,449 UART: [ldev] ++
6,339,020 UART: [ldev] CDI.KEYID = 6
6,339,926 UART: [ldev] SUBJECT.KEYID = 5
6,341,080 UART: [ldev] AUTHORITY.KEYID = 7
6,342,309 UART: [ldev] FE.KEYID = 1
6,352,735 UART: [ldev] Erasing FE.KEYID = 1
8,826,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,751 UART: [ldev] --
10,614,665 UART: [fwproc] Wait for Commands...
10,617,079 UART: [fwproc] Recv command 0x46574c44
10,619,181 UART: [fwproc] Recv'd Img size: 114168 bytes
10,677,826 UART: ROM Fatal Error: 0x000B0002
10,680,969 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
6,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,460,300 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
5,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,028 UART:
192,446 UART: Running Caliptra ROM ...
193,556 UART:
193,699 UART: [state] CFI Enabled
265,078 UART: [state] LifecycleState = Unprovisioned
266,958 UART: [state] DebugLocked = No
269,491 UART: [state] WD Timer not started. Device not locked for debugging
272,972 UART: [kat] SHA2-256
452,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,698 UART: [kat] ++
464,145 UART: [kat] sha1
473,991 UART: [kat] SHA2-256
476,992 UART: [kat] SHA2-384
483,382 UART: [kat] SHA2-512-ACC
486,324 UART: [kat] ECC-384
2,946,987 UART: [kat] HMAC-384Kdf
2,972,138 UART: [kat] LMS
3,501,583 UART: [kat] --
3,505,521 UART: [cold-reset] ++
3,506,425 UART: [fht] FHT @ 0x50003400
3,518,269 UART: [idev] ++
3,518,844 UART: [idev] CDI.KEYID = 6
3,519,770 UART: [idev] SUBJECT.KEYID = 7
3,520,988 UART: [idev] UDS.KEYID = 0
3,545,014 UART: [idev] Erasing UDS.KEYID = 0
6,027,624 UART: [idev] Sha1 KeyId Algorithm
6,051,232 UART: [idev] --
6,054,856 UART: [ldev] ++
6,055,442 UART: [ldev] CDI.KEYID = 6
6,056,377 UART: [ldev] SUBJECT.KEYID = 5
6,057,487 UART: [ldev] AUTHORITY.KEYID = 7
6,058,780 UART: [ldev] FE.KEYID = 1
6,099,777 UART: [ldev] Erasing FE.KEYID = 1
8,617,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,162 UART: [ldev] --
10,426,128 UART: [fwproc] Wait for Commands...
10,427,799 UART: [fwproc] Recv command 0x46574c44
10,429,896 UART: [fwproc] Recv'd Img size: 114168 bytes
10,486,911 UART: ROM Fatal Error: 0x000B0002
10,490,040 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
5,465 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,254,952 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
6,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,458 UART:
192,861 UART: Running Caliptra ROM ...
193,989 UART:
603,487 UART: [state] CFI Enabled
615,373 UART: [state] LifecycleState = Unprovisioned
617,251 UART: [state] DebugLocked = No
618,898 UART: [state] WD Timer not started. Device not locked for debugging
621,970 UART: [kat] SHA2-256
801,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,652 UART: [kat] ++
813,184 UART: [kat] sha1
823,341 UART: [kat] SHA2-256
826,387 UART: [kat] SHA2-384
832,586 UART: [kat] SHA2-512-ACC
835,533 UART: [kat] ECC-384
3,279,036 UART: [kat] HMAC-384Kdf
3,291,011 UART: [kat] LMS
3,820,536 UART: [kat] --
3,823,933 UART: [cold-reset] ++
3,824,780 UART: [fht] FHT @ 0x50003400
3,835,603 UART: [idev] ++
3,836,171 UART: [idev] CDI.KEYID = 6
3,837,188 UART: [idev] SUBJECT.KEYID = 7
3,838,289 UART: [idev] UDS.KEYID = 0
3,854,272 UART: [idev] Erasing UDS.KEYID = 0
6,310,846 UART: [idev] Sha1 KeyId Algorithm
6,333,802 UART: [idev] --
6,338,709 UART: [ldev] ++
6,339,290 UART: [ldev] CDI.KEYID = 6
6,340,202 UART: [ldev] SUBJECT.KEYID = 5
6,341,369 UART: [ldev] AUTHORITY.KEYID = 7
6,342,598 UART: [ldev] FE.KEYID = 1
6,352,866 UART: [ldev] Erasing FE.KEYID = 1
8,825,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,027 UART: [ldev] --
10,612,642 UART: [fwproc] Wait for Commands...
10,614,472 UART: [fwproc] Recv command 0x46574c44
10,616,572 UART: [fwproc] Recv'd Img size: 114168 bytes
10,669,812 UART: ROM Fatal Error: 0x000B0002
10,672,934 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
6,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,466,101 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,547 UART: [kat] ++
895,699 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,147 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,355 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,150 UART: [ldev] ++
1,208,318 UART: [ldev] CDI.KEYID = 6
1,208,682 UART: [ldev] SUBJECT.KEYID = 5
1,209,109 UART: [ldev] AUTHORITY.KEYID = 7
1,209,572 UART: [ldev] FE.KEYID = 1
1,214,750 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,206 UART: [ldev] --
1,280,602 UART: [fwproc] Wait for Commands...
1,281,315 UART: [fwproc] Recv command 0x46574c44
1,282,048 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,596 UART: ROM Fatal Error: 0x000B0002
1,302,753 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,154,954 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,263 UART: [kat] LMS
1,169,575 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,242,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,019 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,127 UART: ROM Fatal Error: 0x000B0002
1,303,284 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,123 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,441 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,769 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,933 UART: [idev] ++
1,173,101 UART: [idev] CDI.KEYID = 6
1,173,462 UART: [idev] SUBJECT.KEYID = 7
1,173,887 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,303 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,142 UART: [ldev] ++
1,208,310 UART: [ldev] CDI.KEYID = 6
1,208,674 UART: [ldev] SUBJECT.KEYID = 5
1,209,101 UART: [ldev] AUTHORITY.KEYID = 7
1,209,564 UART: [ldev] FE.KEYID = 1
1,214,474 UART: [ldev] Erasing FE.KEYID = 1
1,240,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,540 UART: [ldev] --
1,279,952 UART: [fwproc] Wait for Commands...
1,280,701 UART: [fwproc] Recv command 0x46574c44
1,281,434 UART: [fwproc] Recv'd Img size: 114168 bytes
1,300,646 UART: ROM Fatal Error: 0x000B0002
1,301,803 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,153,430 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
891,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,788 UART: [kat] ++
895,940 UART: [kat] sha1
900,258 UART: [kat] SHA2-256
902,198 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,804 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,215,977 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,775 UART: [ldev] --
1,282,183 UART: [fwproc] Wait for Commands...
1,282,824 UART: [fwproc] Recv command 0x46574c44
1,283,557 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,519 UART: ROM Fatal Error: 0x000B0002
1,303,676 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,231 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
903,982 UART: [kat] SHA2-512-ACC
905,883 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,761 UART: [idev] ++
1,172,929 UART: [idev] CDI.KEYID = 6
1,173,290 UART: [idev] SUBJECT.KEYID = 7
1,173,715 UART: [idev] UDS.KEYID = 0
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,317 UART: [idev] Sha1 KeyId Algorithm
1,207,185 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,241,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,726 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114168 bytes
1,300,956 UART: ROM Fatal Error: 0x000B0002
1,302,113 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,894 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,352 UART: [kat] ++
895,504 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,341 UART: [kat] LMS
1,168,653 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,222 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,207,970 UART: [idev] --
1,209,137 UART: [ldev] ++
1,209,305 UART: [ldev] CDI.KEYID = 6
1,209,669 UART: [ldev] SUBJECT.KEYID = 5
1,210,096 UART: [ldev] AUTHORITY.KEYID = 7
1,210,559 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,241,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,089 UART: [ldev] --
1,281,485 UART: [fwproc] Wait for Commands...
1,282,300 UART: [fwproc] Recv command 0x46574c44
1,283,033 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,057 UART: ROM Fatal Error: 0x000B0002
1,303,214 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,173 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,216,869 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,382,702 UART:
2,383,139 UART: Running Caliptra ROM ...
2,384,253 UART:
2,384,424 UART: [state] CFI Enabled
2,385,317 UART: [state] LifecycleState = Unprovisioned
2,386,979 UART: [state] DebugLocked = No
2,388,085 UART: [state] WD Timer not started. Device not locked for debugging
2,390,607 UART: [kat] SHA2-256
2,391,277 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,394,289 UART: [kat] ++
2,394,781 UART: [kat] sha1
2,395,298 UART: [kat] SHA2-256
2,396,036 UART: [kat] SHA2-384
2,396,706 UART: [kat] SHA2-512-ACC
2,397,587 UART: [kat] ECC-384
3,775,386 UART: [kat] HMAC-384Kdf
3,803,055 UART: [kat] LMS
4,876,206 UART: [kat] --
4,878,651 UART: [cold-reset] ++
4,881,456 UART: [fht] FHT @ 0x50003400
4,892,918 UART: [idev] ++
4,893,597 UART: [idev] CDI.KEYID = 6
4,894,755 UART: [idev] SUBJECT.KEYID = 7
4,895,990 UART: [idev] UDS.KEYID = 0
4,929,431 UART: [idev] Erasing UDS.KEYID = 0
8,241,354 UART: [idev] Sha1 KeyId Algorithm
8,263,701 UART: [idev] --
8,267,314 UART: [ldev] ++
8,267,941 UART: [ldev] CDI.KEYID = 6
8,269,049 UART: [ldev] SUBJECT.KEYID = 5
8,270,272 UART: [ldev] AUTHORITY.KEYID = 7
8,271,506 UART: [ldev] FE.KEYID = 1
8,316,841 UART: [ldev] Erasing FE.KEYID = 1
11,651,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,855 UART: [ldev] --
14,036,252 UART: [fwproc] Wait for Commands...
14,038,511 UART: [fwproc] Recv command 0x46574c44
14,040,774 UART: [fwproc] Recv'd Img size: 131072 bytes
18,323,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,403,104 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,463,315 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,848,755 >>> mbox cmd response: success
18,852,349 UART: [afmc] ++
18,853,058 UART: [afmc] CDI.KEYID = 6
18,854,244 UART: [afmc] SUBJECT.KEYID = 7
18,855,398 UART: [afmc] AUTHORITY.KEYID = 5
22,223,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,521,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,523,605 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,539,819 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,555,897 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,571,774 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,593,611 UART: [afmc] --
24,600,392 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,757,780 UART: [cold-reset] --
24,758,646 UART: [state] Locking Datavault
24,759,804 UART: [state] Locking PCR0, PCR1 and PCR31
24,761,338 UART: [state] Locking ICCM
24,762,252 UART: [exit] Launching FMC @ 0x40000000
24,763,673 UART:
24,763,834 UART: Running Caliptra FMC ...
24,764,925 UART:
24,765,078 UART: [fmc] Received command: 0x1000000E
25,542,162 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,213,681 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,639,187 >>> mbox cmd response: success
24,319,873 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,477,351 UART:
24,477,722 UART: Running Caliptra FMC ...
24,478,951 UART:
24,479,122 UART: [fmc] Received command: 0x1000000E
25,261,873 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
2,223,696 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,390,082 UART:
2,390,513 UART: Running Caliptra ROM ...
2,391,708 UART:
2,391,882 UART: [state] CFI Enabled
2,392,857 UART: [state] LifecycleState = Unprovisioned
2,394,518 UART: [state] DebugLocked = No
2,395,620 UART: [state] WD Timer not started. Device not locked for debugging
2,398,089 UART: [kat] SHA2-256
2,398,752 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,401,753 UART: [kat] ++
2,402,196 UART: [kat] sha1
2,402,700 UART: [kat] SHA2-256
2,403,432 UART: [kat] SHA2-384
2,404,088 UART: [kat] SHA2-512-ACC
2,404,927 UART: [kat] ECC-384
4,095,658 UART: [kat] HMAC-384Kdf
4,107,869 UART: [kat] LMS
5,181,059 UART: [kat] --
5,186,068 UART: [cold-reset] ++
5,187,845 UART: [fht] FHT @ 0x50003400
5,200,549 UART: [idev] ++
5,201,226 UART: [idev] CDI.KEYID = 6
5,202,454 UART: [idev] SUBJECT.KEYID = 7
5,203,879 UART: [idev] UDS.KEYID = 0
5,218,603 UART: [idev] Erasing UDS.KEYID = 0
8,486,403 UART: [idev] Sha1 KeyId Algorithm
8,509,037 UART: [idev] --
8,511,680 UART: [ldev] ++
8,512,246 UART: [ldev] CDI.KEYID = 6
8,513,400 UART: [ldev] SUBJECT.KEYID = 5
8,514,934 UART: [ldev] AUTHORITY.KEYID = 7
8,516,403 UART: [ldev] FE.KEYID = 1
8,526,593 UART: [ldev] Erasing FE.KEYID = 1
11,820,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,602 UART: [ldev] --
14,185,939 UART: [fwproc] Wait for Commands...
14,188,454 UART: [fwproc] Recv command 0x46574c44
14,190,760 UART: [fwproc] Recv'd Img size: 131072 bytes
18,473,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,549,638 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,609,848 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
18,994,786 >>> mbox cmd response: success
18,998,794 UART: [afmc] ++
18,999,531 UART: [afmc] CDI.KEYID = 6
19,000,670 UART: [afmc] SUBJECT.KEYID = 7
19,001,829 UART: [afmc] AUTHORITY.KEYID = 5
22,321,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,616,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,619,246 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,635,468 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,651,563 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,667,387 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,689,414 UART: [afmc] --
24,696,072 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,853,358 UART: [cold-reset] --
24,854,220 UART: [state] Locking Datavault
24,855,287 UART: [state] Locking PCR0, PCR1 and PCR31
24,856,809 UART: [state] Locking ICCM
24,857,680 UART: [exit] Launching FMC @ 0x40000000
24,859,016 UART:
24,859,161 UART: Running Caliptra FMC ...
24,860,252 UART:
24,860,422 UART: [fmc] Received command: 0x1000000E
25,637,765 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,217,514 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
18,814,271 >>> mbox cmd response: success
24,437,878 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
24,595,351 UART:
24,595,721 UART: Running Caliptra FMC ...
24,596,833 UART:
24,596,978 UART: [fmc] Received command: 0x1000000E
25,379,754 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
2,234,579 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,400,390 UART:
2,400,827 UART: Running Caliptra ROM ...
2,402,005 UART:
2,402,182 UART: [state] CFI Enabled
2,403,143 UART: [state] LifecycleState = Unprovisioned
2,404,803 UART: [state] DebugLocked = No
2,405,916 UART: [state] WD Timer not started. Device not locked for debugging
2,408,393 UART: [kat] SHA2-256
2,409,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,412,076 UART: [kat] ++
2,412,530 UART: [kat] sha1
2,413,045 UART: [kat] SHA2-256
2,413,809 UART: [kat] SHA2-384
2,414,481 UART: [kat] SHA2-512-ACC
2,415,366 UART: [kat] ECC-384
2,947,182 UART: [kat] HMAC-384Kdf
2,974,513 UART: [kat] LMS
3,503,965 UART: [kat] --
3,507,524 UART: [cold-reset] ++
3,510,108 UART: [fht] FHT @ 0x50003400
3,519,902 UART: [idev] ++
3,520,473 UART: [idev] CDI.KEYID = 6
3,521,354 UART: [idev] SUBJECT.KEYID = 7
3,522,571 UART: [idev] UDS.KEYID = 0
3,546,249 UART: [idev] Erasing UDS.KEYID = 0
6,029,943 UART: [idev] Sha1 KeyId Algorithm
6,053,752 UART: [idev] --
6,056,605 UART: [ldev] ++
6,057,212 UART: [ldev] CDI.KEYID = 6
6,058,108 UART: [ldev] SUBJECT.KEYID = 5
6,059,222 UART: [ldev] AUTHORITY.KEYID = 7
6,060,523 UART: [ldev] FE.KEYID = 1
6,104,012 UART: [ldev] Erasing FE.KEYID = 1
8,605,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,961 UART: [ldev] --
10,416,967 UART: [fwproc] Wait for Commands...
10,419,402 UART: [fwproc] Recv command 0x46574c44
10,421,504 UART: [fwproc] Recv'd Img size: 131072 bytes
14,019,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,947 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,154,311 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,538,720 >>> mbox cmd response: success
14,542,326 UART: [afmc] ++
14,542,932 UART: [afmc] CDI.KEYID = 6
14,543,841 UART: [afmc] SUBJECT.KEYID = 7
14,545,003 UART: [afmc] AUTHORITY.KEYID = 5
17,087,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,812,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,814,685 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,830,729 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,846,762 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,862,513 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,884,979 UART: [afmc] --
18,890,617 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,047,916 UART: [cold-reset] --
19,048,781 UART: [state] Locking Datavault
19,049,964 UART: [state] Locking PCR0, PCR1 and PCR31
19,051,511 UART: [state] Locking ICCM
19,052,425 UART: [exit] Launching FMC @ 0x40000000
19,053,855 UART:
19,054,022 UART: Running Caliptra FMC ...
19,055,126 UART:
19,055,289 UART: [fmc] Received command: 0x1000000E
19,832,320 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,222,718 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,340,783 >>> mbox cmd response: success
18,627,478 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,784,901 UART:
18,785,282 UART: Running Caliptra FMC ...
18,786,510 UART:
18,786,679 UART: [fmc] Received command: 0x1000000E
19,569,285 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
2,223,808 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,569 UART:
2,390,010 UART: Running Caliptra ROM ...
2,391,185 UART:
2,391,363 UART: [state] CFI Enabled
2,392,276 UART: [state] LifecycleState = Unprovisioned
2,393,934 UART: [state] DebugLocked = No
2,394,962 UART: [state] WD Timer not started. Device not locked for debugging
2,397,373 UART: [kat] SHA2-256
2,398,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,401,048 UART: [kat] ++
2,401,501 UART: [kat] sha1
2,402,096 UART: [kat] SHA2-256
2,402,765 UART: [kat] SHA2-384
2,403,606 UART: [kat] SHA2-512-ACC
2,404,492 UART: [kat] ECC-384
3,279,124 UART: [kat] HMAC-384Kdf
3,292,050 UART: [kat] LMS
3,821,514 UART: [kat] --
3,826,260 UART: [cold-reset] ++
3,827,924 UART: [fht] FHT @ 0x50003400
3,840,425 UART: [idev] ++
3,840,988 UART: [idev] CDI.KEYID = 6
3,842,001 UART: [idev] SUBJECT.KEYID = 7
3,843,117 UART: [idev] UDS.KEYID = 0
3,861,340 UART: [idev] Erasing UDS.KEYID = 0
6,320,994 UART: [idev] Sha1 KeyId Algorithm
6,343,622 UART: [idev] --
6,347,756 UART: [ldev] ++
6,348,329 UART: [ldev] CDI.KEYID = 6
6,349,236 UART: [ldev] SUBJECT.KEYID = 5
6,350,394 UART: [ldev] AUTHORITY.KEYID = 7
6,351,671 UART: [ldev] FE.KEYID = 1
6,362,369 UART: [ldev] Erasing FE.KEYID = 1
8,834,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,828 UART: [ldev] --
10,622,627 UART: [fwproc] Wait for Commands...
10,625,800 UART: [fwproc] Recv command 0x46574c44
10,627,888 UART: [fwproc] Recv'd Img size: 131072 bytes
14,233,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,302,405 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,362,736 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,747,241 >>> mbox cmd response: success
14,751,930 UART: [afmc] ++
14,752,527 UART: [afmc] CDI.KEYID = 6
14,753,437 UART: [afmc] SUBJECT.KEYID = 7
14,754,615 UART: [afmc] AUTHORITY.KEYID = 5
17,250,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,971,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,973,807 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,989,857 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,005,892 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,021,562 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,045,588 UART: [afmc] --
19,052,063 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,209,398 UART: [cold-reset] --
19,210,250 UART: [state] Locking Datavault
19,211,329 UART: [state] Locking PCR0, PCR1 and PCR31
19,212,873 UART: [state] Locking ICCM
19,213,753 UART: [exit] Launching FMC @ 0x40000000
19,215,176 UART:
19,215,329 UART: Running Caliptra FMC ...
19,216,445 UART:
19,216,600 UART: [fmc] Received command: 0x1000000E
19,993,794 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
2,215,949 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,534,540 >>> mbox cmd response: success
18,772,313 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,929,697 UART:
18,930,073 UART: Running Caliptra FMC ...
18,931,201 UART:
18,931,354 UART: [fmc] Received command: 0x1000000E
19,714,085 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
2,218,722 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,384,845 UART:
2,385,262 UART: Running Caliptra ROM ...
2,386,432 UART:
2,386,601 UART: [state] CFI Enabled
2,387,751 UART: [state] LifecycleState = Unprovisioned
2,389,449 UART: [state] DebugLocked = No
2,390,560 UART: [state] WD Timer not started. Device not locked for debugging
2,393,032 UART: [kat] SHA2-256
2,393,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,396,734 UART: [kat] ++
2,397,186 UART: [kat] sha1
2,397,699 UART: [kat] SHA2-256
2,398,440 UART: [kat] SHA2-384
2,399,104 UART: [kat] SHA2-512-ACC
2,399,938 UART: [kat] ECC-384
2,945,811 UART: [kat] HMAC-384Kdf
2,967,998 UART: [kat] LMS
3,497,471 UART: [kat] --
3,501,942 UART: [cold-reset] ++
3,503,075 UART: [fht] FHT @ 0x50003400
3,515,472 UART: [idev] ++
3,516,081 UART: [idev] CDI.KEYID = 6
3,517,001 UART: [idev] SUBJECT.KEYID = 7
3,518,115 UART: [idev] UDS.KEYID = 0
3,540,917 UART: [idev] Erasing UDS.KEYID = 0
6,024,051 UART: [idev] Sha1 KeyId Algorithm
6,047,358 UART: [idev] --
6,050,383 UART: [ldev] ++
6,050,955 UART: [ldev] CDI.KEYID = 6
6,051,838 UART: [ldev] SUBJECT.KEYID = 5
6,052,995 UART: [ldev] AUTHORITY.KEYID = 7
6,054,290 UART: [ldev] FE.KEYID = 1
6,096,507 UART: [ldev] Erasing FE.KEYID = 1
8,600,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,567 UART: [ldev] --
10,411,712 UART: [fwproc] Wait for Commands...
10,414,320 UART: [fwproc] Recv command 0x46574c44
10,416,418 UART: [fwproc] Recv'd Img size: 131072 bytes
14,014,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,232 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,151,574 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,536,064 >>> mbox cmd response: success
14,540,250 UART: [afmc] ++
14,540,841 UART: [afmc] CDI.KEYID = 6
14,541,750 UART: [afmc] SUBJECT.KEYID = 7
14,542,913 UART: [afmc] AUTHORITY.KEYID = 5
17,082,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,808,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,810,316 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,826,363 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,842,449 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,858,108 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,880,117 UART: [afmc] --
18,885,625 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,042,912 UART: [cold-reset] --
19,043,781 UART: [state] Locking Datavault
19,044,942 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,483 UART: [state] Locking ICCM
19,047,392 UART: [exit] Launching FMC @ 0x40000000
19,048,822 UART:
19,048,986 UART: Running Caliptra FMC ...
19,050,084 UART:
19,050,246 UART: [fmc] Received command: 0x1000000E
19,827,306 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,218,840 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,341,105 >>> mbox cmd response: success
18,609,081 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,766,531 UART:
18,766,905 UART: Running Caliptra FMC ...
18,768,128 UART:
18,768,302 UART: [fmc] Received command: 0x1000000E
19,550,962 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,224,293 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,939 UART:
2,390,342 UART: Running Caliptra ROM ...
2,391,512 UART:
2,391,687 UART: [state] CFI Enabled
2,392,643 UART: [state] LifecycleState = Unprovisioned
2,394,292 UART: [state] DebugLocked = No
2,395,396 UART: [state] WD Timer not started. Device not locked for debugging
2,397,870 UART: [kat] SHA2-256
2,398,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,401,576 UART: [kat] ++
2,402,098 UART: [kat] sha1
2,402,620 UART: [kat] SHA2-256
2,403,309 UART: [kat] SHA2-384
2,403,970 UART: [kat] SHA2-512-ACC
2,404,771 UART: [kat] ECC-384
3,279,605 UART: [kat] HMAC-384Kdf
3,293,169 UART: [kat] LMS
3,822,680 UART: [kat] --
3,828,187 UART: [cold-reset] ++
3,829,627 UART: [fht] FHT @ 0x50003400
3,841,211 UART: [idev] ++
3,841,771 UART: [idev] CDI.KEYID = 6
3,842,675 UART: [idev] SUBJECT.KEYID = 7
3,843,888 UART: [idev] UDS.KEYID = 0
3,860,622 UART: [idev] Erasing UDS.KEYID = 0
6,318,672 UART: [idev] Sha1 KeyId Algorithm
6,340,984 UART: [idev] --
6,345,326 UART: [ldev] ++
6,345,899 UART: [ldev] CDI.KEYID = 6
6,346,813 UART: [ldev] SUBJECT.KEYID = 5
6,347,971 UART: [ldev] AUTHORITY.KEYID = 7
6,349,257 UART: [ldev] FE.KEYID = 1
6,358,446 UART: [ldev] Erasing FE.KEYID = 1
8,836,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,937 UART: [ldev] --
10,627,795 UART: [fwproc] Wait for Commands...
10,629,677 UART: [fwproc] Recv command 0x46574c44
10,631,739 UART: [fwproc] Recv'd Img size: 131072 bytes
14,239,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,315,848 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,376,183 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,760,417 >>> mbox cmd response: success
14,765,061 UART: [afmc] ++
14,765,656 UART: [afmc] CDI.KEYID = 6
14,766,568 UART: [afmc] SUBJECT.KEYID = 7
14,767,728 UART: [afmc] AUTHORITY.KEYID = 5
17,268,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,989,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,991,569 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
19,007,617 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,023,663 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,039,327 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,061,742 UART: [afmc] --
19,067,267 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,224,564 UART: [cold-reset] --
19,225,419 UART: [state] Locking Datavault
19,226,501 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,038 UART: [state] Locking ICCM
19,228,916 UART: [exit] Launching FMC @ 0x40000000
19,230,260 UART:
19,230,406 UART: Running Caliptra FMC ...
19,231,503 UART:
19,231,656 UART: [fmc] Received command: 0x1000000E
20,008,960 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,774 writing to cptra_bootfsm_go
2,218,900 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,539,810 >>> mbox cmd response: success
18,780,022 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,937,379 UART:
18,937,754 UART: Running Caliptra FMC ...
18,938,966 UART:
18,939,137 UART: [fmc] Received command: 0x1000000E
19,721,796 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,355 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,443 UART: [idev] --
1,208,604 UART: [ldev] ++
1,208,772 UART: [ldev] CDI.KEYID = 6
1,209,136 UART: [ldev] SUBJECT.KEYID = 5
1,209,563 UART: [ldev] AUTHORITY.KEYID = 7
1,210,026 UART: [ldev] FE.KEYID = 1
1,215,270 UART: [ldev] Erasing FE.KEYID = 1
1,241,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,448 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,420 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,105 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,583 >>> mbox cmd response: success
2,991,602 UART: [afmc] ++
2,991,770 UART: [afmc] CDI.KEYID = 6
2,992,133 UART: [afmc] SUBJECT.KEYID = 7
2,992,559 UART: [afmc] AUTHORITY.KEYID = 5
3,028,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,711 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,407 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,306 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,999 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,715 UART: [afmc] --
3,071,607 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,629 UART: [cold-reset] --
3,072,201 UART: [state] Locking Datavault
3,073,446 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,050 UART: [state] Locking ICCM
3,074,688 UART: [exit] Launching FMC @ 0x40000000
3,079,985 UART:
3,080,001 UART: Running Caliptra FMC ...
3,080,409 UART:
3,080,639 UART: [fmc] Received command: 0x1000000E
3,425,693 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,339 >>> mbox cmd response: success
2,895,948 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,901,895 UART:
2,901,911 UART: Running Caliptra FMC ...
2,902,319 UART:
2,902,549 UART: [fmc] Received command: 0x1000000E
3,247,603 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,574 UART: [fht] FHT @ 0x50003400
1,173,144 UART: [idev] ++
1,173,312 UART: [idev] CDI.KEYID = 6
1,173,673 UART: [idev] SUBJECT.KEYID = 7
1,174,098 UART: [idev] UDS.KEYID = 0
1,182,196 UART: [idev] Erasing UDS.KEYID = 0
1,199,548 UART: [idev] Sha1 KeyId Algorithm
1,208,650 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,197 UART: [ldev] SUBJECT.KEYID = 5
1,210,624 UART: [ldev] AUTHORITY.KEYID = 7
1,211,087 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,607 UART: [ldev] --
1,281,945 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,415 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,941 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,626 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,192 >>> mbox cmd response: success
2,991,457 UART: [afmc] ++
2,991,625 UART: [afmc] CDI.KEYID = 6
2,991,988 UART: [afmc] SUBJECT.KEYID = 7
2,992,414 UART: [afmc] AUTHORITY.KEYID = 5
3,027,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,096 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,792 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,691 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,062,384 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,292 UART: [afmc] --
3,071,310 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,332 UART: [cold-reset] --
3,072,284 UART: [state] Locking Datavault
3,073,489 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,093 UART: [state] Locking ICCM
3,074,513 UART: [exit] Launching FMC @ 0x40000000
3,079,810 UART:
3,079,826 UART: Running Caliptra FMC ...
3,080,234 UART:
3,080,464 UART: [fmc] Received command: 0x1000000E
3,425,518 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,839,424 >>> mbox cmd response: success
2,896,109 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,190 UART:
2,902,206 UART: Running Caliptra FMC ...
2,902,614 UART:
2,902,844 UART: [fmc] Received command: 0x1000000E
3,247,898 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Unprovisioned
85,433 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,160 UART: [kat] SHA2-256
890,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,839 UART: [kat] ++
894,991 UART: [kat] sha1
899,237 UART: [kat] SHA2-256
901,177 UART: [kat] SHA2-384
903,872 UART: [kat] SHA2-512-ACC
905,773 UART: [kat] ECC-384
915,322 UART: [kat] HMAC-384Kdf
919,884 UART: [kat] LMS
1,168,196 UART: [kat] --
1,169,043 UART: [cold-reset] ++
1,169,621 UART: [fht] FHT @ 0x50003400
1,172,393 UART: [idev] ++
1,172,561 UART: [idev] CDI.KEYID = 6
1,172,922 UART: [idev] SUBJECT.KEYID = 7
1,173,347 UART: [idev] UDS.KEYID = 0
1,181,727 UART: [idev] Erasing UDS.KEYID = 0
1,198,625 UART: [idev] Sha1 KeyId Algorithm
1,207,465 UART: [idev] --
1,208,730 UART: [ldev] ++
1,208,898 UART: [ldev] CDI.KEYID = 6
1,209,262 UART: [ldev] SUBJECT.KEYID = 5
1,209,689 UART: [ldev] AUTHORITY.KEYID = 7
1,210,152 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,410 UART: [ldev] --
1,280,674 UART: [fwproc] Wait for Commands...
1,281,265 UART: [fwproc] Recv command 0x46574c44
1,281,998 UART: [fwproc] Recv'd Img size: 131072 bytes
2,770,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,270 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,955 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,579 >>> mbox cmd response: success
2,989,726 UART: [afmc] ++
2,989,894 UART: [afmc] CDI.KEYID = 6
2,990,257 UART: [afmc] SUBJECT.KEYID = 7
2,990,683 UART: [afmc] AUTHORITY.KEYID = 5
3,025,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,979 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,675 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,574 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,267 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,323 UART: [afmc] --
3,069,403 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,425 UART: [cold-reset] --
3,070,219 UART: [state] Locking Datavault
3,071,390 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,994 UART: [state] Locking ICCM
3,072,522 UART: [exit] Launching FMC @ 0x40000000
3,077,819 UART:
3,077,835 UART: Running Caliptra FMC ...
3,078,243 UART:
3,078,473 UART: [fmc] Received command: 0x1000000E
3,423,527 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,039 >>> mbox cmd response: success
2,896,610 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,902,987 UART:
2,903,003 UART: Running Caliptra FMC ...
2,903,411 UART:
2,903,641 UART: [fmc] Received command: 0x1000000E
3,248,695 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,119 UART: [kat] SHA2-512-ACC
906,020 UART: [kat] ECC-384
915,915 UART: [kat] HMAC-384Kdf
920,451 UART: [kat] LMS
1,168,763 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,181,994 UART: [idev] Erasing UDS.KEYID = 0
1,198,934 UART: [idev] Sha1 KeyId Algorithm
1,208,060 UART: [idev] --
1,209,199 UART: [ldev] ++
1,209,367 UART: [ldev] CDI.KEYID = 6
1,209,731 UART: [ldev] SUBJECT.KEYID = 5
1,210,158 UART: [ldev] AUTHORITY.KEYID = 7
1,210,621 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,349 UART: [ldev] --
1,281,757 UART: [fwproc] Wait for Commands...
1,282,414 UART: [fwproc] Recv command 0x46574c44
1,283,147 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,789 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,474 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,104 >>> mbox cmd response: success
2,991,183 UART: [afmc] ++
2,991,351 UART: [afmc] CDI.KEYID = 6
2,991,714 UART: [afmc] SUBJECT.KEYID = 7
2,992,140 UART: [afmc] AUTHORITY.KEYID = 5
3,027,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,440 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,050,136 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,056,035 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,728 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,492 UART: [afmc] --
3,070,466 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,488 UART: [cold-reset] --
3,071,124 UART: [state] Locking Datavault
3,072,367 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,971 UART: [state] Locking ICCM
3,073,537 UART: [exit] Launching FMC @ 0x40000000
3,078,834 UART:
3,078,850 UART: Running Caliptra FMC ...
3,079,258 UART:
3,079,488 UART: [fmc] Received command: 0x1000000E
3,424,542 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,841,056 >>> mbox cmd response: success
2,897,443 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,478 UART:
2,903,494 UART: Running Caliptra FMC ...
2,903,902 UART:
2,904,132 UART: [fmc] Received command: 0x1000000E
3,249,186 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,229 UART: [idev] ++
1,173,397 UART: [idev] CDI.KEYID = 6
1,173,758 UART: [idev] SUBJECT.KEYID = 7
1,174,183 UART: [idev] UDS.KEYID = 0
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,583 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,672 UART: [ldev] ++
1,209,840 UART: [ldev] CDI.KEYID = 6
1,210,204 UART: [ldev] SUBJECT.KEYID = 5
1,210,631 UART: [ldev] AUTHORITY.KEYID = 7
1,211,094 UART: [ldev] FE.KEYID = 1
1,216,358 UART: [ldev] Erasing FE.KEYID = 1
1,242,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,670 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,677 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,786 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,471 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,991,029 >>> mbox cmd response: success
2,992,228 UART: [afmc] ++
2,992,396 UART: [afmc] CDI.KEYID = 6
2,992,759 UART: [afmc] SUBJECT.KEYID = 7
2,993,185 UART: [afmc] AUTHORITY.KEYID = 5
3,028,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,045,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,815 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,511 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,410 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,063,103 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,981 UART: [afmc] --
3,071,837 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,859 UART: [cold-reset] --
3,072,713 UART: [state] Locking Datavault
3,073,848 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,452 UART: [state] Locking ICCM
3,074,926 UART: [exit] Launching FMC @ 0x40000000
3,080,223 UART:
3,080,239 UART: Running Caliptra FMC ...
3,080,647 UART:
3,080,877 UART: [fmc] Received command: 0x1000000E
3,425,931 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,838,111 >>> mbox cmd response: success
2,894,396 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,900,377 UART:
2,900,393 UART: Running Caliptra FMC ...
2,900,801 UART:
2,901,031 UART: [fmc] Received command: 0x1000000E
3,246,085 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,628 UART: [kat] SHA2-256
901,568 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,130 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,598 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,083 UART: [ldev] SUBJECT.KEYID = 5
1,210,510 UART: [ldev] AUTHORITY.KEYID = 7
1,210,973 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,242,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,843 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,913 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,598 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,991,166 >>> mbox cmd response: success
2,992,303 UART: [afmc] ++
2,992,471 UART: [afmc] CDI.KEYID = 6
2,992,834 UART: [afmc] SUBJECT.KEYID = 7
2,993,260 UART: [afmc] AUTHORITY.KEYID = 5
3,028,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,045,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,976 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,672 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,571 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,063,264 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,071,204 UART: [afmc] --
3,072,152 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,072,174 UART: [cold-reset] --
3,072,998 UART: [state] Locking Datavault
3,074,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,767 UART: [state] Locking ICCM
3,075,249 UART: [exit] Launching FMC @ 0x40000000
3,080,546 UART:
3,080,562 UART: Running Caliptra FMC ...
3,080,970 UART:
3,081,200 UART: [fmc] Received command: 0x1000000E
3,426,254 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,470 >>> mbox cmd response: success
2,897,093 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,360 UART:
2,903,376 UART: Running Caliptra FMC ...
2,903,784 UART:
2,904,014 UART: [fmc] Received command: 0x1000000E
3,249,068 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
5,642 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,120 UART:
192,515 UART: Running Caliptra ROM ...
193,703 UART:
193,884 UART: [state] CFI Enabled
268,463 UART: [state] LifecycleState = Unprovisioned
270,887 UART: [state] DebugLocked = No
272,859 UART: [state] WD Timer not started. Device not locked for debugging
276,972 UART: [kat] SHA2-256
458,926 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,397 UART: [kat] ++
470,979 UART: [kat] sha1
481,160 UART: [kat] SHA2-256
484,218 UART: [kat] SHA2-384
490,026 UART: [kat] SHA2-512-ACC
492,646 UART: [kat] ECC-384
3,777,266 UART: [kat] HMAC-384Kdf
3,803,933 UART: [kat] LMS
4,877,079 UART: [kat] --
4,880,609 UART: [cold-reset] ++
4,882,950 UART: [fht] FHT @ 0x50003400
4,894,213 UART: [idev] ++
4,894,951 UART: [idev] CDI.KEYID = 6
4,896,133 UART: [idev] SUBJECT.KEYID = 7
4,897,300 UART: [idev] UDS.KEYID = 0
4,929,889 UART: [idev] Erasing UDS.KEYID = 0
8,244,430 UART: [idev] Sha1 KeyId Algorithm
8,265,417 UART: [idev] --
8,268,118 UART: [ldev] ++
8,268,692 UART: [ldev] CDI.KEYID = 6
8,269,935 UART: [ldev] SUBJECT.KEYID = 5
8,271,046 UART: [ldev] AUTHORITY.KEYID = 7
8,272,232 UART: [ldev] FE.KEYID = 1
8,317,457 UART: [ldev] Erasing FE.KEYID = 1
11,654,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,316 UART: [ldev] --
14,037,564 UART: [fwproc] Wait for Commands...
14,039,268 UART: [fwproc] Recv command 0x46574c44
14,041,591 UART: [fwproc] Recv'd Img size: 113844 bytes
14,108,074 UART: ROM Fatal Error: 0x000B0007
14,111,448 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
5,425 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,894,049 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
6,453 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,355 UART:
192,726 UART: Running Caliptra ROM ...
193,822 UART:
603,431 UART: [state] CFI Enabled
614,095 UART: [state] LifecycleState = Unprovisioned
616,460 UART: [state] DebugLocked = No
617,965 UART: [state] WD Timer not started. Device not locked for debugging
622,444 UART: [kat] SHA2-256
804,414 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
815,975 UART: [kat] ++
816,470 UART: [kat] sha1
827,179 UART: [kat] SHA2-256
830,198 UART: [kat] SHA2-384
836,067 UART: [kat] SHA2-512-ACC
838,675 UART: [kat] ECC-384
4,094,140 UART: [kat] HMAC-384Kdf
4,105,295 UART: [kat] LMS
5,178,411 UART: [kat] --
5,183,004 UART: [cold-reset] ++
5,185,590 UART: [fht] FHT @ 0x50003400
5,196,615 UART: [idev] ++
5,197,381 UART: [idev] CDI.KEYID = 6
5,198,522 UART: [idev] SUBJECT.KEYID = 7
5,199,956 UART: [idev] UDS.KEYID = 0
5,216,202 UART: [idev] Erasing UDS.KEYID = 0
8,489,044 UART: [idev] Sha1 KeyId Algorithm
8,512,017 UART: [idev] --
8,516,228 UART: [ldev] ++
8,516,812 UART: [ldev] CDI.KEYID = 6
8,518,044 UART: [ldev] SUBJECT.KEYID = 5
8,519,467 UART: [ldev] AUTHORITY.KEYID = 7
8,521,074 UART: [ldev] FE.KEYID = 1
8,532,260 UART: [ldev] Erasing FE.KEYID = 1
11,824,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,048 UART: [ldev] --
14,190,716 UART: [fwproc] Wait for Commands...
14,192,867 UART: [fwproc] Recv command 0x46574c44
14,195,176 UART: [fwproc] Recv'd Img size: 113844 bytes
14,262,290 UART: ROM Fatal Error: 0x000B0007
14,265,700 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
6,139 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,083,489 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
5,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,177 UART:
192,565 UART: Running Caliptra ROM ...
193,752 UART:
193,907 UART: [state] CFI Enabled
260,197 UART: [state] LifecycleState = Unprovisioned
262,053 UART: [state] DebugLocked = No
264,953 UART: [state] WD Timer not started. Device not locked for debugging
268,565 UART: [kat] SHA2-256
447,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,262 UART: [kat] ++
459,796 UART: [kat] sha1
470,376 UART: [kat] SHA2-256
473,429 UART: [kat] SHA2-384
478,226 UART: [kat] SHA2-512-ACC
481,217 UART: [kat] ECC-384
2,938,087 UART: [kat] HMAC-384Kdf
2,962,788 UART: [kat] LMS
3,492,240 UART: [kat] --
3,496,039 UART: [cold-reset] ++
3,498,462 UART: [fht] FHT @ 0x50003400
3,508,324 UART: [idev] ++
3,508,937 UART: [idev] CDI.KEYID = 6
3,509,857 UART: [idev] SUBJECT.KEYID = 7
3,511,022 UART: [idev] UDS.KEYID = 0
3,535,156 UART: [idev] Erasing UDS.KEYID = 0
6,016,923 UART: [idev] Sha1 KeyId Algorithm
6,039,616 UART: [idev] --
6,043,178 UART: [ldev] ++
6,043,755 UART: [ldev] CDI.KEYID = 6
6,044,665 UART: [ldev] SUBJECT.KEYID = 5
6,045,831 UART: [ldev] AUTHORITY.KEYID = 7
6,047,064 UART: [ldev] FE.KEYID = 1
6,090,181 UART: [ldev] Erasing FE.KEYID = 1
8,594,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,931 UART: [ldev] --
10,403,800 UART: [fwproc] Wait for Commands...
10,405,901 UART: [fwproc] Recv command 0x46574c44
10,407,999 UART: [fwproc] Recv'd Img size: 114168 bytes
10,473,966 UART: ROM Fatal Error: 0x000B0007
10,477,054 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
5,453 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,302,998 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
6,581 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,500 UART:
192,883 UART: Running Caliptra ROM ...
194,015 UART:
603,801 UART: [state] CFI Enabled
614,918 UART: [state] LifecycleState = Unprovisioned
616,812 UART: [state] DebugLocked = No
618,616 UART: [state] WD Timer not started. Device not locked for debugging
622,284 UART: [kat] SHA2-256
801,418 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,995 UART: [kat] ++
813,531 UART: [kat] sha1
825,556 UART: [kat] SHA2-256
828,608 UART: [kat] SHA2-384
835,454 UART: [kat] SHA2-512-ACC
838,440 UART: [kat] ECC-384
3,280,533 UART: [kat] HMAC-384Kdf
3,293,575 UART: [kat] LMS
3,823,095 UART: [kat] --
3,827,546 UART: [cold-reset] ++
3,829,450 UART: [fht] FHT @ 0x50003400
3,840,157 UART: [idev] ++
3,840,716 UART: [idev] CDI.KEYID = 6
3,841,620 UART: [idev] SUBJECT.KEYID = 7
3,842,831 UART: [idev] UDS.KEYID = 0
3,860,002 UART: [idev] Erasing UDS.KEYID = 0
6,313,214 UART: [idev] Sha1 KeyId Algorithm
6,336,221 UART: [idev] --
6,341,513 UART: [ldev] ++
6,342,129 UART: [ldev] CDI.KEYID = 6
6,343,048 UART: [ldev] SUBJECT.KEYID = 5
6,344,213 UART: [ldev] AUTHORITY.KEYID = 7
6,345,443 UART: [ldev] FE.KEYID = 1
6,357,760 UART: [ldev] Erasing FE.KEYID = 1
8,830,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,490 UART: [ldev] --
10,618,325 UART: [fwproc] Wait for Commands...
10,620,364 UART: [fwproc] Recv command 0x46574c44
10,622,402 UART: [fwproc] Recv'd Img size: 114168 bytes
10,690,380 UART: ROM Fatal Error: 0x000B0007
10,693,518 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
6,422 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,480,169 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
6,867 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
193,027 UART:
193,420 UART: Running Caliptra ROM ...
194,537 UART:
194,679 UART: [state] CFI Enabled
259,256 UART: [state] LifecycleState = Unprovisioned
261,125 UART: [state] DebugLocked = No
263,320 UART: [state] WD Timer not started. Device not locked for debugging
266,289 UART: [kat] SHA2-256
445,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,966 UART: [kat] ++
457,498 UART: [kat] sha1
467,514 UART: [kat] SHA2-256
470,573 UART: [kat] SHA2-384
475,736 UART: [kat] SHA2-512-ACC
478,696 UART: [kat] ECC-384
2,925,736 UART: [kat] HMAC-384Kdf
2,950,295 UART: [kat] LMS
3,479,729 UART: [kat] --
3,486,373 UART: [cold-reset] ++
3,488,360 UART: [fht] FHT @ 0x50003400
3,499,392 UART: [idev] ++
3,499,965 UART: [idev] CDI.KEYID = 6
3,500,845 UART: [idev] SUBJECT.KEYID = 7
3,502,061 UART: [idev] UDS.KEYID = 0
3,520,853 UART: [idev] Erasing UDS.KEYID = 0
6,001,124 UART: [idev] Sha1 KeyId Algorithm
6,023,303 UART: [idev] --
6,027,037 UART: [ldev] ++
6,027,612 UART: [ldev] CDI.KEYID = 6
6,028,494 UART: [ldev] SUBJECT.KEYID = 5
6,029,628 UART: [ldev] AUTHORITY.KEYID = 7
6,030,925 UART: [ldev] FE.KEYID = 1
6,076,874 UART: [ldev] Erasing FE.KEYID = 1
8,578,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,000 UART: [ldev] --
10,390,674 UART: [fwproc] Wait for Commands...
10,393,312 UART: [fwproc] Recv command 0x46574c44
10,395,409 UART: [fwproc] Recv'd Img size: 114168 bytes
10,463,106 UART: ROM Fatal Error: 0x000B0007
10,466,194 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
5,682 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,270,604 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
6,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,391 UART:
192,793 UART: Running Caliptra ROM ...
194,001 UART:
603,403 UART: [state] CFI Enabled
614,603 UART: [state] LifecycleState = Unprovisioned
616,426 UART: [state] DebugLocked = No
618,343 UART: [state] WD Timer not started. Device not locked for debugging
621,813 UART: [kat] SHA2-256
800,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,478 UART: [kat] ++
813,015 UART: [kat] sha1
824,170 UART: [kat] SHA2-256
827,162 UART: [kat] SHA2-384
833,405 UART: [kat] SHA2-512-ACC
836,337 UART: [kat] ECC-384
3,278,288 UART: [kat] HMAC-384Kdf
3,289,931 UART: [kat] LMS
3,819,426 UART: [kat] --
3,826,281 UART: [cold-reset] ++
3,827,725 UART: [fht] FHT @ 0x50003400
3,839,188 UART: [idev] ++
3,839,753 UART: [idev] CDI.KEYID = 6
3,840,712 UART: [idev] SUBJECT.KEYID = 7
3,841,884 UART: [idev] UDS.KEYID = 0
3,858,519 UART: [idev] Erasing UDS.KEYID = 0
6,318,167 UART: [idev] Sha1 KeyId Algorithm
6,341,247 UART: [idev] --
6,345,701 UART: [ldev] ++
6,346,274 UART: [ldev] CDI.KEYID = 6
6,347,185 UART: [ldev] SUBJECT.KEYID = 5
6,348,343 UART: [ldev] AUTHORITY.KEYID = 7
6,349,626 UART: [ldev] FE.KEYID = 1
6,362,380 UART: [ldev] Erasing FE.KEYID = 1
8,833,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,762 UART: [ldev] --
10,623,798 UART: [fwproc] Wait for Commands...
10,626,706 UART: [fwproc] Recv command 0x46574c44
10,628,810 UART: [fwproc] Recv'd Img size: 114168 bytes
10,694,637 UART: ROM Fatal Error: 0x000B0007
10,697,735 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
6,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,470,344 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,520 UART: [state] LifecycleState = Unprovisioned
85,175 UART: [state] DebugLocked = No
85,853 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
890,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,831 UART: [kat] ++
894,983 UART: [kat] sha1
899,127 UART: [kat] SHA2-256
901,067 UART: [kat] SHA2-384
903,862 UART: [kat] SHA2-512-ACC
905,763 UART: [kat] ECC-384
915,300 UART: [kat] HMAC-384Kdf
919,848 UART: [kat] LMS
1,168,160 UART: [kat] --
1,169,255 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,293 UART: [idev] ++
1,172,461 UART: [idev] CDI.KEYID = 6
1,172,822 UART: [idev] SUBJECT.KEYID = 7
1,173,247 UART: [idev] UDS.KEYID = 0
1,181,257 UART: [idev] Erasing UDS.KEYID = 0
1,198,607 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,240,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,314 UART: [fwproc] Wait for Commands...
1,281,051 UART: [fwproc] Recv command 0x46574c44
1,281,784 UART: [fwproc] Recv'd Img size: 114168 bytes
1,305,637 UART: ROM Fatal Error: 0x000B0007
1,306,794 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,333 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,407 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,796 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,783 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,105 UART: [ldev] --
1,281,513 UART: [fwproc] Wait for Commands...
1,282,096 UART: [fwproc] Recv command 0x46574c44
1,282,829 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,918 UART: ROM Fatal Error: 0x000B0007
1,308,075 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,090 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,966 UART: [ldev] ++
1,209,134 UART: [ldev] CDI.KEYID = 6
1,209,498 UART: [ldev] SUBJECT.KEYID = 5
1,209,925 UART: [ldev] AUTHORITY.KEYID = 7
1,210,388 UART: [ldev] FE.KEYID = 1
1,216,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,116 UART: [ldev] --
1,280,484 UART: [fwproc] Wait for Commands...
1,281,205 UART: [fwproc] Recv command 0x46574c44
1,281,938 UART: [fwproc] Recv'd Img size: 114168 bytes
1,305,677 UART: ROM Fatal Error: 0x000B0007
1,306,834 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,635 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,599 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,182,444 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,807 UART: [ldev] --
1,281,095 UART: [fwproc] Wait for Commands...
1,281,694 UART: [fwproc] Recv command 0x46574c44
1,282,427 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,060 UART: ROM Fatal Error: 0x000B0007
1,307,217 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,182 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
903,840 UART: [kat] SHA2-512-ACC
905,741 UART: [kat] ECC-384
915,410 UART: [kat] HMAC-384Kdf
920,004 UART: [kat] LMS
1,168,316 UART: [kat] --
1,169,299 UART: [cold-reset] ++
1,169,733 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,198,285 UART: [idev] Sha1 KeyId Algorithm
1,207,033 UART: [idev] --
1,208,056 UART: [ldev] ++
1,208,224 UART: [ldev] CDI.KEYID = 6
1,208,588 UART: [ldev] SUBJECT.KEYID = 5
1,209,015 UART: [ldev] AUTHORITY.KEYID = 7
1,209,478 UART: [ldev] FE.KEYID = 1
1,214,796 UART: [ldev] Erasing FE.KEYID = 1
1,240,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,642 UART: [ldev] --
1,279,974 UART: [fwproc] Wait for Commands...
1,280,763 UART: [fwproc] Recv command 0x46574c44
1,281,496 UART: [fwproc] Recv'd Img size: 114168 bytes
1,305,211 UART: ROM Fatal Error: 0x000B0007
1,306,368 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,158,517 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,149 UART: [kat] LMS
1,169,461 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,160 UART: [idev] Sha1 KeyId Algorithm
1,207,854 UART: [idev] --
1,208,923 UART: [ldev] ++
1,209,091 UART: [ldev] CDI.KEYID = 6
1,209,455 UART: [ldev] SUBJECT.KEYID = 5
1,209,882 UART: [ldev] AUTHORITY.KEYID = 7
1,210,345 UART: [ldev] FE.KEYID = 1
1,215,479 UART: [ldev] Erasing FE.KEYID = 1
1,241,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,649 UART: [ldev] --
1,281,049 UART: [fwproc] Wait for Commands...
1,281,766 UART: [fwproc] Recv command 0x46574c44
1,282,499 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,384 UART: ROM Fatal Error: 0x000B0007
1,307,541 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,310 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
5,357 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,027 UART:
192,439 UART: Running Caliptra ROM ...
193,735 UART:
193,896 UART: [state] CFI Enabled
265,331 UART: [state] LifecycleState = Unprovisioned
267,769 UART: [state] DebugLocked = No
269,959 UART: [state] WD Timer not started. Device not locked for debugging
274,160 UART: [kat] SHA2-256
456,128 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,645 UART: [kat] ++
468,177 UART: [kat] sha1
478,200 UART: [kat] SHA2-256
481,213 UART: [kat] SHA2-384
487,140 UART: [kat] SHA2-512-ACC
489,762 UART: [kat] ECC-384
3,775,350 UART: [kat] HMAC-384Kdf
3,803,958 UART: [kat] LMS
4,877,126 UART: [kat] --
4,882,388 UART: [cold-reset] ++
4,883,464 UART: [fht] FHT @ 0x50003400
4,895,096 UART: [idev] ++
4,895,809 UART: [idev] CDI.KEYID = 6
4,896,999 UART: [idev] SUBJECT.KEYID = 7
4,898,102 UART: [idev] UDS.KEYID = 0
4,931,031 UART: [idev] Erasing UDS.KEYID = 0
8,243,938 UART: [idev] Sha1 KeyId Algorithm
8,266,418 UART: [idev] --
8,270,493 UART: [ldev] ++
8,271,064 UART: [ldev] CDI.KEYID = 6
8,272,240 UART: [ldev] SUBJECT.KEYID = 5
8,273,458 UART: [ldev] AUTHORITY.KEYID = 7
8,274,613 UART: [ldev] FE.KEYID = 1
8,318,925 UART: [ldev] Erasing FE.KEYID = 1
11,653,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,186 UART: [ldev] --
14,039,915 UART: [fwproc] Wait for Commands...
14,041,582 UART: [fwproc] Recv command 0x46574c44
14,043,853 UART: [fwproc] Recv'd Img size: 113844 bytes
14,112,171 UART: ROM Fatal Error: 0x000B0008
14,115,543 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
5,296 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,919,993 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
6,673 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,504 UART:
192,882 UART: Running Caliptra ROM ...
193,970 UART:
603,504 UART: [state] CFI Enabled
614,974 UART: [state] LifecycleState = Unprovisioned
617,314 UART: [state] DebugLocked = No
618,819 UART: [state] WD Timer not started. Device not locked for debugging
623,279 UART: [kat] SHA2-256
805,239 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,824 UART: [kat] ++
817,408 UART: [kat] sha1
826,669 UART: [kat] SHA2-256
829,736 UART: [kat] SHA2-384
834,248 UART: [kat] SHA2-512-ACC
836,861 UART: [kat] ECC-384
4,093,910 UART: [kat] HMAC-384Kdf
4,106,918 UART: [kat] LMS
5,180,045 UART: [kat] --
5,184,741 UART: [cold-reset] ++
5,186,035 UART: [fht] FHT @ 0x50003400
5,196,204 UART: [idev] ++
5,196,872 UART: [idev] CDI.KEYID = 6
5,198,126 UART: [idev] SUBJECT.KEYID = 7
5,199,568 UART: [idev] UDS.KEYID = 0
5,218,460 UART: [idev] Erasing UDS.KEYID = 0
8,487,363 UART: [idev] Sha1 KeyId Algorithm
8,510,374 UART: [idev] --
8,513,118 UART: [ldev] ++
8,513,678 UART: [ldev] CDI.KEYID = 6
8,514,834 UART: [ldev] SUBJECT.KEYID = 5
8,516,382 UART: [ldev] AUTHORITY.KEYID = 7
8,517,862 UART: [ldev] FE.KEYID = 1
8,527,696 UART: [ldev] Erasing FE.KEYID = 1
11,818,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,111,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,127,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,143,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,159,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,180,314 UART: [ldev] --
14,185,146 UART: [fwproc] Wait for Commands...
14,186,804 UART: [fwproc] Recv command 0x46574c44
14,189,124 UART: [fwproc] Recv'd Img size: 113844 bytes
14,257,923 UART: ROM Fatal Error: 0x000B0008
14,261,293 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
6,345 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,078,817 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
5,811 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,290 UART:
192,679 UART: Running Caliptra ROM ...
193,868 UART:
194,019 UART: [state] CFI Enabled
269,087 UART: [state] LifecycleState = Unprovisioned
270,966 UART: [state] DebugLocked = No
272,681 UART: [state] WD Timer not started. Device not locked for debugging
276,626 UART: [kat] SHA2-256
455,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,301 UART: [kat] ++
467,946 UART: [kat] sha1
478,238 UART: [kat] SHA2-256
481,253 UART: [kat] SHA2-384
487,340 UART: [kat] SHA2-512-ACC
490,295 UART: [kat] ECC-384
2,950,336 UART: [kat] HMAC-384Kdf
2,973,915 UART: [kat] LMS
3,503,338 UART: [kat] --
3,507,493 UART: [cold-reset] ++
3,508,558 UART: [fht] FHT @ 0x50003400
3,518,724 UART: [idev] ++
3,519,295 UART: [idev] CDI.KEYID = 6
3,520,221 UART: [idev] SUBJECT.KEYID = 7
3,521,387 UART: [idev] UDS.KEYID = 0
3,545,524 UART: [idev] Erasing UDS.KEYID = 0
6,026,931 UART: [idev] Sha1 KeyId Algorithm
6,049,254 UART: [idev] --
6,052,986 UART: [ldev] ++
6,053,568 UART: [ldev] CDI.KEYID = 6
6,054,481 UART: [ldev] SUBJECT.KEYID = 5
6,055,669 UART: [ldev] AUTHORITY.KEYID = 7
6,056,911 UART: [ldev] FE.KEYID = 1
6,101,442 UART: [ldev] Erasing FE.KEYID = 1
8,604,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,255 UART: [ldev] --
10,413,630 UART: [fwproc] Wait for Commands...
10,416,435 UART: [fwproc] Recv command 0x46574c44
10,418,540 UART: [fwproc] Recv'd Img size: 114168 bytes
10,489,721 UART: ROM Fatal Error: 0x000B0008
10,492,820 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
5,551 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,289,514 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
6,614 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,647 UART:
193,048 UART: Running Caliptra ROM ...
194,239 UART:
603,903 UART: [state] CFI Enabled
617,942 UART: [state] LifecycleState = Unprovisioned
619,773 UART: [state] DebugLocked = No
621,793 UART: [state] WD Timer not started. Device not locked for debugging
626,165 UART: [kat] SHA2-256
805,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,904 UART: [kat] ++
817,435 UART: [kat] sha1
828,101 UART: [kat] SHA2-256
831,160 UART: [kat] SHA2-384
837,236 UART: [kat] SHA2-512-ACC
840,165 UART: [kat] ECC-384
3,280,772 UART: [kat] HMAC-384Kdf
3,293,015 UART: [kat] LMS
3,822,534 UART: [kat] --
3,826,599 UART: [cold-reset] ++
3,828,753 UART: [fht] FHT @ 0x50003400
3,839,998 UART: [idev] ++
3,840,555 UART: [idev] CDI.KEYID = 6
3,841,566 UART: [idev] SUBJECT.KEYID = 7
3,842,664 UART: [idev] UDS.KEYID = 0
3,857,989 UART: [idev] Erasing UDS.KEYID = 0
6,310,949 UART: [idev] Sha1 KeyId Algorithm
6,334,477 UART: [idev] --
6,337,931 UART: [ldev] ++
6,338,501 UART: [ldev] CDI.KEYID = 6
6,339,472 UART: [ldev] SUBJECT.KEYID = 5
6,340,738 UART: [ldev] AUTHORITY.KEYID = 7
6,341,912 UART: [ldev] FE.KEYID = 1
6,351,697 UART: [ldev] Erasing FE.KEYID = 1
8,828,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,618 UART: [ldev] --
10,617,079 UART: [fwproc] Wait for Commands...
10,619,342 UART: [fwproc] Recv command 0x46574c44
10,621,463 UART: [fwproc] Recv'd Img size: 114168 bytes
10,690,418 UART: ROM Fatal Error: 0x000B0008
10,693,559 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
6,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,481,238 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
5,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,108 UART:
192,502 UART: Running Caliptra ROM ...
193,699 UART:
193,856 UART: [state] CFI Enabled
262,495 UART: [state] LifecycleState = Unprovisioned
264,368 UART: [state] DebugLocked = No
266,401 UART: [state] WD Timer not started. Device not locked for debugging
270,397 UART: [kat] SHA2-256
449,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,092 UART: [kat] ++
461,652 UART: [kat] sha1
472,702 UART: [kat] SHA2-256
475,710 UART: [kat] SHA2-384
481,849 UART: [kat] SHA2-512-ACC
484,788 UART: [kat] ECC-384
2,947,684 UART: [kat] HMAC-384Kdf
2,971,655 UART: [kat] LMS
3,501,091 UART: [kat] --
3,505,278 UART: [cold-reset] ++
3,506,566 UART: [fht] FHT @ 0x50003400
3,518,208 UART: [idev] ++
3,518,777 UART: [idev] CDI.KEYID = 6
3,519,716 UART: [idev] SUBJECT.KEYID = 7
3,520,932 UART: [idev] UDS.KEYID = 0
3,544,179 UART: [idev] Erasing UDS.KEYID = 0
6,029,019 UART: [idev] Sha1 KeyId Algorithm
6,052,658 UART: [idev] --
6,057,901 UART: [ldev] ++
6,058,476 UART: [ldev] CDI.KEYID = 6
6,059,363 UART: [ldev] SUBJECT.KEYID = 5
6,060,579 UART: [ldev] AUTHORITY.KEYID = 7
6,061,872 UART: [ldev] FE.KEYID = 1
6,099,450 UART: [ldev] Erasing FE.KEYID = 1
8,602,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,156 UART: [ldev] --
10,392,048 UART: [fwproc] Wait for Commands...
10,394,795 UART: [fwproc] Recv command 0x46574c44
10,396,893 UART: [fwproc] Recv'd Img size: 114168 bytes
10,468,842 UART: ROM Fatal Error: 0x000B0008
10,471,935 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
5,357 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,250,401 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
6,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,296 UART:
193,034 UART: Running Caliptra ROM ...
194,266 UART:
603,511 UART: [state] CFI Enabled
617,194 UART: [state] LifecycleState = Unprovisioned
619,072 UART: [state] DebugLocked = No
620,723 UART: [state] WD Timer not started. Device not locked for debugging
624,295 UART: [kat] SHA2-256
803,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,960 UART: [kat] ++
815,406 UART: [kat] sha1
826,011 UART: [kat] SHA2-256
829,016 UART: [kat] SHA2-384
834,843 UART: [kat] SHA2-512-ACC
837,763 UART: [kat] ECC-384
3,279,139 UART: [kat] HMAC-384Kdf
3,290,997 UART: [kat] LMS
3,820,500 UART: [kat] --
3,825,156 UART: [cold-reset] ++
3,826,116 UART: [fht] FHT @ 0x50003400
3,837,913 UART: [idev] ++
3,838,485 UART: [idev] CDI.KEYID = 6
3,839,396 UART: [idev] SUBJECT.KEYID = 7
3,840,554 UART: [idev] UDS.KEYID = 0
3,855,957 UART: [idev] Erasing UDS.KEYID = 0
6,314,140 UART: [idev] Sha1 KeyId Algorithm
6,338,476 UART: [idev] --
6,342,526 UART: [ldev] ++
6,343,093 UART: [ldev] CDI.KEYID = 6
6,344,006 UART: [ldev] SUBJECT.KEYID = 5
6,345,225 UART: [ldev] AUTHORITY.KEYID = 7
6,346,457 UART: [ldev] FE.KEYID = 1
6,357,323 UART: [ldev] Erasing FE.KEYID = 1
8,833,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,545 UART: [ldev] --
10,626,893 UART: [fwproc] Wait for Commands...
10,629,557 UART: [fwproc] Recv command 0x46574c44
10,631,653 UART: [fwproc] Recv'd Img size: 114168 bytes
10,700,879 UART: ROM Fatal Error: 0x000B0008
10,703,977 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
6,321 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,475,477 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,284 UART: [kat] SHA2-512-ACC
906,185 UART: [kat] ECC-384
915,808 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,655 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,679 UART: [idev] ++
1,172,847 UART: [idev] CDI.KEYID = 6
1,173,208 UART: [idev] SUBJECT.KEYID = 7
1,173,633 UART: [idev] UDS.KEYID = 0
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,198,255 UART: [idev] Sha1 KeyId Algorithm
1,207,215 UART: [idev] --
1,208,196 UART: [ldev] ++
1,208,364 UART: [ldev] CDI.KEYID = 6
1,208,728 UART: [ldev] SUBJECT.KEYID = 5
1,209,155 UART: [ldev] AUTHORITY.KEYID = 7
1,209,618 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,214 UART: [fwproc] Wait for Commands...
1,280,999 UART: [fwproc] Recv command 0x46574c44
1,281,732 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,924 UART: ROM Fatal Error: 0x000B0008
1,308,081 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,164 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Unprovisioned
85,482 UART: [state] DebugLocked = No
86,126 UART: [state] WD Timer not started. Device not locked for debugging
87,251 UART: [kat] SHA2-256
890,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,930 UART: [kat] ++
895,082 UART: [kat] sha1
899,388 UART: [kat] SHA2-256
901,328 UART: [kat] SHA2-384
903,853 UART: [kat] SHA2-512-ACC
905,754 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,556 UART: [cold-reset] ++
1,169,978 UART: [fht] FHT @ 0x50003400
1,172,514 UART: [idev] ++
1,172,682 UART: [idev] CDI.KEYID = 6
1,173,043 UART: [idev] SUBJECT.KEYID = 7
1,173,468 UART: [idev] UDS.KEYID = 0
1,181,416 UART: [idev] Erasing UDS.KEYID = 0
1,198,756 UART: [idev] Sha1 KeyId Algorithm
1,207,442 UART: [idev] --
1,208,501 UART: [ldev] ++
1,208,669 UART: [ldev] CDI.KEYID = 6
1,209,033 UART: [ldev] SUBJECT.KEYID = 5
1,209,460 UART: [ldev] AUTHORITY.KEYID = 7
1,209,923 UART: [ldev] FE.KEYID = 1
1,215,311 UART: [ldev] Erasing FE.KEYID = 1
1,241,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,027 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,783 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,421 UART: ROM Fatal Error: 0x000B0008
1,308,578 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,155 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,288 UART: [kat] LMS
1,168,600 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,677 UART: [idev] ++
1,172,845 UART: [idev] CDI.KEYID = 6
1,173,206 UART: [idev] SUBJECT.KEYID = 7
1,173,631 UART: [idev] UDS.KEYID = 0
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,198,035 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,208,158 UART: [ldev] ++
1,208,326 UART: [ldev] CDI.KEYID = 6
1,208,690 UART: [ldev] SUBJECT.KEYID = 5
1,209,117 UART: [ldev] AUTHORITY.KEYID = 7
1,209,580 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,241,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,294 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,353 UART: [fwproc] Recv command 0x46574c44
1,282,086 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,890 UART: ROM Fatal Error: 0x000B0008
1,308,047 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,538 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Unprovisioned
86,600 UART: [state] DebugLocked = No
87,222 UART: [state] WD Timer not started. Device not locked for debugging
88,469 UART: [kat] SHA2-256
892,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,148 UART: [kat] ++
896,300 UART: [kat] sha1
900,490 UART: [kat] SHA2-256
902,430 UART: [kat] SHA2-384
905,255 UART: [kat] SHA2-512-ACC
907,156 UART: [kat] ECC-384
916,817 UART: [kat] HMAC-384Kdf
921,507 UART: [kat] LMS
1,169,819 UART: [kat] --
1,170,822 UART: [cold-reset] ++
1,171,306 UART: [fht] FHT @ 0x50003400
1,174,114 UART: [idev] ++
1,174,282 UART: [idev] CDI.KEYID = 6
1,174,643 UART: [idev] SUBJECT.KEYID = 7
1,175,068 UART: [idev] UDS.KEYID = 0
1,183,216 UART: [idev] Erasing UDS.KEYID = 0
1,200,288 UART: [idev] Sha1 KeyId Algorithm
1,209,308 UART: [idev] --
1,210,369 UART: [ldev] ++
1,210,537 UART: [ldev] CDI.KEYID = 6
1,210,901 UART: [ldev] SUBJECT.KEYID = 5
1,211,328 UART: [ldev] AUTHORITY.KEYID = 7
1,211,791 UART: [ldev] FE.KEYID = 1
1,217,231 UART: [ldev] Erasing FE.KEYID = 1
1,244,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,787 UART: [ldev] --
1,283,081 UART: [fwproc] Wait for Commands...
1,283,866 UART: [fwproc] Recv command 0x46574c44
1,284,599 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,547 UART: ROM Fatal Error: 0x000B0008
1,310,704 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,499 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,649 UART: [kat] SHA2-256
901,589 UART: [kat] SHA2-384
904,266 UART: [kat] SHA2-512-ACC
906,167 UART: [kat] ECC-384
915,806 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,437 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,629 UART: [idev] ++
1,172,797 UART: [idev] CDI.KEYID = 6
1,173,158 UART: [idev] SUBJECT.KEYID = 7
1,173,583 UART: [idev] UDS.KEYID = 0
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,540 UART: [ldev] ++
1,208,708 UART: [ldev] CDI.KEYID = 6
1,209,072 UART: [ldev] SUBJECT.KEYID = 5
1,209,499 UART: [ldev] AUTHORITY.KEYID = 7
1,209,962 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,190 UART: [ldev] --
1,280,658 UART: [fwproc] Wait for Commands...
1,281,281 UART: [fwproc] Recv command 0x46574c44
1,282,014 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,922 UART: ROM Fatal Error: 0x000B0008
1,308,079 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,212 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,182,554 UART: [idev] Erasing UDS.KEYID = 0
1,200,018 UART: [idev] Sha1 KeyId Algorithm
1,208,940 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,483 UART: [ldev] SUBJECT.KEYID = 5
1,210,910 UART: [ldev] AUTHORITY.KEYID = 7
1,211,373 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,221 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,741 UART: ROM Fatal Error: 0x000B0008
1,309,898 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,781 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,219,216 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,363,777 UART:
2,364,226 UART: Running Caliptra ROM ...
2,365,394 UART:
2,365,566 UART: [state] CFI Enabled
2,366,529 UART: [state] LifecycleState = Unprovisioned
2,368,185 UART: [state] DebugLocked = No
2,369,287 UART: [state] WD Timer not started. Device not locked for debugging
2,371,759 UART: [kat] SHA2-256
2,372,425 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,375,430 UART: [kat] ++
2,375,881 UART: [kat] sha1
2,376,395 UART: [kat] SHA2-256
2,377,131 UART: [kat] SHA2-384
2,377,797 UART: [kat] SHA2-512-ACC
2,378,629 UART: [kat] ECC-384
3,774,218 UART: [kat] HMAC-384Kdf
3,801,099 UART: [kat] LMS
4,874,274 UART: [kat] --
4,880,083 UART: [cold-reset] ++
4,882,462 UART: [fht] FHT @ 0x50003400
4,894,149 UART: [idev] ++
4,894,825 UART: [idev] CDI.KEYID = 6
4,896,058 UART: [idev] SUBJECT.KEYID = 7
4,897,160 UART: [idev] UDS.KEYID = 0
4,928,599 UART: [idev] Erasing UDS.KEYID = 0
8,241,240 UART: [idev] Sha1 KeyId Algorithm
8,262,952 UART: [idev] --
8,266,302 UART: [ldev] ++
8,266,864 UART: [ldev] CDI.KEYID = 6
8,268,104 UART: [ldev] SUBJECT.KEYID = 5
8,269,205 UART: [ldev] AUTHORITY.KEYID = 7
8,270,456 UART: [ldev] FE.KEYID = 1
8,316,659 UART: [ldev] Erasing FE.KEYID = 1
11,650,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,161 UART: [ldev] --
14,033,132 UART: [fwproc] Wait for Commands...
14,035,012 UART: [fwproc] Recv command 0x46574c44
14,037,332 UART: [fwproc] Recv'd Img size: 113844 bytes
14,114,384 UART: ROM Fatal Error: 0x000B0009
14,117,773 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,057,102 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,200,927 UART:
2,201,348 UART: Running Caliptra ROM ...
2,202,469 UART:
2,202,630 UART: [state] CFI Enabled
2,203,599 UART: [state] LifecycleState = Unprovisioned
2,205,268 UART: [state] DebugLocked = No
2,206,295 UART: [state] WD Timer not started. Device not locked for debugging
2,208,773 UART: [kat] SHA2-256
2,209,464 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,464 UART: [kat] ++
2,212,914 UART: [kat] sha1
2,213,427 UART: [kat] SHA2-256
2,214,160 UART: [kat] SHA2-384
2,214,869 UART: [kat] SHA2-512-ACC
2,215,673 UART: [kat] ECC-384
3,776,715 UART: [kat] HMAC-384Kdf
3,803,697 UART: [kat] LMS
4,876,834 UART: [kat] --
4,882,454 UART: [cold-reset] ++
4,884,820 UART: [fht] FHT @ 0x50003400
4,896,053 UART: [idev] ++
4,896,789 UART: [idev] CDI.KEYID = 6
4,897,981 UART: [idev] SUBJECT.KEYID = 7
4,899,097 UART: [idev] UDS.KEYID = 0
4,930,142 UART: [idev] Erasing UDS.KEYID = 0
8,242,790 UART: [idev] Sha1 KeyId Algorithm
8,264,929 UART: [idev] --
8,268,467 UART: [ldev] ++
8,269,102 UART: [ldev] CDI.KEYID = 6
8,270,206 UART: [ldev] SUBJECT.KEYID = 5
8,271,420 UART: [ldev] AUTHORITY.KEYID = 7
8,272,573 UART: [ldev] FE.KEYID = 1
8,317,003 UART: [ldev] Erasing FE.KEYID = 1
11,651,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,480 UART: [ldev] --
14,035,670 UART: [fwproc] Wait for Commands...
14,037,631 UART: [fwproc] Recv command 0x46574c44
14,039,954 UART: [fwproc] Recv'd Img size: 113844 bytes
14,112,429 UART: ROM Fatal Error: 0x000B0009
14,115,843 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,050,922 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,194,789 UART:
2,195,218 UART: Running Caliptra ROM ...
2,196,382 UART:
2,196,554 UART: [state] CFI Enabled
2,197,543 UART: [state] LifecycleState = Unprovisioned
2,199,183 UART: [state] DebugLocked = No
2,200,285 UART: [state] WD Timer not started. Device not locked for debugging
2,202,757 UART: [kat] SHA2-256
2,203,426 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,431 UART: [kat] ++
2,206,884 UART: [kat] sha1
2,207,394 UART: [kat] SHA2-256
2,208,129 UART: [kat] SHA2-384
2,208,793 UART: [kat] SHA2-512-ACC
2,209,647 UART: [kat] ECC-384
3,774,740 UART: [kat] HMAC-384Kdf
3,801,405 UART: [kat] LMS
4,874,587 UART: [kat] --
4,878,591 UART: [cold-reset] ++
4,881,292 UART: [fht] FHT @ 0x50003400
4,893,162 UART: [idev] ++
4,893,843 UART: [idev] CDI.KEYID = 6
4,895,079 UART: [idev] SUBJECT.KEYID = 7
4,896,114 UART: [idev] UDS.KEYID = 0
4,914,302 UART: [idev] Erasing UDS.KEYID = 0
8,227,008 UART: [idev] Sha1 KeyId Algorithm
8,250,341 UART: [idev] --
8,255,307 UART: [ldev] ++
8,255,870 UART: [ldev] CDI.KEYID = 6
8,257,115 UART: [ldev] SUBJECT.KEYID = 5
8,258,270 UART: [ldev] AUTHORITY.KEYID = 7
8,259,494 UART: [ldev] FE.KEYID = 1
8,294,336 UART: [ldev] Erasing FE.KEYID = 1
11,631,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,942,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,958,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,974,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,990,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,011,109 UART: [ldev] --
14,015,134 UART: [fwproc] Wait for Commands...
14,016,695 UART: [fwproc] Recv command 0x46574c44
14,018,957 UART: [fwproc] Recv'd Img size: 113844 bytes
14,089,809 UART: ROM Fatal Error: 0x000B0009
14,093,227 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,051,231 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,195,064 UART:
2,195,507 UART: Running Caliptra ROM ...
2,196,630 UART:
2,196,796 UART: [state] CFI Enabled
2,197,700 UART: [state] LifecycleState = Unprovisioned
2,199,365 UART: [state] DebugLocked = No
2,200,475 UART: [state] WD Timer not started. Device not locked for debugging
2,202,952 UART: [kat] SHA2-256
2,203,621 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,623 UART: [kat] ++
2,207,074 UART: [kat] sha1
2,207,589 UART: [kat] SHA2-256
2,208,326 UART: [kat] SHA2-384
2,208,991 UART: [kat] SHA2-512-ACC
2,209,815 UART: [kat] ECC-384
3,777,422 UART: [kat] HMAC-384Kdf
3,804,399 UART: [kat] LMS
4,877,575 UART: [kat] --
4,882,174 UART: [cold-reset] ++
4,883,673 UART: [fht] FHT @ 0x50003400
4,895,247 UART: [idev] ++
4,895,979 UART: [idev] CDI.KEYID = 6
4,897,161 UART: [idev] SUBJECT.KEYID = 7
4,898,321 UART: [idev] UDS.KEYID = 0
4,931,574 UART: [idev] Erasing UDS.KEYID = 0
8,245,305 UART: [idev] Sha1 KeyId Algorithm
8,268,045 UART: [idev] --
8,272,199 UART: [ldev] ++
8,272,764 UART: [ldev] CDI.KEYID = 6
8,273,945 UART: [ldev] SUBJECT.KEYID = 5
8,275,157 UART: [ldev] AUTHORITY.KEYID = 7
8,276,330 UART: [ldev] FE.KEYID = 1
8,319,737 UART: [ldev] Erasing FE.KEYID = 1
11,655,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,096 UART: [ldev] --
14,039,043 UART: [fwproc] Wait for Commands...
14,041,848 UART: [fwproc] Recv command 0x46574c44
14,044,167 UART: [fwproc] Recv'd Img size: 113844 bytes
18,117,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,186,341 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,255,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,571,680 >>> mbox cmd response: success
18,575,036 UART: [afmc] ++
18,575,754 UART: [afmc] CDI.KEYID = 6
18,576,938 UART: [afmc] SUBJECT.KEYID = 7
18,578,105 UART: [afmc] AUTHORITY.KEYID = 5
21,950,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,265,643 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,267,897 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,284,031 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,300,163 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,316,060 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,338,346 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,218,728 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,879,688 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,055,296 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,918,078 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
2,050,660 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,893,833 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,049,487 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,315,840 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,540 writing to cptra_bootfsm_go
2,225,977 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,370,367 UART:
2,370,788 UART: Running Caliptra ROM ...
2,371,967 UART:
2,372,128 UART: [state] CFI Enabled
2,373,085 UART: [state] LifecycleState = Unprovisioned
2,374,733 UART: [state] DebugLocked = No
2,375,856 UART: [state] WD Timer not started. Device not locked for debugging
2,378,325 UART: [kat] SHA2-256
2,378,985 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,381,996 UART: [kat] ++
2,382,440 UART: [kat] sha1
2,382,985 UART: [kat] SHA2-256
2,383,639 UART: [kat] SHA2-384
2,384,323 UART: [kat] SHA2-512-ACC
2,385,116 UART: [kat] ECC-384
4,099,979 UART: [kat] HMAC-384Kdf
4,111,849 UART: [kat] LMS
5,184,995 UART: [kat] --
5,189,982 UART: [cold-reset] ++
5,191,820 UART: [fht] FHT @ 0x50003400
5,203,880 UART: [idev] ++
5,204,545 UART: [idev] CDI.KEYID = 6
5,205,784 UART: [idev] SUBJECT.KEYID = 7
5,207,209 UART: [idev] UDS.KEYID = 0
5,224,157 UART: [idev] Erasing UDS.KEYID = 0
8,499,362 UART: [idev] Sha1 KeyId Algorithm
8,521,365 UART: [idev] --
8,526,428 UART: [ldev] ++
8,526,995 UART: [ldev] CDI.KEYID = 6
8,528,227 UART: [ldev] SUBJECT.KEYID = 5
8,529,772 UART: [ldev] AUTHORITY.KEYID = 7
8,531,200 UART: [ldev] FE.KEYID = 1
8,542,068 UART: [ldev] Erasing FE.KEYID = 1
11,835,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,587 UART: [ldev] --
14,201,017 UART: [fwproc] Wait for Commands...
14,202,629 UART: [fwproc] Recv command 0x46574c44
14,204,933 UART: [fwproc] Recv'd Img size: 113844 bytes
14,278,003 UART: ROM Fatal Error: 0x000B0009
14,281,367 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,062,158 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,205,978 UART:
2,206,379 UART: Running Caliptra ROM ...
2,207,553 UART:
2,207,724 UART: [state] CFI Enabled
2,208,677 UART: [state] LifecycleState = Unprovisioned
2,210,326 UART: [state] DebugLocked = No
2,211,431 UART: [state] WD Timer not started. Device not locked for debugging
2,213,894 UART: [kat] SHA2-256
2,214,556 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,217,557 UART: [kat] ++
2,218,003 UART: [kat] sha1
2,218,513 UART: [kat] SHA2-256
2,219,245 UART: [kat] SHA2-384
2,219,906 UART: [kat] SHA2-512-ACC
2,220,702 UART: [kat] ECC-384
4,100,120 UART: [kat] HMAC-384Kdf
4,111,443 UART: [kat] LMS
5,184,589 UART: [kat] --
5,189,475 UART: [cold-reset] ++
5,190,543 UART: [fht] FHT @ 0x50003400
5,201,388 UART: [idev] ++
5,202,135 UART: [idev] CDI.KEYID = 6
5,203,329 UART: [idev] SUBJECT.KEYID = 7
5,204,755 UART: [idev] UDS.KEYID = 0
5,221,380 UART: [idev] Erasing UDS.KEYID = 0
8,496,329 UART: [idev] Sha1 KeyId Algorithm
8,519,008 UART: [idev] --
8,524,242 UART: [ldev] ++
8,524,857 UART: [ldev] CDI.KEYID = 6
8,526,030 UART: [ldev] SUBJECT.KEYID = 5
8,527,511 UART: [ldev] AUTHORITY.KEYID = 7
8,529,078 UART: [ldev] FE.KEYID = 1
8,541,128 UART: [ldev] Erasing FE.KEYID = 1
11,837,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,545 UART: [ldev] --
14,201,858 UART: [fwproc] Wait for Commands...
14,204,216 UART: [fwproc] Recv command 0x46574c44
14,206,518 UART: [fwproc] Recv'd Img size: 113844 bytes
14,277,301 UART: ROM Fatal Error: 0x000B0009
14,280,711 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
2,058,787 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,202,499 UART:
2,202,889 UART: Running Caliptra ROM ...
2,204,060 UART:
2,204,229 UART: [state] CFI Enabled
2,205,206 UART: [state] LifecycleState = Unprovisioned
2,206,841 UART: [state] DebugLocked = No
2,207,942 UART: [state] WD Timer not started. Device not locked for debugging
2,210,401 UART: [kat] SHA2-256
2,211,061 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,214,298 UART: [kat] ++
2,214,757 UART: [kat] sha1
2,215,287 UART: [kat] SHA2-256
2,215,984 UART: [kat] SHA2-384
2,216,635 UART: [kat] SHA2-512-ACC
2,217,460 UART: [kat] ECC-384
4,100,531 UART: [kat] HMAC-384Kdf
4,113,470 UART: [kat] LMS
5,186,599 UART: [kat] --
5,191,232 UART: [cold-reset] ++
5,193,809 UART: [fht] FHT @ 0x50003400
5,205,266 UART: [idev] ++
5,205,941 UART: [idev] CDI.KEYID = 6
5,207,171 UART: [idev] SUBJECT.KEYID = 7
5,208,594 UART: [idev] UDS.KEYID = 0
5,224,235 UART: [idev] Erasing UDS.KEYID = 0
8,498,308 UART: [idev] Sha1 KeyId Algorithm
8,519,219 UART: [idev] --
8,523,338 UART: [ldev] ++
8,523,905 UART: [ldev] CDI.KEYID = 6
8,525,133 UART: [ldev] SUBJECT.KEYID = 5
8,526,609 UART: [ldev] AUTHORITY.KEYID = 7
8,528,154 UART: [ldev] FE.KEYID = 1
8,540,150 UART: [ldev] Erasing FE.KEYID = 1
11,831,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,373 UART: [ldev] --
14,198,146 UART: [fwproc] Wait for Commands...
14,199,809 UART: [fwproc] Recv command 0x46574c44
14,202,115 UART: [fwproc] Recv'd Img size: 113844 bytes
14,269,495 UART: ROM Fatal Error: 0x000B0009
14,272,922 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,064,705 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,208,410 UART:
2,208,821 UART: Running Caliptra ROM ...
2,209,904 UART:
2,210,050 UART: [state] CFI Enabled
2,211,022 UART: [state] LifecycleState = Unprovisioned
2,212,680 UART: [state] DebugLocked = No
2,213,722 UART: [state] WD Timer not started. Device not locked for debugging
2,216,190 UART: [kat] SHA2-256
2,216,848 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,219,836 UART: [kat] ++
2,220,273 UART: [kat] sha1
2,220,775 UART: [kat] SHA2-256
2,221,423 UART: [kat] SHA2-384
2,222,071 UART: [kat] SHA2-512-ACC
2,222,864 UART: [kat] ECC-384
4,094,076 UART: [kat] HMAC-384Kdf
4,104,859 UART: [kat] LMS
5,178,011 UART: [kat] --
5,182,977 UART: [cold-reset] ++
5,185,285 UART: [fht] FHT @ 0x50003400
5,195,769 UART: [idev] ++
5,196,497 UART: [idev] CDI.KEYID = 6
5,197,695 UART: [idev] SUBJECT.KEYID = 7
5,199,128 UART: [idev] UDS.KEYID = 0
5,214,774 UART: [idev] Erasing UDS.KEYID = 0
8,485,283 UART: [idev] Sha1 KeyId Algorithm
8,507,649 UART: [idev] --
8,511,426 UART: [ldev] ++
8,511,992 UART: [ldev] CDI.KEYID = 6
8,513,222 UART: [ldev] SUBJECT.KEYID = 5
8,514,651 UART: [ldev] AUTHORITY.KEYID = 7
8,516,177 UART: [ldev] FE.KEYID = 1
8,527,536 UART: [ldev] Erasing FE.KEYID = 1
11,815,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,110,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,126,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,142,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,158,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,179,812 UART: [ldev] --
14,185,233 UART: [fwproc] Wait for Commands...
14,187,326 UART: [fwproc] Recv command 0x46574c44
14,189,628 UART: [fwproc] Recv'd Img size: 113844 bytes
18,262,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,335,006 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,403,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,720,748 >>> mbox cmd response: success
18,724,962 UART: [afmc] ++
18,725,658 UART: [afmc] CDI.KEYID = 6
18,726,898 UART: [afmc] SUBJECT.KEYID = 7
18,727,920 UART: [afmc] AUTHORITY.KEYID = 5
22,046,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,340,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,342,420 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,358,530 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,374,639 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,390,537 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,413,908 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,227,878 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,087,994 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,061,762 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,086,844 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,054,873 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,082,590 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
2,058,281 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,513,662 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,221,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,366,682 UART:
2,367,107 UART: Running Caliptra ROM ...
2,368,287 UART:
2,368,455 UART: [state] CFI Enabled
2,369,421 UART: [state] LifecycleState = Unprovisioned
2,371,074 UART: [state] DebugLocked = No
2,372,212 UART: [state] WD Timer not started. Device not locked for debugging
2,374,691 UART: [kat] SHA2-256
2,375,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,389 UART: [kat] ++
2,378,901 UART: [kat] sha1
2,379,420 UART: [kat] SHA2-256
2,380,106 UART: [kat] SHA2-384
2,380,768 UART: [kat] SHA2-512-ACC
2,381,568 UART: [kat] ECC-384
2,949,916 UART: [kat] HMAC-384Kdf
2,970,442 UART: [kat] LMS
3,499,861 UART: [kat] --
3,505,561 UART: [cold-reset] ++
3,508,149 UART: [fht] FHT @ 0x50003400
3,518,097 UART: [idev] ++
3,518,665 UART: [idev] CDI.KEYID = 6
3,519,648 UART: [idev] SUBJECT.KEYID = 7
3,520,809 UART: [idev] UDS.KEYID = 0
3,543,706 UART: [idev] Erasing UDS.KEYID = 0
6,025,843 UART: [idev] Sha1 KeyId Algorithm
6,047,892 UART: [idev] --
6,052,157 UART: [ldev] ++
6,052,730 UART: [ldev] CDI.KEYID = 6
6,053,639 UART: [ldev] SUBJECT.KEYID = 5
6,054,860 UART: [ldev] AUTHORITY.KEYID = 7
6,056,095 UART: [ldev] FE.KEYID = 1
6,098,411 UART: [ldev] Erasing FE.KEYID = 1
8,601,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,053 UART: [ldev] --
10,390,889 UART: [fwproc] Wait for Commands...
10,393,311 UART: [fwproc] Recv command 0x46574c44
10,395,355 UART: [fwproc] Recv'd Img size: 114168 bytes
10,469,731 UART: ROM Fatal Error: 0x000B0009
10,472,880 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
2,060,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,204,287 UART:
2,204,683 UART: Running Caliptra ROM ...
2,205,770 UART:
2,205,926 UART: [state] CFI Enabled
2,206,890 UART: [state] LifecycleState = Unprovisioned
2,208,552 UART: [state] DebugLocked = No
2,209,579 UART: [state] WD Timer not started. Device not locked for debugging
2,212,049 UART: [kat] SHA2-256
2,212,719 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,215,734 UART: [kat] ++
2,216,181 UART: [kat] sha1
2,216,695 UART: [kat] SHA2-256
2,217,351 UART: [kat] SHA2-384
2,218,006 UART: [kat] SHA2-512-ACC
2,218,840 UART: [kat] ECC-384
2,927,421 UART: [kat] HMAC-384Kdf
2,953,037 UART: [kat] LMS
3,482,478 UART: [kat] --
3,485,046 UART: [cold-reset] ++
3,487,475 UART: [fht] FHT @ 0x50003400
3,497,857 UART: [idev] ++
3,498,431 UART: [idev] CDI.KEYID = 6
3,499,336 UART: [idev] SUBJECT.KEYID = 7
3,500,557 UART: [idev] UDS.KEYID = 0
3,525,118 UART: [idev] Erasing UDS.KEYID = 0
6,009,037 UART: [idev] Sha1 KeyId Algorithm
6,032,858 UART: [idev] --
6,036,829 UART: [ldev] ++
6,037,403 UART: [ldev] CDI.KEYID = 6
6,038,286 UART: [ldev] SUBJECT.KEYID = 5
6,039,504 UART: [ldev] AUTHORITY.KEYID = 7
6,040,762 UART: [ldev] FE.KEYID = 1
6,079,960 UART: [ldev] Erasing FE.KEYID = 1
8,579,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,296 UART: [ldev] --
10,371,547 UART: [fwproc] Wait for Commands...
10,373,329 UART: [fwproc] Recv command 0x46574c44
10,375,429 UART: [fwproc] Recv'd Img size: 114168 bytes
10,445,607 UART: ROM Fatal Error: 0x000B0009
10,448,696 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
2,061,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,205,859 UART:
2,206,276 UART: Running Caliptra ROM ...
2,207,357 UART:
2,207,513 UART: [state] CFI Enabled
2,208,495 UART: [state] LifecycleState = Unprovisioned
2,210,144 UART: [state] DebugLocked = No
2,211,255 UART: [state] WD Timer not started. Device not locked for debugging
2,213,728 UART: [kat] SHA2-256
2,214,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,409 UART: [kat] ++
2,217,883 UART: [kat] sha1
2,218,439 UART: [kat] SHA2-256
2,219,098 UART: [kat] SHA2-384
2,219,852 UART: [kat] SHA2-512-ACC
2,220,663 UART: [kat] ECC-384
2,945,574 UART: [kat] HMAC-384Kdf
2,972,298 UART: [kat] LMS
3,501,751 UART: [kat] --
3,506,224 UART: [cold-reset] ++
3,508,587 UART: [fht] FHT @ 0x50003400
3,519,404 UART: [idev] ++
3,519,969 UART: [idev] CDI.KEYID = 6
3,520,878 UART: [idev] SUBJECT.KEYID = 7
3,522,102 UART: [idev] UDS.KEYID = 0
3,543,627 UART: [idev] Erasing UDS.KEYID = 0
6,027,352 UART: [idev] Sha1 KeyId Algorithm
6,049,000 UART: [idev] --
6,053,765 UART: [ldev] ++
6,054,340 UART: [ldev] CDI.KEYID = 6
6,055,227 UART: [ldev] SUBJECT.KEYID = 5
6,056,454 UART: [ldev] AUTHORITY.KEYID = 7
6,057,690 UART: [ldev] FE.KEYID = 1
6,100,589 UART: [ldev] Erasing FE.KEYID = 1
8,605,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,210 UART: [ldev] --
10,412,551 UART: [fwproc] Wait for Commands...
10,414,982 UART: [fwproc] Recv command 0x46574c44
10,417,028 UART: [fwproc] Recv'd Img size: 114168 bytes
10,493,144 UART: ROM Fatal Error: 0x000B0009
10,496,290 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
2,055,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,199,621 UART:
2,200,050 UART: Running Caliptra ROM ...
2,201,225 UART:
2,201,394 UART: [state] CFI Enabled
2,202,371 UART: [state] LifecycleState = Unprovisioned
2,204,053 UART: [state] DebugLocked = No
2,205,089 UART: [state] WD Timer not started. Device not locked for debugging
2,207,552 UART: [kat] SHA2-256
2,208,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,227 UART: [kat] ++
2,211,677 UART: [kat] sha1
2,212,191 UART: [kat] SHA2-256
2,212,847 UART: [kat] SHA2-384
2,213,503 UART: [kat] SHA2-512-ACC
2,214,328 UART: [kat] ECC-384
2,948,863 UART: [kat] HMAC-384Kdf
2,972,393 UART: [kat] LMS
3,501,860 UART: [kat] --
3,508,285 UART: [cold-reset] ++
3,510,064 UART: [fht] FHT @ 0x50003400
3,522,771 UART: [idev] ++
3,523,394 UART: [idev] CDI.KEYID = 6
3,524,311 UART: [idev] SUBJECT.KEYID = 7
3,525,422 UART: [idev] UDS.KEYID = 0
3,543,128 UART: [idev] Erasing UDS.KEYID = 0
6,024,476 UART: [idev] Sha1 KeyId Algorithm
6,048,855 UART: [idev] --
6,053,557 UART: [ldev] ++
6,054,131 UART: [ldev] CDI.KEYID = 6
6,055,042 UART: [ldev] SUBJECT.KEYID = 5
6,056,210 UART: [ldev] AUTHORITY.KEYID = 7
6,057,444 UART: [ldev] FE.KEYID = 1
6,099,751 UART: [ldev] Erasing FE.KEYID = 1
8,601,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,670 UART: [ldev] --
10,391,097 UART: [fwproc] Wait for Commands...
10,393,468 UART: [fwproc] Recv command 0x46574c44
10,395,560 UART: [fwproc] Recv'd Img size: 114168 bytes
13,798,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,873,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,259,723 >>> mbox cmd response: success
14,263,502 UART: [afmc] ++
14,264,101 UART: [afmc] CDI.KEYID = 6
14,264,982 UART: [afmc] SUBJECT.KEYID = 7
14,266,083 UART: [afmc] AUTHORITY.KEYID = 5
16,810,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,692 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,569,691 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,585,473 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,601,226 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,624,405 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,223,222 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,249,511 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
2,072,748 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,297,658 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,055,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,269,205 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,065,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,066,748 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,226,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,371,138 UART:
2,371,534 UART: Running Caliptra ROM ...
2,372,615 UART:
2,372,767 UART: [state] CFI Enabled
2,373,732 UART: [state] LifecycleState = Unprovisioned
2,375,411 UART: [state] DebugLocked = No
2,376,441 UART: [state] WD Timer not started. Device not locked for debugging
2,378,908 UART: [kat] SHA2-256
2,379,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,382,570 UART: [kat] ++
2,383,018 UART: [kat] sha1
2,383,532 UART: [kat] SHA2-256
2,384,267 UART: [kat] SHA2-384
2,384,930 UART: [kat] SHA2-512-ACC
2,385,759 UART: [kat] ECC-384
3,279,706 UART: [kat] HMAC-384Kdf
3,292,419 UART: [kat] LMS
3,821,895 UART: [kat] --
3,825,804 UART: [cold-reset] ++
3,827,354 UART: [fht] FHT @ 0x50003400
3,839,300 UART: [idev] ++
3,839,881 UART: [idev] CDI.KEYID = 6
3,840,903 UART: [idev] SUBJECT.KEYID = 7
3,842,000 UART: [idev] UDS.KEYID = 0
3,855,707 UART: [idev] Erasing UDS.KEYID = 0
6,316,408 UART: [idev] Sha1 KeyId Algorithm
6,339,266 UART: [idev] --
6,344,230 UART: [ldev] ++
6,344,800 UART: [ldev] CDI.KEYID = 6
6,345,684 UART: [ldev] SUBJECT.KEYID = 5
6,346,893 UART: [ldev] AUTHORITY.KEYID = 7
6,348,179 UART: [ldev] FE.KEYID = 1
6,358,691 UART: [ldev] Erasing FE.KEYID = 1
8,833,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,190 UART: [ldev] --
10,625,547 UART: [fwproc] Wait for Commands...
10,627,481 UART: [fwproc] Recv command 0x46574c44
10,629,573 UART: [fwproc] Recv'd Img size: 114168 bytes
10,702,415 UART: ROM Fatal Error: 0x000B0009
10,705,563 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,697 writing to cptra_bootfsm_go
2,063,167 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,207,387 UART:
2,207,798 UART: Running Caliptra ROM ...
2,208,877 UART:
2,209,025 UART: [state] CFI Enabled
2,209,990 UART: [state] LifecycleState = Unprovisioned
2,211,646 UART: [state] DebugLocked = No
2,212,752 UART: [state] WD Timer not started. Device not locked for debugging
2,215,222 UART: [kat] SHA2-256
2,215,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,886 UART: [kat] ++
2,219,335 UART: [kat] sha1
2,219,847 UART: [kat] SHA2-256
2,220,581 UART: [kat] SHA2-384
2,221,244 UART: [kat] SHA2-512-ACC
2,222,144 UART: [kat] ECC-384
3,281,955 UART: [kat] HMAC-384Kdf
3,293,296 UART: [kat] LMS
3,822,800 UART: [kat] --
3,828,358 UART: [cold-reset] ++
3,829,369 UART: [fht] FHT @ 0x50003400
3,841,291 UART: [idev] ++
3,841,935 UART: [idev] CDI.KEYID = 6
3,842,870 UART: [idev] SUBJECT.KEYID = 7
3,843,914 UART: [idev] UDS.KEYID = 0
3,859,078 UART: [idev] Erasing UDS.KEYID = 0
6,315,959 UART: [idev] Sha1 KeyId Algorithm
6,338,245 UART: [idev] --
6,342,927 UART: [ldev] ++
6,343,503 UART: [ldev] CDI.KEYID = 6
6,344,414 UART: [ldev] SUBJECT.KEYID = 5
6,345,643 UART: [ldev] AUTHORITY.KEYID = 7
6,346,874 UART: [ldev] FE.KEYID = 1
6,357,519 UART: [ldev] Erasing FE.KEYID = 1
8,831,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,384 UART: [ldev] --
10,619,885 UART: [fwproc] Wait for Commands...
10,622,299 UART: [fwproc] Recv command 0x46574c44
10,624,384 UART: [fwproc] Recv'd Img size: 114168 bytes
10,694,201 UART: ROM Fatal Error: 0x000B0009
10,697,293 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,057,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,201,003 UART:
2,201,394 UART: Running Caliptra ROM ...
2,202,567 UART:
2,202,738 UART: [state] CFI Enabled
2,203,709 UART: [state] LifecycleState = Unprovisioned
2,205,347 UART: [state] DebugLocked = No
2,206,633 UART: [state] WD Timer not started. Device not locked for debugging
2,209,123 UART: [kat] SHA2-256
2,209,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,814 UART: [kat] ++
2,213,264 UART: [kat] sha1
2,213,815 UART: [kat] SHA2-256
2,214,471 UART: [kat] SHA2-384
2,215,124 UART: [kat] SHA2-512-ACC
2,215,949 UART: [kat] ECC-384
3,281,585 UART: [kat] HMAC-384Kdf
3,293,805 UART: [kat] LMS
3,823,302 UART: [kat] --
3,827,861 UART: [cold-reset] ++
3,829,689 UART: [fht] FHT @ 0x50003400
3,840,983 UART: [idev] ++
3,841,538 UART: [idev] CDI.KEYID = 6
3,842,467 UART: [idev] SUBJECT.KEYID = 7
3,843,671 UART: [idev] UDS.KEYID = 0
3,859,621 UART: [idev] Erasing UDS.KEYID = 0
6,316,237 UART: [idev] Sha1 KeyId Algorithm
6,339,188 UART: [idev] --
6,343,715 UART: [ldev] ++
6,344,283 UART: [ldev] CDI.KEYID = 6
6,345,190 UART: [ldev] SUBJECT.KEYID = 5
6,346,401 UART: [ldev] AUTHORITY.KEYID = 7
6,347,625 UART: [ldev] FE.KEYID = 1
6,359,679 UART: [ldev] Erasing FE.KEYID = 1
8,833,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,629 UART: [ldev] --
10,622,853 UART: [fwproc] Wait for Commands...
10,625,433 UART: [fwproc] Recv command 0x46574c44
10,627,546 UART: [fwproc] Recv'd Img size: 114168 bytes
10,698,608 UART: ROM Fatal Error: 0x000B0009
10,701,694 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,062,639 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,206,961 UART:
2,207,368 UART: Running Caliptra ROM ...
2,208,532 UART:
2,208,702 UART: [state] CFI Enabled
2,209,701 UART: [state] LifecycleState = Unprovisioned
2,211,343 UART: [state] DebugLocked = No
2,212,443 UART: [state] WD Timer not started. Device not locked for debugging
2,214,902 UART: [kat] SHA2-256
2,215,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,218,584 UART: [kat] ++
2,219,033 UART: [kat] sha1
2,219,549 UART: [kat] SHA2-256
2,220,239 UART: [kat] SHA2-384
2,220,899 UART: [kat] SHA2-512-ACC
2,221,697 UART: [kat] ECC-384
3,277,793 UART: [kat] HMAC-384Kdf
3,288,784 UART: [kat] LMS
3,818,232 UART: [kat] --
3,823,308 UART: [cold-reset] ++
3,824,916 UART: [fht] FHT @ 0x50003400
3,836,069 UART: [idev] ++
3,836,632 UART: [idev] CDI.KEYID = 6
3,837,535 UART: [idev] SUBJECT.KEYID = 7
3,838,746 UART: [idev] UDS.KEYID = 0
3,854,882 UART: [idev] Erasing UDS.KEYID = 0
6,312,483 UART: [idev] Sha1 KeyId Algorithm
6,334,570 UART: [idev] --
6,339,182 UART: [ldev] ++
6,339,757 UART: [ldev] CDI.KEYID = 6
6,340,636 UART: [ldev] SUBJECT.KEYID = 5
6,341,848 UART: [ldev] AUTHORITY.KEYID = 7
6,343,077 UART: [ldev] FE.KEYID = 1
6,353,964 UART: [ldev] Erasing FE.KEYID = 1
8,826,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,200 UART: [ldev] --
10,617,163 UART: [fwproc] Wait for Commands...
10,619,319 UART: [fwproc] Recv command 0x46574c44
10,621,408 UART: [fwproc] Recv'd Img size: 114168 bytes
14,016,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,089,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,475,287 >>> mbox cmd response: success
14,479,404 UART: [afmc] ++
14,479,988 UART: [afmc] CDI.KEYID = 6
14,480,871 UART: [afmc] SUBJECT.KEYID = 7
14,482,027 UART: [afmc] AUTHORITY.KEYID = 5
16,983,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,633 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,720,623 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,736,440 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,752,204 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,774,167 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,864 writing to cptra_bootfsm_go
2,223,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,476,862 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,063,419 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,474,057 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,055,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,475,353 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
2,056,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,793 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,220,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,365,284 UART:
2,365,716 UART: Running Caliptra ROM ...
2,366,803 UART:
2,366,961 UART: [state] CFI Enabled
2,367,932 UART: [state] LifecycleState = Unprovisioned
2,369,588 UART: [state] DebugLocked = No
2,370,696 UART: [state] WD Timer not started. Device not locked for debugging
2,373,166 UART: [kat] SHA2-256
2,373,832 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,376,839 UART: [kat] ++
2,377,288 UART: [kat] sha1
2,377,884 UART: [kat] SHA2-256
2,378,552 UART: [kat] SHA2-384
2,379,307 UART: [kat] SHA2-512-ACC
2,380,138 UART: [kat] ECC-384
2,946,157 UART: [kat] HMAC-384Kdf
2,971,724 UART: [kat] LMS
3,501,141 UART: [kat] --
3,505,350 UART: [cold-reset] ++
3,507,551 UART: [fht] FHT @ 0x50003400
3,517,958 UART: [idev] ++
3,518,544 UART: [idev] CDI.KEYID = 6
3,519,511 UART: [idev] SUBJECT.KEYID = 7
3,520,672 UART: [idev] UDS.KEYID = 0
3,542,693 UART: [idev] Erasing UDS.KEYID = 0
6,022,231 UART: [idev] Sha1 KeyId Algorithm
6,045,405 UART: [idev] --
6,050,587 UART: [ldev] ++
6,051,161 UART: [ldev] CDI.KEYID = 6
6,052,046 UART: [ldev] SUBJECT.KEYID = 5
6,053,284 UART: [ldev] AUTHORITY.KEYID = 7
6,054,521 UART: [ldev] FE.KEYID = 1
6,100,287 UART: [ldev] Erasing FE.KEYID = 1
8,618,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,272 UART: [ldev] --
10,425,106 UART: [fwproc] Wait for Commands...
10,426,989 UART: [fwproc] Recv command 0x46574c44
10,429,090 UART: [fwproc] Recv'd Img size: 114168 bytes
10,506,363 UART: ROM Fatal Error: 0x000B0009
10,509,452 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,058,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,203,038 UART:
2,203,453 UART: Running Caliptra ROM ...
2,204,626 UART:
2,204,794 UART: [state] CFI Enabled
2,205,760 UART: [state] LifecycleState = Unprovisioned
2,207,420 UART: [state] DebugLocked = No
2,208,529 UART: [state] WD Timer not started. Device not locked for debugging
2,211,205 UART: [kat] SHA2-256
2,211,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,939 UART: [kat] ++
2,215,394 UART: [kat] sha1
2,215,906 UART: [kat] SHA2-256
2,216,654 UART: [kat] SHA2-384
2,217,324 UART: [kat] SHA2-512-ACC
2,218,205 UART: [kat] ECC-384
2,946,469 UART: [kat] HMAC-384Kdf
2,971,123 UART: [kat] LMS
3,500,606 UART: [kat] --
3,504,486 UART: [cold-reset] ++
3,506,908 UART: [fht] FHT @ 0x50003400
3,517,512 UART: [idev] ++
3,518,083 UART: [idev] CDI.KEYID = 6
3,518,999 UART: [idev] SUBJECT.KEYID = 7
3,520,183 UART: [idev] UDS.KEYID = 0
3,543,237 UART: [idev] Erasing UDS.KEYID = 0
6,024,452 UART: [idev] Sha1 KeyId Algorithm
6,048,070 UART: [idev] --
6,051,531 UART: [ldev] ++
6,052,141 UART: [ldev] CDI.KEYID = 6
6,053,032 UART: [ldev] SUBJECT.KEYID = 5
6,054,117 UART: [ldev] AUTHORITY.KEYID = 7
6,055,468 UART: [ldev] FE.KEYID = 1
6,090,505 UART: [ldev] Erasing FE.KEYID = 1
8,593,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,972 UART: [ldev] --
10,402,881 UART: [fwproc] Wait for Commands...
10,405,415 UART: [fwproc] Recv command 0x46574c44
10,407,465 UART: [fwproc] Recv'd Img size: 114168 bytes
10,478,961 UART: ROM Fatal Error: 0x000B0009
10,482,053 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,072,375 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,217,069 UART:
2,217,490 UART: Running Caliptra ROM ...
2,218,596 UART:
2,218,757 UART: [state] CFI Enabled
2,219,694 UART: [state] LifecycleState = Unprovisioned
2,221,343 UART: [state] DebugLocked = No
2,222,374 UART: [state] WD Timer not started. Device not locked for debugging
2,224,847 UART: [kat] SHA2-256
2,225,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,228,525 UART: [kat] ++
2,228,975 UART: [kat] sha1
2,229,486 UART: [kat] SHA2-256
2,230,142 UART: [kat] SHA2-384
2,230,796 UART: [kat] SHA2-512-ACC
2,231,627 UART: [kat] ECC-384
2,945,913 UART: [kat] HMAC-384Kdf
2,969,736 UART: [kat] LMS
3,499,184 UART: [kat] --
3,501,689 UART: [cold-reset] ++
3,503,800 UART: [fht] FHT @ 0x50003400
3,514,952 UART: [idev] ++
3,515,515 UART: [idev] CDI.KEYID = 6
3,516,452 UART: [idev] SUBJECT.KEYID = 7
3,517,660 UART: [idev] UDS.KEYID = 0
3,541,716 UART: [idev] Erasing UDS.KEYID = 0
6,025,877 UART: [idev] Sha1 KeyId Algorithm
6,047,714 UART: [idev] --
6,052,033 UART: [ldev] ++
6,052,607 UART: [ldev] CDI.KEYID = 6
6,053,492 UART: [ldev] SUBJECT.KEYID = 5
6,054,708 UART: [ldev] AUTHORITY.KEYID = 7
6,055,947 UART: [ldev] FE.KEYID = 1
6,098,158 UART: [ldev] Erasing FE.KEYID = 1
8,606,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,719 UART: [ldev] --
10,412,181 UART: [fwproc] Wait for Commands...
10,414,173 UART: [fwproc] Recv command 0x46574c44
10,416,267 UART: [fwproc] Recv'd Img size: 114168 bytes
10,486,621 UART: ROM Fatal Error: 0x000B0009
10,489,775 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
2,052,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,197,321 UART:
2,197,737 UART: Running Caliptra ROM ...
2,198,821 UART:
2,198,977 UART: [state] CFI Enabled
2,199,902 UART: [state] LifecycleState = Unprovisioned
2,201,546 UART: [state] DebugLocked = No
2,202,576 UART: [state] WD Timer not started. Device not locked for debugging
2,205,038 UART: [kat] SHA2-256
2,205,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,716 UART: [kat] ++
2,209,162 UART: [kat] sha1
2,209,670 UART: [kat] SHA2-256
2,210,327 UART: [kat] SHA2-384
2,211,003 UART: [kat] SHA2-512-ACC
2,211,842 UART: [kat] ECC-384
2,946,839 UART: [kat] HMAC-384Kdf
2,971,545 UART: [kat] LMS
3,501,010 UART: [kat] --
3,504,952 UART: [cold-reset] ++
3,507,261 UART: [fht] FHT @ 0x50003400
3,517,920 UART: [idev] ++
3,518,486 UART: [idev] CDI.KEYID = 6
3,519,366 UART: [idev] SUBJECT.KEYID = 7
3,520,583 UART: [idev] UDS.KEYID = 0
3,542,988 UART: [idev] Erasing UDS.KEYID = 0
6,027,496 UART: [idev] Sha1 KeyId Algorithm
6,050,034 UART: [idev] --
6,054,066 UART: [ldev] ++
6,054,680 UART: [ldev] CDI.KEYID = 6
6,055,591 UART: [ldev] SUBJECT.KEYID = 5
6,056,760 UART: [ldev] AUTHORITY.KEYID = 7
6,058,000 UART: [ldev] FE.KEYID = 1
6,099,174 UART: [ldev] Erasing FE.KEYID = 1
8,605,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,528 UART: [ldev] --
10,413,860 UART: [fwproc] Wait for Commands...
10,416,613 UART: [fwproc] Recv command 0x46574c44
10,418,710 UART: [fwproc] Recv'd Img size: 114168 bytes
13,820,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,890,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,277,297 >>> mbox cmd response: success
14,281,956 UART: [afmc] ++
14,282,541 UART: [afmc] CDI.KEYID = 6
14,283,421 UART: [afmc] SUBJECT.KEYID = 7
14,284,635 UART: [afmc] AUTHORITY.KEYID = 5
16,819,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,543,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,545,084 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,561,018 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,576,834 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,592,592 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,616,856 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,225,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,253,081 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
2,060,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,253,273 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,058,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,248,725 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,053,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,026,280 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,224,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,369,192 UART:
2,369,602 UART: Running Caliptra ROM ...
2,370,680 UART:
2,370,839 UART: [state] CFI Enabled
2,371,746 UART: [state] LifecycleState = Unprovisioned
2,373,406 UART: [state] DebugLocked = No
2,374,435 UART: [state] WD Timer not started. Device not locked for debugging
2,376,908 UART: [kat] SHA2-256
2,377,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,380,589 UART: [kat] ++
2,381,039 UART: [kat] sha1
2,381,557 UART: [kat] SHA2-256
2,382,294 UART: [kat] SHA2-384
2,382,958 UART: [kat] SHA2-512-ACC
2,383,802 UART: [kat] ECC-384
3,279,142 UART: [kat] HMAC-384Kdf
3,292,235 UART: [kat] LMS
3,821,766 UART: [kat] --
3,825,705 UART: [cold-reset] ++
3,827,848 UART: [fht] FHT @ 0x50003400
3,839,102 UART: [idev] ++
3,839,674 UART: [idev] CDI.KEYID = 6
3,840,583 UART: [idev] SUBJECT.KEYID = 7
3,841,740 UART: [idev] UDS.KEYID = 0
3,859,110 UART: [idev] Erasing UDS.KEYID = 0
6,314,687 UART: [idev] Sha1 KeyId Algorithm
6,336,561 UART: [idev] --
6,341,415 UART: [ldev] ++
6,342,021 UART: [ldev] CDI.KEYID = 6
6,342,910 UART: [ldev] SUBJECT.KEYID = 5
6,344,094 UART: [ldev] AUTHORITY.KEYID = 7
6,345,335 UART: [ldev] FE.KEYID = 1
6,356,545 UART: [ldev] Erasing FE.KEYID = 1
8,829,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,557 UART: [ldev] --
10,619,418 UART: [fwproc] Wait for Commands...
10,621,516 UART: [fwproc] Recv command 0x46574c44
10,623,613 UART: [fwproc] Recv'd Img size: 114168 bytes
10,697,379 UART: ROM Fatal Error: 0x000B0009
10,700,519 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,062,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,206,258 UART:
2,206,661 UART: Running Caliptra ROM ...
2,207,826 UART:
2,208,022 UART: [state] CFI Enabled
2,208,988 UART: [state] LifecycleState = Unprovisioned
2,210,645 UART: [state] DebugLocked = No
2,211,679 UART: [state] WD Timer not started. Device not locked for debugging
2,214,135 UART: [kat] SHA2-256
2,214,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,217,805 UART: [kat] ++
2,218,258 UART: [kat] sha1
2,218,770 UART: [kat] SHA2-256
2,219,511 UART: [kat] SHA2-384
2,220,405 UART: [kat] SHA2-512-ACC
2,221,312 UART: [kat] ECC-384
3,278,809 UART: [kat] HMAC-384Kdf
3,290,930 UART: [kat] LMS
3,820,440 UART: [kat] --
3,824,060 UART: [cold-reset] ++
3,825,825 UART: [fht] FHT @ 0x50003400
3,837,502 UART: [idev] ++
3,838,069 UART: [idev] CDI.KEYID = 6
3,839,033 UART: [idev] SUBJECT.KEYID = 7
3,840,214 UART: [idev] UDS.KEYID = 0
3,856,086 UART: [idev] Erasing UDS.KEYID = 0
6,312,336 UART: [idev] Sha1 KeyId Algorithm
6,336,104 UART: [idev] --
6,339,286 UART: [ldev] ++
6,339,849 UART: [ldev] CDI.KEYID = 6
6,340,757 UART: [ldev] SUBJECT.KEYID = 5
6,341,967 UART: [ldev] AUTHORITY.KEYID = 7
6,343,196 UART: [ldev] FE.KEYID = 1
6,352,918 UART: [ldev] Erasing FE.KEYID = 1
8,827,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,618 UART: [ldev] --
10,618,253 UART: [fwproc] Wait for Commands...
10,621,101 UART: [fwproc] Recv command 0x46574c44
10,623,231 UART: [fwproc] Recv'd Img size: 114168 bytes
10,701,215 UART: ROM Fatal Error: 0x000B0009
10,704,313 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,056,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,200,985 UART:
2,201,400 UART: Running Caliptra ROM ...
2,202,591 UART:
2,202,764 UART: [state] CFI Enabled
2,203,739 UART: [state] LifecycleState = Unprovisioned
2,205,381 UART: [state] DebugLocked = No
2,206,485 UART: [state] WD Timer not started. Device not locked for debugging
2,208,957 UART: [kat] SHA2-256
2,209,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,637 UART: [kat] ++
2,213,085 UART: [kat] sha1
2,213,604 UART: [kat] SHA2-256
2,214,452 UART: [kat] SHA2-384
2,215,120 UART: [kat] SHA2-512-ACC
2,215,968 UART: [kat] ECC-384
3,275,815 UART: [kat] HMAC-384Kdf
3,288,618 UART: [kat] LMS
3,818,085 UART: [kat] --
3,822,796 UART: [cold-reset] ++
3,823,862 UART: [fht] FHT @ 0x50003400
3,834,732 UART: [idev] ++
3,835,289 UART: [idev] CDI.KEYID = 6
3,836,311 UART: [idev] SUBJECT.KEYID = 7
3,837,467 UART: [idev] UDS.KEYID = 0
3,855,606 UART: [idev] Erasing UDS.KEYID = 0
6,311,805 UART: [idev] Sha1 KeyId Algorithm
6,334,608 UART: [idev] --
6,337,293 UART: [ldev] ++
6,337,865 UART: [ldev] CDI.KEYID = 6
6,338,780 UART: [ldev] SUBJECT.KEYID = 5
6,339,940 UART: [ldev] AUTHORITY.KEYID = 7
6,341,166 UART: [ldev] FE.KEYID = 1
6,350,998 UART: [ldev] Erasing FE.KEYID = 1
8,823,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,655 UART: [ldev] --
10,613,158 UART: [fwproc] Wait for Commands...
10,616,387 UART: [fwproc] Recv command 0x46574c44
10,618,482 UART: [fwproc] Recv'd Img size: 114168 bytes
10,686,905 UART: ROM Fatal Error: 0x000B0009
10,690,051 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
2,056,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,200,943 UART:
2,201,347 UART: Running Caliptra ROM ...
2,202,511 UART:
2,202,678 UART: [state] CFI Enabled
2,203,653 UART: [state] LifecycleState = Unprovisioned
2,205,504 UART: [state] DebugLocked = No
2,206,623 UART: [state] WD Timer not started. Device not locked for debugging
2,209,087 UART: [kat] SHA2-256
2,209,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,767 UART: [kat] ++
2,213,217 UART: [kat] sha1
2,213,730 UART: [kat] SHA2-256
2,214,465 UART: [kat] SHA2-384
2,215,150 UART: [kat] SHA2-512-ACC
2,215,957 UART: [kat] ECC-384
3,282,237 UART: [kat] HMAC-384Kdf
3,296,177 UART: [kat] LMS
3,825,689 UART: [kat] --
3,829,922 UART: [cold-reset] ++
3,831,961 UART: [fht] FHT @ 0x50003400
3,843,103 UART: [idev] ++
3,843,672 UART: [idev] CDI.KEYID = 6
3,844,580 UART: [idev] SUBJECT.KEYID = 7
3,845,788 UART: [idev] UDS.KEYID = 0
3,861,762 UART: [idev] Erasing UDS.KEYID = 0
6,319,746 UART: [idev] Sha1 KeyId Algorithm
6,341,951 UART: [idev] --
6,345,237 UART: [ldev] ++
6,345,800 UART: [ldev] CDI.KEYID = 6
6,346,784 UART: [ldev] SUBJECT.KEYID = 5
6,347,944 UART: [ldev] AUTHORITY.KEYID = 7
6,349,177 UART: [ldev] FE.KEYID = 1
6,361,096 UART: [ldev] Erasing FE.KEYID = 1
8,835,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,343 UART: [ldev] --
10,627,862 UART: [fwproc] Wait for Commands...
10,629,738 UART: [fwproc] Recv command 0x46574c44
10,631,830 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,099,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,485,076 >>> mbox cmd response: success
14,490,224 UART: [afmc] ++
14,490,825 UART: [afmc] CDI.KEYID = 6
14,491,711 UART: [afmc] SUBJECT.KEYID = 7
14,492,863 UART: [afmc] AUTHORITY.KEYID = 5
16,989,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,574 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,729,533 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,745,392 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,761,156 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,783,052 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,490 writing to cptra_bootfsm_go
2,224,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,476,941 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,060,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,474,344 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
2,056,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,479,349 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,055,533 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,274,015 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,588 UART: [kat] HMAC-384Kdf
921,212 UART: [kat] LMS
1,169,524 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,732 UART: [ldev] ++
1,208,900 UART: [ldev] CDI.KEYID = 6
1,209,264 UART: [ldev] SUBJECT.KEYID = 5
1,209,691 UART: [ldev] AUTHORITY.KEYID = 7
1,210,154 UART: [ldev] FE.KEYID = 1
1,215,546 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,232 UART: [ldev] --
1,280,532 UART: [fwproc] Wait for Commands...
1,281,307 UART: [fwproc] Recv command 0x46574c44
1,282,040 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,192 UART: ROM Fatal Error: 0x000B0009
1,308,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
86,025 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,063 UART: [kat] ++
895,215 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,776 UART: [kat] HMAC-384Kdf
920,126 UART: [kat] LMS
1,168,438 UART: [kat] --
1,169,195 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,499 UART: [idev] ++
1,172,667 UART: [idev] CDI.KEYID = 6
1,173,028 UART: [idev] SUBJECT.KEYID = 7
1,173,453 UART: [idev] UDS.KEYID = 0
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,214,918 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,964 UART: [ldev] --
1,280,430 UART: [fwproc] Wait for Commands...
1,281,063 UART: [fwproc] Recv command 0x46574c44
1,281,796 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,892 UART: ROM Fatal Error: 0x000B0009
1,308,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,871 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,209,096 UART: [ldev] ++
1,209,264 UART: [ldev] CDI.KEYID = 6
1,209,628 UART: [ldev] SUBJECT.KEYID = 5
1,210,055 UART: [ldev] AUTHORITY.KEYID = 7
1,210,518 UART: [ldev] FE.KEYID = 1
1,215,746 UART: [ldev] Erasing FE.KEYID = 1
1,242,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,486 UART: [ldev] --
1,282,000 UART: [fwproc] Wait for Commands...
1,282,603 UART: [fwproc] Recv command 0x46574c44
1,283,336 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,140 UART: ROM Fatal Error: 0x000B0009
1,309,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,147 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,105 UART: [idev] ++
1,173,273 UART: [idev] CDI.KEYID = 6
1,173,634 UART: [idev] SUBJECT.KEYID = 7
1,174,059 UART: [idev] UDS.KEYID = 0
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,438 UART: [ldev] ++
1,208,606 UART: [ldev] CDI.KEYID = 6
1,208,970 UART: [ldev] SUBJECT.KEYID = 5
1,209,397 UART: [ldev] AUTHORITY.KEYID = 7
1,209,860 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,734 UART: [ldev] --
1,281,046 UART: [fwproc] Wait for Commands...
1,281,719 UART: [fwproc] Recv command 0x46574c44
1,282,452 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,666 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,975 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,493 >>> mbox cmd response: success
2,771,678 UART: [afmc] ++
2,771,846 UART: [afmc] CDI.KEYID = 6
2,772,209 UART: [afmc] SUBJECT.KEYID = 7
2,772,635 UART: [afmc] AUTHORITY.KEYID = 5
2,807,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,113 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,826 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,735 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,449 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,286 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,076 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,855 UART: [state] LifecycleState = Unprovisioned
86,510 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,884 UART: [kat] ++
896,036 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
905,123 UART: [kat] SHA2-512-ACC
907,024 UART: [kat] ECC-384
916,795 UART: [kat] HMAC-384Kdf
921,303 UART: [kat] LMS
1,169,615 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,774 UART: [idev] ++
1,173,942 UART: [idev] CDI.KEYID = 6
1,174,303 UART: [idev] SUBJECT.KEYID = 7
1,174,728 UART: [idev] UDS.KEYID = 0
1,182,860 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,273 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,221 UART: [ldev] --
1,282,723 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,247 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,209 UART: ROM Fatal Error: 0x000B0009
1,310,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,170,130 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,824 UART: [idev] Sha1 KeyId Algorithm
1,208,706 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,741 UART: [ldev] --
1,283,081 UART: [fwproc] Wait for Commands...
1,283,668 UART: [fwproc] Recv command 0x46574c44
1,284,401 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,355 UART: ROM Fatal Error: 0x000B0009
1,310,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,146 UART: [kat] SHA2-256
902,086 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,304 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,873 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,351 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,377 UART: ROM Fatal Error: 0x000B0009
1,309,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,181,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,207,996 UART: [idev] --
1,209,071 UART: [ldev] ++
1,209,239 UART: [ldev] CDI.KEYID = 6
1,209,603 UART: [ldev] SUBJECT.KEYID = 5
1,210,030 UART: [ldev] AUTHORITY.KEYID = 7
1,210,493 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,795 UART: [ldev] --
1,281,265 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,221 >>> mbox cmd response: success
2,772,450 UART: [afmc] ++
2,772,618 UART: [afmc] CDI.KEYID = 6
2,772,981 UART: [afmc] SUBJECT.KEYID = 7
2,773,407 UART: [afmc] AUTHORITY.KEYID = 5
2,809,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,819 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,532 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,441 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,155 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,148 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,585 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Unprovisioned
86,135 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,895 UART: [idev] ++
1,173,063 UART: [idev] CDI.KEYID = 6
1,173,424 UART: [idev] SUBJECT.KEYID = 7
1,173,849 UART: [idev] UDS.KEYID = 0
1,181,683 UART: [idev] Erasing UDS.KEYID = 0
1,198,873 UART: [idev] Sha1 KeyId Algorithm
1,207,789 UART: [idev] --
1,208,710 UART: [ldev] ++
1,208,878 UART: [ldev] CDI.KEYID = 6
1,209,242 UART: [ldev] SUBJECT.KEYID = 5
1,209,669 UART: [ldev] AUTHORITY.KEYID = 7
1,210,132 UART: [ldev] FE.KEYID = 1
1,215,242 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,440 UART: [ldev] --
1,280,722 UART: [fwproc] Wait for Commands...
1,281,335 UART: [fwproc] Recv command 0x46574c44
1,282,068 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,562 UART: ROM Fatal Error: 0x000B0009
1,308,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
916,506 UART: [kat] HMAC-384Kdf
921,094 UART: [kat] LMS
1,169,406 UART: [kat] --
1,170,445 UART: [cold-reset] ++
1,170,915 UART: [fht] FHT @ 0x50003400
1,173,549 UART: [idev] ++
1,173,717 UART: [idev] CDI.KEYID = 6
1,174,078 UART: [idev] SUBJECT.KEYID = 7
1,174,503 UART: [idev] UDS.KEYID = 0
1,182,603 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,207,949 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,412 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,816 UART: [ldev] --
1,281,218 UART: [fwproc] Wait for Commands...
1,281,987 UART: [fwproc] Recv command 0x46574c44
1,282,720 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,472 UART: ROM Fatal Error: 0x000B0009
1,308,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,637 UART: [kat] SHA2-256
901,577 UART: [kat] SHA2-384
904,476 UART: [kat] SHA2-512-ACC
906,377 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,583 UART: [fht] FHT @ 0x50003400
1,173,115 UART: [idev] ++
1,173,283 UART: [idev] CDI.KEYID = 6
1,173,644 UART: [idev] SUBJECT.KEYID = 7
1,174,069 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,877 UART: [idev] Sha1 KeyId Algorithm
1,207,817 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,362 UART: [ldev] Erasing FE.KEYID = 1
1,241,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,216 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,182 UART: ROM Fatal Error: 0x000B0009
1,309,339 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,592 UART: [kat] SHA2-512-ACC
906,493 UART: [kat] ECC-384
916,460 UART: [kat] HMAC-384Kdf
921,280 UART: [kat] LMS
1,169,592 UART: [kat] --
1,170,415 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,181,823 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,532 UART: [ldev] ++
1,208,700 UART: [ldev] CDI.KEYID = 6
1,209,064 UART: [ldev] SUBJECT.KEYID = 5
1,209,491 UART: [ldev] AUTHORITY.KEYID = 7
1,209,954 UART: [ldev] FE.KEYID = 1
1,215,278 UART: [ldev] Erasing FE.KEYID = 1
1,241,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,824 UART: [ldev] --
1,280,264 UART: [fwproc] Wait for Commands...
1,280,843 UART: [fwproc] Recv command 0x46574c44
1,281,576 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,754 >>> mbox cmd response: success
2,769,895 UART: [afmc] ++
2,770,063 UART: [afmc] CDI.KEYID = 6
2,770,426 UART: [afmc] SUBJECT.KEYID = 7
2,770,852 UART: [afmc] AUTHORITY.KEYID = 5
2,806,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,386 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,099 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,008 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,722 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,543 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,926 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,127 UART: [state] LifecycleState = Unprovisioned
86,782 UART: [state] DebugLocked = No
87,430 UART: [state] WD Timer not started. Device not locked for debugging
88,681 UART: [kat] SHA2-256
892,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,360 UART: [kat] ++
896,512 UART: [kat] sha1
900,904 UART: [kat] SHA2-256
902,844 UART: [kat] SHA2-384
905,755 UART: [kat] SHA2-512-ACC
907,656 UART: [kat] ECC-384
917,393 UART: [kat] HMAC-384Kdf
922,177 UART: [kat] LMS
1,170,489 UART: [kat] --
1,171,160 UART: [cold-reset] ++
1,171,724 UART: [fht] FHT @ 0x50003400
1,174,344 UART: [idev] ++
1,174,512 UART: [idev] CDI.KEYID = 6
1,174,873 UART: [idev] SUBJECT.KEYID = 7
1,175,298 UART: [idev] UDS.KEYID = 0
1,183,254 UART: [idev] Erasing UDS.KEYID = 0
1,200,472 UART: [idev] Sha1 KeyId Algorithm
1,209,248 UART: [idev] --
1,210,419 UART: [ldev] ++
1,210,587 UART: [ldev] CDI.KEYID = 6
1,210,951 UART: [ldev] SUBJECT.KEYID = 5
1,211,378 UART: [ldev] AUTHORITY.KEYID = 7
1,211,841 UART: [ldev] FE.KEYID = 1
1,217,259 UART: [ldev] Erasing FE.KEYID = 1
1,243,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,663 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,822 UART: [fwproc] Recv command 0x46574c44
1,284,555 UART: [fwproc] Recv'd Img size: 114168 bytes
1,310,117 UART: ROM Fatal Error: 0x000B0009
1,311,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,739 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,588 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,854 UART: [idev] ++
1,174,022 UART: [idev] CDI.KEYID = 6
1,174,383 UART: [idev] SUBJECT.KEYID = 7
1,174,808 UART: [idev] UDS.KEYID = 0
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,200,272 UART: [idev] Sha1 KeyId Algorithm
1,209,122 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,799 UART: [fwproc] Wait for Commands...
1,282,542 UART: [fwproc] Recv command 0x46574c44
1,283,275 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,067 UART: ROM Fatal Error: 0x000B0009
1,310,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
915,717 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,326 UART: [cold-reset] ++
1,169,794 UART: [fht] FHT @ 0x50003400
1,172,646 UART: [idev] ++
1,172,814 UART: [idev] CDI.KEYID = 6
1,173,175 UART: [idev] SUBJECT.KEYID = 7
1,173,600 UART: [idev] UDS.KEYID = 0
1,181,650 UART: [idev] Erasing UDS.KEYID = 0
1,198,760 UART: [idev] Sha1 KeyId Algorithm
1,207,596 UART: [idev] --
1,208,693 UART: [ldev] ++
1,208,861 UART: [ldev] CDI.KEYID = 6
1,209,225 UART: [ldev] SUBJECT.KEYID = 5
1,209,652 UART: [ldev] AUTHORITY.KEYID = 7
1,210,115 UART: [ldev] FE.KEYID = 1
1,215,329 UART: [ldev] Erasing FE.KEYID = 1
1,241,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,275 UART: [ldev] --
1,280,625 UART: [fwproc] Wait for Commands...
1,281,244 UART: [fwproc] Recv command 0x46574c44
1,281,977 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,315 UART: ROM Fatal Error: 0x000B0009
1,308,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,527 UART: [kat] SHA2-512-ACC
906,428 UART: [kat] ECC-384
916,209 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,182,030 UART: [idev] Erasing UDS.KEYID = 0
1,199,176 UART: [idev] Sha1 KeyId Algorithm
1,208,242 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,216,121 UART: [ldev] Erasing FE.KEYID = 1
1,241,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,897 UART: [ldev] --
1,281,223 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,723 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,541 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,189 >>> mbox cmd response: success
2,771,352 UART: [afmc] ++
2,771,520 UART: [afmc] CDI.KEYID = 6
2,771,883 UART: [afmc] SUBJECT.KEYID = 7
2,772,309 UART: [afmc] AUTHORITY.KEYID = 5
2,807,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,891 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,604 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,513 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,227 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,162 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,709 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
890,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,017 UART: [kat] ++
895,169 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,660 UART: [kat] HMAC-384Kdf
920,370 UART: [kat] LMS
1,168,682 UART: [kat] --
1,169,595 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,494 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,593 UART: [fwproc] Recv command 0x46574c44
1,282,326 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,706 UART: ROM Fatal Error: 0x000B0009
1,307,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
88,148 UART: [kat] SHA2-256
891,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,827 UART: [kat] ++
895,979 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,055 UART: [cold-reset] ++
1,170,589 UART: [fht] FHT @ 0x50003400
1,173,233 UART: [idev] ++
1,173,401 UART: [idev] CDI.KEYID = 6
1,173,762 UART: [idev] SUBJECT.KEYID = 7
1,174,187 UART: [idev] UDS.KEYID = 0
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,199,271 UART: [idev] Sha1 KeyId Algorithm
1,207,983 UART: [idev] --
1,209,026 UART: [ldev] ++
1,209,194 UART: [ldev] CDI.KEYID = 6
1,209,558 UART: [ldev] SUBJECT.KEYID = 5
1,209,985 UART: [ldev] AUTHORITY.KEYID = 7
1,210,448 UART: [ldev] FE.KEYID = 1
1,215,776 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,280,846 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,780 UART: ROM Fatal Error: 0x000B0009
1,308,937 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,608 UART: [state] LifecycleState = Unprovisioned
86,263 UART: [state] DebugLocked = No
86,979 UART: [state] WD Timer not started. Device not locked for debugging
88,312 UART: [kat] SHA2-256
891,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,991 UART: [kat] ++
896,143 UART: [kat] sha1
900,449 UART: [kat] SHA2-256
902,389 UART: [kat] SHA2-384
905,158 UART: [kat] SHA2-512-ACC
907,059 UART: [kat] ECC-384
916,714 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,337 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,182,339 UART: [idev] Erasing UDS.KEYID = 0
1,199,557 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,708 UART: [ldev] ++
1,209,876 UART: [ldev] CDI.KEYID = 6
1,210,240 UART: [ldev] SUBJECT.KEYID = 5
1,210,667 UART: [ldev] AUTHORITY.KEYID = 7
1,211,130 UART: [ldev] FE.KEYID = 1
1,216,424 UART: [ldev] Erasing FE.KEYID = 1
1,242,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,382 UART: [ldev] --
1,281,706 UART: [fwproc] Wait for Commands...
1,282,349 UART: [fwproc] Recv command 0x46574c44
1,283,082 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,310 UART: ROM Fatal Error: 0x000B0009
1,308,467 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,985 UART: [kat] ++
895,137 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,104 UART: [kat] SHA2-512-ACC
906,005 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,492 UART: [kat] LMS
1,168,804 UART: [kat] --
1,169,521 UART: [cold-reset] ++
1,169,853 UART: [fht] FHT @ 0x50003400
1,172,387 UART: [idev] ++
1,172,555 UART: [idev] CDI.KEYID = 6
1,172,916 UART: [idev] SUBJECT.KEYID = 7
1,173,341 UART: [idev] UDS.KEYID = 0
1,181,307 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,712 UART: [ldev] Erasing FE.KEYID = 1
1,241,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,292 UART: [ldev] --
1,280,580 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46574c44
1,282,090 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,193 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,092 >>> mbox cmd response: success
2,771,277 UART: [afmc] ++
2,771,445 UART: [afmc] CDI.KEYID = 6
2,771,808 UART: [afmc] SUBJECT.KEYID = 7
2,772,234 UART: [afmc] AUTHORITY.KEYID = 5
2,807,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,953 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,704 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,417 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,326 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,040 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,847 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,606 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,198,766 UART: [idev] Sha1 KeyId Algorithm
1,207,596 UART: [idev] --
1,208,553 UART: [ldev] ++
1,208,721 UART: [ldev] CDI.KEYID = 6
1,209,085 UART: [ldev] SUBJECT.KEYID = 5
1,209,512 UART: [ldev] AUTHORITY.KEYID = 7
1,209,975 UART: [ldev] FE.KEYID = 1
1,215,199 UART: [ldev] Erasing FE.KEYID = 1
1,241,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,159 UART: [ldev] --
1,280,633 UART: [fwproc] Wait for Commands...
1,281,236 UART: [fwproc] Recv command 0x46574c44
1,281,969 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,215 UART: ROM Fatal Error: 0x000B0009
1,308,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,182,520 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,697 UART: [ldev] ++
1,208,865 UART: [ldev] CDI.KEYID = 6
1,209,229 UART: [ldev] SUBJECT.KEYID = 5
1,209,656 UART: [ldev] AUTHORITY.KEYID = 7
1,210,119 UART: [ldev] FE.KEYID = 1
1,215,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,653 UART: [fwproc] Wait for Commands...
1,282,286 UART: [fwproc] Recv command 0x46574c44
1,283,019 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,225 UART: ROM Fatal Error: 0x000B0009
1,309,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,737 UART: [kat] SHA2-512-ACC
906,638 UART: [kat] ECC-384
916,607 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,950 UART: [fht] FHT @ 0x50003400
1,173,368 UART: [idev] ++
1,173,536 UART: [idev] CDI.KEYID = 6
1,173,897 UART: [idev] SUBJECT.KEYID = 7
1,174,322 UART: [idev] UDS.KEYID = 0
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,414 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,243 UART: [ldev] ++
1,209,411 UART: [ldev] CDI.KEYID = 6
1,209,775 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,281,971 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,351 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,871 UART: ROM Fatal Error: 0x000B0009
1,310,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,529 UART: [kat] HMAC-384Kdf
921,403 UART: [kat] LMS
1,169,715 UART: [kat] --
1,170,478 UART: [cold-reset] ++
1,170,902 UART: [fht] FHT @ 0x50003400
1,173,530 UART: [idev] ++
1,173,698 UART: [idev] CDI.KEYID = 6
1,174,059 UART: [idev] SUBJECT.KEYID = 7
1,174,484 UART: [idev] UDS.KEYID = 0
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,208,932 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,703 UART: [ldev] SUBJECT.KEYID = 5
1,211,130 UART: [ldev] AUTHORITY.KEYID = 7
1,211,593 UART: [ldev] FE.KEYID = 1
1,216,695 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,733 UART: [fwproc] Wait for Commands...
1,283,396 UART: [fwproc] Recv command 0x46574c44
1,284,129 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,233 >>> mbox cmd response: success
2,774,336 UART: [afmc] ++
2,774,504 UART: [afmc] CDI.KEYID = 6
2,774,867 UART: [afmc] SUBJECT.KEYID = 7
2,775,293 UART: [afmc] AUTHORITY.KEYID = 5
2,811,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,961 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,834,674 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,840,583 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,846,297 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,854,044 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,645 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
6,021 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,299 UART:
192,685 UART: Running Caliptra ROM ...
193,825 UART:
193,976 UART: [state] CFI Enabled
263,528 UART: [state] LifecycleState = Unprovisioned
265,943 UART: [state] DebugLocked = No
268,082 UART: [state] WD Timer not started. Device not locked for debugging
272,261 UART: [kat] SHA2-256
454,198 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,707 UART: [kat] ++
466,177 UART: [kat] sha1
476,380 UART: [kat] SHA2-256
479,397 UART: [kat] SHA2-384
486,990 UART: [kat] SHA2-512-ACC
489,599 UART: [kat] ECC-384
3,775,774 UART: [kat] HMAC-384Kdf
3,801,575 UART: [kat] LMS
4,874,708 UART: [kat] --
4,879,402 UART: [cold-reset] ++
4,881,445 UART: [fht] FHT @ 0x50003400
4,891,613 UART: [idev] ++
4,892,339 UART: [idev] CDI.KEYID = 6
4,893,444 UART: [idev] SUBJECT.KEYID = 7
4,894,655 UART: [idev] UDS.KEYID = 0
4,929,125 UART: [idev] Erasing UDS.KEYID = 0
8,241,682 UART: [idev] Sha1 KeyId Algorithm
8,262,507 UART: [idev] --
8,266,577 UART: [ldev] ++
8,267,147 UART: [ldev] CDI.KEYID = 6
8,268,381 UART: [ldev] SUBJECT.KEYID = 5
8,269,480 UART: [ldev] AUTHORITY.KEYID = 7
8,270,708 UART: [ldev] FE.KEYID = 1
8,316,360 UART: [ldev] Erasing FE.KEYID = 1
11,652,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,791 UART: [ldev] --
14,035,358 UART: [fwproc] Wait for Commands...
14,037,728 UART: [fwproc] Recv command 0x46574c44
14,040,052 UART: [fwproc] Recv'd Img size: 113844 bytes
18,106,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,182,825 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,251,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,568,248 >>> mbox cmd response: success
18,572,747 UART: [afmc] ++
18,573,328 UART: [afmc] CDI.KEYID = 6
18,574,510 UART: [afmc] SUBJECT.KEYID = 7
18,575,665 UART: [afmc] AUTHORITY.KEYID = 5
21,947,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,247,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,249,973 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,266,115 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,282,178 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,298,180 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,321,220 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
5,868 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,341,596 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
6,477 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,531 UART:
192,927 UART: Running Caliptra ROM ...
194,031 UART:
603,631 UART: [state] CFI Enabled
615,411 UART: [state] LifecycleState = Unprovisioned
617,773 UART: [state] DebugLocked = No
620,250 UART: [state] WD Timer not started. Device not locked for debugging
624,409 UART: [kat] SHA2-256
806,374 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,956 UART: [kat] ++
818,475 UART: [kat] sha1
829,131 UART: [kat] SHA2-256
832,184 UART: [kat] SHA2-384
836,799 UART: [kat] SHA2-512-ACC
839,402 UART: [kat] ECC-384
4,094,390 UART: [kat] HMAC-384Kdf
4,106,429 UART: [kat] LMS
5,179,539 UART: [kat] --
5,184,998 UART: [cold-reset] ++
5,187,197 UART: [fht] FHT @ 0x50003400
5,199,195 UART: [idev] ++
5,199,872 UART: [idev] CDI.KEYID = 6
5,201,101 UART: [idev] SUBJECT.KEYID = 7
5,202,523 UART: [idev] UDS.KEYID = 0
5,220,386 UART: [idev] Erasing UDS.KEYID = 0
8,493,710 UART: [idev] Sha1 KeyId Algorithm
8,515,302 UART: [idev] --
8,518,326 UART: [ldev] ++
8,518,891 UART: [ldev] CDI.KEYID = 6
8,520,122 UART: [ldev] SUBJECT.KEYID = 5
8,521,553 UART: [ldev] AUTHORITY.KEYID = 7
8,523,035 UART: [ldev] FE.KEYID = 1
8,532,495 UART: [ldev] Erasing FE.KEYID = 1
11,823,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,130,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,181,708 UART: [ldev] --
14,186,875 UART: [fwproc] Wait for Commands...
14,188,590 UART: [fwproc] Recv command 0x46574c44
14,190,899 UART: [fwproc] Recv'd Img size: 113844 bytes
18,259,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,331,519 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,400,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,716,480 >>> mbox cmd response: success
18,720,017 UART: [afmc] ++
18,720,603 UART: [afmc] CDI.KEYID = 6
18,721,759 UART: [afmc] SUBJECT.KEYID = 7
18,722,965 UART: [afmc] AUTHORITY.KEYID = 5
22,045,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,342,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,344,808 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,360,968 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,377,064 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,392,992 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,415,818 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
6,011 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,537,320 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
5,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,052 UART:
192,477 UART: Running Caliptra ROM ...
193,668 UART:
193,832 UART: [state] CFI Enabled
260,836 UART: [state] LifecycleState = Unprovisioned
262,695 UART: [state] DebugLocked = No
264,623 UART: [state] WD Timer not started. Device not locked for debugging
268,782 UART: [kat] SHA2-256
447,877 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,471 UART: [kat] ++
459,999 UART: [kat] sha1
470,986 UART: [kat] SHA2-256
474,059 UART: [kat] SHA2-384
480,904 UART: [kat] SHA2-512-ACC
483,841 UART: [kat] ECC-384
2,945,038 UART: [kat] HMAC-384Kdf
2,968,241 UART: [kat] LMS
3,497,675 UART: [kat] --
3,501,938 UART: [cold-reset] ++
3,503,272 UART: [fht] FHT @ 0x50003400
3,515,677 UART: [idev] ++
3,516,240 UART: [idev] CDI.KEYID = 6
3,517,177 UART: [idev] SUBJECT.KEYID = 7
3,518,389 UART: [idev] UDS.KEYID = 0
3,540,336 UART: [idev] Erasing UDS.KEYID = 0
6,023,640 UART: [idev] Sha1 KeyId Algorithm
6,047,605 UART: [idev] --
6,051,819 UART: [ldev] ++
6,052,394 UART: [ldev] CDI.KEYID = 6
6,053,276 UART: [ldev] SUBJECT.KEYID = 5
6,054,494 UART: [ldev] AUTHORITY.KEYID = 7
6,055,790 UART: [ldev] FE.KEYID = 1
6,097,798 UART: [ldev] Erasing FE.KEYID = 1
8,599,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,311 UART: [ldev] --
10,409,066 UART: [fwproc] Wait for Commands...
10,411,549 UART: [fwproc] Recv command 0x46574c44
10,413,592 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,275,346 >>> mbox cmd response: success
14,278,729 UART: [afmc] ++
14,279,329 UART: [afmc] CDI.KEYID = 6
14,280,214 UART: [afmc] SUBJECT.KEYID = 7
14,281,448 UART: [afmc] AUTHORITY.KEYID = 5
16,823,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,785 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,232 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
5,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,040,256 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
6,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,377 UART:
192,751 UART: Running Caliptra ROM ...
193,886 UART:
603,645 UART: [state] CFI Enabled
615,313 UART: [state] LifecycleState = Unprovisioned
617,139 UART: [state] DebugLocked = No
619,974 UART: [state] WD Timer not started. Device not locked for debugging
623,093 UART: [kat] SHA2-256
802,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,794 UART: [kat] ++
814,240 UART: [kat] sha1
826,785 UART: [kat] SHA2-256
829,844 UART: [kat] SHA2-384
837,551 UART: [kat] SHA2-512-ACC
840,530 UART: [kat] ECC-384
3,282,329 UART: [kat] HMAC-384Kdf
3,293,803 UART: [kat] LMS
3,823,320 UART: [kat] --
3,827,478 UART: [cold-reset] ++
3,829,193 UART: [fht] FHT @ 0x50003400
3,840,011 UART: [idev] ++
3,840,581 UART: [idev] CDI.KEYID = 6
3,841,490 UART: [idev] SUBJECT.KEYID = 7
3,842,705 UART: [idev] UDS.KEYID = 0
3,860,222 UART: [idev] Erasing UDS.KEYID = 0
6,318,115 UART: [idev] Sha1 KeyId Algorithm
6,341,012 UART: [idev] --
6,345,273 UART: [ldev] ++
6,345,838 UART: [ldev] CDI.KEYID = 6
6,346,744 UART: [ldev] SUBJECT.KEYID = 5
6,347,956 UART: [ldev] AUTHORITY.KEYID = 7
6,349,202 UART: [ldev] FE.KEYID = 1
6,359,747 UART: [ldev] Erasing FE.KEYID = 1
8,833,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,807 UART: [ldev] --
10,621,853 UART: [fwproc] Wait for Commands...
10,623,947 UART: [fwproc] Recv command 0x46574c44
10,625,987 UART: [fwproc] Recv'd Img size: 114168 bytes
14,021,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,089,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,158,479 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,475,215 >>> mbox cmd response: success
14,478,834 UART: [afmc] ++
14,479,432 UART: [afmc] CDI.KEYID = 6
14,480,341 UART: [afmc] SUBJECT.KEYID = 7
14,481,494 UART: [afmc] AUTHORITY.KEYID = 5
16,977,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,699,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,701,495 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,717,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,733,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,749,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,772,746 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
6,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,403 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
5,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,188 UART:
192,569 UART: Running Caliptra ROM ...
193,752 UART:
193,910 UART: [state] CFI Enabled
261,259 UART: [state] LifecycleState = Unprovisioned
263,129 UART: [state] DebugLocked = No
265,272 UART: [state] WD Timer not started. Device not locked for debugging
269,213 UART: [kat] SHA2-256
448,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,907 UART: [kat] ++
460,358 UART: [kat] sha1
471,832 UART: [kat] SHA2-256
474,884 UART: [kat] SHA2-384
480,924 UART: [kat] SHA2-512-ACC
483,911 UART: [kat] ECC-384
2,947,059 UART: [kat] HMAC-384Kdf
2,968,618 UART: [kat] LMS
3,498,031 UART: [kat] --
3,501,807 UART: [cold-reset] ++
3,502,821 UART: [fht] FHT @ 0x50003400
3,514,556 UART: [idev] ++
3,515,168 UART: [idev] CDI.KEYID = 6
3,516,097 UART: [idev] SUBJECT.KEYID = 7
3,517,259 UART: [idev] UDS.KEYID = 0
3,541,357 UART: [idev] Erasing UDS.KEYID = 0
6,027,996 UART: [idev] Sha1 KeyId Algorithm
6,050,927 UART: [idev] --
6,055,905 UART: [ldev] ++
6,056,481 UART: [ldev] CDI.KEYID = 6
6,057,397 UART: [ldev] SUBJECT.KEYID = 5
6,058,618 UART: [ldev] AUTHORITY.KEYID = 7
6,059,775 UART: [ldev] FE.KEYID = 1
6,098,440 UART: [ldev] Erasing FE.KEYID = 1
8,602,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,533 UART: [ldev] --
10,410,995 UART: [fwproc] Wait for Commands...
10,412,954 UART: [fwproc] Recv command 0x46574c44
10,415,058 UART: [fwproc] Recv'd Img size: 114168 bytes
13,816,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,277,388 >>> mbox cmd response: success
14,282,220 UART: [afmc] ++
14,282,811 UART: [afmc] CDI.KEYID = 6
14,283,881 UART: [afmc] SUBJECT.KEYID = 7
14,284,992 UART: [afmc] AUTHORITY.KEYID = 5
16,820,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,542,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,544,389 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,560,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,576,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,592,057 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,614,433 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
5,642 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,063,769 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
6,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,469 UART:
192,866 UART: Running Caliptra ROM ...
193,986 UART:
603,810 UART: [state] CFI Enabled
617,556 UART: [state] LifecycleState = Unprovisioned
619,438 UART: [state] DebugLocked = No
620,596 UART: [state] WD Timer not started. Device not locked for debugging
624,586 UART: [kat] SHA2-256
803,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,282 UART: [kat] ++
815,811 UART: [kat] sha1
826,045 UART: [kat] SHA2-256
829,060 UART: [kat] SHA2-384
834,280 UART: [kat] SHA2-512-ACC
837,205 UART: [kat] ECC-384
3,275,692 UART: [kat] HMAC-384Kdf
3,289,149 UART: [kat] LMS
3,818,638 UART: [kat] --
3,822,972 UART: [cold-reset] ++
3,824,582 UART: [fht] FHT @ 0x50003400
3,835,805 UART: [idev] ++
3,836,368 UART: [idev] CDI.KEYID = 6
3,837,271 UART: [idev] SUBJECT.KEYID = 7
3,838,483 UART: [idev] UDS.KEYID = 0
3,851,574 UART: [idev] Erasing UDS.KEYID = 0
6,310,866 UART: [idev] Sha1 KeyId Algorithm
6,334,470 UART: [idev] --
6,338,681 UART: [ldev] ++
6,339,245 UART: [ldev] CDI.KEYID = 6
6,340,147 UART: [ldev] SUBJECT.KEYID = 5
6,341,355 UART: [ldev] AUTHORITY.KEYID = 7
6,342,584 UART: [ldev] FE.KEYID = 1
6,351,394 UART: [ldev] Erasing FE.KEYID = 1
8,823,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,425 UART: [ldev] --
10,610,321 UART: [fwproc] Wait for Commands...
10,612,914 UART: [fwproc] Recv command 0x46574c44
10,615,008 UART: [fwproc] Recv'd Img size: 114168 bytes
14,015,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,085,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,153,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,470,885 >>> mbox cmd response: success
14,475,492 UART: [afmc] ++
14,476,074 UART: [afmc] CDI.KEYID = 6
14,476,988 UART: [afmc] SUBJECT.KEYID = 7
14,478,142 UART: [afmc] AUTHORITY.KEYID = 5
16,976,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,696,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,698,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,713,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,729,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,745,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,767,166 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
6,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,798 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,930 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,551 UART: [cold-reset] ++
1,170,077 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,181,943 UART: [idev] Erasing UDS.KEYID = 0
1,199,107 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,938 UART: [ldev] Erasing FE.KEYID = 1
1,241,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,882 UART: [ldev] --
1,281,318 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,661 >>> mbox cmd response: success
2,771,740 UART: [afmc] ++
2,771,908 UART: [afmc] CDI.KEYID = 6
2,772,271 UART: [afmc] SUBJECT.KEYID = 7
2,772,697 UART: [afmc] AUTHORITY.KEYID = 5
2,808,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,418 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,301 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,020 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,851 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,319 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,898 UART: [kat] ++
896,050 UART: [kat] sha1
900,484 UART: [kat] SHA2-256
902,424 UART: [kat] SHA2-384
905,135 UART: [kat] SHA2-512-ACC
907,036 UART: [kat] ECC-384
917,347 UART: [kat] HMAC-384Kdf
921,923 UART: [kat] LMS
1,170,235 UART: [kat] --
1,170,792 UART: [cold-reset] ++
1,171,180 UART: [fht] FHT @ 0x50003400
1,173,938 UART: [idev] ++
1,174,106 UART: [idev] CDI.KEYID = 6
1,174,467 UART: [idev] SUBJECT.KEYID = 7
1,174,892 UART: [idev] UDS.KEYID = 0
1,182,748 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,970 UART: [idev] --
1,210,133 UART: [ldev] ++
1,210,301 UART: [ldev] CDI.KEYID = 6
1,210,665 UART: [ldev] SUBJECT.KEYID = 5
1,211,092 UART: [ldev] AUTHORITY.KEYID = 7
1,211,555 UART: [ldev] FE.KEYID = 1
1,216,809 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,423 UART: [fwproc] Wait for Commands...
1,283,070 UART: [fwproc] Recv command 0x46574c44
1,283,803 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,251 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,084 >>> mbox cmd response: success
2,772,137 UART: [afmc] ++
2,772,305 UART: [afmc] CDI.KEYID = 6
2,772,668 UART: [afmc] SUBJECT.KEYID = 7
2,773,094 UART: [afmc] AUTHORITY.KEYID = 5
2,808,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,535 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,418 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,866 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,326 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,587 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,208,073 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,964 UART: [ldev] --
1,281,310 UART: [fwproc] Wait for Commands...
1,282,025 UART: [fwproc] Recv command 0x46574c44
1,282,758 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,643 >>> mbox cmd response: success
2,771,814 UART: [afmc] ++
2,771,982 UART: [afmc] CDI.KEYID = 6
2,772,345 UART: [afmc] SUBJECT.KEYID = 7
2,772,771 UART: [afmc] AUTHORITY.KEYID = 5
2,808,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,653 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,647 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,250 UART: [kat] SHA2-256
902,190 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
917,079 UART: [kat] HMAC-384Kdf
921,719 UART: [kat] LMS
1,170,031 UART: [kat] --
1,170,966 UART: [cold-reset] ++
1,171,484 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,711 UART: [idev] SUBJECT.KEYID = 7
1,175,136 UART: [idev] UDS.KEYID = 0
1,183,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,592 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,701 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,866 UART: [fwproc] Recv command 0x46574c44
1,283,599 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,440 >>> mbox cmd response: success
2,774,631 UART: [afmc] ++
2,774,799 UART: [afmc] CDI.KEYID = 6
2,775,162 UART: [afmc] SUBJECT.KEYID = 7
2,775,588 UART: [afmc] AUTHORITY.KEYID = 5
2,811,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,349 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,232 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,951 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,648 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,702 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,654 UART: [kat] LMS
1,168,966 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,199,127 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,018 UART: [ldev] ++
1,209,186 UART: [ldev] CDI.KEYID = 6
1,209,550 UART: [ldev] SUBJECT.KEYID = 5
1,209,977 UART: [ldev] AUTHORITY.KEYID = 7
1,210,440 UART: [ldev] FE.KEYID = 1
1,216,074 UART: [ldev] Erasing FE.KEYID = 1
1,242,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,060 UART: [ldev] --
1,281,470 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,507 >>> mbox cmd response: success
2,771,624 UART: [afmc] ++
2,771,792 UART: [afmc] CDI.KEYID = 6
2,772,155 UART: [afmc] SUBJECT.KEYID = 7
2,772,581 UART: [afmc] AUTHORITY.KEYID = 5
2,808,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,399 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,439 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,019 UART: [state] LifecycleState = Unprovisioned
86,674 UART: [state] DebugLocked = No
87,372 UART: [state] WD Timer not started. Device not locked for debugging
88,717 UART: [kat] SHA2-256
892,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,396 UART: [kat] ++
896,548 UART: [kat] sha1
900,828 UART: [kat] SHA2-256
902,768 UART: [kat] SHA2-384
905,667 UART: [kat] SHA2-512-ACC
907,568 UART: [kat] ECC-384
917,403 UART: [kat] HMAC-384Kdf
922,109 UART: [kat] LMS
1,170,421 UART: [kat] --
1,171,318 UART: [cold-reset] ++
1,171,736 UART: [fht] FHT @ 0x50003400
1,174,534 UART: [idev] ++
1,174,702 UART: [idev] CDI.KEYID = 6
1,175,063 UART: [idev] SUBJECT.KEYID = 7
1,175,488 UART: [idev] UDS.KEYID = 0
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,466 UART: [idev] Sha1 KeyId Algorithm
1,208,248 UART: [idev] --
1,209,271 UART: [ldev] ++
1,209,439 UART: [ldev] CDI.KEYID = 6
1,209,803 UART: [ldev] SUBJECT.KEYID = 5
1,210,230 UART: [ldev] AUTHORITY.KEYID = 7
1,210,693 UART: [ldev] FE.KEYID = 1
1,215,895 UART: [ldev] Erasing FE.KEYID = 1
1,242,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,623 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,910 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,526 >>> mbox cmd response: success
2,772,555 UART: [afmc] ++
2,772,723 UART: [afmc] CDI.KEYID = 6
2,773,086 UART: [afmc] SUBJECT.KEYID = 7
2,773,512 UART: [afmc] AUTHORITY.KEYID = 5
2,809,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,393 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,756 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,744 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
Truncated 107056 bytes from beginning
221,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,538,701 >>> mbox cmd response: success
18,541,918 UART: [afmc] ++
18,542,626 UART: [afmc] CDI.KEYID = 6
18,543,809 UART: [afmc] SUBJECT.KEYID = 7
18,544,965 UART: [afmc] AUTHORITY.KEYID = 5
21,920,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,237,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,239,839 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,255,984 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,272,062 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,287,963 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,310,185 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
2,063,155 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,207,071 UART:
2,207,495 UART: Running Caliptra ROM ...
2,208,610 UART:
2,208,774 UART: [state] CFI Enabled
2,209,732 UART: [state] LifecycleState = Unprovisioned
2,211,389 UART: [state] DebugLocked = No
2,212,420 UART: [state] WD Timer not started. Device not locked for debugging
2,214,835 UART: [kat] SHA2-256
2,215,494 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,218,506 UART: [kat] ++
2,218,954 UART: [kat] sha1
2,219,484 UART: [kat] SHA2-256
2,220,144 UART: [kat] SHA2-384
2,220,801 UART: [kat] SHA2-512-ACC
2,221,797 UART: [kat] ECC-384
3,771,567 UART: [kat] HMAC-384Kdf
3,798,717 UART: [kat] LMS
4,871,886 UART: [kat] --
4,876,656 UART: [cold-reset] ++
4,879,365 UART: [fht] FHT @ 0x50003400
4,891,857 UART: [idev] ++
4,892,532 UART: [idev] CDI.KEYID = 6
4,893,693 UART: [idev] SUBJECT.KEYID = 7
4,894,850 UART: [idev] UDS.KEYID = 0
4,926,566 UART: [idev] Erasing UDS.KEYID = 0
8,236,492 UART: [idev] Sha1 KeyId Algorithm
8,258,160 UART: [idev] --
8,261,146 UART: [ldev] ++
8,261,709 UART: [ldev] CDI.KEYID = 6
8,262,869 UART: [ldev] SUBJECT.KEYID = 5
8,264,078 UART: [ldev] AUTHORITY.KEYID = 7
8,265,233 UART: [ldev] FE.KEYID = 1
8,291,832 UART: [ldev] Erasing FE.KEYID = 1
11,626,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,032 UART: [ldev] --
14,014,870 UART: [fwproc] Wait for Commands...
14,017,403 UART: [fwproc] Recv command 0x46574c44
14,019,729 UART: [fwproc] Recv'd Img size: 113844 bytes
18,085,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,164,799 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,233,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,550,330 >>> mbox cmd response: success
18,554,870 UART: [afmc] ++
18,555,566 UART: [afmc] CDI.KEYID = 6
18,556,675 UART: [afmc] SUBJECT.KEYID = 7
18,557,890 UART: [afmc] AUTHORITY.KEYID = 5
21,919,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,218,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,220,270 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,236,435 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,252,510 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,268,359 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,290,941 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
2,051,836 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,195,655 UART:
2,196,058 UART: Running Caliptra ROM ...
2,197,219 UART:
2,197,419 UART: [state] CFI Enabled
2,198,385 UART: [state] LifecycleState = Unprovisioned
2,200,046 UART: [state] DebugLocked = No
2,201,152 UART: [state] WD Timer not started. Device not locked for debugging
2,203,619 UART: [kat] SHA2-256
2,204,285 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,207,293 UART: [kat] ++
2,207,804 UART: [kat] sha1
2,208,320 UART: [kat] SHA2-256
2,209,058 UART: [kat] SHA2-384
2,209,722 UART: [kat] SHA2-512-ACC
2,210,602 UART: [kat] ECC-384
3,771,841 UART: [kat] HMAC-384Kdf
3,799,585 UART: [kat] LMS
4,872,736 UART: [kat] --
4,877,703 UART: [cold-reset] ++
4,880,449 UART: [fht] FHT @ 0x50003400
4,890,783 UART: [idev] ++
4,891,465 UART: [idev] CDI.KEYID = 6
4,892,646 UART: [idev] SUBJECT.KEYID = 7
4,893,802 UART: [idev] UDS.KEYID = 0
4,926,828 UART: [idev] Erasing UDS.KEYID = 0
8,239,670 UART: [idev] Sha1 KeyId Algorithm
8,261,753 UART: [idev] --
8,266,074 UART: [ldev] ++
8,266,681 UART: [ldev] CDI.KEYID = 6
8,267,799 UART: [ldev] SUBJECT.KEYID = 5
8,269,021 UART: [ldev] AUTHORITY.KEYID = 7
8,270,177 UART: [ldev] FE.KEYID = 1
8,315,033 UART: [ldev] Erasing FE.KEYID = 1
11,653,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,207 UART: [ldev] --
14,035,494 UART: [fwproc] Wait for Commands...
14,038,516 UART: [fwproc] Recv command 0x46574c44
14,040,778 UART: [fwproc] Recv'd Img size: 113844 bytes
18,110,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,188,768 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,257,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,574,500 >>> mbox cmd response: success
18,578,811 UART: [afmc] ++
18,579,510 UART: [afmc] CDI.KEYID = 6
18,580,670 UART: [afmc] SUBJECT.KEYID = 7
18,581,879 UART: [afmc] AUTHORITY.KEYID = 5
21,939,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,236,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,238,509 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,254,645 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,270,756 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,286,625 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,310,723 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
2,051,329 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,195,037 UART:
2,195,427 UART: Running Caliptra ROM ...
2,196,517 UART:
2,196,669 UART: [state] CFI Enabled
2,197,628 UART: [state] LifecycleState = Unprovisioned
2,199,286 UART: [state] DebugLocked = No
2,200,310 UART: [state] WD Timer not started. Device not locked for debugging
2,202,778 UART: [kat] SHA2-256
2,203,682 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,206,728 UART: [kat] ++
2,207,183 UART: [kat] sha1
2,207,693 UART: [kat] SHA2-256
2,208,352 UART: [kat] SHA2-384
2,209,007 UART: [kat] SHA2-512-ACC
2,209,812 UART: [kat] ECC-384
3,774,014 UART: [kat] HMAC-384Kdf
3,798,097 UART: [kat] LMS
4,871,279 UART: [kat] --
4,874,680 UART: [cold-reset] ++
4,876,936 UART: [fht] FHT @ 0x50003400
4,888,239 UART: [idev] ++
4,888,909 UART: [idev] CDI.KEYID = 6
4,890,066 UART: [idev] SUBJECT.KEYID = 7
4,891,279 UART: [idev] UDS.KEYID = 0
4,926,586 UART: [idev] Erasing UDS.KEYID = 0
8,242,136 UART: [idev] Sha1 KeyId Algorithm
8,263,862 UART: [idev] --
8,268,723 UART: [ldev] ++
8,269,348 UART: [ldev] CDI.KEYID = 6
8,270,450 UART: [ldev] SUBJECT.KEYID = 5
8,271,670 UART: [ldev] AUTHORITY.KEYID = 7
8,272,820 UART: [ldev] FE.KEYID = 1
8,313,296 UART: [ldev] Erasing FE.KEYID = 1
11,646,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,939,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,955,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,971,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,987,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,008,889 UART: [ldev] --
14,012,701 UART: [fwproc] Wait for Commands...
14,014,820 UART: [fwproc] Recv command 0x46574c44
14,017,137 UART: [fwproc] Recv'd Img size: 113844 bytes
18,083,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,158,980 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,227,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,544,215 >>> mbox cmd response: success
18,548,114 UART: [afmc] ++
18,548,808 UART: [afmc] CDI.KEYID = 6
18,549,971 UART: [afmc] SUBJECT.KEYID = 7
18,551,185 UART: [afmc] AUTHORITY.KEYID = 5
21,920,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,221,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,223,120 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,239,267 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,255,366 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,271,232 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,293,484 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.00s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
2,049,570 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,362,878 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
2,047,577 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,333,586 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,048,276 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,342,556 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,048,024 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,314,286 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,991 writing to cptra_bootfsm_go
2,050,032 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,341,440 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
2,049,355 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,329,228 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,056,385 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,339,221 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
2,048,246 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,330,788 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,056,001 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,309,923 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,049,371 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,326,693 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,049,158 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,315,438 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
2,055,717 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,361,715 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
2,050,676 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,343,609 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
2,049,850 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,342,395 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,049,727 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,362,683 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
2,048,826 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,334,011 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
2,047,871 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,365,904 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,050,202 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,333,878 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,049,623 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,316,185 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.53s
Truncated 107056 bytes from beginning
414,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,730,491 >>> mbox cmd response: success
18,735,295 UART: [afmc] ++
18,735,995 UART: [afmc] CDI.KEYID = 6
18,737,231 UART: [afmc] SUBJECT.KEYID = 7
18,738,336 UART: [afmc] AUTHORITY.KEYID = 5
22,059,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,354,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,356,432 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,372,563 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,388,649 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,404,541 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,426,779 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,054,013 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,197,971 UART:
2,198,396 UART: Running Caliptra ROM ...
2,199,564 UART:
2,199,758 UART: [state] CFI Enabled
2,200,717 UART: [state] LifecycleState = Unprovisioned
2,202,375 UART: [state] DebugLocked = No
2,203,479 UART: [state] WD Timer not started. Device not locked for debugging
2,205,951 UART: [kat] SHA2-256
2,206,612 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,615 UART: [kat] ++
2,210,059 UART: [kat] sha1
2,210,650 UART: [kat] SHA2-256
2,211,308 UART: [kat] SHA2-384
2,212,008 UART: [kat] SHA2-512-ACC
2,212,830 UART: [kat] ECC-384
4,097,132 UART: [kat] HMAC-384Kdf
4,108,568 UART: [kat] LMS
5,181,697 UART: [kat] --
5,187,049 UART: [cold-reset] ++
5,188,244 UART: [fht] FHT @ 0x50003400
5,199,650 UART: [idev] ++
5,200,318 UART: [idev] CDI.KEYID = 6
5,201,541 UART: [idev] SUBJECT.KEYID = 7
5,202,961 UART: [idev] UDS.KEYID = 0
5,220,167 UART: [idev] Erasing UDS.KEYID = 0
8,494,386 UART: [idev] Sha1 KeyId Algorithm
8,517,025 UART: [idev] --
8,520,868 UART: [ldev] ++
8,521,435 UART: [ldev] CDI.KEYID = 6
8,522,665 UART: [ldev] SUBJECT.KEYID = 5
8,524,091 UART: [ldev] AUTHORITY.KEYID = 7
8,525,696 UART: [ldev] FE.KEYID = 1
8,537,046 UART: [ldev] Erasing FE.KEYID = 1
11,827,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,185,637 UART: [ldev] --
14,190,032 UART: [fwproc] Wait for Commands...
14,192,015 UART: [fwproc] Recv command 0x46574c44
14,194,322 UART: [fwproc] Recv'd Img size: 113844 bytes
18,263,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,336,503 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,405,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,721,976 >>> mbox cmd response: success
18,725,433 UART: [afmc] ++
18,726,137 UART: [afmc] CDI.KEYID = 6
18,727,320 UART: [afmc] SUBJECT.KEYID = 7
18,728,473 UART: [afmc] AUTHORITY.KEYID = 5
22,044,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,338,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,340,328 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,356,490 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,372,584 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,388,455 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,411,510 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,057,214 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,200,861 UART:
2,201,258 UART: Running Caliptra ROM ...
2,202,361 UART:
2,202,514 UART: [state] CFI Enabled
2,203,470 UART: [state] LifecycleState = Unprovisioned
2,205,018 UART: [state] DebugLocked = No
2,206,034 UART: [state] WD Timer not started. Device not locked for debugging
2,208,527 UART: [kat] SHA2-256
2,209,186 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,406 UART: [kat] ++
2,212,855 UART: [kat] sha1
2,213,361 UART: [kat] SHA2-256
2,214,011 UART: [kat] SHA2-384
2,214,664 UART: [kat] SHA2-512-ACC
2,215,497 UART: [kat] ECC-384
4,096,635 UART: [kat] HMAC-384Kdf
4,110,179 UART: [kat] LMS
5,183,331 UART: [kat] --
5,187,946 UART: [cold-reset] ++
5,190,740 UART: [fht] FHT @ 0x50003400
5,202,905 UART: [idev] ++
5,203,572 UART: [idev] CDI.KEYID = 6
5,204,801 UART: [idev] SUBJECT.KEYID = 7
5,206,228 UART: [idev] UDS.KEYID = 0
5,220,878 UART: [idev] Erasing UDS.KEYID = 0
8,494,639 UART: [idev] Sha1 KeyId Algorithm
8,518,032 UART: [idev] --
8,522,728 UART: [ldev] ++
8,523,288 UART: [ldev] CDI.KEYID = 6
8,524,439 UART: [ldev] SUBJECT.KEYID = 5
8,525,964 UART: [ldev] AUTHORITY.KEYID = 7
8,527,488 UART: [ldev] FE.KEYID = 1
8,539,535 UART: [ldev] Erasing FE.KEYID = 1
11,834,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,130,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,146,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,162,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,178,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,822 UART: [ldev] --
14,202,917 UART: [fwproc] Wait for Commands...
14,205,116 UART: [fwproc] Recv command 0x46574c44
14,207,424 UART: [fwproc] Recv'd Img size: 113844 bytes
18,272,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,343,792 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,412,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,728,534 >>> mbox cmd response: success
18,733,423 UART: [afmc] ++
18,734,180 UART: [afmc] CDI.KEYID = 6
18,735,276 UART: [afmc] SUBJECT.KEYID = 7
18,736,483 UART: [afmc] AUTHORITY.KEYID = 5
22,055,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,350,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,352,718 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,368,831 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,384,961 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,400,781 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,424,086 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
2,055,052 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,198,788 UART:
2,199,225 UART: Running Caliptra ROM ...
2,200,401 UART:
2,200,564 UART: [state] CFI Enabled
2,201,528 UART: [state] LifecycleState = Unprovisioned
2,203,162 UART: [state] DebugLocked = No
2,204,262 UART: [state] WD Timer not started. Device not locked for debugging
2,206,965 UART: [kat] SHA2-256
2,207,637 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,210,665 UART: [kat] ++
2,211,114 UART: [kat] sha1
2,211,619 UART: [kat] SHA2-256
2,212,266 UART: [kat] SHA2-384
2,212,913 UART: [kat] SHA2-512-ACC
2,213,705 UART: [kat] ECC-384
4,097,418 UART: [kat] HMAC-384Kdf
4,110,633 UART: [kat] LMS
5,183,746 UART: [kat] --
5,188,139 UART: [cold-reset] ++
5,189,535 UART: [fht] FHT @ 0x50003400
5,202,035 UART: [idev] ++
5,202,710 UART: [idev] CDI.KEYID = 6
5,203,860 UART: [idev] SUBJECT.KEYID = 7
5,205,338 UART: [idev] UDS.KEYID = 0
5,219,743 UART: [idev] Erasing UDS.KEYID = 0
8,487,912 UART: [idev] Sha1 KeyId Algorithm
8,510,447 UART: [idev] --
8,516,010 UART: [ldev] ++
8,516,583 UART: [ldev] CDI.KEYID = 6
8,517,763 UART: [ldev] SUBJECT.KEYID = 5
8,519,244 UART: [ldev] AUTHORITY.KEYID = 7
8,520,797 UART: [ldev] FE.KEYID = 1
8,532,954 UART: [ldev] Erasing FE.KEYID = 1
11,827,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,136,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,152,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,168,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,359 UART: [ldev] --
14,194,131 UART: [fwproc] Wait for Commands...
14,196,812 UART: [fwproc] Recv command 0x46574c44
14,199,125 UART: [fwproc] Recv'd Img size: 113844 bytes
18,267,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,344,764 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,413,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,730,945 >>> mbox cmd response: success
18,735,594 UART: [afmc] ++
18,736,292 UART: [afmc] CDI.KEYID = 6
18,737,526 UART: [afmc] SUBJECT.KEYID = 7
18,738,696 UART: [afmc] AUTHORITY.KEYID = 5
22,058,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,354,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,356,696 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
24,372,889 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
24,388,952 UART: [afmc] SIG.R = 618E265698E1D61261D819B02CF4CAF41C4EF17D6C7A068EFE2D0FA23DF51D3C04A559BAC1FA2F7A2F4B875CAC01CB46
24,404,784 UART: [afmc] SIG.S = A52FBB507114BBB4BB2D3AC535EB8F992190D75CB9B274E6164812601EB055E837141DCB61CD37DDDAF083D305273F2A
24,426,602 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 39.18s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,053,868 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,522,555 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,054,954 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,534,342 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
2,055,797 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,535,290 >>> mbox cmd response: success
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,474 writing to cptra_bootfsm_go
2,053,570 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,531,566 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
2,057,418 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,534,019 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
2,052,866 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,525,443 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
2,054,048 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,530,043 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,059,335 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,550,700 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
2,053,603 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,518,207 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,053,917 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,525,641 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,055,830 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,525,263 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,052,970 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,521,819 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,054,208 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,528,553 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,053,631 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,518,416 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,053,428 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,526,061 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,055,836 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,527,355 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
2,062,833 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,541,351 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
2,052,991 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,528,457 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,059,263 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,536,567 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 38.75s
Truncated 107056 bytes from beginning
952,768 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,270,915 >>> mbox cmd response: success
14,274,931 UART: [afmc] ++
14,275,523 UART: [afmc] CDI.KEYID = 6
14,276,403 UART: [afmc] SUBJECT.KEYID = 7
14,277,623 UART: [afmc] AUTHORITY.KEYID = 5
16,803,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,525,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,194 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,543,154 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,558,974 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,574,733 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,597,173 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,053,433 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,197,716 UART:
2,198,148 UART: Running Caliptra ROM ...
2,199,314 UART:
2,199,494 UART: [state] CFI Enabled
2,200,479 UART: [state] LifecycleState = Unprovisioned
2,202,155 UART: [state] DebugLocked = No
2,203,264 UART: [state] WD Timer not started. Device not locked for debugging
2,205,746 UART: [kat] SHA2-256
2,206,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,429 UART: [kat] ++
2,209,885 UART: [kat] sha1
2,210,447 UART: [kat] SHA2-256
2,211,152 UART: [kat] SHA2-384
2,211,811 UART: [kat] SHA2-512-ACC
2,212,634 UART: [kat] ECC-384
2,940,698 UART: [kat] HMAC-384Kdf
2,967,530 UART: [kat] LMS
3,497,018 UART: [kat] --
3,500,472 UART: [cold-reset] ++
3,501,863 UART: [fht] FHT @ 0x50003400
3,513,241 UART: [idev] ++
3,513,844 UART: [idev] CDI.KEYID = 6
3,514,755 UART: [idev] SUBJECT.KEYID = 7
3,515,973 UART: [idev] UDS.KEYID = 0
3,538,275 UART: [idev] Erasing UDS.KEYID = 0
6,022,484 UART: [idev] Sha1 KeyId Algorithm
6,044,373 UART: [idev] --
6,047,837 UART: [ldev] ++
6,048,413 UART: [ldev] CDI.KEYID = 6
6,049,325 UART: [ldev] SUBJECT.KEYID = 5
6,050,492 UART: [ldev] AUTHORITY.KEYID = 7
6,051,787 UART: [ldev] FE.KEYID = 1
6,093,940 UART: [ldev] Erasing FE.KEYID = 1
8,598,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,294 UART: [ldev] --
10,407,195 UART: [fwproc] Wait for Commands...
10,409,306 UART: [fwproc] Recv command 0x46574c44
10,411,409 UART: [fwproc] Recv'd Img size: 114168 bytes
13,807,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,878,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,263,825 >>> mbox cmd response: success
14,267,444 UART: [afmc] ++
14,268,031 UART: [afmc] CDI.KEYID = 6
14,268,914 UART: [afmc] SUBJECT.KEYID = 7
14,270,127 UART: [afmc] AUTHORITY.KEYID = 5
16,812,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,359 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,553,340 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,569,110 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,584,867 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,608,168 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,054,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,199,060 UART:
2,199,476 UART: Running Caliptra ROM ...
2,200,649 UART:
2,200,847 UART: [state] CFI Enabled
2,201,817 UART: [state] LifecycleState = Unprovisioned
2,203,484 UART: [state] DebugLocked = No
2,204,602 UART: [state] WD Timer not started. Device not locked for debugging
2,207,083 UART: [kat] SHA2-256
2,207,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,855 UART: [kat] ++
2,211,316 UART: [kat] sha1
2,211,827 UART: [kat] SHA2-256
2,212,486 UART: [kat] SHA2-384
2,213,238 UART: [kat] SHA2-512-ACC
2,214,129 UART: [kat] ECC-384
2,944,400 UART: [kat] HMAC-384Kdf
2,966,841 UART: [kat] LMS
3,496,264 UART: [kat] --
3,500,432 UART: [cold-reset] ++
3,501,686 UART: [fht] FHT @ 0x50003400
3,514,075 UART: [idev] ++
3,514,652 UART: [idev] CDI.KEYID = 6
3,515,675 UART: [idev] SUBJECT.KEYID = 7
3,516,780 UART: [idev] UDS.KEYID = 0
3,539,401 UART: [idev] Erasing UDS.KEYID = 0
6,022,098 UART: [idev] Sha1 KeyId Algorithm
6,044,484 UART: [idev] --
6,048,427 UART: [ldev] ++
6,049,008 UART: [ldev] CDI.KEYID = 6
6,049,903 UART: [ldev] SUBJECT.KEYID = 5
6,051,006 UART: [ldev] AUTHORITY.KEYID = 7
6,052,359 UART: [ldev] FE.KEYID = 1
6,095,015 UART: [ldev] Erasing FE.KEYID = 1
8,600,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,805 UART: [ldev] --
10,407,801 UART: [fwproc] Wait for Commands...
10,410,171 UART: [fwproc] Recv command 0x46574c44
10,412,271 UART: [fwproc] Recv'd Img size: 114168 bytes
13,809,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,882,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,269,158 >>> mbox cmd response: success
14,273,631 UART: [afmc] ++
14,274,228 UART: [afmc] CDI.KEYID = 6
14,275,140 UART: [afmc] SUBJECT.KEYID = 7
14,276,309 UART: [afmc] AUTHORITY.KEYID = 5
16,800,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,524,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,526,386 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,542,328 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,558,137 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,573,894 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,597,233 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
2,057,652 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,201,890 UART:
2,202,319 UART: Running Caliptra ROM ...
2,203,453 UART:
2,203,620 UART: [state] CFI Enabled
2,204,595 UART: [state] LifecycleState = Unprovisioned
2,206,257 UART: [state] DebugLocked = No
2,207,288 UART: [state] WD Timer not started. Device not locked for debugging
2,209,766 UART: [kat] SHA2-256
2,210,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,463 UART: [kat] ++
2,213,917 UART: [kat] sha1
2,214,432 UART: [kat] SHA2-256
2,215,180 UART: [kat] SHA2-384
2,215,846 UART: [kat] SHA2-512-ACC
2,216,728 UART: [kat] ECC-384
2,945,050 UART: [kat] HMAC-384Kdf
2,969,142 UART: [kat] LMS
3,498,569 UART: [kat] --
3,503,277 UART: [cold-reset] ++
3,504,348 UART: [fht] FHT @ 0x50003400
3,514,683 UART: [idev] ++
3,515,256 UART: [idev] CDI.KEYID = 6
3,516,164 UART: [idev] SUBJECT.KEYID = 7
3,517,380 UART: [idev] UDS.KEYID = 0
3,540,865 UART: [idev] Erasing UDS.KEYID = 0
6,021,118 UART: [idev] Sha1 KeyId Algorithm
6,045,067 UART: [idev] --
6,048,427 UART: [ldev] ++
6,049,005 UART: [ldev] CDI.KEYID = 6
6,049,921 UART: [ldev] SUBJECT.KEYID = 5
6,051,088 UART: [ldev] AUTHORITY.KEYID = 7
6,052,384 UART: [ldev] FE.KEYID = 1
6,095,123 UART: [ldev] Erasing FE.KEYID = 1
8,615,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,690 UART: [ldev] --
10,422,515 UART: [fwproc] Wait for Commands...
10,424,513 UART: [fwproc] Recv command 0x46574c44
10,426,612 UART: [fwproc] Recv'd Img size: 114168 bytes
13,823,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,898,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,285,820 >>> mbox cmd response: success
14,290,080 UART: [afmc] ++
14,290,674 UART: [afmc] CDI.KEYID = 6
14,291,585 UART: [afmc] SUBJECT.KEYID = 7
14,292,814 UART: [afmc] AUTHORITY.KEYID = 5
16,836,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,557,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,559,844 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,575,841 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,591,625 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,607,400 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,628,660 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.89s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,062,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,038,310 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,050,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,047,561 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,051,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,056,856 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,052,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,079,708 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,052,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,086,815 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
2,052,154 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,069,805 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,054,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,061,802 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,051,599 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,059,595 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,052,603 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,042,934 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,052,005 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,013,758 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,050,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,061,000 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
2,059,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,052,199 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,051,338 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,034,005 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,051,527 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,005,551 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
2,051,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,044,365 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,058,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,041,844 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,065,599 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,061,966 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,052,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,085,569 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,051,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,042,669 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.43s
Truncated 107056 bytes from beginning
164,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,481,703 >>> mbox cmd response: success
14,486,612 UART: [afmc] ++
14,487,198 UART: [afmc] CDI.KEYID = 6
14,488,083 UART: [afmc] SUBJECT.KEYID = 7
14,489,294 UART: [afmc] AUTHORITY.KEYID = 5
16,984,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,343 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,723,365 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,739,183 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,754,908 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,778,012 UART: [afmc] --
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,054,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,198,191 UART:
2,198,575 UART: Running Caliptra ROM ...
2,199,757 UART:
2,199,953 UART: [state] CFI Enabled
2,201,079 UART: [state] LifecycleState = Unprovisioned
2,202,755 UART: [state] DebugLocked = No
2,203,865 UART: [state] WD Timer not started. Device not locked for debugging
2,206,333 UART: [kat] SHA2-256
2,207,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,004 UART: [kat] ++
2,210,458 UART: [kat] sha1
2,210,970 UART: [kat] SHA2-256
2,211,704 UART: [kat] SHA2-384
2,212,367 UART: [kat] SHA2-512-ACC
2,213,246 UART: [kat] ECC-384
3,279,054 UART: [kat] HMAC-384Kdf
3,292,043 UART: [kat] LMS
3,821,528 UART: [kat] --
3,825,926 UART: [cold-reset] ++
3,828,044 UART: [fht] FHT @ 0x50003400
3,837,941 UART: [idev] ++
3,838,509 UART: [idev] CDI.KEYID = 6
3,839,467 UART: [idev] SUBJECT.KEYID = 7
3,840,619 UART: [idev] UDS.KEYID = 0
3,856,754 UART: [idev] Erasing UDS.KEYID = 0
6,311,318 UART: [idev] Sha1 KeyId Algorithm
6,334,066 UART: [idev] --
6,337,308 UART: [ldev] ++
6,337,873 UART: [ldev] CDI.KEYID = 6
6,338,752 UART: [ldev] SUBJECT.KEYID = 5
6,339,962 UART: [ldev] AUTHORITY.KEYID = 7
6,341,193 UART: [ldev] FE.KEYID = 1
6,350,160 UART: [ldev] Erasing FE.KEYID = 1
8,818,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,569,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,585,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,313 UART: [ldev] --
10,609,776 UART: [fwproc] Wait for Commands...
10,611,986 UART: [fwproc] Recv command 0x46574c44
10,614,034 UART: [fwproc] Recv'd Img size: 114168 bytes
14,017,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,088,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,663 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,475,347 >>> mbox cmd response: success
14,479,011 UART: [afmc] ++
14,479,601 UART: [afmc] CDI.KEYID = 6
14,480,508 UART: [afmc] SUBJECT.KEYID = 7
14,481,718 UART: [afmc] AUTHORITY.KEYID = 5
16,984,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,268 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,724,208 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,740,038 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,755,807 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,778,340 UART: [afmc] --
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,054,463 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,198,675 UART:
2,199,093 UART: Running Caliptra ROM ...
2,200,286 UART:
2,200,464 UART: [state] CFI Enabled
2,201,432 UART: [state] LifecycleState = Unprovisioned
2,203,099 UART: [state] DebugLocked = No
2,204,206 UART: [state] WD Timer not started. Device not locked for debugging
2,206,681 UART: [kat] SHA2-256
2,207,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,362 UART: [kat] ++
2,210,814 UART: [kat] sha1
2,211,327 UART: [kat] SHA2-256
2,212,066 UART: [kat] SHA2-384
2,212,736 UART: [kat] SHA2-512-ACC
2,213,614 UART: [kat] ECC-384
3,279,440 UART: [kat] HMAC-384Kdf
3,292,107 UART: [kat] LMS
3,821,602 UART: [kat] --
3,824,900 UART: [cold-reset] ++
3,826,209 UART: [fht] FHT @ 0x50003400
3,836,276 UART: [idev] ++
3,836,848 UART: [idev] CDI.KEYID = 6
3,837,782 UART: [idev] SUBJECT.KEYID = 7
3,838,991 UART: [idev] UDS.KEYID = 0
3,854,234 UART: [idev] Erasing UDS.KEYID = 0
6,307,477 UART: [idev] Sha1 KeyId Algorithm
6,329,955 UART: [idev] --
6,332,702 UART: [ldev] ++
6,333,264 UART: [ldev] CDI.KEYID = 6
6,334,147 UART: [ldev] SUBJECT.KEYID = 5
6,335,280 UART: [ldev] AUTHORITY.KEYID = 7
6,336,610 UART: [ldev] FE.KEYID = 1
6,347,871 UART: [ldev] Erasing FE.KEYID = 1
8,824,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,854 UART: [ldev] --
10,614,358 UART: [fwproc] Wait for Commands...
10,617,096 UART: [fwproc] Recv command 0x46574c44
10,619,137 UART: [fwproc] Recv'd Img size: 114168 bytes
14,021,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,092,483 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,479,310 >>> mbox cmd response: success
14,483,134 UART: [afmc] ++
14,483,718 UART: [afmc] CDI.KEYID = 6
14,484,596 UART: [afmc] SUBJECT.KEYID = 7
14,485,808 UART: [afmc] AUTHORITY.KEYID = 5
16,986,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,140 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,724,145 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,739,944 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,755,712 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,778,011 UART: [afmc] --
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,055,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,200,062 UART:
2,200,500 UART: Running Caliptra ROM ...
2,201,680 UART:
2,201,856 UART: [state] CFI Enabled
2,202,821 UART: [state] LifecycleState = Unprovisioned
2,204,478 UART: [state] DebugLocked = No
2,205,582 UART: [state] WD Timer not started. Device not locked for debugging
2,208,054 UART: [kat] SHA2-256
2,208,722 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,733 UART: [kat] ++
2,212,184 UART: [kat] sha1
2,212,696 UART: [kat] SHA2-256
2,213,433 UART: [kat] SHA2-384
2,214,098 UART: [kat] SHA2-512-ACC
2,214,977 UART: [kat] ECC-384
3,278,315 UART: [kat] HMAC-384Kdf
3,291,079 UART: [kat] LMS
3,820,594 UART: [kat] --
3,823,605 UART: [cold-reset] ++
3,824,989 UART: [fht] FHT @ 0x50003400
3,835,635 UART: [idev] ++
3,836,200 UART: [idev] CDI.KEYID = 6
3,837,077 UART: [idev] SUBJECT.KEYID = 7
3,838,347 UART: [idev] UDS.KEYID = 0
3,855,372 UART: [idev] Erasing UDS.KEYID = 0
6,315,485 UART: [idev] Sha1 KeyId Algorithm
6,337,640 UART: [idev] --
6,341,400 UART: [ldev] ++
6,341,972 UART: [ldev] CDI.KEYID = 6
6,342,852 UART: [ldev] SUBJECT.KEYID = 5
6,344,020 UART: [ldev] AUTHORITY.KEYID = 7
6,345,314 UART: [ldev] FE.KEYID = 1
6,355,985 UART: [ldev] Erasing FE.KEYID = 1
8,831,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,073 UART: [ldev] --
10,621,441 UART: [fwproc] Wait for Commands...
10,624,450 UART: [fwproc] Recv command 0x46574c44
10,626,540 UART: [fwproc] Recv'd Img size: 114168 bytes
14,023,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,095,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,481,117 >>> mbox cmd response: success
14,486,164 UART: [afmc] ++
14,486,760 UART: [afmc] CDI.KEYID = 6
14,487,671 UART: [afmc] SUBJECT.KEYID = 7
14,488,997 UART: [afmc] AUTHORITY.KEYID = 5
16,994,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,817 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,732,821 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,748,616 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,764,335 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,787,488 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,053,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,272 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,053,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,204 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,054,323 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,262 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
2,053,677 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,277,226 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,054,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,264,890 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,055,539 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,298 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,053,311 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,088 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,053,942 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,223 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
2,062,058 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,215 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,053,106 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,827 >>> mbox cmd response: success
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,054,079 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,779 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,054,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,255,077 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
2,054,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,745 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
2,054,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,250,642 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,053,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,251,986 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,055,427 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,264,606 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,055,431 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,262,016 >>> mbox cmd response: success
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,061,186 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,988 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,055,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,407 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.71s
Truncated 107056 bytes from beginning
953,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,271,132 >>> mbox cmd response: success
14,274,827 UART: [afmc] ++
14,275,413 UART: [afmc] CDI.KEYID = 6
14,276,296 UART: [afmc] SUBJECT.KEYID = 7
14,277,509 UART: [afmc] AUTHORITY.KEYID = 5
16,806,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,012 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,546,952 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,562,793 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,578,596 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,602,168 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,050,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,195,115 UART:
2,195,541 UART: Running Caliptra ROM ...
2,196,624 UART:
2,196,778 UART: [state] CFI Enabled
2,197,745 UART: [state] LifecycleState = Unprovisioned
2,199,406 UART: [state] DebugLocked = No
2,200,440 UART: [state] WD Timer not started. Device not locked for debugging
2,202,912 UART: [kat] SHA2-256
2,203,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,206,593 UART: [kat] ++
2,207,044 UART: [kat] sha1
2,207,577 UART: [kat] SHA2-256
2,208,236 UART: [kat] SHA2-384
2,208,892 UART: [kat] SHA2-512-ACC
2,209,734 UART: [kat] ECC-384
2,943,332 UART: [kat] HMAC-384Kdf
2,967,669 UART: [kat] LMS
3,497,096 UART: [kat] --
3,500,010 UART: [cold-reset] ++
3,502,593 UART: [fht] FHT @ 0x50003400
3,514,056 UART: [idev] ++
3,514,661 UART: [idev] CDI.KEYID = 6
3,515,545 UART: [idev] SUBJECT.KEYID = 7
3,516,770 UART: [idev] UDS.KEYID = 0
3,538,540 UART: [idev] Erasing UDS.KEYID = 0
6,020,355 UART: [idev] Sha1 KeyId Algorithm
6,043,483 UART: [idev] --
6,047,935 UART: [ldev] ++
6,048,516 UART: [ldev] CDI.KEYID = 6
6,049,402 UART: [ldev] SUBJECT.KEYID = 5
6,050,622 UART: [ldev] AUTHORITY.KEYID = 7
6,051,860 UART: [ldev] FE.KEYID = 1
6,094,389 UART: [ldev] Erasing FE.KEYID = 1
8,601,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,991 UART: [ldev] --
10,407,616 UART: [fwproc] Wait for Commands...
10,409,666 UART: [fwproc] Recv command 0x46574c44
10,411,709 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,882,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,951,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,268,173 >>> mbox cmd response: success
14,272,548 UART: [afmc] ++
14,273,136 UART: [afmc] CDI.KEYID = 6
14,274,017 UART: [afmc] SUBJECT.KEYID = 7
14,275,235 UART: [afmc] AUTHORITY.KEYID = 5
16,798,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,524,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,526,162 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,542,088 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,557,904 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,573,684 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,597,325 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,054,062 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,198,196 UART:
2,198,588 UART: Running Caliptra ROM ...
2,199,670 UART:
2,199,827 UART: [state] CFI Enabled
2,200,796 UART: [state] LifecycleState = Unprovisioned
2,202,459 UART: [state] DebugLocked = No
2,203,484 UART: [state] WD Timer not started. Device not locked for debugging
2,205,961 UART: [kat] SHA2-256
2,206,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,894 UART: [kat] ++
2,210,349 UART: [kat] sha1
2,210,860 UART: [kat] SHA2-256
2,211,518 UART: [kat] SHA2-384
2,212,274 UART: [kat] SHA2-512-ACC
2,213,088 UART: [kat] ECC-384
2,943,281 UART: [kat] HMAC-384Kdf
2,967,340 UART: [kat] LMS
3,496,769 UART: [kat] --
3,501,241 UART: [cold-reset] ++
3,502,682 UART: [fht] FHT @ 0x50003400
3,512,791 UART: [idev] ++
3,513,365 UART: [idev] CDI.KEYID = 6
3,514,291 UART: [idev] SUBJECT.KEYID = 7
3,515,507 UART: [idev] UDS.KEYID = 0
3,540,018 UART: [idev] Erasing UDS.KEYID = 0
6,020,238 UART: [idev] Sha1 KeyId Algorithm
6,043,199 UART: [idev] --
6,046,866 UART: [ldev] ++
6,047,477 UART: [ldev] CDI.KEYID = 6
6,048,394 UART: [ldev] SUBJECT.KEYID = 5
6,049,508 UART: [ldev] AUTHORITY.KEYID = 7
6,050,803 UART: [ldev] FE.KEYID = 1
6,096,128 UART: [ldev] Erasing FE.KEYID = 1
8,601,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,670 UART: [ldev] --
10,408,966 UART: [fwproc] Wait for Commands...
10,410,802 UART: [fwproc] Recv command 0x46574c44
10,412,920 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,884,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,270,143 >>> mbox cmd response: success
14,275,035 UART: [afmc] ++
14,275,625 UART: [afmc] CDI.KEYID = 6
14,276,510 UART: [afmc] SUBJECT.KEYID = 7
14,277,726 UART: [afmc] AUTHORITY.KEYID = 5
16,800,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,525,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,544 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,543,474 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,559,343 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,575,128 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,597,160 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
2,054,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,198,641 UART:
2,199,059 UART: Running Caliptra ROM ...
2,200,144 UART:
2,200,301 UART: [state] CFI Enabled
2,201,267 UART: [state] LifecycleState = Unprovisioned
2,202,925 UART: [state] DebugLocked = No
2,203,955 UART: [state] WD Timer not started. Device not locked for debugging
2,206,426 UART: [kat] SHA2-256
2,207,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,128 UART: [kat] ++
2,210,575 UART: [kat] sha1
2,211,083 UART: [kat] SHA2-256
2,211,741 UART: [kat] SHA2-384
2,212,396 UART: [kat] SHA2-512-ACC
2,213,396 UART: [kat] ECC-384
2,945,637 UART: [kat] HMAC-384Kdf
2,967,694 UART: [kat] LMS
3,497,151 UART: [kat] --
3,502,931 UART: [cold-reset] ++
3,504,060 UART: [fht] FHT @ 0x50003400
3,515,699 UART: [idev] ++
3,516,266 UART: [idev] CDI.KEYID = 6
3,517,196 UART: [idev] SUBJECT.KEYID = 7
3,518,413 UART: [idev] UDS.KEYID = 0
3,540,138 UART: [idev] Erasing UDS.KEYID = 0
6,021,037 UART: [idev] Sha1 KeyId Algorithm
6,043,150 UART: [idev] --
6,045,856 UART: [ldev] ++
6,046,428 UART: [ldev] CDI.KEYID = 6
6,047,314 UART: [ldev] SUBJECT.KEYID = 5
6,048,446 UART: [ldev] AUTHORITY.KEYID = 7
6,049,788 UART: [ldev] FE.KEYID = 1
6,096,431 UART: [ldev] Erasing FE.KEYID = 1
8,601,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,406 UART: [ldev] --
10,410,432 UART: [fwproc] Wait for Commands...
10,413,359 UART: [fwproc] Recv command 0x46574c44
10,415,458 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,888,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,274,758 >>> mbox cmd response: success
14,278,406 UART: [afmc] ++
14,278,991 UART: [afmc] CDI.KEYID = 6
14,279,870 UART: [afmc] SUBJECT.KEYID = 7
14,281,082 UART: [afmc] AUTHORITY.KEYID = 5
16,820,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,545,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,547,630 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,563,568 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,579,384 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,595,155 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,617,791 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.88s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,051,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,046,867 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
2,051,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,039,436 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
2,051,257 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,035,213 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,056,954 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,039,548 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,063,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,038,125 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
2,054,272 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,069,526 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,052,752 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,082,157 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,058,333 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,039,125 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,051,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,060,937 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,051,148 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,028,938 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,052,124 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,020,442 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,064,157 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,078,482 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,051,470 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,059,129 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
2,055,107 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,018,884 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,053,017 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,044,520 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,050,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,087,136 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,054,376 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,037,297 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,050,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,093,560 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
2,057,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,061,508 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.43s
Truncated 107056 bytes from beginning
162,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,824 >>> mbox cmd response: success
14,485,291 UART: [afmc] ++
14,485,879 UART: [afmc] CDI.KEYID = 6
14,486,784 UART: [afmc] SUBJECT.KEYID = 7
14,487,937 UART: [afmc] AUTHORITY.KEYID = 5
16,989,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,900 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,728,902 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,744,717 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,760,485 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,782,949 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,054,722 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,198,819 UART:
2,199,221 UART: Running Caliptra ROM ...
2,200,342 UART:
2,200,505 UART: [state] CFI Enabled
2,201,667 UART: [state] LifecycleState = Unprovisioned
2,203,389 UART: [state] DebugLocked = No
2,204,505 UART: [state] WD Timer not started. Device not locked for debugging
2,206,985 UART: [kat] SHA2-256
2,207,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,655 UART: [kat] ++
2,211,107 UART: [kat] sha1
2,211,620 UART: [kat] SHA2-256
2,212,360 UART: [kat] SHA2-384
2,213,025 UART: [kat] SHA2-512-ACC
2,213,908 UART: [kat] ECC-384
3,284,662 UART: [kat] HMAC-384Kdf
3,297,596 UART: [kat] LMS
3,827,128 UART: [kat] --
3,831,608 UART: [cold-reset] ++
3,833,264 UART: [fht] FHT @ 0x50003400
3,844,508 UART: [idev] ++
3,845,094 UART: [idev] CDI.KEYID = 6
3,846,009 UART: [idev] SUBJECT.KEYID = 7
3,847,174 UART: [idev] UDS.KEYID = 0
3,864,229 UART: [idev] Erasing UDS.KEYID = 0
6,319,931 UART: [idev] Sha1 KeyId Algorithm
6,342,402 UART: [idev] --
6,346,127 UART: [ldev] ++
6,346,691 UART: [ldev] CDI.KEYID = 6
6,347,593 UART: [ldev] SUBJECT.KEYID = 5
6,348,808 UART: [ldev] AUTHORITY.KEYID = 7
6,350,036 UART: [ldev] FE.KEYID = 1
6,362,795 UART: [ldev] Erasing FE.KEYID = 1
8,840,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,654 UART: [ldev] --
10,633,888 UART: [fwproc] Wait for Commands...
10,635,716 UART: [fwproc] Recv command 0x46574c44
10,637,758 UART: [fwproc] Recv'd Img size: 114168 bytes
14,035,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,106,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,493,151 >>> mbox cmd response: success
14,498,106 UART: [afmc] ++
14,498,693 UART: [afmc] CDI.KEYID = 6
14,499,604 UART: [afmc] SUBJECT.KEYID = 7
14,500,817 UART: [afmc] AUTHORITY.KEYID = 5
16,995,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,704 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,732,681 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,748,489 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,764,306 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,787,293 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,053,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,197,251 UART:
2,197,670 UART: Running Caliptra ROM ...
2,198,842 UART:
2,199,009 UART: [state] CFI Enabled
2,199,998 UART: [state] LifecycleState = Unprovisioned
2,201,657 UART: [state] DebugLocked = No
2,202,764 UART: [state] WD Timer not started. Device not locked for debugging
2,205,247 UART: [kat] SHA2-256
2,205,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,208,924 UART: [kat] ++
2,209,375 UART: [kat] sha1
2,209,890 UART: [kat] SHA2-256
2,210,624 UART: [kat] SHA2-384
2,211,288 UART: [kat] SHA2-512-ACC
2,212,169 UART: [kat] ECC-384
3,280,168 UART: [kat] HMAC-384Kdf
3,292,243 UART: [kat] LMS
3,821,728 UART: [kat] --
3,826,385 UART: [cold-reset] ++
3,828,747 UART: [fht] FHT @ 0x50003400
3,839,603 UART: [idev] ++
3,840,184 UART: [idev] CDI.KEYID = 6
3,841,110 UART: [idev] SUBJECT.KEYID = 7
3,842,325 UART: [idev] UDS.KEYID = 0
3,858,405 UART: [idev] Erasing UDS.KEYID = 0
6,315,569 UART: [idev] Sha1 KeyId Algorithm
6,338,206 UART: [idev] --
6,343,497 UART: [ldev] ++
6,344,065 UART: [ldev] CDI.KEYID = 6
6,344,976 UART: [ldev] SUBJECT.KEYID = 5
6,346,127 UART: [ldev] AUTHORITY.KEYID = 7
6,347,413 UART: [ldev] FE.KEYID = 1
6,358,867 UART: [ldev] Erasing FE.KEYID = 1
8,832,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,564 UART: [ldev] --
10,624,123 UART: [fwproc] Wait for Commands...
10,626,219 UART: [fwproc] Recv command 0x46574c44
10,628,319 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,100,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,089 >>> mbox cmd response: success
14,491,736 UART: [afmc] ++
14,492,328 UART: [afmc] CDI.KEYID = 6
14,493,241 UART: [afmc] SUBJECT.KEYID = 7
14,494,397 UART: [afmc] AUTHORITY.KEYID = 5
16,991,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,784 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,731,799 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,747,598 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,763,356 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,784,754 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,067,371 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,211,639 UART:
2,212,056 UART: Running Caliptra ROM ...
2,213,228 UART:
2,213,434 UART: [state] CFI Enabled
2,214,400 UART: [state] LifecycleState = Unprovisioned
2,216,056 UART: [state] DebugLocked = No
2,217,168 UART: [state] WD Timer not started. Device not locked for debugging
2,219,641 UART: [kat] SHA2-256
2,220,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,223,321 UART: [kat] ++
2,223,769 UART: [kat] sha1
2,224,364 UART: [kat] SHA2-256
2,225,028 UART: [kat] SHA2-384
2,225,692 UART: [kat] SHA2-512-ACC
2,226,574 UART: [kat] ECC-384
3,278,786 UART: [kat] HMAC-384Kdf
3,291,723 UART: [kat] LMS
3,821,240 UART: [kat] --
3,825,392 UART: [cold-reset] ++
3,827,997 UART: [fht] FHT @ 0x50003400
3,839,839 UART: [idev] ++
3,840,399 UART: [idev] CDI.KEYID = 6
3,841,413 UART: [idev] SUBJECT.KEYID = 7
3,842,566 UART: [idev] UDS.KEYID = 0
3,860,653 UART: [idev] Erasing UDS.KEYID = 0
6,318,192 UART: [idev] Sha1 KeyId Algorithm
6,341,529 UART: [idev] --
6,345,389 UART: [ldev] ++
6,345,959 UART: [ldev] CDI.KEYID = 6
6,346,841 UART: [ldev] SUBJECT.KEYID = 5
6,347,998 UART: [ldev] AUTHORITY.KEYID = 7
6,349,287 UART: [ldev] FE.KEYID = 1
6,359,150 UART: [ldev] Erasing FE.KEYID = 1
8,833,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,257 UART: [ldev] --
10,625,918 UART: [fwproc] Wait for Commands...
10,627,956 UART: [fwproc] Recv command 0x46574c44
10,629,992 UART: [fwproc] Recv'd Img size: 114168 bytes
14,020,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,086,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,155,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,472,357 >>> mbox cmd response: success
14,476,751 UART: [afmc] ++
14,477,339 UART: [afmc] CDI.KEYID = 6
14,478,250 UART: [afmc] SUBJECT.KEYID = 7
14,479,464 UART: [afmc] AUTHORITY.KEYID = 5
16,976,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,701,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,703,089 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,719,055 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,734,893 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,750,641 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,773,393 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 30.17s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,053,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,986 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
2,054,273 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,253,360 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,057,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,254,570 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,055,759 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,277,510 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,054,876 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,940 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
2,054,814 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,269 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,784 writing to cptra_bootfsm_go
2,052,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,648 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,060,011 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,731 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
2,054,129 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,276,690 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,062,220 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,254,830 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,054,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,963 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,054,638 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,274,655 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
2,053,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,260,407 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,054,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,141 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
2,055,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,260,823 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,054,026 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,313 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,053,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,823 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,054,140 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,459 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,054,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,292,329 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 29.71s
Truncated 104976 bytes from beginning
4
1,281,386 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,038 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,692 >>> mbox cmd response: success
2,770,773 UART: [afmc] ++
2,770,941 UART: [afmc] CDI.KEYID = 6
2,771,304 UART: [afmc] SUBJECT.KEYID = 7
2,771,730 UART: [afmc] AUTHORITY.KEYID = 5
2,807,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,246 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,959 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,868 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,582 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,285 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,013 UART: [kat] ++
895,165 UART: [kat] sha1
899,561 UART: [kat] SHA2-256
901,501 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,349 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,100 UART: [ldev] ++
1,209,268 UART: [ldev] CDI.KEYID = 6
1,209,632 UART: [ldev] SUBJECT.KEYID = 5
1,210,059 UART: [ldev] AUTHORITY.KEYID = 7
1,210,522 UART: [ldev] FE.KEYID = 1
1,215,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,281,006 UART: [fwproc] Wait for Commands...
1,281,773 UART: [fwproc] Recv command 0x46574c44
1,282,506 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,415 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,724 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,364 >>> mbox cmd response: success
2,770,467 UART: [afmc] ++
2,770,635 UART: [afmc] CDI.KEYID = 6
2,770,998 UART: [afmc] SUBJECT.KEYID = 7
2,771,424 UART: [afmc] AUTHORITY.KEYID = 5
2,807,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,560 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,273 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,182 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,896 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,895 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,186 UART: [kat] LMS
1,168,498 UART: [kat] --
1,169,417 UART: [cold-reset] ++
1,169,839 UART: [fht] FHT @ 0x50003400
1,172,365 UART: [idev] ++
1,172,533 UART: [idev] CDI.KEYID = 6
1,172,894 UART: [idev] SUBJECT.KEYID = 7
1,173,319 UART: [idev] UDS.KEYID = 0
1,181,141 UART: [idev] Erasing UDS.KEYID = 0
1,197,821 UART: [idev] Sha1 KeyId Algorithm
1,206,609 UART: [idev] --
1,207,558 UART: [ldev] ++
1,207,726 UART: [ldev] CDI.KEYID = 6
1,208,090 UART: [ldev] SUBJECT.KEYID = 5
1,208,517 UART: [ldev] AUTHORITY.KEYID = 7
1,208,980 UART: [ldev] FE.KEYID = 1
1,214,286 UART: [ldev] Erasing FE.KEYID = 1
1,240,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,690 UART: [ldev] --
1,280,066 UART: [fwproc] Wait for Commands...
1,280,637 UART: [fwproc] Recv command 0x46574c44
1,281,370 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,034 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,540 >>> mbox cmd response: success
2,770,793 UART: [afmc] ++
2,770,961 UART: [afmc] CDI.KEYID = 6
2,771,324 UART: [afmc] SUBJECT.KEYID = 7
2,771,750 UART: [afmc] AUTHORITY.KEYID = 5
2,807,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,374 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,087 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,996 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,710 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,415 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
915,582 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,277 UART: [cold-reset] ++
1,169,671 UART: [fht] FHT @ 0x50003400
1,172,397 UART: [idev] ++
1,172,565 UART: [idev] CDI.KEYID = 6
1,172,926 UART: [idev] SUBJECT.KEYID = 7
1,173,351 UART: [idev] UDS.KEYID = 0
1,181,371 UART: [idev] Erasing UDS.KEYID = 0
1,198,387 UART: [idev] Sha1 KeyId Algorithm
1,207,195 UART: [idev] --
1,208,208 UART: [ldev] ++
1,208,376 UART: [ldev] CDI.KEYID = 6
1,208,740 UART: [ldev] SUBJECT.KEYID = 5
1,209,167 UART: [ldev] AUTHORITY.KEYID = 7
1,209,630 UART: [ldev] FE.KEYID = 1
1,214,756 UART: [ldev] Erasing FE.KEYID = 1
1,240,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,206 UART: [ldev] --
1,279,544 UART: [fwproc] Wait for Commands...
1,280,197 UART: [fwproc] Recv command 0x46574c44
1,280,930 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,704 >>> mbox cmd response: success
2,770,899 UART: [afmc] ++
2,771,067 UART: [afmc] CDI.KEYID = 6
2,771,430 UART: [afmc] SUBJECT.KEYID = 7
2,771,856 UART: [afmc] AUTHORITY.KEYID = 5
2,808,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,280 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,993 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,902 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,616 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,321 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 33.53s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,896 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,194 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,471 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,552 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,882 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,060 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,800 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,064 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,770 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,832 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,228 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,608 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,224 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,598 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,138 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,856 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,854 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,498 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,270 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,576 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,408 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 31.57s
Truncated 104976 bytes from beginning
4
1,282,469 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,771 >>> mbox cmd response: success
2,770,996 UART: [afmc] ++
2,771,164 UART: [afmc] CDI.KEYID = 6
2,771,527 UART: [afmc] SUBJECT.KEYID = 7
2,771,953 UART: [afmc] AUTHORITY.KEYID = 5
2,808,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,737 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,450 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,359 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,073 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,856 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,181,762 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,873 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,549 UART: [fwproc] Wait for Commands...
1,283,122 UART: [fwproc] Recv command 0x46574c44
1,283,855 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,581 >>> mbox cmd response: success
2,772,706 UART: [afmc] ++
2,772,874 UART: [afmc] CDI.KEYID = 6
2,773,237 UART: [afmc] SUBJECT.KEYID = 7
2,773,663 UART: [afmc] AUTHORITY.KEYID = 5
2,808,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,173 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,886 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,795 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,509 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,376 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,219 UART: [kat] LMS
1,169,531 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,944 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,326 UART: [idev] Sha1 KeyId Algorithm
1,208,126 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,267 UART: [ldev] --
1,281,623 UART: [fwproc] Wait for Commands...
1,282,302 UART: [fwproc] Recv command 0x46574c44
1,283,035 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,343 >>> mbox cmd response: success
2,772,518 UART: [afmc] ++
2,772,686 UART: [afmc] CDI.KEYID = 6
2,773,049 UART: [afmc] SUBJECT.KEYID = 7
2,773,475 UART: [afmc] AUTHORITY.KEYID = 5
2,808,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,123 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,836 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,745 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,459 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,336 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,436 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,404 UART: [kat] SHA2-256
901,344 UART: [kat] SHA2-384
904,059 UART: [kat] SHA2-512-ACC
905,960 UART: [kat] ECC-384
915,801 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,680 UART: [idev] --
1,208,743 UART: [ldev] ++
1,208,911 UART: [ldev] CDI.KEYID = 6
1,209,275 UART: [ldev] SUBJECT.KEYID = 5
1,209,702 UART: [ldev] AUTHORITY.KEYID = 7
1,210,165 UART: [ldev] FE.KEYID = 1
1,215,291 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,541 UART: [ldev] --
1,280,851 UART: [fwproc] Wait for Commands...
1,281,424 UART: [fwproc] Recv command 0x46574c44
1,282,157 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,979 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,491 >>> mbox cmd response: success
2,770,680 UART: [afmc] ++
2,770,848 UART: [afmc] CDI.KEYID = 6
2,771,211 UART: [afmc] SUBJECT.KEYID = 7
2,771,637 UART: [afmc] AUTHORITY.KEYID = 5
2,807,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,715 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,428 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,337 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,051 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,020 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.52s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,895 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,681 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,077 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,789 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,615 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,921 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,977 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,271 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,215 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,485 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,283 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,067 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,117 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,639 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,763 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,315 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,845 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,677 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,065 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,631 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,363 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 32.52s
Truncated 104976 bytes from beginning
4
1,283,154 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,598 >>> mbox cmd response: success
2,771,773 UART: [afmc] ++
2,771,941 UART: [afmc] CDI.KEYID = 6
2,772,304 UART: [afmc] SUBJECT.KEYID = 7
2,772,730 UART: [afmc] AUTHORITY.KEYID = 5
2,808,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,930 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,643 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,552 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,266 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,957 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
916,270 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,182,337 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha1 KeyId Algorithm
1,208,355 UART: [idev] --
1,209,544 UART: [ldev] ++
1,209,712 UART: [ldev] CDI.KEYID = 6
1,210,076 UART: [ldev] SUBJECT.KEYID = 5
1,210,503 UART: [ldev] AUTHORITY.KEYID = 7
1,210,966 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,862 UART: [ldev] --
1,281,336 UART: [fwproc] Wait for Commands...
1,282,107 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,262 >>> mbox cmd response: success
2,772,287 UART: [afmc] ++
2,772,455 UART: [afmc] CDI.KEYID = 6
2,772,818 UART: [afmc] SUBJECT.KEYID = 7
2,773,244 UART: [afmc] AUTHORITY.KEYID = 5
2,808,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,018 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,731 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,640 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,354 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,155 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,719 UART: [kat] ++
895,871 UART: [kat] sha1
900,113 UART: [kat] SHA2-256
902,053 UART: [kat] SHA2-384
904,946 UART: [kat] SHA2-512-ACC
906,847 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
920,998 UART: [kat] LMS
1,169,310 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,243 UART: [idev] ++
1,173,411 UART: [idev] CDI.KEYID = 6
1,173,772 UART: [idev] SUBJECT.KEYID = 7
1,174,197 UART: [idev] UDS.KEYID = 0
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,199,375 UART: [idev] Sha1 KeyId Algorithm
1,208,467 UART: [idev] --
1,209,494 UART: [ldev] ++
1,209,662 UART: [ldev] CDI.KEYID = 6
1,210,026 UART: [ldev] SUBJECT.KEYID = 5
1,210,453 UART: [ldev] AUTHORITY.KEYID = 7
1,210,916 UART: [ldev] FE.KEYID = 1
1,216,086 UART: [ldev] Erasing FE.KEYID = 1
1,242,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,312 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,397 UART: [fwproc] Recv command 0x46574c44
1,283,130 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,026 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,676 >>> mbox cmd response: success
2,771,777 UART: [afmc] ++
2,771,945 UART: [afmc] CDI.KEYID = 6
2,772,308 UART: [afmc] SUBJECT.KEYID = 7
2,772,734 UART: [afmc] AUTHORITY.KEYID = 5
2,808,097 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,970 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,683 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,592 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,306 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,089 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,808 UART: [kat] HMAC-384Kdf
921,514 UART: [kat] LMS
1,169,826 UART: [kat] --
1,170,575 UART: [cold-reset] ++
1,171,143 UART: [fht] FHT @ 0x50003400
1,173,859 UART: [idev] ++
1,174,027 UART: [idev] CDI.KEYID = 6
1,174,388 UART: [idev] SUBJECT.KEYID = 7
1,174,813 UART: [idev] UDS.KEYID = 0
1,182,683 UART: [idev] Erasing UDS.KEYID = 0
1,199,743 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,628 UART: [ldev] ++
1,209,796 UART: [ldev] CDI.KEYID = 6
1,210,160 UART: [ldev] SUBJECT.KEYID = 5
1,210,587 UART: [ldev] AUTHORITY.KEYID = 7
1,211,050 UART: [ldev] FE.KEYID = 1
1,216,152 UART: [ldev] Erasing FE.KEYID = 1
1,242,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,580 UART: [ldev] --
1,281,890 UART: [fwproc] Wait for Commands...
1,282,465 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,042 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,550 >>> mbox cmd response: success
2,770,601 UART: [afmc] ++
2,770,769 UART: [afmc] CDI.KEYID = 6
2,771,132 UART: [afmc] SUBJECT.KEYID = 7
2,771,558 UART: [afmc] AUTHORITY.KEYID = 5
2,807,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,248 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,961 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,870 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,584 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,357 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.64s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,316 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,344 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,170 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,050 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,464 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,898 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,590 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,312 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,950 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,852 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,742 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,300 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,946 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,024 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,328 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,878 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,558 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,876 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,304 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,010 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,382 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.55s
Truncated 104976 bytes from beginning
4
1,282,883 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,607,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,103 >>> mbox cmd response: success
2,773,200 UART: [afmc] ++
2,773,368 UART: [afmc] CDI.KEYID = 6
2,773,731 UART: [afmc] SUBJECT.KEYID = 7
2,774,157 UART: [afmc] AUTHORITY.KEYID = 5
2,810,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,231 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,944 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,853 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,567 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,272 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
891,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,912 UART: [kat] ++
896,064 UART: [kat] sha1
900,490 UART: [kat] SHA2-256
902,430 UART: [kat] SHA2-384
904,999 UART: [kat] SHA2-512-ACC
906,900 UART: [kat] ECC-384
916,749 UART: [kat] HMAC-384Kdf
921,421 UART: [kat] LMS
1,169,733 UART: [kat] --
1,170,984 UART: [cold-reset] ++
1,171,492 UART: [fht] FHT @ 0x50003400
1,174,214 UART: [idev] ++
1,174,382 UART: [idev] CDI.KEYID = 6
1,174,743 UART: [idev] SUBJECT.KEYID = 7
1,175,168 UART: [idev] UDS.KEYID = 0
1,182,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,672 UART: [idev] Sha1 KeyId Algorithm
1,209,444 UART: [idev] --
1,210,467 UART: [ldev] ++
1,210,635 UART: [ldev] CDI.KEYID = 6
1,210,999 UART: [ldev] SUBJECT.KEYID = 5
1,211,426 UART: [ldev] AUTHORITY.KEYID = 7
1,211,889 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,243,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,639 UART: [fwproc] Wait for Commands...
1,283,330 UART: [fwproc] Recv command 0x46574c44
1,284,063 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,944 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,929 >>> mbox cmd response: success
2,773,106 UART: [afmc] ++
2,773,274 UART: [afmc] CDI.KEYID = 6
2,773,637 UART: [afmc] SUBJECT.KEYID = 7
2,774,063 UART: [afmc] AUTHORITY.KEYID = 5
2,809,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,321 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,034 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,943 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,657 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,572 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,295 UART: [kat] SHA2-256
891,845 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,974 UART: [kat] ++
896,126 UART: [kat] sha1
900,462 UART: [kat] SHA2-256
902,402 UART: [kat] SHA2-384
905,303 UART: [kat] SHA2-512-ACC
907,204 UART: [kat] ECC-384
917,051 UART: [kat] HMAC-384Kdf
921,637 UART: [kat] LMS
1,169,949 UART: [kat] --
1,170,760 UART: [cold-reset] ++
1,171,200 UART: [fht] FHT @ 0x50003400
1,173,906 UART: [idev] ++
1,174,074 UART: [idev] CDI.KEYID = 6
1,174,435 UART: [idev] SUBJECT.KEYID = 7
1,174,860 UART: [idev] UDS.KEYID = 0
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,207,746 UART: [idev] --
1,208,885 UART: [ldev] ++
1,209,053 UART: [ldev] CDI.KEYID = 6
1,209,417 UART: [ldev] SUBJECT.KEYID = 5
1,209,844 UART: [ldev] AUTHORITY.KEYID = 7
1,210,307 UART: [ldev] FE.KEYID = 1
1,215,453 UART: [ldev] Erasing FE.KEYID = 1
1,241,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,347 UART: [ldev] --
1,280,663 UART: [fwproc] Wait for Commands...
1,281,336 UART: [fwproc] Recv command 0x46574c44
1,282,069 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,561 >>> mbox cmd response: success
2,771,752 UART: [afmc] ++
2,771,920 UART: [afmc] CDI.KEYID = 6
2,772,283 UART: [afmc] SUBJECT.KEYID = 7
2,772,709 UART: [afmc] AUTHORITY.KEYID = 5
2,807,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,095 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,808 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,717 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,431 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,156 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,261 UART: [kat] LMS
1,169,573 UART: [kat] --
1,170,724 UART: [cold-reset] ++
1,171,140 UART: [fht] FHT @ 0x50003400
1,174,038 UART: [idev] ++
1,174,206 UART: [idev] CDI.KEYID = 6
1,174,567 UART: [idev] SUBJECT.KEYID = 7
1,174,992 UART: [idev] UDS.KEYID = 0
1,183,046 UART: [idev] Erasing UDS.KEYID = 0
1,200,392 UART: [idev] Sha1 KeyId Algorithm
1,209,334 UART: [idev] --
1,210,427 UART: [ldev] ++
1,210,595 UART: [ldev] CDI.KEYID = 6
1,210,959 UART: [ldev] SUBJECT.KEYID = 5
1,211,386 UART: [ldev] AUTHORITY.KEYID = 7
1,211,849 UART: [ldev] FE.KEYID = 1
1,216,891 UART: [ldev] Erasing FE.KEYID = 1
1,243,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,595 UART: [fwproc] Wait for Commands...
1,283,372 UART: [fwproc] Recv command 0x46574c44
1,284,105 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,605,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,019 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,523 >>> mbox cmd response: success
2,771,694 UART: [afmc] ++
2,771,862 UART: [afmc] CDI.KEYID = 6
2,772,225 UART: [afmc] SUBJECT.KEYID = 7
2,772,651 UART: [afmc] AUTHORITY.KEYID = 5
2,807,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,045 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,830,758 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,836,667 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,842,381 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,850,264 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.98s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,143 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,203 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,925 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,911 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,243 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,891 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,273 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,441 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,547 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,331 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,875 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,487 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,157 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,411 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,151 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,351 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,999 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,589 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,527 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,653 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,933 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.77s
Truncated 104976 bytes from beginning
4
1,281,710 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,242 >>> mbox cmd response: success
2,772,307 UART: [afmc] ++
2,772,475 UART: [afmc] CDI.KEYID = 6
2,772,838 UART: [afmc] SUBJECT.KEYID = 7
2,773,264 UART: [afmc] AUTHORITY.KEYID = 5
2,809,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,138 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,851 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,760 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,474 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,377 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,600 UART: [state] LifecycleState = Unprovisioned
85,255 UART: [state] DebugLocked = No
85,749 UART: [state] WD Timer not started. Device not locked for debugging
87,070 UART: [kat] SHA2-256
890,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,749 UART: [kat] ++
894,901 UART: [kat] sha1
899,183 UART: [kat] SHA2-256
901,123 UART: [kat] SHA2-384
903,786 UART: [kat] SHA2-512-ACC
905,687 UART: [kat] ECC-384
915,188 UART: [kat] HMAC-384Kdf
919,580 UART: [kat] LMS
1,167,892 UART: [kat] --
1,168,829 UART: [cold-reset] ++
1,169,363 UART: [fht] FHT @ 0x50003400
1,172,101 UART: [idev] ++
1,172,269 UART: [idev] CDI.KEYID = 6
1,172,630 UART: [idev] SUBJECT.KEYID = 7
1,173,055 UART: [idev] UDS.KEYID = 0
1,181,137 UART: [idev] Erasing UDS.KEYID = 0
1,197,901 UART: [idev] Sha1 KeyId Algorithm
1,206,907 UART: [idev] --
1,208,018 UART: [ldev] ++
1,208,186 UART: [ldev] CDI.KEYID = 6
1,208,550 UART: [ldev] SUBJECT.KEYID = 5
1,208,977 UART: [ldev] AUTHORITY.KEYID = 7
1,209,440 UART: [ldev] FE.KEYID = 1
1,214,616 UART: [ldev] Erasing FE.KEYID = 1
1,240,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,948 UART: [ldev] --
1,280,308 UART: [fwproc] Wait for Commands...
1,281,023 UART: [fwproc] Recv command 0x46574c44
1,281,756 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,604,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,428 >>> mbox cmd response: success
2,770,665 UART: [afmc] ++
2,770,833 UART: [afmc] CDI.KEYID = 6
2,771,196 UART: [afmc] SUBJECT.KEYID = 7
2,771,622 UART: [afmc] AUTHORITY.KEYID = 5
2,806,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,698 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,411 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,320 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,034 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,683 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,284 UART: [kat] SHA2-512-ACC
906,185 UART: [kat] ECC-384
915,636 UART: [kat] HMAC-384Kdf
920,188 UART: [kat] LMS
1,168,500 UART: [kat] --
1,169,439 UART: [cold-reset] ++
1,169,921 UART: [fht] FHT @ 0x50003400
1,172,453 UART: [idev] ++
1,172,621 UART: [idev] CDI.KEYID = 6
1,172,982 UART: [idev] SUBJECT.KEYID = 7
1,173,407 UART: [idev] UDS.KEYID = 0
1,181,243 UART: [idev] Erasing UDS.KEYID = 0
1,198,065 UART: [idev] Sha1 KeyId Algorithm
1,206,737 UART: [idev] --
1,207,592 UART: [ldev] ++
1,207,760 UART: [ldev] CDI.KEYID = 6
1,208,124 UART: [ldev] SUBJECT.KEYID = 5
1,208,551 UART: [ldev] AUTHORITY.KEYID = 7
1,209,014 UART: [ldev] FE.KEYID = 1
1,214,360 UART: [ldev] Erasing FE.KEYID = 1
1,240,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,138 UART: [ldev] --
1,279,522 UART: [fwproc] Wait for Commands...
1,280,203 UART: [fwproc] Recv command 0x46574c44
1,280,936 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,560 >>> mbox cmd response: success
2,769,665 UART: [afmc] ++
2,769,833 UART: [afmc] CDI.KEYID = 6
2,770,196 UART: [afmc] SUBJECT.KEYID = 7
2,770,622 UART: [afmc] AUTHORITY.KEYID = 5
2,805,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,306 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,019 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,928 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,642 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,848,243 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,079 UART: [kat] ++
895,231 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,590 UART: [kat] LMS
1,168,902 UART: [kat] --
1,170,003 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,217 UART: [idev] ++
1,173,385 UART: [idev] CDI.KEYID = 6
1,173,746 UART: [idev] SUBJECT.KEYID = 7
1,174,171 UART: [idev] UDS.KEYID = 0
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,341 UART: [idev] --
1,208,314 UART: [ldev] ++
1,208,482 UART: [ldev] CDI.KEYID = 6
1,208,846 UART: [ldev] SUBJECT.KEYID = 5
1,209,273 UART: [ldev] AUTHORITY.KEYID = 7
1,209,736 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,240,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,950 UART: [ldev] --
1,280,464 UART: [fwproc] Wait for Commands...
1,281,171 UART: [fwproc] Recv command 0x46574c44
1,281,904 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,848 >>> mbox cmd response: success
2,770,065 UART: [afmc] ++
2,770,233 UART: [afmc] CDI.KEYID = 6
2,770,596 UART: [afmc] SUBJECT.KEYID = 7
2,771,022 UART: [afmc] AUTHORITY.KEYID = 5
2,806,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,792 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,829,505 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,835,414 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,841,128 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,849,185 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.48s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,882 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,582 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,334 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,202 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,066 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,724 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,646 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,834 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,764 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,250 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,181 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,694 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,306 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,954 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,286 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,112 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,414 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,026 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,130 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,186 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,038 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.40s
Truncated 104976 bytes from beginning
4
1,283,373 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,742 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,665 >>> mbox cmd response: success
2,772,756 UART: [afmc] ++
2,772,924 UART: [afmc] CDI.KEYID = 6
2,773,287 UART: [afmc] SUBJECT.KEYID = 7
2,773,713 UART: [afmc] AUTHORITY.KEYID = 5
2,809,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,273 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,986 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,895 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,609 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,402 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,710 UART: [kat] SHA2-256
901,650 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,782 UART: [fht] FHT @ 0x50003400
1,173,462 UART: [idev] ++
1,173,630 UART: [idev] CDI.KEYID = 6
1,173,991 UART: [idev] SUBJECT.KEYID = 7
1,174,416 UART: [idev] UDS.KEYID = 0
1,181,840 UART: [idev] Erasing UDS.KEYID = 0
1,198,858 UART: [idev] Sha1 KeyId Algorithm
1,207,568 UART: [idev] --
1,208,639 UART: [ldev] ++
1,208,807 UART: [ldev] CDI.KEYID = 6
1,209,171 UART: [ldev] SUBJECT.KEYID = 5
1,209,598 UART: [ldev] AUTHORITY.KEYID = 7
1,210,061 UART: [ldev] FE.KEYID = 1
1,215,259 UART: [ldev] Erasing FE.KEYID = 1
1,241,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,297 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,202 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,999 >>> mbox cmd response: success
2,772,130 UART: [afmc] ++
2,772,298 UART: [afmc] CDI.KEYID = 6
2,772,661 UART: [afmc] SUBJECT.KEYID = 7
2,773,087 UART: [afmc] AUTHORITY.KEYID = 5
2,809,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,469 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,182 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,091 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,805 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,648 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,917 UART: [state] LifecycleState = Unprovisioned
86,572 UART: [state] DebugLocked = No
87,062 UART: [state] WD Timer not started. Device not locked for debugging
88,389 UART: [kat] SHA2-256
891,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,068 UART: [kat] ++
896,220 UART: [kat] sha1
900,612 UART: [kat] SHA2-256
902,552 UART: [kat] SHA2-384
905,315 UART: [kat] SHA2-512-ACC
907,216 UART: [kat] ECC-384
917,077 UART: [kat] HMAC-384Kdf
921,691 UART: [kat] LMS
1,170,003 UART: [kat] --
1,171,034 UART: [cold-reset] ++
1,171,596 UART: [fht] FHT @ 0x50003400
1,174,262 UART: [idev] ++
1,174,430 UART: [idev] CDI.KEYID = 6
1,174,791 UART: [idev] SUBJECT.KEYID = 7
1,175,216 UART: [idev] UDS.KEYID = 0
1,183,216 UART: [idev] Erasing UDS.KEYID = 0
1,200,744 UART: [idev] Sha1 KeyId Algorithm
1,209,494 UART: [idev] --
1,210,487 UART: [ldev] ++
1,210,655 UART: [ldev] CDI.KEYID = 6
1,211,019 UART: [ldev] SUBJECT.KEYID = 5
1,211,446 UART: [ldev] AUTHORITY.KEYID = 7
1,211,909 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,244,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,037 UART: [ldev] --
1,283,315 UART: [fwproc] Wait for Commands...
1,283,930 UART: [fwproc] Recv command 0x46574c44
1,284,663 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,123 >>> mbox cmd response: success
2,774,368 UART: [afmc] ++
2,774,536 UART: [afmc] CDI.KEYID = 6
2,774,899 UART: [afmc] SUBJECT.KEYID = 7
2,775,325 UART: [afmc] AUTHORITY.KEYID = 5
2,810,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,745 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,458 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,367 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,081 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,962 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,013 UART: [state] LifecycleState = Unprovisioned
85,668 UART: [state] DebugLocked = No
86,172 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
891,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,618 UART: [kat] SHA2-256
901,558 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,831 UART: [kat] HMAC-384Kdf
921,649 UART: [kat] LMS
1,169,961 UART: [kat] --
1,170,800 UART: [cold-reset] ++
1,171,148 UART: [fht] FHT @ 0x50003400
1,173,832 UART: [idev] ++
1,174,000 UART: [idev] CDI.KEYID = 6
1,174,361 UART: [idev] SUBJECT.KEYID = 7
1,174,786 UART: [idev] UDS.KEYID = 0
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,120 UART: [idev] Sha1 KeyId Algorithm
1,209,200 UART: [idev] --
1,210,195 UART: [ldev] ++
1,210,363 UART: [ldev] CDI.KEYID = 6
1,210,727 UART: [ldev] SUBJECT.KEYID = 5
1,211,154 UART: [ldev] AUTHORITY.KEYID = 7
1,211,617 UART: [ldev] FE.KEYID = 1
1,216,821 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,127 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,182 UART: [fwproc] Recv command 0x46574c44
1,283,915 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,042 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,951 >>> mbox cmd response: success
2,772,186 UART: [afmc] ++
2,772,354 UART: [afmc] CDI.KEYID = 6
2,772,717 UART: [afmc] SUBJECT.KEYID = 7
2,773,143 UART: [afmc] AUTHORITY.KEYID = 5
2,808,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,223 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,831,936 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,837,845 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,559 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,444 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 30.82s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,599 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,753 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,011 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,923 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,309 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,387 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,073 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,641 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,409 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,233 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,599 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,561 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,245 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,019 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,671 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,583 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,907 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,453 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,307 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,645 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,507 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 29.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
6,019 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,362 UART:
192,772 UART: Running Caliptra ROM ...
193,958 UART:
194,110 UART: [state] CFI Enabled
260,126 UART: [state] LifecycleState = Unprovisioned
262,585 UART: [state] DebugLocked = No
264,405 UART: [state] WD Timer not started. Device not locked for debugging
269,598 UART: [kat] SHA2-256
451,499 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,073 UART: [kat] ++
463,612 UART: [kat] sha1
474,118 UART: [kat] SHA2-256
477,140 UART: [kat] SHA2-384
484,297 UART: [kat] SHA2-512-ACC
486,906 UART: [kat] ECC-384
3,773,626 UART: [kat] HMAC-384Kdf
3,798,388 UART: [kat] LMS
4,871,548 UART: [kat] --
4,877,779 UART: [cold-reset] ++
4,879,719 UART: [fht] FHT @ 0x50003400
4,891,460 UART: [idev] ++
4,892,205 UART: [idev] CDI.KEYID = 6
4,893,308 UART: [idev] SUBJECT.KEYID = 7
4,894,522 UART: [idev] UDS.KEYID = 0
4,925,699 UART: [idev] Erasing UDS.KEYID = 0
8,239,283 UART: [idev] Sha1 KeyId Algorithm
8,260,999 UART: [idev] --
8,263,429 UART: [ldev] ++
8,264,000 UART: [ldev] CDI.KEYID = 6
8,265,184 UART: [ldev] SUBJECT.KEYID = 5
8,266,340 UART: [ldev] AUTHORITY.KEYID = 7
8,267,567 UART: [ldev] FE.KEYID = 1
8,314,746 UART: [ldev] Erasing FE.KEYID = 1
11,654,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,641 UART: [ldev] --
14,036,636 UART: [fwproc] Wait for Commands...
14,038,460 UART: [fwproc] Recv command 0x46574c44
14,040,721 UART: [fwproc] Recv'd Img size: 113844 bytes
14,117,600 UART: ROM Fatal Error: 0x000B0032
14,121,008 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
5,831 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,928,077 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
6,662 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,482 UART:
192,870 UART: Running Caliptra ROM ...
194,179 UART:
603,439 UART: [state] CFI Enabled
619,163 UART: [state] LifecycleState = Unprovisioned
621,522 UART: [state] DebugLocked = No
624,248 UART: [state] WD Timer not started. Device not locked for debugging
629,169 UART: [kat] SHA2-256
811,139 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,699 UART: [kat] ++
823,282 UART: [kat] sha1
834,489 UART: [kat] SHA2-256
837,543 UART: [kat] SHA2-384
843,462 UART: [kat] SHA2-512-ACC
846,084 UART: [kat] ECC-384
4,101,858 UART: [kat] HMAC-384Kdf
4,112,804 UART: [kat] LMS
5,185,910 UART: [kat] --
5,192,371 UART: [cold-reset] ++
5,194,196 UART: [fht] FHT @ 0x50003400
5,205,491 UART: [idev] ++
5,206,165 UART: [idev] CDI.KEYID = 6
5,207,390 UART: [idev] SUBJECT.KEYID = 7
5,208,811 UART: [idev] UDS.KEYID = 0
5,227,099 UART: [idev] Erasing UDS.KEYID = 0
8,501,259 UART: [idev] Sha1 KeyId Algorithm
8,523,200 UART: [idev] --
8,526,909 UART: [ldev] ++
8,527,467 UART: [ldev] CDI.KEYID = 6
8,528,696 UART: [ldev] SUBJECT.KEYID = 5
8,530,196 UART: [ldev] AUTHORITY.KEYID = 7
8,531,692 UART: [ldev] FE.KEYID = 1
8,541,629 UART: [ldev] Erasing FE.KEYID = 1
11,832,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,668 UART: [ldev] --
14,198,173 UART: [fwproc] Wait for Commands...
14,199,894 UART: [fwproc] Recv command 0x46574c44
14,202,199 UART: [fwproc] Recv'd Img size: 113844 bytes
14,279,147 UART: ROM Fatal Error: 0x000B0032
14,282,555 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
6,201 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,087,294 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
6,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,003 UART:
192,400 UART: Running Caliptra ROM ...
193,541 UART:
193,690 UART: [state] CFI Enabled
265,588 UART: [state] LifecycleState = Unprovisioned
267,507 UART: [state] DebugLocked = No
269,706 UART: [state] WD Timer not started. Device not locked for debugging
272,671 UART: [kat] SHA2-256
451,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,381 UART: [kat] ++
463,918 UART: [kat] sha1
474,049 UART: [kat] SHA2-256
477,110 UART: [kat] SHA2-384
483,677 UART: [kat] SHA2-512-ACC
486,627 UART: [kat] ECC-384
2,946,221 UART: [kat] HMAC-384Kdf
2,968,717 UART: [kat] LMS
3,498,158 UART: [kat] --
3,502,261 UART: [cold-reset] ++
3,503,113 UART: [fht] FHT @ 0x50003400
3,514,471 UART: [idev] ++
3,515,038 UART: [idev] CDI.KEYID = 6
3,516,059 UART: [idev] SUBJECT.KEYID = 7
3,517,165 UART: [idev] UDS.KEYID = 0
3,540,135 UART: [idev] Erasing UDS.KEYID = 0
6,023,050 UART: [idev] Sha1 KeyId Algorithm
6,046,328 UART: [idev] --
6,051,351 UART: [ldev] ++
6,051,919 UART: [ldev] CDI.KEYID = 6
6,052,801 UART: [ldev] SUBJECT.KEYID = 5
6,054,039 UART: [ldev] AUTHORITY.KEYID = 7
6,055,279 UART: [ldev] FE.KEYID = 1
6,096,902 UART: [ldev] Erasing FE.KEYID = 1
8,601,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,735 UART: [ldev] --
10,410,765 UART: [fwproc] Wait for Commands...
10,413,950 UART: [fwproc] Recv command 0x46574c44
10,415,993 UART: [fwproc] Recv'd Img size: 114168 bytes
10,493,920 UART: ROM Fatal Error: 0x000B0032
10,497,013 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
5,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,299,761 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
6,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,411 UART:
192,802 UART: Running Caliptra ROM ...
193,937 UART:
603,653 UART: [state] CFI Enabled
615,427 UART: [state] LifecycleState = Unprovisioned
617,258 UART: [state] DebugLocked = No
619,175 UART: [state] WD Timer not started. Device not locked for debugging
623,650 UART: [kat] SHA2-256
802,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,394 UART: [kat] ++
814,918 UART: [kat] sha1
826,500 UART: [kat] SHA2-256
829,559 UART: [kat] SHA2-384
836,497 UART: [kat] SHA2-512-ACC
839,422 UART: [kat] ECC-384
3,280,190 UART: [kat] HMAC-384Kdf
3,291,393 UART: [kat] LMS
3,820,871 UART: [kat] --
3,825,147 UART: [cold-reset] ++
3,827,083 UART: [fht] FHT @ 0x50003400
3,838,328 UART: [idev] ++
3,838,886 UART: [idev] CDI.KEYID = 6
3,839,819 UART: [idev] SUBJECT.KEYID = 7
3,841,026 UART: [idev] UDS.KEYID = 0
3,858,680 UART: [idev] Erasing UDS.KEYID = 0
6,310,521 UART: [idev] Sha1 KeyId Algorithm
6,333,077 UART: [idev] --
6,336,828 UART: [ldev] ++
6,337,401 UART: [ldev] CDI.KEYID = 6
6,338,288 UART: [ldev] SUBJECT.KEYID = 5
6,339,497 UART: [ldev] AUTHORITY.KEYID = 7
6,340,742 UART: [ldev] FE.KEYID = 1
6,352,466 UART: [ldev] Erasing FE.KEYID = 1
8,824,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,100 UART: [ldev] --
10,614,492 UART: [fwproc] Wait for Commands...
10,617,335 UART: [fwproc] Recv command 0x46574c44
10,619,425 UART: [fwproc] Recv'd Img size: 114168 bytes
10,696,301 UART: ROM Fatal Error: 0x000B0032
10,699,389 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
6,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,496,578 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
5,516 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,068 UART:
192,460 UART: Running Caliptra ROM ...
193,649 UART:
193,804 UART: [state] CFI Enabled
260,548 UART: [state] LifecycleState = Unprovisioned
262,411 UART: [state] DebugLocked = No
263,727 UART: [state] WD Timer not started. Device not locked for debugging
267,230 UART: [kat] SHA2-256
446,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,965 UART: [kat] ++
458,506 UART: [kat] sha1
470,035 UART: [kat] SHA2-256
473,041 UART: [kat] SHA2-384
478,265 UART: [kat] SHA2-512-ACC
481,255 UART: [kat] ECC-384
2,946,541 UART: [kat] HMAC-384Kdf
2,968,990 UART: [kat] LMS
3,498,455 UART: [kat] --
3,505,038 UART: [cold-reset] ++
3,505,941 UART: [fht] FHT @ 0x50003400
3,517,705 UART: [idev] ++
3,518,266 UART: [idev] CDI.KEYID = 6
3,519,284 UART: [idev] SUBJECT.KEYID = 7
3,520,441 UART: [idev] UDS.KEYID = 0
3,541,551 UART: [idev] Erasing UDS.KEYID = 0
6,024,876 UART: [idev] Sha1 KeyId Algorithm
6,046,121 UART: [idev] --
6,049,561 UART: [ldev] ++
6,050,143 UART: [ldev] CDI.KEYID = 6
6,051,061 UART: [ldev] SUBJECT.KEYID = 5
6,052,174 UART: [ldev] AUTHORITY.KEYID = 7
6,053,471 UART: [ldev] FE.KEYID = 1
6,097,316 UART: [ldev] Erasing FE.KEYID = 1
8,603,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,466 UART: [ldev] --
10,413,946 UART: [fwproc] Wait for Commands...
10,416,636 UART: [fwproc] Recv command 0x46574c44
10,418,751 UART: [fwproc] Recv'd Img size: 114168 bytes
10,500,680 UART: ROM Fatal Error: 0x000B0032
10,503,779 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
5,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,280,467 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
6,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,318 UART:
192,720 UART: Running Caliptra ROM ...
193,868 UART:
603,424 UART: [state] CFI Enabled
616,774 UART: [state] LifecycleState = Unprovisioned
618,659 UART: [state] DebugLocked = No
620,196 UART: [state] WD Timer not started. Device not locked for debugging
623,859 UART: [kat] SHA2-256
802,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,551 UART: [kat] ++
815,083 UART: [kat] sha1
825,815 UART: [kat] SHA2-256
828,800 UART: [kat] SHA2-384
834,895 UART: [kat] SHA2-512-ACC
837,877 UART: [kat] ECC-384
3,278,430 UART: [kat] HMAC-384Kdf
3,291,092 UART: [kat] LMS
3,820,623 UART: [kat] --
3,826,556 UART: [cold-reset] ++
3,828,811 UART: [fht] FHT @ 0x50003400
3,840,105 UART: [idev] ++
3,840,672 UART: [idev] CDI.KEYID = 6
3,841,683 UART: [idev] SUBJECT.KEYID = 7
3,842,781 UART: [idev] UDS.KEYID = 0
3,858,264 UART: [idev] Erasing UDS.KEYID = 0
6,313,147 UART: [idev] Sha1 KeyId Algorithm
6,336,867 UART: [idev] --
6,341,600 UART: [ldev] ++
6,342,197 UART: [ldev] CDI.KEYID = 6
6,343,084 UART: [ldev] SUBJECT.KEYID = 5
6,344,306 UART: [ldev] AUTHORITY.KEYID = 7
6,345,560 UART: [ldev] FE.KEYID = 1
6,355,960 UART: [ldev] Erasing FE.KEYID = 1
8,831,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,272 UART: [ldev] --
10,621,181 UART: [fwproc] Wait for Commands...
10,624,299 UART: [fwproc] Recv command 0x46574c44
10,626,393 UART: [fwproc] Recv'd Img size: 114168 bytes
10,701,941 UART: ROM Fatal Error: 0x000B0032
10,705,037 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,282 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,481,811 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,696 UART: [state] LifecycleState = Unprovisioned
85,351 UART: [state] DebugLocked = No
85,911 UART: [state] WD Timer not started. Device not locked for debugging
87,264 UART: [kat] SHA2-256
890,814 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,943 UART: [kat] ++
895,095 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
904,098 UART: [kat] SHA2-512-ACC
905,999 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,263 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,543 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,215,294 UART: [ldev] Erasing FE.KEYID = 1
1,240,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,520 UART: [ldev] --
1,279,908 UART: [fwproc] Wait for Commands...
1,280,691 UART: [fwproc] Recv command 0x46574c44
1,281,424 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,188 UART: ROM Fatal Error: 0x000B0032
1,308,345 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,660 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,268 UART: [fht] FHT @ 0x50003400
1,172,804 UART: [idev] ++
1,172,972 UART: [idev] CDI.KEYID = 6
1,173,333 UART: [idev] SUBJECT.KEYID = 7
1,173,758 UART: [idev] UDS.KEYID = 0
1,182,044 UART: [idev] Erasing UDS.KEYID = 0
1,199,114 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] --
1,208,943 UART: [ldev] ++
1,209,111 UART: [ldev] CDI.KEYID = 6
1,209,475 UART: [ldev] SUBJECT.KEYID = 5
1,209,902 UART: [ldev] AUTHORITY.KEYID = 7
1,210,365 UART: [ldev] FE.KEYID = 1
1,215,701 UART: [ldev] Erasing FE.KEYID = 1
1,241,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,361 UART: [ldev] --
1,280,707 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,045 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,989 UART: ROM Fatal Error: 0x000B0032
1,309,146 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,947 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
915,614 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,289 UART: [cold-reset] ++
1,169,681 UART: [fht] FHT @ 0x50003400
1,172,377 UART: [idev] ++
1,172,545 UART: [idev] CDI.KEYID = 6
1,172,906 UART: [idev] SUBJECT.KEYID = 7
1,173,331 UART: [idev] UDS.KEYID = 0
1,181,809 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,475 UART: [idev] --
1,208,538 UART: [ldev] ++
1,208,706 UART: [ldev] CDI.KEYID = 6
1,209,070 UART: [ldev] SUBJECT.KEYID = 5
1,209,497 UART: [ldev] AUTHORITY.KEYID = 7
1,209,960 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,264 UART: [ldev] --
1,279,702 UART: [fwproc] Wait for Commands...
1,280,507 UART: [fwproc] Recv command 0x46574c44
1,281,240 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,214 UART: ROM Fatal Error: 0x000B0032
1,308,371 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,630 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,837 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,412 UART: [kat] SHA2-256
902,352 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,477 UART: [kat] LMS
1,169,789 UART: [kat] --
1,170,558 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,828 UART: [idev] ++
1,173,996 UART: [idev] CDI.KEYID = 6
1,174,357 UART: [idev] SUBJECT.KEYID = 7
1,174,782 UART: [idev] UDS.KEYID = 0
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,670 UART: [idev] --
1,209,561 UART: [ldev] ++
1,209,729 UART: [ldev] CDI.KEYID = 6
1,210,093 UART: [ldev] SUBJECT.KEYID = 5
1,210,520 UART: [ldev] AUTHORITY.KEYID = 7
1,210,983 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,387 UART: [ldev] --
1,282,869 UART: [fwproc] Wait for Commands...
1,283,538 UART: [fwproc] Recv command 0x46574c44
1,284,271 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,559 UART: ROM Fatal Error: 0x000B0032
1,310,716 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,255 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,092 UART: [kat] LMS
1,169,404 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,175 UART: [idev] ++
1,173,343 UART: [idev] CDI.KEYID = 6
1,173,704 UART: [idev] SUBJECT.KEYID = 7
1,174,129 UART: [idev] UDS.KEYID = 0
1,181,915 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,207,489 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,340 UART: [ldev] Erasing FE.KEYID = 1
1,241,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,506 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,589 UART: [fwproc] Recv command 0x46574c44
1,282,322 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,252 UART: ROM Fatal Error: 0x000B0032
1,308,409 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,010 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,034 UART: [cold-reset] ++
1,170,408 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,181,866 UART: [idev] Erasing UDS.KEYID = 0
1,199,142 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,209,021 UART: [ldev] ++
1,209,189 UART: [ldev] CDI.KEYID = 6
1,209,553 UART: [ldev] SUBJECT.KEYID = 5
1,209,980 UART: [ldev] AUTHORITY.KEYID = 7
1,210,443 UART: [ldev] FE.KEYID = 1
1,215,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,127 UART: [ldev] --
1,281,447 UART: [fwproc] Wait for Commands...
1,282,228 UART: [fwproc] Recv command 0x46574c44
1,282,961 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,745 UART: ROM Fatal Error: 0x000B0032
1,309,902 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,993 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
Truncated 76844 bytes from beginning
4,041,057 UART: [fwproc] Recv'd Img size: 113844 bytes
14,111,209 UART: ROM Fatal Error: 0x00B0003A
14,114,621 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,815 writing to cptra_bootfsm_go
2,053,792 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,197,589 UART:
2,197,989 UART: Running Caliptra ROM ...
2,199,086 UART:
2,199,243 UART: [state] CFI Enabled
2,200,208 UART: [state] LifecycleState = Unprovisioned
2,201,860 UART: [state] DebugLocked = No
2,202,887 UART: [state] WD Timer not started. Device not locked for debugging
2,205,346 UART: [kat] SHA2-256
2,206,009 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,024 UART: [kat] ++
2,209,473 UART: [kat] sha1
2,209,984 UART: [kat] SHA2-256
2,210,639 UART: [kat] SHA2-384
2,211,315 UART: [kat] SHA2-512-ACC
2,212,116 UART: [kat] ECC-384
3,779,116 UART: [kat] HMAC-384Kdf
3,801,623 UART: [kat] LMS
4,874,796 UART: [kat] --
4,879,511 UART: [cold-reset] ++
4,881,066 UART: [fht] FHT @ 0x50003400
4,892,644 UART: [idev] ++
4,893,321 UART: [idev] CDI.KEYID = 6
4,894,477 UART: [idev] SUBJECT.KEYID = 7
4,895,687 UART: [idev] UDS.KEYID = 0
4,929,875 UART: [idev] Erasing UDS.KEYID = 0
8,244,611 UART: [idev] Sha1 KeyId Algorithm
8,267,146 UART: [idev] --
8,271,631 UART: [ldev] ++
8,272,275 UART: [ldev] CDI.KEYID = 6
8,273,361 UART: [ldev] SUBJECT.KEYID = 5
8,274,580 UART: [ldev] AUTHORITY.KEYID = 7
8,275,811 UART: [ldev] FE.KEYID = 1
8,317,597 UART: [ldev] Erasing FE.KEYID = 1
11,652,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,253 UART: [ldev] --
14,037,178 UART: [fwproc] Wait for Commands...
14,039,942 UART: [fwproc] Recv command 0x46574c44
14,042,259 UART: [fwproc] Recv'd Img size: 113844 bytes
14,123,954 UART: ROM Fatal Error: 0x00B0003A
14,127,310 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,481 writing to cptra_bootfsm_go
2,053,667 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,197,590 UART:
2,198,007 UART: Running Caliptra ROM ...
2,199,180 UART:
2,199,357 UART: [state] CFI Enabled
2,200,317 UART: [state] LifecycleState = Unprovisioned
2,201,965 UART: [state] DebugLocked = No
2,203,064 UART: [state] WD Timer not started. Device not locked for debugging
2,205,535 UART: [kat] SHA2-256
2,206,199 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,229 UART: [kat] ++
2,209,681 UART: [kat] sha1
2,210,194 UART: [kat] SHA2-256
2,210,932 UART: [kat] SHA2-384
2,211,597 UART: [kat] SHA2-512-ACC
2,212,429 UART: [kat] ECC-384
3,777,206 UART: [kat] HMAC-384Kdf
3,803,711 UART: [kat] LMS
4,876,846 UART: [kat] --
4,880,947 UART: [cold-reset] ++
4,882,362 UART: [fht] FHT @ 0x50003400
4,893,999 UART: [idev] ++
4,894,672 UART: [idev] CDI.KEYID = 6
4,895,855 UART: [idev] SUBJECT.KEYID = 7
4,897,016 UART: [idev] UDS.KEYID = 0
4,931,463 UART: [idev] Erasing UDS.KEYID = 0
8,243,634 UART: [idev] Sha1 KeyId Algorithm
8,266,165 UART: [idev] --
8,271,182 UART: [ldev] ++
8,271,752 UART: [ldev] CDI.KEYID = 6
8,272,982 UART: [ldev] SUBJECT.KEYID = 5
8,274,145 UART: [ldev] AUTHORITY.KEYID = 7
8,275,373 UART: [ldev] FE.KEYID = 1
8,318,911 UART: [ldev] Erasing FE.KEYID = 1
11,653,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,805 UART: [ldev] --
14,039,236 UART: [fwproc] Wait for Commands...
14,041,981 UART: [fwproc] Recv command 0x46574c44
14,044,324 UART: [fwproc] Recv'd Img size: 113844 bytes
14,117,233 UART: ROM Fatal Error: 0x00B0003A
14,120,593 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
2,054,546 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,198,278 UART:
2,198,683 UART: Running Caliptra ROM ...
2,199,754 UART:
2,199,905 UART: [state] CFI Enabled
2,200,872 UART: [state] LifecycleState = Unprovisioned
2,202,553 UART: [state] DebugLocked = No
2,203,580 UART: [state] WD Timer not started. Device not locked for debugging
2,206,045 UART: [kat] SHA2-256
2,206,715 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,209,920 UART: [kat] ++
2,210,397 UART: [kat] sha1
2,210,916 UART: [kat] SHA2-256
2,211,665 UART: [kat] SHA2-384
2,212,333 UART: [kat] SHA2-512-ACC
2,213,134 UART: [kat] ECC-384
3,776,027 UART: [kat] HMAC-384Kdf
3,801,011 UART: [kat] LMS
4,874,187 UART: [kat] --
4,879,056 UART: [cold-reset] ++
4,880,993 UART: [fht] FHT @ 0x50003400
4,892,564 UART: [idev] ++
4,893,262 UART: [idev] CDI.KEYID = 6
4,894,445 UART: [idev] SUBJECT.KEYID = 7
4,895,603 UART: [idev] UDS.KEYID = 0
4,928,272 UART: [idev] Erasing UDS.KEYID = 0
8,240,935 UART: [idev] Sha1 KeyId Algorithm
8,263,138 UART: [idev] --
8,266,970 UART: [ldev] ++
8,267,540 UART: [ldev] CDI.KEYID = 6
8,268,777 UART: [ldev] SUBJECT.KEYID = 5
8,269,928 UART: [ldev] AUTHORITY.KEYID = 7
8,271,157 UART: [ldev] FE.KEYID = 1
8,315,132 UART: [ldev] Erasing FE.KEYID = 1
11,647,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,532 UART: [ldev] --
14,034,152 UART: [fwproc] Wait for Commands...
14,036,626 UART: [fwproc] Recv command 0x46574c44
14,038,942 UART: [fwproc] Recv'd Img size: 113844 bytes
14,112,595 UART: ROM Fatal Error: 0x00B0003A
14,116,002 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,832 writing to cptra_bootfsm_go
2,053,238 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,197,129 UART:
2,197,549 UART: Running Caliptra ROM ...
2,198,644 UART:
2,198,797 UART: [state] CFI Enabled
2,199,757 UART: [state] LifecycleState = Unprovisioned
2,201,413 UART: [state] DebugLocked = No
2,202,438 UART: [state] WD Timer not started. Device not locked for debugging
2,204,895 UART: [kat] SHA2-256
2,205,559 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,208,572 UART: [kat] ++
2,209,016 UART: [kat] sha1
2,209,525 UART: [kat] SHA2-256
2,210,183 UART: [kat] SHA2-384
2,210,837 UART: [kat] SHA2-512-ACC
2,211,636 UART: [kat] ECC-384
3,777,552 UART: [kat] HMAC-384Kdf
3,803,238 UART: [kat] LMS
4,876,395 UART: [kat] --
4,879,694 UART: [cold-reset] ++
4,881,571 UART: [fht] FHT @ 0x50003400
4,893,900 UART: [idev] ++
4,894,572 UART: [idev] CDI.KEYID = 6
4,895,726 UART: [idev] SUBJECT.KEYID = 7
4,896,936 UART: [idev] UDS.KEYID = 0
4,931,304 UART: [idev] Erasing UDS.KEYID = 0
8,240,864 UART: [idev] Sha1 KeyId Algorithm
8,261,666 UART: [idev] --
8,265,783 UART: [ldev] ++
8,266,488 UART: [ldev] CDI.KEYID = 6
8,267,726 UART: [ldev] SUBJECT.KEYID = 5
8,268,827 UART: [ldev] AUTHORITY.KEYID = 7
8,270,051 UART: [ldev] FE.KEYID = 1
8,297,932 UART: [ldev] Erasing FE.KEYID = 1
11,629,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,921,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,938,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,954,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,970,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,990,960 UART: [ldev] --
13,994,758 UART: [fwproc] Wait for Commands...
13,996,311 UART: [fwproc] Recv command 0x46574c44
13,998,573 UART: [fwproc] Recv'd Img size: 113844 bytes
22,557,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,635,143 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,703,950 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
23,020,020 >>> mbox cmd response: success
23,024,166 UART: [afmc] ++
23,024,866 UART: [afmc] CDI.KEYID = 6
23,026,107 UART: [afmc] SUBJECT.KEYID = 7
23,027,281 UART: [afmc] AUTHORITY.KEYID = 5
26,389,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,705,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,707,862 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,723,945 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,740,067 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,755,793 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,778,346 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.43s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
2,051,525 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,921,219 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,052,315 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,895,833 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,052,605 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,924,210 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,051,946 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,921,102 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,053,547 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,899,531 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,718 writing to cptra_bootfsm_go
2,055,565 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,898,441 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
2,050,618 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,902,409 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,050,206 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,886,192 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
2,051,160 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,871,801 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,051,640 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,923,847 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,049,726 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,906,398 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,050,268 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,876,364 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,050,361 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,901,207 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
2,054,812 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,881,530 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,050,689 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,900,095 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,051,413 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,917,336 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
2,051,797 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,877,418 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,050,426 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,903,408 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,050,222 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,491,437 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.06s
Truncated 76844 bytes from beginning
4,196,924 UART: [fwproc] Recv'd Img size: 113844 bytes
14,273,920 UART: ROM Fatal Error: 0x00B0003A
14,277,278 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,056,231 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,200,582 UART:
2,201,009 UART: Running Caliptra ROM ...
2,202,195 UART:
2,202,375 UART: [state] CFI Enabled
2,203,325 UART: [state] LifecycleState = Unprovisioned
2,204,982 UART: [state] DebugLocked = No
2,206,081 UART: [state] WD Timer not started. Device not locked for debugging
2,208,555 UART: [kat] SHA2-256
2,209,216 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,225 UART: [kat] ++
2,212,691 UART: [kat] sha1
2,213,197 UART: [kat] SHA2-256
2,213,928 UART: [kat] SHA2-384
2,214,587 UART: [kat] SHA2-512-ACC
2,215,409 UART: [kat] ECC-384
4,096,672 UART: [kat] HMAC-384Kdf
4,110,268 UART: [kat] LMS
5,183,416 UART: [kat] --
5,187,487 UART: [cold-reset] ++
5,189,209 UART: [fht] FHT @ 0x50003400
5,199,597 UART: [idev] ++
5,200,309 UART: [idev] CDI.KEYID = 6
5,201,498 UART: [idev] SUBJECT.KEYID = 7
5,202,929 UART: [idev] UDS.KEYID = 0
5,220,281 UART: [idev] Erasing UDS.KEYID = 0
8,493,723 UART: [idev] Sha1 KeyId Algorithm
8,516,485 UART: [idev] --
8,520,752 UART: [ldev] ++
8,521,370 UART: [ldev] CDI.KEYID = 6
8,522,470 UART: [ldev] SUBJECT.KEYID = 5
8,523,996 UART: [ldev] AUTHORITY.KEYID = 7
8,525,524 UART: [ldev] FE.KEYID = 1
8,534,978 UART: [ldev] Erasing FE.KEYID = 1
11,828,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,592 UART: [ldev] --
14,194,821 UART: [fwproc] Wait for Commands...
14,197,238 UART: [fwproc] Recv command 0x46574c44
14,199,546 UART: [fwproc] Recv'd Img size: 113844 bytes
14,278,623 UART: ROM Fatal Error: 0x00B0003A
14,281,984 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,061,939 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,205,860 UART:
2,206,278 UART: Running Caliptra ROM ...
2,207,449 UART:
2,207,614 UART: [state] CFI Enabled
2,208,481 UART: [state] LifecycleState = Unprovisioned
2,210,136 UART: [state] DebugLocked = No
2,211,267 UART: [state] WD Timer not started. Device not locked for debugging
2,213,737 UART: [kat] SHA2-256
2,214,400 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,217,413 UART: [kat] ++
2,217,861 UART: [kat] sha1
2,218,367 UART: [kat] SHA2-256
2,219,100 UART: [kat] SHA2-384
2,219,759 UART: [kat] SHA2-512-ACC
2,220,583 UART: [kat] ECC-384
4,100,495 UART: [kat] HMAC-384Kdf
4,111,659 UART: [kat] LMS
5,184,814 UART: [kat] --
5,187,213 UART: [cold-reset] ++
5,188,609 UART: [fht] FHT @ 0x50003400
5,200,858 UART: [idev] ++
5,201,583 UART: [idev] CDI.KEYID = 6
5,202,701 UART: [idev] SUBJECT.KEYID = 7
5,204,228 UART: [idev] UDS.KEYID = 0
5,221,845 UART: [idev] Erasing UDS.KEYID = 0
8,494,003 UART: [idev] Sha1 KeyId Algorithm
8,515,834 UART: [idev] --
8,519,863 UART: [ldev] ++
8,520,495 UART: [ldev] CDI.KEYID = 6
8,521,689 UART: [ldev] SUBJECT.KEYID = 5
8,523,122 UART: [ldev] AUTHORITY.KEYID = 7
8,524,672 UART: [ldev] FE.KEYID = 1
8,537,529 UART: [ldev] Erasing FE.KEYID = 1
11,830,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,605 UART: [ldev] --
14,193,943 UART: [fwproc] Wait for Commands...
14,196,959 UART: [fwproc] Recv command 0x46574c44
14,199,256 UART: [fwproc] Recv'd Img size: 113844 bytes
14,273,075 UART: ROM Fatal Error: 0x00B0003A
14,276,448 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,058,264 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,202,049 UART:
2,202,457 UART: Running Caliptra ROM ...
2,203,650 UART:
2,203,819 UART: [state] CFI Enabled
2,204,780 UART: [state] LifecycleState = Unprovisioned
2,206,414 UART: [state] DebugLocked = No
2,207,437 UART: [state] WD Timer not started. Device not locked for debugging
2,209,908 UART: [kat] SHA2-256
2,210,570 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,213,576 UART: [kat] ++
2,214,020 UART: [kat] sha1
2,214,558 UART: [kat] SHA2-256
2,215,210 UART: [kat] SHA2-384
2,215,860 UART: [kat] SHA2-512-ACC
2,216,675 UART: [kat] ECC-384
4,098,272 UART: [kat] HMAC-384Kdf
4,111,002 UART: [kat] LMS
5,184,127 UART: [kat] --
5,190,106 UART: [cold-reset] ++
5,192,906 UART: [fht] FHT @ 0x50003400
5,205,175 UART: [idev] ++
5,205,902 UART: [idev] CDI.KEYID = 6
5,206,998 UART: [idev] SUBJECT.KEYID = 7
5,208,522 UART: [idev] UDS.KEYID = 0
5,228,306 UART: [idev] Erasing UDS.KEYID = 0
8,504,814 UART: [idev] Sha1 KeyId Algorithm
8,525,513 UART: [idev] --
8,530,369 UART: [ldev] ++
8,530,934 UART: [ldev] CDI.KEYID = 6
8,532,120 UART: [ldev] SUBJECT.KEYID = 5
8,533,599 UART: [ldev] AUTHORITY.KEYID = 7
8,535,147 UART: [ldev] FE.KEYID = 1
8,546,054 UART: [ldev] Erasing FE.KEYID = 1
11,840,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,132,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,148,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,164,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,180,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,199,684 UART: [ldev] --
14,204,475 UART: [fwproc] Wait for Commands...
14,206,457 UART: [fwproc] Recv command 0x46574c44
14,208,708 UART: [fwproc] Recv'd Img size: 113844 bytes
14,285,545 UART: ROM Fatal Error: 0x00B0003A
14,288,936 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
2,057,308 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,201,174 UART:
2,201,576 UART: Running Caliptra ROM ...
2,202,668 UART:
2,202,816 UART: [state] CFI Enabled
2,203,778 UART: [state] LifecycleState = Unprovisioned
2,205,413 UART: [state] DebugLocked = No
2,206,429 UART: [state] WD Timer not started. Device not locked for debugging
2,208,896 UART: [kat] SHA2-256
2,209,563 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,212,570 UART: [kat] ++
2,213,013 UART: [kat] sha1
2,213,519 UART: [kat] SHA2-256
2,214,249 UART: [kat] SHA2-384
2,214,907 UART: [kat] SHA2-512-ACC
2,215,753 UART: [kat] ECC-384
4,097,615 UART: [kat] HMAC-384Kdf
4,108,288 UART: [kat] LMS
5,181,429 UART: [kat] --
5,185,668 UART: [cold-reset] ++
5,187,934 UART: [fht] FHT @ 0x50003400
5,199,559 UART: [idev] ++
5,200,220 UART: [idev] CDI.KEYID = 6
5,201,323 UART: [idev] SUBJECT.KEYID = 7
5,202,854 UART: [idev] UDS.KEYID = 0
5,216,963 UART: [idev] Erasing UDS.KEYID = 0
8,483,766 UART: [idev] Sha1 KeyId Algorithm
8,506,289 UART: [idev] --
8,511,570 UART: [ldev] ++
8,512,186 UART: [ldev] CDI.KEYID = 6
8,513,285 UART: [ldev] SUBJECT.KEYID = 5
8,514,837 UART: [ldev] AUTHORITY.KEYID = 7
8,516,313 UART: [ldev] FE.KEYID = 1
8,527,979 UART: [ldev] Erasing FE.KEYID = 1
11,816,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,109,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,125,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,141,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,157,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,178,633 UART: [ldev] --
14,184,174 UART: [fwproc] Wait for Commands...
14,186,385 UART: [fwproc] Recv command 0x46574c44
14,188,692 UART: [fwproc] Recv'd Img size: 113844 bytes
22,523,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
22,603,012 UART: [fwproc] Load FMC at address 0x40000000 len 18820
22,671,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,987,732 >>> mbox cmd response: success
22,992,198 UART: [afmc] ++
22,992,899 UART: [afmc] CDI.KEYID = 6
22,994,058 UART: [afmc] SUBJECT.KEYID = 7
22,995,275 UART: [afmc] AUTHORITY.KEYID = 5
26,313,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,605,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,607,703 UART: [afmc] PUB.X = 5B07BA90FD5D5FC8D4385D85A0C0D5FA6108D225C1F34E26F7A9B1581680FB47F5697BF4C5946E0063AC14467940F1AC
28,623,758 UART: [afmc] PUB.Y = E3DD14E53196DE1A08BEF1861FAC6FE6DF43074B9BCF709AB15640DA485FDC9381F45A7952E0C2A5C157936196AC9549
28,639,898 UART: [afmc] SIG.R = 505E295461973293BF2D1C1A36B4F51DCD979493DFAB7F6A693859ABFDCB516EFD6D7A92C7EE4BC2DC917F907E787A0F
28,655,648 UART: [afmc] SIG.S = 6D459BF06A46ECC729A92DF9E7524462CB58EA1F8CDA59BA0ECA6623BDC5C9CE936F2EF16DF95F44ABAF06A349D889DF
28,678,436 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.67s
Truncated 8543 bytes from beginning
x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
2,058,665 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,096,143 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,054,744 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,098,193 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,057,345 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,089,471 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,058,222 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,085,156 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
2,060,958 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,087,253 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
2,057,795 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,096,062 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
2,055,808 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,090,793 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
2,056,712 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,097,866 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
2,055,344 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,098,606 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
2,056,709 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,088,379 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,066,210 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,086,077 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
2,058,141 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,090,747 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,055,602 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,098,936 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,055,440 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,104,486 >>> mbox cmd response: failed
0 new_unbooted
45 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,056,899 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,094,237 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
2,059,990 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,092,949 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,530 writing to cptra_bootfsm_go
2,057,292 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,080,377 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,063,839 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,088,052 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,112 writing to cptra_bootfsm_go
2,058,804 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,613,233 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 23.36s
Truncated 76844 bytes from beginning
0,416,717 UART: [fwproc] Recv'd Img size: 114168 bytes
10,494,422 UART: ROM Fatal Error: 0x00B0003A
10,497,559 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,056,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,200,300 UART:
2,200,715 UART: Running Caliptra ROM ...
2,201,883 UART:
2,202,057 UART: [state] CFI Enabled
2,203,018 UART: [state] LifecycleState = Unprovisioned
2,204,688 UART: [state] DebugLocked = No
2,205,720 UART: [state] WD Timer not started. Device not locked for debugging
2,208,197 UART: [kat] SHA2-256
2,208,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,868 UART: [kat] ++
2,212,320 UART: [kat] sha1
2,212,855 UART: [kat] SHA2-256
2,213,604 UART: [kat] SHA2-384
2,214,273 UART: [kat] SHA2-512-ACC
2,215,156 UART: [kat] ECC-384
2,950,151 UART: [kat] HMAC-384Kdf
2,972,701 UART: [kat] LMS
3,502,116 UART: [kat] --
3,504,816 UART: [cold-reset] ++
3,507,298 UART: [fht] FHT @ 0x50003400
3,518,926 UART: [idev] ++
3,519,491 UART: [idev] CDI.KEYID = 6
3,520,424 UART: [idev] SUBJECT.KEYID = 7
3,521,639 UART: [idev] UDS.KEYID = 0
3,543,203 UART: [idev] Erasing UDS.KEYID = 0
6,026,661 UART: [idev] Sha1 KeyId Algorithm
6,050,599 UART: [idev] --
6,054,458 UART: [ldev] ++
6,055,037 UART: [ldev] CDI.KEYID = 6
6,055,924 UART: [ldev] SUBJECT.KEYID = 5
6,057,145 UART: [ldev] AUTHORITY.KEYID = 7
6,058,385 UART: [ldev] FE.KEYID = 1
6,100,391 UART: [ldev] Erasing FE.KEYID = 1
8,604,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,226 UART: [ldev] --
10,412,403 UART: [fwproc] Wait for Commands...
10,415,536 UART: [fwproc] Recv command 0x46574c44
10,417,636 UART: [fwproc] Recv'd Img size: 114168 bytes
10,491,621 UART: ROM Fatal Error: 0x00B0003A
10,494,733 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,054,756 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,199,007 UART:
2,199,419 UART: Running Caliptra ROM ...
2,200,587 UART:
2,200,766 UART: [state] CFI Enabled
2,201,733 UART: [state] LifecycleState = Unprovisioned
2,203,391 UART: [state] DebugLocked = No
2,204,420 UART: [state] WD Timer not started. Device not locked for debugging
2,206,922 UART: [kat] SHA2-256
2,207,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,611 UART: [kat] ++
2,211,062 UART: [kat] sha1
2,211,579 UART: [kat] SHA2-256
2,212,317 UART: [kat] SHA2-384
2,212,986 UART: [kat] SHA2-512-ACC
2,213,874 UART: [kat] ECC-384
2,946,208 UART: [kat] HMAC-384Kdf
2,970,766 UART: [kat] LMS
3,500,220 UART: [kat] --
3,503,509 UART: [cold-reset] ++
3,504,790 UART: [fht] FHT @ 0x50003400
3,516,798 UART: [idev] ++
3,517,373 UART: [idev] CDI.KEYID = 6
3,518,393 UART: [idev] SUBJECT.KEYID = 7
3,519,730 UART: [idev] UDS.KEYID = 0
3,541,415 UART: [idev] Erasing UDS.KEYID = 0
6,023,345 UART: [idev] Sha1 KeyId Algorithm
6,045,773 UART: [idev] --
6,049,455 UART: [ldev] ++
6,050,031 UART: [ldev] CDI.KEYID = 6
6,050,940 UART: [ldev] SUBJECT.KEYID = 5
6,052,109 UART: [ldev] AUTHORITY.KEYID = 7
6,053,351 UART: [ldev] FE.KEYID = 1
6,098,306 UART: [ldev] Erasing FE.KEYID = 1
8,598,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,689 UART: [ldev] --
10,389,414 UART: [fwproc] Wait for Commands...
10,391,519 UART: [fwproc] Recv command 0x46574c44
10,393,566 UART: [fwproc] Recv'd Img size: 114168 bytes
10,471,007 UART: ROM Fatal Error: 0x00B0003A
10,474,166 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
2,054,533 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,198,799 UART:
2,199,204 UART: Running Caliptra ROM ...
2,200,293 UART:
2,200,473 UART: [state] CFI Enabled
2,201,394 UART: [state] LifecycleState = Unprovisioned
2,203,056 UART: [state] DebugLocked = No
2,204,088 UART: [state] WD Timer not started. Device not locked for debugging
2,206,570 UART: [kat] SHA2-256
2,207,234 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,210,252 UART: [kat] ++
2,210,701 UART: [kat] sha1
2,211,213 UART: [kat] SHA2-256
2,211,870 UART: [kat] SHA2-384
2,212,524 UART: [kat] SHA2-512-ACC
2,213,346 UART: [kat] ECC-384
2,944,730 UART: [kat] HMAC-384Kdf
2,971,237 UART: [kat] LMS
3,500,708 UART: [kat] --
3,505,728 UART: [cold-reset] ++
3,507,845 UART: [fht] FHT @ 0x50003400
3,518,885 UART: [idev] ++
3,519,464 UART: [idev] CDI.KEYID = 6
3,520,372 UART: [idev] SUBJECT.KEYID = 7
3,521,590 UART: [idev] UDS.KEYID = 0
3,542,104 UART: [idev] Erasing UDS.KEYID = 0
6,025,305 UART: [idev] Sha1 KeyId Algorithm
6,049,086 UART: [idev] --
6,051,463 UART: [ldev] ++
6,052,036 UART: [ldev] CDI.KEYID = 6
6,052,946 UART: [ldev] SUBJECT.KEYID = 5
6,054,110 UART: [ldev] AUTHORITY.KEYID = 7
6,055,400 UART: [ldev] FE.KEYID = 1
6,099,923 UART: [ldev] Erasing FE.KEYID = 1
8,604,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,028 UART: [ldev] --
10,411,840 UART: [fwproc] Wait for Commands...
10,414,640 UART: [fwproc] Recv command 0x46574c44
10,416,746 UART: [fwproc] Recv'd Img size: 114168 bytes
10,493,250 UART: ROM Fatal Error: 0x00B0003A
10,496,420 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,065,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,210,348 UART:
2,210,769 UART: Running Caliptra ROM ...
2,211,848 UART:
2,212,003 UART: [state] CFI Enabled
2,212,975 UART: [state] LifecycleState = Unprovisioned
2,214,638 UART: [state] DebugLocked = No
2,215,666 UART: [state] WD Timer not started. Device not locked for debugging
2,218,136 UART: [kat] SHA2-256
2,218,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,221,813 UART: [kat] ++
2,222,261 UART: [kat] sha1
2,222,772 UART: [kat] SHA2-256
2,223,428 UART: [kat] SHA2-384
2,224,084 UART: [kat] SHA2-512-ACC
2,224,931 UART: [kat] ECC-384
2,947,944 UART: [kat] HMAC-384Kdf
2,973,820 UART: [kat] LMS
3,503,300 UART: [kat] --
3,508,692 UART: [cold-reset] ++
3,509,648 UART: [fht] FHT @ 0x50003400
3,522,030 UART: [idev] ++
3,522,607 UART: [idev] CDI.KEYID = 6
3,523,625 UART: [idev] SUBJECT.KEYID = 7
3,524,731 UART: [idev] UDS.KEYID = 0
3,544,444 UART: [idev] Erasing UDS.KEYID = 0
6,028,532 UART: [idev] Sha1 KeyId Algorithm
6,051,008 UART: [idev] --
6,055,331 UART: [ldev] ++
6,055,903 UART: [ldev] CDI.KEYID = 6
6,056,985 UART: [ldev] SUBJECT.KEYID = 5
6,058,092 UART: [ldev] AUTHORITY.KEYID = 7
6,059,290 UART: [ldev] FE.KEYID = 1
6,102,196 UART: [ldev] Erasing FE.KEYID = 1
8,603,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,817 UART: [ldev] --
10,413,896 UART: [fwproc] Wait for Commands...
10,415,330 UART: [fwproc] Recv command 0x46574c44
10,417,442 UART: [fwproc] Recv'd Img size: 114168 bytes
14,978,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,053,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,122,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,439,869 >>> mbox cmd response: success
15,443,641 UART: [afmc] ++
15,444,250 UART: [afmc] CDI.KEYID = 6
15,445,158 UART: [afmc] SUBJECT.KEYID = 7
15,446,318 UART: [afmc] AUTHORITY.KEYID = 5
17,985,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,728,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,730,410 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,746,400 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,762,430 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,778,221 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,799,710 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.37s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,053,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,277,025 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
2,054,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,231,543 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,054,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,238,215 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,054,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,253,505 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,069,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,251,354 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,067,049 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,297,171 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
2,069,251 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,280,514 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
2,061,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,280,635 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
2,056,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,293,784 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,537 writing to cptra_bootfsm_go
2,063,917 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,252,374 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
2,065,539 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,255,139 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,054,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,259,036 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,061,118 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,258,225 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
2,059,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,254,330 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,060,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,251,282 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,957 writing to cptra_bootfsm_go
2,067,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,278,607 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,071,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,281,867 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
2,054,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,277,959 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
2,053,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,017,269 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 16.99s
Truncated 76844 bytes from beginning
0,614,249 UART: [fwproc] Recv'd Img size: 114168 bytes
10,690,997 UART: ROM Fatal Error: 0x00B0003A
10,694,135 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,057,715 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,201,903 UART:
2,202,321 UART: Running Caliptra ROM ...
2,203,409 UART:
2,203,581 UART: [state] CFI Enabled
2,204,551 UART: [state] LifecycleState = Unprovisioned
2,206,206 UART: [state] DebugLocked = No
2,207,227 UART: [state] WD Timer not started. Device not locked for debugging
2,209,704 UART: [kat] SHA2-256
2,210,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,376 UART: [kat] ++
2,213,822 UART: [kat] sha1
2,214,333 UART: [kat] SHA2-256
2,214,991 UART: [kat] SHA2-384
2,215,647 UART: [kat] SHA2-512-ACC
2,216,447 UART: [kat] ECC-384
3,284,580 UART: [kat] HMAC-384Kdf
3,296,554 UART: [kat] LMS
3,826,073 UART: [kat] --
3,831,044 UART: [cold-reset] ++
3,832,182 UART: [fht] FHT @ 0x50003400
3,843,863 UART: [idev] ++
3,844,422 UART: [idev] CDI.KEYID = 6
3,845,332 UART: [idev] SUBJECT.KEYID = 7
3,846,542 UART: [idev] UDS.KEYID = 0
3,861,358 UART: [idev] Erasing UDS.KEYID = 0
6,318,918 UART: [idev] Sha1 KeyId Algorithm
6,342,100 UART: [idev] --
6,347,174 UART: [ldev] ++
6,347,743 UART: [ldev] CDI.KEYID = 6
6,348,706 UART: [ldev] SUBJECT.KEYID = 5
6,349,956 UART: [ldev] AUTHORITY.KEYID = 7
6,351,154 UART: [ldev] FE.KEYID = 1
6,361,399 UART: [ldev] Erasing FE.KEYID = 1
8,834,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,135 UART: [ldev] --
10,623,075 UART: [fwproc] Wait for Commands...
10,625,819 UART: [fwproc] Recv command 0x46574c44
10,627,854 UART: [fwproc] Recv'd Img size: 114168 bytes
10,703,193 UART: ROM Fatal Error: 0x00B0003A
10,706,280 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
2,056,533 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,200,618 UART:
2,201,033 UART: Running Caliptra ROM ...
2,202,123 UART:
2,202,277 UART: [state] CFI Enabled
2,203,241 UART: [state] LifecycleState = Unprovisioned
2,204,902 UART: [state] DebugLocked = No
2,205,928 UART: [state] WD Timer not started. Device not locked for debugging
2,208,396 UART: [kat] SHA2-256
2,209,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,212,345 UART: [kat] ++
2,212,810 UART: [kat] sha1
2,213,323 UART: [kat] SHA2-256
2,214,012 UART: [kat] SHA2-384
2,214,675 UART: [kat] SHA2-512-ACC
2,215,561 UART: [kat] ECC-384
3,278,995 UART: [kat] HMAC-384Kdf
3,292,193 UART: [kat] LMS
3,821,654 UART: [kat] --
3,826,659 UART: [cold-reset] ++
3,828,921 UART: [fht] FHT @ 0x50003400
3,838,988 UART: [idev] ++
3,839,556 UART: [idev] CDI.KEYID = 6
3,840,479 UART: [idev] SUBJECT.KEYID = 7
3,841,582 UART: [idev] UDS.KEYID = 0
3,856,470 UART: [idev] Erasing UDS.KEYID = 0
6,316,989 UART: [idev] Sha1 KeyId Algorithm
6,340,545 UART: [idev] --
6,343,731 UART: [ldev] ++
6,344,306 UART: [ldev] CDI.KEYID = 6
6,345,216 UART: [ldev] SUBJECT.KEYID = 5
6,346,427 UART: [ldev] AUTHORITY.KEYID = 7
6,347,673 UART: [ldev] FE.KEYID = 1
6,358,317 UART: [ldev] Erasing FE.KEYID = 1
8,831,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,841 UART: [ldev] --
10,621,043 UART: [fwproc] Wait for Commands...
10,623,207 UART: [fwproc] Recv command 0x46574c44
10,625,248 UART: [fwproc] Recv'd Img size: 114168 bytes
10,702,242 UART: ROM Fatal Error: 0x00B0003A
10,705,379 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
2,057,487 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,201,730 UART:
2,202,140 UART: Running Caliptra ROM ...
2,203,302 UART:
2,203,472 UART: [state] CFI Enabled
2,204,424 UART: [state] LifecycleState = Unprovisioned
2,206,076 UART: [state] DebugLocked = No
2,207,184 UART: [state] WD Timer not started. Device not locked for debugging
2,209,652 UART: [kat] SHA2-256
2,210,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,337 UART: [kat] ++
2,213,842 UART: [kat] sha1
2,214,379 UART: [kat] SHA2-256
2,215,120 UART: [kat] SHA2-384
2,215,787 UART: [kat] SHA2-512-ACC
2,216,634 UART: [kat] ECC-384
3,284,198 UART: [kat] HMAC-384Kdf
3,296,094 UART: [kat] LMS
3,825,585 UART: [kat] --
3,828,789 UART: [cold-reset] ++
3,829,967 UART: [fht] FHT @ 0x50003400
3,839,916 UART: [idev] ++
3,840,478 UART: [idev] CDI.KEYID = 6
3,841,441 UART: [idev] SUBJECT.KEYID = 7
3,842,593 UART: [idev] UDS.KEYID = 0
3,859,972 UART: [idev] Erasing UDS.KEYID = 0
6,318,175 UART: [idev] Sha1 KeyId Algorithm
6,341,225 UART: [idev] --
6,345,641 UART: [ldev] ++
6,346,216 UART: [ldev] CDI.KEYID = 6
6,347,120 UART: [ldev] SUBJECT.KEYID = 5
6,348,335 UART: [ldev] AUTHORITY.KEYID = 7
6,349,566 UART: [ldev] FE.KEYID = 1
6,359,832 UART: [ldev] Erasing FE.KEYID = 1
8,833,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,645 UART: [ldev] --
10,625,853 UART: [fwproc] Wait for Commands...
10,628,331 UART: [fwproc] Recv command 0x46574c44
10,630,423 UART: [fwproc] Recv'd Img size: 114168 bytes
10,706,797 UART: ROM Fatal Error: 0x00B0003A
10,709,912 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
2,057,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,202,084 UART:
2,202,481 UART: Running Caliptra ROM ...
2,203,644 UART:
2,203,817 UART: [state] CFI Enabled
2,204,777 UART: [state] LifecycleState = Unprovisioned
2,206,430 UART: [state] DebugLocked = No
2,207,557 UART: [state] WD Timer not started. Device not locked for debugging
2,210,034 UART: [kat] SHA2-256
2,210,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,709 UART: [kat] ++
2,214,160 UART: [kat] sha1
2,214,674 UART: [kat] SHA2-256
2,215,408 UART: [kat] SHA2-384
2,216,072 UART: [kat] SHA2-512-ACC
2,216,873 UART: [kat] ECC-384
3,278,590 UART: [kat] HMAC-384Kdf
3,291,479 UART: [kat] LMS
3,820,986 UART: [kat] --
3,824,330 UART: [cold-reset] ++
3,826,089 UART: [fht] FHT @ 0x50003400
3,837,770 UART: [idev] ++
3,838,329 UART: [idev] CDI.KEYID = 6
3,839,263 UART: [idev] SUBJECT.KEYID = 7
3,840,418 UART: [idev] UDS.KEYID = 0
3,854,389 UART: [idev] Erasing UDS.KEYID = 0
6,307,848 UART: [idev] Sha1 KeyId Algorithm
6,331,284 UART: [idev] --
6,335,544 UART: [ldev] ++
6,336,111 UART: [ldev] CDI.KEYID = 6
6,337,014 UART: [ldev] SUBJECT.KEYID = 5
6,338,174 UART: [ldev] AUTHORITY.KEYID = 7
6,339,457 UART: [ldev] FE.KEYID = 1
6,351,665 UART: [ldev] Erasing FE.KEYID = 1
8,824,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,479 UART: [ldev] --
10,615,293 UART: [fwproc] Wait for Commands...
10,617,446 UART: [fwproc] Recv command 0x46574c44
10,619,539 UART: [fwproc] Recv'd Img size: 114168 bytes
15,193,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,271,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,339,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,656,510 >>> mbox cmd response: success
15,660,133 UART: [afmc] ++
15,660,713 UART: [afmc] CDI.KEYID = 6
15,661,598 UART: [afmc] SUBJECT.KEYID = 7
15,662,810 UART: [afmc] AUTHORITY.KEYID = 5
18,166,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,886,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,887,914 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,903,931 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,919,945 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,935,717 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,959,303 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.69s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
2,055,352 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,476,415 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
2,056,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,476,244 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,056,233 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,494,248 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,056,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,482,314 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,055,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,489,435 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
2,057,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,484,367 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,055,597 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,489,172 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,055,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,476,969 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,057,452 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,462,962 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
2,056,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,481,094 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,056,758 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,483,990 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,056,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,480,560 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,056,059 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,484,238 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,056,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,488,189 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,056,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,479,974 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
2,057,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,471,636 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
2,061,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,486,967 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
2,057,245 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,474,599 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
2,056,959 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,256,848 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.32s
Truncated 76844 bytes from beginning
0,391,496 UART: [fwproc] Recv'd Img size: 114168 bytes
10,467,247 UART: ROM Fatal Error: 0x00B0003A
10,470,399 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
2,067,712 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,211,888 UART:
2,212,292 UART: Running Caliptra ROM ...
2,213,469 UART:
2,213,642 UART: [state] CFI Enabled
2,214,601 UART: [state] LifecycleState = Unprovisioned
2,216,256 UART: [state] DebugLocked = No
2,217,364 UART: [state] WD Timer not started. Device not locked for debugging
2,219,836 UART: [kat] SHA2-256
2,220,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,223,513 UART: [kat] ++
2,223,965 UART: [kat] sha1
2,224,476 UART: [kat] SHA2-256
2,225,217 UART: [kat] SHA2-384
2,225,901 UART: [kat] SHA2-512-ACC
2,226,737 UART: [kat] ECC-384
2,945,649 UART: [kat] HMAC-384Kdf
2,970,775 UART: [kat] LMS
3,500,260 UART: [kat] --
3,506,115 UART: [cold-reset] ++
3,508,587 UART: [fht] FHT @ 0x50003400
3,519,142 UART: [idev] ++
3,519,705 UART: [idev] CDI.KEYID = 6
3,520,608 UART: [idev] SUBJECT.KEYID = 7
3,521,824 UART: [idev] UDS.KEYID = 0
3,542,014 UART: [idev] Erasing UDS.KEYID = 0
6,025,021 UART: [idev] Sha1 KeyId Algorithm
6,048,202 UART: [idev] --
6,051,420 UART: [ldev] ++
6,051,996 UART: [ldev] CDI.KEYID = 6
6,052,898 UART: [ldev] SUBJECT.KEYID = 5
6,054,003 UART: [ldev] AUTHORITY.KEYID = 7
6,055,300 UART: [ldev] FE.KEYID = 1
6,098,874 UART: [ldev] Erasing FE.KEYID = 1
8,600,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,669 UART: [ldev] --
10,412,500 UART: [fwproc] Wait for Commands...
10,414,975 UART: [fwproc] Recv command 0x46574c44
10,417,071 UART: [fwproc] Recv'd Img size: 114168 bytes
10,489,650 UART: ROM Fatal Error: 0x00B0003A
10,492,748 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,067,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,212,191 UART:
2,212,607 UART: Running Caliptra ROM ...
2,213,696 UART:
2,213,850 UART: [state] CFI Enabled
2,214,763 UART: [state] LifecycleState = Unprovisioned
2,216,423 UART: [state] DebugLocked = No
2,217,448 UART: [state] WD Timer not started. Device not locked for debugging
2,219,920 UART: [kat] SHA2-256
2,220,585 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,223,612 UART: [kat] ++
2,224,064 UART: [kat] sha1
2,224,577 UART: [kat] SHA2-256
2,225,232 UART: [kat] SHA2-384
2,225,887 UART: [kat] SHA2-512-ACC
2,226,709 UART: [kat] ECC-384
2,946,989 UART: [kat] HMAC-384Kdf
2,971,960 UART: [kat] LMS
3,501,407 UART: [kat] --
3,504,146 UART: [cold-reset] ++
3,506,463 UART: [fht] FHT @ 0x50003400
3,517,718 UART: [idev] ++
3,518,291 UART: [idev] CDI.KEYID = 6
3,519,314 UART: [idev] SUBJECT.KEYID = 7
3,520,417 UART: [idev] UDS.KEYID = 0
3,543,899 UART: [idev] Erasing UDS.KEYID = 0
6,026,745 UART: [idev] Sha1 KeyId Algorithm
6,048,947 UART: [idev] --
6,051,535 UART: [ldev] ++
6,052,106 UART: [ldev] CDI.KEYID = 6
6,053,015 UART: [ldev] SUBJECT.KEYID = 5
6,054,239 UART: [ldev] AUTHORITY.KEYID = 7
6,055,474 UART: [ldev] FE.KEYID = 1
6,099,710 UART: [ldev] Erasing FE.KEYID = 1
8,604,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,318 UART: [ldev] --
10,413,537 UART: [fwproc] Wait for Commands...
10,416,772 UART: [fwproc] Recv command 0x46574c44
10,418,839 UART: [fwproc] Recv'd Img size: 114168 bytes
10,493,076 UART: ROM Fatal Error: 0x00B0003A
10,496,168 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
2,058,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,203,246 UART:
2,203,650 UART: Running Caliptra ROM ...
2,204,722 UART:
2,204,883 UART: [state] CFI Enabled
2,205,853 UART: [state] LifecycleState = Unprovisioned
2,207,539 UART: [state] DebugLocked = No
2,208,569 UART: [state] WD Timer not started. Device not locked for debugging
2,211,045 UART: [kat] SHA2-256
2,211,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,214,735 UART: [kat] ++
2,215,184 UART: [kat] sha1
2,215,694 UART: [kat] SHA2-256
2,216,351 UART: [kat] SHA2-384
2,217,007 UART: [kat] SHA2-512-ACC
2,217,861 UART: [kat] ECC-384
2,946,410 UART: [kat] HMAC-384Kdf
2,971,916 UART: [kat] LMS
3,501,385 UART: [kat] --
3,506,538 UART: [cold-reset] ++
3,507,991 UART: [fht] FHT @ 0x50003400
3,517,571 UART: [idev] ++
3,518,163 UART: [idev] CDI.KEYID = 6
3,519,129 UART: [idev] SUBJECT.KEYID = 7
3,520,288 UART: [idev] UDS.KEYID = 0
3,543,613 UART: [idev] Erasing UDS.KEYID = 0
6,024,162 UART: [idev] Sha1 KeyId Algorithm
6,046,797 UART: [idev] --
6,049,769 UART: [ldev] ++
6,050,340 UART: [ldev] CDI.KEYID = 6
6,051,252 UART: [ldev] SUBJECT.KEYID = 5
6,052,471 UART: [ldev] AUTHORITY.KEYID = 7
6,053,704 UART: [ldev] FE.KEYID = 1
6,099,567 UART: [ldev] Erasing FE.KEYID = 1
8,596,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,583 UART: [ldev] --
10,392,062 UART: [fwproc] Wait for Commands...
10,394,709 UART: [fwproc] Recv command 0x46574c44
10,396,805 UART: [fwproc] Recv'd Img size: 114168 bytes
10,468,579 UART: ROM Fatal Error: 0x00B0003A
10,471,725 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,063,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,207,676 UART:
2,208,122 UART: Running Caliptra ROM ...
2,209,204 UART:
2,209,357 UART: [state] CFI Enabled
2,210,323 UART: [state] LifecycleState = Unprovisioned
2,211,996 UART: [state] DebugLocked = No
2,213,023 UART: [state] WD Timer not started. Device not locked for debugging
2,215,493 UART: [kat] SHA2-256
2,216,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,219,163 UART: [kat] ++
2,219,611 UART: [kat] sha1
2,220,120 UART: [kat] SHA2-256
2,220,777 UART: [kat] SHA2-384
2,221,432 UART: [kat] SHA2-512-ACC
2,222,231 UART: [kat] ECC-384
2,946,815 UART: [kat] HMAC-384Kdf
2,969,958 UART: [kat] LMS
3,499,443 UART: [kat] --
3,503,220 UART: [cold-reset] ++
3,505,694 UART: [fht] FHT @ 0x50003400
3,516,775 UART: [idev] ++
3,517,338 UART: [idev] CDI.KEYID = 6
3,518,358 UART: [idev] SUBJECT.KEYID = 7
3,519,461 UART: [idev] UDS.KEYID = 0
3,542,842 UART: [idev] Erasing UDS.KEYID = 0
6,023,951 UART: [idev] Sha1 KeyId Algorithm
6,047,555 UART: [idev] --
6,050,768 UART: [ldev] ++
6,051,350 UART: [ldev] CDI.KEYID = 6
6,052,234 UART: [ldev] SUBJECT.KEYID = 5
6,053,337 UART: [ldev] AUTHORITY.KEYID = 7
6,054,685 UART: [ldev] FE.KEYID = 1
6,100,517 UART: [ldev] Erasing FE.KEYID = 1
8,604,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,790 UART: [ldev] --
10,415,348 UART: [fwproc] Wait for Commands...
10,417,391 UART: [fwproc] Recv command 0x46574c44
10,419,486 UART: [fwproc] Recv'd Img size: 114168 bytes
14,973,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,046,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,115,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,431,777 >>> mbox cmd response: success
15,436,647 UART: [afmc] ++
15,437,236 UART: [afmc] CDI.KEYID = 6
15,438,122 UART: [afmc] SUBJECT.KEYID = 7
15,439,357 UART: [afmc] AUTHORITY.KEYID = 5
17,983,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,705,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,707,520 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,723,585 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,739,518 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,755,335 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,778,373 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.36s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,054,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,277,074 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,057,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,274,527 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
2,053,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,279,904 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,527 writing to cptra_bootfsm_go
2,054,698 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,282,630 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
2,063,465 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,235,431 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,057,468 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,274,238 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,055,673 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,301,455 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,511 writing to cptra_bootfsm_go
2,055,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,238,511 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
2,054,338 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,282,589 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
2,052,549 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,259,015 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
2,052,738 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,274,395 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
2,054,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,277,883 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,589 writing to cptra_bootfsm_go
2,068,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,280,178 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
2,068,442 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,252,233 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
2,060,961 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,254,341 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,054,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,281,022 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,057,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,300,441 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,063,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,296,446 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,058,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,021,053 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.00s
Truncated 76844 bytes from beginning
0,624,385 UART: [fwproc] Recv'd Img size: 114168 bytes
10,701,181 UART: ROM Fatal Error: 0x00B0003A
10,704,273 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,060,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,204,622 UART:
2,205,018 UART: Running Caliptra ROM ...
2,206,102 UART:
2,206,254 UART: [state] CFI Enabled
2,207,159 UART: [state] LifecycleState = Unprovisioned
2,208,818 UART: [state] DebugLocked = No
2,209,846 UART: [state] WD Timer not started. Device not locked for debugging
2,212,323 UART: [kat] SHA2-256
2,212,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,216,232 UART: [kat] ++
2,216,718 UART: [kat] sha1
2,217,234 UART: [kat] SHA2-256
2,217,892 UART: [kat] SHA2-384
2,218,549 UART: [kat] SHA2-512-ACC
2,219,375 UART: [kat] ECC-384
3,283,102 UART: [kat] HMAC-384Kdf
3,296,886 UART: [kat] LMS
3,826,330 UART: [kat] --
3,830,293 UART: [cold-reset] ++
3,831,413 UART: [fht] FHT @ 0x50003400
3,841,006 UART: [idev] ++
3,841,575 UART: [idev] CDI.KEYID = 6
3,842,479 UART: [idev] SUBJECT.KEYID = 7
3,843,690 UART: [idev] UDS.KEYID = 0
3,860,205 UART: [idev] Erasing UDS.KEYID = 0
6,315,563 UART: [idev] Sha1 KeyId Algorithm
6,337,145 UART: [idev] --
6,341,948 UART: [ldev] ++
6,342,515 UART: [ldev] CDI.KEYID = 6
6,343,423 UART: [ldev] SUBJECT.KEYID = 5
6,344,579 UART: [ldev] AUTHORITY.KEYID = 7
6,345,860 UART: [ldev] FE.KEYID = 1
6,356,132 UART: [ldev] Erasing FE.KEYID = 1
8,831,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,287 UART: [ldev] --
10,621,831 UART: [fwproc] Wait for Commands...
10,624,529 UART: [fwproc] Recv command 0x46574c44
10,626,566 UART: [fwproc] Recv'd Img size: 114168 bytes
10,701,598 UART: ROM Fatal Error: 0x00B0003A
10,704,679 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
2,055,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,200,088 UART:
2,200,512 UART: Running Caliptra ROM ...
2,201,614 UART:
2,201,780 UART: [state] CFI Enabled
2,202,741 UART: [state] LifecycleState = Unprovisioned
2,204,400 UART: [state] DebugLocked = No
2,205,528 UART: [state] WD Timer not started. Device not locked for debugging
2,208,004 UART: [kat] SHA2-256
2,208,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,211,684 UART: [kat] ++
2,212,134 UART: [kat] sha1
2,212,649 UART: [kat] SHA2-256
2,213,305 UART: [kat] SHA2-384
2,213,958 UART: [kat] SHA2-512-ACC
2,214,758 UART: [kat] ECC-384
3,279,157 UART: [kat] HMAC-384Kdf
3,293,235 UART: [kat] LMS
3,822,711 UART: [kat] --
3,824,652 UART: [cold-reset] ++
3,826,416 UART: [fht] FHT @ 0x50003400
3,837,876 UART: [idev] ++
3,838,439 UART: [idev] CDI.KEYID = 6
3,839,468 UART: [idev] SUBJECT.KEYID = 7
3,840,570 UART: [idev] UDS.KEYID = 0
3,857,643 UART: [idev] Erasing UDS.KEYID = 0
6,317,605 UART: [idev] Sha1 KeyId Algorithm
6,340,346 UART: [idev] --
6,345,339 UART: [ldev] ++
6,345,916 UART: [ldev] CDI.KEYID = 6
6,346,827 UART: [ldev] SUBJECT.KEYID = 5
6,348,041 UART: [ldev] AUTHORITY.KEYID = 7
6,349,272 UART: [ldev] FE.KEYID = 1
6,358,946 UART: [ldev] Erasing FE.KEYID = 1
8,834,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,747 UART: [ldev] --
10,627,363 UART: [fwproc] Wait for Commands...
10,630,375 UART: [fwproc] Recv command 0x46574c44
10,632,477 UART: [fwproc] Recv'd Img size: 114168 bytes
10,711,264 UART: ROM Fatal Error: 0x00B0003A
10,714,402 >>> mbox cmd response: failed
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,057,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,201,656 UART:
2,202,052 UART: Running Caliptra ROM ...
2,203,247 UART:
2,203,423 UART: [state] CFI Enabled
2,204,384 UART: [state] LifecycleState = Unprovisioned
2,206,043 UART: [state] DebugLocked = No
2,207,070 UART: [state] WD Timer not started. Device not locked for debugging
2,209,542 UART: [kat] SHA2-256
2,210,202 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,215 UART: [kat] ++
2,213,661 UART: [kat] sha1
2,214,172 UART: [kat] SHA2-256
2,214,828 UART: [kat] SHA2-384
2,215,484 UART: [kat] SHA2-512-ACC
2,216,285 UART: [kat] ECC-384
3,288,966 UART: [kat] HMAC-384Kdf
3,302,827 UART: [kat] LMS
3,832,297 UART: [kat] --
3,837,064 UART: [cold-reset] ++
3,838,781 UART: [fht] FHT @ 0x50003400
3,849,544 UART: [idev] ++
3,850,102 UART: [idev] CDI.KEYID = 6
3,851,110 UART: [idev] SUBJECT.KEYID = 7
3,852,264 UART: [idev] UDS.KEYID = 0
3,866,957 UART: [idev] Erasing UDS.KEYID = 0
6,322,422 UART: [idev] Sha1 KeyId Algorithm
6,345,656 UART: [idev] --
6,348,275 UART: [ldev] ++
6,348,860 UART: [ldev] CDI.KEYID = 6
6,349,767 UART: [ldev] SUBJECT.KEYID = 5
6,350,928 UART: [ldev] AUTHORITY.KEYID = 7
6,352,211 UART: [ldev] FE.KEYID = 1
6,363,127 UART: [ldev] Erasing FE.KEYID = 1
8,837,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,984 UART: [ldev] --
10,630,513 UART: [fwproc] Wait for Commands...
10,632,930 UART: [fwproc] Recv command 0x46574c44
10,635,024 UART: [fwproc] Recv'd Img size: 114168 bytes
10,709,602 UART: ROM Fatal Error: 0x00B0003A
10,712,690 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,057,978 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,202,200 UART:
2,202,611 UART: Running Caliptra ROM ...
2,203,781 UART:
2,203,956 UART: [state] CFI Enabled
2,204,917 UART: [state] LifecycleState = Unprovisioned
2,206,573 UART: [state] DebugLocked = No
2,207,677 UART: [state] WD Timer not started. Device not locked for debugging
2,210,146 UART: [kat] SHA2-256
2,210,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,213,827 UART: [kat] ++
2,214,276 UART: [kat] sha1
2,214,787 UART: [kat] SHA2-256
2,215,446 UART: [kat] SHA2-384
2,216,109 UART: [kat] SHA2-512-ACC
2,217,012 UART: [kat] ECC-384
3,276,930 UART: [kat] HMAC-384Kdf
3,289,216 UART: [kat] LMS
3,818,681 UART: [kat] --
3,823,486 UART: [cold-reset] ++
3,824,867 UART: [fht] FHT @ 0x50003400
3,836,485 UART: [idev] ++
3,837,056 UART: [idev] CDI.KEYID = 6
3,837,970 UART: [idev] SUBJECT.KEYID = 7
3,839,180 UART: [idev] UDS.KEYID = 0
3,855,477 UART: [idev] Erasing UDS.KEYID = 0
6,313,806 UART: [idev] Sha1 KeyId Algorithm
6,336,081 UART: [idev] --
6,338,890 UART: [ldev] ++
6,339,458 UART: [ldev] CDI.KEYID = 6
6,340,364 UART: [ldev] SUBJECT.KEYID = 5
6,341,599 UART: [ldev] AUTHORITY.KEYID = 7
6,342,832 UART: [ldev] FE.KEYID = 1
6,355,423 UART: [ldev] Erasing FE.KEYID = 1
8,829,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,156 UART: [ldev] --
10,621,456 UART: [fwproc] Wait for Commands...
10,624,357 UART: [fwproc] Recv command 0x46574c44
10,626,398 UART: [fwproc] Recv'd Img size: 114168 bytes
15,208,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,288,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,356,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,674,647 >>> mbox cmd response: success
15,679,485 UART: [afmc] ++
15,680,076 UART: [afmc] CDI.KEYID = 6
15,680,970 UART: [afmc] SUBJECT.KEYID = 7
15,682,068 UART: [afmc] AUTHORITY.KEYID = 5
18,180,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,898,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,900,154 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
19,916,209 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
19,932,198 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
19,947,995 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
19,969,551 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.70s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
2,057,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,478,685 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
2,058,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,483,471 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,056,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,477,217 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,780 writing to cptra_bootfsm_go
2,058,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,476,516 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
2,057,136 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,488,251 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,056,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,486,533 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
2,055,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,475,916 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,057,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,481,620 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
2,056,602 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,479,029 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,056,680 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,482,016 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,056,222 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,475,410 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,062,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,490,305 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,055,540 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,479,508 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,057,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,477,609 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
2,064,659 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,486,639 >>> mbox cmd response: failed
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,056,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,479,308 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,269 writing to cptra_bootfsm_go
2,055,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,488,440 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,055,358 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,483,229 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,056,292 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,274,352 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 17.32s
Truncated 74764 bytes from beginning
1,272,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,074 UART: [ldev] --
1,280,340 UART: [fwproc] Wait for Commands...
1,281,003 UART: [fwproc] Recv command 0x46574c44
1,281,736 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,934 UART: ROM Fatal Error: 0x00B0003A
1,309,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,799 UART: [idev] ++
1,172,967 UART: [idev] CDI.KEYID = 6
1,173,328 UART: [idev] SUBJECT.KEYID = 7
1,173,753 UART: [idev] UDS.KEYID = 0
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,370 UART: [ldev] ++
1,209,538 UART: [ldev] CDI.KEYID = 6
1,209,902 UART: [ldev] SUBJECT.KEYID = 5
1,210,329 UART: [ldev] AUTHORITY.KEYID = 7
1,210,792 UART: [ldev] FE.KEYID = 1
1,216,264 UART: [ldev] Erasing FE.KEYID = 1
1,242,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,478 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0x46574c44
1,282,858 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,126 UART: ROM Fatal Error: 0x00B0003A
1,309,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,173,097 UART: [idev] ++
1,173,265 UART: [idev] CDI.KEYID = 6
1,173,626 UART: [idev] SUBJECT.KEYID = 7
1,174,051 UART: [idev] UDS.KEYID = 0
1,182,013 UART: [idev] Erasing UDS.KEYID = 0
1,199,115 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,208,954 UART: [ldev] ++
1,209,122 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,913 UART: [ldev] AUTHORITY.KEYID = 7
1,210,376 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,970 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,282,047 UART: [fwproc] Recv command 0x46574c44
1,282,780 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,420 UART: ROM Fatal Error: 0x00B0003A
1,309,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,390 UART: [kat] LMS
1,168,702 UART: [kat] --
1,169,899 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,181,699 UART: [idev] Erasing UDS.KEYID = 0
1,199,617 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,616 UART: [ldev] ++
1,209,784 UART: [ldev] CDI.KEYID = 6
1,210,148 UART: [ldev] SUBJECT.KEYID = 5
1,210,575 UART: [ldev] AUTHORITY.KEYID = 7
1,211,038 UART: [ldev] FE.KEYID = 1
1,216,078 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,442 UART: [ldev] --
1,280,752 UART: [fwproc] Wait for Commands...
1,281,545 UART: [fwproc] Recv command 0x46574c44
1,282,278 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,168 UART: ROM Fatal Error: 0x00B0003A
1,309,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,941 UART: [cold-reset] ++
1,170,443 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,209,092 UART: [ldev] ++
1,209,260 UART: [ldev] CDI.KEYID = 6
1,209,624 UART: [ldev] SUBJECT.KEYID = 5
1,210,051 UART: [ldev] AUTHORITY.KEYID = 7
1,210,514 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,242,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,632 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,817 UART: [fwproc] Recv command 0x46574c44
1,283,550 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,148,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,313,712 >>> mbox cmd response: success
3,314,807 UART: [afmc] ++
3,314,975 UART: [afmc] CDI.KEYID = 6
3,315,338 UART: [afmc] SUBJECT.KEYID = 7
3,315,764 UART: [afmc] AUTHORITY.KEYID = 5
3,351,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,001 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,373,709 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,379,594 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,385,296 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,393,142 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.95s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,134 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,934 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,166,124 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.19s
Truncated 74764 bytes from beginning
1,274,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,389 UART: [fwproc] Wait for Commands...
1,283,136 UART: [fwproc] Recv command 0x46574c44
1,283,869 UART: [fwproc] Recv'd Img size: 114168 bytes
1,310,283 UART: ROM Fatal Error: 0x00B0003A
1,311,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,332 UART: [idev] ++
1,173,500 UART: [idev] CDI.KEYID = 6
1,173,861 UART: [idev] SUBJECT.KEYID = 7
1,174,286 UART: [idev] UDS.KEYID = 0
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,606 UART: [idev] Sha1 KeyId Algorithm
1,208,382 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,071 UART: [ldev] SUBJECT.KEYID = 5
1,210,498 UART: [ldev] AUTHORITY.KEYID = 7
1,210,961 UART: [ldev] FE.KEYID = 1
1,216,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,411 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,412 UART: [fwproc] Recv command 0x46574c44
1,283,145 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,883 UART: ROM Fatal Error: 0x00B0003A
1,310,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,661 UART: [kat] LMS
1,168,973 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,688 UART: [idev] Sha1 KeyId Algorithm
1,208,564 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,735 UART: [ldev] --
1,282,011 UART: [fwproc] Wait for Commands...
1,282,584 UART: [fwproc] Recv command 0x46574c44
1,283,317 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,241 UART: ROM Fatal Error: 0x00B0003A
1,310,402 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,189 UART: [kat] SHA2-512-ACC
906,090 UART: [kat] ECC-384
915,953 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,091 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,326 UART: [fwproc] Recv command 0x46574c44
1,284,059 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,913 UART: ROM Fatal Error: 0x00B0003A
1,311,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
891,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
915,631 UART: [kat] HMAC-384Kdf
920,161 UART: [kat] LMS
1,168,473 UART: [kat] --
1,169,218 UART: [cold-reset] ++
1,169,748 UART: [fht] FHT @ 0x50003400
1,172,526 UART: [idev] ++
1,172,694 UART: [idev] CDI.KEYID = 6
1,173,055 UART: [idev] SUBJECT.KEYID = 7
1,173,480 UART: [idev] UDS.KEYID = 0
1,181,496 UART: [idev] Erasing UDS.KEYID = 0
1,198,952 UART: [idev] Sha1 KeyId Algorithm
1,207,980 UART: [idev] --
1,209,049 UART: [ldev] ++
1,209,217 UART: [ldev] CDI.KEYID = 6
1,209,581 UART: [ldev] SUBJECT.KEYID = 5
1,210,008 UART: [ldev] AUTHORITY.KEYID = 7
1,210,471 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,254 UART: [fwproc] Recv command 0x46574c44
1,282,987 UART: [fwproc] Recv'd Img size: 114168 bytes
3,124,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,152,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,317,689 >>> mbox cmd response: success
3,318,760 UART: [afmc] ++
3,318,928 UART: [afmc] CDI.KEYID = 6
3,319,291 UART: [afmc] SUBJECT.KEYID = 7
3,319,717 UART: [afmc] AUTHORITY.KEYID = 5
3,355,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,190 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,377,898 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,383,783 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,389,485 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,397,155 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 18.73s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,681 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,641 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,387 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,805 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,883 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,164,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,261 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,937 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,167,851 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.84s
Truncated 74764 bytes from beginning
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,146 UART: [ldev] --
1,281,470 UART: [fwproc] Wait for Commands...
1,282,267 UART: [fwproc] Recv command 0x46574c44
1,283,000 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,742 UART: ROM Fatal Error: 0x00B0003A
1,309,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
891,260 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,389 UART: [kat] ++
895,541 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,199,433 UART: [idev] Sha1 KeyId Algorithm
1,208,345 UART: [idev] --
1,209,502 UART: [ldev] ++
1,209,670 UART: [ldev] CDI.KEYID = 6
1,210,034 UART: [ldev] SUBJECT.KEYID = 5
1,210,461 UART: [ldev] AUTHORITY.KEYID = 7
1,210,924 UART: [ldev] FE.KEYID = 1
1,216,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,376 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,411 UART: [fwproc] Recv command 0x46574c44
1,283,144 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,294 UART: ROM Fatal Error: 0x00B0003A
1,310,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,376 UART: [kat] LMS
1,168,688 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,893 UART: [idev] Sha1 KeyId Algorithm
1,207,797 UART: [idev] --
1,208,932 UART: [ldev] ++
1,209,100 UART: [ldev] CDI.KEYID = 6
1,209,464 UART: [ldev] SUBJECT.KEYID = 5
1,209,891 UART: [ldev] AUTHORITY.KEYID = 7
1,210,354 UART: [ldev] FE.KEYID = 1
1,215,382 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,355 UART: [fwproc] Recv command 0x46574c44
1,282,088 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,628 UART: ROM Fatal Error: 0x00B0003A
1,308,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
890,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,975 UART: [kat] ++
895,127 UART: [kat] sha1
899,217 UART: [kat] SHA2-256
901,157 UART: [kat] SHA2-384
903,886 UART: [kat] SHA2-512-ACC
905,787 UART: [kat] ECC-384
915,556 UART: [kat] HMAC-384Kdf
919,988 UART: [kat] LMS
1,168,300 UART: [kat] --
1,168,821 UART: [cold-reset] ++
1,169,203 UART: [fht] FHT @ 0x50003400
1,171,759 UART: [idev] ++
1,171,927 UART: [idev] CDI.KEYID = 6
1,172,288 UART: [idev] SUBJECT.KEYID = 7
1,172,713 UART: [idev] UDS.KEYID = 0
1,181,099 UART: [idev] Erasing UDS.KEYID = 0
1,197,789 UART: [idev] Sha1 KeyId Algorithm
1,206,847 UART: [idev] --
1,207,744 UART: [ldev] ++
1,207,912 UART: [ldev] CDI.KEYID = 6
1,208,276 UART: [ldev] SUBJECT.KEYID = 5
1,208,703 UART: [ldev] AUTHORITY.KEYID = 7
1,209,166 UART: [ldev] FE.KEYID = 1
1,214,256 UART: [ldev] Erasing FE.KEYID = 1
1,240,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,134 UART: [ldev] --
1,279,498 UART: [fwproc] Wait for Commands...
1,280,257 UART: [fwproc] Recv command 0x46574c44
1,280,990 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,570 UART: ROM Fatal Error: 0x00B0003A
1,307,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,172,811 UART: [idev] ++
1,172,979 UART: [idev] CDI.KEYID = 6
1,173,340 UART: [idev] SUBJECT.KEYID = 7
1,173,765 UART: [idev] UDS.KEYID = 0
1,182,337 UART: [idev] Erasing UDS.KEYID = 0
1,199,843 UART: [idev] Sha1 KeyId Algorithm
1,208,551 UART: [idev] --
1,209,540 UART: [ldev] ++
1,209,708 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,499 UART: [ldev] AUTHORITY.KEYID = 7
1,210,962 UART: [ldev] FE.KEYID = 1
1,216,204 UART: [ldev] Erasing FE.KEYID = 1
1,242,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,468 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,417 UART: [fwproc] Recv command 0x46574c44
1,283,150 UART: [fwproc] Recv'd Img size: 114168 bytes
3,117,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,144,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,309,449 >>> mbox cmd response: success
3,310,658 UART: [afmc] ++
3,310,826 UART: [afmc] CDI.KEYID = 6
3,311,189 UART: [afmc] SUBJECT.KEYID = 7
3,311,615 UART: [afmc] AUTHORITY.KEYID = 5
3,347,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,348 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,370,056 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,375,941 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,381,643 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,389,637 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.50s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,962 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,086 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,394 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,050 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,802 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,608 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,160,276 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.43s
Truncated 74764 bytes from beginning
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,411 UART: [fwproc] Wait for Commands...
1,282,222 UART: [fwproc] Recv command 0x46574c44
1,282,955 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,609 UART: ROM Fatal Error: 0x00B0003A
1,309,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,965 UART: [kat] SHA2-256
891,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,644 UART: [kat] ++
895,796 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,262 UART: [idev] ++
1,173,430 UART: [idev] CDI.KEYID = 6
1,173,791 UART: [idev] SUBJECT.KEYID = 7
1,174,216 UART: [idev] UDS.KEYID = 0
1,182,466 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,821 UART: [ldev] ++
1,209,989 UART: [ldev] CDI.KEYID = 6
1,210,353 UART: [ldev] SUBJECT.KEYID = 5
1,210,780 UART: [ldev] AUTHORITY.KEYID = 7
1,211,243 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,301 UART: [ldev] --
1,281,771 UART: [fwproc] Wait for Commands...
1,282,496 UART: [fwproc] Recv command 0x46574c44
1,283,229 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,669 UART: ROM Fatal Error: 0x00B0003A
1,309,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] --
1,209,157 UART: [ldev] ++
1,209,325 UART: [ldev] CDI.KEYID = 6
1,209,689 UART: [ldev] SUBJECT.KEYID = 5
1,210,116 UART: [ldev] AUTHORITY.KEYID = 7
1,210,579 UART: [ldev] FE.KEYID = 1
1,215,765 UART: [ldev] Erasing FE.KEYID = 1
1,241,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,517 UART: [ldev] --
1,280,973 UART: [fwproc] Wait for Commands...
1,281,670 UART: [fwproc] Recv command 0x46574c44
1,282,403 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,165 UART: ROM Fatal Error: 0x00B0003A
1,310,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,082 UART: [kat] SHA2-256
902,022 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,767 UART: [kat] HMAC-384Kdf
921,217 UART: [kat] LMS
1,169,529 UART: [kat] --
1,170,430 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,496 UART: [idev] ++
1,173,664 UART: [idev] CDI.KEYID = 6
1,174,025 UART: [idev] SUBJECT.KEYID = 7
1,174,450 UART: [idev] UDS.KEYID = 0
1,182,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,840 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,251 UART: [ldev] SUBJECT.KEYID = 5
1,210,678 UART: [ldev] AUTHORITY.KEYID = 7
1,211,141 UART: [ldev] FE.KEYID = 1
1,216,489 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,229 UART: [fwproc] Wait for Commands...
1,282,810 UART: [fwproc] Recv command 0x46574c44
1,283,543 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,779 UART: ROM Fatal Error: 0x00B0003A
1,310,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,940 UART: [kat] ++
896,092 UART: [kat] sha1
900,550 UART: [kat] SHA2-256
902,490 UART: [kat] SHA2-384
905,237 UART: [kat] SHA2-512-ACC
907,138 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,149 UART: [kat] LMS
1,169,461 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,272 UART: [idev] ++
1,173,440 UART: [idev] CDI.KEYID = 6
1,173,801 UART: [idev] SUBJECT.KEYID = 7
1,174,226 UART: [idev] UDS.KEYID = 0
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,696 UART: [idev] Sha1 KeyId Algorithm
1,208,522 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,201 UART: [ldev] SUBJECT.KEYID = 5
1,210,628 UART: [ldev] AUTHORITY.KEYID = 7
1,211,091 UART: [ldev] FE.KEYID = 1
1,216,273 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,437 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,953 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,151,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,316,514 >>> mbox cmd response: success
3,317,669 UART: [afmc] ++
3,317,837 UART: [afmc] CDI.KEYID = 6
3,318,200 UART: [afmc] SUBJECT.KEYID = 7
3,318,626 UART: [afmc] AUTHORITY.KEYID = 5
3,353,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,281 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,375,989 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,381,874 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,387,576 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,395,354 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.72s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,155,880 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.61s
Truncated 74764 bytes from beginning
1,273,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,410 UART: [ldev] --
1,281,882 UART: [fwproc] Wait for Commands...
1,282,567 UART: [fwproc] Recv command 0x46574c44
1,283,300 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,420 UART: ROM Fatal Error: 0x00B0003A
1,310,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,763 UART: [kat] ++
895,915 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,328 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,169,909 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,199,513 UART: [idev] Sha1 KeyId Algorithm
1,208,379 UART: [idev] --
1,209,290 UART: [ldev] ++
1,209,458 UART: [ldev] CDI.KEYID = 6
1,209,822 UART: [ldev] SUBJECT.KEYID = 5
1,210,249 UART: [ldev] AUTHORITY.KEYID = 7
1,210,712 UART: [ldev] FE.KEYID = 1
1,215,916 UART: [ldev] Erasing FE.KEYID = 1
1,242,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,478 UART: [fwproc] Wait for Commands...
1,282,255 UART: [fwproc] Recv command 0x46574c44
1,282,988 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,664 UART: ROM Fatal Error: 0x00B0003A
1,309,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,126 UART: [kat] SHA2-512-ACC
906,027 UART: [kat] ECC-384
915,292 UART: [kat] HMAC-384Kdf
919,904 UART: [kat] LMS
1,168,216 UART: [kat] --
1,169,089 UART: [cold-reset] ++
1,169,449 UART: [fht] FHT @ 0x50003400
1,171,971 UART: [idev] ++
1,172,139 UART: [idev] CDI.KEYID = 6
1,172,500 UART: [idev] SUBJECT.KEYID = 7
1,172,925 UART: [idev] UDS.KEYID = 0
1,180,863 UART: [idev] Erasing UDS.KEYID = 0
1,197,153 UART: [idev] Sha1 KeyId Algorithm
1,206,173 UART: [idev] --
1,207,102 UART: [ldev] ++
1,207,270 UART: [ldev] CDI.KEYID = 6
1,207,634 UART: [ldev] SUBJECT.KEYID = 5
1,208,061 UART: [ldev] AUTHORITY.KEYID = 7
1,208,524 UART: [ldev] FE.KEYID = 1
1,213,546 UART: [ldev] Erasing FE.KEYID = 1
1,239,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,269,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,276,896 UART: [ldev] --
1,278,342 UART: [fwproc] Wait for Commands...
1,279,085 UART: [fwproc] Recv command 0x46574c44
1,279,818 UART: [fwproc] Recv'd Img size: 114168 bytes
1,305,496 UART: ROM Fatal Error: 0x00B0003A
1,306,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,042 UART: [kat] SHA2-256
891,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,721 UART: [kat] ++
895,873 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,182,089 UART: [idev] Erasing UDS.KEYID = 0
1,198,591 UART: [idev] Sha1 KeyId Algorithm
1,207,239 UART: [idev] --
1,208,438 UART: [ldev] ++
1,208,606 UART: [ldev] CDI.KEYID = 6
1,208,970 UART: [ldev] SUBJECT.KEYID = 5
1,209,397 UART: [ldev] AUTHORITY.KEYID = 7
1,209,860 UART: [ldev] FE.KEYID = 1
1,214,838 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,694 UART: [ldev] --
1,281,166 UART: [fwproc] Wait for Commands...
1,281,945 UART: [fwproc] Recv command 0x46574c44
1,282,678 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,586 UART: ROM Fatal Error: 0x00B0003A
1,309,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,225 UART: [idev] ++
1,173,393 UART: [idev] CDI.KEYID = 6
1,173,754 UART: [idev] SUBJECT.KEYID = 7
1,174,179 UART: [idev] UDS.KEYID = 0
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,195 UART: [idev] Sha1 KeyId Algorithm
1,208,255 UART: [idev] --
1,209,074 UART: [ldev] ++
1,209,242 UART: [ldev] CDI.KEYID = 6
1,209,606 UART: [ldev] SUBJECT.KEYID = 5
1,210,033 UART: [ldev] AUTHORITY.KEYID = 7
1,210,496 UART: [ldev] FE.KEYID = 1
1,215,426 UART: [ldev] Erasing FE.KEYID = 1
1,241,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,842 UART: [ldev] --
1,281,190 UART: [fwproc] Wait for Commands...
1,281,857 UART: [fwproc] Recv command 0x46574c44
1,282,590 UART: [fwproc] Recv'd Img size: 114168 bytes
3,124,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,152,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,317,396 >>> mbox cmd response: success
3,318,453 UART: [afmc] ++
3,318,621 UART: [afmc] CDI.KEYID = 6
3,318,984 UART: [afmc] SUBJECT.KEYID = 7
3,319,410 UART: [afmc] AUTHORITY.KEYID = 5
3,355,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,695 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,378,403 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,384,288 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,389,990 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,397,692 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.46s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,464 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,554 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,168,990 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.47s
Truncated 74764 bytes from beginning
1,273,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,218 UART: [fwproc] Recv command 0x46574c44
1,282,951 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,171 UART: ROM Fatal Error: 0x00B0003A
1,310,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,639 UART: [kat] HMAC-384Kdf
920,153 UART: [kat] LMS
1,168,465 UART: [kat] --
1,169,244 UART: [cold-reset] ++
1,169,814 UART: [fht] FHT @ 0x50003400
1,172,474 UART: [idev] ++
1,172,642 UART: [idev] CDI.KEYID = 6
1,173,003 UART: [idev] SUBJECT.KEYID = 7
1,173,428 UART: [idev] UDS.KEYID = 0
1,181,646 UART: [idev] Erasing UDS.KEYID = 0
1,198,490 UART: [idev] Sha1 KeyId Algorithm
1,207,316 UART: [idev] --
1,208,391 UART: [ldev] ++
1,208,559 UART: [ldev] CDI.KEYID = 6
1,208,923 UART: [ldev] SUBJECT.KEYID = 5
1,209,350 UART: [ldev] AUTHORITY.KEYID = 7
1,209,813 UART: [ldev] FE.KEYID = 1
1,215,079 UART: [ldev] Erasing FE.KEYID = 1
1,241,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,437 UART: [ldev] --
1,280,953 UART: [fwproc] Wait for Commands...
1,281,614 UART: [fwproc] Recv command 0x46574c44
1,282,347 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,533 UART: ROM Fatal Error: 0x00B0003A
1,308,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,215 UART: [kat] SHA2-512-ACC
906,116 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,629 UART: [kat] LMS
1,168,941 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,694 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,383 UART: [ldev] Erasing FE.KEYID = 1
1,242,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,363 UART: [ldev] --
1,281,743 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,237 UART: ROM Fatal Error: 0x00B0003A
1,310,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,695 UART: [kat] HMAC-384Kdf
921,359 UART: [kat] LMS
1,169,671 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,170,988 UART: [fht] FHT @ 0x50003400
1,173,698 UART: [idev] ++
1,173,866 UART: [idev] CDI.KEYID = 6
1,174,227 UART: [idev] SUBJECT.KEYID = 7
1,174,652 UART: [idev] UDS.KEYID = 0
1,182,892 UART: [idev] Erasing UDS.KEYID = 0
1,200,320 UART: [idev] Sha1 KeyId Algorithm
1,209,202 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,689 UART: [ldev] --
1,281,975 UART: [fwproc] Wait for Commands...
1,282,582 UART: [fwproc] Recv command 0x46574c44
1,283,315 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,155 UART: ROM Fatal Error: 0x00B0003A
1,310,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,477 UART: [kat] SHA2-256
892,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,156 UART: [kat] ++
896,308 UART: [kat] sha1
900,766 UART: [kat] SHA2-256
902,706 UART: [kat] SHA2-384
905,367 UART: [kat] SHA2-512-ACC
907,268 UART: [kat] ECC-384
916,999 UART: [kat] HMAC-384Kdf
921,491 UART: [kat] LMS
1,169,803 UART: [kat] --
1,170,690 UART: [cold-reset] ++
1,171,100 UART: [fht] FHT @ 0x50003400
1,173,740 UART: [idev] ++
1,173,908 UART: [idev] CDI.KEYID = 6
1,174,269 UART: [idev] SUBJECT.KEYID = 7
1,174,694 UART: [idev] UDS.KEYID = 0
1,182,424 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,613 UART: [ldev] --
1,281,987 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,419 UART: [fwproc] Recv'd Img size: 114168 bytes
3,119,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,147,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,312,831 >>> mbox cmd response: success
3,314,034 UART: [afmc] ++
3,314,202 UART: [afmc] CDI.KEYID = 6
3,314,565 UART: [afmc] SUBJECT.KEYID = 7
3,314,991 UART: [afmc] AUTHORITY.KEYID = 5
3,351,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,386 UART: [afmc] PUB.X = 36A688DDF8414D948057C39967B429CBBF34303BBC408321297880DE263713401E4011899A1C75C2C724A878A4D30DAC
3,374,094 UART: [afmc] PUB.Y = 7E33D4DA7280596DA341C240801C3BA9A59A6D1E98611D328804FD0253AD551322A183E8B2E1B8DF968F6A182021E9ED
3,379,979 UART: [afmc] SIG.R = 0D2E83DE47A0780ABEC0478F64998242ACFAD672FC031F057E5206A2E65560F5D8E28EBF933EE380CF2A1FA584938BB1
3,385,681 UART: [afmc] SIG.S = FF5509233C0A8976BD13C7D3212FF2D1E7F04F3AB39B8A9C58C17542F11A78AB0779049A67D5E6014C3EF2FAC23DAE4A
3,393,377 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 17.65s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,303 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,345 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,421 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,155,824 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 16.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
5,735 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,115 UART:
192,506 UART: Running Caliptra ROM ...
193,685 UART:
193,841 UART: [state] CFI Enabled
260,329 UART: [state] LifecycleState = Manufacturing
262,744 UART: [state] DebugLocked = No
264,521 UART: [state] WD Timer not started. Device not locked for debugging
269,447 UART: [kat] SHA2-256
451,384 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
462,874 UART: [kat] ++
463,409 UART: [kat] sha1
473,910 UART: [kat] SHA2-256
476,922 UART: [kat] SHA2-384
483,077 UART: [kat] SHA2-512-ACC
485,708 UART: [kat] ECC-384
3,774,107 UART: [kat] HMAC-384Kdf
3,800,086 UART: [kat] LMS
4,873,234 UART: [kat] --
4,876,508 UART: [cold-reset] ++
4,878,399 UART: [fht] FHT @ 0x50003400
4,889,546 UART: [idev] ++
4,890,282 UART: [idev] CDI.KEYID = 6
4,891,460 UART: [idev] SUBJECT.KEYID = 7
4,892,613 UART: [idev] UDS.KEYID = 0
4,927,443 UART: [idev] Erasing UDS.KEYID = 0
8,242,992 UART: [idev] Sha1 KeyId Algorithm
8,265,198 UART: [idev] --
8,269,135 UART: [ldev] ++
8,269,698 UART: [ldev] CDI.KEYID = 6
8,270,881 UART: [ldev] SUBJECT.KEYID = 5
8,272,094 UART: [ldev] AUTHORITY.KEYID = 7
8,273,191 UART: [ldev] FE.KEYID = 1
8,315,628 UART: [ldev] Erasing FE.KEYID = 1
11,652,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,348 UART: [ldev] --
14,039,249 UART: [fwproc] Wait for Commands...
14,040,741 UART: [fwproc] Recv command 0x46574c44
14,042,737 UART: [fwproc] Recv'd Img size: 113844 bytes
14,134,783 UART: ROM Fatal Error: 0x000B0005
14,138,206 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
5,428 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,920,387 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
6,627 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,494 UART:
192,870 UART: Running Caliptra ROM ...
193,993 UART:
603,738 UART: [state] CFI Enabled
622,836 UART: [state] LifecycleState = Manufacturing
625,206 UART: [state] DebugLocked = No
627,873 UART: [state] WD Timer not started. Device not locked for debugging
631,730 UART: [kat] SHA2-256
813,732 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
825,234 UART: [kat] ++
825,816 UART: [kat] sha1
836,489 UART: [kat] SHA2-256
839,536 UART: [kat] SHA2-384
844,816 UART: [kat] SHA2-512-ACC
847,425 UART: [kat] ECC-384
4,104,950 UART: [kat] HMAC-384Kdf
4,116,042 UART: [kat] LMS
5,189,178 UART: [kat] --
5,193,791 UART: [cold-reset] ++
5,196,057 UART: [fht] FHT @ 0x50003400
5,208,281 UART: [idev] ++
5,208,956 UART: [idev] CDI.KEYID = 6
5,210,108 UART: [idev] SUBJECT.KEYID = 7
5,211,653 UART: [idev] UDS.KEYID = 0
5,225,600 UART: [idev] Erasing UDS.KEYID = 0
8,495,076 UART: [idev] Sha1 KeyId Algorithm
8,517,716 UART: [idev] --
8,522,559 UART: [ldev] ++
8,523,157 UART: [ldev] CDI.KEYID = 6
8,524,343 UART: [ldev] SUBJECT.KEYID = 5
8,525,772 UART: [ldev] AUTHORITY.KEYID = 7
8,527,372 UART: [ldev] FE.KEYID = 1
8,538,010 UART: [ldev] Erasing FE.KEYID = 1
11,828,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,169 UART: [ldev] --
14,195,626 UART: [fwproc] Wait for Commands...
14,197,884 UART: [fwproc] Recv command 0x46574c44
14,200,136 UART: [fwproc] Recv'd Img size: 113844 bytes
14,292,393 UART: ROM Fatal Error: 0x000B0005
14,295,799 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
6,251 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,106,103 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
5,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,284 UART:
192,694 UART: Running Caliptra ROM ...
193,804 UART:
193,948 UART: [state] CFI Enabled
263,636 UART: [state] LifecycleState = Manufacturing
265,498 UART: [state] DebugLocked = No
267,424 UART: [state] WD Timer not started. Device not locked for debugging
270,765 UART: [kat] SHA2-256
449,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,457 UART: [kat] ++
461,995 UART: [kat] sha1
473,418 UART: [kat] SHA2-256
476,483 UART: [kat] SHA2-384
482,402 UART: [kat] SHA2-512-ACC
485,337 UART: [kat] ECC-384
2,945,466 UART: [kat] HMAC-384Kdf
2,968,116 UART: [kat] LMS
3,497,608 UART: [kat] --
3,501,728 UART: [cold-reset] ++
3,503,936 UART: [fht] FHT @ 0x50003400
3,513,837 UART: [idev] ++
3,514,412 UART: [idev] CDI.KEYID = 6
3,515,321 UART: [idev] SUBJECT.KEYID = 7
3,516,542 UART: [idev] UDS.KEYID = 0
3,540,079 UART: [idev] Erasing UDS.KEYID = 0
6,021,198 UART: [idev] Sha1 KeyId Algorithm
6,043,915 UART: [idev] --
6,048,267 UART: [ldev] ++
6,048,849 UART: [ldev] CDI.KEYID = 6
6,049,765 UART: [ldev] SUBJECT.KEYID = 5
6,050,928 UART: [ldev] AUTHORITY.KEYID = 7
6,052,109 UART: [ldev] FE.KEYID = 1
6,097,043 UART: [ldev] Erasing FE.KEYID = 1
8,599,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,803 UART: [ldev] --
10,387,612 UART: [fwproc] Wait for Commands...
10,390,423 UART: [fwproc] Recv command 0x46574c44
10,392,471 UART: [fwproc] Recv'd Img size: 114168 bytes
10,480,534 UART: ROM Fatal Error: 0x000B0005
10,483,622 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
5,776 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,292,536 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,566 writing to cptra_bootfsm_go
6,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,704 UART:
193,088 UART: Running Caliptra ROM ...
194,278 UART:
603,811 UART: [state] CFI Enabled
617,113 UART: [state] LifecycleState = Manufacturing
619,018 UART: [state] DebugLocked = No
621,130 UART: [state] WD Timer not started. Device not locked for debugging
625,611 UART: [kat] SHA2-256
804,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,301 UART: [kat] ++
816,829 UART: [kat] sha1
827,653 UART: [kat] SHA2-256
830,712 UART: [kat] SHA2-384
835,817 UART: [kat] SHA2-512-ACC
838,749 UART: [kat] ECC-384
3,280,921 UART: [kat] HMAC-384Kdf
3,294,171 UART: [kat] LMS
3,823,670 UART: [kat] --
3,828,315 UART: [cold-reset] ++
3,830,290 UART: [fht] FHT @ 0x50003400
3,840,939 UART: [idev] ++
3,841,505 UART: [idev] CDI.KEYID = 6
3,842,514 UART: [idev] SUBJECT.KEYID = 7
3,843,613 UART: [idev] UDS.KEYID = 0
3,859,903 UART: [idev] Erasing UDS.KEYID = 0
6,317,330 UART: [idev] Sha1 KeyId Algorithm
6,339,794 UART: [idev] --
6,343,905 UART: [ldev] ++
6,344,474 UART: [ldev] CDI.KEYID = 6
6,345,380 UART: [ldev] SUBJECT.KEYID = 5
6,346,587 UART: [ldev] AUTHORITY.KEYID = 7
6,347,815 UART: [ldev] FE.KEYID = 1
6,358,567 UART: [ldev] Erasing FE.KEYID = 1
8,831,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,771 UART: [ldev] --
10,623,029 UART: [fwproc] Wait for Commands...
10,625,503 UART: [fwproc] Recv command 0x46574c44
10,627,596 UART: [fwproc] Recv'd Img size: 114168 bytes
10,717,593 UART: ROM Fatal Error: 0x000B0005
10,720,692 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
6,633 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,498,613 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
6,642 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,165 UART:
192,539 UART: Running Caliptra ROM ...
193,683 UART:
193,837 UART: [state] CFI Enabled
264,741 UART: [state] LifecycleState = Manufacturing
266,592 UART: [state] DebugLocked = No
268,353 UART: [state] WD Timer not started. Device not locked for debugging
272,173 UART: [kat] SHA2-256
451,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,846 UART: [kat] ++
463,388 UART: [kat] sha1
474,705 UART: [kat] SHA2-256
477,729 UART: [kat] SHA2-384
483,708 UART: [kat] SHA2-512-ACC
486,674 UART: [kat] ECC-384
2,946,456 UART: [kat] HMAC-384Kdf
2,969,708 UART: [kat] LMS
3,499,157 UART: [kat] --
3,504,569 UART: [cold-reset] ++
3,507,097 UART: [fht] FHT @ 0x50003400
3,517,701 UART: [idev] ++
3,518,269 UART: [idev] CDI.KEYID = 6
3,519,176 UART: [idev] SUBJECT.KEYID = 7
3,520,390 UART: [idev] UDS.KEYID = 0
3,541,428 UART: [idev] Erasing UDS.KEYID = 0
6,032,797 UART: [idev] Sha1 KeyId Algorithm
6,054,959 UART: [idev] --
6,059,172 UART: [ldev] ++
6,059,764 UART: [ldev] CDI.KEYID = 6
6,060,655 UART: [ldev] SUBJECT.KEYID = 5
6,061,814 UART: [ldev] AUTHORITY.KEYID = 7
6,063,055 UART: [ldev] FE.KEYID = 1
6,104,959 UART: [ldev] Erasing FE.KEYID = 1
8,609,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,232 UART: [ldev] --
10,418,375 UART: [fwproc] Wait for Commands...
10,421,605 UART: [fwproc] Recv command 0x46574c44
10,423,649 UART: [fwproc] Recv'd Img size: 114168 bytes
10,514,300 UART: ROM Fatal Error: 0x000B0005
10,517,448 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
5,430 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,313,745 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
6,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,372 UART:
192,766 UART: Running Caliptra ROM ...
193,959 UART:
603,682 UART: [state] CFI Enabled
619,613 UART: [state] LifecycleState = Manufacturing
621,480 UART: [state] DebugLocked = No
624,381 UART: [state] WD Timer not started. Device not locked for debugging
627,204 UART: [kat] SHA2-256
806,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,925 UART: [kat] ++
818,456 UART: [kat] sha1
830,480 UART: [kat] SHA2-256
833,547 UART: [kat] SHA2-384
839,306 UART: [kat] SHA2-512-ACC
842,232 UART: [kat] ECC-384
3,283,932 UART: [kat] HMAC-384Kdf
3,296,764 UART: [kat] LMS
3,826,259 UART: [kat] --
3,832,810 UART: [cold-reset] ++
3,834,917 UART: [fht] FHT @ 0x50003400
3,845,030 UART: [idev] ++
3,845,596 UART: [idev] CDI.KEYID = 6
3,846,505 UART: [idev] SUBJECT.KEYID = 7
3,847,738 UART: [idev] UDS.KEYID = 0
3,861,822 UART: [idev] Erasing UDS.KEYID = 0
6,319,455 UART: [idev] Sha1 KeyId Algorithm
6,342,101 UART: [idev] --
6,346,151 UART: [ldev] ++
6,346,725 UART: [ldev] CDI.KEYID = 6
6,347,634 UART: [ldev] SUBJECT.KEYID = 5
6,348,847 UART: [ldev] AUTHORITY.KEYID = 7
6,350,075 UART: [ldev] FE.KEYID = 1
6,361,532 UART: [ldev] Erasing FE.KEYID = 1
8,832,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,724 UART: [ldev] --
10,624,358 UART: [fwproc] Wait for Commands...
10,627,115 UART: [fwproc] Recv command 0x46574c44
10,629,212 UART: [fwproc] Recv'd Img size: 114168 bytes
10,721,439 UART: ROM Fatal Error: 0x000B0005
10,724,538 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
6,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,493,385 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,458 UART: [state] LifecycleState = Manufacturing
85,113 UART: [state] DebugLocked = No
85,721 UART: [state] WD Timer not started. Device not locked for debugging
87,016 UART: [kat] SHA2-256
890,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,695 UART: [kat] ++
894,847 UART: [kat] sha1
899,117 UART: [kat] SHA2-256
901,057 UART: [kat] SHA2-384
903,860 UART: [kat] SHA2-512-ACC
905,761 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,055 UART: [fht] FHT @ 0x50003400
1,172,843 UART: [idev] ++
1,173,011 UART: [idev] CDI.KEYID = 6
1,173,372 UART: [idev] SUBJECT.KEYID = 7
1,173,797 UART: [idev] UDS.KEYID = 0
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,361 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,208,074 UART: [ldev] ++
1,208,242 UART: [ldev] CDI.KEYID = 6
1,208,606 UART: [ldev] SUBJECT.KEYID = 5
1,209,033 UART: [ldev] AUTHORITY.KEYID = 7
1,209,496 UART: [ldev] FE.KEYID = 1
1,214,746 UART: [ldev] Erasing FE.KEYID = 1
1,241,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,460 UART: [fwproc] Wait for Commands...
1,281,271 UART: [fwproc] Recv command 0x46574c44
1,282,004 UART: [fwproc] Recv'd Img size: 114168 bytes
1,326,557 UART: ROM Fatal Error: 0x000B0005
1,327,714 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,321 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Manufacturing
85,976 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,544 UART: [cold-reset] ++
1,171,088 UART: [fht] FHT @ 0x50003400
1,173,806 UART: [idev] ++
1,173,974 UART: [idev] CDI.KEYID = 6
1,174,335 UART: [idev] SUBJECT.KEYID = 7
1,174,760 UART: [idev] UDS.KEYID = 0
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,238 UART: [idev] --
1,209,383 UART: [ldev] ++
1,209,551 UART: [ldev] CDI.KEYID = 6
1,209,915 UART: [ldev] SUBJECT.KEYID = 5
1,210,342 UART: [ldev] AUTHORITY.KEYID = 7
1,210,805 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,327 UART: [ldev] --
1,282,771 UART: [fwproc] Wait for Commands...
1,283,582 UART: [fwproc] Recv command 0x46574c44
1,284,315 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,512 UART: ROM Fatal Error: 0x000B0005
1,329,669 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,846 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Manufacturing
86,123 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
88,042 UART: [kat] SHA2-256
891,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,721 UART: [kat] ++
895,873 UART: [kat] sha1
899,989 UART: [kat] SHA2-256
901,929 UART: [kat] SHA2-384
904,716 UART: [kat] SHA2-512-ACC
906,617 UART: [kat] ECC-384
916,418 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,431 UART: [fht] FHT @ 0x50003400
1,173,205 UART: [idev] ++
1,173,373 UART: [idev] CDI.KEYID = 6
1,173,734 UART: [idev] SUBJECT.KEYID = 7
1,174,159 UART: [idev] UDS.KEYID = 0
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,197,961 UART: [idev] Sha1 KeyId Algorithm
1,206,723 UART: [idev] --
1,207,770 UART: [ldev] ++
1,207,938 UART: [ldev] CDI.KEYID = 6
1,208,302 UART: [ldev] SUBJECT.KEYID = 5
1,208,729 UART: [ldev] AUTHORITY.KEYID = 7
1,209,192 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,810 UART: [ldev] --
1,280,252 UART: [fwproc] Wait for Commands...
1,281,025 UART: [fwproc] Recv command 0x46574c44
1,281,758 UART: [fwproc] Recv'd Img size: 114168 bytes
1,326,753 UART: ROM Fatal Error: 0x000B0005
1,327,910 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,419 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Manufacturing
86,182 UART: [state] DebugLocked = No
86,838 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,646 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,103 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,281,923 UART: [fwproc] Wait for Commands...
1,282,548 UART: [fwproc] Recv command 0x46574c44
1,283,281 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,130 UART: ROM Fatal Error: 0x000B0005
1,329,287 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,836 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,874 UART: [state] LifecycleState = Manufacturing
86,529 UART: [state] DebugLocked = No
87,155 UART: [state] WD Timer not started. Device not locked for debugging
88,322 UART: [kat] SHA2-256
891,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,001 UART: [kat] ++
896,153 UART: [kat] sha1
900,631 UART: [kat] SHA2-256
902,571 UART: [kat] SHA2-384
905,374 UART: [kat] SHA2-512-ACC
907,275 UART: [kat] ECC-384
917,068 UART: [kat] HMAC-384Kdf
921,694 UART: [kat] LMS
1,170,006 UART: [kat] --
1,170,797 UART: [cold-reset] ++
1,171,249 UART: [fht] FHT @ 0x50003400
1,173,785 UART: [idev] ++
1,173,953 UART: [idev] CDI.KEYID = 6
1,174,314 UART: [idev] SUBJECT.KEYID = 7
1,174,739 UART: [idev] UDS.KEYID = 0
1,182,291 UART: [idev] Erasing UDS.KEYID = 0
1,198,645 UART: [idev] Sha1 KeyId Algorithm
1,207,341 UART: [idev] --
1,208,294 UART: [ldev] ++
1,208,462 UART: [ldev] CDI.KEYID = 6
1,208,826 UART: [ldev] SUBJECT.KEYID = 5
1,209,253 UART: [ldev] AUTHORITY.KEYID = 7
1,209,716 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,380 UART: [ldev] --
1,280,680 UART: [fwproc] Wait for Commands...
1,281,345 UART: [fwproc] Recv command 0x46574c44
1,282,078 UART: [fwproc] Recv'd Img size: 114168 bytes
1,325,913 UART: ROM Fatal Error: 0x000B0005
1,327,070 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,197 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Manufacturing
86,312 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [kat] SHA2-256
891,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,920 UART: [kat] ++
896,072 UART: [kat] sha1
900,258 UART: [kat] SHA2-256
902,198 UART: [kat] SHA2-384
904,817 UART: [kat] SHA2-512-ACC
906,718 UART: [kat] ECC-384
916,969 UART: [kat] HMAC-384Kdf
921,717 UART: [kat] LMS
1,170,029 UART: [kat] --
1,170,924 UART: [cold-reset] ++
1,171,388 UART: [fht] FHT @ 0x50003400
1,173,988 UART: [idev] ++
1,174,156 UART: [idev] CDI.KEYID = 6
1,174,517 UART: [idev] SUBJECT.KEYID = 7
1,174,942 UART: [idev] UDS.KEYID = 0
1,182,672 UART: [idev] Erasing UDS.KEYID = 0
1,199,592 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,673 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,466 UART: ROM Fatal Error: 0x000B0005
1,328,623 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,238 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
5,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,180 UART:
192,573 UART: Running Caliptra ROM ...
193,706 UART:
193,853 UART: [state] CFI Enabled
268,300 UART: [state] LifecycleState = Manufacturing
270,724 UART: [state] DebugLocked = No
273,123 UART: [state] WD Timer not started. Device not locked for debugging
277,532 UART: [kat] SHA2-256
459,490 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,972 UART: [kat] ++
471,501 UART: [kat] sha1
482,758 UART: [kat] SHA2-256
485,768 UART: [kat] SHA2-384
492,063 UART: [kat] SHA2-512-ACC
494,684 UART: [kat] ECC-384
3,778,390 UART: [kat] HMAC-384Kdf
3,803,278 UART: [kat] LMS
4,876,420 UART: [kat] --
4,880,537 UART: [cold-reset] ++
4,881,662 UART: [fht] FHT @ 0x50003400
4,892,190 UART: [idev] ++
4,892,859 UART: [idev] CDI.KEYID = 6
4,894,021 UART: [idev] SUBJECT.KEYID = 7
4,895,258 UART: [idev] UDS.KEYID = 0
4,930,820 UART: [idev] Erasing UDS.KEYID = 0
8,241,196 UART: [idev] Sha1 KeyId Algorithm
8,262,882 UART: [idev] --
8,265,907 UART: [ldev] ++
8,266,532 UART: [ldev] CDI.KEYID = 6
8,267,717 UART: [ldev] SUBJECT.KEYID = 5
8,268,871 UART: [ldev] AUTHORITY.KEYID = 7
8,270,098 UART: [ldev] FE.KEYID = 1
8,297,286 UART: [ldev] Erasing FE.KEYID = 1
11,632,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,131 UART: [ldev] --
14,016,392 UART: [fwproc] Wait for Commands...
14,017,952 UART: [fwproc] Recv command 0x46574c44
14,020,271 UART: [fwproc] Recv'd Img size: 113844 bytes
14,080,915 UART: ROM Fatal Error: 0x000B0003
14,084,331 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
5,848 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,909,103 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
6,524 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,454 UART:
192,878 UART: Running Caliptra ROM ...
194,032 UART:
603,514 UART: [state] CFI Enabled
617,433 UART: [state] LifecycleState = Manufacturing
619,787 UART: [state] DebugLocked = No
622,253 UART: [state] WD Timer not started. Device not locked for debugging
627,329 UART: [kat] SHA2-256
809,316 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,871 UART: [kat] ++
821,451 UART: [kat] sha1
831,327 UART: [kat] SHA2-256
834,334 UART: [kat] SHA2-384
839,984 UART: [kat] SHA2-512-ACC
842,588 UART: [kat] ECC-384
4,095,645 UART: [kat] HMAC-384Kdf
4,108,913 UART: [kat] LMS
5,182,091 UART: [kat] --
5,185,198 UART: [cold-reset] ++
5,187,140 UART: [fht] FHT @ 0x50003400
5,199,410 UART: [idev] ++
5,200,078 UART: [idev] CDI.KEYID = 6
5,201,307 UART: [idev] SUBJECT.KEYID = 7
5,202,783 UART: [idev] UDS.KEYID = 0
5,218,318 UART: [idev] Erasing UDS.KEYID = 0
8,491,866 UART: [idev] Sha1 KeyId Algorithm
8,514,310 UART: [idev] --
8,517,729 UART: [ldev] ++
8,518,299 UART: [ldev] CDI.KEYID = 6
8,519,532 UART: [ldev] SUBJECT.KEYID = 5
8,521,015 UART: [ldev] AUTHORITY.KEYID = 7
8,522,569 UART: [ldev] FE.KEYID = 1
8,533,544 UART: [ldev] Erasing FE.KEYID = 1
11,823,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,692 UART: [ldev] --
14,192,520 UART: [fwproc] Wait for Commands...
14,194,718 UART: [fwproc] Recv command 0x46574c44
14,197,025 UART: [fwproc] Recv'd Img size: 113844 bytes
14,261,512 UART: ROM Fatal Error: 0x000B0003
14,264,894 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
6,410 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,071,439 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
5,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,115 UART:
192,498 UART: Running Caliptra ROM ...
193,635 UART:
193,777 UART: [state] CFI Enabled
266,401 UART: [state] LifecycleState = Manufacturing
268,317 UART: [state] DebugLocked = No
269,758 UART: [state] WD Timer not started. Device not locked for debugging
273,746 UART: [kat] SHA2-256
452,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,414 UART: [kat] ++
464,954 UART: [kat] sha1
476,702 UART: [kat] SHA2-256
479,719 UART: [kat] SHA2-384
486,670 UART: [kat] SHA2-512-ACC
489,606 UART: [kat] ECC-384
2,948,767 UART: [kat] HMAC-384Kdf
2,971,709 UART: [kat] LMS
3,501,137 UART: [kat] --
3,506,266 UART: [cold-reset] ++
3,507,925 UART: [fht] FHT @ 0x50003400
3,520,318 UART: [idev] ++
3,520,890 UART: [idev] CDI.KEYID = 6
3,521,809 UART: [idev] SUBJECT.KEYID = 7
3,522,970 UART: [idev] UDS.KEYID = 0
3,543,649 UART: [idev] Erasing UDS.KEYID = 0
6,022,990 UART: [idev] Sha1 KeyId Algorithm
6,046,386 UART: [idev] --
6,051,061 UART: [ldev] ++
6,051,646 UART: [ldev] CDI.KEYID = 6
6,052,532 UART: [ldev] SUBJECT.KEYID = 5
6,053,758 UART: [ldev] AUTHORITY.KEYID = 7
6,055,007 UART: [ldev] FE.KEYID = 1
6,099,933 UART: [ldev] Erasing FE.KEYID = 1
8,599,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,909 UART: [ldev] --
10,391,418 UART: [fwproc] Wait for Commands...
10,393,780 UART: [fwproc] Recv command 0x46574c44
10,395,899 UART: [fwproc] Recv'd Img size: 114168 bytes
10,456,709 UART: ROM Fatal Error: 0x000B0003
10,459,861 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
5,461 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,242,112 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
6,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,395 UART:
192,768 UART: Running Caliptra ROM ...
193,908 UART:
603,677 UART: [state] CFI Enabled
617,557 UART: [state] LifecycleState = Manufacturing
619,449 UART: [state] DebugLocked = No
622,080 UART: [state] WD Timer not started. Device not locked for debugging
624,963 UART: [kat] SHA2-256
804,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,658 UART: [kat] ++
816,193 UART: [kat] sha1
827,940 UART: [kat] SHA2-256
830,956 UART: [kat] SHA2-384
837,089 UART: [kat] SHA2-512-ACC
840,074 UART: [kat] ECC-384
3,284,789 UART: [kat] HMAC-384Kdf
3,296,047 UART: [kat] LMS
3,825,541 UART: [kat] --
3,832,174 UART: [cold-reset] ++
3,834,429 UART: [fht] FHT @ 0x50003400
3,845,615 UART: [idev] ++
3,846,171 UART: [idev] CDI.KEYID = 6
3,847,108 UART: [idev] SUBJECT.KEYID = 7
3,848,335 UART: [idev] UDS.KEYID = 0
3,864,992 UART: [idev] Erasing UDS.KEYID = 0
6,322,830 UART: [idev] Sha1 KeyId Algorithm
6,345,331 UART: [idev] --
6,349,321 UART: [ldev] ++
6,349,886 UART: [ldev] CDI.KEYID = 6
6,350,770 UART: [ldev] SUBJECT.KEYID = 5
6,351,982 UART: [ldev] AUTHORITY.KEYID = 7
6,353,206 UART: [ldev] FE.KEYID = 1
6,363,341 UART: [ldev] Erasing FE.KEYID = 1
8,834,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,023 UART: [ldev] --
10,627,384 UART: [fwproc] Wait for Commands...
10,630,400 UART: [fwproc] Recv command 0x46574c44
10,632,435 UART: [fwproc] Recv'd Img size: 114168 bytes
10,693,013 UART: ROM Fatal Error: 0x000B0003
10,696,149 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
6,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,465,027 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
5,912 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,297 UART:
192,672 UART: Running Caliptra ROM ...
193,860 UART:
194,029 UART: [state] CFI Enabled
266,090 UART: [state] LifecycleState = Manufacturing
267,976 UART: [state] DebugLocked = No
270,437 UART: [state] WD Timer not started. Device not locked for debugging
274,854 UART: [kat] SHA2-256
453,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,559 UART: [kat] ++
466,006 UART: [kat] sha1
476,993 UART: [kat] SHA2-256
479,998 UART: [kat] SHA2-384
487,000 UART: [kat] SHA2-512-ACC
489,950 UART: [kat] ECC-384
2,950,678 UART: [kat] HMAC-384Kdf
2,972,249 UART: [kat] LMS
3,501,716 UART: [kat] --
3,508,366 UART: [cold-reset] ++
3,510,905 UART: [fht] FHT @ 0x50003400
3,521,724 UART: [idev] ++
3,522,289 UART: [idev] CDI.KEYID = 6
3,523,259 UART: [idev] SUBJECT.KEYID = 7
3,524,419 UART: [idev] UDS.KEYID = 0
3,544,287 UART: [idev] Erasing UDS.KEYID = 0
6,028,030 UART: [idev] Sha1 KeyId Algorithm
6,051,492 UART: [idev] --
6,054,466 UART: [ldev] ++
6,055,042 UART: [ldev] CDI.KEYID = 6
6,056,479 UART: [ldev] SUBJECT.KEYID = 5
6,057,623 UART: [ldev] AUTHORITY.KEYID = 7
6,058,813 UART: [ldev] FE.KEYID = 1
6,100,568 UART: [ldev] Erasing FE.KEYID = 1
8,603,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,838 UART: [ldev] --
10,414,973 UART: [fwproc] Wait for Commands...
10,417,181 UART: [fwproc] Recv command 0x46574c44
10,419,279 UART: [fwproc] Recv'd Img size: 114168 bytes
10,484,507 UART: ROM Fatal Error: 0x000B0003
10,487,605 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
5,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,249,785 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
6,432 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,406 UART:
192,810 UART: Running Caliptra ROM ...
193,947 UART:
603,687 UART: [state] CFI Enabled
618,320 UART: [state] LifecycleState = Manufacturing
620,205 UART: [state] DebugLocked = No
621,951 UART: [state] WD Timer not started. Device not locked for debugging
626,215 UART: [kat] SHA2-256
805,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,925 UART: [kat] ++
817,369 UART: [kat] sha1
827,864 UART: [kat] SHA2-256
830,868 UART: [kat] SHA2-384
836,953 UART: [kat] SHA2-512-ACC
839,947 UART: [kat] ECC-384
3,279,447 UART: [kat] HMAC-384Kdf
3,291,842 UART: [kat] LMS
3,821,333 UART: [kat] --
3,826,020 UART: [cold-reset] ++
3,827,785 UART: [fht] FHT @ 0x50003400
3,839,138 UART: [idev] ++
3,839,696 UART: [idev] CDI.KEYID = 6
3,840,622 UART: [idev] SUBJECT.KEYID = 7
3,841,780 UART: [idev] UDS.KEYID = 0
3,859,214 UART: [idev] Erasing UDS.KEYID = 0
6,319,479 UART: [idev] Sha1 KeyId Algorithm
6,342,596 UART: [idev] --
6,346,048 UART: [ldev] ++
6,346,616 UART: [ldev] CDI.KEYID = 6
6,347,553 UART: [ldev] SUBJECT.KEYID = 5
6,348,763 UART: [ldev] AUTHORITY.KEYID = 7
6,349,986 UART: [ldev] FE.KEYID = 1
6,359,742 UART: [ldev] Erasing FE.KEYID = 1
8,833,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,332 UART: [ldev] --
10,623,463 UART: [fwproc] Wait for Commands...
10,624,961 UART: [fwproc] Recv command 0x46574c44
10,627,064 UART: [fwproc] Recv'd Img size: 114168 bytes
10,692,227 UART: ROM Fatal Error: 0x000B0003
10,695,312 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
6,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,469,652 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Manufacturing
85,783 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,583 UART: [kat] SHA2-256
901,523 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
915,792 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,709 UART: [idev] ++
1,172,877 UART: [idev] CDI.KEYID = 6
1,173,238 UART: [idev] SUBJECT.KEYID = 7
1,173,663 UART: [idev] UDS.KEYID = 0
1,181,219 UART: [idev] Erasing UDS.KEYID = 0
1,198,119 UART: [idev] Sha1 KeyId Algorithm
1,206,959 UART: [idev] --
1,207,962 UART: [ldev] ++
1,208,130 UART: [ldev] CDI.KEYID = 6
1,208,494 UART: [ldev] SUBJECT.KEYID = 5
1,208,921 UART: [ldev] AUTHORITY.KEYID = 7
1,209,384 UART: [ldev] FE.KEYID = 1
1,214,276 UART: [ldev] Erasing FE.KEYID = 1
1,240,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,992 UART: [ldev] --
1,279,406 UART: [fwproc] Wait for Commands...
1,280,173 UART: [fwproc] Recv command 0x46574c44
1,280,906 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,073 UART: ROM Fatal Error: 0x000B0003
1,302,230 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,739 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Manufacturing
86,386 UART: [state] DebugLocked = No
87,038 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
891,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,004 UART: [kat] ++
896,156 UART: [kat] sha1
900,392 UART: [kat] SHA2-256
902,332 UART: [kat] SHA2-384
905,099 UART: [kat] SHA2-512-ACC
907,000 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,918 UART: [fht] FHT @ 0x50003400
1,173,580 UART: [idev] ++
1,173,748 UART: [idev] CDI.KEYID = 6
1,174,109 UART: [idev] SUBJECT.KEYID = 7
1,174,534 UART: [idev] UDS.KEYID = 0
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,866 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,793 UART: [ldev] ++
1,209,961 UART: [ldev] CDI.KEYID = 6
1,210,325 UART: [ldev] SUBJECT.KEYID = 5
1,210,752 UART: [ldev] AUTHORITY.KEYID = 7
1,211,215 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,565 UART: [fwproc] Wait for Commands...
1,282,188 UART: [fwproc] Recv command 0x46574c44
1,282,921 UART: [fwproc] Recv'd Img size: 114168 bytes
1,303,552 UART: ROM Fatal Error: 0x000B0003
1,304,709 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,157,348 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Manufacturing
85,917 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,487 UART: [kat] ++
895,639 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,535 UART: [fht] FHT @ 0x50003400
1,173,193 UART: [idev] ++
1,173,361 UART: [idev] CDI.KEYID = 6
1,173,722 UART: [idev] SUBJECT.KEYID = 7
1,174,147 UART: [idev] UDS.KEYID = 0
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,417 UART: [idev] Sha1 KeyId Algorithm
1,208,195 UART: [idev] --
1,209,284 UART: [ldev] ++
1,209,452 UART: [ldev] CDI.KEYID = 6
1,209,816 UART: [ldev] SUBJECT.KEYID = 5
1,210,243 UART: [ldev] AUTHORITY.KEYID = 7
1,210,706 UART: [ldev] FE.KEYID = 1
1,216,062 UART: [ldev] Erasing FE.KEYID = 1
1,242,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,620 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,609 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 114168 bytes
1,304,201 UART: ROM Fatal Error: 0x000B0003
1,305,358 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,307 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,981 UART: [state] LifecycleState = Manufacturing
85,636 UART: [state] DebugLocked = No
86,274 UART: [state] WD Timer not started. Device not locked for debugging
87,475 UART: [kat] SHA2-256
891,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,154 UART: [kat] ++
895,306 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,041 UART: [kat] SHA2-512-ACC
905,942 UART: [kat] ECC-384
915,951 UART: [kat] HMAC-384Kdf
920,657 UART: [kat] LMS
1,168,969 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,250 UART: [fht] FHT @ 0x50003400
1,172,932 UART: [idev] ++
1,173,100 UART: [idev] CDI.KEYID = 6
1,173,461 UART: [idev] SUBJECT.KEYID = 7
1,173,886 UART: [idev] UDS.KEYID = 0
1,182,238 UART: [idev] Erasing UDS.KEYID = 0
1,199,672 UART: [idev] Sha1 KeyId Algorithm
1,208,558 UART: [idev] --
1,209,751 UART: [ldev] ++
1,209,919 UART: [ldev] CDI.KEYID = 6
1,210,283 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,109 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46574c44
1,283,555 UART: [fwproc] Recv'd Img size: 114168 bytes
1,303,978 UART: ROM Fatal Error: 0x000B0003
1,305,135 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,298 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Manufacturing
85,529 UART: [state] DebugLocked = No
86,017 UART: [state] WD Timer not started. Device not locked for debugging
87,206 UART: [kat] SHA2-256
890,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,885 UART: [kat] ++
895,037 UART: [kat] sha1
899,243 UART: [kat] SHA2-256
901,183 UART: [kat] SHA2-384
904,062 UART: [kat] SHA2-512-ACC
905,963 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
919,870 UART: [kat] LMS
1,168,182 UART: [kat] --
1,169,025 UART: [cold-reset] ++
1,169,541 UART: [fht] FHT @ 0x50003400
1,172,215 UART: [idev] ++
1,172,383 UART: [idev] CDI.KEYID = 6
1,172,744 UART: [idev] SUBJECT.KEYID = 7
1,173,169 UART: [idev] UDS.KEYID = 0
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,483 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,238 UART: [ldev] ++
1,208,406 UART: [ldev] CDI.KEYID = 6
1,208,770 UART: [ldev] SUBJECT.KEYID = 5
1,209,197 UART: [ldev] AUTHORITY.KEYID = 7
1,209,660 UART: [ldev] FE.KEYID = 1
1,214,854 UART: [ldev] Erasing FE.KEYID = 1
1,241,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,014 UART: [ldev] --
1,280,508 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,769 UART: ROM Fatal Error: 0x000B0003
1,302,926 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,019 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Manufacturing
85,674 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,692 UART: [fht] FHT @ 0x50003400
1,173,356 UART: [idev] ++
1,173,524 UART: [idev] CDI.KEYID = 6
1,173,885 UART: [idev] SUBJECT.KEYID = 7
1,174,310 UART: [idev] UDS.KEYID = 0
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,208,852 UART: [idev] --
1,210,045 UART: [ldev] ++
1,210,213 UART: [ldev] CDI.KEYID = 6
1,210,577 UART: [ldev] SUBJECT.KEYID = 5
1,211,004 UART: [ldev] AUTHORITY.KEYID = 7
1,211,467 UART: [ldev] FE.KEYID = 1
1,216,799 UART: [ldev] Erasing FE.KEYID = 1
1,243,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,053 UART: [ldev] --
1,283,569 UART: [fwproc] Wait for Commands...
1,284,242 UART: [fwproc] Recv command 0x46574c44
1,284,975 UART: [fwproc] Recv'd Img size: 114168 bytes
1,305,648 UART: ROM Fatal Error: 0x000B0003
1,306,805 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,157,784 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
5,461 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
191,967 UART:
192,350 UART: Running Caliptra ROM ...
193,532 UART:
193,693 UART: [state] CFI Enabled
259,874 UART: [state] LifecycleState = Unprovisioned
262,245 UART: [state] DebugLocked = No
265,140 UART: [state] WD Timer not started. Device not locked for debugging
269,916 UART: [kat] SHA2-256
451,818 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
463,360 UART: [kat] ++
463,858 UART: [kat] sha1
473,614 UART: [kat] SHA2-256
476,632 UART: [kat] SHA2-384
482,941 UART: [kat] SHA2-512-ACC
485,566 UART: [kat] ECC-384
3,777,351 UART: [kat] HMAC-384Kdf
3,803,995 UART: [kat] LMS
4,877,167 UART: [kat] --
4,883,018 UART: [cold-reset] ++
4,884,810 UART: [fht] FHT @ 0x50003400
4,895,736 UART: [idev] ++
4,896,427 UART: [idev] CDI.KEYID = 6
4,897,608 UART: [idev] SUBJECT.KEYID = 7
4,898,761 UART: [idev] UDS.KEYID = 0
4,930,664 UART: [idev] Erasing UDS.KEYID = 0
8,246,372 UART: [idev] Sha1 KeyId Algorithm
8,268,088 UART: [idev] --
8,272,674 UART: [ldev] ++
8,273,237 UART: [ldev] CDI.KEYID = 6
8,274,405 UART: [ldev] SUBJECT.KEYID = 5
8,275,618 UART: [ldev] AUTHORITY.KEYID = 7
8,276,771 UART: [ldev] FE.KEYID = 1
8,318,832 UART: [ldev] Erasing FE.KEYID = 1
11,655,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,099 UART: [ldev] --
14,040,230 UART: [fwproc] Wait for Commands...
14,043,362 UART: [fwproc] Recv command 0x46574c44
14,045,673 UART: [fwproc] Recv'd Img size: 113844 bytes
18,119,345 UART: ROM Fatal Error: 0x000B0016
18,122,762 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,539 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,864,955 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
6,383 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,269 UART:
192,688 UART: Running Caliptra ROM ...
193,901 UART:
603,348 UART: [state] CFI Enabled
618,478 UART: [state] LifecycleState = Unprovisioned
620,813 UART: [state] DebugLocked = No
622,187 UART: [state] WD Timer not started. Device not locked for debugging
626,870 UART: [kat] SHA2-256
808,819 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,394 UART: [kat] ++
820,977 UART: [kat] sha1
830,999 UART: [kat] SHA2-256
833,998 UART: [kat] SHA2-384
839,112 UART: [kat] SHA2-512-ACC
841,730 UART: [kat] ECC-384
4,098,163 UART: [kat] HMAC-384Kdf
4,110,693 UART: [kat] LMS
5,183,829 UART: [kat] --
5,188,914 UART: [cold-reset] ++
5,191,447 UART: [fht] FHT @ 0x50003400
5,202,867 UART: [idev] ++
5,203,543 UART: [idev] CDI.KEYID = 6
5,204,778 UART: [idev] SUBJECT.KEYID = 7
5,206,213 UART: [idev] UDS.KEYID = 0
5,222,976 UART: [idev] Erasing UDS.KEYID = 0
8,492,904 UART: [idev] Sha1 KeyId Algorithm
8,516,027 UART: [idev] --
8,519,245 UART: [ldev] ++
8,519,872 UART: [ldev] CDI.KEYID = 6
8,521,054 UART: [ldev] SUBJECT.KEYID = 5
8,522,489 UART: [ldev] AUTHORITY.KEYID = 7
8,524,048 UART: [ldev] FE.KEYID = 1
8,535,128 UART: [ldev] Erasing FE.KEYID = 1
11,828,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,120 UART: [ldev] --
14,195,152 UART: [fwproc] Wait for Commands...
14,197,145 UART: [fwproc] Recv command 0x46574c44
14,199,464 UART: [fwproc] Recv'd Img size: 113844 bytes
18,261,288 UART: ROM Fatal Error: 0x000B0016
18,264,703 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,538 writing to cptra_bootfsm_go
7,619 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,079,826 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
5,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,069 UART:
192,470 UART: Running Caliptra ROM ...
193,612 UART:
193,765 UART: [state] CFI Enabled
261,551 UART: [state] LifecycleState = Unprovisioned
263,415 UART: [state] DebugLocked = No
264,745 UART: [state] WD Timer not started. Device not locked for debugging
268,495 UART: [kat] SHA2-256
447,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,175 UART: [kat] ++
459,716 UART: [kat] sha1
470,786 UART: [kat] SHA2-256
473,806 UART: [kat] SHA2-384
479,625 UART: [kat] SHA2-512-ACC
482,614 UART: [kat] ECC-384
2,927,273 UART: [kat] HMAC-384Kdf
2,949,659 UART: [kat] LMS
3,479,111 UART: [kat] --
3,482,775 UART: [cold-reset] ++
3,483,737 UART: [fht] FHT @ 0x50003400
3,494,690 UART: [idev] ++
3,495,299 UART: [idev] CDI.KEYID = 6
3,496,182 UART: [idev] SUBJECT.KEYID = 7
3,497,309 UART: [idev] UDS.KEYID = 0
3,521,273 UART: [idev] Erasing UDS.KEYID = 0
6,005,846 UART: [idev] Sha1 KeyId Algorithm
6,029,127 UART: [idev] --
6,034,319 UART: [ldev] ++
6,034,890 UART: [ldev] CDI.KEYID = 6
6,035,771 UART: [ldev] SUBJECT.KEYID = 5
6,036,988 UART: [ldev] AUTHORITY.KEYID = 7
6,038,226 UART: [ldev] FE.KEYID = 1
6,076,669 UART: [ldev] Erasing FE.KEYID = 1
8,580,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,934 UART: [ldev] --
10,384,338 UART: [fwproc] Wait for Commands...
10,387,409 UART: [fwproc] Recv command 0x46574c44
10,389,453 UART: [fwproc] Recv'd Img size: 114168 bytes
13,783,764 UART: ROM Fatal Error: 0x000B0016
13,786,898 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
5,279 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,569,096 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
6,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,590 UART:
192,965 UART: Running Caliptra ROM ...
194,160 UART:
603,573 UART: [state] CFI Enabled
617,194 UART: [state] LifecycleState = Unprovisioned
619,096 UART: [state] DebugLocked = No
620,693 UART: [state] WD Timer not started. Device not locked for debugging
623,924 UART: [kat] SHA2-256
803,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,623 UART: [kat] ++
815,074 UART: [kat] sha1
826,598 UART: [kat] SHA2-256
829,627 UART: [kat] SHA2-384
835,983 UART: [kat] SHA2-512-ACC
838,965 UART: [kat] ECC-384
3,279,234 UART: [kat] HMAC-384Kdf
3,291,480 UART: [kat] LMS
3,820,928 UART: [kat] --
3,825,181 UART: [cold-reset] ++
3,826,891 UART: [fht] FHT @ 0x50003400
3,838,256 UART: [idev] ++
3,838,860 UART: [idev] CDI.KEYID = 6
3,839,779 UART: [idev] SUBJECT.KEYID = 7
3,840,935 UART: [idev] UDS.KEYID = 0
3,858,479 UART: [idev] Erasing UDS.KEYID = 0
6,312,685 UART: [idev] Sha1 KeyId Algorithm
6,337,261 UART: [idev] --
6,341,144 UART: [ldev] ++
6,341,727 UART: [ldev] CDI.KEYID = 6
6,342,635 UART: [ldev] SUBJECT.KEYID = 5
6,343,847 UART: [ldev] AUTHORITY.KEYID = 7
6,345,075 UART: [ldev] FE.KEYID = 1
6,354,263 UART: [ldev] Erasing FE.KEYID = 1
8,825,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,426 UART: [ldev] --
10,617,578 UART: [fwproc] Wait for Commands...
10,619,721 UART: [fwproc] Recv command 0x46574c44
10,621,766 UART: [fwproc] Recv'd Img size: 114168 bytes
14,014,839 UART: ROM Fatal Error: 0x000B0016
14,017,976 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
6,131 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,824,609 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
5,694 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,280 UART:
192,661 UART: Running Caliptra ROM ...
193,849 UART:
194,002 UART: [state] CFI Enabled
264,758 UART: [state] LifecycleState = Unprovisioned
266,670 UART: [state] DebugLocked = No
268,101 UART: [state] WD Timer not started. Device not locked for debugging
272,314 UART: [kat] SHA2-256
451,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,042 UART: [kat] ++
463,504 UART: [kat] sha1
474,379 UART: [kat] SHA2-256
477,387 UART: [kat] SHA2-384
484,064 UART: [kat] SHA2-512-ACC
487,005 UART: [kat] ECC-384
2,950,832 UART: [kat] HMAC-384Kdf
2,972,298 UART: [kat] LMS
3,501,778 UART: [kat] --
3,506,267 UART: [cold-reset] ++
3,507,503 UART: [fht] FHT @ 0x50003400
3,518,818 UART: [idev] ++
3,519,379 UART: [idev] CDI.KEYID = 6
3,520,344 UART: [idev] SUBJECT.KEYID = 7
3,521,501 UART: [idev] UDS.KEYID = 0
3,545,819 UART: [idev] Erasing UDS.KEYID = 0
6,027,824 UART: [idev] Sha1 KeyId Algorithm
6,049,541 UART: [idev] --
6,052,458 UART: [ldev] ++
6,053,195 UART: [ldev] CDI.KEYID = 6
6,054,111 UART: [ldev] SUBJECT.KEYID = 5
6,055,217 UART: [ldev] AUTHORITY.KEYID = 7
6,056,395 UART: [ldev] FE.KEYID = 1
6,101,647 UART: [ldev] Erasing FE.KEYID = 1
8,608,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,134 UART: [ldev] --
10,417,080 UART: [fwproc] Wait for Commands...
10,420,172 UART: [fwproc] Recv command 0x46574c44
10,422,219 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,732 UART: ROM Fatal Error: 0x000B0016
13,820,868 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
5,284 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,616,269 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
6,564 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,353 UART:
192,738 UART: Running Caliptra ROM ...
193,948 UART:
603,502 UART: [state] CFI Enabled
617,842 UART: [state] LifecycleState = Unprovisioned
619,718 UART: [state] DebugLocked = No
622,074 UART: [state] WD Timer not started. Device not locked for debugging
625,643 UART: [kat] SHA2-256
804,742 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,353 UART: [kat] ++
816,890 UART: [kat] sha1
827,072 UART: [kat] SHA2-256
830,080 UART: [kat] SHA2-384
834,867 UART: [kat] SHA2-512-ACC
837,798 UART: [kat] ECC-384
3,279,372 UART: [kat] HMAC-384Kdf
3,291,818 UART: [kat] LMS
3,821,279 UART: [kat] --
3,826,473 UART: [cold-reset] ++
3,827,375 UART: [fht] FHT @ 0x50003400
3,838,974 UART: [idev] ++
3,839,534 UART: [idev] CDI.KEYID = 6
3,840,468 UART: [idev] SUBJECT.KEYID = 7
3,841,678 UART: [idev] UDS.KEYID = 0
3,860,166 UART: [idev] Erasing UDS.KEYID = 0
6,317,951 UART: [idev] Sha1 KeyId Algorithm
6,341,658 UART: [idev] --
6,345,210 UART: [ldev] ++
6,345,775 UART: [ldev] CDI.KEYID = 6
6,346,740 UART: [ldev] SUBJECT.KEYID = 5
6,347,895 UART: [ldev] AUTHORITY.KEYID = 7
6,349,124 UART: [ldev] FE.KEYID = 1
6,363,009 UART: [ldev] Erasing FE.KEYID = 1
8,836,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,661 UART: [ldev] --
10,628,261 UART: [fwproc] Wait for Commands...
10,630,475 UART: [fwproc] Recv command 0x46574c44
10,632,573 UART: [fwproc] Recv'd Img size: 114168 bytes
14,031,150 UART: ROM Fatal Error: 0x000B0016
14,034,243 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
6,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,810,217 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,837 UART: [kat] SHA2-256
901,777 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
916,230 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,313 UART: [idev] ++
1,173,481 UART: [idev] CDI.KEYID = 6
1,173,842 UART: [idev] SUBJECT.KEYID = 7
1,174,267 UART: [idev] UDS.KEYID = 0
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,208,045 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,216,120 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,280 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,427 UART: [fwproc] Recv command 0x46574c44
1,283,160 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,564 UART: ROM Fatal Error: 0x000B0016
2,578,721 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,406 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,428 UART: [idev] --
1,209,577 UART: [ldev] ++
1,209,745 UART: [ldev] CDI.KEYID = 6
1,210,109 UART: [ldev] SUBJECT.KEYID = 5
1,210,536 UART: [ldev] AUTHORITY.KEYID = 7
1,210,999 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,173 UART: [ldev] --
1,281,521 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,627 UART: ROM Fatal Error: 0x000B0016
2,578,784 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,917 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
921,048 UART: [kat] LMS
1,169,360 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,645 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,593 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,904 UART: [ldev] --
1,281,320 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,582 UART: ROM Fatal Error: 0x000B0016
2,578,739 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,892 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,551 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,199,296 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,111 UART: [ldev] ++
1,209,279 UART: [ldev] CDI.KEYID = 6
1,209,643 UART: [ldev] SUBJECT.KEYID = 5
1,210,070 UART: [ldev] AUTHORITY.KEYID = 7
1,210,533 UART: [ldev] FE.KEYID = 1
1,215,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,535 UART: [fwproc] Wait for Commands...
1,282,114 UART: [fwproc] Recv command 0x46574c44
1,282,847 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,013 UART: ROM Fatal Error: 0x000B0016
2,579,170 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,677 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,614 UART: [kat] LMS
1,168,926 UART: [kat] --
1,169,935 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,012 UART: [ldev] Erasing FE.KEYID = 1
1,241,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,924 UART: [ldev] --
1,281,310 UART: [fwproc] Wait for Commands...
1,281,983 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,090 UART: ROM Fatal Error: 0x000B0016
2,579,247 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,064 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,312 UART: [kat] SHA2-256
902,252 UART: [kat] SHA2-384
905,245 UART: [kat] SHA2-512-ACC
907,146 UART: [kat] ECC-384
916,491 UART: [kat] HMAC-384Kdf
920,985 UART: [kat] LMS
1,169,297 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,780 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,623 UART: [ldev] --
1,282,133 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x46574c44
1,283,633 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,213 UART: ROM Fatal Error: 0x000B0016
2,579,370 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,333 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,019,954 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,163,691 UART:
2,164,094 UART: Running Caliptra ROM ...
2,165,172 UART:
2,165,345 UART: [state] CFI Enabled
2,166,312 UART: [state] LifecycleState = Unprovisioned
2,168,195 UART: [state] DebugLocked = No
2,169,233 UART: [state] WD Timer not started. Device not locked for debugging
2,171,709 UART: [kat] SHA2-256
2,172,377 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,390 UART: [kat] ++
2,175,840 UART: [kat] sha1
2,176,349 UART: [kat] SHA2-256
2,177,006 UART: [kat] SHA2-384
2,177,668 UART: [kat] SHA2-512-ACC
2,178,496 UART: [kat] ECC-384
3,773,842 UART: [kat] HMAC-384Kdf
3,802,132 UART: [kat] LMS
4,875,294 UART: [kat] --
4,880,067 UART: [cold-reset] ++
4,881,925 UART: [fht] FHT @ 0x50003400
4,892,859 UART: [idev] ++
4,893,584 UART: [idev] CDI.KEYID = 6
4,894,705 UART: [idev] SUBJECT.KEYID = 7
4,895,920 UART: [idev] UDS.KEYID = 0
4,928,321 UART: [idev] Erasing UDS.KEYID = 0
8,242,479 UART: [idev] Sha1 KeyId Algorithm
8,265,003 UART: [idev] --
8,269,723 UART: [ldev] ++
8,270,294 UART: [ldev] CDI.KEYID = 6
8,271,456 UART: [ldev] SUBJECT.KEYID = 5
8,272,671 UART: [ldev] AUTHORITY.KEYID = 7
8,273,820 UART: [ldev] FE.KEYID = 1
8,315,556 UART: [ldev] Erasing FE.KEYID = 1
11,648,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,957,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,973,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,989,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,010,281 UART: [ldev] --
14,015,258 UART: [fwproc] Wait for Commands...
14,018,283 UART: [fwproc] Recv command 0x46574c44
14,020,553 UART: [fwproc] Recv'd Img size: 113844 bytes
18,093,479 UART: ROM Fatal Error: 0x000B002B
18,096,897 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,019,426 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,911,092 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
2,021,601 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,644 UART:
2,166,070 UART: Running Caliptra ROM ...
2,167,154 UART:
2,167,299 UART: [state] CFI Enabled
2,168,265 UART: [state] LifecycleState = Unprovisioned
2,170,149 UART: [state] DebugLocked = No
2,171,181 UART: [state] WD Timer not started. Device not locked for debugging
2,173,653 UART: [kat] SHA2-256
2,174,309 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,326 UART: [kat] ++
2,177,770 UART: [kat] sha1
2,178,270 UART: [kat] SHA2-256
2,178,919 UART: [kat] SHA2-384
2,179,570 UART: [kat] SHA2-512-ACC
2,180,447 UART: [kat] ECC-384
4,099,015 UART: [kat] HMAC-384Kdf
4,111,592 UART: [kat] LMS
5,184,719 UART: [kat] --
5,189,331 UART: [cold-reset] ++
5,190,730 UART: [fht] FHT @ 0x50003400
5,201,007 UART: [idev] ++
5,201,681 UART: [idev] CDI.KEYID = 6
5,202,922 UART: [idev] SUBJECT.KEYID = 7
5,204,368 UART: [idev] UDS.KEYID = 0
5,223,011 UART: [idev] Erasing UDS.KEYID = 0
8,494,431 UART: [idev] Sha1 KeyId Algorithm
8,516,844 UART: [idev] --
8,521,749 UART: [ldev] ++
8,522,311 UART: [ldev] CDI.KEYID = 6
8,523,472 UART: [ldev] SUBJECT.KEYID = 5
8,525,010 UART: [ldev] AUTHORITY.KEYID = 7
8,526,493 UART: [ldev] FE.KEYID = 1
8,537,356 UART: [ldev] Erasing FE.KEYID = 1
11,828,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,117,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,092 UART: [ldev] --
14,191,462 UART: [fwproc] Wait for Commands...
14,193,234 UART: [fwproc] Recv command 0x46574c44
14,195,551 UART: [fwproc] Recv'd Img size: 113844 bytes
18,260,454 UART: ROM Fatal Error: 0x000B002B
18,263,859 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,022,200 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,092,912 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,033,117 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,177,942 UART:
2,178,364 UART: Running Caliptra ROM ...
2,179,540 UART:
2,179,712 UART: [state] CFI Enabled
2,180,717 UART: [state] LifecycleState = Unprovisioned
2,182,379 UART: [state] DebugLocked = No
2,183,487 UART: [state] WD Timer not started. Device not locked for debugging
2,185,971 UART: [kat] SHA2-256
2,186,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,654 UART: [kat] ++
2,190,156 UART: [kat] sha1
2,190,677 UART: [kat] SHA2-256
2,191,364 UART: [kat] SHA2-384
2,192,020 UART: [kat] SHA2-512-ACC
2,192,845 UART: [kat] ECC-384
2,948,588 UART: [kat] HMAC-384Kdf
2,963,412 UART: [kat] LMS
3,492,884 UART: [kat] --
3,498,226 UART: [cold-reset] ++
3,499,780 UART: [fht] FHT @ 0x50003400
3,510,454 UART: [idev] ++
3,511,022 UART: [idev] CDI.KEYID = 6
3,512,043 UART: [idev] SUBJECT.KEYID = 7
3,513,150 UART: [idev] UDS.KEYID = 0
3,536,147 UART: [idev] Erasing UDS.KEYID = 0
6,020,627 UART: [idev] Sha1 KeyId Algorithm
6,043,262 UART: [idev] --
6,046,107 UART: [ldev] ++
6,046,690 UART: [ldev] CDI.KEYID = 6
6,047,599 UART: [ldev] SUBJECT.KEYID = 5
6,048,763 UART: [ldev] AUTHORITY.KEYID = 7
6,050,053 UART: [ldev] FE.KEYID = 1
6,092,461 UART: [ldev] Erasing FE.KEYID = 1
8,594,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,061 UART: [ldev] --
10,405,731 UART: [fwproc] Wait for Commands...
10,407,663 UART: [fwproc] Recv command 0x46574c44
10,409,706 UART: [fwproc] Recv'd Img size: 114168 bytes
13,806,237 UART: ROM Fatal Error: 0x000B002B
13,809,375 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
2,022,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,603,795 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
2,022,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,726 UART:
2,167,126 UART: Running Caliptra ROM ...
2,168,239 UART:
2,168,394 UART: [state] CFI Enabled
2,169,375 UART: [state] LifecycleState = Unprovisioned
2,171,014 UART: [state] DebugLocked = No
2,172,042 UART: [state] WD Timer not started. Device not locked for debugging
2,174,503 UART: [kat] SHA2-256
2,175,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,178 UART: [kat] ++
2,178,624 UART: [kat] sha1
2,179,132 UART: [kat] SHA2-256
2,179,787 UART: [kat] SHA2-384
2,180,439 UART: [kat] SHA2-512-ACC
2,181,268 UART: [kat] ECC-384
3,281,609 UART: [kat] HMAC-384Kdf
3,294,859 UART: [kat] LMS
3,824,317 UART: [kat] --
3,828,854 UART: [cold-reset] ++
3,829,914 UART: [fht] FHT @ 0x50003400
3,841,644 UART: [idev] ++
3,842,264 UART: [idev] CDI.KEYID = 6
3,843,153 UART: [idev] SUBJECT.KEYID = 7
3,844,330 UART: [idev] UDS.KEYID = 0
3,857,796 UART: [idev] Erasing UDS.KEYID = 0
6,317,770 UART: [idev] Sha1 KeyId Algorithm
6,341,345 UART: [idev] --
6,345,506 UART: [ldev] ++
6,346,075 UART: [ldev] CDI.KEYID = 6
6,346,992 UART: [ldev] SUBJECT.KEYID = 5
6,348,153 UART: [ldev] AUTHORITY.KEYID = 7
6,349,437 UART: [ldev] FE.KEYID = 1
6,359,705 UART: [ldev] Erasing FE.KEYID = 1
8,836,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,435 UART: [ldev] --
10,626,303 UART: [fwproc] Wait for Commands...
10,628,885 UART: [fwproc] Recv command 0x46574c44
10,630,927 UART: [fwproc] Recv'd Img size: 114168 bytes
14,030,568 UART: ROM Fatal Error: 0x000B002B
14,033,701 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
2,021,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,825,327 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
2,028,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,173,234 UART:
2,173,649 UART: Running Caliptra ROM ...
2,174,824 UART:
2,174,996 UART: [state] CFI Enabled
2,175,969 UART: [state] LifecycleState = Unprovisioned
2,177,613 UART: [state] DebugLocked = No
2,178,720 UART: [state] WD Timer not started. Device not locked for debugging
2,181,191 UART: [kat] SHA2-256
2,181,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,184,871 UART: [kat] ++
2,185,321 UART: [kat] sha1
2,185,919 UART: [kat] SHA2-256
2,186,584 UART: [kat] SHA2-384
2,187,240 UART: [kat] SHA2-512-ACC
2,188,102 UART: [kat] ECC-384
2,951,014 UART: [kat] HMAC-384Kdf
2,973,247 UART: [kat] LMS
3,502,683 UART: [kat] --
3,507,156 UART: [cold-reset] ++
3,508,169 UART: [fht] FHT @ 0x50003400
3,519,039 UART: [idev] ++
3,519,605 UART: [idev] CDI.KEYID = 6
3,520,624 UART: [idev] SUBJECT.KEYID = 7
3,521,729 UART: [idev] UDS.KEYID = 0
3,543,806 UART: [idev] Erasing UDS.KEYID = 0
6,026,340 UART: [idev] Sha1 KeyId Algorithm
6,050,176 UART: [idev] --
6,054,070 UART: [ldev] ++
6,054,648 UART: [ldev] CDI.KEYID = 6
6,055,554 UART: [ldev] SUBJECT.KEYID = 5
6,056,739 UART: [ldev] AUTHORITY.KEYID = 7
6,057,986 UART: [ldev] FE.KEYID = 1
6,101,208 UART: [ldev] Erasing FE.KEYID = 1
8,605,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,866 UART: [ldev] --
10,417,399 UART: [fwproc] Wait for Commands...
10,419,986 UART: [fwproc] Recv command 0x46574c44
10,422,086 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,680 UART: ROM Fatal Error: 0x000B002B
13,818,820 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,022,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,604,723 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,021,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,183 UART:
2,166,589 UART: Running Caliptra ROM ...
2,167,757 UART:
2,167,935 UART: [state] CFI Enabled
2,168,940 UART: [state] LifecycleState = Unprovisioned
2,170,585 UART: [state] DebugLocked = No
2,171,686 UART: [state] WD Timer not started. Device not locked for debugging
2,174,161 UART: [kat] SHA2-256
2,174,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,838 UART: [kat] ++
2,178,286 UART: [kat] sha1
2,178,800 UART: [kat] SHA2-256
2,179,539 UART: [kat] SHA2-384
2,180,201 UART: [kat] SHA2-512-ACC
2,181,000 UART: [kat] ECC-384
3,283,279 UART: [kat] HMAC-384Kdf
3,295,035 UART: [kat] LMS
3,824,530 UART: [kat] --
3,828,577 UART: [cold-reset] ++
3,830,944 UART: [fht] FHT @ 0x50003400
3,840,865 UART: [idev] ++
3,841,431 UART: [idev] CDI.KEYID = 6
3,842,446 UART: [idev] SUBJECT.KEYID = 7
3,843,544 UART: [idev] UDS.KEYID = 0
3,860,450 UART: [idev] Erasing UDS.KEYID = 0
6,317,207 UART: [idev] Sha1 KeyId Algorithm
6,340,547 UART: [idev] --
6,345,293 UART: [ldev] ++
6,345,862 UART: [ldev] CDI.KEYID = 6
6,346,771 UART: [ldev] SUBJECT.KEYID = 5
6,347,990 UART: [ldev] AUTHORITY.KEYID = 7
6,349,218 UART: [ldev] FE.KEYID = 1
6,360,035 UART: [ldev] Erasing FE.KEYID = 1
8,837,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,426 UART: [ldev] --
10,629,581 UART: [fwproc] Wait for Commands...
10,631,840 UART: [fwproc] Recv command 0x46574c44
10,633,934 UART: [fwproc] Recv'd Img size: 114168 bytes
14,036,122 UART: ROM Fatal Error: 0x000B002B
14,039,201 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,020,795 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,814,740 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
920,934 UART: [kat] LMS
1,169,246 UART: [kat] --
1,170,033 UART: [cold-reset] ++
1,170,393 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,446 UART: [ldev] ++
1,209,614 UART: [ldev] CDI.KEYID = 6
1,209,978 UART: [ldev] SUBJECT.KEYID = 5
1,210,405 UART: [ldev] AUTHORITY.KEYID = 7
1,210,868 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,242,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,244 UART: [ldev] --
1,281,598 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,817 UART: ROM Fatal Error: 0x000B002B
2,579,976 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,847 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,519 UART: [kat] SHA2-512-ACC
906,420 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,711 UART: [kat] LMS
1,169,023 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,172,882 UART: [idev] ++
1,173,050 UART: [idev] CDI.KEYID = 6
1,173,411 UART: [idev] SUBJECT.KEYID = 7
1,173,836 UART: [idev] UDS.KEYID = 0
1,181,830 UART: [idev] Erasing UDS.KEYID = 0
1,198,842 UART: [idev] Sha1 KeyId Algorithm
1,207,740 UART: [idev] --
1,208,851 UART: [ldev] ++
1,209,019 UART: [ldev] CDI.KEYID = 6
1,209,383 UART: [ldev] SUBJECT.KEYID = 5
1,209,810 UART: [ldev] AUTHORITY.KEYID = 7
1,210,273 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,241,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,985 UART: [ldev] --
1,281,357 UART: [fwproc] Wait for Commands...
1,281,964 UART: [fwproc] Recv command 0x46574c44
1,282,697 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,938 UART: ROM Fatal Error: 0x000B002B
2,579,097 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,944 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
891,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,757 UART: [kat] ++
895,909 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
905,044 UART: [kat] SHA2-512-ACC
906,945 UART: [kat] ECC-384
916,754 UART: [kat] HMAC-384Kdf
921,194 UART: [kat] LMS
1,169,506 UART: [kat] --
1,170,567 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,483 UART: [idev] ++
1,173,651 UART: [idev] CDI.KEYID = 6
1,174,012 UART: [idev] SUBJECT.KEYID = 7
1,174,437 UART: [idev] UDS.KEYID = 0
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,081 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,208,880 UART: [ldev] ++
1,209,048 UART: [ldev] CDI.KEYID = 6
1,209,412 UART: [ldev] SUBJECT.KEYID = 5
1,209,839 UART: [ldev] AUTHORITY.KEYID = 7
1,210,302 UART: [ldev] FE.KEYID = 1
1,215,384 UART: [ldev] Erasing FE.KEYID = 1
1,241,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,946 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,282,111 UART: [fwproc] Recv command 0x46574c44
1,282,844 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,659 UART: ROM Fatal Error: 0x000B002B
2,578,818 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,147 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
891,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,816 UART: [kat] ++
895,968 UART: [kat] sha1
900,222 UART: [kat] SHA2-256
902,162 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,073 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,104 UART: [fht] FHT @ 0x50003400
1,172,624 UART: [idev] ++
1,172,792 UART: [idev] CDI.KEYID = 6
1,173,153 UART: [idev] SUBJECT.KEYID = 7
1,173,578 UART: [idev] UDS.KEYID = 0
1,181,602 UART: [idev] Erasing UDS.KEYID = 0
1,198,820 UART: [idev] Sha1 KeyId Algorithm
1,207,542 UART: [idev] --
1,208,705 UART: [ldev] ++
1,208,873 UART: [ldev] CDI.KEYID = 6
1,209,237 UART: [ldev] SUBJECT.KEYID = 5
1,209,664 UART: [ldev] AUTHORITY.KEYID = 7
1,210,127 UART: [ldev] FE.KEYID = 1
1,215,267 UART: [ldev] Erasing FE.KEYID = 1
1,241,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,695 UART: [ldev] --
1,281,055 UART: [fwproc] Wait for Commands...
1,281,836 UART: [fwproc] Recv command 0x46574c44
1,282,569 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,052 UART: ROM Fatal Error: 0x000B002B
2,579,211 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,248 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,026 UART: [kat] HMAC-384Kdf
920,788 UART: [kat] LMS
1,169,100 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,182,229 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,210 UART: [ldev] ++
1,209,378 UART: [ldev] CDI.KEYID = 6
1,209,742 UART: [ldev] SUBJECT.KEYID = 5
1,210,169 UART: [ldev] AUTHORITY.KEYID = 7
1,210,632 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,241,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,518 UART: [ldev] --
1,280,804 UART: [fwproc] Wait for Commands...
1,281,443 UART: [fwproc] Recv command 0x46574c44
1,282,176 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,421 UART: ROM Fatal Error: 0x000B002B
2,577,580 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,211 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,244 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,047 UART: [kat] SHA2-512-ACC
905,948 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,287 UART: [kat] LMS
1,168,599 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,604 UART: [idev] ++
1,172,772 UART: [idev] CDI.KEYID = 6
1,173,133 UART: [idev] SUBJECT.KEYID = 7
1,173,558 UART: [idev] UDS.KEYID = 0
1,181,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,114 UART: [idev] Sha1 KeyId Algorithm
1,207,902 UART: [idev] --
1,209,149 UART: [ldev] ++
1,209,317 UART: [ldev] CDI.KEYID = 6
1,209,681 UART: [ldev] SUBJECT.KEYID = 5
1,210,108 UART: [ldev] AUTHORITY.KEYID = 7
1,210,571 UART: [ldev] FE.KEYID = 1
1,216,057 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,282,009 UART: [fwproc] Wait for Commands...
1,282,688 UART: [fwproc] Recv command 0x46574c44
1,283,421 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,510 UART: ROM Fatal Error: 0x000B002B
2,579,669 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,144 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
2,018,730 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,162,506 UART:
2,162,898 UART: Running Caliptra ROM ...
2,163,997 UART:
2,164,152 UART: [state] CFI Enabled
2,165,115 UART: [state] LifecycleState = Unprovisioned
2,166,682 UART: [state] DebugLocked = No
2,167,703 UART: [state] WD Timer not started. Device not locked for debugging
2,170,174 UART: [kat] SHA2-256
2,170,837 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,173,853 UART: [kat] ++
2,174,303 UART: [kat] sha1
2,174,815 UART: [kat] SHA2-256
2,175,556 UART: [kat] SHA2-384
2,176,224 UART: [kat] SHA2-512-ACC
2,177,106 UART: [kat] ECC-384
3,774,600 UART: [kat] HMAC-384Kdf
3,802,128 UART: [kat] LMS
4,875,251 UART: [kat] --
4,881,310 UART: [cold-reset] ++
4,882,472 UART: [fht] FHT @ 0x50003400
4,893,977 UART: [idev] ++
4,894,649 UART: [idev] CDI.KEYID = 6
4,895,805 UART: [idev] SUBJECT.KEYID = 7
4,897,022 UART: [idev] UDS.KEYID = 0
4,929,003 UART: [idev] Erasing UDS.KEYID = 0
8,242,858 UART: [idev] Sha1 KeyId Algorithm
8,265,837 UART: [idev] --
8,270,696 UART: [ldev] ++
8,271,262 UART: [ldev] CDI.KEYID = 6
8,272,506 UART: [ldev] SUBJECT.KEYID = 5
8,273,670 UART: [ldev] AUTHORITY.KEYID = 7
8,274,822 UART: [ldev] FE.KEYID = 1
8,315,849 UART: [ldev] Erasing FE.KEYID = 1
11,647,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,988,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,009,887 UART: [ldev] --
14,014,138 UART: [fwproc] Wait for Commands...
14,017,206 UART: [fwproc] Recv command 0x46574c44
14,019,523 UART: [fwproc] Recv'd Img size: 113844 bytes
18,087,278 UART: ROM Fatal Error: 0x000B002A
18,090,685 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,019,034 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,871,564 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
2,021,074 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,486 UART:
2,165,895 UART: Running Caliptra ROM ...
2,166,975 UART:
2,167,123 UART: [state] CFI Enabled
2,168,082 UART: [state] LifecycleState = Unprovisioned
2,169,738 UART: [state] DebugLocked = No
2,170,756 UART: [state] WD Timer not started. Device not locked for debugging
2,173,219 UART: [kat] SHA2-256
2,173,875 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,880 UART: [kat] ++
2,177,319 UART: [kat] sha1
2,177,825 UART: [kat] SHA2-256
2,178,495 UART: [kat] SHA2-384
2,179,147 UART: [kat] SHA2-512-ACC
2,179,979 UART: [kat] ECC-384
4,094,388 UART: [kat] HMAC-384Kdf
4,106,906 UART: [kat] LMS
5,180,064 UART: [kat] --
5,183,328 UART: [cold-reset] ++
5,185,648 UART: [fht] FHT @ 0x50003400
5,197,169 UART: [idev] ++
5,197,893 UART: [idev] CDI.KEYID = 6
5,198,999 UART: [idev] SUBJECT.KEYID = 7
5,200,484 UART: [idev] UDS.KEYID = 0
5,217,189 UART: [idev] Erasing UDS.KEYID = 0
8,489,168 UART: [idev] Sha1 KeyId Algorithm
8,511,054 UART: [idev] --
8,516,244 UART: [ldev] ++
8,516,828 UART: [ldev] CDI.KEYID = 6
8,517,932 UART: [ldev] SUBJECT.KEYID = 5
8,519,469 UART: [ldev] AUTHORITY.KEYID = 7
8,520,950 UART: [ldev] FE.KEYID = 1
8,533,328 UART: [ldev] Erasing FE.KEYID = 1
11,822,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,438 UART: [ldev] --
14,187,536 UART: [fwproc] Wait for Commands...
14,190,610 UART: [fwproc] Recv command 0x46574c44
14,192,872 UART: [fwproc] Recv'd Img size: 113844 bytes
18,257,246 UART: ROM Fatal Error: 0x000B002A
18,260,656 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
2,029,039 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,069,580 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,031,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,176,200 UART:
2,176,627 UART: Running Caliptra ROM ...
2,177,798 UART:
2,177,965 UART: [state] CFI Enabled
2,178,945 UART: [state] LifecycleState = Unprovisioned
2,180,595 UART: [state] DebugLocked = No
2,181,706 UART: [state] WD Timer not started. Device not locked for debugging
2,184,179 UART: [kat] SHA2-256
2,184,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,187,863 UART: [kat] ++
2,188,314 UART: [kat] sha1
2,188,875 UART: [kat] SHA2-256
2,189,535 UART: [kat] SHA2-384
2,190,190 UART: [kat] SHA2-512-ACC
2,191,023 UART: [kat] ECC-384
2,948,216 UART: [kat] HMAC-384Kdf
2,971,806 UART: [kat] LMS
3,501,223 UART: [kat] --
3,506,186 UART: [cold-reset] ++
3,508,661 UART: [fht] FHT @ 0x50003400
3,519,319 UART: [idev] ++
3,519,889 UART: [idev] CDI.KEYID = 6
3,520,772 UART: [idev] SUBJECT.KEYID = 7
3,521,987 UART: [idev] UDS.KEYID = 0
3,543,152 UART: [idev] Erasing UDS.KEYID = 0
6,025,569 UART: [idev] Sha1 KeyId Algorithm
6,048,822 UART: [idev] --
6,053,694 UART: [ldev] ++
6,054,445 UART: [ldev] CDI.KEYID = 6
6,055,369 UART: [ldev] SUBJECT.KEYID = 5
6,056,483 UART: [ldev] AUTHORITY.KEYID = 7
6,057,661 UART: [ldev] FE.KEYID = 1
6,100,089 UART: [ldev] Erasing FE.KEYID = 1
8,605,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,916 UART: [ldev] --
10,412,944 UART: [fwproc] Wait for Commands...
10,415,479 UART: [fwproc] Recv command 0x46574c44
10,417,577 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,345 UART: ROM Fatal Error: 0x000B002A
13,818,422 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
2,024,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,610,148 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,020,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,156 UART:
2,165,556 UART: Running Caliptra ROM ...
2,166,633 UART:
2,166,787 UART: [state] CFI Enabled
2,167,770 UART: [state] LifecycleState = Unprovisioned
2,169,425 UART: [state] DebugLocked = No
2,170,535 UART: [state] WD Timer not started. Device not locked for debugging
2,173,003 UART: [kat] SHA2-256
2,173,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,680 UART: [kat] ++
2,177,128 UART: [kat] sha1
2,177,639 UART: [kat] SHA2-256
2,178,379 UART: [kat] SHA2-384
2,179,065 UART: [kat] SHA2-512-ACC
2,179,950 UART: [kat] ECC-384
3,284,096 UART: [kat] HMAC-384Kdf
3,295,885 UART: [kat] LMS
3,825,367 UART: [kat] --
3,828,119 UART: [cold-reset] ++
3,829,239 UART: [fht] FHT @ 0x50003400
3,840,699 UART: [idev] ++
3,841,257 UART: [idev] CDI.KEYID = 6
3,842,230 UART: [idev] SUBJECT.KEYID = 7
3,843,326 UART: [idev] UDS.KEYID = 0
3,857,729 UART: [idev] Erasing UDS.KEYID = 0
6,318,242 UART: [idev] Sha1 KeyId Algorithm
6,341,529 UART: [idev] --
6,346,433 UART: [ldev] ++
6,347,037 UART: [ldev] CDI.KEYID = 6
6,347,976 UART: [ldev] SUBJECT.KEYID = 5
6,349,141 UART: [ldev] AUTHORITY.KEYID = 7
6,350,373 UART: [ldev] FE.KEYID = 1
6,360,586 UART: [ldev] Erasing FE.KEYID = 1
8,838,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,137 UART: [ldev] --
10,628,591 UART: [fwproc] Wait for Commands...
10,630,309 UART: [fwproc] Recv command 0x46574c44
10,632,408 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,090 UART: ROM Fatal Error: 0x000B002A
14,036,225 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
2,021,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,805,425 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
2,021,891 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,082 UART:
2,166,484 UART: Running Caliptra ROM ...
2,167,671 UART:
2,167,864 UART: [state] CFI Enabled
2,168,848 UART: [state] LifecycleState = Unprovisioned
2,170,721 UART: [state] DebugLocked = No
2,171,840 UART: [state] WD Timer not started. Device not locked for debugging
2,174,320 UART: [kat] SHA2-256
2,174,988 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,999 UART: [kat] ++
2,178,449 UART: [kat] sha1
2,178,963 UART: [kat] SHA2-256
2,179,705 UART: [kat] SHA2-384
2,180,372 UART: [kat] SHA2-512-ACC
2,181,256 UART: [kat] ECC-384
2,949,165 UART: [kat] HMAC-384Kdf
2,973,017 UART: [kat] LMS
3,502,498 UART: [kat] --
3,507,953 UART: [cold-reset] ++
3,510,501 UART: [fht] FHT @ 0x50003400
3,521,380 UART: [idev] ++
3,521,955 UART: [idev] CDI.KEYID = 6
3,522,867 UART: [idev] SUBJECT.KEYID = 7
3,524,030 UART: [idev] UDS.KEYID = 0
3,544,397 UART: [idev] Erasing UDS.KEYID = 0
6,025,512 UART: [idev] Sha1 KeyId Algorithm
6,049,560 UART: [idev] --
6,053,776 UART: [ldev] ++
6,054,357 UART: [ldev] CDI.KEYID = 6
6,055,275 UART: [ldev] SUBJECT.KEYID = 5
6,056,443 UART: [ldev] AUTHORITY.KEYID = 7
6,057,732 UART: [ldev] FE.KEYID = 1
6,100,149 UART: [ldev] Erasing FE.KEYID = 1
8,602,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,831 UART: [ldev] --
10,412,090 UART: [fwproc] Wait for Commands...
10,414,410 UART: [fwproc] Recv command 0x46574c44
10,416,464 UART: [fwproc] Recv'd Img size: 114168 bytes
13,814,552 UART: ROM Fatal Error: 0x000B002A
13,817,691 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
2,025,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,607,373 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
2,021,481 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,635 UART:
2,166,028 UART: Running Caliptra ROM ...
2,167,205 UART:
2,167,382 UART: [state] CFI Enabled
2,168,355 UART: [state] LifecycleState = Unprovisioned
2,169,995 UART: [state] DebugLocked = No
2,171,094 UART: [state] WD Timer not started. Device not locked for debugging
2,173,564 UART: [kat] SHA2-256
2,174,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,239 UART: [kat] ++
2,177,688 UART: [kat] sha1
2,178,201 UART: [kat] SHA2-256
2,178,879 UART: [kat] SHA2-384
2,179,543 UART: [kat] SHA2-512-ACC
2,180,344 UART: [kat] ECC-384
3,281,117 UART: [kat] HMAC-384Kdf
3,293,100 UART: [kat] LMS
3,822,558 UART: [kat] --
3,825,792 UART: [cold-reset] ++
3,828,053 UART: [fht] FHT @ 0x50003400
3,839,054 UART: [idev] ++
3,839,669 UART: [idev] CDI.KEYID = 6
3,840,558 UART: [idev] SUBJECT.KEYID = 7
3,841,777 UART: [idev] UDS.KEYID = 0
3,856,254 UART: [idev] Erasing UDS.KEYID = 0
6,313,947 UART: [idev] Sha1 KeyId Algorithm
6,337,557 UART: [idev] --
6,340,949 UART: [ldev] ++
6,341,529 UART: [ldev] CDI.KEYID = 6
6,342,448 UART: [ldev] SUBJECT.KEYID = 5
6,343,606 UART: [ldev] AUTHORITY.KEYID = 7
6,344,891 UART: [ldev] FE.KEYID = 1
6,356,612 UART: [ldev] Erasing FE.KEYID = 1
8,830,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,111 UART: [ldev] --
10,619,915 UART: [fwproc] Wait for Commands...
10,622,928 UART: [fwproc] Recv command 0x46574c44
10,625,025 UART: [fwproc] Recv'd Img size: 114168 bytes
14,023,809 UART: ROM Fatal Error: 0x000B002A
14,026,905 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
2,022,205 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,811,893 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,045 UART: [kat] ++
895,197 UART: [kat] sha1
899,311 UART: [kat] SHA2-256
901,251 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,322 UART: [kat] HMAC-384Kdf
920,132 UART: [kat] LMS
1,168,444 UART: [kat] --
1,169,281 UART: [cold-reset] ++
1,169,715 UART: [fht] FHT @ 0x50003400
1,172,241 UART: [idev] ++
1,172,409 UART: [idev] CDI.KEYID = 6
1,172,770 UART: [idev] SUBJECT.KEYID = 7
1,173,195 UART: [idev] UDS.KEYID = 0
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,677 UART: [idev] Sha1 KeyId Algorithm
1,207,395 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,152 UART: [ldev] Erasing FE.KEYID = 1
1,241,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,934 UART: [ldev] --
1,280,208 UART: [fwproc] Wait for Commands...
1,280,849 UART: [fwproc] Recv command 0x46574c44
1,281,582 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,071 UART: ROM Fatal Error: 0x000B002A
2,578,230 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,775 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,448 UART: [state] WD Timer not started. Device not locked for debugging
87,579 UART: [kat] SHA2-256
891,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,417 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,070 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,209,925 UART: [ldev] ++
1,210,093 UART: [ldev] CDI.KEYID = 6
1,210,457 UART: [ldev] SUBJECT.KEYID = 5
1,210,884 UART: [ldev] AUTHORITY.KEYID = 7
1,211,347 UART: [ldev] FE.KEYID = 1
1,216,763 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,339 UART: [ldev] --
1,282,781 UART: [fwproc] Wait for Commands...
1,283,562 UART: [fwproc] Recv command 0x46574c44
1,284,295 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,878 UART: ROM Fatal Error: 0x000B002A
2,581,037 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,812 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,418 UART: [kat] HMAC-384Kdf
921,010 UART: [kat] LMS
1,169,322 UART: [kat] --
1,170,105 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,182,215 UART: [idev] Erasing UDS.KEYID = 0
1,199,011 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,208,912 UART: [ldev] ++
1,209,080 UART: [ldev] CDI.KEYID = 6
1,209,444 UART: [ldev] SUBJECT.KEYID = 5
1,209,871 UART: [ldev] AUTHORITY.KEYID = 7
1,210,334 UART: [ldev] FE.KEYID = 1
1,215,422 UART: [ldev] Erasing FE.KEYID = 1
1,241,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,958 UART: [ldev] --
1,280,426 UART: [fwproc] Wait for Commands...
1,281,093 UART: [fwproc] Recv command 0x46574c44
1,281,826 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,837 UART: ROM Fatal Error: 0x000B002A
2,577,996 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,999 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,879 UART: [kat] SHA2-512-ACC
906,780 UART: [kat] ECC-384
916,727 UART: [kat] HMAC-384Kdf
921,247 UART: [kat] LMS
1,169,559 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,171,004 UART: [fht] FHT @ 0x50003400
1,173,846 UART: [idev] ++
1,174,014 UART: [idev] CDI.KEYID = 6
1,174,375 UART: [idev] SUBJECT.KEYID = 7
1,174,800 UART: [idev] UDS.KEYID = 0
1,182,810 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,242,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,335 UART: [ldev] --
1,281,701 UART: [fwproc] Wait for Commands...
1,282,426 UART: [fwproc] Recv command 0x46574c44
1,283,159 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,906 UART: ROM Fatal Error: 0x000B002A
2,579,065 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,419 UART: [kat] SHA2-256
901,359 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
915,594 UART: [kat] HMAC-384Kdf
920,152 UART: [kat] LMS
1,168,464 UART: [kat] --
1,169,269 UART: [cold-reset] ++
1,169,641 UART: [fht] FHT @ 0x50003400
1,172,351 UART: [idev] ++
1,172,519 UART: [idev] CDI.KEYID = 6
1,172,880 UART: [idev] SUBJECT.KEYID = 7
1,173,305 UART: [idev] UDS.KEYID = 0
1,181,271 UART: [idev] Erasing UDS.KEYID = 0
1,198,393 UART: [idev] Sha1 KeyId Algorithm
1,207,239 UART: [idev] --
1,208,362 UART: [ldev] ++
1,208,530 UART: [ldev] CDI.KEYID = 6
1,208,894 UART: [ldev] SUBJECT.KEYID = 5
1,209,321 UART: [ldev] AUTHORITY.KEYID = 7
1,209,784 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,240,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,848 UART: [ldev] --
1,280,298 UART: [fwproc] Wait for Commands...
1,281,073 UART: [fwproc] Recv command 0x46574c44
1,281,806 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,397 UART: ROM Fatal Error: 0x000B002A
2,578,556 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,428,275 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,105 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,786 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,172,836 UART: [idev] ++
1,173,004 UART: [idev] CDI.KEYID = 6
1,173,365 UART: [idev] SUBJECT.KEYID = 7
1,173,790 UART: [idev] UDS.KEYID = 0
1,181,710 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,281,873 UART: [fwproc] Wait for Commands...
1,282,540 UART: [fwproc] Recv command 0x46574c44
1,283,273 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,132 UART: ROM Fatal Error: 0x000B002A
2,579,291 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,984 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
2,020,804 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,661 UART:
2,165,057 UART: Running Caliptra ROM ...
2,166,150 UART:
2,166,305 UART: [state] CFI Enabled
2,167,279 UART: [state] LifecycleState = Unprovisioned
2,168,940 UART: [state] DebugLocked = No
2,169,965 UART: [state] WD Timer not started. Device not locked for debugging
2,172,437 UART: [kat] SHA2-256
2,173,101 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,111 UART: [kat] ++
2,176,557 UART: [kat] sha1
2,177,076 UART: [kat] SHA2-256
2,177,736 UART: [kat] SHA2-384
2,178,393 UART: [kat] SHA2-512-ACC
2,179,395 UART: [kat] ECC-384
3,776,132 UART: [kat] HMAC-384Kdf
3,800,141 UART: [kat] LMS
4,873,306 UART: [kat] --
4,877,410 UART: [cold-reset] ++
4,878,803 UART: [fht] FHT @ 0x50003400
4,890,436 UART: [idev] ++
4,891,111 UART: [idev] CDI.KEYID = 6
4,892,354 UART: [idev] SUBJECT.KEYID = 7
4,893,380 UART: [idev] UDS.KEYID = 0
4,927,661 UART: [idev] Erasing UDS.KEYID = 0
8,238,863 UART: [idev] Sha1 KeyId Algorithm
8,259,960 UART: [idev] --
8,264,873 UART: [ldev] ++
8,265,494 UART: [ldev] CDI.KEYID = 6
8,266,605 UART: [ldev] SUBJECT.KEYID = 5
8,267,822 UART: [ldev] AUTHORITY.KEYID = 7
8,269,026 UART: [ldev] FE.KEYID = 1
8,315,585 UART: [ldev] Erasing FE.KEYID = 1
11,650,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,352 UART: [ldev] --
14,035,833 UART: [fwproc] Wait for Commands...
14,038,963 UART: [fwproc] Recv command 0x46574c44
14,041,233 UART: [fwproc] Recv'd Img size: 113844 bytes
18,105,299 UART: ROM Fatal Error: 0x000B002A
18,108,712 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,025,966 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,878,774 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
2,020,152 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,011 UART:
2,164,415 UART: Running Caliptra ROM ...
2,165,583 UART:
2,165,753 UART: [state] CFI Enabled
2,166,714 UART: [state] LifecycleState = Unprovisioned
2,168,368 UART: [state] DebugLocked = No
2,169,470 UART: [state] WD Timer not started. Device not locked for debugging
2,171,941 UART: [kat] SHA2-256
2,172,601 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,609 UART: [kat] ++
2,176,055 UART: [kat] sha1
2,176,565 UART: [kat] SHA2-256
2,177,298 UART: [kat] SHA2-384
2,177,961 UART: [kat] SHA2-512-ACC
2,178,850 UART: [kat] ECC-384
4,094,904 UART: [kat] HMAC-384Kdf
4,106,556 UART: [kat] LMS
5,179,725 UART: [kat] --
5,183,753 UART: [cold-reset] ++
5,186,504 UART: [fht] FHT @ 0x50003400
5,197,649 UART: [idev] ++
5,198,318 UART: [idev] CDI.KEYID = 6
5,199,476 UART: [idev] SUBJECT.KEYID = 7
5,200,959 UART: [idev] UDS.KEYID = 0
5,217,824 UART: [idev] Erasing UDS.KEYID = 0
8,491,521 UART: [idev] Sha1 KeyId Algorithm
8,512,526 UART: [idev] --
8,516,197 UART: [ldev] ++
8,516,759 UART: [ldev] CDI.KEYID = 6
8,517,998 UART: [ldev] SUBJECT.KEYID = 5
8,519,453 UART: [ldev] AUTHORITY.KEYID = 7
8,520,942 UART: [ldev] FE.KEYID = 1
8,532,727 UART: [ldev] Erasing FE.KEYID = 1
11,825,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,684 UART: [ldev] --
14,192,457 UART: [fwproc] Wait for Commands...
14,195,631 UART: [fwproc] Recv command 0x46574c44
14,197,947 UART: [fwproc] Recv'd Img size: 113844 bytes
18,267,699 UART: ROM Fatal Error: 0x000B002A
18,271,123 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
2,020,801 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,079,478 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,024,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,168,944 UART:
2,169,342 UART: Running Caliptra ROM ...
2,170,523 UART:
2,170,693 UART: [state] CFI Enabled
2,171,682 UART: [state] LifecycleState = Unprovisioned
2,173,352 UART: [state] DebugLocked = No
2,174,466 UART: [state] WD Timer not started. Device not locked for debugging
2,176,942 UART: [kat] SHA2-256
2,177,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,628 UART: [kat] ++
2,181,079 UART: [kat] sha1
2,181,594 UART: [kat] SHA2-256
2,182,338 UART: [kat] SHA2-384
2,183,006 UART: [kat] SHA2-512-ACC
2,183,898 UART: [kat] ECC-384
2,946,695 UART: [kat] HMAC-384Kdf
2,969,681 UART: [kat] LMS
3,499,166 UART: [kat] --
3,503,515 UART: [cold-reset] ++
3,505,784 UART: [fht] FHT @ 0x50003400
3,515,800 UART: [idev] ++
3,516,386 UART: [idev] CDI.KEYID = 6
3,517,351 UART: [idev] SUBJECT.KEYID = 7
3,518,453 UART: [idev] UDS.KEYID = 0
3,541,675 UART: [idev] Erasing UDS.KEYID = 0
6,023,256 UART: [idev] Sha1 KeyId Algorithm
6,046,448 UART: [idev] --
6,049,534 UART: [ldev] ++
6,050,111 UART: [ldev] CDI.KEYID = 6
6,051,035 UART: [ldev] SUBJECT.KEYID = 5
6,052,205 UART: [ldev] AUTHORITY.KEYID = 7
6,053,502 UART: [ldev] FE.KEYID = 1
6,096,463 UART: [ldev] Erasing FE.KEYID = 1
8,600,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,436 UART: [ldev] --
10,410,437 UART: [fwproc] Wait for Commands...
10,412,158 UART: [fwproc] Recv command 0x46574c44
10,414,259 UART: [fwproc] Recv'd Img size: 114168 bytes
13,809,345 UART: ROM Fatal Error: 0x000B002A
13,812,428 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,024,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,629,516 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,024,323 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,170,700 UART:
2,171,119 UART: Running Caliptra ROM ...
2,172,208 UART:
2,172,362 UART: [state] CFI Enabled
2,173,286 UART: [state] LifecycleState = Unprovisioned
2,174,946 UART: [state] DebugLocked = No
2,175,966 UART: [state] WD Timer not started. Device not locked for debugging
2,178,429 UART: [kat] SHA2-256
2,179,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,101 UART: [kat] ++
2,182,545 UART: [kat] sha1
2,183,053 UART: [kat] SHA2-256
2,183,736 UART: [kat] SHA2-384
2,184,396 UART: [kat] SHA2-512-ACC
2,185,283 UART: [kat] ECC-384
3,279,649 UART: [kat] HMAC-384Kdf
3,291,184 UART: [kat] LMS
3,820,698 UART: [kat] --
3,826,093 UART: [cold-reset] ++
3,828,504 UART: [fht] FHT @ 0x50003400
3,839,423 UART: [idev] ++
3,840,025 UART: [idev] CDI.KEYID = 6
3,840,941 UART: [idev] SUBJECT.KEYID = 7
3,842,155 UART: [idev] UDS.KEYID = 0
3,857,534 UART: [idev] Erasing UDS.KEYID = 0
6,311,913 UART: [idev] Sha1 KeyId Algorithm
6,335,618 UART: [idev] --
6,339,102 UART: [ldev] ++
6,339,692 UART: [ldev] CDI.KEYID = 6
6,340,645 UART: [ldev] SUBJECT.KEYID = 5
6,341,739 UART: [ldev] AUTHORITY.KEYID = 7
6,343,023 UART: [ldev] FE.KEYID = 1
6,353,075 UART: [ldev] Erasing FE.KEYID = 1
8,831,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,784 UART: [ldev] --
10,620,449 UART: [fwproc] Wait for Commands...
10,622,051 UART: [fwproc] Recv command 0x46574c44
10,624,094 UART: [fwproc] Recv'd Img size: 114168 bytes
14,024,173 UART: ROM Fatal Error: 0x000B002A
14,027,268 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,020,516 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,813,163 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,034,977 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,179,312 UART:
2,179,725 UART: Running Caliptra ROM ...
2,180,810 UART:
2,180,961 UART: [state] CFI Enabled
2,181,947 UART: [state] LifecycleState = Unprovisioned
2,183,603 UART: [state] DebugLocked = No
2,184,630 UART: [state] WD Timer not started. Device not locked for debugging
2,187,098 UART: [kat] SHA2-256
2,187,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,190,778 UART: [kat] ++
2,191,227 UART: [kat] sha1
2,191,735 UART: [kat] SHA2-256
2,192,390 UART: [kat] SHA2-384
2,193,044 UART: [kat] SHA2-512-ACC
2,193,904 UART: [kat] ECC-384
2,949,881 UART: [kat] HMAC-384Kdf
2,973,330 UART: [kat] LMS
3,502,736 UART: [kat] --
3,506,897 UART: [cold-reset] ++
3,507,808 UART: [fht] FHT @ 0x50003400
3,518,952 UART: [idev] ++
3,519,529 UART: [idev] CDI.KEYID = 6
3,520,440 UART: [idev] SUBJECT.KEYID = 7
3,521,655 UART: [idev] UDS.KEYID = 0
3,544,771 UART: [idev] Erasing UDS.KEYID = 0
6,028,160 UART: [idev] Sha1 KeyId Algorithm
6,050,810 UART: [idev] --
6,054,601 UART: [ldev] ++
6,055,180 UART: [ldev] CDI.KEYID = 6
6,056,068 UART: [ldev] SUBJECT.KEYID = 5
6,057,223 UART: [ldev] AUTHORITY.KEYID = 7
6,058,518 UART: [ldev] FE.KEYID = 1
6,101,451 UART: [ldev] Erasing FE.KEYID = 1
8,602,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,600 UART: [ldev] --
10,391,737 UART: [fwproc] Wait for Commands...
10,394,865 UART: [fwproc] Recv command 0x46574c44
10,396,910 UART: [fwproc] Recv'd Img size: 114168 bytes
13,795,690 UART: ROM Fatal Error: 0x000B002A
13,798,803 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,024,039 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,563,177 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,497 writing to cptra_bootfsm_go
2,035,598 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,179,687 UART:
2,180,102 UART: Running Caliptra ROM ...
2,181,184 UART:
2,181,334 UART: [state] CFI Enabled
2,182,309 UART: [state] LifecycleState = Unprovisioned
2,183,948 UART: [state] DebugLocked = No
2,184,975 UART: [state] WD Timer not started. Device not locked for debugging
2,187,430 UART: [kat] SHA2-256
2,188,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,100 UART: [kat] ++
2,191,549 UART: [kat] sha1
2,192,065 UART: [kat] SHA2-256
2,192,804 UART: [kat] SHA2-384
2,193,466 UART: [kat] SHA2-512-ACC
2,194,309 UART: [kat] ECC-384
3,275,655 UART: [kat] HMAC-384Kdf
3,287,774 UART: [kat] LMS
3,817,240 UART: [kat] --
3,824,693 UART: [cold-reset] ++
3,826,401 UART: [fht] FHT @ 0x50003400
3,835,862 UART: [idev] ++
3,836,432 UART: [idev] CDI.KEYID = 6
3,837,342 UART: [idev] SUBJECT.KEYID = 7
3,838,550 UART: [idev] UDS.KEYID = 0
3,850,636 UART: [idev] Erasing UDS.KEYID = 0
6,307,708 UART: [idev] Sha1 KeyId Algorithm
6,329,961 UART: [idev] --
6,333,408 UART: [ldev] ++
6,333,974 UART: [ldev] CDI.KEYID = 6
6,334,881 UART: [ldev] SUBJECT.KEYID = 5
6,336,038 UART: [ldev] AUTHORITY.KEYID = 7
6,337,324 UART: [ldev] FE.KEYID = 1
6,347,158 UART: [ldev] Erasing FE.KEYID = 1
8,816,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,534,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,550,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,566,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,582,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,603,169 UART: [ldev] --
10,606,979 UART: [fwproc] Wait for Commands...
10,609,074 UART: [fwproc] Recv command 0x46574c44
10,611,176 UART: [fwproc] Recv'd Img size: 114168 bytes
14,011,434 UART: ROM Fatal Error: 0x000B002A
14,014,534 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,683 writing to cptra_bootfsm_go
2,022,543 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,809,364 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,589 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,673 UART: [idev] ++
1,172,841 UART: [idev] CDI.KEYID = 6
1,173,202 UART: [idev] SUBJECT.KEYID = 7
1,173,627 UART: [idev] UDS.KEYID = 0
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,516 UART: [ldev] ++
1,208,684 UART: [ldev] CDI.KEYID = 6
1,209,048 UART: [ldev] SUBJECT.KEYID = 5
1,209,475 UART: [ldev] AUTHORITY.KEYID = 7
1,209,938 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,240,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,060 UART: [ldev] --
1,280,396 UART: [fwproc] Wait for Commands...
1,281,187 UART: [fwproc] Recv command 0x46574c44
1,281,920 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,129 UART: ROM Fatal Error: 0x000B002A
2,578,288 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,593 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Unprovisioned
86,528 UART: [state] DebugLocked = No
87,170 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [kat] SHA2-256
891,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,094 UART: [kat] ++
896,246 UART: [kat] sha1
900,494 UART: [kat] SHA2-256
902,434 UART: [kat] SHA2-384
905,349 UART: [kat] SHA2-512-ACC
907,250 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,517 UART: [kat] LMS
1,169,829 UART: [kat] --
1,170,778 UART: [cold-reset] ++
1,171,334 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,183,284 UART: [idev] Erasing UDS.KEYID = 0
1,200,194 UART: [idev] Sha1 KeyId Algorithm
1,209,054 UART: [idev] --
1,210,331 UART: [ldev] ++
1,210,499 UART: [ldev] CDI.KEYID = 6
1,210,863 UART: [ldev] SUBJECT.KEYID = 5
1,211,290 UART: [ldev] AUTHORITY.KEYID = 7
1,211,753 UART: [ldev] FE.KEYID = 1
1,217,207 UART: [ldev] Erasing FE.KEYID = 1
1,243,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,713 UART: [ldev] --
1,283,065 UART: [fwproc] Wait for Commands...
1,283,714 UART: [fwproc] Recv command 0x46574c44
1,284,447 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,462 UART: ROM Fatal Error: 0x000B002A
2,580,621 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,206 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,041 UART: [state] WD Timer not started. Device not locked for debugging
87,230 UART: [kat] SHA2-256
890,780 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,909 UART: [kat] ++
895,061 UART: [kat] sha1
899,331 UART: [kat] SHA2-256
901,271 UART: [kat] SHA2-384
904,134 UART: [kat] SHA2-512-ACC
906,035 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
920,022 UART: [kat] LMS
1,168,334 UART: [kat] --
1,169,169 UART: [cold-reset] ++
1,169,691 UART: [fht] FHT @ 0x50003400
1,172,285 UART: [idev] ++
1,172,453 UART: [idev] CDI.KEYID = 6
1,172,814 UART: [idev] SUBJECT.KEYID = 7
1,173,239 UART: [idev] UDS.KEYID = 0
1,181,349 UART: [idev] Erasing UDS.KEYID = 0
1,198,225 UART: [idev] Sha1 KeyId Algorithm
1,207,089 UART: [idev] --
1,207,992 UART: [ldev] ++
1,208,160 UART: [ldev] CDI.KEYID = 6
1,208,524 UART: [ldev] SUBJECT.KEYID = 5
1,208,951 UART: [ldev] AUTHORITY.KEYID = 7
1,209,414 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,940 UART: [ldev] --
1,280,304 UART: [fwproc] Wait for Commands...
1,280,969 UART: [fwproc] Recv command 0x46574c44
1,281,702 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,237 UART: ROM Fatal Error: 0x000B002A
2,578,396 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,573 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
891,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,212 UART: [kat] ++
895,364 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,625 UART: [kat] LMS
1,168,937 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,181,972 UART: [idev] Erasing UDS.KEYID = 0
1,198,494 UART: [idev] Sha1 KeyId Algorithm
1,207,314 UART: [idev] --
1,208,455 UART: [ldev] ++
1,208,623 UART: [ldev] CDI.KEYID = 6
1,208,987 UART: [ldev] SUBJECT.KEYID = 5
1,209,414 UART: [ldev] AUTHORITY.KEYID = 7
1,209,877 UART: [ldev] FE.KEYID = 1
1,215,233 UART: [ldev] Erasing FE.KEYID = 1
1,241,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,665 UART: [ldev] --
1,280,951 UART: [fwproc] Wait for Commands...
1,281,588 UART: [fwproc] Recv command 0x46574c44
1,282,321 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,130 UART: ROM Fatal Error: 0x000B002A
2,577,289 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,872 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,256 UART: [kat] LMS
1,168,568 UART: [kat] --
1,169,399 UART: [cold-reset] ++
1,169,747 UART: [fht] FHT @ 0x50003400
1,172,413 UART: [idev] ++
1,172,581 UART: [idev] CDI.KEYID = 6
1,172,942 UART: [idev] SUBJECT.KEYID = 7
1,173,367 UART: [idev] UDS.KEYID = 0
1,181,267 UART: [idev] Erasing UDS.KEYID = 0
1,198,183 UART: [idev] Sha1 KeyId Algorithm
1,207,149 UART: [idev] --
1,208,072 UART: [ldev] ++
1,208,240 UART: [ldev] CDI.KEYID = 6
1,208,604 UART: [ldev] SUBJECT.KEYID = 5
1,209,031 UART: [ldev] AUTHORITY.KEYID = 7
1,209,494 UART: [ldev] FE.KEYID = 1
1,214,286 UART: [ldev] Erasing FE.KEYID = 1
1,240,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,928 UART: [ldev] --
1,279,394 UART: [fwproc] Wait for Commands...
1,280,023 UART: [fwproc] Recv command 0x46574c44
1,280,756 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,539 UART: ROM Fatal Error: 0x000B002A
2,577,698 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,271 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,396 UART: [kat] SHA2-256
902,336 UART: [kat] SHA2-384
904,949 UART: [kat] SHA2-512-ACC
906,850 UART: [kat] ECC-384
916,761 UART: [kat] HMAC-384Kdf
921,435 UART: [kat] LMS
1,169,747 UART: [kat] --
1,170,880 UART: [cold-reset] ++
1,171,426 UART: [fht] FHT @ 0x50003400
1,174,054 UART: [idev] ++
1,174,222 UART: [idev] CDI.KEYID = 6
1,174,583 UART: [idev] SUBJECT.KEYID = 7
1,175,008 UART: [idev] UDS.KEYID = 0
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,862 UART: [idev] Sha1 KeyId Algorithm
1,209,934 UART: [idev] --
1,210,873 UART: [ldev] ++
1,211,041 UART: [ldev] CDI.KEYID = 6
1,211,405 UART: [ldev] SUBJECT.KEYID = 5
1,211,832 UART: [ldev] AUTHORITY.KEYID = 7
1,212,295 UART: [ldev] FE.KEYID = 1
1,217,559 UART: [ldev] Erasing FE.KEYID = 1
1,244,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,345 UART: [ldev] --
1,283,711 UART: [fwproc] Wait for Commands...
1,284,284 UART: [fwproc] Recv command 0x46574c44
1,285,017 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,536 UART: ROM Fatal Error: 0x000B002A
2,582,695 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,429,288 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,020,275 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,160 UART:
2,164,581 UART: Running Caliptra ROM ...
2,165,749 UART:
2,165,926 UART: [state] CFI Enabled
2,166,893 UART: [state] LifecycleState = Unprovisioned
2,168,545 UART: [state] DebugLocked = No
2,169,648 UART: [state] WD Timer not started. Device not locked for debugging
2,172,166 UART: [kat] SHA2-256
2,172,837 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,860 UART: [kat] ++
2,176,308 UART: [kat] sha1
2,176,868 UART: [kat] SHA2-256
2,177,527 UART: [kat] SHA2-384
2,178,271 UART: [kat] SHA2-512-ACC
2,179,100 UART: [kat] ECC-384
3,773,704 UART: [kat] HMAC-384Kdf
3,804,672 UART: [kat] LMS
4,877,810 UART: [kat] --
4,883,392 UART: [cold-reset] ++
4,885,285 UART: [fht] FHT @ 0x50003400
4,896,216 UART: [idev] ++
4,896,892 UART: [idev] CDI.KEYID = 6
4,898,126 UART: [idev] SUBJECT.KEYID = 7
4,899,224 UART: [idev] UDS.KEYID = 0
4,932,064 UART: [idev] Erasing UDS.KEYID = 0
8,242,019 UART: [idev] Sha1 KeyId Algorithm
8,263,685 UART: [idev] --
8,268,653 UART: [ldev] ++
8,269,277 UART: [ldev] CDI.KEYID = 6
8,270,463 UART: [ldev] SUBJECT.KEYID = 5
8,271,658 UART: [ldev] AUTHORITY.KEYID = 7
8,272,760 UART: [ldev] FE.KEYID = 1
8,319,374 UART: [ldev] Erasing FE.KEYID = 1
11,655,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,869 UART: [ldev] --
14,041,528 UART: [fwproc] Wait for Commands...
14,044,498 UART: [fwproc] Recv command 0x46574c44
14,046,824 UART: [fwproc] Recv'd Img size: 113844 bytes
18,112,895 UART: ROM Fatal Error: 0x000B0028
18,116,366 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,018,361 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,905,024 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,027,791 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,171,685 UART:
2,172,080 UART: Running Caliptra ROM ...
2,173,250 UART:
2,173,419 UART: [state] CFI Enabled
2,174,376 UART: [state] LifecycleState = Unprovisioned
2,176,021 UART: [state] DebugLocked = No
2,177,123 UART: [state] WD Timer not started. Device not locked for debugging
2,179,589 UART: [kat] SHA2-256
2,180,249 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,183,258 UART: [kat] ++
2,183,704 UART: [kat] sha1
2,184,211 UART: [kat] SHA2-256
2,185,680 UART: [kat] SHA2-384
2,186,360 UART: [kat] SHA2-512-ACC
2,187,247 UART: [kat] ECC-384
4,099,806 UART: [kat] HMAC-384Kdf
4,112,111 UART: [kat] LMS
5,185,258 UART: [kat] --
5,189,661 UART: [cold-reset] ++
5,191,869 UART: [fht] FHT @ 0x50003400
5,203,763 UART: [idev] ++
5,204,500 UART: [idev] CDI.KEYID = 6
5,205,681 UART: [idev] SUBJECT.KEYID = 7
5,207,069 UART: [idev] UDS.KEYID = 0
5,225,003 UART: [idev] Erasing UDS.KEYID = 0
8,498,939 UART: [idev] Sha1 KeyId Algorithm
8,521,035 UART: [idev] --
8,525,496 UART: [ldev] ++
8,526,128 UART: [ldev] CDI.KEYID = 6
8,527,309 UART: [ldev] SUBJECT.KEYID = 5
8,528,747 UART: [ldev] AUTHORITY.KEYID = 7
8,530,308 UART: [ldev] FE.KEYID = 1
8,541,570 UART: [ldev] Erasing FE.KEYID = 1
11,833,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,145,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,161,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,177,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,197,107 UART: [ldev] --
14,200,973 UART: [fwproc] Wait for Commands...
14,202,744 UART: [fwproc] Recv command 0x46574c44
14,205,006 UART: [fwproc] Recv'd Img size: 113844 bytes
18,280,145 UART: ROM Fatal Error: 0x000B0028
18,283,559 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,020,710 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,082,768 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
2,022,504 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,501 UART:
2,166,903 UART: Running Caliptra ROM ...
2,168,053 UART:
2,168,220 UART: [state] CFI Enabled
2,169,106 UART: [state] LifecycleState = Unprovisioned
2,170,759 UART: [state] DebugLocked = No
2,171,872 UART: [state] WD Timer not started. Device not locked for debugging
2,174,575 UART: [kat] SHA2-256
2,175,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,287 UART: [kat] ++
2,178,741 UART: [kat] sha1
2,179,518 UART: [kat] SHA2-256
2,180,195 UART: [kat] SHA2-384
2,181,084 UART: [kat] SHA2-512-ACC
2,182,112 UART: [kat] ECC-384
2,948,158 UART: [kat] HMAC-384Kdf
2,972,153 UART: [kat] LMS
3,501,563 UART: [kat] --
3,506,703 UART: [cold-reset] ++
3,508,960 UART: [fht] FHT @ 0x50003400
3,519,349 UART: [idev] ++
3,519,913 UART: [idev] CDI.KEYID = 6
3,520,886 UART: [idev] SUBJECT.KEYID = 7
3,522,043 UART: [idev] UDS.KEYID = 0
3,543,369 UART: [idev] Erasing UDS.KEYID = 0
6,024,591 UART: [idev] Sha1 KeyId Algorithm
6,047,610 UART: [idev] --
6,051,878 UART: [ldev] ++
6,052,452 UART: [ldev] CDI.KEYID = 6
6,053,363 UART: [ldev] SUBJECT.KEYID = 5
6,054,529 UART: [ldev] AUTHORITY.KEYID = 7
6,055,767 UART: [ldev] FE.KEYID = 1
6,099,783 UART: [ldev] Erasing FE.KEYID = 1
8,605,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,524 UART: [ldev] --
10,412,873 UART: [fwproc] Wait for Commands...
10,415,608 UART: [fwproc] Recv command 0x46574c44
10,417,711 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,103 UART: ROM Fatal Error: 0x000B0028
13,818,235 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
2,034,371 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,583,094 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
2,021,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,050 UART:
2,166,480 UART: Running Caliptra ROM ...
2,167,565 UART:
2,167,722 UART: [state] CFI Enabled
2,168,698 UART: [state] LifecycleState = Unprovisioned
2,170,347 UART: [state] DebugLocked = No
2,171,376 UART: [state] WD Timer not started. Device not locked for debugging
2,173,837 UART: [kat] SHA2-256
2,174,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,510 UART: [kat] ++
2,177,957 UART: [kat] sha1
2,178,465 UART: [kat] SHA2-256
2,179,146 UART: [kat] SHA2-384
2,179,805 UART: [kat] SHA2-512-ACC
2,180,606 UART: [kat] ECC-384
3,279,236 UART: [kat] HMAC-384Kdf
3,292,280 UART: [kat] LMS
3,821,783 UART: [kat] --
3,826,623 UART: [cold-reset] ++
3,828,913 UART: [fht] FHT @ 0x50003400
3,840,440 UART: [idev] ++
3,841,094 UART: [idev] CDI.KEYID = 6
3,841,987 UART: [idev] SUBJECT.KEYID = 7
3,843,062 UART: [idev] UDS.KEYID = 0
3,859,079 UART: [idev] Erasing UDS.KEYID = 0
6,315,747 UART: [idev] Sha1 KeyId Algorithm
6,337,676 UART: [idev] --
6,342,312 UART: [ldev] ++
6,342,898 UART: [ldev] CDI.KEYID = 6
6,343,822 UART: [ldev] SUBJECT.KEYID = 5
6,344,976 UART: [ldev] AUTHORITY.KEYID = 7
6,346,203 UART: [ldev] FE.KEYID = 1
6,355,553 UART: [ldev] Erasing FE.KEYID = 1
8,828,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,870 UART: [ldev] --
10,621,267 UART: [fwproc] Wait for Commands...
10,623,436 UART: [fwproc] Recv command 0x46574c44
10,625,575 UART: [fwproc] Recv'd Img size: 114168 bytes
14,016,325 UART: ROM Fatal Error: 0x000B0028
14,019,442 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,021,272 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,812,436 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
2,042,260 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,187,371 UART:
2,187,768 UART: Running Caliptra ROM ...
2,188,846 UART:
2,189,001 UART: [state] CFI Enabled
2,190,003 UART: [state] LifecycleState = Unprovisioned
2,191,673 UART: [state] DebugLocked = No
2,192,786 UART: [state] WD Timer not started. Device not locked for debugging
2,195,259 UART: [kat] SHA2-256
2,195,926 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,198,944 UART: [kat] ++
2,199,397 UART: [kat] sha1
2,199,911 UART: [kat] SHA2-256
2,200,654 UART: [kat] SHA2-384
2,201,321 UART: [kat] SHA2-512-ACC
2,202,166 UART: [kat] ECC-384
2,949,918 UART: [kat] HMAC-384Kdf
2,974,456 UART: [kat] LMS
3,503,934 UART: [kat] --
3,509,202 UART: [cold-reset] ++
3,511,413 UART: [fht] FHT @ 0x50003400
3,521,922 UART: [idev] ++
3,522,490 UART: [idev] CDI.KEYID = 6
3,523,599 UART: [idev] SUBJECT.KEYID = 7
3,524,650 UART: [idev] UDS.KEYID = 0
3,546,490 UART: [idev] Erasing UDS.KEYID = 0
6,029,766 UART: [idev] Sha1 KeyId Algorithm
6,052,761 UART: [idev] --
6,055,379 UART: [ldev] ++
6,055,965 UART: [ldev] CDI.KEYID = 6
6,056,851 UART: [ldev] SUBJECT.KEYID = 5
6,057,931 UART: [ldev] AUTHORITY.KEYID = 7
6,059,300 UART: [ldev] FE.KEYID = 1
6,104,809 UART: [ldev] Erasing FE.KEYID = 1
8,607,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,139 UART: [ldev] --
10,398,357 UART: [fwproc] Wait for Commands...
10,400,131 UART: [fwproc] Recv command 0x46574c44
10,402,229 UART: [fwproc] Recv'd Img size: 114168 bytes
13,801,925 UART: ROM Fatal Error: 0x000B0028
13,805,080 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
2,021,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,607,728 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
2,025,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,593 UART:
2,169,989 UART: Running Caliptra ROM ...
2,171,080 UART:
2,171,238 UART: [state] CFI Enabled
2,172,225 UART: [state] LifecycleState = Unprovisioned
2,173,876 UART: [state] DebugLocked = No
2,174,983 UART: [state] WD Timer not started. Device not locked for debugging
2,177,452 UART: [kat] SHA2-256
2,178,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,145 UART: [kat] ++
2,181,597 UART: [kat] sha1
2,182,113 UART: [kat] SHA2-256
2,182,799 UART: [kat] SHA2-384
2,183,477 UART: [kat] SHA2-512-ACC
2,184,472 UART: [kat] ECC-384
3,280,276 UART: [kat] HMAC-384Kdf
3,293,643 UART: [kat] LMS
3,823,164 UART: [kat] --
3,827,188 UART: [cold-reset] ++
3,828,692 UART: [fht] FHT @ 0x50003400
3,841,032 UART: [idev] ++
3,841,601 UART: [idev] CDI.KEYID = 6
3,842,485 UART: [idev] SUBJECT.KEYID = 7
3,843,695 UART: [idev] UDS.KEYID = 0
3,859,024 UART: [idev] Erasing UDS.KEYID = 0
6,317,057 UART: [idev] Sha1 KeyId Algorithm
6,341,097 UART: [idev] --
6,346,660 UART: [ldev] ++
6,347,225 UART: [ldev] CDI.KEYID = 6
6,348,123 UART: [ldev] SUBJECT.KEYID = 5
6,349,460 UART: [ldev] AUTHORITY.KEYID = 7
6,350,662 UART: [ldev] FE.KEYID = 1
6,362,498 UART: [ldev] Erasing FE.KEYID = 1
8,838,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,022 UART: [ldev] --
10,629,475 UART: [fwproc] Wait for Commands...
10,631,298 UART: [fwproc] Recv command 0x46574c44
10,633,395 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,645 UART: ROM Fatal Error: 0x000B0028
14,032,782 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
2,021,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,816,413 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,651 UART: [kat] SHA2-256
901,591 UART: [kat] SHA2-384
904,306 UART: [kat] SHA2-512-ACC
906,207 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,634 UART: [kat] LMS
1,168,946 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,561 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,182,451 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,238 UART: [ldev] ++
1,208,406 UART: [ldev] CDI.KEYID = 6
1,208,770 UART: [ldev] SUBJECT.KEYID = 5
1,209,197 UART: [ldev] AUTHORITY.KEYID = 7
1,209,660 UART: [ldev] FE.KEYID = 1
1,214,714 UART: [ldev] Erasing FE.KEYID = 1
1,240,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,388 UART: [ldev] --
1,279,882 UART: [fwproc] Wait for Commands...
1,280,707 UART: [fwproc] Recv command 0x46574c44
1,281,440 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,368 UART: ROM Fatal Error: 0x000B0028
2,577,525 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,140 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
921,105 UART: [kat] LMS
1,169,417 UART: [kat] --
1,170,170 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,146 UART: [idev] ++
1,173,314 UART: [idev] CDI.KEYID = 6
1,173,675 UART: [idev] SUBJECT.KEYID = 7
1,174,100 UART: [idev] UDS.KEYID = 0
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,360 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,489 UART: [ldev] --
1,281,829 UART: [fwproc] Wait for Commands...
1,282,418 UART: [fwproc] Recv command 0x46574c44
1,283,151 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,895 UART: ROM Fatal Error: 0x000B0028
2,579,052 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,429,891 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,843 UART: [kat] SHA2-256
901,783 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
915,634 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,185 UART: [cold-reset] ++
1,169,553 UART: [fht] FHT @ 0x50003400
1,172,319 UART: [idev] ++
1,172,487 UART: [idev] CDI.KEYID = 6
1,172,848 UART: [idev] SUBJECT.KEYID = 7
1,173,273 UART: [idev] UDS.KEYID = 0
1,181,405 UART: [idev] Erasing UDS.KEYID = 0
1,198,431 UART: [idev] Sha1 KeyId Algorithm
1,207,363 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,214,802 UART: [ldev] Erasing FE.KEYID = 1
1,240,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,328 UART: [ldev] --
1,279,598 UART: [fwproc] Wait for Commands...
1,280,403 UART: [fwproc] Recv command 0x46574c44
1,281,136 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,618 UART: ROM Fatal Error: 0x000B0028
2,577,775 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,612 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,364 UART: [kat] ++
895,516 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,127 UART: [kat] LMS
1,169,439 UART: [kat] --
1,170,556 UART: [cold-reset] ++
1,171,134 UART: [fht] FHT @ 0x50003400
1,173,986 UART: [idev] ++
1,174,154 UART: [idev] CDI.KEYID = 6
1,174,515 UART: [idev] SUBJECT.KEYID = 7
1,174,940 UART: [idev] UDS.KEYID = 0
1,182,974 UART: [idev] Erasing UDS.KEYID = 0
1,200,458 UART: [idev] Sha1 KeyId Algorithm
1,209,170 UART: [idev] --
1,210,293 UART: [ldev] ++
1,210,461 UART: [ldev] CDI.KEYID = 6
1,210,825 UART: [ldev] SUBJECT.KEYID = 5
1,211,252 UART: [ldev] AUTHORITY.KEYID = 7
1,211,715 UART: [ldev] FE.KEYID = 1
1,216,989 UART: [ldev] Erasing FE.KEYID = 1
1,243,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,411 UART: [ldev] --
1,282,757 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,231 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,061 UART: ROM Fatal Error: 0x000B0028
2,580,218 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,337 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,124 UART: [kat] LMS
1,169,436 UART: [kat] --
1,170,173 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,517 UART: [idev] ++
1,173,685 UART: [idev] CDI.KEYID = 6
1,174,046 UART: [idev] SUBJECT.KEYID = 7
1,174,471 UART: [idev] UDS.KEYID = 0
1,182,605 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha1 KeyId Algorithm
1,208,451 UART: [idev] --
1,209,436 UART: [ldev] ++
1,209,604 UART: [ldev] CDI.KEYID = 6
1,209,968 UART: [ldev] SUBJECT.KEYID = 5
1,210,395 UART: [ldev] AUTHORITY.KEYID = 7
1,210,858 UART: [ldev] FE.KEYID = 1
1,216,174 UART: [ldev] Erasing FE.KEYID = 1
1,242,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,280,986 UART: [fwproc] Wait for Commands...
1,281,649 UART: [fwproc] Recv command 0x46574c44
1,282,382 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,410 UART: ROM Fatal Error: 0x000B0028
2,579,567 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,644 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,856 UART: [kat] ++
896,008 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
905,067 UART: [kat] SHA2-512-ACC
906,968 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,559 UART: [kat] LMS
1,169,871 UART: [kat] --
1,170,728 UART: [cold-reset] ++
1,171,208 UART: [fht] FHT @ 0x50003400
1,173,996 UART: [idev] ++
1,174,164 UART: [idev] CDI.KEYID = 6
1,174,525 UART: [idev] SUBJECT.KEYID = 7
1,174,950 UART: [idev] UDS.KEYID = 0
1,183,058 UART: [idev] Erasing UDS.KEYID = 0
1,200,116 UART: [idev] Sha1 KeyId Algorithm
1,208,948 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,893 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,415 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,703 UART: ROM Fatal Error: 0x000B0028
2,578,860 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,547 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,020,185 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,163,878 UART:
2,164,409 UART: Running Caliptra ROM ...
2,165,573 UART:
2,165,750 UART: [state] CFI Enabled
2,166,714 UART: [state] LifecycleState = Unprovisioned
2,168,367 UART: [state] DebugLocked = No
2,169,399 UART: [state] WD Timer not started. Device not locked for debugging
2,171,843 UART: [kat] SHA2-256
2,172,504 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,519 UART: [kat] ++
2,175,995 UART: [kat] sha1
2,176,510 UART: [kat] SHA2-256
2,177,251 UART: [kat] SHA2-384
2,177,922 UART: [kat] SHA2-512-ACC
2,178,804 UART: [kat] ECC-384
3,776,108 UART: [kat] HMAC-384Kdf
3,803,096 UART: [kat] LMS
4,876,263 UART: [kat] --
4,881,554 UART: [cold-reset] ++
4,883,223 UART: [fht] FHT @ 0x50003400
4,894,840 UART: [idev] ++
4,895,539 UART: [idev] CDI.KEYID = 6
4,896,788 UART: [idev] SUBJECT.KEYID = 7
4,897,895 UART: [idev] UDS.KEYID = 0
4,930,592 UART: [idev] Erasing UDS.KEYID = 0
8,243,167 UART: [idev] Sha1 KeyId Algorithm
8,264,832 UART: [idev] --
8,269,861 UART: [ldev] ++
8,270,429 UART: [ldev] CDI.KEYID = 6
8,271,542 UART: [ldev] SUBJECT.KEYID = 5
8,272,816 UART: [ldev] AUTHORITY.KEYID = 7
8,273,913 UART: [ldev] FE.KEYID = 1
8,317,104 UART: [ldev] Erasing FE.KEYID = 1
11,654,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,895 UART: [ldev] --
14,038,114 UART: [fwproc] Wait for Commands...
14,040,429 UART: [fwproc] Recv command 0x46574c44
14,042,752 UART: [fwproc] Recv'd Img size: 113844 bytes
18,109,541 UART: ROM Fatal Error: 0x000B0028
18,113,016 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,019,466 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,869,491 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
2,021,910 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,569 UART:
2,165,963 UART: Running Caliptra ROM ...
2,167,035 UART:
2,167,187 UART: [state] CFI Enabled
2,168,146 UART: [state] LifecycleState = Unprovisioned
2,169,717 UART: [state] DebugLocked = No
2,170,827 UART: [state] WD Timer not started. Device not locked for debugging
2,173,298 UART: [kat] SHA2-256
2,173,953 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,962 UART: [kat] ++
2,177,403 UART: [kat] sha1
2,177,905 UART: [kat] SHA2-256
2,178,553 UART: [kat] SHA2-384
2,179,202 UART: [kat] SHA2-512-ACC
2,180,101 UART: [kat] ECC-384
4,099,325 UART: [kat] HMAC-384Kdf
4,111,614 UART: [kat] LMS
5,184,737 UART: [kat] --
5,190,203 UART: [cold-reset] ++
5,192,254 UART: [fht] FHT @ 0x50003400
5,203,239 UART: [idev] ++
5,203,912 UART: [idev] CDI.KEYID = 6
5,205,149 UART: [idev] SUBJECT.KEYID = 7
5,206,587 UART: [idev] UDS.KEYID = 0
5,222,437 UART: [idev] Erasing UDS.KEYID = 0
8,496,911 UART: [idev] Sha1 KeyId Algorithm
8,518,075 UART: [idev] --
8,523,421 UART: [ldev] ++
8,523,993 UART: [ldev] CDI.KEYID = 6
8,525,176 UART: [ldev] SUBJECT.KEYID = 5
8,526,688 UART: [ldev] AUTHORITY.KEYID = 7
8,528,121 UART: [ldev] FE.KEYID = 1
8,539,797 UART: [ldev] Erasing FE.KEYID = 1
11,828,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,570 UART: [ldev] --
14,194,857 UART: [fwproc] Wait for Commands...
14,197,002 UART: [fwproc] Recv command 0x46574c44
14,199,327 UART: [fwproc] Recv'd Img size: 113844 bytes
18,264,895 UART: ROM Fatal Error: 0x000B0028
18,268,310 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
2,021,674 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,071,224 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,021,973 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,573 UART:
2,166,990 UART: Running Caliptra ROM ...
2,168,105 UART:
2,168,264 UART: [state] CFI Enabled
2,169,248 UART: [state] LifecycleState = Unprovisioned
2,170,897 UART: [state] DebugLocked = No
2,171,960 UART: [state] WD Timer not started. Device not locked for debugging
2,174,426 UART: [kat] SHA2-256
2,175,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,110 UART: [kat] ++
2,178,561 UART: [kat] sha1
2,179,112 UART: [kat] SHA2-256
2,179,805 UART: [kat] SHA2-384
2,180,489 UART: [kat] SHA2-512-ACC
2,181,291 UART: [kat] ECC-384
2,928,463 UART: [kat] HMAC-384Kdf
2,948,523 UART: [kat] LMS
3,477,976 UART: [kat] --
3,481,989 UART: [cold-reset] ++
3,482,949 UART: [fht] FHT @ 0x50003400
3,492,930 UART: [idev] ++
3,493,537 UART: [idev] CDI.KEYID = 6
3,494,424 UART: [idev] SUBJECT.KEYID = 7
3,495,645 UART: [idev] UDS.KEYID = 0
3,521,462 UART: [idev] Erasing UDS.KEYID = 0
6,003,723 UART: [idev] Sha1 KeyId Algorithm
6,027,729 UART: [idev] --
6,031,035 UART: [ldev] ++
6,031,612 UART: [ldev] CDI.KEYID = 6
6,032,517 UART: [ldev] SUBJECT.KEYID = 5
6,033,678 UART: [ldev] AUTHORITY.KEYID = 7
6,034,912 UART: [ldev] FE.KEYID = 1
6,075,547 UART: [ldev] Erasing FE.KEYID = 1
8,578,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,729 UART: [ldev] --
10,389,661 UART: [fwproc] Wait for Commands...
10,392,466 UART: [fwproc] Recv command 0x46574c44
10,394,566 UART: [fwproc] Recv'd Img size: 114168 bytes
13,794,478 UART: ROM Fatal Error: 0x000B0028
13,797,612 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
2,023,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,603,538 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
2,021,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,232 UART:
2,165,624 UART: Running Caliptra ROM ...
2,166,786 UART:
2,166,963 UART: [state] CFI Enabled
2,167,943 UART: [state] LifecycleState = Unprovisioned
2,169,584 UART: [state] DebugLocked = No
2,170,688 UART: [state] WD Timer not started. Device not locked for debugging
2,173,158 UART: [kat] SHA2-256
2,173,824 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,836 UART: [kat] ++
2,177,309 UART: [kat] sha1
2,177,835 UART: [kat] SHA2-256
2,178,539 UART: [kat] SHA2-384
2,179,198 UART: [kat] SHA2-512-ACC
2,179,999 UART: [kat] ECC-384
3,278,597 UART: [kat] HMAC-384Kdf
3,291,739 UART: [kat] LMS
3,821,243 UART: [kat] --
3,825,290 UART: [cold-reset] ++
3,826,620 UART: [fht] FHT @ 0x50003400
3,838,030 UART: [idev] ++
3,838,592 UART: [idev] CDI.KEYID = 6
3,839,496 UART: [idev] SUBJECT.KEYID = 7
3,840,710 UART: [idev] UDS.KEYID = 0
3,857,634 UART: [idev] Erasing UDS.KEYID = 0
6,316,519 UART: [idev] Sha1 KeyId Algorithm
6,339,553 UART: [idev] --
6,342,631 UART: [ldev] ++
6,343,202 UART: [ldev] CDI.KEYID = 6
6,344,110 UART: [ldev] SUBJECT.KEYID = 5
6,345,270 UART: [ldev] AUTHORITY.KEYID = 7
6,346,551 UART: [ldev] FE.KEYID = 1
6,356,600 UART: [ldev] Erasing FE.KEYID = 1
8,829,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,736 UART: [ldev] --
10,619,899 UART: [fwproc] Wait for Commands...
10,622,211 UART: [fwproc] Recv command 0x46574c44
10,624,301 UART: [fwproc] Recv'd Img size: 114168 bytes
14,019,958 UART: ROM Fatal Error: 0x000B0028
14,023,042 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
2,022,315 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,814,938 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,030,219 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,174,949 UART:
2,175,362 UART: Running Caliptra ROM ...
2,176,531 UART:
2,176,715 UART: [state] CFI Enabled
2,177,692 UART: [state] LifecycleState = Unprovisioned
2,179,333 UART: [state] DebugLocked = No
2,180,442 UART: [state] WD Timer not started. Device not locked for debugging
2,182,918 UART: [kat] SHA2-256
2,183,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,186,595 UART: [kat] ++
2,187,069 UART: [kat] sha1
2,187,673 UART: [kat] SHA2-256
2,188,340 UART: [kat] SHA2-384
2,188,997 UART: [kat] SHA2-512-ACC
2,189,832 UART: [kat] ECC-384
2,949,892 UART: [kat] HMAC-384Kdf
2,971,177 UART: [kat] LMS
3,500,648 UART: [kat] --
3,506,641 UART: [cold-reset] ++
3,508,147 UART: [fht] FHT @ 0x50003400
3,518,967 UART: [idev] ++
3,519,571 UART: [idev] CDI.KEYID = 6
3,520,482 UART: [idev] SUBJECT.KEYID = 7
3,521,700 UART: [idev] UDS.KEYID = 0
3,543,185 UART: [idev] Erasing UDS.KEYID = 0
6,020,733 UART: [idev] Sha1 KeyId Algorithm
6,044,521 UART: [idev] --
6,050,033 UART: [ldev] ++
6,050,607 UART: [ldev] CDI.KEYID = 6
6,051,493 UART: [ldev] SUBJECT.KEYID = 5
6,052,601 UART: [ldev] AUTHORITY.KEYID = 7
6,053,948 UART: [ldev] FE.KEYID = 1
6,099,410 UART: [ldev] Erasing FE.KEYID = 1
8,600,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,326 UART: [ldev] --
10,390,562 UART: [fwproc] Wait for Commands...
10,393,747 UART: [fwproc] Recv command 0x46574c44
10,395,814 UART: [fwproc] Recv'd Img size: 114168 bytes
13,790,271 UART: ROM Fatal Error: 0x000B0028
13,793,418 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,026,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,580,301 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
2,039,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,183,760 UART:
2,184,161 UART: Running Caliptra ROM ...
2,185,336 UART:
2,185,512 UART: [state] CFI Enabled
2,186,490 UART: [state] LifecycleState = Unprovisioned
2,188,135 UART: [state] DebugLocked = No
2,189,242 UART: [state] WD Timer not started. Device not locked for debugging
2,191,732 UART: [kat] SHA2-256
2,192,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,195,411 UART: [kat] ++
2,195,861 UART: [kat] sha1
2,196,376 UART: [kat] SHA2-256
2,197,109 UART: [kat] SHA2-384
2,197,774 UART: [kat] SHA2-512-ACC
2,198,614 UART: [kat] ECC-384
3,283,545 UART: [kat] HMAC-384Kdf
3,296,745 UART: [kat] LMS
3,826,247 UART: [kat] --
3,830,347 UART: [cold-reset] ++
3,831,245 UART: [fht] FHT @ 0x50003400
3,842,444 UART: [idev] ++
3,843,052 UART: [idev] CDI.KEYID = 6
3,843,968 UART: [idev] SUBJECT.KEYID = 7
3,845,148 UART: [idev] UDS.KEYID = 0
3,863,281 UART: [idev] Erasing UDS.KEYID = 0
6,321,418 UART: [idev] Sha1 KeyId Algorithm
6,344,296 UART: [idev] --
6,348,934 UART: [ldev] ++
6,349,503 UART: [ldev] CDI.KEYID = 6
6,350,413 UART: [ldev] SUBJECT.KEYID = 5
6,351,626 UART: [ldev] AUTHORITY.KEYID = 7
6,352,851 UART: [ldev] FE.KEYID = 1
6,363,820 UART: [ldev] Erasing FE.KEYID = 1
8,836,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,244 UART: [ldev] --
10,629,090 UART: [fwproc] Wait for Commands...
10,631,726 UART: [fwproc] Recv command 0x46574c44
10,633,824 UART: [fwproc] Recv'd Img size: 114168 bytes
14,032,967 UART: ROM Fatal Error: 0x000B0028
14,036,108 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,021,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,805,125 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,654 UART: [state] LifecycleState = Unprovisioned
85,309 UART: [state] DebugLocked = No
85,985 UART: [state] WD Timer not started. Device not locked for debugging
87,268 UART: [kat] SHA2-256
890,818 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,947 UART: [kat] ++
895,099 UART: [kat] sha1
899,099 UART: [kat] SHA2-256
901,039 UART: [kat] SHA2-384
903,898 UART: [kat] SHA2-512-ACC
905,799 UART: [kat] ECC-384
915,370 UART: [kat] HMAC-384Kdf
919,894 UART: [kat] LMS
1,168,206 UART: [kat] --
1,168,841 UART: [cold-reset] ++
1,169,167 UART: [fht] FHT @ 0x50003400
1,171,925 UART: [idev] ++
1,172,093 UART: [idev] CDI.KEYID = 6
1,172,454 UART: [idev] SUBJECT.KEYID = 7
1,172,879 UART: [idev] UDS.KEYID = 0
1,180,641 UART: [idev] Erasing UDS.KEYID = 0
1,197,031 UART: [idev] Sha1 KeyId Algorithm
1,205,729 UART: [idev] --
1,206,738 UART: [ldev] ++
1,206,906 UART: [ldev] CDI.KEYID = 6
1,207,270 UART: [ldev] SUBJECT.KEYID = 5
1,207,697 UART: [ldev] AUTHORITY.KEYID = 7
1,208,160 UART: [ldev] FE.KEYID = 1
1,213,638 UART: [ldev] Erasing FE.KEYID = 1
1,239,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,638 UART: [ldev] --
1,278,914 UART: [fwproc] Wait for Commands...
1,279,527 UART: [fwproc] Recv command 0x46574c44
1,280,260 UART: [fwproc] Recv'd Img size: 114168 bytes
2,575,805 UART: ROM Fatal Error: 0x000B0028
2,576,962 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,496 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,086 UART: [idev] ++
1,173,254 UART: [idev] CDI.KEYID = 6
1,173,615 UART: [idev] SUBJECT.KEYID = 7
1,174,040 UART: [idev] UDS.KEYID = 0
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,192 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,639 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,253 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,422 UART: [fwproc] Recv command 0x46574c44
1,283,155 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,257 UART: ROM Fatal Error: 0x000B0028
2,579,414 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,007 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,464 UART: [kat] HMAC-384Kdf
920,116 UART: [kat] LMS
1,168,428 UART: [kat] --
1,168,953 UART: [cold-reset] ++
1,169,527 UART: [fht] FHT @ 0x50003400
1,172,043 UART: [idev] ++
1,172,211 UART: [idev] CDI.KEYID = 6
1,172,572 UART: [idev] SUBJECT.KEYID = 7
1,172,997 UART: [idev] UDS.KEYID = 0
1,180,815 UART: [idev] Erasing UDS.KEYID = 0
1,197,491 UART: [idev] Sha1 KeyId Algorithm
1,206,341 UART: [idev] --
1,207,480 UART: [ldev] ++
1,207,648 UART: [ldev] CDI.KEYID = 6
1,208,012 UART: [ldev] SUBJECT.KEYID = 5
1,208,439 UART: [ldev] AUTHORITY.KEYID = 7
1,208,902 UART: [ldev] FE.KEYID = 1
1,214,120 UART: [ldev] Erasing FE.KEYID = 1
1,240,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,616 UART: [ldev] --
1,279,928 UART: [fwproc] Wait for Commands...
1,280,561 UART: [fwproc] Recv command 0x46574c44
1,281,294 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,404 UART: ROM Fatal Error: 0x000B0028
2,577,561 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,429,430 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,927 UART: [state] LifecycleState = Unprovisioned
86,582 UART: [state] DebugLocked = No
87,238 UART: [state] WD Timer not started. Device not locked for debugging
88,409 UART: [kat] SHA2-256
891,959 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,088 UART: [kat] ++
896,240 UART: [kat] sha1
900,434 UART: [kat] SHA2-256
902,374 UART: [kat] SHA2-384
905,115 UART: [kat] SHA2-512-ACC
907,016 UART: [kat] ECC-384
916,687 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,766 UART: [cold-reset] ++
1,171,218 UART: [fht] FHT @ 0x50003400
1,173,862 UART: [idev] ++
1,174,030 UART: [idev] CDI.KEYID = 6
1,174,391 UART: [idev] SUBJECT.KEYID = 7
1,174,816 UART: [idev] UDS.KEYID = 0
1,182,808 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,552 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,243,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,855 UART: [ldev] --
1,282,299 UART: [fwproc] Wait for Commands...
1,282,892 UART: [fwproc] Recv command 0x46574c44
1,283,625 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,515 UART: ROM Fatal Error: 0x000B0028
2,579,672 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,691 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,471 UART: [kat] ++
895,623 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
916,314 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
1,182,649 UART: [idev] Erasing UDS.KEYID = 0
1,199,089 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,170 UART: [ldev] ++
1,209,338 UART: [ldev] CDI.KEYID = 6
1,209,702 UART: [ldev] SUBJECT.KEYID = 5
1,210,129 UART: [ldev] AUTHORITY.KEYID = 7
1,210,592 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,240,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,360 UART: [ldev] --
1,279,740 UART: [fwproc] Wait for Commands...
1,280,553 UART: [fwproc] Recv command 0x46574c44
1,281,286 UART: [fwproc] Recv'd Img size: 114168 bytes
2,575,998 UART: ROM Fatal Error: 0x000B0028
2,577,155 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,428,804 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,170,400 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,080 UART: [idev] Sha1 KeyId Algorithm
1,207,946 UART: [idev] --
1,208,929 UART: [ldev] ++
1,209,097 UART: [ldev] CDI.KEYID = 6
1,209,461 UART: [ldev] SUBJECT.KEYID = 5
1,209,888 UART: [ldev] AUTHORITY.KEYID = 7
1,210,351 UART: [ldev] FE.KEYID = 1
1,215,729 UART: [ldev] Erasing FE.KEYID = 1
1,242,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,057 UART: [ldev] --
1,281,459 UART: [fwproc] Wait for Commands...
1,282,070 UART: [fwproc] Recv command 0x46574c44
1,282,803 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,011 UART: ROM Fatal Error: 0x000B0028
2,579,168 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,359 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
2,019,567 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,163,367 UART:
2,163,760 UART: Running Caliptra ROM ...
2,164,923 UART:
2,165,094 UART: [state] CFI Enabled
2,166,063 UART: [state] LifecycleState = Unprovisioned
2,167,720 UART: [state] DebugLocked = No
2,168,826 UART: [state] WD Timer not started. Device not locked for debugging
2,171,306 UART: [kat] SHA2-256
2,171,977 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,990 UART: [kat] ++
2,175,460 UART: [kat] sha1
2,175,978 UART: [kat] SHA2-256
2,176,718 UART: [kat] SHA2-384
2,177,383 UART: [kat] SHA2-512-ACC
2,178,261 UART: [kat] ECC-384
3,778,437 UART: [kat] HMAC-384Kdf
3,803,647 UART: [kat] LMS
4,876,825 UART: [kat] --
4,880,068 UART: [cold-reset] ++
4,881,468 UART: [fht] FHT @ 0x50003400
4,893,584 UART: [idev] ++
4,894,325 UART: [idev] CDI.KEYID = 6
4,897,150 UART: [idev] SUBJECT.KEYID = 7
4,898,270 UART: [idev] UDS.KEYID = 0
4,931,977 UART: [idev] Erasing UDS.KEYID = 0
8,242,235 UART: [idev] Sha1 KeyId Algorithm
8,264,665 UART: [idev] --
8,269,462 UART: [ldev] ++
8,270,084 UART: [ldev] CDI.KEYID = 6
8,271,271 UART: [ldev] SUBJECT.KEYID = 5
8,272,432 UART: [ldev] AUTHORITY.KEYID = 7
8,273,660 UART: [ldev] FE.KEYID = 1
8,319,210 UART: [ldev] Erasing FE.KEYID = 1
11,659,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,929 UART: [ldev] --
14,039,812 UART: [fwproc] Wait for Commands...
14,041,917 UART: [fwproc] Recv command 0x46574c44
14,044,247 UART: [fwproc] Recv'd Img size: 113844 bytes
18,109,848 UART: ROM Fatal Error: 0x000B0029
18,113,273 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,019,126 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,864,390 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
2,021,261 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,122 UART:
2,165,515 UART: Running Caliptra ROM ...
2,166,679 UART:
2,166,852 UART: [state] CFI Enabled
2,167,811 UART: [state] LifecycleState = Unprovisioned
2,169,454 UART: [state] DebugLocked = No
2,170,552 UART: [state] WD Timer not started. Device not locked for debugging
2,173,019 UART: [kat] SHA2-256
2,173,684 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,716 UART: [kat] ++
2,177,166 UART: [kat] sha1
2,177,675 UART: [kat] SHA2-256
2,178,409 UART: [kat] SHA2-384
2,179,067 UART: [kat] SHA2-512-ACC
2,179,950 UART: [kat] ECC-384
4,101,037 UART: [kat] HMAC-384Kdf
4,113,178 UART: [kat] LMS
5,186,314 UART: [kat] --
5,190,825 UART: [cold-reset] ++
5,193,519 UART: [fht] FHT @ 0x50003400
5,205,414 UART: [idev] ++
5,206,092 UART: [idev] CDI.KEYID = 6
5,207,335 UART: [idev] SUBJECT.KEYID = 7
5,208,768 UART: [idev] UDS.KEYID = 0
5,225,396 UART: [idev] Erasing UDS.KEYID = 0
8,498,142 UART: [idev] Sha1 KeyId Algorithm
8,521,007 UART: [idev] --
8,524,931 UART: [ldev] ++
8,525,501 UART: [ldev] CDI.KEYID = 6
8,526,605 UART: [ldev] SUBJECT.KEYID = 5
8,528,143 UART: [ldev] AUTHORITY.KEYID = 7
8,529,626 UART: [ldev] FE.KEYID = 1
8,541,571 UART: [ldev] Erasing FE.KEYID = 1
11,834,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,029 UART: [ldev] --
14,200,608 UART: [fwproc] Wait for Commands...
14,202,975 UART: [fwproc] Recv command 0x46574c44
14,205,262 UART: [fwproc] Recv'd Img size: 113844 bytes
18,272,062 UART: ROM Fatal Error: 0x000B0029
18,275,480 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
2,026,879 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,085,409 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,016 writing to cptra_bootfsm_go
2,035,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,179,967 UART:
2,180,363 UART: Running Caliptra ROM ...
2,181,525 UART:
2,181,694 UART: [state] CFI Enabled
2,182,664 UART: [state] LifecycleState = Unprovisioned
2,184,306 UART: [state] DebugLocked = No
2,185,418 UART: [state] WD Timer not started. Device not locked for debugging
2,187,891 UART: [kat] SHA2-256
2,188,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,568 UART: [kat] ++
2,192,063 UART: [kat] sha1
2,192,583 UART: [kat] SHA2-256
2,193,334 UART: [kat] SHA2-384
2,194,002 UART: [kat] SHA2-512-ACC
2,194,854 UART: [kat] ECC-384
2,949,146 UART: [kat] HMAC-384Kdf
2,971,882 UART: [kat] LMS
3,501,347 UART: [kat] --
3,505,453 UART: [cold-reset] ++
3,506,901 UART: [fht] FHT @ 0x50003400
3,518,054 UART: [idev] ++
3,518,631 UART: [idev] CDI.KEYID = 6
3,519,541 UART: [idev] SUBJECT.KEYID = 7
3,520,702 UART: [idev] UDS.KEYID = 0
3,542,788 UART: [idev] Erasing UDS.KEYID = 0
6,026,255 UART: [idev] Sha1 KeyId Algorithm
6,048,431 UART: [idev] --
6,053,790 UART: [ldev] ++
6,054,375 UART: [ldev] CDI.KEYID = 6
6,055,450 UART: [ldev] SUBJECT.KEYID = 5
6,056,561 UART: [ldev] AUTHORITY.KEYID = 7
6,057,743 UART: [ldev] FE.KEYID = 1
6,099,479 UART: [ldev] Erasing FE.KEYID = 1
8,602,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,143 UART: [ldev] --
10,408,991 UART: [fwproc] Wait for Commands...
10,412,181 UART: [fwproc] Recv command 0x46574c44
10,414,288 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,919 UART: ROM Fatal Error: 0x000B0029
13,823,066 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
2,030,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,611,437 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
2,023,196 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,674 UART:
2,168,080 UART: Running Caliptra ROM ...
2,169,244 UART:
2,169,417 UART: [state] CFI Enabled
2,170,401 UART: [state] LifecycleState = Unprovisioned
2,172,044 UART: [state] DebugLocked = No
2,173,152 UART: [state] WD Timer not started. Device not locked for debugging
2,175,615 UART: [kat] SHA2-256
2,176,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,302 UART: [kat] ++
2,179,752 UART: [kat] sha1
2,180,305 UART: [kat] SHA2-256
2,180,960 UART: [kat] SHA2-384
2,181,615 UART: [kat] SHA2-512-ACC
2,182,461 UART: [kat] ECC-384
3,280,658 UART: [kat] HMAC-384Kdf
3,293,424 UART: [kat] LMS
3,822,940 UART: [kat] --
3,828,377 UART: [cold-reset] ++
3,830,681 UART: [fht] FHT @ 0x50003400
3,841,867 UART: [idev] ++
3,842,425 UART: [idev] CDI.KEYID = 6
3,843,434 UART: [idev] SUBJECT.KEYID = 7
3,844,536 UART: [idev] UDS.KEYID = 0
3,862,991 UART: [idev] Erasing UDS.KEYID = 0
6,319,236 UART: [idev] Sha1 KeyId Algorithm
6,341,665 UART: [idev] --
6,347,276 UART: [ldev] ++
6,347,843 UART: [ldev] CDI.KEYID = 6
6,348,723 UART: [ldev] SUBJECT.KEYID = 5
6,349,932 UART: [ldev] AUTHORITY.KEYID = 7
6,351,216 UART: [ldev] FE.KEYID = 1
6,363,892 UART: [ldev] Erasing FE.KEYID = 1
8,840,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,365 UART: [ldev] --
10,632,520 UART: [fwproc] Wait for Commands...
10,634,989 UART: [fwproc] Recv command 0x46574c44
10,637,099 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,213 UART: ROM Fatal Error: 0x000B0029
14,029,352 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
2,020,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,824,236 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,021,750 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,115 UART:
2,166,515 UART: Running Caliptra ROM ...
2,167,600 UART:
2,167,755 UART: [state] CFI Enabled
2,168,732 UART: [state] LifecycleState = Unprovisioned
2,170,382 UART: [state] DebugLocked = No
2,171,515 UART: [state] WD Timer not started. Device not locked for debugging
2,173,989 UART: [kat] SHA2-256
2,174,660 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,678 UART: [kat] ++
2,178,130 UART: [kat] sha1
2,178,642 UART: [kat] SHA2-256
2,179,380 UART: [kat] SHA2-384
2,180,046 UART: [kat] SHA2-512-ACC
2,180,932 UART: [kat] ECC-384
2,948,485 UART: [kat] HMAC-384Kdf
2,971,882 UART: [kat] LMS
3,501,347 UART: [kat] --
3,506,175 UART: [cold-reset] ++
3,508,330 UART: [fht] FHT @ 0x50003400
3,518,716 UART: [idev] ++
3,519,292 UART: [idev] CDI.KEYID = 6
3,520,291 UART: [idev] SUBJECT.KEYID = 7
3,521,455 UART: [idev] UDS.KEYID = 0
3,543,002 UART: [idev] Erasing UDS.KEYID = 0
6,027,396 UART: [idev] Sha1 KeyId Algorithm
6,051,436 UART: [idev] --
6,054,656 UART: [ldev] ++
6,055,241 UART: [ldev] CDI.KEYID = 6
6,056,152 UART: [ldev] SUBJECT.KEYID = 5
6,057,318 UART: [ldev] AUTHORITY.KEYID = 7
6,058,553 UART: [ldev] FE.KEYID = 1
6,098,799 UART: [ldev] Erasing FE.KEYID = 1
8,599,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,144 UART: [ldev] --
10,391,765 UART: [fwproc] Wait for Commands...
10,394,188 UART: [fwproc] Recv command 0x46574c44
10,396,233 UART: [fwproc] Recv'd Img size: 114168 bytes
13,788,840 UART: ROM Fatal Error: 0x000B0029
13,791,929 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,051 writing to cptra_bootfsm_go
2,021,736 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,624,289 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,023,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,665 UART:
2,168,067 UART: Running Caliptra ROM ...
2,169,245 UART:
2,169,420 UART: [state] CFI Enabled
2,170,396 UART: [state] LifecycleState = Unprovisioned
2,172,039 UART: [state] DebugLocked = No
2,173,109 UART: [state] WD Timer not started. Device not locked for debugging
2,175,582 UART: [kat] SHA2-256
2,176,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,265 UART: [kat] ++
2,179,715 UART: [kat] sha1
2,180,225 UART: [kat] SHA2-256
2,180,964 UART: [kat] SHA2-384
2,181,649 UART: [kat] SHA2-512-ACC
2,182,531 UART: [kat] ECC-384
3,281,768 UART: [kat] HMAC-384Kdf
3,294,873 UART: [kat] LMS
3,824,336 UART: [kat] --
3,829,084 UART: [cold-reset] ++
3,830,095 UART: [fht] FHT @ 0x50003400
3,841,324 UART: [idev] ++
3,841,891 UART: [idev] CDI.KEYID = 6
3,842,768 UART: [idev] SUBJECT.KEYID = 7
3,843,979 UART: [idev] UDS.KEYID = 0
3,857,796 UART: [idev] Erasing UDS.KEYID = 0
6,314,801 UART: [idev] Sha1 KeyId Algorithm
6,337,394 UART: [idev] --
6,339,934 UART: [ldev] ++
6,340,501 UART: [ldev] CDI.KEYID = 6
6,341,397 UART: [ldev] SUBJECT.KEYID = 5
6,342,530 UART: [ldev] AUTHORITY.KEYID = 7
6,343,866 UART: [ldev] FE.KEYID = 1
6,354,002 UART: [ldev] Erasing FE.KEYID = 1
8,824,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,796 UART: [ldev] --
10,617,208 UART: [fwproc] Wait for Commands...
10,618,927 UART: [fwproc] Recv command 0x46574c44
10,621,029 UART: [fwproc] Recv'd Img size: 114168 bytes
14,014,322 UART: ROM Fatal Error: 0x000B0029
14,017,458 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
2,022,315 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,804,896 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,523 UART: [kat] SHA2-256
901,463 UART: [kat] SHA2-384
904,086 UART: [kat] SHA2-512-ACC
905,987 UART: [kat] ECC-384
915,474 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,709 UART: [fht] FHT @ 0x50003400
1,172,413 UART: [idev] ++
1,172,581 UART: [idev] CDI.KEYID = 6
1,172,942 UART: [idev] SUBJECT.KEYID = 7
1,173,367 UART: [idev] UDS.KEYID = 0
1,181,083 UART: [idev] Erasing UDS.KEYID = 0
1,197,889 UART: [idev] Sha1 KeyId Algorithm
1,206,845 UART: [idev] --
1,208,124 UART: [ldev] ++
1,208,292 UART: [ldev] CDI.KEYID = 6
1,208,656 UART: [ldev] SUBJECT.KEYID = 5
1,209,083 UART: [ldev] AUTHORITY.KEYID = 7
1,209,546 UART: [ldev] FE.KEYID = 1
1,214,734 UART: [ldev] Erasing FE.KEYID = 1
1,240,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,446 UART: [ldev] --
1,279,840 UART: [fwproc] Wait for Commands...
1,280,575 UART: [fwproc] Recv command 0x46574c44
1,281,308 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,844 UART: ROM Fatal Error: 0x000B0029
2,578,001 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,429,378 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
891,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,968 UART: [kat] ++
896,120 UART: [kat] sha1
900,414 UART: [kat] SHA2-256
902,354 UART: [kat] SHA2-384
905,003 UART: [kat] SHA2-512-ACC
906,904 UART: [kat] ECC-384
917,009 UART: [kat] HMAC-384Kdf
921,499 UART: [kat] LMS
1,169,811 UART: [kat] --
1,170,646 UART: [cold-reset] ++
1,171,222 UART: [fht] FHT @ 0x50003400
1,173,914 UART: [idev] ++
1,174,082 UART: [idev] CDI.KEYID = 6
1,174,443 UART: [idev] SUBJECT.KEYID = 7
1,174,868 UART: [idev] UDS.KEYID = 0
1,182,680 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,422 UART: [idev] --
1,209,525 UART: [ldev] ++
1,209,693 UART: [ldev] CDI.KEYID = 6
1,210,057 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,216,131 UART: [ldev] Erasing FE.KEYID = 1
1,242,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,282,005 UART: [fwproc] Wait for Commands...
1,282,592 UART: [fwproc] Recv command 0x46574c44
1,283,325 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,579 UART: ROM Fatal Error: 0x000B0029
2,580,736 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,079 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,361 UART: [kat] ++
895,513 UART: [kat] sha1
899,749 UART: [kat] SHA2-256
901,689 UART: [kat] SHA2-384
904,260 UART: [kat] SHA2-512-ACC
906,161 UART: [kat] ECC-384
915,770 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,495 UART: [cold-reset] ++
1,169,847 UART: [fht] FHT @ 0x50003400
1,172,525 UART: [idev] ++
1,172,693 UART: [idev] CDI.KEYID = 6
1,173,054 UART: [idev] SUBJECT.KEYID = 7
1,173,479 UART: [idev] UDS.KEYID = 0
1,181,551 UART: [idev] Erasing UDS.KEYID = 0
1,197,971 UART: [idev] Sha1 KeyId Algorithm
1,206,999 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,386 UART: [ldev] Erasing FE.KEYID = 1
1,240,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,932 UART: [ldev] --
1,279,270 UART: [fwproc] Wait for Commands...
1,280,065 UART: [fwproc] Recv command 0x46574c44
1,280,798 UART: [fwproc] Recv'd Img size: 114168 bytes
2,575,930 UART: ROM Fatal Error: 0x000B0029
2,577,087 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,612 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
905,003 UART: [kat] SHA2-512-ACC
906,904 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,294 UART: [cold-reset] ++
1,170,732 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,182,566 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,208,868 UART: [idev] --
1,209,821 UART: [ldev] ++
1,209,989 UART: [ldev] CDI.KEYID = 6
1,210,353 UART: [ldev] SUBJECT.KEYID = 5
1,210,780 UART: [ldev] AUTHORITY.KEYID = 7
1,211,243 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,351 UART: [ldev] --
1,282,685 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,181 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,095 UART: ROM Fatal Error: 0x000B0029
2,581,252 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,143 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,120 UART: [kat] SHA2-256
890,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,799 UART: [kat] ++
894,951 UART: [kat] sha1
899,233 UART: [kat] SHA2-256
901,173 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,383 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,437 UART: [idev] ++
1,172,605 UART: [idev] CDI.KEYID = 6
1,172,966 UART: [idev] SUBJECT.KEYID = 7
1,173,391 UART: [idev] UDS.KEYID = 0
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,386 UART: [ldev] ++
1,208,554 UART: [ldev] CDI.KEYID = 6
1,208,918 UART: [ldev] SUBJECT.KEYID = 5
1,209,345 UART: [ldev] AUTHORITY.KEYID = 7
1,209,808 UART: [ldev] FE.KEYID = 1
1,214,738 UART: [ldev] Erasing FE.KEYID = 1
1,241,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,844 UART: [ldev] --
1,280,360 UART: [fwproc] Wait for Commands...
1,280,963 UART: [fwproc] Recv command 0x46574c44
1,281,696 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,116 UART: ROM Fatal Error: 0x000B0029
2,578,273 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,696 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,767 UART: [kat] HMAC-384Kdf
921,479 UART: [kat] LMS
1,169,791 UART: [kat] --
1,171,034 UART: [cold-reset] ++
1,171,464 UART: [fht] FHT @ 0x50003400
1,174,132 UART: [idev] ++
1,174,300 UART: [idev] CDI.KEYID = 6
1,174,661 UART: [idev] SUBJECT.KEYID = 7
1,175,086 UART: [idev] UDS.KEYID = 0
1,183,188 UART: [idev] Erasing UDS.KEYID = 0
1,200,186 UART: [idev] Sha1 KeyId Algorithm
1,208,980 UART: [idev] --
1,209,847 UART: [ldev] ++
1,210,015 UART: [ldev] CDI.KEYID = 6
1,210,379 UART: [ldev] SUBJECT.KEYID = 5
1,210,806 UART: [ldev] AUTHORITY.KEYID = 7
1,211,269 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x46574c44
1,283,695 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,539 UART: ROM Fatal Error: 0x000B0029
2,579,696 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,451 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,023,031 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,167,008 UART:
2,167,419 UART: Running Caliptra ROM ...
2,168,581 UART:
2,168,758 UART: [state] CFI Enabled
2,169,722 UART: [state] LifecycleState = Unprovisioned
2,171,372 UART: [state] DebugLocked = No
2,172,478 UART: [state] WD Timer not started. Device not locked for debugging
2,175,180 UART: [kat] SHA2-256
2,175,856 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,178,875 UART: [kat] ++
2,179,377 UART: [kat] sha1
2,179,917 UART: [kat] SHA2-256
2,180,659 UART: [kat] SHA2-384
2,181,327 UART: [kat] SHA2-512-ACC
2,182,212 UART: [kat] ECC-384
3,776,601 UART: [kat] HMAC-384Kdf
3,803,263 UART: [kat] LMS
4,876,421 UART: [kat] --
4,881,505 UART: [cold-reset] ++
4,883,021 UART: [fht] FHT @ 0x50003400
4,893,934 UART: [idev] ++
4,894,638 UART: [idev] CDI.KEYID = 6
4,895,759 UART: [idev] SUBJECT.KEYID = 7
4,896,971 UART: [idev] UDS.KEYID = 0
4,930,458 UART: [idev] Erasing UDS.KEYID = 0
8,246,249 UART: [idev] Sha1 KeyId Algorithm
8,269,120 UART: [idev] --
8,274,136 UART: [ldev] ++
8,274,713 UART: [ldev] CDI.KEYID = 6
8,275,897 UART: [ldev] SUBJECT.KEYID = 5
8,277,060 UART: [ldev] AUTHORITY.KEYID = 7
8,278,294 UART: [ldev] FE.KEYID = 1
8,317,729 UART: [ldev] Erasing FE.KEYID = 1
11,655,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,939 UART: [ldev] --
14,037,113 UART: [fwproc] Wait for Commands...
14,038,729 UART: [fwproc] Recv command 0x46574c44
14,041,058 UART: [fwproc] Recv'd Img size: 113844 bytes
18,106,143 UART: ROM Fatal Error: 0x000B0028
18,109,573 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
2,023,381 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,866,590 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,024,817 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,168,661 UART:
2,169,057 UART: Running Caliptra ROM ...
2,170,232 UART:
2,170,410 UART: [state] CFI Enabled
2,171,367 UART: [state] LifecycleState = Unprovisioned
2,173,010 UART: [state] DebugLocked = No
2,174,117 UART: [state] WD Timer not started. Device not locked for debugging
2,176,587 UART: [kat] SHA2-256
2,177,251 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,276 UART: [kat] ++
2,180,723 UART: [kat] sha1
2,181,228 UART: [kat] SHA2-256
2,181,961 UART: [kat] SHA2-384
2,182,623 UART: [kat] SHA2-512-ACC
2,183,494 UART: [kat] ECC-384
4,100,511 UART: [kat] HMAC-384Kdf
4,113,051 UART: [kat] LMS
5,186,203 UART: [kat] --
5,191,439 UART: [cold-reset] ++
5,194,065 UART: [fht] FHT @ 0x50003400
5,205,165 UART: [idev] ++
5,205,835 UART: [idev] CDI.KEYID = 6
5,207,064 UART: [idev] SUBJECT.KEYID = 7
5,208,501 UART: [idev] UDS.KEYID = 0
5,222,588 UART: [idev] Erasing UDS.KEYID = 0
8,494,414 UART: [idev] Sha1 KeyId Algorithm
8,517,216 UART: [idev] --
8,521,643 UART: [ldev] ++
8,522,208 UART: [ldev] CDI.KEYID = 6
8,523,441 UART: [ldev] SUBJECT.KEYID = 5
8,524,931 UART: [ldev] AUTHORITY.KEYID = 7
8,526,499 UART: [ldev] FE.KEYID = 1
8,538,768 UART: [ldev] Erasing FE.KEYID = 1
11,830,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,926 UART: [ldev] --
14,196,486 UART: [fwproc] Wait for Commands...
14,199,171 UART: [fwproc] Recv command 0x46574c44
14,201,455 UART: [fwproc] Recv'd Img size: 113844 bytes
18,273,083 UART: ROM Fatal Error: 0x000B0028
18,276,494 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,024,484 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,072,085 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
2,026,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,170,056 UART:
2,170,462 UART: Running Caliptra ROM ...
2,171,665 UART:
2,171,840 UART: [state] CFI Enabled
2,173,073 UART: [state] LifecycleState = Unprovisioned
2,174,740 UART: [state] DebugLocked = No
2,175,853 UART: [state] WD Timer not started. Device not locked for debugging
2,178,327 UART: [kat] SHA2-256
2,178,996 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,004 UART: [kat] ++
2,182,459 UART: [kat] sha1
2,182,995 UART: [kat] SHA2-256
2,183,738 UART: [kat] SHA2-384
2,184,404 UART: [kat] SHA2-512-ACC
2,185,236 UART: [kat] ECC-384
2,948,186 UART: [kat] HMAC-384Kdf
2,972,538 UART: [kat] LMS
3,501,957 UART: [kat] --
3,507,532 UART: [cold-reset] ++
3,509,252 UART: [fht] FHT @ 0x50003400
3,520,620 UART: [idev] ++
3,521,184 UART: [idev] CDI.KEYID = 6
3,522,121 UART: [idev] SUBJECT.KEYID = 7
3,523,336 UART: [idev] UDS.KEYID = 0
3,559,708 UART: [idev] Erasing UDS.KEYID = 0
6,042,454 UART: [idev] Sha1 KeyId Algorithm
6,066,063 UART: [idev] --
6,070,620 UART: [ldev] ++
6,071,195 UART: [ldev] CDI.KEYID = 6
6,072,111 UART: [ldev] SUBJECT.KEYID = 5
6,073,328 UART: [ldev] AUTHORITY.KEYID = 7
6,074,565 UART: [ldev] FE.KEYID = 1
6,115,414 UART: [ldev] Erasing FE.KEYID = 1
8,619,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,482 UART: [ldev] --
10,428,464 UART: [fwproc] Wait for Commands...
10,430,627 UART: [fwproc] Recv command 0x46574c44
10,432,729 UART: [fwproc] Recv'd Img size: 114168 bytes
13,829,516 UART: ROM Fatal Error: 0x000B0028
13,832,682 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,024,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,631,578 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,026,676 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,171,042 UART:
2,171,458 UART: Running Caliptra ROM ...
2,172,579 UART:
2,172,748 UART: [state] CFI Enabled
2,173,718 UART: [state] LifecycleState = Unprovisioned
2,175,378 UART: [state] DebugLocked = No
2,176,482 UART: [state] WD Timer not started. Device not locked for debugging
2,179,175 UART: [kat] SHA2-256
2,179,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,876 UART: [kat] ++
2,183,329 UART: [kat] sha1
2,183,839 UART: [kat] SHA2-256
2,184,492 UART: [kat] SHA2-384
2,185,172 UART: [kat] SHA2-512-ACC
2,185,994 UART: [kat] ECC-384
3,281,110 UART: [kat] HMAC-384Kdf
3,294,478 UART: [kat] LMS
3,823,932 UART: [kat] --
3,827,775 UART: [cold-reset] ++
3,829,110 UART: [fht] FHT @ 0x50003400
3,840,893 UART: [idev] ++
3,841,488 UART: [idev] CDI.KEYID = 6
3,842,372 UART: [idev] SUBJECT.KEYID = 7
3,843,582 UART: [idev] UDS.KEYID = 0
3,861,224 UART: [idev] Erasing UDS.KEYID = 0
6,317,677 UART: [idev] Sha1 KeyId Algorithm
6,341,111 UART: [idev] --
6,345,884 UART: [ldev] ++
6,346,458 UART: [ldev] CDI.KEYID = 6
6,347,367 UART: [ldev] SUBJECT.KEYID = 5
6,348,577 UART: [ldev] AUTHORITY.KEYID = 7
6,349,801 UART: [ldev] FE.KEYID = 1
6,359,358 UART: [ldev] Erasing FE.KEYID = 1
8,830,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,903 UART: [ldev] --
10,619,784 UART: [fwproc] Wait for Commands...
10,622,081 UART: [fwproc] Recv command 0x46574c44
10,624,183 UART: [fwproc] Recv'd Img size: 114168 bytes
14,014,955 UART: ROM Fatal Error: 0x000B0028
14,018,210 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
2,025,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,809,214 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
2,025,587 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,667 UART:
2,170,062 UART: Running Caliptra ROM ...
2,171,238 UART:
2,171,424 UART: [state] CFI Enabled
2,172,398 UART: [state] LifecycleState = Unprovisioned
2,174,043 UART: [state] DebugLocked = No
2,175,154 UART: [state] WD Timer not started. Device not locked for debugging
2,177,620 UART: [kat] SHA2-256
2,178,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,529 UART: [kat] ++
2,181,980 UART: [kat] sha1
2,182,494 UART: [kat] SHA2-256
2,183,236 UART: [kat] SHA2-384
2,183,903 UART: [kat] SHA2-512-ACC
2,184,791 UART: [kat] ECC-384
2,947,959 UART: [kat] HMAC-384Kdf
2,964,208 UART: [kat] LMS
3,493,632 UART: [kat] --
3,498,377 UART: [cold-reset] ++
3,499,654 UART: [fht] FHT @ 0x50003400
3,511,392 UART: [idev] ++
3,511,954 UART: [idev] CDI.KEYID = 6
3,512,889 UART: [idev] SUBJECT.KEYID = 7
3,514,103 UART: [idev] UDS.KEYID = 0
3,534,436 UART: [idev] Erasing UDS.KEYID = 0
6,019,210 UART: [idev] Sha1 KeyId Algorithm
6,042,337 UART: [idev] --
6,046,445 UART: [ldev] ++
6,047,017 UART: [ldev] CDI.KEYID = 6
6,047,903 UART: [ldev] SUBJECT.KEYID = 5
6,049,118 UART: [ldev] AUTHORITY.KEYID = 7
6,050,352 UART: [ldev] FE.KEYID = 1
6,090,653 UART: [ldev] Erasing FE.KEYID = 1
8,594,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,539 UART: [ldev] --
10,404,747 UART: [fwproc] Wait for Commands...
10,407,437 UART: [fwproc] Recv command 0x46574c44
10,409,536 UART: [fwproc] Recv'd Img size: 114168 bytes
13,805,704 UART: ROM Fatal Error: 0x000B0028
13,808,839 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,025,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,580,622 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,025,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,170,362 UART:
2,170,770 UART: Running Caliptra ROM ...
2,171,851 UART:
2,172,008 UART: [state] CFI Enabled
2,172,990 UART: [state] LifecycleState = Unprovisioned
2,174,634 UART: [state] DebugLocked = No
2,175,656 UART: [state] WD Timer not started. Device not locked for debugging
2,178,126 UART: [kat] SHA2-256
2,178,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,815 UART: [kat] ++
2,182,264 UART: [kat] sha1
2,182,772 UART: [kat] SHA2-256
2,183,663 UART: [kat] SHA2-384
2,184,332 UART: [kat] SHA2-512-ACC
2,185,226 UART: [kat] ECC-384
3,283,930 UART: [kat] HMAC-384Kdf
3,296,991 UART: [kat] LMS
3,826,469 UART: [kat] --
3,829,433 UART: [cold-reset] ++
3,830,501 UART: [fht] FHT @ 0x50003400
3,840,999 UART: [idev] ++
3,841,557 UART: [idev] CDI.KEYID = 6
3,842,521 UART: [idev] SUBJECT.KEYID = 7
3,843,679 UART: [idev] UDS.KEYID = 0
3,860,356 UART: [idev] Erasing UDS.KEYID = 0
6,316,092 UART: [idev] Sha1 KeyId Algorithm
6,339,801 UART: [idev] --
6,342,603 UART: [ldev] ++
6,343,370 UART: [ldev] CDI.KEYID = 6
6,344,291 UART: [ldev] SUBJECT.KEYID = 5
6,345,398 UART: [ldev] AUTHORITY.KEYID = 7
6,346,573 UART: [ldev] FE.KEYID = 1
6,358,152 UART: [ldev] Erasing FE.KEYID = 1
8,833,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,523 UART: [ldev] --
10,626,495 UART: [fwproc] Wait for Commands...
10,628,375 UART: [fwproc] Recv command 0x46574c44
10,630,418 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,894 UART: ROM Fatal Error: 0x000B0028
14,033,047 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
2,024,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,819,402 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,769 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,156 UART: [ldev] Erasing FE.KEYID = 1
1,241,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,600 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,533 UART: [fwproc] Recv command 0x46574c44
1,282,266 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,144 UART: ROM Fatal Error: 0x000B0028
2,578,301 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,344 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,278 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,406 UART: [kat] SHA2-256
901,346 UART: [kat] SHA2-384
904,217 UART: [kat] SHA2-512-ACC
906,118 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,463 UART: [kat] LMS
1,168,775 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,316 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,200,132 UART: [idev] Sha1 KeyId Algorithm
1,209,010 UART: [idev] --
1,210,247 UART: [ldev] ++
1,210,415 UART: [ldev] CDI.KEYID = 6
1,210,779 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,217,001 UART: [ldev] Erasing FE.KEYID = 1
1,244,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,223 UART: [ldev] --
1,283,515 UART: [fwproc] Wait for Commands...
1,284,144 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,981 UART: ROM Fatal Error: 0x000B0028
2,581,138 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,119 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,953 UART: [cold-reset] ++
1,170,395 UART: [fht] FHT @ 0x50003400
1,172,941 UART: [idev] ++
1,173,109 UART: [idev] CDI.KEYID = 6
1,173,470 UART: [idev] SUBJECT.KEYID = 7
1,173,895 UART: [idev] UDS.KEYID = 0
1,182,291 UART: [idev] Erasing UDS.KEYID = 0
1,199,543 UART: [idev] Sha1 KeyId Algorithm
1,208,413 UART: [idev] --
1,209,556 UART: [ldev] ++
1,209,724 UART: [ldev] CDI.KEYID = 6
1,210,088 UART: [ldev] SUBJECT.KEYID = 5
1,210,515 UART: [ldev] AUTHORITY.KEYID = 7
1,210,978 UART: [ldev] FE.KEYID = 1
1,216,146 UART: [ldev] Erasing FE.KEYID = 1
1,242,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,312 UART: [ldev] --
1,281,796 UART: [fwproc] Wait for Commands...
1,282,473 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,932 UART: ROM Fatal Error: 0x000B0028
2,580,089 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,506 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,496 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,642 UART: [idev] ++
1,173,810 UART: [idev] CDI.KEYID = 6
1,174,171 UART: [idev] SUBJECT.KEYID = 7
1,174,596 UART: [idev] UDS.KEYID = 0
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,200,178 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,783 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,495 UART: [fwproc] Wait for Commands...
1,283,158 UART: [fwproc] Recv command 0x46574c44
1,283,891 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,321 UART: ROM Fatal Error: 0x000B0028
2,579,478 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,263 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,784 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,405 UART: [cold-reset] ++
1,169,807 UART: [fht] FHT @ 0x50003400
1,172,567 UART: [idev] ++
1,172,735 UART: [idev] CDI.KEYID = 6
1,173,096 UART: [idev] SUBJECT.KEYID = 7
1,173,521 UART: [idev] UDS.KEYID = 0
1,181,259 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,548 UART: [ldev] ++
1,208,716 UART: [ldev] CDI.KEYID = 6
1,209,080 UART: [ldev] SUBJECT.KEYID = 5
1,209,507 UART: [ldev] AUTHORITY.KEYID = 7
1,209,970 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,376 UART: [ldev] --
1,280,788 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,038 UART: ROM Fatal Error: 0x000B0028
2,579,195 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,180 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,042 UART: [kat] SHA2-256
901,982 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,182,256 UART: [idev] Erasing UDS.KEYID = 0
1,199,110 UART: [idev] Sha1 KeyId Algorithm
1,208,052 UART: [idev] --
1,209,145 UART: [ldev] ++
1,209,313 UART: [ldev] CDI.KEYID = 6
1,209,677 UART: [ldev] SUBJECT.KEYID = 5
1,210,104 UART: [ldev] AUTHORITY.KEYID = 7
1,210,567 UART: [ldev] FE.KEYID = 1
1,215,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,977 UART: [ldev] --
1,281,267 UART: [fwproc] Wait for Commands...
1,281,964 UART: [fwproc] Recv command 0x46574c44
1,282,697 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,557 UART: ROM Fatal Error: 0x000B0028
2,579,714 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,337 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
5,461 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,169 UART:
192,618 UART: Running Caliptra ROM ...
193,710 UART:
193,883 UART: [state] CFI Enabled
267,909 UART: [state] LifecycleState = Manufacturing
270,280 UART: [state] DebugLocked = No
271,825 UART: [state] WD Timer not started. Device not locked for debugging
275,785 UART: [kat] SHA2-256
457,708 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,216 UART: [kat] ++
469,760 UART: [kat] sha1
480,852 UART: [kat] SHA2-256
483,859 UART: [kat] SHA2-384
489,181 UART: [kat] SHA2-512-ACC
491,788 UART: [kat] ECC-384
3,776,765 UART: [kat] HMAC-384Kdf
3,806,220 UART: [kat] LMS
4,879,372 UART: [kat] --
4,882,930 UART: [cold-reset] ++
4,884,667 UART: [fht] FHT @ 0x50003400
4,896,561 UART: [idev] ++
4,897,280 UART: [idev] CDI.KEYID = 6
4,898,395 UART: [idev] SUBJECT.KEYID = 7
4,899,607 UART: [idev] UDS.KEYID = 0
4,935,113 UART: [idev] Erasing UDS.KEYID = 0
8,247,055 UART: [idev] Sha1 KeyId Algorithm
8,268,554 UART: [idev] --
8,273,448 UART: [ldev] ++
8,274,030 UART: [ldev] CDI.KEYID = 6
8,275,278 UART: [ldev] SUBJECT.KEYID = 5
8,276,307 UART: [ldev] AUTHORITY.KEYID = 7
8,277,595 UART: [ldev] FE.KEYID = 1
8,322,481 UART: [ldev] Erasing FE.KEYID = 1
11,658,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,969,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,985,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,001,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,017,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,038,105 UART: [ldev] --
14,043,483 UART: [fwproc] Wait for Commands...
14,044,936 UART: [fwproc] Recv command 0x46574c44
14,046,925 UART: [fwproc] Recv'd Img size: 113844 bytes
18,134,482 UART: ROM Fatal Error: 0x000B002C
18,137,827 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
5,187 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,940,947 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
6,376 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,652 UART:
193,022 UART: Running Caliptra ROM ...
194,111 UART:
603,903 UART: [state] CFI Enabled
618,885 UART: [state] LifecycleState = Manufacturing
621,270 UART: [state] DebugLocked = No
623,212 UART: [state] WD Timer not started. Device not locked for debugging
627,552 UART: [kat] SHA2-256
809,531 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,088 UART: [kat] ++
821,601 UART: [kat] sha1
832,407 UART: [kat] SHA2-256
835,419 UART: [kat] SHA2-384
842,201 UART: [kat] SHA2-512-ACC
844,857 UART: [kat] ECC-384
4,101,796 UART: [kat] HMAC-384Kdf
4,115,061 UART: [kat] LMS
5,188,228 UART: [kat] --
5,192,217 UART: [cold-reset] ++
5,193,501 UART: [fht] FHT @ 0x50003400
5,203,554 UART: [idev] ++
5,204,222 UART: [idev] CDI.KEYID = 6
5,205,444 UART: [idev] SUBJECT.KEYID = 7
5,206,917 UART: [idev] UDS.KEYID = 0
5,223,585 UART: [idev] Erasing UDS.KEYID = 0
8,498,659 UART: [idev] Sha1 KeyId Algorithm
8,519,788 UART: [idev] --
8,522,107 UART: [ldev] ++
8,522,677 UART: [ldev] CDI.KEYID = 6
8,523,822 UART: [ldev] SUBJECT.KEYID = 5
8,525,293 UART: [ldev] AUTHORITY.KEYID = 7
8,526,894 UART: [ldev] FE.KEYID = 1
8,536,698 UART: [ldev] Erasing FE.KEYID = 1
11,825,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,142 UART: [ldev] --
14,192,973 UART: [fwproc] Wait for Commands...
14,195,388 UART: [fwproc] Recv command 0x46574c44
14,197,719 UART: [fwproc] Recv'd Img size: 113844 bytes
18,298,689 UART: ROM Fatal Error: 0x000B002C
18,302,086 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
6,158 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,124,441 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
5,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,114 UART:
192,514 UART: Running Caliptra ROM ...
193,680 UART:
193,829 UART: [state] CFI Enabled
264,280 UART: [state] LifecycleState = Manufacturing
266,138 UART: [state] DebugLocked = No
267,794 UART: [state] WD Timer not started. Device not locked for debugging
270,767 UART: [kat] SHA2-256
449,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,445 UART: [kat] ++
461,983 UART: [kat] sha1
472,921 UART: [kat] SHA2-256
475,931 UART: [kat] SHA2-384
482,715 UART: [kat] SHA2-512-ACC
485,650 UART: [kat] ECC-384
2,930,859 UART: [kat] HMAC-384Kdf
2,952,881 UART: [kat] LMS
3,482,349 UART: [kat] --
3,485,990 UART: [cold-reset] ++
3,487,874 UART: [fht] FHT @ 0x50003400
3,499,942 UART: [idev] ++
3,500,510 UART: [idev] CDI.KEYID = 6
3,501,395 UART: [idev] SUBJECT.KEYID = 7
3,502,610 UART: [idev] UDS.KEYID = 0
3,523,889 UART: [idev] Erasing UDS.KEYID = 0
6,005,521 UART: [idev] Sha1 KeyId Algorithm
6,027,971 UART: [idev] --
6,030,887 UART: [ldev] ++
6,031,463 UART: [ldev] CDI.KEYID = 6
6,032,350 UART: [ldev] SUBJECT.KEYID = 5
6,033,512 UART: [ldev] AUTHORITY.KEYID = 7
6,034,804 UART: [ldev] FE.KEYID = 1
6,082,057 UART: [ldev] Erasing FE.KEYID = 1
8,585,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,094 UART: [ldev] --
10,395,983 UART: [fwproc] Wait for Commands...
10,397,865 UART: [fwproc] Recv command 0x46574c44
10,399,909 UART: [fwproc] Recv'd Img size: 114168 bytes
13,829,451 UART: ROM Fatal Error: 0x000B002C
13,832,581 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
5,694 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,614,703 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
6,044 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,331 UART:
192,707 UART: Running Caliptra ROM ...
193,813 UART:
603,323 UART: [state] CFI Enabled
615,020 UART: [state] LifecycleState = Manufacturing
616,901 UART: [state] DebugLocked = No
619,138 UART: [state] WD Timer not started. Device not locked for debugging
622,645 UART: [kat] SHA2-256
801,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,318 UART: [kat] ++
813,852 UART: [kat] sha1
825,329 UART: [kat] SHA2-256
828,382 UART: [kat] SHA2-384
833,230 UART: [kat] SHA2-512-ACC
836,205 UART: [kat] ECC-384
3,275,336 UART: [kat] HMAC-384Kdf
3,287,399 UART: [kat] LMS
3,816,908 UART: [kat] --
3,821,509 UART: [cold-reset] ++
3,823,108 UART: [fht] FHT @ 0x50003400
3,834,298 UART: [idev] ++
3,834,862 UART: [idev] CDI.KEYID = 6
3,835,772 UART: [idev] SUBJECT.KEYID = 7
3,836,980 UART: [idev] UDS.KEYID = 0
3,852,898 UART: [idev] Erasing UDS.KEYID = 0
6,310,465 UART: [idev] Sha1 KeyId Algorithm
6,333,383 UART: [idev] --
6,337,049 UART: [ldev] ++
6,337,618 UART: [ldev] CDI.KEYID = 6
6,338,530 UART: [ldev] SUBJECT.KEYID = 5
6,339,738 UART: [ldev] AUTHORITY.KEYID = 7
6,340,963 UART: [ldev] FE.KEYID = 1
6,353,280 UART: [ldev] Erasing FE.KEYID = 1
8,828,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,897 UART: [ldev] --
10,620,028 UART: [fwproc] Wait for Commands...
10,622,290 UART: [fwproc] Recv command 0x46574c44
10,624,382 UART: [fwproc] Recv'd Img size: 114168 bytes
14,055,438 UART: ROM Fatal Error: 0x000B002C
14,058,508 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
6,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,834,771 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
5,912 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,392 UART:
192,749 UART: Running Caliptra ROM ...
193,910 UART:
194,062 UART: [state] CFI Enabled
266,424 UART: [state] LifecycleState = Manufacturing
268,343 UART: [state] DebugLocked = No
269,619 UART: [state] WD Timer not started. Device not locked for debugging
273,459 UART: [kat] SHA2-256
452,593 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,179 UART: [kat] ++
464,626 UART: [kat] sha1
476,579 UART: [kat] SHA2-256
479,593 UART: [kat] SHA2-384
485,929 UART: [kat] SHA2-512-ACC
488,866 UART: [kat] ECC-384
2,947,762 UART: [kat] HMAC-384Kdf
2,973,618 UART: [kat] LMS
3,503,094 UART: [kat] --
3,508,502 UART: [cold-reset] ++
3,509,895 UART: [fht] FHT @ 0x50003400
3,520,651 UART: [idev] ++
3,521,246 UART: [idev] CDI.KEYID = 6
3,522,311 UART: [idev] SUBJECT.KEYID = 7
3,523,416 UART: [idev] UDS.KEYID = 0
3,545,063 UART: [idev] Erasing UDS.KEYID = 0
6,028,915 UART: [idev] Sha1 KeyId Algorithm
6,052,843 UART: [idev] --
6,057,764 UART: [ldev] ++
6,058,335 UART: [ldev] CDI.KEYID = 6
6,059,221 UART: [ldev] SUBJECT.KEYID = 5
6,060,432 UART: [ldev] AUTHORITY.KEYID = 7
6,061,747 UART: [ldev] FE.KEYID = 1
6,103,002 UART: [ldev] Erasing FE.KEYID = 1
8,606,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,075 UART: [ldev] --
10,415,658 UART: [fwproc] Wait for Commands...
10,418,192 UART: [fwproc] Recv command 0x46574c44
10,420,293 UART: [fwproc] Recv'd Img size: 114168 bytes
13,849,658 UART: ROM Fatal Error: 0x000B002C
13,852,741 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
5,181 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,592,865 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
6,218 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,491 UART:
192,892 UART: Running Caliptra ROM ...
193,986 UART:
603,551 UART: [state] CFI Enabled
619,366 UART: [state] LifecycleState = Manufacturing
621,257 UART: [state] DebugLocked = No
622,580 UART: [state] WD Timer not started. Device not locked for debugging
626,472 UART: [kat] SHA2-256
805,557 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,132 UART: [kat] ++
817,676 UART: [kat] sha1
827,803 UART: [kat] SHA2-256
830,816 UART: [kat] SHA2-384
837,007 UART: [kat] SHA2-512-ACC
839,937 UART: [kat] ECC-384
3,280,158 UART: [kat] HMAC-384Kdf
3,291,669 UART: [kat] LMS
3,821,137 UART: [kat] --
3,825,830 UART: [cold-reset] ++
3,826,892 UART: [fht] FHT @ 0x50003400
3,837,898 UART: [idev] ++
3,838,457 UART: [idev] CDI.KEYID = 6
3,839,372 UART: [idev] SUBJECT.KEYID = 7
3,840,588 UART: [idev] UDS.KEYID = 0
3,858,893 UART: [idev] Erasing UDS.KEYID = 0
6,312,098 UART: [idev] Sha1 KeyId Algorithm
6,334,463 UART: [idev] --
6,338,799 UART: [ldev] ++
6,339,373 UART: [ldev] CDI.KEYID = 6
6,340,278 UART: [ldev] SUBJECT.KEYID = 5
6,341,491 UART: [ldev] AUTHORITY.KEYID = 7
6,342,722 UART: [ldev] FE.KEYID = 1
6,354,903 UART: [ldev] Erasing FE.KEYID = 1
8,826,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,913 UART: [ldev] --
10,616,824 UART: [fwproc] Wait for Commands...
10,619,206 UART: [fwproc] Recv command 0x46574c44
10,621,302 UART: [fwproc] Recv'd Img size: 114168 bytes
14,050,397 UART: ROM Fatal Error: 0x000B002C
14,053,528 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
6,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,846,363 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Manufacturing
85,865 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
891,420 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
899,995 UART: [kat] SHA2-256
901,935 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,710 UART: [kat] HMAC-384Kdf
921,352 UART: [kat] LMS
1,169,664 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,031 UART: [fht] FHT @ 0x50003400
1,173,755 UART: [idev] ++
1,173,923 UART: [idev] CDI.KEYID = 6
1,174,284 UART: [idev] SUBJECT.KEYID = 7
1,174,709 UART: [idev] UDS.KEYID = 0
1,182,719 UART: [idev] Erasing UDS.KEYID = 0
1,199,847 UART: [idev] Sha1 KeyId Algorithm
1,208,517 UART: [idev] --
1,209,492 UART: [ldev] ++
1,209,660 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,451 UART: [ldev] AUTHORITY.KEYID = 7
1,210,914 UART: [ldev] FE.KEYID = 1
1,216,242 UART: [ldev] Erasing FE.KEYID = 1
1,242,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,126 UART: [ldev] --
1,281,390 UART: [fwproc] Wait for Commands...
1,282,047 UART: [fwproc] Recv command 0x46574c44
1,282,780 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,273 UART: ROM Fatal Error: 0x000B002C
2,604,432 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,455,775 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Manufacturing
85,938 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,230 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,198,994 UART: [idev] Sha1 KeyId Algorithm
1,207,906 UART: [idev] --
1,208,869 UART: [ldev] ++
1,209,037 UART: [ldev] CDI.KEYID = 6
1,209,401 UART: [ldev] SUBJECT.KEYID = 5
1,209,828 UART: [ldev] AUTHORITY.KEYID = 7
1,210,291 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,921 UART: [ldev] --
1,281,191 UART: [fwproc] Wait for Commands...
1,281,828 UART: [fwproc] Recv command 0x46574c44
1,282,561 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,664 UART: ROM Fatal Error: 0x000B002C
2,603,823 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,457,214 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Manufacturing
85,667 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,362 UART: [kat] LMS
1,168,674 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,199,133 UART: [idev] Sha1 KeyId Algorithm
1,208,099 UART: [idev] --
1,209,316 UART: [ldev] ++
1,209,484 UART: [ldev] CDI.KEYID = 6
1,209,848 UART: [ldev] SUBJECT.KEYID = 5
1,210,275 UART: [ldev] AUTHORITY.KEYID = 7
1,210,738 UART: [ldev] FE.KEYID = 1
1,215,950 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,178 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,247 UART: [fwproc] Recv command 0x46574c44
1,282,980 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,855 UART: ROM Fatal Error: 0x000B002C
2,604,014 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,453,225 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Manufacturing
86,040 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
915,427 UART: [kat] HMAC-384Kdf
919,963 UART: [kat] LMS
1,168,275 UART: [kat] --
1,169,120 UART: [cold-reset] ++
1,169,622 UART: [fht] FHT @ 0x50003400
1,172,254 UART: [idev] ++
1,172,422 UART: [idev] CDI.KEYID = 6
1,172,783 UART: [idev] SUBJECT.KEYID = 7
1,173,208 UART: [idev] UDS.KEYID = 0
1,181,546 UART: [idev] Erasing UDS.KEYID = 0
1,198,712 UART: [idev] Sha1 KeyId Algorithm
1,207,574 UART: [idev] --
1,208,695 UART: [ldev] ++
1,208,863 UART: [ldev] CDI.KEYID = 6
1,209,227 UART: [ldev] SUBJECT.KEYID = 5
1,209,654 UART: [ldev] AUTHORITY.KEYID = 7
1,210,117 UART: [ldev] FE.KEYID = 1
1,215,407 UART: [ldev] Erasing FE.KEYID = 1
1,241,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,949 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,432 UART: ROM Fatal Error: 0x000B002C
2,603,591 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,457,034 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Manufacturing
85,651 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,457 UART: [kat] SHA2-256
901,397 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,075 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,211 UART: [idev] Sha1 KeyId Algorithm
1,208,073 UART: [idev] --
1,209,212 UART: [ldev] ++
1,209,380 UART: [ldev] CDI.KEYID = 6
1,209,744 UART: [ldev] SUBJECT.KEYID = 5
1,210,171 UART: [ldev] AUTHORITY.KEYID = 7
1,210,634 UART: [ldev] FE.KEYID = 1
1,215,712 UART: [ldev] Erasing FE.KEYID = 1
1,241,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,604 UART: [ldev] --
1,281,120 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,201 UART: ROM Fatal Error: 0x000B002C
2,603,360 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,456,399 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Manufacturing
85,974 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,856 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,182,906 UART: [idev] Erasing UDS.KEYID = 0
1,199,912 UART: [idev] Sha1 KeyId Algorithm
1,208,890 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,679 UART: [ldev] --
1,282,011 UART: [fwproc] Wait for Commands...
1,282,668 UART: [fwproc] Recv command 0x46574c44
1,283,401 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,490 UART: ROM Fatal Error: 0x000B002C
2,605,649 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,458,686 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
5,414 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,041 UART:
192,425 UART: Running Caliptra ROM ...
193,600 UART:
193,748 UART: [state] CFI Enabled
262,772 UART: [state] LifecycleState = Manufacturing
265,150 UART: [state] DebugLocked = No
267,612 UART: [state] WD Timer not started. Device not locked for debugging
272,812 UART: [kat] SHA2-256
454,748 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,265 UART: [kat] ++
466,712 UART: [kat] sha1
477,538 UART: [kat] SHA2-256
480,567 UART: [kat] SHA2-384
486,860 UART: [kat] SHA2-512-ACC
489,472 UART: [kat] ECC-384
3,778,615 UART: [kat] HMAC-384Kdf
3,803,119 UART: [kat] LMS
4,876,276 UART: [kat] --
4,881,944 UART: [cold-reset] ++
4,884,747 UART: [fht] FHT @ 0x50003400
4,895,787 UART: [idev] ++
4,896,458 UART: [idev] CDI.KEYID = 6
4,897,691 UART: [idev] SUBJECT.KEYID = 7
4,898,856 UART: [idev] UDS.KEYID = 0
4,929,768 UART: [idev] Erasing UDS.KEYID = 0
8,245,337 UART: [idev] Sha1 KeyId Algorithm
8,267,439 UART: [idev] --
8,271,492 UART: [ldev] ++
8,272,187 UART: [ldev] CDI.KEYID = 6
8,273,427 UART: [ldev] SUBJECT.KEYID = 5
8,274,453 UART: [ldev] AUTHORITY.KEYID = 7
8,275,795 UART: [ldev] FE.KEYID = 1
8,317,692 UART: [ldev] Erasing FE.KEYID = 1
11,649,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,137 UART: [ldev] --
14,038,348 UART: [fwproc] Wait for Commands...
14,040,712 UART: [fwproc] Recv command 0x46574c44
14,043,029 UART: [fwproc] Recv'd Img size: 113844 bytes
18,142,058 UART: ROM Fatal Error: 0x000B002E
18,145,472 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
5,273 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,899,043 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
6,009 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,325 UART:
192,709 UART: Running Caliptra ROM ...
193,820 UART:
603,554 UART: [state] CFI Enabled
619,958 UART: [state] LifecycleState = Manufacturing
622,335 UART: [state] DebugLocked = No
625,218 UART: [state] WD Timer not started. Device not locked for debugging
629,802 UART: [kat] SHA2-256
811,749 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,302 UART: [kat] ++
824,032 UART: [kat] sha1
833,141 UART: [kat] SHA2-256
836,154 UART: [kat] SHA2-384
843,095 UART: [kat] SHA2-512-ACC
845,753 UART: [kat] ECC-384
4,100,438 UART: [kat] HMAC-384Kdf
4,111,268 UART: [kat] LMS
5,184,440 UART: [kat] --
5,189,144 UART: [cold-reset] ++
5,190,372 UART: [fht] FHT @ 0x50003400
5,203,287 UART: [idev] ++
5,203,960 UART: [idev] CDI.KEYID = 6
5,205,185 UART: [idev] SUBJECT.KEYID = 7
5,206,610 UART: [idev] UDS.KEYID = 0
5,225,126 UART: [idev] Erasing UDS.KEYID = 0
8,499,057 UART: [idev] Sha1 KeyId Algorithm
8,522,028 UART: [idev] --
8,526,272 UART: [ldev] ++
8,526,900 UART: [ldev] CDI.KEYID = 6
8,527,998 UART: [ldev] SUBJECT.KEYID = 5
8,529,523 UART: [ldev] AUTHORITY.KEYID = 7
8,531,046 UART: [ldev] FE.KEYID = 1
8,541,422 UART: [ldev] Erasing FE.KEYID = 1
11,828,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,743 UART: [ldev] --
14,194,965 UART: [fwproc] Wait for Commands...
14,196,576 UART: [fwproc] Recv command 0x46574c44
14,198,906 UART: [fwproc] Recv'd Img size: 113844 bytes
18,289,341 UART: ROM Fatal Error: 0x000B002E
18,292,687 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
6,128 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,115,183 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
5,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,296 UART:
192,682 UART: Running Caliptra ROM ...
193,853 UART:
194,027 UART: [state] CFI Enabled
263,423 UART: [state] LifecycleState = Manufacturing
265,348 UART: [state] DebugLocked = No
267,165 UART: [state] WD Timer not started. Device not locked for debugging
271,228 UART: [kat] SHA2-256
450,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,945 UART: [kat] ++
462,394 UART: [kat] sha1
473,492 UART: [kat] SHA2-256
476,538 UART: [kat] SHA2-384
481,653 UART: [kat] SHA2-512-ACC
484,639 UART: [kat] ECC-384
2,949,136 UART: [kat] HMAC-384Kdf
2,973,741 UART: [kat] LMS
3,503,229 UART: [kat] --
3,506,314 UART: [cold-reset] ++
3,508,259 UART: [fht] FHT @ 0x50003400
3,519,461 UART: [idev] ++
3,520,032 UART: [idev] CDI.KEYID = 6
3,520,950 UART: [idev] SUBJECT.KEYID = 7
3,522,163 UART: [idev] UDS.KEYID = 0
3,545,537 UART: [idev] Erasing UDS.KEYID = 0
6,028,416 UART: [idev] Sha1 KeyId Algorithm
6,050,224 UART: [idev] --
6,053,472 UART: [ldev] ++
6,054,049 UART: [ldev] CDI.KEYID = 6
6,054,961 UART: [ldev] SUBJECT.KEYID = 5
6,056,160 UART: [ldev] AUTHORITY.KEYID = 7
6,057,406 UART: [ldev] FE.KEYID = 1
6,100,587 UART: [ldev] Erasing FE.KEYID = 1
8,606,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,477 UART: [ldev] --
10,414,884 UART: [fwproc] Wait for Commands...
10,417,091 UART: [fwproc] Recv command 0x46574c44
10,419,204 UART: [fwproc] Recv'd Img size: 114168 bytes
13,848,909 UART: ROM Fatal Error: 0x000B002E
13,851,982 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
5,246 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,638,215 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
6,948 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,354 UART:
192,754 UART: Running Caliptra ROM ...
193,930 UART:
603,570 UART: [state] CFI Enabled
616,181 UART: [state] LifecycleState = Manufacturing
618,006 UART: [state] DebugLocked = No
620,012 UART: [state] WD Timer not started. Device not locked for debugging
623,473 UART: [kat] SHA2-256
802,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,163 UART: [kat] ++
814,619 UART: [kat] sha1
825,008 UART: [kat] SHA2-256
828,033 UART: [kat] SHA2-384
835,417 UART: [kat] SHA2-512-ACC
838,347 UART: [kat] ECC-384
3,279,563 UART: [kat] HMAC-384Kdf
3,292,132 UART: [kat] LMS
3,821,605 UART: [kat] --
3,828,074 UART: [cold-reset] ++
3,829,246 UART: [fht] FHT @ 0x50003400
3,840,654 UART: [idev] ++
3,841,215 UART: [idev] CDI.KEYID = 6
3,842,178 UART: [idev] SUBJECT.KEYID = 7
3,843,397 UART: [idev] UDS.KEYID = 0
3,860,242 UART: [idev] Erasing UDS.KEYID = 0
6,317,557 UART: [idev] Sha1 KeyId Algorithm
6,341,368 UART: [idev] --
6,345,877 UART: [ldev] ++
6,346,447 UART: [ldev] CDI.KEYID = 6
6,347,382 UART: [ldev] SUBJECT.KEYID = 5
6,348,590 UART: [ldev] AUTHORITY.KEYID = 7
6,349,820 UART: [ldev] FE.KEYID = 1
6,359,214 UART: [ldev] Erasing FE.KEYID = 1
8,834,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,396 UART: [ldev] --
10,626,230 UART: [fwproc] Wait for Commands...
10,628,646 UART: [fwproc] Recv command 0x46574c44
10,630,737 UART: [fwproc] Recv'd Img size: 114168 bytes
14,062,460 UART: ROM Fatal Error: 0x000B002E
14,065,568 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
6,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,845,925 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
6,089 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,002 UART:
192,388 UART: Running Caliptra ROM ...
193,476 UART:
193,616 UART: [state] CFI Enabled
266,581 UART: [state] LifecycleState = Manufacturing
268,498 UART: [state] DebugLocked = No
270,444 UART: [state] WD Timer not started. Device not locked for debugging
273,594 UART: [kat] SHA2-256
452,753 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,338 UART: [kat] ++
464,783 UART: [kat] sha1
476,409 UART: [kat] SHA2-256
479,425 UART: [kat] SHA2-384
486,425 UART: [kat] SHA2-512-ACC
489,383 UART: [kat] ECC-384
2,948,889 UART: [kat] HMAC-384Kdf
2,971,276 UART: [kat] LMS
3,500,746 UART: [kat] --
3,503,983 UART: [cold-reset] ++
3,506,289 UART: [fht] FHT @ 0x50003400
3,518,186 UART: [idev] ++
3,518,751 UART: [idev] CDI.KEYID = 6
3,519,713 UART: [idev] SUBJECT.KEYID = 7
3,520,890 UART: [idev] UDS.KEYID = 0
3,544,053 UART: [idev] Erasing UDS.KEYID = 0
6,025,557 UART: [idev] Sha1 KeyId Algorithm
6,048,454 UART: [idev] --
6,053,091 UART: [ldev] ++
6,053,673 UART: [ldev] CDI.KEYID = 6
6,054,562 UART: [ldev] SUBJECT.KEYID = 5
6,055,782 UART: [ldev] AUTHORITY.KEYID = 7
6,056,942 UART: [ldev] FE.KEYID = 1
6,100,320 UART: [ldev] Erasing FE.KEYID = 1
8,602,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,029 UART: [ldev] --
10,415,493 UART: [fwproc] Wait for Commands...
10,418,687 UART: [fwproc] Recv command 0x46574c44
10,420,730 UART: [fwproc] Recv'd Img size: 114168 bytes
13,847,702 UART: ROM Fatal Error: 0x000B002E
13,850,823 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
5,551 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,638,074 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
6,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,377 UART:
192,762 UART: Running Caliptra ROM ...
193,943 UART:
603,391 UART: [state] CFI Enabled
615,094 UART: [state] LifecycleState = Manufacturing
616,983 UART: [state] DebugLocked = No
619,116 UART: [state] WD Timer not started. Device not locked for debugging
623,060 UART: [kat] SHA2-256
802,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,741 UART: [kat] ++
814,271 UART: [kat] sha1
824,667 UART: [kat] SHA2-256
827,693 UART: [kat] SHA2-384
834,052 UART: [kat] SHA2-512-ACC
836,984 UART: [kat] ECC-384
3,276,235 UART: [kat] HMAC-384Kdf
3,289,452 UART: [kat] LMS
3,818,928 UART: [kat] --
3,822,811 UART: [cold-reset] ++
3,823,822 UART: [fht] FHT @ 0x50003400
3,834,685 UART: [idev] ++
3,835,246 UART: [idev] CDI.KEYID = 6
3,836,157 UART: [idev] SUBJECT.KEYID = 7
3,837,519 UART: [idev] UDS.KEYID = 0
3,852,979 UART: [idev] Erasing UDS.KEYID = 0
6,310,348 UART: [idev] Sha1 KeyId Algorithm
6,333,730 UART: [idev] --
6,339,104 UART: [ldev] ++
6,339,701 UART: [ldev] CDI.KEYID = 6
6,340,613 UART: [ldev] SUBJECT.KEYID = 5
6,341,774 UART: [ldev] AUTHORITY.KEYID = 7
6,342,998 UART: [ldev] FE.KEYID = 1
6,353,370 UART: [ldev] Erasing FE.KEYID = 1
8,827,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,983 UART: [ldev] --
10,617,548 UART: [fwproc] Wait for Commands...
10,620,180 UART: [fwproc] Recv command 0x46574c44
10,622,275 UART: [fwproc] Recv'd Img size: 114168 bytes
14,054,321 UART: ROM Fatal Error: 0x000B002E
14,057,452 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
6,178 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,844,643 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,912 UART: [state] LifecycleState = Manufacturing
86,567 UART: [state] DebugLocked = No
87,107 UART: [state] WD Timer not started. Device not locked for debugging
88,410 UART: [kat] SHA2-256
891,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,089 UART: [kat] ++
896,241 UART: [kat] sha1
900,387 UART: [kat] SHA2-256
902,327 UART: [kat] SHA2-384
904,908 UART: [kat] SHA2-512-ACC
906,809 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,177 UART: [cold-reset] ++
1,170,549 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,527 UART: [idev] Sha1 KeyId Algorithm
1,208,313 UART: [idev] --
1,209,542 UART: [ldev] ++
1,209,710 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,501 UART: [ldev] AUTHORITY.KEYID = 7
1,210,964 UART: [ldev] FE.KEYID = 1
1,216,358 UART: [ldev] Erasing FE.KEYID = 1
1,242,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,760 UART: [ldev] --
1,282,086 UART: [fwproc] Wait for Commands...
1,282,875 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,491 UART: ROM Fatal Error: 0x000B002E
2,605,650 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,454,691 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Manufacturing
86,210 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
891,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,944 UART: [kat] ++
896,096 UART: [kat] sha1
900,514 UART: [kat] SHA2-256
902,454 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,757 UART: [kat] HMAC-384Kdf
921,383 UART: [kat] LMS
1,169,695 UART: [kat] --
1,170,670 UART: [cold-reset] ++
1,170,996 UART: [fht] FHT @ 0x50003400
1,173,838 UART: [idev] ++
1,174,006 UART: [idev] CDI.KEYID = 6
1,174,367 UART: [idev] SUBJECT.KEYID = 7
1,174,792 UART: [idev] UDS.KEYID = 0
1,182,988 UART: [idev] Erasing UDS.KEYID = 0
1,200,176 UART: [idev] Sha1 KeyId Algorithm
1,209,072 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,521 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,855 UART: [ldev] Erasing FE.KEYID = 1
1,243,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,207 UART: [ldev] --
1,282,475 UART: [fwproc] Wait for Commands...
1,283,276 UART: [fwproc] Recv command 0x46574c44
1,284,009 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,610 UART: ROM Fatal Error: 0x000B002E
2,604,769 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,457,508 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Manufacturing
86,065 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [kat] SHA2-256
891,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,351 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,182,263 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,208,041 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,670 UART: [ldev] Erasing FE.KEYID = 1
1,241,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,266 UART: [ldev] --
1,280,568 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x46574c44
1,281,954 UART: [fwproc] Recv'd Img size: 114168 bytes
2,600,799 UART: ROM Fatal Error: 0x000B002E
2,601,958 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,456,231 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Manufacturing
86,048 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,497 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,966 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,986 UART: [idev] Sha1 KeyId Algorithm
1,208,818 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,353 UART: [ldev] Erasing FE.KEYID = 1
1,242,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,859 UART: [ldev] --
1,282,293 UART: [fwproc] Wait for Commands...
1,282,904 UART: [fwproc] Recv command 0x46574c44
1,283,637 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,186 UART: ROM Fatal Error: 0x000B002E
2,604,345 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,457,489 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Manufacturing
86,117 UART: [state] DebugLocked = No
86,739 UART: [state] WD Timer not started. Device not locked for debugging
87,984 UART: [kat] SHA2-256
891,534 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,968 UART: [kat] SHA2-512-ACC
906,869 UART: [kat] ECC-384
916,834 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,301 UART: [cold-reset] ++
1,170,755 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,182,367 UART: [idev] Erasing UDS.KEYID = 0
1,200,125 UART: [idev] Sha1 KeyId Algorithm
1,209,127 UART: [idev] --
1,210,260 UART: [ldev] ++
1,210,428 UART: [ldev] CDI.KEYID = 6
1,210,792 UART: [ldev] SUBJECT.KEYID = 5
1,211,219 UART: [ldev] AUTHORITY.KEYID = 7
1,211,682 UART: [ldev] FE.KEYID = 1
1,216,782 UART: [ldev] Erasing FE.KEYID = 1
1,243,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,092 UART: [ldev] --
1,282,432 UART: [fwproc] Wait for Commands...
1,283,061 UART: [fwproc] Recv command 0x46574c44
1,283,794 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,141 UART: ROM Fatal Error: 0x000B002E
2,605,300 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,455,423 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Manufacturing
86,548 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,506 UART: [kat] SHA2-256
902,446 UART: [kat] SHA2-384
905,141 UART: [kat] SHA2-512-ACC
907,042 UART: [kat] ECC-384
917,097 UART: [kat] HMAC-384Kdf
921,717 UART: [kat] LMS
1,170,029 UART: [kat] --
1,170,972 UART: [cold-reset] ++
1,171,550 UART: [fht] FHT @ 0x50003400
1,174,056 UART: [idev] ++
1,174,224 UART: [idev] CDI.KEYID = 6
1,174,585 UART: [idev] SUBJECT.KEYID = 7
1,175,010 UART: [idev] UDS.KEYID = 0
1,183,228 UART: [idev] Erasing UDS.KEYID = 0
1,200,278 UART: [idev] Sha1 KeyId Algorithm
1,209,082 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,541 UART: [ldev] Erasing FE.KEYID = 1
1,243,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,923 UART: [ldev] --
1,282,437 UART: [fwproc] Wait for Commands...
1,283,166 UART: [fwproc] Recv command 0x46574c44
1,283,899 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,092 UART: ROM Fatal Error: 0x000B002E
2,604,251 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,455,574 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,019,217 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,163,074 UART:
2,163,466 UART: Running Caliptra ROM ...
2,164,575 UART:
2,164,746 UART: [state] CFI Enabled
2,165,714 UART: [state] LifecycleState = Unprovisioned
2,167,375 UART: [state] DebugLocked = No
2,168,638 UART: [state] WD Timer not started. Device not locked for debugging
2,171,041 UART: [kat] SHA2-256
2,171,726 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,174,758 UART: [kat] ++
2,175,214 UART: [kat] sha1
2,175,756 UART: [kat] SHA2-256
2,176,416 UART: [kat] SHA2-384
2,177,072 UART: [kat] SHA2-512-ACC
2,177,955 UART: [kat] ECC-384
3,774,790 UART: [kat] HMAC-384Kdf
3,801,935 UART: [kat] LMS
4,875,043 UART: [kat] --
4,879,420 UART: [cold-reset] ++
4,881,197 UART: [fht] FHT @ 0x50003400
4,892,513 UART: [idev] ++
4,893,233 UART: [idev] CDI.KEYID = 6
4,894,347 UART: [idev] SUBJECT.KEYID = 7
4,895,564 UART: [idev] UDS.KEYID = 0
4,929,306 UART: [idev] Erasing UDS.KEYID = 0
8,244,556 UART: [idev] Sha1 KeyId Algorithm
8,266,659 UART: [idev] --
8,270,948 UART: [ldev] ++
8,271,526 UART: [ldev] CDI.KEYID = 6
8,272,644 UART: [ldev] SUBJECT.KEYID = 5
8,273,859 UART: [ldev] AUTHORITY.KEYID = 7
8,275,018 UART: [ldev] FE.KEYID = 1
8,316,747 UART: [ldev] Erasing FE.KEYID = 1
11,657,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,139 UART: [ldev] --
14,036,622 UART: [fwproc] Wait for Commands...
14,038,967 UART: [fwproc] Recv command 0x46574c44
14,041,244 UART: [fwproc] Recv'd Img size: 113844 bytes
16,743,377 UART: ROM Fatal Error: 0x000B0018
16,746,837 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,019,681 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,530,694 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
2,020,964 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,780 UART:
2,165,194 UART: Running Caliptra ROM ...
2,166,363 UART:
2,166,533 UART: [state] CFI Enabled
2,167,402 UART: [state] LifecycleState = Unprovisioned
2,169,043 UART: [state] DebugLocked = No
2,170,153 UART: [state] WD Timer not started. Device not locked for debugging
2,172,624 UART: [kat] SHA2-256
2,173,283 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,296 UART: [kat] ++
2,176,740 UART: [kat] sha1
2,177,332 UART: [kat] SHA2-256
2,178,039 UART: [kat] SHA2-384
2,178,694 UART: [kat] SHA2-512-ACC
2,179,586 UART: [kat] ECC-384
4,096,591 UART: [kat] HMAC-384Kdf
4,108,083 UART: [kat] LMS
5,181,271 UART: [kat] --
5,187,019 UART: [cold-reset] ++
5,189,069 UART: [fht] FHT @ 0x50003400
5,200,754 UART: [idev] ++
5,201,433 UART: [idev] CDI.KEYID = 6
5,202,668 UART: [idev] SUBJECT.KEYID = 7
5,204,099 UART: [idev] UDS.KEYID = 0
5,223,372 UART: [idev] Erasing UDS.KEYID = 0
8,499,348 UART: [idev] Sha1 KeyId Algorithm
8,522,575 UART: [idev] --
8,526,242 UART: [ldev] ++
8,526,806 UART: [ldev] CDI.KEYID = 6
8,527,964 UART: [ldev] SUBJECT.KEYID = 5
8,529,449 UART: [ldev] AUTHORITY.KEYID = 7
8,531,008 UART: [ldev] FE.KEYID = 1
8,539,676 UART: [ldev] Erasing FE.KEYID = 1
11,828,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,922 UART: [ldev] --
14,194,908 UART: [fwproc] Wait for Commands...
14,197,482 UART: [fwproc] Recv command 0x46574c44
14,199,795 UART: [fwproc] Recv'd Img size: 113844 bytes
16,906,025 UART: ROM Fatal Error: 0x000B0018
16,909,439 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,555 writing to cptra_bootfsm_go
2,023,505 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,715,778 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,025,167 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,433 UART:
2,169,828 UART: Running Caliptra ROM ...
2,171,000 UART:
2,171,177 UART: [state] CFI Enabled
2,172,160 UART: [state] LifecycleState = Unprovisioned
2,173,810 UART: [state] DebugLocked = No
2,174,923 UART: [state] WD Timer not started. Device not locked for debugging
2,177,399 UART: [kat] SHA2-256
2,178,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,081 UART: [kat] ++
2,181,531 UART: [kat] sha1
2,182,130 UART: [kat] SHA2-256
2,182,797 UART: [kat] SHA2-384
2,183,479 UART: [kat] SHA2-512-ACC
2,184,328 UART: [kat] ECC-384
2,950,642 UART: [kat] HMAC-384Kdf
2,974,206 UART: [kat] LMS
3,503,657 UART: [kat] --
3,509,351 UART: [cold-reset] ++
3,511,834 UART: [fht] FHT @ 0x50003400
3,523,684 UART: [idev] ++
3,524,247 UART: [idev] CDI.KEYID = 6
3,525,153 UART: [idev] SUBJECT.KEYID = 7
3,526,367 UART: [idev] UDS.KEYID = 0
3,545,855 UART: [idev] Erasing UDS.KEYID = 0
6,031,105 UART: [idev] Sha1 KeyId Algorithm
6,054,428 UART: [idev] --
6,057,346 UART: [ldev] ++
6,057,930 UART: [ldev] CDI.KEYID = 6
6,058,842 UART: [ldev] SUBJECT.KEYID = 5
6,060,081 UART: [ldev] AUTHORITY.KEYID = 7
6,061,269 UART: [ldev] FE.KEYID = 1
6,103,092 UART: [ldev] Erasing FE.KEYID = 1
8,605,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,268 UART: [ldev] --
10,417,747 UART: [fwproc] Wait for Commands...
10,419,410 UART: [fwproc] Recv command 0x46574c44
10,421,512 UART: [fwproc] Recv'd Img size: 114168 bytes
12,472,318 UART: ROM Fatal Error: 0x000B0018
12,475,450 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,022,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,247,864 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,020,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,039 UART:
2,165,428 UART: Running Caliptra ROM ...
2,166,508 UART:
2,166,666 UART: [state] CFI Enabled
2,167,637 UART: [state] LifecycleState = Unprovisioned
2,169,282 UART: [state] DebugLocked = No
2,170,332 UART: [state] WD Timer not started. Device not locked for debugging
2,172,796 UART: [kat] SHA2-256
2,173,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,470 UART: [kat] ++
2,176,918 UART: [kat] sha1
2,177,427 UART: [kat] SHA2-256
2,178,083 UART: [kat] SHA2-384
2,178,741 UART: [kat] SHA2-512-ACC
2,179,734 UART: [kat] ECC-384
3,279,867 UART: [kat] HMAC-384Kdf
3,292,856 UART: [kat] LMS
3,822,369 UART: [kat] --
3,825,931 UART: [cold-reset] ++
3,826,777 UART: [fht] FHT @ 0x50003400
3,837,157 UART: [idev] ++
3,837,715 UART: [idev] CDI.KEYID = 6
3,838,642 UART: [idev] SUBJECT.KEYID = 7
3,839,857 UART: [idev] UDS.KEYID = 0
3,859,337 UART: [idev] Erasing UDS.KEYID = 0
6,316,049 UART: [idev] Sha1 KeyId Algorithm
6,339,016 UART: [idev] --
6,344,148 UART: [ldev] ++
6,344,714 UART: [ldev] CDI.KEYID = 6
6,345,592 UART: [ldev] SUBJECT.KEYID = 5
6,346,807 UART: [ldev] AUTHORITY.KEYID = 7
6,348,098 UART: [ldev] FE.KEYID = 1
6,359,595 UART: [ldev] Erasing FE.KEYID = 1
8,831,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,544 UART: [ldev] --
10,622,671 UART: [fwproc] Wait for Commands...
10,625,145 UART: [fwproc] Recv command 0x46574c44
10,627,242 UART: [fwproc] Recv'd Img size: 114168 bytes
12,675,432 UART: ROM Fatal Error: 0x000B0018
12,678,565 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
2,020,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,454,947 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,027,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,172,122 UART:
2,172,539 UART: Running Caliptra ROM ...
2,173,621 UART:
2,173,786 UART: [state] CFI Enabled
2,174,762 UART: [state] LifecycleState = Unprovisioned
2,176,422 UART: [state] DebugLocked = No
2,177,543 UART: [state] WD Timer not started. Device not locked for debugging
2,179,932 UART: [kat] SHA2-256
2,180,592 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,605 UART: [kat] ++
2,184,058 UART: [kat] sha1
2,184,572 UART: [kat] SHA2-256
2,185,227 UART: [kat] SHA2-384
2,185,900 UART: [kat] SHA2-512-ACC
2,186,745 UART: [kat] ECC-384
2,946,451 UART: [kat] HMAC-384Kdf
2,973,186 UART: [kat] LMS
3,502,647 UART: [kat] --
3,506,393 UART: [cold-reset] ++
3,508,380 UART: [fht] FHT @ 0x50003400
3,519,466 UART: [idev] ++
3,520,074 UART: [idev] CDI.KEYID = 6
3,520,962 UART: [idev] SUBJECT.KEYID = 7
3,522,181 UART: [idev] UDS.KEYID = 0
3,546,506 UART: [idev] Erasing UDS.KEYID = 0
6,025,633 UART: [idev] Sha1 KeyId Algorithm
6,050,121 UART: [idev] --
6,054,067 UART: [ldev] ++
6,054,643 UART: [ldev] CDI.KEYID = 6
6,055,546 UART: [ldev] SUBJECT.KEYID = 5
6,056,710 UART: [ldev] AUTHORITY.KEYID = 7
6,057,948 UART: [ldev] FE.KEYID = 1
6,101,194 UART: [ldev] Erasing FE.KEYID = 1
8,606,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,605 UART: [ldev] --
10,412,866 UART: [fwproc] Wait for Commands...
10,414,317 UART: [fwproc] Recv command 0x46574c44
10,416,418 UART: [fwproc] Recv'd Img size: 114168 bytes
12,464,261 UART: ROM Fatal Error: 0x000B0018
12,467,386 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
2,022,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,216,439 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
2,021,294 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,388 UART:
2,165,787 UART: Running Caliptra ROM ...
2,166,956 UART:
2,167,126 UART: [state] CFI Enabled
2,168,099 UART: [state] LifecycleState = Unprovisioned
2,169,930 UART: [state] DebugLocked = No
2,171,067 UART: [state] WD Timer not started. Device not locked for debugging
2,173,548 UART: [kat] SHA2-256
2,174,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,221 UART: [kat] ++
2,177,673 UART: [kat] sha1
2,178,184 UART: [kat] SHA2-256
2,178,921 UART: [kat] SHA2-384
2,179,582 UART: [kat] SHA2-512-ACC
2,180,439 UART: [kat] ECC-384
3,280,212 UART: [kat] HMAC-384Kdf
3,292,921 UART: [kat] LMS
3,822,439 UART: [kat] --
3,828,159 UART: [cold-reset] ++
3,830,034 UART: [fht] FHT @ 0x50003400
3,840,146 UART: [idev] ++
3,840,705 UART: [idev] CDI.KEYID = 6
3,841,669 UART: [idev] SUBJECT.KEYID = 7
3,842,766 UART: [idev] UDS.KEYID = 0
3,858,415 UART: [idev] Erasing UDS.KEYID = 0
6,315,303 UART: [idev] Sha1 KeyId Algorithm
6,339,025 UART: [idev] --
6,342,782 UART: [ldev] ++
6,343,358 UART: [ldev] CDI.KEYID = 6
6,344,266 UART: [ldev] SUBJECT.KEYID = 5
6,345,447 UART: [ldev] AUTHORITY.KEYID = 7
6,346,679 UART: [ldev] FE.KEYID = 1
6,356,492 UART: [ldev] Erasing FE.KEYID = 1
8,828,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,297 UART: [ldev] --
10,619,071 UART: [fwproc] Wait for Commands...
10,621,825 UART: [fwproc] Recv command 0x46574c44
10,623,869 UART: [fwproc] Recv'd Img size: 114168 bytes
12,672,791 UART: ROM Fatal Error: 0x000B0018
12,675,925 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
2,021,415 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,462,590 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,311 UART: [fht] FHT @ 0x50003400
1,173,017 UART: [idev] ++
1,173,185 UART: [idev] CDI.KEYID = 6
1,173,546 UART: [idev] SUBJECT.KEYID = 7
1,173,971 UART: [idev] UDS.KEYID = 0
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,723 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,215,346 UART: [ldev] Erasing FE.KEYID = 1
1,241,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,480 UART: [ldev] --
1,280,858 UART: [fwproc] Wait for Commands...
1,281,585 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,926 UART: ROM Fatal Error: 0x000B0018
1,330,083 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,306 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
920,987 UART: [kat] LMS
1,169,299 UART: [kat] --
1,170,136 UART: [cold-reset] ++
1,170,604 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,182,080 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,208,022 UART: [idev] --
1,209,009 UART: [ldev] ++
1,209,177 UART: [ldev] CDI.KEYID = 6
1,209,541 UART: [ldev] SUBJECT.KEYID = 5
1,209,968 UART: [ldev] AUTHORITY.KEYID = 7
1,210,431 UART: [ldev] FE.KEYID = 1
1,215,605 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,063 UART: [ldev] --
1,281,531 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,911 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,955 UART: ROM Fatal Error: 0x000B0018
1,331,112 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,609 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,384 UART: [state] LifecycleState = Unprovisioned
85,039 UART: [state] DebugLocked = No
85,589 UART: [state] WD Timer not started. Device not locked for debugging
86,800 UART: [kat] SHA2-256
890,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,479 UART: [kat] ++
894,631 UART: [kat] sha1
899,023 UART: [kat] SHA2-256
900,963 UART: [kat] SHA2-384
903,766 UART: [kat] SHA2-512-ACC
905,667 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
920,122 UART: [kat] LMS
1,168,434 UART: [kat] --
1,169,581 UART: [cold-reset] ++
1,169,989 UART: [fht] FHT @ 0x50003400
1,172,583 UART: [idev] ++
1,172,751 UART: [idev] CDI.KEYID = 6
1,173,112 UART: [idev] SUBJECT.KEYID = 7
1,173,537 UART: [idev] UDS.KEYID = 0
1,181,117 UART: [idev] Erasing UDS.KEYID = 0
1,197,805 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,520 UART: [ldev] ++
1,207,688 UART: [ldev] CDI.KEYID = 6
1,208,052 UART: [ldev] SUBJECT.KEYID = 5
1,208,479 UART: [ldev] AUTHORITY.KEYID = 7
1,208,942 UART: [ldev] FE.KEYID = 1
1,213,930 UART: [ldev] Erasing FE.KEYID = 1
1,240,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,452 UART: [ldev] --
1,279,760 UART: [fwproc] Wait for Commands...
1,280,333 UART: [fwproc] Recv command 0x46574c44
1,281,066 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,886 UART: ROM Fatal Error: 0x000B0018
1,329,043 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,278 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
891,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,152 UART: [kat] ++
895,304 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,149 UART: [kat] SHA2-512-ACC
906,050 UART: [kat] ECC-384
915,575 UART: [kat] HMAC-384Kdf
920,123 UART: [kat] LMS
1,168,435 UART: [kat] --
1,169,212 UART: [cold-reset] ++
1,169,624 UART: [fht] FHT @ 0x50003400
1,172,368 UART: [idev] ++
1,172,536 UART: [idev] CDI.KEYID = 6
1,172,897 UART: [idev] SUBJECT.KEYID = 7
1,173,322 UART: [idev] UDS.KEYID = 0
1,181,182 UART: [idev] Erasing UDS.KEYID = 0
1,198,056 UART: [idev] Sha1 KeyId Algorithm
1,206,964 UART: [idev] --
1,207,907 UART: [ldev] ++
1,208,075 UART: [ldev] CDI.KEYID = 6
1,208,439 UART: [ldev] SUBJECT.KEYID = 5
1,208,866 UART: [ldev] AUTHORITY.KEYID = 7
1,209,329 UART: [ldev] FE.KEYID = 1
1,214,393 UART: [ldev] Erasing FE.KEYID = 1
1,240,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,603 UART: [ldev] --
1,279,909 UART: [fwproc] Wait for Commands...
1,280,486 UART: [fwproc] Recv command 0x46574c44
1,281,219 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,430 UART: ROM Fatal Error: 0x000B0018
1,328,587 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,807 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,682 UART: [state] LifecycleState = Unprovisioned
86,337 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,170 UART: [kat] LMS
1,169,482 UART: [kat] --
1,170,381 UART: [cold-reset] ++
1,170,833 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,182,107 UART: [idev] Erasing UDS.KEYID = 0
1,199,125 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,582 UART: [ldev] Erasing FE.KEYID = 1
1,241,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,712 UART: [ldev] --
1,281,048 UART: [fwproc] Wait for Commands...
1,281,781 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,800 UART: ROM Fatal Error: 0x000B0018
1,330,957 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,448 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,180 UART: [kat] SHA2-256
902,120 UART: [kat] SHA2-384
904,969 UART: [kat] SHA2-512-ACC
906,870 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,646 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,199,562 UART: [idev] Sha1 KeyId Algorithm
1,208,358 UART: [idev] --
1,209,397 UART: [ldev] ++
1,209,565 UART: [ldev] CDI.KEYID = 6
1,209,929 UART: [ldev] SUBJECT.KEYID = 5
1,210,356 UART: [ldev] AUTHORITY.KEYID = 7
1,210,819 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,151 UART: [fwproc] Wait for Commands...
1,282,966 UART: [fwproc] Recv command 0x46574c44
1,283,699 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,971 UART: ROM Fatal Error: 0x000B0018
1,332,128 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,697 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,019,981 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,163,727 UART:
2,164,117 UART: Running Caliptra ROM ...
2,165,285 UART:
2,165,476 UART: [state] CFI Enabled
2,166,436 UART: [state] LifecycleState = Unprovisioned
2,168,083 UART: [state] DebugLocked = No
2,169,199 UART: [state] WD Timer not started. Device not locked for debugging
2,171,673 UART: [kat] SHA2-256
2,172,343 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,349 UART: [kat] ++
2,175,799 UART: [kat] sha1
2,176,335 UART: [kat] SHA2-256
2,177,101 UART: [kat] SHA2-384
2,177,766 UART: [kat] SHA2-512-ACC
2,178,569 UART: [kat] ECC-384
3,776,326 UART: [kat] HMAC-384Kdf
3,801,958 UART: [kat] LMS
4,875,105 UART: [kat] --
4,881,706 UART: [cold-reset] ++
4,884,475 UART: [fht] FHT @ 0x50003400
4,896,047 UART: [idev] ++
4,896,728 UART: [idev] CDI.KEYID = 6
4,897,889 UART: [idev] SUBJECT.KEYID = 7
4,899,103 UART: [idev] UDS.KEYID = 0
4,929,148 UART: [idev] Erasing UDS.KEYID = 0
8,246,649 UART: [idev] Sha1 KeyId Algorithm
8,268,740 UART: [idev] --
8,273,922 UART: [ldev] ++
8,274,492 UART: [ldev] CDI.KEYID = 6
8,275,729 UART: [ldev] SUBJECT.KEYID = 5
8,276,884 UART: [ldev] AUTHORITY.KEYID = 7
8,278,109 UART: [ldev] FE.KEYID = 1
8,317,977 UART: [ldev] Erasing FE.KEYID = 1
11,655,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,457 UART: [ldev] --
14,039,825 UART: [fwproc] Wait for Commands...
14,042,038 UART: [fwproc] Recv command 0x46574c44
14,044,355 UART: [fwproc] Recv'd Img size: 113844 bytes
16,752,267 UART: ROM Fatal Error: 0x000B0017
16,755,662 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,020,374 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,163,790 UART:
2,164,181 UART: Running Caliptra ROM ...
2,165,348 UART:
2,165,518 UART: [state] CFI Enabled
2,166,477 UART: [state] LifecycleState = Unprovisioned
2,168,132 UART: [state] DebugLocked = No
2,169,229 UART: [state] WD Timer not started. Device not locked for debugging
2,171,695 UART: [kat] SHA2-256
2,172,363 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,175,371 UART: [kat] ++
2,175,822 UART: [kat] sha1
2,176,337 UART: [kat] SHA2-256
2,177,075 UART: [kat] SHA2-384
2,177,741 UART: [kat] SHA2-512-ACC
2,178,622 UART: [kat] ECC-384
3,776,500 UART: [kat] HMAC-384Kdf
3,800,787 UART: [kat] LMS
4,873,960 UART: [kat] --
4,878,030 UART: [cold-reset] ++
4,880,291 UART: [fht] FHT @ 0x50003400
4,891,758 UART: [idev] ++
4,892,491 UART: [idev] CDI.KEYID = 6
4,893,673 UART: [idev] SUBJECT.KEYID = 7
4,894,834 UART: [idev] UDS.KEYID = 0
4,927,468 UART: [idev] Erasing UDS.KEYID = 0
8,241,647 UART: [idev] Sha1 KeyId Algorithm
8,263,268 UART: [idev] --
8,267,369 UART: [ldev] ++
8,267,939 UART: [ldev] CDI.KEYID = 6
8,269,175 UART: [ldev] SUBJECT.KEYID = 5
8,270,329 UART: [ldev] AUTHORITY.KEYID = 7
8,271,577 UART: [ldev] FE.KEYID = 1
8,315,992 UART: [ldev] Erasing FE.KEYID = 1
11,651,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,160 UART: [ldev] --
14,036,421 UART: [fwproc] Wait for Commands...
14,038,672 UART: [fwproc] Recv command 0x46574c44
14,040,941 UART: [fwproc] Recv'd Img size: 113844 bytes
16,744,825 UART: ROM Fatal Error: 0x000B0017
16,748,281 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,025,466 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,168,844 UART:
2,169,235 UART: Running Caliptra ROM ...
2,170,398 UART:
2,170,576 UART: [state] CFI Enabled
2,171,496 UART: [state] LifecycleState = Unprovisioned
2,173,144 UART: [state] DebugLocked = No
2,174,250 UART: [state] WD Timer not started. Device not locked for debugging
2,176,716 UART: [kat] SHA2-256
2,177,379 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,180,606 UART: [kat] ++
2,181,071 UART: [kat] sha1
2,181,609 UART: [kat] SHA2-256
2,182,347 UART: [kat] SHA2-384
2,183,014 UART: [kat] SHA2-512-ACC
2,183,846 UART: [kat] ECC-384
3,774,111 UART: [kat] HMAC-384Kdf
3,801,777 UART: [kat] LMS
4,874,914 UART: [kat] --
4,878,278 UART: [cold-reset] ++
4,879,892 UART: [fht] FHT @ 0x50003400
4,892,276 UART: [idev] ++
4,892,952 UART: [idev] CDI.KEYID = 6
4,894,186 UART: [idev] SUBJECT.KEYID = 7
4,895,284 UART: [idev] UDS.KEYID = 0
4,929,515 UART: [idev] Erasing UDS.KEYID = 0
8,243,875 UART: [idev] Sha1 KeyId Algorithm
8,265,098 UART: [idev] --
8,268,214 UART: [ldev] ++
8,268,849 UART: [ldev] CDI.KEYID = 6
8,270,030 UART: [ldev] SUBJECT.KEYID = 5
8,271,189 UART: [ldev] AUTHORITY.KEYID = 7
8,272,417 UART: [ldev] FE.KEYID = 1
8,318,357 UART: [ldev] Erasing FE.KEYID = 1
11,653,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,658 UART: [ldev] --
14,036,807 UART: [fwproc] Wait for Commands...
14,039,509 UART: [fwproc] Recv command 0x46574c44
14,041,779 UART: [fwproc] Recv'd Img size: 113844 bytes
16,741,170 UART: ROM Fatal Error: 0x000B0017
16,744,593 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,020,255 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,531,366 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
2,020,663 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,508,081 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,019,648 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,528,989 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
2,020,616 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,833 UART:
2,165,246 UART: Running Caliptra ROM ...
2,166,367 UART:
2,166,526 UART: [state] CFI Enabled
2,167,493 UART: [state] LifecycleState = Unprovisioned
2,169,163 UART: [state] DebugLocked = No
2,170,265 UART: [state] WD Timer not started. Device not locked for debugging
2,172,731 UART: [kat] SHA2-256
2,173,391 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,396 UART: [kat] ++
2,176,840 UART: [kat] sha1
2,177,345 UART: [kat] SHA2-256
2,178,077 UART: [kat] SHA2-384
2,178,740 UART: [kat] SHA2-512-ACC
2,179,560 UART: [kat] ECC-384
4,096,514 UART: [kat] HMAC-384Kdf
4,108,409 UART: [kat] LMS
5,181,572 UART: [kat] --
5,188,178 UART: [cold-reset] ++
5,190,710 UART: [fht] FHT @ 0x50003400
5,201,791 UART: [idev] ++
5,202,459 UART: [idev] CDI.KEYID = 6
5,203,686 UART: [idev] SUBJECT.KEYID = 7
5,205,118 UART: [idev] UDS.KEYID = 0
5,221,898 UART: [idev] Erasing UDS.KEYID = 0
8,499,182 UART: [idev] Sha1 KeyId Algorithm
8,521,302 UART: [idev] --
8,524,577 UART: [ldev] ++
8,525,152 UART: [ldev] CDI.KEYID = 6
8,526,386 UART: [ldev] SUBJECT.KEYID = 5
8,527,813 UART: [ldev] AUTHORITY.KEYID = 7
8,529,364 UART: [ldev] FE.KEYID = 1
8,540,831 UART: [ldev] Erasing FE.KEYID = 1
11,836,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,131,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,147,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,163,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,179,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,201,426 UART: [ldev] --
14,206,037 UART: [fwproc] Wait for Commands...
14,208,584 UART: [fwproc] Recv command 0x46574c44
14,210,892 UART: [fwproc] Recv'd Img size: 113844 bytes
16,917,293 UART: ROM Fatal Error: 0x000B0017
16,920,715 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
2,021,397 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,165,107 UART:
2,165,507 UART: Running Caliptra ROM ...
2,166,682 UART:
2,166,848 UART: [state] CFI Enabled
2,167,799 UART: [state] LifecycleState = Unprovisioned
2,169,444 UART: [state] DebugLocked = No
2,170,543 UART: [state] WD Timer not started. Device not locked for debugging
2,173,193 UART: [kat] SHA2-256
2,173,874 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,891 UART: [kat] ++
2,177,338 UART: [kat] sha1
2,177,845 UART: [kat] SHA2-256
2,178,598 UART: [kat] SHA2-384
2,179,259 UART: [kat] SHA2-512-ACC
2,180,133 UART: [kat] ECC-384
4,105,473 UART: [kat] HMAC-384Kdf
4,116,898 UART: [kat] LMS
5,190,050 UART: [kat] --
5,193,472 UART: [cold-reset] ++
5,195,942 UART: [fht] FHT @ 0x50003400
5,206,378 UART: [idev] ++
5,207,052 UART: [idev] CDI.KEYID = 6
5,208,290 UART: [idev] SUBJECT.KEYID = 7
5,209,720 UART: [idev] UDS.KEYID = 0
5,227,944 UART: [idev] Erasing UDS.KEYID = 0
8,502,328 UART: [idev] Sha1 KeyId Algorithm
8,523,726 UART: [idev] --
8,526,904 UART: [ldev] ++
8,527,481 UART: [ldev] CDI.KEYID = 6
8,528,712 UART: [ldev] SUBJECT.KEYID = 5
8,530,137 UART: [ldev] AUTHORITY.KEYID = 7
8,531,686 UART: [ldev] FE.KEYID = 1
8,543,466 UART: [ldev] Erasing FE.KEYID = 1
11,829,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,543 UART: [ldev] --
14,195,651 UART: [fwproc] Wait for Commands...
14,198,066 UART: [fwproc] Recv command 0x46574c44
14,200,380 UART: [fwproc] Recv'd Img size: 113844 bytes
16,897,070 UART: ROM Fatal Error: 0x000B0017
16,900,471 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
2,021,605 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,984 UART:
2,165,370 UART: Running Caliptra ROM ...
2,166,444 UART:
2,166,593 UART: [state] CFI Enabled
2,167,554 UART: [state] LifecycleState = Unprovisioned
2,169,199 UART: [state] DebugLocked = No
2,170,433 UART: [state] WD Timer not started. Device not locked for debugging
2,172,908 UART: [kat] SHA2-256
2,173,590 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,587 UART: [kat] ++
2,177,024 UART: [kat] sha1
2,177,529 UART: [kat] SHA2-256
2,178,178 UART: [kat] SHA2-384
2,178,825 UART: [kat] SHA2-512-ACC
2,179,819 UART: [kat] ECC-384
4,100,030 UART: [kat] HMAC-384Kdf
4,112,010 UART: [kat] LMS
5,185,136 UART: [kat] --
5,187,525 UART: [cold-reset] ++
5,189,029 UART: [fht] FHT @ 0x50003400
5,200,636 UART: [idev] ++
5,201,300 UART: [idev] CDI.KEYID = 6
5,202,446 UART: [idev] SUBJECT.KEYID = 7
5,203,973 UART: [idev] UDS.KEYID = 0
5,219,428 UART: [idev] Erasing UDS.KEYID = 0
8,491,520 UART: [idev] Sha1 KeyId Algorithm
8,513,129 UART: [idev] --
8,517,396 UART: [ldev] ++
8,517,965 UART: [ldev] CDI.KEYID = 6
8,519,202 UART: [ldev] SUBJECT.KEYID = 5
8,520,639 UART: [ldev] AUTHORITY.KEYID = 7
8,522,115 UART: [ldev] FE.KEYID = 1
8,534,815 UART: [ldev] Erasing FE.KEYID = 1
11,822,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,131,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,147,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,163,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,183,794 UART: [ldev] --
14,188,145 UART: [fwproc] Wait for Commands...
14,191,010 UART: [fwproc] Recv command 0x46574c44
14,193,325 UART: [fwproc] Recv'd Img size: 113844 bytes
16,889,841 UART: ROM Fatal Error: 0x000B0017
16,893,259 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
2,021,289 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,718,113 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,269 writing to cptra_bootfsm_go
2,023,047 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,712,242 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
2,020,953 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,718,224 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
2,039,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,183,415 UART:
2,183,810 UART: Running Caliptra ROM ...
2,184,981 UART:
2,185,153 UART: [state] CFI Enabled
2,186,131 UART: [state] LifecycleState = Unprovisioned
2,187,778 UART: [state] DebugLocked = No
2,188,887 UART: [state] WD Timer not started. Device not locked for debugging
2,191,355 UART: [kat] SHA2-256
2,192,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,195,062 UART: [kat] ++
2,195,515 UART: [kat] sha1
2,196,031 UART: [kat] SHA2-256
2,196,775 UART: [kat] SHA2-384
2,197,446 UART: [kat] SHA2-512-ACC
2,198,332 UART: [kat] ECC-384
2,949,478 UART: [kat] HMAC-384Kdf
2,971,639 UART: [kat] LMS
3,501,088 UART: [kat] --
3,505,595 UART: [cold-reset] ++
3,507,472 UART: [fht] FHT @ 0x50003400
3,518,513 UART: [idev] ++
3,519,083 UART: [idev] CDI.KEYID = 6
3,519,965 UART: [idev] SUBJECT.KEYID = 7
3,521,234 UART: [idev] UDS.KEYID = 0
3,543,256 UART: [idev] Erasing UDS.KEYID = 0
6,026,377 UART: [idev] Sha1 KeyId Algorithm
6,049,626 UART: [idev] --
6,052,748 UART: [ldev] ++
6,053,321 UART: [ldev] CDI.KEYID = 6
6,054,211 UART: [ldev] SUBJECT.KEYID = 5
6,055,433 UART: [ldev] AUTHORITY.KEYID = 7
6,056,673 UART: [ldev] FE.KEYID = 1
6,098,831 UART: [ldev] Erasing FE.KEYID = 1
8,600,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,003 UART: [ldev] --
10,411,148 UART: [fwproc] Wait for Commands...
10,413,862 UART: [fwproc] Recv command 0x46574c44
10,415,965 UART: [fwproc] Recv'd Img size: 114168 bytes
12,470,095 UART: ROM Fatal Error: 0x000B0017
12,473,233 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
2,019,950 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,163,670 UART:
2,164,052 UART: Running Caliptra ROM ...
2,165,216 UART:
2,165,383 UART: [state] CFI Enabled
2,166,345 UART: [state] LifecycleState = Unprovisioned
2,168,010 UART: [state] DebugLocked = No
2,169,126 UART: [state] WD Timer not started. Device not locked for debugging
2,171,608 UART: [kat] SHA2-256
2,172,278 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,175,288 UART: [kat] ++
2,175,740 UART: [kat] sha1
2,176,253 UART: [kat] SHA2-256
2,176,996 UART: [kat] SHA2-384
2,177,664 UART: [kat] SHA2-512-ACC
2,178,500 UART: [kat] ECC-384
2,944,537 UART: [kat] HMAC-384Kdf
2,970,759 UART: [kat] LMS
3,500,206 UART: [kat] --
3,506,654 UART: [cold-reset] ++
3,508,593 UART: [fht] FHT @ 0x50003400
3,520,559 UART: [idev] ++
3,521,154 UART: [idev] CDI.KEYID = 6
3,522,061 UART: [idev] SUBJECT.KEYID = 7
3,523,229 UART: [idev] UDS.KEYID = 0
3,541,262 UART: [idev] Erasing UDS.KEYID = 0
6,026,287 UART: [idev] Sha1 KeyId Algorithm
6,049,087 UART: [idev] --
6,053,412 UART: [ldev] ++
6,053,996 UART: [ldev] CDI.KEYID = 6
6,054,908 UART: [ldev] SUBJECT.KEYID = 5
6,056,075 UART: [ldev] AUTHORITY.KEYID = 7
6,057,316 UART: [ldev] FE.KEYID = 1
6,098,271 UART: [ldev] Erasing FE.KEYID = 1
8,600,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,720 UART: [ldev] --
10,409,660 UART: [fwproc] Wait for Commands...
10,411,974 UART: [fwproc] Recv command 0x46574c44
10,414,016 UART: [fwproc] Recv'd Img size: 114168 bytes
12,459,772 UART: ROM Fatal Error: 0x000B0017
12,462,863 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,032,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,176,412 UART:
2,176,813 UART: Running Caliptra ROM ...
2,177,893 UART:
2,178,052 UART: [state] CFI Enabled
2,179,023 UART: [state] LifecycleState = Unprovisioned
2,180,688 UART: [state] DebugLocked = No
2,181,802 UART: [state] WD Timer not started. Device not locked for debugging
2,184,275 UART: [kat] SHA2-256
2,184,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,187,958 UART: [kat] ++
2,188,408 UART: [kat] sha1
2,188,922 UART: [kat] SHA2-256
2,189,583 UART: [kat] SHA2-384
2,190,264 UART: [kat] SHA2-512-ACC
2,191,095 UART: [kat] ECC-384
2,951,834 UART: [kat] HMAC-384Kdf
2,971,803 UART: [kat] LMS
3,501,261 UART: [kat] --
3,505,539 UART: [cold-reset] ++
3,506,554 UART: [fht] FHT @ 0x50003400
3,517,484 UART: [idev] ++
3,518,048 UART: [idev] CDI.KEYID = 6
3,518,958 UART: [idev] SUBJECT.KEYID = 7
3,520,174 UART: [idev] UDS.KEYID = 0
3,544,905 UART: [idev] Erasing UDS.KEYID = 0
6,025,281 UART: [idev] Sha1 KeyId Algorithm
6,048,301 UART: [idev] --
6,051,331 UART: [ldev] ++
6,051,907 UART: [ldev] CDI.KEYID = 6
6,052,816 UART: [ldev] SUBJECT.KEYID = 5
6,054,037 UART: [ldev] AUTHORITY.KEYID = 7
6,055,274 UART: [ldev] FE.KEYID = 1
6,099,848 UART: [ldev] Erasing FE.KEYID = 1
8,607,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,464 UART: [ldev] --
10,414,983 UART: [fwproc] Wait for Commands...
10,417,573 UART: [fwproc] Recv command 0x46574c44
10,419,623 UART: [fwproc] Recv'd Img size: 114168 bytes
12,473,035 UART: ROM Fatal Error: 0x000B0017
12,476,164 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
2,035,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,265,334 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
2,032,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,239,932 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,029,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,212,091 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,022,727 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,880 UART:
2,167,273 UART: Running Caliptra ROM ...
2,168,439 UART:
2,168,612 UART: [state] CFI Enabled
2,169,585 UART: [state] LifecycleState = Unprovisioned
2,171,224 UART: [state] DebugLocked = No
2,172,325 UART: [state] WD Timer not started. Device not locked for debugging
2,174,791 UART: [kat] SHA2-256
2,175,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,478 UART: [kat] ++
2,178,928 UART: [kat] sha1
2,179,439 UART: [kat] SHA2-256
2,180,173 UART: [kat] SHA2-384
2,180,840 UART: [kat] SHA2-512-ACC
2,181,717 UART: [kat] ECC-384
3,278,552 UART: [kat] HMAC-384Kdf
3,290,985 UART: [kat] LMS
3,820,477 UART: [kat] --
3,824,734 UART: [cold-reset] ++
3,826,388 UART: [fht] FHT @ 0x50003400
3,838,393 UART: [idev] ++
3,838,990 UART: [idev] CDI.KEYID = 6
3,839,876 UART: [idev] SUBJECT.KEYID = 7
3,841,087 UART: [idev] UDS.KEYID = 0
3,857,450 UART: [idev] Erasing UDS.KEYID = 0
6,315,245 UART: [idev] Sha1 KeyId Algorithm
6,337,797 UART: [idev] --
6,341,935 UART: [ldev] ++
6,342,509 UART: [ldev] CDI.KEYID = 6
6,343,393 UART: [ldev] SUBJECT.KEYID = 5
6,344,605 UART: [ldev] AUTHORITY.KEYID = 7
6,345,837 UART: [ldev] FE.KEYID = 1
6,354,400 UART: [ldev] Erasing FE.KEYID = 1
8,824,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,493 UART: [ldev] --
10,615,566 UART: [fwproc] Wait for Commands...
10,618,143 UART: [fwproc] Recv command 0x46574c44
10,620,254 UART: [fwproc] Recv'd Img size: 114168 bytes
12,670,526 UART: ROM Fatal Error: 0x000B0017
12,673,597 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
2,018,844 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,162,603 UART:
2,162,983 UART: Running Caliptra ROM ...
2,164,151 UART:
2,164,329 UART: [state] CFI Enabled
2,165,296 UART: [state] LifecycleState = Unprovisioned
2,166,946 UART: [state] DebugLocked = No
2,168,072 UART: [state] WD Timer not started. Device not locked for debugging
2,170,549 UART: [kat] SHA2-256
2,171,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,174,231 UART: [kat] ++
2,174,680 UART: [kat] sha1
2,175,229 UART: [kat] SHA2-256
2,175,891 UART: [kat] SHA2-384
2,176,548 UART: [kat] SHA2-512-ACC
2,177,341 UART: [kat] ECC-384
3,281,193 UART: [kat] HMAC-384Kdf
3,293,945 UART: [kat] LMS
3,823,449 UART: [kat] --
3,826,375 UART: [cold-reset] ++
3,828,358 UART: [fht] FHT @ 0x50003400
3,838,574 UART: [idev] ++
3,839,136 UART: [idev] CDI.KEYID = 6
3,840,060 UART: [idev] SUBJECT.KEYID = 7
3,841,223 UART: [idev] UDS.KEYID = 0
3,858,387 UART: [idev] Erasing UDS.KEYID = 0
6,316,503 UART: [idev] Sha1 KeyId Algorithm
6,340,311 UART: [idev] --
6,343,975 UART: [ldev] ++
6,344,544 UART: [ldev] CDI.KEYID = 6
6,345,451 UART: [ldev] SUBJECT.KEYID = 5
6,346,668 UART: [ldev] AUTHORITY.KEYID = 7
6,347,898 UART: [ldev] FE.KEYID = 1
6,357,460 UART: [ldev] Erasing FE.KEYID = 1
8,829,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,191 UART: [ldev] --
10,619,534 UART: [fwproc] Wait for Commands...
10,622,671 UART: [fwproc] Recv command 0x46574c44
10,624,714 UART: [fwproc] Recv'd Img size: 114168 bytes
12,680,167 UART: ROM Fatal Error: 0x000B0017
12,683,234 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
2,022,295 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,038 UART:
2,166,415 UART: Running Caliptra ROM ...
2,167,616 UART:
2,167,797 UART: [state] CFI Enabled
2,168,771 UART: [state] LifecycleState = Unprovisioned
2,170,608 UART: [state] DebugLocked = No
2,171,654 UART: [state] WD Timer not started. Device not locked for debugging
2,174,138 UART: [kat] SHA2-256
2,174,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,813 UART: [kat] ++
2,178,264 UART: [kat] sha1
2,178,776 UART: [kat] SHA2-256
2,179,431 UART: [kat] SHA2-384
2,180,084 UART: [kat] SHA2-512-ACC
2,180,884 UART: [kat] ECC-384
3,279,067 UART: [kat] HMAC-384Kdf
3,291,706 UART: [kat] LMS
3,821,197 UART: [kat] --
3,826,187 UART: [cold-reset] ++
3,827,151 UART: [fht] FHT @ 0x50003400
3,837,858 UART: [idev] ++
3,838,416 UART: [idev] CDI.KEYID = 6
3,839,381 UART: [idev] SUBJECT.KEYID = 7
3,840,543 UART: [idev] UDS.KEYID = 0
3,856,604 UART: [idev] Erasing UDS.KEYID = 0
6,313,363 UART: [idev] Sha1 KeyId Algorithm
6,334,855 UART: [idev] --
6,340,008 UART: [ldev] ++
6,340,589 UART: [ldev] CDI.KEYID = 6
6,341,495 UART: [ldev] SUBJECT.KEYID = 5
6,342,654 UART: [ldev] AUTHORITY.KEYID = 7
6,343,880 UART: [ldev] FE.KEYID = 1
6,355,218 UART: [ldev] Erasing FE.KEYID = 1
8,827,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,362 UART: [ldev] --
10,620,086 UART: [fwproc] Wait for Commands...
10,622,672 UART: [fwproc] Recv command 0x46574c44
10,624,761 UART: [fwproc] Recv'd Img size: 114168 bytes
12,675,239 UART: ROM Fatal Error: 0x000B0017
12,678,363 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
2,022,077 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,471,738 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,019,393 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,464,125 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,027,128 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,457,656 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
2,026,901 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,171,096 UART:
2,171,496 UART: Running Caliptra ROM ...
2,172,664 UART:
2,172,838 UART: [state] CFI Enabled
2,173,813 UART: [state] LifecycleState = Unprovisioned
2,175,458 UART: [state] DebugLocked = No
2,176,570 UART: [state] WD Timer not started. Device not locked for debugging
2,179,040 UART: [kat] SHA2-256
2,179,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,182,744 UART: [kat] ++
2,183,193 UART: [kat] sha1
2,183,792 UART: [kat] SHA2-256
2,184,459 UART: [kat] SHA2-384
2,185,114 UART: [kat] SHA2-512-ACC
2,185,956 UART: [kat] ECC-384
2,949,528 UART: [kat] HMAC-384Kdf
2,971,650 UART: [kat] LMS
3,501,121 UART: [kat] --
3,504,954 UART: [cold-reset] ++
3,507,481 UART: [fht] FHT @ 0x50003400
3,518,947 UART: [idev] ++
3,519,512 UART: [idev] CDI.KEYID = 6
3,520,422 UART: [idev] SUBJECT.KEYID = 7
3,521,638 UART: [idev] UDS.KEYID = 0
3,543,357 UART: [idev] Erasing UDS.KEYID = 0
6,027,308 UART: [idev] Sha1 KeyId Algorithm
6,050,173 UART: [idev] --
6,054,441 UART: [ldev] ++
6,055,016 UART: [ldev] CDI.KEYID = 6
6,055,934 UART: [ldev] SUBJECT.KEYID = 5
6,057,152 UART: [ldev] AUTHORITY.KEYID = 7
6,058,389 UART: [ldev] FE.KEYID = 1
6,099,311 UART: [ldev] Erasing FE.KEYID = 1
8,604,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,759 UART: [ldev] --
10,415,580 UART: [fwproc] Wait for Commands...
10,417,599 UART: [fwproc] Recv command 0x46574c44
10,419,649 UART: [fwproc] Recv'd Img size: 114168 bytes
12,468,566 UART: ROM Fatal Error: 0x000B0017
12,471,690 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,022,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,505 UART:
2,166,893 UART: Running Caliptra ROM ...
2,167,976 UART:
2,168,127 UART: [state] CFI Enabled
2,169,093 UART: [state] LifecycleState = Unprovisioned
2,170,680 UART: [state] DebugLocked = No
2,171,805 UART: [state] WD Timer not started. Device not locked for debugging
2,174,207 UART: [kat] SHA2-256
2,174,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,869 UART: [kat] ++
2,178,318 UART: [kat] sha1
2,178,827 UART: [kat] SHA2-256
2,179,483 UART: [kat] SHA2-384
2,180,137 UART: [kat] SHA2-512-ACC
2,181,132 UART: [kat] ECC-384
2,924,597 UART: [kat] HMAC-384Kdf
2,948,711 UART: [kat] LMS
3,478,178 UART: [kat] --
3,483,303 UART: [cold-reset] ++
3,484,132 UART: [fht] FHT @ 0x50003400
3,495,398 UART: [idev] ++
3,495,999 UART: [idev] CDI.KEYID = 6
3,496,884 UART: [idev] SUBJECT.KEYID = 7
3,498,102 UART: [idev] UDS.KEYID = 0
3,520,832 UART: [idev] Erasing UDS.KEYID = 0
6,001,928 UART: [idev] Sha1 KeyId Algorithm
6,026,353 UART: [idev] --
6,031,001 UART: [ldev] ++
6,031,586 UART: [ldev] CDI.KEYID = 6
6,032,496 UART: [ldev] SUBJECT.KEYID = 5
6,033,714 UART: [ldev] AUTHORITY.KEYID = 7
6,034,949 UART: [ldev] FE.KEYID = 1
6,076,229 UART: [ldev] Erasing FE.KEYID = 1
8,580,096 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,282 UART: [ldev] --
10,389,634 UART: [fwproc] Wait for Commands...
10,392,766 UART: [fwproc] Recv command 0x46574c44
10,394,815 UART: [fwproc] Recv'd Img size: 114168 bytes
12,441,451 UART: ROM Fatal Error: 0x000B0017
12,444,586 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
2,021,113 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,164,934 UART:
2,165,369 UART: Running Caliptra ROM ...
2,166,544 UART:
2,166,734 UART: [state] CFI Enabled
2,167,704 UART: [state] LifecycleState = Unprovisioned
2,169,359 UART: [state] DebugLocked = No
2,170,467 UART: [state] WD Timer not started. Device not locked for debugging
2,172,940 UART: [kat] SHA2-256
2,173,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,627 UART: [kat] ++
2,177,078 UART: [kat] sha1
2,177,595 UART: [kat] SHA2-256
2,178,250 UART: [kat] SHA2-384
2,178,906 UART: [kat] SHA2-512-ACC
2,179,732 UART: [kat] ECC-384
2,946,983 UART: [kat] HMAC-384Kdf
2,971,248 UART: [kat] LMS
3,500,689 UART: [kat] --
3,506,910 UART: [cold-reset] ++
3,508,736 UART: [fht] FHT @ 0x50003400
3,520,531 UART: [idev] ++
3,521,133 UART: [idev] CDI.KEYID = 6
3,522,041 UART: [idev] SUBJECT.KEYID = 7
3,523,211 UART: [idev] UDS.KEYID = 0
3,543,349 UART: [idev] Erasing UDS.KEYID = 0
6,025,466 UART: [idev] Sha1 KeyId Algorithm
6,047,672 UART: [idev] --
6,051,452 UART: [ldev] ++
6,052,025 UART: [ldev] CDI.KEYID = 6
6,052,940 UART: [ldev] SUBJECT.KEYID = 5
6,054,046 UART: [ldev] AUTHORITY.KEYID = 7
6,055,344 UART: [ldev] FE.KEYID = 1
6,099,926 UART: [ldev] Erasing FE.KEYID = 1
8,604,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,952 UART: [ldev] --
10,411,775 UART: [fwproc] Wait for Commands...
10,413,934 UART: [fwproc] Recv command 0x46574c44
10,416,035 UART: [fwproc] Recv'd Img size: 114168 bytes
12,466,452 UART: ROM Fatal Error: 0x000B0017
12,469,523 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,031,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,254,796 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,020,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,227,517 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
2,020,710 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,254,561 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
2,021,138 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,165,291 UART:
2,165,715 UART: Running Caliptra ROM ...
2,166,800 UART:
2,166,955 UART: [state] CFI Enabled
2,167,924 UART: [state] LifecycleState = Unprovisioned
2,169,564 UART: [state] DebugLocked = No
2,170,591 UART: [state] WD Timer not started. Device not locked for debugging
2,173,055 UART: [kat] SHA2-256
2,173,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,734 UART: [kat] ++
2,177,179 UART: [kat] sha1
2,177,686 UART: [kat] SHA2-256
2,178,343 UART: [kat] SHA2-384
2,179,089 UART: [kat] SHA2-512-ACC
2,179,897 UART: [kat] ECC-384
3,282,317 UART: [kat] HMAC-384Kdf
3,295,357 UART: [kat] LMS
3,824,857 UART: [kat] --
3,829,636 UART: [cold-reset] ++
3,832,163 UART: [fht] FHT @ 0x50003400
3,844,873 UART: [idev] ++
3,845,440 UART: [idev] CDI.KEYID = 6
3,846,369 UART: [idev] SUBJECT.KEYID = 7
3,847,524 UART: [idev] UDS.KEYID = 0
3,863,554 UART: [idev] Erasing UDS.KEYID = 0
6,316,624 UART: [idev] Sha1 KeyId Algorithm
6,340,505 UART: [idev] --
6,343,741 UART: [ldev] ++
6,344,308 UART: [ldev] CDI.KEYID = 6
6,345,192 UART: [ldev] SUBJECT.KEYID = 5
6,346,401 UART: [ldev] AUTHORITY.KEYID = 7
6,347,686 UART: [ldev] FE.KEYID = 1
6,358,902 UART: [ldev] Erasing FE.KEYID = 1
8,835,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,859 UART: [ldev] --
10,628,379 UART: [fwproc] Wait for Commands...
10,630,854 UART: [fwproc] Recv command 0x46574c44
10,632,947 UART: [fwproc] Recv'd Img size: 114168 bytes
12,685,696 UART: ROM Fatal Error: 0x000B0017
12,688,829 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
2,020,463 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,164,192 UART:
2,164,567 UART: Running Caliptra ROM ...
2,165,736 UART:
2,165,901 UART: [state] CFI Enabled
2,166,868 UART: [state] LifecycleState = Unprovisioned
2,168,520 UART: [state] DebugLocked = No
2,169,625 UART: [state] WD Timer not started. Device not locked for debugging
2,172,096 UART: [kat] SHA2-256
2,172,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,176,006 UART: [kat] ++
2,176,473 UART: [kat] sha1
2,176,989 UART: [kat] SHA2-256
2,177,730 UART: [kat] SHA2-384
2,178,398 UART: [kat] SHA2-512-ACC
2,179,299 UART: [kat] ECC-384
3,278,215 UART: [kat] HMAC-384Kdf
3,290,977 UART: [kat] LMS
3,820,481 UART: [kat] --
3,826,083 UART: [cold-reset] ++
3,827,913 UART: [fht] FHT @ 0x50003400
3,839,330 UART: [idev] ++
3,839,893 UART: [idev] CDI.KEYID = 6
3,840,828 UART: [idev] SUBJECT.KEYID = 7
3,842,039 UART: [idev] UDS.KEYID = 0
3,859,556 UART: [idev] Erasing UDS.KEYID = 0
6,319,200 UART: [idev] Sha1 KeyId Algorithm
6,341,990 UART: [idev] --
6,347,634 UART: [ldev] ++
6,348,209 UART: [ldev] CDI.KEYID = 6
6,349,178 UART: [ldev] SUBJECT.KEYID = 5
6,350,357 UART: [ldev] AUTHORITY.KEYID = 7
6,351,589 UART: [ldev] FE.KEYID = 1
6,360,453 UART: [ldev] Erasing FE.KEYID = 1
8,836,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,768 UART: [ldev] --
10,631,079 UART: [fwproc] Wait for Commands...
10,633,441 UART: [fwproc] Recv command 0x46574c44
10,635,476 UART: [fwproc] Recv'd Img size: 114168 bytes
12,687,041 UART: ROM Fatal Error: 0x000B0017
12,690,174 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
2,022,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,166,308 UART:
2,166,713 UART: Running Caliptra ROM ...
2,167,809 UART:
2,167,970 UART: [state] CFI Enabled
2,168,952 UART: [state] LifecycleState = Unprovisioned
2,170,593 UART: [state] DebugLocked = No
2,171,620 UART: [state] WD Timer not started. Device not locked for debugging
2,174,090 UART: [kat] SHA2-256
2,174,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,177,759 UART: [kat] ++
2,178,224 UART: [kat] sha1
2,178,738 UART: [kat] SHA2-256
2,179,395 UART: [kat] SHA2-384
2,180,051 UART: [kat] SHA2-512-ACC
2,180,884 UART: [kat] ECC-384
3,281,618 UART: [kat] HMAC-384Kdf
3,294,648 UART: [kat] LMS
3,824,120 UART: [kat] --
3,826,679 UART: [cold-reset] ++
3,829,149 UART: [fht] FHT @ 0x50003400
3,840,562 UART: [idev] ++
3,841,118 UART: [idev] CDI.KEYID = 6
3,842,049 UART: [idev] SUBJECT.KEYID = 7
3,843,262 UART: [idev] UDS.KEYID = 0
3,860,943 UART: [idev] Erasing UDS.KEYID = 0
6,319,387 UART: [idev] Sha1 KeyId Algorithm
6,343,723 UART: [idev] --
6,348,310 UART: [ldev] ++
6,348,872 UART: [ldev] CDI.KEYID = 6
6,349,753 UART: [ldev] SUBJECT.KEYID = 5
6,350,963 UART: [ldev] AUTHORITY.KEYID = 7
6,352,246 UART: [ldev] FE.KEYID = 1
6,364,192 UART: [ldev] Erasing FE.KEYID = 1
8,838,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,738 UART: [ldev] --
10,629,188 UART: [fwproc] Wait for Commands...
10,630,904 UART: [fwproc] Recv command 0x46574c44
10,632,996 UART: [fwproc] Recv'd Img size: 114168 bytes
12,688,726 UART: ROM Fatal Error: 0x000B0017
12,691,853 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
2,022,118 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,453,402 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
2,028,952 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,461,379 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
2,025,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,464,618 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
915,728 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,147 UART: [cold-reset] ++
1,169,575 UART: [fht] FHT @ 0x50003400
1,172,217 UART: [idev] ++
1,172,385 UART: [idev] CDI.KEYID = 6
1,172,746 UART: [idev] SUBJECT.KEYID = 7
1,173,171 UART: [idev] UDS.KEYID = 0
1,181,255 UART: [idev] Erasing UDS.KEYID = 0
1,198,265 UART: [idev] Sha1 KeyId Algorithm
1,207,047 UART: [idev] --
1,208,070 UART: [ldev] ++
1,208,238 UART: [ldev] CDI.KEYID = 6
1,208,602 UART: [ldev] SUBJECT.KEYID = 5
1,209,029 UART: [ldev] AUTHORITY.KEYID = 7
1,209,492 UART: [ldev] FE.KEYID = 1
1,214,648 UART: [ldev] Erasing FE.KEYID = 1
1,240,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,528 UART: [ldev] --
1,279,936 UART: [fwproc] Wait for Commands...
1,280,761 UART: [fwproc] Recv command 0x46574c44
1,281,494 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,520 UART: ROM Fatal Error: 0x000B0017
1,329,677 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,609 UART: [idev] ++
1,172,777 UART: [idev] CDI.KEYID = 6
1,173,138 UART: [idev] SUBJECT.KEYID = 7
1,173,563 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,629 UART: [idev] --
1,208,670 UART: [ldev] ++
1,208,838 UART: [ldev] CDI.KEYID = 6
1,209,202 UART: [ldev] SUBJECT.KEYID = 5
1,209,629 UART: [ldev] AUTHORITY.KEYID = 7
1,210,092 UART: [ldev] FE.KEYID = 1
1,215,266 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,504 UART: [fwproc] Wait for Commands...
1,281,329 UART: [fwproc] Recv command 0x46574c44
1,282,062 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,964 UART: ROM Fatal Error: 0x000B0017
1,330,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,699 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,765 UART: [idev] ++
1,172,933 UART: [idev] CDI.KEYID = 6
1,173,294 UART: [idev] SUBJECT.KEYID = 7
1,173,719 UART: [idev] UDS.KEYID = 0
1,181,983 UART: [idev] Erasing UDS.KEYID = 0
1,199,145 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,096 UART: [ldev] ++
1,209,264 UART: [ldev] CDI.KEYID = 6
1,209,628 UART: [ldev] SUBJECT.KEYID = 5
1,210,055 UART: [ldev] AUTHORITY.KEYID = 7
1,210,518 UART: [ldev] FE.KEYID = 1
1,215,602 UART: [ldev] Erasing FE.KEYID = 1
1,242,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,244 UART: [ldev] --
1,281,508 UART: [fwproc] Wait for Commands...
1,282,145 UART: [fwproc] Recv command 0x46574c44
1,282,878 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,322 UART: ROM Fatal Error: 0x000B0017
1,331,479 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,596 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,454 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,894 UART: [idev] Sha1 KeyId Algorithm
1,208,552 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,305 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,350 UART: [fwproc] Recv command 0x46574c44
1,283,083 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,973 UART: ROM Fatal Error: 0x000B0017
1,331,130 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,960 UART: [fht] FHT @ 0x50003400
1,173,572 UART: [idev] ++
1,173,740 UART: [idev] CDI.KEYID = 6
1,174,101 UART: [idev] SUBJECT.KEYID = 7
1,174,526 UART: [idev] UDS.KEYID = 0
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,200,232 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,437 UART: [ldev] ++
1,210,605 UART: [ldev] CDI.KEYID = 6
1,210,969 UART: [ldev] SUBJECT.KEYID = 5
1,211,396 UART: [ldev] AUTHORITY.KEYID = 7
1,211,859 UART: [ldev] FE.KEYID = 1
1,217,241 UART: [ldev] Erasing FE.KEYID = 1
1,243,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,843 UART: [ldev] --
1,283,311 UART: [fwproc] Wait for Commands...
1,283,898 UART: [fwproc] Recv command 0x46574c44
1,284,631 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,385 UART: ROM Fatal Error: 0x000B0017
1,332,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,857 UART: [state] LifecycleState = Unprovisioned
85,512 UART: [state] DebugLocked = No
86,210 UART: [state] WD Timer not started. Device not locked for debugging
87,493 UART: [kat] SHA2-256
891,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,482 UART: [kat] SHA2-256
901,422 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,173,126 UART: [idev] ++
1,173,294 UART: [idev] CDI.KEYID = 6
1,173,655 UART: [idev] SUBJECT.KEYID = 7
1,174,080 UART: [idev] UDS.KEYID = 0
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,476 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,242,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,383 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,857 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,129 UART: ROM Fatal Error: 0x000B0017
1,332,286 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,049 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,985 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,051 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,630 UART: [kat] SHA2-512-ACC
906,531 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,083 UART: [idev] ++
1,173,251 UART: [idev] CDI.KEYID = 6
1,173,612 UART: [idev] SUBJECT.KEYID = 7
1,174,037 UART: [idev] UDS.KEYID = 0
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,199,519 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,508 UART: [ldev] ++
1,209,676 UART: [ldev] CDI.KEYID = 6
1,210,040 UART: [ldev] SUBJECT.KEYID = 5
1,210,467 UART: [ldev] AUTHORITY.KEYID = 7
1,210,930 UART: [ldev] FE.KEYID = 1
1,216,380 UART: [ldev] Erasing FE.KEYID = 1
1,242,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,282 UART: [ldev] --
1,281,620 UART: [fwproc] Wait for Commands...
1,282,377 UART: [fwproc] Recv command 0x46574c44
1,283,110 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,808 UART: ROM Fatal Error: 0x000B0017
1,330,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Unprovisioned
86,265 UART: [state] DebugLocked = No
86,857 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,852 UART: [kat] SHA2-512-ACC
906,753 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,700 UART: [kat] LMS
1,169,012 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,335 UART: [fht] FHT @ 0x50003400
1,173,129 UART: [idev] ++
1,173,297 UART: [idev] CDI.KEYID = 6
1,173,658 UART: [idev] SUBJECT.KEYID = 7
1,174,083 UART: [idev] UDS.KEYID = 0
1,182,155 UART: [idev] Erasing UDS.KEYID = 0
1,199,485 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,758 UART: [fwproc] Wait for Commands...
1,281,559 UART: [fwproc] Recv command 0x46574c44
1,282,292 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,194 UART: ROM Fatal Error: 0x000B0017
1,330,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,585 UART: [kat] SHA2-256
901,525 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,089 UART: [idev] ++
1,173,257 UART: [idev] CDI.KEYID = 6
1,173,618 UART: [idev] SUBJECT.KEYID = 7
1,174,043 UART: [idev] UDS.KEYID = 0
1,181,719 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,380 UART: [ldev] Erasing FE.KEYID = 1
1,241,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,030 UART: [ldev] --
1,280,372 UART: [fwproc] Wait for Commands...
1,281,193 UART: [fwproc] Recv command 0x46574c44
1,281,926 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,018 UART: ROM Fatal Error: 0x000B0017
1,330,175 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,250 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
921,129 UART: [kat] LMS
1,169,441 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,182,472 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,940 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,647 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,865 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,363 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,805 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,473 UART: ROM Fatal Error: 0x000B0017
1,332,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,627 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,171,038 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,182,584 UART: [idev] Erasing UDS.KEYID = 0
1,200,242 UART: [idev] Sha1 KeyId Algorithm
1,208,934 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,477 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,415 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,869 UART: [fwproc] Wait for Commands...
1,282,572 UART: [fwproc] Recv command 0x46574c44
1,283,305 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,597 UART: ROM Fatal Error: 0x000B0017
1,330,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
915,607 UART: [kat] HMAC-384Kdf
920,233 UART: [kat] LMS
1,168,545 UART: [kat] --
1,169,270 UART: [cold-reset] ++
1,169,752 UART: [fht] FHT @ 0x50003400
1,172,494 UART: [idev] ++
1,172,662 UART: [idev] CDI.KEYID = 6
1,173,023 UART: [idev] SUBJECT.KEYID = 7
1,173,448 UART: [idev] UDS.KEYID = 0
1,181,486 UART: [idev] Erasing UDS.KEYID = 0
1,198,372 UART: [idev] Sha1 KeyId Algorithm
1,207,288 UART: [idev] --
1,208,345 UART: [ldev] ++
1,208,513 UART: [ldev] CDI.KEYID = 6
1,208,877 UART: [ldev] SUBJECT.KEYID = 5
1,209,304 UART: [ldev] AUTHORITY.KEYID = 7
1,209,767 UART: [ldev] FE.KEYID = 1
1,215,069 UART: [ldev] Erasing FE.KEYID = 1
1,241,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,099 UART: [ldev] --
1,280,405 UART: [fwproc] Wait for Commands...
1,281,144 UART: [fwproc] Recv command 0x46574c44
1,281,877 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,255 UART: ROM Fatal Error: 0x000B0017
1,330,412 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,525 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
891,454 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,616 UART: [kat] HMAC-384Kdf
921,234 UART: [kat] LMS
1,169,546 UART: [kat] --
1,170,679 UART: [cold-reset] ++
1,171,075 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,182,845 UART: [idev] Erasing UDS.KEYID = 0
1,200,311 UART: [idev] Sha1 KeyId Algorithm
1,209,107 UART: [idev] --
1,210,208 UART: [ldev] ++
1,210,376 UART: [ldev] CDI.KEYID = 6
1,210,740 UART: [ldev] SUBJECT.KEYID = 5
1,211,167 UART: [ldev] AUTHORITY.KEYID = 7
1,211,630 UART: [ldev] FE.KEYID = 1
1,216,976 UART: [ldev] Erasing FE.KEYID = 1
1,243,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,738 UART: [ldev] --
1,282,092 UART: [fwproc] Wait for Commands...
1,282,731 UART: [fwproc] Recv command 0x46574c44
1,283,464 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,256 UART: ROM Fatal Error: 0x000B0017
1,331,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,627 UART: [kat] ++
895,779 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,572 UART: [kat] SHA2-512-ACC
906,473 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,513 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,199,487 UART: [idev] Sha1 KeyId Algorithm
1,208,279 UART: [idev] --
1,209,422 UART: [ldev] ++
1,209,590 UART: [ldev] CDI.KEYID = 6
1,209,954 UART: [ldev] SUBJECT.KEYID = 5
1,210,381 UART: [ldev] AUTHORITY.KEYID = 7
1,210,844 UART: [ldev] FE.KEYID = 1
1,216,004 UART: [ldev] Erasing FE.KEYID = 1
1,242,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,650 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,775 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,138 UART: ROM Fatal Error: 0x000B0017
1,332,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,097 UART: [state] WD Timer not started. Device not locked for debugging
87,208 UART: [kat] SHA2-256
890,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,887 UART: [kat] ++
895,039 UART: [kat] sha1
899,213 UART: [kat] SHA2-256
901,153 UART: [kat] SHA2-384
903,764 UART: [kat] SHA2-512-ACC
905,665 UART: [kat] ECC-384
915,424 UART: [kat] HMAC-384Kdf
920,132 UART: [kat] LMS
1,168,444 UART: [kat] --
1,169,295 UART: [cold-reset] ++
1,169,631 UART: [fht] FHT @ 0x50003400
1,172,071 UART: [idev] ++
1,172,239 UART: [idev] CDI.KEYID = 6
1,172,600 UART: [idev] SUBJECT.KEYID = 7
1,173,025 UART: [idev] UDS.KEYID = 0
1,180,909 UART: [idev] Erasing UDS.KEYID = 0
1,197,897 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,826 UART: [ldev] ++
1,207,994 UART: [ldev] CDI.KEYID = 6
1,208,358 UART: [ldev] SUBJECT.KEYID = 5
1,208,785 UART: [ldev] AUTHORITY.KEYID = 7
1,209,248 UART: [ldev] FE.KEYID = 1
1,214,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,609 UART: [fwproc] Recv command 0x46574c44
1,282,342 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,564 UART: ROM Fatal Error: 0x000B0017
1,330,721 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,764 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,714 UART: [fht] FHT @ 0x50003400
1,173,602 UART: [idev] ++
1,173,770 UART: [idev] CDI.KEYID = 6
1,174,131 UART: [idev] SUBJECT.KEYID = 7
1,174,556 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,761 UART: [ldev] ++
1,209,929 UART: [ldev] CDI.KEYID = 6
1,210,293 UART: [ldev] SUBJECT.KEYID = 5
1,210,720 UART: [ldev] AUTHORITY.KEYID = 7
1,211,183 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,261 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,637 UART: ROM Fatal Error: 0x000B0017
1,330,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,632 UART: [kat] SHA2-256
901,572 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,773 UART: [kat] HMAC-384Kdf
920,491 UART: [kat] LMS
1,168,803 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,280 UART: [idev] ++
1,173,448 UART: [idev] CDI.KEYID = 6
1,173,809 UART: [idev] SUBJECT.KEYID = 7
1,174,234 UART: [idev] UDS.KEYID = 0
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,198,892 UART: [idev] Sha1 KeyId Algorithm
1,207,568 UART: [idev] --
1,208,711 UART: [ldev] ++
1,208,879 UART: [ldev] CDI.KEYID = 6
1,209,243 UART: [ldev] SUBJECT.KEYID = 5
1,209,670 UART: [ldev] AUTHORITY.KEYID = 7
1,210,133 UART: [ldev] FE.KEYID = 1
1,215,187 UART: [ldev] Erasing FE.KEYID = 1
1,241,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,871 UART: [ldev] --
1,281,333 UART: [fwproc] Wait for Commands...
1,282,018 UART: [fwproc] Recv command 0x46574c44
1,282,751 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,793 UART: ROM Fatal Error: 0x000B0017
1,330,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,599 UART: [kat] SHA2-256
891,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,593 UART: [kat] LMS
1,168,905 UART: [kat] --
1,169,724 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,181,978 UART: [idev] Erasing UDS.KEYID = 0
1,198,764 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,747 UART: [ldev] ++
1,208,915 UART: [ldev] CDI.KEYID = 6
1,209,279 UART: [ldev] SUBJECT.KEYID = 5
1,209,706 UART: [ldev] AUTHORITY.KEYID = 7
1,210,169 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,241,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,703 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,850 UART: [fwproc] Recv command 0x46574c44
1,282,583 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,831 UART: ROM Fatal Error: 0x000B0017
1,330,988 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,135 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,689 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
2,028,352 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,172,602 UART:
2,173,009 UART: Running Caliptra ROM ...
2,174,188 UART:
2,174,366 UART: [state] CFI Enabled
2,175,352 UART: [state] LifecycleState = Unprovisioned
2,177,019 UART: [state] DebugLocked = No
2,178,129 UART: [state] WD Timer not started. Device not locked for debugging
2,180,605 UART: [kat] SHA2-256
2,181,272 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,184,288 UART: [kat] ++
2,184,741 UART: [kat] sha1
2,185,296 UART: [kat] SHA2-256
2,186,154 UART: [kat] SHA2-384
2,186,821 UART: [kat] SHA2-512-ACC
2,187,704 UART: [kat] ECC-384
3,775,003 UART: [kat] HMAC-384Kdf
3,800,966 UART: [kat] LMS
4,874,116 UART: [kat] --
4,878,328 UART: [cold-reset] ++
4,879,450 UART: [fht] FHT @ 0x50003400
4,891,297 UART: [idev] ++
4,891,967 UART: [idev] CDI.KEYID = 6
4,893,128 UART: [idev] SUBJECT.KEYID = 7
4,894,342 UART: [idev] UDS.KEYID = 0
4,926,762 UART: [idev] Erasing UDS.KEYID = 0
8,240,144 UART: [idev] Sha1 KeyId Algorithm
8,262,293 UART: [idev] --
8,266,341 UART: [ldev] ++
8,266,909 UART: [ldev] CDI.KEYID = 6
8,268,147 UART: [ldev] SUBJECT.KEYID = 5
8,269,303 UART: [ldev] AUTHORITY.KEYID = 7
8,270,528 UART: [ldev] FE.KEYID = 1
8,314,773 UART: [ldev] Erasing FE.KEYID = 1
11,645,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,960,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,976,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,992,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,008,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,029,410 UART: [ldev] --
14,034,406 UART: [fwproc] Wait for Commands...
14,036,938 UART: [fwproc] Recv command 0x46574c44
14,039,208 UART: [fwproc] Recv'd Img size: 113844 bytes
16,742,640 UART: ROM Fatal Error: 0x000B003B
16,746,095 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,022,821 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,506,105 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
2,031,542 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,175,417 UART:
2,175,817 UART: Running Caliptra ROM ...
2,176,989 UART:
2,177,163 UART: [state] CFI Enabled
2,178,139 UART: [state] LifecycleState = Unprovisioned
2,179,793 UART: [state] DebugLocked = No
2,180,817 UART: [state] WD Timer not started. Device not locked for debugging
2,183,245 UART: [kat] SHA2-256
2,183,900 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,186,917 UART: [kat] ++
2,187,366 UART: [kat] sha1
2,187,872 UART: [kat] SHA2-256
2,188,606 UART: [kat] SHA2-384
2,189,265 UART: [kat] SHA2-512-ACC
2,190,139 UART: [kat] ECC-384
4,098,416 UART: [kat] HMAC-384Kdf
4,111,481 UART: [kat] LMS
5,184,657 UART: [kat] --
5,188,248 UART: [cold-reset] ++
5,190,213 UART: [fht] FHT @ 0x50003400
5,200,468 UART: [idev] ++
5,201,143 UART: [idev] CDI.KEYID = 6
5,202,381 UART: [idev] SUBJECT.KEYID = 7
5,203,820 UART: [idev] UDS.KEYID = 0
5,223,175 UART: [idev] Erasing UDS.KEYID = 0
8,494,377 UART: [idev] Sha1 KeyId Algorithm
8,516,957 UART: [idev] --
8,520,837 UART: [ldev] ++
8,521,462 UART: [ldev] CDI.KEYID = 6
8,522,649 UART: [ldev] SUBJECT.KEYID = 5
8,524,087 UART: [ldev] AUTHORITY.KEYID = 7
8,525,650 UART: [ldev] FE.KEYID = 1
8,537,644 UART: [ldev] Erasing FE.KEYID = 1
11,826,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,134,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,150,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,166,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,141 UART: [ldev] --
14,193,232 UART: [fwproc] Wait for Commands...
14,195,970 UART: [fwproc] Recv command 0x46574c44
14,198,232 UART: [fwproc] Recv'd Img size: 113844 bytes
16,896,873 UART: ROM Fatal Error: 0x000B003B
16,900,296 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,024,588 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,723,643 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
2,035,299 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,179,993 UART:
2,180,402 UART: Running Caliptra ROM ...
2,181,489 UART:
2,181,642 UART: [state] CFI Enabled
2,182,624 UART: [state] LifecycleState = Unprovisioned
2,184,272 UART: [state] DebugLocked = No
2,185,323 UART: [state] WD Timer not started. Device not locked for debugging
2,187,790 UART: [kat] SHA2-256
2,188,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,191,464 UART: [kat] ++
2,191,911 UART: [kat] sha1
2,192,419 UART: [kat] SHA2-256
2,193,074 UART: [kat] SHA2-384
2,193,733 UART: [kat] SHA2-512-ACC
2,194,564 UART: [kat] ECC-384
2,948,060 UART: [kat] HMAC-384Kdf
2,971,583 UART: [kat] LMS
3,501,043 UART: [kat] --
3,503,418 UART: [cold-reset] ++
3,505,788 UART: [fht] FHT @ 0x50003400
3,516,820 UART: [idev] ++
3,517,393 UART: [idev] CDI.KEYID = 6
3,518,319 UART: [idev] SUBJECT.KEYID = 7
3,519,629 UART: [idev] UDS.KEYID = 0
3,542,804 UART: [idev] Erasing UDS.KEYID = 0
6,025,315 UART: [idev] Sha1 KeyId Algorithm
6,048,243 UART: [idev] --
6,052,566 UART: [ldev] ++
6,053,137 UART: [ldev] CDI.KEYID = 6
6,054,047 UART: [ldev] SUBJECT.KEYID = 5
6,055,275 UART: [ldev] AUTHORITY.KEYID = 7
6,056,512 UART: [ldev] FE.KEYID = 1
6,099,464 UART: [ldev] Erasing FE.KEYID = 1
8,599,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,662 UART: [ldev] --
10,391,064 UART: [fwproc] Wait for Commands...
10,393,767 UART: [fwproc] Recv command 0x46574c44
10,395,872 UART: [fwproc] Recv'd Img size: 114168 bytes
12,443,935 UART: ROM Fatal Error: 0x000B003B
12,447,014 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
2,027,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,217,758 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,027,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,172,057 UART:
2,172,444 UART: Running Caliptra ROM ...
2,173,526 UART:
2,173,683 UART: [state] CFI Enabled
2,174,655 UART: [state] LifecycleState = Unprovisioned
2,176,295 UART: [state] DebugLocked = No
2,177,316 UART: [state] WD Timer not started. Device not locked for debugging
2,179,779 UART: [kat] SHA2-256
2,180,443 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,443 UART: [kat] ++
2,183,890 UART: [kat] sha1
2,184,396 UART: [kat] SHA2-256
2,185,053 UART: [kat] SHA2-384
2,185,711 UART: [kat] SHA2-512-ACC
2,186,565 UART: [kat] ECC-384
3,278,105 UART: [kat] HMAC-384Kdf
3,290,709 UART: [kat] LMS
3,820,166 UART: [kat] --
3,823,454 UART: [cold-reset] ++
3,825,811 UART: [fht] FHT @ 0x50003400
3,835,432 UART: [idev] ++
3,835,989 UART: [idev] CDI.KEYID = 6
3,836,869 UART: [idev] SUBJECT.KEYID = 7
3,838,078 UART: [idev] UDS.KEYID = 0
3,856,918 UART: [idev] Erasing UDS.KEYID = 0
6,310,680 UART: [idev] Sha1 KeyId Algorithm
6,332,554 UART: [idev] --
6,337,352 UART: [ldev] ++
6,337,916 UART: [ldev] CDI.KEYID = 6
6,338,930 UART: [ldev] SUBJECT.KEYID = 5
6,340,050 UART: [ldev] AUTHORITY.KEYID = 7
6,341,282 UART: [ldev] FE.KEYID = 1
6,350,523 UART: [ldev] Erasing FE.KEYID = 1
8,823,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,976 UART: [ldev] --
10,611,701 UART: [fwproc] Wait for Commands...
10,613,240 UART: [fwproc] Recv command 0x46574c44
10,615,347 UART: [fwproc] Recv'd Img size: 114168 bytes
12,661,672 UART: ROM Fatal Error: 0x000B003B
12,664,738 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
2,024,312 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,449,735 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
2,053,251 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,197,490 UART:
2,197,890 UART: Running Caliptra ROM ...
2,199,008 UART:
2,199,178 UART: [state] CFI Enabled
2,200,172 UART: [state] LifecycleState = Unprovisioned
2,201,825 UART: [state] DebugLocked = No
2,202,856 UART: [state] WD Timer not started. Device not locked for debugging
2,205,325 UART: [kat] SHA2-256
2,205,994 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,005 UART: [kat] ++
2,209,458 UART: [kat] sha1
2,210,014 UART: [kat] SHA2-256
2,210,679 UART: [kat] SHA2-384
2,211,336 UART: [kat] SHA2-512-ACC
2,212,220 UART: [kat] ECC-384
2,930,581 UART: [kat] HMAC-384Kdf
2,951,506 UART: [kat] LMS
3,480,975 UART: [kat] --
3,487,075 UART: [cold-reset] ++
3,488,037 UART: [fht] FHT @ 0x50003400
3,499,805 UART: [idev] ++
3,500,371 UART: [idev] CDI.KEYID = 6
3,501,250 UART: [idev] SUBJECT.KEYID = 7
3,502,403 UART: [idev] UDS.KEYID = 0
3,522,977 UART: [idev] Erasing UDS.KEYID = 0
6,004,466 UART: [idev] Sha1 KeyId Algorithm
6,027,755 UART: [idev] --
6,032,578 UART: [ldev] ++
6,033,152 UART: [ldev] CDI.KEYID = 6
6,034,041 UART: [ldev] SUBJECT.KEYID = 5
6,035,268 UART: [ldev] AUTHORITY.KEYID = 7
6,036,509 UART: [ldev] FE.KEYID = 1
6,078,378 UART: [ldev] Erasing FE.KEYID = 1
8,582,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,221 UART: [ldev] --
10,393,215 UART: [fwproc] Wait for Commands...
10,394,673 UART: [fwproc] Recv command 0x46574c44
10,396,781 UART: [fwproc] Recv'd Img size: 114168 bytes
12,452,101 UART: ROM Fatal Error: 0x000B003B
12,455,189 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,791 writing to cptra_bootfsm_go
2,036,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,252,733 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
2,024,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,168,610 UART:
2,169,012 UART: Running Caliptra ROM ...
2,170,191 UART:
2,170,369 UART: [state] CFI Enabled
2,171,347 UART: [state] LifecycleState = Unprovisioned
2,172,991 UART: [state] DebugLocked = No
2,174,096 UART: [state] WD Timer not started. Device not locked for debugging
2,176,567 UART: [kat] SHA2-256
2,177,235 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,250 UART: [kat] ++
2,180,727 UART: [kat] sha1
2,181,243 UART: [kat] SHA2-256
2,181,982 UART: [kat] SHA2-384
2,182,651 UART: [kat] SHA2-512-ACC
2,183,484 UART: [kat] ECC-384
3,280,392 UART: [kat] HMAC-384Kdf
3,293,278 UART: [kat] LMS
3,822,782 UART: [kat] --
3,826,035 UART: [cold-reset] ++
3,827,169 UART: [fht] FHT @ 0x50003400
3,838,587 UART: [idev] ++
3,839,149 UART: [idev] CDI.KEYID = 6
3,840,165 UART: [idev] SUBJECT.KEYID = 7
3,841,226 UART: [idev] UDS.KEYID = 0
3,855,933 UART: [idev] Erasing UDS.KEYID = 0
6,314,286 UART: [idev] Sha1 KeyId Algorithm
6,336,627 UART: [idev] --
6,341,432 UART: [ldev] ++
6,342,003 UART: [ldev] CDI.KEYID = 6
6,342,890 UART: [ldev] SUBJECT.KEYID = 5
6,344,103 UART: [ldev] AUTHORITY.KEYID = 7
6,345,333 UART: [ldev] FE.KEYID = 1
6,357,869 UART: [ldev] Erasing FE.KEYID = 1
8,827,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,325 UART: [ldev] --
10,616,295 UART: [fwproc] Wait for Commands...
10,618,220 UART: [fwproc] Recv command 0x46574c44
10,620,279 UART: [fwproc] Recv'd Img size: 114168 bytes
12,672,334 UART: ROM Fatal Error: 0x000B003B
12,675,423 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
2,023,765 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,455,539 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,963 UART: [state] WD Timer not started. Device not locked for debugging
88,256 UART: [kat] SHA2-256
891,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,935 UART: [kat] ++
896,087 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,884 UART: [kat] SHA2-512-ACC
906,785 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
921,098 UART: [kat] LMS
1,169,410 UART: [kat] --
1,170,405 UART: [cold-reset] ++
1,170,793 UART: [fht] FHT @ 0x50003400
1,173,437 UART: [idev] ++
1,173,605 UART: [idev] CDI.KEYID = 6
1,173,966 UART: [idev] SUBJECT.KEYID = 7
1,174,391 UART: [idev] UDS.KEYID = 0
1,182,363 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,945 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,804 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,662 UART: [ldev] --
1,280,956 UART: [fwproc] Wait for Commands...
1,281,631 UART: [fwproc] Recv command 0x46574c44
1,282,364 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,072 UART: ROM Fatal Error: 0x000B003B
1,331,231 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,192 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,176 UART: [kat] SHA2-256
902,116 UART: [kat] SHA2-384
904,965 UART: [kat] SHA2-512-ACC
906,866 UART: [kat] ECC-384
916,847 UART: [kat] HMAC-384Kdf
921,507 UART: [kat] LMS
1,169,819 UART: [kat] --
1,170,668 UART: [cold-reset] ++
1,171,150 UART: [fht] FHT @ 0x50003400
1,173,904 UART: [idev] ++
1,174,072 UART: [idev] CDI.KEYID = 6
1,174,433 UART: [idev] SUBJECT.KEYID = 7
1,174,858 UART: [idev] UDS.KEYID = 0
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,556 UART: [idev] Sha1 KeyId Algorithm
1,209,426 UART: [idev] --
1,210,549 UART: [ldev] ++
1,210,717 UART: [ldev] CDI.KEYID = 6
1,211,081 UART: [ldev] SUBJECT.KEYID = 5
1,211,508 UART: [ldev] AUTHORITY.KEYID = 7
1,211,971 UART: [ldev] FE.KEYID = 1
1,217,283 UART: [ldev] Erasing FE.KEYID = 1
1,244,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,899 UART: [ldev] --
1,283,409 UART: [fwproc] Wait for Commands...
1,284,140 UART: [fwproc] Recv command 0x46574c44
1,284,873 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,903 UART: ROM Fatal Error: 0x000B003B
1,334,062 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,081 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,277 UART: [cold-reset] ++
1,169,737 UART: [fht] FHT @ 0x50003400
1,172,287 UART: [idev] ++
1,172,455 UART: [idev] CDI.KEYID = 6
1,172,816 UART: [idev] SUBJECT.KEYID = 7
1,173,241 UART: [idev] UDS.KEYID = 0
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,089 UART: [idev] Sha1 KeyId Algorithm
1,206,737 UART: [idev] --
1,207,768 UART: [ldev] ++
1,207,936 UART: [ldev] CDI.KEYID = 6
1,208,300 UART: [ldev] SUBJECT.KEYID = 5
1,208,727 UART: [ldev] AUTHORITY.KEYID = 7
1,209,190 UART: [ldev] FE.KEYID = 1
1,214,706 UART: [ldev] Erasing FE.KEYID = 1
1,240,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,960 UART: [ldev] --
1,280,252 UART: [fwproc] Wait for Commands...
1,280,947 UART: [fwproc] Recv command 0x46574c44
1,281,680 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,018 UART: ROM Fatal Error: 0x000B003B
1,330,177 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,890 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,060 UART: [state] WD Timer not started. Device not locked for debugging
88,417 UART: [kat] SHA2-256
891,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,096 UART: [kat] ++
896,248 UART: [kat] sha1
900,490 UART: [kat] SHA2-256
902,430 UART: [kat] SHA2-384
905,129 UART: [kat] SHA2-512-ACC
907,030 UART: [kat] ECC-384
916,617 UART: [kat] HMAC-384Kdf
921,167 UART: [kat] LMS
1,169,479 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,182,728 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,690 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,341 UART: [ldev] Erasing FE.KEYID = 1
1,243,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,659 UART: [fwproc] Wait for Commands...
1,283,244 UART: [fwproc] Recv command 0x46574c44
1,283,977 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,521 UART: ROM Fatal Error: 0x000B003B
1,332,680 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,687 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
915,482 UART: [kat] HMAC-384Kdf
919,914 UART: [kat] LMS
1,168,226 UART: [kat] --
1,168,969 UART: [cold-reset] ++
1,169,441 UART: [fht] FHT @ 0x50003400
1,172,091 UART: [idev] ++
1,172,259 UART: [idev] CDI.KEYID = 6
1,172,620 UART: [idev] SUBJECT.KEYID = 7
1,173,045 UART: [idev] UDS.KEYID = 0
1,180,959 UART: [idev] Erasing UDS.KEYID = 0
1,197,987 UART: [idev] Sha1 KeyId Algorithm
1,206,975 UART: [idev] --
1,208,100 UART: [ldev] ++
1,208,268 UART: [ldev] CDI.KEYID = 6
1,208,632 UART: [ldev] SUBJECT.KEYID = 5
1,209,059 UART: [ldev] AUTHORITY.KEYID = 7
1,209,522 UART: [ldev] FE.KEYID = 1
1,214,526 UART: [ldev] Erasing FE.KEYID = 1
1,240,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,570 UART: [ldev] --
1,279,926 UART: [fwproc] Wait for Commands...
1,280,681 UART: [fwproc] Recv command 0x46574c44
1,281,414 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,594 UART: ROM Fatal Error: 0x000B003B
1,329,753 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,398 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,945 UART: [state] LifecycleState = Unprovisioned
86,600 UART: [state] DebugLocked = No
87,314 UART: [state] WD Timer not started. Device not locked for debugging
88,449 UART: [kat] SHA2-256
891,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,128 UART: [kat] ++
896,280 UART: [kat] sha1
900,420 UART: [kat] SHA2-256
902,360 UART: [kat] SHA2-384
905,201 UART: [kat] SHA2-512-ACC
907,102 UART: [kat] ECC-384
916,633 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,548 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,182,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,912 UART: [idev] Sha1 KeyId Algorithm
1,208,830 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,429 UART: [ldev] SUBJECT.KEYID = 5
1,210,856 UART: [ldev] AUTHORITY.KEYID = 7
1,211,319 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,859 UART: [ldev] --
1,281,163 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,351 UART: ROM Fatal Error: 0x000B003B
1,331,510 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,955 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,022,141 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,166,327 UART:
2,166,732 UART: Running Caliptra ROM ...
2,167,839 UART:
2,168,007 UART: [state] CFI Enabled
2,168,985 UART: [state] LifecycleState = Unprovisioned
2,170,628 UART: [state] DebugLocked = No
2,171,732 UART: [state] WD Timer not started. Device not locked for debugging
2,174,193 UART: [kat] SHA2-256
2,174,859 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,177,860 UART: [kat] ++
2,178,330 UART: [kat] sha1
2,178,846 UART: [kat] SHA2-256
2,179,502 UART: [kat] SHA2-384
2,180,156 UART: [kat] SHA2-512-ACC
2,180,984 UART: [kat] ECC-384
3,777,260 UART: [kat] HMAC-384Kdf
3,804,292 UART: [kat] LMS
4,877,421 UART: [kat] --
4,880,597 UART: [cold-reset] ++
4,881,894 UART: [fht] FHT @ 0x50003400
4,893,144 UART: [idev] ++
4,893,867 UART: [idev] CDI.KEYID = 6
4,895,046 UART: [idev] SUBJECT.KEYID = 7
4,896,207 UART: [idev] UDS.KEYID = 0
4,932,276 UART: [idev] Erasing UDS.KEYID = 0
8,244,534 UART: [idev] Sha1 KeyId Algorithm
8,267,469 UART: [idev] --
8,271,516 UART: [ldev] ++
8,272,084 UART: [ldev] CDI.KEYID = 6
8,273,246 UART: [ldev] SUBJECT.KEYID = 5
8,274,425 UART: [ldev] AUTHORITY.KEYID = 7
8,275,659 UART: [ldev] FE.KEYID = 1
8,320,700 UART: [ldev] Erasing FE.KEYID = 1
11,656,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,014,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,036,074 UART: [ldev] --
14,040,248 UART: [fwproc] Wait for Commands...
14,043,327 UART: [fwproc] Recv command 0x46574c44
14,045,607 UART: [fwproc] Recv'd Img size: 113844 bytes
16,737,831 UART: ROM Fatal Error: 0x000B0010
16,741,239 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
2,023,665 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,491,969 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
2,023,734 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,167,823 UART:
2,168,233 UART: Running Caliptra ROM ...
2,169,394 UART:
2,169,559 UART: [state] CFI Enabled
2,170,522 UART: [state] LifecycleState = Unprovisioned
2,172,157 UART: [state] DebugLocked = No
2,173,257 UART: [state] WD Timer not started. Device not locked for debugging
2,175,721 UART: [kat] SHA2-256
2,176,384 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,374 UART: [kat] ++
2,179,861 UART: [kat] sha1
2,180,388 UART: [kat] SHA2-256
2,181,125 UART: [kat] SHA2-384
2,181,791 UART: [kat] SHA2-512-ACC
2,182,664 UART: [kat] ECC-384
4,097,993 UART: [kat] HMAC-384Kdf
4,110,942 UART: [kat] LMS
5,184,125 UART: [kat] --
5,188,256 UART: [cold-reset] ++
5,190,142 UART: [fht] FHT @ 0x50003400
5,201,125 UART: [idev] ++
5,201,801 UART: [idev] CDI.KEYID = 6
5,202,958 UART: [idev] SUBJECT.KEYID = 7
5,204,441 UART: [idev] UDS.KEYID = 0
5,220,443 UART: [idev] Erasing UDS.KEYID = 0
8,496,064 UART: [idev] Sha1 KeyId Algorithm
8,518,932 UART: [idev] --
8,521,917 UART: [ldev] ++
8,522,481 UART: [ldev] CDI.KEYID = 6
8,523,639 UART: [ldev] SUBJECT.KEYID = 5
8,525,172 UART: [ldev] AUTHORITY.KEYID = 7
8,526,650 UART: [ldev] FE.KEYID = 1
8,536,031 UART: [ldev] Erasing FE.KEYID = 1
11,828,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,297 UART: [ldev] --
14,195,805 UART: [fwproc] Wait for Commands...
14,198,602 UART: [fwproc] Recv command 0x46574c44
14,200,864 UART: [fwproc] Recv'd Img size: 113844 bytes
16,897,715 UART: ROM Fatal Error: 0x000B0010
16,901,136 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,022,047 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,708,704 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
2,033,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,177,331 UART:
2,177,719 UART: Running Caliptra ROM ...
2,178,890 UART:
2,179,058 UART: [state] CFI Enabled
2,180,136 UART: [state] LifecycleState = Unprovisioned
2,181,810 UART: [state] DebugLocked = No
2,182,875 UART: [state] WD Timer not started. Device not locked for debugging
2,185,351 UART: [kat] SHA2-256
2,186,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,189,040 UART: [kat] ++
2,189,493 UART: [kat] sha1
2,190,030 UART: [kat] SHA2-256
2,190,782 UART: [kat] SHA2-384
2,191,450 UART: [kat] SHA2-512-ACC
2,192,334 UART: [kat] ECC-384
2,949,379 UART: [kat] HMAC-384Kdf
2,982,375 UART: [kat] LMS
3,511,829 UART: [kat] --
3,515,326 UART: [cold-reset] ++
3,516,773 UART: [fht] FHT @ 0x50003400
3,527,807 UART: [idev] ++
3,528,370 UART: [idev] CDI.KEYID = 6
3,529,306 UART: [idev] SUBJECT.KEYID = 7
3,530,516 UART: [idev] UDS.KEYID = 0
3,554,410 UART: [idev] Erasing UDS.KEYID = 0
6,039,317 UART: [idev] Sha1 KeyId Algorithm
6,062,393 UART: [idev] --
6,066,204 UART: [ldev] ++
6,066,780 UART: [ldev] CDI.KEYID = 6
6,067,695 UART: [ldev] SUBJECT.KEYID = 5
6,068,863 UART: [ldev] AUTHORITY.KEYID = 7
6,070,157 UART: [ldev] FE.KEYID = 1
6,109,825 UART: [ldev] Erasing FE.KEYID = 1
8,614,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,807 UART: [ldev] --
10,426,517 UART: [fwproc] Wait for Commands...
10,429,547 UART: [fwproc] Recv command 0x46574c44
10,431,646 UART: [fwproc] Recv'd Img size: 114168 bytes
12,470,696 UART: ROM Fatal Error: 0x000B0010
12,473,849 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
2,028,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,241,256 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
2,024,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,168,420 UART:
2,168,816 UART: Running Caliptra ROM ...
2,169,916 UART:
2,170,076 UART: [state] CFI Enabled
2,171,054 UART: [state] LifecycleState = Unprovisioned
2,172,696 UART: [state] DebugLocked = No
2,173,722 UART: [state] WD Timer not started. Device not locked for debugging
2,176,186 UART: [kat] SHA2-256
2,176,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,857 UART: [kat] ++
2,180,303 UART: [kat] sha1
2,180,817 UART: [kat] SHA2-256
2,181,474 UART: [kat] SHA2-384
2,182,131 UART: [kat] SHA2-512-ACC
2,182,969 UART: [kat] ECC-384
3,282,385 UART: [kat] HMAC-384Kdf
3,295,091 UART: [kat] LMS
3,824,568 UART: [kat] --
3,828,225 UART: [cold-reset] ++
3,829,618 UART: [fht] FHT @ 0x50003400
3,839,464 UART: [idev] ++
3,840,027 UART: [idev] CDI.KEYID = 6
3,841,041 UART: [idev] SUBJECT.KEYID = 7
3,842,203 UART: [idev] UDS.KEYID = 0
3,861,308 UART: [idev] Erasing UDS.KEYID = 0
6,319,285 UART: [idev] Sha1 KeyId Algorithm
6,340,567 UART: [idev] --
6,344,729 UART: [ldev] ++
6,345,338 UART: [ldev] CDI.KEYID = 6
6,346,256 UART: [ldev] SUBJECT.KEYID = 5
6,347,426 UART: [ldev] AUTHORITY.KEYID = 7
6,348,656 UART: [ldev] FE.KEYID = 1
6,360,593 UART: [ldev] Erasing FE.KEYID = 1
8,831,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,650 UART: [ldev] --
10,624,315 UART: [fwproc] Wait for Commands...
10,625,818 UART: [fwproc] Recv command 0x46574c44
10,627,916 UART: [fwproc] Recv'd Img size: 114168 bytes
12,664,908 UART: ROM Fatal Error: 0x000B0010
12,667,982 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,652 writing to cptra_bootfsm_go
2,029,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,447,017 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
2,023,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,355 UART:
2,167,765 UART: Running Caliptra ROM ...
2,168,846 UART:
2,169,000 UART: [state] CFI Enabled
2,169,989 UART: [state] LifecycleState = Unprovisioned
2,171,650 UART: [state] DebugLocked = No
2,172,702 UART: [state] WD Timer not started. Device not locked for debugging
2,175,169 UART: [kat] SHA2-256
2,176,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,179,092 UART: [kat] ++
2,179,543 UART: [kat] sha1
2,180,075 UART: [kat] SHA2-256
2,180,738 UART: [kat] SHA2-384
2,181,395 UART: [kat] SHA2-512-ACC
2,182,220 UART: [kat] ECC-384
2,947,623 UART: [kat] HMAC-384Kdf
2,970,760 UART: [kat] LMS
3,500,220 UART: [kat] --
3,503,587 UART: [cold-reset] ++
3,506,083 UART: [fht] FHT @ 0x50003400
3,517,019 UART: [idev] ++
3,517,586 UART: [idev] CDI.KEYID = 6
3,518,490 UART: [idev] SUBJECT.KEYID = 7
3,519,707 UART: [idev] UDS.KEYID = 0
3,543,042 UART: [idev] Erasing UDS.KEYID = 0
6,025,793 UART: [idev] Sha1 KeyId Algorithm
6,048,478 UART: [idev] --
6,053,532 UART: [ldev] ++
6,054,115 UART: [ldev] CDI.KEYID = 6
6,055,038 UART: [ldev] SUBJECT.KEYID = 5
6,056,209 UART: [ldev] AUTHORITY.KEYID = 7
6,057,447 UART: [ldev] FE.KEYID = 1
6,098,790 UART: [ldev] Erasing FE.KEYID = 1
8,603,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,006 UART: [ldev] --
10,415,653 UART: [fwproc] Wait for Commands...
10,418,768 UART: [fwproc] Recv command 0x46574c44
10,420,878 UART: [fwproc] Recv'd Img size: 114168 bytes
12,463,563 UART: ROM Fatal Error: 0x000B0010
12,466,710 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,022,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,222,150 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
2,030,436 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,174,924 UART:
2,175,342 UART: Running Caliptra ROM ...
2,176,536 UART:
2,176,706 UART: [state] CFI Enabled
2,177,680 UART: [state] LifecycleState = Unprovisioned
2,180,228 UART: [state] DebugLocked = No
2,181,367 UART: [state] WD Timer not started. Device not locked for debugging
2,183,876 UART: [kat] SHA2-256
2,184,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,187,560 UART: [kat] ++
2,188,011 UART: [kat] sha1
2,188,527 UART: [kat] SHA2-256
2,189,263 UART: [kat] SHA2-384
2,189,929 UART: [kat] SHA2-512-ACC
2,190,808 UART: [kat] ECC-384
3,281,078 UART: [kat] HMAC-384Kdf
3,294,757 UART: [kat] LMS
3,824,249 UART: [kat] --
3,829,310 UART: [cold-reset] ++
3,830,320 UART: [fht] FHT @ 0x50003400
3,842,111 UART: [idev] ++
3,842,678 UART: [idev] CDI.KEYID = 6
3,843,560 UART: [idev] SUBJECT.KEYID = 7
3,844,787 UART: [idev] UDS.KEYID = 0
3,863,064 UART: [idev] Erasing UDS.KEYID = 0
6,319,623 UART: [idev] Sha1 KeyId Algorithm
6,343,471 UART: [idev] --
6,347,566 UART: [ldev] ++
6,348,147 UART: [ldev] CDI.KEYID = 6
6,349,215 UART: [ldev] SUBJECT.KEYID = 5
6,350,321 UART: [ldev] AUTHORITY.KEYID = 7
6,351,492 UART: [ldev] FE.KEYID = 1
6,363,163 UART: [ldev] Erasing FE.KEYID = 1
8,835,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,539 UART: [ldev] --
10,626,493 UART: [fwproc] Wait for Commands...
10,628,375 UART: [fwproc] Recv command 0x46574c44
10,630,474 UART: [fwproc] Recv'd Img size: 114168 bytes
12,674,051 UART: ROM Fatal Error: 0x000B0010
12,677,185 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
2,029,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,437,187 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,513 UART: [kat] SHA2-256
901,453 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,813 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,181,911 UART: [idev] Erasing UDS.KEYID = 0
1,198,289 UART: [idev] Sha1 KeyId Algorithm
1,207,089 UART: [idev] --
1,208,264 UART: [ldev] ++
1,208,432 UART: [ldev] CDI.KEYID = 6
1,208,796 UART: [ldev] SUBJECT.KEYID = 5
1,209,223 UART: [ldev] AUTHORITY.KEYID = 7
1,209,686 UART: [ldev] FE.KEYID = 1
1,214,920 UART: [ldev] Erasing FE.KEYID = 1
1,241,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,362 UART: [ldev] --
1,280,854 UART: [fwproc] Wait for Commands...
1,281,679 UART: [fwproc] Recv command 0x46574c44
1,282,412 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,563 UART: ROM Fatal Error: 0x000B0010
1,325,720 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,176,801 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,217 UART: [kat] SHA2-256
891,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,896 UART: [kat] ++
896,048 UART: [kat] sha1
900,384 UART: [kat] SHA2-256
902,324 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,369 UART: [kat] LMS
1,169,681 UART: [kat] --
1,170,290 UART: [cold-reset] ++
1,170,724 UART: [fht] FHT @ 0x50003400
1,173,432 UART: [idev] ++
1,173,600 UART: [idev] CDI.KEYID = 6
1,173,961 UART: [idev] SUBJECT.KEYID = 7
1,174,386 UART: [idev] UDS.KEYID = 0
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,148 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,208,825 UART: [ldev] ++
1,208,993 UART: [ldev] CDI.KEYID = 6
1,209,357 UART: [ldev] SUBJECT.KEYID = 5
1,209,784 UART: [ldev] AUTHORITY.KEYID = 7
1,210,247 UART: [ldev] FE.KEYID = 1
1,215,469 UART: [ldev] Erasing FE.KEYID = 1
1,241,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,963 UART: [ldev] --
1,281,299 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 114168 bytes
1,325,034 UART: ROM Fatal Error: 0x000B0010
1,326,191 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,652 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
916,136 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,833 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,182,175 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,208,001 UART: [idev] --
1,209,014 UART: [ldev] ++
1,209,182 UART: [ldev] CDI.KEYID = 6
1,209,546 UART: [ldev] SUBJECT.KEYID = 5
1,209,973 UART: [ldev] AUTHORITY.KEYID = 7
1,210,436 UART: [ldev] FE.KEYID = 1
1,215,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,838 UART: [ldev] --
1,281,338 UART: [fwproc] Wait for Commands...
1,281,993 UART: [fwproc] Recv command 0x46574c44
1,282,726 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,723 UART: ROM Fatal Error: 0x000B0010
1,325,880 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,573 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,951 UART: [kat] SHA2-512-ACC
906,852 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,626 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,216,299 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,281,879 UART: [fwproc] Wait for Commands...
1,282,516 UART: [fwproc] Recv command 0x46574c44
1,283,249 UART: [fwproc] Recv'd Img size: 114168 bytes
1,326,742 UART: ROM Fatal Error: 0x000B0010
1,327,899 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,492 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Unprovisioned
86,203 UART: [state] DebugLocked = No
86,745 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,440 UART: [kat] LMS
1,168,752 UART: [kat] --
1,169,535 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,493 UART: [idev] Sha1 KeyId Algorithm
1,207,477 UART: [idev] --
1,208,684 UART: [ldev] ++
1,208,852 UART: [ldev] CDI.KEYID = 6
1,209,216 UART: [ldev] SUBJECT.KEYID = 5
1,209,643 UART: [ldev] AUTHORITY.KEYID = 7
1,210,106 UART: [ldev] FE.KEYID = 1
1,215,320 UART: [ldev] Erasing FE.KEYID = 1
1,241,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,624 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,795 UART: [fwproc] Recv command 0x46574c44
1,282,528 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,767 UART: ROM Fatal Error: 0x000B0010
1,325,924 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,093 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,545 UART: [kat] SHA2-512-ACC
906,446 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,170,050 UART: [cold-reset] ++
1,170,564 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,562 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,475 UART: [ldev] ++
1,209,643 UART: [ldev] CDI.KEYID = 6
1,210,007 UART: [ldev] SUBJECT.KEYID = 5
1,210,434 UART: [ldev] AUTHORITY.KEYID = 7
1,210,897 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,149 UART: [ldev] --
1,282,619 UART: [fwproc] Wait for Commands...
1,283,304 UART: [fwproc] Recv command 0x46574c44
1,284,037 UART: [fwproc] Recv'd Img size: 114168 bytes
1,325,934 UART: ROM Fatal Error: 0x000B0010
1,327,091 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,902 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
2,021,050 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,164,833 UART:
2,165,227 UART: Running Caliptra ROM ...
2,166,308 UART:
2,166,460 UART: [state] CFI Enabled
2,167,433 UART: [state] LifecycleState = Unprovisioned
2,169,288 UART: [state] DebugLocked = No
2,170,328 UART: [state] WD Timer not started. Device not locked for debugging
2,172,794 UART: [kat] SHA2-256
2,173,459 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,176,453 UART: [kat] ++
2,176,921 UART: [kat] sha1
2,177,435 UART: [kat] SHA2-256
2,178,093 UART: [kat] SHA2-384
2,178,754 UART: [kat] SHA2-512-ACC
2,179,585 UART: [kat] ECC-384
3,776,668 UART: [kat] HMAC-384Kdf
3,803,061 UART: [kat] LMS
4,876,254 UART: [kat] --
4,879,291 UART: [cold-reset] ++
4,881,073 UART: [fht] FHT @ 0x50003400
4,891,582 UART: [idev] ++
4,892,291 UART: [idev] CDI.KEYID = 6
4,893,402 UART: [idev] SUBJECT.KEYID = 7
4,894,629 UART: [idev] UDS.KEYID = 0
4,929,372 UART: [idev] Erasing UDS.KEYID = 0
8,243,656 UART: [idev] Sha1 KeyId Algorithm
8,266,735 UART: [idev] --
8,270,875 UART: [ldev] ++
8,271,512 UART: [ldev] CDI.KEYID = 6
8,272,624 UART: [ldev] SUBJECT.KEYID = 5
8,273,838 UART: [ldev] AUTHORITY.KEYID = 7
8,275,020 UART: [ldev] FE.KEYID = 1
8,317,776 UART: [ldev] Erasing FE.KEYID = 1
11,650,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,521 UART: [ldev] --
14,035,709 UART: [fwproc] Wait for Commands...
14,037,699 UART: [fwproc] Recv command 0x46574c44
14,040,029 UART: [fwproc] Recv'd Img size: 113844 bytes
16,739,261 UART: ROM Fatal Error: 0x000B0012
16,742,729 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,028,676 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,506,042 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,024,082 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,168,248 UART:
2,168,658 UART: Running Caliptra ROM ...
2,169,789 UART:
2,169,946 UART: [state] CFI Enabled
2,170,844 UART: [state] LifecycleState = Unprovisioned
2,172,480 UART: [state] DebugLocked = No
2,173,589 UART: [state] WD Timer not started. Device not locked for debugging
2,176,046 UART: [kat] SHA2-256
2,176,711 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,726 UART: [kat] ++
2,180,170 UART: [kat] sha1
2,180,910 UART: [kat] SHA2-256
2,181,570 UART: [kat] SHA2-384
2,182,220 UART: [kat] SHA2-512-ACC
2,183,038 UART: [kat] ECC-384
4,098,341 UART: [kat] HMAC-384Kdf
4,109,996 UART: [kat] LMS
5,183,127 UART: [kat] --
5,187,677 UART: [cold-reset] ++
5,190,098 UART: [fht] FHT @ 0x50003400
5,202,925 UART: [idev] ++
5,203,596 UART: [idev] CDI.KEYID = 6
5,204,826 UART: [idev] SUBJECT.KEYID = 7
5,206,258 UART: [idev] UDS.KEYID = 0
5,224,993 UART: [idev] Erasing UDS.KEYID = 0
8,498,634 UART: [idev] Sha1 KeyId Algorithm
8,519,551 UART: [idev] --
8,524,739 UART: [ldev] ++
8,525,354 UART: [ldev] CDI.KEYID = 6
8,526,461 UART: [ldev] SUBJECT.KEYID = 5
8,528,012 UART: [ldev] AUTHORITY.KEYID = 7
8,529,441 UART: [ldev] FE.KEYID = 1
8,541,444 UART: [ldev] Erasing FE.KEYID = 1
11,830,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,960 UART: [ldev] --
14,195,866 UART: [fwproc] Wait for Commands...
14,197,961 UART: [fwproc] Recv command 0x46574c44
14,200,297 UART: [fwproc] Recv'd Img size: 113844 bytes
16,902,303 UART: ROM Fatal Error: 0x000B0012
16,905,713 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
2,028,215 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,727,823 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
2,025,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,244 UART:
2,169,646 UART: Running Caliptra ROM ...
2,170,775 UART:
2,170,939 UART: [state] CFI Enabled
2,171,851 UART: [state] LifecycleState = Unprovisioned
2,173,507 UART: [state] DebugLocked = No
2,174,626 UART: [state] WD Timer not started. Device not locked for debugging
2,177,101 UART: [kat] SHA2-256
2,177,766 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,779 UART: [kat] ++
2,181,228 UART: [kat] sha1
2,181,778 UART: [kat] SHA2-256
2,182,547 UART: [kat] SHA2-384
2,183,406 UART: [kat] SHA2-512-ACC
2,184,283 UART: [kat] ECC-384
2,949,169 UART: [kat] HMAC-384Kdf
2,972,193 UART: [kat] LMS
3,501,650 UART: [kat] --
3,505,213 UART: [cold-reset] ++
3,506,762 UART: [fht] FHT @ 0x50003400
3,518,286 UART: [idev] ++
3,518,857 UART: [idev] CDI.KEYID = 6
3,519,736 UART: [idev] SUBJECT.KEYID = 7
3,520,952 UART: [idev] UDS.KEYID = 0
3,542,955 UART: [idev] Erasing UDS.KEYID = 0
6,023,171 UART: [idev] Sha1 KeyId Algorithm
6,046,488 UART: [idev] --
6,049,525 UART: [ldev] ++
6,050,120 UART: [ldev] CDI.KEYID = 6
6,051,014 UART: [ldev] SUBJECT.KEYID = 5
6,052,184 UART: [ldev] AUTHORITY.KEYID = 7
6,053,478 UART: [ldev] FE.KEYID = 1
6,098,890 UART: [ldev] Erasing FE.KEYID = 1
8,601,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,350 UART: [ldev] --
10,410,777 UART: [fwproc] Wait for Commands...
10,412,986 UART: [fwproc] Recv command 0x46574c44
10,415,093 UART: [fwproc] Recv'd Img size: 114168 bytes
12,461,934 UART: ROM Fatal Error: 0x000B0012
12,465,064 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
2,021,830 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,249,239 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
2,023,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,204 UART:
2,167,590 UART: Running Caliptra ROM ...
2,168,670 UART:
2,168,825 UART: [state] CFI Enabled
2,169,799 UART: [state] LifecycleState = Unprovisioned
2,171,446 UART: [state] DebugLocked = No
2,172,574 UART: [state] WD Timer not started. Device not locked for debugging
2,175,047 UART: [kat] SHA2-256
2,175,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,726 UART: [kat] ++
2,179,175 UART: [kat] sha1
2,179,688 UART: [kat] SHA2-256
2,180,340 UART: [kat] SHA2-384
2,180,994 UART: [kat] SHA2-512-ACC
2,181,819 UART: [kat] ECC-384
3,282,344 UART: [kat] HMAC-384Kdf
3,293,764 UART: [kat] LMS
3,823,273 UART: [kat] --
3,827,104 UART: [cold-reset] ++
3,828,874 UART: [fht] FHT @ 0x50003400
3,839,129 UART: [idev] ++
3,839,705 UART: [idev] CDI.KEYID = 6
3,840,635 UART: [idev] SUBJECT.KEYID = 7
3,841,799 UART: [idev] UDS.KEYID = 0
3,858,854 UART: [idev] Erasing UDS.KEYID = 0
6,316,115 UART: [idev] Sha1 KeyId Algorithm
6,338,436 UART: [idev] --
6,343,560 UART: [ldev] ++
6,344,131 UART: [ldev] CDI.KEYID = 6
6,345,009 UART: [ldev] SUBJECT.KEYID = 5
6,346,229 UART: [ldev] AUTHORITY.KEYID = 7
6,347,456 UART: [ldev] FE.KEYID = 1
6,359,234 UART: [ldev] Erasing FE.KEYID = 1
8,830,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,021 UART: [ldev] --
10,620,152 UART: [fwproc] Wait for Commands...
10,622,038 UART: [fwproc] Recv command 0x46574c44
10,624,135 UART: [fwproc] Recv'd Img size: 114168 bytes
12,672,239 UART: ROM Fatal Error: 0x000B0012
12,675,364 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
2,021,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,450,363 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,022,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,167,082 UART:
2,167,501 UART: Running Caliptra ROM ...
2,168,675 UART:
2,168,850 UART: [state] CFI Enabled
2,169,830 UART: [state] LifecycleState = Unprovisioned
2,171,475 UART: [state] DebugLocked = No
2,172,587 UART: [state] WD Timer not started. Device not locked for debugging
2,175,064 UART: [kat] SHA2-256
2,175,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,178,746 UART: [kat] ++
2,179,194 UART: [kat] sha1
2,179,708 UART: [kat] SHA2-256
2,180,453 UART: [kat] SHA2-384
2,181,117 UART: [kat] SHA2-512-ACC
2,181,979 UART: [kat] ECC-384
2,948,444 UART: [kat] HMAC-384Kdf
2,972,495 UART: [kat] LMS
3,501,966 UART: [kat] --
3,506,069 UART: [cold-reset] ++
3,507,087 UART: [fht] FHT @ 0x50003400
3,518,233 UART: [idev] ++
3,518,812 UART: [idev] CDI.KEYID = 6
3,519,721 UART: [idev] SUBJECT.KEYID = 7
3,520,939 UART: [idev] UDS.KEYID = 0
3,543,508 UART: [idev] Erasing UDS.KEYID = 0
6,029,003 UART: [idev] Sha1 KeyId Algorithm
6,052,711 UART: [idev] --
6,055,484 UART: [ldev] ++
6,056,069 UART: [ldev] CDI.KEYID = 6
6,056,961 UART: [ldev] SUBJECT.KEYID = 5
6,058,203 UART: [ldev] AUTHORITY.KEYID = 7
6,059,445 UART: [ldev] FE.KEYID = 1
6,100,174 UART: [ldev] Erasing FE.KEYID = 1
8,603,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,035 UART: [ldev] --
10,413,123 UART: [fwproc] Wait for Commands...
10,416,089 UART: [fwproc] Recv command 0x46574c44
10,418,201 UART: [fwproc] Recv'd Img size: 114168 bytes
12,464,389 UART: ROM Fatal Error: 0x000B0012
12,467,483 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,030,218 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,239,965 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,525 writing to cptra_bootfsm_go
2,030,238 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,174,271 UART:
2,174,658 UART: Running Caliptra ROM ...
2,175,740 UART:
2,175,896 UART: [state] CFI Enabled
2,176,888 UART: [state] LifecycleState = Unprovisioned
2,178,546 UART: [state] DebugLocked = No
2,179,574 UART: [state] WD Timer not started. Device not locked for debugging
2,182,044 UART: [kat] SHA2-256
2,182,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,185,726 UART: [kat] ++
2,186,173 UART: [kat] sha1
2,186,685 UART: [kat] SHA2-256
2,187,341 UART: [kat] SHA2-384
2,188,003 UART: [kat] SHA2-512-ACC
2,188,896 UART: [kat] ECC-384
3,287,356 UART: [kat] HMAC-384Kdf
3,300,585 UART: [kat] LMS
3,830,074 UART: [kat] --
3,833,530 UART: [cold-reset] ++
3,835,296 UART: [fht] FHT @ 0x50003400
3,845,902 UART: [idev] ++
3,846,461 UART: [idev] CDI.KEYID = 6
3,847,398 UART: [idev] SUBJECT.KEYID = 7
3,848,607 UART: [idev] UDS.KEYID = 0
3,867,793 UART: [idev] Erasing UDS.KEYID = 0
6,327,522 UART: [idev] Sha1 KeyId Algorithm
6,350,161 UART: [idev] --
6,355,070 UART: [ldev] ++
6,355,636 UART: [ldev] CDI.KEYID = 6
6,356,513 UART: [ldev] SUBJECT.KEYID = 5
6,357,727 UART: [ldev] AUTHORITY.KEYID = 7
6,359,012 UART: [ldev] FE.KEYID = 1
6,370,515 UART: [ldev] Erasing FE.KEYID = 1
8,843,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,496 UART: [ldev] --
10,637,714 UART: [fwproc] Wait for Commands...
10,640,622 UART: [fwproc] Recv command 0x46574c44
10,642,729 UART: [fwproc] Recv'd Img size: 114168 bytes
12,692,223 UART: ROM Fatal Error: 0x000B0012
12,695,295 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
2,022,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,448,841 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,429 UART: [cold-reset] ++
1,170,961 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,657 UART: [idev] Sha1 KeyId Algorithm
1,208,649 UART: [idev] --
1,209,860 UART: [ldev] ++
1,210,028 UART: [ldev] CDI.KEYID = 6
1,210,392 UART: [ldev] SUBJECT.KEYID = 5
1,210,819 UART: [ldev] AUTHORITY.KEYID = 7
1,211,282 UART: [ldev] FE.KEYID = 1
1,216,452 UART: [ldev] Erasing FE.KEYID = 1
1,242,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,356 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,519 UART: [fwproc] Recv command 0x46574c44
1,283,252 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,267 UART: ROM Fatal Error: 0x000B0012
1,330,424 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,593 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,116 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
891,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,034 UART: [kat] ++
896,186 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,239 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,706 UART: [fht] FHT @ 0x50003400
1,173,362 UART: [idev] ++
1,173,530 UART: [idev] CDI.KEYID = 6
1,173,891 UART: [idev] SUBJECT.KEYID = 7
1,174,316 UART: [idev] UDS.KEYID = 0
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,198,290 UART: [idev] Sha1 KeyId Algorithm
1,207,080 UART: [idev] --
1,208,081 UART: [ldev] ++
1,208,249 UART: [ldev] CDI.KEYID = 6
1,208,613 UART: [ldev] SUBJECT.KEYID = 5
1,209,040 UART: [ldev] AUTHORITY.KEYID = 7
1,209,503 UART: [ldev] FE.KEYID = 1
1,214,713 UART: [ldev] Erasing FE.KEYID = 1
1,241,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,297 UART: [ldev] --
1,280,625 UART: [fwproc] Wait for Commands...
1,281,342 UART: [fwproc] Recv command 0x46574c44
1,282,075 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,638 UART: ROM Fatal Error: 0x000B0012
1,329,795 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,692 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,145 UART: [kat] ++
895,297 UART: [kat] sha1
899,339 UART: [kat] SHA2-256
901,279 UART: [kat] SHA2-384
903,912 UART: [kat] SHA2-512-ACC
905,813 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,676 UART: [kat] LMS
1,168,988 UART: [kat] --
1,169,889 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,696 UART: [ldev] ++
1,208,864 UART: [ldev] CDI.KEYID = 6
1,209,228 UART: [ldev] SUBJECT.KEYID = 5
1,209,655 UART: [ldev] AUTHORITY.KEYID = 7
1,210,118 UART: [ldev] FE.KEYID = 1
1,215,228 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,970 UART: [ldev] --
1,280,322 UART: [fwproc] Wait for Commands...
1,280,961 UART: [fwproc] Recv command 0x46574c44
1,281,694 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,651 UART: ROM Fatal Error: 0x000B0012
1,329,808 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,221 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,888 UART: [kat] SHA2-256
901,828 UART: [kat] SHA2-384
904,773 UART: [kat] SHA2-512-ACC
906,674 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,811 UART: [kat] LMS
1,169,123 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,786 UART: [idev] ++
1,173,954 UART: [idev] CDI.KEYID = 6
1,174,315 UART: [idev] SUBJECT.KEYID = 7
1,174,740 UART: [idev] UDS.KEYID = 0
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,210,035 UART: [ldev] ++
1,210,203 UART: [ldev] CDI.KEYID = 6
1,210,567 UART: [ldev] SUBJECT.KEYID = 5
1,210,994 UART: [ldev] AUTHORITY.KEYID = 7
1,211,457 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,243,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,817 UART: [ldev] --
1,282,185 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,362 UART: ROM Fatal Error: 0x000B0012
1,331,519 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,502 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,486 UART: [kat] SHA2-512-ACC
906,387 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,214 UART: [kat] LMS
1,168,526 UART: [kat] --
1,169,619 UART: [cold-reset] ++
1,170,137 UART: [fht] FHT @ 0x50003400
1,172,597 UART: [idev] ++
1,172,765 UART: [idev] CDI.KEYID = 6
1,173,126 UART: [idev] SUBJECT.KEYID = 7
1,173,551 UART: [idev] UDS.KEYID = 0
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,208,106 UART: [ldev] ++
1,208,274 UART: [ldev] CDI.KEYID = 6
1,208,638 UART: [ldev] SUBJECT.KEYID = 5
1,209,065 UART: [ldev] AUTHORITY.KEYID = 7
1,209,528 UART: [ldev] FE.KEYID = 1
1,214,860 UART: [ldev] Erasing FE.KEYID = 1
1,241,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,830 UART: [ldev] --
1,280,218 UART: [fwproc] Wait for Commands...
1,281,009 UART: [fwproc] Recv command 0x46574c44
1,281,742 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,237 UART: ROM Fatal Error: 0x000B0012
1,329,394 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,415 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,627 UART: [kat] SHA2-512-ACC
906,528 UART: [kat] ECC-384
916,021 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,646 UART: [cold-reset] ++
1,170,002 UART: [fht] FHT @ 0x50003400
1,172,824 UART: [idev] ++
1,172,992 UART: [idev] CDI.KEYID = 6
1,173,353 UART: [idev] SUBJECT.KEYID = 7
1,173,778 UART: [idev] UDS.KEYID = 0
1,181,784 UART: [idev] Erasing UDS.KEYID = 0
1,198,518 UART: [idev] Sha1 KeyId Algorithm
1,207,284 UART: [idev] --
1,208,251 UART: [ldev] ++
1,208,419 UART: [ldev] CDI.KEYID = 6
1,208,783 UART: [ldev] SUBJECT.KEYID = 5
1,209,210 UART: [ldev] AUTHORITY.KEYID = 7
1,209,673 UART: [ldev] FE.KEYID = 1
1,214,953 UART: [ldev] Erasing FE.KEYID = 1
1,241,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,227 UART: [ldev] --
1,280,735 UART: [fwproc] Wait for Commands...
1,281,472 UART: [fwproc] Recv command 0x46574c44
1,282,205 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,142 UART: ROM Fatal Error: 0x000B0012
1,330,299 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,468 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,023,601 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,167,538 UART:
2,167,957 UART: Running Caliptra ROM ...
2,169,141 UART:
2,169,316 UART: [state] CFI Enabled
2,170,280 UART: [state] LifecycleState = Unprovisioned
2,171,926 UART: [state] DebugLocked = No
2,173,028 UART: [state] WD Timer not started. Device not locked for debugging
2,175,509 UART: [kat] SHA2-256
2,176,180 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,179,203 UART: [kat] ++
2,179,656 UART: [kat] sha1
2,180,174 UART: [kat] SHA2-256
2,180,911 UART: [kat] SHA2-384
2,181,576 UART: [kat] SHA2-512-ACC
2,182,457 UART: [kat] ECC-384
3,776,519 UART: [kat] HMAC-384Kdf
3,804,467 UART: [kat] LMS
4,877,635 UART: [kat] --
4,882,712 UART: [cold-reset] ++
4,883,966 UART: [fht] FHT @ 0x50003400
4,895,415 UART: [idev] ++
4,896,088 UART: [idev] CDI.KEYID = 6
4,897,260 UART: [idev] SUBJECT.KEYID = 7
4,898,420 UART: [idev] UDS.KEYID = 0
4,931,918 UART: [idev] Erasing UDS.KEYID = 0
8,245,291 UART: [idev] Sha1 KeyId Algorithm
8,266,628 UART: [idev] --
8,271,054 UART: [ldev] ++
8,271,622 UART: [ldev] CDI.KEYID = 6
8,272,728 UART: [ldev] SUBJECT.KEYID = 5
8,274,000 UART: [ldev] AUTHORITY.KEYID = 7
8,275,100 UART: [ldev] FE.KEYID = 1
8,320,351 UART: [ldev] Erasing FE.KEYID = 1
11,655,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,139 UART: [ldev] --
14,039,052 UART: [fwproc] Wait for Commands...
14,041,529 UART: [fwproc] Recv command 0x46574c44
14,043,797 UART: [fwproc] Recv'd Img size: 113844 bytes
16,745,503 UART: ROM Fatal Error: 0x000B003C
16,748,907 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
2,022,869 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,508,309 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
2,026,152 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,170,441 UART:
2,170,840 UART: Running Caliptra ROM ...
2,171,920 UART:
2,172,065 UART: [state] CFI Enabled
2,173,028 UART: [state] LifecycleState = Unprovisioned
2,174,697 UART: [state] DebugLocked = No
2,175,720 UART: [state] WD Timer not started. Device not locked for debugging
2,178,187 UART: [kat] SHA2-256
2,178,843 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
2,181,865 UART: [kat] ++
2,182,309 UART: [kat] sha1
2,182,813 UART: [kat] SHA2-256
2,183,461 UART: [kat] SHA2-384
2,184,109 UART: [kat] SHA2-512-ACC
2,184,946 UART: [kat] ECC-384
4,097,096 UART: [kat] HMAC-384Kdf
4,107,786 UART: [kat] LMS
5,180,919 UART: [kat] --
5,186,667 UART: [cold-reset] ++
5,189,420 UART: [fht] FHT @ 0x50003400
5,200,834 UART: [idev] ++
5,201,512 UART: [idev] CDI.KEYID = 6
5,202,751 UART: [idev] SUBJECT.KEYID = 7
5,204,193 UART: [idev] UDS.KEYID = 0
5,218,863 UART: [idev] Erasing UDS.KEYID = 0
8,490,659 UART: [idev] Sha1 KeyId Algorithm
8,512,812 UART: [idev] --
8,517,507 UART: [ldev] ++
8,518,128 UART: [ldev] CDI.KEYID = 6
8,519,308 UART: [ldev] SUBJECT.KEYID = 5
8,520,797 UART: [ldev] AUTHORITY.KEYID = 7
8,522,350 UART: [ldev] FE.KEYID = 1
8,534,186 UART: [ldev] Erasing FE.KEYID = 1
11,829,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,930 UART: [ldev] --
14,193,165 UART: [fwproc] Wait for Commands...
14,196,175 UART: [fwproc] Recv command 0x46574c44
14,198,517 UART: [fwproc] Recv'd Img size: 113844 bytes
16,905,531 UART: ROM Fatal Error: 0x000B003C
16,908,943 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
2,029,935 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,715,838 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,025,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,507 UART:
2,169,908 UART: Running Caliptra ROM ...
2,171,076 UART:
2,171,249 UART: [state] CFI Enabled
2,172,167 UART: [state] LifecycleState = Unprovisioned
2,173,815 UART: [state] DebugLocked = No
2,174,923 UART: [state] WD Timer not started. Device not locked for debugging
2,177,418 UART: [kat] SHA2-256
2,178,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,112 UART: [kat] ++
2,181,565 UART: [kat] sha1
2,182,076 UART: [kat] SHA2-256
2,182,773 UART: [kat] SHA2-384
2,183,432 UART: [kat] SHA2-512-ACC
2,184,256 UART: [kat] ECC-384
2,948,741 UART: [kat] HMAC-384Kdf
2,971,407 UART: [kat] LMS
3,500,873 UART: [kat] --
3,504,808 UART: [cold-reset] ++
3,505,870 UART: [fht] FHT @ 0x50003400
3,515,533 UART: [idev] ++
3,516,098 UART: [idev] CDI.KEYID = 6
3,516,987 UART: [idev] SUBJECT.KEYID = 7
3,518,275 UART: [idev] UDS.KEYID = 0
3,544,056 UART: [idev] Erasing UDS.KEYID = 0
6,026,381 UART: [idev] Sha1 KeyId Algorithm
6,049,257 UART: [idev] --
6,053,286 UART: [ldev] ++
6,053,863 UART: [ldev] CDI.KEYID = 6
6,054,778 UART: [ldev] SUBJECT.KEYID = 5
6,055,996 UART: [ldev] AUTHORITY.KEYID = 7
6,057,232 UART: [ldev] FE.KEYID = 1
6,091,387 UART: [ldev] Erasing FE.KEYID = 1
8,593,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,379,749 UART: [ldev] --
10,383,640 UART: [fwproc] Wait for Commands...
10,386,013 UART: [fwproc] Recv command 0x46574c44
10,388,126 UART: [fwproc] Recv'd Img size: 114168 bytes
12,441,775 UART: ROM Fatal Error: 0x000B003C
12,444,907 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
2,027,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,256,937 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
2,025,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,169,586 UART:
2,169,978 UART: Running Caliptra ROM ...
2,171,148 UART:
2,171,319 UART: [state] CFI Enabled
2,172,288 UART: [state] LifecycleState = Unprovisioned
2,173,926 UART: [state] DebugLocked = No
2,175,025 UART: [state] WD Timer not started. Device not locked for debugging
2,177,499 UART: [kat] SHA2-256
2,178,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,171 UART: [kat] ++
2,181,636 UART: [kat] sha1
2,182,148 UART: [kat] SHA2-256
2,182,887 UART: [kat] SHA2-384
2,183,551 UART: [kat] SHA2-512-ACC
2,184,432 UART: [kat] ECC-384
3,281,753 UART: [kat] HMAC-384Kdf
3,294,377 UART: [kat] LMS
3,823,878 UART: [kat] --
3,828,444 UART: [cold-reset] ++
3,830,216 UART: [fht] FHT @ 0x50003400
3,840,863 UART: [idev] ++
3,841,423 UART: [idev] CDI.KEYID = 6
3,842,432 UART: [idev] SUBJECT.KEYID = 7
3,843,588 UART: [idev] UDS.KEYID = 0
3,859,730 UART: [idev] Erasing UDS.KEYID = 0
6,315,832 UART: [idev] Sha1 KeyId Algorithm
6,339,028 UART: [idev] --
6,342,769 UART: [ldev] ++
6,343,345 UART: [ldev] CDI.KEYID = 6
6,344,252 UART: [ldev] SUBJECT.KEYID = 5
6,345,413 UART: [ldev] AUTHORITY.KEYID = 7
6,346,717 UART: [ldev] FE.KEYID = 1
6,356,659 UART: [ldev] Erasing FE.KEYID = 1
8,830,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,930 UART: [ldev] --
10,619,259 UART: [fwproc] Wait for Commands...
10,621,528 UART: [fwproc] Recv command 0x46574c44
10,623,574 UART: [fwproc] Recv'd Img size: 114168 bytes
12,670,682 UART: ROM Fatal Error: 0x000B003C
12,673,804 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,468 writing to cptra_bootfsm_go
2,025,423 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,461,906 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
2,024,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,168,967 UART:
2,169,369 UART: Running Caliptra ROM ...
2,170,455 UART:
2,170,607 UART: [state] CFI Enabled
2,171,667 UART: [state] LifecycleState = Unprovisioned
2,173,243 UART: [state] DebugLocked = No
2,174,329 UART: [state] WD Timer not started. Device not locked for debugging
2,176,804 UART: [kat] SHA2-256
2,177,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,180,479 UART: [kat] ++
2,180,927 UART: [kat] sha1
2,181,440 UART: [kat] SHA2-256
2,182,095 UART: [kat] SHA2-384
2,182,752 UART: [kat] SHA2-512-ACC
2,183,552 UART: [kat] ECC-384
2,949,803 UART: [kat] HMAC-384Kdf
2,970,774 UART: [kat] LMS
3,500,220 UART: [kat] --
3,504,432 UART: [cold-reset] ++
3,505,335 UART: [fht] FHT @ 0x50003400
3,515,965 UART: [idev] ++
3,516,528 UART: [idev] CDI.KEYID = 6
3,517,428 UART: [idev] SUBJECT.KEYID = 7
3,518,585 UART: [idev] UDS.KEYID = 0
3,543,855 UART: [idev] Erasing UDS.KEYID = 0
6,024,645 UART: [idev] Sha1 KeyId Algorithm
6,047,950 UART: [idev] --
6,051,769 UART: [ldev] ++
6,052,351 UART: [ldev] CDI.KEYID = 6
6,053,269 UART: [ldev] SUBJECT.KEYID = 5
6,054,488 UART: [ldev] AUTHORITY.KEYID = 7
6,055,724 UART: [ldev] FE.KEYID = 1
6,098,943 UART: [ldev] Erasing FE.KEYID = 1
8,602,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,347 UART: [ldev] --
10,413,241 UART: [fwproc] Wait for Commands...
10,416,366 UART: [fwproc] Recv command 0x46574c44
10,418,412 UART: [fwproc] Recv'd Img size: 114168 bytes
12,476,271 UART: ROM Fatal Error: 0x000B003C
12,479,401 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,025,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,264,554 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,471 writing to cptra_bootfsm_go
2,025,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,170,080 UART:
2,170,485 UART: Running Caliptra ROM ...
2,171,658 UART:
2,171,826 UART: [state] CFI Enabled
2,172,802 UART: [state] LifecycleState = Unprovisioned
2,174,447 UART: [state] DebugLocked = No
2,175,554 UART: [state] WD Timer not started. Device not locked for debugging
2,178,024 UART: [kat] SHA2-256
2,178,695 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,181,715 UART: [kat] ++
2,182,162 UART: [kat] sha1
2,182,695 UART: [kat] SHA2-256
2,183,357 UART: [kat] SHA2-384
2,184,059 UART: [kat] SHA2-512-ACC
2,184,868 UART: [kat] ECC-384
3,287,030 UART: [kat] HMAC-384Kdf
3,299,911 UART: [kat] LMS
3,829,400 UART: [kat] --
3,832,594 UART: [cold-reset] ++
3,834,414 UART: [fht] FHT @ 0x50003400
3,844,691 UART: [idev] ++
3,845,300 UART: [idev] CDI.KEYID = 6
3,846,186 UART: [idev] SUBJECT.KEYID = 7
3,847,341 UART: [idev] UDS.KEYID = 0
3,863,801 UART: [idev] Erasing UDS.KEYID = 0
6,321,869 UART: [idev] Sha1 KeyId Algorithm
6,346,171 UART: [idev] --
6,349,749 UART: [ldev] ++
6,350,314 UART: [ldev] CDI.KEYID = 6
6,351,218 UART: [ldev] SUBJECT.KEYID = 5
6,352,381 UART: [ldev] AUTHORITY.KEYID = 7
6,353,662 UART: [ldev] FE.KEYID = 1
6,363,608 UART: [ldev] Erasing FE.KEYID = 1
8,838,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,592 UART: [ldev] --
10,629,742 UART: [fwproc] Wait for Commands...
10,632,596 UART: [fwproc] Recv command 0x46574c44
10,634,688 UART: [fwproc] Recv'd Img size: 114168 bytes
12,680,340 UART: ROM Fatal Error: 0x000B003C
12,683,438 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
2,026,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,457,785 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,566 UART: [state] LifecycleState = Unprovisioned
86,221 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,813 UART: [cold-reset] ++
1,171,375 UART: [fht] FHT @ 0x50003400
1,174,069 UART: [idev] ++
1,174,237 UART: [idev] CDI.KEYID = 6
1,174,598 UART: [idev] SUBJECT.KEYID = 7
1,175,023 UART: [idev] UDS.KEYID = 0
1,183,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,537 UART: [idev] Sha1 KeyId Algorithm
1,208,483 UART: [idev] --
1,209,704 UART: [ldev] ++
1,209,872 UART: [ldev] CDI.KEYID = 6
1,210,236 UART: [ldev] SUBJECT.KEYID = 5
1,210,663 UART: [ldev] AUTHORITY.KEYID = 7
1,211,126 UART: [ldev] FE.KEYID = 1
1,216,342 UART: [ldev] Erasing FE.KEYID = 1
1,242,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,946 UART: [ldev] --
1,282,220 UART: [fwproc] Wait for Commands...
1,283,025 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,931 UART: ROM Fatal Error: 0x000B003C
1,333,090 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,205 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,750 UART: [kat] ++
895,902 UART: [kat] sha1
900,326 UART: [kat] SHA2-256
902,266 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,645 UART: [kat] HMAC-384Kdf
921,259 UART: [kat] LMS
1,169,571 UART: [kat] --
1,170,494 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,514 UART: [idev] ++
1,173,682 UART: [idev] CDI.KEYID = 6
1,174,043 UART: [idev] SUBJECT.KEYID = 7
1,174,468 UART: [idev] UDS.KEYID = 0
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,544 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,769 UART: [ldev] ++
1,209,937 UART: [ldev] CDI.KEYID = 6
1,210,301 UART: [ldev] SUBJECT.KEYID = 5
1,210,728 UART: [ldev] AUTHORITY.KEYID = 7
1,211,191 UART: [ldev] FE.KEYID = 1
1,216,325 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,265 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,348 UART: [fwproc] Recv command 0x46574c44
1,283,081 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,436 UART: ROM Fatal Error: 0x000B003C
1,331,595 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,558 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,045 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,001 UART: [kat] ++
895,153 UART: [kat] sha1
899,335 UART: [kat] SHA2-256
901,275 UART: [kat] SHA2-384
903,954 UART: [kat] SHA2-512-ACC
905,855 UART: [kat] ECC-384
915,506 UART: [kat] HMAC-384Kdf
920,096 UART: [kat] LMS
1,168,408 UART: [kat] --
1,169,159 UART: [cold-reset] ++
1,169,695 UART: [fht] FHT @ 0x50003400
1,172,423 UART: [idev] ++
1,172,591 UART: [idev] CDI.KEYID = 6
1,172,952 UART: [idev] SUBJECT.KEYID = 7
1,173,377 UART: [idev] UDS.KEYID = 0
1,181,265 UART: [idev] Erasing UDS.KEYID = 0
1,198,247 UART: [idev] Sha1 KeyId Algorithm
1,207,197 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,214,728 UART: [ldev] Erasing FE.KEYID = 1
1,241,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,348 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,283 UART: [fwproc] Recv command 0x46574c44
1,282,016 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,375 UART: ROM Fatal Error: 0x000B003C
1,330,534 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,229 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
891,797 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,926 UART: [kat] ++
896,078 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
904,855 UART: [kat] SHA2-512-ACC
906,756 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,356 UART: [idev] Sha1 KeyId Algorithm
1,208,434 UART: [idev] --
1,209,443 UART: [ldev] ++
1,209,611 UART: [ldev] CDI.KEYID = 6
1,209,975 UART: [ldev] SUBJECT.KEYID = 5
1,210,402 UART: [ldev] AUTHORITY.KEYID = 7
1,210,865 UART: [ldev] FE.KEYID = 1
1,216,145 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,685 UART: [ldev] --
1,282,113 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46574c44
1,283,501 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,672 UART: ROM Fatal Error: 0x000B003C
1,332,831 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,366 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,241 UART: [fht] FHT @ 0x50003400
1,173,001 UART: [idev] ++
1,173,169 UART: [idev] CDI.KEYID = 6
1,173,530 UART: [idev] SUBJECT.KEYID = 7
1,173,955 UART: [idev] UDS.KEYID = 0
1,181,817 UART: [idev] Erasing UDS.KEYID = 0
1,198,925 UART: [idev] Sha1 KeyId Algorithm
1,207,689 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,752 UART: [ldev] --
1,281,226 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,255 UART: ROM Fatal Error: 0x000B003C
1,330,414 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,791 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,443 UART: [kat] HMAC-384Kdf
921,231 UART: [kat] LMS
1,169,543 UART: [kat] --
1,170,528 UART: [cold-reset] ++
1,170,932 UART: [fht] FHT @ 0x50003400
1,173,454 UART: [idev] ++
1,173,622 UART: [idev] CDI.KEYID = 6
1,173,983 UART: [idev] SUBJECT.KEYID = 7
1,174,408 UART: [idev] UDS.KEYID = 0
1,182,524 UART: [idev] Erasing UDS.KEYID = 0
1,199,716 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,997 UART: [ldev] --
1,282,261 UART: [fwproc] Wait for Commands...
1,283,084 UART: [fwproc] Recv command 0x46574c44
1,283,817 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,510 UART: ROM Fatal Error: 0x000B003C
1,332,669 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,890 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,448 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,085 UART:
192,463 UART: Running Caliptra ROM ...
193,610 UART:
193,759 UART: [state] CFI Enabled
264,014 UART: [state] LifecycleState = Unprovisioned
266,360 UART: [state] DebugLocked = No
267,872 UART: [state] WD Timer not started. Device not locked for debugging
272,300 UART: [kat] SHA2-256
454,210 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,736 UART: [kat] ++
466,325 UART: [kat] sha1
478,015 UART: [kat] SHA2-256
481,025 UART: [kat] SHA2-384
485,968 UART: [kat] SHA2-512-ACC
488,584 UART: [kat] ECC-384
3,777,796 UART: [kat] HMAC-384Kdf
3,802,466 UART: [kat] LMS
4,875,645 UART: [kat] --
4,879,469 UART: [cold-reset] ++
4,882,003 UART: [fht] FHT @ 0x50003400
4,893,957 UART: [idev] ++
4,894,710 UART: [idev] CDI.KEYID = 6
4,895,822 UART: [idev] SUBJECT.KEYID = 7
4,897,035 UART: [idev] UDS.KEYID = 0
4,930,591 UART: [idev] Erasing UDS.KEYID = 0
8,244,701 UART: [idev] Sha1 KeyId Algorithm
8,267,876 UART: [idev] --
8,271,658 UART: [ldev] ++
8,272,321 UART: [ldev] CDI.KEYID = 6
8,273,433 UART: [ldev] SUBJECT.KEYID = 5
8,274,649 UART: [ldev] AUTHORITY.KEYID = 7
8,275,802 UART: [ldev] FE.KEYID = 1
8,317,532 UART: [ldev] Erasing FE.KEYID = 1
11,651,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,049 UART: [ldev] --
14,040,416 UART: [fwproc] Wait for Commands...
14,043,168 UART: [fwproc] Recv command 0x46574c44
14,045,441 UART: Invalid Img size: 0 bytes
14,049,728 UART: ROM Fatal Error: 0x01020002
14,053,058 >>> mbox cmd response: failed
14,055,595 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,198,743 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,403 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
13,834,571 >>> mbox cmd response: failed
13,837,673 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,980,873 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,786 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,396 UART:
192,781 UART: Running Caliptra ROM ...
193,992 UART:
603,666 UART: [state] CFI Enabled
619,164 UART: [state] LifecycleState = Unprovisioned
621,590 UART: [state] DebugLocked = No
623,747 UART: [state] WD Timer not started. Device not locked for debugging
628,535 UART: [kat] SHA2-256
810,531 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,049 UART: [kat] ++
822,551 UART: [kat] sha1
832,992 UART: [kat] SHA2-256
836,058 UART: [kat] SHA2-384
843,002 UART: [kat] SHA2-512-ACC
845,638 UART: [kat] ECC-384
4,100,974 UART: [kat] HMAC-384Kdf
4,111,958 UART: [kat] LMS
5,185,097 UART: [kat] --
5,190,373 UART: [cold-reset] ++
5,192,429 UART: [fht] FHT @ 0x50003400
5,203,143 UART: [idev] ++
5,203,820 UART: [idev] CDI.KEYID = 6
5,205,001 UART: [idev] SUBJECT.KEYID = 7
5,206,444 UART: [idev] UDS.KEYID = 0
5,221,432 UART: [idev] Erasing UDS.KEYID = 0
8,495,708 UART: [idev] Sha1 KeyId Algorithm
8,518,353 UART: [idev] --
8,522,672 UART: [ldev] ++
8,523,243 UART: [ldev] CDI.KEYID = 6
8,524,482 UART: [ldev] SUBJECT.KEYID = 5
8,525,933 UART: [ldev] AUTHORITY.KEYID = 7
8,527,499 UART: [ldev] FE.KEYID = 1
8,538,804 UART: [ldev] Erasing FE.KEYID = 1
11,830,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,019 UART: [ldev] --
14,195,983 UART: [fwproc] Wait for Commands...
14,198,561 UART: [fwproc] Recv command 0x46574c44
14,200,876 UART: Invalid Img size: 0 bytes
14,204,849 UART: ROM Fatal Error: 0x01020002
14,208,159 >>> mbox cmd response: failed
14,210,720 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,353,927 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,846 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
14,013,443 >>> mbox cmd response: failed
14,016,222 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,159,796 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,584 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,221 UART:
192,589 UART: Running Caliptra ROM ...
193,804 UART:
193,959 UART: [state] CFI Enabled
265,648 UART: [state] LifecycleState = Unprovisioned
267,563 UART: [state] DebugLocked = No
269,868 UART: [state] WD Timer not started. Device not locked for debugging
274,079 UART: [kat] SHA2-256
453,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,763 UART: [kat] ++
465,213 UART: [kat] sha1
476,895 UART: [kat] SHA2-256
479,907 UART: [kat] SHA2-384
485,020 UART: [kat] SHA2-512-ACC
487,953 UART: [kat] ECC-384
2,945,023 UART: [kat] HMAC-384Kdf
2,968,228 UART: [kat] LMS
3,497,676 UART: [kat] --
3,501,849 UART: [cold-reset] ++
3,503,594 UART: [fht] FHT @ 0x50003400
3,514,904 UART: [idev] ++
3,515,479 UART: [idev] CDI.KEYID = 6
3,516,502 UART: [idev] SUBJECT.KEYID = 7
3,517,608 UART: [idev] UDS.KEYID = 0
3,540,844 UART: [idev] Erasing UDS.KEYID = 0
6,024,436 UART: [idev] Sha1 KeyId Algorithm
6,048,046 UART: [idev] --
6,052,320 UART: [ldev] ++
6,052,903 UART: [ldev] CDI.KEYID = 6
6,053,814 UART: [ldev] SUBJECT.KEYID = 5
6,054,978 UART: [ldev] AUTHORITY.KEYID = 7
6,056,216 UART: [ldev] FE.KEYID = 1
6,096,727 UART: [ldev] Erasing FE.KEYID = 1
8,599,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,939 UART: [ldev] --
10,386,681 UART: [fwproc] Wait for Commands...
10,388,269 UART: [fwproc] Recv command 0x46574c44
10,390,374 UART: Invalid Img size: 0 bytes
10,394,703 UART: ROM Fatal Error: 0x01020002
10,397,798 >>> mbox cmd response: failed
10,400,223 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,543,789 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,449 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,228,473 >>> mbox cmd response: failed
10,231,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,374,941 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,139 writing to cptra_bootfsm_go
4,846 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
193,416 UART:
193,778 UART: Running Caliptra ROM ...
194,887 UART:
604,706 UART: [state] CFI Enabled
618,205 UART: [state] LifecycleState = Unprovisioned
620,093 UART: [state] DebugLocked = No
621,713 UART: [state] WD Timer not started. Device not locked for debugging
625,266 UART: [kat] SHA2-256
804,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,933 UART: [kat] ++
816,373 UART: [kat] sha1
828,324 UART: [kat] SHA2-256
831,325 UART: [kat] SHA2-384
837,570 UART: [kat] SHA2-512-ACC
840,501 UART: [kat] ECC-384
3,283,373 UART: [kat] HMAC-384Kdf
3,297,444 UART: [kat] LMS
3,826,965 UART: [kat] --
3,829,951 UART: [cold-reset] ++
3,831,072 UART: [fht] FHT @ 0x50003400
3,841,779 UART: [idev] ++
3,842,345 UART: [idev] CDI.KEYID = 6
3,843,441 UART: [idev] SUBJECT.KEYID = 7
3,844,500 UART: [idev] UDS.KEYID = 0
3,860,586 UART: [idev] Erasing UDS.KEYID = 0
6,314,252 UART: [idev] Sha1 KeyId Algorithm
6,336,620 UART: [idev] --
6,341,233 UART: [ldev] ++
6,341,806 UART: [ldev] CDI.KEYID = 6
6,342,687 UART: [ldev] SUBJECT.KEYID = 5
6,343,894 UART: [ldev] AUTHORITY.KEYID = 7
6,345,125 UART: [ldev] FE.KEYID = 1
6,357,143 UART: [ldev] Erasing FE.KEYID = 1
8,835,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,598 UART: [ldev] --
10,622,672 UART: [fwproc] Wait for Commands...
10,624,982 UART: [fwproc] Recv command 0x46574c44
10,627,099 UART: Invalid Img size: 0 bytes
10,630,514 UART: ROM Fatal Error: 0x01020002
10,633,607 >>> mbox cmd response: failed
10,635,885 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,779,403 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
4,063 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,396,691 >>> mbox cmd response: failed
10,399,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,542,847 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,462 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,104 UART:
192,473 UART: Running Caliptra ROM ...
194,047 UART:
194,220 UART: [state] CFI Enabled
264,305 UART: [state] LifecycleState = Unprovisioned
266,179 UART: [state] DebugLocked = No
268,683 UART: [state] WD Timer not started. Device not locked for debugging
273,254 UART: [kat] SHA2-256
452,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,900 UART: [kat] ++
464,429 UART: [kat] sha1
475,206 UART: [kat] SHA2-256
478,217 UART: [kat] SHA2-384
485,001 UART: [kat] SHA2-512-ACC
488,001 UART: [kat] ECC-384
2,949,850 UART: [kat] HMAC-384Kdf
2,972,458 UART: [kat] LMS
3,501,914 UART: [kat] --
3,507,292 UART: [cold-reset] ++
3,508,529 UART: [fht] FHT @ 0x50003400
3,519,403 UART: [idev] ++
3,519,969 UART: [idev] CDI.KEYID = 6
3,520,932 UART: [idev] SUBJECT.KEYID = 7
3,522,096 UART: [idev] UDS.KEYID = 0
3,544,560 UART: [idev] Erasing UDS.KEYID = 0
6,026,268 UART: [idev] Sha1 KeyId Algorithm
6,049,958 UART: [idev] --
6,053,389 UART: [ldev] ++
6,053,972 UART: [ldev] CDI.KEYID = 6
6,054,881 UART: [ldev] SUBJECT.KEYID = 5
6,056,051 UART: [ldev] AUTHORITY.KEYID = 7
6,057,312 UART: [ldev] FE.KEYID = 1
6,099,887 UART: [ldev] Erasing FE.KEYID = 1
8,603,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,129 UART: [ldev] --
10,412,506 UART: [fwproc] Wait for Commands...
10,415,686 UART: [fwproc] Recv command 0x46574c44
10,417,786 UART: Invalid Img size: 0 bytes
10,421,792 UART: ROM Fatal Error: 0x01020002
10,424,904 >>> mbox cmd response: failed
10,427,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,570,907 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,612 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,185,207 >>> mbox cmd response: failed
10,187,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,331,205 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,918 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,516 UART:
192,893 UART: Running Caliptra ROM ...
194,064 UART:
603,725 UART: [state] CFI Enabled
619,494 UART: [state] LifecycleState = Unprovisioned
621,380 UART: [state] DebugLocked = No
623,728 UART: [state] WD Timer not started. Device not locked for debugging
628,052 UART: [kat] SHA2-256
807,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,736 UART: [kat] ++
819,182 UART: [kat] sha1
831,513 UART: [kat] SHA2-256
834,518 UART: [kat] SHA2-384
840,029 UART: [kat] SHA2-512-ACC
843,001 UART: [kat] ECC-384
3,283,448 UART: [kat] HMAC-384Kdf
3,297,153 UART: [kat] LMS
3,826,631 UART: [kat] --
3,832,142 UART: [cold-reset] ++
3,834,563 UART: [fht] FHT @ 0x50003400
3,846,351 UART: [idev] ++
3,846,914 UART: [idev] CDI.KEYID = 6
3,847,815 UART: [idev] SUBJECT.KEYID = 7
3,849,028 UART: [idev] UDS.KEYID = 0
3,865,381 UART: [idev] Erasing UDS.KEYID = 0
6,318,141 UART: [idev] Sha1 KeyId Algorithm
6,341,889 UART: [idev] --
6,346,597 UART: [ldev] ++
6,347,170 UART: [ldev] CDI.KEYID = 6
6,348,097 UART: [ldev] SUBJECT.KEYID = 5
6,349,321 UART: [ldev] AUTHORITY.KEYID = 7
6,350,550 UART: [ldev] FE.KEYID = 1
6,361,373 UART: [ldev] Erasing FE.KEYID = 1
8,831,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,986 UART: [ldev] --
10,621,262 UART: [fwproc] Wait for Commands...
10,623,795 UART: [fwproc] Recv command 0x46574c44
10,625,834 UART: Invalid Img size: 0 bytes
10,628,959 UART: ROM Fatal Error: 0x01020002
10,632,049 >>> mbox cmd response: failed
10,634,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,778,135 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,778 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,418,460 >>> mbox cmd response: failed
10,421,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,565,107 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,801 UART: [kat] SHA2-256
901,741 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,308 UART: [kat] LMS
1,169,620 UART: [kat] --
1,170,605 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,693 UART: [idev] ++
1,173,861 UART: [idev] CDI.KEYID = 6
1,174,222 UART: [idev] SUBJECT.KEYID = 7
1,174,647 UART: [idev] UDS.KEYID = 0
1,182,941 UART: [idev] Erasing UDS.KEYID = 0
1,199,779 UART: [idev] Sha1 KeyId Algorithm
1,208,781 UART: [idev] --
1,209,896 UART: [ldev] ++
1,210,064 UART: [ldev] CDI.KEYID = 6
1,210,428 UART: [ldev] SUBJECT.KEYID = 5
1,210,855 UART: [ldev] AUTHORITY.KEYID = 7
1,211,318 UART: [ldev] FE.KEYID = 1
1,216,436 UART: [ldev] Erasing FE.KEYID = 1
1,242,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,502 UART: [ldev] --
1,281,826 UART: [fwproc] Wait for Commands...
1,282,647 UART: [fwproc] Recv command 0x46574c44
1,283,376 UART: Invalid Img size: 0 bytes
1,284,200 UART: ROM Fatal Error: 0x01020002
1,285,359 >>> mbox cmd response: failed
1,285,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,285,365 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,134,953 >>> mbox cmd response: failed
1,134,953 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,134,959 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,748 UART: [kat] SHA2-256
901,688 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
916,097 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,252 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,198,526 UART: [idev] Sha1 KeyId Algorithm
1,207,362 UART: [idev] --
1,208,445 UART: [ldev] ++
1,208,613 UART: [ldev] CDI.KEYID = 6
1,208,977 UART: [ldev] SUBJECT.KEYID = 5
1,209,404 UART: [ldev] AUTHORITY.KEYID = 7
1,209,867 UART: [ldev] FE.KEYID = 1
1,215,041 UART: [ldev] Erasing FE.KEYID = 1
1,241,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,871 UART: [ldev] --
1,281,383 UART: [fwproc] Wait for Commands...
1,282,174 UART: [fwproc] Recv command 0x46574c44
1,282,903 UART: Invalid Img size: 0 bytes
1,284,013 UART: ROM Fatal Error: 0x01020002
1,285,172 >>> mbox cmd response: failed
1,285,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,285,178 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,804 >>> mbox cmd response: failed
1,138,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,138,810 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
891,396 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,505 UART: [cold-reset] ++
1,170,023 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,197,651 UART: [idev] Sha1 KeyId Algorithm
1,206,579 UART: [idev] --
1,207,804 UART: [ldev] ++
1,207,972 UART: [ldev] CDI.KEYID = 6
1,208,336 UART: [ldev] SUBJECT.KEYID = 5
1,208,763 UART: [ldev] AUTHORITY.KEYID = 7
1,209,226 UART: [ldev] FE.KEYID = 1
1,214,152 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,376 UART: [ldev] --
1,279,688 UART: [fwproc] Wait for Commands...
1,280,277 UART: [fwproc] Recv command 0x46574c44
1,281,006 UART: Invalid Img size: 0 bytes
1,281,946 UART: ROM Fatal Error: 0x01020002
1,283,105 >>> mbox cmd response: failed
1,283,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,283,111 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,167 >>> mbox cmd response: failed
1,136,167 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,136,173 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,188 UART: [kat] SHA2-256
902,128 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,840 UART: [idev] ++
1,174,008 UART: [idev] CDI.KEYID = 6
1,174,369 UART: [idev] SUBJECT.KEYID = 7
1,174,794 UART: [idev] UDS.KEYID = 0
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,546 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,595 UART: [ldev] ++
1,209,763 UART: [ldev] CDI.KEYID = 6
1,210,127 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,323 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,813 UART: [ldev] --
1,281,235 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,703 UART: Invalid Img size: 0 bytes
1,283,531 UART: ROM Fatal Error: 0x01020002
1,284,690 >>> mbox cmd response: failed
1,284,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,284,696 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,138,736 >>> mbox cmd response: failed
1,138,736 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,138,742 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,811 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,830 UART: [kat] SHA2-512-ACC
906,731 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
921,270 UART: [kat] LMS
1,169,582 UART: [kat] --
1,170,713 UART: [cold-reset] ++
1,171,157 UART: [fht] FHT @ 0x50003400
1,173,909 UART: [idev] ++
1,174,077 UART: [idev] CDI.KEYID = 6
1,174,438 UART: [idev] SUBJECT.KEYID = 7
1,174,863 UART: [idev] UDS.KEYID = 0
1,182,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,409 UART: [idev] Sha1 KeyId Algorithm
1,208,245 UART: [idev] --
1,209,246 UART: [ldev] ++
1,209,414 UART: [ldev] CDI.KEYID = 6
1,209,778 UART: [ldev] SUBJECT.KEYID = 5
1,210,205 UART: [ldev] AUTHORITY.KEYID = 7
1,210,668 UART: [ldev] FE.KEYID = 1
1,215,664 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,719 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: Invalid Img size: 0 bytes
1,283,354 UART: ROM Fatal Error: 0x01020002
1,284,513 >>> mbox cmd response: failed
1,284,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,284,519 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,136,923 >>> mbox cmd response: failed
1,136,923 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,136,929 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,356 UART: [idev] Erasing UDS.KEYID = 0
1,200,100 UART: [idev] Sha1 KeyId Algorithm
1,209,132 UART: [idev] --
1,210,013 UART: [ldev] ++
1,210,181 UART: [ldev] CDI.KEYID = 6
1,210,545 UART: [ldev] SUBJECT.KEYID = 5
1,210,972 UART: [ldev] AUTHORITY.KEYID = 7
1,211,435 UART: [ldev] FE.KEYID = 1
1,216,553 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,525 UART: [ldev] --
1,281,815 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: Invalid Img size: 0 bytes
1,284,247 UART: ROM Fatal Error: 0x01020002
1,285,406 >>> mbox cmd response: failed
1,285,406 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,285,412 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,137,152 >>> mbox cmd response: failed
1,137,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,137,158 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
4,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,968 UART:
193,349 UART: Running Caliptra ROM ...
194,559 UART:
194,713 UART: [state] CFI Enabled
266,767 UART: [state] LifecycleState = Unprovisioned
269,126 UART: [state] DebugLocked = No
271,367 UART: [state] WD Timer not started. Device not locked for debugging
275,212 UART: [kat] SHA2-256
457,108 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,641 UART: [kat] ++
469,225 UART: [kat] sha1
480,226 UART: [kat] SHA2-256
483,233 UART: [kat] SHA2-384
488,895 UART: [kat] SHA2-512-ACC
491,507 UART: [kat] ECC-384
3,778,283 UART: [kat] HMAC-384Kdf
3,803,332 UART: [kat] LMS
4,876,440 UART: [kat] --
4,882,319 UART: [cold-reset] ++
4,884,068 UART: [fht] FHT @ 0x50003400
4,895,547 UART: [idev] ++
4,896,220 UART: [idev] CDI.KEYID = 6
4,897,450 UART: [idev] SUBJECT.KEYID = 7
4,898,603 UART: [idev] UDS.KEYID = 0
4,922,953 UART: [idev] Erasing UDS.KEYID = 0
8,234,659 UART: [idev] Sha1 KeyId Algorithm
8,256,860 UART: [idev] --
8,261,093 UART: [ldev] ++
8,261,670 UART: [ldev] CDI.KEYID = 6
8,262,912 UART: [ldev] SUBJECT.KEYID = 5
8,264,077 UART: [ldev] AUTHORITY.KEYID = 7
8,265,260 UART: [ldev] FE.KEYID = 1
8,310,872 UART: [ldev] Erasing FE.KEYID = 1
11,642,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,935,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,951,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,967,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,983,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,004,988 UART: [ldev] --
14,010,411 UART: [fwproc] Wait for Commands...
14,012,299 UART: [fwproc] Recv command 0x4d454153
14,018,236 UART: ROM Fatal Error: 0x01020005
14,021,549 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
4,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,811,272 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
4,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,458 UART:
192,839 UART: Running Caliptra ROM ...
194,010 UART:
603,484 UART: [state] CFI Enabled
617,588 UART: [state] LifecycleState = Unprovisioned
619,949 UART: [state] DebugLocked = No
622,559 UART: [state] WD Timer not started. Device not locked for debugging
626,711 UART: [kat] SHA2-256
808,826 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,249 UART: [kat] ++
820,833 UART: [kat] sha1
832,682 UART: [kat] SHA2-256
835,682 UART: [kat] SHA2-384
840,946 UART: [kat] SHA2-512-ACC
843,551 UART: [kat] ECC-384
4,098,920 UART: [kat] HMAC-384Kdf
4,111,502 UART: [kat] LMS
5,184,650 UART: [kat] --
5,189,618 UART: [cold-reset] ++
5,192,309 UART: [fht] FHT @ 0x50003400
5,202,913 UART: [idev] ++
5,203,642 UART: [idev] CDI.KEYID = 6
5,204,813 UART: [idev] SUBJECT.KEYID = 7
5,206,293 UART: [idev] UDS.KEYID = 0
5,223,515 UART: [idev] Erasing UDS.KEYID = 0
8,494,430 UART: [idev] Sha1 KeyId Algorithm
8,515,673 UART: [idev] --
8,520,201 UART: [ldev] ++
8,520,823 UART: [ldev] CDI.KEYID = 6
8,521,996 UART: [ldev] SUBJECT.KEYID = 5
8,523,475 UART: [ldev] AUTHORITY.KEYID = 7
8,525,024 UART: [ldev] FE.KEYID = 1
8,536,210 UART: [ldev] Erasing FE.KEYID = 1
11,831,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,141,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,157,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,173,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,997 UART: [ldev] --
14,199,161 UART: [fwproc] Wait for Commands...
14,201,471 UART: [fwproc] Recv command 0x4d454153
14,208,693 UART: ROM Fatal Error: 0x01020005
14,211,992 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
4,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,020,713 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
4,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,293 UART:
192,673 UART: Running Caliptra ROM ...
193,799 UART:
193,943 UART: [state] CFI Enabled
265,469 UART: [state] LifecycleState = Unprovisioned
267,336 UART: [state] DebugLocked = No
268,584 UART: [state] WD Timer not started. Device not locked for debugging
272,305 UART: [kat] SHA2-256
451,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,003 UART: [kat] ++
463,460 UART: [kat] sha1
474,897 UART: [kat] SHA2-256
477,962 UART: [kat] SHA2-384
485,088 UART: [kat] SHA2-512-ACC
488,021 UART: [kat] ECC-384
2,950,040 UART: [kat] HMAC-384Kdf
2,970,436 UART: [kat] LMS
3,499,863 UART: [kat] --
3,504,339 UART: [cold-reset] ++
3,506,808 UART: [fht] FHT @ 0x50003400
3,518,106 UART: [idev] ++
3,518,667 UART: [idev] CDI.KEYID = 6
3,519,606 UART: [idev] SUBJECT.KEYID = 7
3,520,821 UART: [idev] UDS.KEYID = 0
3,542,553 UART: [idev] Erasing UDS.KEYID = 0
6,024,025 UART: [idev] Sha1 KeyId Algorithm
6,046,076 UART: [idev] --
6,050,959 UART: [ldev] ++
6,051,538 UART: [ldev] CDI.KEYID = 6
6,052,618 UART: [ldev] SUBJECT.KEYID = 5
6,053,731 UART: [ldev] AUTHORITY.KEYID = 7
6,054,911 UART: [ldev] FE.KEYID = 1
6,098,085 UART: [ldev] Erasing FE.KEYID = 1
8,599,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,070 UART: [ldev] --
10,392,291 UART: [fwproc] Wait for Commands...
10,393,746 UART: [fwproc] Recv command 0x4d454153
10,400,180 UART: ROM Fatal Error: 0x01020005
10,403,283 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,558 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,187,003 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
4,053 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,287 UART:
192,673 UART: Running Caliptra ROM ...
193,998 UART:
603,259 UART: [state] CFI Enabled
618,484 UART: [state] LifecycleState = Unprovisioned
620,308 UART: [state] DebugLocked = No
621,682 UART: [state] WD Timer not started. Device not locked for debugging
626,103 UART: [kat] SHA2-256
805,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,798 UART: [kat] ++
817,329 UART: [kat] sha1
829,804 UART: [kat] SHA2-256
832,879 UART: [kat] SHA2-384
838,485 UART: [kat] SHA2-512-ACC
841,440 UART: [kat] ECC-384
3,281,021 UART: [kat] HMAC-384Kdf
3,294,722 UART: [kat] LMS
3,824,223 UART: [kat] --
3,827,242 UART: [cold-reset] ++
3,828,521 UART: [fht] FHT @ 0x50003400
3,839,604 UART: [idev] ++
3,840,165 UART: [idev] CDI.KEYID = 6
3,841,177 UART: [idev] SUBJECT.KEYID = 7
3,842,332 UART: [idev] UDS.KEYID = 0
3,859,978 UART: [idev] Erasing UDS.KEYID = 0
6,319,054 UART: [idev] Sha1 KeyId Algorithm
6,342,422 UART: [idev] --
6,346,252 UART: [ldev] ++
6,346,821 UART: [ldev] CDI.KEYID = 6
6,347,728 UART: [ldev] SUBJECT.KEYID = 5
6,349,120 UART: [ldev] AUTHORITY.KEYID = 7
6,350,308 UART: [ldev] FE.KEYID = 1
6,361,542 UART: [ldev] Erasing FE.KEYID = 1
8,839,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,311 UART: [ldev] --
10,631,107 UART: [fwproc] Wait for Commands...
10,634,277 UART: [fwproc] Recv command 0x4d454153
10,642,037 UART: ROM Fatal Error: 0x01020005
10,645,132 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,418,758 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,806 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,141 UART:
192,521 UART: Running Caliptra ROM ...
193,721 UART:
193,875 UART: [state] CFI Enabled
264,483 UART: [state] LifecycleState = Unprovisioned
266,337 UART: [state] DebugLocked = No
267,773 UART: [state] WD Timer not started. Device not locked for debugging
271,325 UART: [kat] SHA2-256
450,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,034 UART: [kat] ++
462,484 UART: [kat] sha1
474,274 UART: [kat] SHA2-256
477,340 UART: [kat] SHA2-384
483,526 UART: [kat] SHA2-512-ACC
486,511 UART: [kat] ECC-384
2,947,006 UART: [kat] HMAC-384Kdf
2,970,648 UART: [kat] LMS
3,500,117 UART: [kat] --
3,501,861 UART: [cold-reset] ++
3,504,122 UART: [fht] FHT @ 0x50003400
3,514,786 UART: [idev] ++
3,515,364 UART: [idev] CDI.KEYID = 6
3,516,328 UART: [idev] SUBJECT.KEYID = 7
3,517,485 UART: [idev] UDS.KEYID = 0
3,543,254 UART: [idev] Erasing UDS.KEYID = 0
6,023,969 UART: [idev] Sha1 KeyId Algorithm
6,046,221 UART: [idev] --
6,049,086 UART: [ldev] ++
6,049,662 UART: [ldev] CDI.KEYID = 6
6,050,573 UART: [ldev] SUBJECT.KEYID = 5
6,051,790 UART: [ldev] AUTHORITY.KEYID = 7
6,053,044 UART: [ldev] FE.KEYID = 1
6,099,280 UART: [ldev] Erasing FE.KEYID = 1
8,598,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,452 UART: [ldev] --
10,390,473 UART: [fwproc] Wait for Commands...
10,392,784 UART: [fwproc] Recv command 0x4d454153
10,400,456 UART: ROM Fatal Error: 0x01020005
10,403,553 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,186,237 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,526 UART:
192,915 UART: Running Caliptra ROM ...
194,128 UART:
603,684 UART: [state] CFI Enabled
617,777 UART: [state] LifecycleState = Unprovisioned
619,597 UART: [state] DebugLocked = No
621,892 UART: [state] WD Timer not started. Device not locked for debugging
624,943 UART: [kat] SHA2-256
804,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,612 UART: [kat] ++
816,059 UART: [kat] sha1
827,480 UART: [kat] SHA2-256
830,483 UART: [kat] SHA2-384
836,457 UART: [kat] SHA2-512-ACC
839,399 UART: [kat] ECC-384
3,280,979 UART: [kat] HMAC-384Kdf
3,293,082 UART: [kat] LMS
3,822,569 UART: [kat] --
3,825,690 UART: [cold-reset] ++
3,827,701 UART: [fht] FHT @ 0x50003400
3,839,385 UART: [idev] ++
3,839,957 UART: [idev] CDI.KEYID = 6
3,840,870 UART: [idev] SUBJECT.KEYID = 7
3,842,025 UART: [idev] UDS.KEYID = 0
3,857,352 UART: [idev] Erasing UDS.KEYID = 0
6,313,502 UART: [idev] Sha1 KeyId Algorithm
6,336,674 UART: [idev] --
6,339,797 UART: [ldev] ++
6,340,362 UART: [ldev] CDI.KEYID = 6
6,341,270 UART: [ldev] SUBJECT.KEYID = 5
6,342,486 UART: [ldev] AUTHORITY.KEYID = 7
6,343,709 UART: [ldev] FE.KEYID = 1
6,351,710 UART: [ldev] Erasing FE.KEYID = 1
8,827,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,569 UART: [ldev] --
10,620,291 UART: [fwproc] Wait for Commands...
10,623,571 UART: [fwproc] Recv command 0x4d454153
10,631,276 UART: ROM Fatal Error: 0x01020005
10,634,391 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,412,714 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
891,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,213 UART: [kat] ++
895,365 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,584 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,427 UART: [cold-reset] ++
1,169,829 UART: [fht] FHT @ 0x50003400
1,172,589 UART: [idev] ++
1,172,757 UART: [idev] CDI.KEYID = 6
1,173,118 UART: [idev] SUBJECT.KEYID = 7
1,173,543 UART: [idev] UDS.KEYID = 0
1,181,769 UART: [idev] Erasing UDS.KEYID = 0
1,199,087 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,400 UART: [ldev] ++
1,209,568 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,215,878 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,042 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x4d454153
1,283,906 UART: ROM Fatal Error: 0x01020005
1,285,065 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,001 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
891,217 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,474 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,440 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,009 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,341 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,381 UART: [ldev] --
1,281,713 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x4d454153
1,284,275 UART: ROM Fatal Error: 0x01020005
1,285,434 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,140,062 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,228 UART: [kat] SHA2-512-ACC
906,129 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,181,847 UART: [idev] Erasing UDS.KEYID = 0
1,198,781 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,688 UART: [ldev] ++
1,208,856 UART: [ldev] CDI.KEYID = 6
1,209,220 UART: [ldev] SUBJECT.KEYID = 5
1,209,647 UART: [ldev] AUTHORITY.KEYID = 7
1,210,110 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,240,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,088 UART: [ldev] --
1,279,540 UART: [fwproc] Wait for Commands...
1,280,145 UART: [fwproc] Recv command 0x4d454153
1,282,186 UART: ROM Fatal Error: 0x01020005
1,283,345 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,297 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,877 UART: [kat] HMAC-384Kdf
920,457 UART: [kat] LMS
1,168,769 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,070 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,181,586 UART: [idev] Erasing UDS.KEYID = 0
1,198,026 UART: [idev] Sha1 KeyId Algorithm
1,207,092 UART: [idev] --
1,208,017 UART: [ldev] ++
1,208,185 UART: [ldev] CDI.KEYID = 6
1,208,549 UART: [ldev] SUBJECT.KEYID = 5
1,208,976 UART: [ldev] AUTHORITY.KEYID = 7
1,209,439 UART: [ldev] FE.KEYID = 1
1,214,883 UART: [ldev] Erasing FE.KEYID = 1
1,240,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,707 UART: [ldev] --
1,280,069 UART: [fwproc] Wait for Commands...
1,280,650 UART: [fwproc] Recv command 0x4d454153
1,282,613 UART: ROM Fatal Error: 0x01020005
1,283,772 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,000 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,527 UART: [kat] SHA2-256
901,467 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,460 UART: [kat] HMAC-384Kdf
920,046 UART: [kat] LMS
1,168,358 UART: [kat] --
1,168,915 UART: [cold-reset] ++
1,169,259 UART: [fht] FHT @ 0x50003400
1,172,075 UART: [idev] ++
1,172,243 UART: [idev] CDI.KEYID = 6
1,172,604 UART: [idev] SUBJECT.KEYID = 7
1,173,029 UART: [idev] UDS.KEYID = 0
1,181,023 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,379 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,523 UART: [fwproc] Recv command 0x4d454153
1,283,508 UART: ROM Fatal Error: 0x01020005
1,284,667 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,355 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,245 UART: [kat] SHA2-512-ACC
906,146 UART: [kat] ECC-384
915,607 UART: [kat] HMAC-384Kdf
920,063 UART: [kat] LMS
1,168,375 UART: [kat] --
1,169,230 UART: [cold-reset] ++
1,169,736 UART: [fht] FHT @ 0x50003400
1,172,290 UART: [idev] ++
1,172,458 UART: [idev] CDI.KEYID = 6
1,172,819 UART: [idev] SUBJECT.KEYID = 7
1,173,244 UART: [idev] UDS.KEYID = 0
1,181,600 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,390 UART: [idev] --
1,208,515 UART: [ldev] ++
1,208,683 UART: [ldev] CDI.KEYID = 6
1,209,047 UART: [ldev] SUBJECT.KEYID = 5
1,209,474 UART: [ldev] AUTHORITY.KEYID = 7
1,209,937 UART: [ldev] FE.KEYID = 1
1,215,223 UART: [ldev] Erasing FE.KEYID = 1
1,241,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,439 UART: [ldev] --
1,280,897 UART: [fwproc] Wait for Commands...
1,281,708 UART: [fwproc] Recv command 0x4d454153
1,283,691 UART: ROM Fatal Error: 0x01020005
1,284,850 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,137,780 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,475 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,102 UART:
192,571 UART: Running Caliptra ROM ...
193,758 UART:
193,904 UART: [state] CFI Enabled
263,871 UART: [state] LifecycleState = Unprovisioned
266,300 UART: [state] DebugLocked = No
268,761 UART: [state] WD Timer not started. Device not locked for debugging
272,665 UART: [kat] SHA2-256
454,595 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,073 UART: [kat] ++
466,660 UART: [kat] sha1
477,340 UART: [kat] SHA2-256
480,343 UART: [kat] SHA2-384
485,947 UART: [kat] SHA2-512-ACC
488,615 UART: [kat] ECC-384
3,774,971 UART: [kat] HMAC-384Kdf
3,800,880 UART: [kat] LMS
4,874,010 UART: [kat] --
4,877,374 UART: [cold-reset] ++
4,878,927 UART: [fht] FHT @ 0x50003400
4,889,266 UART: [idev] ++
4,889,995 UART: [idev] CDI.KEYID = 6
4,891,174 UART: [idev] SUBJECT.KEYID = 7
4,892,326 UART: [idev] UDS.KEYID = 0
4,930,452 UART: [idev] Erasing UDS.KEYID = 0
8,245,521 UART: [idev] Sha1 KeyId Algorithm
8,268,964 UART: [idev] --
8,272,900 UART: [ldev] ++
8,273,463 UART: [ldev] CDI.KEYID = 6
8,274,633 UART: [ldev] SUBJECT.KEYID = 5
8,275,844 UART: [ldev] AUTHORITY.KEYID = 7
8,276,994 UART: [ldev] FE.KEYID = 1
8,318,084 UART: [ldev] Erasing FE.KEYID = 1
11,651,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,197 UART: [ldev] --
14,035,111 UART: [fwproc] Wait for Commands...
14,037,800 UART: [fwproc] Recv command 0x43415053
14,041,953 UART: ROM Fatal Error: 0x01020006
14,045,321 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,446 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
13,854,306 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,713 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,318 UART:
192,716 UART: Running Caliptra ROM ...
193,939 UART:
603,599 UART: [state] CFI Enabled
617,908 UART: [state] LifecycleState = Unprovisioned
620,270 UART: [state] DebugLocked = No
623,100 UART: [state] WD Timer not started. Device not locked for debugging
628,056 UART: [kat] SHA2-256
810,054 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,585 UART: [kat] ++
822,086 UART: [kat] sha1
831,773 UART: [kat] SHA2-256
834,827 UART: [kat] SHA2-384
839,819 UART: [kat] SHA2-512-ACC
842,439 UART: [kat] ECC-384
4,095,672 UART: [kat] HMAC-384Kdf
4,106,540 UART: [kat] LMS
5,179,706 UART: [kat] --
5,184,135 UART: [cold-reset] ++
5,185,695 UART: [fht] FHT @ 0x50003400
5,198,186 UART: [idev] ++
5,198,906 UART: [idev] CDI.KEYID = 6
5,200,138 UART: [idev] SUBJECT.KEYID = 7
5,201,576 UART: [idev] UDS.KEYID = 0
5,219,389 UART: [idev] Erasing UDS.KEYID = 0
8,489,490 UART: [idev] Sha1 KeyId Algorithm
8,510,980 UART: [idev] --
8,514,675 UART: [ldev] ++
8,515,250 UART: [ldev] CDI.KEYID = 6
8,516,430 UART: [ldev] SUBJECT.KEYID = 5
8,517,932 UART: [ldev] AUTHORITY.KEYID = 7
8,519,487 UART: [ldev] FE.KEYID = 1
8,531,697 UART: [ldev] Erasing FE.KEYID = 1
11,821,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,113,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,068 UART: [ldev] --
14,187,405 UART: [fwproc] Wait for Commands...
14,190,258 UART: [fwproc] Recv command 0x43415053
14,195,265 UART: ROM Fatal Error: 0x01020006
14,198,620 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,643 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
14,010,890 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,435 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,086 UART:
192,472 UART: Running Caliptra ROM ...
193,699 UART:
193,856 UART: [state] CFI Enabled
265,419 UART: [state] LifecycleState = Unprovisioned
267,329 UART: [state] DebugLocked = No
269,250 UART: [state] WD Timer not started. Device not locked for debugging
273,721 UART: [kat] SHA2-256
452,859 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,411 UART: [kat] ++
465,019 UART: [kat] sha1
476,126 UART: [kat] SHA2-256
479,146 UART: [kat] SHA2-384
484,696 UART: [kat] SHA2-512-ACC
487,629 UART: [kat] ECC-384
2,949,144 UART: [kat] HMAC-384Kdf
2,974,120 UART: [kat] LMS
3,503,562 UART: [kat] --
3,506,782 UART: [cold-reset] ++
3,509,151 UART: [fht] FHT @ 0x50003400
3,519,698 UART: [idev] ++
3,520,267 UART: [idev] CDI.KEYID = 6
3,521,195 UART: [idev] SUBJECT.KEYID = 7
3,522,412 UART: [idev] UDS.KEYID = 0
3,545,156 UART: [idev] Erasing UDS.KEYID = 0
6,029,021 UART: [idev] Sha1 KeyId Algorithm
6,051,143 UART: [idev] --
6,056,168 UART: [ldev] ++
6,056,771 UART: [ldev] CDI.KEYID = 6
6,057,664 UART: [ldev] SUBJECT.KEYID = 5
6,058,827 UART: [ldev] AUTHORITY.KEYID = 7
6,060,061 UART: [ldev] FE.KEYID = 1
6,102,363 UART: [ldev] Erasing FE.KEYID = 1
8,605,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,509 UART: [ldev] --
10,414,678 UART: [fwproc] Wait for Commands...
10,417,170 UART: [fwproc] Recv command 0x43415053
10,422,406 UART: ROM Fatal Error: 0x01020006
10,425,526 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,411 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,203,686 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,814 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,406 UART:
192,793 UART: Running Caliptra ROM ...
193,942 UART:
603,664 UART: [state] CFI Enabled
616,731 UART: [state] LifecycleState = Unprovisioned
618,603 UART: [state] DebugLocked = No
621,109 UART: [state] WD Timer not started. Device not locked for debugging
625,322 UART: [kat] SHA2-256
804,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,029 UART: [kat] ++
816,477 UART: [kat] sha1
826,650 UART: [kat] SHA2-256
829,695 UART: [kat] SHA2-384
837,024 UART: [kat] SHA2-512-ACC
840,012 UART: [kat] ECC-384
3,285,690 UART: [kat] HMAC-384Kdf
3,299,808 UART: [kat] LMS
3,829,309 UART: [kat] --
3,834,448 UART: [cold-reset] ++
3,835,536 UART: [fht] FHT @ 0x50003400
3,847,048 UART: [idev] ++
3,847,610 UART: [idev] CDI.KEYID = 6
3,848,617 UART: [idev] SUBJECT.KEYID = 7
3,849,764 UART: [idev] UDS.KEYID = 0
3,866,249 UART: [idev] Erasing UDS.KEYID = 0
6,321,451 UART: [idev] Sha1 KeyId Algorithm
6,344,876 UART: [idev] --
6,348,671 UART: [ldev] ++
6,349,240 UART: [ldev] CDI.KEYID = 6
6,350,147 UART: [ldev] SUBJECT.KEYID = 5
6,351,303 UART: [ldev] AUTHORITY.KEYID = 7
6,352,584 UART: [ldev] FE.KEYID = 1
6,364,467 UART: [ldev] Erasing FE.KEYID = 1
8,840,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,919 UART: [ldev] --
10,630,753 UART: [fwproc] Wait for Commands...
10,633,494 UART: [fwproc] Recv command 0x43415053
10,637,257 UART: ROM Fatal Error: 0x01020006
10,640,348 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,472 writing to cptra_bootfsm_go
3,984 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,411,003 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,538 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,155 UART:
192,547 UART: Running Caliptra ROM ...
193,752 UART:
193,908 UART: [state] CFI Enabled
263,098 UART: [state] LifecycleState = Unprovisioned
264,979 UART: [state] DebugLocked = No
267,281 UART: [state] WD Timer not started. Device not locked for debugging
270,564 UART: [kat] SHA2-256
449,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,299 UART: [kat] ++
461,835 UART: [kat] sha1
472,934 UART: [kat] SHA2-256
475,989 UART: [kat] SHA2-384
483,095 UART: [kat] SHA2-512-ACC
486,037 UART: [kat] ECC-384
2,945,613 UART: [kat] HMAC-384Kdf
2,971,001 UART: [kat] LMS
3,500,481 UART: [kat] --
3,504,638 UART: [cold-reset] ++
3,506,409 UART: [fht] FHT @ 0x50003400
3,518,415 UART: [idev] ++
3,518,976 UART: [idev] CDI.KEYID = 6
3,519,857 UART: [idev] SUBJECT.KEYID = 7
3,521,076 UART: [idev] UDS.KEYID = 0
3,542,358 UART: [idev] Erasing UDS.KEYID = 0
6,024,496 UART: [idev] Sha1 KeyId Algorithm
6,046,607 UART: [idev] --
6,050,711 UART: [ldev] ++
6,051,286 UART: [ldev] CDI.KEYID = 6
6,052,169 UART: [ldev] SUBJECT.KEYID = 5
6,053,386 UART: [ldev] AUTHORITY.KEYID = 7
6,054,621 UART: [ldev] FE.KEYID = 1
6,099,161 UART: [ldev] Erasing FE.KEYID = 1
8,603,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,395 UART: [ldev] --
10,412,472 UART: [fwproc] Wait for Commands...
10,415,486 UART: [fwproc] Recv command 0x43415053
10,420,004 UART: ROM Fatal Error: 0x01020006
10,423,122 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,929 writing to cptra_bootfsm_go
4,603 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,164,028 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,992 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,572 UART:
192,954 UART: Running Caliptra ROM ...
194,165 UART:
603,862 UART: [state] CFI Enabled
615,494 UART: [state] LifecycleState = Unprovisioned
617,382 UART: [state] DebugLocked = No
619,406 UART: [state] WD Timer not started. Device not locked for debugging
623,235 UART: [kat] SHA2-256
802,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,928 UART: [kat] ++
814,512 UART: [kat] sha1
825,771 UART: [kat] SHA2-256
828,779 UART: [kat] SHA2-384
834,915 UART: [kat] SHA2-512-ACC
837,904 UART: [kat] ECC-384
3,276,673 UART: [kat] HMAC-384Kdf
3,289,193 UART: [kat] LMS
3,818,675 UART: [kat] --
3,823,365 UART: [cold-reset] ++
3,825,187 UART: [fht] FHT @ 0x50003400
3,837,098 UART: [idev] ++
3,837,704 UART: [idev] CDI.KEYID = 6
3,838,621 UART: [idev] SUBJECT.KEYID = 7
3,839,784 UART: [idev] UDS.KEYID = 0
3,858,675 UART: [idev] Erasing UDS.KEYID = 0
6,314,899 UART: [idev] Sha1 KeyId Algorithm
6,338,996 UART: [idev] --
6,342,991 UART: [ldev] ++
6,343,558 UART: [ldev] CDI.KEYID = 6
6,344,464 UART: [ldev] SUBJECT.KEYID = 5
6,345,679 UART: [ldev] AUTHORITY.KEYID = 7
6,346,908 UART: [ldev] FE.KEYID = 1
6,357,546 UART: [ldev] Erasing FE.KEYID = 1
8,830,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,258 UART: [ldev] --
10,622,441 UART: [fwproc] Wait for Commands...
10,624,855 UART: [fwproc] Recv command 0x43415053
10,629,107 UART: ROM Fatal Error: 0x01020006
10,632,252 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,957 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,415,739 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,459 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,603 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,298 UART: [ldev] ++
1,208,466 UART: [ldev] CDI.KEYID = 6
1,208,830 UART: [ldev] SUBJECT.KEYID = 5
1,209,257 UART: [ldev] AUTHORITY.KEYID = 7
1,209,720 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,304 UART: [ldev] --
1,280,794 UART: [fwproc] Wait for Commands...
1,281,491 UART: [fwproc] Recv command 0x43415053
1,282,438 UART: ROM Fatal Error: 0x01020006
1,283,597 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,379 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,169,992 UART: [cold-reset] ++
1,170,486 UART: [fht] FHT @ 0x50003400
1,173,212 UART: [idev] ++
1,173,380 UART: [idev] CDI.KEYID = 6
1,173,741 UART: [idev] SUBJECT.KEYID = 7
1,174,166 UART: [idev] UDS.KEYID = 0
1,182,124 UART: [idev] Erasing UDS.KEYID = 0
1,199,600 UART: [idev] Sha1 KeyId Algorithm
1,208,502 UART: [idev] --
1,209,619 UART: [ldev] ++
1,209,787 UART: [ldev] CDI.KEYID = 6
1,210,151 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,243,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,507 UART: [ldev] --
1,282,865 UART: [fwproc] Wait for Commands...
1,283,624 UART: [fwproc] Recv command 0x43415053
1,284,679 UART: ROM Fatal Error: 0x01020006
1,285,838 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,706 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,758 UART: [state] LifecycleState = Unprovisioned
85,413 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
890,808 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,937 UART: [kat] ++
895,089 UART: [kat] sha1
899,323 UART: [kat] SHA2-256
901,263 UART: [kat] SHA2-384
904,198 UART: [kat] SHA2-512-ACC
906,099 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
920,814 UART: [kat] LMS
1,169,126 UART: [kat] --
1,169,961 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,836 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,745 UART: [fwproc] Recv command 0x43415053
1,283,860 UART: ROM Fatal Error: 0x01020006
1,285,019 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,655 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,286 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
905,201 UART: [kat] SHA2-512-ACC
907,102 UART: [kat] ECC-384
916,967 UART: [kat] HMAC-384Kdf
921,801 UART: [kat] LMS
1,170,113 UART: [kat] --
1,170,704 UART: [cold-reset] ++
1,171,134 UART: [fht] FHT @ 0x50003400
1,173,972 UART: [idev] ++
1,174,140 UART: [idev] CDI.KEYID = 6
1,174,501 UART: [idev] SUBJECT.KEYID = 7
1,174,926 UART: [idev] UDS.KEYID = 0
1,182,680 UART: [idev] Erasing UDS.KEYID = 0
1,199,616 UART: [idev] Sha1 KeyId Algorithm
1,208,536 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,242,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,161 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,130 UART: [fwproc] Recv command 0x43415053
1,283,121 UART: ROM Fatal Error: 0x01020006
1,284,280 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,137,740 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
915,954 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
1,168,870 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,182,091 UART: [idev] Erasing UDS.KEYID = 0
1,198,615 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,558 UART: [ldev] ++
1,208,726 UART: [ldev] CDI.KEYID = 6
1,209,090 UART: [ldev] SUBJECT.KEYID = 5
1,209,517 UART: [ldev] AUTHORITY.KEYID = 7
1,209,980 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,240,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,698 UART: [ldev] --
1,280,026 UART: [fwproc] Wait for Commands...
1,280,747 UART: [fwproc] Recv command 0x43415053
1,282,006 UART: ROM Fatal Error: 0x01020006
1,283,165 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,136,659 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,924 UART: [kat] SHA2-256
901,864 UART: [kat] SHA2-384
904,463 UART: [kat] SHA2-512-ACC
906,364 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,450 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,182,246 UART: [idev] Erasing UDS.KEYID = 0
1,199,670 UART: [idev] Sha1 KeyId Algorithm
1,208,462 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,959 UART: [fwproc] Wait for Commands...
1,282,720 UART: [fwproc] Recv command 0x43415053
1,284,087 UART: ROM Fatal Error: 0x01020006
1,285,246 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,135,928 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,388 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,030 UART:
192,420 UART: Running Caliptra ROM ...
193,574 UART:
193,728 UART: [state] CFI Enabled
263,273 UART: [state] LifecycleState = Unprovisioned
265,632 UART: [state] DebugLocked = No
266,895 UART: [state] WD Timer not started. Device not locked for debugging
270,834 UART: [kat] SHA2-256
452,776 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,315 UART: [kat] ++
464,815 UART: [kat] sha1
476,019 UART: [kat] SHA2-256
479,038 UART: [kat] SHA2-384
485,502 UART: [kat] SHA2-512-ACC
488,110 UART: [kat] ECC-384
3,778,046 UART: [kat] HMAC-384Kdf
3,801,886 UART: [kat] LMS
4,875,033 UART: [kat] --
4,878,075 UART: [cold-reset] ++
4,879,741 UART: [fht] FHT @ 0x50003400
4,892,402 UART: [idev] ++
4,893,074 UART: [idev] CDI.KEYID = 6
4,894,236 UART: [idev] SUBJECT.KEYID = 7
4,895,441 UART: [idev] UDS.KEYID = 0
4,929,036 UART: [idev] Erasing UDS.KEYID = 0
8,243,524 UART: [idev] Sha1 KeyId Algorithm
8,265,247 UART: [idev] --
8,269,031 UART: [ldev] ++
8,269,640 UART: [ldev] CDI.KEYID = 6
8,270,758 UART: [ldev] SUBJECT.KEYID = 5
8,271,977 UART: [ldev] AUTHORITY.KEYID = 7
8,273,208 UART: [ldev] FE.KEYID = 1
8,316,472 UART: [ldev] Erasing FE.KEYID = 1
11,653,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,961,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,978,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,994,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,010,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,031,347 UART: [ldev] --
14,036,600 UART: [fwproc] Wait for Commands...
14,039,474 UART: [fwproc] Recv command 0x4d454153
14,046,006 UART: ROM Fatal Error: 0x01020006
14,049,327 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,405 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
13,829,305 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,863 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,458 UART:
192,842 UART: Running Caliptra ROM ...
193,962 UART:
603,570 UART: [state] CFI Enabled
616,060 UART: [state] LifecycleState = Unprovisioned
618,434 UART: [state] DebugLocked = No
620,264 UART: [state] WD Timer not started. Device not locked for debugging
624,132 UART: [kat] SHA2-256
806,138 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,633 UART: [kat] ++
818,133 UART: [kat] sha1
828,840 UART: [kat] SHA2-256
831,900 UART: [kat] SHA2-384
838,134 UART: [kat] SHA2-512-ACC
840,740 UART: [kat] ECC-384
4,094,447 UART: [kat] HMAC-384Kdf
4,107,110 UART: [kat] LMS
5,180,260 UART: [kat] --
5,184,829 UART: [cold-reset] ++
5,186,744 UART: [fht] FHT @ 0x50003400
5,197,558 UART: [idev] ++
5,198,225 UART: [idev] CDI.KEYID = 6
5,199,448 UART: [idev] SUBJECT.KEYID = 7
5,200,874 UART: [idev] UDS.KEYID = 0
5,216,413 UART: [idev] Erasing UDS.KEYID = 0
8,491,847 UART: [idev] Sha1 KeyId Algorithm
8,512,797 UART: [idev] --
8,516,831 UART: [ldev] ++
8,517,390 UART: [ldev] CDI.KEYID = 6
8,518,616 UART: [ldev] SUBJECT.KEYID = 5
8,520,038 UART: [ldev] AUTHORITY.KEYID = 7
8,521,648 UART: [ldev] FE.KEYID = 1
8,534,361 UART: [ldev] Erasing FE.KEYID = 1
11,828,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,828 UART: [ldev] --
14,191,743 UART: [fwproc] Wait for Commands...
14,194,268 UART: [fwproc] Recv command 0x4d454153
14,200,569 UART: ROM Fatal Error: 0x01020006
14,203,925 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,724 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
14,006,968 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
3,650 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,246 UART:
192,642 UART: Running Caliptra ROM ...
193,868 UART:
194,036 UART: [state] CFI Enabled
263,617 UART: [state] LifecycleState = Unprovisioned
265,467 UART: [state] DebugLocked = No
267,933 UART: [state] WD Timer not started. Device not locked for debugging
272,305 UART: [kat] SHA2-256
451,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,951 UART: [kat] ++
463,511 UART: [kat] sha1
473,975 UART: [kat] SHA2-256
477,030 UART: [kat] SHA2-384
483,242 UART: [kat] SHA2-512-ACC
486,234 UART: [kat] ECC-384
2,950,113 UART: [kat] HMAC-384Kdf
2,973,168 UART: [kat] LMS
3,502,660 UART: [kat] --
3,505,688 UART: [cold-reset] ++
3,507,138 UART: [fht] FHT @ 0x50003400
3,518,533 UART: [idev] ++
3,519,115 UART: [idev] CDI.KEYID = 6
3,520,026 UART: [idev] SUBJECT.KEYID = 7
3,521,249 UART: [idev] UDS.KEYID = 0
3,544,141 UART: [idev] Erasing UDS.KEYID = 0
6,025,229 UART: [idev] Sha1 KeyId Algorithm
6,048,254 UART: [idev] --
6,052,416 UART: [ldev] ++
6,052,993 UART: [ldev] CDI.KEYID = 6
6,053,905 UART: [ldev] SUBJECT.KEYID = 5
6,055,071 UART: [ldev] AUTHORITY.KEYID = 7
6,056,312 UART: [ldev] FE.KEYID = 1
6,100,293 UART: [ldev] Erasing FE.KEYID = 1
8,605,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,728 UART: [ldev] --
10,413,709 UART: [fwproc] Wait for Commands...
10,415,755 UART: [fwproc] Recv command 0x4d454153
10,420,998 UART: ROM Fatal Error: 0x01020006
10,424,099 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,719 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,229,722 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,730 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,334 UART:
192,714 UART: Running Caliptra ROM ...
193,933 UART:
603,601 UART: [state] CFI Enabled
619,905 UART: [state] LifecycleState = Unprovisioned
621,804 UART: [state] DebugLocked = No
623,501 UART: [state] WD Timer not started. Device not locked for debugging
627,595 UART: [kat] SHA2-256
806,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,284 UART: [kat] ++
818,814 UART: [kat] sha1
830,460 UART: [kat] SHA2-256
833,447 UART: [kat] SHA2-384
839,641 UART: [kat] SHA2-512-ACC
842,635 UART: [kat] ECC-384
3,285,172 UART: [kat] HMAC-384Kdf
3,297,847 UART: [kat] LMS
3,827,322 UART: [kat] --
3,833,062 UART: [cold-reset] ++
3,835,049 UART: [fht] FHT @ 0x50003400
3,845,866 UART: [idev] ++
3,846,442 UART: [idev] CDI.KEYID = 6
3,847,381 UART: [idev] SUBJECT.KEYID = 7
3,848,591 UART: [idev] UDS.KEYID = 0
3,862,760 UART: [idev] Erasing UDS.KEYID = 0
6,321,264 UART: [idev] Sha1 KeyId Algorithm
6,343,087 UART: [idev] --
6,347,895 UART: [ldev] ++
6,348,503 UART: [ldev] CDI.KEYID = 6
6,349,388 UART: [ldev] SUBJECT.KEYID = 5
6,350,493 UART: [ldev] AUTHORITY.KEYID = 7
6,351,780 UART: [ldev] FE.KEYID = 1
6,363,342 UART: [ldev] Erasing FE.KEYID = 1
8,840,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,692 UART: [ldev] --
10,630,492 UART: [fwproc] Wait for Commands...
10,633,341 UART: [fwproc] Recv command 0x4d454153
10,636,948 UART: ROM Fatal Error: 0x01020006
10,640,036 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,333 writing to cptra_bootfsm_go
5,002 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,413,756 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,704 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,318 UART:
192,691 UART: Running Caliptra ROM ...
193,896 UART:
194,054 UART: [state] CFI Enabled
261,992 UART: [state] LifecycleState = Unprovisioned
263,839 UART: [state] DebugLocked = No
265,706 UART: [state] WD Timer not started. Device not locked for debugging
268,611 UART: [kat] SHA2-256
447,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,273 UART: [kat] ++
459,810 UART: [kat] sha1
471,611 UART: [kat] SHA2-256
474,622 UART: [kat] SHA2-384
480,566 UART: [kat] SHA2-512-ACC
483,553 UART: [kat] ECC-384
2,947,335 UART: [kat] HMAC-384Kdf
2,973,187 UART: [kat] LMS
3,502,648 UART: [kat] --
3,507,476 UART: [cold-reset] ++
3,509,039 UART: [fht] FHT @ 0x50003400
3,519,544 UART: [idev] ++
3,520,149 UART: [idev] CDI.KEYID = 6
3,521,070 UART: [idev] SUBJECT.KEYID = 7
3,522,236 UART: [idev] UDS.KEYID = 0
3,545,774 UART: [idev] Erasing UDS.KEYID = 0
6,029,252 UART: [idev] Sha1 KeyId Algorithm
6,052,332 UART: [idev] --
6,056,816 UART: [ldev] ++
6,057,385 UART: [ldev] CDI.KEYID = 6
6,058,323 UART: [ldev] SUBJECT.KEYID = 5
6,059,482 UART: [ldev] AUTHORITY.KEYID = 7
6,060,775 UART: [ldev] FE.KEYID = 1
6,101,593 UART: [ldev] Erasing FE.KEYID = 1
8,605,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,713 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,164 UART: [ldev] --
10,416,389 UART: [fwproc] Wait for Commands...
10,418,972 UART: [fwproc] Recv command 0x4d454153
10,424,384 UART: ROM Fatal Error: 0x01020006
10,427,482 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,973 writing to cptra_bootfsm_go
4,532 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,185,545 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,785 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,381 UART:
192,780 UART: Running Caliptra ROM ...
193,935 UART:
603,460 UART: [state] CFI Enabled
617,669 UART: [state] LifecycleState = Unprovisioned
619,556 UART: [state] DebugLocked = No
621,903 UART: [state] WD Timer not started. Device not locked for debugging
625,130 UART: [kat] SHA2-256
804,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,807 UART: [kat] ++
816,256 UART: [kat] sha1
828,368 UART: [kat] SHA2-256
831,376 UART: [kat] SHA2-384
836,916 UART: [kat] SHA2-512-ACC
839,901 UART: [kat] ECC-384
3,283,469 UART: [kat] HMAC-384Kdf
3,296,770 UART: [kat] LMS
3,826,254 UART: [kat] --
3,830,413 UART: [cold-reset] ++
3,832,897 UART: [fht] FHT @ 0x50003400
3,842,850 UART: [idev] ++
3,843,410 UART: [idev] CDI.KEYID = 6
3,844,344 UART: [idev] SUBJECT.KEYID = 7
3,845,554 UART: [idev] UDS.KEYID = 0
3,857,754 UART: [idev] Erasing UDS.KEYID = 0
6,314,831 UART: [idev] Sha1 KeyId Algorithm
6,336,323 UART: [idev] --
6,341,081 UART: [ldev] ++
6,341,668 UART: [ldev] CDI.KEYID = 6
6,342,560 UART: [ldev] SUBJECT.KEYID = 5
6,343,774 UART: [ldev] AUTHORITY.KEYID = 7
6,344,998 UART: [ldev] FE.KEYID = 1
6,356,355 UART: [ldev] Erasing FE.KEYID = 1
8,824,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,378 UART: [ldev] --
10,615,690 UART: [fwproc] Wait for Commands...
10,618,216 UART: [fwproc] Recv command 0x4d454153
10,622,151 UART: ROM Fatal Error: 0x01020006
10,625,303 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
4,736 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,413,480 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,170,055 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,181,323 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,206,883 UART: [idev] --
1,207,974 UART: [ldev] ++
1,208,142 UART: [ldev] CDI.KEYID = 6
1,208,506 UART: [ldev] SUBJECT.KEYID = 5
1,208,933 UART: [ldev] AUTHORITY.KEYID = 7
1,209,396 UART: [ldev] FE.KEYID = 1
1,214,532 UART: [ldev] Erasing FE.KEYID = 1
1,240,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,240 UART: [ldev] --
1,279,594 UART: [fwproc] Wait for Commands...
1,280,417 UART: [fwproc] Recv command 0x4d454153
1,281,513 UART: ROM Fatal Error: 0x01020006
1,282,672 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,088 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,598 UART: [kat] ++
895,750 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,801 UART: [kat] SHA2-512-ACC
906,702 UART: [kat] ECC-384
916,467 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,684 UART: [idev] ++
1,173,852 UART: [idev] CDI.KEYID = 6
1,174,213 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,183,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,940 UART: [idev] Sha1 KeyId Algorithm
1,208,670 UART: [idev] --
1,209,735 UART: [ldev] ++
1,209,903 UART: [ldev] CDI.KEYID = 6
1,210,267 UART: [ldev] SUBJECT.KEYID = 5
1,210,694 UART: [ldev] AUTHORITY.KEYID = 7
1,211,157 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,241 UART: [ldev] --
1,281,751 UART: [fwproc] Wait for Commands...
1,282,454 UART: [fwproc] Recv command 0x4d454153
1,283,754 UART: ROM Fatal Error: 0x01020006
1,284,913 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,337 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,421 UART: [kat] SHA2-256
901,361 UART: [kat] SHA2-384
904,146 UART: [kat] SHA2-512-ACC
906,047 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,539 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,665 UART: [idev] ++
1,172,833 UART: [idev] CDI.KEYID = 6
1,173,194 UART: [idev] SUBJECT.KEYID = 7
1,173,619 UART: [idev] UDS.KEYID = 0
1,181,407 UART: [idev] Erasing UDS.KEYID = 0
1,199,077 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,208,858 UART: [ldev] ++
1,209,026 UART: [ldev] CDI.KEYID = 6
1,209,390 UART: [ldev] SUBJECT.KEYID = 5
1,209,817 UART: [ldev] AUTHORITY.KEYID = 7
1,210,280 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,242,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,384 UART: [ldev] --
1,281,842 UART: [fwproc] Wait for Commands...
1,282,635 UART: [fwproc] Recv command 0x4d454153
1,283,889 UART: ROM Fatal Error: 0x01020006
1,285,048 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,138,262 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,737 UART: [kat] HMAC-384Kdf
921,353 UART: [kat] LMS
1,169,665 UART: [kat] --
1,170,606 UART: [cold-reset] ++
1,171,020 UART: [fht] FHT @ 0x50003400
1,173,748 UART: [idev] ++
1,173,916 UART: [idev] CDI.KEYID = 6
1,174,277 UART: [idev] SUBJECT.KEYID = 7
1,174,702 UART: [idev] UDS.KEYID = 0
1,182,680 UART: [idev] Erasing UDS.KEYID = 0
1,199,368 UART: [idev] Sha1 KeyId Algorithm
1,208,210 UART: [idev] --
1,209,173 UART: [ldev] ++
1,209,341 UART: [ldev] CDI.KEYID = 6
1,209,705 UART: [ldev] SUBJECT.KEYID = 5
1,210,132 UART: [ldev] AUTHORITY.KEYID = 7
1,210,595 UART: [ldev] FE.KEYID = 1
1,215,925 UART: [ldev] Erasing FE.KEYID = 1
1,241,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,177 UART: [ldev] --
1,280,489 UART: [fwproc] Wait for Commands...
1,281,122 UART: [fwproc] Recv command 0x4d454153
1,282,484 UART: ROM Fatal Error: 0x01020006
1,283,643 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,825 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,061 UART: [kat] ++
895,213 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,118 UART: [kat] LMS
1,168,430 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,181,379 UART: [idev] Erasing UDS.KEYID = 0
1,198,039 UART: [idev] Sha1 KeyId Algorithm
1,206,839 UART: [idev] --
1,207,938 UART: [ldev] ++
1,208,106 UART: [ldev] CDI.KEYID = 6
1,208,470 UART: [ldev] SUBJECT.KEYID = 5
1,208,897 UART: [ldev] AUTHORITY.KEYID = 7
1,209,360 UART: [ldev] FE.KEYID = 1
1,214,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,458 UART: [fwproc] Wait for Commands...
1,281,129 UART: [fwproc] Recv command 0x4d454153
1,282,339 UART: ROM Fatal Error: 0x01020006
1,283,498 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,137,506 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,526 UART: [kat] SHA2-256
902,466 UART: [kat] SHA2-384
905,333 UART: [kat] SHA2-512-ACC
907,234 UART: [kat] ECC-384
917,119 UART: [kat] HMAC-384Kdf
921,679 UART: [kat] LMS
1,169,991 UART: [kat] --
1,171,048 UART: [cold-reset] ++
1,171,586 UART: [fht] FHT @ 0x50003400
1,174,166 UART: [idev] ++
1,174,334 UART: [idev] CDI.KEYID = 6
1,174,695 UART: [idev] SUBJECT.KEYID = 7
1,175,120 UART: [idev] UDS.KEYID = 0
1,183,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,946 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,863 UART: [ldev] ++
1,210,031 UART: [ldev] CDI.KEYID = 6
1,210,395 UART: [ldev] SUBJECT.KEYID = 5
1,210,822 UART: [ldev] AUTHORITY.KEYID = 7
1,211,285 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,197 UART: [ldev] --
1,281,599 UART: [fwproc] Wait for Commands...
1,282,200 UART: [fwproc] Recv command 0x4d454153
1,283,524 UART: ROM Fatal Error: 0x01020006
1,284,683 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,136,363 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,530 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,160 UART:
192,537 UART: Running Caliptra ROM ...
193,738 UART:
193,890 UART: [state] CFI Enabled
262,548 UART: [state] LifecycleState = Unprovisioned
264,937 UART: [state] DebugLocked = No
267,890 UART: [state] WD Timer not started. Device not locked for debugging
272,235 UART: [kat] SHA2-256
454,178 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,702 UART: [kat] ++
466,207 UART: [kat] sha1
477,328 UART: [kat] SHA2-256
480,377 UART: [kat] SHA2-384
486,959 UART: [kat] SHA2-512-ACC
489,581 UART: [kat] ECC-384
3,773,987 UART: [kat] HMAC-384Kdf
3,801,038 UART: [kat] LMS
4,874,197 UART: [kat] --
4,878,405 UART: [cold-reset] ++
4,880,121 UART: [fht] FHT @ 0x50003400
4,892,188 UART: [idev] ++
4,892,889 UART: [idev] CDI.KEYID = 6
4,894,081 UART: [idev] SUBJECT.KEYID = 7
4,895,257 UART: [idev] UDS.KEYID = 0
4,929,060 UART: [idev] Erasing UDS.KEYID = 0
8,241,504 UART: [idev] Sha1 KeyId Algorithm
8,263,081 UART: [idev] --
8,268,266 UART: [ldev] ++
8,268,891 UART: [ldev] CDI.KEYID = 6
8,270,078 UART: [ldev] SUBJECT.KEYID = 5
8,271,165 UART: [ldev] AUTHORITY.KEYID = 7
8,272,449 UART: [ldev] FE.KEYID = 1
8,317,113 UART: [ldev] Erasing FE.KEYID = 1
11,653,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,031 UART: [ldev] --
14,037,921 UART: [fwproc] Wait for Commands...
14,039,909 UART: [fwproc] Recv command 0x43415053
14,044,400 UART: ROM Fatal Error: 0x01020006
14,047,715 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,503 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
13,826,973 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,910 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,499 UART:
192,876 UART: Running Caliptra ROM ...
194,024 UART:
603,819 UART: [state] CFI Enabled
619,531 UART: [state] LifecycleState = Unprovisioned
621,904 UART: [state] DebugLocked = No
623,560 UART: [state] WD Timer not started. Device not locked for debugging
628,354 UART: [kat] SHA2-256
810,327 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,890 UART: [kat] ++
822,477 UART: [kat] sha1
831,790 UART: [kat] SHA2-256
834,805 UART: [kat] SHA2-384
841,264 UART: [kat] SHA2-512-ACC
843,889 UART: [kat] ECC-384
4,098,582 UART: [kat] HMAC-384Kdf
4,109,609 UART: [kat] LMS
5,182,771 UART: [kat] --
5,186,127 UART: [cold-reset] ++
5,188,986 UART: [fht] FHT @ 0x50003400
5,200,507 UART: [idev] ++
5,201,186 UART: [idev] CDI.KEYID = 6
5,202,386 UART: [idev] SUBJECT.KEYID = 7
5,203,823 UART: [idev] UDS.KEYID = 0
5,218,782 UART: [idev] Erasing UDS.KEYID = 0
8,491,593 UART: [idev] Sha1 KeyId Algorithm
8,512,285 UART: [idev] --
8,515,083 UART: [ldev] ++
8,515,653 UART: [ldev] CDI.KEYID = 6
8,516,893 UART: [ldev] SUBJECT.KEYID = 5
8,518,321 UART: [ldev] AUTHORITY.KEYID = 7
8,519,808 UART: [ldev] FE.KEYID = 1
8,531,054 UART: [ldev] Erasing FE.KEYID = 1
11,826,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,133,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,149,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,165,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,186,155 UART: [ldev] --
14,191,270 UART: [fwproc] Wait for Commands...
14,193,855 UART: [fwproc] Recv command 0x43415053
14,198,874 UART: ROM Fatal Error: 0x01020006
14,202,182 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
3,869 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
14,023,553 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,745 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,389 UART:
192,793 UART: Running Caliptra ROM ...
193,989 UART:
194,142 UART: [state] CFI Enabled
266,354 UART: [state] LifecycleState = Unprovisioned
268,278 UART: [state] DebugLocked = No
270,256 UART: [state] WD Timer not started. Device not locked for debugging
273,984 UART: [kat] SHA2-256
453,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,659 UART: [kat] ++
465,194 UART: [kat] sha1
476,785 UART: [kat] SHA2-256
479,798 UART: [kat] SHA2-384
485,721 UART: [kat] SHA2-512-ACC
488,709 UART: [kat] ECC-384
2,950,808 UART: [kat] HMAC-384Kdf
2,973,208 UART: [kat] LMS
3,502,635 UART: [kat] --
3,507,380 UART: [cold-reset] ++
3,508,764 UART: [fht] FHT @ 0x50003400
3,519,799 UART: [idev] ++
3,520,370 UART: [idev] CDI.KEYID = 6
3,521,281 UART: [idev] SUBJECT.KEYID = 7
3,522,491 UART: [idev] UDS.KEYID = 0
3,545,324 UART: [idev] Erasing UDS.KEYID = 0
6,028,323 UART: [idev] Sha1 KeyId Algorithm
6,050,959 UART: [idev] --
6,053,585 UART: [ldev] ++
6,054,162 UART: [ldev] CDI.KEYID = 6
6,055,074 UART: [ldev] SUBJECT.KEYID = 5
6,056,245 UART: [ldev] AUTHORITY.KEYID = 7
6,057,480 UART: [ldev] FE.KEYID = 1
6,101,934 UART: [ldev] Erasing FE.KEYID = 1
8,606,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,973 UART: [ldev] --
10,413,101 UART: [fwproc] Wait for Commands...
10,416,182 UART: [fwproc] Recv command 0x43415053
10,420,280 UART: ROM Fatal Error: 0x01020006
10,423,379 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
4,245 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,201,472 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,815 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,427 UART:
192,800 UART: Running Caliptra ROM ...
194,006 UART:
603,675 UART: [state] CFI Enabled
615,893 UART: [state] LifecycleState = Unprovisioned
617,779 UART: [state] DebugLocked = No
619,639 UART: [state] WD Timer not started. Device not locked for debugging
623,630 UART: [kat] SHA2-256
802,759 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,303 UART: [kat] ++
814,833 UART: [kat] sha1
826,150 UART: [kat] SHA2-256
829,214 UART: [kat] SHA2-384
834,858 UART: [kat] SHA2-512-ACC
837,784 UART: [kat] ECC-384
3,279,017 UART: [kat] HMAC-384Kdf
3,292,286 UART: [kat] LMS
3,821,744 UART: [kat] --
3,825,516 UART: [cold-reset] ++
3,827,392 UART: [fht] FHT @ 0x50003400
3,837,202 UART: [idev] ++
3,837,767 UART: [idev] CDI.KEYID = 6
3,838,732 UART: [idev] SUBJECT.KEYID = 7
3,839,887 UART: [idev] UDS.KEYID = 0
3,855,109 UART: [idev] Erasing UDS.KEYID = 0
6,313,672 UART: [idev] Sha1 KeyId Algorithm
6,336,718 UART: [idev] --
6,340,115 UART: [ldev] ++
6,340,681 UART: [ldev] CDI.KEYID = 6
6,341,646 UART: [ldev] SUBJECT.KEYID = 5
6,342,804 UART: [ldev] AUTHORITY.KEYID = 7
6,344,027 UART: [ldev] FE.KEYID = 1
6,354,790 UART: [ldev] Erasing FE.KEYID = 1
8,825,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,919 UART: [ldev] --
10,614,218 UART: [fwproc] Wait for Commands...
10,617,074 UART: [fwproc] Recv command 0x43415053
10,622,466 UART: ROM Fatal Error: 0x01020006
10,625,560 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,860 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,411,968 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
3,569 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,209 UART:
192,589 UART: Running Caliptra ROM ...
193,708 UART:
193,852 UART: [state] CFI Enabled
263,039 UART: [state] LifecycleState = Unprovisioned
264,921 UART: [state] DebugLocked = No
266,654 UART: [state] WD Timer not started. Device not locked for debugging
269,897 UART: [kat] SHA2-256
449,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,595 UART: [kat] ++
461,046 UART: [kat] sha1
472,033 UART: [kat] SHA2-256
475,067 UART: [kat] SHA2-384
482,407 UART: [kat] SHA2-512-ACC
485,341 UART: [kat] ECC-384
2,950,862 UART: [kat] HMAC-384Kdf
2,972,343 UART: [kat] LMS
3,501,806 UART: [kat] --
3,505,468 UART: [cold-reset] ++
3,507,345 UART: [fht] FHT @ 0x50003400
3,518,437 UART: [idev] ++
3,519,005 UART: [idev] CDI.KEYID = 6
3,519,926 UART: [idev] SUBJECT.KEYID = 7
3,521,088 UART: [idev] UDS.KEYID = 0
3,544,528 UART: [idev] Erasing UDS.KEYID = 0
6,026,414 UART: [idev] Sha1 KeyId Algorithm
6,048,997 UART: [idev] --
6,052,184 UART: [ldev] ++
6,052,774 UART: [ldev] CDI.KEYID = 6
6,053,683 UART: [ldev] SUBJECT.KEYID = 5
6,054,788 UART: [ldev] AUTHORITY.KEYID = 7
6,056,171 UART: [ldev] FE.KEYID = 1
6,100,266 UART: [ldev] Erasing FE.KEYID = 1
8,603,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,895 UART: [ldev] --
10,413,270 UART: [fwproc] Wait for Commands...
10,415,164 UART: [fwproc] Recv command 0x43415053
10,418,347 UART: ROM Fatal Error: 0x01020006
10,421,450 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,559 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,226,528 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,754 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,362 UART:
192,758 UART: Running Caliptra ROM ...
193,965 UART:
603,644 UART: [state] CFI Enabled
615,368 UART: [state] LifecycleState = Unprovisioned
617,254 UART: [state] DebugLocked = No
619,279 UART: [state] WD Timer not started. Device not locked for debugging
622,732 UART: [kat] SHA2-256
801,841 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,407 UART: [kat] ++
813,939 UART: [kat] sha1
823,692 UART: [kat] SHA2-256
826,756 UART: [kat] SHA2-384
832,397 UART: [kat] SHA2-512-ACC
835,326 UART: [kat] ECC-384
3,277,382 UART: [kat] HMAC-384Kdf
3,289,193 UART: [kat] LMS
3,818,653 UART: [kat] --
3,824,265 UART: [cold-reset] ++
3,826,411 UART: [fht] FHT @ 0x50003400
3,838,577 UART: [idev] ++
3,839,137 UART: [idev] CDI.KEYID = 6
3,840,148 UART: [idev] SUBJECT.KEYID = 7
3,841,250 UART: [idev] UDS.KEYID = 0
3,856,636 UART: [idev] Erasing UDS.KEYID = 0
6,309,506 UART: [idev] Sha1 KeyId Algorithm
6,333,427 UART: [idev] --
6,338,694 UART: [ldev] ++
6,339,270 UART: [ldev] CDI.KEYID = 6
6,340,156 UART: [ldev] SUBJECT.KEYID = 5
6,341,267 UART: [ldev] AUTHORITY.KEYID = 7
6,342,625 UART: [ldev] FE.KEYID = 1
6,352,080 UART: [ldev] Erasing FE.KEYID = 1
8,822,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,622 UART: [ldev] --
10,614,963 UART: [fwproc] Wait for Commands...
10,617,335 UART: [fwproc] Recv command 0x43415053
10,621,914 UART: ROM Fatal Error: 0x01020006
10,625,007 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,027 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,400,043 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,662 UART: [kat] SHA2-256
891,212 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,759 UART: [kat] SHA2-256
901,699 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,191 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,182,247 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,208,063 UART: [idev] --
1,209,098 UART: [ldev] ++
1,209,266 UART: [ldev] CDI.KEYID = 6
1,209,630 UART: [ldev] SUBJECT.KEYID = 5
1,210,057 UART: [ldev] AUTHORITY.KEYID = 7
1,210,520 UART: [ldev] FE.KEYID = 1
1,215,724 UART: [ldev] Erasing FE.KEYID = 1
1,242,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,082 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,281,981 UART: [fwproc] Recv command 0x43415053
1,283,210 UART: ROM Fatal Error: 0x01020006
1,284,369 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,879 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
891,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,506 UART: [kat] SHA2-256
901,446 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
915,819 UART: [kat] HMAC-384Kdf
920,375 UART: [kat] LMS
1,168,687 UART: [kat] --
1,169,404 UART: [cold-reset] ++
1,169,752 UART: [fht] FHT @ 0x50003400
1,172,218 UART: [idev] ++
1,172,386 UART: [idev] CDI.KEYID = 6
1,172,747 UART: [idev] SUBJECT.KEYID = 7
1,173,172 UART: [idev] UDS.KEYID = 0
1,180,898 UART: [idev] Erasing UDS.KEYID = 0
1,198,504 UART: [idev] Sha1 KeyId Algorithm
1,207,420 UART: [idev] --
1,208,377 UART: [ldev] ++
1,208,545 UART: [ldev] CDI.KEYID = 6
1,208,909 UART: [ldev] SUBJECT.KEYID = 5
1,209,336 UART: [ldev] AUTHORITY.KEYID = 7
1,209,799 UART: [ldev] FE.KEYID = 1
1,215,035 UART: [ldev] Erasing FE.KEYID = 1
1,241,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,589 UART: [ldev] --
1,280,995 UART: [fwproc] Wait for Commands...
1,281,644 UART: [fwproc] Recv command 0x43415053
1,282,781 UART: ROM Fatal Error: 0x01020006
1,283,940 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,696 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Unprovisioned
85,301 UART: [state] DebugLocked = No
85,845 UART: [state] WD Timer not started. Device not locked for debugging
87,028 UART: [kat] SHA2-256
890,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,707 UART: [kat] ++
894,859 UART: [kat] sha1
899,179 UART: [kat] SHA2-256
901,119 UART: [kat] SHA2-384
903,738 UART: [kat] SHA2-512-ACC
905,639 UART: [kat] ECC-384
915,438 UART: [kat] HMAC-384Kdf
920,052 UART: [kat] LMS
1,168,364 UART: [kat] --
1,169,259 UART: [cold-reset] ++
1,169,797 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,199 UART: [idev] Erasing UDS.KEYID = 0
1,198,335 UART: [idev] Sha1 KeyId Algorithm
1,207,329 UART: [idev] --
1,208,278 UART: [ldev] ++
1,208,446 UART: [ldev] CDI.KEYID = 6
1,208,810 UART: [ldev] SUBJECT.KEYID = 5
1,209,237 UART: [ldev] AUTHORITY.KEYID = 7
1,209,700 UART: [ldev] FE.KEYID = 1
1,215,058 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,940 UART: [ldev] --
1,280,278 UART: [fwproc] Wait for Commands...
1,280,961 UART: [fwproc] Recv command 0x43415053
1,282,166 UART: ROM Fatal Error: 0x01020006
1,283,325 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,136,703 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,469 UART: [kat] SHA2-256
892,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,148 UART: [kat] ++
896,300 UART: [kat] sha1
900,552 UART: [kat] SHA2-256
902,492 UART: [kat] SHA2-384
905,217 UART: [kat] SHA2-512-ACC
907,118 UART: [kat] ECC-384
916,923 UART: [kat] HMAC-384Kdf
921,745 UART: [kat] LMS
1,170,057 UART: [kat] --
1,171,062 UART: [cold-reset] ++
1,171,446 UART: [fht] FHT @ 0x50003400
1,174,282 UART: [idev] ++
1,174,450 UART: [idev] CDI.KEYID = 6
1,174,811 UART: [idev] SUBJECT.KEYID = 7
1,175,236 UART: [idev] UDS.KEYID = 0
1,183,386 UART: [idev] Erasing UDS.KEYID = 0
1,200,998 UART: [idev] Sha1 KeyId Algorithm
1,209,880 UART: [idev] --
1,210,891 UART: [ldev] ++
1,211,059 UART: [ldev] CDI.KEYID = 6
1,211,423 UART: [ldev] SUBJECT.KEYID = 5
1,211,850 UART: [ldev] AUTHORITY.KEYID = 7
1,212,313 UART: [ldev] FE.KEYID = 1
1,217,803 UART: [ldev] Erasing FE.KEYID = 1
1,244,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,359 UART: [ldev] --
1,283,731 UART: [fwproc] Wait for Commands...
1,284,510 UART: [fwproc] Recv command 0x43415053
1,285,579 UART: ROM Fatal Error: 0x01020006
1,286,738 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,138,310 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,089 UART: [kat] ++
895,241 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,170,113 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,375 UART: [idev] ++
1,173,543 UART: [idev] CDI.KEYID = 6
1,173,904 UART: [idev] SUBJECT.KEYID = 7
1,174,329 UART: [idev] UDS.KEYID = 0
1,182,537 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,208,147 UART: [idev] --
1,209,170 UART: [ldev] ++
1,209,338 UART: [ldev] CDI.KEYID = 6
1,209,702 UART: [ldev] SUBJECT.KEYID = 5
1,210,129 UART: [ldev] AUTHORITY.KEYID = 7
1,210,592 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,352 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x43415053
1,283,464 UART: ROM Fatal Error: 0x01020006
1,284,623 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,401 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,931 UART: [state] LifecycleState = Unprovisioned
85,586 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,343 UART: [kat] SHA2-256
890,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,022 UART: [kat] ++
895,174 UART: [kat] sha1
899,388 UART: [kat] SHA2-256
901,328 UART: [kat] SHA2-384
903,915 UART: [kat] SHA2-512-ACC
905,816 UART: [kat] ECC-384
915,567 UART: [kat] HMAC-384Kdf
920,167 UART: [kat] LMS
1,168,479 UART: [kat] --
1,169,322 UART: [cold-reset] ++
1,169,716 UART: [fht] FHT @ 0x50003400
1,172,398 UART: [idev] ++
1,172,566 UART: [idev] CDI.KEYID = 6
1,172,927 UART: [idev] SUBJECT.KEYID = 7
1,173,352 UART: [idev] UDS.KEYID = 0
1,181,200 UART: [idev] Erasing UDS.KEYID = 0
1,198,712 UART: [idev] Sha1 KeyId Algorithm
1,207,582 UART: [idev] --
1,208,671 UART: [ldev] ++
1,208,839 UART: [ldev] CDI.KEYID = 6
1,209,203 UART: [ldev] SUBJECT.KEYID = 5
1,209,630 UART: [ldev] AUTHORITY.KEYID = 7
1,210,093 UART: [ldev] FE.KEYID = 1
1,215,333 UART: [ldev] Erasing FE.KEYID = 1
1,242,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,361 UART: [ldev] --
1,281,793 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x43415053
1,283,323 UART: ROM Fatal Error: 0x01020006
1,284,482 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,137,032 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,362 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,005 UART:
192,575 UART: Running Caliptra ROM ...
193,741 UART:
193,894 UART: [state] CFI Enabled
264,772 UART: [state] LifecycleState = Unprovisioned
267,193 UART: [state] DebugLocked = No
269,827 UART: [state] WD Timer not started. Device not locked for debugging
274,293 UART: [kat] SHA2-256
456,228 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,739 UART: [kat] ++
468,284 UART: [kat] sha1
477,762 UART: [kat] SHA2-256
480,823 UART: [kat] SHA2-384
486,956 UART: [kat] SHA2-512-ACC
489,596 UART: [kat] ECC-384
3,776,421 UART: [kat] HMAC-384Kdf
3,802,509 UART: [kat] LMS
4,875,687 UART: [kat] --
4,879,029 UART: [cold-reset] ++
4,881,725 UART: [fht] FHT @ 0x50003400
4,892,923 UART: [idev] ++
4,893,605 UART: [idev] CDI.KEYID = 6
4,894,840 UART: [idev] SUBJECT.KEYID = 7
4,895,939 UART: [idev] UDS.KEYID = 0
4,930,706 UART: [idev] Erasing UDS.KEYID = 0
8,243,359 UART: [idev] Sha1 KeyId Algorithm
8,265,999 UART: [idev] --
8,270,891 UART: [ldev] ++
8,271,477 UART: [ldev] CDI.KEYID = 6
8,272,721 UART: [ldev] SUBJECT.KEYID = 5
8,273,845 UART: [ldev] AUTHORITY.KEYID = 7
8,275,073 UART: [ldev] FE.KEYID = 1
8,317,692 UART: [ldev] Erasing FE.KEYID = 1
11,653,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,035,084 UART: [ldev] --
14,039,072 UART: [fwproc] Wait for Commands...
14,043,179 UART: ROM Fatal Error: 0x01020009
14,046,499 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,425 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
13,850,423 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
4,034 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,607 UART:
192,987 UART: Running Caliptra ROM ...
194,102 UART:
603,840 UART: [state] CFI Enabled
619,159 UART: [state] LifecycleState = Unprovisioned
621,548 UART: [state] DebugLocked = No
623,044 UART: [state] WD Timer not started. Device not locked for debugging
627,204 UART: [kat] SHA2-256
809,190 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,711 UART: [kat] ++
821,210 UART: [kat] sha1
830,305 UART: [kat] SHA2-256
833,310 UART: [kat] SHA2-384
838,305 UART: [kat] SHA2-512-ACC
840,923 UART: [kat] ECC-384
4,097,489 UART: [kat] HMAC-384Kdf
4,110,004 UART: [kat] LMS
5,183,163 UART: [kat] --
5,187,666 UART: [cold-reset] ++
5,189,446 UART: [fht] FHT @ 0x50003400
5,200,641 UART: [idev] ++
5,201,392 UART: [idev] CDI.KEYID = 6
5,202,573 UART: [idev] SUBJECT.KEYID = 7
5,204,008 UART: [idev] UDS.KEYID = 0
5,221,228 UART: [idev] Erasing UDS.KEYID = 0
8,497,970 UART: [idev] Sha1 KeyId Algorithm
8,519,770 UART: [idev] --
8,524,410 UART: [ldev] ++
8,524,977 UART: [ldev] CDI.KEYID = 6
8,526,214 UART: [ldev] SUBJECT.KEYID = 5
8,527,652 UART: [ldev] AUTHORITY.KEYID = 7
8,529,136 UART: [ldev] FE.KEYID = 1
8,539,630 UART: [ldev] Erasing FE.KEYID = 1
11,833,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,125,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,599 UART: [ldev] --
14,198,725 UART: [fwproc] Wait for Commands...
14,202,010 UART: ROM Fatal Error: 0x01020009
14,205,330 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,724 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
14,022,497 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,408 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,053 UART:
192,448 UART: Running Caliptra ROM ...
193,611 UART:
193,759 UART: [state] CFI Enabled
263,043 UART: [state] LifecycleState = Unprovisioned
264,975 UART: [state] DebugLocked = No
266,145 UART: [state] WD Timer not started. Device not locked for debugging
269,546 UART: [kat] SHA2-256
448,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,256 UART: [kat] ++
460,702 UART: [kat] sha1
471,063 UART: [kat] SHA2-256
474,079 UART: [kat] SHA2-384
478,607 UART: [kat] SHA2-512-ACC
481,543 UART: [kat] ECC-384
2,925,549 UART: [kat] HMAC-384Kdf
2,949,672 UART: [kat] LMS
3,479,135 UART: [kat] --
3,484,315 UART: [cold-reset] ++
3,486,513 UART: [fht] FHT @ 0x50003400
3,498,088 UART: [idev] ++
3,498,662 UART: [idev] CDI.KEYID = 6
3,499,569 UART: [idev] SUBJECT.KEYID = 7
3,500,785 UART: [idev] UDS.KEYID = 0
3,521,302 UART: [idev] Erasing UDS.KEYID = 0
6,001,939 UART: [idev] Sha1 KeyId Algorithm
6,024,635 UART: [idev] --
6,029,578 UART: [ldev] ++
6,030,169 UART: [ldev] CDI.KEYID = 6
6,031,083 UART: [ldev] SUBJECT.KEYID = 5
6,032,192 UART: [ldev] AUTHORITY.KEYID = 7
6,033,488 UART: [ldev] FE.KEYID = 1
6,078,465 UART: [ldev] Erasing FE.KEYID = 1
8,582,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,028 UART: [ldev] --
10,390,919 UART: [fwproc] Wait for Commands...
10,396,422 UART: ROM Fatal Error: 0x01020009
10,399,532 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,381 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,227,979 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
4,004 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,620 UART:
192,984 UART: Running Caliptra ROM ...
194,202 UART:
603,899 UART: [state] CFI Enabled
619,794 UART: [state] LifecycleState = Unprovisioned
621,703 UART: [state] DebugLocked = No
623,970 UART: [state] WD Timer not started. Device not locked for debugging
627,311 UART: [kat] SHA2-256
806,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,007 UART: [kat] ++
818,460 UART: [kat] sha1
828,577 UART: [kat] SHA2-256
831,636 UART: [kat] SHA2-384
837,174 UART: [kat] SHA2-512-ACC
840,155 UART: [kat] ECC-384
3,280,950 UART: [kat] HMAC-384Kdf
3,295,072 UART: [kat] LMS
3,824,602 UART: [kat] --
3,830,088 UART: [cold-reset] ++
3,831,595 UART: [fht] FHT @ 0x50003400
3,842,912 UART: [idev] ++
3,843,487 UART: [idev] CDI.KEYID = 6
3,844,500 UART: [idev] SUBJECT.KEYID = 7
3,845,595 UART: [idev] UDS.KEYID = 0
3,860,591 UART: [idev] Erasing UDS.KEYID = 0
6,314,549 UART: [idev] Sha1 KeyId Algorithm
6,336,380 UART: [idev] --
6,339,124 UART: [ldev] ++
6,339,693 UART: [ldev] CDI.KEYID = 6
6,340,603 UART: [ldev] SUBJECT.KEYID = 5
6,341,760 UART: [ldev] AUTHORITY.KEYID = 7
6,343,040 UART: [ldev] FE.KEYID = 1
6,353,688 UART: [ldev] Erasing FE.KEYID = 1
8,828,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,476 UART: [ldev] --
10,617,720 UART: [fwproc] Wait for Commands...
10,620,680 UART: ROM Fatal Error: 0x01020009
10,623,778 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
3,893 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,415,715 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,404 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,055 UART:
192,454 UART: Running Caliptra ROM ...
193,628 UART:
193,779 UART: [state] CFI Enabled
263,002 UART: [state] LifecycleState = Unprovisioned
264,850 UART: [state] DebugLocked = No
267,698 UART: [state] WD Timer not started. Device not locked for debugging
271,692 UART: [kat] SHA2-256
450,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,392 UART: [kat] ++
462,842 UART: [kat] sha1
474,038 UART: [kat] SHA2-256
477,109 UART: [kat] SHA2-384
482,491 UART: [kat] SHA2-512-ACC
485,486 UART: [kat] ECC-384
2,949,712 UART: [kat] HMAC-384Kdf
2,972,142 UART: [kat] LMS
3,501,552 UART: [kat] --
3,506,045 UART: [cold-reset] ++
3,507,396 UART: [fht] FHT @ 0x50003400
3,519,678 UART: [idev] ++
3,520,262 UART: [idev] CDI.KEYID = 6
3,521,185 UART: [idev] SUBJECT.KEYID = 7
3,522,352 UART: [idev] UDS.KEYID = 0
3,544,495 UART: [idev] Erasing UDS.KEYID = 0
6,025,276 UART: [idev] Sha1 KeyId Algorithm
6,048,402 UART: [idev] --
6,051,792 UART: [ldev] ++
6,052,374 UART: [ldev] CDI.KEYID = 6
6,053,286 UART: [ldev] SUBJECT.KEYID = 5
6,054,450 UART: [ldev] AUTHORITY.KEYID = 7
6,055,683 UART: [ldev] FE.KEYID = 1
6,100,994 UART: [ldev] Erasing FE.KEYID = 1
8,604,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,577 UART: [ldev] --
10,413,438 UART: [fwproc] Wait for Commands...
10,420,244 UART: ROM Fatal Error: 0x01020009
10,423,283 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
3,660 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,229,450 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,483 writing to cptra_bootfsm_go
4,074 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,682 UART:
193,050 UART: Running Caliptra ROM ...
194,207 UART:
603,676 UART: [state] CFI Enabled
619,883 UART: [state] LifecycleState = Unprovisioned
621,767 UART: [state] DebugLocked = No
623,798 UART: [state] WD Timer not started. Device not locked for debugging
626,983 UART: [kat] SHA2-256
806,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,698 UART: [kat] ++
818,167 UART: [kat] sha1
828,182 UART: [kat] SHA2-256
831,195 UART: [kat] SHA2-384
836,634 UART: [kat] SHA2-512-ACC
839,621 UART: [kat] ECC-384
3,281,430 UART: [kat] HMAC-384Kdf
3,295,411 UART: [kat] LMS
3,824,928 UART: [kat] --
3,829,243 UART: [cold-reset] ++
3,830,368 UART: [fht] FHT @ 0x50003400
3,842,313 UART: [idev] ++
3,842,877 UART: [idev] CDI.KEYID = 6
3,843,844 UART: [idev] SUBJECT.KEYID = 7
3,844,998 UART: [idev] UDS.KEYID = 0
3,860,659 UART: [idev] Erasing UDS.KEYID = 0
6,311,680 UART: [idev] Sha1 KeyId Algorithm
6,334,923 UART: [idev] --
6,338,472 UART: [ldev] ++
6,339,051 UART: [ldev] CDI.KEYID = 6
6,339,938 UART: [ldev] SUBJECT.KEYID = 5
6,341,096 UART: [ldev] AUTHORITY.KEYID = 7
6,342,384 UART: [ldev] FE.KEYID = 1
6,353,516 UART: [ldev] Erasing FE.KEYID = 1
8,829,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,531 UART: [ldev] --
10,618,197 UART: [fwproc] Wait for Commands...
10,622,398 UART: ROM Fatal Error: 0x01020009
10,625,495 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,840 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,408,086 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,518 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,137 UART:
192,501 UART: Running Caliptra ROM ...
193,618 UART:
193,759 UART: [state] CFI Enabled
262,084 UART: [state] LifecycleState = Unprovisioned
264,463 UART: [state] DebugLocked = No
266,464 UART: [state] WD Timer not started. Device not locked for debugging
270,816 UART: [kat] SHA2-256
452,711 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,259 UART: [kat] ++
464,793 UART: [kat] sha1
475,457 UART: [kat] SHA2-256
478,472 UART: [kat] SHA2-384
484,492 UART: [kat] SHA2-512-ACC
487,113 UART: [kat] ECC-384
3,777,111 UART: [kat] HMAC-384Kdf
3,801,814 UART: [kat] LMS
4,874,956 UART: [kat] --
4,879,118 UART: [cold-reset] ++
4,881,810 UART: [fht] FHT @ 0x50003400
4,893,439 UART: [idev] ++
4,894,110 UART: [idev] CDI.KEYID = 6
4,895,347 UART: [idev] SUBJECT.KEYID = 7
4,896,450 UART: [idev] UDS.KEYID = 0
4,930,039 UART: [idev] Erasing UDS.KEYID = 0
8,240,335 UART: [idev] Sha1 KeyId Algorithm
8,261,162 UART: [idev] --
8,266,019 UART: [ldev] ++
8,266,586 UART: [ldev] CDI.KEYID = 6
8,267,750 UART: [ldev] SUBJECT.KEYID = 5
8,268,962 UART: [ldev] AUTHORITY.KEYID = 7
8,270,138 UART: [ldev] FE.KEYID = 1
8,318,521 UART: [ldev] Erasing FE.KEYID = 1
11,654,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,982,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,998,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,742 UART: [ldev] --
14,038,984 UART: [fwproc] Wait for Commands...
14,040,591 UART: [fwproc] Recv command 0xabcd1234
14,042,917 UART: [fwproc] Invalid command received
14,046,216 UART: ROM Fatal Error: 0x01020004
14,049,588 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,436 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
13,825,379 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,865 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,470 UART:
193,033 UART: Running Caliptra ROM ...
194,230 UART:
603,542 UART: [state] CFI Enabled
618,747 UART: [state] LifecycleState = Unprovisioned
621,151 UART: [state] DebugLocked = No
622,674 UART: [state] WD Timer not started. Device not locked for debugging
627,629 UART: [kat] SHA2-256
809,604 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,148 UART: [kat] ++
821,646 UART: [kat] sha1
833,008 UART: [kat] SHA2-256
836,028 UART: [kat] SHA2-384
842,110 UART: [kat] SHA2-512-ACC
844,743 UART: [kat] ECC-384
4,101,908 UART: [kat] HMAC-384Kdf
4,113,603 UART: [kat] LMS
5,186,722 UART: [kat] --
5,191,133 UART: [cold-reset] ++
5,192,375 UART: [fht] FHT @ 0x50003400
5,203,391 UART: [idev] ++
5,204,115 UART: [idev] CDI.KEYID = 6
5,205,415 UART: [idev] SUBJECT.KEYID = 7
5,206,764 UART: [idev] UDS.KEYID = 0
5,224,502 UART: [idev] Erasing UDS.KEYID = 0
8,496,305 UART: [idev] Sha1 KeyId Algorithm
8,517,589 UART: [idev] --
8,523,146 UART: [ldev] ++
8,523,712 UART: [ldev] CDI.KEYID = 6
8,524,949 UART: [ldev] SUBJECT.KEYID = 5
8,526,396 UART: [ldev] AUTHORITY.KEYID = 7
8,527,955 UART: [ldev] FE.KEYID = 1
8,540,759 UART: [ldev] Erasing FE.KEYID = 1
11,829,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,193,807 UART: [ldev] --
14,198,579 UART: [fwproc] Wait for Commands...
14,201,153 UART: [fwproc] Recv command 0xabcd1234
14,203,520 UART: [fwproc] Invalid command received
14,208,591 UART: ROM Fatal Error: 0x01020004
14,211,905 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,845 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
14,018,632 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,370 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,006 UART:
192,401 UART: Running Caliptra ROM ...
193,517 UART:
193,662 UART: [state] CFI Enabled
264,348 UART: [state] LifecycleState = Unprovisioned
266,265 UART: [state] DebugLocked = No
268,371 UART: [state] WD Timer not started. Device not locked for debugging
271,927 UART: [kat] SHA2-256
451,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,633 UART: [kat] ++
463,078 UART: [kat] sha1
474,459 UART: [kat] SHA2-256
477,470 UART: [kat] SHA2-384
483,131 UART: [kat] SHA2-512-ACC
486,066 UART: [kat] ECC-384
2,948,378 UART: [kat] HMAC-384Kdf
2,971,266 UART: [kat] LMS
3,500,736 UART: [kat] --
3,505,191 UART: [cold-reset] ++
3,506,158 UART: [fht] FHT @ 0x50003400
3,517,191 UART: [idev] ++
3,517,757 UART: [idev] CDI.KEYID = 6
3,518,685 UART: [idev] SUBJECT.KEYID = 7
3,519,846 UART: [idev] UDS.KEYID = 0
3,543,395 UART: [idev] Erasing UDS.KEYID = 0
6,023,578 UART: [idev] Sha1 KeyId Algorithm
6,045,798 UART: [idev] --
6,050,092 UART: [ldev] ++
6,050,678 UART: [ldev] CDI.KEYID = 6
6,051,592 UART: [ldev] SUBJECT.KEYID = 5
6,052,758 UART: [ldev] AUTHORITY.KEYID = 7
6,053,994 UART: [ldev] FE.KEYID = 1
6,099,442 UART: [ldev] Erasing FE.KEYID = 1
8,599,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,363 UART: [ldev] --
10,391,338 UART: [fwproc] Wait for Commands...
10,394,301 UART: [fwproc] Recv command 0xabcd1234
10,396,401 UART: [fwproc] Invalid command received
10,401,181 UART: ROM Fatal Error: 0x01020004
10,404,298 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,620 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,184,159 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,815 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,423 UART:
192,807 UART: Running Caliptra ROM ...
193,965 UART:
603,578 UART: [state] CFI Enabled
615,996 UART: [state] LifecycleState = Unprovisioned
617,916 UART: [state] DebugLocked = No
620,655 UART: [state] WD Timer not started. Device not locked for debugging
623,696 UART: [kat] SHA2-256
802,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,433 UART: [kat] ++
814,878 UART: [kat] sha1
826,238 UART: [kat] SHA2-256
829,243 UART: [kat] SHA2-384
834,679 UART: [kat] SHA2-512-ACC
837,657 UART: [kat] ECC-384
3,277,072 UART: [kat] HMAC-384Kdf
3,290,065 UART: [kat] LMS
3,819,554 UART: [kat] --
3,824,145 UART: [cold-reset] ++
3,825,808 UART: [fht] FHT @ 0x50003400
3,837,006 UART: [idev] ++
3,837,572 UART: [idev] CDI.KEYID = 6
3,838,586 UART: [idev] SUBJECT.KEYID = 7
3,839,705 UART: [idev] UDS.KEYID = 0
3,853,572 UART: [idev] Erasing UDS.KEYID = 0
6,309,510 UART: [idev] Sha1 KeyId Algorithm
6,332,841 UART: [idev] --
6,337,429 UART: [ldev] ++
6,338,000 UART: [ldev] CDI.KEYID = 6
6,338,911 UART: [ldev] SUBJECT.KEYID = 5
6,340,123 UART: [ldev] AUTHORITY.KEYID = 7
6,341,346 UART: [ldev] FE.KEYID = 1
6,351,662 UART: [ldev] Erasing FE.KEYID = 1
8,827,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,115 UART: [ldev] --
10,619,167 UART: [fwproc] Wait for Commands...
10,621,701 UART: [fwproc] Recv command 0xabcd1234
10,623,797 UART: [fwproc] Invalid command received
10,627,220 UART: ROM Fatal Error: 0x01020004
10,630,312 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,718 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,408,765 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,523 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,157 UART:
192,550 UART: Running Caliptra ROM ...
193,765 UART:
193,920 UART: [state] CFI Enabled
262,091 UART: [state] LifecycleState = Unprovisioned
263,994 UART: [state] DebugLocked = No
266,362 UART: [state] WD Timer not started. Device not locked for debugging
269,976 UART: [kat] SHA2-256
449,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,655 UART: [kat] ++
461,295 UART: [kat] sha1
473,755 UART: [kat] SHA2-256
476,815 UART: [kat] SHA2-384
481,705 UART: [kat] SHA2-512-ACC
484,691 UART: [kat] ECC-384
2,948,590 UART: [kat] HMAC-384Kdf
2,972,006 UART: [kat] LMS
3,501,481 UART: [kat] --
3,507,043 UART: [cold-reset] ++
3,508,166 UART: [fht] FHT @ 0x50003400
3,519,228 UART: [idev] ++
3,519,796 UART: [idev] CDI.KEYID = 6
3,520,738 UART: [idev] SUBJECT.KEYID = 7
3,521,951 UART: [idev] UDS.KEYID = 0
3,544,251 UART: [idev] Erasing UDS.KEYID = 0
6,026,813 UART: [idev] Sha1 KeyId Algorithm
6,049,179 UART: [idev] --
6,053,387 UART: [ldev] ++
6,053,969 UART: [ldev] CDI.KEYID = 6
6,054,857 UART: [ldev] SUBJECT.KEYID = 5
6,056,023 UART: [ldev] AUTHORITY.KEYID = 7
6,057,336 UART: [ldev] FE.KEYID = 1
6,100,260 UART: [ldev] Erasing FE.KEYID = 1
8,599,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,022 UART: [ldev] --
10,394,587 UART: [fwproc] Wait for Commands...
10,397,560 UART: [fwproc] Recv command 0xabcd1234
10,399,656 UART: [fwproc] Invalid command received
10,404,758 UART: ROM Fatal Error: 0x01020004
10,407,921 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,402 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,239,027 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,849 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,443 UART:
192,838 UART: Running Caliptra ROM ...
193,975 UART:
603,716 UART: [state] CFI Enabled
616,788 UART: [state] LifecycleState = Unprovisioned
618,612 UART: [state] DebugLocked = No
621,505 UART: [state] WD Timer not started. Device not locked for debugging
626,146 UART: [kat] SHA2-256
805,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,837 UART: [kat] ++
817,367 UART: [kat] sha1
828,632 UART: [kat] SHA2-256
831,625 UART: [kat] SHA2-384
837,231 UART: [kat] SHA2-512-ACC
840,162 UART: [kat] ECC-384
3,280,673 UART: [kat] HMAC-384Kdf
3,293,662 UART: [kat] LMS
3,823,166 UART: [kat] --
3,828,937 UART: [cold-reset] ++
3,831,077 UART: [fht] FHT @ 0x50003400
3,840,603 UART: [idev] ++
3,841,165 UART: [idev] CDI.KEYID = 6
3,842,175 UART: [idev] SUBJECT.KEYID = 7
3,843,330 UART: [idev] UDS.KEYID = 0
3,857,899 UART: [idev] Erasing UDS.KEYID = 0
6,315,937 UART: [idev] Sha1 KeyId Algorithm
6,338,428 UART: [idev] --
6,342,444 UART: [ldev] ++
6,343,049 UART: [ldev] CDI.KEYID = 6
6,343,968 UART: [ldev] SUBJECT.KEYID = 5
6,345,067 UART: [ldev] AUTHORITY.KEYID = 7
6,346,358 UART: [ldev] FE.KEYID = 1
6,355,603 UART: [ldev] Erasing FE.KEYID = 1
8,831,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,620 UART: [ldev] --
10,623,803 UART: [fwproc] Wait for Commands...
10,626,442 UART: [fwproc] Recv command 0xabcd1234
10,628,610 UART: [fwproc] Invalid command received
10,632,632 UART: ROM Fatal Error: 0x01020004
10,635,734 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,910 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,410,050 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,180 UART: [kat] SHA2-512-ACC
906,081 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,416 UART: [kat] LMS
1,168,728 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,835 UART: [idev] ++
1,173,003 UART: [idev] CDI.KEYID = 6
1,173,364 UART: [idev] SUBJECT.KEYID = 7
1,173,789 UART: [idev] UDS.KEYID = 0
1,181,471 UART: [idev] Erasing UDS.KEYID = 0
1,198,817 UART: [idev] Sha1 KeyId Algorithm
1,207,559 UART: [idev] --
1,208,520 UART: [ldev] ++
1,208,688 UART: [ldev] CDI.KEYID = 6
1,209,052 UART: [ldev] SUBJECT.KEYID = 5
1,209,479 UART: [ldev] AUTHORITY.KEYID = 7
1,209,942 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,241,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,372 UART: [ldev] --
1,281,738 UART: [fwproc] Wait for Commands...
1,282,541 UART: [fwproc] Recv command 0xabcd1234
1,283,286 UART: [fwproc] Invalid command received
1,284,465 UART: ROM Fatal Error: 0x01020004
1,285,624 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,514 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,869 UART: [state] LifecycleState = Unprovisioned
85,524 UART: [state] DebugLocked = No
86,104 UART: [state] WD Timer not started. Device not locked for debugging
87,351 UART: [kat] SHA2-256
890,901 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,030 UART: [kat] ++
895,182 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
916,241 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,466 UART: [idev] ++
1,173,634 UART: [idev] CDI.KEYID = 6
1,173,995 UART: [idev] SUBJECT.KEYID = 7
1,174,420 UART: [idev] UDS.KEYID = 0
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,116 UART: [idev] Sha1 KeyId Algorithm
1,208,022 UART: [idev] --
1,209,105 UART: [ldev] ++
1,209,273 UART: [ldev] CDI.KEYID = 6
1,209,637 UART: [ldev] SUBJECT.KEYID = 5
1,210,064 UART: [ldev] AUTHORITY.KEYID = 7
1,210,527 UART: [ldev] FE.KEYID = 1
1,215,713 UART: [ldev] Erasing FE.KEYID = 1
1,242,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,637 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0xabcd1234
1,283,073 UART: [fwproc] Invalid command received
1,283,940 UART: ROM Fatal Error: 0x01020004
1,285,099 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,595 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,996 UART: [kat] SHA2-256
891,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,384 UART: [kat] HMAC-384Kdf
920,894 UART: [kat] LMS
1,169,206 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,475 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,861 UART: [idev] Sha1 KeyId Algorithm
1,207,917 UART: [idev] --
1,209,128 UART: [ldev] ++
1,209,296 UART: [ldev] CDI.KEYID = 6
1,209,660 UART: [ldev] SUBJECT.KEYID = 5
1,210,087 UART: [ldev] AUTHORITY.KEYID = 7
1,210,550 UART: [ldev] FE.KEYID = 1
1,215,706 UART: [ldev] Erasing FE.KEYID = 1
1,241,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,974 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0xabcd1234
1,282,870 UART: [fwproc] Invalid command received
1,283,817 UART: ROM Fatal Error: 0x01020004
1,284,976 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,136,832 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,569 UART: [kat] SHA2-512-ACC
906,470 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,060 UART: [cold-reset] ++
1,170,518 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,770 UART: [idev] Sha1 KeyId Algorithm
1,208,562 UART: [idev] --
1,209,625 UART: [ldev] ++
1,209,793 UART: [ldev] CDI.KEYID = 6
1,210,157 UART: [ldev] SUBJECT.KEYID = 5
1,210,584 UART: [ldev] AUTHORITY.KEYID = 7
1,211,047 UART: [ldev] FE.KEYID = 1
1,216,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,511 UART: [ldev] --
1,281,991 UART: [fwproc] Wait for Commands...
1,282,728 UART: [fwproc] Recv command 0xabcd1234
1,283,473 UART: [fwproc] Invalid command received
1,284,508 UART: ROM Fatal Error: 0x01020004
1,285,667 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,807 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,199,373 UART: [idev] Sha1 KeyId Algorithm
1,208,253 UART: [idev] --
1,209,400 UART: [ldev] ++
1,209,568 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,216,034 UART: [ldev] Erasing FE.KEYID = 1
1,242,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,890 UART: [ldev] --
1,282,338 UART: [fwproc] Wait for Commands...
1,283,127 UART: [fwproc] Recv command 0xabcd1234
1,283,872 UART: [fwproc] Invalid command received
1,284,969 UART: ROM Fatal Error: 0x01020004
1,286,128 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,610 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
915,605 UART: [kat] HMAC-384Kdf
920,409 UART: [kat] LMS
1,168,721 UART: [kat] --
1,169,362 UART: [cold-reset] ++
1,169,740 UART: [fht] FHT @ 0x50003400
1,172,466 UART: [idev] ++
1,172,634 UART: [idev] CDI.KEYID = 6
1,172,995 UART: [idev] SUBJECT.KEYID = 7
1,173,420 UART: [idev] UDS.KEYID = 0
1,181,478 UART: [idev] Erasing UDS.KEYID = 0
1,198,532 UART: [idev] Sha1 KeyId Algorithm
1,207,272 UART: [idev] --
1,208,191 UART: [ldev] ++
1,208,359 UART: [ldev] CDI.KEYID = 6
1,208,723 UART: [ldev] SUBJECT.KEYID = 5
1,209,150 UART: [ldev] AUTHORITY.KEYID = 7
1,209,613 UART: [ldev] FE.KEYID = 1
1,214,743 UART: [ldev] Erasing FE.KEYID = 1
1,241,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,177 UART: [ldev] --
1,280,535 UART: [fwproc] Wait for Commands...
1,281,164 UART: [fwproc] Recv command 0xabcd1234
1,281,909 UART: [fwproc] Invalid command received
1,282,842 UART: ROM Fatal Error: 0x01020004
1,284,001 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,137,523 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,080 UART:
192,454 UART: Running Caliptra ROM ...
193,637 UART:
193,784 UART: [state] CFI Enabled
264,094 UART: [state] LifecycleState = Unprovisioned
266,458 UART: [state] DebugLocked = No
267,636 UART: [state] WD Timer not started. Device not locked for debugging
271,668 UART: [kat] SHA2-256
453,616 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,145 UART: [kat] ++
465,679 UART: [kat] sha1
476,831 UART: [kat] SHA2-256
479,844 UART: [kat] SHA2-384
486,554 UART: [kat] SHA2-512-ACC
489,136 UART: [kat] ECC-384
3,774,805 UART: [kat] HMAC-384Kdf
3,802,391 UART: [kat] LMS
4,875,537 UART: [kat] --
4,881,114 UART: [cold-reset] ++
4,883,550 UART: [fht] FHT @ 0x50003400
4,895,307 UART: [idev] ++
4,896,030 UART: [idev] CDI.KEYID = 6
4,897,210 UART: [idev] SUBJECT.KEYID = 7
4,898,393 UART: [idev] UDS.KEYID = 0
4,899,288 ready_for_fw is high
4,899,475 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,033,350 UART: [idev] Erasing UDS.KEYID = 0
8,244,565 UART: [idev] Sha1 KeyId Algorithm
8,267,234 UART: [idev] --
8,271,342 UART: [ldev] ++
8,271,963 UART: [ldev] CDI.KEYID = 6
8,273,070 UART: [ldev] SUBJECT.KEYID = 5
8,274,285 UART: [ldev] AUTHORITY.KEYID = 7
8,275,441 UART: [ldev] FE.KEYID = 1
8,318,365 UART: [ldev] Erasing FE.KEYID = 1
11,649,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,959,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,975,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,991,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,012,511 UART: [ldev] --
14,016,917 UART: [fwproc] Wait for Commands...
14,018,687 UART: [fwproc] Recv command 0x46574c44
14,020,994 UART: [fwproc] Recv'd Img size: 106340 bytes
17,996,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,068,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,110,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,427,063 >>> mbox cmd response: success
18,428,036 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,431,829 UART: [afmc] ++
18,432,434 UART: [afmc] CDI.KEYID = 6
18,433,624 UART: [afmc] SUBJECT.KEYID = 7
18,434,737 UART: [afmc] AUTHORITY.KEYID = 5
21,798,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,096,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,098,729 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,114,769 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,130,842 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,147,102 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,168,626 UART: [afmc] --
24,171,677 UART: [cold-reset] --
24,175,004 UART: [state] Locking Datavault
24,179,881 UART: [state] Locking PCR0, PCR1 and PCR31
24,181,523 UART: [state] Locking ICCM
24,183,060 UART: [exit] Launching FMC @ 0x40000000
24,191,675 UART:
24,191,905 UART: Running Caliptra FMC ...
24,192,927 UART:
24,193,072 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,194,690 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
4,807,549 ready_for_fw is high
4,808,214 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,249,607 >>> mbox cmd response: success
18,250,728 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
23,954,047 UART:
23,954,441 UART: Running Caliptra FMC ...
23,955,589 UART:
23,955,746 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
23,957,444 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
192,780 UART:
193,161 UART: Running Caliptra ROM ...
194,388 UART:
604,006 UART: [state] CFI Enabled
618,591 UART: [state] LifecycleState = Unprovisioned
620,967 UART: [state] DebugLocked = No
622,559 UART: [state] WD Timer not started. Device not locked for debugging
626,516 UART: [kat] SHA2-256
808,501 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,019 UART: [kat] ++
820,538 UART: [kat] sha1
831,048 UART: [kat] SHA2-256
834,059 UART: [kat] SHA2-384
840,405 UART: [kat] SHA2-512-ACC
843,050 UART: [kat] ECC-384
4,101,904 UART: [kat] HMAC-384Kdf
4,112,534 UART: [kat] LMS
5,185,645 UART: [kat] --
5,190,460 UART: [cold-reset] ++
5,193,112 UART: [fht] FHT @ 0x50003400
5,204,937 UART: [idev] ++
5,205,639 UART: [idev] CDI.KEYID = 6
5,206,770 UART: [idev] SUBJECT.KEYID = 7
5,208,505 UART: [idev] UDS.KEYID = 0
5,209,409 ready_for_fw is high
5,209,607 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,343,136 UART: [idev] Erasing UDS.KEYID = 0
8,496,751 UART: [idev] Sha1 KeyId Algorithm
8,520,085 UART: [idev] --
8,523,908 UART: [ldev] ++
8,524,474 UART: [ldev] CDI.KEYID = 6
8,525,700 UART: [ldev] SUBJECT.KEYID = 5
8,527,119 UART: [ldev] AUTHORITY.KEYID = 7
8,528,722 UART: [ldev] FE.KEYID = 1
8,539,484 UART: [ldev] Erasing FE.KEYID = 1
11,830,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,176 UART: [ldev] --
14,195,189 UART: [fwproc] Wait for Commands...
14,197,921 UART: [fwproc] Recv command 0x46574c44
14,200,219 UART: [fwproc] Recv'd Img size: 106340 bytes
18,174,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,245,221 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,287,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,603,369 >>> mbox cmd response: success
18,604,293 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,606,889 UART: [afmc] ++
18,607,506 UART: [afmc] CDI.KEYID = 6
18,608,693 UART: [afmc] SUBJECT.KEYID = 7
18,609,791 UART: [afmc] AUTHORITY.KEYID = 5
21,926,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,220,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,222,391 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,238,455 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,254,477 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,270,575 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,292,666 UART: [afmc] --
24,297,011 UART: [cold-reset] --
24,301,420 UART: [state] Locking Datavault
24,305,903 UART: [state] Locking PCR0, PCR1 and PCR31
24,307,594 UART: [state] Locking ICCM
24,310,060 UART: [exit] Launching FMC @ 0x40000000
24,318,671 UART:
24,318,927 UART: Running Caliptra FMC ...
24,320,025 UART:
24,320,181 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,321,824 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,097,447 ready_for_fw is high
5,097,886 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,413,960 >>> mbox cmd response: success
18,414,857 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
24,052,298 UART:
24,052,708 UART: Running Caliptra FMC ...
24,053,941 UART:
24,054,111 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
24,055,794 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,220 UART:
192,581 UART: Running Caliptra ROM ...
193,780 UART:
193,933 UART: [state] CFI Enabled
260,167 UART: [state] LifecycleState = Unprovisioned
262,084 UART: [state] DebugLocked = No
263,934 UART: [state] WD Timer not started. Device not locked for debugging
267,612 UART: [kat] SHA2-256
446,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,305 UART: [kat] ++
458,859 UART: [kat] sha1
471,183 UART: [kat] SHA2-256
474,245 UART: [kat] SHA2-384
480,107 UART: [kat] SHA2-512-ACC
483,052 UART: [kat] ECC-384
2,948,092 UART: [kat] HMAC-384Kdf
2,969,918 UART: [kat] LMS
3,499,429 UART: [kat] --
3,505,425 UART: [cold-reset] ++
3,506,617 UART: [fht] FHT @ 0x50003400
3,518,957 UART: [idev] ++
3,519,525 UART: [idev] CDI.KEYID = 6
3,520,434 UART: [idev] SUBJECT.KEYID = 7
3,521,682 UART: [idev] UDS.KEYID = 0
3,522,611 ready_for_fw is high
3,522,793 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,656,875 UART: [idev] Erasing UDS.KEYID = 0
6,024,067 UART: [idev] Sha1 KeyId Algorithm
6,046,987 UART: [idev] --
6,050,609 UART: [ldev] ++
6,051,183 UART: [ldev] CDI.KEYID = 6
6,052,098 UART: [ldev] SUBJECT.KEYID = 5
6,053,264 UART: [ldev] AUTHORITY.KEYID = 7
6,054,501 UART: [ldev] FE.KEYID = 1
6,099,293 UART: [ldev] Erasing FE.KEYID = 1
8,599,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,742 UART: [ldev] --
10,409,994 UART: [fwproc] Wait for Commands...
10,412,756 UART: [fwproc] Recv command 0x46574c44
10,414,797 UART: [fwproc] Recv'd Img size: 106684 bytes
13,732,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,806,937 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,849,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,167,692 >>> mbox cmd response: success
14,168,523 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,171,893 UART: [afmc] ++
14,172,500 UART: [afmc] CDI.KEYID = 6
14,173,413 UART: [afmc] SUBJECT.KEYID = 7
14,174,577 UART: [afmc] AUTHORITY.KEYID = 5
16,699,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,423,500 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,425,360 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,441,360 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,457,278 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,473,278 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,497,098 UART: [afmc] --
18,501,188 UART: [cold-reset] --
18,506,029 UART: [state] Locking Datavault
18,511,339 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,983 UART: [state] Locking ICCM
18,514,590 UART: [exit] Launching FMC @ 0x40000000
18,522,935 UART:
18,523,183 UART: Running Caliptra FMC ...
18,524,288 UART:
18,524,445 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,526,092 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,380,241 ready_for_fw is high
3,380,661 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,967,112 >>> mbox cmd response: success
13,968,434 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,259,685 UART:
18,260,224 UART: Running Caliptra FMC ...
18,261,396 UART:
18,261,555 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,263,269 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,366 UART:
192,737 UART: Running Caliptra ROM ...
193,868 UART:
603,564 UART: [state] CFI Enabled
617,854 UART: [state] LifecycleState = Unprovisioned
619,658 UART: [state] DebugLocked = No
621,315 UART: [state] WD Timer not started. Device not locked for debugging
624,631 UART: [kat] SHA2-256
803,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,375 UART: [kat] ++
815,821 UART: [kat] sha1
825,839 UART: [kat] SHA2-256
828,864 UART: [kat] SHA2-384
834,997 UART: [kat] SHA2-512-ACC
837,997 UART: [kat] ECC-384
3,280,039 UART: [kat] HMAC-384Kdf
3,292,637 UART: [kat] LMS
3,822,069 UART: [kat] --
3,826,162 UART: [cold-reset] ++
3,828,523 UART: [fht] FHT @ 0x50003400
3,839,782 UART: [idev] ++
3,840,342 UART: [idev] CDI.KEYID = 6
3,841,250 UART: [idev] SUBJECT.KEYID = 7
3,842,488 UART: [idev] UDS.KEYID = 0
3,843,410 ready_for_fw is high
3,843,593 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,977,616 UART: [idev] Erasing UDS.KEYID = 0
6,317,878 UART: [idev] Sha1 KeyId Algorithm
6,340,957 UART: [idev] --
6,345,062 UART: [ldev] ++
6,345,629 UART: [ldev] CDI.KEYID = 6
6,346,512 UART: [ldev] SUBJECT.KEYID = 5
6,347,720 UART: [ldev] AUTHORITY.KEYID = 7
6,348,953 UART: [ldev] FE.KEYID = 1
6,359,081 UART: [ldev] Erasing FE.KEYID = 1
8,834,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,800 UART: [ldev] --
10,622,997 UART: [fwproc] Wait for Commands...
10,625,951 UART: [fwproc] Recv command 0x46574c44
10,628,037 UART: [fwproc] Recv'd Img size: 106684 bytes
13,934,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,621 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,046,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,364,228 >>> mbox cmd response: success
14,365,201 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,368,475 UART: [afmc] ++
14,369,077 UART: [afmc] CDI.KEYID = 6
14,369,962 UART: [afmc] SUBJECT.KEYID = 7
14,371,123 UART: [afmc] AUTHORITY.KEYID = 5
16,871,388 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,590,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,592,434 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,608,462 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,624,351 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,640,290 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,663,563 UART: [afmc] --
18,667,445 UART: [cold-reset] --
18,672,872 UART: [state] Locking Datavault
18,677,904 UART: [state] Locking PCR0, PCR1 and PCR31
18,679,544 UART: [state] Locking ICCM
18,681,476 UART: [exit] Launching FMC @ 0x40000000
18,689,895 UART:
18,690,140 UART: Running Caliptra FMC ...
18,691,241 UART:
18,691,395 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,692,967 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,693,479 ready_for_fw is high
3,693,875 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,130,277 >>> mbox cmd response: success
14,131,590 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,379,196 UART:
18,379,613 UART: Running Caliptra FMC ...
18,380,868 UART:
18,381,045 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,382,741 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,111 UART:
192,480 UART: Running Caliptra ROM ...
193,661 UART:
193,833 UART: [state] CFI Enabled
264,350 UART: [state] LifecycleState = Unprovisioned
266,266 UART: [state] DebugLocked = No
267,376 UART: [state] WD Timer not started. Device not locked for debugging
271,825 UART: [kat] SHA2-256
450,944 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,555 UART: [kat] ++
463,086 UART: [kat] sha1
473,548 UART: [kat] SHA2-256
476,548 UART: [kat] SHA2-384
482,897 UART: [kat] SHA2-512-ACC
485,900 UART: [kat] ECC-384
2,949,571 UART: [kat] HMAC-384Kdf
2,972,040 UART: [kat] LMS
3,501,439 UART: [kat] --
3,506,994 UART: [cold-reset] ++
3,508,868 UART: [fht] FHT @ 0x50003400
3,521,052 UART: [idev] ++
3,521,626 UART: [idev] CDI.KEYID = 6
3,522,544 UART: [idev] SUBJECT.KEYID = 7
3,523,715 UART: [idev] UDS.KEYID = 0
3,524,763 ready_for_fw is high
3,524,956 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,659,180 UART: [idev] Erasing UDS.KEYID = 0
6,026,157 UART: [idev] Sha1 KeyId Algorithm
6,049,440 UART: [idev] --
6,053,544 UART: [ldev] ++
6,054,156 UART: [ldev] CDI.KEYID = 6
6,055,239 UART: [ldev] SUBJECT.KEYID = 5
6,056,351 UART: [ldev] AUTHORITY.KEYID = 7
6,057,532 UART: [ldev] FE.KEYID = 1
6,103,116 UART: [ldev] Erasing FE.KEYID = 1
8,606,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,898 UART: [ldev] --
10,413,467 UART: [fwproc] Wait for Commands...
10,414,915 UART: [fwproc] Recv command 0x46574c44
10,417,010 UART: [fwproc] Recv'd Img size: 106684 bytes
13,720,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,792,937 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,835,494 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,152,993 >>> mbox cmd response: success
14,153,974 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,157,827 UART: [afmc] ++
14,158,433 UART: [afmc] CDI.KEYID = 6
14,159,338 UART: [afmc] SUBJECT.KEYID = 7
14,160,502 UART: [afmc] AUTHORITY.KEYID = 5
16,682,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,408,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,410,826 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,426,803 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,442,721 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,458,679 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,481,742 UART: [afmc] --
18,484,740 UART: [cold-reset] --
18,487,465 UART: [state] Locking Datavault
18,490,069 UART: [state] Locking PCR0, PCR1 and PCR31
18,491,718 UART: [state] Locking ICCM
18,493,542 UART: [exit] Launching FMC @ 0x40000000
18,501,947 UART:
18,502,184 UART: Running Caliptra FMC ...
18,503,307 UART:
18,503,473 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,505,122 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,983 writing to cptra_bootfsm_go
3,358,952 ready_for_fw is high
3,359,328 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,921,440 >>> mbox cmd response: success
13,922,623 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,219,107 UART:
18,219,509 UART: Running Caliptra FMC ...
18,220,756 UART:
18,220,953 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,222,667 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,402 UART:
192,801 UART: Running Caliptra ROM ...
193,937 UART:
603,392 UART: [state] CFI Enabled
617,264 UART: [state] LifecycleState = Unprovisioned
619,147 UART: [state] DebugLocked = No
621,388 UART: [state] WD Timer not started. Device not locked for debugging
624,847 UART: [kat] SHA2-256
804,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,539 UART: [kat] ++
816,076 UART: [kat] sha1
825,891 UART: [kat] SHA2-256
828,899 UART: [kat] SHA2-384
836,092 UART: [kat] SHA2-512-ACC
839,098 UART: [kat] ECC-384
3,280,248 UART: [kat] HMAC-384Kdf
3,292,718 UART: [kat] LMS
3,822,230 UART: [kat] --
3,827,925 UART: [cold-reset] ++
3,830,351 UART: [fht] FHT @ 0x50003400
3,842,320 UART: [idev] ++
3,842,883 UART: [idev] CDI.KEYID = 6
3,843,913 UART: [idev] SUBJECT.KEYID = 7
3,845,011 UART: [idev] UDS.KEYID = 0
3,846,061 ready_for_fw is high
3,846,282 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,980,388 UART: [idev] Erasing UDS.KEYID = 0
6,318,078 UART: [idev] Sha1 KeyId Algorithm
6,340,283 UART: [idev] --
6,345,492 UART: [ldev] ++
6,346,067 UART: [ldev] CDI.KEYID = 6
6,346,982 UART: [ldev] SUBJECT.KEYID = 5
6,348,213 UART: [ldev] AUTHORITY.KEYID = 7
6,349,445 UART: [ldev] FE.KEYID = 1
6,360,899 UART: [ldev] Erasing FE.KEYID = 1
8,833,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,187 UART: [ldev] --
10,623,588 UART: [fwproc] Wait for Commands...
10,625,950 UART: [fwproc] Recv command 0x46574c44
10,628,042 UART: [fwproc] Recv'd Img size: 106684 bytes
13,936,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,358 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,050,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,368,195 >>> mbox cmd response: success
14,369,198 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,371,718 UART: [afmc] ++
14,372,316 UART: [afmc] CDI.KEYID = 6
14,373,226 UART: [afmc] SUBJECT.KEYID = 7
14,374,381 UART: [afmc] AUTHORITY.KEYID = 5
16,871,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,308 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,611,269 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,627,208 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,643,142 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,665,698 UART: [afmc] --
18,670,002 UART: [cold-reset] --
18,673,708 UART: [state] Locking Datavault
18,679,491 UART: [state] Locking PCR0, PCR1 and PCR31
18,681,186 UART: [state] Locking ICCM
18,682,758 UART: [exit] Launching FMC @ 0x40000000
18,691,094 UART:
18,691,345 UART: Running Caliptra FMC ...
18,692,447 UART:
18,692,601 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,694,301 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,695,115 ready_for_fw is high
3,695,707 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,134,363 >>> mbox cmd response: success
14,135,315 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,386,993 UART:
18,387,391 UART: Running Caliptra FMC ...
18,388,531 UART:
18,388,684 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,390,381 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
920,958 UART: [kat] LMS
1,169,270 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 ready_for_fw is high
1,174,327 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,883 UART: [idev] Sha1 KeyId Algorithm
1,208,945 UART: [idev] --
1,210,000 UART: [ldev] ++
1,210,168 UART: [ldev] CDI.KEYID = 6
1,210,532 UART: [ldev] SUBJECT.KEYID = 5
1,210,959 UART: [ldev] AUTHORITY.KEYID = 7
1,211,422 UART: [ldev] FE.KEYID = 1
1,216,344 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,160 UART: [ldev] --
1,281,620 UART: [fwproc] Wait for Commands...
1,282,429 UART: [fwproc] Recv command 0x46574c44
1,283,162 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,349 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,674,006 >>> mbox cmd response: success
2,674,006 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,675,239 UART: [afmc] ++
2,675,407 UART: [afmc] CDI.KEYID = 6
2,675,770 UART: [afmc] SUBJECT.KEYID = 7
2,676,196 UART: [afmc] AUTHORITY.KEYID = 5
2,711,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,072 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,823 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,543 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,436 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,129 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,002 UART: [afmc] --
2,754,934 UART: [cold-reset] --
2,755,746 UART: [state] Locking Datavault
2,757,159 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,763 UART: [state] Locking ICCM
2,758,249 UART: [exit] Launching FMC @ 0x40000000
2,763,546 UART:
2,763,562 UART: Running Caliptra FMC ...
2,763,970 UART:
2,764,108 UART: [fmc] Received command: 0x10000008
2,765,140 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,250 ready_for_fw is high
1,056,250 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,702 >>> mbox cmd response: success
2,523,702 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,585,817 UART:
2,585,833 UART: Running Caliptra FMC ...
2,586,241 UART:
2,586,379 UART: [fmc] Received command: 0x10000008
2,587,411 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,395 UART: [kat] SHA2-512-ACC
906,296 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,650 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 ready_for_fw is high
1,174,606 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,386 UART: [idev] Sha1 KeyId Algorithm
1,208,302 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,469 UART: [ldev] --
1,281,759 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,257 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,432 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,515 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,161 >>> mbox cmd response: success
2,673,161 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,274 UART: [afmc] ++
2,674,442 UART: [afmc] CDI.KEYID = 6
2,674,805 UART: [afmc] SUBJECT.KEYID = 7
2,675,231 UART: [afmc] AUTHORITY.KEYID = 5
2,710,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,214 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,934 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,827 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,520 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,415 UART: [afmc] --
2,754,313 UART: [cold-reset] --
2,755,079 UART: [state] Locking Datavault
2,756,346 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,950 UART: [state] Locking ICCM
2,757,516 UART: [exit] Launching FMC @ 0x40000000
2,762,813 UART:
2,762,829 UART: Running Caliptra FMC ...
2,763,237 UART:
2,763,375 UART: [fmc] Received command: 0x10000008
2,764,407 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,749 ready_for_fw is high
1,056,749 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,139 >>> mbox cmd response: success
2,523,139 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,584,956 UART:
2,584,972 UART: Running Caliptra FMC ...
2,585,380 UART:
2,585,518 UART: [fmc] Received command: 0x10000008
2,586,550 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,025 UART: [kat] SHA2-256
901,965 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,225 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,174,179 ready_for_fw is high
1,174,179 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,335 UART: [idev] Erasing UDS.KEYID = 0
1,198,775 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,764 UART: [ldev] ++
1,208,932 UART: [ldev] CDI.KEYID = 6
1,209,296 UART: [ldev] SUBJECT.KEYID = 5
1,209,723 UART: [ldev] AUTHORITY.KEYID = 7
1,210,186 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,684 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,003 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,086 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,554 >>> mbox cmd response: success
2,672,554 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,673,747 UART: [afmc] ++
2,673,915 UART: [afmc] CDI.KEYID = 6
2,674,278 UART: [afmc] SUBJECT.KEYID = 7
2,674,704 UART: [afmc] AUTHORITY.KEYID = 5
2,709,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,569 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,289 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,182 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,875 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,634 UART: [afmc] --
2,752,622 UART: [cold-reset] --
2,753,584 UART: [state] Locking Datavault
2,754,899 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,503 UART: [state] Locking ICCM
2,756,153 UART: [exit] Launching FMC @ 0x40000000
2,761,450 UART:
2,761,466 UART: Running Caliptra FMC ...
2,761,874 UART:
2,762,012 UART: [fmc] Received command: 0x10000008
2,763,044 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,122 ready_for_fw is high
1,056,122 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,260 >>> mbox cmd response: success
2,522,260 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,583,851 UART:
2,583,867 UART: Running Caliptra FMC ...
2,584,275 UART:
2,584,413 UART: [fmc] Received command: 0x10000008
2,585,445 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
915,521 UART: [kat] HMAC-384Kdf
920,121 UART: [kat] LMS
1,168,433 UART: [kat] --
1,169,148 UART: [cold-reset] ++
1,169,490 UART: [fht] FHT @ 0x50003400
1,172,216 UART: [idev] ++
1,172,384 UART: [idev] CDI.KEYID = 6
1,172,745 UART: [idev] SUBJECT.KEYID = 7
1,173,170 UART: [idev] UDS.KEYID = 0
1,173,516 ready_for_fw is high
1,173,516 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,122 UART: [idev] Erasing UDS.KEYID = 0
1,198,442 UART: [idev] Sha1 KeyId Algorithm
1,207,194 UART: [idev] --
1,208,221 UART: [ldev] ++
1,208,389 UART: [ldev] CDI.KEYID = 6
1,208,753 UART: [ldev] SUBJECT.KEYID = 5
1,209,180 UART: [ldev] AUTHORITY.KEYID = 7
1,209,643 UART: [ldev] FE.KEYID = 1
1,215,209 UART: [ldev] Erasing FE.KEYID = 1
1,240,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,027 UART: [ldev] --
1,280,539 UART: [fwproc] Wait for Commands...
1,281,126 UART: [fwproc] Recv command 0x46574c44
1,281,859 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,666 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,339 >>> mbox cmd response: success
2,673,339 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,440 UART: [afmc] ++
2,674,608 UART: [afmc] CDI.KEYID = 6
2,674,971 UART: [afmc] SUBJECT.KEYID = 7
2,675,397 UART: [afmc] AUTHORITY.KEYID = 5
2,710,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,810 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,530 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,423 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,116 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,151 UART: [afmc] --
2,754,245 UART: [cold-reset] --
2,754,995 UART: [state] Locking Datavault
2,756,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,710 UART: [state] Locking ICCM
2,757,150 UART: [exit] Launching FMC @ 0x40000000
2,762,447 UART:
2,762,463 UART: Running Caliptra FMC ...
2,762,871 UART:
2,763,009 UART: [fmc] Received command: 0x10000008
2,764,041 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,627 ready_for_fw is high
1,056,627 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,315 >>> mbox cmd response: success
2,522,315 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,584,012 UART:
2,584,028 UART: Running Caliptra FMC ...
2,584,436 UART:
2,584,574 UART: [fmc] Received command: 0x10000008
2,585,606 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,647 UART: [kat] SHA2-256
901,587 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,957 UART: [cold-reset] ++
1,170,415 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 ready_for_fw is high
1,174,279 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,199,777 UART: [idev] Sha1 KeyId Algorithm
1,208,819 UART: [idev] --
1,209,974 UART: [ldev] ++
1,210,142 UART: [ldev] CDI.KEYID = 6
1,210,506 UART: [ldev] SUBJECT.KEYID = 5
1,210,933 UART: [ldev] AUTHORITY.KEYID = 7
1,211,396 UART: [ldev] FE.KEYID = 1
1,216,622 UART: [ldev] Erasing FE.KEYID = 1
1,243,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,182 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,319 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,779 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,536 >>> mbox cmd response: success
2,675,536 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,676,729 UART: [afmc] ++
2,676,897 UART: [afmc] CDI.KEYID = 6
2,677,260 UART: [afmc] SUBJECT.KEYID = 7
2,677,686 UART: [afmc] AUTHORITY.KEYID = 5
2,712,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,937 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,657 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,550 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,243 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,276 UART: [afmc] --
2,756,270 UART: [cold-reset] --
2,757,130 UART: [state] Locking Datavault
2,758,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,745 UART: [state] Locking ICCM
2,759,409 UART: [exit] Launching FMC @ 0x40000000
2,764,706 UART:
2,764,722 UART: Running Caliptra FMC ...
2,765,130 UART:
2,765,268 UART: [fmc] Received command: 0x10000008
2,766,300 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,838 ready_for_fw is high
1,055,838 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,262 >>> mbox cmd response: success
2,523,262 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,585,721 UART:
2,585,737 UART: Running Caliptra FMC ...
2,586,145 UART:
2,586,283 UART: [fmc] Received command: 0x10000008
2,587,315 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Unprovisioned
85,710 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,309 UART: [kat] HMAC-384Kdf
920,893 UART: [kat] LMS
1,169,205 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,512 UART: [idev] ++
1,173,680 UART: [idev] CDI.KEYID = 6
1,174,041 UART: [idev] SUBJECT.KEYID = 7
1,174,466 UART: [idev] UDS.KEYID = 0
1,174,812 ready_for_fw is high
1,174,812 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,400 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,841 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,216,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,831 UART: [ldev] --
1,282,187 UART: [fwproc] Wait for Commands...
1,282,848 UART: [fwproc] Recv command 0x46574c44
1,283,581 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,740 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,317 >>> mbox cmd response: success
2,673,317 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,674,524 UART: [afmc] ++
2,674,692 UART: [afmc] CDI.KEYID = 6
2,675,055 UART: [afmc] SUBJECT.KEYID = 7
2,675,481 UART: [afmc] AUTHORITY.KEYID = 5
2,710,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,532 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,252 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,145 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,838 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,699 UART: [afmc] --
2,753,805 UART: [cold-reset] --
2,754,603 UART: [state] Locking Datavault
2,755,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,398 UART: [state] Locking ICCM
2,757,004 UART: [exit] Launching FMC @ 0x40000000
2,762,301 UART:
2,762,317 UART: Running Caliptra FMC ...
2,762,725 UART:
2,762,863 UART: [fmc] Received command: 0x10000008
2,763,895 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,675 ready_for_fw is high
1,056,675 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,359 >>> mbox cmd response: success
2,523,359 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,585,712 UART:
2,585,728 UART: Running Caliptra FMC ...
2,586,136 UART:
2,586,274 UART: [fmc] Received command: 0x10000008
2,587,306 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.74s
running 1 test
rom_info_offset is 48448
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,838 writing to cptra_bootfsm_go
191,953 UART:
192,346 UART: Running Caliptra ROM ...
193,453 UART:
193,600 UART: [state] CFI Enabled
265,647 UART: [state] LifecycleState = Unprovisioned
268,036 UART: [state] DebugLocked = No
270,072 UART: [state] WD Timer not started. Device not locked for debugging
274,597 UART: [kat] SHA2-256
456,499 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,677 UART: ROM integrity test failed
468,964 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 41856
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48448
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,501 UART:
192,860 UART: Running Caliptra ROM ...
194,041 UART:
603,830 UART: [state] CFI Enabled
617,202 UART: [state] LifecycleState = Unprovisioned
619,588 UART: [state] DebugLocked = No
621,541 UART: [state] WD Timer not started. Device not locked for debugging
626,626 UART: [kat] SHA2-256
808,613 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,794 UART: ROM integrity test failed
821,078 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 41856
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e070b7f3fca5f7014a2c0130e1e1334ad3581d250636d110c7047305636ec67d59d2ec6adc653f43c8522a9f94ec817f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,225 UART:
192,587 UART: Running Caliptra ROM ...
193,776 UART:
193,927 UART: [state] CFI Enabled
261,564 UART: [state] LifecycleState = Unprovisioned
263,451 UART: [state] DebugLocked = No
265,057 UART: [state] WD Timer not started. Device not locked for debugging
268,366 UART: [kat] SHA2-256
447,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,545 UART: ROM integrity test failed
459,760 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,366 UART:
192,732 UART: Running Caliptra ROM ...
193,870 UART:
603,408 UART: [state] CFI Enabled
616,431 UART: [state] LifecycleState = Unprovisioned
618,319 UART: [state] DebugLocked = No
619,920 UART: [state] WD Timer not started. Device not locked for debugging
623,786 UART: [kat] SHA2-256
802,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,902 UART: ROM integrity test failed
815,114 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,256 UART:
192,607 UART: Running Caliptra ROM ...
193,729 UART:
193,873 UART: [state] CFI Enabled
263,261 UART: [state] LifecycleState = Unprovisioned
265,140 UART: [state] DebugLocked = No
267,665 UART: [state] WD Timer not started. Device not locked for debugging
271,545 UART: [kat] SHA2-256
450,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,702 UART: ROM integrity test failed
462,921 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,443 UART:
192,858 UART: Running Caliptra ROM ...
193,983 UART:
603,583 UART: [state] CFI Enabled
615,761 UART: [state] LifecycleState = Unprovisioned
617,677 UART: [state] DebugLocked = No
620,130 UART: [state] WD Timer not started. Device not locked for debugging
624,211 UART: [kat] SHA2-256
803,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,355 UART: ROM integrity test failed
815,566 UART: ROM Fatal Error: 0x90080001test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42240
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c4b4f17d5c23f940c94c9a6123b5d99982e1fd3b4795cec630e383a5d624e5b9a1e80ee2dff4e4a1acb8407395c2ff27",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: ROM integrity test failed
895,830 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d1e73bcead10d256fb11ee1b9cbde6b44d28e01dc1ee3848f3d1a44fc4ce2e5989944c9d19fbb8ef1e243602bdace47",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.20s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,006 UART: ROM integrity test failed
895,453 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d1e73bcead10d256fb11ee1b9cbde6b44d28e01dc1ee3848f3d1a44fc4ce2e5989944c9d19fbb8ef1e243602bdace47",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.21s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,201 UART: ROM integrity test failed
895,648 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d1e73bcead10d256fb11ee1b9cbde6b44d28e01dc1ee3848f3d1a44fc4ce2e5989944c9d19fbb8ef1e243602bdace47",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,740 UART: ROM integrity test failed
896,187 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d1e73bcead10d256fb11ee1b9cbde6b44d28e01dc1ee3848f3d1a44fc4ce2e5989944c9d19fbb8ef1e243602bdace47",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,846 UART: [state] LifecycleState = Unprovisioned
85,501 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,244 UART: [kat] SHA2-256
890,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,765 UART: ROM integrity test failed
895,212 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d1e73bcead10d256fb11ee1b9cbde6b44d28e01dc1ee3848f3d1a44fc4ce2e5989944c9d19fbb8ef1e243602bdace47",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,654 UART: ROM integrity test failed
896,101 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.22s
running 1 test
rom_info_offset is 42240
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d1e73bcead10d256fb11ee1b9cbde6b44d28e01dc1ee3848f3d1a44fc4ce2e5989944c9d19fbb8ef1e243602bdace47",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.19s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,035 UART:
192,397 UART: Running Caliptra ROM ...
193,482 UART:
193,620 UART: [state] CFI Enabled
266,213 UART: [state] LifecycleState = Unprovisioned
268,615 UART: [state] DebugLocked = No
271,197 UART: [state] WD Timer not started. Device not locked for debugging
275,077 UART: [kat] SHA2-256
456,951 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,531 UART: [kat] ++
468,983 UART: [kat] sha1
479,567 UART: [kat] SHA2-256
482,566 UART: [kat] SHA2-384
488,482 UART: [kat] SHA2-512-ACC
491,088 UART: [kat] ECC-384
3,776,674 UART: [kat] HMAC-384Kdf
3,800,980 UART: [kat] LMS
4,874,127 UART: [kat] --
4,877,477 UART: [cold-reset] ++
4,878,904 UART: [fht] FHT @ 0x50003400
4,891,518 UART: [idev] ++
4,892,227 UART: [idev] CDI.KEYID = 6
4,893,397 UART: [idev] SUBJECT.KEYID = 7
4,894,571 UART: [idev] UDS.KEYID = 0
4,895,497 ready_for_fw is high
4,895,682 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,035,809 UART: [idev] Erasing UDS.KEYID = 0
8,245,587 UART: [idev] Sha1 KeyId Algorithm
8,267,628 UART: [idev] --
8,272,920 UART: [ldev] ++
8,273,507 UART: [ldev] CDI.KEYID = 6
8,274,687 UART: [ldev] SUBJECT.KEYID = 5
8,275,841 UART: [ldev] AUTHORITY.KEYID = 7
8,277,065 UART: [ldev] FE.KEYID = 1
8,316,826 UART: [ldev] Erasing FE.KEYID = 1
11,667,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,977,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,993,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,009,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,025,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,047,170 UART: [ldev] --
14,052,110 UART: [fwproc] Wait for Commands...
14,054,522 UART: [fwproc] Recv command 0x46574c44
14,056,835 UART: [fwproc] Recv'd Img size: 111408 bytes
18,104,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,182,717 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,242,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,559,954 >>> mbox cmd response: success
18,563,703 UART: [afmc] ++
18,564,309 UART: [afmc] CDI.KEYID = 6
18,565,574 UART: [afmc] SUBJECT.KEYID = 7
18,566,607 UART: [afmc] AUTHORITY.KEYID = 5
21,940,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,257,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,259,336 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,275,476 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,291,601 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,307,482 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,330,456 UART: [afmc] --
24,335,537 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,476,318 UART: [cold-reset] --
24,477,195 UART: [state] Locking Datavault
24,478,374 UART: [state] Locking PCR0, PCR1 and PCR31
24,479,911 UART: [state] Locking ICCM
24,480,820 UART: [exit] Launching FMC @ 0x40000000
24,482,237 UART:
24,482,397 UART: Running Caliptra FMC ...
24,483,491 UART:
24,483,644 UART: [fmc] Received command: 0x46574C44
24,485,098 UART:
24,485,255 UART: Running Caliptra ROM ...
24,486,346 UART:
24,486,499 UART: [state] CFI Enabled
24,549,603 UART: [state] LifecycleState = Unprovisioned
24,551,477 UART: [state] DebugLocked = No
24,553,994 UART: [state] WD Timer not started. Device not locked for debugging
24,557,965 UART: [kat] SHA2-256
24,739,912 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,751,422 UART: [kat] ++
24,751,962 UART: [kat] sha1
24,763,023 UART: [kat] SHA2-256
24,766,040 UART: [kat] SHA2-384
24,772,347 UART: [kat] SHA2-512-ACC
24,774,974 UART: [kat] ECC-384
28,062,486 UART: [kat] HMAC-384Kdf
28,089,132 UART: [kat] LMS
29,162,261 UART: [kat] --
29,167,308 UART: [update-reset] ++
33,228,365 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,231,032 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,603,694 >>> mbox cmd response: success
33,605,665 UART: [update-reset] Copying MAN_2 To MAN_1
33,628,544 UART: [update-reset Success] --
33,630,195 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,632,766 UART: [state] Locking Datavault
33,636,301 UART: [state] Locking PCR0, PCR1 and PCR31
33,637,998 UART: [state] Locking ICCM
33,639,824 UART: [exit] Launching FMC @ 0x40000000
33,648,445 UART:
33,648,677 UART: Running Caliptra FMC ...
33,649,704 UART:
33,649,850 UART: [fmc] Received command: 0x1000000D
33,651,412 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
4,803,903 ready_for_fw is high
4,804,603 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,305,535 >>> mbox cmd response: success
23,983,939 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,124,440 UART:
24,124,823 UART: Running Caliptra FMC ...
24,126,039 UART:
24,126,218 UART: [fmc] Received command: 0x46574C44
33,132,653 >>> mbox cmd response: success
33,154,429 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,167,098 UART:
33,167,369 UART: Running Caliptra FMC ...
33,168,539 UART:
33,168,703 UART: [fmc] Received command: 0x1000000D
33,170,225 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,061 writing to cptra_bootfsm_go
193,134 UART:
193,499 UART: Running Caliptra ROM ...
194,585 UART:
604,127 UART: [state] CFI Enabled
619,833 UART: [state] LifecycleState = Unprovisioned
622,199 UART: [state] DebugLocked = No
623,663 UART: [state] WD Timer not started. Device not locked for debugging
627,966 UART: [kat] SHA2-256
809,938 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,481 UART: [kat] ++
821,923 UART: [kat] sha1
832,362 UART: [kat] SHA2-256
835,369 UART: [kat] SHA2-384
841,708 UART: [kat] SHA2-512-ACC
844,280 UART: [kat] ECC-384
4,101,160 UART: [kat] HMAC-384Kdf
4,112,967 UART: [kat] LMS
5,186,119 UART: [kat] --
5,192,410 UART: [cold-reset] ++
5,193,843 UART: [fht] FHT @ 0x50003400
5,204,277 UART: [idev] ++
5,205,020 UART: [idev] CDI.KEYID = 6
5,206,139 UART: [idev] SUBJECT.KEYID = 7
5,207,587 UART: [idev] UDS.KEYID = 0
5,208,760 ready_for_fw is high
5,208,965 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,348,811 UART: [idev] Erasing UDS.KEYID = 0
8,496,671 UART: [idev] Sha1 KeyId Algorithm
8,518,443 UART: [idev] --
8,521,623 UART: [ldev] ++
8,522,183 UART: [ldev] CDI.KEYID = 6
8,523,409 UART: [ldev] SUBJECT.KEYID = 5
8,524,892 UART: [ldev] AUTHORITY.KEYID = 7
8,526,443 UART: [ldev] FE.KEYID = 1
8,538,319 UART: [ldev] Erasing FE.KEYID = 1
11,833,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,127,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,143,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,159,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,175,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,195,659 UART: [ldev] --
14,199,620 UART: [fwproc] Wait for Commands...
14,201,493 UART: [fwproc] Recv command 0x46574c44
14,203,738 UART: [fwproc] Recv'd Img size: 111408 bytes
18,239,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,319,103 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,379,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,695,984 >>> mbox cmd response: success
18,700,581 UART: [afmc] ++
18,701,195 UART: [afmc] CDI.KEYID = 6
18,702,378 UART: [afmc] SUBJECT.KEYID = 7
18,703,522 UART: [afmc] AUTHORITY.KEYID = 5
22,018,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,314,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,316,775 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,332,963 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,349,070 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,364,841 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,386,606 UART: [afmc] --
24,391,665 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,532,085 UART: [cold-reset] --
24,532,952 UART: [state] Locking Datavault
24,534,021 UART: [state] Locking PCR0, PCR1 and PCR31
24,535,552 UART: [state] Locking ICCM
24,536,455 UART: [exit] Launching FMC @ 0x40000000
24,537,870 UART:
24,538,016 UART: Running Caliptra FMC ...
24,539,109 UART:
24,539,261 UART: [fmc] Received command: 0x46574C44
24,540,713 UART:
24,540,881 UART: Running Caliptra ROM ...
24,541,977 UART:
24,542,124 UART: [state] CFI Enabled
24,550,488 UART: [state] LifecycleState = Unprovisioned
24,552,366 UART: [state] DebugLocked = No
24,553,604 UART: [state] WD Timer not started. Device not locked for debugging
24,557,871 UART: [kat] SHA2-256
24,739,774 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,751,349 UART: [kat] ++
24,751,797 UART: [kat] sha1
24,761,543 UART: [kat] SHA2-256
24,764,558 UART: [kat] SHA2-384
24,769,611 UART: [kat] SHA2-512-ACC
24,772,220 UART: [kat] ECC-384
28,028,652 UART: [kat] HMAC-384Kdf
28,041,485 UART: [kat] LMS
29,114,622 UART: [kat] --
29,120,771 UART: [update-reset] ++
33,182,740 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,186,655 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,559,294 >>> mbox cmd response: success
33,560,591 UART: [update-reset] Copying MAN_2 To MAN_1
33,583,466 UART: [update-reset Success] --
33,585,105 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,589,323 UART: [state] Locking Datavault
33,594,194 UART: [state] Locking PCR0, PCR1 and PCR31
33,595,885 UART: [state] Locking ICCM
33,598,514 UART: [exit] Launching FMC @ 0x40000000
33,607,124 UART:
33,607,405 UART: Running Caliptra FMC ...
33,608,512 UART:
33,608,670 UART: [fmc] Received command: 0x1000000D
33,610,196 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
5,099,602 ready_for_fw is high
5,100,149 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,484,301 >>> mbox cmd response: success
24,107,688 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,248,149 UART:
24,248,560 UART: Running Caliptra FMC ...
24,249,774 UART:
24,249,936 UART: [fmc] Received command: 0x46574C44
33,159,451 >>> mbox cmd response: success
33,181,902 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
33,196,420 UART:
33,196,719 UART: Running Caliptra FMC ...
33,197,806 UART:
33,197,948 UART: [fmc] Received command: 0x1000000D
33,199,472 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,157 UART:
192,534 UART: Running Caliptra ROM ...
193,666 UART:
193,812 UART: [state] CFI Enabled
263,045 UART: [state] LifecycleState = Unprovisioned
264,922 UART: [state] DebugLocked = No
267,524 UART: [state] WD Timer not started. Device not locked for debugging
271,994 UART: [kat] SHA2-256
451,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,709 UART: [kat] ++
463,245 UART: [kat] sha1
474,188 UART: [kat] SHA2-256
477,192 UART: [kat] SHA2-384
483,755 UART: [kat] SHA2-512-ACC
486,713 UART: [kat] ECC-384
2,945,797 UART: [kat] HMAC-384Kdf
2,971,978 UART: [kat] LMS
3,501,419 UART: [kat] --
3,505,776 UART: [cold-reset] ++
3,507,096 UART: [fht] FHT @ 0x50003400
3,516,521 UART: [idev] ++
3,517,082 UART: [idev] CDI.KEYID = 6
3,518,063 UART: [idev] SUBJECT.KEYID = 7
3,519,242 UART: [idev] UDS.KEYID = 0
3,520,162 ready_for_fw is high
3,520,356 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,660,777 UART: [idev] Erasing UDS.KEYID = 0
6,028,837 UART: [idev] Sha1 KeyId Algorithm
6,051,426 UART: [idev] --
6,056,453 UART: [ldev] ++
6,057,044 UART: [ldev] CDI.KEYID = 6
6,057,934 UART: [ldev] SUBJECT.KEYID = 5
6,059,097 UART: [ldev] AUTHORITY.KEYID = 7
6,060,342 UART: [ldev] FE.KEYID = 1
6,098,679 UART: [ldev] Erasing FE.KEYID = 1
8,599,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,603 UART: [ldev] --
10,389,964 UART: [fwproc] Wait for Commands...
10,392,553 UART: [fwproc] Recv command 0x46574c44
10,394,648 UART: [fwproc] Recv'd Img size: 111752 bytes
13,761,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,834,340 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,894,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,211,690 >>> mbox cmd response: success
14,215,350 UART: [afmc] ++
14,215,963 UART: [afmc] CDI.KEYID = 6
14,216,875 UART: [afmc] SUBJECT.KEYID = 7
14,218,038 UART: [afmc] AUTHORITY.KEYID = 5
16,743,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,467,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,468,929 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,485,031 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,501,064 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,516,763 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,538,778 UART: [afmc] --
18,543,386 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,684,282 UART: [cold-reset] --
18,685,145 UART: [state] Locking Datavault
18,686,241 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,788 UART: [state] Locking ICCM
18,688,693 UART: [exit] Launching FMC @ 0x40000000
18,690,120 UART:
18,690,272 UART: Running Caliptra FMC ...
18,691,371 UART:
18,691,523 UART: [fmc] Received command: 0x46574C44
18,692,896 UART:
18,693,040 UART: Running Caliptra ROM ...
18,694,083 UART:
18,694,234 UART: [state] CFI Enabled
18,758,685 UART: [state] LifecycleState = Unprovisioned
18,760,566 UART: [state] DebugLocked = No
18,762,551 UART: [state] WD Timer not started. Device not locked for debugging
18,765,484 UART: [kat] SHA2-256
18,944,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,956,183 UART: [kat] ++
18,956,643 UART: [kat] sha1
18,968,121 UART: [kat] SHA2-256
18,971,141 UART: [kat] SHA2-384
18,978,311 UART: [kat] SHA2-512-ACC
18,981,252 UART: [kat] ECC-384
21,439,392 UART: [kat] HMAC-384Kdf
21,464,956 UART: [kat] LMS
21,994,418 UART: [kat] --
21,998,029 UART: [update-reset] ++
25,395,922 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,398,946 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,772,784 >>> mbox cmd response: success
25,773,493 UART: [update-reset] Copying MAN_2 To MAN_1
25,795,826 UART: [update-reset Success] --
25,797,092 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,799,718 UART: [state] Locking Datavault
25,803,577 UART: [state] Locking PCR0, PCR1 and PCR31
25,805,225 UART: [state] Locking ICCM
25,806,832 UART: [exit] Launching FMC @ 0x40000000
25,815,232 UART:
25,815,466 UART: Running Caliptra FMC ...
25,816,564 UART:
25,816,718 UART: [fmc] Received command: 0x1000000D
25,818,233 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,385,083 ready_for_fw is high
3,385,677 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,051,704 >>> mbox cmd response: success
18,330,950 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,471,859 UART:
18,472,243 UART: Running Caliptra FMC ...
18,473,449 UART:
18,473,623 UART: [fmc] Received command: 0x46574C44
25,411,734 >>> mbox cmd response: success
25,433,918 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,446,762 UART:
25,447,009 UART: Running Caliptra FMC ...
25,448,099 UART:
25,448,253 UART: [fmc] Received command: 0x1000000D
25,449,776 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,477 UART:
192,848 UART: Running Caliptra ROM ...
194,039 UART:
603,496 UART: [state] CFI Enabled
618,728 UART: [state] LifecycleState = Unprovisioned
620,614 UART: [state] DebugLocked = No
622,989 UART: [state] WD Timer not started. Device not locked for debugging
627,591 UART: [kat] SHA2-256
806,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,308 UART: [kat] ++
818,839 UART: [kat] sha1
829,928 UART: [kat] SHA2-256
832,930 UART: [kat] SHA2-384
840,188 UART: [kat] SHA2-512-ACC
843,125 UART: [kat] ECC-384
3,285,292 UART: [kat] HMAC-384Kdf
3,296,875 UART: [kat] LMS
3,826,373 UART: [kat] --
3,831,028 UART: [cold-reset] ++
3,833,317 UART: [fht] FHT @ 0x50003400
3,844,259 UART: [idev] ++
3,844,873 UART: [idev] CDI.KEYID = 6
3,845,765 UART: [idev] SUBJECT.KEYID = 7
3,846,936 UART: [idev] UDS.KEYID = 0
3,847,863 ready_for_fw is high
3,848,070 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,988,340 UART: [idev] Erasing UDS.KEYID = 0
6,325,433 UART: [idev] Sha1 KeyId Algorithm
6,348,883 UART: [idev] --
6,352,113 UART: [ldev] ++
6,352,677 UART: [ldev] CDI.KEYID = 6
6,353,628 UART: [ldev] SUBJECT.KEYID = 5
6,354,787 UART: [ldev] AUTHORITY.KEYID = 7
6,356,067 UART: [ldev] FE.KEYID = 1
6,366,420 UART: [ldev] Erasing FE.KEYID = 1
8,842,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,629 UART: [ldev] --
10,631,752 UART: [fwproc] Wait for Commands...
10,633,461 UART: [fwproc] Recv command 0x46574c44
10,635,736 UART: [fwproc] Recv'd Img size: 111752 bytes
14,006,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,077,905 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,138,231 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,455,387 >>> mbox cmd response: success
14,458,984 UART: [afmc] ++
14,459,600 UART: [afmc] CDI.KEYID = 6
14,460,512 UART: [afmc] SUBJECT.KEYID = 7
14,461,616 UART: [afmc] AUTHORITY.KEYID = 5
16,962,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,684,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,686,304 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,702,351 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,718,425 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,734,092 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,757,347 UART: [afmc] --
18,761,882 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,902,697 UART: [cold-reset] --
18,903,560 UART: [state] Locking Datavault
18,904,711 UART: [state] Locking PCR0, PCR1 and PCR31
18,906,264 UART: [state] Locking ICCM
18,907,173 UART: [exit] Launching FMC @ 0x40000000
18,908,592 UART:
18,908,744 UART: Running Caliptra FMC ...
18,909,838 UART:
18,909,988 UART: [fmc] Received command: 0x46574C44
18,911,436 UART:
18,911,586 UART: Running Caliptra ROM ...
18,912,676 UART:
18,912,831 UART: [state] CFI Enabled
18,916,013 UART: [state] LifecycleState = Unprovisioned
18,917,896 UART: [state] DebugLocked = No
18,919,104 UART: [state] WD Timer not started. Device not locked for debugging
18,923,103 UART: [kat] SHA2-256
19,102,238 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,113,819 UART: [kat] ++
19,114,376 UART: [kat] sha1
19,126,017 UART: [kat] SHA2-256
19,129,046 UART: [kat] SHA2-384
19,135,041 UART: [kat] SHA2-512-ACC
19,137,984 UART: [kat] ECC-384
21,581,154 UART: [kat] HMAC-384Kdf
21,593,484 UART: [kat] LMS
22,123,032 UART: [kat] --
22,125,694 UART: [update-reset] ++
25,516,385 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,519,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,892,865 >>> mbox cmd response: success
25,893,383 UART: [update-reset] Copying MAN_2 To MAN_1
25,915,854 UART: [update-reset Success] --
25,917,097 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,921,320 UART: [state] Locking Datavault
25,924,770 UART: [state] Locking PCR0, PCR1 and PCR31
25,926,415 UART: [state] Locking ICCM
25,928,940 UART: [exit] Launching FMC @ 0x40000000
25,937,332 UART:
25,937,564 UART: Running Caliptra FMC ...
25,938,661 UART:
25,938,814 UART: [fmc] Received command: 0x1000000D
25,940,327 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,696,569 ready_for_fw is high
3,697,125 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,230,788 >>> mbox cmd response: success
18,463,922 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,604,820 UART:
18,605,230 UART: Running Caliptra FMC ...
18,606,437 UART:
18,606,604 UART: [fmc] Received command: 0x46574C44
25,471,305 >>> mbox cmd response: success
25,492,517 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,504,591 UART:
25,504,846 UART: Running Caliptra FMC ...
25,505,940 UART:
25,506,086 UART: [fmc] Received command: 0x1000000D
25,507,613 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,255 UART:
192,605 UART: Running Caliptra ROM ...
193,786 UART:
193,938 UART: [state] CFI Enabled
266,377 UART: [state] LifecycleState = Unprovisioned
268,224 UART: [state] DebugLocked = No
270,986 UART: [state] WD Timer not started. Device not locked for debugging
274,530 UART: [kat] SHA2-256
453,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,280 UART: [kat] ++
465,810 UART: [kat] sha1
476,860 UART: [kat] SHA2-256
479,869 UART: [kat] SHA2-384
485,229 UART: [kat] SHA2-512-ACC
488,197 UART: [kat] ECC-384
2,942,762 UART: [kat] HMAC-384Kdf
2,966,889 UART: [kat] LMS
3,496,389 UART: [kat] --
3,500,834 UART: [cold-reset] ++
3,502,914 UART: [fht] FHT @ 0x50003400
3,512,970 UART: [idev] ++
3,513,536 UART: [idev] CDI.KEYID = 6
3,514,638 UART: [idev] SUBJECT.KEYID = 7
3,515,766 UART: [idev] UDS.KEYID = 0
3,516,667 ready_for_fw is high
3,516,854 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,657,274 UART: [idev] Erasing UDS.KEYID = 0
6,024,108 UART: [idev] Sha1 KeyId Algorithm
6,046,374 UART: [idev] --
6,050,534 UART: [ldev] ++
6,051,110 UART: [ldev] CDI.KEYID = 6
6,052,024 UART: [ldev] SUBJECT.KEYID = 5
6,053,188 UART: [ldev] AUTHORITY.KEYID = 7
6,054,419 UART: [ldev] FE.KEYID = 1
6,095,362 UART: [ldev] Erasing FE.KEYID = 1
8,598,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,280 UART: [ldev] --
10,408,184 UART: [fwproc] Wait for Commands...
10,409,795 UART: [fwproc] Recv command 0x46574c44
10,411,888 UART: [fwproc] Recv'd Img size: 111752 bytes
13,781,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,855,694 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,916,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,234,248 >>> mbox cmd response: success
14,238,081 UART: [afmc] ++
14,238,706 UART: [afmc] CDI.KEYID = 6
14,239,620 UART: [afmc] SUBJECT.KEYID = 7
14,240,696 UART: [afmc] AUTHORITY.KEYID = 5
16,779,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,502,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,504,865 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,520,949 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,536,984 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,552,683 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,575,486 UART: [afmc] --
18,580,455 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,721,324 UART: [cold-reset] --
18,722,189 UART: [state] Locking Datavault
18,723,265 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,801 UART: [state] Locking ICCM
18,725,681 UART: [exit] Launching FMC @ 0x40000000
18,727,023 UART:
18,727,170 UART: Running Caliptra FMC ...
18,728,281 UART:
18,728,432 UART: [fmc] Received command: 0x46574C44
18,729,894 UART:
18,730,067 UART: Running Caliptra ROM ...
18,731,086 UART:
18,731,234 UART: [state] CFI Enabled
18,790,814 UART: [state] LifecycleState = Unprovisioned
18,792,651 UART: [state] DebugLocked = No
18,795,010 UART: [state] WD Timer not started. Device not locked for debugging
18,798,983 UART: [kat] SHA2-256
18,978,112 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,989,723 UART: [kat] ++
18,990,175 UART: [kat] sha1
19,001,814 UART: [kat] SHA2-256
19,004,834 UART: [kat] SHA2-384
19,010,932 UART: [kat] SHA2-512-ACC
19,013,871 UART: [kat] ECC-384
21,477,177 UART: [kat] HMAC-384Kdf
21,500,096 UART: [kat] LMS
22,029,528 UART: [kat] --
22,035,966 UART: [update-reset] ++
25,434,462 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,437,401 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,811,325 >>> mbox cmd response: success
25,813,274 UART: [update-reset] Copying MAN_2 To MAN_1
25,835,604 UART: [update-reset Success] --
25,836,963 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,839,183 UART: [state] Locking Datavault
25,842,120 UART: [state] Locking PCR0, PCR1 and PCR31
25,843,764 UART: [state] Locking ICCM
25,845,858 UART: [exit] Launching FMC @ 0x40000000
25,854,255 UART:
25,854,498 UART: Running Caliptra FMC ...
25,855,597 UART:
25,855,752 UART: [fmc] Received command: 0x1000000D
25,857,289 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,381,002 ready_for_fw is high
3,381,407 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
13,998,728 >>> mbox cmd response: success
18,265,445 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,406,428 UART:
18,406,819 UART: Running Caliptra FMC ...
18,408,030 UART:
18,408,205 UART: [fmc] Received command: 0x46574C44
25,366,105 >>> mbox cmd response: success
25,387,858 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,399,788 UART:
25,400,030 UART: Running Caliptra FMC ...
25,401,136 UART:
25,401,289 UART: [fmc] Received command: 0x1000000D
25,402,817 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,371 UART:
192,900 UART: Running Caliptra ROM ...
194,100 UART:
603,436 UART: [state] CFI Enabled
619,153 UART: [state] LifecycleState = Unprovisioned
621,034 UART: [state] DebugLocked = No
622,779 UART: [state] WD Timer not started. Device not locked for debugging
626,886 UART: [kat] SHA2-256
805,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,569 UART: [kat] ++
818,115 UART: [kat] sha1
827,936 UART: [kat] SHA2-256
830,929 UART: [kat] SHA2-384
836,659 UART: [kat] SHA2-512-ACC
839,626 UART: [kat] ECC-384
3,281,577 UART: [kat] HMAC-384Kdf
3,295,096 UART: [kat] LMS
3,824,568 UART: [kat] --
3,828,337 UART: [cold-reset] ++
3,829,765 UART: [fht] FHT @ 0x50003400
3,841,234 UART: [idev] ++
3,841,793 UART: [idev] CDI.KEYID = 6
3,842,819 UART: [idev] SUBJECT.KEYID = 7
3,843,920 UART: [idev] UDS.KEYID = 0
3,844,844 ready_for_fw is high
3,845,042 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,985,513 UART: [idev] Erasing UDS.KEYID = 0
6,315,708 UART: [idev] Sha1 KeyId Algorithm
6,338,500 UART: [idev] --
6,342,431 UART: [ldev] ++
6,342,993 UART: [ldev] CDI.KEYID = 6
6,343,901 UART: [ldev] SUBJECT.KEYID = 5
6,345,111 UART: [ldev] AUTHORITY.KEYID = 7
6,346,348 UART: [ldev] FE.KEYID = 1
6,355,682 UART: [ldev] Erasing FE.KEYID = 1
8,827,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,742 UART: [ldev] --
10,616,922 UART: [fwproc] Wait for Commands...
10,618,923 UART: [fwproc] Recv command 0x46574c44
10,621,020 UART: [fwproc] Recv'd Img size: 111752 bytes
13,991,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,067,706 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,128,033 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,445,815 >>> mbox cmd response: success
14,450,635 UART: [afmc] ++
14,451,247 UART: [afmc] CDI.KEYID = 6
14,452,156 UART: [afmc] SUBJECT.KEYID = 7
14,453,315 UART: [afmc] AUTHORITY.KEYID = 5
16,956,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,677,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,679,194 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,695,291 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,711,338 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,727,008 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,748,519 UART: [afmc] --
18,753,817 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,894,498 UART: [cold-reset] --
18,895,358 UART: [state] Locking Datavault
18,896,506 UART: [state] Locking PCR0, PCR1 and PCR31
18,898,040 UART: [state] Locking ICCM
18,899,000 UART: [exit] Launching FMC @ 0x40000000
18,900,426 UART:
18,900,584 UART: Running Caliptra FMC ...
18,901,676 UART:
18,901,828 UART: [fmc] Received command: 0x46574C44
18,903,205 UART:
18,903,346 UART: Running Caliptra ROM ...
18,904,441 UART:
18,904,594 UART: [state] CFI Enabled
18,913,255 UART: [state] LifecycleState = Unprovisioned
18,915,155 UART: [state] DebugLocked = No
18,916,752 UART: [state] WD Timer not started. Device not locked for debugging
18,919,688 UART: [kat] SHA2-256
19,098,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,110,482 UART: [kat] ++
19,110,969 UART: [kat] sha1
19,122,014 UART: [kat] SHA2-256
19,125,033 UART: [kat] SHA2-384
19,131,176 UART: [kat] SHA2-512-ACC
19,134,114 UART: [kat] ECC-384
21,576,969 UART: [kat] HMAC-384Kdf
21,589,194 UART: [kat] LMS
22,118,691 UART: [kat] --
22,122,895 UART: [update-reset] ++
25,522,944 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,526,323 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,900,171 >>> mbox cmd response: success
25,900,582 UART: [update-reset] Copying MAN_2 To MAN_1
25,922,795 UART: [update-reset Success] --
25,924,118 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,926,838 UART: [state] Locking Datavault
25,928,737 UART: [state] Locking PCR0, PCR1 and PCR31
25,930,378 UART: [state] Locking ICCM
25,931,881 UART: [exit] Launching FMC @ 0x40000000
25,940,286 UART:
25,940,517 UART: Running Caliptra FMC ...
25,941,620 UART:
25,941,775 UART: [fmc] Received command: 0x1000000D
25,943,283 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
3,693,556 ready_for_fw is high
3,693,952 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,221,561 >>> mbox cmd response: success
18,458,505 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,599,237 UART:
18,599,612 UART: Running Caliptra FMC ...
18,600,807 UART:
18,600,978 UART: [fmc] Received command: 0x46574C44
25,461,353 >>> mbox cmd response: success
25,483,386 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,496,785 UART:
25,497,077 UART: Running Caliptra FMC ...
25,498,261 UART:
25,498,421 UART: [fmc] Received command: 0x1000000D
25,499,937 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,169,975 UART: [fht] FHT @ 0x50003400
1,172,621 UART: [idev] ++
1,172,789 UART: [idev] CDI.KEYID = 6
1,173,150 UART: [idev] SUBJECT.KEYID = 7
1,173,575 UART: [idev] UDS.KEYID = 0
1,173,921 ready_for_fw is high
1,173,921 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,427 UART: [idev] Erasing UDS.KEYID = 0
1,198,099 UART: [idev] Sha1 KeyId Algorithm
1,207,175 UART: [idev] --
1,208,176 UART: [ldev] ++
1,208,344 UART: [ldev] CDI.KEYID = 6
1,208,708 UART: [ldev] SUBJECT.KEYID = 5
1,209,135 UART: [ldev] AUTHORITY.KEYID = 7
1,209,598 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,241,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,704 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,406 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,599 >>> mbox cmd response: success
2,739,806 UART: [afmc] ++
2,739,974 UART: [afmc] CDI.KEYID = 6
2,740,337 UART: [afmc] SUBJECT.KEYID = 7
2,740,763 UART: [afmc] AUTHORITY.KEYID = 5
2,776,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,347 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,043 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,942 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,635 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,431 UART: [afmc] --
2,819,401 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,819,423 UART: [cold-reset] --
2,820,097 UART: [state] Locking Datavault
2,821,438 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,042 UART: [state] Locking ICCM
2,822,604 UART: [exit] Launching FMC @ 0x40000000
2,827,901 UART:
2,827,917 UART: Running Caliptra FMC ...
2,828,325 UART:
2,828,555 UART: [fmc] Received command: 0x46574C44
2,829,381 UART:
2,829,397 UART: Running Caliptra ROM ...
2,829,805 UART:
2,829,860 UART: [state] CFI Enabled
2,832,556 UART: [state] LifecycleState = Unprovisioned
2,833,211 UART: [state] DebugLocked = No
2,833,855 UART: [state] WD Timer not started. Device not locked for debugging
2,835,041 UART: [kat] SHA2-256
3,638,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,720 UART: [kat] ++
3,642,872 UART: [kat] sha1
3,647,134 UART: [kat] SHA2-256
3,649,074 UART: [kat] SHA2-384
3,651,677 UART: [kat] SHA2-512-ACC
3,653,577 UART: [kat] ECC-384
3,663,500 UART: [kat] HMAC-384Kdf
3,668,104 UART: [kat] LMS
3,916,416 UART: [kat] --
3,917,368 UART: [update-reset] ++
5,199,833 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,200,866 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,348,632 >>> mbox cmd response: success
5,348,905 UART: [update-reset] Copying MAN_2 To MAN_1
5,356,919 UART: [update-reset Success] --
5,357,328 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,358,198 UART: [state] Locking Datavault
5,358,846 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,450 UART: [state] Locking ICCM
5,359,984 UART: [exit] Launching FMC @ 0x40000000
5,365,281 UART:
5,365,297 UART: Running Caliptra FMC ...
5,365,705 UART:
5,365,927 UART: [fmc] Received command: 0x1000000D
5,367,019 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,924 ready_for_fw is high
1,055,924 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,323 >>> mbox cmd response: success
2,644,208 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,650,625 UART:
2,650,641 UART: Running Caliptra FMC ...
2,651,049 UART:
2,651,279 UART: [fmc] Received command: 0x46574C44
5,053,345 >>> mbox cmd response: success
5,061,051 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,066,895 UART:
5,066,911 UART: Running Caliptra FMC ...
5,067,319 UART:
5,067,541 UART: [fmc] Received command: 0x1000000D
5,068,633 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,567 UART: [kat] SHA2-512-ACC
906,468 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,614 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 ready_for_fw is high
1,174,606 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,208,314 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,242,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,883 UART: [fwproc] Wait for Commands...
1,282,594 UART: [fwproc] Recv command 0x46574c44
1,283,327 UART: [fwproc] Recv'd Img size: 111752 bytes
2,552,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,317 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,740,546 >>> mbox cmd response: success
2,741,709 UART: [afmc] ++
2,741,877 UART: [afmc] CDI.KEYID = 6
2,742,240 UART: [afmc] SUBJECT.KEYID = 7
2,742,666 UART: [afmc] AUTHORITY.KEYID = 5
2,778,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,898 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,594 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,493 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,813,186 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,821,208 UART: [afmc] --
2,822,066 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,822,088 UART: [cold-reset] --
2,822,896 UART: [state] Locking Datavault
2,823,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,535 UART: [state] Locking ICCM
2,825,133 UART: [exit] Launching FMC @ 0x40000000
2,830,430 UART:
2,830,446 UART: Running Caliptra FMC ...
2,830,854 UART:
2,831,084 UART: [fmc] Received command: 0x46574C44
2,831,910 UART:
2,831,926 UART: Running Caliptra ROM ...
2,832,334 UART:
2,832,476 UART: [state] CFI Enabled
2,835,116 UART: [state] LifecycleState = Unprovisioned
2,835,771 UART: [state] DebugLocked = No
2,836,281 UART: [state] WD Timer not started. Device not locked for debugging
2,837,579 UART: [kat] SHA2-256
3,641,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,258 UART: [kat] ++
3,645,410 UART: [kat] sha1
3,649,524 UART: [kat] SHA2-256
3,651,464 UART: [kat] SHA2-384
3,654,239 UART: [kat] SHA2-512-ACC
3,656,139 UART: [kat] ECC-384
3,665,960 UART: [kat] HMAC-384Kdf
3,670,472 UART: [kat] LMS
3,918,784 UART: [kat] --
3,919,374 UART: [update-reset] ++
5,200,741 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,201,766 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,349,532 >>> mbox cmd response: success
5,349,641 UART: [update-reset] Copying MAN_2 To MAN_1
5,357,655 UART: [update-reset Success] --
5,358,064 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,358,730 UART: [state] Locking Datavault
5,359,538 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,142 UART: [state] Locking ICCM
5,360,630 UART: [exit] Launching FMC @ 0x40000000
5,365,927 UART:
5,365,943 UART: Running Caliptra FMC ...
5,366,351 UART:
5,366,573 UART: [fmc] Received command: 0x1000000D
5,367,665 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,493 ready_for_fw is high
1,056,493 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,816 >>> mbox cmd response: success
2,645,465 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,651,720 UART:
2,651,736 UART: Running Caliptra FMC ...
2,652,144 UART:
2,652,374 UART: [fmc] Received command: 0x46574C44
5,053,695 >>> mbox cmd response: success
5,061,343 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,066,921 UART:
5,066,937 UART: Running Caliptra FMC ...
5,067,345 UART:
5,067,567 UART: [fmc] Received command: 0x1000000D
5,068,659 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Unprovisioned
86,335 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
891,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,845 UART: [kat] ++
895,997 UART: [kat] sha1
900,061 UART: [kat] SHA2-256
902,001 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 ready_for_fw is high
1,174,169 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,197,709 UART: [idev] Sha1 KeyId Algorithm
1,206,485 UART: [idev] --
1,207,606 UART: [ldev] ++
1,207,774 UART: [ldev] CDI.KEYID = 6
1,208,138 UART: [ldev] SUBJECT.KEYID = 5
1,208,565 UART: [ldev] AUTHORITY.KEYID = 7
1,209,028 UART: [ldev] FE.KEYID = 1
1,214,078 UART: [ldev] Erasing FE.KEYID = 1
1,240,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,310 UART: [ldev] --
1,279,780 UART: [fwproc] Wait for Commands...
1,280,377 UART: [fwproc] Recv command 0x46574c44
1,281,110 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,070 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,223 >>> mbox cmd response: success
2,738,302 UART: [afmc] ++
2,738,470 UART: [afmc] CDI.KEYID = 6
2,738,833 UART: [afmc] SUBJECT.KEYID = 7
2,739,259 UART: [afmc] AUTHORITY.KEYID = 5
2,774,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,595 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,797,291 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,190 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,808,883 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,816,721 UART: [afmc] --
2,817,635 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,817,657 UART: [cold-reset] --
2,818,527 UART: [state] Locking Datavault
2,819,456 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,060 UART: [state] Locking ICCM
2,820,606 UART: [exit] Launching FMC @ 0x40000000
2,825,903 UART:
2,825,919 UART: Running Caliptra FMC ...
2,826,327 UART:
2,826,557 UART: [fmc] Received command: 0x46574C44
2,827,383 UART:
2,827,399 UART: Running Caliptra ROM ...
2,827,807 UART:
2,827,862 UART: [state] CFI Enabled
2,830,182 UART: [state] LifecycleState = Unprovisioned
2,830,837 UART: [state] DebugLocked = No
2,831,377 UART: [state] WD Timer not started. Device not locked for debugging
2,832,605 UART: [kat] SHA2-256
3,636,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,640,284 UART: [kat] ++
3,640,436 UART: [kat] sha1
3,644,600 UART: [kat] SHA2-256
3,646,540 UART: [kat] SHA2-384
3,649,327 UART: [kat] SHA2-512-ACC
3,651,227 UART: [kat] ECC-384
3,661,010 UART: [kat] HMAC-384Kdf
3,665,598 UART: [kat] LMS
3,913,910 UART: [kat] --
3,914,346 UART: [update-reset] ++
5,196,117 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,197,126 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,344,892 >>> mbox cmd response: success
5,345,235 UART: [update-reset] Copying MAN_2 To MAN_1
5,353,249 UART: [update-reset Success] --
5,353,658 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,353,972 UART: [state] Locking Datavault
5,354,686 UART: [state] Locking PCR0, PCR1 and PCR31
5,355,290 UART: [state] Locking ICCM
5,355,956 UART: [exit] Launching FMC @ 0x40000000
5,361,253 UART:
5,361,269 UART: Running Caliptra FMC ...
5,361,677 UART:
5,361,899 UART: [fmc] Received command: 0x1000000D
5,362,991 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,960 ready_for_fw is high
1,055,960 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,709 >>> mbox cmd response: success
2,645,306 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,651,393 UART:
2,651,409 UART: Running Caliptra FMC ...
2,651,817 UART:
2,652,047 UART: [fmc] Received command: 0x46574C44
5,053,405 >>> mbox cmd response: success
5,061,101 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,066,769 UART:
5,066,785 UART: Running Caliptra FMC ...
5,067,193 UART:
5,067,415 UART: [fmc] Received command: 0x1000000D
5,068,507 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,393 UART: [kat] SHA2-256
891,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,072 UART: [kat] ++
896,224 UART: [kat] sha1
900,278 UART: [kat] SHA2-256
902,218 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,779 UART: [kat] HMAC-384Kdf
921,451 UART: [kat] LMS
1,169,763 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,932 UART: [idev] ++
1,174,100 UART: [idev] CDI.KEYID = 6
1,174,461 UART: [idev] SUBJECT.KEYID = 7
1,174,886 UART: [idev] UDS.KEYID = 0
1,175,232 ready_for_fw is high
1,175,232 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,183,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,288 UART: [idev] Sha1 KeyId Algorithm
1,209,322 UART: [idev] --
1,210,299 UART: [ldev] ++
1,210,467 UART: [ldev] CDI.KEYID = 6
1,210,831 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,217,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,829 UART: [ldev] --
1,283,173 UART: [fwproc] Wait for Commands...
1,283,922 UART: [fwproc] Recv command 0x46574c44
1,284,655 UART: [fwproc] Recv'd Img size: 111752 bytes
2,552,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,661 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,346 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,741,012 >>> mbox cmd response: success
2,742,251 UART: [afmc] ++
2,742,419 UART: [afmc] CDI.KEYID = 6
2,742,782 UART: [afmc] SUBJECT.KEYID = 7
2,743,208 UART: [afmc] AUTHORITY.KEYID = 5
2,778,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,698 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,394 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,293 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,986 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,868 UART: [afmc] --
2,821,910 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,821,932 UART: [cold-reset] --
2,822,976 UART: [state] Locking Datavault
2,824,041 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,645 UART: [state] Locking ICCM
2,825,241 UART: [exit] Launching FMC @ 0x40000000
2,830,538 UART:
2,830,554 UART: Running Caliptra FMC ...
2,830,962 UART:
2,831,192 UART: [fmc] Received command: 0x46574C44
2,832,018 UART:
2,832,034 UART: Running Caliptra ROM ...
2,832,442 UART:
2,832,584 UART: [state] CFI Enabled
2,835,144 UART: [state] LifecycleState = Unprovisioned
2,835,799 UART: [state] DebugLocked = No
2,836,369 UART: [state] WD Timer not started. Device not locked for debugging
2,837,699 UART: [kat] SHA2-256
3,641,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,378 UART: [kat] ++
3,645,530 UART: [kat] sha1
3,649,750 UART: [kat] SHA2-256
3,651,690 UART: [kat] SHA2-384
3,654,397 UART: [kat] SHA2-512-ACC
3,656,297 UART: [kat] ECC-384
3,666,112 UART: [kat] HMAC-384Kdf
3,670,886 UART: [kat] LMS
3,919,198 UART: [kat] --
3,919,816 UART: [update-reset] ++
5,201,627 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,202,804 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,350,570 >>> mbox cmd response: success
5,350,833 UART: [update-reset] Copying MAN_2 To MAN_1
5,358,847 UART: [update-reset Success] --
5,359,256 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,359,698 UART: [state] Locking Datavault
5,360,612 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,216 UART: [state] Locking ICCM
5,361,866 UART: [exit] Launching FMC @ 0x40000000
5,367,163 UART:
5,367,179 UART: Running Caliptra FMC ...
5,367,587 UART:
5,367,809 UART: [fmc] Received command: 0x1000000D
5,368,901 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,317 ready_for_fw is high
1,056,317 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,922 >>> mbox cmd response: success
2,645,173 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,651,410 UART:
2,651,426 UART: Running Caliptra FMC ...
2,651,834 UART:
2,652,064 UART: [fmc] Received command: 0x46574C44
5,053,001 >>> mbox cmd response: success
5,060,607 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,066,715 UART:
5,066,731 UART: Running Caliptra FMC ...
5,067,139 UART:
5,067,361 UART: [fmc] Received command: 0x1000000D
5,068,453 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,165 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
916,042 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 ready_for_fw is high
1,174,173 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,765 UART: [idev] Sha1 KeyId Algorithm
1,207,697 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,614 UART: [ldev] Erasing FE.KEYID = 1
1,241,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,281,038 UART: [fwproc] Wait for Commands...
1,281,693 UART: [fwproc] Recv command 0x46574c44
1,282,426 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,492 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,771 >>> mbox cmd response: success
2,738,938 UART: [afmc] ++
2,739,106 UART: [afmc] CDI.KEYID = 6
2,739,469 UART: [afmc] SUBJECT.KEYID = 7
2,739,895 UART: [afmc] AUTHORITY.KEYID = 5
2,775,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,817 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,513 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,412 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,105 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,981 UART: [afmc] --
2,819,091 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,819,113 UART: [cold-reset] --
2,820,023 UART: [state] Locking Datavault
2,821,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,046 UART: [state] Locking ICCM
2,822,588 UART: [exit] Launching FMC @ 0x40000000
2,827,885 UART:
2,827,901 UART: Running Caliptra FMC ...
2,828,309 UART:
2,828,539 UART: [fmc] Received command: 0x46574C44
2,829,365 UART:
2,829,381 UART: Running Caliptra ROM ...
2,829,789 UART:
2,829,844 UART: [state] CFI Enabled
2,832,430 UART: [state] LifecycleState = Unprovisioned
2,833,085 UART: [state] DebugLocked = No
2,833,637 UART: [state] WD Timer not started. Device not locked for debugging
2,834,855 UART: [kat] SHA2-256
3,638,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,534 UART: [kat] ++
3,642,686 UART: [kat] sha1
3,646,974 UART: [kat] SHA2-256
3,648,914 UART: [kat] SHA2-384
3,651,545 UART: [kat] SHA2-512-ACC
3,653,445 UART: [kat] ECC-384
3,663,104 UART: [kat] HMAC-384Kdf
3,667,638 UART: [kat] LMS
3,915,950 UART: [kat] --
3,916,678 UART: [update-reset] ++
5,198,635 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,347,548 >>> mbox cmd response: success
5,347,803 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,817 UART: [update-reset Success] --
5,356,226 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,356,788 UART: [state] Locking Datavault
5,357,402 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,006 UART: [state] Locking ICCM
5,358,576 UART: [exit] Launching FMC @ 0x40000000
5,363,873 UART:
5,363,889 UART: Running Caliptra FMC ...
5,364,297 UART:
5,364,519 UART: [fmc] Received command: 0x1000000D
5,365,611 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,362 ready_for_fw is high
1,056,362 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,891 >>> mbox cmd response: success
2,644,668 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,650,537 UART:
2,650,553 UART: Running Caliptra FMC ...
2,650,961 UART:
2,651,191 UART: [fmc] Received command: 0x46574C44
5,051,821 >>> mbox cmd response: success
5,059,313 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,065,251 UART:
5,065,267 UART: Running Caliptra FMC ...
5,065,675 UART:
5,065,897 UART: [fmc] Received command: 0x1000000D
5,066,989 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
916,003 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,798 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,207,618 UART: [idev] --
1,208,609 UART: [ldev] ++
1,208,777 UART: [ldev] CDI.KEYID = 6
1,209,141 UART: [ldev] SUBJECT.KEYID = 5
1,209,568 UART: [ldev] AUTHORITY.KEYID = 7
1,210,031 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,987 UART: [ldev] --
1,281,297 UART: [fwproc] Wait for Commands...
1,281,888 UART: [fwproc] Recv command 0x46574c44
1,282,621 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,989 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,204 >>> mbox cmd response: success
2,740,291 UART: [afmc] ++
2,740,459 UART: [afmc] CDI.KEYID = 6
2,740,822 UART: [afmc] SUBJECT.KEYID = 7
2,741,248 UART: [afmc] AUTHORITY.KEYID = 5
2,776,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,481 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,232 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,928 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,827 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,520 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,362 UART: [afmc] --
2,820,414 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,820,436 UART: [cold-reset] --
2,821,262 UART: [state] Locking Datavault
2,822,671 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,275 UART: [state] Locking ICCM
2,823,929 UART: [exit] Launching FMC @ 0x40000000
2,829,226 UART:
2,829,242 UART: Running Caliptra FMC ...
2,829,650 UART:
2,829,880 UART: [fmc] Received command: 0x46574C44
2,830,706 UART:
2,830,722 UART: Running Caliptra ROM ...
2,831,130 UART:
2,831,272 UART: [state] CFI Enabled
2,833,954 UART: [state] LifecycleState = Unprovisioned
2,834,609 UART: [state] DebugLocked = No
2,835,111 UART: [state] WD Timer not started. Device not locked for debugging
2,836,289 UART: [kat] SHA2-256
3,639,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,968 UART: [kat] ++
3,644,120 UART: [kat] sha1
3,648,454 UART: [kat] SHA2-256
3,650,394 UART: [kat] SHA2-384
3,652,981 UART: [kat] SHA2-512-ACC
3,654,881 UART: [kat] ECC-384
3,664,856 UART: [kat] HMAC-384Kdf
3,669,404 UART: [kat] LMS
3,917,716 UART: [kat] --
3,918,720 UART: [update-reset] ++
5,201,615 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,202,610 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,350,376 >>> mbox cmd response: success
5,350,725 UART: [update-reset] Copying MAN_2 To MAN_1
5,358,739 UART: [update-reset Success] --
5,359,148 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,359,508 UART: [state] Locking Datavault
5,360,366 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,970 UART: [state] Locking ICCM
5,361,514 UART: [exit] Launching FMC @ 0x40000000
5,366,811 UART:
5,366,827 UART: Running Caliptra FMC ...
5,367,235 UART:
5,367,457 UART: [fmc] Received command: 0x1000000D
5,368,549 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,405 ready_for_fw is high
1,056,405 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,846 >>> mbox cmd response: success
2,645,317 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,651,290 UART:
2,651,306 UART: Running Caliptra FMC ...
2,651,714 UART:
2,651,944 UART: [fmc] Received command: 0x46574C44
5,055,529 >>> mbox cmd response: success
5,063,233 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,068,845 UART:
5,068,861 UART: Running Caliptra FMC ...
5,069,269 UART:
5,069,491 UART: [fmc] Received command: 0x1000000D
5,070,583 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.27s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,164 UART:
192,547 UART: Running Caliptra ROM ...
193,743 UART:
193,894 UART: [state] CFI Enabled
262,276 UART: [state] LifecycleState = Unprovisioned
264,846 UART: [state] DebugLocked = No
267,115 UART: [state] WD Timer not started. Device not locked for debugging
271,577 UART: [kat] SHA2-256
453,518 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,026 UART: [kat] ++
465,508 UART: [kat] sha1
476,097 UART: [kat] SHA2-256
479,123 UART: [kat] SHA2-384
484,401 UART: [kat] SHA2-512-ACC
487,059 UART: [kat] ECC-384
3,778,084 UART: [kat] HMAC-384Kdf
3,802,914 UART: [kat] LMS
4,876,120 UART: [kat] --
4,881,265 UART: [cold-reset] ++
4,883,486 UART: [fht] FHT @ 0x50003400
4,894,605 UART: [idev] ++
4,895,241 UART: [idev] CDI.KEYID = 6
4,896,479 UART: [idev] SUBJECT.KEYID = 7
4,897,648 UART: [idev] UDS.KEYID = 0
4,898,569 ready_for_fw is high
4,898,761 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,038,913 UART: [idev] Erasing UDS.KEYID = 0
8,244,029 UART: [idev] Sha1 KeyId Algorithm
8,266,103 UART: [idev] --
8,270,199 UART: [ldev] ++
8,270,782 UART: [ldev] CDI.KEYID = 6
8,272,019 UART: [ldev] SUBJECT.KEYID = 5
8,273,168 UART: [ldev] AUTHORITY.KEYID = 7
8,274,456 UART: [ldev] FE.KEYID = 1
8,319,362 UART: [ldev] Erasing FE.KEYID = 1
11,654,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,469 UART: [ldev] --
14,038,668 UART: [fwproc] Wait for Commands...
14,041,091 UART: [fwproc] Recv command 0x46574c44
14,043,406 UART: [fwproc] Recv'd Img size: 111408 bytes
18,079,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,147,410 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,207,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,524,107 >>> mbox cmd response: success
18,527,703 UART: [afmc] ++
18,528,313 UART: [afmc] CDI.KEYID = 6
18,529,498 UART: [afmc] SUBJECT.KEYID = 7
18,530,654 UART: [afmc] AUTHORITY.KEYID = 5
21,906,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,204,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,206,727 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,222,930 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,239,049 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,254,853 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,277,282 UART: [afmc] --
24,282,502 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,422,843 UART: [cold-reset] --
24,423,712 UART: [state] Locking Datavault
24,424,788 UART: [state] Locking PCR0, PCR1 and PCR31
24,426,586 UART: [state] Locking ICCM
24,427,474 UART: [exit] Launching FMC @ 0x40000000
24,428,816 UART:
24,428,965 UART: Running Caliptra FMC ...
24,430,067 UART:
24,430,220 UART: [fmc] Received command: 0x46574C44
24,431,591 UART:
24,431,739 UART: Running Caliptra ROM ...
24,432,960 UART:
24,433,117 UART: [state] CFI Enabled
24,496,857 UART: [state] LifecycleState = Unprovisioned
24,499,069 UART: [state] DebugLocked = No
24,501,398 UART: [state] WD Timer not started. Device not locked for debugging
24,505,046 UART: [kat] SHA2-256
24,686,989 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,698,478 UART: [kat] ++
24,698,990 UART: [kat] sha1
24,710,955 UART: [kat] SHA2-256
24,713,974 UART: [kat] SHA2-384
24,718,713 UART: [kat] SHA2-512-ACC
24,721,329 UART: [kat] ECC-384
28,007,588 UART: [kat] HMAC-384Kdf
28,035,220 UART: [kat] LMS
29,108,409 UART: [kat] --
29,113,475 UART: [update-reset] ++
33,184,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,188,310 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,561,961 UART: [update-reset] Copying MAN_2 To MAN_1
33,584,809 UART: [update-reset Success] --
33,586,503 >>> mbox cmd response: success
33,586,732 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,588,295 UART: [state] Locking Datavault
33,592,044 UART: [state] Locking PCR0, PCR1 and PCR31
33,593,751 UART: [state] Locking ICCM
33,595,795 UART: [exit] Launching FMC @ 0x40000000
33,604,468 UART:
33,604,701 UART: Running Caliptra FMC ...
33,605,800 UART:
33,605,956 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,607,589 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
4,779,919 ready_for_fw is high
4,780,548 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,295,355 >>> mbox cmd response: success
23,979,882 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,120,383 UART:
24,120,771 UART: Running Caliptra FMC ...
24,121,890 UART:
24,122,042 UART: [fmc] Received command: 0x46574C44
33,145,178 >>> mbox cmd response: success
33,145,624 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,158,877 UART:
33,159,152 UART: Running Caliptra FMC ...
33,160,366 UART:
33,160,526 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,162,109 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,253 writing to cptra_bootfsm_go
193,387 UART:
193,756 UART: Running Caliptra ROM ...
194,834 UART:
604,610 UART: [state] CFI Enabled
618,583 UART: [state] LifecycleState = Unprovisioned
620,952 UART: [state] DebugLocked = No
623,817 UART: [state] WD Timer not started. Device not locked for debugging
629,184 UART: [kat] SHA2-256
811,162 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,667 UART: [kat] ++
823,189 UART: [kat] sha1
835,047 UART: [kat] SHA2-256
838,054 UART: [kat] SHA2-384
844,040 UART: [kat] SHA2-512-ACC
846,618 UART: [kat] ECC-384
4,101,122 UART: [kat] HMAC-384Kdf
4,114,011 UART: [kat] LMS
5,187,148 UART: [kat] --
5,190,943 UART: [cold-reset] ++
5,193,647 UART: [fht] FHT @ 0x50003400
5,203,951 UART: [idev] ++
5,204,701 UART: [idev] CDI.KEYID = 6
5,205,875 UART: [idev] SUBJECT.KEYID = 7
5,207,328 UART: [idev] UDS.KEYID = 0
5,208,507 ready_for_fw is high
5,208,725 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,348,577 UART: [idev] Erasing UDS.KEYID = 0
8,497,100 UART: [idev] Sha1 KeyId Algorithm
8,520,007 UART: [idev] --
8,523,892 UART: [ldev] ++
8,524,458 UART: [ldev] CDI.KEYID = 6
8,525,687 UART: [ldev] SUBJECT.KEYID = 5
8,527,107 UART: [ldev] AUTHORITY.KEYID = 7
8,528,704 UART: [ldev] FE.KEYID = 1
8,540,690 UART: [ldev] Erasing FE.KEYID = 1
11,831,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,870 UART: [ldev] --
14,199,380 UART: [fwproc] Wait for Commands...
14,201,093 UART: [fwproc] Recv command 0x46574c44
14,203,403 UART: [fwproc] Recv'd Img size: 111408 bytes
18,245,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,324,892 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,385,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,700,441 >>> mbox cmd response: success
18,704,149 UART: [afmc] ++
18,704,756 UART: [afmc] CDI.KEYID = 6
18,705,857 UART: [afmc] SUBJECT.KEYID = 7
18,707,065 UART: [afmc] AUTHORITY.KEYID = 5
22,022,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,317,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,319,325 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,335,524 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,351,628 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,367,452 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,390,926 UART: [afmc] --
24,395,679 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,536,426 UART: [cold-reset] --
24,537,294 UART: [state] Locking Datavault
24,538,450 UART: [state] Locking PCR0, PCR1 and PCR31
24,539,981 UART: [state] Locking ICCM
24,540,882 UART: [exit] Launching FMC @ 0x40000000
24,542,300 UART:
24,542,449 UART: Running Caliptra FMC ...
24,543,535 UART:
24,543,700 UART: [fmc] Received command: 0x46574C44
24,545,146 UART:
24,545,290 UART: Running Caliptra ROM ...
24,546,376 UART:
24,546,523 UART: [state] CFI Enabled
24,554,505 UART: [state] LifecycleState = Unprovisioned
24,556,332 UART: [state] DebugLocked = No
24,558,026 UART: [state] WD Timer not started. Device not locked for debugging
24,562,098 UART: [kat] SHA2-256
24,743,925 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,755,498 UART: [kat] ++
24,756,028 UART: [kat] sha1
24,766,747 UART: [kat] SHA2-256
24,769,767 UART: [kat] SHA2-384
24,776,122 UART: [kat] SHA2-512-ACC
24,778,733 UART: [kat] ECC-384
28,033,796 UART: [kat] HMAC-384Kdf
28,046,834 UART: [kat] LMS
29,119,996 UART: [kat] --
29,124,760 UART: [update-reset] ++
33,186,646 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,190,178 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,564,064 UART: [update-reset] Copying MAN_2 To MAN_1
33,586,976 UART: [update-reset Success] --
33,588,583 >>> mbox cmd response: success
33,588,793 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,591,964 UART: [state] Locking Datavault
33,595,103 UART: [state] Locking PCR0, PCR1 and PCR31
33,596,800 UART: [state] Locking ICCM
33,599,326 UART: [exit] Launching FMC @ 0x40000000
33,607,987 UART:
33,608,258 UART: Running Caliptra FMC ...
33,609,378 UART:
33,609,531 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,611,169 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
5,094,185 ready_for_fw is high
5,094,716 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,495,619 >>> mbox cmd response: success
24,120,986 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,261,478 UART:
24,261,866 UART: Running Caliptra FMC ...
24,263,077 UART:
24,263,245 UART: [fmc] Received command: 0x46574C44
33,196,403 >>> mbox cmd response: success
33,196,797 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,208,739 UART:
33,208,986 UART: Running Caliptra FMC ...
33,210,066 UART:
33,210,211 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,211,846 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,175 UART:
192,576 UART: Running Caliptra ROM ...
193,697 UART:
193,843 UART: [state] CFI Enabled
263,034 UART: [state] LifecycleState = Unprovisioned
264,871 UART: [state] DebugLocked = No
267,582 UART: [state] WD Timer not started. Device not locked for debugging
270,850 UART: [kat] SHA2-256
449,960 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,547 UART: [kat] ++
462,005 UART: [kat] sha1
473,308 UART: [kat] SHA2-256
476,318 UART: [kat] SHA2-384
480,968 UART: [kat] SHA2-512-ACC
483,905 UART: [kat] ECC-384
2,936,295 UART: [kat] HMAC-384Kdf
2,960,979 UART: [kat] LMS
3,490,439 UART: [kat] --
3,495,800 UART: [cold-reset] ++
3,497,316 UART: [fht] FHT @ 0x50003400
3,508,293 UART: [idev] ++
3,508,857 UART: [idev] CDI.KEYID = 6
3,509,784 UART: [idev] SUBJECT.KEYID = 7
3,510,959 UART: [idev] UDS.KEYID = 0
3,511,881 ready_for_fw is high
3,512,090 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,653,316 UART: [idev] Erasing UDS.KEYID = 0
6,017,961 UART: [idev] Sha1 KeyId Algorithm
6,040,704 UART: [idev] --
6,044,427 UART: [ldev] ++
6,044,998 UART: [ldev] CDI.KEYID = 6
6,045,886 UART: [ldev] SUBJECT.KEYID = 5
6,047,103 UART: [ldev] AUTHORITY.KEYID = 7
6,048,343 UART: [ldev] FE.KEYID = 1
6,089,228 UART: [ldev] Erasing FE.KEYID = 1
8,594,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,047 UART: [ldev] --
10,401,402 UART: [fwproc] Wait for Commands...
10,404,362 UART: [fwproc] Recv command 0x46574c44
10,406,454 UART: [fwproc] Recv'd Img size: 111752 bytes
13,779,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,852,030 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,912,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,229,817 >>> mbox cmd response: success
14,233,561 UART: [afmc] ++
14,234,184 UART: [afmc] CDI.KEYID = 6
14,235,117 UART: [afmc] SUBJECT.KEYID = 7
14,236,230 UART: [afmc] AUTHORITY.KEYID = 5
16,777,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,499,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,501,556 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,517,607 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,533,652 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,549,357 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,573,323 UART: [afmc] --
18,578,806 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,719,500 UART: [cold-reset] --
18,720,360 UART: [state] Locking Datavault
18,721,525 UART: [state] Locking PCR0, PCR1 and PCR31
18,723,065 UART: [state] Locking ICCM
18,723,974 UART: [exit] Launching FMC @ 0x40000000
18,725,397 UART:
18,725,578 UART: Running Caliptra FMC ...
18,726,684 UART:
18,726,842 UART: [fmc] Received command: 0x46574C44
18,728,307 UART:
18,728,461 UART: Running Caliptra ROM ...
18,729,776 UART:
18,729,945 UART: [state] CFI Enabled
18,788,121 UART: [state] LifecycleState = Unprovisioned
18,790,012 UART: [state] DebugLocked = No
18,792,902 UART: [state] WD Timer not started. Device not locked for debugging
18,797,506 UART: [kat] SHA2-256
18,976,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,988,215 UART: [kat] ++
18,988,765 UART: [kat] sha1
18,999,764 UART: [kat] SHA2-256
19,002,779 UART: [kat] SHA2-384
19,009,332 UART: [kat] SHA2-512-ACC
19,012,283 UART: [kat] ECC-384
21,472,516 UART: [kat] HMAC-384Kdf
21,497,382 UART: [kat] LMS
22,026,817 UART: [kat] --
22,031,115 UART: [update-reset] ++
25,426,331 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,430,461 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,805,802 UART: [update-reset] Copying MAN_2 To MAN_1
25,828,098 UART: [update-reset Success] --
25,829,405 >>> mbox cmd response: success
25,829,671 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,831,084 UART: [state] Locking Datavault
25,833,921 UART: [state] Locking PCR0, PCR1 and PCR31
25,835,628 UART: [state] Locking ICCM
25,838,216 UART: [exit] Launching FMC @ 0x40000000
25,846,583 UART:
25,846,823 UART: Running Caliptra FMC ...
25,847,926 UART:
25,848,078 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,849,943 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,362,286 ready_for_fw is high
3,362,680 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,025,335 >>> mbox cmd response: success
18,289,762 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,430,529 UART:
18,430,900 UART: Running Caliptra FMC ...
18,432,122 UART:
18,432,300 UART: [fmc] Received command: 0x46574C44
25,386,788 >>> mbox cmd response: success
25,387,191 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,398,930 UART:
25,399,228 UART: Running Caliptra FMC ...
25,400,416 UART:
25,400,583 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,402,228 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,703 writing to cptra_bootfsm_go
196,102 UART:
196,482 UART: Running Caliptra ROM ...
197,618 UART:
607,374 UART: [state] CFI Enabled
620,202 UART: [state] LifecycleState = Unprovisioned
622,086 UART: [state] DebugLocked = No
623,906 UART: [state] WD Timer not started. Device not locked for debugging
628,099 UART: [kat] SHA2-256
807,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,778 UART: [kat] ++
819,313 UART: [kat] sha1
831,543 UART: [kat] SHA2-256
834,549 UART: [kat] SHA2-384
841,465 UART: [kat] SHA2-512-ACC
844,398 UART: [kat] ECC-384
3,284,964 UART: [kat] HMAC-384Kdf
3,298,394 UART: [kat] LMS
3,827,880 UART: [kat] --
3,833,080 UART: [cold-reset] ++
3,833,945 UART: [fht] FHT @ 0x50003400
3,843,609 UART: [idev] ++
3,844,211 UART: [idev] CDI.KEYID = 6
3,845,128 UART: [idev] SUBJECT.KEYID = 7
3,846,298 UART: [idev] UDS.KEYID = 0
3,847,219 ready_for_fw is high
3,847,409 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,987,637 UART: [idev] Erasing UDS.KEYID = 0
6,321,879 UART: [idev] Sha1 KeyId Algorithm
6,345,422 UART: [idev] --
6,349,948 UART: [ldev] ++
6,350,514 UART: [ldev] CDI.KEYID = 6
6,351,422 UART: [ldev] SUBJECT.KEYID = 5
6,352,579 UART: [ldev] AUTHORITY.KEYID = 7
6,353,860 UART: [ldev] FE.KEYID = 1
6,365,529 UART: [ldev] Erasing FE.KEYID = 1
8,839,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,852 UART: [ldev] --
10,632,782 UART: [fwproc] Wait for Commands...
10,635,788 UART: [fwproc] Recv command 0x46574c44
10,637,871 UART: [fwproc] Recv'd Img size: 111752 bytes
14,007,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,084,842 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,145,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,461,682 >>> mbox cmd response: success
14,465,215 UART: [afmc] ++
14,465,824 UART: [afmc] CDI.KEYID = 6
14,466,739 UART: [afmc] SUBJECT.KEYID = 7
14,467,900 UART: [afmc] AUTHORITY.KEYID = 5
16,967,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,684,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,685,996 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,702,054 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,718,100 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,733,811 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,756,338 UART: [afmc] --
18,760,724 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,901,578 UART: [cold-reset] --
18,902,440 UART: [state] Locking Datavault
18,903,588 UART: [state] Locking PCR0, PCR1 and PCR31
18,905,114 UART: [state] Locking ICCM
18,906,017 UART: [exit] Launching FMC @ 0x40000000
18,907,443 UART:
18,907,602 UART: Running Caliptra FMC ...
18,908,697 UART:
18,908,868 UART: [fmc] Received command: 0x46574C44
18,910,269 UART:
18,910,414 UART: Running Caliptra ROM ...
18,911,510 UART:
18,911,661 UART: [state] CFI Enabled
18,919,789 UART: [state] LifecycleState = Unprovisioned
18,921,602 UART: [state] DebugLocked = No
18,923,542 UART: [state] WD Timer not started. Device not locked for debugging
18,927,158 UART: [kat] SHA2-256
19,106,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,117,900 UART: [kat] ++
19,118,354 UART: [kat] sha1
19,130,321 UART: [kat] SHA2-256
19,133,373 UART: [kat] SHA2-384
19,139,521 UART: [kat] SHA2-512-ACC
19,142,507 UART: [kat] ECC-384
21,581,253 UART: [kat] HMAC-384Kdf
21,592,943 UART: [kat] LMS
22,122,445 UART: [kat] --
22,126,484 UART: [update-reset] ++
25,526,477 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,529,414 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,904,101 UART: [update-reset] Copying MAN_2 To MAN_1
25,926,428 UART: [update-reset Success] --
25,927,744 >>> mbox cmd response: success
25,927,983 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,931,389 UART: [state] Locking Datavault
25,934,267 UART: [state] Locking PCR0, PCR1 and PCR31
25,935,910 UART: [state] Locking ICCM
25,937,467 UART: [exit] Launching FMC @ 0x40000000
25,945,918 UART:
25,946,148 UART: Running Caliptra FMC ...
25,947,261 UART:
25,947,412 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,949,041 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,694,533 ready_for_fw is high
3,694,929 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,222,500 >>> mbox cmd response: success
18,462,631 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,603,565 UART:
18,603,952 UART: Running Caliptra FMC ...
18,605,072 UART:
18,605,229 UART: [fmc] Received command: 0x46574C44
25,476,838 >>> mbox cmd response: success
25,477,229 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,489,827 UART:
25,490,090 UART: Running Caliptra FMC ...
25,491,265 UART:
25,491,423 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,493,083 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,271 UART:
192,628 UART: Running Caliptra ROM ...
193,817 UART:
193,971 UART: [state] CFI Enabled
265,485 UART: [state] LifecycleState = Unprovisioned
267,353 UART: [state] DebugLocked = No
269,533 UART: [state] WD Timer not started. Device not locked for debugging
273,147 UART: [kat] SHA2-256
452,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,879 UART: [kat] ++
464,411 UART: [kat] sha1
474,647 UART: [kat] SHA2-256
477,670 UART: [kat] SHA2-384
483,853 UART: [kat] SHA2-512-ACC
486,801 UART: [kat] ECC-384
2,947,013 UART: [kat] HMAC-384Kdf
2,970,915 UART: [kat] LMS
3,500,415 UART: [kat] --
3,503,373 UART: [cold-reset] ++
3,505,242 UART: [fht] FHT @ 0x50003400
3,517,456 UART: [idev] ++
3,518,088 UART: [idev] CDI.KEYID = 6
3,518,980 UART: [idev] SUBJECT.KEYID = 7
3,520,029 UART: [idev] UDS.KEYID = 0
3,521,193 ready_for_fw is high
3,521,385 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,661,792 UART: [idev] Erasing UDS.KEYID = 0
6,026,881 UART: [idev] Sha1 KeyId Algorithm
6,050,383 UART: [idev] --
6,054,972 UART: [ldev] ++
6,055,544 UART: [ldev] CDI.KEYID = 6
6,056,434 UART: [ldev] SUBJECT.KEYID = 5
6,057,648 UART: [ldev] AUTHORITY.KEYID = 7
6,058,887 UART: [ldev] FE.KEYID = 1
6,099,265 UART: [ldev] Erasing FE.KEYID = 1
8,605,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,793 UART: [ldev] --
10,413,911 UART: [fwproc] Wait for Commands...
10,416,658 UART: [fwproc] Recv command 0x46574c44
10,418,699 UART: [fwproc] Recv'd Img size: 111752 bytes
13,788,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,865,721 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,926,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,244,169 >>> mbox cmd response: success
14,247,734 UART: [afmc] ++
14,248,362 UART: [afmc] CDI.KEYID = 6
14,249,277 UART: [afmc] SUBJECT.KEYID = 7
14,250,438 UART: [afmc] AUTHORITY.KEYID = 5
16,783,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,513,623 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,529,695 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,545,730 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,561,480 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,585,163 UART: [afmc] --
18,589,514 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,730,478 UART: [cold-reset] --
18,731,357 UART: [state] Locking Datavault
18,732,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,053 UART: [state] Locking ICCM
18,734,962 UART: [exit] Launching FMC @ 0x40000000
18,736,382 UART:
18,736,543 UART: Running Caliptra FMC ...
18,737,641 UART:
18,737,796 UART: [fmc] Received command: 0x46574C44
18,739,270 UART:
18,739,428 UART: Running Caliptra ROM ...
18,740,527 UART:
18,740,681 UART: [state] CFI Enabled
18,805,010 UART: [state] LifecycleState = Unprovisioned
18,806,894 UART: [state] DebugLocked = No
18,808,821 UART: [state] WD Timer not started. Device not locked for debugging
18,811,858 UART: [kat] SHA2-256
18,990,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,002,550 UART: [kat] ++
19,003,088 UART: [kat] sha1
19,013,124 UART: [kat] SHA2-256
19,016,139 UART: [kat] SHA2-384
19,021,157 UART: [kat] SHA2-512-ACC
19,024,103 UART: [kat] ECC-384
21,468,229 UART: [kat] HMAC-384Kdf
21,491,818 UART: [kat] LMS
22,021,331 UART: [kat] --
22,025,866 UART: [update-reset] ++
25,421,250 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,425,390 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,800,026 UART: [update-reset] Copying MAN_2 To MAN_1
25,822,348 UART: [update-reset Success] --
25,823,687 >>> mbox cmd response: success
25,823,912 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,827,845 UART: [state] Locking Datavault
25,831,691 UART: [state] Locking PCR0, PCR1 and PCR31
25,833,392 UART: [state] Locking ICCM
25,834,378 UART: [exit] Launching FMC @ 0x40000000
25,842,778 UART:
25,843,059 UART: Running Caliptra FMC ...
25,844,093 UART:
25,844,257 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,845,897 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,383,221 ready_for_fw is high
3,383,844 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,025,815 >>> mbox cmd response: success
18,306,461 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,447,787 UART:
18,448,177 UART: Running Caliptra FMC ...
18,449,388 UART:
18,449,585 UART: [fmc] Received command: 0x46574C44
25,401,181 >>> mbox cmd response: success
25,401,570 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,416,706 UART:
25,416,967 UART: Running Caliptra FMC ...
25,418,050 UART:
25,418,202 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,419,846 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,323 UART:
192,689 UART: Running Caliptra ROM ...
193,872 UART:
603,456 UART: [state] CFI Enabled
617,621 UART: [state] LifecycleState = Unprovisioned
619,505 UART: [state] DebugLocked = No
622,240 UART: [state] WD Timer not started. Device not locked for debugging
626,515 UART: [kat] SHA2-256
805,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,192 UART: [kat] ++
817,720 UART: [kat] sha1
829,323 UART: [kat] SHA2-256
832,367 UART: [kat] SHA2-384
838,359 UART: [kat] SHA2-512-ACC
841,296 UART: [kat] ECC-384
3,286,020 UART: [kat] HMAC-384Kdf
3,298,189 UART: [kat] LMS
3,827,722 UART: [kat] --
3,832,434 UART: [cold-reset] ++
3,833,293 UART: [fht] FHT @ 0x50003400
3,844,977 UART: [idev] ++
3,845,544 UART: [idev] CDI.KEYID = 6
3,846,526 UART: [idev] SUBJECT.KEYID = 7
3,847,661 UART: [idev] UDS.KEYID = 0
3,848,651 ready_for_fw is high
3,848,859 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,989,242 UART: [idev] Erasing UDS.KEYID = 0
6,318,409 UART: [idev] Sha1 KeyId Algorithm
6,340,880 UART: [idev] --
6,346,545 UART: [ldev] ++
6,347,112 UART: [ldev] CDI.KEYID = 6
6,348,198 UART: [ldev] SUBJECT.KEYID = 5
6,349,318 UART: [ldev] AUTHORITY.KEYID = 7
6,350,497 UART: [ldev] FE.KEYID = 1
6,361,469 UART: [ldev] Erasing FE.KEYID = 1
8,836,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,079 UART: [ldev] --
10,624,214 UART: [fwproc] Wait for Commands...
10,626,141 UART: [fwproc] Recv command 0x46574c44
10,628,236 UART: [fwproc] Recv'd Img size: 111752 bytes
14,002,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,066,102 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,126,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,443,393 >>> mbox cmd response: success
14,447,563 UART: [afmc] ++
14,448,175 UART: [afmc] CDI.KEYID = 6
14,449,064 UART: [afmc] SUBJECT.KEYID = 7
14,450,167 UART: [afmc] AUTHORITY.KEYID = 5
16,949,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,670,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,672,695 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,688,753 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,704,815 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,720,500 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,743,065 UART: [afmc] --
18,748,846 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,889,548 UART: [cold-reset] --
18,890,412 UART: [state] Locking Datavault
18,891,555 UART: [state] Locking PCR0, PCR1 and PCR31
18,893,085 UART: [state] Locking ICCM
18,893,993 UART: [exit] Launching FMC @ 0x40000000
18,895,415 UART:
18,895,570 UART: Running Caliptra FMC ...
18,896,666 UART:
18,896,817 UART: [fmc] Received command: 0x46574C44
18,898,268 UART:
18,898,417 UART: Running Caliptra ROM ...
18,899,532 UART:
18,899,684 UART: [state] CFI Enabled
18,905,893 UART: [state] LifecycleState = Unprovisioned
18,907,882 UART: [state] DebugLocked = No
18,909,444 UART: [state] WD Timer not started. Device not locked for debugging
18,912,709 UART: [kat] SHA2-256
19,091,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,103,485 UART: [kat] ++
19,103,944 UART: [kat] sha1
19,115,096 UART: [kat] SHA2-256
19,118,159 UART: [kat] SHA2-384
19,125,161 UART: [kat] SHA2-512-ACC
19,128,098 UART: [kat] ECC-384
21,568,474 UART: [kat] HMAC-384Kdf
21,581,446 UART: [kat] LMS
22,110,991 UART: [kat] --
22,113,482 UART: [update-reset] ++
25,511,235 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,514,678 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,889,980 UART: [update-reset] Copying MAN_2 To MAN_1
25,912,300 UART: [update-reset Success] --
25,913,583 >>> mbox cmd response: success
25,913,805 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,917,038 UART: [state] Locking Datavault
25,919,912 UART: [state] Locking PCR0, PCR1 and PCR31
25,921,610 UART: [state] Locking ICCM
25,922,870 UART: [exit] Launching FMC @ 0x40000000
25,931,262 UART:
25,931,486 UART: Running Caliptra FMC ...
25,932,509 UART:
25,932,658 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,934,298 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,700,150 ready_for_fw is high
3,700,720 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,238,197 >>> mbox cmd response: success
18,475,412 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,616,382 UART:
18,616,769 UART: Running Caliptra FMC ...
18,617,978 UART:
18,618,150 UART: [fmc] Received command: 0x46574C44
25,503,318 >>> mbox cmd response: success
25,503,715 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,515,882 UART:
25,516,158 UART: Running Caliptra FMC ...
25,517,327 UART:
25,517,493 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,519,127 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,987 UART: [kat] ++
895,139 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,178 UART: [kat] SHA2-512-ACC
906,079 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
920,924 UART: [kat] LMS
1,169,236 UART: [kat] --
1,170,435 UART: [cold-reset] ++
1,170,855 UART: [fht] FHT @ 0x50003400
1,173,337 UART: [idev] ++
1,173,505 UART: [idev] CDI.KEYID = 6
1,173,866 UART: [idev] SUBJECT.KEYID = 7
1,174,291 UART: [idev] UDS.KEYID = 0
1,174,637 ready_for_fw is high
1,174,637 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,257 UART: [idev] Erasing UDS.KEYID = 0
1,199,063 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,644 UART: [ldev] --
1,280,976 UART: [fwproc] Wait for Commands...
1,281,761 UART: [fwproc] Recv command 0x46574c44
1,282,494 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,064 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,740,399 >>> mbox cmd response: success
2,741,592 UART: [afmc] ++
2,741,760 UART: [afmc] CDI.KEYID = 6
2,742,123 UART: [afmc] SUBJECT.KEYID = 7
2,742,549 UART: [afmc] AUTHORITY.KEYID = 5
2,777,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,703 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,399 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,298 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,991 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,781 UART: [afmc] --
2,820,757 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,820,779 UART: [cold-reset] --
2,821,481 UART: [state] Locking Datavault
2,822,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,198 UART: [state] Locking ICCM
2,823,834 UART: [exit] Launching FMC @ 0x40000000
2,829,131 UART:
2,829,147 UART: Running Caliptra FMC ...
2,829,555 UART:
2,829,785 UART: [fmc] Received command: 0x46574C44
2,830,611 UART:
2,830,627 UART: Running Caliptra ROM ...
2,831,035 UART:
2,831,090 UART: [state] CFI Enabled
2,833,300 UART: [state] LifecycleState = Unprovisioned
2,833,955 UART: [state] DebugLocked = No
2,834,515 UART: [state] WD Timer not started. Device not locked for debugging
2,835,743 UART: [kat] SHA2-256
3,639,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,422 UART: [kat] ++
3,643,574 UART: [kat] sha1
3,647,732 UART: [kat] SHA2-256
3,649,672 UART: [kat] SHA2-384
3,652,597 UART: [kat] SHA2-512-ACC
3,654,497 UART: [kat] ECC-384
3,664,088 UART: [kat] HMAC-384Kdf
3,668,584 UART: [kat] LMS
3,916,896 UART: [kat] --
3,917,554 UART: [update-reset] ++
5,199,865 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,201,042 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,349,011 UART: [update-reset] Copying MAN_2 To MAN_1
5,357,025 UART: [update-reset Success] --
5,357,434 >>> mbox cmd response: success
5,357,434 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,357,924 UART: [state] Locking Datavault
5,358,750 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,354 UART: [state] Locking ICCM
5,359,994 UART: [exit] Launching FMC @ 0x40000000
5,365,291 UART:
5,365,307 UART: Running Caliptra FMC ...
5,365,715 UART:
5,365,937 UART: [fmc] Received command: 0x1000000C
5,366,672 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,142 ready_for_fw is high
1,056,142 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,721 >>> mbox cmd response: success
2,644,148 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,650,547 UART:
2,650,563 UART: Running Caliptra FMC ...
2,650,971 UART:
2,651,201 UART: [fmc] Received command: 0x46574C44
5,059,907 >>> mbox cmd response: success
5,059,907 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,065,535 UART:
5,065,551 UART: Running Caliptra FMC ...
5,065,959 UART:
5,066,181 UART: [fmc] Received command: 0x1000000C
5,066,916 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,707 UART: [kat] HMAC-384Kdf
921,479 UART: [kat] LMS
1,169,791 UART: [kat] --
1,170,434 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,554 UART: [idev] ++
1,173,722 UART: [idev] CDI.KEYID = 6
1,174,083 UART: [idev] SUBJECT.KEYID = 7
1,174,508 UART: [idev] UDS.KEYID = 0
1,174,854 ready_for_fw is high
1,174,854 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,856 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,515 UART: [ldev] ++
1,209,683 UART: [ldev] CDI.KEYID = 6
1,210,047 UART: [ldev] SUBJECT.KEYID = 5
1,210,474 UART: [ldev] AUTHORITY.KEYID = 7
1,210,937 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,219 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,611 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,381 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,066 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,702 >>> mbox cmd response: success
2,740,891 UART: [afmc] ++
2,741,059 UART: [afmc] CDI.KEYID = 6
2,741,422 UART: [afmc] SUBJECT.KEYID = 7
2,741,848 UART: [afmc] AUTHORITY.KEYID = 5
2,777,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,698 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,394 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,293 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,986 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,800 UART: [afmc] --
2,820,698 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,820,720 UART: [cold-reset] --
2,821,632 UART: [state] Locking Datavault
2,822,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,561 UART: [state] Locking ICCM
2,824,089 UART: [exit] Launching FMC @ 0x40000000
2,829,386 UART:
2,829,402 UART: Running Caliptra FMC ...
2,829,810 UART:
2,830,040 UART: [fmc] Received command: 0x46574C44
2,830,866 UART:
2,830,882 UART: Running Caliptra ROM ...
2,831,290 UART:
2,831,432 UART: [state] CFI Enabled
2,834,354 UART: [state] LifecycleState = Unprovisioned
2,835,009 UART: [state] DebugLocked = No
2,835,705 UART: [state] WD Timer not started. Device not locked for debugging
2,837,027 UART: [kat] SHA2-256
3,640,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,706 UART: [kat] ++
3,644,858 UART: [kat] sha1
3,649,104 UART: [kat] SHA2-256
3,651,044 UART: [kat] SHA2-384
3,653,797 UART: [kat] SHA2-512-ACC
3,655,697 UART: [kat] ECC-384
3,665,298 UART: [kat] HMAC-384Kdf
3,670,044 UART: [kat] LMS
3,918,356 UART: [kat] --
3,919,172 UART: [update-reset] ++
5,200,785 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,201,856 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,349,847 UART: [update-reset] Copying MAN_2 To MAN_1
5,357,861 UART: [update-reset Success] --
5,358,270 >>> mbox cmd response: success
5,358,270 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,358,948 UART: [state] Locking Datavault
5,359,702 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,306 UART: [state] Locking ICCM
5,360,936 UART: [exit] Launching FMC @ 0x40000000
5,366,233 UART:
5,366,249 UART: Running Caliptra FMC ...
5,366,657 UART:
5,366,879 UART: [fmc] Received command: 0x1000000C
5,367,614 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,203 ready_for_fw is high
1,056,203 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,558 >>> mbox cmd response: success
2,644,047 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,650,142 UART:
2,650,158 UART: Running Caliptra FMC ...
2,650,566 UART:
2,650,796 UART: [fmc] Received command: 0x46574C44
5,060,721 >>> mbox cmd response: success
5,060,721 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,066,477 UART:
5,066,493 UART: Running Caliptra FMC ...
5,066,901 UART:
5,067,123 UART: [fmc] Received command: 0x1000000C
5,067,858 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,407 UART: [kat] SHA2-256
901,347 UART: [kat] SHA2-384
904,096 UART: [kat] SHA2-512-ACC
905,997 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,565 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,173,781 ready_for_fw is high
1,173,781 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,303 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,580 UART: [ldev] Erasing FE.KEYID = 1
1,240,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,236 UART: [fwproc] Wait for Commands...
1,280,953 UART: [fwproc] Recv command 0x46574c44
1,281,686 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,144 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,283 >>> mbox cmd response: success
2,738,452 UART: [afmc] ++
2,738,620 UART: [afmc] CDI.KEYID = 6
2,738,983 UART: [afmc] SUBJECT.KEYID = 7
2,739,409 UART: [afmc] AUTHORITY.KEYID = 5
2,774,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,659 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,797,355 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,254 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,808,947 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,816,687 UART: [afmc] --
2,817,601 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,817,623 UART: [cold-reset] --
2,818,285 UART: [state] Locking Datavault
2,819,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,048 UART: [state] Locking ICCM
2,820,598 UART: [exit] Launching FMC @ 0x40000000
2,825,895 UART:
2,825,911 UART: Running Caliptra FMC ...
2,826,319 UART:
2,826,549 UART: [fmc] Received command: 0x46574C44
2,827,375 UART:
2,827,391 UART: Running Caliptra ROM ...
2,827,799 UART:
2,827,854 UART: [state] CFI Enabled
2,830,698 UART: [state] LifecycleState = Unprovisioned
2,831,353 UART: [state] DebugLocked = No
2,831,995 UART: [state] WD Timer not started. Device not locked for debugging
2,833,353 UART: [kat] SHA2-256
3,636,903 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,641,032 UART: [kat] ++
3,641,184 UART: [kat] sha1
3,645,392 UART: [kat] SHA2-256
3,647,332 UART: [kat] SHA2-384
3,650,253 UART: [kat] SHA2-512-ACC
3,652,153 UART: [kat] ECC-384
3,661,654 UART: [kat] HMAC-384Kdf
3,666,010 UART: [kat] LMS
3,914,322 UART: [kat] --
3,915,052 UART: [update-reset] ++
5,198,533 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,676 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,347,599 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,613 UART: [update-reset Success] --
5,356,022 >>> mbox cmd response: success
5,356,022 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,356,572 UART: [state] Locking Datavault
5,357,274 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,878 UART: [state] Locking ICCM
5,358,390 UART: [exit] Launching FMC @ 0x40000000
5,363,687 UART:
5,363,703 UART: Running Caliptra FMC ...
5,364,111 UART:
5,364,333 UART: [fmc] Received command: 0x1000000C
5,365,068 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,464 ready_for_fw is high
1,055,464 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,937 >>> mbox cmd response: success
2,645,196 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,651,453 UART:
2,651,469 UART: Running Caliptra FMC ...
2,651,877 UART:
2,652,107 UART: [fmc] Received command: 0x46574C44
5,059,841 >>> mbox cmd response: success
5,059,841 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,065,601 UART:
5,065,617 UART: Running Caliptra FMC ...
5,066,025 UART:
5,066,247 UART: [fmc] Received command: 0x1000000C
5,066,982 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,289 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,928 UART: [fht] FHT @ 0x50003400
1,173,462 UART: [idev] ++
1,173,630 UART: [idev] CDI.KEYID = 6
1,173,991 UART: [idev] SUBJECT.KEYID = 7
1,174,416 UART: [idev] UDS.KEYID = 0
1,174,762 ready_for_fw is high
1,174,762 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,594 UART: [idev] --
1,209,473 UART: [ldev] ++
1,209,641 UART: [ldev] CDI.KEYID = 6
1,210,005 UART: [ldev] SUBJECT.KEYID = 5
1,210,432 UART: [ldev] AUTHORITY.KEYID = 7
1,210,895 UART: [ldev] FE.KEYID = 1
1,216,077 UART: [ldev] Erasing FE.KEYID = 1
1,242,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,387 UART: [ldev] --
1,281,691 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,937 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,208 >>> mbox cmd response: success
2,740,319 UART: [afmc] ++
2,740,487 UART: [afmc] CDI.KEYID = 6
2,740,850 UART: [afmc] SUBJECT.KEYID = 7
2,741,276 UART: [afmc] AUTHORITY.KEYID = 5
2,776,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,846 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,542 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,441 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,134 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,022 UART: [afmc] --
2,819,982 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,820,004 UART: [cold-reset] --
2,820,736 UART: [state] Locking Datavault
2,822,003 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,607 UART: [state] Locking ICCM
2,823,265 UART: [exit] Launching FMC @ 0x40000000
2,828,562 UART:
2,828,578 UART: Running Caliptra FMC ...
2,828,986 UART:
2,829,216 UART: [fmc] Received command: 0x46574C44
2,830,042 UART:
2,830,058 UART: Running Caliptra ROM ...
2,830,466 UART:
2,830,608 UART: [state] CFI Enabled
2,833,572 UART: [state] LifecycleState = Unprovisioned
2,834,227 UART: [state] DebugLocked = No
2,834,823 UART: [state] WD Timer not started. Device not locked for debugging
2,836,141 UART: [kat] SHA2-256
3,639,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,820 UART: [kat] ++
3,643,972 UART: [kat] sha1
3,648,018 UART: [kat] SHA2-256
3,649,958 UART: [kat] SHA2-384
3,652,593 UART: [kat] SHA2-512-ACC
3,654,493 UART: [kat] ECC-384
3,664,210 UART: [kat] HMAC-384Kdf
3,668,686 UART: [kat] LMS
3,916,998 UART: [kat] --
3,917,792 UART: [update-reset] ++
5,199,165 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,200,286 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,348,179 UART: [update-reset] Copying MAN_2 To MAN_1
5,356,193 UART: [update-reset Success] --
5,356,602 >>> mbox cmd response: success
5,356,602 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,357,240 UART: [state] Locking Datavault
5,358,020 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,624 UART: [state] Locking ICCM
5,359,204 UART: [exit] Launching FMC @ 0x40000000
5,364,501 UART:
5,364,517 UART: Running Caliptra FMC ...
5,364,925 UART:
5,365,147 UART: [fmc] Received command: 0x1000000C
5,365,882 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,729 ready_for_fw is high
1,056,729 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,452 >>> mbox cmd response: success
2,645,719 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,652,054 UART:
2,652,070 UART: Running Caliptra FMC ...
2,652,478 UART:
2,652,708 UART: [fmc] Received command: 0x46574C44
5,061,311 >>> mbox cmd response: success
5,061,311 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,066,921 UART:
5,066,937 UART: Running Caliptra FMC ...
5,067,345 UART:
5,067,567 UART: [fmc] Received command: 0x1000000C
5,068,302 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,182 UART: [kat] SHA2-512-ACC
906,083 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,671 UART: [cold-reset] ++
1,170,029 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,174,023 ready_for_fw is high
1,174,023 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,198,643 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,154 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,958 UART: [ldev] --
1,280,342 UART: [fwproc] Wait for Commands...
1,281,129 UART: [fwproc] Recv command 0x46574c44
1,281,862 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,738 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,035 >>> mbox cmd response: success
2,740,088 UART: [afmc] ++
2,740,256 UART: [afmc] CDI.KEYID = 6
2,740,619 UART: [afmc] SUBJECT.KEYID = 7
2,741,045 UART: [afmc] AUTHORITY.KEYID = 5
2,776,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,493 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,189 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,088 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,781 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,581 UART: [afmc] --
2,819,439 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,819,461 UART: [cold-reset] --
2,820,065 UART: [state] Locking Datavault
2,821,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,846 UART: [state] Locking ICCM
2,822,414 UART: [exit] Launching FMC @ 0x40000000
2,827,711 UART:
2,827,727 UART: Running Caliptra FMC ...
2,828,135 UART:
2,828,365 UART: [fmc] Received command: 0x46574C44
2,829,191 UART:
2,829,207 UART: Running Caliptra ROM ...
2,829,615 UART:
2,829,670 UART: [state] CFI Enabled
2,832,112 UART: [state] LifecycleState = Unprovisioned
2,832,767 UART: [state] DebugLocked = No
2,833,277 UART: [state] WD Timer not started. Device not locked for debugging
2,834,447 UART: [kat] SHA2-256
3,637,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,126 UART: [kat] ++
3,642,278 UART: [kat] sha1
3,646,614 UART: [kat] SHA2-256
3,648,554 UART: [kat] SHA2-384
3,651,273 UART: [kat] SHA2-512-ACC
3,653,173 UART: [kat] ECC-384
3,662,970 UART: [kat] HMAC-384Kdf
3,667,690 UART: [kat] LMS
3,916,002 UART: [kat] --
3,916,676 UART: [update-reset] ++
5,199,219 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,200,346 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,348,241 UART: [update-reset] Copying MAN_2 To MAN_1
5,356,255 UART: [update-reset Success] --
5,356,664 >>> mbox cmd response: success
5,356,664 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,357,076 UART: [state] Locking Datavault
5,357,870 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,474 UART: [state] Locking ICCM
5,359,042 UART: [exit] Launching FMC @ 0x40000000
5,364,339 UART:
5,364,355 UART: Running Caliptra FMC ...
5,364,763 UART:
5,364,985 UART: [fmc] Received command: 0x1000000C
5,365,720 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,496 ready_for_fw is high
1,056,496 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,227 >>> mbox cmd response: success
2,644,740 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,650,935 UART:
2,650,951 UART: Running Caliptra FMC ...
2,651,359 UART:
2,651,589 UART: [fmc] Received command: 0x46574C44
5,060,761 >>> mbox cmd response: success
5,060,761 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,066,453 UART:
5,066,469 UART: Running Caliptra FMC ...
5,066,877 UART:
5,067,099 UART: [fmc] Received command: 0x1000000C
5,067,834 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,174,356 ready_for_fw is high
1,174,356 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,898 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,772 UART: [idev] --
1,208,597 UART: [ldev] ++
1,208,765 UART: [ldev] CDI.KEYID = 6
1,209,129 UART: [ldev] SUBJECT.KEYID = 5
1,209,556 UART: [ldev] AUTHORITY.KEYID = 7
1,210,019 UART: [ldev] FE.KEYID = 1
1,215,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,282,088 UART: [fwproc] Recv command 0x46574c44
1,282,821 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,177 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,422 >>> mbox cmd response: success
2,740,465 UART: [afmc] ++
2,740,633 UART: [afmc] CDI.KEYID = 6
2,740,996 UART: [afmc] SUBJECT.KEYID = 7
2,741,422 UART: [afmc] AUTHORITY.KEYID = 5
2,776,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,360 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,056 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,955 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,811,648 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,546 UART: [afmc] --
2,820,474 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,820,496 UART: [cold-reset] --
2,821,396 UART: [state] Locking Datavault
2,822,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,035 UART: [state] Locking ICCM
2,823,649 UART: [exit] Launching FMC @ 0x40000000
2,828,946 UART:
2,828,962 UART: Running Caliptra FMC ...
2,829,370 UART:
2,829,600 UART: [fmc] Received command: 0x46574C44
2,830,426 UART:
2,830,442 UART: Running Caliptra ROM ...
2,830,850 UART:
2,830,992 UART: [state] CFI Enabled
2,834,028 UART: [state] LifecycleState = Unprovisioned
2,834,683 UART: [state] DebugLocked = No
2,835,347 UART: [state] WD Timer not started. Device not locked for debugging
2,836,671 UART: [kat] SHA2-256
3,640,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,350 UART: [kat] ++
3,644,502 UART: [kat] sha1
3,648,926 UART: [kat] SHA2-256
3,650,866 UART: [kat] SHA2-384
3,653,497 UART: [kat] SHA2-512-ACC
3,655,397 UART: [kat] ECC-384
3,665,188 UART: [kat] HMAC-384Kdf
3,669,772 UART: [kat] LMS
3,918,084 UART: [kat] --
3,918,588 UART: [update-reset] ++
5,200,727 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,201,876 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,349,873 UART: [update-reset] Copying MAN_2 To MAN_1
5,357,887 UART: [update-reset Success] --
5,358,296 >>> mbox cmd response: success
5,358,296 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,359,070 UART: [state] Locking Datavault
5,359,620 UART: [state] Locking PCR0, PCR1 and PCR31
5,360,224 UART: [state] Locking ICCM
5,360,760 UART: [exit] Launching FMC @ 0x40000000
5,366,057 UART:
5,366,073 UART: Running Caliptra FMC ...
5,366,481 UART:
5,366,703 UART: [fmc] Received command: 0x1000000C
5,367,438 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,909 ready_for_fw is high
1,056,909 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,072 >>> mbox cmd response: success
2,645,035 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,651,428 UART:
2,651,444 UART: Running Caliptra FMC ...
2,651,852 UART:
2,652,082 UART: [fmc] Received command: 0x46574C44
5,062,001 >>> mbox cmd response: success
5,062,001 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,067,583 UART:
5,067,599 UART: Running Caliptra FMC ...
5,068,007 UART:
5,068,229 UART: [fmc] Received command: 0x1000000C
5,068,964 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,041 UART:
192,410 UART: Running Caliptra ROM ...
193,486 UART:
193,629 UART: [state] CFI Enabled
263,649 UART: [state] LifecycleState = Unprovisioned
266,058 UART: [state] DebugLocked = No
267,727 UART: [state] WD Timer not started. Device not locked for debugging
272,891 UART: [kat] SHA2-256
454,842 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,374 UART: [kat] ++
466,822 UART: [kat] sha1
477,443 UART: [kat] SHA2-256
480,453 UART: [kat] SHA2-384
485,796 UART: [kat] SHA2-512-ACC
488,444 UART: [kat] ECC-384
3,778,067 UART: [kat] HMAC-384Kdf
3,803,425 UART: [kat] LMS
4,876,616 UART: [kat] --
4,881,259 UART: [cold-reset] ++
4,883,688 UART: [fht] FHT @ 0x50003400
4,895,447 UART: [idev] ++
4,896,147 UART: [idev] CDI.KEYID = 6
4,897,388 UART: [idev] SUBJECT.KEYID = 7
4,898,508 UART: [idev] UDS.KEYID = 0
4,899,630 ready_for_fw is high
4,899,854 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,039,853 UART: [idev] Erasing UDS.KEYID = 0
8,241,876 UART: [idev] Sha1 KeyId Algorithm
8,263,218 UART: [idev] --
8,268,159 UART: [ldev] ++
8,268,790 UART: [ldev] CDI.KEYID = 6
8,269,895 UART: [ldev] SUBJECT.KEYID = 5
8,271,104 UART: [ldev] AUTHORITY.KEYID = 7
8,272,259 UART: [ldev] FE.KEYID = 1
8,319,162 UART: [ldev] Erasing FE.KEYID = 1
11,657,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,030,977 UART: [ldev] --
14,036,002 UART: [fwproc] Wait for Commands...
14,037,889 UART: [fwproc] Recv command 0x46574c44
14,040,146 UART: [fwproc] Recv'd Img size: 111408 bytes
18,084,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,157,412 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,217,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,533,616 >>> mbox cmd response: success
18,536,890 UART: [afmc] ++
18,537,502 UART: [afmc] CDI.KEYID = 6
18,538,692 UART: [afmc] SUBJECT.KEYID = 7
18,539,797 UART: [afmc] AUTHORITY.KEYID = 5
21,906,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,202,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,204,622 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,220,753 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,236,879 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,252,747 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,275,715 UART: [afmc] --
26,335,760 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,501,650 UART: [cold-reset] --
26,502,652 UART: [state] Locking Datavault
26,503,738 UART: [state] Locking PCR0, PCR1 and PCR31
26,505,286 UART: [state] Locking ICCM
26,506,169 UART: [exit] Launching FMC @ 0x40000000
26,507,509 UART:
26,507,656 UART: Running Caliptra FMC ...
26,508,726 UART:
26,508,881 UART: [fmc] Received command: 0x46574C44
26,510,257 UART:
26,510,400 UART: Running Caliptra ROM ...
26,511,507 UART:
26,511,657 UART: [state] CFI Enabled
26,566,174 UART: [state] LifecycleState = Unprovisioned
26,568,003 UART: [state] DebugLocked = No
26,570,876 UART: [state] WD Timer not started. Device not locked for debugging
26,575,645 UART: [kat] SHA2-256
26,757,599 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,769,131 UART: [kat] ++
26,769,592 UART: [kat] sha1
26,780,266 UART: [kat] SHA2-256
26,783,288 UART: [kat] SHA2-384
26,790,187 UART: [kat] SHA2-512-ACC
26,792,822 UART: [kat] ECC-384
30,077,591 UART: [kat] HMAC-384Kdf
30,105,387 UART: [kat] LMS
31,178,529 UART: [kat] --
31,183,628 UART: [update-reset] ++
35,486,107 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,489,698 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,931,223 >>> mbox cmd response: success
35,932,644 UART: [update-reset] Copying MAN_2 To MAN_1
35,955,498 UART: [update-reset Success] --
35,962,969 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,120,330 UART: [state] Locking Datavault
36,121,547 UART: [state] Locking PCR0, PCR1 and PCR31
36,123,097 UART: [state] Locking ICCM
36,124,015 UART: [exit] Launching FMC @ 0x40000000
36,125,463 UART:
36,125,631 UART: Running Caliptra FMC ...
36,126,728 UART:
36,126,880 UART: [fmc] Received command: 0x1000000E
36,904,764 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
4,802,895 ready_for_fw is high
4,803,332 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,335,370 >>> mbox cmd response: success
26,083,555 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,249,296 UART:
26,249,706 UART: Running Caliptra FMC ...
26,250,816 UART:
26,250,979 UART: [fmc] Received command: 0x46574C44
35,558,743 >>> mbox cmd response: success
35,586,442 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,743,869 UART:
35,744,213 UART: Running Caliptra FMC ...
35,745,431 UART:
35,745,597 UART: [fmc] Received command: 0x1000000E
36,528,272 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,324 UART:
192,691 UART: Running Caliptra ROM ...
193,882 UART:
603,438 UART: [state] CFI Enabled
618,381 UART: [state] LifecycleState = Unprovisioned
620,744 UART: [state] DebugLocked = No
622,752 UART: [state] WD Timer not started. Device not locked for debugging
627,196 UART: [kat] SHA2-256
809,118 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,706 UART: [kat] ++
821,169 UART: [kat] sha1
832,251 UART: [kat] SHA2-256
835,248 UART: [kat] SHA2-384
840,163 UART: [kat] SHA2-512-ACC
842,805 UART: [kat] ECC-384
4,100,003 UART: [kat] HMAC-384Kdf
4,113,246 UART: [kat] LMS
5,186,421 UART: [kat] --
5,190,946 UART: [cold-reset] ++
5,193,665 UART: [fht] FHT @ 0x50003400
5,205,912 UART: [idev] ++
5,206,674 UART: [idev] CDI.KEYID = 6
5,207,773 UART: [idev] SUBJECT.KEYID = 7
5,209,295 UART: [idev] UDS.KEYID = 0
5,210,479 ready_for_fw is high
5,210,676 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,350,679 UART: [idev] Erasing UDS.KEYID = 0
8,500,492 UART: [idev] Sha1 KeyId Algorithm
8,522,593 UART: [idev] --
8,525,772 UART: [ldev] ++
8,526,390 UART: [ldev] CDI.KEYID = 6
8,527,617 UART: [ldev] SUBJECT.KEYID = 5
8,529,036 UART: [ldev] AUTHORITY.KEYID = 7
8,530,587 UART: [ldev] FE.KEYID = 1
8,540,409 UART: [ldev] Erasing FE.KEYID = 1
11,827,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,187,904 UART: [ldev] --
14,193,267 UART: [fwproc] Wait for Commands...
14,194,941 UART: [fwproc] Recv command 0x46574c44
14,197,245 UART: [fwproc] Recv'd Img size: 111408 bytes
18,233,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,309,564 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,369,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,685,474 >>> mbox cmd response: success
18,689,703 UART: [afmc] ++
18,690,312 UART: [afmc] CDI.KEYID = 6
18,691,494 UART: [afmc] SUBJECT.KEYID = 7
18,692,643 UART: [afmc] AUTHORITY.KEYID = 5
22,007,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,303,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,305,848 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,322,041 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,338,152 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,353,978 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,375,484 UART: [afmc] --
26,441,767 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,607,571 UART: [cold-reset] --
26,608,530 UART: [state] Locking Datavault
26,609,654 UART: [state] Locking PCR0, PCR1 and PCR31
26,611,190 UART: [state] Locking ICCM
26,612,089 UART: [exit] Launching FMC @ 0x40000000
26,613,516 UART:
26,613,670 UART: Running Caliptra FMC ...
26,614,763 UART:
26,614,933 UART: [fmc] Received command: 0x46574C44
26,616,400 UART:
26,616,546 UART: Running Caliptra ROM ...
26,617,549 UART:
26,617,684 UART: [state] CFI Enabled
26,625,371 UART: [state] LifecycleState = Unprovisioned
26,627,418 UART: [state] DebugLocked = No
26,630,170 UART: [state] WD Timer not started. Device not locked for debugging
26,635,318 UART: [kat] SHA2-256
26,817,259 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,828,773 UART: [kat] ++
26,829,279 UART: [kat] sha1
26,839,510 UART: [kat] SHA2-256
26,842,569 UART: [kat] SHA2-384
26,847,891 UART: [kat] SHA2-512-ACC
26,850,447 UART: [kat] ECC-384
30,106,526 UART: [kat] HMAC-384Kdf
30,118,504 UART: [kat] LMS
31,191,691 UART: [kat] --
31,196,866 UART: [update-reset] ++
35,508,034 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,511,630 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
35,953,163 >>> mbox cmd response: success
35,954,642 UART: [update-reset] Copying MAN_2 To MAN_1
35,977,515 UART: [update-reset Success] --
35,985,105 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
36,142,878 UART: [state] Locking Datavault
36,144,105 UART: [state] Locking PCR0, PCR1 and PCR31
36,145,574 UART: [state] Locking ICCM
36,146,441 UART: [exit] Launching FMC @ 0x40000000
36,148,218 UART:
36,148,409 UART: Running Caliptra FMC ...
36,149,517 UART:
36,149,668 UART: [fmc] Received command: 0x1000000E
36,927,265 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
5,100,253 ready_for_fw is high
5,100,933 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,499,328 >>> mbox cmd response: success
26,185,855 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
26,351,778 UART:
26,352,209 UART: Running Caliptra FMC ...
26,353,312 UART:
26,353,467 UART: [fmc] Received command: 0x46574C44
35,587,894 >>> mbox cmd response: success
35,615,075 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
35,772,486 UART:
35,772,849 UART: Running Caliptra FMC ...
35,774,050 UART:
35,774,223 UART: [fmc] Received command: 0x1000000E
36,556,914 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,123 UART:
192,479 UART: Running Caliptra ROM ...
193,654 UART:
193,812 UART: [state] CFI Enabled
262,326 UART: [state] LifecycleState = Unprovisioned
264,235 UART: [state] DebugLocked = No
265,421 UART: [state] WD Timer not started. Device not locked for debugging
269,532 UART: [kat] SHA2-256
448,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,227 UART: [kat] ++
460,757 UART: [kat] sha1
471,580 UART: [kat] SHA2-256
474,642 UART: [kat] SHA2-384
480,998 UART: [kat] SHA2-512-ACC
483,949 UART: [kat] ECC-384
2,927,256 UART: [kat] HMAC-384Kdf
2,951,764 UART: [kat] LMS
3,481,220 UART: [kat] --
3,485,291 UART: [cold-reset] ++
3,487,794 UART: [fht] FHT @ 0x50003400
3,499,342 UART: [idev] ++
3,499,914 UART: [idev] CDI.KEYID = 6
3,500,798 UART: [idev] SUBJECT.KEYID = 7
3,502,047 UART: [idev] UDS.KEYID = 0
3,502,976 ready_for_fw is high
3,503,193 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,643,839 UART: [idev] Erasing UDS.KEYID = 0
6,006,270 UART: [idev] Sha1 KeyId Algorithm
6,030,594 UART: [idev] --
6,033,786 UART: [ldev] ++
6,034,363 UART: [ldev] CDI.KEYID = 6
6,035,290 UART: [ldev] SUBJECT.KEYID = 5
6,036,396 UART: [ldev] AUTHORITY.KEYID = 7
6,037,690 UART: [ldev] FE.KEYID = 1
6,080,887 UART: [ldev] Erasing FE.KEYID = 1
8,580,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,372 UART: [ldev] --
10,372,532 UART: [fwproc] Wait for Commands...
10,374,733 UART: [fwproc] Recv command 0x46574c44
10,376,826 UART: [fwproc] Recv'd Img size: 111752 bytes
13,741,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,809,469 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,869,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,187,034 >>> mbox cmd response: success
14,190,760 UART: [afmc] ++
14,191,384 UART: [afmc] CDI.KEYID = 6
14,192,280 UART: [afmc] SUBJECT.KEYID = 7
14,193,386 UART: [afmc] AUTHORITY.KEYID = 5
16,724,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,449,754 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,451,621 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,467,717 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,483,755 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,499,431 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,523,034 UART: [afmc] --
20,598,494 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,764,189 UART: [cold-reset] --
20,765,149 UART: [state] Locking Datavault
20,766,233 UART: [state] Locking PCR0, PCR1 and PCR31
20,767,787 UART: [state] Locking ICCM
20,768,670 UART: [exit] Launching FMC @ 0x40000000
20,770,010 UART:
20,770,178 UART: Running Caliptra FMC ...
20,771,283 UART:
20,771,439 UART: [fmc] Received command: 0x46574C44
20,772,810 UART:
20,772,955 UART: Running Caliptra ROM ...
20,774,058 UART:
20,774,217 UART: [state] CFI Enabled
20,828,850 UART: [state] LifecycleState = Unprovisioned
20,830,733 UART: [state] DebugLocked = No
20,833,392 UART: [state] WD Timer not started. Device not locked for debugging
20,837,999 UART: [kat] SHA2-256
21,017,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,028,720 UART: [kat] ++
21,029,179 UART: [kat] sha1
21,039,744 UART: [kat] SHA2-256
21,042,745 UART: [kat] SHA2-384
21,050,386 UART: [kat] SHA2-512-ACC
21,053,335 UART: [kat] ECC-384
23,514,340 UART: [kat] HMAC-384Kdf
23,536,679 UART: [kat] LMS
24,066,141 UART: [kat] --
24,071,134 UART: [update-reset] ++
27,700,903 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,704,725 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,146,282 >>> mbox cmd response: success
28,146,948 UART: [update-reset] Copying MAN_2 To MAN_1
28,169,235 UART: [update-reset Success] --
28,176,269 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,333,594 UART: [state] Locking Datavault
28,334,832 UART: [state] Locking PCR0, PCR1 and PCR31
28,336,382 UART: [state] Locking ICCM
28,337,469 UART: [exit] Launching FMC @ 0x40000000
28,338,899 UART:
28,339,056 UART: Running Caliptra FMC ...
28,340,159 UART:
28,340,310 UART: [fmc] Received command: 0x1000000E
29,118,028 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,384,097 ready_for_fw is high
3,384,531 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,044,427 >>> mbox cmd response: success
20,385,104 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,550,860 UART:
20,551,315 UART: Running Caliptra FMC ...
20,552,482 UART:
20,552,657 UART: [fmc] Received command: 0x46574C44
27,799,769 >>> mbox cmd response: success
27,827,415 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
27,984,815 UART:
27,985,171 UART: Running Caliptra FMC ...
27,986,332 UART:
27,986,497 UART: [fmc] Received command: 0x1000000E
28,769,250 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,245 UART:
192,609 UART: Running Caliptra ROM ...
193,748 UART:
603,166 UART: [state] CFI Enabled
616,692 UART: [state] LifecycleState = Unprovisioned
618,526 UART: [state] DebugLocked = No
621,477 UART: [state] WD Timer not started. Device not locked for debugging
625,306 UART: [kat] SHA2-256
804,473 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,039 UART: [kat] ++
816,575 UART: [kat] sha1
829,017 UART: [kat] SHA2-256
832,020 UART: [kat] SHA2-384
838,151 UART: [kat] SHA2-512-ACC
841,154 UART: [kat] ECC-384
3,281,126 UART: [kat] HMAC-384Kdf
3,293,147 UART: [kat] LMS
3,822,613 UART: [kat] --
3,827,119 UART: [cold-reset] ++
3,829,332 UART: [fht] FHT @ 0x50003400
3,842,014 UART: [idev] ++
3,842,575 UART: [idev] CDI.KEYID = 6
3,843,481 UART: [idev] SUBJECT.KEYID = 7
3,844,725 UART: [idev] UDS.KEYID = 0
3,845,645 ready_for_fw is high
3,845,832 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,986,206 UART: [idev] Erasing UDS.KEYID = 0
6,321,467 UART: [idev] Sha1 KeyId Algorithm
6,344,405 UART: [idev] --
6,346,935 UART: [ldev] ++
6,347,513 UART: [ldev] CDI.KEYID = 6
6,348,423 UART: [ldev] SUBJECT.KEYID = 5
6,349,583 UART: [ldev] AUTHORITY.KEYID = 7
6,350,865 UART: [ldev] FE.KEYID = 1
6,361,093 UART: [ldev] Erasing FE.KEYID = 1
8,837,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,414 UART: [ldev] --
10,630,099 UART: [fwproc] Wait for Commands...
10,631,979 UART: [fwproc] Recv command 0x46574c44
10,634,067 UART: [fwproc] Recv'd Img size: 111752 bytes
14,003,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,077,911 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,138,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,454,938 >>> mbox cmd response: success
14,459,904 UART: [afmc] ++
14,460,515 UART: [afmc] CDI.KEYID = 6
14,461,451 UART: [afmc] SUBJECT.KEYID = 7
14,462,610 UART: [afmc] AUTHORITY.KEYID = 5
16,967,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,687,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,689,531 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,705,618 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,721,622 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,737,331 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,759,908 UART: [afmc] --
20,822,829 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,988,496 UART: [cold-reset] --
20,989,420 UART: [state] Locking Datavault
20,990,501 UART: [state] Locking PCR0, PCR1 and PCR31
20,992,046 UART: [state] Locking ICCM
20,992,980 UART: [exit] Launching FMC @ 0x40000000
20,994,404 UART:
20,994,566 UART: Running Caliptra FMC ...
20,995,661 UART:
20,995,812 UART: [fmc] Received command: 0x46574C44
20,997,188 UART:
20,997,339 UART: Running Caliptra ROM ...
20,998,433 UART:
20,998,587 UART: [state] CFI Enabled
21,005,065 UART: [state] LifecycleState = Unprovisioned
21,006,910 UART: [state] DebugLocked = No
21,009,532 UART: [state] WD Timer not started. Device not locked for debugging
21,013,630 UART: [kat] SHA2-256
21,192,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,204,421 UART: [kat] ++
21,204,956 UART: [kat] sha1
21,215,524 UART: [kat] SHA2-256
21,218,533 UART: [kat] SHA2-384
21,225,002 UART: [kat] SHA2-512-ACC
21,227,942 UART: [kat] ECC-384
23,671,013 UART: [kat] HMAC-384Kdf
23,683,628 UART: [kat] LMS
24,213,176 UART: [kat] --
24,216,863 UART: [update-reset] ++
27,858,175 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,862,034 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,303,613 >>> mbox cmd response: success
28,304,144 UART: [update-reset] Copying MAN_2 To MAN_1
28,326,494 UART: [update-reset Success] --
28,333,598 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,490,985 UART: [state] Locking Datavault
28,492,217 UART: [state] Locking PCR0, PCR1 and PCR31
28,493,768 UART: [state] Locking ICCM
28,494,680 UART: [exit] Launching FMC @ 0x40000000
28,496,111 UART:
28,496,270 UART: Running Caliptra FMC ...
28,497,366 UART:
28,497,520 UART: [fmc] Received command: 0x1000000E
29,275,445 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,692,142 ready_for_fw is high
3,692,556 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,220,750 >>> mbox cmd response: success
20,513,574 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,679,727 UART:
20,680,175 UART: Running Caliptra FMC ...
20,681,363 UART:
20,681,550 UART: [fmc] Received command: 0x46574C44
27,844,128 >>> mbox cmd response: success
27,871,224 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,028,591 UART:
28,028,922 UART: Running Caliptra FMC ...
28,030,099 UART:
28,030,279 UART: [fmc] Received command: 0x1000000E
28,813,024 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,172 UART:
192,539 UART: Running Caliptra ROM ...
193,714 UART:
193,861 UART: [state] CFI Enabled
259,785 UART: [state] LifecycleState = Unprovisioned
261,690 UART: [state] DebugLocked = No
263,934 UART: [state] WD Timer not started. Device not locked for debugging
268,187 UART: [kat] SHA2-256
447,316 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,914 UART: [kat] ++
459,629 UART: [kat] sha1
470,168 UART: [kat] SHA2-256
473,196 UART: [kat] SHA2-384
479,335 UART: [kat] SHA2-512-ACC
482,290 UART: [kat] ECC-384
2,940,792 UART: [kat] HMAC-384Kdf
2,961,943 UART: [kat] LMS
3,491,384 UART: [kat] --
3,493,611 UART: [cold-reset] ++
3,495,825 UART: [fht] FHT @ 0x50003400
3,506,389 UART: [idev] ++
3,506,992 UART: [idev] CDI.KEYID = 6
3,507,917 UART: [idev] SUBJECT.KEYID = 7
3,509,093 UART: [idev] UDS.KEYID = 0
3,510,024 ready_for_fw is high
3,510,232 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,650,726 UART: [idev] Erasing UDS.KEYID = 0
6,016,683 UART: [idev] Sha1 KeyId Algorithm
6,038,683 UART: [idev] --
6,042,470 UART: [ldev] ++
6,043,069 UART: [ldev] CDI.KEYID = 6
6,043,984 UART: [ldev] SUBJECT.KEYID = 5
6,045,158 UART: [ldev] AUTHORITY.KEYID = 7
6,046,394 UART: [ldev] FE.KEYID = 1
6,089,667 UART: [ldev] Erasing FE.KEYID = 1
8,594,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,182 UART: [ldev] --
10,402,941 UART: [fwproc] Wait for Commands...
10,405,140 UART: [fwproc] Recv command 0x46574c44
10,407,178 UART: [fwproc] Recv'd Img size: 111752 bytes
13,788,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,320 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,922,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,240,879 >>> mbox cmd response: success
14,244,303 UART: [afmc] ++
14,244,917 UART: [afmc] CDI.KEYID = 6
14,245,798 UART: [afmc] SUBJECT.KEYID = 7
14,246,897 UART: [afmc] AUTHORITY.KEYID = 5
16,774,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,500,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,502,847 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,518,929 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,534,983 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,550,698 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,572,984 UART: [afmc] --
20,638,392 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,804,142 UART: [cold-reset] --
20,805,078 UART: [state] Locking Datavault
20,806,167 UART: [state] Locking PCR0, PCR1 and PCR31
20,807,718 UART: [state] Locking ICCM
20,808,592 UART: [exit] Launching FMC @ 0x40000000
20,809,933 UART:
20,810,078 UART: Running Caliptra FMC ...
20,811,186 UART:
20,811,336 UART: [fmc] Received command: 0x46574C44
20,812,708 UART:
20,812,851 UART: Running Caliptra ROM ...
20,813,911 UART:
20,814,072 UART: [state] CFI Enabled
20,884,313 UART: [state] LifecycleState = Unprovisioned
20,886,199 UART: [state] DebugLocked = No
20,887,610 UART: [state] WD Timer not started. Device not locked for debugging
20,891,030 UART: [kat] SHA2-256
21,070,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,081,743 UART: [kat] ++
21,082,201 UART: [kat] sha1
21,091,842 UART: [kat] SHA2-256
21,094,870 UART: [kat] SHA2-384
21,100,541 UART: [kat] SHA2-512-ACC
21,103,527 UART: [kat] ECC-384
23,567,274 UART: [kat] HMAC-384Kdf
23,589,270 UART: [kat] LMS
24,118,754 UART: [kat] --
24,123,122 UART: [update-reset] ++
27,755,655 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,758,938 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,200,495 >>> mbox cmd response: success
28,201,164 UART: [update-reset] Copying MAN_2 To MAN_1
28,223,495 UART: [update-reset Success] --
28,230,698 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,388,079 UART: [state] Locking Datavault
28,389,312 UART: [state] Locking PCR0, PCR1 and PCR31
28,390,865 UART: [state] Locking ICCM
28,391,775 UART: [exit] Launching FMC @ 0x40000000
28,393,200 UART:
28,393,358 UART: Running Caliptra FMC ...
28,394,459 UART:
28,394,617 UART: [fmc] Received command: 0x1000000E
29,172,525 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,383,042 ready_for_fw is high
3,383,653 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,055,342 >>> mbox cmd response: success
20,400,931 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,566,583 UART:
20,566,992 UART: Running Caliptra FMC ...
20,568,102 UART:
20,568,263 UART: [fmc] Received command: 0x46574C44
27,835,812 >>> mbox cmd response: success
27,863,689 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,021,057 UART:
28,021,393 UART: Running Caliptra FMC ...
28,022,565 UART:
28,022,733 UART: [fmc] Received command: 0x1000000E
28,805,449 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,343 UART:
192,744 UART: Running Caliptra ROM ...
193,927 UART:
603,367 UART: [state] CFI Enabled
616,023 UART: [state] LifecycleState = Unprovisioned
617,911 UART: [state] DebugLocked = No
619,936 UART: [state] WD Timer not started. Device not locked for debugging
624,428 UART: [kat] SHA2-256
803,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,080 UART: [kat] ++
815,620 UART: [kat] sha1
825,295 UART: [kat] SHA2-256
828,302 UART: [kat] SHA2-384
834,860 UART: [kat] SHA2-512-ACC
837,792 UART: [kat] ECC-384
3,281,813 UART: [kat] HMAC-384Kdf
3,295,194 UART: [kat] LMS
3,824,710 UART: [kat] --
3,830,192 UART: [cold-reset] ++
3,831,194 UART: [fht] FHT @ 0x50003400
3,842,311 UART: [idev] ++
3,842,874 UART: [idev] CDI.KEYID = 6
3,843,824 UART: [idev] SUBJECT.KEYID = 7
3,845,012 UART: [idev] UDS.KEYID = 0
3,845,940 ready_for_fw is high
3,846,132 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,986,485 UART: [idev] Erasing UDS.KEYID = 0
6,319,280 UART: [idev] Sha1 KeyId Algorithm
6,342,802 UART: [idev] --
6,345,642 UART: [ldev] ++
6,346,223 UART: [ldev] CDI.KEYID = 6
6,347,138 UART: [ldev] SUBJECT.KEYID = 5
6,348,301 UART: [ldev] AUTHORITY.KEYID = 7
6,349,532 UART: [ldev] FE.KEYID = 1
6,359,258 UART: [ldev] Erasing FE.KEYID = 1
8,832,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,483 UART: [ldev] --
10,622,441 UART: [fwproc] Wait for Commands...
10,625,555 UART: [fwproc] Recv command 0x46574c44
10,627,644 UART: [fwproc] Recv'd Img size: 111752 bytes
13,985,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,057,029 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,117,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,434,564 >>> mbox cmd response: success
14,438,322 UART: [afmc] ++
14,438,934 UART: [afmc] CDI.KEYID = 6
14,439,849 UART: [afmc] SUBJECT.KEYID = 7
14,440,957 UART: [afmc] AUTHORITY.KEYID = 5
16,937,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,660,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,662,518 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,678,563 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,694,610 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,710,283 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,733,971 UART: [afmc] --
20,795,107 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,960,835 UART: [cold-reset] --
20,961,777 UART: [state] Locking Datavault
20,962,945 UART: [state] Locking PCR0, PCR1 and PCR31
20,964,482 UART: [state] Locking ICCM
20,965,394 UART: [exit] Launching FMC @ 0x40000000
20,966,841 UART:
20,967,004 UART: Running Caliptra FMC ...
20,968,110 UART:
20,968,476 UART: [fmc] Received command: 0x46574C44
20,969,952 UART:
20,970,112 UART: Running Caliptra ROM ...
20,971,224 UART:
20,971,378 UART: [state] CFI Enabled
20,977,943 UART: [state] LifecycleState = Unprovisioned
20,979,829 UART: [state] DebugLocked = No
20,981,043 UART: [state] WD Timer not started. Device not locked for debugging
20,984,350 UART: [kat] SHA2-256
21,163,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,175,107 UART: [kat] ++
21,175,641 UART: [kat] sha1
21,187,342 UART: [kat] SHA2-256
21,190,383 UART: [kat] SHA2-384
21,194,852 UART: [kat] SHA2-512-ACC
21,197,786 UART: [kat] ECC-384
23,640,662 UART: [kat] HMAC-384Kdf
23,652,087 UART: [kat] LMS
24,181,612 UART: [kat] --
24,185,788 UART: [update-reset] ++
27,818,828 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,822,104 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,263,684 >>> mbox cmd response: success
28,264,304 UART: [update-reset] Copying MAN_2 To MAN_1
28,286,640 UART: [update-reset Success] --
28,293,872 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,451,264 UART: [state] Locking Datavault
28,452,493 UART: [state] Locking PCR0, PCR1 and PCR31
28,453,979 UART: [state] Locking ICCM
28,454,856 UART: [exit] Launching FMC @ 0x40000000
28,456,281 UART:
28,456,450 UART: Running Caliptra FMC ...
28,457,546 UART:
28,457,698 UART: [fmc] Received command: 0x1000000E
29,235,707 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,699,308 ready_for_fw is high
3,699,707 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,229,621 >>> mbox cmd response: success
20,522,736 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,688,469 UART:
20,688,882 UART: Running Caliptra FMC ...
20,690,052 UART:
20,690,224 UART: [fmc] Received command: 0x46574C44
27,858,392 >>> mbox cmd response: success
27,885,542 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,042,974 UART:
28,043,305 UART: Running Caliptra FMC ...
28,044,504 UART:
28,044,690 UART: [fmc] Received command: 0x1000000E
28,827,385 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,981 UART: [kat] ++
895,133 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,242 UART: [kat] SHA2-512-ACC
906,143 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,174,213 ready_for_fw is high
1,174,213 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,591 UART: [idev] Erasing UDS.KEYID = 0
1,197,945 UART: [idev] Sha1 KeyId Algorithm
1,206,845 UART: [idev] --
1,207,988 UART: [ldev] ++
1,208,156 UART: [ldev] CDI.KEYID = 6
1,208,520 UART: [ldev] SUBJECT.KEYID = 5
1,208,947 UART: [ldev] AUTHORITY.KEYID = 7
1,209,410 UART: [ldev] FE.KEYID = 1
1,214,478 UART: [ldev] Erasing FE.KEYID = 1
1,240,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,040 UART: [ldev] --
1,279,506 UART: [fwproc] Wait for Commands...
1,280,243 UART: [fwproc] Recv command 0x46574c44
1,280,976 UART: [fwproc] Recv'd Img size: 111752 bytes
2,548,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,374 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,736,549 >>> mbox cmd response: success
2,737,760 UART: [afmc] ++
2,737,928 UART: [afmc] CDI.KEYID = 6
2,738,291 UART: [afmc] SUBJECT.KEYID = 7
2,738,717 UART: [afmc] AUTHORITY.KEYID = 5
2,773,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,790,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,105 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,796,801 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,802,700 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,808,393 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,816,433 UART: [afmc] --
2,817,481 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,817,503 UART: [cold-reset] --
2,818,513 UART: [state] Locking Datavault
2,819,530 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,134 UART: [state] Locking ICCM
2,820,778 UART: [exit] Launching FMC @ 0x40000000
2,826,075 UART:
2,826,091 UART: Running Caliptra FMC ...
2,826,499 UART:
2,826,729 UART: [fmc] Received command: 0x46574C44
2,827,555 UART:
2,827,571 UART: Running Caliptra ROM ...
2,827,979 UART:
2,828,034 UART: [state] CFI Enabled
2,830,490 UART: [state] LifecycleState = Unprovisioned
2,831,145 UART: [state] DebugLocked = No
2,831,765 UART: [state] WD Timer not started. Device not locked for debugging
2,833,039 UART: [kat] SHA2-256
3,636,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,640,718 UART: [kat] ++
3,640,870 UART: [kat] sha1
3,645,290 UART: [kat] SHA2-256
3,647,230 UART: [kat] SHA2-384
3,649,785 UART: [kat] SHA2-512-ACC
3,651,685 UART: [kat] ECC-384
3,661,516 UART: [kat] HMAC-384Kdf
3,666,280 UART: [kat] LMS
3,914,592 UART: [kat] --
3,915,636 UART: [update-reset] ++
5,418,943 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,420,034 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,596,808 >>> mbox cmd response: success
5,597,099 UART: [update-reset] Copying MAN_2 To MAN_1
5,605,113 UART: [update-reset Success] --
5,605,522 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,606,256 UART: [state] Locking Datavault
5,607,030 UART: [state] Locking PCR0, PCR1 and PCR31
5,607,634 UART: [state] Locking ICCM
5,608,164 UART: [exit] Launching FMC @ 0x40000000
5,613,461 UART:
5,613,477 UART: Running Caliptra FMC ...
5,613,885 UART:
5,614,107 UART: [fmc] Received command: 0x1000000E
5,959,161 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,700 ready_for_fw is high
1,055,700 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,323 >>> mbox cmd response: success
2,643,460 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,649,549 UART:
2,649,565 UART: Running Caliptra FMC ...
2,649,973 UART:
2,650,203 UART: [fmc] Received command: 0x46574C44
5,301,839 >>> mbox cmd response: success
5,309,327 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,315,391 UART:
5,315,407 UART: Running Caliptra FMC ...
5,315,815 UART:
5,316,037 UART: [fmc] Received command: 0x1000000E
5,661,091 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,050 UART: [kat] ++
896,202 UART: [kat] sha1
900,556 UART: [kat] SHA2-256
902,496 UART: [kat] SHA2-384
905,417 UART: [kat] SHA2-512-ACC
907,318 UART: [kat] ECC-384
917,053 UART: [kat] HMAC-384Kdf
921,689 UART: [kat] LMS
1,170,001 UART: [kat] --
1,170,950 UART: [cold-reset] ++
1,171,364 UART: [fht] FHT @ 0x50003400
1,174,192 UART: [idev] ++
1,174,360 UART: [idev] CDI.KEYID = 6
1,174,721 UART: [idev] SUBJECT.KEYID = 7
1,175,146 UART: [idev] UDS.KEYID = 0
1,175,492 ready_for_fw is high
1,175,492 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,183,228 UART: [idev] Erasing UDS.KEYID = 0
1,200,660 UART: [idev] Sha1 KeyId Algorithm
1,209,326 UART: [idev] --
1,210,151 UART: [ldev] ++
1,210,319 UART: [ldev] CDI.KEYID = 6
1,210,683 UART: [ldev] SUBJECT.KEYID = 5
1,211,110 UART: [ldev] AUTHORITY.KEYID = 7
1,211,573 UART: [ldev] FE.KEYID = 1
1,216,773 UART: [ldev] Erasing FE.KEYID = 1
1,242,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,081 UART: [ldev] --
1,282,487 UART: [fwproc] Wait for Commands...
1,283,274 UART: [fwproc] Recv command 0x46574c44
1,284,007 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,751 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,990 >>> mbox cmd response: success
2,741,213 UART: [afmc] ++
2,741,381 UART: [afmc] CDI.KEYID = 6
2,741,744 UART: [afmc] SUBJECT.KEYID = 7
2,742,170 UART: [afmc] AUTHORITY.KEYID = 5
2,777,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,773 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,524 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,220 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,119 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,812 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,868 UART: [afmc] --
2,821,972 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,994 UART: [cold-reset] --
2,822,854 UART: [state] Locking Datavault
2,823,843 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,447 UART: [state] Locking ICCM
2,825,027 UART: [exit] Launching FMC @ 0x40000000
2,830,324 UART:
2,830,340 UART: Running Caliptra FMC ...
2,830,748 UART:
2,830,978 UART: [fmc] Received command: 0x46574C44
2,831,804 UART:
2,831,820 UART: Running Caliptra ROM ...
2,832,228 UART:
2,832,370 UART: [state] CFI Enabled
2,835,294 UART: [state] LifecycleState = Unprovisioned
2,835,949 UART: [state] DebugLocked = No
2,836,609 UART: [state] WD Timer not started. Device not locked for debugging
2,837,829 UART: [kat] SHA2-256
3,641,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,508 UART: [kat] ++
3,645,660 UART: [kat] sha1
3,649,950 UART: [kat] SHA2-256
3,651,890 UART: [kat] SHA2-384
3,654,713 UART: [kat] SHA2-512-ACC
3,656,613 UART: [kat] ECC-384
3,666,196 UART: [kat] HMAC-384Kdf
3,670,668 UART: [kat] LMS
3,918,980 UART: [kat] --
3,919,922 UART: [update-reset] ++
5,424,751 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,425,950 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,602,724 >>> mbox cmd response: success
5,602,903 UART: [update-reset] Copying MAN_2 To MAN_1
5,610,917 UART: [update-reset Success] --
5,611,326 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,612,050 UART: [state] Locking Datavault
5,612,880 UART: [state] Locking PCR0, PCR1 and PCR31
5,613,484 UART: [state] Locking ICCM
5,614,060 UART: [exit] Launching FMC @ 0x40000000
5,619,357 UART:
5,619,373 UART: Running Caliptra FMC ...
5,619,781 UART:
5,620,003 UART: [fmc] Received command: 0x1000000E
5,965,057 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,433 ready_for_fw is high
1,056,433 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,438 >>> mbox cmd response: success
2,645,227 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,196 UART:
2,651,212 UART: Running Caliptra FMC ...
2,651,620 UART:
2,651,850 UART: [fmc] Received command: 0x46574C44
5,304,219 >>> mbox cmd response: success
5,311,797 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,581 UART:
5,317,597 UART: Running Caliptra FMC ...
5,318,005 UART:
5,318,227 UART: [fmc] Received command: 0x1000000E
5,663,281 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,092 UART: [kat] SHA2-512-ACC
905,993 UART: [kat] ECC-384
915,584 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,169,887 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 ready_for_fw is high
1,173,899 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,198,675 UART: [idev] Sha1 KeyId Algorithm
1,207,485 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,708 UART: [ldev] --
1,281,016 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,930 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,672 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,357 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,897 >>> mbox cmd response: success
2,740,148 UART: [afmc] ++
2,740,316 UART: [afmc] CDI.KEYID = 6
2,740,679 UART: [afmc] SUBJECT.KEYID = 7
2,741,105 UART: [afmc] AUTHORITY.KEYID = 5
2,776,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,693 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,389 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,288 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,981 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,773 UART: [afmc] --
2,819,821 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,819,843 UART: [cold-reset] --
2,820,693 UART: [state] Locking Datavault
2,821,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,440 UART: [state] Locking ICCM
2,823,100 UART: [exit] Launching FMC @ 0x40000000
2,828,397 UART:
2,828,413 UART: Running Caliptra FMC ...
2,828,821 UART:
2,829,051 UART: [fmc] Received command: 0x46574C44
2,829,877 UART:
2,829,893 UART: Running Caliptra ROM ...
2,830,301 UART:
2,830,356 UART: [state] CFI Enabled
2,833,380 UART: [state] LifecycleState = Unprovisioned
2,834,035 UART: [state] DebugLocked = No
2,834,561 UART: [state] WD Timer not started. Device not locked for debugging
2,835,785 UART: [kat] SHA2-256
3,639,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,464 UART: [kat] ++
3,643,616 UART: [kat] sha1
3,647,880 UART: [kat] SHA2-256
3,649,820 UART: [kat] SHA2-384
3,652,537 UART: [kat] SHA2-512-ACC
3,654,437 UART: [kat] ECC-384
3,664,168 UART: [kat] HMAC-384Kdf
3,668,666 UART: [kat] LMS
3,916,978 UART: [kat] --
3,917,936 UART: [update-reset] ++
5,423,491 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,528 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,601,302 >>> mbox cmd response: success
5,601,607 UART: [update-reset] Copying MAN_2 To MAN_1
5,609,621 UART: [update-reset Success] --
5,610,030 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,610,696 UART: [state] Locking Datavault
5,611,352 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,956 UART: [state] Locking ICCM
5,612,428 UART: [exit] Launching FMC @ 0x40000000
5,617,725 UART:
5,617,741 UART: Running Caliptra FMC ...
5,618,149 UART:
5,618,371 UART: [fmc] Received command: 0x1000000E
5,963,425 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,412 ready_for_fw is high
1,056,412 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,357 >>> mbox cmd response: success
2,645,364 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,249 UART:
2,651,265 UART: Running Caliptra FMC ...
2,651,673 UART:
2,651,903 UART: [fmc] Received command: 0x46574C44
5,304,029 >>> mbox cmd response: success
5,311,515 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,317,239 UART:
5,317,255 UART: Running Caliptra FMC ...
5,317,663 UART:
5,317,885 UART: [fmc] Received command: 0x1000000E
5,662,939 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,727 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,404 UART: [idev] ++
1,173,572 UART: [idev] CDI.KEYID = 6
1,173,933 UART: [idev] SUBJECT.KEYID = 7
1,174,358 UART: [idev] UDS.KEYID = 0
1,174,704 ready_for_fw is high
1,174,704 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,378 UART: [idev] Erasing UDS.KEYID = 0
1,199,200 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,163 UART: [ldev] ++
1,209,331 UART: [ldev] CDI.KEYID = 6
1,209,695 UART: [ldev] SUBJECT.KEYID = 5
1,210,122 UART: [ldev] AUTHORITY.KEYID = 7
1,210,585 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,282,001 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,578,093 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,418 >>> mbox cmd response: success
2,740,659 UART: [afmc] ++
2,740,827 UART: [afmc] CDI.KEYID = 6
2,741,190 UART: [afmc] SUBJECT.KEYID = 7
2,741,616 UART: [afmc] AUTHORITY.KEYID = 5
2,776,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,644 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,799,340 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,805,239 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,932 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,972 UART: [afmc] --
2,819,830 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,819,852 UART: [cold-reset] --
2,820,410 UART: [state] Locking Datavault
2,821,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,369 UART: [state] Locking ICCM
2,822,821 UART: [exit] Launching FMC @ 0x40000000
2,828,118 UART:
2,828,134 UART: Running Caliptra FMC ...
2,828,542 UART:
2,828,772 UART: [fmc] Received command: 0x46574C44
2,829,598 UART:
2,829,614 UART: Running Caliptra ROM ...
2,830,022 UART:
2,830,164 UART: [state] CFI Enabled
2,833,186 UART: [state] LifecycleState = Unprovisioned
2,833,841 UART: [state] DebugLocked = No
2,834,517 UART: [state] WD Timer not started. Device not locked for debugging
2,835,859 UART: [kat] SHA2-256
3,639,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,538 UART: [kat] ++
3,643,690 UART: [kat] sha1
3,648,000 UART: [kat] SHA2-256
3,649,940 UART: [kat] SHA2-384
3,652,617 UART: [kat] SHA2-512-ACC
3,654,517 UART: [kat] ECC-384
3,664,330 UART: [kat] HMAC-384Kdf
3,669,026 UART: [kat] LMS
3,917,338 UART: [kat] --
3,918,148 UART: [update-reset] ++
5,422,411 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,462 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,236 >>> mbox cmd response: success
5,600,525 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,539 UART: [update-reset Success] --
5,608,948 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,518 UART: [state] Locking Datavault
5,610,384 UART: [state] Locking PCR0, PCR1 and PCR31
5,610,988 UART: [state] Locking ICCM
5,611,634 UART: [exit] Launching FMC @ 0x40000000
5,616,931 UART:
5,616,947 UART: Running Caliptra FMC ...
5,617,355 UART:
5,617,577 UART: [fmc] Received command: 0x1000000E
5,962,631 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,853 ready_for_fw is high
1,056,853 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,866 >>> mbox cmd response: success
2,646,813 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,653,346 UART:
2,653,362 UART: Running Caliptra FMC ...
2,653,770 UART:
2,654,000 UART: [fmc] Received command: 0x46574C44
5,306,389 >>> mbox cmd response: success
5,314,063 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,319,729 UART:
5,319,745 UART: Running Caliptra FMC ...
5,320,153 UART:
5,320,375 UART: [fmc] Received command: 0x1000000E
5,665,429 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,170,039 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,174,223 ready_for_fw is high
1,174,223 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,847 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,458 UART: [ldev] Erasing FE.KEYID = 1
1,242,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,446 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,627 UART: [fwproc] Recv command 0x46574c44
1,283,360 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,256 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,740,481 >>> mbox cmd response: success
2,741,546 UART: [afmc] ++
2,741,714 UART: [afmc] CDI.KEYID = 6
2,742,077 UART: [afmc] SUBJECT.KEYID = 7
2,742,503 UART: [afmc] AUTHORITY.KEYID = 5
2,778,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,463 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,801,159 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,807,058 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,751 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,631 UART: [afmc] --
2,821,489 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,821,511 UART: [cold-reset] --
2,822,351 UART: [state] Locking Datavault
2,823,552 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,156 UART: [state] Locking ICCM
2,824,684 UART: [exit] Launching FMC @ 0x40000000
2,829,981 UART:
2,829,997 UART: Running Caliptra FMC ...
2,830,405 UART:
2,830,635 UART: [fmc] Received command: 0x46574C44
2,831,461 UART:
2,831,477 UART: Running Caliptra ROM ...
2,831,885 UART:
2,831,940 UART: [state] CFI Enabled
2,834,400 UART: [state] LifecycleState = Unprovisioned
2,835,055 UART: [state] DebugLocked = No
2,835,709 UART: [state] WD Timer not started. Device not locked for debugging
2,836,819 UART: [kat] SHA2-256
3,640,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,498 UART: [kat] ++
3,644,650 UART: [kat] sha1
3,649,114 UART: [kat] SHA2-256
3,651,054 UART: [kat] SHA2-384
3,653,893 UART: [kat] SHA2-512-ACC
3,655,793 UART: [kat] ECC-384
3,665,132 UART: [kat] HMAC-384Kdf
3,669,702 UART: [kat] LMS
3,918,014 UART: [kat] --
3,918,868 UART: [update-reset] ++
5,422,647 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,808 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,582 >>> mbox cmd response: success
5,600,725 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,739 UART: [update-reset Success] --
5,609,148 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,966 UART: [state] Locking Datavault
5,610,894 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,498 UART: [state] Locking ICCM
5,612,070 UART: [exit] Launching FMC @ 0x40000000
5,617,367 UART:
5,617,383 UART: Running Caliptra FMC ...
5,617,791 UART:
5,618,013 UART: [fmc] Received command: 0x1000000E
5,963,067 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,120 ready_for_fw is high
1,056,120 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,847 >>> mbox cmd response: success
2,645,566 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,393 UART:
2,651,409 UART: Running Caliptra FMC ...
2,651,817 UART:
2,652,047 UART: [fmc] Received command: 0x46574C44
5,302,455 >>> mbox cmd response: success
5,310,157 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,316,355 UART:
5,316,371 UART: Running Caliptra FMC ...
5,316,779 UART:
5,317,001 UART: [fmc] Received command: 0x1000000E
5,662,055 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,454 UART: [kat] ++
895,606 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,520 UART: [idev] ++
1,173,688 UART: [idev] CDI.KEYID = 6
1,174,049 UART: [idev] SUBJECT.KEYID = 7
1,174,474 UART: [idev] UDS.KEYID = 0
1,174,820 ready_for_fw is high
1,174,820 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,188 UART: [idev] Sha1 KeyId Algorithm
1,208,222 UART: [idev] --
1,209,159 UART: [ldev] ++
1,209,327 UART: [ldev] CDI.KEYID = 6
1,209,691 UART: [ldev] SUBJECT.KEYID = 5
1,210,118 UART: [ldev] AUTHORITY.KEYID = 7
1,210,581 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,467 UART: [fwproc] Wait for Commands...
1,283,232 UART: [fwproc] Recv command 0x46574c44
1,283,965 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,111 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,740,274 >>> mbox cmd response: success
2,741,359 UART: [afmc] ++
2,741,527 UART: [afmc] CDI.KEYID = 6
2,741,890 UART: [afmc] SUBJECT.KEYID = 7
2,742,316 UART: [afmc] AUTHORITY.KEYID = 5
2,777,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,794 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,490 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,389 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,082 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,819,886 UART: [afmc] --
2,820,916 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,820,938 UART: [cold-reset] --
2,821,728 UART: [state] Locking Datavault
2,822,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,505 UART: [state] Locking ICCM
2,824,041 UART: [exit] Launching FMC @ 0x40000000
2,829,338 UART:
2,829,354 UART: Running Caliptra FMC ...
2,829,762 UART:
2,829,992 UART: [fmc] Received command: 0x46574C44
2,830,818 UART:
2,830,834 UART: Running Caliptra ROM ...
2,831,242 UART:
2,831,384 UART: [state] CFI Enabled
2,833,864 UART: [state] LifecycleState = Unprovisioned
2,834,519 UART: [state] DebugLocked = No
2,835,225 UART: [state] WD Timer not started. Device not locked for debugging
2,836,571 UART: [kat] SHA2-256
3,640,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,250 UART: [kat] ++
3,644,402 UART: [kat] sha1
3,648,674 UART: [kat] SHA2-256
3,650,614 UART: [kat] SHA2-384
3,653,309 UART: [kat] SHA2-512-ACC
3,655,209 UART: [kat] ECC-384
3,664,624 UART: [kat] HMAC-384Kdf
3,669,260 UART: [kat] LMS
3,917,572 UART: [kat] --
3,918,262 UART: [update-reset] ++
5,422,737 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,732 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,600,506 >>> mbox cmd response: success
5,600,773 UART: [update-reset] Copying MAN_2 To MAN_1
5,608,787 UART: [update-reset Success] --
5,609,196 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,609,626 UART: [state] Locking Datavault
5,610,508 UART: [state] Locking PCR0, PCR1 and PCR31
5,611,112 UART: [state] Locking ICCM
5,611,742 UART: [exit] Launching FMC @ 0x40000000
5,617,039 UART:
5,617,055 UART: Running Caliptra FMC ...
5,617,463 UART:
5,617,685 UART: [fmc] Received command: 0x1000000E
5,962,739 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,159 ready_for_fw is high
1,056,159 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,460 >>> mbox cmd response: success
2,645,511 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,651,642 UART:
2,651,658 UART: Running Caliptra FMC ...
2,652,066 UART:
2,652,296 UART: [fmc] Received command: 0x46574C44
5,305,323 >>> mbox cmd response: success
5,312,915 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,318,493 UART:
5,318,509 UART: Running Caliptra FMC ...
5,318,917 UART:
5,319,139 UART: [fmc] Received command: 0x1000000E
5,664,193 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,177 UART:
192,547 UART: Running Caliptra ROM ...
193,716 UART:
193,865 UART: [state] CFI Enabled
267,718 UART: [state] LifecycleState = Unprovisioned
270,129 UART: [state] DebugLocked = No
271,876 UART: [state] WD Timer not started. Device not locked for debugging
277,109 UART: [kat] SHA2-256
459,025 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,606 UART: [kat] ++
471,134 UART: [kat] sha1
482,941 UART: [kat] SHA2-256
486,000 UART: [kat] SHA2-384
492,996 UART: [kat] SHA2-512-ACC
495,667 UART: [kat] ECC-384
3,777,198 UART: [kat] HMAC-384Kdf
3,802,650 UART: [kat] LMS
4,875,804 UART: [kat] --
4,878,878 UART: [cold-reset] ++
4,880,595 UART: [fht] FHT @ 0x50003400
4,892,145 UART: [idev] ++
4,892,775 UART: [idev] CDI.KEYID = 6
4,894,014 UART: [idev] SUBJECT.KEYID = 7
4,895,123 UART: [idev] UDS.KEYID = 0
4,896,090 ready_for_fw is high
4,896,273 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,029,930 UART: [idev] Erasing UDS.KEYID = 0
8,219,414 UART: [idev] Sha1 KeyId Algorithm
8,241,276 UART: [idev] --
8,245,939 UART: [ldev] ++
8,246,533 UART: [ldev] CDI.KEYID = 6
8,247,638 UART: [ldev] SUBJECT.KEYID = 5
8,248,905 UART: [ldev] AUTHORITY.KEYID = 7
8,250,002 UART: [ldev] FE.KEYID = 1
8,296,968 UART: [ldev] Erasing FE.KEYID = 1
11,627,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,920,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,936,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,952,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,968,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,989,391 UART: [ldev] --
13,993,522 UART: [fwproc] Wait for Commands...
13,996,522 UART: [fwproc] Recv command 0x46574c44
13,998,782 UART: [fwproc] Recv'd Img size: 106340 bytes
17,969,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,039,579 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,082,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,397,803 >>> mbox cmd response: success
18,401,757 UART: [afmc] ++
18,402,350 UART: [afmc] CDI.KEYID = 6
18,403,532 UART: [afmc] SUBJECT.KEYID = 7
18,404,636 UART: [afmc] AUTHORITY.KEYID = 5
21,775,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,074,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,076,479 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,092,512 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,108,579 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,124,659 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,147,216 UART: [afmc] --
24,150,222 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,151,320 UART: [cold-reset] --
24,154,495 UART: [state] Locking Datavault
24,159,564 UART: [state] Locking PCR0, PCR1 and PCR31
24,161,275 UART: [state] Locking ICCM
24,163,377 UART: [exit] Launching FMC @ 0x40000000
24,171,994 UART:
24,172,224 UART: Running Caliptra FMC ...
24,173,319 UART:
24,173,482 UART: [fmc] Received command: 0x10000004
24,174,937 UART:
24,175,092 UART: Running Caliptra ROM ...
24,176,186 UART:
24,176,343 UART: [state] CFI Enabled
24,177,299 >>> mbox cmd response: success
24,241,011 UART: [state] LifecycleState = Unprovisioned
24,242,886 UART: [state] DebugLocked = No
24,244,701 UART: [state] WD Timer not started. Device not locked for debugging
24,248,443 UART: [kat] SHA2-256
24,430,409 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,441,901 UART: [kat] ++
24,442,411 UART: [kat] sha1
24,453,029 UART: [kat] SHA2-256
24,456,048 UART: [kat] SHA2-384
24,461,004 UART: [kat] SHA2-512-ACC
24,463,627 UART: [kat] ECC-384
27,751,438 UART: [kat] HMAC-384Kdf
27,779,815 UART: [kat] LMS
28,852,947 UART: [kat] --
28,857,325 UART: [update-reset] ++
28,858,503 UART: Failed To Get Mailbox Txn
28,861,222 UART: ROM Non-Fatal Error: 0x01040004
28,863,531 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,864,885 UART: [state] Locking Datavault
28,867,122 UART: [state] Locking PCR0, PCR1 and PCR31
28,869,335 UART: [state] Locking ICCM
28,870,949 UART: [exit] Launching FMC @ 0x40000000
28,879,671 UART:
28,879,923 UART: Running Caliptra FMC ...
28,880,949 UART:
28,881,094 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,882,731 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
4,803,160 ready_for_fw is high
4,803,557 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,249,771 >>> mbox cmd response: success
23,937,194 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
23,951,337 UART:
23,951,685 UART: Running Caliptra FMC ...
23,952,955 UART:
23,953,127 UART: [fmc] Received command: 0x10000004
23,954,679 >>> mbox cmd response: success
28,554,883 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,565,631 UART:
28,565,891 UART: Running Caliptra FMC ...
28,567,236 UART:
28,567,415 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,569,064 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,488 UART:
192,867 UART: Running Caliptra ROM ...
194,054 UART:
603,513 UART: [state] CFI Enabled
618,389 UART: [state] LifecycleState = Unprovisioned
620,695 UART: [state] DebugLocked = No
622,367 UART: [state] WD Timer not started. Device not locked for debugging
626,462 UART: [kat] SHA2-256
808,419 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,989 UART: [kat] ++
820,515 UART: [kat] sha1
829,754 UART: [kat] SHA2-256
832,820 UART: [kat] SHA2-384
838,370 UART: [kat] SHA2-512-ACC
841,009 UART: [kat] ECC-384
4,095,049 UART: [kat] HMAC-384Kdf
4,106,678 UART: [kat] LMS
5,179,835 UART: [kat] --
5,185,122 UART: [cold-reset] ++
5,186,406 UART: [fht] FHT @ 0x50003400
5,198,536 UART: [idev] ++
5,199,241 UART: [idev] CDI.KEYID = 6
5,200,334 UART: [idev] SUBJECT.KEYID = 7
5,201,855 UART: [idev] UDS.KEYID = 0
5,203,110 ready_for_fw is high
5,203,298 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,336,903 UART: [idev] Erasing UDS.KEYID = 0
8,492,602 UART: [idev] Sha1 KeyId Algorithm
8,514,110 UART: [idev] --
8,518,579 UART: [ldev] ++
8,519,144 UART: [ldev] CDI.KEYID = 6
8,520,368 UART: [ldev] SUBJECT.KEYID = 5
8,521,858 UART: [ldev] AUTHORITY.KEYID = 7
8,523,408 UART: [ldev] FE.KEYID = 1
8,535,610 UART: [ldev] Erasing FE.KEYID = 1
11,828,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,950 UART: [ldev] --
14,195,733 UART: [fwproc] Wait for Commands...
14,198,468 UART: [fwproc] Recv command 0x46574c44
14,200,714 UART: [fwproc] Recv'd Img size: 106340 bytes
18,175,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,247,336 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,289,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,606,793 >>> mbox cmd response: success
18,611,224 UART: [afmc] ++
18,611,814 UART: [afmc] CDI.KEYID = 6
18,612,915 UART: [afmc] SUBJECT.KEYID = 7
18,614,124 UART: [afmc] AUTHORITY.KEYID = 5
21,933,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,229,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,232,150 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,248,157 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,264,222 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,280,289 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,303,124 UART: [afmc] --
24,306,135 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,307,105 UART: [cold-reset] --
24,309,933 UART: [state] Locking Datavault
24,316,052 UART: [state] Locking PCR0, PCR1 and PCR31
24,317,695 UART: [state] Locking ICCM
24,320,755 UART: [exit] Launching FMC @ 0x40000000
24,329,385 UART:
24,329,662 UART: Running Caliptra FMC ...
24,330,683 UART:
24,330,822 UART: [fmc] Received command: 0x10000004
24,332,279 UART:
24,332,426 UART: Running Caliptra ROM ...
24,333,428 UART:
24,333,606 >>> mbox cmd response: success
24,333,832 UART: [state] CFI Enabled
24,349,405 UART: [state] LifecycleState = Unprovisioned
24,351,282 UART: [state] DebugLocked = No
24,353,815 UART: [state] WD Timer not started. Device not locked for debugging
24,357,683 UART: [kat] SHA2-256
24,539,631 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,551,149 UART: [kat] ++
24,551,674 UART: [kat] sha1
24,560,932 UART: [kat] SHA2-256
24,563,934 UART: [kat] SHA2-384
24,570,451 UART: [kat] SHA2-512-ACC
24,573,058 UART: [kat] ECC-384
27,826,653 UART: [kat] HMAC-384Kdf
27,838,717 UART: [kat] LMS
28,911,851 UART: [kat] --
28,916,441 UART: [update-reset] ++
28,917,578 UART: Failed To Get Mailbox Txn
28,921,039 UART: ROM Non-Fatal Error: 0x01040004
28,923,340 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,923,599 UART: [state] Locking Datavault
28,926,439 UART: [state] Locking PCR0, PCR1 and PCR31
28,928,616 UART: [state] Locking ICCM
28,931,625 UART: [exit] Launching FMC @ 0x40000000
28,940,311 UART:
28,940,540 UART: Running Caliptra FMC ...
28,941,633 UART:
28,941,781 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,943,400 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
5,099,693 ready_for_fw is high
5,100,283 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,411,188 >>> mbox cmd response: success
24,031,877 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
24,044,699 UART:
24,045,074 UART: Running Caliptra FMC ...
24,046,338 UART:
24,046,541 UART: [fmc] Received command: 0x10000004
24,048,081 >>> mbox cmd response: success
28,538,793 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
28,549,669 UART:
28,549,931 UART: Running Caliptra FMC ...
28,551,092 UART:
28,551,251 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
28,552,873 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,176 UART:
192,614 UART: Running Caliptra ROM ...
193,733 UART:
193,881 UART: [state] CFI Enabled
262,329 UART: [state] LifecycleState = Unprovisioned
264,253 UART: [state] DebugLocked = No
265,509 UART: [state] WD Timer not started. Device not locked for debugging
268,687 UART: [kat] SHA2-256
447,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,428 UART: [kat] ++
459,961 UART: [kat] sha1
470,191 UART: [kat] SHA2-256
473,248 UART: [kat] SHA2-384
479,392 UART: [kat] SHA2-512-ACC
482,403 UART: [kat] ECC-384
2,948,060 UART: [kat] HMAC-384Kdf
2,969,609 UART: [kat] LMS
3,499,074 UART: [kat] --
3,505,294 UART: [cold-reset] ++
3,507,624 UART: [fht] FHT @ 0x50003400
3,519,327 UART: [idev] ++
3,519,892 UART: [idev] CDI.KEYID = 6
3,520,843 UART: [idev] SUBJECT.KEYID = 7
3,522,018 UART: [idev] UDS.KEYID = 0
3,522,994 ready_for_fw is high
3,523,215 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,657,338 UART: [idev] Erasing UDS.KEYID = 0
6,026,813 UART: [idev] Sha1 KeyId Algorithm
6,050,363 UART: [idev] --
6,055,116 UART: [ldev] ++
6,055,688 UART: [ldev] CDI.KEYID = 6
6,056,577 UART: [ldev] SUBJECT.KEYID = 5
6,057,796 UART: [ldev] AUTHORITY.KEYID = 7
6,059,028 UART: [ldev] FE.KEYID = 1
6,098,235 UART: [ldev] Erasing FE.KEYID = 1
8,598,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,361,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,793 UART: [ldev] --
10,384,837 UART: [fwproc] Wait for Commands...
10,386,816 UART: [fwproc] Recv command 0x46574c44
10,388,923 UART: [fwproc] Recv'd Img size: 106684 bytes
13,696,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,764,376 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,806,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,124,208 >>> mbox cmd response: success
14,128,205 UART: [afmc] ++
14,128,793 UART: [afmc] CDI.KEYID = 6
14,129,674 UART: [afmc] SUBJECT.KEYID = 7
14,130,829 UART: [afmc] AUTHORITY.KEYID = 5
16,675,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,401,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,403,742 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,419,732 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,435,654 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,451,577 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,472,804 UART: [afmc] --
18,475,668 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,476,562 UART: [cold-reset] --
18,479,064 UART: [state] Locking Datavault
18,484,286 UART: [state] Locking PCR0, PCR1 and PCR31
18,485,942 UART: [state] Locking ICCM
18,488,417 UART: [exit] Launching FMC @ 0x40000000
18,496,817 UART:
18,497,053 UART: Running Caliptra FMC ...
18,498,162 UART:
18,498,318 UART: [fmc] Received command: 0x10000004
18,499,784 UART:
18,499,941 UART: Running Caliptra ROM ...
18,501,038 UART:
18,501,194 UART: [state] CFI Enabled
18,502,173 >>> mbox cmd response: success
18,563,089 UART: [state] LifecycleState = Unprovisioned
18,564,973 UART: [state] DebugLocked = No
18,567,714 UART: [state] WD Timer not started. Device not locked for debugging
18,571,548 UART: [kat] SHA2-256
18,750,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,762,232 UART: [kat] ++
18,762,685 UART: [kat] sha1
18,773,675 UART: [kat] SHA2-256
18,776,688 UART: [kat] SHA2-384
18,782,077 UART: [kat] SHA2-512-ACC
18,785,016 UART: [kat] ECC-384
21,250,497 UART: [kat] HMAC-384Kdf
21,269,682 UART: [kat] LMS
21,799,140 UART: [kat] --
21,805,274 UART: [update-reset] ++
21,806,208 UART: Failed To Get Mailbox Txn
21,808,917 UART: ROM Non-Fatal Error: 0x01040004
21,811,004 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,811,492 UART: [state] Locking Datavault
21,814,665 UART: [state] Locking PCR0, PCR1 and PCR31
21,816,360 UART: [state] Locking ICCM
21,818,697 UART: [exit] Launching FMC @ 0x40000000
21,827,096 UART:
21,827,374 UART: Running Caliptra FMC ...
21,828,402 UART:
21,828,546 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,830,178 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,384,240 ready_for_fw is high
3,384,633 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,934,857 >>> mbox cmd response: success
18,219,966 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,237,136 UART:
18,237,481 UART: Running Caliptra FMC ...
18,238,707 UART:
18,238,875 UART: [fmc] Received command: 0x10000004
18,240,419 >>> mbox cmd response: success
21,397,657 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,406,840 UART:
21,407,103 UART: Running Caliptra FMC ...
21,408,271 UART:
21,408,436 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,410,085 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,308 UART:
192,667 UART: Running Caliptra ROM ...
193,855 UART:
603,272 UART: [state] CFI Enabled
617,502 UART: [state] LifecycleState = Unprovisioned
619,341 UART: [state] DebugLocked = No
622,064 UART: [state] WD Timer not started. Device not locked for debugging
626,091 UART: [kat] SHA2-256
805,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,776 UART: [kat] ++
817,291 UART: [kat] sha1
829,579 UART: [kat] SHA2-256
832,584 UART: [kat] SHA2-384
837,648 UART: [kat] SHA2-512-ACC
840,579 UART: [kat] ECC-384
3,283,866 UART: [kat] HMAC-384Kdf
3,296,333 UART: [kat] LMS
3,825,814 UART: [kat] --
3,828,276 UART: [cold-reset] ++
3,829,782 UART: [fht] FHT @ 0x50003400
3,841,467 UART: [idev] ++
3,842,023 UART: [idev] CDI.KEYID = 6
3,842,933 UART: [idev] SUBJECT.KEYID = 7
3,844,174 UART: [idev] UDS.KEYID = 0
3,845,097 ready_for_fw is high
3,845,297 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,979,376 UART: [idev] Erasing UDS.KEYID = 0
6,310,790 UART: [idev] Sha1 KeyId Algorithm
6,333,362 UART: [idev] --
6,337,569 UART: [ldev] ++
6,338,134 UART: [ldev] CDI.KEYID = 6
6,339,055 UART: [ldev] SUBJECT.KEYID = 5
6,340,236 UART: [ldev] AUTHORITY.KEYID = 7
6,341,461 UART: [ldev] FE.KEYID = 1
6,351,296 UART: [ldev] Erasing FE.KEYID = 1
8,825,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,712 UART: [ldev] --
10,615,747 UART: [fwproc] Wait for Commands...
10,618,277 UART: [fwproc] Recv command 0x46574c44
10,620,376 UART: [fwproc] Recv'd Img size: 106684 bytes
13,927,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,901 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,041,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,358,797 >>> mbox cmd response: success
14,363,856 UART: [afmc] ++
14,364,442 UART: [afmc] CDI.KEYID = 6
14,365,353 UART: [afmc] SUBJECT.KEYID = 7
14,366,510 UART: [afmc] AUTHORITY.KEYID = 5
16,873,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,594,976 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,610,995 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,626,883 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,642,861 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,665,639 UART: [afmc] --
18,669,129 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,670,099 UART: [cold-reset] --
18,674,377 UART: [state] Locking Datavault
18,677,914 UART: [state] Locking PCR0, PCR1 and PCR31
18,679,614 UART: [state] Locking ICCM
18,681,835 UART: [exit] Launching FMC @ 0x40000000
18,690,194 UART:
18,690,471 UART: Running Caliptra FMC ...
18,691,576 UART:
18,691,735 UART: [fmc] Received command: 0x10000004
18,693,108 UART:
18,693,250 UART: Running Caliptra ROM ...
18,694,350 UART:
18,694,503 UART: [state] CFI Enabled
18,695,461 >>> mbox cmd response: success
18,705,265 UART: [state] LifecycleState = Unprovisioned
18,707,086 UART: [state] DebugLocked = No
18,709,006 UART: [state] WD Timer not started. Device not locked for debugging
18,712,296 UART: [kat] SHA2-256
18,891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,903,054 UART: [kat] ++
18,903,608 UART: [kat] sha1
18,914,173 UART: [kat] SHA2-256
18,917,239 UART: [kat] SHA2-384
18,921,926 UART: [kat] SHA2-512-ACC
18,924,860 UART: [kat] ECC-384
21,365,201 UART: [kat] HMAC-384Kdf
21,377,325 UART: [kat] LMS
21,906,866 UART: [kat] --
21,910,030 UART: [update-reset] ++
21,910,942 UART: Failed To Get Mailbox Txn
21,914,941 UART: ROM Non-Fatal Error: 0x01040004
21,916,971 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,918,378 UART: [state] Locking Datavault
21,922,761 UART: [state] Locking PCR0, PCR1 and PCR31
21,924,407 UART: [state] Locking ICCM
21,925,986 UART: [exit] Launching FMC @ 0x40000000
21,934,392 UART:
21,934,620 UART: Running Caliptra FMC ...
21,935,640 UART:
21,935,784 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,937,411 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,691,103 ready_for_fw is high
3,691,486 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,144,392 >>> mbox cmd response: success
18,376,627 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,392,819 UART:
18,393,172 UART: Running Caliptra FMC ...
18,394,433 UART:
18,394,623 UART: [fmc] Received command: 0x10000004
18,396,176 >>> mbox cmd response: success
21,478,322 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,490,142 UART:
21,490,406 UART: Running Caliptra FMC ...
21,491,489 UART:
21,491,634 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,493,267 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,313 UART:
192,676 UART: Running Caliptra ROM ...
193,864 UART:
194,054 UART: [state] CFI Enabled
261,371 UART: [state] LifecycleState = Unprovisioned
263,290 UART: [state] DebugLocked = No
265,115 UART: [state] WD Timer not started. Device not locked for debugging
268,077 UART: [kat] SHA2-256
447,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,721 UART: [kat] ++
459,263 UART: [kat] sha1
469,294 UART: [kat] SHA2-256
472,311 UART: [kat] SHA2-384
478,113 UART: [kat] SHA2-512-ACC
481,087 UART: [kat] ECC-384
2,925,881 UART: [kat] HMAC-384Kdf
2,947,438 UART: [kat] LMS
3,476,861 UART: [kat] --
3,482,938 UART: [cold-reset] ++
3,483,905 UART: [fht] FHT @ 0x50003400
3,496,021 UART: [idev] ++
3,496,589 UART: [idev] CDI.KEYID = 6
3,497,475 UART: [idev] SUBJECT.KEYID = 7
3,498,720 UART: [idev] UDS.KEYID = 0
3,499,621 ready_for_fw is high
3,499,801 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,634,033 UART: [idev] Erasing UDS.KEYID = 0
6,006,023 UART: [idev] Sha1 KeyId Algorithm
6,028,170 UART: [idev] --
6,032,233 UART: [ldev] ++
6,032,810 UART: [ldev] CDI.KEYID = 6
6,033,723 UART: [ldev] SUBJECT.KEYID = 5
6,034,885 UART: [ldev] AUTHORITY.KEYID = 7
6,036,118 UART: [ldev] FE.KEYID = 1
6,077,013 UART: [ldev] Erasing FE.KEYID = 1
8,580,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,053 UART: [ldev] --
10,390,509 UART: [fwproc] Wait for Commands...
10,392,494 UART: [fwproc] Recv command 0x46574c44
10,394,533 UART: [fwproc] Recv'd Img size: 106684 bytes
13,702,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,777,968 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,820,539 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,138,084 >>> mbox cmd response: success
14,142,950 UART: [afmc] ++
14,143,545 UART: [afmc] CDI.KEYID = 6
14,144,458 UART: [afmc] SUBJECT.KEYID = 7
14,145,641 UART: [afmc] AUTHORITY.KEYID = 5
16,678,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,402,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,404,486 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,420,476 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,436,402 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,452,338 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,475,291 UART: [afmc] --
18,479,657 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,480,631 UART: [cold-reset] --
18,482,261 UART: [state] Locking Datavault
18,487,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,489,597 UART: [state] Locking ICCM
18,491,478 UART: [exit] Launching FMC @ 0x40000000
18,499,821 UART:
18,500,068 UART: Running Caliptra FMC ...
18,501,196 UART:
18,501,358 UART: [fmc] Received command: 0x10000004
18,502,823 UART:
18,502,977 UART: Running Caliptra ROM ...
18,504,082 UART:
18,504,236 UART: [state] CFI Enabled
18,505,202 >>> mbox cmd response: success
18,564,347 UART: [state] LifecycleState = Unprovisioned
18,566,225 UART: [state] DebugLocked = No
18,568,693 UART: [state] WD Timer not started. Device not locked for debugging
18,571,829 UART: [kat] SHA2-256
18,750,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,762,516 UART: [kat] ++
18,763,058 UART: [kat] sha1
18,772,710 UART: [kat] SHA2-256
18,775,731 UART: [kat] SHA2-384
18,780,765 UART: [kat] SHA2-512-ACC
18,783,708 UART: [kat] ECC-384
21,248,646 UART: [kat] HMAC-384Kdf
21,272,000 UART: [kat] LMS
21,801,465 UART: [kat] --
21,805,603 UART: [update-reset] ++
21,806,526 UART: Failed To Get Mailbox Txn
21,808,993 UART: ROM Non-Fatal Error: 0x01040004 21,810,840 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,812,676 UART: [state] Locking Datavault
21,815,607 UART: [state] Locking PCR0, PCR1 and PCR31
21,817,311 UART: [state] Locking ICCM
21,819,868 UART: [exit] Launching FMC @ 0x40000000
21,828,263 UART:
21,828,500 UART: Running Caliptra FMC ...
21,829,601 UART:
21,829,777 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,831,383 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,381,387 ready_for_fw is high
3,382,008 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,951,054 >>> mbox cmd response: success
18,220,748 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,234,697 UART:
18,235,053 UART: Running Caliptra FMC ...
18,236,320 UART:
18,236,490 UART: [fmc] Received command: 0x10000004
18,238,035 >>> mbox cmd response: success
21,392,427 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,402,626 UART:
21,402,899 UART: Running Caliptra FMC ...
21,404,070 UART:
21,404,239 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,406,083 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,456 UART:
192,829 UART: Running Caliptra ROM ...
194,039 UART:
603,714 UART: [state] CFI Enabled
619,234 UART: [state] LifecycleState = Unprovisioned
621,136 UART: [state] DebugLocked = No
622,299 UART: [state] WD Timer not started. Device not locked for debugging
625,828 UART: [kat] SHA2-256
804,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,503 UART: [kat] ++
816,947 UART: [kat] sha1
827,387 UART: [kat] SHA2-256
830,391 UART: [kat] SHA2-384
835,382 UART: [kat] SHA2-512-ACC
838,324 UART: [kat] ECC-384
3,281,071 UART: [kat] HMAC-384Kdf
3,292,960 UART: [kat] LMS
3,822,435 UART: [kat] --
3,826,721 UART: [cold-reset] ++
3,828,220 UART: [fht] FHT @ 0x50003400
3,840,546 UART: [idev] ++
3,841,104 UART: [idev] CDI.KEYID = 6
3,842,132 UART: [idev] SUBJECT.KEYID = 7
3,843,228 UART: [idev] UDS.KEYID = 0
3,844,274 ready_for_fw is high
3,844,479 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,978,505 UART: [idev] Erasing UDS.KEYID = 0
6,318,507 UART: [idev] Sha1 KeyId Algorithm
6,341,646 UART: [idev] --
6,344,399 UART: [ldev] ++
6,344,966 UART: [ldev] CDI.KEYID = 6
6,345,914 UART: [ldev] SUBJECT.KEYID = 5
6,347,074 UART: [ldev] AUTHORITY.KEYID = 7
6,348,308 UART: [ldev] FE.KEYID = 1
6,359,767 UART: [ldev] Erasing FE.KEYID = 1
8,831,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,975 UART: [ldev] --
10,622,350 UART: [fwproc] Wait for Commands...
10,623,908 UART: [fwproc] Recv command 0x46574c44
10,626,000 UART: [fwproc] Recv'd Img size: 106684 bytes
13,929,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,022 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,041,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,359,244 >>> mbox cmd response: success
14,363,277 UART: [afmc] ++
14,363,864 UART: [afmc] CDI.KEYID = 6
14,364,771 UART: [afmc] SUBJECT.KEYID = 7
14,365,932 UART: [afmc] AUTHORITY.KEYID = 5
16,864,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,583,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,584,955 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,600,902 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,616,868 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,632,880 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,654,584 UART: [afmc] --
18,659,115 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,660,078 UART: [cold-reset] --
18,664,081 UART: [state] Locking Datavault
18,667,067 UART: [state] Locking PCR0, PCR1 and PCR31
18,668,788 UART: [state] Locking ICCM
18,671,099 UART: [exit] Launching FMC @ 0x40000000
18,679,508 UART:
18,679,740 UART: Running Caliptra FMC ...
18,680,838 UART:
18,680,994 UART: [fmc] Received command: 0x10000004
18,682,445 UART:
18,682,597 UART: Running Caliptra ROM ...
18,683,689 UART:
18,683,838 UART: [state] CFI Enabled
18,684,795 >>> mbox cmd response: success
18,698,949 UART: [state] LifecycleState = Unprovisioned
18,700,824 UART: [state] DebugLocked = No
18,702,691 UART: [state] WD Timer not started. Device not locked for debugging
18,707,008 UART: [kat] SHA2-256
18,886,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,897,743 UART: [kat] ++
18,898,284 UART: [kat] sha1
18,909,122 UART: [kat] SHA2-256
18,912,146 UART: [kat] SHA2-384
18,917,751 UART: [kat] SHA2-512-ACC
18,920,743 UART: [kat] ECC-384
21,360,307 UART: [kat] HMAC-384Kdf
21,373,391 UART: [kat] LMS
21,902,895 UART: [kat] --
21,907,899 UART: [update-reset] ++
21,908,816 UART: Failed To Get Mailbox Txn
21,910,983 UART: ROM Non-Fatal Error: 0x01040004
21,913,020 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,914,321 UART: [state] Locking Datavault
21,918,111 UART: [state] Locking PCR0, PCR1 and PCR31
21,919,755 UART: [state] Locking ICCM
21,922,379 UART: [exit] Launching FMC @ 0x40000000
21,930,783 UART:
21,931,014 UART: Running Caliptra FMC ...
21,932,051 UART:
21,932,198 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,933,829 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,696,890 ready_for_fw is high
3,697,503 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,143,241 >>> mbox cmd response: success
18,377,005 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,391,393 UART:
18,391,751 UART: Running Caliptra FMC ...
18,393,001 UART:
18,393,175 UART: [fmc] Received command: 0x10000004
18,394,723 >>> mbox cmd response: success
21,480,854 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,491,606 UART:
21,491,879 UART: Running Caliptra FMC ...
21,493,048 UART:
21,493,226 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,494,895 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,260 UART: [kat] LMS
1,168,572 UART: [kat] --
1,169,425 UART: [cold-reset] ++
1,169,831 UART: [fht] FHT @ 0x50003400
1,172,331 UART: [idev] ++
1,172,499 UART: [idev] CDI.KEYID = 6
1,172,860 UART: [idev] SUBJECT.KEYID = 7
1,173,285 UART: [idev] UDS.KEYID = 0
1,173,631 ready_for_fw is high
1,173,631 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,051 UART: [idev] Erasing UDS.KEYID = 0
1,197,999 UART: [idev] Sha1 KeyId Algorithm
1,207,061 UART: [idev] --
1,208,198 UART: [ldev] ++
1,208,366 UART: [ldev] CDI.KEYID = 6
1,208,730 UART: [ldev] SUBJECT.KEYID = 5
1,209,157 UART: [ldev] AUTHORITY.KEYID = 7
1,209,620 UART: [ldev] FE.KEYID = 1
1,214,656 UART: [ldev] Erasing FE.KEYID = 1
1,241,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,758 UART: [fwproc] Wait for Commands...
1,281,509 UART: [fwproc] Recv command 0x46574c44
1,282,242 UART: [fwproc] Recv'd Img size: 106684 bytes
2,490,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,157 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,671,730 >>> mbox cmd response: success
2,672,829 UART: [afmc] ++
2,672,997 UART: [afmc] CDI.KEYID = 6
2,673,360 UART: [afmc] SUBJECT.KEYID = 7
2,673,786 UART: [afmc] AUTHORITY.KEYID = 5
2,709,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,512 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,263 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,983 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,876 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,569 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,502 UART: [afmc] --
2,753,426 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,753,448 UART: [cold-reset] --
2,754,356 UART: [state] Locking Datavault
2,755,629 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,233 UART: [state] Locking ICCM
2,756,893 UART: [exit] Launching FMC @ 0x40000000
2,762,190 UART:
2,762,206 UART: Running Caliptra FMC ...
2,762,614 UART:
2,762,752 UART: [fmc] Received command: 0x10000004
2,763,489 >>> mbox cmd response: success
2,763,585 UART:
2,763,601 UART: Running Caliptra ROM ...
2,764,009 UART:
2,764,064 UART: [state] CFI Enabled
2,766,388 UART: [state] LifecycleState = Unprovisioned
2,767,043 UART: [state] DebugLocked = No
2,767,665 UART: [state] WD Timer not started. Device not locked for debugging
2,768,961 UART: [kat] SHA2-256
3,572,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,640 UART: [kat] ++
3,576,792 UART: [kat] sha1
3,581,014 UART: [kat] SHA2-256
3,582,954 UART: [kat] SHA2-384
3,585,611 UART: [kat] SHA2-512-ACC
3,587,511 UART: [kat] ECC-384
3,597,270 UART: [kat] HMAC-384Kdf
3,601,862 UART: [kat] LMS
3,850,174 UART: [kat] --
3,851,186 UART: [update-reset] ++
3,851,497 UART: Failed To Get Mailbox Txn
3,852,446 UART: ROM Non-Fatal Error: 0x01040004
3,853,121 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,853,374 UART: [state] Locking Datavault
3,854,132 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,736 UART: [state] Locking ICCM
3,855,160 UART: [exit] Launching FMC @ 0x40000000
3,860,457 UART:
3,860,473 UART: Running Caliptra FMC ...
3,860,881 UART:
3,861,011 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,861,787 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,632 ready_for_fw is high
1,055,632 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,062 >>> mbox cmd response: success
2,576,888 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,582,973 UART:
2,582,989 UART: Running Caliptra FMC ...
2,583,397 UART:
2,583,535 UART: [fmc] Received command: 0x10000004
2,584,272 >>> mbox cmd response: success
3,555,928 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,561,353 UART:
3,561,369 UART: Running Caliptra FMC ...
3,561,777 UART:
3,561,907 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,562,683 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,666 UART: [fht] FHT @ 0x50003400
1,173,254 UART: [idev] ++
1,173,422 UART: [idev] CDI.KEYID = 6
1,173,783 UART: [idev] SUBJECT.KEYID = 7
1,174,208 UART: [idev] UDS.KEYID = 0
1,174,554 ready_for_fw is high
1,174,554 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,788 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,699 UART: [ldev] ++
1,209,867 UART: [ldev] CDI.KEYID = 6
1,210,231 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,243,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,259 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,791 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,385 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,090 >>> mbox cmd response: success
2,674,229 UART: [afmc] ++
2,674,397 UART: [afmc] CDI.KEYID = 6
2,674,760 UART: [afmc] SUBJECT.KEYID = 7
2,675,186 UART: [afmc] AUTHORITY.KEYID = 5
2,710,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,165 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,885 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,778 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,471 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,298 UART: [afmc] --
2,754,268 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,754,290 UART: [cold-reset] --
2,755,264 UART: [state] Locking Datavault
2,756,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,935 UART: [state] Locking ICCM
2,757,555 UART: [exit] Launching FMC @ 0x40000000
2,762,852 UART:
2,762,868 UART: Running Caliptra FMC ...
2,763,276 UART:
2,763,414 UART: [fmc] Received command: 0x10000004
2,764,151 >>> mbox cmd response: success
2,764,247 UART:
2,764,263 UART: Running Caliptra ROM ...
2,764,671 UART:
2,764,813 UART: [state] CFI Enabled
2,768,023 UART: [state] LifecycleState = Unprovisioned
2,768,678 UART: [state] DebugLocked = No
2,769,188 UART: [state] WD Timer not started. Device not locked for debugging
2,770,542 UART: [kat] SHA2-256
3,574,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,221 UART: [kat] ++
3,578,373 UART: [kat] sha1
3,582,415 UART: [kat] SHA2-256
3,584,355 UART: [kat] SHA2-384
3,587,224 UART: [kat] SHA2-512-ACC
3,589,124 UART: [kat] ECC-384
3,599,125 UART: [kat] HMAC-384Kdf
3,603,727 UART: [kat] LMS
3,852,039 UART: [kat] --
3,852,703 UART: [update-reset] ++
3,853,014 UART: Failed To Get Mailbox Txn
3,853,751 UART: ROM Non-Fatal Error: 0x01040004
3,854,426 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,559 UART: [state] Locking Datavault
3,855,365 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,969 UART: [state] Locking ICCM
3,856,511 UART: [exit] Launching FMC @ 0x40000000
3,861,808 UART:
3,861,824 UART: Running Caliptra FMC ...
3,862,232 UART:
3,862,362 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,863,138 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,043 ready_for_fw is high
1,056,043 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,523,659 >>> mbox cmd response: success
2,579,735 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,334 UART:
2,586,350 UART: Running Caliptra FMC ...
2,586,758 UART:
2,586,896 UART: [fmc] Received command: 0x10000004
2,587,633 >>> mbox cmd response: success
3,560,412 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,565,561 UART:
3,565,577 UART: Running Caliptra FMC ...
3,565,985 UART:
3,566,115 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,566,891 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,772 UART: [kat] HMAC-384Kdf
921,334 UART: [kat] LMS
1,169,646 UART: [kat] --
1,170,719 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,809 UART: [idev] ++
1,173,977 UART: [idev] CDI.KEYID = 6
1,174,338 UART: [idev] SUBJECT.KEYID = 7
1,174,763 UART: [idev] UDS.KEYID = 0
1,175,109 ready_for_fw is high
1,175,109 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,507 UART: [idev] Erasing UDS.KEYID = 0
1,199,765 UART: [idev] Sha1 KeyId Algorithm
1,208,607 UART: [idev] --
1,209,530 UART: [ldev] ++
1,209,698 UART: [ldev] CDI.KEYID = 6
1,210,062 UART: [ldev] SUBJECT.KEYID = 5
1,210,489 UART: [ldev] AUTHORITY.KEYID = 7
1,210,952 UART: [ldev] FE.KEYID = 1
1,215,772 UART: [ldev] Erasing FE.KEYID = 1
1,241,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,370 UART: [ldev] --
1,280,780 UART: [fwproc] Wait for Commands...
1,281,553 UART: [fwproc] Recv command 0x46574c44
1,282,286 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,183 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,266 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,754 >>> mbox cmd response: success
2,673,799 UART: [afmc] ++
2,673,967 UART: [afmc] CDI.KEYID = 6
2,674,330 UART: [afmc] SUBJECT.KEYID = 7
2,674,756 UART: [afmc] AUTHORITY.KEYID = 5
2,709,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,519 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,239 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,132 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,825 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,558 UART: [afmc] --
2,752,634 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,752,656 UART: [cold-reset] --
2,753,736 UART: [state] Locking Datavault
2,754,921 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,525 UART: [state] Locking ICCM
2,755,981 UART: [exit] Launching FMC @ 0x40000000
2,761,278 UART:
2,761,294 UART: Running Caliptra FMC ...
2,761,702 UART:
2,761,840 UART: [fmc] Received command: 0x10000004
2,762,577 >>> mbox cmd response: success
2,762,673 UART:
2,762,689 UART: Running Caliptra ROM ...
2,763,097 UART:
2,763,152 UART: [state] CFI Enabled
2,765,902 UART: [state] LifecycleState = Unprovisioned
2,766,557 UART: [state] DebugLocked = No
2,767,095 UART: [state] WD Timer not started. Device not locked for debugging
2,768,257 UART: [kat] SHA2-256
3,571,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,575,936 UART: [kat] ++
3,576,088 UART: [kat] sha1
3,580,140 UART: [kat] SHA2-256
3,582,080 UART: [kat] SHA2-384
3,584,761 UART: [kat] SHA2-512-ACC
3,586,661 UART: [kat] ECC-384
3,596,256 UART: [kat] HMAC-384Kdf
3,600,782 UART: [kat] LMS
3,849,094 UART: [kat] --
3,849,944 UART: [update-reset] ++
3,850,255 UART: Failed To Get Mailbox Txn
3,850,980 UART: ROM Non-Fatal Error: 0x01040004
3,851,655 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,851,790 UART: [state] Locking Datavault
3,852,586 UART: [state] Locking PCR0, PCR1 and PCR31
3,853,190 UART: [state] Locking ICCM
3,853,654 UART: [exit] Launching FMC @ 0x40000000
3,858,951 UART:
3,858,967 UART: Running Caliptra FMC ...
3,859,375 UART:
3,859,505 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,860,281 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,374 ready_for_fw is high
1,056,374 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,590 >>> mbox cmd response: success
2,581,272 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,587,193 UART:
2,587,209 UART: Running Caliptra FMC ...
2,587,617 UART:
2,587,755 UART: [fmc] Received command: 0x10000004
2,588,492 >>> mbox cmd response: success
3,560,744 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,566,261 UART:
3,566,277 UART: Running Caliptra FMC ...
3,566,685 UART:
3,566,815 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,567,591 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,003 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,170,166 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,322 UART: [idev] ++
1,173,490 UART: [idev] CDI.KEYID = 6
1,173,851 UART: [idev] SUBJECT.KEYID = 7
1,174,276 UART: [idev] UDS.KEYID = 0
1,174,622 ready_for_fw is high
1,174,622 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,199,070 UART: [idev] Sha1 KeyId Algorithm
1,207,976 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,215,751 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,643 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,854 UART: [fwproc] Recv command 0x46574c44
1,282,587 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,248 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,987 >>> mbox cmd response: success
2,674,252 UART: [afmc] ++
2,674,420 UART: [afmc] CDI.KEYID = 6
2,674,783 UART: [afmc] SUBJECT.KEYID = 7
2,675,209 UART: [afmc] AUTHORITY.KEYID = 5
2,710,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,876 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,596 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,489 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,182 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,957 UART: [afmc] --
2,753,945 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,753,967 UART: [cold-reset] --
2,754,987 UART: [state] Locking Datavault
2,756,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,798 UART: [state] Locking ICCM
2,757,266 UART: [exit] Launching FMC @ 0x40000000
2,762,563 UART:
2,762,579 UART: Running Caliptra FMC ...
2,762,987 UART:
2,763,125 UART: [fmc] Received command: 0x10000004
2,763,862 >>> mbox cmd response: success
2,763,958 UART:
2,763,974 UART: Running Caliptra ROM ...
2,764,382 UART:
2,764,524 UART: [state] CFI Enabled
2,767,370 UART: [state] LifecycleState = Unprovisioned
2,768,025 UART: [state] DebugLocked = No
2,768,729 UART: [state] WD Timer not started. Device not locked for debugging
2,769,933 UART: [kat] SHA2-256
3,573,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,612 UART: [kat] ++
3,577,764 UART: [kat] sha1
3,582,020 UART: [kat] SHA2-256
3,583,960 UART: [kat] SHA2-384
3,586,769 UART: [kat] SHA2-512-ACC
3,588,669 UART: [kat] ECC-384
3,598,336 UART: [kat] HMAC-384Kdf
3,602,880 UART: [kat] LMS
3,851,192 UART: [kat] --
3,852,116 UART: [update-reset] ++
3,852,427 UART: Failed To Get Mailbox Txn
3,853,286 UART: ROM Non-Fatal Error: 0x01040004
3,853,961 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,854,064 UART: [state] Locking Datavault
3,855,026 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,630 UART: [state] Locking ICCM
3,856,116 UART: [exit] Launching FMC @ 0x40000000
3,861,413 UART:
3,861,429 UART: Running Caliptra FMC ...
3,861,837 UART:
3,861,967 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,743 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,457 ready_for_fw is high
1,056,457 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,447 >>> mbox cmd response: success
2,577,371 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,583,638 UART:
2,583,654 UART: Running Caliptra FMC ...
2,584,062 UART:
2,584,200 UART: [fmc] Received command: 0x10000004
2,584,937 >>> mbox cmd response: success
3,557,122 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,562,499 UART:
3,562,515 UART: Running Caliptra FMC ...
3,562,923 UART:
3,563,053 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,563,829 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,631 UART: [kat] ++
895,783 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
920,576 UART: [kat] LMS
1,168,888 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,165 UART: [fht] FHT @ 0x50003400
1,172,833 UART: [idev] ++
1,173,001 UART: [idev] CDI.KEYID = 6
1,173,362 UART: [idev] SUBJECT.KEYID = 7
1,173,787 UART: [idev] UDS.KEYID = 0
1,174,133 ready_for_fw is high
1,174,133 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,623 UART: [idev] Erasing UDS.KEYID = 0
1,198,759 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,800 UART: [ldev] ++
1,208,968 UART: [ldev] CDI.KEYID = 6
1,209,332 UART: [ldev] SUBJECT.KEYID = 5
1,209,759 UART: [ldev] AUTHORITY.KEYID = 7
1,210,222 UART: [ldev] FE.KEYID = 1
1,215,266 UART: [ldev] Erasing FE.KEYID = 1
1,241,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,418 UART: [ldev] --
1,280,840 UART: [fwproc] Wait for Commands...
1,281,465 UART: [fwproc] Recv command 0x46574c44
1,282,198 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,415 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,110 >>> mbox cmd response: success
2,673,147 UART: [afmc] ++
2,673,315 UART: [afmc] CDI.KEYID = 6
2,673,678 UART: [afmc] SUBJECT.KEYID = 7
2,674,104 UART: [afmc] AUTHORITY.KEYID = 5
2,708,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,725,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,373 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,093 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,737,986 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,743,679 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,576 UART: [afmc] --
2,752,514 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,752,536 UART: [cold-reset] --
2,753,286 UART: [state] Locking Datavault
2,754,387 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,991 UART: [state] Locking ICCM
2,755,427 UART: [exit] Launching FMC @ 0x40000000
2,760,724 UART:
2,760,740 UART: Running Caliptra FMC ...
2,761,148 UART:
2,761,286 UART: [fmc] Received command: 0x10000004
2,762,023 >>> mbox cmd response: success
2,762,119 UART:
2,762,135 UART: Running Caliptra ROM ...
2,762,543 UART:
2,762,598 UART: [state] CFI Enabled
2,765,508 UART: [state] LifecycleState = Unprovisioned
2,766,163 UART: [state] DebugLocked = No
2,766,663 UART: [state] WD Timer not started. Device not locked for debugging
2,767,871 UART: [kat] SHA2-256
3,571,421 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,575,550 UART: [kat] ++
3,575,702 UART: [kat] sha1
3,579,846 UART: [kat] SHA2-256
3,581,786 UART: [kat] SHA2-384
3,584,481 UART: [kat] SHA2-512-ACC
3,586,381 UART: [kat] ECC-384
3,595,974 UART: [kat] HMAC-384Kdf
3,600,676 UART: [kat] LMS
3,848,988 UART: [kat] --
3,849,756 UART: [update-reset] ++
3,850,067 UART: Failed To Get Mailbox Txn
3,850,864 UART: ROM Non-Fatal Error: 0x01040004
3,851,539 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,851,734 UART: [state] Locking Datavault
3,852,656 UART: [state] Locking PCR0, PCR1 and PCR31
3,853,260 UART: [state] Locking ICCM
3,853,712 UART: [exit] Launching FMC @ 0x40000000
3,859,009 UART:
3,859,025 UART: Running Caliptra FMC ...
3,859,433 UART:
3,859,563 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,860,339 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,830 ready_for_fw is high
1,055,830 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,222 >>> mbox cmd response: success
2,579,888 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,586,057 UART:
2,586,073 UART: Running Caliptra FMC ...
2,586,481 UART:
2,586,619 UART: [fmc] Received command: 0x10000004
2,587,356 >>> mbox cmd response: success
3,559,032 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,564,493 UART:
3,564,509 UART: Running Caliptra FMC ...
3,564,917 UART:
3,565,047 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,565,823 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,973 UART: [state] LifecycleState = Unprovisioned
85,628 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,519 UART: [kat] SHA2-256
891,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,468 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,174,496 ready_for_fw is high
1,174,496 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,868 UART: [idev] Erasing UDS.KEYID = 0
1,199,258 UART: [idev] Sha1 KeyId Algorithm
1,207,956 UART: [idev] --
1,208,847 UART: [ldev] ++
1,209,015 UART: [ldev] CDI.KEYID = 6
1,209,379 UART: [ldev] SUBJECT.KEYID = 5
1,209,806 UART: [ldev] AUTHORITY.KEYID = 7
1,210,269 UART: [ldev] FE.KEYID = 1
1,215,465 UART: [ldev] Erasing FE.KEYID = 1
1,242,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,419 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,810 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,369 >>> mbox cmd response: success
2,674,634 UART: [afmc] ++
2,674,802 UART: [afmc] CDI.KEYID = 6
2,675,165 UART: [afmc] SUBJECT.KEYID = 7
2,675,591 UART: [afmc] AUTHORITY.KEYID = 5
2,710,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,278 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,998 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,891 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,584 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,425 UART: [afmc] --
2,754,373 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,754,395 UART: [cold-reset] --
2,755,127 UART: [state] Locking Datavault
2,756,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,846 UART: [state] Locking ICCM
2,757,470 UART: [exit] Launching FMC @ 0x40000000
2,762,767 UART:
2,762,783 UART: Running Caliptra FMC ...
2,763,191 UART:
2,763,329 UART: [fmc] Received command: 0x10000004
2,764,066 >>> mbox cmd response: success
2,764,162 UART:
2,764,178 UART: Running Caliptra ROM ...
2,764,586 UART:
2,764,728 UART: [state] CFI Enabled
2,767,708 UART: [state] LifecycleState = Unprovisioned
2,768,363 UART: [state] DebugLocked = No
2,768,879 UART: [state] WD Timer not started. Device not locked for debugging
2,770,023 UART: [kat] SHA2-256
3,573,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,702 UART: [kat] ++
3,577,854 UART: [kat] sha1
3,581,864 UART: [kat] SHA2-256
3,583,804 UART: [kat] SHA2-384
3,586,593 UART: [kat] SHA2-512-ACC
3,588,493 UART: [kat] ECC-384
3,598,202 UART: [kat] HMAC-384Kdf
3,602,632 UART: [kat] LMS
3,850,944 UART: [kat] --
3,851,808 UART: [update-reset] ++
3,852,119 UART: Failed To Get Mailbox Txn
3,853,054 UART: ROM Non-Fatal Error: 0x01040004
3,853,729 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,853,956 UART: [state] Locking Datavault
3,854,756 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,360 UART: [state] Locking ICCM
3,855,794 UART: [exit] Launching FMC @ 0x40000000
3,861,091 UART:
3,861,107 UART: Running Caliptra FMC ...
3,861,515 UART:
3,861,645 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,862,421 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,385 ready_for_fw is high
1,056,385 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,659 >>> mbox cmd response: success
2,578,905 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,585,038 UART:
2,585,054 UART: Running Caliptra FMC ...
2,585,462 UART:
2,585,600 UART: [fmc] Received command: 0x10000004
2,586,337 >>> mbox cmd response: success
3,558,354 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,563,833 UART:
3,563,849 UART: Running Caliptra FMC ...
3,564,257 UART:
3,564,387 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,565,163 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,181 UART:
192,540 UART: Running Caliptra ROM ...
193,715 UART:
193,871 UART: [state] CFI Enabled
264,316 UART: [state] LifecycleState = Unprovisioned
266,644 UART: [state] DebugLocked = No
268,459 UART: [state] WD Timer not started. Device not locked for debugging
272,268 UART: [kat] SHA2-256
454,160 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,681 UART: [kat] ++
466,208 UART: [kat] sha1
476,726 UART: [kat] SHA2-256
479,731 UART: [kat] SHA2-384
485,576 UART: [kat] SHA2-512-ACC
488,150 UART: [kat] ECC-384
3,775,224 UART: [kat] HMAC-384Kdf
3,801,970 UART: [kat] LMS
4,875,105 UART: [kat] --
4,879,462 UART: [cold-reset] ++
4,881,532 UART: [fht] FHT @ 0x50003400
4,893,144 UART: [idev] ++
4,893,850 UART: [idev] CDI.KEYID = 6
4,894,954 UART: [idev] SUBJECT.KEYID = 7
4,896,197 UART: [idev] UDS.KEYID = 0
4,897,090 ready_for_fw is high
4,897,271 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,031,162 UART: [idev] Erasing UDS.KEYID = 0
8,241,230 UART: [idev] Sha1 KeyId Algorithm
8,264,303 UART: [idev] --
8,266,890 UART: [ldev] ++
8,267,460 UART: [ldev] CDI.KEYID = 6
8,268,618 UART: [ldev] SUBJECT.KEYID = 5
8,269,768 UART: [ldev] AUTHORITY.KEYID = 7
8,271,050 UART: [ldev] FE.KEYID = 1
8,316,288 UART: [ldev] Erasing FE.KEYID = 1
11,649,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,302 UART: [ldev] --
14,037,402 UART: [fwproc] Wait for Commands...
14,039,556 UART: [fwproc] Recv command 0x46574c44
14,041,863 UART: [fwproc] Recv'd Img size: 106340 bytes
18,016,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,091,246 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,133,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,450,200 >>> mbox cmd response: success
18,454,982 UART: [afmc] ++
18,455,575 UART: [afmc] CDI.KEYID = 6
18,456,738 UART: [afmc] SUBJECT.KEYID = 7
18,457,949 UART: [afmc] AUTHORITY.KEYID = 5
21,815,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,117,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,119,490 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,135,480 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,151,534 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,167,672 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,191,336 UART: [afmc] --
24,194,999 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,195,951 UART: [cold-reset] --
24,199,582 UART: [state] Locking Datavault
24,204,296 UART: [state] Locking PCR0, PCR1 and PCR31
24,205,994 UART: [state] Locking ICCM
24,207,457 UART: [exit] Launching FMC @ 0x40000000
24,216,078 UART:
24,216,310 UART: Running Caliptra FMC ...
24,217,408 UART:
24,217,566 UART: [fmc] Received command: 0x1000000B
24,219,020 UART:
24,219,177 UART: Running Caliptra ROM ...
24,220,271 UART:
24,220,426 UART: [state] CFI Enabled
24,282,119 UART: [state] LifecycleState = Unprovisioned
24,283,999 UART: [state] DebugLocked = No
24,286,518 UART: [state] WD Timer not started. Device not locked for debugging
24,291,450 UART: [kat] SHA2-256
24,473,350 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,484,902 UART: [kat] ++
24,485,437 UART: [kat] sha1
24,494,990 UART: [kat] SHA2-256
24,498,005 UART: [kat] SHA2-384
24,503,451 UART: [kat] SHA2-512-ACC
24,506,023 UART: [kat] ECC-384
27,796,775 UART: [kat] HMAC-384Kdf
27,822,615 UART: [kat] LMS
28,895,749 UART: [kat] --
28,900,832 UART: [update-reset] ++
28,901,974 UART: Invalid command 0x1000000b recv
28,905,057 UART: ROM Non-Fatal Error: 0x01040003
28,908,951 UART: [state] Locking Datavault
28,913,901 UART: [state] Locking PCR0, PCR1 and PCR31
28,916,092 UART: [state] Locking ICCM
28,917,839 UART: [exit] Launching FMC @ 0x40000000
28,926,410 UART:
28,926,660 UART: Running Caliptra FMC ...
28,927,846 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
4,782,928 ready_for_fw is high
4,783,563 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,219,888 >>> mbox cmd response: success
23,896,335 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
23,909,788 UART:
23,910,154 UART: Running Caliptra FMC ...
23,911,328 UART:
23,911,479 UART: [fmc] Received command: 0x1000000B
28,503,235 UART:
28,503,573 UART: Running Caliptra FMC ...
28,504,697 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,330 UART:
192,703 UART: Running Caliptra ROM ...
193,885 UART:
603,407 UART: [state] CFI Enabled
616,344 UART: [state] LifecycleState = Unprovisioned
618,637 UART: [state] DebugLocked = No
620,291 UART: [state] WD Timer not started. Device not locked for debugging
625,799 UART: [kat] SHA2-256
807,750 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,328 UART: [kat] ++
819,790 UART: [kat] sha1
831,041 UART: [kat] SHA2-256
834,099 UART: [kat] SHA2-384
838,464 UART: [kat] SHA2-512-ACC
841,039 UART: [kat] ECC-384
4,096,762 UART: [kat] HMAC-384Kdf
4,109,620 UART: [kat] LMS
5,182,763 UART: [kat] --
5,187,994 UART: [cold-reset] ++
5,190,155 UART: [fht] FHT @ 0x50003400
5,200,495 UART: [idev] ++
5,201,203 UART: [idev] CDI.KEYID = 6
5,202,447 UART: [idev] SUBJECT.KEYID = 7
5,203,832 UART: [idev] UDS.KEYID = 0
5,205,010 ready_for_fw is high
5,205,210 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,338,937 UART: [idev] Erasing UDS.KEYID = 0
8,493,049 UART: [idev] Sha1 KeyId Algorithm
8,514,363 UART: [idev] --
8,519,038 UART: [ldev] ++
8,519,616 UART: [ldev] CDI.KEYID = 6
8,520,716 UART: [ldev] SUBJECT.KEYID = 5
8,522,244 UART: [ldev] AUTHORITY.KEYID = 7
8,523,852 UART: [ldev] FE.KEYID = 1
8,534,338 UART: [ldev] Erasing FE.KEYID = 1
11,830,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,139,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,155,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,171,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,591 UART: [ldev] --
14,197,753 UART: [fwproc] Wait for Commands...
14,199,643 UART: [fwproc] Recv command 0x46574c44
14,201,952 UART: [fwproc] Recv'd Img size: 106340 bytes
18,183,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,256,384 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,298,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,614,321 >>> mbox cmd response: success
18,618,232 UART: [afmc] ++
18,618,809 UART: [afmc] CDI.KEYID = 6
18,620,047 UART: [afmc] SUBJECT.KEYID = 7
18,621,152 UART: [afmc] AUTHORITY.KEYID = 5
21,939,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,235,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,238,208 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,254,273 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,270,328 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,286,392 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,309,248 UART: [afmc] --
24,312,414 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,313,412 UART: [cold-reset] --
24,317,044 UART: [state] Locking Datavault
24,321,554 UART: [state] Locking PCR0, PCR1 and PCR31
24,323,195 UART: [state] Locking ICCM
24,326,072 UART: [exit] Launching FMC @ 0x40000000
24,334,676 UART:
24,334,901 UART: Running Caliptra FMC ...
24,335,915 UART:
24,336,056 UART: [fmc] Received command: 0x1000000B
24,337,505 UART:
24,337,653 UART: Running Caliptra ROM ...
24,338,738 UART:
24,338,940 UART: [state] CFI Enabled
24,353,873 UART: [state] LifecycleState = Unprovisioned
24,355,762 UART: [state] DebugLocked = No
24,357,413 UART: [state] WD Timer not started. Device not locked for debugging
24,362,753 UART: [kat] SHA2-256
24,544,698 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,556,220 UART: [kat] ++
24,556,725 UART: [kat] sha1
24,566,845 UART: [kat] SHA2-256
24,569,908 UART: [kat] SHA2-384
24,577,014 UART: [kat] SHA2-512-ACC
24,579,630 UART: [kat] ECC-384
27,833,562 UART: [kat] HMAC-384Kdf
27,845,743 UART: [kat] LMS
28,918,915 UART: [kat] --
28,923,880 UART: [update-reset] ++
28,925,022 UART: Invalid command 0x1000000b recv
28,929,511 UART: ROM Non-Fatal Error: 0x01040003
28,932,746 UART: [state] Locking Datavault
28,937,535 UART: [state] Locking PCR0, PCR1 and PCR31
28,939,727 UART: [state] Locking ICCM
28,941,423 UART: [exit] Launching FMC @ 0x40000000
28,950,084 UART:
28,950,333 UART: Running Caliptra FMC ...
28,951,472 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
5,101,528 ready_for_fw is high
5,102,153 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,417,710 >>> mbox cmd response: success
24,044,895 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
24,060,194 UART:
24,060,574 UART: Running Caliptra FMC ...
24,061,767 UART:
24,061,920 UART: [fmc] Received command: 0x1000000B
28,561,023 UART:
28,561,363 UART: Running Caliptra FMC ...
28,562,445 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,870 writing to cptra_bootfsm_go
193,123 UART:
193,478 UART: Running Caliptra ROM ...
194,565 UART:
194,707 UART: [state] CFI Enabled
264,658 UART: [state] LifecycleState = Unprovisioned
266,516 UART: [state] DebugLocked = No
269,246 UART: [state] WD Timer not started. Device not locked for debugging
273,632 UART: [kat] SHA2-256
452,758 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,344 UART: [kat] ++
464,879 UART: [kat] sha1
475,474 UART: [kat] SHA2-256
478,554 UART: [kat] SHA2-384
484,209 UART: [kat] SHA2-512-ACC
487,112 UART: [kat] ECC-384
2,949,984 UART: [kat] HMAC-384Kdf
2,973,295 UART: [kat] LMS
3,502,811 UART: [kat] --
3,506,662 UART: [cold-reset] ++
3,507,885 UART: [fht] FHT @ 0x50003400
3,518,534 UART: [idev] ++
3,519,109 UART: [idev] CDI.KEYID = 6
3,520,018 UART: [idev] SUBJECT.KEYID = 7
3,521,273 UART: [idev] UDS.KEYID = 0
3,522,197 ready_for_fw is high
3,522,383 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,656,640 UART: [idev] Erasing UDS.KEYID = 0
6,026,446 UART: [idev] Sha1 KeyId Algorithm
6,050,030 UART: [idev] --
6,054,403 UART: [ldev] ++
6,054,986 UART: [ldev] CDI.KEYID = 6
6,055,903 UART: [ldev] SUBJECT.KEYID = 5
6,056,982 UART: [ldev] AUTHORITY.KEYID = 7
6,058,323 UART: [ldev] FE.KEYID = 1
6,102,620 UART: [ldev] Erasing FE.KEYID = 1
8,604,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,809 UART: [ldev] --
10,417,196 UART: [fwproc] Wait for Commands...
10,419,623 UART: [fwproc] Recv command 0x46574c44
10,421,721 UART: [fwproc] Recv'd Img size: 106684 bytes
13,728,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,800,997 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,843,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,161,863 >>> mbox cmd response: success
14,165,645 UART: [afmc] ++
14,166,263 UART: [afmc] CDI.KEYID = 6
14,167,176 UART: [afmc] SUBJECT.KEYID = 7
14,168,337 UART: [afmc] AUTHORITY.KEYID = 5
16,703,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,425,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,427,525 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,443,458 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,459,382 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,475,353 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,498,739 UART: [afmc] --
18,501,602 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,502,565 UART: [cold-reset] --
18,506,188 UART: [state] Locking Datavault
18,512,525 UART: [state] Locking PCR0, PCR1 and PCR31
18,514,178 UART: [state] Locking ICCM
18,515,738 UART: [exit] Launching FMC @ 0x40000000
18,524,139 UART:
18,524,375 UART: Running Caliptra FMC ...
18,525,476 UART:
18,525,657 UART: [fmc] Received command: 0x1000000B
18,527,119 UART:
18,527,276 UART: Running Caliptra ROM ...
18,528,373 UART:
18,528,529 UART: [state] CFI Enabled
18,589,803 UART: [state] LifecycleState = Unprovisioned
18,591,680 UART: [state] DebugLocked = No
18,593,978 UART: [state] WD Timer not started. Device not locked for debugging
18,597,226 UART: [kat] SHA2-256
18,776,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,787,911 UART: [kat] ++
18,788,446 UART: [kat] sha1
18,799,607 UART: [kat] SHA2-256
18,802,645 UART: [kat] SHA2-384
18,807,800 UART: [kat] SHA2-512-ACC
18,810,746 UART: [kat] ECC-384
21,276,085 UART: [kat] HMAC-384Kdf
21,298,726 UART: [kat] LMS
21,828,190 UART: [kat] --
21,831,408 UART: [update-reset] ++
21,832,328 UART: Invalid command 0x1000000b recv
21,837,418 UART: ROM Non-Fatal Error: 0x01040003
21,840,258 UART: [state] Locking Datavault
21,843,633 UART: [state] Locking PCR0, PCR1 and PCR31
21,845,353 UART: [state] Locking ICCM
21,846,879 UART: [exit] Launching FMC @ 0x40000000
21,855,293 UART:
21,855,540 UART: Running Caliptra FMC ...
21,856,682 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,372,427 ready_for_fw is high
3,372,816 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,968,291 >>> mbox cmd response: success
18,233,801 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,248,811 UART:
18,249,194 UART: Running Caliptra FMC ...
18,250,463 UART:
18,250,627 UART: [fmc] Received command: 0x1000000B
21,439,837 UART:
21,440,177 UART: Running Caliptra FMC ...
21,441,353 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,323 UART:
192,693 UART: Running Caliptra ROM ...
193,828 UART:
603,273 UART: [state] CFI Enabled
619,697 UART: [state] LifecycleState = Unprovisioned
621,567 UART: [state] DebugLocked = No
623,169 UART: [state] WD Timer not started. Device not locked for debugging
626,272 UART: [kat] SHA2-256
805,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,959 UART: [kat] ++
817,489 UART: [kat] sha1
828,794 UART: [kat] SHA2-256
831,797 UART: [kat] SHA2-384
838,436 UART: [kat] SHA2-512-ACC
841,380 UART: [kat] ECC-384
3,284,759 UART: [kat] HMAC-384Kdf
3,296,731 UART: [kat] LMS
3,826,266 UART: [kat] --
3,830,116 UART: [cold-reset] ++
3,831,832 UART: [fht] FHT @ 0x50003400
3,844,155 UART: [idev] ++
3,844,718 UART: [idev] CDI.KEYID = 6
3,845,672 UART: [idev] SUBJECT.KEYID = 7
3,846,834 UART: [idev] UDS.KEYID = 0
3,847,829 ready_for_fw is high
3,848,027 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,982,120 UART: [idev] Erasing UDS.KEYID = 0
6,316,228 UART: [idev] Sha1 KeyId Algorithm
6,338,856 UART: [idev] --
6,342,917 UART: [ldev] ++
6,343,485 UART: [ldev] CDI.KEYID = 6
6,344,393 UART: [ldev] SUBJECT.KEYID = 5
6,345,550 UART: [ldev] AUTHORITY.KEYID = 7
6,346,829 UART: [ldev] FE.KEYID = 1
6,358,390 UART: [ldev] Erasing FE.KEYID = 1
8,830,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,543 UART: [ldev] --
10,619,818 UART: [fwproc] Wait for Commands...
10,622,022 UART: [fwproc] Recv command 0x46574c44
10,624,115 UART: [fwproc] Recv'd Img size: 106684 bytes
13,929,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,094 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,046,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,364,377 >>> mbox cmd response: success
14,368,712 UART: [afmc] ++
14,369,299 UART: [afmc] CDI.KEYID = 6
14,370,214 UART: [afmc] SUBJECT.KEYID = 7
14,371,430 UART: [afmc] AUTHORITY.KEYID = 5
16,867,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,589,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,591,357 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,607,323 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,623,265 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,639,200 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,661,098 UART: [afmc] --
18,664,319 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,665,279 UART: [cold-reset] --
18,669,472 UART: [state] Locking Datavault
18,673,590 UART: [state] Locking PCR0, PCR1 and PCR31
18,675,287 UART: [state] Locking ICCM
18,677,699 UART: [exit] Launching FMC @ 0x40000000
18,686,055 UART:
18,686,344 UART: Running Caliptra FMC ...
18,687,450 UART:
18,687,607 UART: [fmc] Received command: 0x1000000B
18,689,066 UART:
18,689,221 UART: Running Caliptra ROM ...
18,690,313 UART:
18,690,466 UART: [state] CFI Enabled
18,701,802 UART: [state] LifecycleState = Unprovisioned
18,703,674 UART: [state] DebugLocked = No
18,706,175 UART: [state] WD Timer not started. Device not locked for debugging
18,710,161 UART: [kat] SHA2-256
18,889,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,900,906 UART: [kat] ++
18,901,441 UART: [kat] sha1
18,911,628 UART: [kat] SHA2-256
18,914,685 UART: [kat] SHA2-384
18,920,775 UART: [kat] SHA2-512-ACC
18,923,709 UART: [kat] ECC-384
21,367,063 UART: [kat] HMAC-384Kdf
21,378,161 UART: [kat] LMS
21,907,717 UART: [kat] --
21,912,470 UART: [update-reset] ++
21,913,387 UART: Invalid command 0x1000000b recv
21,916,808 UART: ROM Non-Fatal Error: 0x01040003
21,919,079 UART: [state] Locking Datavault
21,922,084 UART: [state] Locking PCR0, PCR1 and PCR31
21,923,768 UART: [state] Locking ICCM
21,925,566 UART: [exit] Launching FMC @ 0x40000000
21,934,016 UART:
21,934,263 UART: Running Caliptra FMC ...
21,935,317 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,690,008 ready_for_fw is high
3,690,409 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,139,837 >>> mbox cmd response: success
18,374,762 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,390,592 UART:
18,390,948 UART: Running Caliptra FMC ...
18,392,136 UART:
18,392,286 UART: [fmc] Received command: 0x1000000B
21,488,547 UART:
21,488,873 UART: Running Caliptra FMC ...
21,489,993 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,079 UART:
192,460 UART: Running Caliptra ROM ...
193,558 UART:
193,700 UART: [state] CFI Enabled
263,925 UART: [state] LifecycleState = Unprovisioned
265,842 UART: [state] DebugLocked = No
267,860 UART: [state] WD Timer not started. Device not locked for debugging
271,058 UART: [kat] SHA2-256
450,111 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,704 UART: [kat] ++
462,236 UART: [kat] sha1
473,613 UART: [kat] SHA2-256
476,695 UART: [kat] SHA2-384
483,537 UART: [kat] SHA2-512-ACC
486,471 UART: [kat] ECC-384
2,946,422 UART: [kat] HMAC-384Kdf
2,971,180 UART: [kat] LMS
3,500,624 UART: [kat] --
3,505,003 UART: [cold-reset] ++
3,507,584 UART: [fht] FHT @ 0x50003400
3,518,782 UART: [idev] ++
3,519,357 UART: [idev] CDI.KEYID = 6
3,520,267 UART: [idev] SUBJECT.KEYID = 7
3,521,467 UART: [idev] UDS.KEYID = 0
3,522,453 ready_for_fw is high
3,522,646 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,656,894 UART: [idev] Erasing UDS.KEYID = 0
6,027,681 UART: [idev] Sha1 KeyId Algorithm
6,049,725 UART: [idev] --
6,053,790 UART: [ldev] ++
6,054,370 UART: [ldev] CDI.KEYID = 6
6,055,259 UART: [ldev] SUBJECT.KEYID = 5
6,056,473 UART: [ldev] AUTHORITY.KEYID = 7
6,057,707 UART: [ldev] FE.KEYID = 1
6,099,664 UART: [ldev] Erasing FE.KEYID = 1
8,605,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,276 UART: [ldev] --
10,413,468 UART: [fwproc] Wait for Commands...
10,415,290 UART: [fwproc] Recv command 0x46574c44
10,417,399 UART: [fwproc] Recv'd Img size: 106684 bytes
13,721,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,796,588 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,839,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,157,078 >>> mbox cmd response: success
14,161,135 UART: [afmc] ++
14,161,724 UART: [afmc] CDI.KEYID = 6
14,162,631 UART: [afmc] SUBJECT.KEYID = 7
14,163,728 UART: [afmc] AUTHORITY.KEYID = 5
16,702,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,427,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,429,206 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,445,218 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,461,135 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,477,052 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,498,608 UART: [afmc] --
18,501,631 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,502,572 UART: [cold-reset] --
18,505,466 UART: [state] Locking Datavault
18,511,332 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,986 UART: [state] Locking ICCM
18,514,323 UART: [exit] Launching FMC @ 0x40000000
18,522,722 UART:
18,522,959 UART: Running Caliptra FMC ...
18,524,061 UART:
18,524,218 UART: [fmc] Received command: 0x1000000B
18,525,675 UART:
18,525,828 UART: Running Caliptra ROM ...
18,526,945 UART:
18,527,099 UART: [state] CFI Enabled
18,590,215 UART: [state] LifecycleState = Unprovisioned
18,592,099 UART: [state] DebugLocked = No
18,594,078 UART: [state] WD Timer not started. Device not locked for debugging
18,597,268 UART: [kat] SHA2-256
18,776,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,788,006 UART: [kat] ++
18,788,558 UART: [kat] sha1
18,799,989 UART: [kat] SHA2-256
18,803,060 UART: [kat] SHA2-384
18,808,289 UART: [kat] SHA2-512-ACC
18,811,229 UART: [kat] ECC-384
21,274,503 UART: [kat] HMAC-384Kdf
21,295,526 UART: [kat] LMS
21,824,983 UART: [kat] --
21,829,026 UART: [update-reset] ++
21,829,956 UART: Invalid command 0x1000000b recv
21,833,299 UART: ROM Non-Fatal Error: 0x01040003
21,837,118 UART: [state] Locking Datavault
21,839,921 UART: [state] Locking PCR0, PCR1 and PCR31
21,841,614 UART: [state] Locking ICCM
21,843,980 UART: [exit] Launching FMC @ 0x40000000
21,852,394 UART:
21,852,687 UART: Running Caliptra FMC ...
21,853,845 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,361,678 ready_for_fw is high
3,362,089 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,914,799 >>> mbox cmd response: success
18,177,778 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,194,433 UART:
18,194,821 UART: Running Caliptra FMC ...
18,196,092 UART:
18,196,276 UART: [fmc] Received command: 0x1000000B
21,384,949 UART:
21,385,283 UART: Running Caliptra FMC ...
21,386,462 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,641 UART:
193,002 UART: Running Caliptra ROM ...
194,155 UART:
603,711 UART: [state] CFI Enabled
616,254 UART: [state] LifecycleState = Unprovisioned
618,152 UART: [state] DebugLocked = No
619,898 UART: [state] WD Timer not started. Device not locked for debugging
624,358 UART: [kat] SHA2-256
803,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,044 UART: [kat] ++
815,522 UART: [kat] sha1
825,541 UART: [kat] SHA2-256
828,555 UART: [kat] SHA2-384
834,398 UART: [kat] SHA2-512-ACC
837,335 UART: [kat] ECC-384
3,281,064 UART: [kat] HMAC-384Kdf
3,293,932 UART: [kat] LMS
3,823,466 UART: [kat] --
3,828,523 UART: [cold-reset] ++
3,830,022 UART: [fht] FHT @ 0x50003400
3,842,065 UART: [idev] ++
3,842,634 UART: [idev] CDI.KEYID = 6
3,843,543 UART: [idev] SUBJECT.KEYID = 7
3,844,713 UART: [idev] UDS.KEYID = 0
3,845,636 ready_for_fw is high
3,845,825 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,979,901 UART: [idev] Erasing UDS.KEYID = 0
6,318,212 UART: [idev] Sha1 KeyId Algorithm
6,341,488 UART: [idev] --
6,346,657 UART: [ldev] ++
6,347,221 UART: [ldev] CDI.KEYID = 6
6,348,131 UART: [ldev] SUBJECT.KEYID = 5
6,349,291 UART: [ldev] AUTHORITY.KEYID = 7
6,350,571 UART: [ldev] FE.KEYID = 1
6,362,563 UART: [ldev] Erasing FE.KEYID = 1
8,837,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,410 UART: [ldev] --
10,624,384 UART: [fwproc] Wait for Commands...
10,627,304 UART: [fwproc] Recv command 0x46574c44
10,629,400 UART: [fwproc] Recv'd Img size: 106684 bytes
13,937,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,453 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,057,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,374,236 >>> mbox cmd response: success
14,378,132 UART: [afmc] ++
14,378,716 UART: [afmc] CDI.KEYID = 6
14,379,626 UART: [afmc] SUBJECT.KEYID = 7
14,380,836 UART: [afmc] AUTHORITY.KEYID = 5
16,881,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,600,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,532 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,618,488 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,634,387 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,650,334 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,672,756 UART: [afmc] --
18,677,327 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,678,218 UART: [cold-reset] --
18,682,652 UART: [state] Locking Datavault
18,688,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,690,383 UART: [state] Locking ICCM
18,691,382 UART: [exit] Launching FMC @ 0x40000000
18,699,789 UART:
18,700,020 UART: Running Caliptra FMC ...
18,701,116 UART:
18,701,271 UART: [fmc] Received command: 0x1000000B
18,702,642 UART:
18,702,783 UART: Running Caliptra ROM ...
18,703,876 UART:
18,704,028 UART: [state] CFI Enabled
18,718,714 UART: [state] LifecycleState = Unprovisioned
18,720,559 UART: [state] DebugLocked = No
18,722,256 UART: [state] WD Timer not started. Device not locked for debugging
18,725,922 UART: [kat] SHA2-256
18,905,049 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,916,675 UART: [kat] ++
18,917,207 UART: [kat] sha1
18,928,093 UART: [kat] SHA2-256
18,931,089 UART: [kat] SHA2-384
18,936,596 UART: [kat] SHA2-512-ACC
18,939,538 UART: [kat] ECC-384
21,382,236 UART: [kat] HMAC-384Kdf
21,396,302 UART: [kat] LMS
21,925,827 UART: [kat] --
21,929,811 UART: [update-reset] ++
21,930,724 UART: Invalid command 0x1000000b recv
21,933,825 UART: ROM Non-Fatal Error: 0x01040003
21,936,732 UART: [state] Locking Datavault
21,939,547 UART: [state] Locking PCR0, PCR1 and PCR31
21,941,229 UART: [state] Locking ICCM
21,943,888 UART: [exit] Launching FMC @ 0x40000000
21,952,336 UART:
21,952,581 UART: Running Caliptra FMC ...
21,953,645 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,694,510 ready_for_fw is high
3,694,893 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,147,427 >>> mbox cmd response: success
18,377,366 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,393,719 UART:
18,394,071 UART: Running Caliptra FMC ...
18,395,330 UART:
18,395,492 UART: [fmc] Received command: 0x1000000B
21,495,059 UART:
21,495,400 UART: Running Caliptra FMC ...
21,496,681 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,646 UART: [state] LifecycleState = Unprovisioned
86,301 UART: [state] DebugLocked = No
86,999 UART: [state] WD Timer not started. Device not locked for debugging
88,276 UART: [kat] SHA2-256
891,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,955 UART: [kat] ++
896,107 UART: [kat] sha1
900,351 UART: [kat] SHA2-256
902,291 UART: [kat] SHA2-384
904,988 UART: [kat] SHA2-512-ACC
906,889 UART: [kat] ECC-384
916,704 UART: [kat] HMAC-384Kdf
921,304 UART: [kat] LMS
1,169,616 UART: [kat] --
1,170,389 UART: [cold-reset] ++
1,170,877 UART: [fht] FHT @ 0x50003400
1,173,469 UART: [idev] ++
1,173,637 UART: [idev] CDI.KEYID = 6
1,173,998 UART: [idev] SUBJECT.KEYID = 7
1,174,423 UART: [idev] UDS.KEYID = 0
1,174,769 ready_for_fw is high
1,174,769 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,101 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,314 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,367 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,964 >>> mbox cmd response: success
2,674,037 UART: [afmc] ++
2,674,205 UART: [afmc] CDI.KEYID = 6
2,674,568 UART: [afmc] SUBJECT.KEYID = 7
2,674,994 UART: [afmc] AUTHORITY.KEYID = 5
2,711,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,241 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,961 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,854 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,547 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,426 UART: [afmc] --
2,754,454 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,754,476 UART: [cold-reset] --
2,755,188 UART: [state] Locking Datavault
2,756,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,079 UART: [state] Locking ICCM
2,757,659 UART: [exit] Launching FMC @ 0x40000000
2,762,956 UART:
2,762,972 UART: Running Caliptra FMC ...
2,763,380 UART:
2,763,518 UART: [fmc] Received command: 0x1000000B
2,764,350 UART:
2,764,366 UART: Running Caliptra ROM ...
2,764,774 UART:
2,764,829 UART: [state] CFI Enabled
2,767,527 UART: [state] LifecycleState = Unprovisioned
2,768,182 UART: [state] DebugLocked = No
2,768,856 UART: [state] WD Timer not started. Device not locked for debugging
2,770,006 UART: [kat] SHA2-256
3,573,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,685 UART: [kat] ++
3,577,837 UART: [kat] sha1
3,582,055 UART: [kat] SHA2-256
3,583,995 UART: [kat] SHA2-384
3,586,818 UART: [kat] SHA2-512-ACC
3,588,718 UART: [kat] ECC-384
3,598,101 UART: [kat] HMAC-384Kdf
3,602,805 UART: [kat] LMS
3,851,117 UART: [kat] --
3,851,859 UART: [update-reset] ++
3,852,176 UART: Invalid command 0x1000000b recv
3,853,434 UART: ROM Non-Fatal Error: 0x01040003
3,854,260 UART: [state] Locking Datavault
3,854,894 UART: [state] Locking PCR0, PCR1 and PCR31
3,855,498 UART: [state] Locking ICCM
3,856,012 UART: [exit] Launching FMC @ 0x40000000
3,861,309 UART:
3,861,325 UART: Running Caliptra FMC ...
3,861,733 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,742 ready_for_fw is high
1,055,742 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,250 >>> mbox cmd response: success
2,577,884 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,584,013 UART:
2,584,029 UART: Running Caliptra FMC ...
2,584,437 UART:
2,584,575 UART: [fmc] Received command: 0x1000000B
3,562,690 UART:
3,562,706 UART: Running Caliptra FMC ...
3,563,114 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,034 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,286 UART: [kat] SHA2-256
902,226 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,623 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,774 UART: [cold-reset] ++
1,171,170 UART: [fht] FHT @ 0x50003400
1,173,944 UART: [idev] ++
1,174,112 UART: [idev] CDI.KEYID = 6
1,174,473 UART: [idev] SUBJECT.KEYID = 7
1,174,898 UART: [idev] UDS.KEYID = 0
1,175,244 ready_for_fw is high
1,175,244 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,183,066 UART: [idev] Erasing UDS.KEYID = 0
1,200,082 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,421 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,635 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,500 UART: [fwproc] Recv command 0x46574c44
1,283,233 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,290 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,899 >>> mbox cmd response: success
2,674,168 UART: [afmc] ++
2,674,336 UART: [afmc] CDI.KEYID = 6
2,674,699 UART: [afmc] SUBJECT.KEYID = 7
2,675,125 UART: [afmc] AUTHORITY.KEYID = 5
2,711,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,992 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,712 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,605 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,298 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,191 UART: [afmc] --
2,754,089 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,754,111 UART: [cold-reset] --
2,755,073 UART: [state] Locking Datavault
2,756,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,836 UART: [state] Locking ICCM
2,757,416 UART: [exit] Launching FMC @ 0x40000000
2,762,713 UART:
2,762,729 UART: Running Caliptra FMC ...
2,763,137 UART:
2,763,275 UART: [fmc] Received command: 0x1000000B
2,764,107 UART:
2,764,123 UART: Running Caliptra ROM ...
2,764,531 UART:
2,764,673 UART: [state] CFI Enabled
2,767,771 UART: [state] LifecycleState = Unprovisioned
2,768,426 UART: [state] DebugLocked = No
2,768,912 UART: [state] WD Timer not started. Device not locked for debugging
2,770,266 UART: [kat] SHA2-256
3,573,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,945 UART: [kat] ++
3,578,097 UART: [kat] sha1
3,582,231 UART: [kat] SHA2-256
3,584,171 UART: [kat] SHA2-384
3,587,090 UART: [kat] SHA2-512-ACC
3,588,990 UART: [kat] ECC-384
3,598,585 UART: [kat] HMAC-384Kdf
3,603,093 UART: [kat] LMS
3,851,405 UART: [kat] --
3,852,501 UART: [update-reset] ++
3,852,818 UART: Invalid command 0x1000000b recv
3,853,786 UART: ROM Non-Fatal Error: 0x01040003
3,854,664 UART: [state] Locking Datavault
3,855,540 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,144 UART: [state] Locking ICCM
3,856,740 UART: [exit] Launching FMC @ 0x40000000
3,862,037 UART:
3,862,053 UART: Running Caliptra FMC ...
3,862,461 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,313 ready_for_fw is high
1,056,313 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,835 >>> mbox cmd response: success
2,578,033 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,584,306 UART:
2,584,322 UART: Running Caliptra FMC ...
2,584,730 UART:
2,584,868 UART: [fmc] Received command: 0x1000000B
3,564,010 UART:
3,564,026 UART: Running Caliptra FMC ...
3,564,434 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,838 UART: [kat] LMS
1,169,150 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 ready_for_fw is high
1,174,573 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,045 UART: [idev] Erasing UDS.KEYID = 0
1,199,739 UART: [idev] Sha1 KeyId Algorithm
1,208,615 UART: [idev] --
1,209,734 UART: [ldev] ++
1,209,902 UART: [ldev] CDI.KEYID = 6
1,210,266 UART: [ldev] SUBJECT.KEYID = 5
1,210,693 UART: [ldev] AUTHORITY.KEYID = 7
1,211,156 UART: [ldev] FE.KEYID = 1
1,216,516 UART: [ldev] Erasing FE.KEYID = 1
1,242,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,030 UART: [ldev] --
1,282,376 UART: [fwproc] Wait for Commands...
1,283,147 UART: [fwproc] Recv command 0x46574c44
1,283,880 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,521,377 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,539,460 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,675,118 >>> mbox cmd response: success
2,676,267 UART: [afmc] ++
2,676,435 UART: [afmc] CDI.KEYID = 6
2,676,798 UART: [afmc] SUBJECT.KEYID = 7
2,677,224 UART: [afmc] AUTHORITY.KEYID = 5
2,713,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,730,571 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,736,291 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,742,184 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,877 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,755,888 UART: [afmc] --
2,756,748 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,756,770 UART: [cold-reset] --
2,757,474 UART: [state] Locking Datavault
2,758,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,759,287 UART: [state] Locking ICCM
2,759,725 UART: [exit] Launching FMC @ 0x40000000
2,765,022 UART:
2,765,038 UART: Running Caliptra FMC ...
2,765,446 UART:
2,765,584 UART: [fmc] Received command: 0x1000000B
2,766,416 UART:
2,766,432 UART: Running Caliptra ROM ...
2,766,840 UART:
2,766,895 UART: [state] CFI Enabled
2,769,241 UART: [state] LifecycleState = Unprovisioned
2,769,896 UART: [state] DebugLocked = No
2,770,572 UART: [state] WD Timer not started. Device not locked for debugging
2,771,760 UART: [kat] SHA2-256
3,575,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,439 UART: [kat] ++
3,579,591 UART: [kat] sha1
3,583,643 UART: [kat] SHA2-256
3,585,583 UART: [kat] SHA2-384
3,588,366 UART: [kat] SHA2-512-ACC
3,590,266 UART: [kat] ECC-384
3,600,105 UART: [kat] HMAC-384Kdf
3,604,671 UART: [kat] LMS
3,852,983 UART: [kat] --
3,853,863 UART: [update-reset] ++
3,854,180 UART: Invalid command 0x1000000b recv
3,855,290 UART: ROM Non-Fatal Error: 0x01040003
3,856,084 UART: [state] Locking Datavault
3,856,796 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,400 UART: [state] Locking ICCM
3,857,986 UART: [exit] Launching FMC @ 0x40000000
3,863,283 UART:
3,863,299 UART: Running Caliptra FMC ...
3,863,707 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,272 ready_for_fw is high
1,057,272 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,058 >>> mbox cmd response: success
2,579,172 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,585,603 UART:
2,585,619 UART: Running Caliptra FMC ...
2,586,027 UART:
2,586,165 UART: [fmc] Received command: 0x1000000B
3,564,170 UART:
3,564,186 UART: Running Caliptra FMC ...
3,564,594 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
891,157 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,286 UART: [kat] ++
895,438 UART: [kat] sha1
899,536 UART: [kat] SHA2-256
901,476 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,613 UART: [kat] LMS
1,168,925 UART: [kat] --
1,169,892 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 ready_for_fw is high
1,174,478 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,972 UART: [idev] Erasing UDS.KEYID = 0
1,198,924 UART: [idev] Sha1 KeyId Algorithm
1,207,838 UART: [idev] --
1,208,827 UART: [ldev] ++
1,208,995 UART: [ldev] CDI.KEYID = 6
1,209,359 UART: [ldev] SUBJECT.KEYID = 5
1,209,786 UART: [ldev] AUTHORITY.KEYID = 7
1,210,249 UART: [ldev] FE.KEYID = 1
1,215,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,745 UART: [fwproc] Wait for Commands...
1,282,534 UART: [fwproc] Recv command 0x46574c44
1,283,267 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,180 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,891 >>> mbox cmd response: success
2,674,982 UART: [afmc] ++
2,675,150 UART: [afmc] CDI.KEYID = 6
2,675,513 UART: [afmc] SUBJECT.KEYID = 7
2,675,939 UART: [afmc] AUTHORITY.KEYID = 5
2,711,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,614 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,734,334 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,227 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,920 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,785 UART: [afmc] --
2,754,813 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,754,835 UART: [cold-reset] --
2,755,659 UART: [state] Locking Datavault
2,756,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,322 UART: [state] Locking ICCM
2,757,798 UART: [exit] Launching FMC @ 0x40000000
2,763,095 UART:
2,763,111 UART: Running Caliptra FMC ...
2,763,519 UART:
2,763,657 UART: [fmc] Received command: 0x1000000B
2,764,489 UART:
2,764,505 UART: Running Caliptra ROM ...
2,764,913 UART:
2,765,055 UART: [state] CFI Enabled
2,767,961 UART: [state] LifecycleState = Unprovisioned
2,768,616 UART: [state] DebugLocked = No
2,769,240 UART: [state] WD Timer not started. Device not locked for debugging
2,770,492 UART: [kat] SHA2-256
3,574,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,171 UART: [kat] ++
3,578,323 UART: [kat] sha1
3,582,625 UART: [kat] SHA2-256
3,584,565 UART: [kat] SHA2-384
3,587,278 UART: [kat] SHA2-512-ACC
3,589,178 UART: [kat] ECC-384
3,599,111 UART: [kat] HMAC-384Kdf
3,603,905 UART: [kat] LMS
3,852,217 UART: [kat] --
3,852,919 UART: [update-reset] ++
3,853,236 UART: Invalid command 0x1000000b recv
3,854,344 UART: ROM Non-Fatal Error: 0x01040003
3,855,110 UART: [state] Locking Datavault
3,855,872 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,476 UART: [state] Locking ICCM
3,856,940 UART: [exit] Launching FMC @ 0x40000000
3,862,237 UART:
3,862,253 UART: Running Caliptra FMC ...
3,862,661 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,395 ready_for_fw is high
1,056,395 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,655 >>> mbox cmd response: success
2,578,709 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,585,014 UART:
2,585,030 UART: Running Caliptra FMC ...
2,585,438 UART:
2,585,576 UART: [fmc] Received command: 0x1000000B
3,565,168 UART:
3,565,184 UART: Running Caliptra FMC ...
3,565,592 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
891,064 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,193 UART: [kat] ++
895,345 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,268 UART: [kat] SHA2-512-ACC
906,169 UART: [kat] ECC-384
915,848 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,697 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,174,105 ready_for_fw is high
1,174,105 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,157 UART: [idev] Sha1 KeyId Algorithm
1,207,903 UART: [idev] --
1,208,978 UART: [ldev] ++
1,209,146 UART: [ldev] CDI.KEYID = 6
1,209,510 UART: [ldev] SUBJECT.KEYID = 5
1,209,937 UART: [ldev] AUTHORITY.KEYID = 7
1,210,400 UART: [ldev] FE.KEYID = 1
1,215,768 UART: [ldev] Erasing FE.KEYID = 1
1,242,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,820 UART: [ldev] --
1,282,198 UART: [fwproc] Wait for Commands...
1,282,945 UART: [fwproc] Recv command 0x46574c44
1,283,678 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,101 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,671,696 >>> mbox cmd response: success
2,672,741 UART: [afmc] ++
2,672,909 UART: [afmc] CDI.KEYID = 6
2,673,272 UART: [afmc] SUBJECT.KEYID = 7
2,673,698 UART: [afmc] AUTHORITY.KEYID = 5
2,709,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,865 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,585 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,478 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,171 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,044 UART: [afmc] --
2,752,940 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,752,962 UART: [cold-reset] --
2,753,998 UART: [state] Locking Datavault
2,755,339 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,943 UART: [state] Locking ICCM
2,756,407 UART: [exit] Launching FMC @ 0x40000000
2,761,704 UART:
2,761,720 UART: Running Caliptra FMC ...
2,762,128 UART:
2,762,266 UART: [fmc] Received command: 0x1000000B
2,763,098 UART:
2,763,114 UART: Running Caliptra ROM ...
2,763,522 UART:
2,763,577 UART: [state] CFI Enabled
2,766,337 UART: [state] LifecycleState = Unprovisioned
2,766,992 UART: [state] DebugLocked = No
2,767,522 UART: [state] WD Timer not started. Device not locked for debugging
2,768,786 UART: [kat] SHA2-256
3,572,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,465 UART: [kat] ++
3,576,617 UART: [kat] sha1
3,581,035 UART: [kat] SHA2-256
3,582,975 UART: [kat] SHA2-384
3,585,520 UART: [kat] SHA2-512-ACC
3,587,420 UART: [kat] ECC-384
3,596,807 UART: [kat] HMAC-384Kdf
3,601,543 UART: [kat] LMS
3,849,855 UART: [kat] --
3,850,583 UART: [update-reset] ++
3,850,900 UART: Invalid command 0x1000000b recv
3,851,928 UART: ROM Non-Fatal Error: 0x01040003
3,852,702 UART: [state] Locking Datavault
3,853,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,854,096 UART: [state] Locking ICCM
3,854,762 UART: [exit] Launching FMC @ 0x40000000
3,860,059 UART:
3,860,075 UART: Running Caliptra FMC ...
3,860,483 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,130 ready_for_fw is high
1,056,130 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,076 >>> mbox cmd response: success
2,578,274 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,584,451 UART:
2,584,467 UART: Running Caliptra FMC ...
2,584,875 UART:
2,585,013 UART: [fmc] Received command: 0x1000000B
3,562,728 UART:
3,562,744 UART: Running Caliptra FMC ...
3,563,152 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,172,932 UART: [idev] ++
1,173,100 UART: [idev] CDI.KEYID = 6
1,173,461 UART: [idev] SUBJECT.KEYID = 7
1,173,886 UART: [idev] UDS.KEYID = 0
1,174,232 ready_for_fw is high
1,174,232 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,064 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,587 UART: [ldev] ++
1,209,755 UART: [ldev] CDI.KEYID = 6
1,210,119 UART: [ldev] SUBJECT.KEYID = 5
1,210,546 UART: [ldev] AUTHORITY.KEYID = 7
1,211,009 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,871 UART: [ldev] --
1,282,207 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,577 UART: [fwproc] Recv'd Img size: 106684 bytes
2,494,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,548 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,674,233 >>> mbox cmd response: success
2,675,474 UART: [afmc] ++
2,675,642 UART: [afmc] CDI.KEYID = 6
2,676,005 UART: [afmc] SUBJECT.KEYID = 7
2,676,431 UART: [afmc] AUTHORITY.KEYID = 5
2,712,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,729,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,876 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,596 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,489 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,747,182 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,911 UART: [afmc] --
2,755,853 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,755,875 UART: [cold-reset] --
2,756,587 UART: [state] Locking Datavault
2,757,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,112 UART: [state] Locking ICCM
2,758,618 UART: [exit] Launching FMC @ 0x40000000
2,763,915 UART:
2,763,931 UART: Running Caliptra FMC ...
2,764,339 UART:
2,764,477 UART: [fmc] Received command: 0x1000000B
2,765,309 UART:
2,765,325 UART: Running Caliptra ROM ...
2,765,733 UART:
2,765,875 UART: [state] CFI Enabled
2,768,873 UART: [state] LifecycleState = Unprovisioned
2,769,528 UART: [state] DebugLocked = No
2,770,200 UART: [state] WD Timer not started. Device not locked for debugging
2,771,432 UART: [kat] SHA2-256
3,574,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,579,111 UART: [kat] ++
3,579,263 UART: [kat] sha1
3,583,657 UART: [kat] SHA2-256
3,585,597 UART: [kat] SHA2-384
3,588,326 UART: [kat] SHA2-512-ACC
3,590,226 UART: [kat] ECC-384
3,600,185 UART: [kat] HMAC-384Kdf
3,605,015 UART: [kat] LMS
3,853,327 UART: [kat] --
3,854,315 UART: [update-reset] ++
3,854,632 UART: Invalid command 0x1000000b recv
3,855,844 UART: ROM Non-Fatal Error: 0x01040003
3,856,688 UART: [state] Locking Datavault
3,857,280 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,884 UART: [state] Locking ICCM
3,858,318 UART: [exit] Launching FMC @ 0x40000000
3,863,615 UART:
3,863,631 UART: Running Caliptra FMC ...
3,864,039 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,531 ready_for_fw is high
1,056,531 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,899 >>> mbox cmd response: success
2,581,613 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,587,546 UART:
2,587,562 UART: Running Caliptra FMC ...
2,587,970 UART:
2,588,108 UART: [fmc] Received command: 0x1000000B
3,566,662 UART:
3,566,678 UART: Running Caliptra FMC ...
3,567,086 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,095 UART:
192,457 UART: Running Caliptra ROM ...
193,634 UART:
193,788 UART: [state] CFI Enabled
262,638 UART: [state] LifecycleState = Unprovisioned
265,059 UART: [state] DebugLocked = No
266,667 UART: [state] WD Timer not started. Device not locked for debugging
271,265 UART: [kat] SHA2-256
453,206 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,716 UART: [kat] ++
465,189 UART: [kat] sha1
476,135 UART: [kat] SHA2-256
479,144 UART: [kat] SHA2-384
484,350 UART: [kat] SHA2-512-ACC
486,921 UART: [kat] ECC-384
3,776,539 UART: [kat] HMAC-384Kdf
3,803,131 UART: [kat] LMS
4,876,328 UART: [kat] --
4,881,259 UART: [cold-reset] ++
4,883,835 UART: [fht] FHT @ 0x50003400
4,895,948 UART: [idev] ++
4,896,597 UART: [idev] CDI.KEYID = 6
4,897,841 UART: [idev] SUBJECT.KEYID = 7
4,898,943 UART: [idev] UDS.KEYID = 0
4,899,888 ready_for_fw is high
4,900,082 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,040,090 UART: [idev] Erasing UDS.KEYID = 0
8,245,008 UART: [idev] Sha1 KeyId Algorithm
8,266,795 UART: [idev] --
8,270,842 UART: [ldev] ++
8,271,411 UART: [ldev] CDI.KEYID = 6
8,272,646 UART: [ldev] SUBJECT.KEYID = 5
8,273,806 UART: [ldev] AUTHORITY.KEYID = 7
8,274,965 UART: [ldev] FE.KEYID = 1
8,317,758 UART: [ldev] Erasing FE.KEYID = 1
11,652,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,011 UART: [ldev] --
14,038,062 UART: [fwproc] Wait for Commands...
14,039,621 UART: [fwproc] Recv command 0x46574c44
14,041,928 UART: [fwproc] Recv'd Img size: 111408 bytes
18,085,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,159,170 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,219,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,535,637 >>> mbox cmd response: success
18,539,282 UART: [afmc] ++
18,539,874 UART: [afmc] CDI.KEYID = 6
18,541,105 UART: [afmc] SUBJECT.KEYID = 7
18,542,205 UART: [afmc] AUTHORITY.KEYID = 5
21,906,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,204,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,206,968 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,223,171 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,239,247 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,255,116 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,276,524 UART: [afmc] --
24,280,927 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,421,594 UART: [cold-reset] --
24,422,472 UART: [state] Locking Datavault
24,423,552 UART: [state] Locking PCR0, PCR1 and PCR31
24,425,087 UART: [state] Locking ICCM
24,425,970 UART: [exit] Launching FMC @ 0x40000000
24,427,314 UART:
24,427,463 UART: Running Caliptra FMC ...
24,428,559 UART:
24,428,730 UART: [fmc] Received command: 0x46574C44
24,430,102 UART:
24,430,249 UART: Running Caliptra ROM ...
24,431,350 UART:
24,431,502 UART: [state] CFI Enabled
24,497,950 UART: [state] LifecycleState = Unprovisioned
24,499,881 UART: [state] DebugLocked = No
24,502,095 UART: [state] WD Timer not started. Device not locked for debugging
24,506,007 UART: [kat] SHA2-256
24,687,945 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,699,488 UART: [kat] ++
24,699,945 UART: [kat] sha1
24,710,453 UART: [kat] SHA2-256
24,713,463 UART: [kat] SHA2-384
24,718,526 UART: [kat] SHA2-512-ACC
24,721,147 UART: [kat] ECC-384
28,009,575 UART: [kat] HMAC-384Kdf
28,035,540 UART: [kat] LMS
29,108,692 UART: [kat] --
29,114,626 UART: [update-reset] ++
33,176,657 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,179,919 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,552,570 >>> mbox cmd response: success
33,553,163 UART: [update-reset] Copying MAN_2 To MAN_1
33,576,040 UART: [update-reset Success] --
33,577,680 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,580,166 UART: [state] Locking Datavault
33,582,720 UART: [state] Locking PCR0, PCR1 and PCR31
33,584,415 UART: [state] Locking ICCM
33,587,105 UART: [exit] Launching FMC @ 0x40000000
33,595,728 UART:
33,595,958 UART: Running Caliptra FMC ...
33,597,076 UART:
33,597,234 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,598,887 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,840 writing to cptra_bootfsm_go
4,783,271 ready_for_fw is high
4,783,943 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,299,260 >>> mbox cmd response: success
23,987,604 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,128,358 UART:
24,128,751 UART: Running Caliptra FMC ...
24,129,881 UART:
24,130,032 UART: [fmc] Received command: 0x46574C44
33,148,267 >>> mbox cmd response: success
33,169,857 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,182,874 UART:
33,183,125 UART: Running Caliptra FMC ...
33,184,290 UART:
33,184,449 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,186,117 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,401 UART:
192,763 UART: Running Caliptra ROM ...
193,853 UART:
603,715 UART: [state] CFI Enabled
617,012 UART: [state] LifecycleState = Unprovisioned
619,382 UART: [state] DebugLocked = No
620,823 UART: [state] WD Timer not started. Device not locked for debugging
625,340 UART: [kat] SHA2-256
807,316 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,885 UART: [kat] ++
819,400 UART: [kat] sha1
829,342 UART: [kat] SHA2-256
832,345 UART: [kat] SHA2-384
837,355 UART: [kat] SHA2-512-ACC
839,956 UART: [kat] ECC-384
4,095,773 UART: [kat] HMAC-384Kdf
4,106,837 UART: [kat] LMS
5,179,946 UART: [kat] --
5,183,682 UART: [cold-reset] ++
5,185,258 UART: [fht] FHT @ 0x50003400
5,198,008 UART: [idev] ++
5,198,720 UART: [idev] CDI.KEYID = 6
5,199,890 UART: [idev] SUBJECT.KEYID = 7
5,201,341 UART: [idev] UDS.KEYID = 0
5,202,600 ready_for_fw is high
5,202,806 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,342,802 UART: [idev] Erasing UDS.KEYID = 0
8,493,997 UART: [idev] Sha1 KeyId Algorithm
8,516,473 UART: [idev] --
8,520,969 UART: [ldev] ++
8,521,577 UART: [ldev] CDI.KEYID = 6
8,522,680 UART: [ldev] SUBJECT.KEYID = 5
8,524,218 UART: [ldev] AUTHORITY.KEYID = 7
8,525,688 UART: [ldev] FE.KEYID = 1
8,536,923 UART: [ldev] Erasing FE.KEYID = 1
11,828,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,135,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,151,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,167,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,188,970 UART: [ldev] --
14,194,281 UART: [fwproc] Wait for Commands...
14,196,961 UART: [fwproc] Recv command 0x46574c44
14,199,360 UART: [fwproc] Recv'd Img size: 111408 bytes
18,237,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,314,728 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,374,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,690,851 >>> mbox cmd response: success
18,694,742 UART: [afmc] ++
18,695,338 UART: [afmc] CDI.KEYID = 6
18,696,437 UART: [afmc] SUBJECT.KEYID = 7
18,697,700 UART: [afmc] AUTHORITY.KEYID = 5
22,009,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,304,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,306,974 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
24,323,191 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
24,339,285 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
24,355,102 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
24,377,568 UART: [afmc] --
24,382,596 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,523,267 UART: [cold-reset] --
24,524,149 UART: [state] Locking Datavault
24,525,308 UART: [state] Locking PCR0, PCR1 and PCR31
24,526,837 UART: [state] Locking ICCM
24,527,740 UART: [exit] Launching FMC @ 0x40000000
24,529,157 UART:
24,529,307 UART: Running Caliptra FMC ...
24,530,395 UART:
24,530,542 UART: [fmc] Received command: 0x46574C44
24,531,988 UART:
24,532,134 UART: Running Caliptra ROM ...
24,533,218 UART:
24,533,362 UART: [state] CFI Enabled
24,539,401 UART: [state] LifecycleState = Unprovisioned
24,541,214 UART: [state] DebugLocked = No
24,543,225 UART: [state] WD Timer not started. Device not locked for debugging
24,547,014 UART: [kat] SHA2-256
24,728,754 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,740,331 UART: [kat] ++
24,740,779 UART: [kat] sha1
24,751,064 UART: [kat] SHA2-256
24,754,075 UART: [kat] SHA2-384
24,760,544 UART: [kat] SHA2-512-ACC
24,763,148 UART: [kat] ECC-384
28,017,607 UART: [kat] HMAC-384Kdf
28,029,956 UART: [kat] LMS
29,103,090 UART: [kat] --
29,106,935 UART: [update-reset] ++
33,166,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,169,301 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
33,541,917 >>> mbox cmd response: success
33,542,370 UART: [update-reset] Copying MAN_2 To MAN_1
33,565,261 UART: [update-reset Success] --
33,566,967 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,569,732 UART: [state] Locking Datavault
33,573,049 UART: [state] Locking PCR0, PCR1 and PCR31
33,574,748 UART: [state] Locking ICCM
33,577,766 UART: [exit] Launching FMC @ 0x40000000
33,586,425 UART:
33,586,658 UART: Running Caliptra FMC ...
33,587,751 UART:
33,587,900 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,589,524 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
5,101,663 ready_for_fw is high
5,102,206 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,486,772 >>> mbox cmd response: success
24,114,254 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
24,254,938 UART:
24,255,327 UART: Running Caliptra FMC ...
24,256,540 UART:
24,256,707 UART: [fmc] Received command: 0x46574C44
33,174,735 >>> mbox cmd response: success
33,196,533 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,208,321 UART:
33,208,581 UART: Running Caliptra FMC ...
33,209,740 UART:
33,209,891 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,211,515 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
192,296 UART:
192,639 UART: Running Caliptra ROM ...
193,814 UART:
193,961 UART: [state] CFI Enabled
261,430 UART: [state] LifecycleState = Unprovisioned
263,254 UART: [state] DebugLocked = No
264,451 UART: [state] WD Timer not started. Device not locked for debugging
269,068 UART: [kat] SHA2-256
448,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,722 UART: [kat] ++
460,171 UART: [kat] sha1
472,755 UART: [kat] SHA2-256
475,734 UART: [kat] SHA2-384
482,086 UART: [kat] SHA2-512-ACC
485,027 UART: [kat] ECC-384
2,947,289 UART: [kat] HMAC-384Kdf
2,970,408 UART: [kat] LMS
3,499,860 UART: [kat] --
3,504,062 UART: [cold-reset] ++
3,505,286 UART: [fht] FHT @ 0x50003400
3,515,354 UART: [idev] ++
3,515,954 UART: [idev] CDI.KEYID = 6
3,516,874 UART: [idev] SUBJECT.KEYID = 7
3,518,049 UART: [idev] UDS.KEYID = 0
3,519,049 ready_for_fw is high
3,519,257 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,659,756 UART: [idev] Erasing UDS.KEYID = 0
6,024,183 UART: [idev] Sha1 KeyId Algorithm
6,046,825 UART: [idev] --
6,051,849 UART: [ldev] ++
6,052,423 UART: [ldev] CDI.KEYID = 6
6,053,353 UART: [ldev] SUBJECT.KEYID = 5
6,054,522 UART: [ldev] AUTHORITY.KEYID = 7
6,055,758 UART: [ldev] FE.KEYID = 1
6,098,547 UART: [ldev] Erasing FE.KEYID = 1
8,603,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,885 UART: [ldev] --
10,413,900 UART: [fwproc] Wait for Commands...
10,415,677 UART: [fwproc] Recv command 0x46574c44
10,417,770 UART: [fwproc] Recv'd Img size: 111752 bytes
13,788,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,859,214 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,919,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,237,763 >>> mbox cmd response: success
14,242,866 UART: [afmc] ++
14,243,460 UART: [afmc] CDI.KEYID = 6
14,244,371 UART: [afmc] SUBJECT.KEYID = 7
14,245,531 UART: [afmc] AUTHORITY.KEYID = 5
16,786,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,310 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,545,384 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,561,403 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,577,134 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,600,022 UART: [afmc] --
18,605,091 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,746,503 UART: [cold-reset] --
18,747,385 UART: [state] Locking Datavault
18,748,549 UART: [state] Locking PCR0, PCR1 and PCR31
18,750,105 UART: [state] Locking ICCM
18,751,066 UART: [exit] Launching FMC @ 0x40000000
18,752,497 UART:
18,752,656 UART: Running Caliptra FMC ...
18,753,764 UART:
18,753,924 UART: [fmc] Received command: 0x46574C44
18,755,394 UART:
18,755,548 UART: Running Caliptra ROM ...
18,756,560 UART:
18,756,703 UART: [state] CFI Enabled
18,821,300 UART: [state] LifecycleState = Unprovisioned
18,823,177 UART: [state] DebugLocked = No
18,824,484 UART: [state] WD Timer not started. Device not locked for debugging
18,828,443 UART: [kat] SHA2-256
19,007,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,019,151 UART: [kat] ++
19,019,721 UART: [kat] sha1
19,031,083 UART: [kat] SHA2-256
19,034,141 UART: [kat] SHA2-384
19,039,104 UART: [kat] SHA2-512-ACC
19,042,058 UART: [kat] ECC-384
21,505,545 UART: [kat] HMAC-384Kdf
21,527,920 UART: [kat] LMS
22,057,341 UART: [kat] --
22,060,144 UART: [update-reset] ++
25,453,375 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,456,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,830,307 >>> mbox cmd response: success
25,831,823 UART: [update-reset] Copying MAN_2 To MAN_1
25,854,145 UART: [update-reset Success] --
25,855,422 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,857,320 UART: [state] Locking Datavault
25,860,537 UART: [state] Locking PCR0, PCR1 and PCR31
25,862,240 UART: [state] Locking ICCM
25,863,419 UART: [exit] Launching FMC @ 0x40000000
25,871,817 UART:
25,872,054 UART: Running Caliptra FMC ...
25,873,161 UART:
25,873,313 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,874,937 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,360,977 ready_for_fw is high
3,361,585 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,032,101 >>> mbox cmd response: success
18,307,964 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,449,109 UART:
18,449,486 UART: Running Caliptra FMC ...
18,450,605 UART:
18,450,757 UART: [fmc] Received command: 0x46574C44
25,382,201 >>> mbox cmd response: success
25,403,731 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,417,444 UART:
25,417,699 UART: Running Caliptra FMC ...
25,418,861 UART:
25,419,018 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,420,683 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,476 UART:
192,848 UART: Running Caliptra ROM ...
194,201 UART:
603,655 UART: [state] CFI Enabled
613,763 UART: [state] LifecycleState = Unprovisioned
615,636 UART: [state] DebugLocked = No
618,588 UART: [state] WD Timer not started. Device not locked for debugging
621,839 UART: [kat] SHA2-256
800,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,517 UART: [kat] ++
813,057 UART: [kat] sha1
823,369 UART: [kat] SHA2-256
826,369 UART: [kat] SHA2-384
832,007 UART: [kat] SHA2-512-ACC
835,001 UART: [kat] ECC-384
3,277,706 UART: [kat] HMAC-384Kdf
3,290,504 UART: [kat] LMS
3,819,988 UART: [kat] --
3,823,625 UART: [cold-reset] ++
3,825,836 UART: [fht] FHT @ 0x50003400
3,837,376 UART: [idev] ++
3,837,937 UART: [idev] CDI.KEYID = 6
3,838,817 UART: [idev] SUBJECT.KEYID = 7
3,840,099 UART: [idev] UDS.KEYID = 0
3,841,050 ready_for_fw is high
3,841,255 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,981,662 UART: [idev] Erasing UDS.KEYID = 0
6,311,494 UART: [idev] Sha1 KeyId Algorithm
6,333,962 UART: [idev] --
6,336,975 UART: [ldev] ++
6,337,538 UART: [ldev] CDI.KEYID = 6
6,338,499 UART: [ldev] SUBJECT.KEYID = 5
6,339,651 UART: [ldev] AUTHORITY.KEYID = 7
6,340,879 UART: [ldev] FE.KEYID = 1
6,352,383 UART: [ldev] Erasing FE.KEYID = 1
8,823,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,605,992 UART: [ldev] --
10,610,561 UART: [fwproc] Wait for Commands...
10,612,060 UART: [fwproc] Recv command 0x46574c44
10,614,155 UART: [fwproc] Recv'd Img size: 111752 bytes
13,980,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,055,870 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,116,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,434,084 >>> mbox cmd response: success
14,438,640 UART: [afmc] ++
14,439,231 UART: [afmc] CDI.KEYID = 6
14,440,140 UART: [afmc] SUBJECT.KEYID = 7
14,441,353 UART: [afmc] AUTHORITY.KEYID = 5
16,943,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,662,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,664,020 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,680,084 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,696,117 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,711,785 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,733,701 UART: [afmc] --
18,738,084 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,879,140 UART: [cold-reset] --
18,880,007 UART: [state] Locking Datavault
18,881,167 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,698 UART: [state] Locking ICCM
18,883,601 UART: [exit] Launching FMC @ 0x40000000
18,885,020 UART:
18,885,187 UART: Running Caliptra FMC ...
18,886,280 UART:
18,886,431 UART: [fmc] Received command: 0x46574C44
18,887,884 UART:
18,888,032 UART: Running Caliptra ROM ...
18,889,125 UART:
18,889,292 UART: [state] CFI Enabled
18,897,232 UART: [state] LifecycleState = Unprovisioned
18,899,111 UART: [state] DebugLocked = No
18,900,587 UART: [state] WD Timer not started. Device not locked for debugging
18,904,750 UART: [kat] SHA2-256
19,083,899 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,095,495 UART: [kat] ++
19,096,039 UART: [kat] sha1
19,105,962 UART: [kat] SHA2-256
19,109,024 UART: [kat] SHA2-384
19,114,356 UART: [kat] SHA2-512-ACC
19,117,299 UART: [kat] ECC-384
21,558,813 UART: [kat] HMAC-384Kdf
21,571,535 UART: [kat] LMS
22,101,052 UART: [kat] --
22,105,284 UART: [update-reset] ++
25,511,013 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,514,121 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,888,001 >>> mbox cmd response: success
25,889,482 UART: [update-reset] Copying MAN_2 To MAN_1
25,911,813 UART: [update-reset Success] --
25,913,074 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,917,514 UART: [state] Locking Datavault
25,921,142 UART: [state] Locking PCR0, PCR1 and PCR31
25,922,837 UART: [state] Locking ICCM
25,925,474 UART: [exit] Launching FMC @ 0x40000000
25,933,869 UART:
25,934,108 UART: Running Caliptra FMC ...
25,935,205 UART:
25,935,357 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,936,980 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
3,701,409 ready_for_fw is high
3,701,816 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,243,634 >>> mbox cmd response: success
18,470,025 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,611,106 UART:
18,611,497 UART: Running Caliptra FMC ...
18,612,731 UART:
18,612,900 UART: [fmc] Received command: 0x46574C44
25,472,797 >>> mbox cmd response: success
25,494,552 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,505,630 UART:
25,505,879 UART: Running Caliptra FMC ...
25,507,045 UART:
25,507,211 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,508,850 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,013 UART:
192,391 UART: Running Caliptra ROM ...
193,516 UART:
193,665 UART: [state] CFI Enabled
266,353 UART: [state] LifecycleState = Unprovisioned
268,256 UART: [state] DebugLocked = No
270,701 UART: [state] WD Timer not started. Device not locked for debugging
273,620 UART: [kat] SHA2-256
452,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,280 UART: [kat] ++
464,818 UART: [kat] sha1
475,203 UART: [kat] SHA2-256
478,287 UART: [kat] SHA2-384
485,102 UART: [kat] SHA2-512-ACC
488,015 UART: [kat] ECC-384
2,951,232 UART: [kat] HMAC-384Kdf
2,972,995 UART: [kat] LMS
3,502,518 UART: [kat] --
3,507,790 UART: [cold-reset] ++
3,508,726 UART: [fht] FHT @ 0x50003400
3,520,980 UART: [idev] ++
3,521,552 UART: [idev] CDI.KEYID = 6
3,522,462 UART: [idev] SUBJECT.KEYID = 7
3,523,639 UART: [idev] UDS.KEYID = 0
3,524,779 ready_for_fw is high
3,524,998 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,665,489 UART: [idev] Erasing UDS.KEYID = 0
6,025,517 UART: [idev] Sha1 KeyId Algorithm
6,048,166 UART: [idev] --
6,052,922 UART: [ldev] ++
6,053,496 UART: [ldev] CDI.KEYID = 6
6,054,407 UART: [ldev] SUBJECT.KEYID = 5
6,055,692 UART: [ldev] AUTHORITY.KEYID = 7
6,056,878 UART: [ldev] FE.KEYID = 1
6,102,196 UART: [ldev] Erasing FE.KEYID = 1
8,620,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,191 UART: [ldev] --
10,428,578 UART: [fwproc] Wait for Commands...
10,431,647 UART: [fwproc] Recv command 0x46574c44
10,433,738 UART: [fwproc] Recv'd Img size: 111752 bytes
13,798,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,648 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,930,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,247,993 >>> mbox cmd response: success
14,251,898 UART: [afmc] ++
14,252,494 UART: [afmc] CDI.KEYID = 6
14,253,372 UART: [afmc] SUBJECT.KEYID = 7
14,254,586 UART: [afmc] AUTHORITY.KEYID = 5
16,780,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,503,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,505,284 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,521,371 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,537,388 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,553,080 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,575,844 UART: [afmc] --
18,581,455 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,722,362 UART: [cold-reset] --
18,723,220 UART: [state] Locking Datavault
18,724,571 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,118 UART: [state] Locking ICCM
18,727,022 UART: [exit] Launching FMC @ 0x40000000
18,728,449 UART:
18,728,604 UART: Running Caliptra FMC ...
18,729,701 UART:
18,729,856 UART: [fmc] Received command: 0x46574C44
18,731,313 UART:
18,731,466 UART: Running Caliptra ROM ...
18,732,561 UART:
18,732,733 UART: [state] CFI Enabled
18,794,576 UART: [state] LifecycleState = Unprovisioned
18,796,465 UART: [state] DebugLocked = No
18,798,764 UART: [state] WD Timer not started. Device not locked for debugging
18,802,609 UART: [kat] SHA2-256
18,981,692 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,993,308 UART: [kat] ++
18,993,765 UART: [kat] sha1
19,004,538 UART: [kat] SHA2-256
19,007,559 UART: [kat] SHA2-384
19,013,660 UART: [kat] SHA2-512-ACC
19,016,608 UART: [kat] ECC-384
21,476,863 UART: [kat] HMAC-384Kdf
21,499,839 UART: [kat] LMS
22,029,306 UART: [kat] --
22,032,540 UART: [update-reset] ++
25,421,534 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,425,086 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,798,950 >>> mbox cmd response: success
25,800,686 UART: [update-reset] Copying MAN_2 To MAN_1
25,823,018 UART: [update-reset Success] --
25,824,289 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,828,072 UART: [state] Locking Datavault
25,832,620 UART: [state] Locking PCR0, PCR1 and PCR31
25,834,274 UART: [state] Locking ICCM
25,835,589 UART: [exit] Launching FMC @ 0x40000000
25,844,040 UART:
25,844,472 UART: Running Caliptra FMC ...
25,845,517 UART:
25,845,663 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,847,301 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,345 writing to cptra_bootfsm_go
3,362,069 ready_for_fw is high
3,362,628 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,004,052 >>> mbox cmd response: success
18,266,713 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,407,950 UART:
18,408,345 UART: Running Caliptra FMC ...
18,409,564 UART:
18,409,740 UART: [fmc] Received command: 0x46574C44
25,348,952 >>> mbox cmd response: success
25,371,042 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,386,195 UART:
25,386,462 UART: Running Caliptra FMC ...
25,387,552 UART:
25,387,702 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,389,346 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,493 UART:
192,862 UART: Running Caliptra ROM ...
194,055 UART:
603,454 UART: [state] CFI Enabled
616,540 UART: [state] LifecycleState = Unprovisioned
618,426 UART: [state] DebugLocked = No
619,742 UART: [state] WD Timer not started. Device not locked for debugging
622,651 UART: [kat] SHA2-256
801,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,360 UART: [kat] ++
813,888 UART: [kat] sha1
823,958 UART: [kat] SHA2-256
826,947 UART: [kat] SHA2-384
833,563 UART: [kat] SHA2-512-ACC
836,576 UART: [kat] ECC-384
3,280,129 UART: [kat] HMAC-384Kdf
3,293,080 UART: [kat] LMS
3,822,562 UART: [kat] --
3,827,913 UART: [cold-reset] ++
3,828,919 UART: [fht] FHT @ 0x50003400
3,839,755 UART: [idev] ++
3,840,318 UART: [idev] CDI.KEYID = 6
3,841,225 UART: [idev] SUBJECT.KEYID = 7
3,842,476 UART: [idev] UDS.KEYID = 0
3,843,398 ready_for_fw is high
3,843,601 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,983,976 UART: [idev] Erasing UDS.KEYID = 0
6,313,934 UART: [idev] Sha1 KeyId Algorithm
6,336,599 UART: [idev] --
6,340,188 UART: [ldev] ++
6,340,764 UART: [ldev] CDI.KEYID = 6
6,341,673 UART: [ldev] SUBJECT.KEYID = 5
6,342,827 UART: [ldev] AUTHORITY.KEYID = 7
6,344,109 UART: [ldev] FE.KEYID = 1
6,354,483 UART: [ldev] Erasing FE.KEYID = 1
8,827,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,268 UART: [ldev] --
10,619,425 UART: [fwproc] Wait for Commands...
10,622,547 UART: [fwproc] Recv command 0x46574c44
10,624,658 UART: [fwproc] Recv'd Img size: 111752 bytes
13,996,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,072,892 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,133,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,450,441 >>> mbox cmd response: success
14,453,989 UART: [afmc] ++
14,454,577 UART: [afmc] CDI.KEYID = 6
14,455,463 UART: [afmc] SUBJECT.KEYID = 7
14,456,675 UART: [afmc] AUTHORITY.KEYID = 5
16,954,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,675,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,677,229 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,693,308 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,709,353 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,725,007 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,746,866 UART: [afmc] --
18,751,576 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,892,525 UART: [cold-reset] --
18,893,386 UART: [state] Locking Datavault
18,894,532 UART: [state] Locking PCR0, PCR1 and PCR31
18,896,279 UART: [state] Locking ICCM
18,897,199 UART: [exit] Launching FMC @ 0x40000000
18,898,635 UART:
18,898,799 UART: Running Caliptra FMC ...
18,899,889 UART:
18,900,045 UART: [fmc] Received command: 0x46574C44
18,901,504 UART:
18,901,653 UART: Running Caliptra ROM ...
18,902,744 UART:
18,902,903 UART: [state] CFI Enabled
18,908,628 UART: [state] LifecycleState = Unprovisioned
18,910,457 UART: [state] DebugLocked = No
18,911,795 UART: [state] WD Timer not started. Device not locked for debugging
18,915,213 UART: [kat] SHA2-256
19,094,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
19,105,971 UART: [kat] ++
19,106,456 UART: [kat] sha1
19,117,342 UART: [kat] SHA2-256
19,120,408 UART: [kat] SHA2-384
19,127,627 UART: [kat] SHA2-512-ACC
19,130,561 UART: [kat] ECC-384
21,572,560 UART: [kat] HMAC-384Kdf
21,585,178 UART: [kat] LMS
22,114,718 UART: [kat] --
22,118,833 UART: [update-reset] ++
25,508,739 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,512,939 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
25,886,775 >>> mbox cmd response: success
25,887,171 UART: [update-reset] Copying MAN_2 To MAN_1
25,909,423 UART: [update-reset Success] --
25,910,687 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,914,207 UART: [state] Locking Datavault
25,916,915 UART: [state] Locking PCR0, PCR1 and PCR31
25,918,556 UART: [state] Locking ICCM
25,921,134 UART: [exit] Launching FMC @ 0x40000000
25,929,532 UART:
25,929,763 UART: Running Caliptra FMC ...
25,930,860 UART:
25,931,012 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,932,640 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,693,207 ready_for_fw is high
3,693,602 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,227,072 >>> mbox cmd response: success
18,467,380 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
18,608,687 UART:
18,609,087 UART: Running Caliptra FMC ...
18,610,305 UART:
18,610,501 UART: [fmc] Received command: 0x46574C44
25,458,656 >>> mbox cmd response: success
25,480,738 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,494,621 UART:
25,494,874 UART: Running Caliptra FMC ...
25,496,045 UART:
25,496,212 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,497,849 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,733 UART: [kat] SHA2-256
901,673 UART: [kat] SHA2-384
904,276 UART: [kat] SHA2-512-ACC
906,177 UART: [kat] ECC-384
915,988 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,769 UART: [cold-reset] ++
1,170,213 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 ready_for_fw is high
1,174,103 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,825 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,416 UART: [ldev] ++
1,208,584 UART: [ldev] CDI.KEYID = 6
1,208,948 UART: [ldev] SUBJECT.KEYID = 5
1,209,375 UART: [ldev] AUTHORITY.KEYID = 7
1,209,838 UART: [ldev] FE.KEYID = 1
1,214,800 UART: [ldev] Erasing FE.KEYID = 1
1,241,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,706 UART: [fwproc] Wait for Commands...
1,281,443 UART: [fwproc] Recv command 0x46574c44
1,282,176 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,850 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,235 >>> mbox cmd response: success
2,739,450 UART: [afmc] ++
2,739,618 UART: [afmc] CDI.KEYID = 6
2,739,981 UART: [afmc] SUBJECT.KEYID = 7
2,740,407 UART: [afmc] AUTHORITY.KEYID = 5
2,776,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,105 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,801 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,700 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,810,393 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,818,203 UART: [afmc] --
2,819,299 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,819,321 UART: [cold-reset] --
2,820,131 UART: [state] Locking Datavault
2,821,482 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,086 UART: [state] Locking ICCM
2,822,720 UART: [exit] Launching FMC @ 0x40000000
2,828,017 UART:
2,828,033 UART: Running Caliptra FMC ...
2,828,441 UART:
2,828,671 UART: [fmc] Received command: 0x46574C44
2,829,497 UART:
2,829,513 UART: Running Caliptra ROM ...
2,829,921 UART:
2,829,976 UART: [state] CFI Enabled
2,832,220 UART: [state] LifecycleState = Unprovisioned
2,832,875 UART: [state] DebugLocked = No
2,833,565 UART: [state] WD Timer not started. Device not locked for debugging
2,834,695 UART: [kat] SHA2-256
3,638,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,374 UART: [kat] ++
3,642,526 UART: [kat] sha1
3,646,680 UART: [kat] SHA2-256
3,648,620 UART: [kat] SHA2-384
3,651,359 UART: [kat] SHA2-512-ACC
3,653,259 UART: [kat] ECC-384
3,663,002 UART: [kat] HMAC-384Kdf
3,667,702 UART: [kat] LMS
3,916,014 UART: [kat] --
3,916,840 UART: [update-reset] ++
5,199,719 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,200,930 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,348,696 >>> mbox cmd response: success
5,348,925 UART: [update-reset] Copying MAN_2 To MAN_1
5,356,939 UART: [update-reset Success] --
5,357,348 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,358,190 UART: [state] Locking Datavault
5,359,206 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,810 UART: [state] Locking ICCM
5,360,250 UART: [exit] Launching FMC @ 0x40000000
5,365,547 UART:
5,365,563 UART: Running Caliptra FMC ...
5,365,971 UART:
5,366,193 UART: [fmc] Received command: 0x1000000C
5,366,928 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,422 ready_for_fw is high
1,055,422 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,369 >>> mbox cmd response: success
2,645,726 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,651,929 UART:
2,651,945 UART: Running Caliptra FMC ...
2,652,353 UART:
2,652,583 UART: [fmc] Received command: 0x46574C44
5,053,749 >>> mbox cmd response: success
5,061,277 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,066,735 UART:
5,066,751 UART: Running Caliptra FMC ...
5,067,159 UART:
5,067,381 UART: [fmc] Received command: 0x1000000C
5,068,116 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,333 UART: [kat] SHA2-512-ACC
906,234 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,439 UART: [kat] LMS
1,168,751 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,169,996 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,174,154 ready_for_fw is high
1,174,154 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,648 UART: [idev] Erasing UDS.KEYID = 0
1,198,768 UART: [idev] Sha1 KeyId Algorithm
1,207,678 UART: [idev] --
1,208,781 UART: [ldev] ++
1,208,949 UART: [ldev] CDI.KEYID = 6
1,209,313 UART: [ldev] SUBJECT.KEYID = 5
1,209,740 UART: [ldev] AUTHORITY.KEYID = 7
1,210,203 UART: [ldev] FE.KEYID = 1
1,215,267 UART: [ldev] Erasing FE.KEYID = 1
1,241,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,227 UART: [ldev] --
1,280,737 UART: [fwproc] Wait for Commands...
1,281,390 UART: [fwproc] Recv command 0x46574c44
1,282,123 UART: [fwproc] Recv'd Img size: 111752 bytes
2,548,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,693 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,736,858 >>> mbox cmd response: success
2,737,903 UART: [afmc] ++
2,738,071 UART: [afmc] CDI.KEYID = 6
2,738,434 UART: [afmc] SUBJECT.KEYID = 7
2,738,860 UART: [afmc] AUTHORITY.KEYID = 5
2,774,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,224 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,797,920 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,819 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,512 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,262 UART: [afmc] --
2,818,192 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,818,214 UART: [cold-reset] --
2,819,040 UART: [state] Locking Datavault
2,820,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,869 UART: [state] Locking ICCM
2,821,437 UART: [exit] Launching FMC @ 0x40000000
2,826,734 UART:
2,826,750 UART: Running Caliptra FMC ...
2,827,158 UART:
2,827,388 UART: [fmc] Received command: 0x46574C44
2,828,214 UART:
2,828,230 UART: Running Caliptra ROM ...
2,828,638 UART:
2,828,780 UART: [state] CFI Enabled
2,831,930 UART: [state] LifecycleState = Unprovisioned
2,832,585 UART: [state] DebugLocked = No
2,833,283 UART: [state] WD Timer not started. Device not locked for debugging
2,834,535 UART: [kat] SHA2-256
3,638,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,214 UART: [kat] ++
3,642,366 UART: [kat] sha1
3,646,488 UART: [kat] SHA2-256
3,648,428 UART: [kat] SHA2-384
3,651,195 UART: [kat] SHA2-512-ACC
3,653,095 UART: [kat] ECC-384
3,662,600 UART: [kat] HMAC-384Kdf
3,667,202 UART: [kat] LMS
3,915,514 UART: [kat] --
3,916,092 UART: [update-reset] ++
5,198,441 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,414 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,347,180 >>> mbox cmd response: success
5,347,303 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,317 UART: [update-reset Success] --
5,355,726 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,356,428 UART: [state] Locking Datavault
5,357,236 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,840 UART: [state] Locking ICCM
5,358,496 UART: [exit] Launching FMC @ 0x40000000
5,363,793 UART:
5,363,809 UART: Running Caliptra FMC ...
5,364,217 UART:
5,364,439 UART: [fmc] Received command: 0x1000000C
5,365,174 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,117 ready_for_fw is high
1,056,117 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,660 >>> mbox cmd response: success
2,644,711 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,650,652 UART:
2,650,668 UART: Running Caliptra FMC ...
2,651,076 UART:
2,651,306 UART: [fmc] Received command: 0x46574C44
5,053,687 >>> mbox cmd response: success
5,061,387 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,067,037 UART:
5,067,053 UART: Running Caliptra FMC ...
5,067,461 UART:
5,067,683 UART: [fmc] Received command: 0x1000000C
5,068,418 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,681 UART: [kat] ++
895,833 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,736 UART: [kat] LMS
1,169,048 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,151 UART: [idev] ++
1,173,319 UART: [idev] CDI.KEYID = 6
1,173,680 UART: [idev] SUBJECT.KEYID = 7
1,174,105 UART: [idev] UDS.KEYID = 0
1,174,451 ready_for_fw is high
1,174,451 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,837 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,548 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,226 UART: [ldev] --
1,280,560 UART: [fwproc] Wait for Commands...
1,281,275 UART: [fwproc] Recv command 0x46574c44
1,282,008 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,722 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,041 >>> mbox cmd response: success
2,738,082 UART: [afmc] ++
2,738,250 UART: [afmc] CDI.KEYID = 6
2,738,613 UART: [afmc] SUBJECT.KEYID = 7
2,739,039 UART: [afmc] AUTHORITY.KEYID = 5
2,774,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,016 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,791,767 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,797,463 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,803,362 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,055 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,816,909 UART: [afmc] --
2,817,769 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,817,791 UART: [cold-reset] --
2,818,469 UART: [state] Locking Datavault
2,819,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,384 UART: [state] Locking ICCM
2,821,000 UART: [exit] Launching FMC @ 0x40000000
2,826,297 UART:
2,826,313 UART: Running Caliptra FMC ...
2,826,721 UART:
2,826,951 UART: [fmc] Received command: 0x46574C44
2,827,777 UART:
2,827,793 UART: Running Caliptra ROM ...
2,828,201 UART:
2,828,256 UART: [state] CFI Enabled
2,831,052 UART: [state] LifecycleState = Unprovisioned
2,831,707 UART: [state] DebugLocked = No
2,832,311 UART: [state] WD Timer not started. Device not locked for debugging
2,833,601 UART: [kat] SHA2-256
3,637,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,641,280 UART: [kat] ++
3,641,432 UART: [kat] sha1
3,645,754 UART: [kat] SHA2-256
3,647,694 UART: [kat] SHA2-384
3,650,323 UART: [kat] SHA2-512-ACC
3,652,223 UART: [kat] ECC-384
3,661,570 UART: [kat] HMAC-384Kdf
3,666,334 UART: [kat] LMS
3,914,646 UART: [kat] --
3,915,456 UART: [update-reset] ++
5,196,953 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,198,132 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,345,898 >>> mbox cmd response: success
5,346,203 UART: [update-reset] Copying MAN_2 To MAN_1
5,354,217 UART: [update-reset Success] --
5,354,626 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,355,234 UART: [state] Locking Datavault
5,356,138 UART: [state] Locking PCR0, PCR1 and PCR31
5,356,742 UART: [state] Locking ICCM
5,357,390 UART: [exit] Launching FMC @ 0x40000000
5,362,687 UART:
5,362,703 UART: Running Caliptra FMC ...
5,363,111 UART:
5,363,333 UART: [fmc] Received command: 0x1000000C
5,364,068 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,192 ready_for_fw is high
1,056,192 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,705 >>> mbox cmd response: success
2,642,804 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,649,293 UART:
2,649,309 UART: Running Caliptra FMC ...
2,649,717 UART:
2,649,947 UART: [fmc] Received command: 0x46574C44
5,050,865 >>> mbox cmd response: success
5,058,561 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,064,383 UART:
5,064,399 UART: Running Caliptra FMC ...
5,064,807 UART:
5,065,029 UART: [fmc] Received command: 0x1000000C
5,065,764 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,334 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,174,390 ready_for_fw is high
1,174,390 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,216 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,241,670 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,375 UART: [ldev] --
1,280,781 UART: [fwproc] Wait for Commands...
1,281,376 UART: [fwproc] Recv command 0x46574c44
1,282,109 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,337 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,740,640 >>> mbox cmd response: success
2,741,689 UART: [afmc] ++
2,741,857 UART: [afmc] CDI.KEYID = 6
2,742,220 UART: [afmc] SUBJECT.KEYID = 7
2,742,646 UART: [afmc] AUTHORITY.KEYID = 5
2,777,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,956 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,652 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,551 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,244 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,208 UART: [afmc] --
2,821,146 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,821,168 UART: [cold-reset] --
2,821,978 UART: [state] Locking Datavault
2,823,053 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,657 UART: [state] Locking ICCM
2,824,129 UART: [exit] Launching FMC @ 0x40000000
2,829,426 UART:
2,829,442 UART: Running Caliptra FMC ...
2,829,850 UART:
2,830,080 UART: [fmc] Received command: 0x46574C44
2,830,906 UART:
2,830,922 UART: Running Caliptra ROM ...
2,831,330 UART:
2,831,472 UART: [state] CFI Enabled
2,834,080 UART: [state] LifecycleState = Unprovisioned
2,834,735 UART: [state] DebugLocked = No
2,835,241 UART: [state] WD Timer not started. Device not locked for debugging
2,836,383 UART: [kat] SHA2-256
3,639,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,062 UART: [kat] ++
3,644,214 UART: [kat] sha1
3,648,500 UART: [kat] SHA2-256
3,650,440 UART: [kat] SHA2-384
3,653,187 UART: [kat] SHA2-512-ACC
3,655,087 UART: [kat] ECC-384
3,665,028 UART: [kat] HMAC-384Kdf
3,669,608 UART: [kat] LMS
3,917,920 UART: [kat] --
3,918,684 UART: [update-reset] ++
5,201,431 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,202,586 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,350,352 >>> mbox cmd response: success
5,350,651 UART: [update-reset] Copying MAN_2 To MAN_1
5,358,665 UART: [update-reset Success] --
5,359,074 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,359,654 UART: [state] Locking Datavault
5,360,492 UART: [state] Locking PCR0, PCR1 and PCR31
5,361,096 UART: [state] Locking ICCM
5,361,744 UART: [exit] Launching FMC @ 0x40000000
5,367,041 UART:
5,367,057 UART: Running Caliptra FMC ...
5,367,465 UART:
5,367,687 UART: [fmc] Received command: 0x1000000C
5,368,422 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,839 ready_for_fw is high
1,055,839 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,894 >>> mbox cmd response: success
2,646,167 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,652,176 UART:
2,652,192 UART: Running Caliptra FMC ...
2,652,600 UART:
2,652,830 UART: [fmc] Received command: 0x46574C44
5,055,415 >>> mbox cmd response: success
5,063,109 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,097 UART:
5,069,113 UART: Running Caliptra FMC ...
5,069,521 UART:
5,069,743 UART: [fmc] Received command: 0x1000000C
5,070,478 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
86,019 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,453 UART: [kat] SHA2-256
901,393 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,833 UART: [idev] ++
1,173,001 UART: [idev] CDI.KEYID = 6
1,173,362 UART: [idev] SUBJECT.KEYID = 7
1,173,787 UART: [idev] UDS.KEYID = 0
1,174,133 ready_for_fw is high
1,174,133 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,647 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,420 UART: [ldev] ++
1,208,588 UART: [ldev] CDI.KEYID = 6
1,208,952 UART: [ldev] SUBJECT.KEYID = 5
1,209,379 UART: [ldev] AUTHORITY.KEYID = 7
1,209,842 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,650 UART: [fwproc] Wait for Commands...
1,281,371 UART: [fwproc] Recv command 0x46574c44
1,282,104 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,575,918 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,601,603 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,169 >>> mbox cmd response: success
2,738,348 UART: [afmc] ++
2,738,516 UART: [afmc] CDI.KEYID = 6
2,738,879 UART: [afmc] SUBJECT.KEYID = 7
2,739,305 UART: [afmc] AUTHORITY.KEYID = 5
2,775,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,517 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,798,213 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,804,112 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,809,805 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,817,631 UART: [afmc] --
2,818,611 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,818,633 UART: [cold-reset] --
2,819,169 UART: [state] Locking Datavault
2,820,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,898 UART: [state] Locking ICCM
2,821,560 UART: [exit] Launching FMC @ 0x40000000
2,826,857 UART:
2,826,873 UART: Running Caliptra FMC ...
2,827,281 UART:
2,827,511 UART: [fmc] Received command: 0x46574C44
2,828,337 UART:
2,828,353 UART: Running Caliptra ROM ...
2,828,761 UART:
2,828,816 UART: [state] CFI Enabled
2,831,394 UART: [state] LifecycleState = Unprovisioned
2,832,049 UART: [state] DebugLocked = No
2,832,727 UART: [state] WD Timer not started. Device not locked for debugging
2,833,903 UART: [kat] SHA2-256
3,637,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,641,582 UART: [kat] ++
3,641,734 UART: [kat] sha1
3,645,942 UART: [kat] SHA2-256
3,647,882 UART: [kat] SHA2-384
3,650,689 UART: [kat] SHA2-512-ACC
3,652,589 UART: [kat] ECC-384
3,662,026 UART: [kat] HMAC-384Kdf
3,666,644 UART: [kat] LMS
3,914,956 UART: [kat] --
3,915,656 UART: [update-reset] ++
5,198,213 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,199,194 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,346,960 >>> mbox cmd response: success
5,347,205 UART: [update-reset] Copying MAN_2 To MAN_1
5,355,219 UART: [update-reset Success] --
5,355,628 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,356,276 UART: [state] Locking Datavault
5,357,106 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,710 UART: [state] Locking ICCM
5,358,308 UART: [exit] Launching FMC @ 0x40000000
5,363,605 UART:
5,363,621 UART: Running Caliptra FMC ...
5,364,029 UART:
5,364,251 UART: [fmc] Received command: 0x1000000C
5,364,986 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,238 ready_for_fw is high
1,055,238 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,425 >>> mbox cmd response: success
2,644,370 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,650,625 UART:
2,650,641 UART: Running Caliptra FMC ...
2,651,049 UART:
2,651,279 UART: [fmc] Received command: 0x46574C44
5,052,653 >>> mbox cmd response: success
5,060,239 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,066,073 UART:
5,066,089 UART: Running Caliptra FMC ...
5,066,497 UART:
5,066,719 UART: [fmc] Received command: 0x1000000C
5,067,454 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,206 UART: [state] WD Timer not started. Device not locked for debugging
87,367 UART: [kat] SHA2-256
890,917 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,046 UART: [kat] ++
895,198 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
904,123 UART: [kat] SHA2-512-ACC
906,024 UART: [kat] ECC-384
915,799 UART: [kat] HMAC-384Kdf
920,383 UART: [kat] LMS
1,168,695 UART: [kat] --
1,169,698 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,884 UART: [idev] ++
1,173,052 UART: [idev] CDI.KEYID = 6
1,173,413 UART: [idev] SUBJECT.KEYID = 7
1,173,838 UART: [idev] UDS.KEYID = 0
1,174,184 ready_for_fw is high
1,174,184 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,198,936 UART: [idev] Sha1 KeyId Algorithm
1,207,682 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,637 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,493 UART: [ldev] --
1,281,845 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,239 UART: [fwproc] Recv'd Img size: 111752 bytes
2,552,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,579,195 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,740,454 >>> mbox cmd response: success
2,741,705 UART: [afmc] ++
2,741,873 UART: [afmc] CDI.KEYID = 6
2,742,236 UART: [afmc] SUBJECT.KEYID = 7
2,742,662 UART: [afmc] AUTHORITY.KEYID = 5
2,777,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,795,068 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,800,764 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,806,663 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,812,356 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,820,384 UART: [afmc] --
2,821,452 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,821,474 UART: [cold-reset] --
2,822,490 UART: [state] Locking Datavault
2,823,881 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,485 UART: [state] Locking ICCM
2,825,087 UART: [exit] Launching FMC @ 0x40000000
2,830,384 UART:
2,830,400 UART: Running Caliptra FMC ...
2,830,808 UART:
2,831,038 UART: [fmc] Received command: 0x46574C44
2,831,864 UART:
2,831,880 UART: Running Caliptra ROM ...
2,832,288 UART:
2,832,430 UART: [state] CFI Enabled
2,835,390 UART: [state] LifecycleState = Unprovisioned
2,836,045 UART: [state] DebugLocked = No
2,836,715 UART: [state] WD Timer not started. Device not locked for debugging
2,837,855 UART: [kat] SHA2-256
3,641,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,534 UART: [kat] ++
3,645,686 UART: [kat] sha1
3,650,076 UART: [kat] SHA2-256
3,652,016 UART: [kat] SHA2-384
3,654,651 UART: [kat] SHA2-512-ACC
3,656,551 UART: [kat] ECC-384
3,666,440 UART: [kat] HMAC-384Kdf
3,671,160 UART: [kat] LMS
3,919,472 UART: [kat] --
3,920,196 UART: [update-reset] ++
5,202,953 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,203,980 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,351,746 >>> mbox cmd response: success
5,351,947 UART: [update-reset] Copying MAN_2 To MAN_1
5,359,961 UART: [update-reset Success] --
5,360,370 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,361,006 UART: [state] Locking Datavault
5,361,780 UART: [state] Locking PCR0, PCR1 and PCR31
5,362,384 UART: [state] Locking ICCM
5,362,888 UART: [exit] Launching FMC @ 0x40000000
5,368,185 UART:
5,368,201 UART: Running Caliptra FMC ...
5,368,609 UART:
5,368,831 UART: [fmc] Received command: 0x1000000C
5,369,566 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,785 ready_for_fw is high
1,056,785 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,710 >>> mbox cmd response: success
2,646,847 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,653,176 UART:
2,653,192 UART: Running Caliptra FMC ...
2,653,600 UART:
2,653,830 UART: [fmc] Received command: 0x46574C44
5,055,841 >>> mbox cmd response: success
5,063,449 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,069,255 UART:
5,069,271 UART: Running Caliptra FMC ...
5,069,679 UART:
5,069,901 UART: [fmc] Received command: 0x1000000C
5,070,636 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,249 UART:
192,612 UART: Running Caliptra ROM ...
193,780 UART:
193,933 UART: [state] CFI Enabled
260,613 UART: [state] LifecycleState = Unprovisioned
263,044 UART: [state] DebugLocked = No
264,224 UART: [state] WD Timer not started. Device not locked for debugging
268,526 UART: [kat] SHA2-256
450,462 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
461,989 UART: [kat] ++
462,442 UART: [kat] sha1
472,765 UART: [kat] SHA2-256
475,779 UART: [kat] SHA2-384
481,103 UART: [kat] SHA2-512-ACC
483,730 UART: [kat] ECC-384
3,774,241 UART: [kat] HMAC-384Kdf
3,802,748 UART: [kat] LMS
4,875,921 UART: [kat] --
4,880,585 UART: [cold-reset] ++
4,881,694 UART: [fht] FHT @ 0x50003400
4,893,028 UART: [idev] ++
4,893,691 UART: [idev] CDI.KEYID = 6
4,894,937 UART: [idev] SUBJECT.KEYID = 7
4,896,037 UART: [idev] UDS.KEYID = 0
4,896,966 ready_for_fw is high
4,897,183 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,037,250 UART: [idev] Erasing UDS.KEYID = 0
8,242,044 UART: [idev] Sha1 KeyId Algorithm
8,264,572 UART: [idev] --
8,267,212 UART: [ldev] ++
8,267,784 UART: [ldev] CDI.KEYID = 6
8,269,015 UART: [ldev] SUBJECT.KEYID = 5
8,270,175 UART: [ldev] AUTHORITY.KEYID = 7
8,271,398 UART: [ldev] FE.KEYID = 1
8,317,720 UART: [ldev] Erasing FE.KEYID = 1
11,652,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,472 UART: [ldev] --
14,038,550 UART: [fwproc] Wait for Commands...
14,041,726 UART: [fwproc] Recv command 0x46574c44
14,044,029 UART: [fwproc] Recv'd Img size: 111408 bytes
18,080,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,154,822 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,215,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,531,095 >>> mbox cmd response: success
18,535,246 UART: [afmc] ++
18,535,967 UART: [afmc] CDI.KEYID = 6
18,537,081 UART: [afmc] SUBJECT.KEYID = 7
18,538,302 UART: [afmc] AUTHORITY.KEYID = 5
21,903,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,220,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,222,072 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,238,317 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,254,318 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,270,290 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,292,792 UART: [afmc] --
26,355,752 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
26,490,902 UART: [cold-reset] --
26,491,835 UART: [state] Locking Datavault
26,492,915 UART: [state] Locking PCR0, PCR1 and PCR31
26,494,455 UART: [state] Locking ICCM
26,495,331 UART: [exit] Launching FMC @ 0x40000000
26,496,675 UART:
26,496,821 UART: Running Caliptra FMC ...
26,497,929 UART:
26,498,088 UART: [fmc] Received command: 0x46574C44
26,499,553 UART:
26,499,710 UART: Running Caliptra ROM ...
26,500,728 UART:
26,500,874 UART: [state] CFI Enabled
26,560,023 UART: [state] LifecycleState = Unprovisioned
26,561,909 UART: [state] DebugLocked = No
26,564,132 UART: [state] WD Timer not started. Device not locked for debugging
26,568,983 UART: [kat] SHA2-256
26,750,913 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,762,465 UART: [kat] ++
26,762,916 UART: [kat] sha1
26,774,239 UART: [kat] SHA2-256
26,777,250 UART: [kat] SHA2-384
26,783,117 UART: [kat] SHA2-512-ACC
26,785,736 UART: [kat] ECC-384
30,071,239 UART: [kat] HMAC-384Kdf
30,096,226 UART: [kat] LMS
31,169,358 UART: [kat] --
31,172,514 UART: [update-reset] ++
31,216,994 >>> mbox cmd response: failed
31,217,382 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,218,582 UART: ROM Non-Fatal Error: 0x000B001E
31,221,308 UART: [state] Locking Datavault
31,224,693 UART: [state] Locking PCR0, PCR1 and PCR31
31,226,833 UART: [state] Locking ICCM
31,229,685 UART: [exit] Launching FMC @ 0x40000000
31,238,308 UART:
31,238,539 UART: Running Caliptra FMC ...
31,239,637 UART:
31,239,792 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,241,430 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
4,804,588 ready_for_fw is high
4,805,030 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,326,912 >>> mbox cmd response: success
26,054,136 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
26,188,867 UART:
26,189,307 UART: Running Caliptra FMC ...
26,190,491 UART:
26,190,663 UART: [fmc] Received command: 0x46574C44
30,816,259 >>> mbox cmd response: failed
30,816,692 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,826,861 UART:
30,827,123 UART: Running Caliptra FMC ...
30,828,299 UART:
30,828,459 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,830,091 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,478 UART:
192,844 UART: Running Caliptra ROM ...
193,959 UART:
603,660 UART: [state] CFI Enabled
617,523 UART: [state] LifecycleState = Unprovisioned
619,903 UART: [state] DebugLocked = No
622,633 UART: [state] WD Timer not started. Device not locked for debugging
627,436 UART: [kat] SHA2-256
809,439 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,002 UART: [kat] ++
821,605 UART: [kat] sha1
831,837 UART: [kat] SHA2-256
834,837 UART: [kat] SHA2-384
840,485 UART: [kat] SHA2-512-ACC
843,133 UART: [kat] ECC-384
4,096,208 UART: [kat] HMAC-384Kdf
4,108,461 UART: [kat] LMS
5,181,612 UART: [kat] --
5,184,836 UART: [cold-reset] ++
5,187,338 UART: [fht] FHT @ 0x50003400
5,199,514 UART: [idev] ++
5,200,223 UART: [idev] CDI.KEYID = 6
5,201,389 UART: [idev] SUBJECT.KEYID = 7
5,202,841 UART: [idev] UDS.KEYID = 0
5,204,095 ready_for_fw is high
5,204,291 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,344,242 UART: [idev] Erasing UDS.KEYID = 0
8,496,753 UART: [idev] Sha1 KeyId Algorithm
8,519,090 UART: [idev] --
8,521,756 UART: [ldev] ++
8,522,325 UART: [ldev] CDI.KEYID = 6
8,523,471 UART: [ldev] SUBJECT.KEYID = 5
8,525,158 UART: [ldev] AUTHORITY.KEYID = 7
8,526,476 UART: [ldev] FE.KEYID = 1
8,537,501 UART: [ldev] Erasing FE.KEYID = 1
11,831,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,124,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,140,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,156,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,172,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,385 UART: [ldev] --
14,199,809 UART: [fwproc] Wait for Commands...
14,201,678 UART: [fwproc] Recv command 0x46574c44
14,203,976 UART: [fwproc] Recv'd Img size: 111408 bytes
18,240,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
18,311,331 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,371,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,688,722 >>> mbox cmd response: success
18,692,221 UART: [afmc] ++
18,692,941 UART: [afmc] CDI.KEYID = 6
18,694,185 UART: [afmc] SUBJECT.KEYID = 7
18,695,203 UART: [afmc] AUTHORITY.KEYID = 5
22,011,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,307,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,309,295 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
24,325,398 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
24,341,552 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
24,357,530 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
24,380,300 UART: [afmc] --
26,450,679 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
26,586,142 UART: [cold-reset] --
26,587,084 UART: [state] Locking Datavault
26,588,165 UART: [state] Locking PCR0, PCR1 and PCR31
26,589,700 UART: [state] Locking ICCM
26,590,567 UART: [exit] Launching FMC @ 0x40000000
26,591,897 UART:
26,592,037 UART: Running Caliptra FMC ...
26,593,132 UART:
26,593,296 UART: [fmc] Received command: 0x46574C44
26,594,663 UART:
26,594,797 UART: Running Caliptra ROM ...
26,595,836 UART:
26,595,978 UART: [state] CFI Enabled
26,600,727 UART: [state] LifecycleState = Unprovisioned
26,602,544 UART: [state] DebugLocked = No
26,605,343 UART: [state] WD Timer not started. Device not locked for debugging
26,610,552 UART: [kat] SHA2-256
26,792,495 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
26,804,032 UART: [kat] ++
26,804,543 UART: [kat] sha1
26,815,476 UART: [kat] SHA2-256
26,818,498 UART: [kat] SHA2-384
26,823,990 UART: [kat] SHA2-512-ACC
26,826,596 UART: [kat] ECC-384
30,081,514 UART: [kat] HMAC-384Kdf
30,093,589 UART: [kat] LMS
31,166,740 UART: [kat] --
31,169,776 UART: [update-reset] ++
31,214,728 >>> mbox cmd response: failed
31,215,075 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
31,217,507 UART: ROM Non-Fatal Error: 0x000B001E
31,220,379 UART: [state] Locking Datavault
31,223,252 UART: [state] Locking PCR0, PCR1 and PCR31
31,225,430 UART: [state] Locking ICCM
31,228,489 UART: [exit] Launching FMC @ 0x40000000
31,237,150 UART:
31,237,374 UART: Running Caliptra FMC ...
31,238,463 UART:
31,238,610 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
31,240,256 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
5,102,601 ready_for_fw is high
5,102,970 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,490,934 >>> mbox cmd response: success
26,169,583 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
26,304,391 UART:
26,304,810 UART: Running Caliptra FMC ...
26,306,138 UART:
26,306,304 UART: [fmc] Received command: 0x46574C44
30,837,839 >>> mbox cmd response: failed
30,838,287 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
30,850,344 UART:
30,850,590 UART: Running Caliptra FMC ...
30,851,741 UART:
30,851,892 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
30,853,546 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,027 UART:
192,411 UART: Running Caliptra ROM ...
193,501 UART:
193,643 UART: [state] CFI Enabled
266,910 UART: [state] LifecycleState = Unprovisioned
268,793 UART: [state] DebugLocked = No
271,034 UART: [state] WD Timer not started. Device not locked for debugging
274,680 UART: [kat] SHA2-256
453,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,328 UART: [kat] ++
465,776 UART: [kat] sha1
477,288 UART: [kat] SHA2-256
480,307 UART: [kat] SHA2-384
486,938 UART: [kat] SHA2-512-ACC
489,876 UART: [kat] ECC-384
2,950,674 UART: [kat] HMAC-384Kdf
2,975,204 UART: [kat] LMS
3,504,652 UART: [kat] --
3,508,676 UART: [cold-reset] ++
3,510,755 UART: [fht] FHT @ 0x50003400
3,522,945 UART: [idev] ++
3,523,542 UART: [idev] CDI.KEYID = 6
3,524,451 UART: [idev] SUBJECT.KEYID = 7
3,525,627 UART: [idev] UDS.KEYID = 0
3,526,550 ready_for_fw is high
3,526,762 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,667,376 UART: [idev] Erasing UDS.KEYID = 0
6,031,130 UART: [idev] Sha1 KeyId Algorithm
6,053,878 UART: [idev] --
6,058,311 UART: [ldev] ++
6,058,890 UART: [ldev] CDI.KEYID = 6
6,059,804 UART: [ldev] SUBJECT.KEYID = 5
6,060,967 UART: [ldev] AUTHORITY.KEYID = 7
6,062,204 UART: [ldev] FE.KEYID = 1
6,103,262 UART: [ldev] Erasing FE.KEYID = 1
8,606,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,614 UART: [ldev] --
10,416,821 UART: [fwproc] Wait for Commands...
10,419,734 UART: [fwproc] Recv command 0x46574c44
10,421,828 UART: [fwproc] Recv'd Img size: 111752 bytes
13,792,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,859,606 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,919,911 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,236,430 >>> mbox cmd response: success
14,239,951 UART: [afmc] ++
14,240,566 UART: [afmc] CDI.KEYID = 6
14,241,480 UART: [afmc] SUBJECT.KEYID = 7
14,242,642 UART: [afmc] AUTHORITY.KEYID = 5
16,764,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,562 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,506,556 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,522,573 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,538,352 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,560,296 UART: [afmc] --
20,639,213 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,774,712 UART: [cold-reset] --
20,775,659 UART: [state] Locking Datavault
20,776,826 UART: [state] Locking PCR0, PCR1 and PCR31
20,778,375 UART: [state] Locking ICCM
20,779,303 UART: [exit] Launching FMC @ 0x40000000
20,780,738 UART:
20,780,900 UART: Running Caliptra FMC ...
20,782,006 UART:
20,782,170 UART: [fmc] Received command: 0x46574C44
20,783,641 UART:
20,783,794 UART: Running Caliptra ROM ...
20,784,809 UART:
20,784,952 UART: [state] CFI Enabled
20,845,539 UART: [state] LifecycleState = Unprovisioned
20,847,426 UART: [state] DebugLocked = No
20,849,790 UART: [state] WD Timer not started. Device not locked for debugging
20,854,256 UART: [kat] SHA2-256
21,033,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,044,958 UART: [kat] ++
21,045,506 UART: [kat] sha1
21,055,431 UART: [kat] SHA2-256
21,058,455 UART: [kat] SHA2-384
21,065,306 UART: [kat] SHA2-512-ACC
21,068,251 UART: [kat] ECC-384
23,532,259 UART: [kat] HMAC-384Kdf
23,555,129 UART: [kat] LMS
24,084,586 UART: [kat] --
24,087,465 UART: [update-reset] ++
24,131,518 >>> mbox cmd response: failed
24,131,919 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,134,298 UART: ROM Non-Fatal Error: 0x000B001E
24,137,733 UART: [state] Locking Datavault
24,141,982 UART: [state] Locking PCR0, PCR1 and PCR31
24,143,685 UART: [state] Locking ICCM
24,146,106 UART: [exit] Launching FMC @ 0x40000000
24,154,508 UART:
24,154,751 UART: Running Caliptra FMC ...
24,155,854 UART:
24,156,008 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,157,640 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,360,556 ready_for_fw is high
3,361,122 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
13,981,447 >>> mbox cmd response: success
20,332,562 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,467,833 UART:
20,468,263 UART: Running Caliptra FMC ...
20,469,399 UART:
20,469,580 UART: [fmc] Received command: 0x46574C44
23,654,150 >>> mbox cmd response: failed
23,654,939 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,667,250 UART:
23,667,534 UART: Running Caliptra FMC ...
23,668,756 UART:
23,668,918 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,670,626 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,367 UART:
192,762 UART: Running Caliptra ROM ...
193,890 UART:
603,352 UART: [state] CFI Enabled
618,436 UART: [state] LifecycleState = Unprovisioned
620,315 UART: [state] DebugLocked = No
621,974 UART: [state] WD Timer not started. Device not locked for debugging
625,585 UART: [kat] SHA2-256
804,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,305 UART: [kat] ++
816,768 UART: [kat] sha1
828,015 UART: [kat] SHA2-256
831,066 UART: [kat] SHA2-384
837,422 UART: [kat] SHA2-512-ACC
840,359 UART: [kat] ECC-384
3,281,744 UART: [kat] HMAC-384Kdf
3,295,459 UART: [kat] LMS
3,824,962 UART: [kat] --
3,829,115 UART: [cold-reset] ++
3,830,766 UART: [fht] FHT @ 0x50003400
3,841,103 UART: [idev] ++
3,841,668 UART: [idev] CDI.KEYID = 6
3,842,575 UART: [idev] SUBJECT.KEYID = 7
3,843,817 UART: [idev] UDS.KEYID = 0
3,844,741 ready_for_fw is high
3,844,929 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,985,326 UART: [idev] Erasing UDS.KEYID = 0
6,315,922 UART: [idev] Sha1 KeyId Algorithm
6,339,406 UART: [idev] --
6,343,587 UART: [ldev] ++
6,344,157 UART: [ldev] CDI.KEYID = 6
6,345,039 UART: [ldev] SUBJECT.KEYID = 5
6,346,252 UART: [ldev] AUTHORITY.KEYID = 7
6,347,536 UART: [ldev] FE.KEYID = 1
6,357,879 UART: [ldev] Erasing FE.KEYID = 1
8,829,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,184 UART: [ldev] --
10,617,176 UART: [fwproc] Wait for Commands...
10,618,690 UART: [fwproc] Recv command 0x46574c44
10,620,780 UART: [fwproc] Recv'd Img size: 111752 bytes
13,988,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,063,347 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,123,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,441,754 >>> mbox cmd response: success
14,445,950 UART: [afmc] ++
14,446,562 UART: [afmc] CDI.KEYID = 6
14,447,448 UART: [afmc] SUBJECT.KEYID = 7
14,448,659 UART: [afmc] AUTHORITY.KEYID = 5
16,947,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,666,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,668,731 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,684,722 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,700,717 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,716,494 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,738,528 UART: [afmc] --
20,802,141 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,937,527 UART: [cold-reset] --
20,938,454 UART: [state] Locking Datavault
20,939,575 UART: [state] Locking PCR0, PCR1 and PCR31
20,941,122 UART: [state] Locking ICCM
20,942,039 UART: [exit] Launching FMC @ 0x40000000
20,943,492 UART:
20,943,654 UART: Running Caliptra FMC ...
20,944,752 UART:
20,944,904 UART: [fmc] Received command: 0x46574C44
20,946,357 UART:
20,946,512 UART: Running Caliptra ROM ...
20,947,606 UART:
20,947,760 UART: [state] CFI Enabled
20,953,860 UART: [state] LifecycleState = Unprovisioned
20,955,687 UART: [state] DebugLocked = No
20,958,571 UART: [state] WD Timer not started. Device not locked for debugging
20,962,246 UART: [kat] SHA2-256
21,141,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,153,028 UART: [kat] ++
21,153,568 UART: [kat] sha1
21,163,703 UART: [kat] SHA2-256
21,166,734 UART: [kat] SHA2-384
21,173,635 UART: [kat] SHA2-512-ACC
21,176,569 UART: [kat] ECC-384
23,619,465 UART: [kat] HMAC-384Kdf
23,632,389 UART: [kat] LMS
24,161,877 UART: [kat] --
24,167,371 UART: [update-reset] ++
24,212,859 >>> mbox cmd response: failed
24,213,248 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,216,117 UART: ROM Non-Fatal Error: 0x000B001E
24,218,781 UART: [state] Locking Datavault
24,222,382 UART: [state] Locking PCR0, PCR1 and PCR31
24,224,025 UART: [state] Locking ICCM
24,225,343 UART: [exit] Launching FMC @ 0x40000000
24,233,732 UART:
24,233,963 UART: Running Caliptra FMC ...
24,235,083 UART:
24,235,243 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,236,878 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,699,726 ready_for_fw is high
3,700,319 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,233,595 >>> mbox cmd response: success
20,521,209 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,656,363 UART:
20,656,766 UART: Running Caliptra FMC ...
20,657,926 UART:
20,658,095 UART: [fmc] Received command: 0x46574C44
23,782,663 >>> mbox cmd response: failed
23,783,119 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,796,535 UART:
23,796,801 UART: Running Caliptra FMC ...
23,798,097 UART:
23,798,272 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,799,930 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,302 UART:
192,658 UART: Running Caliptra ROM ...
193,838 UART:
193,989 UART: [state] CFI Enabled
262,419 UART: [state] LifecycleState = Unprovisioned
264,262 UART: [state] DebugLocked = No
266,681 UART: [state] WD Timer not started. Device not locked for debugging
270,148 UART: [kat] SHA2-256
449,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,860 UART: [kat] ++
461,392 UART: [kat] sha1
471,513 UART: [kat] SHA2-256
474,556 UART: [kat] SHA2-384
479,768 UART: [kat] SHA2-512-ACC
482,705 UART: [kat] ECC-384
2,926,497 UART: [kat] HMAC-384Kdf
2,951,377 UART: [kat] LMS
3,480,833 UART: [kat] --
3,484,638 UART: [cold-reset] ++
3,487,007 UART: [fht] FHT @ 0x50003400
3,499,128 UART: [idev] ++
3,499,689 UART: [idev] CDI.KEYID = 6
3,500,630 UART: [idev] SUBJECT.KEYID = 7
3,501,812 UART: [idev] UDS.KEYID = 0
3,502,733 ready_for_fw is high
3,502,958 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,643,636 UART: [idev] Erasing UDS.KEYID = 0
6,007,420 UART: [idev] Sha1 KeyId Algorithm
6,029,524 UART: [idev] --
6,033,742 UART: [ldev] ++
6,034,320 UART: [ldev] CDI.KEYID = 6
6,035,230 UART: [ldev] SUBJECT.KEYID = 5
6,036,391 UART: [ldev] AUTHORITY.KEYID = 7
6,037,681 UART: [ldev] FE.KEYID = 1
6,080,543 UART: [ldev] Erasing FE.KEYID = 1
8,583,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,161 UART: [ldev] --
10,392,814 UART: [fwproc] Wait for Commands...
10,395,730 UART: [fwproc] Recv command 0x46574c44
10,397,823 UART: [fwproc] Recv'd Img size: 111752 bytes
13,764,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,832,491 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,892,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,209,554 >>> mbox cmd response: success
14,212,978 UART: [afmc] ++
14,213,596 UART: [afmc] CDI.KEYID = 6
14,214,509 UART: [afmc] SUBJECT.KEYID = 7
14,215,668 UART: [afmc] AUTHORITY.KEYID = 5
16,743,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,467,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,469,132 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,485,091 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,501,142 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,516,905 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,541,186 UART: [afmc] --
20,621,734 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,757,181 UART: [cold-reset] --
20,758,137 UART: [state] Locking Datavault
20,759,309 UART: [state] Locking PCR0, PCR1 and PCR31
20,760,852 UART: [state] Locking ICCM
20,761,786 UART: [exit] Launching FMC @ 0x40000000
20,763,211 UART:
20,763,371 UART: Running Caliptra FMC ...
20,764,471 UART:
20,764,625 UART: [fmc] Received command: 0x46574C44
20,766,083 UART:
20,766,239 UART: Running Caliptra ROM ...
20,767,341 UART:
20,767,494 UART: [state] CFI Enabled
20,829,316 UART: [state] LifecycleState = Unprovisioned
20,831,197 UART: [state] DebugLocked = No
20,832,914 UART: [state] WD Timer not started. Device not locked for debugging
20,836,545 UART: [kat] SHA2-256
21,015,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,027,255 UART: [kat] ++
21,027,799 UART: [kat] sha1
21,038,763 UART: [kat] SHA2-256
21,041,766 UART: [kat] SHA2-384
21,047,819 UART: [kat] SHA2-512-ACC
21,050,761 UART: [kat] ECC-384
23,514,918 UART: [kat] HMAC-384Kdf
23,536,609 UART: [kat] LMS
24,066,085 UART: [kat] --
24,069,328 UART: [update-reset] ++
24,115,773 >>> mbox cmd response: failed
24,116,136 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,117,485 UART: ROM Non-Fatal Error: 0x000B001E
24,121,232 UART: [state] Locking Datavault
24,124,322 UART: [state] Locking PCR0, PCR1 and PCR31
24,125,983 UART: [state] Locking ICCM
24,127,973 UART: [exit] Launching FMC @ 0x40000000
24,136,371 UART:
24,136,608 UART: Running Caliptra FMC ...
24,137,712 UART:
24,137,867 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,139,504 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,381,892 ready_for_fw is high
3,382,275 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,017,102 >>> mbox cmd response: success
20,340,169 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,475,486 UART:
20,475,903 UART: Running Caliptra FMC ...
20,477,002 UART:
20,477,172 UART: [fmc] Received command: 0x46574C44
23,699,230 >>> mbox cmd response: failed
23,699,664 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,711,719 UART:
23,711,977 UART: Running Caliptra FMC ...
23,713,125 UART:
23,713,285 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,714,945 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,488 UART:
192,843 UART: Running Caliptra ROM ...
194,042 UART:
603,628 UART: [state] CFI Enabled
618,284 UART: [state] LifecycleState = Unprovisioned
620,087 UART: [state] DebugLocked = No
622,327 UART: [state] WD Timer not started. Device not locked for debugging
625,358 UART: [kat] SHA2-256
804,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,035 UART: [kat] ++
816,485 UART: [kat] sha1
827,355 UART: [kat] SHA2-256
830,352 UART: [kat] SHA2-384
834,844 UART: [kat] SHA2-512-ACC
837,853 UART: [kat] ECC-384
3,281,048 UART: [kat] HMAC-384Kdf
3,294,343 UART: [kat] LMS
3,823,800 UART: [kat] --
3,829,744 UART: [cold-reset] ++
3,830,995 UART: [fht] FHT @ 0x50003400
3,842,336 UART: [idev] ++
3,842,908 UART: [idev] CDI.KEYID = 6
3,843,812 UART: [idev] SUBJECT.KEYID = 7
3,844,984 UART: [idev] UDS.KEYID = 0
3,846,028 ready_for_fw is high
3,846,236 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,986,590 UART: [idev] Erasing UDS.KEYID = 0
6,317,603 UART: [idev] Sha1 KeyId Algorithm
6,340,244 UART: [idev] --
6,345,584 UART: [ldev] ++
6,346,185 UART: [ldev] CDI.KEYID = 6
6,347,077 UART: [ldev] SUBJECT.KEYID = 5
6,348,237 UART: [ldev] AUTHORITY.KEYID = 7
6,349,569 UART: [ldev] FE.KEYID = 1
6,360,296 UART: [ldev] Erasing FE.KEYID = 1
8,834,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,085 UART: [ldev] --
10,622,292 UART: [fwproc] Wait for Commands...
10,624,757 UART: [fwproc] Recv command 0x46574c44
10,626,887 UART: [fwproc] Recv'd Img size: 111752 bytes
13,993,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,068,409 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,128,738 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,446,550 >>> mbox cmd response: success
14,451,690 UART: [afmc] ++
14,452,303 UART: [afmc] CDI.KEYID = 6
14,453,238 UART: [afmc] SUBJECT.KEYID = 7
14,454,402 UART: [afmc] AUTHORITY.KEYID = 5
16,952,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,670,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,672,481 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,688,482 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,704,501 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,720,306 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,743,575 UART: [afmc] --
20,816,764 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,952,180 UART: [cold-reset] --
20,953,111 UART: [state] Locking Datavault
20,954,282 UART: [state] Locking PCR0, PCR1 and PCR31
20,955,825 UART: [state] Locking ICCM
20,956,744 UART: [exit] Launching FMC @ 0x40000000
20,958,176 UART:
20,958,335 UART: Running Caliptra FMC ...
20,959,434 UART:
20,959,590 UART: [fmc] Received command: 0x46574C44
20,961,130 UART:
20,961,294 UART: Running Caliptra ROM ...
20,962,314 UART:
20,962,462 UART: [state] CFI Enabled
20,969,069 UART: [state] LifecycleState = Unprovisioned
20,970,918 UART: [state] DebugLocked = No
20,972,621 UART: [state] WD Timer not started. Device not locked for debugging
20,976,850 UART: [kat] SHA2-256
21,156,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
21,167,628 UART: [kat] ++
21,168,170 UART: [kat] sha1
21,178,360 UART: [kat] SHA2-256
21,181,379 UART: [kat] SHA2-384
21,187,775 UART: [kat] SHA2-512-ACC
21,190,716 UART: [kat] ECC-384
23,635,203 UART: [kat] HMAC-384Kdf
23,647,972 UART: [kat] LMS
24,177,501 UART: [kat] --
24,181,547 UART: [update-reset] ++
24,231,838 >>> mbox cmd response: failed
24,232,246 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,234,476 UART: ROM Non-Fatal Error: 0x000B001E
24,238,173 UART: [state] Locking Datavault
24,241,368 UART: [state] Locking PCR0, PCR1 and PCR31
24,243,006 UART: [state] Locking ICCM
24,244,241 UART: [exit] Launching FMC @ 0x40000000
24,252,639 UART:
24,252,872 UART: Running Caliptra FMC ...
24,253,966 UART:
24,254,114 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,255,743 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,697,305 ready_for_fw is high
3,697,740 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,223,101 >>> mbox cmd response: success
20,511,665 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
20,647,697 UART:
20,648,134 UART: Running Caliptra FMC ...
20,649,211 UART:
20,649,364 UART: [fmc] Received command: 0x46574C44
23,776,897 >>> mbox cmd response: failed
23,777,393 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,788,755 UART:
23,789,023 UART: Running Caliptra FMC ...
23,790,107 UART:
23,790,258 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,791,905 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,454 UART: [kat] SHA2-512-ACC
906,355 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,250 UART: [kat] LMS
1,168,562 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,541 UART: [idev] ++
1,172,709 UART: [idev] CDI.KEYID = 6
1,173,070 UART: [idev] SUBJECT.KEYID = 7
1,173,495 UART: [idev] UDS.KEYID = 0
1,173,841 ready_for_fw is high
1,173,841 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,489 UART: [idev] Erasing UDS.KEYID = 0
1,198,971 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,884 UART: [ldev] ++
1,209,052 UART: [ldev] CDI.KEYID = 6
1,209,416 UART: [ldev] SUBJECT.KEYID = 5
1,209,843 UART: [ldev] AUTHORITY.KEYID = 7
1,210,306 UART: [ldev] FE.KEYID = 1
1,215,664 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,252 UART: [ldev] --
1,281,670 UART: [fwproc] Wait for Commands...
1,282,359 UART: [fwproc] Recv command 0x46574c44
1,283,092 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,577,831 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,158 >>> mbox cmd response: success
2,740,421 UART: [afmc] ++
2,740,589 UART: [afmc] CDI.KEYID = 6
2,740,952 UART: [afmc] SUBJECT.KEYID = 7
2,741,378 UART: [afmc] AUTHORITY.KEYID = 5
2,776,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,422 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,799,137 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,805,029 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,810,741 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,818,698 UART: [afmc] --
2,819,704 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,819,726 UART: [cold-reset] --
2,820,556 UART: [state] Locking Datavault
2,821,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,311 UART: [state] Locking ICCM
2,822,847 UART: [exit] Launching FMC @ 0x40000000
2,828,144 UART:
2,828,160 UART: Running Caliptra FMC ...
2,828,568 UART:
2,828,798 UART: [fmc] Received command: 0x46574C44
2,829,624 UART:
2,829,640 UART: Running Caliptra ROM ...
2,830,048 UART:
2,830,103 UART: [state] CFI Enabled
2,833,273 UART: [state] LifecycleState = Unprovisioned
2,833,928 UART: [state] DebugLocked = No
2,834,422 UART: [state] WD Timer not started. Device not locked for debugging
2,835,568 UART: [kat] SHA2-256
3,639,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,247 UART: [kat] ++
3,643,399 UART: [kat] sha1
3,647,801 UART: [kat] SHA2-256
3,649,741 UART: [kat] SHA2-384
3,652,338 UART: [kat] SHA2-512-ACC
3,654,238 UART: [kat] ECC-384
3,663,803 UART: [kat] HMAC-384Kdf
3,668,455 UART: [kat] LMS
3,916,767 UART: [kat] --
3,917,359 UART: [update-reset] ++
3,933,613 >>> mbox cmd response: failed
3,933,613 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,933,911 UART: ROM Non-Fatal Error: 0x000B001E
3,934,673 UART: [state] Locking Datavault
3,935,275 UART: [state] Locking PCR0, PCR1 and PCR31
3,935,879 UART: [state] Locking ICCM
3,936,547 UART: [exit] Launching FMC @ 0x40000000
3,941,844 UART:
3,941,860 UART: Running Caliptra FMC ...
3,942,268 UART:
3,942,490 UART: [fmc] Received command: 0x1000000C
3,943,225 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,780 ready_for_fw is high
1,055,780 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,584 >>> mbox cmd response: success
2,643,459 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,649,678 UART:
2,649,694 UART: Running Caliptra FMC ...
2,650,102 UART:
2,650,332 UART: [fmc] Received command: 0x46574C44
3,638,709 >>> mbox cmd response: failed
3,638,709 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,644,262 UART:
3,644,278 UART: Running Caliptra FMC ...
3,644,686 UART:
3,644,908 UART: [fmc] Received command: 0x1000000C
3,645,643 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,774 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,742 UART: [kat] ++
895,894 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,943 UART: [kat] HMAC-384Kdf
921,379 UART: [kat] LMS
1,169,691 UART: [kat] --
1,170,620 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,666 UART: [idev] ++
1,173,834 UART: [idev] CDI.KEYID = 6
1,174,195 UART: [idev] SUBJECT.KEYID = 7
1,174,620 UART: [idev] UDS.KEYID = 0
1,174,966 ready_for_fw is high
1,174,966 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,800 UART: [idev] Sha1 KeyId Algorithm
1,208,870 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,817 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,847 UART: [ldev] --
1,282,351 UART: [fwproc] Wait for Commands...
1,282,950 UART: [fwproc] Recv command 0x46574c44
1,283,683 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,326 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,539 >>> mbox cmd response: success
2,740,792 UART: [afmc] ++
2,740,960 UART: [afmc] CDI.KEYID = 6
2,741,323 UART: [afmc] SUBJECT.KEYID = 7
2,741,749 UART: [afmc] AUTHORITY.KEYID = 5
2,777,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,759 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,800,474 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,366 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,078 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,819,869 UART: [afmc] --
2,820,807 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,820,829 UART: [cold-reset] --
2,821,551 UART: [state] Locking Datavault
2,822,502 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,106 UART: [state] Locking ICCM
2,823,706 UART: [exit] Launching FMC @ 0x40000000
2,829,003 UART:
2,829,019 UART: Running Caliptra FMC ...
2,829,427 UART:
2,829,657 UART: [fmc] Received command: 0x46574C44
2,830,483 UART:
2,830,499 UART: Running Caliptra ROM ...
2,830,907 UART:
2,831,049 UART: [state] CFI Enabled
2,834,021 UART: [state] LifecycleState = Unprovisioned
2,834,676 UART: [state] DebugLocked = No
2,835,170 UART: [state] WD Timer not started. Device not locked for debugging
2,836,476 UART: [kat] SHA2-256
3,640,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,155 UART: [kat] ++
3,644,307 UART: [kat] sha1
3,648,397 UART: [kat] SHA2-256
3,650,337 UART: [kat] SHA2-384
3,652,964 UART: [kat] SHA2-512-ACC
3,654,864 UART: [kat] ECC-384
3,664,551 UART: [kat] HMAC-384Kdf
3,669,007 UART: [kat] LMS
3,917,319 UART: [kat] --
3,918,317 UART: [update-reset] ++
3,935,539 >>> mbox cmd response: failed
3,935,539 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,936,101 UART: ROM Non-Fatal Error: 0x000B001E
3,936,885 UART: [state] Locking Datavault
3,937,817 UART: [state] Locking PCR0, PCR1 and PCR31
3,938,421 UART: [state] Locking ICCM
3,938,995 UART: [exit] Launching FMC @ 0x40000000
3,944,292 UART:
3,944,308 UART: Running Caliptra FMC ...
3,944,716 UART:
3,944,938 UART: [fmc] Received command: 0x1000000C
3,945,673 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,819 ready_for_fw is high
1,056,819 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,737 >>> mbox cmd response: success
2,646,612 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,652,519 UART:
2,652,535 UART: Running Caliptra FMC ...
2,652,943 UART:
2,653,173 UART: [fmc] Received command: 0x46574C44
3,642,165 >>> mbox cmd response: failed
3,642,165 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,682 UART:
3,647,698 UART: Running Caliptra FMC ...
3,648,106 UART:
3,648,328 UART: [fmc] Received command: 0x1000000C
3,649,063 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,362 UART: [state] LifecycleState = Unprovisioned
85,017 UART: [state] DebugLocked = No
85,657 UART: [state] WD Timer not started. Device not locked for debugging
86,930 UART: [kat] SHA2-256
890,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,609 UART: [kat] ++
894,761 UART: [kat] sha1
899,101 UART: [kat] SHA2-256
901,041 UART: [kat] SHA2-384
903,716 UART: [kat] SHA2-512-ACC
905,617 UART: [kat] ECC-384
915,428 UART: [kat] HMAC-384Kdf
920,046 UART: [kat] LMS
1,168,358 UART: [kat] --
1,169,413 UART: [cold-reset] ++
1,169,907 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,174,033 ready_for_fw is high
1,174,033 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,735 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,964 UART: [ldev] Erasing FE.KEYID = 1
1,242,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,470 UART: [ldev] --
1,281,790 UART: [fwproc] Wait for Commands...
1,282,403 UART: [fwproc] Recv command 0x46574c44
1,283,136 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,576,919 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,162 >>> mbox cmd response: success
2,739,259 UART: [afmc] ++
2,739,427 UART: [afmc] CDI.KEYID = 6
2,739,790 UART: [afmc] SUBJECT.KEYID = 7
2,740,216 UART: [afmc] AUTHORITY.KEYID = 5
2,775,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,184 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,798,899 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,804,791 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,810,503 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,818,422 UART: [afmc] --
2,819,362 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,819,384 UART: [cold-reset] --
2,820,078 UART: [state] Locking Datavault
2,821,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,807 UART: [state] Locking ICCM
2,822,427 UART: [exit] Launching FMC @ 0x40000000
2,827,724 UART:
2,827,740 UART: Running Caliptra FMC ...
2,828,148 UART:
2,828,378 UART: [fmc] Received command: 0x46574C44
2,829,204 UART:
2,829,220 UART: Running Caliptra ROM ...
2,829,628 UART:
2,829,683 UART: [state] CFI Enabled
2,832,219 UART: [state] LifecycleState = Unprovisioned
2,832,874 UART: [state] DebugLocked = No
2,833,576 UART: [state] WD Timer not started. Device not locked for debugging
2,834,794 UART: [kat] SHA2-256
3,638,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,642,473 UART: [kat] ++
3,642,625 UART: [kat] sha1
3,646,847 UART: [kat] SHA2-256
3,648,787 UART: [kat] SHA2-384
3,651,530 UART: [kat] SHA2-512-ACC
3,653,430 UART: [kat] ECC-384
3,662,619 UART: [kat] HMAC-384Kdf
3,667,207 UART: [kat] LMS
3,915,519 UART: [kat] --
3,916,711 UART: [update-reset] ++
3,933,841 >>> mbox cmd response: failed
3,933,841 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,934,239 UART: ROM Non-Fatal Error: 0x000B001E
3,935,079 UART: [state] Locking Datavault
3,935,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,936,495 UART: [state] Locking ICCM
3,937,045 UART: [exit] Launching FMC @ 0x40000000
3,942,342 UART:
3,942,358 UART: Running Caliptra FMC ...
3,942,766 UART:
3,942,988 UART: [fmc] Received command: 0x1000000C
3,943,723 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 ready_for_fw is high
1,055,804 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,314 >>> mbox cmd response: success
2,643,529 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,649,716 UART:
2,649,732 UART: Running Caliptra FMC ...
2,650,140 UART:
2,650,370 UART: [fmc] Received command: 0x46574C44
3,638,885 >>> mbox cmd response: failed
3,638,885 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,644,890 UART:
3,644,906 UART: Running Caliptra FMC ...
3,645,314 UART:
3,645,536 UART: [fmc] Received command: 0x1000000C
3,646,271 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,248 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,048 UART: [kat] ++
896,200 UART: [kat] sha1
900,322 UART: [kat] SHA2-256
902,262 UART: [kat] SHA2-384
905,055 UART: [kat] SHA2-512-ACC
906,956 UART: [kat] ECC-384
916,697 UART: [kat] HMAC-384Kdf
921,377 UART: [kat] LMS
1,169,689 UART: [kat] --
1,170,766 UART: [cold-reset] ++
1,171,288 UART: [fht] FHT @ 0x50003400
1,174,060 UART: [idev] ++
1,174,228 UART: [idev] CDI.KEYID = 6
1,174,589 UART: [idev] SUBJECT.KEYID = 7
1,175,014 UART: [idev] UDS.KEYID = 0
1,175,360 ready_for_fw is high
1,175,360 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,183,224 UART: [idev] Erasing UDS.KEYID = 0
1,200,250 UART: [idev] Sha1 KeyId Algorithm
1,209,014 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,809 UART: [ldev] Erasing FE.KEYID = 1
1,243,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,317 UART: [ldev] --
1,282,641 UART: [fwproc] Wait for Commands...
1,283,312 UART: [fwproc] Recv command 0x46574c44
1,284,045 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,554 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,897 >>> mbox cmd response: success
2,740,990 UART: [afmc] ++
2,741,158 UART: [afmc] CDI.KEYID = 6
2,741,521 UART: [afmc] SUBJECT.KEYID = 7
2,741,947 UART: [afmc] AUTHORITY.KEYID = 5
2,777,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,794,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,761 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,800,476 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,368 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,812,080 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,819,999 UART: [afmc] --
2,821,075 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,821,097 UART: [cold-reset] --
2,821,777 UART: [state] Locking Datavault
2,822,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,498 UART: [state] Locking ICCM
2,824,170 UART: [exit] Launching FMC @ 0x40000000
2,829,467 UART:
2,829,483 UART: Running Caliptra FMC ...
2,829,891 UART:
2,830,121 UART: [fmc] Received command: 0x46574C44
2,830,947 UART:
2,830,963 UART: Running Caliptra ROM ...
2,831,371 UART:
2,831,513 UART: [state] CFI Enabled
2,833,849 UART: [state] LifecycleState = Unprovisioned
2,834,504 UART: [state] DebugLocked = No
2,834,996 UART: [state] WD Timer not started. Device not locked for debugging
2,836,346 UART: [kat] SHA2-256
3,639,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,644,025 UART: [kat] ++
3,644,177 UART: [kat] sha1
3,648,363 UART: [kat] SHA2-256
3,650,303 UART: [kat] SHA2-384
3,653,128 UART: [kat] SHA2-512-ACC
3,655,028 UART: [kat] ECC-384
3,664,881 UART: [kat] HMAC-384Kdf
3,669,551 UART: [kat] LMS
3,917,863 UART: [kat] --
3,918,557 UART: [update-reset] ++
3,935,143 >>> mbox cmd response: failed
3,935,143 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,935,621 UART: ROM Non-Fatal Error: 0x000B001E
3,936,461 UART: [state] Locking Datavault
3,937,195 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,799 UART: [state] Locking ICCM
3,938,237 UART: [exit] Launching FMC @ 0x40000000
3,943,534 UART:
3,943,550 UART: Running Caliptra FMC ...
3,943,958 UART:
3,944,180 UART: [fmc] Received command: 0x1000000C
3,944,915 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,627 ready_for_fw is high
1,056,627 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,587,755 >>> mbox cmd response: success
2,644,516 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,650,871 UART:
2,650,887 UART: Running Caliptra FMC ...
2,651,295 UART:
2,651,525 UART: [fmc] Received command: 0x46574C44
3,639,749 >>> mbox cmd response: failed
3,639,749 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,645,440 UART:
3,645,456 UART: Running Caliptra FMC ...
3,645,864 UART:
3,646,086 UART: [fmc] Received command: 0x1000000C
3,646,821 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,817 UART: [kat] SHA2-256
901,757 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,310 UART: [kat] HMAC-384Kdf
920,988 UART: [kat] LMS
1,169,300 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,174,603 ready_for_fw is high
1,174,603 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,231 UART: [idev] Erasing UDS.KEYID = 0
1,199,197 UART: [idev] Sha1 KeyId Algorithm
1,208,053 UART: [idev] --
1,209,176 UART: [ldev] ++
1,209,344 UART: [ldev] CDI.KEYID = 6
1,209,708 UART: [ldev] SUBJECT.KEYID = 5
1,210,135 UART: [ldev] AUTHORITY.KEYID = 7
1,210,598 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,242,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,086 UART: [ldev] --
1,281,574 UART: [fwproc] Wait for Commands...
1,282,357 UART: [fwproc] Recv command 0x46574c44
1,283,090 UART: [fwproc] Recv'd Img size: 111752 bytes
2,551,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,578,459 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,604,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,739,694 >>> mbox cmd response: success
2,740,743 UART: [afmc] ++
2,740,911 UART: [afmc] CDI.KEYID = 6
2,741,274 UART: [afmc] SUBJECT.KEYID = 7
2,741,700 UART: [afmc] AUTHORITY.KEYID = 5
2,777,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,604 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,800,319 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,806,211 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,811,923 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,819,804 UART: [afmc] --
2,820,666 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,820,688 UART: [cold-reset] --
2,821,540 UART: [state] Locking Datavault
2,822,499 UART: [state] Locking PCR0, PCR1 and PCR31
2,823,103 UART: [state] Locking ICCM
2,823,561 UART: [exit] Launching FMC @ 0x40000000
2,828,858 UART:
2,828,874 UART: Running Caliptra FMC ...
2,829,282 UART:
2,829,512 UART: [fmc] Received command: 0x46574C44
2,830,338 UART:
2,830,354 UART: Running Caliptra ROM ...
2,830,762 UART:
2,830,817 UART: [state] CFI Enabled
2,833,385 UART: [state] LifecycleState = Unprovisioned
2,834,040 UART: [state] DebugLocked = No
2,834,672 UART: [state] WD Timer not started. Device not locked for debugging
2,836,006 UART: [kat] SHA2-256
3,639,556 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,643,685 UART: [kat] ++
3,643,837 UART: [kat] sha1
3,648,301 UART: [kat] SHA2-256
3,650,241 UART: [kat] SHA2-384
3,653,012 UART: [kat] SHA2-512-ACC
3,654,912 UART: [kat] ECC-384
3,664,411 UART: [kat] HMAC-384Kdf
3,668,917 UART: [kat] LMS
3,917,229 UART: [kat] --
3,917,919 UART: [update-reset] ++
3,934,957 >>> mbox cmd response: failed
3,934,957 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,935,579 UART: ROM Non-Fatal Error: 0x000B001E
3,936,421 UART: [state] Locking Datavault
3,937,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,937,847 UART: [state] Locking ICCM
3,938,365 UART: [exit] Launching FMC @ 0x40000000
3,943,662 UART:
3,943,678 UART: Running Caliptra FMC ...
3,944,086 UART:
3,944,308 UART: [fmc] Received command: 0x1000000C
3,945,043 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,018 ready_for_fw is high
1,056,018 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,387 >>> mbox cmd response: success
2,645,472 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,651,697 UART:
2,651,713 UART: Running Caliptra FMC ...
2,652,121 UART:
2,652,351 UART: [fmc] Received command: 0x46574C44
3,642,208 >>> mbox cmd response: failed
3,642,208 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,647,729 UART:
3,647,745 UART: Running Caliptra FMC ...
3,648,153 UART:
3,648,375 UART: [fmc] Received command: 0x1000000C
3,649,110 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,330 UART: [cold-reset] ++
1,170,850 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,096 UART: [idev] Sha1 KeyId Algorithm
1,209,214 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,755 UART: [ldev] SUBJECT.KEYID = 5
1,211,182 UART: [ldev] AUTHORITY.KEYID = 7
1,211,645 UART: [ldev] FE.KEYID = 1
1,216,917 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,465 UART: [fwproc] Wait for Commands...
1,283,054 UART: [fwproc] Recv command 0x46574c44
1,283,787 UART: [fwproc] Recv'd Img size: 111752 bytes
2,552,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,579,868 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,605,553 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,741,249 >>> mbox cmd response: success
2,742,366 UART: [afmc] ++
2,742,534 UART: [afmc] CDI.KEYID = 6
2,742,897 UART: [afmc] SUBJECT.KEYID = 7
2,743,323 UART: [afmc] AUTHORITY.KEYID = 5
2,779,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,795,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,796,565 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,802,280 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,808,172 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,813,884 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,821,531 UART: [afmc] --
2,822,411 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,822,433 UART: [cold-reset] --
2,823,363 UART: [state] Locking Datavault
2,824,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,824,962 UART: [state] Locking ICCM
2,825,490 UART: [exit] Launching FMC @ 0x40000000
2,830,787 UART:
2,830,803 UART: Running Caliptra FMC ...
2,831,211 UART:
2,831,441 UART: [fmc] Received command: 0x46574C44
2,832,267 UART:
2,832,283 UART: Running Caliptra ROM ...
2,832,691 UART:
2,832,833 UART: [state] CFI Enabled
2,835,735 UART: [state] LifecycleState = Unprovisioned
2,836,390 UART: [state] DebugLocked = No
2,837,056 UART: [state] WD Timer not started. Device not locked for debugging
2,838,300 UART: [kat] SHA2-256
3,641,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,645,979 UART: [kat] ++
3,646,131 UART: [kat] sha1
3,650,225 UART: [kat] SHA2-256
3,652,165 UART: [kat] SHA2-384
3,655,016 UART: [kat] SHA2-512-ACC
3,656,916 UART: [kat] ECC-384
3,667,061 UART: [kat] HMAC-384Kdf
3,671,729 UART: [kat] LMS
3,920,041 UART: [kat] --
3,921,189 UART: [update-reset] ++
3,938,007 >>> mbox cmd response: failed
3,938,007 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,938,379 UART: ROM Non-Fatal Error: 0x000B001E
3,939,335 UART: [state] Locking Datavault
3,940,199 UART: [state] Locking PCR0, PCR1 and PCR31
3,940,803 UART: [state] Locking ICCM
3,941,249 UART: [exit] Launching FMC @ 0x40000000
3,946,546 UART:
3,946,562 UART: Running Caliptra FMC ...
3,946,970 UART:
3,947,192 UART: [fmc] Received command: 0x1000000C
3,947,927 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,099 ready_for_fw is high
1,057,099 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,427 >>> mbox cmd response: success
2,647,860 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,654,371 UART:
2,654,387 UART: Running Caliptra FMC ...
2,654,795 UART:
2,655,025 UART: [fmc] Received command: 0x46574C44
3,644,301 >>> mbox cmd response: failed
3,644,301 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,650,174 UART:
3,650,190 UART: Running Caliptra FMC ...
3,650,598 UART:
3,650,820 UART: [fmc] Received command: 0x1000000C
3,651,555 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,210 UART:
192,565 UART: Running Caliptra ROM ...
193,685 UART:
193,831 UART: [state] CFI Enabled
264,657 UART: [state] LifecycleState = Unprovisioned
267,065 UART: [state] DebugLocked = No
269,103 UART: [state] WD Timer not started. Device not locked for debugging
272,844 UART: [kat] SHA2-256
454,590 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,114 UART: [kat] ++
466,578 UART: [kat] sha1
477,398 UART: [kat] SHA2-256
480,405 UART: [kat] SHA2-384
487,312 UART: [kat] SHA2-512-ACC
489,888 UART: [kat] ECC-384
3,774,719 UART: [kat] HMAC-384Kdf
3,801,101 UART: [kat] LMS
4,874,184 UART: [kat] --
4,877,610 UART: [cold-reset] ++
4,878,974 UART: [fht] FHT @ 0x50003400
4,889,273 UART: [idev] ++
4,889,981 UART: [idev] CDI.KEYID = 6
4,891,151 UART: [idev] SUBJECT.KEYID = 7
4,892,329 UART: [idev] UDS.KEYID = 0
4,893,227 ready_for_fw is high
4,893,439 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,033,652 UART: [idev] Erasing UDS.KEYID = 0
8,240,796 UART: [idev] Sha1 KeyId Algorithm
8,262,083 UART: [idev] --
8,265,432 UART: [ldev] ++
8,265,906 UART: [ldev] CDI.KEYID = 6
8,267,154 UART: [ldev] SUBJECT.KEYID = 5
8,268,273 UART: [ldev] AUTHORITY.KEYID = 7
8,269,518 UART: [ldev] FE.KEYID = 1
8,316,423 UART: [ldev] Erasing FE.KEYID = 1
11,649,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,974,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,990,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,006,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,022,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,043,138 UART: [ldev] --
14,048,468 UART: [fwproc] Wait for Commands...
14,051,648 UART: [fwproc] Recv command 0x46574c44
14,053,923 UART: [fwproc] Recv'd Img size: 111408 bytes
22,228,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,309,650 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,369,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,686,669 >>> mbox cmd response: success
22,691,215 UART: [afmc] ++
22,691,957 UART: [afmc] CDI.KEYID = 6
22,693,074 UART: [afmc] SUBJECT.KEYID = 7
22,694,290 UART: [afmc] AUTHORITY.KEYID = 5
26,055,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,350,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,352,662 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,368,751 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,384,858 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,400,832 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,423,259 UART: [afmc] --
28,428,822 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
28,569,266 UART: [cold-reset] --
28,570,122 UART: [state] Locking Datavault
28,571,194 UART: [state] Locking PCR0, PCR1 and PCR31
28,572,726 UART: [state] Locking ICCM
28,573,603 UART: [exit] Launching FMC @ 0x40000000
28,574,946 UART:
28,575,092 UART: Running Caliptra FMC ...
28,576,189 UART:
28,576,342 UART: [fmc] Received command: 0x46574C44
28,577,716 UART:
28,577,862 UART: Running Caliptra ROM ...
28,578,959 UART:
28,579,110 UART: [state] CFI Enabled
28,640,803 UART: [state] LifecycleState = Unprovisioned
28,642,732 UART: [state] DebugLocked = No
28,645,350 UART: [state] WD Timer not started. Device not locked for debugging
28,650,356 UART: [kat] SHA2-256
28,832,282 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
28,843,821 UART: [kat] ++
28,844,270 UART: [kat] sha1
28,855,096 UART: [kat] SHA2-256
28,858,101 UART: [kat] SHA2-384
28,864,261 UART: [kat] SHA2-512-ACC
28,866,866 UART: [kat] ECC-384
32,153,431 UART: [kat] HMAC-384Kdf
32,180,999 UART: [kat] LMS
33,254,135 UART: [kat] --
33,258,899 UART: [update-reset] ++
33,312,472 >>> mbox cmd response: failed
33,312,849 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,314,857 UART: ROM Non-Fatal Error: 0x000B003D
33,317,111 UART: [state] Locking Datavault
33,321,614 UART: [state] Locking PCR0, PCR1 and PCR31
33,323,749 UART: [state] Locking ICCM
33,326,330 UART: [exit] Launching FMC @ 0x40000000
33,334,954 UART:
33,335,231 UART: Running Caliptra FMC ...
33,336,337 UART:
33,336,500 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,338,133 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
4,781,139 ready_for_fw is high
4,781,784 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
22,321,112 >>> mbox cmd response: success
28,009,838 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
28,150,373 UART:
28,150,758 UART: Running Caliptra FMC ...
28,151,953 UART:
28,152,127 UART: [fmc] Received command: 0x46574C44
32,799,067 >>> mbox cmd response: failed
32,799,556 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,810,103 UART:
32,810,364 UART: Running Caliptra FMC ...
32,811,548 UART:
32,811,704 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,813,343 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,510 UART:
192,871 UART: Running Caliptra ROM ...
193,987 UART:
603,654 UART: [state] CFI Enabled
616,000 UART: [state] LifecycleState = Unprovisioned
618,394 UART: [state] DebugLocked = No
621,044 UART: [state] WD Timer not started. Device not locked for debugging
626,420 UART: [kat] SHA2-256
808,373 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,904 UART: [kat] ++
820,416 UART: [kat] sha1
831,163 UART: [kat] SHA2-256
834,205 UART: [kat] SHA2-384
838,499 UART: [kat] SHA2-512-ACC
841,097 UART: [kat] ECC-384
4,098,124 UART: [kat] HMAC-384Kdf
4,109,371 UART: [kat] LMS
5,182,507 UART: [kat] --
5,186,893 UART: [cold-reset] ++
5,188,829 UART: [fht] FHT @ 0x50003400
5,200,367 UART: [idev] ++
5,201,073 UART: [idev] CDI.KEYID = 6
5,202,314 UART: [idev] SUBJECT.KEYID = 7
5,203,767 UART: [idev] UDS.KEYID = 0
5,204,952 ready_for_fw is high
5,205,184 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,345,257 UART: [idev] Erasing UDS.KEYID = 0
8,493,546 UART: [idev] Sha1 KeyId Algorithm
8,515,676 UART: [idev] --
8,519,965 UART: [ldev] ++
8,520,562 UART: [ldev] CDI.KEYID = 6
8,521,791 UART: [ldev] SUBJECT.KEYID = 5
8,523,213 UART: [ldev] AUTHORITY.KEYID = 7
8,524,759 UART: [ldev] FE.KEYID = 1
8,537,931 UART: [ldev] Erasing FE.KEYID = 1
11,829,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,190,585 UART: [ldev] --
14,194,990 UART: [fwproc] Wait for Commands...
14,198,221 UART: [fwproc] Recv command 0x46574c44
14,200,523 UART: [fwproc] Recv'd Img size: 111408 bytes
22,302,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,384,593 UART: [fwproc] Load FMC at address 0x40000000 len 16384
22,444,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
22,761,049 >>> mbox cmd response: success
22,765,651 UART: [afmc] ++
22,766,367 UART: [afmc] CDI.KEYID = 6
22,767,611 UART: [afmc] SUBJECT.KEYID = 7
22,768,686 UART: [afmc] AUTHORITY.KEYID = 5
26,082,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,378,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,380,590 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
28,396,690 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
28,412,732 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
28,428,748 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
28,451,862 UART: [afmc] --
28,456,005 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
28,596,451 UART: [cold-reset] --
28,597,320 UART: [state] Locking Datavault
28,598,500 UART: [state] Locking PCR0, PCR1 and PCR31
28,600,031 UART: [state] Locking ICCM
28,600,938 UART: [exit] Launching FMC @ 0x40000000
28,602,353 UART:
28,602,503 UART: Running Caliptra FMC ...
28,603,594 UART:
28,603,741 UART: [fmc] Received command: 0x46574C44
28,605,187 UART:
28,605,330 UART: Running Caliptra ROM ...
28,606,417 UART:
28,606,558 UART: [state] CFI Enabled
28,614,374 UART: [state] LifecycleState = Unprovisioned
28,616,192 UART: [state] DebugLocked = No
28,618,257 UART: [state] WD Timer not started. Device not locked for debugging
28,623,134 UART: [kat] SHA2-256
28,805,111 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
28,816,626 UART: [kat] ++
28,817,230 UART: [kat] sha1
28,827,812 UART: [kat] SHA2-256
28,830,816 UART: [kat] SHA2-384
28,835,083 UART: [kat] SHA2-512-ACC
28,837,704 UART: [kat] ECC-384
32,094,052 UART: [kat] HMAC-384Kdf
32,106,613 UART: [kat] LMS
33,179,751 UART: [kat] --
33,186,672 UART: [update-reset] ++
33,233,693 >>> mbox cmd response: failed
33,234,104 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
33,236,487 UART: ROM Non-Fatal Error: 0x000B003D
33,238,777 UART: [state] Locking Datavault
33,241,373 UART: [state] Locking PCR0, PCR1 and PCR31
33,243,549 UART: [state] Locking ICCM
33,245,929 UART: [exit] Launching FMC @ 0x40000000
33,254,591 UART:
33,254,820 UART: Running Caliptra FMC ...
33,255,920 UART:
33,256,066 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
33,257,692 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
5,100,479 ready_for_fw is high
5,101,078 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
22,255,148 >>> mbox cmd response: success
27,881,702 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
28,022,025 UART:
28,022,401 UART: Running Caliptra FMC ...
28,023,593 UART:
28,023,766 UART: [fmc] Received command: 0x46574C44
32,562,258 >>> mbox cmd response: failed
32,562,736 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
32,575,712 UART:
32,575,963 UART: Running Caliptra FMC ...
32,577,146 UART:
32,577,320 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
32,578,947 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,161 UART:
192,516 UART: Running Caliptra ROM ...
193,688 UART:
193,843 UART: [state] CFI Enabled
261,747 UART: [state] LifecycleState = Unprovisioned
263,652 UART: [state] DebugLocked = No
266,201 UART: [state] WD Timer not started. Device not locked for debugging
269,511 UART: [kat] SHA2-256
448,583 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,154 UART: [kat] ++
460,681 UART: [kat] sha1
472,126 UART: [kat] SHA2-256
475,128 UART: [kat] SHA2-384
481,415 UART: [kat] SHA2-512-ACC
484,360 UART: [kat] ECC-384
2,947,179 UART: [kat] HMAC-384Kdf
2,969,931 UART: [kat] LMS
3,499,392 UART: [kat] --
3,505,323 UART: [cold-reset] ++
3,507,115 UART: [fht] FHT @ 0x50003400
3,517,456 UART: [idev] ++
3,518,018 UART: [idev] CDI.KEYID = 6
3,518,939 UART: [idev] SUBJECT.KEYID = 7
3,520,124 UART: [idev] UDS.KEYID = 0
3,521,173 ready_for_fw is high
3,521,363 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,661,936 UART: [idev] Erasing UDS.KEYID = 0
6,024,000 UART: [idev] Sha1 KeyId Algorithm
6,047,145 UART: [idev] --
6,051,055 UART: [ldev] ++
6,051,634 UART: [ldev] CDI.KEYID = 6
6,052,548 UART: [ldev] SUBJECT.KEYID = 5
6,053,710 UART: [ldev] AUTHORITY.KEYID = 7
6,055,096 UART: [ldev] FE.KEYID = 1
6,099,033 UART: [ldev] Erasing FE.KEYID = 1
8,602,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,358 UART: [ldev] --
10,412,030 UART: [fwproc] Wait for Commands...
10,413,856 UART: [fwproc] Recv command 0x46574c44
10,415,898 UART: [fwproc] Recv'd Img size: 111752 bytes
14,925,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,004,096 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,064,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,381,094 >>> mbox cmd response: success
15,384,777 UART: [afmc] ++
15,385,390 UART: [afmc] CDI.KEYID = 6
15,386,281 UART: [afmc] SUBJECT.KEYID = 7
15,387,380 UART: [afmc] AUTHORITY.KEYID = 5
17,910,161 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,636,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,638,773 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,654,965 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,670,741 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,686,497 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,709,419 UART: [afmc] --
19,715,184 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
19,856,016 UART: [cold-reset] --
19,856,902 UART: [state] Locking Datavault
19,858,062 UART: [state] Locking PCR0, PCR1 and PCR31
19,859,604 UART: [state] Locking ICCM
19,860,512 UART: [exit] Launching FMC @ 0x40000000
19,861,937 UART:
19,862,093 UART: Running Caliptra FMC ...
19,863,192 UART:
19,863,351 UART: [fmc] Received command: 0x46574C44
19,864,809 UART:
19,864,962 UART: Running Caliptra ROM ...
19,866,058 UART:
19,866,214 UART: [state] CFI Enabled
19,928,718 UART: [state] LifecycleState = Unprovisioned
19,930,596 UART: [state] DebugLocked = No
19,932,415 UART: [state] WD Timer not started. Device not locked for debugging
19,936,375 UART: [kat] SHA2-256
20,115,466 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,127,068 UART: [kat] ++
20,127,608 UART: [kat] sha1
20,138,637 UART: [kat] SHA2-256
20,141,679 UART: [kat] SHA2-384
20,147,672 UART: [kat] SHA2-512-ACC
20,150,609 UART: [kat] ECC-384
22,611,714 UART: [kat] HMAC-384Kdf
22,635,744 UART: [kat] LMS
23,165,227 UART: [kat] --
23,169,389 UART: [update-reset] ++
23,221,114 >>> mbox cmd response: failed
23,221,563 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,223,090 UART: ROM Non-Fatal Error: 0x000B003D
23,226,145 UART: [state] Locking Datavault
23,228,587 UART: [state] Locking PCR0, PCR1 and PCR31
23,230,252 UART: [state] Locking ICCM
23,231,950 UART: [exit] Launching FMC @ 0x40000000
23,240,353 UART:
23,240,591 UART: Running Caliptra FMC ...
23,241,693 UART:
23,241,850 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,243,481 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,382,560 ready_for_fw is high
3,382,970 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,008,920 >>> mbox cmd response: success
19,281,879 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
19,422,820 UART:
19,423,215 UART: Running Caliptra FMC ...
19,424,399 UART:
19,424,598 UART: [fmc] Received command: 0x46574C44
22,635,250 >>> mbox cmd response: failed
22,635,724 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,648,859 UART:
22,649,119 UART: Running Caliptra FMC ...
22,650,298 UART:
22,650,461 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,652,097 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,303 UART:
192,690 UART: Running Caliptra ROM ...
193,809 UART:
603,416 UART: [state] CFI Enabled
614,957 UART: [state] LifecycleState = Unprovisioned
616,831 UART: [state] DebugLocked = No
618,712 UART: [state] WD Timer not started. Device not locked for debugging
622,227 UART: [kat] SHA2-256
801,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,888 UART: [kat] ++
813,419 UART: [kat] sha1
825,223 UART: [kat] SHA2-256
828,226 UART: [kat] SHA2-384
833,573 UART: [kat] SHA2-512-ACC
836,573 UART: [kat] ECC-384
3,275,653 UART: [kat] HMAC-384Kdf
3,287,819 UART: [kat] LMS
3,817,283 UART: [kat] --
3,822,273 UART: [cold-reset] ++
3,823,437 UART: [fht] FHT @ 0x50003400
3,835,052 UART: [idev] ++
3,835,621 UART: [idev] CDI.KEYID = 6
3,836,598 UART: [idev] SUBJECT.KEYID = 7
3,837,767 UART: [idev] UDS.KEYID = 0
3,838,689 ready_for_fw is high
3,838,879 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,979,259 UART: [idev] Erasing UDS.KEYID = 0
6,311,743 UART: [idev] Sha1 KeyId Algorithm
6,335,992 UART: [idev] --
6,339,651 UART: [ldev] ++
6,340,219 UART: [ldev] CDI.KEYID = 6
6,341,126 UART: [ldev] SUBJECT.KEYID = 5
6,342,333 UART: [ldev] AUTHORITY.KEYID = 7
6,343,561 UART: [ldev] FE.KEYID = 1
6,354,905 UART: [ldev] Erasing FE.KEYID = 1
8,829,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,622 UART: [ldev] --
10,618,652 UART: [fwproc] Wait for Commands...
10,620,634 UART: [fwproc] Recv command 0x46574c44
10,622,721 UART: [fwproc] Recv'd Img size: 111752 bytes
15,163,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,236,998 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,297,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,614,524 >>> mbox cmd response: success
15,619,118 UART: [afmc] ++
15,619,729 UART: [afmc] CDI.KEYID = 6
15,620,638 UART: [afmc] SUBJECT.KEYID = 7
15,621,818 UART: [afmc] AUTHORITY.KEYID = 5
18,122,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,841,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,843,763 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,859,767 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,875,741 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,891,532 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,913,890 UART: [afmc] --
19,918,820 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
20,059,597 UART: [cold-reset] --
20,060,466 UART: [state] Locking Datavault
20,061,583 UART: [state] Locking PCR0, PCR1 and PCR31
20,063,185 UART: [state] Locking ICCM
20,064,093 UART: [exit] Launching FMC @ 0x40000000
20,065,572 UART:
20,065,749 UART: Running Caliptra FMC ...
20,066,858 UART:
20,067,022 UART: [fmc] Received command: 0x46574C44
20,068,534 UART:
20,068,705 UART: Running Caliptra ROM ...
20,069,759 UART:
20,069,916 UART: [state] CFI Enabled
20,077,721 UART: [state] LifecycleState = Unprovisioned
20,079,593 UART: [state] DebugLocked = No
20,081,871 UART: [state] WD Timer not started. Device not locked for debugging
20,084,886 UART: [kat] SHA2-256
20,264,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,275,651 UART: [kat] ++
20,276,181 UART: [kat] sha1
20,286,368 UART: [kat] SHA2-256
20,289,420 UART: [kat] SHA2-384
20,295,998 UART: [kat] SHA2-512-ACC
20,298,954 UART: [kat] ECC-384
22,739,955 UART: [kat] HMAC-384Kdf
22,753,305 UART: [kat] LMS
23,282,812 UART: [kat] --
23,286,337 UART: [update-reset] ++
23,336,977 >>> mbox cmd response: failed
23,337,386 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,340,525 UART: ROM Non-Fatal Error: 0x000B003D
23,344,277 UART: [state] Locking Datavault
23,347,795 UART: [state] Locking PCR0, PCR1 and PCR31
23,349,485 UART: [state] Locking ICCM
23,351,713 UART: [exit] Launching FMC @ 0x40000000
23,360,102 UART:
23,360,340 UART: Running Caliptra FMC ...
23,361,370 UART:
23,361,515 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,363,166 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,703,192 ready_for_fw is high
3,703,779 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,210,379 >>> mbox cmd response: success
19,445,870 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
19,586,860 UART:
19,587,237 UART: Running Caliptra FMC ...
19,588,433 UART:
19,588,601 UART: [fmc] Received command: 0x46574C44
22,723,163 >>> mbox cmd response: failed
22,723,620 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,738,969 UART:
22,739,223 UART: Running Caliptra FMC ...
22,740,399 UART:
22,740,554 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,742,183 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,015 UART:
192,379 UART: Running Caliptra ROM ...
193,460 UART:
193,602 UART: [state] CFI Enabled
263,370 UART: [state] LifecycleState = Unprovisioned
265,278 UART: [state] DebugLocked = No
267,385 UART: [state] WD Timer not started. Device not locked for debugging
271,260 UART: [kat] SHA2-256
450,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,987 UART: [kat] ++
462,517 UART: [kat] sha1
473,254 UART: [kat] SHA2-256
476,262 UART: [kat] SHA2-384
481,332 UART: [kat] SHA2-512-ACC
484,269 UART: [kat] ECC-384
2,945,985 UART: [kat] HMAC-384Kdf
2,969,976 UART: [kat] LMS
3,499,415 UART: [kat] --
3,505,215 UART: [cold-reset] ++
3,506,586 UART: [fht] FHT @ 0x50003400
3,518,771 UART: [idev] ++
3,519,342 UART: [idev] CDI.KEYID = 6
3,520,263 UART: [idev] SUBJECT.KEYID = 7
3,521,436 UART: [idev] UDS.KEYID = 0
3,522,358 ready_for_fw is high
3,522,587 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,663,242 UART: [idev] Erasing UDS.KEYID = 0
6,025,285 UART: [idev] Sha1 KeyId Algorithm
6,049,702 UART: [idev] --
6,053,862 UART: [ldev] ++
6,054,437 UART: [ldev] CDI.KEYID = 6
6,055,352 UART: [ldev] SUBJECT.KEYID = 5
6,056,514 UART: [ldev] AUTHORITY.KEYID = 7
6,057,746 UART: [ldev] FE.KEYID = 1
6,098,902 UART: [ldev] Erasing FE.KEYID = 1
8,602,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,395 UART: [ldev] --
10,409,925 UART: [fwproc] Wait for Commands...
10,412,515 UART: [fwproc] Recv command 0x46574c44
10,414,609 UART: [fwproc] Recv'd Img size: 111752 bytes
14,954,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,029,370 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,089,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,407,897 >>> mbox cmd response: success
15,411,865 UART: [afmc] ++
15,412,481 UART: [afmc] CDI.KEYID = 6
15,413,395 UART: [afmc] SUBJECT.KEYID = 7
15,414,557 UART: [afmc] AUTHORITY.KEYID = 5
17,959,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,681,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,683,740 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,699,719 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,715,725 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,731,516 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,753,590 UART: [afmc] --
19,759,409 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
19,900,262 UART: [cold-reset] --
19,901,127 UART: [state] Locking Datavault
19,902,280 UART: [state] Locking PCR0, PCR1 and PCR31
19,903,817 UART: [state] Locking ICCM
19,904,717 UART: [exit] Launching FMC @ 0x40000000
19,906,139 UART:
19,906,292 UART: Running Caliptra FMC ...
19,907,388 UART:
19,907,538 UART: [fmc] Received command: 0x46574C44
19,908,994 UART:
19,909,147 UART: Running Caliptra ROM ...
19,910,240 UART:
19,910,390 UART: [state] CFI Enabled
19,972,801 UART: [state] LifecycleState = Unprovisioned
19,974,673 UART: [state] DebugLocked = No
19,976,490 UART: [state] WD Timer not started. Device not locked for debugging
19,979,741 UART: [kat] SHA2-256
20,158,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,170,438 UART: [kat] ++
20,170,978 UART: [kat] sha1
20,181,983 UART: [kat] SHA2-256
20,185,039 UART: [kat] SHA2-384
20,190,816 UART: [kat] SHA2-512-ACC
20,193,758 UART: [kat] ECC-384
22,639,727 UART: [kat] HMAC-384Kdf
22,660,629 UART: [kat] LMS
23,189,949 UART: [kat] --
23,194,757 UART: [update-reset] ++
23,247,073 >>> mbox cmd response: failed
23,247,503 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,248,967 UART: ROM Non-Fatal Error: 0x000B003D
23,251,542 UART: [state] Locking Datavault
23,255,169 UART: [state] Locking PCR0, PCR1 and PCR31
23,256,812 UART: [state] Locking ICCM
23,259,339 UART: [exit] Launching FMC @ 0x40000000
23,267,739 UART:
23,267,983 UART: Running Caliptra FMC ...
23,269,087 UART:
23,269,243 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,270,876 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,380,683 ready_for_fw is high
3,381,081 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,022,481 >>> mbox cmd response: success
19,287,883 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
19,428,814 UART:
19,429,194 UART: Running Caliptra FMC ...
19,430,390 UART:
19,430,563 UART: [fmc] Received command: 0x46574C44
22,642,152 >>> mbox cmd response: failed
22,642,609 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,654,182 UART:
22,654,454 UART: Running Caliptra FMC ...
22,655,638 UART:
22,655,796 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,657,436 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,477 UART:
192,830 UART: Running Caliptra ROM ...
194,005 UART:
603,569 UART: [state] CFI Enabled
618,734 UART: [state] LifecycleState = Unprovisioned
620,602 UART: [state] DebugLocked = No
622,616 UART: [state] WD Timer not started. Device not locked for debugging
626,311 UART: [kat] SHA2-256
805,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,937 UART: [kat] ++
817,453 UART: [kat] sha1
828,394 UART: [kat] SHA2-256
831,463 UART: [kat] SHA2-384
838,512 UART: [kat] SHA2-512-ACC
841,445 UART: [kat] ECC-384
3,283,002 UART: [kat] HMAC-384Kdf
3,295,240 UART: [kat] LMS
3,824,726 UART: [kat] --
3,828,478 UART: [cold-reset] ++
3,830,510 UART: [fht] FHT @ 0x50003400
3,841,705 UART: [idev] ++
3,842,273 UART: [idev] CDI.KEYID = 6
3,843,159 UART: [idev] SUBJECT.KEYID = 7
3,844,398 UART: [idev] UDS.KEYID = 0
3,845,325 ready_for_fw is high
3,845,518 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,985,882 UART: [idev] Erasing UDS.KEYID = 0
6,314,851 UART: [idev] Sha1 KeyId Algorithm
6,337,975 UART: [idev] --
6,341,000 UART: [ldev] ++
6,341,572 UART: [ldev] CDI.KEYID = 6
6,342,476 UART: [ldev] SUBJECT.KEYID = 5
6,343,688 UART: [ldev] AUTHORITY.KEYID = 7
6,344,913 UART: [ldev] FE.KEYID = 1
6,355,776 UART: [ldev] Erasing FE.KEYID = 1
8,829,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,620 UART: [ldev] --
10,617,797 UART: [fwproc] Wait for Commands...
10,619,401 UART: [fwproc] Recv command 0x46574c44
10,621,488 UART: [fwproc] Recv'd Img size: 111752 bytes
15,155,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,230,246 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,290,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,608,578 >>> mbox cmd response: success
15,613,232 UART: [afmc] ++
15,613,844 UART: [afmc] CDI.KEYID = 6
15,614,915 UART: [afmc] SUBJECT.KEYID = 7
15,616,024 UART: [afmc] AUTHORITY.KEYID = 5
18,112,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,834,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,835,868 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,851,858 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,867,876 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,883,644 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,905,932 UART: [afmc] --
19,911,476 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
20,052,135 UART: [cold-reset] --
20,053,190 UART: [state] Locking Datavault
20,054,321 UART: [state] Locking PCR0, PCR1 and PCR31
20,055,958 UART: [state] Locking ICCM
20,056,889 UART: [exit] Launching FMC @ 0x40000000
20,058,394 UART:
20,058,566 UART: Running Caliptra FMC ...
20,059,620 UART:
20,059,782 UART: [fmc] Received command: 0x46574C44
20,061,228 UART:
20,061,378 UART: Running Caliptra ROM ...
20,062,418 UART:
20,062,568 UART: [state] CFI Enabled
20,071,829 UART: [state] LifecycleState = Unprovisioned
20,073,791 UART: [state] DebugLocked = No
20,074,875 UART: [state] WD Timer not started. Device not locked for debugging
20,078,421 UART: [kat] SHA2-256
20,257,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
20,269,187 UART: [kat] ++
20,269,659 UART: [kat] sha1
20,281,622 UART: [kat] SHA2-256
20,284,635 UART: [kat] SHA2-384
20,289,966 UART: [kat] SHA2-512-ACC
20,292,956 UART: [kat] ECC-384
22,733,740 UART: [kat] HMAC-384Kdf
22,746,177 UART: [kat] LMS
23,275,647 UART: [kat] --
23,281,044 UART: [update-reset] ++
23,331,904 >>> mbox cmd response: failed
23,332,271 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,333,892 UART: ROM Non-Fatal Error: 0x000B003D
23,337,159 UART: [state] Locking Datavault
23,340,791 UART: [state] Locking PCR0, PCR1 and PCR31
23,342,434 UART: [state] Locking ICCM
23,344,388 UART: [exit] Launching FMC @ 0x40000000
23,352,795 UART:
23,353,043 UART: Running Caliptra FMC ...
23,354,068 UART:
23,354,215 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,355,841 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,696,483 ready_for_fw is high
3,697,309 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
15,233,856 >>> mbox cmd response: success
19,469,373 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
19,610,290 UART:
19,610,671 UART: Running Caliptra FMC ...
19,611,778 UART:
19,611,931 UART: [fmc] Received command: 0x46574C44
22,745,252 >>> mbox cmd response: failed
22,745,733 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
22,757,151 UART:
22,757,443 UART: Running Caliptra FMC ...
22,758,629 UART:
22,758,786 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
22,760,422 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,174,473 ready_for_fw is high
1,174,473 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,199,263 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,242,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,950 UART: [ldev] --
1,281,270 UART: [fwproc] Wait for Commands...
1,282,071 UART: [fwproc] Recv command 0x46574c44
1,282,804 UART: [fwproc] Recv'd Img size: 111752 bytes
3,094,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,122,967 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,148,652 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,284,152 >>> mbox cmd response: success
3,285,311 UART: [afmc] ++
3,285,479 UART: [afmc] CDI.KEYID = 6
3,285,842 UART: [afmc] SUBJECT.KEYID = 7
3,286,268 UART: [afmc] AUTHORITY.KEYID = 5
3,321,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,337,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,338,680 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,344,391 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,350,278 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,355,976 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,363,705 UART: [afmc] --
3,364,715 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,364,737 UART: [cold-reset] --
3,365,711 UART: [state] Locking Datavault
3,366,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,367,576 UART: [state] Locking ICCM
3,368,116 UART: [exit] Launching FMC @ 0x40000000
3,373,413 UART:
3,373,429 UART: Running Caliptra FMC ...
3,373,837 UART:
3,374,067 UART: [fmc] Received command: 0x46574C44
3,374,893 UART:
3,374,909 UART: Running Caliptra ROM ...
3,375,317 UART:
3,375,372 UART: [state] CFI Enabled
3,377,972 UART: [state] LifecycleState = Unprovisioned
3,378,627 UART: [state] DebugLocked = No
3,379,217 UART: [state] WD Timer not started. Device not locked for debugging
3,380,483 UART: [kat] SHA2-256
4,184,033 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,188,162 UART: [kat] ++
4,188,314 UART: [kat] sha1
4,192,580 UART: [kat] SHA2-256
4,194,520 UART: [kat] SHA2-384
4,197,157 UART: [kat] SHA2-512-ACC
4,199,057 UART: [kat] ECC-384
4,208,336 UART: [kat] HMAC-384Kdf
4,213,022 UART: [kat] LMS
4,461,334 UART: [kat] --
4,462,084 UART: [update-reset] ++
4,479,792 >>> mbox cmd response: failed
4,479,792 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,480,154 UART: ROM Non-Fatal Error: 0x000B003D
4,481,050 UART: [state] Locking Datavault
4,481,906 UART: [state] Locking PCR0, PCR1 and PCR31
4,482,510 UART: [state] Locking ICCM
4,483,056 UART: [exit] Launching FMC @ 0x40000000
4,488,353 UART:
4,488,369 UART: Running Caliptra FMC ...
4,488,777 UART:
4,488,999 UART: [fmc] Received command: 0x1000000C
4,489,734 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,710 ready_for_fw is high
1,056,710 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,132,764 >>> mbox cmd response: success
3,188,195 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,194,476 UART:
3,194,492 UART: Running Caliptra FMC ...
3,194,900 UART:
3,195,130 UART: [fmc] Received command: 0x46574C44
4,185,363 >>> mbox cmd response: failed
4,185,363 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,191,132 UART:
4,191,148 UART: Running Caliptra FMC ...
4,191,556 UART:
4,191,778 UART: [fmc] Received command: 0x1000000C
4,192,513 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,911 UART: [state] LifecycleState = Unprovisioned
86,566 UART: [state] DebugLocked = No
87,234 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
892,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,154 UART: [kat] ++
896,306 UART: [kat] sha1
900,554 UART: [kat] SHA2-256
902,494 UART: [kat] SHA2-384
905,165 UART: [kat] SHA2-512-ACC
907,066 UART: [kat] ECC-384
916,763 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,626 UART: [cold-reset] ++
1,171,104 UART: [fht] FHT @ 0x50003400
1,173,718 UART: [idev] ++
1,173,886 UART: [idev] CDI.KEYID = 6
1,174,247 UART: [idev] SUBJECT.KEYID = 7
1,174,672 UART: [idev] UDS.KEYID = 0
1,175,018 ready_for_fw is high
1,175,018 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,618 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,487 UART: [ldev] Erasing FE.KEYID = 1
1,243,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,605 UART: [ldev] --
1,283,023 UART: [fwproc] Wait for Commands...
1,283,794 UART: [fwproc] Recv command 0x46574c44
1,284,527 UART: [fwproc] Recv'd Img size: 111752 bytes
3,098,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,126,429 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,287,574 >>> mbox cmd response: success
3,288,833 UART: [afmc] ++
3,289,001 UART: [afmc] CDI.KEYID = 6
3,289,364 UART: [afmc] SUBJECT.KEYID = 7
3,289,790 UART: [afmc] AUTHORITY.KEYID = 5
3,324,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,341,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,342,176 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,347,887 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,353,774 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,359,472 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,367,161 UART: [afmc] --
3,368,033 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,368,055 UART: [cold-reset] --
3,369,007 UART: [state] Locking Datavault
3,369,858 UART: [state] Locking PCR0, PCR1 and PCR31
3,370,462 UART: [state] Locking ICCM
3,370,992 UART: [exit] Launching FMC @ 0x40000000
3,376,289 UART:
3,376,305 UART: Running Caliptra FMC ...
3,376,713 UART:
3,376,943 UART: [fmc] Received command: 0x46574C44
3,377,769 UART:
3,377,785 UART: Running Caliptra ROM ...
3,378,193 UART:
3,378,335 UART: [state] CFI Enabled
3,381,339 UART: [state] LifecycleState = Unprovisioned
3,381,994 UART: [state] DebugLocked = No
3,382,536 UART: [state] WD Timer not started. Device not locked for debugging
3,383,796 UART: [kat] SHA2-256
4,187,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,191,475 UART: [kat] ++
4,191,627 UART: [kat] sha1
4,195,887 UART: [kat] SHA2-256
4,197,827 UART: [kat] SHA2-384
4,200,714 UART: [kat] SHA2-512-ACC
4,202,614 UART: [kat] ECC-384
4,212,477 UART: [kat] HMAC-384Kdf
4,217,087 UART: [kat] LMS
4,465,399 UART: [kat] --
4,466,063 UART: [update-reset] ++
4,483,645 >>> mbox cmd response: failed
4,483,645 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,483,995 UART: ROM Non-Fatal Error: 0x000B003D
4,484,905 UART: [state] Locking Datavault
4,485,733 UART: [state] Locking PCR0, PCR1 and PCR31
4,486,337 UART: [state] Locking ICCM
4,486,975 UART: [exit] Launching FMC @ 0x40000000
4,492,272 UART:
4,492,288 UART: Running Caliptra FMC ...
4,492,696 UART:
4,492,918 UART: [fmc] Received command: 0x1000000C
4,493,653 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,875 ready_for_fw is high
1,056,875 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,143,453 >>> mbox cmd response: success
3,198,946 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,205,033 UART:
3,205,049 UART: Running Caliptra FMC ...
3,205,457 UART:
3,205,687 UART: [fmc] Received command: 0x46574C44
4,195,771 >>> mbox cmd response: failed
4,195,771 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,201,654 UART:
4,201,670 UART: Running Caliptra FMC ...
4,202,078 UART:
4,202,300 UART: [fmc] Received command: 0x1000000C
4,203,035 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
904,026 UART: [kat] SHA2-512-ACC
905,927 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,405 UART: [cold-reset] ++
1,169,731 UART: [fht] FHT @ 0x50003400
1,172,375 UART: [idev] ++
1,172,543 UART: [idev] CDI.KEYID = 6
1,172,904 UART: [idev] SUBJECT.KEYID = 7
1,173,329 UART: [idev] UDS.KEYID = 0
1,173,675 ready_for_fw is high
1,173,675 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,375 UART: [idev] Erasing UDS.KEYID = 0
1,198,017 UART: [idev] Sha1 KeyId Algorithm
1,206,743 UART: [idev] --
1,207,730 UART: [ldev] ++
1,207,898 UART: [ldev] CDI.KEYID = 6
1,208,262 UART: [ldev] SUBJECT.KEYID = 5
1,208,689 UART: [ldev] AUTHORITY.KEYID = 7
1,209,152 UART: [ldev] FE.KEYID = 1
1,214,364 UART: [ldev] Erasing FE.KEYID = 1
1,240,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,876 UART: [ldev] --
1,280,368 UART: [fwproc] Wait for Commands...
1,281,143 UART: [fwproc] Recv command 0x46574c44
1,281,876 UART: [fwproc] Recv'd Img size: 111752 bytes
3,082,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,110,878 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,136,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,272,153 >>> mbox cmd response: success
3,273,252 UART: [afmc] ++
3,273,420 UART: [afmc] CDI.KEYID = 6
3,273,783 UART: [afmc] SUBJECT.KEYID = 7
3,274,209 UART: [afmc] AUTHORITY.KEYID = 5
3,309,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,325,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,326,223 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,331,934 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,337,821 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,343,519 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,351,460 UART: [afmc] --
3,352,418 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,352,440 UART: [cold-reset] --
3,353,520 UART: [state] Locking Datavault
3,354,737 UART: [state] Locking PCR0, PCR1 and PCR31
3,355,341 UART: [state] Locking ICCM
3,355,827 UART: [exit] Launching FMC @ 0x40000000
3,361,124 UART:
3,361,140 UART: Running Caliptra FMC ...
3,361,548 UART:
3,361,778 UART: [fmc] Received command: 0x46574C44
3,362,604 UART:
3,362,620 UART: Running Caliptra ROM ...
3,363,028 UART:
3,363,083 UART: [state] CFI Enabled
3,365,957 UART: [state] LifecycleState = Unprovisioned
3,366,612 UART: [state] DebugLocked = No
3,367,174 UART: [state] WD Timer not started. Device not locked for debugging
3,368,330 UART: [kat] SHA2-256
4,171,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,176,009 UART: [kat] ++
4,176,161 UART: [kat] sha1
4,180,305 UART: [kat] SHA2-256
4,182,245 UART: [kat] SHA2-384
4,184,884 UART: [kat] SHA2-512-ACC
4,186,784 UART: [kat] ECC-384
4,196,583 UART: [kat] HMAC-384Kdf
4,200,955 UART: [kat] LMS
4,449,267 UART: [kat] --
4,449,869 UART: [update-reset] ++
4,467,757 >>> mbox cmd response: failed
4,467,757 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,468,209 UART: ROM Non-Fatal Error: 0x000B003D
4,469,053 UART: [state] Locking Datavault
4,469,859 UART: [state] Locking PCR0, PCR1 and PCR31
4,470,463 UART: [state] Locking ICCM
4,470,985 UART: [exit] Launching FMC @ 0x40000000
4,476,282 UART:
4,476,298 UART: Running Caliptra FMC ...
4,476,706 UART:
4,476,928 UART: [fmc] Received command: 0x1000000C
4,477,663 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,662 ready_for_fw is high
1,055,662 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,123,834 >>> mbox cmd response: success
3,179,345 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,185,282 UART:
3,185,298 UART: Running Caliptra FMC ...
3,185,706 UART:
3,185,936 UART: [fmc] Received command: 0x46574C44
4,175,803 >>> mbox cmd response: failed
4,175,803 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,181,442 UART:
4,181,458 UART: Running Caliptra FMC ...
4,181,866 UART:
4,182,088 UART: [fmc] Received command: 0x1000000C
4,182,823 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,691 UART: [kat] SHA2-512-ACC
906,592 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,671 UART: [kat] LMS
1,168,983 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,174,360 ready_for_fw is high
1,174,360 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,678 UART: [idev] Erasing UDS.KEYID = 0
1,198,874 UART: [idev] Sha1 KeyId Algorithm
1,207,630 UART: [idev] --
1,208,663 UART: [ldev] ++
1,208,831 UART: [ldev] CDI.KEYID = 6
1,209,195 UART: [ldev] SUBJECT.KEYID = 5
1,209,622 UART: [ldev] AUTHORITY.KEYID = 7
1,210,085 UART: [ldev] FE.KEYID = 1
1,215,539 UART: [ldev] Erasing FE.KEYID = 1
1,241,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,847 UART: [ldev] --
1,281,137 UART: [fwproc] Wait for Commands...
1,281,814 UART: [fwproc] Recv command 0x46574c44
1,282,547 UART: [fwproc] Recv'd Img size: 111752 bytes
3,099,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,127,300 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,152,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,288,643 >>> mbox cmd response: success
3,289,894 UART: [afmc] ++
3,290,062 UART: [afmc] CDI.KEYID = 6
3,290,425 UART: [afmc] SUBJECT.KEYID = 7
3,290,851 UART: [afmc] AUTHORITY.KEYID = 5
3,326,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,342,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,343,607 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,349,318 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,355,205 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,360,903 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,368,674 UART: [afmc] --
3,369,536 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,369,558 UART: [cold-reset] --
3,370,324 UART: [state] Locking Datavault
3,371,357 UART: [state] Locking PCR0, PCR1 and PCR31
3,371,961 UART: [state] Locking ICCM
3,372,393 UART: [exit] Launching FMC @ 0x40000000
3,377,690 UART:
3,377,706 UART: Running Caliptra FMC ...
3,378,114 UART:
3,378,344 UART: [fmc] Received command: 0x46574C44
3,379,170 UART:
3,379,186 UART: Running Caliptra ROM ...
3,379,594 UART:
3,379,736 UART: [state] CFI Enabled
3,382,752 UART: [state] LifecycleState = Unprovisioned
3,383,407 UART: [state] DebugLocked = No
3,384,041 UART: [state] WD Timer not started. Device not locked for debugging
3,385,253 UART: [kat] SHA2-256
4,188,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,192,932 UART: [kat] ++
4,193,084 UART: [kat] sha1
4,197,322 UART: [kat] SHA2-256
4,199,262 UART: [kat] SHA2-384
4,202,103 UART: [kat] SHA2-512-ACC
4,204,003 UART: [kat] ECC-384
4,213,724 UART: [kat] HMAC-384Kdf
4,218,270 UART: [kat] LMS
4,466,582 UART: [kat] --
4,467,376 UART: [update-reset] ++
4,484,790 >>> mbox cmd response: failed
4,484,790 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,485,206 UART: ROM Non-Fatal Error: 0x000B003D
4,486,072 UART: [state] Locking Datavault
4,486,976 UART: [state] Locking PCR0, PCR1 and PCR31
4,487,580 UART: [state] Locking ICCM
4,488,094 UART: [exit] Launching FMC @ 0x40000000
4,493,391 UART:
4,493,407 UART: Running Caliptra FMC ...
4,493,815 UART:
4,494,037 UART: [fmc] Received command: 0x1000000C
4,494,772 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,559 ready_for_fw is high
1,055,559 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,131,292 >>> mbox cmd response: success
3,186,345 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,192,642 UART:
3,192,658 UART: Running Caliptra FMC ...
3,193,066 UART:
3,193,296 UART: [fmc] Received command: 0x46574C44
4,184,216 >>> mbox cmd response: failed
4,184,216 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,189,835 UART:
4,189,851 UART: Running Caliptra FMC ...
4,190,259 UART:
4,190,481 UART: [fmc] Received command: 0x1000000C
4,191,216 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,618 UART: [state] LifecycleState = Unprovisioned
85,273 UART: [state] DebugLocked = No
85,823 UART: [state] WD Timer not started. Device not locked for debugging
86,980 UART: [kat] SHA2-256
890,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,659 UART: [kat] ++
894,811 UART: [kat] sha1
898,889 UART: [kat] SHA2-256
900,829 UART: [kat] SHA2-384
903,490 UART: [kat] SHA2-512-ACC
905,391 UART: [kat] ECC-384
915,000 UART: [kat] HMAC-384Kdf
919,384 UART: [kat] LMS
1,167,696 UART: [kat] --
1,168,395 UART: [cold-reset] ++
1,168,935 UART: [fht] FHT @ 0x50003400
1,171,691 UART: [idev] ++
1,171,859 UART: [idev] CDI.KEYID = 6
1,172,220 UART: [idev] SUBJECT.KEYID = 7
1,172,645 UART: [idev] UDS.KEYID = 0
1,172,991 ready_for_fw is high
1,172,991 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,180,489 UART: [idev] Erasing UDS.KEYID = 0
1,197,331 UART: [idev] Sha1 KeyId Algorithm
1,206,105 UART: [idev] --
1,207,082 UART: [ldev] ++
1,207,250 UART: [ldev] CDI.KEYID = 6
1,207,614 UART: [ldev] SUBJECT.KEYID = 5
1,208,041 UART: [ldev] AUTHORITY.KEYID = 7
1,208,504 UART: [ldev] FE.KEYID = 1
1,213,862 UART: [ldev] Erasing FE.KEYID = 1
1,240,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,134 UART: [ldev] --
1,279,582 UART: [fwproc] Wait for Commands...
1,280,405 UART: [fwproc] Recv command 0x46574c44
1,281,138 UART: [fwproc] Recv'd Img size: 111752 bytes
3,102,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,130,129 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,155,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,291,488 >>> mbox cmd response: success
3,292,723 UART: [afmc] ++
3,292,891 UART: [afmc] CDI.KEYID = 6
3,293,254 UART: [afmc] SUBJECT.KEYID = 7
3,293,680 UART: [afmc] AUTHORITY.KEYID = 5
3,329,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,345,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,346,322 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,352,033 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,357,920 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,363,618 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,371,457 UART: [afmc] --
3,372,563 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,372,585 UART: [cold-reset] --
3,373,593 UART: [state] Locking Datavault
3,374,736 UART: [state] Locking PCR0, PCR1 and PCR31
3,375,340 UART: [state] Locking ICCM
3,375,946 UART: [exit] Launching FMC @ 0x40000000
3,381,243 UART:
3,381,259 UART: Running Caliptra FMC ...
3,381,667 UART:
3,381,897 UART: [fmc] Received command: 0x46574C44
3,382,723 UART:
3,382,739 UART: Running Caliptra ROM ...
3,383,147 UART:
3,383,202 UART: [state] CFI Enabled
3,385,604 UART: [state] LifecycleState = Unprovisioned
3,386,259 UART: [state] DebugLocked = No
3,386,909 UART: [state] WD Timer not started. Device not locked for debugging
3,388,195 UART: [kat] SHA2-256
4,191,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,195,874 UART: [kat] ++
4,196,026 UART: [kat] sha1
4,200,242 UART: [kat] SHA2-256
4,202,182 UART: [kat] SHA2-384
4,204,877 UART: [kat] SHA2-512-ACC
4,206,777 UART: [kat] ECC-384
4,216,430 UART: [kat] HMAC-384Kdf
4,220,888 UART: [kat] LMS
4,469,200 UART: [kat] --
4,470,114 UART: [update-reset] ++
4,487,276 >>> mbox cmd response: failed
4,487,276 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,487,580 UART: ROM Non-Fatal Error: 0x000B003D
4,488,548 UART: [state] Locking Datavault
4,489,174 UART: [state] Locking PCR0, PCR1 and PCR31
4,489,778 UART: [state] Locking ICCM
4,490,410 UART: [exit] Launching FMC @ 0x40000000
4,495,707 UART:
4,495,723 UART: Running Caliptra FMC ...
4,496,131 UART:
4,496,353 UART: [fmc] Received command: 0x1000000C
4,497,088 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,100 ready_for_fw is high
1,056,100 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,133,356 >>> mbox cmd response: success
3,189,513 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,195,148 UART:
3,195,164 UART: Running Caliptra FMC ...
3,195,572 UART:
3,195,802 UART: [fmc] Received command: 0x46574C44
4,184,867 >>> mbox cmd response: failed
4,184,867 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,190,990 UART:
4,191,006 UART: Running Caliptra FMC ...
4,191,414 UART:
4,191,636 UART: [fmc] Received command: 0x1000000C
4,192,371 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,391 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,680 UART: [fht] FHT @ 0x50003400
1,173,422 UART: [idev] ++
1,173,590 UART: [idev] CDI.KEYID = 6
1,173,951 UART: [idev] SUBJECT.KEYID = 7
1,174,376 UART: [idev] UDS.KEYID = 0
1,174,722 ready_for_fw is high
1,174,722 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,548 UART: [idev] Erasing UDS.KEYID = 0
1,199,786 UART: [idev] Sha1 KeyId Algorithm
1,208,540 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,241,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,569 UART: [ldev] --
1,280,839 UART: [fwproc] Wait for Commands...
1,281,590 UART: [fwproc] Recv command 0x46574c44
1,282,323 UART: [fwproc] Recv'd Img size: 111752 bytes
3,092,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,120,231 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,145,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,281,546 >>> mbox cmd response: success
3,282,613 UART: [afmc] ++
3,282,781 UART: [afmc] CDI.KEYID = 6
3,283,144 UART: [afmc] SUBJECT.KEYID = 7
3,283,570 UART: [afmc] AUTHORITY.KEYID = 5
3,318,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,335,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,336,214 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,341,925 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,347,812 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,353,510 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,361,465 UART: [afmc] --
3,362,469 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,362,491 UART: [cold-reset] --
3,363,563 UART: [state] Locking Datavault
3,364,920 UART: [state] Locking PCR0, PCR1 and PCR31
3,365,524 UART: [state] Locking ICCM
3,366,178 UART: [exit] Launching FMC @ 0x40000000
3,371,475 UART:
3,371,491 UART: Running Caliptra FMC ...
3,371,899 UART:
3,372,129 UART: [fmc] Received command: 0x46574C44
3,372,955 UART:
3,372,971 UART: Running Caliptra ROM ...
3,373,379 UART:
3,373,521 UART: [state] CFI Enabled
3,376,031 UART: [state] LifecycleState = Unprovisioned
3,376,686 UART: [state] DebugLocked = No
3,377,392 UART: [state] WD Timer not started. Device not locked for debugging
3,378,520 UART: [kat] SHA2-256
4,182,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,186,199 UART: [kat] ++
4,186,351 UART: [kat] sha1
4,190,697 UART: [kat] SHA2-256
4,192,637 UART: [kat] SHA2-384
4,195,234 UART: [kat] SHA2-512-ACC
4,197,134 UART: [kat] ECC-384
4,206,525 UART: [kat] HMAC-384Kdf
4,211,189 UART: [kat] LMS
4,459,501 UART: [kat] --
4,460,425 UART: [update-reset] ++
4,478,145 >>> mbox cmd response: failed
4,478,145 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,478,581 UART: ROM Non-Fatal Error: 0x000B003D
4,479,337 UART: [state] Locking Datavault
4,480,147 UART: [state] Locking PCR0, PCR1 and PCR31
4,480,751 UART: [state] Locking ICCM
4,481,237 UART: [exit] Launching FMC @ 0x40000000
4,486,534 UART:
4,486,550 UART: Running Caliptra FMC ...
4,486,958 UART:
4,487,180 UART: [fmc] Received command: 0x1000000C
4,487,915 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,689 ready_for_fw is high
1,056,689 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,138,560 >>> mbox cmd response: success
3,194,789 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,201,460 UART:
3,201,476 UART: Running Caliptra FMC ...
3,201,884 UART:
3,202,114 UART: [fmc] Received command: 0x46574C44
4,192,094 >>> mbox cmd response: failed
4,192,094 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,197,415 UART:
4,197,431 UART: Running Caliptra FMC ...
4,197,839 UART:
4,198,061 UART: [fmc] Received command: 0x1000000C
4,198,796 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,099 UART:
192,489 UART: Running Caliptra ROM ...
193,573 UART:
193,715 UART: [state] CFI Enabled
262,260 UART: [state] LifecycleState = Unprovisioned
264,664 UART: [state] DebugLocked = No
266,328 UART: [state] WD Timer not started. Device not locked for debugging
270,856 UART: [kat] SHA2-256
452,809 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,320 UART: [kat] ++
464,844 UART: [kat] sha1
474,990 UART: [kat] SHA2-256
477,975 UART: [kat] SHA2-384
483,117 UART: [kat] SHA2-512-ACC
485,717 UART: [kat] ECC-384
3,773,477 UART: [kat] HMAC-384Kdf
3,800,844 UART: [kat] LMS
4,874,054 UART: [kat] --
4,878,334 UART: [cold-reset] ++
4,880,347 UART: [fht] FHT @ 0x50003400
4,892,599 UART: [idev] ++
4,893,302 UART: [idev] CDI.KEYID = 6
4,894,473 UART: [idev] SUBJECT.KEYID = 7
4,895,654 UART: [idev] UDS.KEYID = 0
4,896,553 ready_for_fw is high
4,896,732 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,030,355 UART: [idev] Erasing UDS.KEYID = 0
8,240,321 UART: [idev] Sha1 KeyId Algorithm
8,262,809 UART: [idev] --
8,267,180 UART: [ldev] ++
8,267,771 UART: [ldev] CDI.KEYID = 6
8,268,951 UART: [ldev] SUBJECT.KEYID = 5
8,270,063 UART: [ldev] AUTHORITY.KEYID = 7
8,271,353 UART: [ldev] FE.KEYID = 1
8,315,170 UART: [ldev] Erasing FE.KEYID = 1
11,648,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,940,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,956,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,972,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,988,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,008,887 UART: [ldev] --
14,014,117 UART: [fwproc] Wait for Commands...
14,015,998 UART: [fwproc] Recv command 0x46574c44
14,018,308 UART: [fwproc] Recv'd Img size: 106340 bytes
17,987,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,058,506 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,101,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,416,752 >>> mbox cmd response: success
18,420,667 UART: [afmc] ++
18,421,279 UART: [afmc] CDI.KEYID = 6
18,422,469 UART: [afmc] SUBJECT.KEYID = 7
18,423,522 UART: [afmc] AUTHORITY.KEYID = 5
21,792,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,091,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,093,701 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,109,798 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,125,871 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,141,943 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,163,384 UART: [afmc] --
24,167,762 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,168,539 UART: [cold-reset] --
24,172,401 UART: [state] Locking Datavault
24,177,206 UART: [state] Locking PCR0, PCR1 and PCR31
24,178,909 UART: [state] Locking ICCM
24,181,797 UART: [exit] Launching FMC @ 0x40000000
24,190,414 UART:
24,190,647 UART: Running Caliptra FMC ...
24,191,743 UART:
24,191,901 UART: [fmc] Received command: 0x46574C44
24,193,353 UART:
24,193,508 UART: Running Caliptra ROM ...
24,194,603 UART:
24,194,756 UART: [state] CFI Enabled
24,257,371 UART: [state] LifecycleState = Unprovisioned
24,259,270 UART: [state] DebugLocked = No
24,261,415 UART: [state] WD Timer not started. Device not locked for debugging
24,265,750 UART: [kat] SHA2-256
24,447,656 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,459,170 UART: [kat] ++
24,459,627 UART: [kat] sha1
24,469,496 UART: [kat] SHA2-256
24,472,520 UART: [kat] SHA2-384
24,478,667 UART: [kat] SHA2-512-ACC
24,481,274 UART: [kat] ECC-384
27,771,040 UART: [kat] HMAC-384Kdf
27,796,022 UART: [kat] LMS
28,869,161 UART: [kat] --
28,873,588 UART: [update-reset] ++
28,880,803 >>> mbox cmd response: failed
28,883,962 UART: ROM Non-Fatal Error: 0x000B0001
28,887,252 UART: [state] Locking Datavault
28,891,423 UART: [state] Locking PCR0, PCR1 and PCR31
28,893,625 UART: [state] Locking ICCM
28,896,261 UART: [exit] Launching FMC @ 0x40000000
28,904,927 UART:
28,905,171 UART: Running Caliptra FMC ...
28,906,315 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
4,783,914 ready_for_fw is high
4,784,335 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,220,756 >>> mbox cmd response: success
23,895,043 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
23,911,472 UART:
23,911,825 UART: Running Caliptra FMC ...
23,913,087 UART:
23,913,258 UART: [fmc] Received command: 0x46574C44
28,494,513 >>> mbox cmd response: failed
28,508,535 UART:
28,508,840 UART: Running Caliptra FMC ...
28,509,917 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,420 UART:
192,793 UART: Running Caliptra ROM ...
193,916 UART:
603,728 UART: [state] CFI Enabled
615,106 UART: [state] LifecycleState = Unprovisioned
617,473 UART: [state] DebugLocked = No
618,790 UART: [state] WD Timer not started. Device not locked for debugging
623,317 UART: [kat] SHA2-256
805,264 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
816,838 UART: [kat] ++
817,385 UART: [kat] sha1
828,120 UART: [kat] SHA2-256
831,188 UART: [kat] SHA2-384
836,173 UART: [kat] SHA2-512-ACC
838,754 UART: [kat] ECC-384
4,094,160 UART: [kat] HMAC-384Kdf
4,106,476 UART: [kat] LMS
5,179,636 UART: [kat] --
5,184,240 UART: [cold-reset] ++
5,186,169 UART: [fht] FHT @ 0x50003400
5,197,501 UART: [idev] ++
5,198,209 UART: [idev] CDI.KEYID = 6
5,199,380 UART: [idev] SUBJECT.KEYID = 7
5,200,827 UART: [idev] UDS.KEYID = 0
5,202,088 ready_for_fw is high
5,202,309 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
5,336,234 UART: [idev] Erasing UDS.KEYID = 0
8,489,474 UART: [idev] Sha1 KeyId Algorithm
8,509,995 UART: [idev] --
8,514,960 UART: [ldev] ++
8,515,579 UART: [ldev] CDI.KEYID = 6
8,516,675 UART: [ldev] SUBJECT.KEYID = 5
8,518,197 UART: [ldev] AUTHORITY.KEYID = 7
8,519,733 UART: [ldev] FE.KEYID = 1
8,532,010 UART: [ldev] Erasing FE.KEYID = 1
11,819,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,129,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,145,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,161,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,182,075 UART: [ldev] --
14,186,688 UART: [fwproc] Wait for Commands...
14,189,062 UART: [fwproc] Recv command 0x46574c44
14,191,366 UART: [fwproc] Recv'd Img size: 106340 bytes
18,162,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,236,418 UART: [fwproc] Load FMC at address 0x40000000 len 11316
18,278,876 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,595,591 >>> mbox cmd response: success
18,599,904 UART: [afmc] ++
18,600,529 UART: [afmc] CDI.KEYID = 6
18,601,666 UART: [afmc] SUBJECT.KEYID = 7
18,602,823 UART: [afmc] AUTHORITY.KEYID = 5
21,916,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,211,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,214,285 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
24,230,342 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
24,246,384 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
24,262,464 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
24,285,208 UART: [afmc] --
24,288,309 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,289,082 UART: [cold-reset] --
24,291,193 UART: [state] Locking Datavault
24,294,984 UART: [state] Locking PCR0, PCR1 and PCR31
24,296,622 UART: [state] Locking ICCM
24,298,598 UART: [exit] Launching FMC @ 0x40000000
24,307,255 UART:
24,307,481 UART: Running Caliptra FMC ...
24,308,578 UART:
24,308,726 UART: [fmc] Received command: 0x46574C44
24,310,174 UART:
24,310,322 UART: Running Caliptra ROM ...
24,311,407 UART:
24,311,553 UART: [state] CFI Enabled
24,323,101 UART: [state] LifecycleState = Unprovisioned
24,324,948 UART: [state] DebugLocked = No
24,326,434 UART: [state] WD Timer not started. Device not locked for debugging
24,330,797 UART: [kat] SHA2-256
24,512,744 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
24,524,305 UART: [kat] ++
24,524,756 UART: [kat] sha1
24,535,402 UART: [kat] SHA2-256
24,538,420 UART: [kat] SHA2-384
24,544,834 UART: [kat] SHA2-512-ACC
24,547,443 UART: [kat] ECC-384
27,801,314 UART: [kat] HMAC-384Kdf
27,813,589 UART: [kat] LMS
28,886,723 UART: [kat] --
28,891,593 UART: [update-reset] ++
28,899,935 >>> mbox cmd response: failed
28,903,473 UART: ROM Non-Fatal Error: 0x000B0001
28,906,246 UART: [state] Locking Datavault
28,908,305 UART: [state] Locking PCR0, PCR1 and PCR31
28,910,503 UART: [state] Locking ICCM
28,912,591 UART: [exit] Launching FMC @ 0x40000000
28,921,272 UART:
28,921,558 UART: Running Caliptra FMC ...
28,922,628 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
5,100,070 ready_for_fw is high
5,100,697 <<< Executing mbox cmd 0x46574c44 (106340 bytes) from SoC
18,425,808 >>> mbox cmd response: success
24,039,861 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
24,054,643 UART:
24,054,996 UART: Running Caliptra FMC ...
24,056,261 UART:
24,056,430 UART: [fmc] Received command: 0x46574C44
28,546,965 >>> mbox cmd response: failed
28,561,149 UART:
28,561,431 UART: Running Caliptra FMC ...
28,562,583 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,136 UART:
192,507 UART: Running Caliptra ROM ...
193,688 UART:
193,837 UART: [state] CFI Enabled
258,598 UART: [state] LifecycleState = Unprovisioned
260,517 UART: [state] DebugLocked = No
263,048 UART: [state] WD Timer not started. Device not locked for debugging
266,374 UART: [kat] SHA2-256
445,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,036 UART: [kat] ++
457,576 UART: [kat] sha1
469,096 UART: [kat] SHA2-256
472,129 UART: [kat] SHA2-384
476,956 UART: [kat] SHA2-512-ACC
479,911 UART: [kat] ECC-384
2,924,748 UART: [kat] HMAC-384Kdf
2,947,794 UART: [kat] LMS
3,477,218 UART: [kat] --
3,481,218 UART: [cold-reset] ++
3,483,219 UART: [fht] FHT @ 0x50003400
3,493,066 UART: [idev] ++
3,493,632 UART: [idev] CDI.KEYID = 6
3,494,539 UART: [idev] SUBJECT.KEYID = 7
3,495,714 UART: [idev] UDS.KEYID = 0
3,496,758 ready_for_fw is high
3,496,951 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,631,175 UART: [idev] Erasing UDS.KEYID = 0
6,003,355 UART: [idev] Sha1 KeyId Algorithm
6,026,645 UART: [idev] --
6,030,587 UART: [ldev] ++
6,031,161 UART: [ldev] CDI.KEYID = 6
6,032,093 UART: [ldev] SUBJECT.KEYID = 5
6,033,262 UART: [ldev] AUTHORITY.KEYID = 7
6,034,494 UART: [ldev] FE.KEYID = 1
6,076,105 UART: [ldev] Erasing FE.KEYID = 1
8,581,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,160 UART: [ldev] --
10,388,689 UART: [fwproc] Wait for Commands...
10,391,019 UART: [fwproc] Recv command 0x46574c44
10,393,158 UART: [fwproc] Recv'd Img size: 106684 bytes
13,704,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,780,806 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,823,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,141,573 >>> mbox cmd response: success
14,145,917 UART: [afmc] ++
14,146,524 UART: [afmc] CDI.KEYID = 6
14,147,410 UART: [afmc] SUBJECT.KEYID = 7
14,148,512 UART: [afmc] AUTHORITY.KEYID = 5
16,674,745 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,399,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,400,974 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,416,967 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,432,892 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,448,809 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,471,404 UART: [afmc] --
18,475,327 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,476,055 UART: [cold-reset] --
18,478,702 UART: [state] Locking Datavault
18,483,738 UART: [state] Locking PCR0, PCR1 and PCR31
18,485,456 UART: [state] Locking ICCM
18,487,126 UART: [exit] Launching FMC @ 0x40000000
18,495,526 UART:
18,495,762 UART: Running Caliptra FMC ...
18,496,862 UART:
18,497,020 UART: [fmc] Received command: 0x46574C44
18,498,477 UART:
18,498,633 UART: Running Caliptra ROM ...
18,499,725 UART:
18,499,877 UART: [state] CFI Enabled
18,558,065 UART: [state] LifecycleState = Unprovisioned
18,559,946 UART: [state] DebugLocked = No
18,562,680 UART: [state] WD Timer not started. Device not locked for debugging
18,566,576 UART: [kat] SHA2-256
18,745,704 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,757,280 UART: [kat] ++
18,757,844 UART: [kat] sha1
18,769,606 UART: [kat] SHA2-256
18,772,626 UART: [kat] SHA2-384
18,778,609 UART: [kat] SHA2-512-ACC
18,781,550 UART: [kat] ECC-384
21,247,599 UART: [kat] HMAC-384Kdf
21,269,717 UART: [kat] LMS
21,799,170 UART: [kat] --
21,802,928 UART: [update-reset] ++
21,811,323 >>> mbox cmd response: failed
21,813,685 UART: ROM Non-Fatal Error: 0x000B0001
21,816,631 UART: [state] Locking Datavault
21,819,519 UART: [state] Locking PCR0, PCR1 and PCR31
21,821,202 UART: [state] Locking ICCM
21,823,200 UART: [exit] Launching FMC @ 0x40000000
21,831,580 UART:
21,831,889 UART: Running Caliptra FMC ...
21,833,047 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,379,978 ready_for_fw is high
3,380,355 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,957,144 >>> mbox cmd response: success
18,226,891 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,241,233 UART:
18,241,577 UART: Running Caliptra FMC ...
18,242,804 UART:
18,242,993 UART: [fmc] Received command: 0x46574C44
21,424,248 >>> mbox cmd response: failed
21,437,104 UART:
21,437,377 UART: Running Caliptra FMC ...
21,438,452 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,427 UART:
192,827 UART: Running Caliptra ROM ...
193,958 UART:
603,590 UART: [state] CFI Enabled
616,535 UART: [state] LifecycleState = Unprovisioned
618,414 UART: [state] DebugLocked = No
620,508 UART: [state] WD Timer not started. Device not locked for debugging
624,469 UART: [kat] SHA2-256
803,612 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,155 UART: [kat] ++
815,695 UART: [kat] sha1
825,794 UART: [kat] SHA2-256
828,804 UART: [kat] SHA2-384
833,735 UART: [kat] SHA2-512-ACC
836,745 UART: [kat] ECC-384
3,276,776 UART: [kat] HMAC-384Kdf
3,289,429 UART: [kat] LMS
3,818,966 UART: [kat] --
3,824,482 UART: [cold-reset] ++
3,826,145 UART: [fht] FHT @ 0x50003400
3,837,052 UART: [idev] ++
3,837,613 UART: [idev] CDI.KEYID = 6
3,838,497 UART: [idev] SUBJECT.KEYID = 7
3,839,741 UART: [idev] UDS.KEYID = 0
3,840,639 ready_for_fw is high
3,840,835 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,974,962 UART: [idev] Erasing UDS.KEYID = 0
6,309,115 UART: [idev] Sha1 KeyId Algorithm
6,332,508 UART: [idev] --
6,335,850 UART: [ldev] ++
6,336,421 UART: [ldev] CDI.KEYID = 6
6,337,330 UART: [ldev] SUBJECT.KEYID = 5
6,338,543 UART: [ldev] AUTHORITY.KEYID = 7
6,339,769 UART: [ldev] FE.KEYID = 1
6,351,652 UART: [ldev] Erasing FE.KEYID = 1
8,826,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,888 UART: [ldev] --
10,620,330 UART: [fwproc] Wait for Commands...
10,621,940 UART: [fwproc] Recv command 0x46574c44
10,624,035 UART: [fwproc] Recv'd Img size: 106684 bytes
13,932,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,050 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,047,666 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,365,797 >>> mbox cmd response: success
14,370,855 UART: [afmc] ++
14,371,480 UART: [afmc] CDI.KEYID = 6
14,372,393 UART: [afmc] SUBJECT.KEYID = 7
14,373,575 UART: [afmc] AUTHORITY.KEYID = 5
16,873,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,531 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,613,526 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,629,415 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,645,356 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,668,786 UART: [afmc] --
18,672,277 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,672,999 UART: [cold-reset] --
18,676,358 UART: [state] Locking Datavault
18,682,169 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,909 UART: [state] Locking ICCM
18,686,529 UART: [exit] Launching FMC @ 0x40000000
18,694,931 UART:
18,695,163 UART: Running Caliptra FMC ...
18,696,277 UART:
18,696,430 UART: [fmc] Received command: 0x46574C44
18,697,883 UART:
18,698,036 UART: Running Caliptra ROM ...
18,699,133 UART:
18,699,285 UART: [state] CFI Enabled
18,714,130 UART: [state] LifecycleState = Unprovisioned
18,715,963 UART: [state] DebugLocked = No
18,717,708 UART: [state] WD Timer not started. Device not locked for debugging
18,722,343 UART: [kat] SHA2-256
18,901,475 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,913,054 UART: [kat] ++
18,913,510 UART: [kat] sha1
18,924,285 UART: [kat] SHA2-256
18,927,289 UART: [kat] SHA2-384
18,933,712 UART: [kat] SHA2-512-ACC
18,936,615 UART: [kat] ECC-384
21,377,797 UART: [kat] HMAC-384Kdf
21,392,018 UART: [kat] LMS
21,921,546 UART: [kat] --
21,925,539 UART: [update-reset] ++
21,932,794 >>> mbox cmd response: failed
21,935,290 UART: ROM Non-Fatal Error: 0x000B0001
21,938,598 UART: [state] Locking Datavault
21,942,031 UART: [state] Locking PCR0, PCR1 and PCR31
21,943,721 UART: [state] Locking ICCM
21,945,373 UART: [exit] Launching FMC @ 0x40000000
21,953,778 UART:
21,954,025 UART: Running Caliptra FMC ...
21,955,169 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,694,525 ready_for_fw is high
3,694,947 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,156,718 >>> mbox cmd response: success
18,394,507 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,408,532 UART:
18,408,904 UART: Running Caliptra FMC ...
18,410,081 UART:
18,410,237 UART: [fmc] Received command: 0x46574C44
21,501,033 >>> mbox cmd response: failed
21,512,643 UART:
21,512,921 UART: Running Caliptra FMC ...
21,513,996 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,132 UART:
192,521 UART: Running Caliptra ROM ...
193,704 UART:
193,858 UART: [state] CFI Enabled
262,833 UART: [state] LifecycleState = Unprovisioned
264,678 UART: [state] DebugLocked = No
265,862 UART: [state] WD Timer not started. Device not locked for debugging
268,850 UART: [kat] SHA2-256
447,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,597 UART: [kat] ++
460,128 UART: [kat] sha1
470,023 UART: [kat] SHA2-256
473,110 UART: [kat] SHA2-384
480,730 UART: [kat] SHA2-512-ACC
483,667 UART: [kat] ECC-384
2,949,629 UART: [kat] HMAC-384Kdf
2,972,677 UART: [kat] LMS
3,502,143 UART: [kat] --
3,505,990 UART: [cold-reset] ++
3,508,273 UART: [fht] FHT @ 0x50003400
3,518,398 UART: [idev] ++
3,518,960 UART: [idev] CDI.KEYID = 6
3,519,943 UART: [idev] SUBJECT.KEYID = 7
3,521,119 UART: [idev] UDS.KEYID = 0
3,522,047 ready_for_fw is high
3,522,241 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,656,477 UART: [idev] Erasing UDS.KEYID = 0
6,025,436 UART: [idev] Sha1 KeyId Algorithm
6,048,673 UART: [idev] --
6,053,974 UART: [ldev] ++
6,054,552 UART: [ldev] CDI.KEYID = 6
6,055,486 UART: [ldev] SUBJECT.KEYID = 5
6,056,708 UART: [ldev] AUTHORITY.KEYID = 7
6,057,906 UART: [ldev] FE.KEYID = 1
6,101,512 UART: [ldev] Erasing FE.KEYID = 1
8,601,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,650 UART: [ldev] --
10,394,843 UART: [fwproc] Wait for Commands...
10,396,886 UART: [fwproc] Recv command 0x46574c44
10,398,982 UART: [fwproc] Recv'd Img size: 106684 bytes
13,705,280 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,777,489 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,820,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,138,311 >>> mbox cmd response: success
14,142,588 UART: [afmc] ++
14,143,205 UART: [afmc] CDI.KEYID = 6
14,144,121 UART: [afmc] SUBJECT.KEYID = 7
14,145,292 UART: [afmc] AUTHORITY.KEYID = 5
16,683,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,407,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,409,277 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,425,277 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,441,177 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,457,126 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,479,055 UART: [afmc] --
18,482,725 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,483,471 UART: [cold-reset] --
18,488,068 UART: [state] Locking Datavault
18,492,892 UART: [state] Locking PCR0, PCR1 and PCR31
18,494,612 UART: [state] Locking ICCM
18,496,547 UART: [exit] Launching FMC @ 0x40000000
18,504,905 UART:
18,505,186 UART: Running Caliptra FMC ...
18,506,299 UART:
18,506,461 UART: [fmc] Received command: 0x46574C44
18,507,927 UART:
18,508,081 UART: Running Caliptra ROM ...
18,509,185 UART:
18,509,336 UART: [state] CFI Enabled
18,573,451 UART: [state] LifecycleState = Unprovisioned
18,575,340 UART: [state] DebugLocked = No
18,577,044 UART: [state] WD Timer not started. Device not locked for debugging
18,581,548 UART: [kat] SHA2-256
18,760,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,772,224 UART: [kat] ++
18,772,778 UART: [kat] sha1
18,784,103 UART: [kat] SHA2-256
18,787,117 UART: [kat] SHA2-384
18,792,778 UART: [kat] SHA2-512-ACC
18,795,720 UART: [kat] ECC-384
21,255,532 UART: [kat] HMAC-384Kdf
21,278,234 UART: [kat] LMS
21,807,661 UART: [kat] --
21,811,586 UART: [update-reset] ++
21,821,834 >>> mbox cmd response: failed
21,824,345 UART: ROM Non-Fatal Error: 0x000B0001
21,826,398 UART: [state] Locking Datavault
21,830,440 UART: [state] Locking PCR0, PCR1 and PCR31
21,832,127 UART: [state] Locking ICCM
21,834,626 UART: [exit] Launching FMC @ 0x40000000
21,843,030 UART:
21,843,314 UART: Running Caliptra FMC ...
21,844,463 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,361,000 ready_for_fw is high
3,361,733 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
13,926,653 >>> mbox cmd response: success
18,201,247 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,217,368 UART:
18,217,720 UART: Running Caliptra FMC ...
18,218,993 UART:
18,219,164 UART: [fmc] Received command: 0x46574C44
21,403,629 >>> mbox cmd response: failed
21,414,975 UART:
21,415,258 UART: Running Caliptra FMC ...
21,416,336 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,445 UART:
192,818 UART: Running Caliptra ROM ...
193,945 UART:
603,590 UART: [state] CFI Enabled
618,736 UART: [state] LifecycleState = Unprovisioned
620,607 UART: [state] DebugLocked = No
623,569 UART: [state] WD Timer not started. Device not locked for debugging
628,096 UART: [kat] SHA2-256
807,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,776 UART: [kat] ++
819,313 UART: [kat] sha1
828,908 UART: [kat] SHA2-256
831,913 UART: [kat] SHA2-384
839,105 UART: [kat] SHA2-512-ACC
842,109 UART: [kat] ECC-384
3,285,067 UART: [kat] HMAC-384Kdf
3,297,668 UART: [kat] LMS
3,827,153 UART: [kat] --
3,831,715 UART: [cold-reset] ++
3,834,179 UART: [fht] FHT @ 0x50003400
3,843,749 UART: [idev] ++
3,844,309 UART: [idev] CDI.KEYID = 6
3,845,385 UART: [idev] SUBJECT.KEYID = 7
3,846,489 UART: [idev] UDS.KEYID = 0
3,847,417 ready_for_fw is high
3,847,614 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
3,981,560 UART: [idev] Erasing UDS.KEYID = 0
6,317,707 UART: [idev] Sha1 KeyId Algorithm
6,341,847 UART: [idev] --
6,344,589 UART: [ldev] ++
6,345,153 UART: [ldev] CDI.KEYID = 6
6,346,061 UART: [ldev] SUBJECT.KEYID = 5
6,347,221 UART: [ldev] AUTHORITY.KEYID = 7
6,348,499 UART: [ldev] FE.KEYID = 1
6,357,671 UART: [ldev] Erasing FE.KEYID = 1
8,833,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,987 UART: [ldev] --
10,623,217 UART: [fwproc] Wait for Commands...
10,625,305 UART: [fwproc] Recv command 0x46574c44
10,627,395 UART: [fwproc] Recv'd Img size: 106684 bytes
13,932,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,109 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,043,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,361,648 >>> mbox cmd response: success
14,366,531 UART: [afmc] ++
14,367,143 UART: [afmc] CDI.KEYID = 6
14,368,056 UART: [afmc] SUBJECT.KEYID = 7
14,369,219 UART: [afmc] AUTHORITY.KEYID = 5
16,869,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,591,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,593,216 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,609,219 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,625,107 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,641,088 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,665,211 UART: [afmc] --
18,668,219 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,668,953 UART: [cold-reset] --
18,671,165 UART: [state] Locking Datavault
18,677,066 UART: [state] Locking PCR0, PCR1 and PCR31
18,678,781 UART: [state] Locking ICCM
18,681,362 UART: [exit] Launching FMC @ 0x40000000
18,689,756 UART:
18,689,986 UART: Running Caliptra FMC ...
18,691,079 UART:
18,691,243 UART: [fmc] Received command: 0x46574C44
18,692,696 UART:
18,692,867 UART: Running Caliptra ROM ...
18,693,962 UART:
18,694,112 UART: [state] CFI Enabled
18,708,798 UART: [state] LifecycleState = Unprovisioned
18,710,672 UART: [state] DebugLocked = No
18,713,618 UART: [state] WD Timer not started. Device not locked for debugging
18,717,037 UART: [kat] SHA2-256
18,896,193 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
18,907,762 UART: [kat] ++
18,908,300 UART: [kat] sha1
18,919,299 UART: [kat] SHA2-256
18,922,312 UART: [kat] SHA2-384
18,929,533 UART: [kat] SHA2-512-ACC
18,932,480 UART: [kat] ECC-384
21,369,696 UART: [kat] HMAC-384Kdf
21,382,557 UART: [kat] LMS
21,912,179 UART: [kat] --
21,916,659 UART: [update-reset] ++
21,924,018 >>> mbox cmd response: failed
21,927,070 UART: ROM Non-Fatal Error: 0x000B0001
21,929,293 UART: [state] Locking Datavault
21,931,113 UART: [state] Locking PCR0, PCR1 and PCR31
21,932,792 UART: [state] Locking ICCM
21,933,824 UART: [exit] Launching FMC @ 0x40000000
21,942,198 UART:
21,942,439 UART: Running Caliptra FMC ...
21,943,499 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,696,431 ready_for_fw is high
3,696,937 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
14,164,988 >>> mbox cmd response: success
18,400,312 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,414,006 UART:
18,414,374 UART: Running Caliptra FMC ...
18,415,552 UART:
18,415,703 UART: [fmc] Received command: 0x46574C44
21,504,819 >>> mbox cmd response: failed
21,520,255 UART:
21,520,553 UART: Running Caliptra FMC ...
21,521,647 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,620 UART: [state] LifecycleState = Unprovisioned
85,275 UART: [state] DebugLocked = No
85,847 UART: [state] WD Timer not started. Device not locked for debugging
87,148 UART: [kat] SHA2-256
890,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,827 UART: [kat] ++
894,979 UART: [kat] sha1
899,287 UART: [kat] SHA2-256
901,227 UART: [kat] SHA2-384
903,914 UART: [kat] SHA2-512-ACC
905,815 UART: [kat] ECC-384
915,632 UART: [kat] HMAC-384Kdf
920,346 UART: [kat] LMS
1,168,658 UART: [kat] --
1,169,727 UART: [cold-reset] ++
1,170,187 UART: [fht] FHT @ 0x50003400
1,172,919 UART: [idev] ++
1,173,087 UART: [idev] CDI.KEYID = 6
1,173,448 UART: [idev] SUBJECT.KEYID = 7
1,173,873 UART: [idev] UDS.KEYID = 0
1,174,219 ready_for_fw is high
1,174,219 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,198,665 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,916 UART: [fwproc] Wait for Commands...
1,281,655 UART: [fwproc] Recv command 0x46574c44
1,282,388 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,181 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,264 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,671,780 >>> mbox cmd response: success
2,673,035 UART: [afmc] ++
2,673,203 UART: [afmc] CDI.KEYID = 6
2,673,566 UART: [afmc] SUBJECT.KEYID = 7
2,673,992 UART: [afmc] AUTHORITY.KEYID = 5
2,709,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,726,815 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,535 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,428 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,121 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,751,864 UART: [afmc] --
2,752,736 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,752,758 UART: [cold-reset] --
2,753,398 UART: [state] Locking Datavault
2,754,241 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,845 UART: [state] Locking ICCM
2,755,435 UART: [exit] Launching FMC @ 0x40000000
2,760,732 UART:
2,760,748 UART: Running Caliptra FMC ...
2,761,156 UART:
2,761,294 UART: [fmc] Received command: 0x46574C44
2,762,123 UART:
2,762,139 UART: Running Caliptra ROM ...
2,762,547 UART:
2,762,602 UART: [state] CFI Enabled
2,764,708 UART: [state] LifecycleState = Unprovisioned
2,765,363 UART: [state] DebugLocked = No
2,765,911 UART: [state] WD Timer not started. Device not locked for debugging
2,767,219 UART: [kat] SHA2-256
3,570,769 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,574,898 UART: [kat] ++
3,575,050 UART: [kat] sha1
3,579,054 UART: [kat] SHA2-256
3,580,994 UART: [kat] SHA2-384
3,583,709 UART: [kat] SHA2-512-ACC
3,585,609 UART: [kat] ECC-384
3,595,146 UART: [kat] HMAC-384Kdf
3,599,690 UART: [kat] LMS
3,848,002 UART: [kat] --
3,849,064 UART: [update-reset] ++
3,850,689 >>> mbox cmd response: failed
3,850,903 UART: ROM Non-Fatal Error: 0x000B0001
3,851,781 UART: [state] Locking Datavault
3,852,577 UART: [state] Locking PCR0, PCR1 and PCR31
3,853,181 UART: [state] Locking ICCM
3,853,661 UART: [exit] Launching FMC @ 0x40000000
3,858,958 UART:
3,858,974 UART: Running Caliptra FMC ...
3,859,382 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,248 ready_for_fw is high
1,056,248 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,806 >>> mbox cmd response: success
2,577,964 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,583,797 UART:
2,583,813 UART: Running Caliptra FMC ...
2,584,221 UART:
2,584,359 UART: [fmc] Received command: 0x46574C44
3,558,358 >>> mbox cmd response: failed
3,564,163 UART:
3,564,179 UART: Running Caliptra FMC ...
3,564,587 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,185 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 ready_for_fw is high
1,174,314 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,199,324 UART: [idev] Sha1 KeyId Algorithm
1,208,424 UART: [idev] --
1,209,361 UART: [ldev] ++
1,209,529 UART: [ldev] CDI.KEYID = 6
1,209,893 UART: [ldev] SUBJECT.KEYID = 5
1,210,320 UART: [ldev] AUTHORITY.KEYID = 7
1,210,783 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,347 UART: [fwproc] Wait for Commands...
1,282,136 UART: [fwproc] Recv command 0x46574c44
1,282,869 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,714 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,536,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,435 >>> mbox cmd response: success
2,673,484 UART: [afmc] ++
2,673,652 UART: [afmc] CDI.KEYID = 6
2,674,015 UART: [afmc] SUBJECT.KEYID = 7
2,674,441 UART: [afmc] AUTHORITY.KEYID = 5
2,710,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,634 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,354 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,247 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,940 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,619 UART: [afmc] --
2,753,637 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,753,659 UART: [cold-reset] --
2,754,375 UART: [state] Locking Datavault
2,755,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,336 UART: [state] Locking ICCM
2,756,960 UART: [exit] Launching FMC @ 0x40000000
2,762,257 UART:
2,762,273 UART: Running Caliptra FMC ...
2,762,681 UART:
2,762,819 UART: [fmc] Received command: 0x46574C44
2,763,648 UART:
2,763,664 UART: Running Caliptra ROM ...
2,764,072 UART:
2,764,214 UART: [state] CFI Enabled
2,766,930 UART: [state] LifecycleState = Unprovisioned
2,767,585 UART: [state] DebugLocked = No
2,768,089 UART: [state] WD Timer not started. Device not locked for debugging
2,769,391 UART: [kat] SHA2-256
3,572,941 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,070 UART: [kat] ++
3,577,222 UART: [kat] sha1
3,581,588 UART: [kat] SHA2-256
3,583,528 UART: [kat] SHA2-384
3,586,163 UART: [kat] SHA2-512-ACC
3,588,063 UART: [kat] ECC-384
3,597,948 UART: [kat] HMAC-384Kdf
3,602,804 UART: [kat] LMS
3,851,116 UART: [kat] --
3,852,282 UART: [update-reset] ++
3,853,825 >>> mbox cmd response: failed
3,854,235 UART: ROM Non-Fatal Error: 0x000B0001
3,855,113 UART: [state] Locking Datavault
3,855,905 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,509 UART: [state] Locking ICCM
3,857,109 UART: [exit] Launching FMC @ 0x40000000
3,862,406 UART:
3,862,422 UART: Running Caliptra FMC ...
3,862,830 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,157 ready_for_fw is high
1,056,157 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,524,747 >>> mbox cmd response: success
2,580,459 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,586,802 UART:
2,586,818 UART: Running Caliptra FMC ...
2,587,226 UART:
2,587,364 UART: [fmc] Received command: 0x46574C44
3,562,042 >>> mbox cmd response: failed
3,567,691 UART:
3,567,707 UART: Running Caliptra FMC ...
3,568,115 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
891,544 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,111 UART: [kat] SHA2-256
902,051 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
920,828 UART: [kat] LMS
1,169,140 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,421 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,174,459 ready_for_fw is high
1,174,459 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,198,703 UART: [idev] Sha1 KeyId Algorithm
1,207,611 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,350 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,304 UART: [ldev] --
1,280,764 UART: [fwproc] Wait for Commands...
1,281,453 UART: [fwproc] Recv command 0x46574c44
1,282,186 UART: [fwproc] Recv'd Img size: 106684 bytes
2,491,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,518,921 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,672,578 >>> mbox cmd response: success
2,673,781 UART: [afmc] ++
2,673,949 UART: [afmc] CDI.KEYID = 6
2,674,312 UART: [afmc] SUBJECT.KEYID = 7
2,674,738 UART: [afmc] AUTHORITY.KEYID = 5
2,710,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,726,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,727,151 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,732,871 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,738,764 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,744,457 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,752,286 UART: [afmc] --
2,753,340 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,753,362 UART: [cold-reset] --
2,754,338 UART: [state] Locking Datavault
2,755,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,157 UART: [state] Locking ICCM
2,756,811 UART: [exit] Launching FMC @ 0x40000000
2,762,108 UART:
2,762,124 UART: Running Caliptra FMC ...
2,762,532 UART:
2,762,670 UART: [fmc] Received command: 0x46574C44
2,763,499 UART:
2,763,515 UART: Running Caliptra ROM ...
2,763,923 UART:
2,763,978 UART: [state] CFI Enabled
2,766,422 UART: [state] LifecycleState = Unprovisioned
2,767,077 UART: [state] DebugLocked = No
2,767,729 UART: [state] WD Timer not started. Device not locked for debugging
2,769,039 UART: [kat] SHA2-256
3,572,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,576,718 UART: [kat] ++
3,576,870 UART: [kat] sha1
3,581,212 UART: [kat] SHA2-256
3,583,152 UART: [kat] SHA2-384
3,586,001 UART: [kat] SHA2-512-ACC
3,587,901 UART: [kat] ECC-384
3,597,816 UART: [kat] HMAC-384Kdf
3,602,380 UART: [kat] LMS
3,850,692 UART: [kat] --
3,851,570 UART: [update-reset] ++
3,853,099 >>> mbox cmd response: failed
3,853,583 UART: ROM Non-Fatal Error: 0x000B0001
3,854,527 UART: [state] Locking Datavault
3,855,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,101 UART: [state] Locking ICCM
3,856,733 UART: [exit] Launching FMC @ 0x40000000
3,862,030 UART:
3,862,046 UART: Running Caliptra FMC ...
3,862,454 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,682 ready_for_fw is high
1,055,682 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,048 >>> mbox cmd response: success
2,577,626 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,583,545 UART:
2,583,561 UART: Running Caliptra FMC ...
2,583,969 UART:
2,584,107 UART: [fmc] Received command: 0x46574C44
3,558,246 >>> mbox cmd response: failed
3,563,905 UART:
3,563,921 UART: Running Caliptra FMC ...
3,564,329 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 ready_for_fw is high
1,174,634 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,176 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,119 UART: [ldev] Erasing FE.KEYID = 1
1,242,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,987 UART: [ldev] --
1,282,275 UART: [fwproc] Wait for Commands...
1,282,942 UART: [fwproc] Recv command 0x46574c44
1,283,675 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,412 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,674,167 >>> mbox cmd response: success
2,675,276 UART: [afmc] ++
2,675,444 UART: [afmc] CDI.KEYID = 6
2,675,807 UART: [afmc] SUBJECT.KEYID = 7
2,676,233 UART: [afmc] AUTHORITY.KEYID = 5
2,711,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,372 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,092 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,740,985 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,678 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,407 UART: [afmc] --
2,755,453 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,475 UART: [cold-reset] --
2,756,549 UART: [state] Locking Datavault
2,757,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,758,212 UART: [state] Locking ICCM
2,758,836 UART: [exit] Launching FMC @ 0x40000000
2,764,133 UART:
2,764,149 UART: Running Caliptra FMC ...
2,764,557 UART:
2,764,695 UART: [fmc] Received command: 0x46574C44
2,765,524 UART:
2,765,540 UART: Running Caliptra ROM ...
2,765,948 UART:
2,766,090 UART: [state] CFI Enabled
2,768,608 UART: [state] LifecycleState = Unprovisioned
2,769,263 UART: [state] DebugLocked = No
2,769,991 UART: [state] WD Timer not started. Device not locked for debugging
2,771,233 UART: [kat] SHA2-256
3,574,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,912 UART: [kat] ++
3,579,064 UART: [kat] sha1
3,583,196 UART: [kat] SHA2-256
3,585,136 UART: [kat] SHA2-384
3,587,685 UART: [kat] SHA2-512-ACC
3,589,585 UART: [kat] ECC-384
3,599,624 UART: [kat] HMAC-384Kdf
3,604,218 UART: [kat] LMS
3,852,530 UART: [kat] --
3,853,296 UART: [update-reset] ++
3,854,843 >>> mbox cmd response: failed
3,855,119 UART: ROM Non-Fatal Error: 0x000B0001
3,855,961 UART: [state] Locking Datavault
3,856,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,227 UART: [state] Locking ICCM
3,857,815 UART: [exit] Launching FMC @ 0x40000000
3,863,112 UART:
3,863,128 UART: Running Caliptra FMC ...
3,863,536 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,627 ready_for_fw is high
1,056,627 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,521,921 >>> mbox cmd response: success
2,577,827 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,584,038 UART:
2,584,054 UART: Running Caliptra FMC ...
2,584,462 UART:
2,584,600 UART: [fmc] Received command: 0x46574C44
3,558,540 >>> mbox cmd response: failed
3,564,093 UART:
3,564,109 UART: Running Caliptra FMC ...
3,564,517 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,738 UART: [kat] LMS
1,169,050 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,172,891 UART: [idev] ++
1,173,059 UART: [idev] CDI.KEYID = 6
1,173,420 UART: [idev] SUBJECT.KEYID = 7
1,173,845 UART: [idev] UDS.KEYID = 0
1,174,191 ready_for_fw is high
1,174,191 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,521 UART: [idev] Sha1 KeyId Algorithm
1,207,537 UART: [idev] --
1,208,554 UART: [ldev] ++
1,208,722 UART: [ldev] CDI.KEYID = 6
1,209,086 UART: [ldev] SUBJECT.KEYID = 5
1,209,513 UART: [ldev] AUTHORITY.KEYID = 7
1,209,976 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,552 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,677 UART: [fwproc] Recv command 0x46574c44
1,282,410 UART: [fwproc] Recv'd Img size: 106684 bytes
2,492,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,519,523 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,537,606 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,673,202 >>> mbox cmd response: success
2,674,431 UART: [afmc] ++
2,674,599 UART: [afmc] CDI.KEYID = 6
2,674,962 UART: [afmc] SUBJECT.KEYID = 7
2,675,388 UART: [afmc] AUTHORITY.KEYID = 5
2,710,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,727,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,728,015 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,733,735 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,739,628 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,745,321 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,753,074 UART: [afmc] --
2,754,104 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,754,126 UART: [cold-reset] --
2,754,984 UART: [state] Locking Datavault
2,756,217 UART: [state] Locking PCR0, PCR1 and PCR31
2,756,821 UART: [state] Locking ICCM
2,757,315 UART: [exit] Launching FMC @ 0x40000000
2,762,612 UART:
2,762,628 UART: Running Caliptra FMC ...
2,763,036 UART:
2,763,174 UART: [fmc] Received command: 0x46574C44
2,764,003 UART:
2,764,019 UART: Running Caliptra ROM ...
2,764,427 UART:
2,764,482 UART: [state] CFI Enabled
2,767,132 UART: [state] LifecycleState = Unprovisioned
2,767,787 UART: [state] DebugLocked = No
2,768,285 UART: [state] WD Timer not started. Device not locked for debugging
2,769,631 UART: [kat] SHA2-256
3,573,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,577,310 UART: [kat] ++
3,577,462 UART: [kat] sha1
3,581,888 UART: [kat] SHA2-256
3,583,828 UART: [kat] SHA2-384
3,586,401 UART: [kat] SHA2-512-ACC
3,588,301 UART: [kat] ECC-384
3,598,192 UART: [kat] HMAC-384Kdf
3,602,854 UART: [kat] LMS
3,851,166 UART: [kat] --
3,852,054 UART: [update-reset] ++
3,853,497 >>> mbox cmd response: failed
3,854,099 UART: ROM Non-Fatal Error: 0x000B0001
3,855,097 UART: [state] Locking Datavault
3,855,701 UART: [state] Locking PCR0, PCR1 and PCR31
3,856,305 UART: [state] Locking ICCM
3,856,747 UART: [exit] Launching FMC @ 0x40000000
3,862,044 UART:
3,862,060 UART: Running Caliptra FMC ...
3,862,468 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,356 ready_for_fw is high
1,056,356 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,522,310 >>> mbox cmd response: success
2,578,378 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,584,771 UART:
2,584,787 UART: Running Caliptra FMC ...
2,585,195 UART:
2,585,333 UART: [fmc] Received command: 0x46574C44
3,558,818 >>> mbox cmd response: failed
3,564,535 UART:
3,564,551 UART: Running Caliptra FMC ...
3,564,959 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,580 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 ready_for_fw is high
1,174,438 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,208,096 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,741 UART: [ldev] Erasing FE.KEYID = 1
1,242,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,509 UART: [ldev] --
1,282,019 UART: [fwproc] Wait for Commands...
1,282,752 UART: [fwproc] Recv command 0x46574c44
1,283,485 UART: [fwproc] Recv'd Img size: 106684 bytes
2,493,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,520,680 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,538,763 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,674,365 >>> mbox cmd response: success
2,675,632 UART: [afmc] ++
2,675,800 UART: [afmc] CDI.KEYID = 6
2,676,163 UART: [afmc] SUBJECT.KEYID = 7
2,676,589 UART: [afmc] AUTHORITY.KEYID = 5
2,712,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,728,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,729,672 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,735,392 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,741,285 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,746,978 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,754,891 UART: [afmc] --
2,755,757 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,755,779 UART: [cold-reset] --
2,756,465 UART: [state] Locking Datavault
2,757,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,757,988 UART: [state] Locking ICCM
2,758,618 UART: [exit] Launching FMC @ 0x40000000
2,763,915 UART:
2,763,931 UART: Running Caliptra FMC ...
2,764,339 UART:
2,764,477 UART: [fmc] Received command: 0x46574C44
2,765,306 UART:
2,765,322 UART: Running Caliptra ROM ...
2,765,730 UART:
2,765,872 UART: [state] CFI Enabled
2,768,358 UART: [state] LifecycleState = Unprovisioned
2,769,013 UART: [state] DebugLocked = No
2,769,697 UART: [state] WD Timer not started. Device not locked for debugging
2,770,949 UART: [kat] SHA2-256
3,574,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,578,628 UART: [kat] ++
3,578,780 UART: [kat] sha1
3,583,234 UART: [kat] SHA2-256
3,585,174 UART: [kat] SHA2-384
3,588,019 UART: [kat] SHA2-512-ACC
3,589,919 UART: [kat] ECC-384
3,599,574 UART: [kat] HMAC-384Kdf
3,604,290 UART: [kat] LMS
3,852,602 UART: [kat] --
3,853,552 UART: [update-reset] ++
3,855,173 >>> mbox cmd response: failed
3,855,599 UART: ROM Non-Fatal Error: 0x000B0001
3,856,405 UART: [state] Locking Datavault
3,857,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,857,825 UART: [state] Locking ICCM
3,858,455 UART: [exit] Launching FMC @ 0x40000000
3,863,752 UART:
3,863,768 UART: Running Caliptra FMC ...
3,864,176 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,195 ready_for_fw is high
1,056,195 <<< Executing mbox cmd 0x46574c44 (106684 bytes) from SoC
2,525,457 >>> mbox cmd response: success
2,580,807 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,587,192 UART:
2,587,208 UART: Running Caliptra FMC ...
2,587,616 UART:
2,587,754 UART: [fmc] Received command: 0x46574C44
3,562,234 >>> mbox cmd response: failed
3,568,217 UART:
3,568,233 UART: Running Caliptra FMC ...
3,568,641 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,797 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,096 UART:
192,457 UART: Running Caliptra ROM ...
193,658 UART:
193,828 UART: [state] CFI Enabled
264,988 UART: [state] LifecycleState = Unprovisioned
267,350 UART: [state] DebugLocked = No
270,024 UART: [state] WD Timer not started. Device not locked for debugging
275,430 UART: [kat] SHA2-256
457,390 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,870 UART: [kat] ++
469,404 UART: [kat] sha1
480,557 UART: [kat] SHA2-256
483,560 UART: [kat] SHA2-384
489,096 UART: [kat] SHA2-512-ACC
491,715 UART: [kat] ECC-384
3,776,764 UART: [kat] HMAC-384Kdf
3,803,471 UART: [kat] LMS
4,876,615 UART: [kat] --
4,882,688 UART: [cold-reset] ++
4,884,488 UART: [fht] FHT @ 0x50003400
4,895,956 UART: [idev] ++
4,896,693 UART: [idev] CDI.KEYID = 6
4,897,823 UART: [idev] SUBJECT.KEYID = 7
4,898,977 UART: [idev] UDS.KEYID = 0
4,930,287 UART: [idev] Erasing UDS.KEYID = 0
8,241,839 UART: [idev] Sha1 KeyId Algorithm
8,264,515 UART: [idev] --
8,268,725 UART: [ldev] ++
8,269,291 UART: [ldev] CDI.KEYID = 6
8,270,530 UART: [ldev] SUBJECT.KEYID = 5
8,271,687 UART: [ldev] AUTHORITY.KEYID = 7
8,272,917 UART: [ldev] FE.KEYID = 1
8,319,225 UART: [ldev] Erasing FE.KEYID = 1
11,656,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,272 UART: [ldev] --
14,037,616 UART: [fwproc] Wait for Commands...
14,039,938 UART: [fwproc] Recv command 0x46505652
14,042,526 UART: [rt] FIPS Version
14,044,303 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,867 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,846,910 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,307 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,474 UART:
192,841 UART: Running Caliptra ROM ...
194,064 UART:
603,661 UART: [state] CFI Enabled
616,298 UART: [state] LifecycleState = Unprovisioned
618,653 UART: [state] DebugLocked = No
620,886 UART: [state] WD Timer not started. Device not locked for debugging
624,881 UART: [kat] SHA2-256
806,820 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,385 UART: [kat] ++
818,890 UART: [kat] sha1
830,702 UART: [kat] SHA2-256
833,711 UART: [kat] SHA2-384
839,255 UART: [kat] SHA2-512-ACC
841,863 UART: [kat] ECC-384
4,096,054 UART: [kat] HMAC-384Kdf
4,107,694 UART: [kat] LMS
5,180,884 UART: [kat] --
5,185,125 UART: [cold-reset] ++
5,186,846 UART: [fht] FHT @ 0x50003400
5,198,590 UART: [idev] ++
5,199,306 UART: [idev] CDI.KEYID = 6
5,200,493 UART: [idev] SUBJECT.KEYID = 7
5,201,924 UART: [idev] UDS.KEYID = 0
5,220,519 UART: [idev] Erasing UDS.KEYID = 0
8,495,977 UART: [idev] Sha1 KeyId Algorithm
8,517,909 UART: [idev] --
8,523,267 UART: [ldev] ++
8,523,888 UART: [ldev] CDI.KEYID = 6
8,524,983 UART: [ldev] SUBJECT.KEYID = 5
8,526,506 UART: [ldev] AUTHORITY.KEYID = 7
8,528,034 UART: [ldev] FE.KEYID = 1
8,538,840 UART: [ldev] Erasing FE.KEYID = 1
11,829,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,121,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,137,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,153,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,169,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,189,313 UART: [ldev] --
14,193,168 UART: [fwproc] Wait for Commands...
14,194,886 UART: [fwproc] Recv command 0x46505652
14,197,467 UART: [rt] FIPS Version
14,199,238 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
4,253 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,022,945 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,765 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,077 UART:
192,449 UART: Running Caliptra ROM ...
193,637 UART:
193,790 UART: [state] CFI Enabled
264,159 UART: [state] LifecycleState = Unprovisioned
266,024 UART: [state] DebugLocked = No
267,259 UART: [state] WD Timer not started. Device not locked for debugging
271,318 UART: [kat] SHA2-256
450,445 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,019 UART: [kat] ++
462,563 UART: [kat] sha1
473,932 UART: [kat] SHA2-256
476,993 UART: [kat] SHA2-384
482,479 UART: [kat] SHA2-512-ACC
485,412 UART: [kat] ECC-384
2,947,078 UART: [kat] HMAC-384Kdf
2,970,113 UART: [kat] LMS
3,499,567 UART: [kat] --
3,504,498 UART: [cold-reset] ++
3,507,084 UART: [fht] FHT @ 0x50003400
3,517,701 UART: [idev] ++
3,518,269 UART: [idev] CDI.KEYID = 6
3,519,283 UART: [idev] SUBJECT.KEYID = 7
3,520,408 UART: [idev] UDS.KEYID = 0
3,542,342 UART: [idev] Erasing UDS.KEYID = 0
6,024,182 UART: [idev] Sha1 KeyId Algorithm
6,048,181 UART: [idev] --
6,050,504 UART: [ldev] ++
6,051,078 UART: [ldev] CDI.KEYID = 6
6,052,008 UART: [ldev] SUBJECT.KEYID = 5
6,053,182 UART: [ldev] AUTHORITY.KEYID = 7
6,054,415 UART: [ldev] FE.KEYID = 1
6,097,720 UART: [ldev] Erasing FE.KEYID = 1
8,603,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,403 UART: [ldev] --
10,411,461 UART: [fwproc] Wait for Commands...
10,413,974 UART: [fwproc] Recv command 0x46505652
10,416,299 UART: [rt] FIPS Version
10,417,808 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,824 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,226,266 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,209 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,433 UART:
192,818 UART: Running Caliptra ROM ...
193,931 UART:
603,745 UART: [state] CFI Enabled
616,489 UART: [state] LifecycleState = Unprovisioned
618,363 UART: [state] DebugLocked = No
620,141 UART: [state] WD Timer not started. Device not locked for debugging
623,212 UART: [kat] SHA2-256
802,323 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,911 UART: [kat] ++
814,364 UART: [kat] sha1
825,508 UART: [kat] SHA2-256
828,507 UART: [kat] SHA2-384
834,481 UART: [kat] SHA2-512-ACC
837,469 UART: [kat] ECC-384
3,278,292 UART: [kat] HMAC-384Kdf
3,290,112 UART: [kat] LMS
3,819,606 UART: [kat] --
3,824,624 UART: [cold-reset] ++
3,825,742 UART: [fht] FHT @ 0x50003400
3,837,452 UART: [idev] ++
3,838,015 UART: [idev] CDI.KEYID = 6
3,838,901 UART: [idev] SUBJECT.KEYID = 7
3,840,112 UART: [idev] UDS.KEYID = 0
3,857,599 UART: [idev] Erasing UDS.KEYID = 0
6,314,181 UART: [idev] Sha1 KeyId Algorithm
6,336,178 UART: [idev] --
6,340,688 UART: [ldev] ++
6,341,255 UART: [ldev] CDI.KEYID = 6
6,342,143 UART: [ldev] SUBJECT.KEYID = 5
6,343,307 UART: [ldev] AUTHORITY.KEYID = 7
6,344,536 UART: [ldev] FE.KEYID = 1
6,356,013 UART: [ldev] Erasing FE.KEYID = 1
8,831,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,172 UART: [ldev] --
10,624,734 UART: [fwproc] Wait for Commands...
10,627,046 UART: [fwproc] Recv command 0x46505652
10,629,370 UART: [rt] FIPS Version
10,630,877 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,303 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,409,296 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,987 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,297 UART:
192,680 UART: Running Caliptra ROM ...
193,887 UART:
194,043 UART: [state] CFI Enabled
262,531 UART: [state] LifecycleState = Unprovisioned
264,442 UART: [state] DebugLocked = No
266,260 UART: [state] WD Timer not started. Device not locked for debugging
269,336 UART: [kat] SHA2-256
448,462 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,040 UART: [kat] ++
460,579 UART: [kat] sha1
470,975 UART: [kat] SHA2-256
473,980 UART: [kat] SHA2-384
481,038 UART: [kat] SHA2-512-ACC
483,972 UART: [kat] ECC-384
2,947,914 UART: [kat] HMAC-384Kdf
2,972,802 UART: [kat] LMS
3,502,241 UART: [kat] --
3,505,037 UART: [cold-reset] ++
3,507,074 UART: [fht] FHT @ 0x50003400
3,518,167 UART: [idev] ++
3,518,736 UART: [idev] CDI.KEYID = 6
3,519,702 UART: [idev] SUBJECT.KEYID = 7
3,520,860 UART: [idev] UDS.KEYID = 0
3,544,176 UART: [idev] Erasing UDS.KEYID = 0
6,028,965 UART: [idev] Sha1 KeyId Algorithm
6,053,273 UART: [idev] --
6,056,140 UART: [ldev] ++
6,056,719 UART: [ldev] CDI.KEYID = 6
6,057,631 UART: [ldev] SUBJECT.KEYID = 5
6,058,732 UART: [ldev] AUTHORITY.KEYID = 7
6,060,076 UART: [ldev] FE.KEYID = 1
6,100,882 UART: [ldev] Erasing FE.KEYID = 1
8,607,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,423 UART: [ldev] --
10,415,972 UART: [fwproc] Wait for Commands...
10,418,951 UART: [fwproc] Recv command 0x46505652
10,421,292 UART: [rt] FIPS Version
10,422,751 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
4,025 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,200,235 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,375 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,553 UART:
192,917 UART: Running Caliptra ROM ...
194,128 UART:
603,821 UART: [state] CFI Enabled
618,131 UART: [state] LifecycleState = Unprovisioned
620,065 UART: [state] DebugLocked = No
621,865 UART: [state] WD Timer not started. Device not locked for debugging
626,075 UART: [kat] SHA2-256
805,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,773 UART: [kat] ++
817,218 UART: [kat] sha1
827,824 UART: [kat] SHA2-256
830,820 UART: [kat] SHA2-384
837,395 UART: [kat] SHA2-512-ACC
840,377 UART: [kat] ECC-384
3,282,566 UART: [kat] HMAC-384Kdf
3,295,770 UART: [kat] LMS
3,825,244 UART: [kat] --
3,831,763 UART: [cold-reset] ++
3,833,153 UART: [fht] FHT @ 0x50003400
3,842,824 UART: [idev] ++
3,843,402 UART: [idev] CDI.KEYID = 6
3,844,336 UART: [idev] SUBJECT.KEYID = 7
3,845,543 UART: [idev] UDS.KEYID = 0
3,862,629 UART: [idev] Erasing UDS.KEYID = 0
6,324,609 UART: [idev] Sha1 KeyId Algorithm
6,346,496 UART: [idev] --
6,351,622 UART: [ldev] ++
6,352,182 UART: [ldev] CDI.KEYID = 6
6,353,120 UART: [ldev] SUBJECT.KEYID = 5
6,354,332 UART: [ldev] AUTHORITY.KEYID = 7
6,355,562 UART: [ldev] FE.KEYID = 1
6,365,482 UART: [ldev] Erasing FE.KEYID = 1
8,839,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,407 UART: [ldev] --
10,631,760 UART: [fwproc] Wait for Commands...
10,634,611 UART: [fwproc] Recv command 0x46505652
10,636,978 UART: [rt] FIPS Version
10,638,433 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,243 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,410,951 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,833 UART: [kat] SHA2-256
901,773 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,636 UART: [kat] HMAC-384Kdf
920,042 UART: [kat] LMS
1,168,354 UART: [kat] --
1,169,017 UART: [cold-reset] ++
1,169,539 UART: [fht] FHT @ 0x50003400
1,172,103 UART: [idev] ++
1,172,271 UART: [idev] CDI.KEYID = 6
1,172,632 UART: [idev] SUBJECT.KEYID = 7
1,173,057 UART: [idev] UDS.KEYID = 0
1,180,701 UART: [idev] Erasing UDS.KEYID = 0
1,197,723 UART: [idev] Sha1 KeyId Algorithm
1,206,585 UART: [idev] --
1,207,440 UART: [ldev] ++
1,207,608 UART: [ldev] CDI.KEYID = 6
1,207,972 UART: [ldev] SUBJECT.KEYID = 5
1,208,399 UART: [ldev] AUTHORITY.KEYID = 7
1,208,862 UART: [ldev] FE.KEYID = 1
1,214,238 UART: [ldev] Erasing FE.KEYID = 1
1,240,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,944 UART: [ldev] --
1,279,258 UART: [fwproc] Wait for Commands...
1,279,833 UART: [fwproc] Recv command 0x46505652
1,280,660 UART: [rt] FIPS Version
1,281,221 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,134,966 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,453 UART: [kat] SHA2-256
892,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,132 UART: [kat] ++
896,284 UART: [kat] sha1
900,502 UART: [kat] SHA2-256
902,442 UART: [kat] SHA2-384
905,101 UART: [kat] SHA2-512-ACC
907,002 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,790 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,198,602 UART: [idev] Sha1 KeyId Algorithm
1,207,626 UART: [idev] --
1,208,757 UART: [ldev] ++
1,208,925 UART: [ldev] CDI.KEYID = 6
1,209,289 UART: [ldev] SUBJECT.KEYID = 5
1,209,716 UART: [ldev] AUTHORITY.KEYID = 7
1,210,179 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,345 UART: [ldev] --
1,281,861 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46505652
1,283,511 UART: [rt] FIPS Version
1,284,072 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,517 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,470 UART: [kat] HMAC-384Kdf
920,818 UART: [kat] LMS
1,169,130 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,198,885 UART: [idev] Sha1 KeyId Algorithm
1,207,757 UART: [idev] --
1,208,940 UART: [ldev] ++
1,209,108 UART: [ldev] CDI.KEYID = 6
1,209,472 UART: [ldev] SUBJECT.KEYID = 5
1,209,899 UART: [ldev] AUTHORITY.KEYID = 7
1,210,362 UART: [ldev] FE.KEYID = 1
1,215,566 UART: [ldev] Erasing FE.KEYID = 1
1,242,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,640 UART: [ldev] --
1,280,974 UART: [fwproc] Wait for Commands...
1,281,775 UART: [fwproc] Recv command 0x46505652
1,282,602 UART: [rt] FIPS Version
1,283,163 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,134,682 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,122 UART: [state] WD Timer not started. Device not locked for debugging
87,341 UART: [kat] SHA2-256
890,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,020 UART: [kat] ++
895,172 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,235 UART: [kat] SHA2-512-ACC
906,136 UART: [kat] ECC-384
915,781 UART: [kat] HMAC-384Kdf
920,529 UART: [kat] LMS
1,168,841 UART: [kat] --
1,169,702 UART: [cold-reset] ++
1,170,078 UART: [fht] FHT @ 0x50003400
1,172,660 UART: [idev] ++
1,172,828 UART: [idev] CDI.KEYID = 6
1,173,189 UART: [idev] SUBJECT.KEYID = 7
1,173,614 UART: [idev] UDS.KEYID = 0
1,181,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,208,024 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,215,979 UART: [ldev] Erasing FE.KEYID = 1
1,242,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,407 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46505652
1,283,837 UART: [rt] FIPS Version
1,284,398 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,169 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,983 UART: [kat] SHA2-256
901,923 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,908 UART: [kat] LMS
1,169,220 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,199,287 UART: [idev] Sha1 KeyId Algorithm
1,208,009 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,204 UART: [ldev] --
1,280,690 UART: [fwproc] Wait for Commands...
1,281,417 UART: [fwproc] Recv command 0x46505652
1,282,244 UART: [rt] FIPS Version
1,282,805 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,222 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
916,141 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,169,704 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,207,902 UART: [idev] --
1,209,037 UART: [ldev] ++
1,209,205 UART: [ldev] CDI.KEYID = 6
1,209,569 UART: [ldev] SUBJECT.KEYID = 5
1,209,996 UART: [ldev] AUTHORITY.KEYID = 7
1,210,459 UART: [ldev] FE.KEYID = 1
1,215,687 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,281,991 UART: [fwproc] Wait for Commands...
1,282,768 UART: [fwproc] Recv command 0x46505652
1,283,595 UART: [rt] FIPS Version
1,284,156 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,399 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
5,722 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,131 UART:
192,694 UART: Running Caliptra ROM ...
193,837 UART:
193,987 UART: [state] CFI Enabled
265,466 UART: [state] LifecycleState = Unprovisioned
267,811 UART: [state] DebugLocked = No
269,679 UART: [state] WD Timer not started. Device not locked for debugging
274,928 UART: [kat] SHA2-256
456,869 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,413 UART: [kat] ++
468,891 UART: [kat] sha1
480,366 UART: [kat] SHA2-256
483,380 UART: [kat] SHA2-384
488,377 UART: [kat] SHA2-512-ACC
490,999 UART: [kat] ECC-384
3,777,279 UART: [kat] HMAC-384Kdf
3,802,012 UART: [kat] LMS
4,875,168 UART: [kat] --
4,879,487 UART: [cold-reset] ++
4,881,258 UART: [fht] FHT @ 0x50003400
4,892,461 UART: [idev] ++
4,893,169 UART: [idev] CDI.KEYID = 6
4,894,332 UART: [idev] SUBJECT.KEYID = 7
4,895,543 UART: [idev] UDS.KEYID = 0
4,930,339 UART: [idev] Erasing UDS.KEYID = 0
8,244,175 UART: [idev] Sha1 KeyId Algorithm
8,266,275 UART: [idev] --
8,270,249 UART: [ldev] ++
8,270,881 UART: [ldev] CDI.KEYID = 6
8,272,063 UART: [ldev] SUBJECT.KEYID = 5
8,273,243 UART: [ldev] AUTHORITY.KEYID = 7
8,274,477 UART: [ldev] FE.KEYID = 1
8,319,446 UART: [ldev] Erasing FE.KEYID = 1
11,658,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,967,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,983,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,999,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,015,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,814 UART: [ldev] --
14,039,593 UART: [fwproc] Wait for Commands...
14,042,658 UART: [fwproc] Recv command 0x46574c44
14,044,920 UART: [fwproc] Recv'd Img size: 113844 bytes
18,115,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,193,279 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,262,028 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,578,739 >>> mbox cmd response: success
18,583,470 UART: [afmc] ++
18,584,057 UART: [afmc] CDI.KEYID = 6
18,585,243 UART: [afmc] SUBJECT.KEYID = 7
18,586,395 UART: [afmc] AUTHORITY.KEYID = 5
21,952,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,247,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,249,555 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,265,690 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,281,760 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,297,767 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
796 UART: [
1,334 UART: Running Caliptra ROM ...
2,432 UART:
2,587 UART: [state] CFI Enabled
73,451 UART: [state] LifecycleState = Unprovisioned
75,340 UART: [state] DebugLocked = No
77,153 UART: [state] WD Timer not started. Device not locked for debugging
81,328 UART: [kat] SHA2-256
263,270 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
274,754 UART: [kat] ++
275,280 UART: [kat] sha1
286,913 UART: [kat] SHA2-256
289,913 UART: [kat] SHA2-384
294,641 UART: [kat] SHA2-512-ACC
297,256 UART: [kat] ECC-384
3,584,220 UART: [kat] HMAC-384Kdf
3,609,193 UART: [kat] LMS
4,682,375 UART: [kat] --
4,685,893 UART: [warm-reset] ++
4,686,960 UART: [warm-reset] Prev Cold-Reset failed
4,690,904 UART: ROM Fatal Error: 0x01040010test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
5,403 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,323,506 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
6,498 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,441 UART:
192,823 UART: Running Caliptra ROM ...
194,007 UART:
603,693 UART: [state] CFI Enabled
617,659 UART: [state] LifecycleState = Unprovisioned
619,982 UART: [state] DebugLocked = No
622,924 UART: [state] WD Timer not started. Device not locked for debugging
627,720 UART: [kat] SHA2-256
809,717 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,286 UART: [kat] ++
821,867 UART: [kat] sha1
833,507 UART: [kat] SHA2-256
836,550 UART: [kat] SHA2-384
843,284 UART: [kat] SHA2-512-ACC
845,893 UART: [kat] ECC-384
4,100,862 UART: [kat] HMAC-384Kdf
4,112,267 UART: [kat] LMS
5,185,408 UART: [kat] --
5,190,444 UART: [cold-reset] ++
5,191,944 UART: [fht] FHT @ 0x50003400
5,203,269 UART: [idev] ++
5,203,938 UART: [idev] CDI.KEYID = 6
5,205,169 UART: [idev] SUBJECT.KEYID = 7
5,206,654 UART: [idev] UDS.KEYID = 0
5,223,467 UART: [idev] Erasing UDS.KEYID = 0
8,494,813 UART: [idev] Sha1 KeyId Algorithm
8,515,988 UART: [idev] --
8,520,564 UART: [ldev] ++
8,521,144 UART: [ldev] CDI.KEYID = 6
8,522,384 UART: [ldev] SUBJECT.KEYID = 5
8,523,813 UART: [ldev] AUTHORITY.KEYID = 7
8,525,288 UART: [ldev] FE.KEYID = 1
8,537,120 UART: [ldev] Erasing FE.KEYID = 1
11,830,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,191,345 UART: [ldev] --
14,195,459 UART: [fwproc] Wait for Commands...
14,198,529 UART: [fwproc] Recv command 0x46574c44
14,200,841 UART: [fwproc] Recv'd Img size: 113844 bytes
18,268,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,345,903 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,414,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,731,505 >>> mbox cmd response: success
18,734,896 UART: [afmc] ++
18,735,486 UART: [afmc] CDI.KEYID = 6
18,736,589 UART: [afmc] SUBJECT.KEYID = 7
18,737,796 UART: [afmc] AUTHORITY.KEYID = 5
22,053,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,351,030 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,353,345 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,369,463 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,385,569 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,401,510 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
Initializing fuses
810 UART: [
1,353 UART: Running Caliptra ROM ...
2,453 UART:
16,157,023 UART: [state] CFI Enabled
16,170,188 UART: [state] LifecycleState = Unprovisioned
16,172,080 UART: [state] DebugLocked = No
16,174,949 UART: [state] WD Timer not started. Device not locked for debugging
16,179,290 UART: [kat] SHA2-256
16,361,235 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
16,372,810 UART: [kat] ++
16,373,316 UART: [kat] sha1
16,383,841 UART: [kat] SHA2-256
16,386,907 UART: [kat] SHA2-384
16,394,024 UART: [kat] SHA2-512-ACC
16,396,648 UART: [kat] ECC-384
19,652,252 UART: [kat] HMAC-384Kdf
19,663,897 UART: [kat] LMS
20,737,021 UART: [kat] --
20,740,701 UART: [warm-reset] ++
20,741,713 UART: [warm-reset] Prev Cold-Reset failed
20,746,510 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
6,418 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,520,393 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
5,658 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,186 UART:
192,566 UART: Running Caliptra ROM ...
193,771 UART:
193,930 UART: [state] CFI Enabled
267,330 UART: [state] LifecycleState = Unprovisioned
269,246 UART: [state] DebugLocked = No
272,093 UART: [state] WD Timer not started. Device not locked for debugging
275,330 UART: [kat] SHA2-256
454,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,029 UART: [kat] ++
466,490 UART: [kat] sha1
477,406 UART: [kat] SHA2-256
480,449 UART: [kat] SHA2-384
485,914 UART: [kat] SHA2-512-ACC
488,904 UART: [kat] ECC-384
2,949,111 UART: [kat] HMAC-384Kdf
2,972,644 UART: [kat] LMS
3,502,121 UART: [kat] --
3,507,166 UART: [cold-reset] ++
3,508,485 UART: [fht] FHT @ 0x50003400
3,518,242 UART: [idev] ++
3,518,811 UART: [idev] CDI.KEYID = 6
3,519,718 UART: [idev] SUBJECT.KEYID = 7
3,520,931 UART: [idev] UDS.KEYID = 0
3,543,440 UART: [idev] Erasing UDS.KEYID = 0
6,028,354 UART: [idev] Sha1 KeyId Algorithm
6,052,728 UART: [idev] --
6,056,950 UART: [ldev] ++
6,057,528 UART: [ldev] CDI.KEYID = 6
6,058,455 UART: [ldev] SUBJECT.KEYID = 5
6,059,621 UART: [ldev] AUTHORITY.KEYID = 7
6,060,860 UART: [ldev] FE.KEYID = 1
6,100,529 UART: [ldev] Erasing FE.KEYID = 1
8,606,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,079 UART: [ldev] --
10,411,807 UART: [fwproc] Wait for Commands...
10,413,697 UART: [fwproc] Recv command 0x46574c44
10,415,796 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,117 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,929 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,277,854 >>> mbox cmd response: success
14,282,071 UART: [afmc] ++
14,282,666 UART: [afmc] CDI.KEYID = 6
14,283,630 UART: [afmc] SUBJECT.KEYID = 7
14,284,731 UART: [afmc] AUTHORITY.KEYID = 5
16,810,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,531,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,533,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
800 UART: [
1,294 UART: Running Caliptra ROM ...
2,395 UART:
2,551 UART: [state] CFI Enabled
69,123 UART: [state] LifecycleState = Unprovisioned
71,001 UART: [state] DebugLocked = No
73,417 UART: [state] WD Timer not started. Device not locked for debugging
77,374 UART: [kat] SHA2-256
256,487 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
268,062 UART: [kat] ++
268,597 UART: [kat] sha1
281,315 UART: [kat] SHA2-256
284,386 UART: [kat] SHA2-384
291,331 UART: [kat] SHA2-512-ACC
294,318 UART: [kat] ECC-384
2,752,575 UART: [kat] HMAC-384Kdf
2,776,088 UART: [kat] LMS
3,305,563 UART: [kat] --
3,311,065 UART: [warm-reset] ++
3,311,918 UART: [warm-reset] Prev Cold-Reset failed
3,314,420 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
5,455 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,022,027 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
6,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,435 UART:
192,816 UART: Running Caliptra ROM ...
193,910 UART:
603,524 UART: [state] CFI Enabled
618,989 UART: [state] LifecycleState = Unprovisioned
620,899 UART: [state] DebugLocked = No
622,979 UART: [state] WD Timer not started. Device not locked for debugging
627,397 UART: [kat] SHA2-256
806,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,123 UART: [kat] ++
818,572 UART: [kat] sha1
829,395 UART: [kat] SHA2-256
832,438 UART: [kat] SHA2-384
838,739 UART: [kat] SHA2-512-ACC
841,672 UART: [kat] ECC-384
3,284,728 UART: [kat] HMAC-384Kdf
3,295,934 UART: [kat] LMS
3,825,426 UART: [kat] --
3,830,008 UART: [cold-reset] ++
3,831,776 UART: [fht] FHT @ 0x50003400
3,844,368 UART: [idev] ++
3,844,952 UART: [idev] CDI.KEYID = 6
3,845,832 UART: [idev] SUBJECT.KEYID = 7
3,847,046 UART: [idev] UDS.KEYID = 0
3,863,189 UART: [idev] Erasing UDS.KEYID = 0
6,315,776 UART: [idev] Sha1 KeyId Algorithm
6,339,533 UART: [idev] --
6,343,367 UART: [ldev] ++
6,343,969 UART: [ldev] CDI.KEYID = 6
6,344,851 UART: [ldev] SUBJECT.KEYID = 5
6,346,064 UART: [ldev] AUTHORITY.KEYID = 7
6,347,296 UART: [ldev] FE.KEYID = 1
6,358,484 UART: [ldev] Erasing FE.KEYID = 1
8,831,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,628 UART: [ldev] --
10,622,569 UART: [fwproc] Wait for Commands...
10,625,528 UART: [fwproc] Recv command 0x46574c44
10,627,561 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,112 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,549 >>> mbox cmd response: success
14,492,595 UART: [afmc] ++
14,493,192 UART: [afmc] CDI.KEYID = 6
14,494,100 UART: [afmc] SUBJECT.KEYID = 7
14,495,256 UART: [afmc] AUTHORITY.KEYID = 5
16,994,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,509 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
788 UART: [
1,333 UART: Running Caliptra ROM ...
2,386 UART:
1,733,212 UART: [state] CFI Enabled
1,747,394 UART: [state] LifecycleState = Unprovisioned
1,749,248 UART: [state] DebugLocked = No
1,751,792 UART: [state] WD Timer not started. Device not locked for debugging
1,754,768 UART: [kat] SHA2-256
1,933,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,945,511 UART: [kat] ++
1,946,049 UART: [kat] sha1
1,956,840 UART: [kat] SHA2-256
1,959,823 UART: [kat] SHA2-384
1,966,007 UART: [kat] SHA2-512-ACC
1,968,952 UART: [kat] ECC-384
4,412,696 UART: [kat] HMAC-384Kdf
4,424,591 UART: [kat] LMS
4,954,047 UART: [kat] --
4,957,772 UART: [warm-reset] ++
4,958,557 UART: [warm-reset] Prev Cold-Reset failed
4,962,255 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
6,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,260,976 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
5,776 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,091 UART:
192,480 UART: Running Caliptra ROM ...
193,656 UART:
193,832 UART: [state] CFI Enabled
264,710 UART: [state] LifecycleState = Unprovisioned
266,641 UART: [state] DebugLocked = No
269,105 UART: [state] WD Timer not started. Device not locked for debugging
273,313 UART: [kat] SHA2-256
452,427 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,974 UART: [kat] ++
464,515 UART: [kat] sha1
475,546 UART: [kat] SHA2-256
478,544 UART: [kat] SHA2-384
485,085 UART: [kat] SHA2-512-ACC
488,031 UART: [kat] ECC-384
2,949,025 UART: [kat] HMAC-384Kdf
2,971,580 UART: [kat] LMS
3,501,049 UART: [kat] --
3,505,496 UART: [cold-reset] ++
3,506,426 UART: [fht] FHT @ 0x50003400
3,517,185 UART: [idev] ++
3,517,795 UART: [idev] CDI.KEYID = 6
3,518,710 UART: [idev] SUBJECT.KEYID = 7
3,519,871 UART: [idev] UDS.KEYID = 0
3,555,946 UART: [idev] Erasing UDS.KEYID = 0
6,040,678 UART: [idev] Sha1 KeyId Algorithm
6,063,160 UART: [idev] --
6,066,406 UART: [ldev] ++
6,066,984 UART: [ldev] CDI.KEYID = 6
6,067,896 UART: [ldev] SUBJECT.KEYID = 5
6,069,144 UART: [ldev] AUTHORITY.KEYID = 7
6,070,342 UART: [ldev] FE.KEYID = 1
6,111,504 UART: [ldev] Erasing FE.KEYID = 1
8,617,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,398,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,333 UART: [ldev] --
10,423,905 UART: [fwproc] Wait for Commands...
10,425,900 UART: [fwproc] Recv command 0x46574c44
10,427,948 UART: [fwproc] Recv'd Img size: 114168 bytes
13,827,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,286,725 >>> mbox cmd response: success
14,291,188 UART: [afmc] ++
14,291,774 UART: [afmc] CDI.KEYID = 6
14,292,686 UART: [afmc] SUBJECT.KEYID = 7
14,293,846 UART: [afmc] AUTHORITY.KEYID = 5
16,820,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,542,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,544,603 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,560,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,576,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,592,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
786 UART: [
1,273 UART: Running Caliptra ROM ...
2,382 UART:
2,538 UART: [state] CFI Enabled
65,898 UART: [state] LifecycleState = Unprovisioned
67,770 UART: [state] DebugLocked = No
69,369 UART: [state] WD Timer not started. Device not locked for debugging
73,268 UART: [kat] SHA2-256
252,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,951 UART: [kat] ++
264,499 UART: [kat] sha1
276,032 UART: [kat] SHA2-256
279,095 UART: [kat] SHA2-384
284,097 UART: [kat] SHA2-512-ACC
287,085 UART: [kat] ECC-384
2,732,307 UART: [kat] HMAC-384Kdf
2,754,462 UART: [kat] LMS
3,283,927 UART: [kat] --
3,286,826 UART: [warm-reset] ++
3,287,673 UART: [warm-reset] Prev Cold-Reset failed
3,289,829 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,054,581 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
6,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,425 UART:
192,827 UART: Running Caliptra ROM ...
193,967 UART:
603,374 UART: [state] CFI Enabled
618,412 UART: [state] LifecycleState = Unprovisioned
620,276 UART: [state] DebugLocked = No
621,845 UART: [state] WD Timer not started. Device not locked for debugging
626,289 UART: [kat] SHA2-256
805,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,974 UART: [kat] ++
817,419 UART: [kat] sha1
828,403 UART: [kat] SHA2-256
831,409 UART: [kat] SHA2-384
837,975 UART: [kat] SHA2-512-ACC
840,901 UART: [kat] ECC-384
3,282,006 UART: [kat] HMAC-384Kdf
3,294,243 UART: [kat] LMS
3,823,719 UART: [kat] --
3,826,732 UART: [cold-reset] ++
3,828,454 UART: [fht] FHT @ 0x50003400
3,839,048 UART: [idev] ++
3,839,612 UART: [idev] CDI.KEYID = 6
3,840,623 UART: [idev] SUBJECT.KEYID = 7
3,841,744 UART: [idev] UDS.KEYID = 0
3,859,553 UART: [idev] Erasing UDS.KEYID = 0
6,316,535 UART: [idev] Sha1 KeyId Algorithm
6,340,520 UART: [idev] --
6,344,885 UART: [ldev] ++
6,345,447 UART: [ldev] CDI.KEYID = 6
6,346,354 UART: [ldev] SUBJECT.KEYID = 5
6,347,565 UART: [ldev] AUTHORITY.KEYID = 7
6,348,790 UART: [ldev] FE.KEYID = 1
6,361,328 UART: [ldev] Erasing FE.KEYID = 1
8,834,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,250 UART: [ldev] --
10,626,732 UART: [fwproc] Wait for Commands...
10,628,722 UART: [fwproc] Recv command 0x46574c44
10,630,818 UART: [fwproc] Recv'd Img size: 114168 bytes
14,030,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,486,843 >>> mbox cmd response: success
14,491,200 UART: [afmc] ++
14,491,789 UART: [afmc] CDI.KEYID = 6
14,492,677 UART: [afmc] SUBJECT.KEYID = 7
14,493,777 UART: [afmc] AUTHORITY.KEYID = 5
16,992,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,316 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,103 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,997 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
802 UART: [
1,265 UART: Running Caliptra ROM ...
2,306 UART:
1,732,669 UART: [state] CFI Enabled
1,746,574 UART: [state] LifecycleState = Unprovisioned
1,748,458 UART: [state] DebugLocked = No
1,751,252 UART: [state] WD Timer not started. Device not locked for debugging
1,754,620 UART: [kat] SHA2-256
1,933,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,945,302 UART: [kat] ++
1,945,760 UART: [kat] sha1
1,957,183 UART: [kat] SHA2-256
1,960,258 UART: [kat] SHA2-384
1,966,397 UART: [kat] SHA2-512-ACC
1,969,351 UART: [kat] ECC-384
4,412,941 UART: [kat] HMAC-384Kdf
4,426,197 UART: [kat] LMS
4,955,699 UART: [kat] --
4,959,387 UART: [warm-reset] ++
4,960,243 UART: [warm-reset] Prev Cold-Reset failed
4,963,799 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
6,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,254,576 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,080 UART: [kat] SHA2-256
891,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,759 UART: [kat] ++
895,911 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,972 UART: [kat] SHA2-512-ACC
906,873 UART: [kat] ECC-384
916,666 UART: [kat] HMAC-384Kdf
921,044 UART: [kat] LMS
1,169,356 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,593 UART: [fht] FHT @ 0x50003400
1,173,213 UART: [idev] ++
1,173,381 UART: [idev] CDI.KEYID = 6
1,173,742 UART: [idev] SUBJECT.KEYID = 7
1,174,167 UART: [idev] UDS.KEYID = 0
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,065 UART: [idev] --
1,209,082 UART: [ldev] ++
1,209,250 UART: [ldev] CDI.KEYID = 6
1,209,614 UART: [ldev] SUBJECT.KEYID = 5
1,210,041 UART: [ldev] AUTHORITY.KEYID = 7
1,210,504 UART: [ldev] FE.KEYID = 1
1,216,018 UART: [ldev] Erasing FE.KEYID = 1
1,242,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,222 UART: [fwproc] Wait for Commands...
1,281,939 UART: [fwproc] Recv command 0x46574c44
1,282,672 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,675 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,237 >>> mbox cmd response: success
2,772,314 UART: [afmc] ++
2,772,482 UART: [afmc] CDI.KEYID = 6
2,772,845 UART: [afmc] SUBJECT.KEYID = 7
2,773,271 UART: [afmc] AUTHORITY.KEYID = 5
2,808,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,388 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,139 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,868 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,751 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,470 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,438 UART:
2,851,454 UART: Running Caliptra ROM ...
2,851,862 UART:
2,851,917 UART: [state] CFI Enabled
2,854,907 UART: [state] LifecycleState = Unprovisioned
2,855,562 UART: [state] DebugLocked = No
2,856,254 UART: [state] WD Timer not started. Device not locked for debugging
2,857,539 UART: [kat] SHA2-256
3,661,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,218 UART: [kat] ++
3,665,370 UART: [kat] sha1
3,669,458 UART: [kat] SHA2-256
3,671,398 UART: [kat] SHA2-384
3,674,117 UART: [kat] SHA2-512-ACC
3,676,018 UART: [kat] ECC-384
3,686,125 UART: [kat] HMAC-384Kdf
3,690,869 UART: [kat] LMS
3,939,181 UART: [kat] --
3,940,073 UART: [warm-reset] ++
3,940,341 UART: [warm-reset] Prev Cold-Reset failed
3,941,472 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,943 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,461 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,432 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,268 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,283 UART: [ldev] ++
1,209,451 UART: [ldev] CDI.KEYID = 6
1,209,815 UART: [ldev] SUBJECT.KEYID = 5
1,210,242 UART: [ldev] AUTHORITY.KEYID = 7
1,210,705 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,247 UART: [ldev] --
1,281,589 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x46574c44
1,282,923 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,330 >>> mbox cmd response: success
2,771,535 UART: [afmc] ++
2,771,703 UART: [afmc] CDI.KEYID = 6
2,772,066 UART: [afmc] SUBJECT.KEYID = 7
2,772,492 UART: [afmc] AUTHORITY.KEYID = 5
2,808,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,217 UART:
2,851,233 UART: Running Caliptra ROM ...
2,851,641 UART:
2,851,783 UART: [state] CFI Enabled
2,854,837 UART: [state] LifecycleState = Unprovisioned
2,855,492 UART: [state] DebugLocked = No
2,855,980 UART: [state] WD Timer not started. Device not locked for debugging
2,857,267 UART: [kat] SHA2-256
3,660,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,946 UART: [kat] ++
3,665,098 UART: [kat] sha1
3,669,288 UART: [kat] SHA2-256
3,671,228 UART: [kat] SHA2-384
3,674,045 UART: [kat] SHA2-512-ACC
3,675,946 UART: [kat] ECC-384
3,685,833 UART: [kat] HMAC-384Kdf
3,690,507 UART: [kat] LMS
3,938,819 UART: [kat] --
3,939,557 UART: [warm-reset] ++
3,939,825 UART: [warm-reset] Prev Cold-Reset failed
3,940,658 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,546 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,198,999 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,214,996 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,488 UART: [ldev] --
1,280,870 UART: [fwproc] Wait for Commands...
1,281,541 UART: [fwproc] Recv command 0x46574c44
1,282,274 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,891 >>> mbox cmd response: success
2,772,108 UART: [afmc] ++
2,772,276 UART: [afmc] CDI.KEYID = 6
2,772,639 UART: [afmc] SUBJECT.KEYID = 7
2,773,065 UART: [afmc] AUTHORITY.KEYID = 5
2,808,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,126 UART:
2,851,142 UART: Running Caliptra ROM ...
2,851,550 UART:
2,851,605 UART: [state] CFI Enabled
2,854,349 UART: [state] LifecycleState = Unprovisioned
2,855,004 UART: [state] DebugLocked = No
2,855,588 UART: [state] WD Timer not started. Device not locked for debugging
2,856,713 UART: [kat] SHA2-256
3,660,263 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,664,392 UART: [kat] ++
3,664,544 UART: [kat] sha1
3,668,810 UART: [kat] SHA2-256
3,670,750 UART: [kat] SHA2-384
3,673,421 UART: [kat] SHA2-512-ACC
3,675,322 UART: [kat] ECC-384
3,684,965 UART: [kat] HMAC-384Kdf
3,689,479 UART: [kat] LMS
3,937,791 UART: [kat] --
3,938,517 UART: [warm-reset] ++
3,938,785 UART: [warm-reset] Prev Cold-Reset failed
3,939,674 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,913 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,933 UART: [state] LifecycleState = Unprovisioned
85,588 UART: [state] DebugLocked = No
86,292 UART: [state] WD Timer not started. Device not locked for debugging
87,565 UART: [kat] SHA2-256
891,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,323 UART: [kat] SHA2-512-ACC
906,224 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,887 UART: [kat] LMS
1,169,199 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,418 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,181,680 UART: [idev] Erasing UDS.KEYID = 0
1,198,776 UART: [idev] Sha1 KeyId Algorithm
1,207,592 UART: [idev] --
1,208,699 UART: [ldev] ++
1,208,867 UART: [ldev] CDI.KEYID = 6
1,209,231 UART: [ldev] SUBJECT.KEYID = 5
1,209,658 UART: [ldev] AUTHORITY.KEYID = 7
1,210,121 UART: [ldev] FE.KEYID = 1
1,215,343 UART: [ldev] Erasing FE.KEYID = 1
1,242,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,241 UART: [fwproc] Wait for Commands...
1,281,942 UART: [fwproc] Recv command 0x46574c44
1,282,675 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,823 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,132 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,758 >>> mbox cmd response: success
2,771,991 UART: [afmc] ++
2,772,159 UART: [afmc] CDI.KEYID = 6
2,772,522 UART: [afmc] SUBJECT.KEYID = 7
2,772,948 UART: [afmc] AUTHORITY.KEYID = 5
2,808,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,851,041 UART:
2,851,057 UART: Running Caliptra ROM ...
2,851,465 UART:
2,851,607 UART: [state] CFI Enabled
2,854,861 UART: [state] LifecycleState = Unprovisioned
2,855,516 UART: [state] DebugLocked = No
2,856,252 UART: [state] WD Timer not started. Device not locked for debugging
2,857,359 UART: [kat] SHA2-256
3,660,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,665,038 UART: [kat] ++
3,665,190 UART: [kat] sha1
3,669,326 UART: [kat] SHA2-256
3,671,266 UART: [kat] SHA2-384
3,673,937 UART: [kat] SHA2-512-ACC
3,675,838 UART: [kat] ECC-384
3,685,589 UART: [kat] HMAC-384Kdf
3,690,097 UART: [kat] LMS
3,938,409 UART: [kat] --
3,939,237 UART: [warm-reset] ++
3,939,505 UART: [warm-reset] Prev Cold-Reset failed
3,940,560 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,238 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,245 UART: [cold-reset] ++
1,169,771 UART: [fht] FHT @ 0x50003400
1,172,235 UART: [idev] ++
1,172,403 UART: [idev] CDI.KEYID = 6
1,172,764 UART: [idev] SUBJECT.KEYID = 7
1,173,189 UART: [idev] UDS.KEYID = 0
1,181,165 UART: [idev] Erasing UDS.KEYID = 0
1,197,977 UART: [idev] Sha1 KeyId Algorithm
1,206,913 UART: [idev] --
1,208,138 UART: [ldev] ++
1,208,306 UART: [ldev] CDI.KEYID = 6
1,208,670 UART: [ldev] SUBJECT.KEYID = 5
1,209,097 UART: [ldev] AUTHORITY.KEYID = 7
1,209,560 UART: [ldev] FE.KEYID = 1
1,214,620 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,044 UART: [ldev] --
1,280,400 UART: [fwproc] Wait for Commands...
1,281,065 UART: [fwproc] Recv command 0x46574c44
1,281,798 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,862 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,171 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,721 >>> mbox cmd response: success
2,770,956 UART: [afmc] ++
2,771,124 UART: [afmc] CDI.KEYID = 6
2,771,487 UART: [afmc] SUBJECT.KEYID = 7
2,771,913 UART: [afmc] AUTHORITY.KEYID = 5
2,807,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,956 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,839 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,849,302 UART:
2,849,318 UART: Running Caliptra ROM ...
2,849,726 UART:
2,849,781 UART: [state] CFI Enabled
2,852,487 UART: [state] LifecycleState = Unprovisioned
2,853,142 UART: [state] DebugLocked = No
2,853,874 UART: [state] WD Timer not started. Device not locked for debugging
2,855,193 UART: [kat] SHA2-256
3,658,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,662,872 UART: [kat] ++
3,663,024 UART: [kat] sha1
3,667,072 UART: [kat] SHA2-256
3,669,012 UART: [kat] SHA2-384
3,671,683 UART: [kat] SHA2-512-ACC
3,673,584 UART: [kat] ECC-384
3,683,381 UART: [kat] HMAC-384Kdf
3,687,989 UART: [kat] LMS
3,936,301 UART: [kat] --
3,937,443 UART: [warm-reset] ++
3,937,711 UART: [warm-reset] Prev Cold-Reset failed
3,938,618 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,771 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,379 UART: [kat] SHA2-256
891,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,058 UART: [kat] ++
896,210 UART: [kat] sha1
900,328 UART: [kat] SHA2-256
902,268 UART: [kat] SHA2-384
905,147 UART: [kat] SHA2-512-ACC
907,048 UART: [kat] ECC-384
916,863 UART: [kat] HMAC-384Kdf
921,643 UART: [kat] LMS
1,169,955 UART: [kat] --
1,171,046 UART: [cold-reset] ++
1,171,412 UART: [fht] FHT @ 0x50003400
1,174,102 UART: [idev] ++
1,174,270 UART: [idev] CDI.KEYID = 6
1,174,631 UART: [idev] SUBJECT.KEYID = 7
1,175,056 UART: [idev] UDS.KEYID = 0
1,183,280 UART: [idev] Erasing UDS.KEYID = 0
1,200,428 UART: [idev] Sha1 KeyId Algorithm
1,209,358 UART: [idev] --
1,210,291 UART: [ldev] ++
1,210,459 UART: [ldev] CDI.KEYID = 6
1,210,823 UART: [ldev] SUBJECT.KEYID = 5
1,211,250 UART: [ldev] AUTHORITY.KEYID = 7
1,211,713 UART: [ldev] FE.KEYID = 1
1,216,773 UART: [ldev] Erasing FE.KEYID = 1
1,243,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,161 UART: [ldev] --
1,282,587 UART: [fwproc] Wait for Commands...
1,283,204 UART: [fwproc] Recv command 0x46574c44
1,283,937 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,301 >>> mbox cmd response: success
2,774,546 UART: [afmc] ++
2,774,714 UART: [afmc] CDI.KEYID = 6
2,775,077 UART: [afmc] SUBJECT.KEYID = 7
2,775,503 UART: [afmc] AUTHORITY.KEYID = 5
2,811,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,897 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,616 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
Initializing fuses
2,853,556 UART:
2,853,572 UART: Running Caliptra ROM ...
2,853,980 UART:
2,854,122 UART: [state] CFI Enabled
2,856,934 UART: [state] LifecycleState = Unprovisioned
2,857,589 UART: [state] DebugLocked = No
2,858,107 UART: [state] WD Timer not started. Device not locked for debugging
2,859,426 UART: [kat] SHA2-256
3,662,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,667,105 UART: [kat] ++
3,667,257 UART: [kat] sha1
3,671,643 UART: [kat] SHA2-256
3,673,583 UART: [kat] SHA2-384
3,676,280 UART: [kat] SHA2-512-ACC
3,678,181 UART: [kat] ECC-384
3,687,622 UART: [kat] HMAC-384Kdf
3,692,246 UART: [kat] LMS
3,940,558 UART: [kat] --
3,941,226 UART: [warm-reset] ++
3,941,494 UART: [warm-reset] Prev Cold-Reset failed
3,942,309 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,642 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,135 UART:
192,542 UART: Running Caliptra ROM ...
193,750 UART:
193,906 UART: [state] CFI Enabled
264,699 UART: [state] LifecycleState = Production
266,891 UART: [state] DebugLocked = No
269,776 UART: [state] WD Timer not started. Device not locked for debugging
274,896 UART: [kat] SHA2-256
456,846 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,347 UART: [kat] ++
468,830 UART: [kat] sha1
478,738 UART: [kat] SHA2-256
481,798 UART: [kat] SHA2-384
487,444 UART: [kat] SHA2-512-ACC
490,061 UART: [kat] ECC-384
3,776,453 UART: [kat] HMAC-384Kdf
3,802,208 UART: [kat] LMS
4,875,351 UART: [kat] --
4,880,337 UART: [cold-reset] ++
4,882,864 UART: [fht] FHT @ 0x50003400
4,892,923 UART: [idev] ++
4,893,602 UART: [idev] CDI.KEYID = 6
4,894,834 UART: [idev] SUBJECT.KEYID = 7
4,895,932 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,384 UART:
1,654 UART: Running Caliptra ROM ...
2,787 UART:
2,938 UART: [state] CFI Enabled
56,255 UART: [state] LifecycleState = Production
58,033 UART: [state] DebugLocked = No
60,927 UART: [state] WD Timer not started. Device not locked for debugging
65,451 UART: [kat] SHA2-256
247,402 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
258,905 UART: [kat] ++
259,491 UART: [kat] sha1
270,213 UART: [kat] SHA2-256
273,217 UART: [kat] SHA2-384
280,536 UART: [kat] SHA2-512-ACC
283,137 UART: [kat] ECC-384
3,567,885 UART: [kat] HMAC-384Kdf
3,599,359 UART: [kat] LMS
4,672,512 UART: [kat] --
4,675,828 UART: [warm-reset] ++
4,676,845 UART: [warm-reset] Prev Cold-Reset failed
4,681,814 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,399 UART:
192,790 UART: Running Caliptra ROM ...
193,971 UART:
603,683 UART: [state] CFI Enabled
614,610 UART: [state] LifecycleState = Production
616,843 UART: [state] DebugLocked = No
619,698 UART: [state] WD Timer not started. Device not locked for debugging
624,932 UART: [kat] SHA2-256
806,901 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,397 UART: [kat] ++
818,951 UART: [kat] sha1
830,199 UART: [kat] SHA2-256
833,259 UART: [kat] SHA2-384
839,121 UART: [kat] SHA2-512-ACC
841,725 UART: [kat] ECC-384
4,096,539 UART: [kat] HMAC-384Kdf
4,107,915 UART: [kat] LMS
5,181,048 UART: [kat] --
5,185,221 UART: [cold-reset] ++
5,187,742 UART: [fht] FHT @ 0x50003400
5,199,202 UART: [idev] ++
5,199,867 UART: [idev] CDI.KEYID = 6
5,201,016 UART: [idev] SUBJECT.KEYID = 7
5,202,544 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,451 UART:
1,626 UART: Running Caliptra ROM ...
2,764 UART:
15,260,990 UART: [state] CFI Enabled
15,276,629 UART: [state] LifecycleState = Production
15,278,382 UART: [state] DebugLocked = No
15,279,947 UART: [state] WD Timer not started. Device not locked for debugging
15,283,846 UART: [kat] SHA2-256
15,465,803 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
15,477,352 UART: [kat] ++
15,477,948 UART: [kat] sha1
15,489,062 UART: [kat] SHA2-256
15,492,071 UART: [kat] SHA2-384
15,497,953 UART: [kat] SHA2-512-ACC
15,500,566 UART: [kat] ECC-384
18,755,839 UART: [kat] HMAC-384Kdf
18,768,060 UART: [kat] LMS
19,841,247 UART: [kat] --
19,847,418 UART: [warm-reset] ++
19,848,430 UART: [warm-reset] Prev Cold-Reset failed
19,851,926 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,313 UART:
192,700 UART: Running Caliptra ROM ...
193,908 UART:
194,062 UART: [state] CFI Enabled
264,930 UART: [state] LifecycleState = Production
266,705 UART: [state] DebugLocked = No
268,523 UART: [state] WD Timer not started. Device not locked for debugging
273,165 UART: [kat] SHA2-256
452,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,819 UART: [kat] ++
464,370 UART: [kat] sha1
474,174 UART: [kat] SHA2-256
477,179 UART: [kat] SHA2-384
483,426 UART: [kat] SHA2-512-ACC
486,371 UART: [kat] ECC-384
2,948,927 UART: [kat] HMAC-384Kdf
2,972,118 UART: [kat] LMS
3,501,546 UART: [kat] --
3,506,748 UART: [cold-reset] ++
3,509,332 UART: [fht] FHT @ 0x50003400
3,520,795 UART: [idev] ++
3,521,357 UART: [idev] CDI.KEYID = 6
3,522,293 UART: [idev] SUBJECT.KEYID = 7
3,523,463 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,405 UART:
1,576 UART: Running Caliptra ROM ...
2,726 UART:
2,880 UART: [state] CFI Enabled
66,927 UART: [state] LifecycleState = Production
68,691 UART: [state] DebugLocked = No
71,230 UART: [state] WD Timer not started. Device not locked for debugging
74,478 UART: [kat] SHA2-256
253,571 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,165 UART: [kat] ++
265,609 UART: [kat] sha1
276,803 UART: [kat] SHA2-256
279,810 UART: [kat] SHA2-384
285,458 UART: [kat] SHA2-512-ACC
288,388 UART: [kat] ECC-384
2,750,548 UART: [kat] HMAC-384Kdf
2,765,746 UART: [kat] LMS
3,295,232 UART: [kat] --
3,300,156 UART: [warm-reset] ++
3,300,952 UART: [warm-reset] Prev Cold-Reset failed
3,303,921 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,393 UART:
192,792 UART: Running Caliptra ROM ...
193,919 UART:
603,668 UART: [state] CFI Enabled
616,165 UART: [state] LifecycleState = Production
617,889 UART: [state] DebugLocked = No
620,288 UART: [state] WD Timer not started. Device not locked for debugging
623,995 UART: [kat] SHA2-256
803,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,696 UART: [kat] ++
815,225 UART: [kat] sha1
826,375 UART: [kat] SHA2-256
829,372 UART: [kat] SHA2-384
834,695 UART: [kat] SHA2-512-ACC
837,631 UART: [kat] ECC-384
3,278,717 UART: [kat] HMAC-384Kdf
3,291,127 UART: [kat] LMS
3,820,640 UART: [kat] --
3,826,458 UART: [cold-reset] ++
3,827,626 UART: [fht] FHT @ 0x50003400
3,838,891 UART: [idev] ++
3,839,462 UART: [idev] CDI.KEYID = 6
3,840,372 UART: [idev] SUBJECT.KEYID = 7
3,841,585 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,479 UART:
1,742 UART: Running Caliptra ROM ...
2,884 UART:
16,626,441 UART: [state] CFI Enabled
16,644,481 UART: [state] LifecycleState = Production
16,646,227 UART: [state] DebugLocked = No
16,647,602 UART: [state] WD Timer not started. Device not locked for debugging
16,651,496 UART: [kat] SHA2-256
16,830,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,842,239 UART: [kat] ++
16,842,781 UART: [kat] sha1
16,852,933 UART: [kat] SHA2-256
16,855,949 UART: [kat] SHA2-384
16,862,686 UART: [kat] SHA2-512-ACC
16,865,677 UART: [kat] ECC-384
19,310,689 UART: [kat] HMAC-384Kdf
19,322,524 UART: [kat] LMS
19,852,038 UART: [kat] --
19,858,831 UART: [warm-reset] ++
19,859,670 UART: [warm-reset] Prev Cold-Reset failed
19,863,091 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
192,176 UART:
192,572 UART: Running Caliptra ROM ...
193,900 UART:
194,056 UART: [state] CFI Enabled
263,606 UART: [state] LifecycleState = Production
265,416 UART: [state] DebugLocked = No
268,040 UART: [state] WD Timer not started. Device not locked for debugging
271,329 UART: [kat] SHA2-256
450,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,030 UART: [kat] ++
462,589 UART: [kat] sha1
474,018 UART: [kat] SHA2-256
477,031 UART: [kat] SHA2-384
482,903 UART: [kat] SHA2-512-ACC
485,887 UART: [kat] ECC-384
2,950,847 UART: [kat] HMAC-384Kdf
2,972,545 UART: [kat] LMS
3,501,975 UART: [kat] --
3,505,474 UART: [cold-reset] ++
3,507,887 UART: [fht] FHT @ 0x50003400
3,519,028 UART: [idev] ++
3,519,595 UART: [idev] CDI.KEYID = 6
3,520,500 UART: [idev] SUBJECT.KEYID = 7
3,521,715 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,476 UART:
1,766 UART: Running Caliptra ROM ...
3,044 UART:
3,207 UART: [state] CFI Enabled
71,605 UART: [state] LifecycleState = Production
73,383 UART: [state] DebugLocked = No
75,675 UART: [state] WD Timer not started. Device not locked for debugging
79,616 UART: [kat] SHA2-256
258,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,301 UART: [kat] ++
270,830 UART: [kat] sha1
282,146 UART: [kat] SHA2-256
285,148 UART: [kat] SHA2-384
291,076 UART: [kat] SHA2-512-ACC
294,014 UART: [kat] ECC-384
2,753,324 UART: [kat] HMAC-384Kdf
2,775,035 UART: [kat] LMS
3,304,513 UART: [kat] --
3,307,635 UART: [warm-reset] ++
3,308,478 UART: [warm-reset] Prev Cold-Reset failed
3,311,926 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,475 UART:
192,869 UART: Running Caliptra ROM ...
194,083 UART:
603,515 UART: [state] CFI Enabled
616,963 UART: [state] LifecycleState = Production
618,754 UART: [state] DebugLocked = No
621,505 UART: [state] WD Timer not started. Device not locked for debugging
624,721 UART: [kat] SHA2-256
803,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,390 UART: [kat] ++
815,917 UART: [kat] sha1
827,551 UART: [kat] SHA2-256
830,598 UART: [kat] SHA2-384
836,725 UART: [kat] SHA2-512-ACC
839,659 UART: [kat] ECC-384
3,284,295 UART: [kat] HMAC-384Kdf
3,296,906 UART: [kat] LMS
3,826,428 UART: [kat] --
3,830,740 UART: [cold-reset] ++
3,832,615 UART: [fht] FHT @ 0x50003400
3,844,728 UART: [idev] ++
3,845,306 UART: [idev] CDI.KEYID = 6
3,846,319 UART: [idev] SUBJECT.KEYID = 7
3,847,418 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,428 UART:
1,699 UART: Running Caliptra ROM ...
2,764 UART:
16,616,890 UART: [state] CFI Enabled
16,631,888 UART: [state] LifecycleState = Production
16,633,636 UART: [state] DebugLocked = No
16,636,155 UART: [state] WD Timer not started. Device not locked for debugging
16,639,143 UART: [kat] SHA2-256
16,818,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,829,791 UART: [kat] ++
16,830,327 UART: [kat] sha1
16,841,271 UART: [kat] SHA2-256
16,844,298 UART: [kat] SHA2-384
16,850,286 UART: [kat] SHA2-512-ACC
16,853,229 UART: [kat] ECC-384
19,298,384 UART: [kat] HMAC-384Kdf
19,310,886 UART: [kat] LMS
19,840,393 UART: [kat] --
19,845,341 UART: [warm-reset] ++
19,846,189 UART: [warm-reset] Prev Cold-Reset failed
19,849,851 UART: ROM Fatal Error: 0x01040010test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Production
85,673 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
891,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,173 UART: [kat] ++
895,325 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,751 UART:
1,175,767 UART: Running Caliptra ROM ...
1,176,175 UART:
1,176,230 UART: [state] CFI Enabled
1,178,574 UART: [state] LifecycleState = Production
1,179,181 UART: [state] DebugLocked = No
1,179,813 UART: [state] WD Timer not started. Device not locked for debugging
1,181,040 UART: [kat] SHA2-256
1,984,590 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,719 UART: [kat] ++
1,988,871 UART: [kat] sha1
1,993,253 UART: [kat] SHA2-256
1,995,193 UART: [kat] SHA2-384
1,998,134 UART: [kat] SHA2-512-ACC
2,000,035 UART: [kat] ECC-384
2,009,462 UART: [kat] HMAC-384Kdf
2,013,834 UART: [kat] LMS
2,262,146 UART: [kat] --
2,262,924 UART: [warm-reset] ++
2,263,192 UART: [warm-reset] Prev Cold-Reset failed
2,264,047 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Production
85,898 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,559 UART: [kat] SHA2-512-ACC
906,460 UART: [kat] ECC-384
915,955 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,760 UART: [cold-reset] ++
1,170,114 UART: [fht] FHT @ 0x50003400
1,172,916 UART: [idev] ++
1,173,084 UART: [idev] CDI.KEYID = 6
1,173,445 UART: [idev] SUBJECT.KEYID = 7
1,173,870 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,438 UART:
1,175,454 UART: Running Caliptra ROM ...
1,175,862 UART:
1,176,004 UART: [state] CFI Enabled
1,178,742 UART: [state] LifecycleState = Production
1,179,349 UART: [state] DebugLocked = No
1,179,935 UART: [state] WD Timer not started. Device not locked for debugging
1,181,132 UART: [kat] SHA2-256
1,984,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,811 UART: [kat] ++
1,988,963 UART: [kat] sha1
1,993,141 UART: [kat] SHA2-256
1,995,081 UART: [kat] SHA2-384
1,997,892 UART: [kat] SHA2-512-ACC
1,999,793 UART: [kat] ECC-384
2,009,370 UART: [kat] HMAC-384Kdf
2,013,948 UART: [kat] LMS
2,262,260 UART: [kat] --
2,263,250 UART: [warm-reset] ++
2,263,518 UART: [warm-reset] Prev Cold-Reset failed
2,264,345 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,786 UART: [state] LifecycleState = Production
86,393 UART: [state] DebugLocked = No
86,989 UART: [state] WD Timer not started. Device not locked for debugging
88,338 UART: [kat] SHA2-256
891,888 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,017 UART: [kat] ++
896,169 UART: [kat] sha1
900,567 UART: [kat] SHA2-256
902,507 UART: [kat] SHA2-384
905,334 UART: [kat] SHA2-512-ACC
907,235 UART: [kat] ECC-384
916,982 UART: [kat] HMAC-384Kdf
921,592 UART: [kat] LMS
1,169,904 UART: [kat] --
1,170,609 UART: [cold-reset] ++
1,170,997 UART: [fht] FHT @ 0x50003400
1,173,523 UART: [idev] ++
1,173,691 UART: [idev] CDI.KEYID = 6
1,174,052 UART: [idev] SUBJECT.KEYID = 7
1,174,477 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,155 UART:
1,176,171 UART: Running Caliptra ROM ...
1,176,579 UART:
1,176,634 UART: [state] CFI Enabled
1,179,536 UART: [state] LifecycleState = Production
1,180,143 UART: [state] DebugLocked = No
1,180,671 UART: [state] WD Timer not started. Device not locked for debugging
1,181,852 UART: [kat] SHA2-256
1,985,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,531 UART: [kat] ++
1,989,683 UART: [kat] sha1
1,994,089 UART: [kat] SHA2-256
1,996,029 UART: [kat] SHA2-384
1,998,702 UART: [kat] SHA2-512-ACC
2,000,603 UART: [kat] ECC-384
2,009,964 UART: [kat] HMAC-384Kdf
2,014,682 UART: [kat] LMS
2,262,994 UART: [kat] --
2,263,790 UART: [warm-reset] ++
2,264,058 UART: [warm-reset] Prev Cold-Reset failed
2,264,861 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Production
86,046 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,824 UART: [cold-reset] ++
1,170,248 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,624 UART:
1,175,640 UART: Running Caliptra ROM ...
1,176,048 UART:
1,176,190 UART: [state] CFI Enabled
1,179,008 UART: [state] LifecycleState = Production
1,179,615 UART: [state] DebugLocked = No
1,180,125 UART: [state] WD Timer not started. Device not locked for debugging
1,181,356 UART: [kat] SHA2-256
1,984,906 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,035 UART: [kat] ++
1,989,187 UART: [kat] sha1
1,993,527 UART: [kat] SHA2-256
1,995,467 UART: [kat] SHA2-384
1,998,078 UART: [kat] SHA2-512-ACC
1,999,979 UART: [kat] ECC-384
2,009,762 UART: [kat] HMAC-384Kdf
2,014,274 UART: [kat] LMS
2,262,586 UART: [kat] --
2,263,458 UART: [warm-reset] ++
2,263,726 UART: [warm-reset] Prev Cold-Reset failed
2,264,913 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Production
85,837 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,434 UART: [kat] SHA2-512-ACC
906,335 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,172,929 UART: [idev] ++
1,173,097 UART: [idev] CDI.KEYID = 6
1,173,458 UART: [idev] SUBJECT.KEYID = 7
1,173,883 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,509 UART:
1,175,525 UART: Running Caliptra ROM ...
1,175,933 UART:
1,175,988 UART: [state] CFI Enabled
1,178,730 UART: [state] LifecycleState = Production
1,179,337 UART: [state] DebugLocked = No
1,180,003 UART: [state] WD Timer not started. Device not locked for debugging
1,181,162 UART: [kat] SHA2-256
1,984,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,841 UART: [kat] ++
1,988,993 UART: [kat] sha1
1,993,275 UART: [kat] SHA2-256
1,995,215 UART: [kat] SHA2-384
1,997,962 UART: [kat] SHA2-512-ACC
1,999,863 UART: [kat] ECC-384
2,010,034 UART: [kat] HMAC-384Kdf
2,014,612 UART: [kat] LMS
2,262,924 UART: [kat] --
2,263,902 UART: [warm-reset] ++
2,264,170 UART: [warm-reset] Prev Cold-Reset failed
2,265,105 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Production
85,992 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,679 UART: [kat] HMAC-384Kdf
921,261 UART: [kat] LMS
1,169,573 UART: [kat] --
1,170,596 UART: [cold-reset] ++
1,171,170 UART: [fht] FHT @ 0x50003400
1,173,678 UART: [idev] ++
1,173,846 UART: [idev] CDI.KEYID = 6
1,174,207 UART: [idev] SUBJECT.KEYID = 7
1,174,632 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,224 UART:
1,176,240 UART: Running Caliptra ROM ...
1,176,648 UART:
1,176,790 UART: [state] CFI Enabled
1,179,188 UART: [state] LifecycleState = Production
1,179,795 UART: [state] DebugLocked = No
1,180,493 UART: [state] WD Timer not started. Device not locked for debugging
1,181,604 UART: [kat] SHA2-256
1,985,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,989,283 UART: [kat] ++
1,989,435 UART: [kat] sha1
1,993,541 UART: [kat] SHA2-256
1,995,481 UART: [kat] SHA2-384
1,998,406 UART: [kat] SHA2-512-ACC
2,000,307 UART: [kat] ECC-384
2,010,098 UART: [kat] HMAC-384Kdf
2,014,756 UART: [kat] LMS
2,263,068 UART: [kat] --
2,263,776 UART: [warm-reset] ++
2,264,044 UART: [warm-reset] Prev Cold-Reset failed
2,264,965 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
5,569 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,142 UART:
192,529 UART: Running Caliptra ROM ...
193,709 UART:
193,868 UART: [state] CFI Enabled
266,602 UART: [state] LifecycleState = Unprovisioned
268,964 UART: [state] DebugLocked = No
271,586 UART: [state] WD Timer not started. Device not locked for debugging
276,668 UART: [kat] SHA2-256
458,637 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,110 UART: [kat] ++
470,694 UART: [kat] sha1
480,442 UART: [kat] SHA2-256
483,504 UART: [kat] SHA2-384
489,851 UART: [kat] SHA2-512-ACC
492,515 UART: [kat] ECC-384
3,775,881 UART: [kat] HMAC-384Kdf
3,802,922 UART: [kat] LMS
4,876,059 UART: [kat] --
4,881,290 UART: [cold-reset] ++
4,883,543 UART: [fht] FHT @ 0x50003400
4,894,466 UART: [idev] ++
4,895,137 UART: [idev] CDI.KEYID = 6
4,896,377 UART: [idev] SUBJECT.KEYID = 7
4,897,536 UART: [idev] UDS.KEYID = 0
4,930,015 UART: [idev] Erasing UDS.KEYID = 0
8,243,591 UART: [idev] Sha1 KeyId Algorithm
8,266,546 UART: [idev] --
8,270,596 UART: [ldev] ++
8,271,166 UART: [ldev] CDI.KEYID = 6
8,272,402 UART: [ldev] SUBJECT.KEYID = 5
8,273,562 UART: [ldev] AUTHORITY.KEYID = 7
8,274,819 UART: [ldev] FE.KEYID = 1
8,318,595 UART: [ldev] Erasing FE.KEYID = 1
11,655,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,965,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,981,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,997,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,013,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,034,483 UART: [ldev] --
14,038,556 UART: [fwproc] Wait for Commands...
14,040,331 UART: [fwproc] Recv command 0x46574c44
14,042,654 UART: [fwproc] Recv'd Img size: 113844 bytes
Initializing fuses
1,160 UART:
1,420 UART: Running Caliptra ROM ...
2,521 UART:
2,678 UART: [state] CFI Enabled
72,715 UART: [state] LifecycleState = Unprovisioned
74,585 UART: [state] DebugLocked = No
76,880 UART: [state] WD Timer not started. Device not locked for debugging
81,591 UART: [kat] SHA2-256
263,514 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
275,014 UART: [kat] ++
275,605 UART: [kat] sha1
286,053 UART: [kat] SHA2-256
289,066 UART: [kat] SHA2-384
295,255 UART: [kat] SHA2-512-ACC
297,862 UART: [kat] ECC-384
3,584,058 UART: [kat] HMAC-384Kdf
3,612,877 UART: [kat] LMS
4,686,014 UART: [kat] --
4,691,035 UART: [warm-reset] ++
4,692,108 UART: [warm-reset] Prev Cold-Reset failed
4,696,613 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
5,253 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
6,527 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,558 UART:
192,937 UART: Running Caliptra ROM ...
194,033 UART:
603,810 UART: [state] CFI Enabled
618,798 UART: [state] LifecycleState = Unprovisioned
621,120 UART: [state] DebugLocked = No
622,811 UART: [state] WD Timer not started. Device not locked for debugging
628,046 UART: [kat] SHA2-256
810,013 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,591 UART: [kat] ++
822,174 UART: [kat] sha1
832,835 UART: [kat] SHA2-256
835,898 UART: [kat] SHA2-384
841,985 UART: [kat] SHA2-512-ACC
844,580 UART: [kat] ECC-384
4,101,826 UART: [kat] HMAC-384Kdf
4,114,886 UART: [kat] LMS
5,188,054 UART: [kat] --
5,193,034 UART: [cold-reset] ++
5,194,961 UART: [fht] FHT @ 0x50003400
5,207,333 UART: [idev] ++
5,208,002 UART: [idev] CDI.KEYID = 6
5,209,231 UART: [idev] SUBJECT.KEYID = 7
5,210,654 UART: [idev] UDS.KEYID = 0
5,228,521 UART: [idev] Erasing UDS.KEYID = 0
8,499,314 UART: [idev] Sha1 KeyId Algorithm
8,521,737 UART: [idev] --
8,524,902 UART: [ldev] ++
8,525,478 UART: [ldev] CDI.KEYID = 6
8,526,710 UART: [ldev] SUBJECT.KEYID = 5
8,528,183 UART: [ldev] AUTHORITY.KEYID = 7
8,529,762 UART: [ldev] FE.KEYID = 1
8,540,083 UART: [ldev] Erasing FE.KEYID = 1
11,835,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,128,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,144,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,160,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,176,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,196,497 UART: [ldev] --
14,201,556 UART: [fwproc] Wait for Commands...
14,203,045 UART: [fwproc] Recv command 0x46574c44
14,205,036 UART: [fwproc] Recv'd Img size: 113844 bytes
Initializing fuses
1,137 UART:
1,294 UART: Running Caliptra ROM ...
2,329 UART:
6,260,102 UART: [state] CFI Enabled
6,272,860 UART: [state] LifecycleState = Unprovisioned
6,274,716 UART: [state] DebugLocked = No
6,277,095 UART: [state] WD Timer not started. Device not locked for debugging
6,282,091 UART: [kat] SHA2-256
6,464,043 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,475,596 UART: [kat] ++
6,476,105 UART: [kat] sha1
6,487,200 UART: [kat] SHA2-256
6,490,209 UART: [kat] SHA2-384
6,495,536 UART: [kat] SHA2-512-ACC
6,498,148 UART: [kat] ECC-384
9,754,344 UART: [kat] HMAC-384Kdf
9,767,329 UART: [kat] LMS
10,840,468 UART: [kat] --
10,845,669 UART: [warm-reset] ++
10,846,738 UART: [warm-reset] Prev Cold-Reset failed
10,850,967 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
6,325 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
5,613 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,142 UART:
192,543 UART: Running Caliptra ROM ...
193,667 UART:
193,812 UART: [state] CFI Enabled
263,879 UART: [state] LifecycleState = Unprovisioned
265,696 UART: [state] DebugLocked = No
268,046 UART: [state] WD Timer not started. Device not locked for debugging
271,063 UART: [kat] SHA2-256
450,190 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,803 UART: [kat] ++
462,254 UART: [kat] sha1
473,179 UART: [kat] SHA2-256
476,213 UART: [kat] SHA2-384
482,791 UART: [kat] SHA2-512-ACC
485,728 UART: [kat] ECC-384
2,950,730 UART: [kat] HMAC-384Kdf
2,975,169 UART: [kat] LMS
3,504,604 UART: [kat] --
3,511,148 UART: [cold-reset] ++
3,512,338 UART: [fht] FHT @ 0x50003400
3,522,509 UART: [idev] ++
3,523,075 UART: [idev] CDI.KEYID = 6
3,523,984 UART: [idev] SUBJECT.KEYID = 7
3,525,198 UART: [idev] UDS.KEYID = 0
3,546,255 UART: [idev] Erasing UDS.KEYID = 0
6,033,265 UART: [idev] Sha1 KeyId Algorithm
6,056,820 UART: [idev] --
6,060,009 UART: [ldev] ++
6,060,605 UART: [ldev] CDI.KEYID = 6
6,061,494 UART: [ldev] SUBJECT.KEYID = 5
6,062,660 UART: [ldev] AUTHORITY.KEYID = 7
6,063,949 UART: [ldev] FE.KEYID = 1
6,102,902 UART: [ldev] Erasing FE.KEYID = 1
8,609,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,417 UART: [ldev] --
10,417,546 UART: [fwproc] Wait for Commands...
10,420,614 UART: [fwproc] Recv command 0x46574c44
10,422,707 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,161 UART:
1,444 UART: Running Caliptra ROM ...
2,549 UART:
2,704 UART: [state] CFI Enabled
68,801 UART: [state] LifecycleState = Unprovisioned
70,720 UART: [state] DebugLocked = No
72,290 UART: [state] WD Timer not started. Device not locked for debugging
76,680 UART: [kat] SHA2-256
255,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
267,401 UART: [kat] ++
268,019 UART: [kat] sha1
279,015 UART: [kat] SHA2-256
282,030 UART: [kat] SHA2-384
287,253 UART: [kat] SHA2-512-ACC
290,181 UART: [kat] ECC-384
2,736,129 UART: [kat] HMAC-384Kdf
2,757,806 UART: [kat] LMS
3,287,294 UART: [kat] --
3,290,637 UART: [warm-reset] ++
3,291,489 UART: [warm-reset] Prev Cold-Reset failed
3,295,420 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
5,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
6,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,319 UART:
192,697 UART: Running Caliptra ROM ...
193,883 UART:
603,466 UART: [state] CFI Enabled
619,560 UART: [state] LifecycleState = Unprovisioned
621,445 UART: [state] DebugLocked = No
624,114 UART: [state] WD Timer not started. Device not locked for debugging
628,037 UART: [kat] SHA2-256
807,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,725 UART: [kat] ++
819,257 UART: [kat] sha1
830,113 UART: [kat] SHA2-256
833,159 UART: [kat] SHA2-384
839,358 UART: [kat] SHA2-512-ACC
842,352 UART: [kat] ECC-384
3,282,601 UART: [kat] HMAC-384Kdf
3,294,979 UART: [kat] LMS
3,824,426 UART: [kat] --
3,828,792 UART: [cold-reset] ++
3,829,907 UART: [fht] FHT @ 0x50003400
3,842,046 UART: [idev] ++
3,842,610 UART: [idev] CDI.KEYID = 6
3,843,550 UART: [idev] SUBJECT.KEYID = 7
3,844,758 UART: [idev] UDS.KEYID = 0
3,860,001 UART: [idev] Erasing UDS.KEYID = 0
6,316,229 UART: [idev] Sha1 KeyId Algorithm
6,340,277 UART: [idev] --
6,344,187 UART: [ldev] ++
6,344,796 UART: [ldev] CDI.KEYID = 6
6,345,690 UART: [ldev] SUBJECT.KEYID = 5
6,346,853 UART: [ldev] AUTHORITY.KEYID = 7
6,348,143 UART: [ldev] FE.KEYID = 1
6,357,735 UART: [ldev] Erasing FE.KEYID = 1
8,831,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,545 UART: [ldev] --
10,620,323 UART: [fwproc] Wait for Commands...
10,622,412 UART: [fwproc] Recv command 0x46574c44
10,624,505 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,172 UART:
1,431 UART: Running Caliptra ROM ...
2,534 UART:
9,830,370 UART: [state] CFI Enabled
9,843,491 UART: [state] LifecycleState = Unprovisioned
9,845,342 UART: [state] DebugLocked = No
9,846,615 UART: [state] WD Timer not started. Device not locked for debugging
9,850,458 UART: [kat] SHA2-256
10,029,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,041,198 UART: [kat] ++
10,041,743 UART: [kat] sha1
10,052,800 UART: [kat] SHA2-256
10,055,862 UART: [kat] SHA2-384
10,061,576 UART: [kat] SHA2-512-ACC
10,064,509 UART: [kat] ECC-384
12,507,473 UART: [kat] HMAC-384Kdf
12,520,527 UART: [kat] LMS
13,050,040 UART: [kat] --
13,055,113 UART: [warm-reset] ++
13,055,906 UART: [warm-reset] Prev Cold-Reset failed
13,059,462 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
6,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
5,901 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,265 UART:
192,658 UART: Running Caliptra ROM ...
193,753 UART:
193,896 UART: [state] CFI Enabled
266,486 UART: [state] LifecycleState = Unprovisioned
268,397 UART: [state] DebugLocked = No
270,236 UART: [state] WD Timer not started. Device not locked for debugging
273,151 UART: [kat] SHA2-256
452,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,877 UART: [kat] ++
464,323 UART: [kat] sha1
474,331 UART: [kat] SHA2-256
477,350 UART: [kat] SHA2-384
483,874 UART: [kat] SHA2-512-ACC
486,868 UART: [kat] ECC-384
2,948,057 UART: [kat] HMAC-384Kdf
2,970,678 UART: [kat] LMS
3,500,162 UART: [kat] --
3,504,915 UART: [cold-reset] ++
3,506,417 UART: [fht] FHT @ 0x50003400
3,517,517 UART: [idev] ++
3,518,083 UART: [idev] CDI.KEYID = 6
3,519,008 UART: [idev] SUBJECT.KEYID = 7
3,520,179 UART: [idev] UDS.KEYID = 0
3,543,450 UART: [idev] Erasing UDS.KEYID = 0
6,027,131 UART: [idev] Sha1 KeyId Algorithm
6,050,080 UART: [idev] --
6,053,868 UART: [ldev] ++
6,054,672 UART: [ldev] CDI.KEYID = 6
6,055,595 UART: [ldev] SUBJECT.KEYID = 5
6,056,704 UART: [ldev] AUTHORITY.KEYID = 7
6,057,885 UART: [ldev] FE.KEYID = 1
6,099,920 UART: [ldev] Erasing FE.KEYID = 1
8,597,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,995 UART: [ldev] --
10,391,735 UART: [fwproc] Wait for Commands...
10,393,244 UART: [fwproc] Recv command 0x46574c44
10,395,350 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,118 UART:
1,307 UART: Running Caliptra ROM ...
3,231 UART:
3,403 UART: [state] CFI Enabled
75,486 UART: [state] LifecycleState = Unprovisioned
77,326 UART: [state] DebugLocked = No
79,426 UART: [state] WD Timer not started. Device not locked for debugging
83,272 UART: [kat] SHA2-256
262,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
273,985 UART: [kat] ++
274,430 UART: [kat] sha1
284,227 UART: [kat] SHA2-256
287,293 UART: [kat] SHA2-384
293,915 UART: [kat] SHA2-512-ACC
296,851 UART: [kat] ECC-384
2,756,592 UART: [kat] HMAC-384Kdf
2,781,193 UART: [kat] LMS
3,310,660 UART: [kat] --
3,316,506 UART: [warm-reset] ++
3,317,310 UART: [warm-reset] Prev Cold-Reset failed
3,320,010 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
5,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
6,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,439 UART:
192,874 UART: Running Caliptra ROM ...
193,986 UART:
603,485 UART: [state] CFI Enabled
614,617 UART: [state] LifecycleState = Unprovisioned
616,501 UART: [state] DebugLocked = No
618,388 UART: [state] WD Timer not started. Device not locked for debugging
622,612 UART: [kat] SHA2-256
801,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,315 UART: [kat] ++
813,851 UART: [kat] sha1
823,870 UART: [kat] SHA2-256
826,925 UART: [kat] SHA2-384
833,919 UART: [kat] SHA2-512-ACC
836,900 UART: [kat] ECC-384
3,276,649 UART: [kat] HMAC-384Kdf
3,288,697 UART: [kat] LMS
3,818,202 UART: [kat] --
3,821,386 UART: [cold-reset] ++
3,823,856 UART: [fht] FHT @ 0x50003400
3,834,563 UART: [idev] ++
3,835,129 UART: [idev] CDI.KEYID = 6
3,836,011 UART: [idev] SUBJECT.KEYID = 7
3,837,243 UART: [idev] UDS.KEYID = 0
3,851,721 UART: [idev] Erasing UDS.KEYID = 0
6,311,758 UART: [idev] Sha1 KeyId Algorithm
6,335,363 UART: [idev] --
6,339,459 UART: [ldev] ++
6,340,023 UART: [ldev] CDI.KEYID = 6
6,340,931 UART: [ldev] SUBJECT.KEYID = 5
6,342,089 UART: [ldev] AUTHORITY.KEYID = 7
6,343,319 UART: [ldev] FE.KEYID = 1
6,354,211 UART: [ldev] Erasing FE.KEYID = 1
8,831,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,590 UART: [ldev] --
10,622,726 UART: [fwproc] Wait for Commands...
10,625,147 UART: [fwproc] Recv command 0x46574c44
10,627,244 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,161 UART:
1,361 UART: Running Caliptra ROM ...
2,469 UART:
9,837,219 UART: [state] CFI Enabled
9,853,240 UART: [state] LifecycleState = Unprovisioned
9,855,130 UART: [state] DebugLocked = No
9,857,387 UART: [state] WD Timer not started. Device not locked for debugging
9,861,079 UART: [kat] SHA2-256
10,040,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,051,750 UART: [kat] ++
10,052,242 UART: [kat] sha1
10,063,241 UART: [kat] SHA2-256
10,066,221 UART: [kat] SHA2-384
10,071,076 UART: [kat] SHA2-512-ACC
10,074,078 UART: [kat] ECC-384
12,516,844 UART: [kat] HMAC-384Kdf
12,528,736 UART: [kat] LMS
13,058,275 UART: [kat] --
13,060,426 UART: [warm-reset] ++
13,061,269 UART: [warm-reset] Prev Cold-Reset failed
13,064,265 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
6,244 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,172,997 UART: [idev] ++
1,173,165 UART: [idev] CDI.KEYID = 6
1,173,526 UART: [idev] SUBJECT.KEYID = 7
1,173,951 UART: [idev] UDS.KEYID = 0
1,182,021 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,550 UART: [ldev] ++
1,208,718 UART: [ldev] CDI.KEYID = 6
1,209,082 UART: [ldev] SUBJECT.KEYID = 5
1,209,509 UART: [ldev] AUTHORITY.KEYID = 7
1,209,972 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,202 UART: [ldev] --
1,280,654 UART: [fwproc] Wait for Commands...
1,281,295 UART: [fwproc] Recv command 0x46574c44
1,282,028 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,292,967 UART:
1,292,983 UART: Running Caliptra ROM ...
1,293,391 UART:
1,293,446 UART: [state] CFI Enabled
1,296,096 UART: [state] LifecycleState = Unprovisioned
1,296,751 UART: [state] DebugLocked = No
1,297,313 UART: [state] WD Timer not started. Device not locked for debugging
1,298,424 UART: [kat] SHA2-256
2,101,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,103 UART: [kat] ++
2,106,255 UART: [kat] sha1
2,110,679 UART: [kat] SHA2-256
2,112,619 UART: [kat] SHA2-384
2,115,394 UART: [kat] SHA2-512-ACC
2,117,295 UART: [kat] ECC-384
2,127,080 UART: [kat] HMAC-384Kdf
2,131,646 UART: [kat] LMS
2,379,958 UART: [kat] --
2,380,608 UART: [warm-reset] ++
2,380,876 UART: [warm-reset] Prev Cold-Reset failed
2,382,019 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,758 UART: [kat] ++
895,910 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,809 UART: [kat] SHA2-512-ACC
906,710 UART: [kat] ECC-384
916,619 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,424 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,215,923 UART: [ldev] Erasing FE.KEYID = 1
1,242,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,212 UART: [fwproc] Recv command 0x46574c44
1,282,945 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,293,800 UART:
1,293,816 UART: Running Caliptra ROM ...
1,294,224 UART:
1,294,366 UART: [state] CFI Enabled
1,297,294 UART: [state] LifecycleState = Unprovisioned
1,297,949 UART: [state] DebugLocked = No
1,298,447 UART: [state] WD Timer not started. Device not locked for debugging
1,299,696 UART: [kat] SHA2-256
2,103,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,375 UART: [kat] ++
2,107,527 UART: [kat] sha1
2,111,797 UART: [kat] SHA2-256
2,113,737 UART: [kat] SHA2-384
2,116,556 UART: [kat] SHA2-512-ACC
2,118,457 UART: [kat] ECC-384
2,128,160 UART: [kat] HMAC-384Kdf
2,132,676 UART: [kat] LMS
2,380,988 UART: [kat] --
2,382,032 UART: [warm-reset] ++
2,382,300 UART: [warm-reset] Prev Cold-Reset failed
2,383,529 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,563 UART: [kat] SHA2-256
901,503 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
915,670 UART: [kat] HMAC-384Kdf
920,276 UART: [kat] LMS
1,168,588 UART: [kat] --
1,169,361 UART: [cold-reset] ++
1,169,805 UART: [fht] FHT @ 0x50003400
1,172,601 UART: [idev] ++
1,172,769 UART: [idev] CDI.KEYID = 6
1,173,130 UART: [idev] SUBJECT.KEYID = 7
1,173,555 UART: [idev] UDS.KEYID = 0
1,181,633 UART: [idev] Erasing UDS.KEYID = 0
1,198,997 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,242,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,276 UART: [ldev] --
1,281,628 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,293,869 UART:
1,293,885 UART: Running Caliptra ROM ...
1,294,293 UART:
1,294,348 UART: [state] CFI Enabled
1,296,816 UART: [state] LifecycleState = Unprovisioned
1,297,471 UART: [state] DebugLocked = No
1,298,049 UART: [state] WD Timer not started. Device not locked for debugging
1,299,396 UART: [kat] SHA2-256
2,102,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,075 UART: [kat] ++
2,107,227 UART: [kat] sha1
2,111,579 UART: [kat] SHA2-256
2,113,519 UART: [kat] SHA2-384
2,116,342 UART: [kat] SHA2-512-ACC
2,118,243 UART: [kat] ECC-384
2,127,448 UART: [kat] HMAC-384Kdf
2,132,160 UART: [kat] LMS
2,380,472 UART: [kat] --
2,381,172 UART: [warm-reset] ++
2,381,440 UART: [warm-reset] Prev Cold-Reset failed
2,382,563 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,884 UART: [kat] SHA2-256
901,824 UART: [kat] SHA2-384
904,379 UART: [kat] SHA2-512-ACC
906,280 UART: [kat] ECC-384
916,167 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,198,912 UART: [idev] Sha1 KeyId Algorithm
1,207,988 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,241,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,685 UART: [fwproc] Wait for Commands...
1,282,490 UART: [fwproc] Recv command 0x46574c44
1,283,223 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,294,128 UART:
1,294,144 UART: Running Caliptra ROM ...
1,294,552 UART:
1,294,694 UART: [state] CFI Enabled
1,297,266 UART: [state] LifecycleState = Unprovisioned
1,297,921 UART: [state] DebugLocked = No
1,298,427 UART: [state] WD Timer not started. Device not locked for debugging
1,299,558 UART: [kat] SHA2-256
2,103,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,107,237 UART: [kat] ++
2,107,389 UART: [kat] sha1
2,111,703 UART: [kat] SHA2-256
2,113,643 UART: [kat] SHA2-384
2,116,362 UART: [kat] SHA2-512-ACC
2,118,263 UART: [kat] ECC-384
2,128,106 UART: [kat] HMAC-384Kdf
2,132,698 UART: [kat] LMS
2,381,010 UART: [kat] --
2,381,526 UART: [warm-reset] ++
2,381,794 UART: [warm-reset] Prev Cold-Reset failed
2,382,925 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,699 UART: [kat] SHA2-256
901,639 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
916,332 UART: [kat] HMAC-384Kdf
920,778 UART: [kat] LMS
1,169,090 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,317 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,181,233 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,521 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,080 UART: [ldev] --
1,280,368 UART: [fwproc] Wait for Commands...
1,281,023 UART: [fwproc] Recv command 0x46574c44
1,281,756 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,292,545 UART:
1,292,561 UART: Running Caliptra ROM ...
1,292,969 UART:
1,293,024 UART: [state] CFI Enabled
1,295,594 UART: [state] LifecycleState = Unprovisioned
1,296,249 UART: [state] DebugLocked = No
1,296,915 UART: [state] WD Timer not started. Device not locked for debugging
1,298,048 UART: [kat] SHA2-256
2,101,598 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,105,727 UART: [kat] ++
2,105,879 UART: [kat] sha1
2,110,337 UART: [kat] SHA2-256
2,112,277 UART: [kat] SHA2-384
2,115,196 UART: [kat] SHA2-512-ACC
2,117,097 UART: [kat] ECC-384
2,126,904 UART: [kat] HMAC-384Kdf
2,131,420 UART: [kat] LMS
2,379,732 UART: [kat] --
2,380,778 UART: [warm-reset] ++
2,381,046 UART: [warm-reset] Prev Cold-Reset failed
2,382,049 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,423 UART: [kat] SHA2-512-ACC
906,324 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,418 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,181,880 UART: [idev] Erasing UDS.KEYID = 0
1,198,434 UART: [idev] Sha1 KeyId Algorithm
1,207,200 UART: [idev] --
1,208,279 UART: [ldev] ++
1,208,447 UART: [ldev] CDI.KEYID = 6
1,208,811 UART: [ldev] SUBJECT.KEYID = 5
1,209,238 UART: [ldev] AUTHORITY.KEYID = 7
1,209,701 UART: [ldev] FE.KEYID = 1
1,214,891 UART: [ldev] Erasing FE.KEYID = 1
1,241,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,311 UART: [ldev] --
1,280,819 UART: [fwproc] Wait for Commands...
1,281,636 UART: [fwproc] Recv command 0x46574c44
1,282,369 UART: [fwproc] Recv'd Img size: 114168 bytes
Initializing fuses
1,293,274 UART:
1,293,290 UART: Running Caliptra ROM ...
1,293,698 UART:
1,293,840 UART: [state] CFI Enabled
1,296,502 UART: [state] LifecycleState = Unprovisioned
1,297,157 UART: [state] DebugLocked = No
1,297,865 UART: [state] WD Timer not started. Device not locked for debugging
1,299,136 UART: [kat] SHA2-256
2,102,686 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,106,815 UART: [kat] ++
2,106,967 UART: [kat] sha1
2,111,259 UART: [kat] SHA2-256
2,113,199 UART: [kat] SHA2-384
2,115,946 UART: [kat] SHA2-512-ACC
2,117,847 UART: [kat] ECC-384
2,127,628 UART: [kat] HMAC-384Kdf
2,132,402 UART: [kat] LMS
2,380,714 UART: [kat] --
2,381,734 UART: [warm-reset] ++
2,382,002 UART: [warm-reset] Prev Cold-Reset failed
2,383,101 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
Initializing fuses
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
5,547 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,051 UART:
192,490 UART: Running Caliptra ROM ...
193,670 UART:
193,825 UART: [state] CFI Enabled
262,307 UART: [state] LifecycleState = Unprovisioned
264,714 UART: [state] DebugLocked = No
266,577 UART: [state] WD Timer not started. Device not locked for debugging
271,550 UART: [kat] SHA2-256
453,434 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,974 UART: [kat] ++
465,476 UART: [kat] sha1
475,922 UART: [kat] SHA2-256
478,982 UART: [kat] SHA2-384
484,249 UART: [kat] SHA2-512-ACC
486,863 UART: [kat] ECC-384
3,776,338 UART: [kat] HMAC-384Kdf
3,802,245 UART: [kat] LMS
4,875,405 UART: [kat] --
4,881,038 UART: [cold-reset] ++
4,882,653 UART: [fht] FHT @ 0x50003400
4,894,062 UART: [idev] ++
4,894,749 UART: [idev] CDI.KEYID = 6
4,895,983 UART: [idev] SUBJECT.KEYID = 7
4,897,083 UART: [idev] UDS.KEYID = 0
4,930,092 UART: [idev] Erasing UDS.KEYID = 0
8,241,692 UART: [idev] Sha1 KeyId Algorithm
8,263,493 UART: [idev] --
8,266,402 UART: [ldev] ++
8,266,978 UART: [ldev] CDI.KEYID = 6
8,268,220 UART: [ldev] SUBJECT.KEYID = 5
8,269,379 UART: [ldev] AUTHORITY.KEYID = 7
8,270,606 UART: [ldev] FE.KEYID = 1
8,317,120 UART: [ldev] Erasing FE.KEYID = 1
11,654,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,963,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,979,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,995,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,011,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,032,717 UART: [ldev] --
14,037,280 UART: [fwproc] Wait for Commands...
14,040,023 UART: [fwproc] Recv command 0x46574c44
14,042,286 UART: [fwproc] Recv'd Img size: 113844 bytes
18,117,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,188,207 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,256,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,573,947 >>> mbox cmd response: success
18,578,145 UART: [afmc] ++
18,578,730 UART: [afmc] CDI.KEYID = 6
18,579,914 UART: [afmc] SUBJECT.KEYID = 7
18,581,090 UART: [afmc] AUTHORITY.KEYID = 5
21,948,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,246,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,248,621 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,264,754 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,280,874 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,296,878 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,319,707 UART: [afmc] --
24,325,474 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,468,841 UART: [cold-reset] --
24,469,701 UART: [state] Locking Datavault
24,470,775 UART: [state] Locking PCR0, PCR1 and PCR31
24,472,305 UART: [state] Locking ICCM
24,473,183 UART: [exit] Launching FMC @ 0x40000130
24,474,521 UART:
24,474,669 UART: Running Caliptra FMC ...
24,475,782 UART:
24,475,937 UART: [state] CFI Enabled
24,476,770 UART: [fht] FMC Alias Private Key: 7
26,744,964 UART: [art] Extend RT PCRs Done
26,746,213 UART: [art] Lock RT PCRs Done
26,747,593 UART: [art] Populate DV Done
26,753,125 UART: [fht] FMC Alias Private Key: 7
26,754,715 UART: [art] Derive CDI
26,755,465 UART: [art] Store in in slot 0x4
26,815,351 UART: [art] Derive Key Pair
26,816,413 UART: [art] Store priv key in slot 0x5
30,108,812 UART: [art] Derive Key Pair - Done
30,122,031 UART: [art] Signing Cert with AUTHO
30,123,346 UART: RITY.KEYID = 7
32,410,323 UART: [art] Erasing AUTHORITY.KEYID = 7
32,411,828 UART: [art] PUB.X = C89774D3075FFBBA64738D4E1606C7FDA8341EE748DF18698B071C4A6F15A4CA2AA7C0A3BEFFA8C1ADC2F4EE7BD676AA
32,419,080 UART: [art] PUB.Y = D6271D5287081D55CBCB61AFBF3CB2B8B15A7D9771D457885DA93B11BD7BBDC2AFB18C83E1D8612FA3B2FD438645BCDB
32,426,371 UART: [art] SIG.R = 20E8EF239771E6C7B73569361C59077670584564E001CAFD0B4B896D63DFB64939E076E4B333882BD8581ABF1D3156F3
32,433,703 UART: [art] SIG.S = 9023690A357A5746AE22BACC61FAFE4384AFC4663476EA19BAE7D86533DE427537FADBB11163C83726707CA9A7AA5CE4
33,739,188 UART: Caliptra RT
33,739,897 UART: [state] CFI Enabled
33,920,229 UART: [rt] RT listening for mailbox commands...
33,922,809 UART:
33,923,008 UART: Running Caliptra ROM ...
33,924,061 UART:
33,924,214 UART: [state] CFI Enabled
33,989,343 UART: [state] LifecycleState = Unprovisioned
33,991,211 UART: [state] DebugLocked = No
33,993,725 UART: [state] WD Timer not started. Device not locked for debugging
33,997,858 UART: [kat] SHA2-256
34,179,789 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,191,327 UART: [kat] ++
34,191,878 UART: [kat] sha1
34,201,635 UART: [kat] SHA2-256
34,204,645 UART: [kat] SHA2-384
34,210,940 UART: [kat] SHA2-512-ACC
34,213,552 UART: [kat] ECC-384
37,497,685 UART: [kat] HMAC-384Kdf
37,525,069 UART: [kat] LMS
38,598,190 UART: [kat] --
38,601,970 UART: [update-reset] ++
42,698,832 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,701,791 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
43,082,946 >>> mbox cmd response: success
Initializing fuses
803 UART: [
1,302 UART: Running Caliptra ROM ...
2,560 UART:
2,759 UART: [state] CFI Enabled
73,848 UART: [state] LifecycleState = Unprovisioned
75,739 UART: [state] DebugLocked = No
76,948 UART: [state] WD Timer not started. Device not locked for debugging
80,027 UART: [kat] SHA2-256
261,983 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
273,518 UART: [kat] ++
274,036 UART: [kat] sha1
285,249 UART: [kat] SHA2-256
288,251 UART: [kat] SHA2-384
294,282 UART: [kat] SHA2-512-ACC
296,889 UART: [kat] ECC-384
3,584,806 UART: [kat] HMAC-384Kdf
3,611,678 UART: [kat] LMS
4,684,831 UART: [kat] --
4,692,029 UART: [warm-reset] ++
4,694,481 UART: [warm-reset] Prev Update Reset failed
4,697,854 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
5,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,355,789 >>> mbox cmd response: success
24,039,313 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,182,749 UART:
24,183,144 UART: Running Caliptra FMC ...
24,184,358 UART:
24,184,529 UART: [state] CFI Enabled
24,185,497 UART: [fht] FMC Alias Private Key: 7
26,459,025 UART: [art] Extend RT PCRs Done
26,460,250 UART: [art] Lock RT PCRs Done
26,462,096 UART: [art] Populate DV Done
26,467,510 UART: [fht] FMC Alias Private Key: 7
26,469,106 UART: [art] Derive CDI
26,469,940 UART: [art] Store in in slot 0x4
26,529,927 UART: [art] Derive Key Pair
26,530,927 UART: [art] Store priv key in slot 0x5
29,824,030 UART: [art] Derive Key Pair - Done
29,837,195 UART: [art] Signing Cert with AUTHO
29,838,503 UART: RITY.KEYID = 7
32,125,775 UART: [art] Erasing AUTHORITY.KEYID = 7
32,127,293 UART: [art] PUB.X = 9353F331558FA8B1CAC04C382E6007820471CC758F26142480475F50B84048CA90A4E3CBADC78CDFBD31C1C969C25325
32,134,548 UART: [art] PUB.Y = 294E026B2DA0630DD44AE485A87BCF76044E73E446A13113B3CD2224AB8FF461A9ACABDC3D4CE88FBDE73C174E256431
32,141,799 UART: [art] SIG.R = 026EDA92649A71583D12362B35495305E7BC4EE3ED64608FF40BDE8CD1A971359882707805E980BF2F126767D3DAC9A9
32,149,151 UART: [art] SIG.S = C2D1D8498757B365333884E83A3E716C7EF87EA487FB5453CA35D676B455E867133E6C9D8C5979918302D16062BACDA1
33,453,903 UART: Caliptra RT
33,454,606 UART: [state] CFI Enabled
33,616,992 UART: [rt] RT listening for mailbox commands...
42,663,829 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
6,282 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
192,381 UART:
192,782 UART: Running Caliptra ROM ...
193,977 UART:
603,387 UART: [state] CFI Enabled
619,231 UART: [state] LifecycleState = Unprovisioned
621,595 UART: [state] DebugLocked = No
623,940 UART: [state] WD Timer not started. Device not locked for debugging
627,987 UART: [kat] SHA2-256
809,968 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,480 UART: [kat] ++
822,059 UART: [kat] sha1
831,540 UART: [kat] SHA2-256
834,537 UART: [kat] SHA2-384
840,891 UART: [kat] SHA2-512-ACC
843,535 UART: [kat] ECC-384
4,098,385 UART: [kat] HMAC-384Kdf
4,109,597 UART: [kat] LMS
5,182,755 UART: [kat] --
5,186,826 UART: [cold-reset] ++
5,188,923 UART: [fht] FHT @ 0x50003400
5,199,519 UART: [idev] ++
5,200,188 UART: [idev] CDI.KEYID = 6
5,201,417 UART: [idev] SUBJECT.KEYID = 7
5,202,837 UART: [idev] UDS.KEYID = 0
5,219,075 UART: [idev] Erasing UDS.KEYID = 0
8,494,729 UART: [idev] Sha1 KeyId Algorithm
8,515,848 UART: [idev] --
8,519,085 UART: [ldev] ++
8,519,693 UART: [ldev] CDI.KEYID = 6
8,520,877 UART: [ldev] SUBJECT.KEYID = 5
8,522,359 UART: [ldev] AUTHORITY.KEYID = 7
8,523,911 UART: [ldev] FE.KEYID = 1
8,533,848 UART: [ldev] Erasing FE.KEYID = 1
11,827,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,138,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,154,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,170,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,192,516 UART: [ldev] --
14,196,263 UART: [fwproc] Wait for Commands...
14,198,374 UART: [fwproc] Recv command 0x46574c44
14,200,687 UART: [fwproc] Recv'd Img size: 113844 bytes
18,259,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,332,634 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,401,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,718,208 >>> mbox cmd response: success
18,723,201 UART: [afmc] ++
18,723,783 UART: [afmc] CDI.KEYID = 6
18,724,960 UART: [afmc] SUBJECT.KEYID = 7
18,726,111 UART: [afmc] AUTHORITY.KEYID = 5
22,044,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,338,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,341,192 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,357,335 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,373,418 UART: [afmc] SIG.R = 2BC0A4079B256C43C78038D6429B9EC3F835EA2796617B4878B206A1DCF93C4E9CB7879EA55E6B068D4619C6B9A40D86
24,389,417 UART: [afmc] SIG.S = 20A1D422A7447D4990BA011C1CB2116DE1DDF6206683EAE73EC0A96DC643D79B153E01FF24FB1A8A75FDE39BD8AE31C5
24,412,358 UART: [afmc] --
24,418,781 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,561,871 UART: [cold-reset] --
24,562,726 UART: [state] Locking Datavault
24,563,794 UART: [state] Locking PCR0, PCR1 and PCR31
24,565,324 UART: [state] Locking ICCM
24,566,193 UART: [exit] Launching FMC @ 0x40000130
24,567,525 UART:
24,567,665 UART: Running Caliptra FMC ...
24,568,757 UART:
24,568,903 UART: [state] CFI Enabled
24,569,725 UART: [fht] FMC Alias Private Key: 7
26,781,643 UART: [art] Extend RT PCRs Done
26,782,860 UART: [art] Lock RT PCRs Done
26,784,507 UART: [art] Populate DV Done
26,789,803 UART: [fht] FMC Alias Private Key: 7
26,791,440 UART: [art] Derive CDI
26,792,269 UART: [art] Store in in slot 0x4
26,834,907 UART: [art] Derive Key Pair
26,835,893 UART: [art] Store priv key in slot 0x5
30,077,570 UART: [art] Derive Key Pair - Done
30,090,636 UART: [art] Signing Cert with AUTHO
30,091,943 UART: RITY.KEYID = 7
32,371,584 UART: [art] Erasing AUTHORITY.KEYID = 7
32,373,091 UART: [art] PUB.X = 017A42C65F01CA55F032B9EF0686D70EC03E8DC14269A1E3FFE6FE5E76885AAB55D1B36577A8E2FE552AD9E877F357EE
32,380,356 UART: [art] PUB.Y = 6DBB607FC24D73FED4E096680E841A67BA56EC8FF8AD6DB300A576FD480B53C585E867B361A09C37C332E29AB50620E5
32,387,641 UART: [art] SIG.R = 8412B6591340B57D2B2F895C71CE6F8C0086D260B903F4C8ECB6E71778CA73B66ACB725947852F70A31F119A86A16DE3
32,394,970 UART: [art] SIG.S = 4FE4A22C545130D653CFC92D8D0A720FF0449455CA665BF04CB2C089CC035549B7B25C7A7F8F1B03F160B8C397370F02
33,699,826 UART: Caliptra RT
33,700,534 UART: [state] CFI Enabled
33,817,102 UART: [rt] RT listening for mailbox commands...
33,820,051 UART:
33,820,298 UART: Running Caliptra ROM ...
33,821,412 UART:
33,821,672 UART: [state] CFI Enabled
33,834,198 UART: [state] LifecycleState = Unprovisioned
33,836,085 UART: [state] DebugLocked = No
33,837,462 UART: [state] WD Timer not started. Device not locked for debugging
33,842,547 UART: [kat] SHA2-256
34,024,510 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
34,036,089 UART: [kat] ++
34,036,635 UART: [kat] sha1
34,045,744 UART: [kat] SHA2-256
34,048,797 UART: [kat] SHA2-384
34,054,085 UART: [kat] SHA2-512-ACC
34,056,706 UART: [kat] ECC-384
37,311,775 UART: [kat] HMAC-384Kdf
37,323,727 UART: [kat] LMS
38,396,857 UART: [kat] --
38,402,016 UART: [update-reset] ++
42,491,399 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,494,612 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89140
42,875,797 >>> mbox cmd response: success
Initializing fuses
739 UART: [
1,203 UART: Running Caliptra ROM ...
2,304 UART:
412,153 UART: [state] CFI Enabled
423,493 UART: [state] LifecycleState = Unprovisioned
425,318 UART: [state] DebugLocked = No
427,221 UART: [state] WD Timer not started. Device not locked for debugging
431,008 UART: [kat] SHA2-256
613,004 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
624,527 UART: [kat] ++
625,109 UART: [kat] sha1
635,520 UART: [kat] SHA2-256
638,513 UART: [kat] SHA2-384
644,648 UART: [kat] SHA2-512-ACC
647,304 UART: [kat] ECC-384
3,901,473 UART: [kat] HMAC-384Kdf
3,913,270 UART: [kat] LMS
4,986,449 UART: [kat] --
4,988,448 UART: [warm-reset] ++
4,990,700 UART: [warm-reset] Prev Update Reset failed
4,994,214 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
7,369 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,526,740 >>> mbox cmd response: success
24,152,615 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,295,778 UART:
24,296,157 UART: Running Caliptra FMC ...
24,297,264 UART:
24,297,407 UART: [state] CFI Enabled
24,298,371 UART: [fht] FMC Alias Private Key: 7
26,504,947 UART: [art] Extend RT PCRs Done
26,506,172 UART: [art] Lock RT PCRs Done
26,507,657 UART: [art] Populate DV Done
26,513,175 UART: [fht] FMC Alias Private Key: 7
26,514,710 UART: [art] Derive CDI
26,515,520 UART: [art] Store in in slot 0x4
26,558,320 UART: [art] Derive Key Pair
26,559,314 UART: [art] Store priv key in slot 0x5
29,801,182 UART: [art] Derive Key Pair - Done
29,814,247 UART: [art] Signing Cert with AUTHO
29,815,550 UART: RITY.KEYID = 7
32,094,940 UART: [art] Erasing AUTHORITY.KEYID = 7
32,096,457 UART: [art] PUB.X = 75D7462449C6D300BB3CB4C64629C73BBD9A01FF09BE7CC5832FAE2C0DE1DF23AABE7484A1A19121AC0C8AB0CD34544F
32,103,763 UART: [art] PUB.Y = F99C584468F3EB43648CE1F2AC3BEE54ED30F260A65D1363F078147AE6CFB2BC292D625108FCE1CDB1D63BC4D067AB7D
32,111,022 UART: [art] SIG.R = 2F62B23C633632F2806A54CD3BF1486D5F9875F52AF7C439A10577EEE147B011D54F318CFE7D8FC08F9498AC2A25BAD4
32,118,428 UART: [art] SIG.S = 74E09ABB9791C5F871BD0A9201457D1573FECB39526339592C0CDAAF7087FBD20D966A5A266C438FF3AB3CE934C77C2F
33,423,536 UART: Caliptra RT
33,424,239 UART: [state] CFI Enabled
33,541,044 UART: [rt] RT listening for mailbox commands...
42,501,010 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,143 UART:
192,542 UART: Running Caliptra ROM ...
193,654 UART:
193,798 UART: [state] CFI Enabled
262,507 UART: [state] LifecycleState = Unprovisioned
264,386 UART: [state] DebugLocked = No
265,629 UART: [state] WD Timer not started. Device not locked for debugging
269,302 UART: [kat] SHA2-256
448,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,003 UART: [kat] ++
460,455 UART: [kat] sha1
470,301 UART: [kat] SHA2-256
473,371 UART: [kat] SHA2-384
479,618 UART: [kat] SHA2-512-ACC
482,608 UART: [kat] ECC-384
2,947,129 UART: [kat] HMAC-384Kdf
2,970,863 UART: [kat] LMS
3,500,290 UART: [kat] --
3,507,413 UART: [cold-reset] ++
3,508,369 UART: [fht] FHT @ 0x50003400
3,520,018 UART: [idev] ++
3,520,589 UART: [idev] CDI.KEYID = 6
3,521,517 UART: [idev] SUBJECT.KEYID = 7
3,522,679 UART: [idev] UDS.KEYID = 0
3,543,682 UART: [idev] Erasing UDS.KEYID = 0
6,026,961 UART: [idev] Sha1 KeyId Algorithm
6,049,329 UART: [idev] --
6,052,464 UART: [ldev] ++
6,053,038 UART: [ldev] CDI.KEYID = 6
6,053,929 UART: [ldev] SUBJECT.KEYID = 5
6,055,086 UART: [ldev] AUTHORITY.KEYID = 7
6,056,380 UART: [ldev] FE.KEYID = 1
6,099,092 UART: [ldev] Erasing FE.KEYID = 1
8,601,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,249 UART: [ldev] --
10,391,539 UART: [fwproc] Wait for Commands...
10,394,615 UART: [fwproc] Recv command 0x46574c44
10,396,715 UART: [fwproc] Recv'd Img size: 114168 bytes
13,800,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,942,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,259,782 >>> mbox cmd response: success
14,264,526 UART: [afmc] ++
14,265,121 UART: [afmc] CDI.KEYID = 6
14,266,032 UART: [afmc] SUBJECT.KEYID = 7
14,267,133 UART: [afmc] AUTHORITY.KEYID = 5
16,807,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,740 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,304 UART: [afmc] --
18,607,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,751,106 UART: [cold-reset] --
18,751,964 UART: [state] Locking Datavault
18,753,034 UART: [state] Locking PCR0, PCR1 and PCR31
18,754,579 UART: [state] Locking ICCM
18,755,461 UART: [exit] Launching FMC @ 0x40000130
18,756,804 UART:
18,756,949 UART: Running Caliptra FMC ...
18,758,045 UART:
18,758,201 UART: [state] CFI Enabled
18,759,031 UART: [fht] FMC Alias Private Key: 7
20,455,372 UART: [art] Extend RT PCRs Done
20,456,596 UART: [art] Lock RT PCRs Done
20,458,203 UART: [art] Populate DV Done
20,463,452 UART: [fht] FMC Alias Private Key: 7
20,464,989 UART: [art] Derive CDI
20,465,750 UART: [art] Store in in slot 0x4
20,523,631 UART: [art] Derive Key Pair
20,524,675 UART: [art] Store priv key in slot 0x5
22,987,792 UART: [art] Derive Key Pair - Done
23,001,271 UART: [art] Signing Cert with AUTHO
23,002,585 UART: RITY.KEYID = 7
24,713,394 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,897 UART: [art] PUB.X = 183B43F1373AE3B43992C5A5329EBF5142874A5C1736F8CE0C6721A45129BD449AD805B8C6A78D9C8C3A9686F2427A96
24,722,143 UART: [art] PUB.Y = FAB67FAB47E436CBE50B0E359156E6914F5EE08FC2C38011AB76147D39F8F4E531BC4AF41963B837B9A1377FFDD19EA3
24,729,423 UART: [art] SIG.R = 29F41F8ED44F4FEBDB192E5FBB46F64FDA25123E8BE35E80B2C6568606283ADBE681D8DBDB07541E4D9389B4B7122B92
24,736,849 UART: [art] SIG.S = 32CABD6DF759AD5D06565EF691376212A88C3303912A262F1E08C8BB3E121DE695DEEF80BB7ABB5F1F6D5B155EE0830F
25,715,853 UART: Caliptra RT
25,716,553 UART: [state] CFI Enabled
25,881,426 UART: [rt] RT listening for mailbox commands...
25,884,270 UART:
25,884,520 UART: Running Caliptra ROM ...
25,885,620 UART:
25,885,776 UART: [state] CFI Enabled
25,946,425 UART: [state] LifecycleState = Unprovisioned
25,948,289 UART: [state] DebugLocked = No
25,950,484 UART: [state] WD Timer not started. Device not locked for debugging
25,954,656 UART: [kat] SHA2-256
26,133,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,145,327 UART: [kat] ++
26,145,865 UART: [kat] sha1
26,156,757 UART: [kat] SHA2-256
26,159,763 UART: [kat] SHA2-384
26,166,796 UART: [kat] SHA2-512-ACC
26,169,741 UART: [kat] ECC-384
28,630,720 UART: [kat] HMAC-384Kdf
28,655,996 UART: [kat] LMS
29,185,451 UART: [kat] --
29,189,880 UART: [update-reset] ++
32,615,864 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,619,942 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
33,002,246 >>> mbox cmd response: success
Initializing fuses
725 UART: [
1,196 UART: Running Caliptra ROM ...
2,241 UART:
2,387 UART: [state] CFI Enabled
72,559 UART: [state] LifecycleState = Unprovisioned
74,478 UART: [state] DebugLocked = No
76,584 UART: [state] WD Timer not started. Device not locked for debugging
79,789 UART: [kat] SHA2-256
258,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
270,497 UART: [kat] ++
271,024 UART: [kat] sha1
281,153 UART: [kat] SHA2-256
284,158 UART: [kat] SHA2-384
289,858 UART: [kat] SHA2-512-ACC
292,782 UART: [kat] ECC-384
2,756,252 UART: [kat] HMAC-384Kdf
2,778,063 UART: [kat] LMS
3,307,555 UART: [kat] --
3,312,038 UART: [warm-reset] ++
3,314,998 UART: [warm-reset] Prev Update Reset failed
3,318,850 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
5,473 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,069,683 >>> mbox cmd response: success
18,371,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,515,799 UART:
18,516,176 UART: Running Caliptra FMC ...
18,517,382 UART:
18,517,552 UART: [state] CFI Enabled
18,518,515 UART: [fht] FMC Alias Private Key: 7
20,218,023 UART: [art] Extend RT PCRs Done
20,219,248 UART: [art] Lock RT PCRs Done
20,220,823 UART: [art] Populate DV Done
20,226,286 UART: [fht] FMC Alias Private Key: 7
20,227,991 UART: [art] Derive CDI
20,228,829 UART: [art] Store in in slot 0x4
20,287,312 UART: [art] Derive Key Pair
20,288,347 UART: [art] Store priv key in slot 0x5
22,751,399 UART: [art] Derive Key Pair - Done
22,764,461 UART: [art] Signing Cert with AUTHO
22,765,773 UART: RITY.KEYID = 7
24,476,774 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,283 UART: [art] PUB.X = 34F3800DC9CBAA01FF3C10A6A1424AD9C8357DA072EEB62A52EE73A7651069833DD75C3537D6A65A471A71ECCF679F53
24,485,525 UART: [art] PUB.Y = F92B85F839683A777CAD75E3632AC7F65B1E0B2B9DDA07709FA3B05A0DD2CB6CBDE86771D40BFD70CA581FC6782F8C68
24,492,845 UART: [art] SIG.R = 2C69B9340C3FEA10B56CCFF4D1C5DFDD77294B933548EB307725B8B7E85F58A6537E28602DE59E04847EC75B210A6345
24,500,236 UART: [art] SIG.S = 5DB044E8BEA74F2EF8A90CDC860D82BBDAB6C8658CF678C37C463E5D37D0858711FD949E5CC463592445DF70B191A3E0
25,478,348 UART: Caliptra RT
25,479,052 UART: [state] CFI Enabled
25,645,361 UART: [rt] RT listening for mailbox commands...
32,639,450 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
6,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,545 UART:
192,950 UART: Running Caliptra ROM ...
194,142 UART:
603,736 UART: [state] CFI Enabled
613,158 UART: [state] LifecycleState = Unprovisioned
614,998 UART: [state] DebugLocked = No
616,863 UART: [state] WD Timer not started. Device not locked for debugging
620,046 UART: [kat] SHA2-256
799,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,720 UART: [kat] ++
811,223 UART: [kat] sha1
822,262 UART: [kat] SHA2-256
825,291 UART: [kat] SHA2-384
830,575 UART: [kat] SHA2-512-ACC
833,559 UART: [kat] ECC-384
3,275,231 UART: [kat] HMAC-384Kdf
3,287,235 UART: [kat] LMS
3,816,682 UART: [kat] --
3,820,722 UART: [cold-reset] ++
3,822,055 UART: [fht] FHT @ 0x50003400
3,832,926 UART: [idev] ++
3,833,488 UART: [idev] CDI.KEYID = 6
3,834,398 UART: [idev] SUBJECT.KEYID = 7
3,835,611 UART: [idev] UDS.KEYID = 0
3,852,122 UART: [idev] Erasing UDS.KEYID = 0
6,307,746 UART: [idev] Sha1 KeyId Algorithm
6,330,006 UART: [idev] --
6,332,274 UART: [ldev] ++
6,332,860 UART: [ldev] CDI.KEYID = 6
6,333,767 UART: [ldev] SUBJECT.KEYID = 5
6,334,867 UART: [ldev] AUTHORITY.KEYID = 7
6,336,204 UART: [ldev] FE.KEYID = 1
6,345,390 UART: [ldev] Erasing FE.KEYID = 1
8,820,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,536,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,552,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,604,823 UART: [ldev] --
10,609,350 UART: [fwproc] Wait for Commands...
10,611,353 UART: [fwproc] Recv command 0x46574c44
10,613,449 UART: [fwproc] Recv'd Img size: 114168 bytes
14,012,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,083,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,151,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,470,079 >>> mbox cmd response: success
14,474,590 UART: [afmc] ++
14,475,181 UART: [afmc] CDI.KEYID = 6
14,476,064 UART: [afmc] SUBJECT.KEYID = 7
14,477,170 UART: [afmc] AUTHORITY.KEYID = 5
16,982,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,574 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,752,227 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,288 UART: [afmc] --
18,779,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,923,574 UART: [cold-reset] --
18,924,447 UART: [state] Locking Datavault
18,925,631 UART: [state] Locking PCR0, PCR1 and PCR31
18,927,168 UART: [state] Locking ICCM
18,928,075 UART: [exit] Launching FMC @ 0x40000130
18,929,499 UART:
18,929,657 UART: Running Caliptra FMC ...
18,930,754 UART:
18,930,905 UART: [state] CFI Enabled
18,931,767 UART: [fht] FMC Alias Private Key: 7
20,563,833 UART: [art] Extend RT PCRs Done
20,565,045 UART: [art] Lock RT PCRs Done
20,566,806 UART: [art] Populate DV Done
20,572,162 UART: [fht] FMC Alias Private Key: 7
20,573,649 UART: [art] Derive CDI
20,574,382 UART: [art] Store in in slot 0x4
20,617,293 UART: [art] Derive Key Pair
20,618,326 UART: [art] Store priv key in slot 0x5
23,045,152 UART: [art] Derive Key Pair - Done
23,058,367 UART: [art] Signing Cert with AUTHO
23,059,670 UART: RITY.KEYID = 7
24,764,677 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,183 UART: [art] PUB.X = 8DE25D6FF45CFF920FA28F459AAA4FEA4286B1F19027550C7CB16BE083DB8432E0A08914180A3EFBF88FE4AFE11384E7
24,773,434 UART: [art] PUB.Y = A626767BAC64DDD94666C65D0B82A18E2AE09653B5865D14437638D8631A673AF94E4EC07EA0A5B329F626CF5915BAAF
24,780,724 UART: [art] SIG.R = D8A6AF3478F33296BE791A25F67CBED73A7F7FCC0FFF9EF7723CD1EBE81AE3DE5EA8E27EDA115E310CEC12FD204B44D4
24,788,182 UART: [art] SIG.S = 25E1C11539755568FF1B3EDE6CFA6795E14B5BC6E9A0B3F52A2BA10003DC4D71A410F10B53748AE1137B3D528655FB0A
25,767,131 UART: Caliptra RT
25,767,843 UART: [state] CFI Enabled
25,884,265 UART: [rt] RT listening for mailbox commands...
25,887,383 UART:
25,887,550 UART: Running Caliptra ROM ...
25,888,593 UART:
25,888,958 UART: [state] CFI Enabled
25,902,521 UART: [state] LifecycleState = Unprovisioned
25,904,371 UART: [state] DebugLocked = No
25,906,047 UART: [state] WD Timer not started. Device not locked for debugging
25,909,722 UART: [kat] SHA2-256
26,088,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,100,449 UART: [kat] ++
26,100,902 UART: [kat] sha1
26,112,323 UART: [kat] SHA2-256
26,115,341 UART: [kat] SHA2-384
26,122,185 UART: [kat] SHA2-512-ACC
26,125,115 UART: [kat] ECC-384
28,566,377 UART: [kat] HMAC-384Kdf
28,579,417 UART: [kat] LMS
29,108,934 UART: [kat] --
29,115,455 UART: [update-reset] ++
32,542,170 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,545,920 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
32,928,203 >>> mbox cmd response: success
Initializing fuses
814 UART: [
1,307 UART: Running Caliptra ROM ...
2,413 UART:
7,649,830 UART: [state] CFI Enabled
7,664,195 UART: [state] LifecycleState = Unprovisioned
7,666,045 UART: [state] DebugLocked = No
7,668,187 UART: [state] WD Timer not started. Device not locked for debugging
7,672,611 UART: [kat] SHA2-256
7,851,696 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,863,282 UART: [kat] ++
7,863,826 UART: [kat] sha1
7,874,822 UART: [kat] SHA2-256
7,877,881 UART: [kat] SHA2-384
7,884,398 UART: [kat] SHA2-512-ACC
7,887,356 UART: [kat] ECC-384
10,328,031 UART: [kat] HMAC-384Kdf
10,340,137 UART: [kat] LMS
10,869,697 UART: [kat] --
10,876,115 UART: [warm-reset] ++
10,879,226 UART: [warm-reset] Prev Update Reset failed
10,884,211 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,475 writing to cptra_bootfsm_go
7,748 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,372 >>> mbox cmd response: success
18,504,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,648,451 UART:
18,648,835 UART: Running Caliptra FMC ...
18,650,040 UART:
18,650,212 UART: [state] CFI Enabled
18,651,175 UART: [fht] FMC Alias Private Key: 7
20,286,700 UART: [art] Extend RT PCRs Done
20,287,935 UART: [art] Lock RT PCRs Done
20,289,349 UART: [art] Populate DV Done
20,294,813 UART: [fht] FMC Alias Private Key: 7
20,296,455 UART: [art] Derive CDI
20,297,191 UART: [art] Store in in slot 0x4
20,340,014 UART: [art] Derive Key Pair
20,341,062 UART: [art] Store priv key in slot 0x5
22,767,968 UART: [art] Derive Key Pair - Done
22,781,025 UART: [art] Signing Cert with AUTHO
22,782,333 UART: RITY.KEYID = 7
24,487,404 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,906 UART: [art] PUB.X = E2917DEAFE40613EBE1840EFD85991A2C70821224ABCA7A5EF4CC2CC049A77C6B2D481AD9E6F4A89001B504083A0C669
24,496,181 UART: [art] PUB.Y = 8A50A3FF183B890374D16E2FAC67B47A86F40419A30930DFC9B9063F6CBAF2D8469DCA106D4B7975B13F81A461962311
24,503,414 UART: [art] SIG.R = 4AC78C4ECB9BA9077A81266A742450EB8B973942908A3DAC051956E8334B28DA3289CD49ED18EDE0405EB4E09A3A0BBE
24,510,824 UART: [art] SIG.S = C1F1C23E04DF3421D703A21B4DBEC0F4996891B057B3F19261BC50DA5A9FB57B2DDDB9FE7B279745BA03147473B59C71
25,489,820 UART: Caliptra RT
25,490,528 UART: [state] CFI Enabled
25,608,360 UART: [rt] RT listening for mailbox commands...
32,507,451 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
5,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,161 UART:
192,564 UART: Running Caliptra ROM ...
193,670 UART:
193,816 UART: [state] CFI Enabled
263,122 UART: [state] LifecycleState = Unprovisioned
264,991 UART: [state] DebugLocked = No
266,778 UART: [state] WD Timer not started. Device not locked for debugging
270,225 UART: [kat] SHA2-256
449,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,916 UART: [kat] ++
461,366 UART: [kat] sha1
473,446 UART: [kat] SHA2-256
476,469 UART: [kat] SHA2-384
482,394 UART: [kat] SHA2-512-ACC
485,330 UART: [kat] ECC-384
2,947,885 UART: [kat] HMAC-384Kdf
2,971,091 UART: [kat] LMS
3,500,504 UART: [kat] --
3,505,037 UART: [cold-reset] ++
3,507,564 UART: [fht] FHT @ 0x50003400
3,518,501 UART: [idev] ++
3,519,069 UART: [idev] CDI.KEYID = 6
3,519,981 UART: [idev] SUBJECT.KEYID = 7
3,521,196 UART: [idev] UDS.KEYID = 0
3,542,577 UART: [idev] Erasing UDS.KEYID = 0
6,026,510 UART: [idev] Sha1 KeyId Algorithm
6,050,223 UART: [idev] --
6,053,839 UART: [ldev] ++
6,054,421 UART: [ldev] CDI.KEYID = 6
6,055,328 UART: [ldev] SUBJECT.KEYID = 5
6,056,492 UART: [ldev] AUTHORITY.KEYID = 7
6,057,784 UART: [ldev] FE.KEYID = 1
6,099,700 UART: [ldev] Erasing FE.KEYID = 1
8,606,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,823 UART: [ldev] --
10,412,309 UART: [fwproc] Wait for Commands...
10,414,730 UART: [fwproc] Recv command 0x46574c44
10,416,826 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,285,398 >>> mbox cmd response: success
14,289,677 UART: [afmc] ++
14,290,265 UART: [afmc] CDI.KEYID = 6
14,291,147 UART: [afmc] SUBJECT.KEYID = 7
14,292,359 UART: [afmc] AUTHORITY.KEYID = 5
16,822,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,835 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,604 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,627 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,483 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,530 UART: [afmc] --
18,627,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,771,588 UART: [cold-reset] --
18,772,464 UART: [state] Locking Datavault
18,773,626 UART: [state] Locking PCR0, PCR1 and PCR31
18,775,172 UART: [state] Locking ICCM
18,776,080 UART: [exit] Launching FMC @ 0x40000130
18,777,507 UART:
18,777,666 UART: Running Caliptra FMC ...
18,778,773 UART:
18,778,927 UART: [state] CFI Enabled
18,779,763 UART: [fht] FMC Alias Private Key: 7
20,472,646 UART: [art] Extend RT PCRs Done
20,473,855 UART: [art] Lock RT PCRs Done
20,475,537 UART: [art] Populate DV Done
20,481,065 UART: [fht] FMC Alias Private Key: 7
20,482,763 UART: [art] Derive CDI
20,483,501 UART: [art] Store in in slot 0x4
20,541,162 UART: [art] Derive Key Pair
20,542,221 UART: [art] Store priv key in slot 0x5
23,005,324 UART: [art] Derive Key Pair - Done
23,018,335 UART: [art] Signing Cert with AUTHO
23,019,646 UART: RITY.KEYID = 7
24,730,249 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,731 UART: [art] PUB.X = 30FC6AD28B6A5A8B64829BE50F2FBB01426BC8237D951F62C5908140F1C36F890D19D3AE4B53509711B92A2185BF93A5
24,739,025 UART: [art] PUB.Y = 9B36904F6160FAC860BE32656949BD2276DE7B0AFA4DE378B5E015C3DE5A72C634EA6AF3F0259A444A1EF16FA158E0A2
24,746,313 UART: [art] SIG.R = 573B7AF1F220DB70A724713626B2F391055597503B0BFCA2317BA7B87B6B417C72E170842566F5AB7D7EA41F4B2C87F9
24,753,716 UART: [art] SIG.S = 5DF97C76F393EE22875EA079771378664C05A66CE6FD193EC64EEA4FB557014177DFEAD3FB7E495EE3256658BF4AA7BF
25,732,183 UART: Caliptra RT
25,732,899 UART: [state] CFI Enabled
25,897,876 UART: [rt] RT listening for mailbox commands...
25,900,726 UART:
25,900,893 UART: Running Caliptra ROM ...
25,901,999 UART:
25,902,154 UART: [state] CFI Enabled
25,963,422 UART: [state] LifecycleState = Unprovisioned
25,965,346 UART: [state] DebugLocked = No
25,968,025 UART: [state] WD Timer not started. Device not locked for debugging
25,971,130 UART: [kat] SHA2-256
26,150,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,161,802 UART: [kat] ++
26,162,341 UART: [kat] sha1
26,174,637 UART: [kat] SHA2-256
26,177,640 UART: [kat] SHA2-384
26,183,359 UART: [kat] SHA2-512-ACC
26,186,300 UART: [kat] ECC-384
28,646,883 UART: [kat] HMAC-384Kdf
28,670,343 UART: [kat] LMS
29,199,801 UART: [kat] --
29,204,023 UART: [update-reset] ++
32,638,629 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,641,588 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
33,023,962 >>> mbox cmd response: success
Initializing fuses
810 UART: [
1,304 UART: Running Caliptra ROM ...
2,420 UART:
2,567 UART: [state] CFI Enabled
59,742 UART: [state] LifecycleState = Unprovisioned
61,666 UART: [state] DebugLocked = No
63,554 UART: [state] WD Timer not started. Device not locked for debugging
67,285 UART: [kat] SHA2-256
246,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
257,990 UART: [kat] ++
258,438 UART: [kat] sha1
269,048 UART: [kat] SHA2-256
272,061 UART: [kat] SHA2-384
278,064 UART: [kat] SHA2-512-ACC
281,001 UART: [kat] ECC-384
2,744,296 UART: [kat] HMAC-384Kdf
2,768,353 UART: [kat] LMS
3,297,801 UART: [kat] --
3,301,255 UART: [warm-reset] ++
3,305,397 UART: [warm-reset] Prev Update Reset failed
3,309,948 UART: ROM Fatal Error: 0x01040011test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
5,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,045,209 >>> mbox cmd response: success
18,330,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,474,645 UART:
18,475,035 UART: Running Caliptra FMC ...
18,476,152 UART:
18,476,309 UART: [state] CFI Enabled
18,477,280 UART: [fht] FMC Alias Private Key: 7
20,174,628 UART: [art] Extend RT PCRs Done
20,175,843 UART: [art] Lock RT PCRs Done
20,177,546 UART: [art] Populate DV Done
20,182,849 UART: [fht] FMC Alias Private Key: 7
20,184,497 UART: [art] Derive CDI
20,185,233 UART: [art] Store in in slot 0x4
20,243,123 UART: [art] Derive Key Pair
20,244,184 UART: [art] Store priv key in slot 0x5
22,706,780 UART: [art] Derive Key Pair - Done
22,719,512 UART: [art] Signing Cert with AUTHO
22,720,823 UART: RITY.KEYID = 7
24,432,872 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,376 UART: [art] PUB.X = 067E32F57F0548E63E76279773BF1CAE25F3C48126C1CD52D7226D9BFE305F3DC5EFAB26A3BA80187472F7143F998994
24,441,628 UART: [art] PUB.Y = C53E03988AE54D38FDF170B25F2D01615733C11A6E1B48D8CFEA3A3747B7E235F4D6D1B73ACA55B0709B52636AA704E0
24,448,886 UART: [art] SIG.R = AFF027D3019899B0FE679BD3BABC40ACF2C809690D10702BBA1AA1EBE53E1D5F3188DFBCB043EFADAB31CFD56DDE41F6
24,456,367 UART: [art] SIG.S = 337E2195C2E70739AB4440C4C3B88915145CFEDFEAFE2CA3EC169A346C8D14D94EFFEAF00EC440558D3B3E18CC8FF6EC
25,434,900 UART: Caliptra RT
25,435,617 UART: [state] CFI Enabled
25,599,742 UART: [rt] RT listening for mailbox commands...
32,601,277 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
6,452 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
192,410 UART:
192,812 UART: Running Caliptra ROM ...
193,934 UART:
603,698 UART: [state] CFI Enabled
614,421 UART: [state] LifecycleState = Unprovisioned
616,255 UART: [state] DebugLocked = No
618,097 UART: [state] WD Timer not started. Device not locked for debugging
622,595 UART: [kat] SHA2-256
801,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,281 UART: [kat] ++
813,731 UART: [kat] sha1
824,280 UART: [kat] SHA2-256
827,285 UART: [kat] SHA2-384
833,096 UART: [kat] SHA2-512-ACC
836,080 UART: [kat] ECC-384
3,276,473 UART: [kat] HMAC-384Kdf
3,290,170 UART: [kat] LMS
3,819,625 UART: [kat] --
3,822,373 UART: [cold-reset] ++
3,823,980 UART: [fht] FHT @ 0x50003400
3,835,118 UART: [idev] ++
3,835,764 UART: [idev] CDI.KEYID = 6
3,836,655 UART: [idev] SUBJECT.KEYID = 7
3,837,831 UART: [idev] UDS.KEYID = 0
3,851,968 UART: [idev] Erasing UDS.KEYID = 0
6,311,775 UART: [idev] Sha1 KeyId Algorithm
6,335,627 UART: [idev] --
6,338,919 UART: [ldev] ++
6,339,489 UART: [ldev] CDI.KEYID = 6
6,340,372 UART: [ldev] SUBJECT.KEYID = 5
6,341,590 UART: [ldev] AUTHORITY.KEYID = 7
6,342,815 UART: [ldev] FE.KEYID = 1
6,353,789 UART: [ldev] Erasing FE.KEYID = 1
8,828,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,029 UART: [ldev] --
10,621,302 UART: [fwproc] Wait for Commands...
10,623,292 UART: [fwproc] Recv command 0x46574c44
10,625,386 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,643 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,479,009 >>> mbox cmd response: success
14,483,205 UART: [afmc] ++
14,483,821 UART: [afmc] CDI.KEYID = 6
14,484,712 UART: [afmc] SUBJECT.KEYID = 7
14,485,872 UART: [afmc] AUTHORITY.KEYID = 5
16,979,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,698,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,700,130 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,715,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,731,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,747,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,770,289 UART: [afmc] --
18,775,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,918,381 UART: [cold-reset] --
18,919,225 UART: [state] Locking Datavault
18,920,298 UART: [state] Locking PCR0, PCR1 and PCR31
18,921,831 UART: [state] Locking ICCM
18,922,736 UART: [exit] Launching FMC @ 0x40000130
18,924,375 UART:
18,924,540 UART: Running Caliptra FMC ...
18,925,640 UART:
18,925,794 UART: [state] CFI Enabled
18,926,654 UART: [fht] FMC Alias Private Key: 7
20,561,275 UART: [art] Extend RT PCRs Done
20,562,498 UART: [art] Lock RT PCRs Done
20,564,123 UART: [art] Populate DV Done
20,569,451 UART: [fht] FMC Alias Private Key: 7
20,570,989 UART: [art] Derive CDI
20,571,799 UART: [art] Store in in slot 0x4
20,614,454 UART: [art] Derive Key Pair
20,615,491 UART: [art] Store priv key in slot 0x5
23,042,386 UART: [art] Derive Key Pair - Done
23,055,017 UART: [art] Signing Cert with AUTHO
23,056,331 UART: RITY.KEYID = 7
24,761,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,763,269 UART: [art] PUB.X = 26E1F5CDDFEB2CF054ADE1D31FE1D27F5C09ECE9763864AD3DF34DA53368807DBC1B2C65A55E9242B3F5AD9811FC49DE
24,770,447 UART: [art] PUB.Y = 12F15611954A80EF1294FE8CA3E8976C704BC25F472CF8A4941EA74E49A059BBCC9D618639B41C2A293372C16E7564A1
24,777,702 UART: [art] SIG.R = F0F0068103EEC8A9347CCEA5749B2672ACDA3EF8BA702229A580B28454D566B2A3A9863849287BC55ABD6C807D543B15
24,785,111 UART: [art] SIG.S = 7895740703AD5F720C3783EE2B4EAFF536B38A3ECBE29EB8DAC70243A34B009B66228FB896773943DC58D410C336928E
25,763,445 UART: Caliptra RT
25,764,156 UART: [state] CFI Enabled
25,881,756 UART: [rt] RT listening for mailbox commands...
25,885,011 UART:
25,885,279 UART: Running Caliptra ROM ...
25,886,391 UART:
25,886,547 UART: [state] CFI Enabled
25,900,700 UART: [state] LifecycleState = Unprovisioned
25,902,533 UART: [state] DebugLocked = No
25,904,482 UART: [state] WD Timer not started. Device not locked for debugging
25,907,567 UART: [kat] SHA2-256
26,086,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,098,309 UART: [kat] ++
26,098,766 UART: [kat] sha1
26,110,354 UART: [kat] SHA2-256
26,113,372 UART: [kat] SHA2-384
26,120,056 UART: [kat] SHA2-512-ACC
26,122,996 UART: [kat] ECC-384
28,567,153 UART: [kat] HMAC-384Kdf
28,579,934 UART: [kat] LMS
29,109,437 UART: [kat] --
29,114,880 UART: [update-reset] ++
32,532,941 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,537,193 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
32,919,507 >>> mbox cmd response: success
Initializing fuses
1,051 UART:
1,311 UART: Running Caliptra ROM ...
2,337 UART:
7,658,481 UART: [state] CFI Enabled
7,671,819 UART: [state] LifecycleState = Unprovisioned
7,673,671 UART: [state] DebugLocked = No
7,675,084 UART: [state] WD Timer not started. Device not locked for debugging
7,678,124 UART: [kat] SHA2-256
7,857,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,868,836 UART: [kat] ++
7,869,292 UART: [kat] sha1
7,880,768 UART: [kat] SHA2-256
7,883,776 UART: [kat] SHA2-384
7,889,757 UART: [kat] SHA2-512-ACC
7,892,754 UART: [kat] ECC-384
10,335,221 UART: [kat] HMAC-384Kdf
10,349,173 UART: [kat] LMS
10,878,669 UART: [kat] --
10,884,920 UART: [warm-reset] ++
10,887,685 UART: [warm-reset] Prev Update Reset failed
10,890,627 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
6,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,009 >>> mbox cmd response: success
18,508,161 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,651,777 UART:
18,652,167 UART: Running Caliptra FMC ...
18,653,375 UART:
18,653,552 UART: [state] CFI Enabled
18,654,512 UART: [fht] FMC Alias Private Key: 7
20,289,102 UART: [art] Extend RT PCRs Done
20,290,333 UART: [art] Lock RT PCRs Done
20,291,846 UART: [art] Populate DV Done
20,297,279 UART: [fht] FMC Alias Private Key: 7
20,298,962 UART: [art] Derive CDI
20,299,785 UART: [art] Store in in slot 0x4
20,342,544 UART: [art] Derive Key Pair
20,343,546 UART: [art] Store priv key in slot 0x5
22,770,517 UART: [art] Derive Key Pair - Done
22,783,582 UART: [art] Signing Cert with AUTHO
22,784,919 UART: RITY.KEYID = 7
24,490,333 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,841 UART: [art] PUB.X = 024E2A6D78B120B73712E6AECC5DF0856D09FA456803E6933CCD83B232A1CD0083B84DCC0ED464AA7BEBDAFC3AC6AA0E
24,499,145 UART: [art] PUB.Y = 887822E691CD8D9327B314F581D751A1E59D17F6EBA7C2C657A2278AEFD792B11E81B09787B1F4DF55EB47B96C0FCEBC
24,506,421 UART: [art] SIG.R = D1DE20BD68313680B4E17F93F7722AB99B8F4C5A64675BC261E51EE971DCC10B51AB2150EA23086D0BF3EA2FD0608868
24,513,812 UART: [art] SIG.S = D9C09BF6971E8B24FFACA7F5209721D395AA62BFCFA2BD400C0B79C31DF408864BFA60F98C2B4B1B6A880CB792D79B9F
25,492,947 UART: Caliptra RT
25,493,650 UART: [state] CFI Enabled
25,611,318 UART: [rt] RT listening for mailbox commands...
32,513,655 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,114 UART: [kat] SHA2-512-ACC
906,015 UART: [kat] ECC-384
915,640 UART: [kat] HMAC-384Kdf
920,074 UART: [kat] LMS
1,168,386 UART: [kat] --
1,169,339 UART: [cold-reset] ++
1,169,831 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,102 UART: [ldev] Erasing FE.KEYID = 1
1,241,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,440 UART: [ldev] --
1,280,880 UART: [fwproc] Wait for Commands...
1,281,575 UART: [fwproc] Recv command 0x46574c44
1,282,308 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,891 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,521 >>> mbox cmd response: success
2,771,718 UART: [afmc] ++
2,771,886 UART: [afmc] CDI.KEYID = 6
2,772,249 UART: [afmc] SUBJECT.KEYID = 7
2,772,675 UART: [afmc] AUTHORITY.KEYID = 5
2,808,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,583 UART: [afmc] --
2,851,581 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,851,603 UART: [cold-reset] --
2,852,609 UART: [state] Locking Datavault
2,853,676 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,280 UART: [state] Locking ICCM
2,854,834 UART: [exit] Launching FMC @ 0x40000130
2,860,163 UART:
2,860,179 UART: Running Caliptra FMC ...
2,860,587 UART:
2,860,641 UART: [state] CFI Enabled
2,871,336 UART: [fht] FMC Alias Private Key: 7
2,979,391 UART: [art] Extend RT PCRs Done
2,979,819 UART: [art] Lock RT PCRs Done
2,981,363 UART: [art] Populate DV Done
2,989,782 UART: [fht] FMC Alias Private Key: 7
2,990,824 UART: [art] Derive CDI
2,991,104 UART: [art] Store in in slot 0x4
3,076,345 UART: [art] Derive Key Pair
3,076,705 UART: [art] Store priv key in slot 0x5
3,089,935 UART: [art] Derive Key Pair - Done
3,104,772 UART: [art] Signing Cert with AUTHO
3,105,252 UART: RITY.KEYID = 7
3,120,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,157 UART: [art] PUB.X = E7DC1B1F06503E8452B80360C846C27F799B2CB4946899D010AE2712C366EAD1174A51A008E2B4CA09729E17DC714480
3,127,911 UART: [art] PUB.Y = 48CB319D8A218A0E57C4B45DDF1AC12BB6AE570AF57C91C3739C18AF75C6F43AE83410EB123D9722E14A5E65BE3D1F41
3,134,869 UART: [art] SIG.R = 15F711797CAC6D5831A03B029C62B15D405BD67B20C3652FCB73BBAE82FC29BC4021190962FD367660F25C8DCE3DC60E
3,141,638 UART: [art] SIG.S = 9BF6B63F12A0BAB0784ACAB41717573F22B5E3F5AF77484A45A81F0477F1EC7ACE29B0D850A0D79382E99DD81F791FE5
3,165,132 UART: Caliptra RT
3,165,385 UART: [state] CFI Enabled
3,273,266 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,134 UART:
3,275,150 UART: Running Caliptra ROM ...
3,275,558 UART:
3,275,613 UART: [state] CFI Enabled
3,278,431 UART: [state] LifecycleState = Unprovisioned
3,279,086 UART: [state] DebugLocked = No
3,279,720 UART: [state] WD Timer not started. Device not locked for debugging
3,280,856 UART: [kat] SHA2-256
4,084,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,535 UART: [kat] ++
4,088,687 UART: [kat] sha1
4,093,127 UART: [kat] SHA2-256
4,095,067 UART: [kat] SHA2-384
4,097,958 UART: [kat] SHA2-512-ACC
4,099,858 UART: [kat] ECC-384
4,110,117 UART: [kat] HMAC-384Kdf
4,114,911 UART: [kat] LMS
4,363,223 UART: [kat] --
4,364,105 UART: [update-reset] ++
5,674,786 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,675,849 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,825,427 >>> mbox cmd response: success
Initializing fuses
5,825,781 UART:
5,825,797 UART: Running Caliptra ROM ...
5,826,205 UART:
5,826,260 UART: [state] CFI Enabled
5,829,392 UART: [state] LifecycleState = Unprovisioned
5,830,047 UART: [state] DebugLocked = No
5,830,695 UART: [state] WD Timer not started. Device not locked for debugging
5,831,924 UART: [kat] SHA2-256
6,635,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,639,603 UART: [kat] ++
6,639,755 UART: [kat] sha1
6,644,087 UART: [kat] SHA2-256
6,646,027 UART: [kat] SHA2-384
6,648,856 UART: [kat] SHA2-512-ACC
6,650,757 UART: [kat] ECC-384
6,660,706 UART: [kat] HMAC-384Kdf
6,665,290 UART: [kat] LMS
6,913,602 UART: [kat] --
6,914,432 UART: [warm-reset] ++
6,915,063 UART: [warm-reset] Prev Update Reset failed
6,916,186 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,503 >>> mbox cmd response: success
2,676,382 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,682,989 UART:
2,683,005 UART: Running Caliptra FMC ...
2,683,413 UART:
2,683,467 UART: [state] CFI Enabled
2,694,230 UART: [fht] FMC Alias Private Key: 7
2,802,165 UART: [art] Extend RT PCRs Done
2,802,593 UART: [art] Lock RT PCRs Done
2,803,995 UART: [art] Populate DV Done
2,812,310 UART: [fht] FMC Alias Private Key: 7
2,813,296 UART: [art] Derive CDI
2,813,576 UART: [art] Store in in slot 0x4
2,898,969 UART: [art] Derive Key Pair
2,899,329 UART: [art] Store priv key in slot 0x5
2,912,203 UART: [art] Derive Key Pair - Done
2,926,905 UART: [art] Signing Cert with AUTHO
2,927,385 UART: RITY.KEYID = 7
2,942,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,496 UART: [art] PUB.X = 73C3FE009B02C324DB5D420D28C5C0E15BD1D97838450F3814100F1E2C655F14A158C2A7EBC572B067ADC4C314FBB559
2,950,238 UART: [art] PUB.Y = 27398F6728C7910940E7FC918236F8DC9F5C0E384B9D1B6C5019F21C3A2A5D3325089AD0C678366968D5485934C029F1
2,957,169 UART: [art] SIG.R = E47DF3955D29D4D9848166B6BBA932C79E93F36889F4F36CE280D46B15634105A99DFA647DB5227CE494413916C85E7F
2,963,934 UART: [art] SIG.S = 443B17AE4AF3F3DEFA145B711268135F4D19E3FE0C77D093365A8D87645E1D55E047435FFE04F5A9F11358597EF7BBE8
2,987,439 UART: Caliptra RT
2,987,692 UART: [state] CFI Enabled
3,095,819 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,529,543 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
891,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
921,119 UART: [kat] LMS
1,169,431 UART: [kat] --
1,170,542 UART: [cold-reset] ++
1,170,924 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,203 UART: [idev] SUBJECT.KEYID = 7
1,174,628 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,460 UART: [idev] Sha1 KeyId Algorithm
1,208,320 UART: [idev] --
1,209,387 UART: [ldev] ++
1,209,555 UART: [ldev] CDI.KEYID = 6
1,209,919 UART: [ldev] SUBJECT.KEYID = 5
1,210,346 UART: [ldev] AUTHORITY.KEYID = 7
1,210,809 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,759 UART: [ldev] --
1,281,025 UART: [fwproc] Wait for Commands...
1,281,658 UART: [fwproc] Recv command 0x46574c44
1,282,391 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,351 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,576 >>> mbox cmd response: success
2,770,693 UART: [afmc] ++
2,770,861 UART: [afmc] CDI.KEYID = 6
2,771,224 UART: [afmc] SUBJECT.KEYID = 7
2,771,650 UART: [afmc] AUTHORITY.KEYID = 5
2,806,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,294 UART: [afmc] --
2,850,306 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,850,328 UART: [cold-reset] --
2,851,260 UART: [state] Locking Datavault
2,852,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,049 UART: [state] Locking ICCM
2,853,477 UART: [exit] Launching FMC @ 0x40000130
2,858,806 UART:
2,858,822 UART: Running Caliptra FMC ...
2,859,230 UART:
2,859,373 UART: [state] CFI Enabled
2,869,862 UART: [fht] FMC Alias Private Key: 7
2,977,533 UART: [art] Extend RT PCRs Done
2,977,961 UART: [art] Lock RT PCRs Done
2,979,547 UART: [art] Populate DV Done
2,987,926 UART: [fht] FMC Alias Private Key: 7
2,988,996 UART: [art] Derive CDI
2,989,276 UART: [art] Store in in slot 0x4
3,074,917 UART: [art] Derive Key Pair
3,075,277 UART: [art] Store priv key in slot 0x5
3,088,121 UART: [art] Derive Key Pair - Done
3,103,006 UART: [art] Signing Cert with AUTHO
3,103,486 UART: RITY.KEYID = 7
3,118,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,313 UART: [art] PUB.X = DDFEE44C31B6FBCD666D0D79ACCE36E510F567156CC9A11CD2FD9DDB850AFD0733EA95F97DA1874CD065089FBDDCD49B
3,126,101 UART: [art] PUB.Y = 1E1CDADA563ABC6FBFC677FDA7A3076CDA40040D0EB6027E50A071DC702401D47B794763EF3E7C1EB5EA8C865E83A7E0
3,133,053 UART: [art] SIG.R = 5AD8780BCF0E8F8E08A225CB998C0C7E655A4BB7240C8D0FAB89B2B2E5CB5BB5F86A6CD151C058109A09304E24B15B8D
3,139,818 UART: [art] SIG.S = 99866A692B941A8AAE8488F189553BB38DDB68C34C7FB042523A4D2ADACCDA7D9A4FC6E639CBBE2667A783ED83AAE11A
3,163,729 UART: Caliptra RT
3,164,074 UART: [state] CFI Enabled
3,272,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,669 UART:
3,274,685 UART: Running Caliptra ROM ...
3,275,093 UART:
3,275,235 UART: [state] CFI Enabled
3,278,031 UART: [state] LifecycleState = Unprovisioned
3,278,686 UART: [state] DebugLocked = No
3,279,232 UART: [state] WD Timer not started. Device not locked for debugging
3,280,552 UART: [kat] SHA2-256
4,084,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,231 UART: [kat] ++
4,088,383 UART: [kat] sha1
4,092,625 UART: [kat] SHA2-256
4,094,565 UART: [kat] SHA2-384
4,097,342 UART: [kat] SHA2-512-ACC
4,099,242 UART: [kat] ECC-384
4,108,879 UART: [kat] HMAC-384Kdf
4,113,423 UART: [kat] LMS
4,361,735 UART: [kat] --
4,362,491 UART: [update-reset] ++
5,672,896 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,674,071 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,823,649 >>> mbox cmd response: success
Initializing fuses
5,823,913 UART:
5,823,929 UART: Running Caliptra ROM ...
5,824,337 UART:
5,824,479 UART: [state] CFI Enabled
5,827,305 UART: [state] LifecycleState = Unprovisioned
5,827,960 UART: [state] DebugLocked = No
5,828,680 UART: [state] WD Timer not started. Device not locked for debugging
5,829,887 UART: [kat] SHA2-256
6,633,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,637,566 UART: [kat] ++
6,637,718 UART: [kat] sha1
6,641,986 UART: [kat] SHA2-256
6,643,926 UART: [kat] SHA2-384
6,646,515 UART: [kat] SHA2-512-ACC
6,648,416 UART: [kat] ECC-384
6,658,405 UART: [kat] HMAC-384Kdf
6,662,919 UART: [kat] LMS
6,911,231 UART: [kat] --
6,912,041 UART: [warm-reset] ++
6,912,550 UART: [warm-reset] Prev Update Reset failed
6,913,611 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,238 >>> mbox cmd response: success
2,678,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,684,320 UART:
2,684,336 UART: Running Caliptra FMC ...
2,684,744 UART:
2,684,887 UART: [state] CFI Enabled
2,695,600 UART: [fht] FMC Alias Private Key: 7
2,804,249 UART: [art] Extend RT PCRs Done
2,804,677 UART: [art] Lock RT PCRs Done
2,806,307 UART: [art] Populate DV Done
2,814,570 UART: [fht] FMC Alias Private Key: 7
2,815,660 UART: [art] Derive CDI
2,815,940 UART: [art] Store in in slot 0x4
2,901,175 UART: [art] Derive Key Pair
2,901,535 UART: [art] Store priv key in slot 0x5
2,914,983 UART: [art] Derive Key Pair - Done
2,929,578 UART: [art] Signing Cert with AUTHO
2,930,058 UART: RITY.KEYID = 7
2,945,666 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,431 UART: [art] PUB.X = 73011D55CDC90E9C665284C303F842A451BD03BC146A063A3B700F58A2997C9627EC0228116E2C2239F973EE2568B0DE
2,953,176 UART: [art] PUB.Y = B06904AFC40CDA90F8D470BEF045577121D2638F4FC1A88625901BDB09679782D814B86D8342771D85EA2C013403434E
2,960,105 UART: [art] SIG.R = CA424F443B195FAC8648D4BAC67B0ADCF5B14F47592C0DA2C6F27C346B44B8E77B24F25301593ABEC4CB94374259B4B6
2,966,878 UART: [art] SIG.S = B10B5C77C47DDBE4020937C4887A87833777AE78FC7A31847BDBCA4DEB62B069BCF875D162F7E82C3611E5312FEB3DD0
2,990,578 UART: Caliptra RT
2,990,923 UART: [state] CFI Enabled
3,098,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,530,746 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,277 UART: [kat] ++
895,429 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,188 UART: [kat] SHA2-512-ACC
906,089 UART: [kat] ECC-384
916,076 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,373 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,533 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,366 UART: [ldev] --
1,280,718 UART: [fwproc] Wait for Commands...
1,281,489 UART: [fwproc] Recv command 0x46574c44
1,282,222 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,743 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,411 >>> mbox cmd response: success
2,771,584 UART: [afmc] ++
2,771,752 UART: [afmc] CDI.KEYID = 6
2,772,115 UART: [afmc] SUBJECT.KEYID = 7
2,772,541 UART: [afmc] AUTHORITY.KEYID = 5
2,808,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,127 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,856 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,281 UART: [afmc] --
2,851,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,851,357 UART: [cold-reset] --
2,852,089 UART: [state] Locking Datavault
2,853,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,772 UART: [state] Locking ICCM
2,854,230 UART: [exit] Launching FMC @ 0x40000130
2,859,559 UART:
2,859,575 UART: Running Caliptra FMC ...
2,859,983 UART:
2,860,037 UART: [state] CFI Enabled
2,870,456 UART: [fht] FMC Alias Private Key: 7
2,978,393 UART: [art] Extend RT PCRs Done
2,978,821 UART: [art] Lock RT PCRs Done
2,980,191 UART: [art] Populate DV Done
2,988,346 UART: [fht] FMC Alias Private Key: 7
2,989,434 UART: [art] Derive CDI
2,989,714 UART: [art] Store in in slot 0x4
3,075,429 UART: [art] Derive Key Pair
3,075,789 UART: [art] Store priv key in slot 0x5
3,088,563 UART: [art] Derive Key Pair - Done
3,103,242 UART: [art] Signing Cert with AUTHO
3,103,722 UART: RITY.KEYID = 7
3,119,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,021 UART: [art] PUB.X = 1896DCA9AC5D40FF10502E2B89F14A01E4BF51CC1FB094069C56EB3B1481159ADF4A510DFC0693208C19C46DCA8119A2
3,126,789 UART: [art] PUB.Y = F893C6661F627B123DAF9133E19A238F4C34381E82DC61D1ECF761F6ABE899F448636011A46D6FC972BAA3D25D844BC8
3,133,745 UART: [art] SIG.R = 0FE89EF3FB460CA57A8D14193DB3CE4053BC0B9B247B92CBD84D0C04196B8BEE82DF178B91BAEBC9EB4460CA17C64962
3,140,520 UART: [art] SIG.S = EE0CFA7DEDD9DA3C6D02CDBA44777CF7E96442EED3A20D952D4CB13F5516A2E7B91D99608E54214198C1BC68F887909A
3,164,256 UART: Caliptra RT
3,164,509 UART: [state] CFI Enabled
3,271,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,273,948 UART:
3,273,964 UART: Running Caliptra ROM ...
3,274,372 UART:
3,274,427 UART: [state] CFI Enabled
3,276,937 UART: [state] LifecycleState = Unprovisioned
3,277,592 UART: [state] DebugLocked = No
3,278,280 UART: [state] WD Timer not started. Device not locked for debugging
3,279,522 UART: [kat] SHA2-256
4,083,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,201 UART: [kat] ++
4,087,353 UART: [kat] sha1
4,091,587 UART: [kat] SHA2-256
4,093,527 UART: [kat] SHA2-384
4,096,384 UART: [kat] SHA2-512-ACC
4,098,284 UART: [kat] ECC-384
4,107,793 UART: [kat] HMAC-384Kdf
4,112,529 UART: [kat] LMS
4,360,841 UART: [kat] --
4,361,761 UART: [update-reset] ++
5,672,836 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,673,995 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,823,573 >>> mbox cmd response: success
Initializing fuses
5,823,875 UART:
5,823,891 UART: Running Caliptra ROM ...
5,824,299 UART:
5,824,354 UART: [state] CFI Enabled
5,827,044 UART: [state] LifecycleState = Unprovisioned
5,827,699 UART: [state] DebugLocked = No
5,828,433 UART: [state] WD Timer not started. Device not locked for debugging
5,829,654 UART: [kat] SHA2-256
6,633,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,637,333 UART: [kat] ++
6,637,485 UART: [kat] sha1
6,641,743 UART: [kat] SHA2-256
6,643,683 UART: [kat] SHA2-384
6,646,372 UART: [kat] SHA2-512-ACC
6,648,273 UART: [kat] ECC-384
6,658,082 UART: [kat] HMAC-384Kdf
6,662,460 UART: [kat] LMS
6,910,772 UART: [kat] --
6,911,470 UART: [warm-reset] ++
6,912,067 UART: [warm-reset] Prev Update Reset failed
6,912,924 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,779 >>> mbox cmd response: success
2,677,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,683,349 UART:
2,683,365 UART: Running Caliptra FMC ...
2,683,773 UART:
2,683,827 UART: [state] CFI Enabled
2,694,120 UART: [fht] FMC Alias Private Key: 7
2,801,903 UART: [art] Extend RT PCRs Done
2,802,331 UART: [art] Lock RT PCRs Done
2,803,559 UART: [art] Populate DV Done
2,811,804 UART: [fht] FMC Alias Private Key: 7
2,812,878 UART: [art] Derive CDI
2,813,158 UART: [art] Store in in slot 0x4
2,898,833 UART: [art] Derive Key Pair
2,899,193 UART: [art] Store priv key in slot 0x5
2,912,715 UART: [art] Derive Key Pair - Done
2,927,323 UART: [art] Signing Cert with AUTHO
2,927,803 UART: RITY.KEYID = 7
2,943,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,862 UART: [art] PUB.X = 77845E085179B38629412A1166312F3BC197B12EE7380DB8B8F63D197A17ABAA90079EDC7258AB40E205B8D62EE2B352
2,950,618 UART: [art] PUB.Y = 223D2D16FE91528EFF1A60D6E65E6617DF04CCD373EC9E29E48D4E9F28B4BBF05067516F43BB5BF403EFCF850BCB6DE4
2,957,579 UART: [art] SIG.R = D60E87B253673E1EE436ED32A6D17D1FFE7FB4595D84F4494449680D0995BFC7C9A1597CB20DA4E195E47A862B71FB0B
2,964,342 UART: [art] SIG.S = EE7DF1E33A3EDD8FF9BC6A575B11C2676601213C2C374E8A4F284A27F264B00019320B4476BF6E90A43116D676F8A136
2,988,033 UART: Caliptra RT
2,988,286 UART: [state] CFI Enabled
3,097,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,529,546 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,747 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,610 UART: [idev] ++
1,173,778 UART: [idev] CDI.KEYID = 6
1,174,139 UART: [idev] SUBJECT.KEYID = 7
1,174,564 UART: [idev] UDS.KEYID = 0
1,182,854 UART: [idev] Erasing UDS.KEYID = 0
1,199,842 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,695 UART: [fwproc] Wait for Commands...
1,283,388 UART: [fwproc] Recv command 0x46574c44
1,284,121 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,858 >>> mbox cmd response: success
2,775,023 UART: [afmc] ++
2,775,191 UART: [afmc] CDI.KEYID = 6
2,775,554 UART: [afmc] SUBJECT.KEYID = 7
2,775,980 UART: [afmc] AUTHORITY.KEYID = 5
2,811,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,354 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,966 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,685 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,562 UART: [afmc] --
2,855,568 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,855,590 UART: [cold-reset] --
2,856,206 UART: [state] Locking Datavault
2,857,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,203 UART: [state] Locking ICCM
2,858,715 UART: [exit] Launching FMC @ 0x40000130
2,864,044 UART:
2,864,060 UART: Running Caliptra FMC ...
2,864,468 UART:
2,864,611 UART: [state] CFI Enabled
2,875,056 UART: [fht] FMC Alias Private Key: 7
2,982,989 UART: [art] Extend RT PCRs Done
2,983,417 UART: [art] Lock RT PCRs Done
2,984,711 UART: [art] Populate DV Done
2,992,830 UART: [fht] FMC Alias Private Key: 7
2,993,926 UART: [art] Derive CDI
2,994,206 UART: [art] Store in in slot 0x4
3,079,865 UART: [art] Derive Key Pair
3,080,225 UART: [art] Store priv key in slot 0x5
3,093,027 UART: [art] Derive Key Pair - Done
3,107,677 UART: [art] Signing Cert with AUTHO
3,108,157 UART: RITY.KEYID = 7
3,123,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,136 UART: [art] PUB.X = E17F1CF9AFDCAB2660096A51FCBFE91254B2FE0667FBB9985E599F827B31023521B1986184E1E473A82D5FAC0EF2254B
3,130,904 UART: [art] PUB.Y = 10D9D84730C94667034C643B7268FEC558E50CDCEEB9284BFE0614FA2739BBAEF98DB1CCEFBFEB6EC8C556A33B0BDBF7
3,137,868 UART: [art] SIG.R = AE92FAD01757B793785E02D9888C41D2822530A411E1AF776B26C9FFEA0579FF91F171534C95E082D1F3B65812D724BA
3,144,632 UART: [art] SIG.S = 281FD6DE3D923794A755C3D1F98019B04B2CE3113F445CD0AAFA08DD578B4EC99BEB246DD64A9F8373FC4742292DDFCC
3,168,374 UART: Caliptra RT
3,168,719 UART: [state] CFI Enabled
3,276,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,736 UART:
3,277,752 UART: Running Caliptra ROM ...
3,278,160 UART:
3,278,302 UART: [state] CFI Enabled
3,281,010 UART: [state] LifecycleState = Unprovisioned
3,281,665 UART: [state] DebugLocked = No
3,282,197 UART: [state] WD Timer not started. Device not locked for debugging
3,283,355 UART: [kat] SHA2-256
4,086,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,034 UART: [kat] ++
4,091,186 UART: [kat] sha1
4,095,532 UART: [kat] SHA2-256
4,097,472 UART: [kat] SHA2-384
4,100,049 UART: [kat] SHA2-512-ACC
4,101,949 UART: [kat] ECC-384
4,112,070 UART: [kat] HMAC-384Kdf
4,116,764 UART: [kat] LMS
4,365,076 UART: [kat] --
4,365,824 UART: [update-reset] ++
5,675,599 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,676,600 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,826,178 >>> mbox cmd response: success
Initializing fuses
5,826,562 UART:
5,826,578 UART: Running Caliptra ROM ...
5,826,986 UART:
5,827,128 UART: [state] CFI Enabled
5,829,720 UART: [state] LifecycleState = Unprovisioned
5,830,375 UART: [state] DebugLocked = No
5,831,007 UART: [state] WD Timer not started. Device not locked for debugging
5,832,120 UART: [kat] SHA2-256
6,635,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,639,799 UART: [kat] ++
6,639,951 UART: [kat] sha1
6,644,105 UART: [kat] SHA2-256
6,646,045 UART: [kat] SHA2-384
6,648,692 UART: [kat] SHA2-512-ACC
6,650,593 UART: [kat] ECC-384
6,660,194 UART: [kat] HMAC-384Kdf
6,664,818 UART: [kat] LMS
6,913,130 UART: [kat] --
6,913,920 UART: [warm-reset] ++
6,914,575 UART: [warm-reset] Prev Update Reset failed
6,915,720 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,904 >>> mbox cmd response: success
2,678,277 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,684,506 UART:
2,684,522 UART: Running Caliptra FMC ...
2,684,930 UART:
2,685,073 UART: [state] CFI Enabled
2,695,458 UART: [fht] FMC Alias Private Key: 7
2,802,973 UART: [art] Extend RT PCRs Done
2,803,401 UART: [art] Lock RT PCRs Done
2,805,195 UART: [art] Populate DV Done
2,813,786 UART: [fht] FMC Alias Private Key: 7
2,814,952 UART: [art] Derive CDI
2,815,232 UART: [art] Store in in slot 0x4
2,900,619 UART: [art] Derive Key Pair
2,900,979 UART: [art] Store priv key in slot 0x5
2,914,097 UART: [art] Derive Key Pair - Done
2,929,022 UART: [art] Signing Cert with AUTHO
2,929,502 UART: RITY.KEYID = 7
2,944,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,387 UART: [art] PUB.X = F2CB62C0CBEC73E81CCE6D56A1B9F929FCC7FF0D67B6C68A95B50FD5BE632D141A10C05BAD7C694F7C4E7C25F9E781F0
2,952,177 UART: [art] PUB.Y = AAAF26402C3BE376FCFB91B3BCA2C189D2ABE9D4485318E0CBE3D54931B0547BF565463930F574142ECFDBB05B02F76A
2,959,140 UART: [art] SIG.R = 918FCC578BD48C2DD9CE01451B34C94937AB8C3886BAA566C1A028DC5B106B2E49F9F5C441732F1A57760AFAC03EDEA9
2,965,918 UART: [art] SIG.S = 06EB89A13C1A247A8D22C09AAE5CF0AB10E60B5711DFD2E84F3A1F94CAE4771F6D623BBC038E64452B0F110E2CE65FB0
2,989,776 UART: Caliptra RT
2,990,121 UART: [state] CFI Enabled
3,097,402 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,531,823 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,050 UART: [kat] LMS
1,169,362 UART: [kat] --
1,170,245 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,555 UART: [idev] ++
1,173,723 UART: [idev] CDI.KEYID = 6
1,174,084 UART: [idev] SUBJECT.KEYID = 7
1,174,509 UART: [idev] UDS.KEYID = 0
1,182,397 UART: [idev] Erasing UDS.KEYID = 0
1,199,601 UART: [idev] Sha1 KeyId Algorithm
1,208,413 UART: [idev] --
1,209,546 UART: [ldev] ++
1,209,714 UART: [ldev] CDI.KEYID = 6
1,210,078 UART: [ldev] SUBJECT.KEYID = 5
1,210,505 UART: [ldev] AUTHORITY.KEYID = 7
1,210,968 UART: [ldev] FE.KEYID = 1
1,216,212 UART: [ldev] Erasing FE.KEYID = 1
1,242,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,324 UART: [ldev] --
1,281,662 UART: [fwproc] Wait for Commands...
1,282,473 UART: [fwproc] Recv command 0x46574c44
1,283,206 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,491 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,097 >>> mbox cmd response: success
2,772,246 UART: [afmc] ++
2,772,414 UART: [afmc] CDI.KEYID = 6
2,772,777 UART: [afmc] SUBJECT.KEYID = 7
2,773,203 UART: [afmc] AUTHORITY.KEYID = 5
2,808,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,575 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,304 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,187 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,906 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,983 UART: [afmc] --
2,851,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,851,967 UART: [cold-reset] --
2,852,695 UART: [state] Locking Datavault
2,853,846 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,450 UART: [state] Locking ICCM
2,854,952 UART: [exit] Launching FMC @ 0x40000130
2,860,281 UART:
2,860,297 UART: Running Caliptra FMC ...
2,860,705 UART:
2,860,759 UART: [state] CFI Enabled
2,871,434 UART: [fht] FMC Alias Private Key: 7
2,978,753 UART: [art] Extend RT PCRs Done
2,979,181 UART: [art] Lock RT PCRs Done
2,980,537 UART: [art] Populate DV Done
2,988,746 UART: [fht] FMC Alias Private Key: 7
2,989,764 UART: [art] Derive CDI
2,990,044 UART: [art] Store in in slot 0x4
3,075,687 UART: [art] Derive Key Pair
3,076,047 UART: [art] Store priv key in slot 0x5
3,089,245 UART: [art] Derive Key Pair - Done
3,103,805 UART: [art] Signing Cert with AUTHO
3,104,285 UART: RITY.KEYID = 7
3,119,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,322 UART: [art] PUB.X = F29867244CC31AF1DD619BDA298B4DE45FA23C1313A9ACA8691B82D3D397D8C7E482781BB82C38E53CA79F430ABB56CC
3,127,103 UART: [art] PUB.Y = F81942FA9A8F91D0A577A7A0DE57A4E221295F6E43B7D631FDDE3AB0EF377684C49D14F978737F341B337FE6DEAE4C66
3,134,065 UART: [art] SIG.R = 589A0B57CAAD5883B1A0D586A5203BB9C0BC41187148600C3E5C24083B5066D34B43BC30E51A6D557D84840F345B0CBD
3,140,822 UART: [art] SIG.S = DFBBF27BE9716C5CB3E3B2C29B6D88B4B1BF6B8E11DEDDE349DCE52AECF05402EB581C55086881F8C289E8E9B0A1A56D
3,164,615 UART: Caliptra RT
3,164,868 UART: [state] CFI Enabled
3,272,675 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,609 UART:
3,274,625 UART: Running Caliptra ROM ...
3,275,033 UART:
3,275,088 UART: [state] CFI Enabled
3,277,746 UART: [state] LifecycleState = Unprovisioned
3,278,401 UART: [state] DebugLocked = No
3,279,099 UART: [state] WD Timer not started. Device not locked for debugging
3,280,205 UART: [kat] SHA2-256
4,083,755 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,884 UART: [kat] ++
4,088,036 UART: [kat] sha1
4,092,278 UART: [kat] SHA2-256
4,094,218 UART: [kat] SHA2-384
4,096,919 UART: [kat] SHA2-512-ACC
4,098,819 UART: [kat] ECC-384
4,108,586 UART: [kat] HMAC-384Kdf
4,112,960 UART: [kat] LMS
4,361,272 UART: [kat] --
4,362,334 UART: [update-reset] ++
5,672,553 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,673,640 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,823,218 >>> mbox cmd response: success
Initializing fuses
5,823,644 UART:
5,823,660 UART: Running Caliptra ROM ...
5,824,068 UART:
5,824,123 UART: [state] CFI Enabled
5,826,513 UART: [state] LifecycleState = Unprovisioned
5,827,168 UART: [state] DebugLocked = No
5,827,738 UART: [state] WD Timer not started. Device not locked for debugging
5,828,957 UART: [kat] SHA2-256
6,632,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,636,636 UART: [kat] ++
6,636,788 UART: [kat] sha1
6,641,038 UART: [kat] SHA2-256
6,642,978 UART: [kat] SHA2-384
6,645,895 UART: [kat] SHA2-512-ACC
6,647,796 UART: [kat] ECC-384
6,657,583 UART: [kat] HMAC-384Kdf
6,662,285 UART: [kat] LMS
6,910,597 UART: [kat] --
6,911,227 UART: [warm-reset] ++
6,911,858 UART: [warm-reset] Prev Update Reset failed
6,913,025 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,875 >>> mbox cmd response: success
2,674,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,681,095 UART:
2,681,111 UART: Running Caliptra FMC ...
2,681,519 UART:
2,681,573 UART: [state] CFI Enabled
2,692,008 UART: [fht] FMC Alias Private Key: 7
2,799,647 UART: [art] Extend RT PCRs Done
2,800,075 UART: [art] Lock RT PCRs Done
2,801,555 UART: [art] Populate DV Done
2,809,996 UART: [fht] FMC Alias Private Key: 7
2,810,926 UART: [art] Derive CDI
2,811,206 UART: [art] Store in in slot 0x4
2,896,439 UART: [art] Derive Key Pair
2,896,799 UART: [art] Store priv key in slot 0x5
2,910,105 UART: [art] Derive Key Pair - Done
2,925,144 UART: [art] Signing Cert with AUTHO
2,925,624 UART: RITY.KEYID = 7
2,941,290 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,055 UART: [art] PUB.X = E9FCDBF0C258D3CA05A4DECCB40DB420AC3D3C2FAFF54D8E4F59176F66617C8145F748BE8C62531FB18655598EFD197B
2,948,839 UART: [art] PUB.Y = 259DA62680CFD32BE02051C78B7240790BA15487E25761585C03CDD67FA39E0BF3468C0E330B95074F2DFAC3B282EF50
2,955,773 UART: [art] SIG.R = 53D36D8A1909FF24C99B24B77614BEB4FBC4E67B81E45584129EB4469C07988BDBBC76AE7C1EFCA0CD0B184CF469AF2D
2,962,552 UART: [art] SIG.S = 0BAE8157767DE2E49923E7A26BAF5EE644A45E40F9DDB12E715B32F6F0823FC55F85CDF9DBE8FFEE9C5307CBC8B6D3F4
2,986,203 UART: Caliptra RT
2,986,456 UART: [state] CFI Enabled
3,093,761 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,526,015 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,588 UART: [fht] FHT @ 0x50003400
1,173,168 UART: [idev] ++
1,173,336 UART: [idev] CDI.KEYID = 6
1,173,697 UART: [idev] SUBJECT.KEYID = 7
1,174,122 UART: [idev] UDS.KEYID = 0
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,198,928 UART: [idev] Sha1 KeyId Algorithm
1,207,850 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,427 UART: [fwproc] Wait for Commands...
1,282,196 UART: [fwproc] Recv command 0x46574c44
1,282,929 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,166 >>> mbox cmd response: success
2,773,419 UART: [afmc] ++
2,773,587 UART: [afmc] CDI.KEYID = 6
2,773,950 UART: [afmc] SUBJECT.KEYID = 7
2,774,376 UART: [afmc] AUTHORITY.KEYID = 5
2,810,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,048 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,767 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,636 UART: [afmc] --
2,853,672 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,853,694 UART: [cold-reset] --
2,854,388 UART: [state] Locking Datavault
2,855,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,155 UART: [state] Locking ICCM
2,856,795 UART: [exit] Launching FMC @ 0x40000130
2,862,124 UART:
2,862,140 UART: Running Caliptra FMC ...
2,862,548 UART:
2,862,691 UART: [state] CFI Enabled
2,873,356 UART: [fht] FMC Alias Private Key: 7
2,981,819 UART: [art] Extend RT PCRs Done
2,982,247 UART: [art] Lock RT PCRs Done
2,984,121 UART: [art] Populate DV Done
2,992,466 UART: [fht] FMC Alias Private Key: 7
2,993,414 UART: [art] Derive CDI
2,993,694 UART: [art] Store in in slot 0x4
3,079,233 UART: [art] Derive Key Pair
3,079,593 UART: [art] Store priv key in slot 0x5
3,093,083 UART: [art] Derive Key Pair - Done
3,107,829 UART: [art] Signing Cert with AUTHO
3,108,309 UART: RITY.KEYID = 7
3,123,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,102 UART: [art] PUB.X = AF474F4125A20153CFCCECC0A8EC774F8A483B5A1C5F3830FDE212CBDB7D15E156BAD0B271AAFAED0B26F9C5B12B643D
3,130,894 UART: [art] PUB.Y = 83EDBF65F2E202FF4C7CB20495A8F87152148FB62CA90924477D5EF9C25002F38C220A96E77C3BA468544CA6E84319D8
3,137,831 UART: [art] SIG.R = 80C68DB3785C5CB96B73E8F92C12559574E96CCBF5B00E1B59CA2B179B9F8167D4ED74EBA8AA61FA21C8B07D7F896F3C
3,144,614 UART: [art] SIG.S = AFED1A6486D9252472BED661903A50294CF53E266FEE89C1C215784DEAE207C18F09E766C33C7A27E089799370591714
3,168,251 UART: Caliptra RT
3,168,596 UART: [state] CFI Enabled
3,276,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,750 UART:
3,278,766 UART: Running Caliptra ROM ...
3,279,174 UART:
3,279,316 UART: [state] CFI Enabled
3,281,818 UART: [state] LifecycleState = Unprovisioned
3,282,473 UART: [state] DebugLocked = No
3,283,059 UART: [state] WD Timer not started. Device not locked for debugging
3,284,279 UART: [kat] SHA2-256
4,087,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,091,958 UART: [kat] ++
4,092,110 UART: [kat] sha1
4,096,386 UART: [kat] SHA2-256
4,098,326 UART: [kat] SHA2-384
4,101,171 UART: [kat] SHA2-512-ACC
4,103,071 UART: [kat] ECC-384
4,112,840 UART: [kat] HMAC-384Kdf
4,117,330 UART: [kat] LMS
4,365,642 UART: [kat] --
4,366,478 UART: [update-reset] ++
5,677,137 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,678,280 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,827,858 >>> mbox cmd response: success
Initializing fuses
5,828,170 UART:
5,828,186 UART: Running Caliptra ROM ...
5,828,594 UART:
5,828,736 UART: [state] CFI Enabled
5,831,938 UART: [state] LifecycleState = Unprovisioned
5,832,593 UART: [state] DebugLocked = No
5,833,229 UART: [state] WD Timer not started. Device not locked for debugging
5,834,536 UART: [kat] SHA2-256
6,638,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,642,215 UART: [kat] ++
6,642,367 UART: [kat] sha1
6,646,579 UART: [kat] SHA2-256
6,648,519 UART: [kat] SHA2-384
6,651,158 UART: [kat] SHA2-512-ACC
6,653,059 UART: [kat] ECC-384
6,662,520 UART: [kat] HMAC-384Kdf
6,666,930 UART: [kat] LMS
6,915,242 UART: [kat] --
6,916,222 UART: [warm-reset] ++
6,916,773 UART: [warm-reset] Prev Update Reset failed
6,917,628 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,854 >>> mbox cmd response: success
2,676,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,682,346 UART:
2,682,362 UART: Running Caliptra FMC ...
2,682,770 UART:
2,682,913 UART: [state] CFI Enabled
2,693,064 UART: [fht] FMC Alias Private Key: 7
2,801,343 UART: [art] Extend RT PCRs Done
2,801,771 UART: [art] Lock RT PCRs Done
2,803,513 UART: [art] Populate DV Done
2,811,866 UART: [fht] FMC Alias Private Key: 7
2,812,798 UART: [art] Derive CDI
2,813,078 UART: [art] Store in in slot 0x4
2,898,469 UART: [art] Derive Key Pair
2,898,829 UART: [art] Store priv key in slot 0x5
2,912,217 UART: [art] Derive Key Pair - Done
2,927,099 UART: [art] Signing Cert with AUTHO
2,927,579 UART: RITY.KEYID = 7
2,942,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,648 UART: [art] PUB.X = 965A4B4EA30FCAA6493C35D550700901E75D84B4E5EFE63CAA7615643777D32B484743D9CC23CE50D8B218205FAAF3EA
2,950,417 UART: [art] PUB.Y = 063D73EBAF7BD222FBD14DCF7E4E8F287EFAC5BB1A8DCA2FE1D45BF20394E374A9752E5688107F71EFCC8794C3243ADE
2,957,385 UART: [art] SIG.R = AD3875A867031B151D3CB8FEDA4C6F90848A9C064B0F4FEDC1E680600B212BB14C7AB401743426D5C5A5794DFC24E08C
2,964,150 UART: [art] SIG.S = B26870AB6A0A8F61DC89C646BE2315F3759A8E9C7745607D8DAD389450EC88CD1474766A758BB7F5185CDE833DE91445
2,988,336 UART: Caliptra RT
2,988,681 UART: [state] CFI Enabled
3,096,931 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,528,548 >>> mbox cmd response: success
Initializing fuses
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
191,604 UART:
191,982 UART: Running Caliptra ROM ...
193,074 UART:
193,226 UART: [state] CFI Enabled
267,288 UART: [state] LifecycleState = Production
269,512 UART: [state] DebugLocked = Yes
272,499 UART: [state] Starting the WD Timer 40000000 cycles
278,091 UART: [kat] SHA2-256
460,039 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
471,514 UART: [kat] ++
472,117 UART: [kat] sha1
482,541 UART: [kat] SHA2-256
485,552 UART: [kat] SHA2-384
491,612 UART: [kat] SHA2-512-ACC
494,263 UART: [kat] ECC-384
3,777,738 UART: [kat] HMAC-384Kdf
3,804,826 UART: [kat] LMS
4,877,984 UART: [kat] --
4,882,002 UART: [cold-reset] ++
4,884,437 UART: [fht] FHT @ 0x50003400
4,895,980 UART: [idev] ++
4,896,612 UART: [idev] CDI.KEYID = 6
4,897,855 UART: [idev] SUBJECT.KEYID = 7
4,899,078 UART: [idev] UDS.KEYID = 0
4,900,017 ready_for_fw is high
4,900,237 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,043,459 UART: [idev] Erasing UDS.KEYID = 0
8,245,548 UART: [idev] Sha1 KeyId Algorithm
8,268,543 UART: [idev] --
8,272,515 UART: [ldev] ++
8,273,093 UART: [ldev] CDI.KEYID = 6
8,274,331 UART: [ldev] SUBJECT.KEYID = 5
8,275,432 UART: [ldev] AUTHORITY.KEYID = 7
8,276,658 UART: [ldev] FE.KEYID = 1
8,320,034 UART: [ldev] Erasing FE.KEYID = 1
11,655,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,049 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,980,361 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,996,387 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,012,491 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,032,170 UART: [ldev] --
14,037,553 UART: [fwproc] Wait for Commands...
14,040,132 UART: [fwproc] Recv command 0x46574c44
14,042,404 UART: [fwproc] Recv'd Img size: 113844 bytes
18,136,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,209,402 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,278,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,595,139 >>> mbox cmd response: success
18,598,700 UART: [afmc] ++
18,599,284 UART: [afmc] CDI.KEYID = 6
18,600,521 UART: [afmc] SUBJECT.KEYID = 7
18,601,620 UART: [afmc] AUTHORITY.KEYID = 5
21,966,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,264,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,267,218 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,283,204 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,299,325 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,315,400 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,337,736 UART: [afmc] --
24,342,040 UART: [cold-reset] --
24,346,218 UART: [state] Locking Datavault
24,351,531 UART: [state] Locking PCR0, PCR1 and PCR31
24,353,170 UART: [state] Locking ICCM
24,355,189 UART: [exit] Launching FMC @ 0x40000130
24,363,910 UART:
24,364,137 UART: Running Caliptra FMC ...
24,365,158 UART:
24,365,304 UART: [state] CFI Enabled
24,426,044 UART: [fht] FMC Alias Private Key: 7
26,764,197 UART: [art] Extend RT PCRs Done
26,765,422 UART: [art] Lock RT PCRs Done
26,767,185 UART: [art] Populate DV Done
26,772,700 UART: [fht] FMC Alias Private Key: 7
26,774,298 UART: [art] Derive CDI
26,775,110 UART: [art] Store in in slot 0x4
26,834,914 UART: [art] Derive Key Pair
26,835,945 UART: [art] Store priv key in slot 0x5
30,128,841 UART: [art] Derive Key Pair - Done
30,141,520 UART: [art] Signing Cert with AUTHO
30,142,815 UART: RITY.KEYID = 7
32,430,957 UART: [art] Erasing AUTHORITY.KEYID = 7
32,432,466 UART: [art] PUB.X = E18AE5E1E605D9CDC39FE7281F71DCD1CCFEA64D7FE2D9A371D2365C94C47D7C9508ADC47BE060D38605F435CB78E8C7
32,439,713 UART: [art] PUB.Y = 5623FF59F5CB68269DB99116D848C7E83C0A39567929A229C2A62354A30170B9022A1322F99EDA991E326E82841362EE
32,446,942 UART: [art] SIG.R = 9C17E531B952B477C52A9A482B6DFA90ACBA9A1C1B6B11FF0EA090BD90B63033AFF82B28124A0FBC533B05B3B149CBA3
32,454,337 UART: [art] SIG.S = 1D2E031C6BACF4905BA2C471A62E7C365F8A72C819DC7C063B3401E649D93A18F1903B621FDF2B9F59CA5D6F9843EF78
33,759,747 UART: Caliptra RT
33,760,455 UART: [state] CFI Enabled
33,921,508 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,318 UART:
1,595 UART: Running Caliptra ROM ...
2,641 UART:
2,787 UART: [state] CFI Enabled
69,523 UART: [state] LifecycleState = Production
71,287 UART: [state] DebugLocked = Yes
73,168 UART: [state] Starting the WD Timer 40000000 cycles
79,140 UART: [kat] SHA2-256
261,090 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
272,583 UART: [kat] ++
273,087 UART: [kat] sha1
284,125 UART: [kat] SHA2-256
287,126 UART: [kat] SHA2-384
291,741 UART: [kat] SHA2-512-ACC
294,356 UART: [kat] ECC-384
3,576,638 UART: [kat] HMAC-384Kdf
3,604,221 UART: [kat] LMS
4,677,341 UART: [kat] --
4,680,758 UART: [warm-reset] ++
4,685,609 UART: [warm-reset] --
4,691,088 UART: [state] Locking Datavault
4,694,125 UART: [state] Locking PCR0, PCR1 and PCR31
4,696,324 UART: [state] Locking ICCM
4,698,616 UART: [exit] Launching FMC @ 0x40000130
4,707,287 UART:
4,707,519 UART: Running Caliptra FMC ...
4,708,546 UART:
4,708,693 UART: [state] CFI Enabled
4,768,034 UART: [aliasrt :skip pcr extension
4,769,323 UART: [art] Extend RT PCRs Done
4,770,388 UART: [art] Lock RT PCRs Done
4,771,776 UART: [art] Populate DV Done
4,777,342 UART: [fht] FMC Alias Private Key: 7
4,778,872 UART: [art] Derive CDI
4,779,654 UART: [art] Store in in slot 0x4
4,836,621 UART: [art] Derive Key Pair
4,837,689 UART: [art] Store priv key in slot 0x5
8,130,531 UART: [art] Derive Key Pair - Done
8,143,740 UART: [art] Signing Cert with AUTHO
8,145,046 UART: RITY.KEYID = 7
10,432,376 UART: [art] Erasing AUTHORITY.KEYID = 7
10,433,882 UART: [art] PUB.X = E18AE5E1E605D9CDC39FE7281F71DCD1CCFEA64D7FE2D9A371D2365C94C47D7C9508ADC47BE060D38605F435CB78E8C7
10,441,141 UART: [art] PUB.Y = 5623FF59F5CB68269DB99116D848C7E83C0A39567929A229C2A62354A30170B9022A1322F99EDA991E326E82841362EE
10,448,374 UART: [art] SIG.R = 9C17E531B952B477C52A9A482B6DFA90ACBA9A1C1B6B11FF0EA090BD90B63033AFF82B28124A0FBC533B05B3B149CBA3
10,455,760 UART: [art] SIG.S = 1D2E031C6BACF4905BA2C471A62E7C365F8A72C819DC7C063B3401E649D93A18F1903B621FDF2B9F59CA5D6F9843EF78
11,760,949 UART: Caliptra RT
11,761,658 UART: [state] CFI Enabled
12,096,730 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
191,532 UART:
191,893 UART: Running Caliptra ROM ...
193,062 UART:
193,224 UART: [state] CFI Enabled
262,268 UART: [state] LifecycleState = Production
264,472 UART: [state] DebugLocked = Yes
265,707 UART: [state] Starting the WD Timer 40000000 cycles
271,229 UART: [kat] SHA2-256
453,149 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,656 UART: [kat] ++
465,284 UART: [kat] sha1
476,621 UART: [kat] SHA2-256
479,638 UART: [kat] SHA2-384
485,417 UART: [kat] SHA2-512-ACC
487,993 UART: [kat] ECC-384
3,777,165 UART: [kat] HMAC-384Kdf
3,802,414 UART: [kat] LMS
4,875,527 UART: [kat] --
4,880,230 UART: [cold-reset] ++
4,882,022 UART: [fht] FHT @ 0x50003400
4,893,849 UART: [idev] ++
4,894,558 UART: [idev] CDI.KEYID = 6
4,895,727 UART: [idev] SUBJECT.KEYID = 7
4,896,896 UART: [idev] UDS.KEYID = 0
4,897,838 ready_for_fw is high
4,898,044 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,041,319 UART: [idev] Erasing UDS.KEYID = 0
8,224,537 UART: [idev] Sha1 KeyId Algorithm
8,245,955 UART: [idev] --
8,251,126 UART: [ldev] ++
8,251,698 UART: [ldev] CDI.KEYID = 6
8,252,875 UART: [ldev] SUBJECT.KEYID = 5
8,254,141 UART: [ldev] AUTHORITY.KEYID = 7
8,255,317 UART: [ldev] FE.KEYID = 1
8,300,076 UART: [ldev] Erasing FE.KEYID = 1
11,636,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,944,088 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,960,399 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,976,434 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,992,531 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,012,383 UART: [ldev] --
14,016,891 UART: [fwproc] Wait for Commands...
14,018,473 UART: [fwproc] Recv command 0x46574c44
14,020,987 UART: [fwproc] Recv'd Img size: 113844 bytes
18,131,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,211,942 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,280,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,596,190 >>> mbox cmd response: success
18,601,042 UART: [afmc] ++
18,601,628 UART: [afmc] CDI.KEYID = 6
18,602,870 UART: [afmc] SUBJECT.KEYID = 7
18,603,897 UART: [afmc] AUTHORITY.KEYID = 5
21,969,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,267,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,270,167 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,286,179 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,302,291 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,318,322 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,341,311 UART: [afmc] --
24,345,418 UART: [cold-reset] --
24,350,584 UART: [state] Locking Datavault
24,356,641 UART: [state] Locking PCR0, PCR1 and PCR31
24,358,346 UART: [state] Locking ICCM
24,359,688 UART: [exit] Launching FMC @ 0x40000130
24,368,359 UART:
24,368,590 UART: Running Caliptra FMC ...
24,369,686 UART:
24,369,841 UART: [state] CFI Enabled
24,429,614 UART: [fht] FMC Alias Private Key: 7
26,767,510 UART: [art] Extend RT PCRs Done
26,768,735 UART: [art] Lock RT PCRs Done
26,770,335 UART: [art] Populate DV Done
26,775,911 UART: [fht] FMC Alias Private Key: 7
26,777,553 UART: [art] Derive CDI
26,778,309 UART: [art] Store in in slot 0x4
26,837,298 UART: [art] Derive Key Pair
26,838,328 UART: [art] Store priv key in slot 0x5
30,130,192 UART: [art] Derive Key Pair - Done
30,143,191 UART: [art] Signing Cert with AUTHO
30,144,491 UART: RITY.KEYID = 7
32,431,327 UART: [art] Erasing AUTHORITY.KEYID = 7
32,432,836 UART: [art] PUB.X = DB2FD2302308DCB54B7CD3B5FF67564CC14CB059956505B10823FA2319CA11B99D54E66D81EFE41E4A731FF333E007FA
32,440,099 UART: [art] PUB.Y = A8A6001A600C56E98A266EABDF536777FFD8727399A96533D3400398320367DE4D0E932EC194B9A1A3042D773C23582B
32,447,345 UART: [art] SIG.R = 685188E353119DEF8A6DDA93FFB5870EADA1AF4F7F908509A56359CB235DAB78E264597039A92EA94584959BB4318576
32,454,696 UART: [art] SIG.S = 934C3AA93B3FA2FFC042F83988CBEDB4FCD5B0C12CC26477D1CEF6CF76436481B2F115EA392FECDFD239A3F5F4B35EF4
33,759,671 UART: Caliptra RT
33,760,378 UART: [state] CFI Enabled
33,919,932 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,258 UART:
1,506 UART: Running Caliptra ROM ...
2,642 UART:
2,800 UART: [state] CFI Enabled
64,057 UART: [state] LifecycleState = Production
65,771 UART: [state] DebugLocked = Yes
67,483 UART: [state] Starting the WD Timer 40000000 cycles
72,751 UART: [kat] SHA2-256
254,727 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
266,240 UART: [kat] ++
266,768 UART: [kat] sha1
277,814 UART: [kat] SHA2-256
280,816 UART: [kat] SHA2-384
287,596 UART: [kat] SHA2-512-ACC
290,262 UART: [kat] ECC-384
3,575,930 UART: [kat] HMAC-384Kdf
3,603,686 UART: [kat] LMS
4,676,871 UART: [kat] --
4,680,453 UART: [warm-reset] ++
4,686,435 UART: [warm-reset] --
4,692,887 UART: [state] Locking Datavault
4,697,007 UART: [state] Locking PCR0, PCR1 and PCR31
4,699,149 UART: [state] Locking ICCM
4,700,694 UART: [exit] Launching FMC @ 0x40000130
4,709,371 UART:
4,709,607 UART: Running Caliptra FMC ...
4,710,707 UART:
4,710,864 UART: [state] CFI Enabled
4,767,777 UART: [aliasrt :skip pcr extension
4,769,069 UART: [art] Extend RT PCRs Done
4,770,218 UART: [art] Lock RT PCRs Done
4,771,554 UART: [art] Populate DV Done
4,777,279 UART: [fht] FMC Alias Private Key: 7
4,778,892 UART: [art] Derive CDI
4,779,707 UART: [art] Store in in slot 0x4
4,836,362 UART: [art] Derive Key Pair
4,837,398 UART: [art] Store priv key in slot 0x5
8,129,959 UART: [art] Derive Key Pair - Done
8,142,687 UART: [art] Signing Cert with AUTHO
8,143,986 UART: RITY.KEYID = 7
10,430,853 UART: [art] Erasing AUTHORITY.KEYID = 7
10,432,356 UART: [art] PUB.X = DB2FD2302308DCB54B7CD3B5FF67564CC14CB059956505B10823FA2319CA11B99D54E66D81EFE41E4A731FF333E007FA
10,439,613 UART: [art] PUB.Y = A8A6001A600C56E98A266EABDF536777FFD8727399A96533D3400398320367DE4D0E932EC194B9A1A3042D773C23582B
10,446,855 UART: [art] SIG.R = 685188E353119DEF8A6DDA93FFB5870EADA1AF4F7F908509A56359CB235DAB78E264597039A92EA94584959BB4318576
10,454,208 UART: [art] SIG.S = 934C3AA93B3FA2FFC042F83988CBEDB4FCD5B0C12CC26477D1CEF6CF76436481B2F115EA392FECDFD239A3F5F4B35EF4
11,758,858 UART: Caliptra RT
11,759,563 UART: [state] CFI Enabled
12,092,730 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
191,905 UART:
192,248 UART: Running Caliptra ROM ...
193,321 UART:
603,187 UART: [state] CFI Enabled
615,078 UART: [state] LifecycleState = Production
617,248 UART: [state] DebugLocked = Yes
619,224 UART: [state] Starting the WD Timer 40000000 cycles
625,093 UART: [kat] SHA2-256
807,085 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
818,561 UART: [kat] ++
819,093 UART: [kat] sha1
829,780 UART: [kat] SHA2-256
832,789 UART: [kat] SHA2-384
838,426 UART: [kat] SHA2-512-ACC
840,999 UART: [kat] ECC-384
4,097,229 UART: [kat] HMAC-384Kdf
4,110,298 UART: [kat] LMS
5,183,463 UART: [kat] --
5,187,179 UART: [cold-reset] ++
5,189,999 UART: [fht] FHT @ 0x50003400
5,201,546 UART: [idev] ++
5,202,170 UART: [idev] CDI.KEYID = 6
5,203,332 UART: [idev] SUBJECT.KEYID = 7
5,204,849 UART: [idev] UDS.KEYID = 0
5,206,105 ready_for_fw is high
5,206,306 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,349,356 UART: [idev] Erasing UDS.KEYID = 0
8,493,454 UART: [idev] Sha1 KeyId Algorithm
8,515,546 UART: [idev] --
8,519,756 UART: [ldev] ++
8,520,313 UART: [ldev] CDI.KEYID = 6
8,521,462 UART: [ldev] SUBJECT.KEYID = 5
8,522,666 UART: [ldev] AUTHORITY.KEYID = 7
8,523,810 UART: [ldev] FE.KEYID = 1
8,537,281 UART: [ldev] Erasing FE.KEYID = 1
11,828,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,118,790 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,135,099 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,151,160 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,167,211 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,187,919 UART: [ldev] --
14,192,854 UART: [fwproc] Wait for Commands...
14,195,281 UART: [fwproc] Recv command 0x46574c44
14,197,579 UART: [fwproc] Recv'd Img size: 113844 bytes
18,299,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,375,210 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,443,942 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,759,785 >>> mbox cmd response: success
18,764,007 UART: [afmc] ++
18,764,600 UART: [afmc] CDI.KEYID = 6
18,765,699 UART: [afmc] SUBJECT.KEYID = 7
18,766,961 UART: [afmc] AUTHORITY.KEYID = 5
22,088,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,385,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,387,719 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,403,595 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,419,697 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,435,716 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,458,630 UART: [afmc] --
24,462,476 UART: [cold-reset] --
24,467,036 UART: [state] Locking Datavault
24,474,157 UART: [state] Locking PCR0, PCR1 and PCR31
24,475,808 UART: [state] Locking ICCM
24,478,635 UART: [exit] Launching FMC @ 0x40000130
24,487,289 UART:
24,487,521 UART: Running Caliptra FMC ...
24,488,541 UART:
24,488,678 UART: [state] CFI Enabled
24,497,143 UART: [fht] FMC Alias Private Key: 7
26,827,753 UART: [art] Extend RT PCRs Done
26,828,974 UART: [art] Lock RT PCRs Done
26,830,460 UART: [art] Populate DV Done
26,835,866 UART: [fht] FMC Alias Private Key: 7
26,837,498 UART: [art] Derive CDI
26,838,244 UART: [art] Store in in slot 0x4
26,881,055 UART: [art] Derive Key Pair
26,882,094 UART: [art] Store priv key in slot 0x5
30,124,232 UART: [art] Derive Key Pair - Done
30,137,498 UART: [art] Signing Cert with AUTHO
30,138,795 UART: RITY.KEYID = 7
32,418,371 UART: [art] Erasing AUTHORITY.KEYID = 7
32,419,886 UART: [art] PUB.X = 5492334D7DEAD3EB2A6C220E48282CC4FD2370AA9EFAF46617D20FC93A66095D381F63AC42092C364E74905DF8F352FB
32,427,143 UART: [art] PUB.Y = BCE57DBCBCBE720CDB3466A8ED0BD633BF800A83672D4A5F38CBC035D8D267748C7B36E47BEAC52F018837A35D3A9420
32,434,438 UART: [art] SIG.R = 10634DAA921D3386C3962652CB3E38A89D6B0BE8F3988335B84F65438B231657D23D02E58168043C5AFDD13871B97E86
32,441,773 UART: [art] SIG.S = 02339A10DD88C3A1B6913286B667D0680775C1536197E931BF8C429F8F3AF533F1B198D0FE6D90D8F9F9E94D3CBB9E88
33,746,842 UART: Caliptra RT
33,747,551 UART: [state] CFI Enabled
33,865,043 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,307 UART:
1,604 UART: Running Caliptra ROM ...
2,815 UART:
6,659,301 UART: [state] CFI Enabled
6,672,367 UART: [state] LifecycleState = Production
6,674,109 UART: [state] DebugLocked = Yes
6,676,847 UART: [state] Starting the WD Timer 40000000 cycles
6,682,359 UART: [kat] SHA2-256
6,864,299 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,875,877 UART: [kat] ++
6,876,385 UART: [kat] sha1
6,886,564 UART: [kat] SHA2-256
6,889,626 UART: [kat] SHA2-384
6,896,418 UART: [kat] SHA2-512-ACC
6,899,036 UART: [kat] ECC-384
10,155,525 UART: [kat] HMAC-384Kdf
10,166,129 UART: [kat] LMS
11,239,276 UART: [kat] --
11,244,509 UART: [warm-reset] ++
11,250,078 UART: [warm-reset] --
11,253,079 UART: [state] Locking Datavault
11,257,468 UART: [state] Locking PCR0, PCR1 and PCR31
11,259,652 UART: [state] Locking ICCM
11,260,980 UART: [exit] Launching FMC @ 0x40000130
11,269,636 UART:
11,269,861 UART: Running Caliptra FMC ...
11,270,954 UART:
11,271,102 UART: [state] CFI Enabled
11,273,306 UART: [aliasrt :skip pcr extension
11,274,547 UART: [art] Extend RT PCRs Done
11,275,678 UART: [art] Lock RT PCRs Done
11,276,729 UART: [art] Populate DV Done
11,281,854 UART: [fht] FMC Alias Private Key: 7
11,283,560 UART: [art] Derive CDI
11,284,364 UART: [art] Store in in slot 0x4
11,327,100 UART: [art] Derive Key Pair
11,328,123 UART: [art] Store priv key in slot 0x5
14,570,262 UART: [art] Derive Key Pair - Done
14,583,530 UART: [art] Signing Cert with AUTHO
14,584,826 UART: RITY.KEYID = 7
16,864,495 UART: [art] Erasing AUTHORITY.KEYID = 7
16,865,992 UART: [art] PUB.X = 5492334D7DEAD3EB2A6C220E48282CC4FD2370AA9EFAF46617D20FC93A66095D381F63AC42092C364E74905DF8F352FB
16,873,244 UART: [art] PUB.Y = BCE57DBCBCBE720CDB3466A8ED0BD633BF800A83672D4A5F38CBC035D8D267748C7B36E47BEAC52F018837A35D3A9420
16,880,483 UART: [art] SIG.R = 10634DAA921D3386C3962652CB3E38A89D6B0BE8F3988335B84F65438B231657D23D02E58168043C5AFDD13871B97E86
16,887,819 UART: [art] SIG.S = 02339A10DD88C3A1B6913286B667D0680775C1536197E931BF8C429F8F3AF533F1B198D0FE6D90D8F9F9E94D3CBB9E88
18,193,113 UART: Caliptra RT
18,193,821 UART: [state] CFI Enabled
18,481,652 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
191,816 UART:
192,199 UART: Running Caliptra ROM ...
193,304 UART:
603,161 UART: [state] CFI Enabled
618,532 UART: [state] LifecycleState = Production
620,421 UART: [state] DebugLocked = Yes
621,975 UART: [state] Starting the WD Timer 40000000 cycles
627,982 UART: [kat] SHA2-256
809,975 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,513 UART: [kat] ++
822,033 UART: [kat] sha1
832,608 UART: [kat] SHA2-256
835,678 UART: [kat] SHA2-384
840,603 UART: [kat] SHA2-512-ACC
843,248 UART: [kat] ECC-384
4,098,223 UART: [kat] HMAC-384Kdf
4,110,979 UART: [kat] LMS
5,184,110 UART: [kat] --
5,188,923 UART: [cold-reset] ++
5,190,929 UART: [fht] FHT @ 0x50003400
5,202,542 UART: [idev] ++
5,203,238 UART: [idev] CDI.KEYID = 6
5,204,407 UART: [idev] SUBJECT.KEYID = 7
5,205,860 UART: [idev] UDS.KEYID = 0
5,207,118 ready_for_fw is high
5,207,328 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,350,375 UART: [idev] Erasing UDS.KEYID = 0
8,496,216 UART: [idev] Sha1 KeyId Algorithm
8,519,229 UART: [idev] --
8,522,220 UART: [ldev] ++
8,522,792 UART: [ldev] CDI.KEYID = 6
8,524,018 UART: [ldev] SUBJECT.KEYID = 5
8,525,170 UART: [ldev] AUTHORITY.KEYID = 7
8,526,390 UART: [ldev] FE.KEYID = 1
8,536,231 UART: [ldev] Erasing FE.KEYID = 1
11,827,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,122,510 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,138,822 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,154,854 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,170,916 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,191,925 UART: [ldev] --
14,197,419 UART: [fwproc] Wait for Commands...
14,199,673 UART: [fwproc] Recv command 0x46574c44
14,201,971 UART: [fwproc] Recv'd Img size: 113844 bytes
18,298,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,376,717 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,445,491 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,761,797 >>> mbox cmd response: success
18,766,399 UART: [afmc] ++
18,766,984 UART: [afmc] CDI.KEYID = 6
18,768,165 UART: [afmc] SUBJECT.KEYID = 7
18,769,323 UART: [afmc] AUTHORITY.KEYID = 5
22,087,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,382,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,384,366 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,400,364 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,416,463 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,432,539 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,455,123 UART: [afmc] --
24,459,074 UART: [cold-reset] --
24,462,254 UART: [state] Locking Datavault
24,468,036 UART: [state] Locking PCR0, PCR1 and PCR31
24,469,732 UART: [state] Locking ICCM
24,472,145 UART: [exit] Launching FMC @ 0x40000130
24,480,804 UART:
24,481,031 UART: Running Caliptra FMC ...
24,482,129 UART:
24,482,286 UART: [state] CFI Enabled
24,489,894 UART: [fht] FMC Alias Private Key: 7
26,820,237 UART: [art] Extend RT PCRs Done
26,821,464 UART: [art] Lock RT PCRs Done
26,823,074 UART: [art] Populate DV Done
26,828,575 UART: [fht] FMC Alias Private Key: 7
26,830,229 UART: [art] Derive CDI
26,830,961 UART: [art] Store in in slot 0x4
26,874,091 UART: [art] Derive Key Pair
26,875,104 UART: [art] Store priv key in slot 0x5
30,117,145 UART: [art] Derive Key Pair - Done
30,130,193 UART: [art] Signing Cert with AUTHO
30,131,493 UART: RITY.KEYID = 7
32,411,320 UART: [art] Erasing AUTHORITY.KEYID = 7
32,412,824 UART: [art] PUB.X = 7AA0610355AC496FA06C7A14EE65C9E7FAD7C6745CD0F714896CBE12F1F39216EE49BCB06330EDDD316DD91233B073D2
32,420,126 UART: [art] PUB.Y = 004E2B7EF554BFAD6A1537B397D1856AF563AE23ADA731BAFD596216B4625DB5B1E303B9B1D110158E2935DEE9C86B92
32,427,343 UART: [art] SIG.R = FE227C2C5DDF1A643D52A7A060481C57E271F4A48AD1D7ABE7B178129E388BF8E3C05A36F2CB52EDFB69F02452E1FFC0
32,434,756 UART: [art] SIG.S = BE7B9302E0E350D1FDB130D14419C46E189E7CC4E714BFCA6A8167C038B991EA807FA9555AC6785D4AEBE72AACD64313
33,739,759 UART: Caliptra RT
33,740,468 UART: [state] CFI Enabled
33,857,526 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,282 UART:
1,558 UART: Running Caliptra ROM ...
2,665 UART:
6,674,033 UART: [state] CFI Enabled
6,686,552 UART: [state] LifecycleState = Production
6,688,297 UART: [state] DebugLocked = Yes
6,691,063 UART: [state] Starting the WD Timer 40000000 cycles
6,695,953 UART: [kat] SHA2-256
6,877,943 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,889,489 UART: [kat] ++
6,889,996 UART: [kat] sha1
6,900,657 UART: [kat] SHA2-256
6,903,722 UART: [kat] SHA2-384
6,909,918 UART: [kat] SHA2-512-ACC
6,912,533 UART: [kat] ECC-384
10,168,833 UART: [kat] HMAC-384Kdf
10,180,887 UART: [kat] LMS
11,254,035 UART: [kat] --
11,257,015 UART: [warm-reset] ++
11,262,043 UART: [warm-reset] --
11,267,150 UART: [state] Locking Datavault
11,272,068 UART: [state] Locking PCR0, PCR1 and PCR31
11,274,249 UART: [state] Locking ICCM
11,276,831 UART: [exit] Launching FMC @ 0x40000130
11,285,497 UART:
11,285,771 UART: Running Caliptra FMC ...
11,286,793 UART:
11,286,932 UART: [state] CFI Enabled
11,288,765 UART: [aliasrt :skip pcr extension
11,290,001 UART: [art] Extend RT PCRs Done
11,291,056 UART: [art] Lock RT PCRs Done
11,292,223 UART: [art] Populate DV Done
11,297,835 UART: [fht] FMC Alias Private Key: 7
11,299,574 UART: [art] Derive CDI
11,300,297 UART: [art] Store in in slot 0x4
11,342,627 UART: [art] Derive Key Pair
11,343,624 UART: [art] Store priv key in slot 0x5
14,585,770 UART: [art] Derive Key Pair - Done
14,598,768 UART: [art] Signing Cert with AUTHO
14,600,070 UART: RITY.KEYID = 7
16,878,872 UART: [art] Erasing AUTHORITY.KEYID = 7
16,880,388 UART: [art] PUB.X = 7AA0610355AC496FA06C7A14EE65C9E7FAD7C6745CD0F714896CBE12F1F39216EE49BCB06330EDDD316DD91233B073D2
16,887,660 UART: [art] PUB.Y = 004E2B7EF554BFAD6A1537B397D1856AF563AE23ADA731BAFD596216B4625DB5B1E303B9B1D110158E2935DEE9C86B92
16,894,850 UART: [art] SIG.R = FE227C2C5DDF1A643D52A7A060481C57E271F4A48AD1D7ABE7B178129E388BF8E3C05A36F2CB52EDFB69F02452E1FFC0
16,902,258 UART: [art] SIG.S = BE7B9302E0E350D1FDB130D14419C46E189E7CC4E714BFCA6A8167C038B991EA807FA9555AC6785D4AEBE72AACD64313
18,207,281 UART: Caliptra RT
18,207,991 UART: [state] CFI Enabled
18,497,285 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
191,573 UART:
191,953 UART: Running Caliptra ROM ...
193,148 UART:
193,306 UART: [state] CFI Enabled
263,267 UART: [state] LifecycleState = Production
265,071 UART: [state] DebugLocked = Yes
267,854 UART: [state] Starting the WD Timer 40000000 cycles
273,018 UART: [kat] SHA2-256
452,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,691 UART: [kat] ++
464,223 UART: [kat] sha1
475,430 UART: [kat] SHA2-256
478,520 UART: [kat] SHA2-384
485,295 UART: [kat] SHA2-512-ACC
488,255 UART: [kat] ECC-384
2,963,781 UART: [kat] HMAC-384Kdf
2,984,980 UART: [kat] LMS
3,514,505 UART: [kat] --
3,520,418 UART: [cold-reset] ++
3,522,634 UART: [fht] FHT @ 0x50003400
3,533,278 UART: [idev] ++
3,533,887 UART: [idev] CDI.KEYID = 6
3,534,776 UART: [idev] SUBJECT.KEYID = 7
3,535,899 UART: [idev] UDS.KEYID = 0
3,536,863 ready_for_fw is high
3,537,072 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,680,596 UART: [idev] Erasing UDS.KEYID = 0
6,042,859 UART: [idev] Sha1 KeyId Algorithm
6,065,982 UART: [idev] --
6,069,441 UART: [ldev] ++
6,070,013 UART: [ldev] CDI.KEYID = 6
6,070,930 UART: [ldev] SUBJECT.KEYID = 5
6,072,086 UART: [ldev] AUTHORITY.KEYID = 7
6,073,377 UART: [ldev] FE.KEYID = 1
6,113,983 UART: [ldev] Erasing FE.KEYID = 1
8,617,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,355 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,371,337 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,387,204 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,403,150 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,422,611 UART: [ldev] --
10,427,726 UART: [fwproc] Wait for Commands...
10,430,198 UART: [fwproc] Recv command 0x46574c44
10,432,307 UART: [fwproc] Recv'd Img size: 114168 bytes
13,860,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,759 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,000,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,317,914 >>> mbox cmd response: success
14,321,796 UART: [afmc] ++
14,322,380 UART: [afmc] CDI.KEYID = 6
14,323,445 UART: [afmc] SUBJECT.KEYID = 7
14,324,500 UART: [afmc] AUTHORITY.KEYID = 5
16,863,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,586,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,588,091 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,604,085 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,619,964 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,635,669 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,659,028 UART: [afmc] --
18,663,358 UART: [cold-reset] --
18,667,332 UART: [state] Locking Datavault
18,672,261 UART: [state] Locking PCR0, PCR1 and PCR31
18,673,905 UART: [state] Locking ICCM
18,676,324 UART: [exit] Launching FMC @ 0x40000130
18,684,780 UART:
18,685,017 UART: Running Caliptra FMC ...
18,686,124 UART:
18,686,291 UART: [state] CFI Enabled
18,745,699 UART: [fht] FMC Alias Private Key: 7
20,509,361 UART: [art] Extend RT PCRs Done
20,510,588 UART: [art] Lock RT PCRs Done
20,512,217 UART: [art] Populate DV Done
20,517,954 UART: [fht] FMC Alias Private Key: 7
20,519,705 UART: [art] Derive CDI
20,520,519 UART: [art] Store in in slot 0x4
20,578,167 UART: [art] Derive Key Pair
20,579,206 UART: [art] Store priv key in slot 0x5
23,041,980 UART: [art] Derive Key Pair - Done
23,055,137 UART: [art] Signing Cert with AUTHO
23,056,473 UART: RITY.KEYID = 7
24,768,647 UART: [art] Erasing AUTHORITY.KEYID = 7
24,770,153 UART: [art] PUB.X = 2CC0FFAD209C3E836A491660302B81BF184C74DE174004426522C904D2A12B8F993EBFC187ACD19FA281364552A70F94
24,777,406 UART: [art] PUB.Y = 0A2C5BCFE90F4D46782BB6932E0A844596FAC5B2C6CB42F00087F70D1DDEEB185C0CE9F97799D01BE5F24CC7C63B3775
24,784,691 UART: [art] SIG.R = 72AB0C066465025AB1598937227152497B7294695293E232CB7F80312AF77478ADF139867DF73689AAC2C8D98D7AAD2C
24,792,028 UART: [art] SIG.S = CF8C5AD567A88F640117D7E6E4D551AB405D22CD90B1301D629AB3CD5E4439EF2841AE9913CE54652930DF41B3C5D1DD
25,771,364 UART: Caliptra RT
25,772,078 UART: [state] CFI Enabled
25,937,201 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,267 UART:
1,476 UART: Running Caliptra ROM ...
2,625 UART:
2,782 UART: [state] CFI Enabled
62,042 UART: [state] LifecycleState = Production
63,764 UART: [state] DebugLocked = Yes
65,796 UART: [state] Starting the WD Timer 40000000 cycles
71,544 UART: [kat] SHA2-256
250,731 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,276 UART: [kat] ++
262,719 UART: [kat] sha1
274,726 UART: [kat] SHA2-256
277,788 UART: [kat] SHA2-384
283,979 UART: [kat] SHA2-512-ACC
286,921 UART: [kat] ECC-384
2,746,049 UART: [kat] HMAC-384Kdf
2,770,969 UART: [kat] LMS
3,300,447 UART: [kat] --
3,304,616 UART: [warm-reset] ++
3,310,012 UART: [warm-reset] --
3,313,126 UART: [state] Locking Datavault
3,316,163 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,813 UART: [state] Locking ICCM
3,318,882 UART: [exit] Launching FMC @ 0x40000130
3,327,286 UART:
3,327,528 UART: Running Caliptra FMC ...
3,328,636 UART:
3,328,796 UART: [state] CFI Enabled
3,380,624 UART: [aliasrt :skip pcr extension
3,381,916 UART: [art] Extend RT PCRs Done
3,383,066 UART: [art] Lock RT PCRs Done
3,384,194 UART: [art] Populate DV Done
3,389,606 UART: [fht] FMC Alias Private Key: 7
3,391,151 UART: [art] Derive CDI
3,391,989 UART: [art] Store in in slot 0x4
3,448,868 UART: [art] Derive Key Pair
3,449,908 UART: [art] Store priv key in slot 0x5
5,913,455 UART: [art] Derive Key Pair - Done
5,926,670 UART: [art] Signing Cert with AUTHO
5,927,977 UART: RITY.KEYID = 7
7,638,701 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,195 UART: [art] PUB.X = 2CC0FFAD209C3E836A491660302B81BF184C74DE174004426522C904D2A12B8F993EBFC187ACD19FA281364552A70F94
7,647,490 UART: [art] PUB.Y = 0A2C5BCFE90F4D46782BB6932E0A844596FAC5B2C6CB42F00087F70D1DDEEB185C0CE9F97799D01BE5F24CC7C63B3775
7,654,730 UART: [art] SIG.R = 72AB0C066465025AB1598937227152497B7294695293E232CB7F80312AF77478ADF139867DF73689AAC2C8D98D7AAD2C
7,662,069 UART: [art] SIG.S = CF8C5AD567A88F640117D7E6E4D551AB405D22CD90B1301D629AB3CD5E4439EF2841AE9913CE54652930DF41B3C5D1DD
8,641,330 UART: Caliptra RT
8,642,048 UART: [state] CFI Enabled
8,977,236 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
191,706 UART:
192,088 UART: Running Caliptra ROM ...
193,275 UART:
193,423 UART: [state] CFI Enabled
265,704 UART: [state] LifecycleState = Production
267,470 UART: [state] DebugLocked = Yes
270,463 UART: [state] Starting the WD Timer 40000000 cycles
276,202 UART: [kat] SHA2-256
455,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,912 UART: [kat] ++
467,447 UART: [kat] sha1
477,216 UART: [kat] SHA2-256
480,230 UART: [kat] SHA2-384
486,717 UART: [kat] SHA2-512-ACC
489,725 UART: [kat] ECC-384
2,949,111 UART: [kat] HMAC-384Kdf
2,972,509 UART: [kat] LMS
3,501,990 UART: [kat] --
3,508,907 UART: [cold-reset] ++
3,510,058 UART: [fht] FHT @ 0x50003400
3,519,757 UART: [idev] ++
3,520,340 UART: [idev] CDI.KEYID = 6
3,521,253 UART: [idev] SUBJECT.KEYID = 7
3,522,429 UART: [idev] UDS.KEYID = 0
3,523,352 ready_for_fw is high
3,523,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,108 UART: [idev] Erasing UDS.KEYID = 0
6,026,772 UART: [idev] Sha1 KeyId Algorithm
6,050,164 UART: [idev] --
6,054,220 UART: [ldev] ++
6,054,790 UART: [ldev] CDI.KEYID = 6
6,055,675 UART: [ldev] SUBJECT.KEYID = 5
6,056,892 UART: [ldev] AUTHORITY.KEYID = 7
6,058,105 UART: [ldev] FE.KEYID = 1
6,102,826 UART: [ldev] Erasing FE.KEYID = 1
8,603,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,643 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,359,654 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,375,471 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,391,444 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,412,178 UART: [ldev] --
10,415,994 UART: [fwproc] Wait for Commands...
10,418,148 UART: [fwproc] Recv command 0x46574c44
10,420,243 UART: [fwproc] Recv'd Img size: 114168 bytes
13,852,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,923,955 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,992,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,309,531 >>> mbox cmd response: success
14,312,996 UART: [afmc] ++
14,313,594 UART: [afmc] CDI.KEYID = 6
14,314,515 UART: [afmc] SUBJECT.KEYID = 7
14,315,676 UART: [afmc] AUTHORITY.KEYID = 5
16,853,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,611 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,464 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,593,449 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,609,307 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,625,097 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,646,271 UART: [afmc] --
18,650,389 UART: [cold-reset] --
18,653,063 UART: [state] Locking Datavault
18,659,830 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,528 UART: [state] Locking ICCM
18,663,814 UART: [exit] Launching FMC @ 0x40000130
18,672,264 UART:
18,672,497 UART: Running Caliptra FMC ...
18,673,531 UART:
18,673,674 UART: [state] CFI Enabled
18,734,095 UART: [fht] FMC Alias Private Key: 7
20,498,363 UART: [art] Extend RT PCRs Done
20,499,594 UART: [art] Lock RT PCRs Done
20,501,189 UART: [art] Populate DV Done
20,506,604 UART: [fht] FMC Alias Private Key: 7
20,508,195 UART: [art] Derive CDI
20,508,932 UART: [art] Store in in slot 0x4
20,567,050 UART: [art] Derive Key Pair
20,568,118 UART: [art] Store priv key in slot 0x5
23,031,161 UART: [art] Derive Key Pair - Done
23,043,730 UART: [art] Signing Cert with AUTHO
23,045,045 UART: RITY.KEYID = 7
24,756,850 UART: [art] Erasing AUTHORITY.KEYID = 7
24,758,352 UART: [art] PUB.X = 4F86160CE48E70AECA1532D4B530C13E666DC499BFB19FEAE8C0586C4BD5E0127DE6FCD969F5E0A7F7B4B503560B6D77
24,765,654 UART: [art] PUB.Y = 807F38DEFE1440EB2F19CBA075A0FF50E34EE52F2310E3925EF5661115E51286891D0A8A7A12EBF08334A08C7ED701CF
24,772,932 UART: [art] SIG.R = DECF429D1E4B350D1937C85C559BAAB78034C1858D200C5E5ED8C0D4435A2D9E0AF119508806FA318C1046953F8FE5A2
24,780,432 UART: [art] SIG.S = CF989522A19FCAE543959BA23C5AD97E55864C56EFF4CAB5E43BDDF5D4E58D34D57A9163AB1B4D57367AB711D5688608
25,758,702 UART: Caliptra RT
25,759,404 UART: [state] CFI Enabled
25,925,708 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,334 UART:
1,613 UART: Running Caliptra ROM ...
2,730 UART:
2,885 UART: [state] CFI Enabled
64,095 UART: [state] LifecycleState = Production
65,864 UART: [state] DebugLocked = Yes
68,036 UART: [state] Starting the WD Timer 40000000 cycles
73,305 UART: [kat] SHA2-256
252,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,028 UART: [kat] ++
264,562 UART: [kat] sha1
276,146 UART: [kat] SHA2-256
279,176 UART: [kat] SHA2-384
286,450 UART: [kat] SHA2-512-ACC
289,382 UART: [kat] ECC-384
2,748,794 UART: [kat] HMAC-384Kdf
2,771,230 UART: [kat] LMS
3,300,726 UART: [kat] --
3,303,872 UART: [warm-reset] ++
3,309,585 UART: [warm-reset] --
3,313,392 UART: [state] Locking Datavault
3,315,344 UART: [state] Locking PCR0, PCR1 and PCR31
3,316,995 UART: [state] Locking ICCM
3,318,526 UART: [exit] Launching FMC @ 0x40000130
3,326,917 UART:
3,327,152 UART: Running Caliptra FMC ...
3,328,181 UART:
3,328,328 UART: [state] CFI Enabled
3,381,090 UART: [aliasrt :skip pcr extension
3,382,391 UART: [art] Extend RT PCRs Done
3,383,461 UART: [art] Lock RT PCRs Done
3,384,584 UART: [art] Populate DV Done
3,390,425 UART: [fht] FMC Alias Private Key: 7
3,392,014 UART: [art] Derive CDI
3,392,754 UART: [art] Store in in slot 0x4
3,450,013 UART: [art] Derive Key Pair
3,451,060 UART: [art] Store priv key in slot 0x5
5,913,589 UART: [art] Derive Key Pair - Done
5,927,016 UART: [art] Signing Cert with AUTHO
5,928,323 UART: RITY.KEYID = 7
7,639,104 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,613 UART: [art] PUB.X = 4F86160CE48E70AECA1532D4B530C13E666DC499BFB19FEAE8C0586C4BD5E0127DE6FCD969F5E0A7F7B4B503560B6D77
7,647,906 UART: [art] PUB.Y = 807F38DEFE1440EB2F19CBA075A0FF50E34EE52F2310E3925EF5661115E51286891D0A8A7A12EBF08334A08C7ED701CF
7,655,178 UART: [art] SIG.R = DECF429D1E4B350D1937C85C559BAAB78034C1858D200C5E5ED8C0D4435A2D9E0AF119508806FA318C1046953F8FE5A2
7,662,611 UART: [art] SIG.S = CF989522A19FCAE543959BA23C5AD97E55864C56EFF4CAB5E43BDDF5D4E58D34D57A9163AB1B4D57367AB711D5688608
8,641,389 UART: Caliptra RT
8,642,080 UART: [state] CFI Enabled
8,974,219 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,079 UART:
192,507 UART: Running Caliptra ROM ...
193,638 UART:
603,376 UART: [state] CFI Enabled
616,035 UART: [state] LifecycleState = Production
617,752 UART: [state] DebugLocked = Yes
619,732 UART: [state] Starting the WD Timer 40000000 cycles
623,869 UART: [kat] SHA2-256
803,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,588 UART: [kat] ++
815,051 UART: [kat] sha1
825,664 UART: [kat] SHA2-256
828,669 UART: [kat] SHA2-384
834,584 UART: [kat] SHA2-512-ACC
837,524 UART: [kat] ECC-384
3,279,162 UART: [kat] HMAC-384Kdf
3,290,894 UART: [kat] LMS
3,820,391 UART: [kat] --
3,826,228 UART: [cold-reset] ++
3,828,678 UART: [fht] FHT @ 0x50003400
3,840,577 UART: [idev] ++
3,841,139 UART: [idev] CDI.KEYID = 6
3,842,132 UART: [idev] SUBJECT.KEYID = 7
3,843,305 UART: [idev] UDS.KEYID = 0
3,844,230 ready_for_fw is high
3,844,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,857 UART: [idev] Erasing UDS.KEYID = 0
6,316,561 UART: [idev] Sha1 KeyId Algorithm
6,338,539 UART: [idev] --
6,342,043 UART: [ldev] ++
6,342,611 UART: [ldev] CDI.KEYID = 6
6,343,521 UART: [ldev] SUBJECT.KEYID = 5
6,344,731 UART: [ldev] AUTHORITY.KEYID = 7
6,345,958 UART: [ldev] FE.KEYID = 1
6,356,438 UART: [ldev] Erasing FE.KEYID = 1
8,831,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,942 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,926 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,789 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,713 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,533 UART: [ldev] --
10,623,497 UART: [fwproc] Wait for Commands...
10,625,107 UART: [fwproc] Recv command 0x46574c44
10,627,223 UART: [fwproc] Recv'd Img size: 114168 bytes
14,049,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,507,257 >>> mbox cmd response: success
14,511,532 UART: [afmc] ++
14,512,122 UART: [afmc] CDI.KEYID = 6
14,513,031 UART: [afmc] SUBJECT.KEYID = 7
14,514,128 UART: [afmc] AUTHORITY.KEYID = 5
17,011,706 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,733,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,735,676 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,751,683 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,767,519 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,783,227 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,805,860 UART: [afmc] --
18,810,099 UART: [cold-reset] --
18,815,264 UART: [state] Locking Datavault
18,819,269 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,909 UART: [state] Locking ICCM
18,822,842 UART: [exit] Launching FMC @ 0x40000130
18,831,234 UART:
18,831,470 UART: Running Caliptra FMC ...
18,832,500 UART:
18,832,643 UART: [state] CFI Enabled
18,840,578 UART: [fht] FMC Alias Private Key: 7
20,596,902 UART: [art] Extend RT PCRs Done
20,598,102 UART: [art] Lock RT PCRs Done
20,599,749 UART: [art] Populate DV Done
20,604,884 UART: [fht] FMC Alias Private Key: 7
20,606,574 UART: [art] Derive CDI
20,607,400 UART: [art] Store in in slot 0x4
20,650,043 UART: [art] Derive Key Pair
20,651,081 UART: [art] Store priv key in slot 0x5
23,078,036 UART: [art] Derive Key Pair - Done
23,091,139 UART: [art] Signing Cert with AUTHO
23,092,456 UART: RITY.KEYID = 7
24,797,652 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,140 UART: [art] PUB.X = 37B464C256B84109B5059F5482D7F93DE9590E8C15F5B3F9F854F73051EE0FE205A0E7299C99107855FB7450A9C545A3
24,806,394 UART: [art] PUB.Y = E7249CC4BC3C005534BD98610DE319EBB1CB896F07575FA01E31724A82CFBD52D636C5C15E652E4BCE8C1706A8C3DD0B
24,813,635 UART: [art] SIG.R = 8BF0B68114D5BFEA7213C6BB2983E5A1C512D801B4275BF2ECBEBEB83F81B8DD7E27574B5531A13437500438992DD1F4
24,821,036 UART: [art] SIG.S = AAA12359E8B2E0E0BC6D328829226843F521B9417225D55833C7DD77062B43F49F3E47396797F28DBC1B73049B3E2C7C
25,800,156 UART: Caliptra RT
25,800,868 UART: [state] CFI Enabled
25,918,377 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,328 UART:
1,627 UART: Running Caliptra ROM ...
2,838 UART:
14,613,709 UART: [state] CFI Enabled
14,628,609 UART: [state] LifecycleState = Production
14,630,390 UART: [state] DebugLocked = Yes
14,632,360 UART: [state] Starting the WD Timer 40000000 cycles
14,637,529 UART: [kat] SHA2-256
14,816,718 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,828,251 UART: [kat] ++
14,828,788 UART: [kat] sha1
14,840,218 UART: [kat] SHA2-256
14,843,282 UART: [kat] SHA2-384
14,849,418 UART: [kat] SHA2-512-ACC
14,852,405 UART: [kat] ECC-384
17,293,144 UART: [kat] HMAC-384Kdf
17,305,369 UART: [kat] LMS
17,834,890 UART: [kat] --
17,838,892 UART: [warm-reset] ++
17,842,819 UART: [warm-reset] --
17,847,769 UART: [state] Locking Datavault
17,850,365 UART: [state] Locking PCR0, PCR1 and PCR31
17,852,063 UART: [state] Locking ICCM
17,853,516 UART: [exit] Launching FMC @ 0x40000130
17,861,965 UART:
17,862,206 UART: Running Caliptra FMC ...
17,863,306 UART:
17,863,458 UART: [state] CFI Enabled
17,865,346 UART: [aliasrt :skip pcr extension
17,866,583 UART: [art] Extend RT PCRs Done
17,867,713 UART: [art] Lock RT PCRs Done
17,868,771 UART: [art] Populate DV Done
17,874,172 UART: [fht] FMC Alias Private Key: 7
17,875,666 UART: [art] Derive CDI
17,876,477 UART: [art] Store in in slot 0x4
17,919,342 UART: [art] Derive Key Pair
17,920,385 UART: [art] Store priv key in slot 0x5
20,346,752 UART: [art] Derive Key Pair - Done
20,359,686 UART: [art] Signing Cert with AUTHO
20,360,989 UART: RITY.KEYID = 7
22,066,956 UART: [art] Erasing AUTHORITY.KEYID = 7
22,068,462 UART: [art] PUB.X = 37B464C256B84109B5059F5482D7F93DE9590E8C15F5B3F9F854F73051EE0FE205A0E7299C99107855FB7450A9C545A3
22,075,706 UART: [art] PUB.Y = E7249CC4BC3C005534BD98610DE319EBB1CB896F07575FA01E31724A82CFBD52D636C5C15E652E4BCE8C1706A8C3DD0B
22,082,953 UART: [art] SIG.R = 8BF0B68114D5BFEA7213C6BB2983E5A1C512D801B4275BF2ECBEBEB83F81B8DD7E27574B5531A13437500438992DD1F4
22,090,350 UART: [art] SIG.S = AAA12359E8B2E0E0BC6D328829226843F521B9417225D55833C7DD77062B43F49F3E47396797F28DBC1B73049B3E2C7C
23,069,669 UART: Caliptra RT
23,070,357 UART: [state] CFI Enabled
23,359,003 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
191,811 UART:
192,184 UART: Running Caliptra ROM ...
193,275 UART:
603,028 UART: [state] CFI Enabled
617,533 UART: [state] LifecycleState = Production
619,308 UART: [state] DebugLocked = Yes
621,225 UART: [state] Starting the WD Timer 40000000 cycles
626,317 UART: [kat] SHA2-256
805,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,057 UART: [kat] ++
817,590 UART: [kat] sha1
828,229 UART: [kat] SHA2-256
831,212 UART: [kat] SHA2-384
836,002 UART: [kat] SHA2-512-ACC
838,946 UART: [kat] ECC-384
3,277,757 UART: [kat] HMAC-384Kdf
3,291,479 UART: [kat] LMS
3,821,010 UART: [kat] --
3,826,531 UART: [cold-reset] ++
3,828,677 UART: [fht] FHT @ 0x50003400
3,840,010 UART: [idev] ++
3,840,580 UART: [idev] CDI.KEYID = 6
3,841,462 UART: [idev] SUBJECT.KEYID = 7
3,842,704 UART: [idev] UDS.KEYID = 0
3,843,631 ready_for_fw is high
3,843,819 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,571 UART: [idev] Erasing UDS.KEYID = 0
6,316,417 UART: [idev] Sha1 KeyId Algorithm
6,339,237 UART: [idev] --
6,343,631 UART: [ldev] ++
6,344,217 UART: [ldev] CDI.KEYID = 6
6,345,157 UART: [ldev] SUBJECT.KEYID = 5
6,346,317 UART: [ldev] AUTHORITY.KEYID = 7
6,347,547 UART: [ldev] FE.KEYID = 1
6,360,083 UART: [ldev] Erasing FE.KEYID = 1
8,833,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,293 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,564,282 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,580,133 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,596,112 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,615,149 UART: [ldev] --
10,619,875 UART: [fwproc] Wait for Commands...
10,621,531 UART: [fwproc] Recv command 0x46574c44
10,623,566 UART: [fwproc] Recv'd Img size: 114168 bytes
14,054,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,132,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,201,334 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,518,428 >>> mbox cmd response: success
14,522,562 UART: [afmc] ++
14,523,143 UART: [afmc] CDI.KEYID = 6
14,524,029 UART: [afmc] SUBJECT.KEYID = 7
14,525,192 UART: [afmc] AUTHORITY.KEYID = 5
17,023,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,743,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,745,005 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,760,974 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,776,815 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,792,590 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,814,458 UART: [afmc] --
18,817,730 UART: [cold-reset] --
18,821,971 UART: [state] Locking Datavault
18,827,529 UART: [state] Locking PCR0, PCR1 and PCR31
18,829,184 UART: [state] Locking ICCM
18,831,032 UART: [exit] Launching FMC @ 0x40000130
18,839,429 UART:
18,839,670 UART: Running Caliptra FMC ...
18,840,764 UART:
18,840,921 UART: [state] CFI Enabled
18,849,019 UART: [fht] FMC Alias Private Key: 7
20,605,663 UART: [art] Extend RT PCRs Done
20,606,886 UART: [art] Lock RT PCRs Done
20,608,214 UART: [art] Populate DV Done
20,613,738 UART: [fht] FMC Alias Private Key: 7
20,615,322 UART: [art] Derive CDI
20,616,055 UART: [art] Store in in slot 0x4
20,658,864 UART: [art] Derive Key Pair
20,660,069 UART: [art] Store priv key in slot 0x5
23,086,547 UART: [art] Derive Key Pair - Done
23,099,432 UART: [art] Signing Cert with AUTHO
23,100,759 UART: RITY.KEYID = 7
24,806,070 UART: [art] Erasing AUTHORITY.KEYID = 7
24,807,583 UART: [art] PUB.X = B1CFE8333FFA117FD0BAF06D2A21D8DCD0885C9CBB009C1A32836CC1BA9EC3C5C26C04FCBFCF21CAC8FF21D73BA778AD
24,814,912 UART: [art] PUB.Y = 695388A2F6FA5C3638A86B2C2120265FDC018F13A80A24D918CEEDE2A4A39D35A4082E11D3704EE34F322EE53F9D2C06
24,822,138 UART: [art] SIG.R = 164EFD8A38616265283DE4B3D36CD0E20BAD73E9756528DBB888B2281587BCB7B8DE01DC69F618DB957E31C5D2EA8749
24,829,557 UART: [art] SIG.S = 963EDC509CDE03ABDA3745C6C8010FF4764C0DFB6A0B020C43CE64179319D44948B2712350A3FD5512E2868C4B6FCE44
25,808,309 UART: Caliptra RT
25,809,008 UART: [state] CFI Enabled
25,926,287 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,313 UART:
1,592 UART: Running Caliptra ROM ...
2,702 UART:
14,606,960 UART: [state] CFI Enabled
14,618,513 UART: [state] LifecycleState = Production
14,620,269 UART: [state] DebugLocked = Yes
14,622,627 UART: [state] Starting the WD Timer 40000000 cycles
14,627,410 UART: [kat] SHA2-256
14,806,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,818,117 UART: [kat] ++
14,818,581 UART: [kat] sha1
14,831,513 UART: [kat] SHA2-256
14,834,536 UART: [kat] SHA2-384
14,841,983 UART: [kat] SHA2-512-ACC
14,844,980 UART: [kat] ECC-384
17,290,313 UART: [kat] HMAC-384Kdf
17,303,670 UART: [kat] LMS
17,833,184 UART: [kat] --
17,838,386 UART: [warm-reset] ++
17,843,666 UART: [warm-reset] --
17,848,290 UART: [state] Locking Datavault
17,851,586 UART: [state] Locking PCR0, PCR1 and PCR31
17,853,262 UART: [state] Locking ICCM
17,855,630 UART: [exit] Launching FMC @ 0x40000130
17,864,080 UART:
17,864,322 UART: Running Caliptra FMC ...
17,865,423 UART:
17,865,577 UART: [state] CFI Enabled
17,867,519 UART: [aliasrt :skip pcr extension
17,868,758 UART: [art] Extend RT PCRs Done
17,869,891 UART: [art] Lock RT PCRs Done
17,871,115 UART: [art] Populate DV Done
17,876,621 UART: [fht] FMC Alias Private Key: 7
17,878,261 UART: [art] Derive CDI
17,879,066 UART: [art] Store in in slot 0x4
17,921,713 UART: [art] Derive Key Pair
17,922,710 UART: [art] Store priv key in slot 0x5
20,349,535 UART: [art] Derive Key Pair - Done
20,362,399 UART: [art] Signing Cert with AUTHO
20,363,711 UART: RITY.KEYID = 7
22,069,058 UART: [art] Erasing AUTHORITY.KEYID = 7
22,070,579 UART: [art] PUB.X = B1CFE8333FFA117FD0BAF06D2A21D8DCD0885C9CBB009C1A32836CC1BA9EC3C5C26C04FCBFCF21CAC8FF21D73BA778AD
22,077,848 UART: [art] PUB.Y = 695388A2F6FA5C3638A86B2C2120265FDC018F13A80A24D918CEEDE2A4A39D35A4082E11D3704EE34F322EE53F9D2C06
22,085,109 UART: [art] SIG.R = 164EFD8A38616265283DE4B3D36CD0E20BAD73E9756528DBB888B2281587BCB7B8DE01DC69F618DB957E31C5D2EA8749
22,092,508 UART: [art] SIG.S = 963EDC509CDE03ABDA3745C6C8010FF4764C0DFB6A0B020C43CE64179319D44948B2712350A3FD5512E2868C4B6FCE44
23,071,190 UART: Caliptra RT
23,071,902 UART: [state] CFI Enabled
23,361,749 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
191,639 UART:
192,014 UART: Running Caliptra ROM ...
193,223 UART:
193,393 UART: [state] CFI Enabled
264,557 UART: [state] LifecycleState = Production
266,303 UART: [state] DebugLocked = Yes
268,157 UART: [state] Starting the WD Timer 40000000 cycles
272,547 UART: [kat] SHA2-256
451,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,252 UART: [kat] ++
463,782 UART: [kat] sha1
476,244 UART: [kat] SHA2-256
479,328 UART: [kat] SHA2-384
484,822 UART: [kat] SHA2-512-ACC
487,754 UART: [kat] ECC-384
2,949,607 UART: [kat] HMAC-384Kdf
2,970,801 UART: [kat] LMS
3,500,252 UART: [kat] --
3,504,409 UART: [cold-reset] ++
3,505,870 UART: [fht] FHT @ 0x50003400
3,517,925 UART: [idev] ++
3,518,501 UART: [idev] CDI.KEYID = 6
3,519,422 UART: [idev] SUBJECT.KEYID = 7
3,520,596 UART: [idev] UDS.KEYID = 0
3,521,642 ready_for_fw is high
3,521,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,437 UART: [idev] Erasing UDS.KEYID = 0
6,024,079 UART: [idev] Sha1 KeyId Algorithm
6,045,850 UART: [idev] --
6,048,283 UART: [ldev] ++
6,048,852 UART: [ldev] CDI.KEYID = 6
6,049,763 UART: [ldev] SUBJECT.KEYID = 5
6,050,975 UART: [ldev] AUTHORITY.KEYID = 7
6,052,205 UART: [ldev] FE.KEYID = 1
6,099,684 UART: [ldev] Erasing FE.KEYID = 1
8,601,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,780 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,335,770 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,351,601 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,367,539 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,386,807 UART: [ldev] --
10,391,961 UART: [fwproc] Wait for Commands...
10,394,809 UART: [fwproc] Recv command 0x46574c44
10,396,906 UART: [fwproc] Recv'd Img size: 114168 bytes
13,828,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,284,737 >>> mbox cmd response: success
14,288,169 UART: [afmc] ++
14,288,765 UART: [afmc] CDI.KEYID = 6
14,289,674 UART: [afmc] SUBJECT.KEYID = 7
14,290,849 UART: [afmc] AUTHORITY.KEYID = 5
16,822,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,012 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,566,017 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,581,843 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,597,602 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,620,391 UART: [afmc] --
18,625,002 UART: [cold-reset] --
18,628,816 UART: [state] Locking Datavault
18,633,954 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,653 UART: [state] Locking ICCM
18,637,264 UART: [exit] Launching FMC @ 0x40000130
18,645,724 UART:
18,645,960 UART: Running Caliptra FMC ...
18,647,057 UART:
18,647,233 UART: [state] CFI Enabled
18,707,165 UART: [fht] FMC Alias Private Key: 7
20,471,421 UART: [art] Extend RT PCRs Done
20,472,645 UART: [art] Lock RT PCRs Done
20,474,210 UART: [art] Populate DV Done
20,479,458 UART: [fht] FMC Alias Private Key: 7
20,480,996 UART: [art] Derive CDI
20,481,757 UART: [art] Store in in slot 0x4
20,540,155 UART: [art] Derive Key Pair
20,541,197 UART: [art] Store priv key in slot 0x5
23,003,882 UART: [art] Derive Key Pair - Done
23,016,936 UART: [art] Signing Cert with AUTHO
23,018,238 UART: RITY.KEYID = 7
24,729,670 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,174 UART: [art] PUB.X = 0C17D6DF80A8B2A9649BC7261682CC5636243960642897E4A67829D56E8D997C788FAADC839665298490338D10E0B137
24,738,418 UART: [art] PUB.Y = 2FD5D73DE70B7CD8C5DF26524189890B8998476B83969E5A504CC01B85A89A26485DDE402AB944841218E95D58E6312C
24,745,642 UART: [art] SIG.R = 73C1EACFA87C171024A1A398822DE733ACD454A08E2E8292CEFFC08B8945290E8148BB80BA6EB69EC1C6DF6FE57A49EC
24,753,044 UART: [art] SIG.S = 002B013F02269E00E9BA0C5BFDEA54C9E45087C576692B77EE1688ADBFBFEA5BDE2492CF61CDBE9138C65CC8FBC8D5F1
25,732,456 UART: Caliptra RT
25,733,154 UART: [state] CFI Enabled
25,896,435 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,280 UART:
1,559 UART: Running Caliptra ROM ...
2,672 UART:
2,825 UART: [state] CFI Enabled
65,983 UART: [state] LifecycleState = Production
67,749 UART: [state] DebugLocked = Yes
69,222 UART: [state] Starting the WD Timer 40000000 cycles
74,111 UART: [kat] SHA2-256
253,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,821 UART: [kat] ++
265,372 UART: [kat] sha1
277,662 UART: [kat] SHA2-256
280,670 UART: [kat] SHA2-384
286,269 UART: [kat] SHA2-512-ACC
289,239 UART: [kat] ECC-384
2,748,989 UART: [kat] HMAC-384Kdf
2,772,226 UART: [kat] LMS
3,301,694 UART: [kat] --
3,307,357 UART: [warm-reset] ++
3,310,800 UART: [warm-reset] --
3,316,014 UART: [state] Locking Datavault
3,318,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,320,479 UART: [state] Locking ICCM
3,322,303 UART: [exit] Launching FMC @ 0x40000130
3,330,748 UART:
3,331,013 UART: Running Caliptra FMC ...
3,332,064 UART:
3,332,220 UART: [state] CFI Enabled
3,381,350 UART: [aliasrt :skip pcr extension
3,382,601 UART: [art] Extend RT PCRs Done
3,383,660 UART: [art] Lock RT PCRs Done
3,384,938 UART: [art] Populate DV Done
3,390,560 UART: [fht] FMC Alias Private Key: 7
3,392,094 UART: [art] Derive CDI
3,392,910 UART: [art] Store in in slot 0x4
3,450,281 UART: [art] Derive Key Pair
3,451,327 UART: [art] Store priv key in slot 0x5
5,914,238 UART: [art] Derive Key Pair - Done
5,927,349 UART: [art] Signing Cert with AUTHO
5,928,651 UART: RITY.KEYID = 7
7,639,861 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,369 UART: [art] PUB.X = 0C17D6DF80A8B2A9649BC7261682CC5636243960642897E4A67829D56E8D997C788FAADC839665298490338D10E0B137
7,648,629 UART: [art] PUB.Y = 2FD5D73DE70B7CD8C5DF26524189890B8998476B83969E5A504CC01B85A89A26485DDE402AB944841218E95D58E6312C
7,655,820 UART: [art] SIG.R = 73C1EACFA87C171024A1A398822DE733ACD454A08E2E8292CEFFC08B8945290E8148BB80BA6EB69EC1C6DF6FE57A49EC
7,663,268 UART: [art] SIG.S = 002B013F02269E00E9BA0C5BFDEA54C9E45087C576692B77EE1688ADBFBFEA5BDE2492CF61CDBE9138C65CC8FBC8D5F1
8,642,171 UART: Caliptra RT
8,642,882 UART: [state] CFI Enabled
8,978,030 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
191,612 UART:
191,988 UART: Running Caliptra ROM ...
193,177 UART:
193,347 UART: [state] CFI Enabled
266,685 UART: [state] LifecycleState = Production
268,370 UART: [state] DebugLocked = Yes
271,374 UART: [state] Starting the WD Timer 40000000 cycles
276,986 UART: [kat] SHA2-256
456,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,707 UART: [kat] ++
468,263 UART: [kat] sha1
479,238 UART: [kat] SHA2-256
482,323 UART: [kat] SHA2-384
487,670 UART: [kat] SHA2-512-ACC
490,604 UART: [kat] ECC-384
2,950,584 UART: [kat] HMAC-384Kdf
2,973,757 UART: [kat] LMS
3,503,222 UART: [kat] --
3,507,077 UART: [cold-reset] ++
3,508,322 UART: [fht] FHT @ 0x50003400
3,519,318 UART: [idev] ++
3,519,878 UART: [idev] CDI.KEYID = 6
3,520,759 UART: [idev] SUBJECT.KEYID = 7
3,521,944 UART: [idev] UDS.KEYID = 0
3,522,905 ready_for_fw is high
3,523,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,653 UART: [idev] Erasing UDS.KEYID = 0
6,028,173 UART: [idev] Sha1 KeyId Algorithm
6,051,086 UART: [idev] --
6,055,901 UART: [ldev] ++
6,056,475 UART: [ldev] CDI.KEYID = 6
6,057,387 UART: [ldev] SUBJECT.KEYID = 5
6,058,551 UART: [ldev] AUTHORITY.KEYID = 7
6,059,837 UART: [ldev] FE.KEYID = 1
6,099,975 UART: [ldev] Erasing FE.KEYID = 1
8,605,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,656 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,649 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,469 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,391 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,759 UART: [ldev] --
10,414,484 UART: [fwproc] Wait for Commands...
10,416,308 UART: [fwproc] Recv command 0x46574c44
10,418,399 UART: [fwproc] Recv'd Img size: 114168 bytes
13,855,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,996,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,312,837 >>> mbox cmd response: success
14,317,273 UART: [afmc] ++
14,317,868 UART: [afmc] CDI.KEYID = 6
14,318,944 UART: [afmc] SUBJECT.KEYID = 7
14,320,071 UART: [afmc] AUTHORITY.KEYID = 5
16,852,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,576,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,149 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,594,161 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,610,036 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,625,750 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,649,068 UART: [afmc] --
18,652,329 UART: [cold-reset] --
18,655,707 UART: [state] Locking Datavault
18,661,654 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,358 UART: [state] Locking ICCM
18,664,537 UART: [exit] Launching FMC @ 0x40000130
18,672,943 UART:
18,673,218 UART: Running Caliptra FMC ...
18,674,252 UART:
18,674,423 UART: [state] CFI Enabled
18,735,381 UART: [fht] FMC Alias Private Key: 7
20,499,724 UART: [art] Extend RT PCRs Done
20,500,933 UART: [art] Lock RT PCRs Done
20,503,060 UART: [art] Populate DV Done
20,509,074 UART: [fht] FMC Alias Private Key: 7
20,510,464 UART: [art] Derive CDI
20,511,211 UART: [art] Store in in slot 0x4
20,567,820 UART: [art] Derive Key Pair
20,568,822 UART: [art] Store priv key in slot 0x5
23,031,550 UART: [art] Derive Key Pair - Done
23,044,225 UART: [art] Signing Cert with AUTHO
23,045,539 UART: RITY.KEYID = 7
24,757,626 UART: [art] Erasing AUTHORITY.KEYID = 7
24,759,131 UART: [art] PUB.X = F19EA3B3E0775F2F0C098A46AF4AEFAAA9CC889A997858CA0B1A2150C79833975413AADB2F0A3B8543ECECF1A6858A40
24,766,383 UART: [art] PUB.Y = 94104BF33A0B117569B6FE87B152CE444B8D1BFA2CAC4B4935D00A70558D42E70DABD5083AA9D5A7A58CF6F2E886AAA5
24,773,631 UART: [art] SIG.R = 0E7A5230A62AF4DE01C319310E5ADD0A41BDAA18F64527869EC186E8F447A0803CE1449DD393171ABA9369FBA2E2BDC0
24,781,027 UART: [art] SIG.S = 2ADFA2056CBD92D9216913E8D214200A085FDB8C55CCDC3A0B11D70A77ACB8FB01B3D3519E1348DC74335C334D8AB6FB
25,760,022 UART: Caliptra RT
25,760,740 UART: [state] CFI Enabled
25,926,455 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,311 UART:
1,593 UART: Running Caliptra ROM ...
2,645 UART:
2,791 UART: [state] CFI Enabled
68,199 UART: [state] LifecycleState = Production
69,962 UART: [state] DebugLocked = Yes
71,515 UART: [state] Starting the WD Timer 40000000 cycles
76,356 UART: [kat] SHA2-256
255,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
267,066 UART: [kat] ++
267,535 UART: [kat] sha1
279,004 UART: [kat] SHA2-256
282,011 UART: [kat] SHA2-384
288,053 UART: [kat] SHA2-512-ACC
290,991 UART: [kat] ECC-384
2,746,692 UART: [kat] HMAC-384Kdf
2,771,653 UART: [kat] LMS
3,301,116 UART: [kat] --
3,307,829 UART: [warm-reset] ++
3,310,948 UART: [warm-reset] --
3,314,972 UART: [state] Locking Datavault
3,317,362 UART: [state] Locking PCR0, PCR1 and PCR31
3,319,065 UART: [state] Locking ICCM
3,321,164 UART: [exit] Launching FMC @ 0x40000130
3,329,566 UART:
3,329,803 UART: Running Caliptra FMC ...
3,330,925 UART:
3,331,086 UART: [state] CFI Enabled
3,380,754 UART: [aliasrt :skip pcr extension
3,382,041 UART: [art] Extend RT PCRs Done
3,383,194 UART: [art] Lock RT PCRs Done
3,384,483 UART: [art] Populate DV Done
3,390,103 UART: [fht] FMC Alias Private Key: 7
3,391,747 UART: [art] Derive CDI
3,392,563 UART: [art] Store in in slot 0x4
3,449,548 UART: [art] Derive Key Pair
3,450,551 UART: [art] Store priv key in slot 0x5
5,913,919 UART: [art] Derive Key Pair - Done
5,927,077 UART: [art] Signing Cert with AUTHO
5,928,391 UART: RITY.KEYID = 7
7,639,886 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,389 UART: [art] PUB.X = F19EA3B3E0775F2F0C098A46AF4AEFAAA9CC889A997858CA0B1A2150C79833975413AADB2F0A3B8543ECECF1A6858A40
7,648,714 UART: [art] PUB.Y = 94104BF33A0B117569B6FE87B152CE444B8D1BFA2CAC4B4935D00A70558D42E70DABD5083AA9D5A7A58CF6F2E886AAA5
7,655,952 UART: [art] SIG.R = 0E7A5230A62AF4DE01C319310E5ADD0A41BDAA18F64527869EC186E8F447A0803CE1449DD393171ABA9369FBA2E2BDC0
7,663,343 UART: [art] SIG.S = 2ADFA2056CBD92D9216913E8D214200A085FDB8C55CCDC3A0B11D70A77ACB8FB01B3D3519E1348DC74335C334D8AB6FB
8,642,420 UART: Caliptra RT
8,643,116 UART: [state] CFI Enabled
8,981,854 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
191,874 UART:
192,232 UART: Running Caliptra ROM ...
193,416 UART:
602,973 UART: [state] CFI Enabled
616,841 UART: [state] LifecycleState = Production
618,594 UART: [state] DebugLocked = Yes
621,355 UART: [state] Starting the WD Timer 40000000 cycles
626,267 UART: [kat] SHA2-256
805,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,982 UART: [kat] ++
817,425 UART: [kat] sha1
828,387 UART: [kat] SHA2-256
831,395 UART: [kat] SHA2-384
838,303 UART: [kat] SHA2-512-ACC
841,259 UART: [kat] ECC-384
3,282,044 UART: [kat] HMAC-384Kdf
3,294,490 UART: [kat] LMS
3,823,968 UART: [kat] --
3,828,539 UART: [cold-reset] ++
3,830,283 UART: [fht] FHT @ 0x50003400
3,840,915 UART: [idev] ++
3,841,474 UART: [idev] CDI.KEYID = 6
3,842,426 UART: [idev] SUBJECT.KEYID = 7
3,843,598 UART: [idev] UDS.KEYID = 0
3,844,566 ready_for_fw is high
3,844,753 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,101 UART: [idev] Erasing UDS.KEYID = 0
6,315,298 UART: [idev] Sha1 KeyId Algorithm
6,338,693 UART: [idev] --
6,341,062 UART: [ldev] ++
6,341,656 UART: [ldev] CDI.KEYID = 6
6,342,542 UART: [ldev] SUBJECT.KEYID = 5
6,343,618 UART: [ldev] AUTHORITY.KEYID = 7
6,344,950 UART: [ldev] FE.KEYID = 1
6,356,918 UART: [ldev] Erasing FE.KEYID = 1
8,832,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,099 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,567,097 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,917 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,855 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,618,065 UART: [ldev] --
10,622,897 UART: [fwproc] Wait for Commands...
10,625,532 UART: [fwproc] Recv command 0x46574c44
10,627,515 UART: [fwproc] Recv'd Img size: 114168 bytes
14,064,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,133,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,202,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,520,094 >>> mbox cmd response: success
14,525,066 UART: [afmc] ++
14,525,656 UART: [afmc] CDI.KEYID = 6
14,526,567 UART: [afmc] SUBJECT.KEYID = 7
14,527,729 UART: [afmc] AUTHORITY.KEYID = 5
17,025,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,745,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,746,925 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,762,874 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,778,750 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,794,513 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,817,113 UART: [afmc] --
18,820,151 UART: [cold-reset] --
18,824,336 UART: [state] Locking Datavault
18,827,903 UART: [state] Locking PCR0, PCR1 and PCR31
18,829,561 UART: [state] Locking ICCM
18,830,955 UART: [exit] Launching FMC @ 0x40000130
18,839,351 UART:
18,839,584 UART: Running Caliptra FMC ...
18,840,688 UART:
18,840,847 UART: [state] CFI Enabled
18,848,895 UART: [fht] FMC Alias Private Key: 7
20,605,640 UART: [art] Extend RT PCRs Done
20,606,846 UART: [art] Lock RT PCRs Done
20,608,197 UART: [art] Populate DV Done
20,613,336 UART: [fht] FMC Alias Private Key: 7
20,615,029 UART: [art] Derive CDI
20,615,842 UART: [art] Store in in slot 0x4
20,658,054 UART: [art] Derive Key Pair
20,659,096 UART: [art] Store priv key in slot 0x5
23,085,465 UART: [art] Derive Key Pair - Done
23,098,592 UART: [art] Signing Cert with AUTHO
23,099,892 UART: RITY.KEYID = 7
24,805,231 UART: [art] Erasing AUTHORITY.KEYID = 7
24,806,725 UART: [art] PUB.X = D34B4FCBB7CE91995A68A8C64E2B2D25FAE5B31B0830BCEDF02B3A89E4380EF660C5AFA97BE3922BC85D8C724EA9CC52
24,814,035 UART: [art] PUB.Y = 70967334B02FA2AA2F0BCA5526EFBB7E639B10B2B02ADDE531F4D742168A7CE0592E027D42CE12230DF228D8AE411BC5
24,821,335 UART: [art] SIG.R = 7543CE3B023C523AF16F7D7E2E26B71D2D1E1B3ADDFFDAF085AC4F59665FCCE09396CC52BC9349B1B44483A75771860F
24,828,749 UART: [art] SIG.S = 7D9613E2DF9D4079F1DDF966A9D852BFA2B85A94601BD8F8BE325A490839B3D70CA78CC16D6271C694E026E21DD3777F
25,807,617 UART: Caliptra RT
25,808,333 UART: [state] CFI Enabled
25,925,851 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,317 UART:
1,520 UART: Running Caliptra ROM ...
2,545 UART:
14,602,701 UART: [state] CFI Enabled
14,615,613 UART: [state] LifecycleState = Production
14,617,565 UART: [state] DebugLocked = Yes
14,619,061 UART: [state] Starting the WD Timer 40000000 cycles
14,623,957 UART: [kat] SHA2-256
14,803,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,814,671 UART: [kat] ++
14,815,208 UART: [kat] sha1
14,825,989 UART: [kat] SHA2-256
14,829,049 UART: [kat] SHA2-384
14,835,245 UART: [kat] SHA2-512-ACC
14,838,194 UART: [kat] ECC-384
17,279,644 UART: [kat] HMAC-384Kdf
17,291,545 UART: [kat] LMS
17,821,057 UART: [kat] --
17,826,252 UART: [warm-reset] ++
17,831,851 UART: [warm-reset] --
17,835,496 UART: [state] Locking Datavault
17,838,222 UART: [state] Locking PCR0, PCR1 and PCR31
17,839,868 UART: [state] Locking ICCM
17,842,501 UART: [exit] Launching FMC @ 0x40000130
17,850,947 UART:
17,851,181 UART: Running Caliptra FMC ...
17,852,280 UART:
17,852,436 UART: [state] CFI Enabled
17,854,542 UART: [aliasrt :skip pcr extension
17,855,787 UART: [art] Extend RT PCRs Done
17,856,924 UART: [art] Lock RT PCRs Done
17,858,098 UART: [art] Populate DV Done
17,863,661 UART: [fht] FMC Alias Private Key: 7
17,865,297 UART: [art] Derive CDI
17,866,103 UART: [art] Store in in slot 0x4
17,908,760 UART: [art] Derive Key Pair
17,909,790 UART: [art] Store priv key in slot 0x5
20,336,539 UART: [art] Derive Key Pair - Done
20,349,637 UART: [art] Signing Cert with AUTHO
20,350,935 UART: RITY.KEYID = 7
22,056,596 UART: [art] Erasing AUTHORITY.KEYID = 7
22,058,286 UART: [art] PUB.X = D34B4FCBB7CE91995A68A8C64E2B2D25FAE5B31B0830BCEDF02B3A89E4380EF660C5AFA97BE3922BC85D8C724EA9CC52
22,065,417 UART: [art] PUB.Y = 70967334B02FA2AA2F0BCA5526EFBB7E639B10B2B02ADDE531F4D742168A7CE0592E027D42CE12230DF228D8AE411BC5
22,072,678 UART: [art] SIG.R = 7543CE3B023C523AF16F7D7E2E26B71D2D1E1B3ADDFFDAF085AC4F59665FCCE09396CC52BC9349B1B44483A75771860F
22,080,036 UART: [art] SIG.S = 7D9613E2DF9D4079F1DDF966A9D852BFA2B85A94601BD8F8BE325A490839B3D70CA78CC16D6271C694E026E21DD3777F
23,058,588 UART: Caliptra RT
23,059,277 UART: [state] CFI Enabled
23,349,707 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,937 writing to cptra_bootfsm_go
193,547 UART:
193,914 UART: Running Caliptra ROM ...
195,008 UART:
604,809 UART: [state] CFI Enabled
617,611 UART: [state] LifecycleState = Production
619,404 UART: [state] DebugLocked = Yes
621,395 UART: [state] Starting the WD Timer 40000000 cycles
626,000 UART: [kat] SHA2-256
805,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,684 UART: [kat] ++
817,129 UART: [kat] sha1
828,449 UART: [kat] SHA2-256
831,451 UART: [kat] SHA2-384
837,367 UART: [kat] SHA2-512-ACC
840,296 UART: [kat] ECC-384
3,283,382 UART: [kat] HMAC-384Kdf
3,295,563 UART: [kat] LMS
3,825,092 UART: [kat] --
3,829,463 UART: [cold-reset] ++
3,831,035 UART: [fht] FHT @ 0x50003400
3,840,755 UART: [idev] ++
3,841,335 UART: [idev] CDI.KEYID = 6
3,842,497 UART: [idev] SUBJECT.KEYID = 7
3,843,638 UART: [idev] UDS.KEYID = 0
3,844,565 ready_for_fw is high
3,844,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,113 UART: [idev] Erasing UDS.KEYID = 0
6,317,331 UART: [idev] Sha1 KeyId Algorithm
6,339,042 UART: [idev] --
6,343,552 UART: [ldev] ++
6,344,125 UART: [ldev] CDI.KEYID = 6
6,345,181 UART: [ldev] SUBJECT.KEYID = 5
6,346,283 UART: [ldev] AUTHORITY.KEYID = 7
6,347,506 UART: [ldev] FE.KEYID = 1
6,355,666 UART: [ldev] Erasing FE.KEYID = 1
8,833,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,541 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,568,576 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,584,391 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,600,285 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,811 UART: [ldev] --
10,623,986 UART: [fwproc] Wait for Commands...
10,625,535 UART: [fwproc] Recv command 0x46574c44
10,627,629 UART: [fwproc] Recv'd Img size: 114168 bytes
14,065,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,137,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,206,650 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,523,664 >>> mbox cmd response: success
14,528,469 UART: [afmc] ++
14,529,059 UART: [afmc] CDI.KEYID = 6
14,529,974 UART: [afmc] SUBJECT.KEYID = 7
14,531,188 UART: [afmc] AUTHORITY.KEYID = 5
17,030,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,751,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,753,251 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,769,240 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,785,100 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,800,795 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,822,744 UART: [afmc] --
18,825,793 UART: [cold-reset] --
18,830,900 UART: [state] Locking Datavault
18,835,547 UART: [state] Locking PCR0, PCR1 and PCR31
18,837,238 UART: [state] Locking ICCM
18,838,498 UART: [exit] Launching FMC @ 0x40000130
18,846,942 UART:
18,847,168 UART: Running Caliptra FMC ...
18,848,191 UART:
18,848,337 UART: [state] CFI Enabled
18,856,271 UART: [fht] FMC Alias Private Key: 7
20,612,989 UART: [art] Extend RT PCRs Done
20,614,204 UART: [art] Lock RT PCRs Done
20,615,960 UART: [art] Populate DV Done
20,621,478 UART: [fht] FMC Alias Private Key: 7
20,623,012 UART: [art] Derive CDI
20,623,826 UART: [art] Store in in slot 0x4
20,666,908 UART: [art] Derive Key Pair
20,667,948 UART: [art] Store priv key in slot 0x5
23,094,636 UART: [art] Derive Key Pair - Done
23,107,735 UART: [art] Signing Cert with AUTHO
23,109,038 UART: RITY.KEYID = 7
24,814,696 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,209 UART: [art] PUB.X = 4DB80D9FBEED7861CB5DB927152743EB96CC713A639DB2CBC894276061FAFE6242CEA1F5D2D2A21E12E06345B657E3B9
24,823,506 UART: [art] PUB.Y = 57E13EAEEFA3027E3BF3A5F88CE69037DCC960A66EC6B1AFFB92EFBAA2EE86327D94F35C13F6A8FFD73D3394A1644385
24,830,797 UART: [art] SIG.R = B0A810CA56F379AFBCE1CB9FCBE27975A5D76AFBAE191BA602F5A654FAD281E55FD5F905C6A5F6D76CA1FCF39A8C48BA
24,838,184 UART: [art] SIG.S = FB03A5FE458BCB28817E14546C6BC54ECD73D945C080ACF8E754157C7E0484E67AA809A8D5B5E535913983334401FDEE
25,817,304 UART: Caliptra RT
25,818,019 UART: [state] CFI Enabled
25,935,328 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,277 UART:
1,564 UART: Running Caliptra ROM ...
2,674 UART:
14,594,600 UART: [state] CFI Enabled
14,607,243 UART: [state] LifecycleState = Production
14,608,980 UART: [state] DebugLocked = Yes
14,611,799 UART: [state] Starting the WD Timer 40000000 cycles
14,616,428 UART: [kat] SHA2-256
14,795,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,807,137 UART: [kat] ++
14,807,597 UART: [kat] sha1
14,817,939 UART: [kat] SHA2-256
14,820,970 UART: [kat] SHA2-384
14,828,678 UART: [kat] SHA2-512-ACC
14,831,621 UART: [kat] ECC-384
17,271,454 UART: [kat] HMAC-384Kdf
17,282,918 UART: [kat] LMS
17,812,461 UART: [kat] --
17,817,312 UART: [warm-reset] ++
17,821,504 UART: [warm-reset] --
17,824,929 UART: [state] Locking Datavault
17,826,595 UART: [state] Locking PCR0, PCR1 and PCR31
17,828,250 UART: [state] Locking ICCM
17,829,698 UART: [exit] Launching FMC @ 0x40000130
17,838,150 UART:
17,838,382 UART: Running Caliptra FMC ...
17,839,480 UART:
17,839,636 UART: [state] CFI Enabled
17,841,494 UART: [aliasrt :skip pcr extension
17,842,737 UART: [art] Extend RT PCRs Done
17,843,870 UART: [art] Lock RT PCRs Done
17,845,146 UART: [art] Populate DV Done
17,850,545 UART: [fht] FMC Alias Private Key: 7
17,852,073 UART: [art] Derive CDI
17,852,885 UART: [art] Store in in slot 0x4
17,895,525 UART: [art] Derive Key Pair
17,896,520 UART: [art] Store priv key in slot 0x5
20,323,453 UART: [art] Derive Key Pair - Done
20,336,121 UART: [art] Signing Cert with AUTHO
20,337,416 UART: RITY.KEYID = 7
22,042,730 UART: [art] Erasing AUTHORITY.KEYID = 7
22,044,241 UART: [art] PUB.X = 4DB80D9FBEED7861CB5DB927152743EB96CC713A639DB2CBC894276061FAFE6242CEA1F5D2D2A21E12E06345B657E3B9
22,051,496 UART: [art] PUB.Y = 57E13EAEEFA3027E3BF3A5F88CE69037DCC960A66EC6B1AFFB92EFBAA2EE86327D94F35C13F6A8FFD73D3394A1644385
22,058,783 UART: [art] SIG.R = B0A810CA56F379AFBCE1CB9FCBE27975A5D76AFBAE191BA602F5A654FAD281E55FD5F905C6A5F6D76CA1FCF39A8C48BA
22,066,285 UART: [art] SIG.S = FB03A5FE458BCB28817E14546C6BC54ECD73D945C080ACF8E754157C7E0484E67AA809A8D5B5E535913983334401FDEE
23,045,246 UART: Caliptra RT
23,045,967 UART: [state] CFI Enabled
23,336,885 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Production
85,685 UART: [state] DebugLocked = Yes
86,319 UART: [state] Starting the WD Timer 40000000 cycles
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,991 UART: [cold-reset] ++
1,170,398 UART: [fht] FHT @ 0x50003400
1,172,990 UART: [idev] ++
1,173,158 UART: [idev] CDI.KEYID = 6
1,173,519 UART: [idev] SUBJECT.KEYID = 7
1,173,944 UART: [idev] UDS.KEYID = 0
1,174,290 ready_for_fw is high
1,174,290 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,789 UART: [idev] Erasing UDS.KEYID = 0
1,198,634 UART: [idev] Sha1 KeyId Algorithm
1,207,525 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,214,792 UART: [ldev] Erasing FE.KEYID = 1
1,240,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,259 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,953 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,823 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,529 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,591 UART: [ldev] --
1,279,991 UART: [fwproc] Wait for Commands...
1,280,654 UART: [fwproc] Recv command 0x46574c44
1,281,387 UART: [fwproc] Recv'd Img size: 114168 bytes
2,601,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,627,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,657,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,792,784 >>> mbox cmd response: success
2,793,864 UART: [afmc] ++
2,794,032 UART: [afmc] CDI.KEYID = 6
2,794,395 UART: [afmc] SUBJECT.KEYID = 7
2,794,821 UART: [afmc] AUTHORITY.KEYID = 5
2,830,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,846,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,847,551 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,853,270 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,859,163 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,864,870 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,872,875 UART: [afmc] --
2,873,786 UART: [cold-reset] --
2,874,590 UART: [state] Locking Datavault
2,875,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,876,359 UART: [state] Locking ICCM
2,876,983 UART: [exit] Launching FMC @ 0x40000130
2,882,312 UART:
2,882,328 UART: Running Caliptra FMC ...
2,882,736 UART:
2,882,790 UART: [state] CFI Enabled
2,893,331 UART: [fht] FMC Alias Private Key: 7
3,001,642 UART: [art] Extend RT PCRs Done
3,002,070 UART: [art] Lock RT PCRs Done
3,003,638 UART: [art] Populate DV Done
3,011,796 UART: [fht] FMC Alias Private Key: 7
3,012,888 UART: [art] Derive CDI
3,013,168 UART: [art] Store in in slot 0x4
3,098,305 UART: [art] Derive Key Pair
3,098,665 UART: [art] Store priv key in slot 0x5
3,111,713 UART: [art] Derive Key Pair - Done
3,126,752 UART: [art] Signing Cert with AUTHO
3,127,232 UART: RITY.KEYID = 7
3,142,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,369 UART: [art] PUB.X = 972D9060BC387CF8CB2099835C98DCFAB0ED7BA9CB8C700D067320FD85CC97F81742E42A2B892CCC25C50742410ECECF
3,150,141 UART: [art] PUB.Y = 5C47DF6B4979CF46B35A69955A21AF5A1B672FE90AE09CC3EFEFF2785DC0D8641AC322F8635126E049F9BDB2BEA28560
3,157,102 UART: [art] SIG.R = 91B3C8A2F341E6787358F48A4B6270E345AED4477BFFEEC6FA3AA01833438A14487CDEB03BA90A1EBEA81D35EFA3C7F8
3,163,887 UART: [art] SIG.S = 47A6ADC5C1F03F9D0AC77FFBD381C9CAA510057EF301F398A9629027C251984008BA1DADD33757590F607CBC4BEFE11B
3,187,711 UART: Caliptra RT
3,187,964 UART: [state] CFI Enabled
3,296,427 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,183 UART:
3,297,199 UART: Running Caliptra ROM ...
3,297,607 UART:
3,297,662 UART: [state] CFI Enabled
3,300,573 UART: [state] LifecycleState = Production
3,301,181 UART: [state] DebugLocked = Yes
3,301,843 UART: [state] Starting the WD Timer 40000000 cycles
3,303,358 UART: [kat] SHA2-256
4,106,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,037 UART: [kat] ++
4,111,189 UART: [kat] sha1
4,115,499 UART: [kat] SHA2-256
4,117,439 UART: [kat] SHA2-384
4,120,142 UART: [kat] SHA2-512-ACC
4,122,043 UART: [kat] ECC-384
4,131,266 UART: [kat] HMAC-384Kdf
4,135,634 UART: [kat] LMS
4,383,946 UART: [kat] --
4,384,754 UART: [warm-reset] ++
4,385,639 UART: [warm-reset] --
4,386,448 UART: [state] Locking Datavault
4,387,192 UART: [state] Locking PCR0, PCR1 and PCR31
4,387,796 UART: [state] Locking ICCM
4,388,370 UART: [exit] Launching FMC @ 0x40000130
4,393,699 UART:
4,393,715 UART: Running Caliptra FMC ...
4,394,123 UART:
4,394,177 UART: [state] CFI Enabled
4,395,388 UART: [aliasrt :skip pcr extension
4,395,861 UART: [art] Extend RT PCRs Done
4,396,289 UART: [art] Lock RT PCRs Done
4,397,630 UART: [art] Populate DV Done
4,405,898 UART: [fht] FMC Alias Private Key: 7
4,406,866 UART: [art] Derive CDI
4,407,146 UART: [art] Store in in slot 0x4
4,492,531 UART: [art] Derive Key Pair
4,492,891 UART: [art] Store priv key in slot 0x5
4,506,249 UART: [art] Derive Key Pair - Done
4,520,854 UART: [art] Signing Cert with AUTHO
4,521,334 UART: RITY.KEYID = 7
4,536,712 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,477 UART: [art] PUB.X = 972D9060BC387CF8CB2099835C98DCFAB0ED7BA9CB8C700D067320FD85CC97F81742E42A2B892CCC25C50742410ECECF
4,544,249 UART: [art] PUB.Y = 5C47DF6B4979CF46B35A69955A21AF5A1B672FE90AE09CC3EFEFF2785DC0D8641AC322F8635126E049F9BDB2BEA28560
4,551,210 UART: [art] SIG.R = 91B3C8A2F341E6787358F48A4B6270E345AED4477BFFEEC6FA3AA01833438A14487CDEB03BA90A1EBEA81D35EFA3C7F8
4,557,995 UART: [art] SIG.S = 47A6ADC5C1F03F9D0AC77FFBD381C9CAA510057EF301F398A9629027C251984008BA1DADD33757590F607CBC4BEFE11B
4,582,163 UART: Caliptra RT
4,582,416 UART: [state] CFI Enabled
4,864,861 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Production
85,805 UART: [state] DebugLocked = Yes
86,525 UART: [state] Starting the WD Timer 40000000 cycles
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,695 UART: [kat] ++
895,847 UART: [kat] sha1
900,221 UART: [kat] SHA2-256
902,161 UART: [kat] SHA2-384
905,048 UART: [kat] SHA2-512-ACC
906,949 UART: [kat] ECC-384
916,658 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,499 UART: [cold-reset] ++
1,171,070 UART: [fht] FHT @ 0x50003400
1,173,704 UART: [idev] ++
1,173,872 UART: [idev] CDI.KEYID = 6
1,174,233 UART: [idev] SUBJECT.KEYID = 7
1,174,658 UART: [idev] UDS.KEYID = 0
1,175,004 ready_for_fw is high
1,175,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,481 UART: [idev] Erasing UDS.KEYID = 0
1,199,622 UART: [idev] Sha1 KeyId Algorithm
1,208,667 UART: [idev] --
1,209,776 UART: [ldev] ++
1,209,944 UART: [ldev] CDI.KEYID = 6
1,210,308 UART: [ldev] SUBJECT.KEYID = 5
1,210,735 UART: [ldev] AUTHORITY.KEYID = 7
1,211,198 UART: [ldev] FE.KEYID = 1
1,216,608 UART: [ldev] Erasing FE.KEYID = 1
1,242,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,329 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,023 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,893 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,599 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,819 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,836 UART: [fwproc] Recv command 0x46574c44
1,283,569 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,873 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,440 >>> mbox cmd response: success
2,796,552 UART: [afmc] ++
2,796,720 UART: [afmc] CDI.KEYID = 6
2,797,083 UART: [afmc] SUBJECT.KEYID = 7
2,797,509 UART: [afmc] AUTHORITY.KEYID = 5
2,832,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,645 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,364 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,257 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,964 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,853 UART: [afmc] --
2,875,862 UART: [cold-reset] --
2,876,836 UART: [state] Locking Datavault
2,877,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,567 UART: [state] Locking ICCM
2,879,019 UART: [exit] Launching FMC @ 0x40000130
2,884,348 UART:
2,884,364 UART: Running Caliptra FMC ...
2,884,772 UART:
2,884,826 UART: [state] CFI Enabled
2,895,645 UART: [fht] FMC Alias Private Key: 7
3,003,610 UART: [art] Extend RT PCRs Done
3,004,038 UART: [art] Lock RT PCRs Done
3,005,284 UART: [art] Populate DV Done
3,013,388 UART: [fht] FMC Alias Private Key: 7
3,014,480 UART: [art] Derive CDI
3,014,760 UART: [art] Store in in slot 0x4
3,100,475 UART: [art] Derive Key Pair
3,100,835 UART: [art] Store priv key in slot 0x5
3,114,401 UART: [art] Derive Key Pair - Done
3,129,179 UART: [art] Signing Cert with AUTHO
3,129,659 UART: RITY.KEYID = 7
3,144,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,616 UART: [art] PUB.X = CBC0CC42D175692BCB593AFBE6A3FDEF1389A8B09EFE42C293395D8EB76E10B9A2C2DB740AD34423A1C14F72D4013CAD
3,152,402 UART: [art] PUB.Y = 956BCB9F4E49D1A0AE021F8E01C98A51FE464B3AAE93790E68B50449C4F5F3FA420BDFC8308583A7143C4B748F1F7FFF
3,159,351 UART: [art] SIG.R = 51D8BFBA1331329F08FE96F37751B749F25A89E60C4AA0FFCE459761C6A6F011EE9AF5FBAD25A116F8328191D939A741
3,166,123 UART: [art] SIG.S = 1687C4109EC6840682A26E0B3F92D9B6758FE839EA31BFA5913E9EC1AC419935E90ED42649F06A6F50F0873A99092B5D
3,190,260 UART: Caliptra RT
3,190,513 UART: [state] CFI Enabled
3,298,869 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,625 UART:
3,299,641 UART: Running Caliptra ROM ...
3,300,049 UART:
3,300,104 UART: [state] CFI Enabled
3,302,651 UART: [state] LifecycleState = Production
3,303,259 UART: [state] DebugLocked = Yes
3,303,999 UART: [state] Starting the WD Timer 40000000 cycles
3,305,470 UART: [kat] SHA2-256
4,109,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,149 UART: [kat] ++
4,113,301 UART: [kat] sha1
4,117,479 UART: [kat] SHA2-256
4,119,419 UART: [kat] SHA2-384
4,122,086 UART: [kat] SHA2-512-ACC
4,123,987 UART: [kat] ECC-384
4,133,538 UART: [kat] HMAC-384Kdf
4,138,078 UART: [kat] LMS
4,386,390 UART: [kat] --
4,387,302 UART: [warm-reset] ++
4,388,395 UART: [warm-reset] --
4,389,310 UART: [state] Locking Datavault
4,390,272 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,876 UART: [state] Locking ICCM
4,391,526 UART: [exit] Launching FMC @ 0x40000130
4,396,855 UART:
4,396,871 UART: Running Caliptra FMC ...
4,397,279 UART:
4,397,333 UART: [state] CFI Enabled
4,398,710 UART: [aliasrt :skip pcr extension
4,399,183 UART: [art] Extend RT PCRs Done
4,399,611 UART: [art] Lock RT PCRs Done
4,400,872 UART: [art] Populate DV Done
4,408,988 UART: [fht] FMC Alias Private Key: 7
4,409,960 UART: [art] Derive CDI
4,410,240 UART: [art] Store in in slot 0x4
4,496,357 UART: [art] Derive Key Pair
4,496,717 UART: [art] Store priv key in slot 0x5
4,510,007 UART: [art] Derive Key Pair - Done
4,524,621 UART: [art] Signing Cert with AUTHO
4,525,101 UART: RITY.KEYID = 7
4,540,269 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,034 UART: [art] PUB.X = CBC0CC42D175692BCB593AFBE6A3FDEF1389A8B09EFE42C293395D8EB76E10B9A2C2DB740AD34423A1C14F72D4013CAD
4,547,820 UART: [art] PUB.Y = 956BCB9F4E49D1A0AE021F8E01C98A51FE464B3AAE93790E68B50449C4F5F3FA420BDFC8308583A7143C4B748F1F7FFF
4,554,769 UART: [art] SIG.R = 51D8BFBA1331329F08FE96F37751B749F25A89E60C4AA0FFCE459761C6A6F011EE9AF5FBAD25A116F8328191D939A741
4,561,541 UART: [art] SIG.S = 1687C4109EC6840682A26E0B3F92D9B6758FE839EA31BFA5913E9EC1AC419935E90ED42649F06A6F50F0873A99092B5D
4,585,162 UART: Caliptra RT
4,585,415 UART: [state] CFI Enabled
4,865,661 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Production
86,068 UART: [state] DebugLocked = Yes
86,736 UART: [state] Starting the WD Timer 40000000 cycles
88,339 UART: [kat] SHA2-256
891,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,018 UART: [kat] ++
896,170 UART: [kat] sha1
900,460 UART: [kat] SHA2-256
902,400 UART: [kat] SHA2-384
905,155 UART: [kat] SHA2-512-ACC
907,056 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,481 UART: [kat] LMS
1,169,793 UART: [kat] --
1,171,064 UART: [cold-reset] ++
1,171,621 UART: [fht] FHT @ 0x50003400
1,174,193 UART: [idev] ++
1,174,361 UART: [idev] CDI.KEYID = 6
1,174,722 UART: [idev] SUBJECT.KEYID = 7
1,175,147 UART: [idev] UDS.KEYID = 0
1,175,493 ready_for_fw is high
1,175,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,890 UART: [idev] Erasing UDS.KEYID = 0
1,200,301 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,785 UART: [ldev] Erasing FE.KEYID = 1
1,243,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,944 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,638 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,508 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,214 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,392 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,405 UART: [fwproc] Recv command 0x46574c44
1,284,138 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,500 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,063 >>> mbox cmd response: success
2,797,143 UART: [afmc] ++
2,797,311 UART: [afmc] CDI.KEYID = 6
2,797,674 UART: [afmc] SUBJECT.KEYID = 7
2,798,100 UART: [afmc] AUTHORITY.KEYID = 5
2,833,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,466 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,185 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,078 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,785 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,494 UART: [afmc] --
2,876,411 UART: [cold-reset] --
2,877,389 UART: [state] Locking Datavault
2,878,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,142 UART: [state] Locking ICCM
2,879,572 UART: [exit] Launching FMC @ 0x40000130
2,884,901 UART:
2,884,917 UART: Running Caliptra FMC ...
2,885,325 UART:
2,885,468 UART: [state] CFI Enabled
2,895,875 UART: [fht] FMC Alias Private Key: 7
3,003,576 UART: [art] Extend RT PCRs Done
3,004,004 UART: [art] Lock RT PCRs Done
3,005,298 UART: [art] Populate DV Done
3,013,898 UART: [fht] FMC Alias Private Key: 7
3,014,976 UART: [art] Derive CDI
3,015,256 UART: [art] Store in in slot 0x4
3,100,703 UART: [art] Derive Key Pair
3,101,063 UART: [art] Store priv key in slot 0x5
3,115,117 UART: [art] Derive Key Pair - Done
3,130,195 UART: [art] Signing Cert with AUTHO
3,130,675 UART: RITY.KEYID = 7
3,145,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,744 UART: [art] PUB.X = A3A4B057461CD647A8EF33AD19C8F7EE01967F4BB67E2060717E8D15417A80BC59A190CD70B49019234214A623157EED
3,153,511 UART: [art] PUB.Y = 488584E5D13E54B912ADE89C96E9EB2FA52100F9365DCCF66318B9A2C2BCCE8E63968F5A72E38B7DCEE81539DE99FE33
3,160,453 UART: [art] SIG.R = 8907850742FA278323D23674F0370B204EDCBEF6749491F9618BDF86FDD2714DFA3C8E7EC28CC72BF8A31CC5FB8110E2
3,167,222 UART: [art] SIG.S = 5242B19EFF1FE3F6FEEDC4DEA1344DCA2996E0D82287F1B5BED4E08DA3883449F23C8FF2CF34317F9EAE4D12BA6450ED
3,191,227 UART: Caliptra RT
3,191,572 UART: [state] CFI Enabled
3,299,037 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,793 UART:
3,299,809 UART: Running Caliptra ROM ...
3,300,217 UART:
3,300,359 UART: [state] CFI Enabled
3,302,892 UART: [state] LifecycleState = Production
3,303,500 UART: [state] DebugLocked = Yes
3,304,206 UART: [state] Starting the WD Timer 40000000 cycles
3,305,845 UART: [kat] SHA2-256
4,109,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,524 UART: [kat] ++
4,113,676 UART: [kat] sha1
4,117,936 UART: [kat] SHA2-256
4,119,876 UART: [kat] SHA2-384
4,122,661 UART: [kat] SHA2-512-ACC
4,124,562 UART: [kat] ECC-384
4,134,771 UART: [kat] HMAC-384Kdf
4,139,351 UART: [kat] LMS
4,387,663 UART: [kat] --
4,388,453 UART: [warm-reset] ++
4,389,476 UART: [warm-reset] --
4,390,369 UART: [state] Locking Datavault
4,391,083 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,687 UART: [state] Locking ICCM
4,392,313 UART: [exit] Launching FMC @ 0x40000130
4,397,642 UART:
4,397,658 UART: Running Caliptra FMC ...
4,398,066 UART:
4,398,209 UART: [state] CFI Enabled
4,399,684 UART: [aliasrt :skip pcr extension
4,400,157 UART: [art] Extend RT PCRs Done
4,400,585 UART: [art] Lock RT PCRs Done
4,402,028 UART: [art] Populate DV Done
4,410,480 UART: [fht] FMC Alias Private Key: 7
4,411,602 UART: [art] Derive CDI
4,411,882 UART: [art] Store in in slot 0x4
4,497,553 UART: [art] Derive Key Pair
4,497,913 UART: [art] Store priv key in slot 0x5
4,511,881 UART: [art] Derive Key Pair - Done
4,526,779 UART: [art] Signing Cert with AUTHO
4,527,259 UART: RITY.KEYID = 7
4,542,399 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,164 UART: [art] PUB.X = A3A4B057461CD647A8EF33AD19C8F7EE01967F4BB67E2060717E8D15417A80BC59A190CD70B49019234214A623157EED
4,549,931 UART: [art] PUB.Y = 488584E5D13E54B912ADE89C96E9EB2FA52100F9365DCCF66318B9A2C2BCCE8E63968F5A72E38B7DCEE81539DE99FE33
4,556,873 UART: [art] SIG.R = 8907850742FA278323D23674F0370B204EDCBEF6749491F9618BDF86FDD2714DFA3C8E7EC28CC72BF8A31CC5FB8110E2
4,563,642 UART: [art] SIG.S = 5242B19EFF1FE3F6FEEDC4DEA1344DCA2996E0D82287F1B5BED4E08DA3883449F23C8FF2CF34317F9EAE4D12BA6450ED
4,587,329 UART: Caliptra RT
4,587,674 UART: [state] CFI Enabled
4,874,767 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Production
85,796 UART: [state] DebugLocked = Yes
86,516 UART: [state] Starting the WD Timer 40000000 cycles
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,111 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,535 UART: [fht] FHT @ 0x50003400
1,173,295 UART: [idev] ++
1,173,463 UART: [idev] CDI.KEYID = 6
1,173,824 UART: [idev] SUBJECT.KEYID = 7
1,174,249 UART: [idev] UDS.KEYID = 0
1,174,595 ready_for_fw is high
1,174,595 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,493 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,507 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,200 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,070 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,776 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,946 UART: [ldev] --
1,282,388 UART: [fwproc] Wait for Commands...
1,283,163 UART: [fwproc] Recv command 0x46574c44
1,283,896 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,797,141 >>> mbox cmd response: success
2,798,167 UART: [afmc] ++
2,798,335 UART: [afmc] CDI.KEYID = 6
2,798,698 UART: [afmc] SUBJECT.KEYID = 7
2,799,124 UART: [afmc] AUTHORITY.KEYID = 5
2,834,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,150 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,869 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,762 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,469 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,210 UART: [afmc] --
2,877,113 UART: [cold-reset] --
2,877,995 UART: [state] Locking Datavault
2,879,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,990 UART: [state] Locking ICCM
2,880,546 UART: [exit] Launching FMC @ 0x40000130
2,885,875 UART:
2,885,891 UART: Running Caliptra FMC ...
2,886,299 UART:
2,886,442 UART: [state] CFI Enabled
2,897,005 UART: [fht] FMC Alias Private Key: 7
3,005,104 UART: [art] Extend RT PCRs Done
3,005,532 UART: [art] Lock RT PCRs Done
3,006,988 UART: [art] Populate DV Done
3,015,156 UART: [fht] FMC Alias Private Key: 7
3,016,262 UART: [art] Derive CDI
3,016,542 UART: [art] Store in in slot 0x4
3,102,271 UART: [art] Derive Key Pair
3,102,631 UART: [art] Store priv key in slot 0x5
3,115,509 UART: [art] Derive Key Pair - Done
3,130,239 UART: [art] Signing Cert with AUTHO
3,130,719 UART: RITY.KEYID = 7
3,146,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,094 UART: [art] PUB.X = 5A829523A94ABB272F6A32ABB86FB824B72639D22EA1ABF0C1B1DFC7D4A6F16E1B5260786A2E35A1DD9F49C7DC575279
3,153,878 UART: [art] PUB.Y = B0B0192162DA32E779A27D94D26596DBA65DD45550888619BC20F90ACB4033B2AA6304FE4E4FE7F78D1F1CC642B7E59E
3,160,830 UART: [art] SIG.R = 7DBCC52C251D813CAA79271CFDA8900DC82AE5C3F1FC92778FAEDA129E83EDCC16FD94D7C9E269966DBDE70CA4C1EC49
3,167,622 UART: [art] SIG.S = CDA915733349FDEDB501269176C6F7AD7713851FC50C812D70E6CD18964C5C45ADBEB6644A7D0C3708D1D78843577072
3,191,423 UART: Caliptra RT
3,191,768 UART: [state] CFI Enabled
3,299,273 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,029 UART:
3,300,045 UART: Running Caliptra ROM ...
3,300,453 UART:
3,300,595 UART: [state] CFI Enabled
3,303,070 UART: [state] LifecycleState = Production
3,303,678 UART: [state] DebugLocked = Yes
3,304,356 UART: [state] Starting the WD Timer 40000000 cycles
3,306,071 UART: [kat] SHA2-256
4,109,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,750 UART: [kat] ++
4,113,902 UART: [kat] sha1
4,118,162 UART: [kat] SHA2-256
4,120,102 UART: [kat] SHA2-384
4,122,727 UART: [kat] SHA2-512-ACC
4,124,628 UART: [kat] ECC-384
4,134,381 UART: [kat] HMAC-384Kdf
4,139,173 UART: [kat] LMS
4,387,485 UART: [kat] --
4,388,663 UART: [warm-reset] ++
4,389,666 UART: [warm-reset] --
4,390,413 UART: [state] Locking Datavault
4,391,223 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,827 UART: [state] Locking ICCM
4,392,341 UART: [exit] Launching FMC @ 0x40000130
4,397,670 UART:
4,397,686 UART: Running Caliptra FMC ...
4,398,094 UART:
4,398,237 UART: [state] CFI Enabled
4,399,540 UART: [aliasrt :skip pcr extension
4,400,013 UART: [art] Extend RT PCRs Done
4,400,441 UART: [art] Lock RT PCRs Done
4,401,606 UART: [art] Populate DV Done
4,410,016 UART: [fht] FMC Alias Private Key: 7
4,411,138 UART: [art] Derive CDI
4,411,418 UART: [art] Store in in slot 0x4
4,497,319 UART: [art] Derive Key Pair
4,497,679 UART: [art] Store priv key in slot 0x5
4,511,025 UART: [art] Derive Key Pair - Done
4,526,007 UART: [art] Signing Cert with AUTHO
4,526,487 UART: RITY.KEYID = 7
4,541,811 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,576 UART: [art] PUB.X = 5A829523A94ABB272F6A32ABB86FB824B72639D22EA1ABF0C1B1DFC7D4A6F16E1B5260786A2E35A1DD9F49C7DC575279
4,549,360 UART: [art] PUB.Y = B0B0192162DA32E779A27D94D26596DBA65DD45550888619BC20F90ACB4033B2AA6304FE4E4FE7F78D1F1CC642B7E59E
4,556,312 UART: [art] SIG.R = 7DBCC52C251D813CAA79271CFDA8900DC82AE5C3F1FC92778FAEDA129E83EDCC16FD94D7C9E269966DBDE70CA4C1EC49
4,563,104 UART: [art] SIG.S = CDA915733349FDEDB501269176C6F7AD7713851FC50C812D70E6CD18964C5C45ADBEB6644A7D0C3708D1D78843577072
4,586,011 UART: Caliptra RT
4,586,356 UART: [state] CFI Enabled
4,866,931 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Production
85,731 UART: [state] DebugLocked = Yes
86,333 UART: [state] Starting the WD Timer 40000000 cycles
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,252 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,243 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,174,494 ready_for_fw is high
1,174,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,199,488 UART: [idev] Sha1 KeyId Algorithm
1,208,325 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,216,080 UART: [ldev] Erasing FE.KEYID = 1
1,242,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,293 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,987 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,857 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,563 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,707 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,988 UART: [fwproc] Recv command 0x46574c44
1,283,721 UART: [fwproc] Recv'd Img size: 114168 bytes
2,605,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,625 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,797,142 >>> mbox cmd response: success
2,798,222 UART: [afmc] ++
2,798,390 UART: [afmc] CDI.KEYID = 6
2,798,753 UART: [afmc] SUBJECT.KEYID = 7
2,799,179 UART: [afmc] AUTHORITY.KEYID = 5
2,834,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,271 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,990 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,883 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,590 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,345 UART: [afmc] --
2,877,360 UART: [cold-reset] --
2,878,252 UART: [state] Locking Datavault
2,879,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,123 UART: [state] Locking ICCM
2,880,609 UART: [exit] Launching FMC @ 0x40000130
2,885,938 UART:
2,885,954 UART: Running Caliptra FMC ...
2,886,362 UART:
2,886,416 UART: [state] CFI Enabled
2,896,933 UART: [fht] FMC Alias Private Key: 7
3,004,510 UART: [art] Extend RT PCRs Done
3,004,938 UART: [art] Lock RT PCRs Done
3,006,452 UART: [art] Populate DV Done
3,014,666 UART: [fht] FMC Alias Private Key: 7
3,015,818 UART: [art] Derive CDI
3,016,098 UART: [art] Store in in slot 0x4
3,101,565 UART: [art] Derive Key Pair
3,101,925 UART: [art] Store priv key in slot 0x5
3,114,989 UART: [art] Derive Key Pair - Done
3,129,920 UART: [art] Signing Cert with AUTHO
3,130,400 UART: RITY.KEYID = 7
3,145,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,709 UART: [art] PUB.X = 71C37C2EF5FAF4243B5E71250C2522ADE8BC747888D6262F17F10C6ABD71DCFBCDE54B34BAB134FD002A27A5BE0900CD
3,153,446 UART: [art] PUB.Y = 3E7034912618BC0CE099AFE4319C49571626407627D3886E2EBE9188AE1571C4E44B230BA2B291FD0F741717BCE591C1
3,160,383 UART: [art] SIG.R = B13F0E34EF5CBCEB6B858924F57368C701DA49C264CAC3150237644383F318B7744853BFED096C0840BF3AA0559E0DCF
3,167,141 UART: [art] SIG.S = 10A86E6B21637A415C5E3E4DE989C0FA1F6DE8F6C487D655C8A9CA61D1C23E34835B90ED82FFFEEEF9E33CEE74B672CF
3,190,838 UART: Caliptra RT
3,191,091 UART: [state] CFI Enabled
3,297,878 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,634 UART:
3,298,650 UART: Running Caliptra ROM ...
3,299,058 UART:
3,299,113 UART: [state] CFI Enabled
3,301,812 UART: [state] LifecycleState = Production
3,302,420 UART: [state] DebugLocked = Yes
3,303,058 UART: [state] Starting the WD Timer 40000000 cycles
3,304,747 UART: [kat] SHA2-256
4,108,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,426 UART: [kat] ++
4,112,578 UART: [kat] sha1
4,116,936 UART: [kat] SHA2-256
4,118,876 UART: [kat] SHA2-384
4,121,647 UART: [kat] SHA2-512-ACC
4,123,548 UART: [kat] ECC-384
4,133,029 UART: [kat] HMAC-384Kdf
4,137,363 UART: [kat] LMS
4,385,675 UART: [kat] --
4,386,609 UART: [warm-reset] ++
4,387,644 UART: [warm-reset] --
4,388,599 UART: [state] Locking Datavault
4,389,523 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,127 UART: [state] Locking ICCM
4,390,615 UART: [exit] Launching FMC @ 0x40000130
4,395,944 UART:
4,395,960 UART: Running Caliptra FMC ...
4,396,368 UART:
4,396,422 UART: [state] CFI Enabled
4,397,517 UART: [aliasrt :skip pcr extension
4,397,990 UART: [art] Extend RT PCRs Done
4,398,418 UART: [art] Lock RT PCRs Done
4,399,877 UART: [art] Populate DV Done
4,408,115 UART: [fht] FMC Alias Private Key: 7
4,409,207 UART: [art] Derive CDI
4,409,487 UART: [art] Store in in slot 0x4
4,495,676 UART: [art] Derive Key Pair
4,496,036 UART: [art] Store priv key in slot 0x5
4,508,914 UART: [art] Derive Key Pair - Done
4,523,883 UART: [art] Signing Cert with AUTHO
4,524,363 UART: RITY.KEYID = 7
4,539,517 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,282 UART: [art] PUB.X = 71C37C2EF5FAF4243B5E71250C2522ADE8BC747888D6262F17F10C6ABD71DCFBCDE54B34BAB134FD002A27A5BE0900CD
4,547,019 UART: [art] PUB.Y = 3E7034912618BC0CE099AFE4319C49571626407627D3886E2EBE9188AE1571C4E44B230BA2B291FD0F741717BCE591C1
4,553,956 UART: [art] SIG.R = B13F0E34EF5CBCEB6B858924F57368C701DA49C264CAC3150237644383F318B7744853BFED096C0840BF3AA0559E0DCF
4,560,714 UART: [art] SIG.S = 10A86E6B21637A415C5E3E4DE989C0FA1F6DE8F6C487D655C8A9CA61D1C23E34835B90ED82FFFEEEF9E33CEE74B672CF
4,585,037 UART: Caliptra RT
4,585,290 UART: [state] CFI Enabled
4,870,173 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,987 UART: [state] LifecycleState = Production
85,595 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 40000000 cycles
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,959 UART: [kat] SHA2-256
901,899 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,324 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,174,384 ready_for_fw is high
1,174,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,755 UART: [idev] Erasing UDS.KEYID = 0
1,198,848 UART: [idev] Sha1 KeyId Algorithm
1,207,849 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,241,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,631 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,325 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,195 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,901 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,969 UART: [ldev] --
1,280,283 UART: [fwproc] Wait for Commands...
1,281,074 UART: [fwproc] Recv command 0x46574c44
1,281,807 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,794,746 >>> mbox cmd response: success
2,795,904 UART: [afmc] ++
2,796,072 UART: [afmc] CDI.KEYID = 6
2,796,435 UART: [afmc] SUBJECT.KEYID = 7
2,796,861 UART: [afmc] AUTHORITY.KEYID = 5
2,832,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,621 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,340 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,233 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,940 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,901 UART: [afmc] --
2,875,914 UART: [cold-reset] --
2,876,946 UART: [state] Locking Datavault
2,878,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,713 UART: [state] Locking ICCM
2,879,255 UART: [exit] Launching FMC @ 0x40000130
2,884,584 UART:
2,884,600 UART: Running Caliptra FMC ...
2,885,008 UART:
2,885,062 UART: [state] CFI Enabled
2,895,625 UART: [fht] FMC Alias Private Key: 7
3,003,964 UART: [art] Extend RT PCRs Done
3,004,392 UART: [art] Lock RT PCRs Done
3,006,034 UART: [art] Populate DV Done
3,014,278 UART: [fht] FMC Alias Private Key: 7
3,015,442 UART: [art] Derive CDI
3,015,722 UART: [art] Store in in slot 0x4
3,101,537 UART: [art] Derive Key Pair
3,101,897 UART: [art] Store priv key in slot 0x5
3,115,617 UART: [art] Derive Key Pair - Done
3,130,495 UART: [art] Signing Cert with AUTHO
3,130,975 UART: RITY.KEYID = 7
3,146,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,860 UART: [art] PUB.X = 3A594BBF5EAAE61C4A94C578D722D7E8C2F742F4EF1B3E335F7A6C0194FC5D1363DE6054486CD562488879E5C80179A4
3,153,630 UART: [art] PUB.Y = 11D66F08725C906BD5C6C413E3DE7734BA92FFA597AED0757B1F878514CCDBA83E1C4B38C2ACB234D5D6FADE8C127EC7
3,160,597 UART: [art] SIG.R = 2220EE8F2D08DB65500ED991940F2CEBF9FCC73D6E99C86B0E5DC65FCA129B88429F75CCF975368EECD85341CEC6F282
3,167,371 UART: [art] SIG.S = B8F2C456BF6746CBD4B47061C026B2D11B632DBD251D4A702BE5EAD7B8DF6743D18663F4E6A44D83BFFE5F6CEAED44F6
3,191,128 UART: Caliptra RT
3,191,381 UART: [state] CFI Enabled
3,299,380 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,136 UART:
3,300,152 UART: Running Caliptra ROM ...
3,300,560 UART:
3,300,615 UART: [state] CFI Enabled
3,303,582 UART: [state] LifecycleState = Production
3,304,190 UART: [state] DebugLocked = Yes
3,304,760 UART: [state] Starting the WD Timer 40000000 cycles
3,306,375 UART: [kat] SHA2-256
4,109,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,054 UART: [kat] ++
4,114,206 UART: [kat] sha1
4,118,418 UART: [kat] SHA2-256
4,120,358 UART: [kat] SHA2-384
4,123,193 UART: [kat] SHA2-512-ACC
4,125,094 UART: [kat] ECC-384
4,135,129 UART: [kat] HMAC-384Kdf
4,139,675 UART: [kat] LMS
4,387,987 UART: [kat] --
4,388,695 UART: [warm-reset] ++
4,389,690 UART: [warm-reset] --
4,390,425 UART: [state] Locking Datavault
4,391,175 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,779 UART: [state] Locking ICCM
4,392,399 UART: [exit] Launching FMC @ 0x40000130
4,397,728 UART:
4,397,744 UART: Running Caliptra FMC ...
4,398,152 UART:
4,398,206 UART: [state] CFI Enabled
4,399,587 UART: [aliasrt :skip pcr extension
4,400,060 UART: [art] Extend RT PCRs Done
4,400,488 UART: [art] Lock RT PCRs Done
4,401,839 UART: [art] Populate DV Done
4,409,985 UART: [fht] FMC Alias Private Key: 7
4,411,037 UART: [art] Derive CDI
4,411,317 UART: [art] Store in in slot 0x4
4,496,616 UART: [art] Derive Key Pair
4,496,976 UART: [art] Store priv key in slot 0x5
4,510,008 UART: [art] Derive Key Pair - Done
4,524,634 UART: [art] Signing Cert with AUTHO
4,525,114 UART: RITY.KEYID = 7
4,540,592 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,357 UART: [art] PUB.X = 3A594BBF5EAAE61C4A94C578D722D7E8C2F742F4EF1B3E335F7A6C0194FC5D1363DE6054486CD562488879E5C80179A4
4,548,127 UART: [art] PUB.Y = 11D66F08725C906BD5C6C413E3DE7734BA92FFA597AED0757B1F878514CCDBA83E1C4B38C2ACB234D5D6FADE8C127EC7
4,555,094 UART: [art] SIG.R = 2220EE8F2D08DB65500ED991940F2CEBF9FCC73D6E99C86B0E5DC65FCA129B88429F75CCF975368EECD85341CEC6F282
4,561,868 UART: [art] SIG.S = B8F2C456BF6746CBD4B47061C026B2D11B632DBD251D4A702BE5EAD7B8DF6743D18663F4E6A44D83BFFE5F6CEAED44F6
4,585,597 UART: Caliptra RT
4,585,850 UART: [state] CFI Enabled
4,865,225 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Production
85,666 UART: [state] DebugLocked = Yes
86,218 UART: [state] Starting the WD Timer 40000000 cycles
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,187 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,541 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,174,381 ready_for_fw is high
1,174,381 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,407 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,041 UART: [ldev] ++
1,209,209 UART: [ldev] CDI.KEYID = 6
1,209,573 UART: [ldev] SUBJECT.KEYID = 5
1,210,000 UART: [ldev] AUTHORITY.KEYID = 7
1,210,463 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,688 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,382 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,252 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,958 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,052 UART: [ldev] --
1,281,486 UART: [fwproc] Wait for Commands...
1,282,103 UART: [fwproc] Recv command 0x46574c44
1,282,836 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,797,039 >>> mbox cmd response: success
2,798,141 UART: [afmc] ++
2,798,309 UART: [afmc] CDI.KEYID = 6
2,798,672 UART: [afmc] SUBJECT.KEYID = 7
2,799,098 UART: [afmc] AUTHORITY.KEYID = 5
2,834,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,674 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,393 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,286 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,993 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,948 UART: [afmc] --
2,877,869 UART: [cold-reset] --
2,878,665 UART: [state] Locking Datavault
2,879,822 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,426 UART: [state] Locking ICCM
2,880,974 UART: [exit] Launching FMC @ 0x40000130
2,886,303 UART:
2,886,319 UART: Running Caliptra FMC ...
2,886,727 UART:
2,886,870 UART: [state] CFI Enabled
2,897,339 UART: [fht] FMC Alias Private Key: 7
3,005,368 UART: [art] Extend RT PCRs Done
3,005,796 UART: [art] Lock RT PCRs Done
3,007,220 UART: [art] Populate DV Done
3,015,340 UART: [fht] FMC Alias Private Key: 7
3,016,350 UART: [art] Derive CDI
3,016,630 UART: [art] Store in in slot 0x4
3,102,111 UART: [art] Derive Key Pair
3,102,471 UART: [art] Store priv key in slot 0x5
3,115,755 UART: [art] Derive Key Pair - Done
3,130,730 UART: [art] Signing Cert with AUTHO
3,131,210 UART: RITY.KEYID = 7
3,146,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,607 UART: [art] PUB.X = AE164027159572A7821DE66BEC3261A7FD5A7B1445980A5B9DE1A48A52B1001565A03A6EE54087FCA37690C0652503EA
3,154,347 UART: [art] PUB.Y = F7A41539927F8C5755653B7EB5F697BB033CB8991B1397C03A1F80FB31F3662257E08950CEB62B4A1230958BF0A249DB
3,161,292 UART: [art] SIG.R = 60F657990C35F900BAC032CDA2B56E6CB13F58E4E9892A99C5F5E477E0A90D032EB7ED7352D6E4AD10497BBF6E08F6D4
3,168,040 UART: [art] SIG.S = 195F2758065CCFA9C9F9CF01C308847175ABC5FE7B33274D4C98BADC016F3BF1123A0A2E1755E33C1A836F77C0C7F0ED
3,191,990 UART: Caliptra RT
3,192,335 UART: [state] CFI Enabled
3,299,517 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,273 UART:
3,300,289 UART: Running Caliptra ROM ...
3,300,697 UART:
3,300,839 UART: [state] CFI Enabled
3,303,566 UART: [state] LifecycleState = Production
3,304,174 UART: [state] DebugLocked = Yes
3,304,866 UART: [state] Starting the WD Timer 40000000 cycles
3,306,377 UART: [kat] SHA2-256
4,109,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,056 UART: [kat] ++
4,114,208 UART: [kat] sha1
4,118,436 UART: [kat] SHA2-256
4,120,376 UART: [kat] SHA2-384
4,123,067 UART: [kat] SHA2-512-ACC
4,124,968 UART: [kat] ECC-384
4,134,447 UART: [kat] HMAC-384Kdf
4,139,075 UART: [kat] LMS
4,387,387 UART: [kat] --
4,388,423 UART: [warm-reset] ++
4,389,358 UART: [warm-reset] --
4,390,313 UART: [state] Locking Datavault
4,391,023 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,627 UART: [state] Locking ICCM
4,392,063 UART: [exit] Launching FMC @ 0x40000130
4,397,392 UART:
4,397,408 UART: Running Caliptra FMC ...
4,397,816 UART:
4,397,959 UART: [state] CFI Enabled
4,399,440 UART: [aliasrt :skip pcr extension
4,399,913 UART: [art] Extend RT PCRs Done
4,400,341 UART: [art] Lock RT PCRs Done
4,401,582 UART: [art] Populate DV Done
4,409,954 UART: [fht] FMC Alias Private Key: 7
4,411,092 UART: [art] Derive CDI
4,411,372 UART: [art] Store in in slot 0x4
4,496,801 UART: [art] Derive Key Pair
4,497,161 UART: [art] Store priv key in slot 0x5
4,511,117 UART: [art] Derive Key Pair - Done
4,525,880 UART: [art] Signing Cert with AUTHO
4,526,360 UART: RITY.KEYID = 7
4,541,146 UART: [art] Erasing AUTHORITY.KEYID = 7
4,541,911 UART: [art] PUB.X = AE164027159572A7821DE66BEC3261A7FD5A7B1445980A5B9DE1A48A52B1001565A03A6EE54087FCA37690C0652503EA
4,548,651 UART: [art] PUB.Y = F7A41539927F8C5755653B7EB5F697BB033CB8991B1397C03A1F80FB31F3662257E08950CEB62B4A1230958BF0A249DB
4,555,596 UART: [art] SIG.R = 60F657990C35F900BAC032CDA2B56E6CB13F58E4E9892A99C5F5E477E0A90D032EB7ED7352D6E4AD10497BBF6E08F6D4
4,562,344 UART: [art] SIG.S = 195F2758065CCFA9C9F9CF01C308847175ABC5FE7B33274D4C98BADC016F3BF1123A0A2E1755E33C1A836F77C0C7F0ED
4,585,914 UART: Caliptra RT
4,586,259 UART: [state] CFI Enabled
4,867,057 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Production
86,074 UART: [state] DebugLocked = Yes
86,826 UART: [state] Starting the WD Timer 40000000 cycles
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,568 UART: [kat] SHA2-256
902,508 UART: [kat] SHA2-384
905,163 UART: [kat] SHA2-512-ACC
907,064 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,347 UART: [idev] ++
1,173,515 UART: [idev] CDI.KEYID = 6
1,173,876 UART: [idev] SUBJECT.KEYID = 7
1,174,301 UART: [idev] UDS.KEYID = 0
1,174,647 ready_for_fw is high
1,174,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,112 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,208,212 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,599 UART: [ldev] Erasing FE.KEYID = 1
1,241,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,624 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,318 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,188 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,894 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,994 UART: [ldev] --
1,281,320 UART: [fwproc] Wait for Commands...
1,281,957 UART: [fwproc] Recv command 0x46574c44
1,282,690 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,407 >>> mbox cmd response: success
2,797,591 UART: [afmc] ++
2,797,759 UART: [afmc] CDI.KEYID = 6
2,798,122 UART: [afmc] SUBJECT.KEYID = 7
2,798,548 UART: [afmc] AUTHORITY.KEYID = 5
2,834,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,586 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,305 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,198 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,905 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,736 UART: [afmc] --
2,877,631 UART: [cold-reset] --
2,878,419 UART: [state] Locking Datavault
2,879,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,018 UART: [state] Locking ICCM
2,880,518 UART: [exit] Launching FMC @ 0x40000130
2,885,847 UART:
2,885,863 UART: Running Caliptra FMC ...
2,886,271 UART:
2,886,414 UART: [state] CFI Enabled
2,897,499 UART: [fht] FMC Alias Private Key: 7
3,005,524 UART: [art] Extend RT PCRs Done
3,005,952 UART: [art] Lock RT PCRs Done
3,007,112 UART: [art] Populate DV Done
3,015,214 UART: [fht] FMC Alias Private Key: 7
3,016,182 UART: [art] Derive CDI
3,016,462 UART: [art] Store in in slot 0x4
3,102,087 UART: [art] Derive Key Pair
3,102,447 UART: [art] Store priv key in slot 0x5
3,115,745 UART: [art] Derive Key Pair - Done
3,130,184 UART: [art] Signing Cert with AUTHO
3,130,664 UART: RITY.KEYID = 7
3,145,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,403 UART: [art] PUB.X = 704C2A42143B84D0A20B5FF4CFDD365B4DCA444165EA6835A485DB4AB0D41D1735F72DCD6238AAA5AE486C1EFBFC28A1
3,153,190 UART: [art] PUB.Y = 29CA058F5C31B5EEAC8D53FC4731D0468FB2E50CB758583FE7331EF48601B32EC80F960A191110ADFE1398A61CEAA57C
3,160,137 UART: [art] SIG.R = B0B08266A1C604ED50F6FF6DDB65F302B113D366683EF84C8869C615E55DC771C61BD29D44304D36D5CE50609294F7D6
3,166,903 UART: [art] SIG.S = 9014C821FC91ADA9B8AC6AD8A665C2F9A8194255EC583A1670F1900DC9A7367633E27CC8FBFD36B162EEB7E2AF3122A2
3,191,407 UART: Caliptra RT
3,191,752 UART: [state] CFI Enabled
3,300,547 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,303 UART:
3,301,319 UART: Running Caliptra ROM ...
3,301,727 UART:
3,301,869 UART: [state] CFI Enabled
3,304,760 UART: [state] LifecycleState = Production
3,305,368 UART: [state] DebugLocked = Yes
3,306,024 UART: [state] Starting the WD Timer 40000000 cycles
3,307,705 UART: [kat] SHA2-256
4,111,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,384 UART: [kat] ++
4,115,536 UART: [kat] sha1
4,119,760 UART: [kat] SHA2-256
4,121,700 UART: [kat] SHA2-384
4,124,469 UART: [kat] SHA2-512-ACC
4,126,370 UART: [kat] ECC-384
4,136,251 UART: [kat] HMAC-384Kdf
4,140,847 UART: [kat] LMS
4,389,159 UART: [kat] --
4,390,121 UART: [warm-reset] ++
4,391,016 UART: [warm-reset] --
4,391,789 UART: [state] Locking Datavault
4,392,619 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,223 UART: [state] Locking ICCM
4,393,655 UART: [exit] Launching FMC @ 0x40000130
4,398,984 UART:
4,399,000 UART: Running Caliptra FMC ...
4,399,408 UART:
4,399,551 UART: [state] CFI Enabled
4,401,076 UART: [aliasrt :skip pcr extension
4,401,549 UART: [art] Extend RT PCRs Done
4,401,977 UART: [art] Lock RT PCRs Done
4,403,082 UART: [art] Populate DV Done
4,411,434 UART: [fht] FMC Alias Private Key: 7
4,412,608 UART: [art] Derive CDI
4,412,888 UART: [art] Store in in slot 0x4
4,498,469 UART: [art] Derive Key Pair
4,498,829 UART: [art] Store priv key in slot 0x5
4,512,851 UART: [art] Derive Key Pair - Done
4,527,568 UART: [art] Signing Cert with AUTHO
4,528,048 UART: RITY.KEYID = 7
4,543,270 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,035 UART: [art] PUB.X = 704C2A42143B84D0A20B5FF4CFDD365B4DCA444165EA6835A485DB4AB0D41D1735F72DCD6238AAA5AE486C1EFBFC28A1
4,550,822 UART: [art] PUB.Y = 29CA058F5C31B5EEAC8D53FC4731D0468FB2E50CB758583FE7331EF48601B32EC80F960A191110ADFE1398A61CEAA57C
4,557,769 UART: [art] SIG.R = B0B08266A1C604ED50F6FF6DDB65F302B113D366683EF84C8869C615E55DC771C61BD29D44304D36D5CE50609294F7D6
4,564,535 UART: [art] SIG.S = 9014C821FC91ADA9B8AC6AD8A665C2F9A8194255EC583A1670F1900DC9A7367633E27CC8FBFD36B162EEB7E2AF3122A2
4,588,111 UART: Caliptra RT
4,588,456 UART: [state] CFI Enabled
4,870,409 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,961 UART: [state] LifecycleState = Production
85,569 UART: [state] DebugLocked = Yes
86,077 UART: [state] Starting the WD Timer 40000000 cycles
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,530 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,215 UART: [cold-reset] ++
1,170,702 UART: [fht] FHT @ 0x50003400
1,173,424 UART: [idev] ++
1,173,592 UART: [idev] CDI.KEYID = 6
1,173,953 UART: [idev] SUBJECT.KEYID = 7
1,174,378 UART: [idev] UDS.KEYID = 0
1,174,724 ready_for_fw is high
1,174,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,199,420 UART: [idev] Sha1 KeyId Algorithm
1,208,179 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,242,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,423 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,117 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,987 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,693 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,881 UART: [ldev] --
1,281,239 UART: [fwproc] Wait for Commands...
1,281,996 UART: [fwproc] Recv command 0x46574c44
1,282,729 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,710 >>> mbox cmd response: success
2,797,750 UART: [afmc] ++
2,797,918 UART: [afmc] CDI.KEYID = 6
2,798,281 UART: [afmc] SUBJECT.KEYID = 7
2,798,707 UART: [afmc] AUTHORITY.KEYID = 5
2,834,408 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,711 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,430 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,323 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,030 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,817 UART: [afmc] --
2,877,824 UART: [cold-reset] --
2,878,814 UART: [state] Locking Datavault
2,880,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,875 UART: [state] Locking ICCM
2,881,491 UART: [exit] Launching FMC @ 0x40000130
2,886,820 UART:
2,886,836 UART: Running Caliptra FMC ...
2,887,244 UART:
2,887,298 UART: [state] CFI Enabled
2,897,657 UART: [fht] FMC Alias Private Key: 7
3,005,146 UART: [art] Extend RT PCRs Done
3,005,574 UART: [art] Lock RT PCRs Done
3,006,968 UART: [art] Populate DV Done
3,015,150 UART: [fht] FMC Alias Private Key: 7
3,016,106 UART: [art] Derive CDI
3,016,386 UART: [art] Store in in slot 0x4
3,102,173 UART: [art] Derive Key Pair
3,102,533 UART: [art] Store priv key in slot 0x5
3,115,631 UART: [art] Derive Key Pair - Done
3,130,114 UART: [art] Signing Cert with AUTHO
3,130,594 UART: RITY.KEYID = 7
3,145,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,451 UART: [art] PUB.X = 5A7B5048EB5A648C07219637E11FE1C7F82A787E1BDDD593F1A738C06AA26A97D2BB7207C8EC494C0F5DD2A6B78E74C1
3,153,224 UART: [art] PUB.Y = 5D85AF2876FE43DCBFF0CAF12FBAC711196C2CD62D45C3E6B9FE89AFD6121736FD6B8CF381C09B780BF252E5DF11418C
3,160,193 UART: [art] SIG.R = 1AB8221100DC81AF8AA4EEECBA0DF860630699F567C7CC2EA9ED8E34E3F89B791C9FE9B232080E6C4BF73399907E277B
3,166,943 UART: [art] SIG.S = 6C9B544962AD25AD3A7DA2D91B27A2452398FE9367DCCB2497A1000C1B3C6731095D51515DE414E4C816379FBFCB48B0
3,190,572 UART: Caliptra RT
3,190,825 UART: [state] CFI Enabled
3,299,203 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,959 UART:
3,299,975 UART: Running Caliptra ROM ...
3,300,383 UART:
3,300,438 UART: [state] CFI Enabled
3,303,359 UART: [state] LifecycleState = Production
3,303,967 UART: [state] DebugLocked = Yes
3,304,613 UART: [state] Starting the WD Timer 40000000 cycles
3,306,246 UART: [kat] SHA2-256
4,109,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,925 UART: [kat] ++
4,114,077 UART: [kat] sha1
4,118,175 UART: [kat] SHA2-256
4,120,115 UART: [kat] SHA2-384
4,122,976 UART: [kat] SHA2-512-ACC
4,124,877 UART: [kat] ECC-384
4,134,716 UART: [kat] HMAC-384Kdf
4,139,176 UART: [kat] LMS
4,387,488 UART: [kat] --
4,388,158 UART: [warm-reset] ++
4,388,845 UART: [warm-reset] --
4,389,436 UART: [state] Locking Datavault
4,390,026 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,630 UART: [state] Locking ICCM
4,391,178 UART: [exit] Launching FMC @ 0x40000130
4,396,507 UART:
4,396,523 UART: Running Caliptra FMC ...
4,396,931 UART:
4,396,985 UART: [state] CFI Enabled
4,398,264 UART: [aliasrt :skip pcr extension
4,398,737 UART: [art] Extend RT PCRs Done
4,399,165 UART: [art] Lock RT PCRs Done
4,400,596 UART: [art] Populate DV Done
4,409,002 UART: [fht] FMC Alias Private Key: 7
4,410,048 UART: [art] Derive CDI
4,410,328 UART: [art] Store in in slot 0x4
4,496,137 UART: [art] Derive Key Pair
4,496,497 UART: [art] Store priv key in slot 0x5
4,510,029 UART: [art] Derive Key Pair - Done
4,524,872 UART: [art] Signing Cert with AUTHO
4,525,352 UART: RITY.KEYID = 7
4,540,150 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,915 UART: [art] PUB.X = 5A7B5048EB5A648C07219637E11FE1C7F82A787E1BDDD593F1A738C06AA26A97D2BB7207C8EC494C0F5DD2A6B78E74C1
4,547,688 UART: [art] PUB.Y = 5D85AF2876FE43DCBFF0CAF12FBAC711196C2CD62D45C3E6B9FE89AFD6121736FD6B8CF381C09B780BF252E5DF11418C
4,554,657 UART: [art] SIG.R = 1AB8221100DC81AF8AA4EEECBA0DF860630699F567C7CC2EA9ED8E34E3F89B791C9FE9B232080E6C4BF73399907E277B
4,561,407 UART: [art] SIG.S = 6C9B544962AD25AD3A7DA2D91B27A2452398FE9367DCCB2497A1000C1B3C6731095D51515DE414E4C816379FBFCB48B0
4,585,336 UART: Caliptra RT
4,585,589 UART: [state] CFI Enabled
4,869,727 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Production
85,761 UART: [state] DebugLocked = Yes
86,427 UART: [state] Starting the WD Timer 40000000 cycles
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
900,171 UART: [kat] SHA2-256
902,111 UART: [kat] SHA2-384
904,894 UART: [kat] SHA2-512-ACC
906,795 UART: [kat] ECC-384
916,600 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,174,424 ready_for_fw is high
1,174,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,362 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,396 UART: [ldev] ++
1,208,564 UART: [ldev] CDI.KEYID = 6
1,208,928 UART: [ldev] SUBJECT.KEYID = 5
1,209,355 UART: [ldev] AUTHORITY.KEYID = 7
1,209,818 UART: [ldev] FE.KEYID = 1
1,214,894 UART: [ldev] Erasing FE.KEYID = 1
1,240,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,023 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,717 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,587 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,293 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,369 UART: [ldev] --
1,279,749 UART: [fwproc] Wait for Commands...
1,280,464 UART: [fwproc] Recv command 0x46574c44
1,281,197 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,144 >>> mbox cmd response: success
2,796,348 UART: [afmc] ++
2,796,516 UART: [afmc] CDI.KEYID = 6
2,796,879 UART: [afmc] SUBJECT.KEYID = 7
2,797,305 UART: [afmc] AUTHORITY.KEYID = 5
2,832,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,715 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,434 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,327 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,034 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,859 UART: [afmc] --
2,875,844 UART: [cold-reset] --
2,876,646 UART: [state] Locking Datavault
2,877,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,593 UART: [state] Locking ICCM
2,879,141 UART: [exit] Launching FMC @ 0x40000130
2,884,470 UART:
2,884,486 UART: Running Caliptra FMC ...
2,884,894 UART:
2,884,948 UART: [state] CFI Enabled
2,895,365 UART: [fht] FMC Alias Private Key: 7
3,003,370 UART: [art] Extend RT PCRs Done
3,003,798 UART: [art] Lock RT PCRs Done
3,005,328 UART: [art] Populate DV Done
3,013,542 UART: [fht] FMC Alias Private Key: 7
3,014,616 UART: [art] Derive CDI
3,014,896 UART: [art] Store in in slot 0x4
3,100,707 UART: [art] Derive Key Pair
3,101,067 UART: [art] Store priv key in slot 0x5
3,114,079 UART: [art] Derive Key Pair - Done
3,128,848 UART: [art] Signing Cert with AUTHO
3,129,328 UART: RITY.KEYID = 7
3,144,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,289 UART: [art] PUB.X = D9E909AD520FB3C7E0DDCFCCD5B6EA9020D8369103B34F572E526E8B328B3780B4F27D7A66E68B27ADF3FD344AA7DA5E
3,152,070 UART: [art] PUB.Y = 5833698FED2086DE797CD093CACA460A20E4D5CF364F8FB5E9A7A49338DBB08A837B88C745618C438C1A9EAD5901434D
3,159,022 UART: [art] SIG.R = 6718A41E19BA16180BB5923254FC1C639653E24604AD2D1FAC167EDCB0FC2CE2281D06135E52D67529F16CE15AFEB6A1
3,165,791 UART: [art] SIG.S = 6B54A2EB4EB19333939CF3124D2F4F117405399D949F89AE12335A404EF63F4F41882DB02CBF73F62A1595DF09777014
3,189,430 UART: Caliptra RT
3,189,683 UART: [state] CFI Enabled
3,296,131 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,296,887 UART:
3,296,903 UART: Running Caliptra ROM ...
3,297,311 UART:
3,297,366 UART: [state] CFI Enabled
3,299,929 UART: [state] LifecycleState = Production
3,300,537 UART: [state] DebugLocked = Yes
3,301,169 UART: [state] Starting the WD Timer 40000000 cycles
3,302,792 UART: [kat] SHA2-256
4,106,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,471 UART: [kat] ++
4,110,623 UART: [kat] sha1
4,114,883 UART: [kat] SHA2-256
4,116,823 UART: [kat] SHA2-384
4,119,632 UART: [kat] SHA2-512-ACC
4,121,533 UART: [kat] ECC-384
4,131,324 UART: [kat] HMAC-384Kdf
4,135,880 UART: [kat] LMS
4,384,192 UART: [kat] --
4,385,096 UART: [warm-reset] ++
4,386,097 UART: [warm-reset] --
4,386,890 UART: [state] Locking Datavault
4,387,684 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,288 UART: [state] Locking ICCM
4,388,914 UART: [exit] Launching FMC @ 0x40000130
4,394,243 UART:
4,394,259 UART: Running Caliptra FMC ...
4,394,667 UART:
4,394,721 UART: [state] CFI Enabled
4,395,840 UART: [aliasrt :skip pcr extension
4,396,313 UART: [art] Extend RT PCRs Done
4,396,741 UART: [art] Lock RT PCRs Done
4,398,170 UART: [art] Populate DV Done
4,406,324 UART: [fht] FMC Alias Private Key: 7
4,407,372 UART: [art] Derive CDI
4,407,652 UART: [art] Store in in slot 0x4
4,493,203 UART: [art] Derive Key Pair
4,493,563 UART: [art] Store priv key in slot 0x5
4,506,749 UART: [art] Derive Key Pair - Done
4,521,534 UART: [art] Signing Cert with AUTHO
4,522,014 UART: RITY.KEYID = 7
4,536,996 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,761 UART: [art] PUB.X = D9E909AD520FB3C7E0DDCFCCD5B6EA9020D8369103B34F572E526E8B328B3780B4F27D7A66E68B27ADF3FD344AA7DA5E
4,544,542 UART: [art] PUB.Y = 5833698FED2086DE797CD093CACA460A20E4D5CF364F8FB5E9A7A49338DBB08A837B88C745618C438C1A9EAD5901434D
4,551,494 UART: [art] SIG.R = 6718A41E19BA16180BB5923254FC1C639653E24604AD2D1FAC167EDCB0FC2CE2281D06135E52D67529F16CE15AFEB6A1
4,558,263 UART: [art] SIG.S = 6B54A2EB4EB19333939CF3124D2F4F117405399D949F89AE12335A404EF63F4F41882DB02CBF73F62A1595DF09777014
4,582,416 UART: Caliptra RT
4,582,669 UART: [state] CFI Enabled
4,864,665 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Production
85,978 UART: [state] DebugLocked = Yes
86,650 UART: [state] Starting the WD Timer 40000000 cycles
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,933 UART: [kat] SHA2-512-ACC
906,834 UART: [kat] ECC-384
916,751 UART: [kat] HMAC-384Kdf
921,427 UART: [kat] LMS
1,169,739 UART: [kat] --
1,170,712 UART: [cold-reset] ++
1,171,193 UART: [fht] FHT @ 0x50003400
1,173,825 UART: [idev] ++
1,173,993 UART: [idev] CDI.KEYID = 6
1,174,354 UART: [idev] SUBJECT.KEYID = 7
1,174,779 UART: [idev] UDS.KEYID = 0
1,175,125 ready_for_fw is high
1,175,125 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,748 UART: [idev] Erasing UDS.KEYID = 0
1,199,707 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,308 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,178 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,884 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,120 UART: [ldev] --
1,281,398 UART: [fwproc] Wait for Commands...
1,282,033 UART: [fwproc] Recv command 0x46574c44
1,282,766 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,796 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,629 >>> mbox cmd response: success
2,796,649 UART: [afmc] ++
2,796,817 UART: [afmc] CDI.KEYID = 6
2,797,180 UART: [afmc] SUBJECT.KEYID = 7
2,797,606 UART: [afmc] AUTHORITY.KEYID = 5
2,833,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,119 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,870 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,589 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,482 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,189 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,108 UART: [afmc] --
2,876,985 UART: [cold-reset] --
2,877,705 UART: [state] Locking Datavault
2,879,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,640 UART: [state] Locking ICCM
2,880,246 UART: [exit] Launching FMC @ 0x40000130
2,885,575 UART:
2,885,591 UART: Running Caliptra FMC ...
2,885,999 UART:
2,886,142 UART: [state] CFI Enabled
2,896,337 UART: [fht] FMC Alias Private Key: 7
3,004,408 UART: [art] Extend RT PCRs Done
3,004,836 UART: [art] Lock RT PCRs Done
3,006,568 UART: [art] Populate DV Done
3,014,782 UART: [fht] FMC Alias Private Key: 7
3,015,916 UART: [art] Derive CDI
3,016,196 UART: [art] Store in in slot 0x4
3,101,993 UART: [art] Derive Key Pair
3,102,353 UART: [art] Store priv key in slot 0x5
3,114,975 UART: [art] Derive Key Pair - Done
3,129,737 UART: [art] Signing Cert with AUTHO
3,130,217 UART: RITY.KEYID = 7
3,145,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,212 UART: [art] PUB.X = 1234D8B6240F080B7F54EAF11C9DC15FDDD83B09179DF8BF5A5C902BB831124E023049A6519BB90CE0E51BDDF20E7E5D
3,152,975 UART: [art] PUB.Y = D3FC7FD6FEC393E7242607F2791D892E9BF838F8DAECD0BE643307B0A38C31809606AD2DF953ECE325896822E1A3E7B8
3,159,926 UART: [art] SIG.R = 3233BD87C2050623691BAA9F00F83F32315F64E3F97D83362F821E7BF28E43841845C4B85DCF83236A6E249FA4FDED92
3,166,668 UART: [art] SIG.S = B287678F1A858691A86D795F6D799505A3A16066FABD44C5EBAE1DAC6A09FCFB3DA1DC89F81E7E4460AFEF3167941946
3,190,657 UART: Caliptra RT
3,191,002 UART: [state] CFI Enabled
3,299,129 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,885 UART:
3,299,901 UART: Running Caliptra ROM ...
3,300,309 UART:
3,300,451 UART: [state] CFI Enabled
3,302,996 UART: [state] LifecycleState = Production
3,303,604 UART: [state] DebugLocked = Yes
3,304,356 UART: [state] Starting the WD Timer 40000000 cycles
3,306,031 UART: [kat] SHA2-256
4,109,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,710 UART: [kat] ++
4,113,862 UART: [kat] sha1
4,118,248 UART: [kat] SHA2-256
4,120,188 UART: [kat] SHA2-384
4,122,985 UART: [kat] SHA2-512-ACC
4,124,886 UART: [kat] ECC-384
4,134,657 UART: [kat] HMAC-384Kdf
4,139,299 UART: [kat] LMS
4,387,611 UART: [kat] --
4,388,653 UART: [warm-reset] ++
4,389,884 UART: [warm-reset] --
4,390,729 UART: [state] Locking Datavault
4,391,465 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,069 UART: [state] Locking ICCM
4,392,623 UART: [exit] Launching FMC @ 0x40000130
4,397,952 UART:
4,397,968 UART: Running Caliptra FMC ...
4,398,376 UART:
4,398,519 UART: [state] CFI Enabled
4,399,766 UART: [aliasrt :skip pcr extension
4,400,239 UART: [art] Extend RT PCRs Done
4,400,667 UART: [art] Lock RT PCRs Done
4,402,052 UART: [art] Populate DV Done
4,410,228 UART: [fht] FMC Alias Private Key: 7
4,411,328 UART: [art] Derive CDI
4,411,608 UART: [art] Store in in slot 0x4
4,497,757 UART: [art] Derive Key Pair
4,498,117 UART: [art] Store priv key in slot 0x5
4,510,875 UART: [art] Derive Key Pair - Done
4,525,919 UART: [art] Signing Cert with AUTHO
4,526,399 UART: RITY.KEYID = 7
4,541,987 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,752 UART: [art] PUB.X = 1234D8B6240F080B7F54EAF11C9DC15FDDD83B09179DF8BF5A5C902BB831124E023049A6519BB90CE0E51BDDF20E7E5D
4,549,515 UART: [art] PUB.Y = D3FC7FD6FEC393E7242607F2791D892E9BF838F8DAECD0BE643307B0A38C31809606AD2DF953ECE325896822E1A3E7B8
4,556,466 UART: [art] SIG.R = 3233BD87C2050623691BAA9F00F83F32315F64E3F97D83362F821E7BF28E43841845C4B85DCF83236A6E249FA4FDED92
4,563,208 UART: [art] SIG.S = B287678F1A858691A86D795F6D799505A3A16066FABD44C5EBAE1DAC6A09FCFB3DA1DC89F81E7E4460AFEF3167941946
4,587,145 UART: Caliptra RT
4,587,490 UART: [state] CFI Enabled
4,866,009 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Production
85,792 UART: [state] DebugLocked = Yes
86,484 UART: [state] Starting the WD Timer 40000000 cycles
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,804 UART: [kat] ++
895,956 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,779 UART: [kat] LMS
1,169,091 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,757 UART: [idev] ++
1,172,925 UART: [idev] CDI.KEYID = 6
1,173,286 UART: [idev] SUBJECT.KEYID = 7
1,173,711 UART: [idev] UDS.KEYID = 0
1,174,057 ready_for_fw is high
1,174,057 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,213 UART: [idev] Sha1 KeyId Algorithm
1,208,056 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,241,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,058 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,752 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,622 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,328 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,432 UART: [ldev] --
1,280,900 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,424 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,305 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,269 >>> mbox cmd response: success
2,797,503 UART: [afmc] ++
2,797,671 UART: [afmc] CDI.KEYID = 6
2,798,034 UART: [afmc] SUBJECT.KEYID = 7
2,798,460 UART: [afmc] AUTHORITY.KEYID = 5
2,834,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,278 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,997 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,890 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,597 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,484 UART: [afmc] --
2,878,391 UART: [cold-reset] --
2,879,089 UART: [state] Locking Datavault
2,880,454 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,058 UART: [state] Locking ICCM
2,881,696 UART: [exit] Launching FMC @ 0x40000130
2,887,025 UART:
2,887,041 UART: Running Caliptra FMC ...
2,887,449 UART:
2,887,592 UART: [state] CFI Enabled
2,898,107 UART: [fht] FMC Alias Private Key: 7
3,006,222 UART: [art] Extend RT PCRs Done
3,006,650 UART: [art] Lock RT PCRs Done
3,008,442 UART: [art] Populate DV Done
3,016,630 UART: [fht] FMC Alias Private Key: 7
3,017,746 UART: [art] Derive CDI
3,018,026 UART: [art] Store in in slot 0x4
3,103,689 UART: [art] Derive Key Pair
3,104,049 UART: [art] Store priv key in slot 0x5
3,117,705 UART: [art] Derive Key Pair - Done
3,132,365 UART: [art] Signing Cert with AUTHO
3,132,845 UART: RITY.KEYID = 7
3,147,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,530 UART: [art] PUB.X = 75356DC3263357C31541F3DA4E353D44E90FB4D3FF8396663CE9C6B36794E98B0ED7591A64BFDF24BE8FB31E4B856FD2
3,155,302 UART: [art] PUB.Y = 1412D3E5D323FC85BA0CFE9CB42F601CD5506EA47EBE760D7B1E8D18886B0191F30FA0BA7A22C1FDCDE49BFA980E5243
3,162,257 UART: [art] SIG.R = FFA60960EAB3E7F82E78B2178721A035552F0A96C11F9047AC1660344DC00822D86A91A54B97BFB3396EBA11340EC22D
3,169,017 UART: [art] SIG.S = AD77A3A48A12FFD9BAD4AAF8F3F42DD642A1C9AD50DF5A70B162FEAAB32BB52558589EFB9A1F0BE6919AA5E2725841A9
3,192,895 UART: Caliptra RT
3,193,240 UART: [state] CFI Enabled
3,302,101 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,302,857 UART:
3,302,873 UART: Running Caliptra ROM ...
3,303,281 UART:
3,303,423 UART: [state] CFI Enabled
3,306,160 UART: [state] LifecycleState = Production
3,306,768 UART: [state] DebugLocked = Yes
3,307,490 UART: [state] Starting the WD Timer 40000000 cycles
3,309,157 UART: [kat] SHA2-256
4,112,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,116,836 UART: [kat] ++
4,116,988 UART: [kat] sha1
4,121,388 UART: [kat] SHA2-256
4,123,328 UART: [kat] SHA2-384
4,126,115 UART: [kat] SHA2-512-ACC
4,128,016 UART: [kat] ECC-384
4,137,705 UART: [kat] HMAC-384Kdf
4,142,215 UART: [kat] LMS
4,390,527 UART: [kat] --
4,391,269 UART: [warm-reset] ++
4,392,102 UART: [warm-reset] --
4,392,915 UART: [state] Locking Datavault
4,393,653 UART: [state] Locking PCR0, PCR1 and PCR31
4,394,257 UART: [state] Locking ICCM
4,394,815 UART: [exit] Launching FMC @ 0x40000130
4,400,144 UART:
4,400,160 UART: Running Caliptra FMC ...
4,400,568 UART:
4,400,711 UART: [state] CFI Enabled
4,402,040 UART: [aliasrt :skip pcr extension
4,402,513 UART: [art] Extend RT PCRs Done
4,402,941 UART: [art] Lock RT PCRs Done
4,404,178 UART: [art] Populate DV Done
4,412,282 UART: [fht] FMC Alias Private Key: 7
4,413,260 UART: [art] Derive CDI
4,413,540 UART: [art] Store in in slot 0x4
4,499,107 UART: [art] Derive Key Pair
4,499,467 UART: [art] Store priv key in slot 0x5
4,512,973 UART: [art] Derive Key Pair - Done
4,527,799 UART: [art] Signing Cert with AUTHO
4,528,279 UART: RITY.KEYID = 7
4,543,587 UART: [art] Erasing AUTHORITY.KEYID = 7
4,544,352 UART: [art] PUB.X = 75356DC3263357C31541F3DA4E353D44E90FB4D3FF8396663CE9C6B36794E98B0ED7591A64BFDF24BE8FB31E4B856FD2
4,551,124 UART: [art] PUB.Y = 1412D3E5D323FC85BA0CFE9CB42F601CD5506EA47EBE760D7B1E8D18886B0191F30FA0BA7A22C1FDCDE49BFA980E5243
4,558,079 UART: [art] SIG.R = FFA60960EAB3E7F82E78B2178721A035552F0A96C11F9047AC1660344DC00822D86A91A54B97BFB3396EBA11340EC22D
4,564,839 UART: [art] SIG.S = AD77A3A48A12FFD9BAD4AAF8F3F42DD642A1C9AD50DF5A70B162FEAAB32BB52558589EFB9A1F0BE6919AA5E2725841A9
4,588,787 UART: Caliptra RT
4,589,132 UART: [state] CFI Enabled
4,866,695 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,562 UART:
191,935 UART: Running Caliptra ROM ...
193,061 UART:
193,218 UART: [state] CFI Enabled
264,180 UART: [state] LifecycleState = Unprovisioned
266,585 UART: [state] DebugLocked = Yes
269,569 UART: [state] Starting the WD Timer 1000000 cycles
275,300 UART: [kat] SHA2-256
457,252 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,749 UART: [kat] ++
469,307 UART: [kat] sha1
479,213 UART: [kat] SHA2-256
482,223 UART: [kat] SHA2-384
486,953 UART: [kat] SHA2-512-ACC
489,558 UART: [kat] ECC-384
1,273,576 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
1,281,248 UART: WDT Expired
1,281,818 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C52 ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
191,742 UART:
192,129 UART: Running Caliptra ROM ...
193,252 UART:
603,042 UART: [state] CFI Enabled
618,763 UART: [state] LifecycleState = Unprovisioned
621,110 UART: [state] DebugLocked = Yes
623,327 UART: [state] Starting the WD Timer 1000000 cycles
628,187 UART: [kat] SHA2-256
810,153 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
821,714 UART: [kat] ++
822,329 UART: [kat] sha1
833,261 UART: [kat] SHA2-256
836,313 UART: [kat] SHA2-384
842,763 UART: [kat] SHA2-512-ACC
845,371 UART: [kat] ECC-384
1,627,338 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
1,634,988 UART: WDT Expired
1,635,551 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008D04 ra=0x00008CFA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007C54 ra=0x00007C46 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
191,599 UART:
191,983 UART: Running Caliptra ROM ...
193,156 UART:
193,315 UART: [state] CFI Enabled
263,687 UART: [state] LifecycleState = Unprovisioned
265,588 UART: [state] DebugLocked = Yes
267,383 UART: [state] Starting the WD Timer 1000000 cycles
271,816 UART: [kat] SHA2-256
450,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,543 UART: [kat] ++
463,093 UART: [kat] sha1
474,791 UART: [kat] SHA2-256
477,791 UART: [kat] SHA2-384
483,656 UART: [kat] SHA2-512-ACC
486,596 UART: [kat] ECC-384
1,270,906 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009118 ra=0x0000910E error_internal_intr_r=00000040
1,277,928 UART: WDT Expired
1,278,499 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009118 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008064 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
191,863 UART:
192,239 UART: Running Caliptra ROM ...
193,359 UART:
603,065 UART: [state] CFI Enabled
615,709 UART: [state] LifecycleState = Unprovisioned
617,570 UART: [state] DebugLocked = Yes
620,112 UART: [state] Starting the WD Timer 1000000 cycles
625,027 UART: [kat] SHA2-256
804,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,732 UART: [kat] ++
816,294 UART: [kat] sha1
826,690 UART: [kat] SHA2-256
829,705 UART: [kat] SHA2-384
836,152 UART: [kat] SHA2-512-ACC
839,090 UART: [kat] ECC-384
1,623,723 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,630,675 UART: WDT Expired
1,631,247 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008062 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
191,744 UART:
192,109 UART: Running Caliptra ROM ...
193,299 UART:
193,453 UART: [state] CFI Enabled
264,015 UART: [state] LifecycleState = Unprovisioned
265,858 UART: [state] DebugLocked = Yes
268,088 UART: [state] Starting the WD Timer 1000000 cycles
272,539 UART: [kat] SHA2-256
451,679 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,253 UART: [kat] ++
463,815 UART: [kat] sha1
475,541 UART: [kat] SHA2-256
478,582 UART: [kat] SHA2-384
484,347 UART: [kat] SHA2-512-ACC
487,292 UART: [kat] ECC-384
1,271,652 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
1,278,643 UART: WDT Expired
1,279,213 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009120 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008072 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
191,843 UART:
192,250 UART: Running Caliptra ROM ...
193,651 UART:
602,976 UART: [state] CFI Enabled
617,494 UART: [state] LifecycleState = Unprovisioned
619,354 UART: [state] DebugLocked = Yes
621,356 UART: [state] Starting the WD Timer 1000000 cycles
626,067 UART: [kat] SHA2-256
805,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,727 UART: [kat] ++
817,278 UART: [kat] sha1
828,430 UART: [kat] SHA2-256
831,432 UART: [kat] SHA2-384
838,704 UART: [kat] SHA2-512-ACC
841,645 UART: [kat] ECC-384
1,624,948 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
1,631,908 UART: WDT Expired
1,632,652 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009116 ra=0x0000910E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008062 ra=0x0000805A error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = Yes
86,595 UART: [state] Starting the WD Timer 1000000 cycles
88,102 UART: [kat] SHA2-256
891,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,908 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007962 ra=0x00008150 error_internal_intr_r=00000040
1,090,347 UART: WDT Expired
1,090,556 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007962 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000781A ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,690 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = Yes
86,918 UART: [state] Starting the WD Timer 1000000 cycles
88,427 UART: [kat] SHA2-256
891,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,106 UART: [kat] ++
896,258 UART: [kat] sha1
900,530 UART: [kat] SHA2-256
902,470 UART: [kat] SHA2-384
905,281 UART: [kat] SHA2-512-ACC
907,182 UART: [kat] ECC-384
916,987 UART: [kat] HMAC-384Kdf
921,551 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,231 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
1,090,670 UART: WDT Expired
1,090,879 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007986 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007810 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,755 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = Yes
85,985 UART: [state] Starting the WD Timer 1000000 cycles
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,298 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
1,089,739 UART: WDT Expired
1,089,948 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079C0 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000090CC ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = Yes
86,558 UART: [state] Starting the WD Timer 1000000 cycles
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
904,919 UART: [kat] SHA2-512-ACC
906,820 UART: [kat] ECC-384
916,759 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,871 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
1,090,312 UART: WDT Expired
1,090,521 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000799C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007830 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = Yes
86,511 UART: [state] Starting the WD Timer 1000000 cycles
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,860 UART: [kat] SHA2-512-ACC
906,761 UART: [kat] ECC-384
915,772 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,824 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007992 ra=0x00008150 error_internal_intr_r=00000040
1,090,263 UART: WDT Expired
1,090,472 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007992 ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007834 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = Yes
86,766 UART: [state] Starting the WD Timer 1000000 cycles
88,385 UART: [kat] SHA2-256
891,935 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,064 UART: [kat] ++
896,216 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
904,933 UART: [kat] SHA2-512-ACC
906,834 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,079 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x0000798C ra=0x00008150 error_internal_intr_r=00000040
1,090,520 UART: WDT Expired
1,090,729 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000798C ra=0x00008150 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007812 ra=0x000077EA error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
191,570 UART:
191,940 UART: Running Caliptra ROM ...
193,060 UART:
193,210 UART: [state] CFI Enabled
265,751 UART: [state] LifecycleState = Unprovisioned
268,118 UART: [state] DebugLocked = Yes
270,745 UART: [state] Starting the WD Timer 40000000 cycles
276,514 UART: [kat] SHA2-256
458,489 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
469,987 UART: [kat] ++
470,522 UART: [kat] sha1
480,567 UART: [kat] SHA2-256
483,601 UART: [kat] SHA2-384
489,333 UART: [kat] SHA2-512-ACC
491,960 UART: [kat] ECC-384
3,774,092 UART: [kat] HMAC-384Kdf
3,803,141 UART: [kat] LMS
4,876,305 UART: [kat] --
4,881,867 UART: [cold-reset] ++
4,883,427 UART: [fht] FHT @ 0x50003400
4,895,529 UART: [idev] ++
4,896,191 UART: [idev] CDI.KEYID = 6
4,897,448 UART: [idev] SUBJECT.KEYID = 7
4,898,548 UART: [idev] UDS.KEYID = 0
4,901,742 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,042,165 UART: [idev] Erasing UDS.KEYID = 0
8,245,978 UART: [idev] Sha1 KeyId Algorithm
8,269,371 UART: [idev] --
8,273,254 UART: [ldev] ++
8,273,822 UART: [ldev] CDI.KEYID = 6
8,275,006 UART: [ldev] SUBJECT.KEYID = 5
8,276,174 UART: [ldev] AUTHORITY.KEYID = 7
8,277,325 UART: [ldev] FE.KEYID = 1
8,318,353 UART: [ldev] Erasing FE.KEYID = 1
11,653,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,946,262 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,962,568 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,978,566 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,994,686 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,015,783 UART: [ldev] --
14,019,915 UART: [fwproc] Wait for Commands...
14,022,282 UART: [fwproc] Recv command 0x46574c44
14,024,540 UART: [fwproc] Recv'd Img size: 111408 bytes
18,062,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,136,379 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,196,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,511,857 >>> mbox cmd response: success
18,515,497 UART: [afmc] ++
18,516,114 UART: [afmc] CDI.KEYID = 6
18,517,274 UART: [afmc] SUBJECT.KEYID = 7
18,518,421 UART: [afmc] AUTHORITY.KEYID = 5
21,874,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,173,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,175,746 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,191,936 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,208,072 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,224,160 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,246,355 UART: [afmc] --
24,249,181 UART: [cold-reset] --
24,253,712 UART: [state] Locking Datavault
24,259,259 UART: [state] Locking PCR0, PCR1 and PCR31
24,260,933 UART: [state] Locking ICCM
24,262,690 UART: [exit] Launching FMC @ 0x40000000
24,271,317 UART:
24,271,565 UART: Running Caliptra FMC ...
24,272,704 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,806,030 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,300,811 >>> mbox cmd response: success
23,996,765 UART:
23,997,154 UART: Running Caliptra FMC ...
23,998,383 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
191,859 UART:
192,222 UART: Running Caliptra ROM ...
193,419 UART:
603,039 UART: [state] CFI Enabled
618,300 UART: [state] LifecycleState = Unprovisioned
620,625 UART: [state] DebugLocked = Yes
622,267 UART: [state] Starting the WD Timer 40000000 cycles
626,904 UART: [kat] SHA2-256
808,932 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,463 UART: [kat] ++
821,085 UART: [kat] sha1
831,088 UART: [kat] SHA2-256
834,119 UART: [kat] SHA2-384
839,741 UART: [kat] SHA2-512-ACC
842,345 UART: [kat] ECC-384
4,095,704 UART: [kat] HMAC-384Kdf
4,106,874 UART: [kat] LMS
5,180,060 UART: [kat] --
5,185,998 UART: [cold-reset] ++
5,188,414 UART: [fht] FHT @ 0x50003400
5,200,021 UART: [idev] ++
5,200,689 UART: [idev] CDI.KEYID = 6
5,201,896 UART: [idev] SUBJECT.KEYID = 7
5,203,350 UART: [idev] UDS.KEYID = 0
5,206,822 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
5,347,436 UART: [idev] Erasing UDS.KEYID = 0
8,495,970 UART: [idev] Sha1 KeyId Algorithm
8,518,335 UART: [idev] --
8,522,866 UART: [ldev] ++
8,523,429 UART: [ldev] CDI.KEYID = 6
8,524,585 UART: [ldev] SUBJECT.KEYID = 5
8,525,840 UART: [ldev] AUTHORITY.KEYID = 7
8,527,005 UART: [ldev] FE.KEYID = 1
8,535,358 UART: [ldev] Erasing FE.KEYID = 1
11,827,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,119,340 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,135,618 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,151,648 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,167,778 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,189,329 UART: [ldev] --
14,194,598 UART: [fwproc] Wait for Commands...
14,196,259 UART: [fwproc] Recv command 0x46574c44
14,198,517 UART: [fwproc] Recv'd Img size: 111408 bytes
18,238,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,308,294 UART: [fwproc] Load FMC at address 0x40000000 len 16384
18,368,518 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,684,276 >>> mbox cmd response: success
18,687,621 UART: [afmc] ++
18,688,246 UART: [afmc] CDI.KEYID = 6
18,689,317 UART: [afmc] SUBJECT.KEYID = 7
18,690,548 UART: [afmc] AUTHORITY.KEYID = 5
22,010,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,308,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,311,182 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
24,327,370 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
24,343,464 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
24,359,569 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
24,382,495 UART: [afmc] --
24,386,951 UART: [cold-reset] --
24,390,886 UART: [state] Locking Datavault
24,396,080 UART: [state] Locking PCR0, PCR1 and PCR31
24,397,749 UART: [state] Locking ICCM
24,400,442 UART: [exit] Launching FMC @ 0x40000000
24,409,073 UART:
24,409,344 UART: Running Caliptra FMC ...
24,410,478 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
5,099,366 <<< Executing mbox cmd 0x46574c44 (111408 bytes) from SoC
18,501,570 >>> mbox cmd response: success
24,134,877 UART:
24,135,264 UART: Running Caliptra FMC ...
24,136,448 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
191,595 UART:
191,963 UART: Running Caliptra ROM ...
193,138 UART:
193,291 UART: [state] CFI Enabled
262,714 UART: [state] LifecycleState = Unprovisioned
264,620 UART: [state] DebugLocked = Yes
265,972 UART: [state] Starting the WD Timer 40000000 cycles
271,594 UART: [kat] SHA2-256
450,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,296 UART: [kat] ++
462,767 UART: [kat] sha1
474,134 UART: [kat] SHA2-256
477,169 UART: [kat] SHA2-384
482,698 UART: [kat] SHA2-512-ACC
485,664 UART: [kat] ECC-384
2,947,100 UART: [kat] HMAC-384Kdf
2,970,447 UART: [kat] LMS
3,499,942 UART: [kat] --
3,505,024 UART: [cold-reset] ++
3,506,594 UART: [fht] FHT @ 0x50003400
3,518,299 UART: [idev] ++
3,518,865 UART: [idev] CDI.KEYID = 6
3,519,791 UART: [idev] SUBJECT.KEYID = 7
3,520,997 UART: [idev] UDS.KEYID = 0
3,524,113 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,664,933 UART: [idev] Erasing UDS.KEYID = 0
6,024,148 UART: [idev] Sha1 KeyId Algorithm
6,047,225 UART: [idev] --
6,052,032 UART: [ldev] ++
6,052,610 UART: [ldev] CDI.KEYID = 6
6,053,524 UART: [ldev] SUBJECT.KEYID = 5
6,054,690 UART: [ldev] AUTHORITY.KEYID = 7
6,055,979 UART: [ldev] FE.KEYID = 1
6,098,545 UART: [ldev] Erasing FE.KEYID = 1
8,599,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,925 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,334,918 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,350,722 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,366,719 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,386,361 UART: [ldev] --
10,391,813 UART: [fwproc] Wait for Commands...
10,394,454 UART: [fwproc] Recv command 0x46574c44
10,396,552 UART: [fwproc] Recv'd Img size: 111752 bytes
13,766,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,840,374 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,900,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,218,405 >>> mbox cmd response: success
14,223,188 UART: [afmc] ++
14,223,806 UART: [afmc] CDI.KEYID = 6
14,224,741 UART: [afmc] SUBJECT.KEYID = 7
14,225,813 UART: [afmc] AUTHORITY.KEYID = 5
16,764,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,335 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,506,552 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,522,460 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,538,367 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,562,405 UART: [afmc] --
18,566,895 UART: [cold-reset] --
18,570,121 UART: [state] Locking Datavault
18,576,904 UART: [state] Locking PCR0, PCR1 and PCR31
18,578,583 UART: [state] Locking ICCM
18,580,958 UART: [exit] Launching FMC @ 0x40000000
18,589,367 UART:
18,589,630 UART: Running Caliptra FMC ...
18,590,780 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,383,944 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,045,873 >>> mbox cmd response: success
18,341,657 UART:
18,342,043 UART: Running Caliptra FMC ...
18,343,315 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,501 writing to cptra_bootfsm_go
193,112 UART:
193,484 UART: Running Caliptra ROM ...
194,572 UART:
604,052 UART: [state] CFI Enabled
618,877 UART: [state] LifecycleState = Unprovisioned
620,748 UART: [state] DebugLocked = Yes
623,232 UART: [state] Starting the WD Timer 40000000 cycles
628,031 UART: [kat] SHA2-256
807,171 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,714 UART: [kat] ++
819,185 UART: [kat] sha1
829,791 UART: [kat] SHA2-256
832,822 UART: [kat] SHA2-384
837,632 UART: [kat] SHA2-512-ACC
840,592 UART: [kat] ECC-384
3,282,398 UART: [kat] HMAC-384Kdf
3,295,523 UART: [kat] LMS
3,825,040 UART: [kat] --
3,829,350 UART: [cold-reset] ++
3,831,266 UART: [fht] FHT @ 0x50003400
3,842,066 UART: [idev] ++
3,842,666 UART: [idev] CDI.KEYID = 6
3,843,587 UART: [idev] SUBJECT.KEYID = 7
3,844,738 UART: [idev] UDS.KEYID = 0
3,847,622 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,988,047 UART: [idev] Erasing UDS.KEYID = 0
6,322,222 UART: [idev] Sha1 KeyId Algorithm
6,346,132 UART: [idev] --
6,349,421 UART: [ldev] ++
6,349,983 UART: [ldev] CDI.KEYID = 6
6,350,924 UART: [ldev] SUBJECT.KEYID = 5
6,352,133 UART: [ldev] AUTHORITY.KEYID = 7
6,353,361 UART: [ldev] FE.KEYID = 1
6,364,036 UART: [ldev] Erasing FE.KEYID = 1
8,836,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,429 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,408 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,212 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,601,166 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,622,549 UART: [ldev] --
10,626,568 UART: [fwproc] Wait for Commands...
10,629,747 UART: [fwproc] Recv command 0x46574c44
10,631,840 UART: [fwproc] Recv'd Img size: 111752 bytes
14,012,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,086,634 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,146,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,464,404 >>> mbox cmd response: success
14,468,977 UART: [afmc] ++
14,469,592 UART: [afmc] CDI.KEYID = 6
14,470,542 UART: [afmc] SUBJECT.KEYID = 7
14,471,675 UART: [afmc] AUTHORITY.KEYID = 5
16,969,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,689,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,691,636 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,707,847 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,723,761 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,739,662 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,762,019 UART: [afmc] --
18,766,458 UART: [cold-reset] --
18,769,958 UART: [state] Locking Datavault
18,774,755 UART: [state] Locking PCR0, PCR1 and PCR31
18,776,421 UART: [state] Locking ICCM
18,778,256 UART: [exit] Launching FMC @ 0x40000000
18,786,653 UART:
18,786,908 UART: Running Caliptra FMC ...
18,787,970 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,694,772 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,227,796 >>> mbox cmd response: success
18,476,786 UART:
18,477,166 UART: Running Caliptra FMC ...
18,478,309 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
191,848 UART:
192,226 UART: Running Caliptra ROM ...
193,313 UART:
193,454 UART: [state] CFI Enabled
261,174 UART: [state] LifecycleState = Unprovisioned
263,095 UART: [state] DebugLocked = Yes
264,872 UART: [state] Starting the WD Timer 40000000 cycles
270,050 UART: [kat] SHA2-256
449,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,753 UART: [kat] ++
461,226 UART: [kat] sha1
471,440 UART: [kat] SHA2-256
474,480 UART: [kat] SHA2-384
480,536 UART: [kat] SHA2-512-ACC
483,467 UART: [kat] ECC-384
2,946,086 UART: [kat] HMAC-384Kdf
2,971,239 UART: [kat] LMS
3,500,684 UART: [kat] --
3,504,183 UART: [cold-reset] ++
3,505,895 UART: [fht] FHT @ 0x50003400
3,517,023 UART: [idev] ++
3,517,606 UART: [idev] CDI.KEYID = 6
3,518,525 UART: [idev] SUBJECT.KEYID = 7
3,519,738 UART: [idev] UDS.KEYID = 0
3,522,853 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,663,518 UART: [idev] Erasing UDS.KEYID = 0
6,023,258 UART: [idev] Sha1 KeyId Algorithm
6,045,630 UART: [idev] --
6,049,705 UART: [ldev] ++
6,050,282 UART: [ldev] CDI.KEYID = 6
6,051,191 UART: [ldev] SUBJECT.KEYID = 5
6,052,353 UART: [ldev] AUTHORITY.KEYID = 7
6,053,653 UART: [ldev] FE.KEYID = 1
6,098,336 UART: [ldev] Erasing FE.KEYID = 1
8,600,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,811 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,353,798 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,369,628 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,385,580 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,405,261 UART: [ldev] --
10,409,080 UART: [fwproc] Wait for Commands...
10,411,779 UART: [fwproc] Recv command 0x46574c44
10,413,876 UART: [fwproc] Recv'd Img size: 111752 bytes
13,783,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,858,378 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,918,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,236,663 >>> mbox cmd response: success
14,241,657 UART: [afmc] ++
14,242,266 UART: [afmc] CDI.KEYID = 6
14,243,226 UART: [afmc] SUBJECT.KEYID = 7
14,244,363 UART: [afmc] AUTHORITY.KEYID = 5
16,786,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,506,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,786 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,524,970 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,540,902 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,556,835 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,580,702 UART: [afmc] --
18,584,828 UART: [cold-reset] --
18,590,234 UART: [state] Locking Datavault
18,595,419 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,099 UART: [state] Locking ICCM
18,598,353 UART: [exit] Launching FMC @ 0x40000000
18,606,764 UART:
18,607,013 UART: Running Caliptra FMC ...
18,608,076 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,360,989 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,016,926 >>> mbox cmd response: success
18,299,533 UART:
18,299,935 UART: Running Caliptra FMC ...
18,301,187 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
191,820 UART:
192,211 UART: Running Caliptra ROM ...
193,338 UART:
602,928 UART: [state] CFI Enabled
614,109 UART: [state] LifecycleState = Unprovisioned
615,979 UART: [state] DebugLocked = Yes
617,319 UART: [state] Starting the WD Timer 40000000 cycles
622,438 UART: [kat] SHA2-256
801,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,139 UART: [kat] ++
813,613 UART: [kat] sha1
824,881 UART: [kat] SHA2-256
827,914 UART: [kat] SHA2-384
833,487 UART: [kat] SHA2-512-ACC
836,448 UART: [kat] ECC-384
3,278,379 UART: [kat] HMAC-384Kdf
3,290,270 UART: [kat] LMS
3,819,822 UART: [kat] --
3,826,424 UART: [cold-reset] ++
3,828,593 UART: [fht] FHT @ 0x50003400
3,838,702 UART: [idev] ++
3,839,271 UART: [idev] CDI.KEYID = 6
3,840,278 UART: [idev] SUBJECT.KEYID = 7
3,841,426 UART: [idev] UDS.KEYID = 0
3,844,329 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
3,984,894 UART: [idev] Erasing UDS.KEYID = 0
6,318,031 UART: [idev] Sha1 KeyId Algorithm
6,341,011 UART: [idev] --
6,346,009 UART: [ldev] ++
6,346,587 UART: [ldev] CDI.KEYID = 6
6,347,502 UART: [ldev] SUBJECT.KEYID = 5
6,348,662 UART: [ldev] AUTHORITY.KEYID = 7
6,349,963 UART: [ldev] FE.KEYID = 1
6,362,124 UART: [ldev] Erasing FE.KEYID = 1
8,834,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,303 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,258 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,126 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,093 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,618,486 UART: [ldev] --
10,623,852 UART: [fwproc] Wait for Commands...
10,626,267 UART: [fwproc] Recv command 0x46574c44
10,628,307 UART: [fwproc] Recv'd Img size: 111752 bytes
13,995,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,069,107 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,129,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,446,248 >>> mbox cmd response: success
14,451,132 UART: [afmc] ++
14,451,761 UART: [afmc] CDI.KEYID = 6
14,452,781 UART: [afmc] SUBJECT.KEYID = 7
14,453,913 UART: [afmc] AUTHORITY.KEYID = 5
16,952,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,672,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,674,674 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,690,874 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,706,756 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,722,689 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,743,887 UART: [afmc] --
18,746,935 UART: [cold-reset] --
18,751,352 UART: [state] Locking Datavault
18,756,056 UART: [state] Locking PCR0, PCR1 and PCR31
18,757,769 UART: [state] Locking ICCM
18,759,469 UART: [exit] Launching FMC @ 0x40000000
18,767,829 UART:
18,768,107 UART: Running Caliptra FMC ...
18,769,247 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,699,113 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
14,229,743 >>> mbox cmd response: success
18,483,403 UART:
18,483,781 UART: Running Caliptra FMC ...
18,485,025 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = Yes
86,341 UART: [state] Starting the WD Timer 40000000 cycles
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
899,999 UART: [kat] SHA2-256
901,939 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,672 UART: [kat] LMS
1,168,984 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,756 UART: [idev] ++
1,172,924 UART: [idev] CDI.KEYID = 6
1,173,285 UART: [idev] SUBJECT.KEYID = 7
1,173,710 UART: [idev] UDS.KEYID = 0
1,174,056 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,466 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,240,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,377 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,071 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,941 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,647 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,705 UART: [ldev] --
1,280,131 UART: [fwproc] Wait for Commands...
1,280,938 UART: [fwproc] Recv command 0x46574c44
1,281,671 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,582 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,730 >>> mbox cmd response: success
2,738,936 UART: [afmc] ++
2,739,104 UART: [afmc] CDI.KEYID = 6
2,739,467 UART: [afmc] SUBJECT.KEYID = 7
2,739,893 UART: [afmc] AUTHORITY.KEYID = 5
2,774,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,226 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,797,939 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,803,810 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,809,520 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,817,390 UART: [afmc] --
2,818,279 UART: [cold-reset] --
2,819,117 UART: [state] Locking Datavault
2,820,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,820,838 UART: [state] Locking ICCM
2,821,320 UART: [exit] Launching FMC @ 0x40000000
2,826,617 UART:
2,826,633 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,191 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,589,100 >>> mbox cmd response: success
2,650,458 UART:
2,650,474 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = Yes
86,948 UART: [state] Starting the WD Timer 40000000 cycles
88,645 UART: [kat] SHA2-256
892,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,324 UART: [kat] ++
896,476 UART: [kat] sha1
900,558 UART: [kat] SHA2-256
902,498 UART: [kat] SHA2-384
905,159 UART: [kat] SHA2-512-ACC
907,060 UART: [kat] ECC-384
916,261 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,261 UART: [idev] ++
1,173,429 UART: [idev] CDI.KEYID = 6
1,173,790 UART: [idev] SUBJECT.KEYID = 7
1,174,215 UART: [idev] UDS.KEYID = 0
1,174,561 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,501 UART: [idev] Sha1 KeyId Algorithm
1,208,396 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,009 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,557 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,692 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,386 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,256 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,962 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,126 UART: [ldev] --
1,281,504 UART: [fwproc] Wait for Commands...
1,282,277 UART: [fwproc] Recv command 0x46574c44
1,283,010 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,576,799 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,484 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,737,987 >>> mbox cmd response: success
2,739,037 UART: [afmc] ++
2,739,205 UART: [afmc] CDI.KEYID = 6
2,739,568 UART: [afmc] SUBJECT.KEYID = 7
2,739,994 UART: [afmc] AUTHORITY.KEYID = 5
2,775,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,252 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,003 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,798,716 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,804,587 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,810,297 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,818,205 UART: [afmc] --
2,819,130 UART: [cold-reset] --
2,820,172 UART: [state] Locking Datavault
2,821,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,081 UART: [state] Locking ICCM
2,822,727 UART: [exit] Launching FMC @ 0x40000000
2,828,024 UART:
2,828,040 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,526 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,159 >>> mbox cmd response: success
2,652,041 UART:
2,652,057 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = Yes
86,349 UART: [state] Starting the WD Timer 40000000 cycles
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,983 UART: [cold-reset] ++
1,170,336 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,174,292 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,701 UART: [idev] Erasing UDS.KEYID = 0
1,198,342 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,867 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,561 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,431 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,137 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,337 UART: [ldev] --
1,280,761 UART: [fwproc] Wait for Commands...
1,281,434 UART: [fwproc] Recv command 0x46574c44
1,282,167 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,662 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,926 >>> mbox cmd response: success
2,740,050 UART: [afmc] ++
2,740,218 UART: [afmc] CDI.KEYID = 6
2,740,581 UART: [afmc] SUBJECT.KEYID = 7
2,741,007 UART: [afmc] AUTHORITY.KEYID = 5
2,776,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,792,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,793,488 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,799,201 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,805,072 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,810,782 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,818,698 UART: [afmc] --
2,819,729 UART: [cold-reset] --
2,820,429 UART: [state] Locking Datavault
2,821,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,108 UART: [state] Locking ICCM
2,822,542 UART: [exit] Launching FMC @ 0x40000000
2,827,839 UART:
2,827,855 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,265 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,056 >>> mbox cmd response: success
2,651,986 UART:
2,652,002 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = Yes
86,374 UART: [state] Starting the WD Timer 40000000 cycles
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,518 UART: [kat] ++
895,670 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
915,863 UART: [kat] HMAC-384Kdf
920,339 UART: [kat] LMS
1,168,651 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,772 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,642 UART: [idev] --
1,208,697 UART: [ldev] ++
1,208,865 UART: [ldev] CDI.KEYID = 6
1,209,229 UART: [ldev] SUBJECT.KEYID = 5
1,209,656 UART: [ldev] AUTHORITY.KEYID = 7
1,210,119 UART: [ldev] FE.KEYID = 1
1,215,747 UART: [ldev] Erasing FE.KEYID = 1
1,241,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,942 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,636 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,506 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,212 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,156 UART: [ldev] --
1,280,552 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 111752 bytes
2,550,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,501 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,603,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,699 >>> mbox cmd response: success
2,739,725 UART: [afmc] ++
2,739,893 UART: [afmc] CDI.KEYID = 6
2,740,256 UART: [afmc] SUBJECT.KEYID = 7
2,740,682 UART: [afmc] AUTHORITY.KEYID = 5
2,776,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,793,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,794,069 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,799,782 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,805,653 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,811,363 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,819,139 UART: [afmc] --
2,820,128 UART: [cold-reset] --
2,821,002 UART: [state] Locking Datavault
2,822,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,822,753 UART: [state] Locking ICCM
2,823,369 UART: [exit] Launching FMC @ 0x40000000
2,828,666 UART:
2,828,682 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,076 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,045 >>> mbox cmd response: success
2,651,409 UART:
2,651,425 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = Yes
86,381 UART: [state] Starting the WD Timer 40000000 cycles
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,724 UART: [kat] SHA2-512-ACC
906,625 UART: [kat] ECC-384
915,986 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,558 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,142 UART: [ldev] Erasing FE.KEYID = 1
1,241,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,837 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,707 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,413 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,339 UART: [ldev] --
1,280,773 UART: [fwproc] Wait for Commands...
1,281,384 UART: [fwproc] Recv command 0x46574c44
1,282,117 UART: [fwproc] Recv'd Img size: 111752 bytes
2,549,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,577,018 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,602,703 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,738,370 >>> mbox cmd response: success
2,739,606 UART: [afmc] ++
2,739,774 UART: [afmc] CDI.KEYID = 6
2,740,137 UART: [afmc] SUBJECT.KEYID = 7
2,740,563 UART: [afmc] AUTHORITY.KEYID = 5
2,775,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,791,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,792,300 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,798,013 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,803,884 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,809,594 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,817,552 UART: [afmc] --
2,818,619 UART: [cold-reset] --
2,819,441 UART: [state] Locking Datavault
2,820,728 UART: [state] Locking PCR0, PCR1 and PCR31
2,821,332 UART: [state] Locking ICCM
2,821,774 UART: [exit] Launching FMC @ 0x40000000
2,827,071 UART:
2,827,087 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,588,842 >>> mbox cmd response: success
2,650,122 UART:
2,650,138 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,854 UART: [state] LifecycleState = Unprovisioned
86,510 UART: [state] DebugLocked = Yes
87,020 UART: [state] Starting the WD Timer 40000000 cycles
88,695 UART: [kat] SHA2-256
892,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,374 UART: [kat] ++
896,526 UART: [kat] sha1
900,934 UART: [kat] SHA2-256
902,874 UART: [kat] SHA2-384
905,709 UART: [kat] SHA2-512-ACC
907,610 UART: [kat] ECC-384
916,923 UART: [kat] HMAC-384Kdf
921,519 UART: [kat] LMS
1,169,831 UART: [kat] --
1,170,998 UART: [cold-reset] ++
1,171,495 UART: [fht] FHT @ 0x50003400
1,174,325 UART: [idev] ++
1,174,493 UART: [idev] CDI.KEYID = 6
1,174,854 UART: [idev] SUBJECT.KEYID = 7
1,175,279 UART: [idev] UDS.KEYID = 0
1,175,625 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
1,183,744 UART: [idev] Erasing UDS.KEYID = 0
1,201,169 UART: [idev] Sha1 KeyId Algorithm
1,210,252 UART: [idev] --
1,211,127 UART: [ldev] ++
1,211,295 UART: [ldev] CDI.KEYID = 6
1,211,659 UART: [ldev] SUBJECT.KEYID = 5
1,212,086 UART: [ldev] AUTHORITY.KEYID = 7
1,212,549 UART: [ldev] FE.KEYID = 1
1,217,727 UART: [ldev] Erasing FE.KEYID = 1
1,244,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,770 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,464 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,334 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,040 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,184 UART: [ldev] --
1,283,700 UART: [fwproc] Wait for Commands...
1,284,513 UART: [fwproc] Recv command 0x46574c44
1,285,246 UART: [fwproc] Recv'd Img size: 111752 bytes
2,553,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,581,229 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,606,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,742,459 >>> mbox cmd response: success
2,743,621 UART: [afmc] ++
2,743,789 UART: [afmc] CDI.KEYID = 6
2,744,152 UART: [afmc] SUBJECT.KEYID = 7
2,744,578 UART: [afmc] AUTHORITY.KEYID = 5
2,780,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,796,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,797,375 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,803,088 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,808,959 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,814,669 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,822,545 UART: [afmc] --
2,823,634 UART: [cold-reset] --
2,824,622 UART: [state] Locking Datavault
2,825,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,826,593 UART: [state] Locking ICCM
2,827,167 UART: [exit] Launching FMC @ 0x40000000
2,832,464 UART:
2,832,480 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,878 <<< Executing mbox cmd 0x46574c44 (111752 bytes) from SoC
2,590,193 >>> mbox cmd response: success
2,652,555 UART:
2,652,571 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,140 UART:
192,518 UART: Running Caliptra ROM ...
193,694 UART:
193,847 UART: [state] CFI Enabled
263,393 UART: [state] LifecycleState = Unprovisioned
265,767 UART: [state] DebugLocked = No
268,389 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,442 UART:
192,817 UART: Running Caliptra ROM ...
194,000 UART:
603,461 UART: [state] CFI Enabled
617,158 UART: [state] LifecycleState = Unprovisioned
619,520 UART: [state] DebugLocked = No
621,646 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,102 UART:
192,480 UART: Running Caliptra ROM ...
193,664 UART:
193,815 UART: [state] CFI Enabled
261,473 UART: [state] LifecycleState = Unprovisioned
263,363 UART: [state] DebugLocked = No
264,959 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,565 UART:
192,958 UART: Running Caliptra ROM ...
194,156 UART:
603,505 UART: [state] CFI Enabled
618,825 UART: [state] LifecycleState = Unprovisioned
620,713 UART: [state] DebugLocked = No
622,199 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,223 UART:
192,600 UART: Running Caliptra ROM ...
193,776 UART:
193,948 UART: [state] CFI Enabled
265,120 UART: [state] LifecycleState = Unprovisioned
267,036 UART: [state] DebugLocked = No
268,859 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
971 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,168 writing to cptra_bootfsm_go
193,620 UART:
194,025 UART: Running Caliptra ROM ...
195,376 UART:
604,534 UART: [state] CFI Enabled
619,926 UART: [state] LifecycleState = Unprovisioned
621,792 UART: [state] DebugLocked = No
624,466 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,937 UART: [state] LifecycleState = Unprovisioned
86,592 UART: [state] DebugLocked = No
87,308 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
87,108 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,089 UART:
192,471 UART: Running Caliptra ROM ...
193,685 UART:
193,838 UART: [state] CFI Enabled
261,998 UART: [state] LifecycleState = Unprovisioned
264,373 UART: [state] DebugLocked = No
265,920 UART: [state] WD Timer not started. Device not locked for debugging
271,313 UART: [kat] SHA2-256
453,239 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,747 UART: [kat] ++
465,447 UART: [kat] sha1
474,821 UART: [kat] SHA2-256
477,821 UART: [kat] SHA2-384
483,305 UART: [kat] SHA2-512-ACC
485,907 UART: [kat] ECC-384
3,772,973 UART: [kat] HMAC-384Kdf
3,799,504 UART: [kat] LMS
4,872,613 UART: [kat] --
4,876,720 UART: [cold-reset] ++
4,878,764 UART: [fht] FHT @ 0x50003400
4,890,546 UART: [idev] ++
4,891,247 UART: [idev] CDI.KEYID = 6
4,892,432 UART: [idev] SUBJECT.KEYID = 7
4,893,601 UART: [idev] UDS.KEYID = 0
4,927,328 UART: [idev] Erasing UDS.KEYID = 0
8,240,119 UART: [idev] Sha1 KeyId Algorithm
8,260,312 UART: [idev] CSR upload begun
8,265,740 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,571,505 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,587,845 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,603,929 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,619,924 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,644,485 UART: [idev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
10,790,553 UART: [idev] CSR uploaded
10,805,719 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,806,155 UART: [idev] --
10,809,674 UART: [ldev] ++
10,810,258 UART: [ldev] CDI.KEYID = 6
10,811,180 UART: [ldev] SUBJECT.KEYID = 5
10,812,352 UART: [ldev] AUTHORITY.KEYID = 7
10,813,585 UART: [ldev] FE.KEYID = 1
10,853,095 UART: [ldev] Erasing FE.KEYID = 1
14,188,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,480,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,497,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,513,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,529,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,549,352 UART: [ldev] --
16,553,591 UART: [fwproc] Wait for Commands...
16,556,171 UART: [fwproc] Recv command 0x49444352
16,571,619 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
10,499,828 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,190,256 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,270 UART:
192,651 UART: Running Caliptra ROM ...
193,877 UART:
603,278 UART: [state] CFI Enabled
615,581 UART: [state] LifecycleState = Unprovisioned
617,970 UART: [state] DebugLocked = No
619,240 UART: [state] WD Timer not started. Device not locked for debugging
624,232 UART: [kat] SHA2-256
806,179 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
817,728 UART: [kat] ++
818,309 UART: [kat] sha1
828,432 UART: [kat] SHA2-256
831,477 UART: [kat] SHA2-384
836,478 UART: [kat] SHA2-512-ACC
839,082 UART: [kat] ECC-384
4,092,208 UART: [kat] HMAC-384Kdf
4,103,487 UART: [kat] LMS
5,176,645 UART: [kat] --
5,181,528 UART: [cold-reset] ++
5,183,462 UART: [fht] FHT @ 0x50003400
5,195,894 UART: [idev] ++
5,196,622 UART: [idev] CDI.KEYID = 6
5,197,801 UART: [idev] SUBJECT.KEYID = 7
5,199,247 UART: [idev] UDS.KEYID = 0
5,216,304 UART: [idev] Erasing UDS.KEYID = 0
8,487,460 UART: [idev] Sha1 KeyId Algorithm
8,507,866 UART: [idev] CSR upload begun
8,513,338 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
10,803,250 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
10,819,594 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
10,835,703 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
10,851,716 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,876,238 UART: [idev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
11,022,289 UART: [idev] CSR uploaded
11,037,446 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,037,880 UART: [idev] --
11,041,286 UART: [ldev] ++
11,041,841 UART: [ldev] CDI.KEYID = 6
11,042,712 UART: [ldev] SUBJECT.KEYID = 5
11,043,961 UART: [ldev] AUTHORITY.KEYID = 7
11,045,142 UART: [ldev] FE.KEYID = 1
11,056,505 UART: [ldev] Erasing FE.KEYID = 1
14,348,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,641,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,658,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,674,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,690,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,711,386 UART: [ldev] --
16,716,747 UART: [fwproc] Wait for Commands...
16,718,615 UART: [fwproc] Recv command 0x49444352
16,734,051 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,129 writing to cptra_bootfsm_go
10,732,477 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,352,989 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,056 UART:
192,440 UART: Running Caliptra ROM ...
193,665 UART:
193,815 UART: [state] CFI Enabled
258,283 UART: [state] LifecycleState = Unprovisioned
260,160 UART: [state] DebugLocked = No
262,623 UART: [state] WD Timer not started. Device not locked for debugging
267,104 UART: [kat] SHA2-256
446,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,828 UART: [kat] ++
458,360 UART: [kat] sha1
470,236 UART: [kat] SHA2-256
473,236 UART: [kat] SHA2-384
477,972 UART: [kat] SHA2-512-ACC
480,960 UART: [kat] ECC-384
2,946,274 UART: [kat] HMAC-384Kdf
2,967,532 UART: [kat] LMS
3,496,982 UART: [kat] --
3,502,113 UART: [cold-reset] ++
3,502,956 UART: [fht] FHT @ 0x50003400
3,512,717 UART: [idev] ++
3,513,270 UART: [idev] CDI.KEYID = 6
3,514,205 UART: [idev] SUBJECT.KEYID = 7
3,515,414 UART: [idev] UDS.KEYID = 0
3,540,008 UART: [idev] Erasing UDS.KEYID = 0
6,026,067 UART: [idev] Sha1 KeyId Algorithm
6,046,653 UART: [idev] CSR upload begun
6,051,368 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,777,079 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,793,144 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,809,097 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,824,925 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,848,737 UART: [idev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
7,993,802 UART: [idev] CSR uploaded
8,009,930 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,010,374 UART: [idev] --
8,014,332 UART: [ldev] ++
8,014,896 UART: [ldev] CDI.KEYID = 6
8,015,813 UART: [ldev] SUBJECT.KEYID = 5
8,016,990 UART: [ldev] AUTHORITY.KEYID = 7
8,018,230 UART: [ldev] FE.KEYID = 1
8,058,829 UART: [ldev] Erasing FE.KEYID = 1
10,566,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,300,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,316,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,331,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,347,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,366,927 UART: [ldev] --
12,371,499 UART: [fwproc] Wait for Commands...
12,374,084 UART: [fwproc] Recv command 0x49444352
12,389,200 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
7,666,545 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,966,674 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,964 writing to cptra_bootfsm_go
193,271 UART:
193,647 UART: Running Caliptra ROM ...
194,850 UART:
604,276 UART: [state] CFI Enabled
617,799 UART: [state] LifecycleState = Unprovisioned
619,630 UART: [state] DebugLocked = No
621,811 UART: [state] WD Timer not started. Device not locked for debugging
625,854 UART: [kat] SHA2-256
804,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,515 UART: [kat] ++
817,050 UART: [kat] sha1
827,776 UART: [kat] SHA2-256
830,827 UART: [kat] SHA2-384
835,878 UART: [kat] SHA2-512-ACC
838,856 UART: [kat] ECC-384
3,276,993 UART: [kat] HMAC-384Kdf
3,288,678 UART: [kat] LMS
3,818,146 UART: [kat] --
3,820,816 UART: [cold-reset] ++
3,822,492 UART: [fht] FHT @ 0x50003400
3,832,006 UART: [idev] ++
3,832,577 UART: [idev] CDI.KEYID = 6
3,833,497 UART: [idev] SUBJECT.KEYID = 7
3,834,651 UART: [idev] UDS.KEYID = 0
3,852,299 UART: [idev] Erasing UDS.KEYID = 0
6,309,276 UART: [idev] Sha1 KeyId Algorithm
6,329,501 UART: [idev] CSR upload begun
6,334,188 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,049,813 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,065,872 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,081,859 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,097,653 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,121,509 UART: [idev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
8,266,663 UART: [idev] CSR uploaded
8,282,728 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,283,187 UART: [idev] --
8,287,515 UART: [ldev] ++
8,288,074 UART: [ldev] CDI.KEYID = 6
8,288,986 UART: [ldev] SUBJECT.KEYID = 5
8,290,216 UART: [ldev] AUTHORITY.KEYID = 7
8,291,452 UART: [ldev] FE.KEYID = 1
8,301,882 UART: [ldev] Erasing FE.KEYID = 1
10,779,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,494,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,510,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,526,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,542,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,563,074 UART: [ldev] --
12,567,801 UART: [fwproc] Wait for Commands...
12,569,260 UART: [fwproc] Recv command 0x49444352
12,584,381 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
7,944,795 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,170,264 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,286 UART:
192,666 UART: Running Caliptra ROM ...
193,782 UART:
193,924 UART: [state] CFI Enabled
260,224 UART: [state] LifecycleState = Unprovisioned
262,092 UART: [state] DebugLocked = No
263,656 UART: [state] WD Timer not started. Device not locked for debugging
267,320 UART: [kat] SHA2-256
446,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,993 UART: [kat] ++
458,533 UART: [kat] sha1
469,474 UART: [kat] SHA2-256
472,474 UART: [kat] SHA2-384
478,830 UART: [kat] SHA2-512-ACC
481,762 UART: [kat] ECC-384
2,944,153 UART: [kat] HMAC-384Kdf
2,967,679 UART: [kat] LMS
3,497,132 UART: [kat] --
3,500,172 UART: [cold-reset] ++
3,501,526 UART: [fht] FHT @ 0x50003400
3,513,105 UART: [idev] ++
3,513,670 UART: [idev] CDI.KEYID = 6
3,514,585 UART: [idev] SUBJECT.KEYID = 7
3,515,802 UART: [idev] UDS.KEYID = 0
3,539,196 UART: [idev] Erasing UDS.KEYID = 0
6,019,960 UART: [idev] Sha1 KeyId Algorithm
6,040,492 UART: [idev] CSR upload begun
6,045,191 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,776,850 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,792,922 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,808,907 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,824,725 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,848,539 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,993,564 UART: [idev] CSR uploaded
8,009,699 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,010,179 UART: [idev] --
8,014,292 UART: [ldev] ++
8,014,857 UART: [ldev] CDI.KEYID = 6
8,015,767 UART: [ldev] SUBJECT.KEYID = 5
8,017,003 UART: [ldev] AUTHORITY.KEYID = 7
8,018,269 UART: [ldev] FE.KEYID = 1
8,056,532 UART: [ldev] Erasing FE.KEYID = 1
10,559,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,297,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,313,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,329,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,344,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,364,900 UART: [ldev] --
12,370,447 UART: [fwproc] Wait for Commands...
12,372,557 UART: [fwproc] Recv command 0x49444352
12,387,679 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
7,665,483 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
11,968,637 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,395 UART:
192,787 UART: Running Caliptra ROM ...
193,940 UART:
603,618 UART: [state] CFI Enabled
619,645 UART: [state] LifecycleState = Unprovisioned
621,570 UART: [state] DebugLocked = No
622,781 UART: [state] WD Timer not started. Device not locked for debugging
626,036 UART: [kat] SHA2-256
805,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,691 UART: [kat] ++
817,416 UART: [kat] sha1
827,286 UART: [kat] SHA2-256
830,316 UART: [kat] SHA2-384
836,027 UART: [kat] SHA2-512-ACC
839,024 UART: [kat] ECC-384
3,278,336 UART: [kat] HMAC-384Kdf
3,290,307 UART: [kat] LMS
3,819,805 UART: [kat] --
3,824,756 UART: [cold-reset] ++
3,826,812 UART: [fht] FHT @ 0x50003400
3,837,519 UART: [idev] ++
3,838,077 UART: [idev] CDI.KEYID = 6
3,839,060 UART: [idev] SUBJECT.KEYID = 7
3,840,218 UART: [idev] UDS.KEYID = 0
3,860,127 UART: [idev] Erasing UDS.KEYID = 0
6,318,000 UART: [idev] Sha1 KeyId Algorithm
6,338,180 UART: [idev] CSR upload begun
6,342,885 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,058,096 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,074,199 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,090,162 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,106,034 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,129,799 UART: [idev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
8,274,919 UART: [idev] CSR uploaded
8,291,053 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,291,556 UART: [idev] --
8,294,599 UART: [ldev] ++
8,295,168 UART: [ldev] CDI.KEYID = 6
8,296,049 UART: [ldev] SUBJECT.KEYID = 5
8,297,285 UART: [ldev] AUTHORITY.KEYID = 7
8,298,515 UART: [ldev] FE.KEYID = 1
8,309,497 UART: [ldev] Erasing FE.KEYID = 1
10,783,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,500,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,516,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,532,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,548,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,568,640 UART: [ldev] --
12,573,090 UART: [fwproc] Wait for Commands...
12,574,753 UART: [fwproc] Recv command 0x49444352
12,589,886 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
7,938,947 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,169,141 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,570 UART: [kat] HMAC-384Kdf
920,118 UART: [kat] LMS
1,168,430 UART: [kat] --
1,169,285 UART: [cold-reset] ++
1,169,665 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,181,249 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,206,843 UART: [idev] CSR upload begun
1,208,622 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,213 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,921 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,806 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,512 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,941 UART: [idev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
1,296,438 UART: [idev] CSR uploaded
1,299,483 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,652 UART: [idev] --
1,300,637 UART: [ldev] ++
1,300,805 UART: [ldev] CDI.KEYID = 6
1,301,169 UART: [ldev] SUBJECT.KEYID = 5
1,301,596 UART: [ldev] AUTHORITY.KEYID = 7
1,302,059 UART: [ldev] FE.KEYID = 1
1,307,191 UART: [ldev] Erasing FE.KEYID = 1
1,332,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,625 UART: [ldev] --
1,371,913 UART: [fwproc] Wait for Commands...
1,372,546 UART: [fwproc] Recv command 0x49444352
1,377,675 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,362 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,180 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,505 UART: [kat] SHA2-256
892,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,184 UART: [kat] ++
896,336 UART: [kat] sha1
900,688 UART: [kat] SHA2-256
902,628 UART: [kat] SHA2-384
905,227 UART: [kat] SHA2-512-ACC
907,128 UART: [kat] ECC-384
917,101 UART: [kat] HMAC-384Kdf
921,817 UART: [kat] LMS
1,170,129 UART: [kat] --
1,170,922 UART: [cold-reset] ++
1,171,342 UART: [fht] FHT @ 0x50003400
1,174,130 UART: [idev] ++
1,174,298 UART: [idev] CDI.KEYID = 6
1,174,659 UART: [idev] SUBJECT.KEYID = 7
1,175,084 UART: [idev] UDS.KEYID = 0
1,182,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] CSR upload begun
1,210,181 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,282 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,990 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,875 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,581 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,010 UART: [idev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
1,298,507 UART: [idev] CSR uploaded
1,301,552 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,721 UART: [idev] --
1,302,608 UART: [ldev] ++
1,302,776 UART: [ldev] CDI.KEYID = 6
1,303,140 UART: [ldev] SUBJECT.KEYID = 5
1,303,567 UART: [ldev] AUTHORITY.KEYID = 7
1,304,030 UART: [ldev] FE.KEYID = 1
1,309,108 UART: [ldev] Erasing FE.KEYID = 1
1,335,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,094 UART: [ldev] --
1,374,594 UART: [fwproc] Wait for Commands...
1,375,235 UART: [fwproc] Recv command 0x49444352
1,380,364 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,597 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,515 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,259 UART: [kat] SHA2-256
901,199 UART: [kat] SHA2-384
903,828 UART: [kat] SHA2-512-ACC
905,729 UART: [kat] ECC-384
915,586 UART: [kat] HMAC-384Kdf
920,070 UART: [kat] LMS
1,168,382 UART: [kat] --
1,169,251 UART: [cold-reset] ++
1,169,681 UART: [fht] FHT @ 0x50003400
1,172,281 UART: [idev] ++
1,172,449 UART: [idev] CDI.KEYID = 6
1,172,810 UART: [idev] SUBJECT.KEYID = 7
1,173,235 UART: [idev] UDS.KEYID = 0
1,181,219 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,206,877 UART: [idev] CSR upload begun
1,208,656 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,065 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,773 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,658 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,364 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,793 UART: [idev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
1,296,290 UART: [idev] CSR uploaded
1,299,335 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,504 UART: [idev] --
1,300,705 UART: [ldev] ++
1,300,873 UART: [ldev] CDI.KEYID = 6
1,301,237 UART: [ldev] SUBJECT.KEYID = 5
1,301,664 UART: [ldev] AUTHORITY.KEYID = 7
1,302,127 UART: [ldev] FE.KEYID = 1
1,307,333 UART: [ldev] Erasing FE.KEYID = 1
1,334,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,513 UART: [ldev] --
1,374,029 UART: [fwproc] Wait for Commands...
1,374,636 UART: [fwproc] Recv command 0x49444352
1,379,765 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,430 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,646 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,383 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,256 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,042 UART: [idev] Sha1 KeyId Algorithm
1,207,366 UART: [idev] CSR upload begun
1,209,145 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,662 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,370 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,255 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,961 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,390 UART: [idev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
1,296,887 UART: [idev] CSR uploaded
1,299,932 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,101 UART: [idev] --
1,300,954 UART: [ldev] ++
1,301,122 UART: [ldev] CDI.KEYID = 6
1,301,486 UART: [ldev] SUBJECT.KEYID = 5
1,301,913 UART: [ldev] AUTHORITY.KEYID = 7
1,302,376 UART: [ldev] FE.KEYID = 1
1,307,520 UART: [ldev] Erasing FE.KEYID = 1
1,333,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,802 UART: [ldev] --
1,373,236 UART: [fwproc] Wait for Commands...
1,373,895 UART: [fwproc] Recv command 0x49444352
1,379,024 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,106,343 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,158,263 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,315 UART: [kat] ++
895,467 UART: [kat] sha1
899,885 UART: [kat] SHA2-256
901,825 UART: [kat] SHA2-384
904,812 UART: [kat] SHA2-512-ACC
906,713 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,517 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,182,437 UART: [idev] Erasing UDS.KEYID = 0
1,199,511 UART: [idev] Sha1 KeyId Algorithm
1,207,839 UART: [idev] CSR upload begun
1,209,618 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,169 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,877 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,762 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,468 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,897 UART: [idev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
1,297,394 UART: [idev] CSR uploaded
1,300,439 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,608 UART: [idev] --
1,301,427 UART: [ldev] ++
1,301,595 UART: [ldev] CDI.KEYID = 6
1,301,959 UART: [ldev] SUBJECT.KEYID = 5
1,302,386 UART: [ldev] AUTHORITY.KEYID = 7
1,302,849 UART: [ldev] FE.KEYID = 1
1,308,001 UART: [ldev] Erasing FE.KEYID = 1
1,333,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,461 UART: [ldev] --
1,372,769 UART: [fwproc] Wait for Commands...
1,373,570 UART: [fwproc] Recv command 0x49444352
1,378,699 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,264 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,159,706 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,857 UART: [kat] SHA2-512-ACC
906,758 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,265 UART: [kat] LMS
1,169,577 UART: [kat] --
1,170,508 UART: [cold-reset] ++
1,171,042 UART: [fht] FHT @ 0x50003400
1,173,604 UART: [idev] ++
1,173,772 UART: [idev] CDI.KEYID = 6
1,174,133 UART: [idev] SUBJECT.KEYID = 7
1,174,558 UART: [idev] UDS.KEYID = 0
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,198,906 UART: [idev] Sha1 KeyId Algorithm
1,207,156 UART: [idev] CSR upload begun
1,208,935 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,704 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,412 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,297 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,003 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,432 UART: [idev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
1,296,929 UART: [idev] CSR uploaded
1,299,974 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,143 UART: [idev] --
1,301,032 UART: [ldev] ++
1,301,200 UART: [ldev] CDI.KEYID = 6
1,301,564 UART: [ldev] SUBJECT.KEYID = 5
1,301,991 UART: [ldev] AUTHORITY.KEYID = 7
1,302,454 UART: [ldev] FE.KEYID = 1
1,307,950 UART: [ldev] Erasing FE.KEYID = 1
1,333,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,082 UART: [ldev] --
1,372,482 UART: [fwproc] Wait for Commands...
1,373,181 UART: [fwproc] Recv command 0x49444352
1,378,310 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,108,471 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,160,307 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
191,973 UART:
192,362 UART: Running Caliptra ROM ...
193,575 UART:
193,730 UART: [state] CFI Enabled
263,660 UART: [state] LifecycleState = Unprovisioned
266,137 UART: [state] DebugLocked = No
268,253 UART: [state] WD Timer not started. Device not locked for debugging
272,535 UART: [kat] SHA2-256
454,436 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,977 UART: [kat] ++
466,484 UART: [kat] sha1
478,178 UART: [kat] SHA2-256
481,236 UART: [kat] SHA2-384
488,021 UART: [kat] SHA2-512-ACC
490,637 UART: [kat] ECC-384
3,775,722 UART: [kat] HMAC-384Kdf
3,803,540 UART: [kat] LMS
4,876,703 UART: [kat] --
4,882,014 UART: [cold-reset] ++
4,884,113 UART: [fht] FHT @ 0x50003400
4,895,585 UART: [idev] ++
4,896,262 UART: [idev] CDI.KEYID = 6
4,897,495 UART: [idev] SUBJECT.KEYID = 7
4,898,594 UART: [idev] UDS.KEYID = 0
4,899,686 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
4,930,001 UART: [idev] Erasing UDS.KEYID = 0
8,245,897 UART: [idev] Sha1 KeyId Algorithm
8,268,553 UART: [idev] --
8,271,455 UART: [ldev] ++
8,272,030 UART: [ldev] CDI.KEYID = 6
8,273,222 UART: [ldev] SUBJECT.KEYID = 5
8,274,381 UART: [ldev] AUTHORITY.KEYID = 7
8,275,609 UART: [ldev] FE.KEYID = 1
8,317,258 UART: [ldev] Erasing FE.KEYID = 1
11,652,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,964,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,980,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,996,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,012,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,033,072 UART: [ldev] --
14,037,974 UART: [fwproc] Wait for Commands...
14,039,964 UART: [fwproc] Recv command 0x49444352
14,046,357 UART: ROM Fatal Error: 0x0102000A
14,049,727 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
4,805,038 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
13,852,942 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,403 UART:
192,781 UART: Running Caliptra ROM ...
193,908 UART:
603,403 UART: [state] CFI Enabled
616,584 UART: [state] LifecycleState = Unprovisioned
618,943 UART: [state] DebugLocked = No
621,548 UART: [state] WD Timer not started. Device not locked for debugging
626,075 UART: [kat] SHA2-256
808,081 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,598 UART: [kat] ++
820,181 UART: [kat] sha1
830,847 UART: [kat] SHA2-256
833,897 UART: [kat] SHA2-384
839,388 UART: [kat] SHA2-512-ACC
841,989 UART: [kat] ECC-384
4,098,797 UART: [kat] HMAC-384Kdf
4,110,601 UART: [kat] LMS
5,183,763 UART: [kat] --
5,186,687 UART: [cold-reset] ++
5,188,025 UART: [fht] FHT @ 0x50003400
5,199,328 UART: [idev] ++
5,199,995 UART: [idev] CDI.KEYID = 6
5,201,144 UART: [idev] SUBJECT.KEYID = 7
5,202,669 UART: [idev] UDS.KEYID = 0
5,203,889 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
5,219,323 UART: [idev] Erasing UDS.KEYID = 0
8,498,471 UART: [idev] Sha1 KeyId Algorithm
8,520,630 UART: [idev] --
8,525,633 UART: [ldev] ++
8,526,213 UART: [ldev] CDI.KEYID = 6
8,527,399 UART: [ldev] SUBJECT.KEYID = 5
8,528,881 UART: [ldev] AUTHORITY.KEYID = 7
8,530,452 UART: [ldev] FE.KEYID = 1
8,542,823 UART: [ldev] Erasing FE.KEYID = 1
11,832,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,142,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,158,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,174,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,194,265 UART: [ldev] --
14,198,195 UART: [fwproc] Wait for Commands...
14,199,911 UART: [fwproc] Recv command 0x49444352
14,207,081 UART: ROM Fatal Error: 0x0102000A
14,210,433 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2245ad1872910a25128c7415eaf7cda4700f426f172e0107a82603ca06df5ee811895ef9e7b0e425cf1e607a70843451",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
5,099,281 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
14,017,341 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,118 UART:
192,501 UART: Running Caliptra ROM ...
193,658 UART:
193,806 UART: [state] CFI Enabled
265,265 UART: [state] LifecycleState = Unprovisioned
267,113 UART: [state] DebugLocked = No
268,768 UART: [state] WD Timer not started. Device not locked for debugging
273,134 UART: [kat] SHA2-256
452,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,844 UART: [kat] ++
464,295 UART: [kat] sha1
474,736 UART: [kat] SHA2-256
477,740 UART: [kat] SHA2-384
483,452 UART: [kat] SHA2-512-ACC
486,404 UART: [kat] ECC-384
2,947,676 UART: [kat] HMAC-384Kdf
2,972,016 UART: [kat] LMS
3,501,481 UART: [kat] --
3,506,014 UART: [cold-reset] ++
3,508,000 UART: [fht] FHT @ 0x50003400
3,519,577 UART: [idev] ++
3,520,149 UART: [idev] CDI.KEYID = 6
3,521,086 UART: [idev] SUBJECT.KEYID = 7
3,522,302 UART: [idev] UDS.KEYID = 0
3,523,264 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,543,534 UART: [idev] Erasing UDS.KEYID = 0
6,027,258 UART: [idev] Sha1 KeyId Algorithm
6,049,578 UART: [idev] --
6,053,635 UART: [ldev] ++
6,054,205 UART: [ldev] CDI.KEYID = 6
6,055,118 UART: [ldev] SUBJECT.KEYID = 5
6,056,391 UART: [ldev] AUTHORITY.KEYID = 7
6,057,532 UART: [ldev] FE.KEYID = 1
6,099,659 UART: [ldev] Erasing FE.KEYID = 1
8,602,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,195 UART: [ldev] --
10,413,623 UART: [fwproc] Wait for Commands...
10,415,123 UART: [fwproc] Recv command 0x49444352
10,421,273 UART: ROM Fatal Error: 0x0102000A
10,424,425 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,362,453 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,188,474 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,560 UART:
192,938 UART: Running Caliptra ROM ...
194,154 UART:
603,605 UART: [state] CFI Enabled
617,182 UART: [state] LifecycleState = Unprovisioned
619,082 UART: [state] DebugLocked = No
620,926 UART: [state] WD Timer not started. Device not locked for debugging
624,366 UART: [kat] SHA2-256
803,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,041 UART: [kat] ++
815,490 UART: [kat] sha1
826,417 UART: [kat] SHA2-256
829,413 UART: [kat] SHA2-384
836,626 UART: [kat] SHA2-512-ACC
839,611 UART: [kat] ECC-384
3,283,214 UART: [kat] HMAC-384Kdf
3,295,719 UART: [kat] LMS
3,825,230 UART: [kat] --
3,831,206 UART: [cold-reset] ++
3,832,324 UART: [fht] FHT @ 0x50003400
3,843,635 UART: [idev] ++
3,844,198 UART: [idev] CDI.KEYID = 6
3,845,255 UART: [idev] SUBJECT.KEYID = 7
3,846,354 UART: [idev] UDS.KEYID = 0
3,847,337 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,865,613 UART: [idev] Erasing UDS.KEYID = 0
6,321,806 UART: [idev] Sha1 KeyId Algorithm
6,345,307 UART: [idev] --
6,349,399 UART: [ldev] ++
6,349,972 UART: [ldev] CDI.KEYID = 6
6,350,875 UART: [ldev] SUBJECT.KEYID = 5
6,352,087 UART: [ldev] AUTHORITY.KEYID = 7
6,353,319 UART: [ldev] FE.KEYID = 1
6,363,364 UART: [ldev] Erasing FE.KEYID = 1
8,838,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,468 UART: [ldev] --
10,628,097 UART: [fwproc] Wait for Commands...
10,630,376 UART: [fwproc] Recv command 0x49444352
10,637,129 UART: ROM Fatal Error: 0x0102000A
10,640,198 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,693,505 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,400,819 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,072 UART:
192,477 UART: Running Caliptra ROM ...
193,641 UART:
193,787 UART: [state] CFI Enabled
260,208 UART: [state] LifecycleState = Unprovisioned
262,071 UART: [state] DebugLocked = No
264,302 UART: [state] WD Timer not started. Device not locked for debugging
267,606 UART: [kat] SHA2-256
446,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,314 UART: [kat] ++
458,846 UART: [kat] sha1
469,673 UART: [kat] SHA2-256
472,680 UART: [kat] SHA2-384
479,790 UART: [kat] SHA2-512-ACC
482,772 UART: [kat] ECC-384
2,949,756 UART: [kat] HMAC-384Kdf
2,971,020 UART: [kat] LMS
3,500,522 UART: [kat] --
3,504,184 UART: [cold-reset] ++
3,505,954 UART: [fht] FHT @ 0x50003400
3,515,800 UART: [idev] ++
3,516,364 UART: [idev] CDI.KEYID = 6
3,517,330 UART: [idev] SUBJECT.KEYID = 7
3,518,491 UART: [idev] UDS.KEYID = 0
3,519,528 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,543,872 UART: [idev] Erasing UDS.KEYID = 0
6,027,817 UART: [idev] Sha1 KeyId Algorithm
6,050,443 UART: [idev] --
6,053,425 UART: [ldev] ++
6,054,001 UART: [ldev] CDI.KEYID = 6
6,054,894 UART: [ldev] SUBJECT.KEYID = 5
6,056,062 UART: [ldev] AUTHORITY.KEYID = 7
6,057,222 UART: [ldev] FE.KEYID = 1
6,099,813 UART: [ldev] Erasing FE.KEYID = 1
8,604,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,458 UART: [ldev] --
10,412,379 UART: [fwproc] Wait for Commands...
10,413,903 UART: [fwproc] Recv command 0x49444352
10,418,604 UART: ROM Fatal Error: 0x0102000A
10,421,704 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,398,162 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,221,988 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,561 UART:
192,934 UART: Running Caliptra ROM ...
194,093 UART:
603,747 UART: [state] CFI Enabled
614,550 UART: [state] LifecycleState = Unprovisioned
616,450 UART: [state] DebugLocked = No
618,959 UART: [state] WD Timer not started. Device not locked for debugging
622,516 UART: [kat] SHA2-256
801,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,219 UART: [kat] ++
813,751 UART: [kat] sha1
825,066 UART: [kat] SHA2-256
828,073 UART: [kat] SHA2-384
835,459 UART: [kat] SHA2-512-ACC
838,385 UART: [kat] ECC-384
3,279,328 UART: [kat] HMAC-384Kdf
3,292,656 UART: [kat] LMS
3,822,162 UART: [kat] --
3,826,260 UART: [cold-reset] ++
3,828,838 UART: [fht] FHT @ 0x50003400
3,839,510 UART: [idev] ++
3,840,134 UART: [idev] CDI.KEYID = 6
3,841,052 UART: [idev] SUBJECT.KEYID = 7
3,842,155 UART: [idev] UDS.KEYID = 0
3,843,368 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,856,748 UART: [idev] Erasing UDS.KEYID = 0
6,308,225 UART: [idev] Sha1 KeyId Algorithm
6,331,247 UART: [idev] --
6,336,298 UART: [ldev] ++
6,336,875 UART: [ldev] CDI.KEYID = 6
6,337,781 UART: [ldev] SUBJECT.KEYID = 5
6,338,995 UART: [ldev] AUTHORITY.KEYID = 7
6,340,223 UART: [ldev] FE.KEYID = 1
6,349,679 UART: [ldev] Erasing FE.KEYID = 1
8,824,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,063 UART: [ldev] --
10,617,347 UART: [fwproc] Wait for Commands...
10,619,389 UART: [fwproc] Recv command 0x49444352
10,626,834 UART: ROM Fatal Error: 0x0102000A
10,629,924 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,697,223 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,411,291 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,582 UART: [state] LifecycleState = Unprovisioned
85,237 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,130 UART: [kat] SHA2-256
890,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,809 UART: [kat] ++
894,961 UART: [kat] sha1
899,177 UART: [kat] SHA2-256
901,117 UART: [kat] SHA2-384
903,934 UART: [kat] SHA2-512-ACC
905,835 UART: [kat] ECC-384
915,602 UART: [kat] HMAC-384Kdf
920,122 UART: [kat] LMS
1,168,434 UART: [kat] --
1,169,285 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,174,051 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,807 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,898 UART: [ldev] ++
1,209,066 UART: [ldev] CDI.KEYID = 6
1,209,430 UART: [ldev] SUBJECT.KEYID = 5
1,209,857 UART: [ldev] AUTHORITY.KEYID = 7
1,210,320 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,902 UART: [ldev] --
1,280,404 UART: [fwproc] Wait for Commands...
1,281,095 UART: [fwproc] Recv command 0x49444352
1,282,829 UART: ROM Fatal Error: 0x0102000A
1,283,990 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,776 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,170 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,318 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,303 UART: [kat] SHA2-512-ACC
906,204 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,394 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,174,600 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,590 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,371 UART: [ldev] ++
1,209,539 UART: [ldev] CDI.KEYID = 6
1,209,903 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,205 UART: [ldev] --
1,282,577 UART: [fwproc] Wait for Commands...
1,283,308 UART: [fwproc] Recv command 0x49444352
1,284,920 UART: ROM Fatal Error: 0x0102000A
1,286,081 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,817 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,139,081 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
891,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,721 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,055 UART: [idev] Erasing UDS.KEYID = 0
1,199,403 UART: [idev] Sha1 KeyId Algorithm
1,208,171 UART: [idev] --
1,209,100 UART: [ldev] ++
1,209,268 UART: [ldev] CDI.KEYID = 6
1,209,632 UART: [ldev] SUBJECT.KEYID = 5
1,210,059 UART: [ldev] AUTHORITY.KEYID = 7
1,210,522 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,569 UART: [fwproc] Recv command 0x49444352
1,283,293 UART: ROM Fatal Error: 0x0102000A
1,284,454 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,838 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,048 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,684 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,456 UART: [idev] Erasing UDS.KEYID = 0
1,199,206 UART: [idev] Sha1 KeyId Algorithm
1,208,168 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,769 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,093 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x49444352
1,283,786 UART: ROM Fatal Error: 0x0102000A
1,284,947 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,513 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,137,629 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
88,112 UART: [kat] SHA2-256
891,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,791 UART: [kat] ++
895,943 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,782 UART: [kat] SHA2-512-ACC
906,683 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
920,950 UART: [kat] LMS
1,169,262 UART: [kat] --
1,170,163 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,409 UART: [idev] ++
1,173,577 UART: [idev] CDI.KEYID = 6
1,173,938 UART: [idev] SUBJECT.KEYID = 7
1,174,363 UART: [idev] UDS.KEYID = 0
1,174,709 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,215,096 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,232 UART: [ldev] --
1,280,556 UART: [fwproc] Wait for Commands...
1,281,299 UART: [fwproc] Recv command 0x49444352
1,283,003 UART: ROM Fatal Error: 0x0102000A
1,284,164 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,848 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,134,764 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,493 UART: [kat] HMAC-384Kdf
921,213 UART: [kat] LMS
1,169,525 UART: [kat] --
1,170,430 UART: [cold-reset] ++
1,170,920 UART: [fht] FHT @ 0x50003400
1,173,566 UART: [idev] ++
1,173,734 UART: [idev] CDI.KEYID = 6
1,174,095 UART: [idev] SUBJECT.KEYID = 7
1,174,520 UART: [idev] UDS.KEYID = 0
1,174,866 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,243,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,555 UART: [ldev] --
1,282,825 UART: [fwproc] Wait for Commands...
1,283,558 UART: [fwproc] Recv command 0x49444352
1,285,114 UART: ROM Fatal Error: 0x0102000A
1,286,275 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,385 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,138,211 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 123 filtered out; finished in 0.52s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,188 UART:
192,538 UART: Running Caliptra ROM ...
193,762 UART:
193,916 UART: [state] CFI Enabled
265,463 UART: [state] LifecycleState = Unprovisioned
267,379 UART: [state] DebugLocked = No
270,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,720 UART: [kat] SHA2-256
445,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,956 UART: [kat] ++
456,445 UART: [kat] sha1
467,813 UART: [kat] SHA2-256
470,525 UART: [kat] SHA2-384
477,711 UART: [kat] SHA2-512-ACC
480,131 UART: [kat] ECC-384
2,768,546 UART: [kat] HMAC-384Kdf
2,799,682 UART: [kat] LMS
3,989,973 UART: [kat] --
3,996,253 UART: [cold-reset] ++
3,998,785 UART: [fht] Storing FHT @ 0x50003400
4,009,484 UART: [idev] ++
4,010,051 UART: [idev] CDI.KEYID = 6
4,011,032 UART: [idev] SUBJECT.KEYID = 7
4,012,205 UART: [idev] UDS.KEYID = 0
4,013,279 ready_for_fw is high
4,013,484 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,074 UART: [idev] Erasing UDS.KEYID = 0
7,347,012 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,510 UART: [idev] --
7,374,506 UART: [ldev] ++
7,375,132 UART: [ldev] CDI.KEYID = 6
7,376,012 UART: [ldev] SUBJECT.KEYID = 5
7,377,279 UART: [ldev] AUTHORITY.KEYID = 7
7,378,503 UART: [ldev] FE.KEYID = 1
7,421,924 UART: [ldev] Erasing FE.KEYID = 1
10,755,013 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,784 UART: [ldev] --
13,138,825 UART: [fwproc] Waiting for Commands...
13,140,886 UART: [fwproc] Received command 0x46574c44
13,143,121 UART: [fwproc] Received Image of size 113844 bytes
17,198,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,940 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,660,770 >>> mbox cmd response: success
17,665,410 UART: [afmc] ++
17,665,996 UART: [afmc] CDI.KEYID = 6
17,666,932 UART: [afmc] SUBJECT.KEYID = 7
17,668,199 UART: [afmc] AUTHORITY.KEYID = 5
21,032,021 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,180 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,438 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,873 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,666 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,113 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,267 UART: [afmc] --
23,401,131 UART: [cold-reset] --
23,405,256 UART: [state] Locking Datavault
23,409,470 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,219 UART: [state] Locking ICCM
23,413,040 UART: [exit] Launching FMC @ 0x40000130
23,421,432 UART:
23,421,660 UART: Running Caliptra FMC ...
23,422,752 UART:
23,422,902 UART: [state] CFI Enabled
23,488,073 UART: [fht] FMC Alias Private Key: 7
25,826,305 UART: [art] Extend RT PCRs Done
25,827,523 UART: [art] Lock RT PCRs Done
25,829,307 UART: [art] Populate DV Done
25,834,716 UART: [fht] FMC Alias Private Key: 7
25,836,399 UART: [art] Derive CDI
25,837,233 UART: [art] Store in in slot 0x4
25,896,164 UART: [art] Derive Key Pair
25,897,161 UART: [art] Store priv key in slot 0x5
29,190,268 UART: [art] Derive Key Pair - Done
29,203,526 UART: [art] Signing Cert with AUTHO
29,204,860 UART: RITY.KEYID = 7
31,490,636 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,142 UART: [art] PUB.X = 9B33E5085CEA6ECE495C4AC34EC075C7F0122DD505001D7595311E37EA59E7C67F6A445358522190962571B7DC635B75
31,499,348 UART: [art] PUB.Y = 3F2CF1C09C37E355EB64851ABA3778007463E23DAE3D3B42731367CC53949320C6FB28BDED15FF9BD62E088D2F3E400D
31,506,600 UART: [art] SIG.R = 391BE9603D4A0828B812E7412E8792DC615EC2A05A0AE81AE54761AB24BA10CA85B6EEB2754A2E47C44FB9695826B65B
31,513,953 UART: [art] SIG.S = A004E246EC80ABDA92383B235CAA352A9A368381254987893B4ECCD0F2C517364F026AD24D96A9B912AC0F0644656263
32,819,886 UART: Caliptra RT
32,820,580 UART: [state] CFI Enabled
33,001,513 UART: [rt] RT listening for mailbox commands...
33,003,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,159,067 UART: [rt]cmd =0x41544d4e, len=14344
38,459,144 >>> mbox cmd response data (8 bytes)
38,459,732 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,490,309 UART: [rt]cmd =0x41545348, len=116
38,509,286 >>> mbox cmd response data (12 bytes)
40,570,443 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,714,803 UART:
40,715,186 UART: Running Caliptra ROM ...
40,716,235 UART:
40,716,387 UART: [state] CFI Enabled
40,790,513 UART: [state] LifecycleState = Unprovisioned
40,792,411 UART: [state] DebugLocked = No
40,794,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,800,059 UART: [kat] SHA2-256
40,969,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,980,227 UART: [kat] ++
40,980,735 UART: [kat] sha1
40,991,452 UART: [kat] SHA2-256
40,994,144 UART: [kat] SHA2-384
40,999,097 UART: [kat] SHA2-512-ACC
41,001,496 UART: [kat] ECC-384
43,294,968 UART: [kat] HMAC-384Kdf
43,327,417 UART: [kat] LMS
44,517,778 UART: [kat] --
44,522,977 UART: [update-reset] ++
48,661,528 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,665,206 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
49,046,512 >>> mbox cmd response: success
49,051,170 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,051,767 UART: [update-reset] Copying MAN_2 To MAN_1
49,070,341 UART: [update-reset Success] --
49,075,119 UART: [state] Locking Datavault
49,079,882 UART: [state] Locking PCR0, PCR1 and PCR31
49,081,587 UART: [state] Locking ICCM
49,084,191 UART: [exit] Launching FMC @ 0x40000130
49,092,576 UART:
49,092,802 UART: Running Caliptra FMC ...
49,093,822 UART:
49,093,966 UART: [state] CFI Enabled
49,182,998 UART: [art] Extend RT PCRs Done
49,184,207 UART: [art] Lock RT PCRs Done
49,185,718 UART: [art] Populate DV Done
49,191,417 UART: [fht] FMC Alias Private Key: 7
49,193,060 UART: [art] Derive CDI
49,193,869 UART: [art] Store in in slot 0x4
49,252,425 UART: [art] Derive Key Pair
49,253,434 UART: [art] Store priv key in slot 0x5
52,545,900 UART: [art] Derive Key Pair - Done
52,559,066 UART: [art] Signing Cert with AUTHO
52,560,397 UART: RITY.KEYID = 7
54,847,192 UART: [art] Erasing AUTHORITY.KEYID = 7
54,848,702 UART: [art] PUB.X = 74C5F9E032C1E8E0A794E46AE5A9C49419DDE5D44C8563E9FDA1FA999815CA0A5067AB890845CACC8A970E5557F3CAE8
54,855,939 UART: [art] PUB.Y = 6C2A285952F3707D46C933E7CE484FD6C9BD3D69F86DCAB9905078967B1EB327EC06EE4943D18B8F1025BDEE4B5F79CF
54,863,223 UART: [art] SIG.R = 4D4E7BB3F54FBAE48B08ADB2536123B1E53C45C700A3700DB147ECCE232803C7D11C011F4BEA3CAB2309015D9A632FC7
54,870,603 UART: [art] SIG.S = EAB9D3CC84419C2620D3A719BD96E2208259187087B716014BF190883ECE8066434ABC87B6F2FEDD39662A19EB28B372
56,176,061 UART: Caliptra RT
56,176,794 UART: [state] CFI Enabled
56,504,596 UART: [rt] RT listening for mailbox commands...
56,536,553 UART: [rt]cmd =0x41545348, len=116
56,556,936 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,808,485 ready_for_fw is high
3,808,910 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,894,243 >>> mbox cmd response: success
23,591,056 UART:
23,591,477 UART: Running Caliptra FMC ...
23,592,582 UART:
23,592,739 UART: [state] CFI Enabled
23,662,553 UART: [fht] FMC Alias Private Key: 7
26,000,556 UART: [art] Extend RT PCRs Done
26,001,826 UART: [art] Lock RT PCRs Done
26,003,810 UART: [art] Populate DV Done
26,009,252 UART: [fht] FMC Alias Private Key: 7
26,010,805 UART: [art] Derive CDI
26,011,633 UART: [art] Store in in slot 0x4
26,071,119 UART: [art] Derive Key Pair
26,072,178 UART: [art] Store priv key in slot 0x5
29,364,825 UART: [art] Derive Key Pair - Done
29,377,982 UART: [art] Signing Cert with AUTHO
29,379,313 UART: RITY.KEYID = 7
31,667,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,928 UART: [art] PUB.X = 0739C75A694CC6B4E06CF5D6A9270DCF24DEF68FB7D5AC27B868D643B564E81A5A4CFB14D3464E55D2B5A8FBFA32079E
31,676,194 UART: [art] PUB.Y = 6D4C09C3CFECC67A46334E971A9B3F1E6057E07C82B79B1FB36B106C424C04B2AA4F7CBE1EF8E96FF2DECFFCFD60E6A7
31,683,478 UART: [art] SIG.R = 878B1F7B48EF2721D8DD9C2165A3420EC12F190FA32375FACAAE0020E48F4A733C589A79E9FBCF5A70749AD0CAB88EED
31,690,871 UART: [art] SIG.S = 679B9021C0600B188FAA4066124F63E8ACFA697D98272DE83313C467609E5140857C9A1A57E817752DE49D6A2BEE1544
32,996,186 UART: Caliptra RT
32,996,898 UART: [state] CFI Enabled
33,159,366 UART: [rt] RT listening for mailbox commands...
33,161,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,317,200 UART: [rt]cmd =0x41544d4e, len=14344
38,617,472 >>> mbox cmd response data (8 bytes)
38,618,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,648,840 UART: [rt]cmd =0x41545348, len=116
38,669,255 >>> mbox cmd response data (12 bytes)
40,725,917 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,419,607 >>> mbox cmd response: success
49,420,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,454,046 UART:
49,454,342 UART: Running Caliptra FMC ...
49,455,476 UART:
49,455,631 UART: [state] CFI Enabled
49,552,053 UART: [art] Extend RT PCRs Done
49,553,252 UART: [art] Lock RT PCRs Done
49,554,621 UART: [art] Populate DV Done
49,560,087 UART: [fht] FMC Alias Private Key: 7
49,561,575 UART: [art] Derive CDI
49,562,302 UART: [art] Store in in slot 0x4
49,620,882 UART: [art] Derive Key Pair
49,621,916 UART: [art] Store priv key in slot 0x5
52,914,400 UART: [art] Derive Key Pair - Done
52,927,028 UART: [art] Signing Cert with AUTHO
52,928,329 UART: RITY.KEYID = 7
55,215,587 UART: [art] Erasing AUTHORITY.KEYID = 7
55,217,090 UART: [art] PUB.X = 402343D7A9A922EADB585D0F804D9321C05F7EDCD0ED5BDA6BB60C7B38C185828CD8C8EB71925B97359B71823A0FEA6E
55,224,362 UART: [art] PUB.Y = 3F2263626464F0F0BAE32201B393D81A622D25A33919112413CCBCB2D34373E639504CED66CC9C6DA19B1F3F5CA3D8B4
55,231,599 UART: [art] SIG.R = 675A0279664DE43FF45C66311C0AE02C6631E229EA784C5327D36089B0EFF93B2450DAF200431A62C298251F8D04A9D5
55,238,972 UART: [art] SIG.S = 7AE9CAEC37C7B18D7963E27916F298A2C66747B1BBEAF403ECA6D79AF511139B4CFC22E6212015AF8C7E58F1D8BC983C
56,543,612 UART: Caliptra RT
56,544,325 UART: [state] CFI Enabled
56,875,022 UART: [rt] RT listening for mailbox commands...
56,906,596 UART: [rt]cmd =0x41545348, len=116
56,927,124 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,635 UART:
193,036 UART: Running Caliptra ROM ...
194,227 UART:
604,009 UART: [state] CFI Enabled
619,460 UART: [state] LifecycleState = Unprovisioned
621,410 UART: [state] DebugLocked = No
622,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,082 UART: [kat] SHA2-256
797,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,391 UART: [kat] ++
808,845 UART: [kat] sha1
819,043 UART: [kat] SHA2-256
821,766 UART: [kat] SHA2-384
828,547 UART: [kat] SHA2-512-ACC
830,916 UART: [kat] ECC-384
3,114,804 UART: [kat] HMAC-384Kdf
3,126,035 UART: [kat] LMS
4,316,172 UART: [kat] --
4,321,232 UART: [cold-reset] ++
4,323,379 UART: [fht] Storing FHT @ 0x50003400
4,334,647 UART: [idev] ++
4,335,212 UART: [idev] CDI.KEYID = 6
4,336,242 UART: [idev] SUBJECT.KEYID = 7
4,337,418 UART: [idev] UDS.KEYID = 0
4,338,563 ready_for_fw is high
4,338,766 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,584 UART: [idev] Erasing UDS.KEYID = 0
7,628,964 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,836 UART: [idev] --
7,653,634 UART: [ldev] ++
7,654,214 UART: [ldev] CDI.KEYID = 6
7,655,179 UART: [ldev] SUBJECT.KEYID = 5
7,656,394 UART: [ldev] AUTHORITY.KEYID = 7
7,657,623 UART: [ldev] FE.KEYID = 1
7,671,076 UART: [ldev] Erasing FE.KEYID = 1
10,959,307 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,746 UART: [ldev] --
13,318,121 UART: [fwproc] Waiting for Commands...
13,319,731 UART: [fwproc] Received command 0x46574c44
13,321,919 UART: [fwproc] Received Image of size 113844 bytes
17,376,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,308 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,837,845 >>> mbox cmd response: success
17,841,435 UART: [afmc] ++
17,842,030 UART: [afmc] CDI.KEYID = 6
17,842,996 UART: [afmc] SUBJECT.KEYID = 7
17,844,212 UART: [afmc] AUTHORITY.KEYID = 5
21,158,754 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,002 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,440 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,241 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,657 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,149 UART: [afmc] --
23,526,447 UART: [cold-reset] --
23,530,433 UART: [state] Locking Datavault
23,536,064 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,772 UART: [state] Locking ICCM
23,538,999 UART: [exit] Launching FMC @ 0x40000130
23,547,409 UART:
23,547,649 UART: Running Caliptra FMC ...
23,548,753 UART:
23,548,923 UART: [state] CFI Enabled
23,556,647 UART: [fht] FMC Alias Private Key: 7
25,886,645 UART: [art] Extend RT PCRs Done
25,887,868 UART: [art] Lock RT PCRs Done
25,889,569 UART: [art] Populate DV Done
25,894,805 UART: [fht] FMC Alias Private Key: 7
25,896,452 UART: [art] Derive CDI
25,897,191 UART: [art] Store in in slot 0x4
25,939,735 UART: [art] Derive Key Pair
25,940,791 UART: [art] Store priv key in slot 0x5
29,182,609 UART: [art] Derive Key Pair - Done
29,195,708 UART: [art] Signing Cert with AUTHO
29,197,008 UART: RITY.KEYID = 7
31,477,111 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,618 UART: [art] PUB.X = 0CCEC3765E215451F18D40CFE4FD2E3F5F50AEEF78A70147BFD205D00AFAB2E92DDB4F94777E57D11D992676EE7F2793
31,485,872 UART: [art] PUB.Y = 899EE6E7C2F518F350E216DD29DCB7D56CEB422223A5D29F19AB8B19AD63EAD9B93A6EBCD72941C2F140B2EE7F2260DA
31,493,114 UART: [art] SIG.R = D7224A22CB5C87266C1555E5CEA201FF4D4EC41D74FE718103B1B73BF8BE340B590F908B5C86503D89734D2D498738F6
31,500,515 UART: [art] SIG.S = 5F9D49C8DD1B6C53EDED72149600CFD5E4580ADA78919FAC370A249080DD33BCED707E21F7ED469A49046467DB1CF64B
32,806,422 UART: Caliptra RT
32,807,136 UART: [state] CFI Enabled
32,925,079 UART: [rt] RT listening for mailbox commands...
32,927,493 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,082,810 UART: [rt]cmd =0x41544d4e, len=14344
38,383,272 >>> mbox cmd response data (8 bytes)
38,383,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,414,592 UART: [rt]cmd =0x41545348, len=116
38,435,271 >>> mbox cmd response data (12 bytes)
40,569,133 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,713,688 UART:
40,714,051 UART: Running Caliptra ROM ...
40,715,182 UART:
40,715,358 UART: [state] CFI Enabled
40,729,090 UART: [state] LifecycleState = Unprovisioned
40,730,983 UART: [state] DebugLocked = No
40,733,494 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,738,072 UART: [kat] SHA2-256
40,907,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,918,329 UART: [kat] ++
40,918,865 UART: [kat] sha1
40,928,789 UART: [kat] SHA2-256
40,931,480 UART: [kat] SHA2-384
40,937,572 UART: [kat] SHA2-512-ACC
40,939,928 UART: [kat] ECC-384
43,223,620 UART: [kat] HMAC-384Kdf
43,235,305 UART: [kat] LMS
44,425,347 UART: [kat] --
44,429,248 UART: [update-reset] ++
48,564,023 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,567,002 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
48,948,284 >>> mbox cmd response: success
48,952,978 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,953,577 UART: [update-reset] Copying MAN_2 To MAN_1
48,971,650 UART: [update-reset Success] --
48,976,375 UART: [state] Locking Datavault
48,979,837 UART: [state] Locking PCR0, PCR1 and PCR31
48,981,584 UART: [state] Locking ICCM
48,982,828 UART: [exit] Launching FMC @ 0x40000130
48,991,285 UART:
48,991,530 UART: Running Caliptra FMC ...
48,992,642 UART:
48,992,803 UART: [state] CFI Enabled
49,036,442 UART: [art] Extend RT PCRs Done
49,037,591 UART: [art] Lock RT PCRs Done
49,039,154 UART: [art] Populate DV Done
49,044,503 UART: [fht] FMC Alias Private Key: 7
49,046,160 UART: [art] Derive CDI
49,046,980 UART: [art] Store in in slot 0x4
49,089,785 UART: [art] Derive Key Pair
49,090,842 UART: [art] Store priv key in slot 0x5
52,333,126 UART: [art] Derive Key Pair - Done
52,346,099 UART: [art] Signing Cert with AUTHO
52,347,450 UART: RITY.KEYID = 7
54,626,505 UART: [art] Erasing AUTHORITY.KEYID = 7
54,628,008 UART: [art] PUB.X = 8B1621BAB71CC77A73197CFA84F9F65475E281A0C22C8C196BA257CFD37C984F56A21794EA0CBA20A21FBDE4EF012317
54,635,282 UART: [art] PUB.Y = 62444852F6325447FD54E48C77CC0EE82411BCD15274AD9A86DF5E75923CB04496FADB5264870A9F1E39C34F89568DFA
54,642,529 UART: [art] SIG.R = 6BE27D7520B6F347139BFEB5361001AADD06E92601DC17A8A5AE83681BC50AE0B9AD05BBE3DAEC7A29F3EDD9339D12BE
54,649,926 UART: [art] SIG.S = 0737A8F902A89FE512F13E714853E2CAD2A52F89E1D355610BC3AC2A2533C1A4F447F2DE41A0B7279D424432DF3BD1AA
55,955,034 UART: Caliptra RT
55,955,750 UART: [state] CFI Enabled
56,244,808 UART: [rt] RT listening for mailbox commands...
56,276,551 UART: [rt]cmd =0x41545348, len=116
56,296,426 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,128,960 ready_for_fw is high
4,129,328 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,220 >>> mbox cmd response: success
23,716,567 UART:
23,716,978 UART: Running Caliptra FMC ...
23,718,093 UART:
23,718,253 UART: [state] CFI Enabled
23,726,082 UART: [fht] FMC Alias Private Key: 7
26,057,220 UART: [art] Extend RT PCRs Done
26,058,447 UART: [art] Lock RT PCRs Done
26,060,481 UART: [art] Populate DV Done
26,066,060 UART: [fht] FMC Alias Private Key: 7
26,067,564 UART: [art] Derive CDI
26,068,322 UART: [art] Store in in slot 0x4
26,111,239 UART: [art] Derive Key Pair
26,112,240 UART: [art] Store priv key in slot 0x5
29,354,357 UART: [art] Derive Key Pair - Done
29,367,513 UART: [art] Signing Cert with AUTHO
29,368,823 UART: RITY.KEYID = 7
31,648,038 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,548 UART: [art] PUB.X = E33729C6C1CF673182E5BD128E010B360398A61C8B3E232A7AB9321CF08B4AC7553CD640E8126C33BC82B802BA308E28
31,656,762 UART: [art] PUB.Y = C16DAFFE0D5B63120B3D8E3DD0DA3027480268EDD03AFE402067568D7AF7F599D8AE89FC3B483A94796C67BBE0FD0C1F
31,664,070 UART: [art] SIG.R = 49D4C17A061B10CAD8C63B8AC05F62AB93C4554D517A51220DB61D92DC2AC398B1C576BDA87A35D18D303F5019F62B95
31,671,425 UART: [art] SIG.S = E5B503D4C8F07426CBE219B2BDA185971E653B339C8B67F2A6083CE9C522147124BC77091CC4198284A9D72D14077893
32,976,632 UART: Caliptra RT
32,977,345 UART: [state] CFI Enabled
33,094,611 UART: [rt] RT listening for mailbox commands...
33,097,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,252,446 UART: [rt]cmd =0x41544d4e, len=14344
38,553,344 >>> mbox cmd response data (8 bytes)
38,553,960 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,584,651 UART: [rt]cmd =0x41545348, len=116
38,604,557 >>> mbox cmd response data (12 bytes)
40,734,738 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,385,792 >>> mbox cmd response: success
49,386,462 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,421,280 UART:
49,421,606 UART: Running Caliptra FMC ...
49,422,670 UART:
49,422,825 UART: [state] CFI Enabled
49,466,694 UART: [art] Extend RT PCRs Done
49,467,855 UART: [art] Lock RT PCRs Done
49,469,276 UART: [art] Populate DV Done
49,474,573 UART: [fht] FMC Alias Private Key: 7
49,476,164 UART: [art] Derive CDI
49,476,907 UART: [art] Store in in slot 0x4
49,519,665 UART: [art] Derive Key Pair
49,520,705 UART: [art] Store priv key in slot 0x5
52,763,126 UART: [art] Derive Key Pair - Done
52,776,017 UART: [art] Signing Cert with AUTHO
52,777,332 UART: RITY.KEYID = 7
55,057,156 UART: [art] Erasing AUTHORITY.KEYID = 7
55,058,664 UART: [art] PUB.X = 99A2BA06E1B0EEE4DB3D613B5EDDADF47C39CB36155FFA59D16B39D011477F5BFFC0778D27EB4589E671BF81BCBCFE62
55,065,923 UART: [art] PUB.Y = 3909C0A2EA264079863071D6AEF5D4E1C74759401B7ACC0221ED32CCA9A731885FBB6E8ADA82431E6B6B9E4F2360016F
55,073,181 UART: [art] SIG.R = DF188822BE9B76BA605F917F975F12C3E1C09660101E0C10BC0926EFDB7F63CF5130B8C84FB7C1E1C3E72C110B7F130C
55,080,535 UART: [art] SIG.S = 7D8D56B789ECD3DEB004B7C7A3C57F8DD5B83CC9B689339AEEAEA45646D80F5E62CAE57E7F4813858F2497C858E5328E
56,386,159 UART: Caliptra RT
56,386,868 UART: [state] CFI Enabled
56,670,601 UART: [rt] RT listening for mailbox commands...
56,702,594 UART: [rt]cmd =0x41545348, len=116
56,722,590 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,140 UART:
192,531 UART: Running Caliptra ROM ...
193,746 UART:
193,904 UART: [state] CFI Enabled
264,133 UART: [state] LifecycleState = Unprovisioned
265,976 UART: [state] DebugLocked = No
268,213 UART: [state] WD Timer not started. Device not locked for debugging
272,460 UART: [kat] SHA2-256
451,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,161 UART: [kat] ++
463,691 UART: [kat] sha1
474,851 UART: [kat] SHA2-256
477,857 UART: [kat] SHA2-384
483,630 UART: [kat] SHA2-512-ACC
486,636 UART: [kat] ECC-384
2,949,454 UART: [kat] HMAC-384Kdf
2,974,787 UART: [kat] LMS
3,503,854 UART: [kat] --
3,509,566 UART: [cold-reset] ++
3,510,581 UART: [fht] FHT @ 0x50003400
3,520,935 UART: [idev] ++
3,521,498 UART: [idev] CDI.KEYID = 6
3,522,418 UART: [idev] SUBJECT.KEYID = 7
3,523,593 UART: [idev] UDS.KEYID = 0
3,524,641 ready_for_fw is high
3,524,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,581 UART: [idev] Erasing UDS.KEYID = 0
6,026,573 UART: [idev] Sha1 KeyId Algorithm
6,050,039 UART: [idev] --
6,053,934 UART: [ldev] ++
6,054,507 UART: [ldev] CDI.KEYID = 6
6,055,394 UART: [ldev] SUBJECT.KEYID = 5
6,056,611 UART: [ldev] AUTHORITY.KEYID = 7
6,057,847 UART: [ldev] FE.KEYID = 1
6,094,348 UART: [ldev] Erasing FE.KEYID = 1
8,597,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,838 UART: [ldev] --
10,388,788 UART: [fwproc] Wait for Commands...
10,391,323 UART: [fwproc] Recv command 0x46574c44
10,393,421 UART: [fwproc] Recv'd Img size: 114168 bytes
13,786,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,858,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,927,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,244,503 >>> mbox cmd response: success
14,248,136 UART: [afmc] ++
14,248,802 UART: [afmc] CDI.KEYID = 6
14,249,694 UART: [afmc] SUBJECT.KEYID = 7
14,250,798 UART: [afmc] AUTHORITY.KEYID = 5
16,778,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,502,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,504,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,520,344 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,536,360 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,552,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,574,490 UART: [afmc] --
18,577,962 UART: [cold-reset] --
18,581,613 UART: [state] Locking Datavault
18,585,351 UART: [state] Locking PCR0, PCR1 and PCR31
18,587,002 UART: [state] Locking ICCM
18,589,597 UART: [exit] Launching FMC @ 0x40000130
18,598,001 UART:
18,598,241 UART: Running Caliptra FMC ...
18,599,340 UART:
18,599,501 UART: [state] CFI Enabled
18,659,557 UART: [fht] FMC Alias Private Key: 7
20,423,725 UART: [art] Extend RT PCRs Done
20,424,959 UART: [art] Lock RT PCRs Done
20,426,534 UART: [art] Populate DV Done
20,432,273 UART: [fht] FMC Alias Private Key: 7
20,433,981 UART: [art] Derive CDI
20,434,796 UART: [art] Store in in slot 0x4
20,491,786 UART: [art] Derive Key Pair
20,492,784 UART: [art] Store priv key in slot 0x5
22,955,779 UART: [art] Derive Key Pair - Done
22,968,832 UART: [art] Signing Cert with AUTHO
22,970,137 UART: RITY.KEYID = 7
24,681,427 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,935 UART: [art] PUB.X = 9F35C52F28D9B1435E787FB3097E17B9F2B42875D4D768DA3186265B89EA01284E616CBAFF5CEB6A29753DB98A7CDA6C
24,690,195 UART: [art] PUB.Y = 209AC41BB495FC33F75D4027803AFDEDB7911C32EA067875B0693DBFACE9D078198D58735B08A032EF10D327242E8CFF
24,697,494 UART: [art] SIG.R = CD99BD0A66CF564B0A0AB8C770C9C0FCFE3476FFEB582819903EEF8A0219A21F699120FAF36A98FBF25AF4F9F566EAF3
24,704,943 UART: [art] SIG.S = 2169913B7236FF45F98730BC112FD7BE8CF5DC9169BF4ED1FD1C6F9864FE42C3A55B2F9466F7B288897E1A45B962D5A8
25,683,918 UART: Caliptra RT
25,684,617 UART: [state] CFI Enabled
25,850,384 UART: [rt] RT listening for mailbox commands...
25,852,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,008,821 UART: [rt]cmd =0x41544d4e, len=14344
30,004,065 >>> mbox cmd response data (8 bytes)
30,004,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,035,491 UART: [rt]cmd =0x41545348, len=116
30,054,969 >>> mbox cmd response data (12 bytes)
32,122,345 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,267,356 UART:
32,267,748 UART: Running Caliptra ROM ...
32,268,802 UART:
32,268,957 UART: [state] CFI Enabled
32,336,347 UART: [state] LifecycleState = Unprovisioned
32,338,231 UART: [state] DebugLocked = No
32,340,191 UART: [state] WD Timer not started. Device not locked for debugging
32,343,195 UART: [kat] SHA2-256
32,522,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,533,906 UART: [kat] ++
32,534,362 UART: [kat] sha1
32,545,517 UART: [kat] SHA2-256
32,548,528 UART: [kat] SHA2-384
32,555,487 UART: [kat] SHA2-512-ACC
32,558,437 UART: [kat] ECC-384
35,022,486 UART: [kat] HMAC-384Kdf
35,044,772 UART: [kat] LMS
35,574,252 UART: [kat] --
35,578,199 UART: [update-reset] ++
39,005,429 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,008,506 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,390,849 >>> mbox cmd response: success
39,391,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,391,728 UART: [update-reset] Copying MAN_2 To MAN_1
39,413,736 UART: [update-reset Success] --
39,419,436 UART: [state] Locking Datavault
39,423,176 UART: [state] Locking PCR0, PCR1 and PCR31
39,424,876 UART: [state] Locking ICCM
39,426,495 UART: [exit] Launching FMC @ 0x40000130
39,434,893 UART:
39,435,137 UART: Running Caliptra FMC ...
39,436,239 UART:
39,436,396 UART: [state] CFI Enabled
39,534,631 UART: [art] Extend RT PCRs Done
39,535,825 UART: [art] Lock RT PCRs Done
39,537,257 UART: [art] Populate DV Done
39,542,718 UART: [fht] FMC Alias Private Key: 7
39,544,197 UART: [art] Derive CDI
39,544,931 UART: [art] Store in in slot 0x4
39,604,643 UART: [art] Derive Key Pair
39,605,701 UART: [art] Store priv key in slot 0x5
42,068,418 UART: [art] Derive Key Pair - Done
42,081,483 UART: [art] Signing Cert with AUTHO
42,082,795 UART: RITY.KEYID = 7
43,794,585 UART: [art] Erasing AUTHORITY.KEYID = 7
43,796,098 UART: [art] PUB.X = FA84A1C1837FD14A2FF4876DFF6F475A634A5E76F88791A50206BDB98CEBBEA96968984EF6A15F853291B79E87426D7A
43,803,372 UART: [art] PUB.Y = 7F005257E4A0898B6FD5AA7EC4D16AF7FEA0FA463767017EE9C3290E6B63299CDE65020678DA59D16BA42C13839D3713
43,810,622 UART: [art] SIG.R = 6A3BD5D519A777DF87E485E4BE919A437754EDA828FF3B2C257E5BAD49367F37454A833124E568F80732E554C73E0326
43,817,983 UART: [art] SIG.S = 8DBA7704DA4373A92CC0A3429AE777C9CB76B4676AF3D914E07A1DABBE70119491FAB86FB5B90B61E9AD3AA7A087873F
44,796,835 UART: Caliptra RT
44,797,551 UART: [state] CFI Enabled
45,135,027 UART: [rt] RT listening for mailbox commands...
45,166,840 UART: [rt]cmd =0x41545348, len=116
45,187,765 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,359,187 ready_for_fw is high
3,359,726 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,019,844 >>> mbox cmd response: success
18,302,481 UART:
18,302,865 UART: Running Caliptra FMC ...
18,303,974 UART:
18,304,128 UART: [state] CFI Enabled
18,367,866 UART: [fht] FMC Alias Private Key: 7
20,132,025 UART: [art] Extend RT PCRs Done
20,133,250 UART: [art] Lock RT PCRs Done
20,135,069 UART: [art] Populate DV Done
20,140,255 UART: [fht] FMC Alias Private Key: 7
20,141,852 UART: [art] Derive CDI
20,142,585 UART: [art] Store in in slot 0x4
20,201,153 UART: [art] Derive Key Pair
20,202,196 UART: [art] Store priv key in slot 0x5
22,665,650 UART: [art] Derive Key Pair - Done
22,678,587 UART: [art] Signing Cert with AUTHO
22,679,895 UART: RITY.KEYID = 7
24,390,942 UART: [art] Erasing AUTHORITY.KEYID = 7
24,392,433 UART: [art] PUB.X = C660CE93F8C781F1D61C5997365C5143B4D4B04EAF941EA9DDE033A18EAAB894002945D1EABEB3719D956C05E5A1DC8F
24,399,734 UART: [art] PUB.Y = BC2A59212DD3951EEEE2FFDF8BD664E41DEFFEDC1E8EE979A44ACA0DABD85C909AC00DC172127AD8BD0134AE44A68F4A
24,407,039 UART: [art] SIG.R = 2CE90B186C6717601A712E80F6DB700BC202EABBA2F37B84EFB4C2C01A106B81446FCBAC5B8C06FE09EA6C143E90C8F5
24,414,418 UART: [art] SIG.S = 429383737D73B4393F65EC2B2C2DA788649DCF41A218FDD2EA839C4B0C62E375793211F5FEAEE3550924330716164ABD
25,393,590 UART: Caliptra RT
25,394,312 UART: [state] CFI Enabled
25,558,674 UART: [rt] RT listening for mailbox commands...
25,561,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,716,329 UART: [rt]cmd =0x41544d4e, len=14344
29,711,565 >>> mbox cmd response data (8 bytes)
29,712,157 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,742,890 UART: [rt]cmd =0x41545348, len=116
29,763,298 >>> mbox cmd response data (12 bytes)
31,821,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,944,676 >>> mbox cmd response: success
38,945,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,976,760 UART:
38,977,092 UART: Running Caliptra FMC ...
38,978,220 UART:
38,978,388 UART: [state] CFI Enabled
39,071,654 UART: [art] Extend RT PCRs Done
39,072,843 UART: [art] Lock RT PCRs Done
39,074,160 UART: [art] Populate DV Done
39,079,544 UART: [fht] FMC Alias Private Key: 7
39,081,194 UART: [art] Derive CDI
39,082,008 UART: [art] Store in in slot 0x4
39,140,176 UART: [art] Derive Key Pair
39,141,219 UART: [art] Store priv key in slot 0x5
41,605,611 UART: [art] Derive Key Pair - Done
41,619,052 UART: [art] Signing Cert with AUTHO
41,620,363 UART: RITY.KEYID = 7
43,331,459 UART: [art] Erasing AUTHORITY.KEYID = 7
43,332,971 UART: [art] PUB.X = C9AC322582BBFB3499E3F1FD4C9537216317A8FAB97A5031254196FB017009B351342FA3ACEAEDE571AEE01327A1ECE0
43,340,274 UART: [art] PUB.Y = 754289EE034AEBA2AB621359B085059256C5A11E14E17B5BC4307367BC0E95FD6E8BD985640D57AEDAD3779A721D47C2
43,347,500 UART: [art] SIG.R = 355B2A7CF5F6785B22753C39CF102F8B9B6E613BB14D3C05BBDC9B1E2D605E90E365C7DDE001D383D653FA406AEEA4DA
43,354,961 UART: [art] SIG.S = 1530046A038EA0D11B8AE5518085D7AAC36B07026E8766C12A16DA0A29B9EC665F960EAEAD8C674CDFEBBD70F879BFD9
44,333,790 UART: Caliptra RT
44,334,498 UART: [state] CFI Enabled
44,673,335 UART: [rt] RT listening for mailbox commands...
44,705,133 UART: [rt]cmd =0x41545348, len=116
44,724,765 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,405 writing to cptra_bootfsm_go
193,640 UART:
193,988 UART: Running Caliptra ROM ...
195,199 UART:
604,727 UART: [state] CFI Enabled
616,432 UART: [state] LifecycleState = Unprovisioned
618,999 UART: [state] DebugLocked = No
621,027 UART: [state] WD Timer not started. Device not locked for debugging
625,206 UART: [kat] SHA2-256
804,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,922 UART: [kat] ++
816,367 UART: [kat] sha1
828,304 UART: [kat] SHA2-256
831,387 UART: [kat] SHA2-384
837,944 UART: [kat] SHA2-512-ACC
840,950 UART: [kat] ECC-384
3,280,642 UART: [kat] HMAC-384Kdf
3,292,872 UART: [kat] LMS
3,822,384 UART: [kat] --
3,824,964 UART: [cold-reset] ++
3,827,462 UART: [fht] FHT @ 0x50003400
3,839,571 UART: [idev] ++
3,840,134 UART: [idev] CDI.KEYID = 6
3,841,129 UART: [idev] SUBJECT.KEYID = 7
3,842,244 UART: [idev] UDS.KEYID = 0
3,843,234 ready_for_fw is high
3,843,447 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,841 UART: [idev] Erasing UDS.KEYID = 0
6,317,413 UART: [idev] Sha1 KeyId Algorithm
6,340,954 UART: [idev] --
6,344,813 UART: [ldev] ++
6,345,387 UART: [ldev] CDI.KEYID = 6
6,346,275 UART: [ldev] SUBJECT.KEYID = 5
6,347,480 UART: [ldev] AUTHORITY.KEYID = 7
6,348,762 UART: [ldev] FE.KEYID = 1
6,358,408 UART: [ldev] Erasing FE.KEYID = 1
8,831,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,460 UART: [ldev] --
10,619,194 UART: [fwproc] Wait for Commands...
10,622,244 UART: [fwproc] Recv command 0x46574c44
10,624,341 UART: [fwproc] Recv'd Img size: 114168 bytes
14,034,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,154 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,495,224 >>> mbox cmd response: success
14,500,348 UART: [afmc] ++
14,500,948 UART: [afmc] CDI.KEYID = 6
14,501,837 UART: [afmc] SUBJECT.KEYID = 7
14,503,049 UART: [afmc] AUTHORITY.KEYID = 5
16,999,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,294 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,169 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,411 UART: [afmc] --
18,794,066 UART: [cold-reset] --
18,796,154 UART: [state] Locking Datavault
18,800,593 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,292 UART: [state] Locking ICCM
18,803,525 UART: [exit] Launching FMC @ 0x40000130
18,811,917 UART:
18,812,153 UART: Running Caliptra FMC ...
18,813,256 UART:
18,813,416 UART: [state] CFI Enabled
18,821,413 UART: [fht] FMC Alias Private Key: 7
20,578,339 UART: [art] Extend RT PCRs Done
20,579,554 UART: [art] Lock RT PCRs Done
20,581,232 UART: [art] Populate DV Done
20,586,587 UART: [fht] FMC Alias Private Key: 7
20,588,199 UART: [art] Derive CDI
20,589,017 UART: [art] Store in in slot 0x4
20,632,048 UART: [art] Derive Key Pair
20,633,085 UART: [art] Store priv key in slot 0x5
23,060,152 UART: [art] Derive Key Pair - Done
23,072,770 UART: [art] Signing Cert with AUTHO
23,074,073 UART: RITY.KEYID = 7
24,779,782 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,284 UART: [art] PUB.X = F0CE919AC89F8514C335C6C5F949EC359DFCE3FCB5544C1EC55EBC024953F2B1507F81AC981C91EE70D932D058EDAA7D
24,788,544 UART: [art] PUB.Y = 12CB2AA42DB2557B2BAE18086F27D6C7EF0C9F52F40FB823FCE4021BCC8E14894770B9D5DFD2F8AC52531852AE34C14D
24,795,842 UART: [art] SIG.R = 7DB5A357D4219FE7C996DCC81F4D74E52CF28C854BA5F23DE42DB859EAB4422B342D02D98EFFAA9D4619906411CD2DB6
24,803,238 UART: [art] SIG.S = EFCAC2E5E807FC953EE7E91C09D72D246B1361AD9BB580467C404BE1BD0F40B97C1DBBD66C6A4327C113FB2999CD8528
25,782,891 UART: Caliptra RT
25,783,605 UART: [state] CFI Enabled
25,900,517 UART: [rt] RT listening for mailbox commands...
25,902,920 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,058,063 UART: [rt]cmd =0x41544d4e, len=14344
30,053,626 >>> mbox cmd response data (8 bytes)
30,054,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,084,983 UART: [rt]cmd =0x41545348, len=116
30,104,978 >>> mbox cmd response data (12 bytes)
32,156,857 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,302,220 UART:
32,302,586 UART: Running Caliptra ROM ...
32,303,719 UART:
32,303,893 UART: [state] CFI Enabled
32,318,426 UART: [state] LifecycleState = Unprovisioned
32,320,266 UART: [state] DebugLocked = No
32,322,590 UART: [state] WD Timer not started. Device not locked for debugging
32,325,478 UART: [kat] SHA2-256
32,504,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,516,194 UART: [kat] ++
32,516,651 UART: [kat] sha1
32,526,832 UART: [kat] SHA2-256
32,529,899 UART: [kat] SHA2-384
32,536,697 UART: [kat] SHA2-512-ACC
32,539,647 UART: [kat] ECC-384
34,981,498 UART: [kat] HMAC-384Kdf
34,993,561 UART: [kat] LMS
35,523,050 UART: [kat] --
35,526,986 UART: [update-reset] ++
38,955,235 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,957,866 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,340,142 >>> mbox cmd response: success
39,340,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,341,723 UART: [update-reset] Copying MAN_2 To MAN_1
39,364,058 UART: [update-reset Success] --
39,369,044 UART: [state] Locking Datavault
39,373,213 UART: [state] Locking PCR0, PCR1 and PCR31
39,374,904 UART: [state] Locking ICCM
39,376,269 UART: [exit] Launching FMC @ 0x40000130
39,384,711 UART:
39,384,941 UART: Running Caliptra FMC ...
39,386,042 UART:
39,386,203 UART: [state] CFI Enabled
39,430,330 UART: [art] Extend RT PCRs Done
39,431,515 UART: [art] Lock RT PCRs Done
39,433,077 UART: [art] Populate DV Done
39,438,591 UART: [fht] FMC Alias Private Key: 7
39,440,071 UART: [art] Derive CDI
39,440,907 UART: [art] Store in in slot 0x4
39,483,444 UART: [art] Derive Key Pair
39,484,496 UART: [art] Store priv key in slot 0x5
41,911,076 UART: [art] Derive Key Pair - Done
41,923,814 UART: [art] Signing Cert with AUTHO
41,925,130 UART: RITY.KEYID = 7
43,630,576 UART: [art] Erasing AUTHORITY.KEYID = 7
43,632,083 UART: [art] PUB.X = 51A6D60481F7BF1B38354A66B00F0A9E24F1CA703D298CBB269C739EFDB21037B29F374CB49168B37E8700672EDC81E6
43,639,290 UART: [art] PUB.Y = 0258EAC935F1A4575F2A71CC2CC29D972CB1B6A0E35359ED05B2FE38A76E109D5335F78D392A7F9CC04CC42C4EED8B11
43,646,583 UART: [art] SIG.R = C03CE84807B31BC44DACB9772075BBAF052E51FF28823FBB501B27FA7E8D2FE28D35DD65DC23E2F680CBDE0BCC377D3A
43,654,029 UART: [art] SIG.S = 542A345FBF5738B3ED0E977E0ADC9B9D63751E16BEE5D085E512279A1E42C421CD2CEA8738BB9C9C6A668469CA1CE82B
44,633,488 UART: Caliptra RT
44,634,204 UART: [state] CFI Enabled
44,922,739 UART: [rt] RT listening for mailbox commands...
44,954,468 UART: [rt]cmd =0x41545348, len=116
44,974,616 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,566 writing to cptra_bootfsm_go
3,699,932 ready_for_fw is high
3,700,308 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,460 >>> mbox cmd response: success
18,522,382 UART:
18,522,806 UART: Running Caliptra FMC ...
18,524,005 UART:
18,524,187 UART: [state] CFI Enabled
18,532,290 UART: [fht] FMC Alias Private Key: 7
20,289,455 UART: [art] Extend RT PCRs Done
20,290,680 UART: [art] Lock RT PCRs Done
20,292,253 UART: [art] Populate DV Done
20,297,652 UART: [fht] FMC Alias Private Key: 7
20,299,139 UART: [art] Derive CDI
20,299,902 UART: [art] Store in in slot 0x4
20,342,471 UART: [art] Derive Key Pair
20,343,489 UART: [art] Store priv key in slot 0x5
22,769,835 UART: [art] Derive Key Pair - Done
22,782,879 UART: [art] Signing Cert with AUTHO
22,784,233 UART: RITY.KEYID = 7
24,489,470 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,989 UART: [art] PUB.X = 1BCB15CE984CF8BFC2AB122896FBC13E48015BC9AD065291EC20EE33F251EF2E2AFD391ECBC4D0D268ED537EB6FCFC87
24,498,289 UART: [art] PUB.Y = 934697380D1DD83FE491C2AAEE2750A5DDCFB5137D35ACF52CBDA39ECB8E52EC6AF38D7A37EF1243D681364990BC731C
24,505,614 UART: [art] SIG.R = 86A302629B12E442719BF19A594DE0B9213B81B7ACDEDA1B8D1C18693D3A4F3E6F205D17973348A3BCAB2EB5E796B77F
24,512,957 UART: [art] SIG.S = A8668B3183881A92B15B679146C9E611F985DFB18E57D701083B45FF563A4087C6C03AD67D2F1BEA974E44AA536F005A
25,492,268 UART: Caliptra RT
25,492,978 UART: [state] CFI Enabled
25,609,928 UART: [rt] RT listening for mailbox commands...
25,612,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,767,779 UART: [rt]cmd =0x41544d4e, len=14344
29,763,011 >>> mbox cmd response data (8 bytes)
29,763,599 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,794,229 UART: [rt]cmd =0x41545348, len=116
29,814,686 >>> mbox cmd response data (12 bytes)
31,869,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,909,126 >>> mbox cmd response: success
38,909,698 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,943,749 UART:
38,944,076 UART: Running Caliptra FMC ...
38,945,209 UART:
38,945,374 UART: [state] CFI Enabled
38,989,537 UART: [art] Extend RT PCRs Done
38,990,684 UART: [art] Lock RT PCRs Done
38,992,130 UART: [art] Populate DV Done
38,997,480 UART: [fht] FMC Alias Private Key: 7
38,998,969 UART: [art] Derive CDI
38,999,753 UART: [art] Store in in slot 0x4
39,042,112 UART: [art] Derive Key Pair
39,043,149 UART: [art] Store priv key in slot 0x5
41,469,551 UART: [art] Derive Key Pair - Done
41,482,280 UART: [art] Signing Cert with AUTHO
41,483,584 UART: RITY.KEYID = 7
43,189,245 UART: [art] Erasing AUTHORITY.KEYID = 7
43,190,750 UART: [art] PUB.X = C2CDB9387901316763BC0CD1CC73E36952ABD6B4D3AB7D7482FC72560A19E3EC34B9B51214CF8A4D8BEE1E0DA267BF0F
43,198,065 UART: [art] PUB.Y = B2B5243215B10AAD26F59FCA8AE9F702BED8EB5CA63DDDF60D22954A9744277F3F7D7466ED6360A506EDF34619B9C6A3
43,205,304 UART: [art] SIG.R = 6DBEF79FB1625107715DB8C98FE0A056C40A03EEE26A2118D1A803F22232D84867337F0D333D6144CA95342D374AF396
43,212,700 UART: [art] SIG.S = 766168028CDAD09BD2A7638708475F708C334A334129DD1A032A33B4DFB3369AA983DAAF6043D5AD0972884FF3D9CC4C
44,191,819 UART: Caliptra RT
44,192,538 UART: [state] CFI Enabled
44,478,902 UART: [rt] RT listening for mailbox commands...
44,510,647 UART: [rt]cmd =0x41545348, len=116
44,530,277 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,248 UART:
192,618 UART: Running Caliptra ROM ...
193,763 UART:
193,911 UART: [state] CFI Enabled
263,050 UART: [state] LifecycleState = Unprovisioned
265,472 UART: [state] DebugLocked = No
266,678 UART: [state] WD Timer not started. Device not locked for debugging
271,083 UART: [kat] SHA2-256
460,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,750 UART: [kat] ++
472,283 UART: [kat] sha1
483,165 UART: [kat] SHA2-256
486,198 UART: [kat] SHA2-384
492,338 UART: [kat] SHA2-512-ACC
494,921 UART: [kat] ECC-384
2,948,280 UART: [kat] HMAC-384Kdf
2,970,460 UART: [kat] LMS
3,502,264 UART: [kat] --
3,506,353 UART: [cold-reset] ++
3,507,796 UART: [fht] FHT @ 0x50003400
3,520,130 UART: [idev] ++
3,520,847 UART: [idev] CDI.KEYID = 6
3,521,831 UART: [idev] SUBJECT.KEYID = 7
3,523,007 UART: [idev] UDS.KEYID = 0
3,523,940 ready_for_fw is high
3,524,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,755 UART: [idev] Erasing UDS.KEYID = 0
6,026,126 UART: [idev] Sha1 KeyId Algorithm
6,048,675 UART: [idev] --
6,053,595 UART: [ldev] ++
6,054,339 UART: [ldev] CDI.KEYID = 6
6,055,227 UART: [ldev] SUBJECT.KEYID = 5
6,056,329 UART: [ldev] AUTHORITY.KEYID = 7
6,057,620 UART: [ldev] FE.KEYID = 1
6,098,654 UART: [ldev] Erasing FE.KEYID = 1
8,601,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,037 UART: [ldev] --
10,408,981 UART: [fwproc] Wait for Commands...
10,411,828 UART: [fwproc] Recv command 0x46574c44
10,414,077 UART: [fwproc] Recv'd Img size: 114168 bytes
13,859,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,050 >>> mbox cmd response: success
14,601,270 UART: [afmc] ++
14,601,985 UART: [afmc] CDI.KEYID = 6
14,603,237 UART: [afmc] SUBJECT.KEYID = 7
14,604,683 UART: [afmc] AUTHORITY.KEYID = 5
17,145,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,869,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,871,802 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,016 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,199 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,434 UART: [afmc] --
18,944,568 UART: [cold-reset] --
18,949,324 UART: [state] Locking Datavault
18,954,972 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,130 UART: [state] Locking ICCM
18,959,456 UART: [exit] Launching FMC @ 0x40000130
18,968,099 UART:
18,968,339 UART: Running Caliptra FMC ...
18,969,378 UART:
18,969,528 UART: [state] CFI Enabled
19,028,659 UART: [fht] FMC Alias Private Key: 7
20,792,950 UART: [art] Extend RT PCRs Done
20,794,177 UART: [art] Lock RT PCRs Done
20,795,778 UART: [art] Populate DV Done
20,801,303 UART: [fht] FMC Alias Private Key: 7
20,802,948 UART: [art] Derive CDI
20,803,684 UART: [art] Store in in slot 0x4
20,861,209 UART: [art] Derive Key Pair
20,862,269 UART: [art] Store priv key in slot 0x5
23,325,017 UART: [art] Derive Key Pair - Done
23,338,283 UART: [art] Signing Cert with AUTHO
23,339,594 UART: RITY.KEYID = 7
25,050,421 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,936 UART: [art] PUB.X = D6EB3B8BA77CAE7D5DC4999D588B789FC8C67644612856F20ACD5F36D2E5F3324EBDED35F7114869BEA1F8CAEFAF7EFB
25,059,280 UART: [art] PUB.Y = 2D170AAF5339D7F2E7547852D9B9D8512FBB83871B0FF5E3DA85716006C9B1C6A5E4D24C1C44D763B7466FF153C6399C
25,066,498 UART: [art] SIG.R = 6A77D15C41E4AF04084F623293E2DE3ABD4CD6B8BC0F7B48EAC1F24DFEF9B6DF7D814A8E339195A186CA83A02D69C837
25,073,915 UART: [art] SIG.S = 3236831DD64463BE19C0105B419E41D37C637781A902072D7C90F7B184D33141882EB724F78E43805E66C56D68EDA4EB
26,052,565 UART: Caliptra RT
26,053,267 UART: [state] CFI Enabled
26,218,104 UART: [rt] RT listening for mailbox commands...
26,220,659 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,376,080 UART: [rt]cmd =0x41544d4e, len=14344
30,371,836 >>> mbox cmd response data (8 bytes)
30,372,451 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,403,206 UART: [rt]cmd =0x41545348, len=116
30,424,113 >>> mbox cmd response data (12 bytes)
32,482,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,627,834 UART:
32,628,227 UART: Running Caliptra ROM ...
32,629,286 UART:
32,629,441 UART: [state] CFI Enabled
32,706,964 UART: [state] LifecycleState = Unprovisioned
32,709,026 UART: [state] DebugLocked = No
32,711,508 UART: [state] WD Timer not started. Device not locked for debugging
32,716,447 UART: [kat] SHA2-256
32,906,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,917,095 UART: [kat] ++
32,917,558 UART: [kat] sha1
32,929,528 UART: [kat] SHA2-256
32,932,498 UART: [kat] SHA2-384
32,938,283 UART: [kat] SHA2-512-ACC
32,940,857 UART: [kat] ECC-384
35,388,214 UART: [kat] HMAC-384Kdf
35,419,051 UART: [kat] LMS
35,950,622 UART: [kat] --
35,954,850 UART: [update-reset] ++
39,419,522 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,423,080 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
40,029,606 >>> mbox cmd response: success
40,034,642 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,035,285 UART: [update-reset] Copying MAN_2 To MAN_1
40,067,847 UART: [update-reset Success] --
40,071,335 UART: [state] Locking Datavault
40,074,122 UART: [state] Locking PCR0, PCR1 and PCR31
40,076,273 UART: [state] Locking ICCM
40,078,000 UART: [exit] Launching FMC @ 0x40000130
40,086,636 UART:
40,086,875 UART: Running Caliptra FMC ...
40,087,978 UART:
40,088,144 UART: [state] CFI Enabled
40,181,221 UART: [art] Extend RT PCRs Done
40,182,428 UART: [art] Lock RT PCRs Done
40,183,997 UART: [art] Populate DV Done
40,189,374 UART: [fht] FMC Alias Private Key: 7
40,191,023 UART: [art] Derive CDI
40,191,843 UART: [art] Store in in slot 0x4
40,251,066 UART: [art] Derive Key Pair
40,252,154 UART: [art] Store priv key in slot 0x5
42,715,349 UART: [art] Derive Key Pair - Done
42,728,409 UART: [art] Signing Cert with AUTHO
42,729,716 UART: RITY.KEYID = 7
44,441,815 UART: [art] Erasing AUTHORITY.KEYID = 7
44,443,323 UART: [art] PUB.X = 3271A3B745FF2BB8E4B35F0E1556EE9B488A7A0C2D462C1D2530459F0482188C9E8B130698F3D3C1454564348D578182
44,450,598 UART: [art] PUB.Y = 1CC017804BDA47940647F1E7D02ECC86B273E2AE83806EA6BAF7109A5BA2CEEE8E17C2D2B1F36596B5B50872841FA415
44,457,853 UART: [art] SIG.R = 3FEB7DA17866533C48FF21B89F7B517CEE321B1BC57FED3F09EF86D5C2B94E652CEA7EE73AA9C9018562D726F4BD7898
44,465,264 UART: [art] SIG.S = 8A1CF96C2281E1908FDB971265D8DEC8BAC1002F11A1FACBDB9773BAF818FD5EA5FF51FD22947D85DBF598684629A96A
45,443,551 UART: Caliptra RT
45,444,270 UART: [state] CFI Enabled
45,785,168 UART: [rt] RT listening for mailbox commands...
45,817,199 UART: [rt]cmd =0x41545348, len=116
45,838,186 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,418,071 ready_for_fw is high
3,418,614 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,704,276 >>> mbox cmd response: success
19,003,203 UART:
19,003,608 UART: Running Caliptra FMC ...
19,004,750 UART:
19,004,920 UART: [state] CFI Enabled
19,071,741 UART: [fht] FMC Alias Private Key: 7
20,835,805 UART: [art] Extend RT PCRs Done
20,837,033 UART: [art] Lock RT PCRs Done
20,838,930 UART: [art] Populate DV Done
20,844,512 UART: [fht] FMC Alias Private Key: 7
20,846,001 UART: [art] Derive CDI
20,846,790 UART: [art] Store in in slot 0x4
20,903,732 UART: [art] Derive Key Pair
20,904,777 UART: [art] Store priv key in slot 0x5
23,367,030 UART: [art] Derive Key Pair - Done
23,379,864 UART: [art] Signing Cert with AUTHO
23,381,199 UART: RITY.KEYID = 7
25,092,174 UART: [art] Erasing AUTHORITY.KEYID = 7
25,093,677 UART: [art] PUB.X = F32759EA26900103F6E0D151BA129C9424CFF94E12C125D8812442AD2137883CD6ED67EF5F92D1562C8F7BD8FDD45DB9
25,100,907 UART: [art] PUB.Y = DE179728160FEE818191BE69EFA5045708EF29D2332641D551A8F360753281999D24FF455F6F2D730C9599B3524F3797
25,108,145 UART: [art] SIG.R = 3F9BEE3217F102BBFA0136436351B7AA020BD172FC1D1CF03FD24105F284BB96E0F2044809DB04464AEEF5A86891DBB5
25,115,583 UART: [art] SIG.S = 9E3103D74E645533D5BE5406F25BA5D4384B9DF45D20A9EA75BEB5555A7512185BC486382C85DA6628777BA0B34C9A6C
26,094,558 UART: Caliptra RT
26,095,267 UART: [state] CFI Enabled
26,259,303 UART: [rt] RT listening for mailbox commands...
26,261,691 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,416,791 UART: [rt]cmd =0x41544d4e, len=14344
30,412,686 >>> mbox cmd response data (8 bytes)
30,413,320 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,444,108 UART: [rt]cmd =0x41545348, len=116
30,464,523 >>> mbox cmd response data (12 bytes)
32,519,600 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,326,838 >>> mbox cmd response: success
40,327,499 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,361,349 UART:
40,361,686 UART: Running Caliptra FMC ...
40,362,807 UART:
40,363,567 UART: [state] CFI Enabled
40,454,479 UART: [art] Extend RT PCRs Done
40,455,689 UART: [art] Lock RT PCRs Done
40,457,070 UART: [art] Populate DV Done
40,462,441 UART: [fht] FMC Alias Private Key: 7
40,464,083 UART: [art] Derive CDI
40,464,822 UART: [art] Store in in slot 0x4
40,523,962 UART: [art] Derive Key Pair
40,524,999 UART: [art] Store priv key in slot 0x5
42,987,816 UART: [art] Derive Key Pair - Done
43,000,613 UART: [art] Signing Cert with AUTHO
43,001,935 UART: RITY.KEYID = 7
44,714,648 UART: [art] Erasing AUTHORITY.KEYID = 7
44,716,164 UART: [art] PUB.X = 4CC91359F2705A83AFDB90972455428ED6C4289285CF14BE52DBE7B9ADAEBC10EC3FCDCFD90DF7069EA4ECA1C05E7360
44,723,408 UART: [art] PUB.Y = 04B87AFBBB01AC4127B3C7F5430E8B8EDED74603026D1FA9312BD610392FAA81DB35ACF8F207A4214C4A89E354D12738
44,730,686 UART: [art] SIG.R = BABE386507BDF5DC199F614E12F3FB27B5E32694EA02D3DCB92E11139257BB4B86645A8260DE238C2493C288C195086C
44,738,130 UART: [art] SIG.S = B0578269B36C11DEA2E9E333BDBA0B938E9786AAA22D1D2C4C21797F46AA9675D5E36BA297BCF1AB7C40F2F332E07020
45,716,898 UART: Caliptra RT
45,717,611 UART: [state] CFI Enabled
46,045,517 UART: [rt] RT listening for mailbox commands...
46,077,419 UART: [rt]cmd =0x41545348, len=116
46,097,964 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,410 writing to cptra_bootfsm_go
193,532 UART:
193,892 UART: Running Caliptra ROM ...
195,118 UART:
604,493 UART: [state] CFI Enabled
616,903 UART: [state] LifecycleState = Unprovisioned
618,994 UART: [state] DebugLocked = No
620,171 UART: [state] WD Timer not started. Device not locked for debugging
625,130 UART: [kat] SHA2-256
814,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,757 UART: [kat] ++
826,363 UART: [kat] sha1
837,105 UART: [kat] SHA2-256
840,107 UART: [kat] SHA2-384
844,888 UART: [kat] SHA2-512-ACC
847,426 UART: [kat] ECC-384
3,290,532 UART: [kat] HMAC-384Kdf
3,304,183 UART: [kat] LMS
3,835,970 UART: [kat] --
3,841,039 UART: [cold-reset] ++
3,842,833 UART: [fht] FHT @ 0x50003400
3,854,463 UART: [idev] ++
3,855,174 UART: [idev] CDI.KEYID = 6
3,856,089 UART: [idev] SUBJECT.KEYID = 7
3,857,340 UART: [idev] UDS.KEYID = 0
3,858,529 ready_for_fw is high
3,858,726 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,076 UART: [idev] Erasing UDS.KEYID = 0
6,337,019 UART: [idev] Sha1 KeyId Algorithm
6,360,637 UART: [idev] --
6,364,685 UART: [ldev] ++
6,365,385 UART: [ldev] CDI.KEYID = 6
6,366,356 UART: [ldev] SUBJECT.KEYID = 5
6,367,464 UART: [ldev] AUTHORITY.KEYID = 7
6,368,644 UART: [ldev] FE.KEYID = 1
6,380,319 UART: [ldev] Erasing FE.KEYID = 1
8,858,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,299 UART: [ldev] --
10,652,787 UART: [fwproc] Wait for Commands...
10,655,044 UART: [fwproc] Recv command 0x46574c44
10,657,359 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,620 >>> mbox cmd response: success
14,842,731 UART: [afmc] ++
14,843,440 UART: [afmc] CDI.KEYID = 6
14,844,693 UART: [afmc] SUBJECT.KEYID = 7
14,846,135 UART: [afmc] AUTHORITY.KEYID = 5
17,341,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,212 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,268 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,390 UART: [afmc] --
19,137,127 UART: [cold-reset] --
19,141,584 UART: [state] Locking Datavault
19,146,673 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,824 UART: [state] Locking ICCM
19,150,146 UART: [exit] Launching FMC @ 0x40000130
19,158,818 UART:
19,159,052 UART: Running Caliptra FMC ...
19,160,082 UART:
19,160,236 UART: [state] CFI Enabled
19,168,555 UART: [fht] FMC Alias Private Key: 7
20,925,082 UART: [art] Extend RT PCRs Done
20,926,292 UART: [art] Lock RT PCRs Done
20,928,106 UART: [art] Populate DV Done
20,933,414 UART: [fht] FMC Alias Private Key: 7
20,935,112 UART: [art] Derive CDI
20,935,848 UART: [art] Store in in slot 0x4
20,978,438 UART: [art] Derive Key Pair
20,979,474 UART: [art] Store priv key in slot 0x5
23,406,621 UART: [art] Derive Key Pair - Done
23,419,417 UART: [art] Signing Cert with AUTHO
23,420,724 UART: RITY.KEYID = 7
25,125,822 UART: [art] Erasing AUTHORITY.KEYID = 7
25,127,300 UART: [art] PUB.X = 66DEF593E30B30F7C62AB90FBA90DA215435ECCDAFB2C464BF2101195ECE3E29C86C6DD1BB356FD8B7471500AE708B78
25,134,598 UART: [art] PUB.Y = 65633E18D9D51FEA7C9FA0707246F3E4D9F2D1A843D5C15A74576F70C926EDDDC0D17FCFA665DE5B0C9E853B20023768
25,141,879 UART: [art] SIG.R = 3EC18E0DB7970A33C497D695CD3D0024CE1E91743DCD0884B510229800E51148C9D30C848DEB551AB2DD1D09944943F2
25,149,216 UART: [art] SIG.S = 4B3360CF0CDD12EF5272B43C6CE98EA5052005FE0034D5888BE4F7DBC2F37D7A5CDF113140D00836668B4F3A00D7C34E
26,128,789 UART: Caliptra RT
26,129,507 UART: [state] CFI Enabled
26,246,644 UART: [rt] RT listening for mailbox commands...
26,249,037 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,404,456 UART: [rt]cmd =0x41544d4e, len=14344
30,400,059 >>> mbox cmd response data (8 bytes)
30,400,630 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,431,358 UART: [rt]cmd =0x41545348, len=116
30,451,276 >>> mbox cmd response data (12 bytes)
32,506,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,651,707 UART:
32,652,065 UART: Running Caliptra ROM ...
32,653,131 UART:
32,653,339 UART: [state] CFI Enabled
32,666,107 UART: [state] LifecycleState = Unprovisioned
32,667,950 UART: [state] DebugLocked = No
32,669,799 UART: [state] WD Timer not started. Device not locked for debugging
32,674,087 UART: [kat] SHA2-256
32,864,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,874,771 UART: [kat] ++
32,875,281 UART: [kat] sha1
32,885,905 UART: [kat] SHA2-256
32,888,935 UART: [kat] SHA2-384
32,895,319 UART: [kat] SHA2-512-ACC
32,897,900 UART: [kat] ECC-384
35,337,720 UART: [kat] HMAC-384Kdf
35,351,311 UART: [kat] LMS
35,882,923 UART: [kat] --
35,889,312 UART: [update-reset] ++
39,345,428 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,349,562 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,956,109 >>> mbox cmd response: success
39,960,869 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,961,469 UART: [update-reset] Copying MAN_2 To MAN_1
39,994,907 UART: [update-reset Success] --
40,000,114 UART: [state] Locking Datavault
40,003,292 UART: [state] Locking PCR0, PCR1 and PCR31
40,005,499 UART: [state] Locking ICCM
40,008,022 UART: [exit] Launching FMC @ 0x40000130
40,016,648 UART:
40,016,887 UART: Running Caliptra FMC ...
40,017,916 UART:
40,018,071 UART: [state] CFI Enabled
40,061,984 UART: [art] Extend RT PCRs Done
40,063,136 UART: [art] Lock RT PCRs Done
40,064,837 UART: [art] Populate DV Done
40,070,389 UART: [fht] FMC Alias Private Key: 7
40,071,976 UART: [art] Derive CDI
40,072,742 UART: [art] Store in in slot 0x4
40,115,347 UART: [art] Derive Key Pair
40,116,424 UART: [art] Store priv key in slot 0x5
42,542,482 UART: [art] Derive Key Pair - Done
42,555,270 UART: [art] Signing Cert with AUTHO
42,556,601 UART: RITY.KEYID = 7
44,262,157 UART: [art] Erasing AUTHORITY.KEYID = 7
44,263,664 UART: [art] PUB.X = 2AA65DE9084242DE6B80FB68C14A1F63B727381740F4B485384CFFC0522BA455BB5F2F82A1783EC6C1E73EBCED222C24
44,270,917 UART: [art] PUB.Y = 3D16DE463C317B06AC494BB92CC618CC28B885675112D85BAEBF6707849760E01638F4312F904D4023E6522181E8CA43
44,278,153 UART: [art] SIG.R = 1FC63BDE36A41432EFDBAA01A9F34F7DDF4210393D6D52C7C0FC1E3CF7A94A2A262F3BAD343E3116B95C4BF366614E28
44,285,608 UART: [art] SIG.S = 30281978B1C0856266BA03DD1DBB7D861EF16EFE11725B48B77F8CE246DC9400EB3CC7BEA30DE05D6267150BC2A56622
45,264,634 UART: Caliptra RT
45,265,329 UART: [state] CFI Enabled
45,553,782 UART: [rt] RT listening for mailbox commands...
45,585,698 UART: [rt]cmd =0x41545348, len=116
45,605,275 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,410 writing to cptra_bootfsm_go
3,755,501 ready_for_fw is high
3,756,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,960,256 >>> mbox cmd response: success
19,214,368 UART:
19,214,760 UART: Running Caliptra FMC ...
19,215,959 UART:
19,216,137 UART: [state] CFI Enabled
19,224,006 UART: [fht] FMC Alias Private Key: 7
20,980,626 UART: [art] Extend RT PCRs Done
20,981,876 UART: [art] Lock RT PCRs Done
20,983,345 UART: [art] Populate DV Done
20,988,928 UART: [fht] FMC Alias Private Key: 7
20,990,629 UART: [art] Derive CDI
20,991,445 UART: [art] Store in in slot 0x4
21,034,332 UART: [art] Derive Key Pair
21,035,374 UART: [art] Store priv key in slot 0x5
23,462,023 UART: [art] Derive Key Pair - Done
23,475,071 UART: [art] Signing Cert with AUTHO
23,476,385 UART: RITY.KEYID = 7
25,181,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,070 UART: [art] PUB.X = E0D2620A564630FABBCB1723225A9A446AF6BED32616E7A731B88CD5D18E11B51B8BAFCFE8D948523FF83D02A906C5AC
25,190,377 UART: [art] PUB.Y = 279E84371009CC8B451A7CC22F6FCC55F9D2FFCB366A244DE7C015E1E8450D123B31099B870007E7579AD98DD071B054
25,197,579 UART: [art] SIG.R = 25BC980DE72CF0A49D5EBEBF76D79F30906F7F6DEAC82F76488CA67765B5942A44022A6A92961CCF5A5DD053EB572750
25,205,019 UART: [art] SIG.S = 50EACDDC98E559DD35FD27D852BDD316198FFFE9F41C3CFC667A4317528CB38DCB54645154D4776474BE565BA704CF3C
26,183,774 UART: Caliptra RT
26,184,481 UART: [state] CFI Enabled
26,301,923 UART: [rt] RT listening for mailbox commands...
26,304,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,348 UART: [rt]cmd =0x41544d4e, len=14344
30,454,565 >>> mbox cmd response data (8 bytes)
30,455,144 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,486,036 UART: [rt]cmd =0x41545348, len=116
30,505,471 >>> mbox cmd response data (12 bytes)
32,559,363 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,287,710 >>> mbox cmd response: success
40,288,373 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,322,152 UART:
40,322,449 UART: Running Caliptra FMC ...
40,323,485 UART:
40,323,637 UART: [state] CFI Enabled
40,367,607 UART: [art] Extend RT PCRs Done
40,368,799 UART: [art] Lock RT PCRs Done
40,370,181 UART: [art] Populate DV Done
40,375,652 UART: [fht] FMC Alias Private Key: 7
40,377,299 UART: [art] Derive CDI
40,378,041 UART: [art] Store in in slot 0x4
40,420,593 UART: [art] Derive Key Pair
40,421,598 UART: [art] Store priv key in slot 0x5
42,848,199 UART: [art] Derive Key Pair - Done
42,860,986 UART: [art] Signing Cert with AUTHO
42,862,291 UART: RITY.KEYID = 7
44,567,916 UART: [art] Erasing AUTHORITY.KEYID = 7
44,569,431 UART: [art] PUB.X = B74B9C9A922E0BFC81CBF8C0933488F9653021FBDA4F0304B5E746FC8B75837A94DE7EA9572A6F208261BD3BFF4CB065
44,576,679 UART: [art] PUB.Y = 797CAEFD1CEAA28195C64A3C7A9E4499B415115D49E33FBAE5B6790DC89C21E25B03EE975868B9F440FB204608B65D86
44,583,961 UART: [art] SIG.R = 5CF9D06D25F33C6843991CBE2F92C9E18B3756F6EC387980CAA2CE4D8BA7ED499E3811FBB668CA947191378BA382FAF3
44,591,355 UART: [art] SIG.S = C3D1DD0F11371C8825CFE520F880CE3DD4B3D5400F1181099C5A799F0902A7201CC911089D9678D36C07E4D87B14ADD4
45,570,370 UART: Caliptra RT
45,571,079 UART: [state] CFI Enabled
45,859,761 UART: [rt] RT listening for mailbox commands...
45,891,650 UART: [rt]cmd =0x41545348, len=116
45,911,903 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,065 UART: [kat] SHA2-256
881,996 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,111 UART: [kat] ++
886,263 UART: [kat] sha1
890,529 UART: [kat] SHA2-256
892,467 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,926 UART: [kat] HMAC-384Kdf
907,504 UART: [kat] LMS
1,475,700 UART: [kat] --
1,476,639 UART: [cold-reset] ++
1,477,195 UART: [fht] Storing FHT @ 0x50003400
1,480,076 UART: [idev] ++
1,480,244 UART: [idev] CDI.KEYID = 6
1,480,604 UART: [idev] SUBJECT.KEYID = 7
1,481,028 UART: [idev] UDS.KEYID = 0
1,481,373 ready_for_fw is high
1,481,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,878 UART: [idev] Erasing UDS.KEYID = 0
1,505,090 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,688 UART: [idev] --
1,514,777 UART: [ldev] ++
1,514,945 UART: [ldev] CDI.KEYID = 6
1,515,308 UART: [ldev] SUBJECT.KEYID = 5
1,515,734 UART: [ldev] AUTHORITY.KEYID = 7
1,516,197 UART: [ldev] FE.KEYID = 1
1,521,059 UART: [ldev] Erasing FE.KEYID = 1
1,546,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,562 UART: [ldev] --
1,585,845 UART: [fwproc] Waiting for Commands...
1,586,486 UART: [fwproc] Received command 0x46574c44
1,587,277 UART: [fwproc] Received Image of size 114168 bytes
2,882,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,479 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,398 >>> mbox cmd response: success
3,075,456 UART: [afmc] ++
3,075,624 UART: [afmc] CDI.KEYID = 6
3,075,986 UART: [afmc] SUBJECT.KEYID = 7
3,076,411 UART: [afmc] AUTHORITY.KEYID = 5
3,111,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,944 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,672 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,557 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,247 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,172 UART: [afmc] --
3,154,226 UART: [cold-reset] --
3,155,090 UART: [state] Locking Datavault
3,156,155 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,759 UART: [state] Locking ICCM
3,157,315 UART: [exit] Launching FMC @ 0x40000130
3,162,644 UART:
3,162,660 UART: Running Caliptra FMC ...
3,163,068 UART:
3,163,122 UART: [state] CFI Enabled
3,174,007 UART: [fht] FMC Alias Private Key: 7
3,281,868 UART: [art] Extend RT PCRs Done
3,282,296 UART: [art] Lock RT PCRs Done
3,283,660 UART: [art] Populate DV Done
3,291,741 UART: [fht] FMC Alias Private Key: 7
3,292,733 UART: [art] Derive CDI
3,293,013 UART: [art] Store in in slot 0x4
3,378,778 UART: [art] Derive Key Pair
3,379,138 UART: [art] Store priv key in slot 0x5
3,392,222 UART: [art] Derive Key Pair - Done
3,406,776 UART: [art] Signing Cert with AUTHO
3,407,256 UART: RITY.KEYID = 7
3,422,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,043 UART: [art] PUB.X = B169751344A298F3C2F9F5C79A0A920FEBF20E00B675821FEF716A0BED7592C804559A394F1ECF5F48367EF7889200D7
3,429,756 UART: [art] PUB.Y = BB7E083D9C5BC07CAF4C2580B40B02DC27FAEA5091AEA27934AAEAD9A86A1348AD808DDEA07A702D77FE7234D3989023
3,436,715 UART: [art] SIG.R = 02AD5DD6DB1749A7ECCFFC2099BEEF94328AA4BC5673B9AF3E69E6F79792559B5AF86C668B93E4A6CF27704789C70BBF
3,443,497 UART: [art] SIG.S = AB2C642E47A5179C742EDEF18C4AB833645FB8A0B90CD73D0082D04A28953881991DCB353566B3EA426DB9CEEC24A185
3,466,771 UART: Caliptra RT
3,467,024 UART: [state] CFI Enabled
3,574,459 UART: [rt] RT listening for mailbox commands...
3,575,129 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,261 UART: [rt]cmd =0x41544d4e, len=14344
4,007,779 >>> mbox cmd response data (8 bytes)
4,007,780 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,037,689 UART: [rt]cmd =0x41545348, len=116
4,060,100 >>> mbox cmd response data (12 bytes)
4,060,101 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,060,769 UART:
4,060,785 UART: Running Caliptra ROM ...
4,061,193 UART:
4,061,247 UART: [state] CFI Enabled
4,064,385 UART: [state] LifecycleState = Unprovisioned
4,065,040 UART: [state] DebugLocked = No
4,065,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,067,115 UART: [kat] SHA2-256
4,861,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,865,161 UART: [kat] ++
4,865,313 UART: [kat] sha1
4,869,431 UART: [kat] SHA2-256
4,871,369 UART: [kat] SHA2-384
4,874,230 UART: [kat] SHA2-512-ACC
4,876,130 UART: [kat] ECC-384
4,881,887 UART: [kat] HMAC-384Kdf
4,886,641 UART: [kat] LMS
5,454,837 UART: [kat] --
5,455,838 UART: [update-reset] ++
6,788,262 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,789,404 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,939,034 >>> mbox cmd response: success
6,939,034 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,939,301 UART: [update-reset] Copying MAN_2 To MAN_1
6,947,315 UART: [update-reset Success] --
6,948,430 UART: [state] Locking Datavault
6,949,194 UART: [state] Locking PCR0, PCR1 and PCR31
6,949,798 UART: [state] Locking ICCM
6,950,428 UART: [exit] Launching FMC @ 0x40000130
6,955,757 UART:
6,955,773 UART: Running Caliptra FMC ...
6,956,181 UART:
6,956,235 UART: [state] CFI Enabled
7,044,834 UART: [art] Extend RT PCRs Done
7,045,262 UART: [art] Lock RT PCRs Done
7,046,583 UART: [art] Populate DV Done
7,054,746 UART: [fht] FMC Alias Private Key: 7
7,055,832 UART: [art] Derive CDI
7,056,112 UART: [art] Store in in slot 0x4
7,141,545 UART: [art] Derive Key Pair
7,141,905 UART: [art] Store priv key in slot 0x5
7,154,993 UART: [art] Derive Key Pair - Done
7,169,703 UART: [art] Signing Cert with AUTHO
7,170,183 UART: RITY.KEYID = 7
7,185,851 UART: [art] Erasing AUTHORITY.KEYID = 7
7,186,616 UART: [art] PUB.X = 3F013491B4EA155125B91C4C5A643063E358834E8B76E38FBB22956C4A6B365087BEE8B0770AEDD0A25368E6538CC79D
7,193,380 UART: [art] PUB.Y = 3FAD584F57360A340739095E82337AFA998B06AC2868639C9CB1000C2A4ADF810660864EB7AAFBE3E894A558E188889B
7,200,290 UART: [art] SIG.R = 3DAA427DE9599B7330B69F2515F0D2E6982AB039B58D27E0EAA336AD5243C534D8F12AF35F2C12B76F41A002BCB1D4E1
7,207,067 UART: [art] SIG.S = 63C71FD60B2954846370EED3D17195DB8A517638A260098B7490B32E3916316054BC317AF1DF52E43E67F283FEB99546
7,230,684 UART: Caliptra RT
7,230,937 UART: [state] CFI Enabled
7,508,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,539,648 UART: [rt]cmd =0x41545348, len=116
7,561,915 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,631 ready_for_fw is high
1,363,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,116 >>> mbox cmd response: success
2,987,426 UART:
2,987,442 UART: Running Caliptra FMC ...
2,987,850 UART:
2,987,904 UART: [state] CFI Enabled
2,998,109 UART: [fht] FMC Alias Private Key: 7
3,105,622 UART: [art] Extend RT PCRs Done
3,106,050 UART: [art] Lock RT PCRs Done
3,107,674 UART: [art] Populate DV Done
3,116,197 UART: [fht] FMC Alias Private Key: 7
3,117,173 UART: [art] Derive CDI
3,117,453 UART: [art] Store in in slot 0x4
3,203,084 UART: [art] Derive Key Pair
3,203,444 UART: [art] Store priv key in slot 0x5
3,216,448 UART: [art] Derive Key Pair - Done
3,231,276 UART: [art] Signing Cert with AUTHO
3,231,756 UART: RITY.KEYID = 7
3,247,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,831 UART: [art] PUB.X = 28376ABA7FE5F447B913E64BB2D278BA61A472963CB888A52F08368F7E57F243811B85875A9B002F08DA7A728EFE2ED1
3,254,577 UART: [art] PUB.Y = EBF354F5881BCF03E12BD1318FA4243B76D3C665F4801DE5DA7B7EB33C14D13D4D332DE9EE72072D4D858A3F11BC2167
3,261,533 UART: [art] SIG.R = 647CAAD271AEECE7F701ECDF45CA51EABE2DE0FC80ED391CD5DB6A8ED6208809923DB1B37DD4B1D633A22BEB30058B79
3,268,322 UART: [art] SIG.S = 264F7701B0A69FD1427B9B52BCBEF0006EECE1C761D8C6D33E53F264167987A0EAE3D9077F90019825335A2D610C3880
3,292,669 UART: Caliptra RT
3,292,922 UART: [state] CFI Enabled
3,401,736 UART: [rt] RT listening for mailbox commands...
3,402,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,376 UART: [rt]cmd =0x41544d4e, len=14344
3,835,126 >>> mbox cmd response data (8 bytes)
3,835,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,322 UART: [rt]cmd =0x41545348, len=116
3,886,113 >>> mbox cmd response data (12 bytes)
3,886,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,644,743 >>> mbox cmd response: success
6,644,743 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,657,926 UART:
6,657,942 UART: Running Caliptra FMC ...
6,658,350 UART:
6,658,404 UART: [state] CFI Enabled
6,747,015 UART: [art] Extend RT PCRs Done
6,747,443 UART: [art] Lock RT PCRs Done
6,748,900 UART: [art] Populate DV Done
6,757,453 UART: [fht] FMC Alias Private Key: 7
6,758,469 UART: [art] Derive CDI
6,758,749 UART: [art] Store in in slot 0x4
6,844,150 UART: [art] Derive Key Pair
6,844,510 UART: [art] Store priv key in slot 0x5
6,857,512 UART: [art] Derive Key Pair - Done
6,872,202 UART: [art] Signing Cert with AUTHO
6,872,682 UART: RITY.KEYID = 7
6,888,276 UART: [art] Erasing AUTHORITY.KEYID = 7
6,889,041 UART: [art] PUB.X = 076C6B858F214710BD12E6D6355F9743074CB7D8F70C6D468DECB0979680457642DE2C5E411DB9A4C04FC3DA9174AE0B
6,895,803 UART: [art] PUB.Y = C3358E2E69A6A8EC2930E0ED489A70188DAD02BD1474478D2D5DDE5C82AEFDA047C00C90698081EE793A0718B2ED1124
6,902,752 UART: [art] SIG.R = 0B2935EB306BF3DF5AE60A68BFC2D10FCAD2BFFF7264F309FEBFF648E15FBE4CA322291BFD5B59D48A2BF51ED9219679
6,909,536 UART: [art] SIG.S = 2718E59CDDF3FDD48A574DE50F3DEFC177326274A1105603BFEB6B9ABE7815B17C3E199A831F0ECA9907B924BFFC7D7A
6,933,027 UART: Caliptra RT
6,933,280 UART: [state] CFI Enabled
7,212,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,243,239 UART: [rt]cmd =0x41545348, len=116
7,265,066 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,958 UART: [kat] SHA2-256
881,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,004 UART: [kat] ++
886,156 UART: [kat] sha1
890,278 UART: [kat] SHA2-256
892,216 UART: [kat] SHA2-384
894,915 UART: [kat] SHA2-512-ACC
896,816 UART: [kat] ECC-384
902,339 UART: [kat] HMAC-384Kdf
906,813 UART: [kat] LMS
1,475,009 UART: [kat] --
1,475,784 UART: [cold-reset] ++
1,476,272 UART: [fht] Storing FHT @ 0x50003400
1,478,893 UART: [idev] ++
1,479,061 UART: [idev] CDI.KEYID = 6
1,479,421 UART: [idev] SUBJECT.KEYID = 7
1,479,845 UART: [idev] UDS.KEYID = 0
1,480,190 ready_for_fw is high
1,480,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,621 UART: [idev] Erasing UDS.KEYID = 0
1,504,225 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,923 UART: [idev] --
1,514,174 UART: [ldev] ++
1,514,342 UART: [ldev] CDI.KEYID = 6
1,514,705 UART: [ldev] SUBJECT.KEYID = 5
1,515,131 UART: [ldev] AUTHORITY.KEYID = 7
1,515,594 UART: [ldev] FE.KEYID = 1
1,520,862 UART: [ldev] Erasing FE.KEYID = 1
1,546,157 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,421 UART: [ldev] --
1,585,794 UART: [fwproc] Waiting for Commands...
1,586,567 UART: [fwproc] Received command 0x46574c44
1,587,358 UART: [fwproc] Received Image of size 114168 bytes
2,883,716 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,342 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,694 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,379 >>> mbox cmd response: success
3,076,551 UART: [afmc] ++
3,076,719 UART: [afmc] CDI.KEYID = 6
3,077,081 UART: [afmc] SUBJECT.KEYID = 7
3,077,506 UART: [afmc] AUTHORITY.KEYID = 5
3,113,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,361 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,754 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,444 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,337 UART: [afmc] --
3,156,347 UART: [cold-reset] --
3,157,181 UART: [state] Locking Datavault
3,158,456 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,060 UART: [state] Locking ICCM
3,159,584 UART: [exit] Launching FMC @ 0x40000130
3,164,913 UART:
3,164,929 UART: Running Caliptra FMC ...
3,165,337 UART:
3,165,480 UART: [state] CFI Enabled
3,176,357 UART: [fht] FMC Alias Private Key: 7
3,284,358 UART: [art] Extend RT PCRs Done
3,284,786 UART: [art] Lock RT PCRs Done
3,286,750 UART: [art] Populate DV Done
3,295,171 UART: [fht] FMC Alias Private Key: 7
3,296,101 UART: [art] Derive CDI
3,296,381 UART: [art] Store in in slot 0x4
3,382,048 UART: [art] Derive Key Pair
3,382,408 UART: [art] Store priv key in slot 0x5
3,395,354 UART: [art] Derive Key Pair - Done
3,410,021 UART: [art] Signing Cert with AUTHO
3,410,501 UART: RITY.KEYID = 7
3,425,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,462 UART: [art] PUB.X = 5622B159F55EB2458DC85AABA85FD488F6B78D30A949EB254CA1BF023A8E6514F8B36BAFA33B0B3F2BE04B0402D58BA3
3,433,236 UART: [art] PUB.Y = 8BAA9FEB965240B20CC430E4CA551F2115B6EE98A72F6138A4E8D3585116656D0958E9984BD6B8AD17ECF4A6A4D68B10
3,440,188 UART: [art] SIG.R = 136B36C6BB5A78BC19206842DEF6615049EE0848BD5DEA7B22B907C7A8C6BB2978036F25B1C09A3F12EA9B33CAC3229E
3,446,959 UART: [art] SIG.S = 3CE133B26629778E0007536B39A771E7ED5A3D9D2D1F754EE6033D568586EAC15B44CACF4AE6067ACE4BCF57E77FB3A5
3,470,469 UART: Caliptra RT
3,470,814 UART: [state] CFI Enabled
3,579,186 UART: [rt] RT listening for mailbox commands...
3,579,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,630 UART: [rt]cmd =0x41544d4e, len=14344
4,012,390 >>> mbox cmd response data (8 bytes)
4,012,391 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,592 UART: [rt]cmd =0x41545348, len=116
4,064,095 >>> mbox cmd response data (12 bytes)
4,064,096 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,808 UART:
4,064,824 UART: Running Caliptra ROM ...
4,065,232 UART:
4,065,373 UART: [state] CFI Enabled
4,067,969 UART: [state] LifecycleState = Unprovisioned
4,068,624 UART: [state] DebugLocked = No
4,069,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,070,873 UART: [kat] SHA2-256
4,864,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,868,919 UART: [kat] ++
4,869,071 UART: [kat] sha1
4,873,335 UART: [kat] SHA2-256
4,875,273 UART: [kat] SHA2-384
4,878,086 UART: [kat] SHA2-512-ACC
4,879,986 UART: [kat] ECC-384
4,885,587 UART: [kat] HMAC-384Kdf
4,890,145 UART: [kat] LMS
5,458,341 UART: [kat] --
5,459,330 UART: [update-reset] ++
6,792,222 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,793,442 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,943,072 >>> mbox cmd response: success
6,943,072 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,943,329 UART: [update-reset] Copying MAN_2 To MAN_1
6,951,343 UART: [update-reset Success] --
6,952,494 UART: [state] Locking Datavault
6,953,298 UART: [state] Locking PCR0, PCR1 and PCR31
6,953,902 UART: [state] Locking ICCM
6,954,448 UART: [exit] Launching FMC @ 0x40000130
6,959,777 UART:
6,959,793 UART: Running Caliptra FMC ...
6,960,201 UART:
6,960,344 UART: [state] CFI Enabled
7,049,177 UART: [art] Extend RT PCRs Done
7,049,605 UART: [art] Lock RT PCRs Done
7,050,812 UART: [art] Populate DV Done
7,059,103 UART: [fht] FMC Alias Private Key: 7
7,060,075 UART: [art] Derive CDI
7,060,355 UART: [art] Store in in slot 0x4
7,146,070 UART: [art] Derive Key Pair
7,146,430 UART: [art] Store priv key in slot 0x5
7,159,720 UART: [art] Derive Key Pair - Done
7,174,676 UART: [art] Signing Cert with AUTHO
7,175,156 UART: RITY.KEYID = 7
7,190,580 UART: [art] Erasing AUTHORITY.KEYID = 7
7,191,345 UART: [art] PUB.X = B79F79B41798ABF045D7083121BEBF541042B554E83831159BADAD103E631BEC02021073154CD6599879D2DEE99F7ECE
7,198,108 UART: [art] PUB.Y = 2320C7E3FD1A3C5834E672B7B5EC9134C61395C517D7059A46589E4249FA6B89D192E08F4402E2BDE6FBEBFB477A7429
7,205,056 UART: [art] SIG.R = 6009807606FEAB581758E83E5FD4EF7B4A86D53D530782893035B718FF23A1F3C70519F74B030E7588F3BB412B97252F
7,211,802 UART: [art] SIG.S = 595818EFEFA26416D9336595C60379682D6C6802D78CE609A6EBBA75799EB2C225EC131EE76C51A290DA884965A4E934
7,235,454 UART: Caliptra RT
7,235,799 UART: [state] CFI Enabled
7,518,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,549,076 UART: [rt]cmd =0x41545348, len=116
7,571,673 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,184 ready_for_fw is high
1,363,184 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,143 >>> mbox cmd response: success
2,986,647 UART:
2,986,663 UART: Running Caliptra FMC ...
2,987,071 UART:
2,987,214 UART: [state] CFI Enabled
2,998,073 UART: [fht] FMC Alias Private Key: 7
3,106,086 UART: [art] Extend RT PCRs Done
3,106,514 UART: [art] Lock RT PCRs Done
3,108,104 UART: [art] Populate DV Done
3,116,443 UART: [fht] FMC Alias Private Key: 7
3,117,499 UART: [art] Derive CDI
3,117,779 UART: [art] Store in in slot 0x4
3,203,630 UART: [art] Derive Key Pair
3,203,990 UART: [art] Store priv key in slot 0x5
3,217,850 UART: [art] Derive Key Pair - Done
3,232,527 UART: [art] Signing Cert with AUTHO
3,233,007 UART: RITY.KEYID = 7
3,248,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,360 UART: [art] PUB.X = 33D356865E4D14EEF32E1DAC19D4FF3BF60F67E753F681655764B07D591D7DFB9DC9DBAE492F2155B23543CC0A15298F
3,256,134 UART: [art] PUB.Y = 502EE4753E9466DF8209104EC3562B79D776536D6DA93666EE971AD4BE506175E2AD494295DBA229B4FE61E9FBBE9088
3,263,083 UART: [art] SIG.R = DB1FA69DAC18BF6692AB792828FCD462361F0417630B4E95571A22DC8DE7F65067ABCC1561B6540D30FB00D18C4E29C9
3,269,830 UART: [art] SIG.S = 0C48772E96F12B18B999A55938608B7B187B1B6433A71577438AC11A00A883FB7310E15A7331A2ECA76194B40F2DADF6
3,293,155 UART: Caliptra RT
3,293,500 UART: [state] CFI Enabled
3,402,187 UART: [rt] RT listening for mailbox commands...
3,402,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,905 UART: [rt]cmd =0x41544d4e, len=14344
3,835,765 >>> mbox cmd response data (8 bytes)
3,835,766 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,761 UART: [rt]cmd =0x41545348, len=116
3,888,244 >>> mbox cmd response data (12 bytes)
3,888,245 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,648,377 >>> mbox cmd response: success
6,648,377 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,661,538 UART:
6,661,554 UART: Running Caliptra FMC ...
6,661,962 UART:
6,662,105 UART: [state] CFI Enabled
6,751,346 UART: [art] Extend RT PCRs Done
6,751,774 UART: [art] Lock RT PCRs Done
6,752,927 UART: [art] Populate DV Done
6,761,182 UART: [fht] FMC Alias Private Key: 7
6,762,284 UART: [art] Derive CDI
6,762,564 UART: [art] Store in in slot 0x4
6,848,311 UART: [art] Derive Key Pair
6,848,671 UART: [art] Store priv key in slot 0x5
6,861,655 UART: [art] Derive Key Pair - Done
6,876,436 UART: [art] Signing Cert with AUTHO
6,876,916 UART: RITY.KEYID = 7
6,892,406 UART: [art] Erasing AUTHORITY.KEYID = 7
6,893,171 UART: [art] PUB.X = 52E0AA457083F88B364A952DF14114B9B45DA2D90DAC29189BA2DBB36DBDDAF24C0858FE4DC3DEB8D29FA0D0381B5322
6,899,953 UART: [art] PUB.Y = B59FCD34C8C9E5CC1525190891BF9143C76AAF052DF19777AAF878C768DCA7C8E5BAEC7410E92153D936A1167139D265
6,906,903 UART: [art] SIG.R = D0C0A1D1B9F3378C1A67FDE648C4CC7743127F4A3B56D38A3A1BA2775BC936748B5C69D5AE03F1F6714487E420BA1FA2
6,913,680 UART: [art] SIG.S = 3A0A987768BE8C09DED0DFA48105D6D5A0F386DA84A880570097B7579108D8EE6E5FEF69F4222BDD1474B2C92DB70B9E
6,936,546 UART: Caliptra RT
6,936,891 UART: [state] CFI Enabled
7,221,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,252,649 UART: [rt]cmd =0x41545348, len=116
7,275,306 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
893,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,481 UART: [kat] ++
897,633 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
918,438 UART: [kat] HMAC-384Kdf
922,984 UART: [kat] LMS
1,171,312 UART: [kat] --
1,172,305 UART: [cold-reset] ++
1,172,739 UART: [fht] FHT @ 0x50003400
1,175,248 UART: [idev] ++
1,175,416 UART: [idev] CDI.KEYID = 6
1,175,776 UART: [idev] SUBJECT.KEYID = 7
1,176,200 UART: [idev] UDS.KEYID = 0
1,176,545 ready_for_fw is high
1,176,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,016 UART: [idev] Erasing UDS.KEYID = 0
1,201,303 UART: [idev] Sha1 KeyId Algorithm
1,209,877 UART: [idev] --
1,210,849 UART: [ldev] ++
1,211,017 UART: [ldev] CDI.KEYID = 6
1,211,380 UART: [ldev] SUBJECT.KEYID = 5
1,211,806 UART: [ldev] AUTHORITY.KEYID = 7
1,212,269 UART: [ldev] FE.KEYID = 1
1,217,213 UART: [ldev] Erasing FE.KEYID = 1
1,243,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,015 UART: [ldev] --
1,283,368 UART: [fwproc] Wait for Commands...
1,283,960 UART: [fwproc] Recv command 0x46574c44
1,284,688 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,204 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,165 >>> mbox cmd response: success
2,774,317 UART: [afmc] ++
2,774,485 UART: [afmc] CDI.KEYID = 6
2,774,847 UART: [afmc] SUBJECT.KEYID = 7
2,775,272 UART: [afmc] AUTHORITY.KEYID = 5
2,810,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,496 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,224 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,109 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,828 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,446 UART: [afmc] --
2,853,538 UART: [cold-reset] --
2,854,612 UART: [state] Locking Datavault
2,855,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,377 UART: [state] Locking ICCM
2,856,881 UART: [exit] Launching FMC @ 0x40000130
2,862,210 UART:
2,862,226 UART: Running Caliptra FMC ...
2,862,634 UART:
2,862,688 UART: [state] CFI Enabled
2,873,153 UART: [fht] FMC Alias Private Key: 7
2,981,468 UART: [art] Extend RT PCRs Done
2,981,896 UART: [art] Lock RT PCRs Done
2,983,354 UART: [art] Populate DV Done
2,991,835 UART: [fht] FMC Alias Private Key: 7
2,992,771 UART: [art] Derive CDI
2,993,051 UART: [art] Store in in slot 0x4
3,078,692 UART: [art] Derive Key Pair
3,079,052 UART: [art] Store priv key in slot 0x5
3,092,198 UART: [art] Derive Key Pair - Done
3,106,966 UART: [art] Signing Cert with AUTHO
3,107,446 UART: RITY.KEYID = 7
3,122,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,561 UART: [art] PUB.X = F179339FDA8B559D928901CC3BCB0E8B65E458D4C42B9E1FB0CDCE326C0FFC2A686BF84F970C35259A44FD9290901320
3,130,329 UART: [art] PUB.Y = 9BD459C2AE29DB428B88FDD88CE3C8DCA10F2FB309AF7B8E2C55C8975732FFDD0DC384E2AB679CF20D4764FEE394F0B1
3,137,291 UART: [art] SIG.R = 198D14DB436D396FAB1F2569D47EAFCE2988F35D6D04D7CFFCE1A111739ED863B3ED491A0A70A0DF5155AEBD41EAB787
3,144,075 UART: [art] SIG.S = FA8B11B948A1EB54D8CA86DF9A3F2CCF8B895EF2D646A27B4F7D64EAEF3E7E786E0F20DD9B0B509EBDAF2CF6737D9E95
3,168,416 UART: Caliptra RT
3,168,669 UART: [state] CFI Enabled
3,276,266 UART: [rt] RT listening for mailbox commands...
3,276,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,844 UART: [rt]cmd =0x41544d4e, len=14344
3,710,540 >>> mbox cmd response data (8 bytes)
3,710,541 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,366 UART: [rt]cmd =0x41545348, len=116
3,761,575 >>> mbox cmd response data (12 bytes)
3,761,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,285 UART:
3,762,301 UART: Running Caliptra ROM ...
3,762,709 UART:
3,762,764 UART: [state] CFI Enabled
3,765,146 UART: [state] LifecycleState = Unprovisioned
3,765,801 UART: [state] DebugLocked = No
3,766,529 UART: [state] WD Timer not started. Device not locked for debugging
3,767,829 UART: [kat] SHA2-256
4,573,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,577,604 UART: [kat] ++
4,577,756 UART: [kat] sha1
4,582,034 UART: [kat] SHA2-256
4,583,974 UART: [kat] SHA2-384
4,586,697 UART: [kat] SHA2-512-ACC
4,588,597 UART: [kat] ECC-384
4,598,154 UART: [kat] HMAC-384Kdf
4,602,614 UART: [kat] LMS
4,850,942 UART: [kat] --
4,851,566 UART: [update-reset] ++
6,163,288 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,164,315 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,313,893 >>> mbox cmd response: success
6,313,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,314,082 UART: [update-reset] Copying MAN_2 To MAN_1
6,322,096 UART: [update-reset Success] --
6,323,059 UART: [state] Locking Datavault
6,324,063 UART: [state] Locking PCR0, PCR1 and PCR31
6,324,667 UART: [state] Locking ICCM
6,325,147 UART: [exit] Launching FMC @ 0x40000130
6,330,476 UART:
6,330,492 UART: Running Caliptra FMC ...
6,330,900 UART:
6,330,954 UART: [state] CFI Enabled
6,419,985 UART: [art] Extend RT PCRs Done
6,420,413 UART: [art] Lock RT PCRs Done
6,421,570 UART: [art] Populate DV Done
6,429,815 UART: [fht] FMC Alias Private Key: 7
6,430,991 UART: [art] Derive CDI
6,431,271 UART: [art] Store in in slot 0x4
6,516,810 UART: [art] Derive Key Pair
6,517,170 UART: [art] Store priv key in slot 0x5
6,529,798 UART: [art] Derive Key Pair - Done
6,544,528 UART: [art] Signing Cert with AUTHO
6,545,008 UART: RITY.KEYID = 7
6,560,250 UART: [art] Erasing AUTHORITY.KEYID = 7
6,561,015 UART: [art] PUB.X = 78620004D3A4BF55CC992B49398CA89FDCAC1F0FE2D0C63D99E9B9418E45E79E385402ADB4923E1E1E97C4A96C5FAC24
6,567,766 UART: [art] PUB.Y = 11B36AA65E5E6A3CE386288C01D9DD7B8F8ECBC82E99D91BDD0F27F01C6C432A77A1EFA360AFDBA1DE5982CFFADA777C
6,574,740 UART: [art] SIG.R = 07E29537AEB021DD8B7B3E0980E9D91B1882E64FD35220948AE8BF665733D4AFC209A6624E45427E153D24CA50B6EC1E
6,581,505 UART: [art] SIG.S = F75EFE6E37927B4440E6356966DEA56490BDE79AE95121F8BFA2063CDF92A146E6A0B2007E635E664EB67C8100615BC3
6,605,475 UART: Caliptra RT
6,605,728 UART: [state] CFI Enabled
6,883,969 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,914,876 UART: [rt]cmd =0x41545348, len=116
6,936,133 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 ready_for_fw is high
1,060,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,434 >>> mbox cmd response: success
2,686,064 UART:
2,686,080 UART: Running Caliptra FMC ...
2,686,488 UART:
2,686,542 UART: [state] CFI Enabled
2,697,085 UART: [fht] FMC Alias Private Key: 7
2,805,522 UART: [art] Extend RT PCRs Done
2,805,950 UART: [art] Lock RT PCRs Done
2,807,300 UART: [art] Populate DV Done
2,815,497 UART: [fht] FMC Alias Private Key: 7
2,816,491 UART: [art] Derive CDI
2,816,771 UART: [art] Store in in slot 0x4
2,902,396 UART: [art] Derive Key Pair
2,902,756 UART: [art] Store priv key in slot 0x5
2,916,158 UART: [art] Derive Key Pair - Done
2,930,955 UART: [art] Signing Cert with AUTHO
2,931,435 UART: RITY.KEYID = 7
2,946,547 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,312 UART: [art] PUB.X = A6900CA7BEF9B30CD5F85AD78400E2F69CE46AD1C2848CE0CC365F6C101E6C8682E02CB5A02835302061C9FE757E2F06
2,954,061 UART: [art] PUB.Y = B509D21E53F4C332B4B8BB4A582489426CB3EE72F4EF6A4EB06F6C1E841D4C357E395D8B8D38BE7C2D08AAC26CADF362
2,961,023 UART: [art] SIG.R = 82505E227DE3A3A6520ED3A6EDC104000FEC4517231B6CC951039E2FAC0EDE35EA1CA5A481ED50D3E17B6BC7D446798D
2,967,770 UART: [art] SIG.S = 81AA26076F2A49183EB1CF4400580C0AA38E2C27CB2699852463D1B9E0700329EF45A8615F11740794AADCE611031F92
2,991,201 UART: Caliptra RT
2,991,454 UART: [state] CFI Enabled
3,099,524 UART: [rt] RT listening for mailbox commands...
3,100,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,026 UART: [rt]cmd =0x41544d4e, len=14344
3,533,330 >>> mbox cmd response data (8 bytes)
3,533,331 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,432 UART: [rt]cmd =0x41545348, len=116
3,584,883 >>> mbox cmd response data (12 bytes)
3,584,884 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,020,760 >>> mbox cmd response: success
6,020,760 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,034,214 UART:
6,034,230 UART: Running Caliptra FMC ...
6,034,638 UART:
6,034,692 UART: [state] CFI Enabled
6,123,653 UART: [art] Extend RT PCRs Done
6,124,081 UART: [art] Lock RT PCRs Done
6,125,456 UART: [art] Populate DV Done
6,133,573 UART: [fht] FMC Alias Private Key: 7
6,134,751 UART: [art] Derive CDI
6,135,031 UART: [art] Store in in slot 0x4
6,221,122 UART: [art] Derive Key Pair
6,221,482 UART: [art] Store priv key in slot 0x5
6,234,532 UART: [art] Derive Key Pair - Done
6,249,128 UART: [art] Signing Cert with AUTHO
6,249,608 UART: RITY.KEYID = 7
6,264,548 UART: [art] Erasing AUTHORITY.KEYID = 7
6,265,313 UART: [art] PUB.X = F7BA4536BA7D04A1C9D971FF8693494C22425BA4F1F5957387ADBD85FB2C771DE37A2D2CD7EBA4882DC75F72BCB22349
6,272,094 UART: [art] PUB.Y = B5E965EAD30A21F7B51DC6A7F51502DDDFD0283E1E86CB01A74F3E968C4BF3F28E3FE356B43E38789B3CB0987CDA9F07
6,279,050 UART: [art] SIG.R = 42030882D81F590A54B5F3232DE35FA17D313ACDB3FB46CD270FF78D846D0606CBE1E75E61335360BFA838F09FE30B52
6,285,805 UART: [art] SIG.S = 333397A728B69EAB6F47B99571489146F5FA56FE5C6E95E3AD151535C6C389ABDA68FB319CB82F86C1C1ACF667A5F794
6,309,452 UART: Caliptra RT
6,309,705 UART: [state] CFI Enabled
6,588,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,619,703 UART: [rt]cmd =0x41545348, len=116
6,641,474 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,047 UART: [state] LifecycleState = Unprovisioned
86,702 UART: [state] DebugLocked = No
87,368 UART: [state] WD Timer not started. Device not locked for debugging
88,727 UART: [kat] SHA2-256
894,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,502 UART: [kat] ++
898,654 UART: [kat] sha1
902,704 UART: [kat] SHA2-256
904,644 UART: [kat] SHA2-384
907,299 UART: [kat] SHA2-512-ACC
909,200 UART: [kat] ECC-384
919,019 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,320 UART: [cold-reset] ++
1,172,874 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 ready_for_fw is high
1,176,700 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,355 UART: [idev] Erasing UDS.KEYID = 0
1,201,442 UART: [idev] Sha1 KeyId Algorithm
1,209,820 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,700 UART: [ldev] Erasing FE.KEYID = 1
1,244,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,904 UART: [ldev] --
1,283,223 UART: [fwproc] Wait for Commands...
1,283,897 UART: [fwproc] Recv command 0x46574c44
1,284,625 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,024 >>> mbox cmd response: success
2,775,032 UART: [afmc] ++
2,775,200 UART: [afmc] CDI.KEYID = 6
2,775,562 UART: [afmc] SUBJECT.KEYID = 7
2,775,987 UART: [afmc] AUTHORITY.KEYID = 5
2,811,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,791 UART: [afmc] --
2,854,701 UART: [cold-reset] --
2,855,493 UART: [state] Locking Datavault
2,856,616 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,220 UART: [state] Locking ICCM
2,857,698 UART: [exit] Launching FMC @ 0x40000130
2,863,027 UART:
2,863,043 UART: Running Caliptra FMC ...
2,863,451 UART:
2,863,594 UART: [state] CFI Enabled
2,874,249 UART: [fht] FMC Alias Private Key: 7
2,982,182 UART: [art] Extend RT PCRs Done
2,982,610 UART: [art] Lock RT PCRs Done
2,983,928 UART: [art] Populate DV Done
2,992,189 UART: [fht] FMC Alias Private Key: 7
2,993,357 UART: [art] Derive CDI
2,993,637 UART: [art] Store in in slot 0x4
3,079,738 UART: [art] Derive Key Pair
3,080,098 UART: [art] Store priv key in slot 0x5
3,094,000 UART: [art] Derive Key Pair - Done
3,108,820 UART: [art] Signing Cert with AUTHO
3,109,300 UART: RITY.KEYID = 7
3,124,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,161 UART: [art] PUB.X = 322D0CD60DDCD99623AEDD92B2A1566A56071ABC5BA8204C5301B2A88C4DF39237E4161CC6C16AB5CA22AAB62B808B12
3,131,933 UART: [art] PUB.Y = 0F8A5CFEEB9CFD7EA9A5F05C8978722063D9B513F978FD15F2C621E23056C44745BFFDA23F35C01E3B099C3F1C709BAA
3,138,893 UART: [art] SIG.R = 529A1D1FF3DFE721236136BB3790635DCB355664A21AC0DD48AFF282F575DA792335C132597A591C3696F4938889A34F
3,145,659 UART: [art] SIG.S = F5AD18601DF8BE37399A6793F9B9AB33E5D6E2197CA3EE71E31F3802393BB30E10324D24DC036E722614B7A61BCA709D
3,169,523 UART: Caliptra RT
3,169,868 UART: [state] CFI Enabled
3,277,911 UART: [rt] RT listening for mailbox commands...
3,278,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,683 UART: [rt]cmd =0x41544d4e, len=14344
3,711,889 >>> mbox cmd response data (8 bytes)
3,711,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,039 UART: [rt]cmd =0x41545348, len=116
3,763,978 >>> mbox cmd response data (12 bytes)
3,763,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,618 UART:
3,764,634 UART: Running Caliptra ROM ...
3,765,042 UART:
3,765,184 UART: [state] CFI Enabled
3,768,186 UART: [state] LifecycleState = Unprovisioned
3,768,841 UART: [state] DebugLocked = No
3,769,479 UART: [state] WD Timer not started. Device not locked for debugging
3,770,691 UART: [kat] SHA2-256
4,576,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,580,466 UART: [kat] ++
4,580,618 UART: [kat] sha1
4,584,950 UART: [kat] SHA2-256
4,586,890 UART: [kat] SHA2-384
4,589,579 UART: [kat] SHA2-512-ACC
4,591,479 UART: [kat] ECC-384
4,601,130 UART: [kat] HMAC-384Kdf
4,605,596 UART: [kat] LMS
4,853,924 UART: [kat] --
4,855,052 UART: [update-reset] ++
6,164,874 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,165,991 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,315,569 >>> mbox cmd response: success
6,315,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,315,760 UART: [update-reset] Copying MAN_2 To MAN_1
6,323,774 UART: [update-reset Success] --
6,324,669 UART: [state] Locking Datavault
6,325,351 UART: [state] Locking PCR0, PCR1 and PCR31
6,325,955 UART: [state] Locking ICCM
6,326,473 UART: [exit] Launching FMC @ 0x40000130
6,331,802 UART:
6,331,818 UART: Running Caliptra FMC ...
6,332,226 UART:
6,332,369 UART: [state] CFI Enabled
6,421,806 UART: [art] Extend RT PCRs Done
6,422,234 UART: [art] Lock RT PCRs Done
6,423,645 UART: [art] Populate DV Done
6,431,884 UART: [fht] FMC Alias Private Key: 7
6,433,008 UART: [art] Derive CDI
6,433,288 UART: [art] Store in in slot 0x4
6,519,199 UART: [art] Derive Key Pair
6,519,559 UART: [art] Store priv key in slot 0x5
6,532,699 UART: [art] Derive Key Pair - Done
6,547,598 UART: [art] Signing Cert with AUTHO
6,548,078 UART: RITY.KEYID = 7
6,562,940 UART: [art] Erasing AUTHORITY.KEYID = 7
6,563,705 UART: [art] PUB.X = 45C26F5E5030A2F87B21C9CCCEF725C5BAC81541C61EC1B752833E37884BD4154DFFC034F7BD4E4882B5F77ABAEB55D1
6,570,491 UART: [art] PUB.Y = AC755ACAE5E65682BBCE6731D0A2C78C30512B7FA3BE1D4EFEA023CD83A34090D17DBB207C6301B20447AF72BDB793A9
6,577,453 UART: [art] SIG.R = 6510D39CC3FC03EB095F7B79438E9E67A3DED13BA1B967F3CCCCC57ECEAEA3D98A8A3CDBE34FB4D386EC6876D6BE66EF
6,584,249 UART: [art] SIG.S = 9273818461C30DA7456DC286ED71ACC6FAB54254EFA6CD7ECE87CFE9AA098582CE165906200C29075017BF0154737A4B
6,607,840 UART: Caliptra RT
6,608,185 UART: [state] CFI Enabled
6,883,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,914,805 UART: [rt]cmd =0x41545348, len=116
6,936,482 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,068 ready_for_fw is high
1,061,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,759 >>> mbox cmd response: success
2,687,991 UART:
2,688,007 UART: Running Caliptra FMC ...
2,688,415 UART:
2,688,558 UART: [state] CFI Enabled
2,699,123 UART: [fht] FMC Alias Private Key: 7
2,806,300 UART: [art] Extend RT PCRs Done
2,806,728 UART: [art] Lock RT PCRs Done
2,808,448 UART: [art] Populate DV Done
2,816,619 UART: [fht] FMC Alias Private Key: 7
2,817,691 UART: [art] Derive CDI
2,817,971 UART: [art] Store in in slot 0x4
2,903,912 UART: [art] Derive Key Pair
2,904,272 UART: [art] Store priv key in slot 0x5
2,917,956 UART: [art] Derive Key Pair - Done
2,932,850 UART: [art] Signing Cert with AUTHO
2,933,330 UART: RITY.KEYID = 7
2,948,030 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,795 UART: [art] PUB.X = 522EF7BDC670E385C08104C7206125E37AF758406960916D4E9C727EDF7F915899B1C5D2E4E669FA69BFA0FB3B2E05F7
2,955,563 UART: [art] PUB.Y = F18FDBDF04D8214D94E522D9A4CBBB4279D0A42DA912A9D3B7A41426D22A93865EEC607B319000084A95069FED29045D
2,962,485 UART: [art] SIG.R = 379576F05B9BCE12A1E301624B5F23A722C093DCFBCA1B278333379015BFC0D1B2A110E43C9B6988197C6A659CBFCE64
2,969,258 UART: [art] SIG.S = B8648D7CE472CD6B3060ED72B0D17EA8F7034F66D541C3E88276049ED417CF1A50E86E1063735A3DEE60909F81DC4B68
2,993,203 UART: Caliptra RT
2,993,548 UART: [state] CFI Enabled
3,101,499 UART: [rt] RT listening for mailbox commands...
3,102,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,357 UART: [rt]cmd =0x41544d4e, len=14344
3,534,961 >>> mbox cmd response data (8 bytes)
3,534,962 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,077 UART: [rt]cmd =0x41545348, len=116
3,587,190 >>> mbox cmd response data (12 bytes)
3,587,191 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,023,852 >>> mbox cmd response: success
6,023,852 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,036,828 UART:
6,036,844 UART: Running Caliptra FMC ...
6,037,252 UART:
6,037,395 UART: [state] CFI Enabled
6,126,850 UART: [art] Extend RT PCRs Done
6,127,278 UART: [art] Lock RT PCRs Done
6,128,431 UART: [art] Populate DV Done
6,136,772 UART: [fht] FMC Alias Private Key: 7
6,137,904 UART: [art] Derive CDI
6,138,184 UART: [art] Store in in slot 0x4
6,223,881 UART: [art] Derive Key Pair
6,224,241 UART: [art] Store priv key in slot 0x5
6,237,023 UART: [art] Derive Key Pair - Done
6,251,679 UART: [art] Signing Cert with AUTHO
6,252,159 UART: RITY.KEYID = 7
6,267,137 UART: [art] Erasing AUTHORITY.KEYID = 7
6,267,902 UART: [art] PUB.X = C7FF9BB601685471A686E281A0C01CBB457F2D0A1EAEE611AE4076026FB32D99E570BF59B86BB4DC6C5C5FC8A9C57E21
6,274,679 UART: [art] PUB.Y = 254E768E5965BE1703149B2D709564D33DED0204B29C80DB70A1F09C343BE5BC41F2CA6C2B3398943CEF3434B8F656DE
6,281,624 UART: [art] SIG.R = 4621FA2F3043E65FE313CB89DDBBE2D4DF406A65377FE6AB64288B811F8D0188A07F2615C22E0205F0DC19528F648DD3
6,288,391 UART: [art] SIG.S = 06E1499F74EC86256ABA6EA4EB5195AE84818A974F7D765A795220F828A607E0A9C17FF60ECD291A69992B776342AE44
6,312,037 UART: Caliptra RT
6,312,382 UART: [state] CFI Enabled
6,592,475 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,623,446 UART: [rt]cmd =0x41545348, len=116
6,646,237 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
891,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,043 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 ready_for_fw is high
1,174,257 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,491 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,188 UART: [ldev] ++
1,208,356 UART: [ldev] CDI.KEYID = 6
1,208,720 UART: [ldev] SUBJECT.KEYID = 5
1,209,147 UART: [ldev] AUTHORITY.KEYID = 7
1,209,610 UART: [ldev] FE.KEYID = 1
1,215,022 UART: [ldev] Erasing FE.KEYID = 1
1,240,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,742 UART: [ldev] --
1,280,008 UART: [fwproc] Wait for Commands...
1,280,763 UART: [fwproc] Recv command 0x46574c44
1,281,496 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,370 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,153 >>> mbox cmd response: success
2,771,420 UART: [afmc] ++
2,771,588 UART: [afmc] CDI.KEYID = 6
2,771,951 UART: [afmc] SUBJECT.KEYID = 7
2,772,377 UART: [afmc] AUTHORITY.KEYID = 5
2,807,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,083 UART: [afmc] --
2,851,187 UART: [cold-reset] --
2,852,075 UART: [state] Locking Datavault
2,853,208 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,812 UART: [state] Locking ICCM
2,854,426 UART: [exit] Launching FMC @ 0x40000130
2,859,755 UART:
2,859,771 UART: Running Caliptra FMC ...
2,860,179 UART:
2,860,233 UART: [state] CFI Enabled
2,870,870 UART: [fht] FMC Alias Private Key: 7
2,979,217 UART: [art] Extend RT PCRs Done
2,979,645 UART: [art] Lock RT PCRs Done
2,981,187 UART: [art] Populate DV Done
2,989,378 UART: [fht] FMC Alias Private Key: 7
2,990,548 UART: [art] Derive CDI
2,990,828 UART: [art] Store in in slot 0x4
3,076,483 UART: [art] Derive Key Pair
3,076,843 UART: [art] Store priv key in slot 0x5
3,090,135 UART: [art] Derive Key Pair - Done
3,105,001 UART: [art] Signing Cert with AUTHO
3,105,481 UART: RITY.KEYID = 7
3,120,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,498 UART: [art] PUB.X = BEFC87B9292D05AE780214BE9C01ADA400D130D8EAD67794269A7BCF69C697B4D4B05B4032992F321E81DFE51DF2A3AD
3,128,251 UART: [art] PUB.Y = 58E070451C92A9DD36FDB71996C88B96335C81819F0818E285DAA3CEF89B994DE44A65E35455AA30017DF5295604657B
3,135,188 UART: [art] SIG.R = 5AF409DEEC1F1ED2C036C353FBCA6AA2FEAB8DED018C1A839156DD9A63CBE2117A01CED926A909094086E5D709091767
3,141,953 UART: [art] SIG.S = B419E9EEECF0D678AD354B4CF0A3629C3C280B2D8D694F76B33EEC7A3EC3A85C70A87A7338D6DA24F858AB67DDC0D4F6
3,165,847 UART: Caliptra RT
3,166,100 UART: [state] CFI Enabled
3,272,645 UART: [rt] RT listening for mailbox commands...
3,273,315 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,279 UART: [rt]cmd =0x41544d4e, len=14344
3,706,583 >>> mbox cmd response data (8 bytes)
3,706,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,667 UART: [rt]cmd =0x41545348, len=116
3,759,240 >>> mbox cmd response data (12 bytes)
3,759,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,900 UART:
3,759,916 UART: Running Caliptra ROM ...
3,760,324 UART:
3,760,379 UART: [state] CFI Enabled
3,763,039 UART: [state] LifecycleState = Unprovisioned
3,763,694 UART: [state] DebugLocked = No
3,764,338 UART: [state] WD Timer not started. Device not locked for debugging
3,765,478 UART: [kat] SHA2-256
4,569,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,573,157 UART: [kat] ++
4,573,309 UART: [kat] sha1
4,577,379 UART: [kat] SHA2-256
4,579,319 UART: [kat] SHA2-384
4,582,252 UART: [kat] SHA2-512-ACC
4,584,152 UART: [kat] ECC-384
4,594,245 UART: [kat] HMAC-384Kdf
4,598,951 UART: [kat] LMS
4,847,263 UART: [kat] --
4,848,121 UART: [update-reset] ++
6,159,400 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,160,521 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,310,099 >>> mbox cmd response: success
6,310,099 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,310,254 UART: [update-reset] Copying MAN_2 To MAN_1
6,318,268 UART: [update-reset Success] --
6,319,331 UART: [state] Locking Datavault
6,320,015 UART: [state] Locking PCR0, PCR1 and PCR31
6,320,619 UART: [state] Locking ICCM
6,321,133 UART: [exit] Launching FMC @ 0x40000130
6,326,462 UART:
6,326,478 UART: Running Caliptra FMC ...
6,326,886 UART:
6,326,940 UART: [state] CFI Enabled
6,415,673 UART: [art] Extend RT PCRs Done
6,416,101 UART: [art] Lock RT PCRs Done
6,417,634 UART: [art] Populate DV Done
6,425,781 UART: [fht] FMC Alias Private Key: 7
6,426,711 UART: [art] Derive CDI
6,426,991 UART: [art] Store in in slot 0x4
6,512,776 UART: [art] Derive Key Pair
6,513,136 UART: [art] Store priv key in slot 0x5
6,526,088 UART: [art] Derive Key Pair - Done
6,540,687 UART: [art] Signing Cert with AUTHO
6,541,167 UART: RITY.KEYID = 7
6,556,127 UART: [art] Erasing AUTHORITY.KEYID = 7
6,556,892 UART: [art] PUB.X = 816DCB825BF1749F202B983760B6CC9AB44E6E917DA8AFB551CD24C4A818653B131D6DCE6064DA74A3229F1D2EEC1BA1
6,563,676 UART: [art] PUB.Y = 8769105E5889B8BDE641667BE85F4C8E476288FC62197344238E9E7398F5637AAC7AA79CB417F39F573FD24D9ECED5CE
6,570,630 UART: [art] SIG.R = 71CF7ACBBB7E34F6CAF5869137F808210620064E508A7EE3A43279C29F012D64C36B75F761FAAB779A42B90B02ACAAB3
6,577,392 UART: [art] SIG.S = E65F04F7557CC07DD75ED8945F17C042DFA1A9CF8C867E1B9BC24C8913758B5FBFDB9039B5C4003694B7CF427E8A014F
6,601,215 UART: Caliptra RT
6,601,468 UART: [state] CFI Enabled
6,877,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,908,402 UART: [rt]cmd =0x41545348, len=116
6,929,867 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,052 ready_for_fw is high
1,056,052 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,129 >>> mbox cmd response: success
2,680,547 UART:
2,680,563 UART: Running Caliptra FMC ...
2,680,971 UART:
2,681,025 UART: [state] CFI Enabled
2,691,500 UART: [fht] FMC Alias Private Key: 7
2,800,087 UART: [art] Extend RT PCRs Done
2,800,515 UART: [art] Lock RT PCRs Done
2,801,981 UART: [art] Populate DV Done
2,809,854 UART: [fht] FMC Alias Private Key: 7
2,811,000 UART: [art] Derive CDI
2,811,280 UART: [art] Store in in slot 0x4
2,896,955 UART: [art] Derive Key Pair
2,897,315 UART: [art] Store priv key in slot 0x5
2,910,889 UART: [art] Derive Key Pair - Done
2,925,652 UART: [art] Signing Cert with AUTHO
2,926,132 UART: RITY.KEYID = 7
2,941,488 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,253 UART: [art] PUB.X = 5F9F6CE2C99E7A71524EBC7DA779D491F18F176FC845469746670FF424E3795F71E8BD6E5211E3F3566315178E6BD0F1
2,949,020 UART: [art] PUB.Y = 2151675729834EE75AE79C3C42D50A5904577E4F69BADBE2047CA3391E66854CB19D62C945F1247E3172B1220EB21C99
2,955,952 UART: [art] SIG.R = 61F30DA1FCA5D5E181FA33D293E53F65EFDB7836F948A64A016C188DC598254C8A7810326F69342048B330FDC78BFF4D
2,962,722 UART: [art] SIG.S = 66B3182F398778D4431EC2E79EABCDB8D382EF463EDAED5B8BA64391E374DB2AD1893EAEFCD0D5F153070BB9D0DBD333
2,987,109 UART: Caliptra RT
2,987,362 UART: [state] CFI Enabled
3,096,025 UART: [rt] RT listening for mailbox commands...
3,096,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,721 UART: [rt]cmd =0x41544d4e, len=14344
3,529,817 >>> mbox cmd response data (8 bytes)
3,529,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,761 UART: [rt]cmd =0x41545348, len=116
3,581,500 >>> mbox cmd response data (12 bytes)
3,581,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,520 >>> mbox cmd response: success
6,012,520 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,025,708 UART:
6,025,724 UART: Running Caliptra FMC ...
6,026,132 UART:
6,026,186 UART: [state] CFI Enabled
6,114,927 UART: [art] Extend RT PCRs Done
6,115,355 UART: [art] Lock RT PCRs Done
6,116,780 UART: [art] Populate DV Done
6,124,945 UART: [fht] FMC Alias Private Key: 7
6,126,009 UART: [art] Derive CDI
6,126,289 UART: [art] Store in in slot 0x4
6,211,808 UART: [art] Derive Key Pair
6,212,168 UART: [art] Store priv key in slot 0x5
6,225,192 UART: [art] Derive Key Pair - Done
6,239,775 UART: [art] Signing Cert with AUTHO
6,240,255 UART: RITY.KEYID = 7
6,255,005 UART: [art] Erasing AUTHORITY.KEYID = 7
6,255,770 UART: [art] PUB.X = A1E5A6536DB4F91AF0AD0BA4C0071DA752DC1D41986EB797E9B83918827D231F48D271E3BF026A3C89CADC32B8771536
6,262,539 UART: [art] PUB.Y = 1854ADF69D698EA318FD3E660833A1085E395C332BC6D6C54800C40C0748AF64E6A192E4D123DD7D4E3C129414E96105
6,269,450 UART: [art] SIG.R = 32A243CD05996FD0D9D37B8E5E1C82411F42138E28721C6B6F3DBFDF8A49C9E819B38C2C744C9B2A5FAB2F921BE75A36
6,276,229 UART: [art] SIG.S = F90A43E53EEA02C53D165AB1072849E4E01B8A369CABAA95A7F0ADE243F550FB0E6F284EACA6F45D6A7AE50AB316DB92
6,299,809 UART: Caliptra RT
6,300,062 UART: [state] CFI Enabled
6,578,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,609,934 UART: [rt]cmd =0x41545348, len=116
6,632,081 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,433 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,424 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,702 UART: [idev] ++
1,173,870 UART: [idev] CDI.KEYID = 6
1,174,231 UART: [idev] SUBJECT.KEYID = 7
1,174,656 UART: [idev] UDS.KEYID = 0
1,175,002 ready_for_fw is high
1,175,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,756 UART: [idev] Erasing UDS.KEYID = 0
1,200,070 UART: [idev] Sha1 KeyId Algorithm
1,208,806 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,769 UART: [ldev] Erasing FE.KEYID = 1
1,243,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,837 UART: [fwproc] Wait for Commands...
1,283,508 UART: [fwproc] Recv command 0x46574c44
1,284,241 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,876 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,402 >>> mbox cmd response: success
2,773,449 UART: [afmc] ++
2,773,617 UART: [afmc] CDI.KEYID = 6
2,773,980 UART: [afmc] SUBJECT.KEYID = 7
2,774,406 UART: [afmc] AUTHORITY.KEYID = 5
2,809,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,269 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,056 UART: [afmc] --
2,852,974 UART: [cold-reset] --
2,853,554 UART: [state] Locking Datavault
2,854,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,195 UART: [state] Locking ICCM
2,855,643 UART: [exit] Launching FMC @ 0x40000130
2,860,972 UART:
2,860,988 UART: Running Caliptra FMC ...
2,861,396 UART:
2,861,539 UART: [state] CFI Enabled
2,871,936 UART: [fht] FMC Alias Private Key: 7
2,979,713 UART: [art] Extend RT PCRs Done
2,980,141 UART: [art] Lock RT PCRs Done
2,981,509 UART: [art] Populate DV Done
2,989,598 UART: [fht] FMC Alias Private Key: 7
2,990,622 UART: [art] Derive CDI
2,990,902 UART: [art] Store in in slot 0x4
3,077,027 UART: [art] Derive Key Pair
3,077,387 UART: [art] Store priv key in slot 0x5
3,090,913 UART: [art] Derive Key Pair - Done
3,105,371 UART: [art] Signing Cert with AUTHO
3,105,851 UART: RITY.KEYID = 7
3,120,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,310 UART: [art] PUB.X = 93AC46EB352FB235D24DDD9B5BEF3427844D5614BBE55C577B2C0B800268B4EC194621953262A36310782B32FE0CD493
3,128,071 UART: [art] PUB.Y = D3A6EC42D292A2B6F6DF968E12E898A46888415ABC233482A614EB72BD33D185795A848E47B003AF7825A4528F66E738
3,135,016 UART: [art] SIG.R = C739FD6B9EEDDEE88039EB4BA6CF4E8E25AD3C0B8C46C08EA785E1B0CE6C607D0988F2A9860ABBEF74F56A757CC32016
3,141,801 UART: [art] SIG.S = BAB141C785700EBDB18CBD845B9BDFA37C4DA121A3C6B9845DFB33BC2D07228598DF3BDB9B615570709FC9A69E05DFD1
3,166,021 UART: Caliptra RT
3,166,366 UART: [state] CFI Enabled
3,273,452 UART: [rt] RT listening for mailbox commands...
3,274,122 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,120 UART: [rt]cmd =0x41544d4e, len=14344
3,707,286 >>> mbox cmd response data (8 bytes)
3,707,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,364 UART: [rt]cmd =0x41545348, len=116
3,760,023 >>> mbox cmd response data (12 bytes)
3,760,024 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,707 UART:
3,760,723 UART: Running Caliptra ROM ...
3,761,131 UART:
3,761,273 UART: [state] CFI Enabled
3,764,327 UART: [state] LifecycleState = Unprovisioned
3,764,982 UART: [state] DebugLocked = No
3,765,580 UART: [state] WD Timer not started. Device not locked for debugging
3,766,864 UART: [kat] SHA2-256
4,570,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,574,543 UART: [kat] ++
4,574,695 UART: [kat] sha1
4,579,021 UART: [kat] SHA2-256
4,580,961 UART: [kat] SHA2-384
4,583,746 UART: [kat] SHA2-512-ACC
4,585,646 UART: [kat] ECC-384
4,595,053 UART: [kat] HMAC-384Kdf
4,599,491 UART: [kat] LMS
4,847,803 UART: [kat] --
4,848,885 UART: [update-reset] ++
6,158,976 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,160,131 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,309,709 >>> mbox cmd response: success
6,309,709 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,310,060 UART: [update-reset] Copying MAN_2 To MAN_1
6,318,074 UART: [update-reset Success] --
6,319,067 UART: [state] Locking Datavault
6,319,975 UART: [state] Locking PCR0, PCR1 and PCR31
6,320,579 UART: [state] Locking ICCM
6,321,103 UART: [exit] Launching FMC @ 0x40000130
6,326,432 UART:
6,326,448 UART: Running Caliptra FMC ...
6,326,856 UART:
6,326,999 UART: [state] CFI Enabled
6,416,206 UART: [art] Extend RT PCRs Done
6,416,634 UART: [art] Lock RT PCRs Done
6,417,935 UART: [art] Populate DV Done
6,426,178 UART: [fht] FMC Alias Private Key: 7
6,427,302 UART: [art] Derive CDI
6,427,582 UART: [art] Store in in slot 0x4
6,513,023 UART: [art] Derive Key Pair
6,513,383 UART: [art] Store priv key in slot 0x5
6,526,981 UART: [art] Derive Key Pair - Done
6,541,308 UART: [art] Signing Cert with AUTHO
6,541,788 UART: RITY.KEYID = 7
6,557,430 UART: [art] Erasing AUTHORITY.KEYID = 7
6,558,195 UART: [art] PUB.X = B2A5E31DB87FE360CC80B9ED1E79B37D8175C7C028C85D0B37226A945C4BC4DB74CAC73772AA62AC3ED96B494A46847D
6,564,976 UART: [art] PUB.Y = 4476DD93450AB49D25494B45CEA9DA9E78D18F628D678F7AC2D6179661C7044EF9C3A4BEE8E52E80CF362B983FF140F3
6,571,928 UART: [art] SIG.R = FC36E55241EDAD9EEAADCBF60908BFD8ADD4EC188083A164F98A68B03CD3068DC45E225ADDF70871828954F14D4D6F22
6,578,704 UART: [art] SIG.S = 3E37AB73D5A594A37B5AB252D078807347A645F75F86597E13F838C03DCE2C86CE6C2F2F82B35FE4331D00622B88B1C3
6,602,673 UART: Caliptra RT
6,603,018 UART: [state] CFI Enabled
6,883,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,914,586 UART: [rt]cmd =0x41545348, len=116
6,936,631 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,499 ready_for_fw is high
1,055,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,954 >>> mbox cmd response: success
2,681,054 UART:
2,681,070 UART: Running Caliptra FMC ...
2,681,478 UART:
2,681,621 UART: [state] CFI Enabled
2,692,458 UART: [fht] FMC Alias Private Key: 7
2,800,997 UART: [art] Extend RT PCRs Done
2,801,425 UART: [art] Lock RT PCRs Done
2,803,023 UART: [art] Populate DV Done
2,811,358 UART: [fht] FMC Alias Private Key: 7
2,812,322 UART: [art] Derive CDI
2,812,602 UART: [art] Store in in slot 0x4
2,898,485 UART: [art] Derive Key Pair
2,898,845 UART: [art] Store priv key in slot 0x5
2,912,067 UART: [art] Derive Key Pair - Done
2,926,899 UART: [art] Signing Cert with AUTHO
2,927,379 UART: RITY.KEYID = 7
2,942,467 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,232 UART: [art] PUB.X = 13DA90C32991519D87D49288032F2DBCD03263BCD6BBA3F338D2E7D03F28B3B646793159771F246F5E31BC11AF07C946
2,949,996 UART: [art] PUB.Y = 9E0C9E091AE8917355CBE4CBDEC10DDE0F6B0EDCE146A074DC6BA61450148660211302B5646FFFCEC30BFB4B9B804255
2,956,941 UART: [art] SIG.R = DB305A328FC6EB68BFA0006D398FA8B0A728A3A052A8F279536D7F21AAEEE9C91BC5C6D7AAE586054DADA0F421B401F3
2,963,703 UART: [art] SIG.S = 6661DC1DD84E06314946B8F767AC94EEC77A351B518576C15A7D7E6F2147E241ACC506B09318090F29B2F71606695FFD
2,987,971 UART: Caliptra RT
2,988,316 UART: [state] CFI Enabled
3,096,559 UART: [rt] RT listening for mailbox commands...
3,097,229 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,213 UART: [rt]cmd =0x41544d4e, len=14344
3,529,673 >>> mbox cmd response data (8 bytes)
3,529,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,791 UART: [rt]cmd =0x41545348, len=116
3,581,850 >>> mbox cmd response data (12 bytes)
3,581,851 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,014,049 >>> mbox cmd response: success
6,014,049 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,027,413 UART:
6,027,429 UART: Running Caliptra FMC ...
6,027,837 UART:
6,027,980 UART: [state] CFI Enabled
6,116,993 UART: [art] Extend RT PCRs Done
6,117,421 UART: [art] Lock RT PCRs Done
6,118,948 UART: [art] Populate DV Done
6,127,263 UART: [fht] FMC Alias Private Key: 7
6,128,259 UART: [art] Derive CDI
6,128,539 UART: [art] Store in in slot 0x4
6,214,350 UART: [art] Derive Key Pair
6,214,710 UART: [art] Store priv key in slot 0x5
6,228,158 UART: [art] Derive Key Pair - Done
6,243,047 UART: [art] Signing Cert with AUTHO
6,243,527 UART: RITY.KEYID = 7
6,258,595 UART: [art] Erasing AUTHORITY.KEYID = 7
6,259,360 UART: [art] PUB.X = 500F30C62E6481655AB11544BC24F70F33C15EDD8011F1A0FF2ECC024F35A6BF57B11E5C978C7A3FE17EA1EF93F4325A
6,266,133 UART: [art] PUB.Y = E9A628C81C1FB8833D089DA85E2C1026BC114DD13C68A8DB407517B031BD13ECBA6762617272017C1666B8C0245E5ACD
6,273,081 UART: [art] SIG.R = B80D031300DB3DF618BCBE9514CC00316FBF3BAB7408589DD79612D38026887F15356BA56D60AD55B2E66B139D18CA08
6,279,799 UART: [art] SIG.S = ED7D30F05ACC301AD9EA92B103B5B9CC680B106F66A619E3A45C7259513BCDF5F41819F2B7376858076C932DF0E11B77
6,303,757 UART: Caliptra RT
6,304,102 UART: [state] CFI Enabled
6,584,852 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,615,783 UART: [rt]cmd =0x41545348, len=116
6,638,122 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,298 UART:
192,651 UART: Running Caliptra ROM ...
193,837 UART:
193,985 UART: [state] CFI Enabled
265,442 UART: [state] LifecycleState = Unprovisioned
267,423 UART: [state] DebugLocked = No
269,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,221 UART: [kat] SHA2-256
444,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,439 UART: [kat] ++
455,965 UART: [kat] sha1
466,629 UART: [kat] SHA2-256
469,340 UART: [kat] SHA2-384
476,337 UART: [kat] SHA2-512-ACC
478,691 UART: [kat] ECC-384
2,767,221 UART: [kat] HMAC-384Kdf
2,799,776 UART: [kat] LMS
3,990,045 UART: [kat] --
3,994,673 UART: [cold-reset] ++
3,996,779 UART: [fht] Storing FHT @ 0x50003400
4,007,775 UART: [idev] ++
4,008,347 UART: [idev] CDI.KEYID = 6
4,009,378 UART: [idev] SUBJECT.KEYID = 7
4,010,549 UART: [idev] UDS.KEYID = 0
4,011,592 ready_for_fw is high
4,011,806 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,060 UART: [idev] Erasing UDS.KEYID = 0
7,349,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,244 UART: [idev] --
7,376,261 UART: [ldev] ++
7,376,850 UART: [ldev] CDI.KEYID = 6
7,377,781 UART: [ldev] SUBJECT.KEYID = 5
7,378,983 UART: [ldev] AUTHORITY.KEYID = 7
7,380,260 UART: [ldev] FE.KEYID = 1
7,422,630 UART: [ldev] Erasing FE.KEYID = 1
10,755,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,993 UART: [ldev] --
13,138,250 UART: [fwproc] Waiting for Commands...
13,141,412 UART: [fwproc] Received command 0x46574c44
13,143,581 UART: [fwproc] Received Image of size 113844 bytes
17,195,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,258 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,659,537 >>> mbox cmd response: success
17,664,117 UART: [afmc] ++
17,664,759 UART: [afmc] CDI.KEYID = 6
17,665,639 UART: [afmc] SUBJECT.KEYID = 7
17,666,905 UART: [afmc] AUTHORITY.KEYID = 5
21,028,633 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,411 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,809 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,645 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,071 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,103 UART: [afmc] --
23,397,229 UART: [cold-reset] --
23,400,171 UART: [state] Locking Datavault
23,407,521 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,285 UART: [state] Locking ICCM
23,412,056 UART: [exit] Launching FMC @ 0x40000130
23,420,446 UART:
23,420,680 UART: Running Caliptra FMC ...
23,421,701 UART:
23,421,839 UART: [state] CFI Enabled
23,488,569 UART: [fht] FMC Alias Private Key: 7
25,826,415 UART: [art] Extend RT PCRs Done
25,827,632 UART: [art] Lock RT PCRs Done
25,829,010 UART: [art] Populate DV Done
25,834,278 UART: [fht] FMC Alias Private Key: 7
25,835,853 UART: [art] Derive CDI
25,836,586 UART: [art] Store in in slot 0x4
25,896,478 UART: [art] Derive Key Pair
25,897,471 UART: [art] Store priv key in slot 0x5
29,190,971 UART: [art] Derive Key Pair - Done
29,204,111 UART: [art] Signing Cert with AUTHO
29,205,412 UART: RITY.KEYID = 7
31,492,269 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,776 UART: [art] PUB.X = 4A5097049B4810FB95F8F80FEB6B885902CEF0DE480F774D1947C543CA4D676701A9D8C2D5DFEC74542939317B639C5D
31,500,985 UART: [art] PUB.Y = E4F322A6948746940EE528978F1EA4181D3F7530940CC818EE005E1CDB696CC9A0F294CA22F81B8679A48B9AB8EE6A45
31,508,231 UART: [art] SIG.R = 17C456B00D5CF209841D17C12774BA0E4F646D852DB39206E1CE475DB63F157E85BA550EFF19D2B51258C17801329477
31,515,638 UART: [art] SIG.S = 038B053B272CB111AEA069B02250929DBEF6B5A920D36B45EFCF0B46FB50D5C582EEAFF88518A0D5BDC1CE990D9050A2
32,820,814 UART: Caliptra RT
32,821,531 UART: [state] CFI Enabled
32,984,875 UART: [rt] RT listening for mailbox commands...
32,987,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,142,602 UART: [rt]cmd =0x41544d4e, len=14344
38,443,481 >>> mbox cmd response data (8 bytes)
38,444,074 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,474,650 UART: [rt]cmd =0x41545348, len=116
38,476,941 >>> mbox cmd response data (12 bytes)
40,534,707 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,679,468 UART:
40,679,848 UART: Running Caliptra ROM ...
40,680,892 UART:
40,681,048 UART: [state] CFI Enabled
40,745,983 UART: [state] LifecycleState = Unprovisioned
40,747,921 UART: [state] DebugLocked = No
40,750,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,754,758 UART: [kat] SHA2-256
40,924,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,935,006 UART: [kat] ++
40,935,566 UART: [kat] sha1
40,948,131 UART: [kat] SHA2-256
40,950,822 UART: [kat] SHA2-384
40,956,864 UART: [kat] SHA2-512-ACC
40,959,251 UART: [kat] ECC-384
43,248,152 UART: [kat] HMAC-384Kdf
43,278,870 UART: [kat] LMS
44,469,178 UART: [kat] --
44,474,576 UART: [update-reset] ++
48,621,979 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,625,212 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
49,006,501 >>> mbox cmd response: success
49,011,276 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,011,876 UART: [update-reset] Copying MAN_2 To MAN_1
49,030,595 UART: [update-reset Success] --
49,036,567 UART: [state] Locking Datavault
49,039,217 UART: [state] Locking PCR0, PCR1 and PCR31
49,040,977 UART: [state] Locking ICCM
49,042,854 UART: [exit] Launching FMC @ 0x40000130
49,051,307 UART:
49,051,540 UART: Running Caliptra FMC ...
49,052,639 UART:
49,052,791 UART: [state] CFI Enabled
49,155,327 UART: [art] Extend RT PCRs Done
49,156,515 UART: [art] Lock RT PCRs Done
49,158,070 UART: [art] Populate DV Done
49,163,644 UART: [fht] FMC Alias Private Key: 7
49,165,171 UART: [art] Derive CDI
49,165,996 UART: [art] Store in in slot 0x4
49,224,439 UART: [art] Derive Key Pair
49,225,477 UART: [art] Store priv key in slot 0x5
52,518,386 UART: [art] Derive Key Pair - Done
52,531,390 UART: [art] Signing Cert with AUTHO
52,532,691 UART: RITY.KEYID = 7
54,820,707 UART: [art] Erasing AUTHORITY.KEYID = 7
54,822,228 UART: [art] PUB.X = 89FEE008A2204387FB0B8FD6DF12F6263F7408E84DC3CB1727EBAA26404011028D295AF3EC36D3B28064E8C8A31AC105
54,829,485 UART: [art] PUB.Y = 0CD121DA91BBF3C50CF28632FFB3E4A32A3E073546D29CD1B24C70DE0D8B034D750637CDBD0183C337FDEB18BF4544AF
54,836,746 UART: [art] SIG.R = CC896B884F547AECBC3666356FBECEF820D973C5674E3069E0EB28CC288B2BFFBC53B4B7AB71BE7A9755ABEAB59773E2
54,844,135 UART: [art] SIG.S = EEE07869D1F54A7A3E9B1AD78D65F7DBC60C7F387E6112EAA409B20A9EC648E9AA541F5E19EEC7E0B0A88A5536D464D2
56,149,239 UART: Caliptra RT
56,149,951 UART: [state] CFI Enabled
56,482,800 UART: [rt] RT listening for mailbox commands...
56,514,432 UART: [rt]cmd =0x41545348, len=116
56,516,835 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,785,139 ready_for_fw is high
3,785,726 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,854,766 >>> mbox cmd response: success
23,545,038 UART:
23,545,468 UART: Running Caliptra FMC ...
23,546,574 UART:
23,546,727 UART: [state] CFI Enabled
23,598,179 UART: [fht] FMC Alias Private Key: 7
25,935,983 UART: [art] Extend RT PCRs Done
25,937,213 UART: [art] Lock RT PCRs Done
25,938,732 UART: [art] Populate DV Done
25,944,189 UART: [fht] FMC Alias Private Key: 7
25,945,838 UART: [art] Derive CDI
25,946,646 UART: [art] Store in in slot 0x4
26,006,454 UART: [art] Derive Key Pair
26,007,494 UART: [art] Store priv key in slot 0x5
29,300,705 UART: [art] Derive Key Pair - Done
29,313,586 UART: [art] Signing Cert with AUTHO
29,314,911 UART: RITY.KEYID = 7
31,601,486 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,007 UART: [art] PUB.X = 2BA70B76E52463E97C3E7BF7B0615910E35226DEEF1BE7E1954E2D98A78ABFF69EF31F41F606D278F4209A8D58DDF787
31,610,277 UART: [art] PUB.Y = E6DFA78BDD4A7EB9197FC380F01C3FF4A7A10797FEC1E6C268B5EAED710F715213E34CA3F876146851546AC3B7BD3B19
31,617,539 UART: [art] SIG.R = 4B15C66E20B9A504BDB1AEA7CD149E81E22301A505E2D48D3D25EE00685B1C4419AA3C544C34F81DB2592DA2F163E801
31,624,889 UART: [art] SIG.S = 232862CF342A81C87E6CBD4F19A130607FA99733CAB343E3BB0DA9526A773072B06D7FB0A2CE0B57F3A6E83BFB717F68
32,930,078 UART: Caliptra RT
32,930,790 UART: [state] CFI Enabled
33,089,700 UART: [rt] RT listening for mailbox commands...
33,092,092 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,247,217 UART: [rt]cmd =0x41544d4e, len=14344
38,547,747 >>> mbox cmd response data (8 bytes)
38,548,327 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,579,385 UART: [rt]cmd =0x41545348, len=116
38,581,853 >>> mbox cmd response data (12 bytes)
40,638,329 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,354,774 >>> mbox cmd response: success
49,355,367 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,388,247 UART:
49,388,584 UART: Running Caliptra FMC ...
49,389,705 UART:
49,389,858 UART: [state] CFI Enabled
49,485,242 UART: [art] Extend RT PCRs Done
49,486,429 UART: [art] Lock RT PCRs Done
49,487,691 UART: [art] Populate DV Done
49,493,040 UART: [fht] FMC Alias Private Key: 7
49,494,584 UART: [art] Derive CDI
49,495,398 UART: [art] Store in in slot 0x4
49,553,868 UART: [art] Derive Key Pair
49,554,918 UART: [art] Store priv key in slot 0x5
52,847,310 UART: [art] Derive Key Pair - Done
52,860,152 UART: [art] Signing Cert with AUTHO
52,861,451 UART: RITY.KEYID = 7
55,149,320 UART: [art] Erasing AUTHORITY.KEYID = 7
55,150,828 UART: [art] PUB.X = D6A472636888E6E227EA5EFB0BE5E51F8813DD64A5F7A663DFF0BFF4A974FF577DADAD3E2C2D70521A31183ED2886B23
55,158,086 UART: [art] PUB.Y = EC1E2EC3AE68C24F39491167F58B4B97239EBD0FBD292C3D93BD6576FA95E4833F04AD851289D7C6E8CE35ECCE112897
55,165,330 UART: [art] SIG.R = DCDD981789A87247668AFBE2D3216F9DFF9949492A0BF26B4B2E5E620ACC7E3192B5791E04BC02997001CA9B4634DD64
55,172,711 UART: [art] SIG.S = 30E8594C086EE41F6B05F0724DB0C7B51BE42DD2745F3E94D54E387F7F10848BEC32399BEA5B9BC0DAE4858D14AE12F3
56,477,670 UART: Caliptra RT
56,478,372 UART: [state] CFI Enabled
56,812,960 UART: [rt] RT listening for mailbox commands...
56,845,069 UART: [rt]cmd =0x41545348, len=116
56,847,305 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,363 writing to cptra_bootfsm_go
192,445 UART:
192,823 UART: Running Caliptra ROM ...
193,958 UART:
603,679 UART: [state] CFI Enabled
619,661 UART: [state] LifecycleState = Unprovisioned
621,634 UART: [state] DebugLocked = No
623,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,372 UART: [kat] SHA2-256
798,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,628 UART: [kat] ++
809,154 UART: [kat] sha1
821,231 UART: [kat] SHA2-256
823,954 UART: [kat] SHA2-384
830,012 UART: [kat] SHA2-512-ACC
832,313 UART: [kat] ECC-384
3,116,176 UART: [kat] HMAC-384Kdf
3,127,487 UART: [kat] LMS
4,317,638 UART: [kat] --
4,321,305 UART: [cold-reset] ++
4,323,238 UART: [fht] Storing FHT @ 0x50003400
4,334,579 UART: [idev] ++
4,335,141 UART: [idev] CDI.KEYID = 6
4,336,028 UART: [idev] SUBJECT.KEYID = 7
4,337,275 UART: [idev] UDS.KEYID = 0
4,338,473 ready_for_fw is high
4,338,690 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,726 UART: [idev] Erasing UDS.KEYID = 0
7,624,091 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,624 UART: [idev] --
7,650,211 UART: [ldev] ++
7,650,785 UART: [ldev] CDI.KEYID = 6
7,651,753 UART: [ldev] SUBJECT.KEYID = 5
7,652,912 UART: [ldev] AUTHORITY.KEYID = 7
7,654,215 UART: [ldev] FE.KEYID = 1
7,663,740 UART: [ldev] Erasing FE.KEYID = 1
10,954,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,845 UART: [ldev] --
13,316,997 UART: [fwproc] Waiting for Commands...
13,320,274 UART: [fwproc] Received command 0x46574c44
13,322,464 UART: [fwproc] Received Image of size 113844 bytes
17,361,171 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,802 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,821,855 >>> mbox cmd response: success
17,825,488 UART: [afmc] ++
17,826,112 UART: [afmc] CDI.KEYID = 6
17,827,027 UART: [afmc] SUBJECT.KEYID = 7
17,828,246 UART: [afmc] AUTHORITY.KEYID = 5
21,137,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,428,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,430,876 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,445,235 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,460,060 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,474,547 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,495,222 UART: [afmc] --
23,498,286 UART: [cold-reset] --
23,502,349 UART: [state] Locking Datavault
23,506,791 UART: [state] Locking PCR0, PCR1 and PCR31
23,508,489 UART: [state] Locking ICCM
23,510,557 UART: [exit] Launching FMC @ 0x40000130
23,518,949 UART:
23,519,200 UART: Running Caliptra FMC ...
23,520,225 UART:
23,520,373 UART: [state] CFI Enabled
23,528,666 UART: [fht] FMC Alias Private Key: 7
25,859,813 UART: [art] Extend RT PCRs Done
25,861,042 UART: [art] Lock RT PCRs Done
25,862,860 UART: [art] Populate DV Done
25,868,266 UART: [fht] FMC Alias Private Key: 7
25,869,799 UART: [art] Derive CDI
25,870,531 UART: [art] Store in in slot 0x4
25,912,959 UART: [art] Derive Key Pair
25,913,997 UART: [art] Store priv key in slot 0x5
29,156,847 UART: [art] Derive Key Pair - Done
29,169,678 UART: [art] Signing Cert with AUTHO
29,170,972 UART: RITY.KEYID = 7
31,450,384 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,909 UART: [art] PUB.X = 95BDA3B5D52F535C6DF38D8F9B74E04C67A20B79C906CFB7DABCBEDFC58087798A120737BA6DA43F0B9FE78598BA1F11
31,459,182 UART: [art] PUB.Y = 4BE2DD0DC58175CA6B01F78EFC6D3C9917DEF5F7638B51FDD83C244505CB512249F7A4324A93FB2543AB4DF594AD7446
31,466,433 UART: [art] SIG.R = E812E186F90B639CB291E652F98498346F27A1B68CC9308E9174544334FAD5954453EC5776BD5AA5BC4B0725A9ED7662
31,473,784 UART: [art] SIG.S = AA1E40CFE0892FFB130A3CBE673AF6698B18FD2871742EB07744259B7788C308FC7FDD2318FDAF3B5580B52B239B2A56
32,779,195 UART: Caliptra RT
32,779,916 UART: [state] CFI Enabled
32,897,893 UART: [rt] RT listening for mailbox commands...
32,900,327 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,055,825 UART: [rt]cmd =0x41544d4e, len=14344
38,356,152 >>> mbox cmd response data (8 bytes)
38,356,775 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,387,626 UART: [rt]cmd =0x41545348, len=116
38,390,019 >>> mbox cmd response data (12 bytes)
40,521,725 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,666,637 UART:
40,667,028 UART: Running Caliptra ROM ...
40,668,085 UART:
40,668,297 UART: [state] CFI Enabled
40,683,011 UART: [state] LifecycleState = Unprovisioned
40,684,908 UART: [state] DebugLocked = No
40,687,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,692,360 UART: [kat] SHA2-256
40,862,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,872,587 UART: [kat] ++
40,873,050 UART: [kat] sha1
40,883,240 UART: [kat] SHA2-256
40,885,943 UART: [kat] SHA2-384
40,891,416 UART: [kat] SHA2-512-ACC
40,893,767 UART: [kat] ECC-384
43,178,558 UART: [kat] HMAC-384Kdf
43,190,954 UART: [kat] LMS
44,381,004 UART: [kat] --
44,385,641 UART: [update-reset] ++
48,526,067 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,530,236 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
48,911,514 >>> mbox cmd response: success
48,916,128 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,916,722 UART: [update-reset] Copying MAN_2 To MAN_1
48,935,286 UART: [update-reset Success] --
48,941,924 UART: [state] Locking Datavault
48,945,927 UART: [state] Locking PCR0, PCR1 and PCR31
48,947,638 UART: [state] Locking ICCM
48,948,985 UART: [exit] Launching FMC @ 0x40000130
48,957,439 UART:
48,957,682 UART: Running Caliptra FMC ...
48,958,785 UART:
48,958,943 UART: [state] CFI Enabled
49,003,389 UART: [art] Extend RT PCRs Done
49,004,543 UART: [art] Lock RT PCRs Done
49,006,105 UART: [art] Populate DV Done
49,011,434 UART: [fht] FMC Alias Private Key: 7
49,013,026 UART: [art] Derive CDI
49,013,846 UART: [art] Store in in slot 0x4
49,056,100 UART: [art] Derive Key Pair
49,057,152 UART: [art] Store priv key in slot 0x5
52,299,452 UART: [art] Derive Key Pair - Done
52,312,506 UART: [art] Signing Cert with AUTHO
52,313,815 UART: RITY.KEYID = 7
54,593,374 UART: [art] Erasing AUTHORITY.KEYID = 7
54,594,880 UART: [art] PUB.X = D2456C62CF94F90765A6B0A36C79996EF14CAB9D567868D6667E1B65AB53AF10F9520D90C997742A21858762E2336D36
54,602,082 UART: [art] PUB.Y = 56B81D4EB4FAEFC44FFD01F64AC4F53C36F11B44C5EAC08A7A9F4CEB7125077D7F802984628354402242AD72E14FD272
54,609,377 UART: [art] SIG.R = E184914887C6422968220E8450C163B93E98DF6FD8ECE61A3966A78AF597D6B17BD0B07854725052398346B2A29D9747
54,616,729 UART: [art] SIG.S = A2E33C042C4F395BD1C8EF417062C1A69E47FCCAAC04E419C3B2E23B67E1FDB0BF1B5F8BF2A9142EE0AD38076FEC707C
55,921,481 UART: Caliptra RT
55,922,195 UART: [state] CFI Enabled
56,209,218 UART: [rt] RT listening for mailbox commands...
56,240,946 UART: [rt]cmd =0x41545348, len=116
56,243,121 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
4,127,067 ready_for_fw is high
4,127,476 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,056,280 >>> mbox cmd response: success
23,690,288 UART:
23,690,675 UART: Running Caliptra FMC ...
23,691,870 UART:
23,692,037 UART: [state] CFI Enabled
23,700,084 UART: [fht] FMC Alias Private Key: 7
26,030,713 UART: [art] Extend RT PCRs Done
26,031,966 UART: [art] Lock RT PCRs Done
26,033,356 UART: [art] Populate DV Done
26,038,895 UART: [fht] FMC Alias Private Key: 7
26,040,603 UART: [art] Derive CDI
26,041,426 UART: [art] Store in in slot 0x4
26,083,953 UART: [art] Derive Key Pair
26,085,003 UART: [art] Store priv key in slot 0x5
29,326,867 UART: [art] Derive Key Pair - Done
29,339,656 UART: [art] Signing Cert with AUTHO
29,340,968 UART: RITY.KEYID = 7
31,620,462 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,967 UART: [art] PUB.X = 287C52A049CDAF330D08335205A3DBADA4B2FA08FAC6F0EF26D11CFC0E90BDE149A68A5BC7B219F583D695008E25EDD7
31,629,235 UART: [art] PUB.Y = 1A8F8E24E128FA496A4F4DDCFD5FFBE30A0569C06563721AF55D3D1E5AAB5486732989F6BE2DE27167F84B8D55B63C19
31,636,450 UART: [art] SIG.R = F63C394D2DCF33A2302946E9FC56CAB22AE661E506601B840A2F7B8083CB251FF2B521F8A7CA2B1F69DAAD4CC1DBEB09
31,643,860 UART: [art] SIG.S = 7F5D961B69A58BCF7962A4CE5CB14CE835A7A1315DEDC636733F0E37A0A3D8D233A5F0F71817724327E1933DBE9547C5
32,948,731 UART: Caliptra RT
32,949,421 UART: [state] CFI Enabled
33,066,225 UART: [rt] RT listening for mailbox commands...
33,068,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,224,117 UART: [rt]cmd =0x41544d4e, len=14344
38,524,548 >>> mbox cmd response data (8 bytes)
38,525,148 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,555,894 UART: [rt]cmd =0x41545348, len=116
38,558,017 >>> mbox cmd response data (12 bytes)
40,687,469 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,331,726 >>> mbox cmd response: success
49,332,365 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,368,120 UART:
49,368,444 UART: Running Caliptra FMC ...
49,369,487 UART:
49,369,639 UART: [state] CFI Enabled
49,413,664 UART: [art] Extend RT PCRs Done
49,414,839 UART: [art] Lock RT PCRs Done
49,416,215 UART: [art] Populate DV Done
49,421,734 UART: [fht] FMC Alias Private Key: 7
49,423,323 UART: [art] Derive CDI
49,424,067 UART: [art] Store in in slot 0x4
49,466,993 UART: [art] Derive Key Pair
49,468,035 UART: [art] Store priv key in slot 0x5
52,709,298 UART: [art] Derive Key Pair - Done
52,721,861 UART: [art] Signing Cert with AUTHO
52,723,195 UART: RITY.KEYID = 7
55,002,772 UART: [art] Erasing AUTHORITY.KEYID = 7
55,004,289 UART: [art] PUB.X = 0F3845140AD13EFB041773AF34EE9B67E3AEB34E47F35F60D00074C8BCBCD179DC03635B79040AFC45BC36547C0FD659
55,011,553 UART: [art] PUB.Y = 8A7CEE830B0A770A75F1314CF66937F04F10C5DCAE6043BCA32420B5EFA970995DEAA64D4C94006E12B6A9903EC36E40
55,018,793 UART: [art] SIG.R = 8D20203975F8C52B0E0F3A55C853E5A43AD956FF2C546258B1DB38167434F74C6D8829A8FBD989AC566680B127EC91CD
55,026,134 UART: [art] SIG.S = 9B125D554436A516B8F7004E4DC1973B5F196D4E824C1D924E40459D0A5CC1EDFA2429DCF3B61671B76F5737310C204C
56,331,149 UART: Caliptra RT
56,331,867 UART: [state] CFI Enabled
56,617,584 UART: [rt] RT listening for mailbox commands...
56,649,550 UART: [rt]cmd =0x41545348, len=116
56,651,939 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,188 UART:
192,555 UART: Running Caliptra ROM ...
193,715 UART:
193,864 UART: [state] CFI Enabled
262,410 UART: [state] LifecycleState = Unprovisioned
264,263 UART: [state] DebugLocked = No
266,655 UART: [state] WD Timer not started. Device not locked for debugging
270,256 UART: [kat] SHA2-256
449,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,988 UART: [kat] ++
461,522 UART: [kat] sha1
471,054 UART: [kat] SHA2-256
474,066 UART: [kat] SHA2-384
480,558 UART: [kat] SHA2-512-ACC
483,522 UART: [kat] ECC-384
2,947,797 UART: [kat] HMAC-384Kdf
2,970,338 UART: [kat] LMS
3,499,796 UART: [kat] --
3,503,322 UART: [cold-reset] ++
3,505,832 UART: [fht] FHT @ 0x50003400
3,516,670 UART: [idev] ++
3,517,233 UART: [idev] CDI.KEYID = 6
3,518,115 UART: [idev] SUBJECT.KEYID = 7
3,519,360 UART: [idev] UDS.KEYID = 0
3,520,263 ready_for_fw is high
3,520,452 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,161 UART: [idev] Erasing UDS.KEYID = 0
6,023,783 UART: [idev] Sha1 KeyId Algorithm
6,046,832 UART: [idev] --
6,051,631 UART: [ldev] ++
6,052,236 UART: [ldev] CDI.KEYID = 6
6,053,150 UART: [ldev] SUBJECT.KEYID = 5
6,054,256 UART: [ldev] AUTHORITY.KEYID = 7
6,055,555 UART: [ldev] FE.KEYID = 1
6,100,013 UART: [ldev] Erasing FE.KEYID = 1
8,602,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,432 UART: [ldev] --
10,412,942 UART: [fwproc] Wait for Commands...
10,415,418 UART: [fwproc] Recv command 0x46574c44
10,417,515 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,284,275 >>> mbox cmd response: success
14,288,498 UART: [afmc] ++
14,289,127 UART: [afmc] CDI.KEYID = 6
14,290,045 UART: [afmc] SUBJECT.KEYID = 7
14,291,213 UART: [afmc] AUTHORITY.KEYID = 5
16,830,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,571,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,573,427 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,589,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,605,264 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,621,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,643,803 UART: [afmc] --
18,646,649 UART: [cold-reset] --
18,650,891 UART: [state] Locking Datavault
18,657,654 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,323 UART: [state] Locking ICCM
18,660,504 UART: [exit] Launching FMC @ 0x40000130
18,668,909 UART:
18,669,144 UART: Running Caliptra FMC ...
18,670,247 UART:
18,670,416 UART: [state] CFI Enabled
18,729,750 UART: [fht] FMC Alias Private Key: 7
20,494,342 UART: [art] Extend RT PCRs Done
20,495,558 UART: [art] Lock RT PCRs Done
20,497,078 UART: [art] Populate DV Done
20,502,494 UART: [fht] FMC Alias Private Key: 7
20,504,144 UART: [art] Derive CDI
20,504,885 UART: [art] Store in in slot 0x4
20,561,976 UART: [art] Derive Key Pair
20,563,020 UART: [art] Store priv key in slot 0x5
23,025,455 UART: [art] Derive Key Pair - Done
23,038,307 UART: [art] Signing Cert with AUTHO
23,039,610 UART: RITY.KEYID = 7
24,750,838 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,346 UART: [art] PUB.X = B291DE545909CCC42AEEF724D53F0C423AD075A3A09B8B2B0A487415B3AA40F46C3DF6C22873F1F9617BC1D39DF71B16
24,759,661 UART: [art] PUB.Y = 80DD094D5571FF7646AEBC2F67EB4B941591C071762E208B45FD2CCB3F49E72AFACC3AAD0BC6965B35DB7A5C5F766EDC
24,766,936 UART: [art] SIG.R = F8AB40E90BF2773F18D95A88F166237FCCAE17340C1F56C6FA50B7158B464A86FBCA19EAC64EB96820A9FF1B49783DA0
24,774,359 UART: [art] SIG.S = CDF067A4B9088E91A5858D870B97F0E471D4F7E75BE9787B687E176F5B086396483D7AD5FA5B14CA83FA739862575520
25,752,763 UART: Caliptra RT
25,753,455 UART: [state] CFI Enabled
25,917,268 UART: [rt] RT listening for mailbox commands...
25,919,678 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,075,248 UART: [rt]cmd =0x41544d4e, len=14344
30,071,233 >>> mbox cmd response data (8 bytes)
30,071,836 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,102,633 UART: [rt]cmd =0x41545348, len=116
30,104,841 >>> mbox cmd response data (12 bytes)
32,158,803 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,304,076 UART:
32,304,463 UART: Running Caliptra ROM ...
32,305,541 UART:
32,305,707 UART: [state] CFI Enabled
32,381,467 UART: [state] LifecycleState = Unprovisioned
32,383,352 UART: [state] DebugLocked = No
32,385,663 UART: [state] WD Timer not started. Device not locked for debugging
32,389,039 UART: [kat] SHA2-256
32,568,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,579,741 UART: [kat] ++
32,580,205 UART: [kat] sha1
32,592,897 UART: [kat] SHA2-256
32,595,924 UART: [kat] SHA2-384
32,601,372 UART: [kat] SHA2-512-ACC
32,604,319 UART: [kat] ECC-384
35,066,013 UART: [kat] HMAC-384Kdf
35,088,089 UART: [kat] LMS
35,617,562 UART: [kat] --
35,621,662 UART: [update-reset] ++
39,051,230 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,055,434 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,437,782 >>> mbox cmd response: success
39,438,237 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,438,675 UART: [update-reset] Copying MAN_2 To MAN_1
39,460,520 UART: [update-reset Success] --
39,463,674 UART: [state] Locking Datavault
39,466,707 UART: [state] Locking PCR0, PCR1 and PCR31
39,468,374 UART: [state] Locking ICCM
39,469,744 UART: [exit] Launching FMC @ 0x40000130
39,478,201 UART:
39,478,437 UART: Running Caliptra FMC ...
39,479,466 UART:
39,479,614 UART: [state] CFI Enabled
39,577,490 UART: [art] Extend RT PCRs Done
39,578,684 UART: [art] Lock RT PCRs Done
39,580,018 UART: [art] Populate DV Done
39,585,598 UART: [fht] FMC Alias Private Key: 7
39,587,294 UART: [art] Derive CDI
39,588,035 UART: [art] Store in in slot 0x4
39,646,572 UART: [art] Derive Key Pair
39,647,661 UART: [art] Store priv key in slot 0x5
42,110,107 UART: [art] Derive Key Pair - Done
42,122,997 UART: [art] Signing Cert with AUTHO
42,124,318 UART: RITY.KEYID = 7
43,835,797 UART: [art] Erasing AUTHORITY.KEYID = 7
43,837,315 UART: [art] PUB.X = 8A559C25F3F52A1CA87779A1A61EBD4BDAAB2B28D67477F513E7919CE8DC129466033C57AC0467C584978C3E2FD5D10C
43,844,545 UART: [art] PUB.Y = 448E2FE6B586393DEABE0EA433ADCCDA014F34D1D2860C73EFA023E7591C05BF28BCFDD3FD208466814ADBF24EAE62AF
43,851,865 UART: [art] SIG.R = B9DAE4A4E5BC41D6D3F0CC714E46743F7DBE8B9F80D1BC39ABD19ABD938382044FC479DEA389EF2AB1EDC67B2B2DCA61
43,859,293 UART: [art] SIG.S = B09E48FAD07408CB0A68DC5738B70A4F87390EC0A8599F63E627EEDD425C529B731440F6D829393C7CD3749A860F9831
44,838,157 UART: Caliptra RT
44,838,851 UART: [state] CFI Enabled
45,176,260 UART: [rt] RT listening for mailbox commands...
45,208,236 UART: [rt]cmd =0x41545348, len=116
45,210,808 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,383,691 ready_for_fw is high
3,384,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,046,948 >>> mbox cmd response: success
18,340,105 UART:
18,340,499 UART: Running Caliptra FMC ...
18,341,698 UART:
18,341,864 UART: [state] CFI Enabled
18,410,355 UART: [fht] FMC Alias Private Key: 7
20,174,099 UART: [art] Extend RT PCRs Done
20,175,339 UART: [art] Lock RT PCRs Done
20,176,862 UART: [art] Populate DV Done
20,182,077 UART: [fht] FMC Alias Private Key: 7
20,183,768 UART: [art] Derive CDI
20,184,595 UART: [art] Store in in slot 0x4
20,243,697 UART: [art] Derive Key Pair
20,244,699 UART: [art] Store priv key in slot 0x5
22,707,965 UART: [art] Derive Key Pair - Done
22,720,860 UART: [art] Signing Cert with AUTHO
22,722,160 UART: RITY.KEYID = 7
24,434,117 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,624 UART: [art] PUB.X = 88395EB914E8FE3EAD512048028E4F50126DF480A6E654024EF40EECD3D190109A37FD8A0D437F33C12236921FFE1AC5
24,442,917 UART: [art] PUB.Y = F358C38B5C123C57423902458AAC4A317BFD42C6CAB87E1BD5306089A567D97AA442C587C9D90224817B1917EB696857
24,450,173 UART: [art] SIG.R = FA2AFE4AB62B24139815623F46270937D9320C0D58327959835630B14462867900C678D6116358B5935F95855AFBA135
24,457,501 UART: [art] SIG.S = 156D57F4F47A0156B4828C4DDE0085F155D80A57A9D32C853C9814C7FEC7A1E4142CCA80AAA427D9DB0C9AEA54060772
25,436,396 UART: Caliptra RT
25,437,104 UART: [state] CFI Enabled
25,601,520 UART: [rt] RT listening for mailbox commands...
25,603,924 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,759,633 UART: [rt]cmd =0x41544d4e, len=14344
29,754,666 >>> mbox cmd response data (8 bytes)
29,755,243 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,785,665 UART: [rt]cmd =0x41545348, len=116
29,788,171 >>> mbox cmd response data (12 bytes)
31,851,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,987,886 >>> mbox cmd response: success
38,988,480 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,024,640 UART:
39,024,945 UART: Running Caliptra FMC ...
39,025,982 UART:
39,026,155 UART: [state] CFI Enabled
39,113,711 UART: [art] Extend RT PCRs Done
39,114,909 UART: [art] Lock RT PCRs Done
39,116,342 UART: [art] Populate DV Done
39,121,809 UART: [fht] FMC Alias Private Key: 7
39,123,290 UART: [art] Derive CDI
39,124,023 UART: [art] Store in in slot 0x4
39,182,832 UART: [art] Derive Key Pair
39,183,869 UART: [art] Store priv key in slot 0x5
41,646,743 UART: [art] Derive Key Pair - Done
41,659,746 UART: [art] Signing Cert with AUTHO
41,661,041 UART: RITY.KEYID = 7
43,372,864 UART: [art] Erasing AUTHORITY.KEYID = 7
43,374,376 UART: [art] PUB.X = 886DCC7D770F7C5480DC0E13E27C5A4B2C5B56C807B90F6F7C2ABFF8A7484570BF2D84E9D0E2D739A11CEBF164B21F05
43,381,664 UART: [art] PUB.Y = 0B40F0A7A385095A9295A5B9198C456449FA525CEB671EE3EC14FB93D61E6E3A2091C6E926F025FAD2368628589896FC
43,388,902 UART: [art] SIG.R = 5F72154C1A19CBF2AB43CD9FEEA25C70DBBDE21853BE5D6876ED379C1942ADE2732715645584FCA372183BE57A3BAB03
43,396,319 UART: [art] SIG.S = F874E00AF50C833212C8B02D0AE347539EE3E882C074C1B277DB87B7BB12AF647408F5E4633868EC1CD48E933078F83B
44,374,832 UART: Caliptra RT
44,375,535 UART: [state] CFI Enabled
44,716,077 UART: [rt] RT listening for mailbox commands...
44,748,023 UART: [rt]cmd =0x41545348, len=116
44,750,296 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,854 writing to cptra_bootfsm_go
193,006 UART:
193,373 UART: Running Caliptra ROM ...
194,485 UART:
604,277 UART: [state] CFI Enabled
618,158 UART: [state] LifecycleState = Unprovisioned
620,029 UART: [state] DebugLocked = No
622,293 UART: [state] WD Timer not started. Device not locked for debugging
625,361 UART: [kat] SHA2-256
804,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,038 UART: [kat] ++
816,488 UART: [kat] sha1
827,359 UART: [kat] SHA2-256
830,437 UART: [kat] SHA2-384
837,706 UART: [kat] SHA2-512-ACC
840,710 UART: [kat] ECC-384
3,285,781 UART: [kat] HMAC-384Kdf
3,298,305 UART: [kat] LMS
3,827,809 UART: [kat] --
3,832,449 UART: [cold-reset] ++
3,833,461 UART: [fht] FHT @ 0x50003400
3,844,015 UART: [idev] ++
3,844,592 UART: [idev] CDI.KEYID = 6
3,845,506 UART: [idev] SUBJECT.KEYID = 7
3,846,750 UART: [idev] UDS.KEYID = 0
3,847,672 ready_for_fw is high
3,847,880 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,240 UART: [idev] Erasing UDS.KEYID = 0
6,324,051 UART: [idev] Sha1 KeyId Algorithm
6,347,178 UART: [idev] --
6,350,621 UART: [ldev] ++
6,351,185 UART: [ldev] CDI.KEYID = 6
6,352,096 UART: [ldev] SUBJECT.KEYID = 5
6,353,251 UART: [ldev] AUTHORITY.KEYID = 7
6,354,536 UART: [ldev] FE.KEYID = 1
6,366,483 UART: [ldev] Erasing FE.KEYID = 1
8,837,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,245 UART: [ldev] --
10,629,021 UART: [fwproc] Wait for Commands...
10,631,830 UART: [fwproc] Recv command 0x46574c44
10,633,873 UART: [fwproc] Recv'd Img size: 114168 bytes
14,034,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,494,471 >>> mbox cmd response: success
14,498,477 UART: [afmc] ++
14,499,089 UART: [afmc] CDI.KEYID = 6
14,499,981 UART: [afmc] SUBJECT.KEYID = 7
14,501,141 UART: [afmc] AUTHORITY.KEYID = 5
16,996,552 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,807 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,597 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,588 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,480 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,231 UART: [afmc] --
18,792,320 UART: [cold-reset] --
18,795,589 UART: [state] Locking Datavault
18,801,375 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,072 UART: [state] Locking ICCM
18,804,660 UART: [exit] Launching FMC @ 0x40000130
18,813,101 UART:
18,813,342 UART: Running Caliptra FMC ...
18,814,379 UART:
18,814,527 UART: [state] CFI Enabled
18,822,683 UART: [fht] FMC Alias Private Key: 7
20,579,608 UART: [art] Extend RT PCRs Done
20,580,862 UART: [art] Lock RT PCRs Done
20,582,246 UART: [art] Populate DV Done
20,587,709 UART: [fht] FMC Alias Private Key: 7
20,589,320 UART: [art] Derive CDI
20,590,133 UART: [art] Store in in slot 0x4
20,632,997 UART: [art] Derive Key Pair
20,634,036 UART: [art] Store priv key in slot 0x5
23,061,028 UART: [art] Derive Key Pair - Done
23,073,902 UART: [art] Signing Cert with AUTHO
23,075,214 UART: RITY.KEYID = 7
24,780,224 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,721 UART: [art] PUB.X = 95BF65AC0F19F5E314592585B30188560909609ACE20076C5BD31479F1BAA1FA0A1A438AD0723D49A497CD2386049D36
24,789,036 UART: [art] PUB.Y = 7F25C91EB27849A79E199DB3960FE924D7EEC46E50712427F4181390A98A58AD2BA5A3D4FB015D7D53B73A134B1F8E69
24,796,227 UART: [art] SIG.R = D2B9C03B2E7CC36914D6B60BD34ECC61F0488C9A821C5D1EFAA25EA909D47F4758421CFF213F46DB1ADF1827519C6774
24,803,630 UART: [art] SIG.S = B00196B090EBDC17C2DB11F1F4C511259B0605E7F73936B4D4FE74BF73D74B11199F8EAB9298EE581AE839E0F6AFE951
25,783,257 UART: Caliptra RT
25,783,963 UART: [state] CFI Enabled
25,902,034 UART: [rt] RT listening for mailbox commands...
25,904,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,716 UART: [rt]cmd =0x41544d4e, len=14344
30,055,378 >>> mbox cmd response data (8 bytes)
30,055,991 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,086,494 UART: [rt]cmd =0x41545348, len=116
30,089,156 >>> mbox cmd response data (12 bytes)
32,142,159 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,287,202 UART:
32,287,577 UART: Running Caliptra ROM ...
32,288,627 UART:
32,288,781 UART: [state] CFI Enabled
32,303,603 UART: [state] LifecycleState = Unprovisioned
32,305,488 UART: [state] DebugLocked = No
32,307,308 UART: [state] WD Timer not started. Device not locked for debugging
32,310,627 UART: [kat] SHA2-256
32,489,782 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,501,376 UART: [kat] ++
32,501,828 UART: [kat] sha1
32,514,173 UART: [kat] SHA2-256
32,517,249 UART: [kat] SHA2-384
32,523,394 UART: [kat] SHA2-512-ACC
32,526,338 UART: [kat] ECC-384
34,966,112 UART: [kat] HMAC-384Kdf
34,978,184 UART: [kat] LMS
35,507,702 UART: [kat] --
35,510,802 UART: [update-reset] ++
38,931,817 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,935,645 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,317,953 >>> mbox cmd response: success
39,318,391 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,319,585 UART: [update-reset] Copying MAN_2 To MAN_1
39,341,916 UART: [update-reset Success] --
39,344,796 UART: [state] Locking Datavault
39,348,759 UART: [state] Locking PCR0, PCR1 and PCR31
39,350,408 UART: [state] Locking ICCM
39,351,507 UART: [exit] Launching FMC @ 0x40000130
39,359,952 UART:
39,360,187 UART: Running Caliptra FMC ...
39,361,212 UART:
39,361,359 UART: [state] CFI Enabled
39,406,021 UART: [art] Extend RT PCRs Done
39,407,171 UART: [art] Lock RT PCRs Done
39,408,377 UART: [art] Populate DV Done
39,413,999 UART: [fht] FMC Alias Private Key: 7
39,415,535 UART: [art] Derive CDI
39,416,288 UART: [art] Store in in slot 0x4
39,458,943 UART: [art] Derive Key Pair
39,460,054 UART: [art] Store priv key in slot 0x5
41,886,996 UART: [art] Derive Key Pair - Done
41,900,167 UART: [art] Signing Cert with AUTHO
41,901,481 UART: RITY.KEYID = 7
43,607,248 UART: [art] Erasing AUTHORITY.KEYID = 7
43,608,749 UART: [art] PUB.X = 158B01AA0C1B42BD52864CEC46282780C05760FAA81D6A062971477AB7C42E3F96644C24AE46922D9470F419F01FE155
43,616,006 UART: [art] PUB.Y = AD1AFD3DF8CBA9A0C3E16F848AC9A34C337C939B5374D800D5011A8096B0C0670B0731F3E35379AAF271F11CE657EDAF
43,623,207 UART: [art] SIG.R = 5EE5209BD2B58AA29889BFC9ABF0ED92892A240D717D067E779E3E78B7B558E684D9EE7AFBAE6ACC2BEC267E67AD465D
43,630,659 UART: [art] SIG.S = 01640D44D4B5806C0E82C7BD156F2663E0CD418A9234F5621B69E087AFB17F85D833080009B2B15C107CF344E0141FB2
44,609,382 UART: Caliptra RT
44,610,074 UART: [state] CFI Enabled
44,896,727 UART: [rt] RT listening for mailbox commands...
44,928,515 UART: [rt]cmd =0x41545348, len=116
44,930,756 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,938 writing to cptra_bootfsm_go
3,701,583 ready_for_fw is high
3,701,985 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,285,662 >>> mbox cmd response: success
18,538,337 UART:
18,538,729 UART: Running Caliptra FMC ...
18,539,860 UART:
18,540,025 UART: [state] CFI Enabled
18,548,305 UART: [fht] FMC Alias Private Key: 7
20,304,245 UART: [art] Extend RT PCRs Done
20,305,468 UART: [art] Lock RT PCRs Done
20,306,803 UART: [art] Populate DV Done
20,312,275 UART: [fht] FMC Alias Private Key: 7
20,313,872 UART: [art] Derive CDI
20,314,613 UART: [art] Store in in slot 0x4
20,357,264 UART: [art] Derive Key Pair
20,358,261 UART: [art] Store priv key in slot 0x5
22,784,658 UART: [art] Derive Key Pair - Done
22,797,730 UART: [art] Signing Cert with AUTHO
22,799,045 UART: RITY.KEYID = 7
24,504,792 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,301 UART: [art] PUB.X = 290A950BAFCB6819547224A03AA660C456712487B01FE18FC64141B59989794FB05B353970E18F2C0CB74BB87601D0E6
24,513,555 UART: [art] PUB.Y = 0D938AA5A37FFFFA1C7D375867217C4575FC7D35CB5832CE50C1DDBBE3525DDF42A7C499BB52E18ABBFB798042C09FDD
24,520,820 UART: [art] SIG.R = FFBD4B0A7B6B72D91221047BDE1E4386D7A2D323899B4714BFA30592C5A5FBF4A3F81EF7A7F79628C891F2AB6AA37183
24,528,217 UART: [art] SIG.S = 7E7C83E7DB0C0F6AC3D92845664640B7B8AF8265484635244DF243FE327A689A5F2F93636E1E9E035BD69EB4FD0015C5
25,506,676 UART: Caliptra RT
25,507,361 UART: [state] CFI Enabled
25,624,255 UART: [rt] RT listening for mailbox commands...
25,626,641 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,781,681 UART: [rt]cmd =0x41544d4e, len=14344
29,777,144 >>> mbox cmd response data (8 bytes)
29,777,713 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,808,441 UART: [rt]cmd =0x41545348, len=116
29,810,762 >>> mbox cmd response data (12 bytes)
31,864,815 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,905,241 >>> mbox cmd response: success
38,905,886 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,940,003 UART:
38,940,333 UART: Running Caliptra FMC ...
38,941,461 UART:
38,941,642 UART: [state] CFI Enabled
38,985,266 UART: [art] Extend RT PCRs Done
38,986,419 UART: [art] Lock RT PCRs Done
38,987,715 UART: [art] Populate DV Done
38,993,286 UART: [fht] FMC Alias Private Key: 7
38,994,985 UART: [art] Derive CDI
38,995,817 UART: [art] Store in in slot 0x4
39,038,638 UART: [art] Derive Key Pair
39,039,686 UART: [art] Store priv key in slot 0x5
41,465,792 UART: [art] Derive Key Pair - Done
41,478,844 UART: [art] Signing Cert with AUTHO
41,480,145 UART: RITY.KEYID = 7
43,185,380 UART: [art] Erasing AUTHORITY.KEYID = 7
43,186,897 UART: [art] PUB.X = 8425D24B464479058A45A18FFC75139DC50360F2011A28510EEF8D92EE645B79D42E6B66E6B1B25B738A69280D5DF228
43,194,148 UART: [art] PUB.Y = B7DC76B73B82EA4EDFF0874DD999C648908221A987A2D22529F2E6E1F1C04A6468436BB6CE644A13103750F86C5B42DF
43,201,385 UART: [art] SIG.R = 6FBF76852B996D40C7193B79E1F80F2EAE1464E71750A7BEF8BA6484B4BF9253C4418104F2D430A1813081D88FDF903F
43,208,777 UART: [art] SIG.S = 9664C7C53DCDD9F5B45F932DA30A902BEF57288DBD526A4395765C9A0B70C13EC0D5826B84BAD0D53C4A19B9BB82E60D
44,187,690 UART: Caliptra RT
44,188,377 UART: [state] CFI Enabled
44,479,920 UART: [rt] RT listening for mailbox commands...
44,511,934 UART: [rt]cmd =0x41545348, len=116
44,514,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,138 UART:
192,518 UART: Running Caliptra ROM ...
193,635 UART:
193,780 UART: [state] CFI Enabled
262,626 UART: [state] LifecycleState = Unprovisioned
265,051 UART: [state] DebugLocked = No
267,363 UART: [state] WD Timer not started. Device not locked for debugging
272,466 UART: [kat] SHA2-256
462,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,110 UART: [kat] ++
473,643 UART: [kat] sha1
485,022 UART: [kat] SHA2-256
488,021 UART: [kat] SHA2-384
493,733 UART: [kat] SHA2-512-ACC
496,316 UART: [kat] ECC-384
2,949,004 UART: [kat] HMAC-384Kdf
2,970,916 UART: [kat] LMS
3,502,719 UART: [kat] --
3,507,023 UART: [cold-reset] ++
3,508,464 UART: [fht] FHT @ 0x50003400
3,520,301 UART: [idev] ++
3,521,032 UART: [idev] CDI.KEYID = 6
3,521,921 UART: [idev] SUBJECT.KEYID = 7
3,523,162 UART: [idev] UDS.KEYID = 0
3,524,066 ready_for_fw is high
3,524,292 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,034 UART: [idev] Erasing UDS.KEYID = 0
6,028,814 UART: [idev] Sha1 KeyId Algorithm
6,050,581 UART: [idev] --
6,056,201 UART: [ldev] ++
6,056,889 UART: [ldev] CDI.KEYID = 6
6,057,779 UART: [ldev] SUBJECT.KEYID = 5
6,058,993 UART: [ldev] AUTHORITY.KEYID = 7
6,060,233 UART: [ldev] FE.KEYID = 1
6,100,491 UART: [ldev] Erasing FE.KEYID = 1
8,609,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,670 UART: [ldev] --
10,413,141 UART: [fwproc] Wait for Commands...
10,415,137 UART: [fwproc] Recv command 0x46574c44
10,417,450 UART: [fwproc] Recv'd Img size: 114168 bytes
13,864,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,626 >>> mbox cmd response: success
14,604,900 UART: [afmc] ++
14,605,614 UART: [afmc] CDI.KEYID = 6
14,606,787 UART: [afmc] SUBJECT.KEYID = 7
14,608,287 UART: [afmc] AUTHORITY.KEYID = 5
17,152,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,691 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,844 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,989 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,876 UART: [afmc] --
18,968,590 UART: [cold-reset] --
18,973,013 UART: [state] Locking Datavault
18,978,725 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,889 UART: [state] Locking ICCM
18,982,784 UART: [exit] Launching FMC @ 0x40000130
18,991,489 UART:
18,991,723 UART: Running Caliptra FMC ...
18,992,751 UART:
18,992,899 UART: [state] CFI Enabled
19,052,776 UART: [fht] FMC Alias Private Key: 7
20,817,551 UART: [art] Extend RT PCRs Done
20,818,767 UART: [art] Lock RT PCRs Done
20,820,470 UART: [art] Populate DV Done
20,825,502 UART: [fht] FMC Alias Private Key: 7
20,827,038 UART: [art] Derive CDI
20,827,774 UART: [art] Store in in slot 0x4
20,885,358 UART: [art] Derive Key Pair
20,886,399 UART: [art] Store priv key in slot 0x5
23,349,276 UART: [art] Derive Key Pair - Done
23,362,048 UART: [art] Signing Cert with AUTHO
23,363,357 UART: RITY.KEYID = 7
25,075,422 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,930 UART: [art] PUB.X = 3FAAA10A4C78CC821F3C998B48FBD64E45F3770F7C93B2CF3A6BDAB3BD0C03BDD09150B4CB8C44432CE48BDB8DB028DD
25,084,193 UART: [art] PUB.Y = AC9FD7F10DFDDDF9268CB538FEB74802FEBD299B803E442163A1C6010F484DE2FE5A4E209C6AFEEA0CCC06FF7FD839DC
25,091,503 UART: [art] SIG.R = B34B95AEFE53A064149B478AA8536617A65E9D72BABEAE97C065BFCF1241605B835C7D68B76075739055727BA4738B6A
25,098,874 UART: [art] SIG.S = 118D40A2C280D675E0A0D7374D91807B7B039F404D71DCB15A0CD93CAF3630A55469EEBE9F7FE12DC6B6939EB013748C
26,078,250 UART: Caliptra RT
26,078,966 UART: [state] CFI Enabled
26,243,545 UART: [rt] RT listening for mailbox commands...
26,246,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,401,526 UART: [rt]cmd =0x41544d4e, len=14344
30,396,702 >>> mbox cmd response data (8 bytes)
30,397,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,427,835 UART: [rt]cmd =0x41545348, len=116
30,430,228 >>> mbox cmd response data (12 bytes)
32,487,495 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,632,724 UART:
32,633,100 UART: Running Caliptra ROM ...
32,634,171 UART:
32,634,324 UART: [state] CFI Enabled
32,709,975 UART: [state] LifecycleState = Unprovisioned
32,712,088 UART: [state] DebugLocked = No
32,713,398 UART: [state] WD Timer not started. Device not locked for debugging
32,718,003 UART: [kat] SHA2-256
32,907,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,918,600 UART: [kat] ++
32,919,057 UART: [kat] sha1
32,931,519 UART: [kat] SHA2-256
32,934,515 UART: [kat] SHA2-384
32,940,470 UART: [kat] SHA2-512-ACC
32,943,059 UART: [kat] ECC-384
35,394,519 UART: [kat] HMAC-384Kdf
35,416,801 UART: [kat] LMS
35,948,378 UART: [kat] --
35,952,977 UART: [update-reset] ++
39,408,699 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,411,541 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
40,018,117 >>> mbox cmd response: success
40,022,801 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,023,406 UART: [update-reset] Copying MAN_2 To MAN_1
40,056,337 UART: [update-reset Success] --
40,061,175 UART: [state] Locking Datavault
40,064,764 UART: [state] Locking PCR0, PCR1 and PCR31
40,066,913 UART: [state] Locking ICCM
40,069,776 UART: [exit] Launching FMC @ 0x40000130
40,078,433 UART:
40,078,680 UART: Running Caliptra FMC ...
40,079,789 UART:
40,079,957 UART: [state] CFI Enabled
40,183,948 UART: [art] Extend RT PCRs Done
40,185,151 UART: [art] Lock RT PCRs Done
40,186,455 UART: [art] Populate DV Done
40,192,137 UART: [fht] FMC Alias Private Key: 7
40,193,780 UART: [art] Derive CDI
40,194,592 UART: [art] Store in in slot 0x4
40,253,272 UART: [art] Derive Key Pair
40,254,377 UART: [art] Store priv key in slot 0x5
42,717,553 UART: [art] Derive Key Pair - Done
42,730,651 UART: [art] Signing Cert with AUTHO
42,732,005 UART: RITY.KEYID = 7
44,442,093 UART: [art] Erasing AUTHORITY.KEYID = 7
44,443,634 UART: [art] PUB.X = 0F3BE043A18192F491D8349B00AE1B7D962AA1E58126A9D5EFE3CE76BE5BF15EBE65D759B4B2C2AD93B4C8540B45A473
44,450,847 UART: [art] PUB.Y = 4A6DC22C79D2A8A1FF5753CD3F30B516E6543B742EC4C341A7FC07B4F092060CBF072C345FA6BCB3BFCE4FC81CFE497A
44,458,160 UART: [art] SIG.R = A7191CCA164B0C73999469602CBE04B43C7D45F516C093A3401129D5C68EB18E651254541D1263A39F1284026B6B0904
44,465,521 UART: [art] SIG.S = 7BC2410B4BB9C7D3676B5C4BA29D724B1ABC17CBCDF8472F4081CC0CED6F2E69AAB11E3D6EC36EA0E3DCBAB444D19C2C
45,444,160 UART: Caliptra RT
45,444,987 UART: [state] CFI Enabled
45,775,729 UART: [rt] RT listening for mailbox commands...
45,807,660 UART: [rt]cmd =0x41545348, len=116
45,810,122 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,436,249 ready_for_fw is high
3,436,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,597 >>> mbox cmd response: success
19,022,207 UART:
19,022,595 UART: Running Caliptra FMC ...
19,023,707 UART:
19,023,865 UART: [state] CFI Enabled
19,090,897 UART: [fht] FMC Alias Private Key: 7
20,854,712 UART: [art] Extend RT PCRs Done
20,855,930 UART: [art] Lock RT PCRs Done
20,857,907 UART: [art] Populate DV Done
20,863,317 UART: [fht] FMC Alias Private Key: 7
20,864,971 UART: [art] Derive CDI
20,866,011 UART: [art] Store in in slot 0x4
20,922,858 UART: [art] Derive Key Pair
20,923,863 UART: [art] Store priv key in slot 0x5
23,387,500 UART: [art] Derive Key Pair - Done
23,400,283 UART: [art] Signing Cert with AUTHO
23,401,592 UART: RITY.KEYID = 7
25,112,283 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,791 UART: [art] PUB.X = 23291E4B39A90CB35128FBB80ED89EE08BD83406B0EF0ECEFBA8EF677EE01E0129E2D75B15F79161824F1D42D9015277
25,121,034 UART: [art] PUB.Y = 12C7DE31A892D58F0A88A2B0415EE6CB11B9E0BA5F3C33084481329E38BA06AEC1BB89FCDEF1D2ADD7B70B16E6398CAA
25,128,333 UART: [art] SIG.R = 70D28FAA78DA3FE742C732CEF707B8F3068583A69CFBBD70BFD65F25515A7DD2A80786328D9E7B735F24234F08C87BB9
25,135,713 UART: [art] SIG.S = 71A9D31042E5C996DD20066A15CF3FC3169A63B17273A4552634C29B20EB97DA8D96598787BE08FCE8588F8C6D64E48F
26,115,326 UART: Caliptra RT
26,116,031 UART: [state] CFI Enabled
26,279,686 UART: [rt] RT listening for mailbox commands...
26,282,073 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,437,165 UART: [rt]cmd =0x41544d4e, len=14344
30,432,482 >>> mbox cmd response data (8 bytes)
30,433,060 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,463,956 UART: [rt]cmd =0x41545348, len=116
30,466,246 >>> mbox cmd response data (12 bytes)
32,525,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,346,969 >>> mbox cmd response: success
40,347,552 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,379,437 UART:
40,379,737 UART: Running Caliptra FMC ...
40,380,853 UART:
40,381,016 UART: [state] CFI Enabled
40,474,687 UART: [art] Extend RT PCRs Done
40,475,890 UART: [art] Lock RT PCRs Done
40,477,263 UART: [art] Populate DV Done
40,482,893 UART: [fht] FMC Alias Private Key: 7
40,484,592 UART: [art] Derive CDI
40,485,406 UART: [art] Store in in slot 0x4
40,543,767 UART: [art] Derive Key Pair
40,544,766 UART: [art] Store priv key in slot 0x5
43,007,764 UART: [art] Derive Key Pair - Done
43,020,604 UART: [art] Signing Cert with AUTHO
43,021,910 UART: RITY.KEYID = 7
44,733,413 UART: [art] Erasing AUTHORITY.KEYID = 7
44,734,919 UART: [art] PUB.X = EEB88EF7EC3037B5AFA5B7E7E1EE40E05FDB0FF658F5C19FAAD78CD92A234D20998A91DA88591A7185379D2805AEA25D
44,742,160 UART: [art] PUB.Y = FE4186A9A130883723981725D29B38C2124CC93EE5D38A0AA44F86428B543F8DE62441E33741BE0D19604F6A32E553ED
44,749,441 UART: [art] SIG.R = CCFEDFC87576B6A22A7A3CD555A601CA37AAE6520892AB2A6C9DF6F3663AFB0235B980F55F18333DFFF0D181E1E07C0B
44,756,825 UART: [art] SIG.S = FB2484EFE7E894991F5D9E622B9642686005390381F48D0EEE506A554E0B98E9E1FDCF70FF955233E1EE94D2C9D0FDB3
45,735,125 UART: Caliptra RT
45,735,839 UART: [state] CFI Enabled
46,071,247 UART: [rt] RT listening for mailbox commands...
46,103,105 UART: [rt]cmd =0x41545348, len=116
46,105,515 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,772 writing to cptra_bootfsm_go
192,998 UART:
193,385 UART: Running Caliptra ROM ...
195,034 UART:
604,128 UART: [state] CFI Enabled
615,871 UART: [state] LifecycleState = Unprovisioned
618,238 UART: [state] DebugLocked = No
620,395 UART: [state] WD Timer not started. Device not locked for debugging
624,999 UART: [kat] SHA2-256
814,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,657 UART: [kat] ++
826,178 UART: [kat] sha1
837,065 UART: [kat] SHA2-256
840,046 UART: [kat] SHA2-384
845,541 UART: [kat] SHA2-512-ACC
848,189 UART: [kat] ECC-384
3,289,739 UART: [kat] HMAC-384Kdf
3,303,472 UART: [kat] LMS
3,835,273 UART: [kat] --
3,837,638 UART: [cold-reset] ++
3,839,000 UART: [fht] FHT @ 0x50003400
3,851,261 UART: [idev] ++
3,851,966 UART: [idev] CDI.KEYID = 6
3,852,997 UART: [idev] SUBJECT.KEYID = 7
3,854,101 UART: [idev] UDS.KEYID = 0
3,855,027 ready_for_fw is high
3,855,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,623 UART: [idev] Erasing UDS.KEYID = 0
6,330,834 UART: [idev] Sha1 KeyId Algorithm
6,353,798 UART: [idev] --
6,359,010 UART: [ldev] ++
6,359,695 UART: [ldev] CDI.KEYID = 6
6,360,627 UART: [ldev] SUBJECT.KEYID = 5
6,361,789 UART: [ldev] AUTHORITY.KEYID = 7
6,363,023 UART: [ldev] FE.KEYID = 1
6,375,401 UART: [ldev] Erasing FE.KEYID = 1
8,854,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,953 UART: [ldev] --
10,644,895 UART: [fwproc] Wait for Commands...
10,648,014 UART: [fwproc] Recv command 0x46574c44
10,650,268 UART: [fwproc] Recv'd Img size: 114168 bytes
14,097,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,988 >>> mbox cmd response: success
14,836,538 UART: [afmc] ++
14,837,274 UART: [afmc] CDI.KEYID = 6
14,838,386 UART: [afmc] SUBJECT.KEYID = 7
14,839,871 UART: [afmc] AUTHORITY.KEYID = 5
17,345,255 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,289 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,774 UART: [afmc] --
19,142,891 UART: [cold-reset] --
19,146,701 UART: [state] Locking Datavault
19,152,384 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,611 UART: [state] Locking ICCM
19,156,525 UART: [exit] Launching FMC @ 0x40000130
19,165,152 UART:
19,165,394 UART: Running Caliptra FMC ...
19,166,499 UART:
19,166,663 UART: [state] CFI Enabled
19,174,547 UART: [fht] FMC Alias Private Key: 7
20,931,405 UART: [art] Extend RT PCRs Done
20,932,621 UART: [art] Lock RT PCRs Done
20,934,359 UART: [art] Populate DV Done
20,939,712 UART: [fht] FMC Alias Private Key: 7
20,941,197 UART: [art] Derive CDI
20,941,959 UART: [art] Store in in slot 0x4
20,984,984 UART: [art] Derive Key Pair
20,985,982 UART: [art] Store priv key in slot 0x5
23,412,621 UART: [art] Derive Key Pair - Done
23,425,947 UART: [art] Signing Cert with AUTHO
23,427,275 UART: RITY.KEYID = 7
25,132,639 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,145 UART: [art] PUB.X = 2329C7EF584656D1002522C31EF3B1BE8ADBC431CE82E673BE52BD99F2D0A9030D8DF6BF78ED2EE9831D4C9F89007A2C
25,141,394 UART: [art] PUB.Y = 4D636A13F877F4DCD9C1D95E524C50D5F15B5234E5B0D1051927E9DD8707237FAF5EDAB298BBD09B2603F00627BFB89A
25,148,624 UART: [art] SIG.R = D4CB400DEE040D5F513C72EB419C487B21616CBB772AF9FD3BC283524D240A3F665D6654DDC8C67F01F946128F3397A1
25,156,059 UART: [art] SIG.S = DBC8CA2FB7620B8F83B6C1507FBACC9930739F9382BE0B416B85A1FB0345BAA0D059007B2085A357BE58B69E7ED216FC
26,134,576 UART: Caliptra RT
26,135,276 UART: [state] CFI Enabled
26,251,793 UART: [rt] RT listening for mailbox commands...
26,254,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,409,354 UART: [rt]cmd =0x41544d4e, len=14344
30,404,629 >>> mbox cmd response data (8 bytes)
30,405,221 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,436,068 UART: [rt]cmd =0x41545348, len=116
30,438,196 >>> mbox cmd response data (12 bytes)
32,492,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,638,324 UART:
32,638,708 UART: Running Caliptra ROM ...
32,639,846 UART:
32,640,016 UART: [state] CFI Enabled
32,652,831 UART: [state] LifecycleState = Unprovisioned
32,654,735 UART: [state] DebugLocked = No
32,657,573 UART: [state] WD Timer not started. Device not locked for debugging
32,662,178 UART: [kat] SHA2-256
32,852,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,862,798 UART: [kat] ++
32,863,395 UART: [kat] sha1
32,874,469 UART: [kat] SHA2-256
32,877,494 UART: [kat] SHA2-384
32,882,796 UART: [kat] SHA2-512-ACC
32,885,380 UART: [kat] ECC-384
35,330,218 UART: [kat] HMAC-384Kdf
35,342,778 UART: [kat] LMS
35,874,362 UART: [kat] --
35,879,459 UART: [update-reset] ++
39,339,011 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,342,934 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,949,537 >>> mbox cmd response: success
39,954,604 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,955,302 UART: [update-reset] Copying MAN_2 To MAN_1
39,988,667 UART: [update-reset Success] --
39,992,903 UART: [state] Locking Datavault
39,995,942 UART: [state] Locking PCR0, PCR1 and PCR31
39,998,079 UART: [state] Locking ICCM
40,000,344 UART: [exit] Launching FMC @ 0x40000130
40,009,030 UART:
40,009,283 UART: Running Caliptra FMC ...
40,010,395 UART:
40,010,560 UART: [state] CFI Enabled
40,054,872 UART: [art] Extend RT PCRs Done
40,056,072 UART: [art] Lock RT PCRs Done
40,057,316 UART: [art] Populate DV Done
40,062,948 UART: [fht] FMC Alias Private Key: 7
40,064,437 UART: [art] Derive CDI
40,065,252 UART: [art] Store in in slot 0x4
40,108,085 UART: [art] Derive Key Pair
40,109,148 UART: [art] Store priv key in slot 0x5
42,535,810 UART: [art] Derive Key Pair - Done
42,548,918 UART: [art] Signing Cert with AUTHO
42,550,234 UART: RITY.KEYID = 7
44,255,656 UART: [art] Erasing AUTHORITY.KEYID = 7
44,257,162 UART: [art] PUB.X = A4ABF530F1D85D714C7F9396E5190F7FAA67044B169BA235BA5D3DC5097676C91B0850C8249D39BDD6332A4F28149E0F
44,264,419 UART: [art] PUB.Y = 32280D02586311AC847E380B39F90E616C8FED118DB0DCB2A84BC87842537BEE5882A33E96EBC33F4420E2A19CC27EB4
44,271,648 UART: [art] SIG.R = 1B0FC286BD56BC8FB0BFD26EA980DBAF56466828D81011F3F3DC9531293836C85377BC5E53B9E7ECA42543C007F13267
44,279,074 UART: [art] SIG.S = 34BA535A82BEC62E51E7120A250768CABF35C8A43C42CA773F1AA18DAA7DB0A56D5B5D08D0E79C87C0EB591BBFA7BB34
45,257,721 UART: Caliptra RT
45,258,408 UART: [state] CFI Enabled
45,548,336 UART: [rt] RT listening for mailbox commands...
45,579,947 UART: [rt]cmd =0x41545348, len=116
45,582,159 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,650 writing to cptra_bootfsm_go
3,760,150 ready_for_fw is high
3,760,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,948,976 >>> mbox cmd response: success
19,203,172 UART:
19,203,585 UART: Running Caliptra FMC ...
19,204,784 UART:
19,204,957 UART: [state] CFI Enabled
19,212,690 UART: [fht] FMC Alias Private Key: 7
20,969,342 UART: [art] Extend RT PCRs Done
20,970,586 UART: [art] Lock RT PCRs Done
20,972,029 UART: [art] Populate DV Done
20,977,389 UART: [fht] FMC Alias Private Key: 7
20,979,089 UART: [art] Derive CDI
20,979,832 UART: [art] Store in in slot 0x4
21,022,268 UART: [art] Derive Key Pair
21,023,314 UART: [art] Store priv key in slot 0x5
23,450,372 UART: [art] Derive Key Pair - Done
23,463,491 UART: [art] Signing Cert with AUTHO
23,464,802 UART: RITY.KEYID = 7
25,169,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,372 UART: [art] PUB.X = 46FA69D8A0458D205B8135660E157D56E89C6E582506A39011A3413D2BE054A1E275A6617236978C35CD481DBD34B7E2
25,178,624 UART: [art] PUB.Y = F3A4A8933C9EE533A0764F869E4AB825F9101D07A846B5FB35162C283520D2161F679B30A8393086396D86664B9DAAF1
25,185,831 UART: [art] SIG.R = C791DF502F959E1887A410658AEFFB6B6AF9E94C9FF7B453892763F19A002460EFBC2F9B3CDC53FF94A5E3743CF5F252
25,193,217 UART: [art] SIG.S = DE2E4CC61022327EA609F5164661DC52CF1B3D666101D11DC86301CE587ABB485AC61E186FEAD24C6ECBF6ADD29C3406
26,171,844 UART: Caliptra RT
26,172,569 UART: [state] CFI Enabled
26,290,492 UART: [rt] RT listening for mailbox commands...
26,292,873 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,448,323 UART: [rt]cmd =0x41544d4e, len=14344
30,443,539 >>> mbox cmd response data (8 bytes)
30,444,109 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,474,947 UART: [rt]cmd =0x41545348, len=116
30,477,259 >>> mbox cmd response data (12 bytes)
32,535,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,267,094 >>> mbox cmd response: success
40,267,860 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,298,649 UART:
40,298,973 UART: Running Caliptra FMC ...
40,300,103 UART:
40,300,273 UART: [state] CFI Enabled
40,344,088 UART: [art] Extend RT PCRs Done
40,345,240 UART: [art] Lock RT PCRs Done
40,346,854 UART: [art] Populate DV Done
40,352,156 UART: [fht] FMC Alias Private Key: 7
40,353,747 UART: [art] Derive CDI
40,354,561 UART: [art] Store in in slot 0x4
40,396,966 UART: [art] Derive Key Pair
40,398,007 UART: [art] Store priv key in slot 0x5
42,824,652 UART: [art] Derive Key Pair - Done
42,837,592 UART: [art] Signing Cert with AUTHO
42,838,919 UART: RITY.KEYID = 7
44,544,104 UART: [art] Erasing AUTHORITY.KEYID = 7
44,545,619 UART: [art] PUB.X = 81D5972A3A19AF91E70677BB23D16B11B79497377F5ED645339504CD249394629962A01B3644388DAA91EED9E86368A1
44,552,870 UART: [art] PUB.Y = 5FDE3D6F1F61D5BCD3F05854D261EFC0E2747BACC3031F2AD4539BEB483EB1F07A64E2FA81B545B56FFD63714485EBA7
44,560,164 UART: [art] SIG.R = 6A9B322531250E080B568EA19B99DD30297346BF53151A7557B2D85482C44D57B3ECF7D1677EF19BF2D76AF0E9051F74
44,567,499 UART: [art] SIG.S = 3F94AD463AD4A9FD1244815B6AC7DC3AC44091D326E8D10DBF28293E873F968EE144D59230B0D5C0E1C5221B9998F5CF
45,546,166 UART: Caliptra RT
45,546,877 UART: [state] CFI Enabled
45,836,283 UART: [rt] RT listening for mailbox commands...
45,868,306 UART: [rt]cmd =0x41545348, len=116
45,870,502 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,193 UART: [kat] SHA2-256
882,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,239 UART: [kat] ++
886,391 UART: [kat] sha1
890,665 UART: [kat] SHA2-256
892,603 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
903,054 UART: [kat] HMAC-384Kdf
907,520 UART: [kat] LMS
1,475,716 UART: [kat] --
1,476,769 UART: [cold-reset] ++
1,477,153 UART: [fht] Storing FHT @ 0x50003400
1,479,848 UART: [idev] ++
1,480,016 UART: [idev] CDI.KEYID = 6
1,480,376 UART: [idev] SUBJECT.KEYID = 7
1,480,800 UART: [idev] UDS.KEYID = 0
1,481,145 ready_for_fw is high
1,481,145 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,856 UART: [idev] Erasing UDS.KEYID = 0
1,504,950 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,646 UART: [idev] --
1,514,675 UART: [ldev] ++
1,514,843 UART: [ldev] CDI.KEYID = 6
1,515,206 UART: [ldev] SUBJECT.KEYID = 5
1,515,632 UART: [ldev] AUTHORITY.KEYID = 7
1,516,095 UART: [ldev] FE.KEYID = 1
1,521,183 UART: [ldev] Erasing FE.KEYID = 1
1,546,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,932 UART: [ldev] --
1,585,391 UART: [fwproc] Waiting for Commands...
1,586,072 UART: [fwproc] Received command 0x46574c44
1,586,863 UART: [fwproc] Received Image of size 114168 bytes
2,883,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,127 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,479 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,970 >>> mbox cmd response: success
3,077,020 UART: [afmc] ++
3,077,188 UART: [afmc] CDI.KEYID = 6
3,077,550 UART: [afmc] SUBJECT.KEYID = 7
3,077,975 UART: [afmc] AUTHORITY.KEYID = 5
3,111,978 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,208 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,988 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,601 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,291 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,022 UART: [afmc] --
3,154,902 UART: [cold-reset] --
3,155,946 UART: [state] Locking Datavault
3,157,047 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,651 UART: [state] Locking ICCM
3,158,121 UART: [exit] Launching FMC @ 0x40000130
3,163,450 UART:
3,163,466 UART: Running Caliptra FMC ...
3,163,874 UART:
3,163,928 UART: [state] CFI Enabled
3,174,857 UART: [fht] FMC Alias Private Key: 7
3,282,662 UART: [art] Extend RT PCRs Done
3,283,090 UART: [art] Lock RT PCRs Done
3,284,510 UART: [art] Populate DV Done
3,292,761 UART: [fht] FMC Alias Private Key: 7
3,293,711 UART: [art] Derive CDI
3,293,991 UART: [art] Store in in slot 0x4
3,379,378 UART: [art] Derive Key Pair
3,379,738 UART: [art] Store priv key in slot 0x5
3,392,596 UART: [art] Derive Key Pair - Done
3,407,351 UART: [art] Signing Cert with AUTHO
3,407,831 UART: RITY.KEYID = 7
3,423,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,136 UART: [art] PUB.X = EFFA65414AFFAB0E1DD7B11CC361BAC4A64E4DC133469F0BBA3DF487F351B494041AB2F880097F312D39B96ACB3AF663
3,430,914 UART: [art] PUB.Y = 3079C84320A5EACD99194048BED02D9EDB3EAB9C298B7A45405F45FE6E3B6B18C7094C7BFFD7B6D11E62DE1EEA4B8A70
3,437,881 UART: [art] SIG.R = E59C2A10425D6FFC52B3B2908F4C4A4F6EDA77C9048A9C61E989CE87740F9FBE878EE8BDB3E2B2D3A50EB2737ECFAD8C
3,444,666 UART: [art] SIG.S = 7F987C3D166C7E5FF623FCE2A97B8BCC0B8DF6BB9048120DD545A259488527357D435F9B0303046C519B9295F19D03EA
3,468,649 UART: Caliptra RT
3,468,902 UART: [state] CFI Enabled
3,576,729 UART: [rt] RT listening for mailbox commands...
3,577,399 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,565 UART: [rt]cmd =0x41544d4e, len=14344
4,009,279 >>> mbox cmd response data (8 bytes)
4,009,280 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,429 UART: [rt]cmd =0x41545348, len=116
4,041,120 >>> mbox cmd response data (12 bytes)
4,041,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,171 UART:
4,042,187 UART: Running Caliptra ROM ...
4,042,595 UART:
4,042,649 UART: [state] CFI Enabled
4,044,923 UART: [state] LifecycleState = Unprovisioned
4,045,578 UART: [state] DebugLocked = No
4,046,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,047,593 UART: [kat] SHA2-256
4,841,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,845,639 UART: [kat] ++
4,845,791 UART: [kat] sha1
4,849,819 UART: [kat] SHA2-256
4,851,757 UART: [kat] SHA2-384
4,854,646 UART: [kat] SHA2-512-ACC
4,856,546 UART: [kat] ECC-384
4,862,489 UART: [kat] HMAC-384Kdf
4,867,055 UART: [kat] LMS
5,435,251 UART: [kat] --
5,436,134 UART: [update-reset] ++
6,770,352 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,771,530 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,921,160 >>> mbox cmd response: success
6,921,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,921,417 UART: [update-reset] Copying MAN_2 To MAN_1
6,929,431 UART: [update-reset Success] --
6,930,100 UART: [state] Locking Datavault
6,930,782 UART: [state] Locking PCR0, PCR1 and PCR31
6,931,386 UART: [state] Locking ICCM
6,931,906 UART: [exit] Launching FMC @ 0x40000130
6,937,235 UART:
6,937,251 UART: Running Caliptra FMC ...
6,937,659 UART:
6,937,713 UART: [state] CFI Enabled
7,026,430 UART: [art] Extend RT PCRs Done
7,026,858 UART: [art] Lock RT PCRs Done
7,028,191 UART: [art] Populate DV Done
7,036,372 UART: [fht] FMC Alias Private Key: 7
7,037,524 UART: [art] Derive CDI
7,037,804 UART: [art] Store in in slot 0x4
7,123,335 UART: [art] Derive Key Pair
7,123,695 UART: [art] Store priv key in slot 0x5
7,137,117 UART: [art] Derive Key Pair - Done
7,152,333 UART: [art] Signing Cert with AUTHO
7,152,813 UART: RITY.KEYID = 7
7,168,177 UART: [art] Erasing AUTHORITY.KEYID = 7
7,168,942 UART: [art] PUB.X = 3B4CBB61C6220989BCDAE19491543D0B213F98ADC64930881FBB07A26DA321BEDDAE7FF112C8389F32C9FC852FB0EDB8
7,175,721 UART: [art] PUB.Y = 2862C27E7FBC3506B2EACECF74E48AA6FEF8BF1F110FC81096AD4168C6032330F12A28F775755E5775F011CCFA524CC2
7,182,674 UART: [art] SIG.R = E646E71C676A64FEF1B8C02C0D6D95A61193CE654CD329AAF68C789D09616D9F9F3DCB14FBED9A50733D825AF3574BE1
7,189,452 UART: [art] SIG.S = C93E7E74AF8129B236784A8ACA761152318DDC79D1B1E406F05144A401515B2E1E3361B4B6DE80FB56BCDE6781199BD5
7,213,081 UART: Caliptra RT
7,213,334 UART: [state] CFI Enabled
7,496,400 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,527,271 UART: [rt]cmd =0x41545348, len=116
7,529,322 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,341 ready_for_fw is high
1,362,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,738 >>> mbox cmd response: success
2,985,284 UART:
2,985,300 UART: Running Caliptra FMC ...
2,985,708 UART:
2,985,762 UART: [state] CFI Enabled
2,996,087 UART: [fht] FMC Alias Private Key: 7
3,104,114 UART: [art] Extend RT PCRs Done
3,104,542 UART: [art] Lock RT PCRs Done
3,106,178 UART: [art] Populate DV Done
3,114,257 UART: [fht] FMC Alias Private Key: 7
3,115,411 UART: [art] Derive CDI
3,115,691 UART: [art] Store in in slot 0x4
3,201,400 UART: [art] Derive Key Pair
3,201,760 UART: [art] Store priv key in slot 0x5
3,215,142 UART: [art] Derive Key Pair - Done
3,229,791 UART: [art] Signing Cert with AUTHO
3,230,271 UART: RITY.KEYID = 7
3,244,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,576 UART: [art] PUB.X = F27B2892311FD961FDF2F57C6A3E81E6ED283D13AF7BFE5EA75C795134C5F2F1BFE20F72C736CC4E2D5C143F2BF5AA0A
3,252,362 UART: [art] PUB.Y = 5D39F6E0417EF2E7E8BA60EBC456F451C78F09882DD4E4296784B7CCD0CC622EF01022B70B54505C326B0B90B0E16B42
3,259,309 UART: [art] SIG.R = 5389AEB6E7044D3D794E17300BD1AF7F3CAB98086D50411AFE56A81CAEFAE20A8496C237EBBD24A270D4296FEFAC6DDB
3,266,089 UART: [art] SIG.S = A0916F617F4A35541D50F3323EEFA2D0848CB2E92DFC936D46B5FD182C0EC61B2D41DDC9491784C46104DB10085EA03A
3,289,251 UART: Caliptra RT
3,289,504 UART: [state] CFI Enabled
3,398,093 UART: [rt] RT listening for mailbox commands...
3,398,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,803 UART: [rt]cmd =0x41544d4e, len=14344
3,831,823 >>> mbox cmd response data (8 bytes)
3,831,824 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,037 UART: [rt]cmd =0x41545348, len=116
3,864,162 >>> mbox cmd response data (12 bytes)
3,864,163 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,624,758 >>> mbox cmd response: success
6,624,758 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,638,405 UART:
6,638,421 UART: Running Caliptra FMC ...
6,638,829 UART:
6,638,883 UART: [state] CFI Enabled
6,728,050 UART: [art] Extend RT PCRs Done
6,728,478 UART: [art] Lock RT PCRs Done
6,729,861 UART: [art] Populate DV Done
6,738,018 UART: [fht] FMC Alias Private Key: 7
6,739,068 UART: [art] Derive CDI
6,739,348 UART: [art] Store in in slot 0x4
6,825,157 UART: [art] Derive Key Pair
6,825,517 UART: [art] Store priv key in slot 0x5
6,838,325 UART: [art] Derive Key Pair - Done
6,853,306 UART: [art] Signing Cert with AUTHO
6,853,786 UART: RITY.KEYID = 7
6,868,904 UART: [art] Erasing AUTHORITY.KEYID = 7
6,869,669 UART: [art] PUB.X = 0BB69BC80593B92C04B576D219DC774E43EC01E6F1369711BF27788EF709F39D9ED0A295B431D5443390B984310DFBCC
6,876,423 UART: [art] PUB.Y = A96C889FB8E5D27A54897FD72CAEE76E7A479E0AD19CB9572A752829EFF2C66FF7C566A30262ABEDCB282FEDA28488F9
6,883,385 UART: [art] SIG.R = 301FD5E1D2D56F676EF589446C6BC7FE7B32D1869CBE7D739B0AAA2E3960EBF589D3C501A9895BE09EB8834F5FF615DE
6,890,165 UART: [art] SIG.S = 26CE6B0F3DA46CA1AD5291B9D0CD10EEA30CAC6343E39BF624DFCFE68C4359963813BEBEE6F653F78EB1BDAF0F8503EF
6,914,288 UART: Caliptra RT
6,914,541 UART: [state] CFI Enabled
7,195,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,226,130 UART: [rt]cmd =0x41545348, len=116
7,227,959 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,170 UART: [kat] SHA2-256
882,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,216 UART: [kat] ++
886,368 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
902,947 UART: [kat] HMAC-384Kdf
907,533 UART: [kat] LMS
1,475,729 UART: [kat] --
1,476,620 UART: [cold-reset] ++
1,477,152 UART: [fht] Storing FHT @ 0x50003400
1,479,787 UART: [idev] ++
1,479,955 UART: [idev] CDI.KEYID = 6
1,480,315 UART: [idev] SUBJECT.KEYID = 7
1,480,739 UART: [idev] UDS.KEYID = 0
1,481,084 ready_for_fw is high
1,481,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,499 UART: [idev] Erasing UDS.KEYID = 0
1,505,473 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,059 UART: [idev] --
1,514,916 UART: [ldev] ++
1,515,084 UART: [ldev] CDI.KEYID = 6
1,515,447 UART: [ldev] SUBJECT.KEYID = 5
1,515,873 UART: [ldev] AUTHORITY.KEYID = 7
1,516,336 UART: [ldev] FE.KEYID = 1
1,521,448 UART: [ldev] Erasing FE.KEYID = 1
1,546,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,563 UART: [ldev] --
1,585,898 UART: [fwproc] Waiting for Commands...
1,586,567 UART: [fwproc] Received command 0x46574c44
1,587,358 UART: [fwproc] Received Image of size 114168 bytes
2,883,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,878 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,797 >>> mbox cmd response: success
3,077,023 UART: [afmc] ++
3,077,191 UART: [afmc] CDI.KEYID = 6
3,077,553 UART: [afmc] SUBJECT.KEYID = 7
3,077,978 UART: [afmc] AUTHORITY.KEYID = 5
3,113,179 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,375 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,260 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,950 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,879 UART: [afmc] --
3,155,893 UART: [cold-reset] --
3,156,705 UART: [state] Locking Datavault
3,157,818 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,422 UART: [state] Locking ICCM
3,159,020 UART: [exit] Launching FMC @ 0x40000130
3,164,349 UART:
3,164,365 UART: Running Caliptra FMC ...
3,164,773 UART:
3,164,916 UART: [state] CFI Enabled
3,175,461 UART: [fht] FMC Alias Private Key: 7
3,284,028 UART: [art] Extend RT PCRs Done
3,284,456 UART: [art] Lock RT PCRs Done
3,286,340 UART: [art] Populate DV Done
3,294,549 UART: [fht] FMC Alias Private Key: 7
3,295,629 UART: [art] Derive CDI
3,295,909 UART: [art] Store in in slot 0x4
3,381,868 UART: [art] Derive Key Pair
3,382,228 UART: [art] Store priv key in slot 0x5
3,395,728 UART: [art] Derive Key Pair - Done
3,410,872 UART: [art] Signing Cert with AUTHO
3,411,352 UART: RITY.KEYID = 7
3,426,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,209 UART: [art] PUB.X = 9ED011E66C6D4D17F8A7A98E5EA42EEE93B7916667E53A64D78F25C5A725D656444A32D65D98DC1849975E9DADC4D01D
3,433,987 UART: [art] PUB.Y = 9A1D1EE6D45623E7B45D6DECA44852A11B5876892C8C2DA30E61D7F845688F41A20DA00C23C08095C65E366A4DC78922
3,440,930 UART: [art] SIG.R = BE61060373F1A23A7927FAC2B709ECAEC49F513C82281367040EF991BD5E5A5D4736A9C6DFEF9B5D942D06C598E263D7
3,447,690 UART: [art] SIG.S = 699EBB7F40AED058993700DA94014F06C88244535EA4ABA9C8CF1154BBB3678022D7963E468CBF33E03850A41C74AECE
3,471,755 UART: Caliptra RT
3,472,100 UART: [state] CFI Enabled
3,581,207 UART: [rt] RT listening for mailbox commands...
3,581,877 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,801 UART: [rt]cmd =0x41544d4e, len=14344
4,014,983 >>> mbox cmd response data (8 bytes)
4,014,984 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,953 UART: [rt]cmd =0x41545348, len=116
4,046,624 >>> mbox cmd response data (12 bytes)
4,046,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,177 UART:
4,047,193 UART: Running Caliptra ROM ...
4,047,601 UART:
4,047,742 UART: [state] CFI Enabled
4,050,416 UART: [state] LifecycleState = Unprovisioned
4,051,071 UART: [state] DebugLocked = No
4,051,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,053,340 UART: [kat] SHA2-256
4,847,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,851,386 UART: [kat] ++
4,851,538 UART: [kat] sha1
4,855,764 UART: [kat] SHA2-256
4,857,702 UART: [kat] SHA2-384
4,860,303 UART: [kat] SHA2-512-ACC
4,862,203 UART: [kat] ECC-384
4,867,966 UART: [kat] HMAC-384Kdf
4,872,476 UART: [kat] LMS
5,440,672 UART: [kat] --
5,441,555 UART: [update-reset] ++
6,774,395 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,775,645 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,925,275 >>> mbox cmd response: success
6,925,275 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,925,512 UART: [update-reset] Copying MAN_2 To MAN_1
6,933,526 UART: [update-reset Success] --
6,934,339 UART: [state] Locking Datavault
6,935,117 UART: [state] Locking PCR0, PCR1 and PCR31
6,935,721 UART: [state] Locking ICCM
6,936,379 UART: [exit] Launching FMC @ 0x40000130
6,941,708 UART:
6,941,724 UART: Running Caliptra FMC ...
6,942,132 UART:
6,942,275 UART: [state] CFI Enabled
7,031,652 UART: [art] Extend RT PCRs Done
7,032,080 UART: [art] Lock RT PCRs Done
7,033,227 UART: [art] Populate DV Done
7,041,638 UART: [fht] FMC Alias Private Key: 7
7,042,782 UART: [art] Derive CDI
7,043,062 UART: [art] Store in in slot 0x4
7,128,621 UART: [art] Derive Key Pair
7,128,981 UART: [art] Store priv key in slot 0x5
7,142,385 UART: [art] Derive Key Pair - Done
7,157,182 UART: [art] Signing Cert with AUTHO
7,157,662 UART: RITY.KEYID = 7
7,172,768 UART: [art] Erasing AUTHORITY.KEYID = 7
7,173,533 UART: [art] PUB.X = A10DAE57C52054930123A2AEB5D87573B7FEAF61C5B93B1318744E2E153EE9AB1A163E980DE003E0CA6C63B61A4CB736
7,180,301 UART: [art] PUB.Y = 224DD38C7CE26D4A138382F0B332275D207926D4C0A495FEE4CD1F2D9A573546895FC055E1100D483D3CBDE404663CE7
7,187,247 UART: [art] SIG.R = B66BEB524A5759B5B2D662819B1C88A37C289889F660C129C781367998A4070B2A0283A222474249177FE94C30319C92
7,193,992 UART: [art] SIG.S = 8BF81109DF4F609214ECDB2DD94DD78EDA89E4215A07938136FCF343AD0CE8D9BD047656F1C64C34424B17621C7AB1B7
7,217,007 UART: Caliptra RT
7,217,352 UART: [state] CFI Enabled
7,502,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,533,399 UART: [rt]cmd =0x41545348, len=116
7,535,468 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,486 ready_for_fw is high
1,363,486 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,725 >>> mbox cmd response: success
2,988,031 UART:
2,988,047 UART: Running Caliptra FMC ...
2,988,455 UART:
2,988,598 UART: [state] CFI Enabled
2,999,279 UART: [fht] FMC Alias Private Key: 7
3,107,380 UART: [art] Extend RT PCRs Done
3,107,808 UART: [art] Lock RT PCRs Done
3,109,574 UART: [art] Populate DV Done
3,117,715 UART: [fht] FMC Alias Private Key: 7
3,118,823 UART: [art] Derive CDI
3,119,103 UART: [art] Store in in slot 0x4
3,205,072 UART: [art] Derive Key Pair
3,205,432 UART: [art] Store priv key in slot 0x5
3,218,544 UART: [art] Derive Key Pair - Done
3,232,989 UART: [art] Signing Cert with AUTHO
3,233,469 UART: RITY.KEYID = 7
3,248,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,444 UART: [art] PUB.X = 087C4BF263D2B7864ACCFF2810F46B1E3B1D370AA3AEFCA8E7518F8EE11AB3572A1E2D35D44680FDE891208C247797BF
3,256,222 UART: [art] PUB.Y = 02FF46F79C400129197F6068197BC8B05336F45C9FE6679E3A0E0B5D1AB2A39515B0C48A13E2C7909AFA2D88D3C0B93E
3,263,164 UART: [art] SIG.R = 0FDCC1D006B053819A020290F8F22D8F0364E89D59E939DA364ABE00D4EE8CCC9A79B830374874BDCA125B21C97A25EC
3,269,907 UART: [art] SIG.S = 8FBAF05D8EA799FB692EE705A3178F8205E2AAC3649F47879FE800B0B05DA865868AB14A0D76EFD2F4E7D2255A3E6AE1
3,293,851 UART: Caliptra RT
3,294,196 UART: [state] CFI Enabled
3,402,691 UART: [rt] RT listening for mailbox commands...
3,403,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,419 UART: [rt]cmd =0x41544d4e, len=14344
3,836,151 >>> mbox cmd response data (8 bytes)
3,836,152 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,181 UART: [rt]cmd =0x41545348, len=116
3,868,224 >>> mbox cmd response data (12 bytes)
3,868,225 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,626,903 >>> mbox cmd response: success
6,626,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,640,426 UART:
6,640,442 UART: Running Caliptra FMC ...
6,640,850 UART:
6,640,993 UART: [state] CFI Enabled
6,729,986 UART: [art] Extend RT PCRs Done
6,730,414 UART: [art] Lock RT PCRs Done
6,731,577 UART: [art] Populate DV Done
6,739,816 UART: [fht] FMC Alias Private Key: 7
6,740,878 UART: [art] Derive CDI
6,741,158 UART: [art] Store in in slot 0x4
6,826,921 UART: [art] Derive Key Pair
6,827,281 UART: [art] Store priv key in slot 0x5
6,840,157 UART: [art] Derive Key Pair - Done
6,855,174 UART: [art] Signing Cert with AUTHO
6,855,654 UART: RITY.KEYID = 7
6,871,114 UART: [art] Erasing AUTHORITY.KEYID = 7
6,871,879 UART: [art] PUB.X = 39A8C038F7B6D307600952F67D22C225A825463CEDF6705B62A85C4C507CDC7364923D12F63C8AD14DFEA6599F3875DE
6,878,645 UART: [art] PUB.Y = 967207D7DF5116E3E019956C010F2A3AD35A0220F7CC416445D326A9EB52E9174627066907373AE7ACC8AFEE6EE1763E
6,885,577 UART: [art] SIG.R = 9D24BCC66EDF109417365D1E89408D0A61B2F19E8731FBD3043B78A0221282831094A524B9A89D76E1728829A54053F8
6,892,331 UART: [art] SIG.S = AC55183D492F37ADD35472DF68E953ABB5833F1862CBD438D6E89199F6A53FC8C2988F8F229A348637E7CA3AC7913249
6,916,296 UART: Caliptra RT
6,916,641 UART: [state] CFI Enabled
7,200,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,231,654 UART: [rt]cmd =0x41545348, len=116
7,233,595 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
893,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,415 UART: [kat] ++
897,567 UART: [kat] sha1
901,583 UART: [kat] SHA2-256
903,523 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
918,280 UART: [kat] HMAC-384Kdf
922,868 UART: [kat] LMS
1,171,196 UART: [kat] --
1,171,909 UART: [cold-reset] ++
1,172,363 UART: [fht] FHT @ 0x50003400
1,175,016 UART: [idev] ++
1,175,184 UART: [idev] CDI.KEYID = 6
1,175,544 UART: [idev] SUBJECT.KEYID = 7
1,175,968 UART: [idev] UDS.KEYID = 0
1,176,313 ready_for_fw is high
1,176,313 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,920 UART: [idev] Erasing UDS.KEYID = 0
1,201,445 UART: [idev] Sha1 KeyId Algorithm
1,209,861 UART: [idev] --
1,210,951 UART: [ldev] ++
1,211,119 UART: [ldev] CDI.KEYID = 6
1,211,482 UART: [ldev] SUBJECT.KEYID = 5
1,211,908 UART: [ldev] AUTHORITY.KEYID = 7
1,212,371 UART: [ldev] FE.KEYID = 1
1,217,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,421 UART: [ldev] --
1,282,816 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,528 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,007 >>> mbox cmd response: success
2,773,269 UART: [afmc] ++
2,773,437 UART: [afmc] CDI.KEYID = 6
2,773,799 UART: [afmc] SUBJECT.KEYID = 7
2,774,224 UART: [afmc] AUTHORITY.KEYID = 5
2,810,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,580 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,193 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,912 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,850 UART: [afmc] --
2,853,940 UART: [cold-reset] --
2,854,910 UART: [state] Locking Datavault
2,856,055 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,659 UART: [state] Locking ICCM
2,857,179 UART: [exit] Launching FMC @ 0x40000130
2,862,508 UART:
2,862,524 UART: Running Caliptra FMC ...
2,862,932 UART:
2,862,986 UART: [state] CFI Enabled
2,873,543 UART: [fht] FMC Alias Private Key: 7
2,981,408 UART: [art] Extend RT PCRs Done
2,981,836 UART: [art] Lock RT PCRs Done
2,983,534 UART: [art] Populate DV Done
2,992,075 UART: [fht] FMC Alias Private Key: 7
2,993,049 UART: [art] Derive CDI
2,993,329 UART: [art] Store in in slot 0x4
3,078,858 UART: [art] Derive Key Pair
3,079,218 UART: [art] Store priv key in slot 0x5
3,092,262 UART: [art] Derive Key Pair - Done
3,107,034 UART: [art] Signing Cert with AUTHO
3,107,514 UART: RITY.KEYID = 7
3,122,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,403 UART: [art] PUB.X = 5E803FB7B3F793F3D49853724969F6ADF0523C6D004BC1A7E3B3D728A09DF4972845FC74FE81A9703970E8671F76CFFF
3,130,155 UART: [art] PUB.Y = A0D1C9EE5C38A71AE9569A08F6FA013E69B5B746EC055420D00D9EF6B081705A0B620573044A81CFA82707AF2F07D529
3,137,082 UART: [art] SIG.R = B4D630975210B452120C95BC6F8E1901C6AF0422112EC9ABC5D34E7F79CC1F8091CFBA6FA85C1BC0D2C1FD18C4BD341E
3,143,859 UART: [art] SIG.S = 802607C4443AD9C83DEE1B312D0A81082508D51B7E3316E02CE139D880C2C62052120B4B0D63509D83BD58B3513908AE
3,167,711 UART: Caliptra RT
3,167,964 UART: [state] CFI Enabled
3,275,994 UART: [rt] RT listening for mailbox commands...
3,276,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,602 UART: [rt]cmd =0x41544d4e, len=14344
3,710,216 >>> mbox cmd response data (8 bytes)
3,710,217 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,364 UART: [rt]cmd =0x41545348, len=116
3,742,079 >>> mbox cmd response data (12 bytes)
3,742,080 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,757 UART:
3,742,773 UART: Running Caliptra ROM ...
3,743,181 UART:
3,743,236 UART: [state] CFI Enabled
3,746,012 UART: [state] LifecycleState = Unprovisioned
3,746,667 UART: [state] DebugLocked = No
3,747,351 UART: [state] WD Timer not started. Device not locked for debugging
3,748,695 UART: [kat] SHA2-256
4,554,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,558,470 UART: [kat] ++
4,558,622 UART: [kat] sha1
4,562,988 UART: [kat] SHA2-256
4,564,928 UART: [kat] SHA2-384
4,567,601 UART: [kat] SHA2-512-ACC
4,569,501 UART: [kat] ECC-384
4,578,814 UART: [kat] HMAC-384Kdf
4,583,400 UART: [kat] LMS
4,831,728 UART: [kat] --
4,832,454 UART: [update-reset] ++
6,142,498 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,143,513 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,293,091 >>> mbox cmd response: success
6,293,091 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,293,394 UART: [update-reset] Copying MAN_2 To MAN_1
6,301,408 UART: [update-reset Success] --
6,302,447 UART: [state] Locking Datavault
6,303,117 UART: [state] Locking PCR0, PCR1 and PCR31
6,303,721 UART: [state] Locking ICCM
6,304,205 UART: [exit] Launching FMC @ 0x40000130
6,309,534 UART:
6,309,550 UART: Running Caliptra FMC ...
6,309,958 UART:
6,310,012 UART: [state] CFI Enabled
6,398,583 UART: [art] Extend RT PCRs Done
6,399,011 UART: [art] Lock RT PCRs Done
6,400,360 UART: [art] Populate DV Done
6,408,731 UART: [fht] FMC Alias Private Key: 7
6,409,761 UART: [art] Derive CDI
6,410,041 UART: [art] Store in in slot 0x4
6,495,440 UART: [art] Derive Key Pair
6,495,800 UART: [art] Store priv key in slot 0x5
6,508,308 UART: [art] Derive Key Pair - Done
6,523,152 UART: [art] Signing Cert with AUTHO
6,523,632 UART: RITY.KEYID = 7
6,539,002 UART: [art] Erasing AUTHORITY.KEYID = 7
6,539,767 UART: [art] PUB.X = 43199F53558FBCEE363735AA368B7C571D0A9BF19572EB436AD3DCA6E74170C0F735BC309C8A5F5B3FDA2E24F92B28DD
6,546,548 UART: [art] PUB.Y = 32BC2EC09327C4414C1C2D2F93211150A7260FD94B0702B5CBD6FC51A849F03FEAF10BE6327E4439AC7BDD348FC74855
6,553,494 UART: [art] SIG.R = 16FB4B951432E971E968487E4AB6D86D17B07F7090DEA27876B39D7ADD65B6CAB910ED9231E21140CE02746BC5679465
6,560,261 UART: [art] SIG.S = CEC6B6A373FDEDF9E115F60C73EDB95FA1C87D25EA5B1D3EDB71861EF4F603938BBBCAF35A871A5FD86FF2CFCD2081CB
6,584,132 UART: Caliptra RT
6,584,385 UART: [state] CFI Enabled
6,868,296 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,898,943 UART: [rt]cmd =0x41545348, len=116
6,900,550 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,831 ready_for_fw is high
1,059,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,932 >>> mbox cmd response: success
2,685,676 UART:
2,685,692 UART: Running Caliptra FMC ...
2,686,100 UART:
2,686,154 UART: [state] CFI Enabled
2,696,123 UART: [fht] FMC Alias Private Key: 7
2,804,082 UART: [art] Extend RT PCRs Done
2,804,510 UART: [art] Lock RT PCRs Done
2,806,198 UART: [art] Populate DV Done
2,814,411 UART: [fht] FMC Alias Private Key: 7
2,815,437 UART: [art] Derive CDI
2,815,717 UART: [art] Store in in slot 0x4
2,901,266 UART: [art] Derive Key Pair
2,901,626 UART: [art] Store priv key in slot 0x5
2,914,752 UART: [art] Derive Key Pair - Done
2,929,652 UART: [art] Signing Cert with AUTHO
2,930,132 UART: RITY.KEYID = 7
2,944,912 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,677 UART: [art] PUB.X = 80C4183EA6E1C8E44F09FB6A7ECD2373656442F212E404331FFA31B161DD08B3404D44A548F2F99519956FE64941AA1E
2,952,438 UART: [art] PUB.Y = 4E9EC6DDD34EA3758CCA1B337FC689A1D3251E40D0839048BEDB6D82F3CAA03AC9B7E4A7C7010B3193EDFC1726C97FEB
2,959,404 UART: [art] SIG.R = 292002853CAFCA258965C22A1396E8DAE9A6548D52827A0B1292E36483BA578D9E7CF4B92EED281CC99E4BC0926CC22E
2,966,174 UART: [art] SIG.S = 3235577C747CE355EA4AE3B74AEEB30B6857CAD1B8D1BBBD5123292C494EDA85EF6F9BF442B04F23AA6B8BAC2617DBE8
2,990,218 UART: Caliptra RT
2,990,471 UART: [state] CFI Enabled
3,098,326 UART: [rt] RT listening for mailbox commands...
3,098,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,008 UART: [rt]cmd =0x41544d4e, len=14344
3,531,190 >>> mbox cmd response data (8 bytes)
3,531,191 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,338 UART: [rt]cmd =0x41545348, len=116
3,563,067 >>> mbox cmd response data (12 bytes)
3,563,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,872 >>> mbox cmd response: success
5,997,872 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,011,360 UART:
6,011,376 UART: Running Caliptra FMC ...
6,011,784 UART:
6,011,838 UART: [state] CFI Enabled
6,101,285 UART: [art] Extend RT PCRs Done
6,101,713 UART: [art] Lock RT PCRs Done
6,103,020 UART: [art] Populate DV Done
6,110,965 UART: [fht] FMC Alias Private Key: 7
6,112,011 UART: [art] Derive CDI
6,112,291 UART: [art] Store in in slot 0x4
6,197,516 UART: [art] Derive Key Pair
6,197,876 UART: [art] Store priv key in slot 0x5
6,210,868 UART: [art] Derive Key Pair - Done
6,226,040 UART: [art] Signing Cert with AUTHO
6,226,520 UART: RITY.KEYID = 7
6,241,924 UART: [art] Erasing AUTHORITY.KEYID = 7
6,242,689 UART: [art] PUB.X = 605D3CC0783F484938516DBDE59AADFB301452BDC91F05F3570D90385B4F3139E6462449E16F90BA036389E2CCA7A209
6,249,447 UART: [art] PUB.Y = 3E9D79C8DC87001672FA4BCD9BB5369466275CD27060BB485298A21C3E1419C65DEE0495F1D25CEDDCDEAC9B9800DDBA
6,256,366 UART: [art] SIG.R = BAEF07BE7466FC6006F98AEAF0346D20209E3B7B4E399D2AAC20441A70EAB52506E3AEDEDCF28152CF828238FE57A802
6,263,140 UART: [art] SIG.S = B33E0C34A50B42D9CB2BC4D8A537B24F1177EEBEB8E6BD9F1BE1B5C3B73BC8052936260A9B799093BD2B91AE919F0605
6,286,285 UART: Caliptra RT
6,286,538 UART: [state] CFI Enabled
6,570,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,601,275 UART: [rt]cmd =0x41545348, len=116
6,603,190 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,228 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
893,193 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,318 UART: [kat] ++
897,470 UART: [kat] sha1
901,504 UART: [kat] SHA2-256
903,444 UART: [kat] SHA2-384
906,047 UART: [kat] SHA2-512-ACC
907,948 UART: [kat] ECC-384
917,901 UART: [kat] HMAC-384Kdf
922,389 UART: [kat] LMS
1,170,717 UART: [kat] --
1,171,468 UART: [cold-reset] ++
1,171,890 UART: [fht] FHT @ 0x50003400
1,174,313 UART: [idev] ++
1,174,481 UART: [idev] CDI.KEYID = 6
1,174,841 UART: [idev] SUBJECT.KEYID = 7
1,175,265 UART: [idev] UDS.KEYID = 0
1,175,610 ready_for_fw is high
1,175,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,391 UART: [idev] Erasing UDS.KEYID = 0
1,200,548 UART: [idev] Sha1 KeyId Algorithm
1,208,986 UART: [idev] --
1,209,866 UART: [ldev] ++
1,210,034 UART: [ldev] CDI.KEYID = 6
1,210,397 UART: [ldev] SUBJECT.KEYID = 5
1,210,823 UART: [ldev] AUTHORITY.KEYID = 7
1,211,286 UART: [ldev] FE.KEYID = 1
1,216,480 UART: [ldev] Erasing FE.KEYID = 1
1,242,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,512 UART: [ldev] --
1,281,929 UART: [fwproc] Wait for Commands...
1,282,699 UART: [fwproc] Recv command 0x46574c44
1,283,427 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,780 >>> mbox cmd response: success
2,773,020 UART: [afmc] ++
2,773,188 UART: [afmc] CDI.KEYID = 6
2,773,550 UART: [afmc] SUBJECT.KEYID = 7
2,773,975 UART: [afmc] AUTHORITY.KEYID = 5
2,809,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,969 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,697 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,582 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,219 UART: [afmc] --
2,853,283 UART: [cold-reset] --
2,854,065 UART: [state] Locking Datavault
2,855,342 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,946 UART: [state] Locking ICCM
2,856,544 UART: [exit] Launching FMC @ 0x40000130
2,861,873 UART:
2,861,889 UART: Running Caliptra FMC ...
2,862,297 UART:
2,862,440 UART: [state] CFI Enabled
2,872,949 UART: [fht] FMC Alias Private Key: 7
2,980,172 UART: [art] Extend RT PCRs Done
2,980,600 UART: [art] Lock RT PCRs Done
2,982,228 UART: [art] Populate DV Done
2,990,663 UART: [fht] FMC Alias Private Key: 7
2,991,797 UART: [art] Derive CDI
2,992,077 UART: [art] Store in in slot 0x4
3,077,882 UART: [art] Derive Key Pair
3,078,242 UART: [art] Store priv key in slot 0x5
3,091,124 UART: [art] Derive Key Pair - Done
3,105,571 UART: [art] Signing Cert with AUTHO
3,106,051 UART: RITY.KEYID = 7
3,121,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,942 UART: [art] PUB.X = EEA619CD9B37ACD1F23244745F48BBB160AAF5F891B8416493606798CEA4287EF2EDB2C0423C278A57849F694B5EF346
3,128,718 UART: [art] PUB.Y = D46675A3B5968428FD294EA431F347DCA3807C000D148FD0A34569B82374330B7A22800E5525182C9834194417105A3B
3,135,621 UART: [art] SIG.R = F06AA1B9468F28C62402AA24A308EEEEE64E33029175A9559C2806F413DA964811C8D479F7FAE796C16EB749B7278889
3,142,377 UART: [art] SIG.S = B0E3D1827FC324C1B42AB84128A0CEFD5D1FC846D1611A20697D55896C60C614E0017DB538317AD8CC44CCCF7A1057B8
3,166,173 UART: Caliptra RT
3,166,518 UART: [state] CFI Enabled
3,275,346 UART: [rt] RT listening for mailbox commands...
3,276,016 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,076 UART: [rt]cmd =0x41544d4e, len=14344
3,709,038 >>> mbox cmd response data (8 bytes)
3,709,039 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,080 UART: [rt]cmd =0x41545348, len=116
3,740,827 >>> mbox cmd response data (12 bytes)
3,740,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,489 UART:
3,741,505 UART: Running Caliptra ROM ...
3,741,913 UART:
3,742,055 UART: [state] CFI Enabled
3,744,819 UART: [state] LifecycleState = Unprovisioned
3,745,474 UART: [state] DebugLocked = No
3,746,004 UART: [state] WD Timer not started. Device not locked for debugging
3,747,286 UART: [kat] SHA2-256
4,552,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,557,061 UART: [kat] ++
4,557,213 UART: [kat] sha1
4,561,327 UART: [kat] SHA2-256
4,563,267 UART: [kat] SHA2-384
4,565,930 UART: [kat] SHA2-512-ACC
4,567,830 UART: [kat] ECC-384
4,577,795 UART: [kat] HMAC-384Kdf
4,582,473 UART: [kat] LMS
4,830,801 UART: [kat] --
4,831,775 UART: [update-reset] ++
6,142,029 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,143,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,292,806 >>> mbox cmd response: success
6,292,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,293,061 UART: [update-reset] Copying MAN_2 To MAN_1
6,301,075 UART: [update-reset Success] --
6,302,230 UART: [state] Locking Datavault
6,303,054 UART: [state] Locking PCR0, PCR1 and PCR31
6,303,658 UART: [state] Locking ICCM
6,304,296 UART: [exit] Launching FMC @ 0x40000130
6,309,625 UART:
6,309,641 UART: Running Caliptra FMC ...
6,310,049 UART:
6,310,192 UART: [state] CFI Enabled
6,398,861 UART: [art] Extend RT PCRs Done
6,399,289 UART: [art] Lock RT PCRs Done
6,400,632 UART: [art] Populate DV Done
6,408,907 UART: [fht] FMC Alias Private Key: 7
6,410,075 UART: [art] Derive CDI
6,410,355 UART: [art] Store in in slot 0x4
6,496,364 UART: [art] Derive Key Pair
6,496,724 UART: [art] Store priv key in slot 0x5
6,510,116 UART: [art] Derive Key Pair - Done
6,524,663 UART: [art] Signing Cert with AUTHO
6,525,143 UART: RITY.KEYID = 7
6,540,745 UART: [art] Erasing AUTHORITY.KEYID = 7
6,541,510 UART: [art] PUB.X = 1512A07B27DF283B0B2F1F1FDCE258B7875F5D320D39078FCB8CDA3ABD6434DEBB70AA42EEE30D294F1E6804675E2C50
6,548,281 UART: [art] PUB.Y = 5D9FB588B55559965C054E2519CDC8D3249BF89F8B32974848BF3293044EBEF2A922118F6EB35ABDCDCBB530B9ADC8E0
6,555,237 UART: [art] SIG.R = F539757744EA63B8FC43090352956859181D7C8D3F443B9DC74A3BDF22CAE4BFD3373D16CDBFB74CA46EA9958B198CA2
6,562,011 UART: [art] SIG.S = AEDD393C33865B15A356AD174C2967517DB3CD33B324CA55EEA68B9324D75ED909E71EB96AB8540017C835AC8F7B2339
6,586,113 UART: Caliptra RT
6,586,458 UART: [state] CFI Enabled
6,863,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,893,927 UART: [rt]cmd =0x41545348, len=116
6,895,608 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,036 ready_for_fw is high
1,061,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,997 >>> mbox cmd response: success
2,688,475 UART:
2,688,491 UART: Running Caliptra FMC ...
2,688,899 UART:
2,689,042 UART: [state] CFI Enabled
2,700,021 UART: [fht] FMC Alias Private Key: 7
2,808,276 UART: [art] Extend RT PCRs Done
2,808,704 UART: [art] Lock RT PCRs Done
2,810,466 UART: [art] Populate DV Done
2,818,369 UART: [fht] FMC Alias Private Key: 7
2,819,381 UART: [art] Derive CDI
2,819,661 UART: [art] Store in in slot 0x4
2,905,420 UART: [art] Derive Key Pair
2,905,780 UART: [art] Store priv key in slot 0x5
2,919,118 UART: [art] Derive Key Pair - Done
2,933,877 UART: [art] Signing Cert with AUTHO
2,934,357 UART: RITY.KEYID = 7
2,950,267 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,032 UART: [art] PUB.X = B778A5F6831EAFB26BF9940DCF3E9C37D5337E412248A1E92FBFBFA30D9DAE164CE2CF72CAD45B22E0C769D30AFEA0C5
2,957,819 UART: [art] PUB.Y = 4A07916CBECF749DE97AAEF666F700EE49B92EEA9CB8CF29AEE57C19717E9FF73B6607711355F78C8FC2487A2E0608BB
2,964,751 UART: [art] SIG.R = 40ED63E615188242A3354C0BDE61519D33E274607A3B93506B483BDE4639FA61757ACD793C6ED9F4AE4B9F363B351CB7
2,971,520 UART: [art] SIG.S = B5DAADB59204936741B2D8604384568CED0A7D22996D1A3B9808AC8DF9F0B3FB8619D8EA140CE2FE144977C0A01A82A9
2,995,571 UART: Caliptra RT
2,995,916 UART: [state] CFI Enabled
3,103,731 UART: [rt] RT listening for mailbox commands...
3,104,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,333 UART: [rt]cmd =0x41544d4e, len=14344
3,537,247 >>> mbox cmd response data (8 bytes)
3,537,248 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,385 UART: [rt]cmd =0x41545348, len=116
3,569,286 >>> mbox cmd response data (12 bytes)
3,569,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,492 >>> mbox cmd response: success
6,006,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,019,870 UART:
6,019,886 UART: Running Caliptra FMC ...
6,020,294 UART:
6,020,437 UART: [state] CFI Enabled
6,109,712 UART: [art] Extend RT PCRs Done
6,110,140 UART: [art] Lock RT PCRs Done
6,111,125 UART: [art] Populate DV Done
6,119,232 UART: [fht] FMC Alias Private Key: 7
6,120,182 UART: [art] Derive CDI
6,120,462 UART: [art] Store in in slot 0x4
6,206,257 UART: [art] Derive Key Pair
6,206,617 UART: [art] Store priv key in slot 0x5
6,219,769 UART: [art] Derive Key Pair - Done
6,234,570 UART: [art] Signing Cert with AUTHO
6,235,050 UART: RITY.KEYID = 7
6,250,468 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,233 UART: [art] PUB.X = 10827FA16DBE71F598645E102A9F32B700DBD131017F59E774A91661FFDD0EBBDD95889EBC1C2C9D67A3E6C1B1E6537E
6,257,987 UART: [art] PUB.Y = 520D8AC31494B5C86A21D5A57766CC22086EA7088BD21FFEE64D9699E2D8933E5428954A8435BD781AF7E5EA21785FEA
6,264,932 UART: [art] SIG.R = 47BE5A66930BF122408F6D2B4BB3AB660CDC3352A9E0291EE06AD7E2F4C9825EF2CA24E9F0AF01F6C418D015DF2425A9
6,271,707 UART: [art] SIG.S = 84A7D6D5B9DEBF9AF02FDEF420B032C9AC80BEEC460B49733F979FEB579CAE4717084AFE5EFBCFF2857C1D0C88E05E31
6,295,045 UART: Caliptra RT
6,295,390 UART: [state] CFI Enabled
6,576,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,607,626 UART: [rt]cmd =0x41545348, len=116
6,609,429 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,446 UART: [state] LifecycleState = Unprovisioned
86,101 UART: [state] DebugLocked = No
86,837 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,149 UART: [kat] SHA2-256
902,089 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
916,606 UART: [kat] HMAC-384Kdf
921,292 UART: [kat] LMS
1,169,604 UART: [kat] --
1,170,151 UART: [cold-reset] ++
1,170,675 UART: [fht] FHT @ 0x50003400
1,173,241 UART: [idev] ++
1,173,409 UART: [idev] CDI.KEYID = 6
1,173,770 UART: [idev] SUBJECT.KEYID = 7
1,174,195 UART: [idev] UDS.KEYID = 0
1,174,541 ready_for_fw is high
1,174,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,167 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,962 UART: [ldev] ++
1,209,130 UART: [ldev] CDI.KEYID = 6
1,209,494 UART: [ldev] SUBJECT.KEYID = 5
1,209,921 UART: [ldev] AUTHORITY.KEYID = 7
1,210,384 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,230 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,505 UART: [fwproc] Recv command 0x46574c44
1,282,238 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,107 >>> mbox cmd response: success
2,770,376 UART: [afmc] ++
2,770,544 UART: [afmc] CDI.KEYID = 6
2,770,907 UART: [afmc] SUBJECT.KEYID = 7
2,771,333 UART: [afmc] AUTHORITY.KEYID = 5
2,806,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,093 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,325 UART: [afmc] --
2,850,409 UART: [cold-reset] --
2,851,219 UART: [state] Locking Datavault
2,852,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,982 UART: [state] Locking ICCM
2,853,422 UART: [exit] Launching FMC @ 0x40000130
2,858,751 UART:
2,858,767 UART: Running Caliptra FMC ...
2,859,175 UART:
2,859,229 UART: [state] CFI Enabled
2,870,014 UART: [fht] FMC Alias Private Key: 7
2,977,285 UART: [art] Extend RT PCRs Done
2,977,713 UART: [art] Lock RT PCRs Done
2,979,413 UART: [art] Populate DV Done
2,987,400 UART: [fht] FMC Alias Private Key: 7
2,988,488 UART: [art] Derive CDI
2,988,768 UART: [art] Store in in slot 0x4
3,074,209 UART: [art] Derive Key Pair
3,074,569 UART: [art] Store priv key in slot 0x5
3,087,739 UART: [art] Derive Key Pair - Done
3,102,588 UART: [art] Signing Cert with AUTHO
3,103,068 UART: RITY.KEYID = 7
3,118,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,059 UART: [art] PUB.X = 2DB1534F6986D497C6E1BDC50CEAB927EB7087A2A02409949F20764891427846280C887610CDF6E1336D9149ECFAD071
3,125,816 UART: [art] PUB.Y = 14C735359996F8CF5C8AB5832C446318D49D337E8FCEFB72CC14ECFF61B493D61E487DE035441599B74E482F51A24A17
3,132,768 UART: [art] SIG.R = BE83E6DB77E1D0D9E6D21226221B427C27882B1C2D6A62B3225C30B151C82572BE71EE735E426D4E7073FCCE4BB85CF2
3,139,546 UART: [art] SIG.S = E5E8FD8330B868AFB9AD7719E90ABE81E4900939318B176DA36B4A8AA8B442A9A600A6261CF3448F76C8E1A7A68B0DE8
3,163,078 UART: Caliptra RT
3,163,331 UART: [state] CFI Enabled
3,271,221 UART: [rt] RT listening for mailbox commands...
3,271,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,085 UART: [rt]cmd =0x41544d4e, len=14344
3,705,091 >>> mbox cmd response data (8 bytes)
3,705,092 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,169 UART: [rt]cmd =0x41545348, len=116
3,737,054 >>> mbox cmd response data (12 bytes)
3,737,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,766 UART:
3,737,782 UART: Running Caliptra ROM ...
3,738,190 UART:
3,738,245 UART: [state] CFI Enabled
3,741,191 UART: [state] LifecycleState = Unprovisioned
3,741,846 UART: [state] DebugLocked = No
3,742,376 UART: [state] WD Timer not started. Device not locked for debugging
3,743,566 UART: [kat] SHA2-256
4,547,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,551,245 UART: [kat] ++
4,551,397 UART: [kat] sha1
4,555,723 UART: [kat] SHA2-256
4,557,663 UART: [kat] SHA2-384
4,560,322 UART: [kat] SHA2-512-ACC
4,562,222 UART: [kat] ECC-384
4,571,513 UART: [kat] HMAC-384Kdf
4,576,159 UART: [kat] LMS
4,824,471 UART: [kat] --
4,825,339 UART: [update-reset] ++
6,135,018 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,136,213 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,285,791 >>> mbox cmd response: success
6,285,791 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,285,894 UART: [update-reset] Copying MAN_2 To MAN_1
6,293,908 UART: [update-reset Success] --
6,294,927 UART: [state] Locking Datavault
6,295,765 UART: [state] Locking PCR0, PCR1 and PCR31
6,296,369 UART: [state] Locking ICCM
6,296,887 UART: [exit] Launching FMC @ 0x40000130
6,302,216 UART:
6,302,232 UART: Running Caliptra FMC ...
6,302,640 UART:
6,302,694 UART: [state] CFI Enabled
6,392,001 UART: [art] Extend RT PCRs Done
6,392,429 UART: [art] Lock RT PCRs Done
6,393,790 UART: [art] Populate DV Done
6,402,119 UART: [fht] FMC Alias Private Key: 7
6,403,087 UART: [art] Derive CDI
6,403,367 UART: [art] Store in in slot 0x4
6,488,888 UART: [art] Derive Key Pair
6,489,248 UART: [art] Store priv key in slot 0x5
6,501,942 UART: [art] Derive Key Pair - Done
6,516,501 UART: [art] Signing Cert with AUTHO
6,516,981 UART: RITY.KEYID = 7
6,531,991 UART: [art] Erasing AUTHORITY.KEYID = 7
6,532,756 UART: [art] PUB.X = 37A07AC6B47EBF36C7F43183E739A269B2B3E297BD09863D09187938595BAFD66565DAE2AE7A89D5A4ACFF48FEFD3677
6,539,532 UART: [art] PUB.Y = C020027700C5EA499C00E2D530CDFC6AE6CA76DD000E226D2F0E4032C58613CC46EC518FD80244166F6A798C9B8E1705
6,546,405 UART: [art] SIG.R = 1CF5DF7DCCDDE834A0967A17BD168D0693E331B8173DC1F9FB5FE5565215992E7CF38920E391C8ADAAEBA1CB61F48573
6,553,188 UART: [art] SIG.S = 683A8DA333BBC7AE407C2617EF94A8C50CBC3E8A089659E6B21DD58AF641E0262C35EB1083E6C5FBF8CE877DEDB2B5F8
6,576,775 UART: Caliptra RT
6,577,028 UART: [state] CFI Enabled
6,857,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,888,786 UART: [rt]cmd =0x41545348, len=116
6,890,403 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,278 ready_for_fw is high
1,056,278 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,519 >>> mbox cmd response: success
2,681,387 UART:
2,681,403 UART: Running Caliptra FMC ...
2,681,811 UART:
2,681,865 UART: [state] CFI Enabled
2,692,118 UART: [fht] FMC Alias Private Key: 7
2,800,043 UART: [art] Extend RT PCRs Done
2,800,471 UART: [art] Lock RT PCRs Done
2,801,739 UART: [art] Populate DV Done
2,809,992 UART: [fht] FMC Alias Private Key: 7
2,811,130 UART: [art] Derive CDI
2,811,410 UART: [art] Store in in slot 0x4
2,897,069 UART: [art] Derive Key Pair
2,897,429 UART: [art] Store priv key in slot 0x5
2,910,837 UART: [art] Derive Key Pair - Done
2,925,508 UART: [art] Signing Cert with AUTHO
2,925,988 UART: RITY.KEYID = 7
2,941,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,999 UART: [art] PUB.X = E76ABC732BF14B75B9F91CE0589FB2992D52562E90C8D5DF6430743F222DA1F4DD176CE4CCB37500E9E060666E1063E8
2,948,753 UART: [art] PUB.Y = E9B6129BC436DEB3004E0700B48A7EE0F478EBD35771D84679D2E10DC6F8EAFF6550EA65FF2F21357F942849819258D0
2,955,657 UART: [art] SIG.R = 80D66FE89FE8D430999F0E020D4B43CCF0D8FF484AB395FDF51A485A5E5461723919344302A39F02360F8CA8C6EECBD6
2,962,417 UART: [art] SIG.S = C95D9A0869F7D74EE0C90BED50B090AD91A8932F5B2888FDFB39FD4E50728132F819CAE5147AB08258EDDA8C27A67FA1
2,986,450 UART: Caliptra RT
2,986,703 UART: [state] CFI Enabled
3,094,797 UART: [rt] RT listening for mailbox commands...
3,095,467 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,541 UART: [rt]cmd =0x41544d4e, len=14344
3,527,883 >>> mbox cmd response data (8 bytes)
3,527,884 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,015 UART: [rt]cmd =0x41545348, len=116
3,559,984 >>> mbox cmd response data (12 bytes)
3,559,985 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,990,562 >>> mbox cmd response: success
5,990,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,003,842 UART:
6,003,858 UART: Running Caliptra FMC ...
6,004,266 UART:
6,004,320 UART: [state] CFI Enabled
6,092,717 UART: [art] Extend RT PCRs Done
6,093,145 UART: [art] Lock RT PCRs Done
6,094,342 UART: [art] Populate DV Done
6,102,483 UART: [fht] FMC Alias Private Key: 7
6,103,657 UART: [art] Derive CDI
6,103,937 UART: [art] Store in in slot 0x4
6,189,742 UART: [art] Derive Key Pair
6,190,102 UART: [art] Store priv key in slot 0x5
6,202,848 UART: [art] Derive Key Pair - Done
6,217,576 UART: [art] Signing Cert with AUTHO
6,218,056 UART: RITY.KEYID = 7
6,233,654 UART: [art] Erasing AUTHORITY.KEYID = 7
6,234,419 UART: [art] PUB.X = 8125654620792A0AB9EAC7BF6B3D9A7543E157F044C41FDD75D41BE32AAB7BCA4C35E43795E95E1F0B0D271CB411A222
6,241,190 UART: [art] PUB.Y = 4C7F78F58D02BC00EE8868841534AE55E1F2F03143DF31BB935A5C11672B167B876F0F6C859EEDA09AE7C30FA52E8C62
6,248,117 UART: [art] SIG.R = F8D59D73A1BB3350A57827E6451671553D3BD6332C770D186DED0B48C6643AA2D86E7016A723FAD1A880213E9F7DB3AB
6,254,885 UART: [art] SIG.S = 4D644AB2222C8AD09A98DCA8B07FC555D92804E80398839B065C098B92267B0992DC1477543DCD944B7AD64C927BF01A
6,278,509 UART: Caliptra RT
6,278,762 UART: [state] CFI Enabled
6,558,021 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,588,960 UART: [rt]cmd =0x41545348, len=116
6,590,955 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,248 UART: [kat] SHA2-256
902,188 UART: [kat] SHA2-384
904,845 UART: [kat] SHA2-512-ACC
906,746 UART: [kat] ECC-384
916,013 UART: [kat] HMAC-384Kdf
920,443 UART: [kat] LMS
1,168,755 UART: [kat] --
1,169,406 UART: [cold-reset] ++
1,169,842 UART: [fht] FHT @ 0x50003400
1,172,556 UART: [idev] ++
1,172,724 UART: [idev] CDI.KEYID = 6
1,173,085 UART: [idev] SUBJECT.KEYID = 7
1,173,510 UART: [idev] UDS.KEYID = 0
1,173,856 ready_for_fw is high
1,173,856 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,422 UART: [idev] Erasing UDS.KEYID = 0
1,198,296 UART: [idev] Sha1 KeyId Algorithm
1,207,036 UART: [idev] --
1,208,103 UART: [ldev] ++
1,208,271 UART: [ldev] CDI.KEYID = 6
1,208,635 UART: [ldev] SUBJECT.KEYID = 5
1,209,062 UART: [ldev] AUTHORITY.KEYID = 7
1,209,525 UART: [ldev] FE.KEYID = 1
1,214,725 UART: [ldev] Erasing FE.KEYID = 1
1,241,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,499 UART: [ldev] --
1,280,943 UART: [fwproc] Wait for Commands...
1,281,518 UART: [fwproc] Recv command 0x46574c44
1,282,251 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,328 >>> mbox cmd response: success
2,771,387 UART: [afmc] ++
2,771,555 UART: [afmc] CDI.KEYID = 6
2,771,918 UART: [afmc] SUBJECT.KEYID = 7
2,772,344 UART: [afmc] AUTHORITY.KEYID = 5
2,807,853 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,878 UART: [afmc] --
2,850,828 UART: [cold-reset] --
2,851,484 UART: [state] Locking Datavault
2,852,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,391 UART: [state] Locking ICCM
2,853,929 UART: [exit] Launching FMC @ 0x40000130
2,859,258 UART:
2,859,274 UART: Running Caliptra FMC ...
2,859,682 UART:
2,859,825 UART: [state] CFI Enabled
2,870,264 UART: [fht] FMC Alias Private Key: 7
2,979,229 UART: [art] Extend RT PCRs Done
2,979,657 UART: [art] Lock RT PCRs Done
2,981,063 UART: [art] Populate DV Done
2,989,432 UART: [fht] FMC Alias Private Key: 7
2,990,432 UART: [art] Derive CDI
2,990,712 UART: [art] Store in in slot 0x4
3,076,295 UART: [art] Derive Key Pair
3,076,655 UART: [art] Store priv key in slot 0x5
3,089,925 UART: [art] Derive Key Pair - Done
3,104,815 UART: [art] Signing Cert with AUTHO
3,105,295 UART: RITY.KEYID = 7
3,120,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,046 UART: [art] PUB.X = D46A9A3FADBC62010A75CA8396C86E93B34783E9A66F7A0A9E6DD82F564ECE417C8F08A1EB1FAA359E9CDE23A9DE0453
3,127,821 UART: [art] PUB.Y = 14F9491D04F2FD56F4C1ABA7FCA75362E6B3181B9EEE05C73CEE75252700353936D1D1264D06C700B20B65A16D85563C
3,134,717 UART: [art] SIG.R = 613CF9E59816BE2D1981E0CF8272C5B8760A6EB0881CEC46BAF20CFA9113CD6563F5597B15DB74F515EC9953477C2FEA
3,141,491 UART: [art] SIG.S = 92DC952D2B9887A652714C487835366C2911AC295F24112A21A40D02BF059836434C872F0CD6F6822699F3397B79F2FC
3,166,004 UART: Caliptra RT
3,166,349 UART: [state] CFI Enabled
3,273,966 UART: [rt] RT listening for mailbox commands...
3,274,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,616 UART: [rt]cmd =0x41544d4e, len=14344
3,707,520 >>> mbox cmd response data (8 bytes)
3,707,521 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,816 UART: [rt]cmd =0x41545348, len=116
3,739,731 >>> mbox cmd response data (12 bytes)
3,739,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,391 UART:
3,740,407 UART: Running Caliptra ROM ...
3,740,815 UART:
3,740,957 UART: [state] CFI Enabled
3,743,947 UART: [state] LifecycleState = Unprovisioned
3,744,602 UART: [state] DebugLocked = No
3,745,096 UART: [state] WD Timer not started. Device not locked for debugging
3,746,452 UART: [kat] SHA2-256
4,550,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,554,131 UART: [kat] ++
4,554,283 UART: [kat] sha1
4,558,401 UART: [kat] SHA2-256
4,560,341 UART: [kat] SHA2-384
4,563,104 UART: [kat] SHA2-512-ACC
4,565,004 UART: [kat] ECC-384
4,574,695 UART: [kat] HMAC-384Kdf
4,579,257 UART: [kat] LMS
4,827,569 UART: [kat] --
4,828,489 UART: [update-reset] ++
6,138,390 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,139,379 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,288,957 >>> mbox cmd response: success
6,288,957 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,289,092 UART: [update-reset] Copying MAN_2 To MAN_1
6,297,106 UART: [update-reset Success] --
6,297,855 UART: [state] Locking Datavault
6,298,783 UART: [state] Locking PCR0, PCR1 and PCR31
6,299,387 UART: [state] Locking ICCM
6,299,937 UART: [exit] Launching FMC @ 0x40000130
6,305,266 UART:
6,305,282 UART: Running Caliptra FMC ...
6,305,690 UART:
6,305,833 UART: [state] CFI Enabled
6,395,896 UART: [art] Extend RT PCRs Done
6,396,324 UART: [art] Lock RT PCRs Done
6,397,851 UART: [art] Populate DV Done
6,406,132 UART: [fht] FMC Alias Private Key: 7
6,407,170 UART: [art] Derive CDI
6,407,450 UART: [art] Store in in slot 0x4
6,493,071 UART: [art] Derive Key Pair
6,493,431 UART: [art] Store priv key in slot 0x5
6,507,003 UART: [art] Derive Key Pair - Done
6,522,031 UART: [art] Signing Cert with AUTHO
6,522,511 UART: RITY.KEYID = 7
6,537,547 UART: [art] Erasing AUTHORITY.KEYID = 7
6,538,312 UART: [art] PUB.X = 78EA985B39B2422AEE1C0FDF3FE2D8493F71BEFA40D40FE6844188010C60362D8B1614B2EF912B111EABF1C4BB0E5666
6,545,079 UART: [art] PUB.Y = 18680BBD267C69A441FF7A57BFF6B106053F34381E6094AC9482B2B61F636C21320A590D63A7750E51611EAC6D276B89
6,552,007 UART: [art] SIG.R = 115D060427FB222B161E415A4B7CA87ADE17B205BA3C7CB26D9FE77961CCE0F517325AAF420BC0DF2634B5BEB531F5E2
6,558,779 UART: [art] SIG.S = 4439E9E4731563B47093D2877F2E52AEFE6D0A7E56F6AD1245471763C4E63100ECC494753D72DD0BB6D4AE1EC61C907F
6,582,362 UART: Caliptra RT
6,582,707 UART: [state] CFI Enabled
6,863,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,894,179 UART: [rt]cmd =0x41545348, len=116
6,896,052 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,571 ready_for_fw is high
1,056,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,264 >>> mbox cmd response: success
2,685,496 UART:
2,685,512 UART: Running Caliptra FMC ...
2,685,920 UART:
2,686,063 UART: [state] CFI Enabled
2,696,656 UART: [fht] FMC Alias Private Key: 7
2,804,137 UART: [art] Extend RT PCRs Done
2,804,565 UART: [art] Lock RT PCRs Done
2,806,335 UART: [art] Populate DV Done
2,814,812 UART: [fht] FMC Alias Private Key: 7
2,815,802 UART: [art] Derive CDI
2,816,082 UART: [art] Store in in slot 0x4
2,901,879 UART: [art] Derive Key Pair
2,902,239 UART: [art] Store priv key in slot 0x5
2,914,915 UART: [art] Derive Key Pair - Done
2,929,993 UART: [art] Signing Cert with AUTHO
2,930,473 UART: RITY.KEYID = 7
2,945,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,764 UART: [art] PUB.X = DA33EF430352D32F39D8D490821E020CCDF673A22C0CBF4FEAFC660E82BCBA356F0CEAA499BCBCA84EB78208777210C1
2,953,533 UART: [art] PUB.Y = 965B2241BECE734C4C4F125C9D323F3B7E103CD9036B2246AAE5B5DED884FD415951BF7B6D4239D2083F4719A426DFC7
2,960,485 UART: [art] SIG.R = FB7D59A9573A10613BA84B43406EAA6D5FCBCE7B79652FA871513CD065470528EFBEAFF8D6B0BD4503A8077F7AA98B31
2,967,260 UART: [art] SIG.S = 59FBAC7E3C5B42E3EA51CD0E573593FB8CD7676ECEC43BA684CDA106424348D4280DE458A06E4658F126D7FDAB62CECC
2,991,204 UART: Caliptra RT
2,991,549 UART: [state] CFI Enabled
3,100,128 UART: [rt] RT listening for mailbox commands...
3,100,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,062 UART: [rt]cmd =0x41544d4e, len=14344
3,534,040 >>> mbox cmd response data (8 bytes)
3,534,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,312 UART: [rt]cmd =0x41545348, len=116
3,566,175 >>> mbox cmd response data (12 bytes)
3,566,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,640 >>> mbox cmd response: success
5,998,640 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,011,862 UART:
6,011,878 UART: Running Caliptra FMC ...
6,012,286 UART:
6,012,429 UART: [state] CFI Enabled
6,102,220 UART: [art] Extend RT PCRs Done
6,102,648 UART: [art] Lock RT PCRs Done
6,103,961 UART: [art] Populate DV Done
6,112,324 UART: [fht] FMC Alias Private Key: 7
6,113,488 UART: [art] Derive CDI
6,113,768 UART: [art] Store in in slot 0x4
6,199,197 UART: [art] Derive Key Pair
6,199,557 UART: [art] Store priv key in slot 0x5
6,212,867 UART: [art] Derive Key Pair - Done
6,227,813 UART: [art] Signing Cert with AUTHO
6,228,293 UART: RITY.KEYID = 7
6,243,743 UART: [art] Erasing AUTHORITY.KEYID = 7
6,244,508 UART: [art] PUB.X = 5253C230B9393B91CB4B8BF23AD5E512EFBFE6A7EF1A149B8CAE7AFBF8EB08E9E4E3B76AC5FFEAECE20C8057834BD8BD
6,251,306 UART: [art] PUB.Y = 0657580E96B54B1AF6D1B1734C8B08483DC6E9DC233917EA0DF64B1E54BC5DF625D4A6BAB0B1C621170F4A706B2DF02D
6,258,253 UART: [art] SIG.R = 1E6761C4B9068CA5D90831D3182EFEA4F755A68BD7EE2574ADFA6D9043C5594C42435EF1AD8A266B0DFB6DE3DFC25272
6,265,028 UART: [art] SIG.S = 0EEF12675085E6E303A7390BDF2083434B260449C46AAA861C036C7AEC12E2DDE6DD10295DDD7675CA1105F09F17E56F
6,288,909 UART: Caliptra RT
6,289,254 UART: [state] CFI Enabled
6,571,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,602,918 UART: [rt]cmd =0x41545348, len=116
6,604,817 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,107 UART:
192,473 UART: Running Caliptra ROM ...
193,579 UART:
193,718 UART: [state] CFI Enabled
265,452 UART: [state] LifecycleState = Unprovisioned
267,353 UART: [state] DebugLocked = No
270,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,295 UART: [kat] SHA2-256
444,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,503 UART: [kat] ++
455,948 UART: [kat] sha1
467,330 UART: [kat] SHA2-256
469,976 UART: [kat] SHA2-384
475,744 UART: [kat] SHA2-512-ACC
478,109 UART: [kat] ECC-384
2,768,864 UART: [kat] HMAC-384Kdf
2,799,427 UART: [kat] LMS
3,989,759 UART: [kat] --
3,995,200 UART: [cold-reset] ++
3,997,337 UART: [fht] Storing FHT @ 0x50003400
4,009,041 UART: [idev] ++
4,009,646 UART: [idev] CDI.KEYID = 6
4,010,533 UART: [idev] SUBJECT.KEYID = 7
4,011,854 UART: [idev] UDS.KEYID = 0
4,012,773 ready_for_fw is high
4,012,965 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,034 UART: [idev] Erasing UDS.KEYID = 0
7,345,857 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,607 UART: [idev] --
7,371,739 UART: [ldev] ++
7,372,307 UART: [ldev] CDI.KEYID = 6
7,373,237 UART: [ldev] SUBJECT.KEYID = 5
7,374,437 UART: [ldev] AUTHORITY.KEYID = 7
7,375,714 UART: [ldev] FE.KEYID = 1
7,421,543 UART: [ldev] Erasing FE.KEYID = 1
10,753,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,519 UART: [ldev] --
13,116,123 UART: [fwproc] Waiting for Commands...
13,119,341 UART: [fwproc] Received command 0x46574c44
13,121,540 UART: [fwproc] Received Image of size 113844 bytes
17,169,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,758 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,631,765 >>> mbox cmd response: success
17,636,465 UART: [afmc] ++
17,637,059 UART: [afmc] CDI.KEYID = 6
17,637,947 UART: [afmc] SUBJECT.KEYID = 7
17,639,215 UART: [afmc] AUTHORITY.KEYID = 5
21,008,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,309 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,572 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,027 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,805 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,234 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,313 UART: [afmc] --
23,380,533 UART: [cold-reset] --
23,385,150 UART: [state] Locking Datavault
23,391,092 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,793 UART: [state] Locking ICCM
23,394,882 UART: [exit] Launching FMC @ 0x40000130
23,403,280 UART:
23,403,510 UART: Running Caliptra FMC ...
23,404,601 UART:
23,404,775 UART: [state] CFI Enabled
23,468,160 UART: [fht] FMC Alias Private Key: 7
25,805,405 UART: [art] Extend RT PCRs Done
25,806,627 UART: [art] Lock RT PCRs Done
25,808,114 UART: [art] Populate DV Done
25,813,582 UART: [fht] FMC Alias Private Key: 7
25,815,090 UART: [art] Derive CDI
25,815,849 UART: [art] Store in in slot 0x4
25,876,371 UART: [art] Derive Key Pair
25,877,409 UART: [art] Store priv key in slot 0x5
29,170,193 UART: [art] Derive Key Pair - Done
29,182,924 UART: [art] Signing Cert with AUTHO
29,184,217 UART: RITY.KEYID = 7
31,471,237 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,750 UART: [art] PUB.X = EAE2C61FE936D8E02E2A65B532761B5399BC8B48134B0E97CB519A25E3F714D0DCA6949134EA72732CB0378113E42B1A
31,479,969 UART: [art] PUB.Y = 67F67E5A746B38651D1401C8E1BB1C18805685F102D009F215C7CFA7AF2240515B1289EC4769A8512D3FC383283F2F32
31,487,218 UART: [art] SIG.R = 8BE8D8414B849B2BDC939F4BCB9F9BCA898507A4067E60DFC21234F67881712D09F80D30EDB802321B6645F69699F7B3
31,494,581 UART: [art] SIG.S = CBCF574137DFA4CF3E2742EE099E2C8B5EEE41C0011ACD6B2A26ACE77DD90DB3620E05B6F4EDB2B58D601058121FE274
32,799,400 UART: Caliptra RT
32,800,106 UART: [state] CFI Enabled
32,960,176 UART: [rt] RT listening for mailbox commands...
32,962,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,117,793 UART: [rt]cmd =0x41544d4e, len=14344
38,418,136 >>> mbox cmd response data (8 bytes)
38,418,755 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,449,645 UART: [rt]cmd =0x41545348, len=116
38,468,907 >>> mbox cmd response data (12 bytes)
38,470,148 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,500,740 UART: [rt]cmd =0x41545348, len=116
38,502,932 >>> mbox cmd response data (12 bytes)
40,561,052 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,705,889 UART:
40,706,286 UART: Running Caliptra ROM ...
40,707,333 UART:
40,707,483 UART: [state] CFI Enabled
40,769,317 UART: [state] LifecycleState = Unprovisioned
40,771,310 UART: [state] DebugLocked = No
40,773,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,777,754 UART: [kat] SHA2-256
40,947,492 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,957,959 UART: [kat] ++
40,958,410 UART: [kat] sha1
40,969,675 UART: [kat] SHA2-256
40,972,351 UART: [kat] SHA2-384
40,979,038 UART: [kat] SHA2-512-ACC
40,981,440 UART: [kat] ECC-384
43,272,324 UART: [kat] HMAC-384Kdf
43,303,206 UART: [kat] LMS
44,493,542 UART: [kat] --
44,498,060 UART: [update-reset] ++
48,631,610 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,634,860 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
49,016,158 >>> mbox cmd response: success
49,020,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,021,401 UART: [update-reset] Copying MAN_2 To MAN_1
49,039,818 UART: [update-reset Success] --
49,044,966 UART: [state] Locking Datavault
49,047,137 UART: [state] Locking PCR0, PCR1 and PCR31
49,048,883 UART: [state] Locking ICCM
49,050,851 UART: [exit] Launching FMC @ 0x40000130
49,059,244 UART:
49,059,473 UART: Running Caliptra FMC ...
49,060,567 UART:
49,060,740 UART: [state] CFI Enabled
49,159,361 UART: [art] Extend RT PCRs Done
49,160,573 UART: [art] Lock RT PCRs Done
49,161,948 UART: [art] Populate DV Done
49,167,468 UART: [fht] FMC Alias Private Key: 7
49,169,001 UART: [art] Derive CDI
49,169,813 UART: [art] Store in in slot 0x4
49,228,303 UART: [art] Derive Key Pair
49,229,341 UART: [art] Store priv key in slot 0x5
52,522,285 UART: [art] Derive Key Pair - Done
52,535,074 UART: [art] Signing Cert with AUTHO
52,536,382 UART: RITY.KEYID = 7
54,823,614 UART: [art] Erasing AUTHORITY.KEYID = 7
54,825,124 UART: [art] PUB.X = B249D3C37D70B26EC32E67F806E1C336C79060B1340F3F32F51C9016BBD321E49D88CE2694BF2518C4705D1F02DBFDE8
54,832,326 UART: [art] PUB.Y = A1B92F53480CF9DEEF124350A143D1607F750992E3CE6BD4E342455BE45885BB0C69E2DC631E7D824F875C3C7FD97CBF
54,839,603 UART: [art] SIG.R = 51F99368A7435DFF00D287E347CC298975C071409C30C30BE0DF78F1C29D68FC4BD0B6A8AD485679F3643CC0BF354FA1
54,846,955 UART: [art] SIG.S = 4D02163DF48550BC2714015DD0666F4100F3DFCBFD1653A6B820305CDC60059B5CF9290F94C19BBBFB940C3EE2988A60
56,152,418 UART: Caliptra RT
56,153,132 UART: [state] CFI Enabled
56,505,368 UART: [rt] RT listening for mailbox commands...
56,537,157 UART: [rt]cmd =0x41545348, len=116
56,557,377 >>> mbox cmd response data (12 bytes)
56,558,230 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,589,028 UART: [rt]cmd =0x41545348, len=116
56,591,535 >>> mbox cmd response data (12 bytes)
60,626,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,782,164 UART: [rt]cmd =0x41544d4e, len=14344
66,082,687 >>> mbox cmd response data (8 bytes)
66,083,245 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,114,042 UART: [rt]cmd =0x41545348, len=116
66,134,525 >>> mbox cmd response data (12 bytes)
66,134,945 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,165,786 UART: [rt]cmd =0x41545348, len=116
66,168,071 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,783,285 ready_for_fw is high
3,783,722 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,847,323 >>> mbox cmd response: success
23,542,252 UART:
23,542,639 UART: Running Caliptra FMC ...
23,543,787 UART:
23,543,941 UART: [state] CFI Enabled
23,610,386 UART: [fht] FMC Alias Private Key: 7
25,948,932 UART: [art] Extend RT PCRs Done
25,950,146 UART: [art] Lock RT PCRs Done
25,951,924 UART: [art] Populate DV Done
25,957,331 UART: [fht] FMC Alias Private Key: 7
25,958,907 UART: [art] Derive CDI
25,959,724 UART: [art] Store in in slot 0x4
26,018,658 UART: [art] Derive Key Pair
26,019,655 UART: [art] Store priv key in slot 0x5
29,312,624 UART: [art] Derive Key Pair - Done
29,325,623 UART: [art] Signing Cert with AUTHO
29,326,997 UART: RITY.KEYID = 7
31,614,002 UART: [art] Erasing AUTHORITY.KEYID = 7
31,615,510 UART: [art] PUB.X = 6679699D84FB019C7FC24AC677D0A9DEC8DC737E432EEEF9616730BC3336DEAD689F6B7A221337DA1A6BC21BCE950E4E
31,622,764 UART: [art] PUB.Y = CA45DF808F59F2C1D078739DC99BA8E24FB275D5CEB004DE065A50902C870832AE286F52F15288ABF5165D9141C79D6F
31,630,043 UART: [art] SIG.R = 09D3610A794DAF7769A722EB2BBFDF29BA8318E932F42130DF5DA877247041EE6D6F42C3605DE0797145B7E8C97B0490
31,637,407 UART: [art] SIG.S = 16F5393B5A2BB7D40B5FEA040B8D8EC77E816143B6A79C486E43453FC538226AD19305F61DC31E7BD36877491C66D3C0
32,942,710 UART: Caliptra RT
32,943,401 UART: [state] CFI Enabled
33,103,698 UART: [rt] RT listening for mailbox commands...
33,106,076 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,261,371 UART: [rt]cmd =0x41544d4e, len=14344
38,562,361 >>> mbox cmd response data (8 bytes)
38,562,928 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,593,706 UART: [rt]cmd =0x41545348, len=116
38,614,383 >>> mbox cmd response data (12 bytes)
38,615,591 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,646,558 UART: [rt]cmd =0x41545348, len=116
38,648,600 >>> mbox cmd response data (12 bytes)
40,707,460 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,415,685 >>> mbox cmd response: success
49,416,739 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,450,426 UART:
49,450,706 UART: Running Caliptra FMC ...
49,451,908 UART:
49,452,053 UART: [state] CFI Enabled
49,539,304 UART: [art] Extend RT PCRs Done
49,540,515 UART: [art] Lock RT PCRs Done
49,541,996 UART: [art] Populate DV Done
49,547,346 UART: [fht] FMC Alias Private Key: 7
49,548,926 UART: [art] Derive CDI
49,549,653 UART: [art] Store in in slot 0x4
49,608,438 UART: [art] Derive Key Pair
49,609,471 UART: [art] Store priv key in slot 0x5
52,902,410 UART: [art] Derive Key Pair - Done
52,915,392 UART: [art] Signing Cert with AUTHO
52,916,757 UART: RITY.KEYID = 7
55,203,609 UART: [art] Erasing AUTHORITY.KEYID = 7
55,205,119 UART: [art] PUB.X = CB26BFFCFD3B8B3AD753B0C08ED851CDC9838383913A2E06BAA9D0D7DE54ED1E055076E0364386243D6022B9B8BC31A5
55,212,373 UART: [art] PUB.Y = B208029B9E9162C5BB7A952F3A452040330EF3EDA63E82AED0EFC6DB0436B12FD3D9D170C00827CEB68C4CD576C2225A
55,219,614 UART: [art] SIG.R = 2CCF72C29D6210538740146CCDA7223841CAC92B3A1EE0009BF348382D43A9859C32B406D3C5216067E001E1D7312D97
55,226,990 UART: [art] SIG.S = A1E4E4AF21DD1F5C894C8B98742EFB7855EA2EEA518BE222972A97BB6073C603B4D182188603F91884018D63E57AA4DF
56,532,485 UART: Caliptra RT
56,533,212 UART: [state] CFI Enabled
56,865,929 UART: [rt] RT listening for mailbox commands...
56,897,822 UART: [rt]cmd =0x41545348, len=116
56,917,992 >>> mbox cmd response data (12 bytes)
56,919,160 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,950,052 UART: [rt]cmd =0x41545348, len=116
56,952,090 >>> mbox cmd response data (12 bytes)
60,995,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,151,405 UART: [rt]cmd =0x41544d4e, len=14344
66,451,825 >>> mbox cmd response data (8 bytes)
66,452,407 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,482,929 UART: [rt]cmd =0x41545348, len=116
66,502,687 >>> mbox cmd response data (12 bytes)
66,503,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,533,828 UART: [rt]cmd =0x41545348, len=116
66,536,108 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,514 UART:
192,885 UART: Running Caliptra ROM ...
194,093 UART:
603,674 UART: [state] CFI Enabled
617,743 UART: [state] LifecycleState = Unprovisioned
619,659 UART: [state] DebugLocked = No
622,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,902 UART: [kat] SHA2-256
797,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,158 UART: [kat] ++
808,761 UART: [kat] sha1
819,716 UART: [kat] SHA2-256
822,447 UART: [kat] SHA2-384
827,941 UART: [kat] SHA2-512-ACC
830,307 UART: [kat] ECC-384
3,115,407 UART: [kat] HMAC-384Kdf
3,126,357 UART: [kat] LMS
4,316,427 UART: [kat] --
4,320,232 UART: [cold-reset] ++
4,321,886 UART: [fht] Storing FHT @ 0x50003400
4,333,088 UART: [idev] ++
4,333,660 UART: [idev] CDI.KEYID = 6
4,334,583 UART: [idev] SUBJECT.KEYID = 7
4,335,825 UART: [idev] UDS.KEYID = 0
4,336,834 ready_for_fw is high
4,337,058 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,054 UART: [idev] Erasing UDS.KEYID = 0
7,625,099 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,834 UART: [idev] --
7,649,399 UART: [ldev] ++
7,650,020 UART: [ldev] CDI.KEYID = 6
7,650,938 UART: [ldev] SUBJECT.KEYID = 5
7,652,329 UART: [ldev] AUTHORITY.KEYID = 7
7,653,519 UART: [ldev] FE.KEYID = 1
7,665,083 UART: [ldev] Erasing FE.KEYID = 1
10,953,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,376 UART: [ldev] --
13,315,738 UART: [fwproc] Waiting for Commands...
13,317,399 UART: [fwproc] Received command 0x46574c44
13,319,594 UART: [fwproc] Received Image of size 113844 bytes
17,363,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,439,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,671 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,825,369 >>> mbox cmd response: success
17,829,555 UART: [afmc] ++
17,830,168 UART: [afmc] CDI.KEYID = 6
17,831,081 UART: [afmc] SUBJECT.KEYID = 7
17,832,300 UART: [afmc] AUTHORITY.KEYID = 5
21,146,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,687 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,082 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,952 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,386 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,242 UART: [afmc] --
23,512,925 UART: [cold-reset] --
23,515,717 UART: [state] Locking Datavault
23,520,909 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,618 UART: [state] Locking ICCM
23,523,989 UART: [exit] Launching FMC @ 0x40000130
23,532,384 UART:
23,532,626 UART: Running Caliptra FMC ...
23,533,727 UART:
23,533,891 UART: [state] CFI Enabled
23,541,591 UART: [fht] FMC Alias Private Key: 7
25,872,675 UART: [art] Extend RT PCRs Done
25,873,893 UART: [art] Lock RT PCRs Done
25,875,659 UART: [art] Populate DV Done
25,880,967 UART: [fht] FMC Alias Private Key: 7
25,882,640 UART: [art] Derive CDI
25,883,383 UART: [art] Store in in slot 0x4
25,925,978 UART: [art] Derive Key Pair
25,927,017 UART: [art] Store priv key in slot 0x5
29,169,136 UART: [art] Derive Key Pair - Done
29,181,966 UART: [art] Signing Cert with AUTHO
29,183,331 UART: RITY.KEYID = 7
31,463,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,634 UART: [art] PUB.X = 783DB3CFD76FEB14AA8EAB7F4EC2F789B80C43EB9DE72849E350F9E2AE7083DC3DB8B9D73B9506EE3EFA5A0EDE81CE19
31,471,896 UART: [art] PUB.Y = 5575F1BD7FAB1B7DFE4E557332C2C46DA27BA7894773F94C67814D532D2C68847BA6185A8E7124D553F7E81E8814364A
31,479,143 UART: [art] SIG.R = 162B303FD8AA9B3C15609D1F7AA72C8FAAED970CDAB6D1C187BCC7BCD3E46B7B6A8F04B169663C46FC6EE6DDD23E8E60
31,486,554 UART: [art] SIG.S = 766C9E5C4EE1B938E7C86D7C2A08AE95996AD6D6245B29FD9C2ED88C05204ED771D1C446D786D2E43D70D43A3772E4C3
32,791,686 UART: Caliptra RT
32,792,399 UART: [state] CFI Enabled
32,910,326 UART: [rt] RT listening for mailbox commands...
32,912,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,068,088 UART: [rt]cmd =0x41544d4e, len=14344
38,368,756 >>> mbox cmd response data (8 bytes)
38,369,409 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,400,053 UART: [rt]cmd =0x41545348, len=116
38,419,190 >>> mbox cmd response data (12 bytes)
38,420,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,451,291 UART: [rt]cmd =0x41545348, len=116
38,453,602 >>> mbox cmd response data (12 bytes)
40,584,881 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,730,271 UART:
40,730,669 UART: Running Caliptra ROM ...
40,731,741 UART:
40,731,896 UART: [state] CFI Enabled
40,746,450 UART: [state] LifecycleState = Unprovisioned
40,748,339 UART: [state] DebugLocked = No
40,750,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,754,473 UART: [kat] SHA2-256
40,924,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,934,722 UART: [kat] ++
40,935,186 UART: [kat] sha1
40,946,724 UART: [kat] SHA2-256
40,949,436 UART: [kat] SHA2-384
40,954,726 UART: [kat] SHA2-512-ACC
40,957,076 UART: [kat] ECC-384
43,239,630 UART: [kat] HMAC-384Kdf
43,251,422 UART: [kat] LMS
44,441,475 UART: [kat] --
44,446,294 UART: [update-reset] ++
48,584,686 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,589,228 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
48,970,554 >>> mbox cmd response: success
48,975,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,975,842 UART: [update-reset] Copying MAN_2 To MAN_1
48,993,379 UART: [update-reset Success] --
48,998,971 UART: [state] Locking Datavault
49,003,580 UART: [state] Locking PCR0, PCR1 and PCR31
49,005,420 UART: [state] Locking ICCM
49,007,451 UART: [exit] Launching FMC @ 0x40000130
49,015,871 UART:
49,016,181 UART: Running Caliptra FMC ...
49,017,299 UART:
49,017,460 UART: [state] CFI Enabled
49,060,990 UART: [art] Extend RT PCRs Done
49,062,142 UART: [art] Lock RT PCRs Done
49,063,619 UART: [art] Populate DV Done
49,068,921 UART: [fht] FMC Alias Private Key: 7
49,070,407 UART: [art] Derive CDI
49,071,189 UART: [art] Store in in slot 0x4
49,113,988 UART: [art] Derive Key Pair
49,115,029 UART: [art] Store priv key in slot 0x5
52,356,818 UART: [art] Derive Key Pair - Done
52,369,715 UART: [art] Signing Cert with AUTHO
52,371,024 UART: RITY.KEYID = 7
54,650,365 UART: [art] Erasing AUTHORITY.KEYID = 7
54,651,880 UART: [art] PUB.X = A6A27E59615E581532ED5B79FD1E6BF9F6CAF8C5AF31C1DD163229852B50DD96A958B3C02CB0F5ED25B8D9F0BF19CDE9
54,659,169 UART: [art] PUB.Y = 0953A0080F66232C2A3067363133B54A1B6CB5C2919B92FF4A1755B1071EB7092EA7CB5CBE53B6653903F0DDA7DFF2B9
54,666,414 UART: [art] SIG.R = 05777F5B1AB0AF08E98721228532028A70F23D93D5378A971C1267D81814F08898BE3BCEC45D7EB02E9F2C8BA503E55B
54,673,751 UART: [art] SIG.S = 05D77E88C2062E32E2833E02E313313F53594E8E78C9CB92E194B387646B3B07FADA8E3E854550C31E5681D77B3760E6
55,979,559 UART: Caliptra RT
55,980,278 UART: [state] CFI Enabled
56,266,489 UART: [rt] RT listening for mailbox commands...
56,298,209 UART: [rt]cmd =0x41545348, len=116
56,317,651 >>> mbox cmd response data (12 bytes)
56,318,549 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,349,394 UART: [rt]cmd =0x41545348, len=116
56,351,652 >>> mbox cmd response data (12 bytes)
60,528,588 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,684,242 UART: [rt]cmd =0x41544d4e, len=14344
65,984,621 >>> mbox cmd response data (8 bytes)
65,985,162 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,015,732 UART: [rt]cmd =0x41545348, len=116
66,036,432 >>> mbox cmd response data (12 bytes)
66,036,866 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,067,596 UART: [rt]cmd =0x41545348, len=116
66,069,719 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
4,133,887 ready_for_fw is high
4,134,473 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,759 >>> mbox cmd response: success
23,702,641 UART:
23,703,049 UART: Running Caliptra FMC ...
23,704,170 UART:
23,704,329 UART: [state] CFI Enabled
23,712,161 UART: [fht] FMC Alias Private Key: 7
26,042,724 UART: [art] Extend RT PCRs Done
26,043,948 UART: [art] Lock RT PCRs Done
26,045,551 UART: [art] Populate DV Done
26,050,959 UART: [fht] FMC Alias Private Key: 7
26,052,607 UART: [art] Derive CDI
26,053,361 UART: [art] Store in in slot 0x4
26,096,336 UART: [art] Derive Key Pair
26,097,379 UART: [art] Store priv key in slot 0x5
29,339,216 UART: [art] Derive Key Pair - Done
29,352,421 UART: [art] Signing Cert with AUTHO
29,353,752 UART: RITY.KEYID = 7
31,632,797 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,326 UART: [art] PUB.X = 683DEA5EA9F66531C7A33AB38621F51D9A2675B75B9F02380B3C9ADA5D323248B811BF5AB6AD346898D9A8C4A823689A
31,641,548 UART: [art] PUB.Y = 6FAF5083CD8992B9FED516A385792673CDBE2776F261C7A8A0971789CD0CFE2B3FCDAB2561028B08B11828B36391A412
31,648,768 UART: [art] SIG.R = 855BE39818B37333B7BD18A107D4E16201F0A2A828938E0054213F4D067017D9D12EDC6EFCE893788D8FF814D8991930
31,656,173 UART: [art] SIG.S = FCB042CAD90AE91760F73308BE8177FD5061C8E929BB2374DB534B104C4988BD16A62E5DCCDF4325CC669959E4C370FD
32,961,308 UART: Caliptra RT
32,962,005 UART: [state] CFI Enabled
33,079,934 UART: [rt] RT listening for mailbox commands...
33,082,311 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,237,826 UART: [rt]cmd =0x41544d4e, len=14344
38,538,285 >>> mbox cmd response data (8 bytes)
38,538,870 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,569,782 UART: [rt]cmd =0x41545348, len=116
38,589,951 >>> mbox cmd response data (12 bytes)
38,591,203 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,622,268 UART: [rt]cmd =0x41545348, len=116
38,624,762 >>> mbox cmd response data (12 bytes)
40,756,306 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,398,286 >>> mbox cmd response: success
49,398,821 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,432,163 UART:
49,432,495 UART: Running Caliptra FMC ...
49,433,717 UART:
49,433,885 UART: [state] CFI Enabled
49,478,024 UART: [art] Extend RT PCRs Done
49,479,184 UART: [art] Lock RT PCRs Done
49,480,392 UART: [art] Populate DV Done
49,485,748 UART: [fht] FMC Alias Private Key: 7
49,487,360 UART: [art] Derive CDI
49,488,102 UART: [art] Store in in slot 0x4
49,530,811 UART: [art] Derive Key Pair
49,531,848 UART: [art] Store priv key in slot 0x5
52,773,264 UART: [art] Derive Key Pair - Done
52,786,125 UART: [art] Signing Cert with AUTHO
52,787,468 UART: RITY.KEYID = 7
55,066,573 UART: [art] Erasing AUTHORITY.KEYID = 7
55,068,088 UART: [art] PUB.X = 4CEAA87CF25A8C8118E1A9B78A0B347FFCCD004BDECB4B6BAE724831E652BE5416249AAEE3156C79F49A9112F0EF5992
55,075,289 UART: [art] PUB.Y = 27F18E58E8680D5512A2F43BB14CCBF5E254AEB44A385555B991D99CC09D647FF4E4FBFF38B8DE1D76423FC24CD03106
55,082,581 UART: [art] SIG.R = 3FC5C94262C8BFE19469AA6A438D4ED51E57041463F37255886C32A14D38FC93B456C6211137ACEF0C000A4CEAFC2411
55,089,933 UART: [art] SIG.S = B0B4D8317EE0AC68EB61FDB3871B3E2A7D41908437F35F9C4DD7C8C339FC27A7FBC434DEA611C8A7231B8B30D57EA0EE
56,395,563 UART: Caliptra RT
56,396,273 UART: [state] CFI Enabled
56,685,447 UART: [rt] RT listening for mailbox commands...
56,717,257 UART: [rt]cmd =0x41545348, len=116
56,737,697 >>> mbox cmd response data (12 bytes)
56,738,644 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,769,427 UART: [rt]cmd =0x41545348, len=116
56,771,845 >>> mbox cmd response data (12 bytes)
60,950,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,105,587 UART: [rt]cmd =0x41544d4e, len=14344
66,405,969 >>> mbox cmd response data (8 bytes)
66,406,494 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,437,117 UART: [rt]cmd =0x41545348, len=116
66,457,854 >>> mbox cmd response data (12 bytes)
66,458,281 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,489,049 UART: [rt]cmd =0x41545348, len=116
66,491,333 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
191,996 UART:
192,357 UART: Running Caliptra ROM ...
193,537 UART:
193,690 UART: [state] CFI Enabled
265,645 UART: [state] LifecycleState = Unprovisioned
267,485 UART: [state] DebugLocked = No
269,291 UART: [state] WD Timer not started. Device not locked for debugging
273,108 UART: [kat] SHA2-256
452,209 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,811 UART: [kat] ++
464,258 UART: [kat] sha1
475,056 UART: [kat] SHA2-256
478,067 UART: [kat] SHA2-384
483,857 UART: [kat] SHA2-512-ACC
486,862 UART: [kat] ECC-384
2,948,213 UART: [kat] HMAC-384Kdf
2,972,827 UART: [kat] LMS
3,502,251 UART: [kat] --
3,506,221 UART: [cold-reset] ++
3,507,588 UART: [fht] FHT @ 0x50003400
3,517,716 UART: [idev] ++
3,518,279 UART: [idev] CDI.KEYID = 6
3,519,264 UART: [idev] SUBJECT.KEYID = 7
3,520,440 UART: [idev] UDS.KEYID = 0
3,521,377 ready_for_fw is high
3,521,593 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,342 UART: [idev] Erasing UDS.KEYID = 0
6,027,165 UART: [idev] Sha1 KeyId Algorithm
6,050,689 UART: [idev] --
6,055,052 UART: [ldev] ++
6,055,640 UART: [ldev] CDI.KEYID = 6
6,056,533 UART: [ldev] SUBJECT.KEYID = 5
6,057,640 UART: [ldev] AUTHORITY.KEYID = 7
6,058,983 UART: [ldev] FE.KEYID = 1
6,100,137 UART: [ldev] Erasing FE.KEYID = 1
8,606,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,010 UART: [ldev] --
10,414,332 UART: [fwproc] Wait for Commands...
10,416,480 UART: [fwproc] Recv command 0x46574c44
10,418,572 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,276,504 >>> mbox cmd response: success
14,279,927 UART: [afmc] ++
14,280,558 UART: [afmc] CDI.KEYID = 6
14,281,497 UART: [afmc] SUBJECT.KEYID = 7
14,282,608 UART: [afmc] AUTHORITY.KEYID = 5
16,812,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,560 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,255 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,133 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,384 UART: [afmc] --
18,628,655 UART: [cold-reset] --
18,630,249 UART: [state] Locking Datavault
18,634,202 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,852 UART: [state] Locking ICCM
18,638,597 UART: [exit] Launching FMC @ 0x40000130
18,647,013 UART:
18,647,253 UART: Running Caliptra FMC ...
18,648,374 UART:
18,648,536 UART: [state] CFI Enabled
18,711,011 UART: [fht] FMC Alias Private Key: 7
20,475,489 UART: [art] Extend RT PCRs Done
20,476,705 UART: [art] Lock RT PCRs Done
20,478,493 UART: [art] Populate DV Done
20,484,018 UART: [fht] FMC Alias Private Key: 7
20,485,517 UART: [art] Derive CDI
20,486,278 UART: [art] Store in in slot 0x4
20,544,245 UART: [art] Derive Key Pair
20,545,284 UART: [art] Store priv key in slot 0x5
23,008,053 UART: [art] Derive Key Pair - Done
23,021,223 UART: [art] Signing Cert with AUTHO
23,022,533 UART: RITY.KEYID = 7
24,734,646 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,152 UART: [art] PUB.X = FDE6B9790AE598E2AD565743A60E926AB0C44693A251951F974F229A79793E440AB42EBB043CE4A4CD036D8B0D4AD915
24,743,433 UART: [art] PUB.Y = 49CBC1B87D9200A03B416AE60F5F6A68229E7419236642A0816863DD600CAF61C52C1AA8B087AD63E615045EBD9B3ACC
24,750,682 UART: [art] SIG.R = C86E9A041C554C09CA82AD0302977BC34B6592E18CC209ED72E0AE6D103A62658FDDC6B909A9F4138B6D61B0028F578D
24,758,083 UART: [art] SIG.S = C558232189EC498A0F62041C902E37B907EC85CE8011E744CA90076871283EF94760E2A70C07B72A6493AE40B04CB26D
25,736,753 UART: Caliptra RT
25,737,444 UART: [state] CFI Enabled
25,902,596 UART: [rt] RT listening for mailbox commands...
25,904,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,060,184 UART: [rt]cmd =0x41544d4e, len=14344
30,056,047 >>> mbox cmd response data (8 bytes)
30,056,650 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,087,325 UART: [rt]cmd =0x41545348, len=116
30,106,329 >>> mbox cmd response data (12 bytes)
30,107,572 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,138,141 UART: [rt]cmd =0x41545348, len=116
30,140,113 >>> mbox cmd response data (12 bytes)
32,194,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,339,421 UART:
32,339,816 UART: Running Caliptra ROM ...
32,340,875 UART:
32,341,030 UART: [state] CFI Enabled
32,411,015 UART: [state] LifecycleState = Unprovisioned
32,412,853 UART: [state] DebugLocked = No
32,415,109 UART: [state] WD Timer not started. Device not locked for debugging
32,418,481 UART: [kat] SHA2-256
32,597,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,609,175 UART: [kat] ++
32,609,727 UART: [kat] sha1
32,619,815 UART: [kat] SHA2-256
32,622,852 UART: [kat] SHA2-384
32,628,144 UART: [kat] SHA2-512-ACC
32,631,095 UART: [kat] ECC-384
35,076,910 UART: [kat] HMAC-384Kdf
35,098,512 UART: [kat] LMS
35,627,963 UART: [kat] --
35,634,329 UART: [update-reset] ++
39,059,809 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,062,988 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,445,333 >>> mbox cmd response: success
39,445,772 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,447,013 UART: [update-reset] Copying MAN_2 To MAN_1
39,469,353 UART: [update-reset Success] --
39,473,914 UART: [state] Locking Datavault
39,477,770 UART: [state] Locking PCR0, PCR1 and PCR31
39,479,453 UART: [state] Locking ICCM
39,480,954 UART: [exit] Launching FMC @ 0x40000130
39,489,412 UART:
39,489,657 UART: Running Caliptra FMC ...
39,490,760 UART:
39,490,914 UART: [state] CFI Enabled
39,589,857 UART: [art] Extend RT PCRs Done
39,591,043 UART: [art] Lock RT PCRs Done
39,592,614 UART: [art] Populate DV Done
39,598,069 UART: [fht] FMC Alias Private Key: 7
39,599,772 UART: [art] Derive CDI
39,600,583 UART: [art] Store in in slot 0x4
39,659,487 UART: [art] Derive Key Pair
39,660,528 UART: [art] Store priv key in slot 0x5
42,123,750 UART: [art] Derive Key Pair - Done
42,136,919 UART: [art] Signing Cert with AUTHO
42,138,221 UART: RITY.KEYID = 7
43,849,899 UART: [art] Erasing AUTHORITY.KEYID = 7
43,851,416 UART: [art] PUB.X = B5711CF138771A0DBD6F8458A369FCBF30244603AA462ED32BC83F59800F2D0691B0262AEF51EEA21DFF46FDDE4AF2B7
43,858,685 UART: [art] PUB.Y = 9DC62C4415265629D9D448776C160D4883F30458FEEDDEF33864775024767A36DDB2999BB8FD33DDE8C5BCE1120FD20A
43,865,903 UART: [art] SIG.R = 0F8CADD2422F64D0EB777626F23DFD2077E999F207759F2F3DD98DF9986FCD1E6675D2B69F309C8948B3733E1F108522
43,873,335 UART: [art] SIG.S = 4456F5D94BC81BFD44E8238EE8EA8A8B34499A4431E1BF260BE1495B0116F1543E2E629FA061C88BFAB94BF53A336794
44,852,591 UART: Caliptra RT
44,853,273 UART: [state] CFI Enabled
45,189,915 UART: [rt] RT listening for mailbox commands...
45,221,628 UART: [rt]cmd =0x41545348, len=116
45,241,308 >>> mbox cmd response data (12 bytes)
45,242,358 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,273,090 UART: [rt]cmd =0x41545348, len=116
45,275,070 >>> mbox cmd response data (12 bytes)
49,310,012 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,465,602 UART: [rt]cmd =0x41544d4e, len=14344
53,461,776 >>> mbox cmd response data (8 bytes)
53,462,332 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,493,056 UART: [rt]cmd =0x41545348, len=116
53,511,988 >>> mbox cmd response data (12 bytes)
53,512,417 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,543,070 UART: [rt]cmd =0x41545348, len=116
53,545,260 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,059 writing to cptra_bootfsm_go
3,358,966 ready_for_fw is high
3,359,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,043,662 >>> mbox cmd response: success
18,318,924 UART:
18,319,312 UART: Running Caliptra FMC ...
18,320,496 UART:
18,320,853 UART: [state] CFI Enabled
18,389,138 UART: [fht] FMC Alias Private Key: 7
20,152,305 UART: [art] Extend RT PCRs Done
20,153,523 UART: [art] Lock RT PCRs Done
20,155,256 UART: [art] Populate DV Done
20,160,868 UART: [fht] FMC Alias Private Key: 7
20,162,503 UART: [art] Derive CDI
20,163,333 UART: [art] Store in in slot 0x4
20,221,456 UART: [art] Derive Key Pair
20,222,458 UART: [art] Store priv key in slot 0x5
22,685,285 UART: [art] Derive Key Pair - Done
22,698,351 UART: [art] Signing Cert with AUTHO
22,699,667 UART: RITY.KEYID = 7
24,411,380 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,888 UART: [art] PUB.X = 349583F827FB209721AF6AFFC74C9D69645A7BA8E977D16F47AB24DBFB10FBD11184D570AB7B4813978EC6AF7B1A88B7
24,420,120 UART: [art] PUB.Y = 0E24DB1438F71FA6631AEDBA438A50ABC270F80062EC757FC2C49851D34AB529FADFD236E07B41B9D8937313C645E053
24,427,389 UART: [art] SIG.R = 0D72860E1518141DCB8175DE74C80B3DD930C8715061D8D1C44AE67D2CB8B5C9507B498109DCED3AAB98F55A6FA059A8
24,434,785 UART: [art] SIG.S = 870AEB29E6346A18E74D121CB18DB23D6291455C1DB6E7EBF47D4A53A344F150B5CF6D7105DF5E7F6D7B78DAF9F8B49B
25,413,615 UART: Caliptra RT
25,414,311 UART: [state] CFI Enabled
25,578,300 UART: [rt] RT listening for mailbox commands...
25,580,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,735,859 UART: [rt]cmd =0x41544d4e, len=14344
29,731,365 >>> mbox cmd response data (8 bytes)
29,731,936 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,762,678 UART: [rt]cmd =0x41545348, len=116
29,781,819 >>> mbox cmd response data (12 bytes)
29,782,968 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,813,971 UART: [rt]cmd =0x41545348, len=116
29,816,059 >>> mbox cmd response data (12 bytes)
31,872,598 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,987,749 >>> mbox cmd response: success
38,988,301 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,023,097 UART:
39,023,401 UART: Running Caliptra FMC ...
39,024,612 UART:
39,024,784 UART: [state] CFI Enabled
39,111,628 UART: [art] Extend RT PCRs Done
39,112,826 UART: [art] Lock RT PCRs Done
39,114,181 UART: [art] Populate DV Done
39,119,702 UART: [fht] FMC Alias Private Key: 7
39,121,437 UART: [art] Derive CDI
39,122,265 UART: [art] Store in in slot 0x4
39,180,209 UART: [art] Derive Key Pair
39,181,229 UART: [art] Store priv key in slot 0x5
41,643,999 UART: [art] Derive Key Pair - Done
41,657,016 UART: [art] Signing Cert with AUTHO
41,658,329 UART: RITY.KEYID = 7
43,369,988 UART: [art] Erasing AUTHORITY.KEYID = 7
43,371,495 UART: [art] PUB.X = E96D5D2CA960D21C4E1C43DC9D876B7D5579D46411C2D588605B62E006E7B7A64D94FC72A0137FCB89FE14A8E900075B
43,378,745 UART: [art] PUB.Y = 6E714411668858B0C370695A67A3A9E9E7DE07F4E11083BCAF49C6C5E168D9D1E91F7A1BB00ED5E14610EE62496540BC
43,385,965 UART: [art] SIG.R = 25E20406F83AE672661F5EEC77AAC1CF5BCF19540EE248223ADD35A066B35424CA0D575413FC4B0E9DA3032F6C153D89
43,393,402 UART: [art] SIG.S = E6748EAD623BE63D737E332F6648662C4EA15F004BE5EE7C912B2CF1ADEEEA33B059EA83ED0673AA92BD0B763F83CB3E
44,372,457 UART: Caliptra RT
44,373,168 UART: [state] CFI Enabled
44,708,900 UART: [rt] RT listening for mailbox commands...
44,741,008 UART: [rt]cmd =0x41545348, len=116
44,761,650 >>> mbox cmd response data (12 bytes)
44,762,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,793,538 UART: [rt]cmd =0x41545348, len=116
44,795,470 >>> mbox cmd response data (12 bytes)
48,838,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
48,993,730 UART: [rt]cmd =0x41544d4e, len=14344
52,989,213 >>> mbox cmd response data (8 bytes)
52,989,792 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,020,314 UART: [rt]cmd =0x41545348, len=116
53,040,023 >>> mbox cmd response data (12 bytes)
53,040,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,071,123 UART: [rt]cmd =0x41545348, len=116
53,073,297 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,008 writing to cptra_bootfsm_go
193,244 UART:
193,608 UART: Running Caliptra ROM ...
194,811 UART:
604,442 UART: [state] CFI Enabled
615,187 UART: [state] LifecycleState = Unprovisioned
617,054 UART: [state] DebugLocked = No
619,639 UART: [state] WD Timer not started. Device not locked for debugging
622,898 UART: [kat] SHA2-256
801,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,579 UART: [kat] ++
814,026 UART: [kat] sha1
826,247 UART: [kat] SHA2-256
829,255 UART: [kat] SHA2-384
834,326 UART: [kat] SHA2-512-ACC
837,335 UART: [kat] ECC-384
3,278,876 UART: [kat] HMAC-384Kdf
3,291,896 UART: [kat] LMS
3,821,358 UART: [kat] --
3,825,158 UART: [cold-reset] ++
3,827,379 UART: [fht] FHT @ 0x50003400
3,838,923 UART: [idev] ++
3,839,487 UART: [idev] CDI.KEYID = 6
3,840,517 UART: [idev] SUBJECT.KEYID = 7
3,841,638 UART: [idev] UDS.KEYID = 0
3,842,623 ready_for_fw is high
3,842,829 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,236 UART: [idev] Erasing UDS.KEYID = 0
6,317,825 UART: [idev] Sha1 KeyId Algorithm
6,340,778 UART: [idev] --
6,344,870 UART: [ldev] ++
6,345,438 UART: [ldev] CDI.KEYID = 6
6,346,324 UART: [ldev] SUBJECT.KEYID = 5
6,347,533 UART: [ldev] AUTHORITY.KEYID = 7
6,348,763 UART: [ldev] FE.KEYID = 1
6,359,252 UART: [ldev] Erasing FE.KEYID = 1
8,832,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,799 UART: [ldev] --
10,619,611 UART: [fwproc] Wait for Commands...
10,622,677 UART: [fwproc] Recv command 0x46574c44
10,624,776 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,485,961 >>> mbox cmd response: success
14,489,728 UART: [afmc] ++
14,490,327 UART: [afmc] CDI.KEYID = 6
14,491,243 UART: [afmc] SUBJECT.KEYID = 7
14,492,342 UART: [afmc] AUTHORITY.KEYID = 5
16,996,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,326 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,254 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,230 UART: [afmc] --
18,789,992 UART: [cold-reset] --
18,793,588 UART: [state] Locking Datavault
18,798,995 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,696 UART: [state] Locking ICCM
18,803,255 UART: [exit] Launching FMC @ 0x40000130
18,811,660 UART:
18,811,900 UART: Running Caliptra FMC ...
18,813,004 UART:
18,813,173 UART: [state] CFI Enabled
18,821,814 UART: [fht] FMC Alias Private Key: 7
20,579,141 UART: [art] Extend RT PCRs Done
20,580,358 UART: [art] Lock RT PCRs Done
20,582,029 UART: [art] Populate DV Done
20,587,389 UART: [fht] FMC Alias Private Key: 7
20,588,981 UART: [art] Derive CDI
20,589,722 UART: [art] Store in in slot 0x4
20,632,258 UART: [art] Derive Key Pair
20,633,299 UART: [art] Store priv key in slot 0x5
23,060,647 UART: [art] Derive Key Pair - Done
23,073,538 UART: [art] Signing Cert with AUTHO
23,074,841 UART: RITY.KEYID = 7
24,780,204 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,712 UART: [art] PUB.X = 8E5FE55009D3F4E22D74FCB1AEBA1A54D69CA4AAC8DB53CC37EB1A3DFFDBBD06D2827271616C4684F0E40A1FCE497A87
24,788,972 UART: [art] PUB.Y = 59BE6DFECEF4BA1B49A35010793969B35A5E0B065044D7F81E14B93E8AB94412E20538E2D633EA67D7B1D0CF7B934557
24,796,265 UART: [art] SIG.R = 170234A7B8571259299F49DCDF32C18D5A98D208DB7D15624BFA851404AE4276B03E082755F9D084EB0260442F2543D2
24,803,623 UART: [art] SIG.S = DE40C7F0E852A525B621A39FF681989E300788CC8702C88D1741B9D6FBF13C505CAC6748B747EBCC8B89E73417765CED
25,783,036 UART: Caliptra RT
25,783,750 UART: [state] CFI Enabled
25,900,906 UART: [rt] RT listening for mailbox commands...
25,903,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,058,492 UART: [rt]cmd =0x41544d4e, len=14344
30,054,531 >>> mbox cmd response data (8 bytes)
30,055,145 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,085,940 UART: [rt]cmd =0x41545348, len=116
30,105,213 >>> mbox cmd response data (12 bytes)
30,106,408 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,137,273 UART: [rt]cmd =0x41545348, len=116
30,139,672 >>> mbox cmd response data (12 bytes)
32,191,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,336,377 UART:
32,336,765 UART: Running Caliptra ROM ...
32,337,817 UART:
32,337,970 UART: [state] CFI Enabled
32,347,071 UART: [state] LifecycleState = Unprovisioned
32,348,915 UART: [state] DebugLocked = No
32,350,328 UART: [state] WD Timer not started. Device not locked for debugging
32,353,684 UART: [kat] SHA2-256
32,532,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,544,422 UART: [kat] ++
32,544,882 UART: [kat] sha1
32,555,171 UART: [kat] SHA2-256
32,558,186 UART: [kat] SHA2-384
32,563,255 UART: [kat] SHA2-512-ACC
32,566,190 UART: [kat] ECC-384
35,008,690 UART: [kat] HMAC-384Kdf
35,021,795 UART: [kat] LMS
35,551,310 UART: [kat] --
35,557,136 UART: [update-reset] ++
38,991,908 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,994,983 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,377,340 >>> mbox cmd response: success
39,377,785 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,378,229 UART: [update-reset] Copying MAN_2 To MAN_1
39,400,344 UART: [update-reset Success] --
39,406,155 UART: [state] Locking Datavault
39,408,793 UART: [state] Locking PCR0, PCR1 and PCR31
39,410,443 UART: [state] Locking ICCM
39,413,028 UART: [exit] Launching FMC @ 0x40000130
39,421,482 UART:
39,421,725 UART: Running Caliptra FMC ...
39,422,827 UART:
39,422,985 UART: [state] CFI Enabled
39,467,232 UART: [art] Extend RT PCRs Done
39,468,376 UART: [art] Lock RT PCRs Done
39,469,985 UART: [art] Populate DV Done
39,475,444 UART: [fht] FMC Alias Private Key: 7
39,477,085 UART: [art] Derive CDI
39,477,896 UART: [art] Store in in slot 0x4
39,520,387 UART: [art] Derive Key Pair
39,521,431 UART: [art] Store priv key in slot 0x5
41,948,311 UART: [art] Derive Key Pair - Done
41,961,386 UART: [art] Signing Cert with AUTHO
41,962,694 UART: RITY.KEYID = 7
43,668,265 UART: [art] Erasing AUTHORITY.KEYID = 7
43,669,775 UART: [art] PUB.X = 18853584E40C69AF318105159A350FD7E1CD48784AA1EC01735FBCBD139DCFA3F83E57809CA120592C418F5AD0E29C47
43,677,034 UART: [art] PUB.Y = 7E26EA711E6BD745221F2135D0BA561333807561235D4FBCE51DC6D3040AF9B43A17BBDFC7BCABE64B4702E58EB396FE
43,684,270 UART: [art] SIG.R = 1ACA9EE4ADB2B50363064C886BB5B15848769785984BD6B9B08DBF02E1F9CB50CF1786C3F2640F2837FD2AB6A8574EBA
43,691,718 UART: [art] SIG.S = 63B5BDA8468FAEE6F56B4B323141D2463A1FE7C4B5E6AAFA26391E84CD6B8EADCF6964157AA5CDF2D79FBAAE06A1828B
44,670,400 UART: Caliptra RT
44,671,100 UART: [state] CFI Enabled
44,955,691 UART: [rt] RT listening for mailbox commands...
44,987,430 UART: [rt]cmd =0x41545348, len=116
45,008,141 >>> mbox cmd response data (12 bytes)
45,009,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,039,885 UART: [rt]cmd =0x41545348, len=116
45,042,368 >>> mbox cmd response data (12 bytes)
49,068,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,224,545 UART: [rt]cmd =0x41544d4e, len=14344
53,220,314 >>> mbox cmd response data (8 bytes)
53,221,359 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,252,093 UART: [rt]cmd =0x41545348, len=116
53,271,536 >>> mbox cmd response data (12 bytes)
53,271,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,302,791 UART: [rt]cmd =0x41545348, len=116
53,305,269 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
3,698,091 ready_for_fw is high
3,698,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,854 >>> mbox cmd response: success
18,505,542 UART:
18,505,968 UART: Running Caliptra FMC ...
18,507,115 UART:
18,507,278 UART: [state] CFI Enabled
18,515,335 UART: [fht] FMC Alias Private Key: 7
20,272,138 UART: [art] Extend RT PCRs Done
20,273,346 UART: [art] Lock RT PCRs Done
20,275,187 UART: [art] Populate DV Done
20,280,547 UART: [fht] FMC Alias Private Key: 7
20,282,252 UART: [art] Derive CDI
20,283,072 UART: [art] Store in in slot 0x4
20,325,344 UART: [art] Derive Key Pair
20,326,376 UART: [art] Store priv key in slot 0x5
22,752,790 UART: [art] Derive Key Pair - Done
22,765,525 UART: [art] Signing Cert with AUTHO
22,766,835 UART: RITY.KEYID = 7
24,472,260 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,756 UART: [art] PUB.X = F71F60695AB9363A67D3923CD5AE817E5F47E684C01B4E10259E0EB4271A94B076859567A6B617272F98795083C4EAC2
24,481,008 UART: [art] PUB.Y = EA0AE5C31755E4E7E219B8E6DD48B0B66E8B5777EC73F3A91397D4D3077B3B24FC029DBBEE9F2AE0F015ABE1CED9CBBE
24,488,278 UART: [art] SIG.R = 0168D2FD31741076EA896EAD36DC6A8B740EFBAD2D74A2E0F4280C7595488599585011B59683519C8CCAE6CD5D15F3B7
24,495,673 UART: [art] SIG.S = BAB922A54FA20972763E298D9E32D05C84533CCB916701E7C2A314673B22E7F36BBBD277A494FA6369DDE0405D1B49AB
25,474,063 UART: Caliptra RT
25,474,779 UART: [state] CFI Enabled
25,592,410 UART: [rt] RT listening for mailbox commands...
25,594,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,750,057 UART: [rt]cmd =0x41544d4e, len=14344
29,745,761 >>> mbox cmd response data (8 bytes)
29,746,339 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,776,964 UART: [rt]cmd =0x41545348, len=116
29,796,990 >>> mbox cmd response data (12 bytes)
29,798,167 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,828,919 UART: [rt]cmd =0x41545348, len=116
29,830,985 >>> mbox cmd response data (12 bytes)
31,888,632 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,933,441 >>> mbox cmd response: success
38,934,061 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,968,845 UART:
38,969,142 UART: Running Caliptra FMC ...
38,970,345 UART:
38,970,509 UART: [state] CFI Enabled
39,014,823 UART: [art] Extend RT PCRs Done
39,016,020 UART: [art] Lock RT PCRs Done
39,017,299 UART: [art] Populate DV Done
39,022,832 UART: [fht] FMC Alias Private Key: 7
39,024,372 UART: [art] Derive CDI
39,025,116 UART: [art] Store in in slot 0x4
39,067,871 UART: [art] Derive Key Pair
39,068,875 UART: [art] Store priv key in slot 0x5
41,495,783 UART: [art] Derive Key Pair - Done
41,508,409 UART: [art] Signing Cert with AUTHO
41,509,723 UART: RITY.KEYID = 7
43,215,018 UART: [art] Erasing AUTHORITY.KEYID = 7
43,216,525 UART: [art] PUB.X = C8E543B0B7157710E5961EDC4AAD61DA1A495B65027579998190F336C0C03B972EA8D4EC393DC65767C6F4DE07299EA6
43,223,768 UART: [art] PUB.Y = 6DBA3741128A44AA7564301416D85D4788A2341E3D1AB6C5B9C352EC6B795B625DFE379B2B1574BEE43D04F69603C86C
43,231,009 UART: [art] SIG.R = A4CAD183AEAB5A952E2DB1C0A28DA24AF61E01475BB6150D8A1D6140B923BD534A61301DDE02F8FBC10DC6C39A6CDB29
43,238,402 UART: [art] SIG.S = 69A2AB9FA5C48B8A4EF39B39B2F16D6B213B4CD1D4562019BAC55DD4649060B71B81EBE57DDC5A38184EE33C29D67109
44,217,751 UART: Caliptra RT
44,218,467 UART: [state] CFI Enabled
44,504,604 UART: [rt] RT listening for mailbox commands...
44,536,487 UART: [rt]cmd =0x41545348, len=116
44,556,475 >>> mbox cmd response data (12 bytes)
44,557,524 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,588,286 UART: [rt]cmd =0x41545348, len=116
44,590,488 >>> mbox cmd response data (12 bytes)
48,619,518 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
48,774,712 UART: [rt]cmd =0x41544d4e, len=14344
52,770,486 >>> mbox cmd response data (8 bytes)
52,771,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,801,669 UART: [rt]cmd =0x41545348, len=116
52,820,618 >>> mbox cmd response data (12 bytes)
52,821,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
52,851,772 UART: [rt]cmd =0x41545348, len=116
52,853,894 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,138 UART:
192,503 UART: Running Caliptra ROM ...
193,707 UART:
193,860 UART: [state] CFI Enabled
265,820 UART: [state] LifecycleState = Unprovisioned
268,157 UART: [state] DebugLocked = No
270,121 UART: [state] WD Timer not started. Device not locked for debugging
275,159 UART: [kat] SHA2-256
465,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,848 UART: [kat] ++
476,304 UART: [kat] sha1
487,961 UART: [kat] SHA2-256
490,979 UART: [kat] SHA2-384
496,758 UART: [kat] SHA2-512-ACC
499,339 UART: [kat] ECC-384
2,945,901 UART: [kat] HMAC-384Kdf
2,972,486 UART: [kat] LMS
3,504,245 UART: [kat] --
3,508,743 UART: [cold-reset] ++
3,510,886 UART: [fht] FHT @ 0x50003400
3,521,010 UART: [idev] ++
3,521,648 UART: [idev] CDI.KEYID = 6
3,522,632 UART: [idev] SUBJECT.KEYID = 7
3,523,802 UART: [idev] UDS.KEYID = 0
3,524,729 ready_for_fw is high
3,524,967 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,712 UART: [idev] Erasing UDS.KEYID = 0
6,029,911 UART: [idev] Sha1 KeyId Algorithm
6,052,507 UART: [idev] --
6,057,475 UART: [ldev] ++
6,058,159 UART: [ldev] CDI.KEYID = 6
6,059,047 UART: [ldev] SUBJECT.KEYID = 5
6,060,265 UART: [ldev] AUTHORITY.KEYID = 7
6,061,497 UART: [ldev] FE.KEYID = 1
6,101,615 UART: [ldev] Erasing FE.KEYID = 1
8,604,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,065 UART: [ldev] --
10,414,675 UART: [fwproc] Wait for Commands...
10,417,532 UART: [fwproc] Recv command 0x46574c44
10,419,785 UART: [fwproc] Recv'd Img size: 114168 bytes
13,869,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,604,950 >>> mbox cmd response: success
14,609,094 UART: [afmc] ++
14,609,767 UART: [afmc] CDI.KEYID = 6
14,611,018 UART: [afmc] SUBJECT.KEYID = 7
14,612,467 UART: [afmc] AUTHORITY.KEYID = 5
17,151,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,775 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,899 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,966 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,114 UART: [afmc] --
18,948,933 UART: [cold-reset] --
18,953,943 UART: [state] Locking Datavault
18,959,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,487 UART: [state] Locking ICCM
18,964,019 UART: [exit] Launching FMC @ 0x40000130
18,972,676 UART:
18,972,914 UART: Running Caliptra FMC ...
18,974,019 UART:
18,974,183 UART: [state] CFI Enabled
19,033,845 UART: [fht] FMC Alias Private Key: 7
20,798,202 UART: [art] Extend RT PCRs Done
20,799,421 UART: [art] Lock RT PCRs Done
20,801,232 UART: [art] Populate DV Done
20,806,637 UART: [fht] FMC Alias Private Key: 7
20,808,093 UART: [art] Derive CDI
20,808,838 UART: [art] Store in in slot 0x4
20,866,094 UART: [art] Derive Key Pair
20,867,135 UART: [art] Store priv key in slot 0x5
23,330,477 UART: [art] Derive Key Pair - Done
23,343,694 UART: [art] Signing Cert with AUTHO
23,345,009 UART: RITY.KEYID = 7
25,057,004 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,515 UART: [art] PUB.X = C429AD8BA379B2929112DAF781EA756B37F05B970F38C18EFE88E73166E55F8C405F7568226740BB3370A662CDF5F2A1
25,065,737 UART: [art] PUB.Y = 959CE1658636CFEB1F306BA4B14398A141E21500C262AE367F51AD2033770D564F2411AAA28A5B85D120CF1DDACC65D4
25,073,005 UART: [art] SIG.R = 1C8618990DFD1EF1617B8558A8E93DCF09044DEB0D4443A0D8DC21DE7C454CDA323EBAF7C1F706C603A2C3BA893B5DB5
25,080,373 UART: [art] SIG.S = A19536B09E4B02FD233195E3385E6C559F00CB6E09BC2C12690C6D9222BF6B681CDF5E2AF3DBFE6BE95B1BD771DA2913
26,060,190 UART: Caliptra RT
26,060,911 UART: [state] CFI Enabled
26,224,285 UART: [rt] RT listening for mailbox commands...
26,226,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,381,880 UART: [rt]cmd =0x41544d4e, len=14344
30,377,159 >>> mbox cmd response data (8 bytes)
30,377,764 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,408,497 UART: [rt]cmd =0x41545348, len=116
30,428,584 >>> mbox cmd response data (12 bytes)
30,429,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,460,847 UART: [rt]cmd =0x41545348, len=116
30,462,939 >>> mbox cmd response data (12 bytes)
32,518,522 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,663,410 UART:
32,663,782 UART: Running Caliptra ROM ...
32,664,944 UART:
32,665,124 UART: [state] CFI Enabled
32,734,645 UART: [state] LifecycleState = Unprovisioned
32,736,704 UART: [state] DebugLocked = No
32,738,519 UART: [state] WD Timer not started. Device not locked for debugging
32,742,171 UART: [kat] SHA2-256
32,932,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,942,813 UART: [kat] ++
32,943,300 UART: [kat] sha1
32,953,761 UART: [kat] SHA2-256
32,956,740 UART: [kat] SHA2-384
32,963,115 UART: [kat] SHA2-512-ACC
32,965,743 UART: [kat] ECC-384
35,418,759 UART: [kat] HMAC-384Kdf
35,440,416 UART: [kat] LMS
35,972,028 UART: [kat] --
35,977,636 UART: [update-reset] ++
39,431,321 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,433,885 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
40,040,487 >>> mbox cmd response: success
40,045,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,045,821 UART: [update-reset] Copying MAN_2 To MAN_1
40,079,505 UART: [update-reset Success] --
40,083,424 UART: [state] Locking Datavault
40,087,339 UART: [state] Locking PCR0, PCR1 and PCR31
40,089,539 UART: [state] Locking ICCM
40,091,323 UART: [exit] Launching FMC @ 0x40000130
40,100,013 UART:
40,100,279 UART: Running Caliptra FMC ...
40,101,309 UART:
40,101,458 UART: [state] CFI Enabled
40,188,459 UART: [art] Extend RT PCRs Done
40,189,662 UART: [art] Lock RT PCRs Done
40,190,989 UART: [art] Populate DV Done
40,196,673 UART: [fht] FMC Alias Private Key: 7
40,198,262 UART: [art] Derive CDI
40,199,079 UART: [art] Store in in slot 0x4
40,257,039 UART: [art] Derive Key Pair
40,258,052 UART: [art] Store priv key in slot 0x5
42,721,292 UART: [art] Derive Key Pair - Done
42,734,513 UART: [art] Signing Cert with AUTHO
42,735,818 UART: RITY.KEYID = 7
44,447,815 UART: [art] Erasing AUTHORITY.KEYID = 7
44,449,323 UART: [art] PUB.X = FE65021A0DB4A79F81B3CDA6F13DC368C281911226B7A1996186C7358BC66779AFF10600CB52C746783A1BE74F2B7C7F
44,456,540 UART: [art] PUB.Y = CA0138A2139435846BAC7D4C33469904069590839667751D9F56FE59F1AA1F902473549636C2E987E717DCF1B056AC5D
44,463,782 UART: [art] SIG.R = 4632633F588CD8351FDF24E4CE5DAC88DECAC648BA75E71DA3217AA8E209D340BB59C52C141991C81792487E3D236FE7
44,471,148 UART: [art] SIG.S = F5C975101FF666538786CC322A76F4486B08526952E886393F4288A9C6241AED1C1EC2E5ACA32ED8F17DF5D09DDE3F6D
45,449,390 UART: Caliptra RT
45,450,079 UART: [state] CFI Enabled
45,787,389 UART: [rt] RT listening for mailbox commands...
45,819,249 UART: [rt]cmd =0x41545348, len=116
45,838,996 >>> mbox cmd response data (12 bytes)
45,839,863 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,870,530 UART: [rt]cmd =0x41545348, len=116
45,872,655 >>> mbox cmd response data (12 bytes)
49,898,031 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,053,451 UART: [rt]cmd =0x41544d4e, len=14344
54,049,548 >>> mbox cmd response data (8 bytes)
54,050,118 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,080,907 UART: [rt]cmd =0x41545348, len=116
54,101,173 >>> mbox cmd response data (12 bytes)
54,101,594 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,132,369 UART: [rt]cmd =0x41545348, len=116
54,134,602 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,434,970 ready_for_fw is high
3,435,333 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,741,985 >>> mbox cmd response: success
19,028,642 UART:
19,029,052 UART: Running Caliptra FMC ...
19,030,192 UART:
19,030,370 UART: [state] CFI Enabled
19,093,427 UART: [fht] FMC Alias Private Key: 7
20,856,686 UART: [art] Extend RT PCRs Done
20,857,911 UART: [art] Lock RT PCRs Done
20,859,540 UART: [art] Populate DV Done
20,865,187 UART: [fht] FMC Alias Private Key: 7
20,866,552 UART: [art] Derive CDI
20,867,302 UART: [art] Store in in slot 0x4
20,925,531 UART: [art] Derive Key Pair
20,926,533 UART: [art] Store priv key in slot 0x5
23,389,444 UART: [art] Derive Key Pair - Done
23,402,388 UART: [art] Signing Cert with AUTHO
23,403,692 UART: RITY.KEYID = 7
25,114,656 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,147 UART: [art] PUB.X = 5E6F47ACC38B0FD652BAABDC7770B14F49F6BA783D9735939D11A0D17C3FBE420823B20C311E703E0D81246B8D7E213E
25,123,438 UART: [art] PUB.Y = 8B60DF24B9FEBB35BAE3E11030F5F340F62482937D5F7E5EA150274CAB715089A877690391AD430D4DE71653410C7BCB
25,130,691 UART: [art] SIG.R = DDBF06F748BE672789D3507D1929F4EAD42A3328C4DBD1E3448703B5C2AD895C9A7D2E39E7462A896C51384A4FCDC09E
25,138,126 UART: [art] SIG.S = 69BE70AA5B0A705EE88D11E7E4700CF51E0AA761CBC87D1DE91CD24E2A52756F70C07336B056EF1A762BE70679D5D2D6
26,116,998 UART: Caliptra RT
26,117,723 UART: [state] CFI Enabled
26,282,828 UART: [rt] RT listening for mailbox commands...
26,285,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,440,690 UART: [rt]cmd =0x41544d4e, len=14344
30,436,802 >>> mbox cmd response data (8 bytes)
30,437,390 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,468,127 UART: [rt]cmd =0x41545348, len=116
30,488,616 >>> mbox cmd response data (12 bytes)
30,489,788 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,520,624 UART: [rt]cmd =0x41545348, len=116
30,522,874 >>> mbox cmd response data (12 bytes)
32,578,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,391,966 >>> mbox cmd response: success
40,392,577 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,428,120 UART:
40,428,418 UART: Running Caliptra FMC ...
40,429,633 UART:
40,429,802 UART: [state] CFI Enabled
40,519,912 UART: [art] Extend RT PCRs Done
40,521,099 UART: [art] Lock RT PCRs Done
40,522,508 UART: [art] Populate DV Done
40,527,915 UART: [fht] FMC Alias Private Key: 7
40,529,613 UART: [art] Derive CDI
40,530,429 UART: [art] Store in in slot 0x4
40,589,336 UART: [art] Derive Key Pair
40,590,370 UART: [art] Store priv key in slot 0x5
43,053,527 UART: [art] Derive Key Pair - Done
43,066,574 UART: [art] Signing Cert with AUTHO
43,067,893 UART: RITY.KEYID = 7
44,778,889 UART: [art] Erasing AUTHORITY.KEYID = 7
44,780,393 UART: [art] PUB.X = D5AA600ACA5DE3A06BF525AD65EE7498BD1D2811A7B931E1C64F09185B3E48D5D32ABF2152EA1CDD04ADF6E55CA4014D
44,787,689 UART: [art] PUB.Y = 152E0EB1E47D72787590142405AF291AD8CC7C5D4C1048AC2E91A46B3FAA4121C223B99EE1583420E6BB9EB82830BA08
44,794,918 UART: [art] SIG.R = C16A7808D2F9A05101AB557372473AE1A520952DEDDD0171AB82C7A609EF1676CB6344A94AA084F9096767A9902B203D
44,802,307 UART: [art] SIG.S = F38045AA1D8BE391A57A88744F4C044635AA46C36F9B4CAC8F285D03C58236718F6CFD1FBAFCFAFE7C15777CCB98DF4E
45,781,272 UART: Caliptra RT
45,781,966 UART: [state] CFI Enabled
46,112,325 UART: [rt] RT listening for mailbox commands...
46,144,219 UART: [rt]cmd =0x41545348, len=116
46,164,753 >>> mbox cmd response data (12 bytes)
46,165,593 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,196,431 UART: [rt]cmd =0x41545348, len=116
46,198,578 >>> mbox cmd response data (12 bytes)
50,226,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,382,276 UART: [rt]cmd =0x41544d4e, len=14344
54,377,753 >>> mbox cmd response data (8 bytes)
54,378,294 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,408,863 UART: [rt]cmd =0x41545348, len=116
54,429,186 >>> mbox cmd response data (12 bytes)
54,429,618 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,460,483 UART: [rt]cmd =0x41545348, len=116
54,462,506 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,799 writing to cptra_bootfsm_go
193,069 UART:
193,453 UART: Running Caliptra ROM ...
194,595 UART:
604,259 UART: [state] CFI Enabled
619,687 UART: [state] LifecycleState = Unprovisioned
622,050 UART: [state] DebugLocked = No
624,309 UART: [state] WD Timer not started. Device not locked for debugging
628,835 UART: [kat] SHA2-256
818,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,549 UART: [kat] ++
830,070 UART: [kat] sha1
841,936 UART: [kat] SHA2-256
845,014 UART: [kat] SHA2-384
850,369 UART: [kat] SHA2-512-ACC
852,944 UART: [kat] ECC-384
3,292,533 UART: [kat] HMAC-384Kdf
3,305,111 UART: [kat] LMS
3,836,903 UART: [kat] --
3,841,777 UART: [cold-reset] ++
3,843,211 UART: [fht] FHT @ 0x50003400
3,855,751 UART: [idev] ++
3,856,466 UART: [idev] CDI.KEYID = 6
3,857,376 UART: [idev] SUBJECT.KEYID = 7
3,858,550 UART: [idev] UDS.KEYID = 0
3,859,473 ready_for_fw is high
3,859,700 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,168 UART: [idev] Erasing UDS.KEYID = 0
6,338,483 UART: [idev] Sha1 KeyId Algorithm
6,359,649 UART: [idev] --
6,365,719 UART: [ldev] ++
6,366,406 UART: [ldev] CDI.KEYID = 6
6,367,317 UART: [ldev] SUBJECT.KEYID = 5
6,368,535 UART: [ldev] AUTHORITY.KEYID = 7
6,369,712 UART: [ldev] FE.KEYID = 1
6,381,333 UART: [ldev] Erasing FE.KEYID = 1
8,859,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,011 UART: [ldev] --
10,651,573 UART: [fwproc] Wait for Commands...
10,653,400 UART: [fwproc] Recv command 0x46574c44
10,655,707 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,752 >>> mbox cmd response: success
14,836,692 UART: [afmc] ++
14,837,404 UART: [afmc] CDI.KEYID = 6
14,838,518 UART: [afmc] SUBJECT.KEYID = 7
14,840,059 UART: [afmc] AUTHORITY.KEYID = 5
17,343,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,683 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,135,999 UART: [afmc] --
19,140,413 UART: [cold-reset] --
19,143,738 UART: [state] Locking Datavault
19,148,841 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,022 UART: [state] Locking ICCM
19,153,514 UART: [exit] Launching FMC @ 0x40000130
19,162,149 UART:
19,162,387 UART: Running Caliptra FMC ...
19,163,491 UART:
19,163,654 UART: [state] CFI Enabled
19,171,871 UART: [fht] FMC Alias Private Key: 7
20,928,812 UART: [art] Extend RT PCRs Done
20,930,046 UART: [art] Lock RT PCRs Done
20,931,432 UART: [art] Populate DV Done
20,936,800 UART: [fht] FMC Alias Private Key: 7
20,938,362 UART: [art] Derive CDI
20,939,101 UART: [art] Store in in slot 0x4
20,982,180 UART: [art] Derive Key Pair
20,983,179 UART: [art] Store priv key in slot 0x5
23,410,528 UART: [art] Derive Key Pair - Done
23,423,633 UART: [art] Signing Cert with AUTHO
23,424,926 UART: RITY.KEYID = 7
25,130,542 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,050 UART: [art] PUB.X = D9E64D5EACBD4FC1363C8AD9CFE311F943B2F73BCF13ED5042B890E1D75B9504B20F9E926C6353F7BFC17F1C4C1D3E4C
25,139,361 UART: [art] PUB.Y = 390E4BC4F87727617918608746AEAC62E37A1339152E126D4296DED37BAF4D3C5F7B864BD12A364CCD135A2E7E2C449C
25,146,592 UART: [art] SIG.R = F8D62429D0E38E961A996CFE37C1CBA59D6EF27E09C9125B41A05BFEE23C731644BA80CDC2F5997EC97329C806EFE897
25,154,019 UART: [art] SIG.S = C96F4A82E11C690F655B75879B802F7F09E43B5E3DC02964CBDF71B93BA32805E0617997F9D491D2F7E0287C0327783F
26,133,118 UART: Caliptra RT
26,133,813 UART: [state] CFI Enabled
26,250,600 UART: [rt] RT listening for mailbox commands...
26,252,998 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,408,572 UART: [rt]cmd =0x41544d4e, len=14344
30,403,406 >>> mbox cmd response data (8 bytes)
30,403,991 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,434,615 UART: [rt]cmd =0x41545348, len=116
30,455,036 >>> mbox cmd response data (12 bytes)
30,456,118 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,486,908 UART: [rt]cmd =0x41545348, len=116
30,489,014 >>> mbox cmd response data (12 bytes)
32,544,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,690,417 UART:
32,690,804 UART: Running Caliptra ROM ...
32,691,975 UART:
32,692,147 UART: [state] CFI Enabled
32,706,416 UART: [state] LifecycleState = Unprovisioned
32,708,312 UART: [state] DebugLocked = No
32,711,211 UART: [state] WD Timer not started. Device not locked for debugging
32,715,397 UART: [kat] SHA2-256
32,905,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,916,028 UART: [kat] ++
32,916,641 UART: [kat] sha1
32,928,677 UART: [kat] SHA2-256
32,931,695 UART: [kat] SHA2-384
32,938,114 UART: [kat] SHA2-512-ACC
32,940,679 UART: [kat] ECC-384
35,381,892 UART: [kat] HMAC-384Kdf
35,393,899 UART: [kat] LMS
35,925,543 UART: [kat] --
35,931,388 UART: [update-reset] ++
39,388,395 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,391,010 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,997,555 >>> mbox cmd response: success
40,002,351 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,002,961 UART: [update-reset] Copying MAN_2 To MAN_1
40,036,090 UART: [update-reset Success] --
40,040,438 UART: [state] Locking Datavault
40,043,545 UART: [state] Locking PCR0, PCR1 and PCR31
40,045,690 UART: [state] Locking ICCM
40,048,600 UART: [exit] Launching FMC @ 0x40000130
40,057,232 UART:
40,057,488 UART: Running Caliptra FMC ...
40,058,523 UART:
40,058,676 UART: [state] CFI Enabled
40,103,455 UART: [art] Extend RT PCRs Done
40,104,603 UART: [art] Lock RT PCRs Done
40,106,165 UART: [art] Populate DV Done
40,111,614 UART: [fht] FMC Alias Private Key: 7
40,113,256 UART: [art] Derive CDI
40,114,081 UART: [art] Store in in slot 0x4
40,157,002 UART: [art] Derive Key Pair
40,158,097 UART: [art] Store priv key in slot 0x5
42,585,118 UART: [art] Derive Key Pair - Done
42,598,071 UART: [art] Signing Cert with AUTHO
42,599,404 UART: RITY.KEYID = 7
44,305,119 UART: [art] Erasing AUTHORITY.KEYID = 7
44,306,630 UART: [art] PUB.X = CAD57C81832A63E94E23F0370B0EBB3261115AD47319512057DB1F1115696A0055876BA753A1A6A5DF918B570396DAF5
44,313,842 UART: [art] PUB.Y = 2DF192DD81FC82F6C89A2B6487B7A1F323D150037B29DEF9056DC138E52C334B6810358E112036D5770CDE4FAD4B0FDD
44,321,084 UART: [art] SIG.R = 9E8BFEF3006B2B917B137B30B399DC073236E23D58D143AF1CA2DA20023FAE16DDFC0A339784696B2FA1A1B5BE498411
44,328,484 UART: [art] SIG.S = A6EE2D127A6B1AB4E15FEA27AAD42A8F2EB42716828167BFB467B5AB886C43254FBD94D893F9B11885C81B46F40068DE
45,308,074 UART: Caliptra RT
45,308,786 UART: [state] CFI Enabled
45,597,463 UART: [rt] RT listening for mailbox commands...
45,629,210 UART: [rt]cmd =0x41545348, len=116
45,649,629 >>> mbox cmd response data (12 bytes)
45,650,489 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,681,272 UART: [rt]cmd =0x41545348, len=116
45,683,531 >>> mbox cmd response data (12 bytes)
49,709,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,865,062 UART: [rt]cmd =0x41544d4e, len=14344
53,861,146 >>> mbox cmd response data (8 bytes)
53,862,172 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,892,848 UART: [rt]cmd =0x41545348, len=116
53,912,468 >>> mbox cmd response data (12 bytes)
53,912,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,943,576 UART: [rt]cmd =0x41545348, len=116
53,945,665 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,735 writing to cptra_bootfsm_go
3,758,840 ready_for_fw is high
3,759,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,943,828 >>> mbox cmd response: success
19,194,169 UART:
19,194,563 UART: Running Caliptra FMC ...
19,195,745 UART:
19,195,914 UART: [state] CFI Enabled
19,203,856 UART: [fht] FMC Alias Private Key: 7
20,960,729 UART: [art] Extend RT PCRs Done
20,961,952 UART: [art] Lock RT PCRs Done
20,963,739 UART: [art] Populate DV Done
20,969,152 UART: [fht] FMC Alias Private Key: 7
20,970,749 UART: [art] Derive CDI
20,971,575 UART: [art] Store in in slot 0x4
21,014,173 UART: [art] Derive Key Pair
21,015,175 UART: [art] Store priv key in slot 0x5
23,442,012 UART: [art] Derive Key Pair - Done
23,455,023 UART: [art] Signing Cert with AUTHO
23,456,332 UART: RITY.KEYID = 7
25,161,838 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,341 UART: [art] PUB.X = 8D9221CA92BED51051C184DD7D44090CB1CE1410EE2B9681E3DB206941BA155FF734CDD54AE3C27452001A166AFCAC3B
25,170,647 UART: [art] PUB.Y = 02DD453BFDCC05284C9967D02B7CFC6E6EC72A8624190888146A3AC67FC49B3CD1F9CBFCC72B5097C103C9BF63CEC45C
25,177,902 UART: [art] SIG.R = F4FA880EC9968DF69FF6A0C4BA6C59F61ECD825BEBD140BA72C975A20F371E162D4785CFADB87CA3967B6F50D6CF05C6
25,185,361 UART: [art] SIG.S = CB6CC60885FFBEE852D703D5AA1AB866FBA30C1874108834AB8089EBBE74566DDA57996EE4AA2E1350717D207E0D36B9
26,163,870 UART: Caliptra RT
26,164,587 UART: [state] CFI Enabled
26,281,489 UART: [rt] RT listening for mailbox commands...
26,283,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,439,100 UART: [rt]cmd =0x41544d4e, len=14344
30,434,444 >>> mbox cmd response data (8 bytes)
30,435,001 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,465,736 UART: [rt]cmd =0x41545348, len=116
30,485,616 >>> mbox cmd response data (12 bytes)
30,486,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,517,757 UART: [rt]cmd =0x41545348, len=116
30,520,009 >>> mbox cmd response data (12 bytes)
32,574,035 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,302,699 >>> mbox cmd response: success
40,303,310 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,336,249 UART:
40,336,573 UART: Running Caliptra FMC ...
40,337,710 UART:
40,337,866 UART: [state] CFI Enabled
40,381,685 UART: [art] Extend RT PCRs Done
40,382,833 UART: [art] Lock RT PCRs Done
40,384,313 UART: [art] Populate DV Done
40,390,051 UART: [fht] FMC Alias Private Key: 7
40,391,582 UART: [art] Derive CDI
40,392,323 UART: [art] Store in in slot 0x4
40,434,885 UART: [art] Derive Key Pair
40,435,887 UART: [art] Store priv key in slot 0x5
42,862,407 UART: [art] Derive Key Pair - Done
42,875,400 UART: [art] Signing Cert with AUTHO
42,876,739 UART: RITY.KEYID = 7
44,581,941 UART: [art] Erasing AUTHORITY.KEYID = 7
44,583,441 UART: [art] PUB.X = 5431A36D47F1A7051CB5508FACE24B5F60F4F42E6BC7FFC30176368B04B0736C568C18D8436091297D8D45B9F713EAF8
44,590,744 UART: [art] PUB.Y = 4591933E9851655BE1EFB140800776226FE42C123867F63D0610ED5E93CC3953F55EF74B9AFDD63E8C0923412A09A507
44,597,975 UART: [art] SIG.R = 9F1F124227CDE98565BCF919D5DF6683690DA9D6076415875E62A907B86166FC414BA774A9EF663575C3DF5918E46B3D
44,605,307 UART: [art] SIG.S = 36E75F05613BC964019F73770BC615A0F345F65B81B29869C1C53A91D6517B487C0BDB1A797ACE2818708D7A2EB51BFD
45,584,176 UART: Caliptra RT
45,584,864 UART: [state] CFI Enabled
45,872,373 UART: [rt] RT listening for mailbox commands...
45,904,337 UART: [rt]cmd =0x41545348, len=116
45,924,884 >>> mbox cmd response data (12 bytes)
45,925,692 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,956,230 UART: [rt]cmd =0x41545348, len=116
45,958,334 >>> mbox cmd response data (12 bytes)
49,983,479 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,139,302 UART: [rt]cmd =0x41544d4e, len=14344
54,134,913 >>> mbox cmd response data (8 bytes)
54,135,493 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,166,099 UART: [rt]cmd =0x41545348, len=116
54,185,244 >>> mbox cmd response data (12 bytes)
54,185,678 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,216,227 UART: [rt]cmd =0x41545348, len=116
54,218,256 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,411 UART: [kat] SHA2-256
882,342 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,457 UART: [kat] ++
886,609 UART: [kat] sha1
890,809 UART: [kat] SHA2-256
892,747 UART: [kat] SHA2-384
895,606 UART: [kat] SHA2-512-ACC
897,507 UART: [kat] ECC-384
903,054 UART: [kat] HMAC-384Kdf
907,798 UART: [kat] LMS
1,475,994 UART: [kat] --
1,476,791 UART: [cold-reset] ++
1,477,231 UART: [fht] Storing FHT @ 0x50003400
1,479,930 UART: [idev] ++
1,480,098 UART: [idev] CDI.KEYID = 6
1,480,458 UART: [idev] SUBJECT.KEYID = 7
1,480,882 UART: [idev] UDS.KEYID = 0
1,481,227 ready_for_fw is high
1,481,227 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,828 UART: [idev] Erasing UDS.KEYID = 0
1,505,338 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,948 UART: [idev] --
1,515,077 UART: [ldev] ++
1,515,245 UART: [ldev] CDI.KEYID = 6
1,515,608 UART: [ldev] SUBJECT.KEYID = 5
1,516,034 UART: [ldev] AUTHORITY.KEYID = 7
1,516,497 UART: [ldev] FE.KEYID = 1
1,521,369 UART: [ldev] Erasing FE.KEYID = 1
1,546,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,070 UART: [ldev] --
1,585,553 UART: [fwproc] Waiting for Commands...
1,586,180 UART: [fwproc] Received command 0x46574c44
1,586,971 UART: [fwproc] Received Image of size 114168 bytes
2,883,959 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,879 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,958 >>> mbox cmd response: success
3,078,180 UART: [afmc] ++
3,078,348 UART: [afmc] CDI.KEYID = 6
3,078,710 UART: [afmc] SUBJECT.KEYID = 7
3,079,135 UART: [afmc] AUTHORITY.KEYID = 5
3,114,014 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,472 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,980 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,865 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,555 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,408 UART: [afmc] --
3,157,302 UART: [cold-reset] --
3,158,078 UART: [state] Locking Datavault
3,159,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,831 UART: [state] Locking ICCM
3,160,399 UART: [exit] Launching FMC @ 0x40000130
3,165,728 UART:
3,165,744 UART: Running Caliptra FMC ...
3,166,152 UART:
3,166,206 UART: [state] CFI Enabled
3,176,755 UART: [fht] FMC Alias Private Key: 7
3,284,944 UART: [art] Extend RT PCRs Done
3,285,372 UART: [art] Lock RT PCRs Done
3,286,988 UART: [art] Populate DV Done
3,294,945 UART: [fht] FMC Alias Private Key: 7
3,295,981 UART: [art] Derive CDI
3,296,261 UART: [art] Store in in slot 0x4
3,381,492 UART: [art] Derive Key Pair
3,381,852 UART: [art] Store priv key in slot 0x5
3,395,152 UART: [art] Derive Key Pair - Done
3,410,146 UART: [art] Signing Cert with AUTHO
3,410,626 UART: RITY.KEYID = 7
3,425,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,545 UART: [art] PUB.X = BEA14277C09CCA5DE29C4660CA415231D9C884D9527B4F4B8B36EA7813B52F2C658C28F2E4F95269F03F967E1FE89B6D
3,433,323 UART: [art] PUB.Y = CF75010BA00C79437F8FC3343396BF1DF79051B919A421ED4CE007D401C0A1A20860B7898508AD5587D583816769DFB9
3,440,248 UART: [art] SIG.R = 3A85F6EB3459287445F51E5F4A443F213E09573D2589792FAD945ED301AA98441E3B1B868E66E05294A9923580719E8B
3,447,002 UART: [art] SIG.S = C532DF72280A6F26B1E699A201E67A097FB91B8B599466F6C446A81828605576E2E93F3AFF7D354C3851F9AE384C1BC1
3,471,092 UART: Caliptra RT
3,471,345 UART: [state] CFI Enabled
3,580,594 UART: [rt] RT listening for mailbox commands...
3,581,264 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,340 UART: [rt]cmd =0x41544d4e, len=14344
4,013,820 >>> mbox cmd response data (8 bytes)
4,013,821 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,822 UART: [rt]cmd =0x41545348, len=116
4,065,995 >>> mbox cmd response data (12 bytes)
4,065,996 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,096,107 UART: [rt]cmd =0x41545348, len=116
4,097,960 >>> mbox cmd response data (12 bytes)
4,097,961 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,417 UART:
4,098,433 UART: Running Caliptra ROM ...
4,098,841 UART:
4,098,895 UART: [state] CFI Enabled
4,101,927 UART: [state] LifecycleState = Unprovisioned
4,102,582 UART: [state] DebugLocked = No
4,103,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,104,887 UART: [kat] SHA2-256
4,898,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,902,933 UART: [kat] ++
4,903,085 UART: [kat] sha1
4,907,469 UART: [kat] SHA2-256
4,909,407 UART: [kat] SHA2-384
4,912,056 UART: [kat] SHA2-512-ACC
4,913,956 UART: [kat] ECC-384
4,919,809 UART: [kat] HMAC-384Kdf
4,924,517 UART: [kat] LMS
5,492,713 UART: [kat] --
5,493,752 UART: [update-reset] ++
6,825,854 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,826,952 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,976,582 >>> mbox cmd response: success
6,976,582 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,976,771 UART: [update-reset] Copying MAN_2 To MAN_1
6,984,785 UART: [update-reset Success] --
6,985,728 UART: [state] Locking Datavault
6,986,562 UART: [state] Locking PCR0, PCR1 and PCR31
6,987,166 UART: [state] Locking ICCM
6,987,642 UART: [exit] Launching FMC @ 0x40000130
6,992,971 UART:
6,992,987 UART: Running Caliptra FMC ...
6,993,395 UART:
6,993,449 UART: [state] CFI Enabled
7,081,962 UART: [art] Extend RT PCRs Done
7,082,390 UART: [art] Lock RT PCRs Done
7,083,649 UART: [art] Populate DV Done
7,091,728 UART: [fht] FMC Alias Private Key: 7
7,092,772 UART: [art] Derive CDI
7,093,052 UART: [art] Store in in slot 0x4
7,178,619 UART: [art] Derive Key Pair
7,178,979 UART: [art] Store priv key in slot 0x5
7,191,921 UART: [art] Derive Key Pair - Done
7,206,592 UART: [art] Signing Cert with AUTHO
7,207,072 UART: RITY.KEYID = 7
7,222,322 UART: [art] Erasing AUTHORITY.KEYID = 7
7,223,087 UART: [art] PUB.X = 47881DB47A57FD151788E105D67E546F35E53902AE06B81C8AFEF57AF4B1989BFB7B0460FA061B59AB5C35B96AFA30AD
7,229,854 UART: [art] PUB.Y = 662E4A9820A9B0D98B7365D0C1F8E313C2DF695F69C0DD9A98FF15C5BDA1F4049352B59D7B21D650AD34E8CEB67C061B
7,236,810 UART: [art] SIG.R = F9F68875E6AB3FA1B5192B8C584A5991B078357D97440503FACFF6A9073B8C4E72AEFC3BDDC6B3851AB715DDA55AE63D
7,243,587 UART: [art] SIG.S = F0D39781A997C6306FE398F0837AB3B2D10D17B3CA1CD7FB1E735BD05945A0B624D97FAB03580D653B87C6AB9525D717
7,267,289 UART: Caliptra RT
7,267,542 UART: [state] CFI Enabled
7,549,512 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,580,555 UART: [rt]cmd =0x41545348, len=116
7,602,852 >>> mbox cmd response data (12 bytes)
7,602,853 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,633,152 UART: [rt]cmd =0x41545348, len=116
7,634,855 >>> mbox cmd response data (12 bytes)
7,634,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,757,643 UART: [rt]cmd =0x41544d4e, len=14344
8,067,245 >>> mbox cmd response data (8 bytes)
8,067,246 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,097,179 UART: [rt]cmd =0x41545348, len=116
8,119,102 >>> mbox cmd response data (12 bytes)
8,119,103 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,149,260 UART: [rt]cmd =0x41545348, len=116
8,150,910 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,303 ready_for_fw is high
1,362,303 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,294 >>> mbox cmd response: success
2,985,884 UART:
2,985,900 UART: Running Caliptra FMC ...
2,986,308 UART:
2,986,362 UART: [state] CFI Enabled
2,997,113 UART: [fht] FMC Alias Private Key: 7
3,104,166 UART: [art] Extend RT PCRs Done
3,104,594 UART: [art] Lock RT PCRs Done
3,105,764 UART: [art] Populate DV Done
3,114,179 UART: [fht] FMC Alias Private Key: 7
3,115,349 UART: [art] Derive CDI
3,115,629 UART: [art] Store in in slot 0x4
3,201,026 UART: [art] Derive Key Pair
3,201,386 UART: [art] Store priv key in slot 0x5
3,215,086 UART: [art] Derive Key Pair - Done
3,230,115 UART: [art] Signing Cert with AUTHO
3,230,595 UART: RITY.KEYID = 7
3,245,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,550 UART: [art] PUB.X = A2EBE2C27750E9602BB9B74B73B1A79FC5CA03C187AA604A4B7C6459F27A503B85DDA835C299645600A48DC262E086B2
3,253,301 UART: [art] PUB.Y = EC0FC621475D55E76AADD547B1AEE6839800B8D8483D7F5B13F7AF40A504F233E6E4F70A092DC1AAEF81DF91395ECD35
3,260,233 UART: [art] SIG.R = 3EFB653ECC1D6DBBA728541372E895167BF17855BD9CCE10975A0741A8CC08121EDAFD876AE6BA7B3557E472BEF315AF
3,267,013 UART: [art] SIG.S = A745E1414FDEADD433FBC4DB89B1A51A691173FEBEE3A1E7D0405654B8FF3D6099133FE711C959352A2FA84D78834257
3,290,602 UART: Caliptra RT
3,290,855 UART: [state] CFI Enabled
3,399,212 UART: [rt] RT listening for mailbox commands...
3,399,882 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,522,668 UART: [rt]cmd =0x41544d4e, len=14344
3,832,756 >>> mbox cmd response data (8 bytes)
3,832,757 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,684 UART: [rt]cmd =0x41545348, len=116
3,884,539 >>> mbox cmd response data (12 bytes)
3,884,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,643 UART: [rt]cmd =0x41545348, len=116
3,916,508 >>> mbox cmd response data (12 bytes)
3,916,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,676,660 >>> mbox cmd response: success
6,676,660 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,690,233 UART:
6,690,249 UART: Running Caliptra FMC ...
6,690,657 UART:
6,690,711 UART: [state] CFI Enabled
6,779,394 UART: [art] Extend RT PCRs Done
6,779,822 UART: [art] Lock RT PCRs Done
6,781,007 UART: [art] Populate DV Done
6,789,318 UART: [fht] FMC Alias Private Key: 7
6,790,366 UART: [art] Derive CDI
6,790,646 UART: [art] Store in in slot 0x4
6,876,419 UART: [art] Derive Key Pair
6,876,779 UART: [art] Store priv key in slot 0x5
6,890,333 UART: [art] Derive Key Pair - Done
6,904,978 UART: [art] Signing Cert with AUTHO
6,905,458 UART: RITY.KEYID = 7
6,920,708 UART: [art] Erasing AUTHORITY.KEYID = 7
6,921,473 UART: [art] PUB.X = D02F9D6C1F63FD8D35AC8BA6D6776C2C2AA1558E36BDC95BD5A3165DE8D519CD0FA5404890BAD17DB9C6F8FD419EB1FF
6,928,266 UART: [art] PUB.Y = 4206249E870B1CCE2EF8C99C22FF48C34CEA850256F53669737B625F1EBAB0F9E4E0F4AFA3BDC5378F9803E14D8565DA
6,935,216 UART: [art] SIG.R = 1502E59E9F6A747647E7E084E68E4ABDEC82A0BAD320A8503B211D150AD525CE6EFB391E95865A65A48E9CAF39A181ED
6,941,992 UART: [art] SIG.S = C3F395789EB6AE051D7184BF7D30F7CBACB8A9F5F90C1F013D457E13144C811F4D967C7A1FEFB52B838D2E5B025583FB
6,966,041 UART: Caliptra RT
6,966,294 UART: [state] CFI Enabled
7,252,573 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,283,484 UART: [rt]cmd =0x41545348, len=116
7,305,601 >>> mbox cmd response data (12 bytes)
7,305,602 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,335,691 UART: [rt]cmd =0x41545348, len=116
7,337,718 >>> mbox cmd response data (12 bytes)
7,337,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,460,316 UART: [rt]cmd =0x41544d4e, len=14344
7,770,848 >>> mbox cmd response data (8 bytes)
7,770,849 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,800,992 UART: [rt]cmd =0x41545348, len=116
7,823,847 >>> mbox cmd response data (12 bytes)
7,823,848 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,854,097 UART: [rt]cmd =0x41545348, len=116
7,855,867 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,538 UART: [kat] SHA2-256
892,476 UART: [kat] SHA2-384
895,169 UART: [kat] SHA2-512-ACC
897,070 UART: [kat] ECC-384
902,801 UART: [kat] HMAC-384Kdf
907,557 UART: [kat] LMS
1,475,753 UART: [kat] --
1,476,796 UART: [cold-reset] ++
1,477,372 UART: [fht] Storing FHT @ 0x50003400
1,480,017 UART: [idev] ++
1,480,185 UART: [idev] CDI.KEYID = 6
1,480,545 UART: [idev] SUBJECT.KEYID = 7
1,480,969 UART: [idev] UDS.KEYID = 0
1,481,314 ready_for_fw is high
1,481,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,269 UART: [idev] Erasing UDS.KEYID = 0
1,505,703 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,349 UART: [idev] --
1,515,408 UART: [ldev] ++
1,515,576 UART: [ldev] CDI.KEYID = 6
1,515,939 UART: [ldev] SUBJECT.KEYID = 5
1,516,365 UART: [ldev] AUTHORITY.KEYID = 7
1,516,828 UART: [ldev] FE.KEYID = 1
1,522,238 UART: [ldev] Erasing FE.KEYID = 1
1,547,469 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,389 UART: [ldev] --
1,586,818 UART: [fwproc] Waiting for Commands...
1,587,451 UART: [fwproc] Received command 0x46574c44
1,588,242 UART: [fwproc] Received Image of size 114168 bytes
2,884,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,344 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,209 >>> mbox cmd response: success
3,079,327 UART: [afmc] ++
3,079,495 UART: [afmc] CDI.KEYID = 6
3,079,857 UART: [afmc] SUBJECT.KEYID = 7
3,080,282 UART: [afmc] AUTHORITY.KEYID = 5
3,115,259 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,978 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,668 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,629 UART: [afmc] --
3,158,745 UART: [cold-reset] --
3,159,539 UART: [state] Locking Datavault
3,160,590 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,194 UART: [state] Locking ICCM
3,161,768 UART: [exit] Launching FMC @ 0x40000130
3,167,097 UART:
3,167,113 UART: Running Caliptra FMC ...
3,167,521 UART:
3,167,664 UART: [state] CFI Enabled
3,178,289 UART: [fht] FMC Alias Private Key: 7
3,286,530 UART: [art] Extend RT PCRs Done
3,286,958 UART: [art] Lock RT PCRs Done
3,288,670 UART: [art] Populate DV Done
3,296,925 UART: [fht] FMC Alias Private Key: 7
3,297,957 UART: [art] Derive CDI
3,298,237 UART: [art] Store in in slot 0x4
3,384,210 UART: [art] Derive Key Pair
3,384,570 UART: [art] Store priv key in slot 0x5
3,397,908 UART: [art] Derive Key Pair - Done
3,412,636 UART: [art] Signing Cert with AUTHO
3,413,116 UART: RITY.KEYID = 7
3,428,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,353 UART: [art] PUB.X = 5118F4E4CD16E6617A382475C4FF8FD174BAEB73C24D14EE506FCF230F2FC3C5150F90283F28C4AFBDF0BBBD206874D8
3,436,133 UART: [art] PUB.Y = D7BC363210363D3655C99B9995A09BAF32F3DE0888BC075E75BDC3CEC77D5FCEB22FAD6C8E21C5575620136D6ADEBBA7
3,443,095 UART: [art] SIG.R = A44C015D58EE1F801132CEA58B79AD354525C667285E3FC5B277B8B35C60AE296684C3A3033D004F86E505D18FD13D51
3,449,834 UART: [art] SIG.S = 8DDB84F241D926532FC15C2CBA76C09C9C5A8716916AF9202F5A4159A70DCC0A9C93D3DE7D26BB6C42C407A5CD44612B
3,473,284 UART: Caliptra RT
3,473,629 UART: [state] CFI Enabled
3,581,845 UART: [rt] RT listening for mailbox commands...
3,582,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,337 UART: [rt]cmd =0x41544d4e, len=14344
4,015,783 >>> mbox cmd response data (8 bytes)
4,015,784 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,899 UART: [rt]cmd =0x41545348, len=116
4,068,654 >>> mbox cmd response data (12 bytes)
4,068,655 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,098,782 UART: [rt]cmd =0x41545348, len=116
4,100,775 >>> mbox cmd response data (12 bytes)
4,100,776 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,388 UART:
4,101,404 UART: Running Caliptra ROM ...
4,101,812 UART:
4,101,953 UART: [state] CFI Enabled
4,105,107 UART: [state] LifecycleState = Unprovisioned
4,105,762 UART: [state] DebugLocked = No
4,106,426 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,108,059 UART: [kat] SHA2-256
4,901,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,906,105 UART: [kat] ++
4,906,257 UART: [kat] sha1
4,910,583 UART: [kat] SHA2-256
4,912,521 UART: [kat] SHA2-384
4,915,202 UART: [kat] SHA2-512-ACC
4,917,102 UART: [kat] ECC-384
4,922,595 UART: [kat] HMAC-384Kdf
4,927,001 UART: [kat] LMS
5,495,197 UART: [kat] --
5,496,178 UART: [update-reset] ++
6,829,840 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,830,910 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,980,540 >>> mbox cmd response: success
6,980,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,980,777 UART: [update-reset] Copying MAN_2 To MAN_1
6,988,791 UART: [update-reset Success] --
6,989,882 UART: [state] Locking Datavault
6,990,850 UART: [state] Locking PCR0, PCR1 and PCR31
6,991,454 UART: [state] Locking ICCM
6,992,004 UART: [exit] Launching FMC @ 0x40000130
6,997,333 UART:
6,997,349 UART: Running Caliptra FMC ...
6,997,757 UART:
6,997,900 UART: [state] CFI Enabled
7,087,515 UART: [art] Extend RT PCRs Done
7,087,943 UART: [art] Lock RT PCRs Done
7,089,450 UART: [art] Populate DV Done
7,097,633 UART: [fht] FMC Alias Private Key: 7
7,098,649 UART: [art] Derive CDI
7,098,929 UART: [art] Store in in slot 0x4
7,184,624 UART: [art] Derive Key Pair
7,184,984 UART: [art] Store priv key in slot 0x5
7,198,540 UART: [art] Derive Key Pair - Done
7,213,620 UART: [art] Signing Cert with AUTHO
7,214,100 UART: RITY.KEYID = 7
7,229,294 UART: [art] Erasing AUTHORITY.KEYID = 7
7,230,059 UART: [art] PUB.X = 46F7EA59D66EE0C1B5E706059E672A4CD2344A972F01A81C758DBB8897F746AC83B17B0D5AEF92E344E6E18C09E6D553
7,236,822 UART: [art] PUB.Y = 564CD2313870DF7762219BE049F6A1BD397360947574B6949688E20E8DE341D8A24CD0B93117E1CC69343535962F018E
7,243,754 UART: [art] SIG.R = 377ED412A0D85AD9496BD7245FEEC65718750F188F1DA54ADFD760D9C886ECDE2A3D516FA486A3A70F7E7F0C973A0878
7,250,524 UART: [art] SIG.S = 5AFCC8D004AA38388903542176FE1D9EC39EEFE97D910D19EE34DB8C741E0E9CB16588200BC612D6F115AD45A44E12C9
7,274,798 UART: Caliptra RT
7,275,143 UART: [state] CFI Enabled
7,553,123 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,584,264 UART: [rt]cmd =0x41545348, len=116
7,606,233 >>> mbox cmd response data (12 bytes)
7,606,234 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,636,245 UART: [rt]cmd =0x41545348, len=116
7,637,988 >>> mbox cmd response data (12 bytes)
7,637,989 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,760,376 UART: [rt]cmd =0x41544d4e, len=14344
8,070,438 >>> mbox cmd response data (8 bytes)
8,070,439 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,100,494 UART: [rt]cmd =0x41545348, len=116
8,121,621 >>> mbox cmd response data (12 bytes)
8,121,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,151,797 UART: [rt]cmd =0x41545348, len=116
8,153,677 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,126 ready_for_fw is high
1,362,126 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,237 >>> mbox cmd response: success
2,986,477 UART:
2,986,493 UART: Running Caliptra FMC ...
2,986,901 UART:
2,987,044 UART: [state] CFI Enabled
2,997,353 UART: [fht] FMC Alias Private Key: 7
3,105,246 UART: [art] Extend RT PCRs Done
3,105,674 UART: [art] Lock RT PCRs Done
3,107,022 UART: [art] Populate DV Done
3,115,363 UART: [fht] FMC Alias Private Key: 7
3,116,477 UART: [art] Derive CDI
3,116,757 UART: [art] Store in in slot 0x4
3,202,534 UART: [art] Derive Key Pair
3,202,894 UART: [art] Store priv key in slot 0x5
3,216,390 UART: [art] Derive Key Pair - Done
3,230,962 UART: [art] Signing Cert with AUTHO
3,231,442 UART: RITY.KEYID = 7
3,246,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,685 UART: [art] PUB.X = 88125D6EB9C5599B40730E3055295B07ED690F62733E298FED88DA4BECB4B96B2DEB13252A1A00AF549E82AC35B1DF62
3,254,432 UART: [art] PUB.Y = E7778A250685BD481D3434EB75B2652CCBFD4120AC6C26A3CAE5CEF05BE088F28E5F8E2AA73851EEA64523B845E69F3F
3,261,393 UART: [art] SIG.R = 3BD0F2AA59F4E0C501D29520C0A054CB251A4A3F5691C7E012CAF52C26364DD61FE4B7B1DB320523A5A39BF6BC3BE576
3,268,171 UART: [art] SIG.S = 508933FB35751BE3D1398391D753764C3129C907EF3AC0C13EB71ED610896EA0E1AF27BF66DE177C03507D578794DFDC
3,291,286 UART: Caliptra RT
3,291,631 UART: [state] CFI Enabled
3,399,753 UART: [rt] RT listening for mailbox commands...
3,400,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,303 UART: [rt]cmd =0x41544d4e, len=14344
3,833,489 >>> mbox cmd response data (8 bytes)
3,833,490 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,521 UART: [rt]cmd =0x41545348, len=116
3,885,800 >>> mbox cmd response data (12 bytes)
3,885,801 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,690 UART: [rt]cmd =0x41545348, len=116
3,917,513 >>> mbox cmd response data (12 bytes)
3,917,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,678,658 >>> mbox cmd response: success
6,678,658 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,691,863 UART:
6,691,879 UART: Running Caliptra FMC ...
6,692,287 UART:
6,692,430 UART: [state] CFI Enabled
6,781,949 UART: [art] Extend RT PCRs Done
6,782,377 UART: [art] Lock RT PCRs Done
6,783,628 UART: [art] Populate DV Done
6,792,051 UART: [fht] FMC Alias Private Key: 7
6,793,013 UART: [art] Derive CDI
6,793,293 UART: [art] Store in in slot 0x4
6,878,882 UART: [art] Derive Key Pair
6,879,242 UART: [art] Store priv key in slot 0x5
6,891,752 UART: [art] Derive Key Pair - Done
6,906,434 UART: [art] Signing Cert with AUTHO
6,906,914 UART: RITY.KEYID = 7
6,922,730 UART: [art] Erasing AUTHORITY.KEYID = 7
6,923,495 UART: [art] PUB.X = 593CAC5F4F98CC335843B6F795DC8EAA81C8158C061C8DF49281258F22D3C421E6428E77318CC1448CDD8B8EC1D5D697
6,930,268 UART: [art] PUB.Y = D0DFF98F514A52B6D945F8B4007DC29D5C1B368596AA9E6D504F2A10AF33E85566708609712828422521EC0A6466965C
6,937,184 UART: [art] SIG.R = 894125BF833EBD67E059E16D1B676C494C65B85FE727424608302018D1A8D3BDD0541A639FFC54D4E33F64AD532A1744
6,943,949 UART: [art] SIG.S = A626F1B9141D3407F63597856D3739BA58D3EB132222E55ABD63599419D6BACDE6987FC161E78B95586C08797452E908
6,967,915 UART: Caliptra RT
6,968,260 UART: [state] CFI Enabled
7,244,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,275,711 UART: [rt]cmd =0x41545348, len=116
7,297,728 >>> mbox cmd response data (12 bytes)
7,297,729 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,327,972 UART: [rt]cmd =0x41545348, len=116
7,329,941 >>> mbox cmd response data (12 bytes)
7,329,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,452,573 UART: [rt]cmd =0x41544d4e, len=14344
7,762,313 >>> mbox cmd response data (8 bytes)
7,762,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,792,347 UART: [rt]cmd =0x41545348, len=116
7,814,296 >>> mbox cmd response data (12 bytes)
7,814,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,844,416 UART: [rt]cmd =0x41545348, len=116
7,846,308 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
902,001 UART: [kat] SHA2-256
903,941 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,454 UART: [kat] HMAC-384Kdf
923,050 UART: [kat] LMS
1,171,378 UART: [kat] --
1,172,071 UART: [cold-reset] ++
1,172,425 UART: [fht] FHT @ 0x50003400
1,175,074 UART: [idev] ++
1,175,242 UART: [idev] CDI.KEYID = 6
1,175,602 UART: [idev] SUBJECT.KEYID = 7
1,176,026 UART: [idev] UDS.KEYID = 0
1,176,371 ready_for_fw is high
1,176,371 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,638 UART: [idev] Erasing UDS.KEYID = 0
1,200,571 UART: [idev] Sha1 KeyId Algorithm
1,208,865 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,610 UART: [ldev] SUBJECT.KEYID = 5
1,211,036 UART: [ldev] AUTHORITY.KEYID = 7
1,211,499 UART: [ldev] FE.KEYID = 1
1,216,797 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,047 UART: [ldev] --
1,282,436 UART: [fwproc] Wait for Commands...
1,283,044 UART: [fwproc] Recv command 0x46574c44
1,283,772 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,414 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,967 >>> mbox cmd response: success
2,774,019 UART: [afmc] ++
2,774,187 UART: [afmc] CDI.KEYID = 6
2,774,549 UART: [afmc] SUBJECT.KEYID = 7
2,774,974 UART: [afmc] AUTHORITY.KEYID = 5
2,810,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,232 UART: [afmc] --
2,853,360 UART: [cold-reset] --
2,854,130 UART: [state] Locking Datavault
2,855,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,887 UART: [state] Locking ICCM
2,856,537 UART: [exit] Launching FMC @ 0x40000130
2,861,866 UART:
2,861,882 UART: Running Caliptra FMC ...
2,862,290 UART:
2,862,344 UART: [state] CFI Enabled
2,872,387 UART: [fht] FMC Alias Private Key: 7
2,980,700 UART: [art] Extend RT PCRs Done
2,981,128 UART: [art] Lock RT PCRs Done
2,982,760 UART: [art] Populate DV Done
2,991,047 UART: [fht] FMC Alias Private Key: 7
2,992,119 UART: [art] Derive CDI
2,992,399 UART: [art] Store in in slot 0x4
3,078,030 UART: [art] Derive Key Pair
3,078,390 UART: [art] Store priv key in slot 0x5
3,091,436 UART: [art] Derive Key Pair - Done
3,106,070 UART: [art] Signing Cert with AUTHO
3,106,550 UART: RITY.KEYID = 7
3,121,958 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,723 UART: [art] PUB.X = FC738F81D350D2D3910C66166AAC665F3381591226569DB9A28D6CF21D93F76B6D35CCE5837F4EB2FC49795FD64B4B14
3,129,494 UART: [art] PUB.Y = 0DAEAE49C8EDA331C0FA6A15CBA75D06C19DE7D9D7C87B0472140B5A84893AF2BF31FDA9830A0C117FA18C750FAA0D99
3,136,442 UART: [art] SIG.R = A936D5974227ACBADDEB5704154921BF32053B17F5C7B1DB105789145EFAF3CA808F5DC4F1211D3FEEDB0AC8A3F6D0C8
3,143,221 UART: [art] SIG.S = B2BF1065D0943B7F1E5FC0F8CA12D9A22DACB7F96F84B19B3D0BC64C936BB3D749FDEFE5C559A64644165D38B6C0E103
3,166,514 UART: Caliptra RT
3,166,767 UART: [state] CFI Enabled
3,275,137 UART: [rt] RT listening for mailbox commands...
3,275,807 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,891 UART: [rt]cmd =0x41544d4e, len=14344
3,708,741 >>> mbox cmd response data (8 bytes)
3,708,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,021 UART: [rt]cmd =0x41545348, len=116
3,760,554 >>> mbox cmd response data (12 bytes)
3,760,555 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,798 UART: [rt]cmd =0x41545348, len=116
3,792,519 >>> mbox cmd response data (12 bytes)
3,792,520 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,183 UART:
3,793,199 UART: Running Caliptra ROM ...
3,793,607 UART:
3,793,662 UART: [state] CFI Enabled
3,796,724 UART: [state] LifecycleState = Unprovisioned
3,797,379 UART: [state] DebugLocked = No
3,797,975 UART: [state] WD Timer not started. Device not locked for debugging
3,799,099 UART: [kat] SHA2-256
4,604,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,608,874 UART: [kat] ++
4,609,026 UART: [kat] sha1
4,613,294 UART: [kat] SHA2-256
4,615,234 UART: [kat] SHA2-384
4,617,997 UART: [kat] SHA2-512-ACC
4,619,897 UART: [kat] ECC-384
4,629,958 UART: [kat] HMAC-384Kdf
4,634,622 UART: [kat] LMS
4,882,950 UART: [kat] --
4,883,842 UART: [update-reset] ++
6,193,942 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,195,035 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,344,613 >>> mbox cmd response: success
6,344,613 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,344,732 UART: [update-reset] Copying MAN_2 To MAN_1
6,352,746 UART: [update-reset Success] --
6,353,591 UART: [state] Locking Datavault
6,354,529 UART: [state] Locking PCR0, PCR1 and PCR31
6,355,133 UART: [state] Locking ICCM
6,355,631 UART: [exit] Launching FMC @ 0x40000130
6,360,960 UART:
6,360,976 UART: Running Caliptra FMC ...
6,361,384 UART:
6,361,438 UART: [state] CFI Enabled
6,450,149 UART: [art] Extend RT PCRs Done
6,450,577 UART: [art] Lock RT PCRs Done
6,451,950 UART: [art] Populate DV Done
6,459,891 UART: [fht] FMC Alias Private Key: 7
6,461,067 UART: [art] Derive CDI
6,461,347 UART: [art] Store in in slot 0x4
6,547,344 UART: [art] Derive Key Pair
6,547,704 UART: [art] Store priv key in slot 0x5
6,560,674 UART: [art] Derive Key Pair - Done
6,575,724 UART: [art] Signing Cert with AUTHO
6,576,204 UART: RITY.KEYID = 7
6,591,720 UART: [art] Erasing AUTHORITY.KEYID = 7
6,592,485 UART: [art] PUB.X = 96C97716D53E4ABD246028FA2B42621AB02EF7EE70C65E1AB640919A08C3D482A47C220BC0C8CEF8AB248C1067CBE6AA
6,599,263 UART: [art] PUB.Y = 1D49FC41F5E9596A5FC622097AD776E3B90BC937C7A2F01D8778F46D09525604EE1B91A4EDD03C07BC7C14D2E71B0152
6,606,201 UART: [art] SIG.R = D17D07F34214748C2C8C295473D09B89BEF5F03C65F9CC53151FCAC4BBCC04DE06F7763F653CFA18E1BEDA509F8BC154
6,612,978 UART: [art] SIG.S = EEB76FE29B110C87D88EC0A0F6CF3D627C21071C7EE0952BF7B07E3E59BFD1292C8C1AEAC1F1611A607580C8C7E6846A
6,636,653 UART: Caliptra RT
6,636,906 UART: [state] CFI Enabled
6,919,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,950,555 UART: [rt]cmd =0x41545348, len=116
6,972,452 >>> mbox cmd response data (12 bytes)
6,972,453 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,002,708 UART: [rt]cmd =0x41545348, len=116
7,004,563 >>> mbox cmd response data (12 bytes)
7,004,564 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,127,125 UART: [rt]cmd =0x41544d4e, len=14344
7,436,701 >>> mbox cmd response data (8 bytes)
7,436,702 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,466,807 UART: [rt]cmd =0x41545348, len=116
7,488,568 >>> mbox cmd response data (12 bytes)
7,488,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,518,498 UART: [rt]cmd =0x41545348, len=116
7,520,262 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,647 ready_for_fw is high
1,060,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,190 >>> mbox cmd response: success
2,687,800 UART:
2,687,816 UART: Running Caliptra FMC ...
2,688,224 UART:
2,688,278 UART: [state] CFI Enabled
2,698,995 UART: [fht] FMC Alias Private Key: 7
2,806,852 UART: [art] Extend RT PCRs Done
2,807,280 UART: [art] Lock RT PCRs Done
2,809,024 UART: [art] Populate DV Done
2,817,305 UART: [fht] FMC Alias Private Key: 7
2,818,457 UART: [art] Derive CDI
2,818,737 UART: [art] Store in in slot 0x4
2,904,428 UART: [art] Derive Key Pair
2,904,788 UART: [art] Store priv key in slot 0x5
2,918,394 UART: [art] Derive Key Pair - Done
2,933,328 UART: [art] Signing Cert with AUTHO
2,933,808 UART: RITY.KEYID = 7
2,948,896 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,661 UART: [art] PUB.X = F4E5C22416775C8E9A36F37D31CEDD7344477D822D23511655853C94FF5B7842588816403DA09D86A8142443F3682484
2,956,415 UART: [art] PUB.Y = 74543C7BF4144F3BED90BC923FE13D62D19D23D468DF5573FE044B01A4896A2180CFC795D3EBCC77777C49C4C1C42B61
2,963,367 UART: [art] SIG.R = 37FE088CB5FA39E4DF566B95492F168F3FC4A87601E8A3B45196FEB6804746426031964CD773FC4DE9810F9DB061965B
2,970,128 UART: [art] SIG.S = 19A969BC5918B4061EC21120D4B499E878F0B87C67C16F119B24A23FA5AD8DE69B3735FF6907BA714B3800A3363175AD
2,993,735 UART: Caliptra RT
2,993,988 UART: [state] CFI Enabled
3,101,921 UART: [rt] RT listening for mailbox commands...
3,102,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,553 UART: [rt]cmd =0x41544d4e, len=14344
3,535,255 >>> mbox cmd response data (8 bytes)
3,535,256 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,265 UART: [rt]cmd =0x41545348, len=116
3,586,980 >>> mbox cmd response data (12 bytes)
3,586,981 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,980 UART: [rt]cmd =0x41545348, len=116
3,618,733 >>> mbox cmd response data (12 bytes)
3,618,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,055,316 >>> mbox cmd response: success
6,055,316 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,068,438 UART:
6,068,454 UART: Running Caliptra FMC ...
6,068,862 UART:
6,068,916 UART: [state] CFI Enabled
6,157,925 UART: [art] Extend RT PCRs Done
6,158,353 UART: [art] Lock RT PCRs Done
6,159,714 UART: [art] Populate DV Done
6,167,881 UART: [fht] FMC Alias Private Key: 7
6,168,895 UART: [art] Derive CDI
6,169,175 UART: [art] Store in in slot 0x4
6,254,844 UART: [art] Derive Key Pair
6,255,204 UART: [art] Store priv key in slot 0x5
6,268,112 UART: [art] Derive Key Pair - Done
6,282,575 UART: [art] Signing Cert with AUTHO
6,283,055 UART: RITY.KEYID = 7
6,298,341 UART: [art] Erasing AUTHORITY.KEYID = 7
6,299,106 UART: [art] PUB.X = 01E31B472779362C897FDD2AA14F48AF1F9CE668277F1A126CE0DF6D9566B6184FBF09C6EB3BE9C83F1F057004D914BC
6,305,874 UART: [art] PUB.Y = EED60ACCF5513DD59A45537856A03923A870408DABD05FABA1A95E59AFD3D0AD1939765840F96908EB31BD21E1C264D9
6,312,828 UART: [art] SIG.R = 8161C770DE993CAFBA7122233CC8FF32F3D719A830C5ACD3ADEF12983B11FE767F65A216B205786F45BBD5ADC40DDED4
6,319,610 UART: [art] SIG.S = E6B5B7F55A9D927EEAB27F1D76D5ADA67F29B89BBE0CBBDBAE42B9273C19E63AD7369209A82EBBF0879CCBC60E08A50C
6,343,476 UART: Caliptra RT
6,343,729 UART: [state] CFI Enabled
6,624,777 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,655,488 UART: [rt]cmd =0x41545348, len=116
6,677,727 >>> mbox cmd response data (12 bytes)
6,677,728 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,707,971 UART: [rt]cmd =0x41545348, len=116
6,709,696 >>> mbox cmd response data (12 bytes)
6,709,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,832,414 UART: [rt]cmd =0x41544d4e, len=14344
7,141,892 >>> mbox cmd response data (8 bytes)
7,141,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,172,066 UART: [rt]cmd =0x41545348, len=116
7,194,741 >>> mbox cmd response data (12 bytes)
7,194,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,224,825 UART: [rt]cmd =0x41545348, len=116
7,226,645 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,238 UART: [kat] SHA2-256
904,178 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,929 UART: [kat] HMAC-384Kdf
923,643 UART: [kat] LMS
1,171,971 UART: [kat] --
1,172,996 UART: [cold-reset] ++
1,173,564 UART: [fht] FHT @ 0x50003400
1,176,227 UART: [idev] ++
1,176,395 UART: [idev] CDI.KEYID = 6
1,176,755 UART: [idev] SUBJECT.KEYID = 7
1,177,179 UART: [idev] UDS.KEYID = 0
1,177,524 ready_for_fw is high
1,177,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,185 UART: [idev] Erasing UDS.KEYID = 0
1,202,020 UART: [idev] Sha1 KeyId Algorithm
1,210,428 UART: [idev] --
1,211,482 UART: [ldev] ++
1,211,650 UART: [ldev] CDI.KEYID = 6
1,212,013 UART: [ldev] SUBJECT.KEYID = 5
1,212,439 UART: [ldev] AUTHORITY.KEYID = 7
1,212,902 UART: [ldev] FE.KEYID = 1
1,218,220 UART: [ldev] Erasing FE.KEYID = 1
1,244,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,460 UART: [ldev] --
1,283,809 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,597 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,044 >>> mbox cmd response: success
2,775,200 UART: [afmc] ++
2,775,368 UART: [afmc] CDI.KEYID = 6
2,775,730 UART: [afmc] SUBJECT.KEYID = 7
2,776,155 UART: [afmc] AUTHORITY.KEYID = 5
2,811,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,591 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,319 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,204 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,923 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,613 UART: [afmc] --
2,854,573 UART: [cold-reset] --
2,855,461 UART: [state] Locking Datavault
2,856,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,218 UART: [state] Locking ICCM
2,857,884 UART: [exit] Launching FMC @ 0x40000130
2,863,213 UART:
2,863,229 UART: Running Caliptra FMC ...
2,863,637 UART:
2,863,780 UART: [state] CFI Enabled
2,874,147 UART: [fht] FMC Alias Private Key: 7
2,982,106 UART: [art] Extend RT PCRs Done
2,982,534 UART: [art] Lock RT PCRs Done
2,983,980 UART: [art] Populate DV Done
2,992,161 UART: [fht] FMC Alias Private Key: 7
2,993,155 UART: [art] Derive CDI
2,993,435 UART: [art] Store in in slot 0x4
3,078,992 UART: [art] Derive Key Pair
3,079,352 UART: [art] Store priv key in slot 0x5
3,093,106 UART: [art] Derive Key Pair - Done
3,107,861 UART: [art] Signing Cert with AUTHO
3,108,341 UART: RITY.KEYID = 7
3,123,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,544 UART: [art] PUB.X = 00B8382836A48704F61F43197648F46D8028622937626411DA01D78FE898540ADD091051365C049843B5CBCFF40C4A35
3,131,258 UART: [art] PUB.Y = 610140991A3B6DF24E3F33738B5444BD632B04D797CF62C804876D1B35A4C67552C9B9557C46BF2892C730D71614C845
3,138,189 UART: [art] SIG.R = 0107054DBA14E50208B24819777624804CACA52BCBF1E1C4288D41A7FFA39D1607C4ADA09A6984238E7A00F94C722D37
3,144,919 UART: [art] SIG.S = 41BBDC1E8F25FA347A4A4E8575C59619BB5CE002554214F233E62B276440617D82F840A9FA18211341530E9F84342E18
3,168,776 UART: Caliptra RT
3,169,121 UART: [state] CFI Enabled
3,276,632 UART: [rt] RT listening for mailbox commands...
3,277,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,076 UART: [rt]cmd =0x41544d4e, len=14344
3,709,994 >>> mbox cmd response data (8 bytes)
3,709,995 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,038 UART: [rt]cmd =0x41545348, len=116
3,761,505 >>> mbox cmd response data (12 bytes)
3,761,506 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,847 UART: [rt]cmd =0x41545348, len=116
3,793,564 >>> mbox cmd response data (12 bytes)
3,793,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,884 UART:
3,793,900 UART: Running Caliptra ROM ...
3,794,308 UART:
3,794,450 UART: [state] CFI Enabled
3,797,168 UART: [state] LifecycleState = Unprovisioned
3,797,823 UART: [state] DebugLocked = No
3,798,539 UART: [state] WD Timer not started. Device not locked for debugging
3,799,831 UART: [kat] SHA2-256
4,605,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,609,606 UART: [kat] ++
4,609,758 UART: [kat] sha1
4,613,932 UART: [kat] SHA2-256
4,615,872 UART: [kat] SHA2-384
4,618,427 UART: [kat] SHA2-512-ACC
4,620,327 UART: [kat] ECC-384
4,630,450 UART: [kat] HMAC-384Kdf
4,635,094 UART: [kat] LMS
4,883,422 UART: [kat] --
4,884,274 UART: [update-reset] ++
6,194,524 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,195,693 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,345,271 >>> mbox cmd response: success
6,345,271 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,345,384 UART: [update-reset] Copying MAN_2 To MAN_1
6,353,398 UART: [update-reset Success] --
6,354,345 UART: [state] Locking Datavault
6,355,267 UART: [state] Locking PCR0, PCR1 and PCR31
6,355,871 UART: [state] Locking ICCM
6,356,293 UART: [exit] Launching FMC @ 0x40000130
6,361,622 UART:
6,361,638 UART: Running Caliptra FMC ...
6,362,046 UART:
6,362,189 UART: [state] CFI Enabled
6,451,360 UART: [art] Extend RT PCRs Done
6,451,788 UART: [art] Lock RT PCRs Done
6,453,081 UART: [art] Populate DV Done
6,461,288 UART: [fht] FMC Alias Private Key: 7
6,462,238 UART: [art] Derive CDI
6,462,518 UART: [art] Store in in slot 0x4
6,548,137 UART: [art] Derive Key Pair
6,548,497 UART: [art] Store priv key in slot 0x5
6,561,971 UART: [art] Derive Key Pair - Done
6,576,351 UART: [art] Signing Cert with AUTHO
6,576,831 UART: RITY.KEYID = 7
6,591,939 UART: [art] Erasing AUTHORITY.KEYID = 7
6,592,704 UART: [art] PUB.X = 78685D6117CFE56A5A0C701FBC3FF0301CD5E55C08CDE2FAEFEFAC06BF3CFEAF05E86FF58892AD785B58141DF2CF8558
6,599,488 UART: [art] PUB.Y = 817F7C808909437B05CBBA79EEA68D31A94B95F4ABD6AD31147CB3FC38C3689C4AC3370F3D2E786ED3F944249899ABEB
6,606,441 UART: [art] SIG.R = 7D58B45A4C770981DA2270B10382E2945E92F58D81BCDB48986590D09F1CCC695CD0859DCDE8B324E9709B118F94B08E
6,613,207 UART: [art] SIG.S = 2729B825F9013F0CA63C6B3D122C32E8A962A59440806D9C6621C1DB6D7A3203AE948871CAF1CDA25D2CC577A785928C
6,636,847 UART: Caliptra RT
6,637,192 UART: [state] CFI Enabled
6,916,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,947,564 UART: [rt]cmd =0x41545348, len=116
6,969,397 >>> mbox cmd response data (12 bytes)
6,969,398 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,999,553 UART: [rt]cmd =0x41545348, len=116
7,001,242 >>> mbox cmd response data (12 bytes)
7,001,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,123,618 UART: [rt]cmd =0x41544d4e, len=14344
7,433,902 >>> mbox cmd response data (8 bytes)
7,433,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,463,794 UART: [rt]cmd =0x41545348, len=116
7,485,399 >>> mbox cmd response data (12 bytes)
7,485,400 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,515,531 UART: [rt]cmd =0x41545348, len=116
7,517,151 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,496 ready_for_fw is high
1,061,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,713 >>> mbox cmd response: success
2,688,305 UART:
2,688,321 UART: Running Caliptra FMC ...
2,688,729 UART:
2,688,872 UART: [state] CFI Enabled
2,699,455 UART: [fht] FMC Alias Private Key: 7
2,807,520 UART: [art] Extend RT PCRs Done
2,807,948 UART: [art] Lock RT PCRs Done
2,809,776 UART: [art] Populate DV Done
2,818,211 UART: [fht] FMC Alias Private Key: 7
2,819,327 UART: [art] Derive CDI
2,819,607 UART: [art] Store in in slot 0x4
2,905,678 UART: [art] Derive Key Pair
2,906,038 UART: [art] Store priv key in slot 0x5
2,919,592 UART: [art] Derive Key Pair - Done
2,934,273 UART: [art] Signing Cert with AUTHO
2,934,753 UART: RITY.KEYID = 7
2,949,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,648 UART: [art] PUB.X = 7D4D7A8A10D8FA05FA0768946F366F285B735C04341AEE38E2020A302CA04C0880BBACFF2BAA3864F7DB34D67CEA3CFB
2,957,418 UART: [art] PUB.Y = D2CE82802B02B2601E091199E3083C7125BD235361CD43F25C89FCDC590F212B0CFEB69E1F0362548C96F9626885B757
2,964,346 UART: [art] SIG.R = B65977EE26107923ED22A2FDEE8FF51ED42A2B0ABDF618D4A889AE2C70A2BE3FB03A214D9480DC137330D52964D33C18
2,971,125 UART: [art] SIG.S = DC30F88DDF1C8CFD5EE12D9CB1471F69DFDBB28F635E4FFF63096D1CB433CE4C1D4DFCF28BCE880714F3D459E1AED122
2,995,842 UART: Caliptra RT
2,996,187 UART: [state] CFI Enabled
3,104,731 UART: [rt] RT listening for mailbox commands...
3,105,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,221 UART: [rt]cmd =0x41544d4e, len=14344
3,538,003 >>> mbox cmd response data (8 bytes)
3,538,004 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,937 UART: [rt]cmd =0x41545348, len=116
3,589,898 >>> mbox cmd response data (12 bytes)
3,589,899 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,894 UART: [rt]cmd =0x41545348, len=116
3,621,571 >>> mbox cmd response data (12 bytes)
3,621,572 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,058,895 >>> mbox cmd response: success
6,058,895 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,072,425 UART:
6,072,441 UART: Running Caliptra FMC ...
6,072,849 UART:
6,072,992 UART: [state] CFI Enabled
6,162,079 UART: [art] Extend RT PCRs Done
6,162,507 UART: [art] Lock RT PCRs Done
6,163,856 UART: [art] Populate DV Done
6,171,891 UART: [fht] FMC Alias Private Key: 7
6,172,995 UART: [art] Derive CDI
6,173,275 UART: [art] Store in in slot 0x4
6,259,034 UART: [art] Derive Key Pair
6,259,394 UART: [art] Store priv key in slot 0x5
6,272,914 UART: [art] Derive Key Pair - Done
6,287,431 UART: [art] Signing Cert with AUTHO
6,287,911 UART: RITY.KEYID = 7
6,302,713 UART: [art] Erasing AUTHORITY.KEYID = 7
6,303,478 UART: [art] PUB.X = 86D7885339E4A190ECE3C4B56E2265E3C1E29851895300621D8E157BBCE90C61D571E482FBA4D1280300209907EBCF1B
6,310,193 UART: [art] PUB.Y = 487F4756900FEB41EDFDE556F303C12FA12A11CBFE734A7840A60F83801CB235884669F8E74C3C71CF0433698C10BB69
6,317,133 UART: [art] SIG.R = D27318AD8D8D2894598D41FEA4D9A4A85DF4D7AC0695BFFBBFEF72BB1398A62387FA1B30C75FC273CF81EF0A274714C7
6,323,915 UART: [art] SIG.S = 926F2642706059247CCB67756E2ADB6D825CD0AF5C7C4C48B7A6A2B47AD1555BB4C14ED7CA12130B71C10AA1F4E8D35F
6,348,092 UART: Caliptra RT
6,348,437 UART: [state] CFI Enabled
6,627,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,658,846 UART: [rt]cmd =0x41545348, len=116
6,681,353 >>> mbox cmd response data (12 bytes)
6,681,354 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,711,423 UART: [rt]cmd =0x41545348, len=116
6,713,214 >>> mbox cmd response data (12 bytes)
6,713,215 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,835,724 UART: [rt]cmd =0x41544d4e, len=14344
7,145,344 >>> mbox cmd response data (8 bytes)
7,145,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,175,542 UART: [rt]cmd =0x41545348, len=116
7,197,999 >>> mbox cmd response data (12 bytes)
7,198,000 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,227,903 UART: [rt]cmd =0x41545348, len=116
7,229,755 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,300 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,174,377 ready_for_fw is high
1,174,377 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,157 UART: [idev] Erasing UDS.KEYID = 0
1,199,277 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,102 UART: [ldev] ++
1,209,270 UART: [ldev] CDI.KEYID = 6
1,209,634 UART: [ldev] SUBJECT.KEYID = 5
1,210,061 UART: [ldev] AUTHORITY.KEYID = 7
1,210,524 UART: [ldev] FE.KEYID = 1
1,215,732 UART: [ldev] Erasing FE.KEYID = 1
1,241,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,686 UART: [ldev] --
1,281,164 UART: [fwproc] Wait for Commands...
1,281,901 UART: [fwproc] Recv command 0x46574c44
1,282,634 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,275 >>> mbox cmd response: success
2,771,318 UART: [afmc] ++
2,771,486 UART: [afmc] CDI.KEYID = 6
2,771,849 UART: [afmc] SUBJECT.KEYID = 7
2,772,275 UART: [afmc] AUTHORITY.KEYID = 5
2,807,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,464 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,347 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,066 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,881 UART: [afmc] --
2,850,799 UART: [cold-reset] --
2,851,791 UART: [state] Locking Datavault
2,852,944 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,548 UART: [state] Locking ICCM
2,854,080 UART: [exit] Launching FMC @ 0x40000130
2,859,409 UART:
2,859,425 UART: Running Caliptra FMC ...
2,859,833 UART:
2,859,887 UART: [state] CFI Enabled
2,870,848 UART: [fht] FMC Alias Private Key: 7
2,979,365 UART: [art] Extend RT PCRs Done
2,979,793 UART: [art] Lock RT PCRs Done
2,981,079 UART: [art] Populate DV Done
2,989,240 UART: [fht] FMC Alias Private Key: 7
2,990,274 UART: [art] Derive CDI
2,990,554 UART: [art] Store in in slot 0x4
3,076,281 UART: [art] Derive Key Pair
3,076,641 UART: [art] Store priv key in slot 0x5
3,089,367 UART: [art] Derive Key Pair - Done
3,104,243 UART: [art] Signing Cert with AUTHO
3,104,723 UART: RITY.KEYID = 7
3,120,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,980 UART: [art] PUB.X = 03044E1683A7A86D5DAB848A9A7FEF65D9D55AD6676C9C1443A5321151FBA9025BC9F7819A15F599E5C1A3D12677310E
3,127,740 UART: [art] PUB.Y = 05435D377F8CFA3CF4B4CC420CD77F83CC168550FD8F4A46B57A97EBD1CBB921CE207E1E673FFB9F68B95B9213E5D98C
3,134,702 UART: [art] SIG.R = BB0051DB2397D56695383D892D7D8BF2ACBF14AFDDB46B58FAF6BAFB20688EAB70B50BF4A9000D95FEBCBDC6DFEC9BCC
3,141,458 UART: [art] SIG.S = C680AD2BDD09DFE272705E2F8353A5DDD8D10323FBB0C00B89E03A85549C34BA02591EE05C8E9BFDD901FBF209A8B673
3,164,767 UART: Caliptra RT
3,165,020 UART: [state] CFI Enabled
3,272,890 UART: [rt] RT listening for mailbox commands...
3,273,560 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,770 UART: [rt]cmd =0x41544d4e, len=14344
3,706,624 >>> mbox cmd response data (8 bytes)
3,706,625 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,638 UART: [rt]cmd =0x41545348, len=116
3,758,259 >>> mbox cmd response data (12 bytes)
3,758,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,525 UART: [rt]cmd =0x41545348, len=116
3,790,320 >>> mbox cmd response data (12 bytes)
3,790,321 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,924 UART:
3,790,940 UART: Running Caliptra ROM ...
3,791,348 UART:
3,791,403 UART: [state] CFI Enabled
3,793,737 UART: [state] LifecycleState = Unprovisioned
3,794,392 UART: [state] DebugLocked = No
3,795,066 UART: [state] WD Timer not started. Device not locked for debugging
3,796,366 UART: [kat] SHA2-256
4,599,916 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,604,045 UART: [kat] ++
4,604,197 UART: [kat] sha1
4,608,439 UART: [kat] SHA2-256
4,610,379 UART: [kat] SHA2-384
4,613,180 UART: [kat] SHA2-512-ACC
4,615,080 UART: [kat] ECC-384
4,625,253 UART: [kat] HMAC-384Kdf
4,629,887 UART: [kat] LMS
4,878,199 UART: [kat] --
4,878,949 UART: [update-reset] ++
6,189,740 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,190,921 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,340,499 >>> mbox cmd response: success
6,340,499 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,340,850 UART: [update-reset] Copying MAN_2 To MAN_1
6,348,864 UART: [update-reset Success] --
6,349,913 UART: [state] Locking Datavault
6,350,623 UART: [state] Locking PCR0, PCR1 and PCR31
6,351,227 UART: [state] Locking ICCM
6,351,721 UART: [exit] Launching FMC @ 0x40000130
6,357,050 UART:
6,357,066 UART: Running Caliptra FMC ...
6,357,474 UART:
6,357,528 UART: [state] CFI Enabled
6,446,705 UART: [art] Extend RT PCRs Done
6,447,133 UART: [art] Lock RT PCRs Done
6,448,316 UART: [art] Populate DV Done
6,456,755 UART: [fht] FMC Alias Private Key: 7
6,457,707 UART: [art] Derive CDI
6,457,987 UART: [art] Store in in slot 0x4
6,543,480 UART: [art] Derive Key Pair
6,543,840 UART: [art] Store priv key in slot 0x5
6,556,966 UART: [art] Derive Key Pair - Done
6,571,713 UART: [art] Signing Cert with AUTHO
6,572,193 UART: RITY.KEYID = 7
6,586,741 UART: [art] Erasing AUTHORITY.KEYID = 7
6,587,506 UART: [art] PUB.X = 4B74252DA33D9586FC871392E8F18F223DDF5792451587B93DA021C72E397FA0A37FDA7C08A8D6355D1A780CF1D24035
6,594,270 UART: [art] PUB.Y = 457938C1F702984697E1D0BCAA78BE9DF5B89DF9D83A18F0A7B96472FB72C1984E66F92F54AFB43BC4AA0B14B4F4C29C
6,601,228 UART: [art] SIG.R = 4E36E5AAF6902227063BF6AD869A927DB91F4D0926D9961C29040AB4892E987AE21A5B1290139F9A2B90F899BA18F91D
6,607,986 UART: [art] SIG.S = E0113F7DD4018D93DF8695423B8C6B80F67DDCDFA347FA3F988A70F071C4A219B89F51E79328237E1C9A03D66408AE71
6,631,918 UART: Caliptra RT
6,632,171 UART: [state] CFI Enabled
6,909,202 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,939,995 UART: [rt]cmd =0x41545348, len=116
6,961,844 >>> mbox cmd response data (12 bytes)
6,961,845 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,991,786 UART: [rt]cmd =0x41545348, len=116
6,993,493 >>> mbox cmd response data (12 bytes)
6,993,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,116,169 UART: [rt]cmd =0x41544d4e, len=14344
7,425,391 >>> mbox cmd response data (8 bytes)
7,425,392 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,455,575 UART: [rt]cmd =0x41545348, len=116
7,477,448 >>> mbox cmd response data (12 bytes)
7,477,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,507,468 UART: [rt]cmd =0x41545348, len=116
7,509,326 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,452 ready_for_fw is high
1,055,452 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,545 >>> mbox cmd response: success
2,682,245 UART:
2,682,261 UART: Running Caliptra FMC ...
2,682,669 UART:
2,682,723 UART: [state] CFI Enabled
2,693,336 UART: [fht] FMC Alias Private Key: 7
2,801,535 UART: [art] Extend RT PCRs Done
2,801,963 UART: [art] Lock RT PCRs Done
2,803,417 UART: [art] Populate DV Done
2,811,940 UART: [fht] FMC Alias Private Key: 7
2,813,082 UART: [art] Derive CDI
2,813,362 UART: [art] Store in in slot 0x4
2,898,723 UART: [art] Derive Key Pair
2,899,083 UART: [art] Store priv key in slot 0x5
2,912,383 UART: [art] Derive Key Pair - Done
2,927,170 UART: [art] Signing Cert with AUTHO
2,927,650 UART: RITY.KEYID = 7
2,943,050 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,815 UART: [art] PUB.X = EEDA47B6F1A268F9C9E4FC7CE004E3F509DE238B6906EB83BFE96FF7B1C79748126AD03D5D04C64F1300D02C698CF683
2,950,565 UART: [art] PUB.Y = 49AC6E5BB1F6193FA9AD0908B53A728683BA31C459DF0992DA9A6BF631FD4CA44B1DC588C05DFA5F0031F69FC22C13D4
2,957,500 UART: [art] SIG.R = 43F7E3D60D87ADD7505C5A0BB891C791CB4FFA229DCF232947A66D7ACCC4474DC0A53BC524267787695572F1DD5BA6B3
2,964,276 UART: [art] SIG.S = 5869345A809BA74949D1B1BAB58E2F9EBAF503F58D88B1E8DE8D09D1E41627447B3D25663916C772DF20CC6E1A905C6E
2,987,923 UART: Caliptra RT
2,988,176 UART: [state] CFI Enabled
3,095,787 UART: [rt] RT listening for mailbox commands...
3,096,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,673 UART: [rt]cmd =0x41544d4e, len=14344
3,529,689 >>> mbox cmd response data (8 bytes)
3,529,690 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,985 UART: [rt]cmd =0x41545348, len=116
3,582,542 >>> mbox cmd response data (12 bytes)
3,582,543 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,466 UART: [rt]cmd =0x41545348, len=116
3,614,213 >>> mbox cmd response data (12 bytes)
3,614,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,043,761 >>> mbox cmd response: success
6,043,761 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,057,089 UART:
6,057,105 UART: Running Caliptra FMC ...
6,057,513 UART:
6,057,567 UART: [state] CFI Enabled
6,146,762 UART: [art] Extend RT PCRs Done
6,147,190 UART: [art] Lock RT PCRs Done
6,148,437 UART: [art] Populate DV Done
6,156,566 UART: [fht] FMC Alias Private Key: 7
6,157,524 UART: [art] Derive CDI
6,157,804 UART: [art] Store in in slot 0x4
6,243,995 UART: [art] Derive Key Pair
6,244,355 UART: [art] Store priv key in slot 0x5
6,257,873 UART: [art] Derive Key Pair - Done
6,273,229 UART: [art] Signing Cert with AUTHO
6,273,709 UART: RITY.KEYID = 7
6,289,145 UART: [art] Erasing AUTHORITY.KEYID = 7
6,289,910 UART: [art] PUB.X = 5BA415F063C2FD7F4064AD78E382B87E0F5B1C08245198573EEF742C330C229F55717209ACCDBA43BC8C503264E7394F
6,296,670 UART: [art] PUB.Y = 189AB28B0A51C1208203E74B3C1BF82DAF52C96843648FB067B30352DD7796DC56297DA70C0C083FD5E5E097647F6418
6,303,600 UART: [art] SIG.R = 50242D8D9495536EB61409FF769B7159928D7AD4A565809B5034FE36EEA98720CE4BD8B929EE7D5DCDDC11B8177B1EA7
6,310,373 UART: [art] SIG.S = 9EA0BAC23A8BB0941F0D4E69E99321E1FF4057EAF0F5C0AE7F98F36F1DE701218F0B5E82E8F9AA52F2FE2E5BE0EC6725
6,334,159 UART: Caliptra RT
6,334,412 UART: [state] CFI Enabled
6,617,981 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,648,878 UART: [rt]cmd =0x41545348, len=116
6,670,663 >>> mbox cmd response data (12 bytes)
6,670,664 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,701,063 UART: [rt]cmd =0x41545348, len=116
6,702,544 >>> mbox cmd response data (12 bytes)
6,702,545 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,825,070 UART: [rt]cmd =0x41544d4e, len=14344
7,135,904 >>> mbox cmd response data (8 bytes)
7,135,905 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,165,882 UART: [rt]cmd =0x41545348, len=116
7,187,215 >>> mbox cmd response data (12 bytes)
7,187,216 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,217,233 UART: [rt]cmd =0x41545348, len=116
7,218,881 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,170 UART: [fht] FHT @ 0x50003400
1,172,680 UART: [idev] ++
1,172,848 UART: [idev] CDI.KEYID = 6
1,173,209 UART: [idev] SUBJECT.KEYID = 7
1,173,634 UART: [idev] UDS.KEYID = 0
1,173,980 ready_for_fw is high
1,173,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,520 UART: [idev] Erasing UDS.KEYID = 0
1,198,172 UART: [idev] Sha1 KeyId Algorithm
1,206,884 UART: [idev] --
1,208,001 UART: [ldev] ++
1,208,169 UART: [ldev] CDI.KEYID = 6
1,208,533 UART: [ldev] SUBJECT.KEYID = 5
1,208,960 UART: [ldev] AUTHORITY.KEYID = 7
1,209,423 UART: [ldev] FE.KEYID = 1
1,214,367 UART: [ldev] Erasing FE.KEYID = 1
1,240,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,879 UART: [ldev] --
1,280,201 UART: [fwproc] Wait for Commands...
1,280,842 UART: [fwproc] Recv command 0x46574c44
1,281,575 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,626 >>> mbox cmd response: success
2,771,853 UART: [afmc] ++
2,772,021 UART: [afmc] CDI.KEYID = 6
2,772,384 UART: [afmc] SUBJECT.KEYID = 7
2,772,810 UART: [afmc] AUTHORITY.KEYID = 5
2,808,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,096 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,798 UART: [afmc] --
2,851,804 UART: [cold-reset] --
2,852,860 UART: [state] Locking Datavault
2,853,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,561 UART: [state] Locking ICCM
2,855,137 UART: [exit] Launching FMC @ 0x40000130
2,860,466 UART:
2,860,482 UART: Running Caliptra FMC ...
2,860,890 UART:
2,861,033 UART: [state] CFI Enabled
2,871,476 UART: [fht] FMC Alias Private Key: 7
2,979,977 UART: [art] Extend RT PCRs Done
2,980,405 UART: [art] Lock RT PCRs Done
2,982,039 UART: [art] Populate DV Done
2,990,274 UART: [fht] FMC Alias Private Key: 7
2,991,260 UART: [art] Derive CDI
2,991,540 UART: [art] Store in in slot 0x4
3,077,217 UART: [art] Derive Key Pair
3,077,577 UART: [art] Store priv key in slot 0x5
3,091,263 UART: [art] Derive Key Pair - Done
3,105,932 UART: [art] Signing Cert with AUTHO
3,106,412 UART: RITY.KEYID = 7
3,121,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,097 UART: [art] PUB.X = 72CFE047E2BB87CC860D7098853DEA94CBB251D19DB7401CD9ECF3C488C24F818E0AADB87F23771E51DD05641B14B59C
3,128,872 UART: [art] PUB.Y = 3B68991B7A06D8750E2FC8D72DD8705AFDD1100C1E28B5434E80A545EB3D5A2A31BAF6E872596F25B8D701774124D26A
3,135,814 UART: [art] SIG.R = 903EE4625D97AED30B03BEF8DCE5D9B313375EAB9AC71C33E53AC5D9B3830D8838573994E52C91D9CBFC1FC09F19697C
3,142,589 UART: [art] SIG.S = 4BA4A805B69D01E01652AE7FD2FB74AFA7CF7733D34EDE3F5DEE33B9C8E74FD271B408C0298C5006A4D445CF35C587F5
3,166,764 UART: Caliptra RT
3,167,109 UART: [state] CFI Enabled
3,274,660 UART: [rt] RT listening for mailbox commands...
3,275,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,426 UART: [rt]cmd =0x41544d4e, len=14344
3,708,956 >>> mbox cmd response data (8 bytes)
3,708,957 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,078 UART: [rt]cmd =0x41545348, len=116
3,761,291 >>> mbox cmd response data (12 bytes)
3,761,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,791,397 UART: [rt]cmd =0x41545348, len=116
3,793,140 >>> mbox cmd response data (12 bytes)
3,793,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,974 UART:
3,793,990 UART: Running Caliptra ROM ...
3,794,398 UART:
3,794,540 UART: [state] CFI Enabled
3,797,012 UART: [state] LifecycleState = Unprovisioned
3,797,667 UART: [state] DebugLocked = No
3,798,305 UART: [state] WD Timer not started. Device not locked for debugging
3,799,569 UART: [kat] SHA2-256
4,603,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,607,248 UART: [kat] ++
4,607,400 UART: [kat] sha1
4,611,838 UART: [kat] SHA2-256
4,613,778 UART: [kat] SHA2-384
4,616,641 UART: [kat] SHA2-512-ACC
4,618,541 UART: [kat] ECC-384
4,628,728 UART: [kat] HMAC-384Kdf
4,633,352 UART: [kat] LMS
4,881,664 UART: [kat] --
4,882,660 UART: [update-reset] ++
6,192,171 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,193,254 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,342,832 >>> mbox cmd response: success
6,342,832 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,342,989 UART: [update-reset] Copying MAN_2 To MAN_1
6,351,003 UART: [update-reset Success] --
6,351,884 UART: [state] Locking Datavault
6,352,774 UART: [state] Locking PCR0, PCR1 and PCR31
6,353,378 UART: [state] Locking ICCM
6,353,978 UART: [exit] Launching FMC @ 0x40000130
6,359,307 UART:
6,359,323 UART: Running Caliptra FMC ...
6,359,731 UART:
6,359,874 UART: [state] CFI Enabled
6,448,891 UART: [art] Extend RT PCRs Done
6,449,319 UART: [art] Lock RT PCRs Done
6,450,580 UART: [art] Populate DV Done
6,458,879 UART: [fht] FMC Alias Private Key: 7
6,459,907 UART: [art] Derive CDI
6,460,187 UART: [art] Store in in slot 0x4
6,545,946 UART: [art] Derive Key Pair
6,546,306 UART: [art] Store priv key in slot 0x5
6,559,332 UART: [art] Derive Key Pair - Done
6,573,842 UART: [art] Signing Cert with AUTHO
6,574,322 UART: RITY.KEYID = 7
6,589,540 UART: [art] Erasing AUTHORITY.KEYID = 7
6,590,305 UART: [art] PUB.X = C4E345F9B633B66866E49B1924F4255EB240E0599B15A02C00ED8BB2F7B807016CB4FDA132B48990C907ED5895639DB8
6,597,044 UART: [art] PUB.Y = 743F18F56013F0C6F534714CF4E45AA8358C8564C03CDEDCD0CFBC7C94D50E63F3447A9ED42BBFB73B2D750C486FDD32
6,604,004 UART: [art] SIG.R = DE16C2CD181F3822E9B9A17A2EE70CC8620D829F5C48E0525C40A890CE9C55D26FDF6F96C3B7EC1F2634531C901EB9BA
6,610,782 UART: [art] SIG.S = 89BEF5C9F082F8685B515ABDB60E1DC0E1E9868D4D5873965B9DF0AD77822828D22B2FF711A8A0092B62934FB6712A34
6,634,885 UART: Caliptra RT
6,635,230 UART: [state] CFI Enabled
6,912,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,943,681 UART: [rt]cmd =0x41545348, len=116
6,965,284 >>> mbox cmd response data (12 bytes)
6,965,285 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,995,470 UART: [rt]cmd =0x41545348, len=116
6,997,191 >>> mbox cmd response data (12 bytes)
6,997,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,119,841 UART: [rt]cmd =0x41544d4e, len=14344
7,429,637 >>> mbox cmd response data (8 bytes)
7,429,638 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,459,721 UART: [rt]cmd =0x41545348, len=116
7,481,206 >>> mbox cmd response data (12 bytes)
7,481,207 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,511,136 UART: [rt]cmd =0x41545348, len=116
7,513,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,441 ready_for_fw is high
1,056,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,670 >>> mbox cmd response: success
2,686,576 UART:
2,686,592 UART: Running Caliptra FMC ...
2,687,000 UART:
2,687,143 UART: [state] CFI Enabled
2,697,834 UART: [fht] FMC Alias Private Key: 7
2,805,203 UART: [art] Extend RT PCRs Done
2,805,631 UART: [art] Lock RT PCRs Done
2,807,243 UART: [art] Populate DV Done
2,815,598 UART: [fht] FMC Alias Private Key: 7
2,816,758 UART: [art] Derive CDI
2,817,038 UART: [art] Store in in slot 0x4
2,902,797 UART: [art] Derive Key Pair
2,903,157 UART: [art] Store priv key in slot 0x5
2,916,627 UART: [art] Derive Key Pair - Done
2,931,358 UART: [art] Signing Cert with AUTHO
2,931,838 UART: RITY.KEYID = 7
2,947,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,983 UART: [art] PUB.X = 7CFE542115B2ED2A6DA4A41394DAFE036E8BBD905CA10D13D4945DB2643175E54227A5B53E87208E4D1D1DA16512652C
2,954,753 UART: [art] PUB.Y = FBD8FBFC2B1AF94B16BD8F9D422FFE3CFA183E3974E85F15EB3A3F9D015A9137790F4BC04FF739523AA0B50CB2D052C1
2,961,716 UART: [art] SIG.R = 8419AAFA55902548E2CC9DCD5494354410129BD4F6718611F02934BB27ED75768CE9729AF34927AFCD8982B5AA8D58B6
2,968,486 UART: [art] SIG.S = F4D36773BB0C68CCDDF191BD779957CA35B785B76C15F3644C361CD6AF6AF6D074B466E2B4825A5F7BAC76406167656F
2,992,412 UART: Caliptra RT
2,992,757 UART: [state] CFI Enabled
3,101,675 UART: [rt] RT listening for mailbox commands...
3,102,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,195 UART: [rt]cmd =0x41544d4e, len=14344
3,534,795 >>> mbox cmd response data (8 bytes)
3,534,796 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,901 UART: [rt]cmd =0x41545348, len=116
3,586,804 >>> mbox cmd response data (12 bytes)
3,586,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,950 UART: [rt]cmd =0x41545348, len=116
3,618,535 >>> mbox cmd response data (12 bytes)
3,618,536 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,050,628 >>> mbox cmd response: success
6,050,628 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,063,940 UART:
6,063,956 UART: Running Caliptra FMC ...
6,064,364 UART:
6,064,507 UART: [state] CFI Enabled
6,154,052 UART: [art] Extend RT PCRs Done
6,154,480 UART: [art] Lock RT PCRs Done
6,155,863 UART: [art] Populate DV Done
6,164,046 UART: [fht] FMC Alias Private Key: 7
6,165,178 UART: [art] Derive CDI
6,165,458 UART: [art] Store in in slot 0x4
6,250,785 UART: [art] Derive Key Pair
6,251,145 UART: [art] Store priv key in slot 0x5
6,264,101 UART: [art] Derive Key Pair - Done
6,279,019 UART: [art] Signing Cert with AUTHO
6,279,499 UART: RITY.KEYID = 7
6,294,961 UART: [art] Erasing AUTHORITY.KEYID = 7
6,295,726 UART: [art] PUB.X = 4E8A8829DEEDC4F551F2A08B9A67108E556020FF2A0FBD1D0A1D691D98ACA7374FAB1CBD1FCC3FC16B1CD909813F5448
6,302,507 UART: [art] PUB.Y = 377D9B959DE4BAC5D15B4CEA2A93595559671947925CB0403EAE637E2E270BBC9AAF8D2F7E3ED925EACB096F3C836ED0
6,309,467 UART: [art] SIG.R = B040942D7E4D16860BF3D47058918BD296165B339AF603A15A2B52E69E7CD3C57F5CAE03DFF7962DECB92D53C7A879F4
6,316,236 UART: [art] SIG.S = 52D19813CF91294812EB092DBA8C630AD66A2712819E2C71B62F892C052BB0426C78F0C325CCAB12005771D1F8DADAC8
6,340,360 UART: Caliptra RT
6,340,705 UART: [state] CFI Enabled
6,620,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,651,373 UART: [rt]cmd =0x41545348, len=116
6,673,590 >>> mbox cmd response data (12 bytes)
6,673,591 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,703,770 UART: [rt]cmd =0x41545348, len=116
6,705,779 >>> mbox cmd response data (12 bytes)
6,705,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,828,329 UART: [rt]cmd =0x41544d4e, len=14344
7,138,539 >>> mbox cmd response data (8 bytes)
7,138,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,168,415 UART: [rt]cmd =0x41545348, len=116
7,190,146 >>> mbox cmd response data (12 bytes)
7,190,147 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,220,236 UART: [rt]cmd =0x41545348, len=116
7,221,904 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,035 UART:
192,530 UART: Running Caliptra ROM ...
193,657 UART:
193,803 UART: [state] CFI Enabled
264,339 UART: [state] LifecycleState = Unprovisioned
266,261 UART: [state] DebugLocked = No
268,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,827 UART: [kat] SHA2-256
442,543 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,063 UART: [kat] ++
453,545 UART: [kat] sha1
463,440 UART: [kat] SHA2-256
466,158 UART: [kat] SHA2-384
472,210 UART: [kat] SHA2-512-ACC
474,572 UART: [kat] ECC-384
2,768,407 UART: [kat] HMAC-384Kdf
2,800,973 UART: [kat] LMS
3,991,293 UART: [kat] --
3,997,270 UART: [cold-reset] ++
3,998,207 UART: [fht] Storing FHT @ 0x50003400
4,010,391 UART: [idev] ++
4,010,953 UART: [idev] CDI.KEYID = 6
4,011,978 UART: [idev] SUBJECT.KEYID = 7
4,013,155 UART: [idev] UDS.KEYID = 0
4,014,305 ready_for_fw is high
4,014,530 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,794 UART: [idev] Erasing UDS.KEYID = 0
7,344,411 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,533 UART: [idev] --
7,370,416 UART: [ldev] ++
7,370,978 UART: [ldev] CDI.KEYID = 6
7,371,983 UART: [ldev] SUBJECT.KEYID = 5
7,373,140 UART: [ldev] AUTHORITY.KEYID = 7
7,374,419 UART: [ldev] FE.KEYID = 1
7,416,608 UART: [ldev] Erasing FE.KEYID = 1
10,749,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,112 UART: [ldev] --
13,107,529 UART: [fwproc] Waiting for Commands...
13,110,531 UART: [fwproc] Received command 0x46574c44
13,112,725 UART: [fwproc] Received Image of size 113844 bytes
17,164,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,424 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,324 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,621,124 >>> mbox cmd response: success
17,625,340 UART: [afmc] ++
17,625,955 UART: [afmc] CDI.KEYID = 6
17,626,862 UART: [afmc] SUBJECT.KEYID = 7
17,628,079 UART: [afmc] AUTHORITY.KEYID = 5
20,998,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,301,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,303,346 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,317,749 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,332,597 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,347,033 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,367,817 UART: [afmc] --
23,371,906 UART: [cold-reset] --
23,375,867 UART: [state] Locking Datavault
23,381,718 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,452 UART: [state] Locking ICCM
23,385,979 UART: [exit] Launching FMC @ 0x40000130
23,394,373 UART:
23,394,601 UART: Running Caliptra FMC ...
23,395,692 UART:
23,395,843 UART: [state] CFI Enabled
23,460,723 UART: [fht] FMC Alias Private Key: 7
25,798,294 UART: [art] Extend RT PCRs Done
25,799,521 UART: [art] Lock RT PCRs Done
25,801,100 UART: [art] Populate DV Done
25,806,454 UART: [fht] FMC Alias Private Key: 7
25,808,098 UART: [art] Derive CDI
25,808,832 UART: [art] Store in in slot 0x4
25,869,181 UART: [art] Derive Key Pair
25,870,219 UART: [art] Store priv key in slot 0x5
29,163,042 UART: [art] Derive Key Pair - Done
29,176,091 UART: [art] Signing Cert with AUTHO
29,177,391 UART: RITY.KEYID = 7
31,464,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,086 UART: [art] PUB.X = 6FC9A852AE287F973D9EA69BC1166A8D431659FF095D7D1B07133E1F2459E9E653CE6E37DDD8D456898E707C5A377470
31,473,364 UART: [art] PUB.Y = CF0698E64136C54FE364DDD4ECDDB95587ADB19C8B3834E8C49A6079BB73A83F85DC73683BF9B1C1382038157B374B33
31,480,609 UART: [art] SIG.R = 3B02D9038C09EE1A5BF16F849971EB52F68AE7470ADDB22748B8D6614B7F0EA8695F43AC230602C64BCAE25A5F950033
31,487,910 UART: [art] SIG.S = 2A5FA45460F86349BB80394C992426390D7C16F0A43B58A87F8FFDEABD0E1282D20BBAFBE595ACCBD0BE0F077E6002C9
32,793,214 UART: Caliptra RT
32,793,915 UART: [state] CFI Enabled
32,953,348 UART: [rt] RT listening for mailbox commands...
36,990,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,145,906 UART: [rt]cmd =0x41544d4e, len=14344
42,445,927 >>> mbox cmd response data (8 bytes)
42,446,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,477,170 UART: [rt]cmd =0x41545348, len=116
42,497,259 >>> mbox cmd response data (12 bytes)
44,556,892 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
44,701,696 UART:
44,702,078 UART: Running Caliptra ROM ...
44,703,128 UART:
44,703,275 UART: [state] CFI Enabled
44,768,494 UART: [state] LifecycleState = Unprovisioned
44,770,485 UART: [state] DebugLocked = No
44,772,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,776,390 UART: [kat] SHA2-256
44,946,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,956,591 UART: [kat] ++
44,957,038 UART: [kat] sha1
44,968,138 UART: [kat] SHA2-256
44,970,816 UART: [kat] SHA2-384
44,977,120 UART: [kat] SHA2-512-ACC
44,979,519 UART: [kat] ECC-384
47,272,758 UART: [kat] HMAC-384Kdf
47,284,510 UART: [kat] LMS
48,474,857 UART: [kat] --
48,479,568 UART: [update-reset] ++
52,613,903 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,617,668 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
52,998,914 >>> mbox cmd response: success
53,003,648 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,004,239 UART: [update-reset] Copying MAN_2 To MAN_1
53,022,227 UART: [update-reset Success] --
53,027,109 UART: [state] Locking Datavault
53,030,902 UART: [state] Locking PCR0, PCR1 and PCR31
53,032,649 UART: [state] Locking ICCM
53,033,856 UART: [exit] Launching FMC @ 0x40000130
53,042,252 UART:
53,042,481 UART: Running Caliptra FMC ...
53,043,581 UART:
53,043,736 UART: [state] CFI Enabled
53,140,619 UART: [art] Extend RT PCRs Done
53,141,820 UART: [art] Lock RT PCRs Done
53,143,308 UART: [art] Populate DV Done
53,148,812 UART: [fht] FMC Alias Private Key: 7
53,150,401 UART: [art] Derive CDI
53,151,209 UART: [art] Store in in slot 0x4
53,209,613 UART: [art] Derive Key Pair
53,210,606 UART: [art] Store priv key in slot 0x5
56,503,155 UART: [art] Derive Key Pair - Done
56,516,209 UART: [art] Signing Cert with AUTHO
56,517,507 UART: RITY.KEYID = 7
58,804,146 UART: [art] Erasing AUTHORITY.KEYID = 7
58,805,654 UART: [art] PUB.X = 8933AFB2EFA2033E53090048F8A7F39E2130CF8DC9C70CFE6A4495D22F15192C3C6C44C570DC910C57BD675C0137E733
58,812,933 UART: [art] PUB.Y = 08B9D93219AA2A2528061347ED85A85A0DFF5F1D2934572A02C66194F73D7D441BCBF8126D8396EDC85C6C375D8DC5BB
58,820,209 UART: [art] SIG.R = B28F67C3D10761EB89949AD4A632F9485DCFEE256A09E1D8829BD1262A783A54A4AE3D994E7E58DD34C27507397D4281
58,827,560 UART: [art] SIG.S = 0015A599B29E876FB765E6001D10FABEFB03DDFBEF29E8D14148CA6022222EC1068355BA51C049803E084612109E663D
60,133,027 UART: Caliptra RT
60,133,731 UART: [state] CFI Enabled
60,461,292 UART: [rt] RT listening for mailbox commands...
60,493,214 UART: [rt]cmd =0x41545348, len=116
60,512,691 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,784,449 ready_for_fw is high
3,785,068 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,842,142 >>> mbox cmd response: success
23,525,509 UART:
23,525,915 UART: Running Caliptra FMC ...
23,527,218 UART:
23,527,380 UART: [state] CFI Enabled
23,594,735 UART: [fht] FMC Alias Private Key: 7
25,932,261 UART: [art] Extend RT PCRs Done
25,933,544 UART: [art] Lock RT PCRs Done
25,935,360 UART: [art] Populate DV Done
25,940,447 UART: [fht] FMC Alias Private Key: 7
25,941,983 UART: [art] Derive CDI
25,942,746 UART: [art] Store in in slot 0x4
26,002,999 UART: [art] Derive Key Pair
26,004,003 UART: [art] Store priv key in slot 0x5
29,296,300 UART: [art] Derive Key Pair - Done
29,309,463 UART: [art] Signing Cert with AUTHO
29,310,774 UART: RITY.KEYID = 7
31,598,423 UART: [art] Erasing AUTHORITY.KEYID = 7
31,599,932 UART: [art] PUB.X = 64FF40AEC1C02C78FF7410A036EA1E9BC4A383777247E553680D89778DB056B795ED60CDFE29773F4A97C0597CFC598A
31,607,197 UART: [art] PUB.Y = B7FDD29EB8FF4E120129E9A6CDE32C4193679B99C80305F28CE5C7C71415BFC3CDDB3B0B3B9AFCC71F01FFB8BD10AB1B
31,614,499 UART: [art] SIG.R = 84A9F5665E1EA9013779C886771D4C2B5648D5CC845ACCD73CCC68EF79EDE6089A381D688D2F99A58D8BD7CCDE0ADB12
31,621,873 UART: [art] SIG.S = FF083FF9907499D772EC402019A3DEB6D8A87832F263F837B49CF38038A16049F29C1F60742A1ACF20DDA26EEE235181
32,927,265 UART: Caliptra RT
32,928,006 UART: [state] CFI Enabled
33,088,078 UART: [rt] RT listening for mailbox commands...
37,119,915 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,275,668 UART: [rt]cmd =0x41544d4e, len=14344
42,576,206 >>> mbox cmd response data (8 bytes)
42,576,801 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,607,378 UART: [rt]cmd =0x41545348, len=116
42,626,809 >>> mbox cmd response data (12 bytes)
44,684,216 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
53,432,073 >>> mbox cmd response: success
53,436,803 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,464,416 UART:
53,464,736 UART: Running Caliptra FMC ...
53,465,851 UART:
53,466,009 UART: [state] CFI Enabled
53,553,540 UART: [art] Extend RT PCRs Done
53,554,756 UART: [art] Lock RT PCRs Done
53,556,047 UART: [art] Populate DV Done
53,561,619 UART: [fht] FMC Alias Private Key: 7
53,563,363 UART: [art] Derive CDI
53,564,173 UART: [art] Store in in slot 0x4
53,622,539 UART: [art] Derive Key Pair
53,623,587 UART: [art] Store priv key in slot 0x5
56,916,414 UART: [art] Derive Key Pair - Done
56,929,362 UART: [art] Signing Cert with AUTHO
56,930,665 UART: RITY.KEYID = 7
59,217,624 UART: [art] Erasing AUTHORITY.KEYID = 7
59,219,126 UART: [art] PUB.X = 550DF9055E70D684B2C1CD31539353E385FF1AA841BD7945A2FFDDA9666C3659675C6EF574773E9E9BC6C375C9085571
59,226,367 UART: [art] PUB.Y = 58ABE94DFE9A039AE9392B681B9C4BE0645E729CD6DF4831988ADD1C3BD34F299BAA3E68C3F7ED4BEEF277B5F25A20DF
59,233,645 UART: [art] SIG.R = A41441C84280E02FC54CF62073B804F9DD74D563437977C97C9E790959D826B72AE7E4A0E018DA9C775B87F8776DFE89
59,240,964 UART: [art] SIG.S = 7B61DE04230B512C047FB8CC948F43D906013ED62BEA1C5AC36D9DB7CCA84929AA8C0AACC3432CA3B88E5F4AF0BE7C40
60,546,191 UART: Caliptra RT
60,546,886 UART: [state] CFI Enabled
60,898,620 UART: [rt] RT listening for mailbox commands...
60,930,597 UART: [rt]cmd =0x41545348, len=116
60,949,205 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,515 UART:
192,995 UART: Running Caliptra ROM ...
194,141 UART:
603,879 UART: [state] CFI Enabled
618,405 UART: [state] LifecycleState = Unprovisioned
620,297 UART: [state] DebugLocked = No
622,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,329 UART: [kat] SHA2-256
797,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,649 UART: [kat] ++
808,176 UART: [kat] sha1
818,913 UART: [kat] SHA2-256
821,598 UART: [kat] SHA2-384
827,732 UART: [kat] SHA2-512-ACC
830,098 UART: [kat] ECC-384
3,116,825 UART: [kat] HMAC-384Kdf
3,129,920 UART: [kat] LMS
4,319,993 UART: [kat] --
4,324,006 UART: [cold-reset] ++
4,326,441 UART: [fht] Storing FHT @ 0x50003400
4,338,155 UART: [idev] ++
4,338,762 UART: [idev] CDI.KEYID = 6
4,339,677 UART: [idev] SUBJECT.KEYID = 7
4,340,923 UART: [idev] UDS.KEYID = 0
4,341,974 ready_for_fw is high
4,342,186 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,122 UART: [idev] Erasing UDS.KEYID = 0
7,629,109 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,159 UART: [idev] --
7,653,021 UART: [ldev] ++
7,653,597 UART: [ldev] CDI.KEYID = 6
7,654,579 UART: [ldev] SUBJECT.KEYID = 5
7,655,796 UART: [ldev] AUTHORITY.KEYID = 7
7,657,029 UART: [ldev] FE.KEYID = 1
7,665,339 UART: [ldev] Erasing FE.KEYID = 1
10,956,373 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,503 UART: [ldev] --
13,313,916 UART: [fwproc] Waiting for Commands...
13,316,770 UART: [fwproc] Received command 0x46574c44
13,318,950 UART: [fwproc] Received Image of size 113844 bytes
17,374,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,692 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,837,993 >>> mbox cmd response: success
17,842,698 UART: [afmc] ++
17,843,316 UART: [afmc] CDI.KEYID = 6
17,844,233 UART: [afmc] SUBJECT.KEYID = 7
17,845,443 UART: [afmc] AUTHORITY.KEYID = 5
21,155,460 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,653 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,902 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,350 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,164 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,569 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,786 UART: [afmc] --
23,520,352 UART: [cold-reset] --
23,524,330 UART: [state] Locking Datavault
23,529,199 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,898 UART: [state] Locking ICCM
23,533,262 UART: [exit] Launching FMC @ 0x40000130
23,541,663 UART:
23,541,950 UART: Running Caliptra FMC ...
23,543,062 UART:
23,543,230 UART: [state] CFI Enabled
23,551,632 UART: [fht] FMC Alias Private Key: 7
25,881,925 UART: [art] Extend RT PCRs Done
25,883,164 UART: [art] Lock RT PCRs Done
25,884,906 UART: [art] Populate DV Done
25,890,424 UART: [fht] FMC Alias Private Key: 7
25,892,016 UART: [art] Derive CDI
25,892,833 UART: [art] Store in in slot 0x4
25,935,975 UART: [art] Derive Key Pair
25,937,010 UART: [art] Store priv key in slot 0x5
29,178,841 UART: [art] Derive Key Pair - Done
29,191,566 UART: [art] Signing Cert with AUTHO
29,192,895 UART: RITY.KEYID = 7
31,472,092 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,632 UART: [art] PUB.X = 525107A7DEC18050EA473AA4040C7F5E5133700B109EEF6025B175F9E3FA4818E62AB77CDC5BB62982E7A8043D96976F
31,480,838 UART: [art] PUB.Y = 8650B17CA65C8A7E1A23A021D33667DD37DF86C4C7412E8172953127BC00882628A75CBF8D1D1DF5E38FDC5E97D8A90C
31,488,085 UART: [art] SIG.R = 0E89BD255312210C41F53A08AF45D61B90AE3BC9391C439FDC34866447EFFEF30D7AA55A8600FA3864867C53F61C7435
31,495,446 UART: [art] SIG.S = 95F26D69ABA8D7E92E6057E083FF425CB7F501BEE618D46DF27DE2FA9584915DCB086D6181FEF24FC730C637F3D47EAB
32,800,647 UART: Caliptra RT
32,801,341 UART: [state] CFI Enabled
32,919,063 UART: [rt] RT listening for mailbox commands...
37,094,535 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,249,764 UART: [rt]cmd =0x41544d4e, len=14344
42,550,622 >>> mbox cmd response data (8 bytes)
42,551,277 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,581,922 UART: [rt]cmd =0x41545348, len=116
42,601,658 >>> mbox cmd response data (12 bytes)
44,735,947 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
44,880,562 UART:
44,880,938 UART: Running Caliptra ROM ...
44,881,990 UART:
44,882,203 UART: [state] CFI Enabled
44,896,871 UART: [state] LifecycleState = Unprovisioned
44,898,809 UART: [state] DebugLocked = No
44,900,817 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,905,927 UART: [kat] SHA2-256
45,075,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,086,159 UART: [kat] ++
45,086,615 UART: [kat] sha1
45,097,582 UART: [kat] SHA2-256
45,100,280 UART: [kat] SHA2-384
45,106,166 UART: [kat] SHA2-512-ACC
45,108,516 UART: [kat] ECC-384
47,394,342 UART: [kat] HMAC-384Kdf
47,405,820 UART: [kat] LMS
48,595,879 UART: [kat] --
48,599,624 UART: [update-reset] ++
52,738,899 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,742,944 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
53,124,233 >>> mbox cmd response: success
53,128,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,129,386 UART: [update-reset] Copying MAN_2 To MAN_1
53,147,826 UART: [update-reset Success] --
53,152,639 UART: [state] Locking Datavault
53,155,579 UART: [state] Locking PCR0, PCR1 and PCR31
53,157,339 UART: [state] Locking ICCM
53,159,600 UART: [exit] Launching FMC @ 0x40000130
53,168,000 UART:
53,168,245 UART: Running Caliptra FMC ...
53,169,351 UART:
53,169,511 UART: [state] CFI Enabled
53,213,685 UART: [art] Extend RT PCRs Done
53,214,831 UART: [art] Lock RT PCRs Done
53,216,370 UART: [art] Populate DV Done
53,221,666 UART: [fht] FMC Alias Private Key: 7
53,223,212 UART: [art] Derive CDI
53,224,033 UART: [art] Store in in slot 0x4
53,266,864 UART: [art] Derive Key Pair
53,267,889 UART: [art] Store priv key in slot 0x5
56,510,176 UART: [art] Derive Key Pair - Done
56,523,291 UART: [art] Signing Cert with AUTHO
56,524,591 UART: RITY.KEYID = 7
58,803,952 UART: [art] Erasing AUTHORITY.KEYID = 7
58,805,461 UART: [art] PUB.X = 06D856E3C2E2F210E00B389EE399C32BA02673CE7F37632D1BCA3A41FFD37DC26B7E71E88AB23F7974014725554EE600
58,812,718 UART: [art] PUB.Y = 340DD5CAC3109BACDA7E819B4987ABDCF695B4CF82B223D6211FD21A3BC5348C666D95649575DF50D51FE774963C9E0E
58,819,996 UART: [art] SIG.R = E07606C2EF7F746F18AD36C036312471FC9B9E9B5089369AE78C8E0DBFB9CDD01FA1B959F6D24D921D5A471FF35B5DF6
58,827,405 UART: [art] SIG.S = 292CF76547C4DC00028FF7C0B3BA51F5B430D41AE98B858EB4C0D58413930F6D112193F0A37EE14DA80989E631632593
60,133,029 UART: Caliptra RT
60,133,734 UART: [state] CFI Enabled
60,421,965 UART: [rt] RT listening for mailbox commands...
60,454,005 UART: [rt]cmd =0x41545348, len=116
60,473,537 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,127,670 ready_for_fw is high
4,128,184 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,059,746 >>> mbox cmd response: success
23,694,883 UART:
23,695,692 UART: Running Caliptra FMC ...
23,696,827 UART:
23,697,006 UART: [state] CFI Enabled
23,704,516 UART: [fht] FMC Alias Private Key: 7
26,035,721 UART: [art] Extend RT PCRs Done
26,036,967 UART: [art] Lock RT PCRs Done
26,038,527 UART: [art] Populate DV Done
26,044,169 UART: [fht] FMC Alias Private Key: 7
26,045,715 UART: [art] Derive CDI
26,046,490 UART: [art] Store in in slot 0x4
26,089,260 UART: [art] Derive Key Pair
26,090,310 UART: [art] Store priv key in slot 0x5
29,332,173 UART: [art] Derive Key Pair - Done
29,345,167 UART: [art] Signing Cert with AUTHO
29,346,465 UART: RITY.KEYID = 7
31,625,762 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,267 UART: [art] PUB.X = 12C8CD4DEBB9F2DBE09E3C88C16B258B5195D38268E1EC25B529F00711C99A286F1CB47E470DE9ABBC3CA8625C3E1015
31,634,533 UART: [art] PUB.Y = 438A4C100F4ADC147F2BB93C5CEBCAFE6A3DA29014C39FEA0B2360E4DA5A7C41D2548A24EF49ECCC69C6BFD971B45DD8
31,641,799 UART: [art] SIG.R = 5326EC184D59775453BB2EEFCCBCA83DD12EACDF5E074874397BE10B61E44B05FA1B68E1F9D333E89C8A840F814F5C54
31,649,201 UART: [art] SIG.S = 2A1EB75A70DE04018100209EB2BC19DECCBF39F783872809C94BB973B777E1CFF9875AEB492BB8AF051066122587D3A4
32,954,316 UART: Caliptra RT
32,955,037 UART: [state] CFI Enabled
33,073,021 UART: [rt] RT listening for mailbox commands...
37,246,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,402,331 UART: [rt]cmd =0x41544d4e, len=14344
42,702,426 >>> mbox cmd response data (8 bytes)
42,703,007 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,733,658 UART: [rt]cmd =0x41545348, len=116
42,752,420 >>> mbox cmd response data (12 bytes)
44,882,886 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
53,535,897 >>> mbox cmd response: success
53,540,848 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,570,628 UART:
53,570,922 UART: Running Caliptra FMC ...
53,571,993 UART:
53,572,154 UART: [state] CFI Enabled
53,616,965 UART: [art] Extend RT PCRs Done
53,618,168 UART: [art] Lock RT PCRs Done
53,619,576 UART: [art] Populate DV Done
53,625,200 UART: [fht] FMC Alias Private Key: 7
53,626,794 UART: [art] Derive CDI
53,627,642 UART: [art] Store in in slot 0x4
53,669,858 UART: [art] Derive Key Pair
53,670,861 UART: [art] Store priv key in slot 0x5
56,913,358 UART: [art] Derive Key Pair - Done
56,926,091 UART: [art] Signing Cert with AUTHO
56,927,411 UART: RITY.KEYID = 7
59,206,859 UART: [art] Erasing AUTHORITY.KEYID = 7
59,208,369 UART: [art] PUB.X = B945340AC1E7F8F712B499CFB0CC1782193296F4D48060504288411751D4D0C63C8F8A437D45C77B25A2C7C39AD01924
59,215,638 UART: [art] PUB.Y = 4B4154CFD911463C3CBE9CCC55A5AE18962110470A9C2C70846D84BB9A24B24C5C583B96B1D4CAE651BEEE8589046343
59,222,880 UART: [art] SIG.R = 9621E5DA073E03034FB53C30E80593D2B917F9168A1960E18C995E507D633EDBC60F74503EB32B7F15C2E55C58AA08AE
59,230,228 UART: [art] SIG.S = DD147B85FDD660F39F7F0766B58AC0058DABE5C645AFEB13A8EB87FA4FC2311A2F90F46863AD8112A44ED0359FEEC1DC
60,535,397 UART: Caliptra RT
60,536,096 UART: [state] CFI Enabled
60,823,272 UART: [rt] RT listening for mailbox commands...
60,855,274 UART: [rt]cmd =0x41545348, len=116
60,874,626 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,214 UART:
192,574 UART: Running Caliptra ROM ...
193,791 UART:
193,944 UART: [state] CFI Enabled
267,721 UART: [state] LifecycleState = Unprovisioned
269,565 UART: [state] DebugLocked = No
271,028 UART: [state] WD Timer not started. Device not locked for debugging
274,574 UART: [kat] SHA2-256
453,662 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,264 UART: [kat] ++
465,838 UART: [kat] sha1
477,243 UART: [kat] SHA2-256
480,300 UART: [kat] SHA2-384
486,583 UART: [kat] SHA2-512-ACC
489,522 UART: [kat] ECC-384
2,949,115 UART: [kat] HMAC-384Kdf
2,972,669 UART: [kat] LMS
3,502,115 UART: [kat] --
3,506,831 UART: [cold-reset] ++
3,508,839 UART: [fht] FHT @ 0x50003400
3,518,650 UART: [idev] ++
3,519,231 UART: [idev] CDI.KEYID = 6
3,520,145 UART: [idev] SUBJECT.KEYID = 7
3,521,322 UART: [idev] UDS.KEYID = 0
3,522,252 ready_for_fw is high
3,522,446 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,889 UART: [idev] Erasing UDS.KEYID = 0
6,025,221 UART: [idev] Sha1 KeyId Algorithm
6,047,055 UART: [idev] --
6,050,142 UART: [ldev] ++
6,050,722 UART: [ldev] CDI.KEYID = 6
6,051,636 UART: [ldev] SUBJECT.KEYID = 5
6,052,799 UART: [ldev] AUTHORITY.KEYID = 7
6,054,091 UART: [ldev] FE.KEYID = 1
6,100,331 UART: [ldev] Erasing FE.KEYID = 1
8,602,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,563 UART: [ldev] --
10,413,642 UART: [fwproc] Wait for Commands...
10,416,657 UART: [fwproc] Recv command 0x46574c44
10,418,747 UART: [fwproc] Recv'd Img size: 114168 bytes
13,820,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,278,221 >>> mbox cmd response: success
14,283,365 UART: [afmc] ++
14,283,982 UART: [afmc] CDI.KEYID = 6
14,284,894 UART: [afmc] SUBJECT.KEYID = 7
14,285,999 UART: [afmc] AUTHORITY.KEYID = 5
16,827,761 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,479 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,580 UART: [afmc] --
18,628,228 UART: [cold-reset] --
18,631,660 UART: [state] Locking Datavault
18,635,492 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,210 UART: [state] Locking ICCM
18,638,717 UART: [exit] Launching FMC @ 0x40000130
18,647,182 UART:
18,647,415 UART: Running Caliptra FMC ...
18,648,462 UART:
18,648,612 UART: [state] CFI Enabled
18,710,385 UART: [fht] FMC Alias Private Key: 7
20,474,532 UART: [art] Extend RT PCRs Done
20,475,761 UART: [art] Lock RT PCRs Done
20,477,523 UART: [art] Populate DV Done
20,482,726 UART: [fht] FMC Alias Private Key: 7
20,484,270 UART: [art] Derive CDI
20,485,005 UART: [art] Store in in slot 0x4
20,542,638 UART: [art] Derive Key Pair
20,543,638 UART: [art] Store priv key in slot 0x5
23,006,450 UART: [art] Derive Key Pair - Done
23,019,666 UART: [art] Signing Cert with AUTHO
23,020,981 UART: RITY.KEYID = 7
24,732,354 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,859 UART: [art] PUB.X = DC43883B5352042E7173924EEBFA01F9FF4E4777C41AAF487D2371018479EABF5DF203E185678374A6567C05C28D8B60
24,741,137 UART: [art] PUB.Y = 85552DFB551A2C3D007D807C0C026B5D91B8646A2B5CA5745526B29CBE22C6FDC6AAF83A319B92AA200C94BABAA8FAF9
24,748,373 UART: [art] SIG.R = 98AA429EC1122795AE4FDF09152BB7F537B4B67BDD27DEE924E6BBB0C7902C3673706D7248FCE1BFB8A3B861F0C7FF08
24,755,780 UART: [art] SIG.S = 19BBF22606AC8D7191B3302F2DAA85D27146CA82B623B46123C046121E67BC285D66804DBDD0BE0689C968AEB19630D9
25,734,473 UART: Caliptra RT
25,735,405 UART: [state] CFI Enabled
25,900,708 UART: [rt] RT listening for mailbox commands...
29,931,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,088,014 UART: [rt]cmd =0x41544d4e, len=14344
34,083,459 >>> mbox cmd response data (8 bytes)
34,084,060 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,114,537 UART: [rt]cmd =0x41545348, len=116
34,133,982 >>> mbox cmd response data (12 bytes)
36,187,465 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
36,332,740 UART:
36,333,131 UART: Running Caliptra ROM ...
36,334,378 UART:
36,334,551 UART: [state] CFI Enabled
36,399,166 UART: [state] LifecycleState = Unprovisioned
36,401,046 UART: [state] DebugLocked = No
36,402,879 UART: [state] WD Timer not started. Device not locked for debugging
36,407,008 UART: [kat] SHA2-256
36,586,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,597,703 UART: [kat] ++
36,598,248 UART: [kat] sha1
36,609,304 UART: [kat] SHA2-256
36,612,325 UART: [kat] SHA2-384
36,618,583 UART: [kat] SHA2-512-ACC
36,621,523 UART: [kat] ECC-384
39,082,518 UART: [kat] HMAC-384Kdf
39,105,236 UART: [kat] LMS
39,634,692 UART: [kat] --
39,641,328 UART: [update-reset] ++
43,077,448 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,080,631 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
43,463,002 >>> mbox cmd response: success
43,463,472 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,463,910 UART: [update-reset] Copying MAN_2 To MAN_1
43,486,082 UART: [update-reset Success] --
43,490,701 UART: [state] Locking Datavault
43,494,117 UART: [state] Locking PCR0, PCR1 and PCR31
43,495,816 UART: [state] Locking ICCM
43,498,083 UART: [exit] Launching FMC @ 0x40000130
43,506,490 UART:
43,506,724 UART: Running Caliptra FMC ...
43,507,849 UART:
43,508,011 UART: [state] CFI Enabled
43,596,303 UART: [art] Extend RT PCRs Done
43,597,497 UART: [art] Lock RT PCRs Done
43,599,224 UART: [art] Populate DV Done
43,604,418 UART: [fht] FMC Alias Private Key: 7
43,606,059 UART: [art] Derive CDI
43,606,880 UART: [art] Store in in slot 0x4
43,664,976 UART: [art] Derive Key Pair
43,666,095 UART: [art] Store priv key in slot 0x5
46,128,716 UART: [art] Derive Key Pair - Done
46,141,929 UART: [art] Signing Cert with AUTHO
46,143,228 UART: RITY.KEYID = 7
47,854,206 UART: [art] Erasing AUTHORITY.KEYID = 7
47,855,722 UART: [art] PUB.X = 9D5018153CC03FB57F2E8356212784587A660E690C4FAEDBE3932C3474E6BF4E785DDFC790DA97DBE82EC4186476A9E0
47,862,987 UART: [art] PUB.Y = B010D1D14B74BF8B97DCEB06805FDFDF009FE4C3E132625D031CE4BA16B71F46C30BE1A1C408FC420352B57BCE00D3CF
47,870,265 UART: [art] SIG.R = C8F16438965D480BB5187B7EBDB7768BCFD7C111C2960C005646C27F884579F47266A6D733B3432FCEB4F88495D0916A
47,877,624 UART: [art] SIG.S = C85BD367FB77B7BAC2583FAC5AC883F0362E1F41AAF8CF573AF29D1AAFDFF4CDAAAE2686E2B51E9D76D767C3BCC8A60B
48,856,801 UART: Caliptra RT
48,857,491 UART: [state] CFI Enabled
49,192,234 UART: [rt] RT listening for mailbox commands...
49,224,135 UART: [rt]cmd =0x41545348, len=116
49,243,873 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,360,100 ready_for_fw is high
3,360,713 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,055,587 >>> mbox cmd response: success
18,343,614 UART:
18,344,022 UART: Running Caliptra FMC ...
18,345,157 UART:
18,345,324 UART: [state] CFI Enabled
18,409,866 UART: [fht] FMC Alias Private Key: 7
20,174,332 UART: [art] Extend RT PCRs Done
20,175,551 UART: [art] Lock RT PCRs Done
20,177,393 UART: [art] Populate DV Done
20,182,760 UART: [fht] FMC Alias Private Key: 7
20,184,322 UART: [art] Derive CDI
20,185,146 UART: [art] Store in in slot 0x4
20,242,411 UART: [art] Derive Key Pair
20,243,456 UART: [art] Store priv key in slot 0x5
22,706,530 UART: [art] Derive Key Pair - Done
22,719,377 UART: [art] Signing Cert with AUTHO
22,720,689 UART: RITY.KEYID = 7
24,432,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,727 UART: [art] PUB.X = 33BCE1A0F6DD7CB4145786600F6BF1ADF3CCE827DD1AFC2716D776ED11024E5895BC275AAB15B0AF3DA92A10C23CA6AE
24,441,016 UART: [art] PUB.Y = D19B83B4C8372B91F89EA05EEA8A54E703ACC0049745BACBBFA260C6E2954FCDFA610990F9B31E843E4B3873BFF73715
24,448,289 UART: [art] SIG.R = AB830F6DE9708349494C59338BD55C53B49025C6B2877C52726FCAC3BA187C4042000FE630259CF0A0A4F9874CF89AF7
24,455,683 UART: [art] SIG.S = 0E7DBEE53AC10327A71A2A4568BF6981FC7CE86060588D533B0C51D724AA6B011175D9158BE9E8E934C50799434F0FB1
25,434,364 UART: Caliptra RT
25,435,063 UART: [state] CFI Enabled
25,600,458 UART: [rt] RT listening for mailbox commands...
29,629,052 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,784,803 UART: [rt]cmd =0x41544d4e, len=14344
33,780,806 >>> mbox cmd response data (8 bytes)
33,781,384 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,812,012 UART: [rt]cmd =0x41545348, len=116
33,831,051 >>> mbox cmd response data (12 bytes)
35,884,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
43,015,503 >>> mbox cmd response: success
43,016,085 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,048,624 UART:
43,048,924 UART: Running Caliptra FMC ...
43,050,046 UART:
43,050,212 UART: [state] CFI Enabled
43,144,045 UART: [art] Extend RT PCRs Done
43,145,241 UART: [art] Lock RT PCRs Done
43,146,812 UART: [art] Populate DV Done
43,152,280 UART: [fht] FMC Alias Private Key: 7
43,154,037 UART: [art] Derive CDI
43,154,857 UART: [art] Store in in slot 0x4
43,212,794 UART: [art] Derive Key Pair
43,213,831 UART: [art] Store priv key in slot 0x5
45,677,000 UART: [art] Derive Key Pair - Done
45,689,888 UART: [art] Signing Cert with AUTHO
45,691,192 UART: RITY.KEYID = 7
47,402,363 UART: [art] Erasing AUTHORITY.KEYID = 7
47,403,878 UART: [art] PUB.X = 0A2FF4A58B60417BDDF08E2A676333105CD9CC936F6AD099FF80C18563C534E64B19D77774C7AB1E973A41D753F0D586
47,411,157 UART: [art] PUB.Y = 1462DF4B8F07ADB0788072CD876705A7031C5319EA112D3DC5AE006A3731F14A1572F6DE3BB9381E4FCD1D8018561C4F
47,418,392 UART: [art] SIG.R = 11BDBC2138747D4DB03615CC78FDF313CDFA3A6B9C240EFF40583847A2569B7B46CB695B2C4CE54DF8987776C499650B
47,425,784 UART: [art] SIG.S = C96E4246A0E8F7526E401B572D32CEFDDCCF5C80E95A44E99C63008DF5EA10F9C14F1FDB9E3F5501C396E187B6993C27
48,404,788 UART: Caliptra RT
48,405,481 UART: [state] CFI Enabled
48,742,028 UART: [rt] RT listening for mailbox commands...
48,774,032 UART: [rt]cmd =0x41545348, len=116
48,793,584 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
193,032 UART:
193,407 UART: Running Caliptra ROM ...
194,540 UART:
604,325 UART: [state] CFI Enabled
619,809 UART: [state] LifecycleState = Unprovisioned
621,694 UART: [state] DebugLocked = No
624,573 UART: [state] WD Timer not started. Device not locked for debugging
628,900 UART: [kat] SHA2-256
808,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,597 UART: [kat] ++
820,051 UART: [kat] sha1
830,853 UART: [kat] SHA2-256
833,940 UART: [kat] SHA2-384
840,287 UART: [kat] SHA2-512-ACC
843,219 UART: [kat] ECC-384
3,282,846 UART: [kat] HMAC-384Kdf
3,295,626 UART: [kat] LMS
3,825,073 UART: [kat] --
3,829,992 UART: [cold-reset] ++
3,831,574 UART: [fht] FHT @ 0x50003400
3,842,690 UART: [idev] ++
3,843,256 UART: [idev] CDI.KEYID = 6
3,844,180 UART: [idev] SUBJECT.KEYID = 7
3,845,354 UART: [idev] UDS.KEYID = 0
3,846,283 ready_for_fw is high
3,846,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,194 UART: [idev] Erasing UDS.KEYID = 0
6,321,068 UART: [idev] Sha1 KeyId Algorithm
6,342,554 UART: [idev] --
6,345,546 UART: [ldev] ++
6,346,123 UART: [ldev] CDI.KEYID = 6
6,347,030 UART: [ldev] SUBJECT.KEYID = 5
6,348,262 UART: [ldev] AUTHORITY.KEYID = 7
6,349,493 UART: [ldev] FE.KEYID = 1
6,361,057 UART: [ldev] Erasing FE.KEYID = 1
8,836,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,353 UART: [ldev] --
10,626,861 UART: [fwproc] Wait for Commands...
10,629,002 UART: [fwproc] Recv command 0x46574c44
10,631,099 UART: [fwproc] Recv'd Img size: 114168 bytes
14,030,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,493,501 >>> mbox cmd response: success
14,497,778 UART: [afmc] ++
14,498,403 UART: [afmc] CDI.KEYID = 6
14,499,318 UART: [afmc] SUBJECT.KEYID = 7
14,500,428 UART: [afmc] AUTHORITY.KEYID = 5
16,994,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,925 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,561 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,178 UART: [afmc] --
18,794,745 UART: [cold-reset] --
18,797,956 UART: [state] Locking Datavault
18,800,987 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,685 UART: [state] Locking ICCM
18,803,810 UART: [exit] Launching FMC @ 0x40000130
18,812,226 UART:
18,812,502 UART: Running Caliptra FMC ...
18,813,613 UART:
18,813,778 UART: [state] CFI Enabled
18,822,096 UART: [fht] FMC Alias Private Key: 7
20,578,741 UART: [art] Extend RT PCRs Done
20,579,956 UART: [art] Lock RT PCRs Done
20,581,532 UART: [art] Populate DV Done
20,587,160 UART: [fht] FMC Alias Private Key: 7
20,588,763 UART: [art] Derive CDI
20,589,584 UART: [art] Store in in slot 0x4
20,632,068 UART: [art] Derive Key Pair
20,633,067 UART: [art] Store priv key in slot 0x5
23,059,855 UART: [art] Derive Key Pair - Done
23,072,916 UART: [art] Signing Cert with AUTHO
23,074,218 UART: RITY.KEYID = 7
24,780,054 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,562 UART: [art] PUB.X = 3AAD3874F7FD1B6356EDB68A53E0767D4F59D168DD13371E21CB106A4BD9DBFCC8113D4EAF9A8EC7FF372F101038721F
24,788,820 UART: [art] PUB.Y = 79DF670C813FA7A23037E959FD44A57ECA3BE65B5110670422C5FA4ABBA87AD9DC97F0D01F27ED2D0EC6AA8A17F7B5CA
24,796,111 UART: [art] SIG.R = 2196FC2E830A826139F3EA539E46AFB4188D6872581CD6E8E15274C4E5764EFCB71508161D7314FAF1BB4988C5F1E636
24,803,467 UART: [art] SIG.S = FFD5916822952CB34E0B49D2180AC34A64951F83578E392015D422F5EA83F4B05722876ADAF128282A58CACC3B64A3B8
25,782,639 UART: Caliptra RT
25,783,349 UART: [state] CFI Enabled
25,899,973 UART: [rt] RT listening for mailbox commands...
29,926,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,082,464 UART: [rt]cmd =0x41544d4e, len=14344
34,077,976 >>> mbox cmd response data (8 bytes)
34,078,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,109,350 UART: [rt]cmd =0x41545348, len=116
34,129,028 >>> mbox cmd response data (12 bytes)
36,181,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
36,325,947 UART:
36,326,308 UART: Running Caliptra ROM ...
36,327,357 UART:
36,327,516 UART: [state] CFI Enabled
36,341,115 UART: [state] LifecycleState = Unprovisioned
36,343,002 UART: [state] DebugLocked = No
36,344,399 UART: [state] WD Timer not started. Device not locked for debugging
36,348,954 UART: [kat] SHA2-256
36,528,139 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,539,721 UART: [kat] ++
36,540,257 UART: [kat] sha1
36,551,691 UART: [kat] SHA2-256
36,554,709 UART: [kat] SHA2-384
36,561,356 UART: [kat] SHA2-512-ACC
36,564,303 UART: [kat] ECC-384
39,005,601 UART: [kat] HMAC-384Kdf
39,017,783 UART: [kat] LMS
39,547,280 UART: [kat] --
39,552,237 UART: [update-reset] ++
42,987,059 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,990,503 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
43,372,867 >>> mbox cmd response: success
43,373,285 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,374,742 UART: [update-reset] Copying MAN_2 To MAN_1
43,397,078 UART: [update-reset Success] --
43,401,315 UART: [state] Locking Datavault
43,404,570 UART: [state] Locking PCR0, PCR1 and PCR31
43,406,270 UART: [state] Locking ICCM
43,408,288 UART: [exit] Launching FMC @ 0x40000130
43,416,750 UART:
43,416,989 UART: Running Caliptra FMC ...
43,418,096 UART:
43,418,257 UART: [state] CFI Enabled
43,461,734 UART: [art] Extend RT PCRs Done
43,462,910 UART: [art] Lock RT PCRs Done
43,464,307 UART: [art] Populate DV Done
43,469,710 UART: [fht] FMC Alias Private Key: 7
43,471,244 UART: [art] Derive CDI
43,472,057 UART: [art] Store in in slot 0x4
43,514,542 UART: [art] Derive Key Pair
43,515,664 UART: [art] Store priv key in slot 0x5
45,942,192 UART: [art] Derive Key Pair - Done
45,955,409 UART: [art] Signing Cert with AUTHO
45,956,706 UART: RITY.KEYID = 7
47,662,684 UART: [art] Erasing AUTHORITY.KEYID = 7
47,664,213 UART: [art] PUB.X = 3AC6F8C7062CD56D7ADEF6606A294185C747BFA8861E0A856B42D02C7A5FA3575F3B77FC28A908F3D3F3F0AFD61E4552
47,671,497 UART: [art] PUB.Y = 6CC8B2186FBA937872033BA865D17A6D409E9DB5B56A828722ACD4CDA6D8BD0901E3F66DBE78452B7ACAC223530A1E86
47,678,743 UART: [art] SIG.R = 11A960C0643148208EDEF27C92C6876BB5DBEA5F12DC7523589E3C3A2EF247894741D4ABC5A6ED873BC45B6F03F8A53A
47,686,141 UART: [art] SIG.S = 3FA8950F2BDC78678261B2DE14A34974260E67EBC7351D009D1CA3FB2FAE5DCE8EF9A4FABF5E4DC934C13998A2540B1F
48,665,548 UART: Caliptra RT
48,666,256 UART: [state] CFI Enabled
48,952,297 UART: [rt] RT listening for mailbox commands...
48,984,236 UART: [rt]cmd =0x41545348, len=116
49,004,269 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,913 writing to cptra_bootfsm_go
3,696,380 ready_for_fw is high
3,696,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,277,854 >>> mbox cmd response: success
18,525,063 UART:
18,525,458 UART: Running Caliptra FMC ...
18,526,646 UART:
18,526,814 UART: [state] CFI Enabled
18,534,661 UART: [fht] FMC Alias Private Key: 7
20,291,937 UART: [art] Extend RT PCRs Done
20,293,167 UART: [art] Lock RT PCRs Done
20,295,069 UART: [art] Populate DV Done
20,300,493 UART: [fht] FMC Alias Private Key: 7
20,302,087 UART: [art] Derive CDI
20,302,828 UART: [art] Store in in slot 0x4
20,345,475 UART: [art] Derive Key Pair
20,346,501 UART: [art] Store priv key in slot 0x5
22,773,328 UART: [art] Derive Key Pair - Done
22,786,330 UART: [art] Signing Cert with AUTHO
22,787,637 UART: RITY.KEYID = 7
24,493,048 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,551 UART: [art] PUB.X = 8BC14B05600350735EBC35DB545D4D26763F7CBF0BA761F3E7B191889875FFD72974D241442BC34BC265C274A92C7AE6
24,501,806 UART: [art] PUB.Y = 3853F7D11ECE9B396E16B14E741AF854CEEE19A6CF31690F08C255B7AFFFCA09B5D4CA219FDBCE39C95ECE7559B7C70B
24,509,124 UART: [art] SIG.R = 25E677B0EBE299C8B659B557F05A332C6523EEA043AA819E24F7B1D07891621FD3579E104B4F69E71EDBC4A3EB795FA9
24,516,520 UART: [art] SIG.S = E32294FA47FBD2ECC1CBC8347889C64CF58CC0BA4BBD68BD9924B826B952287CF3E18A42939ABAC0CD9EBF3780CA8D0F
25,494,921 UART: Caliptra RT
25,495,624 UART: [state] CFI Enabled
25,612,532 UART: [rt] RT listening for mailbox commands...
29,642,347 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,798,177 UART: [rt]cmd =0x41544d4e, len=14344
33,793,887 >>> mbox cmd response data (8 bytes)
33,794,467 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,825,123 UART: [rt]cmd =0x41545348, len=116
33,844,372 >>> mbox cmd response data (12 bytes)
35,896,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
42,929,699 >>> mbox cmd response: success
42,930,448 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,963,801 UART:
42,964,097 UART: Running Caliptra FMC ...
42,965,223 UART:
42,965,388 UART: [state] CFI Enabled
43,009,821 UART: [art] Extend RT PCRs Done
43,011,193 UART: [art] Lock RT PCRs Done
43,012,439 UART: [art] Populate DV Done
43,017,906 UART: [fht] FMC Alias Private Key: 7
43,019,559 UART: [art] Derive CDI
43,020,381 UART: [art] Store in in slot 0x4
43,062,932 UART: [art] Derive Key Pair
43,063,936 UART: [art] Store priv key in slot 0x5
45,490,926 UART: [art] Derive Key Pair - Done
45,503,883 UART: [art] Signing Cert with AUTHO
45,505,185 UART: RITY.KEYID = 7
47,210,730 UART: [art] Erasing AUTHORITY.KEYID = 7
47,212,236 UART: [art] PUB.X = E101DD9E56BBFA9DE119259E578F4FD129DD3A765989C780E91B5E997249910EE9A45D523CB98C2A6B1CCED6993A9744
47,219,483 UART: [art] PUB.Y = 2085145B1127C2C1D84F159C009013BF4A338CDD06A187C8DA95B16D527A236CFD6DFCAECF36D760F27693509F06ADD5
47,226,711 UART: [art] SIG.R = 4806BBA18A58CF6F6B5281D35482534AD65C217BF5129F9C51A94A9DA5BB7DE23DD1F574560140856BF4A1D1A1027964
47,234,109 UART: [art] SIG.S = 5759C484C66D03909ECE5A81E1DF857887FD94054963BA9E0B609BA3D558101100A5F0953334CBAFA4E1BC3A64E69E1D
48,213,239 UART: Caliptra RT
48,213,935 UART: [state] CFI Enabled
48,503,396 UART: [rt] RT listening for mailbox commands...
48,535,357 UART: [rt]cmd =0x41545348, len=116
48,554,532 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,182 UART:
192,537 UART: Running Caliptra ROM ...
193,730 UART:
193,882 UART: [state] CFI Enabled
264,825 UART: [state] LifecycleState = Unprovisioned
267,179 UART: [state] DebugLocked = No
269,994 UART: [state] WD Timer not started. Device not locked for debugging
275,259 UART: [kat] SHA2-256
465,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,870 UART: [kat] ++
476,365 UART: [kat] sha1
486,676 UART: [kat] SHA2-256
489,687 UART: [kat] SHA2-384
496,033 UART: [kat] SHA2-512-ACC
498,621 UART: [kat] ECC-384
2,948,368 UART: [kat] HMAC-384Kdf
2,971,408 UART: [kat] LMS
3,503,150 UART: [kat] --
3,508,064 UART: [cold-reset] ++
3,508,936 UART: [fht] FHT @ 0x50003400
3,520,409 UART: [idev] ++
3,521,040 UART: [idev] CDI.KEYID = 6
3,521,995 UART: [idev] SUBJECT.KEYID = 7
3,523,237 UART: [idev] UDS.KEYID = 0
3,524,155 ready_for_fw is high
3,524,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,418 UART: [idev] Erasing UDS.KEYID = 0
6,030,040 UART: [idev] Sha1 KeyId Algorithm
6,052,124 UART: [idev] --
6,057,011 UART: [ldev] ++
6,057,755 UART: [ldev] CDI.KEYID = 6
6,058,651 UART: [ldev] SUBJECT.KEYID = 5
6,059,680 UART: [ldev] AUTHORITY.KEYID = 7
6,061,021 UART: [ldev] FE.KEYID = 1
6,099,947 UART: [ldev] Erasing FE.KEYID = 1
8,606,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,056 UART: [ldev] --
10,413,981 UART: [fwproc] Wait for Commands...
10,416,346 UART: [fwproc] Recv command 0x46574c44
10,418,656 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,603,456 >>> mbox cmd response: success
14,608,071 UART: [afmc] ++
14,608,804 UART: [afmc] CDI.KEYID = 6
14,610,000 UART: [afmc] SUBJECT.KEYID = 7
14,611,457 UART: [afmc] AUTHORITY.KEYID = 5
17,149,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,306 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,075 UART: [afmc] --
18,945,552 UART: [cold-reset] --
18,949,599 UART: [state] Locking Datavault
18,955,194 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,358 UART: [state] Locking ICCM
18,959,356 UART: [exit] Launching FMC @ 0x40000130
18,968,051 UART:
18,968,298 UART: Running Caliptra FMC ...
18,969,402 UART:
18,969,558 UART: [state] CFI Enabled
19,029,054 UART: [fht] FMC Alias Private Key: 7
20,793,084 UART: [art] Extend RT PCRs Done
20,794,309 UART: [art] Lock RT PCRs Done
20,796,315 UART: [art] Populate DV Done
20,801,801 UART: [fht] FMC Alias Private Key: 7
20,803,503 UART: [art] Derive CDI
20,804,321 UART: [art] Store in in slot 0x4
20,861,804 UART: [art] Derive Key Pair
20,862,840 UART: [art] Store priv key in slot 0x5
23,325,064 UART: [art] Derive Key Pair - Done
23,338,225 UART: [art] Signing Cert with AUTHO
23,339,560 UART: RITY.KEYID = 7
25,050,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,131 UART: [art] PUB.X = 28EC787EDF1671EC38A4DC435FC39AF52376491CD4ED709E756CC680FDDB675FB318379C10F3A947C22A96E40A05C71E
25,059,400 UART: [art] PUB.Y = 1F494246887B69AC700B5CB5292B2C98E7A7585BDFE045EDAD4C786A8877D65928068F0ADCAEC137C5D2617652077A31
25,066,615 UART: [art] SIG.R = EC6CA496E2784E07B6F45562164E46ECEAA82B32427A273860925EBD00F5A013BC22F5507942855688F4260D47CAA87D
25,073,982 UART: [art] SIG.S = E274FAAF98A0518CDA33E53927A95AE4D88F2843079B78219EFF9106565AC06268D8BE9189AA6FB8A28C0056F2BA35E8
26,052,440 UART: Caliptra RT
26,053,134 UART: [state] CFI Enabled
26,217,176 UART: [rt] RT listening for mailbox commands...
30,247,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,402,898 UART: [rt]cmd =0x41544d4e, len=14344
34,398,547 >>> mbox cmd response data (8 bytes)
34,399,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,429,874 UART: [rt]cmd =0x41545348, len=116
34,448,662 >>> mbox cmd response data (12 bytes)
36,509,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
36,654,427 UART:
36,654,821 UART: Running Caliptra ROM ...
36,655,879 UART:
36,656,034 UART: [state] CFI Enabled
36,713,607 UART: [state] LifecycleState = Unprovisioned
36,715,657 UART: [state] DebugLocked = No
36,718,367 UART: [state] WD Timer not started. Device not locked for debugging
36,722,629 UART: [kat] SHA2-256
36,912,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,923,249 UART: [kat] ++
36,923,705 UART: [kat] sha1
36,935,733 UART: [kat] SHA2-256
36,938,738 UART: [kat] SHA2-384
36,945,448 UART: [kat] SHA2-512-ACC
36,948,022 UART: [kat] ECC-384
39,398,408 UART: [kat] HMAC-384Kdf
39,420,756 UART: [kat] LMS
39,952,337 UART: [kat] --
39,956,826 UART: [update-reset] ++
43,419,677 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,422,320 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
44,028,332 >>> mbox cmd response: success
44,033,039 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,033,641 UART: [update-reset] Copying MAN_2 To MAN_1
44,066,243 UART: [update-reset Success] --
44,070,202 UART: [state] Locking Datavault
44,075,099 UART: [state] Locking PCR0, PCR1 and PCR31
44,077,253 UART: [state] Locking ICCM
44,080,096 UART: [exit] Launching FMC @ 0x40000130
44,088,773 UART:
44,089,018 UART: Running Caliptra FMC ...
44,090,054 UART:
44,090,227 UART: [state] CFI Enabled
44,189,383 UART: [art] Extend RT PCRs Done
44,190,577 UART: [art] Lock RT PCRs Done
44,191,964 UART: [art] Populate DV Done
44,197,313 UART: [fht] FMC Alias Private Key: 7
44,199,069 UART: [art] Derive CDI
44,199,887 UART: [art] Store in in slot 0x4
44,258,785 UART: [art] Derive Key Pair
44,260,026 UART: [art] Store priv key in slot 0x5
46,723,147 UART: [art] Derive Key Pair - Done
46,736,041 UART: [art] Signing Cert with AUTHO
46,737,356 UART: RITY.KEYID = 7
48,448,927 UART: [art] Erasing AUTHORITY.KEYID = 7
48,450,433 UART: [art] PUB.X = E23D0E887D403EC104279B534CF23182645A7720B2B8AECD0DB26BFFA0CE07C746FC727851AC2AA5C865EAD557A33EE7
48,457,719 UART: [art] PUB.Y = 9DBDE6043DE856829AE61A17584DF5F2F772CB140612FE9C4CDB7A770E2362D4795B9F6CB74167CC9BB35B303B6275C6
48,464,948 UART: [art] SIG.R = 5D72640EB89080C512AC00345BF5A60A993BE881FDD206F1FBDC4AFA596D886EF896F213ECDCCC8E52175F20D9CA05F9
48,472,396 UART: [art] SIG.S = 46178D657982249E8C882474DC76341AD0FB9906BD53847AEA04A5E342065DEF5869BCFF46CD6ECAC9D9FE7B64888730
49,451,402 UART: Caliptra RT
49,452,092 UART: [state] CFI Enabled
49,784,000 UART: [rt] RT listening for mailbox commands...
49,815,829 UART: [rt]cmd =0x41545348, len=116
49,835,450 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,430,242 ready_for_fw is high
3,430,953 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,726,681 >>> mbox cmd response: success
19,016,851 UART:
19,017,264 UART: Running Caliptra FMC ...
19,018,382 UART:
19,018,541 UART: [state] CFI Enabled
19,088,711 UART: [fht] FMC Alias Private Key: 7
20,853,045 UART: [art] Extend RT PCRs Done
20,854,266 UART: [art] Lock RT PCRs Done
20,855,775 UART: [art] Populate DV Done
20,861,301 UART: [fht] FMC Alias Private Key: 7
20,862,952 UART: [art] Derive CDI
20,863,769 UART: [art] Store in in slot 0x4
20,921,894 UART: [art] Derive Key Pair
20,922,937 UART: [art] Store priv key in slot 0x5
23,385,541 UART: [art] Derive Key Pair - Done
23,398,624 UART: [art] Signing Cert with AUTHO
23,399,968 UART: RITY.KEYID = 7
25,112,020 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,536 UART: [art] PUB.X = D7F3A21066439654EE986B26520159DCCEA67AFD8090B1BD76E763A9B3158D6D51B2B60F0F10C3175E93481617F77A53
25,120,781 UART: [art] PUB.Y = 4AFACBC1A43CF416A158E18780F3FEE2F0EF7E82CDAB6FFB6437DE5D39965FD88381427F32626CFA95779AEAF58B193E
25,128,055 UART: [art] SIG.R = 053000B9FEBE45DFEDC1F42E332E219C406E844D62EA13A237A82286B6E64B4E59E3833E5E2528AA49DC557B737E9C9C
25,135,439 UART: [art] SIG.S = 9C0BFBA0D77462F86691088DCDACDC104B01DFF22B4A130160AD2763F78F9DD88229F596C2C15F43F393302AD987149F
26,114,283 UART: Caliptra RT
26,115,020 UART: [state] CFI Enabled
26,280,573 UART: [rt] RT listening for mailbox commands...
30,313,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,469,083 UART: [rt]cmd =0x41544d4e, len=14344
34,464,735 >>> mbox cmd response data (8 bytes)
34,465,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,495,907 UART: [rt]cmd =0x41545348, len=116
34,515,514 >>> mbox cmd response data (12 bytes)
36,570,843 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
44,383,036 >>> mbox cmd response: success
44,388,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,416,199 UART:
44,416,503 UART: Running Caliptra FMC ...
44,417,557 UART:
44,417,703 UART: [state] CFI Enabled
44,513,259 UART: [art] Extend RT PCRs Done
44,514,468 UART: [art] Lock RT PCRs Done
44,515,798 UART: [art] Populate DV Done
44,521,158 UART: [fht] FMC Alias Private Key: 7
44,522,857 UART: [art] Derive CDI
44,523,594 UART: [art] Store in in slot 0x4
44,582,499 UART: [art] Derive Key Pair
44,583,516 UART: [art] Store priv key in slot 0x5
47,045,547 UART: [art] Derive Key Pair - Done
47,058,502 UART: [art] Signing Cert with AUTHO
47,059,819 UART: RITY.KEYID = 7
48,771,313 UART: [art] Erasing AUTHORITY.KEYID = 7
48,772,832 UART: [art] PUB.X = 2E754C13EEE37764283644EA50EE7374C90EE57E0D229D8994AB1C5B381223768E37820DE45BD44A2365CCC0ACFA7E00
48,780,082 UART: [art] PUB.Y = 587FADA46AA55263E598EE872FD61C3BD8581DA0E719862768859E85F520486A336C8C1ED30F2B74992D3BA7368D3E87
48,787,313 UART: [art] SIG.R = C62A8FCB4ADB5F9EC0F891F4D867D616287450529B78CE60A1067CCB456AA27A3AA84EF308AD0CF0742B7D2EB1B887C9
48,794,706 UART: [art] SIG.S = C45144B626A4EBCD2684F18A85D3AFF25B27E0AD96816073B7D2D2A6BAB6850E11C566EEBE8DC33F804C4FB938BFC304
49,773,692 UART: Caliptra RT
49,774,378 UART: [state] CFI Enabled
50,110,190 UART: [rt] RT listening for mailbox commands...
50,142,183 UART: [rt]cmd =0x41545348, len=116
50,161,337 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,773 writing to cptra_bootfsm_go
192,910 UART:
193,275 UART: Running Caliptra ROM ...
194,386 UART:
604,094 UART: [state] CFI Enabled
616,905 UART: [state] LifecycleState = Unprovisioned
619,265 UART: [state] DebugLocked = No
621,781 UART: [state] WD Timer not started. Device not locked for debugging
626,872 UART: [kat] SHA2-256
816,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,544 UART: [kat] ++
828,072 UART: [kat] sha1
839,660 UART: [kat] SHA2-256
842,667 UART: [kat] SHA2-384
848,585 UART: [kat] SHA2-512-ACC
851,186 UART: [kat] ECC-384
3,292,765 UART: [kat] HMAC-384Kdf
3,305,942 UART: [kat] LMS
3,837,764 UART: [kat] --
3,843,127 UART: [cold-reset] ++
3,844,208 UART: [fht] FHT @ 0x50003400
3,855,720 UART: [idev] ++
3,856,398 UART: [idev] CDI.KEYID = 6
3,857,354 UART: [idev] SUBJECT.KEYID = 7
3,858,526 UART: [idev] UDS.KEYID = 0
3,859,631 ready_for_fw is high
3,859,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,084 UART: [idev] Erasing UDS.KEYID = 0
6,337,520 UART: [idev] Sha1 KeyId Algorithm
6,358,856 UART: [idev] --
6,364,682 UART: [ldev] ++
6,365,377 UART: [ldev] CDI.KEYID = 6
6,366,292 UART: [ldev] SUBJECT.KEYID = 5
6,367,453 UART: [ldev] AUTHORITY.KEYID = 7
6,368,679 UART: [ldev] FE.KEYID = 1
6,379,920 UART: [ldev] Erasing FE.KEYID = 1
8,855,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,323 UART: [ldev] --
10,647,342 UART: [fwproc] Wait for Commands...
10,649,278 UART: [fwproc] Recv command 0x46574c44
10,651,631 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,839,606 >>> mbox cmd response: success
14,843,418 UART: [afmc] ++
14,844,148 UART: [afmc] CDI.KEYID = 6
14,845,331 UART: [afmc] SUBJECT.KEYID = 7
14,846,814 UART: [afmc] AUTHORITY.KEYID = 5
17,351,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,975 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,157 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,167 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,515 UART: [afmc] --
19,149,904 UART: [cold-reset] --
19,153,500 UART: [state] Locking Datavault
19,160,913 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,134 UART: [state] Locking ICCM
19,165,189 UART: [exit] Launching FMC @ 0x40000130
19,173,861 UART:
19,174,094 UART: Running Caliptra FMC ...
19,175,202 UART:
19,175,367 UART: [state] CFI Enabled
19,183,742 UART: [fht] FMC Alias Private Key: 7
20,940,006 UART: [art] Extend RT PCRs Done
20,941,229 UART: [art] Lock RT PCRs Done
20,943,094 UART: [art] Populate DV Done
20,948,504 UART: [fht] FMC Alias Private Key: 7
20,950,146 UART: [art] Derive CDI
20,950,884 UART: [art] Store in in slot 0x4
20,993,793 UART: [art] Derive Key Pair
20,994,835 UART: [art] Store priv key in slot 0x5
23,421,247 UART: [art] Derive Key Pair - Done
23,434,097 UART: [art] Signing Cert with AUTHO
23,435,398 UART: RITY.KEYID = 7
25,140,356 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,872 UART: [art] PUB.X = E93F204259E6C92095B60180001CB0D9277C655768D3C805B34DDA1D3F226E233945748456FAE7905DE744A9AFE515CB
25,149,063 UART: [art] PUB.Y = A7A1D2AF25F50C3A6F5E60F5B764A0FA29F2D32F77753BC49B1FA1A15D5457BA02311EC8D0A5F46A21D631DEE176B519
25,156,360 UART: [art] SIG.R = C01077630EDFB7EE7D5EB9C2CC7E8F97D00B2CC7559D73443084D6F36550366A6B9EF969E804FF375077AA24F543256B
25,163,755 UART: [art] SIG.S = 9B261B964827D10981AFB8B4919AF7CA828E2123A2915893A1139D9E9139A99D21E39B5B8DA2688BFD6784A2FD053261
26,142,756 UART: Caliptra RT
26,143,448 UART: [state] CFI Enabled
26,260,092 UART: [rt] RT listening for mailbox commands...
30,292,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,447,848 UART: [rt]cmd =0x41544d4e, len=14344
34,443,409 >>> mbox cmd response data (8 bytes)
34,443,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,474,657 UART: [rt]cmd =0x41545348, len=116
34,494,541 >>> mbox cmd response data (12 bytes)
36,548,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
36,693,281 UART:
36,693,678 UART: Running Caliptra ROM ...
36,694,726 UART:
36,694,889 UART: [state] CFI Enabled
36,706,898 UART: [state] LifecycleState = Unprovisioned
36,708,729 UART: [state] DebugLocked = No
36,710,761 UART: [state] WD Timer not started. Device not locked for debugging
36,714,578 UART: [kat] SHA2-256
36,904,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,915,252 UART: [kat] ++
36,915,776 UART: [kat] sha1
36,928,293 UART: [kat] SHA2-256
36,931,327 UART: [kat] SHA2-384
36,938,504 UART: [kat] SHA2-512-ACC
36,941,067 UART: [kat] ECC-384
39,385,645 UART: [kat] HMAC-384Kdf
39,397,611 UART: [kat] LMS
39,929,217 UART: [kat] --
39,935,273 UART: [update-reset] ++
43,384,499 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,387,501 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
43,994,036 >>> mbox cmd response: success
43,998,694 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,999,298 UART: [update-reset] Copying MAN_2 To MAN_1
44,033,078 UART: [update-reset Success] --
44,038,226 UART: [state] Locking Datavault
44,040,306 UART: [state] Locking PCR0, PCR1 and PCR31
44,042,509 UART: [state] Locking ICCM
44,045,208 UART: [exit] Launching FMC @ 0x40000130
44,053,892 UART:
44,054,143 UART: Running Caliptra FMC ...
44,055,252 UART:
44,055,420 UART: [state] CFI Enabled
44,099,370 UART: [art] Extend RT PCRs Done
44,100,557 UART: [art] Lock RT PCRs Done
44,102,261 UART: [art] Populate DV Done
44,107,777 UART: [fht] FMC Alias Private Key: 7
44,109,316 UART: [art] Derive CDI
44,110,149 UART: [art] Store in in slot 0x4
44,152,798 UART: [art] Derive Key Pair
44,153,974 UART: [art] Store priv key in slot 0x5
46,580,769 UART: [art] Derive Key Pair - Done
46,593,937 UART: [art] Signing Cert with AUTHO
46,595,312 UART: RITY.KEYID = 7
48,300,742 UART: [art] Erasing AUTHORITY.KEYID = 7
48,302,258 UART: [art] PUB.X = 8807EC5F94CA79A9E30EEE1D4FA8A070D8A5A18ECC780A1E8F734B60D40D27A563D7F5D4D90A871C299213D7B9935A13
48,309,572 UART: [art] PUB.Y = 3F8F8557C56A3B33F9A3971A16F3F103834934C7B26BAA4C70816B8C27F4FF21D094C10F3A780E8CBBB5724DC2D3C9E1
48,316,812 UART: [art] SIG.R = 2FB4EBEA9EB03E9643BA9B81D8818AE405630C1F8DCCE84952854DBF5327186BC5E8B2F03FF74E80FB34ED8EF93B031B
48,324,204 UART: [art] SIG.S = 98E4A7A386441204015B4F8652710FB04FB0D085D5F0D00C5C7EDF46CD69510585BAAC2778CDBEF50A0FBFE577467A25
49,302,967 UART: Caliptra RT
49,303,677 UART: [state] CFI Enabled
49,591,683 UART: [rt] RT listening for mailbox commands...
49,623,679 UART: [rt]cmd =0x41545348, len=116
49,644,574 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
3,756,309 ready_for_fw is high
3,756,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,943,620 >>> mbox cmd response: success
19,194,188 UART:
19,194,581 UART: Running Caliptra FMC ...
19,195,693 UART:
19,195,847 UART: [state] CFI Enabled
19,203,643 UART: [fht] FMC Alias Private Key: 7
20,960,441 UART: [art] Extend RT PCRs Done
20,961,668 UART: [art] Lock RT PCRs Done
20,963,215 UART: [art] Populate DV Done
20,968,404 UART: [fht] FMC Alias Private Key: 7
20,969,902 UART: [art] Derive CDI
20,970,691 UART: [art] Store in in slot 0x4
21,013,188 UART: [art] Derive Key Pair
21,014,235 UART: [art] Store priv key in slot 0x5
23,441,063 UART: [art] Derive Key Pair - Done
23,454,060 UART: [art] Signing Cert with AUTHO
23,455,364 UART: RITY.KEYID = 7
25,161,033 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,546 UART: [art] PUB.X = EF3C804ECFD2D11AC7BC981EC709EEE293108DF914EBB95492FFE6B47946FE1A9888951B83039EE1906FDE547D03C32F
25,169,844 UART: [art] PUB.Y = 6886355529E5024C7327C97EC8C66551945A85434214EFF05D730F0B67C64BC1DC2A22D0551C209A805BC768ED3C0CE7
25,177,084 UART: [art] SIG.R = 05B2F7CAE744A90BA5C49F7BEEB41118161117391736A81D64F1EDAE44162383B9D2768E01BC25100B1FD9E8C9AB654B
25,184,433 UART: [art] SIG.S = B8996BB791CE7415D2A0251525ECD2B3B4D2F264C8C2AD13EDDC945A1B056C56881FA37753DFF2D9BFFD0710939CE29F
26,163,211 UART: Caliptra RT
26,163,900 UART: [state] CFI Enabled
26,281,403 UART: [rt] RT listening for mailbox commands...
30,307,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,463,035 UART: [rt]cmd =0x41544d4e, len=14344
34,457,893 >>> mbox cmd response data (8 bytes)
34,458,541 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,489,391 UART: [rt]cmd =0x41545348, len=116
34,508,394 >>> mbox cmd response data (12 bytes)
36,566,163 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
44,288,891 >>> mbox cmd response: success
44,293,881 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,324,320 UART:
44,324,620 UART: Running Caliptra FMC ...
44,325,741 UART:
44,325,908 UART: [state] CFI Enabled
44,369,872 UART: [art] Extend RT PCRs Done
44,371,063 UART: [art] Lock RT PCRs Done
44,372,419 UART: [art] Populate DV Done
44,377,717 UART: [fht] FMC Alias Private Key: 7
44,379,250 UART: [art] Derive CDI
44,380,062 UART: [art] Store in in slot 0x4
44,422,442 UART: [art] Derive Key Pair
44,423,442 UART: [art] Store priv key in slot 0x5
46,850,347 UART: [art] Derive Key Pair - Done
46,863,783 UART: [art] Signing Cert with AUTHO
46,865,086 UART: RITY.KEYID = 7
48,570,759 UART: [art] Erasing AUTHORITY.KEYID = 7
48,572,291 UART: [art] PUB.X = 23AA4C970E315E403AACE972FCF8882872C4276046E4D4016BCB8DD00FF7B19A15E4071549505A6FBD8B9B783B7FDE63
48,579,541 UART: [art] PUB.Y = 24C7EE9C76DD8753EB2573E1A8E45975F4F1CE9A1538616B5961F5B12B7CCE6B85A42496B0E04626F8CBD7F955A15471
48,586,820 UART: [art] SIG.R = 1DCD6CB0C0BF11531581F93BCF61C9C635643D762D28EC0CEB42A6E64A3F95E5136FAE9601910BEEE26EC07A77BB5562
48,594,240 UART: [art] SIG.S = CA34D5373B8870FB8D1D2247DF882F40F0445B9A29A2834099BB1320CABF7FF0CDD77D2978FA5D8821CF1F82724115C7
49,572,961 UART: Caliptra RT
49,573,674 UART: [state] CFI Enabled
49,861,308 UART: [rt] RT listening for mailbox commands...
49,893,270 UART: [rt]cmd =0x41545348, len=116
49,912,450 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,886 UART: [state] LifecycleState = Unprovisioned
86,541 UART: [state] DebugLocked = No
87,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,783 UART: [kat] SHA2-256
882,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,829 UART: [kat] ++
886,981 UART: [kat] sha1
891,175 UART: [kat] SHA2-256
893,113 UART: [kat] SHA2-384
895,846 UART: [kat] SHA2-512-ACC
897,747 UART: [kat] ECC-384
903,294 UART: [kat] HMAC-384Kdf
908,094 UART: [kat] LMS
1,476,290 UART: [kat] --
1,477,315 UART: [cold-reset] ++
1,477,835 UART: [fht] Storing FHT @ 0x50003400
1,480,568 UART: [idev] ++
1,480,736 UART: [idev] CDI.KEYID = 6
1,481,096 UART: [idev] SUBJECT.KEYID = 7
1,481,520 UART: [idev] UDS.KEYID = 0
1,481,865 ready_for_fw is high
1,481,865 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,712 UART: [idev] Erasing UDS.KEYID = 0
1,506,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,006 UART: [idev] --
1,516,001 UART: [ldev] ++
1,516,169 UART: [ldev] CDI.KEYID = 6
1,516,532 UART: [ldev] SUBJECT.KEYID = 5
1,516,958 UART: [ldev] AUTHORITY.KEYID = 7
1,517,421 UART: [ldev] FE.KEYID = 1
1,522,945 UART: [ldev] Erasing FE.KEYID = 1
1,548,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,912 UART: [ldev] --
1,587,333 UART: [fwproc] Waiting for Commands...
1,588,084 UART: [fwproc] Received command 0x46574c44
1,588,875 UART: [fwproc] Received Image of size 114168 bytes
2,884,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,805 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,157 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,686 >>> mbox cmd response: success
3,077,872 UART: [afmc] ++
3,078,040 UART: [afmc] CDI.KEYID = 6
3,078,402 UART: [afmc] SUBJECT.KEYID = 7
3,078,827 UART: [afmc] AUTHORITY.KEYID = 5
3,113,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,253 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,943 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,720 UART: [afmc] --
3,156,846 UART: [cold-reset] --
3,157,724 UART: [state] Locking Datavault
3,158,765 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,369 UART: [state] Locking ICCM
3,159,843 UART: [exit] Launching FMC @ 0x40000130
3,165,172 UART:
3,165,188 UART: Running Caliptra FMC ...
3,165,596 UART:
3,165,650 UART: [state] CFI Enabled
3,175,853 UART: [fht] FMC Alias Private Key: 7
3,283,446 UART: [art] Extend RT PCRs Done
3,283,874 UART: [art] Lock RT PCRs Done
3,285,546 UART: [art] Populate DV Done
3,293,735 UART: [fht] FMC Alias Private Key: 7
3,294,689 UART: [art] Derive CDI
3,294,969 UART: [art] Store in in slot 0x4
3,380,848 UART: [art] Derive Key Pair
3,381,208 UART: [art] Store priv key in slot 0x5
3,394,384 UART: [art] Derive Key Pair - Done
3,409,341 UART: [art] Signing Cert with AUTHO
3,409,821 UART: RITY.KEYID = 7
3,424,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,546 UART: [art] PUB.X = BD6BFF4DFDBD053007B8CEEE98B0FA90207A075E531EDB6D276E67FE2FD7F924CEC8B924A603F44DC67FD96792C6729F
3,432,326 UART: [art] PUB.Y = 7ECBC8D785209DA3297DD7DF93174C3F8B514ED858D4A1BB852357105D7BC2B3946A295C85EA9C79A4AE385F3BC4AEC5
3,439,290 UART: [art] SIG.R = 69A03ED1CD381DFBE93B2640C37B7034DDFBF15DCF70757EB8B6EABE08D294708BE1B021281C8F8FD91880A70BBBB966
3,446,072 UART: [art] SIG.S = 2E643375D8AD380923F29B7810F99A676601A722BF47C46DD150B1ED244672E2F97F0CF99F97377DE880AF4AC76CBDEE
3,469,960 UART: Caliptra RT
3,470,213 UART: [state] CFI Enabled
3,579,455 UART: [rt] RT listening for mailbox commands...
3,580,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,117 UART: [rt]cmd =0x41544d4e, len=14344
4,013,174 >>> mbox cmd response data (8 bytes)
4,013,175 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,300 UART: [rt]cmd =0x41545348, len=116
4,064,113 >>> mbox cmd response data (12 bytes)
4,064,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,962 UART:
4,064,978 UART: Running Caliptra ROM ...
4,065,386 UART:
4,065,440 UART: [state] CFI Enabled
4,067,734 UART: [state] LifecycleState = Unprovisioned
4,068,389 UART: [state] DebugLocked = No
4,069,039 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,070,692 UART: [kat] SHA2-256
4,864,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,868,738 UART: [kat] ++
4,868,890 UART: [kat] sha1
4,873,282 UART: [kat] SHA2-256
4,875,220 UART: [kat] SHA2-384
4,877,875 UART: [kat] SHA2-512-ACC
4,879,775 UART: [kat] ECC-384
4,885,466 UART: [kat] HMAC-384Kdf
4,889,964 UART: [kat] LMS
5,458,160 UART: [kat] --
5,459,267 UART: [update-reset] ++
6,791,587 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,792,769 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,942,399 >>> mbox cmd response: success
6,942,399 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,942,708 UART: [update-reset] Copying MAN_2 To MAN_1
6,950,722 UART: [update-reset Success] --
6,951,909 UART: [state] Locking Datavault
6,952,617 UART: [state] Locking PCR0, PCR1 and PCR31
6,953,221 UART: [state] Locking ICCM
6,953,719 UART: [exit] Launching FMC @ 0x40000130
6,959,048 UART:
6,959,064 UART: Running Caliptra FMC ...
6,959,472 UART:
6,959,526 UART: [state] CFI Enabled
7,047,923 UART: [art] Extend RT PCRs Done
7,048,351 UART: [art] Lock RT PCRs Done
7,049,554 UART: [art] Populate DV Done
7,058,159 UART: [fht] FMC Alias Private Key: 7
7,059,143 UART: [art] Derive CDI
7,059,423 UART: [art] Store in in slot 0x4
7,144,848 UART: [art] Derive Key Pair
7,145,208 UART: [art] Store priv key in slot 0x5
7,158,242 UART: [art] Derive Key Pair - Done
7,172,774 UART: [art] Signing Cert with AUTHO
7,173,254 UART: RITY.KEYID = 7
7,188,802 UART: [art] Erasing AUTHORITY.KEYID = 7
7,189,567 UART: [art] PUB.X = 3236A2097EF9CAB2B23512CD309131E41638468C4922429B60EB92D9C909113CBB4293AEE8C353C0AF52D7CCD7019F84
7,196,328 UART: [art] PUB.Y = B606BDA927232C5EBC65F2284113304D1BD6BB0E7CBBFD0F7BC79E5B7DC20DB5A1672BAAC98AC938789F41FE847F5796
7,203,284 UART: [art] SIG.R = 9EDE8813FC25308E4D39B7144600D5A3642CA1A9DA1F59153749E1C3B54C82BC5879E5EBBF09B3F7BC9E546DE75643A9
7,210,037 UART: [art] SIG.S = 9F48A4DAE80C7200FCA6E73B107290F26F07A518C10052145DB528453FE8A3D715716BE76E2C278CE240DD3C633F589F
7,234,126 UART: Caliptra RT
7,234,379 UART: [state] CFI Enabled
7,515,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,546,026 UART: [rt]cmd =0x41545348, len=116
7,567,567 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,879 ready_for_fw is high
1,361,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,576 >>> mbox cmd response: success
2,987,506 UART:
2,987,522 UART: Running Caliptra FMC ...
2,987,930 UART:
2,987,984 UART: [state] CFI Enabled
2,998,553 UART: [fht] FMC Alias Private Key: 7
3,106,190 UART: [art] Extend RT PCRs Done
3,106,618 UART: [art] Lock RT PCRs Done
3,108,384 UART: [art] Populate DV Done
3,116,615 UART: [fht] FMC Alias Private Key: 7
3,117,767 UART: [art] Derive CDI
3,118,047 UART: [art] Store in in slot 0x4
3,203,700 UART: [art] Derive Key Pair
3,204,060 UART: [art] Store priv key in slot 0x5
3,217,242 UART: [art] Derive Key Pair - Done
3,232,178 UART: [art] Signing Cert with AUTHO
3,232,658 UART: RITY.KEYID = 7
3,247,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,543 UART: [art] PUB.X = CFC172A03E1643887F1E08698504CD187B12B1A8CB71F5FD4B745B2AF9FDB908AA14730BDFFE768E9AA6FFFF76727718
3,255,315 UART: [art] PUB.Y = E6AC66EBB1887B6B30C3A19EB51CC4EA72426AB48FD8E379127ED1C294E1051BB13489DF30ED438F28D609F40B205697
3,262,264 UART: [art] SIG.R = A3EE0B25F492322AA6D2E0B4D7030F92AF80E800CDE4B015C10F4A70BE2755FBDC54CEA8A4EA1362A698DD43CDC25AE0
3,269,022 UART: [art] SIG.S = 2C8C64A8359A22F84E77A93C6E9C9515AA81869F2652F836AFBA035630F48DADC63B8065927ACEA43A544885D3AF291C
3,293,114 UART: Caliptra RT
3,293,367 UART: [state] CFI Enabled
3,400,672 UART: [rt] RT listening for mailbox commands...
3,401,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,320 UART: [rt]cmd =0x41544d4e, len=14344
3,833,951 >>> mbox cmd response data (8 bytes)
3,833,952 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,231 UART: [rt]cmd =0x41545348, len=116
3,886,296 >>> mbox cmd response data (12 bytes)
3,886,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,646,302 >>> mbox cmd response: success
6,646,302 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,659,547 UART:
6,659,563 UART: Running Caliptra FMC ...
6,659,971 UART:
6,660,025 UART: [state] CFI Enabled
6,749,034 UART: [art] Extend RT PCRs Done
6,749,462 UART: [art] Lock RT PCRs Done
6,750,535 UART: [art] Populate DV Done
6,758,920 UART: [fht] FMC Alias Private Key: 7
6,760,008 UART: [art] Derive CDI
6,760,288 UART: [art] Store in in slot 0x4
6,845,907 UART: [art] Derive Key Pair
6,846,267 UART: [art] Store priv key in slot 0x5
6,858,881 UART: [art] Derive Key Pair - Done
6,873,749 UART: [art] Signing Cert with AUTHO
6,874,229 UART: RITY.KEYID = 7
6,889,743 UART: [art] Erasing AUTHORITY.KEYID = 7
6,890,508 UART: [art] PUB.X = 2BB8418CE322EB800EEB768CEB0B65CF6F2DD1D2FE87B3A5BA2554A8C96B3BE65D554DBB8CF476F411B4C9C6BE2E00CA
6,897,278 UART: [art] PUB.Y = E6CD77CEA7B68ACB1FA2B19590620F1A82E4457F9929598DF811EE0B0E07FCE731B8D834755E9363B5E3D967C8918F06
6,904,219 UART: [art] SIG.R = 7690C11F063EA57971D62881730D1C8556FFBFFC28B29E6076E4D1729603E834C29F592923D1CE9BD70031F2C7ABC90B
6,910,955 UART: [art] SIG.S = 80C2261754B0F0F2BCE8C357E4EF8402A8FAB3EF5C2C0630C0A534CF6344846CEB95F88F7E55B9209BFF11DA813FB2AD
6,933,842 UART: Caliptra RT
6,934,095 UART: [state] CFI Enabled
7,212,544 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,243,509 UART: [rt]cmd =0x41545348, len=116
7,265,492 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,842 UART: [kat] SHA2-256
881,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,888 UART: [kat] ++
886,040 UART: [kat] sha1
890,398 UART: [kat] SHA2-256
892,336 UART: [kat] SHA2-384
895,061 UART: [kat] SHA2-512-ACC
896,962 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,567 UART: [kat] LMS
1,475,763 UART: [kat] --
1,476,740 UART: [cold-reset] ++
1,477,076 UART: [fht] Storing FHT @ 0x50003400
1,479,769 UART: [idev] ++
1,479,937 UART: [idev] CDI.KEYID = 6
1,480,297 UART: [idev] SUBJECT.KEYID = 7
1,480,721 UART: [idev] UDS.KEYID = 0
1,481,066 ready_for_fw is high
1,481,066 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,855 UART: [idev] Erasing UDS.KEYID = 0
1,506,041 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,565 UART: [idev] --
1,515,632 UART: [ldev] ++
1,515,800 UART: [ldev] CDI.KEYID = 6
1,516,163 UART: [ldev] SUBJECT.KEYID = 5
1,516,589 UART: [ldev] AUTHORITY.KEYID = 7
1,517,052 UART: [ldev] FE.KEYID = 1
1,522,584 UART: [ldev] Erasing FE.KEYID = 1
1,548,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,987 UART: [ldev] --
1,587,438 UART: [fwproc] Waiting for Commands...
1,588,191 UART: [fwproc] Received command 0x46574c44
1,588,982 UART: [fwproc] Received Image of size 114168 bytes
2,884,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,193 >>> mbox cmd response: success
3,078,315 UART: [afmc] ++
3,078,483 UART: [afmc] CDI.KEYID = 6
3,078,845 UART: [afmc] SUBJECT.KEYID = 7
3,079,270 UART: [afmc] AUTHORITY.KEYID = 5
3,114,413 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,935 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,715 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,443 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,328 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,018 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,805 UART: [afmc] --
3,157,901 UART: [cold-reset] --
3,158,789 UART: [state] Locking Datavault
3,159,822 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,426 UART: [state] Locking ICCM
3,160,980 UART: [exit] Launching FMC @ 0x40000130
3,166,309 UART:
3,166,325 UART: Running Caliptra FMC ...
3,166,733 UART:
3,166,876 UART: [state] CFI Enabled
3,177,227 UART: [fht] FMC Alias Private Key: 7
3,285,126 UART: [art] Extend RT PCRs Done
3,285,554 UART: [art] Lock RT PCRs Done
3,287,292 UART: [art] Populate DV Done
3,295,511 UART: [fht] FMC Alias Private Key: 7
3,296,643 UART: [art] Derive CDI
3,296,923 UART: [art] Store in in slot 0x4
3,382,804 UART: [art] Derive Key Pair
3,383,164 UART: [art] Store priv key in slot 0x5
3,395,912 UART: [art] Derive Key Pair - Done
3,410,522 UART: [art] Signing Cert with AUTHO
3,411,002 UART: RITY.KEYID = 7
3,426,478 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,243 UART: [art] PUB.X = 0B59BE085C8E4E38A4B79864370493FEF32771508FFD5991B965FF908E204B0CCBE72DBA47514675EC5B3BD11E8F2F45
3,434,007 UART: [art] PUB.Y = 48A0DDDA06B92112B218CF832F172DD0B06DC05583CFCB8041ED141D056144324292879D285E626A4B1D3F7F5FFCCA28
3,440,957 UART: [art] SIG.R = 55FB598A2893B14A9D61122A3739B4AB6A0217B74A4B584975164F12785308E86927D7F630D03B6BF42A6562BE2F67F1
3,447,713 UART: [art] SIG.S = 58783B4E2DF0A679951A48BB3863C4DDBD366403B1A4DED73C3CF6F6FFB1D43BE2B97E092E2E21E437DDF6F6BA43CB81
3,471,198 UART: Caliptra RT
3,471,543 UART: [state] CFI Enabled
3,579,225 UART: [rt] RT listening for mailbox commands...
3,579,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,109 UART: [rt]cmd =0x41544d4e, len=14344
4,013,012 >>> mbox cmd response data (8 bytes)
4,013,013 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,052 UART: [rt]cmd =0x41545348, len=116
4,064,655 >>> mbox cmd response data (12 bytes)
4,064,656 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,672 UART:
4,065,688 UART: Running Caliptra ROM ...
4,066,096 UART:
4,066,237 UART: [state] CFI Enabled
4,068,787 UART: [state] LifecycleState = Unprovisioned
4,069,442 UART: [state] DebugLocked = No
4,070,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,071,833 UART: [kat] SHA2-256
4,865,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,869,879 UART: [kat] ++
4,870,031 UART: [kat] sha1
4,874,373 UART: [kat] SHA2-256
4,876,311 UART: [kat] SHA2-384
4,879,046 UART: [kat] SHA2-512-ACC
4,880,946 UART: [kat] ECC-384
4,886,809 UART: [kat] HMAC-384Kdf
4,891,305 UART: [kat] LMS
5,459,501 UART: [kat] --
5,460,152 UART: [update-reset] ++
6,792,142 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,793,220 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,942,850 >>> mbox cmd response: success
6,942,850 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,943,057 UART: [update-reset] Copying MAN_2 To MAN_1
6,951,071 UART: [update-reset Success] --
6,952,168 UART: [state] Locking Datavault
6,953,074 UART: [state] Locking PCR0, PCR1 and PCR31
6,953,678 UART: [state] Locking ICCM
6,954,328 UART: [exit] Launching FMC @ 0x40000130
6,959,657 UART:
6,959,673 UART: Running Caliptra FMC ...
6,960,081 UART:
6,960,224 UART: [state] CFI Enabled
7,049,723 UART: [art] Extend RT PCRs Done
7,050,151 UART: [art] Lock RT PCRs Done
7,051,506 UART: [art] Populate DV Done
7,059,673 UART: [fht] FMC Alias Private Key: 7
7,060,621 UART: [art] Derive CDI
7,060,901 UART: [art] Store in in slot 0x4
7,146,454 UART: [art] Derive Key Pair
7,146,814 UART: [art] Store priv key in slot 0x5
7,160,208 UART: [art] Derive Key Pair - Done
7,175,009 UART: [art] Signing Cert with AUTHO
7,175,489 UART: RITY.KEYID = 7
7,190,865 UART: [art] Erasing AUTHORITY.KEYID = 7
7,191,630 UART: [art] PUB.X = F92F21BD62CAE47F2FD03B73047CE582F4AA2895B7D7D5A77DB171FC7B8D0E4974ED516C7975864B2725DD9D0D94C183
7,198,401 UART: [art] PUB.Y = 516B0CF04D0DA2D47AE8B814E61EA1C217EBC9783E195A1C8F052AA0F260C5F755FBDD56A812C65ADE86829CBD88D112
7,205,358 UART: [art] SIG.R = 6FC0534D2429A6B3754CCBE824051F9FC731BF8ADBA2C90E1564E64AA8DF523BFB31FF6A9DCA2C70AD88BF918DDC2D5A
7,212,148 UART: [art] SIG.S = 1D01632214F8992A97339866D67C540CE862727CD72FB3D0E3B6F65AAFDE54F7892D743581CA05FD3F2241C0422E4031
7,236,058 UART: Caliptra RT
7,236,403 UART: [state] CFI Enabled
7,519,087 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,549,680 UART: [rt]cmd =0x41545348, len=116
7,570,169 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,398 ready_for_fw is high
1,362,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,357 >>> mbox cmd response: success
2,988,529 UART:
2,988,545 UART: Running Caliptra FMC ...
2,988,953 UART:
2,989,096 UART: [state] CFI Enabled
2,999,871 UART: [fht] FMC Alias Private Key: 7
3,108,274 UART: [art] Extend RT PCRs Done
3,108,702 UART: [art] Lock RT PCRs Done
3,110,060 UART: [art] Populate DV Done
3,118,353 UART: [fht] FMC Alias Private Key: 7
3,119,313 UART: [art] Derive CDI
3,119,593 UART: [art] Store in in slot 0x4
3,205,236 UART: [art] Derive Key Pair
3,205,596 UART: [art] Store priv key in slot 0x5
3,218,424 UART: [art] Derive Key Pair - Done
3,233,069 UART: [art] Signing Cert with AUTHO
3,233,549 UART: RITY.KEYID = 7
3,249,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,124 UART: [art] PUB.X = 8D73695631AB8385807A1CBD4F07553AA38C0431AAD317DEE062447B21859A03F8CCFFE3A0E539ED0C64102F320EE8C5
3,256,885 UART: [art] PUB.Y = 93AADA35FEE48213F36F28EEE1F22F0B3333170846942CC4B203B05D52ADA362C85E30EA324098312634AF6AF69DE42C
3,263,832 UART: [art] SIG.R = 3ADCDDE358D5F01146AE07DBFC1B03AAF250A2227BB49EABB579D1499F903081B1810C9444555614B97DAF9B4F3956F3
3,270,603 UART: [art] SIG.S = C8C9614E53284B0D1391712E3F774D4117C1011B1FE62B3B67A0390C37D6474C3691FBC2879EC6A9B575198B6D000F67
3,294,368 UART: Caliptra RT
3,294,713 UART: [state] CFI Enabled
3,402,424 UART: [rt] RT listening for mailbox commands...
3,403,094 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,018 UART: [rt]cmd =0x41544d4e, len=14344
3,836,043 >>> mbox cmd response data (8 bytes)
3,836,044 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,027 UART: [rt]cmd =0x41545348, len=116
3,887,336 >>> mbox cmd response data (12 bytes)
3,887,337 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,647,677 >>> mbox cmd response: success
6,647,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,661,286 UART:
6,661,302 UART: Running Caliptra FMC ...
6,661,710 UART:
6,661,853 UART: [state] CFI Enabled
6,751,100 UART: [art] Extend RT PCRs Done
6,751,528 UART: [art] Lock RT PCRs Done
6,752,927 UART: [art] Populate DV Done
6,761,306 UART: [fht] FMC Alias Private Key: 7
6,762,326 UART: [art] Derive CDI
6,762,606 UART: [art] Store in in slot 0x4
6,848,289 UART: [art] Derive Key Pair
6,848,649 UART: [art] Store priv key in slot 0x5
6,862,161 UART: [art] Derive Key Pair - Done
6,876,920 UART: [art] Signing Cert with AUTHO
6,877,400 UART: RITY.KEYID = 7
6,892,232 UART: [art] Erasing AUTHORITY.KEYID = 7
6,892,997 UART: [art] PUB.X = B725F3969681DB3DD4D89C4075AD8B4128AF5E0D0A338099898D1160669EF2105FBC9C47D21EC4FADE75F3746123EF02
6,899,762 UART: [art] PUB.Y = 693E7E101DC8F44FC96B92EC4412FE2CB3BCF370C89BE603C8DD703D6AF2C181617E6A803DE125AF8479AFF7B2384DEE
6,906,727 UART: [art] SIG.R = 69DC82AE6AD8B6B0A32291DA6D468163D124FADC1FEFDFBEF38F38074230FF7CAA9CF8E6C0E5A1B729799F76B2901422
6,913,512 UART: [art] SIG.S = 42C785508475482F3B46BAE5E1E3718AE3B015B750A378604BD2D45C659D42E3262FDCF6DFB13B559FAA55488E6667D0
6,937,257 UART: Caliptra RT
6,937,602 UART: [state] CFI Enabled
7,218,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,249,471 UART: [rt]cmd =0x41545348, len=116
7,270,798 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
902,011 UART: [kat] SHA2-256
903,951 UART: [kat] SHA2-384
906,704 UART: [kat] SHA2-512-ACC
908,605 UART: [kat] ECC-384
918,324 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,171,769 UART: [cold-reset] ++
1,172,129 UART: [fht] FHT @ 0x50003400
1,174,818 UART: [idev] ++
1,174,986 UART: [idev] CDI.KEYID = 6
1,175,346 UART: [idev] SUBJECT.KEYID = 7
1,175,770 UART: [idev] UDS.KEYID = 0
1,176,115 ready_for_fw is high
1,176,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,995 UART: [idev] Sha1 KeyId Algorithm
1,209,265 UART: [idev] --
1,210,189 UART: [ldev] ++
1,210,357 UART: [ldev] CDI.KEYID = 6
1,210,720 UART: [ldev] SUBJECT.KEYID = 5
1,211,146 UART: [ldev] AUTHORITY.KEYID = 7
1,211,609 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,101 UART: [ldev] --
1,282,468 UART: [fwproc] Wait for Commands...
1,283,098 UART: [fwproc] Recv command 0x46574c44
1,283,826 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,459 >>> mbox cmd response: success
2,773,491 UART: [afmc] ++
2,773,659 UART: [afmc] CDI.KEYID = 6
2,774,021 UART: [afmc] SUBJECT.KEYID = 7
2,774,446 UART: [afmc] AUTHORITY.KEYID = 5
2,810,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,648 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,261 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,740 UART: [afmc] --
2,853,676 UART: [cold-reset] --
2,854,392 UART: [state] Locking Datavault
2,855,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,085 UART: [state] Locking ICCM
2,856,629 UART: [exit] Launching FMC @ 0x40000130
2,861,958 UART:
2,861,974 UART: Running Caliptra FMC ...
2,862,382 UART:
2,862,436 UART: [state] CFI Enabled
2,872,497 UART: [fht] FMC Alias Private Key: 7
2,980,250 UART: [art] Extend RT PCRs Done
2,980,678 UART: [art] Lock RT PCRs Done
2,982,078 UART: [art] Populate DV Done
2,990,055 UART: [fht] FMC Alias Private Key: 7
2,991,007 UART: [art] Derive CDI
2,991,287 UART: [art] Store in in slot 0x4
3,076,978 UART: [art] Derive Key Pair
3,077,338 UART: [art] Store priv key in slot 0x5
3,090,162 UART: [art] Derive Key Pair - Done
3,105,055 UART: [art] Signing Cert with AUTHO
3,105,535 UART: RITY.KEYID = 7
3,120,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,246 UART: [art] PUB.X = 402473BC4FF2EAA0C5DC2FFC7EE8754B4BA817FDAF625A74B67B353B01B3C69046396B0281DF87C83909909D71854843
3,128,011 UART: [art] PUB.Y = 2F48132C332968A1DA96DAF21BADBA166D62B75F4907C1B8D0A3E814291CC295238B88D49C25AFF99B3F905BC7857334
3,134,962 UART: [art] SIG.R = 0E19BC4F41CC7A05F81ED9FFA98003B26A40B2B238AE44472CD4A5627FCC18B0AAEC9D9E525857E42463DF192EF84F28
3,141,737 UART: [art] SIG.S = 20348A5A7636CDBEED7B7B1303F2F527B152CD9D5F02020B93FC979CE9238F0F59B9745836C644C0B8307E4174F9D1EA
3,165,205 UART: Caliptra RT
3,165,458 UART: [state] CFI Enabled
3,274,031 UART: [rt] RT listening for mailbox commands...
3,274,701 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,559 UART: [rt]cmd =0x41544d4e, len=14344
3,707,232 >>> mbox cmd response data (8 bytes)
3,707,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,286 UART: [rt]cmd =0x41545348, len=116
3,758,769 >>> mbox cmd response data (12 bytes)
3,758,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,729 UART:
3,759,745 UART: Running Caliptra ROM ...
3,760,153 UART:
3,760,208 UART: [state] CFI Enabled
3,762,762 UART: [state] LifecycleState = Unprovisioned
3,763,417 UART: [state] DebugLocked = No
3,764,023 UART: [state] WD Timer not started. Device not locked for debugging
3,765,231 UART: [kat] SHA2-256
4,570,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,575,006 UART: [kat] ++
4,575,158 UART: [kat] sha1
4,579,540 UART: [kat] SHA2-256
4,581,480 UART: [kat] SHA2-384
4,584,183 UART: [kat] SHA2-512-ACC
4,586,083 UART: [kat] ECC-384
4,595,754 UART: [kat] HMAC-384Kdf
4,600,160 UART: [kat] LMS
4,848,488 UART: [kat] --
4,849,476 UART: [update-reset] ++
6,160,346 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,161,475 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,311,053 >>> mbox cmd response: success
6,311,053 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,311,254 UART: [update-reset] Copying MAN_2 To MAN_1
6,319,268 UART: [update-reset Success] --
6,320,429 UART: [state] Locking Datavault
6,320,993 UART: [state] Locking PCR0, PCR1 and PCR31
6,321,597 UART: [state] Locking ICCM
6,322,123 UART: [exit] Launching FMC @ 0x40000130
6,327,452 UART:
6,327,468 UART: Running Caliptra FMC ...
6,327,876 UART:
6,327,930 UART: [state] CFI Enabled
6,416,669 UART: [art] Extend RT PCRs Done
6,417,097 UART: [art] Lock RT PCRs Done
6,418,234 UART: [art] Populate DV Done
6,426,593 UART: [fht] FMC Alias Private Key: 7
6,427,563 UART: [art] Derive CDI
6,427,843 UART: [art] Store in in slot 0x4
6,513,740 UART: [art] Derive Key Pair
6,514,100 UART: [art] Store priv key in slot 0x5
6,526,704 UART: [art] Derive Key Pair - Done
6,541,308 UART: [art] Signing Cert with AUTHO
6,541,788 UART: RITY.KEYID = 7
6,556,840 UART: [art] Erasing AUTHORITY.KEYID = 7
6,557,605 UART: [art] PUB.X = CFBEFDE166BE9D47802D37992B761874015151D8DEFC983771703A45F0F840FD8EEE4330F3EBB287A74662BC11256916
6,564,374 UART: [art] PUB.Y = BCFF07E4EC2F131AA94F156718549F950E755966C41BAA3555FC97E41AF43440A8A7B4EBB2C8D3E4239D382AAF808FD7
6,571,330 UART: [art] SIG.R = A5C3878E24FF6DE3E7DEE9F667E348AA6C9A3FF522EE75CBBC0D3E6B0429DFE662031807A8A43CD43C12ABCCED487342
6,578,110 UART: [art] SIG.S = 7A0A15F736342F44C26C4AC70A98FAAF29696B7647B68DD7FC875B45D56719710631FF56C8822C8054B9320F1AFD9F21
6,601,367 UART: Caliptra RT
6,601,620 UART: [state] CFI Enabled
6,882,711 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,913,564 UART: [rt]cmd =0x41545348, len=116
6,935,057 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,309 ready_for_fw is high
1,060,309 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,286 >>> mbox cmd response: success
2,686,030 UART:
2,686,046 UART: Running Caliptra FMC ...
2,686,454 UART:
2,686,508 UART: [state] CFI Enabled
2,696,911 UART: [fht] FMC Alias Private Key: 7
2,805,698 UART: [art] Extend RT PCRs Done
2,806,126 UART: [art] Lock RT PCRs Done
2,807,504 UART: [art] Populate DV Done
2,815,881 UART: [fht] FMC Alias Private Key: 7
2,817,029 UART: [art] Derive CDI
2,817,309 UART: [art] Store in in slot 0x4
2,903,002 UART: [art] Derive Key Pair
2,903,362 UART: [art] Store priv key in slot 0x5
2,916,898 UART: [art] Derive Key Pair - Done
2,931,446 UART: [art] Signing Cert with AUTHO
2,931,926 UART: RITY.KEYID = 7
2,946,992 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,757 UART: [art] PUB.X = D3D318AFC247628477318F6C76F143E78421D3B3BB98F3013D7AC0E72D5F3115FB7FB2BD43F3E730ECEBF92215389648
2,954,528 UART: [art] PUB.Y = 94202772F2D19BD49F421751C91B674DA22DEA35E541F1671D0E8EB0376F64DDDDC5ADA37FC1DE856E3FCE7D47BC36DE
2,961,493 UART: [art] SIG.R = 3222E29FC0913DA120262CA970A652E9D09266783883AEC234F87C2E4E493C843DFC3A5D0D45EF3DF5BC6DEEBB4DD260
2,968,272 UART: [art] SIG.S = 30234834A504E076D55866993F8BC7CEB4D2DDBA475110A1D765C3C7F1154EAE5AD40101ECD93493F79BD680FCF847C1
2,992,052 UART: Caliptra RT
2,992,305 UART: [state] CFI Enabled
3,100,592 UART: [rt] RT listening for mailbox commands...
3,101,262 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,288 UART: [rt]cmd =0x41544d4e, len=14344
3,534,195 >>> mbox cmd response data (8 bytes)
3,534,196 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,167 UART: [rt]cmd =0x41545348, len=116
3,585,304 >>> mbox cmd response data (12 bytes)
3,585,305 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,349 >>> mbox cmd response: success
6,021,349 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,034,559 UART:
6,034,575 UART: Running Caliptra FMC ...
6,034,983 UART:
6,035,037 UART: [state] CFI Enabled
6,124,320 UART: [art] Extend RT PCRs Done
6,124,748 UART: [art] Lock RT PCRs Done
6,125,969 UART: [art] Populate DV Done
6,134,348 UART: [fht] FMC Alias Private Key: 7
6,135,470 UART: [art] Derive CDI
6,135,750 UART: [art] Store in in slot 0x4
6,221,325 UART: [art] Derive Key Pair
6,221,685 UART: [art] Store priv key in slot 0x5
6,234,971 UART: [art] Derive Key Pair - Done
6,249,703 UART: [art] Signing Cert with AUTHO
6,250,183 UART: RITY.KEYID = 7
6,265,167 UART: [art] Erasing AUTHORITY.KEYID = 7
6,265,932 UART: [art] PUB.X = B8F2607F08DEAF4599FFF1D4D372A77284F06F3BAD0413E0CFFF9CB1CC8CA901E7E95F0AD90437937CA7D582A087D6FF
6,272,707 UART: [art] PUB.Y = 252285DB7EC91225DD4B5C316B89669A1C99EB37AAA3ECB56C98A28E3FCDB41BE7EC89E74FD1E43A115F6ED3E7D1302E
6,279,677 UART: [art] SIG.R = 741205542278A1B1A3F2C8790AAADDF604E17C9EA2703DF4A7CA1995BD79828C60EAAB7B9E977F794C2EBD4899B73A17
6,286,448 UART: [art] SIG.S = F459A0A2571A579BCAB6DCA7FB11C00923573D8EE5965AE085E1464B48ABCE11E634173AC6A6EB3FCB8115E29559FAC4
6,309,984 UART: Caliptra RT
6,310,237 UART: [state] CFI Enabled
6,589,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,620,251 UART: [rt]cmd =0x41545348, len=116
6,642,086 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,857 UART: [kat] SHA2-512-ACC
908,758 UART: [kat] ECC-384
918,243 UART: [kat] HMAC-384Kdf
922,711 UART: [kat] LMS
1,171,039 UART: [kat] --
1,172,036 UART: [cold-reset] ++
1,172,532 UART: [fht] FHT @ 0x50003400
1,175,083 UART: [idev] ++
1,175,251 UART: [idev] CDI.KEYID = 6
1,175,611 UART: [idev] SUBJECT.KEYID = 7
1,176,035 UART: [idev] UDS.KEYID = 0
1,176,380 ready_for_fw is high
1,176,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,381 UART: [idev] Erasing UDS.KEYID = 0
1,201,594 UART: [idev] Sha1 KeyId Algorithm
1,209,922 UART: [idev] --
1,211,024 UART: [ldev] ++
1,211,192 UART: [ldev] CDI.KEYID = 6
1,211,555 UART: [ldev] SUBJECT.KEYID = 5
1,211,981 UART: [ldev] AUTHORITY.KEYID = 7
1,212,444 UART: [ldev] FE.KEYID = 1
1,217,624 UART: [ldev] Erasing FE.KEYID = 1
1,243,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,848 UART: [ldev] --
1,283,269 UART: [fwproc] Wait for Commands...
1,283,967 UART: [fwproc] Recv command 0x46574c44
1,284,695 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,034 >>> mbox cmd response: success
2,774,102 UART: [afmc] ++
2,774,270 UART: [afmc] CDI.KEYID = 6
2,774,632 UART: [afmc] SUBJECT.KEYID = 7
2,775,057 UART: [afmc] AUTHORITY.KEYID = 5
2,810,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,675 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,033 UART: [afmc] --
2,854,113 UART: [cold-reset] --
2,854,919 UART: [state] Locking Datavault
2,856,160 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,764 UART: [state] Locking ICCM
2,857,240 UART: [exit] Launching FMC @ 0x40000130
2,862,569 UART:
2,862,585 UART: Running Caliptra FMC ...
2,862,993 UART:
2,863,136 UART: [state] CFI Enabled
2,873,515 UART: [fht] FMC Alias Private Key: 7
2,981,600 UART: [art] Extend RT PCRs Done
2,982,028 UART: [art] Lock RT PCRs Done
2,983,938 UART: [art] Populate DV Done
2,992,199 UART: [fht] FMC Alias Private Key: 7
2,993,277 UART: [art] Derive CDI
2,993,557 UART: [art] Store in in slot 0x4
3,079,008 UART: [art] Derive Key Pair
3,079,368 UART: [art] Store priv key in slot 0x5
3,092,368 UART: [art] Derive Key Pair - Done
3,106,833 UART: [art] Signing Cert with AUTHO
3,107,313 UART: RITY.KEYID = 7
3,122,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,096 UART: [art] PUB.X = 799CC486D5A04F9ACBB79581DB9E27BC88B525CC51F9D0A6729FBE6693A1F2D88121A19BF71F7E02C832BA33A4D31EEC
3,129,879 UART: [art] PUB.Y = AC0FAB71DDB504EB8E4D8623F1DB5DCD1702FF1005241CC41870C41851A32B21D52B4B3F523012CDD4F5387DC75BC28D
3,136,831 UART: [art] SIG.R = D6E222DD431F19B4784CB65A9BF443498363757E326EC6973933771BA6BFDD64A18CB8463F164AB22BB99254EAD559A8
3,143,603 UART: [art] SIG.S = 4B2D6FE87879486CB4BFAE8CD2B882769D818B2807756D1A9A1A8289C2F77A23E0D21ED99380A82A81CDFEB00D97727B
3,167,254 UART: Caliptra RT
3,167,599 UART: [state] CFI Enabled
3,274,308 UART: [rt] RT listening for mailbox commands...
3,274,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,136 UART: [rt]cmd =0x41544d4e, len=14344
3,708,139 >>> mbox cmd response data (8 bytes)
3,708,140 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,423 UART: [rt]cmd =0x41545348, len=116
3,759,968 >>> mbox cmd response data (12 bytes)
3,759,969 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,984 UART:
3,761,000 UART: Running Caliptra ROM ...
3,761,408 UART:
3,761,550 UART: [state] CFI Enabled
3,764,048 UART: [state] LifecycleState = Unprovisioned
3,764,703 UART: [state] DebugLocked = No
3,765,189 UART: [state] WD Timer not started. Device not locked for debugging
3,766,405 UART: [kat] SHA2-256
4,572,055 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,576,180 UART: [kat] ++
4,576,332 UART: [kat] sha1
4,580,492 UART: [kat] SHA2-256
4,582,432 UART: [kat] SHA2-384
4,585,155 UART: [kat] SHA2-512-ACC
4,587,055 UART: [kat] ECC-384
4,596,830 UART: [kat] HMAC-384Kdf
4,601,276 UART: [kat] LMS
4,849,604 UART: [kat] --
4,850,542 UART: [update-reset] ++
6,161,635 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,162,630 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,312,208 >>> mbox cmd response: success
6,312,208 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,312,401 UART: [update-reset] Copying MAN_2 To MAN_1
6,320,415 UART: [update-reset Success] --
6,321,372 UART: [state] Locking Datavault
6,322,168 UART: [state] Locking PCR0, PCR1 and PCR31
6,322,772 UART: [state] Locking ICCM
6,323,394 UART: [exit] Launching FMC @ 0x40000130
6,328,723 UART:
6,328,739 UART: Running Caliptra FMC ...
6,329,147 UART:
6,329,290 UART: [state] CFI Enabled
6,418,753 UART: [art] Extend RT PCRs Done
6,419,181 UART: [art] Lock RT PCRs Done
6,420,696 UART: [art] Populate DV Done
6,428,733 UART: [fht] FMC Alias Private Key: 7
6,429,893 UART: [art] Derive CDI
6,430,173 UART: [art] Store in in slot 0x4
6,516,152 UART: [art] Derive Key Pair
6,516,512 UART: [art] Store priv key in slot 0x5
6,529,996 UART: [art] Derive Key Pair - Done
6,544,923 UART: [art] Signing Cert with AUTHO
6,545,403 UART: RITY.KEYID = 7
6,560,533 UART: [art] Erasing AUTHORITY.KEYID = 7
6,561,298 UART: [art] PUB.X = B021650CD47AE7E9E3D5822A962EF97383444DDD3B4A1F4981D36005205111854F1E730142D569CB5350CA6B3E846FD5
6,568,055 UART: [art] PUB.Y = 87AD2116EEE586A907663616E4617F424F164DBDCFFDBC1F1A65FA6A63FD85E5D9B44533C25930CC05EC0AAB144657B9
6,575,008 UART: [art] SIG.R = A72ACF11011830ABF21A34BAE430C83D184F767CF814628F7E96482D7497829F5E46B268317E8B2677620BA5FD629145
6,581,766 UART: [art] SIG.S = F545C6858453BA89670D69B8DFA2ADED4ADE35373588DFAB7242BE031282B171E13ACA2F9B20925CBFF267648DF1677D
6,605,609 UART: Caliptra RT
6,605,954 UART: [state] CFI Enabled
6,885,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,916,643 UART: [rt]cmd =0x41545348, len=116
6,938,298 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,014 ready_for_fw is high
1,060,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,117 >>> mbox cmd response: success
2,687,081 UART:
2,687,097 UART: Running Caliptra FMC ...
2,687,505 UART:
2,687,648 UART: [state] CFI Enabled
2,697,941 UART: [fht] FMC Alias Private Key: 7
2,805,216 UART: [art] Extend RT PCRs Done
2,805,644 UART: [art] Lock RT PCRs Done
2,807,364 UART: [art] Populate DV Done
2,815,345 UART: [fht] FMC Alias Private Key: 7
2,816,427 UART: [art] Derive CDI
2,816,707 UART: [art] Store in in slot 0x4
2,902,630 UART: [art] Derive Key Pair
2,902,990 UART: [art] Store priv key in slot 0x5
2,915,882 UART: [art] Derive Key Pair - Done
2,930,626 UART: [art] Signing Cert with AUTHO
2,931,106 UART: RITY.KEYID = 7
2,946,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,081 UART: [art] PUB.X = 99FC9C938428A3C850FD578B98CB30690E314173E169F2FFE005CC219CF9735A39DE18F1495BC0A42FCE5183028D7286
2,953,842 UART: [art] PUB.Y = CB6977A972EDD48C96BB0ED24E63D385768FBD096CAFF4660AE0D85081BA638A5F2A802A4F04417E7A8205846155DFEA
2,960,787 UART: [art] SIG.R = 052D50A5493A8A1A2773B49746E273F8C18F20B236C7A2A31B6306B00F27BB8B333B6F9A753A89F96EA7B3047C5477F1
2,967,543 UART: [art] SIG.S = 47B30118119B482A916A382E1CA81E12746D9181DCF4DF412ADFC261C563F5BFAD0F4269B80B97301DA90B50C1E99B6F
2,991,770 UART: Caliptra RT
2,992,115 UART: [state] CFI Enabled
3,100,170 UART: [rt] RT listening for mailbox commands...
3,100,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,780 UART: [rt]cmd =0x41544d4e, len=14344
3,533,845 >>> mbox cmd response data (8 bytes)
3,533,846 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,227 UART: [rt]cmd =0x41545348, len=116
3,585,754 >>> mbox cmd response data (12 bytes)
3,585,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,022,000 >>> mbox cmd response: success
6,022,000 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,035,428 UART:
6,035,444 UART: Running Caliptra FMC ...
6,035,852 UART:
6,035,995 UART: [state] CFI Enabled
6,125,724 UART: [art] Extend RT PCRs Done
6,126,152 UART: [art] Lock RT PCRs Done
6,127,593 UART: [art] Populate DV Done
6,135,944 UART: [fht] FMC Alias Private Key: 7
6,136,974 UART: [art] Derive CDI
6,137,254 UART: [art] Store in in slot 0x4
6,222,953 UART: [art] Derive Key Pair
6,223,313 UART: [art] Store priv key in slot 0x5
6,236,895 UART: [art] Derive Key Pair - Done
6,251,958 UART: [art] Signing Cert with AUTHO
6,252,438 UART: RITY.KEYID = 7
6,267,508 UART: [art] Erasing AUTHORITY.KEYID = 7
6,268,273 UART: [art] PUB.X = 585F9E6FAC59C2471DD81E6AE62E83000E1AE45157AB45F4F857DF5C528E593A5F7A7129D4B3BE8C21BF4E2BF8CF4E18
6,275,034 UART: [art] PUB.Y = ADDABC93940E76D9255B097F5D9AE7BB88783BEC6A4BD8350F9267F5943B6F9A8755678DA3BA56B4241A846407C99C88
6,281,978 UART: [art] SIG.R = F3212EC8A6A96F4283FF8E9F36CA20EABF39819EC91017A1ADD87DABA636104404E5F350C10416AC07108A8E445CA46E
6,288,749 UART: [art] SIG.S = 60ED28D4732CC4AF65EFEA3F44D5FE62A29CC103C5AA1C86A2EFD913CB3E0882767AD339A2B89AC3B05E4DD26BBD2DEA
6,312,340 UART: Caliptra RT
6,312,685 UART: [state] CFI Enabled
6,589,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,620,737 UART: [rt]cmd =0x41545348, len=116
6,641,872 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,100 UART: [kat] SHA2-256
891,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,779 UART: [kat] ++
895,931 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
904,886 UART: [kat] SHA2-512-ACC
906,787 UART: [kat] ECC-384
916,646 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,395 UART: [cold-reset] ++
1,170,929 UART: [fht] FHT @ 0x50003400
1,173,785 UART: [idev] ++
1,173,953 UART: [idev] CDI.KEYID = 6
1,174,314 UART: [idev] SUBJECT.KEYID = 7
1,174,739 UART: [idev] UDS.KEYID = 0
1,175,085 ready_for_fw is high
1,175,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,625 UART: [idev] Erasing UDS.KEYID = 0
1,199,903 UART: [idev] Sha1 KeyId Algorithm
1,208,981 UART: [idev] --
1,210,020 UART: [ldev] ++
1,210,188 UART: [ldev] CDI.KEYID = 6
1,210,552 UART: [ldev] SUBJECT.KEYID = 5
1,210,979 UART: [ldev] AUTHORITY.KEYID = 7
1,211,442 UART: [ldev] FE.KEYID = 1
1,216,388 UART: [ldev] Erasing FE.KEYID = 1
1,242,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,836 UART: [ldev] --
1,282,344 UART: [fwproc] Wait for Commands...
1,282,973 UART: [fwproc] Recv command 0x46574c44
1,283,706 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,017 >>> mbox cmd response: success
2,773,260 UART: [afmc] ++
2,773,428 UART: [afmc] CDI.KEYID = 6
2,773,791 UART: [afmc] SUBJECT.KEYID = 7
2,774,217 UART: [afmc] AUTHORITY.KEYID = 5
2,809,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,717 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,329 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,048 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,985 UART: [afmc] --
2,852,909 UART: [cold-reset] --
2,853,887 UART: [state] Locking Datavault
2,854,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,592 UART: [state] Locking ICCM
2,856,052 UART: [exit] Launching FMC @ 0x40000130
2,861,381 UART:
2,861,397 UART: Running Caliptra FMC ...
2,861,805 UART:
2,861,859 UART: [state] CFI Enabled
2,872,744 UART: [fht] FMC Alias Private Key: 7
2,981,283 UART: [art] Extend RT PCRs Done
2,981,711 UART: [art] Lock RT PCRs Done
2,983,273 UART: [art] Populate DV Done
2,991,626 UART: [fht] FMC Alias Private Key: 7
2,992,584 UART: [art] Derive CDI
2,992,864 UART: [art] Store in in slot 0x4
3,078,675 UART: [art] Derive Key Pair
3,079,035 UART: [art] Store priv key in slot 0x5
3,092,139 UART: [art] Derive Key Pair - Done
3,107,095 UART: [art] Signing Cert with AUTHO
3,107,575 UART: RITY.KEYID = 7
3,122,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,676 UART: [art] PUB.X = 4AC2E3275BF0EB24C274A1BEA288D8D620BD350CD758BE7B55F255177F69E001B675FD24EE98C8589314133051E309A8
3,130,439 UART: [art] PUB.Y = 30DEE84F6237B09F45A38944147B92452C1C814196F0AEE10D14FCD11AAB459337512F42C5FAA0FBFEA905BA9CAC457F
3,137,395 UART: [art] SIG.R = A55E8193A4B393040F12A7E1B84395BD252D72320FE8C036F552B541B87855E20F94CFE8CEF72125F092F8170893A496
3,144,144 UART: [art] SIG.S = 5E86D65621C847444B1F7DE367DFDBCD038F9C9CE11DC1537C60D8BD73C3EDED085134DAC2A7F6C116551E5E3065AAC8
3,167,955 UART: Caliptra RT
3,168,208 UART: [state] CFI Enabled
3,276,061 UART: [rt] RT listening for mailbox commands...
3,276,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,819 UART: [rt]cmd =0x41544d4e, len=14344
3,709,332 >>> mbox cmd response data (8 bytes)
3,709,333 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,420 UART: [rt]cmd =0x41545348, len=116
3,760,953 >>> mbox cmd response data (12 bytes)
3,760,954 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,513 UART:
3,761,529 UART: Running Caliptra ROM ...
3,761,937 UART:
3,761,992 UART: [state] CFI Enabled
3,764,510 UART: [state] LifecycleState = Unprovisioned
3,765,165 UART: [state] DebugLocked = No
3,765,757 UART: [state] WD Timer not started. Device not locked for debugging
3,766,875 UART: [kat] SHA2-256
4,570,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,574,554 UART: [kat] ++
4,574,706 UART: [kat] sha1
4,578,858 UART: [kat] SHA2-256
4,580,798 UART: [kat] SHA2-384
4,583,393 UART: [kat] SHA2-512-ACC
4,585,293 UART: [kat] ECC-384
4,594,896 UART: [kat] HMAC-384Kdf
4,599,426 UART: [kat] LMS
4,847,738 UART: [kat] --
4,848,650 UART: [update-reset] ++
6,159,551 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,160,710 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,310,288 >>> mbox cmd response: success
6,310,288 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,310,447 UART: [update-reset] Copying MAN_2 To MAN_1
6,318,461 UART: [update-reset Success] --
6,319,214 UART: [state] Locking Datavault
6,320,004 UART: [state] Locking PCR0, PCR1 and PCR31
6,320,608 UART: [state] Locking ICCM
6,321,072 UART: [exit] Launching FMC @ 0x40000130
6,326,401 UART:
6,326,417 UART: Running Caliptra FMC ...
6,326,825 UART:
6,326,879 UART: [state] CFI Enabled
6,416,696 UART: [art] Extend RT PCRs Done
6,417,124 UART: [art] Lock RT PCRs Done
6,418,027 UART: [art] Populate DV Done
6,426,040 UART: [fht] FMC Alias Private Key: 7
6,427,122 UART: [art] Derive CDI
6,427,402 UART: [art] Store in in slot 0x4
6,513,021 UART: [art] Derive Key Pair
6,513,381 UART: [art] Store priv key in slot 0x5
6,525,843 UART: [art] Derive Key Pair - Done
6,540,841 UART: [art] Signing Cert with AUTHO
6,541,321 UART: RITY.KEYID = 7
6,556,425 UART: [art] Erasing AUTHORITY.KEYID = 7
6,557,190 UART: [art] PUB.X = 535C829987D1E621566DEDBE707C31DFC3374BDC6BF1FFD2D7C75CEBA4A45E3D879AFD8847BBE8038520C210F9BF3ECA
6,563,979 UART: [art] PUB.Y = 5299EAEC5973CE3D7333CA2CEDF45C0FA57F2C773555383BC154B8C88E19A657E0BB24AD4A60F1BA0FA59FFAB6765718
6,570,939 UART: [art] SIG.R = 00DBAA1E1A91A78EEF3F9E658682E0FBC6D01A33F63028129EBC5B75C45DB41651C344DACE4CB3B817E39342B206F467
6,577,696 UART: [art] SIG.S = 81D7A7F9BA57A0FC176FD6BD77ACCBCABD1C15509DFC983B95F8C4C90AE3E017C3CDF8E6B0947EBBD00C0CD13DA8B213
6,601,168 UART: Caliptra RT
6,601,421 UART: [state] CFI Enabled
6,884,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,915,732 UART: [rt]cmd =0x41545348, len=116
6,937,001 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,144 ready_for_fw is high
1,056,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,081 >>> mbox cmd response: success
2,682,639 UART:
2,682,655 UART: Running Caliptra FMC ...
2,683,063 UART:
2,683,117 UART: [state] CFI Enabled
2,693,946 UART: [fht] FMC Alias Private Key: 7
2,801,477 UART: [art] Extend RT PCRs Done
2,801,905 UART: [art] Lock RT PCRs Done
2,803,203 UART: [art] Populate DV Done
2,811,440 UART: [fht] FMC Alias Private Key: 7
2,812,508 UART: [art] Derive CDI
2,812,788 UART: [art] Store in in slot 0x4
2,898,807 UART: [art] Derive Key Pair
2,899,167 UART: [art] Store priv key in slot 0x5
2,911,885 UART: [art] Derive Key Pair - Done
2,926,775 UART: [art] Signing Cert with AUTHO
2,927,255 UART: RITY.KEYID = 7
2,942,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,172 UART: [art] PUB.X = B29491AE49CCEEE5C408F89AB355BC0BA970B2A8AE41FBB69A504B526FCE96DB18EFE0473FBB2AF359F641B6064E916C
2,949,955 UART: [art] PUB.Y = 2A88A233B107E77F34D5E873B98CFD4778EE94F24E392782CB9E55F11037046B7AE075FE28078C23888381ABBBF68592
2,956,894 UART: [art] SIG.R = C8F9B5027F7824E0E415735B5E54E15DD0EAA6FFFF5F44150A9C35EFAE5F3DFB88994791684B9716F787551ED565AEA1
2,963,668 UART: [art] SIG.S = 51AD9265BF3BBDC6397F4545ED2D7D59D54A761B07F6EDD4EC352DA8F76FE78430DB4FA8FF78A501A0E6861418D1FA17
2,987,773 UART: Caliptra RT
2,988,026 UART: [state] CFI Enabled
3,096,313 UART: [rt] RT listening for mailbox commands...
3,096,983 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,871 UART: [rt]cmd =0x41544d4e, len=14344
3,529,482 >>> mbox cmd response data (8 bytes)
3,529,483 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,660 UART: [rt]cmd =0x41545348, len=116
3,581,277 >>> mbox cmd response data (12 bytes)
3,581,278 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,011,961 >>> mbox cmd response: success
6,011,961 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,025,209 UART:
6,025,225 UART: Running Caliptra FMC ...
6,025,633 UART:
6,025,687 UART: [state] CFI Enabled
6,114,834 UART: [art] Extend RT PCRs Done
6,115,262 UART: [art] Lock RT PCRs Done
6,116,563 UART: [art] Populate DV Done
6,125,030 UART: [fht] FMC Alias Private Key: 7
6,126,196 UART: [art] Derive CDI
6,126,476 UART: [art] Store in in slot 0x4
6,211,991 UART: [art] Derive Key Pair
6,212,351 UART: [art] Store priv key in slot 0x5
6,225,513 UART: [art] Derive Key Pair - Done
6,240,173 UART: [art] Signing Cert with AUTHO
6,240,653 UART: RITY.KEYID = 7
6,255,701 UART: [art] Erasing AUTHORITY.KEYID = 7
6,256,466 UART: [art] PUB.X = F59D1BE81998D5C70F4BDE012DE9AAF3FCCDF40831142512194EFAD24D39D5D1132C3FF2C45FA658E88D6FE95F81B2B8
6,263,245 UART: [art] PUB.Y = 3332A2293C9BA6E6361B328E203A17B156E37A4C61F8B41A3DB6A99110EFDEC1FA107C9B99A3A5DD4D77221247C82108
6,270,196 UART: [art] SIG.R = 16E8932E8B956B9649833E77135EC9F67B660FD1506E42EAB382889D8FD03E3347D415A023F49F81EAE8893824935437
6,276,953 UART: [art] SIG.S = 214BA6A2BA9C072D631D571B93FCAA6D2D7E7B9A20A7838D919771698E9ABA2BA75D5DFC8CC7DE4D1B357A432490B84E
6,300,263 UART: Caliptra RT
6,300,516 UART: [state] CFI Enabled
6,580,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,610,844 UART: [rt]cmd =0x41545348, len=116
6,632,727 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,525 UART: [kat] SHA2-512-ACC
906,426 UART: [kat] ECC-384
916,395 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,174,486 ready_for_fw is high
1,174,486 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,930 UART: [idev] Sha1 KeyId Algorithm
1,208,932 UART: [idev] --
1,210,049 UART: [ldev] ++
1,210,217 UART: [ldev] CDI.KEYID = 6
1,210,581 UART: [ldev] SUBJECT.KEYID = 5
1,211,008 UART: [ldev] AUTHORITY.KEYID = 7
1,211,471 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,651 UART: [ldev] --
1,282,105 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,643 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,952 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,610 >>> mbox cmd response: success
2,772,715 UART: [afmc] ++
2,772,883 UART: [afmc] CDI.KEYID = 6
2,773,246 UART: [afmc] SUBJECT.KEYID = 7
2,773,672 UART: [afmc] AUTHORITY.KEYID = 5
2,809,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,324 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,936 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,655 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,272 UART: [afmc] --
2,852,264 UART: [cold-reset] --
2,853,298 UART: [state] Locking Datavault
2,854,357 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,961 UART: [state] Locking ICCM
2,855,383 UART: [exit] Launching FMC @ 0x40000130
2,860,712 UART:
2,860,728 UART: Running Caliptra FMC ...
2,861,136 UART:
2,861,279 UART: [state] CFI Enabled
2,871,986 UART: [fht] FMC Alias Private Key: 7
2,979,759 UART: [art] Extend RT PCRs Done
2,980,187 UART: [art] Lock RT PCRs Done
2,981,573 UART: [art] Populate DV Done
2,989,822 UART: [fht] FMC Alias Private Key: 7
2,990,836 UART: [art] Derive CDI
2,991,116 UART: [art] Store in in slot 0x4
3,076,867 UART: [art] Derive Key Pair
3,077,227 UART: [art] Store priv key in slot 0x5
3,090,649 UART: [art] Derive Key Pair - Done
3,105,486 UART: [art] Signing Cert with AUTHO
3,105,966 UART: RITY.KEYID = 7
3,121,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,775 UART: [art] PUB.X = B368AC21A9DE8BAC007E600E4CA26978505CEDF8C410B59855E45D17A748FAE82B6A1A72BFB2BB24AEB812C8FDEF2FBC
3,128,546 UART: [art] PUB.Y = 4B39D6EF134B6B8098F1DA776D104469912B51CECD390B69C8C736020C109A529554C23D578C79DC22F07578CBAFB84C
3,135,489 UART: [art] SIG.R = 64BC166BACF0A0A64D206B2A70F7EA3BB79AEAAD9A2A2A4B442B0FDA238F2C6F8057D5C01C0D367F8480C3743DA55C09
3,142,270 UART: [art] SIG.S = D59B177C7BECACE6FA76AC2DCA5166C5D5A275BB60FAB5F0CBFC0D172029DFDD5929F48279F930D473C396648D8159EA
3,166,940 UART: Caliptra RT
3,167,285 UART: [state] CFI Enabled
3,274,504 UART: [rt] RT listening for mailbox commands...
3,275,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,136 UART: [rt]cmd =0x41544d4e, len=14344
3,707,885 >>> mbox cmd response data (8 bytes)
3,707,886 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,041 UART: [rt]cmd =0x41545348, len=116
3,758,818 >>> mbox cmd response data (12 bytes)
3,758,819 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,764 UART:
3,759,780 UART: Running Caliptra ROM ...
3,760,188 UART:
3,760,330 UART: [state] CFI Enabled
3,763,618 UART: [state] LifecycleState = Unprovisioned
3,764,273 UART: [state] DebugLocked = No
3,764,877 UART: [state] WD Timer not started. Device not locked for debugging
3,766,133 UART: [kat] SHA2-256
4,569,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,573,812 UART: [kat] ++
4,573,964 UART: [kat] sha1
4,578,158 UART: [kat] SHA2-256
4,580,098 UART: [kat] SHA2-384
4,582,873 UART: [kat] SHA2-512-ACC
4,584,773 UART: [kat] ECC-384
4,594,818 UART: [kat] HMAC-384Kdf
4,599,386 UART: [kat] LMS
4,847,698 UART: [kat] --
4,848,472 UART: [update-reset] ++
6,159,659 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,160,818 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,310,396 >>> mbox cmd response: success
6,310,396 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,310,545 UART: [update-reset] Copying MAN_2 To MAN_1
6,318,559 UART: [update-reset Success] --
6,319,496 UART: [state] Locking Datavault
6,320,414 UART: [state] Locking PCR0, PCR1 and PCR31
6,321,018 UART: [state] Locking ICCM
6,321,566 UART: [exit] Launching FMC @ 0x40000130
6,326,895 UART:
6,326,911 UART: Running Caliptra FMC ...
6,327,319 UART:
6,327,462 UART: [state] CFI Enabled
6,417,093 UART: [art] Extend RT PCRs Done
6,417,521 UART: [art] Lock RT PCRs Done
6,418,556 UART: [art] Populate DV Done
6,426,875 UART: [fht] FMC Alias Private Key: 7
6,427,959 UART: [art] Derive CDI
6,428,239 UART: [art] Store in in slot 0x4
6,513,970 UART: [art] Derive Key Pair
6,514,330 UART: [art] Store priv key in slot 0x5
6,527,728 UART: [art] Derive Key Pair - Done
6,542,627 UART: [art] Signing Cert with AUTHO
6,543,107 UART: RITY.KEYID = 7
6,558,593 UART: [art] Erasing AUTHORITY.KEYID = 7
6,559,358 UART: [art] PUB.X = 0271D19E94F2B3D992BD4BD42A4F4369D02C004455EDA637AB43667637A9499CD291B722A490E3FF894D359F8BB701DA
6,566,102 UART: [art] PUB.Y = 2CA7728BDD0564A1F7A8B2015528D6AA28AEB92C4F9F2A225CF4F79BF461DE5525384F8D5757A52FB3C407BE2D83B81C
6,573,055 UART: [art] SIG.R = 2855C9D302FDDB5A898219D228A5A014319F6B46702AD2B4468CA6FDBBC612DE6B101705CC9BE005F4DCCBBD8B911379
6,579,828 UART: [art] SIG.S = A264F2565A5E11A1B4099FF9E26F9003578B5FE9F3707B862580CC9EA683F4B5CFA34C619E59536FBCB43FC8C8B19E73
6,603,743 UART: Caliptra RT
6,604,088 UART: [state] CFI Enabled
6,882,227 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,912,950 UART: [rt]cmd =0x41545348, len=116
6,934,829 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,709 ready_for_fw is high
1,056,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,272 >>> mbox cmd response: success
2,683,466 UART:
2,683,482 UART: Running Caliptra FMC ...
2,683,890 UART:
2,684,033 UART: [state] CFI Enabled
2,694,742 UART: [fht] FMC Alias Private Key: 7
2,802,765 UART: [art] Extend RT PCRs Done
2,803,193 UART: [art] Lock RT PCRs Done
2,804,499 UART: [art] Populate DV Done
2,812,650 UART: [fht] FMC Alias Private Key: 7
2,813,606 UART: [art] Derive CDI
2,813,886 UART: [art] Store in in slot 0x4
2,899,505 UART: [art] Derive Key Pair
2,899,865 UART: [art] Store priv key in slot 0x5
2,913,065 UART: [art] Derive Key Pair - Done
2,927,694 UART: [art] Signing Cert with AUTHO
2,928,174 UART: RITY.KEYID = 7
2,943,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,987 UART: [art] PUB.X = 6373AC12E690A8AC7FD23729CD07AEEC9C01C03095F1F2CC6B2BE005E691E4EFCB30745AFB635AAB84A17D2ECDBD748E
2,950,772 UART: [art] PUB.Y = 3303752AC63D88704EAFC37E165889B017AFF2BECDD2D8232B1F70F9E7B6F8CD995BE5D34D3E43A88D238B4C876E7F55
2,957,731 UART: [art] SIG.R = 8981BC4B9AC75F880BD5B3C2E61C7F9C2D77500E179F35168430655A67C026643F271983D15E58F54175F4389B52711A
2,964,485 UART: [art] SIG.S = 57B120F594FF212B2BF392A9F68BE2790D6C769347C1E318A81D85208145A35B127B4B6FC90655EFA1AB32E485179EA9
2,987,848 UART: Caliptra RT
2,988,193 UART: [state] CFI Enabled
3,096,426 UART: [rt] RT listening for mailbox commands...
3,097,096 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,234 UART: [rt]cmd =0x41544d4e, len=14344
3,529,607 >>> mbox cmd response data (8 bytes)
3,529,608 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,637 UART: [rt]cmd =0x41545348, len=116
3,581,350 >>> mbox cmd response data (12 bytes)
3,581,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,013,263 >>> mbox cmd response: success
6,013,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,026,627 UART:
6,026,643 UART: Running Caliptra FMC ...
6,027,051 UART:
6,027,194 UART: [state] CFI Enabled
6,116,677 UART: [art] Extend RT PCRs Done
6,117,105 UART: [art] Lock RT PCRs Done
6,118,458 UART: [art] Populate DV Done
6,126,865 UART: [fht] FMC Alias Private Key: 7
6,127,947 UART: [art] Derive CDI
6,128,227 UART: [art] Store in in slot 0x4
6,213,936 UART: [art] Derive Key Pair
6,214,296 UART: [art] Store priv key in slot 0x5
6,227,634 UART: [art] Derive Key Pair - Done
6,242,558 UART: [art] Signing Cert with AUTHO
6,243,038 UART: RITY.KEYID = 7
6,258,534 UART: [art] Erasing AUTHORITY.KEYID = 7
6,259,299 UART: [art] PUB.X = F583F7ADD0BC4DF8813296FE0CE9D5FB17D31FF0A4AFAD2D7059F42A904866A487A2B8051DDD67859A0C8A1994DE21D1
6,266,076 UART: [art] PUB.Y = 237A4805E517AAD80F9BECD69BC4548918E748081B510B91B1C9B7282BAD48C9384594E71A87B6FC329A07DF0DDFC4F2
6,273,016 UART: [art] SIG.R = 228262AB06D4A86DD287F55405FA27BF2E1ACEB691F97C780E303C281B2E5668CF77D7A86C3D6D7DEB82E4216F65A7F7
6,279,787 UART: [art] SIG.S = 9898F7B59B708F007514DFBE1016D936F0DC5B88C83BB44FED30FE38C6249B63E0875F001761AA3D4696961756C551E2
6,304,136 UART: Caliptra RT
6,304,481 UART: [state] CFI Enabled
6,586,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,616,917 UART: [rt]cmd =0x41545348, len=116
6,639,644 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,264 UART:
192,620 UART: Running Caliptra ROM ...
193,765 UART:
193,903 UART: [state] CFI Enabled
265,491 UART: [state] LifecycleState = Unprovisioned
267,476 UART: [state] DebugLocked = No
269,289 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,793 UART: [kat] SHA2-256
444,531 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,019 UART: [kat] ++
455,501 UART: [kat] sha1
465,237 UART: [kat] SHA2-256
467,957 UART: [kat] SHA2-384
473,724 UART: [kat] SHA2-512-ACC
476,084 UART: [kat] ECC-384
2,768,615 UART: [kat] HMAC-384Kdf
2,799,540 UART: [kat] LMS
3,989,884 UART: [kat] --
3,993,470 UART: [cold-reset] ++
3,995,329 UART: [fht] Storing FHT @ 0x50003400
4,005,964 UART: [idev] ++
4,006,535 UART: [idev] CDI.KEYID = 6
4,007,564 UART: [idev] SUBJECT.KEYID = 7
4,008,732 UART: [idev] UDS.KEYID = 0
4,009,721 ready_for_fw is high
4,009,932 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,198 UART: [idev] Erasing UDS.KEYID = 0
7,347,967 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,638 UART: [idev] --
7,374,445 UART: [ldev] ++
7,375,067 UART: [ldev] CDI.KEYID = 6
7,376,220 UART: [ldev] SUBJECT.KEYID = 5
7,377,250 UART: [ldev] AUTHORITY.KEYID = 7
7,378,472 UART: [ldev] FE.KEYID = 1
7,424,902 UART: [ldev] Erasing FE.KEYID = 1
10,755,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,566 UART: [ldev] --
13,114,541 UART: [fwproc] Waiting for Commands...
13,117,278 UART: [fwproc] Received command 0x46574c44
13,119,450 UART: [fwproc] Received Image of size 113844 bytes
17,175,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,634,301 >>> mbox cmd response: success
17,638,863 UART: [afmc] ++
17,639,451 UART: [afmc] CDI.KEYID = 6
17,640,412 UART: [afmc] SUBJECT.KEYID = 7
17,641,620 UART: [afmc] AUTHORITY.KEYID = 5
21,006,516 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,263 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,517 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,915 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,782 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,224 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,742 UART: [afmc] --
23,379,440 UART: [cold-reset] --
23,383,078 UART: [state] Locking Datavault
23,388,156 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,905 UART: [state] Locking ICCM
23,391,022 UART: [exit] Launching FMC @ 0x40000130
23,399,412 UART:
23,399,640 UART: Running Caliptra FMC ...
23,400,731 UART:
23,400,884 UART: [state] CFI Enabled
23,469,631 UART: [fht] FMC Alias Private Key: 7
25,807,763 UART: [art] Extend RT PCRs Done
25,808,976 UART: [art] Lock RT PCRs Done
25,810,757 UART: [art] Populate DV Done
25,816,270 UART: [fht] FMC Alias Private Key: 7
25,817,787 UART: [art] Derive CDI
25,818,563 UART: [art] Store in in slot 0x4
25,870,184 UART: [art] Derive Key Pair
25,871,178 UART: [art] Store priv key in slot 0x5
29,164,270 UART: [art] Derive Key Pair - Done
29,176,981 UART: [art] Signing Cert with AUTHO
29,178,302 UART: RITY.KEYID = 7
31,466,029 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,533 UART: [art] PUB.X = 0D54B8F70AB23FA7044E140F6E2FD53D9520663F5B0F2EC20791769EB4DB1F3FF07FA6AA8900A123CE302573A0299F28
31,474,743 UART: [art] PUB.Y = 66A7E8927A9A2FB4E3CCA9EB768A49E50304E84040BC41E39BA04ED136F594C8532AE41927D43F6889C51E7884C147DE
31,482,003 UART: [art] SIG.R = 7FEB59130CA7C26CF56BDB3B1B1444C8B13B35776DC002CE444D84CF60B1D151C6B0301318FABBFFB97710228D8BEA14
31,489,446 UART: [art] SIG.S = 8D432772322DF4C7237759425D380E6F1F14D4E476CE6BD2CF54BD0D084B7ECE2B5B39BF7E36354B32216E092A94BB50
32,794,526 UART: Caliptra RT
32,795,206 UART: [state] CFI Enabled
32,956,095 UART: [rt] RT listening for mailbox commands...
32,958,478 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,113,705 UART: [rt]cmd =0x41544d4e, len=14344
38,414,011 >>> mbox cmd response data (8 bytes)
38,414,614 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,445,395 UART: [rt]cmd =0x41545348, len=116
38,447,752 >>> mbox cmd response data (12 bytes)
40,509,121 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,653,778 UART:
40,654,149 UART: Running Caliptra ROM ...
40,655,284 UART:
40,655,447 UART: [state] CFI Enabled
40,725,523 UART: [state] LifecycleState = Unprovisioned
40,727,459 UART: [state] DebugLocked = No
40,730,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,735,006 UART: [kat] SHA2-256
40,904,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,915,182 UART: [kat] ++
40,915,713 UART: [kat] sha1
40,926,004 UART: [kat] SHA2-256
40,928,689 UART: [kat] SHA2-384
40,934,940 UART: [kat] SHA2-512-ACC
40,937,332 UART: [kat] ECC-384
43,227,770 UART: [kat] HMAC-384Kdf
43,260,946 UART: [kat] LMS
44,451,285 UART: [kat] --
44,456,046 UART: [update-reset] ++
48,591,556 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,595,461 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
48,976,759 >>> mbox cmd response: success
48,981,383 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,981,970 UART: [update-reset] Copying MAN_2 To MAN_1
48,999,654 UART: [update-reset Success] --
49,005,293 UART: [state] Locking Datavault
49,009,464 UART: [state] Locking PCR0, PCR1 and PCR31
49,011,171 UART: [state] Locking ICCM
49,013,451 UART: [exit] Launching FMC @ 0x40000130
49,021,899 UART:
49,022,146 UART: Running Caliptra FMC ...
49,023,243 UART:
49,023,399 UART: [state] CFI Enabled
49,116,550 UART: [art] Extend RT PCRs Done
49,117,735 UART: [art] Lock RT PCRs Done
49,119,236 UART: [art] Populate DV Done
49,125,024 UART: [fht] FMC Alias Private Key: 7
49,126,558 UART: [art] Derive CDI
49,127,378 UART: [art] Store in in slot 0x4
49,185,492 UART: [art] Derive Key Pair
49,186,521 UART: [art] Store priv key in slot 0x5
52,480,110 UART: [art] Derive Key Pair - Done
52,493,062 UART: [art] Signing Cert with AUTHO
52,494,370 UART: RITY.KEYID = 7
54,781,489 UART: [art] Erasing AUTHORITY.KEYID = 7
54,782,997 UART: [art] PUB.X = AFF9B66202D440A5E02207B76D408C595A7BF27F3844BC3E348316EA74A38E13A3326CAFF342B1C80B310FD05EDDF281
54,790,252 UART: [art] PUB.Y = 51DA4E95909AD50E9127EEFE42DF1AB190A7EDE534CA9DAA8270C6AC8164C8CB261F293A79AC17B00B79559E2C07EE4C
54,797,536 UART: [art] SIG.R = A4A7DB820FCFE56466B559D053AF58637E01F2548CD32EAB86B5A524B0176180244781C78B7C6B2E132CAFAA94CFE9D0
54,804,892 UART: [art] SIG.S = 71B4F5423D312912246635B1CDCC8F2C7244DF04EBCC23685BDA2C67DE7882799A16EB4F3296E0977D2D79793AC85355
56,110,456 UART: Caliptra RT
56,111,171 UART: [state] CFI Enabled
56,442,975 UART: [rt] RT listening for mailbox commands...
56,474,702 UART: [rt]cmd =0x41545348, len=116
56,476,913 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,804,391 ready_for_fw is high
3,804,949 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,838,535 >>> mbox cmd response: success
23,522,325 UART:
23,522,706 UART: Running Caliptra FMC ...
23,523,806 UART:
23,523,955 UART: [state] CFI Enabled
23,591,670 UART: [fht] FMC Alias Private Key: 7
25,929,122 UART: [art] Extend RT PCRs Done
25,930,350 UART: [art] Lock RT PCRs Done
25,932,111 UART: [art] Populate DV Done
25,937,429 UART: [fht] FMC Alias Private Key: 7
25,938,961 UART: [art] Derive CDI
25,939,704 UART: [art] Store in in slot 0x4
25,999,305 UART: [art] Derive Key Pair
26,000,297 UART: [art] Store priv key in slot 0x5
29,292,868 UART: [art] Derive Key Pair - Done
29,305,851 UART: [art] Signing Cert with AUTHO
29,307,185 UART: RITY.KEYID = 7
31,593,953 UART: [art] Erasing AUTHORITY.KEYID = 7
31,595,458 UART: [art] PUB.X = 91270DE1942E370529AFB8388EB1E54AB91D829C857A752866042617C14C5FF2D4ED77B6FED134B0752691932C3273D6
31,602,718 UART: [art] PUB.Y = 22E197930A565B25D915BAC6BD324B697912EC21888B040B2CAD22486C674642E4837E0624E8AFC1118D8BCE28134981
31,609,902 UART: [art] SIG.R = 44E1E31D823B26721B648BE8287650D00DC150DEBF158E4A1CBD571F477787850E904AC0B88B8113089826950176F8C9
31,617,260 UART: [art] SIG.S = CF43A41118BB2EB091922DC10DADAE0DA14081B2823F27DBAC3DA52C645BD345DB00BE9CC0EFB5AF7785DBE09BDCA24F
32,922,062 UART: Caliptra RT
32,922,771 UART: [state] CFI Enabled
33,083,348 UART: [rt] RT listening for mailbox commands...
33,085,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,240,808 UART: [rt]cmd =0x41544d4e, len=14344
38,541,301 >>> mbox cmd response data (8 bytes)
38,541,859 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,572,480 UART: [rt]cmd =0x41545348, len=116
38,574,354 >>> mbox cmd response data (12 bytes)
40,633,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,356,295 >>> mbox cmd response: success
49,356,868 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,392,048 UART:
49,392,370 UART: Running Caliptra FMC ...
49,393,510 UART:
49,393,666 UART: [state] CFI Enabled
49,496,084 UART: [art] Extend RT PCRs Done
49,497,292 UART: [art] Lock RT PCRs Done
49,499,122 UART: [art] Populate DV Done
49,504,427 UART: [fht] FMC Alias Private Key: 7
49,505,961 UART: [art] Derive CDI
49,506,770 UART: [art] Store in in slot 0x4
49,565,773 UART: [art] Derive Key Pair
49,566,831 UART: [art] Store priv key in slot 0x5
52,859,402 UART: [art] Derive Key Pair - Done
52,871,755 UART: [art] Signing Cert with AUTHO
52,873,051 UART: RITY.KEYID = 7
55,161,250 UART: [art] Erasing AUTHORITY.KEYID = 7
55,162,757 UART: [art] PUB.X = 469BE667CCBD3E70A3C5150F1DDB1A3AD5FE94ED89F0E5EB9B8909C5C1FA5E58E6125D375C11A38BD62CFA7725C6F978
55,170,059 UART: [art] PUB.Y = F22C0800935822667CFF29EE5A46E9B2EB1BA392B4E2F7BDDECFB1480A1E5BBF4B8B74D19B910FA17671AD8DF1F0DECA
55,177,303 UART: [art] SIG.R = DEB53FE058ED1F5DF936A3738BD8420A838138B5D6C0B5E684E5EF0D974A08DA3E63B5221D301C82C0070108E206A1D3
55,184,699 UART: [art] SIG.S = B4AD454286B5BC465A777C77FC26A051A8282E7783C691F4138FCB6325388F7674AE3046926EC07B21FA299B7A839E83
56,490,333 UART: Caliptra RT
56,491,032 UART: [state] CFI Enabled
56,843,638 UART: [rt] RT listening for mailbox commands...
56,875,562 UART: [rt]cmd =0x41545348, len=116
56,877,691 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,425 UART:
192,867 UART: Running Caliptra ROM ...
194,023 UART:
603,633 UART: [state] CFI Enabled
619,290 UART: [state] LifecycleState = Unprovisioned
621,251 UART: [state] DebugLocked = No
623,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,955 UART: [kat] SHA2-256
798,691 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,287 UART: [kat] ++
809,814 UART: [kat] sha1
820,551 UART: [kat] SHA2-256
823,267 UART: [kat] SHA2-384
829,963 UART: [kat] SHA2-512-ACC
832,350 UART: [kat] ECC-384
3,117,235 UART: [kat] HMAC-384Kdf
3,129,701 UART: [kat] LMS
4,319,823 UART: [kat] --
4,324,679 UART: [cold-reset] ++
4,327,173 UART: [fht] Storing FHT @ 0x50003400
4,337,653 UART: [idev] ++
4,338,236 UART: [idev] CDI.KEYID = 6
4,339,158 UART: [idev] SUBJECT.KEYID = 7
4,340,401 UART: [idev] UDS.KEYID = 0
4,341,385 ready_for_fw is high
4,341,593 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,501 UART: [idev] Erasing UDS.KEYID = 0
7,627,163 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,855 UART: [idev] --
7,652,175 UART: [ldev] ++
7,652,751 UART: [ldev] CDI.KEYID = 6
7,653,767 UART: [ldev] SUBJECT.KEYID = 5
7,654,926 UART: [ldev] AUTHORITY.KEYID = 7
7,656,254 UART: [ldev] FE.KEYID = 1
7,668,128 UART: [ldev] Erasing FE.KEYID = 1
10,952,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,085 UART: [ldev] --
13,312,260 UART: [fwproc] Waiting for Commands...
13,314,352 UART: [fwproc] Received command 0x46574c44
13,316,539 UART: [fwproc] Received Image of size 113844 bytes
17,364,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,407 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,826,398 >>> mbox cmd response: success
17,830,580 UART: [afmc] ++
17,831,171 UART: [afmc] CDI.KEYID = 6
17,832,138 UART: [afmc] SUBJECT.KEYID = 7
17,833,353 UART: [afmc] AUTHORITY.KEYID = 5
21,148,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,910 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,219 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,556 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,406 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,835 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,414 UART: [afmc] --
23,516,604 UART: [cold-reset] --
23,520,142 UART: [state] Locking Datavault
23,525,986 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,740 UART: [state] Locking ICCM
23,530,001 UART: [exit] Launching FMC @ 0x40000130
23,538,404 UART:
23,538,646 UART: Running Caliptra FMC ...
23,539,749 UART:
23,539,916 UART: [state] CFI Enabled
23,547,966 UART: [fht] FMC Alias Private Key: 7
25,878,928 UART: [art] Extend RT PCRs Done
25,880,145 UART: [art] Lock RT PCRs Done
25,881,855 UART: [art] Populate DV Done
25,887,338 UART: [fht] FMC Alias Private Key: 7
25,888,982 UART: [art] Derive CDI
25,889,721 UART: [art] Store in in slot 0x4
25,932,253 UART: [art] Derive Key Pair
25,933,253 UART: [art] Store priv key in slot 0x5
29,175,247 UART: [art] Derive Key Pair - Done
29,188,502 UART: [art] Signing Cert with AUTHO
29,189,793 UART: RITY.KEYID = 7
31,469,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,902 UART: [art] PUB.X = 37FC5B19C843AAD826E01038B4B5B2BF3B0C752D3FAD8892AC57406132282B163ADEAB4C4950707F68EB568B87810C17
31,478,188 UART: [art] PUB.Y = DD82B7707A0553DBD9B5DF57FEB444B5BE52FCB7A40147F87AC02BBB6A86EAFB5F1FAB7A8FD25E54640517753A2806C4
31,485,450 UART: [art] SIG.R = 3F37096126A12223B0CE5DDDAD125F7ACFE25856159BA853CA371192A1A70009E72DC4EAC73A960162289922A92F2C86
31,492,797 UART: [art] SIG.S = C7E222F5FC1E40F5D13560A4998DDF0140B7012BBA82813E27BE6D044732C1C64873CF1E92F1119ADFE2DC9EF26DF360
32,797,996 UART: Caliptra RT
32,798,687 UART: [state] CFI Enabled
32,916,190 UART: [rt] RT listening for mailbox commands...
32,918,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,074,012 UART: [rt]cmd =0x41544d4e, len=14344
38,374,494 >>> mbox cmd response data (8 bytes)
38,375,157 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,405,787 UART: [rt]cmd =0x41545348, len=116
38,407,826 >>> mbox cmd response data (12 bytes)
40,539,743 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
40,684,431 UART:
40,684,823 UART: Running Caliptra ROM ...
40,685,877 UART:
40,686,086 UART: [state] CFI Enabled
40,699,126 UART: [state] LifecycleState = Unprovisioned
40,701,023 UART: [state] DebugLocked = No
40,703,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,708,147 UART: [kat] SHA2-256
40,877,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,888,387 UART: [kat] ++
40,888,841 UART: [kat] sha1
40,899,565 UART: [kat] SHA2-256
40,902,254 UART: [kat] SHA2-384
40,908,129 UART: [kat] SHA2-512-ACC
40,910,529 UART: [kat] ECC-384
43,194,698 UART: [kat] HMAC-384Kdf
43,206,925 UART: [kat] LMS
44,396,995 UART: [kat] --
44,401,542 UART: [update-reset] ++
48,538,479 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,541,933 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
48,923,215 >>> mbox cmd response: success
48,927,966 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
48,928,565 UART: [update-reset] Copying MAN_2 To MAN_1
48,947,505 UART: [update-reset Success] --
48,952,285 UART: [state] Locking Datavault
48,955,321 UART: [state] Locking PCR0, PCR1 and PCR31
48,957,072 UART: [state] Locking ICCM
48,959,297 UART: [exit] Launching FMC @ 0x40000130
48,967,713 UART:
48,967,951 UART: Running Caliptra FMC ...
48,969,051 UART:
48,969,217 UART: [state] CFI Enabled
49,013,178 UART: [art] Extend RT PCRs Done
49,014,373 UART: [art] Lock RT PCRs Done
49,015,776 UART: [art] Populate DV Done
49,021,377 UART: [fht] FMC Alias Private Key: 7
49,022,972 UART: [art] Derive CDI
49,023,788 UART: [art] Store in in slot 0x4
49,066,706 UART: [art] Derive Key Pair
49,067,706 UART: [art] Store priv key in slot 0x5
52,310,015 UART: [art] Derive Key Pair - Done
52,323,456 UART: [art] Signing Cert with AUTHO
52,324,756 UART: RITY.KEYID = 7
54,604,457 UART: [art] Erasing AUTHORITY.KEYID = 7
54,605,991 UART: [art] PUB.X = 810244B64AF4E0E8DBFEB6FC96A03B4A8025B3A7C48C563B3AB4B2421F81BE4688EF92E44E0D4DBBD34027B8D2A542B2
54,613,251 UART: [art] PUB.Y = 1767825B76216C1DE35635159D8F52594557545FDA94A15A606C59025873AACC51D990D5C67BF4884DA96DAF743FDF7C
54,620,505 UART: [art] SIG.R = CBE437506BF416F23874B7FA467A2848349ED1E6FEA3FF0EF84AF37ED90C260572904DB3026CBFB666B23946A53CBC38
54,627,851 UART: [art] SIG.S = 7CC52228FE8D0904D38969346B2E9FEC98B19817F1512B943146AA98AF1DF5AEC9127EFE65D0CF7F6F9EED79A823E5C2
55,933,449 UART: Caliptra RT
55,934,146 UART: [state] CFI Enabled
56,219,109 UART: [rt] RT listening for mailbox commands...
56,250,737 UART: [rt]cmd =0x41545348, len=116
56,253,035 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,125,030 ready_for_fw is high
4,125,443 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,054,314 >>> mbox cmd response: success
23,692,965 UART:
23,693,423 UART: Running Caliptra FMC ...
23,694,564 UART:
23,694,726 UART: [state] CFI Enabled
23,703,078 UART: [fht] FMC Alias Private Key: 7
26,033,205 UART: [art] Extend RT PCRs Done
26,034,432 UART: [art] Lock RT PCRs Done
26,035,950 UART: [art] Populate DV Done
26,041,528 UART: [fht] FMC Alias Private Key: 7
26,043,123 UART: [art] Derive CDI
26,043,888 UART: [art] Store in in slot 0x4
26,086,716 UART: [art] Derive Key Pair
26,087,764 UART: [art] Store priv key in slot 0x5
29,329,357 UART: [art] Derive Key Pair - Done
29,342,582 UART: [art] Signing Cert with AUTHO
29,343,898 UART: RITY.KEYID = 7
31,623,663 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,175 UART: [art] PUB.X = 1E3DC2FEE8A7DC33C58CD77E14BAEC67F7E7EAE3902EB1875AFEE2998A037407993A5C2E4FC85AE2886995867E846031
31,632,440 UART: [art] PUB.Y = 1599061AA995F186BB7B38A88E28A2A5C734EAEAC8C2945AE0FDAB4B7627491F7E7D076E22F64D2905C8358503DF49C1
31,639,707 UART: [art] SIG.R = F028CBD99A8A9A35365C01FF0DBA74D57BB5EA10A2CB2E129C71A7AB16AFFF5409AA8B29FA25F6CC70CFF529E114A3C9
31,647,102 UART: [art] SIG.S = 256F12C51939D18C968DF765F2B24A910DC3729747285A14E0100B0ABD07774493E011AADB933D2F2D45D58607C24330
32,952,231 UART: Caliptra RT
32,952,924 UART: [state] CFI Enabled
33,070,627 UART: [rt] RT listening for mailbox commands...
33,073,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,228,496 UART: [rt]cmd =0x41544d4e, len=14344
38,529,433 >>> mbox cmd response data (8 bytes)
38,530,026 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,560,813 UART: [rt]cmd =0x41545348, len=116
38,562,801 >>> mbox cmd response data (12 bytes)
40,693,538 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
49,340,413 >>> mbox cmd response: success
49,340,971 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,375,720 UART:
49,376,051 UART: Running Caliptra FMC ...
49,377,206 UART:
49,377,389 UART: [state] CFI Enabled
49,421,041 UART: [art] Extend RT PCRs Done
49,422,199 UART: [art] Lock RT PCRs Done
49,423,628 UART: [art] Populate DV Done
49,429,363 UART: [fht] FMC Alias Private Key: 7
49,430,902 UART: [art] Derive CDI
49,431,666 UART: [art] Store in in slot 0x4
49,474,214 UART: [art] Derive Key Pair
49,475,257 UART: [art] Store priv key in slot 0x5
52,716,703 UART: [art] Derive Key Pair - Done
52,729,805 UART: [art] Signing Cert with AUTHO
52,731,138 UART: RITY.KEYID = 7
55,010,468 UART: [art] Erasing AUTHORITY.KEYID = 7
55,011,977 UART: [art] PUB.X = B1B1D4D425979C9E505C4326B73DFADB89EFD7D6BEDBB58018085044D65018675E97A7CC48F836783564A0E130BCBEB9
55,019,179 UART: [art] PUB.Y = 85EB43940CFC8841B005EEBF226E69307889E08E569F946FBEE13B7CCFD79CE932DF82DEF29653D0CE7D03D512D95C88
55,026,472 UART: [art] SIG.R = 7107EBFCDD8D5E648B914961CCD22F7D17491AEA36F67A6D4B04B6E19DECE750D7D56D349B2E04B820ABAC39A3CB9911
55,033,874 UART: [art] SIG.S = 63132D52D3AE1776D26E63F020803781D3F100AA0481EC52DB21F47741472848BDBA457068DE144352E4E7FDAFFD63AD
56,338,955 UART: Caliptra RT
56,339,669 UART: [state] CFI Enabled
56,627,134 UART: [rt] RT listening for mailbox commands...
56,658,845 UART: [rt]cmd =0x41545348, len=116
56,661,065 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,188 UART:
192,559 UART: Running Caliptra ROM ...
193,759 UART:
193,917 UART: [state] CFI Enabled
261,470 UART: [state] LifecycleState = Unprovisioned
263,397 UART: [state] DebugLocked = No
265,714 UART: [state] WD Timer not started. Device not locked for debugging
269,611 UART: [kat] SHA2-256
448,740 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,308 UART: [kat] ++
460,956 UART: [kat] sha1
471,693 UART: [kat] SHA2-256
474,716 UART: [kat] SHA2-384
482,199 UART: [kat] SHA2-512-ACC
485,133 UART: [kat] ECC-384
2,945,209 UART: [kat] HMAC-384Kdf
2,969,039 UART: [kat] LMS
3,498,540 UART: [kat] --
3,503,355 UART: [cold-reset] ++
3,504,625 UART: [fht] FHT @ 0x50003400
3,514,998 UART: [idev] ++
3,515,568 UART: [idev] CDI.KEYID = 6
3,516,482 UART: [idev] SUBJECT.KEYID = 7
3,517,652 UART: [idev] UDS.KEYID = 0
3,518,582 ready_for_fw is high
3,518,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,662,469 UART: [idev] Erasing UDS.KEYID = 0
6,020,257 UART: [idev] Sha1 KeyId Algorithm
6,043,820 UART: [idev] --
6,049,221 UART: [ldev] ++
6,049,794 UART: [ldev] CDI.KEYID = 6
6,050,683 UART: [ldev] SUBJECT.KEYID = 5
6,051,897 UART: [ldev] AUTHORITY.KEYID = 7
6,053,135 UART: [ldev] FE.KEYID = 1
6,097,250 UART: [ldev] Erasing FE.KEYID = 1
8,601,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,511 UART: [ldev] --
10,411,809 UART: [fwproc] Wait for Commands...
10,414,333 UART: [fwproc] Recv command 0x46574c44
10,416,428 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,274,647 >>> mbox cmd response: success
14,278,567 UART: [afmc] ++
14,279,169 UART: [afmc] CDI.KEYID = 6
14,280,086 UART: [afmc] SUBJECT.KEYID = 7
14,281,255 UART: [afmc] AUTHORITY.KEYID = 5
16,806,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,549 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,531 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,384 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,233 UART: [afmc] --
18,603,728 UART: [cold-reset] --
18,609,375 UART: [state] Locking Datavault
18,613,544 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,192 UART: [state] Locking ICCM
18,616,210 UART: [exit] Launching FMC @ 0x40000130
18,624,611 UART:
18,624,888 UART: Running Caliptra FMC ...
18,626,000 UART:
18,626,169 UART: [state] CFI Enabled
18,686,986 UART: [fht] FMC Alias Private Key: 7
20,450,498 UART: [art] Extend RT PCRs Done
20,451,711 UART: [art] Lock RT PCRs Done
20,453,334 UART: [art] Populate DV Done
20,458,693 UART: [fht] FMC Alias Private Key: 7
20,460,338 UART: [art] Derive CDI
20,461,354 UART: [art] Store in in slot 0x4
20,519,110 UART: [art] Derive Key Pair
20,520,108 UART: [art] Store priv key in slot 0x5
22,982,633 UART: [art] Derive Key Pair - Done
22,995,624 UART: [art] Signing Cert with AUTHO
22,996,928 UART: RITY.KEYID = 7
24,708,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,167 UART: [art] PUB.X = 3CB9732B28C567704968A6BD47BC9A8C49C1B72B70973AF08F53ED2CA4E2B46A62FEDE08820FC072C466DCA398294E2F
24,717,427 UART: [art] PUB.Y = AC3DBB6C4B095E16A13260B80746D2B407BC2A43DBAF1D294F0D0179E716321ABD8AC523CD39835E018FFE4D9F0CF726
24,724,735 UART: [art] SIG.R = 3257743146DBBA9BF8C43CEC381C5D4DB96EC11C780A754F2770606DF4665339A3F64385D002495A98B48A9A48431040
24,732,077 UART: [art] SIG.S = 3F1135CE955BA6FFFECB2B4463E44A142F5D08FBDF6096F86F8738C3DED00593976BEB9BFB0CA72FAEC11A90715D22F2
25,711,191 UART: Caliptra RT
25,711,884 UART: [state] CFI Enabled
25,875,769 UART: [rt] RT listening for mailbox commands...
25,878,171 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,033,669 UART: [rt]cmd =0x41544d4e, len=14344
30,029,904 >>> mbox cmd response data (8 bytes)
30,030,506 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,061,308 UART: [rt]cmd =0x41545348, len=116
30,063,709 >>> mbox cmd response data (12 bytes)
32,117,278 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,262,689 UART:
32,263,077 UART: Running Caliptra ROM ...
32,264,167 UART:
32,264,337 UART: [state] CFI Enabled
32,340,192 UART: [state] LifecycleState = Unprovisioned
32,342,083 UART: [state] DebugLocked = No
32,344,933 UART: [state] WD Timer not started. Device not locked for debugging
32,348,092 UART: [kat] SHA2-256
32,527,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,538,790 UART: [kat] ++
32,539,248 UART: [kat] sha1
32,550,565 UART: [kat] SHA2-256
32,553,570 UART: [kat] SHA2-384
32,560,051 UART: [kat] SHA2-512-ACC
32,563,001 UART: [kat] ECC-384
35,025,494 UART: [kat] HMAC-384Kdf
35,048,000 UART: [kat] LMS
35,577,431 UART: [kat] --
35,580,396 UART: [update-reset] ++
39,003,872 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,008,026 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,390,364 >>> mbox cmd response: success
39,390,809 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,391,238 UART: [update-reset] Copying MAN_2 To MAN_1
39,413,026 UART: [update-reset Success] --
39,416,240 UART: [state] Locking Datavault
39,418,735 UART: [state] Locking PCR0, PCR1 and PCR31
39,420,389 UART: [state] Locking ICCM
39,422,449 UART: [exit] Launching FMC @ 0x40000130
39,430,869 UART:
39,431,106 UART: Running Caliptra FMC ...
39,432,134 UART:
39,432,280 UART: [state] CFI Enabled
39,539,066 UART: [art] Extend RT PCRs Done
39,540,252 UART: [art] Lock RT PCRs Done
39,541,578 UART: [art] Populate DV Done
39,546,775 UART: [fht] FMC Alias Private Key: 7
39,548,368 UART: [art] Derive CDI
39,549,114 UART: [art] Store in in slot 0x4
39,608,124 UART: [art] Derive Key Pair
39,609,209 UART: [art] Store priv key in slot 0x5
42,072,043 UART: [art] Derive Key Pair - Done
42,085,205 UART: [art] Signing Cert with AUTHO
42,086,515 UART: RITY.KEYID = 7
43,798,009 UART: [art] Erasing AUTHORITY.KEYID = 7
43,799,520 UART: [art] PUB.X = AA8DBF39DE2E5461B5A5BD8AE0877E7BFEDFCD182D5CCD924CF534683B0C71F0A6FE4C1CB096C58BC88FD79177D3780F
43,806,854 UART: [art] PUB.Y = DEA31C0A16BABC5507439E88AB021EEC254D43CE87C9CB94700192FA679F10506E87AED8CF0C1EC03EC786D45EFECB4F
43,814,112 UART: [art] SIG.R = D219A1CCDA72A9B31BEA7186682308E9D7E084CE0A4E93ACAD54C501EED75710A0611794DBCABC3F9F08C7584C418286
43,821,556 UART: [art] SIG.S = 8B14EC3113F8614A07BDBF4FBAE89B22ED03A1825687090B7E6DA36F5FEBBF003D08B051704C7B36AE99AB26210804E6
44,801,154 UART: Caliptra RT
44,801,870 UART: [state] CFI Enabled
45,135,821 UART: [rt] RT listening for mailbox commands...
45,168,014 UART: [rt]cmd =0x41545348, len=116
45,170,376 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,379,302 ready_for_fw is high
3,379,720 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,040,644 >>> mbox cmd response: success
18,318,775 UART:
18,319,189 UART: Running Caliptra FMC ...
18,320,388 UART:
18,320,556 UART: [state] CFI Enabled
18,389,031 UART: [fht] FMC Alias Private Key: 7
20,152,989 UART: [art] Extend RT PCRs Done
20,154,207 UART: [art] Lock RT PCRs Done
20,156,023 UART: [art] Populate DV Done
20,161,486 UART: [fht] FMC Alias Private Key: 7
20,163,186 UART: [art] Derive CDI
20,164,000 UART: [art] Store in in slot 0x4
20,221,641 UART: [art] Derive Key Pair
20,222,687 UART: [art] Store priv key in slot 0x5
22,685,483 UART: [art] Derive Key Pair - Done
22,698,259 UART: [art] Signing Cert with AUTHO
22,699,564 UART: RITY.KEYID = 7
24,411,644 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,175 UART: [art] PUB.X = ED598A88235247897A4C410CAE7933583042A1580E71A80B762434410A8F3F63FAE4ABA1F59F982732B6B4A18B7F6E3A
24,420,419 UART: [art] PUB.Y = 08D4501ED8339FA385ECE8830CED68BCFF7DD51539F69163942974287CE965546EAAC64380F889AB8545758296A6D492
24,427,698 UART: [art] SIG.R = AEC236A04DD4B3D1338F79007161E37D9F11F109BA76753D6B1D3D05169B24301DD2520D59CBE01C2D4DF7E48A37D47B
24,435,033 UART: [art] SIG.S = 1B36F0EE5875A595832B081D31339A6F041366FA5B157973BF9FBB60C98DEB99D1FD5A106D73037D6390F038B3C0C15A
25,413,969 UART: Caliptra RT
25,414,661 UART: [state] CFI Enabled
25,580,529 UART: [rt] RT listening for mailbox commands...
25,582,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,738,195 UART: [rt]cmd =0x41544d4e, len=14344
29,733,852 >>> mbox cmd response data (8 bytes)
29,734,420 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,764,989 UART: [rt]cmd =0x41545348, len=116
29,767,250 >>> mbox cmd response data (12 bytes)
31,825,237 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,951,241 >>> mbox cmd response: success
38,951,815 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,985,125 UART:
38,985,457 UART: Running Caliptra FMC ...
38,986,587 UART:
38,986,752 UART: [state] CFI Enabled
39,092,277 UART: [art] Extend RT PCRs Done
39,093,473 UART: [art] Lock RT PCRs Done
39,094,823 UART: [art] Populate DV Done
39,100,400 UART: [fht] FMC Alias Private Key: 7
39,101,882 UART: [art] Derive CDI
39,102,651 UART: [art] Store in in slot 0x4
39,160,964 UART: [art] Derive Key Pair
39,162,000 UART: [art] Store priv key in slot 0x5
41,624,438 UART: [art] Derive Key Pair - Done
41,637,605 UART: [art] Signing Cert with AUTHO
41,638,906 UART: RITY.KEYID = 7
43,350,605 UART: [art] Erasing AUTHORITY.KEYID = 7
43,352,122 UART: [art] PUB.X = 9F52353D071B70541EB90336205F37930AE07F0A7EAAD31296D4F10536915B29047F9E3D8303295C2660333D3FF25D96
43,359,372 UART: [art] PUB.Y = B4647574AB79686EF69A5F51139A8AB0D3A01855FD4D8C577A126FF7B13DC58405F593885D24C3E1ADB63077AF662E33
43,366,595 UART: [art] SIG.R = 1F8AA6167DB1A3D04FFAD4CFD117D3F5204BBCAB8A876325C6C4B5F7B4841FA32200A1B3D1C24753F1379A7BF9C9D980
43,373,979 UART: [art] SIG.S = CE1D5E75564DD9EDC321D249A80EE812ED9E8A6C368BFC54023628BBC51A619144ECECF78D55109A04F2962D8F7CB089
44,352,958 UART: Caliptra RT
44,353,678 UART: [state] CFI Enabled
44,690,128 UART: [rt] RT listening for mailbox commands...
44,722,035 UART: [rt]cmd =0x41545348, len=116
44,724,236 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,158 writing to cptra_bootfsm_go
204,594 UART:
204,957 UART: Running Caliptra ROM ...
206,173 UART:
615,605 UART: [state] CFI Enabled
628,562 UART: [state] LifecycleState = Unprovisioned
630,372 UART: [state] DebugLocked = No
632,535 UART: [state] WD Timer not started. Device not locked for debugging
636,210 UART: [kat] SHA2-256
815,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
826,941 UART: [kat] ++
827,468 UART: [kat] sha1
838,634 UART: [kat] SHA2-256
841,662 UART: [kat] SHA2-384
848,220 UART: [kat] SHA2-512-ACC
851,156 UART: [kat] ECC-384
3,290,729 UART: [kat] HMAC-384Kdf
3,304,103 UART: [kat] LMS
3,833,571 UART: [kat] --
3,839,627 UART: [cold-reset] ++
3,842,123 UART: [fht] FHT @ 0x50003400
3,853,048 UART: [idev] ++
3,853,654 UART: [idev] CDI.KEYID = 6
3,854,539 UART: [idev] SUBJECT.KEYID = 7
3,855,717 UART: [idev] UDS.KEYID = 0
3,856,646 ready_for_fw is high
3,856,847 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,097 UART: [idev] Erasing UDS.KEYID = 0
6,329,289 UART: [idev] Sha1 KeyId Algorithm
6,352,862 UART: [idev] --
6,357,344 UART: [ldev] ++
6,357,913 UART: [ldev] CDI.KEYID = 6
6,358,835 UART: [ldev] SUBJECT.KEYID = 5
6,359,994 UART: [ldev] AUTHORITY.KEYID = 7
6,361,221 UART: [ldev] FE.KEYID = 1
6,373,274 UART: [ldev] Erasing FE.KEYID = 1
8,851,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,792 UART: [ldev] --
10,641,516 UART: [fwproc] Wait for Commands...
10,643,392 UART: [fwproc] Recv command 0x46574c44
10,645,485 UART: [fwproc] Recv'd Img size: 114168 bytes
14,055,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,129,921 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,198,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,515,617 >>> mbox cmd response: success
14,519,504 UART: [afmc] ++
14,520,101 UART: [afmc] CDI.KEYID = 6
14,520,994 UART: [afmc] SUBJECT.KEYID = 7
14,522,211 UART: [afmc] AUTHORITY.KEYID = 5
17,022,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,744,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,745,868 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,761,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,777,704 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,793,531 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,816,290 UART: [afmc] --
18,819,518 UART: [cold-reset] --
18,824,319 UART: [state] Locking Datavault
18,829,351 UART: [state] Locking PCR0, PCR1 and PCR31
18,831,052 UART: [state] Locking ICCM
18,833,693 UART: [exit] Launching FMC @ 0x40000130
18,842,090 UART:
18,842,328 UART: Running Caliptra FMC ...
18,843,432 UART:
18,843,597 UART: [state] CFI Enabled
18,851,972 UART: [fht] FMC Alias Private Key: 7
20,608,584 UART: [art] Extend RT PCRs Done
20,609,779 UART: [art] Lock RT PCRs Done
20,611,503 UART: [art] Populate DV Done
20,617,130 UART: [fht] FMC Alias Private Key: 7
20,618,668 UART: [art] Derive CDI
20,619,483 UART: [art] Store in in slot 0x4
20,662,619 UART: [art] Derive Key Pair
20,663,680 UART: [art] Store priv key in slot 0x5
23,090,131 UART: [art] Derive Key Pair - Done
23,103,355 UART: [art] Signing Cert with AUTHO
23,104,656 UART: RITY.KEYID = 7
24,809,980 UART: [art] Erasing AUTHORITY.KEYID = 7
24,811,481 UART: [art] PUB.X = 5C291CE9ADE089FD639C693D587C45054F3C9497213655E2CEA6BCB3DA7CC769450A86D7D8D647ACE022A1E283091FDA
24,818,737 UART: [art] PUB.Y = 450AF6C4CA3CE3232F2156ACD980DC105AD790382A5DED8CEDE81AE06A4E4BB479268142BB489D7598B9DF6161F3CC99
24,826,029 UART: [art] SIG.R = 0F3E1C897692D059F15F9031D516AEC33FD78F39387C992F88B9D11EB789BD5D16DE739120F534170D82BB2297EF40F7
24,833,385 UART: [art] SIG.S = 4B5F68A564E70F8A747B721A82FCE0BB939AF9E31239C89CED2683C3C00A4306B85EB618741BBC5ACD4B075522F3EE03
25,812,644 UART: Caliptra RT
25,813,366 UART: [state] CFI Enabled
25,930,481 UART: [rt] RT listening for mailbox commands...
25,932,876 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,088,175 UART: [rt]cmd =0x41544d4e, len=14344
30,083,705 >>> mbox cmd response data (8 bytes)
30,084,448 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,115,335 UART: [rt]cmd =0x41545348, len=116
30,117,656 >>> mbox cmd response data (12 bytes)
32,170,800 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,316,040 UART:
32,316,406 UART: Running Caliptra ROM ...
32,317,495 UART:
32,317,660 UART: [state] CFI Enabled
32,334,600 UART: [state] LifecycleState = Unprovisioned
32,336,488 UART: [state] DebugLocked = No
32,338,370 UART: [state] WD Timer not started. Device not locked for debugging
32,342,816 UART: [kat] SHA2-256
32,521,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
32,533,556 UART: [kat] ++
32,534,097 UART: [kat] sha1
32,546,183 UART: [kat] SHA2-256
32,549,249 UART: [kat] SHA2-384
32,555,392 UART: [kat] SHA2-512-ACC
32,558,340 UART: [kat] ECC-384
34,999,311 UART: [kat] HMAC-384Kdf
35,010,203 UART: [kat] LMS
35,539,726 UART: [kat] --
35,544,717 UART: [update-reset] ++
38,972,815 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,976,688 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,358,995 >>> mbox cmd response: success
39,359,426 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,360,351 UART: [update-reset] Copying MAN_2 To MAN_1
39,382,689 UART: [update-reset Success] --
39,387,463 UART: [state] Locking Datavault
39,391,220 UART: [state] Locking PCR0, PCR1 and PCR31
39,392,864 UART: [state] Locking ICCM
39,394,122 UART: [exit] Launching FMC @ 0x40000130
39,402,570 UART:
39,402,805 UART: Running Caliptra FMC ...
39,403,844 UART:
39,403,990 UART: [state] CFI Enabled
39,448,226 UART: [art] Extend RT PCRs Done
39,449,442 UART: [art] Lock RT PCRs Done
39,450,824 UART: [art] Populate DV Done
39,456,345 UART: [fht] FMC Alias Private Key: 7
39,457,991 UART: [art] Derive CDI
39,458,723 UART: [art] Store in in slot 0x4
39,501,259 UART: [art] Derive Key Pair
39,502,303 UART: [art] Store priv key in slot 0x5
41,929,255 UART: [art] Derive Key Pair - Done
41,942,159 UART: [art] Signing Cert with AUTHO
41,943,459 UART: RITY.KEYID = 7
43,649,213 UART: [art] Erasing AUTHORITY.KEYID = 7
43,650,721 UART: [art] PUB.X = A9C77A924044B4F4F68B864129162C940C8C3BFF38A3759CE3A44854FBCBF6B8311719905AE5840E018FE5ABA4BD6A14
43,657,977 UART: [art] PUB.Y = 770725093B8C0897AB9E8EDF4FE692E9375FB87C4663DE26414FD28124A2FA3E4C0CD172F9A9F2A242A3914BA6C61E58
43,665,208 UART: [art] SIG.R = 999258EB3D28169F79EB230CC2E46C7BFD9A6BA01367BCA842311B376598028518092BAC5D3BD5B732583CFFAF11B715
43,672,598 UART: [art] SIG.S = 5A0D69A2E9CF13745BE937205100220CD9E2F3DE1BFE077130A86B56A01CA47956E73E2F03BA35D56547950F414B9D5C
44,651,180 UART: Caliptra RT
44,651,861 UART: [state] CFI Enabled
44,940,664 UART: [rt] RT listening for mailbox commands...
44,972,554 UART: [rt]cmd =0x41545348, len=116
44,974,934 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,749 writing to cptra_bootfsm_go
3,695,620 ready_for_fw is high
3,696,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,579 >>> mbox cmd response: success
18,520,627 UART:
18,521,020 UART: Running Caliptra FMC ...
18,522,159 UART:
18,522,326 UART: [state] CFI Enabled
18,530,168 UART: [fht] FMC Alias Private Key: 7
20,287,135 UART: [art] Extend RT PCRs Done
20,288,350 UART: [art] Lock RT PCRs Done
20,289,942 UART: [art] Populate DV Done
20,295,350 UART: [fht] FMC Alias Private Key: 7
20,297,107 UART: [art] Derive CDI
20,297,921 UART: [art] Store in in slot 0x4
20,340,189 UART: [art] Derive Key Pair
20,341,227 UART: [art] Store priv key in slot 0x5
22,768,519 UART: [art] Derive Key Pair - Done
22,781,513 UART: [art] Signing Cert with AUTHO
22,782,811 UART: RITY.KEYID = 7
24,488,136 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,641 UART: [art] PUB.X = 20D1242F37368241FEBBA3012DABAF468FD4A0069FD55F32EB28860DBAB779D0DC116C0E2DC691F0F7B46A3264493306
24,496,892 UART: [art] PUB.Y = DD1530A92EC8F740972DB09AC80D1C5E81793ADF1495B139DF516F27D63760DA78F1A442D08DB5F26555E46F35F422B8
24,504,155 UART: [art] SIG.R = 784AB2F049A8DC1B46B3D4379643D64A2CFF82D9FDB76F1F5E6856577599395480FAAEEFBAD69F5900B1E218710A4365
24,511,555 UART: [art] SIG.S = 922941F1B215038CCB68D62B23F558360033F295806A989673B5A53190FE463652C4E26B45B56F7181926D12B7C644BD
25,490,348 UART: Caliptra RT
25,491,035 UART: [state] CFI Enabled
25,609,398 UART: [rt] RT listening for mailbox commands...
25,611,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,767,122 UART: [rt]cmd =0x41544d4e, len=14344
29,763,174 >>> mbox cmd response data (8 bytes)
29,763,734 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,794,250 UART: [rt]cmd =0x41545348, len=116
29,796,675 >>> mbox cmd response data (12 bytes)
31,849,987 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,882,227 >>> mbox cmd response: success
38,882,835 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,918,011 UART:
38,918,323 UART: Running Caliptra FMC ...
38,919,461 UART:
38,919,628 UART: [state] CFI Enabled
38,963,794 UART: [art] Extend RT PCRs Done
38,964,986 UART: [art] Lock RT PCRs Done
38,966,603 UART: [art] Populate DV Done
38,971,956 UART: [fht] FMC Alias Private Key: 7
38,973,488 UART: [art] Derive CDI
38,974,305 UART: [art] Store in in slot 0x4
39,016,468 UART: [art] Derive Key Pair
39,017,472 UART: [art] Store priv key in slot 0x5
41,444,370 UART: [art] Derive Key Pair - Done
41,457,215 UART: [art] Signing Cert with AUTHO
41,458,522 UART: RITY.KEYID = 7
43,164,133 UART: [art] Erasing AUTHORITY.KEYID = 7
43,165,697 UART: [art] PUB.X = 97816143CA98DD0B9D51B6A0045F6B907957A2BBFA9A60DA46529B1858F0A9DA49A51E85F57977624BBB033D8CA40F48
43,172,911 UART: [art] PUB.Y = 837C74A4C8BA0357142DE57ADB97CF056D43A2CD883AF25B3B5C72DE50BF1FB008724D75D679A5E91914604D52B0AF0E
43,180,163 UART: [art] SIG.R = 687C94B37C8B965EC0EFD759C533D5CE43B324C0F94441D7F429DE90E8553621A2992040BA3D43CC8BC76813A8505B97
43,187,561 UART: [art] SIG.S = 98B11633A81EA6011BE087EC635E85303C91C3900DDBACC6CB18C343C37FFC891ABBB11401A42DEDB034725B5A6C5DCB
44,166,354 UART: Caliptra RT
44,167,042 UART: [state] CFI Enabled
44,451,618 UART: [rt] RT listening for mailbox commands...
44,483,497 UART: [rt]cmd =0x41545348, len=116
44,485,918 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,010 UART:
192,379 UART: Running Caliptra ROM ...
193,552 UART:
193,706 UART: [state] CFI Enabled
263,357 UART: [state] LifecycleState = Unprovisioned
265,757 UART: [state] DebugLocked = No
268,205 UART: [state] WD Timer not started. Device not locked for debugging
272,040 UART: [kat] SHA2-256
461,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,742 UART: [kat] ++
473,233 UART: [kat] sha1
484,601 UART: [kat] SHA2-256
487,622 UART: [kat] SHA2-384
493,545 UART: [kat] SHA2-512-ACC
496,129 UART: [kat] ECC-384
2,949,571 UART: [kat] HMAC-384Kdf
2,971,438 UART: [kat] LMS
3,503,178 UART: [kat] --
3,507,110 UART: [cold-reset] ++
3,508,193 UART: [fht] FHT @ 0x50003400
3,520,454 UART: [idev] ++
3,521,087 UART: [idev] CDI.KEYID = 6
3,522,128 UART: [idev] SUBJECT.KEYID = 7
3,523,232 UART: [idev] UDS.KEYID = 0
3,524,176 ready_for_fw is high
3,524,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,712 UART: [idev] Erasing UDS.KEYID = 0
6,030,529 UART: [idev] Sha1 KeyId Algorithm
6,052,204 UART: [idev] --
6,057,214 UART: [ldev] ++
6,057,961 UART: [ldev] CDI.KEYID = 6
6,058,876 UART: [ldev] SUBJECT.KEYID = 5
6,060,040 UART: [ldev] AUTHORITY.KEYID = 7
6,061,219 UART: [ldev] FE.KEYID = 1
6,098,927 UART: [ldev] Erasing FE.KEYID = 1
8,606,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,451 UART: [ldev] --
10,413,582 UART: [fwproc] Wait for Commands...
10,415,158 UART: [fwproc] Recv command 0x46574c44
10,417,469 UART: [fwproc] Recv'd Img size: 114168 bytes
13,861,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,555 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,595,772 >>> mbox cmd response: success
14,599,793 UART: [afmc] ++
14,600,522 UART: [afmc] CDI.KEYID = 6
14,601,722 UART: [afmc] SUBJECT.KEYID = 7
14,603,163 UART: [afmc] AUTHORITY.KEYID = 5
17,150,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,171 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,171 UART: [afmc] --
18,968,263 UART: [cold-reset] --
18,973,271 UART: [state] Locking Datavault
18,978,964 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,175 UART: [state] Locking ICCM
18,982,719 UART: [exit] Launching FMC @ 0x40000130
18,991,407 UART:
18,991,641 UART: Running Caliptra FMC ...
18,992,678 UART:
18,992,827 UART: [state] CFI Enabled
19,049,024 UART: [fht] FMC Alias Private Key: 7
20,812,557 UART: [art] Extend RT PCRs Done
20,813,781 UART: [art] Lock RT PCRs Done
20,815,381 UART: [art] Populate DV Done
20,820,795 UART: [fht] FMC Alias Private Key: 7
20,822,386 UART: [art] Derive CDI
20,823,219 UART: [art] Store in in slot 0x4
20,880,749 UART: [art] Derive Key Pair
20,881,787 UART: [art] Store priv key in slot 0x5
23,344,604 UART: [art] Derive Key Pair - Done
23,357,395 UART: [art] Signing Cert with AUTHO
23,358,703 UART: RITY.KEYID = 7
25,069,929 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,444 UART: [art] PUB.X = 2A4360FFFF2F93A1543A981E6CF659BA040D5207EF6B049F77A4E9B743D6763AE0A680C640B0C26E2CDAA7237465A517
25,078,765 UART: [art] PUB.Y = 345516909684A5C63F0B04703CA7FD6693FDAF83E9A83E8583646428D3D9E9470451B20CEFC5EC5402A93C00AA232AE6
25,085,979 UART: [art] SIG.R = 0527CA9F14BBDDFAAA263D6636D9510EC4B440C57B45D7457911404C1048B7A5681E3C6CD0BC192E34F307E74BA4F8E6
25,093,353 UART: [art] SIG.S = 3F2D195446AC734DDA3B1CC088F1B93B4239364FFC59E12EF6A72C8312765290B747A976C354DE6EABE1F52CE95E059B
26,072,290 UART: Caliptra RT
26,072,992 UART: [state] CFI Enabled
26,236,216 UART: [rt] RT listening for mailbox commands...
26,238,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,393,799 UART: [rt]cmd =0x41544d4e, len=14344
30,389,473 >>> mbox cmd response data (8 bytes)
30,390,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,420,924 UART: [rt]cmd =0x41545348, len=116
30,423,239 >>> mbox cmd response data (12 bytes)
32,481,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,627,098 UART:
32,627,482 UART: Running Caliptra ROM ...
32,628,542 UART:
32,628,694 UART: [state] CFI Enabled
32,702,813 UART: [state] LifecycleState = Unprovisioned
32,704,870 UART: [state] DebugLocked = No
32,707,173 UART: [state] WD Timer not started. Device not locked for debugging
32,712,269 UART: [kat] SHA2-256
32,902,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,912,895 UART: [kat] ++
32,913,354 UART: [kat] sha1
32,925,572 UART: [kat] SHA2-256
32,928,560 UART: [kat] SHA2-384
32,934,793 UART: [kat] SHA2-512-ACC
32,937,376 UART: [kat] ECC-384
35,381,269 UART: [kat] HMAC-384Kdf
35,404,399 UART: [kat] LMS
35,935,981 UART: [kat] --
35,941,434 UART: [update-reset] ++
39,393,036 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,396,793 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
40,003,336 >>> mbox cmd response: success
40,008,050 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,008,657 UART: [update-reset] Copying MAN_2 To MAN_1
40,041,900 UART: [update-reset Success] --
40,046,206 UART: [state] Locking Datavault
40,050,558 UART: [state] Locking PCR0, PCR1 and PCR31
40,052,710 UART: [state] Locking ICCM
40,055,710 UART: [exit] Launching FMC @ 0x40000130
40,064,389 UART:
40,064,625 UART: Running Caliptra FMC ...
40,065,663 UART:
40,065,815 UART: [state] CFI Enabled
40,170,680 UART: [art] Extend RT PCRs Done
40,171,895 UART: [art] Lock RT PCRs Done
40,173,058 UART: [art] Populate DV Done
40,178,584 UART: [fht] FMC Alias Private Key: 7
40,180,067 UART: [art] Derive CDI
40,180,833 UART: [art] Store in in slot 0x4
40,239,877 UART: [art] Derive Key Pair
40,240,986 UART: [art] Store priv key in slot 0x5
42,703,581 UART: [art] Derive Key Pair - Done
42,716,484 UART: [art] Signing Cert with AUTHO
42,717,789 UART: RITY.KEYID = 7
44,429,304 UART: [art] Erasing AUTHORITY.KEYID = 7
44,430,817 UART: [art] PUB.X = F6C7D8537FBC14381EB397F52960921ED30AC3082C0766B2E8985C912CE6165308544DA6DEF05B1E15636A3D529E87F2
44,438,101 UART: [art] PUB.Y = B42F4A37E02659CE4BA6E6772F76B321C2568368155E912C445B257A1319F5045CB72BFD7863353BFBE75BE17CC80192
44,445,320 UART: [art] SIG.R = 61A634C26122F01DD8F2FB9A3A9E8002D0D35A2AF3CA3BFB4084260EF84F0AD43C11733A0DBF35D5FD585DBC5CF59AA0
44,452,733 UART: [art] SIG.S = 515719A7AC249CC716B7BBA6084A50EF68CCB1B814DED42A3F1AC875112056FA126C0B6928CE4A9C8BA34C6BBFB8DB93
45,431,836 UART: Caliptra RT
45,432,568 UART: [state] CFI Enabled
45,765,288 UART: [rt] RT listening for mailbox commands...
45,797,112 UART: [rt]cmd =0x41545348, len=116
45,799,182 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,438,222 ready_for_fw is high
3,438,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,728,743 >>> mbox cmd response: success
19,028,009 UART:
19,028,398 UART: Running Caliptra FMC ...
19,029,588 UART:
19,029,760 UART: [state] CFI Enabled
19,095,001 UART: [fht] FMC Alias Private Key: 7
20,858,838 UART: [art] Extend RT PCRs Done
20,860,053 UART: [art] Lock RT PCRs Done
20,861,795 UART: [art] Populate DV Done
20,867,039 UART: [fht] FMC Alias Private Key: 7
20,868,530 UART: [art] Derive CDI
20,869,293 UART: [art] Store in in slot 0x4
20,927,291 UART: [art] Derive Key Pair
20,928,349 UART: [art] Store priv key in slot 0x5
23,391,190 UART: [art] Derive Key Pair - Done
23,404,242 UART: [art] Signing Cert with AUTHO
23,405,550 UART: RITY.KEYID = 7
25,116,853 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,365 UART: [art] PUB.X = D13006C29A04928B954D2A9CB72249EF24164B790DC4DAD6E4DAA7BE4F28AD6F36ADFFDDCF80728679BAE8059DF55567
25,125,596 UART: [art] PUB.Y = E407CBEDBE5FFB28324C4B0AE462F0BC8F2E958670C97DCDB5FDF51D57EC684675F3EC5953FAE0E95B96F4660DE0D795
25,132,890 UART: [art] SIG.R = 34B8FFE0A692B1EFA7D2DE95CE8774E5531A7EFB845A3B856D3EAA1BE10F303A2D32790B12C9DC5EB8A498EFD2A02975
25,140,329 UART: [art] SIG.S = 050C82D6D6DA7F7219C4DD938B2C6A5AF695BFF3AE6E337C0D71C198AB1011298A6D7A7A8B9B9A8E3F3DA392C60EFD36
26,119,097 UART: Caliptra RT
26,119,813 UART: [state] CFI Enabled
26,286,448 UART: [rt] RT listening for mailbox commands...
26,288,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,443,938 UART: [rt]cmd =0x41544d4e, len=14344
30,439,476 >>> mbox cmd response data (8 bytes)
30,440,043 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,470,719 UART: [rt]cmd =0x41545348, len=116
30,473,029 >>> mbox cmd response data (12 bytes)
32,540,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,346,123 >>> mbox cmd response: success
40,346,790 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,381,916 UART:
40,382,202 UART: Running Caliptra FMC ...
40,383,323 UART:
40,383,485 UART: [state] CFI Enabled
40,482,049 UART: [art] Extend RT PCRs Done
40,483,242 UART: [art] Lock RT PCRs Done
40,484,808 UART: [art] Populate DV Done
40,490,379 UART: [fht] FMC Alias Private Key: 7
40,491,920 UART: [art] Derive CDI
40,492,736 UART: [art] Store in in slot 0x4
40,551,699 UART: [art] Derive Key Pair
40,552,758 UART: [art] Store priv key in slot 0x5
43,015,714 UART: [art] Derive Key Pair - Done
43,028,497 UART: [art] Signing Cert with AUTHO
43,029,829 UART: RITY.KEYID = 7
44,740,669 UART: [art] Erasing AUTHORITY.KEYID = 7
44,742,177 UART: [art] PUB.X = AA21FC886B4A449C0A28748BDA83849BE83BBCF2016A4E6C40A0CE8B0F8D549E67FCF3FC148C52B233A91396167AE1BE
44,749,518 UART: [art] PUB.Y = AFE3A77B454370D7D9F6768D62208E4FCBBA04E0CA8288439DF9B0B0BE0D392D3FEF5CFDD26F7C144153D5D5463EAEA7
44,756,765 UART: [art] SIG.R = 3E53F8E73E62A60C9D726BE94D4FECE56A777606965112EE2BB10D96596AABD55EBDE58729795D7F0A75ABD4B0B6DA10
44,764,164 UART: [art] SIG.S = C3BFD1E46AD23691B50AC69682409310A20F25B807F181C16178E253EC683BD05805AEC5EBB9C34D284468CDB181AA75
45,742,529 UART: Caliptra RT
45,743,227 UART: [state] CFI Enabled
46,080,546 UART: [rt] RT listening for mailbox commands...
46,112,390 UART: [rt]cmd =0x41545348, len=116
46,114,885 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,852 writing to cptra_bootfsm_go
192,958 UART:
193,333 UART: Running Caliptra ROM ...
194,541 UART:
604,038 UART: [state] CFI Enabled
618,736 UART: [state] LifecycleState = Unprovisioned
621,107 UART: [state] DebugLocked = No
623,778 UART: [state] WD Timer not started. Device not locked for debugging
627,664 UART: [kat] SHA2-256
817,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,318 UART: [kat] ++
828,855 UART: [kat] sha1
840,079 UART: [kat] SHA2-256
843,047 UART: [kat] SHA2-384
848,405 UART: [kat] SHA2-512-ACC
851,012 UART: [kat] ECC-384
3,294,285 UART: [kat] HMAC-384Kdf
3,306,513 UART: [kat] LMS
3,838,371 UART: [kat] --
3,842,877 UART: [cold-reset] ++
3,844,173 UART: [fht] FHT @ 0x50003400
3,856,090 UART: [idev] ++
3,856,738 UART: [idev] CDI.KEYID = 6
3,857,769 UART: [idev] SUBJECT.KEYID = 7
3,858,873 UART: [idev] UDS.KEYID = 0
3,859,804 ready_for_fw is high
3,860,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,473 UART: [idev] Erasing UDS.KEYID = 0
6,339,911 UART: [idev] Sha1 KeyId Algorithm
6,361,992 UART: [idev] --
6,366,920 UART: [ldev] ++
6,367,615 UART: [ldev] CDI.KEYID = 6
6,368,530 UART: [ldev] SUBJECT.KEYID = 5
6,369,798 UART: [ldev] AUTHORITY.KEYID = 7
6,370,976 UART: [ldev] FE.KEYID = 1
6,383,002 UART: [ldev] Erasing FE.KEYID = 1
8,864,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,630 UART: [ldev] --
10,659,322 UART: [fwproc] Wait for Commands...
10,661,682 UART: [fwproc] Recv command 0x46574c44
10,663,997 UART: [fwproc] Recv'd Img size: 114168 bytes
14,109,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,189,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,305,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,847,002 >>> mbox cmd response: success
14,851,699 UART: [afmc] ++
14,852,407 UART: [afmc] CDI.KEYID = 6
14,853,572 UART: [afmc] SUBJECT.KEYID = 7
14,855,060 UART: [afmc] AUTHORITY.KEYID = 5
17,356,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,222 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,114,325 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,129,364 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,443 UART: [afmc] --
19,155,823 UART: [cold-reset] --
19,160,439 UART: [state] Locking Datavault
19,166,112 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,316 UART: [state] Locking ICCM
19,169,606 UART: [exit] Launching FMC @ 0x40000130
19,178,278 UART:
19,178,520 UART: Running Caliptra FMC ...
19,179,626 UART:
19,179,791 UART: [state] CFI Enabled
19,188,185 UART: [fht] FMC Alias Private Key: 7
20,945,427 UART: [art] Extend RT PCRs Done
20,946,651 UART: [art] Lock RT PCRs Done
20,948,360 UART: [art] Populate DV Done
20,953,720 UART: [fht] FMC Alias Private Key: 7
20,955,472 UART: [art] Derive CDI
20,956,286 UART: [art] Store in in slot 0x4
20,998,932 UART: [art] Derive Key Pair
20,999,933 UART: [art] Store priv key in slot 0x5
23,426,248 UART: [art] Derive Key Pair - Done
23,439,185 UART: [art] Signing Cert with AUTHO
23,440,487 UART: RITY.KEYID = 7
25,146,374 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,876 UART: [art] PUB.X = D355F41B5EC3AE1FE31740C3CD9486D2C82AF43314881D2D536E05277115C2F311FB8D17EF63257438D1FE1DFAA37F83
25,155,125 UART: [art] PUB.Y = 1F9256373FCB9073B1A029BA7D4DA96E155A0B5FA33E8CA31CB483CB736E5BE910E0A1A1A7413D42A6210A7B8E11CEE5
25,162,438 UART: [art] SIG.R = 8DB47DC4397C379CF9B1FA20E69E5749692F7EA2220A033973B4D843405722AEE7AB26B5F1BDB15E3DE554171298B101
25,169,803 UART: [art] SIG.S = 80D8E3E0CEF925A8DE1247BCD1DECE4FEBF690B30A08C5C2097885BA5A268EFDA12DB2CA9E166868A8FA4D9A66A90F82
26,148,688 UART: Caliptra RT
26,149,406 UART: [state] CFI Enabled
26,265,419 UART: [rt] RT listening for mailbox commands...
26,267,853 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,423,377 UART: [rt]cmd =0x41544d4e, len=14344
30,419,518 >>> mbox cmd response data (8 bytes)
30,420,104 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,450,840 UART: [rt]cmd =0x41545348, len=116
30,452,862 >>> mbox cmd response data (12 bytes)
32,508,308 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
32,653,584 UART:
32,653,970 UART: Running Caliptra ROM ...
32,655,059 UART:
32,655,226 UART: [state] CFI Enabled
32,669,824 UART: [state] LifecycleState = Unprovisioned
32,671,667 UART: [state] DebugLocked = No
32,674,028 UART: [state] WD Timer not started. Device not locked for debugging
32,679,281 UART: [kat] SHA2-256
32,869,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,879,900 UART: [kat] ++
32,880,501 UART: [kat] sha1
32,893,122 UART: [kat] SHA2-256
32,896,153 UART: [kat] SHA2-384
32,902,637 UART: [kat] SHA2-512-ACC
32,905,211 UART: [kat] ECC-384
35,347,998 UART: [kat] HMAC-384Kdf
35,360,849 UART: [kat] LMS
35,892,428 UART: [kat] --
35,896,049 UART: [update-reset] ++
39,348,203 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,350,880 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
39,957,443 >>> mbox cmd response: success
39,962,587 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,963,188 UART: [update-reset] Copying MAN_2 To MAN_1
39,995,309 UART: [update-reset Success] --
40,000,741 UART: [state] Locking Datavault
40,004,439 UART: [state] Locking PCR0, PCR1 and PCR31
40,006,586 UART: [state] Locking ICCM
40,009,631 UART: [exit] Launching FMC @ 0x40000130
40,018,257 UART:
40,018,495 UART: Running Caliptra FMC ...
40,019,604 UART:
40,019,769 UART: [state] CFI Enabled
40,063,993 UART: [art] Extend RT PCRs Done
40,065,185 UART: [art] Lock RT PCRs Done
40,066,646 UART: [art] Populate DV Done
40,072,060 UART: [fht] FMC Alias Private Key: 7
40,073,763 UART: [art] Derive CDI
40,074,579 UART: [art] Store in in slot 0x4
40,117,242 UART: [art] Derive Key Pair
40,118,433 UART: [art] Store priv key in slot 0x5
42,544,814 UART: [art] Derive Key Pair - Done
42,558,142 UART: [art] Signing Cert with AUTHO
42,559,444 UART: RITY.KEYID = 7
44,264,563 UART: [art] Erasing AUTHORITY.KEYID = 7
44,266,063 UART: [art] PUB.X = E367DCE9EF327A8C99CA2FCACD341CA12AFF33A23110BB470612904EE3F5D46757D1E8931CE1EA24EAF66EE69D696513
44,273,309 UART: [art] PUB.Y = 0E3C1D4C711A5D2D442B29FDE5B296BC03076CD82D820D1AC372B1DDD49E01272F6CC94CE47833D0ACF7EE8EF8C67207
44,280,594 UART: [art] SIG.R = BB9870DE08FE378D52519B4A055CF42EEA65C102A75AB1B8B756E42167088712D9EE9277736873622C811DAF1768A0C9
44,288,028 UART: [art] SIG.S = 28BE2FD9957AD75516AE2EFF034BE882AEE618B11C670723018A55131843A55DF851F57FCE641A1F3A289E57CF0234E0
45,266,724 UART: Caliptra RT
45,267,436 UART: [state] CFI Enabled
45,554,251 UART: [rt] RT listening for mailbox commands...
45,586,247 UART: [rt]cmd =0x41545348, len=116
45,588,522 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
3,755,243 ready_for_fw is high
3,755,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,935,146 >>> mbox cmd response: success
19,183,258 UART:
19,183,659 UART: Running Caliptra FMC ...
19,184,762 UART:
19,184,918 UART: [state] CFI Enabled
19,193,342 UART: [fht] FMC Alias Private Key: 7
20,949,587 UART: [art] Extend RT PCRs Done
20,950,806 UART: [art] Lock RT PCRs Done
20,952,356 UART: [art] Populate DV Done
20,957,825 UART: [fht] FMC Alias Private Key: 7
20,959,312 UART: [art] Derive CDI
20,960,048 UART: [art] Store in in slot 0x4
21,002,382 UART: [art] Derive Key Pair
21,003,430 UART: [art] Store priv key in slot 0x5
23,429,854 UART: [art] Derive Key Pair - Done
23,442,701 UART: [art] Signing Cert with AUTHO
23,444,008 UART: RITY.KEYID = 7
25,149,591 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,094 UART: [art] PUB.X = 9684A6FD77E454D70DBC6C0E1E1C2C0DF60326850F732F8F1595CA782F3F4A04C0A125FC094E2506E4C00C83A9A52FAB
25,158,396 UART: [art] PUB.Y = A83836851864D2BF1043C8691850271F14FB8199E7E0381D79641B30587E98EFE920073D565375A3606B4ACDC4B2C1A4
25,165,599 UART: [art] SIG.R = 65568A44E3973E646AD3A06E0EF7461A28582C1AFA35DF394E4F0596ACB698D1E871C2256AF54BCB95C3EFEED62B013B
25,172,987 UART: [art] SIG.S = E443B81B03FFCA6AEFDD5AF7F008D58A15C3BA9CDDDC0F55232C179AB831ADED521957DC7F4AD0548FE08959AFBDD718
26,151,571 UART: Caliptra RT
26,152,271 UART: [state] CFI Enabled
26,269,817 UART: [rt] RT listening for mailbox commands...
26,272,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,427,466 UART: [rt]cmd =0x41544d4e, len=14344
30,423,192 >>> mbox cmd response data (8 bytes)
30,423,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,454,427 UART: [rt]cmd =0x41545348, len=116
30,456,604 >>> mbox cmd response data (12 bytes)
32,509,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
40,240,857 >>> mbox cmd response: success
40,241,536 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,274,560 UART:
40,274,884 UART: Running Caliptra FMC ...
40,275,929 UART:
40,276,081 UART: [state] CFI Enabled
40,319,845 UART: [art] Extend RT PCRs Done
40,321,003 UART: [art] Lock RT PCRs Done
40,322,812 UART: [art] Populate DV Done
40,328,287 UART: [fht] FMC Alias Private Key: 7
40,329,881 UART: [art] Derive CDI
40,330,694 UART: [art] Store in in slot 0x4
40,373,355 UART: [art] Derive Key Pair
40,374,401 UART: [art] Store priv key in slot 0x5
42,800,736 UART: [art] Derive Key Pair - Done
42,813,857 UART: [art] Signing Cert with AUTHO
42,815,163 UART: RITY.KEYID = 7
44,520,026 UART: [art] Erasing AUTHORITY.KEYID = 7
44,521,544 UART: [art] PUB.X = 05084EA05E1387B037C792CC30CABF26E5CEEF441BAD53A0D92DB3C033F71E4021545A0DCE6125865C2298055B8FFAD7
44,528,792 UART: [art] PUB.Y = 84A1AAE9C16390EE13F73E26988CA3F85B70DFD6E390098D72A2631FE094750FA3428B75BF75EDA867B2979F2AADC2A0
44,536,077 UART: [art] SIG.R = 673AD146B7D3984443C470EE2902A2655EAC762786A25EF6F8A3226D239F7A203139A3C81398BFB9D4AFCEE5375CF53F
44,543,418 UART: [art] SIG.S = 5297C3B657E5778A7FD76A2A474AF74541C19B204AA02C695FFD9BC0C4AE1455FDD29595064FFBB8D3483203893038F5
45,521,927 UART: Caliptra RT
45,522,639 UART: [state] CFI Enabled
45,811,453 UART: [rt] RT listening for mailbox commands...
45,843,441 UART: [rt]cmd =0x41545348, len=116
45,845,852 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,142 UART: [kat] SHA2-512-ACC
897,043 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,485 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,800 UART: [idev] ++
1,479,968 UART: [idev] CDI.KEYID = 6
1,480,328 UART: [idev] SUBJECT.KEYID = 7
1,480,752 UART: [idev] UDS.KEYID = 0
1,481,097 ready_for_fw is high
1,481,097 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,940 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,920 UART: [idev] --
1,514,901 UART: [ldev] ++
1,515,069 UART: [ldev] CDI.KEYID = 6
1,515,432 UART: [ldev] SUBJECT.KEYID = 5
1,515,858 UART: [ldev] AUTHORITY.KEYID = 7
1,516,321 UART: [ldev] FE.KEYID = 1
1,521,219 UART: [ldev] Erasing FE.KEYID = 1
1,546,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,428 UART: [ldev] --
1,585,939 UART: [fwproc] Waiting for Commands...
1,586,800 UART: [fwproc] Received command 0x46574c44
1,587,591 UART: [fwproc] Received Image of size 114168 bytes
2,884,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,085 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,437 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,066 >>> mbox cmd response: success
3,078,152 UART: [afmc] ++
3,078,320 UART: [afmc] CDI.KEYID = 6
3,078,682 UART: [afmc] SUBJECT.KEYID = 7
3,079,107 UART: [afmc] AUTHORITY.KEYID = 5
3,114,116 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,326 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,834 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,719 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,409 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,458 UART: [afmc] --
3,157,340 UART: [cold-reset] --
3,158,086 UART: [state] Locking Datavault
3,159,109 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,713 UART: [state] Locking ICCM
3,160,147 UART: [exit] Launching FMC @ 0x40000130
3,165,476 UART:
3,165,492 UART: Running Caliptra FMC ...
3,165,900 UART:
3,165,954 UART: [state] CFI Enabled
3,176,543 UART: [fht] FMC Alias Private Key: 7
3,284,466 UART: [art] Extend RT PCRs Done
3,284,894 UART: [art] Lock RT PCRs Done
3,286,426 UART: [art] Populate DV Done
3,294,619 UART: [fht] FMC Alias Private Key: 7
3,295,659 UART: [art] Derive CDI
3,295,939 UART: [art] Store in in slot 0x4
3,381,686 UART: [art] Derive Key Pair
3,382,046 UART: [art] Store priv key in slot 0x5
3,395,068 UART: [art] Derive Key Pair - Done
3,409,786 UART: [art] Signing Cert with AUTHO
3,410,266 UART: RITY.KEYID = 7
3,425,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,035 UART: [art] PUB.X = 66AF6EFECDC01AA4C7F72EF1E74BDD927DE62FC3CBFBBE187E6FC39194BBFDB667B8091EFE40CDB78497D84C57DD7EC5
3,432,838 UART: [art] PUB.Y = 0FA567B46141D74DC2074388843146D4E245FA570787C45D0929E0E2D6AD0CA2CD84455F8DA9D554BCBDB6AB2642CF79
3,439,779 UART: [art] SIG.R = C69B15D1A7D4982F26F67A21B1F5CA21E649505EC9A12168300723FD4A9C178DC0E7E2E95430BE9D5783B0EADA10814C
3,446,552 UART: [art] SIG.S = 78D3185A46237255BFC3ED186684110A9185F639E63B7EAE3EB1EBBF8321D58B695390ED5DCF333D2F868F9AD5698DE2
3,470,034 UART: Caliptra RT
3,470,287 UART: [state] CFI Enabled
3,577,936 UART: [rt] RT listening for mailbox commands...
3,578,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,804 UART: [rt]cmd =0x41544d4e, len=14344
4,011,450 >>> mbox cmd response data (8 bytes)
4,011,451 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,720 UART: [rt]cmd =0x41545348, len=116
4,043,415 >>> mbox cmd response data (12 bytes)
4,043,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,034 UART:
4,044,050 UART: Running Caliptra ROM ...
4,044,458 UART:
4,044,512 UART: [state] CFI Enabled
4,047,204 UART: [state] LifecycleState = Unprovisioned
4,047,859 UART: [state] DebugLocked = No
4,048,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,050,212 UART: [kat] SHA2-256
4,844,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,848,258 UART: [kat] ++
4,848,410 UART: [kat] sha1
4,852,558 UART: [kat] SHA2-256
4,854,496 UART: [kat] SHA2-384
4,857,203 UART: [kat] SHA2-512-ACC
4,859,103 UART: [kat] ECC-384
4,864,202 UART: [kat] HMAC-384Kdf
4,868,594 UART: [kat] LMS
5,436,790 UART: [kat] --
5,437,815 UART: [update-reset] ++
6,771,175 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,772,279 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,921,909 >>> mbox cmd response: success
6,921,909 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,922,244 UART: [update-reset] Copying MAN_2 To MAN_1
6,930,258 UART: [update-reset Success] --
6,931,325 UART: [state] Locking Datavault
6,932,197 UART: [state] Locking PCR0, PCR1 and PCR31
6,932,801 UART: [state] Locking ICCM
6,933,471 UART: [exit] Launching FMC @ 0x40000130
6,938,800 UART:
6,938,816 UART: Running Caliptra FMC ...
6,939,224 UART:
6,939,278 UART: [state] CFI Enabled
7,028,249 UART: [art] Extend RT PCRs Done
7,028,677 UART: [art] Lock RT PCRs Done
7,030,288 UART: [art] Populate DV Done
7,038,565 UART: [fht] FMC Alias Private Key: 7
7,039,623 UART: [art] Derive CDI
7,039,903 UART: [art] Store in in slot 0x4
7,125,586 UART: [art] Derive Key Pair
7,125,946 UART: [art] Store priv key in slot 0x5
7,139,214 UART: [art] Derive Key Pair - Done
7,153,848 UART: [art] Signing Cert with AUTHO
7,154,328 UART: RITY.KEYID = 7
7,168,908 UART: [art] Erasing AUTHORITY.KEYID = 7
7,169,673 UART: [art] PUB.X = C14AE86DDDDB2586EBF2FF88C1112515958BE38DD63F8CF272D5B4427AF00A392A0542F065A2E0EA64F0C659125341A1
7,176,445 UART: [art] PUB.Y = 1E5102FF9658283A8632DCD7EE43E877AA83DE4639E518A3D0CB8196F9140FE54953FF5D73F2387CBA7172B79EB9499A
7,183,393 UART: [art] SIG.R = F0AC9C5EDDF7D2C50BCA6139E46B3BFCA5159957F9094BCEADCA6C3F6294D08E43FB17761B5C34A6FE36C2E635670435
7,190,172 UART: [art] SIG.S = 215AD86DF67CE9078E1F6324AF2BEB0F78B67097773A37416C54E5D00824C25E0D93ED3522EE79855023F3D8634955F2
7,213,863 UART: Caliptra RT
7,214,116 UART: [state] CFI Enabled
7,497,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,528,576 UART: [rt]cmd =0x41545348, len=116
7,530,085 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,005 ready_for_fw is high
1,363,005 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,856 >>> mbox cmd response: success
2,989,438 UART:
2,989,454 UART: Running Caliptra FMC ...
2,989,862 UART:
2,989,916 UART: [state] CFI Enabled
3,000,199 UART: [fht] FMC Alias Private Key: 7
3,108,418 UART: [art] Extend RT PCRs Done
3,108,846 UART: [art] Lock RT PCRs Done
3,110,152 UART: [art] Populate DV Done
3,118,311 UART: [fht] FMC Alias Private Key: 7
3,119,439 UART: [art] Derive CDI
3,119,719 UART: [art] Store in in slot 0x4
3,205,356 UART: [art] Derive Key Pair
3,205,716 UART: [art] Store priv key in slot 0x5
3,218,856 UART: [art] Derive Key Pair - Done
3,233,771 UART: [art] Signing Cert with AUTHO
3,234,251 UART: RITY.KEYID = 7
3,249,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,322 UART: [art] PUB.X = AA68E722C930CF71C2B7C680EC10A826E88FCCDCDD5717CE5BE5523F0D735933004DC0C214EEEFF17C1D28097A914184
3,257,076 UART: [art] PUB.Y = F45A53151C6CA557949974F3C4FC2131D9A34A052590948796A7C4A105FEA25324CB992AFA86339FE804A5DB46DC1354
3,264,015 UART: [art] SIG.R = 47E5BF63EB2BB30ADDD6FC74C9C346FD868D1E807AB60A8FFBD018EA655A42784829A5E91727FCF753692C10318A43E1
3,270,791 UART: [art] SIG.S = CA936D6E12109017DC6953C6997EC117EDD421A0644D3E6C51A2C4151EDF8B0D49B5DD7D76A5007DECA3B70841B87D65
3,294,588 UART: Caliptra RT
3,294,841 UART: [state] CFI Enabled
3,402,906 UART: [rt] RT listening for mailbox commands...
3,403,576 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,252 UART: [rt]cmd =0x41544d4e, len=14344
3,835,922 >>> mbox cmd response data (8 bytes)
3,835,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,940 UART: [rt]cmd =0x41545348, len=116
3,867,487 >>> mbox cmd response data (12 bytes)
3,867,488 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,626,897 >>> mbox cmd response: success
6,626,897 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,640,440 UART:
6,640,456 UART: Running Caliptra FMC ...
6,640,864 UART:
6,640,918 UART: [state] CFI Enabled
6,730,285 UART: [art] Extend RT PCRs Done
6,730,713 UART: [art] Lock RT PCRs Done
6,732,080 UART: [art] Populate DV Done
6,740,181 UART: [fht] FMC Alias Private Key: 7
6,741,319 UART: [art] Derive CDI
6,741,599 UART: [art] Store in in slot 0x4
6,827,102 UART: [art] Derive Key Pair
6,827,462 UART: [art] Store priv key in slot 0x5
6,841,364 UART: [art] Derive Key Pair - Done
6,856,031 UART: [art] Signing Cert with AUTHO
6,856,511 UART: RITY.KEYID = 7
6,872,273 UART: [art] Erasing AUTHORITY.KEYID = 7
6,873,038 UART: [art] PUB.X = 7FBDB811DF3DCCFD2DD28391A6B00C3255EB264A94B1BEAAA67FEC37D01528EE1089D2FE7528A084359F051E7B9C287E
6,879,820 UART: [art] PUB.Y = 3E61A7ECE721EFDCFE4AED6E55BC991E5246E9AE99219B634D6C7BA1AC9946EAB5FBEA3049A2C5621D998F07BB041A5D
6,886,788 UART: [art] SIG.R = 7FAC8D1061D37DBC835B4584B6EEEEE917CE7CA3D02DB0BFA4EF38BEB8ACF4BCBDA1284FC648F430098A820D6EDACB23
6,893,586 UART: [art] SIG.S = D1E83F734BF607B517FAC5831B8A9A28A844BB2C061D51280EF9BEB4E07AD3026C657B03F97624BA80784E3AA0E659DD
6,917,978 UART: Caliptra RT
6,918,231 UART: [state] CFI Enabled
7,198,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,229,783 UART: [rt]cmd =0x41545348, len=116
7,231,450 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,782 UART: [kat] SHA2-256
892,720 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
902,933 UART: [kat] HMAC-384Kdf
907,549 UART: [kat] LMS
1,475,745 UART: [kat] --
1,476,412 UART: [cold-reset] ++
1,476,778 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
1,481,042 ready_for_fw is high
1,481,042 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,807 UART: [idev] Erasing UDS.KEYID = 0
1,505,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,385 UART: [idev] --
1,515,384 UART: [ldev] ++
1,515,552 UART: [ldev] CDI.KEYID = 6
1,515,915 UART: [ldev] SUBJECT.KEYID = 5
1,516,341 UART: [ldev] AUTHORITY.KEYID = 7
1,516,804 UART: [ldev] FE.KEYID = 1
1,522,202 UART: [ldev] Erasing FE.KEYID = 1
1,547,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,087 UART: [ldev] --
1,586,410 UART: [fwproc] Waiting for Commands...
1,587,191 UART: [fwproc] Received command 0x46574c44
1,587,982 UART: [fwproc] Received Image of size 114168 bytes
2,884,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,652 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,527 >>> mbox cmd response: success
3,077,543 UART: [afmc] ++
3,077,711 UART: [afmc] CDI.KEYID = 6
3,078,073 UART: [afmc] SUBJECT.KEYID = 7
3,078,498 UART: [afmc] AUTHORITY.KEYID = 5
3,113,307 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,527 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,307 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,920 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,610 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,705 UART: [afmc] --
3,156,635 UART: [cold-reset] --
3,157,391 UART: [state] Locking Datavault
3,158,678 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,282 UART: [state] Locking ICCM
3,159,736 UART: [exit] Launching FMC @ 0x40000130
3,165,065 UART:
3,165,081 UART: Running Caliptra FMC ...
3,165,489 UART:
3,165,632 UART: [state] CFI Enabled
3,176,351 UART: [fht] FMC Alias Private Key: 7
3,283,964 UART: [art] Extend RT PCRs Done
3,284,392 UART: [art] Lock RT PCRs Done
3,286,094 UART: [art] Populate DV Done
3,294,249 UART: [fht] FMC Alias Private Key: 7
3,295,291 UART: [art] Derive CDI
3,295,571 UART: [art] Store in in slot 0x4
3,381,174 UART: [art] Derive Key Pair
3,381,534 UART: [art] Store priv key in slot 0x5
3,394,726 UART: [art] Derive Key Pair - Done
3,409,441 UART: [art] Signing Cert with AUTHO
3,409,921 UART: RITY.KEYID = 7
3,425,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,178 UART: [art] PUB.X = 54E4D49C0D91B9899ECD16E22C0FA3736328F83E94F49D0487334AC7AD034AF812183F274DDCC068A8FEB51B15BC67A8
3,432,944 UART: [art] PUB.Y = 709D552262945A75CBF5148973FECE80403CD5E88C599A8128BD4855AD9CC89024C815F8929CD707BF76DB891E5C1439
3,439,889 UART: [art] SIG.R = F32C84BA22E3415EFDBD57B71D7B69B392014F891EFF6F48C42E065A849106318E9CDCF390A52ECD0EDAD13BFD6AB7DF
3,446,669 UART: [art] SIG.S = AE4441461681311E3348DB8A6F69EA51EBDF008BD4B39EC79EA409F10603383444249986EF740670084848187A7F0FBB
3,470,350 UART: Caliptra RT
3,470,695 UART: [state] CFI Enabled
3,579,179 UART: [rt] RT listening for mailbox commands...
3,579,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,905 UART: [rt]cmd =0x41544d4e, len=14344
4,012,737 >>> mbox cmd response data (8 bytes)
4,012,738 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,911 UART: [rt]cmd =0x41545348, len=116
4,044,522 >>> mbox cmd response data (12 bytes)
4,044,523 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,063 UART:
4,045,079 UART: Running Caliptra ROM ...
4,045,487 UART:
4,045,628 UART: [state] CFI Enabled
4,048,296 UART: [state] LifecycleState = Unprovisioned
4,048,951 UART: [state] DebugLocked = No
4,049,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,051,332 UART: [kat] SHA2-256
4,845,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,849,378 UART: [kat] ++
4,849,530 UART: [kat] sha1
4,853,842 UART: [kat] SHA2-256
4,855,780 UART: [kat] SHA2-384
4,858,707 UART: [kat] SHA2-512-ACC
4,860,607 UART: [kat] ECC-384
4,866,288 UART: [kat] HMAC-384Kdf
4,870,962 UART: [kat] LMS
5,439,158 UART: [kat] --
5,440,151 UART: [update-reset] ++
6,774,699 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,775,769 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,925,399 >>> mbox cmd response: success
6,925,399 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,925,592 UART: [update-reset] Copying MAN_2 To MAN_1
6,933,606 UART: [update-reset Success] --
6,934,459 UART: [state] Locking Datavault
6,935,313 UART: [state] Locking PCR0, PCR1 and PCR31
6,935,917 UART: [state] Locking ICCM
6,936,351 UART: [exit] Launching FMC @ 0x40000130
6,941,680 UART:
6,941,696 UART: Running Caliptra FMC ...
6,942,104 UART:
6,942,247 UART: [state] CFI Enabled
7,031,138 UART: [art] Extend RT PCRs Done
7,031,566 UART: [art] Lock RT PCRs Done
7,032,857 UART: [art] Populate DV Done
7,040,956 UART: [fht] FMC Alias Private Key: 7
7,042,024 UART: [art] Derive CDI
7,042,304 UART: [art] Store in in slot 0x4
7,127,989 UART: [art] Derive Key Pair
7,128,349 UART: [art] Store priv key in slot 0x5
7,141,651 UART: [art] Derive Key Pair - Done
7,156,656 UART: [art] Signing Cert with AUTHO
7,157,136 UART: RITY.KEYID = 7
7,172,314 UART: [art] Erasing AUTHORITY.KEYID = 7
7,173,079 UART: [art] PUB.X = 06C10456A8824FD6D9A8893198852612D41134E29242E534877CC952F99B9E68B5C8D72D46C1C19E015ADD40CE457D0B
7,179,831 UART: [art] PUB.Y = EC4B5690701D8EEC2A2B9877237171766D490C8F232C273C33C1D7BA4422F3E500C1FADC2FF2C020FE8C6125345466F8
7,186,758 UART: [art] SIG.R = 91F763E37EC58C215921F28BE2855C63D8D625404A76CCA9FCDF376566DFA89F7D63788BD01FFE7A9961E63B88C4E7E4
7,193,536 UART: [art] SIG.S = 05CBB2900C02C3CBDF7607DB1140DBF5600E9F7EA600FBAE0CAA2DC7401866E8B1399AFA198624E34EFBA91296D98F3F
7,217,153 UART: Caliptra RT
7,217,498 UART: [state] CFI Enabled
7,501,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,532,514 UART: [rt]cmd =0x41545348, len=116
7,534,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,544 ready_for_fw is high
1,363,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,757 >>> mbox cmd response: success
2,989,211 UART:
2,989,227 UART: Running Caliptra FMC ...
2,989,635 UART:
2,989,778 UART: [state] CFI Enabled
3,000,391 UART: [fht] FMC Alias Private Key: 7
3,108,602 UART: [art] Extend RT PCRs Done
3,109,030 UART: [art] Lock RT PCRs Done
3,110,610 UART: [art] Populate DV Done
3,118,967 UART: [fht] FMC Alias Private Key: 7
3,120,087 UART: [art] Derive CDI
3,120,367 UART: [art] Store in in slot 0x4
3,206,188 UART: [art] Derive Key Pair
3,206,548 UART: [art] Store priv key in slot 0x5
3,220,292 UART: [art] Derive Key Pair - Done
3,235,140 UART: [art] Signing Cert with AUTHO
3,235,620 UART: RITY.KEYID = 7
3,250,224 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,989 UART: [art] PUB.X = 13AB85DB767184127AC01DAC315AA96AF45AA4F298EC1E20545D09D6665B54FDDED712823CE43C298F02DB217A7FD70F
3,257,762 UART: [art] PUB.Y = 1E0F44ED3F6FEB2B0322F81581AE346F08E8C26D4EC50EEDEE2505482B2782D039630F1B5F44D0738F04DE7E116787E9
3,264,697 UART: [art] SIG.R = 746C8689A1570C90D3E430AF1D1968C8F3D18A0816599F6A1D8CF0E9300965BD3B2D75CA2044ED96E6A929BE34E07D34
3,271,460 UART: [art] SIG.S = 17B36C671BCA9A13B74054D0D3007944BF87A2EA99895CD7BE361CFAC63FCBF54EF75530D40E0EBAFF1C90C0E027A603
3,294,790 UART: Caliptra RT
3,295,135 UART: [state] CFI Enabled
3,403,299 UART: [rt] RT listening for mailbox commands...
3,403,969 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,881 UART: [rt]cmd =0x41544d4e, len=14344
3,837,007 >>> mbox cmd response data (8 bytes)
3,837,008 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,133 UART: [rt]cmd =0x41545348, len=116
3,868,760 >>> mbox cmd response data (12 bytes)
3,868,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,629,835 >>> mbox cmd response: success
6,629,835 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,643,186 UART:
6,643,202 UART: Running Caliptra FMC ...
6,643,610 UART:
6,643,753 UART: [state] CFI Enabled
6,732,520 UART: [art] Extend RT PCRs Done
6,732,948 UART: [art] Lock RT PCRs Done
6,734,425 UART: [art] Populate DV Done
6,742,852 UART: [fht] FMC Alias Private Key: 7
6,743,824 UART: [art] Derive CDI
6,744,104 UART: [art] Store in in slot 0x4
6,829,655 UART: [art] Derive Key Pair
6,830,015 UART: [art] Store priv key in slot 0x5
6,843,359 UART: [art] Derive Key Pair - Done
6,858,079 UART: [art] Signing Cert with AUTHO
6,858,559 UART: RITY.KEYID = 7
6,873,939 UART: [art] Erasing AUTHORITY.KEYID = 7
6,874,704 UART: [art] PUB.X = 8977450A3A3A03689619656CA93725232546FA3A771DCF62A87CE504AA55546672FCCA6C279F559468B8B42F83CF288C
6,881,459 UART: [art] PUB.Y = ECC0C5E95CF77348C5A0D1C7B04B9CB84D66616C2D73D38310CBB24E5EB56936DA0DB57B0741CE5F63746E28043DE11A
6,888,412 UART: [art] SIG.R = ED95363FA4F885A80D376228910492A2E934FD5A7A31C2D779736ACDE040DFA544BB9CE0EACBEFA6A03EB7580B8EE5D2
6,895,191 UART: [art] SIG.S = 651633F72BED4274A2A3CB158F868D710A9BDE169FEFC7DF3969B06E2E296E0FD6EF231B860C310ABC3CD8570046AEB9
6,919,178 UART: Caliptra RT
6,919,523 UART: [state] CFI Enabled
7,201,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,232,727 UART: [rt]cmd =0x41545348, len=116
7,234,180 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
893,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,135 UART: [kat] ++
897,287 UART: [kat] sha1
901,459 UART: [kat] SHA2-256
903,399 UART: [kat] SHA2-384
905,910 UART: [kat] SHA2-512-ACC
907,811 UART: [kat] ECC-384
917,342 UART: [kat] HMAC-384Kdf
921,918 UART: [kat] LMS
1,170,246 UART: [kat] --
1,171,027 UART: [cold-reset] ++
1,171,411 UART: [fht] FHT @ 0x50003400
1,174,034 UART: [idev] ++
1,174,202 UART: [idev] CDI.KEYID = 6
1,174,562 UART: [idev] SUBJECT.KEYID = 7
1,174,986 UART: [idev] UDS.KEYID = 0
1,175,331 ready_for_fw is high
1,175,331 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,314 UART: [idev] Erasing UDS.KEYID = 0
1,200,461 UART: [idev] Sha1 KeyId Algorithm
1,208,963 UART: [idev] --
1,210,135 UART: [ldev] ++
1,210,303 UART: [ldev] CDI.KEYID = 6
1,210,666 UART: [ldev] SUBJECT.KEYID = 5
1,211,092 UART: [ldev] AUTHORITY.KEYID = 7
1,211,555 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,829 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,860 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,804 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,303 >>> mbox cmd response: success
2,773,337 UART: [afmc] ++
2,773,505 UART: [afmc] CDI.KEYID = 6
2,773,867 UART: [afmc] SUBJECT.KEYID = 7
2,774,292 UART: [afmc] AUTHORITY.KEYID = 5
2,809,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,854 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,582 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,467 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,186 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,976 UART: [afmc] --
2,852,940 UART: [cold-reset] --
2,853,982 UART: [state] Locking Datavault
2,855,085 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,689 UART: [state] Locking ICCM
2,856,203 UART: [exit] Launching FMC @ 0x40000130
2,861,532 UART:
2,861,548 UART: Running Caliptra FMC ...
2,861,956 UART:
2,862,010 UART: [state] CFI Enabled
2,872,607 UART: [fht] FMC Alias Private Key: 7
2,980,356 UART: [art] Extend RT PCRs Done
2,980,784 UART: [art] Lock RT PCRs Done
2,982,458 UART: [art] Populate DV Done
2,990,605 UART: [fht] FMC Alias Private Key: 7
2,991,681 UART: [art] Derive CDI
2,991,961 UART: [art] Store in in slot 0x4
3,077,590 UART: [art] Derive Key Pair
3,077,950 UART: [art] Store priv key in slot 0x5
3,090,630 UART: [art] Derive Key Pair - Done
3,105,783 UART: [art] Signing Cert with AUTHO
3,106,263 UART: RITY.KEYID = 7
3,121,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,396 UART: [art] PUB.X = 003FCDE06F20F6719A5E4879A3CE94CE95F68852D67BC65A2B665862AF956DA2B461A5A0F5CBDACA1CAEFE3ED894622A
3,129,164 UART: [art] PUB.Y = 16039D26B4FC1496D35D9AECBD572A46360CDBB471E7AE004617AACA74DF1D6415461C33E09A2AF66038B92AEEB441C2
3,136,098 UART: [art] SIG.R = 0A13305288322516C5C4C7AF70D00C40E7B5C11EF68707E4387D18F30F288D2B323DEFE1E9123DB2799C6C786C68BA8A
3,142,858 UART: [art] SIG.S = 4B02C7F7AAA7289C237712FE17C650B8E2A16163500165BB12BCC76632C64CA3EC638DA3B137619F57DBAC0A58924CA7
3,166,432 UART: Caliptra RT
3,166,685 UART: [state] CFI Enabled
3,274,998 UART: [rt] RT listening for mailbox commands...
3,275,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,482 UART: [rt]cmd =0x41544d4e, len=14344
3,708,240 >>> mbox cmd response data (8 bytes)
3,708,241 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,388 UART: [rt]cmd =0x41545348, len=116
3,740,299 >>> mbox cmd response data (12 bytes)
3,740,300 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,913 UART:
3,740,929 UART: Running Caliptra ROM ...
3,741,337 UART:
3,741,392 UART: [state] CFI Enabled
3,743,992 UART: [state] LifecycleState = Unprovisioned
3,744,647 UART: [state] DebugLocked = No
3,745,129 UART: [state] WD Timer not started. Device not locked for debugging
3,746,317 UART: [kat] SHA2-256
4,551,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,556,092 UART: [kat] ++
4,556,244 UART: [kat] sha1
4,560,562 UART: [kat] SHA2-256
4,562,502 UART: [kat] SHA2-384
4,565,321 UART: [kat] SHA2-512-ACC
4,567,221 UART: [kat] ECC-384
4,577,202 UART: [kat] HMAC-384Kdf
4,581,862 UART: [kat] LMS
4,830,190 UART: [kat] --
4,831,208 UART: [update-reset] ++
6,142,094 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,143,217 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,292,795 >>> mbox cmd response: success
6,292,795 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,293,042 UART: [update-reset] Copying MAN_2 To MAN_1
6,301,056 UART: [update-reset Success] --
6,301,745 UART: [state] Locking Datavault
6,302,313 UART: [state] Locking PCR0, PCR1 and PCR31
6,302,917 UART: [state] Locking ICCM
6,303,549 UART: [exit] Launching FMC @ 0x40000130
6,308,878 UART:
6,308,894 UART: Running Caliptra FMC ...
6,309,302 UART:
6,309,356 UART: [state] CFI Enabled
6,398,171 UART: [art] Extend RT PCRs Done
6,398,599 UART: [art] Lock RT PCRs Done
6,399,910 UART: [art] Populate DV Done
6,408,109 UART: [fht] FMC Alias Private Key: 7
6,409,071 UART: [art] Derive CDI
6,409,351 UART: [art] Store in in slot 0x4
6,495,194 UART: [art] Derive Key Pair
6,495,554 UART: [art] Store priv key in slot 0x5
6,509,166 UART: [art] Derive Key Pair - Done
6,523,562 UART: [art] Signing Cert with AUTHO
6,524,042 UART: RITY.KEYID = 7
6,539,274 UART: [art] Erasing AUTHORITY.KEYID = 7
6,540,039 UART: [art] PUB.X = 64243E9AEE89A16524ED5F43A07F7205DBF44D3419EF484F5BEF5A9C37AEC19B3321ABE23BC155D8F57799FBA6AAB217
6,546,822 UART: [art] PUB.Y = D1AADBA8681872AA02C87E94DE3BCB0CFC33168CED30F191240601C7F8016FA0BC331271CBCB0083D553BFF9E2B437BA
6,553,753 UART: [art] SIG.R = 0B0F2A4CFA1F76E3416053659C483FF61145095A362E9A4E83342ACB3727D31AE02251768A83CC0FB213C7405889F00C
6,560,504 UART: [art] SIG.S = A847DE36E3364CEC2FAC3367184EB45A1FAFC6D9E58889D8B11E669180A041E5A92A1E92F8AA12C28280DAF185F0BDC0
6,583,739 UART: Caliptra RT
6,583,992 UART: [state] CFI Enabled
6,864,803 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,895,654 UART: [rt]cmd =0x41545348, len=116
6,897,393 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,369 ready_for_fw is high
1,060,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,426 >>> mbox cmd response: success
2,685,664 UART:
2,685,680 UART: Running Caliptra FMC ...
2,686,088 UART:
2,686,142 UART: [state] CFI Enabled
2,696,727 UART: [fht] FMC Alias Private Key: 7
2,804,472 UART: [art] Extend RT PCRs Done
2,804,900 UART: [art] Lock RT PCRs Done
2,806,026 UART: [art] Populate DV Done
2,814,139 UART: [fht] FMC Alias Private Key: 7
2,815,273 UART: [art] Derive CDI
2,815,553 UART: [art] Store in in slot 0x4
2,901,352 UART: [art] Derive Key Pair
2,901,712 UART: [art] Store priv key in slot 0x5
2,914,580 UART: [art] Derive Key Pair - Done
2,929,352 UART: [art] Signing Cert with AUTHO
2,929,832 UART: RITY.KEYID = 7
2,944,996 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,761 UART: [art] PUB.X = D101C2E9AE2C2CEE5CC78678A7DCD8B0709F1C76D8A948B803509DC941550D71050C2D9C504CB42B855C1A7825E27957
2,952,520 UART: [art] PUB.Y = 4ECD039E15E4B882903016B5A68C8AC1B468FAFB862834E57A1BE4AF635C7EE2915D615C4ECDA883B5BC7B809CD4A2F6
2,959,483 UART: [art] SIG.R = C2F9CA504C55E684A686E04F7F7DA671CF7138BFDCF4F4DDE2C7CF564D77EA3B19F449764D908BEE3106308B2E1EAE42
2,966,268 UART: [art] SIG.S = 542A74C58E27DABE923511A51CEC103FF932890F735573187D0B241A83FE43649628C247DD94F117B6B75CCB07F6199A
2,989,948 UART: Caliptra RT
2,990,201 UART: [state] CFI Enabled
3,097,922 UART: [rt] RT listening for mailbox commands...
3,098,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,732 UART: [rt]cmd =0x41544d4e, len=14344
3,531,798 >>> mbox cmd response data (8 bytes)
3,531,799 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,750 UART: [rt]cmd =0x41545348, len=116
3,563,661 >>> mbox cmd response data (12 bytes)
3,563,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,444 >>> mbox cmd response: success
5,999,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,012,878 UART:
6,012,894 UART: Running Caliptra FMC ...
6,013,302 UART:
6,013,356 UART: [state] CFI Enabled
6,102,251 UART: [art] Extend RT PCRs Done
6,102,679 UART: [art] Lock RT PCRs Done
6,103,914 UART: [art] Populate DV Done
6,112,359 UART: [fht] FMC Alias Private Key: 7
6,113,301 UART: [art] Derive CDI
6,113,581 UART: [art] Store in in slot 0x4
6,199,286 UART: [art] Derive Key Pair
6,199,646 UART: [art] Store priv key in slot 0x5
6,212,382 UART: [art] Derive Key Pair - Done
6,227,349 UART: [art] Signing Cert with AUTHO
6,227,829 UART: RITY.KEYID = 7
6,243,227 UART: [art] Erasing AUTHORITY.KEYID = 7
6,243,992 UART: [art] PUB.X = 44F973591560CBBC69B2558722BEBA4F93D3C85E6CBF3B57D77B8036B51B0FB05A410AEFEA618B4E29371F400FB8681C
6,250,763 UART: [art] PUB.Y = C32FA191A035044318CB40AE36BD1422AF5211EF752DEBEF8F1B6CDFD73297BD1CA5EC782ABADA5FA73E995B68CEF0C4
6,257,736 UART: [art] SIG.R = 00A1107933624D29B65E02B700833599241BAE6CAC69722F337F42FA8F2C1A0B21D8D23CD504CCD7D5D9E8294F0759D6
6,264,450 UART: [art] SIG.S = 5B6FA6C9E99997F9BB9B8EE6E92B33A2184DDCFCEDD3709471EE3FCB8615A40F402436DC4C400A3F69AB6C10CB99BF9C
6,288,337 UART: Caliptra RT
6,288,590 UART: [state] CFI Enabled
6,568,744 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,599,747 UART: [rt]cmd =0x41545348, len=116
6,601,570 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,285 UART: [kat] SHA2-256
893,935 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,060 UART: [kat] ++
898,212 UART: [kat] sha1
902,670 UART: [kat] SHA2-256
904,610 UART: [kat] SHA2-384
907,323 UART: [kat] SHA2-512-ACC
909,224 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,504 UART: [cold-reset] ++
1,172,944 UART: [fht] FHT @ 0x50003400
1,175,537 UART: [idev] ++
1,175,705 UART: [idev] CDI.KEYID = 6
1,176,065 UART: [idev] SUBJECT.KEYID = 7
1,176,489 UART: [idev] UDS.KEYID = 0
1,176,834 ready_for_fw is high
1,176,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,371 UART: [idev] Erasing UDS.KEYID = 0
1,201,174 UART: [idev] Sha1 KeyId Algorithm
1,209,578 UART: [idev] --
1,210,550 UART: [ldev] ++
1,210,718 UART: [ldev] CDI.KEYID = 6
1,211,081 UART: [ldev] SUBJECT.KEYID = 5
1,211,507 UART: [ldev] AUTHORITY.KEYID = 7
1,211,970 UART: [ldev] FE.KEYID = 1
1,217,208 UART: [ldev] Erasing FE.KEYID = 1
1,243,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,162 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,215 UART: [fwproc] Recv command 0x46574c44
1,283,943 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,384 >>> mbox cmd response: success
2,772,552 UART: [afmc] ++
2,772,720 UART: [afmc] CDI.KEYID = 6
2,773,082 UART: [afmc] SUBJECT.KEYID = 7
2,773,507 UART: [afmc] AUTHORITY.KEYID = 5
2,809,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,699 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,427 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,312 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,795 UART: [afmc] --
2,852,719 UART: [cold-reset] --
2,853,545 UART: [state] Locking Datavault
2,854,866 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,470 UART: [state] Locking ICCM
2,855,944 UART: [exit] Launching FMC @ 0x40000130
2,861,273 UART:
2,861,289 UART: Running Caliptra FMC ...
2,861,697 UART:
2,861,840 UART: [state] CFI Enabled
2,872,615 UART: [fht] FMC Alias Private Key: 7
2,980,712 UART: [art] Extend RT PCRs Done
2,981,140 UART: [art] Lock RT PCRs Done
2,982,790 UART: [art] Populate DV Done
2,991,219 UART: [fht] FMC Alias Private Key: 7
2,992,211 UART: [art] Derive CDI
2,992,491 UART: [art] Store in in slot 0x4
3,078,188 UART: [art] Derive Key Pair
3,078,548 UART: [art] Store priv key in slot 0x5
3,091,844 UART: [art] Derive Key Pair - Done
3,106,517 UART: [art] Signing Cert with AUTHO
3,106,997 UART: RITY.KEYID = 7
3,122,295 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,060 UART: [art] PUB.X = 65706253FFCF071CD4CAFB4778DFF60D26B504E41FEC977A78D3C4907D942E09ABA3FCBB207454CD0104E36B8F95554A
3,129,824 UART: [art] PUB.Y = 3A75D13DBB607B29B8B615EF36BAC8049B118998F47618E5185C04A0D3EFAAE2556DD77F64163A58CDBDE8D15E72A4F8
3,136,780 UART: [art] SIG.R = 33E378A206E30189DE0A679DF271E0B36A32D1C0DD5A7F513D36F505BB4E1546C4483F95F67D25EC04AD317284BDBF3A
3,143,543 UART: [art] SIG.S = FAC99A38F66A660F663EC70CE3F5FBB26EF61D28D7A4458C9922DAFB7A372A9EC18E6FDEBF26927B3FC40A84AB9E0214
3,167,026 UART: Caliptra RT
3,167,371 UART: [state] CFI Enabled
3,274,802 UART: [rt] RT listening for mailbox commands...
3,275,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,204 UART: [rt]cmd =0x41544d4e, len=14344
3,708,034 >>> mbox cmd response data (8 bytes)
3,708,035 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,982 UART: [rt]cmd =0x41545348, len=116
3,739,617 >>> mbox cmd response data (12 bytes)
3,739,618 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,527 UART:
3,740,543 UART: Running Caliptra ROM ...
3,740,951 UART:
3,741,093 UART: [state] CFI Enabled
3,743,269 UART: [state] LifecycleState = Unprovisioned
3,743,924 UART: [state] DebugLocked = No
3,744,594 UART: [state] WD Timer not started. Device not locked for debugging
3,745,904 UART: [kat] SHA2-256
4,551,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,555,679 UART: [kat] ++
4,555,831 UART: [kat] sha1
4,560,063 UART: [kat] SHA2-256
4,562,003 UART: [kat] SHA2-384
4,564,786 UART: [kat] SHA2-512-ACC
4,566,686 UART: [kat] ECC-384
4,576,679 UART: [kat] HMAC-384Kdf
4,581,365 UART: [kat] LMS
4,829,693 UART: [kat] --
4,830,637 UART: [update-reset] ++
6,140,773 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,141,900 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,291,478 >>> mbox cmd response: success
6,291,478 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,291,805 UART: [update-reset] Copying MAN_2 To MAN_1
6,299,819 UART: [update-reset Success] --
6,300,708 UART: [state] Locking Datavault
6,301,386 UART: [state] Locking PCR0, PCR1 and PCR31
6,301,990 UART: [state] Locking ICCM
6,302,550 UART: [exit] Launching FMC @ 0x40000130
6,307,879 UART:
6,307,895 UART: Running Caliptra FMC ...
6,308,303 UART:
6,308,446 UART: [state] CFI Enabled
6,397,333 UART: [art] Extend RT PCRs Done
6,397,761 UART: [art] Lock RT PCRs Done
6,398,840 UART: [art] Populate DV Done
6,407,131 UART: [fht] FMC Alias Private Key: 7
6,408,167 UART: [art] Derive CDI
6,408,447 UART: [art] Store in in slot 0x4
6,494,038 UART: [art] Derive Key Pair
6,494,398 UART: [art] Store priv key in slot 0x5
6,507,674 UART: [art] Derive Key Pair - Done
6,522,454 UART: [art] Signing Cert with AUTHO
6,522,934 UART: RITY.KEYID = 7
6,538,260 UART: [art] Erasing AUTHORITY.KEYID = 7
6,539,025 UART: [art] PUB.X = 65C6C12D319B89B50D7458DA2AD5E578686235607B3F30F5ECE245625A510C828C35FF6C60D17D19B33287ACA0C9B977
6,545,789 UART: [art] PUB.Y = B3DE9C1F20EE08CAD6EB68FDED58C18FB972EBF1EA148DBD38860B6A46187FD2480C29AE1450468014B1C5AA838FFA07
6,552,747 UART: [art] SIG.R = D8B2BD475E03AD647FB1CA512EE6DEEA1B11FB46ABF686C493750CE1BF803BC51F5B5192BE60BBB0883781950868DF7E
6,559,526 UART: [art] SIG.S = 55603F09D6C3BF4B03A900DCFA906B11FB9F39EAF9E25ED26EDEE06A4C8CB2CBE9382539DAAAA52A104C1EC79C83C098
6,583,495 UART: Caliptra RT
6,583,840 UART: [state] CFI Enabled
6,864,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,895,800 UART: [rt]cmd =0x41545348, len=116
6,897,377 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,172 ready_for_fw is high
1,060,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,559 >>> mbox cmd response: success
2,686,961 UART:
2,686,977 UART: Running Caliptra FMC ...
2,687,385 UART:
2,687,528 UART: [state] CFI Enabled
2,698,405 UART: [fht] FMC Alias Private Key: 7
2,806,326 UART: [art] Extend RT PCRs Done
2,806,754 UART: [art] Lock RT PCRs Done
2,808,238 UART: [art] Populate DV Done
2,816,207 UART: [fht] FMC Alias Private Key: 7
2,817,189 UART: [art] Derive CDI
2,817,469 UART: [art] Store in in slot 0x4
2,902,884 UART: [art] Derive Key Pair
2,903,244 UART: [art] Store priv key in slot 0x5
2,916,502 UART: [art] Derive Key Pair - Done
2,931,750 UART: [art] Signing Cert with AUTHO
2,932,230 UART: RITY.KEYID = 7
2,947,644 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,409 UART: [art] PUB.X = DA6196B9DFF6C613CA59E4A500E1FDDC1A7BA65D3541C22B7114980103A8FBDD8FDE01278FF12FB25395EBF44063B1DD
2,955,166 UART: [art] PUB.Y = 1D50E2DBAB55A68C15A5E64D11231E3D6F5C0F86A0487C66C9A07846FE3A99808E6A65CC24E206EDA3DD3D816B42A5B9
2,962,122 UART: [art] SIG.R = B97BB2E4417A60B097D7DD1D49E7EBD6C54F6D1237E704C0866D547BC8FA6B06A53DB301F86B839FD18FD1817FDE8045
2,968,895 UART: [art] SIG.S = D42D510813EC2A939DB83B890E7FD05938470ECBFC08D8C5B248BFAC09A551294A42115312EA562C8E67F29A69E482CA
2,992,087 UART: Caliptra RT
2,992,432 UART: [state] CFI Enabled
3,099,522 UART: [rt] RT listening for mailbox commands...
3,100,192 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,280 UART: [rt]cmd =0x41544d4e, len=14344
3,532,818 >>> mbox cmd response data (8 bytes)
3,532,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,886 UART: [rt]cmd =0x41545348, len=116
3,564,815 >>> mbox cmd response data (12 bytes)
3,564,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,000,579 >>> mbox cmd response: success
6,000,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,014,099 UART:
6,014,115 UART: Running Caliptra FMC ...
6,014,523 UART:
6,014,666 UART: [state] CFI Enabled
6,103,923 UART: [art] Extend RT PCRs Done
6,104,351 UART: [art] Lock RT PCRs Done
6,105,474 UART: [art] Populate DV Done
6,113,653 UART: [fht] FMC Alias Private Key: 7
6,114,621 UART: [art] Derive CDI
6,114,901 UART: [art] Store in in slot 0x4
6,200,496 UART: [art] Derive Key Pair
6,200,856 UART: [art] Store priv key in slot 0x5
6,214,194 UART: [art] Derive Key Pair - Done
6,228,540 UART: [art] Signing Cert with AUTHO
6,229,020 UART: RITY.KEYID = 7
6,244,350 UART: [art] Erasing AUTHORITY.KEYID = 7
6,245,115 UART: [art] PUB.X = 1E932B9BC757DEB53351836A1BE785899E794957A87FD20E42FD07ED857E0A46A5FDE90083A5540FD7E6D8CEE47DF6EE
6,251,863 UART: [art] PUB.Y = 40C4821299D5D1DA8A2B02E51C1479DBD06C1C3E0A81A501B3B984C6997849F55948E2EAB8C699DD1F8A4FFA0E075796
6,258,804 UART: [art] SIG.R = 9F75FE57F9421DC0367394838A621430157D4FD3253A4D9FC6FCCCD68E0EF1A9431BA2E7AA01563A5ED0B0315874A727
6,265,572 UART: [art] SIG.S = 438135F5E46B9049E930E9D60A233E19939C2A0CC2CFE6B793BA108B403D5F82BA0B63C52239CBFA47F8F3587007BD13
6,289,193 UART: Caliptra RT
6,289,538 UART: [state] CFI Enabled
6,565,695 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,596,850 UART: [rt]cmd =0x41545348, len=116
6,598,427 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [kat] SHA2-256
891,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,729 UART: [kat] ++
895,881 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,174,211 ready_for_fw is high
1,174,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,191 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,209,128 UART: [ldev] ++
1,209,296 UART: [ldev] CDI.KEYID = 6
1,209,660 UART: [ldev] SUBJECT.KEYID = 5
1,210,087 UART: [ldev] AUTHORITY.KEYID = 7
1,210,550 UART: [ldev] FE.KEYID = 1
1,215,934 UART: [ldev] Erasing FE.KEYID = 1
1,242,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,644 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,667 UART: [fwproc] Recv command 0x46574c44
1,283,400 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,775 >>> mbox cmd response: success
2,772,796 UART: [afmc] ++
2,772,964 UART: [afmc] CDI.KEYID = 6
2,773,327 UART: [afmc] SUBJECT.KEYID = 7
2,773,753 UART: [afmc] AUTHORITY.KEYID = 5
2,809,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,788 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,870 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,643 UART: [afmc] --
2,852,765 UART: [cold-reset] --
2,853,517 UART: [state] Locking Datavault
2,854,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,370 UART: [state] Locking ICCM
2,855,804 UART: [exit] Launching FMC @ 0x40000130
2,861,133 UART:
2,861,149 UART: Running Caliptra FMC ...
2,861,557 UART:
2,861,611 UART: [state] CFI Enabled
2,871,828 UART: [fht] FMC Alias Private Key: 7
2,979,867 UART: [art] Extend RT PCRs Done
2,980,295 UART: [art] Lock RT PCRs Done
2,981,581 UART: [art] Populate DV Done
2,990,050 UART: [fht] FMC Alias Private Key: 7
2,991,178 UART: [art] Derive CDI
2,991,458 UART: [art] Store in in slot 0x4
3,077,115 UART: [art] Derive Key Pair
3,077,475 UART: [art] Store priv key in slot 0x5
3,090,047 UART: [art] Derive Key Pair - Done
3,104,917 UART: [art] Signing Cert with AUTHO
3,105,397 UART: RITY.KEYID = 7
3,120,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,338 UART: [art] PUB.X = E6C10CE2A32E603657E32BDA17BCA7C391D7BF8CBF111983BBBD0D36C034E74FAA272EF992933D3377F1931B4E66489E
3,128,114 UART: [art] PUB.Y = 7FD0F74431AE99BD403D76824A7D99BA515B94F9F67C730E4BE4374E1221D4811BFD03A7805F642BCEA0B401F1A8A5AC
3,135,065 UART: [art] SIG.R = 9776BACF15E49C3484596BC6583DDA0571CE11FD8039FD3B86A70AE4FB74A43B7588E3697E411E8291209BEC236C2F0C
3,141,832 UART: [art] SIG.S = D42C7A7606C810565525FCAD85F3B6172AEB60B684DA15E8194A078B759550794245FE7EEF961C76F357F1A2F61B3AA2
3,165,163 UART: Caliptra RT
3,165,416 UART: [state] CFI Enabled
3,273,702 UART: [rt] RT listening for mailbox commands...
3,274,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,360 UART: [rt]cmd =0x41544d4e, len=14344
3,706,844 >>> mbox cmd response data (8 bytes)
3,706,845 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,100 UART: [rt]cmd =0x41545348, len=116
3,739,199 >>> mbox cmd response data (12 bytes)
3,739,200 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,981 UART:
3,739,997 UART: Running Caliptra ROM ...
3,740,405 UART:
3,740,460 UART: [state] CFI Enabled
3,743,024 UART: [state] LifecycleState = Unprovisioned
3,743,679 UART: [state] DebugLocked = No
3,744,319 UART: [state] WD Timer not started. Device not locked for debugging
3,745,435 UART: [kat] SHA2-256
4,548,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,553,114 UART: [kat] ++
4,553,266 UART: [kat] sha1
4,557,478 UART: [kat] SHA2-256
4,559,418 UART: [kat] SHA2-384
4,561,927 UART: [kat] SHA2-512-ACC
4,563,827 UART: [kat] ECC-384
4,572,976 UART: [kat] HMAC-384Kdf
4,577,540 UART: [kat] LMS
4,825,852 UART: [kat] --
4,826,604 UART: [update-reset] ++
6,137,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,138,310 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,287,888 >>> mbox cmd response: success
6,287,888 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,288,005 UART: [update-reset] Copying MAN_2 To MAN_1
6,296,019 UART: [update-reset Success] --
6,296,818 UART: [state] Locking Datavault
6,297,552 UART: [state] Locking PCR0, PCR1 and PCR31
6,298,156 UART: [state] Locking ICCM
6,298,722 UART: [exit] Launching FMC @ 0x40000130
6,304,051 UART:
6,304,067 UART: Running Caliptra FMC ...
6,304,475 UART:
6,304,529 UART: [state] CFI Enabled
6,393,156 UART: [art] Extend RT PCRs Done
6,393,584 UART: [art] Lock RT PCRs Done
6,395,019 UART: [art] Populate DV Done
6,403,394 UART: [fht] FMC Alias Private Key: 7
6,404,394 UART: [art] Derive CDI
6,404,674 UART: [art] Store in in slot 0x4
6,490,547 UART: [art] Derive Key Pair
6,490,907 UART: [art] Store priv key in slot 0x5
6,504,245 UART: [art] Derive Key Pair - Done
6,519,066 UART: [art] Signing Cert with AUTHO
6,519,546 UART: RITY.KEYID = 7
6,534,676 UART: [art] Erasing AUTHORITY.KEYID = 7
6,535,441 UART: [art] PUB.X = 9C1D975BB82A6C69FCAEA96B9F48BF5F2AEF1306458482626B6864A9D522818905671260397D060CE57284AD5E36DC77
6,542,197 UART: [art] PUB.Y = F6E34C0CEB40839A9FBD60279C4C1CA07615404BE6551D0433DE912D5E4349643EAD934CA70C0998E0CC6B7B8F2D60A4
6,549,143 UART: [art] SIG.R = 0AA8B391D99082D136850D5A63CBABC24655F1CB37A1382840FB51F7645863D468289DF17F7BDE88BC65946922E3A39A
6,555,907 UART: [art] SIG.S = 8E1FEFDC9B47AE6AF61860648C2BB54A8BB0B78554CF9E8599626E104E2E91D298C27434B1A398DED2993412B9D81C3B
6,579,422 UART: Caliptra RT
6,579,675 UART: [state] CFI Enabled
6,862,878 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,893,765 UART: [rt]cmd =0x41545348, len=116
6,895,430 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,558 ready_for_fw is high
1,055,558 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,595 >>> mbox cmd response: success
2,680,299 UART:
2,680,315 UART: Running Caliptra FMC ...
2,680,723 UART:
2,680,777 UART: [state] CFI Enabled
2,691,280 UART: [fht] FMC Alias Private Key: 7
2,798,957 UART: [art] Extend RT PCRs Done
2,799,385 UART: [art] Lock RT PCRs Done
2,801,093 UART: [art] Populate DV Done
2,809,298 UART: [fht] FMC Alias Private Key: 7
2,810,242 UART: [art] Derive CDI
2,810,522 UART: [art] Store in in slot 0x4
2,896,125 UART: [art] Derive Key Pair
2,896,485 UART: [art] Store priv key in slot 0x5
2,910,113 UART: [art] Derive Key Pair - Done
2,925,066 UART: [art] Signing Cert with AUTHO
2,925,546 UART: RITY.KEYID = 7
2,940,712 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,477 UART: [art] PUB.X = B0A8EDFD865EF0BA7DEC0812DF01E773E29FE9204262428DB98C0C96842B8BB23D623B28BB6EBA2137F1333D62D8B95F
2,948,252 UART: [art] PUB.Y = E3F1E44DADBD203EEEA4F39C38B3F12EBBF90ED8D95EB0E9D53035B29FCAA15184D76E662F73A0D21D6A789089CBB710
2,955,221 UART: [art] SIG.R = 4F929C23CA2B56478E9C261CF25BD346A6DA27FDF8F3B2A4CF506A9945CEFBACEA985A9C9602D7FEA750D655BD6CB032
2,962,010 UART: [art] SIG.S = 20EE15861B79F74770FFCDE584584C462E385DDF614ED27E73B31714D0CDA5957C2AC0D423C651F3EFA1BDBCEDB4F9D5
2,985,273 UART: Caliptra RT
2,985,526 UART: [state] CFI Enabled
3,092,859 UART: [rt] RT listening for mailbox commands...
3,093,529 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,499 UART: [rt]cmd =0x41544d4e, len=14344
3,526,503 >>> mbox cmd response data (8 bytes)
3,526,504 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,805 UART: [rt]cmd =0x41545348, len=116
3,558,502 >>> mbox cmd response data (12 bytes)
3,558,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,988,954 >>> mbox cmd response: success
5,988,954 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,002,614 UART:
6,002,630 UART: Running Caliptra FMC ...
6,003,038 UART:
6,003,092 UART: [state] CFI Enabled
6,091,967 UART: [art] Extend RT PCRs Done
6,092,395 UART: [art] Lock RT PCRs Done
6,093,430 UART: [art] Populate DV Done
6,101,411 UART: [fht] FMC Alias Private Key: 7
6,102,577 UART: [art] Derive CDI
6,102,857 UART: [art] Store in in slot 0x4
6,188,442 UART: [art] Derive Key Pair
6,188,802 UART: [art] Store priv key in slot 0x5
6,201,718 UART: [art] Derive Key Pair - Done
6,216,091 UART: [art] Signing Cert with AUTHO
6,216,571 UART: RITY.KEYID = 7
6,231,607 UART: [art] Erasing AUTHORITY.KEYID = 7
6,232,372 UART: [art] PUB.X = 50B42AEE8A24B21BC60CB0A40DF2FCADF6C336DA0DA3547EF94829382DE7227B11188F174DACD206E4ED4534A42A5BD7
6,239,148 UART: [art] PUB.Y = E04343F2C2EAEF7CD0FE8744EE583DB2032813359586C82DCDBB7A90D2D613FDB2900CE6BD184E807CABEB766550E99D
6,246,108 UART: [art] SIG.R = 7FC1BB22EDDA250301BB1E0136CE77076563160EB626FD6FCAD634BFFC37838E3027C39A3E5B21737E33E548906B9D06
6,252,866 UART: [art] SIG.S = 0A9387E9AA3C19F7B69DC33E4A217A2AB2F78714A1AEBBB8E3691759FA9906B9049772C8CF5F69B5FE21781530A53372
6,277,128 UART: Caliptra RT
6,277,381 UART: [state] CFI Enabled
6,557,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,588,285 UART: [rt]cmd =0x41545348, len=116
6,590,002 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,174,852 ready_for_fw is high
1,174,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,750 UART: [idev] Erasing UDS.KEYID = 0
1,200,138 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,791 UART: [ldev] SUBJECT.KEYID = 5
1,211,218 UART: [ldev] AUTHORITY.KEYID = 7
1,211,681 UART: [ldev] FE.KEYID = 1
1,216,941 UART: [ldev] Erasing FE.KEYID = 1
1,243,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,827 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,181 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,169 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,478 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,006 >>> mbox cmd response: success
2,774,109 UART: [afmc] ++
2,774,277 UART: [afmc] CDI.KEYID = 6
2,774,640 UART: [afmc] SUBJECT.KEYID = 7
2,775,066 UART: [afmc] AUTHORITY.KEYID = 5
2,810,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,577 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,460 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,179 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,024 UART: [afmc] --
2,853,960 UART: [cold-reset] --
2,854,786 UART: [state] Locking Datavault
2,855,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,353 UART: [state] Locking ICCM
2,856,837 UART: [exit] Launching FMC @ 0x40000130
2,862,166 UART:
2,862,182 UART: Running Caliptra FMC ...
2,862,590 UART:
2,862,733 UART: [state] CFI Enabled
2,873,286 UART: [fht] FMC Alias Private Key: 7
2,981,755 UART: [art] Extend RT PCRs Done
2,982,183 UART: [art] Lock RT PCRs Done
2,984,099 UART: [art] Populate DV Done
2,992,434 UART: [fht] FMC Alias Private Key: 7
2,993,478 UART: [art] Derive CDI
2,993,758 UART: [art] Store in in slot 0x4
3,079,429 UART: [art] Derive Key Pair
3,079,789 UART: [art] Store priv key in slot 0x5
3,092,967 UART: [art] Derive Key Pair - Done
3,107,687 UART: [art] Signing Cert with AUTHO
3,108,167 UART: RITY.KEYID = 7
3,123,479 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,244 UART: [art] PUB.X = 9ECE5125DA98B48A69F47E47412911F9EE578AC3CA41584F04287EBA1C72BC4C9829B500D1A3A6055564D412F9867793
3,130,984 UART: [art] PUB.Y = 9747CA4EBA672BB0506E20704AA52CAE2ABFDAFC5583F77AC61A9C37CCAAD0011B46D743322DC82C51CCCBCEE373E05D
3,137,957 UART: [art] SIG.R = D1E81F1C11C852CE5B5B1BEC9F330B169762CB09BCF38267F7931544E1AF38F5B91617972DF39BAAC610646ED8B4D1CF
3,144,733 UART: [art] SIG.S = 4172D40D5B4EC8C65C15483711FDF302886D9D2138E4A3D327FD8FEEA889E4C22C7FEA25F1897D2483EF9AA6AAB25790
3,168,484 UART: Caliptra RT
3,168,829 UART: [state] CFI Enabled
3,277,232 UART: [rt] RT listening for mailbox commands...
3,277,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,574 UART: [rt]cmd =0x41544d4e, len=14344
3,710,398 >>> mbox cmd response data (8 bytes)
3,710,399 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,296 UART: [rt]cmd =0x41545348, len=116
3,741,961 >>> mbox cmd response data (12 bytes)
3,741,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,849 UART:
3,742,865 UART: Running Caliptra ROM ...
3,743,273 UART:
3,743,415 UART: [state] CFI Enabled
3,746,349 UART: [state] LifecycleState = Unprovisioned
3,747,004 UART: [state] DebugLocked = No
3,747,644 UART: [state] WD Timer not started. Device not locked for debugging
3,748,948 UART: [kat] SHA2-256
4,552,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,556,627 UART: [kat] ++
4,556,779 UART: [kat] sha1
4,561,039 UART: [kat] SHA2-256
4,562,979 UART: [kat] SHA2-384
4,565,760 UART: [kat] SHA2-512-ACC
4,567,660 UART: [kat] ECC-384
4,577,741 UART: [kat] HMAC-384Kdf
4,582,377 UART: [kat] LMS
4,830,689 UART: [kat] --
4,831,607 UART: [update-reset] ++
6,142,478 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,143,511 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
6,293,089 >>> mbox cmd response: success
6,293,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,293,380 UART: [update-reset] Copying MAN_2 To MAN_1
6,301,394 UART: [update-reset Success] --
6,302,493 UART: [state] Locking Datavault
6,303,431 UART: [state] Locking PCR0, PCR1 and PCR31
6,304,035 UART: [state] Locking ICCM
6,304,641 UART: [exit] Launching FMC @ 0x40000130
6,309,970 UART:
6,309,986 UART: Running Caliptra FMC ...
6,310,394 UART:
6,310,537 UART: [state] CFI Enabled
6,399,796 UART: [art] Extend RT PCRs Done
6,400,224 UART: [art] Lock RT PCRs Done
6,401,513 UART: [art] Populate DV Done
6,409,706 UART: [fht] FMC Alias Private Key: 7
6,410,704 UART: [art] Derive CDI
6,410,984 UART: [art] Store in in slot 0x4
6,496,675 UART: [art] Derive Key Pair
6,497,035 UART: [art] Store priv key in slot 0x5
6,510,089 UART: [art] Derive Key Pair - Done
6,525,085 UART: [art] Signing Cert with AUTHO
6,525,565 UART: RITY.KEYID = 7
6,540,907 UART: [art] Erasing AUTHORITY.KEYID = 7
6,541,672 UART: [art] PUB.X = 0C6AF7670C9B78FF7D39EC5CAF7B36868E7C76CEF6F57204D92D29A8C07DC952664ABD417E101DC8F98E41060D6A6223
6,548,437 UART: [art] PUB.Y = 987CD3EF470F5CDEC3180791CF0761CCBB4E58F89886E20CE5FC6A155F2045BFDCBD6CCB251EE1A07A551F7A41BEDB76
6,555,399 UART: [art] SIG.R = 53217B14B7B47127C919A8CF69F3FDFB748DB798F5D7A39E83164509A0DFFA43E21E39880980ABC9EFAB29377F1729AC
6,562,171 UART: [art] SIG.S = 42C10188138C9B08AABDE589651577BAD88C22B38BB01B77607B0DB92E1E438889855E31A846A6F98B9103EE7007CD60
6,586,403 UART: Caliptra RT
6,586,748 UART: [state] CFI Enabled
6,864,019 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,895,062 UART: [rt]cmd =0x41545348, len=116
6,896,593 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,413 ready_for_fw is high
1,056,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,582 >>> mbox cmd response: success
2,682,940 UART:
2,682,956 UART: Running Caliptra FMC ...
2,683,364 UART:
2,683,507 UART: [state] CFI Enabled
2,694,206 UART: [fht] FMC Alias Private Key: 7
2,802,899 UART: [art] Extend RT PCRs Done
2,803,327 UART: [art] Lock RT PCRs Done
2,804,601 UART: [art] Populate DV Done
2,813,002 UART: [fht] FMC Alias Private Key: 7
2,813,938 UART: [art] Derive CDI
2,814,218 UART: [art] Store in in slot 0x4
2,899,971 UART: [art] Derive Key Pair
2,900,331 UART: [art] Store priv key in slot 0x5
2,913,193 UART: [art] Derive Key Pair - Done
2,927,859 UART: [art] Signing Cert with AUTHO
2,928,339 UART: RITY.KEYID = 7
2,943,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,354 UART: [art] PUB.X = AE0258F0E59878935379C949103F315BBA264BF8482AD8F718BC1CA07CF13FD6E0596B67698C81F6DCB322F64725D435
2,951,121 UART: [art] PUB.Y = 738664CC1A2032AFFE44B71F7BD557D6E6648394B0592DC41A69B795A01C2AC7F481A961CFCF66C722E129C3A3B8B50D
2,958,076 UART: [art] SIG.R = F0FBB87B6034C5AF2F0588BD07E4985D2758C4B845AB235F80690AFC6425A3142DDE60D05AB32FD505B1A51AC60569AC
2,964,841 UART: [art] SIG.S = 8B9A4FEA7B0483A06B355754BE574A060B5A500466F352E6C4CE7575BAE3C9ABDDA3192818C8FE08C459A8D3FF4D2EAD
2,989,173 UART: Caliptra RT
2,989,518 UART: [state] CFI Enabled
3,097,178 UART: [rt] RT listening for mailbox commands...
3,097,848 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,818 UART: [rt]cmd =0x41544d4e, len=14344
3,530,292 >>> mbox cmd response data (8 bytes)
3,530,293 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,356 UART: [rt]cmd =0x41545348, len=116
3,562,103 >>> mbox cmd response data (12 bytes)
3,562,104 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,993,684 >>> mbox cmd response: success
5,993,684 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,006,986 UART:
6,007,002 UART: Running Caliptra FMC ...
6,007,410 UART:
6,007,553 UART: [state] CFI Enabled
6,096,674 UART: [art] Extend RT PCRs Done
6,097,102 UART: [art] Lock RT PCRs Done
6,098,655 UART: [art] Populate DV Done
6,106,990 UART: [fht] FMC Alias Private Key: 7
6,107,988 UART: [art] Derive CDI
6,108,268 UART: [art] Store in in slot 0x4
6,193,983 UART: [art] Derive Key Pair
6,194,343 UART: [art] Store priv key in slot 0x5
6,208,645 UART: [art] Derive Key Pair - Done
6,223,632 UART: [art] Signing Cert with AUTHO
6,224,112 UART: RITY.KEYID = 7
6,239,370 UART: [art] Erasing AUTHORITY.KEYID = 7
6,240,135 UART: [art] PUB.X = AC810492AC0B2324DA939EA33A65DF017C281966B63D9B6246DE93D9C919FF0B5C4969AE7366389C0023CB05CA147E56
6,246,870 UART: [art] PUB.Y = 57101EDF3A5A2C0A48C3126CA93D3B5DF922C8D984A0F987E92F164FEBE27205B0BCEB6B6D381EF5339E91EF1BDB4208
6,253,827 UART: [art] SIG.R = 164EA8D1789D5C184778A1FF7F7CA14EC42DFA88B7F30CC9F27EB4E0DDC8CC8054575B9DF4615B064E9689A577D6A32B
6,260,605 UART: [art] SIG.S = 81BEB1E6ADC63B3554E1AEB3603CA76E0C895282922FDF3B4173E2BBAFB55C4CF4976A08899AA59173F8E2A685B03A0B
6,284,105 UART: Caliptra RT
6,284,450 UART: [state] CFI Enabled
6,562,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,593,518 UART: [rt]cmd =0x41545348, len=116
6,595,017 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,149 UART:
192,510 UART: Running Caliptra ROM ...
193,595 UART:
193,735 UART: [state] CFI Enabled
261,357 UART: [state] LifecycleState = Unprovisioned
263,336 UART: [state] DebugLocked = No
265,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,352 UART: [kat] SHA2-256
440,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,562 UART: [kat] ++
451,004 UART: [kat] sha1
461,963 UART: [kat] SHA2-256
464,681 UART: [kat] SHA2-384
470,614 UART: [kat] SHA2-512-ACC
472,998 UART: [kat] ECC-384
2,767,632 UART: [kat] HMAC-384Kdf
2,792,108 UART: [kat] LMS
3,982,393 UART: [kat] --
3,985,765 UART: [cold-reset] ++
3,987,260 UART: [fht] Storing FHT @ 0x50003400
3,999,297 UART: [idev] ++
3,999,923 UART: [idev] CDI.KEYID = 6
4,000,829 UART: [idev] SUBJECT.KEYID = 7
4,002,071 UART: [idev] UDS.KEYID = 0
4,003,081 ready_for_fw is high
4,003,288 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,146,542 UART: [idev] Erasing UDS.KEYID = 0
7,349,786 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,058 UART: [idev] --
7,376,995 UART: [ldev] ++
7,377,579 UART: [ldev] CDI.KEYID = 6
7,378,589 UART: [ldev] SUBJECT.KEYID = 5
7,379,739 UART: [ldev] AUTHORITY.KEYID = 7
7,381,014 UART: [ldev] FE.KEYID = 1
7,428,299 UART: [ldev] Erasing FE.KEYID = 1
10,764,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,074,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,089,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,103,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,118,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,137,829 UART: [ldev] --
13,142,490 UART: [fwproc] Waiting for Commands...
13,145,006 UART: [fwproc] Received command 0x46574c44
13,147,186 UART: [fwproc] Received Image of size 113844 bytes
17,200,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,275,894 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,344,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,661,225 >>> mbox cmd response: success
17,666,053 UART: [afmc] ++
17,666,647 UART: [afmc] CDI.KEYID = 6
17,667,556 UART: [afmc] SUBJECT.KEYID = 7
17,668,829 UART: [afmc] AUTHORITY.KEYID = 5
21,036,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,336,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,338,820 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,353,288 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,368,062 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,382,496 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,405,220 UART: [afmc] --
23,409,183 UART: [cold-reset] --
23,412,659 UART: [state] Locking Datavault
23,419,145 UART: [state] Locking PCR0, PCR1 and PCR31
23,421,078 UART: [state] Locking ICCM
23,423,189 UART: [exit] Launching FMC @ 0x40000130
23,431,538 UART:
23,431,777 UART: Running Caliptra FMC ...
23,432,872 UART:
23,433,026 UART: [state] CFI Enabled
23,496,763 UART: [fht] FMC Alias Private Key: 7
25,834,524 UART: [art] Extend RT PCRs Done
25,835,744 UART: [art] Lock RT PCRs Done
25,837,799 UART: [art] Populate DV Done
25,843,258 UART: [fht] FMC Alias Private Key: 7
25,844,951 UART: [art] Derive CDI
25,845,758 UART: [art] Store in in slot 0x4
25,904,415 UART: [art] Derive Key Pair
25,905,455 UART: [art] Store priv key in slot 0x5
29,198,082 UART: [art] Derive Key Pair - Done
29,211,158 UART: [art] Signing Cert with AUTHO
29,212,459 UART: RITY.KEYID = 7
31,499,636 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,275 UART: [art] PUB.X = 14BD777B368A562ADB30FBD2D68AA5E1551202A72A876B58E96D303D02BF42681E423C556067463C620E890A4ECE6A44
31,508,371 UART: [art] PUB.Y = 520381813E3F83B60038822B0F09EAA7E6DEBB1EE4C2D604A9ABBCFEB78E9DC45D52AE048E07DDBB7E7CEF3ECFF39906
31,515,672 UART: [art] SIG.R = 592D4A1F95BB8A92443D8EEBF292B9F7CB92E3884702820F0F37D11BDFFF0219682724A82F4013686AC1EA469044BE30
31,523,027 UART: [art] SIG.S = 331BE4EA9BE16861DEFD04BF16800170BFC61723F718F7835AE7FCF879C5A821C0D392ED5D4D42FAB7898768061FF8B3
32,828,451 UART: Caliptra RT
32,829,167 UART: [state] CFI Enabled
33,009,816 UART: [rt] RT listening for mailbox commands...
33,012,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,043,509 UART: [rt]cmd =0x41545348, len=116
33,045,908 >>> mbox cmd response data (12 bytes)
35,103,521 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,203,946 UART:
35,204,287 UART: Running Caliptra ROM ...
35,205,381 UART:
35,205,535 UART: [state] CFI Enabled
35,272,363 UART: [state] LifecycleState = Unprovisioned
35,274,290 UART: [state] DebugLocked = No
35,276,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,280,727 UART: [kat] SHA2-256
35,450,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,460,953 UART: [kat] ++
35,461,486 UART: [kat] sha1
35,473,398 UART: [kat] SHA2-256
35,476,086 UART: [kat] SHA2-384
35,481,798 UART: [kat] SHA2-512-ACC
35,484,160 UART: [kat] ECC-384
37,778,473 UART: [kat] HMAC-384Kdf
37,810,361 UART: [kat] LMS
39,000,718 UART: [kat] --
39,006,251 UART: [update-reset] ++
42,712,370 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,715,281 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,973,117 >>> mbox cmd response: success
42,973,475 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,974,078 UART: [update-reset] Copying MAN_2 To MAN_1
42,996,508 UART: [update-reset Success] --
43,001,549 UART: [state] Locking Datavault
43,004,263 UART: [state] Locking PCR0, PCR1 and PCR31
43,006,020 UART: [state] Locking ICCM
43,007,091 UART: [exit] Launching FMC @ 0x40000130
43,015,488 UART:
43,015,750 UART: Running Caliptra FMC ...
43,016,856 UART:
43,017,009 UART: [state] CFI Enabled
43,112,755 UART: [art] Extend RT PCRs Done
43,113,946 UART: [art] Lock RT PCRs Done
43,115,236 UART: [art] Populate DV Done
43,120,745 UART: [fht] FMC Alias Private Key: 7
43,122,232 UART: [art] Derive CDI
43,122,992 UART: [art] Store in in slot 0x4
43,181,573 UART: [art] Derive Key Pair
43,182,611 UART: [art] Store priv key in slot 0x5
46,475,193 UART: [art] Derive Key Pair - Done
46,488,137 UART: [art] Signing Cert with AUTHO
46,489,439 UART: RITY.KEYID = 7
48,777,445 UART: [art] Erasing AUTHORITY.KEYID = 7
48,778,951 UART: [art] PUB.X = C8AD165903106DDC3656F408D4660F7849429BF5C14ABF56FAFB495A26AACDB20F7C14232BE20CC49EAB825F2F15347A
48,786,256 UART: [art] PUB.Y = 55FA379E174C6C0C74A077EDD166BCCAC8B1E6E4EBA310D514DD32C2F1B962BA25298A0F4918A28515CFC8179EA799C7
48,793,448 UART: [art] SIG.R = 47BD07623C3C26A1501D1D7417D402A03B198861D8C5088D996DCBF456001A88E9C65429B5629311336D6FC22F27A687
48,800,780 UART: [art] SIG.S = 37DA3F3CF9106F5E6A729CBB3D11EFFDFE18D646FF2E0C6D29AD5EBA4CA3153F0461BA93D8087F81809353445E3C1055
50,105,216 UART: mbox::rt_entry...
50,106,162 UART: ____ _ _ _ ____ _____
50,108,141 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,110,139 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,112,065 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,113,991 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,115,961 UART: |_|
50,116,845 UART:
50,402,299 UART: [rt] Runtime listening for mailbox commands...
50,404,429 >>> mbox cmd response data (48 bytes)
50,405,017 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,407,338 >>> mbox cmd response data (48 bytes)
50,408,188 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,420,756 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,807,726 ready_for_fw is high
3,808,346 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,895,389 >>> mbox cmd response: success
23,593,323 UART:
23,593,711 UART: Running Caliptra FMC ...
23,594,849 UART:
23,595,004 UART: [state] CFI Enabled
23,662,950 UART: [fht] FMC Alias Private Key: 7
26,000,164 UART: [art] Extend RT PCRs Done
26,001,418 UART: [art] Lock RT PCRs Done
26,003,158 UART: [art] Populate DV Done
26,008,849 UART: [fht] FMC Alias Private Key: 7
26,010,551 UART: [art] Derive CDI
26,011,362 UART: [art] Store in in slot 0x4
26,071,940 UART: [art] Derive Key Pair
26,072,973 UART: [art] Store priv key in slot 0x5
29,365,655 UART: [art] Derive Key Pair - Done
29,378,763 UART: [art] Signing Cert with AUTHO
29,380,062 UART: RITY.KEYID = 7
31,667,889 UART: [art] Erasing AUTHORITY.KEYID = 7
31,669,391 UART: [art] PUB.X = E26129B8237BF01E069125840CF52F32C43337EC5AF7AC8968995E8CC9F40A827E56AFEEEB052C4AF0BAB76756EE3655
31,676,655 UART: [art] PUB.Y = C722594A136802377ECB849C79E880F46D3B4CF1139A3576C2E11B96F07A658BA8D1C0BB2C272022822B34FAD9D64E20
31,683,921 UART: [art] SIG.R = 5EDDAF6B3523ABFEFFC0E8ADAF1138C422491D18A496C05BAC292C78387F144043BDBCB2F17C5740750B0A837B9FBF89
31,691,273 UART: [art] SIG.S = 722BD82D6D99A0F7784C40680621480242D2020F7B22C608FF8DF8E712B7C8849217D50FA21AF541174F8B1DFE41940F
32,995,734 UART: Caliptra RT
32,996,473 UART: [state] CFI Enabled
33,159,049 UART: [rt] RT listening for mailbox commands...
33,161,359 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,192,653 UART: [rt]cmd =0x41545348, len=116
33,194,762 >>> mbox cmd response data (12 bytes)
35,249,248 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,205,841 >>> mbox cmd response: success
43,206,340 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,240,934 UART:
43,241,266 UART: Running Caliptra FMC ...
43,242,304 UART:
43,242,451 UART: [state] CFI Enabled
43,347,426 UART: [art] Extend RT PCRs Done
43,348,611 UART: [art] Lock RT PCRs Done
43,350,290 UART: [art] Populate DV Done
43,355,862 UART: [fht] FMC Alias Private Key: 7
43,357,394 UART: [art] Derive CDI
43,358,122 UART: [art] Store in in slot 0x4
43,416,320 UART: [art] Derive Key Pair
43,417,351 UART: [art] Store priv key in slot 0x5
46,710,148 UART: [art] Derive Key Pair - Done
46,723,096 UART: [art] Signing Cert with AUTHO
46,724,396 UART: RITY.KEYID = 7
49,012,163 UART: [art] Erasing AUTHORITY.KEYID = 7
49,013,700 UART: [art] PUB.X = 5E5FEB807267F548DBD2343B771B9561E0C62F59B133FC6AE0DDA495CD607BC44E96F0752C768DB411D1ED375D343CB2
49,020,913 UART: [art] PUB.Y = F23DC1C75F7FA2007A893025C574C07FB4DE550B469CCFD58783BBBCF09A314CD74A2373951E97FF70F4733E4670F088
49,028,184 UART: [art] SIG.R = 2525FB46963AB8834C66F65874289354637B0FA77BEAD463426EB75978F1B627091408F641F2203D772D5255C072A17F
49,035,501 UART: [art] SIG.S = F435E63A266F85F8EF122A2C4A4A6B038374C71150D39F46AD5748C60189A3295EF7FDF7519FD8441939CBF58B559B68
50,340,382 UART: mbox::rt_entry...
50,341,356 UART: ____ _ _ _ ____ _____
50,343,288 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,345,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,347,367 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,349,290 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,351,137 UART: |_|
50,352,011 UART:
50,634,032 UART: [rt] Runtime listening for mailbox commands...
50,636,187 >>> mbox cmd response data (48 bytes)
50,636,752 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,639,060 >>> mbox cmd response data (48 bytes)
50,639,921 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,652,463 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,373 UART:
192,742 UART: Running Caliptra ROM ...
193,948 UART:
603,561 UART: [state] CFI Enabled
618,212 UART: [state] LifecycleState = Unprovisioned
620,161 UART: [state] DebugLocked = No
621,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,698 UART: [kat] SHA2-256
795,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,961 UART: [kat] ++
806,409 UART: [kat] sha1
817,638 UART: [kat] SHA2-256
820,362 UART: [kat] SHA2-384
825,077 UART: [kat] SHA2-512-ACC
827,451 UART: [kat] ECC-384
3,112,443 UART: [kat] HMAC-384Kdf
3,125,385 UART: [kat] LMS
4,315,479 UART: [kat] --
4,319,870 UART: [cold-reset] ++
4,321,745 UART: [fht] Storing FHT @ 0x50003400
4,333,866 UART: [idev] ++
4,334,431 UART: [idev] CDI.KEYID = 6
4,335,351 UART: [idev] SUBJECT.KEYID = 7
4,336,614 UART: [idev] UDS.KEYID = 0
4,337,627 ready_for_fw is high
4,337,838 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,907 UART: [idev] Erasing UDS.KEYID = 0
7,624,814 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,303 UART: [idev] --
7,648,838 UART: [ldev] ++
7,649,410 UART: [ldev] CDI.KEYID = 6
7,650,352 UART: [ldev] SUBJECT.KEYID = 5
7,651,486 UART: [ldev] AUTHORITY.KEYID = 7
7,652,823 UART: [ldev] FE.KEYID = 1
7,662,396 UART: [ldev] Erasing FE.KEYID = 1
10,949,149 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,576 UART: [ldev] --
13,309,247 UART: [fwproc] Waiting for Commands...
13,311,179 UART: [fwproc] Received command 0x46574c44
13,313,361 UART: [fwproc] Received Image of size 113844 bytes
17,367,603 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,821,001 >>> mbox cmd response: success
17,824,591 UART: [afmc] ++
17,825,187 UART: [afmc] CDI.KEYID = 6
17,826,149 UART: [afmc] SUBJECT.KEYID = 7
17,827,372 UART: [afmc] AUTHORITY.KEYID = 5
21,142,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,132 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,381 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,767 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,627 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,051 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,217 UART: [afmc] --
23,510,735 UART: [cold-reset] --
23,514,337 UART: [state] Locking Datavault
23,519,641 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,400 UART: [state] Locking ICCM
23,522,791 UART: [exit] Launching FMC @ 0x40000130
23,531,134 UART:
23,531,376 UART: Running Caliptra FMC ...
23,532,498 UART:
23,532,660 UART: [state] CFI Enabled
23,540,815 UART: [fht] FMC Alias Private Key: 7
25,871,126 UART: [art] Extend RT PCRs Done
25,872,349 UART: [art] Lock RT PCRs Done
25,873,867 UART: [art] Populate DV Done
25,879,174 UART: [fht] FMC Alias Private Key: 7
25,880,662 UART: [art] Derive CDI
25,881,440 UART: [art] Store in in slot 0x4
25,923,817 UART: [art] Derive Key Pair
25,924,876 UART: [art] Store priv key in slot 0x5
29,167,306 UART: [art] Derive Key Pair - Done
29,180,123 UART: [art] Signing Cert with AUTHO
29,181,455 UART: RITY.KEYID = 7
31,460,688 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,188 UART: [art] PUB.X = C5B7E195809A6F97CB54032C84AF55D4E6D1357E6D7CB81C92EB0DABC00A6F02AF5B67EBE88DD0DCEEF0F06D5ECDF63D
31,469,459 UART: [art] PUB.Y = 2044AFA292C31CDCE0A3D527AF993F2F681619C9321153F5DC523747091ACD27E1EEB90750AC827F933A2EB70B1C282E
31,476,703 UART: [art] SIG.R = 52899286DDDDB77D140E3C6E930FB329842332D1230BC7586F8A3862FDCAF5042FE53808CC90A611F54259AA8174D6DD
31,484,050 UART: [art] SIG.S = 0AD6F7F0591FF83880DA57B342AC2C11A1FEF56756C2F3FCDDA16C6445683F03D8AE958A937143E5AE67A492F5203FE9
32,788,804 UART: Caliptra RT
32,789,511 UART: [state] CFI Enabled
32,906,843 UART: [rt] RT listening for mailbox commands...
32,909,170 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
32,940,666 UART: [rt]cmd =0x41545348, len=116
32,942,896 >>> mbox cmd response data (12 bytes)
35,067,406 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,167,997 UART:
35,168,378 UART: Running Caliptra ROM ...
35,169,497 UART:
35,169,660 UART: [state] CFI Enabled
35,182,611 UART: [state] LifecycleState = Unprovisioned
35,184,542 UART: [state] DebugLocked = No
35,187,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,192,405 UART: [kat] SHA2-256
35,362,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,372,618 UART: [kat] ++
35,373,101 UART: [kat] sha1
35,382,742 UART: [kat] SHA2-256
35,385,439 UART: [kat] SHA2-384
35,392,015 UART: [kat] SHA2-512-ACC
35,394,367 UART: [kat] ECC-384
37,677,620 UART: [kat] HMAC-384Kdf
37,689,471 UART: [kat] LMS
38,879,520 UART: [kat] --
38,884,153 UART: [update-reset] ++
42,591,453 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,594,585 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,852,460 >>> mbox cmd response: success
42,852,825 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,853,912 UART: [update-reset] Copying MAN_2 To MAN_1
42,876,345 UART: [update-reset Success] --
42,879,799 UART: [state] Locking Datavault
42,881,868 UART: [state] Locking PCR0, PCR1 and PCR31
42,883,568 UART: [state] Locking ICCM
42,885,367 UART: [exit] Launching FMC @ 0x40000130
42,893,768 UART:
42,894,002 UART: Running Caliptra FMC ...
42,895,111 UART:
42,895,271 UART: [state] CFI Enabled
42,939,718 UART: [art] Extend RT PCRs Done
42,940,914 UART: [art] Lock RT PCRs Done
42,942,562 UART: [art] Populate DV Done
42,948,019 UART: [fht] FMC Alias Private Key: 7
42,949,684 UART: [art] Derive CDI
42,950,503 UART: [art] Store in in slot 0x4
42,993,259 UART: [art] Derive Key Pair
42,994,257 UART: [art] Store priv key in slot 0x5
46,236,535 UART: [art] Derive Key Pair - Done
46,249,393 UART: [art] Signing Cert with AUTHO
46,250,698 UART: RITY.KEYID = 7
48,530,011 UART: [art] Erasing AUTHORITY.KEYID = 7
48,531,522 UART: [art] PUB.X = 0161E50F3E3D12F988B47CA2D8F40AC91519F341BF07FCA3F61367D6144855A7A4381712175352D2615399738393D4C5
48,538,774 UART: [art] PUB.Y = 50771A89952D05DDC646EDA8626C0CD56F5EE5E5E65400281BA432B799797028E88E9BE95115C043AF64CB3F6C4B27D1
48,545,969 UART: [art] SIG.R = 366E1287DAD4A993746A932D9A5D7802D03324F409C59287FCC2EA584C39D30F49CDE76A81E4EAB1F90B3B1D4789E815
48,553,381 UART: [art] SIG.S = 6908CD511A8DA11ED30253D8C256B8A840C7478A2554EC611D74B622F549763455834255C5B447FE65ADD1AFCEF28CF7
49,858,003 UART: mbox::rt_entry...
49,858,996 UART: ____ _ _ _ ____ _____
49,860,980 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,862,987 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,864,917 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,866,847 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,868,776 UART: |_|
49,869,590 UART:
50,153,048 UART: [rt] Runtime listening for mailbox commands...
50,155,216 >>> mbox cmd response data (48 bytes)
50,155,792 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,158,106 >>> mbox cmd response data (48 bytes)
50,158,965 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,171,505 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,124,996 ready_for_fw is high
4,125,384 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,060,514 >>> mbox cmd response: success
23,712,397 UART:
23,712,837 UART: Running Caliptra FMC ...
23,713,953 UART:
23,714,108 UART: [state] CFI Enabled
23,722,235 UART: [fht] FMC Alias Private Key: 7
26,052,888 UART: [art] Extend RT PCRs Done
26,054,115 UART: [art] Lock RT PCRs Done
26,055,969 UART: [art] Populate DV Done
26,061,202 UART: [fht] FMC Alias Private Key: 7
26,062,858 UART: [art] Derive CDI
26,063,621 UART: [art] Store in in slot 0x4
26,105,964 UART: [art] Derive Key Pair
26,107,004 UART: [art] Store priv key in slot 0x5
29,348,510 UART: [art] Derive Key Pair - Done
29,361,673 UART: [art] Signing Cert with AUTHO
29,362,983 UART: RITY.KEYID = 7
31,642,458 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,986 UART: [art] PUB.X = E818E0CA411F9B26012CF05B2E06D167BBC792F5590CBF6115B564888AECF82AFB9A58DC19E18538268A7057EC975F73
31,651,269 UART: [art] PUB.Y = EA74DCDA76EB57BB18B4D8C901A8E13634371EEA1EEA380E9890260B89A55D829E03B8BF5362891EEA34AA77080D21E7
31,658,465 UART: [art] SIG.R = 3144954CA22708F800CBBC819EC479772998B246152C3FC689CA80B9B4F23C1103DC44E33DFE3F546B3E005EB99C3BB4
31,665,808 UART: [art] SIG.S = 0210A29AFB8C6E3414FB25DD5D16EBD543AA168D24B14F9BA90BB799C483760C66B2560F74E75F29DE6E1B3D30CF8EC5
32,970,859 UART: Caliptra RT
32,971,573 UART: [state] CFI Enabled
33,089,209 UART: [rt] RT listening for mailbox commands...
33,091,534 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,123,038 UART: [rt]cmd =0x41545348, len=116
33,125,407 >>> mbox cmd response data (12 bytes)
35,249,722 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,138,579 >>> mbox cmd response: success
43,139,072 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,173,719 UART:
43,174,007 UART: Running Caliptra FMC ...
43,175,053 UART:
43,175,207 UART: [state] CFI Enabled
43,219,347 UART: [art] Extend RT PCRs Done
43,220,535 UART: [art] Lock RT PCRs Done
43,222,066 UART: [art] Populate DV Done
43,227,540 UART: [fht] FMC Alias Private Key: 7
43,229,185 UART: [art] Derive CDI
43,229,932 UART: [art] Store in in slot 0x4
43,272,527 UART: [art] Derive Key Pair
43,273,530 UART: [art] Store priv key in slot 0x5
46,516,071 UART: [art] Derive Key Pair - Done
46,528,966 UART: [art] Signing Cert with AUTHO
46,530,265 UART: RITY.KEYID = 7
48,809,472 UART: [art] Erasing AUTHORITY.KEYID = 7
48,810,978 UART: [art] PUB.X = 092D8AB1CF586F482AA7DEBD6196674C546392195305FD7765E9B57DA6A947513141A46024122995F83538B273E82228
48,818,207 UART: [art] PUB.Y = E7BCEFA98CBD61796E417BB1AC1E3E1EBD4DD16CF26F73B230F36AE2DF6DC37BC922BF24011100773F9B4D4FAA54D26A
48,825,418 UART: [art] SIG.R = 10F9FE2432884CA6D4B13637F8A5605085FE97924E1179BFF1B35041FCD1FF01DCAAF68763103D3AEBDA809EC76CA436
48,832,812 UART: [art] SIG.S = CC2291616D14D034BCFF7625BD52B2D0646D2CEC386D38849DBB34ACFF0B89E4CD980EF927CD432177A97D63884C0EA9
50,137,911 UART: mbox::rt_entry...
50,138,877 UART: ____ _ _ _ ____ _____
50,140,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,142,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,144,688 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,146,620 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,148,555 UART: |_|
50,149,365 UART:
50,433,567 UART: [rt] Runtime listening for mailbox commands...
50,435,750 >>> mbox cmd response data (48 bytes)
50,436,331 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,438,673 >>> mbox cmd response data (48 bytes)
50,439,535 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,452,082 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,177 UART:
192,537 UART: Running Caliptra ROM ...
193,727 UART:
193,882 UART: [state] CFI Enabled
264,866 UART: [state] LifecycleState = Unprovisioned
266,769 UART: [state] DebugLocked = No
269,216 UART: [state] WD Timer not started. Device not locked for debugging
272,974 UART: [kat] SHA2-256
452,075 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,610 UART: [kat] ++
464,140 UART: [kat] sha1
474,524 UART: [kat] SHA2-256
477,571 UART: [kat] SHA2-384
485,130 UART: [kat] SHA2-512-ACC
488,072 UART: [kat] ECC-384
2,947,781 UART: [kat] HMAC-384Kdf
2,971,983 UART: [kat] LMS
3,501,417 UART: [kat] --
3,507,476 UART: [cold-reset] ++
3,509,762 UART: [fht] FHT @ 0x50003400
3,520,934 UART: [idev] ++
3,521,504 UART: [idev] CDI.KEYID = 6
3,522,484 UART: [idev] SUBJECT.KEYID = 7
3,523,654 UART: [idev] UDS.KEYID = 0
3,524,579 ready_for_fw is high
3,524,793 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,301 UART: [idev] Erasing UDS.KEYID = 0
6,027,659 UART: [idev] Sha1 KeyId Algorithm
6,050,031 UART: [idev] --
6,053,983 UART: [ldev] ++
6,054,565 UART: [ldev] CDI.KEYID = 6
6,055,471 UART: [ldev] SUBJECT.KEYID = 5
6,056,637 UART: [ldev] AUTHORITY.KEYID = 7
6,057,877 UART: [ldev] FE.KEYID = 1
6,099,133 UART: [ldev] Erasing FE.KEYID = 1
8,603,965 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,555 UART: [ldev] --
10,411,584 UART: [fwproc] Wait for Commands...
10,414,059 UART: [fwproc] Recv command 0x46574c44
10,416,101 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,902 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,272 >>> mbox cmd response: success
14,284,853 UART: [afmc] ++
14,285,445 UART: [afmc] CDI.KEYID = 6
14,286,335 UART: [afmc] SUBJECT.KEYID = 7
14,287,550 UART: [afmc] AUTHORITY.KEYID = 5
16,826,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,202 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,993 UART: [afmc] --
18,628,912 UART: [cold-reset] --
18,632,246 UART: [state] Locking Datavault
18,637,210 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,864 UART: [state] Locking ICCM
18,640,039 UART: [exit] Launching FMC @ 0x40000130
18,648,442 UART:
18,648,675 UART: Running Caliptra FMC ...
18,649,703 UART:
18,649,852 UART: [state] CFI Enabled
18,711,291 UART: [fht] FMC Alias Private Key: 7
20,474,894 UART: [art] Extend RT PCRs Done
20,476,097 UART: [art] Lock RT PCRs Done
20,477,859 UART: [art] Populate DV Done
20,483,435 UART: [fht] FMC Alias Private Key: 7
20,485,024 UART: [art] Derive CDI
20,485,764 UART: [art] Store in in slot 0x4
20,543,333 UART: [art] Derive Key Pair
20,544,328 UART: [art] Store priv key in slot 0x5
23,007,778 UART: [art] Derive Key Pair - Done
23,020,890 UART: [art] Signing Cert with AUTHO
23,022,212 UART: RITY.KEYID = 7
24,732,658 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,160 UART: [art] PUB.X = CFD384287C01D34FFAA1D364D3590A87B7BDFAFAC62653FD9C9ACF69AC3DE3AE5AB53D9EF22B36DFD51274A39039881A
24,741,467 UART: [art] PUB.Y = 8FC3CBAFF5E21369D43DDAFCF1EAA74C96F4BE85D630B9258FEBA34109427C97DF75197FCE83723568399F39BDDDDF6D
24,748,762 UART: [art] SIG.R = 33C312F5681B054417421B2F1A45CF75A770296BF240CFD5522654CB838ECBE26513BCB6B026E736B90A8CF29FF73ABD
24,756,133 UART: [art] SIG.S = 6E56AE597BF3F42FC0DBF40A7EE30A20E99CE69C18D981535F5C424312E1A44A2636840B5DB91BB70A72F478839EE548
25,735,224 UART: Caliptra RT
25,735,929 UART: [state] CFI Enabled
25,900,714 UART: [rt] RT listening for mailbox commands...
25,902,827 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,933,944 UART: [rt]cmd =0x41545348, len=116
25,936,188 >>> mbox cmd response data (12 bytes)
27,986,568 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,087,297 UART:
28,087,700 UART: Running Caliptra ROM ...
28,088,833 UART:
28,089,011 UART: [state] CFI Enabled
28,163,456 UART: [state] LifecycleState = Unprovisioned
28,165,337 UART: [state] DebugLocked = No
28,167,859 UART: [state] WD Timer not started. Device not locked for debugging
28,171,660 UART: [kat] SHA2-256
28,350,798 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,362,383 UART: [kat] ++
28,362,935 UART: [kat] sha1
28,373,990 UART: [kat] SHA2-256
28,377,009 UART: [kat] SHA2-384
28,383,271 UART: [kat] SHA2-512-ACC
28,386,212 UART: [kat] ECC-384
30,848,818 UART: [kat] HMAC-384Kdf
30,871,809 UART: [kat] LMS
31,401,241 UART: [kat] --
31,405,737 UART: [update-reset] ++
34,390,372 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,393,388 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,650,962 >>> mbox cmd response: success
34,651,330 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,652,218 UART: [update-reset] Copying MAN_2 To MAN_1
34,674,540 UART: [update-reset Success] --
34,678,018 UART: [state] Locking Datavault
34,681,054 UART: [state] Locking PCR0, PCR1 and PCR31
34,682,753 UART: [state] Locking ICCM
34,684,254 UART: [exit] Launching FMC @ 0x40000130
34,692,717 UART:
34,692,949 UART: Running Caliptra FMC ...
34,694,066 UART:
34,694,236 UART: [state] CFI Enabled
34,787,731 UART: [art] Extend RT PCRs Done
34,788,913 UART: [art] Lock RT PCRs Done
34,790,329 UART: [art] Populate DV Done
34,795,645 UART: [fht] FMC Alias Private Key: 7
34,797,243 UART: [art] Derive CDI
34,798,061 UART: [art] Store in in slot 0x4
34,856,647 UART: [art] Derive Key Pair
34,857,647 UART: [art] Store priv key in slot 0x5
37,320,972 UART: [art] Derive Key Pair - Done
37,334,091 UART: [art] Signing Cert with AUTHO
37,335,405 UART: RITY.KEYID = 7
39,046,806 UART: [art] Erasing AUTHORITY.KEYID = 7
39,048,292 UART: [art] PUB.X = 38E60EBFE6AC99FB468E059E2130E49261B3729626C852AA6E894D969705DF00D4FBB575C9AA115C9CF934F4775C2C6D
39,055,611 UART: [art] PUB.Y = 668D46E68D402C95B310FA67F1178737EE185E14FF107121CD0D15E05B39EB38938D16F9F5DD2E52CD7EDA3F72C76FFE
39,062,883 UART: [art] SIG.R = 6C2B87B87BE6806DBE2548C3C08B20053C83E5BD7F830C9D4BB57126B929E53D45CCC8D207D52357D2ED699791CFE8A8
39,070,256 UART: [art] SIG.S = 4EF1E06C6FAA30C45C2A412B78833BED31867F1A2AC47D0E0A701D6C449BAA865B93B1FEEC37AC54336C77B781365F41
40,048,615 UART: mbox::rt_entry...
40,049,587 UART: ____ _ _ _ ____ _____
40,051,523 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,053,531 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,055,392 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,057,319 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,059,204 UART: |_|
40,060,088 UART:
40,346,733 UART: [rt] Runtime listening for mailbox commands...
40,348,908 >>> mbox cmd response data (48 bytes)
40,349,510 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,351,833 >>> mbox cmd response data (48 bytes)
40,352,684 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,365,231 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
3,359,462 ready_for_fw is high
3,359,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,043,447 >>> mbox cmd response: success
18,342,110 UART:
18,342,532 UART: Running Caliptra FMC ...
18,343,628 UART:
18,343,784 UART: [state] CFI Enabled
18,408,339 UART: [fht] FMC Alias Private Key: 7
20,171,924 UART: [art] Extend RT PCRs Done
20,173,143 UART: [art] Lock RT PCRs Done
20,174,806 UART: [art] Populate DV Done
20,180,003 UART: [fht] FMC Alias Private Key: 7
20,181,709 UART: [art] Derive CDI
20,182,449 UART: [art] Store in in slot 0x4
20,240,475 UART: [art] Derive Key Pair
20,241,513 UART: [art] Store priv key in slot 0x5
22,703,940 UART: [art] Derive Key Pair - Done
22,716,781 UART: [art] Signing Cert with AUTHO
22,718,090 UART: RITY.KEYID = 7
24,429,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,431,146 UART: [art] PUB.X = ABED9A88DB002DDE4C9219ADDC9839BA283B5FBB8838FF7764EFC7A8269DB74407ECE9D5915DDE05CB6D29218B5FB8C1
24,438,393 UART: [art] PUB.Y = 30FFDDF8CFF2DA4745C970054B43CA333AB5E7061343E981210673E2FB6D7172B281EF476D17A470F657FCB70ADB04DE
24,445,637 UART: [art] SIG.R = D843A13D6E725DB9C95E98436815F9ECA3378704E0D68A70B6AF1503CE56CE29D5CD71AA317EB0F0C9648024EB3417C6
24,453,020 UART: [art] SIG.S = 9951461CF0104F5EA93864D5738A83B962C69E7746CE92B015AAB10BB8659CB754D3CC89D1FA4DE9D1967303E8BAA7A9
25,432,104 UART: Caliptra RT
25,432,808 UART: [state] CFI Enabled
25,596,310 UART: [rt] RT listening for mailbox commands...
25,598,583 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,629,624 UART: [rt]cmd =0x41545348, len=116
25,631,849 >>> mbox cmd response data (12 bytes)
27,682,695 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,197,194 >>> mbox cmd response: success
34,197,726 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,232,160 UART:
34,232,481 UART: Running Caliptra FMC ...
34,233,606 UART:
34,233,776 UART: [state] CFI Enabled
34,331,567 UART: [art] Extend RT PCRs Done
34,332,746 UART: [art] Lock RT PCRs Done
34,334,255 UART: [art] Populate DV Done
34,339,722 UART: [fht] FMC Alias Private Key: 7
34,341,200 UART: [art] Derive CDI
34,341,969 UART: [art] Store in in slot 0x4
34,400,672 UART: [art] Derive Key Pair
34,401,711 UART: [art] Store priv key in slot 0x5
36,864,474 UART: [art] Derive Key Pair - Done
36,876,990 UART: [art] Signing Cert with AUTHO
36,878,303 UART: RITY.KEYID = 7
38,591,526 UART: [art] Erasing AUTHORITY.KEYID = 7
38,593,022 UART: [art] PUB.X = B131B59FC9FFC7047C8B5EADCA4EDF00D9C27E84E8391F95696691EBA68DE51374A06B4CE5CEDCAC6FF0E00C29DF5974
38,600,321 UART: [art] PUB.Y = 6730E3AA15F67FF67890C220D36FF0432C72A244E33CFFDD83DB6E1FFA9D38F0CB7D350A949F2629503E8C8BA91398CA
38,607,604 UART: [art] SIG.R = 055AF7FA41A421DAE1F5C2FCB1D5F789845484ABA0DE4E64B5DD03ED468A6C8D40C901563AE734C882F682F3EB11D8FF
38,614,995 UART: [art] SIG.S = 9ED7595FCBAB3917DF17A621F4146FBA53BD4DB8E23962662977D9A89B730F5BA7E0DE4F762D18845C4783D6E4BA23AF
39,593,352 UART: mbox::rt_entry...
39,594,311 UART: ____ _ _ _ ____ _____
39,596,299 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,598,315 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,600,246 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,602,175 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,604,102 UART: |_|
39,605,090 UART:
39,894,758 UART: [rt] Runtime listening for mailbox commands...
39,896,915 >>> mbox cmd response data (48 bytes)
39,897,494 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,899,836 >>> mbox cmd response data (48 bytes)
39,900,693 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,913,259 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,878 writing to cptra_bootfsm_go
193,021 UART:
193,383 UART: Running Caliptra ROM ...
194,516 UART:
604,212 UART: [state] CFI Enabled
617,395 UART: [state] LifecycleState = Unprovisioned
619,303 UART: [state] DebugLocked = No
621,902 UART: [state] WD Timer not started. Device not locked for debugging
625,307 UART: [kat] SHA2-256
804,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,968 UART: [kat] ++
816,516 UART: [kat] sha1
827,678 UART: [kat] SHA2-256
830,680 UART: [kat] SHA2-384
836,594 UART: [kat] SHA2-512-ACC
839,604 UART: [kat] ECC-384
3,281,287 UART: [kat] HMAC-384Kdf
3,294,951 UART: [kat] LMS
3,824,459 UART: [kat] --
3,827,831 UART: [cold-reset] ++
3,830,114 UART: [fht] FHT @ 0x50003400
3,841,588 UART: [idev] ++
3,842,152 UART: [idev] CDI.KEYID = 6
3,843,059 UART: [idev] SUBJECT.KEYID = 7
3,844,234 UART: [idev] UDS.KEYID = 0
3,845,283 ready_for_fw is high
3,845,492 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,896 UART: [idev] Erasing UDS.KEYID = 0
6,323,060 UART: [idev] Sha1 KeyId Algorithm
6,345,423 UART: [idev] --
6,349,687 UART: [ldev] ++
6,350,256 UART: [ldev] CDI.KEYID = 6
6,351,164 UART: [ldev] SUBJECT.KEYID = 5
6,352,319 UART: [ldev] AUTHORITY.KEYID = 7
6,353,601 UART: [ldev] FE.KEYID = 1
6,364,893 UART: [ldev] Erasing FE.KEYID = 1
8,838,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,073 UART: [ldev] --
10,630,972 UART: [fwproc] Wait for Commands...
10,632,658 UART: [fwproc] Recv command 0x46574c44
10,634,756 UART: [fwproc] Recv'd Img size: 114168 bytes
14,037,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,498,330 >>> mbox cmd response: success
14,502,849 UART: [afmc] ++
14,503,451 UART: [afmc] CDI.KEYID = 6
14,504,366 UART: [afmc] SUBJECT.KEYID = 7
14,505,528 UART: [afmc] AUTHORITY.KEYID = 5
17,006,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,717 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,247 UART: [afmc] --
18,803,275 UART: [cold-reset] --
18,806,324 UART: [state] Locking Datavault
18,811,842 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,489 UART: [state] Locking ICCM
18,814,832 UART: [exit] Launching FMC @ 0x40000130
18,823,285 UART:
18,823,517 UART: Running Caliptra FMC ...
18,824,618 UART:
18,824,780 UART: [state] CFI Enabled
18,833,206 UART: [fht] FMC Alias Private Key: 7
20,590,264 UART: [art] Extend RT PCRs Done
20,591,487 UART: [art] Lock RT PCRs Done
20,593,192 UART: [art] Populate DV Done
20,598,441 UART: [fht] FMC Alias Private Key: 7
20,600,033 UART: [art] Derive CDI
20,600,869 UART: [art] Store in in slot 0x4
20,643,464 UART: [art] Derive Key Pair
20,644,507 UART: [art] Store priv key in slot 0x5
23,071,878 UART: [art] Derive Key Pair - Done
23,085,138 UART: [art] Signing Cert with AUTHO
23,086,434 UART: RITY.KEYID = 7
24,792,025 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,531 UART: [art] PUB.X = D9D97EAB86FEEECEB3E952786B95EECCEDC70E21B116758646A6738677319CA974874C85F22DD5760EA95B5DEA45F642
24,800,778 UART: [art] PUB.Y = 3B02143DD363DF5C1380E704B389BD518106A7455E5269F6095E1EC5FBC24146D6B3A742DFC39C496B9BDC24168FF714
24,808,022 UART: [art] SIG.R = 59F7D474B4F886D276A0E506D1119C40CB3B58CDE6D757F2C3AAB1505C9956AAD80DC38143E2EF2B3581811D6AA40C20
24,815,425 UART: [art] SIG.S = 44EFA2F26063578193E8B1099866E3BFACC2A1B9B7E59FD50E0EDA8545E0F0EC204868A53C46466C995900470B06D349
25,794,613 UART: Caliptra RT
25,795,315 UART: [state] CFI Enabled
25,911,896 UART: [rt] RT listening for mailbox commands...
25,914,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,945,507 UART: [rt]cmd =0x41545348, len=116
25,947,846 >>> mbox cmd response data (12 bytes)
28,005,927 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,106,759 UART:
28,107,110 UART: Running Caliptra ROM ...
28,108,159 UART:
28,108,311 UART: [state] CFI Enabled
28,122,696 UART: [state] LifecycleState = Unprovisioned
28,124,534 UART: [state] DebugLocked = No
28,127,239 UART: [state] WD Timer not started. Device not locked for debugging
28,130,378 UART: [kat] SHA2-256
28,309,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,321,153 UART: [kat] ++
28,321,629 UART: [kat] sha1
28,333,382 UART: [kat] SHA2-256
28,336,406 UART: [kat] SHA2-384
28,342,776 UART: [kat] SHA2-512-ACC
28,345,714 UART: [kat] ECC-384
30,787,146 UART: [kat] HMAC-384Kdf
30,800,217 UART: [kat] LMS
31,329,721 UART: [kat] --
31,334,407 UART: [update-reset] ++
34,323,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,326,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,584,376 >>> mbox cmd response: success
34,584,735 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,585,128 UART: [update-reset] Copying MAN_2 To MAN_1
34,607,464 UART: [update-reset Success] --
34,610,611 UART: [state] Locking Datavault
34,613,011 UART: [state] Locking PCR0, PCR1 and PCR31
34,614,701 UART: [state] Locking ICCM
34,616,702 UART: [exit] Launching FMC @ 0x40000130
34,625,152 UART:
34,625,398 UART: Running Caliptra FMC ...
34,626,498 UART:
34,626,655 UART: [state] CFI Enabled
34,671,204 UART: [art] Extend RT PCRs Done
34,672,350 UART: [art] Lock RT PCRs Done
34,673,908 UART: [art] Populate DV Done
34,679,150 UART: [fht] FMC Alias Private Key: 7
34,680,683 UART: [art] Derive CDI
34,681,493 UART: [art] Store in in slot 0x4
34,724,206 UART: [art] Derive Key Pair
34,725,272 UART: [art] Store priv key in slot 0x5
37,151,638 UART: [art] Derive Key Pair - Done
37,164,709 UART: [art] Signing Cert with AUTHO
37,166,018 UART: RITY.KEYID = 7
38,871,295 UART: [art] Erasing AUTHORITY.KEYID = 7
38,872,808 UART: [art] PUB.X = D888AE9C2C6DE3179F83AAEB7E0FE210641566C6B4A08B15699C7CD1199920F5110C89CD8A323114A258EEC18F5D8300
38,880,070 UART: [art] PUB.Y = 6A06C9E54C7934F8CED4821C4DD193A8288EEC14261C00084EB66EAFC29752275AF57C6239A688E4F13CA58B67075143
38,887,314 UART: [art] SIG.R = 5E695F8CA1BF00AE8636D9A23695B327ED7F1638DE70FCF966F0C794EA1B41C2D23D1A153A1E6220ADEE3A9F9AD2CBB6
38,894,653 UART: [art] SIG.S = 65336C56CDE0330CF10FC81C12DA46BCA2154F889BC64AB71C481AA0AB1B06E22FA878BB6241B197448D529EB2F390D7
39,872,881 UART: mbox::rt_entry...
39,873,837 UART: ____ _ _ _ ____ _____
39,875,763 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,877,767 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,879,627 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,881,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,883,404 UART: |_|
39,884,233 UART:
40,169,142 UART: [rt] Runtime listening for mailbox commands...
40,171,327 >>> mbox cmd response data (48 bytes)
40,171,904 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,174,229 >>> mbox cmd response data (48 bytes)
40,175,101 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,187,651 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,875 writing to cptra_bootfsm_go
3,698,456 ready_for_fw is high
3,698,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,419 >>> mbox cmd response: success
18,512,037 UART:
18,512,436 UART: Running Caliptra FMC ...
18,513,566 UART:
18,513,731 UART: [state] CFI Enabled
18,521,347 UART: [fht] FMC Alias Private Key: 7
20,278,418 UART: [art] Extend RT PCRs Done
20,279,637 UART: [art] Lock RT PCRs Done
20,281,157 UART: [art] Populate DV Done
20,286,730 UART: [fht] FMC Alias Private Key: 7
20,288,432 UART: [art] Derive CDI
20,289,254 UART: [art] Store in in slot 0x4
20,331,542 UART: [art] Derive Key Pair
20,332,587 UART: [art] Store priv key in slot 0x5
22,759,477 UART: [art] Derive Key Pair - Done
22,772,492 UART: [art] Signing Cert with AUTHO
22,773,806 UART: RITY.KEYID = 7
24,479,313 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,811 UART: [art] PUB.X = 0BDEC8DBFABB6BDB8E9F19DF84F341ED1F24B4FADCEA112461CCE1C899CF1F742738FBA0876B2A1E237763C1D817FCF9
24,488,114 UART: [art] PUB.Y = 81832A043017628D7FE3C1C55809DB63C8BD821EFDE8324D726FF9DCA566D23B223EFAF410CBD97BF3177EFAE1BC7D63
24,495,374 UART: [art] SIG.R = F7A94CC84ACF8139DA2AB813B72E2116A53CF0FF4B5EFE347367A0756E13685639DCEDB0DBAB0094F3AAB68F6902EDB1
24,502,774 UART: [art] SIG.S = 03CC7F784BD35512F024B18F268426AA216B7FD166C4CE58E41E2BED78271DC7BAAAFE5BD947172225881C31E5C229BE
25,481,981 UART: Caliptra RT
25,482,697 UART: [state] CFI Enabled
25,599,823 UART: [rt] RT listening for mailbox commands...
25,602,181 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,633,520 UART: [rt]cmd =0x41545348, len=116
25,635,677 >>> mbox cmd response data (12 bytes)
27,686,358 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,114,456 >>> mbox cmd response: success
34,114,925 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,149,682 UART:
34,150,003 UART: Running Caliptra FMC ...
34,151,050 UART:
34,151,206 UART: [state] CFI Enabled
34,195,504 UART: [art] Extend RT PCRs Done
34,196,651 UART: [art] Lock RT PCRs Done
34,198,177 UART: [art] Populate DV Done
34,203,751 UART: [fht] FMC Alias Private Key: 7
34,205,234 UART: [art] Derive CDI
34,205,971 UART: [art] Store in in slot 0x4
34,248,294 UART: [art] Derive Key Pair
34,249,333 UART: [art] Store priv key in slot 0x5
36,676,170 UART: [art] Derive Key Pair - Done
36,689,065 UART: [art] Signing Cert with AUTHO
36,690,368 UART: RITY.KEYID = 7
38,395,514 UART: [art] Erasing AUTHORITY.KEYID = 7
38,397,020 UART: [art] PUB.X = 7CBC4655A4061A4AD32F231FEFCC8FE321E5F4096F51CECD84FCAB07C718322E9C225EF48E7CB63C47E644686867C291
38,404,322 UART: [art] PUB.Y = 296A7E2485C12F93BE9B65F401858CE32B1E1D66DA5CC636672DAFE7D423938EC667E0A6D52930F77C02669BFB4E440E
38,411,553 UART: [art] SIG.R = 4BFE37F86BC1D7EF9624AECB5AB298B90E5EE521EACFAC429E0D3D1BEA776F400EAA7923819101D5B67D618331609F3B
38,419,004 UART: [art] SIG.S = 52EE898ABC09F63F2FB4ABE99EFB93F436416AF1D452BAAB0A92FB12A3FA075A70830E8C42DD62D3864B397C46D645E5
39,397,041 UART: mbox::rt_entry...
39,397,977 UART: ____ _ _ _ ____ _____
39,399,956 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,401,968 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,403,900 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,405,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,407,693 UART: |_|
39,408,522 UART:
39,694,045 UART: [rt] Runtime listening for mailbox commands...
39,696,206 >>> mbox cmd response data (48 bytes)
39,696,764 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,699,082 >>> mbox cmd response data (48 bytes)
39,699,946 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,712,540 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,277 UART:
192,649 UART: Running Caliptra ROM ...
193,789 UART:
193,939 UART: [state] CFI Enabled
264,864 UART: [state] LifecycleState = Unprovisioned
267,312 UART: [state] DebugLocked = No
268,644 UART: [state] WD Timer not started. Device not locked for debugging
273,061 UART: [kat] SHA2-256
462,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,660 UART: [kat] ++
474,162 UART: [kat] sha1
486,267 UART: [kat] SHA2-256
489,284 UART: [kat] SHA2-384
496,068 UART: [kat] SHA2-512-ACC
498,656 UART: [kat] ECC-384
2,946,249 UART: [kat] HMAC-384Kdf
2,971,704 UART: [kat] LMS
3,503,426 UART: [kat] --
3,508,654 UART: [cold-reset] ++
3,509,880 UART: [fht] FHT @ 0x50003400
3,521,355 UART: [idev] ++
3,522,068 UART: [idev] CDI.KEYID = 6
3,523,052 UART: [idev] SUBJECT.KEYID = 7
3,524,223 UART: [idev] UDS.KEYID = 0
3,525,154 ready_for_fw is high
3,525,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,929 UART: [idev] Erasing UDS.KEYID = 0
6,031,260 UART: [idev] Sha1 KeyId Algorithm
6,054,011 UART: [idev] --
6,058,552 UART: [ldev] ++
6,059,243 UART: [ldev] CDI.KEYID = 6
6,060,157 UART: [ldev] SUBJECT.KEYID = 5
6,061,374 UART: [ldev] AUTHORITY.KEYID = 7
6,062,556 UART: [ldev] FE.KEYID = 1
6,100,210 UART: [ldev] Erasing FE.KEYID = 1
8,605,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,261 UART: [ldev] --
10,413,487 UART: [fwproc] Wait for Commands...
10,415,644 UART: [fwproc] Recv command 0x46574c44
10,417,973 UART: [fwproc] Recv'd Img size: 114168 bytes
13,868,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,603,735 >>> mbox cmd response: success
14,607,041 UART: [afmc] ++
14,607,753 UART: [afmc] CDI.KEYID = 6
14,608,923 UART: [afmc] SUBJECT.KEYID = 7
14,610,422 UART: [afmc] AUTHORITY.KEYID = 5
17,148,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,590 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,749 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,898 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,871 UART: [afmc] --
18,967,053 UART: [cold-reset] --
18,970,220 UART: [state] Locking Datavault
18,976,952 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,121 UART: [state] Locking ICCM
18,982,140 UART: [exit] Launching FMC @ 0x40000130
18,990,780 UART:
18,991,011 UART: Running Caliptra FMC ...
18,992,115 UART:
18,992,275 UART: [state] CFI Enabled
19,047,941 UART: [fht] FMC Alias Private Key: 7
20,812,026 UART: [art] Extend RT PCRs Done
20,813,251 UART: [art] Lock RT PCRs Done
20,814,931 UART: [art] Populate DV Done
20,820,343 UART: [fht] FMC Alias Private Key: 7
20,821,993 UART: [art] Derive CDI
20,822,811 UART: [art] Store in in slot 0x4
20,881,547 UART: [art] Derive Key Pair
20,882,550 UART: [art] Store priv key in slot 0x5
23,345,537 UART: [art] Derive Key Pair - Done
23,358,807 UART: [art] Signing Cert with AUTHO
23,360,116 UART: RITY.KEYID = 7
25,071,643 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,158 UART: [art] PUB.X = F6F998E8293C96FCAB40642CFA51A39A9A9BD61104D7584CF77776F045656C4F37E1E84D93A8981F5A5B9143FBC8ADD6
25,080,432 UART: [art] PUB.Y = 1AA2CD06EF188EB0010130E76A436BBACB7618FAE0EF7E6C9EEB2CD3921068C5F8EB2A4B6CE729B9CE5B17D9C93AE13B
25,087,745 UART: [art] SIG.R = 864262965A3B284186E04641F1C8E56E6D440D39E0F577CFAAB2C79A98B51C0A95F7DB2B74312FFA0D6C74EBA551266B
25,095,121 UART: [art] SIG.S = 98EE1750C798128C588F777C16F3BBE9838599976DC77465B649B178FB0362CE61F2EE1890124619CBE66B3791E5CA67
26,073,501 UART: Caliptra RT
26,074,213 UART: [state] CFI Enabled
26,239,832 UART: [rt] RT listening for mailbox commands...
26,242,096 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,273,456 UART: [rt]cmd =0x41545348, len=116
26,275,643 >>> mbox cmd response data (12 bytes)
28,325,584 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,426,013 UART:
28,426,382 UART: Running Caliptra ROM ...
28,427,438 UART:
28,427,593 UART: [state] CFI Enabled
28,503,934 UART: [state] LifecycleState = Unprovisioned
28,506,036 UART: [state] DebugLocked = No
28,508,649 UART: [state] WD Timer not started. Device not locked for debugging
28,512,416 UART: [kat] SHA2-256
28,702,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,713,075 UART: [kat] ++
28,713,533 UART: [kat] sha1
28,725,710 UART: [kat] SHA2-256
28,728,721 UART: [kat] SHA2-384
28,733,858 UART: [kat] SHA2-512-ACC
28,736,433 UART: [kat] ECC-384
31,187,490 UART: [kat] HMAC-384Kdf
31,211,923 UART: [kat] LMS
31,743,465 UART: [kat] --
31,747,181 UART: [update-reset] ++
34,760,851 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,764,948 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,157,736 >>> mbox cmd response: success
35,158,113 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,158,937 UART: [update-reset] Copying MAN_2 To MAN_1
35,196,510 UART: [update-reset Success] --
35,200,852 UART: [state] Locking Datavault
35,204,060 UART: [state] Locking PCR0, PCR1 and PCR31
35,206,456 UART: [state] Locking ICCM
35,209,153 UART: [exit] Launching FMC @ 0x40000130
35,217,793 UART:
35,218,032 UART: Running Caliptra FMC ...
35,219,077 UART:
35,219,227 UART: [state] CFI Enabled
35,318,434 UART: [art] Extend RT PCRs Done
35,319,616 UART: [art] Lock RT PCRs Done
35,321,262 UART: [art] Populate DV Done
35,326,611 UART: [fht] FMC Alias Private Key: 7
35,328,147 UART: [art] Derive CDI
35,328,960 UART: [art] Store in in slot 0x4
35,387,322 UART: [art] Derive Key Pair
35,388,415 UART: [art] Store priv key in slot 0x5
37,851,163 UART: [art] Derive Key Pair - Done
37,864,326 UART: [art] Signing Cert with AUTHO
37,865,651 UART: RITY.KEYID = 7
39,576,643 UART: [art] Erasing AUTHORITY.KEYID = 7
39,578,146 UART: [art] PUB.X = EB0052AA994A26B05D79B29AC6DCB89A343FE9A11B00B96C59C6BFE72DE1A965CD7285FDEAB66FEF362F8E938BF6F649
39,585,356 UART: [art] PUB.Y = C8D546FA7F2A768A05827DD8790C0ED715920D0117288F1AE5CDE0EBCA271CFEB84670737530840951AFC083C679A635
39,592,608 UART: [art] SIG.R = 3BD1395B06AEB92098BCF75E1819CF5337FD65246D1BBDF3BE24B606E51D7B0D560A9E16F525F5169A2C4CA43CA102F5
39,600,025 UART: [art] SIG.S = 9FCBB784D7B165E7A69BEAC04BF7086658DCFEA8AB7F6BDEAD5B9E9C547B611A6A29D87AA918BE1C2A7CA2A9A1B06679
40,578,560 UART: mbox::rt_entry...
40,579,526 UART: ____ _ _ _ ____ _____
40,581,459 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,583,464 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,585,324 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,587,244 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,589,122 UART: |_|
40,589,950 UART:
40,875,371 UART: [rt] Runtime listening for mailbox commands...
40,877,492 >>> mbox cmd response data (48 bytes)
40,878,106 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,880,419 >>> mbox cmd response data (48 bytes)
40,881,292 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,893,840 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,438,992 ready_for_fw is high
3,439,355 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,757,969 >>> mbox cmd response: success
19,043,795 UART:
19,044,189 UART: Running Caliptra FMC ...
19,045,308 UART:
19,045,468 UART: [state] CFI Enabled
19,110,233 UART: [fht] FMC Alias Private Key: 7
20,874,206 UART: [art] Extend RT PCRs Done
20,875,441 UART: [art] Lock RT PCRs Done
20,877,007 UART: [art] Populate DV Done
20,882,283 UART: [fht] FMC Alias Private Key: 7
20,883,941 UART: [art] Derive CDI
20,884,753 UART: [art] Store in in slot 0x4
20,942,006 UART: [art] Derive Key Pair
20,943,035 UART: [art] Store priv key in slot 0x5
23,405,778 UART: [art] Derive Key Pair - Done
23,418,945 UART: [art] Signing Cert with AUTHO
23,420,257 UART: RITY.KEYID = 7
25,131,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,697 UART: [art] PUB.X = C4C33AEB45FE7723FACC1ABAE105842728ABDEA96104ADA473B5B3858C20F1D204B2A945411B39AA3FB4304B516B348B
25,139,989 UART: [art] PUB.Y = F8151D6B8201690D31E1939A7962B99D7E49CF00A1B825A5521EC304D7B1E2B4F61C5C63F4610D9C225F115FF5E20A81
25,147,201 UART: [art] SIG.R = FC8A542D835CA44398800AA3185B923A6D032F83AD424B7836B5E1DB929EB51C78BB2FEC1DE7EA5A7065BB7C1CAA2AF9
25,154,590 UART: [art] SIG.S = 8C3B5C2E74C54695D4593BA8DC3271C190C4355ACC2DDA83FC4DB8190411284E608DDB836B8787A3F0CAAE86FD178105
26,133,472 UART: Caliptra RT
26,134,160 UART: [state] CFI Enabled
26,298,760 UART: [rt] RT listening for mailbox commands...
26,301,198 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,332,480 UART: [rt]cmd =0x41545348, len=116
26,334,832 >>> mbox cmd response data (12 bytes)
28,389,304 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,405,065 >>> mbox cmd response: success
35,405,592 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,440,684 UART:
35,441,015 UART: Running Caliptra FMC ...
35,442,146 UART:
35,442,309 UART: [state] CFI Enabled
35,545,426 UART: [art] Extend RT PCRs Done
35,546,612 UART: [art] Lock RT PCRs Done
35,548,061 UART: [art] Populate DV Done
35,553,371 UART: [fht] FMC Alias Private Key: 7
35,555,079 UART: [art] Derive CDI
35,555,900 UART: [art] Store in in slot 0x4
35,614,942 UART: [art] Derive Key Pair
35,615,985 UART: [art] Store priv key in slot 0x5
38,078,797 UART: [art] Derive Key Pair - Done
38,091,744 UART: [art] Signing Cert with AUTHO
38,093,058 UART: RITY.KEYID = 7
39,804,101 UART: [art] Erasing AUTHORITY.KEYID = 7
39,805,603 UART: [art] PUB.X = 5D7F97F6BD300E3A25D663FEEF8996F9C53ABD043D34879DD700C56373EB1DC0BD2ACE2740EB910A5C3DD32DAE9A2C53
39,812,908 UART: [art] PUB.Y = A4CC1ED07A5284B11D2F34FFDF87159F97AE9B93479276EF31A81125A9DBE28A0960B63F86A40E9BC4823E782B0E1C43
39,820,129 UART: [art] SIG.R = 91B4AF813255682A96B78CFB894720FE78CBB69E300BF0EDECF56250A3A33418A4B93726CFAC16415BE9477C4BFAC134
39,827,518 UART: [art] SIG.S = DE6273E8D67502E995520A3DDB2BD4D009712AFB48FA7D951E722BCB2E07D65258A829671D9027EC4181B0B215781368
40,806,189 UART: mbox::rt_entry...
40,807,150 UART: ____ _ _ _ ____ _____
40,809,051 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,811,058 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,812,945 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,814,795 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,816,754 UART: |_|
40,817,562 UART:
41,102,985 UART: [rt] Runtime listening for mailbox commands...
41,105,111 >>> mbox cmd response data (48 bytes)
41,105,687 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,108,000 >>> mbox cmd response data (48 bytes)
41,108,875 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,121,438 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
192,877 UART:
193,243 UART: Running Caliptra ROM ...
194,373 UART:
604,026 UART: [state] CFI Enabled
618,701 UART: [state] LifecycleState = Unprovisioned
621,063 UART: [state] DebugLocked = No
624,007 UART: [state] WD Timer not started. Device not locked for debugging
628,413 UART: [kat] SHA2-256
818,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,027 UART: [kat] ++
829,636 UART: [kat] sha1
841,299 UART: [kat] SHA2-256
844,334 UART: [kat] SHA2-384
851,040 UART: [kat] SHA2-512-ACC
853,623 UART: [kat] ECC-384
3,295,813 UART: [kat] HMAC-384Kdf
3,308,118 UART: [kat] LMS
3,839,922 UART: [kat] --
3,844,782 UART: [cold-reset] ++
3,845,647 UART: [fht] FHT @ 0x50003400
3,857,336 UART: [idev] ++
3,858,048 UART: [idev] CDI.KEYID = 6
3,858,967 UART: [idev] SUBJECT.KEYID = 7
3,860,145 UART: [idev] UDS.KEYID = 0
3,861,050 ready_for_fw is high
3,861,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,763 UART: [idev] Erasing UDS.KEYID = 0
6,338,152 UART: [idev] Sha1 KeyId Algorithm
6,360,697 UART: [idev] --
6,365,068 UART: [ldev] ++
6,365,751 UART: [ldev] CDI.KEYID = 6
6,366,633 UART: [ldev] SUBJECT.KEYID = 5
6,367,845 UART: [ldev] AUTHORITY.KEYID = 7
6,369,077 UART: [ldev] FE.KEYID = 1
6,377,918 UART: [ldev] Erasing FE.KEYID = 1
8,857,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,308 UART: [ldev] --
10,645,259 UART: [fwproc] Wait for Commands...
10,646,923 UART: [fwproc] Recv command 0x46574c44
10,649,241 UART: [fwproc] Recv'd Img size: 114168 bytes
14,093,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,169,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,285,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,826,649 >>> mbox cmd response: success
14,829,844 UART: [afmc] ++
14,830,550 UART: [afmc] CDI.KEYID = 6
14,831,796 UART: [afmc] SUBJECT.KEYID = 7
14,833,227 UART: [afmc] AUTHORITY.KEYID = 5
17,334,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,053,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,055,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,070,930 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,086,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,101,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,123,891 UART: [afmc] --
19,127,389 UART: [cold-reset] --
19,130,413 UART: [state] Locking Datavault
19,135,772 UART: [state] Locking PCR0, PCR1 and PCR31
19,137,913 UART: [state] Locking ICCM
19,139,904 UART: [exit] Launching FMC @ 0x40000130
19,148,577 UART:
19,148,808 UART: Running Caliptra FMC ...
19,149,835 UART:
19,149,985 UART: [state] CFI Enabled
19,158,197 UART: [fht] FMC Alias Private Key: 7
20,915,278 UART: [art] Extend RT PCRs Done
20,916,506 UART: [art] Lock RT PCRs Done
20,918,288 UART: [art] Populate DV Done
20,923,819 UART: [fht] FMC Alias Private Key: 7
20,925,474 UART: [art] Derive CDI
20,926,289 UART: [art] Store in in slot 0x4
20,968,943 UART: [art] Derive Key Pair
20,970,003 UART: [art] Store priv key in slot 0x5
23,397,200 UART: [art] Derive Key Pair - Done
23,410,136 UART: [art] Signing Cert with AUTHO
23,411,440 UART: RITY.KEYID = 7
25,117,149 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,658 UART: [art] PUB.X = 84275A7528040BC5C082BCA38473A73EB0E01A75746CA828003D4ED061530CA8C8C396793EEC4FEDC64ED44481491770
25,125,902 UART: [art] PUB.Y = 4BA3F145FED032B4003C912776EDF122C21876BFA7CAD1778FDA7705E661590DF2EC672E6D1E4FCDF39C388A8488C33E
25,133,134 UART: [art] SIG.R = 1EAB5096B1D3F4A0F8A79728B86F7B450B2A3E2359F7648A165ACE7DE65CA82532F5EE5051E63A4995E5D1DA5FD1CEE7
25,140,535 UART: [art] SIG.S = 9BD08B0205D3E694782A09AB23A12F08B9C8AA905F81EA3024C095DC55BEE34A269A666234ECE4D538018AA06E692159
26,119,439 UART: Caliptra RT
26,120,122 UART: [state] CFI Enabled
26,237,793 UART: [rt] RT listening for mailbox commands...
26,240,167 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,271,288 UART: [rt]cmd =0x41545348, len=116
26,273,602 >>> mbox cmd response data (12 bytes)
28,324,625 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,425,259 UART:
28,425,627 UART: Running Caliptra ROM ...
28,426,722 UART:
28,426,886 UART: [state] CFI Enabled
28,441,201 UART: [state] LifecycleState = Unprovisioned
28,443,043 UART: [state] DebugLocked = No
28,446,024 UART: [state] WD Timer not started. Device not locked for debugging
28,449,888 UART: [kat] SHA2-256
28,639,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,650,515 UART: [kat] ++
28,651,026 UART: [kat] sha1
28,662,348 UART: [kat] SHA2-256
28,665,387 UART: [kat] SHA2-384
28,669,921 UART: [kat] SHA2-512-ACC
28,672,542 UART: [kat] ECC-384
31,112,471 UART: [kat] HMAC-384Kdf
31,126,124 UART: [kat] LMS
31,657,741 UART: [kat] --
31,661,297 UART: [update-reset] ++
34,684,989 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,688,690 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,081,431 >>> mbox cmd response: success
35,081,800 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,082,255 UART: [update-reset] Copying MAN_2 To MAN_1
35,119,819 UART: [update-reset Success] --
35,124,360 UART: [state] Locking Datavault
35,127,626 UART: [state] Locking PCR0, PCR1 and PCR31
35,129,772 UART: [state] Locking ICCM
35,131,947 UART: [exit] Launching FMC @ 0x40000130
35,140,627 UART:
35,140,863 UART: Running Caliptra FMC ...
35,141,967 UART:
35,142,127 UART: [state] CFI Enabled
35,185,820 UART: [art] Extend RT PCRs Done
35,186,962 UART: [art] Lock RT PCRs Done
35,188,248 UART: [art] Populate DV Done
35,193,598 UART: [fht] FMC Alias Private Key: 7
35,195,119 UART: [art] Derive CDI
35,195,862 UART: [art] Store in in slot 0x4
35,238,404 UART: [art] Derive Key Pair
35,239,400 UART: [art] Store priv key in slot 0x5
37,666,436 UART: [art] Derive Key Pair - Done
37,679,527 UART: [art] Signing Cert with AUTHO
37,680,857 UART: RITY.KEYID = 7
39,386,495 UART: [art] Erasing AUTHORITY.KEYID = 7
39,387,995 UART: [art] PUB.X = CEB4AE051DC8B5BE338A6ACAA937A2AF6283FA14D89EC03EB7F316C95448F5B2E13DB4529009206022E26D5E1C03EC10
39,395,246 UART: [art] PUB.Y = 81A82D11AB665F0099A2850B336AD325C6261683C246DC2FEB098AFF45BFAB2306877CEA971D14B72E2905136B28A765
39,402,483 UART: [art] SIG.R = 8D2D8E00835BFAF8A42C8AA83AED8ED5FC6EC772E5E7AFC82DCAE519244F125DE24FE77FE863571D50B2F2AAAEBC8690
39,409,874 UART: [art] SIG.S = B0F62D53AEEAB252DFF6C31A34D7C709155B02BD41E79847169141D023A69E0757AC52F01608FD2E4E8A42EC1BD06975
40,388,573 UART: mbox::rt_entry...
40,389,553 UART: ____ _ _ _ ____ _____
40,391,538 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,393,545 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,395,674 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,397,614 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,399,546 UART: |_|
40,400,359 UART:
40,685,065 UART: [rt] Runtime listening for mailbox commands...
40,687,187 >>> mbox cmd response data (48 bytes)
40,687,766 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,690,109 >>> mbox cmd response data (48 bytes)
40,690,974 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,703,574 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
3,753,148 ready_for_fw is high
3,753,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,899 >>> mbox cmd response: success
19,205,956 UART:
19,206,382 UART: Running Caliptra FMC ...
19,207,625 UART:
19,207,800 UART: [state] CFI Enabled
19,215,112 UART: [fht] FMC Alias Private Key: 7
20,972,011 UART: [art] Extend RT PCRs Done
20,973,258 UART: [art] Lock RT PCRs Done
20,974,536 UART: [art] Populate DV Done
20,979,795 UART: [fht] FMC Alias Private Key: 7
20,981,443 UART: [art] Derive CDI
20,982,262 UART: [art] Store in in slot 0x4
21,024,797 UART: [art] Derive Key Pair
21,025,846 UART: [art] Store priv key in slot 0x5
23,452,876 UART: [art] Derive Key Pair - Done
23,465,763 UART: [art] Signing Cert with AUTHO
23,467,069 UART: RITY.KEYID = 7
25,172,274 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,775 UART: [art] PUB.X = 91ADFD3140FC0B2ADB9FD40B6B0812E4A1AEC460DE35C3EBD248614480BEDAB14F3DF52E179018295D0BC31BF4F14F5C
25,181,076 UART: [art] PUB.Y = D41A688F9D5F494695046BFD5C32CB67909CFEB6BF0E1E145C50CF2E3E5D920351D47E883DD015C5964D34AEE44EB228
25,188,366 UART: [art] SIG.R = F86DF9C041D0E3EC801AA83EBD1F1636531320C959CDCC06B6C26BE4F0B8A2AC66AD93B53E4053E658A5684EB563D277
25,195,759 UART: [art] SIG.S = 067411A02D73744024CC663D349E1A2E6D89E94A459E3505DCCB83A81F5625B81D37B8DC9821475626C184EC76713A20
26,174,913 UART: Caliptra RT
26,175,618 UART: [state] CFI Enabled
26,291,386 UART: [rt] RT listening for mailbox commands...
26,293,767 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,324,925 UART: [rt]cmd =0x41545348, len=116
26,327,088 >>> mbox cmd response data (12 bytes)
28,377,628 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,301,347 >>> mbox cmd response: success
35,301,935 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,334,814 UART:
35,335,138 UART: Running Caliptra FMC ...
35,336,180 UART:
35,336,332 UART: [state] CFI Enabled
35,379,893 UART: [art] Extend RT PCRs Done
35,381,045 UART: [art] Lock RT PCRs Done
35,382,543 UART: [art] Populate DV Done
35,387,906 UART: [fht] FMC Alias Private Key: 7
35,389,658 UART: [art] Derive CDI
35,390,400 UART: [art] Store in in slot 0x4
35,432,963 UART: [art] Derive Key Pair
35,434,047 UART: [art] Store priv key in slot 0x5
37,860,597 UART: [art] Derive Key Pair - Done
37,873,706 UART: [art] Signing Cert with AUTHO
37,875,018 UART: RITY.KEYID = 7
39,580,225 UART: [art] Erasing AUTHORITY.KEYID = 7
39,581,730 UART: [art] PUB.X = 171045B80B9E32BB2E2F9519C8B8F17090261EB9FC5E200975867FCB869521B9B2B68F2FB4148858EE74275D4271030C
39,588,975 UART: [art] PUB.Y = 7F2D9171B058DDA9AEBB79D0E2F70123C1477BA80C593E7315E72A1FF9A6A4C2CE634BB48C0A13DEBD2D802E89CED2F6
39,596,259 UART: [art] SIG.R = 809C043A44D68BF5073B3B5E3A6A92D84DB2515480B0D7B3F8C9C08A8EFB62E22D173E56D094A8F07031972AFA1B367A
39,603,646 UART: [art] SIG.S = 49D7D720A53EB025E65DA11CCD8B68C64054E9EC78A655C1190B2BC7C5003A8ABE1D7C5743CDF045BFDEAFCFF0710C5C
40,582,201 UART: mbox::rt_entry...
40,583,155 UART: ____ _ _ _ ____ _____
40,585,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,587,140 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,589,071 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,591,001 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,592,936 UART: |_|
40,593,777 UART:
40,876,494 UART: [rt] Runtime listening for mailbox commands...
40,878,620 >>> mbox cmd response data (48 bytes)
40,879,184 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,881,508 >>> mbox cmd response data (48 bytes)
40,882,372 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,894,916 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,283 UART: [kat] SHA2-256
892,221 UART: [kat] SHA2-384
895,126 UART: [kat] SHA2-512-ACC
897,027 UART: [kat] ECC-384
902,774 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,709 UART: [fht] Storing FHT @ 0x50003400
1,479,580 UART: [idev] ++
1,479,748 UART: [idev] CDI.KEYID = 6
1,480,108 UART: [idev] SUBJECT.KEYID = 7
1,480,532 UART: [idev] UDS.KEYID = 0
1,480,877 ready_for_fw is high
1,480,877 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,504,932 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,644 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,687 UART: [ldev] Erasing FE.KEYID = 1
1,547,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,022 UART: [ldev] --
1,586,299 UART: [fwproc] Waiting for Commands...
1,587,080 UART: [fwproc] Received command 0x46574c44
1,587,871 UART: [fwproc] Received Image of size 114168 bytes
2,884,897 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,863 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,734 >>> mbox cmd response: success
3,077,750 UART: [afmc] ++
3,077,918 UART: [afmc] CDI.KEYID = 6
3,078,280 UART: [afmc] SUBJECT.KEYID = 7
3,078,705 UART: [afmc] AUTHORITY.KEYID = 5
3,114,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,590 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,098 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,983 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,673 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,398 UART: [afmc] --
3,157,328 UART: [cold-reset] --
3,158,220 UART: [state] Locking Datavault
3,159,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,051 UART: [state] Locking ICCM
3,160,499 UART: [exit] Launching FMC @ 0x40000130
3,165,828 UART:
3,165,844 UART: Running Caliptra FMC ...
3,166,252 UART:
3,166,306 UART: [state] CFI Enabled
3,176,575 UART: [fht] FMC Alias Private Key: 7
3,284,576 UART: [art] Extend RT PCRs Done
3,285,004 UART: [art] Lock RT PCRs Done
3,286,700 UART: [art] Populate DV Done
3,294,943 UART: [fht] FMC Alias Private Key: 7
3,295,937 UART: [art] Derive CDI
3,296,217 UART: [art] Store in in slot 0x4
3,381,756 UART: [art] Derive Key Pair
3,382,116 UART: [art] Store priv key in slot 0x5
3,395,764 UART: [art] Derive Key Pair - Done
3,410,455 UART: [art] Signing Cert with AUTHO
3,410,935 UART: RITY.KEYID = 7
3,425,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,700 UART: [art] PUB.X = 4EDA670DA10BAE0313A365A864994F0A06EA959FCF61E0D9430717601D246174E4A91A8232103E70D42E12BBFAA77E2A
3,433,456 UART: [art] PUB.Y = 74D67FF2B3AD88D1A3BAD8FE756553CBAD256B1B0D00B34D6E59C075493C47D778DB4DEF4BB91C507A43190D0326322B
3,440,387 UART: [art] SIG.R = 39D8FF3E55808DF33D704BD42CC8E13764FFF3AC3A59937F9C2F25371C8496B4DBED210463891DF9CE978798CFD8E0A8
3,447,164 UART: [art] SIG.S = BB9CD4B18F6FC9E3602BD9D02CA79E256619125326ACE24E9116073F8C0029CF474BAF5E635D62C96EDE003415353850
3,470,878 UART: Caliptra RT
3,471,131 UART: [state] CFI Enabled
3,579,596 UART: [rt] RT listening for mailbox commands...
3,580,266 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,610 UART: [rt]cmd =0x41545348, len=116
3,612,439 >>> mbox cmd response data (12 bytes)
3,612,440 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,238 UART:
3,613,254 UART: Running Caliptra ROM ...
3,613,662 UART:
3,613,716 UART: [state] CFI Enabled
3,616,148 UART: [state] LifecycleState = Unprovisioned
3,616,803 UART: [state] DebugLocked = No
3,617,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,988 UART: [kat] SHA2-256
4,412,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,034 UART: [kat] ++
4,417,186 UART: [kat] sha1
4,421,334 UART: [kat] SHA2-256
4,423,272 UART: [kat] SHA2-384
4,425,897 UART: [kat] SHA2-512-ACC
4,427,797 UART: [kat] ECC-384
4,433,510 UART: [kat] HMAC-384Kdf
4,438,124 UART: [kat] LMS
5,006,320 UART: [kat] --
5,007,261 UART: [update-reset] ++
5,931,181 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,932,303 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,028,479 >>> mbox cmd response: success
6,028,479 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,028,644 UART: [update-reset] Copying MAN_2 To MAN_1
6,036,658 UART: [update-reset Success] --
6,037,367 UART: [state] Locking Datavault
6,038,411 UART: [state] Locking PCR0, PCR1 and PCR31
6,039,015 UART: [state] Locking ICCM
6,039,687 UART: [exit] Launching FMC @ 0x40000130
6,045,016 UART:
6,045,032 UART: Running Caliptra FMC ...
6,045,440 UART:
6,045,494 UART: [state] CFI Enabled
6,134,731 UART: [art] Extend RT PCRs Done
6,135,159 UART: [art] Lock RT PCRs Done
6,136,500 UART: [art] Populate DV Done
6,144,935 UART: [fht] FMC Alias Private Key: 7
6,145,909 UART: [art] Derive CDI
6,146,189 UART: [art] Store in in slot 0x4
6,231,918 UART: [art] Derive Key Pair
6,232,278 UART: [art] Store priv key in slot 0x5
6,244,844 UART: [art] Derive Key Pair - Done
6,259,605 UART: [art] Signing Cert with AUTHO
6,260,085 UART: RITY.KEYID = 7
6,275,149 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,914 UART: [art] PUB.X = ACA696F651D1730D4DE77B3E4064E7350B8C28BE29E288B854727D493BE8D72C4A751897B0C1C8DB69DCE8D870D1C4E6
6,282,686 UART: [art] PUB.Y = 8FDC2D4D1E85DBA2437EEB106884DED4558969C79CE8B75161D2FBAC9C4F75F7B2F439DF89C23BF1A03C2AC7B68F7DBC
6,289,660 UART: [art] SIG.R = 07398A948B290CDE666124DE061B19DD3712F08A60E29186EE9C1BFF53E6BC333A210E88C265A39B43674597A32FA8BC
6,296,420 UART: [art] SIG.S = 6AFEFBA05EB83B0B638CB77BDAAB0D3C3002C14BC04B32FE1CFDBBF3C0E5F3B17FB64911D129C2E58B068BB30AD24CBB
6,320,382 UART: mbox::rt_entry...
6,320,754 UART: ____ _ _ _ ____ _____
6,321,538 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,322,338 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,323,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,323,874 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,324,642 UART: |_|
6,324,954 UART:
6,605,487 UART: [rt] Runtime listening for mailbox commands...
6,606,677 >>> mbox cmd response data (48 bytes)
6,606,678 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,609,461 >>> mbox cmd response data (48 bytes)
6,609,462 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,622,400 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,879 ready_for_fw is high
1,362,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,166 >>> mbox cmd response: success
2,987,884 UART:
2,987,900 UART: Running Caliptra FMC ...
2,988,308 UART:
2,988,362 UART: [state] CFI Enabled
2,998,625 UART: [fht] FMC Alias Private Key: 7
3,107,158 UART: [art] Extend RT PCRs Done
3,107,586 UART: [art] Lock RT PCRs Done
3,109,144 UART: [art] Populate DV Done
3,117,363 UART: [fht] FMC Alias Private Key: 7
3,118,545 UART: [art] Derive CDI
3,118,825 UART: [art] Store in in slot 0x4
3,204,230 UART: [art] Derive Key Pair
3,204,590 UART: [art] Store priv key in slot 0x5
3,216,942 UART: [art] Derive Key Pair - Done
3,231,516 UART: [art] Signing Cert with AUTHO
3,231,996 UART: RITY.KEYID = 7
3,246,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,553 UART: [art] PUB.X = FBBE89F22FAE58DD99D085513FF31E0E54E8F589AC82EB100DF7F5CD95E0644B4940165CB3815F17B911749B65A92891
3,254,323 UART: [art] PUB.Y = C1532433FFDCC51ED0B8DF6976CE2433DF9ECCFABBD45CEF7FCD7A67BCF9498B0CFB465ECEEE49B2F01E4BAD53AB2747
3,261,308 UART: [art] SIG.R = E2CAEF81519C159C5030D6D141BC2B4B30085150C5AFD0B18377A86EDC5B816642A690E19BFB0574A8AF9384447E6F51
3,268,076 UART: [art] SIG.S = 341FF152F887262ED79A039E09BFCB0451BBBFA325C8A8EA7F41384A14CC0ABA2A327326FB8BD34FB055F6253D9B6E06
3,291,788 UART: Caliptra RT
3,292,041 UART: [state] CFI Enabled
3,402,246 UART: [rt] RT listening for mailbox commands...
3,402,916 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,438 UART: [rt]cmd =0x41545348, len=116
3,435,017 >>> mbox cmd response data (12 bytes)
3,435,018 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,732,189 >>> mbox cmd response: success
5,732,189 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,745,726 UART:
5,745,742 UART: Running Caliptra FMC ...
5,746,150 UART:
5,746,204 UART: [state] CFI Enabled
5,835,447 UART: [art] Extend RT PCRs Done
5,835,875 UART: [art] Lock RT PCRs Done
5,837,076 UART: [art] Populate DV Done
5,845,305 UART: [fht] FMC Alias Private Key: 7
5,846,281 UART: [art] Derive CDI
5,846,561 UART: [art] Store in in slot 0x4
5,932,580 UART: [art] Derive Key Pair
5,932,940 UART: [art] Store priv key in slot 0x5
5,946,080 UART: [art] Derive Key Pair - Done
5,960,781 UART: [art] Signing Cert with AUTHO
5,961,261 UART: RITY.KEYID = 7
5,976,631 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,396 UART: [art] PUB.X = 6645FE983EC1C3B28E33939B34D3DBA8A48EC86360A24BB67E933CF0B0DE84D4CC24DCDEEECC04B752D5EB43AB1DC34B
5,984,189 UART: [art] PUB.Y = 2A36C245E5FEA01C895D11EF5CC0C57207B397FC99CC9373C2EF089987E9B33F5263F9215509AADEAF7DD74CD9EAD62F
5,991,146 UART: [art] SIG.R = FDF164DBE887270AF823FCDF7033C82701D7E29C5ADD8C308E56166AD3FF7F985D7FA3322504257E919DAA1C96C0FDD3
5,997,921 UART: [art] SIG.S = 5246E63EC0D41D1A7AC39CEEAF0176CBA3E7D732629268180576EEF9C5C42389E3C1314434B39FD703CE462D23A12604
6,022,224 UART: mbox::rt_entry...
6,022,596 UART: ____ _ _ _ ____ _____
6,023,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,024,180 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,025,716 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,484 UART: |_|
6,026,796 UART:
6,308,676 UART: [rt] Runtime listening for mailbox commands...
6,309,866 >>> mbox cmd response data (48 bytes)
6,309,867 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,312,650 >>> mbox cmd response data (48 bytes)
6,312,651 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,325,589 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,896 UART: [kat] SHA2-256
881,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,942 UART: [kat] ++
886,094 UART: [kat] sha1
890,308 UART: [kat] SHA2-256
892,246 UART: [kat] SHA2-384
895,053 UART: [kat] SHA2-512-ACC
896,954 UART: [kat] ECC-384
902,341 UART: [kat] HMAC-384Kdf
906,941 UART: [kat] LMS
1,475,137 UART: [kat] --
1,476,318 UART: [cold-reset] ++
1,476,798 UART: [fht] Storing FHT @ 0x50003400
1,479,691 UART: [idev] ++
1,479,859 UART: [idev] CDI.KEYID = 6
1,480,219 UART: [idev] SUBJECT.KEYID = 7
1,480,643 UART: [idev] UDS.KEYID = 0
1,480,988 ready_for_fw is high
1,480,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,823 UART: [idev] Erasing UDS.KEYID = 0
1,505,239 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,969 UART: [idev] --
1,514,932 UART: [ldev] ++
1,515,100 UART: [ldev] CDI.KEYID = 6
1,515,463 UART: [ldev] SUBJECT.KEYID = 5
1,515,889 UART: [ldev] AUTHORITY.KEYID = 7
1,516,352 UART: [ldev] FE.KEYID = 1
1,521,506 UART: [ldev] Erasing FE.KEYID = 1
1,547,009 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,899 UART: [ldev] --
1,586,350 UART: [fwproc] Waiting for Commands...
1,587,017 UART: [fwproc] Received command 0x46574c44
1,587,808 UART: [fwproc] Received Image of size 114168 bytes
2,885,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,364 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,243 >>> mbox cmd response: success
3,078,459 UART: [afmc] ++
3,078,627 UART: [afmc] CDI.KEYID = 6
3,078,989 UART: [afmc] SUBJECT.KEYID = 7
3,079,414 UART: [afmc] AUTHORITY.KEYID = 5
3,114,553 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,975 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,368 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,058 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,889 UART: [afmc] --
3,157,801 UART: [cold-reset] --
3,158,545 UART: [state] Locking Datavault
3,159,774 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,378 UART: [state] Locking ICCM
3,160,804 UART: [exit] Launching FMC @ 0x40000130
3,166,133 UART:
3,166,149 UART: Running Caliptra FMC ...
3,166,557 UART:
3,166,700 UART: [state] CFI Enabled
3,177,329 UART: [fht] FMC Alias Private Key: 7
3,285,740 UART: [art] Extend RT PCRs Done
3,286,168 UART: [art] Lock RT PCRs Done
3,287,594 UART: [art] Populate DV Done
3,296,033 UART: [fht] FMC Alias Private Key: 7
3,297,081 UART: [art] Derive CDI
3,297,361 UART: [art] Store in in slot 0x4
3,382,762 UART: [art] Derive Key Pair
3,383,122 UART: [art] Store priv key in slot 0x5
3,396,224 UART: [art] Derive Key Pair - Done
3,411,291 UART: [art] Signing Cert with AUTHO
3,411,771 UART: RITY.KEYID = 7
3,427,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,846 UART: [art] PUB.X = 2A4F8E4EC363A1296AC0F801D590F59CA7291623FE69B9C3CFA1701C72EA807E2984FFC4B34D32C01D9D0AA4F542D256
3,434,620 UART: [art] PUB.Y = 481274DA3A9434E86C4999C87C61228050E02F61310DDCB39BF42D86DD6CAA16CC580BADE6DDC1B4CD09910A931C761C
3,441,568 UART: [art] SIG.R = 5C1D0F151C23318B73094CA50154A7574148DA59F4D8FF8513E8D0E9EFB3C89A43419C163964FCC8B3A8259634C146DF
3,448,329 UART: [art] SIG.S = 3EFF702605813DBBBC5D47FBA08314B97566162FE7440D61BF15C5981ABDA28ADA91635416F23BD21BDA3E3887DA4247
3,472,152 UART: Caliptra RT
3,472,497 UART: [state] CFI Enabled
3,580,641 UART: [rt] RT listening for mailbox commands...
3,581,311 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,617 UART: [rt]cmd =0x41545348, len=116
3,613,058 >>> mbox cmd response data (12 bytes)
3,613,059 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,525 UART:
3,613,541 UART: Running Caliptra ROM ...
3,613,949 UART:
3,614,090 UART: [state] CFI Enabled
3,616,738 UART: [state] LifecycleState = Unprovisioned
3,617,393 UART: [state] DebugLocked = No
3,617,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,646 UART: [kat] SHA2-256
4,413,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,692 UART: [kat] ++
4,417,844 UART: [kat] sha1
4,421,952 UART: [kat] SHA2-256
4,423,890 UART: [kat] SHA2-384
4,426,521 UART: [kat] SHA2-512-ACC
4,428,421 UART: [kat] ECC-384
4,433,904 UART: [kat] HMAC-384Kdf
4,438,630 UART: [kat] LMS
5,006,826 UART: [kat] --
5,007,793 UART: [update-reset] ++
5,931,983 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,933,275 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,029,451 >>> mbox cmd response: success
6,029,451 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,029,796 UART: [update-reset] Copying MAN_2 To MAN_1
6,037,810 UART: [update-reset Success] --
6,038,825 UART: [state] Locking Datavault
6,039,835 UART: [state] Locking PCR0, PCR1 and PCR31
6,040,439 UART: [state] Locking ICCM
6,040,995 UART: [exit] Launching FMC @ 0x40000130
6,046,324 UART:
6,046,340 UART: Running Caliptra FMC ...
6,046,748 UART:
6,046,891 UART: [state] CFI Enabled
6,135,992 UART: [art] Extend RT PCRs Done
6,136,420 UART: [art] Lock RT PCRs Done
6,137,881 UART: [art] Populate DV Done
6,146,256 UART: [fht] FMC Alias Private Key: 7
6,147,246 UART: [art] Derive CDI
6,147,526 UART: [art] Store in in slot 0x4
6,233,665 UART: [art] Derive Key Pair
6,234,025 UART: [art] Store priv key in slot 0x5
6,247,225 UART: [art] Derive Key Pair - Done
6,261,731 UART: [art] Signing Cert with AUTHO
6,262,211 UART: RITY.KEYID = 7
6,277,147 UART: [art] Erasing AUTHORITY.KEYID = 7
6,277,912 UART: [art] PUB.X = 20B2742A4632FFF1DD40EB9CAFB6895AB7292F1098CA1309323D0A675C7B37A3EB6D4B3883AADCE6ADA291B011B4466D
6,284,690 UART: [art] PUB.Y = 89DBCB23BDCDCCD90F8FD36A23B0F68D280A7252427CBCA06207D1AA37F7B0A1E6EA5B8C0758D4A4BF879482877AAAD4
6,291,650 UART: [art] SIG.R = 7805DE107E6BCE12DBFD59EA1F691628A7DFCAF1EB52408A0D9B9A90B960966D49C13B7B8127D86D63010C3501D5D3F6
6,298,415 UART: [art] SIG.S = 8E1FDE1BFB86D378B036310C161020AE7E87992E4A87824B7BBC7BD6D73ECDF4BCEF50B9B27FD84074E47EC4AF445CC4
6,321,989 UART: mbox::rt_entry...
6,322,361 UART: ____ _ _ _ ____ _____
6,323,145 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,323,945 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,324,713 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,325,481 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,326,249 UART: |_|
6,326,561 UART:
6,609,923 UART: [rt] Runtime listening for mailbox commands...
6,611,113 >>> mbox cmd response data (48 bytes)
6,611,114 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,613,897 >>> mbox cmd response data (48 bytes)
6,613,898 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,626,836 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,550 ready_for_fw is high
1,362,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,435 >>> mbox cmd response: success
2,987,643 UART:
2,987,659 UART: Running Caliptra FMC ...
2,988,067 UART:
2,988,210 UART: [state] CFI Enabled
2,998,951 UART: [fht] FMC Alias Private Key: 7
3,106,994 UART: [art] Extend RT PCRs Done
3,107,422 UART: [art] Lock RT PCRs Done
3,108,968 UART: [art] Populate DV Done
3,117,343 UART: [fht] FMC Alias Private Key: 7
3,118,329 UART: [art] Derive CDI
3,118,609 UART: [art] Store in in slot 0x4
3,204,378 UART: [art] Derive Key Pair
3,204,738 UART: [art] Store priv key in slot 0x5
3,217,260 UART: [art] Derive Key Pair - Done
3,232,223 UART: [art] Signing Cert with AUTHO
3,232,703 UART: RITY.KEYID = 7
3,247,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,738 UART: [art] PUB.X = 1AF4CCE77A6EBBB985E656BD933FD8ABD27E6544E58B4C137565623E2339256584F0C1B1B70F61636E17789258E8F535
3,255,505 UART: [art] PUB.Y = A8DEB65258DC5D4597AE25D621C92D8188880337CF5BB6ADCE84F34179DA756B98F58F0E9C11F2B10B67D39DA94091B7
3,262,454 UART: [art] SIG.R = 9BCD85D7E01FA44364E5B5966BC6E21B16E41DCFE83472AAA138F9DD866181FA14081E538A631E30CED0CA986D68EE8F
3,269,235 UART: [art] SIG.S = 0D88E438CB9510141D0BA0E5F75A5D4485351D56416A1E3490743C9DB1B05CDB4244BAB2DE42ACA9DB736F3BB171394D
3,293,384 UART: Caliptra RT
3,293,729 UART: [state] CFI Enabled
3,402,094 UART: [rt] RT listening for mailbox commands...
3,402,764 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,282 UART: [rt]cmd =0x41545348, len=116
3,435,317 >>> mbox cmd response data (12 bytes)
3,435,318 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,733,104 >>> mbox cmd response: success
5,733,104 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,746,543 UART:
5,746,559 UART: Running Caliptra FMC ...
5,746,967 UART:
5,747,110 UART: [state] CFI Enabled
5,835,941 UART: [art] Extend RT PCRs Done
5,836,369 UART: [art] Lock RT PCRs Done
5,837,616 UART: [art] Populate DV Done
5,845,715 UART: [fht] FMC Alias Private Key: 7
5,846,683 UART: [art] Derive CDI
5,846,963 UART: [art] Store in in slot 0x4
5,932,564 UART: [art] Derive Key Pair
5,932,924 UART: [art] Store priv key in slot 0x5
5,945,912 UART: [art] Derive Key Pair - Done
5,960,647 UART: [art] Signing Cert with AUTHO
5,961,127 UART: RITY.KEYID = 7
5,976,401 UART: [art] Erasing AUTHORITY.KEYID = 7
5,977,166 UART: [art] PUB.X = D4655C07F1EB6BC39CB5DC839C5AC103DEE129A79B9B3E98363A53C5D4619EC79B4F7871A1486EB4B26E3A20D3EDD3A5
5,983,946 UART: [art] PUB.Y = 1E406F7AB32ED5F9A8D40B20F395414BCFB25E4509DFA0114155B2DBDB59265CBAE7BBDD3A232EA4791B37A4005F2E0F
5,990,883 UART: [art] SIG.R = 21C8C79AE2FF669D82252C19C84B37080506FC0678CDE06C3F5951104371887689FAE6043D22649020F427119F1E5BE7
5,997,628 UART: [art] SIG.S = 492DE6302466FF0A4987BEB27005EA7CC4D99052A5360DECE2D6E6F049A08BF267C2DC055C989F69BF4AFB887025B2F5
6,021,785 UART: mbox::rt_entry...
6,022,157 UART: ____ _ _ _ ____ _____
6,022,941 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,023,741 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,025,277 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,045 UART: |_|
6,026,357 UART:
6,303,364 UART: [rt] Runtime listening for mailbox commands...
6,304,554 >>> mbox cmd response data (48 bytes)
6,304,555 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,307,338 >>> mbox cmd response data (48 bytes)
6,307,339 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,320,277 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
893,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,255 UART: [kat] ++
897,407 UART: [kat] sha1
901,683 UART: [kat] SHA2-256
903,623 UART: [kat] SHA2-384
906,352 UART: [kat] SHA2-512-ACC
908,253 UART: [kat] ECC-384
918,158 UART: [kat] HMAC-384Kdf
922,702 UART: [kat] LMS
1,171,030 UART: [kat] --
1,171,811 UART: [cold-reset] ++
1,172,243 UART: [fht] FHT @ 0x50003400
1,174,896 UART: [idev] ++
1,175,064 UART: [idev] CDI.KEYID = 6
1,175,424 UART: [idev] SUBJECT.KEYID = 7
1,175,848 UART: [idev] UDS.KEYID = 0
1,176,193 ready_for_fw is high
1,176,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,620 UART: [idev] Erasing UDS.KEYID = 0
1,201,029 UART: [idev] Sha1 KeyId Algorithm
1,209,305 UART: [idev] --
1,210,191 UART: [ldev] ++
1,210,359 UART: [ldev] CDI.KEYID = 6
1,210,722 UART: [ldev] SUBJECT.KEYID = 5
1,211,148 UART: [ldev] AUTHORITY.KEYID = 7
1,211,611 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,445 UART: [ldev] --
1,281,784 UART: [fwproc] Wait for Commands...
1,282,388 UART: [fwproc] Recv command 0x46574c44
1,283,116 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,947 >>> mbox cmd response: success
2,772,027 UART: [afmc] ++
2,772,195 UART: [afmc] CDI.KEYID = 6
2,772,557 UART: [afmc] SUBJECT.KEYID = 7
2,772,982 UART: [afmc] AUTHORITY.KEYID = 5
2,808,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,454 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,067 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,786 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,604 UART: [afmc] --
2,851,586 UART: [cold-reset] --
2,852,320 UART: [state] Locking Datavault
2,853,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,121 UART: [state] Locking ICCM
2,854,757 UART: [exit] Launching FMC @ 0x40000130
2,860,086 UART:
2,860,102 UART: Running Caliptra FMC ...
2,860,510 UART:
2,860,564 UART: [state] CFI Enabled
2,870,841 UART: [fht] FMC Alias Private Key: 7
2,979,250 UART: [art] Extend RT PCRs Done
2,979,678 UART: [art] Lock RT PCRs Done
2,981,326 UART: [art] Populate DV Done
2,989,269 UART: [fht] FMC Alias Private Key: 7
2,990,433 UART: [art] Derive CDI
2,990,713 UART: [art] Store in in slot 0x4
3,076,862 UART: [art] Derive Key Pair
3,077,222 UART: [art] Store priv key in slot 0x5
3,089,874 UART: [art] Derive Key Pair - Done
3,104,546 UART: [art] Signing Cert with AUTHO
3,105,026 UART: RITY.KEYID = 7
3,120,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,783 UART: [art] PUB.X = 40170679857D6884F3D4C2F090F3032D54ED1EF41A54A2992B08E39EFAF1A813EE292485379532C62F141789A584980C
3,127,531 UART: [art] PUB.Y = C8CA25A81F41F39F7F13446D3E7868615643D3F4F8838F95244AE1BBFA7454B097CF9D0E6637BE31F850767AA8CFFE55
3,134,484 UART: [art] SIG.R = EEEE03B0C3F73C2760C06FA7EF62831A401DDE5FDB066CBB3914499AF45D1FFE4895DA4D6DEC6E967EE986332EEA6206
3,141,265 UART: [art] SIG.S = F52892BA8A3CB6611073B707B957A15E963ADE62C78F844CD0237C27ED0C69F580B39860FAB3525F790443DCD2E95CDE
3,164,681 UART: Caliptra RT
3,164,934 UART: [state] CFI Enabled
3,272,652 UART: [rt] RT listening for mailbox commands...
3,273,322 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,992 UART: [rt]cmd =0x41545348, len=116
3,305,691 >>> mbox cmd response data (12 bytes)
3,305,692 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,389 UART:
3,306,405 UART: Running Caliptra ROM ...
3,306,813 UART:
3,306,868 UART: [state] CFI Enabled
3,309,318 UART: [state] LifecycleState = Unprovisioned
3,309,973 UART: [state] DebugLocked = No
3,310,625 UART: [state] WD Timer not started. Device not locked for debugging
3,311,927 UART: [kat] SHA2-256
4,117,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,121,702 UART: [kat] ++
4,121,854 UART: [kat] sha1
4,126,198 UART: [kat] SHA2-256
4,128,138 UART: [kat] SHA2-384
4,131,033 UART: [kat] SHA2-512-ACC
4,132,933 UART: [kat] ECC-384
4,142,692 UART: [kat] HMAC-384Kdf
4,147,166 UART: [kat] LMS
4,395,494 UART: [kat] --
4,396,572 UART: [update-reset] ++
5,298,924 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,300,047 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,396,171 >>> mbox cmd response: success
5,396,171 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,396,340 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,354 UART: [update-reset Success] --
5,405,223 UART: [state] Locking Datavault
5,405,945 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,549 UART: [state] Locking ICCM
5,407,175 UART: [exit] Launching FMC @ 0x40000130
5,412,504 UART:
5,412,520 UART: Running Caliptra FMC ...
5,412,928 UART:
5,412,982 UART: [state] CFI Enabled
5,502,303 UART: [art] Extend RT PCRs Done
5,502,731 UART: [art] Lock RT PCRs Done
5,503,792 UART: [art] Populate DV Done
5,512,143 UART: [fht] FMC Alias Private Key: 7
5,513,313 UART: [art] Derive CDI
5,513,593 UART: [art] Store in in slot 0x4
5,599,500 UART: [art] Derive Key Pair
5,599,860 UART: [art] Store priv key in slot 0x5
5,613,120 UART: [art] Derive Key Pair - Done
5,628,301 UART: [art] Signing Cert with AUTHO
5,628,781 UART: RITY.KEYID = 7
5,643,923 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,688 UART: [art] PUB.X = 12C813E717C337504A2CF47C5EEBDF5FAD7AF47AB3A85F90C222993C69C457440F15ACB36DD6E17BE2EB8E46130787CD
5,651,466 UART: [art] PUB.Y = E003168D575DDA5B18ADF5D7E46C66600BEE9B227B660163325125BD9879A2C9CB88E62C3124DFCEC19203464E034E95
5,658,403 UART: [art] SIG.R = F3D4ED5519D5ADA1C6C81555D0ADDD890024DC6394AC8CBABE5DFB357ABCEDAE93D8C7B34FB7C7BD522A24A34CB1431A
5,665,183 UART: [art] SIG.S = E3C3D9D0FE13A37088DFEDB04D6D2B1A951877C0FE5DFD5D49489807BBD139A035275F47281FA4A7A3FCFF6EB365BE8B
5,689,603 UART: mbox::rt_entry...
5,689,975 UART: ____ _ _ _ ____ _____
5,690,759 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,691,559 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,692,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,693,095 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,693,863 UART: |_|
5,694,175 UART:
5,973,632 UART: [rt] Runtime listening for mailbox commands...
5,974,822 >>> mbox cmd response data (48 bytes)
5,974,823 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,977,606 >>> mbox cmd response data (48 bytes)
5,977,607 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,990,545 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 ready_for_fw is high
1,059,895 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,238 >>> mbox cmd response: success
2,687,450 UART:
2,687,466 UART: Running Caliptra FMC ...
2,687,874 UART:
2,687,928 UART: [state] CFI Enabled
2,698,149 UART: [fht] FMC Alias Private Key: 7
2,805,798 UART: [art] Extend RT PCRs Done
2,806,226 UART: [art] Lock RT PCRs Done
2,807,774 UART: [art] Populate DV Done
2,815,817 UART: [fht] FMC Alias Private Key: 7
2,816,771 UART: [art] Derive CDI
2,817,051 UART: [art] Store in in slot 0x4
2,902,888 UART: [art] Derive Key Pair
2,903,248 UART: [art] Store priv key in slot 0x5
2,916,844 UART: [art] Derive Key Pair - Done
2,931,672 UART: [art] Signing Cert with AUTHO
2,932,152 UART: RITY.KEYID = 7
2,947,630 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,395 UART: [art] PUB.X = 9071800E96926FE49D74F45BC55E1E9CE1B866D68AAF5CCA62B9B3B0C028CD1BAEE92D9631252ECFFF2B54F8A8DAAF2E
2,955,186 UART: [art] PUB.Y = 25D40EB6B85188133998864DD716C9E5F019082592F19DF71A2B5F8688588415793E3D0D3C4507CBC77E1025E98A1B8E
2,962,116 UART: [art] SIG.R = FEAABC6DFFCB2BC4DEC2341BD00CBAC82AA7E901E83DF47BEACFD668D227D3EF59D3AB90478FD65692F91FB2E4227374
2,968,912 UART: [art] SIG.S = 40C99F6A43A116285E55B8974F63441E41ED8C3D9D9697E3A77CB516B17C032092B277C8FFCCC72D307D15946CEAB5B6
2,993,706 UART: Caliptra RT
2,993,959 UART: [state] CFI Enabled
3,103,028 UART: [rt] RT listening for mailbox commands...
3,103,698 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,316 UART: [rt]cmd =0x41545348, len=116
3,135,893 >>> mbox cmd response data (12 bytes)
3,135,894 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,454 >>> mbox cmd response: success
5,109,454 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,122,978 UART:
5,122,994 UART: Running Caliptra FMC ...
5,123,402 UART:
5,123,456 UART: [state] CFI Enabled
5,212,547 UART: [art] Extend RT PCRs Done
5,212,975 UART: [art] Lock RT PCRs Done
5,214,458 UART: [art] Populate DV Done
5,222,641 UART: [fht] FMC Alias Private Key: 7
5,223,637 UART: [art] Derive CDI
5,223,917 UART: [art] Store in in slot 0x4
5,309,376 UART: [art] Derive Key Pair
5,309,736 UART: [art] Store priv key in slot 0x5
5,322,786 UART: [art] Derive Key Pair - Done
5,337,386 UART: [art] Signing Cert with AUTHO
5,337,866 UART: RITY.KEYID = 7
5,352,782 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,547 UART: [art] PUB.X = 4CC79F34402C715F31287C8B0C44561FA9A3C7C2AD3FFD916458B3D03420844F9A42EA5F4E1814EB03C8409A1EFA7066
5,360,315 UART: [art] PUB.Y = 7FC0BE13B5E454ADF8CF0207AF87599B974092D62B651B122B054D0A518A4E46D3913396C7C4E92F3E2D2B266F7B0B57
5,367,254 UART: [art] SIG.R = 7F59B6769270056F6E0314D1C26BF8521A78DA48EE6798DD1439167457DCF8B219307016750C6361E73341E82512D649
5,373,999 UART: [art] SIG.S = FFF4914DF024FC9484B13FA4F3E7D6B43441DDDC214FDE33939621376F26BACE667A892F643F69BE878B41F3C9059FF8
5,397,553 UART: mbox::rt_entry...
5,397,925 UART: ____ _ _ _ ____ _____
5,398,709 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,399,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,400,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,401,045 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,401,813 UART: |_|
5,402,125 UART:
5,687,039 UART: [rt] Runtime listening for mailbox commands...
5,688,229 >>> mbox cmd response data (48 bytes)
5,688,230 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,691,013 >>> mbox cmd response data (48 bytes)
5,691,014 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,703,952 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,793 UART: [state] LifecycleState = Unprovisioned
85,448 UART: [state] DebugLocked = No
85,932 UART: [state] WD Timer not started. Device not locked for debugging
87,181 UART: [kat] SHA2-256
892,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,956 UART: [kat] ++
897,108 UART: [kat] sha1
901,304 UART: [kat] SHA2-256
903,244 UART: [kat] SHA2-384
905,781 UART: [kat] SHA2-512-ACC
907,682 UART: [kat] ECC-384
917,807 UART: [kat] HMAC-384Kdf
922,361 UART: [kat] LMS
1,170,689 UART: [kat] --
1,171,678 UART: [cold-reset] ++
1,172,006 UART: [fht] FHT @ 0x50003400
1,174,773 UART: [idev] ++
1,174,941 UART: [idev] CDI.KEYID = 6
1,175,301 UART: [idev] SUBJECT.KEYID = 7
1,175,725 UART: [idev] UDS.KEYID = 0
1,176,070 ready_for_fw is high
1,176,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,419 UART: [idev] Erasing UDS.KEYID = 0
1,200,042 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,626 UART: [ldev] ++
1,209,794 UART: [ldev] CDI.KEYID = 6
1,210,157 UART: [ldev] SUBJECT.KEYID = 5
1,210,583 UART: [ldev] AUTHORITY.KEYID = 7
1,211,046 UART: [ldev] FE.KEYID = 1
1,216,386 UART: [ldev] Erasing FE.KEYID = 1
1,243,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,612 UART: [ldev] --
1,283,055 UART: [fwproc] Wait for Commands...
1,283,751 UART: [fwproc] Recv command 0x46574c44
1,284,479 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,599 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,903 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,586 >>> mbox cmd response: success
2,774,760 UART: [afmc] ++
2,774,928 UART: [afmc] CDI.KEYID = 6
2,775,290 UART: [afmc] SUBJECT.KEYID = 7
2,775,715 UART: [afmc] AUTHORITY.KEYID = 5
2,811,494 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,877 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,605 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,490 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,209 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,071 UART: [afmc] --
2,855,155 UART: [cold-reset] --
2,856,079 UART: [state] Locking Datavault
2,857,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,924 UART: [state] Locking ICCM
2,858,544 UART: [exit] Launching FMC @ 0x40000130
2,863,873 UART:
2,863,889 UART: Running Caliptra FMC ...
2,864,297 UART:
2,864,440 UART: [state] CFI Enabled
2,875,093 UART: [fht] FMC Alias Private Key: 7
2,983,150 UART: [art] Extend RT PCRs Done
2,983,578 UART: [art] Lock RT PCRs Done
2,985,256 UART: [art] Populate DV Done
2,993,331 UART: [fht] FMC Alias Private Key: 7
2,994,275 UART: [art] Derive CDI
2,994,555 UART: [art] Store in in slot 0x4
3,080,454 UART: [art] Derive Key Pair
3,080,814 UART: [art] Store priv key in slot 0x5
3,094,568 UART: [art] Derive Key Pair - Done
3,108,918 UART: [art] Signing Cert with AUTHO
3,109,398 UART: RITY.KEYID = 7
3,125,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,799 UART: [art] PUB.X = 53F442ABA65AC969F9DAC57D61AE09C51C6EB9B6E51D44A96B7048AE011BAB4D46BEA8C0D0720868578FE538D8B4A6F6
3,132,576 UART: [art] PUB.Y = CE34F5DEE5120497EF299BFE9591B52B9E6C927CCD2BC073253D41D7F7207AFFBB1AD00E52C9E4DD9B4CBD697983344E
3,139,538 UART: [art] SIG.R = 8482405844B2F3F807F9C79D45526521DBEF749D0835FD08B32D94AA9FC72717EF5147CF7AE604778F68BC9E43C291EC
3,146,298 UART: [art] SIG.S = C27460C49CEA0FDA681CB4A62520EC486C71A97086AB5CF4B477AAA9C997699E1C5BD0080A9C6DBAB05C81DB0E76EE1A
3,169,783 UART: Caliptra RT
3,170,128 UART: [state] CFI Enabled
3,278,218 UART: [rt] RT listening for mailbox commands...
3,278,888 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,732 UART: [rt]cmd =0x41545348, len=116
3,311,523 >>> mbox cmd response data (12 bytes)
3,311,524 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,969 UART:
3,311,985 UART: Running Caliptra ROM ...
3,312,393 UART:
3,312,535 UART: [state] CFI Enabled
3,315,257 UART: [state] LifecycleState = Unprovisioned
3,315,912 UART: [state] DebugLocked = No
3,316,638 UART: [state] WD Timer not started. Device not locked for debugging
3,317,760 UART: [kat] SHA2-256
4,123,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,127,535 UART: [kat] ++
4,127,687 UART: [kat] sha1
4,132,085 UART: [kat] SHA2-256
4,134,025 UART: [kat] SHA2-384
4,136,732 UART: [kat] SHA2-512-ACC
4,138,632 UART: [kat] ECC-384
4,148,659 UART: [kat] HMAC-384Kdf
4,153,165 UART: [kat] LMS
4,401,493 UART: [kat] --
4,402,387 UART: [update-reset] ++
5,305,443 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,306,598 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,402,722 >>> mbox cmd response: success
5,402,722 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,402,839 UART: [update-reset] Copying MAN_2 To MAN_1
5,410,853 UART: [update-reset Success] --
5,411,710 UART: [state] Locking Datavault
5,412,460 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,064 UART: [state] Locking ICCM
5,413,726 UART: [exit] Launching FMC @ 0x40000130
5,419,055 UART:
5,419,071 UART: Running Caliptra FMC ...
5,419,479 UART:
5,419,622 UART: [state] CFI Enabled
5,508,545 UART: [art] Extend RT PCRs Done
5,508,973 UART: [art] Lock RT PCRs Done
5,510,174 UART: [art] Populate DV Done
5,518,345 UART: [fht] FMC Alias Private Key: 7
5,519,519 UART: [art] Derive CDI
5,519,799 UART: [art] Store in in slot 0x4
5,605,594 UART: [art] Derive Key Pair
5,605,954 UART: [art] Store priv key in slot 0x5
5,619,166 UART: [art] Derive Key Pair - Done
5,634,133 UART: [art] Signing Cert with AUTHO
5,634,613 UART: RITY.KEYID = 7
5,650,105 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,870 UART: [art] PUB.X = D343F2A82B592D280107CDD83495746F1227E3CBF06BF2900E0279B4D672B6185C7FB5CD2E51BAD15B1DBF11503BF71B
5,657,636 UART: [art] PUB.Y = BBECEC9F3362BBBD31587A9A6DF7D711BF81F6BE89DF66A865ADA293511D5476DF4EF26FF69581957A4435676F804E13
5,664,598 UART: [art] SIG.R = ADFECD7894FC462F5D05875F74E3CF2164D9C25B7E0AC6B9C0957A25BCF5FEB90BAC858D9F6A14255E08ADE3D69F1F3E
5,671,380 UART: [art] SIG.S = 344498EBC627EC17DF86442ACE57992A5B1BEB26358370BA3301FB8D95D52AFA866114273FFA41481BFA6DFD48DF5230
5,694,408 UART: mbox::rt_entry...
5,694,780 UART: ____ _ _ _ ____ _____
5,695,564 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,696,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,697,132 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,697,900 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,698,668 UART: |_|
5,698,980 UART:
5,983,028 UART: [rt] Runtime listening for mailbox commands...
5,984,218 >>> mbox cmd response data (48 bytes)
5,984,219 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,987,002 >>> mbox cmd response data (48 bytes)
5,987,003 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,999,941 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,310 ready_for_fw is high
1,061,310 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,299 >>> mbox cmd response: success
2,689,179 UART:
2,689,195 UART: Running Caliptra FMC ...
2,689,603 UART:
2,689,746 UART: [state] CFI Enabled
2,700,505 UART: [fht] FMC Alias Private Key: 7
2,808,930 UART: [art] Extend RT PCRs Done
2,809,358 UART: [art] Lock RT PCRs Done
2,810,858 UART: [art] Populate DV Done
2,818,825 UART: [fht] FMC Alias Private Key: 7
2,819,981 UART: [art] Derive CDI
2,820,261 UART: [art] Store in in slot 0x4
2,905,914 UART: [art] Derive Key Pair
2,906,274 UART: [art] Store priv key in slot 0x5
2,919,740 UART: [art] Derive Key Pair - Done
2,934,579 UART: [art] Signing Cert with AUTHO
2,935,059 UART: RITY.KEYID = 7
2,950,319 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,084 UART: [art] PUB.X = D5F8C8863EAD3D523369F3CE225EC99BDC6C2AC4B82E1F01F524579A5F6E42CDD6BB20CA942428B196DDD79698D9156A
2,957,865 UART: [art] PUB.Y = 4DEDEA1169569CA0E37C31CB7BA8B4256498E29EB3294BC8E152BF32C7BC1E80A6EFDFE418B5C0508459A6870398AFEE
2,964,828 UART: [art] SIG.R = 0E4D5F8EED2310940499A46CF294808DCFA66E08395AE3F3539883516BF49CF204D6B347ACE304AC0800780A65E6AE1D
2,971,559 UART: [art] SIG.S = CACBFAE8B8D8FEB4B7191A25C0B7055A629FB71F42B8F2ACCF28FAADC77EBD576EBF67D36ACAD8E0339620E26B4D711E
2,995,379 UART: Caliptra RT
2,995,724 UART: [state] CFI Enabled
3,103,835 UART: [rt] RT listening for mailbox commands...
3,104,505 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,095 UART: [rt]cmd =0x41545348, len=116
3,136,732 >>> mbox cmd response data (12 bytes)
3,136,733 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,110,988 >>> mbox cmd response: success
5,110,988 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,124,348 UART:
5,124,364 UART: Running Caliptra FMC ...
5,124,772 UART:
5,124,915 UART: [state] CFI Enabled
5,214,066 UART: [art] Extend RT PCRs Done
5,214,494 UART: [art] Lock RT PCRs Done
5,215,841 UART: [art] Populate DV Done
5,224,212 UART: [fht] FMC Alias Private Key: 7
5,225,336 UART: [art] Derive CDI
5,225,616 UART: [art] Store in in slot 0x4
5,311,253 UART: [art] Derive Key Pair
5,311,613 UART: [art] Store priv key in slot 0x5
5,324,553 UART: [art] Derive Key Pair - Done
5,339,022 UART: [art] Signing Cert with AUTHO
5,339,502 UART: RITY.KEYID = 7
5,354,944 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,709 UART: [art] PUB.X = AA305B27F95FC35E7646DEBAEF251A96811D11B5364B5D2847812833B1C3E46BA7D97101C117DF1BE5B6416F2B8AD67A
5,362,484 UART: [art] PUB.Y = 8D0F93F4D02F18E92E90DD69A0559A2CA54C14F189E94DBA28249FBB742E1CA05F4851994A98783B0420798583E84459
5,369,424 UART: [art] SIG.R = E61DA7833DFFE2DA3835664BE1569EB38DFF83E902BEF1FEAB58D67A677FBCCAFDCBEA2831A2312A027B01C704DB1331
5,376,206 UART: [art] SIG.S = 44E9782AB05B5A7FE9D2ECD71449EA59AAD2D64FAAA45B4D9A198FADA73ECE7EDF851A9A5D0C9FDD54DEB7B5A232EC31
5,400,336 UART: mbox::rt_entry...
5,400,708 UART: ____ _ _ _ ____ _____
5,401,492 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,402,292 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,403,060 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,403,828 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,404,596 UART: |_|
5,404,908 UART:
5,683,974 UART: [rt] Runtime listening for mailbox commands...
5,685,164 >>> mbox cmd response data (48 bytes)
5,685,165 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,687,948 >>> mbox cmd response data (48 bytes)
5,687,949 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,700,887 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,964 UART: [kat] SHA2-256
891,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,550 UART: [kat] SHA2-512-ACC
906,451 UART: [kat] ECC-384
915,972 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,174,487 ready_for_fw is high
1,174,487 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,208,003 UART: [idev] --
1,208,960 UART: [ldev] ++
1,209,128 UART: [ldev] CDI.KEYID = 6
1,209,492 UART: [ldev] SUBJECT.KEYID = 5
1,209,919 UART: [ldev] AUTHORITY.KEYID = 7
1,210,382 UART: [ldev] FE.KEYID = 1
1,215,460 UART: [ldev] Erasing FE.KEYID = 1
1,242,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,352 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,341 UART: [fwproc] Recv command 0x46574c44
1,283,074 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,191 >>> mbox cmd response: success
2,771,224 UART: [afmc] ++
2,771,392 UART: [afmc] CDI.KEYID = 6
2,771,755 UART: [afmc] SUBJECT.KEYID = 7
2,772,181 UART: [afmc] AUTHORITY.KEYID = 5
2,807,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,333 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,062 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,945 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,585 UART: [afmc] --
2,850,503 UART: [cold-reset] --
2,851,431 UART: [state] Locking Datavault
2,852,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,180 UART: [state] Locking ICCM
2,853,640 UART: [exit] Launching FMC @ 0x40000130
2,858,969 UART:
2,858,985 UART: Running Caliptra FMC ...
2,859,393 UART:
2,859,447 UART: [state] CFI Enabled
2,869,818 UART: [fht] FMC Alias Private Key: 7
2,977,613 UART: [art] Extend RT PCRs Done
2,978,041 UART: [art] Lock RT PCRs Done
2,979,623 UART: [art] Populate DV Done
2,988,022 UART: [fht] FMC Alias Private Key: 7
2,989,016 UART: [art] Derive CDI
2,989,296 UART: [art] Store in in slot 0x4
3,074,761 UART: [art] Derive Key Pair
3,075,121 UART: [art] Store priv key in slot 0x5
3,087,925 UART: [art] Derive Key Pair - Done
3,102,699 UART: [art] Signing Cert with AUTHO
3,103,179 UART: RITY.KEYID = 7
3,118,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,282 UART: [art] PUB.X = 60F3034560F7F4B9211285F0B6E0CC3CF70C607C5422533B4C31688510A24F9A6537D7BB3E2DB8A4DB97D4B5C8BA986E
3,126,050 UART: [art] PUB.Y = 099373728A24A02E35829F4F073F9ADCA8FA35C3778DD2CA00042CBDF3F25EEEA7F18C2C22496F323DC78FAA304F039F
3,132,978 UART: [art] SIG.R = FA031CF781F63A5A27040C384D3A86CC0E742B4A924CFB700C8CF2D6EA16E4AF9947B8F909F4A558E36A8CC197985E05
3,139,737 UART: [art] SIG.S = 867E16DFE0652F834109EEB715470B51C191FF464BCC7FF7C76E1BBCAF886E0D9BAB296AD55B361796ECAFC31B317565
3,163,325 UART: Caliptra RT
3,163,578 UART: [state] CFI Enabled
3,270,942 UART: [rt] RT listening for mailbox commands...
3,271,612 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,022 UART: [rt]cmd =0x41545348, len=116
3,303,657 >>> mbox cmd response data (12 bytes)
3,303,658 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,363 UART:
3,304,379 UART: Running Caliptra ROM ...
3,304,787 UART:
3,304,842 UART: [state] CFI Enabled
3,307,346 UART: [state] LifecycleState = Unprovisioned
3,308,001 UART: [state] DebugLocked = No
3,308,709 UART: [state] WD Timer not started. Device not locked for debugging
3,310,067 UART: [kat] SHA2-256
4,113,617 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,117,746 UART: [kat] ++
4,117,898 UART: [kat] sha1
4,122,192 UART: [kat] SHA2-256
4,124,132 UART: [kat] SHA2-384
4,126,911 UART: [kat] SHA2-512-ACC
4,128,811 UART: [kat] ECC-384
4,138,296 UART: [kat] HMAC-384Kdf
4,142,832 UART: [kat] LMS
4,391,144 UART: [kat] --
4,391,812 UART: [update-reset] ++
5,293,253 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,294,376 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,390,500 >>> mbox cmd response: success
5,390,500 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,390,785 UART: [update-reset] Copying MAN_2 To MAN_1
5,398,799 UART: [update-reset Success] --
5,399,770 UART: [state] Locking Datavault
5,400,628 UART: [state] Locking PCR0, PCR1 and PCR31
5,401,232 UART: [state] Locking ICCM
5,401,660 UART: [exit] Launching FMC @ 0x40000130
5,406,989 UART:
5,407,005 UART: Running Caliptra FMC ...
5,407,413 UART:
5,407,467 UART: [state] CFI Enabled
5,496,380 UART: [art] Extend RT PCRs Done
5,496,808 UART: [art] Lock RT PCRs Done
5,498,047 UART: [art] Populate DV Done
5,505,946 UART: [fht] FMC Alias Private Key: 7
5,507,054 UART: [art] Derive CDI
5,507,334 UART: [art] Store in in slot 0x4
5,592,695 UART: [art] Derive Key Pair
5,593,055 UART: [art] Store priv key in slot 0x5
5,606,113 UART: [art] Derive Key Pair - Done
5,620,603 UART: [art] Signing Cert with AUTHO
5,621,083 UART: RITY.KEYID = 7
5,636,573 UART: [art] Erasing AUTHORITY.KEYID = 7
5,637,338 UART: [art] PUB.X = 72A21690364F59FF1860A2165FBA68C39EA83447213A6D0E0B17B56D318AEE6557E08F29B895D61B5AE406834E5A4450
5,644,095 UART: [art] PUB.Y = D4EA80ACEBF1B35C73B759A401976F3143576EA065ED17731E382028DEEA3BDDFC03E1BDA8C5585BA0A97EF6B6CFABDF
5,651,065 UART: [art] SIG.R = 79F12428C392961EB7730939492661D373A263842E022CA412A0ED9DC14E3C3E252C3AF23536A3F7E3CD71ADD831369E
5,657,825 UART: [art] SIG.S = 05F55C593BBDA3C66AD8417257D2B02B51A5A04012B89992D265C1C31B80FCA178AD42465C33E6E55156F397D13BCFA7
5,680,861 UART: mbox::rt_entry...
5,681,233 UART: ____ _ _ _ ____ _____
5,682,017 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,682,817 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,683,585 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,684,353 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,685,121 UART: |_|
5,685,433 UART:
5,963,875 UART: [rt] Runtime listening for mailbox commands...
5,965,065 >>> mbox cmd response data (48 bytes)
5,965,066 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,967,849 >>> mbox cmd response data (48 bytes)
5,967,850 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,980,788 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,632 ready_for_fw is high
1,055,632 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,619 >>> mbox cmd response: success
2,680,923 UART:
2,680,939 UART: Running Caliptra FMC ...
2,681,347 UART:
2,681,401 UART: [state] CFI Enabled
2,691,938 UART: [fht] FMC Alias Private Key: 7
2,799,739 UART: [art] Extend RT PCRs Done
2,800,167 UART: [art] Lock RT PCRs Done
2,801,761 UART: [art] Populate DV Done
2,810,242 UART: [fht] FMC Alias Private Key: 7
2,811,244 UART: [art] Derive CDI
2,811,524 UART: [art] Store in in slot 0x4
2,897,331 UART: [art] Derive Key Pair
2,897,691 UART: [art] Store priv key in slot 0x5
2,910,347 UART: [art] Derive Key Pair - Done
2,925,149 UART: [art] Signing Cert with AUTHO
2,925,629 UART: RITY.KEYID = 7
2,940,909 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,674 UART: [art] PUB.X = BD5AB845C1612A93B706B0C4B174CEA5DB60A282A57304974762AAA10555E91808407A2A84EA4BE4A87F29D2D08A32EA
2,948,438 UART: [art] PUB.Y = C051A3323581D5206F13D1A6C7362CB4BF9B56DD4D9DE286FB73BE95771235850F0A2AE67C34DA3031F57708A7D0C0DC
2,955,385 UART: [art] SIG.R = 3938D05D4A582C7F07E7E5B6F7FA4E33B03B17A5FFACEB509D589873F57970B389F50469B5A53ADA20A42A1E2CECFD95
2,962,163 UART: [art] SIG.S = 619F2967447BDCBBCB043D43CD3EF8FA90338ECDEF1ACB06264B339BBBB1517D0A4B4730C7984663CFB51C2354D38B8C
2,986,379 UART: Caliptra RT
2,986,632 UART: [state] CFI Enabled
3,094,221 UART: [rt] RT listening for mailbox commands...
3,094,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,621 UART: [rt]cmd =0x41545348, len=116
3,127,240 >>> mbox cmd response data (12 bytes)
3,127,241 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,095,204 >>> mbox cmd response: success
5,095,204 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,108,644 UART:
5,108,660 UART: Running Caliptra FMC ...
5,109,068 UART:
5,109,122 UART: [state] CFI Enabled
5,198,055 UART: [art] Extend RT PCRs Done
5,198,483 UART: [art] Lock RT PCRs Done
5,199,760 UART: [art] Populate DV Done
5,208,179 UART: [fht] FMC Alias Private Key: 7
5,209,295 UART: [art] Derive CDI
5,209,575 UART: [art] Store in in slot 0x4
5,295,294 UART: [art] Derive Key Pair
5,295,654 UART: [art] Store priv key in slot 0x5
5,309,070 UART: [art] Derive Key Pair - Done
5,324,065 UART: [art] Signing Cert with AUTHO
5,324,545 UART: RITY.KEYID = 7
5,340,133 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,898 UART: [art] PUB.X = 379CE5D5D45B99861D425CA1E7FD0806E4D25E5F5F1BEA2AED8B8A61D2B6282E3193E54D9FD544005AF93E49B70BAFD8
5,347,653 UART: [art] PUB.Y = 2148106B9B3F240B4FC2B6870393BA6D98E09F13D1B6ADFC65EC95480279CB96499880FE2036AE329720A784E1D8CCDD
5,354,598 UART: [art] SIG.R = C654BA9C515E1FC0917E75DBFBDC34196202BB964E7432AAF16E5635549E95ED54D37F7BE8D7E0DDEA499A73A0CD8C5D
5,361,383 UART: [art] SIG.S = 6641A3FF67453CF373FA9828B2D82115B958C37B93ADFEB5A5E7DE52D69DAE086AC58CA4BD66314C04DBDC5C393BC58A
5,385,112 UART: mbox::rt_entry...
5,385,484 UART: ____ _ _ _ ____ _____
5,386,268 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,387,068 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,387,836 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,388,604 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,389,372 UART: |_|
5,389,684 UART:
5,670,376 UART: [rt] Runtime listening for mailbox commands...
5,671,566 >>> mbox cmd response data (48 bytes)
5,671,567 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,674,350 >>> mbox cmd response data (48 bytes)
5,674,351 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,687,289 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
915,891 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,628 UART: [cold-reset] ++
1,170,160 UART: [fht] FHT @ 0x50003400
1,172,748 UART: [idev] ++
1,172,916 UART: [idev] CDI.KEYID = 6
1,173,277 UART: [idev] SUBJECT.KEYID = 7
1,173,702 UART: [idev] UDS.KEYID = 0
1,174,048 ready_for_fw is high
1,174,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,732 UART: [idev] Erasing UDS.KEYID = 0
1,198,392 UART: [idev] Sha1 KeyId Algorithm
1,207,246 UART: [idev] --
1,208,231 UART: [ldev] ++
1,208,399 UART: [ldev] CDI.KEYID = 6
1,208,763 UART: [ldev] SUBJECT.KEYID = 5
1,209,190 UART: [ldev] AUTHORITY.KEYID = 7
1,209,653 UART: [ldev] FE.KEYID = 1
1,214,941 UART: [ldev] Erasing FE.KEYID = 1
1,241,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,303 UART: [ldev] --
1,280,673 UART: [fwproc] Wait for Commands...
1,281,348 UART: [fwproc] Recv command 0x46574c44
1,282,081 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,254 >>> mbox cmd response: success
2,772,297 UART: [afmc] ++
2,772,465 UART: [afmc] CDI.KEYID = 6
2,772,828 UART: [afmc] SUBJECT.KEYID = 7
2,773,254 UART: [afmc] AUTHORITY.KEYID = 5
2,808,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,881 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,652 UART: [afmc] --
2,851,542 UART: [cold-reset] --
2,852,424 UART: [state] Locking Datavault
2,853,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,269 UART: [state] Locking ICCM
2,854,855 UART: [exit] Launching FMC @ 0x40000130
2,860,184 UART:
2,860,200 UART: Running Caliptra FMC ...
2,860,608 UART:
2,860,751 UART: [state] CFI Enabled
2,871,270 UART: [fht] FMC Alias Private Key: 7
2,979,185 UART: [art] Extend RT PCRs Done
2,979,613 UART: [art] Lock RT PCRs Done
2,981,323 UART: [art] Populate DV Done
2,989,616 UART: [fht] FMC Alias Private Key: 7
2,990,714 UART: [art] Derive CDI
2,990,994 UART: [art] Store in in slot 0x4
3,076,669 UART: [art] Derive Key Pair
3,077,029 UART: [art] Store priv key in slot 0x5
3,089,497 UART: [art] Derive Key Pair - Done
3,104,214 UART: [art] Signing Cert with AUTHO
3,104,694 UART: RITY.KEYID = 7
3,119,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,677 UART: [art] PUB.X = B1129B22FF065F5E9D1D51EADFEC973843E58626A7F4292D2D7D0B1D3622897B264910D4FF0E1F52C8471AAD23AAA0EE
3,127,450 UART: [art] PUB.Y = 75E7CB5D82D15FD755532BAEE7C80497F4FD8FD59546AD0C0396EE88FE8F4B43D6749AACF4B6880AB7E4E3231E93CC20
3,134,404 UART: [art] SIG.R = 3CEBB47A16933DE7A7F021B9B74BDD758F8E05F0052B9AEE74CF396DFFD6463F9895AB832D94A5AD399BD4E284CA09A5
3,141,183 UART: [art] SIG.S = 7DE9F13E4E262D7F59F8342BD881D41FBBE11909572A9E36E20321AED1E8C35BDE9CE383089E91A71832069A8CACD1B1
3,164,510 UART: Caliptra RT
3,164,855 UART: [state] CFI Enabled
3,272,934 UART: [rt] RT listening for mailbox commands...
3,273,604 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,932 UART: [rt]cmd =0x41545348, len=116
3,305,923 >>> mbox cmd response data (12 bytes)
3,305,924 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,683 UART:
3,306,699 UART: Running Caliptra ROM ...
3,307,107 UART:
3,307,249 UART: [state] CFI Enabled
3,310,037 UART: [state] LifecycleState = Unprovisioned
3,310,692 UART: [state] DebugLocked = No
3,311,280 UART: [state] WD Timer not started. Device not locked for debugging
3,312,590 UART: [kat] SHA2-256
4,116,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,269 UART: [kat] ++
4,120,421 UART: [kat] sha1
4,124,741 UART: [kat] SHA2-256
4,126,681 UART: [kat] SHA2-384
4,129,400 UART: [kat] SHA2-512-ACC
4,131,300 UART: [kat] ECC-384
4,141,363 UART: [kat] HMAC-384Kdf
4,146,145 UART: [kat] LMS
4,394,457 UART: [kat] --
4,395,437 UART: [update-reset] ++
5,296,544 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,297,587 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,393,711 >>> mbox cmd response: success
5,393,711 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,393,940 UART: [update-reset] Copying MAN_2 To MAN_1
5,401,954 UART: [update-reset Success] --
5,403,219 UART: [state] Locking Datavault
5,404,091 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,695 UART: [state] Locking ICCM
5,405,151 UART: [exit] Launching FMC @ 0x40000130
5,410,480 UART:
5,410,496 UART: Running Caliptra FMC ...
5,410,904 UART:
5,411,047 UART: [state] CFI Enabled
5,499,518 UART: [art] Extend RT PCRs Done
5,499,946 UART: [art] Lock RT PCRs Done
5,501,189 UART: [art] Populate DV Done
5,509,344 UART: [fht] FMC Alias Private Key: 7
5,510,272 UART: [art] Derive CDI
5,510,552 UART: [art] Store in in slot 0x4
5,596,245 UART: [art] Derive Key Pair
5,596,605 UART: [art] Store priv key in slot 0x5
5,610,113 UART: [art] Derive Key Pair - Done
5,624,703 UART: [art] Signing Cert with AUTHO
5,625,183 UART: RITY.KEYID = 7
5,640,381 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,146 UART: [art] PUB.X = 28D081FEB2995DD2FC5BF75F52237FF3B8F0488EAA50980C77E910D793D5330403BEE7806C1D438E37FB5E2531E47D87
5,647,911 UART: [art] PUB.Y = 4706A29E3381A2C44B3B766A16357A7DA9700EE4A7A8867B4F9185B1BC50DF4CD9EAD16D2266C117603FB535C1FC5467
5,654,859 UART: [art] SIG.R = B20D6C21E0A76C5C6BE1E954CEB65DA805C0E161834F40C9F3BFBE29594311DC66E18021574052F0DE110F2BEB9A4904
5,661,625 UART: [art] SIG.S = A732360D4081FB7C7475959560EA281C915A7833ECFAB7CFC93AF3C9682CCA921E1DABBAD5871D2FE6828A5D243427A9
5,685,365 UART: mbox::rt_entry...
5,685,737 UART: ____ _ _ _ ____ _____
5,686,521 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,687,321 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,688,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,688,857 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,689,625 UART: |_|
5,689,937 UART:
5,969,870 UART: [rt] Runtime listening for mailbox commands...
5,971,060 >>> mbox cmd response data (48 bytes)
5,971,061 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,973,844 >>> mbox cmd response data (48 bytes)
5,973,845 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,986,783 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,175 ready_for_fw is high
1,056,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,634 >>> mbox cmd response: success
2,682,042 UART:
2,682,058 UART: Running Caliptra FMC ...
2,682,466 UART:
2,682,609 UART: [state] CFI Enabled
2,693,334 UART: [fht] FMC Alias Private Key: 7
2,801,455 UART: [art] Extend RT PCRs Done
2,801,883 UART: [art] Lock RT PCRs Done
2,803,669 UART: [art] Populate DV Done
2,811,900 UART: [fht] FMC Alias Private Key: 7
2,812,920 UART: [art] Derive CDI
2,813,200 UART: [art] Store in in slot 0x4
2,898,833 UART: [art] Derive Key Pair
2,899,193 UART: [art] Store priv key in slot 0x5
2,912,041 UART: [art] Derive Key Pair - Done
2,927,033 UART: [art] Signing Cert with AUTHO
2,927,513 UART: RITY.KEYID = 7
2,942,615 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,380 UART: [art] PUB.X = 4DD87CCCF1AA7963FD06B75FEFF5B04055A41361D80E63EEFB7DCFA38CB5122C1CDF382ECC1B3E5B6700517563B77811
2,950,140 UART: [art] PUB.Y = 77B2162147100915DE94FBBFE9D5DAEC2E81CD4476C6538456A5F11D7702C0B2E8A056619277EEB3F5C444BDCB14975C
2,957,090 UART: [art] SIG.R = EBD61A862812757F752AB2BDEF698328046B07E3B0B90A6C1F0D2AF713E8D9C08F3C0B91E967E958A803C0715186B34D
2,963,846 UART: [art] SIG.S = D17BAF3C114C402338BCD51FCD1970D54FFB5B2F4A53B73E8F351E83824EF9F78F11EBD74A23D2F32B1796B7C1BDDC83
2,987,351 UART: Caliptra RT
2,987,696 UART: [state] CFI Enabled
3,094,932 UART: [rt] RT listening for mailbox commands...
3,095,602 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,796 UART: [rt]cmd =0x41545348, len=116
3,127,665 >>> mbox cmd response data (12 bytes)
3,127,666 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,098,450 >>> mbox cmd response: success
5,098,450 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,111,804 UART:
5,111,820 UART: Running Caliptra FMC ...
5,112,228 UART:
5,112,371 UART: [state] CFI Enabled
5,201,596 UART: [art] Extend RT PCRs Done
5,202,024 UART: [art] Lock RT PCRs Done
5,203,175 UART: [art] Populate DV Done
5,211,174 UART: [fht] FMC Alias Private Key: 7
5,212,212 UART: [art] Derive CDI
5,212,492 UART: [art] Store in in slot 0x4
5,297,763 UART: [art] Derive Key Pair
5,298,123 UART: [art] Store priv key in slot 0x5
5,311,723 UART: [art] Derive Key Pair - Done
5,326,197 UART: [art] Signing Cert with AUTHO
5,326,677 UART: RITY.KEYID = 7
5,342,173 UART: [art] Erasing AUTHORITY.KEYID = 7
5,342,938 UART: [art] PUB.X = 7694C7F08D2CD2E0A2EA75E39C7B596F16F75F437FA379E910D90B8909620E8959CC975F271973C1166C0100A2345B1F
5,349,670 UART: [art] PUB.Y = 9A7DB33E631D67ED8D5BFE407647FD9EC46D3771C934471AFB6F2ABE4AB1C63F54F5A6DB5278B972EA70B468E5395D32
5,356,634 UART: [art] SIG.R = ECC9E6605B93476DF933CB96BA6B104F45281D8D45F4CE261CC32FBFE84E37F474F13EC3807494663866633EEF9AAE67
5,363,412 UART: [art] SIG.S = 3C31E85F8BA7D65A5CB5E94C84B8ECA95515B5B74A7E9310B84E6CC3FCE4CAF8E972F8A682494112477137CCCC1F31AB
5,387,675 UART: mbox::rt_entry...
5,388,047 UART: ____ _ _ _ ____ _____
5,388,831 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,389,631 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,390,399 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,391,167 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,391,935 UART: |_|
5,392,247 UART:
5,671,423 UART: [rt] Runtime listening for mailbox commands...
5,672,613 >>> mbox cmd response data (48 bytes)
5,672,614 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,675,397 >>> mbox cmd response data (48 bytes)
5,675,398 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,688,336 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
192,041 UART:
192,428 UART: Running Caliptra ROM ...
193,621 UART:
193,775 UART: [state] CFI Enabled
263,942 UART: [state] LifecycleState = Unprovisioned
265,856 UART: [state] DebugLocked = No
268,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,308 UART: [kat] SHA2-256
444,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,481 UART: [kat] ++
455,001 UART: [kat] sha1
466,248 UART: [kat] SHA2-256
468,895 UART: [kat] SHA2-384
475,371 UART: [kat] SHA2-512-ACC
477,736 UART: [kat] ECC-384
2,767,824 UART: [kat] HMAC-384Kdf
2,801,251 UART: [kat] LMS
3,991,533 UART: [kat] --
3,995,102 UART: [cold-reset] ++
3,996,461 UART: [fht] Storing FHT @ 0x50003400
4,007,932 UART: [idev] ++
4,008,494 UART: [idev] CDI.KEYID = 6
4,009,524 UART: [idev] SUBJECT.KEYID = 7
4,010,695 UART: [idev] UDS.KEYID = 0
4,011,692 ready_for_fw is high
4,011,905 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,387 UART: [idev] Erasing UDS.KEYID = 0
7,348,768 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,928 UART: [idev] --
7,376,129 UART: [ldev] ++
7,376,686 UART: [ldev] CDI.KEYID = 6
7,377,611 UART: [ldev] SUBJECT.KEYID = 5
7,378,865 UART: [ldev] AUTHORITY.KEYID = 7
7,380,139 UART: [ldev] FE.KEYID = 1
7,421,409 UART: [ldev] Erasing FE.KEYID = 1
10,756,052 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,678 UART: [ldev] --
13,137,041 UART: [fwproc] Waiting for Commands...
13,139,449 UART: [fwproc] Received command 0x46574c44
13,141,695 UART: [fwproc] Received Image of size 113844 bytes
17,191,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,760 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,333,610 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,650,147 >>> mbox cmd response: success
17,655,145 UART: [afmc] ++
17,655,756 UART: [afmc] CDI.KEYID = 6
17,656,645 UART: [afmc] SUBJECT.KEYID = 7
17,657,915 UART: [afmc] AUTHORITY.KEYID = 5
21,028,707 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,879 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,137 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,560 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,387 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,822 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,798 UART: [afmc] --
23,398,863 UART: [cold-reset] --
23,402,235 UART: [state] Locking Datavault
23,409,361 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,064 UART: [state] Locking ICCM
23,412,428 UART: [exit] Launching FMC @ 0x40000130
23,420,840 UART:
23,421,073 UART: Running Caliptra FMC ...
23,422,169 UART:
23,422,320 UART: [state] CFI Enabled
23,487,970 UART: [fht] FMC Alias Private Key: 7
25,826,343 UART: [art] Extend RT PCRs Done
25,827,558 UART: [art] Lock RT PCRs Done
25,829,424 UART: [art] Populate DV Done
25,834,826 UART: [fht] FMC Alias Private Key: 7
25,836,307 UART: [art] Derive CDI
25,837,039 UART: [art] Store in in slot 0x4
25,897,604 UART: [art] Derive Key Pair
25,898,654 UART: [art] Store priv key in slot 0x5
29,191,722 UART: [art] Derive Key Pair - Done
29,204,556 UART: [art] Signing Cert with AUTHO
29,205,863 UART: RITY.KEYID = 7
31,485,900 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,400 UART: [art] PUB.X = 2AA25D3F528E94BDE09FF4B8CA149CDF38DE79A6638DFA3F0C216AF9A752A46F5876FB701492431BBEB723CC10CE2D36
31,494,696 UART: [art] PUB.Y = 8E4060D5D34A7C19F43448BB89267EEAF41D3E15B6B9E65B92FFEE2DE5BA667E1CD5656E6F0F261E76617953A360B31A
31,501,903 UART: [art] SIG.R = 584E4029D8725740E2824B3E03E6AB5C2F177657D0171C36B17422BD53532E1C15E9082969693D9C996E9F5C2634A452
31,509,263 UART: [art] SIG.S = 77C53D27467DB117EAB3045125208C54BBAE31F601972DE65AD1FFFF272F96750ABEB3FFEBA40165CE9F5C7B2B5584F0
32,815,002 UART: Caliptra RT
32,815,703 UART: [state] CFI Enabled
32,996,791 UART: [rt] RT listening for mailbox commands...
37,030,146 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,185,900 UART: [rt]cmd =0x41544d4e, len=14344
42,485,691 >>> mbox cmd response data (8 bytes)
42,486,306 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,517,157 UART: [rt]cmd =0x41545348, len=116
42,519,410 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,781,105 ready_for_fw is high
3,781,545 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,843,381 >>> mbox cmd response: success
23,543,786 UART:
23,544,173 UART: Running Caliptra FMC ...
23,545,300 UART:
23,545,452 UART: [state] CFI Enabled
23,612,517 UART: [fht] FMC Alias Private Key: 7
25,950,415 UART: [art] Extend RT PCRs Done
25,951,753 UART: [art] Lock RT PCRs Done
25,953,231 UART: [art] Populate DV Done
25,958,471 UART: [fht] FMC Alias Private Key: 7
25,960,114 UART: [art] Derive CDI
25,960,921 UART: [art] Store in in slot 0x4
26,020,707 UART: [art] Derive Key Pair
26,021,700 UART: [art] Store priv key in slot 0x5
29,314,222 UART: [art] Derive Key Pair - Done
29,327,295 UART: [art] Signing Cert with AUTHO
29,328,660 UART: RITY.KEYID = 7
31,615,039 UART: [art] Erasing AUTHORITY.KEYID = 7
31,616,549 UART: [art] PUB.X = D59E5BC9ECE7ED5BD0A8CFB7A0B008345C02B92BC74BDC6EE4E23B68C3083B28C2A3332812F81646B2D0C8BC9DD71388
31,623,811 UART: [art] PUB.Y = 29D6011D2FC805E6CB57C7805EDD821B5ADDE18847E955335E10BF6AFF7A4EB4AFA436756C3B5C99707FAD244ACC93E9
31,631,195 UART: [art] SIG.R = 61C9EBC574B8B010D59ACBA0494DE5641DA82264D8A4B6C80C307BB7BCFFB57A891641EEA12B7ADA3C726A4EA95747B0
31,638,456 UART: [art] SIG.S = C4A273EFC65A5DDAC3F7E9E35F86152975DDF02AEFF4FB07B81192B11E33C297A2FA400988F7C57A47AC8CFA3DF585B1
32,943,953 UART: Caliptra RT
32,944,677 UART: [state] CFI Enabled
33,104,627 UART: [rt] RT listening for mailbox commands...
37,131,395 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,287,042 UART: [rt]cmd =0x41544d4e, len=14344
42,587,791 >>> mbox cmd response data (8 bytes)
42,588,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,619,166 UART: [rt]cmd =0x41545348, len=116
42,621,395 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,338 UART:
192,706 UART: Running Caliptra ROM ...
193,854 UART:
603,683 UART: [state] CFI Enabled
615,724 UART: [state] LifecycleState = Unprovisioned
617,666 UART: [state] DebugLocked = No
619,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,770 UART: [kat] SHA2-256
794,495 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,105 UART: [kat] ++
805,581 UART: [kat] sha1
815,378 UART: [kat] SHA2-256
818,120 UART: [kat] SHA2-384
822,697 UART: [kat] SHA2-512-ACC
825,064 UART: [kat] ECC-384
3,109,640 UART: [kat] HMAC-384Kdf
3,120,755 UART: [kat] LMS
4,310,839 UART: [kat] --
4,314,430 UART: [cold-reset] ++
4,315,656 UART: [fht] Storing FHT @ 0x50003400
4,327,717 UART: [idev] ++
4,328,341 UART: [idev] CDI.KEYID = 6
4,329,273 UART: [idev] SUBJECT.KEYID = 7
4,330,455 UART: [idev] UDS.KEYID = 0
4,331,529 ready_for_fw is high
4,331,744 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,474,663 UART: [idev] Erasing UDS.KEYID = 0
7,623,078 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,864 UART: [idev] --
7,647,051 UART: [ldev] ++
7,647,627 UART: [ldev] CDI.KEYID = 6
7,648,590 UART: [ldev] SUBJECT.KEYID = 5
7,649,805 UART: [ldev] AUTHORITY.KEYID = 7
7,651,090 UART: [ldev] FE.KEYID = 1
7,661,972 UART: [ldev] Erasing FE.KEYID = 1
10,952,629 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,663 UART: [ldev] --
13,313,735 UART: [fwproc] Waiting for Commands...
13,315,508 UART: [fwproc] Received command 0x46574c44
13,317,694 UART: [fwproc] Received Image of size 113844 bytes
17,365,755 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,416 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,823,995 >>> mbox cmd response: success
17,828,889 UART: [afmc] ++
17,829,484 UART: [afmc] CDI.KEYID = 6
17,830,419 UART: [afmc] SUBJECT.KEYID = 7
17,831,642 UART: [afmc] AUTHORITY.KEYID = 5
21,143,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,118 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,518 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,377 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,784 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,345 UART: [afmc] --
23,508,531 UART: [cold-reset] --
23,511,201 UART: [state] Locking Datavault
23,517,087 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,843 UART: [state] Locking ICCM
23,520,859 UART: [exit] Launching FMC @ 0x40000130
23,529,267 UART:
23,529,556 UART: Running Caliptra FMC ...
23,530,689 UART:
23,530,859 UART: [state] CFI Enabled
23,538,587 UART: [fht] FMC Alias Private Key: 7
25,870,163 UART: [art] Extend RT PCRs Done
25,871,378 UART: [art] Lock RT PCRs Done
25,873,353 UART: [art] Populate DV Done
25,878,978 UART: [fht] FMC Alias Private Key: 7
25,880,462 UART: [art] Derive CDI
25,881,198 UART: [art] Store in in slot 0x4
25,923,842 UART: [art] Derive Key Pair
25,924,845 UART: [art] Store priv key in slot 0x5
29,166,798 UART: [art] Derive Key Pair - Done
29,179,793 UART: [art] Signing Cert with AUTHO
29,181,098 UART: RITY.KEYID = 7
31,460,695 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,207 UART: [art] PUB.X = 78857F84CDE2AA2C9A417E4124B0527BC380F5A53B7E6EAEEEC10537EA1923B7790B4FB842722326CC3F4378215885BD
31,469,433 UART: [art] PUB.Y = 6ECD751F99C952A3200D64C57F202D3A061E5FCA4262722D71307843CD34BA7414A3E32F0291054D541DCAB3CCAA6B93
31,476,690 UART: [art] SIG.R = A684E455FB718D681A73DC5B4D9FC4E56A25476F4214A22DDFF3545734960DA6C5B629C3A1EA61055193A8A33F5D9F81
31,484,041 UART: [art] SIG.S = D47237272D3D6ADE7FD11BEC40DB5312F0EE185F229D637DE13F284E9A099606FA4361228287ECD9CCF1ACAC64CD812A
32,789,837 UART: Caliptra RT
32,790,540 UART: [state] CFI Enabled
32,909,177 UART: [rt] RT listening for mailbox commands...
37,086,733 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,242,058 UART: [rt]cmd =0x41544d4e, len=14344
42,542,668 >>> mbox cmd response data (8 bytes)
42,543,240 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,573,884 UART: [rt]cmd =0x41545348, len=116
42,576,015 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
4,128,086 ready_for_fw is high
4,128,647 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,350 >>> mbox cmd response: success
23,706,370 UART:
23,706,784 UART: Running Caliptra FMC ...
23,707,931 UART:
23,708,096 UART: [state] CFI Enabled
23,716,095 UART: [fht] FMC Alias Private Key: 7
26,045,737 UART: [art] Extend RT PCRs Done
26,046,970 UART: [art] Lock RT PCRs Done
26,048,721 UART: [art] Populate DV Done
26,054,298 UART: [fht] FMC Alias Private Key: 7
26,055,948 UART: [art] Derive CDI
26,056,770 UART: [art] Store in in slot 0x4
26,099,652 UART: [art] Derive Key Pair
26,100,699 UART: [art] Store priv key in slot 0x5
29,342,727 UART: [art] Derive Key Pair - Done
29,355,828 UART: [art] Signing Cert with AUTHO
29,357,168 UART: RITY.KEYID = 7
31,636,558 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,070 UART: [art] PUB.X = 145F48B5F7DC20CA21FB1B83346E3F646B122A252BCFA6DE335BC6F32F51F507F9C971AD2BE35727AE09A9AAAB1B05EC
31,645,343 UART: [art] PUB.Y = 30A71330C8736A1569386B2F096B3112EEA2B4FB007D148A2ADBFA3F3C15A0FB26054098FD3DDB6A9719190664D09416
31,652,540 UART: [art] SIG.R = 90895D30BB7E4412D8530F0AEAFB141F7FA09725D479D9BE3B83FA116C5A6BD85E98706C529E03D21AFBB095AE359A0D
31,659,937 UART: [art] SIG.S = 3CE7EFC4430C118891E14C449923243133006841B094A4B3BDB5C17D9865CE5A1C4FACCDBCEB56C98A4FB3BA385AB8ED
32,965,029 UART: Caliptra RT
32,965,734 UART: [state] CFI Enabled
33,083,178 UART: [rt] RT listening for mailbox commands...
37,252,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,408,451 UART: [rt]cmd =0x41544d4e, len=14344
42,709,186 >>> mbox cmd response data (8 bytes)
42,709,761 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,740,560 UART: [rt]cmd =0x41545348, len=116
42,742,501 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,024 UART:
192,400 UART: Running Caliptra ROM ...
193,595 UART:
193,747 UART: [state] CFI Enabled
264,042 UART: [state] LifecycleState = Unprovisioned
265,990 UART: [state] DebugLocked = No
267,241 UART: [state] WD Timer not started. Device not locked for debugging
270,713 UART: [kat] SHA2-256
449,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,370 UART: [kat] ++
461,903 UART: [kat] sha1
474,484 UART: [kat] SHA2-256
477,492 UART: [kat] SHA2-384
482,201 UART: [kat] SHA2-512-ACC
485,162 UART: [kat] ECC-384
2,949,813 UART: [kat] HMAC-384Kdf
2,972,735 UART: [kat] LMS
3,502,190 UART: [kat] --
3,507,626 UART: [cold-reset] ++
3,508,925 UART: [fht] FHT @ 0x50003400
3,521,185 UART: [idev] ++
3,521,767 UART: [idev] CDI.KEYID = 6
3,522,683 UART: [idev] SUBJECT.KEYID = 7
3,524,110 UART: [idev] UDS.KEYID = 0
3,525,067 ready_for_fw is high
3,525,269 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,705 UART: [idev] Erasing UDS.KEYID = 0
6,025,909 UART: [idev] Sha1 KeyId Algorithm
6,049,520 UART: [idev] --
6,053,573 UART: [ldev] ++
6,054,146 UART: [ldev] CDI.KEYID = 6
6,055,058 UART: [ldev] SUBJECT.KEYID = 5
6,056,275 UART: [ldev] AUTHORITY.KEYID = 7
6,057,509 UART: [ldev] FE.KEYID = 1
6,101,160 UART: [ldev] Erasing FE.KEYID = 1
8,603,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,592 UART: [ldev] --
10,417,710 UART: [fwproc] Wait for Commands...
10,420,293 UART: [fwproc] Recv command 0x46574c44
10,422,385 UART: [fwproc] Recv'd Img size: 114168 bytes
13,831,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,287,705 >>> mbox cmd response: success
14,292,589 UART: [afmc] ++
14,293,183 UART: [afmc] CDI.KEYID = 6
14,294,099 UART: [afmc] SUBJECT.KEYID = 7
14,295,269 UART: [afmc] AUTHORITY.KEYID = 5
16,830,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,568 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,352 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,370 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,885 UART: [afmc] --
18,627,800 UART: [cold-reset] --
18,630,363 UART: [state] Locking Datavault
18,634,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,394 UART: [state] Locking ICCM
18,638,492 UART: [exit] Launching FMC @ 0x40000130
18,646,906 UART:
18,647,179 UART: Running Caliptra FMC ...
18,648,292 UART:
18,648,453 UART: [state] CFI Enabled
18,710,223 UART: [fht] FMC Alias Private Key: 7
20,474,206 UART: [art] Extend RT PCRs Done
20,475,432 UART: [art] Lock RT PCRs Done
20,477,521 UART: [art] Populate DV Done
20,483,095 UART: [fht] FMC Alias Private Key: 7
20,484,737 UART: [art] Derive CDI
20,485,512 UART: [art] Store in in slot 0x4
20,543,474 UART: [art] Derive Key Pair
20,544,476 UART: [art] Store priv key in slot 0x5
23,007,504 UART: [art] Derive Key Pair - Done
23,020,563 UART: [art] Signing Cert with AUTHO
23,021,875 UART: RITY.KEYID = 7
24,732,925 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,434 UART: [art] PUB.X = 577CFF8A6C94A13BBD97A3B87B7797FF30B27AB08F1368B891D3F62197D16B3A36D134C0BA130376AFFA203CFD975C3F
24,741,742 UART: [art] PUB.Y = 0A82DA77C7DEBD2284A78EAED2A6D21E35B82DD16C21C62A49AB0A05713DA389D6771A20A0A9E36C7DFC2B009AE885D6
24,748,986 UART: [art] SIG.R = 421B8C5FB9B5446511D8A69770F04BC91F745D099FE8F994FED2E0D67EEFD35E616FD04E9D8E0D6654227DBC6433A23B
24,756,367 UART: [art] SIG.S = 1B741D31C7F0AFE1011AC7A4B87F4943F3F6400CBDA2FB11CC444650F5FD647A659746B20DFE0350C9469F6922EFDA7C
25,735,200 UART: Caliptra RT
25,735,906 UART: [state] CFI Enabled
25,902,543 UART: [rt] RT listening for mailbox commands...
29,930,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,086,514 UART: [rt]cmd =0x41544d4e, len=14344
34,082,719 >>> mbox cmd response data (8 bytes)
34,083,313 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,113,788 UART: [rt]cmd =0x41545348, len=116
34,115,971 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
3,381,009 ready_for_fw is high
3,381,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,071,145 >>> mbox cmd response: success
18,366,112 UART:
18,366,512 UART: Running Caliptra FMC ...
18,367,813 UART:
18,367,974 UART: [state] CFI Enabled
18,425,511 UART: [fht] FMC Alias Private Key: 7
20,189,135 UART: [art] Extend RT PCRs Done
20,190,361 UART: [art] Lock RT PCRs Done
20,191,848 UART: [art] Populate DV Done
20,197,424 UART: [fht] FMC Alias Private Key: 7
20,199,133 UART: [art] Derive CDI
20,199,954 UART: [art] Store in in slot 0x4
20,257,271 UART: [art] Derive Key Pair
20,258,311 UART: [art] Store priv key in slot 0x5
22,721,226 UART: [art] Derive Key Pair - Done
22,734,181 UART: [art] Signing Cert with AUTHO
22,735,516 UART: RITY.KEYID = 7
24,446,685 UART: [art] Erasing AUTHORITY.KEYID = 7
24,448,317 UART: [art] PUB.X = 92DC0CFB3038E0FE18C497816C4290AF3863996BB4A6CD4964DF47E7BEF162E7A14A00CABD5FE79123F0FF8E5DE807F0
24,455,456 UART: [art] PUB.Y = CE2F95DA950BEEC23302FB0794D527A6FBBB42C3CD2E4EB643A39BCA6B902AAC9B1C2C5701DA3628D362CFD7F5C7505E
24,462,762 UART: [art] SIG.R = B8B53AE3702B7A7D233CAAA9EECA76A3216BAFBBEEDD0A7C590AB9F6C8BA89E8288347A9E3DC10D51321D51EF81F4044
24,470,146 UART: [art] SIG.S = AF6CFCD17ADF96A2D55A005839B0F343D95382E244AD9A8FB25640CE99A7F3753F522381D56A50A15F7A75B3FB6B7D44
25,448,660 UART: Caliptra RT
25,449,377 UART: [state] CFI Enabled
25,613,891 UART: [rt] RT listening for mailbox commands...
29,638,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,794,174 UART: [rt]cmd =0x41544d4e, len=14344
33,789,664 >>> mbox cmd response data (8 bytes)
33,790,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,821,179 UART: [rt]cmd =0x41545348, len=116
33,823,095 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,809 writing to cptra_bootfsm_go
192,887 UART:
193,297 UART: Running Caliptra ROM ...
194,396 UART:
604,180 UART: [state] CFI Enabled
618,139 UART: [state] LifecycleState = Unprovisioned
620,014 UART: [state] DebugLocked = No
621,268 UART: [state] WD Timer not started. Device not locked for debugging
624,311 UART: [kat] SHA2-256
803,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,989 UART: [kat] ++
815,519 UART: [kat] sha1
827,748 UART: [kat] SHA2-256
830,762 UART: [kat] SHA2-384
836,675 UART: [kat] SHA2-512-ACC
839,606 UART: [kat] ECC-384
3,282,761 UART: [kat] HMAC-384Kdf
3,294,517 UART: [kat] LMS
3,824,047 UART: [kat] --
3,829,181 UART: [cold-reset] ++
3,830,966 UART: [fht] FHT @ 0x50003400
3,843,081 UART: [idev] ++
3,843,646 UART: [idev] CDI.KEYID = 6
3,844,554 UART: [idev] SUBJECT.KEYID = 7
3,845,726 UART: [idev] UDS.KEYID = 0
3,846,650 ready_for_fw is high
3,846,847 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,225 UART: [idev] Erasing UDS.KEYID = 0
6,317,469 UART: [idev] Sha1 KeyId Algorithm
6,340,314 UART: [idev] --
6,344,665 UART: [ldev] ++
6,345,239 UART: [ldev] CDI.KEYID = 6
6,346,163 UART: [ldev] SUBJECT.KEYID = 5
6,347,320 UART: [ldev] AUTHORITY.KEYID = 7
6,348,616 UART: [ldev] FE.KEYID = 1
6,358,288 UART: [ldev] Erasing FE.KEYID = 1
8,832,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,623 UART: [ldev] --
10,623,477 UART: [fwproc] Wait for Commands...
10,625,137 UART: [fwproc] Recv command 0x46574c44
10,627,230 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,170 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,871 >>> mbox cmd response: success
14,485,390 UART: [afmc] ++
14,486,000 UART: [afmc] CDI.KEYID = 6
14,486,921 UART: [afmc] SUBJECT.KEYID = 7
14,488,082 UART: [afmc] AUTHORITY.KEYID = 5
16,986,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,489 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,360 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,705 UART: [afmc] --
18,783,407 UART: [cold-reset] --
18,787,373 UART: [state] Locking Datavault
18,792,776 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,428 UART: [state] Locking ICCM
18,796,471 UART: [exit] Launching FMC @ 0x40000130
18,804,863 UART:
18,805,118 UART: Running Caliptra FMC ...
18,806,223 UART:
18,806,382 UART: [state] CFI Enabled
18,814,342 UART: [fht] FMC Alias Private Key: 7
20,571,133 UART: [art] Extend RT PCRs Done
20,572,354 UART: [art] Lock RT PCRs Done
20,574,439 UART: [art] Populate DV Done
20,580,211 UART: [fht] FMC Alias Private Key: 7
20,581,870 UART: [art] Derive CDI
20,582,685 UART: [art] Store in in slot 0x4
20,625,276 UART: [art] Derive Key Pair
20,626,275 UART: [art] Store priv key in slot 0x5
23,053,032 UART: [art] Derive Key Pair - Done
23,065,894 UART: [art] Signing Cert with AUTHO
23,067,198 UART: RITY.KEYID = 7
24,772,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,516 UART: [art] PUB.X = 77F6CCC66458C2D36A2A600B54C48015FB59DA4514C29A94D7E6BB1EABF73C1ED4755E7AAAEC46EAB501D4D6C2707BC1
24,781,768 UART: [art] PUB.Y = 2B8C406CFD3F529B914CA63CC779D20C8ED3D506E29980BB7B795371F395C5067B27F4E976F15B5ECAC191A5C24DAA77
24,789,065 UART: [art] SIG.R = D4928A843D4B3B078B4432C2B765BAB4F40B1D28117C055FB336A35B9C8685F1C2AD5417E011E8AE2E7F683F94A70E07
24,796,461 UART: [art] SIG.S = FE64AB66C162B8C5B20D199A5D5D4C8F2A00629DD4260AE2852DAE38F9DD3426C2BE6251E784F89086896BD9C4B0A288
25,775,659 UART: Caliptra RT
25,776,374 UART: [state] CFI Enabled
25,893,322 UART: [rt] RT listening for mailbox commands...
29,919,297 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,074,903 UART: [rt]cmd =0x41544d4e, len=14344
34,070,426 >>> mbox cmd response data (8 bytes)
34,071,014 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,101,825 UART: [rt]cmd =0x41545348, len=116
34,103,898 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,801 writing to cptra_bootfsm_go
3,692,158 ready_for_fw is high
3,692,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,264,012 >>> mbox cmd response: success
18,517,323 UART:
18,517,728 UART: Running Caliptra FMC ...
18,518,915 UART:
18,519,086 UART: [state] CFI Enabled
18,526,828 UART: [fht] FMC Alias Private Key: 7
20,284,348 UART: [art] Extend RT PCRs Done
20,285,577 UART: [art] Lock RT PCRs Done
20,287,070 UART: [art] Populate DV Done
20,292,675 UART: [fht] FMC Alias Private Key: 7
20,294,330 UART: [art] Derive CDI
20,295,148 UART: [art] Store in in slot 0x4
20,337,902 UART: [art] Derive Key Pair
20,338,902 UART: [art] Store priv key in slot 0x5
22,765,031 UART: [art] Derive Key Pair - Done
22,778,463 UART: [art] Signing Cert with AUTHO
22,779,763 UART: RITY.KEYID = 7
24,485,036 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,545 UART: [art] PUB.X = 1267C5800430BA4AAACA88F3BEACF4C8CB3CBADEF950084D0551529F59D91C87996C6FBF2CBB1AD7F594302D8224EEED
24,493,848 UART: [art] PUB.Y = 4078B6CDDFE37258E27A29F85A006F5F69C4EFA7EADE825FBACC406D7DCE0D3A0FAC22D6F8202A90B0E815F8C75352AC
24,501,116 UART: [art] SIG.R = 1CF90ECEDEB7865D915FF5AD5BDB909F613C835BDD1171448E8E5B846478BC209C4F0CBC7EF00F6CE1BB3A1BF7464399
24,508,557 UART: [art] SIG.S = D9E68C6EF22C27216AB9025D3F5D7B605811C9210BB3F025EA8753A8B134749352A6D5E19A177D043790A97E1FC1DD19
25,486,885 UART: Caliptra RT
25,487,601 UART: [state] CFI Enabled
25,604,723 UART: [rt] RT listening for mailbox commands...
29,627,729 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,783,195 UART: [rt]cmd =0x41544d4e, len=14344
33,778,349 >>> mbox cmd response data (8 bytes)
33,778,952 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,809,487 UART: [rt]cmd =0x41545348, len=116
33,811,564 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,096 UART:
192,471 UART: Running Caliptra ROM ...
193,667 UART:
193,826 UART: [state] CFI Enabled
263,521 UART: [state] LifecycleState = Unprovisioned
265,586 UART: [state] DebugLocked = No
266,906 UART: [state] WD Timer not started. Device not locked for debugging
271,164 UART: [kat] SHA2-256
461,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,876 UART: [kat] ++
472,325 UART: [kat] sha1
483,765 UART: [kat] SHA2-256
486,773 UART: [kat] SHA2-384
491,934 UART: [kat] SHA2-512-ACC
494,518 UART: [kat] ECC-384
2,950,138 UART: [kat] HMAC-384Kdf
2,974,091 UART: [kat] LMS
3,505,857 UART: [kat] --
3,511,366 UART: [cold-reset] ++
3,513,371 UART: [fht] FHT @ 0x50003400
3,524,772 UART: [idev] ++
3,525,483 UART: [idev] CDI.KEYID = 6
3,526,468 UART: [idev] SUBJECT.KEYID = 7
3,527,641 UART: [idev] UDS.KEYID = 0
3,528,570 ready_for_fw is high
3,528,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,364 UART: [idev] Erasing UDS.KEYID = 0
6,033,951 UART: [idev] Sha1 KeyId Algorithm
6,057,267 UART: [idev] --
6,062,252 UART: [ldev] ++
6,062,949 UART: [ldev] CDI.KEYID = 6
6,063,867 UART: [ldev] SUBJECT.KEYID = 5
6,065,032 UART: [ldev] AUTHORITY.KEYID = 7
6,066,268 UART: [ldev] FE.KEYID = 1
6,101,549 UART: [ldev] Erasing FE.KEYID = 1
8,609,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,334 UART: [ldev] --
10,408,298 UART: [fwproc] Wait for Commands...
10,410,769 UART: [fwproc] Recv command 0x46574c44
10,413,020 UART: [fwproc] Recv'd Img size: 114168 bytes
13,857,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,590,885 >>> mbox cmd response: success
14,594,723 UART: [afmc] ++
14,595,433 UART: [afmc] CDI.KEYID = 6
14,596,630 UART: [afmc] SUBJECT.KEYID = 7
14,598,083 UART: [afmc] AUTHORITY.KEYID = 5
17,122,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,848,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,850,341 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,865,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,880,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,895,687 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,919,417 UART: [afmc] --
18,922,159 UART: [cold-reset] --
18,925,274 UART: [state] Locking Datavault
18,932,231 UART: [state] Locking PCR0, PCR1 and PCR31
18,934,393 UART: [state] Locking ICCM
18,936,607 UART: [exit] Launching FMC @ 0x40000130
18,945,304 UART:
18,945,540 UART: Running Caliptra FMC ...
18,946,639 UART:
18,946,796 UART: [state] CFI Enabled
19,003,204 UART: [fht] FMC Alias Private Key: 7
20,767,485 UART: [art] Extend RT PCRs Done
20,768,716 UART: [art] Lock RT PCRs Done
20,770,455 UART: [art] Populate DV Done
20,775,922 UART: [fht] FMC Alias Private Key: 7
20,777,622 UART: [art] Derive CDI
20,778,439 UART: [art] Store in in slot 0x4
20,836,411 UART: [art] Derive Key Pair
20,837,449 UART: [art] Store priv key in slot 0x5
23,300,602 UART: [art] Derive Key Pair - Done
23,313,600 UART: [art] Signing Cert with AUTHO
23,314,902 UART: RITY.KEYID = 7
25,026,420 UART: [art] Erasing AUTHORITY.KEYID = 7
25,027,932 UART: [art] PUB.X = E477274AF419F96C8BB3E95A138C066DF6AF5B47B393CBB584F910BEE48174D3E3631F1C4B56F3841E9B1E7E91A0C164
25,035,205 UART: [art] PUB.Y = 92803A1C22CCED6331B0F095DB49F221D333EE820C902C2396C21657CF5F57420D649781D3F04B7D52A60151054126A2
25,042,414 UART: [art] SIG.R = B6B3A5CE191E068A2EC65F34118D5BE8D4DF8B9E4CD488273BC6907254A65EBEFDF688DC2412C3EC192DF96F5FD115EC
25,049,837 UART: [art] SIG.S = 7949AA597EE043293BAE31771FC91DC9D219BFF8F32A36759BF87B1A01C8DF9A206E947EEE0BD7AEB255DF240A22128D
26,028,835 UART: Caliptra RT
26,029,525 UART: [state] CFI Enabled
26,195,051 UART: [rt] RT listening for mailbox commands...
30,221,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,377,401 UART: [rt]cmd =0x41544d4e, len=14344
34,372,834 >>> mbox cmd response data (8 bytes)
34,373,434 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,404,325 UART: [rt]cmd =0x41545348, len=116
34,406,880 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,438,322 ready_for_fw is high
3,438,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,724,097 >>> mbox cmd response: success
19,000,054 UART:
19,000,465 UART: Running Caliptra FMC ...
19,001,580 UART:
19,001,744 UART: [state] CFI Enabled
19,071,542 UART: [fht] FMC Alias Private Key: 7
20,835,206 UART: [art] Extend RT PCRs Done
20,836,435 UART: [art] Lock RT PCRs Done
20,838,010 UART: [art] Populate DV Done
20,843,219 UART: [fht] FMC Alias Private Key: 7
20,844,870 UART: [art] Derive CDI
20,845,683 UART: [art] Store in in slot 0x4
20,904,071 UART: [art] Derive Key Pair
20,905,141 UART: [art] Store priv key in slot 0x5
23,368,103 UART: [art] Derive Key Pair - Done
23,381,103 UART: [art] Signing Cert with AUTHO
23,382,438 UART: RITY.KEYID = 7
25,094,213 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,719 UART: [art] PUB.X = BFF8EB81242B43174264B222C30F0104060A2B5108454CCD95C0B85BEFF75C3E4F2C42D4AE5519ED5027FB2153F8DA2F
25,103,011 UART: [art] PUB.Y = 83640B90AD5CB29F464A8FC90830068E46EC8195E833ED596BE6B20E17E4DD32D2C2116E85336E4CDA0A319176CD4405
25,110,285 UART: [art] SIG.R = C8C4CB6DBD618A43DBBD9D74E385C2901F482EA4FE561326F2F5DF2C677552109415CA1152A6151A673556D9B94EEC6E
25,117,677 UART: [art] SIG.S = D9D1F6507AF8E055844DEC0EAEAC94E74444D3DF5C8E049EBB687E7A1C9EB6B48349C26FBA23EFFDFA983652B79B1A8C
26,096,552 UART: Caliptra RT
26,097,245 UART: [state] CFI Enabled
26,261,809 UART: [rt] RT listening for mailbox commands...
30,287,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,443,216 UART: [rt]cmd =0x41544d4e, len=14344
34,438,908 >>> mbox cmd response data (8 bytes)
34,439,491 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,470,071 UART: [rt]cmd =0x41545348, len=116
34,472,355 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
192,820 UART:
193,173 UART: Running Caliptra ROM ...
194,303 UART:
604,090 UART: [state] CFI Enabled
616,113 UART: [state] LifecycleState = Unprovisioned
618,475 UART: [state] DebugLocked = No
620,569 UART: [state] WD Timer not started. Device not locked for debugging
625,875 UART: [kat] SHA2-256
815,700 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,495 UART: [kat] ++
827,109 UART: [kat] sha1
837,602 UART: [kat] SHA2-256
840,648 UART: [kat] SHA2-384
846,924 UART: [kat] SHA2-512-ACC
849,505 UART: [kat] ECC-384
3,292,285 UART: [kat] HMAC-384Kdf
3,305,578 UART: [kat] LMS
3,837,402 UART: [kat] --
3,842,057 UART: [cold-reset] ++
3,843,707 UART: [fht] FHT @ 0x50003400
3,854,262 UART: [idev] ++
3,854,896 UART: [idev] CDI.KEYID = 6
3,855,880 UART: [idev] SUBJECT.KEYID = 7
3,857,058 UART: [idev] UDS.KEYID = 0
3,857,995 ready_for_fw is high
3,858,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,626 UART: [idev] Erasing UDS.KEYID = 0
6,334,308 UART: [idev] Sha1 KeyId Algorithm
6,357,953 UART: [idev] --
6,363,485 UART: [ldev] ++
6,364,167 UART: [ldev] CDI.KEYID = 6
6,365,079 UART: [ldev] SUBJECT.KEYID = 5
6,366,237 UART: [ldev] AUTHORITY.KEYID = 7
6,367,470 UART: [ldev] FE.KEYID = 1
6,377,626 UART: [ldev] Erasing FE.KEYID = 1
8,859,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,228 UART: [ldev] --
10,651,038 UART: [fwproc] Wait for Commands...
10,653,053 UART: [fwproc] Recv command 0x46574c44
10,655,370 UART: [fwproc] Recv'd Img size: 114168 bytes
14,098,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,359 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,112 >>> mbox cmd response: success
14,836,877 UART: [afmc] ++
14,837,586 UART: [afmc] CDI.KEYID = 6
14,838,828 UART: [afmc] SUBJECT.KEYID = 7
14,840,261 UART: [afmc] AUTHORITY.KEYID = 5
17,347,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,180 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,170 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,112 UART: [afmc] --
19,144,902 UART: [cold-reset] --
19,149,200 UART: [state] Locking Datavault
19,152,056 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,263 UART: [state] Locking ICCM
19,155,713 UART: [exit] Launching FMC @ 0x40000130
19,164,385 UART:
19,164,626 UART: Running Caliptra FMC ...
19,165,729 UART:
19,165,890 UART: [state] CFI Enabled
19,173,988 UART: [fht] FMC Alias Private Key: 7
20,930,651 UART: [art] Extend RT PCRs Done
20,931,871 UART: [art] Lock RT PCRs Done
20,933,361 UART: [art] Populate DV Done
20,938,714 UART: [fht] FMC Alias Private Key: 7
20,940,304 UART: [art] Derive CDI
20,941,136 UART: [art] Store in in slot 0x4
20,983,732 UART: [art] Derive Key Pair
20,984,733 UART: [art] Store priv key in slot 0x5
23,411,239 UART: [art] Derive Key Pair - Done
23,424,123 UART: [art] Signing Cert with AUTHO
23,425,425 UART: RITY.KEYID = 7
25,131,033 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,545 UART: [art] PUB.X = 3447A45DEAD589F2309488D31DB3D7BBD9AAF042B74817B5A7C3E4769EA05191982B5B99DB253C0DE7FF506A2AF623B0
25,139,788 UART: [art] PUB.Y = 26BF0C2788E0DFF9B62E2A12DBEBFC810332E28537661211AA9F7668B6CC7B435BF5C4078FC808A7EAAC9FDB8F1CB265
25,147,066 UART: [art] SIG.R = 3290B275D2BAE893D8CC1E562457D68855B4DF7DADA9D166DC0F0C54FB6FF4E48E97A165B0D9338F64B2FE1FE667047D
25,154,547 UART: [art] SIG.S = ACB1EA220E5E821E63C40604B306709676D382B743356F9BA30A46F6563F7712827C27000DFB7AC8A30E2D72E1891A4D
26,133,571 UART: Caliptra RT
26,134,256 UART: [state] CFI Enabled
26,251,959 UART: [rt] RT listening for mailbox commands...
30,275,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,430,735 UART: [rt]cmd =0x41544d4e, len=14344
34,426,726 >>> mbox cmd response data (8 bytes)
34,427,305 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,458,053 UART: [rt]cmd =0x41545348, len=116
34,460,293 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
3,756,441 ready_for_fw is high
3,757,044 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,500 >>> mbox cmd response: success
19,209,817 UART:
19,210,203 UART: Running Caliptra FMC ...
19,211,341 UART:
19,211,506 UART: [state] CFI Enabled
19,219,021 UART: [fht] FMC Alias Private Key: 7
20,974,971 UART: [art] Extend RT PCRs Done
20,976,198 UART: [art] Lock RT PCRs Done
20,977,831 UART: [art] Populate DV Done
20,983,244 UART: [fht] FMC Alias Private Key: 7
20,984,886 UART: [art] Derive CDI
20,985,698 UART: [art] Store in in slot 0x4
21,028,117 UART: [art] Derive Key Pair
21,029,153 UART: [art] Store priv key in slot 0x5
23,455,452 UART: [art] Derive Key Pair - Done
23,468,355 UART: [art] Signing Cert with AUTHO
23,469,662 UART: RITY.KEYID = 7
25,175,011 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,532 UART: [art] PUB.X = 4F8206988433500A9AE10DA3B3252C976E1F9A7F51AC5D1B45AA34799F547318C16351D4CDB354A0F65F7FADB51ADF76
25,183,832 UART: [art] PUB.Y = 536144552147C121B93D8B668E8AC9882F09603987C3B9391751D56DD32A3A68F27643F699F0BEA436C79495318AA447
25,190,986 UART: [art] SIG.R = 65B03D1E125DB8F71F2F4ADA7F5AAC5278D38602EB669F641AD485860D91A4E76E69E217640A802552033E2658BED044
25,198,384 UART: [art] SIG.S = 753D902874C4006507B3D0A6590DE1C6BFA10721CFC724AFF68D392F099A31C3D5BE2BCB5E858674718524C90665F779
26,176,469 UART: Caliptra RT
26,177,178 UART: [state] CFI Enabled
26,294,664 UART: [rt] RT listening for mailbox commands...
30,323,335 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,478,885 UART: [rt]cmd =0x41544d4e, len=14344
34,474,181 >>> mbox cmd response data (8 bytes)
34,474,764 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,505,341 UART: [rt]cmd =0x41545348, len=116
34,507,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,245 UART: [kat] SHA2-256
882,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,291 UART: [kat] ++
886,443 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
902,988 UART: [kat] HMAC-384Kdf
907,404 UART: [kat] LMS
1,475,600 UART: [kat] --
1,476,239 UART: [cold-reset] ++
1,476,693 UART: [fht] Storing FHT @ 0x50003400
1,479,344 UART: [idev] ++
1,479,512 UART: [idev] CDI.KEYID = 6
1,479,872 UART: [idev] SUBJECT.KEYID = 7
1,480,296 UART: [idev] UDS.KEYID = 0
1,480,641 ready_for_fw is high
1,480,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,774 UART: [idev] Erasing UDS.KEYID = 0
1,505,738 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,382 UART: [idev] --
1,515,541 UART: [ldev] ++
1,515,709 UART: [ldev] CDI.KEYID = 6
1,516,072 UART: [ldev] SUBJECT.KEYID = 5
1,516,498 UART: [ldev] AUTHORITY.KEYID = 7
1,516,961 UART: [ldev] FE.KEYID = 1
1,521,945 UART: [ldev] Erasing FE.KEYID = 1
1,547,410 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,648 UART: [ldev] --
1,586,985 UART: [fwproc] Waiting for Commands...
1,587,816 UART: [fwproc] Received command 0x46574c44
1,588,607 UART: [fwproc] Received Image of size 114168 bytes
2,885,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,377 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,380 >>> mbox cmd response: success
3,078,606 UART: [afmc] ++
3,078,774 UART: [afmc] CDI.KEYID = 6
3,079,136 UART: [afmc] SUBJECT.KEYID = 7
3,079,561 UART: [afmc] AUTHORITY.KEYID = 5
3,115,076 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,582 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,362 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,975 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,665 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,472 UART: [afmc] --
3,158,430 UART: [cold-reset] --
3,159,026 UART: [state] Locking Datavault
3,160,339 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,943 UART: [state] Locking ICCM
3,161,397 UART: [exit] Launching FMC @ 0x40000130
3,166,726 UART:
3,166,742 UART: Running Caliptra FMC ...
3,167,150 UART:
3,167,204 UART: [state] CFI Enabled
3,177,597 UART: [fht] FMC Alias Private Key: 7
3,285,572 UART: [art] Extend RT PCRs Done
3,286,000 UART: [art] Lock RT PCRs Done
3,287,486 UART: [art] Populate DV Done
3,295,747 UART: [fht] FMC Alias Private Key: 7
3,296,833 UART: [art] Derive CDI
3,297,113 UART: [art] Store in in slot 0x4
3,382,756 UART: [art] Derive Key Pair
3,383,116 UART: [art] Store priv key in slot 0x5
3,396,160 UART: [art] Derive Key Pair - Done
3,410,804 UART: [art] Signing Cert with AUTHO
3,411,284 UART: RITY.KEYID = 7
3,426,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,449 UART: [art] PUB.X = B9949BC7798087862D7CF3B1747CDABFEFFD26BFDC1B43E341DF995712117381A1D1973FE68B45F8EF46485CABF5BDAB
3,434,237 UART: [art] PUB.Y = B0FE04CE8661AB3C6CBBC06CDE69B9C7BA56C4EDF52D296D4A6ED6EC4B362D4530D0ECEBAAC1254CB4D4079407A64D71
3,441,206 UART: [art] SIG.R = 0A647DC327A42BC7E2790B7BA522F6AEB4EF801DA583A004A2F507D27B8525E220C522AD4F59D7D78097C8237232A61A
3,447,968 UART: [art] SIG.S = AF31E74EF2C4DD8AEF27F1FE73E193C6CC09AE9B2A6888917ECA5BF374FDB350E5974F9690E7C5778F9A87589F9C899B
3,471,980 UART: Caliptra RT
3,472,233 UART: [state] CFI Enabled
3,580,544 UART: [rt] RT listening for mailbox commands...
3,581,214 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,288 UART: [rt]cmd =0x41544d4e, len=14344
4,014,029 >>> mbox cmd response data (8 bytes)
4,014,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,203 UART: [rt]cmd =0x41545348, len=116
4,045,885 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,185 ready_for_fw is high
1,363,185 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,354 >>> mbox cmd response: success
2,988,888 UART:
2,988,904 UART: Running Caliptra FMC ...
2,989,312 UART:
2,989,366 UART: [state] CFI Enabled
3,000,037 UART: [fht] FMC Alias Private Key: 7
3,107,874 UART: [art] Extend RT PCRs Done
3,108,302 UART: [art] Lock RT PCRs Done
3,109,674 UART: [art] Populate DV Done
3,118,045 UART: [fht] FMC Alias Private Key: 7
3,119,055 UART: [art] Derive CDI
3,119,335 UART: [art] Store in in slot 0x4
3,204,778 UART: [art] Derive Key Pair
3,205,138 UART: [art] Store priv key in slot 0x5
3,217,594 UART: [art] Derive Key Pair - Done
3,231,926 UART: [art] Signing Cert with AUTHO
3,232,406 UART: RITY.KEYID = 7
3,247,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,485 UART: [art] PUB.X = 1368F3C3E876E857DCEB0811520F010AD610836C1FA2C8DC0B2DE65BBC7F3C1A9F0AED0A14F45964070D17EB2E0DBC9F
3,255,243 UART: [art] PUB.Y = 3883975B9C12B4511D010A294C4AE358A624896CD97310E0769681BA4941159509E7E8AE2C083E73506647AAE8CF21DD
3,262,173 UART: [art] SIG.R = 2E1A63BE80BFC00BAC73C63319DA5455EB3FC0DF619284D2F3687E7A1F601DA8B5177C59A565563521B48B02F1C547B0
3,268,943 UART: [art] SIG.S = 7B72454E546CCA64EE6920ABB52E318FD0A6894D21DB959FE8C784B8F9357508D1489D9156B327F95F0C2AC4B966C5A2
3,292,996 UART: Caliptra RT
3,293,249 UART: [state] CFI Enabled
3,402,693 UART: [rt] RT listening for mailbox commands...
3,403,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,385 UART: [rt]cmd =0x41544d4e, len=14344
3,836,294 >>> mbox cmd response data (8 bytes)
3,836,295 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,226 UART: [rt]cmd =0x41545348, len=116
3,868,362 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,344 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,824 UART: [kat] SHA2-256
881,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,870 UART: [kat] ++
886,022 UART: [kat] sha1
890,194 UART: [kat] SHA2-256
892,132 UART: [kat] SHA2-384
894,765 UART: [kat] SHA2-512-ACC
896,666 UART: [kat] ECC-384
902,163 UART: [kat] HMAC-384Kdf
906,599 UART: [kat] LMS
1,474,795 UART: [kat] --
1,475,810 UART: [cold-reset] ++
1,476,272 UART: [fht] Storing FHT @ 0x50003400
1,479,213 UART: [idev] ++
1,479,381 UART: [idev] CDI.KEYID = 6
1,479,741 UART: [idev] SUBJECT.KEYID = 7
1,480,165 UART: [idev] UDS.KEYID = 0
1,480,510 ready_for_fw is high
1,480,510 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,073 UART: [idev] Erasing UDS.KEYID = 0
1,504,781 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,387 UART: [idev] --
1,514,558 UART: [ldev] ++
1,514,726 UART: [ldev] CDI.KEYID = 6
1,515,089 UART: [ldev] SUBJECT.KEYID = 5
1,515,515 UART: [ldev] AUTHORITY.KEYID = 7
1,515,978 UART: [ldev] FE.KEYID = 1
1,521,152 UART: [ldev] Erasing FE.KEYID = 1
1,546,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,653 UART: [ldev] --
1,585,964 UART: [fwproc] Waiting for Commands...
1,586,591 UART: [fwproc] Received command 0x46574c44
1,587,382 UART: [fwproc] Received Image of size 114168 bytes
2,883,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,006 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,358 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,977 >>> mbox cmd response: success
3,076,195 UART: [afmc] ++
3,076,363 UART: [afmc] CDI.KEYID = 6
3,076,725 UART: [afmc] SUBJECT.KEYID = 7
3,077,150 UART: [afmc] AUTHORITY.KEYID = 5
3,112,149 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,537 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,317 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,930 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,620 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,367 UART: [afmc] --
3,155,339 UART: [cold-reset] --
3,156,361 UART: [state] Locking Datavault
3,157,204 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,808 UART: [state] Locking ICCM
3,158,418 UART: [exit] Launching FMC @ 0x40000130
3,163,747 UART:
3,163,763 UART: Running Caliptra FMC ...
3,164,171 UART:
3,164,314 UART: [state] CFI Enabled
3,175,031 UART: [fht] FMC Alias Private Key: 7
3,283,122 UART: [art] Extend RT PCRs Done
3,283,550 UART: [art] Lock RT PCRs Done
3,284,988 UART: [art] Populate DV Done
3,293,185 UART: [fht] FMC Alias Private Key: 7
3,294,357 UART: [art] Derive CDI
3,294,637 UART: [art] Store in in slot 0x4
3,380,300 UART: [art] Derive Key Pair
3,380,660 UART: [art] Store priv key in slot 0x5
3,393,090 UART: [art] Derive Key Pair - Done
3,408,130 UART: [art] Signing Cert with AUTHO
3,408,610 UART: RITY.KEYID = 7
3,424,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,041 UART: [art] PUB.X = 0F9F6356C9881EB724C7F6BE791E599473BA8F852E896A19386D12262F1F7C1044C509E366B233C75D7B1DE6007A9491
3,431,777 UART: [art] PUB.Y = 3CD224C0DA72CF5C48C04D72574DAB3381EF4BB46483F072339FD51A2B3EC22D799210057C505C0FEB530C6FAFBAA3F7
3,438,732 UART: [art] SIG.R = 5EB73E43779CA3CB0F51033F128641F6D3E5E7CAF3A91857AE8522F193CB96707DBAEA1A5A25C483399145BD945F319B
3,445,502 UART: [art] SIG.S = 849EC10DA0CA0D38428E93BDD076677BA4114978A980E0694EAE7A3540E49DE992924CF0FFA548DB143073957C5756C3
3,468,829 UART: Caliptra RT
3,469,174 UART: [state] CFI Enabled
3,577,527 UART: [rt] RT listening for mailbox commands...
3,578,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,263 UART: [rt]cmd =0x41544d4e, len=14344
4,011,570 >>> mbox cmd response data (8 bytes)
4,011,571 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,660 UART: [rt]cmd =0x41545348, len=116
4,043,436 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,704 ready_for_fw is high
1,362,704 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,145 >>> mbox cmd response: success
2,987,941 UART:
2,987,957 UART: Running Caliptra FMC ...
2,988,365 UART:
2,988,508 UART: [state] CFI Enabled
2,998,881 UART: [fht] FMC Alias Private Key: 7
3,106,312 UART: [art] Extend RT PCRs Done
3,106,740 UART: [art] Lock RT PCRs Done
3,108,298 UART: [art] Populate DV Done
3,116,255 UART: [fht] FMC Alias Private Key: 7
3,117,329 UART: [art] Derive CDI
3,117,609 UART: [art] Store in in slot 0x4
3,203,512 UART: [art] Derive Key Pair
3,203,872 UART: [art] Store priv key in slot 0x5
3,216,820 UART: [art] Derive Key Pair - Done
3,231,553 UART: [art] Signing Cert with AUTHO
3,232,033 UART: RITY.KEYID = 7
3,247,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,176 UART: [art] PUB.X = 0D17346CA8B0420841F41F5963DD1168D0C11106498CCD37E5CED2B79A59BD3AB1B6DB2CCD61F635D05B7237C0D7CC93
3,254,947 UART: [art] PUB.Y = 0638F3F6C3771F1A3ADD9B1A1633E232786617F148C31A4E09A7B8929351D9DE1434D0CC49F1AB02F85DDA4F64D793F4
3,261,892 UART: [art] SIG.R = 9F8ECAAB3009FD6511C927D97CC93696E695CB21108315DA42D0FD0D08297D22B405B2DC2A980DCCE6182F28C6721453
3,268,651 UART: [art] SIG.S = B32B39326A1B3D443B5886CF46D4D0484ABB1B2CC1264CA09ADD685AB19C965BA5F37F5B3D1A4EB7DA9C7EB6E07C298B
3,292,404 UART: Caliptra RT
3,292,749 UART: [state] CFI Enabled
3,401,791 UART: [rt] RT listening for mailbox commands...
3,402,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,513 UART: [rt]cmd =0x41544d4e, len=14344
3,834,836 >>> mbox cmd response data (8 bytes)
3,834,837 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,030 UART: [rt]cmd =0x41545348, len=116
3,866,764 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
893,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,271 UART: [kat] ++
897,423 UART: [kat] sha1
901,763 UART: [kat] SHA2-256
903,703 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
918,454 UART: [kat] HMAC-384Kdf
923,010 UART: [kat] LMS
1,171,338 UART: [kat] --
1,172,017 UART: [cold-reset] ++
1,172,491 UART: [fht] FHT @ 0x50003400
1,175,164 UART: [idev] ++
1,175,332 UART: [idev] CDI.KEYID = 6
1,175,692 UART: [idev] SUBJECT.KEYID = 7
1,176,116 UART: [idev] UDS.KEYID = 0
1,176,461 ready_for_fw is high
1,176,461 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,002 UART: [idev] Erasing UDS.KEYID = 0
1,200,703 UART: [idev] Sha1 KeyId Algorithm
1,209,139 UART: [idev] --
1,210,403 UART: [ldev] ++
1,210,571 UART: [ldev] CDI.KEYID = 6
1,210,934 UART: [ldev] SUBJECT.KEYID = 5
1,211,360 UART: [ldev] AUTHORITY.KEYID = 7
1,211,823 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,243,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,110 UART: [fwproc] Wait for Commands...
1,283,924 UART: [fwproc] Recv command 0x46574c44
1,284,652 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,559 >>> mbox cmd response: success
2,774,591 UART: [afmc] ++
2,774,759 UART: [afmc] CDI.KEYID = 6
2,775,121 UART: [afmc] SUBJECT.KEYID = 7
2,775,546 UART: [afmc] AUTHORITY.KEYID = 5
2,810,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,256 UART: [afmc] --
2,854,162 UART: [cold-reset] --
2,855,118 UART: [state] Locking Datavault
2,856,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,013 UART: [state] Locking ICCM
2,857,545 UART: [exit] Launching FMC @ 0x40000130
2,862,874 UART:
2,862,890 UART: Running Caliptra FMC ...
2,863,298 UART:
2,863,352 UART: [state] CFI Enabled
2,873,781 UART: [fht] FMC Alias Private Key: 7
2,981,808 UART: [art] Extend RT PCRs Done
2,982,236 UART: [art] Lock RT PCRs Done
2,983,634 UART: [art] Populate DV Done
2,991,887 UART: [fht] FMC Alias Private Key: 7
2,993,009 UART: [art] Derive CDI
2,993,289 UART: [art] Store in in slot 0x4
3,079,058 UART: [art] Derive Key Pair
3,079,418 UART: [art] Store priv key in slot 0x5
3,092,366 UART: [art] Derive Key Pair - Done
3,107,330 UART: [art] Signing Cert with AUTHO
3,107,810 UART: RITY.KEYID = 7
3,123,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,845 UART: [art] PUB.X = 2039005154DA52D432ABBD0EFD627CD29CE24F9136A0DE03A643A19AF25E5DF520ACE6F420E50326CD3F61A95A23DFDE
3,130,600 UART: [art] PUB.Y = ACC1B8D42F688D6E6F58C0DCFE2939AEE6F91E5F47680238AA0E1D3BA25B674EECCFD33C8A8B03E3E6829B5DF5A44AB2
3,137,567 UART: [art] SIG.R = BFA197B6F156233BAFAE60632A0BED5906A923B329E89A3A186865C7F30645F95540CB0867EB07044956E8F183565F01
3,144,312 UART: [art] SIG.S = 8F0EB634BE692B66918A5909D99F0A0E2E455CC693B691DB5006994841195ABCAEF296ED096E8BBB7F594DF466FB2E96
3,167,909 UART: Caliptra RT
3,168,162 UART: [state] CFI Enabled
3,275,978 UART: [rt] RT listening for mailbox commands...
3,276,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,904 UART: [rt]cmd =0x41544d4e, len=14344
3,709,839 >>> mbox cmd response data (8 bytes)
3,709,840 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,989 UART: [rt]cmd =0x41545348, len=116
3,741,673 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,415 ready_for_fw is high
1,059,415 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,878 >>> mbox cmd response: success
2,687,032 UART:
2,687,048 UART: Running Caliptra FMC ...
2,687,456 UART:
2,687,510 UART: [state] CFI Enabled
2,698,235 UART: [fht] FMC Alias Private Key: 7
2,806,156 UART: [art] Extend RT PCRs Done
2,806,584 UART: [art] Lock RT PCRs Done
2,808,152 UART: [art] Populate DV Done
2,816,555 UART: [fht] FMC Alias Private Key: 7
2,817,723 UART: [art] Derive CDI
2,818,003 UART: [art] Store in in slot 0x4
2,903,546 UART: [art] Derive Key Pair
2,903,906 UART: [art] Store priv key in slot 0x5
2,917,358 UART: [art] Derive Key Pair - Done
2,932,041 UART: [art] Signing Cert with AUTHO
2,932,521 UART: RITY.KEYID = 7
2,947,741 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,506 UART: [art] PUB.X = EEF548166413C04E35BE799F1F30E0F6A03A9E00E93B9C6C7331682B5D1C43121A36AF69EC0907B7F7CBE43EA0B730B0
2,955,256 UART: [art] PUB.Y = EDF7C973503E663C55716B18ED38407AA4FEACB5B03BB14068B87FAD69A202F4517E5C30DDCC686C3577B46604767052
2,962,204 UART: [art] SIG.R = 9988BB2B1F8A13A38E3EBB9831A6D8585725E7B5CCBC2E1F29D89BB1C6AEC72CA98F1571C551FDEDB98D3E5C5A2C6750
2,968,994 UART: [art] SIG.S = 68BA0B94C86DD88BA1CD828FF8EF79FB5CF83A052E4208100612D03D1FA4F6B352770C8AC4248FBC6D195F907F1C8933
2,993,024 UART: Caliptra RT
2,993,277 UART: [state] CFI Enabled
3,099,534 UART: [rt] RT listening for mailbox commands...
3,100,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,446 UART: [rt]cmd =0x41544d4e, len=14344
3,533,157 >>> mbox cmd response data (8 bytes)
3,533,158 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,409 UART: [rt]cmd =0x41545348, len=116
3,565,347 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
893,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,660 UART: [kat] ++
897,812 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,645 UART: [kat] SHA2-512-ACC
908,546 UART: [kat] ECC-384
918,557 UART: [kat] HMAC-384Kdf
923,129 UART: [kat] LMS
1,171,457 UART: [kat] --
1,172,496 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,663 UART: [idev] ++
1,175,831 UART: [idev] CDI.KEYID = 6
1,176,191 UART: [idev] SUBJECT.KEYID = 7
1,176,615 UART: [idev] UDS.KEYID = 0
1,176,960 ready_for_fw is high
1,176,960 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,569 UART: [idev] Erasing UDS.KEYID = 0
1,202,134 UART: [idev] Sha1 KeyId Algorithm
1,210,616 UART: [idev] --
1,211,648 UART: [ldev] ++
1,211,816 UART: [ldev] CDI.KEYID = 6
1,212,179 UART: [ldev] SUBJECT.KEYID = 5
1,212,605 UART: [ldev] AUTHORITY.KEYID = 7
1,213,068 UART: [ldev] FE.KEYID = 1
1,218,684 UART: [ldev] Erasing FE.KEYID = 1
1,244,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,926 UART: [ldev] --
1,284,361 UART: [fwproc] Wait for Commands...
1,285,183 UART: [fwproc] Recv command 0x46574c44
1,285,911 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,911 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,215 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,892 >>> mbox cmd response: success
2,774,132 UART: [afmc] ++
2,774,300 UART: [afmc] CDI.KEYID = 6
2,774,662 UART: [afmc] SUBJECT.KEYID = 7
2,775,087 UART: [afmc] AUTHORITY.KEYID = 5
2,810,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,084 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,803 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,565 UART: [afmc] --
2,853,527 UART: [cold-reset] --
2,854,425 UART: [state] Locking Datavault
2,855,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,076 UART: [state] Locking ICCM
2,856,740 UART: [exit] Launching FMC @ 0x40000130
2,862,069 UART:
2,862,085 UART: Running Caliptra FMC ...
2,862,493 UART:
2,862,636 UART: [state] CFI Enabled
2,873,267 UART: [fht] FMC Alias Private Key: 7
2,981,606 UART: [art] Extend RT PCRs Done
2,982,034 UART: [art] Lock RT PCRs Done
2,983,746 UART: [art] Populate DV Done
2,991,739 UART: [fht] FMC Alias Private Key: 7
2,992,839 UART: [art] Derive CDI
2,993,119 UART: [art] Store in in slot 0x4
3,078,478 UART: [art] Derive Key Pair
3,078,838 UART: [art] Store priv key in slot 0x5
3,091,880 UART: [art] Derive Key Pair - Done
3,106,937 UART: [art] Signing Cert with AUTHO
3,107,417 UART: RITY.KEYID = 7
3,123,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,034 UART: [art] PUB.X = 5F07872F791654EFAC86B6341E39F0865294AC7CDD44CF8A0796FE504D4453D901A9ED434FD13CA60941ED1B1F250F7C
3,130,795 UART: [art] PUB.Y = 4F09E1B715887BB305B0FA66379F0C3CA0C1EAEA433DB87878B9BF0673F2E3F3C7332B7E7CD30F32E22A59814BB2F3DF
3,137,744 UART: [art] SIG.R = AB9811C928E418A9BEE41A2654349D9368CF1F9660C672EAC6D28595957CB74815B228CA3CDBA4E4B17D72BDAB278636
3,144,520 UART: [art] SIG.S = 5F3B99443A1B388D594F71DB5BDBC61B902F05B5DCAA4412FF8C307F6A590ABC3ABE1572C2273F32E2D1E9E86096586D
3,167,803 UART: Caliptra RT
3,168,148 UART: [state] CFI Enabled
3,277,017 UART: [rt] RT listening for mailbox commands...
3,277,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,565 UART: [rt]cmd =0x41544d4e, len=14344
3,710,764 >>> mbox cmd response data (8 bytes)
3,710,765 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,090 UART: [rt]cmd =0x41545348, len=116
3,743,110 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,714 ready_for_fw is high
1,060,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,439 >>> mbox cmd response: success
2,688,589 UART:
2,688,605 UART: Running Caliptra FMC ...
2,689,013 UART:
2,689,156 UART: [state] CFI Enabled
2,699,455 UART: [fht] FMC Alias Private Key: 7
2,806,918 UART: [art] Extend RT PCRs Done
2,807,346 UART: [art] Lock RT PCRs Done
2,809,104 UART: [art] Populate DV Done
2,817,331 UART: [fht] FMC Alias Private Key: 7
2,818,471 UART: [art] Derive CDI
2,818,751 UART: [art] Store in in slot 0x4
2,904,650 UART: [art] Derive Key Pair
2,905,010 UART: [art] Store priv key in slot 0x5
2,918,024 UART: [art] Derive Key Pair - Done
2,932,891 UART: [art] Signing Cert with AUTHO
2,933,371 UART: RITY.KEYID = 7
2,948,271 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,036 UART: [art] PUB.X = 7AE58C34C058BF2FBDC8CB9FC1AB2D07C1759E73E52B4174E3BBE22631D13DA0AB06EC03A61ABD61A8389CC506C6122A
2,955,814 UART: [art] PUB.Y = 9E2C1A94311180CD9261C986E497302A885500E340A68503E1DFACFE19CB6842D02FCBB7D10B28386860DD93B35998E3
2,962,734 UART: [art] SIG.R = 654B174D7B2AC3CB91D1912434492872DF9E47D55E8FF6AECDFD646F8E6A2C6E38FB3D792C9EED4083A6513E3505AFBA
2,969,517 UART: [art] SIG.S = F65E9078B8EE98FCA2827A2AF4F09BD0D08C55D63D00BF1C2BA304CC7FA6B1D526A8A191118204E81ABDAE5122889832
2,993,062 UART: Caliptra RT
2,993,407 UART: [state] CFI Enabled
3,101,770 UART: [rt] RT listening for mailbox commands...
3,102,440 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,352 UART: [rt]cmd =0x41544d4e, len=14344
3,534,945 >>> mbox cmd response data (8 bytes)
3,534,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,183 UART: [rt]cmd =0x41545348, len=116
3,567,083 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,547 UART: [cold-reset] ++
1,170,063 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 ready_for_fw is high
1,174,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,198,765 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,638 UART: [ldev] ++
1,208,806 UART: [ldev] CDI.KEYID = 6
1,209,170 UART: [ldev] SUBJECT.KEYID = 5
1,209,597 UART: [ldev] AUTHORITY.KEYID = 7
1,210,060 UART: [ldev] FE.KEYID = 1
1,214,966 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,098 UART: [ldev] --
1,280,446 UART: [fwproc] Wait for Commands...
1,281,103 UART: [fwproc] Recv command 0x46574c44
1,281,836 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,107 >>> mbox cmd response: success
2,772,238 UART: [afmc] ++
2,772,406 UART: [afmc] CDI.KEYID = 6
2,772,769 UART: [afmc] SUBJECT.KEYID = 7
2,773,195 UART: [afmc] AUTHORITY.KEYID = 5
2,808,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,886 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,769 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,488 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,449 UART: [afmc] --
2,851,413 UART: [cold-reset] --
2,852,145 UART: [state] Locking Datavault
2,853,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,010 UART: [state] Locking ICCM
2,854,480 UART: [exit] Launching FMC @ 0x40000130
2,859,809 UART:
2,859,825 UART: Running Caliptra FMC ...
2,860,233 UART:
2,860,287 UART: [state] CFI Enabled
2,870,508 UART: [fht] FMC Alias Private Key: 7
2,978,465 UART: [art] Extend RT PCRs Done
2,978,893 UART: [art] Lock RT PCRs Done
2,980,441 UART: [art] Populate DV Done
2,988,810 UART: [fht] FMC Alias Private Key: 7
2,989,968 UART: [art] Derive CDI
2,990,248 UART: [art] Store in in slot 0x4
3,076,011 UART: [art] Derive Key Pair
3,076,371 UART: [art] Store priv key in slot 0x5
3,089,917 UART: [art] Derive Key Pair - Done
3,104,829 UART: [art] Signing Cert with AUTHO
3,105,309 UART: RITY.KEYID = 7
3,120,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,982 UART: [art] PUB.X = D17663B85E80E25AEC653D4F68B22CB17D936EAED25EF74CD3565243A705E57B36AB088F1F63DF5C0E7647DE8B411000
3,127,729 UART: [art] PUB.Y = 2633C5F1D4671197646EF7E6CD073D058E1A008F37F01CE6DE45C012B55405DFC6D649E9CF313B0BB8ACEF658B5484E9
3,134,653 UART: [art] SIG.R = 38953DB975B3114537F2630AD18666EC273020BDAAB7AA039BC2DBF004C37919AA8B1E89B5606CFD7B65DB869679973E
3,141,418 UART: [art] SIG.S = F76CDC6E04360C69AF0EAA276EE1DBB701913CF9220A23CCCEA61F7BCE5E5086F977A5DB6B1D7DB95B8CF8D4118B0D40
3,165,171 UART: Caliptra RT
3,165,424 UART: [state] CFI Enabled
3,273,025 UART: [rt] RT listening for mailbox commands...
3,273,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,423 UART: [rt]cmd =0x41544d4e, len=14344
3,706,378 >>> mbox cmd response data (8 bytes)
3,706,379 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,366 UART: [rt]cmd =0x41545348, len=116
3,738,410 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,634 ready_for_fw is high
1,055,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,615 >>> mbox cmd response: success
2,681,261 UART:
2,681,277 UART: Running Caliptra FMC ...
2,681,685 UART:
2,681,739 UART: [state] CFI Enabled
2,692,266 UART: [fht] FMC Alias Private Key: 7
2,800,339 UART: [art] Extend RT PCRs Done
2,800,767 UART: [art] Lock RT PCRs Done
2,802,115 UART: [art] Populate DV Done
2,810,146 UART: [fht] FMC Alias Private Key: 7
2,811,316 UART: [art] Derive CDI
2,811,596 UART: [art] Store in in slot 0x4
2,897,673 UART: [art] Derive Key Pair
2,898,033 UART: [art] Store priv key in slot 0x5
2,911,689 UART: [art] Derive Key Pair - Done
2,926,443 UART: [art] Signing Cert with AUTHO
2,926,923 UART: RITY.KEYID = 7
2,942,425 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,190 UART: [art] PUB.X = 64F3E113456876CF0FF7B0545DD74EF9E43B6AC459A11BCF5F46FEF4D390AA995EF1E5E4BF4F66C64F2CD4C4E7D4CA71
2,949,979 UART: [art] PUB.Y = BBA009DF50C3317AD390EEA94856FBE6620C38A84626E5A6FDC5C10A837D90206F8B7DB116054891412DD91F7B469DAC
2,956,925 UART: [art] SIG.R = 7FBCF32029FCDD604D2BF2D018DFDD046A54EF981095AB6F5BCCC0021B339BA826D0367F5820CFBE8D77C773A0E316DC
2,963,709 UART: [art] SIG.S = 2693083C0CF4D3DB631ED042B5BDAB5DDA0B18ADE8C8CEB53936C2DF589E8384F053366DB2C526401390042124644C38
2,987,642 UART: Caliptra RT
2,987,895 UART: [state] CFI Enabled
3,095,568 UART: [rt] RT listening for mailbox commands...
3,096,238 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,214 UART: [rt]cmd =0x41544d4e, len=14344
3,528,817 >>> mbox cmd response data (8 bytes)
3,528,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,835 UART: [rt]cmd =0x41545348, len=116
3,560,565 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
921,159 UART: [kat] LMS
1,169,471 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,828 UART: [fht] FHT @ 0x50003400
1,173,480 UART: [idev] ++
1,173,648 UART: [idev] CDI.KEYID = 6
1,174,009 UART: [idev] SUBJECT.KEYID = 7
1,174,434 UART: [idev] UDS.KEYID = 0
1,174,780 ready_for_fw is high
1,174,780 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,560 UART: [idev] Erasing UDS.KEYID = 0
1,199,662 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,313 UART: [ldev] SUBJECT.KEYID = 5
1,210,740 UART: [ldev] AUTHORITY.KEYID = 7
1,211,203 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,397 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,955 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,924 >>> mbox cmd response: success
2,773,119 UART: [afmc] ++
2,773,287 UART: [afmc] CDI.KEYID = 6
2,773,650 UART: [afmc] SUBJECT.KEYID = 7
2,774,076 UART: [afmc] AUTHORITY.KEYID = 5
2,809,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,472 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,201 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,084 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,803 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,624 UART: [afmc] --
2,852,556 UART: [cold-reset] --
2,853,322 UART: [state] Locking Datavault
2,854,553 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,157 UART: [state] Locking ICCM
2,855,619 UART: [exit] Launching FMC @ 0x40000130
2,860,948 UART:
2,860,964 UART: Running Caliptra FMC ...
2,861,372 UART:
2,861,515 UART: [state] CFI Enabled
2,871,996 UART: [fht] FMC Alias Private Key: 7
2,980,399 UART: [art] Extend RT PCRs Done
2,980,827 UART: [art] Lock RT PCRs Done
2,982,181 UART: [art] Populate DV Done
2,990,496 UART: [fht] FMC Alias Private Key: 7
2,991,652 UART: [art] Derive CDI
2,991,932 UART: [art] Store in in slot 0x4
3,077,785 UART: [art] Derive Key Pair
3,078,145 UART: [art] Store priv key in slot 0x5
3,091,717 UART: [art] Derive Key Pair - Done
3,106,427 UART: [art] Signing Cert with AUTHO
3,106,907 UART: RITY.KEYID = 7
3,122,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,844 UART: [art] PUB.X = BA6AE5D728950A761EAB0C973F9CA160EBC40AFF86EE04CC54B55010A54AB743F0169AD922A3A524073E947556709BAD
3,129,609 UART: [art] PUB.Y = 4ECD80B8B70690BD3D00BDE78C59A5BF463569C230D2C4B6F2B3E0E03E3D029805514B6A17FF7F0A829234B1D00764E9
3,136,528 UART: [art] SIG.R = 518E0FB26BA5E953695A91AB2FB685A85C772CE65782158785AA5610C671F16123C2AC112A3BE1D3914C2556B3D96B3A
3,143,295 UART: [art] SIG.S = B191AEE749CAAA6D63A4893893C92FD0B62B5F7E8AF7C5B8D310A17CED0079E17BF8CBA850E5FD731AA19B5542A2949C
3,166,500 UART: Caliptra RT
3,166,845 UART: [state] CFI Enabled
3,275,052 UART: [rt] RT listening for mailbox commands...
3,275,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,816 UART: [rt]cmd =0x41544d4e, len=14344
3,709,305 >>> mbox cmd response data (8 bytes)
3,709,306 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,633 UART: [rt]cmd =0x41545348, len=116
3,741,361 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,373 ready_for_fw is high
1,056,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,302 >>> mbox cmd response: success
2,684,694 UART:
2,684,710 UART: Running Caliptra FMC ...
2,685,118 UART:
2,685,261 UART: [state] CFI Enabled
2,695,670 UART: [fht] FMC Alias Private Key: 7
2,803,783 UART: [art] Extend RT PCRs Done
2,804,211 UART: [art] Lock RT PCRs Done
2,805,749 UART: [art] Populate DV Done
2,814,122 UART: [fht] FMC Alias Private Key: 7
2,815,282 UART: [art] Derive CDI
2,815,562 UART: [art] Store in in slot 0x4
2,901,463 UART: [art] Derive Key Pair
2,901,823 UART: [art] Store priv key in slot 0x5
2,914,795 UART: [art] Derive Key Pair - Done
2,929,532 UART: [art] Signing Cert with AUTHO
2,930,012 UART: RITY.KEYID = 7
2,944,978 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,743 UART: [art] PUB.X = 8CB14FEBBC4303225AE44D108B2FD03EC4F273C067FF9885CA789A291F1CB6326823C338E883EAE2E8DB76A2A0162765
2,952,518 UART: [art] PUB.Y = 70582026F3DD0F4DAB1190F37619A46F11E804985CE63FDE1ADC2F80D2B52E9E61FF9CD80014AD9CE6A6019C390AE301
2,959,441 UART: [art] SIG.R = 747932533BCDA3B4065BE15A60D0E4105852E19302801359B93D4C2CECD7F70A70D4AB75CAFF1E8626FC21281CCA690F
2,966,205 UART: [art] SIG.S = B0D71C0511A42A17DB7909E7E28549DF8FC1E0CFDA7D536F04A7B16CE242BF8967840864F314CEAE6D6285C1A8B67113
2,990,252 UART: Caliptra RT
2,990,597 UART: [state] CFI Enabled
3,098,834 UART: [rt] RT listening for mailbox commands...
3,099,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,448 UART: [rt]cmd =0x41544d4e, len=14344
3,532,145 >>> mbox cmd response data (8 bytes)
3,532,146 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,103 UART: [rt]cmd =0x41545348, len=116
3,564,007 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,018 UART:
192,401 UART: Running Caliptra ROM ...
193,598 UART:
193,746 UART: [state] CFI Enabled
265,281 UART: [state] LifecycleState = Unprovisioned
267,185 UART: [state] DebugLocked = No
268,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,062 UART: [kat] SHA2-256
443,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,330 UART: [kat] ++
454,860 UART: [kat] sha1
465,308 UART: [kat] SHA2-256
468,015 UART: [kat] SHA2-384
474,373 UART: [kat] SHA2-512-ACC
476,731 UART: [kat] ECC-384
2,766,261 UART: [kat] HMAC-384Kdf
2,777,638 UART: [kat] LMS
3,967,954 UART: [kat] --
3,973,661 UART: [cold-reset] ++
3,975,514 UART: [fht] Storing FHT @ 0x50003400
3,985,486 UART: [idev] ++
3,986,041 UART: [idev] CDI.KEYID = 6
3,987,061 UART: [idev] SUBJECT.KEYID = 7
3,988,225 UART: [idev] UDS.KEYID = 0
3,989,200 ready_for_fw is high
3,989,384 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,132,573 UART: [idev] Erasing UDS.KEYID = 0
7,322,032 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,337 UART: [idev] --
7,347,320 UART: [ldev] ++
7,347,939 UART: [ldev] CDI.KEYID = 6
7,348,814 UART: [ldev] SUBJECT.KEYID = 5
7,350,069 UART: [ldev] AUTHORITY.KEYID = 7
7,351,347 UART: [ldev] FE.KEYID = 1
7,378,108 UART: [ldev] Erasing FE.KEYID = 1
10,709,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,003,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,017,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,032,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,047,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,066,343 UART: [ldev] --
13,071,642 UART: [fwproc] Waiting for Commands...
13,073,310 UART: [fwproc] Received command 0x46574c44
13,075,483 UART: [fwproc] Received Image of size 113844 bytes
17,129,065 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,207,579 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,276,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,593,534 >>> mbox cmd response: success
17,597,140 UART: [afmc] ++
17,597,726 UART: [afmc] CDI.KEYID = 6
17,598,606 UART: [afmc] SUBJECT.KEYID = 7
17,599,871 UART: [afmc] AUTHORITY.KEYID = 5
20,961,329 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,264,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,266,459 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,280,863 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,295,685 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,310,159 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,331,281 UART: [afmc] --
23,334,269 UART: [cold-reset] --
23,339,477 UART: [state] Locking Datavault
23,345,026 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,796 UART: [state] Locking ICCM
23,349,241 UART: [exit] Launching FMC @ 0x40000130
23,357,629 UART:
23,357,861 UART: Running Caliptra FMC ...
23,358,885 UART:
23,359,025 UART: [state] CFI Enabled
23,423,304 UART: [fht] FMC Alias Private Key: 7
25,761,163 UART: [art] Extend RT PCRs Done
25,762,404 UART: [art] Lock RT PCRs Done
25,764,107 UART: [art] Populate DV Done
25,769,243 UART: [fht] FMC Alias Private Key: 7
25,770,770 UART: [art] Derive CDI
25,771,501 UART: [art] Store in in slot 0x4
25,831,720 UART: [art] Derive Key Pair
25,832,750 UART: [art] Store priv key in slot 0x5
29,125,822 UART: [art] Derive Key Pair - Done
29,139,034 UART: [art] Signing Cert with AUTHO
29,140,335 UART: RITY.KEYID = 7
31,428,352 UART: [art] Erasing AUTHORITY.KEYID = 7
31,429,854 UART: [art] PUB.X = 6097AFB301AF603FF8320375E870DDBC2C960C738265EBD54C66BF85C2B43178F744C7219528383EDF1B9D5A091EDC67
31,437,065 UART: [art] PUB.Y = 0E7C8C5C905272DD3EE377F4CDF16DBFB8F6659C9027909BFCE02C46D589B355BD952A6ACA9AE2F9E42DDD86F9FE894F
31,444,367 UART: [art] SIG.R = 6940149B17938EC1C84F58BD703807B085D7925E3CA49BBB13602BE6550C5115C6729E8F20E5F4274D323BD8476AEA11
31,451,731 UART: [art] SIG.S = 71850A46BC2362A798EC99B8D064C16D86CC9D0809C7A868DBDBBFB6F03D3528E2F825A4AFD948C9570CB816CC560E3A
32,756,891 UART: Caliptra RT
32,757,602 UART: [state] CFI Enabled
32,919,194 UART: [rt] RT listening for mailbox commands...
36,954,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,109,501 UART: [rt]cmd =0x41544d4e, len=14344
42,410,123 >>> mbox cmd response data (8 bytes)
42,410,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,441,510 UART: [rt]cmd =0x41545348, len=116
42,443,983 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,784,481 ready_for_fw is high
3,784,862 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,842,550 >>> mbox cmd response: success
23,541,194 UART:
23,541,581 UART: Running Caliptra FMC ...
23,542,711 UART:
23,542,865 UART: [state] CFI Enabled
23,610,773 UART: [fht] FMC Alias Private Key: 7
25,948,644 UART: [art] Extend RT PCRs Done
25,949,873 UART: [art] Lock RT PCRs Done
25,951,329 UART: [art] Populate DV Done
25,956,687 UART: [fht] FMC Alias Private Key: 7
25,958,351 UART: [art] Derive CDI
25,959,159 UART: [art] Store in in slot 0x4
26,019,531 UART: [art] Derive Key Pair
26,020,568 UART: [art] Store priv key in slot 0x5
29,313,449 UART: [art] Derive Key Pair - Done
29,326,939 UART: [art] Signing Cert with AUTHO
29,328,244 UART: RITY.KEYID = 7
31,615,509 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,011 UART: [art] PUB.X = A8E1422B7A0EC80C49569D3FA48743912C0DE5E6A7D2EED3BAA9B27187CD53A55760C81D8840A6DD49D101575E13E7EC
31,624,261 UART: [art] PUB.Y = B33396804574E05CAF539669E4A6D5C1D303B449A94BFECEBE76E53F3DB19CACAE432A5B364249B3C286FAFEF1D8289A
31,631,522 UART: [art] SIG.R = 49B584E61D0DA71A239D41A6EFA86353D0925F8C86FAB8D1CC29EB2E2253A6C9CEB90063CBDBEE36F264915C62F96401
31,638,870 UART: [art] SIG.S = E164504AEEF0FCEC22C709D64471F9C15D7DA84158FAC5F50168C2D0C67506C9A713301C20101EE8C49AB5D0E8BEA9EE
32,943,729 UART: Caliptra RT
32,944,439 UART: [state] CFI Enabled
33,105,179 UART: [rt] RT listening for mailbox commands...
37,133,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,289,203 UART: [rt]cmd =0x41544d4e, len=14344
42,590,260 >>> mbox cmd response data (8 bytes)
42,590,839 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,621,628 UART: [rt]cmd =0x41545348, len=116
42,624,159 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,520 UART:
192,900 UART: Running Caliptra ROM ...
194,017 UART:
603,758 UART: [state] CFI Enabled
618,822 UART: [state] LifecycleState = Unprovisioned
620,773 UART: [state] DebugLocked = No
622,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,682 UART: [kat] SHA2-256
797,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,029 UART: [kat] ++
808,523 UART: [kat] sha1
819,562 UART: [kat] SHA2-256
822,235 UART: [kat] SHA2-384
827,879 UART: [kat] SHA2-512-ACC
830,197 UART: [kat] ECC-384
3,114,376 UART: [kat] HMAC-384Kdf
3,125,900 UART: [kat] LMS
4,316,051 UART: [kat] --
4,319,769 UART: [cold-reset] ++
4,320,786 UART: [fht] Storing FHT @ 0x50003400
4,332,637 UART: [idev] ++
4,333,243 UART: [idev] CDI.KEYID = 6
4,334,135 UART: [idev] SUBJECT.KEYID = 7
4,335,333 UART: [idev] UDS.KEYID = 0
4,336,346 ready_for_fw is high
4,336,553 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,818 UART: [idev] Erasing UDS.KEYID = 0
7,626,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,622 UART: [idev] --
7,653,626 UART: [ldev] ++
7,654,204 UART: [ldev] CDI.KEYID = 6
7,655,145 UART: [ldev] SUBJECT.KEYID = 5
7,656,361 UART: [ldev] AUTHORITY.KEYID = 7
7,657,655 UART: [ldev] FE.KEYID = 1
7,668,276 UART: [ldev] Erasing FE.KEYID = 1
10,954,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,150 UART: [ldev] --
13,316,556 UART: [fwproc] Waiting for Commands...
13,319,846 UART: [fwproc] Received command 0x46574c44
13,322,030 UART: [fwproc] Received Image of size 113844 bytes
17,371,267 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,878 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,778 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,833,464 >>> mbox cmd response: success
17,837,320 UART: [afmc] ++
17,837,921 UART: [afmc] CDI.KEYID = 6
17,838,841 UART: [afmc] SUBJECT.KEYID = 7
17,840,112 UART: [afmc] AUTHORITY.KEYID = 5
21,155,222 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,274 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,534 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,910 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,770 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,168 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,532 UART: [afmc] --
23,523,805 UART: [cold-reset] --
23,527,132 UART: [state] Locking Datavault
23,533,150 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,924 UART: [state] Locking ICCM
23,537,459 UART: [exit] Launching FMC @ 0x40000130
23,545,803 UART:
23,546,045 UART: Running Caliptra FMC ...
23,547,153 UART:
23,547,313 UART: [state] CFI Enabled
23,555,472 UART: [fht] FMC Alias Private Key: 7
25,886,109 UART: [art] Extend RT PCRs Done
25,887,333 UART: [art] Lock RT PCRs Done
25,888,987 UART: [art] Populate DV Done
25,894,694 UART: [fht] FMC Alias Private Key: 7
25,896,188 UART: [art] Derive CDI
25,896,952 UART: [art] Store in in slot 0x4
25,939,663 UART: [art] Derive Key Pair
25,940,720 UART: [art] Store priv key in slot 0x5
29,182,734 UART: [art] Derive Key Pair - Done
29,195,462 UART: [art] Signing Cert with AUTHO
29,196,773 UART: RITY.KEYID = 7
31,476,448 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,956 UART: [art] PUB.X = B721FAF53E8DACFBE89F5C3BCAA17DFF8241849F38FE12547599CDEDD89ED9D7CEF7EFCB1197AE9CC20DF777567955F6
31,485,218 UART: [art] PUB.Y = C23EE9CBB4537B8F17C94E8EC5AB7A16580BFDEBC57EF5B183404B4C2F2A74325AD8615205D274E9E900EE78718EAF64
31,492,483 UART: [art] SIG.R = B236C279944D22C9EEE353493CD459E3CC034AB9095432EA90FC66A2B56FEE5A58AB47379BCAE365558828F93CE2DC01
31,499,842 UART: [art] SIG.S = 022CA770A4FD37ACA53C6B865FF28D90182D558473CF2A35F1E451D84C1DF93AB0BF279300DE3DB160A61EAED2013E45
32,804,624 UART: Caliptra RT
32,805,326 UART: [state] CFI Enabled
32,921,918 UART: [rt] RT listening for mailbox commands...
37,093,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,248,634 UART: [rt]cmd =0x41544d4e, len=14344
42,549,412 >>> mbox cmd response data (8 bytes)
42,549,995 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,580,693 UART: [rt]cmd =0x41545348, len=116
42,583,371 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,175 writing to cptra_bootfsm_go
4,130,985 ready_for_fw is high
4,131,366 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,069,305 >>> mbox cmd response: success
23,716,114 UART:
23,716,518 UART: Running Caliptra FMC ...
23,717,658 UART:
23,717,817 UART: [state] CFI Enabled
23,726,020 UART: [fht] FMC Alias Private Key: 7
26,056,343 UART: [art] Extend RT PCRs Done
26,057,571 UART: [art] Lock RT PCRs Done
26,059,445 UART: [art] Populate DV Done
26,064,869 UART: [fht] FMC Alias Private Key: 7
26,066,360 UART: [art] Derive CDI
26,067,101 UART: [art] Store in in slot 0x4
26,109,982 UART: [art] Derive Key Pair
26,111,022 UART: [art] Store priv key in slot 0x5
29,354,058 UART: [art] Derive Key Pair - Done
29,367,330 UART: [art] Signing Cert with AUTHO
29,368,664 UART: RITY.KEYID = 7
31,648,245 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,753 UART: [art] PUB.X = 631472FE9B0B6DB91EF54D622894A5107AC1A642D504AC8E6CDF24FBA040156B959691537B9CAADB3554ACE3BC76B2C3
31,657,017 UART: [art] PUB.Y = 46FECED71C00386C87A5C5BB0086B936AEAC66D92144ED528B6371A99E329B9F686FBD551D87A032427C352C7DCE7877
31,664,266 UART: [art] SIG.R = ED4A12A5A4CE6183AD4E3581BE12BA447D3D5F00049D19EF924E5E29ED621E3D6392D0B96D60D04D37CC64530B686F6A
31,671,630 UART: [art] SIG.S = 49DC8695FC427A6BD24C1A36F61BFE43590D45AB34F5071B8C61BCE82D77582C15230C1711415C76ED55EF4E6F053ED7
32,976,639 UART: Caliptra RT
32,977,361 UART: [state] CFI Enabled
33,094,811 UART: [rt] RT listening for mailbox commands...
37,264,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,420,174 UART: [rt]cmd =0x41544d4e, len=14344
42,720,307 >>> mbox cmd response data (8 bytes)
42,720,894 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,751,643 UART: [rt]cmd =0x41545348, len=116
42,753,840 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
191,962 UART:
192,327 UART: Running Caliptra ROM ...
193,437 UART:
193,585 UART: [state] CFI Enabled
266,215 UART: [state] LifecycleState = Unprovisioned
268,217 UART: [state] DebugLocked = No
270,742 UART: [state] WD Timer not started. Device not locked for debugging
274,000 UART: [kat] SHA2-256
453,132 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,666 UART: [kat] ++
465,131 UART: [kat] sha1
474,797 UART: [kat] SHA2-256
477,807 UART: [kat] SHA2-384
484,221 UART: [kat] SHA2-512-ACC
487,157 UART: [kat] ECC-384
2,949,255 UART: [kat] HMAC-384Kdf
2,972,530 UART: [kat] LMS
3,501,974 UART: [kat] --
3,505,067 UART: [cold-reset] ++
3,506,299 UART: [fht] FHT @ 0x50003400
3,517,425 UART: [idev] ++
3,517,995 UART: [idev] CDI.KEYID = 6
3,518,922 UART: [idev] SUBJECT.KEYID = 7
3,520,096 UART: [idev] UDS.KEYID = 0
3,521,030 ready_for_fw is high
3,521,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,956 UART: [idev] Erasing UDS.KEYID = 0
6,026,040 UART: [idev] Sha1 KeyId Algorithm
6,049,645 UART: [idev] --
6,054,211 UART: [ldev] ++
6,054,805 UART: [ldev] CDI.KEYID = 6
6,055,721 UART: [ldev] SUBJECT.KEYID = 5
6,056,886 UART: [ldev] AUTHORITY.KEYID = 7
6,058,122 UART: [ldev] FE.KEYID = 1
6,100,150 UART: [ldev] Erasing FE.KEYID = 1
8,606,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,349 UART: [ldev] --
10,415,128 UART: [fwproc] Wait for Commands...
10,417,837 UART: [fwproc] Recv command 0x46574c44
10,419,930 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,734 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,279,966 >>> mbox cmd response: success
14,284,615 UART: [afmc] ++
14,285,212 UART: [afmc] CDI.KEYID = 6
14,286,098 UART: [afmc] SUBJECT.KEYID = 7
14,287,317 UART: [afmc] AUTHORITY.KEYID = 5
16,828,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,388 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,433 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,546 UART: [afmc] --
18,632,009 UART: [cold-reset] --
18,633,985 UART: [state] Locking Datavault
18,638,430 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,134 UART: [state] Locking ICCM
18,641,122 UART: [exit] Launching FMC @ 0x40000130
18,649,577 UART:
18,649,812 UART: Running Caliptra FMC ...
18,650,909 UART:
18,651,068 UART: [state] CFI Enabled
18,712,899 UART: [fht] FMC Alias Private Key: 7
20,477,215 UART: [art] Extend RT PCRs Done
20,478,433 UART: [art] Lock RT PCRs Done
20,480,199 UART: [art] Populate DV Done
20,485,717 UART: [fht] FMC Alias Private Key: 7
20,487,359 UART: [art] Derive CDI
20,488,117 UART: [art] Store in in slot 0x4
20,545,325 UART: [art] Derive Key Pair
20,546,367 UART: [art] Store priv key in slot 0x5
23,009,717 UART: [art] Derive Key Pair - Done
23,022,884 UART: [art] Signing Cert with AUTHO
23,024,193 UART: RITY.KEYID = 7
24,735,593 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,097 UART: [art] PUB.X = 16A9008CED994FA979BE24DAA7564D0095C7E784396883560A09FF077F430903BF0C1126C357577EE2B4F9CA7082B3DD
24,744,305 UART: [art] PUB.Y = 93E258723623E1551EFE86C7F5468D8A9BCE5B6102112F3AD23E2631717EC93AA1CA3E86ADCE7A723547F24E5FA90C2B
24,751,622 UART: [art] SIG.R = 3F0F87DDD9D08323B88A1AFD56E44413AD21D65A108B5F73EEC89837730D50EA8400D5B310C7FB9605130F846038018E
24,758,986 UART: [art] SIG.S = B5579CFB0292E024755C24260DC4C0413A9E60D358CABA6C4FA9B8A78F4C8671B428398D37E3ECCF88F64F7197AEA035
25,737,832 UART: Caliptra RT
25,738,512 UART: [state] CFI Enabled
25,903,125 UART: [rt] RT listening for mailbox commands...
29,929,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,085,639 UART: [rt]cmd =0x41544d4e, len=14344
34,080,513 >>> mbox cmd response data (8 bytes)
34,081,165 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,111,648 UART: [rt]cmd =0x41545348, len=116
34,113,993 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,381,261 ready_for_fw is high
3,381,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,055,578 >>> mbox cmd response: success
18,345,676 UART:
18,346,075 UART: Running Caliptra FMC ...
18,347,213 UART:
18,347,378 UART: [state] CFI Enabled
18,412,058 UART: [fht] FMC Alias Private Key: 7
20,176,463 UART: [art] Extend RT PCRs Done
20,177,683 UART: [art] Lock RT PCRs Done
20,179,634 UART: [art] Populate DV Done
20,185,097 UART: [fht] FMC Alias Private Key: 7
20,186,817 UART: [art] Derive CDI
20,187,640 UART: [art] Store in in slot 0x4
20,245,238 UART: [art] Derive Key Pair
20,246,278 UART: [art] Store priv key in slot 0x5
22,709,297 UART: [art] Derive Key Pair - Done
22,722,200 UART: [art] Signing Cert with AUTHO
22,723,512 UART: RITY.KEYID = 7
24,435,285 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,798 UART: [art] PUB.X = FADF0FDD40F1DA2CA6B478C1625402DC939FF5E6B134672EDCA5E06689BF7D6C67389D72C5D2634DA817905783E8E4BD
24,444,096 UART: [art] PUB.Y = E0BC7495B19C56B0323D8391778177527A693C0E71801DD2F6FF2F93D778F7199F465CE3FED34DCDD04AAD50B1DE0BAC
24,451,333 UART: [art] SIG.R = DBC2A29D25B7DC6365E27A350DB85837551E8ED570CE69906E88D73E2EA5A27240B3C1CA49C5052D5D2A1615E6551487
24,458,725 UART: [art] SIG.S = A020960AD2ADF8B58D751DEF11BA2D76A1D3A73FD403457136D627987B01A0C2FD0DDF60046313351C67DA878AA00693
25,437,800 UART: Caliptra RT
25,438,498 UART: [state] CFI Enabled
25,603,881 UART: [rt] RT listening for mailbox commands...
29,641,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,797,915 UART: [rt]cmd =0x41544d4e, len=14344
33,793,221 >>> mbox cmd response data (8 bytes)
33,793,810 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,824,826 UART: [rt]cmd =0x41545348, len=116
33,827,282 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,962 writing to cptra_bootfsm_go
193,158 UART:
193,520 UART: Running Caliptra ROM ...
194,623 UART:
604,394 UART: [state] CFI Enabled
619,287 UART: [state] LifecycleState = Unprovisioned
621,196 UART: [state] DebugLocked = No
622,750 UART: [state] WD Timer not started. Device not locked for debugging
625,649 UART: [kat] SHA2-256
804,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,359 UART: [kat] ++
816,886 UART: [kat] sha1
828,047 UART: [kat] SHA2-256
831,059 UART: [kat] SHA2-384
838,252 UART: [kat] SHA2-512-ACC
841,181 UART: [kat] ECC-384
3,283,883 UART: [kat] HMAC-384Kdf
3,296,908 UART: [kat] LMS
3,826,372 UART: [kat] --
3,830,082 UART: [cold-reset] ++
3,831,302 UART: [fht] FHT @ 0x50003400
3,842,697 UART: [idev] ++
3,843,265 UART: [idev] CDI.KEYID = 6
3,844,198 UART: [idev] SUBJECT.KEYID = 7
3,845,376 UART: [idev] UDS.KEYID = 0
3,846,302 ready_for_fw is high
3,846,502 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,874 UART: [idev] Erasing UDS.KEYID = 0
6,318,517 UART: [idev] Sha1 KeyId Algorithm
6,341,685 UART: [idev] --
6,344,703 UART: [ldev] ++
6,345,272 UART: [ldev] CDI.KEYID = 6
6,346,180 UART: [ldev] SUBJECT.KEYID = 5
6,347,335 UART: [ldev] AUTHORITY.KEYID = 7
6,348,615 UART: [ldev] FE.KEYID = 1
6,360,506 UART: [ldev] Erasing FE.KEYID = 1
8,830,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,651 UART: [ldev] --
10,617,652 UART: [fwproc] Wait for Commands...
10,619,325 UART: [fwproc] Recv command 0x46574c44
10,621,422 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,138 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,653 >>> mbox cmd response: success
14,488,895 UART: [afmc] ++
14,489,489 UART: [afmc] CDI.KEYID = 6
14,490,407 UART: [afmc] SUBJECT.KEYID = 7
14,491,567 UART: [afmc] AUTHORITY.KEYID = 5
16,996,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,599 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,452 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,128 UART: [afmc] --
18,792,593 UART: [cold-reset] --
18,796,775 UART: [state] Locking Datavault
18,802,678 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,377 UART: [state] Locking ICCM
18,805,556 UART: [exit] Launching FMC @ 0x40000130
18,813,945 UART:
18,814,177 UART: Running Caliptra FMC ...
18,815,279 UART:
18,815,442 UART: [state] CFI Enabled
18,823,648 UART: [fht] FMC Alias Private Key: 7
20,580,736 UART: [art] Extend RT PCRs Done
20,581,973 UART: [art] Lock RT PCRs Done
20,583,764 UART: [art] Populate DV Done
20,589,440 UART: [fht] FMC Alias Private Key: 7
20,591,136 UART: [art] Derive CDI
20,591,953 UART: [art] Store in in slot 0x4
20,634,063 UART: [art] Derive Key Pair
20,635,107 UART: [art] Store priv key in slot 0x5
23,062,009 UART: [art] Derive Key Pair - Done
23,075,119 UART: [art] Signing Cert with AUTHO
23,076,428 UART: RITY.KEYID = 7
24,781,542 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,061 UART: [art] PUB.X = A71241779A15E85EB94FB07DF7A1BCD8BC2F0E4EC9C31EFD171BB2767561379655487464AFD1A4177366EDD2C6C176A8
24,790,320 UART: [art] PUB.Y = 49AC838CE1D3FE3A0E758FFBAE00AD6A4ED70605DFF5682D7EE684FDC03FABA278698DA8EC3B7F3B6CE9B600537CADF7
24,797,619 UART: [art] SIG.R = F6A42F4B1F486436383057381936D6EC0618895B2B0326943DDE40A0921CB23748D806B8FFAAABFDB2DFA6D8D8C29528
24,804,963 UART: [art] SIG.S = 112616656B89F2F3825A27241ED428FEB20D3EA27EA2A78B2DED21B153E8FEB3BF0FC33B3AB8F7106DE5FF1F491CF33D
25,784,284 UART: Caliptra RT
25,785,003 UART: [state] CFI Enabled
25,902,623 UART: [rt] RT listening for mailbox commands...
29,926,210 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,082,035 UART: [rt]cmd =0x41544d4e, len=14344
34,077,956 >>> mbox cmd response data (8 bytes)
34,078,528 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,109,326 UART: [rt]cmd =0x41545348, len=116
34,111,535 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
3,693,921 ready_for_fw is high
3,694,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,167 >>> mbox cmd response: success
18,515,030 UART:
18,515,446 UART: Running Caliptra FMC ...
18,516,575 UART:
18,516,746 UART: [state] CFI Enabled
18,524,470 UART: [fht] FMC Alias Private Key: 7
20,280,614 UART: [art] Extend RT PCRs Done
20,281,843 UART: [art] Lock RT PCRs Done
20,283,903 UART: [art] Populate DV Done
20,289,373 UART: [fht] FMC Alias Private Key: 7
20,291,072 UART: [art] Derive CDI
20,292,097 UART: [art] Store in in slot 0x4
20,334,162 UART: [art] Derive Key Pair
20,335,168 UART: [art] Store priv key in slot 0x5
22,762,293 UART: [art] Derive Key Pair - Done
22,775,389 UART: [art] Signing Cert with AUTHO
22,776,726 UART: RITY.KEYID = 7
24,482,174 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,683 UART: [art] PUB.X = 319CB5C7E4EEED63CB0C1F22E00AA9F76E82C5CCEEDB858CBDD6A9F218757F67A50B684C445A06890FE1D215A607F0B5
24,490,926 UART: [art] PUB.Y = 245B6640B96098BA73D944B6EA26A60CE6EFEA98EED3C283FD4D5FB2003DCC6066F71041CB45FF20702E815CD780EFC2
24,498,178 UART: [art] SIG.R = DE243E7B0751ABB62B7A7CFBF6E7EA1840AC998FE6657D172091776FAC9B46E9FE3728A4F716B3D340F2BA219F4B4BC8
24,505,645 UART: [art] SIG.S = 203A436E6DB4CCC21EB1C240EE3347276ACD231ABB0C57287394472BBBE4E87446A997A208A1F5FB5F1FB695E29EFD5E
25,484,527 UART: Caliptra RT
25,485,226 UART: [state] CFI Enabled
25,603,029 UART: [rt] RT listening for mailbox commands...
29,626,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,781,866 UART: [rt]cmd =0x41544d4e, len=14344
33,777,435 >>> mbox cmd response data (8 bytes)
33,778,016 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,808,712 UART: [rt]cmd =0x41545348, len=116
33,810,860 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,019 UART:
192,398 UART: Running Caliptra ROM ...
193,703 UART:
193,864 UART: [state] CFI Enabled
261,298 UART: [state] LifecycleState = Unprovisioned
263,375 UART: [state] DebugLocked = No
264,774 UART: [state] WD Timer not started. Device not locked for debugging
269,033 UART: [kat] SHA2-256
458,886 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,695 UART: [kat] ++
470,230 UART: [kat] sha1
481,111 UART: [kat] SHA2-256
484,120 UART: [kat] SHA2-384
491,538 UART: [kat] SHA2-512-ACC
494,123 UART: [kat] ECC-384
2,949,441 UART: [kat] HMAC-384Kdf
2,973,252 UART: [kat] LMS
3,505,007 UART: [kat] --
3,511,346 UART: [cold-reset] ++
3,512,848 UART: [fht] FHT @ 0x50003400
3,524,187 UART: [idev] ++
3,524,917 UART: [idev] CDI.KEYID = 6
3,525,805 UART: [idev] SUBJECT.KEYID = 7
3,527,049 UART: [idev] UDS.KEYID = 0
3,527,956 ready_for_fw is high
3,528,143 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,734 UART: [idev] Erasing UDS.KEYID = 0
6,027,124 UART: [idev] Sha1 KeyId Algorithm
6,049,274 UART: [idev] --
6,054,243 UART: [ldev] ++
6,054,926 UART: [ldev] CDI.KEYID = 6
6,055,854 UART: [ldev] SUBJECT.KEYID = 5
6,057,022 UART: [ldev] AUTHORITY.KEYID = 7
6,058,264 UART: [ldev] FE.KEYID = 1
6,101,812 UART: [ldev] Erasing FE.KEYID = 1
8,607,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,608 UART: [ldev] --
10,414,683 UART: [fwproc] Wait for Commands...
10,416,284 UART: [fwproc] Recv command 0x46574c44
10,418,632 UART: [fwproc] Recv'd Img size: 114168 bytes
13,869,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,839 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,605,710 >>> mbox cmd response: success
14,609,206 UART: [afmc] ++
14,609,922 UART: [afmc] CDI.KEYID = 6
14,611,117 UART: [afmc] SUBJECT.KEYID = 7
14,612,563 UART: [afmc] AUTHORITY.KEYID = 5
17,142,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,863,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,865,777 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,880,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,896,589 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,911,130 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,189 UART: [afmc] --
18,938,896 UART: [cold-reset] --
18,942,229 UART: [state] Locking Datavault
18,944,798 UART: [state] Locking PCR0, PCR1 and PCR31
18,946,956 UART: [state] Locking ICCM
18,948,525 UART: [exit] Launching FMC @ 0x40000130
18,957,221 UART:
18,957,460 UART: Running Caliptra FMC ...
18,958,564 UART:
18,958,724 UART: [state] CFI Enabled
19,021,919 UART: [fht] FMC Alias Private Key: 7
20,786,432 UART: [art] Extend RT PCRs Done
20,787,642 UART: [art] Lock RT PCRs Done
20,789,272 UART: [art] Populate DV Done
20,794,468 UART: [fht] FMC Alias Private Key: 7
20,796,061 UART: [art] Derive CDI
20,796,888 UART: [art] Store in in slot 0x4
20,854,465 UART: [art] Derive Key Pair
20,855,506 UART: [art] Store priv key in slot 0x5
23,318,171 UART: [art] Derive Key Pair - Done
23,331,449 UART: [art] Signing Cert with AUTHO
23,332,757 UART: RITY.KEYID = 7
25,043,941 UART: [art] Erasing AUTHORITY.KEYID = 7
25,045,441 UART: [art] PUB.X = 629C928FA004C04E7313C3AF3AB2708E49BCD76B3647517BCD5530F136E79BA2D52BA65501F89E4D37BC856F10DEDFD6
25,052,710 UART: [art] PUB.Y = BE22974A1E32F57F4561F50E2302A7D46B493193FD68C7FE8E6089708DA467E942374BE506BBCE1FBC3F81CBBAA5EBC4
25,060,004 UART: [art] SIG.R = 65FC8CB6BCC3C47658F61EA5DE29D3CDA6F8D569F9FF9907AD9D70650DEDE455E3BCC38219A100CCE72C147FA47E521B
25,067,393 UART: [art] SIG.S = F9D44266BD16CB4091A176F9AF10D5A553DE6844A5C8157232AE90DC2D2A7ABBFDA35D7B71CE406DFEBD091888C8653D
26,046,665 UART: Caliptra RT
26,047,380 UART: [state] CFI Enabled
26,211,691 UART: [rt] RT listening for mailbox commands...
30,237,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,392,818 UART: [rt]cmd =0x41544d4e, len=14344
34,388,955 >>> mbox cmd response data (8 bytes)
34,389,558 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,420,193 UART: [rt]cmd =0x41545348, len=116
34,422,440 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,416,249 ready_for_fw is high
3,416,687 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,705,606 >>> mbox cmd response: success
18,982,330 UART:
18,982,729 UART: Running Caliptra FMC ...
18,983,852 UART:
18,984,014 UART: [state] CFI Enabled
19,051,111 UART: [fht] FMC Alias Private Key: 7
20,814,689 UART: [art] Extend RT PCRs Done
20,815,913 UART: [art] Lock RT PCRs Done
20,817,244 UART: [art] Populate DV Done
20,822,512 UART: [fht] FMC Alias Private Key: 7
20,824,164 UART: [art] Derive CDI
20,824,902 UART: [art] Store in in slot 0x4
20,883,349 UART: [art] Derive Key Pair
20,884,386 UART: [art] Store priv key in slot 0x5
23,347,554 UART: [art] Derive Key Pair - Done
23,360,292 UART: [art] Signing Cert with AUTHO
23,361,608 UART: RITY.KEYID = 7
25,073,728 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,230 UART: [art] PUB.X = BD54F4D3AD866E0684D013B8C5BC1054491155B756313B18CA94E5EDE5504C77A84F3278A339A1E21EAF49350D128807
25,082,553 UART: [art] PUB.Y = 89CAEF3981144548158744E1777D883719A27A193F1367D68C0AA4BAD4096F3D1D7622FA9F473B1D50DF95DDDDEEF39A
25,089,740 UART: [art] SIG.R = 558461BC64D989091DE980C4D341315481590926873086B641E4021A02E8E2494811D8732CAFF1937D6018E07D581D47
25,097,088 UART: [art] SIG.S = 2B2D6C0F574FFC62BDDF5C3FECDDB25323DA1ECAA139227818934E08DC8D1426121E26A107CA4C7C082F332F23E1C9FF
26,075,839 UART: Caliptra RT
26,076,548 UART: [state] CFI Enabled
26,242,495 UART: [rt] RT listening for mailbox commands...
30,270,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,426,417 UART: [rt]cmd =0x41544d4e, len=14344
34,421,465 >>> mbox cmd response data (8 bytes)
34,422,081 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,452,886 UART: [rt]cmd =0x41545348, len=116
34,455,188 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,788 writing to cptra_bootfsm_go
193,027 UART:
193,394 UART: Running Caliptra ROM ...
194,576 UART:
604,310 UART: [state] CFI Enabled
619,458 UART: [state] LifecycleState = Unprovisioned
621,824 UART: [state] DebugLocked = No
624,057 UART: [state] WD Timer not started. Device not locked for debugging
629,000 UART: [kat] SHA2-256
818,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,691 UART: [kat] ++
830,204 UART: [kat] sha1
842,426 UART: [kat] SHA2-256
845,429 UART: [kat] SHA2-384
851,704 UART: [kat] SHA2-512-ACC
854,315 UART: [kat] ECC-384
3,299,336 UART: [kat] HMAC-384Kdf
3,312,641 UART: [kat] LMS
3,844,427 UART: [kat] --
3,849,842 UART: [cold-reset] ++
3,851,994 UART: [fht] FHT @ 0x50003400
3,862,263 UART: [idev] ++
3,862,899 UART: [idev] CDI.KEYID = 6
3,863,933 UART: [idev] SUBJECT.KEYID = 7
3,865,104 UART: [idev] UDS.KEYID = 0
3,866,050 ready_for_fw is high
3,866,259 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,009,688 UART: [idev] Erasing UDS.KEYID = 0
6,343,861 UART: [idev] Sha1 KeyId Algorithm
6,364,987 UART: [idev] --
6,371,085 UART: [ldev] ++
6,371,781 UART: [ldev] CDI.KEYID = 6
6,372,665 UART: [ldev] SUBJECT.KEYID = 5
6,373,871 UART: [ldev] AUTHORITY.KEYID = 7
6,375,104 UART: [ldev] FE.KEYID = 1
6,385,051 UART: [ldev] Erasing FE.KEYID = 1
8,862,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,180 UART: [ldev] --
10,649,905 UART: [fwproc] Wait for Commands...
10,651,614 UART: [fwproc] Recv command 0x46574c44
10,653,921 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,179,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,295,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,837,780 >>> mbox cmd response: success
14,841,523 UART: [afmc] ++
14,842,229 UART: [afmc] CDI.KEYID = 6
14,843,396 UART: [afmc] SUBJECT.KEYID = 7
14,844,938 UART: [afmc] AUTHORITY.KEYID = 5
17,345,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,914 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,096 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,271 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,089 UART: [afmc] --
19,138,938 UART: [cold-reset] --
19,144,152 UART: [state] Locking Datavault
19,150,645 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,854 UART: [state] Locking ICCM
19,155,043 UART: [exit] Launching FMC @ 0x40000130
19,163,718 UART:
19,163,952 UART: Running Caliptra FMC ...
19,164,983 UART:
19,165,133 UART: [state] CFI Enabled
19,173,178 UART: [fht] FMC Alias Private Key: 7
20,930,207 UART: [art] Extend RT PCRs Done
20,931,431 UART: [art] Lock RT PCRs Done
20,933,246 UART: [art] Populate DV Done
20,938,656 UART: [fht] FMC Alias Private Key: 7
20,940,353 UART: [art] Derive CDI
20,941,091 UART: [art] Store in in slot 0x4
20,983,312 UART: [art] Derive Key Pair
20,984,348 UART: [art] Store priv key in slot 0x5
23,410,939 UART: [art] Derive Key Pair - Done
23,423,742 UART: [art] Signing Cert with AUTHO
23,425,244 UART: RITY.KEYID = 7
25,130,074 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,578 UART: [art] PUB.X = 23012E347112B8A1CB0C40E8FB1348539F18D1E861E516741B47BCC41A8D1812A8C0B6F50D473C8C3398C71B1A5CE6E5
25,138,878 UART: [art] PUB.Y = 230BD289057BFA219692B8E39B0021C39AE2F4E188AE16436F931367185AEFD9F8C7E3B20966D546EDE1065EB9EDFC3F
25,146,107 UART: [art] SIG.R = 59B03C599688CFF075FEF2E1DC85DEC9352AD0153E0C15A1BB99742C6FD43D48AC5ACF75691FC400C0DDB1EDFD120C65
25,153,499 UART: [art] SIG.S = 9BF4B16C072DC22B338BE3FE9BA535CF08ADCC0A1E1AF500FA1008EE71AB535C17A4A9713AF7F5B52950FAAE5F8E5B79
26,132,580 UART: Caliptra RT
26,133,268 UART: [state] CFI Enabled
26,250,862 UART: [rt] RT listening for mailbox commands...
30,271,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,427,160 UART: [rt]cmd =0x41544d4e, len=14344
34,422,815 >>> mbox cmd response data (8 bytes)
34,423,380 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,454,334 UART: [rt]cmd =0x41545348, len=116
34,456,812 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,642 writing to cptra_bootfsm_go
3,758,894 ready_for_fw is high
3,759,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,915 >>> mbox cmd response: success
19,207,973 UART:
19,208,372 UART: Running Caliptra FMC ...
19,209,479 UART:
19,209,637 UART: [state] CFI Enabled
19,217,767 UART: [fht] FMC Alias Private Key: 7
20,974,843 UART: [art] Extend RT PCRs Done
20,976,075 UART: [art] Lock RT PCRs Done
20,977,753 UART: [art] Populate DV Done
20,983,281 UART: [fht] FMC Alias Private Key: 7
20,984,938 UART: [art] Derive CDI
20,985,679 UART: [art] Store in in slot 0x4
21,028,546 UART: [art] Derive Key Pair
21,029,589 UART: [art] Store priv key in slot 0x5
23,456,142 UART: [art] Derive Key Pair - Done
23,469,082 UART: [art] Signing Cert with AUTHO
23,470,381 UART: RITY.KEYID = 7
25,175,947 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,451 UART: [art] PUB.X = 2487F94F9E6835AAD7E81B7860030056828BEFB7E00709714D921603F92BE7AF11099C63ACECFFEF123E128E904D0AC4
25,184,643 UART: [art] PUB.Y = 38563C3CFDE4800232CF8663A7E270E3F74FBF9B1A79A82412EF0B9AC14E7C1AA109B75EDC0D2FD7760FEC0EA62AE1F7
25,191,935 UART: [art] SIG.R = 56DD593BF6DCBE3EDD0059A8C7F28C58F16564B972B09C5AF1B6DBD7F8D49DE173AACF4DBBDD68A9A569B25A3BBA75FA
25,199,339 UART: [art] SIG.S = F3FFB70E24368924B8BF9C54AF94162A24C05E1560EDC12D9E82CCDDA48BD89782A7DFF86BEBB39A952BC947F3A9F222
26,178,520 UART: Caliptra RT
26,179,211 UART: [state] CFI Enabled
26,296,386 UART: [rt] RT listening for mailbox commands...
30,320,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,476,378 UART: [rt]cmd =0x41544d4e, len=14344
34,472,190 >>> mbox cmd response data (8 bytes)
34,472,784 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,503,466 UART: [rt]cmd =0x41545348, len=116
34,505,753 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,245 UART: [kat] SHA2-256
882,176 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,291 UART: [kat] ++
886,443 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,480 UART: [kat] SHA2-512-ACC
897,381 UART: [kat] ECC-384
902,962 UART: [kat] HMAC-384Kdf
907,380 UART: [kat] LMS
1,475,576 UART: [kat] --
1,476,597 UART: [cold-reset] ++
1,477,067 UART: [fht] Storing FHT @ 0x50003400
1,479,788 UART: [idev] ++
1,479,956 UART: [idev] CDI.KEYID = 6
1,480,316 UART: [idev] SUBJECT.KEYID = 7
1,480,740 UART: [idev] UDS.KEYID = 0
1,481,085 ready_for_fw is high
1,481,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,394 UART: [idev] Erasing UDS.KEYID = 0
1,504,932 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,392 UART: [idev] --
1,514,465 UART: [ldev] ++
1,514,633 UART: [ldev] CDI.KEYID = 6
1,514,996 UART: [ldev] SUBJECT.KEYID = 5
1,515,422 UART: [ldev] AUTHORITY.KEYID = 7
1,515,885 UART: [ldev] FE.KEYID = 1
1,520,921 UART: [ldev] Erasing FE.KEYID = 1
1,546,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,378 UART: [ldev] --
1,585,849 UART: [fwproc] Waiting for Commands...
1,586,522 UART: [fwproc] Received command 0x46574c44
1,587,313 UART: [fwproc] Received Image of size 114168 bytes
2,884,741 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,355 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,208 >>> mbox cmd response: success
3,078,312 UART: [afmc] ++
3,078,480 UART: [afmc] CDI.KEYID = 6
3,078,842 UART: [afmc] SUBJECT.KEYID = 7
3,079,267 UART: [afmc] AUTHORITY.KEYID = 5
3,114,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,022 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,802 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,415 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,105 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,162 UART: [afmc] --
3,157,148 UART: [cold-reset] --
3,157,986 UART: [state] Locking Datavault
3,159,021 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,625 UART: [state] Locking ICCM
3,160,143 UART: [exit] Launching FMC @ 0x40000130
3,165,472 UART:
3,165,488 UART: Running Caliptra FMC ...
3,165,896 UART:
3,165,950 UART: [state] CFI Enabled
3,176,245 UART: [fht] FMC Alias Private Key: 7
3,284,170 UART: [art] Extend RT PCRs Done
3,284,598 UART: [art] Lock RT PCRs Done
3,286,200 UART: [art] Populate DV Done
3,294,311 UART: [fht] FMC Alias Private Key: 7
3,295,477 UART: [art] Derive CDI
3,295,757 UART: [art] Store in in slot 0x4
3,381,716 UART: [art] Derive Key Pair
3,382,076 UART: [art] Store priv key in slot 0x5
3,394,956 UART: [art] Derive Key Pair - Done
3,409,702 UART: [art] Signing Cert with AUTHO
3,410,182 UART: RITY.KEYID = 7
3,424,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,745 UART: [art] PUB.X = 20E8114C0E40A06F43423FAE94C4204BC66900F10028CE090AE0B9B7B707604CC2A90BE922F1DFB593B3C816A376E784
3,432,458 UART: [art] PUB.Y = 018BB47BCAE95B6F67207F95D8D89CEFC2AD020AEAF0F088B93EA8667E1A5857E80013F7D227C498BB1BEB63CD0405A5
3,439,387 UART: [art] SIG.R = 4E87AB857604B690738548CCF0765D9EB712DD3B58BB5EEDEED4B27BB0AAC45EF902B2D67F1732DC0F10C0ED59F22DC9
3,446,168 UART: [art] SIG.S = 616448A6CA8FE137473446BA82CECD5185A04C74D336B50EEDDD51933E18CAF48AD5BE127B3FAE53B63D16C0D4281A4B
3,470,460 UART: Caliptra RT
3,470,713 UART: [state] CFI Enabled
3,579,587 UART: [rt] RT listening for mailbox commands...
3,580,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,259 UART: [rt]cmd =0x41544d4e, len=14344
4,013,106 >>> mbox cmd response data (8 bytes)
4,013,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,924 UART: [rt]cmd =0x41545348, len=116
4,044,897 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 ready_for_fw is high
1,362,367 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,542 >>> mbox cmd response: success
2,988,994 UART:
2,989,010 UART: Running Caliptra FMC ...
2,989,418 UART:
2,989,472 UART: [state] CFI Enabled
2,999,931 UART: [fht] FMC Alias Private Key: 7
3,108,398 UART: [art] Extend RT PCRs Done
3,108,826 UART: [art] Lock RT PCRs Done
3,110,704 UART: [art] Populate DV Done
3,118,757 UART: [fht] FMC Alias Private Key: 7
3,119,817 UART: [art] Derive CDI
3,120,097 UART: [art] Store in in slot 0x4
3,205,796 UART: [art] Derive Key Pair
3,206,156 UART: [art] Store priv key in slot 0x5
3,219,244 UART: [art] Derive Key Pair - Done
3,233,621 UART: [art] Signing Cert with AUTHO
3,234,101 UART: RITY.KEYID = 7
3,249,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,252 UART: [art] PUB.X = 80CA5ACA77E091938EE368C7ABA07CBC630FA49668E256008A46E9B796BD0D2C8F1B9F66483064A717536DDFA50A0652
3,256,994 UART: [art] PUB.Y = 31714606BD6CEC5DDCE0169D78BA71ECC5F9A922790BD067AC537BBCF122B79FB390945642A8900581858A879EEEBB2B
3,263,945 UART: [art] SIG.R = 3B4CE5B5A1D36749FBBFB6526BDE0F7ABB2091942DDAE3C018355FBD91E7114002F13D3EC60AE66DC9CD6D4144775087
3,270,720 UART: [art] SIG.S = BE0206016E5C552C66C4FA13A5AE823CFBB3ED41DD553E3CF4F9E45802B948143F168BC51BB1CEBF1FA1D93671D26951
3,294,457 UART: Caliptra RT
3,294,710 UART: [state] CFI Enabled
3,402,983 UART: [rt] RT listening for mailbox commands...
3,403,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,583 UART: [rt]cmd =0x41544d4e, len=14344
3,837,032 >>> mbox cmd response data (8 bytes)
3,837,033 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,040 UART: [rt]cmd =0x41545348, len=116
3,868,681 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,360 UART: [kat] SHA2-256
882,291 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,406 UART: [kat] ++
886,558 UART: [kat] sha1
890,770 UART: [kat] SHA2-256
892,708 UART: [kat] SHA2-384
895,539 UART: [kat] SHA2-512-ACC
897,440 UART: [kat] ECC-384
903,323 UART: [kat] HMAC-384Kdf
907,949 UART: [kat] LMS
1,476,145 UART: [kat] --
1,477,276 UART: [cold-reset] ++
1,477,648 UART: [fht] Storing FHT @ 0x50003400
1,480,465 UART: [idev] ++
1,480,633 UART: [idev] CDI.KEYID = 6
1,480,993 UART: [idev] SUBJECT.KEYID = 7
1,481,417 UART: [idev] UDS.KEYID = 0
1,481,762 ready_for_fw is high
1,481,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,797 UART: [idev] Erasing UDS.KEYID = 0
1,506,597 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,131 UART: [idev] --
1,516,134 UART: [ldev] ++
1,516,302 UART: [ldev] CDI.KEYID = 6
1,516,665 UART: [ldev] SUBJECT.KEYID = 5
1,517,091 UART: [ldev] AUTHORITY.KEYID = 7
1,517,554 UART: [ldev] FE.KEYID = 1
1,522,894 UART: [ldev] Erasing FE.KEYID = 1
1,548,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,479 UART: [ldev] --
1,587,990 UART: [fwproc] Waiting for Commands...
1,588,817 UART: [fwproc] Received command 0x46574c44
1,589,608 UART: [fwproc] Received Image of size 114168 bytes
2,885,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,356 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,425 >>> mbox cmd response: success
3,078,443 UART: [afmc] ++
3,078,611 UART: [afmc] CDI.KEYID = 6
3,078,973 UART: [afmc] SUBJECT.KEYID = 7
3,079,398 UART: [afmc] AUTHORITY.KEYID = 5
3,114,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,471 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,199 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,084 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,774 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,489 UART: [afmc] --
3,157,545 UART: [cold-reset] --
3,158,235 UART: [state] Locking Datavault
3,159,086 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,690 UART: [state] Locking ICCM
3,160,226 UART: [exit] Launching FMC @ 0x40000130
3,165,555 UART:
3,165,571 UART: Running Caliptra FMC ...
3,165,979 UART:
3,166,122 UART: [state] CFI Enabled
3,176,925 UART: [fht] FMC Alias Private Key: 7
3,284,614 UART: [art] Extend RT PCRs Done
3,285,042 UART: [art] Lock RT PCRs Done
3,286,628 UART: [art] Populate DV Done
3,295,105 UART: [fht] FMC Alias Private Key: 7
3,296,275 UART: [art] Derive CDI
3,296,555 UART: [art] Store in in slot 0x4
3,382,250 UART: [art] Derive Key Pair
3,382,610 UART: [art] Store priv key in slot 0x5
3,395,576 UART: [art] Derive Key Pair - Done
3,410,536 UART: [art] Signing Cert with AUTHO
3,411,016 UART: RITY.KEYID = 7
3,426,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,375 UART: [art] PUB.X = DBDEF57007F5EF0BB2581EF390E112E96A58FA9C4AEB483C753CC8EF7752C8B49505660B97FD12A26890E59DABEF7B5E
3,434,151 UART: [art] PUB.Y = C32E9FFEAB57354F2D45F07631E04D2DD2EC02510ADCE2559A282CAD7CFE7B376260B96C0272A216B4D5B29327DD8E71
3,441,104 UART: [art] SIG.R = 8881E6FB4825BBCF79E524E401016283F497B085E0D66B525C68A4DD691579BFE8EC28AED83E7386A90DE360744DE081
3,447,867 UART: [art] SIG.S = 92DA88B24D30F0130C92A6672EFBB4B1C2E2E627A9D4D08F9C2B377B27DA7754AE74EED9CCE62D22BB85D39F4EEFFDE3
3,472,245 UART: Caliptra RT
3,472,590 UART: [state] CFI Enabled
3,581,530 UART: [rt] RT listening for mailbox commands...
3,582,200 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,456 UART: [rt]cmd =0x41544d4e, len=14344
4,015,211 >>> mbox cmd response data (8 bytes)
4,015,212 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,429 UART: [rt]cmd =0x41545348, len=116
4,047,180 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,090 ready_for_fw is high
1,362,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,403 >>> mbox cmd response: success
2,988,193 UART:
2,988,209 UART: Running Caliptra FMC ...
2,988,617 UART:
2,988,760 UART: [state] CFI Enabled
2,999,287 UART: [fht] FMC Alias Private Key: 7
3,107,846 UART: [art] Extend RT PCRs Done
3,108,274 UART: [art] Lock RT PCRs Done
3,109,516 UART: [art] Populate DV Done
3,117,445 UART: [fht] FMC Alias Private Key: 7
3,118,545 UART: [art] Derive CDI
3,118,825 UART: [art] Store in in slot 0x4
3,204,022 UART: [art] Derive Key Pair
3,204,382 UART: [art] Store priv key in slot 0x5
3,217,716 UART: [art] Derive Key Pair - Done
3,232,558 UART: [art] Signing Cert with AUTHO
3,233,038 UART: RITY.KEYID = 7
3,248,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,325 UART: [art] PUB.X = 1FF86A14940D4D24367002FA0AEA14B03690A477574932B61869AD5CB72A00223C76665BD44B9A1746A1FFBA6586D952
3,256,060 UART: [art] PUB.Y = A148885C79A71015FE7180CDA198F2F957603F57CA63C8FA3D10D2B96983418412F071617004373918DDF341E6FDE6AC
3,263,003 UART: [art] SIG.R = 259771FBBD11DB006AA8649514134BF05421CCEB0173A093034428F47203177C4243DE5443B2B8FBDB5AA25CE98D07BD
3,269,741 UART: [art] SIG.S = 52E09F0B0A498A9FEAB66A83CB601646AD020E0479CE5050CF0A0E91DFEBE9F3601974931A4E2331989C047F782C6FC7
3,293,712 UART: Caliptra RT
3,294,057 UART: [state] CFI Enabled
3,403,071 UART: [rt] RT listening for mailbox commands...
3,403,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,789 UART: [rt]cmd =0x41544d4e, len=14344
3,837,160 >>> mbox cmd response data (8 bytes)
3,837,161 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,336 UART: [rt]cmd =0x41545348, len=116
3,869,237 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,912 UART: [state] LifecycleState = Unprovisioned
86,567 UART: [state] DebugLocked = No
87,155 UART: [state] WD Timer not started. Device not locked for debugging
88,370 UART: [kat] SHA2-256
894,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,145 UART: [kat] ++
898,297 UART: [kat] sha1
902,571 UART: [kat] SHA2-256
904,511 UART: [kat] SHA2-384
907,262 UART: [kat] SHA2-512-ACC
909,163 UART: [kat] ECC-384
918,570 UART: [kat] HMAC-384Kdf
923,356 UART: [kat] LMS
1,171,684 UART: [kat] --
1,172,395 UART: [cold-reset] ++
1,172,811 UART: [fht] FHT @ 0x50003400
1,175,336 UART: [idev] ++
1,175,504 UART: [idev] CDI.KEYID = 6
1,175,864 UART: [idev] SUBJECT.KEYID = 7
1,176,288 UART: [idev] UDS.KEYID = 0
1,176,633 ready_for_fw is high
1,176,633 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,206 UART: [idev] Erasing UDS.KEYID = 0
1,201,063 UART: [idev] Sha1 KeyId Algorithm
1,209,563 UART: [idev] --
1,210,607 UART: [ldev] ++
1,210,775 UART: [ldev] CDI.KEYID = 6
1,211,138 UART: [ldev] SUBJECT.KEYID = 5
1,211,564 UART: [ldev] AUTHORITY.KEYID = 7
1,212,027 UART: [ldev] FE.KEYID = 1
1,217,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,416 UART: [fwproc] Wait for Commands...
1,283,086 UART: [fwproc] Recv command 0x46574c44
1,283,814 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,371 >>> mbox cmd response: success
2,773,613 UART: [afmc] ++
2,773,781 UART: [afmc] CDI.KEYID = 6
2,774,143 UART: [afmc] SUBJECT.KEYID = 7
2,774,568 UART: [afmc] AUTHORITY.KEYID = 5
2,810,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,792 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,268 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,153 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,872 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,698 UART: [afmc] --
2,853,610 UART: [cold-reset] --
2,854,488 UART: [state] Locking Datavault
2,855,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,045 UART: [state] Locking ICCM
2,856,613 UART: [exit] Launching FMC @ 0x40000130
2,861,942 UART:
2,861,958 UART: Running Caliptra FMC ...
2,862,366 UART:
2,862,420 UART: [state] CFI Enabled
2,872,801 UART: [fht] FMC Alias Private Key: 7
2,981,186 UART: [art] Extend RT PCRs Done
2,981,614 UART: [art] Lock RT PCRs Done
2,983,184 UART: [art] Populate DV Done
2,991,477 UART: [fht] FMC Alias Private Key: 7
2,992,473 UART: [art] Derive CDI
2,992,753 UART: [art] Store in in slot 0x4
3,078,692 UART: [art] Derive Key Pair
3,079,052 UART: [art] Store priv key in slot 0x5
3,091,942 UART: [art] Derive Key Pair - Done
3,106,963 UART: [art] Signing Cert with AUTHO
3,107,443 UART: RITY.KEYID = 7
3,122,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,168 UART: [art] PUB.X = 3DD00D4F9CBEE91B700F7DD2F352A0238C0DE0CADA25645A84C022849FCD11145ED8EC4471ADF102DE258D3B58703197
3,129,938 UART: [art] PUB.Y = 3FF79CE49D31B76526099D7C1F33E62CC1D76EEFB8B21B47A1A2010C6214A4ACE1FC19A9C239BFE07E0C60DD32E12D11
3,136,892 UART: [art] SIG.R = 6FBB73BAFB08DDB478A840B30E0FDA6B113CAE86DD354D17609EB8F79D3AC7902B585A7440C335AC95E5F654F68258F5
3,143,667 UART: [art] SIG.S = 1684EC627B14DFFA2B976D0B86ABB81012A5276C110D6BD9F22EF63086C3A07F06CA06FCD166E60584BD9933D4A2B0B8
3,167,281 UART: Caliptra RT
3,167,534 UART: [state] CFI Enabled
3,275,179 UART: [rt] RT listening for mailbox commands...
3,275,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,837 UART: [rt]cmd =0x41544d4e, len=14344
3,708,892 >>> mbox cmd response data (8 bytes)
3,708,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,132 UART: [rt]cmd =0x41545348, len=116
3,741,127 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,983 ready_for_fw is high
1,059,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,320 >>> mbox cmd response: success
2,685,120 UART:
2,685,136 UART: Running Caliptra FMC ...
2,685,544 UART:
2,685,598 UART: [state] CFI Enabled
2,696,373 UART: [fht] FMC Alias Private Key: 7
2,804,732 UART: [art] Extend RT PCRs Done
2,805,160 UART: [art] Lock RT PCRs Done
2,806,612 UART: [art] Populate DV Done
2,814,901 UART: [fht] FMC Alias Private Key: 7
2,816,075 UART: [art] Derive CDI
2,816,355 UART: [art] Store in in slot 0x4
2,902,088 UART: [art] Derive Key Pair
2,902,448 UART: [art] Store priv key in slot 0x5
2,915,716 UART: [art] Derive Key Pair - Done
2,930,521 UART: [art] Signing Cert with AUTHO
2,931,001 UART: RITY.KEYID = 7
2,946,255 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,020 UART: [art] PUB.X = 0ACB46C447258482D1E71E70DB9DEA9135B5CF22E9CBD356AEC88B0FDE3A4E7428EFA0F4D306E17E36FF5267557355AD
2,953,797 UART: [art] PUB.Y = C74557F7C9A1D03FBB759371F381308CCEF0D72340E84C816A5CF96E60C0C6C1C104EE60BDACA07D55806A0135608EE0
2,960,749 UART: [art] SIG.R = 001BC711FC496782BEFBC344DB0D1079E477633BCEC35A97411683302ED52DF24930CD86010BA5C8586E8A09C5AC1D85
2,967,489 UART: [art] SIG.S = F941736D9DA9A0BD824EBE93513E841EFFB1B065AC3AE757F37910B903611962AE4F08779AF1486AD8D5645F7A64EA90
2,990,900 UART: Caliptra RT
2,991,153 UART: [state] CFI Enabled
3,097,765 UART: [rt] RT listening for mailbox commands...
3,098,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,283 UART: [rt]cmd =0x41544d4e, len=14344
3,531,298 >>> mbox cmd response data (8 bytes)
3,531,299 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,412 UART: [rt]cmd =0x41545348, len=116
3,563,105 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
906,737 UART: [kat] SHA2-512-ACC
908,638 UART: [kat] ECC-384
918,559 UART: [kat] HMAC-384Kdf
923,201 UART: [kat] LMS
1,171,529 UART: [kat] --
1,172,570 UART: [cold-reset] ++
1,173,014 UART: [fht] FHT @ 0x50003400
1,175,863 UART: [idev] ++
1,176,031 UART: [idev] CDI.KEYID = 6
1,176,391 UART: [idev] SUBJECT.KEYID = 7
1,176,815 UART: [idev] UDS.KEYID = 0
1,177,160 ready_for_fw is high
1,177,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,817 UART: [idev] Erasing UDS.KEYID = 0
1,201,988 UART: [idev] Sha1 KeyId Algorithm
1,210,478 UART: [idev] --
1,211,526 UART: [ldev] ++
1,211,694 UART: [ldev] CDI.KEYID = 6
1,212,057 UART: [ldev] SUBJECT.KEYID = 5
1,212,483 UART: [ldev] AUTHORITY.KEYID = 7
1,212,946 UART: [ldev] FE.KEYID = 1
1,217,948 UART: [ldev] Erasing FE.KEYID = 1
1,243,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,520 UART: [ldev] --
1,282,985 UART: [fwproc] Wait for Commands...
1,283,703 UART: [fwproc] Recv command 0x46574c44
1,284,431 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,476 >>> mbox cmd response: success
2,774,592 UART: [afmc] ++
2,774,760 UART: [afmc] CDI.KEYID = 6
2,775,122 UART: [afmc] SUBJECT.KEYID = 7
2,775,547 UART: [afmc] AUTHORITY.KEYID = 5
2,812,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,602 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,125 UART: [afmc] --
2,855,077 UART: [cold-reset] --
2,856,083 UART: [state] Locking Datavault
2,857,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,736 UART: [state] Locking ICCM
2,858,342 UART: [exit] Launching FMC @ 0x40000130
2,863,671 UART:
2,863,687 UART: Running Caliptra FMC ...
2,864,095 UART:
2,864,238 UART: [state] CFI Enabled
2,875,033 UART: [fht] FMC Alias Private Key: 7
2,983,508 UART: [art] Extend RT PCRs Done
2,983,936 UART: [art] Lock RT PCRs Done
2,985,620 UART: [art] Populate DV Done
2,993,735 UART: [fht] FMC Alias Private Key: 7
2,994,833 UART: [art] Derive CDI
2,995,113 UART: [art] Store in in slot 0x4
3,080,772 UART: [art] Derive Key Pair
3,081,132 UART: [art] Store priv key in slot 0x5
3,095,066 UART: [art] Derive Key Pair - Done
3,109,875 UART: [art] Signing Cert with AUTHO
3,110,355 UART: RITY.KEYID = 7
3,126,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,790 UART: [art] PUB.X = C795A2EA15B08930D28A972FACF84986AA258F83E9A535924AD8183AA9C7FE55470B14293CD7C3E1D90644220CDF34A4
3,133,555 UART: [art] PUB.Y = C9016B214E51A366536DF75D428656D1F51E5F39956FD5B122C1E014F1EE03EAB8ADA89196288ED2B37AA01CB24DC852
3,140,505 UART: [art] SIG.R = 1529CBED2065566A4C345A20A73878BF48CE83030DD61DCF3B70A5E110DA43D5A85953625A07E319FB36D5DA43017930
3,147,263 UART: [art] SIG.S = 2DADB322FCB58DA4379A363C8AC1CDA5E3D2C9C5DFD61ABE37544F13A4B73B52297E577D804FBCDF2082999C9E545DA5
3,171,670 UART: Caliptra RT
3,172,015 UART: [state] CFI Enabled
3,280,428 UART: [rt] RT listening for mailbox commands...
3,281,098 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,390 UART: [rt]cmd =0x41544d4e, len=14344
3,714,251 >>> mbox cmd response data (8 bytes)
3,714,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,181 UART: [rt]cmd =0x41545348, len=116
3,745,988 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,502 ready_for_fw is high
1,061,502 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,419 >>> mbox cmd response: success
2,688,625 UART:
2,688,641 UART: Running Caliptra FMC ...
2,689,049 UART:
2,689,192 UART: [state] CFI Enabled
2,699,559 UART: [fht] FMC Alias Private Key: 7
2,806,994 UART: [art] Extend RT PCRs Done
2,807,422 UART: [art] Lock RT PCRs Done
2,808,992 UART: [art] Populate DV Done
2,817,161 UART: [fht] FMC Alias Private Key: 7
2,818,097 UART: [art] Derive CDI
2,818,377 UART: [art] Store in in slot 0x4
2,904,016 UART: [art] Derive Key Pair
2,904,376 UART: [art] Store priv key in slot 0x5
2,917,294 UART: [art] Derive Key Pair - Done
2,932,492 UART: [art] Signing Cert with AUTHO
2,932,972 UART: RITY.KEYID = 7
2,948,392 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,157 UART: [art] PUB.X = 41632516ADF40150A8F61BC98070CC69909C00C3533890FB8EEC71C747A0D55B21C48A049D02D6892AB7C7FDB728B79A
2,955,898 UART: [art] PUB.Y = 2B1F46D2C8805D4BD70BDC77493098071176EBFFE25733DF0A0A2A80F2421A495BB0E153568433E3A7BDF59C3FEF4591
2,962,842 UART: [art] SIG.R = 0F4808D310E10704A490E2F4980404F1C35A4783A54736CDB91227F81C05F12405B5D02C9F8754C42125E387F10E3286
2,969,571 UART: [art] SIG.S = 968622A8ED05774E60C2A200793ACBFC1C9143B03CD3B8C283FC3F41DE1D4F1192DB9DF2398F96BD19192B28F93E92C4
2,993,665 UART: Caliptra RT
2,994,010 UART: [state] CFI Enabled
3,103,401 UART: [rt] RT listening for mailbox commands...
3,104,071 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,885 UART: [rt]cmd =0x41544d4e, len=14344
3,536,140 >>> mbox cmd response data (8 bytes)
3,536,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,234 UART: [rt]cmd =0x41545348, len=116
3,568,079 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,174,805 ready_for_fw is high
1,174,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,813 UART: [idev] Erasing UDS.KEYID = 0
1,199,385 UART: [idev] Sha1 KeyId Algorithm
1,208,029 UART: [idev] --
1,209,204 UART: [ldev] ++
1,209,372 UART: [ldev] CDI.KEYID = 6
1,209,736 UART: [ldev] SUBJECT.KEYID = 5
1,210,163 UART: [ldev] AUTHORITY.KEYID = 7
1,210,626 UART: [ldev] FE.KEYID = 1
1,215,946 UART: [ldev] Erasing FE.KEYID = 1
1,242,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,772 UART: [ldev] --
1,281,158 UART: [fwproc] Wait for Commands...
1,281,889 UART: [fwproc] Recv command 0x46574c44
1,282,622 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,745 >>> mbox cmd response: success
2,771,938 UART: [afmc] ++
2,772,106 UART: [afmc] CDI.KEYID = 6
2,772,469 UART: [afmc] SUBJECT.KEYID = 7
2,772,895 UART: [afmc] AUTHORITY.KEYID = 5
2,808,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,661 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,273 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,992 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,795 UART: [afmc] --
2,851,709 UART: [cold-reset] --
2,852,503 UART: [state] Locking Datavault
2,853,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,230 UART: [state] Locking ICCM
2,854,766 UART: [exit] Launching FMC @ 0x40000130
2,860,095 UART:
2,860,111 UART: Running Caliptra FMC ...
2,860,519 UART:
2,860,573 UART: [state] CFI Enabled
2,871,404 UART: [fht] FMC Alias Private Key: 7
2,979,389 UART: [art] Extend RT PCRs Done
2,979,817 UART: [art] Lock RT PCRs Done
2,981,457 UART: [art] Populate DV Done
2,989,520 UART: [fht] FMC Alias Private Key: 7
2,990,582 UART: [art] Derive CDI
2,990,862 UART: [art] Store in in slot 0x4
3,076,429 UART: [art] Derive Key Pair
3,076,789 UART: [art] Store priv key in slot 0x5
3,089,861 UART: [art] Derive Key Pair - Done
3,104,533 UART: [art] Signing Cert with AUTHO
3,105,013 UART: RITY.KEYID = 7
3,120,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,508 UART: [art] PUB.X = D3C4DFA2904A1E9FE70A4634929F95BADCF954260D057BA288B00177AD24665DB557EF920CF7DB3DBFB2A655E4B20531
3,128,272 UART: [art] PUB.Y = 0807FC4C456854E656D42B5B3D4CC864B732CA4C9F8D4D311A1A944515A5F0F4B1DFA2BCD758D5844969CEF50A8E56D4
3,135,223 UART: [art] SIG.R = 333C1AC8C9D8863CE87A7D2214C4F7E0EF3454EA42580CE656E8D9C17E0A92B94CFEDE0ECBC5A22A30D6DC99EA959AA8
3,142,006 UART: [art] SIG.S = 7DB28BFD290900A63B8EA639A5B90A31AAD4973266D8CE7E2D2FB387A8355C641E04CB5ECD0B57D8EDD721E7D72D67F0
3,166,223 UART: Caliptra RT
3,166,476 UART: [state] CFI Enabled
3,273,757 UART: [rt] RT listening for mailbox commands...
3,274,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,531 UART: [rt]cmd =0x41544d4e, len=14344
3,707,126 >>> mbox cmd response data (8 bytes)
3,707,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,128 UART: [rt]cmd =0x41545348, len=116
3,739,103 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,330 ready_for_fw is high
1,056,330 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,381 >>> mbox cmd response: success
2,681,077 UART:
2,681,093 UART: Running Caliptra FMC ...
2,681,501 UART:
2,681,555 UART: [state] CFI Enabled
2,691,904 UART: [fht] FMC Alias Private Key: 7
2,799,619 UART: [art] Extend RT PCRs Done
2,800,047 UART: [art] Lock RT PCRs Done
2,801,559 UART: [art] Populate DV Done
2,809,896 UART: [fht] FMC Alias Private Key: 7
2,811,026 UART: [art] Derive CDI
2,811,306 UART: [art] Store in in slot 0x4
2,897,243 UART: [art] Derive Key Pair
2,897,603 UART: [art] Store priv key in slot 0x5
2,910,769 UART: [art] Derive Key Pair - Done
2,925,424 UART: [art] Signing Cert with AUTHO
2,925,904 UART: RITY.KEYID = 7
2,941,860 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,625 UART: [art] PUB.X = 2499A66656BB710E4E6F821AAC3F797B4E92FCA3AC4E617B7D44AD3677424C2E4C1B33F4D6D7E2DB9A5ED054E818ACAC
2,949,410 UART: [art] PUB.Y = E1ECE7957BF9BF869BFE3B17C5021371EAD3D67429CC28866793E2D46BB7024EAE0572773BB807359FD33D2BB47C2C26
2,956,356 UART: [art] SIG.R = D3CD3C3076CBF3B8FAF5DFF4DBFCCF911CFC5D63C869BC1046DA737A7F779FA1012D03C8C19A7A3F2A62B89750C76233
2,963,142 UART: [art] SIG.S = 29E852D0BEC292D6C9ED5C738E63224C8DF73C3C52AD04A9EE1CC510206884C77BB04F33C7211CC45F7135308351FAF5
2,987,078 UART: Caliptra RT
2,987,331 UART: [state] CFI Enabled
3,094,814 UART: [rt] RT listening for mailbox commands...
3,095,484 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,704 UART: [rt]cmd =0x41544d4e, len=14344
3,528,495 >>> mbox cmd response data (8 bytes)
3,528,496 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,633 UART: [rt]cmd =0x41545348, len=116
3,560,622 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,773 UART: [kat] LMS
1,169,085 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,308 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,174,380 ready_for_fw is high
1,174,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,199,922 UART: [idev] Sha1 KeyId Algorithm
1,208,736 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,299 UART: [ldev] Erasing FE.KEYID = 1
1,242,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,282,005 UART: [fwproc] Wait for Commands...
1,282,670 UART: [fwproc] Recv command 0x46574c44
1,283,403 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,478 >>> mbox cmd response: success
2,772,605 UART: [afmc] ++
2,772,773 UART: [afmc] CDI.KEYID = 6
2,773,136 UART: [afmc] SUBJECT.KEYID = 7
2,773,562 UART: [afmc] AUTHORITY.KEYID = 5
2,809,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,074 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,793 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,700 UART: [afmc] --
2,852,806 UART: [cold-reset] --
2,853,580 UART: [state] Locking Datavault
2,854,889 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,493 UART: [state] Locking ICCM
2,856,013 UART: [exit] Launching FMC @ 0x40000130
2,861,342 UART:
2,861,358 UART: Running Caliptra FMC ...
2,861,766 UART:
2,861,909 UART: [state] CFI Enabled
2,872,630 UART: [fht] FMC Alias Private Key: 7
2,981,529 UART: [art] Extend RT PCRs Done
2,981,957 UART: [art] Lock RT PCRs Done
2,983,509 UART: [art] Populate DV Done
2,992,000 UART: [fht] FMC Alias Private Key: 7
2,992,942 UART: [art] Derive CDI
2,993,222 UART: [art] Store in in slot 0x4
3,078,945 UART: [art] Derive Key Pair
3,079,305 UART: [art] Store priv key in slot 0x5
3,092,273 UART: [art] Derive Key Pair - Done
3,107,075 UART: [art] Signing Cert with AUTHO
3,107,555 UART: RITY.KEYID = 7
3,122,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,232 UART: [art] PUB.X = C46D6C05AE8E90EB9CBE5480C92972B0E38F87AF8441546EFBCF488AD23B6BECC197EAF75C4A1EFBA4D9DD573AF765D3
3,130,025 UART: [art] PUB.Y = AE294414DEEB29B3F604C5F510B4AD42F1C1B846C2A155074E8B1294DE31B828476A17D9C6E3A3FCF2DFB7D0A1EDFC31
3,136,987 UART: [art] SIG.R = 8376FFB1C2232E9EEDA289B0F2A15666478720765AD74DF064B98C43014B924A3A57A53B7290CFDE40CE135CA9E1BAF1
3,143,762 UART: [art] SIG.S = 26AAD02BDD5116079B0EA49592FF4DFF8FFB71B30BA745E3F6BFBE768B06C1F233F7D59DD16DE6AB0F7CCA4FB65DFC6E
3,167,492 UART: Caliptra RT
3,167,837 UART: [state] CFI Enabled
3,276,184 UART: [rt] RT listening for mailbox commands...
3,276,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,732 UART: [rt]cmd =0x41544d4e, len=14344
3,709,817 >>> mbox cmd response data (8 bytes)
3,709,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,773 UART: [rt]cmd =0x41545348, len=116
3,741,452 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,631 ready_for_fw is high
1,055,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,852 >>> mbox cmd response: success
2,682,660 UART:
2,682,676 UART: Running Caliptra FMC ...
2,683,084 UART:
2,683,227 UART: [state] CFI Enabled
2,693,860 UART: [fht] FMC Alias Private Key: 7
2,801,753 UART: [art] Extend RT PCRs Done
2,802,181 UART: [art] Lock RT PCRs Done
2,803,883 UART: [art] Populate DV Done
2,812,122 UART: [fht] FMC Alias Private Key: 7
2,813,160 UART: [art] Derive CDI
2,813,440 UART: [art] Store in in slot 0x4
2,899,397 UART: [art] Derive Key Pair
2,899,757 UART: [art] Store priv key in slot 0x5
2,913,137 UART: [art] Derive Key Pair - Done
2,928,262 UART: [art] Signing Cert with AUTHO
2,928,742 UART: RITY.KEYID = 7
2,943,830 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,595 UART: [art] PUB.X = 692CF113612A798B0D89CBCFFFD21116B2B98D99A0E1C01BFBDA56ADAC7096641A4FED244758A3E2FF8F8DD525FE2DF0
2,951,384 UART: [art] PUB.Y = 3E85EFBA819DC332E2189F5C8EA06A1F0EBAAB99E13596AE28900735380C63DFDB844EC203DB51C5D39B6F922F133460
2,958,332 UART: [art] SIG.R = 2732C54021BEB8C3665724A8C570341F5F48B1CF833E84EFAAE6B83794D0A8C07E8A88A97180914CD7880C4C7F63958A
2,965,099 UART: [art] SIG.S = D0C3E3872834C1373076E1D6B97E36CE9214BE34329B147E9C8308BA7AF8BA309BF881A66C6F89BA6B76AE4E7FC0D135
2,989,041 UART: Caliptra RT
2,989,386 UART: [state] CFI Enabled
3,098,001 UART: [rt] RT listening for mailbox commands...
3,098,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,543 UART: [rt]cmd =0x41544d4e, len=14344
3,531,224 >>> mbox cmd response data (8 bytes)
3,531,225 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,262 UART: [rt]cmd =0x41545348, len=116
3,563,263 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,159 UART:
192,516 UART: Running Caliptra ROM ...
193,701 UART:
193,852 UART: [state] CFI Enabled
263,942 UART: [state] LifecycleState = Unprovisioned
265,929 UART: [state] DebugLocked = No
268,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,673 UART: [kat] SHA2-256
442,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,891 UART: [kat] ++
453,374 UART: [kat] sha1
464,405 UART: [kat] SHA2-256
467,097 UART: [kat] SHA2-384
473,164 UART: [kat] SHA2-512-ACC
475,542 UART: [kat] ECC-384
2,766,383 UART: [kat] HMAC-384Kdf
2,777,786 UART: [kat] LMS
3,968,090 UART: [kat] --
3,972,968 UART: [cold-reset] ++
3,973,904 UART: [fht] Storing FHT @ 0x50003400
3,985,040 UART: [idev] ++
3,985,650 UART: [idev] CDI.KEYID = 6
3,986,556 UART: [idev] SUBJECT.KEYID = 7
3,987,799 UART: [idev] UDS.KEYID = 0
3,988,874 ready_for_fw is high
3,989,093 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,132,202 UART: [idev] Erasing UDS.KEYID = 0
7,324,857 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,852 UART: [idev] --
7,351,219 UART: [ldev] ++
7,351,868 UART: [ldev] CDI.KEYID = 6
7,352,774 UART: [ldev] SUBJECT.KEYID = 5
7,353,977 UART: [ldev] AUTHORITY.KEYID = 7
7,355,253 UART: [ldev] FE.KEYID = 1
7,401,569 UART: [ldev] Erasing FE.KEYID = 1
10,733,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,348 UART: [ldev] --
13,093,632 UART: [fwproc] Waiting for Commands...
13,095,286 UART: [fwproc] Received command 0x46574c44
13,097,465 UART: [fwproc] Received Image of size 113844 bytes
17,150,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,390 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,609,940 >>> mbox cmd response: success
17,614,474 UART: [afmc] ++
17,615,082 UART: [afmc] CDI.KEYID = 6
17,615,994 UART: [afmc] SUBJECT.KEYID = 7
17,617,147 UART: [afmc] AUTHORITY.KEYID = 5
20,984,531 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,669 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,928 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,304,317 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,319,184 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,606 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,912 UART: [afmc] --
23,358,890 UART: [cold-reset] --
23,361,250 UART: [state] Locking Datavault
23,363,792 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,564 UART: [state] Locking ICCM
23,367,869 UART: [exit] Launching FMC @ 0x40000130
23,376,256 UART:
23,376,484 UART: Running Caliptra FMC ...
23,377,576 UART:
23,377,733 UART: [state] CFI Enabled
23,448,403 UART: [fht] FMC Alias Private Key: 7
25,786,568 UART: [art] Extend RT PCRs Done
25,787,788 UART: [art] Lock RT PCRs Done
25,789,719 UART: [art] Populate DV Done
25,795,248 UART: [fht] FMC Alias Private Key: 7
25,796,774 UART: [art] Derive CDI
25,797,504 UART: [art] Store in in slot 0x4
25,857,114 UART: [art] Derive Key Pair
25,858,174 UART: [art] Store priv key in slot 0x5
29,150,836 UART: [art] Derive Key Pair - Done
29,164,008 UART: [art] Signing Cert with AUTHO
29,165,306 UART: RITY.KEYID = 7
31,452,252 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,761 UART: [art] PUB.X = 1F175E1FCC2338C352CFDF049E1C501A6F678F7099275E706C302D6D1BA52F73B26FA739B6B2656F90BF65E028ADCFB3
31,460,974 UART: [art] PUB.Y = 398DA2BADC4D7D2E0B023DDAF9A31AFC0B4A2D4ABACB46A6DBF74BD91A04624761A979DB7FB164DDDE4F9367CC9D0F7F
31,468,323 UART: [art] SIG.R = E183EA2E87EB3FDA4724B51463F5A0B6AC50B11866EC9E1FD15B007EC32C0CA09729AB4426B47492312C0A9D2FC5F4A1
31,475,680 UART: [art] SIG.S = F85703062DE261C72D4AC00D5E831EF41337D9895A07CF5B3BF4DE5B2B42377AFCEA38AD0F77AA64A3CFA1671422E96F
32,780,964 UART: Caliptra RT
32,781,678 UART: [state] CFI Enabled
32,961,190 UART: [rt] RT listening for mailbox commands...
36,991,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,146,710 UART: [rt]cmd =0x41544d4e, len=14344
42,447,681 >>> mbox cmd response data (8 bytes)
42,448,282 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,478,734 UART: [rt]cmd =0x41545348, len=116
42,480,980 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,807,322 ready_for_fw is high
3,807,743 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,863,759 >>> mbox cmd response: success
23,566,249 UART:
23,566,635 UART: Running Caliptra FMC ...
23,567,733 UART:
23,567,890 UART: [state] CFI Enabled
23,638,811 UART: [fht] FMC Alias Private Key: 7
25,976,486 UART: [art] Extend RT PCRs Done
25,977,708 UART: [art] Lock RT PCRs Done
25,979,088 UART: [art] Populate DV Done
25,984,732 UART: [fht] FMC Alias Private Key: 7
25,986,305 UART: [art] Derive CDI
25,987,065 UART: [art] Store in in slot 0x4
26,047,539 UART: [art] Derive Key Pair
26,048,589 UART: [art] Store priv key in slot 0x5
29,341,178 UART: [art] Derive Key Pair - Done
29,353,686 UART: [art] Signing Cert with AUTHO
29,354,980 UART: RITY.KEYID = 7
31,643,592 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,104 UART: [art] PUB.X = 327BDCC2403EED5E3ECD44345C378DBEDA7D10B13F5059493A4CC7BD0442B4843BEF8327CCD5B7D3A1FBFC0D33A07427
31,652,369 UART: [art] PUB.Y = 42E25FCD9E0723C27E28C75F2C7E81BDDA148C639C64EE712546BADE4943D46BDC23BA2EF47D9C80383E1759DE9B614D
31,659,626 UART: [art] SIG.R = F7454274252B7F7FF53B26F8791AC6DBF2BAA8AA76C735A45512FA100D2AA86BE7C104AD14ACF711809BE0C607C998CB
31,667,030 UART: [art] SIG.S = DD77714BBB58F61002D3ECF6677D122D5A10032512A625F6F1A74887EF1D4B194BC500AF5F75EBC60489B350F067C7E6
32,971,952 UART: Caliptra RT
32,972,651 UART: [state] CFI Enabled
33,132,522 UART: [rt] RT listening for mailbox commands...
37,161,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,317,184 UART: [rt]cmd =0x41544d4e, len=14344
42,617,965 >>> mbox cmd response data (8 bytes)
42,618,613 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,649,247 UART: [rt]cmd =0x41545348, len=116
42,651,345 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,312 UART:
192,679 UART: Running Caliptra ROM ...
193,845 UART:
603,508 UART: [state] CFI Enabled
619,462 UART: [state] LifecycleState = Unprovisioned
621,345 UART: [state] DebugLocked = No
623,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,286 UART: [kat] SHA2-256
798,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,546 UART: [kat] ++
808,994 UART: [kat] sha1
820,033 UART: [kat] SHA2-256
822,735 UART: [kat] SHA2-384
828,947 UART: [kat] SHA2-512-ACC
831,321 UART: [kat] ECC-384
3,112,489 UART: [kat] HMAC-384Kdf
3,124,457 UART: [kat] LMS
4,314,518 UART: [kat] --
4,319,269 UART: [cold-reset] ++
4,320,208 UART: [fht] Storing FHT @ 0x50003400
4,331,755 UART: [idev] ++
4,332,323 UART: [idev] CDI.KEYID = 6
4,333,211 UART: [idev] SUBJECT.KEYID = 7
4,334,457 UART: [idev] UDS.KEYID = 0
4,335,637 ready_for_fw is high
4,335,846 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,762 UART: [idev] Erasing UDS.KEYID = 0
7,620,447 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,711 UART: [idev] --
7,646,673 UART: [ldev] ++
7,647,242 UART: [ldev] CDI.KEYID = 6
7,648,210 UART: [ldev] SUBJECT.KEYID = 5
7,649,418 UART: [ldev] AUTHORITY.KEYID = 7
7,650,648 UART: [ldev] FE.KEYID = 1
7,661,854 UART: [ldev] Erasing FE.KEYID = 1
10,953,894 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,008 UART: [ldev] --
13,316,501 UART: [fwproc] Waiting for Commands...
13,319,459 UART: [fwproc] Received command 0x46574c44
13,321,641 UART: [fwproc] Received Image of size 113844 bytes
17,376,275 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,108 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,836,282 >>> mbox cmd response: success
17,840,200 UART: [afmc] ++
17,840,799 UART: [afmc] CDI.KEYID = 6
17,841,789 UART: [afmc] SUBJECT.KEYID = 7
17,843,013 UART: [afmc] AUTHORITY.KEYID = 5
21,156,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,052 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,305 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,709 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,524 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,948 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,244 UART: [afmc] --
23,523,538 UART: [cold-reset] --
23,526,853 UART: [state] Locking Datavault
23,532,154 UART: [state] Locking PCR0, PCR1 and PCR31
23,533,913 UART: [state] Locking ICCM
23,536,180 UART: [exit] Launching FMC @ 0x40000130
23,544,613 UART:
23,544,855 UART: Running Caliptra FMC ...
23,545,978 UART:
23,546,146 UART: [state] CFI Enabled
23,554,464 UART: [fht] FMC Alias Private Key: 7
25,885,443 UART: [art] Extend RT PCRs Done
25,886,659 UART: [art] Lock RT PCRs Done
25,888,549 UART: [art] Populate DV Done
25,894,015 UART: [fht] FMC Alias Private Key: 7
25,895,662 UART: [art] Derive CDI
25,896,479 UART: [art] Store in in slot 0x4
25,938,964 UART: [art] Derive Key Pair
25,940,014 UART: [art] Store priv key in slot 0x5
29,181,926 UART: [art] Derive Key Pair - Done
29,194,817 UART: [art] Signing Cert with AUTHO
29,196,123 UART: RITY.KEYID = 7
31,475,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,374 UART: [art] PUB.X = 0D1AEAFF5504E1C308CAA0D90B3236693FDA8BADB07E85946BAAD50927BE16C08143B33956F39485BFFA4FEB1632D682
31,484,658 UART: [art] PUB.Y = E1C382439161D775DAF5A433E251CD8A175BEC93DDF64DD7AC64076F1A674F7D8FD1A63380E963330DF6EA95CE079701
31,491,859 UART: [art] SIG.R = C1C61032D09926FCB9B4DDE70849F2B3C612686CEB6300EE418596673D09EFF798F934423FED38CB70CFC781192AD6E7
31,499,216 UART: [art] SIG.S = A2A918355B3C752B268CFA17C0F598B0163C5F8607C4C11900B5492164317BE66FB46327C6EBBAD780D5A2F4C722FBA3
32,804,255 UART: Caliptra RT
32,804,950 UART: [state] CFI Enabled
32,922,564 UART: [rt] RT listening for mailbox commands...
37,093,559 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,249,213 UART: [rt]cmd =0x41544d4e, len=14344
42,549,793 >>> mbox cmd response data (8 bytes)
42,550,377 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,581,008 UART: [rt]cmd =0x41545348, len=116
42,583,195 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,129,040 ready_for_fw is high
4,129,577 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,071,719 >>> mbox cmd response: success
23,717,861 UART:
23,718,254 UART: Running Caliptra FMC ...
23,719,414 UART:
23,719,581 UART: [state] CFI Enabled
23,727,650 UART: [fht] FMC Alias Private Key: 7
26,058,236 UART: [art] Extend RT PCRs Done
26,059,483 UART: [art] Lock RT PCRs Done
26,061,023 UART: [art] Populate DV Done
26,066,652 UART: [fht] FMC Alias Private Key: 7
26,068,248 UART: [art] Derive CDI
26,069,070 UART: [art] Store in in slot 0x4
26,112,103 UART: [art] Derive Key Pair
26,113,144 UART: [art] Store priv key in slot 0x5
29,356,054 UART: [art] Derive Key Pair - Done
29,368,999 UART: [art] Signing Cert with AUTHO
29,370,302 UART: RITY.KEYID = 7
31,649,861 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,403 UART: [art] PUB.X = A0275AB444B067D8DFD059977FDA4554A60D04EF0E3981EB49E3949F01111712B86AF43609B38DD2F317C7A6DFE321B0
31,658,612 UART: [art] PUB.Y = C567F2C04B2A5C62CF8C05DE966D76DBB0C300FF40EE7DB39F65BBC3D6EFF690C0D79FC7E8F49B83D7F0A140EE122911
31,665,861 UART: [art] SIG.R = 2EA4D4D81B6DC93077AF1EE4D4296DFD1E706CBFC895A9785271D20CBB6BE18640722E0F77A03CCDBFBD49FD8C30A972
31,673,316 UART: [art] SIG.S = 94983E7021EC134008C9CA8D8EF702940CCD3CDE1F03B99EE69BF72CB2F3601589352B3CF17A2DDF51BC494D1B6B7B14
32,978,639 UART: Caliptra RT
32,979,358 UART: [state] CFI Enabled
33,096,553 UART: [rt] RT listening for mailbox commands...
37,266,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,422,712 UART: [rt]cmd =0x41544d4e, len=14344
42,723,681 >>> mbox cmd response data (8 bytes)
42,724,379 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,755,073 UART: [rt]cmd =0x41545348, len=116
42,756,912 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,029 UART:
192,402 UART: Running Caliptra ROM ...
193,509 UART:
193,651 UART: [state] CFI Enabled
265,330 UART: [state] LifecycleState = Unprovisioned
267,167 UART: [state] DebugLocked = No
269,684 UART: [state] WD Timer not started. Device not locked for debugging
272,650 UART: [kat] SHA2-256
451,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,368 UART: [kat] ++
463,822 UART: [kat] sha1
474,548 UART: [kat] SHA2-256
477,551 UART: [kat] SHA2-384
485,252 UART: [kat] SHA2-512-ACC
488,192 UART: [kat] ECC-384
2,952,098 UART: [kat] HMAC-384Kdf
2,972,887 UART: [kat] LMS
3,502,304 UART: [kat] --
3,507,572 UART: [cold-reset] ++
3,509,432 UART: [fht] FHT @ 0x50003400
3,519,842 UART: [idev] ++
3,520,411 UART: [idev] CDI.KEYID = 6
3,521,441 UART: [idev] SUBJECT.KEYID = 7
3,522,546 UART: [idev] UDS.KEYID = 0
3,523,477 ready_for_fw is high
3,523,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,270 UART: [idev] Erasing UDS.KEYID = 0
6,031,998 UART: [idev] Sha1 KeyId Algorithm
6,055,539 UART: [idev] --
6,060,055 UART: [ldev] ++
6,060,640 UART: [ldev] CDI.KEYID = 6
6,061,559 UART: [ldev] SUBJECT.KEYID = 5
6,062,741 UART: [ldev] AUTHORITY.KEYID = 7
6,063,977 UART: [ldev] FE.KEYID = 1
6,103,356 UART: [ldev] Erasing FE.KEYID = 1
8,609,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,565 UART: [ldev] --
10,419,422 UART: [fwproc] Wait for Commands...
10,422,062 UART: [fwproc] Recv command 0x46574c44
10,424,155 UART: [fwproc] Recv'd Img size: 114168 bytes
13,828,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,289,192 >>> mbox cmd response: success
14,293,347 UART: [afmc] ++
14,293,946 UART: [afmc] CDI.KEYID = 6
14,294,862 UART: [afmc] SUBJECT.KEYID = 7
14,296,020 UART: [afmc] AUTHORITY.KEYID = 5
16,832,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,560,031 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,575,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,591,800 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,267 UART: [afmc] --
18,633,538 UART: [cold-reset] --
18,637,504 UART: [state] Locking Datavault
18,642,492 UART: [state] Locking PCR0, PCR1 and PCR31
18,644,143 UART: [state] Locking ICCM
18,646,724 UART: [exit] Launching FMC @ 0x40000130
18,655,139 UART:
18,655,376 UART: Running Caliptra FMC ...
18,656,473 UART:
18,656,630 UART: [state] CFI Enabled
18,714,347 UART: [fht] FMC Alias Private Key: 7
20,478,056 UART: [art] Extend RT PCRs Done
20,479,280 UART: [art] Lock RT PCRs Done
20,480,854 UART: [art] Populate DV Done
20,486,374 UART: [fht] FMC Alias Private Key: 7
20,488,029 UART: [art] Derive CDI
20,488,846 UART: [art] Store in in slot 0x4
20,546,921 UART: [art] Derive Key Pair
20,547,959 UART: [art] Store priv key in slot 0x5
23,010,965 UART: [art] Derive Key Pair - Done
23,023,908 UART: [art] Signing Cert with AUTHO
23,025,212 UART: RITY.KEYID = 7
24,736,908 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,412 UART: [art] PUB.X = 12BEC1F500DFC2439F8EB3B99115BE2CC9D8D98BBB84AF96A2D9F6E136A9932DE09E4714BDE95FC804C9E2D48933DA32
24,745,669 UART: [art] PUB.Y = 4CB144ACCE527E7E9806FAF00C9ECE7DC557A65244909189F82909983BB4065FD20C431338C7CB773B84147F750CBECD
24,752,958 UART: [art] SIG.R = D804A26B30D68EE3E1172B45DE35FFBC708409BD3A48E90FA0DBC89ACF5B61A8C43EF4EA1F2623D334240F5B9759751B
24,760,357 UART: [art] SIG.S = E5CEC7E834899AF0F3E4C64447236B2221DC8DAE7F5CDBA3BED38AB0F061B0B2F6D06B49F4DEA92909BD5DF8D4904AF7
25,738,799 UART: Caliptra RT
25,739,481 UART: [state] CFI Enabled
25,904,429 UART: [rt] RT listening for mailbox commands...
29,928,508 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,083,913 UART: [rt]cmd =0x41544d4e, len=14344
34,079,475 >>> mbox cmd response data (8 bytes)
34,080,057 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,110,946 UART: [rt]cmd =0x41545348, len=116
34,113,152 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,359,300 ready_for_fw is high
3,359,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,045,191 >>> mbox cmd response: success
18,321,626 UART:
18,322,015 UART: Running Caliptra FMC ...
18,323,209 UART:
18,323,380 UART: [state] CFI Enabled
18,391,488 UART: [fht] FMC Alias Private Key: 7
20,155,556 UART: [art] Extend RT PCRs Done
20,156,775 UART: [art] Lock RT PCRs Done
20,158,407 UART: [art] Populate DV Done
20,163,820 UART: [fht] FMC Alias Private Key: 7
20,165,521 UART: [art] Derive CDI
20,166,337 UART: [art] Store in in slot 0x4
20,223,777 UART: [art] Derive Key Pair
20,224,820 UART: [art] Store priv key in slot 0x5
22,688,277 UART: [art] Derive Key Pair - Done
22,701,263 UART: [art] Signing Cert with AUTHO
22,702,604 UART: RITY.KEYID = 7
24,414,009 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,522 UART: [art] PUB.X = A7E1B36882C68FB7EEBA077E10AB1E895A7E364CF8C4866A7A95C3DDB01C28258329797620298608B2EFB8EEBD2A2B8A
24,422,813 UART: [art] PUB.Y = 4E967D69F1B7B11963D1982C68D29241E4D20C4B4D0AFE64BDBED02AB90EB39B5E847E700E409AD3EEC4345C4AA1B9EB
24,430,109 UART: [art] SIG.R = 4A5865E81050AAA8F836FC181D2BA69CA0F2978DE1AF439FBCB670F251CAB4055142BBA60C7AA85F27510C60C6A29177
24,437,496 UART: [art] SIG.S = 356F3BE34564AC19F116EF2733387D1C7D20C8CDD1A305A96A48D17D6AEEE5D6DDED81A1C62EF8C1EF81A91CED73F800
25,416,128 UART: Caliptra RT
25,416,831 UART: [state] CFI Enabled
25,583,085 UART: [rt] RT listening for mailbox commands...
29,615,490 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,770,854 UART: [rt]cmd =0x41544d4e, len=14344
33,766,455 >>> mbox cmd response data (8 bytes)
33,767,074 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,797,814 UART: [rt]cmd =0x41545348, len=116
33,799,649 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
193,026 UART:
193,401 UART: Running Caliptra ROM ...
194,594 UART:
604,002 UART: [state] CFI Enabled
618,238 UART: [state] LifecycleState = Unprovisioned
620,105 UART: [state] DebugLocked = No
621,417 UART: [state] WD Timer not started. Device not locked for debugging
625,604 UART: [kat] SHA2-256
804,712 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,294 UART: [kat] ++
816,741 UART: [kat] sha1
828,179 UART: [kat] SHA2-256
831,260 UART: [kat] SHA2-384
837,333 UART: [kat] SHA2-512-ACC
840,342 UART: [kat] ECC-384
3,278,711 UART: [kat] HMAC-384Kdf
3,290,880 UART: [kat] LMS
3,820,422 UART: [kat] --
3,824,938 UART: [cold-reset] ++
3,826,025 UART: [fht] FHT @ 0x50003400
3,837,374 UART: [idev] ++
3,837,985 UART: [idev] CDI.KEYID = 6
3,838,918 UART: [idev] SUBJECT.KEYID = 7
3,839,964 UART: [idev] UDS.KEYID = 0
3,841,032 ready_for_fw is high
3,841,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,535 UART: [idev] Erasing UDS.KEYID = 0
6,314,930 UART: [idev] Sha1 KeyId Algorithm
6,337,808 UART: [idev] --
6,343,473 UART: [ldev] ++
6,344,042 UART: [ldev] CDI.KEYID = 6
6,344,928 UART: [ldev] SUBJECT.KEYID = 5
6,346,136 UART: [ldev] AUTHORITY.KEYID = 7
6,347,425 UART: [ldev] FE.KEYID = 1
6,357,719 UART: [ldev] Erasing FE.KEYID = 1
8,827,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,615 UART: [ldev] --
10,618,877 UART: [fwproc] Wait for Commands...
10,620,586 UART: [fwproc] Recv command 0x46574c44
10,622,674 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,867 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,478,366 >>> mbox cmd response: success
14,483,275 UART: [afmc] ++
14,483,885 UART: [afmc] CDI.KEYID = 6
14,484,800 UART: [afmc] SUBJECT.KEYID = 7
14,485,961 UART: [afmc] AUTHORITY.KEYID = 5
16,983,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,706,511 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,171 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,567 UART: [afmc] --
18,781,235 UART: [cold-reset] --
18,786,230 UART: [state] Locking Datavault
18,792,125 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,767 UART: [state] Locking ICCM
18,795,698 UART: [exit] Launching FMC @ 0x40000130
18,804,074 UART:
18,804,327 UART: Running Caliptra FMC ...
18,805,430 UART:
18,805,601 UART: [state] CFI Enabled
18,813,644 UART: [fht] FMC Alias Private Key: 7
20,570,941 UART: [art] Extend RT PCRs Done
20,572,158 UART: [art] Lock RT PCRs Done
20,573,840 UART: [art] Populate DV Done
20,579,537 UART: [fht] FMC Alias Private Key: 7
20,581,237 UART: [art] Derive CDI
20,582,056 UART: [art] Store in in slot 0x4
20,624,393 UART: [art] Derive Key Pair
20,625,395 UART: [art] Store priv key in slot 0x5
23,052,743 UART: [art] Derive Key Pair - Done
23,065,703 UART: [art] Signing Cert with AUTHO
23,067,010 UART: RITY.KEYID = 7
24,772,551 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,051 UART: [art] PUB.X = 2EBC6CD0E6144C87BA57A94F9BC9EA07C3B7FDC1D886A9F845DC6D94C9046262335950B1DCBA1C0A151A2B496E7690A5
24,781,366 UART: [art] PUB.Y = E1017514514DC951E87254D826E0D3DE76E8E9A8B0AB4E63E2E9F58BA49F2109C68A127AF9402DBE45BBAC3CBD376547
24,788,610 UART: [art] SIG.R = 4906031730F7013AF32DC0ACA4C5FD023C39A7554AA17B02481C80E46FE1A032187DBD458AD43FA379BCFC7377039FAF
24,796,003 UART: [art] SIG.S = 1DC2E4BCA34E59C7036A9272CA3B83EB2B284A8399E1CC48C1176342408EC9C0F01CE857BC27D4D8A60D7FEAE7F6A982
25,774,654 UART: Caliptra RT
25,775,356 UART: [state] CFI Enabled
25,892,968 UART: [rt] RT listening for mailbox commands...
29,919,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,074,463 UART: [rt]cmd =0x41544d4e, len=14344
34,070,160 >>> mbox cmd response data (8 bytes)
34,070,718 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,101,190 UART: [rt]cmd =0x41545348, len=116
34,103,263 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,763 writing to cptra_bootfsm_go
3,692,173 ready_for_fw is high
3,692,720 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,408 >>> mbox cmd response: success
18,509,295 UART:
18,509,695 UART: Running Caliptra FMC ...
18,510,822 UART:
18,510,984 UART: [state] CFI Enabled
18,518,565 UART: [fht] FMC Alias Private Key: 7
20,275,340 UART: [art] Extend RT PCRs Done
20,276,574 UART: [art] Lock RT PCRs Done
20,277,985 UART: [art] Populate DV Done
20,283,391 UART: [fht] FMC Alias Private Key: 7
20,284,927 UART: [art] Derive CDI
20,285,742 UART: [art] Store in in slot 0x4
20,328,475 UART: [art] Derive Key Pair
20,329,508 UART: [art] Store priv key in slot 0x5
22,755,936 UART: [art] Derive Key Pair - Done
22,768,935 UART: [art] Signing Cert with AUTHO
22,770,252 UART: RITY.KEYID = 7
24,475,205 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,840 UART: [art] PUB.X = FA50E6A8F4F8C49ECBC277BD3C45D3A60AEBF8C8F6AB1D478141B6B918BFE7E336F55CE53718CC1AFE44E4E2F194FDD8
24,483,991 UART: [art] PUB.Y = CC21E51C8D059545B8635B608259A06056B1A9F1C1A07CE06C21BC03B4FA8A75032B89308BA0B0B86638A49DE0F93290
24,491,257 UART: [art] SIG.R = E0976F5CBB0470D6BA7D2CC94E85680DEB941B76AEC68B3AB4B43784F86D2E5231B3903CC4E81CC3E5BC14F3976C6A1E
24,498,655 UART: [art] SIG.S = 86FE532BE2C8B1B7EFA99CF07A7246C9ABCF7EABFF720507C77323C051E2A278D10BAB3746A5AB5D4E312952D8D52F31
25,477,513 UART: Caliptra RT
25,478,221 UART: [state] CFI Enabled
25,595,558 UART: [rt] RT listening for mailbox commands...
29,624,666 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,780,230 UART: [rt]cmd =0x41544d4e, len=14344
33,776,460 >>> mbox cmd response data (8 bytes)
33,777,042 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,807,780 UART: [rt]cmd =0x41545348, len=116
33,810,205 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,067 UART:
192,437 UART: Running Caliptra ROM ...
193,584 UART:
193,734 UART: [state] CFI Enabled
266,947 UART: [state] LifecycleState = Unprovisioned
269,293 UART: [state] DebugLocked = No
270,549 UART: [state] WD Timer not started. Device not locked for debugging
275,471 UART: [kat] SHA2-256
465,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,112 UART: [kat] ++
476,594 UART: [kat] sha1
487,613 UART: [kat] SHA2-256
490,670 UART: [kat] SHA2-384
497,522 UART: [kat] SHA2-512-ACC
500,107 UART: [kat] ECC-384
2,949,709 UART: [kat] HMAC-384Kdf
2,971,416 UART: [kat] LMS
3,503,172 UART: [kat] --
3,508,174 UART: [cold-reset] ++
3,510,108 UART: [fht] FHT @ 0x50003400
3,522,508 UART: [idev] ++
3,523,217 UART: [idev] CDI.KEYID = 6
3,524,202 UART: [idev] SUBJECT.KEYID = 7
3,525,391 UART: [idev] UDS.KEYID = 0
3,526,318 ready_for_fw is high
3,526,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,244 UART: [idev] Erasing UDS.KEYID = 0
6,028,384 UART: [idev] Sha1 KeyId Algorithm
6,051,504 UART: [idev] --
6,057,713 UART: [ldev] ++
6,058,400 UART: [ldev] CDI.KEYID = 6
6,059,314 UART: [ldev] SUBJECT.KEYID = 5
6,060,475 UART: [ldev] AUTHORITY.KEYID = 7
6,061,706 UART: [ldev] FE.KEYID = 1
6,101,685 UART: [ldev] Erasing FE.KEYID = 1
8,608,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,281 UART: [ldev] --
10,407,893 UART: [fwproc] Wait for Commands...
10,409,703 UART: [fwproc] Recv command 0x46574c44
10,412,020 UART: [fwproc] Recv'd Img size: 114168 bytes
13,853,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,590,555 >>> mbox cmd response: success
14,594,716 UART: [afmc] ++
14,595,438 UART: [afmc] CDI.KEYID = 6
14,596,638 UART: [afmc] SUBJECT.KEYID = 7
14,598,088 UART: [afmc] AUTHORITY.KEYID = 5
17,141,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,868,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,870,370 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,885,560 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,900,651 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,915,699 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,938,848 UART: [afmc] --
18,941,579 UART: [cold-reset] --
18,945,561 UART: [state] Locking Datavault
18,949,909 UART: [state] Locking PCR0, PCR1 and PCR31
18,952,067 UART: [state] Locking ICCM
18,954,450 UART: [exit] Launching FMC @ 0x40000130
18,963,148 UART:
18,963,381 UART: Running Caliptra FMC ...
18,964,412 UART:
18,964,558 UART: [state] CFI Enabled
19,016,805 UART: [fht] FMC Alias Private Key: 7
20,781,093 UART: [art] Extend RT PCRs Done
20,782,315 UART: [art] Lock RT PCRs Done
20,784,076 UART: [art] Populate DV Done
20,789,603 UART: [fht] FMC Alias Private Key: 7
20,791,045 UART: [art] Derive CDI
20,791,818 UART: [art] Store in in slot 0x4
20,850,001 UART: [art] Derive Key Pair
20,851,048 UART: [art] Store priv key in slot 0x5
23,313,820 UART: [art] Derive Key Pair - Done
23,326,712 UART: [art] Signing Cert with AUTHO
23,328,025 UART: RITY.KEYID = 7
25,039,448 UART: [art] Erasing AUTHORITY.KEYID = 7
25,040,958 UART: [art] PUB.X = 857474894CBBC814C7BD021E6E03B4DD8EB567EF4FBF0B42AD42C5C543D4BDA9CB52E7984959253343AB81D1E76DC43F
25,048,426 UART: [art] PUB.Y = 3AD0713B7BE10F635E84F285FC63F597CF6B678AF8EC0F03C53126793C9CBBD07A9877EB086EACE72E34585084419D1A
25,055,525 UART: [art] SIG.R = 02DC416D07C3F1351CDBE48A933CB24FC57D5BFBF26EC748429158814C05AEFAE2227B9356BF99307F1833B6A51DCB15
25,062,908 UART: [art] SIG.S = B743B3FAAAAFC11281550C22FAA51C132D53BF6DF1FA2857273EA9AD7FB4D57FF83AB19FB86D903C3F9F3219F4F6052C
26,042,050 UART: Caliptra RT
26,042,749 UART: [state] CFI Enabled
26,207,146 UART: [rt] RT listening for mailbox commands...
30,238,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,394,453 UART: [rt]cmd =0x41544d4e, len=14344
34,389,570 >>> mbox cmd response data (8 bytes)
34,390,158 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,420,839 UART: [rt]cmd =0x41545348, len=116
34,422,909 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,436,355 ready_for_fw is high
3,436,819 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,771 >>> mbox cmd response: success
19,041,687 UART:
19,042,110 UART: Running Caliptra FMC ...
19,043,241 UART:
19,043,411 UART: [state] CFI Enabled
19,107,909 UART: [fht] FMC Alias Private Key: 7
20,872,138 UART: [art] Extend RT PCRs Done
20,873,355 UART: [art] Lock RT PCRs Done
20,875,038 UART: [art] Populate DV Done
20,880,623 UART: [fht] FMC Alias Private Key: 7
20,882,222 UART: [art] Derive CDI
20,882,962 UART: [art] Store in in slot 0x4
20,940,499 UART: [art] Derive Key Pair
20,941,540 UART: [art] Store priv key in slot 0x5
23,404,401 UART: [art] Derive Key Pair - Done
23,417,398 UART: [art] Signing Cert with AUTHO
23,418,700 UART: RITY.KEYID = 7
25,129,585 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,093 UART: [art] PUB.X = 59E205EB990589ED84A2F71393204A64DCAF68A40B139A623C97C76557F13426F2F019A3DCF8ADB5266EC30C7940BE36
25,138,350 UART: [art] PUB.Y = 9AEC87E30578C15AA106655AEED292C56F7F0CFFBCB2095471B85E2D2422C4EB8AAD86CC26F10EA398BE2A10786F2F4D
25,145,626 UART: [art] SIG.R = 067C3D18D4F7D688409F312FA0351C8C17DC58E4A52E8EF6ED87B673DDEC7565EA14047E346A460DC682D38BF9732FB1
25,153,003 UART: [art] SIG.S = 582B0498FBD21AC7E1668D812979E777F25051FA2A8E37BBC9B73AB6154B3D2D564A9B3365CA0958813CD8E9F3FB40C8
26,131,808 UART: Caliptra RT
26,132,525 UART: [state] CFI Enabled
26,298,205 UART: [rt] RT listening for mailbox commands...
30,321,728 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,477,675 UART: [rt]cmd =0x41544d4e, len=14344
34,473,341 >>> mbox cmd response data (8 bytes)
34,473,911 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,504,702 UART: [rt]cmd =0x41545348, len=116
34,506,614 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,623 writing to cptra_bootfsm_go
192,699 UART:
193,100 UART: Running Caliptra ROM ...
194,294 UART:
604,031 UART: [state] CFI Enabled
619,330 UART: [state] LifecycleState = Unprovisioned
621,706 UART: [state] DebugLocked = No
624,142 UART: [state] WD Timer not started. Device not locked for debugging
627,911 UART: [kat] SHA2-256
817,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,541 UART: [kat] ++
829,060 UART: [kat] sha1
840,119 UART: [kat] SHA2-256
843,171 UART: [kat] SHA2-384
849,523 UART: [kat] SHA2-512-ACC
852,105 UART: [kat] ECC-384
3,294,281 UART: [kat] HMAC-384Kdf
3,308,363 UART: [kat] LMS
3,840,243 UART: [kat] --
3,846,016 UART: [cold-reset] ++
3,847,667 UART: [fht] FHT @ 0x50003400
3,857,935 UART: [idev] ++
3,858,652 UART: [idev] CDI.KEYID = 6
3,859,686 UART: [idev] SUBJECT.KEYID = 7
3,860,789 UART: [idev] UDS.KEYID = 0
3,862,049 ready_for_fw is high
3,862,253 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,639 UART: [idev] Erasing UDS.KEYID = 0
6,335,896 UART: [idev] Sha1 KeyId Algorithm
6,357,213 UART: [idev] --
6,363,177 UART: [ldev] ++
6,363,913 UART: [ldev] CDI.KEYID = 6
6,364,839 UART: [ldev] SUBJECT.KEYID = 5
6,365,995 UART: [ldev] AUTHORITY.KEYID = 7
6,367,223 UART: [ldev] FE.KEYID = 1
6,378,242 UART: [ldev] Erasing FE.KEYID = 1
8,854,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,883 UART: [ldev] --
10,643,253 UART: [fwproc] Wait for Commands...
10,646,423 UART: [fwproc] Recv command 0x46574c44
10,648,750 UART: [fwproc] Recv'd Img size: 114168 bytes
14,102,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,655 >>> mbox cmd response: success
14,842,331 UART: [afmc] ++
14,843,040 UART: [afmc] CDI.KEYID = 6
14,844,206 UART: [afmc] SUBJECT.KEYID = 7
14,845,746 UART: [afmc] AUTHORITY.KEYID = 5
17,348,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,703 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,737 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,401 UART: [afmc] --
19,147,337 UART: [cold-reset] --
19,151,094 UART: [state] Locking Datavault
19,158,397 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,570 UART: [state] Locking ICCM
19,163,137 UART: [exit] Launching FMC @ 0x40000130
19,171,812 UART:
19,172,047 UART: Running Caliptra FMC ...
19,173,086 UART:
19,173,238 UART: [state] CFI Enabled
19,181,177 UART: [fht] FMC Alias Private Key: 7
20,937,312 UART: [art] Extend RT PCRs Done
20,938,526 UART: [art] Lock RT PCRs Done
20,940,174 UART: [art] Populate DV Done
20,945,857 UART: [fht] FMC Alias Private Key: 7
20,947,445 UART: [art] Derive CDI
20,948,184 UART: [art] Store in in slot 0x4
20,990,683 UART: [art] Derive Key Pair
20,991,683 UART: [art] Store priv key in slot 0x5
23,418,908 UART: [art] Derive Key Pair - Done
23,431,535 UART: [art] Signing Cert with AUTHO
23,432,846 UART: RITY.KEYID = 7
25,138,724 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,231 UART: [art] PUB.X = 3594640B0750C01DCC4744F624C4C7977A80A328E28B4EA4B6F488BE60E0650F6863A2277F7CCB767F2F7FCFC37644FB
25,147,487 UART: [art] PUB.Y = A9D1AA290F3DE79D1C752C52B735A0F2EAED4A67385AAF897EE08990418E5E75451CD5D4A9E1DB03197DCD7A569A197B
25,154,776 UART: [art] SIG.R = F14F666F6FCC2BB50CF3027FB935DBA0E3DD341F5C983FE6EA89B973C164C3CDD3ED96D54C937D383BCA45E71DF6ECEF
25,162,212 UART: [art] SIG.S = 9D3DF2D285CF1E7001A0926A8EFCB3FC9F03590F451430C0B332C38E4850E57D5B9082E54621FAAD1372926F0C616875
26,141,502 UART: Caliptra RT
26,142,189 UART: [state] CFI Enabled
26,260,643 UART: [rt] RT listening for mailbox commands...
30,285,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,440,552 UART: [rt]cmd =0x41544d4e, len=14344
34,436,370 >>> mbox cmd response data (8 bytes)
34,437,001 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,467,685 UART: [rt]cmd =0x41545348, len=116
34,469,952 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,701 writing to cptra_bootfsm_go
3,750,932 ready_for_fw is high
3,751,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,938,212 >>> mbox cmd response: success
19,192,843 UART:
19,193,244 UART: Running Caliptra FMC ...
19,194,353 UART:
19,194,509 UART: [state] CFI Enabled
19,202,628 UART: [fht] FMC Alias Private Key: 7
20,959,906 UART: [art] Extend RT PCRs Done
20,961,137 UART: [art] Lock RT PCRs Done
20,962,684 UART: [art] Populate DV Done
20,967,994 UART: [fht] FMC Alias Private Key: 7
20,969,531 UART: [art] Derive CDI
20,970,298 UART: [art] Store in in slot 0x4
21,013,111 UART: [art] Derive Key Pair
21,014,160 UART: [art] Store priv key in slot 0x5
23,441,052 UART: [art] Derive Key Pair - Done
23,454,102 UART: [art] Signing Cert with AUTHO
23,455,410 UART: RITY.KEYID = 7
25,161,325 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,824 UART: [art] PUB.X = 38ACF7F67F91890C208DF12A7F962FAE3D50F495A7CE51AEE27593989BD0673AFD53891C4D2DDB69D1CE9AAD35178311
25,170,121 UART: [art] PUB.Y = 59D3470043E0B7958337EECF70D30428FBAACA5194A578229A2D41E02933C70512661B5A1D1A6C252B628DF3AF705482
25,177,361 UART: [art] SIG.R = 9627A9B6CBC3A9D07877E19F10C305404952FA76913DF7701313F8B6CA2F11A5724A41AAFA2D4B40B788B3ADBEC4C54A
25,184,753 UART: [art] SIG.S = 72DEF76CDE13BD0477C89834E243397756785997DFB8DE38DB3889E993060C3CB218A04EE0F6CF9FC3E434D6D7DA2197
26,163,335 UART: Caliptra RT
26,164,022 UART: [state] CFI Enabled
26,281,736 UART: [rt] RT listening for mailbox commands...
30,316,386 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,471,798 UART: [rt]cmd =0x41544d4e, len=14344
34,466,994 >>> mbox cmd response data (8 bytes)
34,467,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,498,397 UART: [rt]cmd =0x41545348, len=116
34,500,824 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,086 UART: [kat] SHA2-512-ACC
896,987 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,497 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 ready_for_fw is high
1,480,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,956 UART: [idev] Erasing UDS.KEYID = 0
1,504,374 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,178 UART: [idev] --
1,514,235 UART: [ldev] ++
1,514,403 UART: [ldev] CDI.KEYID = 6
1,514,766 UART: [ldev] SUBJECT.KEYID = 5
1,515,192 UART: [ldev] AUTHORITY.KEYID = 7
1,515,655 UART: [ldev] FE.KEYID = 1
1,520,797 UART: [ldev] Erasing FE.KEYID = 1
1,545,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,214 UART: [ldev] --
1,585,529 UART: [fwproc] Waiting for Commands...
1,586,172 UART: [fwproc] Received command 0x46574c44
1,586,963 UART: [fwproc] Received Image of size 114168 bytes
2,883,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,375 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,264 >>> mbox cmd response: success
3,076,524 UART: [afmc] ++
3,076,692 UART: [afmc] CDI.KEYID = 6
3,077,054 UART: [afmc] SUBJECT.KEYID = 7
3,077,479 UART: [afmc] AUTHORITY.KEYID = 5
3,112,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,126 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,634 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,519 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,209 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,052 UART: [afmc] --
3,156,036 UART: [cold-reset] --
3,156,950 UART: [state] Locking Datavault
3,158,113 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,717 UART: [state] Locking ICCM
3,159,303 UART: [exit] Launching FMC @ 0x40000130
3,164,632 UART:
3,164,648 UART: Running Caliptra FMC ...
3,165,056 UART:
3,165,110 UART: [state] CFI Enabled
3,175,427 UART: [fht] FMC Alias Private Key: 7
3,283,848 UART: [art] Extend RT PCRs Done
3,284,276 UART: [art] Lock RT PCRs Done
3,285,814 UART: [art] Populate DV Done
3,293,879 UART: [fht] FMC Alias Private Key: 7
3,294,947 UART: [art] Derive CDI
3,295,227 UART: [art] Store in in slot 0x4
3,381,252 UART: [art] Derive Key Pair
3,381,612 UART: [art] Store priv key in slot 0x5
3,394,896 UART: [art] Derive Key Pair - Done
3,409,653 UART: [art] Signing Cert with AUTHO
3,410,133 UART: RITY.KEYID = 7
3,425,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,970 UART: [art] PUB.X = 443A9A7652FF072A91308D6A4D5987EFD06BFC00459F68449CBF02A3C55E62F5BC9D2E974970C5350BA1A7E9E0A414C6
3,432,715 UART: [art] PUB.Y = 8E705AD7D7E8406E42D9ECAB5DC8A4837260C178753CEA223D82C414CDBC49F2DC7F5AF94F6BADC09895F3BA2FDADEE1
3,439,691 UART: [art] SIG.R = D3FD0D84B4E4F8EFCCADB25724F322B2CED42658CA2E76C7153A19280BA23D11FBFFB3FCD2794F137E88B0CE1A62ACF7
3,446,481 UART: [art] SIG.S = EA4E3E20760B5D9FE57E131DE91780D8E36B405762663F0BB21771D34395BED07453937DF9D44A21049E1EA6D21B2623
3,470,029 UART: Caliptra RT
3,470,282 UART: [state] CFI Enabled
3,578,666 UART: [rt] RT listening for mailbox commands...
3,579,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,420 UART: [rt]cmd =0x41544d4e, len=14344
4,012,377 >>> mbox cmd response data (8 bytes)
4,012,378 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,447 UART: [rt]cmd =0x41545348, len=116
4,044,218 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 ready_for_fw is high
1,362,205 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,190 >>> mbox cmd response: success
2,988,068 UART:
2,988,084 UART: Running Caliptra FMC ...
2,988,492 UART:
2,988,546 UART: [state] CFI Enabled
2,998,765 UART: [fht] FMC Alias Private Key: 7
3,106,870 UART: [art] Extend RT PCRs Done
3,107,298 UART: [art] Lock RT PCRs Done
3,108,564 UART: [art] Populate DV Done
3,116,681 UART: [fht] FMC Alias Private Key: 7
3,117,825 UART: [art] Derive CDI
3,118,105 UART: [art] Store in in slot 0x4
3,204,104 UART: [art] Derive Key Pair
3,204,464 UART: [art] Store priv key in slot 0x5
3,218,034 UART: [art] Derive Key Pair - Done
3,232,434 UART: [art] Signing Cert with AUTHO
3,232,914 UART: RITY.KEYID = 7
3,248,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,803 UART: [art] PUB.X = 17D596C14C06820E28116506BFA415DE80A078C702A3E97B7134EDC2CA1DECA4E2A85C3C5E326E563FCB5ACC03A20387
3,255,565 UART: [art] PUB.Y = 690177A3F9A67A6F854DBFC73233868AB4D4BACACE9F666A86612159813D029AC9C82BBD614ECE10FAFFB223D332A149
3,262,521 UART: [art] SIG.R = 7D49722CD475037025EF3061C6F79FFD004E7BF6C77C6E9F0B9D853DFAC6860AA87EC13F1B6AD0BA5B7ED4C783B4E477
3,269,276 UART: [art] SIG.S = 5447080701FFA08EAADB3F8D1DAEE99137E571A89DFD3BCF8BE335A0D228760FD3FF0FF1A89BCB1F85B1FE84BB08369B
3,294,069 UART: Caliptra RT
3,294,322 UART: [state] CFI Enabled
3,402,252 UART: [rt] RT listening for mailbox commands...
3,402,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,982 UART: [rt]cmd =0x41544d4e, len=14344
3,835,931 >>> mbox cmd response data (8 bytes)
3,835,932 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,087 UART: [rt]cmd =0x41545348, len=116
3,868,010 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,833 UART: [state] LifecycleState = Unprovisioned
85,488 UART: [state] DebugLocked = No
86,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,744 UART: [kat] SHA2-256
881,675 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,790 UART: [kat] ++
885,942 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
895,045 UART: [kat] SHA2-512-ACC
896,946 UART: [kat] ECC-384
902,523 UART: [kat] HMAC-384Kdf
907,093 UART: [kat] LMS
1,475,289 UART: [kat] --
1,476,082 UART: [cold-reset] ++
1,476,656 UART: [fht] Storing FHT @ 0x50003400
1,479,471 UART: [idev] ++
1,479,639 UART: [idev] CDI.KEYID = 6
1,479,999 UART: [idev] SUBJECT.KEYID = 7
1,480,423 UART: [idev] UDS.KEYID = 0
1,480,768 ready_for_fw is high
1,480,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,651 UART: [idev] Erasing UDS.KEYID = 0
1,505,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,778 UART: [ldev] ++
1,514,946 UART: [ldev] CDI.KEYID = 6
1,515,309 UART: [ldev] SUBJECT.KEYID = 5
1,515,735 UART: [ldev] AUTHORITY.KEYID = 7
1,516,198 UART: [ldev] FE.KEYID = 1
1,521,560 UART: [ldev] Erasing FE.KEYID = 1
1,547,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,557 UART: [ldev] --
1,586,872 UART: [fwproc] Waiting for Commands...
1,587,691 UART: [fwproc] Received command 0x46574c44
1,588,482 UART: [fwproc] Received Image of size 114168 bytes
2,884,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,083 >>> mbox cmd response: success
3,078,345 UART: [afmc] ++
3,078,513 UART: [afmc] CDI.KEYID = 6
3,078,875 UART: [afmc] SUBJECT.KEYID = 7
3,079,300 UART: [afmc] AUTHORITY.KEYID = 5
3,114,295 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,731 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,344 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,034 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,159 UART: [afmc] --
3,158,047 UART: [cold-reset] --
3,159,029 UART: [state] Locking Datavault
3,160,214 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,818 UART: [state] Locking ICCM
3,161,304 UART: [exit] Launching FMC @ 0x40000130
3,166,633 UART:
3,166,649 UART: Running Caliptra FMC ...
3,167,057 UART:
3,167,200 UART: [state] CFI Enabled
3,177,903 UART: [fht] FMC Alias Private Key: 7
3,285,824 UART: [art] Extend RT PCRs Done
3,286,252 UART: [art] Lock RT PCRs Done
3,287,588 UART: [art] Populate DV Done
3,295,707 UART: [fht] FMC Alias Private Key: 7
3,296,763 UART: [art] Derive CDI
3,297,043 UART: [art] Store in in slot 0x4
3,382,990 UART: [art] Derive Key Pair
3,383,350 UART: [art] Store priv key in slot 0x5
3,396,650 UART: [art] Derive Key Pair - Done
3,411,536 UART: [art] Signing Cert with AUTHO
3,412,016 UART: RITY.KEYID = 7
3,426,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,391 UART: [art] PUB.X = E7C4CF3D85512E9350A89C30E3EC309A223386AC35C7BEE7309FC004C98A0D17656D24C597577A453F74ADA03161A85C
3,434,157 UART: [art] PUB.Y = B7BCD073C850409B8DDC5DC1249778AFC89BB82C87E0AB0EB66FAE83D3940160E26C7EE4D86D3F414112820EE53F9D17
3,441,110 UART: [art] SIG.R = 273C77C9DF5EB1B4C2D96BEFDE2029242A5AE907219A8D82985D279577D482296B9A6590E06BDD0A7ECFC3DD999345AC
3,447,884 UART: [art] SIG.S = 6DEB8289C7063F80963DF2F915BB7693E11B32194B9ED79AFAB51C6C9BA82275F3C026C587794FBBCCD4A83F4ADE6C15
3,472,002 UART: Caliptra RT
3,472,347 UART: [state] CFI Enabled
3,580,597 UART: [rt] RT listening for mailbox commands...
3,581,267 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,421 UART: [rt]cmd =0x41544d4e, len=14344
4,014,446 >>> mbox cmd response data (8 bytes)
4,014,447 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,490 UART: [rt]cmd =0x41545348, len=116
4,046,063 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,858 ready_for_fw is high
1,363,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,193 >>> mbox cmd response: success
2,987,697 UART:
2,987,713 UART: Running Caliptra FMC ...
2,988,121 UART:
2,988,264 UART: [state] CFI Enabled
2,998,651 UART: [fht] FMC Alias Private Key: 7
3,106,616 UART: [art] Extend RT PCRs Done
3,107,044 UART: [art] Lock RT PCRs Done
3,108,192 UART: [art] Populate DV Done
3,116,397 UART: [fht] FMC Alias Private Key: 7
3,117,575 UART: [art] Derive CDI
3,117,855 UART: [art] Store in in slot 0x4
3,203,062 UART: [art] Derive Key Pair
3,203,422 UART: [art] Store priv key in slot 0x5
3,216,690 UART: [art] Derive Key Pair - Done
3,231,374 UART: [art] Signing Cert with AUTHO
3,231,854 UART: RITY.KEYID = 7
3,246,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,721 UART: [art] PUB.X = 2AA97734D72F863DD950C9AD2934C2C04E07FDAC54697E1904D7B48EF8D9F4E733E68B5BF4A90C6A22A62FC3CCD154AF
3,254,498 UART: [art] PUB.Y = 819E7FC66768C373560BCDFD5CF17A468594B2562715719303EE72A31A2EE1B1F0B95C2D1C294FC1ED0088DD5D71A275
3,261,424 UART: [art] SIG.R = 05D1308F7F24941CDC0095517F5EDE25DFCBD832F78994C19A9C88B18A9E88C32498557B65B9DD6A163515DDB6F2B1CA
3,268,177 UART: [art] SIG.S = 270964DBA404F5588D36E29F13B9ED648E3B272C7FFDA62E06A2BBE97822B33D68A3F9A876F8ACCBBFF59F9E42772C17
3,292,145 UART: Caliptra RT
3,292,490 UART: [state] CFI Enabled
3,401,076 UART: [rt] RT listening for mailbox commands...
3,401,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,682 UART: [rt]cmd =0x41544d4e, len=14344
3,834,435 >>> mbox cmd response data (8 bytes)
3,834,436 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,655 UART: [rt]cmd =0x41545348, len=116
3,866,344 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
87,932 UART: [kat] SHA2-256
893,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,707 UART: [kat] ++
897,859 UART: [kat] sha1
901,877 UART: [kat] SHA2-256
903,817 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,654 UART: [kat] LMS
1,170,982 UART: [kat] --
1,171,815 UART: [cold-reset] ++
1,172,195 UART: [fht] FHT @ 0x50003400
1,174,924 UART: [idev] ++
1,175,092 UART: [idev] CDI.KEYID = 6
1,175,452 UART: [idev] SUBJECT.KEYID = 7
1,175,876 UART: [idev] UDS.KEYID = 0
1,176,221 ready_for_fw is high
1,176,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,112 UART: [idev] Erasing UDS.KEYID = 0
1,200,763 UART: [idev] Sha1 KeyId Algorithm
1,209,339 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,850 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,216,947 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,033 UART: [ldev] --
1,282,500 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,863 >>> mbox cmd response: success
2,773,005 UART: [afmc] ++
2,773,173 UART: [afmc] CDI.KEYID = 6
2,773,535 UART: [afmc] SUBJECT.KEYID = 7
2,773,960 UART: [afmc] AUTHORITY.KEYID = 5
2,808,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,118 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,896 UART: [afmc] --
2,852,004 UART: [cold-reset] --
2,852,838 UART: [state] Locking Datavault
2,854,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,613 UART: [state] Locking ICCM
2,855,241 UART: [exit] Launching FMC @ 0x40000130
2,860,570 UART:
2,860,586 UART: Running Caliptra FMC ...
2,860,994 UART:
2,861,048 UART: [state] CFI Enabled
2,871,637 UART: [fht] FMC Alias Private Key: 7
2,980,200 UART: [art] Extend RT PCRs Done
2,980,628 UART: [art] Lock RT PCRs Done
2,982,018 UART: [art] Populate DV Done
2,990,191 UART: [fht] FMC Alias Private Key: 7
2,991,163 UART: [art] Derive CDI
2,991,443 UART: [art] Store in in slot 0x4
3,076,862 UART: [art] Derive Key Pair
3,077,222 UART: [art] Store priv key in slot 0x5
3,090,546 UART: [art] Derive Key Pair - Done
3,105,128 UART: [art] Signing Cert with AUTHO
3,105,608 UART: RITY.KEYID = 7
3,120,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,729 UART: [art] PUB.X = B5627084B83C09E20EFE6D18EE5869930CA44EA0511D2F9885EF3DEFD616298DB26118B34C35D8CC95F066A793E80A27
3,128,491 UART: [art] PUB.Y = 0299A8F1860FAB5036E374765983C8ADDDDA0D891C3DECBE6735F0B31342B57A732B3A51F5C4506F2E30D5A87A115144
3,135,436 UART: [art] SIG.R = 3D467BC8F12658204F8ECF503ED3B558011A52466CFA4A2672477AEC5179F1E4F7B5CC01C5BFC967C3D6CFFBDB794393
3,142,212 UART: [art] SIG.S = DF9E4FAFF47CF579F6A55E514DD3598E8E4DDC798466DE01355CA231130F98EECA7A6357CA6ABC7A686BDB1CDA096E9B
3,165,694 UART: Caliptra RT
3,165,947 UART: [state] CFI Enabled
3,274,244 UART: [rt] RT listening for mailbox commands...
3,274,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,838 UART: [rt]cmd =0x41544d4e, len=14344
3,707,909 >>> mbox cmd response data (8 bytes)
3,707,910 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,067 UART: [rt]cmd =0x41545348, len=116
3,739,818 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,845 ready_for_fw is high
1,060,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,934 >>> mbox cmd response: success
2,686,450 UART:
2,686,466 UART: Running Caliptra FMC ...
2,686,874 UART:
2,686,928 UART: [state] CFI Enabled
2,697,347 UART: [fht] FMC Alias Private Key: 7
2,805,362 UART: [art] Extend RT PCRs Done
2,805,790 UART: [art] Lock RT PCRs Done
2,807,230 UART: [art] Populate DV Done
2,815,501 UART: [fht] FMC Alias Private Key: 7
2,816,481 UART: [art] Derive CDI
2,816,761 UART: [art] Store in in slot 0x4
2,902,518 UART: [art] Derive Key Pair
2,902,878 UART: [art] Store priv key in slot 0x5
2,916,190 UART: [art] Derive Key Pair - Done
2,931,273 UART: [art] Signing Cert with AUTHO
2,931,753 UART: RITY.KEYID = 7
2,946,945 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,710 UART: [art] PUB.X = 8514DB047810FC2CD42FB20C149D4F368A0584949B0A802C9702A1734B007C36B84943DC9F580CB0F05CC6FA5C593731
2,954,438 UART: [art] PUB.Y = 05919282428F6578371766573135576C861F6E8797E775CEA6B87B7E4C50ED5270FC939C1E2F66E54DC7A01A7E020538
2,961,367 UART: [art] SIG.R = 307E7BE13F7ECA308D7FDC9435921C1624B205D54FC580F246C8EA26EE330356A8F4653606FE74D0989F71241726DB79
2,968,126 UART: [art] SIG.S = 49DE6CD59364815D59715828D6B4781E0B3FB2C569A3EB817943F5A7B2920094834D39BD6B8E9DB5FED9700BD01ADA09
2,992,228 UART: Caliptra RT
2,992,481 UART: [state] CFI Enabled
3,099,616 UART: [rt] RT listening for mailbox commands...
3,100,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,298 UART: [rt]cmd =0x41544d4e, len=14344
3,533,469 >>> mbox cmd response data (8 bytes)
3,533,470 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,441 UART: [rt]cmd =0x41545348, len=116
3,565,272 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,867 UART: [state] LifecycleState = Unprovisioned
86,522 UART: [state] DebugLocked = No
87,050 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
893,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,022 UART: [kat] ++
898,174 UART: [kat] sha1
902,370 UART: [kat] SHA2-256
904,310 UART: [kat] SHA2-384
907,229 UART: [kat] SHA2-512-ACC
909,130 UART: [kat] ECC-384
919,023 UART: [kat] HMAC-384Kdf
923,697 UART: [kat] LMS
1,172,025 UART: [kat] --
1,172,672 UART: [cold-reset] ++
1,173,174 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 ready_for_fw is high
1,177,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,029 UART: [idev] Erasing UDS.KEYID = 0
1,202,064 UART: [idev] Sha1 KeyId Algorithm
1,210,594 UART: [idev] --
1,211,720 UART: [ldev] ++
1,211,888 UART: [ldev] CDI.KEYID = 6
1,212,251 UART: [ldev] SUBJECT.KEYID = 5
1,212,677 UART: [ldev] AUTHORITY.KEYID = 7
1,213,140 UART: [ldev] FE.KEYID = 1
1,218,360 UART: [ldev] Erasing FE.KEYID = 1
1,245,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,012 UART: [ldev] --
1,284,501 UART: [fwproc] Wait for Commands...
1,285,081 UART: [fwproc] Recv command 0x46574c44
1,285,809 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,600 >>> mbox cmd response: success
2,773,794 UART: [afmc] ++
2,773,962 UART: [afmc] CDI.KEYID = 6
2,774,324 UART: [afmc] SUBJECT.KEYID = 7
2,774,749 UART: [afmc] AUTHORITY.KEYID = 5
2,810,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,483 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,087 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,949 UART: [afmc] --
2,854,057 UART: [cold-reset] --
2,855,137 UART: [state] Locking Datavault
2,856,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,696 UART: [state] Locking ICCM
2,857,338 UART: [exit] Launching FMC @ 0x40000130
2,862,667 UART:
2,862,683 UART: Running Caliptra FMC ...
2,863,091 UART:
2,863,234 UART: [state] CFI Enabled
2,873,625 UART: [fht] FMC Alias Private Key: 7
2,981,692 UART: [art] Extend RT PCRs Done
2,982,120 UART: [art] Lock RT PCRs Done
2,983,634 UART: [art] Populate DV Done
2,991,615 UART: [fht] FMC Alias Private Key: 7
2,992,709 UART: [art] Derive CDI
2,992,989 UART: [art] Store in in slot 0x4
3,078,836 UART: [art] Derive Key Pair
3,079,196 UART: [art] Store priv key in slot 0x5
3,092,362 UART: [art] Derive Key Pair - Done
3,107,120 UART: [art] Signing Cert with AUTHO
3,107,600 UART: RITY.KEYID = 7
3,123,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,033 UART: [art] PUB.X = 6C353DDF8B26113DF134F8713A358BCD85BFA25C34836239A8FCA45A7C6F4A3F44182E0AD93EE6EF8B1AAF09EC185920
3,130,811 UART: [art] PUB.Y = 7419219BFDF250C6044580BF679F8988688FB6F8924DC74DAEE3AF9E82507798D0C2DD8C28193FF0B467FFD2831D1EFC
3,137,766 UART: [art] SIG.R = ABE633BB9CED484B9F8E7DD9AEB1E085EB57572B0707F0A6970A2502646631998C2CCE9FFE1D88338C61BE0D2496E60A
3,144,530 UART: [art] SIG.S = 28AA2A182C16932791B825A99E4AEFCD3CE1677A5898AA52E4FC04BBAEC5A6BFB0F2605CF7030CC9035EB4A05D8A8A39
3,167,807 UART: Caliptra RT
3,168,152 UART: [state] CFI Enabled
3,276,343 UART: [rt] RT listening for mailbox commands...
3,277,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,907 UART: [rt]cmd =0x41544d4e, len=14344
3,709,732 >>> mbox cmd response data (8 bytes)
3,709,733 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,670 UART: [rt]cmd =0x41545348, len=116
3,741,117 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,570 ready_for_fw is high
1,060,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,869 >>> mbox cmd response: success
2,686,149 UART:
2,686,165 UART: Running Caliptra FMC ...
2,686,573 UART:
2,686,716 UART: [state] CFI Enabled
2,697,543 UART: [fht] FMC Alias Private Key: 7
2,805,994 UART: [art] Extend RT PCRs Done
2,806,422 UART: [art] Lock RT PCRs Done
2,807,866 UART: [art] Populate DV Done
2,816,223 UART: [fht] FMC Alias Private Key: 7
2,817,375 UART: [art] Derive CDI
2,817,655 UART: [art] Store in in slot 0x4
2,903,506 UART: [art] Derive Key Pair
2,903,866 UART: [art] Store priv key in slot 0x5
2,917,596 UART: [art] Derive Key Pair - Done
2,932,391 UART: [art] Signing Cert with AUTHO
2,932,871 UART: RITY.KEYID = 7
2,947,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,086 UART: [art] PUB.X = 7C36590ACB1E984774E2B5004FD65261F091BA235446E6E92E83BB9246A7EDA629A0D84CCC3E309693ADA82813EE4D9E
2,954,837 UART: [art] PUB.Y = 711C9553272D66341ABF771AA671C7A69334FC7A207587FB80D721B9244FAE0252710B0CD170D500F8EB249D32A02CC1
2,961,754 UART: [art] SIG.R = 1F151B40694FBBD4F4BC8AF5CEFFA463961CFF47167B90CEA78F52042D9617DED6C5842FB41C1317751FDCBEA47609E6
2,968,534 UART: [art] SIG.S = 631057A46B3C623838B14CC2C0F2C21062D4732CCD7F546980F8BBFD3E2DFEFBCF0DFBEF86393821FC481324729BC084
2,991,920 UART: Caliptra RT
2,992,265 UART: [state] CFI Enabled
3,100,140 UART: [rt] RT listening for mailbox commands...
3,100,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,992 UART: [rt]cmd =0x41544d4e, len=14344
3,534,087 >>> mbox cmd response data (8 bytes)
3,534,088 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,165 UART: [rt]cmd =0x41545348, len=116
3,565,852 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,210 UART: [kat] SHA2-512-ACC
906,111 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,170,153 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,115 UART: [idev] ++
1,173,283 UART: [idev] CDI.KEYID = 6
1,173,644 UART: [idev] SUBJECT.KEYID = 7
1,174,069 UART: [idev] UDS.KEYID = 0
1,174,415 ready_for_fw is high
1,174,415 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,198,593 UART: [idev] Sha1 KeyId Algorithm
1,207,293 UART: [idev] --
1,208,250 UART: [ldev] ++
1,208,418 UART: [ldev] CDI.KEYID = 6
1,208,782 UART: [ldev] SUBJECT.KEYID = 5
1,209,209 UART: [ldev] AUTHORITY.KEYID = 7
1,209,672 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,221 UART: [fwproc] Recv command 0x46574c44
1,281,954 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,371 >>> mbox cmd response: success
2,773,606 UART: [afmc] ++
2,773,774 UART: [afmc] CDI.KEYID = 6
2,774,137 UART: [afmc] SUBJECT.KEYID = 7
2,774,563 UART: [afmc] AUTHORITY.KEYID = 5
2,809,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,432 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,034 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,019 UART: [afmc] --
2,853,079 UART: [cold-reset] --
2,853,849 UART: [state] Locking Datavault
2,854,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,468 UART: [state] Locking ICCM
2,856,072 UART: [exit] Launching FMC @ 0x40000130
2,861,401 UART:
2,861,417 UART: Running Caliptra FMC ...
2,861,825 UART:
2,861,879 UART: [state] CFI Enabled
2,872,034 UART: [fht] FMC Alias Private Key: 7
2,979,253 UART: [art] Extend RT PCRs Done
2,979,681 UART: [art] Lock RT PCRs Done
2,981,249 UART: [art] Populate DV Done
2,989,526 UART: [fht] FMC Alias Private Key: 7
2,990,700 UART: [art] Derive CDI
2,990,980 UART: [art] Store in in slot 0x4
3,076,839 UART: [art] Derive Key Pair
3,077,199 UART: [art] Store priv key in slot 0x5
3,090,357 UART: [art] Derive Key Pair - Done
3,105,657 UART: [art] Signing Cert with AUTHO
3,106,137 UART: RITY.KEYID = 7
3,121,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,526 UART: [art] PUB.X = 2F09E0E60DC8F441EFC155CBB914942FC801AAEE52A0223942FF2FB1D84D24AD81412E4837D5CCB8E95434721EC36D98
3,129,297 UART: [art] PUB.Y = 1BD96185A20170872093E7681CEB224E3BC92DAFAC51DD535B7A84B04AF4DB857BB1AFEB19640711E36FAF29FC609D9D
3,136,255 UART: [art] SIG.R = 7EC2DD023074DA8AA4955D2736F6BEFB7A6C55084D1D5498D8A51C887D17B5B2CFD718B22F7F12067949CF7E74EDDE9F
3,143,030 UART: [art] SIG.S = F2FF5CE1EC95467DA288760F1C644F88796BD9446D7E0357913550BEE80355082D72193265F502F2AFCAC51A0EEA07DF
3,166,074 UART: Caliptra RT
3,166,327 UART: [state] CFI Enabled
3,274,672 UART: [rt] RT listening for mailbox commands...
3,275,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,506 UART: [rt]cmd =0x41544d4e, len=14344
3,708,171 >>> mbox cmd response data (8 bytes)
3,708,172 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,195 UART: [rt]cmd =0x41545348, len=116
3,740,002 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,692 ready_for_fw is high
1,055,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,383 >>> mbox cmd response: success
2,681,171 UART:
2,681,187 UART: Running Caliptra FMC ...
2,681,595 UART:
2,681,649 UART: [state] CFI Enabled
2,692,070 UART: [fht] FMC Alias Private Key: 7
2,799,845 UART: [art] Extend RT PCRs Done
2,800,273 UART: [art] Lock RT PCRs Done
2,801,933 UART: [art] Populate DV Done
2,810,246 UART: [fht] FMC Alias Private Key: 7
2,811,426 UART: [art] Derive CDI
2,811,706 UART: [art] Store in in slot 0x4
2,897,269 UART: [art] Derive Key Pair
2,897,629 UART: [art] Store priv key in slot 0x5
2,910,939 UART: [art] Derive Key Pair - Done
2,925,488 UART: [art] Signing Cert with AUTHO
2,925,968 UART: RITY.KEYID = 7
2,940,996 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,761 UART: [art] PUB.X = E31D605EDC9D398CBF0C431D877FC409B4346811EE7603154CFE1BF27AB00B516155130CA8AF7A86DE021B7F13A649DC
2,948,523 UART: [art] PUB.Y = E4CA788F1FE6F3AD571AC1F13250BAAEDAE830FC02E2D82F8AA995CD25EDC19604945ECCF891520F8C948384BA26350A
2,955,479 UART: [art] SIG.R = 27F8C302A6CE2C852F4A41CFB6860DE5C5D55F08EC8C9F27056570962B064A08A500989B0FDD7DA5AB3FA0B4A548AFB8
2,962,220 UART: [art] SIG.S = 8FF9CFC3A0705D957951C8686CC11E4D52E17B5D7B30F058C889D6FB34946E9A1C4D61891917AE4666806387F2452A5A
2,985,649 UART: Caliptra RT
2,985,902 UART: [state] CFI Enabled
3,093,557 UART: [rt] RT listening for mailbox commands...
3,094,227 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,281 UART: [rt]cmd =0x41544d4e, len=14344
3,527,074 >>> mbox cmd response data (8 bytes)
3,527,075 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,040 UART: [rt]cmd =0x41545348, len=116
3,558,857 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,260 UART: [kat] SHA2-256
902,200 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,027 UART: [kat] LMS
1,169,339 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 ready_for_fw is high
1,174,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,080 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,627 UART: [ldev] --
1,281,943 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,289 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,450 >>> mbox cmd response: success
2,773,507 UART: [afmc] ++
2,773,675 UART: [afmc] CDI.KEYID = 6
2,774,038 UART: [afmc] SUBJECT.KEYID = 7
2,774,464 UART: [afmc] AUTHORITY.KEYID = 5
2,810,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,096 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,815 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,552 UART: [afmc] --
2,853,490 UART: [cold-reset] --
2,854,226 UART: [state] Locking Datavault
2,854,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,585 UART: [state] Locking ICCM
2,856,049 UART: [exit] Launching FMC @ 0x40000130
2,861,378 UART:
2,861,394 UART: Running Caliptra FMC ...
2,861,802 UART:
2,861,945 UART: [state] CFI Enabled
2,872,812 UART: [fht] FMC Alias Private Key: 7
2,980,327 UART: [art] Extend RT PCRs Done
2,980,755 UART: [art] Lock RT PCRs Done
2,982,343 UART: [art] Populate DV Done
2,990,422 UART: [fht] FMC Alias Private Key: 7
2,991,584 UART: [art] Derive CDI
2,991,864 UART: [art] Store in in slot 0x4
3,077,421 UART: [art] Derive Key Pair
3,077,781 UART: [art] Store priv key in slot 0x5
3,091,145 UART: [art] Derive Key Pair - Done
3,106,108 UART: [art] Signing Cert with AUTHO
3,106,588 UART: RITY.KEYID = 7
3,121,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,593 UART: [art] PUB.X = 989F953BF55C5207199978766068A38C43E658BEF97FE73AA96E91962E63CDFD48E1EB06F39CD51B4EB304B3DE59ED25
3,129,360 UART: [art] PUB.Y = 81FDFAFD4DCA9DF37CF685FA1A45173386A8F4A4A2C764DE237CD17D8C8741B4DCB66934A8CBC27C5760EBED8F1373BE
3,136,334 UART: [art] SIG.R = A45F2EA84060A5E52B91B9CDEC0E7EC1807DBD6F0AA00852866B49CCE031D97646DBED86805CEFF88AC1348610628B1F
3,143,109 UART: [art] SIG.S = DB596E0A46B4D03DFCA011FB5A41B56180CAF7B7D3FA08AD4C96A369ADDA5830563370643C6BDF730B184F37AF43B53A
3,167,077 UART: Caliptra RT
3,167,422 UART: [state] CFI Enabled
3,275,552 UART: [rt] RT listening for mailbox commands...
3,276,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,286 UART: [rt]cmd =0x41544d4e, len=14344
3,708,915 >>> mbox cmd response data (8 bytes)
3,708,916 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,165 UART: [rt]cmd =0x41545348, len=116
3,740,880 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,579 ready_for_fw is high
1,056,579 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,782 >>> mbox cmd response: success
2,682,422 UART:
2,682,438 UART: Running Caliptra FMC ...
2,682,846 UART:
2,682,989 UART: [state] CFI Enabled
2,693,648 UART: [fht] FMC Alias Private Key: 7
2,801,773 UART: [art] Extend RT PCRs Done
2,802,201 UART: [art] Lock RT PCRs Done
2,803,699 UART: [art] Populate DV Done
2,812,054 UART: [fht] FMC Alias Private Key: 7
2,813,200 UART: [art] Derive CDI
2,813,480 UART: [art] Store in in slot 0x4
2,899,135 UART: [art] Derive Key Pair
2,899,495 UART: [art] Store priv key in slot 0x5
2,912,467 UART: [art] Derive Key Pair - Done
2,927,264 UART: [art] Signing Cert with AUTHO
2,927,744 UART: RITY.KEYID = 7
2,943,506 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,271 UART: [art] PUB.X = FB009C625AD6925E5523875E44028F5286B74B696E23C21B8017E959FE296698E8CC7D6B2C460C5149E0781FEB527C5B
2,951,009 UART: [art] PUB.Y = B3EF015AD831D45B8CCC4D03A5C6A17290A0C7D801813D78ED682BF19E38A34EE1E41414FFDAB33FBD3A5C18C30712E6
2,957,963 UART: [art] SIG.R = E35D84B9C987573EC8051201EBA60A2E809B41F9BEC2C18CB37D31FB19A8B6044E8251E8E34D9D763A056BB8DC930C64
2,964,723 UART: [art] SIG.S = 29427F73CF31DE30249E92F6F60CB5442DED94CE1D6CAF0583C117455A3379716DF0B40C5FDD4EF1350AAB94AEFE50B6
2,988,936 UART: Caliptra RT
2,989,281 UART: [state] CFI Enabled
3,096,828 UART: [rt] RT listening for mailbox commands...
3,097,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,390 UART: [rt]cmd =0x41544d4e, len=14344
3,530,135 >>> mbox cmd response data (8 bytes)
3,530,136 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,109 UART: [rt]cmd =0x41545348, len=116
3,561,778 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
193,232 UART:
193,575 UART: Running Caliptra ROM ...
194,676 UART:
194,845 UART: [state] CFI Enabled
262,605 UART: [state] LifecycleState = Unprovisioned
264,596 UART: [state] DebugLocked = No
267,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,536 UART: [kat] SHA2-256
442,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,739 UART: [kat] ++
453,176 UART: [kat] sha1
463,501 UART: [kat] SHA2-256
466,217 UART: [kat] SHA2-384
472,478 UART: [kat] SHA2-512-ACC
474,842 UART: [kat] ECC-384
2,767,419 UART: [kat] HMAC-384Kdf
2,800,075 UART: [kat] LMS
3,990,377 UART: [kat] --
3,994,816 UART: [cold-reset] ++
3,997,271 UART: [fht] Storing FHT @ 0x50003400
4,007,204 UART: [idev] ++
4,007,813 UART: [idev] CDI.KEYID = 6
4,008,727 UART: [idev] SUBJECT.KEYID = 7
4,009,972 UART: [idev] UDS.KEYID = 0
4,010,952 ready_for_fw is high
4,011,142 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,152 UART: [idev] Erasing UDS.KEYID = 0
7,346,983 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,813 UART: [idev] --
7,373,304 UART: [ldev] ++
7,373,886 UART: [ldev] CDI.KEYID = 6
7,374,852 UART: [ldev] SUBJECT.KEYID = 5
7,376,060 UART: [ldev] AUTHORITY.KEYID = 7
7,377,290 UART: [ldev] FE.KEYID = 1
7,415,747 UART: [ldev] Erasing FE.KEYID = 1
10,749,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,997 UART: [ldev] --
13,129,378 UART: [fwproc] Waiting for Commands...
13,131,364 UART: [fwproc] Received command 0x46574c44
13,133,538 UART: [fwproc] Received Image of size 113844 bytes
17,181,250 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,076 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,988 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,639,043 >>> mbox cmd response: success
17,642,825 UART: [afmc] ++
17,643,475 UART: [afmc] CDI.KEYID = 6
17,644,384 UART: [afmc] SUBJECT.KEYID = 7
17,645,615 UART: [afmc] AUTHORITY.KEYID = 5
21,003,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,302,935 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,305,207 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,319,651 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,334,463 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,348,892 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,370,514 UART: [afmc] --
23,374,089 UART: [cold-reset] --
23,376,875 UART: [state] Locking Datavault
23,381,957 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,704 UART: [state] Locking ICCM
23,385,340 UART: [exit] Launching FMC @ 0x40000130
23,393,742 UART:
23,393,973 UART: Running Caliptra FMC ...
23,394,996 UART:
23,395,157 UART: [state] CFI Enabled
23,461,251 UART: [fht] FMC Alias Private Key: 7
25,800,084 UART: [art] Extend RT PCRs Done
25,801,309 UART: [art] Lock RT PCRs Done
25,803,119 UART: [art] Populate DV Done
25,808,577 UART: [fht] FMC Alias Private Key: 7
25,810,323 UART: [art] Derive CDI
25,811,052 UART: [art] Store in in slot 0x4
25,871,228 UART: [art] Derive Key Pair
25,872,280 UART: [art] Store priv key in slot 0x5
29,164,954 UART: [art] Derive Key Pair - Done
29,177,896 UART: [art] Signing Cert with AUTHO
29,179,193 UART: RITY.KEYID = 7
31,465,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,425 UART: [art] PUB.X = 5E1CD4942431490405DACE6F1038294E37D8F03B179556AAC6EA0DCF8D1D5EF5823DD4D804A62657E3F98DF0D5BEBDBA
31,474,691 UART: [art] PUB.Y = 812518F293C0824938A41B50D0187610A8E0623D9B0FBA8AA01843ECE6E2AD2A6E83044B7F23445A8058A8541E606227
31,481,959 UART: [art] SIG.R = 2295B66316D47C5B438CC736B48A302569020709DDF240F525ADFEB1745A6F13D1A456788A1B1697FEE53558D791A90E
31,489,273 UART: [art] SIG.S = 5668D1117A6DB0CED83316696436265CB4AF8DD8D34335302ACB33CAC39ED53DCFC20F047C84900C8B393EB9370A37DF
32,794,621 UART: Caliptra RT
32,795,328 UART: [state] CFI Enabled
32,976,857 UART: [rt] RT listening for mailbox commands...
37,017,819 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,173,447 UART: [rt]cmd =0x41544d4e, len=14344
42,473,795 >>> mbox cmd response data (8 bytes)
42,474,391 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,504,972 UART: [rt]cmd =0x41545348, len=116
42,525,783 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,001 UART:
192,370 UART: Running Caliptra ROM ...
193,450 UART:
193,588 UART: [state] CFI Enabled
263,307 UART: [state] LifecycleState = Unprovisioned
265,225 UART: [state] DebugLocked = No
267,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,196 UART: [kat] SHA2-256
442,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,380 UART: [kat] ++
453,865 UART: [kat] sha1
464,117 UART: [kat] SHA2-256
466,833 UART: [kat] SHA2-384
473,097 UART: [kat] SHA2-512-ACC
475,465 UART: [kat] ECC-384
2,766,677 UART: [kat] HMAC-384Kdf
2,798,097 UART: [kat] LMS
3,988,415 UART: [kat] --
3,991,975 UART: [cold-reset] ++
3,993,058 UART: [fht] Storing FHT @ 0x50003400
4,004,105 UART: [idev] ++
4,004,672 UART: [idev] CDI.KEYID = 6
4,005,652 UART: [idev] SUBJECT.KEYID = 7
4,006,822 UART: [idev] UDS.KEYID = 0
4,007,898 ready_for_fw is high
4,008,107 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,151,343 UART: [idev] Erasing UDS.KEYID = 0
7,337,084 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,787 UART: [idev] --
7,362,559 UART: [ldev] ++
7,363,174 UART: [ldev] CDI.KEYID = 6
7,364,104 UART: [ldev] SUBJECT.KEYID = 5
7,365,303 UART: [ldev] AUTHORITY.KEYID = 7
7,366,576 UART: [ldev] FE.KEYID = 1
7,414,024 UART: [ldev] Erasing FE.KEYID = 1
10,748,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,841 UART: [ldev] --
13,128,959 UART: [fwproc] Waiting for Commands...
13,131,691 UART: [fwproc] Received command 0x46574c44
13,133,885 UART: [fwproc] Received Image of size 113844 bytes
17,183,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,257,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,641,644 >>> mbox cmd response: success
17,646,581 UART: [afmc] ++
17,647,239 UART: [afmc] CDI.KEYID = 6
17,648,177 UART: [afmc] SUBJECT.KEYID = 7
17,649,281 UART: [afmc] AUTHORITY.KEYID = 5
21,000,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,299,668 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,301,945 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,316,329 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,331,162 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,345,600 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,170 UART: [afmc] --
23,372,731 UART: [cold-reset] --
23,376,801 UART: [state] Locking Datavault
23,383,451 UART: [state] Locking PCR0, PCR1 and PCR31
23,385,203 UART: [state] Locking ICCM
23,387,723 UART: [exit] Launching FMC @ 0x40000130
23,396,108 UART:
23,396,396 UART: Running Caliptra FMC ...
23,397,503 UART:
23,397,659 UART: [state] CFI Enabled
23,459,915 UART: [fht] FMC Alias Private Key: 7
25,797,938 UART: [art] Extend RT PCRs Done
25,799,167 UART: [art] Lock RT PCRs Done
25,800,842 UART: [art] Populate DV Done
25,806,465 UART: [fht] FMC Alias Private Key: 7
25,808,050 UART: [art] Derive CDI
25,808,860 UART: [art] Store in in slot 0x4
25,868,164 UART: [art] Derive Key Pair
25,869,148 UART: [art] Store priv key in slot 0x5
29,162,770 UART: [art] Derive Key Pair - Done
29,175,847 UART: [art] Signing Cert with AUTHO
29,177,146 UART: RITY.KEYID = 7
31,464,101 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,613 UART: [art] PUB.X = 32E909AE8914D031416904BA46430F289DA26226EA020B1FAF2AE49ADD4B74D1B62B82341AF9FDDAF04366AC40E6D708
31,472,919 UART: [art] PUB.Y = 7FEAC1D45A7FB7426AD3EDDD40E49EEB027C3A424B0401E439CE41A211EBD2504D446B4FADAF3DB7512B958361B2292B
31,480,120 UART: [art] SIG.R = EDB12CEA477D5149CA658C34D459DFF28E2CEFDD126E20BEC9ECB356E1720ED3B40CF660A3B29729BB298B10F9A4307F
31,487,540 UART: [art] SIG.S = CA1FE14E058B4AEEAB6A99CA32D834365058BFF6DBFE1262E84763B5900A7EFF07857011FA1C5732A19057BE1FA23ADC
32,792,786 UART: Caliptra RT
32,793,511 UART: [state] CFI Enabled
32,953,216 UART: [rt] RT listening for mailbox commands...
32,955,623 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,110,774 UART: [rt]cmd =0x41544d4e, len=14344
38,411,620 >>> mbox cmd response data (8 bytes)
38,412,286 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,442,929 UART: [rt]cmd =0x41545348, len=116
38,444,997 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,785,261 ready_for_fw is high
3,785,688 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,878,409 >>> mbox cmd response: success
23,562,931 UART:
23,563,332 UART: Running Caliptra FMC ...
23,564,475 UART:
23,564,632 UART: [state] CFI Enabled
23,615,313 UART: [fht] FMC Alias Private Key: 7
25,953,257 UART: [art] Extend RT PCRs Done
25,954,478 UART: [art] Lock RT PCRs Done
25,955,780 UART: [art] Populate DV Done
25,961,359 UART: [fht] FMC Alias Private Key: 7
25,962,894 UART: [art] Derive CDI
25,963,701 UART: [art] Store in in slot 0x4
26,024,332 UART: [art] Derive Key Pair
26,025,372 UART: [art] Store priv key in slot 0x5
29,317,928 UART: [art] Derive Key Pair - Done
29,331,296 UART: [art] Signing Cert with AUTHO
29,332,659 UART: RITY.KEYID = 7
31,620,881 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,381 UART: [art] PUB.X = 6ABA1F2888C1B809C8F9CFB25B95090648C530E925CFCE86DFE129EED831231E494AFEE730A7CFFE10BCE690DA94BCA2
31,629,633 UART: [art] PUB.Y = 1F849F2B65D8DE4CF18FF64CBE1CE87E28587E516CC78F7519E39FD52D281290849A7EEC91BBB14D377F0EB55212B736
31,636,924 UART: [art] SIG.R = 23BAF069A821C8D58CC478C6282CBC0E0F65C5E45B64DB250BF4DA320205BD39EBE2F632BA78FEE833E002273AAC1885
31,644,272 UART: [art] SIG.S = 89CD4575F373F31AF7F8EFB4F5F2062186F18956723C23C808698587277859D882537C2D8778ED14BC1A583B13FE3AAF
32,949,116 UART: Caliptra RT
32,949,815 UART: [state] CFI Enabled
33,110,177 UART: [rt] RT listening for mailbox commands...
37,146,121 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,301,761 UART: [rt]cmd =0x41544d4e, len=14344
42,602,164 >>> mbox cmd response data (8 bytes)
42,603,288 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,634,028 UART: [rt]cmd =0x41545348, len=116
42,653,797 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,784,428 ready_for_fw is high
3,784,837 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,852,695 >>> mbox cmd response: success
23,565,395 UART:
23,565,811 UART: Running Caliptra FMC ...
23,566,909 UART:
23,567,057 UART: [state] CFI Enabled
23,634,307 UART: [fht] FMC Alias Private Key: 7
25,972,604 UART: [art] Extend RT PCRs Done
25,973,833 UART: [art] Lock RT PCRs Done
25,975,322 UART: [art] Populate DV Done
25,980,713 UART: [fht] FMC Alias Private Key: 7
25,982,300 UART: [art] Derive CDI
25,983,110 UART: [art] Store in in slot 0x4
26,042,963 UART: [art] Derive Key Pair
26,044,018 UART: [art] Store priv key in slot 0x5
29,336,736 UART: [art] Derive Key Pair - Done
29,349,363 UART: [art] Signing Cert with AUTHO
29,350,657 UART: RITY.KEYID = 7
31,638,406 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,918 UART: [art] PUB.X = AB1C4C01884ECDE0A12500ED92A2F0E57673B49130B9D4CEA0EEA58C1FE45EDB6CF91C6269144AA880C70EEFDF78C986
31,647,178 UART: [art] PUB.Y = 006DA975B3A0829BDF569B60E340813BE3DA7B5A70DB790CCB4E53A77B48A0C294C9C8A6AACA6425BA612599016775FF
31,654,401 UART: [art] SIG.R = 20D60AF8D26DDEF032F7197D83488425C0518B45D9B6AF677A25F1D26A62123F8437E0443C92E6890E1993E3943EDE12
31,661,810 UART: [art] SIG.S = 8932E12A6F5ABEF22F30104ED7A0BD72E421E65B2B11595A54FC386A4C1E73056F9AA03D7AAAE596B8234A7A0EA48938
32,966,977 UART: Caliptra RT
32,967,686 UART: [state] CFI Enabled
33,126,872 UART: [rt] RT listening for mailbox commands...
33,129,541 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,284,937 UART: [rt]cmd =0x41544d4e, len=14344
38,585,441 >>> mbox cmd response data (8 bytes)
38,586,013 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,616,821 UART: [rt]cmd =0x41545348, len=116
38,618,923 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,572 UART:
192,943 UART: Running Caliptra ROM ...
194,136 UART:
603,851 UART: [state] CFI Enabled
617,862 UART: [state] LifecycleState = Unprovisioned
619,735 UART: [state] DebugLocked = No
621,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,652 UART: [kat] SHA2-256
795,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,980 UART: [kat] ++
806,429 UART: [kat] sha1
817,375 UART: [kat] SHA2-256
820,099 UART: [kat] SHA2-384
826,453 UART: [kat] SHA2-512-ACC
828,829 UART: [kat] ECC-384
3,115,208 UART: [kat] HMAC-384Kdf
3,126,594 UART: [kat] LMS
4,316,687 UART: [kat] --
4,323,333 UART: [cold-reset] ++
4,325,415 UART: [fht] Storing FHT @ 0x50003400
4,336,611 UART: [idev] ++
4,337,176 UART: [idev] CDI.KEYID = 6
4,338,210 UART: [idev] SUBJECT.KEYID = 7
4,339,407 UART: [idev] UDS.KEYID = 0
4,340,459 ready_for_fw is high
4,340,832 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,685 UART: [idev] Erasing UDS.KEYID = 0
7,627,133 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,590 UART: [idev] --
7,654,341 UART: [ldev] ++
7,654,968 UART: [ldev] CDI.KEYID = 6
7,655,878 UART: [ldev] SUBJECT.KEYID = 5
7,657,092 UART: [ldev] AUTHORITY.KEYID = 7
7,658,378 UART: [ldev] FE.KEYID = 1
7,671,737 UART: [ldev] Erasing FE.KEYID = 1
10,961,025 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,441 UART: [ldev] --
13,320,668 UART: [fwproc] Waiting for Commands...
13,323,687 UART: [fwproc] Received command 0x46574c44
13,325,873 UART: [fwproc] Received Image of size 113844 bytes
17,371,012 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,638 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,831,107 >>> mbox cmd response: success
17,835,782 UART: [afmc] ++
17,836,382 UART: [afmc] CDI.KEYID = 6
17,837,298 UART: [afmc] SUBJECT.KEYID = 7
17,838,571 UART: [afmc] AUTHORITY.KEYID = 5
21,157,664 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,132 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,538 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,334 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,764 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,520,335 UART: [afmc] --
23,524,418 UART: [cold-reset] --
23,528,601 UART: [state] Locking Datavault
23,534,113 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,817 UART: [state] Locking ICCM
23,538,433 UART: [exit] Launching FMC @ 0x40000130
23,546,783 UART:
23,547,055 UART: Running Caliptra FMC ...
23,548,164 UART:
23,548,326 UART: [state] CFI Enabled
23,556,296 UART: [fht] FMC Alias Private Key: 7
25,887,104 UART: [art] Extend RT PCRs Done
25,888,331 UART: [art] Lock RT PCRs Done
25,890,230 UART: [art] Populate DV Done
25,896,026 UART: [fht] FMC Alias Private Key: 7
25,897,569 UART: [art] Derive CDI
25,898,384 UART: [art] Store in in slot 0x4
25,941,037 UART: [art] Derive Key Pair
25,942,071 UART: [art] Store priv key in slot 0x5
29,184,044 UART: [art] Derive Key Pair - Done
29,197,094 UART: [art] Signing Cert with AUTHO
29,198,403 UART: RITY.KEYID = 7
31,478,106 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,620 UART: [art] PUB.X = 9C8EB5C3AC71D9961BC6A5E14016C8865991C364E2A3CFAC3C6E8BE90FDB5FB3C1EB10EABC71B91CDB8CEDBA77381731
31,486,886 UART: [art] PUB.Y = E9CF73FA1040C06A828574EAB731208FDD7FDDA9CDFCEDBF609C4D0BA91F1BFD947A1FBC3F6A5C18EF531BF50BAD791E
31,494,125 UART: [art] SIG.R = 4077D1A83B07D8F632B77767BB884B9C3E5BA01B92098ED5EA495DBB02C1FF9DDE4FE82E6AFE452B333F6B1C033FFE88
31,501,540 UART: [art] SIG.S = 6417A5837F1D8AF154F3B2C3DC2B8943873490F27B969C65B1EE53D11FEA0EECC371BBD2F48435B885603A4F624A28B3
32,806,534 UART: Caliptra RT
32,807,238 UART: [state] CFI Enabled
32,924,167 UART: [rt] RT listening for mailbox commands...
37,094,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,249,745 UART: [rt]cmd =0x41544d4e, len=14344
42,550,575 >>> mbox cmd response data (8 bytes)
42,551,161 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,582,010 UART: [rt]cmd =0x41545348, len=116
42,602,991 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,376 UART:
192,745 UART: Running Caliptra ROM ...
193,865 UART:
603,427 UART: [state] CFI Enabled
616,927 UART: [state] LifecycleState = Unprovisioned
618,896 UART: [state] DebugLocked = No
620,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,716 UART: [kat] SHA2-256
795,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,949 UART: [kat] ++
806,426 UART: [kat] sha1
817,755 UART: [kat] SHA2-256
820,521 UART: [kat] SHA2-384
826,658 UART: [kat] SHA2-512-ACC
829,032 UART: [kat] ECC-384
3,112,229 UART: [kat] HMAC-384Kdf
3,124,197 UART: [kat] LMS
4,314,337 UART: [kat] --
4,317,134 UART: [cold-reset] ++
4,318,284 UART: [fht] Storing FHT @ 0x50003400
4,329,126 UART: [idev] ++
4,329,855 UART: [idev] CDI.KEYID = 6
4,330,748 UART: [idev] SUBJECT.KEYID = 7
4,331,869 UART: [idev] UDS.KEYID = 0
4,332,849 ready_for_fw is high
4,333,083 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,476,003 UART: [idev] Erasing UDS.KEYID = 0
7,618,423 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,043 UART: [idev] --
7,645,357 UART: [ldev] ++
7,645,923 UART: [ldev] CDI.KEYID = 6
7,646,909 UART: [ldev] SUBJECT.KEYID = 5
7,648,122 UART: [ldev] AUTHORITY.KEYID = 7
7,649,355 UART: [ldev] FE.KEYID = 1
7,659,350 UART: [ldev] Erasing FE.KEYID = 1
10,946,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,889 UART: [ldev] --
13,305,731 UART: [fwproc] Waiting for Commands...
13,307,932 UART: [fwproc] Received command 0x46574c44
13,310,167 UART: [fwproc] Received Image of size 113844 bytes
17,361,660 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,105 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,822,183 >>> mbox cmd response: success
17,826,710 UART: [afmc] ++
17,827,386 UART: [afmc] CDI.KEYID = 6
17,828,282 UART: [afmc] SUBJECT.KEYID = 7
17,829,350 UART: [afmc] AUTHORITY.KEYID = 5
21,144,446 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,180 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,495 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,863 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,694 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,113 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,741 UART: [afmc] --
23,513,036 UART: [cold-reset] --
23,518,470 UART: [state] Locking Datavault
23,524,092 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,846 UART: [state] Locking ICCM
23,527,703 UART: [exit] Launching FMC @ 0x40000130
23,536,097 UART:
23,536,366 UART: Running Caliptra FMC ...
23,537,403 UART:
23,537,550 UART: [state] CFI Enabled
23,546,142 UART: [fht] FMC Alias Private Key: 7
25,877,219 UART: [art] Extend RT PCRs Done
25,878,439 UART: [art] Lock RT PCRs Done
25,880,250 UART: [art] Populate DV Done
25,885,931 UART: [fht] FMC Alias Private Key: 7
25,887,522 UART: [art] Derive CDI
25,888,273 UART: [art] Store in in slot 0x4
25,931,047 UART: [art] Derive Key Pair
25,932,088 UART: [art] Store priv key in slot 0x5
29,174,325 UART: [art] Derive Key Pair - Done
29,187,597 UART: [art] Signing Cert with AUTHO
29,188,905 UART: RITY.KEYID = 7
31,468,314 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,811 UART: [art] PUB.X = 475F54EE919CEC570E49BF79111C9D0EEC36F342259E12EE3AE0FFCB0F4171CDA245E47C3B000F0F7B867F50E08A0A20
31,477,067 UART: [art] PUB.Y = 84229AC97BB67AAB59C2BCD1698F78471F505814B32C2D9179929E47A10F4DD80352F657C05AE1170E659FAD0E5CA8A9
31,484,326 UART: [art] SIG.R = 80B5BD2B43E30CF023B594A984BB4F3838043F5081D5D13C801C3F8D84DF4511E24CB0DF46822FEF6FE4C3C38E9D7CAB
31,491,731 UART: [art] SIG.S = 3F9EFB15408C329CC4D7F71161565ABBE48FFF1561DB0D6E7091D9B342580A0AF359C050CBD7B03670328E565764451C
32,797,448 UART: Caliptra RT
32,798,152 UART: [state] CFI Enabled
32,915,118 UART: [rt] RT listening for mailbox commands...
32,917,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,072,907 UART: [rt]cmd =0x41544d4e, len=14344
38,373,654 >>> mbox cmd response data (8 bytes)
38,374,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,404,971 UART: [rt]cmd =0x41545348, len=116
38,407,282 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,124,164 ready_for_fw is high
4,124,542 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,397 >>> mbox cmd response: success
23,712,611 UART:
23,713,076 UART: Running Caliptra FMC ...
23,714,185 UART:
23,714,371 UART: [state] CFI Enabled
23,722,280 UART: [fht] FMC Alias Private Key: 7
26,053,182 UART: [art] Extend RT PCRs Done
26,054,419 UART: [art] Lock RT PCRs Done
26,056,162 UART: [art] Populate DV Done
26,061,471 UART: [fht] FMC Alias Private Key: 7
26,062,960 UART: [art] Derive CDI
26,063,726 UART: [art] Store in in slot 0x4
26,106,116 UART: [art] Derive Key Pair
26,107,159 UART: [art] Store priv key in slot 0x5
29,349,214 UART: [art] Derive Key Pair - Done
29,362,550 UART: [art] Signing Cert with AUTHO
29,363,851 UART: RITY.KEYID = 7
31,643,668 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,174 UART: [art] PUB.X = A0B42252570FFB87619EFE3B122558CB6ED1C4E9DD7FC8348BD688EF624CE679401609B3EA9A6ED260034843A6929C58
31,652,435 UART: [art] PUB.Y = E37833F5601995B99B214C672FB094C65CB52C13841921D712F947D434E1D8DFBF15C07ECF1493A8EFC9BF80B5EECF31
31,659,645 UART: [art] SIG.R = E58467D66FA6182E721FF3F37B2C083BE0C7F9D98B3CFBEE4C6ADA329F9DFD77E06A703EB1CAE150985E37051083BAE3
31,667,084 UART: [art] SIG.S = 631072D2BBBFFEFE10C323E9FA760A5E769E8799ACBB55965C1896EBFBD4E567B1868A7E5118B7A8073AB35920FFC32D
32,972,494 UART: Caliptra RT
32,973,190 UART: [state] CFI Enabled
33,090,520 UART: [rt] RT listening for mailbox commands...
37,260,923 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,417,636 UART: [rt]cmd =0x41544d4e, len=14344
42,718,852 >>> mbox cmd response data (8 bytes)
42,719,470 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,750,367 UART: [rt]cmd =0x41545348, len=116
42,770,232 >>> mbox cmd response data (12 bytes)
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
4,123,407 ready_for_fw is high
4,123,785 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,062,901 >>> mbox cmd response: success
23,702,637 UART:
23,703,054 UART: Running Caliptra FMC ...
23,704,164 UART:
23,704,319 UART: [state] CFI Enabled
23,712,459 UART: [fht] FMC Alias Private Key: 7
26,043,275 UART: [art] Extend RT PCRs Done
26,044,501 UART: [art] Lock RT PCRs Done
26,046,536 UART: [art] Populate DV Done
26,051,786 UART: [fht] FMC Alias Private Key: 7
26,053,386 UART: [art] Derive CDI
26,054,158 UART: [art] Store in in slot 0x4
26,096,712 UART: [art] Derive Key Pair
26,097,713 UART: [art] Store priv key in slot 0x5
29,340,245 UART: [art] Derive Key Pair - Done
29,352,918 UART: [art] Signing Cert with AUTHO
29,354,230 UART: RITY.KEYID = 7
31,633,737 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,246 UART: [art] PUB.X = FD72BE644DD729CFCFFA9CEE340D95D390722C6ECD453B66480C14309F068432F351A4D45F012E5681843C96581AA76A
31,642,511 UART: [art] PUB.Y = 0835198E7EFDD7F5CC3C01506C971EF4EBB1327011DBEB8BE35538B2E72E505AD38E2024C60A1062E49715FB3164172B
31,649,726 UART: [art] SIG.R = C35EE250809C8CF4D494E270B72E67184254657D7379A6DCBE49AF5FC1C6967364816C72B96AE983F5C3977A318650E4
31,657,125 UART: [art] SIG.S = 2C8233D85938D254F80FCE9BF46D44E4FE39E5AE4B228DF357D1AEACE638A000D7AA38BCCD97E24A1679FA1C20641AD4
32,962,292 UART: Caliptra RT
32,963,002 UART: [state] CFI Enabled
33,080,319 UART: [rt] RT listening for mailbox commands...
33,082,711 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,238,424 UART: [rt]cmd =0x41544d4e, len=14344
38,539,439 >>> mbox cmd response data (8 bytes)
38,540,025 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,570,757 UART: [rt]cmd =0x41545348, len=116
38,573,229 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,038 UART:
192,411 UART: Running Caliptra ROM ...
193,505 UART:
193,657 UART: [state] CFI Enabled
269,087 UART: [state] LifecycleState = Unprovisioned
270,996 UART: [state] DebugLocked = No
272,254 UART: [state] WD Timer not started. Device not locked for debugging
275,865 UART: [kat] SHA2-256
455,048 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,582 UART: [kat] ++
467,082 UART: [kat] sha1
478,577 UART: [kat] SHA2-256
481,621 UART: [kat] SHA2-384
488,692 UART: [kat] SHA2-512-ACC
491,634 UART: [kat] ECC-384
2,948,162 UART: [kat] HMAC-384Kdf
2,973,181 UART: [kat] LMS
3,502,587 UART: [kat] --
3,506,679 UART: [cold-reset] ++
3,508,720 UART: [fht] FHT @ 0x50003400
3,520,983 UART: [idev] ++
3,521,552 UART: [idev] CDI.KEYID = 6
3,522,629 UART: [idev] SUBJECT.KEYID = 7
3,523,734 UART: [idev] UDS.KEYID = 0
3,524,639 ready_for_fw is high
3,524,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,429 UART: [idev] Erasing UDS.KEYID = 0
6,029,423 UART: [idev] Sha1 KeyId Algorithm
6,051,354 UART: [idev] --
6,055,465 UART: [ldev] ++
6,056,042 UART: [ldev] CDI.KEYID = 6
6,056,993 UART: [ldev] SUBJECT.KEYID = 5
6,058,156 UART: [ldev] AUTHORITY.KEYID = 7
6,059,397 UART: [ldev] FE.KEYID = 1
6,099,811 UART: [ldev] Erasing FE.KEYID = 1
8,605,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,458 UART: [ldev] --
10,413,458 UART: [fwproc] Wait for Commands...
10,415,928 UART: [fwproc] Recv command 0x46574c44
10,418,018 UART: [fwproc] Recv'd Img size: 114168 bytes
13,814,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,883,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,269,768 >>> mbox cmd response: success
14,274,152 UART: [afmc] ++
14,274,752 UART: [afmc] CDI.KEYID = 6
14,275,670 UART: [afmc] SUBJECT.KEYID = 7
14,276,831 UART: [afmc] AUTHORITY.KEYID = 5
16,807,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,165 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,811 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,576 UART: [afmc] --
18,612,136 UART: [cold-reset] --
18,616,586 UART: [state] Locking Datavault
18,621,405 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,119 UART: [state] Locking ICCM
18,624,266 UART: [exit] Launching FMC @ 0x40000130
18,632,679 UART:
18,632,940 UART: Running Caliptra FMC ...
18,634,044 UART:
18,634,209 UART: [state] CFI Enabled
18,692,017 UART: [fht] FMC Alias Private Key: 7
20,455,801 UART: [art] Extend RT PCRs Done
20,457,003 UART: [art] Lock RT PCRs Done
20,458,412 UART: [art] Populate DV Done
20,463,870 UART: [fht] FMC Alias Private Key: 7
20,465,355 UART: [art] Derive CDI
20,466,474 UART: [art] Store in in slot 0x4
20,525,486 UART: [art] Derive Key Pair
20,526,484 UART: [art] Store priv key in slot 0x5
22,988,932 UART: [art] Derive Key Pair - Done
23,002,102 UART: [art] Signing Cert with AUTHO
23,003,438 UART: RITY.KEYID = 7
24,715,313 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,797 UART: [art] PUB.X = 28526A1D42EE6A7695D82557CD43F461185F13A31DD3467A4EECC8DB7080756D9CAFFA26E8FF5E0D6B98E9235CD62A90
24,724,103 UART: [art] PUB.Y = 8A6C93821AFE6C2D8837BF987D2C112868487DEDBCC2EC3315DA203646DB8F0AC51635CD80316ADE377BE1538A7A2BB9
24,731,342 UART: [art] SIG.R = 0FE4D801888C33C4CB96CAF49FFA51384B487E18DD8FD73F3259B02D811692024DF67F7B95D18043E60F9245E26FBB61
24,738,745 UART: [art] SIG.S = 51B76372E4B6E7F932A5D4A95ED373DCAEED6EF11C17B85968CC819B6FEEA2FD6F45A16C57CFC55B0D8911D5DF12373D
25,717,525 UART: Caliptra RT
25,718,240 UART: [state] CFI Enabled
25,883,958 UART: [rt] RT listening for mailbox commands...
29,916,977 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,072,646 UART: [rt]cmd =0x41544d4e, len=14344
34,067,815 >>> mbox cmd response data (8 bytes)
34,068,404 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,099,088 UART: [rt]cmd =0x41545348, len=116
34,119,717 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,173 UART:
192,553 UART: Running Caliptra ROM ...
193,739 UART:
193,889 UART: [state] CFI Enabled
259,081 UART: [state] LifecycleState = Unprovisioned
261,005 UART: [state] DebugLocked = No
262,618 UART: [state] WD Timer not started. Device not locked for debugging
266,734 UART: [kat] SHA2-256
445,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,396 UART: [kat] ++
457,926 UART: [kat] sha1
468,380 UART: [kat] SHA2-256
471,379 UART: [kat] SHA2-384
478,458 UART: [kat] SHA2-512-ACC
481,457 UART: [kat] ECC-384
2,925,240 UART: [kat] HMAC-384Kdf
2,947,987 UART: [kat] LMS
3,477,431 UART: [kat] --
3,480,521 UART: [cold-reset] ++
3,481,745 UART: [fht] FHT @ 0x50003400
3,492,155 UART: [idev] ++
3,492,718 UART: [idev] CDI.KEYID = 6
3,493,626 UART: [idev] SUBJECT.KEYID = 7
3,494,867 UART: [idev] UDS.KEYID = 0
3,495,792 ready_for_fw is high
3,495,984 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,639,554 UART: [idev] Erasing UDS.KEYID = 0
6,005,585 UART: [idev] Sha1 KeyId Algorithm
6,030,062 UART: [idev] --
6,033,577 UART: [ldev] ++
6,034,151 UART: [ldev] CDI.KEYID = 6
6,035,037 UART: [ldev] SUBJECT.KEYID = 5
6,036,199 UART: [ldev] AUTHORITY.KEYID = 7
6,037,508 UART: [ldev] FE.KEYID = 1
6,077,566 UART: [ldev] Erasing FE.KEYID = 1
8,578,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,781 UART: [ldev] --
10,392,150 UART: [fwproc] Wait for Commands...
10,394,302 UART: [fwproc] Recv command 0x46574c44
10,396,442 UART: [fwproc] Recv'd Img size: 114168 bytes
13,803,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,255,283 >>> mbox cmd response: success
14,259,661 UART: [afmc] ++
14,260,322 UART: [afmc] CDI.KEYID = 6
14,261,249 UART: [afmc] SUBJECT.KEYID = 7
14,262,362 UART: [afmc] AUTHORITY.KEYID = 5
16,785,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,526,340 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,542,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,558,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,579,586 UART: [afmc] --
18,583,883 UART: [cold-reset] --
18,586,769 UART: [state] Locking Datavault
18,593,870 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,530 UART: [state] Locking ICCM
18,597,308 UART: [exit] Launching FMC @ 0x40000130
18,605,709 UART:
18,605,943 UART: Running Caliptra FMC ...
18,607,048 UART:
18,607,211 UART: [state] CFI Enabled
18,667,360 UART: [fht] FMC Alias Private Key: 7
20,431,412 UART: [art] Extend RT PCRs Done
20,432,626 UART: [art] Lock RT PCRs Done
20,434,527 UART: [art] Populate DV Done
20,440,269 UART: [fht] FMC Alias Private Key: 7
20,441,924 UART: [art] Derive CDI
20,442,745 UART: [art] Store in in slot 0x4
20,500,880 UART: [art] Derive Key Pair
20,501,922 UART: [art] Store priv key in slot 0x5
22,964,695 UART: [art] Derive Key Pair - Done
22,977,539 UART: [art] Signing Cert with AUTHO
22,978,853 UART: RITY.KEYID = 7
24,690,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,228 UART: [art] PUB.X = 6250269EB7B50A9D336961A61D6C5B35F0830CA499D2B04CBCE791AFBCA5E634109983F57F53181A6F8919B333F91D88
24,699,495 UART: [art] PUB.Y = 2FB87C0C30C5CF9E361834ACB5EEDB88CDB33733A64B537F7FFE9DE21A6D4202C90860FE11EF21FAF2FB7024BD74106B
24,706,789 UART: [art] SIG.R = 5321345488D35829530902F4A207B9EF51CD6D859ED0DEAC2B525E4729067BE6266F3EAFA9649BF558DF764F7AF45F5F
24,714,304 UART: [art] SIG.S = 6AD958ACEBFA3BFF43368F1B9F90F8F7F075615B4F0681D4014399B443BEAF4FCC993ACB202A69EB340B356B4273AA91
25,693,344 UART: Caliptra RT
25,694,033 UART: [state] CFI Enabled
25,859,143 UART: [rt] RT listening for mailbox commands...
25,861,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,016,874 UART: [rt]cmd =0x41544d4e, len=14344
30,012,396 >>> mbox cmd response data (8 bytes)
30,012,997 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,043,997 UART: [rt]cmd =0x41545348, len=116
30,046,277 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,362,248 ready_for_fw is high
3,362,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,059,321 >>> mbox cmd response: success
18,343,049 UART:
18,343,448 UART: Running Caliptra FMC ...
18,344,557 UART:
18,344,731 UART: [state] CFI Enabled
18,411,337 UART: [fht] FMC Alias Private Key: 7
20,175,545 UART: [art] Extend RT PCRs Done
20,176,771 UART: [art] Lock RT PCRs Done
20,178,368 UART: [art] Populate DV Done
20,183,770 UART: [fht] FMC Alias Private Key: 7
20,185,417 UART: [art] Derive CDI
20,186,153 UART: [art] Store in in slot 0x4
20,244,329 UART: [art] Derive Key Pair
20,245,364 UART: [art] Store priv key in slot 0x5
22,708,741 UART: [art] Derive Key Pair - Done
22,721,794 UART: [art] Signing Cert with AUTHO
22,723,106 UART: RITY.KEYID = 7
24,434,820 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,327 UART: [art] PUB.X = 40208B58629EB27D359196FC1BE69ADC81C8E2994333A04F8C947945AB699AEB8A6E0BB77159EC485821D1DA455ABA36
24,443,617 UART: [art] PUB.Y = F516AF0E47A2DB49BCF25433DDBEFB0D59C6169C26383EDF173371BAF10B6512D7CD55E922F4CD0C4FE0B3B5D3B805E0
24,450,867 UART: [art] SIG.R = 9E03E74D84510D8E8F2FEAF36440A4B1F3D44B24ECF228C174E9D7B26A4B720C31A3859EF0A62583D2B83790B69BD3B3
24,458,249 UART: [art] SIG.S = 574E970CB0CA89CF7238359BCB62FAE66A8D18FB3065C19DCC1A7DEE9C8CA63E776B07CFBD5E1E09C5505735D97C3A9F
25,437,081 UART: Caliptra RT
25,437,795 UART: [state] CFI Enabled
25,603,720 UART: [rt] RT listening for mailbox commands...
29,635,950 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,791,469 UART: [rt]cmd =0x41544d4e, len=14344
33,787,368 >>> mbox cmd response data (8 bytes)
33,787,945 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,818,900 UART: [rt]cmd =0x41545348, len=116
33,838,819 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,379,099 ready_for_fw is high
3,379,478 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,055,521 >>> mbox cmd response: success
18,340,580 UART:
18,341,006 UART: Running Caliptra FMC ...
18,342,164 UART:
18,342,327 UART: [state] CFI Enabled
18,408,179 UART: [fht] FMC Alias Private Key: 7
20,172,160 UART: [art] Extend RT PCRs Done
20,173,376 UART: [art] Lock RT PCRs Done
20,174,786 UART: [art] Populate DV Done
20,180,305 UART: [fht] FMC Alias Private Key: 7
20,181,791 UART: [art] Derive CDI
20,182,556 UART: [art] Store in in slot 0x4
20,241,003 UART: [art] Derive Key Pair
20,242,051 UART: [art] Store priv key in slot 0x5
22,705,009 UART: [art] Derive Key Pair - Done
22,717,709 UART: [art] Signing Cert with AUTHO
22,719,015 UART: RITY.KEYID = 7
24,431,472 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,958 UART: [art] PUB.X = 7906E6F80E46C8823261D1245C01ED2E1E5A14A082DA7FE05B01E1490E3C8D3DFDC9789691841DB08937DD66856ED491
24,440,252 UART: [art] PUB.Y = 0574FEDA83F4FFAC26BFF46CF2172BC915D8370004A461912843A8690B96B243E8C15C0E2D5EB62DA726DB7D14EDE3BD
24,447,497 UART: [art] SIG.R = 3CFBFAD1548551BC078579F63642C6D136C7A68208BF2EB65745CD073A9632BFE7274E8CAE78818A143D8F0C8E0EF8D2
24,454,881 UART: [art] SIG.S = 21AAA84E003AF270D58B2692B35986775E1AF7BBB426B6451080BC2DDE97D14F9C047CB4FA89C9BE045D1232C40A65D1
25,433,888 UART: Caliptra RT
25,434,601 UART: [state] CFI Enabled
25,599,671 UART: [rt] RT listening for mailbox commands...
25,602,082 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,757,474 UART: [rt]cmd =0x41544d4e, len=14344
29,752,716 >>> mbox cmd response data (8 bytes)
29,753,293 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,784,234 UART: [rt]cmd =0x41545348, len=116
29,786,383 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,856 writing to cptra_bootfsm_go
193,109 UART:
193,469 UART: Running Caliptra ROM ...
194,575 UART:
604,378 UART: [state] CFI Enabled
623,740 UART: [state] LifecycleState = Unprovisioned
625,616 UART: [state] DebugLocked = No
627,515 UART: [state] WD Timer not started. Device not locked for debugging
632,047 UART: [kat] SHA2-256
811,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
822,764 UART: [kat] ++
823,317 UART: [kat] sha1
834,701 UART: [kat] SHA2-256
837,704 UART: [kat] SHA2-384
844,184 UART: [kat] SHA2-512-ACC
847,112 UART: [kat] ECC-384
3,287,505 UART: [kat] HMAC-384Kdf
3,301,154 UART: [kat] LMS
3,830,625 UART: [kat] --
3,834,047 UART: [cold-reset] ++
3,834,917 UART: [fht] FHT @ 0x50003400
3,846,247 UART: [idev] ++
3,846,816 UART: [idev] CDI.KEYID = 6
3,847,724 UART: [idev] SUBJECT.KEYID = 7
3,848,895 UART: [idev] UDS.KEYID = 0
3,849,942 ready_for_fw is high
3,850,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,993,540 UART: [idev] Erasing UDS.KEYID = 0
6,319,567 UART: [idev] Sha1 KeyId Algorithm
6,341,801 UART: [idev] --
6,346,386 UART: [ldev] ++
6,346,958 UART: [ldev] CDI.KEYID = 6
6,347,874 UART: [ldev] SUBJECT.KEYID = 5
6,349,083 UART: [ldev] AUTHORITY.KEYID = 7
6,350,311 UART: [ldev] FE.KEYID = 1
6,361,816 UART: [ldev] Erasing FE.KEYID = 1
8,834,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,226 UART: [ldev] --
10,624,521 UART: [fwproc] Wait for Commands...
10,626,523 UART: [fwproc] Recv command 0x46574c44
10,628,616 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,490,675 >>> mbox cmd response: success
14,495,037 UART: [afmc] ++
14,495,646 UART: [afmc] CDI.KEYID = 6
14,496,723 UART: [afmc] SUBJECT.KEYID = 7
14,497,826 UART: [afmc] AUTHORITY.KEYID = 5
16,997,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,479 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,241 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,253 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,165 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,613 UART: [afmc] --
18,795,642 UART: [cold-reset] --
18,800,157 UART: [state] Locking Datavault
18,805,136 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,836 UART: [state] Locking ICCM
18,808,825 UART: [exit] Launching FMC @ 0x40000130
18,817,274 UART:
18,817,517 UART: Running Caliptra FMC ...
18,818,625 UART:
18,818,791 UART: [state] CFI Enabled
18,826,514 UART: [fht] FMC Alias Private Key: 7
20,582,716 UART: [art] Extend RT PCRs Done
20,583,935 UART: [art] Lock RT PCRs Done
20,585,804 UART: [art] Populate DV Done
20,591,159 UART: [fht] FMC Alias Private Key: 7
20,592,854 UART: [art] Derive CDI
20,593,687 UART: [art] Store in in slot 0x4
20,635,796 UART: [art] Derive Key Pair
20,636,831 UART: [art] Store priv key in slot 0x5
23,063,233 UART: [art] Derive Key Pair - Done
23,076,229 UART: [art] Signing Cert with AUTHO
23,077,538 UART: RITY.KEYID = 7
24,782,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,453 UART: [art] PUB.X = B2F7585DCD9D59E9D442C872D39609FF3F380E398F4B5890737BB4DE96542B81F82443085AD1A42B8B1833106ADC6EDF
24,791,710 UART: [art] PUB.Y = A4BB28110F61488B926FD8E37563714232D8D779177818FB005D1829EF035F354A7DEE8DB7EC5718D8AC5E4C03B8476A
24,798,950 UART: [art] SIG.R = 2BB5C0BD0EB118EEE30F8FE23AA4CA57D02EA123C29CA6299183018D31C938AE98B333F0051A2FF9B72B503FDF539E3C
24,806,296 UART: [art] SIG.S = 5ED9B0E4BE7D933D31FE18BA1BB666C24B2D2A2DFBC111D6F7A5E4ADBE476C2F243A41C32F73D4AD75B5BAFCF1D34102
25,785,498 UART: Caliptra RT
25,786,212 UART: [state] CFI Enabled
25,903,605 UART: [rt] RT listening for mailbox commands...
29,934,685 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,090,378 UART: [rt]cmd =0x41544d4e, len=14344
34,086,240 >>> mbox cmd response data (8 bytes)
34,086,858 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,117,604 UART: [rt]cmd =0x41545348, len=116
34,137,376 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,358 UART:
192,737 UART: Running Caliptra ROM ...
193,850 UART:
603,287 UART: [state] CFI Enabled
619,357 UART: [state] LifecycleState = Unprovisioned
621,217 UART: [state] DebugLocked = No
623,474 UART: [state] WD Timer not started. Device not locked for debugging
627,628 UART: [kat] SHA2-256
806,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,319 UART: [kat] ++
818,860 UART: [kat] sha1
830,305 UART: [kat] SHA2-256
833,334 UART: [kat] SHA2-384
839,917 UART: [kat] SHA2-512-ACC
842,885 UART: [kat] ECC-384
3,281,714 UART: [kat] HMAC-384Kdf
3,293,457 UART: [kat] LMS
3,822,933 UART: [kat] --
3,828,223 UART: [cold-reset] ++
3,829,090 UART: [fht] FHT @ 0x50003400
3,839,430 UART: [idev] ++
3,839,991 UART: [idev] CDI.KEYID = 6
3,841,022 UART: [idev] SUBJECT.KEYID = 7
3,842,124 UART: [idev] UDS.KEYID = 0
3,843,047 ready_for_fw is high
3,843,250 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,635 UART: [idev] Erasing UDS.KEYID = 0
6,315,789 UART: [idev] Sha1 KeyId Algorithm
6,338,062 UART: [idev] --
6,340,654 UART: [ldev] ++
6,341,223 UART: [ldev] CDI.KEYID = 6
6,342,107 UART: [ldev] SUBJECT.KEYID = 5
6,343,312 UART: [ldev] AUTHORITY.KEYID = 7
6,344,541 UART: [ldev] FE.KEYID = 1
6,354,810 UART: [ldev] Erasing FE.KEYID = 1
8,829,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,268 UART: [ldev] --
10,619,787 UART: [fwproc] Wait for Commands...
10,621,500 UART: [fwproc] Recv command 0x46574c44
10,623,593 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,990 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,478,303 >>> mbox cmd response: success
14,483,383 UART: [afmc] ++
14,484,038 UART: [afmc] CDI.KEYID = 6
14,484,962 UART: [afmc] SUBJECT.KEYID = 7
14,486,069 UART: [afmc] AUTHORITY.KEYID = 5
16,986,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,703,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,719 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,474 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,697 UART: [afmc] --
18,781,275 UART: [cold-reset] --
18,783,619 UART: [state] Locking Datavault
18,788,320 UART: [state] Locking PCR0, PCR1 and PCR31
18,789,962 UART: [state] Locking ICCM
18,792,413 UART: [exit] Launching FMC @ 0x40000130
18,800,862 UART:
18,801,094 UART: Running Caliptra FMC ...
18,802,122 UART:
18,802,270 UART: [state] CFI Enabled
18,810,536 UART: [fht] FMC Alias Private Key: 7
20,567,855 UART: [art] Extend RT PCRs Done
20,569,072 UART: [art] Lock RT PCRs Done
20,570,886 UART: [art] Populate DV Done
20,576,210 UART: [fht] FMC Alias Private Key: 7
20,577,702 UART: [art] Derive CDI
20,578,438 UART: [art] Store in in slot 0x4
20,620,866 UART: [art] Derive Key Pair
20,621,907 UART: [art] Store priv key in slot 0x5
23,048,229 UART: [art] Derive Key Pair - Done
23,061,494 UART: [art] Signing Cert with AUTHO
23,062,802 UART: RITY.KEYID = 7
24,768,320 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,823 UART: [art] PUB.X = B1FB7A2B9021EAD7593A0F76CC3CCF1078ACB23CF9CAA03D0DC4B039F45BBDE3F6929DE21984F9FA4D418C76CACCD7C7
24,777,130 UART: [art] PUB.Y = EBE21045A84C3D5B4E8C8875B81074A294DCB9484E931BD52C5297E93CFFBDF23117EB70CFAE8A9BE70AEDA96F9A11C7
24,784,419 UART: [art] SIG.R = EED3C43A3B88D17A6C664699ABE682ECDEBA7628850CE8AE26A22BC6BD59A4420508E1DCBF0972AA2E526880C659A538
24,791,809 UART: [art] SIG.S = 26D36465B8E2F3EEB48024F28A5DC5947AC4BFBA717AF791015F78C8446A88C3CF1CA38EFF0485F2BB3F8F2F11C669E3
25,770,419 UART: Caliptra RT
25,771,105 UART: [state] CFI Enabled
25,888,440 UART: [rt] RT listening for mailbox commands...
25,890,857 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,046,114 UART: [rt]cmd =0x41544d4e, len=14344
30,041,930 >>> mbox cmd response data (8 bytes)
30,042,531 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,072,988 UART: [rt]cmd =0x41545348, len=116
30,075,583 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
3,698,387 ready_for_fw is high
3,698,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,978 >>> mbox cmd response: success
18,512,891 UART:
18,513,298 UART: Running Caliptra FMC ...
18,514,443 UART:
18,514,603 UART: [state] CFI Enabled
18,522,484 UART: [fht] FMC Alias Private Key: 7
20,279,686 UART: [art] Extend RT PCRs Done
20,280,917 UART: [art] Lock RT PCRs Done
20,282,652 UART: [art] Populate DV Done
20,288,118 UART: [fht] FMC Alias Private Key: 7
20,289,769 UART: [art] Derive CDI
20,290,590 UART: [art] Store in in slot 0x4
20,333,078 UART: [art] Derive Key Pair
20,334,123 UART: [art] Store priv key in slot 0x5
22,760,217 UART: [art] Derive Key Pair - Done
22,773,121 UART: [art] Signing Cert with AUTHO
22,774,435 UART: RITY.KEYID = 7
24,479,686 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,191 UART: [art] PUB.X = 47374AAC61AD79E295B662816E658961E1CD5647C5738EB763FD58820BC2EDAE32D4397A886873C6C2AC48496EC563DD
24,488,516 UART: [art] PUB.Y = 99CE362062A724C71F851F015F6689DB3799E1E3A5063A1F89CD57876D8D8DC26164077968DE7CF423674D33C30923B8
24,495,682 UART: [art] SIG.R = 8A40F005F8DD7DF535A598CC596BD632029D7050441E9405AECAC0F5F597FFFFF9DB78C1FF964CB9A69752AF8CE29F78
24,503,133 UART: [art] SIG.S = A5D2C0B1AD32C1EC1E79F3A7E342EBA4D42F8E6559565B0F6929D012D5B8389406DE60EDA059407E3E664F3A718011F1
25,482,191 UART: Caliptra RT
25,482,906 UART: [state] CFI Enabled
25,600,218 UART: [rt] RT listening for mailbox commands...
29,637,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,793,621 UART: [rt]cmd =0x41544d4e, len=14344
33,789,485 >>> mbox cmd response data (8 bytes)
33,790,064 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,820,640 UART: [rt]cmd =0x41545348, len=116
33,840,626 >>> mbox cmd response data (12 bytes)
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,699,599 ready_for_fw is high
3,699,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,339 >>> mbox cmd response: success
18,516,096 UART:
18,516,503 UART: Running Caliptra FMC ...
18,517,630 UART:
18,517,787 UART: [state] CFI Enabled
18,525,792 UART: [fht] FMC Alias Private Key: 7
20,283,087 UART: [art] Extend RT PCRs Done
20,284,302 UART: [art] Lock RT PCRs Done
20,286,115 UART: [art] Populate DV Done
20,291,523 UART: [fht] FMC Alias Private Key: 7
20,293,228 UART: [art] Derive CDI
20,293,967 UART: [art] Store in in slot 0x4
20,336,841 UART: [art] Derive Key Pair
20,337,881 UART: [art] Store priv key in slot 0x5
22,764,944 UART: [art] Derive Key Pair - Done
22,777,847 UART: [art] Signing Cert with AUTHO
22,779,158 UART: RITY.KEYID = 7
24,484,446 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,936 UART: [art] PUB.X = 41AEA9C39C1BB226B2CCEF55EC025CBA9CB1BD4BFB0DDBC4884B3A323EEDBDCF3B15AEDE213C6295A8A00A35A8B59FFD
24,493,236 UART: [art] PUB.Y = F4328D21E47F9B68FDEEB81DCAEA02C00F8E73055A5417CF370A2E959CA5B6036A74923A09CE57531118CF34C554F744
24,500,497 UART: [art] SIG.R = 28C3D2D8BD5AC68F32F2DB17906A8F300C688D0353642742538B22AB787F7211EFCD2F01CE5D6ACB96669A808F7CA90F
24,507,903 UART: [art] SIG.S = 8808AC2B6AFA7BB12383EB3CA808D1B0678AFB033A89B8298725F1C6E7BF648EB700BB7BCBF911B59E43D03223EF2CB3
25,486,926 UART: Caliptra RT
25,487,647 UART: [state] CFI Enabled
25,604,670 UART: [rt] RT listening for mailbox commands...
25,607,080 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,762,219 UART: [rt]cmd =0x41544d4e, len=14344
29,758,127 >>> mbox cmd response data (8 bytes)
29,758,700 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,789,483 UART: [rt]cmd =0x41545348, len=116
29,791,739 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,201 writing to cptra_bootfsm_go
193,338 UART:
193,700 UART: Running Caliptra ROM ...
194,896 UART:
195,050 UART: [state] CFI Enabled
263,316 UART: [state] LifecycleState = Unprovisioned
265,736 UART: [state] DebugLocked = No
267,133 UART: [state] WD Timer not started. Device not locked for debugging
271,107 UART: [kat] SHA2-256
460,997 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,730 UART: [kat] ++
472,177 UART: [kat] sha1
483,782 UART: [kat] SHA2-256
486,763 UART: [kat] SHA2-384
492,853 UART: [kat] SHA2-512-ACC
495,440 UART: [kat] ECC-384
2,961,364 UART: [kat] HMAC-384Kdf
2,984,709 UART: [kat] LMS
3,516,506 UART: [kat] --
3,520,639 UART: [cold-reset] ++
3,522,285 UART: [fht] FHT @ 0x50003400
3,533,740 UART: [idev] ++
3,534,382 UART: [idev] CDI.KEYID = 6
3,535,419 UART: [idev] SUBJECT.KEYID = 7
3,536,524 UART: [idev] UDS.KEYID = 0
3,537,448 ready_for_fw is high
3,537,632 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,681,084 UART: [idev] Erasing UDS.KEYID = 0
6,043,421 UART: [idev] Sha1 KeyId Algorithm
6,065,387 UART: [idev] --
6,069,947 UART: [ldev] ++
6,070,633 UART: [ldev] CDI.KEYID = 6
6,071,548 UART: [ldev] SUBJECT.KEYID = 5
6,072,714 UART: [ldev] AUTHORITY.KEYID = 7
6,073,941 UART: [ldev] FE.KEYID = 1
6,114,191 UART: [ldev] Erasing FE.KEYID = 1
8,624,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,384,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,633 UART: [ldev] --
10,425,390 UART: [fwproc] Wait for Commands...
10,428,248 UART: [fwproc] Recv command 0x46574c44
10,430,557 UART: [fwproc] Recv'd Img size: 114168 bytes
13,880,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,962,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,078,617 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,620,659 >>> mbox cmd response: success
14,625,505 UART: [afmc] ++
14,626,216 UART: [afmc] CDI.KEYID = 6
14,627,471 UART: [afmc] SUBJECT.KEYID = 7
14,628,918 UART: [afmc] AUTHORITY.KEYID = 5
17,167,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,887,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,889,732 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,904,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,920,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,935,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,959,637 UART: [afmc] --
18,963,136 UART: [cold-reset] --
18,967,314 UART: [state] Locking Datavault
18,971,961 UART: [state] Locking PCR0, PCR1 and PCR31
18,974,121 UART: [state] Locking ICCM
18,976,014 UART: [exit] Launching FMC @ 0x40000130
18,984,717 UART:
18,984,956 UART: Running Caliptra FMC ...
18,986,060 UART:
18,986,226 UART: [state] CFI Enabled
19,045,180 UART: [fht] FMC Alias Private Key: 7
20,809,088 UART: [art] Extend RT PCRs Done
20,810,305 UART: [art] Lock RT PCRs Done
20,811,740 UART: [art] Populate DV Done
20,817,277 UART: [fht] FMC Alias Private Key: 7
20,818,975 UART: [art] Derive CDI
20,819,794 UART: [art] Store in in slot 0x4
20,878,300 UART: [art] Derive Key Pair
20,879,300 UART: [art] Store priv key in slot 0x5
23,342,261 UART: [art] Derive Key Pair - Done
23,355,422 UART: [art] Signing Cert with AUTHO
23,356,725 UART: RITY.KEYID = 7
25,068,296 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,810 UART: [art] PUB.X = 551C368C3D0BBF5ACBF066A5BCC220A283211212A22484D3A8DFDA668FA273A960A60859FFBCE14EBC6CDA5F0201205E
25,077,079 UART: [art] PUB.Y = BFE2FDCF80177A5CB00ACD207F7C62BEB4887F2AE41CBF9A4AF72276F58226A006FEB71C3AF9AFB57CC9339F89D17A00
25,084,348 UART: [art] SIG.R = 237DC0D1C6D7B062B1A4D22ADFD31258BB2CF7F8E070C29C930B7661A7B2A32178F650C7EB8B7D505453ABC3BEFDD81E
25,091,769 UART: [art] SIG.S = BC30AC5C471B6B29C83E682E6EB2472DC2F10F35B016E5EA7A53753D3583905324552E626ABC7498A821CF2EB7463E03
26,069,763 UART: Caliptra RT
26,070,473 UART: [state] CFI Enabled
26,236,298 UART: [rt] RT listening for mailbox commands...
30,270,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,426,463 UART: [rt]cmd =0x41544d4e, len=14344
34,421,884 >>> mbox cmd response data (8 bytes)
34,422,469 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,453,099 UART: [rt]cmd =0x41545348, len=116
34,472,674 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,073 UART:
192,443 UART: Running Caliptra ROM ...
193,618 UART:
193,775 UART: [state] CFI Enabled
262,902 UART: [state] LifecycleState = Unprovisioned
265,265 UART: [state] DebugLocked = No
267,875 UART: [state] WD Timer not started. Device not locked for debugging
272,145 UART: [kat] SHA2-256
461,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,729 UART: [kat] ++
473,178 UART: [kat] sha1
485,259 UART: [kat] SHA2-256
488,270 UART: [kat] SHA2-384
494,184 UART: [kat] SHA2-512-ACC
496,776 UART: [kat] ECC-384
2,948,661 UART: [kat] HMAC-384Kdf
2,971,770 UART: [kat] LMS
3,503,512 UART: [kat] --
3,507,579 UART: [cold-reset] ++
3,509,018 UART: [fht] FHT @ 0x50003400
3,521,423 UART: [idev] ++
3,522,149 UART: [idev] CDI.KEYID = 6
3,523,071 UART: [idev] SUBJECT.KEYID = 7
3,524,319 UART: [idev] UDS.KEYID = 0
3,525,242 ready_for_fw is high
3,525,452 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,047 UART: [idev] Erasing UDS.KEYID = 0
6,028,491 UART: [idev] Sha1 KeyId Algorithm
6,051,676 UART: [idev] --
6,056,698 UART: [ldev] ++
6,057,382 UART: [ldev] CDI.KEYID = 6
6,058,293 UART: [ldev] SUBJECT.KEYID = 5
6,059,452 UART: [ldev] AUTHORITY.KEYID = 7
6,060,684 UART: [ldev] FE.KEYID = 1
6,099,857 UART: [ldev] Erasing FE.KEYID = 1
8,605,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,515 UART: [ldev] --
10,411,814 UART: [fwproc] Wait for Commands...
10,414,604 UART: [fwproc] Recv command 0x46574c44
10,416,928 UART: [fwproc] Recv'd Img size: 114168 bytes
13,857,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,335 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,595,326 >>> mbox cmd response: success
14,599,620 UART: [afmc] ++
14,600,299 UART: [afmc] CDI.KEYID = 6
14,601,226 UART: [afmc] SUBJECT.KEYID = 7
14,602,683 UART: [afmc] AUTHORITY.KEYID = 5
17,128,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,686 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,595 UART: [afmc] --
18,926,872 UART: [cold-reset] --
18,930,691 UART: [state] Locking Datavault
18,935,958 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,118 UART: [state] Locking ICCM
18,940,492 UART: [exit] Launching FMC @ 0x40000130
18,949,181 UART:
18,949,444 UART: Running Caliptra FMC ...
18,950,549 UART:
18,950,709 UART: [state] CFI Enabled
19,009,507 UART: [fht] FMC Alias Private Key: 7
20,773,591 UART: [art] Extend RT PCRs Done
20,774,804 UART: [art] Lock RT PCRs Done
20,776,434 UART: [art] Populate DV Done
20,781,901 UART: [fht] FMC Alias Private Key: 7
20,783,601 UART: [art] Derive CDI
20,784,416 UART: [art] Store in in slot 0x4
20,842,588 UART: [art] Derive Key Pair
20,843,625 UART: [art] Store priv key in slot 0x5
23,306,492 UART: [art] Derive Key Pair - Done
23,319,389 UART: [art] Signing Cert with AUTHO
23,320,692 UART: RITY.KEYID = 7
25,032,303 UART: [art] Erasing AUTHORITY.KEYID = 7
25,033,835 UART: [art] PUB.X = E61042B8A0AFFF060FD1F42AC7DE3C24FE552B50583D653DB4A678E9EF71ACF6093D7A98DAE9CB23137D6A5BE3643A8A
25,041,106 UART: [art] PUB.Y = 758B66CBAD161387D5AFC0047ECEB95F260D72008CBC61FF450348D47A295AD24A97AE81F350007B34DD3224786801FB
25,048,314 UART: [art] SIG.R = 9E88C7AC65413359D95AF0375E992A98D6C5AD8C694BFE6184178061342A4B7FA67E59CF1F754BC525C0E72965C2AF3D
25,055,776 UART: [art] SIG.S = 0F536AA9A275C7E6DDF1B89D498353CDA555AF42CEAACADDE9C08FA1906C04889725812272E826998B1764A0A48302EB
26,034,455 UART: Caliptra RT
26,035,155 UART: [state] CFI Enabled
26,199,738 UART: [rt] RT listening for mailbox commands...
26,202,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,357,530 UART: [rt]cmd =0x41544d4e, len=14344
30,353,025 >>> mbox cmd response data (8 bytes)
30,353,621 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,384,239 UART: [rt]cmd =0x41545348, len=116
30,386,345 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,436,536 ready_for_fw is high
3,436,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,708,251 >>> mbox cmd response: success
18,998,450 UART:
18,998,845 UART: Running Caliptra FMC ...
18,999,972 UART:
19,000,155 UART: [state] CFI Enabled
19,069,738 UART: [fht] FMC Alias Private Key: 7
20,833,699 UART: [art] Extend RT PCRs Done
20,834,925 UART: [art] Lock RT PCRs Done
20,836,712 UART: [art] Populate DV Done
20,842,237 UART: [fht] FMC Alias Private Key: 7
20,843,778 UART: [art] Derive CDI
20,844,594 UART: [art] Store in in slot 0x4
20,902,511 UART: [art] Derive Key Pair
20,903,556 UART: [art] Store priv key in slot 0x5
23,367,416 UART: [art] Derive Key Pair - Done
23,380,411 UART: [art] Signing Cert with AUTHO
23,381,713 UART: RITY.KEYID = 7
25,092,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,271 UART: [art] PUB.X = 0D6C11E3CD9B5BD28BAFB727C5E42BDA7DDC872FC87E95B2A6068284DD0C1128C1ECBF6D24A06C1DC330383DCF5EEA22
25,101,564 UART: [art] PUB.Y = BC3FA22ED4E20D3CC9255159C09A9E8A8E6EBD4DD6F235634862C9C9EB18AC204CDFA808AB9ABCCBB262EB70F8717D19
25,108,860 UART: [art] SIG.R = AEF322F89D20C3CA8CA2941317882608338CAF0FC97BF14D069DD124470CB3A9D0FDCC0205E0B0DEF09EB9323D0D1FF7
25,116,281 UART: [art] SIG.S = 4AF00DB0B8F217E0E16845CC89BB79B3229A2429E7EBD76790C7514DD8789333252F4EAF1544343116C1360375B5B5C8
26,094,910 UART: Caliptra RT
26,095,621 UART: [state] CFI Enabled
26,262,281 UART: [rt] RT listening for mailbox commands...
30,295,283 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,451,047 UART: [rt]cmd =0x41544d4e, len=14344
34,446,358 >>> mbox cmd response data (8 bytes)
34,446,951 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,477,702 UART: [rt]cmd =0x41545348, len=116
34,497,061 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
3,417,684 ready_for_fw is high
3,418,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,717,990 >>> mbox cmd response: success
19,001,303 UART:
19,001,722 UART: Running Caliptra FMC ...
19,002,874 UART:
19,003,042 UART: [state] CFI Enabled
19,070,098 UART: [fht] FMC Alias Private Key: 7
20,834,138 UART: [art] Extend RT PCRs Done
20,835,364 UART: [art] Lock RT PCRs Done
20,837,129 UART: [art] Populate DV Done
20,842,480 UART: [fht] FMC Alias Private Key: 7
20,844,185 UART: [art] Derive CDI
20,844,999 UART: [art] Store in in slot 0x4
20,902,541 UART: [art] Derive Key Pair
20,903,592 UART: [art] Store priv key in slot 0x5
23,366,286 UART: [art] Derive Key Pair - Done
23,379,554 UART: [art] Signing Cert with AUTHO
23,380,868 UART: RITY.KEYID = 7
25,092,541 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,054 UART: [art] PUB.X = 1DFB79B3AD0710691509C8951BCB0C5785FA45BE5B93C17AE4DBCD13CF6BBB736B7C56FEFC9211E3D61ABF8B0D2AA0CA
25,101,368 UART: [art] PUB.Y = 036CB23E137E1AF6F6C9FF856D3586BFEC7B0314DA588750F3518D990761AF313D59E2A8FBA8E8E7DD315649EF302C7F
25,108,623 UART: [art] SIG.R = FDF74781A53A13EE1BEB6114D0781BD34B5CAAFD4949839CC9A9F98D8E299B1355BD457B5B65B08DF1F001E4E963A5B9
25,116,025 UART: [art] SIG.S = 88D4643455DEA73034082C805F908AF5B83B14EC0571568693F25CEEF42EBAB6B3EF62D0761C6798463B2215234442EA
26,094,763 UART: Caliptra RT
26,095,458 UART: [state] CFI Enabled
26,260,518 UART: [rt] RT listening for mailbox commands...
26,262,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,418,403 UART: [rt]cmd =0x41544d4e, len=14344
30,413,972 >>> mbox cmd response data (8 bytes)
30,414,581 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,445,334 UART: [rt]cmd =0x41545348, len=116
30,447,755 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
192,881 UART:
193,247 UART: Running Caliptra ROM ...
194,436 UART:
604,172 UART: [state] CFI Enabled
618,332 UART: [state] LifecycleState = Unprovisioned
620,704 UART: [state] DebugLocked = No
623,291 UART: [state] WD Timer not started. Device not locked for debugging
627,822 UART: [kat] SHA2-256
817,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,502 UART: [kat] ++
829,134 UART: [kat] sha1
839,665 UART: [kat] SHA2-256
842,671 UART: [kat] SHA2-384
847,953 UART: [kat] SHA2-512-ACC
850,536 UART: [kat] ECC-384
3,293,353 UART: [kat] HMAC-384Kdf
3,305,378 UART: [kat] LMS
3,837,196 UART: [kat] --
3,840,553 UART: [cold-reset] ++
3,842,268 UART: [fht] FHT @ 0x50003400
3,853,599 UART: [idev] ++
3,854,310 UART: [idev] CDI.KEYID = 6
3,855,226 UART: [idev] SUBJECT.KEYID = 7
3,856,472 UART: [idev] UDS.KEYID = 0
3,857,399 ready_for_fw is high
3,857,587 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,967 UART: [idev] Erasing UDS.KEYID = 0
6,339,157 UART: [idev] Sha1 KeyId Algorithm
6,361,252 UART: [idev] --
6,366,161 UART: [ldev] ++
6,366,899 UART: [ldev] CDI.KEYID = 6
6,367,813 UART: [ldev] SUBJECT.KEYID = 5
6,368,975 UART: [ldev] AUTHORITY.KEYID = 7
6,370,207 UART: [ldev] FE.KEYID = 1
6,379,614 UART: [ldev] Erasing FE.KEYID = 1
8,856,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,801 UART: [ldev] --
10,646,637 UART: [fwproc] Wait for Commands...
10,649,514 UART: [fwproc] Recv command 0x46574c44
10,651,828 UART: [fwproc] Recv'd Img size: 114168 bytes
14,097,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,834,805 >>> mbox cmd response: success
14,839,451 UART: [afmc] ++
14,840,162 UART: [afmc] CDI.KEYID = 6
14,841,353 UART: [afmc] SUBJECT.KEYID = 7
14,842,789 UART: [afmc] AUTHORITY.KEYID = 5
17,351,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,395 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,559 UART: [afmc] --
19,147,548 UART: [cold-reset] --
19,152,500 UART: [state] Locking Datavault
19,158,889 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,038 UART: [state] Locking ICCM
19,162,980 UART: [exit] Launching FMC @ 0x40000130
19,171,658 UART:
19,171,891 UART: Running Caliptra FMC ...
19,172,994 UART:
19,173,159 UART: [state] CFI Enabled
19,181,368 UART: [fht] FMC Alias Private Key: 7
20,938,040 UART: [art] Extend RT PCRs Done
20,939,263 UART: [art] Lock RT PCRs Done
20,940,893 UART: [art] Populate DV Done
20,946,410 UART: [fht] FMC Alias Private Key: 7
20,948,159 UART: [art] Derive CDI
20,948,992 UART: [art] Store in in slot 0x4
20,991,362 UART: [art] Derive Key Pair
20,992,421 UART: [art] Store priv key in slot 0x5
23,418,728 UART: [art] Derive Key Pair - Done
23,431,765 UART: [art] Signing Cert with AUTHO
23,433,099 UART: RITY.KEYID = 7
25,138,487 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,005 UART: [art] PUB.X = 34D0EEE08960952D045E016CDFB575CA1AC365A141580FDE6E6523C0FD599302CEBF33087609B47BC9B9C85458C1C8EB
25,147,267 UART: [art] PUB.Y = 2C51ECE0D529B671A0E3376669E0C312F03F6F1E94F61E46B11DF525687E3577F76F4626AFB1B0121C5B945112DD7495
25,154,499 UART: [art] SIG.R = C9BC819CD29F6834B71B808248565D1B5F5D565CDD9CD7254E1803576C35A14922C32EE2052FA066B6B371910134EC02
25,161,896 UART: [art] SIG.S = F52F1A769D0B260E00B5D6B5F26C5744F692F83553380E2EB02E0AD04BA396C374C26812E82FC1F9F89A8A002B27631A
26,141,241 UART: Caliptra RT
26,141,953 UART: [state] CFI Enabled
26,259,485 UART: [rt] RT listening for mailbox commands...
30,292,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,448,264 UART: [rt]cmd =0x41544d4e, len=14344
34,443,316 >>> mbox cmd response data (8 bytes)
34,443,904 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,474,491 UART: [rt]cmd =0x41545348, len=116
34,493,851 >>> mbox cmd response data (12 bytes)
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,535 UART:
192,893 UART: Running Caliptra ROM ...
194,103 UART:
603,833 UART: [state] CFI Enabled
619,392 UART: [state] LifecycleState = Unprovisioned
621,818 UART: [state] DebugLocked = No
623,199 UART: [state] WD Timer not started. Device not locked for debugging
628,655 UART: [kat] SHA2-256
818,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,298 UART: [kat] ++
829,817 UART: [kat] sha1
842,534 UART: [kat] SHA2-256
845,547 UART: [kat] SHA2-384
851,773 UART: [kat] SHA2-512-ACC
854,178 UART: [kat] ECC-384
3,297,254 UART: [kat] HMAC-384Kdf
3,311,046 UART: [kat] LMS
3,842,842 UART: [kat] --
3,846,801 UART: [cold-reset] ++
3,847,881 UART: [fht] FHT @ 0x50003400
3,859,066 UART: [idev] ++
3,859,635 UART: [idev] CDI.KEYID = 6
3,860,590 UART: [idev] SUBJECT.KEYID = 7
3,861,835 UART: [idev] UDS.KEYID = 0
3,862,740 ready_for_fw is high
3,862,935 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,322 UART: [idev] Erasing UDS.KEYID = 0
6,339,514 UART: [idev] Sha1 KeyId Algorithm
6,361,234 UART: [idev] --
6,367,555 UART: [ldev] ++
6,368,234 UART: [ldev] CDI.KEYID = 6
6,369,160 UART: [ldev] SUBJECT.KEYID = 5
6,370,321 UART: [ldev] AUTHORITY.KEYID = 7
6,371,551 UART: [ldev] FE.KEYID = 1
6,382,885 UART: [ldev] Erasing FE.KEYID = 1
8,861,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,187 UART: [ldev] --
10,651,885 UART: [fwproc] Wait for Commands...
10,653,553 UART: [fwproc] Recv command 0x46574c44
10,655,807 UART: [fwproc] Recv'd Img size: 114168 bytes
14,097,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,211 >>> mbox cmd response: success
14,836,499 UART: [afmc] ++
14,837,153 UART: [afmc] CDI.KEYID = 6
14,838,051 UART: [afmc] SUBJECT.KEYID = 7
14,839,502 UART: [afmc] AUTHORITY.KEYID = 5
17,341,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,561 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,077,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,092,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,107,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,643 UART: [afmc] --
19,135,891 UART: [cold-reset] --
19,140,999 UART: [state] Locking Datavault
19,145,937 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,153 UART: [state] Locking ICCM
19,151,062 UART: [exit] Launching FMC @ 0x40000130
19,159,743 UART:
19,159,978 UART: Running Caliptra FMC ...
19,161,081 UART:
19,161,247 UART: [state] CFI Enabled
19,169,459 UART: [fht] FMC Alias Private Key: 7
20,925,874 UART: [art] Extend RT PCRs Done
20,927,095 UART: [art] Lock RT PCRs Done
20,928,887 UART: [art] Populate DV Done
20,933,980 UART: [fht] FMC Alias Private Key: 7
20,935,665 UART: [art] Derive CDI
20,936,490 UART: [art] Store in in slot 0x4
20,979,474 UART: [art] Derive Key Pair
20,980,476 UART: [art] Store priv key in slot 0x5
23,407,283 UART: [art] Derive Key Pair - Done
23,420,404 UART: [art] Signing Cert with AUTHO
23,421,741 UART: RITY.KEYID = 7
25,127,201 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,711 UART: [art] PUB.X = 5387CB0D048BAB8D55E7F6F213C80FBDFDDCD695923738AAA6A56F9788A5F50E2308088D376B804E025413F039D51510
25,135,956 UART: [art] PUB.Y = 79202A5C6911A41B03384DE2663361FEAF1AF963176CCFB3D7304805429C40E87493106BE018D33AB22FF6DD25D0A37B
25,143,203 UART: [art] SIG.R = 301ACC6780C8322B8D09D8ABAF54F888CA817741D457E2608BB9F25A738CABF3DE837FDAC9F9CEEBE9D23DBB6364FA28
25,150,597 UART: [art] SIG.S = C1862F9BEBDFA6DDB60AF0EFA43E16468EE4B6D14C3B6408AFD14CE2BD480191AC003EDF07CB5CA058F5B7430592475A
26,129,359 UART: Caliptra RT
26,130,053 UART: [state] CFI Enabled
26,247,594 UART: [rt] RT listening for mailbox commands...
26,249,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,405,189 UART: [rt]cmd =0x41544d4e, len=14344
30,400,892 >>> mbox cmd response data (8 bytes)
30,401,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,432,068 UART: [rt]cmd =0x41545348, len=116
30,434,281 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,743 writing to cptra_bootfsm_go
3,752,629 ready_for_fw is high
3,753,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,719 >>> mbox cmd response: success
19,200,174 UART:
19,200,558 UART: Running Caliptra FMC ...
19,201,743 UART:
19,201,911 UART: [state] CFI Enabled
19,209,765 UART: [fht] FMC Alias Private Key: 7
20,966,597 UART: [art] Extend RT PCRs Done
20,967,819 UART: [art] Lock RT PCRs Done
20,969,553 UART: [art] Populate DV Done
20,975,120 UART: [fht] FMC Alias Private Key: 7
20,976,658 UART: [art] Derive CDI
20,977,473 UART: [art] Store in in slot 0x4
21,019,910 UART: [art] Derive Key Pair
21,020,978 UART: [art] Store priv key in slot 0x5
23,447,590 UART: [art] Derive Key Pair - Done
23,460,533 UART: [art] Signing Cert with AUTHO
23,461,833 UART: RITY.KEYID = 7
25,166,937 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,443 UART: [art] PUB.X = C3337E8BEB5038CA93A560C68EA15356E03D8288FD27A32D44BA4C702719FC191ED58C77A054462828D7939BFB832392
25,175,689 UART: [art] PUB.Y = 93F728944776D69A55EF7B74379B2E18AEF121A92EC83810A5A1BCFA2903426A1E45287912F2B054137340E4E0A31383
25,182,960 UART: [art] SIG.R = 170575BA9295E98C1D78CC1863B07676DC37B1EDA971DDB42E47BD26D496A5EBDCE1C0F59442987680619D940214A321
25,190,301 UART: [art] SIG.S = 16725612805DC3F4634B9CDEE2D7B8C1C007C17CC02DDA5F0564A0B67ABDA992455D3DE2F2EA29B0FCFC31B16A634266
26,169,734 UART: Caliptra RT
26,170,440 UART: [state] CFI Enabled
26,287,472 UART: [rt] RT listening for mailbox commands...
30,314,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,470,036 UART: [rt]cmd =0x41544d4e, len=14344
34,465,339 >>> mbox cmd response data (8 bytes)
34,465,925 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,496,731 UART: [rt]cmd =0x41545348, len=116
34,516,889 >>> mbox cmd response data (12 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,754,315 ready_for_fw is high
3,754,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,939,430 >>> mbox cmd response: success
19,193,352 UART:
19,193,784 UART: Running Caliptra FMC ...
19,195,103 UART:
19,195,267 UART: [state] CFI Enabled
19,203,294 UART: [fht] FMC Alias Private Key: 7
20,959,939 UART: [art] Extend RT PCRs Done
20,961,157 UART: [art] Lock RT PCRs Done
20,962,862 UART: [art] Populate DV Done
20,968,094 UART: [fht] FMC Alias Private Key: 7
20,969,692 UART: [art] Derive CDI
20,970,448 UART: [art] Store in in slot 0x4
21,013,044 UART: [art] Derive Key Pair
21,014,048 UART: [art] Store priv key in slot 0x5
23,441,376 UART: [art] Derive Key Pair - Done
23,454,373 UART: [art] Signing Cert with AUTHO
23,455,677 UART: RITY.KEYID = 7
25,160,921 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,427 UART: [art] PUB.X = AB6B8AD3F726703E6E123AF61F3F5E6F9C83BF2F2A7A0E5A4EAA96AE0CBB2AE4CA19995CB2BD998D446981E972B37D89
25,169,671 UART: [art] PUB.Y = D36B189EF4811D390FF4DEB1EF8CE38AF0BF52FE6168595A7FDF28826FC774EEB0A15C96A9FF1A3D240D53F21AFE3EC4
25,176,987 UART: [art] SIG.R = E815BFBC288BE78C3B5CA313B8395DC7D80BF50624E1DF282E4E4755EE0F9D60C91B260E3CAD8162D2E1D75B928447CD
25,184,375 UART: [art] SIG.S = 7625922319A00DA9F69C6E7E3CA74DDE9F1A774FC73975819A59A71DEE9373240F680B5AFEFE9B526EE4C1B7261B32B7
26,162,891 UART: Caliptra RT
26,163,578 UART: [state] CFI Enabled
26,280,364 UART: [rt] RT listening for mailbox commands...
26,282,815 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,438,045 UART: [rt]cmd =0x41544d4e, len=14344
30,433,194 >>> mbox cmd response data (8 bytes)
30,433,811 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,464,483 UART: [rt]cmd =0x41545348, len=116
30,466,751 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,257 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,343 UART: [kat] SHA2-256
892,281 UART: [kat] SHA2-384
894,782 UART: [kat] SHA2-512-ACC
896,683 UART: [kat] ECC-384
902,254 UART: [kat] HMAC-384Kdf
906,950 UART: [kat] LMS
1,475,146 UART: [kat] --
1,476,075 UART: [cold-reset] ++
1,476,437 UART: [fht] Storing FHT @ 0x50003400
1,479,450 UART: [idev] ++
1,479,618 UART: [idev] CDI.KEYID = 6
1,479,978 UART: [idev] SUBJECT.KEYID = 7
1,480,402 UART: [idev] UDS.KEYID = 0
1,480,747 ready_for_fw is high
1,480,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,632 UART: [idev] Erasing UDS.KEYID = 0
1,505,160 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,938 UART: [idev] --
1,514,923 UART: [ldev] ++
1,515,091 UART: [ldev] CDI.KEYID = 6
1,515,454 UART: [ldev] SUBJECT.KEYID = 5
1,515,880 UART: [ldev] AUTHORITY.KEYID = 7
1,516,343 UART: [ldev] FE.KEYID = 1
1,521,585 UART: [ldev] Erasing FE.KEYID = 1
1,547,042 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,702 UART: [ldev] --
1,586,177 UART: [fwproc] Waiting for Commands...
1,586,878 UART: [fwproc] Received command 0x46574c44
1,587,669 UART: [fwproc] Received Image of size 114168 bytes
2,883,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,968 >>> mbox cmd response: success
3,076,042 UART: [afmc] ++
3,076,210 UART: [afmc] CDI.KEYID = 6
3,076,572 UART: [afmc] SUBJECT.KEYID = 7
3,076,997 UART: [afmc] AUTHORITY.KEYID = 5
3,112,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,136 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,021 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,711 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,482 UART: [afmc] --
3,155,588 UART: [cold-reset] --
3,156,532 UART: [state] Locking Datavault
3,157,767 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,371 UART: [state] Locking ICCM
3,158,879 UART: [exit] Launching FMC @ 0x40000130
3,164,208 UART:
3,164,224 UART: Running Caliptra FMC ...
3,164,632 UART:
3,164,686 UART: [state] CFI Enabled
3,175,445 UART: [fht] FMC Alias Private Key: 7
3,283,940 UART: [art] Extend RT PCRs Done
3,284,368 UART: [art] Lock RT PCRs Done
3,285,656 UART: [art] Populate DV Done
3,294,011 UART: [fht] FMC Alias Private Key: 7
3,295,185 UART: [art] Derive CDI
3,295,465 UART: [art] Store in in slot 0x4
3,381,168 UART: [art] Derive Key Pair
3,381,528 UART: [art] Store priv key in slot 0x5
3,395,414 UART: [art] Derive Key Pair - Done
3,410,264 UART: [art] Signing Cert with AUTHO
3,410,744 UART: RITY.KEYID = 7
3,425,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,439 UART: [art] PUB.X = EF561590CF7E07A7F47D53B2C127D9AD388CC399BDD968E7B32F10A1500984BDE67745794E2CD40ADC505C8AFF42D7D8
3,433,212 UART: [art] PUB.Y = 01C292FB785640A18DEE5DF47BA381F39584981B885AA7241F916F17CFAA0C6F9567940CF62EC94901882C2B54158674
3,440,146 UART: [art] SIG.R = E06F1B12B874CA89EDF150235BA3F09309C9999D2939343C24E8F4309C6803C5EE1C8459C4BFAE25DE056EBD86C30186
3,446,908 UART: [art] SIG.S = D08F357B95B8668BC1F2D73511A4CC837DBAD4B35EE1A798AD9B369D0C979208D3EBBB780A7592E9367F9B1BE4FCA830
3,470,818 UART: Caliptra RT
3,471,071 UART: [state] CFI Enabled
3,578,711 UART: [rt] RT listening for mailbox commands...
3,579,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,109 UART: [rt]cmd =0x41544d4e, len=14344
4,012,762 >>> mbox cmd response data (8 bytes)
4,012,763 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,846 UART: [rt]cmd =0x41545348, len=116
4,065,585 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,723 UART: [kat] SHA2-256
881,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,769 UART: [kat] ++
885,921 UART: [kat] sha1
890,187 UART: [kat] SHA2-256
892,125 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,488 UART: [kat] HMAC-384Kdf
906,984 UART: [kat] LMS
1,475,180 UART: [kat] --
1,476,089 UART: [cold-reset] ++
1,476,529 UART: [fht] Storing FHT @ 0x50003400
1,479,180 UART: [idev] ++
1,479,348 UART: [idev] CDI.KEYID = 6
1,479,708 UART: [idev] SUBJECT.KEYID = 7
1,480,132 UART: [idev] UDS.KEYID = 0
1,480,477 ready_for_fw is high
1,480,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,962 UART: [idev] Erasing UDS.KEYID = 0
1,504,086 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,682 UART: [idev] --
1,513,569 UART: [ldev] ++
1,513,737 UART: [ldev] CDI.KEYID = 6
1,514,100 UART: [ldev] SUBJECT.KEYID = 5
1,514,526 UART: [ldev] AUTHORITY.KEYID = 7
1,514,989 UART: [ldev] FE.KEYID = 1
1,519,819 UART: [ldev] Erasing FE.KEYID = 1
1,545,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,020 UART: [ldev] --
1,584,363 UART: [fwproc] Waiting for Commands...
1,585,022 UART: [fwproc] Received command 0x46574c44
1,585,813 UART: [fwproc] Received Image of size 114168 bytes
2,882,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,007 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,068 >>> mbox cmd response: success
3,076,146 UART: [afmc] ++
3,076,314 UART: [afmc] CDI.KEYID = 6
3,076,676 UART: [afmc] SUBJECT.KEYID = 7
3,077,101 UART: [afmc] AUTHORITY.KEYID = 5
3,111,522 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,253 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,943 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,816 UART: [afmc] --
3,154,920 UART: [cold-reset] --
3,155,580 UART: [state] Locking Datavault
3,156,647 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,251 UART: [state] Locking ICCM
3,157,925 UART: [exit] Launching FMC @ 0x40000130
3,163,254 UART:
3,163,270 UART: Running Caliptra FMC ...
3,163,678 UART:
3,163,732 UART: [state] CFI Enabled
3,173,879 UART: [fht] FMC Alias Private Key: 7
3,282,568 UART: [art] Extend RT PCRs Done
3,282,996 UART: [art] Lock RT PCRs Done
3,284,448 UART: [art] Populate DV Done
3,292,809 UART: [fht] FMC Alias Private Key: 7
3,293,905 UART: [art] Derive CDI
3,294,185 UART: [art] Store in in slot 0x4
3,379,902 UART: [art] Derive Key Pair
3,380,262 UART: [art] Store priv key in slot 0x5
3,393,492 UART: [art] Derive Key Pair - Done
3,408,076 UART: [art] Signing Cert with AUTHO
3,408,556 UART: RITY.KEYID = 7
3,424,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,827 UART: [art] PUB.X = EB6D33EF7CBEA8E89B07842F6490F7D5646CA22BB72B06520E5ED07BB894C3DBFFBF2985A49044822F31208557D77925
3,431,594 UART: [art] PUB.Y = F1B22E1606452C265F13B224B4447068C5DDA11250A9AA8B74327036517886FA3E4285D697A1076E05FF7AE0E4859088
3,438,525 UART: [art] SIG.R = E6822653F5D5360EEB939D0639FAC65B5E590E89B1DCA46C4DC9FE32A4FA240F475F12E80EE3B1C58B27A0C46D122F63
3,445,292 UART: [art] SIG.S = FEB6C09813F73CE40A0777082718E488C9F8150B687D9D44682F5DAE758F838EB11EEA51AB9537E8EF2C75B3514B6AE2
3,469,043 UART: Caliptra RT
3,469,296 UART: [state] CFI Enabled
3,577,492 UART: [rt] RT listening for mailbox commands...
3,578,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,248 UART: [rt]cmd =0x41544d4e, len=14344
4,011,454 >>> mbox cmd response data (8 bytes)
4,011,455 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,376 UART: [rt]cmd =0x41545348, len=116
4,043,231 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,627 ready_for_fw is high
1,362,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,876 >>> mbox cmd response: success
2,988,492 UART:
2,988,508 UART: Running Caliptra FMC ...
2,988,916 UART:
2,988,970 UART: [state] CFI Enabled
2,999,333 UART: [fht] FMC Alias Private Key: 7
3,107,142 UART: [art] Extend RT PCRs Done
3,107,570 UART: [art] Lock RT PCRs Done
3,109,080 UART: [art] Populate DV Done
3,117,229 UART: [fht] FMC Alias Private Key: 7
3,118,353 UART: [art] Derive CDI
3,118,633 UART: [art] Store in in slot 0x4
3,204,270 UART: [art] Derive Key Pair
3,204,630 UART: [art] Store priv key in slot 0x5
3,217,500 UART: [art] Derive Key Pair - Done
3,232,150 UART: [art] Signing Cert with AUTHO
3,232,630 UART: RITY.KEYID = 7
3,247,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,605 UART: [art] PUB.X = 3CE084C05ECD39310206D5CFAC19678BF38C3CC017FE2681F5E00ECE8143A8959A887CDA2C50E23E8206135F3321F135
3,255,367 UART: [art] PUB.Y = 15C8E2BB93948FFE353BF410529DAF14A7707CDDCA8C4D280FCE193FD7BC360FC1E3EFAAEF179FB57182C779ECCFD2DE
3,262,341 UART: [art] SIG.R = E74102886FEA37B7C66F533F4140743528CED492F8B444F89EAE92D26A0E3535E4DF87FEA5ECCE8A925C7605C9ED3558
3,269,110 UART: [art] SIG.S = CEB4AB4FB23DC29D4EA032F84AF4FAFE316A606DEA1C7489BA368CE772D08846F2DE2F23CA33A1DCE318E7C7D324E285
3,292,675 UART: Caliptra RT
3,292,928 UART: [state] CFI Enabled
3,401,428 UART: [rt] RT listening for mailbox commands...
3,402,098 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,988 UART: [rt]cmd =0x41544d4e, len=14344
3,835,183 >>> mbox cmd response data (8 bytes)
3,835,184 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,277 UART: [rt]cmd =0x41545348, len=116
3,887,522 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,559 ready_for_fw is high
1,362,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,392 >>> mbox cmd response: success
2,985,374 UART:
2,985,390 UART: Running Caliptra FMC ...
2,985,798 UART:
2,985,852 UART: [state] CFI Enabled
2,996,401 UART: [fht] FMC Alias Private Key: 7
3,103,850 UART: [art] Extend RT PCRs Done
3,104,278 UART: [art] Lock RT PCRs Done
3,105,750 UART: [art] Populate DV Done
3,113,867 UART: [fht] FMC Alias Private Key: 7
3,114,821 UART: [art] Derive CDI
3,115,101 UART: [art] Store in in slot 0x4
3,200,498 UART: [art] Derive Key Pair
3,200,858 UART: [art] Store priv key in slot 0x5
3,213,728 UART: [art] Derive Key Pair - Done
3,228,503 UART: [art] Signing Cert with AUTHO
3,228,983 UART: RITY.KEYID = 7
3,244,131 UART: [art] Erasing AUTHORITY.KEYID = 7
3,244,896 UART: [art] PUB.X = 372D0F01296F28BA07BE9EB38C7974096A9B227BA18C5555BCC63D86E95DCDB43A3231D4D8CD9BBB8BC7E045747DE501
3,251,663 UART: [art] PUB.Y = 816F1C49CF85C560F40FFE637806AD1E5916A03B4D2C3C424FC063809B2853C5C9A5C92DF2220F1EF90C9B0D27058A4A
3,258,601 UART: [art] SIG.R = 2C7B89A2F4A9A6E6E785CCE19D7EE0A6F4817565C4CA415E2B817038F761EA31F033C3D007B0067973662F2CD730DF9B
3,265,371 UART: [art] SIG.S = 91992F2E2E4FE9009E83D2FBDE8DF2D4D55EB20CA79E554B57ACBB81B2E24D01F24FF472338D223864E6F59C97A93CA0
3,288,948 UART: Caliptra RT
3,289,201 UART: [state] CFI Enabled
3,397,440 UART: [rt] RT listening for mailbox commands...
3,398,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,521,008 UART: [rt]cmd =0x41544d4e, len=14344
3,831,020 >>> mbox cmd response data (8 bytes)
3,831,021 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,022 UART: [rt]cmd =0x41545348, len=116
3,862,845 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
902,615 UART: [kat] HMAC-384Kdf
907,181 UART: [kat] LMS
1,475,377 UART: [kat] --
1,476,204 UART: [cold-reset] ++
1,476,612 UART: [fht] Storing FHT @ 0x50003400
1,479,427 UART: [idev] ++
1,479,595 UART: [idev] CDI.KEYID = 6
1,479,955 UART: [idev] SUBJECT.KEYID = 7
1,480,379 UART: [idev] UDS.KEYID = 0
1,480,724 ready_for_fw is high
1,480,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,567 UART: [idev] Erasing UDS.KEYID = 0
1,504,955 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,419 UART: [idev] --
1,514,610 UART: [ldev] ++
1,514,778 UART: [ldev] CDI.KEYID = 6
1,515,141 UART: [ldev] SUBJECT.KEYID = 5
1,515,567 UART: [ldev] AUTHORITY.KEYID = 7
1,516,030 UART: [ldev] FE.KEYID = 1
1,521,278 UART: [ldev] Erasing FE.KEYID = 1
1,546,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,415 UART: [ldev] --
1,585,688 UART: [fwproc] Waiting for Commands...
1,586,513 UART: [fwproc] Received command 0x46574c44
1,587,304 UART: [fwproc] Received Image of size 114168 bytes
2,884,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,522 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,561 >>> mbox cmd response: success
3,077,727 UART: [afmc] ++
3,077,895 UART: [afmc] CDI.KEYID = 6
3,078,257 UART: [afmc] SUBJECT.KEYID = 7
3,078,682 UART: [afmc] AUTHORITY.KEYID = 5
3,113,529 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,966 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,656 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,633 UART: [afmc] --
3,156,719 UART: [cold-reset] --
3,157,727 UART: [state] Locking Datavault
3,159,128 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,732 UART: [state] Locking ICCM
3,160,368 UART: [exit] Launching FMC @ 0x40000130
3,165,697 UART:
3,165,713 UART: Running Caliptra FMC ...
3,166,121 UART:
3,166,264 UART: [state] CFI Enabled
3,176,699 UART: [fht] FMC Alias Private Key: 7
3,284,378 UART: [art] Extend RT PCRs Done
3,284,806 UART: [art] Lock RT PCRs Done
3,286,724 UART: [art] Populate DV Done
3,294,851 UART: [fht] FMC Alias Private Key: 7
3,295,919 UART: [art] Derive CDI
3,296,199 UART: [art] Store in in slot 0x4
3,381,856 UART: [art] Derive Key Pair
3,382,216 UART: [art] Store priv key in slot 0x5
3,395,458 UART: [art] Derive Key Pair - Done
3,410,248 UART: [art] Signing Cert with AUTHO
3,410,728 UART: RITY.KEYID = 7
3,426,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,813 UART: [art] PUB.X = 9F1EB6F24D3175C5B1CE8BC883314533EB47872E45E6C54D2C9F49405258532DB143447DD2A53D03654A2CC556B5F809
3,433,575 UART: [art] PUB.Y = AC1A41707FEABB35D653A69FB209D97D5CDEB787C1E9758AD8B3DDE6982B5BBA64EB7D49FA23D1B21794562301573371
3,440,531 UART: [art] SIG.R = 06ECC8EE35F5A1386A7A0BB4EFDEC2874D5CB81DE1843E811242D885175560D70FC9BDAD92FDCBF5064BF76BA8B03F34
3,447,309 UART: [art] SIG.S = E4C8F2EC5BCCE7D49D0DE9BB337FFFB733E7FDC1A5F89A3F24355CB6FFB1A83C3673196D95EB732B62710CD08F3A8750
3,470,912 UART: Caliptra RT
3,471,257 UART: [state] CFI Enabled
3,580,616 UART: [rt] RT listening for mailbox commands...
3,581,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,412 UART: [rt]cmd =0x41544d4e, len=14344
4,014,539 >>> mbox cmd response data (8 bytes)
4,014,540 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,699 UART: [rt]cmd =0x41545348, len=116
4,066,794 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,470 UART: [kat] SHA2-256
882,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,516 UART: [kat] ++
886,668 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
903,297 UART: [kat] HMAC-384Kdf
908,017 UART: [kat] LMS
1,476,213 UART: [kat] --
1,477,038 UART: [cold-reset] ++
1,477,552 UART: [fht] Storing FHT @ 0x50003400
1,480,225 UART: [idev] ++
1,480,393 UART: [idev] CDI.KEYID = 6
1,480,753 UART: [idev] SUBJECT.KEYID = 7
1,481,177 UART: [idev] UDS.KEYID = 0
1,481,522 ready_for_fw is high
1,481,522 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,209 UART: [idev] Erasing UDS.KEYID = 0
1,505,695 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,233 UART: [idev] --
1,515,294 UART: [ldev] ++
1,515,462 UART: [ldev] CDI.KEYID = 6
1,515,825 UART: [ldev] SUBJECT.KEYID = 5
1,516,251 UART: [ldev] AUTHORITY.KEYID = 7
1,516,714 UART: [ldev] FE.KEYID = 1
1,522,242 UART: [ldev] Erasing FE.KEYID = 1
1,547,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,645 UART: [ldev] --
1,588,082 UART: [fwproc] Waiting for Commands...
1,588,927 UART: [fwproc] Received command 0x46574c44
1,589,718 UART: [fwproc] Received Image of size 114168 bytes
2,886,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,832 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,184 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,685 >>> mbox cmd response: success
3,079,947 UART: [afmc] ++
3,080,115 UART: [afmc] CDI.KEYID = 6
3,080,477 UART: [afmc] SUBJECT.KEYID = 7
3,080,902 UART: [afmc] AUTHORITY.KEYID = 5
3,115,377 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,757 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,537 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,265 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,150 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,840 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,845 UART: [afmc] --
3,158,971 UART: [cold-reset] --
3,159,891 UART: [state] Locking Datavault
3,161,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,654 UART: [state] Locking ICCM
3,162,236 UART: [exit] Launching FMC @ 0x40000130
3,167,565 UART:
3,167,581 UART: Running Caliptra FMC ...
3,167,989 UART:
3,168,132 UART: [state] CFI Enabled
3,178,253 UART: [fht] FMC Alias Private Key: 7
3,286,020 UART: [art] Extend RT PCRs Done
3,286,448 UART: [art] Lock RT PCRs Done
3,288,078 UART: [art] Populate DV Done
3,296,227 UART: [fht] FMC Alias Private Key: 7
3,297,281 UART: [art] Derive CDI
3,297,561 UART: [art] Store in in slot 0x4
3,383,022 UART: [art] Derive Key Pair
3,383,382 UART: [art] Store priv key in slot 0x5
3,396,826 UART: [art] Derive Key Pair - Done
3,411,378 UART: [art] Signing Cert with AUTHO
3,411,858 UART: RITY.KEYID = 7
3,427,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,841 UART: [art] PUB.X = 613311F09B052F33B30593A2508D9D12ADD4B2C540E162848AD85AD0F6C0DF456F88788253E9E9FB0D3C4EF8D7546AF3
3,434,606 UART: [art] PUB.Y = 1DA98E9A6E081CD2446CD9DB0DC993BBADE8C1861E581C005F56148EC978C449C210B8D4EC8F4A40E9CE38F5C3353925
3,441,540 UART: [art] SIG.R = 2B856159E99E753E0FC7B77FE0B663372F39B8CD323A6CA32B1BE5A35F6B05FB4442B4FF3C5604A147ACC151769988FA
3,448,309 UART: [art] SIG.S = 473487F2C9B5A691B8A11FE059BBB3C49A1DDE295EA9026C9EF3D920004AC8F9BC5F3DC4A646229A3F0FFC4AAB80859B
3,472,480 UART: Caliptra RT
3,472,825 UART: [state] CFI Enabled
3,581,091 UART: [rt] RT listening for mailbox commands...
3,581,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,911 UART: [rt]cmd =0x41544d4e, len=14344
4,014,937 >>> mbox cmd response data (8 bytes)
4,014,938 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,015 UART: [rt]cmd =0x41545348, len=116
4,046,988 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,242 ready_for_fw is high
1,362,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,819 >>> mbox cmd response: success
2,985,795 UART:
2,985,811 UART: Running Caliptra FMC ...
2,986,219 UART:
2,986,362 UART: [state] CFI Enabled
2,996,933 UART: [fht] FMC Alias Private Key: 7
3,105,322 UART: [art] Extend RT PCRs Done
3,105,750 UART: [art] Lock RT PCRs Done
3,107,096 UART: [art] Populate DV Done
3,115,377 UART: [fht] FMC Alias Private Key: 7
3,116,459 UART: [art] Derive CDI
3,116,739 UART: [art] Store in in slot 0x4
3,202,238 UART: [art] Derive Key Pair
3,202,598 UART: [art] Store priv key in slot 0x5
3,216,060 UART: [art] Derive Key Pair - Done
3,230,777 UART: [art] Signing Cert with AUTHO
3,231,257 UART: RITY.KEYID = 7
3,246,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,080 UART: [art] PUB.X = 8DB0B86470B1182FBE9DE3529A2F342FFA38482D6D635A9A000155B0C77F8842D019BC5B6902B1BD90BC41EAEA3AC78A
3,253,834 UART: [art] PUB.Y = 4394D1A38FD20416AD5D4CC79F8D7991FC9D366535E572F11AE1B50A9E59E20988BA54937FB5EB306083F5239B239A5E
3,260,777 UART: [art] SIG.R = 5D9A60D26F1FA6F9C30072A84A741C81E5B7033E82D704A98E71E81931E3126B10D2ACE5A59BDF64D110EFE1ECEA2F10
3,267,531 UART: [art] SIG.S = C5D6CEBEF00DF0056F20BDC80A67095FC105F3BBEB5E29213DF25966B8C5724FE3504D8D03A7AD519328890BAACF7FB4
3,291,263 UART: Caliptra RT
3,291,608 UART: [state] CFI Enabled
3,399,591 UART: [rt] RT listening for mailbox commands...
3,400,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,563 UART: [rt]cmd =0x41544d4e, len=14344
3,833,536 >>> mbox cmd response data (8 bytes)
3,833,537 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,830 UART: [rt]cmd =0x41545348, len=116
3,886,143 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,778 ready_for_fw is high
1,362,778 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,639 >>> mbox cmd response: success
2,988,885 UART:
2,988,901 UART: Running Caliptra FMC ...
2,989,309 UART:
2,989,452 UART: [state] CFI Enabled
3,000,047 UART: [fht] FMC Alias Private Key: 7
3,108,034 UART: [art] Extend RT PCRs Done
3,108,462 UART: [art] Lock RT PCRs Done
3,109,760 UART: [art] Populate DV Done
3,117,915 UART: [fht] FMC Alias Private Key: 7
3,119,061 UART: [art] Derive CDI
3,119,341 UART: [art] Store in in slot 0x4
3,204,940 UART: [art] Derive Key Pair
3,205,300 UART: [art] Store priv key in slot 0x5
3,219,148 UART: [art] Derive Key Pair - Done
3,233,928 UART: [art] Signing Cert with AUTHO
3,234,408 UART: RITY.KEYID = 7
3,249,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,759 UART: [art] PUB.X = 89D6E77DBB44067CAC43438C4EED6D8F5C1DB065B1C927A3F4F6F9BFF35E703B646B1A10BD4460D60D9CB5E7429C4793
3,257,537 UART: [art] PUB.Y = 28DB381F7E627BB0EC9B94F30246134BB17984E64C62872E819F5FE018E7DC5482B8A51DE76AC203B7D67CF467CB64DE
3,264,489 UART: [art] SIG.R = DD39FB0E93FC3ED8CFBFF965778DBC8A019819E0A6C8BE332301DDFBE099B0F0D4D482E48071AD9076E29C1BE4FDCD7A
3,271,276 UART: [art] SIG.S = 5A94075F00E797B37F8086D11D5A3E25D78BCCAC225FC955FB5F230342DEB2A8815486C6A4C0DB0F0153B3EBBD5DAD49
3,295,225 UART: Caliptra RT
3,295,570 UART: [state] CFI Enabled
3,403,595 UART: [rt] RT listening for mailbox commands...
3,404,265 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,577 UART: [rt]cmd =0x41544d4e, len=14344
3,837,321 >>> mbox cmd response data (8 bytes)
3,837,322 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,405 UART: [rt]cmd =0x41545348, len=116
3,869,108 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,599 UART: [kat] SHA2-256
903,539 UART: [kat] SHA2-384
906,360 UART: [kat] SHA2-512-ACC
908,261 UART: [kat] ECC-384
917,780 UART: [kat] HMAC-384Kdf
922,318 UART: [kat] LMS
1,170,646 UART: [kat] --
1,171,359 UART: [cold-reset] ++
1,171,803 UART: [fht] FHT @ 0x50003400
1,174,420 UART: [idev] ++
1,174,588 UART: [idev] CDI.KEYID = 6
1,174,948 UART: [idev] SUBJECT.KEYID = 7
1,175,372 UART: [idev] UDS.KEYID = 0
1,175,717 ready_for_fw is high
1,175,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,362 UART: [idev] Erasing UDS.KEYID = 0
1,200,615 UART: [idev] Sha1 KeyId Algorithm
1,209,025 UART: [idev] --
1,210,145 UART: [ldev] ++
1,210,313 UART: [ldev] CDI.KEYID = 6
1,210,676 UART: [ldev] SUBJECT.KEYID = 5
1,211,102 UART: [ldev] AUTHORITY.KEYID = 7
1,211,565 UART: [ldev] FE.KEYID = 1
1,216,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,812 UART: [fwproc] Wait for Commands...
1,282,492 UART: [fwproc] Recv command 0x46574c44
1,283,220 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,675 >>> mbox cmd response: success
2,773,871 UART: [afmc] ++
2,774,039 UART: [afmc] CDI.KEYID = 6
2,774,401 UART: [afmc] SUBJECT.KEYID = 7
2,774,826 UART: [afmc] AUTHORITY.KEYID = 5
2,810,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,046 UART: [afmc] --
2,854,032 UART: [cold-reset] --
2,854,918 UART: [state] Locking Datavault
2,855,949 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,553 UART: [state] Locking ICCM
2,857,169 UART: [exit] Launching FMC @ 0x40000130
2,862,498 UART:
2,862,514 UART: Running Caliptra FMC ...
2,862,922 UART:
2,862,976 UART: [state] CFI Enabled
2,873,699 UART: [fht] FMC Alias Private Key: 7
2,982,176 UART: [art] Extend RT PCRs Done
2,982,604 UART: [art] Lock RT PCRs Done
2,984,042 UART: [art] Populate DV Done
2,992,429 UART: [fht] FMC Alias Private Key: 7
2,993,513 UART: [art] Derive CDI
2,993,793 UART: [art] Store in in slot 0x4
3,079,352 UART: [art] Derive Key Pair
3,079,712 UART: [art] Store priv key in slot 0x5
3,092,752 UART: [art] Derive Key Pair - Done
3,107,565 UART: [art] Signing Cert with AUTHO
3,108,045 UART: RITY.KEYID = 7
3,123,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,988 UART: [art] PUB.X = ABE952FC0FD2B86F557039462C8615E09D39B9D6A55AB89C22B7978FD59BB0009120E2234CA112AE91FD5B139505F7D0
3,130,734 UART: [art] PUB.Y = BF140BCE59856300A2D9BC2E2A49DD52AA89C9D55D301DB2B69BDA4C70DDC7659E29015AF606C629A90764EC9DEC76E1
3,137,666 UART: [art] SIG.R = 9C0D25B474F3CB1326D5A572BBEEB9537F890CD05C2C7A85661C6F57DC89038097E19ED2E8A07A62209F5813A3CD6AB7
3,144,435 UART: [art] SIG.S = 57D4B068DF880222790700D78720333E9CD14259E531BE87612168524AFF11A761CCBA95228CEACFE0A0386D057CBF0C
3,167,428 UART: Caliptra RT
3,167,681 UART: [state] CFI Enabled
3,275,144 UART: [rt] RT listening for mailbox commands...
3,275,814 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,852 UART: [rt]cmd =0x41544d4e, len=14344
3,708,541 >>> mbox cmd response data (8 bytes)
3,708,542 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,735 UART: [rt]cmd =0x41545348, len=116
3,760,206 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
893,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,441 UART: [kat] ++
897,593 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
917,906 UART: [kat] HMAC-384Kdf
922,528 UART: [kat] LMS
1,170,856 UART: [kat] --
1,171,533 UART: [cold-reset] ++
1,171,867 UART: [fht] FHT @ 0x50003400
1,174,564 UART: [idev] ++
1,174,732 UART: [idev] CDI.KEYID = 6
1,175,092 UART: [idev] SUBJECT.KEYID = 7
1,175,516 UART: [idev] UDS.KEYID = 0
1,175,861 ready_for_fw is high
1,175,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,430 UART: [idev] Erasing UDS.KEYID = 0
1,200,111 UART: [idev] Sha1 KeyId Algorithm
1,208,703 UART: [idev] --
1,209,665 UART: [ldev] ++
1,209,833 UART: [ldev] CDI.KEYID = 6
1,210,196 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,277 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,531 UART: [ldev] --
1,281,990 UART: [fwproc] Wait for Commands...
1,282,678 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,179 >>> mbox cmd response: success
2,771,209 UART: [afmc] ++
2,771,377 UART: [afmc] CDI.KEYID = 6
2,771,739 UART: [afmc] SUBJECT.KEYID = 7
2,772,164 UART: [afmc] AUTHORITY.KEYID = 5
2,807,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,970 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,583 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,302 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,232 UART: [afmc] --
2,851,150 UART: [cold-reset] --
2,852,048 UART: [state] Locking Datavault
2,853,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,847 UART: [state] Locking ICCM
2,854,519 UART: [exit] Launching FMC @ 0x40000130
2,859,848 UART:
2,859,864 UART: Running Caliptra FMC ...
2,860,272 UART:
2,860,326 UART: [state] CFI Enabled
2,870,591 UART: [fht] FMC Alias Private Key: 7
2,978,018 UART: [art] Extend RT PCRs Done
2,978,446 UART: [art] Lock RT PCRs Done
2,980,028 UART: [art] Populate DV Done
2,988,287 UART: [fht] FMC Alias Private Key: 7
2,989,465 UART: [art] Derive CDI
2,989,745 UART: [art] Store in in slot 0x4
3,075,666 UART: [art] Derive Key Pair
3,076,026 UART: [art] Store priv key in slot 0x5
3,089,004 UART: [art] Derive Key Pair - Done
3,103,330 UART: [art] Signing Cert with AUTHO
3,103,810 UART: RITY.KEYID = 7
3,119,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,067 UART: [art] PUB.X = 3FCA8E5D4E23E6A31695C3E26513391D87BC7C04C9AAE9F40AED668CC96C3A0EBB3CE536C8FA1C70F4BC5D1C5416919B
3,126,848 UART: [art] PUB.Y = 4457C63738E115B174C42EBCF341932115E2DC9CBD3A555EDF6902FFC9F46D0A20A66F4F3E18A28BBFE507E6FD646C5E
3,133,803 UART: [art] SIG.R = DE495D4550F788180F8B1C5ACDCCAD94A955C4B35DF466A505C8820B30CCE6AE58A1C0D653FE908A66B437629A7A28A2
3,140,576 UART: [art] SIG.S = 1EA78D775744FE0925A6850492EFC226FA16A65985C0410732A7C7840CED225789BD345193B5D566032B9154B896D4DA
3,164,558 UART: Caliptra RT
3,164,811 UART: [state] CFI Enabled
3,272,936 UART: [rt] RT listening for mailbox commands...
3,273,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,758 UART: [rt]cmd =0x41544d4e, len=14344
3,706,254 >>> mbox cmd response data (8 bytes)
3,706,255 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,312 UART: [rt]cmd =0x41545348, len=116
3,738,137 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,063 ready_for_fw is high
1,060,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,674 >>> mbox cmd response: success
2,685,094 UART:
2,685,110 UART: Running Caliptra FMC ...
2,685,518 UART:
2,685,572 UART: [state] CFI Enabled
2,696,249 UART: [fht] FMC Alias Private Key: 7
2,804,624 UART: [art] Extend RT PCRs Done
2,805,052 UART: [art] Lock RT PCRs Done
2,806,484 UART: [art] Populate DV Done
2,814,623 UART: [fht] FMC Alias Private Key: 7
2,815,757 UART: [art] Derive CDI
2,816,037 UART: [art] Store in in slot 0x4
2,901,476 UART: [art] Derive Key Pair
2,901,836 UART: [art] Store priv key in slot 0x5
2,915,374 UART: [art] Derive Key Pair - Done
2,929,822 UART: [art] Signing Cert with AUTHO
2,930,302 UART: RITY.KEYID = 7
2,945,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,405 UART: [art] PUB.X = B5360BE285ACF927CEAD1CA060EA9CF7095B743790117415B96FEDF55E0850400639CA1535CD060E56B2E402F3E6B2A6
2,953,160 UART: [art] PUB.Y = 962692ADC9D901CC3E9AA4853AA2F20D53E4F5D8AA49720AD0D4663A098661A12B4BBC4FEA6F93D7F9E70AD293A661E6
2,960,109 UART: [art] SIG.R = 68809C4DE53BB0BD13C9EFBDBF8DF8193240F93CE2F94EFF9CCFFE89E9F7EF585943C8DB0DC2FF8302509BCD36EA2DC6
2,966,903 UART: [art] SIG.S = BABA78C1C6CF6AB0A1E191581D28FA01379CB61FA2426398220ABEF1A562A890AFA784C62F97FC5EDBE558C46ED6735F
2,990,666 UART: Caliptra RT
2,990,919 UART: [state] CFI Enabled
3,098,000 UART: [rt] RT listening for mailbox commands...
3,098,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,670 UART: [rt]cmd =0x41544d4e, len=14344
3,531,505 >>> mbox cmd response data (8 bytes)
3,531,506 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,417 UART: [rt]cmd =0x41545348, len=116
3,583,162 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,981 ready_for_fw is high
1,059,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,004 >>> mbox cmd response: success
2,685,188 UART:
2,685,204 UART: Running Caliptra FMC ...
2,685,612 UART:
2,685,666 UART: [state] CFI Enabled
2,695,889 UART: [fht] FMC Alias Private Key: 7
2,803,770 UART: [art] Extend RT PCRs Done
2,804,198 UART: [art] Lock RT PCRs Done
2,805,926 UART: [art] Populate DV Done
2,814,387 UART: [fht] FMC Alias Private Key: 7
2,815,315 UART: [art] Derive CDI
2,815,595 UART: [art] Store in in slot 0x4
2,901,660 UART: [art] Derive Key Pair
2,902,020 UART: [art] Store priv key in slot 0x5
2,915,192 UART: [art] Derive Key Pair - Done
2,930,251 UART: [art] Signing Cert with AUTHO
2,930,731 UART: RITY.KEYID = 7
2,945,731 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,496 UART: [art] PUB.X = AF97E3C10B2ECE4172FD7C366B40BFF053202349BEE8D4C4BC3288A8FEED21756E4A65BDDCA7C80F3825D83E9B7BF0A5
2,953,282 UART: [art] PUB.Y = 9335FDCACE8E6B3B9C7B459323B9BF4A5B8528EAB6BF833D2C36A82F1B457AE1F26F90EFA6CCD3543F49C0E00671974B
2,960,247 UART: [art] SIG.R = AE5AFE8704E185590F8C0B7F280255580ECD322819F61ECDE50FBD7D09F94B8851B45A42D3D4776BB4D8C1B6DA031A1F
2,967,005 UART: [art] SIG.S = 6F4AFCB062D1B303C0ED052CBD3C09763ACD0A62A51CFFEC60090DB26D18D1718E65895EDBBDB252CDC4FC8137B080B1
2,991,006 UART: Caliptra RT
2,991,259 UART: [state] CFI Enabled
3,098,962 UART: [rt] RT listening for mailbox commands...
3,099,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,828 UART: [rt]cmd =0x41544d4e, len=14344
3,532,908 >>> mbox cmd response data (8 bytes)
3,532,909 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,972 UART: [rt]cmd =0x41545348, len=116
3,564,871 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
893,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,700 UART: [kat] ++
897,852 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
907,101 UART: [kat] SHA2-512-ACC
909,002 UART: [kat] ECC-384
919,201 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,932 UART: [cold-reset] ++
1,173,374 UART: [fht] FHT @ 0x50003400
1,176,131 UART: [idev] ++
1,176,299 UART: [idev] CDI.KEYID = 6
1,176,659 UART: [idev] SUBJECT.KEYID = 7
1,177,083 UART: [idev] UDS.KEYID = 0
1,177,428 ready_for_fw is high
1,177,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,149 UART: [idev] Erasing UDS.KEYID = 0
1,202,074 UART: [idev] Sha1 KeyId Algorithm
1,210,618 UART: [idev] --
1,211,672 UART: [ldev] ++
1,211,840 UART: [ldev] CDI.KEYID = 6
1,212,203 UART: [ldev] SUBJECT.KEYID = 5
1,212,629 UART: [ldev] AUTHORITY.KEYID = 7
1,213,092 UART: [ldev] FE.KEYID = 1
1,218,236 UART: [ldev] Erasing FE.KEYID = 1
1,244,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,512 UART: [ldev] --
1,283,973 UART: [fwproc] Wait for Commands...
1,284,595 UART: [fwproc] Recv command 0x46574c44
1,285,323 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,665 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,464 >>> mbox cmd response: success
2,775,504 UART: [afmc] ++
2,775,672 UART: [afmc] CDI.KEYID = 6
2,776,034 UART: [afmc] SUBJECT.KEYID = 7
2,776,459 UART: [afmc] AUTHORITY.KEYID = 5
2,811,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,179 UART: [afmc] --
2,855,175 UART: [cold-reset] --
2,856,001 UART: [state] Locking Datavault
2,857,176 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,780 UART: [state] Locking ICCM
2,858,432 UART: [exit] Launching FMC @ 0x40000130
2,863,761 UART:
2,863,777 UART: Running Caliptra FMC ...
2,864,185 UART:
2,864,328 UART: [state] CFI Enabled
2,874,749 UART: [fht] FMC Alias Private Key: 7
2,982,674 UART: [art] Extend RT PCRs Done
2,983,102 UART: [art] Lock RT PCRs Done
2,984,662 UART: [art] Populate DV Done
2,992,821 UART: [fht] FMC Alias Private Key: 7
2,993,957 UART: [art] Derive CDI
2,994,237 UART: [art] Store in in slot 0x4
3,080,090 UART: [art] Derive Key Pair
3,080,450 UART: [art] Store priv key in slot 0x5
3,093,850 UART: [art] Derive Key Pair - Done
3,108,675 UART: [art] Signing Cert with AUTHO
3,109,155 UART: RITY.KEYID = 7
3,124,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,950 UART: [art] PUB.X = 089E24A4BB01E319B4E87CC39BECEECE55BBF6AB57569B633B93D162358183F1BEED436F8A253817942D6D55C05FF7C7
3,131,726 UART: [art] PUB.Y = FE1E3F4BD449D5BE4C240B4099BEC4BCBB66A1A2B6C3436C5BC9B3E94B0C1A614818AC4A703A96B091AE89C7C1AC11C3
3,138,692 UART: [art] SIG.R = 201EC7171447DD8DE45DCE18B072B47AD25BB368314A50310E0DE8028A7E6C589E371CF2C9F683107AF56D6B3CA29A95
3,145,459 UART: [art] SIG.S = 864CFF7FA39113997E6F55150F348A40AADD9CB13B3E0985385BD017BB6FE4499C1DA30518BFE9639961EE7D5FE2BBBE
3,169,515 UART: Caliptra RT
3,169,860 UART: [state] CFI Enabled
3,277,563 UART: [rt] RT listening for mailbox commands...
3,278,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,335 UART: [rt]cmd =0x41544d4e, len=14344
3,711,318 >>> mbox cmd response data (8 bytes)
3,711,319 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,376 UART: [rt]cmd =0x41545348, len=116
3,763,393 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
893,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,348 UART: [kat] ++
897,500 UART: [kat] sha1
901,884 UART: [kat] SHA2-256
903,824 UART: [kat] SHA2-384
906,469 UART: [kat] SHA2-512-ACC
908,370 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,973 UART: [kat] LMS
1,171,301 UART: [kat] --
1,172,144 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 ready_for_fw is high
1,176,638 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,850 UART: [idev] Sha1 KeyId Algorithm
1,210,256 UART: [idev] --
1,211,378 UART: [ldev] ++
1,211,546 UART: [ldev] CDI.KEYID = 6
1,211,909 UART: [ldev] SUBJECT.KEYID = 5
1,212,335 UART: [ldev] AUTHORITY.KEYID = 7
1,212,798 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,244,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,416 UART: [ldev] --
1,283,717 UART: [fwproc] Wait for Commands...
1,284,537 UART: [fwproc] Recv command 0x46574c44
1,285,265 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,876 >>> mbox cmd response: success
2,774,888 UART: [afmc] ++
2,775,056 UART: [afmc] CDI.KEYID = 6
2,775,418 UART: [afmc] SUBJECT.KEYID = 7
2,775,843 UART: [afmc] AUTHORITY.KEYID = 5
2,810,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,971 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,856 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,575 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,425 UART: [afmc] --
2,854,511 UART: [cold-reset] --
2,855,609 UART: [state] Locking Datavault
2,856,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,282 UART: [state] Locking ICCM
2,857,912 UART: [exit] Launching FMC @ 0x40000130
2,863,241 UART:
2,863,257 UART: Running Caliptra FMC ...
2,863,665 UART:
2,863,808 UART: [state] CFI Enabled
2,874,353 UART: [fht] FMC Alias Private Key: 7
2,982,232 UART: [art] Extend RT PCRs Done
2,982,660 UART: [art] Lock RT PCRs Done
2,984,098 UART: [art] Populate DV Done
2,992,371 UART: [fht] FMC Alias Private Key: 7
2,993,411 UART: [art] Derive CDI
2,993,691 UART: [art] Store in in slot 0x4
3,079,344 UART: [art] Derive Key Pair
3,079,704 UART: [art] Store priv key in slot 0x5
3,092,962 UART: [art] Derive Key Pair - Done
3,107,997 UART: [art] Signing Cert with AUTHO
3,108,477 UART: RITY.KEYID = 7
3,123,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,356 UART: [art] PUB.X = 9BFE9D89F34452965C978898BE8A1B6E4EE9B159CDD8621C98FE734F8E0B63E8C07BB8C446B306EF24793BC9A678AF79
3,131,130 UART: [art] PUB.Y = 219424923F9E19A53D404B1809CA242C46E659A8B7535829EDABB196C76C44964FB444E882A1DCC76B58E9F3DD2C129A
3,138,079 UART: [art] SIG.R = CFB654B60D7F379C13FF2B5CBEBB9F4E4D2BA11D9142D178F01987A3C223B9A2F9E33993E6279487F82AA2C1F90661F0
3,144,853 UART: [art] SIG.S = C84C932F1C7AA24D837FECE24CAE0A6C9D0BD8E3B6DF499851FDD5FF390078F598853A79DE2A8D0B2C10DCBCCBD78F92
3,168,329 UART: Caliptra RT
3,168,674 UART: [state] CFI Enabled
3,275,502 UART: [rt] RT listening for mailbox commands...
3,276,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,020 UART: [rt]cmd =0x41544d4e, len=14344
3,708,862 >>> mbox cmd response data (8 bytes)
3,708,863 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,938 UART: [rt]cmd =0x41545348, len=116
3,740,493 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,316 ready_for_fw is high
1,060,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,013 >>> mbox cmd response: success
2,686,439 UART:
2,686,455 UART: Running Caliptra FMC ...
2,686,863 UART:
2,687,006 UART: [state] CFI Enabled
2,697,729 UART: [fht] FMC Alias Private Key: 7
2,805,162 UART: [art] Extend RT PCRs Done
2,805,590 UART: [art] Lock RT PCRs Done
2,807,194 UART: [art] Populate DV Done
2,815,341 UART: [fht] FMC Alias Private Key: 7
2,816,423 UART: [art] Derive CDI
2,816,703 UART: [art] Store in in slot 0x4
2,902,336 UART: [art] Derive Key Pair
2,902,696 UART: [art] Store priv key in slot 0x5
2,915,150 UART: [art] Derive Key Pair - Done
2,929,805 UART: [art] Signing Cert with AUTHO
2,930,285 UART: RITY.KEYID = 7
2,945,279 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,044 UART: [art] PUB.X = 963340CA2D33CB47E4F9EDC2A44212009C6A0C459F4B91D9D5667F8F04DDF09992FC930A2D5CC4C84C9AF8C744FCDDD7
2,952,799 UART: [art] PUB.Y = 90D2A3F3554BC3281994F369DA7A61EC3B8C3A89FFFE8CA8ABF8B803D41ED6A5CE1D6B4DC725DD0663BA83B7478E6A7A
2,959,765 UART: [art] SIG.R = 5514227C7E08E82173C9E2F01FF9EB38EAD59EA5C32C01C94EBD7EA9357F561D72367ADA494AFC2E34CDC753E292924E
2,966,541 UART: [art] SIG.S = 762BBB71737274E612AF242BDB092718B6ACD32DCA62089BF305F914660BBC4793067EEC39D6475D4572BFEA6D52BC2F
2,989,951 UART: Caliptra RT
2,990,296 UART: [state] CFI Enabled
3,097,743 UART: [rt] RT listening for mailbox commands...
3,098,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,111 UART: [rt]cmd =0x41544d4e, len=14344
3,530,934 >>> mbox cmd response data (8 bytes)
3,530,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,942 UART: [rt]cmd =0x41545348, len=116
3,582,797 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,092 ready_for_fw is high
1,060,092 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,021 >>> mbox cmd response: success
2,688,531 UART:
2,688,547 UART: Running Caliptra FMC ...
2,688,955 UART:
2,689,098 UART: [state] CFI Enabled
2,699,809 UART: [fht] FMC Alias Private Key: 7
2,807,514 UART: [art] Extend RT PCRs Done
2,807,942 UART: [art] Lock RT PCRs Done
2,809,508 UART: [art] Populate DV Done
2,817,805 UART: [fht] FMC Alias Private Key: 7
2,818,863 UART: [art] Derive CDI
2,819,143 UART: [art] Store in in slot 0x4
2,905,092 UART: [art] Derive Key Pair
2,905,452 UART: [art] Store priv key in slot 0x5
2,918,514 UART: [art] Derive Key Pair - Done
2,933,699 UART: [art] Signing Cert with AUTHO
2,934,179 UART: RITY.KEYID = 7
2,949,157 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,922 UART: [art] PUB.X = FD7CC23B2E9EC88D4E324085593893759D549E1DC1832159562BA9874A4A8F289D5ED1F7EEC9348D1804DC65DF6467F6
2,956,691 UART: [art] PUB.Y = FA3FE4C270541EEC1D4728CD605F304CB8D83315EFD3F6C472CA7E8FE0238796090F67C7070D81A1DBBBC07AFB3795B1
2,963,643 UART: [art] SIG.R = D9B5F2544BE38577A84259FC3952A65817A076CA57D4F8EC436B92E10127040156A651A9DEA851599C874E3120F6AA07
2,970,395 UART: [art] SIG.S = AF6B75072B1186000833BA96F389C12D1763E1F6E8D4A60420635CA044C111D1885E3CA243A355CB49CE5283F112E96E
2,994,065 UART: Caliptra RT
2,994,410 UART: [state] CFI Enabled
3,103,120 UART: [rt] RT listening for mailbox commands...
3,103,790 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,800 UART: [rt]cmd =0x41544d4e, len=14344
3,536,020 >>> mbox cmd response data (8 bytes)
3,536,021 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,565,966 UART: [rt]cmd =0x41545348, len=116
3,567,941 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,470 UART: [kat] LMS
1,168,782 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,591 UART: [idev] ++
1,172,759 UART: [idev] CDI.KEYID = 6
1,173,120 UART: [idev] SUBJECT.KEYID = 7
1,173,545 UART: [idev] UDS.KEYID = 0
1,173,891 ready_for_fw is high
1,173,891 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,277 UART: [idev] Sha1 KeyId Algorithm
1,207,163 UART: [idev] --
1,208,208 UART: [ldev] ++
1,208,376 UART: [ldev] CDI.KEYID = 6
1,208,740 UART: [ldev] SUBJECT.KEYID = 5
1,209,167 UART: [ldev] AUTHORITY.KEYID = 7
1,209,630 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,241,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,622 UART: [ldev] --
1,280,926 UART: [fwproc] Wait for Commands...
1,281,667 UART: [fwproc] Recv command 0x46574c44
1,282,400 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,509 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,151 >>> mbox cmd response: success
2,771,318 UART: [afmc] ++
2,771,486 UART: [afmc] CDI.KEYID = 6
2,771,849 UART: [afmc] SUBJECT.KEYID = 7
2,772,275 UART: [afmc] AUTHORITY.KEYID = 5
2,807,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,351 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,080 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,565 UART: [afmc] --
2,850,465 UART: [cold-reset] --
2,851,153 UART: [state] Locking Datavault
2,852,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,992 UART: [state] Locking ICCM
2,853,548 UART: [exit] Launching FMC @ 0x40000130
2,858,877 UART:
2,858,893 UART: Running Caliptra FMC ...
2,859,301 UART:
2,859,355 UART: [state] CFI Enabled
2,869,720 UART: [fht] FMC Alias Private Key: 7
2,977,565 UART: [art] Extend RT PCRs Done
2,977,993 UART: [art] Lock RT PCRs Done
2,979,407 UART: [art] Populate DV Done
2,987,364 UART: [fht] FMC Alias Private Key: 7
2,988,392 UART: [art] Derive CDI
2,988,672 UART: [art] Store in in slot 0x4
3,074,075 UART: [art] Derive Key Pair
3,074,435 UART: [art] Store priv key in slot 0x5
3,087,547 UART: [art] Derive Key Pair - Done
3,102,381 UART: [art] Signing Cert with AUTHO
3,102,861 UART: RITY.KEYID = 7
3,117,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,682 UART: [art] PUB.X = 4768A584794C14FA8AC55293F80DCA9414F8D1B19564F92DB90F137E8506000F04C248ACA152FF78991DC893C3F16E7C
3,125,415 UART: [art] PUB.Y = 3EB9E08708E1D8F3F1ABD84AF346D3352EC47993464072B1D32E86DCE5067C0267CB6AD724B6B8D374C93C6E677EDFAB
3,132,368 UART: [art] SIG.R = CC8920F7FF685B8886065DF9F9523E15D5BCD8C776110EC250840766A6ACB82EC25ED6CAC891F5CE980F33D0D33A05CA
3,139,135 UART: [art] SIG.S = E843DEAF0A5CC09C83D440DAF6040808270E869A0F288EE1FB3AFBBCAACE4FFE671AC83E9FCF46C9B4C159ED8D89E97E
3,162,308 UART: Caliptra RT
3,162,561 UART: [state] CFI Enabled
3,269,347 UART: [rt] RT listening for mailbox commands...
3,270,017 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,279 UART: [rt]cmd =0x41544d4e, len=14344
3,702,998 >>> mbox cmd response data (8 bytes)
3,702,999 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,144 UART: [rt]cmd =0x41545348, len=116
3,754,137 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,353 UART: [kat] ++
895,505 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,370 UART: [kat] SHA2-512-ACC
906,271 UART: [kat] ECC-384
915,990 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,333 UART: [fht] FHT @ 0x50003400
1,172,913 UART: [idev] ++
1,173,081 UART: [idev] CDI.KEYID = 6
1,173,442 UART: [idev] SUBJECT.KEYID = 7
1,173,867 UART: [idev] UDS.KEYID = 0
1,174,213 ready_for_fw is high
1,174,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,208,011 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,412 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,523 UART: [fwproc] Recv command 0x46574c44
1,283,256 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,021 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,691 >>> mbox cmd response: success
2,772,850 UART: [afmc] ++
2,773,018 UART: [afmc] CDI.KEYID = 6
2,773,381 UART: [afmc] SUBJECT.KEYID = 7
2,773,807 UART: [afmc] AUTHORITY.KEYID = 5
2,808,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,588 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,471 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,190 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,113 UART: [afmc] --
2,852,181 UART: [cold-reset] --
2,852,939 UART: [state] Locking Datavault
2,854,412 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,016 UART: [state] Locking ICCM
2,855,560 UART: [exit] Launching FMC @ 0x40000130
2,860,889 UART:
2,860,905 UART: Running Caliptra FMC ...
2,861,313 UART:
2,861,367 UART: [state] CFI Enabled
2,871,936 UART: [fht] FMC Alias Private Key: 7
2,980,125 UART: [art] Extend RT PCRs Done
2,980,553 UART: [art] Lock RT PCRs Done
2,981,981 UART: [art] Populate DV Done
2,990,246 UART: [fht] FMC Alias Private Key: 7
2,991,300 UART: [art] Derive CDI
2,991,580 UART: [art] Store in in slot 0x4
3,077,207 UART: [art] Derive Key Pair
3,077,567 UART: [art] Store priv key in slot 0x5
3,090,567 UART: [art] Derive Key Pair - Done
3,105,186 UART: [art] Signing Cert with AUTHO
3,105,666 UART: RITY.KEYID = 7
3,120,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,201 UART: [art] PUB.X = 92FF2F01B2ABD04C2F5F02B4DC8F541FC9FA9F73C33D7E9281DA9E583F28A85C319EC56437AF6C750CD66CB4433624F5
3,127,976 UART: [art] PUB.Y = DC45838A1972F09A32A91BD7504F265D100BD4EB833960A856E8802524FE256ABD27DC44AD66A3CEB926280C3087C295
3,134,920 UART: [art] SIG.R = FDA10E7AA32849135DD265999A42058E56FEAC6DE5F48C2C9665F6C5FDCBD9C2E2578583C4F7690882C0C6AE91B89B7F
3,141,693 UART: [art] SIG.S = D62C493C1CCDD2D61BB37BE7866549CE9111F799FA16249F15832E3F1DF5246F18D2D6D9EB64B434F55DA94D5C08BE77
3,165,537 UART: Caliptra RT
3,165,790 UART: [state] CFI Enabled
3,273,728 UART: [rt] RT listening for mailbox commands...
3,274,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,402 UART: [rt]cmd =0x41544d4e, len=14344
3,706,568 >>> mbox cmd response data (8 bytes)
3,706,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,552 UART: [rt]cmd =0x41545348, len=116
3,738,407 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,234 ready_for_fw is high
1,056,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,481 >>> mbox cmd response: success
2,683,601 UART:
2,683,617 UART: Running Caliptra FMC ...
2,684,025 UART:
2,684,079 UART: [state] CFI Enabled
2,694,284 UART: [fht] FMC Alias Private Key: 7
2,802,617 UART: [art] Extend RT PCRs Done
2,803,045 UART: [art] Lock RT PCRs Done
2,804,615 UART: [art] Populate DV Done
2,812,730 UART: [fht] FMC Alias Private Key: 7
2,813,664 UART: [art] Derive CDI
2,813,944 UART: [art] Store in in slot 0x4
2,899,339 UART: [art] Derive Key Pair
2,899,699 UART: [art] Store priv key in slot 0x5
2,912,749 UART: [art] Derive Key Pair - Done
2,927,556 UART: [art] Signing Cert with AUTHO
2,928,036 UART: RITY.KEYID = 7
2,942,714 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,479 UART: [art] PUB.X = B8A739BEB12BB275F04B8EB19FD5B8E1EB384038D626D6802CB8B353F52DD8AD2D5A4C6864B33073340A239CDACD7FBB
2,950,264 UART: [art] PUB.Y = 8AF213E6A503FA8E7A6C0D03856FC2634DD94000AAEBCD7C7BF80DF232E249A50BF5AD005E728DDF7662A352D83D9EA4
2,957,173 UART: [art] SIG.R = C1E4E42B47CF890132DC471ED087BB40AEBDC9D808A44AF3CEB037B75CD6C68E4BF81F875ACAC6FB12CF95F2EA551C0C
2,963,962 UART: [art] SIG.S = 7E3B144BF9B250A5A2C85567431150CE14AF18658FAD4CB9AE1A77CCF6FF1E3F4DF11C5AD78C81D9B6FC1A3FEEC962D3
2,987,377 UART: Caliptra RT
2,987,630 UART: [state] CFI Enabled
3,095,563 UART: [rt] RT listening for mailbox commands...
3,096,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,679 UART: [rt]cmd =0x41544d4e, len=14344
3,529,772 >>> mbox cmd response data (8 bytes)
3,529,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,870 UART: [rt]cmd =0x41545348, len=116
3,581,013 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,532 ready_for_fw is high
1,055,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,927 >>> mbox cmd response: success
2,682,517 UART:
2,682,533 UART: Running Caliptra FMC ...
2,682,941 UART:
2,682,995 UART: [state] CFI Enabled
2,693,236 UART: [fht] FMC Alias Private Key: 7
2,801,217 UART: [art] Extend RT PCRs Done
2,801,645 UART: [art] Lock RT PCRs Done
2,802,801 UART: [art] Populate DV Done
2,811,066 UART: [fht] FMC Alias Private Key: 7
2,812,090 UART: [art] Derive CDI
2,812,370 UART: [art] Store in in slot 0x4
2,897,919 UART: [art] Derive Key Pair
2,898,279 UART: [art] Store priv key in slot 0x5
2,911,605 UART: [art] Derive Key Pair - Done
2,926,288 UART: [art] Signing Cert with AUTHO
2,926,768 UART: RITY.KEYID = 7
2,942,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,909 UART: [art] PUB.X = 66F6618432347B8BA5CE02DBABDD49235172DC3A8DD115E026753FE56D1CC93ADED3B587A9CAE2719044ACE786A234BA
2,949,690 UART: [art] PUB.Y = C3E7F1FCC9B54672CA15A33940B9E74B309E30C199559FA51F84779CF984F3EA10DBB8164FC739A557CE69A5E8402E68
2,956,646 UART: [art] SIG.R = A34083CA2FCC937A5F92B44681B23DFFA527D065E8041E8F6069322CAB7A48CF121F5E8B86922CB5910FCAB0582F3B81
2,963,418 UART: [art] SIG.S = C5B730D3DFEE6DEDBD0911E37441254E4BA4EE1CC841AF0AEAD89E4E685C195124C0AF1D6471322C5AE75DD4249D4E5E
2,986,919 UART: Caliptra RT
2,987,172 UART: [state] CFI Enabled
3,094,160 UART: [rt] RT listening for mailbox commands...
3,094,830 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,840 UART: [rt]cmd =0x41544d4e, len=14344
3,527,650 >>> mbox cmd response data (8 bytes)
3,527,651 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,856 UART: [rt]cmd =0x41545348, len=116
3,559,751 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
891,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,090 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,510 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,385 UART: [ldev] ++
1,209,553 UART: [ldev] CDI.KEYID = 6
1,209,917 UART: [ldev] SUBJECT.KEYID = 5
1,210,344 UART: [ldev] AUTHORITY.KEYID = 7
1,210,807 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,625 UART: [ldev] --
1,281,003 UART: [fwproc] Wait for Commands...
1,281,806 UART: [fwproc] Recv command 0x46574c44
1,282,539 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,249 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,558 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,198 >>> mbox cmd response: success
2,772,267 UART: [afmc] ++
2,772,435 UART: [afmc] CDI.KEYID = 6
2,772,798 UART: [afmc] SUBJECT.KEYID = 7
2,773,224 UART: [afmc] AUTHORITY.KEYID = 5
2,808,199 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,906 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,625 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,650 UART: [afmc] --
2,851,664 UART: [cold-reset] --
2,852,378 UART: [state] Locking Datavault
2,853,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,977 UART: [state] Locking ICCM
2,854,411 UART: [exit] Launching FMC @ 0x40000130
2,859,740 UART:
2,859,756 UART: Running Caliptra FMC ...
2,860,164 UART:
2,860,307 UART: [state] CFI Enabled
2,870,842 UART: [fht] FMC Alias Private Key: 7
2,979,445 UART: [art] Extend RT PCRs Done
2,979,873 UART: [art] Lock RT PCRs Done
2,981,415 UART: [art] Populate DV Done
2,989,744 UART: [fht] FMC Alias Private Key: 7
2,990,774 UART: [art] Derive CDI
2,991,054 UART: [art] Store in in slot 0x4
3,076,941 UART: [art] Derive Key Pair
3,077,301 UART: [art] Store priv key in slot 0x5
3,090,475 UART: [art] Derive Key Pair - Done
3,105,075 UART: [art] Signing Cert with AUTHO
3,105,555 UART: RITY.KEYID = 7
3,121,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,802 UART: [art] PUB.X = B668BE2BFC429369653E87735C3E9CE07863BA5FE6B1A9AC7013F700350CF1B18C048DA6E01C260C14E9F83A8BBFC1ED
3,128,555 UART: [art] PUB.Y = FC3B440FEA32CC2D7F92827E7F15130B4AA41F41241F2E596E1E856771FFCBD846D4FA7D7F30FD9C0C7E4145E44AED81
3,135,512 UART: [art] SIG.R = 9A00F3377ED3ADE1EBA6BE49DEA405322C962CACCB4867E63B6392FBCD12DF74DEA39A0E672FBA8B5808712EE1274211
3,142,269 UART: [art] SIG.S = 308734045C159344CEC3EA5CDCE12DA7F0C6DA996B4F5F5FC870A5DD64D911E92A194B9EFB4534F795E56A50A2B120F1
3,165,845 UART: Caliptra RT
3,166,190 UART: [state] CFI Enabled
3,273,363 UART: [rt] RT listening for mailbox commands...
3,274,033 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,047 UART: [rt]cmd =0x41544d4e, len=14344
3,707,292 >>> mbox cmd response data (8 bytes)
3,707,293 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,370 UART: [rt]cmd =0x41545348, len=116
3,758,911 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
899,944 UART: [kat] SHA2-256
901,884 UART: [kat] SHA2-384
904,589 UART: [kat] SHA2-512-ACC
906,490 UART: [kat] ECC-384
916,069 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,846 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,874 UART: [idev] ++
1,173,042 UART: [idev] CDI.KEYID = 6
1,173,403 UART: [idev] SUBJECT.KEYID = 7
1,173,828 UART: [idev] UDS.KEYID = 0
1,174,174 ready_for_fw is high
1,174,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,199,162 UART: [idev] Sha1 KeyId Algorithm
1,207,982 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,869 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,282,030 UART: [fwproc] Recv command 0x46574c44
1,282,763 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,636 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,304 >>> mbox cmd response: success
2,772,509 UART: [afmc] ++
2,772,677 UART: [afmc] CDI.KEYID = 6
2,773,040 UART: [afmc] SUBJECT.KEYID = 7
2,773,466 UART: [afmc] AUTHORITY.KEYID = 5
2,809,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,325 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,805 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,688 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,407 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,228 UART: [afmc] --
2,852,262 UART: [cold-reset] --
2,853,108 UART: [state] Locking Datavault
2,853,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,579 UART: [state] Locking ICCM
2,855,027 UART: [exit] Launching FMC @ 0x40000130
2,860,356 UART:
2,860,372 UART: Running Caliptra FMC ...
2,860,780 UART:
2,860,923 UART: [state] CFI Enabled
2,871,484 UART: [fht] FMC Alias Private Key: 7
2,979,499 UART: [art] Extend RT PCRs Done
2,979,927 UART: [art] Lock RT PCRs Done
2,981,453 UART: [art] Populate DV Done
2,989,754 UART: [fht] FMC Alias Private Key: 7
2,990,718 UART: [art] Derive CDI
2,990,998 UART: [art] Store in in slot 0x4
3,076,477 UART: [art] Derive Key Pair
3,076,837 UART: [art] Store priv key in slot 0x5
3,090,421 UART: [art] Derive Key Pair - Done
3,105,040 UART: [art] Signing Cert with AUTHO
3,105,520 UART: RITY.KEYID = 7
3,121,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,867 UART: [art] PUB.X = 2EBF5EF91BDE9F4F2477653F29C8DF3036E031F679AB4045FA49A2403696C52432DD93CBE943491AF65DC1C098286132
3,128,639 UART: [art] PUB.Y = 55555CE9C610316A3F06EE5B88D697A346E8E492ADAE3BEEF400621D606797947D6A74FFCE760EA4E850A2D4D2FD5465
3,135,569 UART: [art] SIG.R = C69B7B43D6F856DA48E91340BB671A0FF2F641ADFF8D1BD7B1373B210611454A55282EE582192BF8C7028A03637D5D9F
3,142,331 UART: [art] SIG.S = 84C5AFED1014F1C64144AF061340D9BDBC2EE67CF109FCADB6779C4EA8EDA55672F75F2E3794EFCAB8ED79D54188B40F
3,165,943 UART: Caliptra RT
3,166,288 UART: [state] CFI Enabled
3,274,230 UART: [rt] RT listening for mailbox commands...
3,274,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,760 UART: [rt]cmd =0x41544d4e, len=14344
3,707,762 >>> mbox cmd response data (8 bytes)
3,707,763 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,686 UART: [rt]cmd =0x41545348, len=116
3,739,107 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,045 ready_for_fw is high
1,056,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,748 >>> mbox cmd response: success
2,683,634 UART:
2,683,650 UART: Running Caliptra FMC ...
2,684,058 UART:
2,684,201 UART: [state] CFI Enabled
2,694,668 UART: [fht] FMC Alias Private Key: 7
2,802,889 UART: [art] Extend RT PCRs Done
2,803,317 UART: [art] Lock RT PCRs Done
2,805,035 UART: [art] Populate DV Done
2,813,290 UART: [fht] FMC Alias Private Key: 7
2,814,272 UART: [art] Derive CDI
2,814,552 UART: [art] Store in in slot 0x4
2,900,159 UART: [art] Derive Key Pair
2,900,519 UART: [art] Store priv key in slot 0x5
2,913,993 UART: [art] Derive Key Pair - Done
2,928,646 UART: [art] Signing Cert with AUTHO
2,929,126 UART: RITY.KEYID = 7
2,944,266 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,031 UART: [art] PUB.X = B370F0A7BF3ED45A92AB39FE75EC29531E635B70A6713A711088AE612453DF41BEC00AA65B5CDA2DABC5F6A39FF94EED
2,951,820 UART: [art] PUB.Y = 6874544DDE7D44069FAEBD07D27CB0A7D033D13D98C341293F7B011EF2DD39AE3942EFA2C0AA92ADB5B2B2F57F51BF3E
2,958,781 UART: [art] SIG.R = BAC2B5C37BDC8AEF449F9EC02C2F1A5B88CCF0471BC912921630EEA2D4AD08CAE9557D2B05A3EBA4CBBA1ED923C93228
2,965,573 UART: [art] SIG.S = 8E2FF4D2CA3FF6B5BC9ECD6BDEC624497DEECCC582571ECD27C30EB5A23387A5DB1E9271216FC5272D7A56A3C3D91ADC
2,989,767 UART: Caliptra RT
2,990,112 UART: [state] CFI Enabled
3,097,470 UART: [rt] RT listening for mailbox commands...
3,098,140 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,382 UART: [rt]cmd =0x41544d4e, len=14344
3,531,773 >>> mbox cmd response data (8 bytes)
3,531,774 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,011 UART: [rt]cmd =0x41545348, len=116
3,583,852 >>> mbox cmd response data (12 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,729 ready_for_fw is high
1,055,729 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,568 >>> mbox cmd response: success
2,681,992 UART:
2,682,008 UART: Running Caliptra FMC ...
2,682,416 UART:
2,682,559 UART: [state] CFI Enabled
2,693,214 UART: [fht] FMC Alias Private Key: 7
2,801,159 UART: [art] Extend RT PCRs Done
2,801,587 UART: [art] Lock RT PCRs Done
2,803,647 UART: [art] Populate DV Done
2,811,868 UART: [fht] FMC Alias Private Key: 7
2,812,890 UART: [art] Derive CDI
2,813,170 UART: [art] Store in in slot 0x4
2,898,821 UART: [art] Derive Key Pair
2,899,181 UART: [art] Store priv key in slot 0x5
2,912,505 UART: [art] Derive Key Pair - Done
2,927,135 UART: [art] Signing Cert with AUTHO
2,927,615 UART: RITY.KEYID = 7
2,942,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,634 UART: [art] PUB.X = 56A757BB24B841BA8DFE2E84FB83F7C59B290A57A4D9FB04B12CCE4E30C2BF7383473A6ECAC71A457147112E5AFC1C01
2,950,411 UART: [art] PUB.Y = 70841008E00EE082A2A0964D4544E5C50DE4FD6184B169AB1764FC5004742B917A5D9C2B2B163022E0FF3D934DEB5A7F
2,957,351 UART: [art] SIG.R = B20023014ADD20B0490775FDB3E9D84CB22E059C71D1E98A30F9F046EFC30DF53F85531B52FC74D8C1C2121B01A907CA
2,964,089 UART: [art] SIG.S = DAF9B8D354A5618F8F68F4972099E087E10C7A1934751A96504DAA3238ACE2DE036748C6B442CCDA3A589BE2340AB95D
2,987,515 UART: Caliptra RT
2,987,860 UART: [state] CFI Enabled
3,095,110 UART: [rt] RT listening for mailbox commands...
3,095,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,886 UART: [rt]cmd =0x41544d4e, len=14344
3,528,440 >>> mbox cmd response data (8 bytes)
3,528,441 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,794 UART: [rt]cmd =0x41545348, len=116
3,560,663 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,142 UART:
192,510 UART: Running Caliptra ROM ...
193,599 UART:
193,745 UART: [state] CFI Enabled
265,122 UART: [state] LifecycleState = Unprovisioned
267,105 UART: [state] DebugLocked = No
268,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,370 UART: [kat] SHA2-256
443,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,558 UART: [kat] ++
454,044 UART: [kat] sha1
464,659 UART: [kat] SHA2-256
467,385 UART: [kat] SHA2-384
474,006 UART: [kat] SHA2-512-ACC
476,374 UART: [kat] ECC-384
2,769,658 UART: [kat] HMAC-384Kdf
2,799,511 UART: [kat] LMS
3,989,812 UART: [kat] --
3,995,173 UART: [cold-reset] ++
3,996,823 UART: [fht] Storing FHT @ 0x50003400
4,009,074 UART: [idev] ++
4,009,645 UART: [idev] CDI.KEYID = 6
4,010,552 UART: [idev] SUBJECT.KEYID = 7
4,011,794 UART: [idev] UDS.KEYID = 0
4,012,753 ready_for_fw is high
4,012,946 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,138 UART: [idev] Erasing UDS.KEYID = 0
7,344,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,761 UART: [idev] --
7,368,009 UART: [ldev] ++
7,368,590 UART: [ldev] CDI.KEYID = 6
7,369,558 UART: [ldev] SUBJECT.KEYID = 5
7,370,767 UART: [ldev] AUTHORITY.KEYID = 7
7,371,989 UART: [ldev] FE.KEYID = 1
7,402,143 UART: [ldev] Erasing FE.KEYID = 1
10,735,226 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,213 UART: [ldev] --
13,116,224 UART: [fwproc] Waiting for Commands...
13,119,117 UART: [fwproc] Received command 0x46574c44
13,121,286 UART: [fwproc] Received Image of size 113844 bytes
17,179,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,365 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,269 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,644,526 >>> mbox cmd response: success
17,648,237 UART: [afmc] ++
17,648,825 UART: [afmc] CDI.KEYID = 6
17,649,765 UART: [afmc] SUBJECT.KEYID = 7
17,651,029 UART: [afmc] AUTHORITY.KEYID = 5
21,011,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,853 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,211 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,061 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,495 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,676 UART: [afmc] --
23,375,879 UART: [cold-reset] --
23,380,176 UART: [state] Locking Datavault
23,385,621 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,336 UART: [state] Locking ICCM
23,388,510 UART: [exit] Launching FMC @ 0x40000130
23,396,900 UART:
23,397,127 UART: Running Caliptra FMC ...
23,398,216 UART:
23,398,363 UART: [state] CFI Enabled
23,454,541 UART: [fht] FMC Alias Private Key: 7
25,793,064 UART: [art] Extend RT PCRs Done
25,794,301 UART: [art] Lock RT PCRs Done
25,795,869 UART: [art] Populate DV Done
25,801,328 UART: [fht] FMC Alias Private Key: 7
25,802,958 UART: [art] Derive CDI
25,803,765 UART: [art] Store in in slot 0x4
25,864,149 UART: [art] Derive Key Pair
25,865,182 UART: [art] Store priv key in slot 0x5
29,157,721 UART: [art] Derive Key Pair - Done
29,170,285 UART: [art] Signing Cert with AUTHO
29,171,582 UART: RITY.KEYID = 7
31,459,719 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,256 UART: [art] PUB.X = A965C25C233BC60CA3EB69ADA37BFEC358C1B6003EB17265544E2D91A939FEA18CD7FA423F19456DB78B5045F46BFD21
31,468,462 UART: [art] PUB.Y = FB03A917C9D8F1DCE523B7ACE341E5BCB79E448CBAD41DB25FC240D96492B81C3A8AD2E2256ABE9FBF4697CC75419A61
31,475,759 UART: [art] SIG.R = AE5BC63CE85882CA27E896B506F87ACF7F956715517F0323156CC6F1738D772117D83AC0FEC9A4FA614B9BF94A7D6A5C
31,483,114 UART: [art] SIG.S = A55B55864D01760F121C88A3061DAB7FA6299C673DA97C1058677C8B36B135C7A610779AFC4A55197716D4C97D7EA99E
32,788,117 UART: Caliptra RT
32,788,845 UART: [state] CFI Enabled
32,951,505 UART: [rt] RT listening for mailbox commands...
36,999,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,155,289 UART: [rt]cmd =0x41544d4e, len=14344
42,456,161 >>> mbox cmd response data (8 bytes)
42,456,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,487,639 UART: [rt]cmd =0x41545348, len=116
42,507,456 >>> mbox cmd response data (12 bytes)
44,560,214 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
44,660,700 UART:
44,661,072 UART: Running Caliptra ROM ...
44,662,207 UART:
44,662,392 UART: [state] CFI Enabled
44,730,179 UART: [state] LifecycleState = Unprovisioned
44,732,128 UART: [state] DebugLocked = No
44,734,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,740,358 UART: [kat] SHA2-256
44,910,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,920,585 UART: [kat] ++
44,921,123 UART: [kat] sha1
44,933,631 UART: [kat] SHA2-256
44,936,310 UART: [kat] SHA2-384
44,941,364 UART: [kat] SHA2-512-ACC
44,943,762 UART: [kat] ECC-384
47,230,222 UART: [kat] HMAC-384Kdf
47,242,946 UART: [kat] LMS
48,433,270 UART: [kat] --
48,438,568 UART: [update-reset] ++
52,141,833 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,145,007 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
52,402,894 >>> mbox cmd response: success
52,403,268 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,403,551 UART: [update-reset] Copying MAN_2 To MAN_1
52,425,767 UART: [update-reset Success] --
52,428,622 UART: [state] Locking Datavault
52,433,448 UART: [state] Locking PCR0, PCR1 and PCR31
52,435,196 UART: [state] Locking ICCM
52,436,804 UART: [exit] Launching FMC @ 0x40000130
52,445,190 UART:
52,445,417 UART: Running Caliptra FMC ...
52,446,512 UART:
52,446,664 UART: [state] CFI Enabled
52,545,646 UART: [art] Extend RT PCRs Done
52,546,849 UART: [art] Lock RT PCRs Done
52,548,261 UART: [art] Populate DV Done
52,553,846 UART: [fht] FMC Alias Private Key: 7
52,555,602 UART: [art] Derive CDI
52,556,408 UART: [art] Store in in slot 0x4
52,614,445 UART: [art] Derive Key Pair
52,615,500 UART: [art] Store priv key in slot 0x5
55,908,313 UART: [art] Derive Key Pair - Done
55,921,088 UART: [art] Signing Cert with AUTHO
55,922,389 UART: RITY.KEYID = 7
58,209,594 UART: [art] Erasing AUTHORITY.KEYID = 7
58,211,098 UART: [art] PUB.X = 669CA98E900CB33CC85F80CEE24CDA7C204971314C2340713D983D799B3CA6A0E7BB872DE7C14FC5024F58A66C124ADF
58,218,357 UART: [art] PUB.Y = 66282F94787BE96D558F0147EA8E5E4B0606764B15356FDFCD2098C67A34DB1470B944BEB099E2061B5DF07E8F668109
58,225,615 UART: [art] SIG.R = 90E97673FAF8802987C7A38041C9F133147F68E3523A594C4795D6FE577AB72B3662693AA6EA43E5F8EF5D4621BC3478
58,232,982 UART: [art] SIG.S = FCC01338109653DAFB02DEC4845C21691192DDB975E419C11C5CF731486E27BF5C75855639FC0B5127E3EF384A26A3CA
59,538,042 UART: mbox::rt_entry...
59,538,982 UART: ____ _ _ _ ____ _____
59,540,982 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,542,982 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,544,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,546,834 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,548,682 UART: |_|
59,549,475 UART:
59,829,733 UART: [rt] Runtime listening for mailbox commands...
59,831,876 >>> mbox cmd response data (48 bytes)
59,832,449 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,834,769 >>> mbox cmd response data (48 bytes)
59,835,653 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,849,492 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,784,246 ready_for_fw is high
3,784,658 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,842,801 >>> mbox cmd response: success
23,544,760 UART:
23,545,186 UART: Running Caliptra FMC ...
23,546,326 UART:
23,546,483 UART: [state] CFI Enabled
23,607,785 UART: [fht] FMC Alias Private Key: 7
25,945,623 UART: [art] Extend RT PCRs Done
25,946,849 UART: [art] Lock RT PCRs Done
25,948,660 UART: [art] Populate DV Done
25,954,023 UART: [fht] FMC Alias Private Key: 7
25,955,511 UART: [art] Derive CDI
25,956,451 UART: [art] Store in in slot 0x4
26,015,834 UART: [art] Derive Key Pair
26,016,838 UART: [art] Store priv key in slot 0x5
29,309,583 UART: [art] Derive Key Pair - Done
29,322,790 UART: [art] Signing Cert with AUTHO
29,324,123 UART: RITY.KEYID = 7
31,611,367 UART: [art] Erasing AUTHORITY.KEYID = 7
31,612,870 UART: [art] PUB.X = 7AA6B33F9C71AD40C45FC372472EBEE902F1943260374876F213B59155D36BF2AEF6D83B0E56E07F9FE8426CDB286670
31,620,080 UART: [art] PUB.Y = A57BA59604CF64691AE27CB8EFF671AAD8484BF848F39384C0606C467593677157A0868BA2D96110DF928E853283D62A
31,627,297 UART: [art] SIG.R = B392E840619D67EF5038A7B01F3F1392BA7A42C8B69ABA1974C9F6C57DEC26D09B0A0A3D65C9C2CDB0F1A8C1B6FB60C0
31,634,711 UART: [art] SIG.S = 88AD077AC39018857802AB376D8EFF380D63E4EAE70F6B2D70F0A973415262FC81B113B593A7CC650AC1F1ED270542B9
32,940,217 UART: Caliptra RT
32,940,928 UART: [state] CFI Enabled
33,101,385 UART: [rt] RT listening for mailbox commands...
37,139,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,295,625 UART: [rt]cmd =0x41544d4e, len=14344
42,595,925 >>> mbox cmd response data (8 bytes)
42,596,789 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,627,545 UART: [rt]cmd =0x41545348, len=116
42,647,093 >>> mbox cmd response data (12 bytes)
44,701,135 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,687,344 >>> mbox cmd response: success
52,687,842 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,720,553 UART:
52,720,831 UART: Running Caliptra FMC ...
52,721,941 UART:
52,722,094 UART: [state] CFI Enabled
52,821,254 UART: [art] Extend RT PCRs Done
52,822,439 UART: [art] Lock RT PCRs Done
52,823,950 UART: [art] Populate DV Done
52,829,677 UART: [fht] FMC Alias Private Key: 7
52,831,206 UART: [art] Derive CDI
52,832,027 UART: [art] Store in in slot 0x4
52,890,232 UART: [art] Derive Key Pair
52,891,262 UART: [art] Store priv key in slot 0x5
56,184,307 UART: [art] Derive Key Pair - Done
56,196,980 UART: [art] Signing Cert with AUTHO
56,198,315 UART: RITY.KEYID = 7
58,486,007 UART: [art] Erasing AUTHORITY.KEYID = 7
58,487,535 UART: [art] PUB.X = D20FF8A70405EA1BF145266588FB6AB864CCD29FE1F1B610B478C7BA255D1E5B5054188976E07B31489909321E0A8A29
58,494,781 UART: [art] PUB.Y = 83712A4EC2D16C914A53DCC37522236E39DB899E30DE9F577B0D78760D495D891710345A98A66948454786709F85F7F6
58,502,019 UART: [art] SIG.R = CFD8B461028BA6C7F012A08F194914E9FAD1D6E74B6DCA9ABAD426C3DAFEDF6E9AAD8B2F1BC0628D61D1CFD76A27CDC5
58,509,406 UART: [art] SIG.S = 706F9898DF559C7C6EE041D0E25008CD5F7F47BF3BB84C7E45C1E8A18C7FB9E4E263C87AF62E77CB4650CAF47CB9AD24
59,814,360 UART: mbox::rt_entry...
59,815,325 UART: ____ _ _ _ ____ _____
59,817,304 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,819,298 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,821,147 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,823,069 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,825,007 UART: |_|
59,825,814 UART:
60,110,098 UART: [rt] Runtime listening for mailbox commands...
60,112,276 >>> mbox cmd response data (48 bytes)
60,112,832 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,115,146 >>> mbox cmd response data (48 bytes)
60,116,245 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,130,108 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,523 UART:
192,904 UART: Running Caliptra ROM ...
194,050 UART:
603,624 UART: [state] CFI Enabled
619,145 UART: [state] LifecycleState = Unprovisioned
621,026 UART: [state] DebugLocked = No
623,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,172 UART: [kat] SHA2-256
797,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,465 UART: [kat] ++
808,916 UART: [kat] sha1
819,683 UART: [kat] SHA2-256
822,391 UART: [kat] SHA2-384
829,051 UART: [kat] SHA2-512-ACC
831,435 UART: [kat] ECC-384
3,115,150 UART: [kat] HMAC-384Kdf
3,128,172 UART: [kat] LMS
4,318,250 UART: [kat] --
4,323,236 UART: [cold-reset] ++
4,325,592 UART: [fht] Storing FHT @ 0x50003400
4,338,504 UART: [idev] ++
4,339,111 UART: [idev] CDI.KEYID = 6
4,339,997 UART: [idev] SUBJECT.KEYID = 7
4,341,245 UART: [idev] UDS.KEYID = 0
4,342,207 ready_for_fw is high
4,342,403 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,229 UART: [idev] Erasing UDS.KEYID = 0
7,627,495 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,460 UART: [idev] --
7,653,101 UART: [ldev] ++
7,653,675 UART: [ldev] CDI.KEYID = 6
7,654,693 UART: [ldev] SUBJECT.KEYID = 5
7,655,851 UART: [ldev] AUTHORITY.KEYID = 7
7,657,135 UART: [ldev] FE.KEYID = 1
7,668,221 UART: [ldev] Erasing FE.KEYID = 1
10,958,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,748 UART: [ldev] --
13,319,258 UART: [fwproc] Waiting for Commands...
13,321,458 UART: [fwproc] Received command 0x46574c44
13,323,639 UART: [fwproc] Received Image of size 113844 bytes
17,366,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,646 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,828,355 >>> mbox cmd response: success
17,832,704 UART: [afmc] ++
17,833,306 UART: [afmc] CDI.KEYID = 6
17,834,223 UART: [afmc] SUBJECT.KEYID = 7
17,835,497 UART: [afmc] AUTHORITY.KEYID = 5
21,148,472 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,171 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,426 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,821 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,673 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,082 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,065 UART: [afmc] --
23,516,932 UART: [cold-reset] --
23,521,712 UART: [state] Locking Datavault
23,526,443 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,200 UART: [state] Locking ICCM
23,530,187 UART: [exit] Launching FMC @ 0x40000130
23,538,574 UART:
23,538,872 UART: Running Caliptra FMC ...
23,539,989 UART:
23,540,156 UART: [state] CFI Enabled
23,548,073 UART: [fht] FMC Alias Private Key: 7
25,879,475 UART: [art] Extend RT PCRs Done
25,880,700 UART: [art] Lock RT PCRs Done
25,881,974 UART: [art] Populate DV Done
25,887,167 UART: [fht] FMC Alias Private Key: 7
25,888,760 UART: [art] Derive CDI
25,889,573 UART: [art] Store in in slot 0x4
25,931,627 UART: [art] Derive Key Pair
25,932,625 UART: [art] Store priv key in slot 0x5
29,174,656 UART: [art] Derive Key Pair - Done
29,187,817 UART: [art] Signing Cert with AUTHO
29,189,120 UART: RITY.KEYID = 7
31,468,794 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,305 UART: [art] PUB.X = 87667A8F1D267D249E34FF6C46796ADE7DE7967B15707FB5650CA55EE67E93E913DB70E01F57E4F7E4C76ED8B4783A33
31,477,568 UART: [art] PUB.Y = AA864D14D7C454ABF53B6D4460788483D5DAF0762F715F05BAAD10389F5F95A38C6F8F148E5C7676AD10F996EB52BFF6
31,484,810 UART: [art] SIG.R = 9009B5E91F7D8536B6E397D58E26D9B9AFA9AFAA318FED373A5EF0892B9DB0AC4A2CCB27D4D6DDD3AE7063D21E5FA462
31,492,215 UART: [art] SIG.S = F2F6D0F6B7A32B8E36A4A5A5A5EABE3BD7BF8A35BAD91E73075F76A88C81570F7D3BFEA79CB16CD671DE5B693F5A5932
32,797,198 UART: Caliptra RT
32,797,913 UART: [state] CFI Enabled
32,915,722 UART: [rt] RT listening for mailbox commands...
37,086,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,242,070 UART: [rt]cmd =0x41544d4e, len=14344
42,542,828 >>> mbox cmd response data (8 bytes)
42,543,603 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,574,578 UART: [rt]cmd =0x41545348, len=116
42,593,853 >>> mbox cmd response data (12 bytes)
44,717,626 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
44,818,523 UART:
44,818,876 UART: Running Caliptra ROM ...
44,820,014 UART:
44,820,194 UART: [state] CFI Enabled
44,836,198 UART: [state] LifecycleState = Unprovisioned
44,838,088 UART: [state] DebugLocked = No
44,841,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,845,731 UART: [kat] SHA2-256
45,015,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,025,988 UART: [kat] ++
45,026,472 UART: [kat] sha1
45,038,773 UART: [kat] SHA2-256
45,041,480 UART: [kat] SHA2-384
45,046,715 UART: [kat] SHA2-512-ACC
45,049,061 UART: [kat] ECC-384
47,333,989 UART: [kat] HMAC-384Kdf
47,345,926 UART: [kat] LMS
48,535,970 UART: [kat] --
48,540,109 UART: [update-reset] ++
52,250,032 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,253,004 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
52,510,852 >>> mbox cmd response: success
52,511,236 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,511,953 UART: [update-reset] Copying MAN_2 To MAN_1
52,534,387 UART: [update-reset Success] --
52,538,563 UART: [state] Locking Datavault
52,541,236 UART: [state] Locking PCR0, PCR1 and PCR31
52,542,937 UART: [state] Locking ICCM
52,545,794 UART: [exit] Launching FMC @ 0x40000130
52,554,190 UART:
52,554,426 UART: Running Caliptra FMC ...
52,555,527 UART:
52,555,686 UART: [state] CFI Enabled
52,599,941 UART: [art] Extend RT PCRs Done
52,601,125 UART: [art] Lock RT PCRs Done
52,602,415 UART: [art] Populate DV Done
52,607,763 UART: [fht] FMC Alias Private Key: 7
52,609,528 UART: [art] Derive CDI
52,610,344 UART: [art] Store in in slot 0x4
52,652,666 UART: [art] Derive Key Pair
52,653,665 UART: [art] Store priv key in slot 0x5
55,896,684 UART: [art] Derive Key Pair - Done
55,909,380 UART: [art] Signing Cert with AUTHO
55,910,692 UART: RITY.KEYID = 7
58,190,057 UART: [art] Erasing AUTHORITY.KEYID = 7
58,191,568 UART: [art] PUB.X = 644138A80D36F22C723E59C4825E99A68C3BB51155057BD10B95E4293CCEA7010A86B9BF105B5437BF64B6ECA9F9C33E
58,198,820 UART: [art] PUB.Y = 57A41EC6C0BC7B403F420F3E44B4039685E9403C255E6406E50786F756C2B90C04ED264F7F2056C7CE29C3A51E0904C2
58,206,055 UART: [art] SIG.R = 34D1BCA0B57123E962D808094FD8C9465FB11336785DC6C484398B7521EB18DB4D9E51967B0EAD84637F3BB44FF503B9
58,213,404 UART: [art] SIG.S = 4F8CA37E69E06DFD64BED454719E3169DB5878DE6675B92022184B82E3043F4E352E9D51EBF8B272CAF4FF2756E55B7C
59,518,184 UART: mbox::rt_entry...
59,519,151 UART: ____ _ _ _ ____ _____
59,521,143 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,523,153 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,525,084 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,527,011 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,528,940 UART: |_|
59,529,750 UART:
59,811,947 UART: [rt] Runtime listening for mailbox commands...
59,814,106 >>> mbox cmd response data (48 bytes)
59,814,719 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,817,067 >>> mbox cmd response data (48 bytes)
59,817,946 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,831,786 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,128,151 ready_for_fw is high
4,128,520 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,079,615 >>> mbox cmd response: success
23,721,918 UART:
23,722,319 UART: Running Caliptra FMC ...
23,723,539 UART:
23,723,728 UART: [state] CFI Enabled
23,731,368 UART: [fht] FMC Alias Private Key: 7
26,062,810 UART: [art] Extend RT PCRs Done
26,064,036 UART: [art] Lock RT PCRs Done
26,065,831 UART: [art] Populate DV Done
26,071,146 UART: [fht] FMC Alias Private Key: 7
26,072,786 UART: [art] Derive CDI
26,073,616 UART: [art] Store in in slot 0x4
26,116,329 UART: [art] Derive Key Pair
26,117,332 UART: [art] Store priv key in slot 0x5
29,359,276 UART: [art] Derive Key Pair - Done
29,372,389 UART: [art] Signing Cert with AUTHO
29,373,689 UART: RITY.KEYID = 7
31,653,542 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,048 UART: [art] PUB.X = 11A97B50D961733FFAA06E9F488A4B05382F434AF267EDE708D879DABA67A735692DB1B1457635DFBDEC5D8B5ABDCAEB
31,662,315 UART: [art] PUB.Y = 2284899B28FF727EF085FCB9458CE01021B701A362602D99EC6F5C9E975004F231880E5AC7EECB8011296E686DA5DA27
31,669,535 UART: [art] SIG.R = 7949D1259B3582654191345B28819A100DE9CA1EC33BF728A81B4661C2CBEEF4D82FA2F5A3FE32A7F2C5C5C0062C26B9
31,676,969 UART: [art] SIG.S = BAEB8FECF81407ABA5DBCD233A33BAD58F38B1CD2324E721F8BF2F6EB14F61DC90A16CFA6983A9314321709CA5F0BAA5
32,982,128 UART: Caliptra RT
32,982,830 UART: [state] CFI Enabled
33,100,322 UART: [rt] RT listening for mailbox commands...
37,272,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,427,787 UART: [rt]cmd =0x41544d4e, len=14344
42,727,867 >>> mbox cmd response data (8 bytes)
42,728,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,759,315 UART: [rt]cmd =0x41545348, len=116
42,779,577 >>> mbox cmd response data (12 bytes)
44,904,293 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,792,469 >>> mbox cmd response: success
52,792,973 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,828,911 UART:
52,829,200 UART: Running Caliptra FMC ...
52,830,323 UART:
52,830,488 UART: [state] CFI Enabled
52,874,404 UART: [art] Extend RT PCRs Done
52,875,602 UART: [art] Lock RT PCRs Done
52,877,081 UART: [art] Populate DV Done
52,882,602 UART: [fht] FMC Alias Private Key: 7
52,884,083 UART: [art] Derive CDI
52,884,855 UART: [art] Store in in slot 0x4
52,927,932 UART: [art] Derive Key Pair
52,928,933 UART: [art] Store priv key in slot 0x5
56,171,442 UART: [art] Derive Key Pair - Done
56,184,226 UART: [art] Signing Cert with AUTHO
56,185,538 UART: RITY.KEYID = 7
58,465,038 UART: [art] Erasing AUTHORITY.KEYID = 7
58,466,561 UART: [art] PUB.X = 9EC8C3BFAEF3BDF1C7ABE5172D0E58F7338CF4FDC4B8EE3AAAB845BCAB55D5A34D371744393FF74209C39325A9596E9B
58,473,848 UART: [art] PUB.Y = AD41D95C3805AEFECDD0011C8D3E9B0A1F6FB9C22F8E9729F6CA3DD2A248F865DB5E37F059F7CDF53FC8E987CC5A6468
58,481,093 UART: [art] SIG.R = 9039ED80DE7895BFD1B61E3A1002FC9755CEA8664C2DFCC932CEBAEED5091B96C7641E17490A43F2A5CFB013966A2D2D
58,488,499 UART: [art] SIG.S = F0AB5EC4C7C3ABC7D81E8DF4210FC9C61BE9B2C78B679F1A36F6552577C10CBB14CCC03C0CFEC1F3046CD24B303FD222
59,794,014 UART: mbox::rt_entry...
59,794,973 UART: ____ _ _ _ ____ _____
59,796,949 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,798,879 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,800,803 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,802,686 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,804,689 UART: |_|
59,805,521 UART:
60,093,203 UART: [rt] Runtime listening for mailbox commands...
60,095,373 >>> mbox cmd response data (48 bytes)
60,095,938 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,098,276 >>> mbox cmd response data (48 bytes)
60,099,162 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,113,000 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,042 UART:
192,421 UART: Running Caliptra ROM ...
193,625 UART:
193,781 UART: [state] CFI Enabled
266,276 UART: [state] LifecycleState = Unprovisioned
268,125 UART: [state] DebugLocked = No
270,670 UART: [state] WD Timer not started. Device not locked for debugging
275,134 UART: [kat] SHA2-256
454,249 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,836 UART: [kat] ++
466,366 UART: [kat] sha1
477,811 UART: [kat] SHA2-256
480,815 UART: [kat] SHA2-384
488,011 UART: [kat] SHA2-512-ACC
490,958 UART: [kat] ECC-384
2,950,756 UART: [kat] HMAC-384Kdf
2,973,429 UART: [kat] LMS
3,502,884 UART: [kat] --
3,507,438 UART: [cold-reset] ++
3,508,372 UART: [fht] FHT @ 0x50003400
3,519,490 UART: [idev] ++
3,520,060 UART: [idev] CDI.KEYID = 6
3,520,996 UART: [idev] SUBJECT.KEYID = 7
3,522,174 UART: [idev] UDS.KEYID = 0
3,523,228 ready_for_fw is high
3,523,430 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,026 UART: [idev] Erasing UDS.KEYID = 0
6,029,394 UART: [idev] Sha1 KeyId Algorithm
6,052,241 UART: [idev] --
6,054,669 UART: [ldev] ++
6,055,245 UART: [ldev] CDI.KEYID = 6
6,056,158 UART: [ldev] SUBJECT.KEYID = 5
6,057,320 UART: [ldev] AUTHORITY.KEYID = 7
6,058,614 UART: [ldev] FE.KEYID = 1
6,103,789 UART: [ldev] Erasing FE.KEYID = 1
8,607,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,750 UART: [ldev] --
10,418,080 UART: [fwproc] Wait for Commands...
10,420,224 UART: [fwproc] Recv command 0x46574c44
10,422,328 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,776 >>> mbox cmd response: success
14,285,271 UART: [afmc] ++
14,285,863 UART: [afmc] CDI.KEYID = 6
14,286,747 UART: [afmc] SUBJECT.KEYID = 7
14,287,959 UART: [afmc] AUTHORITY.KEYID = 5
16,833,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,570,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,572,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,588,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,604,618 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,620,475 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,642,205 UART: [afmc] --
18,646,123 UART: [cold-reset] --
18,650,904 UART: [state] Locking Datavault
18,656,106 UART: [state] Locking PCR0, PCR1 and PCR31
18,657,797 UART: [state] Locking ICCM
18,659,986 UART: [exit] Launching FMC @ 0x40000130
18,668,393 UART:
18,668,626 UART: Running Caliptra FMC ...
18,669,726 UART:
18,669,885 UART: [state] CFI Enabled
18,726,951 UART: [fht] FMC Alias Private Key: 7
20,491,600 UART: [art] Extend RT PCRs Done
20,492,843 UART: [art] Lock RT PCRs Done
20,494,401 UART: [art] Populate DV Done
20,499,867 UART: [fht] FMC Alias Private Key: 7
20,501,364 UART: [art] Derive CDI
20,502,106 UART: [art] Store in in slot 0x4
20,559,414 UART: [art] Derive Key Pair
20,560,411 UART: [art] Store priv key in slot 0x5
23,022,855 UART: [art] Derive Key Pair - Done
23,035,636 UART: [art] Signing Cert with AUTHO
23,036,952 UART: RITY.KEYID = 7
24,748,670 UART: [art] Erasing AUTHORITY.KEYID = 7
24,750,179 UART: [art] PUB.X = E1570B30377C1BDF7EC0E4D6A69A92A7FB2C872B06599A7FDD3FE7ACCF064AB7B5CC2C56517E85EF6F248424157EC340
24,757,489 UART: [art] PUB.Y = 4F5A2B81EE5B0644DD3F126329548D6B9B1C52D64AEC3258F5D1E6C026295FB1A7262D81ED4482E683F6B6D8A8DC56A7
24,764,723 UART: [art] SIG.R = 88995B39F00D927728D0E9E4221E3251A46A74AD5A0E04028F9744888564C7E6CC8B860257213B0ECEB1CEC7CE5E52C1
24,772,122 UART: [art] SIG.S = CB1278EFA62AB756A564C78CAF93EA74A28009B1B048E04147C11E177F14CAF19E2BF125C7F463EF5402D1B10E135602
25,751,049 UART: Caliptra RT
25,751,787 UART: [state] CFI Enabled
25,916,920 UART: [rt] RT listening for mailbox commands...
29,958,262 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,113,751 UART: [rt]cmd =0x41544d4e, len=14344
34,109,920 >>> mbox cmd response data (8 bytes)
34,110,669 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,141,410 UART: [rt]cmd =0x41545348, len=116
34,161,338 >>> mbox cmd response data (12 bytes)
36,208,762 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
36,309,076 UART:
36,309,435 UART: Running Caliptra ROM ...
36,310,568 UART:
36,310,767 UART: [state] CFI Enabled
36,375,446 UART: [state] LifecycleState = Unprovisioned
36,377,333 UART: [state] DebugLocked = No
36,378,728 UART: [state] WD Timer not started. Device not locked for debugging
36,382,855 UART: [kat] SHA2-256
36,561,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,573,571 UART: [kat] ++
36,574,030 UART: [kat] sha1
36,585,273 UART: [kat] SHA2-256
36,588,310 UART: [kat] SHA2-384
36,594,954 UART: [kat] SHA2-512-ACC
36,597,896 UART: [kat] ECC-384
39,057,746 UART: [kat] HMAC-384Kdf
39,079,855 UART: [kat] LMS
39,609,315 UART: [kat] --
39,612,978 UART: [update-reset] ++
42,595,688 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,599,453 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
42,857,075 >>> mbox cmd response: success
42,857,426 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,857,699 UART: [update-reset] Copying MAN_2 To MAN_1
42,879,885 UART: [update-reset Success] --
42,884,445 UART: [state] Locking Datavault
42,887,378 UART: [state] Locking PCR0, PCR1 and PCR31
42,889,032 UART: [state] Locking ICCM
42,890,217 UART: [exit] Launching FMC @ 0x40000130
42,898,635 UART:
42,898,917 UART: Running Caliptra FMC ...
42,900,026 UART:
42,900,190 UART: [state] CFI Enabled
42,995,609 UART: [art] Extend RT PCRs Done
42,996,791 UART: [art] Lock RT PCRs Done
42,998,434 UART: [art] Populate DV Done
43,003,955 UART: [fht] FMC Alias Private Key: 7
43,005,611 UART: [art] Derive CDI
43,006,434 UART: [art] Store in in slot 0x4
43,065,457 UART: [art] Derive Key Pair
43,066,633 UART: [art] Store priv key in slot 0x5
45,528,972 UART: [art] Derive Key Pair - Done
45,542,120 UART: [art] Signing Cert with AUTHO
45,543,456 UART: RITY.KEYID = 7
47,255,382 UART: [art] Erasing AUTHORITY.KEYID = 7
47,256,894 UART: [art] PUB.X = 4B22593BB974E470C418403D17B4BF30FBAB18E08B85CE8C8412663C72F6340349CA3AF6379CF8C7E1ECA3ED45CB2854
47,264,169 UART: [art] PUB.Y = D59436517B795C1E092E8EB840E0A1EB70902623051E5DC660BA73C25BE28CBF6A07EFA218C15BB9BBB7030E3BF288CD
47,271,418 UART: [art] SIG.R = E57D82F91AEE635431BE42CC49F57CD14A4F360770D89C77276BCA3DA7D30E7FF3ECB641E71B9996084B4B7415879AD2
47,278,831 UART: [art] SIG.S = 7C5729A4E93B5EE40F5264CFB434D597E3142D0167F49927EA23CDA6FDCDF16F89530486211AE97D5D804E664B5FF607
48,257,102 UART: mbox::rt_entry...
48,258,069 UART: ____ _ _ _ ____ _____
48,260,027 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,262,043 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,263,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,265,837 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,267,723 UART: |_|
48,268,608 UART:
48,552,682 UART: [rt] Runtime listening for mailbox commands...
48,554,852 >>> mbox cmd response data (48 bytes)
48,555,451 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,557,780 >>> mbox cmd response data (48 bytes)
48,558,668 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,572,584 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,357,850 ready_for_fw is high
3,358,246 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,045,195 >>> mbox cmd response: success
18,341,717 UART:
18,342,124 UART: Running Caliptra FMC ...
18,343,229 UART:
18,343,384 UART: [state] CFI Enabled
18,408,583 UART: [fht] FMC Alias Private Key: 7
20,173,051 UART: [art] Extend RT PCRs Done
20,174,286 UART: [art] Lock RT PCRs Done
20,175,944 UART: [art] Populate DV Done
20,181,460 UART: [fht] FMC Alias Private Key: 7
20,182,950 UART: [art] Derive CDI
20,183,717 UART: [art] Store in in slot 0x4
20,242,103 UART: [art] Derive Key Pair
20,243,188 UART: [art] Store priv key in slot 0x5
22,705,931 UART: [art] Derive Key Pair - Done
22,718,550 UART: [art] Signing Cert with AUTHO
22,719,858 UART: RITY.KEYID = 7
24,431,893 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,395 UART: [art] PUB.X = 1DE3D7E833DF2AC6A7D515AD6FF3B45CA81E3E486813FA22C3F38ADA111E4A95945EB1CB83B66BBF8CB73431EBF71619
24,440,691 UART: [art] PUB.Y = 2FA8F41A8938B98B682F0D69938F1F3CDA8F15AB580E8398D64935F2307ED69F4AC76D272EAF592839662FBD343CC113
24,447,930 UART: [art] SIG.R = 8E175DEC18332D6628B1C0E73A243652BC0097C5121543E83E6A4A68AF03A68B46DC08D99888CB2BD604F1DB113482EF
24,455,305 UART: [art] SIG.S = 8896C088AD320904CE1F634A4D4C296AD0BA3A87F0FC3238B229253C3B759AB9F79654C5B39DF6AB2C0B8DF681DBD75A
25,434,014 UART: Caliptra RT
25,434,721 UART: [state] CFI Enabled
25,600,320 UART: [rt] RT listening for mailbox commands...
29,642,482 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,798,111 UART: [rt]cmd =0x41544d4e, len=14344
33,792,862 >>> mbox cmd response data (8 bytes)
33,793,678 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,824,285 UART: [rt]cmd =0x41545348, len=116
33,844,005 >>> mbox cmd response data (12 bytes)
35,890,364 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,409,286 >>> mbox cmd response: success
42,409,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,446,013 UART:
42,446,339 UART: Running Caliptra FMC ...
42,447,465 UART:
42,447,632 UART: [state] CFI Enabled
42,546,149 UART: [art] Extend RT PCRs Done
42,547,341 UART: [art] Lock RT PCRs Done
42,548,909 UART: [art] Populate DV Done
42,554,609 UART: [fht] FMC Alias Private Key: 7
42,556,200 UART: [art] Derive CDI
42,557,017 UART: [art] Store in in slot 0x4
42,615,224 UART: [art] Derive Key Pair
42,616,259 UART: [art] Store priv key in slot 0x5
45,079,387 UART: [art] Derive Key Pair - Done
45,092,292 UART: [art] Signing Cert with AUTHO
45,093,599 UART: RITY.KEYID = 7
46,804,188 UART: [art] Erasing AUTHORITY.KEYID = 7
46,805,692 UART: [art] PUB.X = 3BBB28345CC8529C83F1100B0F54825DF1ED2B180D6ED5A1275974BB592D42E6752113BCC38C2548130FA05B7E2E8D18
46,812,934 UART: [art] PUB.Y = 60D150B481DA33A9B32CB6EC4E1380056FDB9A07E1F3445B3DC13A0A9272E13C9E5CFC8F54EC4492CF2A3491C55E78C8
46,820,213 UART: [art] SIG.R = C07D03889DB4AD3BA56C8B8AAA9B9575B1DF31F9960871F20D34F07C5DBFA25F9E3CAF6C32F84919003CA0C33F29F909
46,827,598 UART: [art] SIG.S = 3E83A6E79DD1ADEDFAD068458859B623BF0981BA5D0C53021AF7786A281C12AC39F7E7AD0BE11891C1B3FAA5199ECE34
47,805,691 UART: mbox::rt_entry...
47,806,659 UART: ____ _ _ _ ____ _____
47,808,594 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,810,632 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,812,567 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,814,498 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,816,463 UART: |_|
47,817,275 UART:
48,100,595 UART: [rt] Runtime listening for mailbox commands...
48,102,769 >>> mbox cmd response data (48 bytes)
48,103,329 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,105,649 >>> mbox cmd response data (48 bytes)
48,106,516 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,120,385 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,835 writing to cptra_bootfsm_go
192,968 UART:
193,359 UART: Running Caliptra ROM ...
194,465 UART:
604,077 UART: [state] CFI Enabled
617,668 UART: [state] LifecycleState = Unprovisioned
619,547 UART: [state] DebugLocked = No
621,360 UART: [state] WD Timer not started. Device not locked for debugging
625,330 UART: [kat] SHA2-256
804,502 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,075 UART: [kat] ++
816,612 UART: [kat] sha1
827,493 UART: [kat] SHA2-256
830,515 UART: [kat] SHA2-384
836,182 UART: [kat] SHA2-512-ACC
839,124 UART: [kat] ECC-384
3,279,270 UART: [kat] HMAC-384Kdf
3,291,495 UART: [kat] LMS
3,820,932 UART: [kat] --
3,823,933 UART: [cold-reset] ++
3,826,006 UART: [fht] FHT @ 0x50003400
3,837,131 UART: [idev] ++
3,837,695 UART: [idev] CDI.KEYID = 6
3,838,605 UART: [idev] SUBJECT.KEYID = 7
3,839,721 UART: [idev] UDS.KEYID = 0
3,840,768 ready_for_fw is high
3,840,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,496 UART: [idev] Erasing UDS.KEYID = 0
6,314,268 UART: [idev] Sha1 KeyId Algorithm
6,336,738 UART: [idev] --
6,341,493 UART: [ldev] ++
6,342,060 UART: [ldev] CDI.KEYID = 6
6,342,975 UART: [ldev] SUBJECT.KEYID = 5
6,344,131 UART: [ldev] AUTHORITY.KEYID = 7
6,345,433 UART: [ldev] FE.KEYID = 1
6,359,000 UART: [ldev] Erasing FE.KEYID = 1
8,833,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,784 UART: [ldev] --
10,623,183 UART: [fwproc] Wait for Commands...
10,626,038 UART: [fwproc] Recv command 0x46574c44
10,628,138 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,454 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,488,993 >>> mbox cmd response: success
14,493,059 UART: [afmc] ++
14,493,675 UART: [afmc] CDI.KEYID = 6
14,494,590 UART: [afmc] SUBJECT.KEYID = 7
14,495,693 UART: [afmc] AUTHORITY.KEYID = 5
16,998,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,801 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,669 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,589 UART: [afmc] --
18,794,045 UART: [cold-reset] --
18,798,610 UART: [state] Locking Datavault
18,802,286 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,984 UART: [state] Locking ICCM
18,806,728 UART: [exit] Launching FMC @ 0x40000130
18,815,122 UART:
18,815,376 UART: Running Caliptra FMC ...
18,816,478 UART:
18,816,643 UART: [state] CFI Enabled
18,824,689 UART: [fht] FMC Alias Private Key: 7
20,581,561 UART: [art] Extend RT PCRs Done
20,582,767 UART: [art] Lock RT PCRs Done
20,584,711 UART: [art] Populate DV Done
20,590,443 UART: [fht] FMC Alias Private Key: 7
20,592,013 UART: [art] Derive CDI
20,592,842 UART: [art] Store in in slot 0x4
20,635,543 UART: [art] Derive Key Pair
20,636,544 UART: [art] Store priv key in slot 0x5
23,063,025 UART: [art] Derive Key Pair - Done
23,076,025 UART: [art] Signing Cert with AUTHO
23,077,362 UART: RITY.KEYID = 7
24,782,823 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,324 UART: [art] PUB.X = ECE93731C5D48B83942C204E6601C28AE7616357E45D069595E817D7558EBEDAF506F70B943E6577F80ED83F22E9C076
24,791,583 UART: [art] PUB.Y = 30754ADE5524958EBD6C782CE594949D9C5A3DEA8897FB1767D7D6BA59E3E5575911429B1E352C86DCF573C653FCD47D
24,798,876 UART: [art] SIG.R = 215E39D2F76EC5A78A78221D8155508BB09CAFEBF518BF8A6FACF17629996A7899E59FF5B61C8F623365FD8AE5BCEC3B
24,806,272 UART: [art] SIG.S = C27EAD8774A07B49B1AF9B5BD420A47B369F72A8B1B8A338D07D2B06F4B2E46C84F9AD5C6A467006ADE0C091C968A6E0
25,785,221 UART: Caliptra RT
25,785,940 UART: [state] CFI Enabled
25,903,284 UART: [rt] RT listening for mailbox commands...
29,935,679 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,091,432 UART: [rt]cmd =0x41544d4e, len=14344
34,087,602 >>> mbox cmd response data (8 bytes)
34,088,356 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,118,959 UART: [rt]cmd =0x41545348, len=116
34,138,915 >>> mbox cmd response data (12 bytes)
36,184,320 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
36,284,722 UART:
36,285,081 UART: Running Caliptra ROM ...
36,286,134 UART:
36,286,286 UART: [state] CFI Enabled
36,297,109 UART: [state] LifecycleState = Unprovisioned
36,298,949 UART: [state] DebugLocked = No
36,300,361 UART: [state] WD Timer not started. Device not locked for debugging
36,303,771 UART: [kat] SHA2-256
36,482,948 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,494,538 UART: [kat] ++
36,495,087 UART: [kat] sha1
36,507,608 UART: [kat] SHA2-256
36,510,624 UART: [kat] SHA2-384
36,517,024 UART: [kat] SHA2-512-ACC
36,519,990 UART: [kat] ECC-384
38,962,371 UART: [kat] HMAC-384Kdf
38,975,788 UART: [kat] LMS
39,505,309 UART: [kat] --
39,509,370 UART: [update-reset] ++
42,498,441 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,501,164 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
42,758,810 >>> mbox cmd response: success
42,759,167 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,760,150 UART: [update-reset] Copying MAN_2 To MAN_1
42,782,473 UART: [update-reset Success] --
42,786,864 UART: [state] Locking Datavault
42,789,733 UART: [state] Locking PCR0, PCR1 and PCR31
42,791,429 UART: [state] Locking ICCM
42,793,291 UART: [exit] Launching FMC @ 0x40000130
42,801,742 UART:
42,801,996 UART: Running Caliptra FMC ...
42,803,104 UART:
42,803,263 UART: [state] CFI Enabled
42,847,170 UART: [art] Extend RT PCRs Done
42,848,349 UART: [art] Lock RT PCRs Done
42,849,641 UART: [art] Populate DV Done
42,855,158 UART: [fht] FMC Alias Private Key: 7
42,856,750 UART: [art] Derive CDI
42,857,565 UART: [art] Store in in slot 0x4
42,900,263 UART: [art] Derive Key Pair
42,901,400 UART: [art] Store priv key in slot 0x5
45,327,805 UART: [art] Derive Key Pair - Done
45,340,916 UART: [art] Signing Cert with AUTHO
45,342,227 UART: RITY.KEYID = 7
47,047,487 UART: [art] Erasing AUTHORITY.KEYID = 7
47,048,994 UART: [art] PUB.X = 8AB4747C7FD12574E2E7DD96DC149BCF6E4558DF032A5D193E503D823ED13EF6FE6DDD25F81A80462B5DEC1DC70141CD
47,056,282 UART: [art] PUB.Y = 768664795538D3C2FAB90C954059EEEE18D7AEEE90DBDFE18B408DD6F23F36A6513C1BA1ECC92F9A4CB95167D0329FAF
47,063,524 UART: [art] SIG.R = 3106B61E2177B02B4FF7BD13D00ADEB00E8AEF040CBEC2B2CC8C72497CF81B2D8BA7DAFDAEC617A9D8815A29003E00C9
47,070,963 UART: [art] SIG.S = 2DC2B6F79F027222965EF770F6C0F1EA178053ECE291DB224F22A8625CC553E3C310A12FCB344EDE91FF435919DC8AED
48,049,912 UART: mbox::rt_entry...
48,050,881 UART: ____ _ _ _ ____ _____
48,052,877 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,054,886 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,056,826 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,058,761 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,060,692 UART: |_|
48,061,534 UART:
48,342,909 UART: [rt] Runtime listening for mailbox commands...
48,345,080 >>> mbox cmd response data (48 bytes)
48,345,659 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,348,018 >>> mbox cmd response data (48 bytes)
48,348,914 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,363,237 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
3,698,288 ready_for_fw is high
3,698,885 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,730 >>> mbox cmd response: success
18,525,405 UART:
18,525,799 UART: Running Caliptra FMC ...
18,526,931 UART:
18,527,095 UART: [state] CFI Enabled
18,535,155 UART: [fht] FMC Alias Private Key: 7
20,291,832 UART: [art] Extend RT PCRs Done
20,293,062 UART: [art] Lock RT PCRs Done
20,294,633 UART: [art] Populate DV Done
20,299,944 UART: [fht] FMC Alias Private Key: 7
20,301,437 UART: [art] Derive CDI
20,302,201 UART: [art] Store in in slot 0x4
20,345,076 UART: [art] Derive Key Pair
20,346,120 UART: [art] Store priv key in slot 0x5
22,772,903 UART: [art] Derive Key Pair - Done
22,785,686 UART: [art] Signing Cert with AUTHO
22,786,987 UART: RITY.KEYID = 7
24,492,640 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,159 UART: [art] PUB.X = 039525ADCE8C816852D75B39AA0170917C6EA541D050FECBABA982E582364A1F32A95F1E545CE6C7C71A679F4809717E
24,501,413 UART: [art] PUB.Y = 4123D5378E64E900BDBE2E8D983F68D46649A7C7CCBD856C92AAAFB12111EB4DF489D4EF091D9CF100B78F12B2392790
24,508,675 UART: [art] SIG.R = 0A5A3BEFE2A274D36C09A68E50CC97D27D30C13E9AAACF43BA294E34671CC90E076696A60CC00DD4137B11FB403A6A3F
24,516,093 UART: [art] SIG.S = 2FE27E6CEB40DBC6BFC259FE54CFDED237F5CED8E9E3A85EA3161150F8EBFECF313733300B62506954D562261C585BC8
25,494,875 UART: Caliptra RT
25,495,574 UART: [state] CFI Enabled
25,612,912 UART: [rt] RT listening for mailbox commands...
29,652,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,808,491 UART: [rt]cmd =0x41544d4e, len=14344
33,803,701 >>> mbox cmd response data (8 bytes)
33,804,457 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,835,200 UART: [rt]cmd =0x41545348, len=116
33,855,590 >>> mbox cmd response data (12 bytes)
35,906,618 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,342,348 >>> mbox cmd response: success
42,342,838 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,378,124 UART:
42,378,416 UART: Running Caliptra FMC ...
42,379,448 UART:
42,379,600 UART: [state] CFI Enabled
42,423,898 UART: [art] Extend RT PCRs Done
42,425,089 UART: [art] Lock RT PCRs Done
42,426,678 UART: [art] Populate DV Done
42,431,814 UART: [fht] FMC Alias Private Key: 7
42,433,317 UART: [art] Derive CDI
42,434,052 UART: [art] Store in in slot 0x4
42,476,322 UART: [art] Derive Key Pair
42,477,324 UART: [art] Store priv key in slot 0x5
44,904,245 UART: [art] Derive Key Pair - Done
44,917,031 UART: [art] Signing Cert with AUTHO
44,918,348 UART: RITY.KEYID = 7
46,623,576 UART: [art] Erasing AUTHORITY.KEYID = 7
46,625,081 UART: [art] PUB.X = 0583350044934A0B38B5DD88B22219C9B489CAA46B2D307AE1DC1B991567F20C774EAA01CDD83F28EAED18EC13EFFD79
46,632,381 UART: [art] PUB.Y = 1D77F8CBC15BD82894F8AA0C7281476FE027B9883E5632F3DECD90FF79AC937B2A5C48541CDFAE1C630B0AC91C1BB833
46,639,619 UART: [art] SIG.R = 679940BB30338E5DC2C1AA0FF96F325930B56B3CCE1E1FAF3394493158884B5BEFCE322F75CCAFBEA3332076DD3BC8C5
46,647,065 UART: [art] SIG.S = FD3D3E627ADDCAB129123B7A647E5C8F45B7697A41570F85503F457E153EC45A1163FA8D77C41000099D2504AF241A6D
47,625,537 UART: mbox::rt_entry...
47,626,509 UART: ____ _ _ _ ____ _____
47,628,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
47,630,498 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
47,632,450 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
47,634,382 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
47,636,346 UART: |_|
47,637,157 UART:
47,921,932 UART: [rt] Runtime listening for mailbox commands...
47,924,102 >>> mbox cmd response data (48 bytes)
47,924,665 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
47,926,982 >>> mbox cmd response data (48 bytes)
47,927,863 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
47,941,797 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,023 UART:
192,418 UART: Running Caliptra ROM ...
193,541 UART:
193,687 UART: [state] CFI Enabled
263,568 UART: [state] LifecycleState = Unprovisioned
265,985 UART: [state] DebugLocked = No
268,785 UART: [state] WD Timer not started. Device not locked for debugging
273,901 UART: [kat] SHA2-256
463,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,555 UART: [kat] ++
475,010 UART: [kat] sha1
486,687 UART: [kat] SHA2-256
489,707 UART: [kat] SHA2-384
495,772 UART: [kat] SHA2-512-ACC
498,354 UART: [kat] ECC-384
2,951,569 UART: [kat] HMAC-384Kdf
2,973,121 UART: [kat] LMS
3,504,950 UART: [kat] --
3,509,905 UART: [cold-reset] ++
3,511,203 UART: [fht] FHT @ 0x50003400
3,522,680 UART: [idev] ++
3,523,326 UART: [idev] CDI.KEYID = 6
3,524,362 UART: [idev] SUBJECT.KEYID = 7
3,525,470 UART: [idev] UDS.KEYID = 0
3,526,419 ready_for_fw is high
3,526,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,298 UART: [idev] Erasing UDS.KEYID = 0
6,028,372 UART: [idev] Sha1 KeyId Algorithm
6,051,598 UART: [idev] --
6,055,730 UART: [ldev] ++
6,056,433 UART: [ldev] CDI.KEYID = 6
6,057,348 UART: [ldev] SUBJECT.KEYID = 5
6,058,515 UART: [ldev] AUTHORITY.KEYID = 7
6,059,699 UART: [ldev] FE.KEYID = 1
6,101,638 UART: [ldev] Erasing FE.KEYID = 1
8,607,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,271 UART: [ldev] --
10,416,359 UART: [fwproc] Wait for Commands...
10,419,116 UART: [fwproc] Recv command 0x46574c44
10,421,427 UART: [fwproc] Recv'd Img size: 114168 bytes
13,864,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,488 >>> mbox cmd response: success
14,604,748 UART: [afmc] ++
14,605,453 UART: [afmc] CDI.KEYID = 6
14,606,666 UART: [afmc] SUBJECT.KEYID = 7
14,608,262 UART: [afmc] AUTHORITY.KEYID = 5
17,148,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,372 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,408 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,502 UART: [afmc] --
18,951,484 UART: [cold-reset] --
18,954,112 UART: [state] Locking Datavault
18,959,538 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,700 UART: [state] Locking ICCM
18,964,076 UART: [exit] Launching FMC @ 0x40000130
18,972,719 UART:
18,972,954 UART: Running Caliptra FMC ...
18,974,078 UART:
18,974,240 UART: [state] CFI Enabled
19,030,956 UART: [fht] FMC Alias Private Key: 7
20,795,286 UART: [art] Extend RT PCRs Done
20,796,501 UART: [art] Lock RT PCRs Done
20,797,769 UART: [art] Populate DV Done
20,803,174 UART: [fht] FMC Alias Private Key: 7
20,804,814 UART: [art] Derive CDI
20,805,626 UART: [art] Store in in slot 0x4
20,864,392 UART: [art] Derive Key Pair
20,865,431 UART: [art] Store priv key in slot 0x5
23,328,280 UART: [art] Derive Key Pair - Done
23,341,267 UART: [art] Signing Cert with AUTHO
23,342,568 UART: RITY.KEYID = 7
25,054,162 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,681 UART: [art] PUB.X = B856881660B37310BC030ACD16C07AC5DBCE8E617B86138B67A7C45398A1D38A89599BF294C000E3B63B695F5D367C63
25,062,970 UART: [art] PUB.Y = E318A5F83E92695A14CF862BB569E81B77EB5C80865B9FAB02D7035386358BA2FEC29D3D94331BC4FF2A04F0DB5DD991
25,070,174 UART: [art] SIG.R = 6C7D6B538073282BEBC75AFCCD8E13FA139DA6F881C625AF250789014395BDD8CA0C114A15DE891E5F9809B6E67536C1
25,077,605 UART: [art] SIG.S = 46A273FF75B9B5A9B76D9ABC96C81F9BB8E81F73AAF187D59622EA0D18EB5EC2F3F6E1EE15D9852A1E206E01974293C6
26,056,601 UART: Caliptra RT
26,057,317 UART: [state] CFI Enabled
26,223,308 UART: [rt] RT listening for mailbox commands...
30,260,063 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,415,549 UART: [rt]cmd =0x41544d4e, len=14344
34,411,211 >>> mbox cmd response data (8 bytes)
34,411,959 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,442,698 UART: [rt]cmd =0x41545348, len=116
34,461,993 >>> mbox cmd response data (12 bytes)
36,510,720 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
36,611,189 UART:
36,611,563 UART: Running Caliptra ROM ...
36,612,622 UART:
36,612,774 UART: [state] CFI Enabled
36,672,964 UART: [state] LifecycleState = Unprovisioned
36,674,974 UART: [state] DebugLocked = No
36,677,740 UART: [state] WD Timer not started. Device not locked for debugging
36,681,721 UART: [kat] SHA2-256
36,871,557 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,882,329 UART: [kat] ++
36,882,784 UART: [kat] sha1
36,894,001 UART: [kat] SHA2-256
36,897,028 UART: [kat] SHA2-384
36,901,837 UART: [kat] SHA2-512-ACC
36,904,462 UART: [kat] ECC-384
39,358,809 UART: [kat] HMAC-384Kdf
39,382,709 UART: [kat] LMS
39,914,278 UART: [kat] --
39,920,705 UART: [update-reset] ++
42,947,747 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,950,971 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
43,343,730 >>> mbox cmd response: success
43,344,093 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,345,080 UART: [update-reset] Copying MAN_2 To MAN_1
43,382,651 UART: [update-reset Success] --
43,388,074 UART: [state] Locking Datavault
43,390,418 UART: [state] Locking PCR0, PCR1 and PCR31
43,392,618 UART: [state] Locking ICCM
43,395,204 UART: [exit] Launching FMC @ 0x40000130
43,403,881 UART:
43,404,119 UART: Running Caliptra FMC ...
43,405,241 UART:
43,405,400 UART: [state] CFI Enabled
43,510,032 UART: [art] Extend RT PCRs Done
43,511,223 UART: [art] Lock RT PCRs Done
43,512,625 UART: [art] Populate DV Done
43,518,246 UART: [fht] FMC Alias Private Key: 7
43,519,782 UART: [art] Derive CDI
43,520,593 UART: [art] Store in in slot 0x4
43,579,222 UART: [art] Derive Key Pair
43,580,384 UART: [art] Store priv key in slot 0x5
46,042,890 UART: [art] Derive Key Pair - Done
46,055,574 UART: [art] Signing Cert with AUTHO
46,056,912 UART: RITY.KEYID = 7
47,768,294 UART: [art] Erasing AUTHORITY.KEYID = 7
47,769,803 UART: [art] PUB.X = 8DE02C36AEE91D1A2F4FB79C05B61B3834E42F75C34B4A2D5B1AF8D31425183FAE593AA59B302DE61272874115B2799E
47,777,083 UART: [art] PUB.Y = F19FFCADA513006141F3502582E13438086C5EA2786FD6B3F028CEBFA51E9821C30877FB33C66BC9728D1F02FA56CF77
47,784,357 UART: [art] SIG.R = 4A1661FF40453EC37A0963282A00720ED28201108017305F91EF9B15886761D0EAE88584AE904336B2904311B64FEF49
47,791,676 UART: [art] SIG.S = CDD4B64A59404249E872BA101205703C7416497CAD9C5E99698EDB3535E253C54B6287A06CFEAD1DF5153F49BB9FF086
48,769,455 UART: mbox::rt_entry...
48,770,417 UART: ____ _ _ _ ____ _____
48,772,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,774,357 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,776,211 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,778,132 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,780,016 UART: |_|
48,780,849 UART:
49,066,543 UART: [rt] Runtime listening for mailbox commands...
49,068,714 >>> mbox cmd response data (48 bytes)
49,069,302 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,071,622 >>> mbox cmd response data (48 bytes)
49,072,507 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,086,404 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,417,289 ready_for_fw is high
3,417,675 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,688,350 >>> mbox cmd response: success
19,005,004 UART:
19,005,429 UART: Running Caliptra FMC ...
19,006,576 UART:
19,006,741 UART: [state] CFI Enabled
19,071,452 UART: [fht] FMC Alias Private Key: 7
20,835,773 UART: [art] Extend RT PCRs Done
20,836,983 UART: [art] Lock RT PCRs Done
20,838,910 UART: [art] Populate DV Done
20,844,434 UART: [fht] FMC Alias Private Key: 7
20,845,963 UART: [art] Derive CDI
20,846,759 UART: [art] Store in in slot 0x4
20,903,804 UART: [art] Derive Key Pair
20,904,805 UART: [art] Store priv key in slot 0x5
23,367,415 UART: [art] Derive Key Pair - Done
23,380,626 UART: [art] Signing Cert with AUTHO
23,381,930 UART: RITY.KEYID = 7
25,093,225 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,728 UART: [art] PUB.X = 4136DF7E77A239E9C93D29DE380016C770082794554DC3771BA31F322CCB1CF160F419B652FD9D8A2A06E8717CB43C76
25,101,963 UART: [art] PUB.Y = 7C3A092CDE502F265310A187E6F945EECA4A4081A3046AC89F33D61529CADF74FD667072D46BBB2EA1146E0DC041EC6F
25,109,247 UART: [art] SIG.R = C3CA97090F85FA4AEAF83AE6B102EAF8DCE57029620EAC64591EA2F451826F76A6612C222BF40521A3591B01C16D6613
25,116,638 UART: [art] SIG.S = 99B7C9395CAB8124245BA28BD4262017037E7BD1E7A152F52985D09519D922403BAE14F46BC1338512E1577291173687
26,095,335 UART: Caliptra RT
26,096,044 UART: [state] CFI Enabled
26,260,508 UART: [rt] RT listening for mailbox commands...
30,297,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,452,774 UART: [rt]cmd =0x41544d4e, len=14344
34,449,026 >>> mbox cmd response data (8 bytes)
34,449,888 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,480,584 UART: [rt]cmd =0x41545348, len=116
34,499,988 >>> mbox cmd response data (12 bytes)
36,547,142 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
43,549,080 >>> mbox cmd response: success
43,549,519 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,583,777 UART:
43,584,105 UART: Running Caliptra FMC ...
43,585,147 UART:
43,585,299 UART: [state] CFI Enabled
43,675,926 UART: [art] Extend RT PCRs Done
43,677,138 UART: [art] Lock RT PCRs Done
43,678,515 UART: [art] Populate DV Done
43,683,881 UART: [fht] FMC Alias Private Key: 7
43,685,417 UART: [art] Derive CDI
43,686,149 UART: [art] Store in in slot 0x4
43,745,263 UART: [art] Derive Key Pair
43,746,298 UART: [art] Store priv key in slot 0x5
46,209,069 UART: [art] Derive Key Pair - Done
46,221,746 UART: [art] Signing Cert with AUTHO
46,223,051 UART: RITY.KEYID = 7
47,935,009 UART: [art] Erasing AUTHORITY.KEYID = 7
47,936,513 UART: [art] PUB.X = 4A15E0A83908B675B7CB4D445FE3033D580CCE17A9FB1F4AE8D56487278A25FFF3CDA518BA9617777BB38D0F7CC173E7
47,943,813 UART: [art] PUB.Y = 26268E7C2C5873FC41AFF2B903C25A0086F38937368D198B6F32E73BAF2690BC40EA06D6B7A90B6236F4FEB55BDC981A
47,951,096 UART: [art] SIG.R = 2363AC269D15EBA4DCE16366D779D9F91F68972F6CEE15092DD0A1C9AFB8127D54F975089E1F0F61F2A843C2FEE29695
47,958,487 UART: [art] SIG.S = B7496CBAE1E3DBC26244FB88C5F7DF8E999BB863C072FD6F8B9A0D65D007E46913C749B8184C664CF7331137E42FC1B6
48,937,298 UART: mbox::rt_entry...
48,938,292 UART: ____ _ _ _ ____ _____
48,940,231 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,942,243 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,944,100 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,946,028 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,947,973 UART: |_|
48,948,780 UART:
49,232,899 UART: [rt] Runtime listening for mailbox commands...
49,235,021 >>> mbox cmd response data (48 bytes)
49,235,589 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,237,902 >>> mbox cmd response data (48 bytes)
49,238,792 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,252,646 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
192,907 UART:
193,270 UART: Running Caliptra ROM ...
194,396 UART:
604,222 UART: [state] CFI Enabled
615,197 UART: [state] LifecycleState = Unprovisioned
617,564 UART: [state] DebugLocked = No
619,510 UART: [state] WD Timer not started. Device not locked for debugging
624,247 UART: [kat] SHA2-256
814,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,897 UART: [kat] ++
825,419 UART: [kat] sha1
835,866 UART: [kat] SHA2-256
838,885 UART: [kat] SHA2-384
845,785 UART: [kat] SHA2-512-ACC
848,383 UART: [kat] ECC-384
3,291,909 UART: [kat] HMAC-384Kdf
3,305,488 UART: [kat] LMS
3,837,289 UART: [kat] --
3,841,039 UART: [cold-reset] ++
3,842,631 UART: [fht] FHT @ 0x50003400
3,852,978 UART: [idev] ++
3,853,622 UART: [idev] CDI.KEYID = 6
3,854,578 UART: [idev] SUBJECT.KEYID = 7
3,855,823 UART: [idev] UDS.KEYID = 0
3,856,722 ready_for_fw is high
3,856,923 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,399 UART: [idev] Erasing UDS.KEYID = 0
6,333,092 UART: [idev] Sha1 KeyId Algorithm
6,356,004 UART: [idev] --
6,360,700 UART: [ldev] ++
6,361,409 UART: [ldev] CDI.KEYID = 6
6,362,328 UART: [ldev] SUBJECT.KEYID = 5
6,363,492 UART: [ldev] AUTHORITY.KEYID = 7
6,364,723 UART: [ldev] FE.KEYID = 1
6,376,524 UART: [ldev] Erasing FE.KEYID = 1
8,853,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,705 UART: [ldev] --
10,642,126 UART: [fwproc] Wait for Commands...
10,644,921 UART: [fwproc] Recv command 0x46574c44
10,647,172 UART: [fwproc] Recv'd Img size: 114168 bytes
14,088,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,283,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,824,609 >>> mbox cmd response: success
14,828,579 UART: [afmc] ++
14,829,289 UART: [afmc] CDI.KEYID = 6
14,830,557 UART: [afmc] SUBJECT.KEYID = 7
14,831,866 UART: [afmc] AUTHORITY.KEYID = 5
17,333,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,055,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,057,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,072,847 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,087,994 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,103,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,126,528 UART: [afmc] --
19,130,943 UART: [cold-reset] --
19,135,562 UART: [state] Locking Datavault
19,141,245 UART: [state] Locking PCR0, PCR1 and PCR31
19,143,445 UART: [state] Locking ICCM
19,145,741 UART: [exit] Launching FMC @ 0x40000130
19,154,410 UART:
19,154,646 UART: Running Caliptra FMC ...
19,155,760 UART:
19,155,921 UART: [state] CFI Enabled
19,163,870 UART: [fht] FMC Alias Private Key: 7
20,920,852 UART: [art] Extend RT PCRs Done
20,922,076 UART: [art] Lock RT PCRs Done
20,923,839 UART: [art] Populate DV Done
20,929,470 UART: [fht] FMC Alias Private Key: 7
20,931,115 UART: [art] Derive CDI
20,931,847 UART: [art] Store in in slot 0x4
20,974,060 UART: [art] Derive Key Pair
20,975,061 UART: [art] Store priv key in slot 0x5
23,401,862 UART: [art] Derive Key Pair - Done
23,414,802 UART: [art] Signing Cert with AUTHO
23,416,098 UART: RITY.KEYID = 7
25,121,526 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,034 UART: [art] PUB.X = 6CA3DCD0762D313343311C5C6FFB8118708DDC44C1D057945004D7D05D852E7105A4FA3C41003377F2B4A9F41DFFFC75
25,130,302 UART: [art] PUB.Y = 97921E03F7A570E9134643D2699214C4CAB0F740656E1EA0AD2B6CA08B461C39A9EFD7A46B6361EAD50401825A4512B3
25,137,536 UART: [art] SIG.R = A80031E0B4CDF616075C9E81CDA571E0B7C931E85ABD03486D560721B42D8D7F01AF818E74D4D6B98108532754F9DB52
25,144,872 UART: [art] SIG.S = 22C95C0C871E3820BA6486DA51B95B0538DD9E090441BEBE0BADEBC6495E8CECB659FEF62713BE3307BD17FC77CD344A
26,123,311 UART: Caliptra RT
26,124,029 UART: [state] CFI Enabled
26,240,387 UART: [rt] RT listening for mailbox commands...
30,274,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,429,905 UART: [rt]cmd =0x41544d4e, len=14344
34,425,835 >>> mbox cmd response data (8 bytes)
34,426,565 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,457,099 UART: [rt]cmd =0x41545348, len=116
34,477,223 >>> mbox cmd response data (12 bytes)
36,524,109 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
36,624,386 UART:
36,624,727 UART: Running Caliptra ROM ...
36,625,804 UART:
36,626,021 UART: [state] CFI Enabled
36,639,757 UART: [state] LifecycleState = Unprovisioned
36,641,601 UART: [state] DebugLocked = No
36,643,861 UART: [state] WD Timer not started. Device not locked for debugging
36,649,237 UART: [kat] SHA2-256
36,839,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,849,854 UART: [kat] ++
36,850,453 UART: [kat] sha1
36,860,377 UART: [kat] SHA2-256
36,863,346 UART: [kat] SHA2-384
36,868,858 UART: [kat] SHA2-512-ACC
36,871,430 UART: [kat] ECC-384
39,312,381 UART: [kat] HMAC-384Kdf
39,324,605 UART: [kat] LMS
39,856,207 UART: [kat] --
39,860,491 UART: [update-reset] ++
42,874,788 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,878,547 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
43,271,272 >>> mbox cmd response: success
43,271,648 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,271,939 UART: [update-reset] Copying MAN_2 To MAN_1
43,309,337 UART: [update-reset Success] --
43,316,274 UART: [state] Locking Datavault
43,319,205 UART: [state] Locking PCR0, PCR1 and PCR31
43,321,391 UART: [state] Locking ICCM
43,324,331 UART: [exit] Launching FMC @ 0x40000130
43,333,004 UART:
43,333,245 UART: Running Caliptra FMC ...
43,334,365 UART:
43,334,530 UART: [state] CFI Enabled
43,378,814 UART: [art] Extend RT PCRs Done
43,379,963 UART: [art] Lock RT PCRs Done
43,381,521 UART: [art] Populate DV Done
43,386,984 UART: [fht] FMC Alias Private Key: 7
43,388,687 UART: [art] Derive CDI
43,389,498 UART: [art] Store in in slot 0x4
43,431,936 UART: [art] Derive Key Pair
43,433,154 UART: [art] Store priv key in slot 0x5
45,859,850 UART: [art] Derive Key Pair - Done
45,872,854 UART: [art] Signing Cert with AUTHO
45,874,151 UART: RITY.KEYID = 7
47,579,716 UART: [art] Erasing AUTHORITY.KEYID = 7
47,581,212 UART: [art] PUB.X = F6B7DD0BB379A57302772F6559E2D6DF06314571EDB6B8B63C28E24F69EA516AF7DB27DDE3F254B3CFFB56C6120E4932
47,588,462 UART: [art] PUB.Y = 4745C66428F666106AF9D9A80C835710263E7ABA53A458C5287775DC0DBD7F306AB55B78836DFB11817698182AAE8D6A
47,595,705 UART: [art] SIG.R = 2D3717BA05A8A62695C8B82687C2751ADE790E4DA63D19FAD9ADD7B3EEAEB46B7F9FFBEABE0EDDFE270EB61DF3719B6A
47,603,161 UART: [art] SIG.S = AEB007EDC6BDD4A5CEC080CFEC3C6428B0E6D463EF6ACB440F132D79929D097496B5343594FA89F242CED1E3892557A5
48,581,306 UART: mbox::rt_entry...
48,582,271 UART: ____ _ _ _ ____ _____
48,584,207 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,586,220 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,588,078 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,590,007 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,591,893 UART: |_|
48,592,697 UART:
48,878,483 UART: [rt] Runtime listening for mailbox commands...
48,880,652 >>> mbox cmd response data (48 bytes)
48,881,247 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,883,570 >>> mbox cmd response data (48 bytes)
48,884,455 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,898,383 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,641 writing to cptra_bootfsm_go
3,755,008 ready_for_fw is high
3,755,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,079 >>> mbox cmd response: success
19,202,634 UART:
19,203,070 UART: Running Caliptra FMC ...
19,204,181 UART:
19,204,335 UART: [state] CFI Enabled
19,212,183 UART: [fht] FMC Alias Private Key: 7
20,969,312 UART: [art] Extend RT PCRs Done
20,970,552 UART: [art] Lock RT PCRs Done
20,972,208 UART: [art] Populate DV Done
20,977,737 UART: [fht] FMC Alias Private Key: 7
20,979,387 UART: [art] Derive CDI
20,980,330 UART: [art] Store in in slot 0x4
21,023,113 UART: [art] Derive Key Pair
21,024,121 UART: [art] Store priv key in slot 0x5
23,451,366 UART: [art] Derive Key Pair - Done
23,464,352 UART: [art] Signing Cert with AUTHO
23,465,689 UART: RITY.KEYID = 7
25,171,162 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,685 UART: [art] PUB.X = 102F6BC3A1BE39232F081A777284903E40A829B7404E8C3AB6E346372B0445029A7775A28F93975615CB236A779B16B0
25,179,945 UART: [art] PUB.Y = FB46447868A69EAD59D83911DD1996D1DB15351CFD05A3AB03CA1BA12C56377C1FF185B27AF1D550AB0101984279A6C6
25,187,182 UART: [art] SIG.R = C2D8BA834454542E46085E84ECEE8A030B9DCB185AA629EF92F7308790F75CB5F56D36E42545295DB206E566F2FDB689
25,194,575 UART: [art] SIG.S = 77D554A26500EA9523A561E581BAD46EB45D33FD53FCFB226EF2B41B763081B747E9A149E6591DA5885511900680B04E
26,173,332 UART: Caliptra RT
26,174,035 UART: [state] CFI Enabled
26,290,205 UART: [rt] RT listening for mailbox commands...
30,329,529 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,485,249 UART: [rt]cmd =0x41544d4e, len=14344
34,481,353 >>> mbox cmd response data (8 bytes)
34,482,106 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,512,647 UART: [rt]cmd =0x41545348, len=116
34,532,183 >>> mbox cmd response data (12 bytes)
36,578,495 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
43,490,384 >>> mbox cmd response: success
43,490,925 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,523,728 UART:
43,524,019 UART: Running Caliptra FMC ...
43,525,059 UART:
43,525,215 UART: [state] CFI Enabled
43,569,496 UART: [art] Extend RT PCRs Done
43,570,691 UART: [art] Lock RT PCRs Done
43,572,333 UART: [art] Populate DV Done
43,577,902 UART: [fht] FMC Alias Private Key: 7
43,579,494 UART: [art] Derive CDI
43,580,229 UART: [art] Store in in slot 0x4
43,623,200 UART: [art] Derive Key Pair
43,624,236 UART: [art] Store priv key in slot 0x5
46,050,545 UART: [art] Derive Key Pair - Done
46,063,267 UART: [art] Signing Cert with AUTHO
46,064,590 UART: RITY.KEYID = 7
47,770,261 UART: [art] Erasing AUTHORITY.KEYID = 7
47,771,762 UART: [art] PUB.X = 3203D9B93D97EC6BE93D78C0CDAD2A79EE8EA6D68AF74391EE1049EDCEF7621E0354CB951D0CD9212A0DE92135B682DE
47,779,058 UART: [art] PUB.Y = 2E79606A93328465B1E0C8B1534774A585E30209A72BDE4E4C8903AE83AEB053EDCC6FD2C70437EE1BBE3E8BB6A9D817
47,786,378 UART: [art] SIG.R = 5789112E9E3E8D3A528F36EAEA291B54871F6AAEB83DB9119C86EA558D21C923600C45D8356B31D6B70350BB56B49C59
47,793,730 UART: [art] SIG.S = 8A5C0FB1613DAFCE9CE72478BF3E918E895715F747100ECE91E55DE81CF6D9EE02AA3FC9526285A35C302B2E6CB2EA23
48,772,786 UART: mbox::rt_entry...
48,773,741 UART: ____ _ _ _ ____ _____
48,775,727 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,777,730 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,779,656 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,781,581 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,783,587 UART: |_|
48,784,400 UART:
49,069,081 UART: [rt] Runtime listening for mailbox commands...
49,071,260 >>> mbox cmd response data (48 bytes)
49,071,826 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,074,188 >>> mbox cmd response data (48 bytes)
49,075,074 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,089,008 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,177 UART: [kat] SHA2-256
892,115 UART: [kat] SHA2-384
894,914 UART: [kat] SHA2-512-ACC
896,815 UART: [kat] ECC-384
902,046 UART: [kat] HMAC-384Kdf
906,674 UART: [kat] LMS
1,474,870 UART: [kat] --
1,475,471 UART: [cold-reset] ++
1,476,051 UART: [fht] Storing FHT @ 0x50003400
1,478,948 UART: [idev] ++
1,479,116 UART: [idev] CDI.KEYID = 6
1,479,476 UART: [idev] SUBJECT.KEYID = 7
1,479,900 UART: [idev] UDS.KEYID = 0
1,480,245 ready_for_fw is high
1,480,245 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,052 UART: [idev] Erasing UDS.KEYID = 0
1,504,142 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,688 UART: [idev] --
1,513,723 UART: [ldev] ++
1,513,891 UART: [ldev] CDI.KEYID = 6
1,514,254 UART: [ldev] SUBJECT.KEYID = 5
1,514,680 UART: [ldev] AUTHORITY.KEYID = 7
1,515,143 UART: [ldev] FE.KEYID = 1
1,520,295 UART: [ldev] Erasing FE.KEYID = 1
1,545,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,508 UART: [ldev] --
1,585,021 UART: [fwproc] Waiting for Commands...
1,585,648 UART: [fwproc] Received command 0x46574c44
1,586,439 UART: [fwproc] Received Image of size 114168 bytes
2,881,853 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,239 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,322 >>> mbox cmd response: success
3,075,518 UART: [afmc] ++
3,075,686 UART: [afmc] CDI.KEYID = 6
3,076,048 UART: [afmc] SUBJECT.KEYID = 7
3,076,473 UART: [afmc] AUTHORITY.KEYID = 5
3,111,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,172 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,952 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,680 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,565 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,255 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,142 UART: [afmc] --
3,155,200 UART: [cold-reset] --
3,156,190 UART: [state] Locking Datavault
3,157,045 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,649 UART: [state] Locking ICCM
3,158,155 UART: [exit] Launching FMC @ 0x40000130
3,163,484 UART:
3,163,500 UART: Running Caliptra FMC ...
3,163,908 UART:
3,163,962 UART: [state] CFI Enabled
3,174,467 UART: [fht] FMC Alias Private Key: 7
3,283,002 UART: [art] Extend RT PCRs Done
3,283,430 UART: [art] Lock RT PCRs Done
3,284,860 UART: [art] Populate DV Done
3,293,057 UART: [fht] FMC Alias Private Key: 7
3,294,085 UART: [art] Derive CDI
3,294,365 UART: [art] Store in in slot 0x4
3,380,074 UART: [art] Derive Key Pair
3,380,434 UART: [art] Store priv key in slot 0x5
3,393,838 UART: [art] Derive Key Pair - Done
3,408,233 UART: [art] Signing Cert with AUTHO
3,408,713 UART: RITY.KEYID = 7
3,423,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,732 UART: [art] PUB.X = 7D7D309C9754A1149B766CDF8470E2867E27A08673D9A5296D09A937EBCC2E9E0996755772C037C4198391F451AA74B0
3,431,488 UART: [art] PUB.Y = 414BF75488E5D44BC29894B1B5283ED70423A02ABB39EB126B081A1E15A937DF76F1B8CB53645EC9425488B85F454691
3,438,430 UART: [art] SIG.R = 535C8E549709F23503E4A918601E87C1DDAFE8E1BF0E125EDB06BEBF9706D0D54C902EE5888AA0FE733B54CAC1C501FF
3,445,198 UART: [art] SIG.S = 22CAD372B8D26CA9135AF7D9EB0DFC4C52C1133BA4DD4F1EB6F0232639A5F8A166DFB24E205800FD57F076F1B0DADC8E
3,468,884 UART: Caliptra RT
3,469,137 UART: [state] CFI Enabled
3,577,423 UART: [rt] RT listening for mailbox commands...
3,578,093 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,301 UART: [rt]cmd =0x41544d4e, len=14344
4,011,362 >>> mbox cmd response data (8 bytes)
4,011,363 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,668 UART: [rt]cmd =0x41545348, len=116
4,062,933 >>> mbox cmd response data (12 bytes)
4,062,934 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,063,614 UART:
4,063,630 UART: Running Caliptra ROM ...
4,064,038 UART:
4,064,092 UART: [state] CFI Enabled
4,066,568 UART: [state] LifecycleState = Unprovisioned
4,067,223 UART: [state] DebugLocked = No
4,067,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,069,470 UART: [kat] SHA2-256
4,863,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,867,516 UART: [kat] ++
4,867,668 UART: [kat] sha1
4,871,916 UART: [kat] SHA2-256
4,873,854 UART: [kat] SHA2-384
4,876,583 UART: [kat] SHA2-512-ACC
4,878,483 UART: [kat] ECC-384
4,883,638 UART: [kat] HMAC-384Kdf
4,888,234 UART: [kat] LMS
5,456,430 UART: [kat] --
5,457,281 UART: [update-reset] ++
6,381,723 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,382,821 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,478,997 >>> mbox cmd response: success
6,478,997 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,479,328 UART: [update-reset] Copying MAN_2 To MAN_1
6,487,342 UART: [update-reset Success] --
6,488,239 UART: [state] Locking Datavault
6,488,823 UART: [state] Locking PCR0, PCR1 and PCR31
6,489,427 UART: [state] Locking ICCM
6,489,917 UART: [exit] Launching FMC @ 0x40000130
6,495,246 UART:
6,495,262 UART: Running Caliptra FMC ...
6,495,670 UART:
6,495,724 UART: [state] CFI Enabled
6,584,303 UART: [art] Extend RT PCRs Done
6,584,731 UART: [art] Lock RT PCRs Done
6,585,966 UART: [art] Populate DV Done
6,594,187 UART: [fht] FMC Alias Private Key: 7
6,595,329 UART: [art] Derive CDI
6,595,609 UART: [art] Store in in slot 0x4
6,681,332 UART: [art] Derive Key Pair
6,681,692 UART: [art] Store priv key in slot 0x5
6,694,980 UART: [art] Derive Key Pair - Done
6,709,502 UART: [art] Signing Cert with AUTHO
6,709,982 UART: RITY.KEYID = 7
6,725,534 UART: [art] Erasing AUTHORITY.KEYID = 7
6,726,299 UART: [art] PUB.X = 10D90BA4524D0AFB2C5A2F9C3358ED4C560B3B6B9210C712459CDBB5F059A8101CCE3F332CEB14366BF316E614FD22A5
6,733,072 UART: [art] PUB.Y = 8BF1BCDB695FA26CC84FB3163CC76C54AFA77243A76BADA278FEE47CF2FE95FB87CC57F5B62CF545613F8DF263FD0ACE
6,740,049 UART: [art] SIG.R = 57FFE5B4D6007A6D6EF261680FE0391330EE7ED7B0F690087F16424EB2274E245CB08E35E7E16BABA1C264EFF84887FF
6,746,801 UART: [art] SIG.S = E9A5B4FDBB3BE15B1398354E77C93E176789DBD842E523DF38FCBBF3C94E1E5771257EB066E06715A4C981D6961D580A
6,770,557 UART: mbox::rt_entry...
6,770,929 UART: ____ _ _ _ ____ _____
6,771,713 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,772,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,773,281 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,774,049 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,774,817 UART: |_|
6,775,129 UART:
7,055,355 UART: [rt] Runtime listening for mailbox commands...
7,056,545 >>> mbox cmd response data (48 bytes)
7,056,546 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,059,329 >>> mbox cmd response data (48 bytes)
7,059,330 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,074,467 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,231 ready_for_fw is high
1,362,231 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,468 >>> mbox cmd response: success
2,989,392 UART:
2,989,408 UART: Running Caliptra FMC ...
2,989,816 UART:
2,989,870 UART: [state] CFI Enabled
3,000,297 UART: [fht] FMC Alias Private Key: 7
3,108,270 UART: [art] Extend RT PCRs Done
3,108,698 UART: [art] Lock RT PCRs Done
3,110,358 UART: [art] Populate DV Done
3,118,511 UART: [fht] FMC Alias Private Key: 7
3,119,511 UART: [art] Derive CDI
3,119,791 UART: [art] Store in in slot 0x4
3,205,888 UART: [art] Derive Key Pair
3,206,248 UART: [art] Store priv key in slot 0x5
3,219,116 UART: [art] Derive Key Pair - Done
3,233,921 UART: [art] Signing Cert with AUTHO
3,234,401 UART: RITY.KEYID = 7
3,249,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,316 UART: [art] PUB.X = BDC10F3FD4B822AF1D62D8625CAD897848A044EEE7E05045A703EF9198876258EDEA7F72FC8025DEC192543107207BEB
3,257,085 UART: [art] PUB.Y = 5344F05F9245948A4221A290778E0EA223D40E6EF11B971022389F275FDB1C1226901CD3C80157F9FDFA7F5E49659741
3,264,018 UART: [art] SIG.R = FBD58D2DDBC9A7286A77E1D7F3C4192DB3AA8C1556EB2DE3E298348184AA97AFFF4B87BF8EFE677F9923F2D7B4AFE75B
3,270,814 UART: [art] SIG.S = 294FB870ADC223665568BE903742C680409538E103CB38886BAFDB29D9784ADE8DA9F06D2C9FCE9E66471B5EE168A961
3,294,720 UART: Caliptra RT
3,294,973 UART: [state] CFI Enabled
3,402,670 UART: [rt] RT listening for mailbox commands...
3,403,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,188 UART: [rt]cmd =0x41544d4e, len=14344
3,836,561 >>> mbox cmd response data (8 bytes)
3,836,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,711 UART: [rt]cmd =0x41545348, len=116
3,888,058 >>> mbox cmd response data (12 bytes)
3,888,059 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,185,428 >>> mbox cmd response: success
6,185,428 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,198,693 UART:
6,198,709 UART: Running Caliptra FMC ...
6,199,117 UART:
6,199,171 UART: [state] CFI Enabled
6,287,942 UART: [art] Extend RT PCRs Done
6,288,370 UART: [art] Lock RT PCRs Done
6,289,469 UART: [art] Populate DV Done
6,297,792 UART: [fht] FMC Alias Private Key: 7
6,298,882 UART: [art] Derive CDI
6,299,162 UART: [art] Store in in slot 0x4
6,384,803 UART: [art] Derive Key Pair
6,385,163 UART: [art] Store priv key in slot 0x5
6,397,963 UART: [art] Derive Key Pair - Done
6,412,658 UART: [art] Signing Cert with AUTHO
6,413,138 UART: RITY.KEYID = 7
6,428,398 UART: [art] Erasing AUTHORITY.KEYID = 7
6,429,163 UART: [art] PUB.X = 767E424B77FCD65E14B482DBF674C5170CAAAC3D84BAE44263987D78F7579DB7E43F362561F1904330AE849ACEFB1E8E
6,435,940 UART: [art] PUB.Y = 35DEC4B6B8062D89FECEB646A3704665D0A28D17786CA56BE6445B1E800C07C599B6CEEEC034ADC45520767B026C4CEB
6,442,890 UART: [art] SIG.R = 06C3B55EA47B01CC6EF33B8757A1806D897305C0C686781629D469472767AC06DC62FFCFD85894A015BEFF72E2A41861
6,449,648 UART: [art] SIG.S = 0605680B228F485CB8D43D7AB9A9D4A3A2055B875CC1413F5D5596A95A1391C806BDDA60FFB27B5AC2F29D4CA51FF3D1
6,472,990 UART: mbox::rt_entry...
6,473,362 UART: ____ _ _ _ ____ _____
6,474,146 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,474,946 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,475,714 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,476,482 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,477,250 UART: |_|
6,477,562 UART:
6,760,343 UART: [rt] Runtime listening for mailbox commands...
6,761,533 >>> mbox cmd response data (48 bytes)
6,761,534 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,764,317 >>> mbox cmd response data (48 bytes)
6,764,318 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,779,455 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,542 UART: [kat] SHA2-256
892,480 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,219 UART: [kat] LMS
1,475,415 UART: [kat] --
1,476,288 UART: [cold-reset] ++
1,476,778 UART: [fht] Storing FHT @ 0x50003400
1,479,523 UART: [idev] ++
1,479,691 UART: [idev] CDI.KEYID = 6
1,480,051 UART: [idev] SUBJECT.KEYID = 7
1,480,475 UART: [idev] UDS.KEYID = 0
1,480,820 ready_for_fw is high
1,480,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,743 UART: [idev] Erasing UDS.KEYID = 0
1,505,879 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,717 UART: [idev] --
1,515,730 UART: [ldev] ++
1,515,898 UART: [ldev] CDI.KEYID = 6
1,516,261 UART: [ldev] SUBJECT.KEYID = 5
1,516,687 UART: [ldev] AUTHORITY.KEYID = 7
1,517,150 UART: [ldev] FE.KEYID = 1
1,522,054 UART: [ldev] Erasing FE.KEYID = 1
1,547,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,833 UART: [ldev] --
1,586,230 UART: [fwproc] Waiting for Commands...
1,586,937 UART: [fwproc] Received command 0x46574c44
1,587,728 UART: [fwproc] Received Image of size 114168 bytes
2,884,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,391 >>> mbox cmd response: success
3,077,487 UART: [afmc] ++
3,077,655 UART: [afmc] CDI.KEYID = 6
3,078,017 UART: [afmc] SUBJECT.KEYID = 7
3,078,442 UART: [afmc] AUTHORITY.KEYID = 5
3,113,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,991 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,876 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,566 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,277 UART: [afmc] --
3,157,193 UART: [cold-reset] --
3,158,015 UART: [state] Locking Datavault
3,159,260 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,864 UART: [state] Locking ICCM
3,160,396 UART: [exit] Launching FMC @ 0x40000130
3,165,725 UART:
3,165,741 UART: Running Caliptra FMC ...
3,166,149 UART:
3,166,292 UART: [state] CFI Enabled
3,176,855 UART: [fht] FMC Alias Private Key: 7
3,284,406 UART: [art] Extend RT PCRs Done
3,284,834 UART: [art] Lock RT PCRs Done
3,286,306 UART: [art] Populate DV Done
3,294,479 UART: [fht] FMC Alias Private Key: 7
3,295,527 UART: [art] Derive CDI
3,295,807 UART: [art] Store in in slot 0x4
3,381,376 UART: [art] Derive Key Pair
3,381,736 UART: [art] Store priv key in slot 0x5
3,394,728 UART: [art] Derive Key Pair - Done
3,409,726 UART: [art] Signing Cert with AUTHO
3,410,206 UART: RITY.KEYID = 7
3,424,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,745 UART: [art] PUB.X = DF400675D00891E0C8AD2FBC2D8306E27F14D7FEA40E6F6B98E0CE4015663884203FB73C60F6AA25C83554FEC1FF609E
3,432,513 UART: [art] PUB.Y = 25AE06E9D1B7F3DD4E55B4BE986AFC30869BC8AA0CA8BA91EB95C9172387A9B28132D99DD26FDAC1348A950EB14C8AD8
3,439,474 UART: [art] SIG.R = B1B16AFA55188DDC3C439C50B5D650AE2D4C7AEC6F679672A2001A4C5768CC072BEB3089B649FCB93EF28F3E6FA8B292
3,446,235 UART: [art] SIG.S = 977A4768F7E6CC805801BE7B520BF3CBF70248875CB6B92BE7178AEE51F5A36C26E190CF86F8FE366DBEE62AA5C663EB
3,470,339 UART: Caliptra RT
3,470,684 UART: [state] CFI Enabled
3,579,106 UART: [rt] RT listening for mailbox commands...
3,579,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,568 UART: [rt]cmd =0x41544d4e, len=14344
4,012,697 >>> mbox cmd response data (8 bytes)
4,012,698 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,759 UART: [rt]cmd =0x41545348, len=116
4,064,962 >>> mbox cmd response data (12 bytes)
4,064,963 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,065,713 UART:
4,065,729 UART: Running Caliptra ROM ...
4,066,137 UART:
4,066,278 UART: [state] CFI Enabled
4,069,240 UART: [state] LifecycleState = Unprovisioned
4,069,895 UART: [state] DebugLocked = No
4,070,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,072,086 UART: [kat] SHA2-256
4,866,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,870,132 UART: [kat] ++
4,870,284 UART: [kat] sha1
4,874,324 UART: [kat] SHA2-256
4,876,262 UART: [kat] SHA2-384
4,879,123 UART: [kat] SHA2-512-ACC
4,881,023 UART: [kat] ECC-384
4,886,518 UART: [kat] HMAC-384Kdf
4,891,282 UART: [kat] LMS
5,459,478 UART: [kat] --
5,460,343 UART: [update-reset] ++
6,386,393 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,387,651 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,483,827 >>> mbox cmd response: success
6,483,827 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,484,144 UART: [update-reset] Copying MAN_2 To MAN_1
6,492,158 UART: [update-reset Success] --
6,493,257 UART: [state] Locking Datavault
6,493,889 UART: [state] Locking PCR0, PCR1 and PCR31
6,494,493 UART: [state] Locking ICCM
6,495,151 UART: [exit] Launching FMC @ 0x40000130
6,500,480 UART:
6,500,496 UART: Running Caliptra FMC ...
6,500,904 UART:
6,501,047 UART: [state] CFI Enabled
6,590,288 UART: [art] Extend RT PCRs Done
6,590,716 UART: [art] Lock RT PCRs Done
6,591,907 UART: [art] Populate DV Done
6,600,282 UART: [fht] FMC Alias Private Key: 7
6,601,300 UART: [art] Derive CDI
6,601,580 UART: [art] Store in in slot 0x4
6,687,219 UART: [art] Derive Key Pair
6,687,579 UART: [art] Store priv key in slot 0x5
6,700,703 UART: [art] Derive Key Pair - Done
6,715,656 UART: [art] Signing Cert with AUTHO
6,716,136 UART: RITY.KEYID = 7
6,731,314 UART: [art] Erasing AUTHORITY.KEYID = 7
6,732,079 UART: [art] PUB.X = E18067E6C56902DFEBA6A71DB90FEFB0CBC22C4E79B1789FD11C3AB35400C582130F7D61652C0B096FD0FD15E75A6528
6,738,824 UART: [art] PUB.Y = A8D7A7E94249D409294A8EFE29F1EC20DB2D8636B9E7F19FB17D6D664568031BE0710CB4763D651033A1A4E458A3978C
6,745,767 UART: [art] SIG.R = 41F34F86D9D7F39C17C7033B88D62DFF3136B049822700F87695A6C1799E6E61C2779F14B91C6109C04C4B2EA37A5359
6,752,503 UART: [art] SIG.S = AA3D308A6CD7E75F3D3718E3334C63E156FA082B1EBF79EDC0D03ED742B3BE0613B962D1CE8EFB786D808C8711206C04
6,776,645 UART: mbox::rt_entry...
6,777,017 UART: ____ _ _ _ ____ _____
6,777,801 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,778,601 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,779,369 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,780,137 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,780,905 UART: |_|
6,781,217 UART:
7,061,277 UART: [rt] Runtime listening for mailbox commands...
7,062,467 >>> mbox cmd response data (48 bytes)
7,062,468 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,065,251 >>> mbox cmd response data (48 bytes)
7,065,252 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,080,389 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,722 ready_for_fw is high
1,362,722 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,201 >>> mbox cmd response: success
2,986,555 UART:
2,986,571 UART: Running Caliptra FMC ...
2,986,979 UART:
2,987,122 UART: [state] CFI Enabled
2,997,825 UART: [fht] FMC Alias Private Key: 7
3,105,682 UART: [art] Extend RT PCRs Done
3,106,110 UART: [art] Lock RT PCRs Done
3,107,480 UART: [art] Populate DV Done
3,115,743 UART: [fht] FMC Alias Private Key: 7
3,116,671 UART: [art] Derive CDI
3,116,951 UART: [art] Store in in slot 0x4
3,202,800 UART: [art] Derive Key Pair
3,203,160 UART: [art] Store priv key in slot 0x5
3,216,656 UART: [art] Derive Key Pair - Done
3,231,206 UART: [art] Signing Cert with AUTHO
3,231,686 UART: RITY.KEYID = 7
3,246,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,647 UART: [art] PUB.X = 755ED23F5DA1E071A1EEC2CE31D380EB6A30F13B1B02CF7C1D1806A4E7D9BED23CF76E08C560AD57971477786F9FE5C6
3,254,424 UART: [art] PUB.Y = 5F0781ADDB77CA9E95BD1DBC7F901016912CE119157E0C39E600CD384BCB1DD0B6E9337C0FE349D8F2F52F980E35725A
3,261,352 UART: [art] SIG.R = 102477A8E0D6CAA52D57E20E1A72479047219B249869F417DCC2C506860328D06016638DCA77B04E4F22DD7193D9F256
3,268,105 UART: [art] SIG.S = E89FAC52325C0384E2C305119C8985D170D6C732E3CE2D1ADC2EB870FE01627DED29F44A360DA0996FCE4C0C326B4981
3,291,971 UART: Caliptra RT
3,292,316 UART: [state] CFI Enabled
3,400,317 UART: [rt] RT listening for mailbox commands...
3,400,987 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,683 UART: [rt]cmd =0x41544d4e, len=14344
3,833,652 >>> mbox cmd response data (8 bytes)
3,833,653 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,804 UART: [rt]cmd =0x41545348, len=116
3,886,127 >>> mbox cmd response data (12 bytes)
3,886,128 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,184,316 >>> mbox cmd response: success
6,184,316 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,197,903 UART:
6,197,919 UART: Running Caliptra FMC ...
6,198,327 UART:
6,198,470 UART: [state] CFI Enabled
6,287,223 UART: [art] Extend RT PCRs Done
6,287,651 UART: [art] Lock RT PCRs Done
6,288,918 UART: [art] Populate DV Done
6,297,207 UART: [fht] FMC Alias Private Key: 7
6,298,143 UART: [art] Derive CDI
6,298,423 UART: [art] Store in in slot 0x4
6,383,708 UART: [art] Derive Key Pair
6,384,068 UART: [art] Store priv key in slot 0x5
6,397,928 UART: [art] Derive Key Pair - Done
6,412,735 UART: [art] Signing Cert with AUTHO
6,413,215 UART: RITY.KEYID = 7
6,428,541 UART: [art] Erasing AUTHORITY.KEYID = 7
6,429,306 UART: [art] PUB.X = 42925F416AC55654B7EEBE23E660C6D3422D9B6715EE99ADA53D2F797115583D50B7BE3547BD55DFC9CB792B6A8926CD
6,436,084 UART: [art] PUB.Y = 130BFF9840B3402A6AAFD531D7B369CE78AAEB22B92C8411AAB439A2FE66F6CC22CD2B049558BD4073C0D92623F86301
6,443,035 UART: [art] SIG.R = B15CAA186AC73061A7CCB8548BF6C27CCB8F410DAC70E50D13D36A1C650B37DC2338B9C86236DD97C7F266877442D758
6,449,804 UART: [art] SIG.S = FAA183500592881E75D635D0F3A7DB02618E0F82206E52BE6CE32983393492B7DF74BD947C12726317876FEEBE6D14B8
6,473,298 UART: mbox::rt_entry...
6,473,670 UART: ____ _ _ _ ____ _____
6,474,454 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,475,254 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,476,022 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,476,790 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,477,558 UART: |_|
6,477,870 UART:
6,753,193 UART: [rt] Runtime listening for mailbox commands...
6,754,383 >>> mbox cmd response data (48 bytes)
6,754,384 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,757,167 >>> mbox cmd response data (48 bytes)
6,757,168 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,772,305 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,464 UART: [kat] SHA2-512-ACC
908,365 UART: [kat] ECC-384
917,950 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,401 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 ready_for_fw is high
1,176,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,546 UART: [idev] Erasing UDS.KEYID = 0
1,200,767 UART: [idev] Sha1 KeyId Algorithm
1,209,263 UART: [idev] --
1,210,287 UART: [ldev] ++
1,210,455 UART: [ldev] CDI.KEYID = 6
1,210,818 UART: [ldev] SUBJECT.KEYID = 5
1,211,244 UART: [ldev] AUTHORITY.KEYID = 7
1,211,707 UART: [ldev] FE.KEYID = 1
1,216,969 UART: [ldev] Erasing FE.KEYID = 1
1,243,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,689 UART: [ldev] --
1,283,034 UART: [fwproc] Wait for Commands...
1,283,848 UART: [fwproc] Recv command 0x46574c44
1,284,576 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,694 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,317 >>> mbox cmd response: success
2,774,405 UART: [afmc] ++
2,774,573 UART: [afmc] CDI.KEYID = 6
2,774,935 UART: [afmc] SUBJECT.KEYID = 7
2,775,360 UART: [afmc] AUTHORITY.KEYID = 5
2,810,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,354 UART: [afmc] --
2,854,432 UART: [cold-reset] --
2,855,304 UART: [state] Locking Datavault
2,856,545 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,149 UART: [state] Locking ICCM
2,857,755 UART: [exit] Launching FMC @ 0x40000130
2,863,084 UART:
2,863,100 UART: Running Caliptra FMC ...
2,863,508 UART:
2,863,562 UART: [state] CFI Enabled
2,873,821 UART: [fht] FMC Alias Private Key: 7
2,981,814 UART: [art] Extend RT PCRs Done
2,982,242 UART: [art] Lock RT PCRs Done
2,983,600 UART: [art] Populate DV Done
2,991,631 UART: [fht] FMC Alias Private Key: 7
2,992,613 UART: [art] Derive CDI
2,992,893 UART: [art] Store in in slot 0x4
3,078,318 UART: [art] Derive Key Pair
3,078,678 UART: [art] Store priv key in slot 0x5
3,092,220 UART: [art] Derive Key Pair - Done
3,107,019 UART: [art] Signing Cert with AUTHO
3,107,499 UART: RITY.KEYID = 7
3,123,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,890 UART: [art] PUB.X = FD25CAA4BFE11D9086B52389B12E17074F536881674807CBC5D09065001D1A200970E0C2E8839ABB273A9A25E9AEF5CB
3,130,633 UART: [art] PUB.Y = 6667E5600060F552AB2B9CCF6C59846D189119A3382691DA724733DD041E212B90B3B2DB7B169D8AF5AD498208E6DE32
3,137,553 UART: [art] SIG.R = 598C95C76A8CB334A974564F3953173BEC4AD25C51B6BD5D8CC2C7536BA88A628D45005BE9BA90E49D1F28EE47D295BA
3,144,311 UART: [art] SIG.S = 8E0C02C6A9F1A17B17D3D980A6D7BE82171E22BB393008663B995CF71543814AAD932A60D9D8A6F7536F6F1CADF5D781
3,167,935 UART: Caliptra RT
3,168,188 UART: [state] CFI Enabled
3,276,093 UART: [rt] RT listening for mailbox commands...
3,276,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,695 UART: [rt]cmd =0x41544d4e, len=14344
3,709,432 >>> mbox cmd response data (8 bytes)
3,709,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,770 UART: [rt]cmd =0x41545348, len=116
3,762,103 >>> mbox cmd response data (12 bytes)
3,762,104 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,787 UART:
3,762,803 UART: Running Caliptra ROM ...
3,763,211 UART:
3,763,266 UART: [state] CFI Enabled
3,765,510 UART: [state] LifecycleState = Unprovisioned
3,766,165 UART: [state] DebugLocked = No
3,766,789 UART: [state] WD Timer not started. Device not locked for debugging
3,768,011 UART: [kat] SHA2-256
4,573,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,577,786 UART: [kat] ++
4,577,938 UART: [kat] sha1
4,582,304 UART: [kat] SHA2-256
4,584,244 UART: [kat] SHA2-384
4,586,863 UART: [kat] SHA2-512-ACC
4,588,763 UART: [kat] ECC-384
4,598,854 UART: [kat] HMAC-384Kdf
4,603,404 UART: [kat] LMS
4,851,732 UART: [kat] --
4,852,660 UART: [update-reset] ++
5,753,742 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,754,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,851,049 >>> mbox cmd response: success
5,851,049 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,851,374 UART: [update-reset] Copying MAN_2 To MAN_1
5,859,388 UART: [update-reset Success] --
5,860,501 UART: [state] Locking Datavault
5,861,225 UART: [state] Locking PCR0, PCR1 and PCR31
5,861,829 UART: [state] Locking ICCM
5,862,281 UART: [exit] Launching FMC @ 0x40000130
5,867,610 UART:
5,867,626 UART: Running Caliptra FMC ...
5,868,034 UART:
5,868,088 UART: [state] CFI Enabled
5,956,815 UART: [art] Extend RT PCRs Done
5,957,243 UART: [art] Lock RT PCRs Done
5,958,292 UART: [art] Populate DV Done
5,966,587 UART: [fht] FMC Alias Private Key: 7
5,967,609 UART: [art] Derive CDI
5,967,889 UART: [art] Store in in slot 0x4
6,053,574 UART: [art] Derive Key Pair
6,053,934 UART: [art] Store priv key in slot 0x5
6,067,492 UART: [art] Derive Key Pair - Done
6,082,001 UART: [art] Signing Cert with AUTHO
6,082,481 UART: RITY.KEYID = 7
6,097,397 UART: [art] Erasing AUTHORITY.KEYID = 7
6,098,162 UART: [art] PUB.X = A56B6E6EAD778F342028E9F102162DB65E198F44747F20A959404347126B0F697F5E18EB6C7A0F70B9D21C72B9724FE2
6,104,921 UART: [art] PUB.Y = 347F3960D5F219C485A74B9CB3DF56F121ED21466FDC07C694B18EB919F45CB1F8C30576744A8823372BC9A179E16E96
6,111,865 UART: [art] SIG.R = A119F6DDCF23FDCC2C1020E77BFEE8EE9CB782B35DE738DF11E8CC2F7C6DC2484DC3F4975A72546CC27273F83C155C0F
6,118,654 UART: [art] SIG.S = 9C94A5C95C42C74E1F7AFDBD3F64A2F6586F5201747DC7B8D60426ACA979557F4A9701C0BF1BB3C8B471594A34BF361C
6,142,890 UART: mbox::rt_entry...
6,143,262 UART: ____ _ _ _ ____ _____
6,144,046 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,144,846 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,145,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,146,382 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,147,150 UART: |_|
6,147,462 UART:
6,425,607 UART: [rt] Runtime listening for mailbox commands...
6,426,797 >>> mbox cmd response data (48 bytes)
6,426,798 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,429,581 >>> mbox cmd response data (48 bytes)
6,429,582 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,444,719 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,497 ready_for_fw is high
1,060,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,750 >>> mbox cmd response: success
2,688,690 UART:
2,688,706 UART: Running Caliptra FMC ...
2,689,114 UART:
2,689,168 UART: [state] CFI Enabled
2,700,037 UART: [fht] FMC Alias Private Key: 7
2,807,784 UART: [art] Extend RT PCRs Done
2,808,212 UART: [art] Lock RT PCRs Done
2,809,924 UART: [art] Populate DV Done
2,817,733 UART: [fht] FMC Alias Private Key: 7
2,818,835 UART: [art] Derive CDI
2,819,115 UART: [art] Store in in slot 0x4
2,904,628 UART: [art] Derive Key Pair
2,904,988 UART: [art] Store priv key in slot 0x5
2,918,256 UART: [art] Derive Key Pair - Done
2,932,877 UART: [art] Signing Cert with AUTHO
2,933,357 UART: RITY.KEYID = 7
2,948,695 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,460 UART: [art] PUB.X = 7B59AAAC08C4BEC95661C8B1351E5F09EC52A747EDB9A78227CAD42640789A6D59968EF119884A852ADD8808330FF9C3
2,956,224 UART: [art] PUB.Y = 48FFAF75C1F3B4FFA105096FD9C77E572FE968BB1B7023C621535E1F4696E13AA8C4DF7DC729703549BF317B64E27D3B
2,963,178 UART: [art] SIG.R = 078060CF9BCD362E68C05EB0389B08973AE8FE6A32A83B48E48FF29B0BD038131448A8CB0EB5D0B0E314282CB12446A8
2,969,942 UART: [art] SIG.S = 1215B14141989E0529CDA5F9D4980E7C6AA3A886B8ADA75B0C24785F09A81D6215441ED66B4C2E39A875AB6022303715
2,994,075 UART: Caliptra RT
2,994,328 UART: [state] CFI Enabled
3,102,355 UART: [rt] RT listening for mailbox commands...
3,103,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,389 UART: [rt]cmd =0x41544d4e, len=14344
3,537,130 >>> mbox cmd response data (8 bytes)
3,537,131 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,567,204 UART: [rt]cmd =0x41545348, len=116
3,588,653 >>> mbox cmd response data (12 bytes)
3,588,654 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,560,770 >>> mbox cmd response: success
5,560,770 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,574,454 UART:
5,574,470 UART: Running Caliptra FMC ...
5,574,878 UART:
5,574,932 UART: [state] CFI Enabled
5,663,765 UART: [art] Extend RT PCRs Done
5,664,193 UART: [art] Lock RT PCRs Done
5,665,590 UART: [art] Populate DV Done
5,673,697 UART: [fht] FMC Alias Private Key: 7
5,674,639 UART: [art] Derive CDI
5,674,919 UART: [art] Store in in slot 0x4
5,760,198 UART: [art] Derive Key Pair
5,760,558 UART: [art] Store priv key in slot 0x5
5,773,608 UART: [art] Derive Key Pair - Done
5,788,412 UART: [art] Signing Cert with AUTHO
5,788,892 UART: RITY.KEYID = 7
5,804,498 UART: [art] Erasing AUTHORITY.KEYID = 7
5,805,263 UART: [art] PUB.X = 9F8D8889B71299998B73B3F181ED460D9E24F8CFC9B96B946A822AE69E4BFF594462AF0E6119DF0E89BA4B4E9DFBF852
5,812,036 UART: [art] PUB.Y = 34277794F4BD4216F8327178DCC41CE91F8CD9CFA35172D02A820C7FD825339445ECEB5ADD45C2F1114D9ADEC22E97D0
5,818,993 UART: [art] SIG.R = EC553645F8D50B2D1A81E35FEBA65C5A338226354BB72C741BEEFA86131864743377CB4402677C8AD739D087A5C0D7FD
5,825,761 UART: [art] SIG.S = 867F16D5C532763C9AE731D159727C7E49C808A0D009DF864C6B01A4F78E6419D3DD2F21785B6EA1B00DF8C6C41E1789
5,849,148 UART: mbox::rt_entry...
5,849,520 UART: ____ _ _ _ ____ _____
5,850,304 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,851,104 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,851,872 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,852,640 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,853,408 UART: |_|
5,853,720 UART:
6,136,457 UART: [rt] Runtime listening for mailbox commands...
6,137,647 >>> mbox cmd response data (48 bytes)
6,137,648 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,140,431 >>> mbox cmd response data (48 bytes)
6,140,432 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,155,569 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
893,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,556 UART: [kat] ++
897,708 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
906,883 UART: [kat] SHA2-512-ACC
908,784 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,239 UART: [kat] LMS
1,171,567 UART: [kat] --
1,172,438 UART: [cold-reset] ++
1,172,788 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 ready_for_fw is high
1,176,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,107 UART: [idev] Erasing UDS.KEYID = 0
1,200,950 UART: [idev] Sha1 KeyId Algorithm
1,209,328 UART: [idev] --
1,210,446 UART: [ldev] ++
1,210,614 UART: [ldev] CDI.KEYID = 6
1,210,977 UART: [ldev] SUBJECT.KEYID = 5
1,211,403 UART: [ldev] AUTHORITY.KEYID = 7
1,211,866 UART: [ldev] FE.KEYID = 1
1,217,158 UART: [ldev] Erasing FE.KEYID = 1
1,243,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,010 UART: [ldev] --
1,282,399 UART: [fwproc] Wait for Commands...
1,283,009 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,337 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,034 >>> mbox cmd response: success
2,773,070 UART: [afmc] ++
2,773,238 UART: [afmc] CDI.KEYID = 6
2,773,600 UART: [afmc] SUBJECT.KEYID = 7
2,774,025 UART: [afmc] AUTHORITY.KEYID = 5
2,809,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,143 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,747 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,711 UART: [afmc] --
2,853,615 UART: [cold-reset] --
2,854,491 UART: [state] Locking Datavault
2,855,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,234 UART: [state] Locking ICCM
2,856,772 UART: [exit] Launching FMC @ 0x40000130
2,862,101 UART:
2,862,117 UART: Running Caliptra FMC ...
2,862,525 UART:
2,862,668 UART: [state] CFI Enabled
2,873,369 UART: [fht] FMC Alias Private Key: 7
2,981,744 UART: [art] Extend RT PCRs Done
2,982,172 UART: [art] Lock RT PCRs Done
2,983,734 UART: [art] Populate DV Done
2,991,757 UART: [fht] FMC Alias Private Key: 7
2,992,713 UART: [art] Derive CDI
2,992,993 UART: [art] Store in in slot 0x4
3,079,136 UART: [art] Derive Key Pair
3,079,496 UART: [art] Store priv key in slot 0x5
3,092,396 UART: [art] Derive Key Pair - Done
3,107,540 UART: [art] Signing Cert with AUTHO
3,108,020 UART: RITY.KEYID = 7
3,123,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,343 UART: [art] PUB.X = C0364207AE98DD16A41FF97F7C647D515119622F5D4654D289597A28EFFF59E4BC61B370EB3CE351FAEF25FB9BF99B4B
3,131,122 UART: [art] PUB.Y = C4D340FA79936CD6C0E957FA5B5139155A1447C63762E973D2F14BBFBA17C902430102CE90052F1A71528586F81F9492
3,138,054 UART: [art] SIG.R = 971C4865A5E018050B91A6C0D1C22D1B560129C5EFD5D9524804020FA74207BFF14AC781AB65806CA6298E07D3B29AD5
3,144,800 UART: [art] SIG.S = 7A37A5BB0DDF89B5E2D3D40D54EA41400256623F4DB847B0FD8637B36B927B31629B1E9803C6EA892736891945992265
3,168,305 UART: Caliptra RT
3,168,650 UART: [state] CFI Enabled
3,276,327 UART: [rt] RT listening for mailbox commands...
3,276,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,841 UART: [rt]cmd =0x41544d4e, len=14344
3,709,700 >>> mbox cmd response data (8 bytes)
3,709,701 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,948 UART: [rt]cmd =0x41545348, len=116
3,761,205 >>> mbox cmd response data (12 bytes)
3,761,206 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,007 UART:
3,762,023 UART: Running Caliptra ROM ...
3,762,431 UART:
3,762,573 UART: [state] CFI Enabled
3,765,627 UART: [state] LifecycleState = Unprovisioned
3,766,282 UART: [state] DebugLocked = No
3,766,790 UART: [state] WD Timer not started. Device not locked for debugging
3,768,128 UART: [kat] SHA2-256
4,573,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,577,903 UART: [kat] ++
4,578,055 UART: [kat] sha1
4,582,323 UART: [kat] SHA2-256
4,584,263 UART: [kat] SHA2-384
4,586,852 UART: [kat] SHA2-512-ACC
4,588,752 UART: [kat] ECC-384
4,598,697 UART: [kat] HMAC-384Kdf
4,603,313 UART: [kat] LMS
4,851,641 UART: [kat] --
4,852,719 UART: [update-reset] ++
5,754,415 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,755,500 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,851,624 >>> mbox cmd response: success
5,851,624 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,851,897 UART: [update-reset] Copying MAN_2 To MAN_1
5,859,911 UART: [update-reset Success] --
5,860,868 UART: [state] Locking Datavault
5,861,650 UART: [state] Locking PCR0, PCR1 and PCR31
5,862,254 UART: [state] Locking ICCM
5,862,800 UART: [exit] Launching FMC @ 0x40000130
5,868,129 UART:
5,868,145 UART: Running Caliptra FMC ...
5,868,553 UART:
5,868,696 UART: [state] CFI Enabled
5,957,861 UART: [art] Extend RT PCRs Done
5,958,289 UART: [art] Lock RT PCRs Done
5,959,628 UART: [art] Populate DV Done
5,967,895 UART: [fht] FMC Alias Private Key: 7
5,968,891 UART: [art] Derive CDI
5,969,171 UART: [art] Store in in slot 0x4
6,054,908 UART: [art] Derive Key Pair
6,055,268 UART: [art] Store priv key in slot 0x5
6,068,242 UART: [art] Derive Key Pair - Done
6,082,831 UART: [art] Signing Cert with AUTHO
6,083,311 UART: RITY.KEYID = 7
6,098,551 UART: [art] Erasing AUTHORITY.KEYID = 7
6,099,316 UART: [art] PUB.X = 6F1A95BDB94EDC325C8017E79864D90E0FE4247D2E162FE77C84BFC828D566B909A434AC369F17A0CB5C709A7339BC12
6,106,085 UART: [art] PUB.Y = 9B6C668444F0FEA625C07979E53C69855A50BE916B5F246535C35EDF941C45E792F1E879816D303C2536EA01DA6AF3FE
6,113,034 UART: [art] SIG.R = E3BAB9708588A225942B699D3520C1600C8CAFF2D8225D74E697120C465780F30D213C664FB6B6E257DD439A3D03BCEC
6,119,794 UART: [art] SIG.S = A47A734FFA66843EC47CD105B118A2C828DC8B2E65F38DE0E6041AF721783395B7DFCBAEEE14C5FCCA89648C188ED3C3
6,144,045 UART: mbox::rt_entry...
6,144,417 UART: ____ _ _ _ ____ _____
6,145,201 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,146,001 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,146,769 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,147,537 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,148,305 UART: |_|
6,148,617 UART:
6,429,258 UART: [rt] Runtime listening for mailbox commands...
6,430,448 >>> mbox cmd response data (48 bytes)
6,430,449 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,433,232 >>> mbox cmd response data (48 bytes)
6,433,233 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,448,370 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,648 ready_for_fw is high
1,060,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,051 >>> mbox cmd response: success
2,688,819 UART:
2,688,835 UART: Running Caliptra FMC ...
2,689,243 UART:
2,689,386 UART: [state] CFI Enabled
2,699,739 UART: [fht] FMC Alias Private Key: 7
2,806,958 UART: [art] Extend RT PCRs Done
2,807,386 UART: [art] Lock RT PCRs Done
2,809,098 UART: [art] Populate DV Done
2,817,315 UART: [fht] FMC Alias Private Key: 7
2,818,393 UART: [art] Derive CDI
2,818,673 UART: [art] Store in in slot 0x4
2,904,564 UART: [art] Derive Key Pair
2,904,924 UART: [art] Store priv key in slot 0x5
2,918,596 UART: [art] Derive Key Pair - Done
2,933,746 UART: [art] Signing Cert with AUTHO
2,934,226 UART: RITY.KEYID = 7
2,949,060 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,825 UART: [art] PUB.X = 41B3E2E0EA02CD0420AEF579FB7300907CB090B4439C9128887901660E8BEEC2BF428FDBE932B3456EE58C8907B8B92B
2,956,564 UART: [art] PUB.Y = 11BECFBA3E022935D93ED610F29474B38BE7BB48989EB750465F1FE23E8BA37EF72E026C9D80116229BEAEB524B17666
2,963,516 UART: [art] SIG.R = A167D66A32DAEF5777B24CA3F18B0EF3706FF72E52FDA3B6079E89CCDAD19374AD114C1E642983F12D1FC5852DA06251
2,970,292 UART: [art] SIG.S = DF2174EB52EB5104327996F4E90A9569AA31F5B77D3A1E36EC906FDAF19B0067F964201879159DD0FED141E2841786F4
2,994,977 UART: Caliptra RT
2,995,322 UART: [state] CFI Enabled
3,103,232 UART: [rt] RT listening for mailbox commands...
3,103,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,940 UART: [rt]cmd =0x41544d4e, len=14344
3,536,659 >>> mbox cmd response data (8 bytes)
3,536,660 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,761 UART: [rt]cmd =0x41545348, len=116
3,588,850 >>> mbox cmd response data (12 bytes)
3,588,851 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,564,350 >>> mbox cmd response: success
5,564,350 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,578,070 UART:
5,578,086 UART: Running Caliptra FMC ...
5,578,494 UART:
5,578,637 UART: [state] CFI Enabled
5,667,650 UART: [art] Extend RT PCRs Done
5,668,078 UART: [art] Lock RT PCRs Done
5,669,325 UART: [art] Populate DV Done
5,677,902 UART: [fht] FMC Alias Private Key: 7
5,678,880 UART: [art] Derive CDI
5,679,160 UART: [art] Store in in slot 0x4
5,765,269 UART: [art] Derive Key Pair
5,765,629 UART: [art] Store priv key in slot 0x5
5,779,137 UART: [art] Derive Key Pair - Done
5,793,831 UART: [art] Signing Cert with AUTHO
5,794,311 UART: RITY.KEYID = 7
5,809,775 UART: [art] Erasing AUTHORITY.KEYID = 7
5,810,540 UART: [art] PUB.X = C474A8CD21CD7347676AC1ADD1B0010CB858E403BF80E6964E7DFB0204A4BC794AC1A77C11F53709CA078C2C57F73C9A
5,817,301 UART: [art] PUB.Y = 14BD734AB5EFFE4EE7A536801F4F2D2E201A084B4D376629B3A540DB10A4B609A169D1795CD2DF050998A7A4C473C554
5,824,245 UART: [art] SIG.R = F59DD4069025269AAA845993F607D67AECB1E8999544ACDAF614FD0F00392CDB1EDF64029E30238212A4DE6F375BEE55
5,830,989 UART: [art] SIG.S = 0D3DEE521C6460EFD4A462BCF05D72E75DE9D156519B27C181361FC162AAF47109653051AD77DC184DC6F12D5487C041
5,854,706 UART: mbox::rt_entry...
5,855,078 UART: ____ _ _ _ ____ _____
5,855,862 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,856,662 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,857,430 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,858,198 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,858,966 UART: |_|
5,859,278 UART:
6,139,476 UART: [rt] Runtime listening for mailbox commands...
6,140,666 >>> mbox cmd response data (48 bytes)
6,140,667 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,143,450 >>> mbox cmd response data (48 bytes)
6,143,451 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,158,588 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,103 UART: [kat] ++
895,255 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
903,866 UART: [kat] SHA2-512-ACC
905,767 UART: [kat] ECC-384
915,556 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,419 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,345 UART: [idev] ++
1,172,513 UART: [idev] CDI.KEYID = 6
1,172,874 UART: [idev] SUBJECT.KEYID = 7
1,173,299 UART: [idev] UDS.KEYID = 0
1,173,645 ready_for_fw is high
1,173,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,887 UART: [idev] Erasing UDS.KEYID = 0
1,197,803 UART: [idev] Sha1 KeyId Algorithm
1,206,849 UART: [idev] --
1,207,926 UART: [ldev] ++
1,208,094 UART: [ldev] CDI.KEYID = 6
1,208,458 UART: [ldev] SUBJECT.KEYID = 5
1,208,885 UART: [ldev] AUTHORITY.KEYID = 7
1,209,348 UART: [ldev] FE.KEYID = 1
1,214,138 UART: [ldev] Erasing FE.KEYID = 1
1,240,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,696 UART: [ldev] --
1,280,054 UART: [fwproc] Wait for Commands...
1,280,651 UART: [fwproc] Recv command 0x46574c44
1,281,384 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,983 >>> mbox cmd response: success
2,770,160 UART: [afmc] ++
2,770,328 UART: [afmc] CDI.KEYID = 6
2,770,691 UART: [afmc] SUBJECT.KEYID = 7
2,771,117 UART: [afmc] AUTHORITY.KEYID = 5
2,806,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,071 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,797 UART: [afmc] --
2,849,777 UART: [cold-reset] --
2,850,737 UART: [state] Locking Datavault
2,851,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,512 UART: [state] Locking ICCM
2,853,150 UART: [exit] Launching FMC @ 0x40000130
2,858,479 UART:
2,858,495 UART: Running Caliptra FMC ...
2,858,903 UART:
2,858,957 UART: [state] CFI Enabled
2,869,524 UART: [fht] FMC Alias Private Key: 7
2,976,601 UART: [art] Extend RT PCRs Done
2,977,029 UART: [art] Lock RT PCRs Done
2,978,731 UART: [art] Populate DV Done
2,986,916 UART: [fht] FMC Alias Private Key: 7
2,988,086 UART: [art] Derive CDI
2,988,366 UART: [art] Store in in slot 0x4
3,073,969 UART: [art] Derive Key Pair
3,074,329 UART: [art] Store priv key in slot 0x5
3,087,057 UART: [art] Derive Key Pair - Done
3,101,700 UART: [art] Signing Cert with AUTHO
3,102,180 UART: RITY.KEYID = 7
3,117,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,923 UART: [art] PUB.X = 81DEB236494DFFE62CC123532982C208DD8B86B4BADF8773510D25CD6E9F0029D9CAC4C4CAED2F50A953C8E4D09FD36C
3,124,683 UART: [art] PUB.Y = C9376C0FA14F86268E2D24A994D2B753C9DA6AA2895E909070A7C054C2053FC3F68AB87D5CAA5D49801A91350E98916F
3,131,626 UART: [art] SIG.R = 5F4848F49C52D04DF8B70B882F8F309D4883CB3CA7AA9EB1C33646C47208720C2CAF38CB8C8DF8E1FA93B4EE38372F44
3,138,399 UART: [art] SIG.S = 723D6ED43A1271C3EF76689DF2C964481343BBF95FCF25DE8962298FF1566017B466743F7AA830F16D885834109FE1A0
3,162,516 UART: Caliptra RT
3,162,769 UART: [state] CFI Enabled
3,270,278 UART: [rt] RT listening for mailbox commands...
3,270,948 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,038 UART: [rt]cmd =0x41544d4e, len=14344
3,704,205 >>> mbox cmd response data (8 bytes)
3,704,206 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,299 UART: [rt]cmd =0x41545348, len=116
3,756,344 >>> mbox cmd response data (12 bytes)
3,756,345 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,026 UART:
3,757,042 UART: Running Caliptra ROM ...
3,757,450 UART:
3,757,505 UART: [state] CFI Enabled
3,759,961 UART: [state] LifecycleState = Unprovisioned
3,760,616 UART: [state] DebugLocked = No
3,761,182 UART: [state] WD Timer not started. Device not locked for debugging
3,762,534 UART: [kat] SHA2-256
4,566,084 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,570,213 UART: [kat] ++
4,570,365 UART: [kat] sha1
4,574,673 UART: [kat] SHA2-256
4,576,613 UART: [kat] SHA2-384
4,579,386 UART: [kat] SHA2-512-ACC
4,581,286 UART: [kat] ECC-384
4,590,905 UART: [kat] HMAC-384Kdf
4,595,303 UART: [kat] LMS
4,843,615 UART: [kat] --
4,844,405 UART: [update-reset] ++
5,746,194 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,747,327 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,843,451 >>> mbox cmd response: success
5,843,451 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,843,784 UART: [update-reset] Copying MAN_2 To MAN_1
5,851,798 UART: [update-reset Success] --
5,852,665 UART: [state] Locking Datavault
5,853,409 UART: [state] Locking PCR0, PCR1 and PCR31
5,854,013 UART: [state] Locking ICCM
5,854,593 UART: [exit] Launching FMC @ 0x40000130
5,859,922 UART:
5,859,938 UART: Running Caliptra FMC ...
5,860,346 UART:
5,860,400 UART: [state] CFI Enabled
5,949,131 UART: [art] Extend RT PCRs Done
5,949,559 UART: [art] Lock RT PCRs Done
5,951,002 UART: [art] Populate DV Done
5,959,181 UART: [fht] FMC Alias Private Key: 7
5,960,333 UART: [art] Derive CDI
5,960,613 UART: [art] Store in in slot 0x4
6,046,384 UART: [art] Derive Key Pair
6,046,744 UART: [art] Store priv key in slot 0x5
6,059,778 UART: [art] Derive Key Pair - Done
6,074,509 UART: [art] Signing Cert with AUTHO
6,074,989 UART: RITY.KEYID = 7
6,090,289 UART: [art] Erasing AUTHORITY.KEYID = 7
6,091,054 UART: [art] PUB.X = 5814C3F7CDAEFFAEBCCEA41C05E56CA4AC7555D3C89998984617F786B246978147B130E5900B3D4CB5D961A81736FA99
6,097,826 UART: [art] PUB.Y = 15F5552EBDE60815066969D4E1D1824D303D4D5A82B5B336637C1BA01A409CE76C9F03FCEB509817D50EE132D08BF418
6,104,766 UART: [art] SIG.R = CFE053219AEF8877653A653427BF7C691344854CF78405F7822E2DC82FBC444443459E96DD68D67CE0A17F4D1B7B4980
6,111,531 UART: [art] SIG.S = 606542685176F239F4D8BFF50F251CBADE2E1DC487E7FF0895C686754CEDF6CB473814CB4BFB36A41B97C47BCBAA4AB2
6,135,396 UART: mbox::rt_entry...
6,135,768 UART: ____ _ _ _ ____ _____
6,136,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,137,352 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,138,120 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,138,888 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,139,656 UART: |_|
6,139,968 UART:
6,420,938 UART: [rt] Runtime listening for mailbox commands...
6,422,128 >>> mbox cmd response data (48 bytes)
6,422,129 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,424,912 >>> mbox cmd response data (48 bytes)
6,424,913 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,440,050 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,654 ready_for_fw is high
1,055,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,359 >>> mbox cmd response: success
2,681,315 UART:
2,681,331 UART: Running Caliptra FMC ...
2,681,739 UART:
2,681,793 UART: [state] CFI Enabled
2,692,186 UART: [fht] FMC Alias Private Key: 7
2,800,547 UART: [art] Extend RT PCRs Done
2,800,975 UART: [art] Lock RT PCRs Done
2,802,499 UART: [art] Populate DV Done
2,810,612 UART: [fht] FMC Alias Private Key: 7
2,811,730 UART: [art] Derive CDI
2,812,010 UART: [art] Store in in slot 0x4
2,897,971 UART: [art] Derive Key Pair
2,898,331 UART: [art] Store priv key in slot 0x5
2,911,861 UART: [art] Derive Key Pair - Done
2,926,756 UART: [art] Signing Cert with AUTHO
2,927,236 UART: RITY.KEYID = 7
2,942,248 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,013 UART: [art] PUB.X = 60195C0058E9F3A2BE22592FF61217ECF5DFAE59A36063E0E5FCE9D075FCCFD290465FB964CF1F1AA77C017EBFDC4A29
2,949,778 UART: [art] PUB.Y = 06CE54DDF5A12C5445B418DEF0D35A94C222B84F149A12668CDE90DB3AEFF9B25F8B3B545D4D872B2D269BAD15A3E2A3
2,956,743 UART: [art] SIG.R = 603FD2574677EACF53BE1EE9C9EF847F6E5197FC7ED1AFBDB944E9A84C55700A047C2FA80195ACD7F4BB64B4667958E4
2,963,520 UART: [art] SIG.S = 2B6845C744A7C4B51A87CAD1ED8687EFA911BE9E063130DDC74A0AE6DFEB71987590DF05FA6BB1F7EEC2EA699683286F
2,987,570 UART: Caliptra RT
2,987,823 UART: [state] CFI Enabled
3,095,494 UART: [rt] RT listening for mailbox commands...
3,096,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,116 UART: [rt]cmd =0x41544d4e, len=14344
3,528,453 >>> mbox cmd response data (8 bytes)
3,528,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,425 UART: [rt]cmd =0x41545348, len=116
3,579,948 >>> mbox cmd response data (12 bytes)
3,579,949 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,548,312 >>> mbox cmd response: success
5,548,312 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,561,500 UART:
5,561,516 UART: Running Caliptra FMC ...
5,561,924 UART:
5,561,978 UART: [state] CFI Enabled
5,650,831 UART: [art] Extend RT PCRs Done
5,651,259 UART: [art] Lock RT PCRs Done
5,652,522 UART: [art] Populate DV Done
5,660,769 UART: [fht] FMC Alias Private Key: 7
5,661,841 UART: [art] Derive CDI
5,662,121 UART: [art] Store in in slot 0x4
5,747,922 UART: [art] Derive Key Pair
5,748,282 UART: [art] Store priv key in slot 0x5
5,761,524 UART: [art] Derive Key Pair - Done
5,776,280 UART: [art] Signing Cert with AUTHO
5,776,760 UART: RITY.KEYID = 7
5,791,774 UART: [art] Erasing AUTHORITY.KEYID = 7
5,792,539 UART: [art] PUB.X = F596E1E40463562C3FDA79560B6444D59F1D78CDC68A9DE29E0A32EB1B266CFFD0FD775B88D90E3F536F120D2C7AA1EE
5,799,310 UART: [art] PUB.Y = 25DCEE9CD940371365D8F63B5CE5B656AB6CE0878F58C03C484DE831F1E4753F7D59B2381D1889DE88A68C250B3ACD41
5,806,265 UART: [art] SIG.R = 6ECA3D252B565E4A57A404EC352A9F7821DBE0677955C32B8E0222897009388B9E28D62200FACFB90E35B0F3288775A6
5,812,999 UART: [art] SIG.S = 2312BFCCE8FEA8FCFE46237DC1354444B87A5A66574B80CF2FAF8C8088BB07FE2C80DFA675B3210D43C5B01CAC68DB2E
5,836,706 UART: mbox::rt_entry...
5,837,078 UART: ____ _ _ _ ____ _____
5,837,862 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,838,662 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,839,430 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,840,198 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,840,966 UART: |_|
5,841,278 UART:
6,120,900 UART: [rt] Runtime listening for mailbox commands...
6,122,090 >>> mbox cmd response data (48 bytes)
6,122,091 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,124,874 >>> mbox cmd response data (48 bytes)
6,124,875 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,140,012 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,262 UART: [kat] SHA2-256
902,202 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,174,228 ready_for_fw is high
1,174,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,930 UART: [idev] Erasing UDS.KEYID = 0
1,198,950 UART: [idev] Sha1 KeyId Algorithm
1,207,710 UART: [idev] --
1,208,875 UART: [ldev] ++
1,209,043 UART: [ldev] CDI.KEYID = 6
1,209,407 UART: [ldev] SUBJECT.KEYID = 5
1,209,834 UART: [ldev] AUTHORITY.KEYID = 7
1,210,297 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,075 UART: [fwproc] Wait for Commands...
1,282,660 UART: [fwproc] Recv command 0x46574c44
1,283,393 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,588 >>> mbox cmd response: success
2,772,715 UART: [afmc] ++
2,772,883 UART: [afmc] CDI.KEYID = 6
2,773,246 UART: [afmc] SUBJECT.KEYID = 7
2,773,672 UART: [afmc] AUTHORITY.KEYID = 5
2,809,403 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,681 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,378 UART: [afmc] --
2,852,388 UART: [cold-reset] --
2,853,202 UART: [state] Locking Datavault
2,854,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,045 UART: [state] Locking ICCM
2,855,691 UART: [exit] Launching FMC @ 0x40000130
2,861,020 UART:
2,861,036 UART: Running Caliptra FMC ...
2,861,444 UART:
2,861,587 UART: [state] CFI Enabled
2,871,932 UART: [fht] FMC Alias Private Key: 7
2,979,431 UART: [art] Extend RT PCRs Done
2,979,859 UART: [art] Lock RT PCRs Done
2,981,423 UART: [art] Populate DV Done
2,989,838 UART: [fht] FMC Alias Private Key: 7
2,990,936 UART: [art] Derive CDI
2,991,216 UART: [art] Store in in slot 0x4
3,076,847 UART: [art] Derive Key Pair
3,077,207 UART: [art] Store priv key in slot 0x5
3,090,023 UART: [art] Derive Key Pair - Done
3,105,050 UART: [art] Signing Cert with AUTHO
3,105,530 UART: RITY.KEYID = 7
3,120,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,511 UART: [art] PUB.X = 1BEE50E83C15FAFEA43AAF84F48DCEB3CC6AC017EAADB3712EA950AD10496A608F95F294EDA63CBD793FC8868A59B0B7
3,128,309 UART: [art] PUB.Y = 510E55F62435633CC34DB677015B97307230CA6DF935089F53EA27ED095B13AC36FEECB406500CFE2F71481383D36CA9
3,135,241 UART: [art] SIG.R = 7DB70293275F370D0495CD11A388C8A8EEBFF0B6A12A7DD780C01505435F387B2D6B3A986604A213623EACD0C1777F60
3,141,998 UART: [art] SIG.S = 8AAAB875EA72F66306F45F30352D0E155162BCE8EEF767AB774DE07AAEB2DE09241D3393A6361D18D8DA07C31FC12D77
3,165,539 UART: Caliptra RT
3,165,884 UART: [state] CFI Enabled
3,272,789 UART: [rt] RT listening for mailbox commands...
3,273,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,861 UART: [rt]cmd =0x41544d4e, len=14344
3,706,132 >>> mbox cmd response data (8 bytes)
3,706,133 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,156 UART: [rt]cmd =0x41545348, len=116
3,758,335 >>> mbox cmd response data (12 bytes)
3,758,336 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,109 UART:
3,759,125 UART: Running Caliptra ROM ...
3,759,533 UART:
3,759,675 UART: [state] CFI Enabled
3,762,631 UART: [state] LifecycleState = Unprovisioned
3,763,286 UART: [state] DebugLocked = No
3,763,804 UART: [state] WD Timer not started. Device not locked for debugging
3,765,124 UART: [kat] SHA2-256
4,568,674 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,572,803 UART: [kat] ++
4,572,955 UART: [kat] sha1
4,577,335 UART: [kat] SHA2-256
4,579,275 UART: [kat] SHA2-384
4,581,996 UART: [kat] SHA2-512-ACC
4,583,896 UART: [kat] ECC-384
4,593,597 UART: [kat] HMAC-384Kdf
4,598,165 UART: [kat] LMS
4,846,477 UART: [kat] --
4,847,491 UART: [update-reset] ++
5,748,962 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,749,971 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,846,095 >>> mbox cmd response: success
5,846,095 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,846,296 UART: [update-reset] Copying MAN_2 To MAN_1
5,854,310 UART: [update-reset Success] --
5,855,411 UART: [state] Locking Datavault
5,856,121 UART: [state] Locking PCR0, PCR1 and PCR31
5,856,725 UART: [state] Locking ICCM
5,857,315 UART: [exit] Launching FMC @ 0x40000130
5,862,644 UART:
5,862,660 UART: Running Caliptra FMC ...
5,863,068 UART:
5,863,211 UART: [state] CFI Enabled
5,952,172 UART: [art] Extend RT PCRs Done
5,952,600 UART: [art] Lock RT PCRs Done
5,953,895 UART: [art] Populate DV Done
5,962,066 UART: [fht] FMC Alias Private Key: 7
5,963,220 UART: [art] Derive CDI
5,963,500 UART: [art] Store in in slot 0x4
6,048,993 UART: [art] Derive Key Pair
6,049,353 UART: [art] Store priv key in slot 0x5
6,062,757 UART: [art] Derive Key Pair - Done
6,077,638 UART: [art] Signing Cert with AUTHO
6,078,118 UART: RITY.KEYID = 7
6,093,650 UART: [art] Erasing AUTHORITY.KEYID = 7
6,094,415 UART: [art] PUB.X = B0B19D24083D382B045F99EF97BD0023AD2FC632757BC5F74EB8244A10494B3A1DB555409C7C46882FE63D976250462D
6,101,155 UART: [art] PUB.Y = 044D9548F3AA56CF2FB3D0C1112E23E3D47D0E8DB6C2892FBA3136F32BBE21338E538D588451402B4B722580577E2076
6,108,097 UART: [art] SIG.R = 52F5B4A14FFA7C9B162E4EE87FE66AC92E326EC7E5BFAD1D43D93F45E166833BCE920C7C909B870D6B8B2C7BEF2F15A8
6,114,883 UART: [art] SIG.S = 8B5F980D595EDE8375647F35351FE26163D4B15E74BB78B3D25CAEFF2BA48DD8DE22DEBF321F8ACEA256EADC8B76A605
6,138,458 UART: mbox::rt_entry...
6,138,830 UART: ____ _ _ _ ____ _____
6,139,614 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,140,414 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,141,182 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,141,950 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,142,718 UART: |_|
6,143,030 UART:
6,423,490 UART: [rt] Runtime listening for mailbox commands...
6,424,680 >>> mbox cmd response data (48 bytes)
6,424,681 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,427,464 >>> mbox cmd response data (48 bytes)
6,427,465 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,442,602 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,861 ready_for_fw is high
1,056,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,982 >>> mbox cmd response: success
2,684,260 UART:
2,684,276 UART: Running Caliptra FMC ...
2,684,684 UART:
2,684,827 UART: [state] CFI Enabled
2,695,476 UART: [fht] FMC Alias Private Key: 7
2,803,755 UART: [art] Extend RT PCRs Done
2,804,183 UART: [art] Lock RT PCRs Done
2,805,593 UART: [art] Populate DV Done
2,813,844 UART: [fht] FMC Alias Private Key: 7
2,814,912 UART: [art] Derive CDI
2,815,192 UART: [art] Store in in slot 0x4
2,900,735 UART: [art] Derive Key Pair
2,901,095 UART: [art] Store priv key in slot 0x5
2,914,765 UART: [art] Derive Key Pair - Done
2,929,516 UART: [art] Signing Cert with AUTHO
2,929,996 UART: RITY.KEYID = 7
2,944,968 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,733 UART: [art] PUB.X = C494D0C40413660C782983168ECBF878CA172F1B9953AAEA680C4E9F9D36CF909DB6620DEDBC28034B14327515F34492
2,952,488 UART: [art] PUB.Y = 15D4D29B77BCF81A3581AF7EE87009772EC9C28722C4525F6185715A043B2AE53E82D7F9A2C27D3CF387D17913D7B7F1
2,959,434 UART: [art] SIG.R = 96DC5731487790AA3C9A8F16E61AF8A97EA87C73FF1838B12E8E5D15F9F35CCE1165293E1EAA7644B444CB772B4AD543
2,966,212 UART: [art] SIG.S = CF9BDBCCE09DEB93FE7D6A26CA88554F867277D426C0103CCDB3E17540001BC834ECF2EA67CDF5AF89A91D26DC61A221
2,989,963 UART: Caliptra RT
2,990,308 UART: [state] CFI Enabled
3,097,214 UART: [rt] RT listening for mailbox commands...
3,097,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,928 UART: [rt]cmd =0x41544d4e, len=14344
3,530,945 >>> mbox cmd response data (8 bytes)
3,530,946 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,311 UART: [rt]cmd =0x41545348, len=116
3,583,256 >>> mbox cmd response data (12 bytes)
3,583,257 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,552,499 >>> mbox cmd response: success
5,552,499 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,565,801 UART:
5,565,817 UART: Running Caliptra FMC ...
5,566,225 UART:
5,566,368 UART: [state] CFI Enabled
5,655,031 UART: [art] Extend RT PCRs Done
5,655,459 UART: [art] Lock RT PCRs Done
5,656,492 UART: [art] Populate DV Done
5,664,855 UART: [fht] FMC Alias Private Key: 7
5,666,003 UART: [art] Derive CDI
5,666,283 UART: [art] Store in in slot 0x4
5,752,040 UART: [art] Derive Key Pair
5,752,400 UART: [art] Store priv key in slot 0x5
5,765,658 UART: [art] Derive Key Pair - Done
5,780,350 UART: [art] Signing Cert with AUTHO
5,780,830 UART: RITY.KEYID = 7
5,796,062 UART: [art] Erasing AUTHORITY.KEYID = 7
5,796,827 UART: [art] PUB.X = 2BAC03DC51A95547D408E6ECB10B4D6CCE6E71AF2F4862B27E240BDC181DE7D6120183234EB83F830584899E95BD7467
5,803,585 UART: [art] PUB.Y = C42103D07656C53A7F9553D92784B1D2E3E891E1F12EA287E046EB58ADA047C9BC030B7EFBE11949B42EDA1648CC314A
5,810,534 UART: [art] SIG.R = 38FA481932B0E724CDCC7932DED7917ECBA2F35FFAC9DA1EB29C977F3D6F246F53DD6971279431C8B4878CAAE4721E66
5,817,318 UART: [art] SIG.S = 6F053327A71D3CE478BC8E73FBA3291F54FED7482E377EA5AB8F098003432E7A57795DFB9A74AAF025A97528CDEF7968
5,841,200 UART: mbox::rt_entry...
5,841,572 UART: ____ _ _ _ ____ _____
5,842,356 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,843,156 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,843,924 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,844,692 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,845,460 UART: |_|
5,845,772 UART:
6,123,754 UART: [rt] Runtime listening for mailbox commands...
6,124,944 >>> mbox cmd response data (48 bytes)
6,124,945 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,127,728 >>> mbox cmd response data (48 bytes)
6,127,729 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,142,866 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,074 UART:
192,460 UART: Running Caliptra ROM ...
193,573 UART:
193,718 UART: [state] CFI Enabled
262,297 UART: [state] LifecycleState = Unprovisioned
264,234 UART: [state] DebugLocked = No
266,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,428 UART: [kat] SHA2-256
441,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,630 UART: [kat] ++
452,095 UART: [kat] sha1
463,962 UART: [kat] SHA2-256
466,612 UART: [kat] SHA2-384
473,160 UART: [kat] SHA2-512-ACC
475,518 UART: [kat] ECC-384
2,766,127 UART: [kat] HMAC-384Kdf
2,778,290 UART: [kat] LMS
3,968,557 UART: [kat] --
3,974,337 UART: [cold-reset] ++
3,975,410 UART: [fht] Storing FHT @ 0x50003400
3,986,809 UART: [idev] ++
3,987,362 UART: [idev] CDI.KEYID = 6
3,988,350 UART: [idev] SUBJECT.KEYID = 7
3,989,513 UART: [idev] UDS.KEYID = 0
3,990,596 ready_for_fw is high
3,990,820 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,117 UART: [idev] Erasing UDS.KEYID = 0
7,324,749 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,410 UART: [idev] --
7,350,345 UART: [ldev] ++
7,350,903 UART: [ldev] CDI.KEYID = 6
7,351,862 UART: [ldev] SUBJECT.KEYID = 5
7,353,063 UART: [ldev] AUTHORITY.KEYID = 7
7,354,346 UART: [ldev] FE.KEYID = 1
7,404,047 UART: [ldev] Erasing FE.KEYID = 1
10,736,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,540 UART: [ldev] --
13,119,991 UART: [fwproc] Waiting for Commands...
13,122,260 UART: [fwproc] Received command 0x46574c44
13,124,431 UART: [fwproc] Received Image of size 113844 bytes
17,173,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,382 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,229 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,368 >>> mbox cmd response: success
17,638,233 UART: [afmc] ++
17,638,835 UART: [afmc] CDI.KEYID = 6
17,639,745 UART: [afmc] SUBJECT.KEYID = 7
17,641,004 UART: [afmc] AUTHORITY.KEYID = 5
21,011,126 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,315,086 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,329,495 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,344,370 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,358,748 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,641 UART: [afmc] --
23,382,665 UART: [cold-reset] --
23,386,735 UART: [state] Locking Datavault
23,392,370 UART: [state] Locking PCR0, PCR1 and PCR31
23,394,162 UART: [state] Locking ICCM
23,396,290 UART: [exit] Launching FMC @ 0x40000130
23,404,677 UART:
23,404,906 UART: Running Caliptra FMC ...
23,405,999 UART:
23,406,151 UART: [state] CFI Enabled
23,473,462 UART: [fht] FMC Alias Private Key: 7
25,811,185 UART: [art] Extend RT PCRs Done
25,812,410 UART: [art] Lock RT PCRs Done
25,814,083 UART: [art] Populate DV Done
25,819,704 UART: [fht] FMC Alias Private Key: 7
25,821,237 UART: [art] Derive CDI
25,822,062 UART: [art] Store in in slot 0x4
25,881,691 UART: [art] Derive Key Pair
25,882,720 UART: [art] Store priv key in slot 0x5
29,175,077 UART: [art] Derive Key Pair - Done
29,188,088 UART: [art] Signing Cert with AUTHO
29,189,380 UART: RITY.KEYID = 7
31,476,827 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,328 UART: [art] PUB.X = 808220B827DE44F2F943C3D67EB0DEDCFA4C095CC90D10C269532DB8B01F5B3005AE08705562598CC4174D8C4803AD26
31,485,595 UART: [art] PUB.Y = 44FA97048DC0A7D827D2D787EC8C37BB4EAF5839D760DEF37C2B29AB4867693603D439D309C07B74C62541EE75D9ADC5
31,492,849 UART: [art] SIG.R = 8C5D47D42227AEB823BA2A70CBBAFC3CF5D87AEC40AC46FDD1EDFE445B4E775DA4EF417BE6B8E292FE531113B2800372
31,500,255 UART: [art] SIG.S = B764DC6AB4EC0116762F62B41EF704E6DB6B80318241EB080E044292871233EF12BF1EAB76F037599CFA8C730912D72A
32,805,431 UART: Caliptra RT
32,806,144 UART: [state] CFI Enabled
32,966,785 UART: [rt] RT listening for mailbox commands...
37,003,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,158,957 UART: [rt]cmd =0x41544d4e, len=14344
42,459,819 >>> mbox cmd response data (8 bytes)
42,460,498 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,491,086 UART: [rt]cmd =0x41545348, len=116
42,510,058 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,787,534 ready_for_fw is high
3,788,135 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,872,904 >>> mbox cmd response: success
23,563,113 UART:
23,563,503 UART: Running Caliptra FMC ...
23,564,644 UART:
23,564,797 UART: [state] CFI Enabled
23,632,099 UART: [fht] FMC Alias Private Key: 7
25,970,187 UART: [art] Extend RT PCRs Done
25,971,419 UART: [art] Lock RT PCRs Done
25,973,063 UART: [art] Populate DV Done
25,978,473 UART: [fht] FMC Alias Private Key: 7
25,980,022 UART: [art] Derive CDI
25,980,838 UART: [art] Store in in slot 0x4
26,039,986 UART: [art] Derive Key Pair
26,041,033 UART: [art] Store priv key in slot 0x5
29,334,014 UART: [art] Derive Key Pair - Done
29,347,014 UART: [art] Signing Cert with AUTHO
29,348,311 UART: RITY.KEYID = 7
31,634,393 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,904 UART: [art] PUB.X = 21F9A28F525150A64F6E9B2FA2304B6C94D61CA0FD54561708322365577DA1F40564B3B72A98430B5CA2505DAC557872
31,643,096 UART: [art] PUB.Y = A0325AF66E44790EAF01B13B07470142686B5E5ECF5EFD34ACDDAC8D92E4E9493CCEE9D3EB664CDCB637C05333313EF8
31,650,402 UART: [art] SIG.R = 0D373E31B1613AA063152112F54BCFD56C65821912394E9E764947215E3AEA9CED8831051B9C023D72738E552A8D1C20
31,657,747 UART: [art] SIG.S = 6BA774895A7BDD665E19EEF2CB2F11B2298F9464B62E0C6D79146073BD1CDAAF030286DBF637C1FFB211F137E412A50C
32,963,134 UART: Caliptra RT
32,963,830 UART: [state] CFI Enabled
33,124,467 UART: [rt] RT listening for mailbox commands...
37,150,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,306,184 UART: [rt]cmd =0x41544d4e, len=14344
42,606,974 >>> mbox cmd response data (8 bytes)
42,607,648 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,638,605 UART: [rt]cmd =0x41545348, len=116
42,658,597 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,530 UART:
192,881 UART: Running Caliptra ROM ...
194,069 UART:
603,585 UART: [state] CFI Enabled
618,840 UART: [state] LifecycleState = Unprovisioned
620,743 UART: [state] DebugLocked = No
623,269 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,198 UART: [kat] SHA2-256
797,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,429 UART: [kat] ++
808,902 UART: [kat] sha1
820,061 UART: [kat] SHA2-256
822,790 UART: [kat] SHA2-384
828,707 UART: [kat] SHA2-512-ACC
831,029 UART: [kat] ECC-384
3,113,867 UART: [kat] HMAC-384Kdf
3,125,297 UART: [kat] LMS
4,315,385 UART: [kat] --
4,318,707 UART: [cold-reset] ++
4,320,874 UART: [fht] Storing FHT @ 0x50003400
4,332,918 UART: [idev] ++
4,333,501 UART: [idev] CDI.KEYID = 6
4,334,391 UART: [idev] SUBJECT.KEYID = 7
4,335,704 UART: [idev] UDS.KEYID = 0
4,336,784 ready_for_fw is high
4,336,998 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,023 UART: [idev] Erasing UDS.KEYID = 0
7,624,508 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,778 UART: [idev] --
7,648,262 UART: [ldev] ++
7,648,854 UART: [ldev] CDI.KEYID = 6
7,649,785 UART: [ldev] SUBJECT.KEYID = 5
7,650,996 UART: [ldev] AUTHORITY.KEYID = 7
7,652,228 UART: [ldev] FE.KEYID = 1
7,664,439 UART: [ldev] Erasing FE.KEYID = 1
10,954,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,618 UART: [ldev] --
13,315,772 UART: [fwproc] Waiting for Commands...
13,317,810 UART: [fwproc] Received command 0x46574c44
13,319,992 UART: [fwproc] Received Image of size 113844 bytes
17,372,102 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,245 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,104 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,831,534 >>> mbox cmd response: success
17,835,791 UART: [afmc] ++
17,836,398 UART: [afmc] CDI.KEYID = 6
17,837,306 UART: [afmc] SUBJECT.KEYID = 7
17,838,520 UART: [afmc] AUTHORITY.KEYID = 5
21,149,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,339 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,716 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,579 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,002 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,155 UART: [afmc] --
23,515,702 UART: [cold-reset] --
23,520,213 UART: [state] Locking Datavault
23,526,058 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,828 UART: [state] Locking ICCM
23,530,090 UART: [exit] Launching FMC @ 0x40000130
23,538,432 UART:
23,538,670 UART: Running Caliptra FMC ...
23,539,893 UART:
23,540,055 UART: [state] CFI Enabled
23,547,616 UART: [fht] FMC Alias Private Key: 7
25,879,142 UART: [art] Extend RT PCRs Done
25,880,360 UART: [art] Lock RT PCRs Done
25,882,119 UART: [art] Populate DV Done
25,887,585 UART: [fht] FMC Alias Private Key: 7
25,889,019 UART: [art] Derive CDI
25,889,762 UART: [art] Store in in slot 0x4
25,933,001 UART: [art] Derive Key Pair
25,934,044 UART: [art] Store priv key in slot 0x5
29,175,594 UART: [art] Derive Key Pair - Done
29,188,277 UART: [art] Signing Cert with AUTHO
29,189,618 UART: RITY.KEYID = 7
31,468,789 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,296 UART: [art] PUB.X = FA4C66933DCEC56B0658EAB394123E1923A7C4615E4544E375B08A4C9D9DBA4EAF98C0B6A5DC8E439907C84F5BF3F58D
31,477,558 UART: [art] PUB.Y = CBCBC6BBEC582A192C7C1F71B2B54530B4ACFA15FC35070AA830111F0D9554B0648BBF6FF9AB02AB696454594813DC57
31,484,806 UART: [art] SIG.R = 4EF52C3EB73AA2FC61AFE264440B413ADC2A8BDD0BE4A01FA77CA4C7A037FE03B523267DEE25B893C951C38FAFF5F5F0
31,492,209 UART: [art] SIG.S = 33D4FA190C32592C5808AC41C93386BF2484952BA0B1F9A04B68BCE24C2AFDFB796A60F4DAA25698365E8D6EF4588521
32,797,674 UART: Caliptra RT
32,798,381 UART: [state] CFI Enabled
32,917,232 UART: [rt] RT listening for mailbox commands...
37,089,021 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,244,792 UART: [rt]cmd =0x41544d4e, len=14344
42,545,804 >>> mbox cmd response data (8 bytes)
42,546,389 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,577,183 UART: [rt]cmd =0x41545348, len=116
42,597,428 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,121,466 ready_for_fw is high
4,122,047 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,056,723 >>> mbox cmd response: success
23,696,350 UART:
23,696,762 UART: Running Caliptra FMC ...
23,697,890 UART:
23,698,043 UART: [state] CFI Enabled
23,705,910 UART: [fht] FMC Alias Private Key: 7
26,036,177 UART: [art] Extend RT PCRs Done
26,037,401 UART: [art] Lock RT PCRs Done
26,039,242 UART: [art] Populate DV Done
26,044,498 UART: [fht] FMC Alias Private Key: 7
26,046,202 UART: [art] Derive CDI
26,046,943 UART: [art] Store in in slot 0x4
26,089,167 UART: [art] Derive Key Pair
26,090,230 UART: [art] Store priv key in slot 0x5
29,331,850 UART: [art] Derive Key Pair - Done
29,344,914 UART: [art] Signing Cert with AUTHO
29,346,214 UART: RITY.KEYID = 7
31,625,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,286 UART: [art] PUB.X = A1742ADFE7180EE54E31D845050775F1D219E6E7B50DD9B07DFB9633336DA147A9BC2501E5A0E56FE5137B1A1E8130E9
31,634,534 UART: [art] PUB.Y = D36B0509845EF3E2CF7C1BFD99B8833511AAAAC7A5266842EB2460F2EAFC35BA3553693CD67A2DEABF06971B1650AB25
31,641,785 UART: [art] SIG.R = 0F1383245D55DD9CB89B54B821A01A11BC2FDFFEC3D62BE2726C44E91060B2881D61BDD0DBECC4E2BA5DC9F90E37910F
31,649,187 UART: [art] SIG.S = AB0E9C911FE76ACAC06A4B1810B0AC9B6845465C6A01B5531AACC65D79F444BFB07E22D71963CCD8548F3E64B0A4E514
32,954,099 UART: Caliptra RT
32,954,818 UART: [state] CFI Enabled
33,072,386 UART: [rt] RT listening for mailbox commands...
37,243,968 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,400,084 UART: [rt]cmd =0x41544d4e, len=14344
42,700,521 >>> mbox cmd response data (8 bytes)
42,701,094 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,731,834 UART: [rt]cmd =0x41545348, len=116
42,751,539 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,175 UART:
192,544 UART: Running Caliptra ROM ...
193,759 UART:
193,918 UART: [state] CFI Enabled
269,063 UART: [state] LifecycleState = Unprovisioned
270,912 UART: [state] DebugLocked = No
273,005 UART: [state] WD Timer not started. Device not locked for debugging
276,930 UART: [kat] SHA2-256
456,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
467,694 UART: [kat] ++
468,144 UART: [kat] sha1
478,805 UART: [kat] SHA2-256
481,811 UART: [kat] SHA2-384
487,300 UART: [kat] SHA2-512-ACC
490,304 UART: [kat] ECC-384
2,950,263 UART: [kat] HMAC-384Kdf
2,972,020 UART: [kat] LMS
3,501,423 UART: [kat] --
3,507,611 UART: [cold-reset] ++
3,508,822 UART: [fht] FHT @ 0x50003400
3,520,160 UART: [idev] ++
3,520,721 UART: [idev] CDI.KEYID = 6
3,521,632 UART: [idev] SUBJECT.KEYID = 7
3,522,826 UART: [idev] UDS.KEYID = 0
3,523,752 ready_for_fw is high
3,523,943 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,519 UART: [idev] Erasing UDS.KEYID = 0
6,027,654 UART: [idev] Sha1 KeyId Algorithm
6,050,071 UART: [idev] --
6,054,234 UART: [ldev] ++
6,054,806 UART: [ldev] CDI.KEYID = 6
6,055,694 UART: [ldev] SUBJECT.KEYID = 5
6,056,863 UART: [ldev] AUTHORITY.KEYID = 7
6,058,152 UART: [ldev] FE.KEYID = 1
6,102,780 UART: [ldev] Erasing FE.KEYID = 1
8,606,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,649 UART: [ldev] --
10,415,866 UART: [fwproc] Wait for Commands...
10,417,530 UART: [fwproc] Recv command 0x46574c44
10,419,627 UART: [fwproc] Recv'd Img size: 114168 bytes
13,820,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,285,469 >>> mbox cmd response: success
14,289,246 UART: [afmc] ++
14,289,854 UART: [afmc] CDI.KEYID = 6
14,290,773 UART: [afmc] SUBJECT.KEYID = 7
14,291,937 UART: [afmc] AUTHORITY.KEYID = 5
16,827,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,182 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,196 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,424 UART: [afmc] --
18,629,333 UART: [cold-reset] --
18,634,766 UART: [state] Locking Datavault
18,639,150 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,800 UART: [state] Locking ICCM
18,642,309 UART: [exit] Launching FMC @ 0x40000130
18,650,709 UART:
18,650,945 UART: Running Caliptra FMC ...
18,652,042 UART:
18,652,209 UART: [state] CFI Enabled
18,713,228 UART: [fht] FMC Alias Private Key: 7
20,477,313 UART: [art] Extend RT PCRs Done
20,478,538 UART: [art] Lock RT PCRs Done
20,480,495 UART: [art] Populate DV Done
20,485,972 UART: [fht] FMC Alias Private Key: 7
20,487,514 UART: [art] Derive CDI
20,488,336 UART: [art] Store in in slot 0x4
20,545,760 UART: [art] Derive Key Pair
20,546,803 UART: [art] Store priv key in slot 0x5
23,009,502 UART: [art] Derive Key Pair - Done
23,022,992 UART: [art] Signing Cert with AUTHO
23,024,339 UART: RITY.KEYID = 7
24,735,484 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,028 UART: [art] PUB.X = 9E8F7BBF82875ABB0F4FFB9AC3B3F2295CCDD0E6D9F31E498458BE2D1F2BCE99EF20F47F3C17CF04E83824D56A3B0F20
24,744,304 UART: [art] PUB.Y = 48C750ABC024FD8F5441097FEEE34332123E69A7C74125A1FBC36592A8E4BC4244EE10B7A9351B16C40162983B1CB824
24,751,560 UART: [art] SIG.R = 9F314496032C03326AB7D20DFA1B94A2755C6BD318C46759AED5110AA2DDDEA991F853FD62ED77D4B08DC6975078FDE5
24,758,941 UART: [art] SIG.S = 90DD9BBC13CEE546B061CD7481AEFA23B2CBF37425D5066DD36621FD1ECB65205EF601804C1235C6DEB240C396243CE2
25,737,831 UART: Caliptra RT
25,738,538 UART: [state] CFI Enabled
25,903,529 UART: [rt] RT listening for mailbox commands...
29,938,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,093,497 UART: [rt]cmd =0x41544d4e, len=14344
34,089,190 >>> mbox cmd response data (8 bytes)
34,089,864 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,120,625 UART: [rt]cmd =0x41545348, len=116
34,140,399 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,356,388 ready_for_fw is high
3,356,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,041,100 >>> mbox cmd response: success
18,332,698 UART:
18,333,111 UART: Running Caliptra FMC ...
18,334,221 UART:
18,334,379 UART: [state] CFI Enabled
18,402,007 UART: [fht] FMC Alias Private Key: 7
20,166,017 UART: [art] Extend RT PCRs Done
20,167,236 UART: [art] Lock RT PCRs Done
20,168,943 UART: [art] Populate DV Done
20,174,360 UART: [fht] FMC Alias Private Key: 7
20,175,850 UART: [art] Derive CDI
20,176,617 UART: [art] Store in in slot 0x4
20,234,199 UART: [art] Derive Key Pair
20,235,242 UART: [art] Store priv key in slot 0x5
22,698,653 UART: [art] Derive Key Pair - Done
22,711,664 UART: [art] Signing Cert with AUTHO
22,712,970 UART: RITY.KEYID = 7
24,424,520 UART: [art] Erasing AUTHORITY.KEYID = 7
24,426,003 UART: [art] PUB.X = D71E66EDF61F041874ECA7AC289003E4EC7C6CA6236FAA15BB3680EB561355E1C164C810230D4B6D50158AB9A0C3733E
24,433,290 UART: [art] PUB.Y = 15B5B47F13129350A2765DB10D977B85B1A644C234CE02D5B4213B12362E6A9C6BF53219DCFC7A39982320F28F615581
24,440,545 UART: [art] SIG.R = 5760AD6C6E16A1300148BA7051E120D11CF835086C52AB2C4683FB9362DEDB558D781587817D987160CC3F23249E609E
24,447,930 UART: [art] SIG.S = 876123CDF6B59F6C77B144BE947DAE7052D12AD553705A19878017105DF347DC41B9FF5E9341725E0FB58F4E27E0E0B0
25,426,531 UART: Caliptra RT
25,427,245 UART: [state] CFI Enabled
25,593,958 UART: [rt] RT listening for mailbox commands...
29,620,086 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,775,674 UART: [rt]cmd =0x41544d4e, len=14344
33,771,118 >>> mbox cmd response data (8 bytes)
33,771,710 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,802,346 UART: [rt]cmd =0x41545348, len=116
33,821,495 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,817 writing to cptra_bootfsm_go
192,977 UART:
193,475 UART: Running Caliptra ROM ...
194,631 UART:
604,033 UART: [state] CFI Enabled
615,643 UART: [state] LifecycleState = Unprovisioned
617,523 UART: [state] DebugLocked = No
620,113 UART: [state] WD Timer not started. Device not locked for debugging
624,222 UART: [kat] SHA2-256
803,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,870 UART: [kat] ++
815,408 UART: [kat] sha1
827,069 UART: [kat] SHA2-256
830,076 UART: [kat] SHA2-384
836,701 UART: [kat] SHA2-512-ACC
839,633 UART: [kat] ECC-384
3,283,739 UART: [kat] HMAC-384Kdf
3,295,548 UART: [kat] LMS
3,825,056 UART: [kat] --
3,830,913 UART: [cold-reset] ++
3,832,065 UART: [fht] FHT @ 0x50003400
3,843,683 UART: [idev] ++
3,844,247 UART: [idev] CDI.KEYID = 6
3,845,161 UART: [idev] SUBJECT.KEYID = 7
3,846,334 UART: [idev] UDS.KEYID = 0
3,847,277 ready_for_fw is high
3,847,479 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,933 UART: [idev] Erasing UDS.KEYID = 0
6,323,676 UART: [idev] Sha1 KeyId Algorithm
6,347,118 UART: [idev] --
6,350,950 UART: [ldev] ++
6,351,519 UART: [ldev] CDI.KEYID = 6
6,352,425 UART: [ldev] SUBJECT.KEYID = 5
6,353,580 UART: [ldev] AUTHORITY.KEYID = 7
6,354,861 UART: [ldev] FE.KEYID = 1
6,364,862 UART: [ldev] Erasing FE.KEYID = 1
8,837,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,671 UART: [ldev] --
10,626,486 UART: [fwproc] Wait for Commands...
10,627,933 UART: [fwproc] Recv command 0x46574c44
10,630,025 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,118 >>> mbox cmd response: success
14,492,066 UART: [afmc] ++
14,492,665 UART: [afmc] CDI.KEYID = 6
14,493,581 UART: [afmc] SUBJECT.KEYID = 7
14,494,743 UART: [afmc] AUTHORITY.KEYID = 5
16,994,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,042 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,973 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,000 UART: [afmc] --
18,791,223 UART: [cold-reset] --
18,794,705 UART: [state] Locking Datavault
18,799,241 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,888 UART: [state] Locking ICCM
18,802,612 UART: [exit] Launching FMC @ 0x40000130
18,811,007 UART:
18,811,248 UART: Running Caliptra FMC ...
18,812,347 UART:
18,812,514 UART: [state] CFI Enabled
18,820,563 UART: [fht] FMC Alias Private Key: 7
20,577,577 UART: [art] Extend RT PCRs Done
20,578,811 UART: [art] Lock RT PCRs Done
20,580,355 UART: [art] Populate DV Done
20,585,626 UART: [fht] FMC Alias Private Key: 7
20,587,167 UART: [art] Derive CDI
20,587,898 UART: [art] Store in in slot 0x4
20,631,024 UART: [art] Derive Key Pair
20,632,063 UART: [art] Store priv key in slot 0x5
23,058,348 UART: [art] Derive Key Pair - Done
23,071,396 UART: [art] Signing Cert with AUTHO
23,072,697 UART: RITY.KEYID = 7
24,778,233 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,733 UART: [art] PUB.X = AB6C73ED1C56C598E87E05E1BEE1D22C2BF9C0CBC199E691BA50463B3BBBA972BBB4551134E57BD3903C676CC6AE4375
24,787,039 UART: [art] PUB.Y = 379012DE5B9633C58A9C6725E9B57CB10CE4D765165D0A9A0FA702AD0D0A89A5F78B9C8648FD897A59842D228B6FD40C
24,794,275 UART: [art] SIG.R = 78C6FC28838E34769220BBB5A7D3408EB79B87B79406E1AA571484610B994CE95B33246402571480914CC7653454B41A
24,801,632 UART: [art] SIG.S = 433B2798444FD5CEF0A41709A6B1F33546B799E4A8DBEF1C198934F821FFC44CD441EE1AAF6BB25E4280C03AC6A2C267
25,780,191 UART: Caliptra RT
25,780,906 UART: [state] CFI Enabled
25,898,288 UART: [rt] RT listening for mailbox commands...
29,921,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,076,422 UART: [rt]cmd =0x41544d4e, len=14344
34,072,022 >>> mbox cmd response data (8 bytes)
34,072,613 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,103,353 UART: [rt]cmd =0x41545348, len=116
34,121,815 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,477 writing to cptra_bootfsm_go
3,702,147 ready_for_fw is high
3,702,722 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,288,308 >>> mbox cmd response: success
18,530,229 UART:
18,530,688 UART: Running Caliptra FMC ...
18,531,802 UART:
18,531,957 UART: [state] CFI Enabled
18,539,796 UART: [fht] FMC Alias Private Key: 7
20,297,072 UART: [art] Extend RT PCRs Done
20,298,306 UART: [art] Lock RT PCRs Done
20,299,820 UART: [art] Populate DV Done
20,305,449 UART: [fht] FMC Alias Private Key: 7
20,307,102 UART: [art] Derive CDI
20,307,919 UART: [art] Store in in slot 0x4
20,350,579 UART: [art] Derive Key Pair
20,351,625 UART: [art] Store priv key in slot 0x5
22,778,250 UART: [art] Derive Key Pair - Done
22,790,873 UART: [art] Signing Cert with AUTHO
22,792,195 UART: RITY.KEYID = 7
24,497,748 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,252 UART: [art] PUB.X = 2B111B555C9D5968FB61835AC001F39106A0CBFCB6811A8BD2458F010972F2D6B03B2FA40E42A606018597FB7409E6D6
24,506,557 UART: [art] PUB.Y = 5B9C37564A880036B12322DD779A6D97F54A98ACFED8230EF2A3909275A912CE9D5A5A593B7E3ABD112ED2EE1C4A6D12
24,513,770 UART: [art] SIG.R = 62A23D9F39E9272FEFCF35FBB4500EC053D3953BD29D10570CBACD46B415FC2368CE7624DB07DDDE8260D85CB3938C93
24,521,168 UART: [art] SIG.S = 29B15EE1F90E6ED54A494547C4CB71C072062802F7C31DE20AB8C581DAC95A2408CBDBF42FF5A3916D51300AC9C0C165
25,500,100 UART: Caliptra RT
25,500,807 UART: [state] CFI Enabled
25,618,108 UART: [rt] RT listening for mailbox commands...
29,640,756 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,796,190 UART: [rt]cmd =0x41544d4e, len=14344
33,791,611 >>> mbox cmd response data (8 bytes)
33,792,218 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,823,172 UART: [rt]cmd =0x41545348, len=116
33,841,644 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
191,999 UART:
192,367 UART: Running Caliptra ROM ...
193,479 UART:
193,641 UART: [state] CFI Enabled
266,602 UART: [state] LifecycleState = Unprovisioned
269,035 UART: [state] DebugLocked = No
270,353 UART: [state] WD Timer not started. Device not locked for debugging
275,322 UART: [kat] SHA2-256
465,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,947 UART: [kat] ++
476,398 UART: [kat] sha1
488,055 UART: [kat] SHA2-256
491,077 UART: [kat] SHA2-384
497,644 UART: [kat] SHA2-512-ACC
500,254 UART: [kat] ECC-384
2,948,421 UART: [kat] HMAC-384Kdf
2,971,445 UART: [kat] LMS
3,503,265 UART: [kat] --
3,505,978 UART: [cold-reset] ++
3,508,573 UART: [fht] FHT @ 0x50003400
3,520,197 UART: [idev] ++
3,520,904 UART: [idev] CDI.KEYID = 6
3,521,934 UART: [idev] SUBJECT.KEYID = 7
3,523,042 UART: [idev] UDS.KEYID = 0
3,523,976 ready_for_fw is high
3,524,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,777 UART: [idev] Erasing UDS.KEYID = 0
6,026,464 UART: [idev] Sha1 KeyId Algorithm
6,049,101 UART: [idev] --
6,053,318 UART: [ldev] ++
6,054,004 UART: [ldev] CDI.KEYID = 6
6,054,925 UART: [ldev] SUBJECT.KEYID = 5
6,056,086 UART: [ldev] AUTHORITY.KEYID = 7
6,057,268 UART: [ldev] FE.KEYID = 1
6,100,862 UART: [ldev] Erasing FE.KEYID = 1
8,606,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,417 UART: [ldev] --
10,411,363 UART: [fwproc] Wait for Commands...
10,414,537 UART: [fwproc] Recv command 0x46574c44
10,416,847 UART: [fwproc] Recv'd Img size: 114168 bytes
13,860,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,619 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,596,618 >>> mbox cmd response: success
14,601,159 UART: [afmc] ++
14,601,878 UART: [afmc] CDI.KEYID = 6
14,603,130 UART: [afmc] SUBJECT.KEYID = 7
14,604,594 UART: [afmc] AUTHORITY.KEYID = 5
17,148,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,340 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,513 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,636 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,942 UART: [afmc] --
18,946,890 UART: [cold-reset] --
18,952,276 UART: [state] Locking Datavault
18,958,243 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,408 UART: [state] Locking ICCM
18,962,081 UART: [exit] Launching FMC @ 0x40000130
18,970,726 UART:
18,970,959 UART: Running Caliptra FMC ...
18,972,059 UART:
18,972,237 UART: [state] CFI Enabled
19,028,815 UART: [fht] FMC Alias Private Key: 7
20,792,890 UART: [art] Extend RT PCRs Done
20,794,110 UART: [art] Lock RT PCRs Done
20,795,686 UART: [art] Populate DV Done
20,800,935 UART: [fht] FMC Alias Private Key: 7
20,802,525 UART: [art] Derive CDI
20,803,335 UART: [art] Store in in slot 0x4
20,861,837 UART: [art] Derive Key Pair
20,862,867 UART: [art] Store priv key in slot 0x5
23,325,499 UART: [art] Derive Key Pair - Done
23,338,437 UART: [art] Signing Cert with AUTHO
23,339,742 UART: RITY.KEYID = 7
25,051,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,996 UART: [art] PUB.X = E720737FAF3BBFFC882D7A8F67BF9316E8258CF8F8A885396E3E01EFC618182E0C64E59B6D278D30F9CD28C53B11168C
25,060,274 UART: [art] PUB.Y = EF8DEFDC209AFA02D97ACA084F9F33572BA5B751A2E78E8606FDBD59298318850D842F88C851A736BDB4C0683746E30E
25,067,570 UART: [art] SIG.R = 700AAE6155B1169A24C9092335EB645AC9ED0463DC09C12F6A86C6A27250039486AC5073BE31DC65E7141C8A2842FCBE
25,074,939 UART: [art] SIG.S = B8DFFB52492E16E5B3BD181E508E1F826CA5AFCCD65B9ED1DE0A1DF599B27561839E4D0CFC859C4AAF8A1FD80D2A9337
26,053,361 UART: Caliptra RT
26,054,074 UART: [state] CFI Enabled
26,220,374 UART: [rt] RT listening for mailbox commands...
30,251,344 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,407,178 UART: [rt]cmd =0x41544d4e, len=14344
34,403,015 >>> mbox cmd response data (8 bytes)
34,403,615 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,434,417 UART: [rt]cmd =0x41545348, len=116
34,454,038 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,437,207 ready_for_fw is high
3,437,613 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,728,841 >>> mbox cmd response: success
19,024,631 UART:
19,025,030 UART: Running Caliptra FMC ...
19,026,148 UART:
19,026,327 UART: [state] CFI Enabled
19,092,405 UART: [fht] FMC Alias Private Key: 7
20,856,272 UART: [art] Extend RT PCRs Done
20,857,483 UART: [art] Lock RT PCRs Done
20,859,301 UART: [art] Populate DV Done
20,864,659 UART: [fht] FMC Alias Private Key: 7
20,866,197 UART: [art] Derive CDI
20,866,935 UART: [art] Store in in slot 0x4
20,924,843 UART: [art] Derive Key Pair
20,925,880 UART: [art] Store priv key in slot 0x5
23,388,664 UART: [art] Derive Key Pair - Done
23,401,182 UART: [art] Signing Cert with AUTHO
23,402,499 UART: RITY.KEYID = 7
25,114,102 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,595 UART: [art] PUB.X = 717F65981AAE604CBA1BF6565393334B3A16810B8B0E9FA541A644652916284E19069E024593D4A1A6B6DB24D4705EAE
25,122,832 UART: [art] PUB.Y = 21D9639BE0A8C9D1EFD46A3CBE3A46EE2682020E37A4B35DF1D7E24B6D81AAC65A4002909C6AF3A580A4E09647F82A06
25,130,109 UART: [art] SIG.R = 42C5B894E72BCB05667FA69CD071F9290B12D75063FA119E60C2C58EBEC7FF05322A892228AD04A21780239082730F77
25,137,444 UART: [art] SIG.S = D5F24137EF551B8795976C17D7DC43848342F996D9E3F9CC012DEA27A4E13323B9561CDD250D4116D9BF26386FAA7EF5
26,116,398 UART: Caliptra RT
26,117,109 UART: [state] CFI Enabled
26,281,366 UART: [rt] RT listening for mailbox commands...
30,309,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,465,669 UART: [rt]cmd =0x41544d4e, len=14344
34,461,932 >>> mbox cmd response data (8 bytes)
34,462,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,493,318 UART: [rt]cmd =0x41545348, len=116
34,512,677 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,798 writing to cptra_bootfsm_go
192,896 UART:
193,264 UART: Running Caliptra ROM ...
194,409 UART:
604,129 UART: [state] CFI Enabled
613,611 UART: [state] LifecycleState = Unprovisioned
615,986 UART: [state] DebugLocked = No
617,798 UART: [state] WD Timer not started. Device not locked for debugging
622,330 UART: [kat] SHA2-256
812,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,043 UART: [kat] ++
823,497 UART: [kat] sha1
834,102 UART: [kat] SHA2-256
837,152 UART: [kat] SHA2-384
843,170 UART: [kat] SHA2-512-ACC
845,752 UART: [kat] ECC-384
3,289,502 UART: [kat] HMAC-384Kdf
3,304,055 UART: [kat] LMS
3,835,915 UART: [kat] --
3,841,825 UART: [cold-reset] ++
3,843,470 UART: [fht] FHT @ 0x50003400
3,855,297 UART: [idev] ++
3,855,940 UART: [idev] CDI.KEYID = 6
3,856,969 UART: [idev] SUBJECT.KEYID = 7
3,858,140 UART: [idev] UDS.KEYID = 0
3,859,080 ready_for_fw is high
3,859,285 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,770 UART: [idev] Erasing UDS.KEYID = 0
6,333,717 UART: [idev] Sha1 KeyId Algorithm
6,355,212 UART: [idev] --
6,360,498 UART: [ldev] ++
6,361,188 UART: [ldev] CDI.KEYID = 6
6,362,100 UART: [ldev] SUBJECT.KEYID = 5
6,363,258 UART: [ldev] AUTHORITY.KEYID = 7
6,364,488 UART: [ldev] FE.KEYID = 1
6,374,437 UART: [ldev] Erasing FE.KEYID = 1
8,849,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,951 UART: [ldev] --
10,641,485 UART: [fwproc] Wait for Commands...
10,644,496 UART: [fwproc] Recv command 0x46574c44
10,646,798 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,603 >>> mbox cmd response: success
14,836,523 UART: [afmc] ++
14,837,253 UART: [afmc] CDI.KEYID = 6
14,838,446 UART: [afmc] SUBJECT.KEYID = 7
14,839,945 UART: [afmc] AUTHORITY.KEYID = 5
17,344,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,076 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,416 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,101 UART: [afmc] --
19,141,184 UART: [cold-reset] --
19,145,975 UART: [state] Locking Datavault
19,151,897 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,082 UART: [state] Locking ICCM
19,155,498 UART: [exit] Launching FMC @ 0x40000130
19,164,175 UART:
19,164,425 UART: Running Caliptra FMC ...
19,165,526 UART:
19,165,692 UART: [state] CFI Enabled
19,173,690 UART: [fht] FMC Alias Private Key: 7
20,930,547 UART: [art] Extend RT PCRs Done
20,931,771 UART: [art] Lock RT PCRs Done
20,932,992 UART: [art] Populate DV Done
20,938,462 UART: [fht] FMC Alias Private Key: 7
20,940,160 UART: [art] Derive CDI
20,940,897 UART: [art] Store in in slot 0x4
20,983,436 UART: [art] Derive Key Pair
20,984,433 UART: [art] Store priv key in slot 0x5
23,411,562 UART: [art] Derive Key Pair - Done
23,424,401 UART: [art] Signing Cert with AUTHO
23,425,712 UART: RITY.KEYID = 7
25,131,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,578 UART: [art] PUB.X = EEC03498EC6F096A4AAEE629879339A0D387A2E83C143091600321262477BFD830EA214341BD9E42DA17EB5A67AE4880
25,139,824 UART: [art] PUB.Y = E75CA8F9C823C2B31708C838911DC81735B2AD4DB57673F0980E8E0B1DE8B4D20983EF479A86C40AC5D67D23A95F1159
25,147,109 UART: [art] SIG.R = 0B2842876ED3979797AC1CE6BD96EBC12D703C06B6C971795CFD3ABDAD86540B8ED4574E4657224486DCAAC6B927E30F
25,154,530 UART: [art] SIG.S = 7CC9EBE598BE610CCECD9C5E3EA763E1F56A07D747A403EA203CE56CAFFDB4BF4E51A0CF970A823AF4DDB88C340D5DB9
26,133,280 UART: Caliptra RT
26,133,987 UART: [state] CFI Enabled
26,250,080 UART: [rt] RT listening for mailbox commands...
30,272,052 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,427,936 UART: [rt]cmd =0x41544d4e, len=14344
34,424,014 >>> mbox cmd response data (8 bytes)
34,424,609 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,455,567 UART: [rt]cmd =0x41545348, len=116
34,475,266 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
3,757,410 ready_for_fw is high
3,757,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,957,106 >>> mbox cmd response: success
19,212,723 UART:
19,213,112 UART: Running Caliptra FMC ...
19,214,307 UART:
19,214,493 UART: [state] CFI Enabled
19,222,669 UART: [fht] FMC Alias Private Key: 7
20,979,446 UART: [art] Extend RT PCRs Done
20,980,660 UART: [art] Lock RT PCRs Done
20,982,450 UART: [art] Populate DV Done
20,987,812 UART: [fht] FMC Alias Private Key: 7
20,989,514 UART: [art] Derive CDI
20,990,327 UART: [art] Store in in slot 0x4
21,032,707 UART: [art] Derive Key Pair
21,033,706 UART: [art] Store priv key in slot 0x5
23,460,568 UART: [art] Derive Key Pair - Done
23,473,606 UART: [art] Signing Cert with AUTHO
23,474,905 UART: RITY.KEYID = 7
25,180,436 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,934 UART: [art] PUB.X = 255AA1EFE5BEC6E5EF2AD12D5B92F13AB6AA80BD320C085AD550821FCC4F116E022DD654EBD61937F5E67BEE3391D762
25,189,237 UART: [art] PUB.Y = F4990AAEB6BC262749240724C5CB2B4D8803D707387A70D00C982581ED8DFF794BEB982639C96D2122DB165C3F70BCE2
25,196,495 UART: [art] SIG.R = 7E694947196252B103714F314A8749D8C0E5F2FE0C18FF7DE0239079FB897AFE53392D619FC9EA8BC881658511EC3BDD
25,203,892 UART: [art] SIG.S = E8DE3666F72D1FD7AB407EFD309CA1FAF9CB4E586878117BB7598D23E0BF7A0DC54B14E4125DA98417D12F8D629AD4A5
26,182,562 UART: Caliptra RT
26,183,246 UART: [state] CFI Enabled
26,301,433 UART: [rt] RT listening for mailbox commands...
30,324,168 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,480,103 UART: [rt]cmd =0x41544d4e, len=14344
34,475,664 >>> mbox cmd response data (8 bytes)
34,476,303 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,507,002 UART: [rt]cmd =0x41545348, len=116
34,526,505 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,183 UART: [kat] SHA2-256
892,121 UART: [kat] SHA2-384
894,806 UART: [kat] SHA2-512-ACC
896,707 UART: [kat] ECC-384
901,942 UART: [kat] HMAC-384Kdf
906,622 UART: [kat] LMS
1,474,818 UART: [kat] --
1,475,881 UART: [cold-reset] ++
1,476,449 UART: [fht] Storing FHT @ 0x50003400
1,479,138 UART: [idev] ++
1,479,306 UART: [idev] CDI.KEYID = 6
1,479,666 UART: [idev] SUBJECT.KEYID = 7
1,480,090 UART: [idev] UDS.KEYID = 0
1,480,435 ready_for_fw is high
1,480,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,002 UART: [idev] Erasing UDS.KEYID = 0
1,504,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,826 UART: [idev] --
1,513,781 UART: [ldev] ++
1,513,949 UART: [ldev] CDI.KEYID = 6
1,514,312 UART: [ldev] SUBJECT.KEYID = 5
1,514,738 UART: [ldev] AUTHORITY.KEYID = 7
1,515,201 UART: [ldev] FE.KEYID = 1
1,520,275 UART: [ldev] Erasing FE.KEYID = 1
1,545,932 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,618 UART: [ldev] --
1,584,879 UART: [fwproc] Waiting for Commands...
1,585,638 UART: [fwproc] Received command 0x46574c44
1,586,429 UART: [fwproc] Received Image of size 114168 bytes
2,882,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,603 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,955 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,684 >>> mbox cmd response: success
3,076,890 UART: [afmc] ++
3,077,058 UART: [afmc] CDI.KEYID = 6
3,077,420 UART: [afmc] SUBJECT.KEYID = 7
3,077,845 UART: [afmc] AUTHORITY.KEYID = 5
3,112,912 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,459 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,149 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,080 UART: [afmc] --
3,155,972 UART: [cold-reset] --
3,156,728 UART: [state] Locking Datavault
3,158,015 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,619 UART: [state] Locking ICCM
3,159,215 UART: [exit] Launching FMC @ 0x40000130
3,164,544 UART:
3,164,560 UART: Running Caliptra FMC ...
3,164,968 UART:
3,165,022 UART: [state] CFI Enabled
3,175,441 UART: [fht] FMC Alias Private Key: 7
3,283,512 UART: [art] Extend RT PCRs Done
3,283,940 UART: [art] Lock RT PCRs Done
3,285,206 UART: [art] Populate DV Done
3,293,491 UART: [fht] FMC Alias Private Key: 7
3,294,609 UART: [art] Derive CDI
3,294,889 UART: [art] Store in in slot 0x4
3,380,462 UART: [art] Derive Key Pair
3,380,822 UART: [art] Store priv key in slot 0x5
3,394,062 UART: [art] Derive Key Pair - Done
3,408,797 UART: [art] Signing Cert with AUTHO
3,409,277 UART: RITY.KEYID = 7
3,424,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,246 UART: [art] PUB.X = 0DE1879621128CFB83472B3F2C2D4361503137CD49DEE56DCD45B10536CB58837FAC483E94924887C98A9E114C06D5BB
3,432,007 UART: [art] PUB.Y = DB2779D26219A3430F41325BEDED9EA6693CBAD21C80F2EB9DC78EE32FC216DD132F6C1716B7F2704A14E24E3E0564DA
3,438,965 UART: [art] SIG.R = D5A03A9632971C0D47D49DEDB7DAAACE06F469646CE7C8B68D7BA1994F7A3CC81499229BD3148B6405F73F5FBA5688EC
3,445,740 UART: [art] SIG.S = 3D335415E3ECBD6985CDB9140626A01B55033B313BCE04F6FDF019DE6DAD863B367AEAC7DCE99B9057C401FF9ECB6DA5
3,468,557 UART: Caliptra RT
3,468,810 UART: [state] CFI Enabled
3,576,771 UART: [rt] RT listening for mailbox commands...
3,577,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,285 UART: [rt]cmd =0x41544d4e, len=14344
4,009,448 >>> mbox cmd response data (8 bytes)
4,009,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,432 UART: [rt]cmd =0x41545348, len=116
4,061,249 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,509 ready_for_fw is high
1,362,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,308 >>> mbox cmd response: success
2,986,954 UART:
2,986,970 UART: Running Caliptra FMC ...
2,987,378 UART:
2,987,432 UART: [state] CFI Enabled
2,997,853 UART: [fht] FMC Alias Private Key: 7
3,105,244 UART: [art] Extend RT PCRs Done
3,105,672 UART: [art] Lock RT PCRs Done
3,107,574 UART: [art] Populate DV Done
3,115,723 UART: [fht] FMC Alias Private Key: 7
3,116,803 UART: [art] Derive CDI
3,117,083 UART: [art] Store in in slot 0x4
3,202,294 UART: [art] Derive Key Pair
3,202,654 UART: [art] Store priv key in slot 0x5
3,216,124 UART: [art] Derive Key Pair - Done
3,231,057 UART: [art] Signing Cert with AUTHO
3,231,537 UART: RITY.KEYID = 7
3,246,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,258 UART: [art] PUB.X = 77977F96379F0BE44141355C0912791589A34B425ADBF83A3370C1FB005C7F44947C3619196B96F2DA8C4F2818EE75DF
3,253,994 UART: [art] PUB.Y = 695774DE6DE4B2CBBC08E4E664D4DC41F38382D09704E418401E3FD433BBAE003D5C9CDCE6B26143A52D8024DA7714DE
3,260,928 UART: [art] SIG.R = 03279B3EE83956D1C8561730FF805E0F1C7724EBBCA124F5DBD5B349BCFD96DF1202FB2D93C73D62FFF6C46AC235E075
3,267,703 UART: [art] SIG.S = E97EC3D8AC04102C6927EC6A251C6EB9B26D2B6050E9E7ABFAF783896D331BF7EE9009658051CCAD034D36B9100446CC
3,291,516 UART: Caliptra RT
3,291,769 UART: [state] CFI Enabled
3,400,534 UART: [rt] RT listening for mailbox commands...
3,401,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,330 UART: [rt]cmd =0x41544d4e, len=14344
3,834,325 >>> mbox cmd response data (8 bytes)
3,834,326 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,451 UART: [rt]cmd =0x41545348, len=116
3,886,492 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
87,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,562 UART: [kat] SHA2-256
882,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,608 UART: [kat] ++
886,760 UART: [kat] sha1
890,848 UART: [kat] SHA2-256
892,786 UART: [kat] SHA2-384
895,323 UART: [kat] SHA2-512-ACC
897,224 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,445 UART: [kat] LMS
1,475,641 UART: [kat] --
1,476,424 UART: [cold-reset] ++
1,476,778 UART: [fht] Storing FHT @ 0x50003400
1,479,607 UART: [idev] ++
1,479,775 UART: [idev] CDI.KEYID = 6
1,480,135 UART: [idev] SUBJECT.KEYID = 7
1,480,559 UART: [idev] UDS.KEYID = 0
1,480,904 ready_for_fw is high
1,480,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,273 UART: [idev] Erasing UDS.KEYID = 0
1,505,309 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,075 UART: [idev] --
1,515,150 UART: [ldev] ++
1,515,318 UART: [ldev] CDI.KEYID = 6
1,515,681 UART: [ldev] SUBJECT.KEYID = 5
1,516,107 UART: [ldev] AUTHORITY.KEYID = 7
1,516,570 UART: [ldev] FE.KEYID = 1
1,522,128 UART: [ldev] Erasing FE.KEYID = 1
1,547,495 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,719 UART: [ldev] --
1,587,166 UART: [fwproc] Waiting for Commands...
1,587,987 UART: [fwproc] Received command 0x46574c44
1,588,778 UART: [fwproc] Received Image of size 114168 bytes
2,885,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,739 >>> mbox cmd response: success
3,078,929 UART: [afmc] ++
3,079,097 UART: [afmc] CDI.KEYID = 6
3,079,459 UART: [afmc] SUBJECT.KEYID = 7
3,079,884 UART: [afmc] AUTHORITY.KEYID = 5
3,115,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,333 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,726 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,416 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,273 UART: [afmc] --
3,158,249 UART: [cold-reset] --
3,159,157 UART: [state] Locking Datavault
3,160,320 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,924 UART: [state] Locking ICCM
3,161,466 UART: [exit] Launching FMC @ 0x40000130
3,166,795 UART:
3,166,811 UART: Running Caliptra FMC ...
3,167,219 UART:
3,167,362 UART: [state] CFI Enabled
3,178,011 UART: [fht] FMC Alias Private Key: 7
3,285,936 UART: [art] Extend RT PCRs Done
3,286,364 UART: [art] Lock RT PCRs Done
3,287,880 UART: [art] Populate DV Done
3,296,257 UART: [fht] FMC Alias Private Key: 7
3,297,287 UART: [art] Derive CDI
3,297,567 UART: [art] Store in in slot 0x4
3,382,920 UART: [art] Derive Key Pair
3,383,280 UART: [art] Store priv key in slot 0x5
3,396,440 UART: [art] Derive Key Pair - Done
3,411,392 UART: [art] Signing Cert with AUTHO
3,411,872 UART: RITY.KEYID = 7
3,427,136 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,901 UART: [art] PUB.X = 0DB7374A4081C90979ECF4D62B2B5E50B5C2A2BD8895330404173D658EC1540F5EEB5C6636EC31E4150D381C8AA7EA10
3,434,657 UART: [art] PUB.Y = 6D1CE48517BF54B26B12DC539CC41BAD24266B8330914B718C66CBCDB85C9FA47109C8BAAF445544BBC154CB193096DC
3,441,616 UART: [art] SIG.R = FA4CF358EA0F34C3314003C503CE0E8D0A6E137BBDFA92BDF24BB01168EDA52C1B72C6A84426D7F3CF856A92F55A79FB
3,448,391 UART: [art] SIG.S = C7BCD938ECB0F4F981FA18935E89E42E63545343D64DB95E307D72DF724684BA6A02C43C66C4B1856EEB2B642D344090
3,471,637 UART: Caliptra RT
3,471,982 UART: [state] CFI Enabled
3,579,464 UART: [rt] RT listening for mailbox commands...
3,580,134 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,126 UART: [rt]cmd =0x41544d4e, len=14344
4,013,037 >>> mbox cmd response data (8 bytes)
4,013,038 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,177 UART: [rt]cmd =0x41545348, len=116
4,063,740 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,546 ready_for_fw is high
1,362,546 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,065 >>> mbox cmd response: success
2,986,781 UART:
2,986,797 UART: Running Caliptra FMC ...
2,987,205 UART:
2,987,348 UART: [state] CFI Enabled
2,998,199 UART: [fht] FMC Alias Private Key: 7
3,106,100 UART: [art] Extend RT PCRs Done
3,106,528 UART: [art] Lock RT PCRs Done
3,107,978 UART: [art] Populate DV Done
3,115,915 UART: [fht] FMC Alias Private Key: 7
3,117,069 UART: [art] Derive CDI
3,117,349 UART: [art] Store in in slot 0x4
3,202,680 UART: [art] Derive Key Pair
3,203,040 UART: [art] Store priv key in slot 0x5
3,216,520 UART: [art] Derive Key Pair - Done
3,231,545 UART: [art] Signing Cert with AUTHO
3,232,025 UART: RITY.KEYID = 7
3,247,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,128 UART: [art] PUB.X = A9215E2556D4B86237F10BAD397077F68E368430A7225F68D86C89175C742195C4FD6AC7F848E435B838516C2B7F038C
3,254,884 UART: [art] PUB.Y = AF890EABB29A9BFE0027B735224704839595C2D7B6667E9834C86D4A35D607F69662AF7334FA132AFA8ED78BC00FD31E
3,261,806 UART: [art] SIG.R = B39A8959B31E73C39A7971E391FCCE0FDE3A14BED4C266F9355C2E7DD1F6E88B5251D1F092051849D41E7367E4C8845D
3,268,576 UART: [art] SIG.S = 1C14B84ABD79FE5D0BC26FD3B9F076631A5996CBB18F6B21B3D92946ABE119E3C8E88D39FA3D45D60897DDFAABE4E40A
3,292,064 UART: Caliptra RT
3,292,409 UART: [state] CFI Enabled
3,400,338 UART: [rt] RT listening for mailbox commands...
3,401,008 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,646 UART: [rt]cmd =0x41544d4e, len=14344
3,833,517 >>> mbox cmd response data (8 bytes)
3,833,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,671 UART: [rt]cmd =0x41545348, len=116
3,884,808 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,286 UART: [kat] SHA2-256
893,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,061 UART: [kat] ++
898,213 UART: [kat] sha1
902,637 UART: [kat] SHA2-256
904,577 UART: [kat] SHA2-384
907,240 UART: [kat] SHA2-512-ACC
909,141 UART: [kat] ECC-384
918,880 UART: [kat] HMAC-384Kdf
923,492 UART: [kat] LMS
1,171,820 UART: [kat] --
1,172,805 UART: [cold-reset] ++
1,173,335 UART: [fht] FHT @ 0x50003400
1,176,194 UART: [idev] ++
1,176,362 UART: [idev] CDI.KEYID = 6
1,176,722 UART: [idev] SUBJECT.KEYID = 7
1,177,146 UART: [idev] UDS.KEYID = 0
1,177,491 ready_for_fw is high
1,177,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,122 UART: [idev] Erasing UDS.KEYID = 0
1,201,189 UART: [idev] Sha1 KeyId Algorithm
1,209,611 UART: [idev] --
1,210,807 UART: [ldev] ++
1,210,975 UART: [ldev] CDI.KEYID = 6
1,211,338 UART: [ldev] SUBJECT.KEYID = 5
1,211,764 UART: [ldev] AUTHORITY.KEYID = 7
1,212,227 UART: [ldev] FE.KEYID = 1
1,217,619 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,597 UART: [ldev] --
1,282,896 UART: [fwproc] Wait for Commands...
1,283,714 UART: [fwproc] Recv command 0x46574c44
1,284,442 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,395 >>> mbox cmd response: success
2,774,539 UART: [afmc] ++
2,774,707 UART: [afmc] CDI.KEYID = 6
2,775,069 UART: [afmc] SUBJECT.KEYID = 7
2,775,494 UART: [afmc] AUTHORITY.KEYID = 5
2,810,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,776 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,108 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,800 UART: [afmc] --
2,853,916 UART: [cold-reset] --
2,854,818 UART: [state] Locking Datavault
2,855,929 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,533 UART: [state] Locking ICCM
2,857,015 UART: [exit] Launching FMC @ 0x40000130
2,862,344 UART:
2,862,360 UART: Running Caliptra FMC ...
2,862,768 UART:
2,862,822 UART: [state] CFI Enabled
2,873,041 UART: [fht] FMC Alias Private Key: 7
2,981,118 UART: [art] Extend RT PCRs Done
2,981,546 UART: [art] Lock RT PCRs Done
2,983,292 UART: [art] Populate DV Done
2,991,487 UART: [fht] FMC Alias Private Key: 7
2,992,541 UART: [art] Derive CDI
2,992,821 UART: [art] Store in in slot 0x4
3,078,278 UART: [art] Derive Key Pair
3,078,638 UART: [art] Store priv key in slot 0x5
3,091,780 UART: [art] Derive Key Pair - Done
3,106,497 UART: [art] Signing Cert with AUTHO
3,106,977 UART: RITY.KEYID = 7
3,122,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,218 UART: [art] PUB.X = F599612BCBA02C5B03BF21A9161A6C80180ADE71ED6B3FA458954B2E5AC01E90F574B16ADFD7D7B51E995C26C62CE76F
3,129,998 UART: [art] PUB.Y = 55C6F3A7BBF825DD5E5E81E548F1C0ABF01D49ACB4D27A73296F3B2B2A1DA1616853DFCDFF310157051208FC3DA0764B
3,136,955 UART: [art] SIG.R = 779E52C0B5622846DFD3AE364D14695495908ED48B7F3EC85E404562226971518907B0C5E9739C31C1794C78C3A26E42
3,143,710 UART: [art] SIG.S = 4D474B508DC13C8AA99E983BF28636BB78D0F1FDF00A7D2A16C435E3B38F5AD930B99B18B38DAB2914AAA7B1C6697C2C
3,168,322 UART: Caliptra RT
3,168,575 UART: [state] CFI Enabled
3,275,886 UART: [rt] RT listening for mailbox commands...
3,276,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,408 UART: [rt]cmd =0x41544d4e, len=14344
3,709,251 >>> mbox cmd response data (8 bytes)
3,709,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,589 UART: [rt]cmd =0x41545348, len=116
3,760,940 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 ready_for_fw is high
1,060,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,366 >>> mbox cmd response: success
2,685,706 UART:
2,685,722 UART: Running Caliptra FMC ...
2,686,130 UART:
2,686,184 UART: [state] CFI Enabled
2,696,607 UART: [fht] FMC Alias Private Key: 7
2,804,778 UART: [art] Extend RT PCRs Done
2,805,206 UART: [art] Lock RT PCRs Done
2,806,534 UART: [art] Populate DV Done
2,814,759 UART: [fht] FMC Alias Private Key: 7
2,815,889 UART: [art] Derive CDI
2,816,169 UART: [art] Store in in slot 0x4
2,902,202 UART: [art] Derive Key Pair
2,902,562 UART: [art] Store priv key in slot 0x5
2,915,640 UART: [art] Derive Key Pair - Done
2,930,110 UART: [art] Signing Cert with AUTHO
2,930,590 UART: RITY.KEYID = 7
2,945,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,115 UART: [art] PUB.X = 2F1B14668576C01A7F56F4D73A5EED6052CCFDBA0008DA94CCF949E578AEF309DBAE637A498201416D1665D288D08561
2,952,860 UART: [art] PUB.Y = 81E4F6F5657D02B6C568E90957CFA1A22DBED7D69CE0D348850E221D37FCE165540842D7826A00D4049F7597BAD7CABA
2,959,781 UART: [art] SIG.R = 2D67189F3BBFF577029214A8EA71F0AD19426650BA31A6F6C09B9A9F6BA7D1DC4AD0A49BC050E71BB0E36A6F6F0C97B2
2,966,561 UART: [art] SIG.S = 0E703AF038CDDA2C1670ED292436453787E5042DB901FD898D472A98997388DAE08A8113371EB491F206D540CD8DEEED
2,989,956 UART: Caliptra RT
2,990,209 UART: [state] CFI Enabled
3,098,984 UART: [rt] RT listening for mailbox commands...
3,099,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,594 UART: [rt]cmd =0x41544d4e, len=14344
3,532,817 >>> mbox cmd response data (8 bytes)
3,532,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,823 UART: [rt]cmd =0x41545348, len=116
3,583,656 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,193 UART: [kat] SHA2-512-ACC
909,094 UART: [kat] ECC-384
919,105 UART: [kat] HMAC-384Kdf
923,725 UART: [kat] LMS
1,172,053 UART: [kat] --
1,172,916 UART: [cold-reset] ++
1,173,258 UART: [fht] FHT @ 0x50003400
1,175,933 UART: [idev] ++
1,176,101 UART: [idev] CDI.KEYID = 6
1,176,461 UART: [idev] SUBJECT.KEYID = 7
1,176,885 UART: [idev] UDS.KEYID = 0
1,177,230 ready_for_fw is high
1,177,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,274 UART: [idev] Sha1 KeyId Algorithm
1,209,964 UART: [idev] --
1,211,102 UART: [ldev] ++
1,211,270 UART: [ldev] CDI.KEYID = 6
1,211,633 UART: [ldev] SUBJECT.KEYID = 5
1,212,059 UART: [ldev] AUTHORITY.KEYID = 7
1,212,522 UART: [ldev] FE.KEYID = 1
1,217,814 UART: [ldev] Erasing FE.KEYID = 1
1,244,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,434 UART: [ldev] --
1,282,715 UART: [fwproc] Wait for Commands...
1,283,339 UART: [fwproc] Recv command 0x46574c44
1,284,067 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,648 >>> mbox cmd response: success
2,773,746 UART: [afmc] ++
2,773,914 UART: [afmc] CDI.KEYID = 6
2,774,276 UART: [afmc] SUBJECT.KEYID = 7
2,774,701 UART: [afmc] AUTHORITY.KEYID = 5
2,810,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,210 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,929 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,779 UART: [afmc] --
2,853,889 UART: [cold-reset] --
2,854,799 UART: [state] Locking Datavault
2,855,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,406 UART: [state] Locking ICCM
2,856,892 UART: [exit] Launching FMC @ 0x40000130
2,862,221 UART:
2,862,237 UART: Running Caliptra FMC ...
2,862,645 UART:
2,862,788 UART: [state] CFI Enabled
2,873,717 UART: [fht] FMC Alias Private Key: 7
2,981,932 UART: [art] Extend RT PCRs Done
2,982,360 UART: [art] Lock RT PCRs Done
2,983,494 UART: [art] Populate DV Done
2,991,781 UART: [fht] FMC Alias Private Key: 7
2,992,887 UART: [art] Derive CDI
2,993,167 UART: [art] Store in in slot 0x4
3,078,842 UART: [art] Derive Key Pair
3,079,202 UART: [art] Store priv key in slot 0x5
3,092,296 UART: [art] Derive Key Pair - Done
3,106,900 UART: [art] Signing Cert with AUTHO
3,107,380 UART: RITY.KEYID = 7
3,123,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,133 UART: [art] PUB.X = 15BDBCED31DE6C74E00E070C98D95C993163BC348FABF1A7AD0B42383333771D36AA5C28EE68FE2B564C05C204E755C6
3,130,897 UART: [art] PUB.Y = F62A29DF2EFD3EE2C28851CA4DE19CD82ACB7E9D044C8D0D7C0FFEF11EFF21AC4924B3A6F8E796B2BB1B83EA986DAD32
3,137,870 UART: [art] SIG.R = 2745BA5CD2BCE2A09ECFBE0F860CC83CF425D2CAB7735472BB59CEB2D2E1F16A61A27FDF9730204BBD1FCB4934424C71
3,144,656 UART: [art] SIG.S = 29DE9A5842106CF61B58CB25973AAA20696B6AAA0ACF83F0D4D2403E2164E25CF3FEC6C988C16BD4A5CDA4917C71BCDA
3,168,826 UART: Caliptra RT
3,169,171 UART: [state] CFI Enabled
3,277,566 UART: [rt] RT listening for mailbox commands...
3,278,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,360 UART: [rt]cmd =0x41544d4e, len=14344
3,711,129 >>> mbox cmd response data (8 bytes)
3,711,130 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,271 UART: [rt]cmd =0x41545348, len=116
3,762,840 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,368 ready_for_fw is high
1,061,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,557 >>> mbox cmd response: success
2,689,169 UART:
2,689,185 UART: Running Caliptra FMC ...
2,689,593 UART:
2,689,736 UART: [state] CFI Enabled
2,700,731 UART: [fht] FMC Alias Private Key: 7
2,808,636 UART: [art] Extend RT PCRs Done
2,809,064 UART: [art] Lock RT PCRs Done
2,810,904 UART: [art] Populate DV Done
2,819,239 UART: [fht] FMC Alias Private Key: 7
2,820,413 UART: [art] Derive CDI
2,820,693 UART: [art] Store in in slot 0x4
2,906,692 UART: [art] Derive Key Pair
2,907,052 UART: [art] Store priv key in slot 0x5
2,920,318 UART: [art] Derive Key Pair - Done
2,935,163 UART: [art] Signing Cert with AUTHO
2,935,643 UART: RITY.KEYID = 7
2,950,757 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,522 UART: [art] PUB.X = 8DFBAD71E21DAE3836AE6B759F95510CCF180A504C03EA72CF38ACC7A5D00A6922682281C00D8CD5FA96053890C5B7DB
2,958,288 UART: [art] PUB.Y = 0398D86E1E46C1C9FECD1D361D8F35A54F47676E52244825A31B1706A09343C3FB7536827219A600EA0AFAC03A7DFFDF
2,965,213 UART: [art] SIG.R = 5072670DA318DD4B371E87255F31D19824D61E9AE6213E51D0402CE79A973FA014CF1C7558925CCB5268D5CC5A513F4E
2,971,980 UART: [art] SIG.S = 66BAEDFE2D292A24A03ABE07245C59F9DC1DDAA5F2FA9C2F50AEBA7571A7806E9E509EFECB55FB729C947043F5705017
2,995,990 UART: Caliptra RT
2,996,335 UART: [state] CFI Enabled
3,104,672 UART: [rt] RT listening for mailbox commands...
3,105,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,704 UART: [rt]cmd =0x41544d4e, len=14344
3,538,635 >>> mbox cmd response data (8 bytes)
3,538,636 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,568,599 UART: [rt]cmd =0x41545348, len=116
3,589,586 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,210 UART: [kat] SHA2-256
890,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,889 UART: [kat] ++
895,041 UART: [kat] sha1
899,287 UART: [kat] SHA2-256
901,227 UART: [kat] SHA2-384
903,950 UART: [kat] SHA2-512-ACC
905,851 UART: [kat] ECC-384
915,370 UART: [kat] HMAC-384Kdf
920,032 UART: [kat] LMS
1,168,344 UART: [kat] --
1,169,375 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,723 UART: [idev] ++
1,172,891 UART: [idev] CDI.KEYID = 6
1,173,252 UART: [idev] SUBJECT.KEYID = 7
1,173,677 UART: [idev] UDS.KEYID = 0
1,174,023 ready_for_fw is high
1,174,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,189 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,207,097 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,554 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,480 UART: [ldev] --
1,280,874 UART: [fwproc] Wait for Commands...
1,281,647 UART: [fwproc] Recv command 0x46574c44
1,282,380 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,279 >>> mbox cmd response: success
2,772,418 UART: [afmc] ++
2,772,586 UART: [afmc] CDI.KEYID = 6
2,772,949 UART: [afmc] SUBJECT.KEYID = 7
2,773,375 UART: [afmc] AUTHORITY.KEYID = 5
2,808,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,300 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,183 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,902 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,641 UART: [afmc] --
2,851,519 UART: [cold-reset] --
2,852,327 UART: [state] Locking Datavault
2,853,526 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,130 UART: [state] Locking ICCM
2,854,694 UART: [exit] Launching FMC @ 0x40000130
2,860,023 UART:
2,860,039 UART: Running Caliptra FMC ...
2,860,447 UART:
2,860,501 UART: [state] CFI Enabled
2,870,784 UART: [fht] FMC Alias Private Key: 7
2,978,497 UART: [art] Extend RT PCRs Done
2,978,925 UART: [art] Lock RT PCRs Done
2,980,165 UART: [art] Populate DV Done
2,988,768 UART: [fht] FMC Alias Private Key: 7
2,989,702 UART: [art] Derive CDI
2,989,982 UART: [art] Store in in slot 0x4
3,075,605 UART: [art] Derive Key Pair
3,075,965 UART: [art] Store priv key in slot 0x5
3,089,371 UART: [art] Derive Key Pair - Done
3,104,275 UART: [art] Signing Cert with AUTHO
3,104,755 UART: RITY.KEYID = 7
3,120,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,780 UART: [art] PUB.X = F9895EF6E41EA441F78AA17974C1584B5700687D7C9F48A12EF69D7DA0C09A7242EEAAF2EBF3AFC23F550F89CA839D19
3,127,539 UART: [art] PUB.Y = BE67FE1BDBA3BC9B769279221B806984192B4B74FF6E73E0FF11277F5D425CB1EF7391034E7831D9500AAEA875F6611E
3,134,489 UART: [art] SIG.R = 6C3C5164B328D70D53AE5B895BDEBF74E3844038202C6FEA9CD801EB4EAC1696CE7E24F3B1848A3B4325B27809B0201B
3,141,258 UART: [art] SIG.S = 11E50FEB0662D0AE6EBF3D2035775A95047B3B0882CE82FEA2E7651D3F5437BE34AD1486D714CC3DAC72B20167419508
3,165,079 UART: Caliptra RT
3,165,332 UART: [state] CFI Enabled
3,272,623 UART: [rt] RT listening for mailbox commands...
3,273,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,727 UART: [rt]cmd =0x41544d4e, len=14344
3,706,354 >>> mbox cmd response data (8 bytes)
3,706,355 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,440 UART: [rt]cmd =0x41545348, len=116
3,757,611 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,734 ready_for_fw is high
1,056,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,589 >>> mbox cmd response: success
2,682,775 UART:
2,682,791 UART: Running Caliptra FMC ...
2,683,199 UART:
2,683,253 UART: [state] CFI Enabled
2,693,926 UART: [fht] FMC Alias Private Key: 7
2,802,061 UART: [art] Extend RT PCRs Done
2,802,489 UART: [art] Lock RT PCRs Done
2,804,019 UART: [art] Populate DV Done
2,812,246 UART: [fht] FMC Alias Private Key: 7
2,813,286 UART: [art] Derive CDI
2,813,566 UART: [art] Store in in slot 0x4
2,899,193 UART: [art] Derive Key Pair
2,899,553 UART: [art] Store priv key in slot 0x5
2,912,593 UART: [art] Derive Key Pair - Done
2,927,443 UART: [art] Signing Cert with AUTHO
2,927,923 UART: RITY.KEYID = 7
2,942,825 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,590 UART: [art] PUB.X = 1AE1D14524AD3DECC7801BCBEEA56A2C6AA2BBB70DC7ACDBAE0D85589EA2F6A71C8F545B04D4430730608562D225C6A6
2,950,370 UART: [art] PUB.Y = 4C3F4B2F2D79D10FBD9E611DFFE31ED512963E4D9AFED475EF71B31033B0D6783EA218BBCDB67001937F851D41D63DC4
2,957,330 UART: [art] SIG.R = AE4B24C6E9DAC09BA3AAA0E191E3A1FBC3FC81BB546ECDBBBE072DA4D77BD85CFD453487552B3AE37D944855517B2608
2,964,118 UART: [art] SIG.S = AC5CCF531392F82BB61B28509D11CB8AA8D7E7345A874983DADF69EA7F83E1628DEA41B5ACCA918313F957B3AB0CD40E
2,987,727 UART: Caliptra RT
2,987,980 UART: [state] CFI Enabled
3,095,714 UART: [rt] RT listening for mailbox commands...
3,096,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,430 UART: [rt]cmd =0x41544d4e, len=14344
3,529,819 >>> mbox cmd response data (8 bytes)
3,529,820 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,793 UART: [rt]cmd =0x41545348, len=116
3,582,002 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,281 UART: [kat] SHA2-512-ACC
906,182 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,174,788 ready_for_fw is high
1,174,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,272 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,045 UART: [ldev] ++
1,209,213 UART: [ldev] CDI.KEYID = 6
1,209,577 UART: [ldev] SUBJECT.KEYID = 5
1,210,004 UART: [ldev] AUTHORITY.KEYID = 7
1,210,467 UART: [ldev] FE.KEYID = 1
1,215,547 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,665 UART: [ldev] --
1,281,165 UART: [fwproc] Wait for Commands...
1,281,888 UART: [fwproc] Recv command 0x46574c44
1,282,621 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,572 >>> mbox cmd response: success
2,773,691 UART: [afmc] ++
2,773,859 UART: [afmc] CDI.KEYID = 6
2,774,222 UART: [afmc] SUBJECT.KEYID = 7
2,774,648 UART: [afmc] AUTHORITY.KEYID = 5
2,810,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,773 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,628 UART: [afmc] --
2,853,742 UART: [cold-reset] --
2,854,464 UART: [state] Locking Datavault
2,855,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,327 UART: [state] Locking ICCM
2,856,921 UART: [exit] Launching FMC @ 0x40000130
2,862,250 UART:
2,862,266 UART: Running Caliptra FMC ...
2,862,674 UART:
2,862,817 UART: [state] CFI Enabled
2,873,560 UART: [fht] FMC Alias Private Key: 7
2,981,487 UART: [art] Extend RT PCRs Done
2,981,915 UART: [art] Lock RT PCRs Done
2,983,527 UART: [art] Populate DV Done
2,992,120 UART: [fht] FMC Alias Private Key: 7
2,993,130 UART: [art] Derive CDI
2,993,410 UART: [art] Store in in slot 0x4
3,079,387 UART: [art] Derive Key Pair
3,079,747 UART: [art] Store priv key in slot 0x5
3,093,101 UART: [art] Derive Key Pair - Done
3,107,331 UART: [art] Signing Cert with AUTHO
3,107,811 UART: RITY.KEYID = 7
3,122,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,572 UART: [art] PUB.X = 93C0E0594147CE429E53F0C10629520795B7CACD3DD186FA1EDC9D864926B59A3F6AB60AC8C7901E21CD262717079FC6
3,130,334 UART: [art] PUB.Y = F10FEEC0F5962B9FEF58CD8EE9D2E5629B2658408A5BDA72D2800F64FF23197F3F265C53FE6BBD8DD5D1EDC27D43C797
3,137,298 UART: [art] SIG.R = 285A82A65C3FAC30E1304554EC4870528CFAA0B2CA406FFBC2A1885461615AAC57D5F3F20B17F64BC0ACC6CCBDDFB981
3,144,085 UART: [art] SIG.S = 5548B12292B51DCAEC2E86B384E48BC4F0F1AE67C4E78E85031BA915C6738816E7128F8F79C25256C6CB8F5145CFEFBD
3,167,897 UART: Caliptra RT
3,168,242 UART: [state] CFI Enabled
3,276,407 UART: [rt] RT listening for mailbox commands...
3,277,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,997 UART: [rt]cmd =0x41544d4e, len=14344
3,709,972 >>> mbox cmd response data (8 bytes)
3,709,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,014 UART: [rt]cmd =0x41545348, len=116
3,760,845 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,947 ready_for_fw is high
1,055,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,572 >>> mbox cmd response: success
2,681,364 UART:
2,681,380 UART: Running Caliptra FMC ...
2,681,788 UART:
2,681,931 UART: [state] CFI Enabled
2,692,352 UART: [fht] FMC Alias Private Key: 7
2,801,155 UART: [art] Extend RT PCRs Done
2,801,583 UART: [art] Lock RT PCRs Done
2,803,427 UART: [art] Populate DV Done
2,811,616 UART: [fht] FMC Alias Private Key: 7
2,812,694 UART: [art] Derive CDI
2,812,974 UART: [art] Store in in slot 0x4
2,898,881 UART: [art] Derive Key Pair
2,899,241 UART: [art] Store priv key in slot 0x5
2,912,665 UART: [art] Derive Key Pair - Done
2,927,559 UART: [art] Signing Cert with AUTHO
2,928,039 UART: RITY.KEYID = 7
2,943,001 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,766 UART: [art] PUB.X = 65D7D8EF5CE13E50B796EB198BAE938859B6B9D357495EEDCC93774FF0F8E9C0280629A2ACC4E41ECDF988D31FC68DC5
2,950,551 UART: [art] PUB.Y = C6EDAF6B02204B6E49B58162C233B37960C5C270F2E4B84554634F7889CD6B94326EF6B8C2727D15BCBE9702E6D938FB
2,957,499 UART: [art] SIG.R = 200588177DD6B63FAF83FE9771BCA212BDE3E6B019D3CF46870F1EFD740D4B0E32F9CA5DEE9EFAEBF60FA3EB53DB36B5
2,964,282 UART: [art] SIG.S = 72388C21A354F37B95EE19587F2B959F26E2B5BA6FB10394DD13178100A96AD4941434D349A536E22A8DCC6D4C0875A1
2,988,227 UART: Caliptra RT
2,988,572 UART: [state] CFI Enabled
3,096,405 UART: [rt] RT listening for mailbox commands...
3,097,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,155 UART: [rt]cmd =0x41544d4e, len=14344
3,530,168 >>> mbox cmd response data (8 bytes)
3,530,169 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,250 UART: [rt]cmd =0x41545348, len=116
3,581,893 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
192,279 UART:
192,628 UART: Running Caliptra ROM ...
193,745 UART:
193,882 UART: [state] CFI Enabled
261,625 UART: [state] LifecycleState = Unprovisioned
263,532 UART: [state] DebugLocked = No
265,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,326 UART: [kat] SHA2-256
441,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,484 UART: [kat] ++
451,997 UART: [kat] sha1
463,644 UART: [kat] SHA2-256
466,358 UART: [kat] SHA2-384
472,123 UART: [kat] SHA2-512-ACC
474,489 UART: [kat] ECC-384
2,762,821 UART: [kat] HMAC-384Kdf
2,775,415 UART: [kat] LMS
3,965,682 UART: [kat] --
3,971,469 UART: [cold-reset] ++
3,972,472 UART: [fht] Storing FHT @ 0x50003400
3,983,939 UART: [idev] ++
3,984,493 UART: [idev] CDI.KEYID = 6
3,985,464 UART: [idev] SUBJECT.KEYID = 7
3,986,699 UART: [idev] UDS.KEYID = 0
3,987,641 ready_for_fw is high
3,987,823 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,130,964 UART: [idev] Erasing UDS.KEYID = 0
7,319,757 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,486 UART: [idev] --
7,344,902 UART: [ldev] ++
7,345,529 UART: [ldev] CDI.KEYID = 6
7,346,453 UART: [ldev] SUBJECT.KEYID = 5
7,347,659 UART: [ldev] AUTHORITY.KEYID = 7
7,348,931 UART: [ldev] FE.KEYID = 1
7,377,455 UART: [ldev] Erasing FE.KEYID = 1
10,709,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,001,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,015,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,030,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,045,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,064,744 UART: [ldev] --
13,069,300 UART: [fwproc] Waiting for Commands...
13,071,275 UART: [fwproc] Received command 0x46574c44
13,073,505 UART: [fwproc] Received Image of size 113844 bytes
17,114,356 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,190,103 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,259,015 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,575,556 >>> mbox cmd response: success
17,579,488 UART: [afmc] ++
17,580,092 UART: [afmc] CDI.KEYID = 6
17,581,117 UART: [afmc] SUBJECT.KEYID = 7
17,582,266 UART: [afmc] AUTHORITY.KEYID = 5
20,940,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,238,248 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,240,541 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,254,933 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,269,798 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,284,263 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,305,746 UART: [afmc] --
23,309,289 UART: [cold-reset] --
23,314,110 UART: [state] Locking Datavault
23,318,806 UART: [state] Locking PCR0, PCR1 and PCR31
23,320,547 UART: [state] Locking ICCM
23,322,632 UART: [exit] Launching FMC @ 0x40000130
23,330,975 UART:
23,331,202 UART: Running Caliptra FMC ...
23,332,292 UART:
23,332,442 UART: [state] CFI Enabled
23,399,530 UART: [fht] FMC Alias Private Key: 7
25,737,428 UART: [art] Extend RT PCRs Done
25,738,647 UART: [art] Lock RT PCRs Done
25,740,458 UART: [art] Populate DV Done
25,746,084 UART: [fht] FMC Alias Private Key: 7
25,747,679 UART: [art] Derive CDI
25,748,490 UART: [art] Store in in slot 0x4
25,809,955 UART: [art] Derive Key Pair
25,810,974 UART: [art] Store priv key in slot 0x5
29,103,718 UART: [art] Derive Key Pair - Done
29,116,652 UART: [art] Signing Cert with AUTHO
29,118,004 UART: RITY.KEYID = 7
31,406,486 UART: [art] Erasing AUTHORITY.KEYID = 7
31,407,988 UART: [art] PUB.X = 2317959A981C7659EE4B2785F310D964254A7B391CE8752EA698DFDBD4BCC908921D7847A454F76875B1D0CAE3DF265F
31,415,244 UART: [art] PUB.Y = 22FAD78194937C82BDAC938C7A7F9DC1B917D9AB0299F427CBAF4BC7B24E5637F542B20B733BCD57265ABAAE4BC168DD
31,422,501 UART: [art] SIG.R = 383237497B9BE873C81BD815A19ABCC4F422E99A55DD6BEC517D8CA8222C9BF8039BD8BF4B19A5E48CBD12301DC9AE36
31,430,106 UART: [art] SIG.S = 179D3AD04D9C877B444C5FCD77A27AE2C231FA478AF1979B9B38B846AEB2FBDF9A4E7A7483636D630C0BDBBA30BED35F
32,735,507 UART: Caliptra RT
32,736,215 UART: [state] CFI Enabled
32,897,165 UART: [rt] RT listening for mailbox commands...
32,899,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,055,225 UART: [rt]cmd =0x41544d4e, len=14344
38,355,575 >>> mbox cmd response data (8 bytes)
38,356,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,386,999 UART: [rt]cmd =0x41545348, len=116
38,406,437 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,783,310 ready_for_fw is high
3,783,864 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,875,179 >>> mbox cmd response: success
23,571,151 UART:
23,571,529 UART: Running Caliptra FMC ...
23,572,659 UART:
23,572,821 UART: [state] CFI Enabled
23,637,930 UART: [fht] FMC Alias Private Key: 7
25,976,317 UART: [art] Extend RT PCRs Done
25,977,678 UART: [art] Lock RT PCRs Done
25,978,995 UART: [art] Populate DV Done
25,984,483 UART: [fht] FMC Alias Private Key: 7
25,986,125 UART: [art] Derive CDI
25,986,931 UART: [art] Store in in slot 0x4
26,046,773 UART: [art] Derive Key Pair
26,047,771 UART: [art] Store priv key in slot 0x5
29,340,772 UART: [art] Derive Key Pair - Done
29,353,714 UART: [art] Signing Cert with AUTHO
29,355,015 UART: RITY.KEYID = 7
31,643,086 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,584 UART: [art] PUB.X = CDCB767934E354179EA889B8D4A1099C59B2707710F91419B40AD2CED4F215AD6F52E360B27229C745F754D1916342EC
31,651,844 UART: [art] PUB.Y = A6EEA51D42E263A12DE5F1DE3AFF81A488A9C1010C093DEA2C2B00347FEF0106E7DEF9274489D628EBFFFD165AA4E533
31,659,047 UART: [art] SIG.R = A4205EA1D069053D8758288101E4A21142A1E765DCEBD26F54F2E8DF6B7018963885F8D4967F3831D07FF090AD23B8AA
31,666,465 UART: [art] SIG.S = F860D70DFC762F5DBE09550032BF8855ED02455A8E50A4CF53CED1E23316E86F7CAB4552B32E1ED6D7B59494D0BCB43D
32,971,678 UART: Caliptra RT
32,972,365 UART: [state] CFI Enabled
33,133,576 UART: [rt] RT listening for mailbox commands...
33,136,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,291,290 UART: [rt]cmd =0x41544d4e, len=14344
38,591,607 >>> mbox cmd response data (8 bytes)
38,592,176 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,622,583 UART: [rt]cmd =0x41545348, len=116
38,642,909 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,382 UART:
192,766 UART: Running Caliptra ROM ...
193,966 UART:
603,696 UART: [state] CFI Enabled
621,756 UART: [state] LifecycleState = Unprovisioned
623,743 UART: [state] DebugLocked = No
625,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,669 UART: [kat] SHA2-256
800,405 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,927 UART: [kat] ++
811,531 UART: [kat] sha1
821,985 UART: [kat] SHA2-256
824,710 UART: [kat] SHA2-384
832,117 UART: [kat] SHA2-512-ACC
834,496 UART: [kat] ECC-384
3,120,083 UART: [kat] HMAC-384Kdf
3,132,863 UART: [kat] LMS
4,322,997 UART: [kat] --
4,325,922 UART: [cold-reset] ++
4,328,418 UART: [fht] Storing FHT @ 0x50003400
4,340,689 UART: [idev] ++
4,341,254 UART: [idev] CDI.KEYID = 6
4,342,248 UART: [idev] SUBJECT.KEYID = 7
4,343,515 UART: [idev] UDS.KEYID = 0
4,344,535 ready_for_fw is high
4,344,749 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,488,196 UART: [idev] Erasing UDS.KEYID = 0
7,627,158 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,997 UART: [idev] --
7,654,620 UART: [ldev] ++
7,655,203 UART: [ldev] CDI.KEYID = 6
7,656,194 UART: [ldev] SUBJECT.KEYID = 5
7,657,393 UART: [ldev] AUTHORITY.KEYID = 7
7,658,554 UART: [ldev] FE.KEYID = 1
7,669,526 UART: [ldev] Erasing FE.KEYID = 1
10,960,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,825 UART: [ldev] --
13,317,492 UART: [fwproc] Waiting for Commands...
13,320,016 UART: [fwproc] Received command 0x46574c44
13,322,195 UART: [fwproc] Received Image of size 113844 bytes
17,370,213 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,741 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,643 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,840,057 >>> mbox cmd response: success
17,843,790 UART: [afmc] ++
17,844,387 UART: [afmc] CDI.KEYID = 6
17,845,300 UART: [afmc] SUBJECT.KEYID = 7
17,846,516 UART: [afmc] AUTHORITY.KEYID = 5
21,162,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,049 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,434 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,224 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,655 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,359 UART: [afmc] --
23,532,436 UART: [cold-reset] --
23,537,321 UART: [state] Locking Datavault
23,542,942 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,636 UART: [state] Locking ICCM
23,546,247 UART: [exit] Launching FMC @ 0x40000130
23,554,638 UART:
23,554,872 UART: Running Caliptra FMC ...
23,555,973 UART:
23,556,133 UART: [state] CFI Enabled
23,564,284 UART: [fht] FMC Alias Private Key: 7
25,894,850 UART: [art] Extend RT PCRs Done
25,896,068 UART: [art] Lock RT PCRs Done
25,897,766 UART: [art] Populate DV Done
25,903,232 UART: [fht] FMC Alias Private Key: 7
25,904,796 UART: [art] Derive CDI
25,905,610 UART: [art] Store in in slot 0x4
25,947,921 UART: [art] Derive Key Pair
25,948,925 UART: [art] Store priv key in slot 0x5
29,191,258 UART: [art] Derive Key Pair - Done
29,204,311 UART: [art] Signing Cert with AUTHO
29,205,649 UART: RITY.KEYID = 7
31,484,807 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,308 UART: [art] PUB.X = 62466CF209C90CAEFDCDADC46404C71025ACBA589F051653488A4C57069391541C2855224377DFACB3C5AF66F48C0527
31,493,548 UART: [art] PUB.Y = 10251E94C762E1D951DB7736E4295AC81596C18B18D67F77FC74AE40EE160F10E80DEBA8479DAA20F628CFE1EEAFF279
31,500,819 UART: [art] SIG.R = 149C974E484369C8ED5318697165B7776D44EFA48038380AD79DD70A2B4377005945D154C10314DE0F035D3F309AA55A
31,508,124 UART: [art] SIG.S = 8254C8F8C2F88D9B468CF96C26CC2D83A23F13246AE53D7667BD6969BBDA299CF176964522F1D1064D3731486288F2E7
32,813,841 UART: Caliptra RT
32,814,564 UART: [state] CFI Enabled
32,932,897 UART: [rt] RT listening for mailbox commands...
32,935,345 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,090,740 UART: [rt]cmd =0x41544d4e, len=14344
38,391,481 >>> mbox cmd response data (8 bytes)
38,392,064 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,422,795 UART: [rt]cmd =0x41545348, len=116
38,443,139 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
4,129,067 ready_for_fw is high
4,129,651 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,064,726 >>> mbox cmd response: success
23,709,061 UART:
23,709,503 UART: Running Caliptra FMC ...
23,710,625 UART:
23,710,805 UART: [state] CFI Enabled
23,718,440 UART: [fht] FMC Alias Private Key: 7
26,050,111 UART: [art] Extend RT PCRs Done
26,051,349 UART: [art] Lock RT PCRs Done
26,052,934 UART: [art] Populate DV Done
26,058,302 UART: [fht] FMC Alias Private Key: 7
26,059,794 UART: [art] Derive CDI
26,060,563 UART: [art] Store in in slot 0x4
26,103,161 UART: [art] Derive Key Pair
26,104,165 UART: [art] Store priv key in slot 0x5
29,346,209 UART: [art] Derive Key Pair - Done
29,359,419 UART: [art] Signing Cert with AUTHO
29,360,719 UART: RITY.KEYID = 7
31,639,900 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,426 UART: [art] PUB.X = FA14C0B35D86BE66CD395DDEA48CBF2D37502233DFB80B44E44B8FB626C7AB224815CE40AA281042C0216F3F009CC366
31,648,685 UART: [art] PUB.Y = 72DBAFC3DC42EE1A2262169F00C2E21BF80762953AB78A3FA428AA9E02441C1D929B397E38F56D361AAE867932B7EF98
31,655,905 UART: [art] SIG.R = 5943ECCFDA56696FC099BE51647458CF4685B6274FDFD02DAD811E5F6BC0EB8E75624D0C014921D862D2890AC1D08144
31,663,307 UART: [art] SIG.S = AB669A2A11EDB9EC7324890238254DC215AB6E71CB5BDFB79B0AE92FE3149D58222AE4FB1A765544772AFF6BB5B54562
32,968,038 UART: Caliptra RT
32,968,749 UART: [state] CFI Enabled
33,087,708 UART: [rt] RT listening for mailbox commands...
33,090,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,245,620 UART: [rt]cmd =0x41544d4e, len=14344
38,546,106 >>> mbox cmd response data (8 bytes)
38,546,678 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,577,189 UART: [rt]cmd =0x41545348, len=116
38,597,166 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,080 UART:
192,439 UART: Running Caliptra ROM ...
193,609 UART:
193,761 UART: [state] CFI Enabled
263,551 UART: [state] LifecycleState = Unprovisioned
265,416 UART: [state] DebugLocked = No
268,288 UART: [state] WD Timer not started. Device not locked for debugging
272,473 UART: [kat] SHA2-256
451,591 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,110 UART: [kat] ++
463,708 UART: [kat] sha1
475,228 UART: [kat] SHA2-256
478,241 UART: [kat] SHA2-384
484,943 UART: [kat] SHA2-512-ACC
487,898 UART: [kat] ECC-384
2,950,564 UART: [kat] HMAC-384Kdf
2,971,825 UART: [kat] LMS
3,501,297 UART: [kat] --
3,503,467 UART: [cold-reset] ++
3,505,978 UART: [fht] FHT @ 0x50003400
3,516,535 UART: [idev] ++
3,517,102 UART: [idev] CDI.KEYID = 6
3,517,987 UART: [idev] SUBJECT.KEYID = 7
3,519,231 UART: [idev] UDS.KEYID = 0
3,520,310 ready_for_fw is high
3,520,510 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,220 UART: [idev] Erasing UDS.KEYID = 0
6,026,238 UART: [idev] Sha1 KeyId Algorithm
6,049,178 UART: [idev] --
6,052,398 UART: [ldev] ++
6,053,001 UART: [ldev] CDI.KEYID = 6
6,053,935 UART: [ldev] SUBJECT.KEYID = 5
6,055,097 UART: [ldev] AUTHORITY.KEYID = 7
6,056,329 UART: [ldev] FE.KEYID = 1
6,101,000 UART: [ldev] Erasing FE.KEYID = 1
8,607,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,888 UART: [ldev] --
10,413,122 UART: [fwproc] Wait for Commands...
10,415,386 UART: [fwproc] Recv command 0x46574c44
10,417,429 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,338 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,271,497 >>> mbox cmd response: success
14,275,918 UART: [afmc] ++
14,276,515 UART: [afmc] CDI.KEYID = 6
14,277,401 UART: [afmc] SUBJECT.KEYID = 7
14,278,518 UART: [afmc] AUTHORITY.KEYID = 5
16,807,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,928 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,774 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,514 UART: [afmc] --
18,606,387 UART: [cold-reset] --
18,610,783 UART: [state] Locking Datavault
18,616,360 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,035 UART: [state] Locking ICCM
18,620,517 UART: [exit] Launching FMC @ 0x40000130
18,628,922 UART:
18,629,161 UART: Running Caliptra FMC ...
18,630,263 UART:
18,630,426 UART: [state] CFI Enabled
18,688,957 UART: [fht] FMC Alias Private Key: 7
20,452,982 UART: [art] Extend RT PCRs Done
20,454,196 UART: [art] Lock RT PCRs Done
20,455,959 UART: [art] Populate DV Done
20,461,258 UART: [fht] FMC Alias Private Key: 7
20,462,793 UART: [art] Derive CDI
20,463,525 UART: [art] Store in in slot 0x4
20,521,474 UART: [art] Derive Key Pair
20,522,513 UART: [art] Store priv key in slot 0x5
22,985,204 UART: [art] Derive Key Pair - Done
22,998,476 UART: [art] Signing Cert with AUTHO
22,999,812 UART: RITY.KEYID = 7
24,711,334 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,843 UART: [art] PUB.X = A2074C4724EC822C845C773CE9A3D1FCFBF113F7B21001EA236C7B3EA05FAA3EB108521EB0AE2033511FCC87C05A970F
24,720,127 UART: [art] PUB.Y = A37ED8455F465615FDB250200957CE64914D41626E2619E266D04FBCD464F1DC067D8FDEC9F10090A2C82FB479C8535F
24,727,364 UART: [art] SIG.R = EC048315C47E789987BA74C26A103EFDE1C808327EE4B5105CCC78E4B0CA27BE13152C5D3ED4068EB48E16342B9673A6
24,734,740 UART: [art] SIG.S = D520105B351B49AF8E2DFE6DE3F4019EB8A9319CEE824D1B95896C7DB5968DCD6F9BB0DE4F89BA09CD6D32640FF5E3BE
25,713,035 UART: Caliptra RT
25,713,734 UART: [state] CFI Enabled
25,879,854 UART: [rt] RT listening for mailbox commands...
25,882,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,037,623 UART: [rt]cmd =0x41544d4e, len=14344
30,033,547 >>> mbox cmd response data (8 bytes)
30,034,157 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,065,042 UART: [rt]cmd =0x41545348, len=116
30,085,607 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,370,258 ready_for_fw is high
3,370,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,062,735 >>> mbox cmd response: success
18,356,950 UART:
18,357,343 UART: Running Caliptra FMC ...
18,358,448 UART:
18,358,605 UART: [state] CFI Enabled
18,423,739 UART: [fht] FMC Alias Private Key: 7
20,187,608 UART: [art] Extend RT PCRs Done
20,188,808 UART: [art] Lock RT PCRs Done
20,190,454 UART: [art] Populate DV Done
20,195,968 UART: [fht] FMC Alias Private Key: 7
20,197,662 UART: [art] Derive CDI
20,198,490 UART: [art] Store in in slot 0x4
20,256,328 UART: [art] Derive Key Pair
20,257,327 UART: [art] Store priv key in slot 0x5
22,720,589 UART: [art] Derive Key Pair - Done
22,733,214 UART: [art] Signing Cert with AUTHO
22,734,521 UART: RITY.KEYID = 7
24,446,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,448,312 UART: [art] PUB.X = C33293828556EEE698AF27B8D6B59F0A102D6ECF271E39DA19FB4249D0BF2F4A6ABBD161A8016A0AC082FEF6E9F2D0A4
24,455,617 UART: [art] PUB.Y = D590D101AE34FBCC589C3BFD8B0A617517A9EC19F1D00E946EDB7A6EF7F65ACC565108B253A94720B8F91BF0BD0DB8C8
24,462,866 UART: [art] SIG.R = AC48EE0FE2AFEDEB85DA10E942DFBA07C278FC6D72ECCC4D5BD858E22C583DB46F3F5537EDF81058CF84138906396459
24,470,302 UART: [art] SIG.S = 345BB2A71E824BF70E09B0920DDB9C147372A6476FF2AA9BF85F1A021AC84EB6B9D7BE64784BAA58D885C88EF1B7D2D4
25,449,522 UART: Caliptra RT
25,450,236 UART: [state] CFI Enabled
25,614,551 UART: [rt] RT listening for mailbox commands...
25,616,990 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,772,291 UART: [rt]cmd =0x41544d4e, len=14344
29,767,795 >>> mbox cmd response data (8 bytes)
29,768,369 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,798,937 UART: [rt]cmd =0x41545348, len=116
29,818,737 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,878 writing to cptra_bootfsm_go
193,168 UART:
193,533 UART: Running Caliptra ROM ...
194,669 UART:
604,190 UART: [state] CFI Enabled
615,604 UART: [state] LifecycleState = Unprovisioned
617,484 UART: [state] DebugLocked = No
619,937 UART: [state] WD Timer not started. Device not locked for debugging
623,275 UART: [kat] SHA2-256
802,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,960 UART: [kat] ++
814,410 UART: [kat] sha1
826,631 UART: [kat] SHA2-256
829,637 UART: [kat] SHA2-384
835,053 UART: [kat] SHA2-512-ACC
838,001 UART: [kat] ECC-384
3,282,332 UART: [kat] HMAC-384Kdf
3,294,713 UART: [kat] LMS
3,824,250 UART: [kat] --
3,827,755 UART: [cold-reset] ++
3,828,618 UART: [fht] FHT @ 0x50003400
3,839,091 UART: [idev] ++
3,839,658 UART: [idev] CDI.KEYID = 6
3,840,610 UART: [idev] SUBJECT.KEYID = 7
3,841,801 UART: [idev] UDS.KEYID = 0
3,842,708 ready_for_fw is high
3,842,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,285 UART: [idev] Erasing UDS.KEYID = 0
6,318,118 UART: [idev] Sha1 KeyId Algorithm
6,340,914 UART: [idev] --
6,343,448 UART: [ldev] ++
6,344,020 UART: [ldev] CDI.KEYID = 6
6,344,911 UART: [ldev] SUBJECT.KEYID = 5
6,346,042 UART: [ldev] AUTHORITY.KEYID = 7
6,347,380 UART: [ldev] FE.KEYID = 1
6,358,382 UART: [ldev] Erasing FE.KEYID = 1
8,833,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,637 UART: [ldev] --
10,623,605 UART: [fwproc] Wait for Commands...
10,626,780 UART: [fwproc] Recv command 0x46574c44
10,628,882 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,714 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,511 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,486,677 >>> mbox cmd response: success
14,490,783 UART: [afmc] ++
14,491,379 UART: [afmc] CDI.KEYID = 6
14,492,264 UART: [afmc] SUBJECT.KEYID = 7
14,493,479 UART: [afmc] AUTHORITY.KEYID = 5
16,993,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,825 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,764,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,786,900 UART: [afmc] --
18,790,180 UART: [cold-reset] --
18,793,722 UART: [state] Locking Datavault
18,798,750 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,393 UART: [state] Locking ICCM
18,801,633 UART: [exit] Launching FMC @ 0x40000130
18,810,087 UART:
18,810,330 UART: Running Caliptra FMC ...
18,811,434 UART:
18,811,597 UART: [state] CFI Enabled
18,819,488 UART: [fht] FMC Alias Private Key: 7
20,576,434 UART: [art] Extend RT PCRs Done
20,577,663 UART: [art] Lock RT PCRs Done
20,579,150 UART: [art] Populate DV Done
20,584,840 UART: [fht] FMC Alias Private Key: 7
20,586,379 UART: [art] Derive CDI
20,587,192 UART: [art] Store in in slot 0x4
20,630,116 UART: [art] Derive Key Pair
20,631,156 UART: [art] Store priv key in slot 0x5
23,058,085 UART: [art] Derive Key Pair - Done
23,070,707 UART: [art] Signing Cert with AUTHO
23,072,014 UART: RITY.KEYID = 7
24,777,496 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,000 UART: [art] PUB.X = 9E027A6BF44AFAC8B6952F32C2A3FA0D8A3ECF479278D7D8F222768F2EEE9D0707C38AF499B838F548BC1C96C72FCA30
24,786,269 UART: [art] PUB.Y = 479F31BCC0EAA714C2D9C7C3DA8CFA3FFE46E2734184FD70430EE1B9660FF4661F21DE1D25AA1214B29DCBAAE1EC8073
24,793,561 UART: [art] SIG.R = 9258B3D8709B3580603C6830FC9DA163D90FF35D80C7085E9D51248236FE8F2599C6F2B953972B660A17224369F47C50
24,800,958 UART: [art] SIG.S = ADAD017B5F3965DC5969CD1A8C48BACB3FEB900435C2A6CFAD5664554F742C7425EB556D8BE82F9F534F1129F67C3208
25,779,619 UART: Caliptra RT
25,780,332 UART: [state] CFI Enabled
25,896,871 UART: [rt] RT listening for mailbox commands...
25,899,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,054,380 UART: [rt]cmd =0x41544d4e, len=14344
30,049,949 >>> mbox cmd response data (8 bytes)
30,050,601 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,081,175 UART: [rt]cmd =0x41545348, len=116
30,101,262 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,881 writing to cptra_bootfsm_go
3,698,190 ready_for_fw is high
3,698,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,764 >>> mbox cmd response: success
18,517,665 UART:
18,518,059 UART: Running Caliptra FMC ...
18,519,257 UART:
18,519,432 UART: [state] CFI Enabled
18,527,433 UART: [fht] FMC Alias Private Key: 7
20,284,095 UART: [art] Extend RT PCRs Done
20,285,323 UART: [art] Lock RT PCRs Done
20,286,634 UART: [art] Populate DV Done
20,292,144 UART: [fht] FMC Alias Private Key: 7
20,293,670 UART: [art] Derive CDI
20,294,416 UART: [art] Store in in slot 0x4
20,337,123 UART: [art] Derive Key Pair
20,338,127 UART: [art] Store priv key in slot 0x5
22,765,151 UART: [art] Derive Key Pair - Done
22,778,152 UART: [art] Signing Cert with AUTHO
22,779,503 UART: RITY.KEYID = 7
24,484,634 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,146 UART: [art] PUB.X = C26A4DA02DE5BD0E2C822531C4C9B2F4597C387E0CFBBF70C1EFE3E66E93B76A26213E612E8D40F1E672D61180A8A73E
24,493,397 UART: [art] PUB.Y = B404FCDE223E1C378445CEA0DA641F9A380E4494591CA1DAA2A717912400007F5F0D48D6A2D4AD0E2DFBD6D25FCDF02D
24,500,662 UART: [art] SIG.R = 2D02DDAAE450C47B9907DB03885FE9246C0A626501A4037E73933CF04DAC046D5A32A570A3B08B0B5A809E5E236E92EC
24,508,011 UART: [art] SIG.S = 0AD16AF6028B582271BA67C70148233057E57F0DA7B14036563F8A7C3F89DE92310852A7FAF3C0AB835C36BB5C0217C6
25,486,959 UART: Caliptra RT
25,487,647 UART: [state] CFI Enabled
25,605,890 UART: [rt] RT listening for mailbox commands...
25,608,315 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,763,335 UART: [rt]cmd =0x41544d4e, len=14344
29,758,142 >>> mbox cmd response data (8 bytes)
29,758,708 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,789,382 UART: [rt]cmd =0x41545348, len=116
29,809,731 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,212 UART:
192,561 UART: Running Caliptra ROM ...
193,674 UART:
193,819 UART: [state] CFI Enabled
263,982 UART: [state] LifecycleState = Unprovisioned
266,712 UART: [state] DebugLocked = No
268,805 UART: [state] WD Timer not started. Device not locked for debugging
274,209 UART: [kat] SHA2-256
464,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,827 UART: [kat] ++
475,284 UART: [kat] sha1
485,946 UART: [kat] SHA2-256
488,957 UART: [kat] SHA2-384
495,593 UART: [kat] SHA2-512-ACC
498,182 UART: [kat] ECC-384
2,947,274 UART: [kat] HMAC-384Kdf
2,971,238 UART: [kat] LMS
3,502,978 UART: [kat] --
3,508,730 UART: [cold-reset] ++
3,509,747 UART: [fht] FHT @ 0x50003400
3,521,225 UART: [idev] ++
3,521,939 UART: [idev] CDI.KEYID = 6
3,522,854 UART: [idev] SUBJECT.KEYID = 7
3,524,095 UART: [idev] UDS.KEYID = 0
3,525,039 ready_for_fw is high
3,525,243 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,919 UART: [idev] Erasing UDS.KEYID = 0
6,027,703 UART: [idev] Sha1 KeyId Algorithm
6,049,643 UART: [idev] --
6,055,323 UART: [ldev] ++
6,056,065 UART: [ldev] CDI.KEYID = 6
6,057,000 UART: [ldev] SUBJECT.KEYID = 5
6,058,120 UART: [ldev] AUTHORITY.KEYID = 7
6,059,356 UART: [ldev] FE.KEYID = 1
6,098,848 UART: [ldev] Erasing FE.KEYID = 1
8,606,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,271 UART: [ldev] --
10,413,749 UART: [fwproc] Wait for Commands...
10,416,814 UART: [fwproc] Recv command 0x46574c44
10,419,129 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,600,152 >>> mbox cmd response: success
14,604,135 UART: [afmc] ++
14,604,861 UART: [afmc] CDI.KEYID = 6
14,605,976 UART: [afmc] SUBJECT.KEYID = 7
14,607,395 UART: [afmc] AUTHORITY.KEYID = 5
17,147,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,726 UART: [afmc] --
18,948,000 UART: [cold-reset] --
18,952,903 UART: [state] Locking Datavault
18,959,313 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,475 UART: [state] Locking ICCM
18,963,486 UART: [exit] Launching FMC @ 0x40000130
18,972,179 UART:
18,972,412 UART: Running Caliptra FMC ...
18,973,516 UART:
18,973,679 UART: [state] CFI Enabled
19,031,013 UART: [fht] FMC Alias Private Key: 7
20,795,401 UART: [art] Extend RT PCRs Done
20,796,608 UART: [art] Lock RT PCRs Done
20,798,447 UART: [art] Populate DV Done
20,803,754 UART: [fht] FMC Alias Private Key: 7
20,805,508 UART: [art] Derive CDI
20,806,330 UART: [art] Store in in slot 0x4
20,863,888 UART: [art] Derive Key Pair
20,864,930 UART: [art] Store priv key in slot 0x5
23,327,940 UART: [art] Derive Key Pair - Done
23,341,102 UART: [art] Signing Cert with AUTHO
23,342,429 UART: RITY.KEYID = 7
25,053,695 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,191 UART: [art] PUB.X = D78AE0A4C385F30DFDB1669DF56D21F3B5888C3B786CA681AAECFE192DD60F0D0448E084C44DC29DAAEBBC962BDAA296
25,062,463 UART: [art] PUB.Y = 7DBEA8A94BA6BD27B0530A90AC27415197345CA1FF3CA6B03ECC952910B619FA123EBE438DE5B17E6184D41C96CF96A5
25,069,749 UART: [art] SIG.R = D0BC43E7EDFE15742427AF1DFB39CCC21035028A9B22B36B07153930468B50887C0E71E84A3EDDD6CB33BF058EBD654F
25,077,135 UART: [art] SIG.S = E43107C2DEDCCEA096A5BA258B421E1134ACAF93C9870F156AEA85106207DDDC7D5F5ECF1FF71C933271CE1551E90C81
26,055,678 UART: Caliptra RT
26,056,398 UART: [state] CFI Enabled
26,222,721 UART: [rt] RT listening for mailbox commands...
26,225,270 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,380,539 UART: [rt]cmd =0x41544d4e, len=14344
30,375,832 >>> mbox cmd response data (8 bytes)
30,376,464 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,407,183 UART: [rt]cmd =0x41545348, len=116
30,426,731 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,439,780 ready_for_fw is high
3,440,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,739,092 >>> mbox cmd response: success
19,031,012 UART:
19,031,393 UART: Running Caliptra FMC ...
19,032,534 UART:
19,032,698 UART: [state] CFI Enabled
19,096,207 UART: [fht] FMC Alias Private Key: 7
20,860,024 UART: [art] Extend RT PCRs Done
20,861,259 UART: [art] Lock RT PCRs Done
20,863,081 UART: [art] Populate DV Done
20,868,395 UART: [fht] FMC Alias Private Key: 7
20,869,988 UART: [art] Derive CDI
20,870,827 UART: [art] Store in in slot 0x4
20,929,275 UART: [art] Derive Key Pair
20,930,324 UART: [art] Store priv key in slot 0x5
23,393,313 UART: [art] Derive Key Pair - Done
23,406,258 UART: [art] Signing Cert with AUTHO
23,407,601 UART: RITY.KEYID = 7
25,119,072 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,585 UART: [art] PUB.X = 98FC063578C8DCD2B6555C9D138E05FFF0DE1D58BFACB4984241125C7AE225C928A41FFE20113A115D1B762E8E32FFB5
25,127,877 UART: [art] PUB.Y = 442E8824DD65EAB2A3DB6DC9D5F63242B304422F38BADC9F86C8DDD53DADBD6F7C66B7DB276EC4B60DB30EF3853FEBD8
25,135,171 UART: [art] SIG.R = F173D171A6CA0CDFB2D81465579DEC1C4FE61C53B022A13A46FB976A20BE50F0F5EDA69537B9085BAB81B059392E6D9D
25,142,617 UART: [art] SIG.S = AB595A5A5C53B40A5861C686E235C14CAC7C3D422D87C93D4395E1B30B3899830F282E43E96E3BA6FCAABBB85F30DF9C
26,121,169 UART: Caliptra RT
26,122,505 UART: [state] CFI Enabled
26,290,711 UART: [rt] RT listening for mailbox commands...
26,293,806 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,449,236 UART: [rt]cmd =0x41544d4e, len=14344
30,445,187 >>> mbox cmd response data (8 bytes)
30,446,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,477,156 UART: [rt]cmd =0x41545348, len=116
30,496,455 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,953 writing to cptra_bootfsm_go
193,116 UART:
193,506 UART: Running Caliptra ROM ...
194,619 UART:
604,258 UART: [state] CFI Enabled
616,023 UART: [state] LifecycleState = Unprovisioned
618,385 UART: [state] DebugLocked = No
620,044 UART: [state] WD Timer not started. Device not locked for debugging
624,856 UART: [kat] SHA2-256
814,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,562 UART: [kat] ++
826,008 UART: [kat] sha1
838,328 UART: [kat] SHA2-256
841,377 UART: [kat] SHA2-384
847,443 UART: [kat] SHA2-512-ACC
850,026 UART: [kat] ECC-384
3,291,526 UART: [kat] HMAC-384Kdf
3,304,322 UART: [kat] LMS
3,836,115 UART: [kat] --
3,841,471 UART: [cold-reset] ++
3,843,331 UART: [fht] FHT @ 0x50003400
3,856,085 UART: [idev] ++
3,856,803 UART: [idev] CDI.KEYID = 6
3,857,842 UART: [idev] SUBJECT.KEYID = 7
3,858,941 UART: [idev] UDS.KEYID = 0
3,859,915 ready_for_fw is high
3,860,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,565 UART: [idev] Erasing UDS.KEYID = 0
6,335,616 UART: [idev] Sha1 KeyId Algorithm
6,358,848 UART: [idev] --
6,363,141 UART: [ldev] ++
6,363,879 UART: [ldev] CDI.KEYID = 6
6,364,807 UART: [ldev] SUBJECT.KEYID = 5
6,365,984 UART: [ldev] AUTHORITY.KEYID = 7
6,367,165 UART: [ldev] FE.KEYID = 1
6,377,489 UART: [ldev] Erasing FE.KEYID = 1
8,853,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,394 UART: [ldev] --
10,645,386 UART: [fwproc] Wait for Commands...
10,648,395 UART: [fwproc] Recv command 0x46574c44
10,650,708 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,130 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,833,441 >>> mbox cmd response: success
14,836,847 UART: [afmc] ++
14,837,565 UART: [afmc] CDI.KEYID = 6
14,838,764 UART: [afmc] SUBJECT.KEYID = 7
14,840,201 UART: [afmc] AUTHORITY.KEYID = 5
17,345,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,905 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,092 UART: [afmc] --
19,143,478 UART: [cold-reset] --
19,146,542 UART: [state] Locking Datavault
19,152,180 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,360 UART: [state] Locking ICCM
19,155,870 UART: [exit] Launching FMC @ 0x40000130
19,164,566 UART:
19,164,812 UART: Running Caliptra FMC ...
19,165,916 UART:
19,166,072 UART: [state] CFI Enabled
19,174,072 UART: [fht] FMC Alias Private Key: 7
20,930,537 UART: [art] Extend RT PCRs Done
20,931,758 UART: [art] Lock RT PCRs Done
20,933,223 UART: [art] Populate DV Done
20,938,692 UART: [fht] FMC Alias Private Key: 7
20,940,392 UART: [art] Derive CDI
20,941,207 UART: [art] Store in in slot 0x4
20,983,535 UART: [art] Derive Key Pair
20,984,535 UART: [art] Store priv key in slot 0x5
23,411,682 UART: [art] Derive Key Pair - Done
23,424,523 UART: [art] Signing Cert with AUTHO
23,425,833 UART: RITY.KEYID = 7
25,130,997 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,494 UART: [art] PUB.X = 2B4E526D588780F56CE0F3D42774EC0F2B1210F2D80F0573CADA10485B662F7AD56325FA9ED52A1E51CC15B7FAC5245D
25,139,795 UART: [art] PUB.Y = B519ED03EC7AF8EA3A734663A1ECFE479ED064746D400E8051FB4EBBF535C73041860B9B398F27960CB3A3F5901C11FA
25,147,080 UART: [art] SIG.R = 8C926F04587672B40222A461A305CCCDFFE0934FC4446ACAAF889E807BF817AE58A99F92C00D5B4FBB14BAEE0BFA97F0
25,154,510 UART: [art] SIG.S = 8E1BE2EB8E6C2777D653C825715AB3E7FAC4E8BE3F61D53EBF7C005A1BAA638D3A7E912D98F6DD26A88E79A9B8488D6B
26,133,432 UART: Caliptra RT
26,134,128 UART: [state] CFI Enabled
26,250,483 UART: [rt] RT listening for mailbox commands...
26,252,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,408,578 UART: [rt]cmd =0x41544d4e, len=14344
30,403,893 >>> mbox cmd response data (8 bytes)
30,404,485 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,434,951 UART: [rt]cmd =0x41545348, len=116
30,454,680 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
3,760,307 ready_for_fw is high
3,760,867 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,963,262 >>> mbox cmd response: success
19,214,422 UART:
19,214,820 UART: Running Caliptra FMC ...
19,215,934 UART:
19,216,087 UART: [state] CFI Enabled
19,223,876 UART: [fht] FMC Alias Private Key: 7
20,980,582 UART: [art] Extend RT PCRs Done
20,981,813 UART: [art] Lock RT PCRs Done
20,983,737 UART: [art] Populate DV Done
20,988,934 UART: [fht] FMC Alias Private Key: 7
20,990,676 UART: [art] Derive CDI
20,991,501 UART: [art] Store in in slot 0x4
21,034,268 UART: [art] Derive Key Pair
21,035,273 UART: [art] Store priv key in slot 0x5
23,461,906 UART: [art] Derive Key Pair - Done
23,474,794 UART: [art] Signing Cert with AUTHO
23,476,136 UART: RITY.KEYID = 7
25,181,367 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,873 UART: [art] PUB.X = BF6648A053FDD12B944D48089136F80AEE36FD017DB77D6E8A692E287131BB5AAF77CABB7714F45D429249CB2E4CAB14
25,190,130 UART: [art] PUB.Y = 361895F00886F4706496EEF2CC63AFE9C7D1271F116B636E77A8A38198296F9E15E7A92209D19FD296313D21F856E3CE
25,197,389 UART: [art] SIG.R = 5CFB9D5D4B86DEDD86E8F640C9CECD74763F55E71DC7FAE8765B01BD36FE07DE8AAB31498D67ACB691A22727C072F2B9
25,204,782 UART: [art] SIG.S = 3C6B90276933274E33EF0AC46E85C10379E17746373462814D15250B729BAD9670292E7AF58A90D221550E862E6F4552
26,183,430 UART: Caliptra RT
26,184,132 UART: [state] CFI Enabled
26,301,591 UART: [rt] RT listening for mailbox commands...
26,303,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,388 UART: [rt]cmd =0x41544d4e, len=14344
30,455,022 >>> mbox cmd response data (8 bytes)
30,455,586 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,486,418 UART: [rt]cmd =0x41545348, len=116
30,506,254 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,507 UART: [kat] SHA2-256
892,445 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,888 UART: [kat] HMAC-384Kdf
907,458 UART: [kat] LMS
1,475,654 UART: [kat] --
1,476,477 UART: [cold-reset] ++
1,476,973 UART: [fht] Storing FHT @ 0x50003400
1,479,844 UART: [idev] ++
1,480,012 UART: [idev] CDI.KEYID = 6
1,480,372 UART: [idev] SUBJECT.KEYID = 7
1,480,796 UART: [idev] UDS.KEYID = 0
1,481,141 ready_for_fw is high
1,481,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,628 UART: [idev] Erasing UDS.KEYID = 0
1,504,936 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,528 UART: [idev] --
1,514,661 UART: [ldev] ++
1,514,829 UART: [ldev] CDI.KEYID = 6
1,515,192 UART: [ldev] SUBJECT.KEYID = 5
1,515,618 UART: [ldev] AUTHORITY.KEYID = 7
1,516,081 UART: [ldev] FE.KEYID = 1
1,521,297 UART: [ldev] Erasing FE.KEYID = 1
1,546,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,058 UART: [ldev] --
1,586,531 UART: [fwproc] Waiting for Commands...
1,587,186 UART: [fwproc] Received command 0x46574c44
1,587,977 UART: [fwproc] Received Image of size 114168 bytes
2,883,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,949 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,850 >>> mbox cmd response: success
3,077,026 UART: [afmc] ++
3,077,194 UART: [afmc] CDI.KEYID = 6
3,077,556 UART: [afmc] SUBJECT.KEYID = 7
3,077,981 UART: [afmc] AUTHORITY.KEYID = 5
3,113,642 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,209 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,899 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,742 UART: [afmc] --
3,156,802 UART: [cold-reset] --
3,157,470 UART: [state] Locking Datavault
3,158,543 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,147 UART: [state] Locking ICCM
3,159,691 UART: [exit] Launching FMC @ 0x40000130
3,165,020 UART:
3,165,036 UART: Running Caliptra FMC ...
3,165,444 UART:
3,165,498 UART: [state] CFI Enabled
3,176,171 UART: [fht] FMC Alias Private Key: 7
3,284,004 UART: [art] Extend RT PCRs Done
3,284,432 UART: [art] Lock RT PCRs Done
3,285,954 UART: [art] Populate DV Done
3,294,155 UART: [fht] FMC Alias Private Key: 7
3,295,135 UART: [art] Derive CDI
3,295,415 UART: [art] Store in in slot 0x4
3,380,854 UART: [art] Derive Key Pair
3,381,214 UART: [art] Store priv key in slot 0x5
3,394,754 UART: [art] Derive Key Pair - Done
3,409,449 UART: [art] Signing Cert with AUTHO
3,409,929 UART: RITY.KEYID = 7
3,425,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,842 UART: [art] PUB.X = 540B51EF3B29BBCC500EEC45C8D3D0FB999D431DF4E36C0C3BCD2EB222A6D29B71CC89676E45149036A41CB512F072D0
3,432,617 UART: [art] PUB.Y = 12195234DD92A654BB7198F28A0FE1196A2DD625576967F5978B3893C4D814560EBE9AB30C27AE221412EA01CD156FBE
3,439,555 UART: [art] SIG.R = 36607A569B37EBDDFDB0588752028CEECE24189369BA4BABFCC489BF061DD0E6DC976503EE44DD2ED75FEF17F7762AE0
3,446,336 UART: [art] SIG.S = E4731A34548A7C5F1DFBD845924FE1D930C9077155C8063CDDE275E06D964A25D0F7561977073CE61C25739AEC504BD9
3,469,992 UART: Caliptra RT
3,470,245 UART: [state] CFI Enabled
3,578,582 UART: [rt] RT listening for mailbox commands...
3,579,252 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,400 UART: [rt]cmd =0x41544d4e, len=14344
4,011,906 >>> mbox cmd response data (8 bytes)
4,011,907 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,168 UART: [rt]cmd =0x41545348, len=116
4,064,297 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,521 ready_for_fw is high
1,362,521 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,022 >>> mbox cmd response: success
2,988,776 UART:
2,988,792 UART: Running Caliptra FMC ...
2,989,200 UART:
2,989,254 UART: [state] CFI Enabled
2,999,723 UART: [fht] FMC Alias Private Key: 7
3,107,450 UART: [art] Extend RT PCRs Done
3,107,878 UART: [art] Lock RT PCRs Done
3,109,188 UART: [art] Populate DV Done
3,117,739 UART: [fht] FMC Alias Private Key: 7
3,118,685 UART: [art] Derive CDI
3,118,965 UART: [art] Store in in slot 0x4
3,204,678 UART: [art] Derive Key Pair
3,205,038 UART: [art] Store priv key in slot 0x5
3,217,974 UART: [art] Derive Key Pair - Done
3,232,605 UART: [art] Signing Cert with AUTHO
3,233,085 UART: RITY.KEYID = 7
3,248,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,946 UART: [art] PUB.X = 91EE768CA7890E795ABF09E45648F415284ED19ACBF0306BCCCBB59208E4EE63AAE6B4F2BE2FFC1E1CF5F48A72C66DD1
3,255,731 UART: [art] PUB.Y = 722FB38E67EF522C1A9A1A8054CC47190B3022579F23AFEE3C3C7E679E014CABF5C420957F0989AB9BF092D8CF4C4420
3,262,680 UART: [art] SIG.R = 421A5F430F7388E528589DB8F6E7990FB95656B476D1B16FCC184E3CF7E2E1AC7B17A5D77223E9882D9C8CB474F130B3
3,269,448 UART: [art] SIG.S = C783882A3E4CD3F8D2347913F46D20E7B8AC93BDD6388DC30E3C6785760BD0B0E658C34547A75BE22E31652EA493D2F4
3,293,459 UART: Caliptra RT
3,293,712 UART: [state] CFI Enabled
3,401,689 UART: [rt] RT listening for mailbox commands...
3,402,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,157 UART: [rt]cmd =0x41544d4e, len=14344
3,834,521 >>> mbox cmd response data (8 bytes)
3,834,522 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,537 UART: [rt]cmd =0x41545348, len=116
3,886,396 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,744 UART: [kat] SHA2-256
892,682 UART: [kat] SHA2-384
895,603 UART: [kat] SHA2-512-ACC
897,504 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,819 UART: [kat] LMS
1,476,015 UART: [kat] --
1,477,068 UART: [cold-reset] ++
1,477,578 UART: [fht] Storing FHT @ 0x50003400
1,480,305 UART: [idev] ++
1,480,473 UART: [idev] CDI.KEYID = 6
1,480,833 UART: [idev] SUBJECT.KEYID = 7
1,481,257 UART: [idev] UDS.KEYID = 0
1,481,602 ready_for_fw is high
1,481,602 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,369 UART: [idev] Erasing UDS.KEYID = 0
1,506,433 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,975 UART: [idev] --
1,516,014 UART: [ldev] ++
1,516,182 UART: [ldev] CDI.KEYID = 6
1,516,545 UART: [ldev] SUBJECT.KEYID = 5
1,516,971 UART: [ldev] AUTHORITY.KEYID = 7
1,517,434 UART: [ldev] FE.KEYID = 1
1,522,880 UART: [ldev] Erasing FE.KEYID = 1
1,548,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,541 UART: [ldev] --
1,587,838 UART: [fwproc] Waiting for Commands...
1,588,559 UART: [fwproc] Received command 0x46574c44
1,589,350 UART: [fwproc] Received Image of size 114168 bytes
2,886,428 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,718 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,621 >>> mbox cmd response: success
3,078,699 UART: [afmc] ++
3,078,867 UART: [afmc] CDI.KEYID = 6
3,079,229 UART: [afmc] SUBJECT.KEYID = 7
3,079,654 UART: [afmc] AUTHORITY.KEYID = 5
3,114,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,299 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,692 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,382 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,377 UART: [afmc] --
3,158,277 UART: [cold-reset] --
3,159,411 UART: [state] Locking Datavault
3,160,704 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,308 UART: [state] Locking ICCM
3,161,982 UART: [exit] Launching FMC @ 0x40000130
3,167,311 UART:
3,167,327 UART: Running Caliptra FMC ...
3,167,735 UART:
3,167,878 UART: [state] CFI Enabled
3,178,303 UART: [fht] FMC Alias Private Key: 7
3,287,274 UART: [art] Extend RT PCRs Done
3,287,702 UART: [art] Lock RT PCRs Done
3,289,412 UART: [art] Populate DV Done
3,297,475 UART: [fht] FMC Alias Private Key: 7
3,298,447 UART: [art] Derive CDI
3,298,727 UART: [art] Store in in slot 0x4
3,384,096 UART: [art] Derive Key Pair
3,384,456 UART: [art] Store priv key in slot 0x5
3,397,596 UART: [art] Derive Key Pair - Done
3,412,172 UART: [art] Signing Cert with AUTHO
3,412,652 UART: RITY.KEYID = 7
3,428,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,871 UART: [art] PUB.X = 4C4054E29F39A606DC7D91D6C5790C5A49921B5DE5766243DD788EE11BF36383D12A3BB2CC6CE3EF7F8CAF06496A6B87
3,435,642 UART: [art] PUB.Y = 7F1355BEB4FA6B314293A260FAC4A5C5E5F287D32F06FC954615F48AE6ABCEE14043EC4CE80C48FE46991495ED6E8447
3,442,598 UART: [art] SIG.R = 7E8A3B0906DA603F696AFEB16B5A463C4A738BD1623FB22BCB0B431D260A8A5AA9D89D1867E702B0AF629DF081C66BA8
3,449,367 UART: [art] SIG.S = E8BA6D4B2D687B988223A82D3D85C673D231341E4C2162974F4848FD2009D5FF039591F680E82DA2F4D57A16EFC3DC2B
3,473,178 UART: Caliptra RT
3,473,523 UART: [state] CFI Enabled
3,581,714 UART: [rt] RT listening for mailbox commands...
3,582,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,176 UART: [rt]cmd =0x41544d4e, len=14344
4,014,982 >>> mbox cmd response data (8 bytes)
4,014,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,045,174 UART: [rt]cmd =0x41545348, len=116
4,067,139 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 ready_for_fw is high
1,363,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,633 >>> mbox cmd response: success
2,988,387 UART:
2,988,403 UART: Running Caliptra FMC ...
2,988,811 UART:
2,988,954 UART: [state] CFI Enabled
2,999,635 UART: [fht] FMC Alias Private Key: 7
3,108,062 UART: [art] Extend RT PCRs Done
3,108,490 UART: [art] Lock RT PCRs Done
3,109,960 UART: [art] Populate DV Done
3,118,121 UART: [fht] FMC Alias Private Key: 7
3,119,279 UART: [art] Derive CDI
3,119,559 UART: [art] Store in in slot 0x4
3,205,156 UART: [art] Derive Key Pair
3,205,516 UART: [art] Store priv key in slot 0x5
3,218,716 UART: [art] Derive Key Pair - Done
3,233,523 UART: [art] Signing Cert with AUTHO
3,234,003 UART: RITY.KEYID = 7
3,249,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,358 UART: [art] PUB.X = 89A7A7AB065B1A49B22C540E78FE04129CD8D40DD5DFF504990A9E85613F3D0A86779A34F0FDD352940A0CDB7E70FBC5
3,257,113 UART: [art] PUB.Y = 598C5FF66966C66E57313448CFAE57306AE46673E902E6171EB014F299929F21014EB021C30E9200CFDF50C474B1EE7E
3,264,030 UART: [art] SIG.R = 9682F380B048762456751A1A5CCE772DF51B77CE650416EBE3A2D447CA60003609CEB82C11AD3A1C7CC0927D6AD95F37
3,270,776 UART: [art] SIG.S = 989D2C0571DCA6062D2ADA94694786548EDED1288B94CD49E699C8DC29C9C4FA359919CB1C25B7E777E9494295957718
3,294,629 UART: Caliptra RT
3,294,974 UART: [state] CFI Enabled
3,403,596 UART: [rt] RT listening for mailbox commands...
3,404,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,294 UART: [rt]cmd =0x41544d4e, len=14344
3,837,594 >>> mbox cmd response data (8 bytes)
3,837,595 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,938 UART: [rt]cmd =0x41545348, len=116
3,890,669 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,694 UART: [state] LifecycleState = Unprovisioned
86,349 UART: [state] DebugLocked = No
86,891 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [kat] SHA2-256
893,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,861 UART: [kat] ++
898,013 UART: [kat] sha1
902,395 UART: [kat] SHA2-256
904,335 UART: [kat] SHA2-384
907,138 UART: [kat] SHA2-512-ACC
909,039 UART: [kat] ECC-384
918,920 UART: [kat] HMAC-384Kdf
923,388 UART: [kat] LMS
1,171,716 UART: [kat] --
1,172,717 UART: [cold-reset] ++
1,173,297 UART: [fht] FHT @ 0x50003400
1,175,848 UART: [idev] ++
1,176,016 UART: [idev] CDI.KEYID = 6
1,176,376 UART: [idev] SUBJECT.KEYID = 7
1,176,800 UART: [idev] UDS.KEYID = 0
1,177,145 ready_for_fw is high
1,177,145 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,624 UART: [idev] Erasing UDS.KEYID = 0
1,201,459 UART: [idev] Sha1 KeyId Algorithm
1,209,999 UART: [idev] --
1,210,943 UART: [ldev] ++
1,211,111 UART: [ldev] CDI.KEYID = 6
1,211,474 UART: [ldev] SUBJECT.KEYID = 5
1,211,900 UART: [ldev] AUTHORITY.KEYID = 7
1,212,363 UART: [ldev] FE.KEYID = 1
1,217,613 UART: [ldev] Erasing FE.KEYID = 1
1,243,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,425 UART: [ldev] --
1,282,784 UART: [fwproc] Wait for Commands...
1,283,588 UART: [fwproc] Recv command 0x46574c44
1,284,316 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,908 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,549 >>> mbox cmd response: success
2,772,571 UART: [afmc] ++
2,772,739 UART: [afmc] CDI.KEYID = 6
2,773,101 UART: [afmc] SUBJECT.KEYID = 7
2,773,526 UART: [afmc] AUTHORITY.KEYID = 5
2,808,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,791 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,510 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,284 UART: [afmc] --
2,852,370 UART: [cold-reset] --
2,853,230 UART: [state] Locking Datavault
2,854,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,981 UART: [state] Locking ICCM
2,855,469 UART: [exit] Launching FMC @ 0x40000130
2,860,798 UART:
2,860,814 UART: Running Caliptra FMC ...
2,861,222 UART:
2,861,276 UART: [state] CFI Enabled
2,872,059 UART: [fht] FMC Alias Private Key: 7
2,980,018 UART: [art] Extend RT PCRs Done
2,980,446 UART: [art] Lock RT PCRs Done
2,981,944 UART: [art] Populate DV Done
2,989,945 UART: [fht] FMC Alias Private Key: 7
2,991,111 UART: [art] Derive CDI
2,991,391 UART: [art] Store in in slot 0x4
3,077,006 UART: [art] Derive Key Pair
3,077,366 UART: [art] Store priv key in slot 0x5
3,090,624 UART: [art] Derive Key Pair - Done
3,105,416 UART: [art] Signing Cert with AUTHO
3,105,896 UART: RITY.KEYID = 7
3,121,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,827 UART: [art] PUB.X = 467628D02E558A032EDEABEBEE6FC17436EB37D314C20263C7526CD6B0C46B7CDB2C247F12F51BD72E593357065A5F29
3,128,596 UART: [art] PUB.Y = DC6893A2DC89F44C76237D07103FBCB86F27AB648A06D8060E59819D2033328785DACE95B4F97F83065D0B88D8CB2374
3,135,528 UART: [art] SIG.R = 23112328CD0EE87F98FC602BEAD81A6F8D43F9AC9DA7A4352ADC58FE65F3A892E4110CF777B39E8B08BB89C5A98AC83D
3,142,307 UART: [art] SIG.S = 260623E9A7FFAB6C5D01C57180708F7D282B1983FE4D147AA5AF572552AB2CFA8D939A4E072485F9AC39433CD3215D88
3,165,959 UART: Caliptra RT
3,166,212 UART: [state] CFI Enabled
3,274,009 UART: [rt] RT listening for mailbox commands...
3,274,679 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,669 UART: [rt]cmd =0x41544d4e, len=14344
3,707,651 >>> mbox cmd response data (8 bytes)
3,707,652 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,819 UART: [rt]cmd =0x41545348, len=116
3,759,462 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,819 ready_for_fw is high
1,060,819 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,340 >>> mbox cmd response: success
2,686,854 UART:
2,686,870 UART: Running Caliptra FMC ...
2,687,278 UART:
2,687,332 UART: [state] CFI Enabled
2,697,857 UART: [fht] FMC Alias Private Key: 7
2,806,048 UART: [art] Extend RT PCRs Done
2,806,476 UART: [art] Lock RT PCRs Done
2,808,166 UART: [art] Populate DV Done
2,816,359 UART: [fht] FMC Alias Private Key: 7
2,817,371 UART: [art] Derive CDI
2,817,651 UART: [art] Store in in slot 0x4
2,903,338 UART: [art] Derive Key Pair
2,903,698 UART: [art] Store priv key in slot 0x5
2,916,622 UART: [art] Derive Key Pair - Done
2,931,241 UART: [art] Signing Cert with AUTHO
2,931,721 UART: RITY.KEYID = 7
2,946,863 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,628 UART: [art] PUB.X = 515BE90040E0E09D3818A9E8379BD1E1B43474A81AB51A4110EE47F7DCC5DC6E22757A7E9ED51205ECC1192C9EA17B4B
2,954,383 UART: [art] PUB.Y = 891223EFF7A1026A93FF247FFAAC1C46541578EF5500A0C6F6352B9C25AD7DB52A7E2DC77B6D8897BD724358BA542601
2,961,311 UART: [art] SIG.R = 2D8B8538D3B69E4BF165EB29C5971E9561713CA7D1333CEFBAA2092A6AF15C9BB0932DB0594387C567AB5E1199F66FBA
2,968,088 UART: [art] SIG.S = 7DBB0A35B4CFFE9140CEDD201961DB689A2A95536122DA382550B1D9AC1ED32427D6F60C068C86671F163A12C8C26643
2,991,972 UART: Caliptra RT
2,992,225 UART: [state] CFI Enabled
3,099,706 UART: [rt] RT listening for mailbox commands...
3,100,376 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,006 UART: [rt]cmd =0x41544d4e, len=14344
3,533,060 >>> mbox cmd response data (8 bytes)
3,533,061 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,130 UART: [rt]cmd =0x41545348, len=116
3,585,261 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,121 UART: [state] LifecycleState = Unprovisioned
86,776 UART: [state] DebugLocked = No
87,382 UART: [state] WD Timer not started. Device not locked for debugging
88,685 UART: [kat] SHA2-256
894,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,460 UART: [kat] ++
898,612 UART: [kat] sha1
902,978 UART: [kat] SHA2-256
904,918 UART: [kat] SHA2-384
907,749 UART: [kat] SHA2-512-ACC
909,650 UART: [kat] ECC-384
919,559 UART: [kat] HMAC-384Kdf
924,003 UART: [kat] LMS
1,172,331 UART: [kat] --
1,173,120 UART: [cold-reset] ++
1,173,698 UART: [fht] FHT @ 0x50003400
1,176,361 UART: [idev] ++
1,176,529 UART: [idev] CDI.KEYID = 6
1,176,889 UART: [idev] SUBJECT.KEYID = 7
1,177,313 UART: [idev] UDS.KEYID = 0
1,177,658 ready_for_fw is high
1,177,658 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,609 UART: [idev] Erasing UDS.KEYID = 0
1,202,808 UART: [idev] Sha1 KeyId Algorithm
1,211,210 UART: [idev] --
1,212,238 UART: [ldev] ++
1,212,406 UART: [ldev] CDI.KEYID = 6
1,212,769 UART: [ldev] SUBJECT.KEYID = 5
1,213,195 UART: [ldev] AUTHORITY.KEYID = 7
1,213,658 UART: [ldev] FE.KEYID = 1
1,218,792 UART: [ldev] Erasing FE.KEYID = 1
1,244,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,892 UART: [ldev] --
1,284,355 UART: [fwproc] Wait for Commands...
1,285,061 UART: [fwproc] Recv command 0x46574c44
1,285,789 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,453 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,962 >>> mbox cmd response: success
2,775,010 UART: [afmc] ++
2,775,178 UART: [afmc] CDI.KEYID = 6
2,775,540 UART: [afmc] SUBJECT.KEYID = 7
2,775,965 UART: [afmc] AUTHORITY.KEYID = 5
2,812,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,298 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,017 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,827 UART: [afmc] --
2,855,821 UART: [cold-reset] --
2,856,805 UART: [state] Locking Datavault
2,857,720 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,324 UART: [state] Locking ICCM
2,858,894 UART: [exit] Launching FMC @ 0x40000130
2,864,223 UART:
2,864,239 UART: Running Caliptra FMC ...
2,864,647 UART:
2,864,790 UART: [state] CFI Enabled
2,875,275 UART: [fht] FMC Alias Private Key: 7
2,983,506 UART: [art] Extend RT PCRs Done
2,983,934 UART: [art] Lock RT PCRs Done
2,985,520 UART: [art] Populate DV Done
2,993,797 UART: [fht] FMC Alias Private Key: 7
2,994,959 UART: [art] Derive CDI
2,995,239 UART: [art] Store in in slot 0x4
3,080,680 UART: [art] Derive Key Pair
3,081,040 UART: [art] Store priv key in slot 0x5
3,094,098 UART: [art] Derive Key Pair - Done
3,108,839 UART: [art] Signing Cert with AUTHO
3,109,319 UART: RITY.KEYID = 7
3,124,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,494 UART: [art] PUB.X = DD914BC3035E8F262CD3A3DF7AAE347BA985175656B43997D60574A421DA61487E8B8E2608BCD83E71115CB6DE8DBEBA
3,132,267 UART: [art] PUB.Y = BA04D6BE21F7FC88FEE0573115055188065F98894FA641A21382C44B88A9A739B3BEB1D3FEE9447918D2375481356FF6
3,139,206 UART: [art] SIG.R = 365D0E12A520F064C5DE824DA892FEF79FCCBAF8C5B511F5E42AA29DE0F1643153CF45A0FF274CE8EC8A13E7114633AB
3,145,991 UART: [art] SIG.S = 05731C39D0E82E646CDC75C06F5B40CF9BE15BD515A19643D1DE3EFF7987B0F76FA906DFAF685C8CD3EE8929438684AC
3,169,616 UART: Caliptra RT
3,169,961 UART: [state] CFI Enabled
3,277,624 UART: [rt] RT listening for mailbox commands...
3,278,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,308 UART: [rt]cmd =0x41544d4e, len=14344
3,711,246 >>> mbox cmd response data (8 bytes)
3,711,247 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,502 UART: [rt]cmd =0x41545348, len=116
3,763,867 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 ready_for_fw is high
1,060,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,235 >>> mbox cmd response: success
2,687,179 UART:
2,687,195 UART: Running Caliptra FMC ...
2,687,603 UART:
2,687,746 UART: [state] CFI Enabled
2,698,011 UART: [fht] FMC Alias Private Key: 7
2,805,142 UART: [art] Extend RT PCRs Done
2,805,570 UART: [art] Lock RT PCRs Done
2,807,232 UART: [art] Populate DV Done
2,815,373 UART: [fht] FMC Alias Private Key: 7
2,816,435 UART: [art] Derive CDI
2,816,715 UART: [art] Store in in slot 0x4
2,902,910 UART: [art] Derive Key Pair
2,903,270 UART: [art] Store priv key in slot 0x5
2,916,000 UART: [art] Derive Key Pair - Done
2,930,757 UART: [art] Signing Cert with AUTHO
2,931,237 UART: RITY.KEYID = 7
2,946,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,486 UART: [art] PUB.X = F37E884F2195313EC025DBE895B10560D3580FE3B88C91BE9AB843F4DFAC836673416BB4D1EC84006A4CA01FFC70709E
2,954,236 UART: [art] PUB.Y = DBC35F023822B6A2AD6829371E77D12758B965833D9F35A879848B0FEE21A761399B36F77CEEE6DBB74EDEFDEE60884F
2,961,190 UART: [art] SIG.R = 644536CAC23415EC808CF580447D9702343971DE3D37026ABEBE79EF9892A13583B26EB6C883158FF8511BD60A6B5E8E
2,967,951 UART: [art] SIG.S = 06E429770D0DFBA7E4C589F6D3E3EEEBD56FA5E2F922C2A6066C0729E7CE37CF3C1BA42F0D6E734CBA3A2F5558935807
2,992,203 UART: Caliptra RT
2,992,548 UART: [state] CFI Enabled
3,100,491 UART: [rt] RT listening for mailbox commands...
3,101,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,279 UART: [rt]cmd =0x41544d4e, len=14344
3,533,815 >>> mbox cmd response data (8 bytes)
3,533,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,033 UART: [rt]cmd =0x41545348, len=116
3,586,386 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,251 UART: [kat] ++
895,403 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
915,556 UART: [kat] HMAC-384Kdf
920,030 UART: [kat] LMS
1,168,342 UART: [kat] --
1,169,067 UART: [cold-reset] ++
1,169,401 UART: [fht] FHT @ 0x50003400
1,171,875 UART: [idev] ++
1,172,043 UART: [idev] CDI.KEYID = 6
1,172,404 UART: [idev] SUBJECT.KEYID = 7
1,172,829 UART: [idev] UDS.KEYID = 0
1,173,175 ready_for_fw is high
1,173,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,875 UART: [idev] Erasing UDS.KEYID = 0
1,197,067 UART: [idev] Sha1 KeyId Algorithm
1,206,051 UART: [idev] --
1,207,010 UART: [ldev] ++
1,207,178 UART: [ldev] CDI.KEYID = 6
1,207,542 UART: [ldev] SUBJECT.KEYID = 5
1,207,969 UART: [ldev] AUTHORITY.KEYID = 7
1,208,432 UART: [ldev] FE.KEYID = 1
1,213,614 UART: [ldev] Erasing FE.KEYID = 1
1,239,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,252,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,010 UART: [ldev] --
1,278,522 UART: [fwproc] Wait for Commands...
1,279,331 UART: [fwproc] Recv command 0x46574c44
1,280,064 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,295 >>> mbox cmd response: success
2,769,376 UART: [afmc] ++
2,769,544 UART: [afmc] CDI.KEYID = 6
2,769,907 UART: [afmc] SUBJECT.KEYID = 7
2,770,333 UART: [afmc] AUTHORITY.KEYID = 5
2,805,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,344 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,227 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,946 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,791 UART: [afmc] --
2,848,831 UART: [cold-reset] --
2,849,393 UART: [state] Locking Datavault
2,850,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,330 UART: [state] Locking ICCM
2,851,820 UART: [exit] Launching FMC @ 0x40000130
2,857,149 UART:
2,857,165 UART: Running Caliptra FMC ...
2,857,573 UART:
2,857,627 UART: [state] CFI Enabled
2,868,182 UART: [fht] FMC Alias Private Key: 7
2,976,555 UART: [art] Extend RT PCRs Done
2,976,983 UART: [art] Lock RT PCRs Done
2,978,267 UART: [art] Populate DV Done
2,986,672 UART: [fht] FMC Alias Private Key: 7
2,987,792 UART: [art] Derive CDI
2,988,072 UART: [art] Store in in slot 0x4
3,073,403 UART: [art] Derive Key Pair
3,073,763 UART: [art] Store priv key in slot 0x5
3,086,703 UART: [art] Derive Key Pair - Done
3,101,302 UART: [art] Signing Cert with AUTHO
3,101,782 UART: RITY.KEYID = 7
3,117,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,863 UART: [art] PUB.X = B51EE4BC8DA1A1211599FF7772E3B17A5BAEF7491197768048F731536481142F24B29B891A29EDDB52ED5423C39CC11B
3,124,635 UART: [art] PUB.Y = BBE83B6E04C632DB7BC1241599D1F405BB814632F66FE811768A7AB2AFCEBCB9AE6D1324069E1FF88894075A35DBFDF9
3,131,589 UART: [art] SIG.R = 467F575E22A9F3C6D87509E00D8FFBF282380654D8EF387C5718ABC5166B6B699587B3AB24BA0FBCB90D3B7CE91F7557
3,138,352 UART: [art] SIG.S = D7F584AC5F334AB7C5B181CF2827555F1DF4CA1269707C543C9FE5D973D8E529B9FF5B98B1D58ED862F331FDEFF10B81
3,162,168 UART: Caliptra RT
3,162,421 UART: [state] CFI Enabled
3,268,994 UART: [rt] RT listening for mailbox commands...
3,269,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,748 UART: [rt]cmd =0x41544d4e, len=14344
3,703,266 >>> mbox cmd response data (8 bytes)
3,703,267 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,044 UART: [rt]cmd =0x41545348, len=116
3,755,833 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,892 ready_for_fw is high
1,055,892 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,837 >>> mbox cmd response: success
2,682,487 UART:
2,682,503 UART: Running Caliptra FMC ...
2,682,911 UART:
2,682,965 UART: [state] CFI Enabled
2,693,528 UART: [fht] FMC Alias Private Key: 7
2,801,209 UART: [art] Extend RT PCRs Done
2,801,637 UART: [art] Lock RT PCRs Done
2,803,249 UART: [art] Populate DV Done
2,811,088 UART: [fht] FMC Alias Private Key: 7
2,812,060 UART: [art] Derive CDI
2,812,340 UART: [art] Store in in slot 0x4
2,898,139 UART: [art] Derive Key Pair
2,898,499 UART: [art] Store priv key in slot 0x5
2,912,019 UART: [art] Derive Key Pair - Done
2,926,766 UART: [art] Signing Cert with AUTHO
2,927,246 UART: RITY.KEYID = 7
2,943,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,849 UART: [art] PUB.X = 2D5ECAED1BB445CC9AF28E6F7AF314F6217DECEF75728C709F9631472CD95C16FE50044E0167E61583B46B8C5BFE73F4
2,950,627 UART: [art] PUB.Y = 1E8AD09A719076F533B11C170B724C8B030A6F3334DBE270D29135428F4F8C924C0E0508F9E400D689F2474808F9D926
2,957,526 UART: [art] SIG.R = BEAF2A8EDE379EBF5A038E358192E5F5821CFBB909FD8FE462B5E410185FAD7929ECF0FA803CBC9EA77C35CA66871AC8
2,964,314 UART: [art] SIG.S = 0243018C257CB68E49CF57F1BDAE8EE791F79F2E09D41C5924AE3A2B7F926AB3FD5C69FE757F6D7E7D618AC7AEA5540E
2,988,065 UART: Caliptra RT
2,988,318 UART: [state] CFI Enabled
3,095,883 UART: [rt] RT listening for mailbox commands...
3,096,553 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,569 UART: [rt]cmd =0x41544d4e, len=14344
3,528,805 >>> mbox cmd response data (8 bytes)
3,528,806 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,051 UART: [rt]cmd =0x41545348, len=116
3,580,050 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,932 UART: [kat] ++
896,084 UART: [kat] sha1
900,172 UART: [kat] SHA2-256
902,112 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
917,031 UART: [kat] HMAC-384Kdf
921,715 UART: [kat] LMS
1,170,027 UART: [kat] --
1,170,776 UART: [cold-reset] ++
1,171,168 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,175,068 ready_for_fw is high
1,175,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,200,002 UART: [idev] Sha1 KeyId Algorithm
1,208,742 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,649 UART: [fwproc] Wait for Commands...
1,283,256 UART: [fwproc] Recv command 0x46574c44
1,283,989 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,099 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,976 >>> mbox cmd response: success
2,774,143 UART: [afmc] ++
2,774,311 UART: [afmc] CDI.KEYID = 6
2,774,674 UART: [afmc] SUBJECT.KEYID = 7
2,775,100 UART: [afmc] AUTHORITY.KEYID = 5
2,811,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,452 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,181 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,064 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,783 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,662 UART: [afmc] --
2,854,750 UART: [cold-reset] --
2,855,532 UART: [state] Locking Datavault
2,856,917 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,521 UART: [state] Locking ICCM
2,858,001 UART: [exit] Launching FMC @ 0x40000130
2,863,330 UART:
2,863,346 UART: Running Caliptra FMC ...
2,863,754 UART:
2,863,897 UART: [state] CFI Enabled
2,874,162 UART: [fht] FMC Alias Private Key: 7
2,982,029 UART: [art] Extend RT PCRs Done
2,982,457 UART: [art] Lock RT PCRs Done
2,983,677 UART: [art] Populate DV Done
2,991,860 UART: [fht] FMC Alias Private Key: 7
2,992,948 UART: [art] Derive CDI
2,993,228 UART: [art] Store in in slot 0x4
3,078,679 UART: [art] Derive Key Pair
3,079,039 UART: [art] Store priv key in slot 0x5
3,092,099 UART: [art] Derive Key Pair - Done
3,107,379 UART: [art] Signing Cert with AUTHO
3,107,859 UART: RITY.KEYID = 7
3,123,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,016 UART: [art] PUB.X = B70622E90BF66EE2606004F6BE2D833EEEC621C0FF680F16C8EA2B8CD833BAA17645D07E5CF10427D2AA9AC804BBF898
3,130,784 UART: [art] PUB.Y = AAE6E44F920BA82285117602A88BAC9DBC1409EEA626BFAB24384C93F29DBA7C7BD60FCAC1EE57D039D6B1B29FD4DCF6
3,137,748 UART: [art] SIG.R = 43ED72629B00D617956D9814186FB8806500065D7FA84B96FE9355120421269143F067A3352FB997992FEF168BEF727E
3,144,454 UART: [art] SIG.S = 015CDBFC3DE1A8B98B62CEFED3274CB394B5159EDDA11EEEF4DFAD644A1C9F124AF62480E9C1EA1412560C023202DAF0
3,168,081 UART: Caliptra RT
3,168,426 UART: [state] CFI Enabled
3,275,579 UART: [rt] RT listening for mailbox commands...
3,276,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,337 UART: [rt]cmd =0x41544d4e, len=14344
3,708,605 >>> mbox cmd response data (8 bytes)
3,708,606 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,623 UART: [rt]cmd =0x41545348, len=116
3,760,786 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,571 ready_for_fw is high
1,056,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,990 >>> mbox cmd response: success
2,682,956 UART:
2,682,972 UART: Running Caliptra FMC ...
2,683,380 UART:
2,683,523 UART: [state] CFI Enabled
2,694,012 UART: [fht] FMC Alias Private Key: 7
2,801,853 UART: [art] Extend RT PCRs Done
2,802,281 UART: [art] Lock RT PCRs Done
2,804,359 UART: [art] Populate DV Done
2,812,446 UART: [fht] FMC Alias Private Key: 7
2,813,468 UART: [art] Derive CDI
2,813,748 UART: [art] Store in in slot 0x4
2,899,403 UART: [art] Derive Key Pair
2,899,763 UART: [art] Store priv key in slot 0x5
2,913,281 UART: [art] Derive Key Pair - Done
2,927,852 UART: [art] Signing Cert with AUTHO
2,928,332 UART: RITY.KEYID = 7
2,943,562 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,327 UART: [art] PUB.X = 197721A2221E81D0EC6C75C77BB10CB9B944442B44771B9C91C62C9F608FF784ABBB0B9075FA81979FAA35D8A5F2E791
2,951,097 UART: [art] PUB.Y = BCC8B1769F1A161973228A9896A387D531FA7EDF1B494A8F66D07A1B5D90502A68B9C3AD2CED4B7FDE726FB26AF31B2B
2,958,063 UART: [art] SIG.R = A41841AD4FABCC1AC69F8360EEE17D7CB2D5C1C6100E9BB7B165BB196C3962CADBB8722D1894D9728144F7300D402182
2,964,837 UART: [art] SIG.S = C50F70AEA00CFF388AF9B2E8D635C1B07003EA7315F75015600AD890E149F187306B944BE4C175FD7917D0D380B612B7
2,989,034 UART: Caliptra RT
2,989,379 UART: [state] CFI Enabled
3,097,945 UART: [rt] RT listening for mailbox commands...
3,098,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,647 UART: [rt]cmd =0x41544d4e, len=14344
3,531,697 >>> mbox cmd response data (8 bytes)
3,531,698 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,809 UART: [rt]cmd =0x41545348, len=116
3,584,082 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,207 UART:
192,573 UART: Running Caliptra ROM ...
193,777 UART:
193,927 UART: [state] CFI Enabled
263,815 UART: [state] LifecycleState = Unprovisioned
265,785 UART: [state] DebugLocked = No
267,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,221 UART: [kat] SHA2-256
442,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,467 UART: [kat] ++
453,943 UART: [kat] sha1
464,100 UART: [kat] SHA2-256
466,815 UART: [kat] SHA2-384
472,797 UART: [kat] SHA2-512-ACC
475,156 UART: [kat] ECC-384
2,766,625 UART: [kat] HMAC-384Kdf
2,798,642 UART: [kat] LMS
3,988,921 UART: [kat] --
3,995,428 UART: [cold-reset] ++
3,997,147 UART: [fht] Storing FHT @ 0x50003400
4,008,763 UART: [idev] ++
4,009,394 UART: [idev] CDI.KEYID = 6
4,010,275 UART: [idev] SUBJECT.KEYID = 7
4,011,584 UART: [idev] UDS.KEYID = 0
4,012,512 ready_for_fw is high
4,012,690 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,854 UART: [idev] Erasing UDS.KEYID = 0
7,342,440 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,928 UART: [idev] --
7,368,838 UART: [ldev] ++
7,369,399 UART: [ldev] CDI.KEYID = 6
7,370,347 UART: [ldev] SUBJECT.KEYID = 5
7,371,553 UART: [ldev] AUTHORITY.KEYID = 7
7,372,830 UART: [ldev] FE.KEYID = 1
7,421,905 UART: [ldev] Erasing FE.KEYID = 1
10,755,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,465 UART: [ldev] --
13,134,479 UART: [fwproc] Waiting for Commands...
13,136,190 UART: [fwproc] Received command 0x46574c44
13,138,360 UART: [fwproc] Received Image of size 113844 bytes
17,186,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,336,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,653,601 >>> mbox cmd response: success
17,657,512 UART: [afmc] ++
17,658,108 UART: [afmc] CDI.KEYID = 6
17,659,015 UART: [afmc] SUBJECT.KEYID = 7
17,660,288 UART: [afmc] AUTHORITY.KEYID = 5
21,029,765 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,890 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,338 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,126 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,566 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,889 UART: [afmc] --
23,400,753 UART: [cold-reset] --
23,402,946 UART: [state] Locking Datavault
23,407,492 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,246 UART: [state] Locking ICCM
23,411,956 UART: [exit] Launching FMC @ 0x40000130
23,420,350 UART:
23,420,603 UART: Running Caliptra FMC ...
23,421,703 UART:
23,421,861 UART: [state] CFI Enabled
23,488,705 UART: [fht] FMC Alias Private Key: 7
25,826,575 UART: [art] Extend RT PCRs Done
25,827,794 UART: [art] Lock RT PCRs Done
25,829,158 UART: [art] Populate DV Done
25,834,514 UART: [fht] FMC Alias Private Key: 7
25,835,990 UART: [art] Derive CDI
25,836,746 UART: [art] Store in in slot 0x4
25,897,989 UART: [art] Derive Key Pair
25,899,059 UART: [art] Store priv key in slot 0x5
29,191,798 UART: [art] Derive Key Pair - Done
29,204,531 UART: [art] Signing Cert with AUTHO
29,205,854 UART: RITY.KEYID = 7
31,493,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,352 UART: [art] PUB.X = B1B6F5BA7A1AC35E7803BEC237CB6B3C4ABAC4ED863EDC324B94BC81A53CA5F2BA1334F9203453F35698E5C041700445
31,502,622 UART: [art] PUB.Y = 95666835E7C6F587D3619C6E00B24FEF0B33469B86243C2850A2DAE8EA42E133082C1104763C4BEA45220B52CF1F7C30
31,509,838 UART: [art] SIG.R = E8A2C9FF87939E833F7C1B52478D2B193D2A40AC9AEECD7E17FB550E0396EE355143B87020931A51483664920E81A72C
31,517,218 UART: [art] SIG.S = 1A0F1E2014E3A15D1C9FDB4D56A9B2DA71EA08156921262DBB8D51C426897B3EC5F2B50A446EF7D4C9BD7CF74B20A046
32,822,124 UART: Caliptra RT
32,822,834 UART: [state] CFI Enabled
32,981,837 UART: [rt] RT listening for mailbox commands...
32,984,288 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,139,427 UART: [rt]cmd =0x41544d4e, len=14344
38,439,959 >>> mbox cmd response data (8 bytes)
38,440,569 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,471,367 UART: [rt]cmd =0x41545348, len=116
38,491,739 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,804,946 ready_for_fw is high
3,805,354 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,841,817 >>> mbox cmd response: success
23,523,696 UART:
23,524,075 UART: Running Caliptra FMC ...
23,525,204 UART:
23,525,362 UART: [state] CFI Enabled
23,594,840 UART: [fht] FMC Alias Private Key: 7
25,932,890 UART: [art] Extend RT PCRs Done
25,934,109 UART: [art] Lock RT PCRs Done
25,935,686 UART: [art] Populate DV Done
25,940,909 UART: [fht] FMC Alias Private Key: 7
25,942,608 UART: [art] Derive CDI
25,943,372 UART: [art] Store in in slot 0x4
26,004,919 UART: [art] Derive Key Pair
26,005,966 UART: [art] Store priv key in slot 0x5
29,298,010 UART: [art] Derive Key Pair - Done
29,310,959 UART: [art] Signing Cert with AUTHO
29,312,260 UART: RITY.KEYID = 7
31,599,331 UART: [art] Erasing AUTHORITY.KEYID = 7
31,600,835 UART: [art] PUB.X = B553EC5FB34B4D7B85E0A47599D1FED7FC498797B2F9D456F037B530C344BD25BDE0CB019AEA79533B7A7E71196C6994
31,608,041 UART: [art] PUB.Y = 43D1443CFFE6FD9F35F6020AA5927500E3FF0489E74AE903207BB5592514953317620346C5EEEFCCB6EE9B7BC6C4C6A8
31,615,281 UART: [art] SIG.R = 0A875EF5D9FF58BE01532443B1EFC64C7245EC60371BAA87369B8B818F316B1425F435425D4D126F77C3A27802E314C3
31,622,674 UART: [art] SIG.S = 39EBC4DE0AA852ABECA3456D85DD83F8C704127406683609F1900FC7858BCECFF28AC71B8ADC5A23E880218ACC04FD5C
32,928,494 UART: Caliptra RT
32,929,199 UART: [state] CFI Enabled
33,109,577 UART: [rt] RT listening for mailbox commands...
33,111,954 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,267,034 UART: [rt]cmd =0x41544d4e, len=14344
38,567,737 >>> mbox cmd response data (8 bytes)
38,568,311 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,599,034 UART: [rt]cmd =0x41545348, len=116
38,618,956 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,565 UART:
192,919 UART: Running Caliptra ROM ...
194,057 UART:
604,000 UART: [state] CFI Enabled
616,596 UART: [state] LifecycleState = Unprovisioned
618,536 UART: [state] DebugLocked = No
621,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,109 UART: [kat] SHA2-256
795,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,400 UART: [kat] ++
806,925 UART: [kat] sha1
817,843 UART: [kat] SHA2-256
820,537 UART: [kat] SHA2-384
826,176 UART: [kat] SHA2-512-ACC
828,542 UART: [kat] ECC-384
3,112,743 UART: [kat] HMAC-384Kdf
3,124,056 UART: [kat] LMS
4,314,170 UART: [kat] --
4,320,390 UART: [cold-reset] ++
4,321,339 UART: [fht] Storing FHT @ 0x50003400
4,332,957 UART: [idev] ++
4,333,520 UART: [idev] CDI.KEYID = 6
4,334,590 UART: [idev] SUBJECT.KEYID = 7
4,335,743 UART: [idev] UDS.KEYID = 0
4,336,694 ready_for_fw is high
4,336,897 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,733 UART: [idev] Erasing UDS.KEYID = 0
7,627,329 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,187 UART: [idev] --
7,652,856 UART: [ldev] ++
7,653,425 UART: [ldev] CDI.KEYID = 6
7,654,392 UART: [ldev] SUBJECT.KEYID = 5
7,655,602 UART: [ldev] AUTHORITY.KEYID = 7
7,656,890 UART: [ldev] FE.KEYID = 1
7,669,067 UART: [ldev] Erasing FE.KEYID = 1
10,955,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,219 UART: [ldev] --
13,315,817 UART: [fwproc] Waiting for Commands...
13,318,774 UART: [fwproc] Received command 0x46574c44
13,320,954 UART: [fwproc] Received Image of size 113844 bytes
17,365,240 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,565 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,436 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,825,445 >>> mbox cmd response: success
17,829,945 UART: [afmc] ++
17,830,542 UART: [afmc] CDI.KEYID = 6
17,831,484 UART: [afmc] SUBJECT.KEYID = 7
17,832,704 UART: [afmc] AUTHORITY.KEYID = 5
21,141,806 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,577 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,939 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,792 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,215 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,249 UART: [afmc] --
23,507,252 UART: [cold-reset] --
23,512,189 UART: [state] Locking Datavault
23,516,248 UART: [state] Locking PCR0, PCR1 and PCR31
23,518,005 UART: [state] Locking ICCM
23,520,592 UART: [exit] Launching FMC @ 0x40000130
23,528,949 UART:
23,529,206 UART: Running Caliptra FMC ...
23,530,281 UART:
23,530,441 UART: [state] CFI Enabled
23,538,609 UART: [fht] FMC Alias Private Key: 7
25,868,883 UART: [art] Extend RT PCRs Done
25,870,104 UART: [art] Lock RT PCRs Done
25,871,703 UART: [art] Populate DV Done
25,877,170 UART: [fht] FMC Alias Private Key: 7
25,878,812 UART: [art] Derive CDI
25,879,550 UART: [art] Store in in slot 0x4
25,922,139 UART: [art] Derive Key Pair
25,923,138 UART: [art] Store priv key in slot 0x5
29,165,192 UART: [art] Derive Key Pair - Done
29,177,973 UART: [art] Signing Cert with AUTHO
29,179,275 UART: RITY.KEYID = 7
31,458,394 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,896 UART: [art] PUB.X = AA750DAFD80620DDDE3A8C0015C789D14C29437F3AE4205CECC1BF8AC98AAC5B8996F8F9EB760EE672DA845D1F9FD98A
31,467,174 UART: [art] PUB.Y = D830B039FCFCB7434091ED310E6FD07A6CD0AA81ED3D312F6FFC76668285E55AABCFF5C78DBA34207A13079C6E698778
31,474,477 UART: [art] SIG.R = D9A979D2257130B896976E792EBEEBD7A7BB1A84251B1E8548BE7E3E827708BE8E37A0AB76CACE90E29514A9A3DE6493
31,481,821 UART: [art] SIG.S = 14EE0CF0957EE2E5C96DFB1592769FDC945E60B643A2E878A8753680EB54CFF6513DB4BF2562722AE19AF29A13DBF4A5
32,786,284 UART: Caliptra RT
32,786,990 UART: [state] CFI Enabled
32,904,548 UART: [rt] RT listening for mailbox commands...
32,907,048 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,062,293 UART: [rt]cmd =0x41544d4e, len=14344
38,362,286 >>> mbox cmd response data (8 bytes)
38,362,878 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,393,654 UART: [rt]cmd =0x41545348, len=116
38,413,507 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,125,089 ready_for_fw is high
4,125,499 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,012 >>> mbox cmd response: success
23,698,657 UART:
23,699,050 UART: Running Caliptra FMC ...
23,700,261 UART:
23,700,432 UART: [state] CFI Enabled
23,708,032 UART: [fht] FMC Alias Private Key: 7
26,039,186 UART: [art] Extend RT PCRs Done
26,040,410 UART: [art] Lock RT PCRs Done
26,041,935 UART: [art] Populate DV Done
26,047,187 UART: [fht] FMC Alias Private Key: 7
26,048,674 UART: [art] Derive CDI
26,049,445 UART: [art] Store in in slot 0x4
26,091,897 UART: [art] Derive Key Pair
26,093,087 UART: [art] Store priv key in slot 0x5
29,335,007 UART: [art] Derive Key Pair - Done
29,348,227 UART: [art] Signing Cert with AUTHO
29,349,524 UART: RITY.KEYID = 7
31,629,250 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,765 UART: [art] PUB.X = A80266ED262733D331ECD71A616123DDEECB9C830C828560564C10A8B5811687AAF828A586B797761A4D2EB768916402
31,637,976 UART: [art] PUB.Y = 7FFB345E5776559C07E8781C7F7362D74DD0FB870D6DABE16ABA0A3BF44CE6BEDC27C45CB01E7844108F60288686CD0D
31,645,218 UART: [art] SIG.R = EA6616D1BB683EF78864CF129DD5570317591DFF2261B59345DBF1BF9ABE6919C0F432BD228ED76B99E05CFDD41E005C
31,652,563 UART: [art] SIG.S = 28DBD12F9200295C43996E2FB7CCB8DCEA43D83638EE96DF39D813CD5C4F0A78CB03E89DF284CE770BF52E4057A66F98
32,957,557 UART: Caliptra RT
32,958,270 UART: [state] CFI Enabled
33,075,569 UART: [rt] RT listening for mailbox commands...
33,077,986 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,233,458 UART: [rt]cmd =0x41544d4e, len=14344
38,533,999 >>> mbox cmd response data (8 bytes)
38,534,596 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,565,493 UART: [rt]cmd =0x41545348, len=116
38,585,564 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,194 UART:
192,556 UART: Running Caliptra ROM ...
193,778 UART:
193,938 UART: [state] CFI Enabled
260,457 UART: [state] LifecycleState = Unprovisioned
262,358 UART: [state] DebugLocked = No
263,678 UART: [state] WD Timer not started. Device not locked for debugging
267,354 UART: [kat] SHA2-256
446,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,038 UART: [kat] ++
458,627 UART: [kat] sha1
470,019 UART: [kat] SHA2-256
473,063 UART: [kat] SHA2-384
479,203 UART: [kat] SHA2-512-ACC
482,137 UART: [kat] ECC-384
2,928,264 UART: [kat] HMAC-384Kdf
2,950,469 UART: [kat] LMS
3,479,904 UART: [kat] --
3,482,400 UART: [cold-reset] ++
3,484,694 UART: [fht] FHT @ 0x50003400
3,495,458 UART: [idev] ++
3,496,023 UART: [idev] CDI.KEYID = 6
3,497,060 UART: [idev] SUBJECT.KEYID = 7
3,498,374 UART: [idev] UDS.KEYID = 0
3,499,313 ready_for_fw is high
3,499,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,643,023 UART: [idev] Erasing UDS.KEYID = 0
6,006,321 UART: [idev] Sha1 KeyId Algorithm
6,030,975 UART: [idev] --
6,035,736 UART: [ldev] ++
6,036,309 UART: [ldev] CDI.KEYID = 6
6,037,226 UART: [ldev] SUBJECT.KEYID = 5
6,038,441 UART: [ldev] AUTHORITY.KEYID = 7
6,039,673 UART: [ldev] FE.KEYID = 1
6,078,237 UART: [ldev] Erasing FE.KEYID = 1
8,580,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,554 UART: [ldev] --
10,391,180 UART: [fwproc] Wait for Commands...
10,394,097 UART: [fwproc] Recv command 0x46574c44
10,396,192 UART: [fwproc] Recv'd Img size: 114168 bytes
13,798,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,934,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,252,456 >>> mbox cmd response: success
14,257,594 UART: [afmc] ++
14,258,194 UART: [afmc] CDI.KEYID = 6
14,259,109 UART: [afmc] SUBJECT.KEYID = 7
14,260,269 UART: [afmc] AUTHORITY.KEYID = 5
16,782,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,524,641 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,540,704 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,120 UART: [afmc] --
18,584,470 UART: [cold-reset] --
18,587,109 UART: [state] Locking Datavault
18,591,602 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,251 UART: [state] Locking ICCM
18,595,835 UART: [exit] Launching FMC @ 0x40000130
18,604,233 UART:
18,604,474 UART: Running Caliptra FMC ...
18,605,581 UART:
18,605,738 UART: [state] CFI Enabled
18,665,507 UART: [fht] FMC Alias Private Key: 7
20,430,156 UART: [art] Extend RT PCRs Done
20,431,367 UART: [art] Lock RT PCRs Done
20,433,018 UART: [art] Populate DV Done
20,438,322 UART: [fht] FMC Alias Private Key: 7
20,439,913 UART: [art] Derive CDI
20,440,731 UART: [art] Store in in slot 0x4
20,498,143 UART: [art] Derive Key Pair
20,499,203 UART: [art] Store priv key in slot 0x5
22,962,118 UART: [art] Derive Key Pair - Done
22,975,281 UART: [art] Signing Cert with AUTHO
22,976,584 UART: RITY.KEYID = 7
24,687,613 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,123 UART: [art] PUB.X = 3ADF66A9DB2FDB8850D286012A521B6CDFC0F4B9DF2D5513C2DB8E65410FB73C330D8497480BBC14B7A6C08EA619F863
24,696,431 UART: [art] PUB.Y = 18C3CEBBA66F2C72FF5DB836C5A9EEDA7B957861E0120C4F97796AA8CEEB0CB81123E1F234201F0B20CA20160DBBF70A
24,703,702 UART: [art] SIG.R = 6F00900E1965A124A407404E3E9C8B33BBC31D84E50493637EBCBA1B1F54CD4BA0AE57A1B274CEEF0547D27DAAD0A936
24,711,073 UART: [art] SIG.S = E7221BFFEF0C6836FD99A7681A3B10DA420A345A43698A4D08F28A6690C1217EDF5D59E67B93ED949905F59BAC365EB1
25,690,371 UART: Caliptra RT
25,691,089 UART: [state] CFI Enabled
25,855,079 UART: [rt] RT listening for mailbox commands...
25,857,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,012,825 UART: [rt]cmd =0x41544d4e, len=14344
30,009,030 >>> mbox cmd response data (8 bytes)
30,009,853 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,040,490 UART: [rt]cmd =0x41545348, len=116
30,060,405 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
3,377,873 ready_for_fw is high
3,378,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,073,131 >>> mbox cmd response: success
18,353,550 UART:
18,353,950 UART: Running Caliptra FMC ...
18,355,100 UART:
18,355,267 UART: [state] CFI Enabled
18,420,040 UART: [fht] FMC Alias Private Key: 7
20,182,957 UART: [art] Extend RT PCRs Done
20,184,156 UART: [art] Lock RT PCRs Done
20,185,616 UART: [art] Populate DV Done
20,191,013 UART: [fht] FMC Alias Private Key: 7
20,192,558 UART: [art] Derive CDI
20,193,377 UART: [art] Store in in slot 0x4
20,252,343 UART: [art] Derive Key Pair
20,253,389 UART: [art] Store priv key in slot 0x5
22,716,133 UART: [art] Derive Key Pair - Done
22,728,968 UART: [art] Signing Cert with AUTHO
22,730,301 UART: RITY.KEYID = 7
24,441,828 UART: [art] Erasing AUTHORITY.KEYID = 7
24,443,317 UART: [art] PUB.X = 9E55CCF559D6CE53456C56040C92E6B82E20C87B766A824BA64D91855D66468E966C3384C5CC6C78CEFC0EC8DC708CA4
24,450,605 UART: [art] PUB.Y = 0EA570D9433DA322C2D6ADA6049773EA9865973AA3ABD0F636F15D4208944F9AD1F80DDD251467E5441A8D2F98DC825C
24,457,859 UART: [art] SIG.R = 4B21836570AD4FF277960BFA241F71B6A97AC997DA78751B8DFAAF18ED56A2E2EDC53F36CFDF0115FE9F2FE0ED5DD4CA
24,465,299 UART: [art] SIG.S = D9E49CB62A7D0A084AA7CB2340E8DE80D113C308D4BC81EF3B47069222543199D06080BD74D1FCCCC0CB49FE5D07F4F1
25,444,469 UART: Caliptra RT
25,445,187 UART: [state] CFI Enabled
25,610,214 UART: [rt] RT listening for mailbox commands...
25,612,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,767,805 UART: [rt]cmd =0x41544d4e, len=14344
29,763,226 >>> mbox cmd response data (8 bytes)
29,763,846 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,794,556 UART: [rt]cmd =0x41545348, len=116
29,814,984 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,815 writing to cptra_bootfsm_go
193,086 UART:
193,461 UART: Running Caliptra ROM ...
194,666 UART:
604,250 UART: [state] CFI Enabled
620,786 UART: [state] LifecycleState = Unprovisioned
622,706 UART: [state] DebugLocked = No
625,026 UART: [state] WD Timer not started. Device not locked for debugging
628,369 UART: [kat] SHA2-256
807,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,090 UART: [kat] ++
819,539 UART: [kat] sha1
830,623 UART: [kat] SHA2-256
833,634 UART: [kat] SHA2-384
839,837 UART: [kat] SHA2-512-ACC
842,842 UART: [kat] ECC-384
3,283,796 UART: [kat] HMAC-384Kdf
3,297,095 UART: [kat] LMS
3,826,558 UART: [kat] --
3,830,357 UART: [cold-reset] ++
3,832,080 UART: [fht] FHT @ 0x50003400
3,843,910 UART: [idev] ++
3,844,472 UART: [idev] CDI.KEYID = 6
3,845,502 UART: [idev] SUBJECT.KEYID = 7
3,846,626 UART: [idev] UDS.KEYID = 0
3,847,558 ready_for_fw is high
3,847,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,214 UART: [idev] Erasing UDS.KEYID = 0
6,323,164 UART: [idev] Sha1 KeyId Algorithm
6,346,083 UART: [idev] --
6,348,475 UART: [ldev] ++
6,349,043 UART: [ldev] CDI.KEYID = 6
6,349,930 UART: [ldev] SUBJECT.KEYID = 5
6,351,147 UART: [ldev] AUTHORITY.KEYID = 7
6,352,380 UART: [ldev] FE.KEYID = 1
6,362,926 UART: [ldev] Erasing FE.KEYID = 1
8,841,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,554 UART: [ldev] --
10,631,284 UART: [fwproc] Wait for Commands...
10,632,895 UART: [fwproc] Recv command 0x46574c44
10,634,984 UART: [fwproc] Recv'd Img size: 114168 bytes
14,034,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,498,381 >>> mbox cmd response: success
14,503,273 UART: [afmc] ++
14,503,881 UART: [afmc] CDI.KEYID = 6
14,504,797 UART: [afmc] SUBJECT.KEYID = 7
14,505,963 UART: [afmc] AUTHORITY.KEYID = 5
17,005,800 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,800 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,615 UART: [afmc] --
18,803,128 UART: [cold-reset] --
18,807,043 UART: [state] Locking Datavault
18,814,078 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,780 UART: [state] Locking ICCM
18,818,040 UART: [exit] Launching FMC @ 0x40000130
18,826,498 UART:
18,826,741 UART: Running Caliptra FMC ...
18,827,843 UART:
18,828,007 UART: [state] CFI Enabled
18,836,170 UART: [fht] FMC Alias Private Key: 7
20,592,889 UART: [art] Extend RT PCRs Done
20,594,106 UART: [art] Lock RT PCRs Done
20,595,637 UART: [art] Populate DV Done
20,601,431 UART: [fht] FMC Alias Private Key: 7
20,602,971 UART: [art] Derive CDI
20,603,788 UART: [art] Store in in slot 0x4
20,646,273 UART: [art] Derive Key Pair
20,647,314 UART: [art] Store priv key in slot 0x5
23,074,290 UART: [art] Derive Key Pair - Done
23,087,509 UART: [art] Signing Cert with AUTHO
23,088,823 UART: RITY.KEYID = 7
24,794,274 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,785 UART: [art] PUB.X = AFBD67D96B73AE86D078548CAACBF3A5E121FCB1D87201C9E6E98D1806C606525E7A9C5A3BFE8833B41A76B55E572E62
24,803,050 UART: [art] PUB.Y = 7F0F335996CBD05AB22858B6E958D5108D07AA108BBB59B1F5A304A4980CB9E6328D0DC4AE19264771BF600AE56462FE
24,810,299 UART: [art] SIG.R = 38B472DE3806779EF12D5E4AC2898E6553C5DF4DA310B80709CF8C676DC04306E293240ADB395C739EDEFAF59B713923
24,817,695 UART: [art] SIG.S = 27AEFDA4773D1AC2B8184CCFAC7B777CD0F0BD8DB86E9D5FB66C4DCCB20D15FD1F5329B14AFD2D58DCDCE9A3700A9D34
25,796,320 UART: Caliptra RT
25,797,036 UART: [state] CFI Enabled
25,913,544 UART: [rt] RT listening for mailbox commands...
25,915,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,071,435 UART: [rt]cmd =0x41544d4e, len=14344
30,067,925 >>> mbox cmd response data (8 bytes)
30,068,512 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,099,138 UART: [rt]cmd =0x41545348, len=116
30,119,064 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,934 writing to cptra_bootfsm_go
3,694,578 ready_for_fw is high
3,694,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,271,469 >>> mbox cmd response: success
18,519,915 UART:
18,520,355 UART: Running Caliptra FMC ...
18,521,554 UART:
18,521,729 UART: [state] CFI Enabled
18,529,567 UART: [fht] FMC Alias Private Key: 7
20,286,919 UART: [art] Extend RT PCRs Done
20,288,134 UART: [art] Lock RT PCRs Done
20,289,653 UART: [art] Populate DV Done
20,294,955 UART: [fht] FMC Alias Private Key: 7
20,296,528 UART: [art] Derive CDI
20,297,352 UART: [art] Store in in slot 0x4
20,339,654 UART: [art] Derive Key Pair
20,340,660 UART: [art] Store priv key in slot 0x5
22,767,344 UART: [art] Derive Key Pair - Done
22,780,454 UART: [art] Signing Cert with AUTHO
22,781,798 UART: RITY.KEYID = 7
24,486,909 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,422 UART: [art] PUB.X = DF6F9EE54797B6BB00065EEFA53A494E29238A322F3439A2E4C1AB74FC885542BB4B65C5D83B3F75045AC361C703067A
24,495,678 UART: [art] PUB.Y = 2BCA9BE746584231F6ADD606BBFC8D432378C7A97B1F0753921EC63A24CC6F0586AB79C75C45248CB04842FD72996576
24,502,946 UART: [art] SIG.R = D81EC8D83ACEB55859E78E8E64DDCA4C0E5E9D127416D3C1434260CF23D06ACCCC93F0D7D55EF3ADC444679AF70F2B09
24,510,336 UART: [art] SIG.S = 85A2E8ECF4D352015782A9F66A7B3E66FE54CD5EEFED955C55E5120DFB8A4A459F0527F433C853BA86697564A8A7075E
25,489,421 UART: Caliptra RT
25,490,130 UART: [state] CFI Enabled
25,606,920 UART: [rt] RT listening for mailbox commands...
25,609,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,764,659 UART: [rt]cmd =0x41544d4e, len=14344
29,760,602 >>> mbox cmd response data (8 bytes)
29,761,195 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,791,983 UART: [rt]cmd =0x41545348, len=116
29,812,670 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,250 UART:
192,621 UART: Running Caliptra ROM ...
193,840 UART:
193,994 UART: [state] CFI Enabled
264,612 UART: [state] LifecycleState = Unprovisioned
266,674 UART: [state] DebugLocked = No
268,782 UART: [state] WD Timer not started. Device not locked for debugging
272,972 UART: [kat] SHA2-256
462,851 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,614 UART: [kat] ++
474,111 UART: [kat] sha1
485,771 UART: [kat] SHA2-256
488,793 UART: [kat] SHA2-384
494,144 UART: [kat] SHA2-512-ACC
496,755 UART: [kat] ECC-384
2,947,070 UART: [kat] HMAC-384Kdf
2,972,474 UART: [kat] LMS
3,504,186 UART: [kat] --
3,508,898 UART: [cold-reset] ++
3,509,788 UART: [fht] FHT @ 0x50003400
3,520,340 UART: [idev] ++
3,521,050 UART: [idev] CDI.KEYID = 6
3,521,941 UART: [idev] SUBJECT.KEYID = 7
3,523,184 UART: [idev] UDS.KEYID = 0
3,524,446 ready_for_fw is high
3,524,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,436 UART: [idev] Erasing UDS.KEYID = 0
6,028,796 UART: [idev] Sha1 KeyId Algorithm
6,050,565 UART: [idev] --
6,055,691 UART: [ldev] ++
6,056,377 UART: [ldev] CDI.KEYID = 6
6,057,293 UART: [ldev] SUBJECT.KEYID = 5
6,058,456 UART: [ldev] AUTHORITY.KEYID = 7
6,059,688 UART: [ldev] FE.KEYID = 1
6,101,172 UART: [ldev] Erasing FE.KEYID = 1
8,609,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,406 UART: [ldev] --
10,414,990 UART: [fwproc] Wait for Commands...
10,416,935 UART: [fwproc] Recv command 0x46574c44
10,419,248 UART: [fwproc] Recv'd Img size: 114168 bytes
13,860,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,603,210 >>> mbox cmd response: success
14,606,648 UART: [afmc] ++
14,607,361 UART: [afmc] CDI.KEYID = 6
14,608,562 UART: [afmc] SUBJECT.KEYID = 7
14,610,014 UART: [afmc] AUTHORITY.KEYID = 5
17,152,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,659 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,969 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,220 UART: [afmc] --
18,951,286 UART: [cold-reset] --
18,955,710 UART: [state] Locking Datavault
18,961,792 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,007 UART: [state] Locking ICCM
18,965,901 UART: [exit] Launching FMC @ 0x40000130
18,974,593 UART:
18,974,835 UART: Running Caliptra FMC ...
18,975,939 UART:
18,976,097 UART: [state] CFI Enabled
19,033,384 UART: [fht] FMC Alias Private Key: 7
20,797,792 UART: [art] Extend RT PCRs Done
20,798,987 UART: [art] Lock RT PCRs Done
20,800,721 UART: [art] Populate DV Done
20,806,081 UART: [fht] FMC Alias Private Key: 7
20,807,641 UART: [art] Derive CDI
20,808,457 UART: [art] Store in in slot 0x4
20,866,517 UART: [art] Derive Key Pair
20,867,579 UART: [art] Store priv key in slot 0x5
23,330,828 UART: [art] Derive Key Pair - Done
23,343,495 UART: [art] Signing Cert with AUTHO
23,344,793 UART: RITY.KEYID = 7
25,056,585 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,090 UART: [art] PUB.X = FFA79DF3B86B0B5A3B2AFC869533D64CE4D7695B0E2BF6371C566ADE3FEB47B10B508B9C38DF8E660842DA0320E1D790
25,065,363 UART: [art] PUB.Y = F26A788229684A5C7AD0AFA9210386B4E2D21434B8D5FA5322704F517DE8995C3E2B9778EA30601F1CF62125AA81DC04
25,072,627 UART: [art] SIG.R = BFE4AECD6FC106516C1AC05465E3DB91537E8BCA805D7A35127A328BA5C6A391E35C8BF450A0BF721D3F9B31B3CCFC6E
25,079,999 UART: [art] SIG.S = 5A93108177A01D72D9C82DED63730C5D3869DC4E7460271D7A722F0D36A24D1E7727CAC5C33C2A121DB6E739F2771660
26,059,390 UART: Caliptra RT
26,060,095 UART: [state] CFI Enabled
26,223,757 UART: [rt] RT listening for mailbox commands...
26,226,363 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,381,613 UART: [rt]cmd =0x41544d4e, len=14344
30,377,029 >>> mbox cmd response data (8 bytes)
30,377,639 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,408,330 UART: [rt]cmd =0x41545348, len=116
30,428,164 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,439,552 ready_for_fw is high
3,439,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,734,993 >>> mbox cmd response: success
19,027,682 UART:
19,028,080 UART: Running Caliptra FMC ...
19,029,224 UART:
19,029,391 UART: [state] CFI Enabled
19,093,921 UART: [fht] FMC Alias Private Key: 7
20,858,362 UART: [art] Extend RT PCRs Done
20,859,591 UART: [art] Lock RT PCRs Done
20,861,275 UART: [art] Populate DV Done
20,866,595 UART: [fht] FMC Alias Private Key: 7
20,868,192 UART: [art] Derive CDI
20,869,008 UART: [art] Store in in slot 0x4
20,926,642 UART: [art] Derive Key Pair
20,927,679 UART: [art] Store priv key in slot 0x5
23,390,727 UART: [art] Derive Key Pair - Done
23,403,674 UART: [art] Signing Cert with AUTHO
23,404,978 UART: RITY.KEYID = 7
25,116,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,382 UART: [art] PUB.X = EF0D2B0EC39C933D01FC2F2929B58EAF72C455F51BB1260FA1642B9EACC2F917885159D5D6704A41D64E99AAAC6589BA
25,125,679 UART: [art] PUB.Y = 1BEBED52C44A20253E7B07E97663214313DB44ADE033C3C1AAECEBECC40E638653E3367432DCA5C2DA20E97DC8B1AB49
25,132,923 UART: [art] SIG.R = A5B71727197E61748A6694498809D1268CF0AA3F802FDBF0D84FB13F78ED26F6DD3D523B3BD19696EE2FED41B3C8E8A6
25,140,338 UART: [art] SIG.S = 4246E99532F7009DFC746FE1792F921B99CDEE88EDA475F0083D215A9390BFCC1DE3E61B72C7D575F62CF70ECBF770A9
26,118,714 UART: Caliptra RT
26,119,419 UART: [state] CFI Enabled
26,285,620 UART: [rt] RT listening for mailbox commands...
26,288,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,443,103 UART: [rt]cmd =0x41544d4e, len=14344
30,438,406 >>> mbox cmd response data (8 bytes)
30,438,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,469,652 UART: [rt]cmd =0x41545348, len=116
30,488,374 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,961 writing to cptra_bootfsm_go
193,275 UART:
193,634 UART: Running Caliptra ROM ...
194,860 UART:
604,310 UART: [state] CFI Enabled
620,258 UART: [state] LifecycleState = Unprovisioned
622,645 UART: [state] DebugLocked = No
623,965 UART: [state] WD Timer not started. Device not locked for debugging
627,788 UART: [kat] SHA2-256
817,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,494 UART: [kat] ++
829,119 UART: [kat] sha1
840,642 UART: [kat] SHA2-256
843,660 UART: [kat] SHA2-384
849,647 UART: [kat] SHA2-512-ACC
852,227 UART: [kat] ECC-384
3,294,290 UART: [kat] HMAC-384Kdf
3,307,313 UART: [kat] LMS
3,839,116 UART: [kat] --
3,842,919 UART: [cold-reset] ++
3,844,999 UART: [fht] FHT @ 0x50003400
3,857,322 UART: [idev] ++
3,858,026 UART: [idev] CDI.KEYID = 6
3,858,984 UART: [idev] SUBJECT.KEYID = 7
3,860,108 UART: [idev] UDS.KEYID = 0
3,861,103 ready_for_fw is high
3,861,295 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,679 UART: [idev] Erasing UDS.KEYID = 0
6,339,219 UART: [idev] Sha1 KeyId Algorithm
6,362,656 UART: [idev] --
6,368,533 UART: [ldev] ++
6,369,266 UART: [ldev] CDI.KEYID = 6
6,370,149 UART: [ldev] SUBJECT.KEYID = 5
6,371,358 UART: [ldev] AUTHORITY.KEYID = 7
6,372,532 UART: [ldev] FE.KEYID = 1
6,382,242 UART: [ldev] Erasing FE.KEYID = 1
8,865,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,905 UART: [ldev] --
10,653,736 UART: [fwproc] Wait for Commands...
10,656,228 UART: [fwproc] Recv command 0x46574c44
10,658,483 UART: [fwproc] Recv'd Img size: 114168 bytes
14,102,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,953 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,835,696 >>> mbox cmd response: success
14,840,058 UART: [afmc] ++
14,840,765 UART: [afmc] CDI.KEYID = 6
14,842,005 UART: [afmc] SUBJECT.KEYID = 7
14,843,441 UART: [afmc] AUTHORITY.KEYID = 5
17,347,775 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,961 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,200 UART: [afmc] --
19,143,852 UART: [cold-reset] --
19,149,172 UART: [state] Locking Datavault
19,155,025 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,165 UART: [state] Locking ICCM
19,160,186 UART: [exit] Launching FMC @ 0x40000130
19,168,865 UART:
19,169,109 UART: Running Caliptra FMC ...
19,170,138 UART:
19,170,287 UART: [state] CFI Enabled
19,178,135 UART: [fht] FMC Alias Private Key: 7
20,935,506 UART: [art] Extend RT PCRs Done
20,936,726 UART: [art] Lock RT PCRs Done
20,938,374 UART: [art] Populate DV Done
20,943,572 UART: [fht] FMC Alias Private Key: 7
20,945,269 UART: [art] Derive CDI
20,946,028 UART: [art] Store in in slot 0x4
20,988,684 UART: [art] Derive Key Pair
20,989,685 UART: [art] Store priv key in slot 0x5
23,416,202 UART: [art] Derive Key Pair - Done
23,428,988 UART: [art] Signing Cert with AUTHO
23,430,304 UART: RITY.KEYID = 7
25,135,924 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,431 UART: [art] PUB.X = C9BCCC0A52040B86A41A708A748BF92D403429DC3C7D6D7B79CC4B00AFDC636B0EA7000A3ABAEEBB479F00FEE4BE5B40
25,144,630 UART: [art] PUB.Y = 75FF0B3E77FEC615317ECCD8B1A43279669FBC77BD93A85818CC0EDEABE787DBBC6DB50CEC3F5A3C26116979626CC048
25,151,915 UART: [art] SIG.R = 7F7135F9052BB0E81B7D5534F1780AA8F24A833E6D49FACBD04E677A98B1E3F8D6DC90730B0DB34064C159C3FA9EBF9D
25,159,303 UART: [art] SIG.S = 71394C4FC433169FA8067634F0E182D5EE31F384ED95176F5D27B4A83D698955F31B33C14529363CC70625DEF8C780E9
26,138,348 UART: Caliptra RT
26,139,052 UART: [state] CFI Enabled
26,255,661 UART: [rt] RT listening for mailbox commands...
26,258,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,413,491 UART: [rt]cmd =0x41544d4e, len=14344
30,408,592 >>> mbox cmd response data (8 bytes)
30,409,720 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,440,487 UART: [rt]cmd =0x41545348, len=116
30,460,228 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
3,758,943 ready_for_fw is high
3,759,324 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,963,809 >>> mbox cmd response: success
19,222,439 UART:
19,222,820 UART: Running Caliptra FMC ...
19,223,921 UART:
19,224,073 UART: [state] CFI Enabled
19,232,072 UART: [fht] FMC Alias Private Key: 7
20,989,194 UART: [art] Extend RT PCRs Done
20,990,421 UART: [art] Lock RT PCRs Done
20,992,289 UART: [art] Populate DV Done
20,997,753 UART: [fht] FMC Alias Private Key: 7
20,999,401 UART: [art] Derive CDI
21,000,137 UART: [art] Store in in slot 0x4
21,043,066 UART: [art] Derive Key Pair
21,044,115 UART: [art] Store priv key in slot 0x5
23,471,014 UART: [art] Derive Key Pair - Done
23,484,080 UART: [art] Signing Cert with AUTHO
23,485,382 UART: RITY.KEYID = 7
25,191,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,192,729 UART: [art] PUB.X = 9AEA1066CCF8D2CFECC93E67AAD4B233EAD710C8ECC40ACC8B20ED775A73583FEB0A84D27E303EBB14098CDD77E8016B
25,199,976 UART: [art] PUB.Y = E739FF381F04330F4A721FA268DB43CE717F89F82594F00C3E6CA8A434CFA4E7FD3FF3DEB55F7F80290266B1E293F2BB
25,207,245 UART: [art] SIG.R = 06FA9E0D7C37766B097F8CD0DD8666A510AE8E107CDDDCC24E05FD97A2CA586D8CF70CA59C48BAFA78E175D2F8766106
25,214,640 UART: [art] SIG.S = 5B17498769DF417D055196205187D1092CD8F9F856BA8BF596FB6C5AF7EEE4428D3E77CF2EECE3C44A854D78300BB74D
26,193,542 UART: Caliptra RT
26,194,243 UART: [state] CFI Enabled
26,310,809 UART: [rt] RT listening for mailbox commands...
26,313,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,468,793 UART: [rt]cmd =0x41544d4e, len=14344
30,464,138 >>> mbox cmd response data (8 bytes)
30,464,737 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,495,689 UART: [rt]cmd =0x41545348, len=116
30,515,928 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
894,878 UART: [kat] SHA2-512-ACC
896,779 UART: [kat] ECC-384
902,290 UART: [kat] HMAC-384Kdf
907,018 UART: [kat] LMS
1,475,214 UART: [kat] --
1,476,039 UART: [cold-reset] ++
1,476,559 UART: [fht] Storing FHT @ 0x50003400
1,479,314 UART: [idev] ++
1,479,482 UART: [idev] CDI.KEYID = 6
1,479,842 UART: [idev] SUBJECT.KEYID = 7
1,480,266 UART: [idev] UDS.KEYID = 0
1,480,611 ready_for_fw is high
1,480,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,498 UART: [idev] Erasing UDS.KEYID = 0
1,504,838 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,432 UART: [idev] --
1,514,451 UART: [ldev] ++
1,514,619 UART: [ldev] CDI.KEYID = 6
1,514,982 UART: [ldev] SUBJECT.KEYID = 5
1,515,408 UART: [ldev] AUTHORITY.KEYID = 7
1,515,871 UART: [ldev] FE.KEYID = 1
1,520,989 UART: [ldev] Erasing FE.KEYID = 1
1,546,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,272 UART: [ldev] --
1,585,641 UART: [fwproc] Waiting for Commands...
1,586,354 UART: [fwproc] Received command 0x46574c44
1,587,145 UART: [fwproc] Received Image of size 114168 bytes
2,883,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,427 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,386 >>> mbox cmd response: success
3,077,406 UART: [afmc] ++
3,077,574 UART: [afmc] CDI.KEYID = 6
3,077,936 UART: [afmc] SUBJECT.KEYID = 7
3,078,361 UART: [afmc] AUTHORITY.KEYID = 5
3,113,532 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,148 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,761 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,451 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,184 UART: [afmc] --
3,156,150 UART: [cold-reset] --
3,157,196 UART: [state] Locking Datavault
3,158,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,831 UART: [state] Locking ICCM
3,159,491 UART: [exit] Launching FMC @ 0x40000130
3,164,820 UART:
3,164,836 UART: Running Caliptra FMC ...
3,165,244 UART:
3,165,298 UART: [state] CFI Enabled
3,175,645 UART: [fht] FMC Alias Private Key: 7
3,283,708 UART: [art] Extend RT PCRs Done
3,284,136 UART: [art] Lock RT PCRs Done
3,285,488 UART: [art] Populate DV Done
3,293,625 UART: [fht] FMC Alias Private Key: 7
3,294,667 UART: [art] Derive CDI
3,294,947 UART: [art] Store in in slot 0x4
3,380,346 UART: [art] Derive Key Pair
3,380,706 UART: [art] Store priv key in slot 0x5
3,393,566 UART: [art] Derive Key Pair - Done
3,408,061 UART: [art] Signing Cert with AUTHO
3,408,541 UART: RITY.KEYID = 7
3,423,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,248 UART: [art] PUB.X = 43F94448BFF662A4B2332B504442C2F47DF5400D5FAE8CC1F8BACE38AD6F1732D6D4CA494EBFDC9FE8609B741C1A5B95
3,431,033 UART: [art] PUB.Y = 8B21B04CEBC89D63DB51B79BF4CD6841814AC960AE0334B9C0D8E2632D6AC18BEDFBBE13103A92AD0D045B76CF30C284
3,437,992 UART: [art] SIG.R = 87EEE39017223430C11F51C3C799A60A5ABD7EF3AC772F9B94A85C8368372D9A57CB03B31E261BCA24EC6068DBBF4552
3,444,764 UART: [art] SIG.S = D0DD69CDB53199712849AA44694A07F7939358BFABC1EA11E9BD245D3BDEBCEBB69ABB94B495E7B19443761C65D67CEE
3,468,130 UART: Caliptra RT
3,468,383 UART: [state] CFI Enabled
3,576,031 UART: [rt] RT listening for mailbox commands...
3,576,701 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,699,965 UART: [rt]cmd =0x41544d4e, len=14344
4,009,363 >>> mbox cmd response data (8 bytes)
4,009,364 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,335 UART: [rt]cmd =0x41545348, len=116
4,061,548 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,711 ready_for_fw is high
1,362,711 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,462 >>> mbox cmd response: success
2,987,700 UART:
2,987,716 UART: Running Caliptra FMC ...
2,988,124 UART:
2,988,178 UART: [state] CFI Enabled
2,998,735 UART: [fht] FMC Alias Private Key: 7
3,107,382 UART: [art] Extend RT PCRs Done
3,107,810 UART: [art] Lock RT PCRs Done
3,109,790 UART: [art] Populate DV Done
3,118,223 UART: [fht] FMC Alias Private Key: 7
3,119,363 UART: [art] Derive CDI
3,119,643 UART: [art] Store in in slot 0x4
3,205,420 UART: [art] Derive Key Pair
3,205,780 UART: [art] Store priv key in slot 0x5
3,219,196 UART: [art] Derive Key Pair - Done
3,233,463 UART: [art] Signing Cert with AUTHO
3,233,943 UART: RITY.KEYID = 7
3,249,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,962 UART: [art] PUB.X = 80143B50C403750E828F8F4B7FE96C36620C2E3FA2AB6910591F1DAAA243A83D1C471335E3A5A1A770790E64C253ADB8
3,256,722 UART: [art] PUB.Y = BBDA4675991493F5FADF2A2F8B401BD9A5F2B6E9E51EF79A8C41740D2A1D7DA07A32025FF459D0F0D710727B9CF7F16C
3,263,682 UART: [art] SIG.R = 3FC7A5F1D235B0707721C4F4B4CFE448CE545CEF69BBE6EF7017E83DB6EC53F924395B7EEC1FDBAF677E49BFAA59C5F6
3,270,478 UART: [art] SIG.S = 62316937DF34357F4F1CA80F79CB77FF7467E4AE83980E4E8E6547F954E5F2C62A37A1C5BE208BF9252BF1B60271352C
3,294,086 UART: Caliptra RT
3,294,339 UART: [state] CFI Enabled
3,403,169 UART: [rt] RT listening for mailbox commands...
3,403,839 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,799 UART: [rt]cmd =0x41544d4e, len=14344
3,836,243 >>> mbox cmd response data (8 bytes)
3,836,244 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,241 UART: [rt]cmd =0x41545348, len=116
3,888,096 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
891,072 UART: [kat] SHA2-256
893,010 UART: [kat] SHA2-384
895,723 UART: [kat] SHA2-512-ACC
897,624 UART: [kat] ECC-384
903,247 UART: [kat] HMAC-384Kdf
907,875 UART: [kat] LMS
1,476,071 UART: [kat] --
1,476,998 UART: [cold-reset] ++
1,477,368 UART: [fht] Storing FHT @ 0x50003400
1,480,159 UART: [idev] ++
1,480,327 UART: [idev] CDI.KEYID = 6
1,480,687 UART: [idev] SUBJECT.KEYID = 7
1,481,111 UART: [idev] UDS.KEYID = 0
1,481,456 ready_for_fw is high
1,481,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,387 UART: [idev] --
1,515,450 UART: [ldev] ++
1,515,618 UART: [ldev] CDI.KEYID = 6
1,515,981 UART: [ldev] SUBJECT.KEYID = 5
1,516,407 UART: [ldev] AUTHORITY.KEYID = 7
1,516,870 UART: [ldev] FE.KEYID = 1
1,521,886 UART: [ldev] Erasing FE.KEYID = 1
1,547,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,365 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,475 UART: [fwproc] Received command 0x46574c44
1,588,266 UART: [fwproc] Received Image of size 114168 bytes
2,884,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,542 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,619 >>> mbox cmd response: success
3,077,819 UART: [afmc] ++
3,077,987 UART: [afmc] CDI.KEYID = 6
3,078,349 UART: [afmc] SUBJECT.KEYID = 7
3,078,774 UART: [afmc] AUTHORITY.KEYID = 5
3,114,193 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,449 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,229 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,842 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,532 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,335 UART: [afmc] --
3,157,259 UART: [cold-reset] --
3,158,121 UART: [state] Locking Datavault
3,159,486 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,090 UART: [state] Locking ICCM
3,160,694 UART: [exit] Launching FMC @ 0x40000130
3,166,023 UART:
3,166,039 UART: Running Caliptra FMC ...
3,166,447 UART:
3,166,590 UART: [state] CFI Enabled
3,177,003 UART: [fht] FMC Alias Private Key: 7
3,285,126 UART: [art] Extend RT PCRs Done
3,285,554 UART: [art] Lock RT PCRs Done
3,287,196 UART: [art] Populate DV Done
3,295,335 UART: [fht] FMC Alias Private Key: 7
3,296,511 UART: [art] Derive CDI
3,296,791 UART: [art] Store in in slot 0x4
3,382,540 UART: [art] Derive Key Pair
3,382,900 UART: [art] Store priv key in slot 0x5
3,396,592 UART: [art] Derive Key Pair - Done
3,411,530 UART: [art] Signing Cert with AUTHO
3,412,010 UART: RITY.KEYID = 7
3,427,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,273 UART: [art] PUB.X = F8A73CDE1CCA76531089F1DAA9DB6262B42A3930BA32E677829BEB2F45A27D81C43B69234C47C172C5BC945AB9E6FF51
3,435,055 UART: [art] PUB.Y = 0967E79EAD5DCC28A637AB64F5329D51179CF184F79D1140CAEBFA7AF840A45539C25798D470E3A21EDE7F68B98A212A
3,442,012 UART: [art] SIG.R = 9BF9815EA185C0FA5DF232564209555242074CC92CA702FBE92A239276538043545FCC0296FED18C66B1F74A08686032
3,448,759 UART: [art] SIG.S = A478CFF1940F02FC796962FB8DE2093175B81F2DD8A7E31E1F3696FD6E76CB19798D4D084281664BCDB8901ED05C45F6
3,472,348 UART: Caliptra RT
3,472,693 UART: [state] CFI Enabled
3,580,907 UART: [rt] RT listening for mailbox commands...
3,581,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,443 UART: [rt]cmd =0x41544d4e, len=14344
4,014,077 >>> mbox cmd response data (8 bytes)
4,014,078 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,243 UART: [rt]cmd =0x41545348, len=116
4,066,248 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,070 ready_for_fw is high
1,362,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,817 >>> mbox cmd response: success
2,987,663 UART:
2,987,679 UART: Running Caliptra FMC ...
2,988,087 UART:
2,988,230 UART: [state] CFI Enabled
2,998,909 UART: [fht] FMC Alias Private Key: 7
3,107,064 UART: [art] Extend RT PCRs Done
3,107,492 UART: [art] Lock RT PCRs Done
3,108,886 UART: [art] Populate DV Done
3,116,991 UART: [fht] FMC Alias Private Key: 7
3,118,093 UART: [art] Derive CDI
3,118,373 UART: [art] Store in in slot 0x4
3,203,784 UART: [art] Derive Key Pair
3,204,144 UART: [art] Store priv key in slot 0x5
3,217,634 UART: [art] Derive Key Pair - Done
3,232,370 UART: [art] Signing Cert with AUTHO
3,232,850 UART: RITY.KEYID = 7
3,247,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,563 UART: [art] PUB.X = 6DD54997C137CE071F89492FAC149E7D0BE0D9F818F454E86264B690D5F5FBC71448DAE847C4CBF58A605906B7DD84CD
3,255,334 UART: [art] PUB.Y = 532E27C07676E741A860DC67EB0EC54E38BCA0C95B75FA9436A960854295F8ED47CDB6E78BB4E566FC0FD91821440EDF
3,262,285 UART: [art] SIG.R = 598F475B611CDBD0AE3681D5CE8D081FC06590A71B9DB9AD9C1664544AF034F7B0E635D43505D45AB83616885D4B0FF4
3,269,052 UART: [art] SIG.S = 644CB06244B72E72036001BFABFABE842059942919A58FAC28906EF21F989205BA86E955F912A0B2BFF268C135DB7279
3,293,104 UART: Caliptra RT
3,293,449 UART: [state] CFI Enabled
3,403,125 UART: [rt] RT listening for mailbox commands...
3,403,795 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,779 UART: [rt]cmd =0x41544d4e, len=14344
3,836,669 >>> mbox cmd response data (8 bytes)
3,836,670 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,867,061 UART: [rt]cmd =0x41545348, len=116
3,888,956 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
918,060 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,739 UART: [cold-reset] ++
1,172,163 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 ready_for_fw is high
1,176,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,426 UART: [idev] Erasing UDS.KEYID = 0
1,200,553 UART: [idev] Sha1 KeyId Algorithm
1,209,081 UART: [idev] --
1,210,143 UART: [ldev] ++
1,210,311 UART: [ldev] CDI.KEYID = 6
1,210,674 UART: [ldev] SUBJECT.KEYID = 5
1,211,100 UART: [ldev] AUTHORITY.KEYID = 7
1,211,563 UART: [ldev] FE.KEYID = 1
1,216,639 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,197 UART: [ldev] --
1,282,568 UART: [fwproc] Wait for Commands...
1,283,290 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,615 >>> mbox cmd response: success
2,773,859 UART: [afmc] ++
2,774,027 UART: [afmc] CDI.KEYID = 6
2,774,389 UART: [afmc] SUBJECT.KEYID = 7
2,774,814 UART: [afmc] AUTHORITY.KEYID = 5
2,810,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,522 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,270 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,602 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,352 UART: [afmc] --
2,853,412 UART: [cold-reset] --
2,854,398 UART: [state] Locking Datavault
2,855,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,867 UART: [state] Locking ICCM
2,856,403 UART: [exit] Launching FMC @ 0x40000130
2,861,732 UART:
2,861,748 UART: Running Caliptra FMC ...
2,862,156 UART:
2,862,210 UART: [state] CFI Enabled
2,872,549 UART: [fht] FMC Alias Private Key: 7
2,980,632 UART: [art] Extend RT PCRs Done
2,981,060 UART: [art] Lock RT PCRs Done
2,982,536 UART: [art] Populate DV Done
2,990,755 UART: [fht] FMC Alias Private Key: 7
2,991,733 UART: [art] Derive CDI
2,992,013 UART: [art] Store in in slot 0x4
3,077,614 UART: [art] Derive Key Pair
3,077,974 UART: [art] Store priv key in slot 0x5
3,090,720 UART: [art] Derive Key Pair - Done
3,105,681 UART: [art] Signing Cert with AUTHO
3,106,161 UART: RITY.KEYID = 7
3,121,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,542 UART: [art] PUB.X = F1CD8C1A9F1D8A0212C86740FCB03F6D354F561D55B702EFF4EFBF4028A6C317ACF89CF0875C31888B65581781C94946
3,129,312 UART: [art] PUB.Y = D367D3FF16E656915122DEAD3D749528D5267194DA770B884505DFD1D05A05D16B1FE4BE12765DA970E1F134392F7530
3,136,251 UART: [art] SIG.R = D12EDCDCFE096D41DDD16DA4F8CEDE5CB04ED56C3B255B52635ADE200E23C54AC2265302E2158BAF1E357117096676AF
3,143,027 UART: [art] SIG.S = DD5C2D9B0BAF49087AE126C8D38B87185DC4FCC41C5A2B4D0B1E69573BA976F7D9190CC5D5742826A15B477EDFD1E256
3,166,542 UART: Caliptra RT
3,166,795 UART: [state] CFI Enabled
3,273,931 UART: [rt] RT listening for mailbox commands...
3,274,601 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,365 UART: [rt]cmd =0x41544d4e, len=14344
3,707,081 >>> mbox cmd response data (8 bytes)
3,707,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,061 UART: [rt]cmd =0x41545348, len=116
3,759,458 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 ready_for_fw is high
1,060,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,518 >>> mbox cmd response: success
2,686,342 UART:
2,686,358 UART: Running Caliptra FMC ...
2,686,766 UART:
2,686,820 UART: [state] CFI Enabled
2,697,161 UART: [fht] FMC Alias Private Key: 7
2,804,630 UART: [art] Extend RT PCRs Done
2,805,058 UART: [art] Lock RT PCRs Done
2,806,762 UART: [art] Populate DV Done
2,815,065 UART: [fht] FMC Alias Private Key: 7
2,816,239 UART: [art] Derive CDI
2,816,519 UART: [art] Store in in slot 0x4
2,902,162 UART: [art] Derive Key Pair
2,902,522 UART: [art] Store priv key in slot 0x5
2,915,370 UART: [art] Derive Key Pair - Done
2,929,974 UART: [art] Signing Cert with AUTHO
2,930,454 UART: RITY.KEYID = 7
2,945,516 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,281 UART: [art] PUB.X = 3774580FBE90EF7626DB1ECE9225624593F6DA9751217CA1B3DD512A6C9333AFA536F22D05200D0D7AB45DBA6B8E4ED4
2,953,049 UART: [art] PUB.Y = 4A37242DC933690AFF607B87A1205DF363C922BBA78D06718C6A219ABFBC34E1E7BFBEC21AB329ED15CD0AF2A21D7272
2,960,006 UART: [art] SIG.R = 6A004BCE41268FFFDDD47C75080DC3B610C36DA65C6EE77D89416DC91EAF21D3CDC24CB6C11036FA9263E06C564F54E0
2,966,764 UART: [art] SIG.S = 45788903B0AA3BC430186CE4BC174F50FC6A36FEADBE33385FAF08955B3261C940670F56BFA693019DE4C0D76F64D37F
2,990,549 UART: Caliptra RT
2,990,802 UART: [state] CFI Enabled
3,098,303 UART: [rt] RT listening for mailbox commands...
3,098,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,967 UART: [rt]cmd =0x41544d4e, len=14344
3,532,459 >>> mbox cmd response data (8 bytes)
3,532,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,523 UART: [rt]cmd =0x41545348, len=116
3,584,066 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,164 UART: [state] WD Timer not started. Device not locked for debugging
88,497 UART: [kat] SHA2-256
894,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,272 UART: [kat] ++
898,424 UART: [kat] sha1
902,856 UART: [kat] SHA2-256
904,796 UART: [kat] SHA2-384
907,403 UART: [kat] SHA2-512-ACC
909,304 UART: [kat] ECC-384
919,165 UART: [kat] HMAC-384Kdf
924,035 UART: [kat] LMS
1,172,363 UART: [kat] --
1,173,208 UART: [cold-reset] ++
1,173,590 UART: [fht] FHT @ 0x50003400
1,176,275 UART: [idev] ++
1,176,443 UART: [idev] CDI.KEYID = 6
1,176,803 UART: [idev] SUBJECT.KEYID = 7
1,177,227 UART: [idev] UDS.KEYID = 0
1,177,572 ready_for_fw is high
1,177,572 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,289 UART: [idev] Erasing UDS.KEYID = 0
1,202,716 UART: [idev] Sha1 KeyId Algorithm
1,211,090 UART: [idev] --
1,212,190 UART: [ldev] ++
1,212,358 UART: [ldev] CDI.KEYID = 6
1,212,721 UART: [ldev] SUBJECT.KEYID = 5
1,213,147 UART: [ldev] AUTHORITY.KEYID = 7
1,213,610 UART: [ldev] FE.KEYID = 1
1,218,646 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,572 UART: [ldev] --
1,284,019 UART: [fwproc] Wait for Commands...
1,284,695 UART: [fwproc] Recv command 0x46574c44
1,285,423 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,634 >>> mbox cmd response: success
2,775,678 UART: [afmc] ++
2,775,846 UART: [afmc] CDI.KEYID = 6
2,776,208 UART: [afmc] SUBJECT.KEYID = 7
2,776,633 UART: [afmc] AUTHORITY.KEYID = 5
2,812,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,899 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,627 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,019 UART: [afmc] --
2,855,987 UART: [cold-reset] --
2,856,699 UART: [state] Locking Datavault
2,857,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,326 UART: [state] Locking ICCM
2,858,916 UART: [exit] Launching FMC @ 0x40000130
2,864,245 UART:
2,864,261 UART: Running Caliptra FMC ...
2,864,669 UART:
2,864,812 UART: [state] CFI Enabled
2,875,529 UART: [fht] FMC Alias Private Key: 7
2,983,574 UART: [art] Extend RT PCRs Done
2,984,002 UART: [art] Lock RT PCRs Done
2,985,684 UART: [art] Populate DV Done
2,994,113 UART: [fht] FMC Alias Private Key: 7
2,995,159 UART: [art] Derive CDI
2,995,439 UART: [art] Store in in slot 0x4
3,081,154 UART: [art] Derive Key Pair
3,081,514 UART: [art] Store priv key in slot 0x5
3,095,356 UART: [art] Derive Key Pair - Done
3,109,709 UART: [art] Signing Cert with AUTHO
3,110,189 UART: RITY.KEYID = 7
3,125,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,866 UART: [art] PUB.X = A34C0B52941C7730EE33E317546A7AFE8B7DD16959A28D3B5C8EA635AD3788C9114FDEAB931ED847E2F8A7CE47A43AFF
3,132,649 UART: [art] PUB.Y = F29976E3F9AB52A717E02E1A2AF2F21A2DED737F1658478105E5114379894CC2932D953A35A6AA6A552DEB118E3FD5D0
3,139,600 UART: [art] SIG.R = 6EAF45378E786F1735745373946D148B51782F64B1290DD268CF350196A09521FAE6867F71EB99AE954E70105E577F0E
3,146,351 UART: [art] SIG.S = A7053C18EA44F5B6C1C2B5998A70DC0830125456503B4481B5E56171D03FEF6E1E0FD98A1475A5A7F4627B260F97DAF5
3,170,420 UART: Caliptra RT
3,170,765 UART: [state] CFI Enabled
3,278,176 UART: [rt] RT listening for mailbox commands...
3,278,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,742 UART: [rt]cmd =0x41544d4e, len=14344
3,712,190 >>> mbox cmd response data (8 bytes)
3,712,191 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,168 UART: [rt]cmd =0x41545348, len=116
3,764,149 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 ready_for_fw is high
1,060,884 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,215 >>> mbox cmd response: success
2,689,203 UART:
2,689,219 UART: Running Caliptra FMC ...
2,689,627 UART:
2,689,770 UART: [state] CFI Enabled
2,700,473 UART: [fht] FMC Alias Private Key: 7
2,808,048 UART: [art] Extend RT PCRs Done
2,808,476 UART: [art] Lock RT PCRs Done
2,809,792 UART: [art] Populate DV Done
2,818,027 UART: [fht] FMC Alias Private Key: 7
2,819,025 UART: [art] Derive CDI
2,819,305 UART: [art] Store in in slot 0x4
2,905,430 UART: [art] Derive Key Pair
2,905,790 UART: [art] Store priv key in slot 0x5
2,919,106 UART: [art] Derive Key Pair - Done
2,934,252 UART: [art] Signing Cert with AUTHO
2,934,732 UART: RITY.KEYID = 7
2,949,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,579 UART: [art] PUB.X = 75DD241CE83F9FBF056248B810B0E019B8106A5111A80108938AED6E029DC9874EC1A7AFCF7F7815E072A14723F69960
2,957,337 UART: [art] PUB.Y = 465143B63570E87FA9FB4ABFF9921685D2DAFD7FDE36AF738328646AC6CDF3B83F459FEFDF9E4B28346F6BCEA53D0E4D
2,964,306 UART: [art] SIG.R = 2CB1AC1CB78A3252CBB49D404437E83C5A024A675999DB56CDFFA52CB84BC677EC8AE85DCF19BAF4825BF7ACFFC1631A
2,971,099 UART: [art] SIG.S = 7F4DF67A3A49AB70E96EA158ECE47AC4ABBB9519209C13A8761C552F86818F99597269381E6D26BE71AB158A1097FC93
2,995,008 UART: Caliptra RT
2,995,353 UART: [state] CFI Enabled
3,103,304 UART: [rt] RT listening for mailbox commands...
3,103,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,904 UART: [rt]cmd =0x41544d4e, len=14344
3,537,010 >>> mbox cmd response data (8 bytes)
3,537,011 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,966 UART: [rt]cmd =0x41545348, len=116
3,589,367 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,155 UART: [kat] ++
895,307 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,698 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,485 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,174,091 ready_for_fw is high
1,174,091 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,282 UART: [ldev] Erasing FE.KEYID = 1
1,241,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,918 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,281,863 UART: [fwproc] Recv command 0x46574c44
1,282,596 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,623 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,227 >>> mbox cmd response: success
2,772,432 UART: [afmc] ++
2,772,600 UART: [afmc] CDI.KEYID = 6
2,772,963 UART: [afmc] SUBJECT.KEYID = 7
2,773,389 UART: [afmc] AUTHORITY.KEYID = 5
2,808,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,937 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,666 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,549 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,268 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,239 UART: [afmc] --
2,852,141 UART: [cold-reset] --
2,852,841 UART: [state] Locking Datavault
2,853,866 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,470 UART: [state] Locking ICCM
2,855,048 UART: [exit] Launching FMC @ 0x40000130
2,860,377 UART:
2,860,393 UART: Running Caliptra FMC ...
2,860,801 UART:
2,860,855 UART: [state] CFI Enabled
2,871,384 UART: [fht] FMC Alias Private Key: 7
2,978,937 UART: [art] Extend RT PCRs Done
2,979,365 UART: [art] Lock RT PCRs Done
2,980,769 UART: [art] Populate DV Done
2,988,790 UART: [fht] FMC Alias Private Key: 7
2,989,742 UART: [art] Derive CDI
2,990,022 UART: [art] Store in in slot 0x4
3,075,741 UART: [art] Derive Key Pair
3,076,101 UART: [art] Store priv key in slot 0x5
3,088,797 UART: [art] Derive Key Pair - Done
3,103,312 UART: [art] Signing Cert with AUTHO
3,103,792 UART: RITY.KEYID = 7
3,118,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,609 UART: [art] PUB.X = 18668F924288490AB40C6D194B3E363087E73C61F3CD748B574E6F37067CB10092C8701A8703FDFA587E1281007554CC
3,126,313 UART: [art] PUB.Y = 2F215616680A9B0371370D0B9AF77EE6271579F390B2B5F306ADC407A8444E59F37063C1C09985979216184A634B1F08
3,133,228 UART: [art] SIG.R = 861008DF27E7A69D43575B0494785BC62AC2EC09F5ADCA17BC7E3BFE5D435BFD5AF08625C760C9C208139663EAA37175
3,139,994 UART: [art] SIG.S = 1F1FFA16F2406FCD6ABE206281ED4F0347A875E1BC0F5956EA67F984885D548A50E0BD4A51E529A218DCAB386CD61257
3,164,193 UART: Caliptra RT
3,164,446 UART: [state] CFI Enabled
3,271,481 UART: [rt] RT listening for mailbox commands...
3,272,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,059 UART: [rt]cmd =0x41544d4e, len=14344
3,704,571 >>> mbox cmd response data (8 bytes)
3,704,572 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,899 UART: [rt]cmd =0x41545348, len=116
3,756,876 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,086 ready_for_fw is high
1,056,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,707 >>> mbox cmd response: success
2,682,983 UART:
2,682,999 UART: Running Caliptra FMC ...
2,683,407 UART:
2,683,461 UART: [state] CFI Enabled
2,694,154 UART: [fht] FMC Alias Private Key: 7
2,802,691 UART: [art] Extend RT PCRs Done
2,803,119 UART: [art] Lock RT PCRs Done
2,804,939 UART: [art] Populate DV Done
2,813,206 UART: [fht] FMC Alias Private Key: 7
2,814,216 UART: [art] Derive CDI
2,814,496 UART: [art] Store in in slot 0x4
2,899,853 UART: [art] Derive Key Pair
2,900,213 UART: [art] Store priv key in slot 0x5
2,913,455 UART: [art] Derive Key Pair - Done
2,928,519 UART: [art] Signing Cert with AUTHO
2,928,999 UART: RITY.KEYID = 7
2,944,151 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,916 UART: [art] PUB.X = 0073844DD1BCD21EFB69AFBA6D647116915618EB9FAE5E3F6DE8306A4AED7FFD26534200AA74BB5395C785E462E7DA69
2,951,656 UART: [art] PUB.Y = F00E51E1E87D58955CEB800778F61B61F10131EB4797C2EF4951BFB6B1BCDF24628C9F09AE0329523FC4D2FBEC2E6377
2,958,601 UART: [art] SIG.R = 4AF4C0C48C0FC0F35521264FECA2D8F89871AA57BC53D050CE0B0650AB19D48A6390A7FE4A2B7D2E58BE2C3F651C2EBA
2,965,382 UART: [art] SIG.S = 71418D42CA1121DD3859432035B3E8FA81FC2B6F08E269981D41525876011D91B1C0B76F7D48ACDDDCCF8BCECB127949
2,989,179 UART: Caliptra RT
2,989,432 UART: [state] CFI Enabled
3,096,835 UART: [rt] RT listening for mailbox commands...
3,097,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,667 UART: [rt]cmd =0x41544d4e, len=14344
3,531,155 >>> mbox cmd response data (8 bytes)
3,531,156 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,273 UART: [rt]cmd =0x41545348, len=116
3,583,310 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,192 UART: [state] WD Timer not started. Device not locked for debugging
87,363 UART: [kat] SHA2-256
890,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
903,945 UART: [kat] SHA2-512-ACC
905,846 UART: [kat] ECC-384
915,637 UART: [kat] HMAC-384Kdf
920,427 UART: [kat] LMS
1,168,739 UART: [kat] --
1,169,808 UART: [cold-reset] ++
1,170,206 UART: [fht] FHT @ 0x50003400
1,172,682 UART: [idev] ++
1,172,850 UART: [idev] CDI.KEYID = 6
1,173,211 UART: [idev] SUBJECT.KEYID = 7
1,173,636 UART: [idev] UDS.KEYID = 0
1,173,982 ready_for_fw is high
1,173,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,208,008 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,215,531 UART: [ldev] Erasing FE.KEYID = 1
1,242,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,759 UART: [ldev] --
1,282,205 UART: [fwproc] Wait for Commands...
1,283,028 UART: [fwproc] Recv command 0x46574c44
1,283,761 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,702 >>> mbox cmd response: success
2,773,871 UART: [afmc] ++
2,774,039 UART: [afmc] CDI.KEYID = 6
2,774,402 UART: [afmc] SUBJECT.KEYID = 7
2,774,828 UART: [afmc] AUTHORITY.KEYID = 5
2,810,687 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,538 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,257 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,052 UART: [afmc] --
2,853,966 UART: [cold-reset] --
2,854,628 UART: [state] Locking Datavault
2,855,647 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,251 UART: [state] Locking ICCM
2,856,905 UART: [exit] Launching FMC @ 0x40000130
2,862,234 UART:
2,862,250 UART: Running Caliptra FMC ...
2,862,658 UART:
2,862,801 UART: [state] CFI Enabled
2,873,302 UART: [fht] FMC Alias Private Key: 7
2,981,107 UART: [art] Extend RT PCRs Done
2,981,535 UART: [art] Lock RT PCRs Done
2,983,289 UART: [art] Populate DV Done
2,991,572 UART: [fht] FMC Alias Private Key: 7
2,992,706 UART: [art] Derive CDI
2,992,986 UART: [art] Store in in slot 0x4
3,078,805 UART: [art] Derive Key Pair
3,079,165 UART: [art] Store priv key in slot 0x5
3,092,257 UART: [art] Derive Key Pair - Done
3,106,946 UART: [art] Signing Cert with AUTHO
3,107,426 UART: RITY.KEYID = 7
3,122,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,399 UART: [art] PUB.X = DB5B93BCF77E4D43A9D128F3DDD718F446DEBB7BC4193023BDB0E7C377624A226B11BFF116D63934E506F058B88E55E2
3,130,178 UART: [art] PUB.Y = 66E3AD2659A85E1604D4313D4AF5ECA6E124C40C322E05FE712C881F2AE224FDC1E26658783A45A16A121F164379BF2E
3,137,123 UART: [art] SIG.R = CA8FC80A4E980B710DFEF00010FC21696A0BCA7D3FF305695D79FB9B2FE0154804EBF8BF12B46DE1A941F19BCD80DA9C
3,143,875 UART: [art] SIG.S = 3428D3DD357202040523A15959B9790F8F4C93CC24DB1B2D42B3C57569B04CC9499E0C8FCE9D96EFE93D48FA891D839C
3,167,361 UART: Caliptra RT
3,167,706 UART: [state] CFI Enabled
3,276,297 UART: [rt] RT listening for mailbox commands...
3,276,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,841 UART: [rt]cmd =0x41544d4e, len=14344
3,709,911 >>> mbox cmd response data (8 bytes)
3,709,912 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,945 UART: [rt]cmd =0x41545348, len=116
3,762,432 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,911 ready_for_fw is high
1,056,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,722 >>> mbox cmd response: success
2,684,338 UART:
2,684,354 UART: Running Caliptra FMC ...
2,684,762 UART:
2,684,905 UART: [state] CFI Enabled
2,695,330 UART: [fht] FMC Alias Private Key: 7
2,802,677 UART: [art] Extend RT PCRs Done
2,803,105 UART: [art] Lock RT PCRs Done
2,804,815 UART: [art] Populate DV Done
2,812,982 UART: [fht] FMC Alias Private Key: 7
2,813,934 UART: [art] Derive CDI
2,814,214 UART: [art] Store in in slot 0x4
2,900,233 UART: [art] Derive Key Pair
2,900,593 UART: [art] Store priv key in slot 0x5
2,914,137 UART: [art] Derive Key Pair - Done
2,928,857 UART: [art] Signing Cert with AUTHO
2,929,337 UART: RITY.KEYID = 7
2,944,581 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,346 UART: [art] PUB.X = 1B5D64EF426FD345C72E3FAA6D732276DFFB494E6734E6B0768BA2BED719532ED6E4723E81EACA228D7C7767C4DE1FDB
2,952,134 UART: [art] PUB.Y = 35F36A9E73CCD32B0EC3EA7DE11053E201343401109577F51FD35D6FD94A9E99B8D2DDBD860372044674F5A777BD437D
2,959,073 UART: [art] SIG.R = EB91BBAD97CFA1620D9AAD700C198C9C34EA556212BDFDEE0BD26F25D673B87AAB7C85C56D885B2EA715846B1FC8F08B
2,965,858 UART: [art] SIG.S = 5281FEADD20816BDCF55E83E81522A64FD714EA92B1CC26831292884B4CF0265C18CE1A1F06345C44EDEB74F97CEF09B
2,989,823 UART: Caliptra RT
2,990,168 UART: [state] CFI Enabled
3,098,081 UART: [rt] RT listening for mailbox commands...
3,098,751 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,759 UART: [rt]cmd =0x41544d4e, len=14344
3,532,161 >>> mbox cmd response data (8 bytes)
3,532,162 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,131 UART: [rt]cmd =0x41545348, len=116
3,583,592 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,115 UART:
192,481 UART: Running Caliptra ROM ...
193,590 UART:
193,731 UART: [state] CFI Enabled
266,238 UART: [state] LifecycleState = Unprovisioned
268,230 UART: [state] DebugLocked = No
270,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,906 UART: [kat] SHA2-256
444,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,075 UART: [kat] ++
455,674 UART: [kat] sha1
466,906 UART: [kat] SHA2-256
469,617 UART: [kat] SHA2-384
475,457 UART: [kat] SHA2-512-ACC
477,826 UART: [kat] ECC-384
2,769,675 UART: [kat] HMAC-384Kdf
2,798,677 UART: [kat] LMS
3,989,022 UART: [kat] --
3,993,766 UART: [cold-reset] ++
3,996,053 UART: [fht] Storing FHT @ 0x50003400
4,007,248 UART: [idev] ++
4,007,809 UART: [idev] CDI.KEYID = 6
4,008,759 UART: [idev] SUBJECT.KEYID = 7
4,010,150 UART: [idev] UDS.KEYID = 0
4,011,137 ready_for_fw is high
4,011,326 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,051,389 UART: [idev] Erasing UDS.KEYID = 0
7,343,956 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,606 UART: [idev] --
7,368,837 UART: [ldev] ++
7,369,457 UART: [ldev] CDI.KEYID = 6
7,370,567 UART: [ldev] SUBJECT.KEYID = 5
7,371,689 UART: [ldev] AUTHORITY.KEYID = 7
7,372,864 UART: [ldev] FE.KEYID = 1
7,419,653 UART: [ldev] Erasing FE.KEYID = 1
10,751,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,760 UART: [ldev] --
13,137,164 UART: [fwproc] Waiting for Commands...
13,139,633 UART: [fwproc] Received command 0x46574c44
13,141,805 UART: [fwproc] Received Image of size 31676 bytes
16,178,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,254,238 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,323,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,351,928 >>> mbox cmd response: success
16,356,601 UART: [afmc] ++
16,357,211 UART: [afmc] CDI.KEYID = 6
16,358,162 UART: [afmc] SUBJECT.KEYID = 7
16,359,404 UART: [afmc] AUTHORITY.KEYID = 5
19,721,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,018,800 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,021,027 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,035,472 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,050,250 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,064,716 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,086,715 UART: [afmc] --
22,090,872 UART: [cold-reset] --
22,095,488 UART: [state] Locking Datavault
22,099,355 UART: [state] Locking PCR0, PCR1 and PCR31
22,101,107 UART: [state] Locking ICCM
22,103,860 UART: [exit] Launching FMC @ 0x40000130
22,112,308 UART:
22,112,550 UART: Running Caliptra FMC ...
22,113,709 UART:
22,113,870 UART: [state] CFI Enabled
22,180,162 UART: [fht] FMC Alias Private Key: 7
24,518,062 UART: [art] Extend RT PCRs Done
24,519,332 UART: [art] Lock RT PCRs Done
24,521,004 UART: [art] Populate DV Done
24,526,452 UART: [fht] FMC Alias Private Key: 7
24,528,045 UART: [art] Derive CDI
24,528,810 UART: [art] Store in in slot 0x4
24,587,540 UART: [art] Derive Key Pair
24,588,614 UART: [art] Store priv key in slot 0x5
27,880,993 UART: [art] Derive Key Pair - Done
27,894,259 UART: [art] Signing Cert with AUTHO
27,895,600 UART: RITY.KEYID = 7
30,182,787 UART: [art] Erasing AUTHORITY.KEYID = 7
30,184,343 UART: [art] PUB.X = FEDBB0138F9156ED94C765E57C79C5284B47A8221371707A91002EE16BE01EF6E5E845089599D87DA1370B392C95904B
30,191,479 UART: [art] PUB.Y = C9307E734B1AF8ACDEE38803EDA58172CDFF2BDBA3D2525C38DCB096C8F7FDC28EE35BEAB0905F949E963F799C7F1D31
30,198,791 UART: [art] SIG.R = 83FA4B369F0FFB20474F33B69A946A648D934742DDA2AA079D98183A3F4190A4246B5C475F59389734AAB98BADA04141
30,206,194 UART: [art] SIG.S = 3CADEE6430023E4983390E85519BC5671A9AD4D355745758B4D6D24EF55C97D9CE43A7ED77B3D18B1642E971B24AC1E3
31,510,268 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,785,925 ready_for_fw is high
3,786,351 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,167,749 >>> mbox cmd response: success
21,860,351 UART:
21,860,765 UART: Running Caliptra FMC ...
21,861,883 UART:
21,862,042 UART: [state] CFI Enabled
21,929,988 UART: [fht] FMC Alias Private Key: 7
24,268,313 UART: [art] Extend RT PCRs Done
24,269,593 UART: [art] Lock RT PCRs Done
24,271,448 UART: [art] Populate DV Done
24,276,974 UART: [fht] FMC Alias Private Key: 7
24,278,443 UART: [art] Derive CDI
24,279,239 UART: [art] Store in in slot 0x4
24,338,866 UART: [art] Derive Key Pair
24,339,928 UART: [art] Store priv key in slot 0x5
27,633,000 UART: [art] Derive Key Pair - Done
27,645,910 UART: [art] Signing Cert with AUTHO
27,647,276 UART: RITY.KEYID = 7
29,935,006 UART: [art] Erasing AUTHORITY.KEYID = 7
29,936,573 UART: [art] PUB.X = 496A44CCDDF4C53FA76553D0689E8D0398739D88A11E97AC341971B26A48FA5FA2F41A252BC2068016907E4AB1C05CAB
29,943,835 UART: [art] PUB.Y = 23C6CED240F3DA98E820D9354C737E8A490488B6E8CB7F07BF2507155C772B1A32F1A5E1C24FFCF1B06AE194B39CA707
29,950,968 UART: [art] SIG.R = 04D5862AC64EA959D2F1E90CA390450F43FC400A0D60B4CB0644E74A492F1F13BDDE711E1D5CF96AEEDDE8020E195961
29,958,368 UART: [art] SIG.S = C69E12221DE44D8DE856E82675E3BB9F9CA6253F0101EF07BF71FE896B7D1E9749A4FA5EDCD55CAF64B5639540DDD03D
31,262,870 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
192,747 UART:
193,133 UART: Running Caliptra ROM ...
194,228 UART:
603,986 UART: [state] CFI Enabled
622,336 UART: [state] LifecycleState = Unprovisioned
624,279 UART: [state] DebugLocked = No
626,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,426 UART: [kat] SHA2-256
801,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,770 UART: [kat] ++
812,255 UART: [kat] sha1
824,553 UART: [kat] SHA2-256
827,275 UART: [kat] SHA2-384
832,407 UART: [kat] SHA2-512-ACC
834,773 UART: [kat] ECC-384
3,119,196 UART: [kat] HMAC-384Kdf
3,131,169 UART: [kat] LMS
4,321,259 UART: [kat] --
4,324,918 UART: [cold-reset] ++
4,327,139 UART: [fht] Storing FHT @ 0x50003400
4,338,408 UART: [idev] ++
4,338,981 UART: [idev] CDI.KEYID = 6
4,340,016 UART: [idev] SUBJECT.KEYID = 7
4,341,202 UART: [idev] UDS.KEYID = 0
4,342,187 ready_for_fw is high
4,342,385 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
4,382,323 UART: [idev] Erasing UDS.KEYID = 0
7,628,508 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,989 UART: [idev] --
7,654,502 UART: [ldev] ++
7,655,072 UART: [ldev] CDI.KEYID = 6
7,656,202 UART: [ldev] SUBJECT.KEYID = 5
7,657,307 UART: [ldev] AUTHORITY.KEYID = 7
7,658,502 UART: [ldev] FE.KEYID = 1
7,670,200 UART: [ldev] Erasing FE.KEYID = 1
10,959,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,068 UART: [ldev] --
13,318,525 UART: [fwproc] Waiting for Commands...
13,320,784 UART: [fwproc] Received command 0x46574c44
13,322,969 UART: [fwproc] Received Image of size 31676 bytes
16,370,856 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,446,479 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,515,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
16,544,210 >>> mbox cmd response: success
16,548,263 UART: [afmc] ++
16,549,077 UART: [afmc] CDI.KEYID = 6
16,550,089 UART: [afmc] SUBJECT.KEYID = 7
16,551,245 UART: [afmc] AUTHORITY.KEYID = 5
19,866,226 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,160,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,162,475 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,176,860 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,191,738 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,206,148 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,226,692 UART: [afmc] --
22,230,989 UART: [cold-reset] --
22,235,649 UART: [state] Locking Datavault
22,241,994 UART: [state] Locking PCR0, PCR1 and PCR31
22,243,757 UART: [state] Locking ICCM
22,246,447 UART: [exit] Launching FMC @ 0x40000130
22,254,810 UART:
22,255,075 UART: Running Caliptra FMC ...
22,256,222 UART:
22,256,385 UART: [state] CFI Enabled
22,264,270 UART: [fht] FMC Alias Private Key: 7
24,595,580 UART: [art] Extend RT PCRs Done
24,596,843 UART: [art] Lock RT PCRs Done
24,598,605 UART: [art] Populate DV Done
24,604,125 UART: [fht] FMC Alias Private Key: 7
24,605,642 UART: [art] Derive CDI
24,606,491 UART: [art] Store in in slot 0x4
24,649,029 UART: [art] Derive Key Pair
24,650,118 UART: [art] Store priv key in slot 0x5
27,892,106 UART: [art] Derive Key Pair - Done
27,905,160 UART: [art] Signing Cert with AUTHO
27,906,503 UART: RITY.KEYID = 7
30,185,680 UART: [art] Erasing AUTHORITY.KEYID = 7
30,187,249 UART: [art] PUB.X = A9606E10E4855CA85BDBC4516C2227D7BDF759C8D3E80A23F80BA40DAD2D7B350474B40909189DBC4EBF0B57B130565B
30,194,479 UART: [art] PUB.Y = CDBE6785ACDF2906E4E23060413866E009EF5876654F63F5CDA874F8B3EC35408AB728FB011BF3593FD538482173D9E9
30,201,701 UART: [art] SIG.R = 923A7E1BA59E00F0BED10C6D4C47458CEA543971360CB46F875E4E844B8F02AA15A267F729FF8CA5A68E7839AF3D741B
30,209,103 UART: [art] SIG.S = A0C00216E124E41DE4E52403D691FA2226CBC4EBE8CE2CB397724148561B647B66546407D55371B0E05A4D66A9A3D95B
31,513,467 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
4,125,592 ready_for_fw is high
4,125,986 <<< Executing mbox cmd 0x46574c44 (31676 bytes) from SoC
16,383,582 >>> mbox cmd response: success
22,016,255 UART:
22,016,662 UART: Running Caliptra FMC ...
22,017,878 UART:
22,018,071 UART: [state] CFI Enabled
22,025,421 UART: [fht] FMC Alias Private Key: 7
24,356,187 UART: [art] Extend RT PCRs Done
24,357,458 UART: [art] Lock RT PCRs Done
24,359,389 UART: [art] Populate DV Done
24,364,711 UART: [fht] FMC Alias Private Key: 7
24,366,242 UART: [art] Derive CDI
24,367,094 UART: [art] Store in in slot 0x4
24,409,962 UART: [art] Derive Key Pair
24,411,044 UART: [art] Store priv key in slot 0x5
27,652,668 UART: [art] Derive Key Pair - Done
27,665,543 UART: [art] Signing Cert with AUTHO
27,666,890 UART: RITY.KEYID = 7
29,946,245 UART: [art] Erasing AUTHORITY.KEYID = 7
29,947,808 UART: [art] PUB.X = 45DA0824FBA95FC242E9E5508541F04664EE71BB5F2266EE17E29CEE607ECCBEBEB2560899A1EBD1475D0E8830E72CB7
29,955,034 UART: [art] PUB.Y = 7C4240D45FAC51B15C3AF6FB418397BCAD2DD1CDFF9FC918C22FBB5EFA73BCDB590A848161149725DFA6F2ECA0BDF638
29,962,274 UART: [art] SIG.R = 20E3979AC48853AC6BB66A3DF64E11AAB2E34FF2BCE22E0FE91B44270D182CE9DA30BCA4BE23C5C52C6F14AB83D71922
29,969,677 UART: [art] SIG.S = 253E526CEC7F80722D467A80B4A453A78887834CFAD6BEBC9580AA571D22F079547B2FEF5AA01D365B58F1E6D9935293
31,274,885 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
192,233 UART:
192,620 UART: Running Caliptra ROM ...
193,748 UART:
193,898 UART: [state] CFI Enabled
266,419 UART: [state] LifecycleState = Unprovisioned
268,338 UART: [state] DebugLocked = No
269,805 UART: [state] WD Timer not started. Device not locked for debugging
274,193 UART: [kat] SHA2-256
453,295 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,870 UART: [kat] ++
465,399 UART: [kat] sha1
477,202 UART: [kat] SHA2-256
480,217 UART: [kat] SHA2-384
486,134 UART: [kat] SHA2-512-ACC
489,138 UART: [kat] ECC-384
2,948,163 UART: [kat] HMAC-384Kdf
2,970,777 UART: [kat] LMS
3,500,271 UART: [kat] --
3,503,506 UART: [cold-reset] ++
3,504,945 UART: [fht] FHT @ 0x50003400
3,516,137 UART: [idev] ++
3,516,719 UART: [idev] CDI.KEYID = 6
3,517,635 UART: [idev] SUBJECT.KEYID = 7
3,518,809 UART: [idev] UDS.KEYID = 0
3,519,732 ready_for_fw is high
3,519,928 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,560,162 UART: [idev] Erasing UDS.KEYID = 0
6,029,098 UART: [idev] Sha1 KeyId Algorithm
6,051,647 UART: [idev] --
6,056,081 UART: [ldev] ++
6,056,657 UART: [ldev] CDI.KEYID = 6
6,057,583 UART: [ldev] SUBJECT.KEYID = 5
6,058,743 UART: [ldev] AUTHORITY.KEYID = 7
6,060,033 UART: [ldev] FE.KEYID = 1
6,098,336 UART: [ldev] Erasing FE.KEYID = 1
8,602,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,358 UART: [ldev] --
10,413,086 UART: [fwproc] Wait for Commands...
10,415,771 UART: [fwproc] Recv command 0x46574c44
10,417,871 UART: [fwproc] Recv'd Img size: 31656 bytes
12,807,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,883,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,951,813 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
12,979,600 >>> mbox cmd response: success
12,984,114 UART: [afmc] ++
12,984,738 UART: [afmc] CDI.KEYID = 6
12,985,783 UART: [afmc] SUBJECT.KEYID = 7
12,986,934 UART: [afmc] AUTHORITY.KEYID = 5
15,524,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,249,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,251,851 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,267,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,283,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,299,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,322,592 UART: [afmc] --
17,326,234 UART: [cold-reset] --
17,329,399 UART: [state] Locking Datavault
17,335,226 UART: [state] Locking PCR0, PCR1 and PCR31
17,336,912 UART: [state] Locking ICCM
17,339,089 UART: [exit] Launching FMC @ 0x40000130
17,347,470 UART:
17,347,715 UART: Running Caliptra FMC ...
17,348,770 UART:
17,348,917 UART: [state] CFI Enabled
17,408,767 UART: [fht] FMC Alias Private Key: 7
19,172,614 UART: [art] Extend RT PCRs Done
19,173,870 UART: [art] Lock RT PCRs Done
19,175,334 UART: [art] Populate DV Done
19,180,503 UART: [fht] FMC Alias Private Key: 7
19,182,167 UART: [art] Derive CDI
19,183,020 UART: [art] Store in in slot 0x4
19,241,754 UART: [art] Derive Key Pair
19,242,835 UART: [art] Store priv key in slot 0x5
21,705,488 UART: [art] Derive Key Pair - Done
21,718,613 UART: [art] Signing Cert with AUTHO
21,719,961 UART: RITY.KEYID = 7
23,431,260 UART: [art] Erasing AUTHORITY.KEYID = 7
23,432,801 UART: [art] PUB.X = 7C04D8F1189302FE30544F8D72E4A39C3ACBB722A80BE7E7F752C4D8199D06C58CB74E62B2EC8A3D3CF194B77E3ED0CF
23,440,052 UART: [art] PUB.Y = CC1CBFFA384779633A425CC65E23797799D21A2187063814AFABB2D17B5CB7A783CE24081BDED78D40A077233E7FE9BF
23,447,311 UART: [art] SIG.R = D5DE764244EC311593D34A78C6AC5104EDEF5FE701DD84F91B0927B9A34C17E03B5E89E95E9CE2AF62FDF07DD0AAEBA7
23,454,765 UART: [art] SIG.S = 11B516FA93C6A2E491A177CAFB0868994BEA34ACFE80717B88286B4015794395A692EB1B9B18A0096078EFB441C73088
24,432,682 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,384,333 ready_for_fw is high
3,384,752 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,756,898 >>> mbox cmd response: success
17,045,574 UART:
17,046,002 UART: Running Caliptra FMC ...
17,047,131 UART:
17,047,300 UART: [state] CFI Enabled
17,110,785 UART: [fht] FMC Alias Private Key: 7
18,874,834 UART: [art] Extend RT PCRs Done
18,876,112 UART: [art] Lock RT PCRs Done
18,877,985 UART: [art] Populate DV Done
18,883,518 UART: [fht] FMC Alias Private Key: 7
18,885,112 UART: [art] Derive CDI
18,885,965 UART: [art] Store in in slot 0x4
18,943,405 UART: [art] Derive Key Pair
18,944,513 UART: [art] Store priv key in slot 0x5
21,407,855 UART: [art] Derive Key Pair - Done
21,420,913 UART: [art] Signing Cert with AUTHO
21,422,279 UART: RITY.KEYID = 7
23,133,914 UART: [art] Erasing AUTHORITY.KEYID = 7
23,135,473 UART: [art] PUB.X = 618AE2AC0884A339632E040CB341B073C312B5F01EDD25183790443492FC9A2AB4BF81BEF7F8C8F92574A751EED0A9B3
23,142,694 UART: [art] PUB.Y = A35C06DEA13A5E037CE5ED4236EC2261B772FBA72E7FFAA6C79A763EF60B980B3AA091859179A4869DC4C69F5899D36B
23,150,005 UART: [art] SIG.R = 9212C2FD6688FE15169F05E68ACAADAAAD0553EB608F878A3E36CBF33EED7A970ECDB6FB98CBBB3F4A50EF37990DE0EB
23,157,410 UART: [art] SIG.S = DBCB27677B10DD335F5C9D1DDD206F23827CF06C63CBD347F0563147E16D451FB7CF123E066F35885CADA7CD8A028483
24,135,754 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,745 writing to cptra_bootfsm_go
192,861 UART:
193,216 UART: Running Caliptra ROM ...
194,350 UART:
604,017 UART: [state] CFI Enabled
618,603 UART: [state] LifecycleState = Unprovisioned
620,471 UART: [state] DebugLocked = No
622,087 UART: [state] WD Timer not started. Device not locked for debugging
626,623 UART: [kat] SHA2-256
805,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,359 UART: [kat] ++
817,889 UART: [kat] sha1
828,129 UART: [kat] SHA2-256
831,208 UART: [kat] SHA2-384
837,279 UART: [kat] SHA2-512-ACC
840,240 UART: [kat] ECC-384
3,280,328 UART: [kat] HMAC-384Kdf
3,291,783 UART: [kat] LMS
3,821,291 UART: [kat] --
3,825,094 UART: [cold-reset] ++
3,826,887 UART: [fht] FHT @ 0x50003400
3,839,005 UART: [idev] ++
3,839,578 UART: [idev] CDI.KEYID = 6
3,840,508 UART: [idev] SUBJECT.KEYID = 7
3,841,687 UART: [idev] UDS.KEYID = 0
3,842,668 ready_for_fw is high
3,842,874 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,882,992 UART: [idev] Erasing UDS.KEYID = 0
6,318,429 UART: [idev] Sha1 KeyId Algorithm
6,342,418 UART: [idev] --
6,346,085 UART: [ldev] ++
6,346,654 UART: [ldev] CDI.KEYID = 6
6,347,563 UART: [ldev] SUBJECT.KEYID = 5
6,348,772 UART: [ldev] AUTHORITY.KEYID = 7
6,350,000 UART: [ldev] FE.KEYID = 1
6,361,306 UART: [ldev] Erasing FE.KEYID = 1
8,834,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,955 UART: [ldev] --
10,628,279 UART: [fwproc] Wait for Commands...
10,631,133 UART: [fwproc] Recv command 0x46574c44
10,633,170 UART: [fwproc] Recv'd Img size: 31656 bytes
13,031,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,106,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,175,520 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,204,289 >>> mbox cmd response: success
13,208,223 UART: [afmc] ++
13,208,829 UART: [afmc] CDI.KEYID = 6
13,209,799 UART: [afmc] SUBJECT.KEYID = 7
13,210,947 UART: [afmc] AUTHORITY.KEYID = 5
15,709,312 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,430,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,432,782 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,448,573 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,464,555 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,480,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,503,164 UART: [afmc] --
17,506,192 UART: [cold-reset] --
17,510,323 UART: [state] Locking Datavault
17,514,915 UART: [state] Locking PCR0, PCR1 and PCR31
17,516,585 UART: [state] Locking ICCM
17,518,300 UART: [exit] Launching FMC @ 0x40000130
17,526,743 UART:
17,526,992 UART: Running Caliptra FMC ...
17,528,144 UART:
17,528,307 UART: [state] CFI Enabled
17,536,515 UART: [fht] FMC Alias Private Key: 7
19,293,419 UART: [art] Extend RT PCRs Done
19,294,693 UART: [art] Lock RT PCRs Done
19,296,245 UART: [art] Populate DV Done
19,301,840 UART: [fht] FMC Alias Private Key: 7
19,303,364 UART: [art] Derive CDI
19,304,208 UART: [art] Store in in slot 0x4
19,347,347 UART: [art] Derive Key Pair
19,348,428 UART: [art] Store priv key in slot 0x5
21,775,097 UART: [art] Derive Key Pair - Done
21,788,293 UART: [art] Signing Cert with AUTHO
21,789,633 UART: RITY.KEYID = 7
23,495,107 UART: [art] Erasing AUTHORITY.KEYID = 7
23,497,187 UART: [art] PUB.X = 13DE3EF293F7DD39E1353C4320E420482CE1353705A81F451C82FF1C172EDDA5D22A54C9A70B2A17152F4D4D9205B019
23,503,916 UART: [art] PUB.Y = 30B7E6F0665B9AEE873F2772B234DDDF93A9D5723770FB0DA2361699EB7713B9728B763C6A6AFBEA4FF3F9A083C79109
23,511,135 UART: [art] SIG.R = 5A6B57270A2D94C6B78F7359E447BB5BC348752F162ECD1FE78D99BD177BB952BF4F935759D0904BCF07C11DD975AD8A
23,518,530 UART: [art] SIG.S = FEA0764C7C5CF9FDF864C647235F0A504C1FDCCEF744F29224B1864D2C3AC803516596CAB601B8E12308B6572A5F5FF0
24,497,818 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,843 writing to cptra_bootfsm_go
3,691,211 ready_for_fw is high
3,691,798 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,970,780 >>> mbox cmd response: success
17,218,687 UART:
17,219,076 UART: Running Caliptra FMC ...
17,220,284 UART:
17,220,455 UART: [state] CFI Enabled
17,228,417 UART: [fht] FMC Alias Private Key: 7
18,985,576 UART: [art] Extend RT PCRs Done
18,986,846 UART: [art] Lock RT PCRs Done
18,988,498 UART: [art] Populate DV Done
18,993,890 UART: [fht] FMC Alias Private Key: 7
18,995,484 UART: [art] Derive CDI
18,996,342 UART: [art] Store in in slot 0x4
19,038,909 UART: [art] Derive Key Pair
19,039,960 UART: [art] Store priv key in slot 0x5
21,467,186 UART: [art] Derive Key Pair - Done
21,480,323 UART: [art] Signing Cert with AUTHO
21,481,665 UART: RITY.KEYID = 7
23,187,000 UART: [art] Erasing AUTHORITY.KEYID = 7
23,188,567 UART: [art] PUB.X = 14B605F3E474104F57FD648875B59227B561F69B642632CD79639DEA272D80460659A952D82EBE1300265F87ADD47B85
23,195,719 UART: [art] PUB.Y = D934D43D0E885A9140E1C742A7858C0397C185BD8BF61E2209E34F3EA202BE9FC36638E585B3A5DC26A3743165C4A151
23,202,979 UART: [art] SIG.R = 059B5DDDD7BF5808B11DE4E92776C3D1F03993FE8DF0DE8B5E0AE501E0AB4414D555D0F8A759DA114721D5A8B22D632E
23,210,415 UART: [art] SIG.S = BAA7D5207E4C737748B6EDC8C50C5970C469E8FE5C15D8E81E4B89048020737FCEFB83A14BA8FE180F20CF2C7033CCA2
24,188,428 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,240 UART:
192,633 UART: Running Caliptra ROM ...
193,738 UART:
193,883 UART: [state] CFI Enabled
264,878 UART: [state] LifecycleState = Unprovisioned
267,310 UART: [state] DebugLocked = No
269,817 UART: [state] WD Timer not started. Device not locked for debugging
274,016 UART: [kat] SHA2-256
463,918 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,631 UART: [kat] ++
475,086 UART: [kat] sha1
487,957 UART: [kat] SHA2-256
490,976 UART: [kat] SHA2-384
495,620 UART: [kat] SHA2-512-ACC
498,209 UART: [kat] ECC-384
2,945,927 UART: [kat] HMAC-384Kdf
2,972,178 UART: [kat] LMS
3,503,935 UART: [kat] --
3,510,935 UART: [cold-reset] ++
3,512,479 UART: [fht] FHT @ 0x50003400
3,524,461 UART: [idev] ++
3,525,100 UART: [idev] CDI.KEYID = 6
3,526,085 UART: [idev] SUBJECT.KEYID = 7
3,527,264 UART: [idev] UDS.KEYID = 0
3,528,207 ready_for_fw is high
3,528,408 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,568,454 UART: [idev] Erasing UDS.KEYID = 0
6,029,348 UART: [idev] Sha1 KeyId Algorithm
6,051,656 UART: [idev] --
6,056,845 UART: [ldev] ++
6,057,528 UART: [ldev] CDI.KEYID = 6
6,058,445 UART: [ldev] SUBJECT.KEYID = 5
6,059,606 UART: [ldev] AUTHORITY.KEYID = 7
6,060,840 UART: [ldev] FE.KEYID = 1
6,098,854 UART: [ldev] Erasing FE.KEYID = 1
8,605,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,558 UART: [ldev] --
10,413,351 UART: [fwproc] Wait for Commands...
10,415,451 UART: [fwproc] Recv command 0x46574c44
10,417,760 UART: [fwproc] Recv'd Img size: 31656 bytes
12,850,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,926,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,042,189 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,089,060 >>> mbox cmd response: success
13,092,507 UART: [afmc] ++
13,093,133 UART: [afmc] CDI.KEYID = 6
13,094,370 UART: [afmc] SUBJECT.KEYID = 7
13,095,879 UART: [afmc] AUTHORITY.KEYID = 5
15,632,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,357,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,359,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,374,308 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,389,435 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,404,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,427,641 UART: [afmc] --
17,431,583 UART: [cold-reset] --
17,435,524 UART: [state] Locking Datavault
17,441,013 UART: [state] Locking PCR0, PCR1 and PCR31
17,443,128 UART: [state] Locking ICCM
17,446,054 UART: [exit] Launching FMC @ 0x40000130
17,454,727 UART:
17,455,040 UART: Running Caliptra FMC ...
17,456,121 UART:
17,456,274 UART: [state] CFI Enabled
17,512,870 UART: [fht] FMC Alias Private Key: 7
19,277,152 UART: [art] Extend RT PCRs Done
19,278,416 UART: [art] Lock RT PCRs Done
19,280,039 UART: [art] Populate DV Done
19,285,659 UART: [fht] FMC Alias Private Key: 7
19,287,335 UART: [art] Derive CDI
19,288,191 UART: [art] Store in in slot 0x4
19,345,786 UART: [art] Derive Key Pair
19,346,833 UART: [art] Store priv key in slot 0x5
21,809,507 UART: [art] Derive Key Pair - Done
21,822,361 UART: [art] Signing Cert with AUTHO
21,823,709 UART: RITY.KEYID = 7
23,534,392 UART: [art] Erasing AUTHORITY.KEYID = 7
23,535,976 UART: [art] PUB.X = 971CB59CA3A214EB353B392DC98497B8A930689B1DC4C9A6ADDCF32D84C8F3A2D46E8ECAA685324EFA0B72AA38DEFFB6
23,543,210 UART: [art] PUB.Y = B5CD3B61D40790979D8086CEA9FCD118A5860F4FA04D3737D7F99BCF5D62E1DE54F2F91393B78BD90B399D908D11CD89
23,550,547 UART: [art] SIG.R = F0120D7F642A96629CC026E40BE74A1CA69F9E4B01F8BB94FDE8A59A8FFB4AB5643BF35FAC2094817FFC7015C9EB76FB
23,557,967 UART: [art] SIG.S = 424DA9337ADC8B65D27AE1E0F05E04004E3C65DB740C967127D25E5C9B24B4B6A423BA5ACA263D5D3EC15819CF44AFC1
24,536,700 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,439,764 ready_for_fw is high
3,440,331 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
12,961,681 >>> mbox cmd response: success
17,253,332 UART:
17,253,728 UART: Running Caliptra FMC ...
17,254,873 UART:
17,255,040 UART: [state] CFI Enabled
17,320,966 UART: [fht] FMC Alias Private Key: 7
19,085,209 UART: [art] Extend RT PCRs Done
19,086,488 UART: [art] Lock RT PCRs Done
19,088,003 UART: [art] Populate DV Done
19,093,401 UART: [fht] FMC Alias Private Key: 7
19,095,148 UART: [art] Derive CDI
19,095,929 UART: [art] Store in in slot 0x4
19,153,343 UART: [art] Derive Key Pair
19,154,412 UART: [art] Store priv key in slot 0x5
21,618,148 UART: [art] Derive Key Pair - Done
21,631,349 UART: [art] Signing Cert with AUTHO
21,632,689 UART: RITY.KEYID = 7
23,342,933 UART: [art] Erasing AUTHORITY.KEYID = 7
23,344,494 UART: [art] PUB.X = A92FD2E8ECDFED36A77A1A45E0B1E76FE2E0F40C1E50A070D995E63229538387DB2B01FFBCD0A98A18D6FC9CD1ADEEF2
23,351,810 UART: [art] PUB.Y = 1108C5958D41A9E5441E471DDDFA5F6AED5A0C24AE2B92E2488F131EFE41D6444B13B609B293EB327FFD44F7478EEB26
23,359,042 UART: [art] SIG.R = D96AAED6008E6E53C5528D283F930DCE79CCE39656BADEF786BC4766040C1E95C0D3C37AD7681F52666FD69438948BEE
23,366,448 UART: [art] SIG.S = 873E354D40277D25BE7B864F00A20DA0ECC76B9C8F1EB9AE7FFE1811C4BD20E441FC9BFD3D64DA445A4F517B4797C6F9
24,345,176 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,764 writing to cptra_bootfsm_go
192,855 UART:
193,214 UART: Running Caliptra ROM ...
194,302 UART:
604,096 UART: [state] CFI Enabled
617,571 UART: [state] LifecycleState = Unprovisioned
619,998 UART: [state] DebugLocked = No
622,460 UART: [state] WD Timer not started. Device not locked for debugging
626,642 UART: [kat] SHA2-256
816,543 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,320 UART: [kat] ++
827,921 UART: [kat] sha1
839,226 UART: [kat] SHA2-256
842,229 UART: [kat] SHA2-384
846,883 UART: [kat] SHA2-512-ACC
849,430 UART: [kat] ECC-384
3,293,186 UART: [kat] HMAC-384Kdf
3,306,151 UART: [kat] LMS
3,837,987 UART: [kat] --
3,841,630 UART: [cold-reset] ++
3,843,923 UART: [fht] FHT @ 0x50003400
3,856,959 UART: [idev] ++
3,857,685 UART: [idev] CDI.KEYID = 6
3,858,603 UART: [idev] SUBJECT.KEYID = 7
3,859,779 UART: [idev] UDS.KEYID = 0
3,860,707 ready_for_fw is high
3,860,910 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
3,901,115 UART: [idev] Erasing UDS.KEYID = 0
6,335,186 UART: [idev] Sha1 KeyId Algorithm
6,358,468 UART: [idev] --
6,363,166 UART: [ldev] ++
6,363,840 UART: [ldev] CDI.KEYID = 6
6,364,753 UART: [ldev] SUBJECT.KEYID = 5
6,365,964 UART: [ldev] AUTHORITY.KEYID = 7
6,367,336 UART: [ldev] FE.KEYID = 1
6,377,182 UART: [ldev] Erasing FE.KEYID = 1
8,859,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,224 UART: [ldev] --
10,651,297 UART: [fwproc] Wait for Commands...
10,653,495 UART: [fwproc] Recv command 0x46574c44
10,655,758 UART: [fwproc] Recv'd Img size: 31656 bytes
13,083,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,160,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,276,657 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
13,322,602 >>> mbox cmd response: success
13,326,016 UART: [afmc] ++
13,326,834 UART: [afmc] CDI.KEYID = 6
13,327,830 UART: [afmc] SUBJECT.KEYID = 7
13,329,368 UART: [afmc] AUTHORITY.KEYID = 5
15,831,966 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,556,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,558,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,573,655 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,588,752 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,603,813 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,627,220 UART: [afmc] --
17,630,442 UART: [cold-reset] --
17,634,291 UART: [state] Locking Datavault
17,639,306 UART: [state] Locking PCR0, PCR1 and PCR31
17,641,506 UART: [state] Locking ICCM
17,644,485 UART: [exit] Launching FMC @ 0x40000130
17,653,153 UART:
17,653,406 UART: Running Caliptra FMC ...
17,654,550 UART:
17,654,723 UART: [state] CFI Enabled
17,663,093 UART: [fht] FMC Alias Private Key: 7
19,420,127 UART: [art] Extend RT PCRs Done
19,421,382 UART: [art] Lock RT PCRs Done
19,422,786 UART: [art] Populate DV Done
19,428,314 UART: [fht] FMC Alias Private Key: 7
19,429,912 UART: [art] Derive CDI
19,430,761 UART: [art] Store in in slot 0x4
19,473,512 UART: [art] Derive Key Pair
19,474,560 UART: [art] Store priv key in slot 0x5
21,901,069 UART: [art] Derive Key Pair - Done
21,914,341 UART: [art] Signing Cert with AUTHO
21,915,672 UART: RITY.KEYID = 7
23,621,154 UART: [art] Erasing AUTHORITY.KEYID = 7
23,622,778 UART: [art] PUB.X = 1522B901B96A8D81F06B5264C72AB3AB1580B246B9C59FFB9AF90577F55ECFF62216007D946DE8ED9328B87C65857467
23,629,907 UART: [art] PUB.Y = A0AE78D73D165F5BC4975E5350FB18E3C694A5316444F0280455F12AB43003B815AA98EE613F530F5F4C435521FBBA40
23,637,146 UART: [art] SIG.R = 906CB8FA628EE6F708A2552FA9F2690AE81AF621DB86B24B058B47A3D7BBDB1DD461F92FB60C1C169D08CD03FA7A7CC4
23,644,547 UART: [art] SIG.S = 2424A3A9C792B091BAD0999644B0B3EA0A5014AC8D56FCE9DD75B32E7B4F677BCD44EF935003EFB6A3CC33DCB765D5FE
24,623,383 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,609 writing to cptra_bootfsm_go
3,757,005 ready_for_fw is high
3,757,557 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
13,176,066 >>> mbox cmd response: success
17,425,595 UART:
17,425,994 UART: Running Caliptra FMC ...
17,427,141 UART:
17,427,307 UART: [state] CFI Enabled
17,435,151 UART: [fht] FMC Alias Private Key: 7
19,192,135 UART: [art] Extend RT PCRs Done
19,193,419 UART: [art] Lock RT PCRs Done
19,195,207 UART: [art] Populate DV Done
19,200,808 UART: [fht] FMC Alias Private Key: 7
19,202,344 UART: [art] Derive CDI
19,203,353 UART: [art] Store in in slot 0x4
19,245,526 UART: [art] Derive Key Pair
19,246,579 UART: [art] Store priv key in slot 0x5
21,673,336 UART: [art] Derive Key Pair - Done
21,686,394 UART: [art] Signing Cert with AUTHO
21,687,781 UART: RITY.KEYID = 7
23,393,197 UART: [art] Erasing AUTHORITY.KEYID = 7
23,394,731 UART: [art] PUB.X = FFF8E95AB2B40F65D9A0306382E6649856D9F1B0D04615B92A673450F7787EA6D2082D9D40831B815578116D8F0237D5
23,401,950 UART: [art] PUB.Y = A81897AFCCAB0262E9C48BAF4E02AB487A857A6EC4C5B34846F7DA2231952405317F205F32AB00FBFE2E51652C475199
23,409,163 UART: [art] SIG.R = 7A2FA2EEA6B68E0EEA969F8CD7C220EB11D453BECA2049476F938128C8302466810D0270AB63790B5B705DC44BFDD465
23,416,576 UART: [art] SIG.S = 1106223CD5BA8A2EE3326D9917B615E79FEF7430093010CEE3CB31B738968D012DBD2D3DAB479B95ED0B8A4CAB91449B
24,394,935 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,595 UART: [kat] SHA2-256
892,533 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
903,114 UART: [kat] HMAC-384Kdf
907,762 UART: [kat] LMS
1,475,958 UART: [kat] --
1,476,893 UART: [cold-reset] ++
1,477,447 UART: [fht] Storing FHT @ 0x50003400
1,480,238 UART: [idev] ++
1,480,406 UART: [idev] CDI.KEYID = 6
1,480,766 UART: [idev] SUBJECT.KEYID = 7
1,481,190 UART: [idev] UDS.KEYID = 0
1,481,535 ready_for_fw is high
1,481,535 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,489,000 UART: [idev] Erasing UDS.KEYID = 0
1,505,508 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,068 UART: [idev] --
1,515,311 UART: [ldev] ++
1,515,479 UART: [ldev] CDI.KEYID = 6
1,515,842 UART: [ldev] SUBJECT.KEYID = 5
1,516,268 UART: [ldev] AUTHORITY.KEYID = 7
1,516,731 UART: [ldev] FE.KEYID = 1
1,522,257 UART: [ldev] Erasing FE.KEYID = 1
1,547,564 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,500 UART: [ldev] --
1,586,963 UART: [fwproc] Waiting for Commands...
1,587,660 UART: [fwproc] Received command 0x46574c44
1,588,451 UART: [fwproc] Received Image of size 31656 bytes
1,938,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,965,664 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,016 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,006,739 >>> mbox cmd response: success
2,007,873 UART: [afmc] ++
2,008,041 UART: [afmc] CDI.KEYID = 6
2,008,403 UART: [afmc] SUBJECT.KEYID = 7
2,008,828 UART: [afmc] AUTHORITY.KEYID = 5
2,044,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,513 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,293 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,067,021 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,906 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,596 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,613 UART: [afmc] --
2,087,707 UART: [cold-reset] --
2,088,473 UART: [state] Locking Datavault
2,089,496 UART: [state] Locking PCR0, PCR1 and PCR31
2,090,100 UART: [state] Locking ICCM
2,090,732 UART: [exit] Launching FMC @ 0x40000130
2,096,061 UART:
2,096,077 UART: Running Caliptra FMC ...
2,096,485 UART:
2,096,539 UART: [state] CFI Enabled
2,107,080 UART: [fht] FMC Alias Private Key: 7
2,215,191 UART: [art] Extend RT PCRs Done
2,215,619 UART: [art] Lock RT PCRs Done
2,217,103 UART: [art] Populate DV Done
2,225,600 UART: [fht] FMC Alias Private Key: 7
2,226,632 UART: [art] Derive CDI
2,226,912 UART: [art] Store in in slot 0x4
2,312,935 UART: [art] Derive Key Pair
2,313,295 UART: [art] Store priv key in slot 0x5
2,326,197 UART: [art] Derive Key Pair - Done
2,341,157 UART: [art] Signing Cert with AUTHO
2,341,637 UART: RITY.KEYID = 7
2,356,643 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,408 UART: [art] PUB.X = 908F7B0C08504FD334288F008E0C21AD429124DA30B3D141E25595CC53B1A459A3F3A69981C9D99D8DAD840B60E397BF
2,364,146 UART: [art] PUB.Y = 55F0E3EAE16F0535945195D4569B9F60027D87B8F194DC1CF5C485F265F7C8E169E01530FC4964DED7594D41C9FCCEEA
2,371,098 UART: [art] SIG.R = 8D2BFA008B9A5F3F4F47885CE73ED115672477A940749CC34DBCCA5A0B2CB023D14F3D8C0CC4289BCFA90C3FD4E50238
2,377,850 UART: [art] SIG.S = A23693651BFE2543F196C5435D179710A215DBF6AE2C68E83739EFCFF2FBA02EF09A766DAB51067936791B3966CAB396
2,401,677 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,897 ready_for_fw is high
1,361,897 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,419 >>> mbox cmd response: success
1,917,999 UART:
1,918,015 UART: Running Caliptra FMC ...
1,918,423 UART:
1,918,477 UART: [state] CFI Enabled
1,929,006 UART: [fht] FMC Alias Private Key: 7
2,037,221 UART: [art] Extend RT PCRs Done
2,037,649 UART: [art] Lock RT PCRs Done
2,039,397 UART: [art] Populate DV Done
2,047,682 UART: [fht] FMC Alias Private Key: 7
2,048,840 UART: [art] Derive CDI
2,049,120 UART: [art] Store in in slot 0x4
2,134,583 UART: [art] Derive Key Pair
2,134,943 UART: [art] Store priv key in slot 0x5
2,148,179 UART: [art] Derive Key Pair - Done
2,163,433 UART: [art] Signing Cert with AUTHO
2,163,913 UART: RITY.KEYID = 7
2,178,909 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,674 UART: [art] PUB.X = D155FF51192E46B7CFBB815B023853B18CF9253526030B2F163076B673B070BBEEC59826C5BBF49AD375D0B4851A5172
2,186,435 UART: [art] PUB.Y = A53B82636D9681BF49C0F274A30E4F6FB307055FDD4D911C510BE2856603E5ABA69300663EE78513F238AA44BC0BF8B2
2,193,349 UART: [art] SIG.R = 9443DFDB8FA0E9037E6EF80262A46DFC428678A7616E07E8BF0F5883723737E3ACF77E1314D7B9F2429815F1FD9307D6
2,200,106 UART: [art] SIG.S = 7D21960628F77DC994251C9C6FD2C33576C1816308550D6DA6A056B90C9252086AF88DB031A5F2C595DE455198504951
2,224,383 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,014 UART: [kat] SHA2-256
881,945 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,060 UART: [kat] ++
886,212 UART: [kat] sha1
890,552 UART: [kat] SHA2-256
892,490 UART: [kat] SHA2-384
895,245 UART: [kat] SHA2-512-ACC
897,146 UART: [kat] ECC-384
902,637 UART: [kat] HMAC-384Kdf
907,179 UART: [kat] LMS
1,475,375 UART: [kat] --
1,476,452 UART: [cold-reset] ++
1,476,836 UART: [fht] Storing FHT @ 0x50003400
1,479,589 UART: [idev] ++
1,479,757 UART: [idev] CDI.KEYID = 6
1,480,117 UART: [idev] SUBJECT.KEYID = 7
1,480,541 UART: [idev] UDS.KEYID = 0
1,480,886 ready_for_fw is high
1,480,886 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,611 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,301 UART: [idev] --
1,515,336 UART: [ldev] ++
1,515,504 UART: [ldev] CDI.KEYID = 6
1,515,867 UART: [ldev] SUBJECT.KEYID = 5
1,516,293 UART: [ldev] AUTHORITY.KEYID = 7
1,516,756 UART: [ldev] FE.KEYID = 1
1,522,202 UART: [ldev] Erasing FE.KEYID = 1
1,546,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,067 UART: [ldev] --
1,586,384 UART: [fwproc] Waiting for Commands...
1,587,119 UART: [fwproc] Received command 0x46574c44
1,587,910 UART: [fwproc] Received Image of size 31656 bytes
1,938,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,966,065 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,995,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 6972
2,007,116 >>> mbox cmd response: success
2,008,200 UART: [afmc] ++
2,008,368 UART: [afmc] CDI.KEYID = 6
2,008,730 UART: [afmc] SUBJECT.KEYID = 7
2,009,155 UART: [afmc] AUTHORITY.KEYID = 5
2,044,642 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,060,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,061,258 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,066,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,072,871 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,078,561 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,086,372 UART: [afmc] --
2,087,434 UART: [cold-reset] --
2,088,204 UART: [state] Locking Datavault
2,089,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,089,799 UART: [state] Locking ICCM
2,090,251 UART: [exit] Launching FMC @ 0x40000130
2,095,580 UART:
2,095,596 UART: Running Caliptra FMC ...
2,096,004 UART:
2,096,147 UART: [state] CFI Enabled
2,106,970 UART: [fht] FMC Alias Private Key: 7
2,214,591 UART: [art] Extend RT PCRs Done
2,215,019 UART: [art] Lock RT PCRs Done
2,216,417 UART: [art] Populate DV Done
2,224,802 UART: [fht] FMC Alias Private Key: 7
2,225,984 UART: [art] Derive CDI
2,226,264 UART: [art] Store in in slot 0x4
2,311,993 UART: [art] Derive Key Pair
2,312,353 UART: [art] Store priv key in slot 0x5
2,325,255 UART: [art] Derive Key Pair - Done
2,339,815 UART: [art] Signing Cert with AUTHO
2,340,295 UART: RITY.KEYID = 7
2,355,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,356,172 UART: [art] PUB.X = 7654E8C22EA9C6EA932F08B7764F403E99993D866F7C48AC960E0593B3FDCCE770E697473A8E2BC62B104133A2D0BC6F
2,362,939 UART: [art] PUB.Y = 7DB4E8BDB7B6C8965F0AB3195AAFE60192B52D0FFCDB6A2F04B13BD54E2503A49482902FF37611C1E46099B44A2E9682
2,369,884 UART: [art] SIG.R = 842A7C6E6B6191647D98524D0B99DD66CC099644735CE202224E48BC5AAB8E9243282074FA928009F7BC35E142982E86
2,376,634 UART: [art] SIG.S = F25D04745AEA8CBD9AB6B93C7C8389DAAFADA7A1C99AD86A400A35ECBC8312EA98E6084ED24AE0EDF8FC26D4A95C1AD6
2,400,117 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,962 ready_for_fw is high
1,362,962 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,856,330 >>> mbox cmd response: success
1,917,562 UART:
1,917,578 UART: Running Caliptra FMC ...
1,917,986 UART:
1,918,129 UART: [state] CFI Enabled
1,928,870 UART: [fht] FMC Alias Private Key: 7
2,036,837 UART: [art] Extend RT PCRs Done
2,037,265 UART: [art] Lock RT PCRs Done
2,038,919 UART: [art] Populate DV Done
2,047,174 UART: [fht] FMC Alias Private Key: 7
2,048,282 UART: [art] Derive CDI
2,048,562 UART: [art] Store in in slot 0x4
2,134,173 UART: [art] Derive Key Pair
2,134,533 UART: [art] Store priv key in slot 0x5
2,148,083 UART: [art] Derive Key Pair - Done
2,163,018 UART: [art] Signing Cert with AUTHO
2,163,498 UART: RITY.KEYID = 7
2,178,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,179,601 UART: [art] PUB.X = 1D1AB3BFEEFF9B58B947DFB83C28D5A0758CA61088FCD5C337B264DFFCD4573D2732DC6B734A758C23C60A41EE8FB83A
2,186,390 UART: [art] PUB.Y = E5227CA1F85D34B7967B6788E77903C1B7A30F7B6B9D130E87FDAF4A8045147FD7BF1EA8C9CA18AFA07C948A1A5E3EE8
2,193,347 UART: [art] SIG.R = E85CB085720EE62363F767B24EF49FD0A42E317B15C589E606B043548223F6067DC60CD24E176CE9570125412BB5E1C2
2,200,098 UART: [art] SIG.S = 68511FAD302C5FAEBBEE4F9AFB2D97282E267EAC8EAF4336FE76FC3B419E52A53B1CAD50B6D06E1DD242B87D77E5FB92
2,224,598 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,538 UART: [kat] SHA2-512-ACC
908,439 UART: [kat] ECC-384
918,496 UART: [kat] HMAC-384Kdf
923,022 UART: [kat] LMS
1,171,350 UART: [kat] --
1,172,579 UART: [cold-reset] ++
1,172,977 UART: [fht] FHT @ 0x50003400
1,175,504 UART: [idev] ++
1,175,672 UART: [idev] CDI.KEYID = 6
1,176,032 UART: [idev] SUBJECT.KEYID = 7
1,176,456 UART: [idev] UDS.KEYID = 0
1,176,801 ready_for_fw is high
1,176,801 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,600 UART: [idev] Erasing UDS.KEYID = 0
1,201,501 UART: [idev] Sha1 KeyId Algorithm
1,209,957 UART: [idev] --
1,210,983 UART: [ldev] ++
1,211,151 UART: [ldev] CDI.KEYID = 6
1,211,514 UART: [ldev] SUBJECT.KEYID = 5
1,211,940 UART: [ldev] AUTHORITY.KEYID = 7
1,212,403 UART: [ldev] FE.KEYID = 1
1,217,701 UART: [ldev] Erasing FE.KEYID = 1
1,244,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,247 UART: [ldev] --
1,283,532 UART: [fwproc] Wait for Commands...
1,284,146 UART: [fwproc] Recv command 0x46574c44
1,284,874 UART: [fwproc] Recv'd Img size: 31656 bytes
1,635,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,033 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,703,906 >>> mbox cmd response: success
1,705,054 UART: [afmc] ++
1,705,222 UART: [afmc] CDI.KEYID = 6
1,705,584 UART: [afmc] SUBJECT.KEYID = 7
1,706,009 UART: [afmc] AUTHORITY.KEYID = 5
1,741,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,871 UART: [afmc] --
1,784,873 UART: [cold-reset] --
1,785,731 UART: [state] Locking Datavault
1,786,882 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,486 UART: [state] Locking ICCM
1,788,116 UART: [exit] Launching FMC @ 0x40000130
1,793,445 UART:
1,793,461 UART: Running Caliptra FMC ...
1,793,869 UART:
1,793,923 UART: [state] CFI Enabled
1,804,420 UART: [fht] FMC Alias Private Key: 7
1,912,553 UART: [art] Extend RT PCRs Done
1,912,981 UART: [art] Lock RT PCRs Done
1,914,351 UART: [art] Populate DV Done
1,922,528 UART: [fht] FMC Alias Private Key: 7
1,923,518 UART: [art] Derive CDI
1,923,798 UART: [art] Store in in slot 0x4
2,009,377 UART: [art] Derive Key Pair
2,009,737 UART: [art] Store priv key in slot 0x5
2,022,765 UART: [art] Derive Key Pair - Done
2,037,589 UART: [art] Signing Cert with AUTHO
2,038,069 UART: RITY.KEYID = 7
2,053,587 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,352 UART: [art] PUB.X = 44545F08B7D708D8B4CFB303A78A947E651829F88CBA7DC075A9DA8C335BFA9019EBBAD641DA3A66D8717E45634C6249
2,061,121 UART: [art] PUB.Y = 469B222485B5B84E5B28C78FFD74CC5EDE91D1EC28EC2817858DAAF28FB696075F298C8F3CC1CD2A787404EBB58F9CDB
2,068,083 UART: [art] SIG.R = D0708E6F43CED059B8484F75853425C45C1DC173250CA6A24E1EA5A9D78C802F96246AE8AA404935B41B36EDA4873ED1
2,074,854 UART: [art] SIG.S = F8BCB8AE2EF11F05775E63B8D5A21918506F6C5BC73F5F4C7A878080E5F50D05305EB3F6D05CCC148C792F2ACC998333
2,098,595 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,409 ready_for_fw is high
1,061,409 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,927 >>> mbox cmd response: success
1,618,733 UART:
1,618,749 UART: Running Caliptra FMC ...
1,619,157 UART:
1,619,211 UART: [state] CFI Enabled
1,629,734 UART: [fht] FMC Alias Private Key: 7
1,738,289 UART: [art] Extend RT PCRs Done
1,738,717 UART: [art] Lock RT PCRs Done
1,740,121 UART: [art] Populate DV Done
1,748,404 UART: [fht] FMC Alias Private Key: 7
1,749,518 UART: [art] Derive CDI
1,749,798 UART: [art] Store in in slot 0x4
1,835,005 UART: [art] Derive Key Pair
1,835,365 UART: [art] Store priv key in slot 0x5
1,848,385 UART: [art] Derive Key Pair - Done
1,862,959 UART: [art] Signing Cert with AUTHO
1,863,439 UART: RITY.KEYID = 7
1,878,289 UART: [art] Erasing AUTHORITY.KEYID = 7
1,879,054 UART: [art] PUB.X = D3084E29F51BB6DEBD15A420049CA694D3F31256EE462974764BF6FF8DEF327ED371DB51C24D4D7921DD816FC95F6384
1,885,826 UART: [art] PUB.Y = BABC8FB9D3FEBBFA2362CC25201057421C95F53307667B6F473BFA268E75CD35A4FBE305554A74933383FF865E958C5A
1,892,778 UART: [art] SIG.R = A659B413AD4FE5A0AD1DAADB29A7F0C21E5750187B78EEF4E16A0906E0253D3164B4BEDA702A2ECBC913877C4BD4E47E
1,899,562 UART: [art] SIG.S = 1C7C226E81A378396056110E6EA933BC3A2706B0CF96545C6C5DC0FA16F11737FA7016781724AF518EFD55D94F6B0D0B
1,922,930 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,981 UART: [kat] HMAC-384Kdf
923,495 UART: [kat] LMS
1,171,823 UART: [kat] --
1,172,656 UART: [cold-reset] ++
1,173,122 UART: [fht] FHT @ 0x50003400
1,175,899 UART: [idev] ++
1,176,067 UART: [idev] CDI.KEYID = 6
1,176,427 UART: [idev] SUBJECT.KEYID = 7
1,176,851 UART: [idev] UDS.KEYID = 0
1,177,196 ready_for_fw is high
1,177,196 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,184,673 UART: [idev] Erasing UDS.KEYID = 0
1,201,798 UART: [idev] Sha1 KeyId Algorithm
1,210,288 UART: [idev] --
1,211,472 UART: [ldev] ++
1,211,640 UART: [ldev] CDI.KEYID = 6
1,212,003 UART: [ldev] SUBJECT.KEYID = 5
1,212,429 UART: [ldev] AUTHORITY.KEYID = 7
1,212,892 UART: [ldev] FE.KEYID = 1
1,218,394 UART: [ldev] Erasing FE.KEYID = 1
1,244,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,648 UART: [ldev] --
1,284,055 UART: [fwproc] Wait for Commands...
1,284,705 UART: [fwproc] Recv command 0x46574c44
1,285,433 UART: [fwproc] Recv'd Img size: 31656 bytes
1,636,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,970 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,692,274 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,704,015 >>> mbox cmd response: success
1,705,033 UART: [afmc] ++
1,705,201 UART: [afmc] CDI.KEYID = 6
1,705,563 UART: [afmc] SUBJECT.KEYID = 7
1,705,988 UART: [afmc] AUTHORITY.KEYID = 5
1,742,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,372 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,704 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,584 UART: [afmc] --
1,785,638 UART: [cold-reset] --
1,786,560 UART: [state] Locking Datavault
1,787,721 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,325 UART: [state] Locking ICCM
1,788,809 UART: [exit] Launching FMC @ 0x40000130
1,794,138 UART:
1,794,154 UART: Running Caliptra FMC ...
1,794,562 UART:
1,794,705 UART: [state] CFI Enabled
1,805,514 UART: [fht] FMC Alias Private Key: 7
1,913,609 UART: [art] Extend RT PCRs Done
1,914,037 UART: [art] Lock RT PCRs Done
1,915,429 UART: [art] Populate DV Done
1,923,818 UART: [fht] FMC Alias Private Key: 7
1,924,888 UART: [art] Derive CDI
1,925,168 UART: [art] Store in in slot 0x4
2,010,671 UART: [art] Derive Key Pair
2,011,031 UART: [art] Store priv key in slot 0x5
2,024,651 UART: [art] Derive Key Pair - Done
2,039,151 UART: [art] Signing Cert with AUTHO
2,039,631 UART: RITY.KEYID = 7
2,054,995 UART: [art] Erasing AUTHORITY.KEYID = 7
2,055,760 UART: [art] PUB.X = E1083FCFB63EABB434A1C9A95AFBF4FAA9D89E417072D6BFDBBAF35D76ABE56DAF5B4704FA6D81995D53E09687ECA2E2
2,062,554 UART: [art] PUB.Y = 4F4FC1D19F630CDE03A05062353EC252036BF1222115285A4EE446D5F6814A4D0A123E19AE9FF3248475DD856E032356
2,069,485 UART: [art] SIG.R = D2BD7F60D43BB70FF2D3E1434EEF3DD0B876B8047E3866D7201E6CFAC70AB554270EC2C8BDD280F3BECC97278F9F0AC3
2,076,262 UART: [art] SIG.S = 8B38333E71C197369F1DF46A943CCB5C6545D7C2BDAE78E1591D247E0BE5EEFD12D1A51A96DFB6B3D7B54AF3BA3B3082
2,099,821 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,914 ready_for_fw is high
1,060,914 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,555,174 >>> mbox cmd response: success
1,617,698 UART:
1,617,714 UART: Running Caliptra FMC ...
1,618,122 UART:
1,618,265 UART: [state] CFI Enabled
1,628,688 UART: [fht] FMC Alias Private Key: 7
1,736,855 UART: [art] Extend RT PCRs Done
1,737,283 UART: [art] Lock RT PCRs Done
1,738,903 UART: [art] Populate DV Done
1,746,884 UART: [fht] FMC Alias Private Key: 7
1,747,940 UART: [art] Derive CDI
1,748,220 UART: [art] Store in in slot 0x4
1,834,061 UART: [art] Derive Key Pair
1,834,421 UART: [art] Store priv key in slot 0x5
1,848,297 UART: [art] Derive Key Pair - Done
1,863,175 UART: [art] Signing Cert with AUTHO
1,863,655 UART: RITY.KEYID = 7
1,879,181 UART: [art] Erasing AUTHORITY.KEYID = 7
1,879,946 UART: [art] PUB.X = C9ADDF55786954939BCE65688BD992FAF9987048D42AA65A9014AE9285265162CFB73F5E7AB107150C7258CC0F8C8AAC
1,886,713 UART: [art] PUB.Y = C3B51FE78F37E58EB525CA47C895F2D40E80C57AAFF9105D072715610A230253B9ECC75911AC496AB214607C1480BF8D
1,893,655 UART: [art] SIG.R = 6497829E22BF66B463065FCF626A4333482A0279D388212C8EC6078E63B03CAA67F8CF42D94002393247C0FF5495E7AC
1,900,407 UART: [art] SIG.S = 75F61944BBEBCCC554FE638F6BE481FD5B9C686E6E4A8499DAD68D2457FCBD8CB0E9D36C28FCDFA9C086B724EC4FA879
1,924,567 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,508 UART: [kat] LMS
1,168,820 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,833 UART: [idev] ++
1,173,001 UART: [idev] CDI.KEYID = 6
1,173,362 UART: [idev] SUBJECT.KEYID = 7
1,173,787 UART: [idev] UDS.KEYID = 0
1,174,133 ready_for_fw is high
1,174,133 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,198,733 UART: [idev] Sha1 KeyId Algorithm
1,207,807 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,494 UART: [ldev] Erasing FE.KEYID = 1
1,242,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,066 UART: [ldev] --
1,281,380 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,660,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,076 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,701,746 >>> mbox cmd response: success
1,702,785 UART: [afmc] ++
1,702,953 UART: [afmc] CDI.KEYID = 6
1,703,316 UART: [afmc] SUBJECT.KEYID = 7
1,703,742 UART: [afmc] AUTHORITY.KEYID = 5
1,738,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,755,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,755,902 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,761,631 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,767,514 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,773,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,780,944 UART: [afmc] --
1,781,868 UART: [cold-reset] --
1,782,608 UART: [state] Locking Datavault
1,783,981 UART: [state] Locking PCR0, PCR1 and PCR31
1,784,585 UART: [state] Locking ICCM
1,785,023 UART: [exit] Launching FMC @ 0x40000130
1,790,352 UART:
1,790,368 UART: Running Caliptra FMC ...
1,790,776 UART:
1,790,830 UART: [state] CFI Enabled
1,801,531 UART: [fht] FMC Alias Private Key: 7
1,910,060 UART: [art] Extend RT PCRs Done
1,910,488 UART: [art] Lock RT PCRs Done
1,912,178 UART: [art] Populate DV Done
1,920,333 UART: [fht] FMC Alias Private Key: 7
1,921,357 UART: [art] Derive CDI
1,921,637 UART: [art] Store in in slot 0x4
2,007,376 UART: [art] Derive Key Pair
2,007,736 UART: [art] Store priv key in slot 0x5
2,020,692 UART: [art] Derive Key Pair - Done
2,035,543 UART: [art] Signing Cert with AUTHO
2,036,023 UART: RITY.KEYID = 7
2,051,015 UART: [art] Erasing AUTHORITY.KEYID = 7
2,051,780 UART: [art] PUB.X = 3C5520A859C94FC5C486569B5EC2E82B367121D965EC31E31178218AC0715BA80CE184264B817E4194C91A8D2E5A6ECE
2,058,547 UART: [art] PUB.Y = D3EFF110F297FFDF99D13F4765EB39105D0299948F8D362B1833946023D5FA20C691EA306CF54DF3BAF809AE281A5788
2,065,495 UART: [art] SIG.R = B36FE2F0D2D0B204964910071357EB2B8655917FFFE8096C1F29AF39B8EB00993BEB6DB12026B57F0F09E7943A26CB91
2,072,232 UART: [art] SIG.S = 8017E58FC7FFA933BF1210DDDDE0670062C631F75D121AB29F2AE98C1382F3961506FA12813513AC9B7269A5E7A23F40
2,095,909 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,104 ready_for_fw is high
1,056,104 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,394 >>> mbox cmd response: success
1,615,030 UART:
1,615,046 UART: Running Caliptra FMC ...
1,615,454 UART:
1,615,508 UART: [state] CFI Enabled
1,626,033 UART: [fht] FMC Alias Private Key: 7
1,734,138 UART: [art] Extend RT PCRs Done
1,734,566 UART: [art] Lock RT PCRs Done
1,735,792 UART: [art] Populate DV Done
1,743,749 UART: [fht] FMC Alias Private Key: 7
1,744,907 UART: [art] Derive CDI
1,745,187 UART: [art] Store in in slot 0x4
1,831,314 UART: [art] Derive Key Pair
1,831,674 UART: [art] Store priv key in slot 0x5
1,844,920 UART: [art] Derive Key Pair - Done
1,859,669 UART: [art] Signing Cert with AUTHO
1,860,149 UART: RITY.KEYID = 7
1,875,251 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,016 UART: [art] PUB.X = 0D2709C981831D9AE44F9A2CF41EAC4B933EBE095876CBA62504B18EE6CAE9D7204CD3CD0FBB49EAE941AF9AC8BB4FD1
1,882,797 UART: [art] PUB.Y = 98D74F5CF61437D2DF447032200369FE3159551CEB24D8E961718721CF02C87F77D8EB17BA6797BDB9A914B18A0268F2
1,889,736 UART: [art] SIG.R = A62528FFF2362E807E0D66EEAF7E40903CB7E73FE3654B93E8AA5EB6DFBF3A8F01A7902D366B7DA727F29AF56C8BBA23
1,896,520 UART: [art] SIG.S = 2B9FA14CB086AF4C853CB42E3DBFA5B271213CC600B77E32369A332FAF3417057965A78DCA4E6DDCD55CF888249E5299
1,919,973 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Unprovisioned
85,614 UART: [state] DebugLocked = No
86,192 UART: [state] WD Timer not started. Device not locked for debugging
87,423 UART: [kat] SHA2-256
890,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,102 UART: [kat] ++
895,254 UART: [kat] sha1
899,588 UART: [kat] SHA2-256
901,528 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,169,682 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 ready_for_fw is high
1,173,976 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,181,730 UART: [idev] Erasing UDS.KEYID = 0
1,199,166 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,107 UART: [fwproc] Recv'd Img size: 31656 bytes
1,633,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,690,807 UART: [fwproc] Load Runtime at address 0x40005000 len 6972
1,702,635 >>> mbox cmd response: success
1,703,746 UART: [afmc] ++
1,703,914 UART: [afmc] CDI.KEYID = 6
1,704,277 UART: [afmc] SUBJECT.KEYID = 7
1,704,703 UART: [afmc] AUTHORITY.KEYID = 5
1,740,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,041 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,763,770 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,769,653 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,372 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,211 UART: [afmc] --
1,784,247 UART: [cold-reset] --
1,785,073 UART: [state] Locking Datavault
1,786,334 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,938 UART: [state] Locking ICCM
1,787,578 UART: [exit] Launching FMC @ 0x40000130
1,792,907 UART:
1,792,923 UART: Running Caliptra FMC ...
1,793,331 UART:
1,793,474 UART: [state] CFI Enabled
1,804,309 UART: [fht] FMC Alias Private Key: 7
1,912,184 UART: [art] Extend RT PCRs Done
1,912,612 UART: [art] Lock RT PCRs Done
1,913,870 UART: [art] Populate DV Done
1,922,241 UART: [fht] FMC Alias Private Key: 7
1,923,331 UART: [art] Derive CDI
1,923,611 UART: [art] Store in in slot 0x4
2,009,174 UART: [art] Derive Key Pair
2,009,534 UART: [art] Store priv key in slot 0x5
2,023,206 UART: [art] Derive Key Pair - Done
2,038,142 UART: [art] Signing Cert with AUTHO
2,038,622 UART: RITY.KEYID = 7
2,053,988 UART: [art] Erasing AUTHORITY.KEYID = 7
2,054,753 UART: [art] PUB.X = 29FC8FBE4899A738A11D855F3E5671BBD5F9E4A53C9C03CA06A104E332A42F54CD15C2D93B717EB21D15753024C2317B
2,061,520 UART: [art] PUB.Y = 4DE23EED28B7E86030F19697FC308A0CBD2EF13DDAF77AE5ADA3C7CD456D23E251D47FA89FFBA1719FBE172EF8C1B327
2,068,493 UART: [art] SIG.R = 309907742F447614576E042D8031538FA4E17AAE0EFD908E584D1377D16DA78BF5360FB269ABB94AE55698ADA6AE18BF
2,075,255 UART: [art] SIG.S = DEAAFB6531946A778E6C72C7C25E749B024992DFFEDC4935BC13D521B7BFE331525C67850BF41D8B89D29998BC29124E
2,098,793 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,853 ready_for_fw is high
1,055,853 <<< Executing mbox cmd 0x46574c44 (31656 bytes) from SoC
1,552,391 >>> mbox cmd response: success
1,615,195 UART:
1,615,211 UART: Running Caliptra FMC ...
1,615,619 UART:
1,615,762 UART: [state] CFI Enabled
1,626,603 UART: [fht] FMC Alias Private Key: 7
1,734,826 UART: [art] Extend RT PCRs Done
1,735,254 UART: [art] Lock RT PCRs Done
1,736,858 UART: [art] Populate DV Done
1,745,127 UART: [fht] FMC Alias Private Key: 7
1,746,055 UART: [art] Derive CDI
1,746,335 UART: [art] Store in in slot 0x4
1,832,234 UART: [art] Derive Key Pair
1,832,594 UART: [art] Store priv key in slot 0x5
1,845,282 UART: [art] Derive Key Pair - Done
1,859,940 UART: [art] Signing Cert with AUTHO
1,860,420 UART: RITY.KEYID = 7
1,875,472 UART: [art] Erasing AUTHORITY.KEYID = 7
1,876,237 UART: [art] PUB.X = 42CFC1FD3417DF283CCE449A81578CBDFBDEAD729C8606ADE7F154C755AEB367B9F9CCCC3FCB8FCA8DB4D810B6AFD9B7
1,883,040 UART: [art] PUB.Y = 449E917C7AB8C6A67378D1F3A2A24D55174145F14AF86C0493449515FD52C35DF1BE4C7FAC99273B5D5994C4ED6F5964
1,889,989 UART: [art] SIG.R = BE5229EBEE5B541E108AA786E548B885DB329DB0F1C638691F444F892553F9D659A9BA2A0239666F5A206E59261B3B05
1,896,753 UART: [art] SIG.S = 4509123C1C8D1550458537E697AE512666B54F1329423E6F15CBF17BD4D4CDB1440A713FBCEE55A2CC19A33A8BD49270
1,920,067 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,019 UART:
192,388 UART: Running Caliptra ROM ...
193,561 UART:
193,711 UART: [state] CFI Enabled
264,966 UART: [state] LifecycleState = Unprovisioned
266,957 UART: [state] DebugLocked = No
268,842 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,849 UART: [kat] SHA2-256
442,551 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,085 UART: [kat] ++
453,560 UART: [kat] sha1
464,503 UART: [kat] SHA2-256
467,188 UART: [kat] SHA2-384
472,110 UART: [kat] SHA2-512-ACC
474,470 UART: [kat] ECC-384
2,768,341 UART: [kat] HMAC-384Kdf
2,799,926 UART: [kat] LMS
3,990,208 UART: [kat] --
3,995,164 UART: [cold-reset] ++
3,997,377 UART: [fht] Storing FHT @ 0x50003400
4,009,349 UART: [idev] ++
4,009,914 UART: [idev] CDI.KEYID = 6
4,010,800 UART: [idev] SUBJECT.KEYID = 7
4,012,043 UART: [idev] UDS.KEYID = 0
4,013,042 ready_for_fw is high
4,013,254 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,112,694 UART: [idev] Erasing UDS.KEYID = 0
7,346,443 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,104 UART: [idev] --
7,371,822 UART: [ldev] ++
7,372,387 UART: [ldev] CDI.KEYID = 6
7,373,320 UART: [ldev] SUBJECT.KEYID = 5
7,374,574 UART: [ldev] AUTHORITY.KEYID = 7
7,375,796 UART: [ldev] FE.KEYID = 1
7,424,166 UART: [ldev] Erasing FE.KEYID = 1
10,758,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,613 UART: [ldev] --
13,138,948 UART: [fwproc] Waiting for Commands...
13,141,409 UART: [fwproc] Received command 0x46574c44
13,143,633 UART: [fwproc] Received Image of size 78576 bytes
16,759,696 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,840,613 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,909,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,102,594 >>> mbox cmd response: success
17,103,065 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,107,233 UART: [afmc] ++
17,107,826 UART: [afmc] CDI.KEYID = 6
17,108,741 UART: [afmc] SUBJECT.KEYID = 7
17,109,952 UART: [afmc] AUTHORITY.KEYID = 5
20,471,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,775,915 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,778,164 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,792,575 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,807,402 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,821,879 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,842,933 UART: [afmc] --
22,846,102 UART: [cold-reset] --
22,850,335 UART: [state] Locking Datavault
22,857,163 UART: [state] Locking PCR0, PCR1 and PCR31
22,858,958 UART: [state] Locking ICCM
22,861,352 UART: [exit] Launching FMC @ 0x40000130
22,869,737 UART:
22,869,964 UART: Running Caliptra FMC ...
22,871,058 UART:
22,871,213 UART: [state] CFI Enabled
22,935,799 UART: [fht] FMC Alias Private Key: 7
25,273,069 UART: [art] Extend RT PCRs Done
25,274,305 UART: [art] Lock RT PCRs Done
25,275,977 UART: [art] Populate DV Done
25,281,382 UART: [fht] FMC Alias Private Key: 7
25,283,071 UART: [art] Derive CDI
25,283,805 UART: [art] Store in in slot 0x4
25,343,532 UART: [art] Derive Key Pair
25,344,563 UART: [art] Store priv key in slot 0x5
28,636,986 UART: [art] Derive Key Pair - Done
28,650,308 UART: [art] Signing Cert with AUTHO
28,651,613 UART: RITY.KEYID = 7
30,937,648 UART: [art] Erasing AUTHORITY.KEYID = 7
30,939,198 UART: [art] PUB.X = A57EDD075671628E6D261BDF538870C769E9D97586DFDD1AB87BDF255CE4C8D0203D5F49453B3B50CCC810BADEBA2C38
30,946,397 UART: [art] PUB.Y = 1EB6638D474A4770D6335985660010DBB7E6465A7BE5E33672224348BB0196A52E0FC3E43F1502A8D23B393BA6F9F15A
30,953,622 UART: [art] SIG.R = 14D5460F6B44A649ECCF9FD2800666E78A4F2B2A57D4673DB95E5F2204182110FDCB1467702F0D33375297729B5EB74A
30,961,001 UART: [art] SIG.S = B0B36C1048339366256D3F3CB5E2B20CE5262151625D4D1892D029365DD70D10F2A55474FBA30E9B12189285C2D2C04A
32,266,128 UART: mbox::rt_entry...
32,267,101 UART: ____ _ _ _ ____ _____
32,269,129 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,271,053 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,272,980 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,274,904 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,276,847 UART: |_|
32,277,656 UART:
32,390,619 UART: [rt] Runtime listening for mailbox commands...
32,392,796 >>> mbox cmd response data (48 bytes)
32,393,457 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,395,781 >>> mbox cmd response data (48 bytes)
32,396,614 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,409,157 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,806,811 ready_for_fw is high
3,807,442 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,152,846 >>> mbox cmd response: success
17,153,436 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,836,706 UART:
22,837,103 UART: Running Caliptra FMC ...
22,838,238 UART:
22,838,390 UART: [state] CFI Enabled
22,890,311 UART: [fht] FMC Alias Private Key: 7
25,227,696 UART: [art] Extend RT PCRs Done
25,228,929 UART: [art] Lock RT PCRs Done
25,230,260 UART: [art] Populate DV Done
25,235,567 UART: [fht] FMC Alias Private Key: 7
25,237,047 UART: [art] Derive CDI
25,237,813 UART: [art] Store in in slot 0x4
25,298,660 UART: [art] Derive Key Pair
25,299,709 UART: [art] Store priv key in slot 0x5
28,592,688 UART: [art] Derive Key Pair - Done
28,606,223 UART: [art] Signing Cert with AUTHO
28,607,528 UART: RITY.KEYID = 7
30,893,695 UART: [art] Erasing AUTHORITY.KEYID = 7
30,895,201 UART: [art] PUB.X = C018FA02DD388C376F00A58729B639D0FBA4150BBA3387193400ED8C1E5BED089B0DC1AF91185B77A8EF6AE8802E5AA4
30,902,470 UART: [art] PUB.Y = 3EDEA4E4944D3B8F5767C79845344EF4313F09EEEBFFF381D3C0F59A0A1D8087B208436DDE7DBE932646A7BE56D99A7F
30,909,752 UART: [art] SIG.R = 3E336399A790B3F090C5CBFB44EF35F1CCE98647CCDD5F67D3895A7F6E7DA38381BB2CF478BC378EA2D88660E8DB27E5
30,917,117 UART: [art] SIG.S = 0F17C8E1F432DD33BD80970BB24512492C7FBFEE7827A890997E307F8C17293036AB2C1244C1A496633F65F4DFFB1D60
32,221,734 UART: mbox::rt_entry...
32,222,692 UART: ____ _ _ _ ____ _____
32,224,693 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,226,698 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,228,625 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,230,581 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,232,429 UART: |_|
32,233,309 UART:
32,346,871 UART: [rt] Runtime listening for mailbox commands...
32,349,037 >>> mbox cmd response data (48 bytes)
32,349,625 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,351,945 >>> mbox cmd response data (48 bytes)
32,352,780 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,365,319 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,386 UART:
192,760 UART: Running Caliptra ROM ...
193,897 UART:
603,636 UART: [state] CFI Enabled
616,625 UART: [state] LifecycleState = Unprovisioned
618,580 UART: [state] DebugLocked = No
620,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,554 UART: [kat] SHA2-256
794,312 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,843 UART: [kat] ++
805,318 UART: [kat] sha1
817,119 UART: [kat] SHA2-256
819,843 UART: [kat] SHA2-384
825,546 UART: [kat] SHA2-512-ACC
827,920 UART: [kat] ECC-384
3,111,731 UART: [kat] HMAC-384Kdf
3,124,302 UART: [kat] LMS
4,314,409 UART: [kat] --
4,318,513 UART: [cold-reset] ++
4,319,598 UART: [fht] Storing FHT @ 0x50003400
4,330,528 UART: [idev] ++
4,331,172 UART: [idev] CDI.KEYID = 6
4,332,088 UART: [idev] SUBJECT.KEYID = 7
4,333,338 UART: [idev] UDS.KEYID = 0
4,334,420 ready_for_fw is high
4,334,628 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,433,462 UART: [idev] Erasing UDS.KEYID = 0
7,621,751 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,078 UART: [idev] --
7,648,125 UART: [ldev] ++
7,648,699 UART: [ldev] CDI.KEYID = 6
7,649,670 UART: [ldev] SUBJECT.KEYID = 5
7,650,878 UART: [ldev] AUTHORITY.KEYID = 7
7,652,162 UART: [ldev] FE.KEYID = 1
7,665,254 UART: [ldev] Erasing FE.KEYID = 1
10,950,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,878 UART: [ldev] --
13,312,145 UART: [fwproc] Waiting for Commands...
13,314,239 UART: [fwproc] Received command 0x46574c44
13,316,418 UART: [fwproc] Received Image of size 78576 bytes
16,940,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,019,427 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,088,302 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,281,616 >>> mbox cmd response: success
17,282,103 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,284,887 UART: [afmc] ++
17,285,532 UART: [afmc] CDI.KEYID = 6
17,286,444 UART: [afmc] SUBJECT.KEYID = 7
17,287,678 UART: [afmc] AUTHORITY.KEYID = 5
20,603,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,898,091 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,900,352 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,914,740 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,929,549 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,943,977 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,964,831 UART: [afmc] --
22,968,752 UART: [cold-reset] --
22,971,858 UART: [state] Locking Datavault
22,978,182 UART: [state] Locking PCR0, PCR1 and PCR31
22,979,893 UART: [state] Locking ICCM
22,981,611 UART: [exit] Launching FMC @ 0x40000130
22,990,005 UART:
22,990,252 UART: Running Caliptra FMC ...
22,991,354 UART:
22,991,535 UART: [state] CFI Enabled
22,999,539 UART: [fht] FMC Alias Private Key: 7
25,330,256 UART: [art] Extend RT PCRs Done
25,331,476 UART: [art] Lock RT PCRs Done
25,333,074 UART: [art] Populate DV Done
25,338,785 UART: [fht] FMC Alias Private Key: 7
25,340,391 UART: [art] Derive CDI
25,341,217 UART: [art] Store in in slot 0x4
25,383,930 UART: [art] Derive Key Pair
25,384,931 UART: [art] Store priv key in slot 0x5
28,626,882 UART: [art] Derive Key Pair - Done
28,639,990 UART: [art] Signing Cert with AUTHO
28,641,298 UART: RITY.KEYID = 7
30,921,096 UART: [art] Erasing AUTHORITY.KEYID = 7
30,922,613 UART: [art] PUB.X = 4824EC9D4A0BCEE3D2954E766FE98FF8CF1E87A8FD1BF53FAF75CDE514142C7B25282A8B9B667BE58F18BF56069AC95C
30,929,870 UART: [art] PUB.Y = 8F91295B6369D77E69B5BD7C2F542E796C5C5CFDCBBE0589A0B41C99F7C7D875A75788A0958DDD240747F4ABEF7B1DDD
30,937,131 UART: [art] SIG.R = 45AC47F507CB98B2EAD5180F096267CF9706A9B906321C01E6EFC7C14688370B395A09F6DADC3063FDB6BFB5253DD111
30,944,532 UART: [art] SIG.S = C30EFD69093096DE9AE8C7BA97A7B7F10632861416CE452FDB63EE454B45D5DC757C4C71B990C65760230AAF5EAD49C0
32,249,333 UART: mbox::rt_entry...
32,250,301 UART: ____ _ _ _ ____ _____
32,252,285 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,254,296 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,256,230 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,258,170 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,260,107 UART: |_|
32,260,918 UART:
32,374,449 UART: [rt] Runtime listening for mailbox commands...
32,376,632 >>> mbox cmd response data (48 bytes)
32,377,256 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,379,678 >>> mbox cmd response data (48 bytes)
32,380,519 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,393,094 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,128,838 ready_for_fw is high
4,129,476 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,348,374 >>> mbox cmd response: success
17,348,980 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,992,809 UART:
22,993,199 UART: Running Caliptra FMC ...
22,994,346 UART:
22,994,510 UART: [state] CFI Enabled
23,002,466 UART: [fht] FMC Alias Private Key: 7
25,333,223 UART: [art] Extend RT PCRs Done
25,334,448 UART: [art] Lock RT PCRs Done
25,336,346 UART: [art] Populate DV Done
25,341,765 UART: [fht] FMC Alias Private Key: 7
25,343,304 UART: [art] Derive CDI
25,344,124 UART: [art] Store in in slot 0x4
25,387,099 UART: [art] Derive Key Pair
25,388,097 UART: [art] Store priv key in slot 0x5
28,630,566 UART: [art] Derive Key Pair - Done
28,643,478 UART: [art] Signing Cert with AUTHO
28,644,789 UART: RITY.KEYID = 7
30,924,019 UART: [art] Erasing AUTHORITY.KEYID = 7
30,925,529 UART: [art] PUB.X = 0C277CC72D9D38FC168C0B2FF93D1EABAFA5D4F62957CD975E4C41D6ACD91A4ABAE2479BA197B22284DFDEAABE06CD32
30,932,787 UART: [art] PUB.Y = 0078E2AE60BE6775DC5155D459EE19CAAB3DB0238A3CFB15E09A1A04480C227C2A0D5BFDBD16BBA468AA799E15AB54B7
30,940,030 UART: [art] SIG.R = 200D15A4373B0BB8D8C879C5484A38A11CF388BF9ED49D44846E0F75FA40AECEFE73D6B7F18D48891A0A4ABBDEC13716
30,947,431 UART: [art] SIG.S = 3BFCB0217A9C427E294F712503D4F396F888F6155A664A7422FDCBB213C5E01221D0FFCEA593069145FDE5B545C37385
32,252,192 UART: mbox::rt_entry...
32,253,163 UART: ____ _ _ _ ____ _____
32,255,151 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,257,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,259,097 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,261,078 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,262,936 UART: |_|
32,263,775 UART:
32,377,831 UART: [rt] Runtime listening for mailbox commands...
32,379,961 >>> mbox cmd response data (48 bytes)
32,380,573 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,382,910 >>> mbox cmd response data (48 bytes)
32,383,767 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,396,312 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,069 UART:
192,450 UART: Running Caliptra ROM ...
193,592 UART:
193,738 UART: [state] CFI Enabled
264,819 UART: [state] LifecycleState = Unprovisioned
266,728 UART: [state] DebugLocked = No
268,836 UART: [state] WD Timer not started. Device not locked for debugging
272,300 UART: [kat] SHA2-256
451,390 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,997 UART: [kat] ++
463,447 UART: [kat] sha1
473,345 UART: [kat] SHA2-256
476,426 UART: [kat] SHA2-384
482,129 UART: [kat] SHA2-512-ACC
485,073 UART: [kat] ECC-384
2,947,770 UART: [kat] HMAC-384Kdf
2,972,161 UART: [kat] LMS
3,501,618 UART: [kat] --
3,504,148 UART: [cold-reset] ++
3,505,376 UART: [fht] FHT @ 0x50003400
3,516,570 UART: [idev] ++
3,517,134 UART: [idev] CDI.KEYID = 6
3,518,166 UART: [idev] SUBJECT.KEYID = 7
3,519,273 UART: [idev] UDS.KEYID = 0
3,520,202 ready_for_fw is high
3,520,400 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,619,293 UART: [idev] Erasing UDS.KEYID = 0
6,026,807 UART: [idev] Sha1 KeyId Algorithm
6,048,139 UART: [idev] --
6,052,820 UART: [ldev] ++
6,053,403 UART: [ldev] CDI.KEYID = 6
6,054,317 UART: [ldev] SUBJECT.KEYID = 5
6,055,539 UART: [ldev] AUTHORITY.KEYID = 7
6,056,778 UART: [ldev] FE.KEYID = 1
6,099,614 UART: [ldev] Erasing FE.KEYID = 1
8,599,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,871 UART: [ldev] --
10,392,823 UART: [fwproc] Wait for Commands...
10,395,679 UART: [fwproc] Recv command 0x46574c44
10,397,789 UART: [fwproc] Recv'd Img size: 78532 bytes
13,362,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,434,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,503,586 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,695,710 >>> mbox cmd response: success
13,696,719 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,699,884 UART: [afmc] ++
13,700,499 UART: [afmc] CDI.KEYID = 6
13,701,428 UART: [afmc] SUBJECT.KEYID = 7
13,702,589 UART: [afmc] AUTHORITY.KEYID = 5
16,234,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,956,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,958,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,974,395 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,990,401 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,006,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,028,617 UART: [afmc] --
18,033,142 UART: [cold-reset] --
18,038,793 UART: [state] Locking Datavault
18,043,513 UART: [state] Locking PCR0, PCR1 and PCR31
18,045,164 UART: [state] Locking ICCM
18,046,671 UART: [exit] Launching FMC @ 0x40000130
18,055,068 UART:
18,055,321 UART: Running Caliptra FMC ...
18,056,430 UART:
18,056,595 UART: [state] CFI Enabled
18,113,904 UART: [fht] FMC Alias Private Key: 7
19,877,997 UART: [art] Extend RT PCRs Done
19,879,210 UART: [art] Lock RT PCRs Done
19,880,759 UART: [art] Populate DV Done
19,886,009 UART: [fht] FMC Alias Private Key: 7
19,887,713 UART: [art] Derive CDI
19,888,784 UART: [art] Store in in slot 0x4
19,946,684 UART: [art] Derive Key Pair
19,947,697 UART: [art] Store priv key in slot 0x5
22,410,790 UART: [art] Derive Key Pair - Done
22,423,692 UART: [art] Signing Cert with AUTHO
22,424,999 UART: RITY.KEYID = 7
24,136,878 UART: [art] Erasing AUTHORITY.KEYID = 7
24,138,382 UART: [art] PUB.X = 34A3A21EC3EA57AB68B5ED01CF57B8B38E47AD5678BE57B36006419C8E77F64B3A45F555F350F99016FAAD4A9FC18393
24,145,646 UART: [art] PUB.Y = 8DD959E072C1D99803C83543910A0866C72063591236264C763BA7327C203DE0B3F95F9BE72A260F9A39E515AD6C0DE4
24,152,896 UART: [art] SIG.R = 12D26CB2417BAA2158579C01C9A9387C3379960712FE893DD09F600F05E723DFEAD083FF283DDE602D85C7CFBB205A28
24,160,307 UART: [art] SIG.S = 3C0C4E9503E45AF63335F7AEF1693049A4C7BEF982BC0A1105B1261F267A82488231C28CDD0B4C9F5ABC9D4E4DABADC3
25,138,562 UART: mbox::rt_entry...
25,139,520 UART: ____ _ _ _ ____ _____
25,141,505 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,143,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,145,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,147,385 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,149,317 UART: |_|
25,150,306 UART:
25,263,052 UART: [rt] Runtime listening for mailbox commands...
25,265,221 >>> mbox cmd response data (48 bytes)
25,265,839 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,268,173 >>> mbox cmd response data (48 bytes)
25,269,032 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,281,609 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
3,383,557 ready_for_fw is high
3,383,945 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,486,489 >>> mbox cmd response: success
13,487,253 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,773,341 UART:
17,773,744 UART: Running Caliptra FMC ...
17,774,844 UART:
17,774,995 UART: [state] CFI Enabled
17,837,763 UART: [fht] FMC Alias Private Key: 7
19,601,607 UART: [art] Extend RT PCRs Done
19,602,835 UART: [art] Lock RT PCRs Done
19,604,439 UART: [art] Populate DV Done
19,609,983 UART: [fht] FMC Alias Private Key: 7
19,611,643 UART: [art] Derive CDI
19,612,386 UART: [art] Store in in slot 0x4
19,670,216 UART: [art] Derive Key Pair
19,671,211 UART: [art] Store priv key in slot 0x5
22,134,846 UART: [art] Derive Key Pair - Done
22,147,789 UART: [art] Signing Cert with AUTHO
22,149,098 UART: RITY.KEYID = 7
23,860,660 UART: [art] Erasing AUTHORITY.KEYID = 7
23,862,179 UART: [art] PUB.X = B98C90517FCA7ABE95952D5538CE9517E7E7D3E3278EEAD14BB92A63368FF1709F7A1256923FBE28864AC2A256E3D7AE
23,869,438 UART: [art] PUB.Y = 9DF23E36D4E03C3C47B09846CD41ABD6F42EAB66993405B8142D34FFEA2C4DB963C81330705C0BF1E110051C3CE5BF22
23,876,732 UART: [art] SIG.R = D21994FCABBD8F00B1B2601A919D8612FC9D874526A46F6E6C3BA926BAF96B24B0EBCC91FEE39F3DD4F91151AB6EB9B7
23,884,132 UART: [art] SIG.S = 17EF8EF4FB4E5D477332F79ABE2ABC88A98EE9D1DBAE51092506717072F41F45C5228F7489BAF22A3482FF25F7FC96D0
24,862,801 UART: mbox::rt_entry...
24,863,742 UART: ____ _ _ _ ____ _____
24,865,724 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,867,747 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,869,681 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,871,638 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,873,572 UART: |_|
24,874,413 UART:
24,986,212 UART: [rt] Runtime listening for mailbox commands...
24,988,402 >>> mbox cmd response data (48 bytes)
24,989,015 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
24,991,378 >>> mbox cmd response data (48 bytes)
24,992,231 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,004,807 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
192,980 UART:
193,355 UART: Running Caliptra ROM ...
194,639 UART:
603,935 UART: [state] CFI Enabled
619,150 UART: [state] LifecycleState = Unprovisioned
621,022 UART: [state] DebugLocked = No
623,547 UART: [state] WD Timer not started. Device not locked for debugging
627,867 UART: [kat] SHA2-256
807,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,021 UART: [kat] ++
819,612 UART: [kat] sha1
829,078 UART: [kat] SHA2-256
832,095 UART: [kat] SHA2-384
837,895 UART: [kat] SHA2-512-ACC
840,903 UART: [kat] ECC-384
3,283,336 UART: [kat] HMAC-384Kdf
3,295,433 UART: [kat] LMS
3,824,926 UART: [kat] --
3,828,036 UART: [cold-reset] ++
3,830,410 UART: [fht] FHT @ 0x50003400
3,843,162 UART: [idev] ++
3,843,727 UART: [idev] CDI.KEYID = 6
3,844,648 UART: [idev] SUBJECT.KEYID = 7
3,845,822 UART: [idev] UDS.KEYID = 0
3,846,747 ready_for_fw is high
3,846,958 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,945,848 UART: [idev] Erasing UDS.KEYID = 0
6,321,752 UART: [idev] Sha1 KeyId Algorithm
6,344,601 UART: [idev] --
6,349,233 UART: [ldev] ++
6,349,809 UART: [ldev] CDI.KEYID = 6
6,350,722 UART: [ldev] SUBJECT.KEYID = 5
6,351,935 UART: [ldev] AUTHORITY.KEYID = 7
6,353,165 UART: [ldev] FE.KEYID = 1
6,364,348 UART: [ldev] Erasing FE.KEYID = 1
8,836,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,310 UART: [ldev] --
10,627,394 UART: [fwproc] Wait for Commands...
10,629,162 UART: [fwproc] Recv command 0x46574c44
10,631,198 UART: [fwproc] Recv'd Img size: 78532 bytes
13,593,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,667,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,736,187 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,929,420 >>> mbox cmd response: success
13,929,894 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,933,693 UART: [afmc] ++
13,934,288 UART: [afmc] CDI.KEYID = 6
13,935,173 UART: [afmc] SUBJECT.KEYID = 7
13,936,274 UART: [afmc] AUTHORITY.KEYID = 5
16,434,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,154,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,156,748 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,172,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,188,560 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,204,451 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,226,915 UART: [afmc] --
18,230,289 UART: [cold-reset] --
18,236,489 UART: [state] Locking Datavault
18,242,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,244,411 UART: [state] Locking ICCM
18,246,345 UART: [exit] Launching FMC @ 0x40000130
18,254,791 UART:
18,255,024 UART: Running Caliptra FMC ...
18,256,135 UART:
18,256,301 UART: [state] CFI Enabled
18,264,737 UART: [fht] FMC Alias Private Key: 7
20,022,022 UART: [art] Extend RT PCRs Done
20,023,248 UART: [art] Lock RT PCRs Done
20,025,090 UART: [art] Populate DV Done
20,030,557 UART: [fht] FMC Alias Private Key: 7
20,032,202 UART: [art] Derive CDI
20,033,022 UART: [art] Store in in slot 0x4
20,075,614 UART: [art] Derive Key Pair
20,076,735 UART: [art] Store priv key in slot 0x5
22,503,684 UART: [art] Derive Key Pair - Done
22,516,356 UART: [art] Signing Cert with AUTHO
22,517,661 UART: RITY.KEYID = 7
24,223,013 UART: [art] Erasing AUTHORITY.KEYID = 7
24,224,533 UART: [art] PUB.X = 0696140DC2B642A1DE1249570D53ADA4706B7283911618782A4B8A9C00431DF29C63EA72B93C78F9E7D811BFEEF0C6B8
24,231,748 UART: [art] PUB.Y = 910C46892C91B317C00FFD8115D74A531FA18F1F3AE9921AA4042C03AD159910155E37F1774F19C084E41B46663119B2
24,238,983 UART: [art] SIG.R = E01F6B00A8A63A73375A38EE9DF065FBB1E28B45F289A94E5DD2112A5637AF3DCB5CC83C91DCED74031232CCCC0D1304
24,246,379 UART: [art] SIG.S = 0A72D31A414CEE755D4E710A15ADA28A90BC3B417AE14081C167DD880E0172919C6FA0176D908D387EFAC232E97B8C6C
25,224,441 UART: mbox::rt_entry...
25,225,391 UART: ____ _ _ _ ____ _____
25,227,292 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,229,295 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,231,226 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,233,155 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,235,082 UART: |_|
25,235,943 UART:
25,348,429 UART: [rt] Runtime listening for mailbox commands...
25,350,593 >>> mbox cmd response data (48 bytes)
25,351,202 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,353,621 >>> mbox cmd response data (48 bytes)
25,354,477 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,367,223 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
3,703,831 ready_for_fw is high
3,704,201 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,725,182 >>> mbox cmd response: success
13,725,893 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,973,671 UART:
17,974,196 UART: Running Caliptra FMC ...
17,975,419 UART:
17,975,592 UART: [state] CFI Enabled
17,983,371 UART: [fht] FMC Alias Private Key: 7
19,740,032 UART: [art] Extend RT PCRs Done
19,741,272 UART: [art] Lock RT PCRs Done
19,743,040 UART: [art] Populate DV Done
19,748,517 UART: [fht] FMC Alias Private Key: 7
19,750,004 UART: [art] Derive CDI
19,750,743 UART: [art] Store in in slot 0x4
19,793,554 UART: [art] Derive Key Pair
19,794,556 UART: [art] Store priv key in slot 0x5
22,221,083 UART: [art] Derive Key Pair - Done
22,233,890 UART: [art] Signing Cert with AUTHO
22,235,194 UART: RITY.KEYID = 7
23,940,601 UART: [art] Erasing AUTHORITY.KEYID = 7
23,942,118 UART: [art] PUB.X = A31B8024CF53649E4614762C312CFE0A4570D44CEF35E673879DADB5CAD8EB1B78B255961AC3E2DF4077A5D7E62ADB1B
23,949,426 UART: [art] PUB.Y = 2E1F326CF129231911366E46E67B1EBBA6F37960CEBC79042264C342DFE87E3FA42FE7DAE0FCB2A5DFB72BC9F2662132
23,956,661 UART: [art] SIG.R = 89B4773F65E1105AA4AE9C3324A75074391A75C7B58889B742135BE88CCB3366F31241DAD7A58C6A4412F1890E427A59
23,964,061 UART: [art] SIG.S = 0CC265007FD471CEC2491D5F6D6BC54C55D7A8E0015A8FAE52268317F0B6C3E04258015DDDE0F39ED8E96AF170B29F9E
24,942,399 UART: mbox::rt_entry...
24,943,353 UART: ____ _ _ _ ____ _____
24,945,336 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,947,343 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,949,271 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,951,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,953,163 UART: |_|
24,953,998 UART:
25,067,239 UART: [rt] Runtime listening for mailbox commands...
25,069,371 >>> mbox cmd response data (48 bytes)
25,069,978 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,072,348 >>> mbox cmd response data (48 bytes)
25,073,196 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,085,777 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,129 UART:
192,499 UART: Running Caliptra ROM ...
193,687 UART:
193,841 UART: [state] CFI Enabled
264,857 UART: [state] LifecycleState = Unprovisioned
267,213 UART: [state] DebugLocked = No
269,108 UART: [state] WD Timer not started. Device not locked for debugging
273,961 UART: [kat] SHA2-256
463,896 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,647 UART: [kat] ++
475,101 UART: [kat] sha1
486,330 UART: [kat] SHA2-256
489,346 UART: [kat] SHA2-384
494,768 UART: [kat] SHA2-512-ACC
497,350 UART: [kat] ECC-384
2,949,123 UART: [kat] HMAC-384Kdf
2,974,086 UART: [kat] LMS
3,505,888 UART: [kat] --
3,509,621 UART: [cold-reset] ++
3,511,346 UART: [fht] FHT @ 0x50003400
3,523,107 UART: [idev] ++
3,523,820 UART: [idev] CDI.KEYID = 6
3,524,819 UART: [idev] SUBJECT.KEYID = 7
3,526,016 UART: [idev] UDS.KEYID = 0
3,526,949 ready_for_fw is high
3,527,176 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,626,145 UART: [idev] Erasing UDS.KEYID = 0
6,030,358 UART: [idev] Sha1 KeyId Algorithm
6,051,674 UART: [idev] --
6,057,853 UART: [ldev] ++
6,058,599 UART: [ldev] CDI.KEYID = 6
6,059,516 UART: [ldev] SUBJECT.KEYID = 5
6,060,683 UART: [ldev] AUTHORITY.KEYID = 7
6,061,864 UART: [ldev] FE.KEYID = 1
6,102,001 UART: [ldev] Erasing FE.KEYID = 1
8,609,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,104 UART: [ldev] --
10,416,284 UART: [fwproc] Wait for Commands...
10,419,186 UART: [fwproc] Recv command 0x46574c44
10,421,445 UART: [fwproc] Recv'd Img size: 78532 bytes
13,431,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,511,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,627,603 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,955,865 >>> mbox cmd response: success
13,956,348 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,959,169 UART: [afmc] ++
13,959,864 UART: [afmc] CDI.KEYID = 6
13,961,106 UART: [afmc] SUBJECT.KEYID = 7
13,962,541 UART: [afmc] AUTHORITY.KEYID = 5
16,491,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,235,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,237,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,253,079 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,268,191 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,283,316 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,307,764 UART: [afmc] --
18,310,831 UART: [cold-reset] --
18,313,785 UART: [state] Locking Datavault
18,318,343 UART: [state] Locking PCR0, PCR1 and PCR31
18,320,555 UART: [state] Locking ICCM
18,323,370 UART: [exit] Launching FMC @ 0x40000130
18,332,045 UART:
18,332,286 UART: Running Caliptra FMC ...
18,333,390 UART:
18,333,547 UART: [state] CFI Enabled
18,391,669 UART: [fht] FMC Alias Private Key: 7
20,155,504 UART: [art] Extend RT PCRs Done
20,156,744 UART: [art] Lock RT PCRs Done
20,158,430 UART: [art] Populate DV Done
20,164,111 UART: [fht] FMC Alias Private Key: 7
20,165,810 UART: [art] Derive CDI
20,166,627 UART: [art] Store in in slot 0x4
20,224,669 UART: [art] Derive Key Pair
20,225,711 UART: [art] Store priv key in slot 0x5
22,689,245 UART: [art] Derive Key Pair - Done
22,702,402 UART: [art] Signing Cert with AUTHO
22,703,702 UART: RITY.KEYID = 7
24,414,807 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,316 UART: [art] PUB.X = E54682981D65EB693D2D8B8FADFB0A2AD977364B7740DF1525D44614B05E9A4C4D8FF358C1DCACB976DD56CEB2B28CD4
24,423,582 UART: [art] PUB.Y = 43D700B5ABBDA0F002825B2A9CFDD07E918A6FAE6EB7B81509DA133624AA568DD509762279F2A48DBFA58A8CDE865CA3
24,430,843 UART: [art] SIG.R = D20C226259AF83D248DF1399ED654BDA4F0CB947745B17D9244538260006D974ED70255C25EE503ACC758DEFFDF9CCE0
24,438,196 UART: [art] SIG.S = C480C2FAFF894A8EE7C6BB89CA3150D2136C0989CEFE4D9AA86CB9DD2AB10B51D65DD4E7F389F07BCB6EE0B1D0060DF6
25,416,334 UART: mbox::rt_entry...
25,417,307 UART: ____ _ _ _ ____ _____
25,419,289 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,421,295 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,423,223 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,425,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,427,083 UART: |_|
25,428,074 UART:
25,541,207 UART: [rt] Runtime listening for mailbox commands...
25,543,320 >>> mbox cmd response data (48 bytes)
25,543,932 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,546,288 >>> mbox cmd response data (48 bytes)
25,547,138 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,559,714 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,438,309 ready_for_fw is high
3,438,686 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,972,775 >>> mbox cmd response: success
13,973,810 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,279,162 UART:
18,279,993 UART: Running Caliptra FMC ...
18,281,116 UART:
18,281,274 UART: [state] CFI Enabled
18,350,476 UART: [fht] FMC Alias Private Key: 7
20,114,690 UART: [art] Extend RT PCRs Done
20,115,915 UART: [art] Lock RT PCRs Done
20,117,655 UART: [art] Populate DV Done
20,123,021 UART: [fht] FMC Alias Private Key: 7
20,124,527 UART: [art] Derive CDI
20,125,310 UART: [art] Store in in slot 0x4
20,182,818 UART: [art] Derive Key Pair
20,183,817 UART: [art] Store priv key in slot 0x5
22,646,967 UART: [art] Derive Key Pair - Done
22,659,640 UART: [art] Signing Cert with AUTHO
22,660,945 UART: RITY.KEYID = 7
24,373,057 UART: [art] Erasing AUTHORITY.KEYID = 7
24,374,564 UART: [art] PUB.X = 09CBFAA119F0A305CCDB265F4369618985413636486A2C0E60DAA793F510535EBE79161BE42782135DE6BF571F83FB4E
24,381,814 UART: [art] PUB.Y = 68371559DEE9D33FC2CE2F24342FAD449F12CA83CC6C20687ADB90B6DBA6B934E8D4533D0307333237E46D4EE8FA5B4E
24,389,110 UART: [art] SIG.R = 9E782B80FBBA83A81255045629317F1DF006F70D4FD3B84AFC4AB8D8BDC579CDD19EBF593BBCAC6FCA65D07DD72785E6
24,396,496 UART: [art] SIG.S = DD7E24A7E7EE6CF6D51B49212704E2278783E3EC3A777D61EDB60D2A0A43B049D14D1F1732B46A24AFA0C7B535B1AEB3
25,375,099 UART: mbox::rt_entry...
25,376,059 UART: ____ _ _ _ ____ _____
25,378,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,380,059 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,382,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,384,103 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,385,964 UART: |_|
25,386,766 UART:
25,499,054 UART: [rt] Runtime listening for mailbox commands...
25,501,182 >>> mbox cmd response data (48 bytes)
25,501,822 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,504,164 >>> mbox cmd response data (48 bytes)
25,505,042 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,517,779 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,781 writing to cptra_bootfsm_go
194,080 UART:
194,446 UART: Running Caliptra ROM ...
195,625 UART:
605,248 UART: [state] CFI Enabled
617,141 UART: [state] LifecycleState = Unprovisioned
619,508 UART: [state] DebugLocked = No
621,887 UART: [state] WD Timer not started. Device not locked for debugging
626,558 UART: [kat] SHA2-256
816,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,230 UART: [kat] ++
827,837 UART: [kat] sha1
838,716 UART: [kat] SHA2-256
841,735 UART: [kat] SHA2-384
847,796 UART: [kat] SHA2-512-ACC
850,376 UART: [kat] ECC-384
3,294,033 UART: [kat] HMAC-384Kdf
3,308,542 UART: [kat] LMS
3,840,363 UART: [kat] --
3,845,536 UART: [cold-reset] ++
3,847,558 UART: [fht] FHT @ 0x50003400
3,858,677 UART: [idev] ++
3,859,392 UART: [idev] CDI.KEYID = 6
3,860,394 UART: [idev] SUBJECT.KEYID = 7
3,861,571 UART: [idev] UDS.KEYID = 0
3,862,498 ready_for_fw is high
3,862,715 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,961,530 UART: [idev] Erasing UDS.KEYID = 0
6,344,621 UART: [idev] Sha1 KeyId Algorithm
6,367,689 UART: [idev] --
6,373,360 UART: [ldev] ++
6,374,048 UART: [ldev] CDI.KEYID = 6
6,374,957 UART: [ldev] SUBJECT.KEYID = 5
6,376,120 UART: [ldev] AUTHORITY.KEYID = 7
6,377,352 UART: [ldev] FE.KEYID = 1
6,386,757 UART: [ldev] Erasing FE.KEYID = 1
8,865,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,854 UART: [ldev] --
10,654,286 UART: [fwproc] Wait for Commands...
10,656,875 UART: [fwproc] Recv command 0x46574c44
10,659,183 UART: [fwproc] Recv'd Img size: 78532 bytes
13,669,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,746,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,863,023 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,190,381 >>> mbox cmd response: success
14,190,867 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,194,648 UART: [afmc] ++
14,195,358 UART: [afmc] CDI.KEYID = 6
14,196,571 UART: [afmc] SUBJECT.KEYID = 7
14,198,009 UART: [afmc] AUTHORITY.KEYID = 5
16,698,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,421,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,423,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,438,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,453,571 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,468,611 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,491,677 UART: [afmc] --
18,495,553 UART: [cold-reset] --
18,499,318 UART: [state] Locking Datavault
18,503,165 UART: [state] Locking PCR0, PCR1 and PCR31
18,505,360 UART: [state] Locking ICCM
18,507,512 UART: [exit] Launching FMC @ 0x40000130
18,516,133 UART:
18,516,375 UART: Running Caliptra FMC ...
18,517,501 UART:
18,517,667 UART: [state] CFI Enabled
18,525,727 UART: [fht] FMC Alias Private Key: 7
20,282,887 UART: [art] Extend RT PCRs Done
20,284,101 UART: [art] Lock RT PCRs Done
20,285,936 UART: [art] Populate DV Done
20,291,399 UART: [fht] FMC Alias Private Key: 7
20,292,877 UART: [art] Derive CDI
20,293,642 UART: [art] Store in in slot 0x4
20,336,181 UART: [art] Derive Key Pair
20,337,218 UART: [art] Store priv key in slot 0x5
22,763,511 UART: [art] Derive Key Pair - Done
22,776,397 UART: [art] Signing Cert with AUTHO
22,777,707 UART: RITY.KEYID = 7
24,483,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,594 UART: [art] PUB.X = FBB834C894D728429A15179C0C6FED4CC02B68F8076DBB0E2748663E48E226A26949D7468D24CB6DE3D966D01784F803
24,491,856 UART: [art] PUB.Y = 387CE4030482083F70B3B2E87D03A33EBF6AD9D1948CDA4486F855DE4404CD2B7CCBEA43D52170CA382EEB64482536EB
24,499,096 UART: [art] SIG.R = 85967D31F425F45233BF787F0D157679B679F76474BB7B43B9665BE6FAB014FDA35407254C4097D297D497CDB9F5B611
24,506,491 UART: [art] SIG.S = 21D342E4FDF4FD5CBA1BDC4459A0E37C5EE4F5CB6FEEEF24F43A707D0EA1D9865EF10C9352FD52CA2085490CB5BDE3DE
25,484,330 UART: mbox::rt_entry...
25,485,283 UART: ____ _ _ _ ____ _____
25,487,270 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,489,280 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,491,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,493,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,495,075 UART: |_|
25,495,915 UART:
25,610,527 UART: [rt] Runtime listening for mailbox commands...
25,612,638 >>> mbox cmd response data (48 bytes)
25,613,296 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,615,665 >>> mbox cmd response data (48 bytes)
25,616,516 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,629,081 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,582 writing to cptra_bootfsm_go
3,760,058 ready_for_fw is high
3,760,469 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,184,515 >>> mbox cmd response: success
14,185,239 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,432,173 UART:
18,432,565 UART: Running Caliptra FMC ...
18,433,871 UART:
18,434,045 UART: [state] CFI Enabled
18,441,467 UART: [fht] FMC Alias Private Key: 7
20,197,971 UART: [art] Extend RT PCRs Done
20,199,193 UART: [art] Lock RT PCRs Done
20,200,933 UART: [art] Populate DV Done
20,206,237 UART: [fht] FMC Alias Private Key: 7
20,207,955 UART: [art] Derive CDI
20,208,698 UART: [art] Store in in slot 0x4
20,251,298 UART: [art] Derive Key Pair
20,252,301 UART: [art] Store priv key in slot 0x5
22,679,124 UART: [art] Derive Key Pair - Done
22,691,893 UART: [art] Signing Cert with AUTHO
22,693,198 UART: RITY.KEYID = 7
24,398,564 UART: [art] Erasing AUTHORITY.KEYID = 7
24,400,331 UART: [art] PUB.X = 5CC5EFCE36107A56BC048787222E3B290B3496ABB290BC95AED3B51E2F3A7145754832E51515C504DD496E1BDF44C4C0
24,407,362 UART: [art] PUB.Y = 19A3EFDCB15DFDE5E5747CBBA24CE6239CD62C45C6FADDCC40D7BF19A4590D92A43355EDE4698B93DEEFBBECFC05F9B9
24,414,687 UART: [art] SIG.R = 08144DF4630C0E13D5B9CD759DD4D4206AF00BFCD58B7790C7185532C8AE884E871E4954C8983B3A20AF6B931FA42BB1
24,422,076 UART: [art] SIG.S = D6BB2C776671DB5AD89B11D7751FCE54C8D59AF360E7A9B6F683437680250D326A669D28635D0C83689F0D25AFBED3FD
25,400,686 UART: mbox::rt_entry...
25,401,648 UART: ____ _ _ _ ____ _____
25,403,632 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,405,638 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,407,589 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,409,573 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,411,524 UART: |_|
25,412,337 UART:
25,526,232 UART: [rt] Runtime listening for mailbox commands...
25,528,337 >>> mbox cmd response data (48 bytes)
25,528,978 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,531,331 >>> mbox cmd response data (48 bytes)
25,532,184 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,544,731 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,023 UART: [kat] SHA2-256
881,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,069 UART: [kat] ++
886,221 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,170 UART: [kat] SHA2-512-ACC
897,071 UART: [kat] ECC-384
902,740 UART: [kat] HMAC-384Kdf
907,376 UART: [kat] LMS
1,475,572 UART: [kat] --
1,476,491 UART: [cold-reset] ++
1,477,017 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 ready_for_fw is high
1,481,189 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,489,008 UART: [idev] Erasing UDS.KEYID = 0
1,505,616 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,280 UART: [idev] --
1,515,285 UART: [ldev] ++
1,515,453 UART: [ldev] CDI.KEYID = 6
1,515,816 UART: [ldev] SUBJECT.KEYID = 5
1,516,242 UART: [ldev] AUTHORITY.KEYID = 7
1,516,705 UART: [ldev] FE.KEYID = 1
1,521,841 UART: [ldev] Erasing FE.KEYID = 1
1,546,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,734 UART: [ldev] --
1,586,147 UART: [fwproc] Waiting for Commands...
1,586,800 UART: [fwproc] Received command 0x46574c44
1,587,591 UART: [fwproc] Received Image of size 78532 bytes
2,474,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,501,097 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,530,449 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,612,544 >>> mbox cmd response: success
2,612,544 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,613,780 UART: [afmc] ++
2,613,948 UART: [afmc] CDI.KEYID = 6
2,614,310 UART: [afmc] SUBJECT.KEYID = 7
2,614,735 UART: [afmc] AUTHORITY.KEYID = 5
2,650,198 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,432 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,667,212 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,672,940 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,678,825 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,515 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,198 UART: [afmc] --
2,693,152 UART: [cold-reset] --
2,694,058 UART: [state] Locking Datavault
2,695,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,695,643 UART: [state] Locking ICCM
2,696,087 UART: [exit] Launching FMC @ 0x40000130
2,701,416 UART:
2,701,432 UART: Running Caliptra FMC ...
2,701,840 UART:
2,701,894 UART: [state] CFI Enabled
2,712,485 UART: [fht] FMC Alias Private Key: 7
2,820,416 UART: [art] Extend RT PCRs Done
2,820,844 UART: [art] Lock RT PCRs Done
2,822,232 UART: [art] Populate DV Done
2,830,327 UART: [fht] FMC Alias Private Key: 7
2,831,257 UART: [art] Derive CDI
2,831,537 UART: [art] Store in in slot 0x4
2,917,062 UART: [art] Derive Key Pair
2,917,422 UART: [art] Store priv key in slot 0x5
2,930,790 UART: [art] Derive Key Pair - Done
2,945,573 UART: [art] Signing Cert with AUTHO
2,946,053 UART: RITY.KEYID = 7
2,961,313 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,078 UART: [art] PUB.X = 3D908E0A6914F6E3B5421CE9AA6406DE4380EA0D9A2D76974672AB41F40961A607AD1EF2A7788111DD7A16A2AA383A71
2,968,837 UART: [art] PUB.Y = D730EDC255B114ECC4B3D393A853C0D163135C29D457089E3E6E24CE694915900A760C3225AB5777C5F8435DDDCF19D0
2,975,780 UART: [art] SIG.R = AB2D4078CCE23003DE2AFFB1E3CEDD0CB438253068CCB460DE2CCFE27E23C4C4A50EEAA4429F3D0DFD887269EB24DA0B
2,982,565 UART: [art] SIG.S = DCD6BA82828F770AAD8DE5CBC672778D3FD32470B07279190C51CB277F2D1592E9CD833C90DCE32FCA6922D4E9599257
3,006,658 UART: mbox::rt_entry...
3,007,030 UART: ____ _ _ _ ____ _____
3,007,814 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,008,614 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,009,382 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,150 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,010,918 UART: |_|
3,011,230 UART:
3,118,443 UART: [rt] Runtime listening for mailbox commands...
3,119,624 >>> mbox cmd response data (48 bytes)
3,119,625 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,122,408 >>> mbox cmd response data (48 bytes)
3,122,409 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,135,347 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,635 ready_for_fw is high
1,362,635 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,463,264 >>> mbox cmd response: success
2,463,264 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,524,488 UART:
2,524,504 UART: Running Caliptra FMC ...
2,524,912 UART:
2,524,966 UART: [state] CFI Enabled
2,535,397 UART: [fht] FMC Alias Private Key: 7
2,642,654 UART: [art] Extend RT PCRs Done
2,643,082 UART: [art] Lock RT PCRs Done
2,644,558 UART: [art] Populate DV Done
2,652,801 UART: [fht] FMC Alias Private Key: 7
2,653,869 UART: [art] Derive CDI
2,654,149 UART: [art] Store in in slot 0x4
2,740,044 UART: [art] Derive Key Pair
2,740,404 UART: [art] Store priv key in slot 0x5
2,753,608 UART: [art] Derive Key Pair - Done
2,768,189 UART: [art] Signing Cert with AUTHO
2,768,669 UART: RITY.KEYID = 7
2,783,809 UART: [art] Erasing AUTHORITY.KEYID = 7
2,784,574 UART: [art] PUB.X = 044DBF41C934899177F575D65AE6ADE17BCFC4DD55130207244096567C51F17D91DF19A1B172209A4AA4E19A5754BDE2
2,791,337 UART: [art] PUB.Y = CDE96009E47BEE5734DB1048DCBD9F55974D9C17D8BD966A3D5A144392CEB716C585EAD9B97C539E80DA07476832FDCA
2,798,295 UART: [art] SIG.R = A3ECA5DB60062A18830E167791CFFDE61CF0EC82184A691535CFD86BD5E18D9D4198CD86E0F6E2E9EDCF1FEAF722CF56
2,805,081 UART: [art] SIG.S = 27C74711DB5D6685C44A6E31A8CC42BA25B51AB6533DC79FE874932AA16CC249CAAFC350915A7A3BED467189CB659B98
2,829,018 UART: mbox::rt_entry...
2,829,390 UART: ____ _ _ _ ____ _____
2,830,174 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,830,974 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,831,742 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,832,510 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,833,278 UART: |_|
2,833,590 UART:
2,940,272 UART: [rt] Runtime listening for mailbox commands...
2,941,453 >>> mbox cmd response data (48 bytes)
2,941,454 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,944,237 >>> mbox cmd response data (48 bytes)
2,944,238 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,957,176 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,408 UART: [kat] SHA2-256
882,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,454 UART: [kat] ++
886,606 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,371 UART: [kat] SHA2-512-ACC
897,272 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,383 UART: [kat] LMS
1,475,579 UART: [kat] --
1,476,238 UART: [cold-reset] ++
1,476,806 UART: [fht] Storing FHT @ 0x50003400
1,479,691 UART: [idev] ++
1,479,859 UART: [idev] CDI.KEYID = 6
1,480,219 UART: [idev] SUBJECT.KEYID = 7
1,480,643 UART: [idev] UDS.KEYID = 0
1,480,988 ready_for_fw is high
1,480,988 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,489,015 UART: [idev] Erasing UDS.KEYID = 0
1,505,717 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,563 UART: [idev] --
1,515,598 UART: [ldev] ++
1,515,766 UART: [ldev] CDI.KEYID = 6
1,516,129 UART: [ldev] SUBJECT.KEYID = 5
1,516,555 UART: [ldev] AUTHORITY.KEYID = 7
1,517,018 UART: [ldev] FE.KEYID = 1
1,522,380 UART: [ldev] Erasing FE.KEYID = 1
1,548,139 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,909 UART: [ldev] --
1,587,224 UART: [fwproc] Waiting for Commands...
1,587,845 UART: [fwproc] Received command 0x46574c44
1,588,636 UART: [fwproc] Received Image of size 78532 bytes
2,476,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,418 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,614,817 >>> mbox cmd response: success
2,614,817 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,615,971 UART: [afmc] ++
2,616,139 UART: [afmc] CDI.KEYID = 6
2,616,501 UART: [afmc] SUBJECT.KEYID = 7
2,616,926 UART: [afmc] AUTHORITY.KEYID = 5
2,652,573 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,651 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,264 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,954 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,645 UART: [afmc] --
2,695,761 UART: [cold-reset] --
2,696,791 UART: [state] Locking Datavault
2,698,018 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,622 UART: [state] Locking ICCM
2,699,110 UART: [exit] Launching FMC @ 0x40000130
2,704,439 UART:
2,704,455 UART: Running Caliptra FMC ...
2,704,863 UART:
2,705,006 UART: [state] CFI Enabled
2,715,727 UART: [fht] FMC Alias Private Key: 7
2,823,432 UART: [art] Extend RT PCRs Done
2,823,860 UART: [art] Lock RT PCRs Done
2,825,252 UART: [art] Populate DV Done
2,833,695 UART: [fht] FMC Alias Private Key: 7
2,834,771 UART: [art] Derive CDI
2,835,051 UART: [art] Store in in slot 0x4
2,920,484 UART: [art] Derive Key Pair
2,920,844 UART: [art] Store priv key in slot 0x5
2,933,920 UART: [art] Derive Key Pair - Done
2,948,638 UART: [art] Signing Cert with AUTHO
2,949,118 UART: RITY.KEYID = 7
2,964,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,319 UART: [art] PUB.X = D36105E48E82D06CDAE98C3085B8174AEB1CE822C32C8CCE00E82C252CC3B219805F9F2C4D8F988887A8B9F110DFA542
2,972,074 UART: [art] PUB.Y = 13952A49AACC1E2527CE091A1789845B50882DE5171B7C7B64BE61E54F096C8F07102C32C54859C63FDE045A2DB9F195
2,979,012 UART: [art] SIG.R = F8B61E9392431436A48B6470A51288491010585CFCA367249E83AFEDA9F1DCA05990DFC8ECFD9F1CC917A3C69ACF0904
2,985,784 UART: [art] SIG.S = 3CBB150B29EE92E0F4DE9D06075CBCC6FE258E2EE520C1417757C1D2594DD93638968AE36415570969418BB78554E127
3,009,507 UART: mbox::rt_entry...
3,009,879 UART: ____ _ _ _ ____ _____
3,010,663 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,463 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,231 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,999 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,767 UART: |_|
3,014,079 UART:
3,120,933 UART: [rt] Runtime listening for mailbox commands...
3,122,114 >>> mbox cmd response data (48 bytes)
3,122,115 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,124,898 >>> mbox cmd response data (48 bytes)
3,124,899 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,137,837 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,148 ready_for_fw is high
1,362,148 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,462,669 >>> mbox cmd response: success
2,462,669 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,524,695 UART:
2,524,711 UART: Running Caliptra FMC ...
2,525,119 UART:
2,525,262 UART: [state] CFI Enabled
2,536,099 UART: [fht] FMC Alias Private Key: 7
2,644,098 UART: [art] Extend RT PCRs Done
2,644,526 UART: [art] Lock RT PCRs Done
2,646,506 UART: [art] Populate DV Done
2,654,619 UART: [fht] FMC Alias Private Key: 7
2,655,759 UART: [art] Derive CDI
2,656,039 UART: [art] Store in in slot 0x4
2,741,302 UART: [art] Derive Key Pair
2,741,662 UART: [art] Store priv key in slot 0x5
2,755,530 UART: [art] Derive Key Pair - Done
2,770,048 UART: [art] Signing Cert with AUTHO
2,770,528 UART: RITY.KEYID = 7
2,785,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,235 UART: [art] PUB.X = 41484BFDDD6FB2EF721F0FA4B70A0931E19F6F0C995F2D055BA421058FA31E86FB0342664D861C469F4856C6D0F0E0AB
2,792,994 UART: [art] PUB.Y = 5FE669CE1252BC05D1E637A5C17B5B0F7C33F19C99405EA5ABC0C0246DDA8862FE94196379161D439DAB82E4576586FD
2,799,944 UART: [art] SIG.R = 14F3BC9C5EC56B3FF40CE2B5229553C6F682CFFFE6AAD7ED345BD92066DF91BFAF3CCDBCC5C5BE979B66A8EBBBFB84F3
2,806,749 UART: [art] SIG.S = 2D88EDF7C58DD9EFC50A857B16AA11566EAD7AB9F76EAB7BC6FE263ED3A3A869D598B41A7A2F936E95A73EB883383130
2,829,703 UART: mbox::rt_entry...
2,830,075 UART: ____ _ _ _ ____ _____
2,830,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,659 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,832,427 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,195 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,833,963 UART: |_|
2,834,275 UART:
2,941,544 UART: [rt] Runtime listening for mailbox commands...
2,942,725 >>> mbox cmd response data (48 bytes)
2,942,726 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,945,509 >>> mbox cmd response data (48 bytes)
2,945,510 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,958,448 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,521 UART: [kat] SHA2-256
903,461 UART: [kat] SHA2-384
906,274 UART: [kat] SHA2-512-ACC
908,175 UART: [kat] ECC-384
917,628 UART: [kat] HMAC-384Kdf
922,196 UART: [kat] LMS
1,170,524 UART: [kat] --
1,171,447 UART: [cold-reset] ++
1,171,951 UART: [fht] FHT @ 0x50003400
1,174,644 UART: [idev] ++
1,174,812 UART: [idev] CDI.KEYID = 6
1,175,172 UART: [idev] SUBJECT.KEYID = 7
1,175,596 UART: [idev] UDS.KEYID = 0
1,175,941 ready_for_fw is high
1,175,941 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,183,330 UART: [idev] Erasing UDS.KEYID = 0
1,200,217 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,735 UART: [ldev] ++
1,209,903 UART: [ldev] CDI.KEYID = 6
1,210,266 UART: [ldev] SUBJECT.KEYID = 5
1,210,692 UART: [ldev] AUTHORITY.KEYID = 7
1,211,155 UART: [ldev] FE.KEYID = 1
1,216,185 UART: [ldev] Erasing FE.KEYID = 1
1,241,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,379 UART: [ldev] --
1,280,722 UART: [fwproc] Wait for Commands...
1,281,346 UART: [fwproc] Recv command 0x46574c44
1,282,074 UART: [fwproc] Recv'd Img size: 78532 bytes
2,169,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,628 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,308,859 >>> mbox cmd response: success
2,308,859 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,309,905 UART: [afmc] ++
2,310,073 UART: [afmc] CDI.KEYID = 6
2,310,435 UART: [afmc] SUBJECT.KEYID = 7
2,310,860 UART: [afmc] AUTHORITY.KEYID = 5
2,346,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,051 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,770 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,580 UART: [afmc] --
2,389,496 UART: [cold-reset] --
2,390,246 UART: [state] Locking Datavault
2,391,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,703 UART: [state] Locking ICCM
2,392,377 UART: [exit] Launching FMC @ 0x40000130
2,397,706 UART:
2,397,722 UART: Running Caliptra FMC ...
2,398,130 UART:
2,398,184 UART: [state] CFI Enabled
2,408,967 UART: [fht] FMC Alias Private Key: 7
2,517,218 UART: [art] Extend RT PCRs Done
2,517,646 UART: [art] Lock RT PCRs Done
2,519,394 UART: [art] Populate DV Done
2,527,521 UART: [fht] FMC Alias Private Key: 7
2,528,639 UART: [art] Derive CDI
2,528,919 UART: [art] Store in in slot 0x4
2,615,012 UART: [art] Derive Key Pair
2,615,372 UART: [art] Store priv key in slot 0x5
2,628,672 UART: [art] Derive Key Pair - Done
2,643,414 UART: [art] Signing Cert with AUTHO
2,643,894 UART: RITY.KEYID = 7
2,658,786 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,551 UART: [art] PUB.X = 1A9B86B34BA35E7211816EBA54812E82C59E6CD5A700B9A61EDE10FD5C3D8B21C959016A4A4AC8B7E5083C110FCAC104
2,666,299 UART: [art] PUB.Y = DCCD937F0D303F7F44CF52E405DEA0C87836EDECDFEEDC017243FF6198AE6A28A02DF5DBEDA0A224EB3955B8B48293A4
2,673,266 UART: [art] SIG.R = 0B87C43FC6ADCDEDAA69D9A95F8769281BAA80956AE11828872A6563B26CE58911A1604299B623F84634D1D1FA36B30E
2,680,034 UART: [art] SIG.S = B02773B7E53F8F3CF925FDC48D4CD71124F4DF0052C6F8E99E3A26C239D91FCBC4F7509BB864C998216B1278FE8F55C0
2,703,067 UART: mbox::rt_entry...
2,703,439 UART: ____ _ _ _ ____ _____
2,704,223 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,023 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,705,791 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,559 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,327 UART: |_|
2,707,639 UART:
2,815,439 UART: [rt] Runtime listening for mailbox commands...
2,816,620 >>> mbox cmd response data (48 bytes)
2,816,621 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,819,404 >>> mbox cmd response data (48 bytes)
2,819,405 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,832,343 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 ready_for_fw is high
1,060,105 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,159,820 >>> mbox cmd response: success
2,159,820 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,221,554 UART:
2,221,570 UART: Running Caliptra FMC ...
2,221,978 UART:
2,222,032 UART: [state] CFI Enabled
2,232,567 UART: [fht] FMC Alias Private Key: 7
2,340,514 UART: [art] Extend RT PCRs Done
2,340,942 UART: [art] Lock RT PCRs Done
2,342,592 UART: [art] Populate DV Done
2,350,911 UART: [fht] FMC Alias Private Key: 7
2,352,089 UART: [art] Derive CDI
2,352,369 UART: [art] Store in in slot 0x4
2,438,302 UART: [art] Derive Key Pair
2,438,662 UART: [art] Store priv key in slot 0x5
2,451,664 UART: [art] Derive Key Pair - Done
2,466,683 UART: [art] Signing Cert with AUTHO
2,467,163 UART: RITY.KEYID = 7
2,482,843 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,608 UART: [art] PUB.X = 8634E1F33DCEBC8C4014720FEA1DD4E0936BEB9240B5A2F962DF8A47370D68A8FF8C3BFE38815382C3F5595A49508787
2,490,378 UART: [art] PUB.Y = 566007704570CEF9CD30022D222F9171FAD62A9B3CFDC06BEBF1C15C82B71766AE36CE4C824165A182E51EDC1F8C6B93
2,497,332 UART: [art] SIG.R = 04F612D36A716455B91E4FAEB288AD376C26BFDF83B500AD278276B53A7EEA88209C9CD6FB0F32AF8C7C45740F1F5626
2,504,081 UART: [art] SIG.S = F587247D017429A2BF334EEC3D897105A601EDD6CDAFB5D748A814F232DAA7E9FC9EDB526D7024D447EF94369D45B6D5
2,528,349 UART: mbox::rt_entry...
2,528,721 UART: ____ _ _ _ ____ _____
2,529,505 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,073 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,841 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,609 UART: |_|
2,532,921 UART:
2,638,647 UART: [rt] Runtime listening for mailbox commands...
2,639,828 >>> mbox cmd response data (48 bytes)
2,639,829 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,642,612 >>> mbox cmd response data (48 bytes)
2,642,613 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,655,551 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
893,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,902 UART: [kat] ++
898,054 UART: [kat] sha1
902,460 UART: [kat] SHA2-256
904,400 UART: [kat] SHA2-384
906,999 UART: [kat] SHA2-512-ACC
908,900 UART: [kat] ECC-384
918,783 UART: [kat] HMAC-384Kdf
923,299 UART: [kat] LMS
1,171,627 UART: [kat] --
1,172,484 UART: [cold-reset] ++
1,173,026 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 ready_for_fw is high
1,176,884 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,243 UART: [idev] Erasing UDS.KEYID = 0
1,201,972 UART: [idev] Sha1 KeyId Algorithm
1,210,454 UART: [idev] --
1,211,518 UART: [ldev] ++
1,211,686 UART: [ldev] CDI.KEYID = 6
1,212,049 UART: [ldev] SUBJECT.KEYID = 5
1,212,475 UART: [ldev] AUTHORITY.KEYID = 7
1,212,938 UART: [ldev] FE.KEYID = 1
1,218,020 UART: [ldev] Erasing FE.KEYID = 1
1,244,125 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,034 UART: [ldev] --
1,283,545 UART: [fwproc] Wait for Commands...
1,284,253 UART: [fwproc] Recv command 0x46574c44
1,284,981 UART: [fwproc] Recv'd Img size: 78532 bytes
2,173,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,749 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,311,928 >>> mbox cmd response: success
2,311,928 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,313,016 UART: [afmc] ++
2,313,184 UART: [afmc] CDI.KEYID = 6
2,313,546 UART: [afmc] SUBJECT.KEYID = 7
2,313,971 UART: [afmc] AUTHORITY.KEYID = 5
2,350,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,181 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,794 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,513 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,487 UART: [afmc] --
2,393,617 UART: [cold-reset] --
2,394,327 UART: [state] Locking Datavault
2,395,568 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,172 UART: [state] Locking ICCM
2,396,748 UART: [exit] Launching FMC @ 0x40000130
2,402,077 UART:
2,402,093 UART: Running Caliptra FMC ...
2,402,501 UART:
2,402,644 UART: [state] CFI Enabled
2,413,259 UART: [fht] FMC Alias Private Key: 7
2,520,886 UART: [art] Extend RT PCRs Done
2,521,314 UART: [art] Lock RT PCRs Done
2,522,554 UART: [art] Populate DV Done
2,530,757 UART: [fht] FMC Alias Private Key: 7
2,531,853 UART: [art] Derive CDI
2,532,133 UART: [art] Store in in slot 0x4
2,617,714 UART: [art] Derive Key Pair
2,618,074 UART: [art] Store priv key in slot 0x5
2,631,230 UART: [art] Derive Key Pair - Done
2,646,071 UART: [art] Signing Cert with AUTHO
2,646,551 UART: RITY.KEYID = 7
2,662,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,324 UART: [art] PUB.X = 96F381085CBC82B2040A63E5E1BAC2189EB7539F219692FEDCD3C3E8444F287101DDF4F5083EA60CC2C564F5543458B7
2,670,080 UART: [art] PUB.Y = 9D85A484C03D0B0B452D3270E411D659587C7CFE2A00C81C305AC3FD69CE86159370F595208A14FA9DEADC04B8D4190C
2,677,002 UART: [art] SIG.R = 1B418A1BFA5C7E2AF31DE3FD1D4BEC3CEC5FC9DA349C274B6BFA96E8B40E4EE5BFF57F4EA9513E00AC699786684CF249
2,683,775 UART: [art] SIG.S = EFC2A0258243AB986581748297793FFDD7BC4BD4D34FB1C0213CE826CEFC2B2ED27A58DC93963B13D9C39DE8132E1725
2,707,120 UART: mbox::rt_entry...
2,707,492 UART: ____ _ _ _ ____ _____
2,708,276 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,076 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,844 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,612 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,380 UART: |_|
2,711,692 UART:
2,818,588 UART: [rt] Runtime listening for mailbox commands...
2,819,769 >>> mbox cmd response data (48 bytes)
2,819,770 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,822,553 >>> mbox cmd response data (48 bytes)
2,822,554 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,835,492 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,738 ready_for_fw is high
1,059,738 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,162,809 >>> mbox cmd response: success
2,162,809 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,225,925 UART:
2,225,941 UART: Running Caliptra FMC ...
2,226,349 UART:
2,226,492 UART: [state] CFI Enabled
2,236,973 UART: [fht] FMC Alias Private Key: 7
2,344,958 UART: [art] Extend RT PCRs Done
2,345,386 UART: [art] Lock RT PCRs Done
2,346,930 UART: [art] Populate DV Done
2,355,125 UART: [fht] FMC Alias Private Key: 7
2,356,087 UART: [art] Derive CDI
2,356,367 UART: [art] Store in in slot 0x4
2,441,946 UART: [art] Derive Key Pair
2,442,306 UART: [art] Store priv key in slot 0x5
2,455,196 UART: [art] Derive Key Pair - Done
2,469,942 UART: [art] Signing Cert with AUTHO
2,470,422 UART: RITY.KEYID = 7
2,485,626 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,391 UART: [art] PUB.X = 8579E9D554F624B76BB8FF84FBDF095BB39C4EACDB36A1E6C9982BCC7F125A7F10490C8AC69DA08F14DD260ACB3265E4
2,493,172 UART: [art] PUB.Y = 81B16C280BEE84746E9E167556C11B4B7EC9A451EF7D3420E6890A383A6ACEE685B47AE3B9EE0A419A39C9A134ECAC12
2,500,125 UART: [art] SIG.R = 0295A9B484931EBBCE15168D7E3443580381D93B04469158251D150423F34EC5C130DBC8DE14400FB476BB568B750D32
2,506,869 UART: [art] SIG.S = 21065A4EE6070175566C3723727EE0EACD5E08AD13FA2B3ACC4908AE059511C06349A76601419447C82F062A362CFFC6
2,530,814 UART: mbox::rt_entry...
2,531,186 UART: ____ _ _ _ ____ _____
2,531,970 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,770 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,538 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,306 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,535,074 UART: |_|
2,535,386 UART:
2,642,232 UART: [rt] Runtime listening for mailbox commands...
2,643,413 >>> mbox cmd response data (48 bytes)
2,643,414 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,646,197 >>> mbox cmd response data (48 bytes)
2,646,198 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,659,136 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,359 UART: [kat] ++
895,511 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,883 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,173,967 ready_for_fw is high
1,173,967 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,354 UART: [ldev] ++
1,208,522 UART: [ldev] CDI.KEYID = 6
1,208,886 UART: [ldev] SUBJECT.KEYID = 5
1,209,313 UART: [ldev] AUTHORITY.KEYID = 7
1,209,776 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,612 UART: [fwproc] Wait for Commands...
1,281,387 UART: [fwproc] Recv command 0x46574c44
1,282,120 UART: [fwproc] Recv'd Img size: 78532 bytes
2,169,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,611 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,307,709 >>> mbox cmd response: success
2,307,709 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,308,932 UART: [afmc] ++
2,309,100 UART: [afmc] CDI.KEYID = 6
2,309,463 UART: [afmc] SUBJECT.KEYID = 7
2,309,889 UART: [afmc] AUTHORITY.KEYID = 5
2,345,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,879 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,608 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,491 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,033 UART: [afmc] --
2,389,043 UART: [cold-reset] --
2,389,919 UART: [state] Locking Datavault
2,391,138 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,742 UART: [state] Locking ICCM
2,392,180 UART: [exit] Launching FMC @ 0x40000130
2,397,509 UART:
2,397,525 UART: Running Caliptra FMC ...
2,397,933 UART:
2,397,987 UART: [state] CFI Enabled
2,408,694 UART: [fht] FMC Alias Private Key: 7
2,516,915 UART: [art] Extend RT PCRs Done
2,517,343 UART: [art] Lock RT PCRs Done
2,519,025 UART: [art] Populate DV Done
2,527,296 UART: [fht] FMC Alias Private Key: 7
2,528,360 UART: [art] Derive CDI
2,528,640 UART: [art] Store in in slot 0x4
2,614,549 UART: [art] Derive Key Pair
2,614,909 UART: [art] Store priv key in slot 0x5
2,628,125 UART: [art] Derive Key Pair - Done
2,642,661 UART: [art] Signing Cert with AUTHO
2,643,141 UART: RITY.KEYID = 7
2,658,075 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,840 UART: [art] PUB.X = 0EE8F54AE3BA9A3FBA357BF1CDADA947F23F5A547DF6E289D2BFE84C0B7D8DC6DCACBF29236EB1B63426FA2C41D66796
2,665,634 UART: [art] PUB.Y = 83C5E35EF8BBF55176B9413220F4C513908D355D3BC8FDF642337A3AA55C29CB4FB4A6670649C4BA0EC3D8DA6152DD13
2,672,588 UART: [art] SIG.R = 83D706EAD2A57F12F953A92453BCBB1CB74F4F9BDF2F994EEAC0C262E6B98020A9430218C8A794E4E622BF6B1E05B5F7
2,679,363 UART: [art] SIG.S = 1BC4E25A23E70CED47A981802A553842F03FCA5EA81E4EBFA92FB1B3D41FF2C8F7B89F779F92EF02DA354B26C9B817F9
2,703,470 UART: mbox::rt_entry...
2,703,842 UART: ____ _ _ _ ____ _____
2,704,626 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,426 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,194 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,962 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,730 UART: |_|
2,708,042 UART:
2,812,664 UART: [rt] Runtime listening for mailbox commands...
2,813,845 >>> mbox cmd response data (48 bytes)
2,813,846 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,816,629 >>> mbox cmd response data (48 bytes)
2,816,630 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,829,568 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,598 ready_for_fw is high
1,056,598 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,159,285 >>> mbox cmd response: success
2,159,285 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,221,125 UART:
2,221,141 UART: Running Caliptra FMC ...
2,221,549 UART:
2,221,603 UART: [state] CFI Enabled
2,231,902 UART: [fht] FMC Alias Private Key: 7
2,339,943 UART: [art] Extend RT PCRs Done
2,340,371 UART: [art] Lock RT PCRs Done
2,341,911 UART: [art] Populate DV Done
2,350,094 UART: [fht] FMC Alias Private Key: 7
2,351,116 UART: [art] Derive CDI
2,351,396 UART: [art] Store in in slot 0x4
2,436,755 UART: [art] Derive Key Pair
2,437,115 UART: [art] Store priv key in slot 0x5
2,449,955 UART: [art] Derive Key Pair - Done
2,465,060 UART: [art] Signing Cert with AUTHO
2,465,540 UART: RITY.KEYID = 7
2,480,890 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,655 UART: [art] PUB.X = 5D668E83714429ECB90CC56E01B9697BCA962EE45F45F3D6BAD5E2BA59930492FB1DB0A2C5E8FCDE5CB4B39005900A54
2,488,424 UART: [art] PUB.Y = 1BD72ADC74D519E5B434CBA30E7C3A8AA926F0B284D2879943EA0E1A68BFAF1249D991F7FEC6F8B2068D13E82D054106
2,495,371 UART: [art] SIG.R = 832D7C7138F1876128DB5AC98A11BB117994FB7536891A87086113BE9128C5CC8F053197D200BBCD958B840BD85EC64F
2,502,108 UART: [art] SIG.S = EB5FCC2D2B2F9E314E67422D2B59DEF531E63B261ECF1932BFE3F3E1BE2BE594EBD5DDFB4D6E885571AA8F9EC686E5D5
2,526,383 UART: mbox::rt_entry...
2,526,755 UART: ____ _ _ _ ____ _____
2,527,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,339 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,643 UART: |_|
2,530,955 UART:
2,637,340 UART: [rt] Runtime listening for mailbox commands...
2,638,521 >>> mbox cmd response data (48 bytes)
2,638,522 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,641,305 >>> mbox cmd response data (48 bytes)
2,641,306 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,654,244 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,086 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,174,496 ready_for_fw is high
1,174,496 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,279 UART: [ldev] ++
1,209,447 UART: [ldev] CDI.KEYID = 6
1,209,811 UART: [ldev] SUBJECT.KEYID = 5
1,210,238 UART: [ldev] AUTHORITY.KEYID = 7
1,210,701 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,951 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,116 UART: [fwproc] Recv command 0x46574c44
1,283,849 UART: [fwproc] Recv'd Img size: 78532 bytes
2,171,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,290 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,309,356 >>> mbox cmd response: success
2,309,356 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,310,585 UART: [afmc] ++
2,310,753 UART: [afmc] CDI.KEYID = 6
2,311,116 UART: [afmc] SUBJECT.KEYID = 7
2,311,542 UART: [afmc] AUTHORITY.KEYID = 5
2,347,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,638 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,250 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,969 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,940 UART: [afmc] --
2,390,958 UART: [cold-reset] --
2,391,830 UART: [state] Locking Datavault
2,392,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,487 UART: [state] Locking ICCM
2,393,993 UART: [exit] Launching FMC @ 0x40000130
2,399,322 UART:
2,399,338 UART: Running Caliptra FMC ...
2,399,746 UART:
2,399,889 UART: [state] CFI Enabled
2,410,310 UART: [fht] FMC Alias Private Key: 7
2,518,537 UART: [art] Extend RT PCRs Done
2,518,965 UART: [art] Lock RT PCRs Done
2,520,639 UART: [art] Populate DV Done
2,528,930 UART: [fht] FMC Alias Private Key: 7
2,529,988 UART: [art] Derive CDI
2,530,268 UART: [art] Store in in slot 0x4
2,616,261 UART: [art] Derive Key Pair
2,616,621 UART: [art] Store priv key in slot 0x5
2,630,069 UART: [art] Derive Key Pair - Done
2,644,621 UART: [art] Signing Cert with AUTHO
2,645,101 UART: RITY.KEYID = 7
2,660,383 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,148 UART: [art] PUB.X = 47958B882FD60E82DDD40B3DEE7AFDC585327D48E7B3E490DD7A11A321DD142F5C6CDE4D9112E2F3715A2462CC42193C
2,667,924 UART: [art] PUB.Y = 7F42993A630DA4FFFC25CC04355D88D5EBD0CB2DE77E34F6B9C23F5E415CAF279257A0F41E8BD580672228572586C592
2,674,874 UART: [art] SIG.R = FF8E7D2B211292B1AD4B33DE5CF56975A0F5AEA816E1615EC65475F0058117FA6AC4F98E6D2B8AF71270243D2B9B5616
2,681,649 UART: [art] SIG.S = 0E9C0A1523623C4434270B07BF784D40969BAC72F19E652B643F4A2E917831B964F4971486BB2A669FBF4034EA0D856D
2,705,119 UART: mbox::rt_entry...
2,705,491 UART: ____ _ _ _ ____ _____
2,706,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,611 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,379 UART: |_|
2,709,691 UART:
2,816,129 UART: [rt] Runtime listening for mailbox commands...
2,817,310 >>> mbox cmd response data (48 bytes)
2,817,311 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,820,094 >>> mbox cmd response data (48 bytes)
2,820,095 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,833,033 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,633 ready_for_fw is high
1,055,633 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,157,166 >>> mbox cmd response: success
2,157,166 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,219,256 UART:
2,219,272 UART: Running Caliptra FMC ...
2,219,680 UART:
2,219,823 UART: [state] CFI Enabled
2,230,616 UART: [fht] FMC Alias Private Key: 7
2,338,253 UART: [art] Extend RT PCRs Done
2,338,681 UART: [art] Lock RT PCRs Done
2,340,151 UART: [art] Populate DV Done
2,348,552 UART: [fht] FMC Alias Private Key: 7
2,349,732 UART: [art] Derive CDI
2,350,012 UART: [art] Store in in slot 0x4
2,435,385 UART: [art] Derive Key Pair
2,435,745 UART: [art] Store priv key in slot 0x5
2,449,105 UART: [art] Derive Key Pair - Done
2,463,736 UART: [art] Signing Cert with AUTHO
2,464,216 UART: RITY.KEYID = 7
2,479,286 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,051 UART: [art] PUB.X = 11C7D35D58CDB8701720A35A7B5DBC714450C7CD9C620C65483F10046771E5F91E3381A0E6E507808597C4EFB375182D
2,486,808 UART: [art] PUB.Y = 71C7A5317A3F3CB773E35DD2DB1C8EC47C272590EFB1D56A058725BA9C876BEBFF5EE736178985608065CDA791F4A727
2,493,763 UART: [art] SIG.R = B394D790004EFF4AB333D1D3FBEE74588C8A8CDB6659F98154BFEC9821E7656CAF58DFF1FE2AC2961B749EDA9AB3E2F0
2,500,533 UART: [art] SIG.S = 63B1671EC1BC0B8A01D83C3849F7A62C89D25F91C752FA0C5F2847B83FCB8CB134242890934FDC564C065A07FB2FED82
2,524,337 UART: mbox::rt_entry...
2,524,709 UART: ____ _ _ _ ____ _____
2,525,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,293 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,061 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,527,829 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,597 UART: |_|
2,528,909 UART:
2,636,693 UART: [rt] Runtime listening for mailbox commands...
2,637,874 >>> mbox cmd response data (48 bytes)
2,637,875 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,640,658 >>> mbox cmd response data (48 bytes)
2,640,659 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,653,597 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,084 UART:
192,443 UART: Running Caliptra ROM ...
193,628 UART:
193,773 UART: [state] CFI Enabled
266,637 UART: [state] LifecycleState = Unprovisioned
268,541 UART: [state] DebugLocked = No
270,849 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,485 UART: [kat] SHA2-256
446,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,714 UART: [kat] ++
457,204 UART: [kat] sha1
468,176 UART: [kat] SHA2-256
470,869 UART: [kat] SHA2-384
476,287 UART: [kat] SHA2-512-ACC
478,720 UART: [kat] ECC-384
2,767,442 UART: [kat] HMAC-384Kdf
2,779,603 UART: [kat] LMS
3,969,919 UART: [kat] --
3,974,717 UART: [cold-reset] ++
3,976,215 UART: [fht] Storing FHT @ 0x50003400
3,988,057 UART: [idev] ++
3,988,656 UART: [idev] CDI.KEYID = 6
3,989,536 UART: [idev] SUBJECT.KEYID = 7
3,990,845 UART: [idev] UDS.KEYID = 0
3,991,803 ready_for_fw is high
3,991,988 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,030 UART: [idev] Erasing UDS.KEYID = 0
7,326,093 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,438 UART: [idev] --
7,351,055 UART: [ldev] ++
7,351,631 UART: [ldev] CDI.KEYID = 6
7,352,592 UART: [ldev] SUBJECT.KEYID = 5
7,353,795 UART: [ldev] AUTHORITY.KEYID = 7
7,355,066 UART: [ldev] FE.KEYID = 1
7,401,614 UART: [ldev] Erasing FE.KEYID = 1
10,733,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,553 UART: [ldev] --
13,093,943 UART: [fwproc] Waiting for Commands...
13,096,060 UART: [fwproc] Received command 0x46574c44
13,098,293 UART: [fwproc] Received Image of size 113844 bytes
17,142,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,222,219 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,606,665 >>> mbox cmd response: success
17,611,654 UART: [afmc] ++
17,612,249 UART: [afmc] CDI.KEYID = 6
17,613,270 UART: [afmc] SUBJECT.KEYID = 7
17,614,421 UART: [afmc] AUTHORITY.KEYID = 5
20,985,230 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,553 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,285,870 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,262 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,083 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,521 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,350,148 UART: [afmc] --
23,353,967 UART: [cold-reset] --
23,359,875 UART: [state] Locking Datavault
23,365,385 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,128 UART: [state] Locking ICCM
23,368,404 UART: [exit] Launching FMC @ 0x40000130
23,376,792 UART:
23,377,015 UART: Running Caliptra FMC ...
23,378,104 UART:
23,378,260 UART: [state] CFI Enabled
23,445,924 UART: [fht] FMC Alias Private Key: 7
25,784,085 UART: [art] Extend RT PCRs Done
25,785,312 UART: [art] Lock RT PCRs Done
25,786,983 UART: [art] Populate DV Done
25,792,492 UART: [fht] FMC Alias Private Key: 7
25,794,018 UART: [art] Derive CDI
25,794,844 UART: [art] Store in in slot 0x4
25,854,885 UART: [art] Derive Key Pair
25,855,948 UART: [art] Store priv key in slot 0x5
29,148,502 UART: [art] Derive Key Pair - Done
29,161,389 UART: [art] Signing Cert with AUTHO
29,162,689 UART: RITY.KEYID = 7
31,451,023 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,565 UART: [art] PUB.X = 47C9EB78BBE46F8B849A8B61752FEC3E579C8943A5E5ED607D64C830FD49BE6D260823EEC7CEA14F1E1FBE3B9425A1BC
31,459,774 UART: [art] PUB.Y = 4F80385E9EF11E5E11C7ACE8CB7B8C5E84572E9FE9347345E4AB08578F59D366C336AD5CD57117A62F3639715E8D387B
31,467,034 UART: [art] SIG.R = DDECA12557E785E3B5809E5B6BFF1D14951A82A0236D740C175061B9AF031E68F532C0E981A642916E77A0BE4CCC49EE
31,474,386 UART: [art] SIG.S = 203041A1D416D789377BF393A61DB6E01373D9A96CCF87D182431ED0FB82CFA452B87A49D5FD069F4C5ACBCDF4AB3B6D
32,779,652 UART: Caliptra RT
32,780,368 UART: [state] CFI Enabled
32,941,984 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,806,264 ready_for_fw is high
3,806,636 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,866,766 >>> mbox cmd response: success
23,557,807 UART:
23,558,192 UART: Running Caliptra FMC ...
23,559,330 UART:
23,559,487 UART: [state] CFI Enabled
23,624,767 UART: [fht] FMC Alias Private Key: 7
25,962,695 UART: [art] Extend RT PCRs Done
25,963,954 UART: [art] Lock RT PCRs Done
25,965,758 UART: [art] Populate DV Done
25,971,203 UART: [fht] FMC Alias Private Key: 7
25,972,692 UART: [art] Derive CDI
25,973,427 UART: [art] Store in in slot 0x4
26,034,470 UART: [art] Derive Key Pair
26,035,515 UART: [art] Store priv key in slot 0x5
29,329,258 UART: [art] Derive Key Pair - Done
29,342,576 UART: [art] Signing Cert with AUTHO
29,343,880 UART: RITY.KEYID = 7
31,630,376 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,875 UART: [art] PUB.X = 51498497537457BD0A6EB9885E7B63F3AE65123BEFA6074C885120AD93F4825354C3073D0A98C258C9E59D646295DB32
31,639,117 UART: [art] PUB.Y = 6C6D1926696592F8831E4FB029CA8B986C96F9EA0454C8AC040A6182E4F593890B7650515CA37630120D1B82145D3410
31,646,293 UART: [art] SIG.R = AFB1CCA1776A35DF311F859C189E3893790BBA19526727CE3E11AD498F0D8E546C15AF073E0B57BCA9DE949DA1BE17F9
31,653,657 UART: [art] SIG.S = 8CCBC14EF41E7958F191335DF3C8ED99D9DB947AAF2F23C9EF7019715152CDCD2909F1E8DCA3212D10FFBD0993FA4E96
32,958,759 UART: Caliptra RT
32,959,472 UART: [state] CFI Enabled
33,121,293 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,336 UART:
192,695 UART: Running Caliptra ROM ...
193,791 UART:
603,715 UART: [state] CFI Enabled
616,096 UART: [state] LifecycleState = Unprovisioned
617,981 UART: [state] DebugLocked = No
619,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,071 UART: [kat] SHA2-256
793,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,328 UART: [kat] ++
804,982 UART: [kat] sha1
815,866 UART: [kat] SHA2-256
818,539 UART: [kat] SHA2-384
824,679 UART: [kat] SHA2-512-ACC
827,059 UART: [kat] ECC-384
3,111,842 UART: [kat] HMAC-384Kdf
3,123,226 UART: [kat] LMS
4,313,346 UART: [kat] --
4,319,279 UART: [cold-reset] ++
4,320,925 UART: [fht] Storing FHT @ 0x50003400
4,331,712 UART: [idev] ++
4,332,309 UART: [idev] CDI.KEYID = 6
4,333,342 UART: [idev] SUBJECT.KEYID = 7
4,334,520 UART: [idev] UDS.KEYID = 0
4,335,564 ready_for_fw is high
4,335,781 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,632 UART: [idev] Erasing UDS.KEYID = 0
7,623,499 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,706 UART: [idev] --
7,649,891 UART: [ldev] ++
7,650,468 UART: [ldev] CDI.KEYID = 6
7,651,487 UART: [ldev] SUBJECT.KEYID = 5
7,652,649 UART: [ldev] AUTHORITY.KEYID = 7
7,653,934 UART: [ldev] FE.KEYID = 1
7,665,714 UART: [ldev] Erasing FE.KEYID = 1
10,950,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,301 UART: [ldev] --
13,314,511 UART: [fwproc] Waiting for Commands...
13,316,627 UART: [fwproc] Received command 0x46574c44
13,318,814 UART: [fwproc] Received Image of size 113844 bytes
17,371,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,566 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,436 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,834,976 >>> mbox cmd response: success
17,839,131 UART: [afmc] ++
17,839,727 UART: [afmc] CDI.KEYID = 6
17,840,694 UART: [afmc] SUBJECT.KEYID = 7
17,841,910 UART: [afmc] AUTHORITY.KEYID = 5
21,152,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,917 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,250 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,115 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,539 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,888 UART: [afmc] --
23,521,022 UART: [cold-reset] --
23,524,070 UART: [state] Locking Datavault
23,528,935 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,645 UART: [state] Locking ICCM
23,532,149 UART: [exit] Launching FMC @ 0x40000130
23,540,551 UART:
23,540,788 UART: Running Caliptra FMC ...
23,541,891 UART:
23,542,051 UART: [state] CFI Enabled
23,550,292 UART: [fht] FMC Alias Private Key: 7
25,881,080 UART: [art] Extend RT PCRs Done
25,882,303 UART: [art] Lock RT PCRs Done
25,883,822 UART: [art] Populate DV Done
25,889,071 UART: [fht] FMC Alias Private Key: 7
25,890,560 UART: [art] Derive CDI
25,891,340 UART: [art] Store in in slot 0x4
25,933,831 UART: [art] Derive Key Pair
25,934,889 UART: [art] Store priv key in slot 0x5
29,177,313 UART: [art] Derive Key Pair - Done
29,190,314 UART: [art] Signing Cert with AUTHO
29,191,622 UART: RITY.KEYID = 7
31,470,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,122 UART: [art] PUB.X = 64EC7EAF05DDD3F7BD6D5907C6C15E019C139F28EA752B2BD6A9B1B170106BD3FDB975923D3D80BBE1416E02C87B5BE5
31,479,386 UART: [art] PUB.Y = 5F824F1009253C4CE4F8D55D28FA3A5D9214D0772FD79FE0FF2EA5583E41EECA7D19266AF736A4E78FB76C47795ED45D
31,486,680 UART: [art] SIG.R = D0844160D41AB948CD6C0C4F28A1AABFF2825088E43E2B1D01179F32F4EA2FF3316F7E877272740AB02E30FDEC5698DD
31,494,026 UART: [art] SIG.S = 9F0C3467A058BB7EE54BC2D6EC0E9951C9333A2469B6A317C8E17933093CF984F24D0F2BFAFD253BDFB227A2BE5A9D53
32,799,315 UART: Caliptra RT
32,800,039 UART: [state] CFI Enabled
32,917,226 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,131,475 ready_for_fw is high
4,131,844 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,060,336 >>> mbox cmd response: success
23,699,667 UART:
23,700,066 UART: Running Caliptra FMC ...
23,701,211 UART:
23,701,375 UART: [state] CFI Enabled
23,709,002 UART: [fht] FMC Alias Private Key: 7
26,039,596 UART: [art] Extend RT PCRs Done
26,040,819 UART: [art] Lock RT PCRs Done
26,042,672 UART: [art] Populate DV Done
26,048,093 UART: [fht] FMC Alias Private Key: 7
26,049,641 UART: [art] Derive CDI
26,050,379 UART: [art] Store in in slot 0x4
26,093,058 UART: [art] Derive Key Pair
26,094,105 UART: [art] Store priv key in slot 0x5
29,336,614 UART: [art] Derive Key Pair - Done
29,349,608 UART: [art] Signing Cert with AUTHO
29,350,938 UART: RITY.KEYID = 7
31,630,496 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,995 UART: [art] PUB.X = 48E333E5D8F4B800E885863B2A4476E773463680397C9715D3E2E6D31AB5F75FBE0816BABE0DC13843168BE8E4CAE717
31,639,192 UART: [art] PUB.Y = E8CA441448C6176B6EAE4A47FF541613B9A4A4E8A689A9B4FC9BA36474CA5F91F2F6778DF181CF7F4B3C14CB522437EC
31,646,465 UART: [art] SIG.R = D15000D56CF45C0975E17FCC4E09F9C775CDD5FF14A399BACFD6A738006E071BBF816FB945F583DA9D283D2AABA43319
31,653,867 UART: [art] SIG.S = 2C3FBE4CD6374748D914C04651357171AB122A108976E18024F250D8A7C44E79205E9AF5637EDBFA077596722A1AAAFD
32,959,369 UART: Caliptra RT
32,960,089 UART: [state] CFI Enabled
33,077,695 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
192,004 UART:
192,418 UART: Running Caliptra ROM ...
193,628 UART:
193,785 UART: [state] CFI Enabled
266,016 UART: [state] LifecycleState = Unprovisioned
267,942 UART: [state] DebugLocked = No
270,542 UART: [state] WD Timer not started. Device not locked for debugging
274,225 UART: [kat] SHA2-256
453,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,932 UART: [kat] ++
465,461 UART: [kat] sha1
477,694 UART: [kat] SHA2-256
480,703 UART: [kat] SHA2-384
487,044 UART: [kat] SHA2-512-ACC
489,985 UART: [kat] ECC-384
2,952,414 UART: [kat] HMAC-384Kdf
2,974,175 UART: [kat] LMS
3,503,615 UART: [kat] --
3,507,473 UART: [cold-reset] ++
3,510,110 UART: [fht] FHT @ 0x50003400
3,521,162 UART: [idev] ++
3,521,725 UART: [idev] CDI.KEYID = 6
3,522,758 UART: [idev] SUBJECT.KEYID = 7
3,523,860 UART: [idev] UDS.KEYID = 0
3,524,791 ready_for_fw is high
3,524,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,577 UART: [idev] Erasing UDS.KEYID = 0
6,028,109 UART: [idev] Sha1 KeyId Algorithm
6,051,232 UART: [idev] --
6,055,396 UART: [ldev] ++
6,055,971 UART: [ldev] CDI.KEYID = 6
6,056,889 UART: [ldev] SUBJECT.KEYID = 5
6,058,050 UART: [ldev] AUTHORITY.KEYID = 7
6,059,306 UART: [ldev] FE.KEYID = 1
6,101,559 UART: [ldev] Erasing FE.KEYID = 1
8,605,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,966 UART: [ldev] --
10,414,995 UART: [fwproc] Wait for Commands...
10,416,874 UART: [fwproc] Recv command 0x46574c44
10,418,969 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,286,357 >>> mbox cmd response: success
14,290,372 UART: [afmc] ++
14,290,996 UART: [afmc] CDI.KEYID = 6
14,291,918 UART: [afmc] SUBJECT.KEYID = 7
14,293,021 UART: [afmc] AUTHORITY.KEYID = 5
16,831,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,571 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,371 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,233 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,113 UART: [afmc] --
18,628,866 UART: [cold-reset] --
18,632,233 UART: [state] Locking Datavault
18,638,286 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,986 UART: [state] Locking ICCM
18,641,757 UART: [exit] Launching FMC @ 0x40000130
18,650,158 UART:
18,650,408 UART: Running Caliptra FMC ...
18,651,517 UART:
18,651,681 UART: [state] CFI Enabled
18,711,084 UART: [fht] FMC Alias Private Key: 7
20,475,237 UART: [art] Extend RT PCRs Done
20,476,464 UART: [art] Lock RT PCRs Done
20,478,038 UART: [art] Populate DV Done
20,483,506 UART: [fht] FMC Alias Private Key: 7
20,485,148 UART: [art] Derive CDI
20,485,965 UART: [art] Store in in slot 0x4
20,544,468 UART: [art] Derive Key Pair
20,545,500 UART: [art] Store priv key in slot 0x5
23,008,509 UART: [art] Derive Key Pair - Done
23,021,459 UART: [art] Signing Cert with AUTHO
23,022,773 UART: RITY.KEYID = 7
24,734,443 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,947 UART: [art] PUB.X = 07C076146B3031C352FDA51B1B6D7173AAD0AA8EC8E8657F84C60CD59352E5CEA86C9E960E157C9F683728D73CFF5564
24,743,212 UART: [art] PUB.Y = 67A14093AC81597C5FAA37D6A6B754298A56DBF68D9BD44DD2230F09F899EC8A5AD49E43B3CD1DB430C3C943316651D6
24,750,459 UART: [art] SIG.R = 9E8C6CFCC670C7C1A298B43C29BB87FD23F67616CB249F80FF9AEF76E496BA72758EA221B7F7F45E5AF42A5191B5E87A
24,757,864 UART: [art] SIG.S = A15E2600592C9F9F719CAAB34F4E584B06025DD7CF3F593B3ED3510227FC585656ECA62B7DBC99C0A51BDE1812F71B13
25,736,681 UART: Caliptra RT
25,737,387 UART: [state] CFI Enabled
25,903,589 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,353,958 ready_for_fw is high
3,354,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,033,189 >>> mbox cmd response: success
18,311,531 UART:
18,311,922 UART: Running Caliptra FMC ...
18,313,020 UART:
18,313,180 UART: [state] CFI Enabled
18,382,062 UART: [fht] FMC Alias Private Key: 7
20,145,648 UART: [art] Extend RT PCRs Done
20,146,888 UART: [art] Lock RT PCRs Done
20,148,652 UART: [art] Populate DV Done
20,154,228 UART: [fht] FMC Alias Private Key: 7
20,155,826 UART: [art] Derive CDI
20,156,639 UART: [art] Store in in slot 0x4
20,214,765 UART: [art] Derive Key Pair
20,215,807 UART: [art] Store priv key in slot 0x5
22,678,714 UART: [art] Derive Key Pair - Done
22,691,553 UART: [art] Signing Cert with AUTHO
22,692,853 UART: RITY.KEYID = 7
24,403,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,405,170 UART: [art] PUB.X = 85D309DBCD58DB5CEF7EE049DDE23B8FEC1166EEC3B2C5C131E17DE0A70338136743AF5FBD65F2F86F6EABECA11C816B
24,412,516 UART: [art] PUB.Y = 55DCC499EF560EA573203EB1379B6EBACE42A239D734252FCCD81731EE9D85A2CBBF116DFBA0D2B731C64BC082C45053
24,419,806 UART: [art] SIG.R = 56DB07466F7CA8E14BE929D7B36ABC18EEE75C3DE34C2786F69C37E5880BB56782CE86B8AF62A5A5FB33713893B06712
24,427,221 UART: [art] SIG.S = 5752CDCD9D1A297BADD628F5E6463DDC75E24402D877936A15EC2F200406ECB329AA0BF353656D844F9756F3ACCA0BAD
25,406,011 UART: Caliptra RT
25,406,743 UART: [state] CFI Enabled
25,571,029 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,550 writing to cptra_bootfsm_go
194,793 UART:
195,155 UART: Running Caliptra ROM ...
196,264 UART:
606,072 UART: [state] CFI Enabled
619,398 UART: [state] LifecycleState = Unprovisioned
621,280 UART: [state] DebugLocked = No
622,454 UART: [state] WD Timer not started. Device not locked for debugging
626,137 UART: [kat] SHA2-256
805,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,834 UART: [kat] ++
817,369 UART: [kat] sha1
829,812 UART: [kat] SHA2-256
832,816 UART: [kat] SHA2-384
837,811 UART: [kat] SHA2-512-ACC
840,745 UART: [kat] ECC-384
3,282,081 UART: [kat] HMAC-384Kdf
3,295,093 UART: [kat] LMS
3,824,606 UART: [kat] --
3,830,587 UART: [cold-reset] ++
3,832,665 UART: [fht] FHT @ 0x50003400
3,844,650 UART: [idev] ++
3,845,257 UART: [idev] CDI.KEYID = 6
3,846,173 UART: [idev] SUBJECT.KEYID = 7
3,847,352 UART: [idev] UDS.KEYID = 0
3,848,302 ready_for_fw is high
3,848,500 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,736 UART: [idev] Erasing UDS.KEYID = 0
6,320,503 UART: [idev] Sha1 KeyId Algorithm
6,343,472 UART: [idev] --
6,347,003 UART: [ldev] ++
6,347,589 UART: [ldev] CDI.KEYID = 6
6,348,502 UART: [ldev] SUBJECT.KEYID = 5
6,349,711 UART: [ldev] AUTHORITY.KEYID = 7
6,350,942 UART: [ldev] FE.KEYID = 1
6,360,779 UART: [ldev] Erasing FE.KEYID = 1
8,835,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,468 UART: [ldev] --
10,627,354 UART: [fwproc] Wait for Commands...
10,629,284 UART: [fwproc] Recv command 0x46574c44
10,631,374 UART: [fwproc] Recv'd Img size: 114168 bytes
14,038,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,191 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,497,965 >>> mbox cmd response: success
14,501,776 UART: [afmc] ++
14,502,374 UART: [afmc] CDI.KEYID = 6
14,503,288 UART: [afmc] SUBJECT.KEYID = 7
14,504,447 UART: [afmc] AUTHORITY.KEYID = 5
17,007,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,857 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,909 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,211 UART: [afmc] --
18,804,644 UART: [cold-reset] --
18,807,633 UART: [state] Locking Datavault
18,812,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,480 UART: [state] Locking ICCM
18,816,630 UART: [exit] Launching FMC @ 0x40000130
18,825,078 UART:
18,825,322 UART: Running Caliptra FMC ...
18,826,427 UART:
18,826,588 UART: [state] CFI Enabled
18,834,852 UART: [fht] FMC Alias Private Key: 7
20,591,850 UART: [art] Extend RT PCRs Done
20,593,083 UART: [art] Lock RT PCRs Done
20,594,986 UART: [art] Populate DV Done
20,600,629 UART: [fht] FMC Alias Private Key: 7
20,602,331 UART: [art] Derive CDI
20,603,152 UART: [art] Store in in slot 0x4
20,645,536 UART: [art] Derive Key Pair
20,646,576 UART: [art] Store priv key in slot 0x5
23,072,390 UART: [art] Derive Key Pair - Done
23,085,335 UART: [art] Signing Cert with AUTHO
23,086,637 UART: RITY.KEYID = 7
24,792,560 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,062 UART: [art] PUB.X = CE9C1970988B97589CF0670438EC08B9F3ED8CF297324D6EF96B083666A7C8F18C5B211323B9B2248113885125106550
24,801,276 UART: [art] PUB.Y = FAC119175EB0303617D1CC7C887A06390B2284532A5DF163DFBE21AF4A29A8BA708A520862A13707DF684EE1C8EAAE69
24,808,526 UART: [art] SIG.R = 0E51A1E2C564BADE395B66F36FDA20FAE8AE8F27E836F975AD61D501074750DE1A343297452539506A09ED6E92418BA5
24,815,929 UART: [art] SIG.S = FD2DF855E72EA58AA63E03B090C964A8B2B4CA584AD428B52B708509501539BBAD4AC0645B3D4EAF8685BD384A088D94
25,795,281 UART: Caliptra RT
25,795,994 UART: [state] CFI Enabled
25,912,225 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,002 writing to cptra_bootfsm_go
3,705,612 ready_for_fw is high
3,705,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,289,210 >>> mbox cmd response: success
18,544,838 UART:
18,545,276 UART: Running Caliptra FMC ...
18,546,395 UART:
18,546,555 UART: [state] CFI Enabled
18,554,672 UART: [fht] FMC Alias Private Key: 7
20,311,606 UART: [art] Extend RT PCRs Done
20,313,184 UART: [art] Lock RT PCRs Done
20,314,590 UART: [art] Populate DV Done
20,320,214 UART: [fht] FMC Alias Private Key: 7
20,321,857 UART: [art] Derive CDI
20,322,688 UART: [art] Store in in slot 0x4
20,365,258 UART: [art] Derive Key Pair
20,366,260 UART: [art] Store priv key in slot 0x5
22,793,139 UART: [art] Derive Key Pair - Done
22,806,090 UART: [art] Signing Cert with AUTHO
22,807,431 UART: RITY.KEYID = 7
24,512,391 UART: [art] Erasing AUTHORITY.KEYID = 7
24,513,907 UART: [art] PUB.X = E20D919685567D26E9824FCA5062689EA1D5D54EECC2ED09F08247C0B0AEC8ABC4A242FD0C8F0436162D812873F9227B
24,521,159 UART: [art] PUB.Y = E9278398086252DDDA2E0B398F5D3ED729D045CAC61424473F2CCBE87506EB8167C639DE92F0620C846C9FB3E6B744AD
24,528,380 UART: [art] SIG.R = B40AD19CCF24A619F59B188A23DC47C4D3FE7878F01ABA1416C94DFF7AFFBA53AD00412DB72FCBA94799E9D8213D4E5A
24,535,772 UART: [art] SIG.S = 6856B3A5499B56A205CF19A1F285B236964A1373409F1B7651A0B80A151FB4E9F64C7A206F3113DA429CDD9E95E02591
25,514,476 UART: Caliptra RT
25,515,189 UART: [state] CFI Enabled
25,632,053 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,068 UART:
192,451 UART: Running Caliptra ROM ...
193,564 UART:
193,708 UART: [state] CFI Enabled
268,509 UART: [state] LifecycleState = Unprovisioned
270,922 UART: [state] DebugLocked = No
272,660 UART: [state] WD Timer not started. Device not locked for debugging
277,417 UART: [kat] SHA2-256
467,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,069 UART: [kat] ++
478,611 UART: [kat] sha1
490,227 UART: [kat] SHA2-256
493,304 UART: [kat] SHA2-384
500,769 UART: [kat] SHA2-512-ACC
503,372 UART: [kat] ECC-384
2,946,233 UART: [kat] HMAC-384Kdf
2,973,312 UART: [kat] LMS
3,505,037 UART: [kat] --
3,510,170 UART: [cold-reset] ++
3,512,674 UART: [fht] FHT @ 0x50003400
3,523,444 UART: [idev] ++
3,524,154 UART: [idev] CDI.KEYID = 6
3,525,088 UART: [idev] SUBJECT.KEYID = 7
3,526,270 UART: [idev] UDS.KEYID = 0
3,527,176 ready_for_fw is high
3,527,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,089 UART: [idev] Erasing UDS.KEYID = 0
6,029,333 UART: [idev] Sha1 KeyId Algorithm
6,052,971 UART: [idev] --
6,058,804 UART: [ldev] ++
6,059,489 UART: [ldev] CDI.KEYID = 6
6,060,421 UART: [ldev] SUBJECT.KEYID = 5
6,061,587 UART: [ldev] AUTHORITY.KEYID = 7
6,062,821 UART: [ldev] FE.KEYID = 1
6,104,042 UART: [ldev] Erasing FE.KEYID = 1
8,608,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,834 UART: [ldev] --
10,420,056 UART: [fwproc] Wait for Commands...
10,421,851 UART: [fwproc] Recv command 0x46574c44
10,424,136 UART: [fwproc] Recv'd Img size: 114168 bytes
13,864,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,598,225 >>> mbox cmd response: success
14,602,915 UART: [afmc] ++
14,603,626 UART: [afmc] CDI.KEYID = 6
14,604,801 UART: [afmc] SUBJECT.KEYID = 7
14,606,299 UART: [afmc] AUTHORITY.KEYID = 5
17,132,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,458 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,455 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,323 UART: [afmc] --
18,950,834 UART: [cold-reset] --
18,955,361 UART: [state] Locking Datavault
18,961,221 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,435 UART: [state] Locking ICCM
18,966,242 UART: [exit] Launching FMC @ 0x40000130
18,974,881 UART:
18,975,155 UART: Running Caliptra FMC ...
18,976,264 UART:
18,976,427 UART: [state] CFI Enabled
19,034,679 UART: [fht] FMC Alias Private Key: 7
20,798,621 UART: [art] Extend RT PCRs Done
20,799,836 UART: [art] Lock RT PCRs Done
20,801,391 UART: [art] Populate DV Done
20,807,022 UART: [fht] FMC Alias Private Key: 7
20,808,722 UART: [art] Derive CDI
20,809,461 UART: [art] Store in in slot 0x4
20,867,379 UART: [art] Derive Key Pair
20,868,423 UART: [art] Store priv key in slot 0x5
23,331,236 UART: [art] Derive Key Pair - Done
23,344,170 UART: [art] Signing Cert with AUTHO
23,345,480 UART: RITY.KEYID = 7
25,057,184 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,689 UART: [art] PUB.X = 771FF02D0A56442584532146D717046461FC6FB8CE5B94195EC8EFC08601DE9BD3ADC2033F3270943E96437337656D3D
25,065,958 UART: [art] PUB.Y = 4D3CCEEB68973A7F3DE86124E56DA570C740ACFC0B1D449E30733D78CFC75A02ACE1FFA1CD021856CD2174A52311C53C
25,073,216 UART: [art] SIG.R = AA1269F7715379BA66A6D47987ACF8F8C8C1665063E0302BC6DFECC10A42B2C200B4BC71B2404F26554DE39364907C12
25,080,591 UART: [art] SIG.S = 87EE36DBE181F2AF5617448B275D42986BD3A8BCCE792536E4E4005533DEC4D78786FE8CB10A7FCD7FF19866A2BF5653
26,058,899 UART: Caliptra RT
26,059,609 UART: [state] CFI Enabled
26,223,651 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,439,870 ready_for_fw is high
3,440,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,725,241 >>> mbox cmd response: success
19,002,041 UART:
19,002,445 UART: Running Caliptra FMC ...
19,003,661 UART:
19,003,837 UART: [state] CFI Enabled
19,071,029 UART: [fht] FMC Alias Private Key: 7
20,835,809 UART: [art] Extend RT PCRs Done
20,837,036 UART: [art] Lock RT PCRs Done
20,838,404 UART: [art] Populate DV Done
20,843,923 UART: [fht] FMC Alias Private Key: 7
20,845,463 UART: [art] Derive CDI
20,846,278 UART: [art] Store in in slot 0x4
20,903,876 UART: [art] Derive Key Pair
20,904,919 UART: [art] Store priv key in slot 0x5
23,367,643 UART: [art] Derive Key Pair - Done
23,380,480 UART: [art] Signing Cert with AUTHO
23,381,793 UART: RITY.KEYID = 7
25,092,840 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,351 UART: [art] PUB.X = D6DEB3FCDD2CEEB8FB5AB0CE078461A304D4011EB972088F6CB03675A6A3748B131084C122E80F348F96B9652183F4DF
25,101,662 UART: [art] PUB.Y = 242B41C61B63F7958A9BB1E18FE0406825032C6358F514F0A06C518AB4E96E0787BEC10FF92EAFF824490B121838B5D6
25,108,885 UART: [art] SIG.R = 5CB04D6AA30B52475E9BC4C2D2E5302DD7C8AE1D6D143050CADE0613AE82F1D9CE381DA2D1A6A3AC0BB01C0D74189EDE
25,116,276 UART: [art] SIG.S = 22049E5E07334155E4486699A36F2625F935C5835B3A69AD7FB2E6C7B5D77B64E3AE96441589391143496235D82F6B3D
26,095,281 UART: Caliptra RT
26,095,999 UART: [state] CFI Enabled
26,259,637 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,723 writing to cptra_bootfsm_go
192,811 UART:
193,165 UART: Running Caliptra ROM ...
194,370 UART:
604,119 UART: [state] CFI Enabled
620,828 UART: [state] LifecycleState = Unprovisioned
623,196 UART: [state] DebugLocked = No
626,094 UART: [state] WD Timer not started. Device not locked for debugging
630,947 UART: [kat] SHA2-256
820,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,642 UART: [kat] ++
832,244 UART: [kat] sha1
844,263 UART: [kat] SHA2-256
847,270 UART: [kat] SHA2-384
854,320 UART: [kat] SHA2-512-ACC
856,904 UART: [kat] ECC-384
3,299,661 UART: [kat] HMAC-384Kdf
3,312,903 UART: [kat] LMS
3,844,717 UART: [kat] --
3,848,090 UART: [cold-reset] ++
3,850,595 UART: [fht] FHT @ 0x50003400
3,862,858 UART: [idev] ++
3,863,496 UART: [idev] CDI.KEYID = 6
3,864,532 UART: [idev] SUBJECT.KEYID = 7
3,865,705 UART: [idev] UDS.KEYID = 0
3,866,640 ready_for_fw is high
3,866,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,010,593 UART: [idev] Erasing UDS.KEYID = 0
6,346,871 UART: [idev] Sha1 KeyId Algorithm
6,368,456 UART: [idev] --
6,374,558 UART: [ldev] ++
6,375,234 UART: [ldev] CDI.KEYID = 6
6,376,152 UART: [ldev] SUBJECT.KEYID = 5
6,377,309 UART: [ldev] AUTHORITY.KEYID = 7
6,378,541 UART: [ldev] FE.KEYID = 1
6,390,075 UART: [ldev] Erasing FE.KEYID = 1
8,863,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,155 UART: [ldev] --
10,653,938 UART: [fwproc] Wait for Commands...
10,656,788 UART: [fwproc] Recv command 0x46574c44
10,659,040 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,843,503 >>> mbox cmd response: success
14,846,852 UART: [afmc] ++
14,847,563 UART: [afmc] CDI.KEYID = 6
14,848,749 UART: [afmc] SUBJECT.KEYID = 7
14,850,237 UART: [afmc] AUTHORITY.KEYID = 5
17,354,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,430 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,149,864 UART: [afmc] --
19,152,705 UART: [cold-reset] --
19,156,677 UART: [state] Locking Datavault
19,162,465 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,609 UART: [state] Locking ICCM
19,166,095 UART: [exit] Launching FMC @ 0x40000130
19,174,712 UART:
19,174,945 UART: Running Caliptra FMC ...
19,175,995 UART:
19,176,145 UART: [state] CFI Enabled
19,184,465 UART: [fht] FMC Alias Private Key: 7
20,941,477 UART: [art] Extend RT PCRs Done
20,942,689 UART: [art] Lock RT PCRs Done
20,944,393 UART: [art] Populate DV Done
20,949,754 UART: [fht] FMC Alias Private Key: 7
20,951,274 UART: [art] Derive CDI
20,952,013 UART: [art] Store in in slot 0x4
20,994,447 UART: [art] Derive Key Pair
20,995,451 UART: [art] Store priv key in slot 0x5
23,422,192 UART: [art] Derive Key Pair - Done
23,435,067 UART: [art] Signing Cert with AUTHO
23,436,399 UART: RITY.KEYID = 7
25,141,409 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,940 UART: [art] PUB.X = 0AEECDA0096A7B2FFB9490E2DE8459421231D2430D712EF5BE465F54CFDA969E8F1920A7F7977F402410BD3A3EB02303
25,150,203 UART: [art] PUB.Y = 5B97B578D16C2A46794354CE6278B9B0A948EB60D4893B9F819FC07A7D3FE6C15902C0AECE3FB08A8FB016ADBB750EF6
25,157,486 UART: [art] SIG.R = 49B605FFBDE7C0FB56E3B7EE8D882D8A496027D9597FC8A979D81189AA76C5227F51AC448A644AA8556F30B83FB6D940
25,164,874 UART: [art] SIG.S = E514D7BDE900C8004550A5299EFCCE6EFD33E2D82E1A17C96A27510FD9AB793448E84267C147060BA34F9DCAEC7AAB7E
26,144,043 UART: Caliptra RT
26,144,737 UART: [state] CFI Enabled
26,262,132 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,603 writing to cptra_bootfsm_go
3,762,257 ready_for_fw is high
3,762,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,957,735 >>> mbox cmd response: success
19,210,016 UART:
19,210,420 UART: Running Caliptra FMC ...
19,211,542 UART:
19,211,708 UART: [state] CFI Enabled
19,219,824 UART: [fht] FMC Alias Private Key: 7
20,976,947 UART: [art] Extend RT PCRs Done
20,978,173 UART: [art] Lock RT PCRs Done
20,979,634 UART: [art] Populate DV Done
20,984,949 UART: [fht] FMC Alias Private Key: 7
20,986,598 UART: [art] Derive CDI
20,987,420 UART: [art] Store in in slot 0x4
21,029,970 UART: [art] Derive Key Pair
21,031,022 UART: [art] Store priv key in slot 0x5
23,457,610 UART: [art] Derive Key Pair - Done
23,470,908 UART: [art] Signing Cert with AUTHO
23,472,252 UART: RITY.KEYID = 7
25,177,706 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,217 UART: [art] PUB.X = 7423803404E089DC69C840395C08FE25FA95B98C36215C9663B8C3235314CD6B79F6BBFD205B523945DBA4773DCD5935
25,186,475 UART: [art] PUB.Y = 50C66BA2435A40DAAAE9B0CDE877E9942586087A3C7B2080C8FE8C746C4B24A2B4EC3F7AC90336DE83B3719E2F69D972
25,193,757 UART: [art] SIG.R = D6EF498D458E31BA40463015FFF48B5A1CD396BAE3E80ED8D285A0D485439CC6F6A40DD3127BA7CF4DE2E45E1EC3074A
25,201,149 UART: [art] SIG.S = CB988E45DD029C64BC2724552229F18F78BC99F3038BAF7A4BB40870DA539583CDAD4F0E5632BFF094870DBF89AF3DA7
26,180,361 UART: Caliptra RT
26,181,078 UART: [state] CFI Enabled
26,298,050 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,793 UART: [kat] SHA2-256
881,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,839 UART: [kat] ++
885,991 UART: [kat] sha1
890,123 UART: [kat] SHA2-256
892,061 UART: [kat] SHA2-384
894,838 UART: [kat] SHA2-512-ACC
896,739 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,475,893 UART: [cold-reset] ++
1,476,335 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 ready_for_fw is high
1,480,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,270 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,344 UART: [idev] --
1,514,477 UART: [ldev] ++
1,514,645 UART: [ldev] CDI.KEYID = 6
1,515,008 UART: [ldev] SUBJECT.KEYID = 5
1,515,434 UART: [ldev] AUTHORITY.KEYID = 7
1,515,897 UART: [ldev] FE.KEYID = 1
1,521,305 UART: [ldev] Erasing FE.KEYID = 1
1,546,450 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,400 UART: [ldev] --
1,585,821 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 114168 bytes
2,884,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,723 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,075 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,820 >>> mbox cmd response: success
3,078,066 UART: [afmc] ++
3,078,234 UART: [afmc] CDI.KEYID = 6
3,078,596 UART: [afmc] SUBJECT.KEYID = 7
3,079,021 UART: [afmc] AUTHORITY.KEYID = 5
3,114,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,337 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,027 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,896 UART: [afmc] --
3,158,004 UART: [cold-reset] --
3,158,694 UART: [state] Locking Datavault
3,160,213 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,817 UART: [state] Locking ICCM
3,161,363 UART: [exit] Launching FMC @ 0x40000130
3,166,692 UART:
3,166,708 UART: Running Caliptra FMC ...
3,167,116 UART:
3,167,170 UART: [state] CFI Enabled
3,177,535 UART: [fht] FMC Alias Private Key: 7
3,285,180 UART: [art] Extend RT PCRs Done
3,285,608 UART: [art] Lock RT PCRs Done
3,286,956 UART: [art] Populate DV Done
3,295,185 UART: [fht] FMC Alias Private Key: 7
3,296,361 UART: [art] Derive CDI
3,296,641 UART: [art] Store in in slot 0x4
3,382,348 UART: [art] Derive Key Pair
3,382,708 UART: [art] Store priv key in slot 0x5
3,395,980 UART: [art] Derive Key Pair - Done
3,410,723 UART: [art] Signing Cert with AUTHO
3,411,203 UART: RITY.KEYID = 7
3,426,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,810 UART: [art] PUB.X = A7AE66B347A9311F202E1857B41A10B3D26668BE052B3C4C98891ED84E464330C055E5AEA1816577038E015420ED1033
3,433,563 UART: [art] PUB.Y = AD9FA046220D5A26498D789A368A313C73A1CE3C5021208FB894C1FD5E559FC929FCD5F2FF9040BF7A01EA475D045A6E
3,440,514 UART: [art] SIG.R = ED971A33DC0CAE2CED0F77DE3CEFA7DC214A85286825174E771CDE6B7745B90F56ECD6A9187D9DD53914B7F3FC9BB87C
3,447,297 UART: [art] SIG.S = 54E136F31F4DF1920633B5C933B1B782EE656E0F8A7A28C4029A9D8FB20D81F78B8856ED2FF83DAB3BB40FEB2C7F1B33
3,470,469 UART: Caliptra RT
3,470,722 UART: [state] CFI Enabled
3,579,645 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,437 ready_for_fw is high
1,362,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,170 >>> mbox cmd response: success
2,986,630 UART:
2,986,646 UART: Running Caliptra FMC ...
2,987,054 UART:
2,987,108 UART: [state] CFI Enabled
2,997,715 UART: [fht] FMC Alias Private Key: 7
3,104,874 UART: [art] Extend RT PCRs Done
3,105,302 UART: [art] Lock RT PCRs Done
3,106,856 UART: [art] Populate DV Done
3,115,153 UART: [fht] FMC Alias Private Key: 7
3,116,327 UART: [art] Derive CDI
3,116,607 UART: [art] Store in in slot 0x4
3,202,228 UART: [art] Derive Key Pair
3,202,588 UART: [art] Store priv key in slot 0x5
3,215,684 UART: [art] Derive Key Pair - Done
3,230,564 UART: [art] Signing Cert with AUTHO
3,231,044 UART: RITY.KEYID = 7
3,246,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,879 UART: [art] PUB.X = A2B8F82BE11EC4DF276A2561F72F249847477D7E43B66B7B189107B4BFB30121AD2A1EBB26E6107CE3248D9340C5E18A
3,253,649 UART: [art] PUB.Y = D11F6D1ACE61AE37F3FCF8ED732FF8718AA7C2D2562755CB92ED8CD5A4E4543F0058EDAFA11E6EAEDC1AE9165D35A526
3,260,603 UART: [art] SIG.R = BBBBA6F883136AC1F49AEC9D770BE58D3F956A87ECC2B2C58AAD94F968DC0EF506D753EDEC1C3DAF47DC94B468A80567
3,267,387 UART: [art] SIG.S = 9F5ABC9ED7353E47F58D4CA527CEC1BE65F0187E62924407C8D36FA264FEC83751C8C5E21A8DF3F0DA016558F9F1BAC7
3,291,272 UART: Caliptra RT
3,291,525 UART: [state] CFI Enabled
3,399,103 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,522 UART: [kat] SHA2-256
882,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,568 UART: [kat] ++
886,720 UART: [kat] sha1
890,896 UART: [kat] SHA2-256
892,834 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
902,951 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,518 UART: [cold-reset] ++
1,477,022 UART: [fht] Storing FHT @ 0x50003400
1,479,599 UART: [idev] ++
1,479,767 UART: [idev] CDI.KEYID = 6
1,480,127 UART: [idev] SUBJECT.KEYID = 7
1,480,551 UART: [idev] UDS.KEYID = 0
1,480,896 ready_for_fw is high
1,480,896 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,403 UART: [idev] Erasing UDS.KEYID = 0
1,504,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,507 UART: [idev] --
1,514,444 UART: [ldev] ++
1,514,612 UART: [ldev] CDI.KEYID = 6
1,514,975 UART: [ldev] SUBJECT.KEYID = 5
1,515,401 UART: [ldev] AUTHORITY.KEYID = 7
1,515,864 UART: [ldev] FE.KEYID = 1
1,521,318 UART: [ldev] Erasing FE.KEYID = 1
1,546,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,577 UART: [ldev] --
1,586,062 UART: [fwproc] Waiting for Commands...
1,586,705 UART: [fwproc] Received command 0x46574c44
1,587,496 UART: [fwproc] Received Image of size 114168 bytes
2,883,480 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,370 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,722 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,377 >>> mbox cmd response: success
3,076,469 UART: [afmc] ++
3,076,637 UART: [afmc] CDI.KEYID = 6
3,076,999 UART: [afmc] SUBJECT.KEYID = 7
3,077,424 UART: [afmc] AUTHORITY.KEYID = 5
3,112,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,813 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,206 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,896 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,785 UART: [afmc] --
3,155,717 UART: [cold-reset] --
3,156,531 UART: [state] Locking Datavault
3,157,714 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,318 UART: [state] Locking ICCM
3,158,848 UART: [exit] Launching FMC @ 0x40000130
3,164,177 UART:
3,164,193 UART: Running Caliptra FMC ...
3,164,601 UART:
3,164,744 UART: [state] CFI Enabled
3,175,235 UART: [fht] FMC Alias Private Key: 7
3,283,270 UART: [art] Extend RT PCRs Done
3,283,698 UART: [art] Lock RT PCRs Done
3,285,186 UART: [art] Populate DV Done
3,293,315 UART: [fht] FMC Alias Private Key: 7
3,294,315 UART: [art] Derive CDI
3,294,595 UART: [art] Store in in slot 0x4
3,380,278 UART: [art] Derive Key Pair
3,380,638 UART: [art] Store priv key in slot 0x5
3,394,132 UART: [art] Derive Key Pair - Done
3,408,887 UART: [art] Signing Cert with AUTHO
3,409,367 UART: RITY.KEYID = 7
3,425,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,852 UART: [art] PUB.X = 11A5FD6C9EDFB615F92A01AC77BE51704787758BED5B44F6185EB27C7D4D857AC35270DCE4FA6491CFC6601B5AFB806F
3,432,635 UART: [art] PUB.Y = 0C81F0B7DCEC3E419663E3E045EC19A96AC72A0EA317A865DBB29B8952093E11A63237833EB4CA0AAD7E2AB9AA050D40
3,439,581 UART: [art] SIG.R = 0EA51F601C116ACD07D97A93F832BE248EA57842E3CDECC513A73EC2746424BB37EA5554B79F511EA91324D1748BFCCA
3,446,357 UART: [art] SIG.S = E1A1669EB8D86BA23730AC90201B0C575E57ABA75C90072B6985BBBADFE4EB747C93B00E0AA64ECE8078509A2E904B4C
3,470,582 UART: Caliptra RT
3,470,927 UART: [state] CFI Enabled
3,579,294 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,636 ready_for_fw is high
1,363,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,929,381 >>> mbox cmd response: success
2,991,797 UART:
2,991,813 UART: Running Caliptra FMC ...
2,992,221 UART:
2,992,364 UART: [state] CFI Enabled
3,002,721 UART: [fht] FMC Alias Private Key: 7
3,110,408 UART: [art] Extend RT PCRs Done
3,110,836 UART: [art] Lock RT PCRs Done
3,112,496 UART: [art] Populate DV Done
3,120,691 UART: [fht] FMC Alias Private Key: 7
3,121,657 UART: [art] Derive CDI
3,121,937 UART: [art] Store in in slot 0x4
3,207,704 UART: [art] Derive Key Pair
3,208,064 UART: [art] Store priv key in slot 0x5
3,222,120 UART: [art] Derive Key Pair - Done
3,237,048 UART: [art] Signing Cert with AUTHO
3,237,528 UART: RITY.KEYID = 7
3,253,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,791 UART: [art] PUB.X = 8920D1DA1861778A06CDC544A226170C13B290F057B94E6B4786F751DA0B5CE9172405D219D5A60366C1116A8BBA23F9
3,260,542 UART: [art] PUB.Y = 839B2B8B0B24BD8B8553ECD2EA264BA86085FD167D553B6829F656C3A89E4F64BF1BBD9AF8A96555FC3BA309B0137A12
3,267,498 UART: [art] SIG.R = BDC293E49C274EB976BA7D1E4DEC3D513BCA1F8446C7CF4947508BD8323A7AD740ACFDA440EF1F0F463AEBB357C104C9
3,274,284 UART: [art] SIG.S = 5AE1F7478D6031E9EE4A7E8FFA96A8BF98557FB4BF1BBD91767F5F7B985BC362C9C67C865BDDD0A4F1D54C5043DD8072
3,298,277 UART: Caliptra RT
3,298,622 UART: [state] CFI Enabled
3,406,643 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
892,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,063 UART: [kat] ++
897,215 UART: [kat] sha1
901,487 UART: [kat] SHA2-256
903,427 UART: [kat] SHA2-384
906,112 UART: [kat] SHA2-512-ACC
908,013 UART: [kat] ECC-384
917,744 UART: [kat] HMAC-384Kdf
922,168 UART: [kat] LMS
1,170,496 UART: [kat] --
1,171,281 UART: [cold-reset] ++
1,171,813 UART: [fht] FHT @ 0x50003400
1,174,386 UART: [idev] ++
1,174,554 UART: [idev] CDI.KEYID = 6
1,174,914 UART: [idev] SUBJECT.KEYID = 7
1,175,338 UART: [idev] UDS.KEYID = 0
1,175,683 ready_for_fw is high
1,175,683 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,516 UART: [idev] Erasing UDS.KEYID = 0
1,199,861 UART: [idev] Sha1 KeyId Algorithm
1,208,385 UART: [idev] --
1,209,343 UART: [ldev] ++
1,209,511 UART: [ldev] CDI.KEYID = 6
1,209,874 UART: [ldev] SUBJECT.KEYID = 5
1,210,300 UART: [ldev] AUTHORITY.KEYID = 7
1,210,763 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,392 UART: [fwproc] Wait for Commands...
1,283,096 UART: [fwproc] Recv command 0x46574c44
1,283,824 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,727 >>> mbox cmd response: success
2,773,815 UART: [afmc] ++
2,773,983 UART: [afmc] CDI.KEYID = 6
2,774,345 UART: [afmc] SUBJECT.KEYID = 7
2,774,770 UART: [afmc] AUTHORITY.KEYID = 5
2,810,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,525 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,240 UART: [afmc] --
2,854,206 UART: [cold-reset] --
2,855,092 UART: [state] Locking Datavault
2,856,379 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,983 UART: [state] Locking ICCM
2,857,529 UART: [exit] Launching FMC @ 0x40000130
2,862,858 UART:
2,862,874 UART: Running Caliptra FMC ...
2,863,282 UART:
2,863,336 UART: [state] CFI Enabled
2,873,995 UART: [fht] FMC Alias Private Key: 7
2,981,856 UART: [art] Extend RT PCRs Done
2,982,284 UART: [art] Lock RT PCRs Done
2,983,880 UART: [art] Populate DV Done
2,992,009 UART: [fht] FMC Alias Private Key: 7
2,992,957 UART: [art] Derive CDI
2,993,237 UART: [art] Store in in slot 0x4
3,078,734 UART: [art] Derive Key Pair
3,079,094 UART: [art] Store priv key in slot 0x5
3,092,198 UART: [art] Derive Key Pair - Done
3,106,843 UART: [art] Signing Cert with AUTHO
3,107,323 UART: RITY.KEYID = 7
3,122,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,362 UART: [art] PUB.X = 1C269CDF843A7395E4E5E2E437559A8199522FD473294AFA0843A91B700C04A4A02EAF18D6771C2BA1C01D5D262F1680
3,130,123 UART: [art] PUB.Y = 2F1A777D2C462D700B5957291C12BA4FE5A73DBC4877059977EE532BC9B6222B3178CB087B02DDA9844C72B78C277B45
3,137,061 UART: [art] SIG.R = C592C9E0E02D0C13F35B551E96231D11FA45C2A8312568650D8C3751AF888FAFFE3E845E5A1AAE7A7A898D8DABAC9154
3,143,837 UART: [art] SIG.S = 40AB082E78EE2E29BC366244703B2C7B92F01D5E0C26F17A1CA2769FDC55F91F40432E1BE62E5F1804D9D4174DDB3752
3,167,353 UART: Caliptra RT
3,167,606 UART: [state] CFI Enabled
3,275,515 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 ready_for_fw is high
1,060,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,699 >>> mbox cmd response: success
2,686,169 UART:
2,686,185 UART: Running Caliptra FMC ...
2,686,593 UART:
2,686,647 UART: [state] CFI Enabled
2,697,212 UART: [fht] FMC Alias Private Key: 7
2,805,475 UART: [art] Extend RT PCRs Done
2,805,903 UART: [art] Lock RT PCRs Done
2,807,171 UART: [art] Populate DV Done
2,815,378 UART: [fht] FMC Alias Private Key: 7
2,816,534 UART: [art] Derive CDI
2,816,814 UART: [art] Store in in slot 0x4
2,902,605 UART: [art] Derive Key Pair
2,902,965 UART: [art] Store priv key in slot 0x5
2,915,981 UART: [art] Derive Key Pair - Done
2,930,527 UART: [art] Signing Cert with AUTHO
2,931,007 UART: RITY.KEYID = 7
2,946,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,834 UART: [art] PUB.X = 7984315DD77D3A3B1AB4A4137EB6E1AA95731594DB20D9515668232D72C342606EFE71567B4C4368B21E3FDF48398A62
2,953,600 UART: [art] PUB.Y = 8D8DC34266E766C9735AD858BA65F1A7B03CDFAADB984D4D58E0AB9E31EDA2F3CEE62F9612DBF3A1E0D3E621FD80B88A
2,960,576 UART: [art] SIG.R = 0BC415203026EB9EE2EBEBD6327C77C72F547A7704E59EA368E485DD1F5B76AFCBB645F00E453C591B3AF1F4A1FAFFFD
2,967,359 UART: [art] SIG.S = B51515828D005960EA6F6C5CB5E79C2531BEE6DB7CC08FA77261035866C3A049A78FD4DD100EE486E841E9BEE1FBBF21
2,990,948 UART: Caliptra RT
2,991,201 UART: [state] CFI Enabled
3,099,030 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
87,014 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
893,851 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,976 UART: [kat] ++
898,128 UART: [kat] sha1
902,470 UART: [kat] SHA2-256
904,410 UART: [kat] SHA2-384
907,255 UART: [kat] SHA2-512-ACC
909,156 UART: [kat] ECC-384
919,131 UART: [kat] HMAC-384Kdf
923,827 UART: [kat] LMS
1,172,155 UART: [kat] --
1,173,096 UART: [cold-reset] ++
1,173,494 UART: [fht] FHT @ 0x50003400
1,176,069 UART: [idev] ++
1,176,237 UART: [idev] CDI.KEYID = 6
1,176,597 UART: [idev] SUBJECT.KEYID = 7
1,177,021 UART: [idev] UDS.KEYID = 0
1,177,366 ready_for_fw is high
1,177,366 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,893 UART: [idev] Erasing UDS.KEYID = 0
1,201,996 UART: [idev] Sha1 KeyId Algorithm
1,210,540 UART: [idev] --
1,211,452 UART: [ldev] ++
1,211,620 UART: [ldev] CDI.KEYID = 6
1,211,983 UART: [ldev] SUBJECT.KEYID = 5
1,212,409 UART: [ldev] AUTHORITY.KEYID = 7
1,212,872 UART: [ldev] FE.KEYID = 1
1,217,974 UART: [ldev] Erasing FE.KEYID = 1
1,244,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,428 UART: [ldev] --
1,283,879 UART: [fwproc] Wait for Commands...
1,284,623 UART: [fwproc] Recv command 0x46574c44
1,285,351 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,980 >>> mbox cmd response: success
2,775,142 UART: [afmc] ++
2,775,310 UART: [afmc] CDI.KEYID = 6
2,775,672 UART: [afmc] SUBJECT.KEYID = 7
2,776,097 UART: [afmc] AUTHORITY.KEYID = 5
2,811,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,481 UART: [afmc] --
2,855,583 UART: [cold-reset] --
2,856,585 UART: [state] Locking Datavault
2,857,914 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,518 UART: [state] Locking ICCM
2,859,178 UART: [exit] Launching FMC @ 0x40000130
2,864,507 UART:
2,864,523 UART: Running Caliptra FMC ...
2,864,931 UART:
2,865,074 UART: [state] CFI Enabled
2,875,589 UART: [fht] FMC Alias Private Key: 7
2,983,836 UART: [art] Extend RT PCRs Done
2,984,264 UART: [art] Lock RT PCRs Done
2,985,578 UART: [art] Populate DV Done
2,994,079 UART: [fht] FMC Alias Private Key: 7
2,995,097 UART: [art] Derive CDI
2,995,377 UART: [art] Store in in slot 0x4
3,080,928 UART: [art] Derive Key Pair
3,081,288 UART: [art] Store priv key in slot 0x5
3,094,372 UART: [art] Derive Key Pair - Done
3,108,757 UART: [art] Signing Cert with AUTHO
3,109,237 UART: RITY.KEYID = 7
3,124,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,458 UART: [art] PUB.X = E7FAD1F684CB9C31D383C93D3CD3783857BB1EAFFBA9A86B9C365B5E414BFC7C2F1407E0503A3426EB6E6ACAC9B82274
3,132,245 UART: [art] PUB.Y = C65F44969C05F0892D2127292B535EC7A936341567CF383BE8EE07C31AFA002CC48AA66226B955337F330A5F8F57C00B
3,139,159 UART: [art] SIG.R = 4A8FBA6DE95E1C8DD9DD178A447CC3BFF3E8A5F79780D91DE948021928266A0DE228349F6F0B6A5C62B164EA7A79D035
3,145,932 UART: [art] SIG.S = 61E8577FBB9A7283402AF527D4BC47C52DD21C5C6B1A327245D1CEE9DFAF6C05BAAEB17475618ECD34F53489B32310C0
3,170,582 UART: Caliptra RT
3,170,927 UART: [state] CFI Enabled
3,277,826 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,374 ready_for_fw is high
1,060,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,545 >>> mbox cmd response: success
2,685,473 UART:
2,685,489 UART: Running Caliptra FMC ...
2,685,897 UART:
2,686,040 UART: [state] CFI Enabled
2,696,625 UART: [fht] FMC Alias Private Key: 7
2,804,856 UART: [art] Extend RT PCRs Done
2,805,284 UART: [art] Lock RT PCRs Done
2,806,776 UART: [art] Populate DV Done
2,814,861 UART: [fht] FMC Alias Private Key: 7
2,815,863 UART: [art] Derive CDI
2,816,143 UART: [art] Store in in slot 0x4
2,901,942 UART: [art] Derive Key Pair
2,902,302 UART: [art] Store priv key in slot 0x5
2,915,382 UART: [art] Derive Key Pair - Done
2,930,102 UART: [art] Signing Cert with AUTHO
2,930,582 UART: RITY.KEYID = 7
2,945,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,567 UART: [art] PUB.X = EAA7B4492C8D523E4DBC4473CF1C92AE641E5ED956DB47881BB74650A28CDDD1D69119544A9DABC347A2BC2FB2B6B17D
2,953,357 UART: [art] PUB.Y = A8EA59D9183AEAE029FDFFCF5385097E7AC453A9FCEB5D524D28C7A14B33D536E5711D483EEA531C166697C437E56FCA
2,960,320 UART: [art] SIG.R = 732B627C39D93F3C4F0E4F76908976E6FD6524E5185EE1DDA7F895CDDE46F909A763761A5A7559D66B241F3E1F4C39E0
2,967,088 UART: [art] SIG.S = 95E97EAFF7153BBCF2A7E6D6D80E22EEFDC6C49A7CCEB4C9CB04102AE8341E40031D6F2B608F7DC2D06B8596C06E9F89
2,991,216 UART: Caliptra RT
2,991,561 UART: [state] CFI Enabled
3,099,356 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Unprovisioned
86,147 UART: [state] DebugLocked = No
86,841 UART: [state] WD Timer not started. Device not locked for debugging
88,202 UART: [kat] SHA2-256
891,752 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,881 UART: [kat] ++
896,033 UART: [kat] sha1
900,245 UART: [kat] SHA2-256
902,185 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 ready_for_fw is high
1,174,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,653 UART: [idev] Erasing UDS.KEYID = 0
1,198,309 UART: [idev] Sha1 KeyId Algorithm
1,206,997 UART: [idev] --
1,208,066 UART: [ldev] ++
1,208,234 UART: [ldev] CDI.KEYID = 6
1,208,598 UART: [ldev] SUBJECT.KEYID = 5
1,209,025 UART: [ldev] AUTHORITY.KEYID = 7
1,209,488 UART: [ldev] FE.KEYID = 1
1,214,628 UART: [ldev] Erasing FE.KEYID = 1
1,240,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,744 UART: [ldev] --
1,280,206 UART: [fwproc] Wait for Commands...
1,280,907 UART: [fwproc] Recv command 0x46574c44
1,281,640 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,579 >>> mbox cmd response: success
2,770,638 UART: [afmc] ++
2,770,806 UART: [afmc] CDI.KEYID = 6
2,771,169 UART: [afmc] SUBJECT.KEYID = 7
2,771,595 UART: [afmc] AUTHORITY.KEYID = 5
2,806,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,947 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,559 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,191 UART: [afmc] --
2,850,231 UART: [cold-reset] --
2,851,075 UART: [state] Locking Datavault
2,852,022 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,626 UART: [state] Locking ICCM
2,853,120 UART: [exit] Launching FMC @ 0x40000130
2,858,449 UART:
2,858,465 UART: Running Caliptra FMC ...
2,858,873 UART:
2,858,927 UART: [state] CFI Enabled
2,869,520 UART: [fht] FMC Alias Private Key: 7
2,977,655 UART: [art] Extend RT PCRs Done
2,978,083 UART: [art] Lock RT PCRs Done
2,979,855 UART: [art] Populate DV Done
2,987,738 UART: [fht] FMC Alias Private Key: 7
2,988,740 UART: [art] Derive CDI
2,989,020 UART: [art] Store in in slot 0x4
3,074,979 UART: [art] Derive Key Pair
3,075,339 UART: [art] Store priv key in slot 0x5
3,088,491 UART: [art] Derive Key Pair - Done
3,103,242 UART: [art] Signing Cert with AUTHO
3,103,722 UART: RITY.KEYID = 7
3,119,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,937 UART: [art] PUB.X = 2EC32496D6542E0B4B6035975CCBC415672739B8EBF487AD1CE9E5D739331FB25D77C192027357E9403D5973075EEC92
3,126,694 UART: [art] PUB.Y = 1C8B09EC69FA3DA27D74CC987E15B7DDA3EADD022F5AD1ECB59A344C83FD5C4D23F3EE7DF713E7180DFFF78CCDF19398
3,133,665 UART: [art] SIG.R = C615F8F1F26A3779B9CFC84DE82610640E4D5F8B532C4EE529B86F3934A5BEE7D9FFCDC592FD9FAAAFA9330525147DF3
3,140,447 UART: [art] SIG.S = 98614106F6C2BB67E39CBBBF418066C4056EACE575E0B254044EA03AF907814A5FDB6E772968EBA8EE3ED8D070AE84D3
3,164,456 UART: Caliptra RT
3,164,709 UART: [state] CFI Enabled
3,271,999 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 ready_for_fw is high
1,056,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,473 >>> mbox cmd response: success
2,682,047 UART:
2,682,063 UART: Running Caliptra FMC ...
2,682,471 UART:
2,682,525 UART: [state] CFI Enabled
2,693,044 UART: [fht] FMC Alias Private Key: 7
2,801,159 UART: [art] Extend RT PCRs Done
2,801,587 UART: [art] Lock RT PCRs Done
2,803,193 UART: [art] Populate DV Done
2,811,330 UART: [fht] FMC Alias Private Key: 7
2,812,472 UART: [art] Derive CDI
2,812,752 UART: [art] Store in in slot 0x4
2,897,975 UART: [art] Derive Key Pair
2,898,335 UART: [art] Store priv key in slot 0x5
2,911,123 UART: [art] Derive Key Pair - Done
2,925,785 UART: [art] Signing Cert with AUTHO
2,926,265 UART: RITY.KEYID = 7
2,941,021 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,786 UART: [art] PUB.X = 7C5B1AA754291C996CF52142FE25B6727F140F0F699FFF163951C5D31E119B44C5F9918ECBB3AC2617F2063910252CFB
2,948,549 UART: [art] PUB.Y = B4558B4885AC95A6DE11BFB8769D31AD838E49EF4283BDBABD6A15E97FFFEE173F365B721EC21865C719D06B765E69A2
2,955,513 UART: [art] SIG.R = 299C8386FDA7FF91E1FFA1F627B64D7B659E994D09FD3858157DEA5AEC5BBD00D9E4B39E73CE79C4A81640709C07F6E6
2,962,269 UART: [art] SIG.S = 0FFC680ED0D2FA2F02369C14C77C23C6C7948B03AEFF41778932DE73AD1DB5A30D15FEBBB97A59C8D04C98D15B8AA69F
2,986,089 UART: Caliptra RT
2,986,342 UART: [state] CFI Enabled
3,094,343 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,246 UART: [kat] SHA2-256
902,186 UART: [kat] SHA2-384
904,975 UART: [kat] SHA2-512-ACC
906,876 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,174,506 ready_for_fw is high
1,174,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,200,252 UART: [idev] Sha1 KeyId Algorithm
1,209,012 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,983 UART: [ldev] Erasing FE.KEYID = 1
1,243,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,523 UART: [ldev] --
1,282,987 UART: [fwproc] Wait for Commands...
1,283,812 UART: [fwproc] Recv command 0x46574c44
1,284,545 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,580 >>> mbox cmd response: success
2,774,717 UART: [afmc] ++
2,774,885 UART: [afmc] CDI.KEYID = 6
2,775,248 UART: [afmc] SUBJECT.KEYID = 7
2,775,674 UART: [afmc] AUTHORITY.KEYID = 5
2,811,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,189 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,072 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,442 UART: [afmc] --
2,854,548 UART: [cold-reset] --
2,855,562 UART: [state] Locking Datavault
2,856,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,123 UART: [state] Locking ICCM
2,857,633 UART: [exit] Launching FMC @ 0x40000130
2,862,962 UART:
2,862,978 UART: Running Caliptra FMC ...
2,863,386 UART:
2,863,529 UART: [state] CFI Enabled
2,874,040 UART: [fht] FMC Alias Private Key: 7
2,982,457 UART: [art] Extend RT PCRs Done
2,982,885 UART: [art] Lock RT PCRs Done
2,984,399 UART: [art] Populate DV Done
2,992,754 UART: [fht] FMC Alias Private Key: 7
2,993,874 UART: [art] Derive CDI
2,994,154 UART: [art] Store in in slot 0x4
3,080,115 UART: [art] Derive Key Pair
3,080,475 UART: [art] Store priv key in slot 0x5
3,093,653 UART: [art] Derive Key Pair - Done
3,108,731 UART: [art] Signing Cert with AUTHO
3,109,211 UART: RITY.KEYID = 7
3,124,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,376 UART: [art] PUB.X = 460D98F2508FDC77E6AF02610EC35BCDF43658D3B0E2E4E45256EBAB361832A5F950E5E0A8E0726794BC14A9E4A9CEDB
3,132,151 UART: [art] PUB.Y = 79BC557E029C9B6775C418C7AE6FA457CB9BB48014283F4DCDE2227927E4CCCFD3A1FA999314ED301BE31373A55501DE
3,139,105 UART: [art] SIG.R = 1B460A9759874057E71B2E80090F6FA63A2461E81275BFB94E05B3574FC8597ADFF0E7BF423F66BB2813476302ADA24A
3,145,860 UART: [art] SIG.S = DF20A279E0B0C659E83824D3393045A03A0AF9E5CB9FCA4239823A7A917B6A3B5E74723667353EA6CD777A18ABF8B852
3,169,544 UART: Caliptra RT
3,169,889 UART: [state] CFI Enabled
3,277,634 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,855 ready_for_fw is high
1,055,855 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,050 >>> mbox cmd response: success
2,682,168 UART:
2,682,184 UART: Running Caliptra FMC ...
2,682,592 UART:
2,682,735 UART: [state] CFI Enabled
2,693,406 UART: [fht] FMC Alias Private Key: 7
2,801,313 UART: [art] Extend RT PCRs Done
2,801,741 UART: [art] Lock RT PCRs Done
2,802,979 UART: [art] Populate DV Done
2,811,098 UART: [fht] FMC Alias Private Key: 7
2,812,244 UART: [art] Derive CDI
2,812,524 UART: [art] Store in in slot 0x4
2,897,937 UART: [art] Derive Key Pair
2,898,297 UART: [art] Store priv key in slot 0x5
2,912,145 UART: [art] Derive Key Pair - Done
2,927,290 UART: [art] Signing Cert with AUTHO
2,927,770 UART: RITY.KEYID = 7
2,943,016 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,781 UART: [art] PUB.X = C2E1F0A6187CD5253C67B26F547DCD09E8AAAE034CE1B78F5AD0A20702E17F4385620E9651CF7810D821E81CAC74E4E1
2,950,546 UART: [art] PUB.Y = 0BBBD9A8D20AD2E354FB671E13303BE1DA84929DF8F9759D17CAAF8E4F9EAD5F22BBB013AFFAF093409185FF43D1AEC1
2,957,516 UART: [art] SIG.R = 6E5B76E5404055B80EB56F5FB27EF3F55EFA5E5A468C50EE62CB6EDE827A7031F4C6A79F55985C7551EEF7DF75B99C95
2,964,297 UART: [art] SIG.S = F9C163402A83D0F98788DF55B9A4610DE1FC8DA48B171847959939C15601813523236A16BB51504C2A8185E9C890359F
2,988,184 UART: Caliptra RT
2,988,529 UART: [state] CFI Enabled
3,096,660 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,211,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,212,813 UART:
2,213,089 UART: Running Caliptra ROM ...
2,214,156 UART:
2,214,304 UART: [state] CFI Enabled
2,215,183 UART: [state] LifecycleState = Unprovisioned
2,216,733 UART: [state] DebugLocked = No
2,217,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,221,167 UART: [kat] SHA2-256
2,221,827 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,224,828 UART: [kat] ++
2,225,274 UART: [kat] sha1
2,225,774 UART: [kat] SHA2-256
2,226,426 UART: [kat] SHA2-384
2,227,078 UART: [kat] SHA2-512-ACC
2,227,877 UART: [kat] ECC-384
2,766,919 UART: [kat] HMAC-384Kdf
2,798,466 UART: [kat] LMS
3,988,774 UART: [kat] --
3,991,422 UART: [cold-reset] ++
3,993,194 UART: [fht] Storing FHT @ 0x50003400
4,004,567 UART: [idev] ++
4,005,177 UART: [idev] CDI.KEYID = 6
4,006,065 UART: [idev] SUBJECT.KEYID = 7
4,007,339 UART: [idev] UDS.KEYID = 0
4,033,605 UART: [idev] Erasing UDS.KEYID = 0
7,347,854 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,875 UART: [idev] --
7,375,777 UART: [ldev] ++
7,376,356 UART: [ldev] CDI.KEYID = 6
7,377,295 UART: [ldev] SUBJECT.KEYID = 5
7,378,506 UART: [ldev] AUTHORITY.KEYID = 7
7,379,789 UART: [ldev] FE.KEYID = 1
7,419,890 UART: [ldev] Erasing FE.KEYID = 1
10,750,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,472 UART: [ldev] --
13,111,380 UART: [fwproc] Waiting for Commands...
13,114,440 UART: [fwproc] Received command 0x4d454153
13,123,325 >>> mbox cmd response data (12 bytes)
13,126,476 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
13,226,735 UART: [fwproc] Received command 0x46574c44
13,229,051 UART: [fwproc] Received Image of size 78576 bytes
16,847,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,924,216 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,993,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,185,162 >>> mbox cmd response: success
17,188,616 UART: [afmc] ++
17,189,208 UART: [afmc] CDI.KEYID = 6
17,190,228 UART: [afmc] SUBJECT.KEYID = 7
17,191,385 UART: [afmc] AUTHORITY.KEYID = 5
20,552,455 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,854,516 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,856,768 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,871,119 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,885,985 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,900,425 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,921,464 UART: [afmc] --
22,924,673 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,925,021 UART: [cold-reset] --
22,928,651 UART: [state] Locking Datavault
22,934,051 UART: [state] Locking PCR0, PCR1 and PCR31
22,935,763 UART: [state] Locking ICCM
22,937,340 UART: [exit] Launching FMC @ 0x40000130
22,945,731 UART:
22,945,959 UART: Running Caliptra FMC ...
22,947,054 UART:
22,947,210 UART: [state] CFI Enabled
23,014,288 UART: [fht] FMC Alias Private Key: 7
25,352,265 UART: [art] Extend RT PCRs Done
25,353,494 UART: [art] Lock RT PCRs Done
25,355,092 UART: [art] Populate DV Done
25,360,446 UART: [fht] FMC Alias Private Key: 7
25,362,170 UART: [art] Derive CDI
25,362,978 UART: [art] Store in in slot 0x4
25,422,884 UART: [art] Derive Key Pair
25,423,909 UART: [art] Store priv key in slot 0x5
28,716,482 UART: [art] Derive Key Pair - Done
28,729,527 UART: [art] Signing Cert with AUTHO
28,730,880 UART: RITY.KEYID = 7
31,018,217 UART: [art] Erasing AUTHORITY.KEYID = 7
31,019,762 UART: [art] PUB.X = E449B9DE68D32339827AB36A2E3876E48DEA5BA1D30F97D6190C28B2AD03A83998CB582858E5B57C7667E23F9296BA55
31,026,912 UART: [art] PUB.Y = C77AC19D32026BB9B8F5BB50E8C6139916EFACC23E0D81420A1159FD2D2AA92A87C73E1109AD0C49FFF73015EAC16FF9
31,034,217 UART: [art] SIG.R = EE08932B7FA9EFC56F7F5647656CF071866DDA42FF3B0E7EB24109CED898993A659B8CF26E0EEFF4B8ABD5CFE4BEC57C
31,041,604 UART: [art] SIG.S = A05FFD8EE179220249D6E2F8A666E937FDC81BBBC932AAA2634A86152064227032A0E5E1171DEA406AD74D95AA5C3B4E
32,346,321 UART: mbox::rt_entry...
32,347,293 UART: ____ _ _ _ ____ _____
32,349,222 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,351,225 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,353,073 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,354,991 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,356,865 UART: |_|
32,357,739 UART:
32,482,528 UART: [rt] Runtime listening for mailbox commands...
32,484,703 >>> mbox cmd response data (48 bytes)
32,485,292 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,487,611 >>> mbox cmd response data (48 bytes)
32,488,505 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,502,341 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,209,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,868,237 >>> mbox cmd response data (12 bytes)
12,871,406 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,283,661 >>> mbox cmd response: success
22,950,532 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,966,348 UART:
22,966,666 UART: Running Caliptra FMC ...
22,967,745 UART:
22,967,892 UART: [state] CFI Enabled
23,037,312 UART: [fht] FMC Alias Private Key: 7
25,374,954 UART: [art] Extend RT PCRs Done
25,376,174 UART: [art] Lock RT PCRs Done
25,377,822 UART: [art] Populate DV Done
25,383,449 UART: [fht] FMC Alias Private Key: 7
25,385,145 UART: [art] Derive CDI
25,385,953 UART: [art] Store in in slot 0x4
25,446,776 UART: [art] Derive Key Pair
25,447,813 UART: [art] Store priv key in slot 0x5
28,740,647 UART: [art] Derive Key Pair - Done
28,753,756 UART: [art] Signing Cert with AUTHO
28,755,060 UART: RITY.KEYID = 7
31,042,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,044,112 UART: [art] PUB.X = 9FC7007DE04DD925FEB9C71278A0DBE550029A1F9D0B38ED3BDF7EBF04D860EC3961E6DB7E85F4A5FC2116BD5EDD6201
31,051,368 UART: [art] PUB.Y = F283C9FAA32587CC26E9EE78E15339D3D48286B1F44F32506206909D4FAAD1B8BDB1DD707F5B41F81833DA764950D131
31,058,672 UART: [art] SIG.R = DE39701C6C2B8E475E3907FE1D17203E26EFB916FC2E7A22A939D1F5CAEE0A1E39B77444B81734137D6355EBC3684D5D
31,066,015 UART: [art] SIG.S = FD541E6B4B4249B8A4EF8FB6EA4A08C8F7F14235C1B61517290942B17521471B3DCA4DEB35C3E7ED612B3B853D5238A0
32,371,365 UART: mbox::rt_entry...
32,372,331 UART: ____ _ _ _ ____ _____
32,374,264 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,376,264 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,378,113 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,380,104 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,382,001 UART: |_|
32,382,890 UART:
32,507,813 UART: [rt] Runtime listening for mailbox commands...
32,509,978 >>> mbox cmd response data (48 bytes)
32,510,525 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,512,836 >>> mbox cmd response data (48 bytes)
32,513,705 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,527,541 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,286,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,288,464 UART:
2,288,733 UART: Running Caliptra ROM ...
2,289,811 UART:
2,289,987 UART: [state] CFI Enabled
2,290,885 UART: [state] LifecycleState = Unprovisioned
2,292,550 UART: [state] DebugLocked = No
2,293,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,296,977 UART: [kat] SHA2-256
2,297,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,300,660 UART: [kat] ++
2,301,118 UART: [kat] sha1
2,301,630 UART: [kat] SHA2-256
2,302,374 UART: [kat] SHA2-384
2,303,044 UART: [kat] SHA2-512-ACC
2,303,934 UART: [kat] ECC-384
3,117,721 UART: [kat] HMAC-384Kdf
3,129,211 UART: [kat] LMS
4,319,318 UART: [kat] --
4,324,619 UART: [cold-reset] ++
4,326,034 UART: [fht] Storing FHT @ 0x50003400
4,336,288 UART: [idev] ++
4,336,859 UART: [idev] CDI.KEYID = 6
4,337,807 UART: [idev] SUBJECT.KEYID = 7
4,339,458 UART: [idev] UDS.KEYID = 0
4,354,413 UART: [idev] Erasing UDS.KEYID = 0
7,624,889 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,810 UART: [idev] --
7,649,246 UART: [ldev] ++
7,649,881 UART: [ldev] CDI.KEYID = 6
7,650,801 UART: [ldev] SUBJECT.KEYID = 5
7,652,019 UART: [ldev] AUTHORITY.KEYID = 7
7,653,259 UART: [ldev] FE.KEYID = 1
7,663,529 UART: [ldev] Erasing FE.KEYID = 1
10,950,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,710 UART: [ldev] --
13,313,244 UART: [fwproc] Waiting for Commands...
13,315,616 UART: [fwproc] Received command 0x4d454153
13,324,518 >>> mbox cmd response data (12 bytes)
13,327,305 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
13,426,683 UART: [fwproc] Received command 0x46574c44
13,428,950 UART: [fwproc] Received Image of size 78576 bytes
17,054,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,128,461 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,197,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,390,741 >>> mbox cmd response: success
17,395,652 UART: [afmc] ++
17,396,295 UART: [afmc] CDI.KEYID = 6
17,397,234 UART: [afmc] SUBJECT.KEYID = 7
17,398,458 UART: [afmc] AUTHORITY.KEYID = 5
20,712,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,008,007 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,010,264 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,024,614 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,039,469 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,053,933 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,075,079 UART: [afmc] --
23,078,950 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,079,309 UART: [cold-reset] --
23,084,027 UART: [state] Locking Datavault
23,088,942 UART: [state] Locking PCR0, PCR1 and PCR31
23,090,708 UART: [state] Locking ICCM
23,092,052 UART: [exit] Launching FMC @ 0x40000130
23,100,455 UART:
23,100,713 UART: Running Caliptra FMC ...
23,101,822 UART:
23,101,993 UART: [state] CFI Enabled
23,109,937 UART: [fht] FMC Alias Private Key: 7
25,440,753 UART: [art] Extend RT PCRs Done
25,441,974 UART: [art] Lock RT PCRs Done
25,443,494 UART: [art] Populate DV Done
25,448,960 UART: [fht] FMC Alias Private Key: 7
25,450,495 UART: [art] Derive CDI
25,451,308 UART: [art] Store in in slot 0x4
25,494,124 UART: [art] Derive Key Pair
25,495,156 UART: [art] Store priv key in slot 0x5
28,737,381 UART: [art] Derive Key Pair - Done
28,750,546 UART: [art] Signing Cert with AUTHO
28,751,855 UART: RITY.KEYID = 7
31,031,192 UART: [art] Erasing AUTHORITY.KEYID = 7
31,032,715 UART: [art] PUB.X = 830A34413FEE116A9C785D6C88BD3D06ED21E6986948666AE9DAB26EE5B5F69DE2A1A76A5F6FD5929854FF3BC176D6DC
31,039,917 UART: [art] PUB.Y = E7F6192FFA2BC69484C0097254AEAEFE65C15B283F298E1BB636BD1DA1A601BAA5837353F04787719FFF9D1B5F8CA11C
31,047,156 UART: [art] SIG.R = 5CDF405C0B3906B235763444221B7459C866DE738CA0BB18BD31E1F56CC5F5C7F0E87A549A951C172167C1E29150B9BB
31,054,557 UART: [art] SIG.S = 17EEB784025C873C7B156510D6FE38CEB36F2403F2CD7341B5BB11913A6BD1C6ADD9AFA155EEE21596491F9356F63052
32,359,021 UART: mbox::rt_entry...
32,359,991 UART: ____ _ _ _ ____ _____
32,362,098 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,364,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,366,174 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,368,102 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,370,029 UART: |_|
32,370,840 UART:
32,495,682 UART: [rt] Runtime listening for mailbox commands...
32,497,849 >>> mbox cmd response data (48 bytes)
32,498,424 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,500,776 >>> mbox cmd response data (48 bytes)
32,501,671 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,515,538 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,293,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,035,771 >>> mbox cmd response data (12 bytes)
13,038,916 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,442,820 >>> mbox cmd response: success
23,069,284 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,084,154 UART:
23,084,477 UART: Running Caliptra FMC ...
23,085,568 UART:
23,085,725 UART: [state] CFI Enabled
23,093,893 UART: [fht] FMC Alias Private Key: 7
25,424,703 UART: [art] Extend RT PCRs Done
25,425,961 UART: [art] Lock RT PCRs Done
25,427,616 UART: [art] Populate DV Done
25,433,008 UART: [fht] FMC Alias Private Key: 7
25,434,718 UART: [art] Derive CDI
25,435,540 UART: [art] Store in in slot 0x4
25,477,833 UART: [art] Derive Key Pair
25,478,880 UART: [art] Store priv key in slot 0x5
28,720,689 UART: [art] Derive Key Pair - Done
28,733,738 UART: [art] Signing Cert with AUTHO
28,735,041 UART: RITY.KEYID = 7
31,014,840 UART: [art] Erasing AUTHORITY.KEYID = 7
31,016,354 UART: [art] PUB.X = 7A730B7936BA4AD0B44E464A58C10E689343C7391350C5C63093A9806647E2D6B7F87B160C84A6E750BF68273B36082F
31,023,560 UART: [art] PUB.Y = C743CA605E3822A046758C2069CDDC050B6B03653E9278229D80CCD8E7C6CE7892614138C29D43AD5424FAD8C27B554D
31,030,769 UART: [art] SIG.R = B42240E48DE2BA8AF8B01EAEF88B529E1EC23C50E8026DA3CCCBBFAB9B4D33EB5B40C7E5AD8BDDEE38E08E857947F1AF
31,038,232 UART: [art] SIG.S = A6F4ED9502FCF962A31193FFCCD4005EC7F17211F2B98B70D57BC264C24CE59B2F9DEDBDAA6241B7FBEB73C93DDB1FE3
32,343,027 UART: mbox::rt_entry...
32,344,000 UART: ____ _ _ _ ____ _____
32,345,994 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,348,002 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,350,154 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,352,170 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,354,031 UART: |_|
32,354,886 UART:
32,479,788 UART: [rt] Runtime listening for mailbox commands...
32,481,950 >>> mbox cmd response data (48 bytes)
32,482,521 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,484,849 >>> mbox cmd response data (48 bytes)
32,485,743 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,499,615 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
2,215,145 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,216,690 UART:
2,216,949 UART: Running Caliptra ROM ...
2,218,019 UART:
2,218,173 UART: [state] CFI Enabled
2,219,060 UART: [state] LifecycleState = Unprovisioned
2,220,730 UART: [state] DebugLocked = No
2,221,760 UART: [state] WD Timer not started. Device not locked for debugging
2,224,229 UART: [kat] SHA2-256
2,224,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,227,924 UART: [kat] ++
2,228,379 UART: [kat] sha1
2,228,891 UART: [kat] SHA2-256
2,229,550 UART: [kat] SHA2-384
2,230,208 UART: [kat] SHA2-512-ACC
2,231,038 UART: [kat] ECC-384
2,947,570 UART: [kat] HMAC-384Kdf
2,969,217 UART: [kat] LMS
3,498,657 UART: [kat] --
3,504,468 UART: [cold-reset] ++
3,506,136 UART: [fht] FHT @ 0x50003400
3,516,644 UART: [idev] ++
3,517,247 UART: [idev] CDI.KEYID = 6
3,518,135 UART: [idev] SUBJECT.KEYID = 7
3,519,354 UART: [idev] UDS.KEYID = 0
3,540,644 UART: [idev] Erasing UDS.KEYID = 0
6,021,933 UART: [idev] Sha1 KeyId Algorithm
6,043,989 UART: [idev] --
6,048,265 UART: [ldev] ++
6,048,835 UART: [ldev] CDI.KEYID = 6
6,049,749 UART: [ldev] SUBJECT.KEYID = 5
6,050,914 UART: [ldev] AUTHORITY.KEYID = 7
6,052,148 UART: [ldev] FE.KEYID = 1
6,095,590 UART: [ldev] Erasing FE.KEYID = 1
8,604,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,654 UART: [ldev] --
10,408,768 UART: [fwproc] Wait for Commands...
10,411,628 UART: [fwproc] Recv command 0x4d454153
10,420,174 >>> mbox cmd response data (12 bytes)
10,422,884 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
10,522,032 UART: [fwproc] Recv command 0x46574c44
10,524,157 UART: [fwproc] Recv'd Img size: 78532 bytes
13,492,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,568,379 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,637,150 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,829,286 >>> mbox cmd response: success
13,834,398 UART: [afmc] ++
13,835,013 UART: [afmc] CDI.KEYID = 6
13,835,935 UART: [afmc] SUBJECT.KEYID = 7
13,837,043 UART: [afmc] AUTHORITY.KEYID = 5
16,377,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,102,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,104,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,119,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,136,010 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,152,072 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,175,760 UART: [afmc] --
18,180,284 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,180,636 UART: [cold-reset] --
18,184,420 UART: [state] Locking Datavault
18,187,881 UART: [state] Locking PCR0, PCR1 and PCR31
18,189,584 UART: [state] Locking ICCM
18,192,279 UART: [exit] Launching FMC @ 0x40000130
18,200,729 UART:
18,200,965 UART: Running Caliptra FMC ...
18,202,059 UART:
18,202,221 UART: [state] CFI Enabled
18,260,324 UART: [fht] FMC Alias Private Key: 7
20,024,735 UART: [art] Extend RT PCRs Done
20,025,971 UART: [art] Lock RT PCRs Done
20,027,419 UART: [art] Populate DV Done
20,032,738 UART: [fht] FMC Alias Private Key: 7
20,034,273 UART: [art] Derive CDI
20,035,039 UART: [art] Store in in slot 0x4
20,094,168 UART: [art] Derive Key Pair
20,095,212 UART: [art] Store priv key in slot 0x5
22,557,731 UART: [art] Derive Key Pair - Done
22,570,676 UART: [art] Signing Cert with AUTHO
22,571,984 UART: RITY.KEYID = 7
24,283,284 UART: [art] Erasing AUTHORITY.KEYID = 7
24,284,788 UART: [art] PUB.X = 84E3EF3C732B0A6C804C001033C7EC7EAB447F4D9A041EA65A897AD4B671C9936DECE5A16E3F6405A6825CF1B5074701
24,291,995 UART: [art] PUB.Y = 1F4CF3E24F8F4E76C66E03AFD7EC25AC7C53720C0486B0D89F71139F9823C51A3FDDDE0C5291731BC83F5AD2FA5DE11D
24,299,300 UART: [art] SIG.R = BB9FB2C7789EB9323D60F9FFC128A949351CB8A29C8912E10AF8CC5D489B35D92EE202A3555270EF5E42B793EC7BCD54
24,306,719 UART: [art] SIG.S = 1C5A0061B1C33995A8620A34DBA255FC99C11898B1B16F9360F9D740CF9BC2053DC15DFC896D85E2E8DD6157BEFBDD06
25,285,490 UART: mbox::rt_entry...
25,286,442 UART: ____ _ _ _ ____ _____
25,288,438 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,290,455 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,292,387 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,294,316 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,296,244 UART: |_|
25,297,082 UART:
25,421,504 UART: [rt] Runtime listening for mailbox commands...
25,423,616 >>> mbox cmd response data (48 bytes)
25,424,195 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,426,547 >>> mbox cmd response data (48 bytes)
25,427,431 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,441,288 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,204,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,207,841 >>> mbox cmd response data (12 bytes)
10,210,032 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,614,030 >>> mbox cmd response: success
17,879,345 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,893,329 UART:
17,893,662 UART: Running Caliptra FMC ...
17,894,739 UART:
17,894,910 UART: [state] CFI Enabled
17,961,728 UART: [fht] FMC Alias Private Key: 7
19,725,923 UART: [art] Extend RT PCRs Done
19,727,146 UART: [art] Lock RT PCRs Done
19,728,477 UART: [art] Populate DV Done
19,734,000 UART: [fht] FMC Alias Private Key: 7
19,735,495 UART: [art] Derive CDI
19,736,265 UART: [art] Store in in slot 0x4
19,794,696 UART: [art] Derive Key Pair
19,795,742 UART: [art] Store priv key in slot 0x5
22,259,133 UART: [art] Derive Key Pair - Done
22,272,308 UART: [art] Signing Cert with AUTHO
22,273,611 UART: RITY.KEYID = 7
23,984,881 UART: [art] Erasing AUTHORITY.KEYID = 7
23,986,386 UART: [art] PUB.X = BA7FFB9EDDBA7B1CDB9169C09B2CE0D808388D408DAE12A1BE24808CA917AAD2C0EDED063AEEE69FD9F2D62066EC51D8
23,993,689 UART: [art] PUB.Y = 709967CF9488F88F519A96D81A859B6196587052277AC8D2ACE13F923B55497F1EA64CD06A62B7154338328672B645CD
24,000,955 UART: [art] SIG.R = E726E0A3F06DCBE25AABDBAE760D69DD27E6E329DA2E3C9BB70A4A770D564FB368517C4F146FF3417DED95840891BD80
24,008,354 UART: [art] SIG.S = 921F8C222C3350D76F524E08C2C3825661A4A2DD9685AB8E9EFA4B3055962E8D036726CC528A86A5D302FD6C7E9FC028
24,986,929 UART: mbox::rt_entry...
24,987,896 UART: ____ _ _ _ ____ _____
24,989,828 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,991,835 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,993,690 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,995,672 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,997,533 UART: |_|
24,998,335 UART:
25,123,788 UART: [rt] Runtime listening for mailbox commands...
25,125,950 >>> mbox cmd response data (48 bytes)
25,126,516 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,128,830 >>> mbox cmd response data (48 bytes)
25,129,748 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,143,598 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
2,212,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,213,823 UART:
2,214,072 UART: Running Caliptra ROM ...
2,215,137 UART:
2,215,290 UART: [state] CFI Enabled
2,216,189 UART: [state] LifecycleState = Unprovisioned
2,217,849 UART: [state] DebugLocked = No
2,219,216 UART: [state] WD Timer not started. Device not locked for debugging
2,221,711 UART: [kat] SHA2-256
2,222,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,225,404 UART: [kat] ++
2,225,860 UART: [kat] sha1
2,226,379 UART: [kat] SHA2-256
2,227,234 UART: [kat] SHA2-384
2,227,904 UART: [kat] SHA2-512-ACC
2,228,740 UART: [kat] ECC-384
3,276,797 UART: [kat] HMAC-384Kdf
3,288,602 UART: [kat] LMS
3,818,058 UART: [kat] --
3,823,203 UART: [cold-reset] ++
3,825,730 UART: [fht] FHT @ 0x50003400
3,836,612 UART: [idev] ++
3,837,177 UART: [idev] CDI.KEYID = 6
3,838,085 UART: [idev] SUBJECT.KEYID = 7
3,839,253 UART: [idev] UDS.KEYID = 0
3,854,260 UART: [idev] Erasing UDS.KEYID = 0
6,310,686 UART: [idev] Sha1 KeyId Algorithm
6,333,060 UART: [idev] --
6,336,575 UART: [ldev] ++
6,337,146 UART: [ldev] CDI.KEYID = 6
6,338,057 UART: [ldev] SUBJECT.KEYID = 5
6,339,274 UART: [ldev] AUTHORITY.KEYID = 7
6,340,507 UART: [ldev] FE.KEYID = 1
6,351,968 UART: [ldev] Erasing FE.KEYID = 1
8,826,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,535 UART: [ldev] --
10,616,798 UART: [fwproc] Wait for Commands...
10,619,826 UART: [fwproc] Recv command 0x4d454153
10,628,359 >>> mbox cmd response data (12 bytes)
10,631,019 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
10,730,761 UART: [fwproc] Recv command 0x46574c44
10,732,925 UART: [fwproc] Recv'd Img size: 78532 bytes
13,699,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,775,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,844,785 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,038,089 >>> mbox cmd response: success
14,043,250 UART: [afmc] ++
14,043,840 UART: [afmc] CDI.KEYID = 6
14,044,754 UART: [afmc] SUBJECT.KEYID = 7
14,045,919 UART: [afmc] AUTHORITY.KEYID = 5
16,541,353 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,262,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,264,513 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,280,301 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,296,308 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,312,227 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,334,808 UART: [afmc] --
18,338,519 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,338,881 UART: [cold-reset] --
18,344,181 UART: [state] Locking Datavault
18,348,449 UART: [state] Locking PCR0, PCR1 and PCR31
18,350,140 UART: [state] Locking ICCM
18,352,581 UART: [exit] Launching FMC @ 0x40000130
18,361,023 UART:
18,361,265 UART: Running Caliptra FMC ...
18,362,366 UART:
18,362,529 UART: [state] CFI Enabled
18,370,519 UART: [fht] FMC Alias Private Key: 7
20,127,140 UART: [art] Extend RT PCRs Done
20,128,357 UART: [art] Lock RT PCRs Done
20,129,759 UART: [art] Populate DV Done
20,135,176 UART: [fht] FMC Alias Private Key: 7
20,136,768 UART: [art] Derive CDI
20,137,506 UART: [art] Store in in slot 0x4
20,180,008 UART: [art] Derive Key Pair
20,181,040 UART: [art] Store priv key in slot 0x5
22,607,718 UART: [art] Derive Key Pair - Done
22,620,714 UART: [art] Signing Cert with AUTHO
22,622,043 UART: RITY.KEYID = 7
24,327,632 UART: [art] Erasing AUTHORITY.KEYID = 7
24,329,131 UART: [art] PUB.X = 6124D6C4FC924C05AAEE619989097FE0F1842CD09F4276621FC8F9E60D0C53AAE57EACB61EA5E4B08FEE22E8119CB1AE
24,336,439 UART: [art] PUB.Y = 2F6F3176A6C78BF40E538493228FFE3C59D832CF927F88B01182376F8FB5617E9CEB74FB842D1193E32265D7C9DA8C18
24,343,729 UART: [art] SIG.R = 9DF147A6C8DBFEFF911E1BD27F78FBD815C8AA890D24E18B75C17043F6D33F6F79ABA93E85FC2A2904958012EA153C4C
24,351,121 UART: [art] SIG.S = 35868F59B0579983C2049F1349DE3157A7C1D397040173AA11FEFE4C6238F639D1EA44DC734F33D5CF6A92457C97396A
25,329,280 UART: mbox::rt_entry...
25,330,534 UART: ____ _ _ _ ____ _____
25,332,461 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,334,469 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,336,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,338,330 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,340,458 UART: |_|
25,341,314 UART:
25,466,163 UART: [rt] Runtime listening for mailbox commands...
25,468,321 >>> mbox cmd response data (48 bytes)
25,468,960 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,471,304 >>> mbox cmd response data (48 bytes)
25,472,195 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,486,290 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,875 writing to cptra_bootfsm_go
2,209,022 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,415,744 >>> mbox cmd response data (12 bytes)
10,417,751 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,818,952 >>> mbox cmd response: success
18,051,272 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,063,918 UART:
18,064,250 UART: Running Caliptra FMC ...
18,065,412 UART:
18,065,584 UART: [state] CFI Enabled
18,073,538 UART: [fht] FMC Alias Private Key: 7
19,830,435 UART: [art] Extend RT PCRs Done
19,831,654 UART: [art] Lock RT PCRs Done
19,833,195 UART: [art] Populate DV Done
19,838,392 UART: [fht] FMC Alias Private Key: 7
19,839,945 UART: [art] Derive CDI
19,840,762 UART: [art] Store in in slot 0x4
19,883,631 UART: [art] Derive Key Pair
19,884,669 UART: [art] Store priv key in slot 0x5
22,311,445 UART: [art] Derive Key Pair - Done
22,324,173 UART: [art] Signing Cert with AUTHO
22,325,475 UART: RITY.KEYID = 7
24,031,126 UART: [art] Erasing AUTHORITY.KEYID = 7
24,032,635 UART: [art] PUB.X = CA267C16F29049EA51B80AB152A6847163FFDFDED35AB65104DDA85F2FEFA3FEF5B15F6BD6A6C0AF52695C9597F68A91
24,039,886 UART: [art] PUB.Y = D48B53CF09328CDB4738D3982273696362923D25575F8FEFE7A360F5911211BDF705D27780A436F43037F822CEA0189F
24,047,139 UART: [art] SIG.R = CC1833DB4D20DE90DB799EDE2CD06663313FBFEB13A0C0F3E44583044200720128B9503E80DE8A03614980964D98818F
24,054,489 UART: [art] SIG.S = A6A51719331DC807CCF2E62A92A41575814D17A80890FA8E19BB39D78AA248FEE73045BD98AE561FCF23A5B0D4BF2060
25,033,212 UART: mbox::rt_entry...
25,034,172 UART: ____ _ _ _ ____ _____
25,036,126 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,038,144 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,040,006 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,042,001 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,043,894 UART: |_|
25,044,785 UART:
25,168,413 UART: [rt] Runtime listening for mailbox commands...
25,170,529 >>> mbox cmd response data (48 bytes)
25,171,075 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,173,398 >>> mbox cmd response data (48 bytes)
25,174,283 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,188,177 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
2,209,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,211,508 UART:
2,211,755 UART: Running Caliptra ROM ...
2,212,837 UART:
2,212,988 UART: [state] CFI Enabled
2,213,888 UART: [state] LifecycleState = Unprovisioned
2,215,615 UART: [state] DebugLocked = No
2,216,653 UART: [state] WD Timer not started. Device not locked for debugging
2,219,129 UART: [kat] SHA2-256
2,219,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,222,802 UART: [kat] ++
2,223,252 UART: [kat] sha1
2,223,768 UART: [kat] SHA2-256
2,224,425 UART: [kat] SHA2-384
2,225,105 UART: [kat] SHA2-512-ACC
2,225,910 UART: [kat] ECC-384
2,949,196 UART: [kat] HMAC-384Kdf
2,972,067 UART: [kat] LMS
3,503,850 UART: [kat] --
3,506,096 UART: [cold-reset] ++
3,507,513 UART: [fht] FHT @ 0x50003400
3,518,351 UART: [idev] ++
3,519,028 UART: [idev] CDI.KEYID = 6
3,520,006 UART: [idev] SUBJECT.KEYID = 7
3,521,183 UART: [idev] UDS.KEYID = 0
3,544,297 UART: [idev] Erasing UDS.KEYID = 0
6,028,802 UART: [idev] Sha1 KeyId Algorithm
6,051,811 UART: [idev] --
6,056,250 UART: [ldev] ++
6,056,934 UART: [ldev] CDI.KEYID = 6
6,057,845 UART: [ldev] SUBJECT.KEYID = 5
6,059,014 UART: [ldev] AUTHORITY.KEYID = 7
6,060,255 UART: [ldev] FE.KEYID = 1
6,101,135 UART: [ldev] Erasing FE.KEYID = 1
8,610,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,491 UART: [ldev] --
10,415,413 UART: [fwproc] Wait for Commands...
10,418,437 UART: [fwproc] Recv command 0x4d454153
10,428,171 >>> mbox cmd response data (12 bytes)
10,431,044 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
10,530,466 UART: [fwproc] Recv command 0x46574c44
10,532,480 UART: [fwproc] Recv'd Img size: 78532 bytes
13,540,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,619,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,735,216 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,063,483 >>> mbox cmd response: success
14,067,517 UART: [afmc] ++
14,068,225 UART: [afmc] CDI.KEYID = 6
14,069,418 UART: [afmc] SUBJECT.KEYID = 7
14,070,861 UART: [afmc] AUTHORITY.KEYID = 5
16,612,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,339,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,341,343 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,356,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,371,649 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,386,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,408,837 UART: [afmc] --
18,412,820 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,413,190 UART: [cold-reset] --
18,416,117 UART: [state] Locking Datavault
18,421,710 UART: [state] Locking PCR0, PCR1 and PCR31
18,423,857 UART: [state] Locking ICCM
18,426,101 UART: [exit] Launching FMC @ 0x40000130
18,434,784 UART:
18,435,061 UART: Running Caliptra FMC ...
18,436,098 UART:
18,436,253 UART: [state] CFI Enabled
18,496,967 UART: [fht] FMC Alias Private Key: 7
20,261,174 UART: [art] Extend RT PCRs Done
20,262,401 UART: [art] Lock RT PCRs Done
20,264,108 UART: [art] Populate DV Done
20,269,627 UART: [fht] FMC Alias Private Key: 7
20,271,148 UART: [art] Derive CDI
20,271,892 UART: [art] Store in in slot 0x4
20,330,324 UART: [art] Derive Key Pair
20,331,322 UART: [art] Store priv key in slot 0x5
22,794,073 UART: [art] Derive Key Pair - Done
22,806,754 UART: [art] Signing Cert with AUTHO
22,808,064 UART: RITY.KEYID = 7
24,520,089 UART: [art] Erasing AUTHORITY.KEYID = 7
24,521,599 UART: [art] PUB.X = C36BE00BDA121352DEAE6465955FBFF4825EA094ED9B9878FEA65BBC87DC9F1463318E8F84E5E755B8D547209A2CA2FD
24,528,916 UART: [art] PUB.Y = D71C6AB06272B16C0496D8D4976B4EF96C5C8C0CF65AF3F773F8503DE51E53E1463A5E56972356E5CE3830A89F0CCD58
24,536,163 UART: [art] SIG.R = C37B19B0515FF7DFB196ACCA8D21E0EFC5F0755EF96E3504DA6B0D0B719CD662DB1203C191D4DDFB7BAF92C8D956271C
24,543,576 UART: [art] SIG.S = 53BBEE133A0C80BE25AC2A44D81ED22A9504DE6DB5CB407DAE8E2EA8ACC628FA7191FDFCD4F8582D4105117292826707
25,522,518 UART: mbox::rt_entry...
25,523,469 UART: ____ _ _ _ ____ _____
25,525,456 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,527,465 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,529,404 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,531,331 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,533,202 UART: |_|
25,534,003 UART:
25,658,541 UART: [rt] Runtime listening for mailbox commands...
25,660,709 >>> mbox cmd response data (48 bytes)
25,661,263 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,663,586 >>> mbox cmd response data (48 bytes)
25,664,482 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,678,372 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
2,217,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,250,827 >>> mbox cmd response data (12 bytes)
10,253,499 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,080,598 >>> mbox cmd response: success
18,344,976 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,360,969 UART:
18,361,348 UART: Running Caliptra FMC ...
18,362,537 UART:
18,362,707 UART: [state] CFI Enabled
18,432,007 UART: [fht] FMC Alias Private Key: 7
20,196,520 UART: [art] Extend RT PCRs Done
20,197,734 UART: [art] Lock RT PCRs Done
20,199,258 UART: [art] Populate DV Done
20,204,392 UART: [fht] FMC Alias Private Key: 7
20,206,101 UART: [art] Derive CDI
20,206,918 UART: [art] Store in in slot 0x4
20,263,931 UART: [art] Derive Key Pair
20,264,933 UART: [art] Store priv key in slot 0x5
22,727,830 UART: [art] Derive Key Pair - Done
22,741,141 UART: [art] Signing Cert with AUTHO
22,742,462 UART: RITY.KEYID = 7
24,453,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,431 UART: [art] PUB.X = C359DB8E787B820BDB841004AFE15A93DF394AD8EE83C1ECB9E8EED734323976A09CAAF955DBC2F7DC55D2E045A60431
24,462,758 UART: [art] PUB.Y = 5828A11FA261A8DF3BA74F250892B8233973E7BE3AE9A93006CBE67B78FC6D1C351CEA5C29934893074C914D54F16B03
24,469,959 UART: [art] SIG.R = 9EAA22B822A8E5A0E593BE29B9D88214BB7D514277B9E456D56C98AEC26FA1EECA24586EE8C9238C28C1D5801E389A0C
24,477,406 UART: [art] SIG.S = 5F83E2F4C4B36DE148837C7AC6337EEDA71C9FC762439CD28C2E3082C44AA1328D26109F66A4E7AA0F212D9934B3E125
25,456,403 UART: mbox::rt_entry...
25,457,383 UART: ____ _ _ _ ____ _____
25,459,372 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,461,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,463,312 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,465,298 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,467,230 UART: |_|
25,468,043 UART:
25,591,998 UART: [rt] Runtime listening for mailbox commands...
25,594,171 >>> mbox cmd response data (48 bytes)
25,594,729 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,597,082 >>> mbox cmd response data (48 bytes)
25,597,974 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,612,087 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
2,213,281 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,214,861 UART:
2,215,114 UART: Running Caliptra ROM ...
2,216,185 UART:
2,216,343 UART: [state] CFI Enabled
2,217,240 UART: [state] LifecycleState = Unprovisioned
2,218,928 UART: [state] DebugLocked = No
2,220,062 UART: [state] WD Timer not started. Device not locked for debugging
2,222,545 UART: [kat] SHA2-256
2,223,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,226,219 UART: [kat] ++
2,226,719 UART: [kat] sha1
2,227,237 UART: [kat] SHA2-256
2,227,897 UART: [kat] SHA2-384
2,228,591 UART: [kat] SHA2-512-ACC
2,229,421 UART: [kat] ECC-384
3,291,575 UART: [kat] HMAC-384Kdf
3,305,070 UART: [kat] LMS
3,836,914 UART: [kat] --
3,842,419 UART: [cold-reset] ++
3,843,375 UART: [fht] FHT @ 0x50003400
3,855,924 UART: [idev] ++
3,856,632 UART: [idev] CDI.KEYID = 6
3,857,547 UART: [idev] SUBJECT.KEYID = 7
3,858,767 UART: [idev] UDS.KEYID = 0
3,874,801 UART: [idev] Erasing UDS.KEYID = 0
6,337,266 UART: [idev] Sha1 KeyId Algorithm
6,359,576 UART: [idev] --
6,365,077 UART: [ldev] ++
6,365,758 UART: [ldev] CDI.KEYID = 6
6,366,669 UART: [ldev] SUBJECT.KEYID = 5
6,367,832 UART: [ldev] AUTHORITY.KEYID = 7
6,369,067 UART: [ldev] FE.KEYID = 1
6,378,699 UART: [ldev] Erasing FE.KEYID = 1
8,854,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,385 UART: [ldev] --
10,643,168 UART: [fwproc] Wait for Commands...
10,645,700 UART: [fwproc] Recv command 0x4d454153
10,655,436 >>> mbox cmd response data (12 bytes)
10,658,228 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
10,757,389 UART: [fwproc] Recv command 0x46574c44
10,759,405 UART: [fwproc] Recv'd Img size: 78532 bytes
13,764,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,844,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,497 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,288,259 >>> mbox cmd response: success
14,292,239 UART: [afmc] ++
14,293,087 UART: [afmc] CDI.KEYID = 6
14,294,185 UART: [afmc] SUBJECT.KEYID = 7
14,295,629 UART: [afmc] AUTHORITY.KEYID = 5
16,798,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,521,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,523,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,538,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,553,530 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,568,573 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,592,847 UART: [afmc] --
18,596,504 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,596,864 UART: [cold-reset] --
18,600,490 UART: [state] Locking Datavault
18,605,579 UART: [state] Locking PCR0, PCR1 and PCR31
18,607,722 UART: [state] Locking ICCM
18,609,389 UART: [exit] Launching FMC @ 0x40000130
18,618,048 UART:
18,618,328 UART: Running Caliptra FMC ...
18,619,442 UART:
18,619,626 UART: [state] CFI Enabled
18,627,464 UART: [fht] FMC Alias Private Key: 7
20,384,666 UART: [art] Extend RT PCRs Done
20,385,884 UART: [art] Lock RT PCRs Done
20,387,512 UART: [art] Populate DV Done
20,393,253 UART: [fht] FMC Alias Private Key: 7
20,394,846 UART: [art] Derive CDI
20,395,659 UART: [art] Store in in slot 0x4
20,438,048 UART: [art] Derive Key Pair
20,439,051 UART: [art] Store priv key in slot 0x5
22,865,909 UART: [art] Derive Key Pair - Done
22,878,848 UART: [art] Signing Cert with AUTHO
22,880,152 UART: RITY.KEYID = 7
24,585,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,876 UART: [art] PUB.X = DF61DCE4C424632587902C1B61ACD962F75737F35CFD6A6A31C6BCFE6887909BBA182D6383456FE05E911F9AAA25E31B
24,594,182 UART: [art] PUB.Y = 6672803FC96EA11E60B2D7AD762109DFAE510DE19AC7C6FBC58BB9C060BA4DB3F7C3CDDB0168FBB530D341AB29F99F7F
24,601,430 UART: [art] SIG.R = 70DEAC076FD65CD485F6197DCB3E929AC5C5F418E608C6B6E5F7BFCDA97DFFBC532571A4CD9AAAF56065686E16986660
24,608,882 UART: [art] SIG.S = 48EF5A9157B72D07F93397CBEDABF66805E042772587A1154F0573EE68BF76397EF8A3439CC0205CC753987E89540F28
25,587,057 UART: mbox::rt_entry...
25,588,021 UART: ____ _ _ _ ____ _____
25,589,954 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,591,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,593,823 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,595,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,597,630 UART: |_|
25,598,437 UART:
25,722,469 UART: [rt] Runtime listening for mailbox commands...
25,724,631 >>> mbox cmd response data (48 bytes)
25,725,184 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,727,542 >>> mbox cmd response data (48 bytes)
25,728,424 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,742,282 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,607 writing to cptra_bootfsm_go
2,216,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,470,089 >>> mbox cmd response data (12 bytes)
10,472,715 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,289,188 >>> mbox cmd response: success
18,524,463 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,538,156 UART:
18,538,509 UART: Running Caliptra FMC ...
18,539,674 UART:
18,539,844 UART: [state] CFI Enabled
18,548,026 UART: [fht] FMC Alias Private Key: 7
20,305,746 UART: [art] Extend RT PCRs Done
20,306,968 UART: [art] Lock RT PCRs Done
20,308,163 UART: [art] Populate DV Done
20,313,522 UART: [fht] FMC Alias Private Key: 7
20,315,171 UART: [art] Derive CDI
20,315,992 UART: [art] Store in in slot 0x4
20,358,823 UART: [art] Derive Key Pair
20,359,826 UART: [art] Store priv key in slot 0x5
22,786,316 UART: [art] Derive Key Pair - Done
22,799,586 UART: [art] Signing Cert with AUTHO
22,800,896 UART: RITY.KEYID = 7
24,506,187 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,688 UART: [art] PUB.X = 905C8443EABAED0EC61F98577D4A9CB823DCBB5ADEE941C9178C247AF986163F1227AA3EB87937CD89B4F52CDBDFF9CA
24,514,990 UART: [art] PUB.Y = 83ED96DDE78AF91F95F2857F1ED1F59FF44166840F508F74548B56B3392E6B874B1F07317D84A0248FD29574DB0AB039
24,522,238 UART: [art] SIG.R = A9AC4559FD7CF85D99D860BD33C5A670177E0406667CB40AC72B2290507A01C1FB43AD40C61AE35B3A6BB84F9F6AD531
24,529,634 UART: [art] SIG.S = 5C216920881A9D281C726846972D67E8FFF966862FA4FBFC01C3418D0D55B2E7633A2C9252E76936F9AE19BE816C4904
25,507,785 UART: mbox::rt_entry...
25,508,756 UART: ____ _ _ _ ____ _____
25,510,744 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,512,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,514,632 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,516,563 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,518,517 UART: |_|
25,519,334 UART:
25,644,389 UART: [rt] Runtime listening for mailbox commands...
25,646,500 >>> mbox cmd response data (48 bytes)
25,647,035 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,649,361 >>> mbox cmd response data (48 bytes)
25,650,233 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,664,091 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,741 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,311 UART: [kat] SHA2-256
882,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,357 UART: [kat] ++
886,509 UART: [kat] sha1
890,659 UART: [kat] SHA2-256
892,597 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
903,128 UART: [kat] HMAC-384Kdf
907,744 UART: [kat] LMS
1,475,940 UART: [kat] --
1,477,025 UART: [cold-reset] ++
1,477,591 UART: [fht] Storing FHT @ 0x50003400
1,480,466 UART: [idev] ++
1,480,634 UART: [idev] CDI.KEYID = 6
1,480,994 UART: [idev] SUBJECT.KEYID = 7
1,481,418 UART: [idev] UDS.KEYID = 0
1,489,550 UART: [idev] Erasing UDS.KEYID = 0
1,506,156 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,856 UART: [idev] --
1,515,911 UART: [ldev] ++
1,516,079 UART: [ldev] CDI.KEYID = 6
1,516,442 UART: [ldev] SUBJECT.KEYID = 5
1,516,868 UART: [ldev] AUTHORITY.KEYID = 7
1,517,331 UART: [ldev] FE.KEYID = 1
1,522,537 UART: [ldev] Erasing FE.KEYID = 1
1,548,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,576 UART: [ldev] --
1,587,865 UART: [fwproc] Waiting for Commands...
1,588,494 UART: [fwproc] Received command 0x4d454153
1,592,558 >>> mbox cmd response data (12 bytes)
1,592,559 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,592,675 UART: [fwproc] Received command 0x46574c44
1,593,466 UART: [fwproc] Received Image of size 78532 bytes
2,480,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,508,138 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,537,490 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,619,673 >>> mbox cmd response: success
2,620,891 UART: [afmc] ++
2,621,059 UART: [afmc] CDI.KEYID = 6
2,621,421 UART: [afmc] SUBJECT.KEYID = 7
2,621,846 UART: [afmc] AUTHORITY.KEYID = 5
2,656,765 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,673,223 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,674,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,679,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,685,616 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,691,306 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,699,313 UART: [afmc] --
2,700,209 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,700,231 UART: [cold-reset] --
2,700,833 UART: [state] Locking Datavault
2,701,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,702,586 UART: [state] Locking ICCM
2,703,030 UART: [exit] Launching FMC @ 0x40000130
2,708,359 UART:
2,708,375 UART: Running Caliptra FMC ...
2,708,783 UART:
2,708,837 UART: [state] CFI Enabled
2,719,474 UART: [fht] FMC Alias Private Key: 7
2,827,801 UART: [art] Extend RT PCRs Done
2,828,229 UART: [art] Lock RT PCRs Done
2,829,777 UART: [art] Populate DV Done
2,838,220 UART: [fht] FMC Alias Private Key: 7
2,839,184 UART: [art] Derive CDI
2,839,464 UART: [art] Store in in slot 0x4
2,925,315 UART: [art] Derive Key Pair
2,925,675 UART: [art] Store priv key in slot 0x5
2,938,625 UART: [art] Derive Key Pair - Done
2,953,751 UART: [art] Signing Cert with AUTHO
2,954,231 UART: RITY.KEYID = 7
2,969,415 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,180 UART: [art] PUB.X = 681C2824062D45B81BF3B32F0EA08369288BB84878907C64CAD9B2B9FAF610251D163312572974E3BE6145AB1AB6EB9B
2,976,944 UART: [art] PUB.Y = 53206ED300426E67BDC96187C9895668F016C2595D174FF372E86161CA0B6131E677A23C20E45A63B9800DD3DBF87A2C
2,983,862 UART: [art] SIG.R = 162E134641A34A3D87EFA8186A5A3FA19A8EDAE920C1FB2882E354BB9D4D7C0D14445CFBFA2A6D0F5688AD90CF5446D3
2,990,642 UART: [art] SIG.S = EF1E7EC12B021A70F758E5C82ED8F130942A2F6336B4DF8A319DF4E8ACF03680C3162942D3AEDE1DFF7771C8E1AFF45C
3,014,458 UART: mbox::rt_entry...
3,014,830 UART: ____ _ _ _ ____ _____
3,015,614 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,414 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,182 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,017,950 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,718 UART: |_|
3,019,030 UART:
3,138,607 UART: [rt] Runtime listening for mailbox commands...
3,139,788 >>> mbox cmd response data (48 bytes)
3,139,789 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,142,572 >>> mbox cmd response data (48 bytes)
3,142,573 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,157,710 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,443,605 >>> mbox cmd response data (12 bytes)
1,443,606 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,467,541 >>> mbox cmd response: success
2,523,178 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,529,523 UART:
2,529,539 UART: Running Caliptra FMC ...
2,529,947 UART:
2,530,001 UART: [state] CFI Enabled
2,540,614 UART: [fht] FMC Alias Private Key: 7
2,648,833 UART: [art] Extend RT PCRs Done
2,649,261 UART: [art] Lock RT PCRs Done
2,650,865 UART: [art] Populate DV Done
2,659,014 UART: [fht] FMC Alias Private Key: 7
2,660,112 UART: [art] Derive CDI
2,660,392 UART: [art] Store in in slot 0x4
2,746,157 UART: [art] Derive Key Pair
2,746,517 UART: [art] Store priv key in slot 0x5
2,758,835 UART: [art] Derive Key Pair - Done
2,773,600 UART: [art] Signing Cert with AUTHO
2,774,080 UART: RITY.KEYID = 7
2,789,292 UART: [art] Erasing AUTHORITY.KEYID = 7
2,790,057 UART: [art] PUB.X = D45C64C376D4253A212DBB8B586B8189A6197F97DAA06B13F4F5BEED8C5E21EE9291A56361F685622868F880E7F966F5
2,796,829 UART: [art] PUB.Y = DF5564A7DF1EB4993723E99B593E4D68BDC33F8FF87B8D8E06B89160A2A86718E8642018E359B8E440CD48853C454729
2,803,774 UART: [art] SIG.R = 13FBA15297E75AC880B51E7640459AB757E76574DB7DEAFBD8887A4AAF8639A8955B31992013D6F815A363D3D4410C10
2,810,541 UART: [art] SIG.S = 3EB5F1F2CC494602F0C2847ACE5DFDF011DD22036C50AF9E3125D2E2CD9DBB89B383030042DCDE9419606D0C3ADCABC8
2,834,346 UART: mbox::rt_entry...
2,834,718 UART: ____ _ _ _ ____ _____
2,835,502 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,836,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,837,070 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,838 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,606 UART: |_|
2,838,918 UART:
2,957,930 UART: [rt] Runtime listening for mailbox commands...
2,959,111 >>> mbox cmd response data (48 bytes)
2,959,112 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,961,895 >>> mbox cmd response data (48 bytes)
2,961,896 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,977,033 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,987 UART: [state] LifecycleState = Unprovisioned
86,642 UART: [state] DebugLocked = No
87,316 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,862 UART: [kat] SHA2-256
882,793 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,908 UART: [kat] ++
887,060 UART: [kat] sha1
891,264 UART: [kat] SHA2-256
893,202 UART: [kat] SHA2-384
895,889 UART: [kat] SHA2-512-ACC
897,790 UART: [kat] ECC-384
903,327 UART: [kat] HMAC-384Kdf
908,001 UART: [kat] LMS
1,476,197 UART: [kat] --
1,477,224 UART: [cold-reset] ++
1,477,552 UART: [fht] Storing FHT @ 0x50003400
1,480,385 UART: [idev] ++
1,480,553 UART: [idev] CDI.KEYID = 6
1,480,913 UART: [idev] SUBJECT.KEYID = 7
1,481,337 UART: [idev] UDS.KEYID = 0
1,489,169 UART: [idev] Erasing UDS.KEYID = 0
1,505,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,695 UART: [idev] --
1,515,764 UART: [ldev] ++
1,515,932 UART: [ldev] CDI.KEYID = 6
1,516,295 UART: [ldev] SUBJECT.KEYID = 5
1,516,721 UART: [ldev] AUTHORITY.KEYID = 7
1,517,184 UART: [ldev] FE.KEYID = 1
1,522,384 UART: [ldev] Erasing FE.KEYID = 1
1,547,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,283 UART: [ldev] --
1,586,610 UART: [fwproc] Waiting for Commands...
1,587,423 UART: [fwproc] Received command 0x4d454153
1,591,487 >>> mbox cmd response data (12 bytes)
1,591,488 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,591,576 UART: [fwproc] Received command 0x46574c44
1,592,367 UART: [fwproc] Received Image of size 78532 bytes
2,480,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,507,873 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,537,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,619,296 >>> mbox cmd response: success
2,620,380 UART: [afmc] ++
2,620,548 UART: [afmc] CDI.KEYID = 6
2,620,910 UART: [afmc] SUBJECT.KEYID = 7
2,621,335 UART: [afmc] AUTHORITY.KEYID = 5
2,656,676 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,672,920 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,673,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,679,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,685,313 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,691,003 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,698,912 UART: [afmc] --
2,699,826 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,699,848 UART: [cold-reset] --
2,700,792 UART: [state] Locking Datavault
2,702,081 UART: [state] Locking PCR0, PCR1 and PCR31
2,702,685 UART: [state] Locking ICCM
2,703,151 UART: [exit] Launching FMC @ 0x40000130
2,708,480 UART:
2,708,496 UART: Running Caliptra FMC ...
2,708,904 UART:
2,709,047 UART: [state] CFI Enabled
2,719,274 UART: [fht] FMC Alias Private Key: 7
2,827,983 UART: [art] Extend RT PCRs Done
2,828,411 UART: [art] Lock RT PCRs Done
2,830,283 UART: [art] Populate DV Done
2,838,516 UART: [fht] FMC Alias Private Key: 7
2,839,534 UART: [art] Derive CDI
2,839,814 UART: [art] Store in in slot 0x4
2,925,517 UART: [art] Derive Key Pair
2,925,877 UART: [art] Store priv key in slot 0x5
2,938,829 UART: [art] Derive Key Pair - Done
2,953,418 UART: [art] Signing Cert with AUTHO
2,953,898 UART: RITY.KEYID = 7
2,969,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,969,875 UART: [art] PUB.X = FD75209439AF3C360046CCBFF9CEEEA7A6EA6FAE5A00BF8BB54BB2CF242BCC4A96FAE58619018E5A8D62F7198E70FA41
2,976,624 UART: [art] PUB.Y = 765F4ED5330C15BA4E2A4F0A960D1D60BAAB3ECBAAEC435CD7D1B93AD16BF538AD191D5758C9DE699AAC59A14232F3B2
2,983,589 UART: [art] SIG.R = 92D1B56571A571E7A5030F8DC3FBF421C5D507CD27639DD4FA81B439EBA4D09BBD6BE03CC8ED7655371FFD5DCE52F84B
2,990,370 UART: [art] SIG.S = 1C2F9595712EBE8F57D623E26DD24D9EF89EED52D6EAE83C01950E5172E25FBD5AFF4FCA21B770AC2A222B54ACD9912B
3,014,591 UART: mbox::rt_entry...
3,014,963 UART: ____ _ _ _ ____ _____
3,015,747 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,016,547 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,017,315 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,018,083 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,018,851 UART: |_|
3,019,163 UART:
3,138,488 UART: [rt] Runtime listening for mailbox commands...
3,139,669 >>> mbox cmd response data (48 bytes)
3,139,670 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,142,453 >>> mbox cmd response data (48 bytes)
3,142,454 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,157,591 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,602 >>> mbox cmd response data (12 bytes)
1,445,603 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,468,356 >>> mbox cmd response: success
2,523,291 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,529,162 UART:
2,529,178 UART: Running Caliptra FMC ...
2,529,586 UART:
2,529,729 UART: [state] CFI Enabled
2,540,548 UART: [fht] FMC Alias Private Key: 7
2,647,687 UART: [art] Extend RT PCRs Done
2,648,115 UART: [art] Lock RT PCRs Done
2,649,773 UART: [art] Populate DV Done
2,658,142 UART: [fht] FMC Alias Private Key: 7
2,659,076 UART: [art] Derive CDI
2,659,356 UART: [art] Store in in slot 0x4
2,745,023 UART: [art] Derive Key Pair
2,745,383 UART: [art] Store priv key in slot 0x5
2,758,429 UART: [art] Derive Key Pair - Done
2,773,246 UART: [art] Signing Cert with AUTHO
2,773,726 UART: RITY.KEYID = 7
2,789,128 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,893 UART: [art] PUB.X = 6AA50D204A5BD99A5A7176AEB360730549BBAEDFC8FB82AA1678B315EF3403DA47772999F46D4C5411EE742F125EB48F
2,796,664 UART: [art] PUB.Y = 6039E1C7BA3B4722A040BC2A382331339B983C9A4A58966C1FD7D8C7EC09C072D0AAE76FD4631FCB35C817FFBFC1103B
2,803,623 UART: [art] SIG.R = A8B22F6C5A7F52C9526532D9649B085C66D68607747F9C7639664F1122E6F7CAB633565E7690AE6C3C14A5A88DE22C7A
2,810,385 UART: [art] SIG.S = FB3F763F44176E4A6CBD08211155F931D366EC898A0DC9ACCB953195544DC677D9DD5BDA5C272FB54F83278938EADA27
2,833,844 UART: mbox::rt_entry...
2,834,216 UART: ____ _ _ _ ____ _____
2,835,000 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,800 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,568 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,837,336 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,838,104 UART: |_|
2,838,416 UART:
2,956,258 UART: [rt] Runtime listening for mailbox commands...
2,957,439 >>> mbox cmd response data (48 bytes)
2,957,440 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,960,223 >>> mbox cmd response data (48 bytes)
2,960,224 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,975,361 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
893,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,853 UART: [kat] ++
898,005 UART: [kat] sha1
902,315 UART: [kat] SHA2-256
904,255 UART: [kat] SHA2-384
907,022 UART: [kat] SHA2-512-ACC
908,923 UART: [kat] ECC-384
918,462 UART: [kat] HMAC-384Kdf
923,186 UART: [kat] LMS
1,171,514 UART: [kat] --
1,172,365 UART: [cold-reset] ++
1,172,875 UART: [fht] FHT @ 0x50003400
1,175,560 UART: [idev] ++
1,175,728 UART: [idev] CDI.KEYID = 6
1,176,088 UART: [idev] SUBJECT.KEYID = 7
1,176,512 UART: [idev] UDS.KEYID = 0
1,184,340 UART: [idev] Erasing UDS.KEYID = 0
1,201,377 UART: [idev] Sha1 KeyId Algorithm
1,210,001 UART: [idev] --
1,210,935 UART: [ldev] ++
1,211,103 UART: [ldev] CDI.KEYID = 6
1,211,466 UART: [ldev] SUBJECT.KEYID = 5
1,211,892 UART: [ldev] AUTHORITY.KEYID = 7
1,212,355 UART: [ldev] FE.KEYID = 1
1,217,517 UART: [ldev] Erasing FE.KEYID = 1
1,244,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,005 UART: [ldev] --
1,283,274 UART: [fwproc] Wait for Commands...
1,283,930 UART: [fwproc] Recv command 0x4d454153
1,287,939 >>> mbox cmd response data (12 bytes)
1,287,940 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,288,091 UART: [fwproc] Recv command 0x46574c44
1,288,819 UART: [fwproc] Recv'd Img size: 78532 bytes
2,174,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,649 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,311,708 >>> mbox cmd response: success
2,312,934 UART: [afmc] ++
2,313,102 UART: [afmc] CDI.KEYID = 6
2,313,464 UART: [afmc] SUBJECT.KEYID = 7
2,313,889 UART: [afmc] AUTHORITY.KEYID = 5
2,348,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,733 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,346 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,065 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,021 UART: [afmc] --
2,391,957 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,391,979 UART: [cold-reset] --
2,392,679 UART: [state] Locking Datavault
2,393,788 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,392 UART: [state] Locking ICCM
2,394,814 UART: [exit] Launching FMC @ 0x40000130
2,400,143 UART:
2,400,159 UART: Running Caliptra FMC ...
2,400,567 UART:
2,400,621 UART: [state] CFI Enabled
2,410,702 UART: [fht] FMC Alias Private Key: 7
2,518,731 UART: [art] Extend RT PCRs Done
2,519,159 UART: [art] Lock RT PCRs Done
2,520,589 UART: [art] Populate DV Done
2,528,778 UART: [fht] FMC Alias Private Key: 7
2,529,766 UART: [art] Derive CDI
2,530,046 UART: [art] Store in in slot 0x4
2,615,787 UART: [art] Derive Key Pair
2,616,147 UART: [art] Store priv key in slot 0x5
2,629,427 UART: [art] Derive Key Pair - Done
2,644,075 UART: [art] Signing Cert with AUTHO
2,644,555 UART: RITY.KEYID = 7
2,660,157 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,922 UART: [art] PUB.X = E1AB1BBF4650DD8120E395047E899F5FC5C5B2EDBBED8BE049B08B9F1325C1FC3D659159C031C73F1FDE14C681E8EDB9
2,667,709 UART: [art] PUB.Y = 4D35D8EFFB5440716D9CDE30C71445195A2EEC65447B1ED1B5033D33FFFEDE0B83A3F5EA19FD7F84A648EF830CA641FC
2,674,670 UART: [art] SIG.R = 430602A8D170A8B7FFFED1CF6869BE6C530B0167E40F7177BA629C64AC29A511BEA9D6EE12E471F69D1E4353D838CA4F
2,681,437 UART: [art] SIG.S = 92608901099B2B7102ACDFDFC29281AC7724BF83161036248FD09146214853D4F49AC86C9CC99E651F4254A952069A2F
2,705,316 UART: mbox::rt_entry...
2,705,688 UART: ____ _ _ _ ____ _____
2,706,472 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,576 UART: |_|
2,709,888 UART:
2,828,813 UART: [rt] Runtime listening for mailbox commands...
2,829,994 >>> mbox cmd response data (48 bytes)
2,829,995 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,832,778 >>> mbox cmd response data (48 bytes)
2,832,779 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,847,916 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,681 >>> mbox cmd response data (12 bytes)
1,141,682 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,164,669 >>> mbox cmd response: success
2,221,430 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,227,113 UART:
2,227,129 UART: Running Caliptra FMC ...
2,227,537 UART:
2,227,591 UART: [state] CFI Enabled
2,238,032 UART: [fht] FMC Alias Private Key: 7
2,345,331 UART: [art] Extend RT PCRs Done
2,345,759 UART: [art] Lock RT PCRs Done
2,347,157 UART: [art] Populate DV Done
2,355,502 UART: [fht] FMC Alias Private Key: 7
2,356,598 UART: [art] Derive CDI
2,356,878 UART: [art] Store in in slot 0x4
2,442,645 UART: [art] Derive Key Pair
2,443,005 UART: [art] Store priv key in slot 0x5
2,455,777 UART: [art] Derive Key Pair - Done
2,470,233 UART: [art] Signing Cert with AUTHO
2,470,713 UART: RITY.KEYID = 7
2,485,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,450 UART: [art] PUB.X = 981D04FB798424FDC12B5160D030FF4C80FED1F07B7EE3A26AC76B08E979320B704E6CD3EDCBDA245F1C54930DE050A8
2,493,222 UART: [art] PUB.Y = 1921673066C49B1361045CBBCD9CBE08C37F1EB7B46BCB6A4585C871DB190194CDB4FB1D081BA7B61997A59578C72DE8
2,500,168 UART: [art] SIG.R = 8FF04C2D0B8CCE601918A06C08FC9AEAE03F7F501F8881BBBCD6343446D7ADF87F34B6653716A21CDCDBC58AA7F75012
2,506,950 UART: [art] SIG.S = 92260A7B108FC14B279C17AB756252E08EFE4D533A1E91B2364CFB4698710629A5ED025931995D4A28EA9246C9F96C52
2,530,278 UART: mbox::rt_entry...
2,530,650 UART: ____ _ _ _ ____ _____
2,531,434 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,234 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,002 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,770 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,538 UART: |_|
2,534,850 UART:
2,652,762 UART: [rt] Runtime listening for mailbox commands...
2,653,943 >>> mbox cmd response data (48 bytes)
2,653,944 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,656,727 >>> mbox cmd response data (48 bytes)
2,656,728 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,671,865 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
893,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,776 UART: [kat] ++
897,928 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,949 UART: [kat] SHA2-512-ACC
908,850 UART: [kat] ECC-384
918,735 UART: [kat] HMAC-384Kdf
923,369 UART: [kat] LMS
1,171,697 UART: [kat] --
1,172,928 UART: [cold-reset] ++
1,173,370 UART: [fht] FHT @ 0x50003400
1,175,871 UART: [idev] ++
1,176,039 UART: [idev] CDI.KEYID = 6
1,176,399 UART: [idev] SUBJECT.KEYID = 7
1,176,823 UART: [idev] UDS.KEYID = 0
1,184,623 UART: [idev] Erasing UDS.KEYID = 0
1,201,360 UART: [idev] Sha1 KeyId Algorithm
1,209,900 UART: [idev] --
1,210,794 UART: [ldev] ++
1,210,962 UART: [ldev] CDI.KEYID = 6
1,211,325 UART: [ldev] SUBJECT.KEYID = 5
1,211,751 UART: [ldev] AUTHORITY.KEYID = 7
1,212,214 UART: [ldev] FE.KEYID = 1
1,217,402 UART: [ldev] Erasing FE.KEYID = 1
1,243,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,718 UART: [ldev] --
1,283,013 UART: [fwproc] Wait for Commands...
1,283,741 UART: [fwproc] Recv command 0x4d454153
1,287,750 >>> mbox cmd response data (12 bytes)
1,287,751 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,288,010 UART: [fwproc] Recv command 0x46574c44
1,288,738 UART: [fwproc] Recv'd Img size: 78532 bytes
2,175,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,202,370 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,231,674 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,313,861 >>> mbox cmd response: success
2,315,033 UART: [afmc] ++
2,315,201 UART: [afmc] CDI.KEYID = 6
2,315,563 UART: [afmc] SUBJECT.KEYID = 7
2,315,988 UART: [afmc] AUTHORITY.KEYID = 5
2,350,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,368,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,374,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,380,135 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,854 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,393,682 UART: [afmc] --
2,394,654 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,394,676 UART: [cold-reset] --
2,395,546 UART: [state] Locking Datavault
2,396,739 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,343 UART: [state] Locking ICCM
2,397,945 UART: [exit] Launching FMC @ 0x40000130
2,403,274 UART:
2,403,290 UART: Running Caliptra FMC ...
2,403,698 UART:
2,403,841 UART: [state] CFI Enabled
2,414,338 UART: [fht] FMC Alias Private Key: 7
2,522,655 UART: [art] Extend RT PCRs Done
2,523,083 UART: [art] Lock RT PCRs Done
2,524,399 UART: [art] Populate DV Done
2,532,614 UART: [fht] FMC Alias Private Key: 7
2,533,588 UART: [art] Derive CDI
2,533,868 UART: [art] Store in in slot 0x4
2,619,521 UART: [art] Derive Key Pair
2,619,881 UART: [art] Store priv key in slot 0x5
2,632,593 UART: [art] Derive Key Pair - Done
2,647,552 UART: [art] Signing Cert with AUTHO
2,648,032 UART: RITY.KEYID = 7
2,662,778 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,543 UART: [art] PUB.X = 979048BCDA5787DA413C594BA939C1BA5303AA93EAF930E7CF9C07E44B1584576831A7119EEC36E06794977B7E2E4BED
2,670,313 UART: [art] PUB.Y = EE932D51866F406967FF6B86032104C07AD393F0878DC14ACD2B745826986B6C3D11AF0D176DD567D29439897031AD01
2,677,245 UART: [art] SIG.R = F67A2310AFCD4816963D5323072D85F166A860ABDEC58A1A8D36688E700D52F13D2FB5B7645F21F1EEB85FC95F609766
2,684,013 UART: [art] SIG.S = 885E91FC3DBFC4589C60DE98671776EF1F9924A6A83BE575A07511A7082545B9302925910639F65E6598310D9DEC1AF5
2,708,193 UART: mbox::rt_entry...
2,708,565 UART: ____ _ _ _ ____ _____
2,709,349 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,710,149 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,917 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,685 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,712,453 UART: |_|
2,712,765 UART:
2,831,951 UART: [rt] Runtime listening for mailbox commands...
2,833,132 >>> mbox cmd response data (48 bytes)
2,833,133 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,835,916 >>> mbox cmd response data (48 bytes)
2,835,917 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,851,054 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,232 >>> mbox cmd response data (12 bytes)
1,144,233 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,166,760 >>> mbox cmd response: success
2,221,879 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,228,254 UART:
2,228,270 UART: Running Caliptra FMC ...
2,228,678 UART:
2,228,821 UART: [state] CFI Enabled
2,239,626 UART: [fht] FMC Alias Private Key: 7
2,348,443 UART: [art] Extend RT PCRs Done
2,348,871 UART: [art] Lock RT PCRs Done
2,350,401 UART: [art] Populate DV Done
2,358,724 UART: [fht] FMC Alias Private Key: 7
2,359,660 UART: [art] Derive CDI
2,359,940 UART: [art] Store in in slot 0x4
2,445,587 UART: [art] Derive Key Pair
2,445,947 UART: [art] Store priv key in slot 0x5
2,459,191 UART: [art] Derive Key Pair - Done
2,473,608 UART: [art] Signing Cert with AUTHO
2,474,088 UART: RITY.KEYID = 7
2,489,810 UART: [art] Erasing AUTHORITY.KEYID = 7
2,490,575 UART: [art] PUB.X = D525D5F6C68C5DE1760C81105851E31DCFF3EC54C0E2CEFE529357E3B6D660E681B205431D2CED9D2E8D5997A3C3372F
2,497,349 UART: [art] PUB.Y = 1EBA23ED125C65FD5E4D1721E207C0FF86BE2D065396CB4DC6732DB50CC56868C8FDAF3CCE7FF1A44136271EBCB7064B
2,504,307 UART: [art] SIG.R = B1C44169105F3402C5A0AFDCF35DAB0330E0CF545764508929BD705B0DD7C65A13CA4ADB81273B28E3A93E37888D58BA
2,511,076 UART: [art] SIG.S = F79D4FD04D7C902CAFCB8970F45833CD907399443813F958DB02E7D3F00055C7C2427EA80404D6E8B025F265EC3F7F68
2,534,460 UART: mbox::rt_entry...
2,534,832 UART: ____ _ _ _ ____ _____
2,535,616 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,536,416 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,537,184 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,952 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,720 UART: |_|
2,539,032 UART:
2,657,868 UART: [rt] Runtime listening for mailbox commands...
2,659,049 >>> mbox cmd response data (48 bytes)
2,659,050 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,661,833 >>> mbox cmd response data (48 bytes)
2,661,834 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,676,971 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,320 UART: [kat] SHA2-256
890,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,999 UART: [kat] ++
895,151 UART: [kat] sha1
899,389 UART: [kat] SHA2-256
901,329 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,526 UART: [kat] LMS
1,168,838 UART: [kat] --
1,169,525 UART: [cold-reset] ++
1,169,871 UART: [fht] FHT @ 0x50003400
1,172,483 UART: [idev] ++
1,172,651 UART: [idev] CDI.KEYID = 6
1,173,012 UART: [idev] SUBJECT.KEYID = 7
1,173,437 UART: [idev] UDS.KEYID = 0
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,677 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,786 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,863 UART: [fwproc] Recv command 0x4d454153
1,285,890 >>> mbox cmd response data (12 bytes)
1,285,891 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,286,122 UART: [fwproc] Recv command 0x46574c44
1,286,855 UART: [fwproc] Recv'd Img size: 78532 bytes
2,174,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,989 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,298 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,312,476 >>> mbox cmd response: success
2,313,513 UART: [afmc] ++
2,313,681 UART: [afmc] CDI.KEYID = 6
2,314,044 UART: [afmc] SUBJECT.KEYID = 7
2,314,470 UART: [afmc] AUTHORITY.KEYID = 5
2,349,779 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,819 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,152 UART: [afmc] --
2,393,132 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,393,154 UART: [cold-reset] --
2,394,028 UART: [state] Locking Datavault
2,395,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,947 UART: [state] Locking ICCM
2,396,475 UART: [exit] Launching FMC @ 0x40000130
2,401,804 UART:
2,401,820 UART: Running Caliptra FMC ...
2,402,228 UART:
2,402,282 UART: [state] CFI Enabled
2,412,711 UART: [fht] FMC Alias Private Key: 7
2,520,780 UART: [art] Extend RT PCRs Done
2,521,208 UART: [art] Lock RT PCRs Done
2,522,744 UART: [art] Populate DV Done
2,530,923 UART: [fht] FMC Alias Private Key: 7
2,531,867 UART: [art] Derive CDI
2,532,147 UART: [art] Store in in slot 0x4
2,617,842 UART: [art] Derive Key Pair
2,618,202 UART: [art] Store priv key in slot 0x5
2,631,318 UART: [art] Derive Key Pair - Done
2,646,227 UART: [art] Signing Cert with AUTHO
2,646,707 UART: RITY.KEYID = 7
2,661,997 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,762 UART: [art] PUB.X = C85814BC883F317795B48D20064BA87F9E55147BFCB26DDFA5FE2FFB77F89A160982D51CCA4D549CDCC3E86D57C2C48E
2,669,542 UART: [art] PUB.Y = F97DE3BA6024FDD6FB184489795876B975DCCD25D67EDD64F4FFDCEEC12C17FFF190E5E519278D04F275476D13F16F40
2,676,503 UART: [art] SIG.R = B1F6D19C002188ED81D8A43507B26E37BD5AC3C33AAD1FBB2A2FB3DD3D04E8C5163BE316D123D21BD5DAFB7332902FF5
2,683,265 UART: [art] SIG.S = 66DFD03DCC7C3B83F995B99BA38A29C3E21410EA38DF5CC1B9FDA1B271124A24F9910D937F753D2C5041A5BC189A3D29
2,706,855 UART: mbox::rt_entry...
2,707,227 UART: ____ _ _ _ ____ _____
2,708,011 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,811 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,579 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,347 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,115 UART: |_|
2,711,427 UART:
2,830,490 UART: [rt] Runtime listening for mailbox commands...
2,831,671 >>> mbox cmd response data (48 bytes)
2,831,672 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,834,455 >>> mbox cmd response data (48 bytes)
2,834,456 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,849,593 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,728 >>> mbox cmd response data (12 bytes)
1,139,729 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,161,747 >>> mbox cmd response: success
2,217,982 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,223,929 UART:
2,223,945 UART: Running Caliptra FMC ...
2,224,353 UART:
2,224,407 UART: [state] CFI Enabled
2,235,520 UART: [fht] FMC Alias Private Key: 7
2,343,777 UART: [art] Extend RT PCRs Done
2,344,205 UART: [art] Lock RT PCRs Done
2,345,707 UART: [art] Populate DV Done
2,353,766 UART: [fht] FMC Alias Private Key: 7
2,354,822 UART: [art] Derive CDI
2,355,102 UART: [art] Store in in slot 0x4
2,440,881 UART: [art] Derive Key Pair
2,441,241 UART: [art] Store priv key in slot 0x5
2,454,637 UART: [art] Derive Key Pair - Done
2,469,310 UART: [art] Signing Cert with AUTHO
2,469,790 UART: RITY.KEYID = 7
2,484,366 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,131 UART: [art] PUB.X = A9E3FE88D086CB174DE5ABAF8415A557AA55C9025CC7FCC6951FA9C9049CA804EE398606F153E222ABEF3004460B7D51
2,491,895 UART: [art] PUB.Y = 06850D8BF92C67F5A4ED75EDDD86DCA8DFECFA34F84716B6C1DDFEAB0D978A3F75E4C364F77BA047A7CE052D58604C90
2,498,857 UART: [art] SIG.R = 34B8B97373D8C034F39FFC306D81A0C1BA838ECAE26C304292A1ED451D8F089826C30E03FBA1DCF0FAABF8FCE8AEB20E
2,505,639 UART: [art] SIG.S = E1CAF3C53A211A62641C3A83BB6F127378AF02766E99A2F5BA46E59A4228339A15BA797BDF16D34C82577E996EE51714
2,529,099 UART: mbox::rt_entry...
2,529,471 UART: ____ _ _ _ ____ _____
2,530,255 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,055 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,823 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,359 UART: |_|
2,533,671 UART:
2,652,168 UART: [rt] Runtime listening for mailbox commands...
2,653,349 >>> mbox cmd response data (48 bytes)
2,653,350 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,656,133 >>> mbox cmd response data (48 bytes)
2,656,134 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,671,271 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
891,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,765 UART: [kat] SHA2-512-ACC
906,666 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,170,004 UART: [cold-reset] ++
1,170,344 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,182,172 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,207,808 UART: [idev] --
1,208,951 UART: [ldev] ++
1,209,119 UART: [ldev] CDI.KEYID = 6
1,209,483 UART: [ldev] SUBJECT.KEYID = 5
1,209,910 UART: [ldev] AUTHORITY.KEYID = 7
1,210,373 UART: [ldev] FE.KEYID = 1
1,215,477 UART: [ldev] Erasing FE.KEYID = 1
1,241,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,137 UART: [ldev] --
1,280,595 UART: [fwproc] Wait for Commands...
1,281,186 UART: [fwproc] Recv command 0x4d454153
1,285,213 >>> mbox cmd response data (12 bytes)
1,285,214 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,285,323 UART: [fwproc] Recv command 0x46574c44
1,286,056 UART: [fwproc] Recv'd Img size: 78532 bytes
2,173,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,937 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,311,997 >>> mbox cmd response: success
2,313,162 UART: [afmc] ++
2,313,330 UART: [afmc] CDI.KEYID = 6
2,313,693 UART: [afmc] SUBJECT.KEYID = 7
2,314,119 UART: [afmc] AUTHORITY.KEYID = 5
2,349,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,758 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,641 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,360 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,119 UART: [afmc] --
2,393,017 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,393,039 UART: [cold-reset] --
2,393,847 UART: [state] Locking Datavault
2,394,684 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,288 UART: [state] Locking ICCM
2,395,862 UART: [exit] Launching FMC @ 0x40000130
2,401,191 UART:
2,401,207 UART: Running Caliptra FMC ...
2,401,615 UART:
2,401,758 UART: [state] CFI Enabled
2,412,665 UART: [fht] FMC Alias Private Key: 7
2,521,012 UART: [art] Extend RT PCRs Done
2,521,440 UART: [art] Lock RT PCRs Done
2,522,706 UART: [art] Populate DV Done
2,530,883 UART: [fht] FMC Alias Private Key: 7
2,531,875 UART: [art] Derive CDI
2,532,155 UART: [art] Store in in slot 0x4
2,618,260 UART: [art] Derive Key Pair
2,618,620 UART: [art] Store priv key in slot 0x5
2,631,824 UART: [art] Derive Key Pair - Done
2,646,386 UART: [art] Signing Cert with AUTHO
2,646,866 UART: RITY.KEYID = 7
2,662,228 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,993 UART: [art] PUB.X = 75C6398D9737DB2744BCFB5CC9F4620B208707B8AB6BFD39982EA537B7EBD97928F34D1EF56EF8E2016A2F4C50690EF5
2,669,761 UART: [art] PUB.Y = 78FBF23009C2263B666F3EBB0A15E6EE34BFF2B786A04A2EF17D89DAA10A812D57CFCEA63DF74BCF37BD74F1B1CB4D58
2,676,728 UART: [art] SIG.R = 86063C3C60F66663DB89C601BFB7746963C54ED60529D4BF0E679E766EEF4340749BD0CC9C5C829A4FB90264014F5608
2,683,475 UART: [art] SIG.S = D2314822439A5B2F37C1F657DA2981635F88ED87EA77479C6BD9EAB6D6BD5CF5BCBAB5611B0ED05A2819D9042FD89E4A
2,706,686 UART: mbox::rt_entry...
2,707,058 UART: ____ _ _ _ ____ _____
2,707,842 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,642 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,410 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,178 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,946 UART: |_|
2,711,258 UART:
2,830,030 UART: [rt] Runtime listening for mailbox commands...
2,831,211 >>> mbox cmd response data (48 bytes)
2,831,212 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,833,995 >>> mbox cmd response data (48 bytes)
2,833,996 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,849,133 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,139,671 >>> mbox cmd response data (12 bytes)
1,139,672 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,162,206 >>> mbox cmd response: success
2,217,857 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,224,210 UART:
2,224,226 UART: Running Caliptra FMC ...
2,224,634 UART:
2,224,777 UART: [state] CFI Enabled
2,235,510 UART: [fht] FMC Alias Private Key: 7
2,343,177 UART: [art] Extend RT PCRs Done
2,343,605 UART: [art] Lock RT PCRs Done
2,345,215 UART: [art] Populate DV Done
2,353,504 UART: [fht] FMC Alias Private Key: 7
2,354,538 UART: [art] Derive CDI
2,354,818 UART: [art] Store in in slot 0x4
2,440,727 UART: [art] Derive Key Pair
2,441,087 UART: [art] Store priv key in slot 0x5
2,453,965 UART: [art] Derive Key Pair - Done
2,468,648 UART: [art] Signing Cert with AUTHO
2,469,128 UART: RITY.KEYID = 7
2,484,362 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,127 UART: [art] PUB.X = 61C7D744988DEBF787A790BD39D174AC1C03FCBFA4D57063DB179C51D2119BABE55A2D593E79B35CA5AB86BBFAB8E3B4
2,491,916 UART: [art] PUB.Y = FBAF7CF2C42CD2612999CBCC9AA73BA83B78BC45BD4B8C92258A06E55B87301A5AC3DC0B409B2223F0F19AA9B9F57ADB
2,498,884 UART: [art] SIG.R = 73609276AB6A6537EBC326529F16B0B507265E4A6EED16BD988FFD06B8AF23BEA87F6C360494876F56830D591C2E1C32
2,505,644 UART: [art] SIG.S = FD373FA80B1B931438B4851AB3F90A6FECB6026BFED67860CA46D71E562583750A8E3F65C912DC997A78163F6F08DAD0
2,528,548 UART: mbox::rt_entry...
2,528,920 UART: ____ _ _ _ ____ _____
2,529,704 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,504 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,272 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,040 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,808 UART: |_|
2,533,120 UART:
2,651,461 UART: [rt] Runtime listening for mailbox commands...
2,652,642 >>> mbox cmd response data (48 bytes)
2,652,643 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,655,426 >>> mbox cmd response data (48 bytes)
2,655,427 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,670,564 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,937 UART:
192,328 UART: Running Caliptra ROM ...
193,411 UART:
193,549 UART: [state] CFI Enabled
264,194 UART: [state] LifecycleState = Unprovisioned
266,170 UART: [state] DebugLocked = No
267,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,243 UART: [kat] SHA2-256
442,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,452 UART: [kat] ++
453,891 UART: [kat] sha1
465,965 UART: [kat] SHA2-256
468,611 UART: [kat] SHA2-384
472,888 UART: [kat] SHA2-512-ACC
475,248 UART: [kat] ECC-384
2,779,776 UART: [kat] HMAC-384Kdf
2,811,286 UART: [kat] LMS
4,001,624 UART: [kat] --
4,005,769 UART: [cold-reset] ++
4,007,774 UART: [fht] Storing FHT @ 0x50003400
4,020,241 UART: [idev] ++
4,020,868 UART: [idev] CDI.KEYID = 6
4,021,748 UART: [idev] SUBJECT.KEYID = 7
4,023,055 UART: [idev] UDS.KEYID = 0
4,024,212 ready_for_fw is high
4,024,428 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,064,799 UART: [idev] Erasing UDS.KEYID = 0
7,361,533 UART: [idev] Using Sha1 for KeyId Algorithm
7,382,807 UART: [idev] --
7,386,155 UART: [ldev] ++
7,386,758 UART: [ldev] CDI.KEYID = 6
7,387,640 UART: [ldev] SUBJECT.KEYID = 5
7,388,905 UART: [ldev] AUTHORITY.KEYID = 7
7,390,152 UART: [ldev] FE.KEYID = 1
7,434,522 UART: [ldev] Erasing FE.KEYID = 1
10,766,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,082,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,096,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,111,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,126,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,146,158 UART: [ldev] --
13,151,125 UART: [fwproc] Waiting for Commands...
13,153,001 UART: [fwproc] Received command 0x46574c44
13,155,181 UART: [fwproc] Received Image of size 31852 bytes
16,200,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,276,560 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,345,463 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,375,356 >>> mbox cmd response: success
16,380,147 UART: [afmc] ++
16,380,784 UART: [afmc] CDI.KEYID = 6
16,381,685 UART: [afmc] SUBJECT.KEYID = 7
16,382,938 UART: [afmc] AUTHORITY.KEYID = 5
19,742,036 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,039,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,042,270 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,056,638 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,071,449 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,085,907 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,106,669 UART: [afmc] --
22,111,394 UART: [cold-reset] --
22,115,283 UART: [state] Locking Datavault
22,121,321 UART: [state] Locking PCR0, PCR1 and PCR31
22,123,072 UART: [state] Locking ICCM
22,124,169 UART: [exit] Launching FMC @ 0x40000130
22,132,522 UART:
22,132,781 UART: Running Caliptra FMC ...
22,133,845 UART:
22,133,987 UART: [state] CFI Enabled
22,199,704 UART: [fht] FMC Alias Private Key: 7
24,537,799 UART: [art] Extend RT PCRs Done
24,539,052 UART: [art] Lock RT PCRs Done
24,540,624 UART: [art] Populate DV Done
24,545,998 UART: [fht] FMC Alias Private Key: 7
24,547,718 UART: [art] Derive CDI
24,548,561 UART: [art] Store in in slot 0x4
24,608,192 UART: [art] Derive Key Pair
24,609,300 UART: [art] Store priv key in slot 0x5
27,902,430 UART: [art] Derive Key Pair - Done
27,915,274 UART: [art] Signing Cert with AUTHO
27,916,612 UART: RITY.KEYID = 7
30,203,320 UART: [art] Erasing AUTHORITY.KEYID = 7
30,204,901 UART: [art] PUB.X = 81C05F0BE3191449C2849651058858B61202678D6390CDF6137ED2535006A9CF1F8956269031EB0DB47A75A5724916D3
30,212,025 UART: [art] PUB.Y = E7C79FB43E8CB47E9C8ED3691BE1D965D5955B70C96D88A29428DC925688D15B9CEA8B13EA3A6C413A34A18353B3CAEF
30,219,248 UART: [art] SIG.R = AD69E76F9FB3C78751C464D7D49880F63C15CC3ED49254A802787AEFA8A8638507D1E136FE4B6C56879FF24D8A8EBFCB
30,226,640 UART: [art] SIG.S = B752A3D6AA8088F0F94C311F87A8F89A9BE6712F56FDB505A77E3213FD79218C18B191602FA4F80A78AE5D628DBAFE01
31,531,328 UART: persistent_rt::test_persistent_data_layout...[ok]
31,533,572 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,804,411 ready_for_fw is high
3,804,789 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,214,448 >>> mbox cmd response: success
21,914,078 UART:
21,914,457 UART: Running Caliptra FMC ...
21,915,581 UART:
21,915,731 UART: [state] CFI Enabled
21,983,275 UART: [fht] FMC Alias Private Key: 7
24,320,682 UART: [art] Extend RT PCRs Done
24,321,952 UART: [art] Lock RT PCRs Done
24,323,461 UART: [art] Populate DV Done
24,328,568 UART: [fht] FMC Alias Private Key: 7
24,330,232 UART: [art] Derive CDI
24,331,082 UART: [art] Store in in slot 0x4
24,391,282 UART: [art] Derive Key Pair
24,392,373 UART: [art] Store priv key in slot 0x5
27,685,335 UART: [art] Derive Key Pair - Done
27,698,408 UART: [art] Signing Cert with AUTHO
27,699,748 UART: RITY.KEYID = 7
29,986,590 UART: [art] Erasing AUTHORITY.KEYID = 7
29,988,149 UART: [art] PUB.X = 144B024F95F55481EE87870F7F62808F34DAB449AA247AEFE5698823502AD02F445EC03CFB9B419F1C534E80286EFF3B
29,995,369 UART: [art] PUB.Y = 0DBE5F051CEE909899C7788F3453C1C6AAEF10F5EEE51526FD7787C1B63D2C895E03DE8F6EE07FDDCC11802D913F1DE3
30,002,586 UART: [art] SIG.R = 6CCE98B192C33A10B5F5A970FFB5E53DFB96EB92730CD625B4713F837E83DACDACFD0427E8AC163C398594D6E86B102B
30,009,994 UART: [art] SIG.S = D51D95DB3D9003071138913BD9E716BA73BCD6A6016CDE0C721C6891B853040E06D83F4F5D5A0A7C52395895C563373E
31,314,671 UART: persistent_rt::test_persistent_data_layout...[ok]
31,316,937 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,518 UART:
192,889 UART: Running Caliptra ROM ...
194,007 UART:
603,646 UART: [state] CFI Enabled
618,746 UART: [state] LifecycleState = Unprovisioned
620,719 UART: [state] DebugLocked = No
623,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,315 UART: [kat] SHA2-256
798,112 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,637 UART: [kat] ++
809,088 UART: [kat] sha1
821,103 UART: [kat] SHA2-256
823,833 UART: [kat] SHA2-384
830,040 UART: [kat] SHA2-512-ACC
832,412 UART: [kat] ECC-384
3,117,111 UART: [kat] HMAC-384Kdf
3,129,761 UART: [kat] LMS
4,319,902 UART: [kat] --
4,323,580 UART: [cold-reset] ++
4,326,158 UART: [fht] Storing FHT @ 0x50003400
4,337,068 UART: [idev] ++
4,337,641 UART: [idev] CDI.KEYID = 6
4,338,622 UART: [idev] SUBJECT.KEYID = 7
4,339,799 UART: [idev] UDS.KEYID = 0
4,340,776 ready_for_fw is high
4,340,976 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
4,381,332 UART: [idev] Erasing UDS.KEYID = 0
7,626,933 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,117 UART: [idev] --
7,653,914 UART: [ldev] ++
7,654,513 UART: [ldev] CDI.KEYID = 6
7,655,430 UART: [ldev] SUBJECT.KEYID = 5
7,656,637 UART: [ldev] AUTHORITY.KEYID = 7
7,657,918 UART: [ldev] FE.KEYID = 1
7,668,640 UART: [ldev] Erasing FE.KEYID = 1
10,958,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,887 UART: [ldev] --
13,319,888 UART: [fwproc] Waiting for Commands...
13,322,090 UART: [fwproc] Received command 0x46574c44
13,324,275 UART: [fwproc] Received Image of size 31852 bytes
16,375,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,453,144 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,522,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
16,550,585 >>> mbox cmd response: success
16,555,442 UART: [afmc] ++
16,556,068 UART: [afmc] CDI.KEYID = 6
16,557,000 UART: [afmc] SUBJECT.KEYID = 7
16,558,269 UART: [afmc] AUTHORITY.KEYID = 5
19,877,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,170,455 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,172,682 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,187,072 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,201,946 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,216,426 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,237,542 UART: [afmc] --
22,241,391 UART: [cold-reset] --
22,244,857 UART: [state] Locking Datavault
22,250,486 UART: [state] Locking PCR0, PCR1 and PCR31
22,252,234 UART: [state] Locking ICCM
22,253,314 UART: [exit] Launching FMC @ 0x40000130
22,261,673 UART:
22,261,916 UART: Running Caliptra FMC ...
22,262,994 UART:
22,263,147 UART: [state] CFI Enabled
22,271,431 UART: [fht] FMC Alias Private Key: 7
24,602,060 UART: [art] Extend RT PCRs Done
24,603,334 UART: [art] Lock RT PCRs Done
24,605,144 UART: [art] Populate DV Done
24,610,455 UART: [fht] FMC Alias Private Key: 7
24,611,973 UART: [art] Derive CDI
24,612,737 UART: [art] Store in in slot 0x4
24,655,466 UART: [art] Derive Key Pair
24,656,533 UART: [art] Store priv key in slot 0x5
27,899,005 UART: [art] Derive Key Pair - Done
27,912,190 UART: [art] Signing Cert with AUTHO
27,913,531 UART: RITY.KEYID = 7
30,192,571 UART: [art] Erasing AUTHORITY.KEYID = 7
30,194,135 UART: [art] PUB.X = B7803E795E023B25BFEDF7948795E894269C6CC6A55831A29F3675E435B714C3E2A7E4A06A5F649C7E6D6152D7EE4142
30,201,366 UART: [art] PUB.Y = 8FDBF44756FFBCCC46900652EE2552DC9A4774CE1F196FA36B07C7CAD257CABA58ABEE0FBF55434CB77087B79CF2F544
30,208,592 UART: [art] SIG.R = 5DEFA0C61EBCEEA8E7AD855B6370AA35836CD9FA135D9183F3E32218F5B15D7FFDF8472B4A56F83213264FCE67DB199C
30,216,007 UART: [art] SIG.S = 23CA4D9588DC3394FAA4DC21CF5D3D6747A330F49261263A52A9D8D72CA154D42061F6F3EA8B4EBB3FB920C5869A6EFE
31,520,311 UART: persistent_rt::test_persistent_data_layout...[ok]
31,522,589 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
4,132,469 ready_for_fw is high
4,132,858 <<< Executing mbox cmd 0x46574c44 (31852 bytes) from SoC
16,410,406 >>> mbox cmd response: success
22,052,552 UART:
22,052,941 UART: Running Caliptra FMC ...
22,054,069 UART:
22,054,236 UART: [state] CFI Enabled
22,062,311 UART: [fht] FMC Alias Private Key: 7
24,393,352 UART: [art] Extend RT PCRs Done
24,394,623 UART: [art] Lock RT PCRs Done
24,396,337 UART: [art] Populate DV Done
24,401,655 UART: [fht] FMC Alias Private Key: 7
24,403,244 UART: [art] Derive CDI
24,404,031 UART: [art] Store in in slot 0x4
24,446,393 UART: [art] Derive Key Pair
24,447,438 UART: [art] Store priv key in slot 0x5
27,689,042 UART: [art] Derive Key Pair - Done
27,701,908 UART: [art] Signing Cert with AUTHO
27,703,262 UART: RITY.KEYID = 7
29,982,965 UART: [art] Erasing AUTHORITY.KEYID = 7
29,984,532 UART: [art] PUB.X = FE585284C8E79F50CA6D993EE08DA65DC5BBC92C327C804AFB8752B66C734E5E682D13C77C6EF1396F333F4F64751C73
29,991,741 UART: [art] PUB.Y = E4860CB5E8CD6A0BB7D87A82D1CCD63E9944FACF6920A1F7165C29AEAB2BFA7B394ACF7A4C9B869B5EBB06D3CEDD1C4B
29,999,063 UART: [art] SIG.R = DFF557A996715886C12C0F518DF6799AE210E9F8141AD3195AA876466CCABEA52E12B9DE8F38A4C4F6B7D2B7E7814A52
30,006,405 UART: [art] SIG.S = 2A9913F99ACCD3152988CFFD790DFDBADFC64D9090ACC9D49008AFCDBD182AC7BAA8F0A62A481DC1FA49E083F79E7D42
31,310,953 UART: persistent_rt::test_persistent_data_layout...[ok]
31,313,194 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,021 UART:
192,396 UART: Running Caliptra ROM ...
193,498 UART:
193,642 UART: [state] CFI Enabled
262,399 UART: [state] LifecycleState = Unprovisioned
264,294 UART: [state] DebugLocked = No
265,891 UART: [state] WD Timer not started. Device not locked for debugging
270,213 UART: [kat] SHA2-256
449,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,936 UART: [kat] ++
461,391 UART: [kat] sha1
471,693 UART: [kat] SHA2-256
474,715 UART: [kat] SHA2-384
480,917 UART: [kat] SHA2-512-ACC
483,859 UART: [kat] ECC-384
2,948,021 UART: [kat] HMAC-384Kdf
2,969,808 UART: [kat] LMS
3,499,269 UART: [kat] --
3,504,610 UART: [cold-reset] ++
3,505,829 UART: [fht] FHT @ 0x50003400
3,515,597 UART: [idev] ++
3,516,164 UART: [idev] CDI.KEYID = 6
3,517,084 UART: [idev] SUBJECT.KEYID = 7
3,518,263 UART: [idev] UDS.KEYID = 0
3,519,190 ready_for_fw is high
3,519,379 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,559,832 UART: [idev] Erasing UDS.KEYID = 0
6,022,728 UART: [idev] Sha1 KeyId Algorithm
6,044,488 UART: [idev] --
6,049,408 UART: [ldev] ++
6,049,980 UART: [ldev] CDI.KEYID = 6
6,050,896 UART: [ldev] SUBJECT.KEYID = 5
6,052,058 UART: [ldev] AUTHORITY.KEYID = 7
6,053,354 UART: [ldev] FE.KEYID = 1
6,098,841 UART: [ldev] Erasing FE.KEYID = 1
8,602,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,501 UART: [ldev] --
10,409,742 UART: [fwproc] Wait for Commands...
10,412,741 UART: [fwproc] Recv command 0x46574c44
10,414,790 UART: [fwproc] Recv'd Img size: 31832 bytes
12,804,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,876,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
12,945,403 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
12,973,729 >>> mbox cmd response: success
12,978,430 UART: [afmc] ++
12,979,087 UART: [afmc] CDI.KEYID = 6
12,980,012 UART: [afmc] SUBJECT.KEYID = 7
12,981,205 UART: [afmc] AUTHORITY.KEYID = 5
15,503,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,228,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,230,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,245,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,262,034 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,277,859 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,301,926 UART: [afmc] --
17,304,975 UART: [cold-reset] --
17,309,065 UART: [state] Locking Datavault
17,315,524 UART: [state] Locking PCR0, PCR1 and PCR31
17,317,193 UART: [state] Locking ICCM
17,319,584 UART: [exit] Launching FMC @ 0x40000130
17,327,976 UART:
17,328,222 UART: Running Caliptra FMC ...
17,329,365 UART:
17,329,526 UART: [state] CFI Enabled
17,386,857 UART: [fht] FMC Alias Private Key: 7
19,150,635 UART: [art] Extend RT PCRs Done
19,151,919 UART: [art] Lock RT PCRs Done
19,153,634 UART: [art] Populate DV Done
19,159,016 UART: [fht] FMC Alias Private Key: 7
19,160,543 UART: [art] Derive CDI
19,161,347 UART: [art] Store in in slot 0x4
19,219,322 UART: [art] Derive Key Pair
19,220,414 UART: [art] Store priv key in slot 0x5
21,683,239 UART: [art] Derive Key Pair - Done
21,696,345 UART: [art] Signing Cert with AUTHO
21,697,719 UART: RITY.KEYID = 7
23,408,235 UART: [art] Erasing AUTHORITY.KEYID = 7
23,409,784 UART: [art] PUB.X = AC332712EF23C8B24BC5EB4F30764C15C69AD26917F301F8C9E2F347E742C41FC042A012DD83A2CF8387A6B740592B7C
23,417,003 UART: [art] PUB.Y = 818952179F6DBD34A352790C104345D799B8EEC5A97F454ECF8C674B0A47899C04CDE7E407DF2D634B739A8C62790B10
23,424,254 UART: [art] SIG.R = 58FD876E3BF4BF0B2BB1D5C664FCABA44F36C969DD75A76ED1D84A690322D0CBDA439274BF548D6A3B51EC22B6A37B57
23,431,665 UART: [art] SIG.S = 14F4559402F9B827C9E77BB8C5FFE38D04E45AAB100F004BFC3DC7312637744684FD726A4C6E3A76446EB668D74D7415
24,410,436 UART: persistent_rt::test_persistent_data_layout...[ok]
24,412,705 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,360,505 ready_for_fw is high
3,361,239 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,744,458 >>> mbox cmd response: success
17,028,888 UART:
17,029,296 UART: Running Caliptra FMC ...
17,030,437 UART:
17,030,623 UART: [state] CFI Enabled
17,093,501 UART: [fht] FMC Alias Private Key: 7
18,856,953 UART: [art] Extend RT PCRs Done
18,858,224 UART: [art] Lock RT PCRs Done
18,859,804 UART: [art] Populate DV Done
18,865,051 UART: [fht] FMC Alias Private Key: 7
18,866,652 UART: [art] Derive CDI
18,867,502 UART: [art] Store in in slot 0x4
18,926,046 UART: [art] Derive Key Pair
18,927,132 UART: [art] Store priv key in slot 0x5
21,390,316 UART: [art] Derive Key Pair - Done
21,403,442 UART: [art] Signing Cert with AUTHO
21,404,786 UART: RITY.KEYID = 7
23,116,427 UART: [art] Erasing AUTHORITY.KEYID = 7
23,117,988 UART: [art] PUB.X = C49896EBD909CF23F124042DC935AD16178DB4552E109811B133E2A04F2C3F6960DE34795BFF8518B373FB0BE3D256FE
23,125,245 UART: [art] PUB.Y = FF9B1BB66D943BDC6A5F75AE552803E83D545E844B171E0AEC6F309150DE32A1EFFEEBA610EEE9A477AF9A358E7BD61B
23,132,531 UART: [art] SIG.R = 0FC28E826348E401FFCAD7406E2E05F12E9263A3F52798AB74065B77C933487B2349307E8D8842D4471EF9F1F6F97061
23,139,876 UART: [art] SIG.S = BD7EC7096BA37C1D60F80ADBEA95C2AD397E725BAF139ED41C6139DCF52BC098E826FEF713FB608C266E1A4EBAA73C5F
24,118,618 UART: persistent_rt::test_persistent_data_layout...[ok]
24,120,866 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,722 writing to cptra_bootfsm_go
192,830 UART:
193,338 UART: Running Caliptra ROM ...
194,496 UART:
604,038 UART: [state] CFI Enabled
620,258 UART: [state] LifecycleState = Unprovisioned
622,141 UART: [state] DebugLocked = No
623,417 UART: [state] WD Timer not started. Device not locked for debugging
627,833 UART: [kat] SHA2-256
806,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,528 UART: [kat] ++
819,063 UART: [kat] sha1
830,016 UART: [kat] SHA2-256
833,033 UART: [kat] SHA2-384
838,614 UART: [kat] SHA2-512-ACC
841,555 UART: [kat] ECC-384
3,282,667 UART: [kat] HMAC-384Kdf
3,296,204 UART: [kat] LMS
3,825,715 UART: [kat] --
3,831,222 UART: [cold-reset] ++
3,833,796 UART: [fht] FHT @ 0x50003400
3,843,418 UART: [idev] ++
3,843,980 UART: [idev] CDI.KEYID = 6
3,844,865 UART: [idev] SUBJECT.KEYID = 7
3,846,127 UART: [idev] UDS.KEYID = 0
3,847,055 ready_for_fw is high
3,847,266 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,887,669 UART: [idev] Erasing UDS.KEYID = 0
6,318,496 UART: [idev] Sha1 KeyId Algorithm
6,342,263 UART: [idev] --
6,345,522 UART: [ldev] ++
6,346,096 UART: [ldev] CDI.KEYID = 6
6,347,011 UART: [ldev] SUBJECT.KEYID = 5
6,348,174 UART: [ldev] AUTHORITY.KEYID = 7
6,349,405 UART: [ldev] FE.KEYID = 1
6,360,322 UART: [ldev] Erasing FE.KEYID = 1
8,834,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,467 UART: [ldev] --
10,626,731 UART: [fwproc] Wait for Commands...
10,628,447 UART: [fwproc] Recv command 0x46574c44
10,630,540 UART: [fwproc] Recv'd Img size: 31832 bytes
13,027,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,103,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,172,104 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,201,687 >>> mbox cmd response: success
13,205,193 UART: [afmc] ++
13,205,812 UART: [afmc] CDI.KEYID = 6
13,206,747 UART: [afmc] SUBJECT.KEYID = 7
13,207,903 UART: [afmc] AUTHORITY.KEYID = 5
15,711,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,431,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,433,252 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,449,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,465,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,480,947 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,503,340 UART: [afmc] --
17,507,527 UART: [cold-reset] --
17,512,002 UART: [state] Locking Datavault
17,517,698 UART: [state] Locking PCR0, PCR1 and PCR31
17,519,371 UART: [state] Locking ICCM
17,520,593 UART: [exit] Launching FMC @ 0x40000130
17,528,983 UART:
17,529,233 UART: Running Caliptra FMC ...
17,530,291 UART:
17,530,442 UART: [state] CFI Enabled
17,538,243 UART: [fht] FMC Alias Private Key: 7
19,294,806 UART: [art] Extend RT PCRs Done
19,296,064 UART: [art] Lock RT PCRs Done
19,297,558 UART: [art] Populate DV Done
19,302,953 UART: [fht] FMC Alias Private Key: 7
19,304,639 UART: [art] Derive CDI
19,305,410 UART: [art] Store in in slot 0x4
19,347,753 UART: [art] Derive Key Pair
19,348,784 UART: [art] Store priv key in slot 0x5
21,775,562 UART: [art] Derive Key Pair - Done
21,788,444 UART: [art] Signing Cert with AUTHO
21,789,818 UART: RITY.KEYID = 7
23,495,506 UART: [art] Erasing AUTHORITY.KEYID = 7
23,497,064 UART: [art] PUB.X = 51293D2B8A2B8EAE82EFBD42F0633069ED26DA73D9F1E2874533DA3D1EB563E48BB838B54C7792A6DA0AD9AE1AC89C6C
23,504,290 UART: [art] PUB.Y = A5E052F484603F53F1B5F175291DCCB3C0D4E88A4927D4C0BD8E251012A70E4C432C6C8D763880946086DEC4926EB6A0
23,511,599 UART: [art] SIG.R = 3704154B3E8302666B4AE39D23DC38E062A49AC6912A6C0E6D43D1F676B13C9C90AD2E1459DC3030243E238C024D72CC
23,519,001 UART: [art] SIG.S = BCDEC1B37F1EEF34E36D38DD60449EE9A91DF1B8FF1E8C7CCFAAF2B3E7B057555F738CDFEC9097DA4C6022685212F75C
24,497,569 UART: persistent_rt::test_persistent_data_layout...[ok]
24,499,841 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,774 writing to cptra_bootfsm_go
3,695,728 ready_for_fw is high
3,696,334 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,975,846 >>> mbox cmd response: success
17,224,923 UART:
17,225,327 UART: Running Caliptra FMC ...
17,226,521 UART:
17,226,693 UART: [state] CFI Enabled
17,234,067 UART: [fht] FMC Alias Private Key: 7
18,991,145 UART: [art] Extend RT PCRs Done
18,992,418 UART: [art] Lock RT PCRs Done
18,993,834 UART: [art] Populate DV Done
18,999,467 UART: [fht] FMC Alias Private Key: 7
19,001,099 UART: [art] Derive CDI
19,001,885 UART: [art] Store in in slot 0x4
19,044,414 UART: [art] Derive Key Pair
19,045,471 UART: [art] Store priv key in slot 0x5
21,471,955 UART: [art] Derive Key Pair - Done
21,485,255 UART: [art] Signing Cert with AUTHO
21,486,627 UART: RITY.KEYID = 7
23,192,013 UART: [art] Erasing AUTHORITY.KEYID = 7
23,193,573 UART: [art] PUB.X = 350717CF68DBEDC8845AD2EAAEA590FB40DA3FF55C5EA573AF961CE5F0FBC288FF6D9910723D76E5C2603C4C444BC8CB
23,200,788 UART: [art] PUB.Y = C2DABBF49622B1322615E0CF71E5A53D4A90A3168734677D6898065759699D7B9A2ED1A19F0A3619407B1A82F0CE2FAA
23,208,096 UART: [art] SIG.R = 6E44797BADDFD8BF66443E8867C799AD881FE5A9BEB2D71D49F42E2AD19A81411C53D0C4EFB7D04F6EC7AAA652B6648F
23,215,507 UART: [art] SIG.S = 08F9D1F4DA48044F3FDBA950248358229AD0B64FE64411AF7957DCD049ECBDCD5E25B8636E41D6683BFCE5CA56475129
24,193,588 UART: persistent_rt::test_persistent_data_layout...[ok]
24,195,854 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,065 UART:
192,437 UART: Running Caliptra ROM ...
193,636 UART:
193,789 UART: [state] CFI Enabled
262,522 UART: [state] LifecycleState = Unprovisioned
264,941 UART: [state] DebugLocked = No
267,543 UART: [state] WD Timer not started. Device not locked for debugging
272,511 UART: [kat] SHA2-256
462,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,153 UART: [kat] ++
473,702 UART: [kat] sha1
485,225 UART: [kat] SHA2-256
488,235 UART: [kat] SHA2-384
494,297 UART: [kat] SHA2-512-ACC
496,888 UART: [kat] ECC-384
2,947,852 UART: [kat] HMAC-384Kdf
2,971,752 UART: [kat] LMS
3,503,548 UART: [kat] --
3,509,970 UART: [cold-reset] ++
3,512,076 UART: [fht] FHT @ 0x50003400
3,524,223 UART: [idev] ++
3,524,933 UART: [idev] CDI.KEYID = 6
3,525,821 UART: [idev] SUBJECT.KEYID = 7
3,527,067 UART: [idev] UDS.KEYID = 0
3,527,972 ready_for_fw is high
3,528,166 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,568,433 UART: [idev] Erasing UDS.KEYID = 0
6,026,822 UART: [idev] Sha1 KeyId Algorithm
6,049,188 UART: [idev] --
6,055,245 UART: [ldev] ++
6,055,936 UART: [ldev] CDI.KEYID = 6
6,056,856 UART: [ldev] SUBJECT.KEYID = 5
6,058,020 UART: [ldev] AUTHORITY.KEYID = 7
6,059,206 UART: [ldev] FE.KEYID = 1
6,098,963 UART: [ldev] Erasing FE.KEYID = 1
8,604,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,592 UART: [ldev] --
10,413,682 UART: [fwproc] Wait for Commands...
10,416,329 UART: [fwproc] Recv command 0x46574c44
10,418,641 UART: [fwproc] Recv'd Img size: 31832 bytes
12,854,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,933,620 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,049,770 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,097,883 >>> mbox cmd response: success
13,102,298 UART: [afmc] ++
13,102,922 UART: [afmc] CDI.KEYID = 6
13,104,130 UART: [afmc] SUBJECT.KEYID = 7
13,105,631 UART: [afmc] AUTHORITY.KEYID = 5
15,632,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,359,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,361,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,376,798 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,391,951 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,406,956 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,430,288 UART: [afmc] --
17,434,664 UART: [cold-reset] --
17,439,973 UART: [state] Locking Datavault
17,444,910 UART: [state] Locking PCR0, PCR1 and PCR31
17,447,104 UART: [state] Locking ICCM
17,449,388 UART: [exit] Launching FMC @ 0x40000130
17,458,025 UART:
17,458,272 UART: Running Caliptra FMC ...
17,459,339 UART:
17,459,489 UART: [state] CFI Enabled
17,515,041 UART: [fht] FMC Alias Private Key: 7
19,279,817 UART: [art] Extend RT PCRs Done
19,281,073 UART: [art] Lock RT PCRs Done
19,282,902 UART: [art] Populate DV Done
19,288,148 UART: [fht] FMC Alias Private Key: 7
19,289,753 UART: [art] Derive CDI
19,290,606 UART: [art] Store in in slot 0x4
19,347,962 UART: [art] Derive Key Pair
19,349,045 UART: [art] Store priv key in slot 0x5
21,811,672 UART: [art] Derive Key Pair - Done
21,824,666 UART: [art] Signing Cert with AUTHO
21,826,011 UART: RITY.KEYID = 7
23,538,226 UART: [art] Erasing AUTHORITY.KEYID = 7
23,539,781 UART: [art] PUB.X = 5B99B0CD22587B304AD466B70551F54F1329B26B57EBF15D79680ADAFBEE8BAEC44900BD780B577E00B84B34E0A50D0E
23,547,040 UART: [art] PUB.Y = C2B349E8C4CBE5E58B200F30A87D13D4CD9B4C58B5DF9DF847CBB1F719C738FD7D2F3484C51EDA4BBB561825DBF80A7A
23,554,309 UART: [art] SIG.R = 182CE3596E89C1FD52771FEF26D8A1744E733FE447FC0CEB559EA9B17138D81016170B7AD8CC2C2880983236DC1AF88A
23,561,677 UART: [art] SIG.S = 03FE4FD10B601158CAA73163FA2FC413488BFE6BE5EA7F2A3148C7468A0F79D8D77A17F5CA04BD7876612B8635544188
24,540,219 UART: persistent_rt::test_persistent_data_layout...[ok]
24,542,468 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,438,937 ready_for_fw is high
3,439,507 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
12,956,000 >>> mbox cmd response: success
17,254,470 UART:
17,254,890 UART: Running Caliptra FMC ...
17,256,005 UART:
17,256,173 UART: [state] CFI Enabled
17,321,132 UART: [fht] FMC Alias Private Key: 7
19,085,386 UART: [art] Extend RT PCRs Done
19,087,140 UART: [art] Lock RT PCRs Done
19,088,206 UART: [art] Populate DV Done
19,093,635 UART: [fht] FMC Alias Private Key: 7
19,095,311 UART: [art] Derive CDI
19,096,179 UART: [art] Store in in slot 0x4
19,154,313 UART: [art] Derive Key Pair
19,155,418 UART: [art] Store priv key in slot 0x5
21,618,606 UART: [art] Derive Key Pair - Done
21,632,069 UART: [art] Signing Cert with AUTHO
21,633,433 UART: RITY.KEYID = 7
23,345,518 UART: [art] Erasing AUTHORITY.KEYID = 7
23,347,135 UART: [art] PUB.X = 28D6F3CE827028FB00280E4CC433FF1F05129D14C3E8D8A937E3FD36692CAB1E5EFF6B8268EB9C0FACB5E96EFB490ED3
23,354,318 UART: [art] PUB.Y = 033E5EA64DCF62F79A8AD9A232460FBF8C60C8F47DDB576044BCCA78EA299B2101E409517F2A777997E3A73CAF18B555
23,361,578 UART: [art] SIG.R = 41D6A465539DC0D7070D8D66B36C5BA8EC49F7D561FF663EEA97AD27E6647AC742468AB899A67AEDEBB2FC88299CF95F
23,369,024 UART: [art] SIG.S = 40FBFAD8578D7A085A736599AA4AD01BDA00CEE8B4C1B17DCE44F7E3787B81B92F1B9F4F3710EC727E9B3EAC3A67456D
24,347,469 UART: persistent_rt::test_persistent_data_layout...[ok]
24,349,725 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,809 writing to cptra_bootfsm_go
192,904 UART:
193,273 UART: Running Caliptra ROM ...
194,374 UART:
604,073 UART: [state] CFI Enabled
618,423 UART: [state] LifecycleState = Unprovisioned
620,737 UART: [state] DebugLocked = No
623,535 UART: [state] WD Timer not started. Device not locked for debugging
627,646 UART: [kat] SHA2-256
817,541 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,352 UART: [kat] ++
828,899 UART: [kat] sha1
839,564 UART: [kat] SHA2-256
842,576 UART: [kat] SHA2-384
848,443 UART: [kat] SHA2-512-ACC
851,054 UART: [kat] ECC-384
3,296,945 UART: [kat] HMAC-384Kdf
3,310,744 UART: [kat] LMS
3,842,557 UART: [kat] --
3,846,974 UART: [cold-reset] ++
3,848,552 UART: [fht] FHT @ 0x50003400
3,860,665 UART: [idev] ++
3,861,378 UART: [idev] CDI.KEYID = 6
3,862,266 UART: [idev] SUBJECT.KEYID = 7
3,863,508 UART: [idev] UDS.KEYID = 0
3,864,431 ready_for_fw is high
3,864,643 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
3,905,032 UART: [idev] Erasing UDS.KEYID = 0
6,338,823 UART: [idev] Sha1 KeyId Algorithm
6,361,129 UART: [idev] --
6,365,276 UART: [ldev] ++
6,365,983 UART: [ldev] CDI.KEYID = 6
6,366,870 UART: [ldev] SUBJECT.KEYID = 5
6,368,082 UART: [ldev] AUTHORITY.KEYID = 7
6,369,258 UART: [ldev] FE.KEYID = 1
6,380,615 UART: [ldev] Erasing FE.KEYID = 1
8,859,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,291 UART: [ldev] --
10,644,915 UART: [fwproc] Wait for Commands...
10,647,277 UART: [fwproc] Recv command 0x46574c44
10,649,531 UART: [fwproc] Recv'd Img size: 31832 bytes
13,080,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,161,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,277,449 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
13,324,729 >>> mbox cmd response: success
13,329,426 UART: [afmc] ++
13,330,047 UART: [afmc] CDI.KEYID = 6
13,331,238 UART: [afmc] SUBJECT.KEYID = 7
13,332,737 UART: [afmc] AUTHORITY.KEYID = 5
15,831,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,555,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,557,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,572,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,587,528 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,602,515 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
17,627,173 UART: [afmc] --
17,630,550 UART: [cold-reset] --
17,634,468 UART: [state] Locking Datavault
17,640,295 UART: [state] Locking PCR0, PCR1 and PCR31
17,642,493 UART: [state] Locking ICCM
17,643,886 UART: [exit] Launching FMC @ 0x40000130
17,652,585 UART:
17,652,839 UART: Running Caliptra FMC ...
17,653,984 UART:
17,654,149 UART: [state] CFI Enabled
17,662,168 UART: [fht] FMC Alias Private Key: 7
19,418,668 UART: [art] Extend RT PCRs Done
19,419,932 UART: [art] Lock RT PCRs Done
19,421,442 UART: [art] Populate DV Done
19,426,849 UART: [fht] FMC Alias Private Key: 7
19,428,512 UART: [art] Derive CDI
19,429,365 UART: [art] Store in in slot 0x4
19,471,991 UART: [art] Derive Key Pair
19,473,024 UART: [art] Store priv key in slot 0x5
21,900,125 UART: [art] Derive Key Pair - Done
21,913,249 UART: [art] Signing Cert with AUTHO
21,914,592 UART: RITY.KEYID = 7
23,619,806 UART: [art] Erasing AUTHORITY.KEYID = 7
23,621,358 UART: [art] PUB.X = 5A8E23FC22FF07CF51636B904A9CFD36660A1B70CE98F53B0B1DC257B2AFEA107ACFF5BE40EE25610111DFBA2BBEC313
23,628,604 UART: [art] PUB.Y = 22F8BA46030A41302F6316A957C31F8B2314B030B8B0192B090B8929271F031B649553F03141F8A5F5165991C3E118E6
23,635,858 UART: [art] SIG.R = C9F3EC661735F4ECD160B5CE197B760089C023491B3EAFD2A90F4F833FD2A8E2DFB66203224032B43F0C5BE16A3F7369
23,643,195 UART: [art] SIG.S = 4524314143E3857DC27AA31B39F9203B4B276DDCC74DC04748A5765B34F5C89A753E02C8212EB328A4D1AC1A0397FF3C
24,622,316 UART: persistent_rt::test_persistent_data_layout...[ok]
24,624,552 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,635 writing to cptra_bootfsm_go
3,754,269 ready_for_fw is high
3,754,811 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
13,181,569 >>> mbox cmd response: success
17,435,874 UART:
17,436,271 UART: Running Caliptra FMC ...
17,437,467 UART:
17,437,639 UART: [state] CFI Enabled
17,445,707 UART: [fht] FMC Alias Private Key: 7
19,202,508 UART: [art] Extend RT PCRs Done
19,203,778 UART: [art] Lock RT PCRs Done
19,205,502 UART: [art] Populate DV Done
19,210,892 UART: [fht] FMC Alias Private Key: 7
19,212,627 UART: [art] Derive CDI
19,213,398 UART: [art] Store in in slot 0x4
19,255,867 UART: [art] Derive Key Pair
19,256,973 UART: [art] Store priv key in slot 0x5
21,684,127 UART: [art] Derive Key Pair - Done
21,697,254 UART: [art] Signing Cert with AUTHO
21,698,590 UART: RITY.KEYID = 7
23,404,136 UART: [art] Erasing AUTHORITY.KEYID = 7
23,405,702 UART: [art] PUB.X = 16A58B9AC8A62BD926249551CF117CE3AB988793A0F48B63AB8618DD435CB3278C5AB39BA67E42045A3A9757339C1C53
23,412,918 UART: [art] PUB.Y = C50559887BBEBCA31517B22C1B4C7CA00CCE2BEF0DB38776FC2646697E19F0C4ED96890A9BA3400FEE8886B81ED79929
23,420,135 UART: [art] SIG.R = 159BE51057D42AAC152448DE33C5D976173A7DD9BD10C3CCDE0858EEB28176B7B834E747D50917ECE2479E750EB363C3
23,427,534 UART: [art] SIG.S = D52E3E8049A7C2B6814AFD4D0C6949EFA5CAC9B992DE37B71F343AEF678891818DA5583FFDC27EF2742CA095DCAAE87E
24,406,507 UART: persistent_rt::test_persistent_data_layout...[ok]
24,408,783 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,615 UART: [kat] SHA2-256
892,553 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
902,706 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,729 UART: [cold-reset] ++
1,477,069 UART: [fht] Storing FHT @ 0x50003400
1,479,982 UART: [idev] ++
1,480,150 UART: [idev] CDI.KEYID = 6
1,480,510 UART: [idev] SUBJECT.KEYID = 7
1,480,934 UART: [idev] UDS.KEYID = 0
1,481,279 ready_for_fw is high
1,481,279 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,489,142 UART: [idev] Erasing UDS.KEYID = 0
1,505,824 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,572 UART: [idev] --
1,515,689 UART: [ldev] ++
1,515,857 UART: [ldev] CDI.KEYID = 6
1,516,220 UART: [ldev] SUBJECT.KEYID = 5
1,516,646 UART: [ldev] AUTHORITY.KEYID = 7
1,517,109 UART: [ldev] FE.KEYID = 1
1,522,285 UART: [ldev] Erasing FE.KEYID = 1
1,546,912 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,300 UART: [ldev] --
1,586,601 UART: [fwproc] Waiting for Commands...
1,587,362 UART: [fwproc] Received command 0x46574c44
1,588,153 UART: [fwproc] Received Image of size 31832 bytes
1,940,410 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,967,522 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,996,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,008,947 >>> mbox cmd response: success
2,010,031 UART: [afmc] ++
2,010,199 UART: [afmc] CDI.KEYID = 6
2,010,561 UART: [afmc] SUBJECT.KEYID = 7
2,010,986 UART: [afmc] AUTHORITY.KEYID = 5
2,045,837 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,061,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,062,623 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,068,351 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,074,236 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,079,926 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,087,635 UART: [afmc] --
2,088,755 UART: [cold-reset] --
2,089,475 UART: [state] Locking Datavault
2,090,448 UART: [state] Locking PCR0, PCR1 and PCR31
2,091,052 UART: [state] Locking ICCM
2,091,586 UART: [exit] Launching FMC @ 0x40000130
2,096,915 UART:
2,096,931 UART: Running Caliptra FMC ...
2,097,339 UART:
2,097,393 UART: [state] CFI Enabled
2,108,032 UART: [fht] FMC Alias Private Key: 7
2,215,881 UART: [art] Extend RT PCRs Done
2,216,309 UART: [art] Lock RT PCRs Done
2,217,699 UART: [art] Populate DV Done
2,226,110 UART: [fht] FMC Alias Private Key: 7
2,227,270 UART: [art] Derive CDI
2,227,550 UART: [art] Store in in slot 0x4
2,312,833 UART: [art] Derive Key Pair
2,313,193 UART: [art] Store priv key in slot 0x5
2,326,811 UART: [art] Derive Key Pair - Done
2,341,421 UART: [art] Signing Cert with AUTHO
2,341,901 UART: RITY.KEYID = 7
2,356,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,357,694 UART: [art] PUB.X = BCF7B983FF8F05C4D2D4CF54F291527EFB7B6D848A6E73B522541280C45047E282F82DC9E6563E0E1DFFFAE3F040AB32
2,364,472 UART: [art] PUB.Y = 567324134DC0EE4A61640F8994C3E15917E8EB7B5CDA419E80A8B2A6E44AE093414C48D8CF32A217BBB5490B646B31D4
2,371,420 UART: [art] SIG.R = 8D72EA34A7AA0B52DC24617FFE1A21D4455576035156D769D752B31E37D48149186CD1A80F494BA124BE97D5F2271934
2,378,177 UART: [art] SIG.S = 693CEEA3126B777776140F0455A145CD8CF1D119BC90C9FD60F92C4D15294A8ACC40BE0632E1D091482614A19EA3E9C2
2,401,834 UART: persistent_rt::test_persistent_data_layout...[ok]
2,403,077 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,637 ready_for_fw is high
1,362,637 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,858,651 >>> mbox cmd response: success
1,919,143 UART:
1,919,159 UART: Running Caliptra FMC ...
1,919,567 UART:
1,919,621 UART: [state] CFI Enabled
1,930,220 UART: [fht] FMC Alias Private Key: 7
2,038,699 UART: [art] Extend RT PCRs Done
2,039,127 UART: [art] Lock RT PCRs Done
2,040,671 UART: [art] Populate DV Done
2,048,874 UART: [fht] FMC Alias Private Key: 7
2,049,864 UART: [art] Derive CDI
2,050,144 UART: [art] Store in in slot 0x4
2,135,909 UART: [art] Derive Key Pair
2,136,269 UART: [art] Store priv key in slot 0x5
2,149,281 UART: [art] Derive Key Pair - Done
2,163,991 UART: [art] Signing Cert with AUTHO
2,164,471 UART: RITY.KEYID = 7
2,179,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,118 UART: [art] PUB.X = 7461E64FB56F045EEE52728BB486656070F4B35FBF7EB395BDB099B44E5D1737BF35737A30B1BF07C293C29561B195E3
2,186,884 UART: [art] PUB.Y = CAF942C52CC605715A35F63C396B98465F079AFC3C95DB2A475C1D1831AF83019C74E5BED674A5BB26CC1ABC51B5837D
2,193,837 UART: [art] SIG.R = D131F6D1BDD225D7DDC8FF9206CEE182F9EC6667CC70DC3838EDA1F6A410843E32DB6BF836C2A82C949D55AC9F95485E
2,200,622 UART: [art] SIG.S = ED4F9C2DFE12BA42D4A4FB1F4B73190BAB10843BAB2B45BFC6CD84C1B719FA1173C1806BC8BBAC12579B72CDA4B0D3F1
2,224,817 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,060 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,729 UART: [kat] SHA2-512-ACC
897,630 UART: [kat] ECC-384
903,415 UART: [kat] HMAC-384Kdf
908,159 UART: [kat] LMS
1,476,355 UART: [kat] --
1,477,386 UART: [cold-reset] ++
1,477,938 UART: [fht] Storing FHT @ 0x50003400
1,480,931 UART: [idev] ++
1,481,099 UART: [idev] CDI.KEYID = 6
1,481,459 UART: [idev] SUBJECT.KEYID = 7
1,481,883 UART: [idev] UDS.KEYID = 0
1,482,228 ready_for_fw is high
1,482,228 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,489,851 UART: [idev] Erasing UDS.KEYID = 0
1,507,071 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,833 UART: [idev] --
1,516,852 UART: [ldev] ++
1,517,020 UART: [ldev] CDI.KEYID = 6
1,517,383 UART: [ldev] SUBJECT.KEYID = 5
1,517,809 UART: [ldev] AUTHORITY.KEYID = 7
1,518,272 UART: [ldev] FE.KEYID = 1
1,523,622 UART: [ldev] Erasing FE.KEYID = 1
1,549,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,569,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,927 UART: [ldev] --
1,589,238 UART: [fwproc] Waiting for Commands...
1,589,895 UART: [fwproc] Received command 0x46574c44
1,590,686 UART: [fwproc] Received Image of size 31832 bytes
1,941,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,968,951 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
1,998,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 7148
2,010,388 >>> mbox cmd response: success
2,011,564 UART: [afmc] ++
2,011,732 UART: [afmc] CDI.KEYID = 6
2,012,094 UART: [afmc] SUBJECT.KEYID = 7
2,012,519 UART: [afmc] AUTHORITY.KEYID = 5
2,047,282 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,063,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,064,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,069,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,075,833 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,081,523 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,089,420 UART: [afmc] --
2,090,462 UART: [cold-reset] --
2,091,212 UART: [state] Locking Datavault
2,092,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,093,025 UART: [state] Locking ICCM
2,093,503 UART: [exit] Launching FMC @ 0x40000130
2,098,832 UART:
2,098,848 UART: Running Caliptra FMC ...
2,099,256 UART:
2,099,399 UART: [state] CFI Enabled
2,109,622 UART: [fht] FMC Alias Private Key: 7
2,217,325 UART: [art] Extend RT PCRs Done
2,217,753 UART: [art] Lock RT PCRs Done
2,219,357 UART: [art] Populate DV Done
2,227,662 UART: [fht] FMC Alias Private Key: 7
2,228,630 UART: [art] Derive CDI
2,228,910 UART: [art] Store in in slot 0x4
2,314,509 UART: [art] Derive Key Pair
2,314,869 UART: [art] Store priv key in slot 0x5
2,328,497 UART: [art] Derive Key Pair - Done
2,343,228 UART: [art] Signing Cert with AUTHO
2,343,708 UART: RITY.KEYID = 7
2,358,762 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,527 UART: [art] PUB.X = 39FB83DEA80BA9A9E9DFCCA95BFE0BAE8495512DEB56B4916534C201C94CC9E0F5CB6173BE77FB1F06306031E1DD2964
2,366,303 UART: [art] PUB.Y = 04FD9AE2991FF8927A78A4F0CABDAC56CE681165BB4E5D8706CC0393F85F022C7D3A30FE4B02073D81E65A7825F0D56D
2,373,247 UART: [art] SIG.R = 11BD52A3B99EF502298EA464D8F092918E5E07CA2EC02BAA57926CAE7ABFB56FD8D8708E107483FBDD796208CDE609E1
2,380,019 UART: [art] SIG.S = 4CA68BFD50F514A65337C6D35E0ED64DFE8BDFB4777938B3EC62B35E11C952CD3278F909EDA86F5AF5F788EDBF448814
2,403,723 UART: persistent_rt::test_persistent_data_layout...[ok]
2,404,966 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,808 ready_for_fw is high
1,362,808 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,857,816 >>> mbox cmd response: success
1,918,538 UART:
1,918,554 UART: Running Caliptra FMC ...
1,918,962 UART:
1,919,105 UART: [state] CFI Enabled
1,929,972 UART: [fht] FMC Alias Private Key: 7
2,038,377 UART: [art] Extend RT PCRs Done
2,038,805 UART: [art] Lock RT PCRs Done
2,040,221 UART: [art] Populate DV Done
2,048,412 UART: [fht] FMC Alias Private Key: 7
2,049,492 UART: [art] Derive CDI
2,049,772 UART: [art] Store in in slot 0x4
2,135,471 UART: [art] Derive Key Pair
2,135,831 UART: [art] Store priv key in slot 0x5
2,149,465 UART: [art] Derive Key Pair - Done
2,164,324 UART: [art] Signing Cert with AUTHO
2,164,804 UART: RITY.KEYID = 7
2,179,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,180,717 UART: [art] PUB.X = 967B3C6883CF8503824A32F93795DD8A8A2AA9E314F8F671254F69E5ABC4CB7B8002B91B4B04AA05E37E217AD05257E1
2,187,479 UART: [art] PUB.Y = 1BDE75DC1EE3B5D1A9A2241DFE9A4806C3DB1DCFB510EDDC702354C434A255448582254993D10FF9BCE96120276B4235
2,194,431 UART: [art] SIG.R = A4DFEDF8EC7C9E900EAD79E7FBC80301D079215315904D9CEA891D256CBB5B609BF423ABAF384518F0457E07EE2FD152
2,201,205 UART: [art] SIG.S = 38A3C0D6F4FB8A06D3594FC16D72DE8A22704C5A6EF034F19F427D16EFA4C7D1D05650378A1C4C00737B7188ADFAD8B7
2,225,072 UART: persistent_rt::test_persistent_data_layout...[ok]
2,226,315 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,714 UART: [kat] SHA2-512-ACC
908,615 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,572 UART: [kat] LMS
1,170,900 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,393 UART: [fht] FHT @ 0x50003400
1,175,068 UART: [idev] ++
1,175,236 UART: [idev] CDI.KEYID = 6
1,175,596 UART: [idev] SUBJECT.KEYID = 7
1,176,020 UART: [idev] UDS.KEYID = 0
1,176,365 ready_for_fw is high
1,176,365 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,665 UART: [idev] Sha1 KeyId Algorithm
1,209,095 UART: [idev] --
1,210,143 UART: [ldev] ++
1,210,311 UART: [ldev] CDI.KEYID = 6
1,210,674 UART: [ldev] SUBJECT.KEYID = 5
1,211,100 UART: [ldev] AUTHORITY.KEYID = 7
1,211,563 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,242,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,233 UART: [ldev] --
1,281,532 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,896 UART: [fwproc] Recv'd Img size: 31832 bytes
1,634,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,661,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,117 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,146 >>> mbox cmd response: success
1,704,258 UART: [afmc] ++
1,704,426 UART: [afmc] CDI.KEYID = 6
1,704,788 UART: [afmc] SUBJECT.KEYID = 7
1,705,213 UART: [afmc] AUTHORITY.KEYID = 5
1,741,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,757,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,758,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,764,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,775,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,783,629 UART: [afmc] --
1,784,579 UART: [cold-reset] --
1,785,267 UART: [state] Locking Datavault
1,786,342 UART: [state] Locking PCR0, PCR1 and PCR31
1,786,946 UART: [state] Locking ICCM
1,787,568 UART: [exit] Launching FMC @ 0x40000130
1,792,897 UART:
1,792,913 UART: Running Caliptra FMC ...
1,793,321 UART:
1,793,375 UART: [state] CFI Enabled
1,803,984 UART: [fht] FMC Alias Private Key: 7
1,911,559 UART: [art] Extend RT PCRs Done
1,911,987 UART: [art] Lock RT PCRs Done
1,913,571 UART: [art] Populate DV Done
1,921,670 UART: [fht] FMC Alias Private Key: 7
1,922,642 UART: [art] Derive CDI
1,922,922 UART: [art] Store in in slot 0x4
2,008,539 UART: [art] Derive Key Pair
2,008,899 UART: [art] Store priv key in slot 0x5
2,022,083 UART: [art] Derive Key Pair - Done
2,036,603 UART: [art] Signing Cert with AUTHO
2,037,083 UART: RITY.KEYID = 7
2,052,465 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,230 UART: [art] PUB.X = 78770A4B731EC64E3A55551D53DF4973E4D0EDBEEACE35155F9F832B0D843903A07F5FB8DA5A872768620569438210EB
2,059,990 UART: [art] PUB.Y = 9DFB480DE9AD46112BC1075808BA40C2C0DF7253847054759063E70E07568A57F043A88BD0063DB0F722CE8393634758
2,066,914 UART: [art] SIG.R = C729966D24B68074C09D5805BFED57A5C48ACE23E60899D40264F8017F4B9E9509EC99FA5D74CAC032D928E4DB80AC40
2,073,675 UART: [art] SIG.S = D540168D8AAFAABDABACDA844E0B71B24E9918DB5BCD457B1F3D18F131B2A470CD706E546E546AC9C31B4A3BD5251502
2,097,523 UART: persistent_rt::test_persistent_data_layout...[ok]
2,098,766 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,749 ready_for_fw is high
1,059,749 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,557,131 >>> mbox cmd response: success
1,619,737 UART:
1,619,753 UART: Running Caliptra FMC ...
1,620,161 UART:
1,620,215 UART: [state] CFI Enabled
1,630,670 UART: [fht] FMC Alias Private Key: 7
1,738,635 UART: [art] Extend RT PCRs Done
1,739,063 UART: [art] Lock RT PCRs Done
1,740,823 UART: [art] Populate DV Done
1,749,192 UART: [fht] FMC Alias Private Key: 7
1,750,356 UART: [art] Derive CDI
1,750,636 UART: [art] Store in in slot 0x4
1,836,397 UART: [art] Derive Key Pair
1,836,757 UART: [art] Store priv key in slot 0x5
1,850,337 UART: [art] Derive Key Pair - Done
1,865,085 UART: [art] Signing Cert with AUTHO
1,865,565 UART: RITY.KEYID = 7
1,880,539 UART: [art] Erasing AUTHORITY.KEYID = 7
1,881,304 UART: [art] PUB.X = 254EA23230CA54B72E1EE9FB17FDC120DBFD689F1CC90E45719CCE23D06178950DFDE3BDA554CA3219C024261A9B5D13
1,888,082 UART: [art] PUB.Y = 919853B1B1420EA1586312303AB4ACF6E1996FA8579FFDB49BD598E7420D2BBB010AA7B5A03AEAB7812756E3F488A9CC
1,895,030 UART: [art] SIG.R = 5EF86E7227E87451196CA3592BC91AF14365419AE8E73BBB5A4F733B15A9B31BFE4F282FDF40AD45197A019A0B220BC3
1,901,799 UART: [art] SIG.S = DE2320D2CF382102A650736CC0C78EB7C348F0C41C1AE40260B753FF1DC1DF2C549A075813912BBB1E5D3753E7618E55
1,925,414 UART: persistent_rt::test_persistent_data_layout...[ok]
1,926,657 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,202 UART: [kat] SHA2-256
904,142 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,695 UART: [kat] HMAC-384Kdf
923,319 UART: [kat] LMS
1,171,647 UART: [kat] --
1,172,460 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,543 UART: [idev] ++
1,175,711 UART: [idev] CDI.KEYID = 6
1,176,071 UART: [idev] SUBJECT.KEYID = 7
1,176,495 UART: [idev] UDS.KEYID = 0
1,176,840 ready_for_fw is high
1,176,840 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,184,285 UART: [idev] Erasing UDS.KEYID = 0
1,201,866 UART: [idev] Sha1 KeyId Algorithm
1,210,300 UART: [idev] --
1,211,276 UART: [ldev] ++
1,211,444 UART: [ldev] CDI.KEYID = 6
1,211,807 UART: [ldev] SUBJECT.KEYID = 5
1,212,233 UART: [ldev] AUTHORITY.KEYID = 7
1,212,696 UART: [ldev] FE.KEYID = 1
1,218,112 UART: [ldev] Erasing FE.KEYID = 1
1,244,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,574 UART: [ldev] --
1,283,959 UART: [fwproc] Wait for Commands...
1,284,537 UART: [fwproc] Recv command 0x46574c44
1,285,265 UART: [fwproc] Recv'd Img size: 31832 bytes
1,638,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,666,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,695,868 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,707,837 >>> mbox cmd response: success
1,708,907 UART: [afmc] ++
1,709,075 UART: [afmc] CDI.KEYID = 6
1,709,437 UART: [afmc] SUBJECT.KEYID = 7
1,709,862 UART: [afmc] AUTHORITY.KEYID = 5
1,746,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,762,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,763,718 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,769,446 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,775,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,781,050 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,788,774 UART: [afmc] --
1,789,806 UART: [cold-reset] --
1,790,478 UART: [state] Locking Datavault
1,791,575 UART: [state] Locking PCR0, PCR1 and PCR31
1,792,179 UART: [state] Locking ICCM
1,792,793 UART: [exit] Launching FMC @ 0x40000130
1,798,122 UART:
1,798,138 UART: Running Caliptra FMC ...
1,798,546 UART:
1,798,689 UART: [state] CFI Enabled
1,809,552 UART: [fht] FMC Alias Private Key: 7
1,917,875 UART: [art] Extend RT PCRs Done
1,918,303 UART: [art] Lock RT PCRs Done
1,919,913 UART: [art] Populate DV Done
1,928,218 UART: [fht] FMC Alias Private Key: 7
1,929,336 UART: [art] Derive CDI
1,929,616 UART: [art] Store in in slot 0x4
2,015,359 UART: [art] Derive Key Pair
2,015,719 UART: [art] Store priv key in slot 0x5
2,029,235 UART: [art] Derive Key Pair - Done
2,043,904 UART: [art] Signing Cert with AUTHO
2,044,384 UART: RITY.KEYID = 7
2,059,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,060,151 UART: [art] PUB.X = 495BB187DBA36D51F9946E78B25D3619A4B9D698C10F5AF6F163430C4A44087093A8197DAF35E10A2CF611E5E0CA9541
2,066,911 UART: [art] PUB.Y = 1C18B1B2DECE92B54CE61E9710D141468CDD3AEBF3C3103C9A9B2CCD1CADAA567BDE0560BD85153F1842E6FF27EA1196
2,073,880 UART: [art] SIG.R = 865065664D64C87AD3100C6057D309392A1C8C4591C85E20DFFC4BC23B5B81E8D11363A252FCC172A2A29C30FADD4709
2,080,643 UART: [art] SIG.S = E507A171BBA11BEB9F3641C64095354C56ABEDB9F128B6445DDB781A7093307CA9F912CB415F99C28EEAAAA6ECB67061
2,104,488 UART: persistent_rt::test_persistent_data_layout...[ok]
2,105,731 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,794 ready_for_fw is high
1,060,794 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,556,772 >>> mbox cmd response: success
1,619,404 UART:
1,619,420 UART: Running Caliptra FMC ...
1,619,828 UART:
1,619,971 UART: [state] CFI Enabled
1,630,382 UART: [fht] FMC Alias Private Key: 7
1,738,227 UART: [art] Extend RT PCRs Done
1,738,655 UART: [art] Lock RT PCRs Done
1,740,281 UART: [art] Populate DV Done
1,748,462 UART: [fht] FMC Alias Private Key: 7
1,749,518 UART: [art] Derive CDI
1,749,798 UART: [art] Store in in slot 0x4
1,835,447 UART: [art] Derive Key Pair
1,835,807 UART: [art] Store priv key in slot 0x5
1,849,265 UART: [art] Derive Key Pair - Done
1,864,038 UART: [art] Signing Cert with AUTHO
1,864,518 UART: RITY.KEYID = 7
1,879,364 UART: [art] Erasing AUTHORITY.KEYID = 7
1,880,129 UART: [art] PUB.X = A942E24FC5401051161EC5174DF2DDEEF467B880853C25701F2CC40FDDA38A21B7A0124813739E129E459C085958F816
1,886,889 UART: [art] PUB.Y = 347AD6DF37A74A25FAB678E1F90ADD93F798EEAF07BDDE5624C5CB17A488FDD484135DEA74833C362F70DC42B1124420
1,893,847 UART: [art] SIG.R = 79623E7C5E3BA1BDC35BDA0BD726E1742807E308A594ADB8F1C2482BFEDA120C822CD09C01E8B44AF75354994987F332
1,900,610 UART: [art] SIG.S = F996156EDD3CD1C66039EDAD853B6025DA6E4254DCA23402BB682C6C60E2A56D32A34CD70A3E7557E0AA34FC05E9FEFC
1,924,463 UART: persistent_rt::test_persistent_data_layout...[ok]
1,925,706 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,169,837 UART: [cold-reset] ++
1,170,399 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 ready_for_fw is high
1,174,393 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,199,249 UART: [idev] Sha1 KeyId Algorithm
1,207,947 UART: [idev] --
1,209,224 UART: [ldev] ++
1,209,392 UART: [ldev] CDI.KEYID = 6
1,209,756 UART: [ldev] SUBJECT.KEYID = 5
1,210,183 UART: [ldev] AUTHORITY.KEYID = 7
1,210,646 UART: [ldev] FE.KEYID = 1
1,215,744 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,112 UART: [ldev] --
1,280,558 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 31832 bytes
1,634,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,662,573 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,691,882 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,703,842 >>> mbox cmd response: success
1,705,111 UART: [afmc] ++
1,705,279 UART: [afmc] CDI.KEYID = 6
1,705,642 UART: [afmc] SUBJECT.KEYID = 7
1,706,068 UART: [afmc] AUTHORITY.KEYID = 5
1,741,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,758,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,759,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,765,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,770,896 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,776,615 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,784,446 UART: [afmc] --
1,785,522 UART: [cold-reset] --
1,786,288 UART: [state] Locking Datavault
1,787,373 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,977 UART: [state] Locking ICCM
1,788,581 UART: [exit] Launching FMC @ 0x40000130
1,793,910 UART:
1,793,926 UART: Running Caliptra FMC ...
1,794,334 UART:
1,794,388 UART: [state] CFI Enabled
1,804,879 UART: [fht] FMC Alias Private Key: 7
1,912,754 UART: [art] Extend RT PCRs Done
1,913,182 UART: [art] Lock RT PCRs Done
1,914,610 UART: [art] Populate DV Done
1,922,527 UART: [fht] FMC Alias Private Key: 7
1,923,475 UART: [art] Derive CDI
1,923,755 UART: [art] Store in in slot 0x4
2,009,040 UART: [art] Derive Key Pair
2,009,400 UART: [art] Store priv key in slot 0x5
2,022,338 UART: [art] Derive Key Pair - Done
2,037,120 UART: [art] Signing Cert with AUTHO
2,037,600 UART: RITY.KEYID = 7
2,053,100 UART: [art] Erasing AUTHORITY.KEYID = 7
2,053,865 UART: [art] PUB.X = A5AC71735B155CB383FA0EBF62EADFA946A437E39F72033986EEFBD80150C3387B68B8458E462F3E29552A70ED0DC385
2,060,631 UART: [art] PUB.Y = 96AEBC94BD06FD7DE47A8F15A494637BD688CF85F45FF877974522F86B5893A4C66E6A37335F2326CCC8FDC6E6317959
2,067,584 UART: [art] SIG.R = 21E35012C20C8A465FDEAB397D495DAAB4BF8F7ACE6D23D72D1E6D9A58FF3C76B35A3BE74CD7819462503A68070385AC
2,074,359 UART: [art] SIG.S = BCD9CEF1E755BEA95EA4BE55E6E33806FB6B0BD7AAE1BE016C14E075780187692397A218B9F8851E1A0C0537EE2439D2
2,098,069 UART: persistent_rt::test_persistent_data_layout...[ok]
2,099,312 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,244 ready_for_fw is high
1,056,244 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,552,084 >>> mbox cmd response: success
1,613,348 UART:
1,613,364 UART: Running Caliptra FMC ...
1,613,772 UART:
1,613,826 UART: [state] CFI Enabled
1,624,781 UART: [fht] FMC Alias Private Key: 7
1,732,056 UART: [art] Extend RT PCRs Done
1,732,484 UART: [art] Lock RT PCRs Done
1,734,132 UART: [art] Populate DV Done
1,742,397 UART: [fht] FMC Alias Private Key: 7
1,743,439 UART: [art] Derive CDI
1,743,719 UART: [art] Store in in slot 0x4
1,829,826 UART: [art] Derive Key Pair
1,830,186 UART: [art] Store priv key in slot 0x5
1,843,778 UART: [art] Derive Key Pair - Done
1,858,405 UART: [art] Signing Cert with AUTHO
1,858,885 UART: RITY.KEYID = 7
1,874,211 UART: [art] Erasing AUTHORITY.KEYID = 7
1,874,976 UART: [art] PUB.X = D7239DBF9BDDA55F2E7A83CC9E4C6FC09AA19AB1235604087956322D123FB4A934A4B0C21BA2D4837F7B265B8F8640E4
1,881,750 UART: [art] PUB.Y = 1605E7F1B403E625941D5B7CBBE38AB1731C54E02956630C6A7BAA4C74F880B9D95AB4DD8738640A35EDC9462B04A95E
1,888,691 UART: [art] SIG.R = 6A2204BC4FED68F8C9BA89B3BDBC768B77A2F984824649D52B2090D9ED88D9804AEBF4C76A70CF7D6C2FACCE47EAC710
1,895,480 UART: [art] SIG.S = 2E3BACB5F4DF0EAF4EF7CFEDE8DA363AEC9AB47955B7042ABF430B3469E4CFC4EB128E36EE91FC8493AD3540999AFA41
1,919,495 UART: persistent_rt::test_persistent_data_layout...[ok]
1,920,738 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,503 UART: [kat] SHA2-512-ACC
906,404 UART: [kat] ECC-384
916,401 UART: [kat] HMAC-384Kdf
921,107 UART: [kat] LMS
1,169,419 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,818 UART: [fht] FHT @ 0x50003400
1,173,596 UART: [idev] ++
1,173,764 UART: [idev] CDI.KEYID = 6
1,174,125 UART: [idev] SUBJECT.KEYID = 7
1,174,550 UART: [idev] UDS.KEYID = 0
1,174,896 ready_for_fw is high
1,174,896 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,182,444 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,568 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,153 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,075 UART: [fwproc] Wait for Commands...
1,283,782 UART: [fwproc] Recv command 0x46574c44
1,284,515 UART: [fwproc] Recv'd Img size: 31832 bytes
1,637,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,664,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
1,694,195 UART: [fwproc] Load Runtime at address 0x40005000 len 7148
1,706,113 >>> mbox cmd response: success
1,707,228 UART: [afmc] ++
1,707,396 UART: [afmc] CDI.KEYID = 6
1,707,759 UART: [afmc] SUBJECT.KEYID = 7
1,708,185 UART: [afmc] AUTHORITY.KEYID = 5
1,744,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,760,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,761,143 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
1,766,872 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
1,772,755 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
1,778,474 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
1,786,497 UART: [afmc] --
1,787,439 UART: [cold-reset] --
1,788,295 UART: [state] Locking Datavault
1,789,462 UART: [state] Locking PCR0, PCR1 and PCR31
1,790,066 UART: [state] Locking ICCM
1,790,578 UART: [exit] Launching FMC @ 0x40000130
1,795,907 UART:
1,795,923 UART: Running Caliptra FMC ...
1,796,331 UART:
1,796,474 UART: [state] CFI Enabled
1,807,103 UART: [fht] FMC Alias Private Key: 7
1,915,094 UART: [art] Extend RT PCRs Done
1,915,522 UART: [art] Lock RT PCRs Done
1,917,166 UART: [art] Populate DV Done
1,925,141 UART: [fht] FMC Alias Private Key: 7
1,926,159 UART: [art] Derive CDI
1,926,439 UART: [art] Store in in slot 0x4
2,011,746 UART: [art] Derive Key Pair
2,012,106 UART: [art] Store priv key in slot 0x5
2,025,266 UART: [art] Derive Key Pair - Done
2,040,139 UART: [art] Signing Cert with AUTHO
2,040,619 UART: RITY.KEYID = 7
2,055,933 UART: [art] Erasing AUTHORITY.KEYID = 7
2,056,698 UART: [art] PUB.X = 92688999CE6E16DB6EE5773B2898EA72D71491DB4235A72878CC53447ECAE26F8E763D5DE2105E93BEF218D3CBC8DB54
2,063,476 UART: [art] PUB.Y = C4E9B513BF25ED766422E4440A9A0BDC168D65891269C4A14F1F0802B2230860818CDF6D3C9731CE12898D4D25E31F2E
2,070,411 UART: [art] SIG.R = D34324D0E7B4E7E5B3BB6C81EAF369D86228411FBADA6AA0B5267610C9E055237A3510BFADFC5E830978F859B4290861
2,077,181 UART: [art] SIG.S = 38300DF586DD131F7CB5FFD31F3E5858C592C97D05FB75651A93A8A18A859D3F98087E7096FAE0AA021E4ECFE5803233
2,101,461 UART: persistent_rt::test_persistent_data_layout...[ok]
2,102,704 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,993 ready_for_fw is high
1,055,993 <<< Executing mbox cmd 0x46574c44 (31832 bytes) from SoC
1,554,337 >>> mbox cmd response: success
1,617,033 UART:
1,617,049 UART: Running Caliptra FMC ...
1,617,457 UART:
1,617,600 UART: [state] CFI Enabled
1,628,115 UART: [fht] FMC Alias Private Key: 7
1,735,738 UART: [art] Extend RT PCRs Done
1,736,166 UART: [art] Lock RT PCRs Done
1,737,804 UART: [art] Populate DV Done
1,746,131 UART: [fht] FMC Alias Private Key: 7
1,747,217 UART: [art] Derive CDI
1,747,497 UART: [art] Store in in slot 0x4
1,833,362 UART: [art] Derive Key Pair
1,833,722 UART: [art] Store priv key in slot 0x5
1,847,562 UART: [art] Derive Key Pair - Done
1,862,443 UART: [art] Signing Cert with AUTHO
1,862,923 UART: RITY.KEYID = 7
1,878,457 UART: [art] Erasing AUTHORITY.KEYID = 7
1,879,222 UART: [art] PUB.X = DB6A61CDB32672E2DF2D453BCB8245C9467563DA0F7C3833314D304807725BE2EE5BA28A3176F7544F9A9D3A2CFBBE74
1,885,996 UART: [art] PUB.Y = C12A4F84F23202171E6CE24661F1997BC0A110D930F6300480316ABCB5FA9F499099B2A5BD59348286AE4F54FA259095
1,892,936 UART: [art] SIG.R = 4CECF9552318CB5EBC782AA1EF07E42200C39BC3863318F6D6C7EEE63B25388C4D9485D73CF1160EB6736EA97BF36C77
1,899,688 UART: [art] SIG.S = 0211AB3CF1DA26078AEC2E200CC2793588214E60ADE45A4D069B478599FFC2EA804B9EE2245CD7E0AA2F6A4C2CA353F3
1,923,614 UART: persistent_rt::test_persistent_data_layout...[ok]
1,924,857 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,048 UART:
192,410 UART: Running Caliptra ROM ...
193,581 UART:
193,733 UART: [state] CFI Enabled
264,725 UART: [state] LifecycleState = Unprovisioned
266,636 UART: [state] DebugLocked = No
268,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,715 UART: [kat] SHA2-256
443,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,902 UART: [kat] ++
454,384 UART: [kat] sha1
464,540 UART: [kat] SHA2-256
467,207 UART: [kat] SHA2-384
472,765 UART: [kat] SHA2-512-ACC
475,124 UART: [kat] ECC-384
2,778,472 UART: [kat] HMAC-384Kdf
2,790,358 UART: [kat] LMS
3,980,662 UART: [kat] --
3,985,812 UART: [cold-reset] ++
3,987,532 UART: [fht] Storing FHT @ 0x50003400
3,999,358 UART: [idev] ++
3,999,912 UART: [idev] CDI.KEYID = 6
4,000,884 UART: [idev] SUBJECT.KEYID = 7
4,002,122 UART: [idev] UDS.KEYID = 0
4,003,166 ready_for_fw is high
4,003,374 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,146,553 UART: [idev] Erasing UDS.KEYID = 0
7,339,721 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,715 UART: [idev] --
7,366,092 UART: [ldev] ++
7,366,660 UART: [ldev] CDI.KEYID = 6
7,367,621 UART: [ldev] SUBJECT.KEYID = 5
7,368,828 UART: [ldev] AUTHORITY.KEYID = 7
7,370,108 UART: [ldev] FE.KEYID = 1
7,413,244 UART: [ldev] Erasing FE.KEYID = 1
10,751,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,054 UART: [ldev] --
13,128,558 UART: [fwproc] Waiting for Commands...
13,130,320 UART: [fwproc] Received command 0x46574c44
13,132,491 UART: [fwproc] Received Image of size 113844 bytes
17,182,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,220 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,642,294 >>> mbox cmd response: success
17,646,564 UART: [afmc] ++
17,647,161 UART: [afmc] CDI.KEYID = 6
17,648,176 UART: [afmc] SUBJECT.KEYID = 7
17,649,351 UART: [afmc] AUTHORITY.KEYID = 5
21,023,804 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,322,822 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,129 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,339,537 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,353 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,368,797 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,389,222 UART: [afmc] --
23,392,213 UART: [cold-reset] --
23,395,825 UART: [state] Locking Datavault
23,401,179 UART: [state] Locking PCR0, PCR1 and PCR31
23,402,930 UART: [state] Locking ICCM
23,404,481 UART: [exit] Launching FMC @ 0x40000130
23,412,864 UART:
23,413,090 UART: Running Caliptra FMC ...
23,414,187 UART:
23,414,340 UART: [state] CFI Enabled
23,482,112 UART: [fht] FMC Alias Private Key: 7
25,819,037 UART: [art] Extend RT PCRs Done
25,820,257 UART: [art] Lock RT PCRs Done
25,821,694 UART: [art] Populate DV Done
25,827,154 UART: [fht] FMC Alias Private Key: 7
25,828,687 UART: [art] Derive CDI
25,829,506 UART: [art] Store in in slot 0x4
25,891,783 UART: [art] Derive Key Pair
25,892,835 UART: [art] Store priv key in slot 0x5
29,185,991 UART: [art] Derive Key Pair - Done
29,199,089 UART: [art] Signing Cert with AUTHO
29,200,389 UART: RITY.KEYID = 7
31,487,093 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,592 UART: [art] PUB.X = F013BC67152FD84ECD3A1D4D4BAA189497C7B9D4A6B03FCDF163E20DE236452168026CB9438E1BE13AE315BAD8E5F8CF
31,495,897 UART: [art] PUB.Y = 5F40166B8FD8C1A35D68DACBAE6EAB5022CBD41E14C5BBF71D9EC60AA2BF54AEC4B908C4CF286ADFAABA717D6B3FA6CD
31,503,165 UART: [art] SIG.R = E0EA60C33C9AE4AE1F8467FD70AEBD75F3A14C635E285DB5B60AE7AE72764A349206C36797E63AA4EE1854CCF4F6B18A
31,510,551 UART: [art] SIG.S = F6D2B49CDAF957A498037A800C13D0FD36F2578A74CC0A9D462A3554758D764D0A880C52C00DCB50BD5EA9916022A070
32,815,671 UART: Caliptra RT
32,816,378 UART: [state] CFI Enabled
32,977,004 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,818,474 ready_for_fw is high
3,818,947 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,898,913 >>> mbox cmd response: success
23,597,067 UART:
23,597,486 UART: Running Caliptra FMC ...
23,598,628 UART:
23,598,779 UART: [state] CFI Enabled
23,668,403 UART: [fht] FMC Alias Private Key: 7
26,006,669 UART: [art] Extend RT PCRs Done
26,007,898 UART: [art] Lock RT PCRs Done
26,009,932 UART: [art] Populate DV Done
26,015,445 UART: [fht] FMC Alias Private Key: 7
26,016,892 UART: [art] Derive CDI
26,017,627 UART: [art] Store in in slot 0x4
26,076,134 UART: [art] Derive Key Pair
26,077,170 UART: [art] Store priv key in slot 0x5
29,370,131 UART: [art] Derive Key Pair - Done
29,383,234 UART: [art] Signing Cert with AUTHO
29,384,568 UART: RITY.KEYID = 7
31,672,185 UART: [art] Erasing AUTHORITY.KEYID = 7
31,673,687 UART: [art] PUB.X = 74B136A8C0D7597659D875F50915660DB1BB50894459B0C1288A95A551B9C0020E2D5389D1FF45494C4CE881BF0FF5C0
31,680,940 UART: [art] PUB.Y = 8098914C5A4991197FD4F612A4161294BE8637009188B0E5DF1030889623EA2727315F25C92DB952AE89987278AF9E2C
31,688,136 UART: [art] SIG.R = EE7CB6454FCF5318E719761C6E09D2718715074BA5260C96EDD9A8C7F135C1D622DD1B0783CAC509378A4061AB5CD459
31,695,535 UART: [art] SIG.S = C579B56BFFE8A33E5C03F4AD1D40A1FA4FA8C2BFEB16CA0EC40C785C46CF51E95D72EC6516C559E3E4B37F547E948B7C
33,001,067 UART: Caliptra RT
33,001,787 UART: [state] CFI Enabled
33,162,958 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,498 UART:
192,875 UART: Running Caliptra ROM ...
194,005 UART:
603,664 UART: [state] CFI Enabled
618,609 UART: [state] LifecycleState = Unprovisioned
620,547 UART: [state] DebugLocked = No
623,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,569 UART: [kat] SHA2-256
797,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,912 UART: [kat] ++
808,649 UART: [kat] sha1
820,255 UART: [kat] SHA2-256
822,914 UART: [kat] SHA2-384
828,563 UART: [kat] SHA2-512-ACC
830,877 UART: [kat] ECC-384
3,114,220 UART: [kat] HMAC-384Kdf
3,126,286 UART: [kat] LMS
4,316,401 UART: [kat] --
4,320,115 UART: [cold-reset] ++
4,321,620 UART: [fht] Storing FHT @ 0x50003400
4,333,969 UART: [idev] ++
4,334,569 UART: [idev] CDI.KEYID = 6
4,335,490 UART: [idev] SUBJECT.KEYID = 7
4,336,667 UART: [idev] UDS.KEYID = 0
4,337,738 ready_for_fw is high
4,337,950 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,842 UART: [idev] Erasing UDS.KEYID = 0
7,618,921 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,665 UART: [idev] --
7,645,094 UART: [ldev] ++
7,645,695 UART: [ldev] CDI.KEYID = 6
7,646,638 UART: [ldev] SUBJECT.KEYID = 5
7,647,851 UART: [ldev] AUTHORITY.KEYID = 7
7,649,142 UART: [ldev] FE.KEYID = 1
7,659,940 UART: [ldev] Erasing FE.KEYID = 1
10,947,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,065 UART: [ldev] --
13,308,664 UART: [fwproc] Waiting for Commands...
13,311,840 UART: [fwproc] Received command 0x46574c44
13,314,030 UART: [fwproc] Received Image of size 113844 bytes
17,363,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,368 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,288 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,739 >>> mbox cmd response: success
17,831,432 UART: [afmc] ++
17,832,037 UART: [afmc] CDI.KEYID = 6
17,832,926 UART: [afmc] SUBJECT.KEYID = 7
17,834,195 UART: [afmc] AUTHORITY.KEYID = 5
21,151,358 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,649 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,959 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,316 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,132 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,561 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,182 UART: [afmc] --
23,518,854 UART: [cold-reset] --
23,522,718 UART: [state] Locking Datavault
23,528,727 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,547 UART: [state] Locking ICCM
23,532,137 UART: [exit] Launching FMC @ 0x40000130
23,540,532 UART:
23,540,764 UART: Running Caliptra FMC ...
23,541,788 UART:
23,541,935 UART: [state] CFI Enabled
23,550,092 UART: [fht] FMC Alias Private Key: 7
25,880,794 UART: [art] Extend RT PCRs Done
25,882,035 UART: [art] Lock RT PCRs Done
25,883,669 UART: [art] Populate DV Done
25,889,032 UART: [fht] FMC Alias Private Key: 7
25,890,738 UART: [art] Derive CDI
25,891,555 UART: [art] Store in in slot 0x4
25,933,943 UART: [art] Derive Key Pair
25,934,985 UART: [art] Store priv key in slot 0x5
29,176,719 UART: [art] Derive Key Pair - Done
29,189,359 UART: [art] Signing Cert with AUTHO
29,190,671 UART: RITY.KEYID = 7
31,469,935 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,447 UART: [art] PUB.X = A7FD763186055715293C9DE46C80D87F7952815090BF7849A57FC15DFA023E9C71D4148BC9C9631F3ABE02401220FCBE
31,478,672 UART: [art] PUB.Y = 21D06338FFA865A58FD73380A3D34EF4BBF5F3D78E920171AA40AA65B59F39110C079E9A12464C4FB5E4C91215605079
31,485,913 UART: [art] SIG.R = F23BE4A925AB641A50F4A3CEE0A3FADF9AE6B949094AD34AC7DE5DF482CFAA5C8E86AF97FCF7E9D6B3CC75878F166E64
31,493,312 UART: [art] SIG.S = 6E4A6F8E16B9CFDFE52C84C13F58B4146C4E638A757C9CDBF90807A538934A7DB813EDB299B5739B986792B61C52A6B2
32,798,149 UART: Caliptra RT
32,798,862 UART: [state] CFI Enabled
32,916,428 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,128,822 ready_for_fw is high
4,129,413 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,062,352 >>> mbox cmd response: success
23,706,609 UART:
23,707,008 UART: Running Caliptra FMC ...
23,708,223 UART:
23,708,400 UART: [state] CFI Enabled
23,716,290 UART: [fht] FMC Alias Private Key: 7
26,047,623 UART: [art] Extend RT PCRs Done
26,048,853 UART: [art] Lock RT PCRs Done
26,050,596 UART: [art] Populate DV Done
26,056,071 UART: [fht] FMC Alias Private Key: 7
26,057,653 UART: [art] Derive CDI
26,058,479 UART: [art] Store in in slot 0x4
26,101,080 UART: [art] Derive Key Pair
26,102,106 UART: [art] Store priv key in slot 0x5
29,343,928 UART: [art] Derive Key Pair - Done
29,357,364 UART: [art] Signing Cert with AUTHO
29,358,685 UART: RITY.KEYID = 7
31,638,298 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,803 UART: [art] PUB.X = 455C756F6853797148DA3D651A4E7DB03A138E4B1500C34FFDCB73FED8218EADFA616A66E3F66449DC46F16725713447
31,647,015 UART: [art] PUB.Y = CF66CD7FFBC1492A68ABC27E7307AE252BE7E1FA46A6756532EA29285769857D9F968AFEE04C13A658BA56B2E0BD1DB0
31,654,308 UART: [art] SIG.R = 8FF9EC70B5916572CD66720DB0CD76333BEDEDBD1C93ABFE51875F8DC2D8EBD646DBC58F989E42AF3807E97371D561C2
31,661,714 UART: [art] SIG.S = 8CF223CCD43FBE31CDD88E14F4659D577BDAC09762DACA0C0F4E582DAB035BE8D447F5CD5406095AF26A207E13AF1BFC
32,967,389 UART: Caliptra RT
32,968,097 UART: [state] CFI Enabled
33,086,107 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,105 UART:
192,461 UART: Running Caliptra ROM ...
193,649 UART:
193,803 UART: [state] CFI Enabled
262,334 UART: [state] LifecycleState = Unprovisioned
264,246 UART: [state] DebugLocked = No
266,635 UART: [state] WD Timer not started. Device not locked for debugging
270,112 UART: [kat] SHA2-256
449,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,835 UART: [kat] ++
461,288 UART: [kat] sha1
472,302 UART: [kat] SHA2-256
475,322 UART: [kat] SHA2-384
481,179 UART: [kat] SHA2-512-ACC
484,120 UART: [kat] ECC-384
2,946,966 UART: [kat] HMAC-384Kdf
2,972,493 UART: [kat] LMS
3,501,967 UART: [kat] --
3,504,187 UART: [cold-reset] ++
3,505,482 UART: [fht] FHT @ 0x50003400
3,517,456 UART: [idev] ++
3,518,019 UART: [idev] CDI.KEYID = 6
3,518,936 UART: [idev] SUBJECT.KEYID = 7
3,520,107 UART: [idev] UDS.KEYID = 0
3,521,156 ready_for_fw is high
3,521,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,906 UART: [idev] Erasing UDS.KEYID = 0
6,027,380 UART: [idev] Sha1 KeyId Algorithm
6,051,606 UART: [idev] --
6,055,505 UART: [ldev] ++
6,056,274 UART: [ldev] CDI.KEYID = 6
6,057,169 UART: [ldev] SUBJECT.KEYID = 5
6,058,226 UART: [ldev] AUTHORITY.KEYID = 7
6,059,465 UART: [ldev] FE.KEYID = 1
6,100,931 UART: [ldev] Erasing FE.KEYID = 1
8,605,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,993 UART: [ldev] --
10,413,960 UART: [fwproc] Wait for Commands...
10,416,706 UART: [fwproc] Recv command 0x46574c44
10,418,795 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,285,649 >>> mbox cmd response: success
14,289,352 UART: [afmc] ++
14,289,951 UART: [afmc] CDI.KEYID = 6
14,290,867 UART: [afmc] SUBJECT.KEYID = 7
14,292,027 UART: [afmc] AUTHORITY.KEYID = 5
16,832,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,638 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,487 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,208 UART: [afmc] --
18,633,620 UART: [cold-reset] --
18,637,718 UART: [state] Locking Datavault
18,645,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,647,048 UART: [state] Locking ICCM
18,649,557 UART: [exit] Launching FMC @ 0x40000130
18,658,008 UART:
18,658,252 UART: Running Caliptra FMC ...
18,659,353 UART:
18,659,511 UART: [state] CFI Enabled
18,717,114 UART: [fht] FMC Alias Private Key: 7
20,481,498 UART: [art] Extend RT PCRs Done
20,482,719 UART: [art] Lock RT PCRs Done
20,484,010 UART: [art] Populate DV Done
20,489,322 UART: [fht] FMC Alias Private Key: 7
20,490,865 UART: [art] Derive CDI
20,491,682 UART: [art] Store in in slot 0x4
20,549,674 UART: [art] Derive Key Pair
20,550,725 UART: [art] Store priv key in slot 0x5
23,013,907 UART: [art] Derive Key Pair - Done
23,027,227 UART: [art] Signing Cert with AUTHO
23,028,575 UART: RITY.KEYID = 7
24,739,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,741,283 UART: [art] PUB.X = 0FD799E10B21F8DB668D47BD7553D453C6A874B5B5969ECE1E9AB31F7995C5DBD30A5966E0C6948F377BEE4E0513D8F6
24,748,552 UART: [art] PUB.Y = C91CA09A8839E88ACB08C54752A347403AC98794AC3B12D8B03B0E39040565E4A2A28FDE4AEA47D02D8F28602FF22150
24,755,851 UART: [art] SIG.R = 84C11B051591AEF1B47CDD037854BF1BF9791B5EF79EE662555A1A8C6DCEB923A894FCF933C2C9D5D88684E21360E5F6
24,763,208 UART: [art] SIG.S = 77F245BED4CC057C6544EABD1E8B4131A87433B0715FA6199BDCAEE7E89420916CF0513F44586FADD8917A25DDAA5B92
25,742,320 UART: Caliptra RT
25,743,036 UART: [state] CFI Enabled
25,906,972 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,360,566 ready_for_fw is high
3,361,077 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,050,745 >>> mbox cmd response: success
18,345,713 UART:
18,346,119 UART: Running Caliptra FMC ...
18,347,310 UART:
18,347,482 UART: [state] CFI Enabled
18,409,492 UART: [fht] FMC Alias Private Key: 7
20,173,002 UART: [art] Extend RT PCRs Done
20,174,233 UART: [art] Lock RT PCRs Done
20,175,861 UART: [art] Populate DV Done
20,181,277 UART: [fht] FMC Alias Private Key: 7
20,182,983 UART: [art] Derive CDI
20,183,800 UART: [art] Store in in slot 0x4
20,241,303 UART: [art] Derive Key Pair
20,242,345 UART: [art] Store priv key in slot 0x5
22,706,003 UART: [art] Derive Key Pair - Done
22,718,895 UART: [art] Signing Cert with AUTHO
22,720,194 UART: RITY.KEYID = 7
24,432,021 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,549 UART: [art] PUB.X = 717B5F27C382D207465BB001AB9F4DC94286B8872D7575D5BE557EC8B43A7CC68768CA01402AAC32F4F88B333FC684F2
24,440,766 UART: [art] PUB.Y = 989789602B26B01D6630F0EFDE63922B9577A4B3BBB168412BB60FBB2564AFF1B5296F31678D590EB9C58B1A76FBBA74
24,448,020 UART: [art] SIG.R = 9DB4D2E3FF86EAE267E046D2C7BE3024DAFCE357E767BC312E7D5481987AD2F250E022C9EED9D06EE39645E538302C99
24,455,413 UART: [art] SIG.S = 2D3687C943D91CD946F90E48A45B03AD663E05369527FC95565EAC23A841E930CB207350274D5F81BF431EF4B22F3854
25,434,753 UART: Caliptra RT
25,435,469 UART: [state] CFI Enabled
25,600,708 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,007 writing to cptra_bootfsm_go
193,093 UART:
193,475 UART: Running Caliptra ROM ...
194,589 UART:
604,313 UART: [state] CFI Enabled
616,017 UART: [state] LifecycleState = Unprovisioned
617,887 UART: [state] DebugLocked = No
620,336 UART: [state] WD Timer not started. Device not locked for debugging
624,517 UART: [kat] SHA2-256
803,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,212 UART: [kat] ++
815,660 UART: [kat] sha1
827,668 UART: [kat] SHA2-256
830,682 UART: [kat] SHA2-384
838,022 UART: [kat] SHA2-512-ACC
840,961 UART: [kat] ECC-384
3,282,591 UART: [kat] HMAC-384Kdf
3,295,264 UART: [kat] LMS
3,824,778 UART: [kat] --
3,827,637 UART: [cold-reset] ++
3,828,854 UART: [fht] FHT @ 0x50003400
3,839,741 UART: [idev] ++
3,840,307 UART: [idev] CDI.KEYID = 6
3,841,195 UART: [idev] SUBJECT.KEYID = 7
3,842,438 UART: [idev] UDS.KEYID = 0
3,843,342 ready_for_fw is high
3,843,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,977 UART: [idev] Erasing UDS.KEYID = 0
6,314,028 UART: [idev] Sha1 KeyId Algorithm
6,335,644 UART: [idev] --
6,338,665 UART: [ldev] ++
6,339,236 UART: [ldev] CDI.KEYID = 6
6,340,146 UART: [ldev] SUBJECT.KEYID = 5
6,341,362 UART: [ldev] AUTHORITY.KEYID = 7
6,342,592 UART: [ldev] FE.KEYID = 1
6,353,452 UART: [ldev] Erasing FE.KEYID = 1
8,826,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,059 UART: [ldev] --
10,616,270 UART: [fwproc] Wait for Commands...
10,618,346 UART: [fwproc] Recv command 0x46574c44
10,620,450 UART: [fwproc] Recv'd Img size: 114168 bytes
14,021,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,481,506 >>> mbox cmd response: success
14,486,375 UART: [afmc] ++
14,486,976 UART: [afmc] CDI.KEYID = 6
14,487,867 UART: [afmc] SUBJECT.KEYID = 7
14,488,971 UART: [afmc] AUTHORITY.KEYID = 5
16,990,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,710 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,487 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,369 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,881 UART: [afmc] --
18,786,887 UART: [cold-reset] --
18,791,560 UART: [state] Locking Datavault
18,796,966 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,618 UART: [state] Locking ICCM
18,801,365 UART: [exit] Launching FMC @ 0x40000130
18,809,762 UART:
18,810,000 UART: Running Caliptra FMC ...
18,811,112 UART:
18,811,277 UART: [state] CFI Enabled
18,819,345 UART: [fht] FMC Alias Private Key: 7
20,576,090 UART: [art] Extend RT PCRs Done
20,577,312 UART: [art] Lock RT PCRs Done
20,579,315 UART: [art] Populate DV Done
20,584,790 UART: [fht] FMC Alias Private Key: 7
20,586,383 UART: [art] Derive CDI
20,587,199 UART: [art] Store in in slot 0x4
20,629,741 UART: [art] Derive Key Pair
20,630,788 UART: [art] Store priv key in slot 0x5
23,057,486 UART: [art] Derive Key Pair - Done
23,070,700 UART: [art] Signing Cert with AUTHO
23,072,006 UART: RITY.KEYID = 7
24,777,244 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,750 UART: [art] PUB.X = E5B696512B4448D975B3AF223FF4A9B94229172B5F63339DFEE7612831863CD875075C1E041F2F70D1BA5836BB4E6EF9
24,786,006 UART: [art] PUB.Y = 268169D01F4D6B7749597F288C898727C8041B0A3F044A573A035314088556F6DFD4A892CCFA13333C50BB3859D5CF3D
24,793,230 UART: [art] SIG.R = A6250B3872071E1149F145CF942AC8FE41943C3454C326B24499EBAB94A933F08C93B2DC8DEDE1D906CDECFEFD7A62DC
24,800,665 UART: [art] SIG.S = 893E9446CBE86E05B93A8628283A46110B3B45EA3C24179E963B9FB0C652D3302CEBBC5E7E052991EFE2147ABA1FAAB4
25,779,793 UART: Caliptra RT
25,780,515 UART: [state] CFI Enabled
25,898,293 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,047 writing to cptra_bootfsm_go
3,707,618 ready_for_fw is high
3,708,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,283,688 >>> mbox cmd response: success
18,532,975 UART:
18,533,413 UART: Running Caliptra FMC ...
18,534,611 UART:
18,534,788 UART: [state] CFI Enabled
18,542,729 UART: [fht] FMC Alias Private Key: 7
20,299,995 UART: [art] Extend RT PCRs Done
20,301,226 UART: [art] Lock RT PCRs Done
20,303,003 UART: [art] Populate DV Done
20,308,702 UART: [fht] FMC Alias Private Key: 7
20,310,197 UART: [art] Derive CDI
20,310,938 UART: [art] Store in in slot 0x4
20,353,488 UART: [art] Derive Key Pair
20,354,533 UART: [art] Store priv key in slot 0x5
22,781,165 UART: [art] Derive Key Pair - Done
22,794,162 UART: [art] Signing Cert with AUTHO
22,795,462 UART: RITY.KEYID = 7
24,500,917 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,438 UART: [art] PUB.X = D186CBE06DF5B7D00E8158F82C8A3455425D186123669970A21E0DDA39590DC4EAF369B4AE845883C7E3F5D78EB0A9CD
24,509,686 UART: [art] PUB.Y = 756938CAC0E4838E63CCB55FF14ED63DDF3D3A667FA8DD6A851ED4A9C60E9A00B31ACCB1B5A029F3E2B169D11FDFCFD9
24,516,998 UART: [art] SIG.R = 4BFDABD656D403B9C44EF72CFF2E5AF9710B6D1C8D57055F5DDF3D6DFE24D8B167F04C79863B984AB8B4E43EC51AE02C
24,524,398 UART: [art] SIG.S = 58FA6A6FC1023D978871ECE27317558001A86E8F1C431BAA298AA5C306B7635607B6B3A7F84CC7A82BCF7FEA2990C9BD
25,503,833 UART: Caliptra RT
25,504,536 UART: [state] CFI Enabled
25,621,376 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,112 UART:
192,883 UART: Running Caliptra ROM ...
194,030 UART:
194,197 UART: [state] CFI Enabled
261,541 UART: [state] LifecycleState = Unprovisioned
263,917 UART: [state] DebugLocked = No
265,237 UART: [state] WD Timer not started. Device not locked for debugging
269,581 UART: [kat] SHA2-256
459,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,256 UART: [kat] ++
470,749 UART: [kat] sha1
483,397 UART: [kat] SHA2-256
486,411 UART: [kat] SHA2-384
492,576 UART: [kat] SHA2-512-ACC
495,159 UART: [kat] ECC-384
2,950,476 UART: [kat] HMAC-384Kdf
2,964,355 UART: [kat] LMS
3,496,162 UART: [kat] --
3,502,524 UART: [cold-reset] ++
3,504,459 UART: [fht] FHT @ 0x50003400
3,516,875 UART: [idev] ++
3,517,590 UART: [idev] CDI.KEYID = 6
3,518,505 UART: [idev] SUBJECT.KEYID = 7
3,519,677 UART: [idev] UDS.KEYID = 0
3,520,600 ready_for_fw is high
3,520,824 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,487 UART: [idev] Erasing UDS.KEYID = 0
6,021,238 UART: [idev] Sha1 KeyId Algorithm
6,043,826 UART: [idev] --
6,049,695 UART: [ldev] ++
6,050,445 UART: [ldev] CDI.KEYID = 6
6,051,367 UART: [ldev] SUBJECT.KEYID = 5
6,052,473 UART: [ldev] AUTHORITY.KEYID = 7
6,053,706 UART: [ldev] FE.KEYID = 1
6,083,750 UART: [ldev] Erasing FE.KEYID = 1
8,590,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,566 UART: [ldev] --
10,395,671 UART: [fwproc] Wait for Commands...
10,398,203 UART: [fwproc] Recv command 0x46574c44
10,400,513 UART: [fwproc] Recv'd Img size: 114168 bytes
13,849,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,047,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,589,408 >>> mbox cmd response: success
14,593,304 UART: [afmc] ++
14,594,036 UART: [afmc] CDI.KEYID = 6
14,595,239 UART: [afmc] SUBJECT.KEYID = 7
14,596,680 UART: [afmc] AUTHORITY.KEYID = 5
17,131,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,854,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,856,493 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,798 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,926,169 UART: [afmc] --
18,930,524 UART: [cold-reset] --
18,934,240 UART: [state] Locking Datavault
18,939,391 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,591 UART: [state] Locking ICCM
18,942,991 UART: [exit] Launching FMC @ 0x40000130
18,951,620 UART:
18,951,855 UART: Running Caliptra FMC ...
18,952,953 UART:
18,953,129 UART: [state] CFI Enabled
19,011,411 UART: [fht] FMC Alias Private Key: 7
20,776,138 UART: [art] Extend RT PCRs Done
20,777,360 UART: [art] Lock RT PCRs Done
20,779,260 UART: [art] Populate DV Done
20,784,349 UART: [fht] FMC Alias Private Key: 7
20,786,047 UART: [art] Derive CDI
20,786,862 UART: [art] Store in in slot 0x4
20,843,897 UART: [art] Derive Key Pair
20,844,936 UART: [art] Store priv key in slot 0x5
23,307,593 UART: [art] Derive Key Pair - Done
23,320,482 UART: [art] Signing Cert with AUTHO
23,321,820 UART: RITY.KEYID = 7
25,033,253 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,761 UART: [art] PUB.X = E36B88CC76BE9AFA4A44757BF70B0F4D60D7734AB9A0A831130809D07E08E3FE26C46D4513E6FA603A6083128170544A
25,041,980 UART: [art] PUB.Y = B27D0CB4BA92417D61C0D652B8566FB7B3A1C585FEA199BE33F7D4862136DCD4DDC061EF26EC2DE7A2C9371601594B1D
25,049,290 UART: [art] SIG.R = 0EF6FAE302B0FF35DCCEAAB11144B4CEAF760F8B5981E9DB6CD2D877D07F860BA95F7CBE58EC1F8AABDC3A91D5296B95
25,056,730 UART: [art] SIG.S = 12136C7E8E74C986BEE77F9C35C7534204BC60E07BB867A9F356C7A1907DAE660E03A4101EE6EE35BC9E65AA351FB700
26,034,945 UART: Caliptra RT
26,035,674 UART: [state] CFI Enabled
26,201,186 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,439,880 ready_for_fw is high
3,440,262 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,726,117 >>> mbox cmd response: success
19,046,399 UART:
19,046,801 UART: Running Caliptra FMC ...
19,047,946 UART:
19,048,120 UART: [state] CFI Enabled
19,112,168 UART: [fht] FMC Alias Private Key: 7
20,876,467 UART: [art] Extend RT PCRs Done
20,877,675 UART: [art] Lock RT PCRs Done
20,879,516 UART: [art] Populate DV Done
20,885,054 UART: [fht] FMC Alias Private Key: 7
20,886,597 UART: [art] Derive CDI
20,887,412 UART: [art] Store in in slot 0x4
20,945,212 UART: [art] Derive Key Pair
20,946,271 UART: [art] Store priv key in slot 0x5
23,409,273 UART: [art] Derive Key Pair - Done
23,422,493 UART: [art] Signing Cert with AUTHO
23,423,824 UART: RITY.KEYID = 7
25,135,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,641 UART: [art] PUB.X = 3F039AE0CE99BBA91786663C2A3BBB61C01FC967B4688A43CAAE8771B433072C2AD59EF91F7F175F283A1D38B7D25E06
25,143,938 UART: [art] PUB.Y = 7BC1D3782B203179E9660B424E7293A88AA8D87566DDEBC3EAEE5D8E44B6874948E5F53AB5BCF85DA932B297B8C0A0D3
25,151,227 UART: [art] SIG.R = 37FF282B66A3E39CA902C729606DD493213F205108E9F04234CFCB49DEE75374D2DC06AD690049CB2F9D23AE66948C7F
25,158,563 UART: [art] SIG.S = C28E69279CCAD506127667DE9D953492C30CBC7B44A42D6DA697FE5A3716622988BF8364FBD24CEFF6CFB5FC90CECFAC
26,138,025 UART: Caliptra RT
26,138,732 UART: [state] CFI Enabled
26,303,851 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,815 writing to cptra_bootfsm_go
193,061 UART:
193,423 UART: Running Caliptra ROM ...
194,617 UART:
604,225 UART: [state] CFI Enabled
618,022 UART: [state] LifecycleState = Unprovisioned
620,391 UART: [state] DebugLocked = No
622,851 UART: [state] WD Timer not started. Device not locked for debugging
628,260 UART: [kat] SHA2-256
818,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,911 UART: [kat] ++
829,441 UART: [kat] sha1
839,957 UART: [kat] SHA2-256
842,960 UART: [kat] SHA2-384
849,951 UART: [kat] SHA2-512-ACC
852,529 UART: [kat] ECC-384
3,291,841 UART: [kat] HMAC-384Kdf
3,304,765 UART: [kat] LMS
3,836,576 UART: [kat] --
3,841,498 UART: [cold-reset] ++
3,842,656 UART: [fht] FHT @ 0x50003400
3,854,558 UART: [idev] ++
3,855,267 UART: [idev] CDI.KEYID = 6
3,856,316 UART: [idev] SUBJECT.KEYID = 7
3,857,421 UART: [idev] UDS.KEYID = 0
3,858,361 ready_for_fw is high
3,858,564 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,971 UART: [idev] Erasing UDS.KEYID = 0
6,338,742 UART: [idev] Sha1 KeyId Algorithm
6,360,615 UART: [idev] --
6,364,440 UART: [ldev] ++
6,365,117 UART: [ldev] CDI.KEYID = 6
6,366,087 UART: [ldev] SUBJECT.KEYID = 5
6,367,245 UART: [ldev] AUTHORITY.KEYID = 7
6,368,473 UART: [ldev] FE.KEYID = 1
6,379,921 UART: [ldev] Erasing FE.KEYID = 1
8,859,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,330 UART: [ldev] --
10,653,522 UART: [fwproc] Wait for Commands...
10,655,182 UART: [fwproc] Recv command 0x46574c44
10,657,433 UART: [fwproc] Recv'd Img size: 114168 bytes
14,108,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,309,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,850,236 >>> mbox cmd response: success
14,853,467 UART: [afmc] ++
14,854,183 UART: [afmc] CDI.KEYID = 6
14,855,373 UART: [afmc] SUBJECT.KEYID = 7
14,856,808 UART: [afmc] AUTHORITY.KEYID = 5
17,362,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,085,900 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,087,826 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,103,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,118,175 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,133,177 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,157,285 UART: [afmc] --
19,161,535 UART: [cold-reset] --
19,165,130 UART: [state] Locking Datavault
19,170,327 UART: [state] Locking PCR0, PCR1 and PCR31
19,172,470 UART: [state] Locking ICCM
19,175,525 UART: [exit] Launching FMC @ 0x40000130
19,184,195 UART:
19,184,425 UART: Running Caliptra FMC ...
19,185,457 UART:
19,185,607 UART: [state] CFI Enabled
19,193,658 UART: [fht] FMC Alias Private Key: 7
20,949,638 UART: [art] Extend RT PCRs Done
20,950,873 UART: [art] Lock RT PCRs Done
20,952,584 UART: [art] Populate DV Done
20,958,381 UART: [fht] FMC Alias Private Key: 7
20,959,876 UART: [art] Derive CDI
20,960,643 UART: [art] Store in in slot 0x4
21,003,345 UART: [art] Derive Key Pair
21,004,354 UART: [art] Store priv key in slot 0x5
23,431,348 UART: [art] Derive Key Pair - Done
23,444,721 UART: [art] Signing Cert with AUTHO
23,446,021 UART: RITY.KEYID = 7
25,151,543 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,054 UART: [art] PUB.X = 678AD611897E6B1B232C8AAFA7D820805B949779C77D0DF98B0D1296058666303058628FF46CCCC8C865EEFE98AE8346
25,160,306 UART: [art] PUB.Y = 7E12E7A5880A1C7E7D3786203211C839D4FB9E26746DF96D5189776D0AF729B79E8BBAB6B10A357AB2FF16583D8147D1
25,167,538 UART: [art] SIG.R = 1CAE5640673424E932FD6BBD7E4A627825BB4055F564D7315159C2CCEEE2B092B6AACC3BA9427E1281436D62BBC19CEF
25,174,940 UART: [art] SIG.S = 7B4269599D9DEE390AE6C76226752927CB4E14A19B6262F51E7DFC40FB06927B22A968C0A218F228B1C58B81EE440390
26,153,530 UART: Caliptra RT
26,154,259 UART: [state] CFI Enabled
26,271,425 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,694 writing to cptra_bootfsm_go
3,752,637 ready_for_fw is high
3,753,079 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,077 >>> mbox cmd response: success
19,213,537 UART:
19,213,960 UART: Running Caliptra FMC ...
19,215,159 UART:
19,215,328 UART: [state] CFI Enabled
19,222,897 UART: [fht] FMC Alias Private Key: 7
20,979,963 UART: [art] Extend RT PCRs Done
20,981,200 UART: [art] Lock RT PCRs Done
20,982,888 UART: [art] Populate DV Done
20,988,195 UART: [fht] FMC Alias Private Key: 7
20,989,797 UART: [art] Derive CDI
20,990,616 UART: [art] Store in in slot 0x4
21,033,219 UART: [art] Derive Key Pair
21,034,260 UART: [art] Store priv key in slot 0x5
23,461,580 UART: [art] Derive Key Pair - Done
23,474,471 UART: [art] Signing Cert with AUTHO
23,475,775 UART: RITY.KEYID = 7
25,180,942 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,469 UART: [art] PUB.X = 472AC2137CF8056BCA2371DB3AD38368BFFF1837054C1DF5797DDDE78AEE5ABCB1954B0AA1005C4B57D7F469DF5E0BA2
25,189,720 UART: [art] PUB.Y = 877476F82C6AB35C7AB726F046350F838B767263893241BED4F034D0950ADDBC2E72B0DE2F50E71088E4B1BE5C73A005
25,196,955 UART: [art] SIG.R = 07F3CAB727BB54E5042667952D0671B1C2991C7C2E239A4F9D7A1D70BD6BEB754AEB96FA1A4B3B6A99764DF56026F735
25,204,351 UART: [art] SIG.S = 76F3B292028CCFFA28EE119C3E00263281116EC067885536209B04246AA9F5A030C41D131CBE42026A2256E0FF4D73CE
26,182,539 UART: Caliptra RT
26,183,232 UART: [state] CFI Enabled
26,300,793 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,251 UART: [kat] SHA2-256
882,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,297 UART: [kat] ++
886,449 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,262 UART: [kat] SHA2-512-ACC
897,163 UART: [kat] ECC-384
902,662 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,867 UART: [fht] Storing FHT @ 0x50003400
1,479,646 UART: [idev] ++
1,479,814 UART: [idev] CDI.KEYID = 6
1,480,174 UART: [idev] SUBJECT.KEYID = 7
1,480,598 UART: [idev] UDS.KEYID = 0
1,480,943 ready_for_fw is high
1,480,943 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,710 UART: [idev] Erasing UDS.KEYID = 0
1,504,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,522 UART: [idev] --
1,514,567 UART: [ldev] ++
1,514,735 UART: [ldev] CDI.KEYID = 6
1,515,098 UART: [ldev] SUBJECT.KEYID = 5
1,515,524 UART: [ldev] AUTHORITY.KEYID = 7
1,515,987 UART: [ldev] FE.KEYID = 1
1,521,183 UART: [ldev] Erasing FE.KEYID = 1
1,546,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,252 UART: [ldev] --
1,585,637 UART: [fwproc] Waiting for Commands...
1,586,332 UART: [fwproc] Received command 0x46574c44
1,587,123 UART: [fwproc] Received Image of size 114168 bytes
2,883,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,049 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,401 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,934 >>> mbox cmd response: success
3,076,080 UART: [afmc] ++
3,076,248 UART: [afmc] CDI.KEYID = 6
3,076,610 UART: [afmc] SUBJECT.KEYID = 7
3,077,035 UART: [afmc] AUTHORITY.KEYID = 5
3,111,732 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,004 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,512 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,397 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,087 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,986 UART: [afmc] --
3,155,018 UART: [cold-reset] --
3,156,024 UART: [state] Locking Datavault
3,157,273 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,877 UART: [state] Locking ICCM
3,158,479 UART: [exit] Launching FMC @ 0x40000130
3,163,808 UART:
3,163,824 UART: Running Caliptra FMC ...
3,164,232 UART:
3,164,286 UART: [state] CFI Enabled
3,174,601 UART: [fht] FMC Alias Private Key: 7
3,282,430 UART: [art] Extend RT PCRs Done
3,282,858 UART: [art] Lock RT PCRs Done
3,284,554 UART: [art] Populate DV Done
3,292,803 UART: [fht] FMC Alias Private Key: 7
3,293,817 UART: [art] Derive CDI
3,294,097 UART: [art] Store in in slot 0x4
3,379,222 UART: [art] Derive Key Pair
3,379,582 UART: [art] Store priv key in slot 0x5
3,392,782 UART: [art] Derive Key Pair - Done
3,407,602 UART: [art] Signing Cert with AUTHO
3,408,082 UART: RITY.KEYID = 7
3,423,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,201 UART: [art] PUB.X = 1D9859D8E58C7CFDEDD58390F07D2C08195837E141EC00ECE92188C67B7FB7D852D4DC7426BA8FC4727887F6FCFC9436
3,430,956 UART: [art] PUB.Y = 0EAB407D7FB1AA6A168DC1BC738E1C552BE82E8F63F8FC0519816F29335FE5C9191F3F93292BAE0224F225DBA45A4666
3,437,907 UART: [art] SIG.R = 6CA295554AF2BAA194E12738FEF3E76C47394AE2ACC26C35FCA0BED096C692B7DC11BD8487AA2C0F03B7D375B71CD043
3,444,689 UART: [art] SIG.S = 55F244A8A7A59A28340849E2EAC52D7084ED73EFD5AC2870578102926A47C3B12247BC1F1CE9E3C3C9E80AB46C611F14
3,468,073 UART: Caliptra RT
3,468,326 UART: [state] CFI Enabled
3,576,534 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,817 ready_for_fw is high
1,362,817 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,886 >>> mbox cmd response: success
2,986,240 UART:
2,986,256 UART: Running Caliptra FMC ...
2,986,664 UART:
2,986,718 UART: [state] CFI Enabled
2,997,389 UART: [fht] FMC Alias Private Key: 7
3,105,880 UART: [art] Extend RT PCRs Done
3,106,308 UART: [art] Lock RT PCRs Done
3,108,012 UART: [art] Populate DV Done
3,116,177 UART: [fht] FMC Alias Private Key: 7
3,117,275 UART: [art] Derive CDI
3,117,555 UART: [art] Store in in slot 0x4
3,203,272 UART: [art] Derive Key Pair
3,203,632 UART: [art] Store priv key in slot 0x5
3,216,198 UART: [art] Derive Key Pair - Done
3,230,940 UART: [art] Signing Cert with AUTHO
3,231,420 UART: RITY.KEYID = 7
3,246,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,601 UART: [art] PUB.X = CC23C3B9544DA29C15DDBFD5C2E2395D75E3A9E74C14F7BA07288E13F95898D439DF42E7CF6F35148DC86AF8B1794156
3,254,378 UART: [art] PUB.Y = 69C373F1CD8D7FF15114B94F54F3A11EFC33FCB3D7C9871B79CD55F13C4DE1D618DB9AD71B2BA936F2E6EB2C6231DDF4
3,261,350 UART: [art] SIG.R = 433FAE2086096A6B6C3280A0919C4CEE875CB22D11B402DBEB5142BD471225FAD9135A05BD33DED4FE6257F719034F9E
3,268,116 UART: [art] SIG.S = A4A44E52B0086E80E24E6551F615F326801315FBE71957FA4DFA0A502D07B895F006F6793838144E70753274FB451049
3,291,691 UART: Caliptra RT
3,291,944 UART: [state] CFI Enabled
3,399,451 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,652 UART: [kat] SHA2-256
882,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,698 UART: [kat] ++
886,850 UART: [kat] sha1
891,136 UART: [kat] SHA2-256
893,074 UART: [kat] SHA2-384
895,757 UART: [kat] SHA2-512-ACC
897,658 UART: [kat] ECC-384
903,451 UART: [kat] HMAC-384Kdf
908,171 UART: [kat] LMS
1,476,367 UART: [kat] --
1,477,204 UART: [cold-reset] ++
1,477,770 UART: [fht] Storing FHT @ 0x50003400
1,480,501 UART: [idev] ++
1,480,669 UART: [idev] CDI.KEYID = 6
1,481,029 UART: [idev] SUBJECT.KEYID = 7
1,481,453 UART: [idev] UDS.KEYID = 0
1,481,798 ready_for_fw is high
1,481,798 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,215 UART: [idev] Erasing UDS.KEYID = 0
1,506,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,791 UART: [idev] --
1,515,914 UART: [ldev] ++
1,516,082 UART: [ldev] CDI.KEYID = 6
1,516,445 UART: [ldev] SUBJECT.KEYID = 5
1,516,871 UART: [ldev] AUTHORITY.KEYID = 7
1,517,334 UART: [ldev] FE.KEYID = 1
1,522,698 UART: [ldev] Erasing FE.KEYID = 1
1,547,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,749 UART: [ldev] --
1,587,258 UART: [fwproc] Waiting for Commands...
1,588,063 UART: [fwproc] Received command 0x46574c44
1,588,854 UART: [fwproc] Received Image of size 114168 bytes
2,885,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,212 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,299 >>> mbox cmd response: success
3,078,443 UART: [afmc] ++
3,078,611 UART: [afmc] CDI.KEYID = 6
3,078,973 UART: [afmc] SUBJECT.KEYID = 7
3,079,398 UART: [afmc] AUTHORITY.KEYID = 5
3,114,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,558 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,248 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,091 UART: [afmc] --
3,158,117 UART: [cold-reset] --
3,159,085 UART: [state] Locking Datavault
3,160,370 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,974 UART: [state] Locking ICCM
3,161,454 UART: [exit] Launching FMC @ 0x40000130
3,166,783 UART:
3,166,799 UART: Running Caliptra FMC ...
3,167,207 UART:
3,167,350 UART: [state] CFI Enabled
3,178,045 UART: [fht] FMC Alias Private Key: 7
3,285,540 UART: [art] Extend RT PCRs Done
3,285,968 UART: [art] Lock RT PCRs Done
3,287,428 UART: [art] Populate DV Done
3,295,647 UART: [fht] FMC Alias Private Key: 7
3,296,749 UART: [art] Derive CDI
3,297,029 UART: [art] Store in in slot 0x4
3,382,908 UART: [art] Derive Key Pair
3,383,268 UART: [art] Store priv key in slot 0x5
3,396,500 UART: [art] Derive Key Pair - Done
3,411,029 UART: [art] Signing Cert with AUTHO
3,411,509 UART: RITY.KEYID = 7
3,426,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,500 UART: [art] PUB.X = C6956DEBB39FB740A19D033979C385FF9926ED534242B45FDA395D853550021F677B443BB7C57B44A7BE7DD726EF615E
3,434,268 UART: [art] PUB.Y = 7A917013FCF137E86DA60E46A3817E30E5A4841A63B3097897E5F77177E4E5E910B153D0F7E3E47DCC229C5915C6B37D
3,441,212 UART: [art] SIG.R = 69876C99B43A0E24F644CE67DB74E97EFFBBFCE16CB8AF6015C287F081086A03F8362B4144FC1CD911FCD0A3740281A0
3,447,980 UART: [art] SIG.S = 8EEE0627A731469350F7AABDCDA7A55E0EB80147B827997D3DFE72C8996746E16AFDB02EE3AF4A6C27B7ADF832F0802C
3,471,760 UART: Caliptra RT
3,472,105 UART: [state] CFI Enabled
3,580,300 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,120 ready_for_fw is high
1,363,120 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,333 >>> mbox cmd response: success
2,989,109 UART:
2,989,125 UART: Running Caliptra FMC ...
2,989,533 UART:
2,989,676 UART: [state] CFI Enabled
3,000,131 UART: [fht] FMC Alias Private Key: 7
3,108,704 UART: [art] Extend RT PCRs Done
3,109,132 UART: [art] Lock RT PCRs Done
3,110,860 UART: [art] Populate DV Done
3,119,143 UART: [fht] FMC Alias Private Key: 7
3,120,109 UART: [art] Derive CDI
3,120,389 UART: [art] Store in in slot 0x4
3,206,004 UART: [art] Derive Key Pair
3,206,364 UART: [art] Store priv key in slot 0x5
3,219,156 UART: [art] Derive Key Pair - Done
3,234,198 UART: [art] Signing Cert with AUTHO
3,234,678 UART: RITY.KEYID = 7
3,250,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,837 UART: [art] PUB.X = 88D2B23BF240F9EF8E24C2146079FFF96739C4A16099696DBEB5663F262F83CA741A56ED6A1163EE2F0C4F8713F3444C
3,257,608 UART: [art] PUB.Y = F43A955112A0AAFC22D6755E1F851F76B013866D762829D6E6D89929B9034D70FC06405FA6840C6ED636AEE7FCCF1A5B
3,264,555 UART: [art] SIG.R = EC15E05737E2CA82C2BA3300B116D533D35611E3BBB0020B307B2385378C4567F10B3ADC3B6A089931EE2348A2E2417F
3,271,291 UART: [art] SIG.S = CD1A621CB77D37BE326453267C68CA57FE17B79D80575225A3668DB2E9CB4F8C61CEF45CE8998D9010FDFC390E8418DC
3,294,935 UART: Caliptra RT
3,295,280 UART: [state] CFI Enabled
3,403,618 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,531 UART: [kat] SHA2-256
903,471 UART: [kat] SHA2-384
906,048 UART: [kat] SHA2-512-ACC
907,949 UART: [kat] ECC-384
917,630 UART: [kat] HMAC-384Kdf
922,060 UART: [kat] LMS
1,170,388 UART: [kat] --
1,171,437 UART: [cold-reset] ++
1,171,805 UART: [fht] FHT @ 0x50003400
1,174,466 UART: [idev] ++
1,174,634 UART: [idev] CDI.KEYID = 6
1,174,994 UART: [idev] SUBJECT.KEYID = 7
1,175,418 UART: [idev] UDS.KEYID = 0
1,175,763 ready_for_fw is high
1,175,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,576 UART: [idev] Erasing UDS.KEYID = 0
1,200,865 UART: [idev] Sha1 KeyId Algorithm
1,209,269 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,217,247 UART: [ldev] Erasing FE.KEYID = 1
1,243,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,553 UART: [ldev] --
1,283,062 UART: [fwproc] Wait for Commands...
1,283,848 UART: [fwproc] Recv command 0x46574c44
1,284,576 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,391 >>> mbox cmd response: success
2,773,439 UART: [afmc] ++
2,773,607 UART: [afmc] CDI.KEYID = 6
2,773,969 UART: [afmc] SUBJECT.KEYID = 7
2,774,394 UART: [afmc] AUTHORITY.KEYID = 5
2,810,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,552 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,672 UART: [afmc] --
2,853,768 UART: [cold-reset] --
2,854,782 UART: [state] Locking Datavault
2,856,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,727 UART: [state] Locking ICCM
2,857,337 UART: [exit] Launching FMC @ 0x40000130
2,862,666 UART:
2,862,682 UART: Running Caliptra FMC ...
2,863,090 UART:
2,863,144 UART: [state] CFI Enabled
2,873,565 UART: [fht] FMC Alias Private Key: 7
2,981,560 UART: [art] Extend RT PCRs Done
2,981,988 UART: [art] Lock RT PCRs Done
2,983,754 UART: [art] Populate DV Done
2,992,083 UART: [fht] FMC Alias Private Key: 7
2,993,039 UART: [art] Derive CDI
2,993,319 UART: [art] Store in in slot 0x4
3,078,968 UART: [art] Derive Key Pair
3,079,328 UART: [art] Store priv key in slot 0x5
3,091,836 UART: [art] Derive Key Pair - Done
3,106,314 UART: [art] Signing Cert with AUTHO
3,106,794 UART: RITY.KEYID = 7
3,122,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,835 UART: [art] PUB.X = 1FD9AA7B492899EB9C4FF80AB52D7AF44F9295AFA0149A169DFFE7D5C8534005C958276C119393F44C9B76B5816B383F
3,129,605 UART: [art] PUB.Y = F601555547F95112F3B3EAD3EE10F7B880712604B394F7902BDE548A97ACF3C158D7715077E3522A9D75DF86940409BE
3,136,539 UART: [art] SIG.R = 67488EC94C480FEBB63FC3DBFB630DA0363D1BFD56BFF3DB54C1D273AE824F575DBBA23B3E79F87C738EE5F697E8F950
3,143,325 UART: [art] SIG.S = 2A2961A2B66F3EC1AA7C059F609FD61A529A81031E4FA9F85E97272EB8E1415709B86A2F7B8A6A10D3B7413359DA8E37
3,166,931 UART: Caliptra RT
3,167,184 UART: [state] CFI Enabled
3,274,405 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,529 ready_for_fw is high
1,060,529 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,176 >>> mbox cmd response: success
2,687,652 UART:
2,687,668 UART: Running Caliptra FMC ...
2,688,076 UART:
2,688,130 UART: [state] CFI Enabled
2,698,083 UART: [fht] FMC Alias Private Key: 7
2,806,174 UART: [art] Extend RT PCRs Done
2,806,602 UART: [art] Lock RT PCRs Done
2,808,126 UART: [art] Populate DV Done
2,816,333 UART: [fht] FMC Alias Private Key: 7
2,817,267 UART: [art] Derive CDI
2,817,547 UART: [art] Store in in slot 0x4
2,903,336 UART: [art] Derive Key Pair
2,903,696 UART: [art] Store priv key in slot 0x5
2,916,896 UART: [art] Derive Key Pair - Done
2,931,623 UART: [art] Signing Cert with AUTHO
2,932,103 UART: RITY.KEYID = 7
2,947,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,172 UART: [art] PUB.X = 6134D3E55C48B600CE2CA25ED1EA06CE54FFF4C2420A1F2571EBE0DC92EC197BACEE59D82FCC917245602F792599AA21
2,954,930 UART: [art] PUB.Y = ADBD263B5C22FD52EEFEB645F1DF40343E09B06C5A245A0CBDE9F758687BBCC137ADD854EB739B976659F3E812AFD61B
2,961,896 UART: [art] SIG.R = 0757F64A09ABF6C9B03654FFCB300542530EF10A69E9E46E5EE87C15E4E1E0F150B5E9554A029E5EC4F9ECD3F4E50A0D
2,968,656 UART: [art] SIG.S = 3AF54DF09A545FA586890DE327915F6213A295DCB288FFCB78579B13702A64AF5C18B77B35D63F72C51AED85484C6EAE
2,992,406 UART: Caliptra RT
2,992,659 UART: [state] CFI Enabled
3,100,214 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
87,030 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
893,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,096 UART: [kat] ++
898,248 UART: [kat] sha1
902,706 UART: [kat] SHA2-256
904,646 UART: [kat] SHA2-384
907,421 UART: [kat] SHA2-512-ACC
909,322 UART: [kat] ECC-384
918,907 UART: [kat] HMAC-384Kdf
923,477 UART: [kat] LMS
1,171,805 UART: [kat] --
1,172,912 UART: [cold-reset] ++
1,173,430 UART: [fht] FHT @ 0x50003400
1,176,127 UART: [idev] ++
1,176,295 UART: [idev] CDI.KEYID = 6
1,176,655 UART: [idev] SUBJECT.KEYID = 7
1,177,079 UART: [idev] UDS.KEYID = 0
1,177,424 ready_for_fw is high
1,177,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,339 UART: [idev] Erasing UDS.KEYID = 0
1,201,892 UART: [idev] Sha1 KeyId Algorithm
1,210,340 UART: [idev] --
1,211,412 UART: [ldev] ++
1,211,580 UART: [ldev] CDI.KEYID = 6
1,211,943 UART: [ldev] SUBJECT.KEYID = 5
1,212,369 UART: [ldev] AUTHORITY.KEYID = 7
1,212,832 UART: [ldev] FE.KEYID = 1
1,218,014 UART: [ldev] Erasing FE.KEYID = 1
1,244,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,314 UART: [ldev] --
1,283,761 UART: [fwproc] Wait for Commands...
1,284,345 UART: [fwproc] Recv command 0x46574c44
1,285,073 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,570 >>> mbox cmd response: success
2,772,746 UART: [afmc] ++
2,772,914 UART: [afmc] CDI.KEYID = 6
2,773,276 UART: [afmc] SUBJECT.KEYID = 7
2,773,701 UART: [afmc] AUTHORITY.KEYID = 5
2,809,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,393 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,121 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,006 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,725 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,517 UART: [afmc] --
2,852,525 UART: [cold-reset] --
2,853,355 UART: [state] Locking Datavault
2,854,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,858 UART: [state] Locking ICCM
2,855,382 UART: [exit] Launching FMC @ 0x40000130
2,860,711 UART:
2,860,727 UART: Running Caliptra FMC ...
2,861,135 UART:
2,861,278 UART: [state] CFI Enabled
2,871,825 UART: [fht] FMC Alias Private Key: 7
2,979,574 UART: [art] Extend RT PCRs Done
2,980,002 UART: [art] Lock RT PCRs Done
2,981,494 UART: [art] Populate DV Done
2,989,929 UART: [fht] FMC Alias Private Key: 7
2,990,911 UART: [art] Derive CDI
2,991,191 UART: [art] Store in in slot 0x4
3,076,714 UART: [art] Derive Key Pair
3,077,074 UART: [art] Store priv key in slot 0x5
3,090,516 UART: [art] Derive Key Pair - Done
3,105,421 UART: [art] Signing Cert with AUTHO
3,105,901 UART: RITY.KEYID = 7
3,121,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,042 UART: [art] PUB.X = 472468C85705E90BE1C3274BECF58E9C1224DDE364536225F33EE6495CA544955B8EA874AF8B747488E556F6EC99D041
3,128,804 UART: [art] PUB.Y = 939FD7F08BF6ACB51B3BF503565F015BA70FD2D2E57CC8914B50268201955E2CC7B7711FB9817AB5990472A338C887F7
3,135,741 UART: [art] SIG.R = 72B39A8C8F3A05579F0E05E66781F5595E54349F616E7173D510DD180D6C0D7377495574C08088133700492410B21F49
3,142,454 UART: [art] SIG.S = 00ACFB74D355DDD16FB69756CBAF85B25FAECA79909F524841BA8FD25B0CAFB3BC6F6D26BC7D72384E1B58E8DD906BCD
3,165,792 UART: Caliptra RT
3,166,137 UART: [state] CFI Enabled
3,273,961 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,162 ready_for_fw is high
1,060,162 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,313 >>> mbox cmd response: success
2,686,411 UART:
2,686,427 UART: Running Caliptra FMC ...
2,686,835 UART:
2,686,978 UART: [state] CFI Enabled
2,697,531 UART: [fht] FMC Alias Private Key: 7
2,806,094 UART: [art] Extend RT PCRs Done
2,806,522 UART: [art] Lock RT PCRs Done
2,808,212 UART: [art] Populate DV Done
2,816,499 UART: [fht] FMC Alias Private Key: 7
2,817,559 UART: [art] Derive CDI
2,817,839 UART: [art] Store in in slot 0x4
2,903,590 UART: [art] Derive Key Pair
2,903,950 UART: [art] Store priv key in slot 0x5
2,917,194 UART: [art] Derive Key Pair - Done
2,932,233 UART: [art] Signing Cert with AUTHO
2,932,713 UART: RITY.KEYID = 7
2,947,925 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,690 UART: [art] PUB.X = 607B2D77B7752ED6083BC7271034DD7347BB5195793068B3A3F71E421D728BE27C43FD27A42D32AA7FDB23D73192B1B2
2,955,457 UART: [art] PUB.Y = 1F37555FA184C2FA4777ECDD203EE90C5E3129A047FAA5EEB37972B75233F4A2BB69C19235389DF11BF20536378519D3
2,962,403 UART: [art] SIG.R = 9202F2583F7E39BC3F642ACF333A9120CFAF1378A86A71A13DF69E949122995C976318123A7FB0D6286FF0FCC68D2A5C
2,969,174 UART: [art] SIG.S = 59D913032B0673BE3B1017130BA02BED350E93FFF5ABEFD510F8F5DE589308ED561336CF3C6AEDDC98BCB83C6101B37C
2,992,415 UART: Caliptra RT
2,992,760 UART: [state] CFI Enabled
3,100,037 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,785 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,735 UART: [kat] ++
895,887 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,281 UART: [cold-reset] ++
1,170,837 UART: [fht] FHT @ 0x50003400
1,173,487 UART: [idev] ++
1,173,655 UART: [idev] CDI.KEYID = 6
1,174,016 UART: [idev] SUBJECT.KEYID = 7
1,174,441 UART: [idev] UDS.KEYID = 0
1,174,787 ready_for_fw is high
1,174,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,249 UART: [idev] Erasing UDS.KEYID = 0
1,199,469 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,336 UART: [ldev] ++
1,209,504 UART: [ldev] CDI.KEYID = 6
1,209,868 UART: [ldev] SUBJECT.KEYID = 5
1,210,295 UART: [ldev] AUTHORITY.KEYID = 7
1,210,758 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,710 UART: [fwproc] Wait for Commands...
1,281,419 UART: [fwproc] Recv command 0x46574c44
1,282,152 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,136 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,901 >>> mbox cmd response: success
2,771,096 UART: [afmc] ++
2,771,264 UART: [afmc] CDI.KEYID = 6
2,771,627 UART: [afmc] SUBJECT.KEYID = 7
2,772,053 UART: [afmc] AUTHORITY.KEYID = 5
2,807,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,667 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,279 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,998 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,927 UART: [afmc] --
2,850,979 UART: [cold-reset] --
2,852,045 UART: [state] Locking Datavault
2,853,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,788 UART: [state] Locking ICCM
2,854,214 UART: [exit] Launching FMC @ 0x40000130
2,859,543 UART:
2,859,559 UART: Running Caliptra FMC ...
2,859,967 UART:
2,860,021 UART: [state] CFI Enabled
2,870,492 UART: [fht] FMC Alias Private Key: 7
2,978,353 UART: [art] Extend RT PCRs Done
2,978,781 UART: [art] Lock RT PCRs Done
2,980,321 UART: [art] Populate DV Done
2,988,742 UART: [fht] FMC Alias Private Key: 7
2,989,710 UART: [art] Derive CDI
2,989,990 UART: [art] Store in in slot 0x4
3,075,873 UART: [art] Derive Key Pair
3,076,233 UART: [art] Store priv key in slot 0x5
3,089,587 UART: [art] Derive Key Pair - Done
3,104,400 UART: [art] Signing Cert with AUTHO
3,104,880 UART: RITY.KEYID = 7
3,119,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,755 UART: [art] PUB.X = EDE50F7A7F40BE0BBEA90B79E975896D6583FF9AE42083D018C7522D9E989D5DEE393C6ABA4AF4BB446EEB8DC1DA2383
3,127,538 UART: [art] PUB.Y = 50CD4AF7334909B0FDBD97DBBD77DADB98F848D6CB7C50901FD485BB5D1F2566CF7EC997C614C100A9E122B8F3ED86BE
3,134,485 UART: [art] SIG.R = 95BEBBFC9DEA7A91CF13E5DBB43BBEAD511E56166BBA1CE1219381298586D54F8BC2260B6ADF85D3D40294BDEBF0E8FE
3,141,277 UART: [art] SIG.S = 8F6FFD335BC51264B93687C1FD52AADD0A8656A0C6D1ABF1524447EFD206C00F90FDF67D4644E8EF2DDEBEC0B29D7E24
3,164,781 UART: Caliptra RT
3,165,034 UART: [state] CFI Enabled
3,273,052 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,250 ready_for_fw is high
1,056,250 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,515 >>> mbox cmd response: success
2,683,911 UART:
2,683,927 UART: Running Caliptra FMC ...
2,684,335 UART:
2,684,389 UART: [state] CFI Enabled
2,695,026 UART: [fht] FMC Alias Private Key: 7
2,803,069 UART: [art] Extend RT PCRs Done
2,803,497 UART: [art] Lock RT PCRs Done
2,805,183 UART: [art] Populate DV Done
2,813,530 UART: [fht] FMC Alias Private Key: 7
2,814,468 UART: [art] Derive CDI
2,814,748 UART: [art] Store in in slot 0x4
2,900,761 UART: [art] Derive Key Pair
2,901,121 UART: [art] Store priv key in slot 0x5
2,914,725 UART: [art] Derive Key Pair - Done
2,929,429 UART: [art] Signing Cert with AUTHO
2,929,909 UART: RITY.KEYID = 7
2,945,053 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,818 UART: [art] PUB.X = E0C34B2783C88C616D1B2C2838A26957A787F6E4ABEF89ACC1E8A9B48AF30AC669AEDB42545ABB67FF49CBA14A97C1E6
2,952,605 UART: [art] PUB.Y = F37C5F36024613F877A694F6B07EC27E6E75B89AA5315292DF30B082D761C0DD89FA95C11EFD13276C12CA8447BC8267
2,959,554 UART: [art] SIG.R = 8D64BD265DFD9DA0F221F73146CED0F4B2F683B4C2B59D7D75BA54A321189E88F9DC3649D43DAC9B084E9D0FF0118AD9
2,966,334 UART: [art] SIG.S = 702E8B0CD218FC7CFCA67DE3C47A6791132778B4155744F2BEF38E58D96C57B8DE07A759EE0D6BDAC55C6AF79AE68CF7
2,990,432 UART: Caliptra RT
2,990,685 UART: [state] CFI Enabled
3,098,878 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,516 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,174,316 ready_for_fw is high
1,174,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,634 UART: [idev] Erasing UDS.KEYID = 0
1,198,874 UART: [idev] Sha1 KeyId Algorithm
1,207,774 UART: [idev] --
1,208,847 UART: [ldev] ++
1,209,015 UART: [ldev] CDI.KEYID = 6
1,209,379 UART: [ldev] SUBJECT.KEYID = 5
1,209,806 UART: [ldev] AUTHORITY.KEYID = 7
1,210,269 UART: [ldev] FE.KEYID = 1
1,215,569 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,169 UART: [ldev] --
1,281,635 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,107 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,094 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,608 >>> mbox cmd response: success
2,773,667 UART: [afmc] ++
2,773,835 UART: [afmc] CDI.KEYID = 6
2,774,198 UART: [afmc] SUBJECT.KEYID = 7
2,774,624 UART: [afmc] AUTHORITY.KEYID = 5
2,810,333 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,141 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,024 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,743 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,748 UART: [afmc] --
2,853,636 UART: [cold-reset] --
2,854,664 UART: [state] Locking Datavault
2,855,955 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,559 UART: [state] Locking ICCM
2,857,095 UART: [exit] Launching FMC @ 0x40000130
2,862,424 UART:
2,862,440 UART: Running Caliptra FMC ...
2,862,848 UART:
2,862,991 UART: [state] CFI Enabled
2,873,514 UART: [fht] FMC Alias Private Key: 7
2,981,031 UART: [art] Extend RT PCRs Done
2,981,459 UART: [art] Lock RT PCRs Done
2,983,165 UART: [art] Populate DV Done
2,991,538 UART: [fht] FMC Alias Private Key: 7
2,992,620 UART: [art] Derive CDI
2,992,900 UART: [art] Store in in slot 0x4
3,079,045 UART: [art] Derive Key Pair
3,079,405 UART: [art] Store priv key in slot 0x5
3,092,797 UART: [art] Derive Key Pair - Done
3,107,508 UART: [art] Signing Cert with AUTHO
3,107,988 UART: RITY.KEYID = 7
3,123,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,251 UART: [art] PUB.X = 882E00C90771747DE90977D2694E9B2E8DCD002EA0417E242948EC0316DEC26F77D0BA1750417F72AF1C8FC60F81D293
3,130,965 UART: [art] PUB.Y = 772EFC0B284EE0AB51B5DC4ECA2B327F92119A38C8DE88B35A714A9EBB3E06C97F92BE88B546790D35C601D89446B559
3,137,913 UART: [art] SIG.R = BB67FEC4ECE21DFABB1C72FB62AC0F87CC03D3C4081A2CF58291DCABE4F13E4B57ED4C776884DB68E248334B7B1F9300
3,144,676 UART: [art] SIG.S = 5082C687C5767D46967DB1540F85C215938904E5B01B35B549B69BFDCC54B7AF90A0663C1C690A2E548BE712ABDCC932
3,168,342 UART: Caliptra RT
3,168,687 UART: [state] CFI Enabled
3,276,094 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,541 ready_for_fw is high
1,056,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,244 >>> mbox cmd response: success
2,683,544 UART:
2,683,560 UART: Running Caliptra FMC ...
2,683,968 UART:
2,684,111 UART: [state] CFI Enabled
2,694,862 UART: [fht] FMC Alias Private Key: 7
2,803,043 UART: [art] Extend RT PCRs Done
2,803,471 UART: [art] Lock RT PCRs Done
2,804,519 UART: [art] Populate DV Done
2,812,736 UART: [fht] FMC Alias Private Key: 7
2,813,880 UART: [art] Derive CDI
2,814,160 UART: [art] Store in in slot 0x4
2,899,919 UART: [art] Derive Key Pair
2,900,279 UART: [art] Store priv key in slot 0x5
2,913,519 UART: [art] Derive Key Pair - Done
2,928,611 UART: [art] Signing Cert with AUTHO
2,929,091 UART: RITY.KEYID = 7
2,944,437 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,202 UART: [art] PUB.X = C3434D358616C4932121059194367F852B2EE846779795D3A1BFF822DBCD815098C09FD190536D882EC60C2276DA7651
2,951,954 UART: [art] PUB.Y = E97EB8B7EBE7DABFD9D90ECFE8518D4C2E140A3483161E6EECEA8B6F1498D3ED2C7EF0F850296E4EE40FB33C5DC74E7E
2,958,925 UART: [art] SIG.R = 8A9FBFC5982811239900E7EF1CFC67F22F2B4A1D190975DD96945986634D188770AC7C52026DFD78F9890791A2522127
2,965,656 UART: [art] SIG.S = 7AAFA127DBE672C25C29086297D558A7DEF13D41223553E8CA76CB89E326AB667D0BBF8D2D88B2E95B424C06E0539524
2,989,584 UART: Caliptra RT
2,989,929 UART: [state] CFI Enabled
3,097,304 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
Truncated 1348007 bytes from beginning
UART: [art] Extend RT PCRs Done
3,631,853,382 UART: [art] Lock RT PCRs Done
3,631,855,051 UART: [art] Populate DV Done
3,631,860,301 UART: [fht] FMC Alias Private Key: 7
3,631,861,993 UART: [art] Derive CDI
3,631,862,815 UART: [art] Store in in slot 0x4
3,631,921,153 UART: [art] Derive Key Pair
3,631,922,253 UART: [art] Store priv key in slot 0x5
3,635,215,428 UART: [art] Derive Key Pair - Done
3,635,228,349 UART: [art] Signing Cert with AUTHO
3,635,229,655 UART: RITY.KEYID = 7
3,637,517,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,637,518,670 UART: [art] PUB.X = 34B7074249F05D66F0AA7C0BEE0821016D5DFF3D73E6AAC2D5E2C86F4799EF3EF60F2395FE5AE74B27C24E2AA7083F19
3,637,525,916 UART: [art] PUB.Y = 707431594BCA8378B2B8FAE86429E1C93E35C186605FE681D6F4F52DDD7D5116B9865CCE66E1A8E80AA9E62A2CEC063B
3,637,533,190 UART: [art] SIG.R = C1E29AFE6099DD80FC6F3BBCC6B7F390BF3E47FA2C0E17494E50E447916AAB029788F3D011AEB0C20866D73985D2BB2A
3,637,540,557 UART: [art] SIG.S = 71C0DF35D1350EFCF893BC848DD90B94FE8EB8BBF43A0A33CD79CBCF1580BA167BB269B553EA28216C36182494D9B28C
3,638,846,119 UART: Caliptra RT
3,638,846,833 UART: [state] CFI Enabled
3,639,179,489 UART: [rt] RT listening for mailbox commands...
3,639,181,371 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,639,325,402 UART:
3,639,325,701 UART: Running Caliptra ROM ...
3,639,326,818 UART:
3,639,326,977 UART: [state] CFI Enabled
3,639,392,541 UART: [state] LifecycleState = Unprovisioned
3,639,394,418 UART: [state] DebugLocked = No
3,639,397,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,639,401,815 UART: [kat] SHA2-256
3,639,571,512 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,639,582,010 UART: [kat] ++
3,639,582,570 UART: [kat] sha1
3,639,594,276 UART: [kat] SHA2-256
3,639,596,968 UART: [kat] SHA2-384
3,639,601,493 UART: [kat] SHA2-512-ACC
3,639,603,887 UART: [kat] ECC-384
3,641,899,390 UART: [kat] HMAC-384Kdf
3,641,930,950 UART: [kat] LMS
3,643,121,300 UART: [kat] --
3,643,125,614 UART: [update-reset] ++
3,647,264,696 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,647,267,926 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,647,649,206 >>> mbox cmd response: success
3,647,650,019 UART: [update-reset] Copying MAN_2 To MAN_1
3,647,672,462 UART: [update-reset Success] --
3,647,677,231 UART: [state] Locking Datavault
3,647,679,978 UART: [state] Locking PCR0, PCR1 and PCR31
3,647,681,757 UART: [state] Locking ICCM
3,647,683,072 UART: [exit] Launching FMC @ 0x40000130
3,647,691,489 UART:
3,647,691,721 UART: Running Caliptra FMC ...
3,647,692,748 UART:
3,647,692,894 UART: [state] CFI Enabled
3,647,785,711 UART: [art] Extend RT PCRs Done
3,647,786,900 UART: [art] Lock RT PCRs Done
3,647,788,547 UART: [art] Populate DV Done
3,647,794,185 UART: [fht] FMC Alias Private Key: 7
3,647,795,932 UART: [art] Derive CDI
3,647,796,666 UART: [art] Store in in slot 0x4
3,647,854,892 UART: [art] Derive Key Pair
3,647,855,931 UART: [art] Store priv key in slot 0x5
3,651,148,755 UART: [art] Derive Key Pair - Done
3,651,161,917 UART: [art] Signing Cert with AUTHO
3,651,163,232 UART: RITY.KEYID = 7
3,653,449,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,653,451,481 UART: [art] PUB.X = DD9855A41D62675FED5B24B11690D3C77EA9805B3BF66CBBD39C712FB17639FCBC2CF66D9B9FB1D1497DBDFCC7C92A8B
3,653,458,770 UART: [art] PUB.Y = 4F834F5A6D2428784EADF962F825776CD3BF97701E4C8650108EBEB75EF3AD60B13F0DAE2A0EFD3FABC4DF7B4BA9071D
3,653,466,045 UART: [art] SIG.R = C8D50AAE7530ABBD663556104152EC3CE76ED5A0912864F829CB97EE1500ECB36DE264ABCBBB6D8628E21155A77B87E4
3,653,473,417 UART: [art] SIG.S = E9F514A192B4E6FB68CACD4490F1717FFB5715D22BBE9A10E424326D1208E03DE65FE0849D146FE4BF3C36D0E010DA5C
3,654,778,173 UART: Caliptra RT
3,654,778,903 UART: [state] CFI Enabled
3,655,111,333 UART: [rt] RT listening for mailbox commands...
3,655,113,215 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,655,257,262 UART:
3,655,257,564 UART: Running Caliptra ROM ...
3,655,258,687 UART:
3,655,258,848 UART: [state] CFI Enabled
3,655,327,693 UART: [state] LifecycleState = Unprovisioned
3,655,329,614 UART: [state] DebugLocked = No
3,655,331,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,655,335,691 UART: [kat] SHA2-256
3,655,505,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,655,515,874 UART: [kat] ++
3,655,516,330 UART: [kat] sha1
3,655,526,941 UART: [kat] SHA2-256
3,655,529,629 UART: [kat] SHA2-384
3,655,536,535 UART: [kat] SHA2-512-ACC
3,655,538,932 UART: [kat] ECC-384
3,657,827,699 UART: [kat] HMAC-384Kdf
3,657,840,796 UART: [kat] LMS
3,659,031,138 UART: [kat] --
3,659,035,847 UART: [update-reset] ++
3,663,167,439 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,663,171,064 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,663,552,364 >>> mbox cmd response: success
3,663,552,772 UART: [update-reset] Copying MAN_2 To MAN_1
3,663,575,157 UART: [update-reset Success] --
3,663,577,378 UART: [state] Locking Datavault
3,663,580,741 UART: [state] Locking PCR0, PCR1 and PCR31
3,663,582,438 UART: [state] Locking ICCM
3,663,584,209 UART: [exit] Launching FMC @ 0x40000130
3,663,592,603 UART:
3,663,592,833 UART: Running Caliptra FMC ...
3,663,593,930 UART:
3,663,594,090 UART: [state] CFI Enabled
3,663,698,037 UART: [art] Extend RT PCRs Done
3,663,699,223 UART: [art] Lock RT PCRs Done
3,663,700,651 UART: [art] Populate DV Done
3,663,706,317 UART: [fht] FMC Alias Private Key: 7
3,663,707,959 UART: [art] Derive CDI
3,663,708,773 UART: [art] Store in in slot 0x4
3,663,766,746 UART: [art] Derive Key Pair
3,663,767,787 UART: [art] Store priv key in slot 0x5
3,667,060,788 UART: [art] Derive Key Pair - Done
3,667,073,744 UART: [art] Signing Cert with AUTHO
3,667,075,060 UART: RITY.KEYID = 7
3,669,362,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,364,081 UART: [art] PUB.X = 34B7074249F05D66F0AA7C0BEE0821016D5DFF3D73E6AAC2D5E2C86F4799EF3EF60F2395FE5AE74B27C24E2AA7083F19
3,669,371,313 UART: [art] PUB.Y = 707431594BCA8378B2B8FAE86429E1C93E35C186605FE681D6F4F52DDD7D5116B9865CCE66E1A8E80AA9E62A2CEC063B
3,669,378,536 UART: [art] SIG.R = C1E29AFE6099DD80FC6F3BBCC6B7F390BF3E47FA2C0E17494E50E447916AAB029788F3D011AEB0C20866D73985D2BB2A
3,669,385,965 UART: [art] SIG.S = 71C0DF35D1350EFCF893BC848DD90B94FE8EB8BBF43A0A33CD79CBCF1580BA167BB269B553EA28216C36182494D9B28C
3,670,691,494 UART: Caliptra RT
3,670,692,215 UART: [state] CFI Enabled
3,671,025,803 UART: [rt] RT listening for mailbox commands...
3,671,027,711 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,671,171,645 UART:
3,671,171,946 UART: Running Caliptra ROM ...
3,671,173,084 UART:
3,671,173,253 UART: [state] CFI Enabled
3,671,243,531 UART: [state] LifecycleState = Unprovisioned
3,671,245,465 UART: [state] DebugLocked = No
3,671,247,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,671,251,708 UART: [kat] SHA2-256
3,671,421,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,671,431,922 UART: [kat] ++
3,671,432,379 UART: [kat] sha1
3,671,444,507 UART: [kat] SHA2-256
3,671,447,196 UART: [kat] SHA2-384
3,671,453,075 UART: [kat] SHA2-512-ACC
3,671,455,425 UART: [kat] ECC-384
3,673,745,193 UART: [kat] HMAC-384Kdf
3,673,775,957 UART: [kat] LMS
3,674,966,310 UART: [kat] --
3,674,969,416 UART: [update-reset] ++
3,679,103,398 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,679,106,468 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,679,487,746 >>> mbox cmd response: success
3,679,488,320 UART: [update-reset] Copying MAN_2 To MAN_1
3,679,510,769 UART: [update-reset Success] --
3,679,514,836 UART: [state] Locking Datavault
3,679,518,569 UART: [state] Locking PCR0, PCR1 and PCR31
3,679,520,319 UART: [state] Locking ICCM
3,679,522,625 UART: [exit] Launching FMC @ 0x40000130
3,679,531,066 UART:
3,679,531,302 UART: Running Caliptra FMC ...
3,679,532,421 UART:
3,679,532,579 UART: [state] CFI Enabled
3,679,634,537 UART: [art] Extend RT PCRs Done
3,679,635,725 UART: [art] Lock RT PCRs Done
3,679,637,140 UART: [art] Populate DV Done
3,679,642,492 UART: [fht] FMC Alias Private Key: 7
3,679,644,081 UART: [art] Derive CDI
3,679,644,896 UART: [art] Store in in slot 0x4
3,679,703,244 UART: [art] Derive Key Pair
3,679,704,244 UART: [art] Store priv key in slot 0x5
3,682,996,872 UART: [art] Derive Key Pair - Done
3,683,009,629 UART: [art] Signing Cert with AUTHO
3,683,010,974 UART: RITY.KEYID = 7
3,685,299,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,685,300,539 UART: [art] PUB.X = DD9855A41D62675FED5B24B11690D3C77EA9805B3BF66CBBD39C712FB17639FCBC2CF66D9B9FB1D1497DBDFCC7C92A8B
3,685,307,819 UART: [art] PUB.Y = 4F834F5A6D2428784EADF962F825776CD3BF97701E4C8650108EBEB75EF3AD60B13F0DAE2A0EFD3FABC4DF7B4BA9071D
3,685,315,092 UART: [art] SIG.R = C8D50AAE7530ABBD663556104152EC3CE76ED5A0912864F829CB97EE1500ECB36DE264ABCBBB6D8628E21155A77B87E4
3,685,322,463 UART: [art] SIG.S = E9F514A192B4E6FB68CACD4490F1717FFB5715D22BBE9A10E424326D1208E03DE65FE0849D146FE4BF3C36D0E010DA5C
3,686,627,188 UART: Caliptra RT
3,686,627,910 UART: [state] CFI Enabled
3,686,959,823 UART: [rt] RT listening for mailbox commands...
3,686,961,709 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,687,105,664 UART:
3,687,105,958 UART: Running Caliptra ROM ...
3,687,107,072 UART:
3,687,107,237 UART: [state] CFI Enabled
3,687,176,636 UART: [state] LifecycleState = Unprovisioned
3,687,178,565 UART: [state] DebugLocked = No
3,687,181,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,687,185,547 UART: [kat] SHA2-256
3,687,355,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,687,365,728 UART: [kat] ++
3,687,366,207 UART: [kat] sha1
3,687,376,713 UART: [kat] SHA2-256
3,687,379,399 UART: [kat] SHA2-384
3,687,384,568 UART: [kat] SHA2-512-ACC
3,687,386,939 UART: [kat] ECC-384
3,689,679,934 UART: [kat] HMAC-384Kdf
3,689,690,924 UART: [kat] LMS
3,690,881,236 UART: [kat] --
3,690,885,821 UART: [update-reset] ++
3,695,022,768 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,695,026,495 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,695,407,798 >>> mbox cmd response: success
3,695,409,266 UART: [update-reset] Copying MAN_2 To MAN_1
3,695,431,704 UART: [update-reset Success] --
3,695,437,286 UART: [state] Locking Datavault
3,695,440,813 UART: [state] Locking PCR0, PCR1 and PCR31
3,695,442,564 UART: [state] Locking ICCM
3,695,444,440 UART: [exit] Launching FMC @ 0x40000130
3,695,452,831 UART:
3,695,453,065 UART: Running Caliptra FMC ...
3,695,454,185 UART:
3,695,454,346 UART: [state] CFI Enabled
3,695,547,317 UART: [art] Extend RT PCRs Done
3,695,548,503 UART: [art] Lock RT PCRs Done
3,695,550,005 UART: [art] Populate DV Done
3,695,555,410 UART: [fht] FMC Alias Private Key: 7
3,695,557,048 UART: [art] Derive CDI
3,695,557,858 UART: [art] Store in in slot 0x4
3,695,615,715 UART: [art] Derive Key Pair
3,695,616,777 UART: [art] Store priv key in slot 0x5
3,698,909,768 UART: [art] Derive Key Pair - Done
3,698,922,660 UART: [art] Signing Cert with AUTHO
3,698,923,968 UART: RITY.KEYID = 7
3,701,211,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,701,212,652 UART: [art] PUB.X = 34B7074249F05D66F0AA7C0BEE0821016D5DFF3D73E6AAC2D5E2C86F4799EF3EF60F2395FE5AE74B27C24E2AA7083F19
3,701,219,879 UART: [art] PUB.Y = 707431594BCA8378B2B8FAE86429E1C93E35C186605FE681D6F4F52DDD7D5116B9865CCE66E1A8E80AA9E62A2CEC063B
3,701,227,122 UART: [art] SIG.R = C1E29AFE6099DD80FC6F3BBCC6B7F390BF3E47FA2C0E17494E50E447916AAB029788F3D011AEB0C20866D73985D2BB2A
3,701,234,541 UART: [art] SIG.S = 71C0DF35D1350EFCF893BC848DD90B94FE8EB8BBF43A0A33CD79CBCF1580BA167BB269B553EA28216C36182494D9B28C
3,702,539,514 UART: Caliptra RT
3,702,540,228 UART: [state] CFI Enabled
3,702,874,970 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 400.21s
Truncated 716391 bytes from beginning
94BB8DE916F28C0975986BFC9C43DA6
3,700,947,580 UART: [art] SIG.R = 8D6A8E20DD4767678ADF428844802293DADAC790B4DC6B772C8E63493988E2F3F7C58A47EAE51AB47EF24CA296E5C404
3,700,954,922 UART: [art] SIG.S = 53700057CF6E1C81D4D95EA62BC36B46BA9909C3AE894084E946099F4F1D52B55873C1A727923E5E2AE8DA1DA6F37149
3,702,259,578 UART: Caliptra RT
3,702,260,282 UART: [state] CFI Enabled
3,702,593,164 UART: [rt] RT listening for mailbox commands...
3,702,595,051 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,711,330,700 >>> mbox cmd response: success
3,711,366,437 UART:
3,711,366,703 UART: Running Caliptra FMC ...
3,711,367,739 UART:
3,711,367,887 UART: [state] CFI Enabled
3,711,455,775 UART: [art] Extend RT PCRs Done
3,711,456,962 UART: [art] Lock RT PCRs Done
3,711,458,229 UART: [art] Populate DV Done
3,711,463,744 UART: [fht] FMC Alias Private Key: 7
3,711,465,270 UART: [art] Derive CDI
3,711,466,020 UART: [art] Store in in slot 0x4
3,711,524,774 UART: [art] Derive Key Pair
3,711,525,828 UART: [art] Store priv key in slot 0x5
3,714,818,385 UART: [art] Derive Key Pair - Done
3,714,831,397 UART: [art] Signing Cert with AUTHO
3,714,832,703 UART: RITY.KEYID = 7
3,717,120,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,717,121,822 UART: [art] PUB.X = B23F0A4518DE9CD945D83EA571CCE45F4A7F3AA0E7322483F466BC22A3BBE8B39BB42B4B8C89628BE110EF6C1AB18B32
3,717,129,123 UART: [art] PUB.Y = AA956B1DBBFDE1310E56BB4EDAA2A981BBD6DC3AF8F8CEEBCFBBF41B747218EEE292BD71004706AD4BB344B818469E34
3,717,136,371 UART: [art] SIG.R = 6A4C00766C5001D229F24EBA2F109A7352E5EC03E15A860FB31F3925C4CB560A4E17E4A5C9A9CE87249F3D3FBDF3E1FF
3,717,143,767 UART: [art] SIG.S = A8DFB513C3C15C20A0E3856DD9906ABCD7928F5EC687D89256593A3236D2D0878C30A3BD297841A5B07BA028FEBCD09B
3,718,449,898 UART: Caliptra RT
3,718,450,591 UART: [state] CFI Enabled
3,718,784,095 UART: [rt] RT listening for mailbox commands...
3,718,785,975 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,727,494,718 >>> mbox cmd response: success
3,727,531,604 UART:
3,727,531,876 UART: Running Caliptra FMC ...
3,727,532,907 UART:
3,727,533,055 UART: [state] CFI Enabled
3,727,626,565 UART: [art] Extend RT PCRs Done
3,727,627,749 UART: [art] Lock RT PCRs Done
3,727,629,126 UART: [art] Populate DV Done
3,727,634,529 UART: [fht] FMC Alias Private Key: 7
3,727,636,220 UART: [art] Derive CDI
3,727,636,954 UART: [art] Store in in slot 0x4
3,727,695,339 UART: [art] Derive Key Pair
3,727,696,377 UART: [art] Store priv key in slot 0x5
3,730,988,989 UART: [art] Derive Key Pair - Done
3,731,002,147 UART: [art] Signing Cert with AUTHO
3,731,003,484 UART: RITY.KEYID = 7
3,733,291,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,292,579 UART: [art] PUB.X = 23DD253124DD0AABF7D80D5485CD567BB0354295FF870123D070E64BD73EEF59F467C0608EB2E5129899097C69A7A6FD
3,733,299,784 UART: [art] PUB.Y = A4ED292741CC98D55A8A5DA7F93E62509F7A79355BDA7FE0272A9406DB1F9709294BB8DE916F28C0975986BFC9C43DA6
3,733,307,032 UART: [art] SIG.R = 8D6A8E20DD4767678ADF428844802293DADAC790B4DC6B772C8E63493988E2F3F7C58A47EAE51AB47EF24CA296E5C404
3,733,314,432 UART: [art] SIG.S = 53700057CF6E1C81D4D95EA62BC36B46BA9909C3AE894084E946099F4F1D52B55873C1A727923E5E2AE8DA1DA6F37149
3,734,619,958 UART: Caliptra RT
3,734,620,673 UART: [state] CFI Enabled
3,734,950,337 UART: [rt] RT listening for mailbox commands...
3,734,952,206 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,743,688,741 >>> mbox cmd response: success
3,743,723,014 UART:
3,743,723,320 UART: Running Caliptra FMC ...
3,743,724,364 UART:
3,743,724,515 UART: [state] CFI Enabled
3,743,814,471 UART: [art] Extend RT PCRs Done
3,743,815,684 UART: [art] Lock RT PCRs Done
3,743,817,114 UART: [art] Populate DV Done
3,743,822,494 UART: [fht] FMC Alias Private Key: 7
3,743,824,080 UART: [art] Derive CDI
3,743,824,821 UART: [art] Store in in slot 0x4
3,743,883,476 UART: [art] Derive Key Pair
3,743,884,515 UART: [art] Store priv key in slot 0x5
3,747,177,553 UART: [art] Derive Key Pair - Done
3,747,190,608 UART: [art] Signing Cert with AUTHO
3,747,191,917 UART: RITY.KEYID = 7
3,749,478,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,749,480,121 UART: [art] PUB.X = B23F0A4518DE9CD945D83EA571CCE45F4A7F3AA0E7322483F466BC22A3BBE8B39BB42B4B8C89628BE110EF6C1AB18B32
3,749,487,383 UART: [art] PUB.Y = AA956B1DBBFDE1310E56BB4EDAA2A981BBD6DC3AF8F8CEEBCFBBF41B747218EEE292BD71004706AD4BB344B818469E34
3,749,494,635 UART: [art] SIG.R = 6A4C00766C5001D229F24EBA2F109A7352E5EC03E15A860FB31F3925C4CB560A4E17E4A5C9A9CE87249F3D3FBDF3E1FF
3,749,502,027 UART: [art] SIG.S = A8DFB513C3C15C20A0E3856DD9906ABCD7928F5EC687D89256593A3236D2D0878C30A3BD297841A5B07BA028FEBCD09B
3,750,807,793 UART: Caliptra RT
3,750,808,501 UART: [state] CFI Enabled
3,751,140,539 UART: [rt] RT listening for mailbox commands...
3,751,142,464 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,759,857,859 >>> mbox cmd response: success
3,759,894,236 UART:
3,759,894,536 UART: Running Caliptra FMC ...
3,759,895,570 UART:
3,759,895,718 UART: [state] CFI Enabled
3,759,983,176 UART: [art] Extend RT PCRs Done
3,759,984,361 UART: [art] Lock RT PCRs Done
3,759,985,896 UART: [art] Populate DV Done
3,759,991,460 UART: [fht] FMC Alias Private Key: 7
3,759,993,101 UART: [art] Derive CDI
3,759,993,915 UART: [art] Store in in slot 0x4
3,760,052,242 UART: [art] Derive Key Pair
3,760,053,284 UART: [art] Store priv key in slot 0x5
3,763,346,151 UART: [art] Derive Key Pair - Done
3,763,359,096 UART: [art] Signing Cert with AUTHO
3,763,360,422 UART: RITY.KEYID = 7
3,765,647,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,765,649,070 UART: [art] PUB.X = 23DD253124DD0AABF7D80D5485CD567BB0354295FF870123D070E64BD73EEF59F467C0608EB2E5129899097C69A7A6FD
3,765,656,332 UART: [art] PUB.Y = A4ED292741CC98D55A8A5DA7F93E62509F7A79355BDA7FE0272A9406DB1F9709294BB8DE916F28C0975986BFC9C43DA6
3,765,663,567 UART: [art] SIG.R = 8D6A8E20DD4767678ADF428844802293DADAC790B4DC6B772C8E63493988E2F3F7C58A47EAE51AB47EF24CA296E5C404
3,765,670,918 UART: [art] SIG.S = 53700057CF6E1C81D4D95EA62BC36B46BA9909C3AE894084E946099F4F1D52B55873C1A727923E5E2AE8DA1DA6F37149
3,766,976,243 UART: Caliptra RT
3,766,976,947 UART: [state] CFI Enabled
3,767,327,449 UART: [rt] RT listening for mailbox commands...
3,767,329,337 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,776,072,683 >>> mbox cmd response: success
3,776,107,016 UART:
3,776,107,289 UART: Running Caliptra FMC ...
3,776,108,320 UART:
3,776,108,466 UART: [state] CFI Enabled
3,776,212,930 UART: [art] Extend RT PCRs Done
3,776,214,146 UART: [art] Lock RT PCRs Done
3,776,215,584 UART: [art] Populate DV Done
3,776,221,372 UART: [fht] FMC Alias Private Key: 7
3,776,223,013 UART: [art] Derive CDI
3,776,223,752 UART: [art] Store in in slot 0x4
3,776,281,922 UART: [art] Derive Key Pair
3,776,282,952 UART: [art] Store priv key in slot 0x5
3,779,575,792 UART: [art] Derive Key Pair - Done
3,779,588,896 UART: [art] Signing Cert with AUTHO
3,779,590,201 UART: RITY.KEYID = 7
3,781,878,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,781,879,645 UART: [art] PUB.X = B23F0A4518DE9CD945D83EA571CCE45F4A7F3AA0E7322483F466BC22A3BBE8B39BB42B4B8C89628BE110EF6C1AB18B32
3,781,886,923 UART: [art] PUB.Y = AA956B1DBBFDE1310E56BB4EDAA2A981BBD6DC3AF8F8CEEBCFBBF41B747218EEE292BD71004706AD4BB344B818469E34
3,781,894,168 UART: [art] SIG.R = 6A4C00766C5001D229F24EBA2F109A7352E5EC03E15A860FB31F3925C4CB560A4E17E4A5C9A9CE87249F3D3FBDF3E1FF
3,781,901,569 UART: [art] SIG.S = A8DFB513C3C15C20A0E3856DD9906ABCD7928F5EC687D89256593A3236D2D0878C30A3BD297841A5B07BA028FEBCD09B
3,783,206,581 UART: Caliptra RT
3,783,207,290 UART: [state] CFI Enabled
3,783,536,074 UART: [rt] RT listening for mailbox commands...
3,783,537,958 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,792,280,626 >>> mbox cmd response: success
3,792,315,209 UART:
3,792,315,507 UART: Running Caliptra FMC ...
3,792,316,544 UART:
3,792,316,693 UART: [state] CFI Enabled
3,792,404,987 UART: [art] Extend RT PCRs Done
3,792,406,167 UART: [art] Lock RT PCRs Done
3,792,407,485 UART: [art] Populate DV Done
3,792,412,755 UART: [fht] FMC Alias Private Key: 7
3,792,414,454 UART: [art] Derive CDI
3,792,415,192 UART: [art] Store in in slot 0x4
3,792,474,157 UART: [art] Derive Key Pair
3,792,475,212 UART: [art] Store priv key in slot 0x5
3,795,768,037 UART: [art] Derive Key Pair - Done
3,795,781,147 UART: [art] Signing Cert with AUTHO
3,795,782,453 UART: RITY.KEYID = 7
3,798,070,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,798,071,780 UART: [art] PUB.X = 23DD253124DD0AABF7D80D5485CD567BB0354295FF870123D070E64BD73EEF59F467C0608EB2E5129899097C69A7A6FD
3,798,078,980 UART: [art] PUB.Y = A4ED292741CC98D55A8A5DA7F93E62509F7A79355BDA7FE0272A9406DB1F9709294BB8DE916F28C0975986BFC9C43DA6
3,798,086,224 UART: [art] SIG.R = 8D6A8E20DD4767678ADF428844802293DADAC790B4DC6B772C8E63493988E2F3F7C58A47EAE51AB47EF24CA296E5C404
3,798,093,620 UART: [art] SIG.S = 53700057CF6E1C81D4D95EA62BC36B46BA9909C3AE894084E946099F4F1D52B55873C1A727923E5E2AE8DA1DA6F37149
3,799,398,719 UART: Caliptra RT
3,799,399,435 UART: [state] CFI Enabled
3,799,731,158 UART: [rt] RT listening for mailbox commands...
3,799,733,034 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,808,477,023 >>> mbox cmd response: success
3,808,511,854 UART:
3,808,512,118 UART: Running Caliptra FMC ...
3,808,513,150 UART:
3,808,513,319 UART: [state] CFI Enabled
3,808,615,070 UART: [art] Extend RT PCRs Done
3,808,616,291 UART: [art] Lock RT PCRs Done
3,808,618,014 UART: [art] Populate DV Done
3,808,623,480 UART: [fht] FMC Alias Private Key: 7
3,808,625,010 UART: [art] Derive CDI
3,808,625,747 UART: [art] Store in in slot 0x4
3,808,683,865 UART: [art] Derive Key Pair
3,808,684,902 UART: [art] Store priv key in slot 0x5
3,811,978,050 UART: [art] Derive Key Pair - Done
3,811,991,049 UART: [art] Signing Cert with AUTHO
3,811,992,359 UART: RITY.KEYID = 7
3,814,278,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,814,279,908 UART: [art] PUB.X = B23F0A4518DE9CD945D83EA571CCE45F4A7F3AA0E7322483F466BC22A3BBE8B39BB42B4B8C89628BE110EF6C1AB18B32
3,814,287,188 UART: [art] PUB.Y = AA956B1DBBFDE1310E56BB4EDAA2A981BBD6DC3AF8F8CEEBCFBBF41B747218EEE292BD71004706AD4BB344B818469E34
3,814,294,440 UART: [art] SIG.R = 6A4C00766C5001D229F24EBA2F109A7352E5EC03E15A860FB31F3925C4CB560A4E17E4A5C9A9CE87249F3D3FBDF3E1FF
3,814,301,813 UART: [art] SIG.S = A8DFB513C3C15C20A0E3856DD9906ABCD7928F5EC687D89256593A3236D2D0878C30A3BD297841A5B07BA028FEBCD09B
3,815,607,225 UART: Caliptra RT
3,815,607,937 UART: [state] CFI Enabled
3,815,940,236 UART: [rt] RT listening for mailbox commands...
3,815,942,115 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,824,680,227 >>> mbox cmd response: success
3,824,715,753 UART:
3,824,716,054 UART: Running Caliptra FMC ...
3,824,717,176 UART:
3,824,717,331 UART: [state] CFI Enabled
3,824,823,339 UART: [art] Extend RT PCRs Done
3,824,824,522 UART: [art] Lock RT PCRs Done
3,824,826,082 UART: [art] Populate DV Done
3,824,831,759 UART: [fht] FMC Alias Private Key: 7
3,824,833,446 UART: [art] Derive CDI
3,824,834,250 UART: [art] Store in in slot 0x4
3,824,892,325 UART: [art] Derive Key Pair
3,824,893,367 UART: [art] Store priv key in slot 0x5
3,828,185,975 UART: [art] Derive Key Pair - Done
3,828,198,863 UART: [art] Signing Cert with AUTHO
3,828,200,163 UART: RITY.KEYID = 7
3,830,487,146 UART: [art] Erasing AUTHORITY.KEYID = 7
3,830,488,654 UART: [art] PUB.X = 23DD253124DD0AABF7D80D5485CD567BB0354295FF870123D070E64BD73EEF59F467C0608EB2E5129899097C69A7A6FD
3,830,495,917 UART: [art] PUB.Y = A4ED292741CC98D55A8A5DA7F93E62509F7A79355BDA7FE0272A9406DB1F9709294BB8DE916F28C0975986BFC9C43DA6
3,830,503,153 UART: [art] SIG.R = 8D6A8E20DD4767678ADF428844802293DADAC790B4DC6B772C8E63493988E2F3F7C58A47EAE51AB47EF24CA296E5C404
3,830,510,549 UART: [art] SIG.S = 53700057CF6E1C81D4D95EA62BC36B46BA9909C3AE894084E946099F4F1D52B55873C1A727923E5E2AE8DA1DA6F37149
3,831,815,649 UART: Caliptra RT
3,831,816,362 UART: [state] CFI Enabled
3,832,149,036 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 406.68s
Truncated 1347769 bytes from beginning
UART: [art] Extend RT PCRs Done
3,517,744,027 UART: [art] Lock RT PCRs Done
3,517,745,332 UART: [art] Populate DV Done
3,517,751,116 UART: [fht] FMC Alias Private Key: 7
3,517,752,665 UART: [art] Derive CDI
3,517,753,483 UART: [art] Store in in slot 0x4
3,517,796,185 UART: [art] Derive Key Pair
3,517,797,185 UART: [art] Store priv key in slot 0x5
3,521,038,762 UART: [art] Derive Key Pair - Done
3,521,051,495 UART: [art] Signing Cert with AUTHO
3,521,052,810 UART: RITY.KEYID = 7
3,523,331,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,523,333,407 UART: [art] PUB.X = 2DFE7076B4B70A2B2E74146B1E6D20001DEF4E4AA0E58CF47F71D489A0AC40D0A5BE1A70AA3A9ED423AFEA9C64599B89
3,523,340,673 UART: [art] PUB.Y = 4FDBA1410F119AD636689EC833CAF3B543EC1CB16A63A6C456C5C0F12F02E44BB50A9953C617390AED620413665A661B
3,523,347,972 UART: [art] SIG.R = 2C2F8310439E8FB482F7F825B5CF15D0D9D52B6DDBB065634E06585A07D6BE4B82921C1D0FA2EECE20DE157507996A7E
3,523,355,326 UART: [art] SIG.S = CD4FA3C1B0EBB8397FCDDEAE8C4047443C032CC983DEA3CC7735408FF7340958970E61B474E4555DC6D79B1ADAC25CA1
3,524,660,483 UART: Caliptra RT
3,524,661,212 UART: [state] CFI Enabled
3,524,946,686 UART: [rt] RT listening for mailbox commands...
3,524,948,555 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,525,092,758 UART:
3,525,093,066 UART: Running Caliptra ROM ...
3,525,094,194 UART:
3,525,094,422 UART: [state] CFI Enabled
3,525,109,774 UART: [state] LifecycleState = Unprovisioned
3,525,111,668 UART: [state] DebugLocked = No
3,525,113,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,525,117,998 UART: [kat] SHA2-256
3,525,287,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,525,298,241 UART: [kat] ++
3,525,298,732 UART: [kat] sha1
3,525,310,275 UART: [kat] SHA2-256
3,525,312,969 UART: [kat] SHA2-384
3,525,317,568 UART: [kat] SHA2-512-ACC
3,525,319,919 UART: [kat] ECC-384
3,527,606,683 UART: [kat] HMAC-384Kdf
3,527,618,690 UART: [kat] LMS
3,528,808,756 UART: [kat] --
3,528,814,433 UART: [update-reset] ++
3,532,962,850 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,532,966,402 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,533,347,669 >>> mbox cmd response: success
3,533,348,913 UART: [update-reset] Copying MAN_2 To MAN_1
3,533,371,356 UART: [update-reset Success] --
3,533,376,872 UART: [state] Locking Datavault
3,533,379,848 UART: [state] Locking PCR0, PCR1 and PCR31
3,533,381,599 UART: [state] Locking ICCM
3,533,384,101 UART: [exit] Launching FMC @ 0x40000130
3,533,392,546 UART:
3,533,392,797 UART: Running Caliptra FMC ...
3,533,393,828 UART:
3,533,393,983 UART: [state] CFI Enabled
3,533,438,594 UART: [art] Extend RT PCRs Done
3,533,439,778 UART: [art] Lock RT PCRs Done
3,533,441,433 UART: [art] Populate DV Done
3,533,446,949 UART: [fht] FMC Alias Private Key: 7
3,533,448,649 UART: [art] Derive CDI
3,533,449,389 UART: [art] Store in in slot 0x4
3,533,492,140 UART: [art] Derive Key Pair
3,533,493,176 UART: [art] Store priv key in slot 0x5
3,536,735,459 UART: [art] Derive Key Pair - Done
3,536,748,189 UART: [art] Signing Cert with AUTHO
3,536,749,501 UART: RITY.KEYID = 7
3,539,028,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,539,030,209 UART: [art] PUB.X = D6DCA08EE836CE31B97C840E5AB57CEA1B60DB5DF049A86843CDB2F992A0563FB2B28C93DD9AA7EA4ECC01C936163E28
3,539,037,501 UART: [art] PUB.Y = EA3189CC453B8792353B75825B3F59527093091C615A9C9EA0A187566FDA3713A77AD2046ECC4388CDC486892142E982
3,539,044,721 UART: [art] SIG.R = 2B931F7AAF91F179A718D88584867F5277DBE7A00B7C1CC5AB43814855AFF691FD6690C4E82B0130590CAC4DB60C3423
3,539,052,076 UART: [art] SIG.S = 8897ABE6408B21EDA8AFFFC2BF804BBDF1EE077512413838F992F75397F36B8B3E2585A8E2054D79BB5E715F82BB2419
3,540,357,188 UART: Caliptra RT
3,540,357,905 UART: [state] CFI Enabled
3,540,643,598 UART: [rt] RT listening for mailbox commands...
3,540,645,474 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,540,789,352 UART:
3,540,789,657 UART: Running Caliptra ROM ...
3,540,790,725 UART:
3,540,790,995 UART: [state] CFI Enabled
3,540,807,913 UART: [state] LifecycleState = Unprovisioned
3,540,809,823 UART: [state] DebugLocked = No
3,540,812,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,540,816,909 UART: [kat] SHA2-256
3,540,986,630 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,540,997,204 UART: [kat] ++
3,540,997,754 UART: [kat] sha1
3,541,007,893 UART: [kat] SHA2-256
3,541,010,594 UART: [kat] SHA2-384
3,541,015,518 UART: [kat] SHA2-512-ACC
3,541,017,880 UART: [kat] ECC-384
3,543,302,036 UART: [kat] HMAC-384Kdf
3,543,313,834 UART: [kat] LMS
3,544,503,933 UART: [kat] --
3,544,509,391 UART: [update-reset] ++
3,548,647,245 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,548,651,113 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,549,032,426 >>> mbox cmd response: success
3,549,033,190 UART: [update-reset] Copying MAN_2 To MAN_1
3,549,055,583 UART: [update-reset Success] --
3,549,060,035 UART: [state] Locking Datavault
3,549,063,535 UART: [state] Locking PCR0, PCR1 and PCR31
3,549,065,304 UART: [state] Locking ICCM
3,549,066,763 UART: [exit] Launching FMC @ 0x40000130
3,549,075,224 UART:
3,549,075,465 UART: Running Caliptra FMC ...
3,549,076,576 UART:
3,549,076,745 UART: [state] CFI Enabled
3,549,120,494 UART: [art] Extend RT PCRs Done
3,549,121,685 UART: [art] Lock RT PCRs Done
3,549,123,246 UART: [art] Populate DV Done
3,549,128,714 UART: [fht] FMC Alias Private Key: 7
3,549,130,310 UART: [art] Derive CDI
3,549,131,128 UART: [art] Store in in slot 0x4
3,549,173,450 UART: [art] Derive Key Pair
3,549,174,490 UART: [art] Store priv key in slot 0x5
3,552,416,653 UART: [art] Derive Key Pair - Done
3,552,429,824 UART: [art] Signing Cert with AUTHO
3,552,431,135 UART: RITY.KEYID = 7
3,554,710,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,712,402 UART: [art] PUB.X = 2DFE7076B4B70A2B2E74146B1E6D20001DEF4E4AA0E58CF47F71D489A0AC40D0A5BE1A70AA3A9ED423AFEA9C64599B89
3,554,719,664 UART: [art] PUB.Y = 4FDBA1410F119AD636689EC833CAF3B543EC1CB16A63A6C456C5C0F12F02E44BB50A9953C617390AED620413665A661B
3,554,726,921 UART: [art] SIG.R = 2C2F8310439E8FB482F7F825B5CF15D0D9D52B6DDBB065634E06585A07D6BE4B82921C1D0FA2EECE20DE157507996A7E
3,554,734,328 UART: [art] SIG.S = CD4FA3C1B0EBB8397FCDDEAE8C4047443C032CC983DEA3CC7735408FF7340958970E61B474E4555DC6D79B1ADAC25CA1
3,556,039,166 UART: Caliptra RT
3,556,039,892 UART: [state] CFI Enabled
3,556,328,330 UART: [rt] RT listening for mailbox commands...
3,556,330,208 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,556,474,369 UART:
3,556,474,675 UART: Running Caliptra ROM ...
3,556,475,798 UART:
3,556,475,977 UART: [state] CFI Enabled
3,556,490,525 UART: [state] LifecycleState = Unprovisioned
3,556,492,448 UART: [state] DebugLocked = No
3,556,495,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,556,500,083 UART: [kat] SHA2-256
3,556,669,809 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,556,680,323 UART: [kat] ++
3,556,680,808 UART: [kat] sha1
3,556,691,935 UART: [kat] SHA2-256
3,556,694,632 UART: [kat] SHA2-384
3,556,699,495 UART: [kat] SHA2-512-ACC
3,556,701,845 UART: [kat] ECC-384
3,558,985,187 UART: [kat] HMAC-384Kdf
3,558,997,037 UART: [kat] LMS
3,560,187,126 UART: [kat] --
3,560,190,479 UART: [update-reset] ++
3,564,328,705 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,564,332,856 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,564,714,145 >>> mbox cmd response: success
3,564,714,852 UART: [update-reset] Copying MAN_2 To MAN_1
3,564,737,297 UART: [update-reset Success] --
3,564,740,778 UART: [state] Locking Datavault
3,564,743,112 UART: [state] Locking PCR0, PCR1 and PCR31
3,564,744,813 UART: [state] Locking ICCM
3,564,746,185 UART: [exit] Launching FMC @ 0x40000130
3,564,754,634 UART:
3,564,754,866 UART: Running Caliptra FMC ...
3,564,755,897 UART:
3,564,756,050 UART: [state] CFI Enabled
3,564,800,015 UART: [art] Extend RT PCRs Done
3,564,801,210 UART: [art] Lock RT PCRs Done
3,564,802,700 UART: [art] Populate DV Done
3,564,808,164 UART: [fht] FMC Alias Private Key: 7
3,564,809,767 UART: [art] Derive CDI
3,564,810,607 UART: [art] Store in in slot 0x4
3,564,852,933 UART: [art] Derive Key Pair
3,564,853,985 UART: [art] Store priv key in slot 0x5
3,568,096,333 UART: [art] Derive Key Pair - Done
3,568,109,336 UART: [art] Signing Cert with AUTHO
3,568,110,648 UART: RITY.KEYID = 7
3,570,389,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,570,391,255 UART: [art] PUB.X = D6DCA08EE836CE31B97C840E5AB57CEA1B60DB5DF049A86843CDB2F992A0563FB2B28C93DD9AA7EA4ECC01C936163E28
3,570,398,532 UART: [art] PUB.Y = EA3189CC453B8792353B75825B3F59527093091C615A9C9EA0A187566FDA3713A77AD2046ECC4388CDC486892142E982
3,570,405,772 UART: [art] SIG.R = 2B931F7AAF91F179A718D88584867F5277DBE7A00B7C1CC5AB43814855AFF691FD6690C4E82B0130590CAC4DB60C3423
3,570,413,128 UART: [art] SIG.S = 8897ABE6408B21EDA8AFFFC2BF804BBDF1EE077512413838F992F75397F36B8B3E2585A8E2054D79BB5E715F82BB2419
3,571,718,774 UART: Caliptra RT
3,571,719,486 UART: [state] CFI Enabled
3,572,003,507 UART: [rt] RT listening for mailbox commands...
3,572,005,389 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,572,149,416 UART:
3,572,149,740 UART: Running Caliptra ROM ...
3,572,150,868 UART:
3,572,151,090 UART: [state] CFI Enabled
3,572,166,664 UART: [state] LifecycleState = Unprovisioned
3,572,168,549 UART: [state] DebugLocked = No
3,572,171,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,572,176,871 UART: [kat] SHA2-256
3,572,346,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,572,357,121 UART: [kat] ++
3,572,357,586 UART: [kat] sha1
3,572,368,159 UART: [kat] SHA2-256
3,572,370,839 UART: [kat] SHA2-384
3,572,377,266 UART: [kat] SHA2-512-ACC
3,572,379,666 UART: [kat] ECC-384
3,574,662,577 UART: [kat] HMAC-384Kdf
3,574,675,118 UART: [kat] LMS
3,575,865,186 UART: [kat] --
3,575,868,295 UART: [update-reset] ++
3,580,005,317 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,580,008,788 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
3,580,390,081 >>> mbox cmd response: success
3,580,391,018 UART: [update-reset] Copying MAN_2 To MAN_1
3,580,413,425 UART: [update-reset Success] --
3,580,417,343 UART: [state] Locking Datavault
3,580,420,709 UART: [state] Locking PCR0, PCR1 and PCR31
3,580,422,408 UART: [state] Locking ICCM
3,580,423,866 UART: [exit] Launching FMC @ 0x40000130
3,580,432,319 UART:
3,580,432,558 UART: Running Caliptra FMC ...
3,580,433,664 UART:
3,580,433,829 UART: [state] CFI Enabled
3,580,477,964 UART: [art] Extend RT PCRs Done
3,580,479,170 UART: [art] Lock RT PCRs Done
3,580,480,580 UART: [art] Populate DV Done
3,580,485,996 UART: [fht] FMC Alias Private Key: 7
3,580,487,641 UART: [art] Derive CDI
3,580,488,386 UART: [art] Store in in slot 0x4
3,580,530,968 UART: [art] Derive Key Pair
3,580,532,006 UART: [art] Store priv key in slot 0x5
3,583,773,653 UART: [art] Derive Key Pair - Done
3,583,786,355 UART: [art] Signing Cert with AUTHO
3,583,787,685 UART: RITY.KEYID = 7
3,586,067,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,586,068,652 UART: [art] PUB.X = 2DFE7076B4B70A2B2E74146B1E6D20001DEF4E4AA0E58CF47F71D489A0AC40D0A5BE1A70AA3A9ED423AFEA9C64599B89
3,586,075,983 UART: [art] PUB.Y = 4FDBA1410F119AD636689EC833CAF3B543EC1CB16A63A6C456C5C0F12F02E44BB50A9953C617390AED620413665A661B
3,586,083,182 UART: [art] SIG.R = 2C2F8310439E8FB482F7F825B5CF15D0D9D52B6DDBB065634E06585A07D6BE4B82921C1D0FA2EECE20DE157507996A7E
3,586,090,597 UART: [art] SIG.S = CD4FA3C1B0EBB8397FCDDEAE8C4047443C032CC983DEA3CC7735408FF7340958970E61B474E4555DC6D79B1ADAC25CA1
3,587,396,446 UART: Caliptra RT
3,587,397,166 UART: [state] CFI Enabled
3,587,684,239 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 394.46s
Truncated 716351 bytes from beginning
B40546B09FA2687895E54C71D2FA51C
3,630,974,038 UART: [art] SIG.R = 61395E691A53B50F14F2CD82128B8394C9DCCB843113221543683623C16E6BD75BE45842C247E63B5A8BD1A1A6E9CE41
3,630,981,390 UART: [art] SIG.S = C11783A2FEAEAC9A569C82AC4B7985EDC984F4CAC064DB45E0F1A9B5DF30A99A14A93446B3A8521C9B696BDA67E270CB
3,632,286,827 UART: Caliptra RT
3,632,287,545 UART: [state] CFI Enabled
3,632,582,461 UART: [rt] RT listening for mailbox commands...
3,632,584,334 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,641,241,171 >>> mbox cmd response: success
3,641,277,021 UART:
3,641,277,345 UART: Running Caliptra FMC ...
3,641,278,470 UART:
3,641,278,640 UART: [state] CFI Enabled
3,641,322,498 UART: [art] Extend RT PCRs Done
3,641,323,647 UART: [art] Lock RT PCRs Done
3,641,325,213 UART: [art] Populate DV Done
3,641,330,620 UART: [fht] FMC Alias Private Key: 7
3,641,332,339 UART: [art] Derive CDI
3,641,333,091 UART: [art] Store in in slot 0x4
3,641,376,045 UART: [art] Derive Key Pair
3,641,377,050 UART: [art] Store priv key in slot 0x5
3,644,619,011 UART: [art] Derive Key Pair - Done
3,644,631,880 UART: [art] Signing Cert with AUTHO
3,644,633,187 UART: RITY.KEYID = 7
3,646,912,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,646,914,187 UART: [art] PUB.X = 083DCBDBBD8786068F1E775C38430943D8B93CF68B12DED2669336FD0C535080B4C8E79910045929020511C84DBCD0B8
3,646,921,475 UART: [art] PUB.Y = 77C3208DD5DC1C534A051D36D45D56BA152F8047FB3CCBB281952C6EE8A3CB6C6F0A6688C6750BE1F53031F6E630F337
3,646,928,686 UART: [art] SIG.R = 3B01E73C195001C88C224835F00C318E1048AA4C4D775698B844A309AB8FF93399D8AEE8329AAFE1BD36FA94CD9C0BFF
3,646,936,086 UART: [art] SIG.S = B8F4E32FAD2262302EB5F64682DD5090C0D8DF1EA903FE7780E248BB0C8A4446B0E64507097E3032A6F490D5D152834B
3,648,241,351 UART: Caliptra RT
3,648,242,046 UART: [state] CFI Enabled
3,648,532,529 UART: [rt] RT listening for mailbox commands...
3,648,534,418 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,657,706,682 >>> mbox cmd response: success
3,657,742,001 UART:
3,657,742,345 UART: Running Caliptra FMC ...
3,657,743,469 UART:
3,657,743,642 UART: [state] CFI Enabled
3,657,787,065 UART: [art] Extend RT PCRs Done
3,657,788,219 UART: [art] Lock RT PCRs Done
3,657,789,513 UART: [art] Populate DV Done
3,657,795,251 UART: [fht] FMC Alias Private Key: 7
3,657,796,862 UART: [art] Derive CDI
3,657,797,689 UART: [art] Store in in slot 0x4
3,657,840,341 UART: [art] Derive Key Pair
3,657,841,383 UART: [art] Store priv key in slot 0x5
3,661,083,204 UART: [art] Derive Key Pair - Done
3,661,096,049 UART: [art] Signing Cert with AUTHO
3,661,097,418 UART: RITY.KEYID = 7
3,663,377,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,378,560 UART: [art] PUB.X = B26240041B56ABC480F2CC5A9371C0B52272973A9EA79C9BBC68BCC557BFA6F2D73216FBD9F4F07443CD6A644CC04A15
3,663,385,855 UART: [art] PUB.Y = C386E431B03BB38773B4782804F0A3713F9DCE35682C72C73E07294AF06F5FE34B40546B09FA2687895E54C71D2FA51C
3,663,393,054 UART: [art] SIG.R = 61395E691A53B50F14F2CD82128B8394C9DCCB843113221543683623C16E6BD75BE45842C247E63B5A8BD1A1A6E9CE41
3,663,400,408 UART: [art] SIG.S = C11783A2FEAEAC9A569C82AC4B7985EDC984F4CAC064DB45E0F1A9B5DF30A99A14A93446B3A8521C9B696BDA67E270CB
3,664,705,788 UART: Caliptra RT
3,664,706,492 UART: [state] CFI Enabled
3,664,997,242 UART: [rt] RT listening for mailbox commands...
3,664,999,125 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,673,652,775 >>> mbox cmd response: success
3,673,685,494 UART:
3,673,685,774 UART: Running Caliptra FMC ...
3,673,686,891 UART:
3,673,687,054 UART: [state] CFI Enabled
3,673,731,195 UART: [art] Extend RT PCRs Done
3,673,732,385 UART: [art] Lock RT PCRs Done
3,673,734,067 UART: [art] Populate DV Done
3,673,739,457 UART: [fht] FMC Alias Private Key: 7
3,673,741,160 UART: [art] Derive CDI
3,673,741,978 UART: [art] Store in in slot 0x4
3,673,784,626 UART: [art] Derive Key Pair
3,673,785,632 UART: [art] Store priv key in slot 0x5
3,677,028,274 UART: [art] Derive Key Pair - Done
3,677,041,655 UART: [art] Signing Cert with AUTHO
3,677,042,971 UART: RITY.KEYID = 7
3,679,322,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,323,660 UART: [art] PUB.X = 083DCBDBBD8786068F1E775C38430943D8B93CF68B12DED2669336FD0C535080B4C8E79910045929020511C84DBCD0B8
3,679,330,868 UART: [art] PUB.Y = 77C3208DD5DC1C534A051D36D45D56BA152F8047FB3CCBB281952C6EE8A3CB6C6F0A6688C6750BE1F53031F6E630F337
3,679,338,141 UART: [art] SIG.R = 3B01E73C195001C88C224835F00C318E1048AA4C4D775698B844A309AB8FF93399D8AEE8329AAFE1BD36FA94CD9C0BFF
3,679,345,506 UART: [art] SIG.S = B8F4E32FAD2262302EB5F64682DD5090C0D8DF1EA903FE7780E248BB0C8A4446B0E64507097E3032A6F490D5D152834B
3,680,650,415 UART: Caliptra RT
3,680,651,131 UART: [state] CFI Enabled
3,680,938,697 UART: [rt] RT listening for mailbox commands...
3,680,940,569 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,689,581,345 >>> mbox cmd response: success
3,689,617,946 UART:
3,689,618,220 UART: Running Caliptra FMC ...
3,689,619,336 UART:
3,689,619,499 UART: [state] CFI Enabled
3,689,663,478 UART: [art] Extend RT PCRs Done
3,689,664,669 UART: [art] Lock RT PCRs Done
3,689,666,201 UART: [art] Populate DV Done
3,689,671,829 UART: [fht] FMC Alias Private Key: 7
3,689,673,532 UART: [art] Derive CDI
3,689,674,350 UART: [art] Store in in slot 0x4
3,689,716,888 UART: [art] Derive Key Pair
3,689,717,893 UART: [art] Store priv key in slot 0x5
3,692,959,915 UART: [art] Derive Key Pair - Done
3,692,972,754 UART: [art] Signing Cert with AUTHO
3,692,974,055 UART: RITY.KEYID = 7
3,695,253,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,695,255,299 UART: [art] PUB.X = B26240041B56ABC480F2CC5A9371C0B52272973A9EA79C9BBC68BCC557BFA6F2D73216FBD9F4F07443CD6A644CC04A15
3,695,262,559 UART: [art] PUB.Y = C386E431B03BB38773B4782804F0A3713F9DCE35682C72C73E07294AF06F5FE34B40546B09FA2687895E54C71D2FA51C
3,695,269,806 UART: [art] SIG.R = 61395E691A53B50F14F2CD82128B8394C9DCCB843113221543683623C16E6BD75BE45842C247E63B5A8BD1A1A6E9CE41
3,695,277,150 UART: [art] SIG.S = C11783A2FEAEAC9A569C82AC4B7985EDC984F4CAC064DB45E0F1A9B5DF30A99A14A93446B3A8521C9B696BDA67E270CB
3,696,582,234 UART: Caliptra RT
3,696,582,959 UART: [state] CFI Enabled
3,696,872,182 UART: [rt] RT listening for mailbox commands...
3,696,874,054 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,705,526,218 >>> mbox cmd response: success
3,705,558,224 UART:
3,705,558,496 UART: Running Caliptra FMC ...
3,705,559,613 UART:
3,705,559,786 UART: [state] CFI Enabled
3,705,603,549 UART: [art] Extend RT PCRs Done
3,705,604,767 UART: [art] Lock RT PCRs Done
3,705,606,306 UART: [art] Populate DV Done
3,705,611,615 UART: [fht] FMC Alias Private Key: 7
3,705,613,317 UART: [art] Derive CDI
3,705,614,135 UART: [art] Store in in slot 0x4
3,705,656,306 UART: [art] Derive Key Pair
3,705,657,351 UART: [art] Store priv key in slot 0x5
3,708,899,932 UART: [art] Derive Key Pair - Done
3,708,913,105 UART: [art] Signing Cert with AUTHO
3,708,914,418 UART: RITY.KEYID = 7
3,711,193,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,711,195,130 UART: [art] PUB.X = 083DCBDBBD8786068F1E775C38430943D8B93CF68B12DED2669336FD0C535080B4C8E79910045929020511C84DBCD0B8
3,711,202,342 UART: [art] PUB.Y = 77C3208DD5DC1C534A051D36D45D56BA152F8047FB3CCBB281952C6EE8A3CB6C6F0A6688C6750BE1F53031F6E630F337
3,711,209,582 UART: [art] SIG.R = 3B01E73C195001C88C224835F00C318E1048AA4C4D775698B844A309AB8FF93399D8AEE8329AAFE1BD36FA94CD9C0BFF
3,711,216,984 UART: [art] SIG.S = B8F4E32FAD2262302EB5F64682DD5090C0D8DF1EA903FE7780E248BB0C8A4446B0E64507097E3032A6F490D5D152834B
3,712,522,023 UART: Caliptra RT
3,712,522,734 UART: [state] CFI Enabled
3,712,811,212 UART: [rt] RT listening for mailbox commands...
3,712,813,079 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,721,462,411 >>> mbox cmd response: success
3,721,496,447 UART:
3,721,496,745 UART: Running Caliptra FMC ...
3,721,497,865 UART:
3,721,498,056 UART: [state] CFI Enabled
3,721,541,890 UART: [art] Extend RT PCRs Done
3,721,543,046 UART: [art] Lock RT PCRs Done
3,721,544,503 UART: [art] Populate DV Done
3,721,550,179 UART: [fht] FMC Alias Private Key: 7
3,721,551,778 UART: [art] Derive CDI
3,721,552,595 UART: [art] Store in in slot 0x4
3,721,595,210 UART: [art] Derive Key Pair
3,721,596,253 UART: [art] Store priv key in slot 0x5
3,724,838,313 UART: [art] Derive Key Pair - Done
3,724,851,200 UART: [art] Signing Cert with AUTHO
3,724,852,689 UART: RITY.KEYID = 7
3,727,131,915 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,133,421 UART: [art] PUB.X = B26240041B56ABC480F2CC5A9371C0B52272973A9EA79C9BBC68BCC557BFA6F2D73216FBD9F4F07443CD6A644CC04A15
3,727,140,685 UART: [art] PUB.Y = C386E431B03BB38773B4782804F0A3713F9DCE35682C72C73E07294AF06F5FE34B40546B09FA2687895E54C71D2FA51C
3,727,147,873 UART: [art] SIG.R = 61395E691A53B50F14F2CD82128B8394C9DCCB843113221543683623C16E6BD75BE45842C247E63B5A8BD1A1A6E9CE41
3,727,155,217 UART: [art] SIG.S = C11783A2FEAEAC9A569C82AC4B7985EDC984F4CAC064DB45E0F1A9B5DF30A99A14A93446B3A8521C9B696BDA67E270CB
3,728,460,702 UART: Caliptra RT
3,728,461,408 UART: [state] CFI Enabled
3,728,754,887 UART: [rt] RT listening for mailbox commands...
3,728,756,766 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,737,938,500 >>> mbox cmd response: success
3,737,969,959 UART:
3,737,970,238 UART: Running Caliptra FMC ...
3,737,971,358 UART:
3,737,972,089 UART: [state] CFI Enabled
3,738,015,707 UART: [art] Extend RT PCRs Done
3,738,016,869 UART: [art] Lock RT PCRs Done
3,738,018,438 UART: [art] Populate DV Done
3,738,024,015 UART: [fht] FMC Alias Private Key: 7
3,738,025,703 UART: [art] Derive CDI
3,738,026,526 UART: [art] Store in in slot 0x4
3,738,068,869 UART: [art] Derive Key Pair
3,738,069,940 UART: [art] Store priv key in slot 0x5
3,741,311,837 UART: [art] Derive Key Pair - Done
3,741,324,781 UART: [art] Signing Cert with AUTHO
3,741,326,084 UART: RITY.KEYID = 7
3,743,605,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,743,607,293 UART: [art] PUB.X = 083DCBDBBD8786068F1E775C38430943D8B93CF68B12DED2669336FD0C535080B4C8E79910045929020511C84DBCD0B8
3,743,614,518 UART: [art] PUB.Y = 77C3208DD5DC1C534A051D36D45D56BA152F8047FB3CCBB281952C6EE8A3CB6C6F0A6688C6750BE1F53031F6E630F337
3,743,621,757 UART: [art] SIG.R = 3B01E73C195001C88C224835F00C318E1048AA4C4D775698B844A309AB8FF93399D8AEE8329AAFE1BD36FA94CD9C0BFF
3,743,629,159 UART: [art] SIG.S = B8F4E32FAD2262302EB5F64682DD5090C0D8DF1EA903FE7780E248BB0C8A4446B0E64507097E3032A6F490D5D152834B
3,744,934,895 UART: Caliptra RT
3,744,935,605 UART: [state] CFI Enabled
3,745,227,116 UART: [rt] RT listening for mailbox commands...
3,745,228,989 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,753,876,606 >>> mbox cmd response: success
3,753,912,024 UART:
3,753,912,332 UART: Running Caliptra FMC ...
3,753,913,478 UART:
3,753,913,653 UART: [state] CFI Enabled
3,753,957,899 UART: [art] Extend RT PCRs Done
3,753,959,055 UART: [art] Lock RT PCRs Done
3,753,960,402 UART: [art] Populate DV Done
3,753,965,874 UART: [fht] FMC Alias Private Key: 7
3,753,967,629 UART: [art] Derive CDI
3,753,968,450 UART: [art] Store in in slot 0x4
3,754,011,376 UART: [art] Derive Key Pair
3,754,012,424 UART: [art] Store priv key in slot 0x5
3,757,254,391 UART: [art] Derive Key Pair - Done
3,757,267,279 UART: [art] Signing Cert with AUTHO
3,757,268,583 UART: RITY.KEYID = 7
3,759,548,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,759,549,943 UART: [art] PUB.X = B26240041B56ABC480F2CC5A9371C0B52272973A9EA79C9BBC68BCC557BFA6F2D73216FBD9F4F07443CD6A644CC04A15
3,759,557,200 UART: [art] PUB.Y = C386E431B03BB38773B4782804F0A3713F9DCE35682C72C73E07294AF06F5FE34B40546B09FA2687895E54C71D2FA51C
3,759,564,461 UART: [art] SIG.R = 61395E691A53B50F14F2CD82128B8394C9DCCB843113221543683623C16E6BD75BE45842C247E63B5A8BD1A1A6E9CE41
3,759,572,011 UART: [art] SIG.S = C11783A2FEAEAC9A569C82AC4B7985EDC984F4CAC064DB45E0F1A9B5DF30A99A14A93446B3A8521C9B696BDA67E270CB
3,760,877,049 UART: Caliptra RT
3,760,877,764 UART: [state] CFI Enabled
3,761,162,414 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 403.14s
Truncated 1329468 bytes from beginning
RT:
2,177,239,658 UART: Running Caliptra FMC ...
2,177,240,766 UART:
2,177,240,934 UART: [state] CFI Enabled
2,177,341,013 UART: [art] Extend RT PCRs Done
2,177,342,211 UART: [art] Lock RT PCRs Done
2,177,343,840 UART: [art] Populate DV Done
2,177,349,470 UART: [fht] FMC Alias Private Key: 7
2,177,351,063 UART: [art] Derive CDI
2,177,351,886 UART: [art] Store in in slot 0x4
2,177,409,959 UART: [art] Derive Key Pair
2,177,410,965 UART: [art] Store priv key in slot 0x5
2,179,874,046 UART: [art] Derive Key Pair - Done
2,179,887,229 UART: [art] Signing Cert with AUTHO
2,179,888,545 UART: RITY.KEYID = 7
2,181,600,009 UART: [art] Erasing AUTHORITY.KEYID = 7
2,181,601,532 UART: [art] PUB.X = 5B6D1BB83451827D4E7BDA8326F5F940EE9C78A5A2AD85F0499EC8FEE8252A5CCF6E7C0EF0875279822A1A54340C844B
2,181,608,742 UART: [art] PUB.Y = 42989FC3D00A4E573ED489C3C75A56C65B6B1266BDA0B2EAB309E8FB7B9874ECFD713AE6F2003B87D140F0135870FD4F
2,181,616,055 UART: [art] SIG.R = DC126117EA9FF2622D3A859516904C431C171CDCB759C01E475F4B0BE8F1ACBE6A67DA1F51CD4E14D6AD02C82FF90433
2,181,623,436 UART: [art] SIG.S = 2A765B9775B765B4DAE3BC8A54CC901E59B2A445B9C32A5E869505F22D80C7A2A89A891D85929454F6731DDC95AFFA5F
2,182,602,224 UART: Caliptra RT
2,182,602,916 UART: [state] CFI Enabled
2,182,938,003 UART: [rt] RT listening for mailbox commands...
2,182,939,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,183,084,526 UART:
2,183,084,849 UART: Running Caliptra ROM ...
2,183,085,984 UART:
2,183,086,154 UART: [state] CFI Enabled
2,183,154,936 UART: [state] LifecycleState = Unprovisioned
2,183,156,839 UART: [state] DebugLocked = No
2,183,158,372 UART: [state] WD Timer not started. Device not locked for debugging
2,183,161,962 UART: [kat] SHA2-256
2,183,341,056 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,183,352,648 UART: [kat] ++
2,183,353,196 UART: [kat] sha1
2,183,364,578 UART: [kat] SHA2-256
2,183,367,601 UART: [kat] SHA2-384
2,183,374,456 UART: [kat] SHA2-512-ACC
2,183,377,405 UART: [kat] ECC-384
2,185,840,901 UART: [kat] HMAC-384Kdf
2,185,862,269 UART: [kat] LMS
2,186,391,747 UART: [kat] --
2,186,396,774 UART: [update-reset] ++
2,189,825,127 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,189,829,161 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,190,211,506 >>> mbox cmd response: success
2,190,212,972 UART: [update-reset] Copying MAN_2 To MAN_1
2,190,235,309 UART: [update-reset Success] --
2,190,238,617 UART: [state] Locking Datavault
2,190,242,312 UART: [state] Locking PCR0, PCR1 and PCR31
2,190,244,027 UART: [state] Locking ICCM
2,190,245,161 UART: [exit] Launching FMC @ 0x40000130
2,190,253,619 UART:
2,190,253,859 UART: Running Caliptra FMC ...
2,190,254,965 UART:
2,190,255,128 UART: [state] CFI Enabled
2,190,354,278 UART: [art] Extend RT PCRs Done
2,190,355,464 UART: [art] Lock RT PCRs Done
2,190,356,974 UART: [art] Populate DV Done
2,190,362,437 UART: [fht] FMC Alias Private Key: 7
2,190,363,975 UART: [art] Derive CDI
2,190,364,811 UART: [art] Store in in slot 0x4
2,190,423,261 UART: [art] Derive Key Pair
2,190,424,331 UART: [art] Store priv key in slot 0x5
2,192,887,830 UART: [art] Derive Key Pair - Done
2,192,900,771 UART: [art] Signing Cert with AUTHO
2,192,902,075 UART: RITY.KEYID = 7
2,194,613,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,194,615,056 UART: [art] PUB.X = F9EC6641262FA5ED1D6CF129D15DA4699B69223A1901A65D984694EDA5D94AD72D3E8B3757EBAB14987BAF19B5FB7A6E
2,194,622,355 UART: [art] PUB.Y = EEB4FBFB928ABF657E612B770FD250C27DE6BDD7989469C5BA261B829C0784540CE03D0F17CDFEC7970244272C374F83
2,194,629,578 UART: [art] SIG.R = ED1DC0C3B796DAA02ABD46F83B94FE0C47D1B458E35FBB561594519F8E0A7C01B94BEDC8F0D0A98169B51DC63573276C
2,194,637,000 UART: [art] SIG.S = CC4CDF9754D62DC6B5D7EA17EBD45B8E427A91A4F1BB81E1AB336BDAAF3527EC4986070552E74094527B18D7B680D81F
2,195,616,217 UART: Caliptra RT
2,195,616,925 UART: [state] CFI Enabled
2,195,947,632 UART: [rt] RT listening for mailbox commands...
2,195,949,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,196,094,000 UART:
2,196,094,330 UART: Running Caliptra ROM ...
2,196,095,464 UART:
2,196,095,640 UART: [state] CFI Enabled
2,196,169,059 UART: [state] LifecycleState = Unprovisioned
2,196,170,943 UART: [state] DebugLocked = No
2,196,173,607 UART: [state] WD Timer not started. Device not locked for debugging
2,196,177,570 UART: [kat] SHA2-256
2,196,356,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,196,368,282 UART: [kat] ++
2,196,368,743 UART: [kat] sha1
2,196,379,147 UART: [kat] SHA2-256
2,196,382,163 UART: [kat] SHA2-384
2,196,389,106 UART: [kat] SHA2-512-ACC
2,196,392,067 UART: [kat] ECC-384
2,198,852,582 UART: [kat] HMAC-384Kdf
2,198,876,569 UART: [kat] LMS
2,199,406,064 UART: [kat] --
2,199,408,927 UART: [update-reset] ++
2,202,833,824 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,202,837,371 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,203,219,711 >>> mbox cmd response: success
2,203,221,230 UART: [update-reset] Copying MAN_2 To MAN_1
2,203,243,572 UART: [update-reset Success] --
2,203,248,999 UART: [state] Locking Datavault
2,203,252,200 UART: [state] Locking PCR0, PCR1 and PCR31
2,203,253,903 UART: [state] Locking ICCM
2,203,256,443 UART: [exit] Launching FMC @ 0x40000130
2,203,264,914 UART:
2,203,265,204 UART: Running Caliptra FMC ...
2,203,266,319 UART:
2,203,266,488 UART: [state] CFI Enabled
2,203,368,119 UART: [art] Extend RT PCRs Done
2,203,369,327 UART: [art] Lock RT PCRs Done
2,203,370,846 UART: [art] Populate DV Done
2,203,376,315 UART: [fht] FMC Alias Private Key: 7
2,203,377,852 UART: [art] Derive CDI
2,203,378,668 UART: [art] Store in in slot 0x4
2,203,437,070 UART: [art] Derive Key Pair
2,203,438,115 UART: [art] Store priv key in slot 0x5
2,205,900,998 UART: [art] Derive Key Pair - Done
2,205,913,679 UART: [art] Signing Cert with AUTHO
2,205,914,989 UART: RITY.KEYID = 7
2,207,626,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,207,628,483 UART: [art] PUB.X = 5B6D1BB83451827D4E7BDA8326F5F940EE9C78A5A2AD85F0499EC8FEE8252A5CCF6E7C0EF0875279822A1A54340C844B
2,207,635,750 UART: [art] PUB.Y = 42989FC3D00A4E573ED489C3C75A56C65B6B1266BDA0B2EAB309E8FB7B9874ECFD713AE6F2003B87D140F0135870FD4F
2,207,643,056 UART: [art] SIG.R = DC126117EA9FF2622D3A859516904C431C171CDCB759C01E475F4B0BE8F1ACBE6A67DA1F51CD4E14D6AD02C82FF90433
2,207,650,431 UART: [art] SIG.S = 2A765B9775B765B4DAE3BC8A54CC901E59B2A445B9C32A5E869505F22D80C7A2A89A891D85929454F6731DDC95AFFA5F
2,208,629,583 UART: Caliptra RT
2,208,630,322 UART: [state] CFI Enabled
2,208,964,927 UART: [rt] RT listening for mailbox commands...
2,208,966,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,209,111,180 UART:
2,209,111,482 UART: Running Caliptra ROM ...
2,209,112,556 UART:
2,209,112,714 UART: [state] CFI Enabled
2,209,186,229 UART: [state] LifecycleState = Unprovisioned
2,209,188,109 UART: [state] DebugLocked = No
2,209,190,368 UART: [state] WD Timer not started. Device not locked for debugging
2,209,193,687 UART: [kat] SHA2-256
2,209,372,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,209,384,338 UART: [kat] ++
2,209,384,800 UART: [kat] sha1
2,209,395,039 UART: [kat] SHA2-256
2,209,398,063 UART: [kat] SHA2-384
2,209,403,968 UART: [kat] SHA2-512-ACC
2,209,406,917 UART: [kat] ECC-384
2,211,867,823 UART: [kat] HMAC-384Kdf
2,211,889,404 UART: [kat] LMS
2,212,418,856 UART: [kat] --
2,212,423,250 UART: [update-reset] ++
2,215,853,393 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,215,856,175 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,216,238,510 >>> mbox cmd response: success
2,216,239,546 UART: [update-reset] Copying MAN_2 To MAN_1
2,216,261,888 UART: [update-reset Success] --
2,216,266,448 UART: [state] Locking Datavault
2,216,269,603 UART: [state] Locking PCR0, PCR1 and PCR31
2,216,271,311 UART: [state] Locking ICCM
2,216,273,091 UART: [exit] Launching FMC @ 0x40000130
2,216,281,558 UART:
2,216,281,812 UART: Running Caliptra FMC ...
2,216,282,920 UART:
2,216,283,082 UART: [state] CFI Enabled
2,216,381,858 UART: [art] Extend RT PCRs Done
2,216,383,066 UART: [art] Lock RT PCRs Done
2,216,384,264 UART: [art] Populate DV Done
2,216,389,783 UART: [fht] FMC Alias Private Key: 7
2,216,391,375 UART: [art] Derive CDI
2,216,392,196 UART: [art] Store in in slot 0x4
2,216,450,697 UART: [art] Derive Key Pair
2,216,451,703 UART: [art] Store priv key in slot 0x5
2,218,914,789 UART: [art] Derive Key Pair - Done
2,218,928,057 UART: [art] Signing Cert with AUTHO
2,218,929,363 UART: RITY.KEYID = 7
2,220,640,681 UART: [art] Erasing AUTHORITY.KEYID = 7
2,220,642,189 UART: [art] PUB.X = F9EC6641262FA5ED1D6CF129D15DA4699B69223A1901A65D984694EDA5D94AD72D3E8B3757EBAB14987BAF19B5FB7A6E
2,220,649,467 UART: [art] PUB.Y = EEB4FBFB928ABF657E612B770FD250C27DE6BDD7989469C5BA261B829C0784540CE03D0F17CDFEC7970244272C374F83
2,220,656,730 UART: [art] SIG.R = ED1DC0C3B796DAA02ABD46F83B94FE0C47D1B458E35FBB561594519F8E0A7C01B94BEDC8F0D0A98169B51DC63573276C
2,220,664,090 UART: [art] SIG.S = CC4CDF9754D62DC6B5D7EA17EBD45B8E427A91A4F1BB81E1AB336BDAAF3527EC4986070552E74094527B18D7B680D81F
2,221,643,587 UART: Caliptra RT
2,221,644,296 UART: [state] CFI Enabled
2,221,980,407 UART: [rt] RT listening for mailbox commands...
2,221,982,409 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,222,126,461 UART:
2,222,126,764 UART: Running Caliptra ROM ...
2,222,127,885 UART:
2,222,128,055 UART: [state] CFI Enabled
2,222,195,694 UART: [state] LifecycleState = Unprovisioned
2,222,197,542 UART: [state] DebugLocked = No
2,222,200,338 UART: [state] WD Timer not started. Device not locked for debugging
2,222,204,743 UART: [kat] SHA2-256
2,222,383,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,222,395,422 UART: [kat] ++
2,222,395,970 UART: [kat] sha1
2,222,406,111 UART: [kat] SHA2-256
2,222,409,129 UART: [kat] SHA2-384
2,222,416,952 UART: [kat] SHA2-512-ACC
2,222,419,909 UART: [kat] ECC-384
2,224,878,856 UART: [kat] HMAC-384Kdf
2,224,903,235 UART: [kat] LMS
2,225,432,698 UART: [kat] --
2,225,437,445 UART: [update-reset] ++
2,228,868,612 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,228,871,778 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,229,254,113 >>> mbox cmd response: success
2,229,255,147 UART: [update-reset] Copying MAN_2 To MAN_1
2,229,277,490 UART: [update-reset Success] --
2,229,280,792 UART: [state] Locking Datavault
2,229,285,426 UART: [state] Locking PCR0, PCR1 and PCR31
2,229,287,082 UART: [state] Locking ICCM
2,229,289,301 UART: [exit] Launching FMC @ 0x40000130
2,229,297,717 UART:
2,229,297,960 UART: Running Caliptra FMC ...
2,229,299,070 UART:
2,229,299,244 UART: [state] CFI Enabled
2,229,394,662 UART: [art] Extend RT PCRs Done
2,229,395,851 UART: [art] Lock RT PCRs Done
2,229,397,201 UART: [art] Populate DV Done
2,229,402,723 UART: [fht] FMC Alias Private Key: 7
2,229,404,318 UART: [art] Derive CDI
2,229,405,147 UART: [art] Store in in slot 0x4
2,229,464,076 UART: [art] Derive Key Pair
2,229,465,119 UART: [art] Store priv key in slot 0x5
2,231,928,172 UART: [art] Derive Key Pair - Done
2,231,940,822 UART: [art] Signing Cert with AUTHO
2,231,942,136 UART: RITY.KEYID = 7
2,233,653,861 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,655,373 UART: [art] PUB.X = 5B6D1BB83451827D4E7BDA8326F5F940EE9C78A5A2AD85F0499EC8FEE8252A5CCF6E7C0EF0875279822A1A54340C844B
2,233,662,658 UART: [art] PUB.Y = 42989FC3D00A4E573ED489C3C75A56C65B6B1266BDA0B2EAB309E8FB7B9874ECFD713AE6F2003B87D140F0135870FD4F
2,233,669,868 UART: [art] SIG.R = DC126117EA9FF2622D3A859516904C431C171CDCB759C01E475F4B0BE8F1ACBE6A67DA1F51CD4E14D6AD02C82FF90433
2,233,677,293 UART: [art] SIG.S = 2A765B9775B765B4DAE3BC8A54CC901E59B2A445B9C32A5E869505F22D80C7A2A89A891D85929454F6731DDC95AFFA5F
2,234,656,317 UART: Caliptra RT
2,234,657,010 UART: [state] CFI Enabled
2,234,992,087 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 326.82s
Truncated 714803 bytes from beginning
18029CFD5D3AD6818218224887D9CAC
2,054,916,673 UART: [art] SIG.R = 5D12B0722EAD828460B2F87E3102023C725364C411D60E2CCCB970D0511DB253FDE31B1D201254C91F402F542D99C5C7
2,054,924,072 UART: [art] SIG.S = DB6F9997B4E8024FD5F32CD876D97BF1CAF36CC65A9C80D101485544A75FFE1B476ED8CC01CD1ACA93CEE924CFC7AAC3
2,055,903,254 UART: Caliptra RT
2,055,903,971 UART: [state] CFI Enabled
2,056,242,962 UART: [rt] RT listening for mailbox commands...
2,056,244,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,063,353,676 >>> mbox cmd response: success
2,063,387,953 UART:
2,063,388,263 UART: Running Caliptra FMC ...
2,063,389,398 UART:
2,063,389,578 UART: [state] CFI Enabled
2,063,480,367 UART: [art] Extend RT PCRs Done
2,063,481,565 UART: [art] Lock RT PCRs Done
2,063,483,086 UART: [art] Populate DV Done
2,063,488,614 UART: [fht] FMC Alias Private Key: 7
2,063,490,264 UART: [art] Derive CDI
2,063,491,086 UART: [art] Store in in slot 0x4
2,063,548,963 UART: [art] Derive Key Pair
2,063,550,012 UART: [art] Store priv key in slot 0x5
2,066,013,241 UART: [art] Derive Key Pair - Done
2,066,025,925 UART: [art] Signing Cert with AUTHO
2,066,027,235 UART: RITY.KEYID = 7
2,067,739,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,067,740,656 UART: [art] PUB.X = F42A58B5CB9759C5696F6BB3E4211DC0209C6D8F031D87A0AC0B059EABDF3E0F637D4D669BB24635335C500799AA6D44
2,067,747,993 UART: [art] PUB.Y = 038F3D47C6BE0CB4826D87129106F7E47833FC7E85F2D0B739933472B1E6D27C5332494039A89968D01E4ABED14CC214
2,067,755,190 UART: [art] SIG.R = 5174C1F953B67E707DFAC6A1931EEBBBEA1E75A53C760DEC3064F534D47EECFD11353BA37F5B6236007E687880A8EEEC
2,067,762,585 UART: [art] SIG.S = C121D0BB4647A5045054B3E6F3F928E01591495E73F22533699DABE4E5000B529EE922030C2F63218341024B3208A2B7
2,068,741,665 UART: Caliptra RT
2,068,742,369 UART: [state] CFI Enabled
2,069,077,669 UART: [rt] RT listening for mailbox commands...
2,069,079,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,076,186,871 >>> mbox cmd response: success
2,076,221,809 UART:
2,076,222,083 UART: Running Caliptra FMC ...
2,076,223,205 UART:
2,076,223,376 UART: [state] CFI Enabled
2,076,320,975 UART: [art] Extend RT PCRs Done
2,076,322,196 UART: [art] Lock RT PCRs Done
2,076,323,451 UART: [art] Populate DV Done
2,076,328,937 UART: [fht] FMC Alias Private Key: 7
2,076,330,604 UART: [art] Derive CDI
2,076,331,431 UART: [art] Store in in slot 0x4
2,076,389,729 UART: [art] Derive Key Pair
2,076,390,748 UART: [art] Store priv key in slot 0x5
2,078,853,585 UART: [art] Derive Key Pair - Done
2,078,866,491 UART: [art] Signing Cert with AUTHO
2,078,867,804 UART: RITY.KEYID = 7
2,080,579,747 UART: [art] Erasing AUTHORITY.KEYID = 7
2,080,581,259 UART: [art] PUB.X = 80A75846AFCD7A06DCD9801EB16F11A213A1F410E9C5D0FA42984823DEE0FA15EDA6A69EA92AA51CDAE351587C99D1AB
2,080,588,509 UART: [art] PUB.Y = B5EFA4EFB8CEA6A1CCFCD16F988F5E444836D9320731B03212F213EA3C9F5033A18029CFD5D3AD6818218224887D9CAC
2,080,595,798 UART: [art] SIG.R = 5D12B0722EAD828460B2F87E3102023C725364C411D60E2CCCB970D0511DB253FDE31B1D201254C91F402F542D99C5C7
2,080,603,196 UART: [art] SIG.S = DB6F9997B4E8024FD5F32CD876D97BF1CAF36CC65A9C80D101485544A75FFE1B476ED8CC01CD1ACA93CEE924CFC7AAC3
2,081,582,150 UART: Caliptra RT
2,081,582,846 UART: [state] CFI Enabled
2,081,920,469 UART: [rt] RT listening for mailbox commands...
2,081,922,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,089,042,190 >>> mbox cmd response: success
2,089,074,931 UART:
2,089,075,248 UART: Running Caliptra FMC ...
2,089,076,400 UART:
2,089,076,575 UART: [state] CFI Enabled
2,089,181,184 UART: [art] Extend RT PCRs Done
2,089,182,373 UART: [art] Lock RT PCRs Done
2,089,183,675 UART: [art] Populate DV Done
2,089,189,148 UART: [fht] FMC Alias Private Key: 7
2,089,190,807 UART: [art] Derive CDI
2,089,191,630 UART: [art] Store in in slot 0x4
2,089,250,027 UART: [art] Derive Key Pair
2,089,251,071 UART: [art] Store priv key in slot 0x5
2,091,713,868 UART: [art] Derive Key Pair - Done
2,091,726,865 UART: [art] Signing Cert with AUTHO
2,091,728,181 UART: RITY.KEYID = 7
2,093,440,261 UART: [art] Erasing AUTHORITY.KEYID = 7
2,093,441,778 UART: [art] PUB.X = F42A58B5CB9759C5696F6BB3E4211DC0209C6D8F031D87A0AC0B059EABDF3E0F637D4D669BB24635335C500799AA6D44
2,093,449,047 UART: [art] PUB.Y = 038F3D47C6BE0CB4826D87129106F7E47833FC7E85F2D0B739933472B1E6D27C5332494039A89968D01E4ABED14CC214
2,093,456,314 UART: [art] SIG.R = 5174C1F953B67E707DFAC6A1931EEBBBEA1E75A53C760DEC3064F534D47EECFD11353BA37F5B6236007E687880A8EEEC
2,093,463,720 UART: [art] SIG.S = C121D0BB4647A5045054B3E6F3F928E01591495E73F22533699DABE4E5000B529EE922030C2F63218341024B3208A2B7
2,094,442,337 UART: Caliptra RT
2,094,443,032 UART: [state] CFI Enabled
2,094,780,655 UART: [rt] RT listening for mailbox commands...
2,094,782,540 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,101,920,651 >>> mbox cmd response: success
2,101,957,564 UART:
2,101,957,919 UART: Running Caliptra FMC ...
2,101,958,971 UART:
2,101,959,131 UART: [state] CFI Enabled
2,102,045,826 UART: [art] Extend RT PCRs Done
2,102,047,027 UART: [art] Lock RT PCRs Done
2,102,048,386 UART: [art] Populate DV Done
2,102,053,963 UART: [fht] FMC Alias Private Key: 7
2,102,055,611 UART: [art] Derive CDI
2,102,056,451 UART: [art] Store in in slot 0x4
2,102,114,100 UART: [art] Derive Key Pair
2,102,115,148 UART: [art] Store priv key in slot 0x5
2,104,578,308 UART: [art] Derive Key Pair - Done
2,104,591,466 UART: [art] Signing Cert with AUTHO
2,104,592,770 UART: RITY.KEYID = 7
2,106,304,150 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,305,653 UART: [art] PUB.X = 80A75846AFCD7A06DCD9801EB16F11A213A1F410E9C5D0FA42984823DEE0FA15EDA6A69EA92AA51CDAE351587C99D1AB
2,106,312,952 UART: [art] PUB.Y = B5EFA4EFB8CEA6A1CCFCD16F988F5E444836D9320731B03212F213EA3C9F5033A18029CFD5D3AD6818218224887D9CAC
2,106,320,236 UART: [art] SIG.R = 5D12B0722EAD828460B2F87E3102023C725364C411D60E2CCCB970D0511DB253FDE31B1D201254C91F402F542D99C5C7
2,106,327,654 UART: [art] SIG.S = DB6F9997B4E8024FD5F32CD876D97BF1CAF36CC65A9C80D101485544A75FFE1B476ED8CC01CD1ACA93CEE924CFC7AAC3
2,107,306,885 UART: Caliptra RT
2,107,307,598 UART: [state] CFI Enabled
2,107,640,924 UART: [rt] RT listening for mailbox commands...
2,107,642,799 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,114,767,505 >>> mbox cmd response: success
2,114,801,766 UART:
2,114,802,045 UART: Running Caliptra FMC ...
2,114,803,169 UART:
2,114,803,339 UART: [state] CFI Enabled
2,114,909,704 UART: [art] Extend RT PCRs Done
2,114,910,901 UART: [art] Lock RT PCRs Done
2,114,912,578 UART: [art] Populate DV Done
2,114,918,148 UART: [fht] FMC Alias Private Key: 7
2,114,919,689 UART: [art] Derive CDI
2,114,920,507 UART: [art] Store in in slot 0x4
2,114,978,677 UART: [art] Derive Key Pair
2,114,979,715 UART: [art] Store priv key in slot 0x5
2,117,442,576 UART: [art] Derive Key Pair - Done
2,117,455,446 UART: [art] Signing Cert with AUTHO
2,117,456,803 UART: RITY.KEYID = 7
2,119,168,376 UART: [art] Erasing AUTHORITY.KEYID = 7
2,119,169,900 UART: [art] PUB.X = F42A58B5CB9759C5696F6BB3E4211DC0209C6D8F031D87A0AC0B059EABDF3E0F637D4D669BB24635335C500799AA6D44
2,119,177,147 UART: [art] PUB.Y = 038F3D47C6BE0CB4826D87129106F7E47833FC7E85F2D0B739933472B1E6D27C5332494039A89968D01E4ABED14CC214
2,119,184,380 UART: [art] SIG.R = 5174C1F953B67E707DFAC6A1931EEBBBEA1E75A53C760DEC3064F534D47EECFD11353BA37F5B6236007E687880A8EEEC
2,119,191,769 UART: [art] SIG.S = C121D0BB4647A5045054B3E6F3F928E01591495E73F22533699DABE4E5000B529EE922030C2F63218341024B3208A2B7
2,120,170,285 UART: Caliptra RT
2,120,171,000 UART: [state] CFI Enabled
2,120,504,656 UART: [rt] RT listening for mailbox commands...
2,120,506,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,127,620,151 >>> mbox cmd response: success
2,127,655,343 UART:
2,127,655,617 UART: Running Caliptra FMC ...
2,127,656,739 UART:
2,127,656,902 UART: [state] CFI Enabled
2,127,751,381 UART: [art] Extend RT PCRs Done
2,127,752,566 UART: [art] Lock RT PCRs Done
2,127,754,136 UART: [art] Populate DV Done
2,127,759,633 UART: [fht] FMC Alias Private Key: 7
2,127,761,294 UART: [art] Derive CDI
2,127,762,113 UART: [art] Store in in slot 0x4
2,127,821,332 UART: [art] Derive Key Pair
2,127,822,376 UART: [art] Store priv key in slot 0x5
2,130,284,560 UART: [art] Derive Key Pair - Done
2,130,297,353 UART: [art] Signing Cert with AUTHO
2,130,298,664 UART: RITY.KEYID = 7
2,132,011,212 UART: [art] Erasing AUTHORITY.KEYID = 7
2,132,012,716 UART: [art] PUB.X = 80A75846AFCD7A06DCD9801EB16F11A213A1F410E9C5D0FA42984823DEE0FA15EDA6A69EA92AA51CDAE351587C99D1AB
2,132,020,020 UART: [art] PUB.Y = B5EFA4EFB8CEA6A1CCFCD16F988F5E444836D9320731B03212F213EA3C9F5033A18029CFD5D3AD6818218224887D9CAC
2,132,027,252 UART: [art] SIG.R = 5D12B0722EAD828460B2F87E3102023C725364C411D60E2CCCB970D0511DB253FDE31B1D201254C91F402F542D99C5C7
2,132,034,655 UART: [art] SIG.S = DB6F9997B4E8024FD5F32CD876D97BF1CAF36CC65A9C80D101485544A75FFE1B476ED8CC01CD1ACA93CEE924CFC7AAC3
2,133,013,874 UART: Caliptra RT
2,133,014,596 UART: [state] CFI Enabled
2,133,350,223 UART: [rt] RT listening for mailbox commands...
2,133,352,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,140,494,190 >>> mbox cmd response: success
2,140,527,933 UART:
2,140,528,212 UART: Running Caliptra FMC ...
2,140,529,335 UART:
2,140,529,506 UART: [state] CFI Enabled
2,140,617,358 UART: [art] Extend RT PCRs Done
2,140,618,571 UART: [art] Lock RT PCRs Done
2,140,620,095 UART: [art] Populate DV Done
2,140,625,571 UART: [fht] FMC Alias Private Key: 7
2,140,627,166 UART: [art] Derive CDI
2,140,627,983 UART: [art] Store in in slot 0x4
2,140,686,721 UART: [art] Derive Key Pair
2,140,687,767 UART: [art] Store priv key in slot 0x5
2,143,150,080 UART: [art] Derive Key Pair - Done
2,143,162,765 UART: [art] Signing Cert with AUTHO
2,143,164,089 UART: RITY.KEYID = 7
2,144,876,193 UART: [art] Erasing AUTHORITY.KEYID = 7
2,144,877,703 UART: [art] PUB.X = F42A58B5CB9759C5696F6BB3E4211DC0209C6D8F031D87A0AC0B059EABDF3E0F637D4D669BB24635335C500799AA6D44
2,144,884,951 UART: [art] PUB.Y = 038F3D47C6BE0CB4826D87129106F7E47833FC7E85F2D0B739933472B1E6D27C5332494039A89968D01E4ABED14CC214
2,144,892,199 UART: [art] SIG.R = 5174C1F953B67E707DFAC6A1931EEBBBEA1E75A53C760DEC3064F534D47EECFD11353BA37F5B6236007E687880A8EEEC
2,144,899,596 UART: [art] SIG.S = C121D0BB4647A5045054B3E6F3F928E01591495E73F22533699DABE4E5000B529EE922030C2F63218341024B3208A2B7
2,145,879,289 UART: Caliptra RT
2,145,879,981 UART: [state] CFI Enabled
2,146,221,206 UART: [rt] RT listening for mailbox commands...
2,146,223,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,153,334,456 >>> mbox cmd response: success
2,153,371,967 UART:
2,153,372,325 UART: Running Caliptra FMC ...
2,153,373,379 UART:
2,153,373,531 UART: [state] CFI Enabled
2,153,479,760 UART: [art] Extend RT PCRs Done
2,153,480,975 UART: [art] Lock RT PCRs Done
2,153,482,112 UART: [art] Populate DV Done
2,153,487,855 UART: [fht] FMC Alias Private Key: 7
2,153,489,514 UART: [art] Derive CDI
2,153,490,336 UART: [art] Store in in slot 0x4
2,153,548,783 UART: [art] Derive Key Pair
2,153,549,825 UART: [art] Store priv key in slot 0x5
2,156,012,795 UART: [art] Derive Key Pair - Done
2,156,026,059 UART: [art] Signing Cert with AUTHO
2,156,027,382 UART: RITY.KEYID = 7
2,157,739,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,157,741,018 UART: [art] PUB.X = 80A75846AFCD7A06DCD9801EB16F11A213A1F410E9C5D0FA42984823DEE0FA15EDA6A69EA92AA51CDAE351587C99D1AB
2,157,748,287 UART: [art] PUB.Y = B5EFA4EFB8CEA6A1CCFCD16F988F5E444836D9320731B03212F213EA3C9F5033A18029CFD5D3AD6818218224887D9CAC
2,157,755,520 UART: [art] SIG.R = 5D12B0722EAD828460B2F87E3102023C725364C411D60E2CCCB970D0511DB253FDE31B1D201254C91F402F542D99C5C7
2,157,762,910 UART: [art] SIG.S = DB6F9997B4E8024FD5F32CD876D97BF1CAF36CC65A9C80D101485544A75FFE1B476ED8CC01CD1ACA93CEE924CFC7AAC3
2,158,741,354 UART: Caliptra RT
2,158,742,066 UART: [state] CFI Enabled
2,159,081,897 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 323.02s
Truncated 1329906 bytes from beginning
RT:
2,357,763,148 UART: Running Caliptra FMC ...
2,357,764,177 UART:
2,357,764,330 UART: [state] CFI Enabled
2,357,808,458 UART: [art] Extend RT PCRs Done
2,357,809,640 UART: [art] Lock RT PCRs Done
2,357,811,098 UART: [art] Populate DV Done
2,357,816,406 UART: [fht] FMC Alias Private Key: 7
2,357,817,942 UART: [art] Derive CDI
2,357,818,680 UART: [art] Store in in slot 0x4
2,357,861,652 UART: [art] Derive Key Pair
2,357,862,690 UART: [art] Store priv key in slot 0x5
2,360,289,796 UART: [art] Derive Key Pair - Done
2,360,302,798 UART: [art] Signing Cert with AUTHO
2,360,304,102 UART: RITY.KEYID = 7
2,362,009,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,011,274 UART: [art] PUB.X = AB68E6697424708D3E7CC62A7A3C86BCC0F571C6A8918E1AA8A234C7BDD589E9AE472100D3873C2AAC553D0958A72526
2,362,018,531 UART: [art] PUB.Y = A8C51C53C87231F4FA2B24A7ED6B94E8B5F793200974CEC7BBD8CE4B84C4D0D7BEC9A21A2E5A0320BC10881CA102AE57
2,362,025,821 UART: [art] SIG.R = 04A4C4AA730A03E9F71BFCE7F72698314E3816CDD717A19C91A768E5943342D0D48FB908772AAE4BCEADF0C3427A71A5
2,362,033,192 UART: [art] SIG.S = B501FC5456228C922B2DF5F6564D43298651E1AE0773CE807765A33A879D274044C6EB503C46423A0251B26B3DFD893C
2,363,012,413 UART: Caliptra RT
2,363,013,120 UART: [state] CFI Enabled
2,363,304,921 UART: [rt] RT listening for mailbox commands...
2,363,306,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,363,451,238 UART:
2,363,451,555 UART: Running Caliptra ROM ...
2,363,452,670 UART:
2,363,452,836 UART: [state] CFI Enabled
2,365,294,042 UART: [state] LifecycleState = Unprovisioned
2,365,295,956 UART: [state] DebugLocked = No
2,365,297,511 UART: [state] WD Timer not started. Device not locked for debugging
2,365,301,497 UART: [kat] SHA2-256
2,365,480,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,365,492,256 UART: [kat] ++
2,365,492,727 UART: [kat] sha1
2,365,503,563 UART: [kat] SHA2-256
2,365,506,582 UART: [kat] SHA2-384
2,365,512,034 UART: [kat] SHA2-512-ACC
2,365,514,946 UART: [kat] ECC-384
2,367,957,886 UART: [kat] HMAC-384Kdf
2,367,970,026 UART: [kat] LMS
2,368,499,587 UART: [kat] --
2,368,503,308 UART: [update-reset] ++
2,371,927,564 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,371,931,001 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,372,313,307 >>> mbox cmd response: success
2,372,314,639 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,336,971 UART: [update-reset Success] --
2,372,342,490 UART: [state] Locking Datavault
2,372,345,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,347,194 UART: [state] Locking ICCM
2,372,349,595 UART: [exit] Launching FMC @ 0x40000130
2,372,358,040 UART:
2,372,358,280 UART: Running Caliptra FMC ...
2,372,359,326 UART:
2,372,359,484 UART: [state] CFI Enabled
2,372,403,883 UART: [art] Extend RT PCRs Done
2,372,405,030 UART: [art] Lock RT PCRs Done
2,372,406,457 UART: [art] Populate DV Done
2,372,411,925 UART: [fht] FMC Alias Private Key: 7
2,372,413,569 UART: [art] Derive CDI
2,372,414,308 UART: [art] Store in in slot 0x4
2,372,457,025 UART: [art] Derive Key Pair
2,372,458,073 UART: [art] Store priv key in slot 0x5
2,374,884,963 UART: [art] Derive Key Pair - Done
2,374,898,076 UART: [art] Signing Cert with AUTHO
2,374,899,577 UART: RITY.KEYID = 7
2,376,604,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,606,505 UART: [art] PUB.X = AE74079C80B1306BCB1505263DC1D9C3827ECB03768B8A8D9CC415E29AA589540C3AA881ADA65132D34F406B71C7CED4
2,376,613,771 UART: [art] PUB.Y = 02F455653DC8552F0BE5B0D235A75BE4334ACFA5B85A15D4FAF78C5ACAC0E2CB71BE0351D5EA13F7E48D8A419F7A44A5
2,376,621,092 UART: [art] SIG.R = D014C2A0B4B86A7F0A3D7727CF16C49A011B495C98992199204B33450450A6282436D7407EEC7279A26769784230423D
2,376,628,395 UART: [art] SIG.S = F4F9698DBC173A9952B4358847E4E5941350E10CFB39729D6284A20228F698AD11C83954854A04407FE7E0D9BFBE5785
2,377,607,448 UART: Caliptra RT
2,377,608,151 UART: [state] CFI Enabled
2,377,894,870 UART: [rt] RT listening for mailbox commands...
2,377,896,741 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,378,041,752 UART:
2,378,042,082 UART: Running Caliptra ROM ...
2,378,043,212 UART:
2,378,043,383 UART: [state] CFI Enabled
2,378,055,168 UART: [state] LifecycleState = Unprovisioned
2,378,057,008 UART: [state] DebugLocked = No
2,378,058,828 UART: [state] WD Timer not started. Device not locked for debugging
2,378,063,166 UART: [kat] SHA2-256
2,378,242,310 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,253,889 UART: [kat] ++
2,378,254,447 UART: [kat] sha1
2,378,265,138 UART: [kat] SHA2-256
2,378,268,138 UART: [kat] SHA2-384
2,378,274,835 UART: [kat] SHA2-512-ACC
2,378,277,776 UART: [kat] ECC-384
2,380,717,512 UART: [kat] HMAC-384Kdf
2,380,731,196 UART: [kat] LMS
2,381,260,709 UART: [kat] --
2,381,266,481 UART: [update-reset] ++
2,384,686,075 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,384,689,679 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,385,071,998 >>> mbox cmd response: success
2,385,072,877 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,095,221 UART: [update-reset Success] --
2,385,098,160 UART: [state] Locking Datavault
2,385,102,009 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,103,679 UART: [state] Locking ICCM
2,385,105,861 UART: [exit] Launching FMC @ 0x40000130
2,385,114,312 UART:
2,385,114,558 UART: Running Caliptra FMC ...
2,385,115,589 UART:
2,385,115,744 UART: [state] CFI Enabled
2,385,159,486 UART: [art] Extend RT PCRs Done
2,385,160,791 UART: [art] Lock RT PCRs Done
2,385,161,987 UART: [art] Populate DV Done
2,385,167,581 UART: [fht] FMC Alias Private Key: 7
2,385,169,086 UART: [art] Derive CDI
2,385,169,872 UART: [art] Store in in slot 0x4
2,385,212,550 UART: [art] Derive Key Pair
2,385,213,552 UART: [art] Store priv key in slot 0x5
2,387,640,526 UART: [art] Derive Key Pair - Done
2,387,653,746 UART: [art] Signing Cert with AUTHO
2,387,655,073 UART: RITY.KEYID = 7
2,389,360,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,361,737 UART: [art] PUB.X = AB68E6697424708D3E7CC62A7A3C86BCC0F571C6A8918E1AA8A234C7BDD589E9AE472100D3873C2AAC553D0958A72526
2,389,368,987 UART: [art] PUB.Y = A8C51C53C87231F4FA2B24A7ED6B94E8B5F793200974CEC7BBD8CE4B84C4D0D7BEC9A21A2E5A0320BC10881CA102AE57
2,389,376,241 UART: [art] SIG.R = 04A4C4AA730A03E9F71BFCE7F72698314E3816CDD717A19C91A768E5943342D0D48FB908772AAE4BCEADF0C3427A71A5
2,389,383,672 UART: [art] SIG.S = B501FC5456228C922B2DF5F6564D43298651E1AE0773CE807765A33A879D274044C6EB503C46423A0251B26B3DFD893C
2,390,361,851 UART: Caliptra RT
2,390,362,568 UART: [state] CFI Enabled
2,390,654,154 UART: [rt] RT listening for mailbox commands...
2,390,656,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,390,800,408 UART:
2,390,800,701 UART: Running Caliptra ROM ...
2,390,801,741 UART:
2,390,801,952 UART: [state] CFI Enabled
2,390,817,849 UART: [state] LifecycleState = Unprovisioned
2,390,819,831 UART: [state] DebugLocked = No
2,390,821,428 UART: [state] WD Timer not started. Device not locked for debugging
2,390,824,522 UART: [kat] SHA2-256
2,391,003,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,391,015,274 UART: [kat] ++
2,391,015,737 UART: [kat] sha1
2,391,026,629 UART: [kat] SHA2-256
2,391,029,645 UART: [kat] SHA2-384
2,391,036,121 UART: [kat] SHA2-512-ACC
2,391,039,065 UART: [kat] ECC-384
2,393,482,107 UART: [kat] HMAC-384Kdf
2,393,496,120 UART: [kat] LMS
2,394,025,599 UART: [kat] --
2,394,031,371 UART: [update-reset] ++
2,397,451,003 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,397,453,742 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,397,836,060 >>> mbox cmd response: success
2,397,837,115 UART: [update-reset] Copying MAN_2 To MAN_1
2,397,859,444 UART: [update-reset Success] --
2,397,864,040 UART: [state] Locking Datavault
2,397,867,742 UART: [state] Locking PCR0, PCR1 and PCR31
2,397,869,390 UART: [state] Locking ICCM
2,397,870,655 UART: [exit] Launching FMC @ 0x40000130
2,397,879,104 UART:
2,397,879,343 UART: Running Caliptra FMC ...
2,397,880,375 UART:
2,397,880,527 UART: [state] CFI Enabled
2,397,924,596 UART: [art] Extend RT PCRs Done
2,397,925,749 UART: [art] Lock RT PCRs Done
2,397,927,098 UART: [art] Populate DV Done
2,397,932,519 UART: [fht] FMC Alias Private Key: 7
2,397,934,114 UART: [art] Derive CDI
2,397,934,937 UART: [art] Store in in slot 0x4
2,397,977,772 UART: [art] Derive Key Pair
2,397,978,812 UART: [art] Store priv key in slot 0x5
2,400,405,346 UART: [art] Derive Key Pair - Done
2,400,418,349 UART: [art] Signing Cert with AUTHO
2,400,419,827 UART: RITY.KEYID = 7
2,402,125,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,126,531 UART: [art] PUB.X = AE74079C80B1306BCB1505263DC1D9C3827ECB03768B8A8D9CC415E29AA589540C3AA881ADA65132D34F406B71C7CED4
2,402,133,804 UART: [art] PUB.Y = 02F455653DC8552F0BE5B0D235A75BE4334ACFA5B85A15D4FAF78C5ACAC0E2CB71BE0351D5EA13F7E48D8A419F7A44A5
2,402,141,069 UART: [art] SIG.R = D014C2A0B4B86A7F0A3D7727CF16C49A011B495C98992199204B33450450A6282436D7407EEC7279A26769784230423D
2,402,148,422 UART: [art] SIG.S = F4F9698DBC173A9952B4358847E4E5941350E10CFB39729D6284A20228F698AD11C83954854A04407FE7E0D9BFBE5785
2,403,126,924 UART: Caliptra RT
2,403,127,638 UART: [state] CFI Enabled
2,403,412,271 UART: [rt] RT listening for mailbox commands...
2,403,414,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,403,558,356 UART:
2,403,558,657 UART: Running Caliptra ROM ...
2,403,559,715 UART:
2,403,559,925 UART: [state] CFI Enabled
2,405,409,474 UART: [state] LifecycleState = Unprovisioned
2,405,411,383 UART: [state] DebugLocked = No
2,405,412,913 UART: [state] WD Timer not started. Device not locked for debugging
2,405,416,015 UART: [kat] SHA2-256
2,405,595,229 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,405,606,754 UART: [kat] ++
2,405,607,214 UART: [kat] sha1
2,405,618,478 UART: [kat] SHA2-256
2,405,621,511 UART: [kat] SHA2-384
2,405,627,509 UART: [kat] SHA2-512-ACC
2,405,630,456 UART: [kat] ECC-384
2,408,071,317 UART: [kat] HMAC-384Kdf
2,408,084,090 UART: [kat] LMS
2,408,613,582 UART: [kat] --
2,408,617,643 UART: [update-reset] ++
2,412,040,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,044,852 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,412,427,158 >>> mbox cmd response: success
2,412,428,236 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,450,572 UART: [update-reset Success] --
2,412,452,638 UART: [state] Locking Datavault
2,412,454,594 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,456,242 UART: [state] Locking ICCM
2,412,457,316 UART: [exit] Launching FMC @ 0x40000130
2,412,465,715 UART:
2,412,465,963 UART: Running Caliptra FMC ...
2,412,467,069 UART:
2,412,467,233 UART: [state] CFI Enabled
2,412,511,682 UART: [art] Extend RT PCRs Done
2,412,512,862 UART: [art] Lock RT PCRs Done
2,412,514,282 UART: [art] Populate DV Done
2,412,519,854 UART: [fht] FMC Alias Private Key: 7
2,412,521,555 UART: [art] Derive CDI
2,412,522,297 UART: [art] Store in in slot 0x4
2,412,564,999 UART: [art] Derive Key Pair
2,412,565,998 UART: [art] Store priv key in slot 0x5
2,414,992,872 UART: [art] Derive Key Pair - Done
2,415,005,984 UART: [art] Signing Cert with AUTHO
2,415,007,295 UART: RITY.KEYID = 7
2,416,712,886 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,714,384 UART: [art] PUB.X = AB68E6697424708D3E7CC62A7A3C86BCC0F571C6A8918E1AA8A234C7BDD589E9AE472100D3873C2AAC553D0958A72526
2,416,721,650 UART: [art] PUB.Y = A8C51C53C87231F4FA2B24A7ED6B94E8B5F793200974CEC7BBD8CE4B84C4D0D7BEC9A21A2E5A0320BC10881CA102AE57
2,416,728,954 UART: [art] SIG.R = 04A4C4AA730A03E9F71BFCE7F72698314E3816CDD717A19C91A768E5943342D0D48FB908772AAE4BCEADF0C3427A71A5
2,416,736,356 UART: [art] SIG.S = B501FC5456228C922B2DF5F6564D43298651E1AE0773CE807765A33A879D274044C6EB503C46423A0251B26B3DFD893C
2,417,715,540 UART: Caliptra RT
2,417,716,246 UART: [state] CFI Enabled
2,418,002,307 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 335.97s
Truncated 715075 bytes from beginning
91E8F101200A62B92B1DA5DC34CAF34
2,308,682,695 UART: [art] SIG.R = 6974840F3C63F1A7CD14890B60ECE6F5D8C8B4927C8D1B92A8EC4D9517293D76BFE2DEC2DD9DAE4D2E5E79D76BF72349
2,308,690,099 UART: [art] SIG.S = A822A628115AB8B40A4AD092BA94CBCD6ABC5645DEA930C83B79B957FE4432767175BB20FD9B3B7B7A7B3F70CAD25BA2
2,309,668,744 UART: Caliptra RT
2,309,669,613 UART: [state] CFI Enabled
2,309,957,654 UART: [rt] RT listening for mailbox commands...
2,309,959,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,317,003,801 >>> mbox cmd response: success
2,317,039,485 UART:
2,317,039,793 UART: Running Caliptra FMC ...
2,317,040,855 UART:
2,317,041,021 UART: [state] CFI Enabled
2,317,085,487 UART: [art] Extend RT PCRs Done
2,317,086,643 UART: [art] Lock RT PCRs Done
2,317,088,180 UART: [art] Populate DV Done
2,317,093,534 UART: [fht] FMC Alias Private Key: 7
2,317,095,293 UART: [art] Derive CDI
2,317,096,042 UART: [art] Store in in slot 0x4
2,317,139,030 UART: [art] Derive Key Pair
2,317,140,074 UART: [art] Store priv key in slot 0x5
2,319,566,356 UART: [art] Derive Key Pair - Done
2,319,579,462 UART: [art] Signing Cert with AUTHO
2,319,580,771 UART: RITY.KEYID = 7
2,321,286,173 UART: [art] Erasing AUTHORITY.KEYID = 7
2,321,287,667 UART: [art] PUB.X = B31D9F4F287F744E0DB7CFE33F6240CF05E2DE28560354EB9C89FB391CFACA3EC2FCBD1FC0976B86F74D933098CA0B17
2,321,294,983 UART: [art] PUB.Y = 3E64CF3476EABD36DFA01D1A5B1903E220D5E539240FEE0F0E67E298D581139400305276C7FFE4C5D89A55040C693F1E
2,321,302,186 UART: [art] SIG.R = 1AB85D7D343798957FA286FAAA9A02C7288F45F884B23A5C621C705692761CD9A7D720448036EF3CF7406B2445655F12
2,321,309,533 UART: [art] SIG.S = 47E931F02461F4D4D21D4A365ECCC0C8162581C6DACB56097137420D9ED33B0039E47A95AB7A8B4826E799129F9BEE19
2,322,288,624 UART: Caliptra RT
2,322,289,343 UART: [state] CFI Enabled
2,322,575,837 UART: [rt] RT listening for mailbox commands...
2,322,577,708 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,331,875,766 >>> mbox cmd response: success
2,331,911,945 UART:
2,331,912,225 UART: Running Caliptra FMC ...
2,331,913,918 UART:
2,331,914,100 UART: [state] CFI Enabled
2,331,957,314 UART: [art] Extend RT PCRs Done
2,331,958,473 UART: [art] Lock RT PCRs Done
2,331,959,763 UART: [art] Populate DV Done
2,331,965,344 UART: [fht] FMC Alias Private Key: 7
2,331,966,836 UART: [art] Derive CDI
2,331,967,627 UART: [art] Store in in slot 0x4
2,332,010,291 UART: [art] Derive Key Pair
2,332,011,344 UART: [art] Store priv key in slot 0x5
2,334,437,957 UART: [art] Derive Key Pair - Done
2,334,450,957 UART: [art] Signing Cert with AUTHO
2,334,452,258 UART: RITY.KEYID = 7
2,336,157,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,159,149 UART: [art] PUB.X = C7AC8E99E0DC8207C29B8F33705FEEF34F25BF37A14A2FBBEB948939D5F0753730097E2C88B9D834F82F99369A7A5655
2,336,166,390 UART: [art] PUB.Y = 00A28CDBC9ED2E17A42DFA0A200F615EFD831B160640FEF7F8B6F9F88BD8CD67B91E8F101200A62B92B1DA5DC34CAF34
2,336,173,622 UART: [art] SIG.R = 6974840F3C63F1A7CD14890B60ECE6F5D8C8B4927C8D1B92A8EC4D9517293D76BFE2DEC2DD9DAE4D2E5E79D76BF72349
2,336,181,077 UART: [art] SIG.S = A822A628115AB8B40A4AD092BA94CBCD6ABC5645DEA930C83B79B957FE4432767175BB20FD9B3B7B7A7B3F70CAD25BA2
2,337,159,529 UART: Caliptra RT
2,337,160,223 UART: [state] CFI Enabled
2,337,446,490 UART: [rt] RT listening for mailbox commands...
2,337,448,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,344,496,338 >>> mbox cmd response: success
2,344,532,263 UART:
2,344,532,539 UART: Running Caliptra FMC ...
2,344,533,657 UART:
2,344,533,824 UART: [state] CFI Enabled
2,344,578,178 UART: [art] Extend RT PCRs Done
2,344,579,360 UART: [art] Lock RT PCRs Done
2,344,580,954 UART: [art] Populate DV Done
2,344,586,418 UART: [fht] FMC Alias Private Key: 7
2,344,588,065 UART: [art] Derive CDI
2,344,588,811 UART: [art] Store in in slot 0x4
2,344,631,730 UART: [art] Derive Key Pair
2,344,632,731 UART: [art] Store priv key in slot 0x5
2,347,059,316 UART: [art] Derive Key Pair - Done
2,347,072,154 UART: [art] Signing Cert with AUTHO
2,347,073,473 UART: RITY.KEYID = 7
2,348,778,743 UART: [art] Erasing AUTHORITY.KEYID = 7
2,348,780,276 UART: [art] PUB.X = B31D9F4F287F744E0DB7CFE33F6240CF05E2DE28560354EB9C89FB391CFACA3EC2FCBD1FC0976B86F74D933098CA0B17
2,348,787,598 UART: [art] PUB.Y = 3E64CF3476EABD36DFA01D1A5B1903E220D5E539240FEE0F0E67E298D581139400305276C7FFE4C5D89A55040C693F1E
2,348,794,786 UART: [art] SIG.R = 1AB85D7D343798957FA286FAAA9A02C7288F45F884B23A5C621C705692761CD9A7D720448036EF3CF7406B2445655F12
2,348,802,222 UART: [art] SIG.S = 47E931F02461F4D4D21D4A365ECCC0C8162581C6DACB56097137420D9ED33B0039E47A95AB7A8B4826E799129F9BEE19
2,349,780,573 UART: Caliptra RT
2,349,781,268 UART: [state] CFI Enabled
2,350,070,673 UART: [rt] RT listening for mailbox commands...
2,350,072,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,357,118,202 >>> mbox cmd response: success
2,357,151,511 UART:
2,357,151,792 UART: Running Caliptra FMC ...
2,357,152,910 UART:
2,357,153,074 UART: [state] CFI Enabled
2,357,197,216 UART: [art] Extend RT PCRs Done
2,357,198,399 UART: [art] Lock RT PCRs Done
2,357,199,750 UART: [art] Populate DV Done
2,357,205,125 UART: [fht] FMC Alias Private Key: 7
2,357,206,774 UART: [art] Derive CDI
2,357,207,594 UART: [art] Store in in slot 0x4
2,357,249,758 UART: [art] Derive Key Pair
2,357,250,761 UART: [art] Store priv key in slot 0x5
2,359,677,223 UART: [art] Derive Key Pair - Done
2,359,690,378 UART: [art] Signing Cert with AUTHO
2,359,691,684 UART: RITY.KEYID = 7
2,361,397,122 UART: [art] Erasing AUTHORITY.KEYID = 7
2,361,398,631 UART: [art] PUB.X = C7AC8E99E0DC8207C29B8F33705FEEF34F25BF37A14A2FBBEB948939D5F0753730097E2C88B9D834F82F99369A7A5655
2,361,405,932 UART: [art] PUB.Y = 00A28CDBC9ED2E17A42DFA0A200F615EFD831B160640FEF7F8B6F9F88BD8CD67B91E8F101200A62B92B1DA5DC34CAF34
2,361,413,176 UART: [art] SIG.R = 6974840F3C63F1A7CD14890B60ECE6F5D8C8B4927C8D1B92A8EC4D9517293D76BFE2DEC2DD9DAE4D2E5E79D76BF72349
2,361,420,572 UART: [art] SIG.S = A822A628115AB8B40A4AD092BA94CBCD6ABC5645DEA930C83B79B957FE4432767175BB20FD9B3B7B7A7B3F70CAD25BA2
2,362,399,556 UART: Caliptra RT
2,362,400,259 UART: [state] CFI Enabled
2,362,688,134 UART: [rt] RT listening for mailbox commands...
2,362,690,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,371,994,899 >>> mbox cmd response: success
2,372,030,188 UART:
2,372,030,492 UART: Running Caliptra FMC ...
2,372,031,619 UART:
2,372,031,797 UART: [state] CFI Enabled
2,372,076,094 UART: [art] Extend RT PCRs Done
2,372,077,247 UART: [art] Lock RT PCRs Done
2,372,078,868 UART: [art] Populate DV Done
2,372,084,453 UART: [fht] FMC Alias Private Key: 7
2,372,086,054 UART: [art] Derive CDI
2,372,086,805 UART: [art] Store in in slot 0x4
2,372,129,460 UART: [art] Derive Key Pair
2,372,130,461 UART: [art] Store priv key in slot 0x5
2,374,557,645 UART: [art] Derive Key Pair - Done
2,374,570,777 UART: [art] Signing Cert with AUTHO
2,374,572,103 UART: RITY.KEYID = 7
2,376,277,805 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,279,313 UART: [art] PUB.X = B31D9F4F287F744E0DB7CFE33F6240CF05E2DE28560354EB9C89FB391CFACA3EC2FCBD1FC0976B86F74D933098CA0B17
2,376,286,614 UART: [art] PUB.Y = 3E64CF3476EABD36DFA01D1A5B1903E220D5E539240FEE0F0E67E298D581139400305276C7FFE4C5D89A55040C693F1E
2,376,293,844 UART: [art] SIG.R = 1AB85D7D343798957FA286FAAA9A02C7288F45F884B23A5C621C705692761CD9A7D720448036EF3CF7406B2445655F12
2,376,301,250 UART: [art] SIG.S = 47E931F02461F4D4D21D4A365ECCC0C8162581C6DACB56097137420D9ED33B0039E47A95AB7A8B4826E799129F9BEE19
2,377,279,961 UART: Caliptra RT
2,377,280,662 UART: [state] CFI Enabled
2,377,566,769 UART: [rt] RT listening for mailbox commands...
2,377,568,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,384,613,957 >>> mbox cmd response: success
2,384,650,756 UART:
2,384,651,060 UART: Running Caliptra FMC ...
2,384,652,109 UART:
2,384,652,262 UART: [state] CFI Enabled
2,384,696,072 UART: [art] Extend RT PCRs Done
2,384,697,243 UART: [art] Lock RT PCRs Done
2,384,698,838 UART: [art] Populate DV Done
2,384,704,451 UART: [fht] FMC Alias Private Key: 7
2,384,705,997 UART: [art] Derive CDI
2,384,706,737 UART: [art] Store in in slot 0x4
2,384,749,561 UART: [art] Derive Key Pair
2,384,750,600 UART: [art] Store priv key in slot 0x5
2,387,177,712 UART: [art] Derive Key Pair - Done
2,387,190,990 UART: [art] Signing Cert with AUTHO
2,387,192,293 UART: RITY.KEYID = 7
2,388,898,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,388,899,745 UART: [art] PUB.X = C7AC8E99E0DC8207C29B8F33705FEEF34F25BF37A14A2FBBEB948939D5F0753730097E2C88B9D834F82F99369A7A5655
2,388,907,001 UART: [art] PUB.Y = 00A28CDBC9ED2E17A42DFA0A200F615EFD831B160640FEF7F8B6F9F88BD8CD67B91E8F101200A62B92B1DA5DC34CAF34
2,388,914,302 UART: [art] SIG.R = 6974840F3C63F1A7CD14890B60ECE6F5D8C8B4927C8D1B92A8EC4D9517293D76BFE2DEC2DD9DAE4D2E5E79D76BF72349
2,388,921,700 UART: [art] SIG.S = A822A628115AB8B40A4AD092BA94CBCD6ABC5645DEA930C83B79B957FE4432767175BB20FD9B3B7B7A7B3F70CAD25BA2
2,389,900,738 UART: Caliptra RT
2,389,901,463 UART: [state] CFI Enabled
2,390,192,232 UART: [rt] RT listening for mailbox commands...
2,390,194,132 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,397,240,465 >>> mbox cmd response: success
2,397,274,742 UART:
2,397,275,016 UART: Running Caliptra FMC ...
2,397,276,084 UART:
2,397,276,246 UART: [state] CFI Enabled
2,397,320,108 UART: [art] Extend RT PCRs Done
2,397,321,296 UART: [art] Lock RT PCRs Done
2,397,322,487 UART: [art] Populate DV Done
2,397,327,911 UART: [fht] FMC Alias Private Key: 7
2,397,329,506 UART: [art] Derive CDI
2,397,330,322 UART: [art] Store in in slot 0x4
2,397,372,379 UART: [art] Derive Key Pair
2,397,373,412 UART: [art] Store priv key in slot 0x5
2,399,800,021 UART: [art] Derive Key Pair - Done
2,399,812,706 UART: [art] Signing Cert with AUTHO
2,399,814,016 UART: RITY.KEYID = 7
2,401,519,201 UART: [art] Erasing AUTHORITY.KEYID = 7
2,401,520,709 UART: [art] PUB.X = B31D9F4F287F744E0DB7CFE33F6240CF05E2DE28560354EB9C89FB391CFACA3EC2FCBD1FC0976B86F74D933098CA0B17
2,401,528,035 UART: [art] PUB.Y = 3E64CF3476EABD36DFA01D1A5B1903E220D5E539240FEE0F0E67E298D581139400305276C7FFE4C5D89A55040C693F1E
2,401,535,231 UART: [art] SIG.R = 1AB85D7D343798957FA286FAAA9A02C7288F45F884B23A5C621C705692761CD9A7D720448036EF3CF7406B2445655F12
2,401,542,626 UART: [art] SIG.S = 47E931F02461F4D4D21D4A365ECCC0C8162581C6DACB56097137420D9ED33B0039E47A95AB7A8B4826E799129F9BEE19
2,402,520,699 UART: Caliptra RT
2,402,521,411 UART: [state] CFI Enabled
2,402,808,277 UART: [rt] RT listening for mailbox commands...
2,402,810,182 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,412,113,755 >>> mbox cmd response: success
2,412,148,379 UART:
2,412,148,654 UART: Running Caliptra FMC ...
2,412,149,697 UART:
2,412,149,869 UART: [state] CFI Enabled
2,412,194,227 UART: [art] Extend RT PCRs Done
2,412,195,419 UART: [art] Lock RT PCRs Done
2,412,196,744 UART: [art] Populate DV Done
2,412,202,111 UART: [fht] FMC Alias Private Key: 7
2,412,203,765 UART: [art] Derive CDI
2,412,204,508 UART: [art] Store in in slot 0x4
2,412,247,432 UART: [art] Derive Key Pair
2,412,248,475 UART: [art] Store priv key in slot 0x5
2,414,675,938 UART: [art] Derive Key Pair - Done
2,414,688,729 UART: [art] Signing Cert with AUTHO
2,414,690,032 UART: RITY.KEYID = 7
2,416,395,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,396,914 UART: [art] PUB.X = C7AC8E99E0DC8207C29B8F33705FEEF34F25BF37A14A2FBBEB948939D5F0753730097E2C88B9D834F82F99369A7A5655
2,416,404,338 UART: [art] PUB.Y = 00A28CDBC9ED2E17A42DFA0A200F615EFD831B160640FEF7F8B6F9F88BD8CD67B91E8F101200A62B92B1DA5DC34CAF34
2,416,411,436 UART: [art] SIG.R = 6974840F3C63F1A7CD14890B60ECE6F5D8C8B4927C8D1B92A8EC4D9517293D76BFE2DEC2DD9DAE4D2E5E79D76BF72349
2,416,418,862 UART: [art] SIG.S = A822A628115AB8B40A4AD092BA94CBCD6ABC5645DEA930C83B79B957FE4432767175BB20FD9B3B7B7A7B3F70CAD25BA2
2,417,397,635 UART: Caliptra RT
2,417,398,348 UART: [state] CFI Enabled
2,417,688,074 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 335.96s
Truncated 1329806 bytes from beginning
RT:
2,315,151,425 UART: Running Caliptra FMC ...
2,315,152,458 UART:
2,315,152,608 UART: [state] CFI Enabled
2,315,258,532 UART: [art] Extend RT PCRs Done
2,315,259,720 UART: [art] Lock RT PCRs Done
2,315,261,261 UART: [art] Populate DV Done
2,315,267,157 UART: [fht] FMC Alias Private Key: 7
2,315,268,709 UART: [art] Derive CDI
2,315,269,531 UART: [art] Store in in slot 0x4
2,315,327,494 UART: [art] Derive Key Pair
2,315,328,535 UART: [art] Store priv key in slot 0x5
2,317,791,367 UART: [art] Derive Key Pair - Done
2,317,804,376 UART: [art] Signing Cert with AUTHO
2,317,805,693 UART: RITY.KEYID = 7
2,319,516,540 UART: [art] Erasing AUTHORITY.KEYID = 7
2,319,518,053 UART: [art] PUB.X = 1BE7AE086EF359354F9006BFB25F829C76AEAC468BAA198DE60A1E3157ECE688C65C00847C934619FCCB791559CECCB4
2,319,525,334 UART: [art] PUB.Y = 31020FD8BD6327E653354A76843632BE394F6D5923CC3514886EAE49AE036ADA1ED28C98DCF297ED38EB7BC0CE47B036
2,319,532,590 UART: [art] SIG.R = F7A2DBAA2306666C439F92CDDBE6FD91F94708267E4E9E5BA6A852B0D914D0A442EA61E539ACFCE3550A8E3BB90900C8
2,319,540,201 UART: [art] SIG.S = ACEDDCCDD575F3EF35B1360737F0A4B265C099CB17E53D59E8062DB9E1EDF5F1E359AE0040216D2772A3610CF58C2007
2,320,519,009 UART: Caliptra RT
2,320,519,735 UART: [state] CFI Enabled
2,320,853,967 UART: [rt] RT listening for mailbox commands...
2,320,855,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,321,000,252 UART:
2,321,000,558 UART: Running Caliptra ROM ...
2,321,001,693 UART:
2,321,001,866 UART: [state] CFI Enabled
2,321,070,801 UART: [state] LifecycleState = Unprovisioned
2,321,072,847 UART: [state] DebugLocked = No
2,321,075,354 UART: [state] WD Timer not started. Device not locked for debugging
2,321,080,703 UART: [kat] SHA2-256
2,321,270,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,321,281,345 UART: [kat] ++
2,321,281,808 UART: [kat] sha1
2,321,293,084 UART: [kat] SHA2-256
2,321,296,082 UART: [kat] SHA2-384
2,321,301,719 UART: [kat] SHA2-512-ACC
2,321,304,275 UART: [kat] ECC-384
2,323,755,023 UART: [kat] HMAC-384Kdf
2,323,780,097 UART: [kat] LMS
2,324,311,621 UART: [kat] --
2,324,315,991 UART: [update-reset] ++
2,327,768,733 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,327,771,299 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,328,377,865 >>> mbox cmd response: success
2,328,378,259 UART: [update-reset] Copying MAN_2 To MAN_1
2,328,415,784 UART: [update-reset Success] --
2,328,421,746 UART: [state] Locking Datavault
2,328,425,805 UART: [state] Locking PCR0, PCR1 and PCR31
2,328,427,963 UART: [state] Locking ICCM
2,328,430,180 UART: [exit] Launching FMC @ 0x40000130
2,328,438,840 UART:
2,328,439,088 UART: Running Caliptra FMC ...
2,328,440,201 UART:
2,328,440,365 UART: [state] CFI Enabled
2,328,526,999 UART: [art] Extend RT PCRs Done
2,328,528,216 UART: [art] Lock RT PCRs Done
2,328,529,789 UART: [art] Populate DV Done
2,328,534,989 UART: [fht] FMC Alias Private Key: 7
2,328,536,536 UART: [art] Derive CDI
2,328,537,350 UART: [art] Store in in slot 0x4
2,328,595,922 UART: [art] Derive Key Pair
2,328,596,963 UART: [art] Store priv key in slot 0x5
2,331,059,959 UART: [art] Derive Key Pair - Done
2,331,072,820 UART: [art] Signing Cert with AUTHO
2,331,074,127 UART: RITY.KEYID = 7
2,332,785,557 UART: [art] Erasing AUTHORITY.KEYID = 7
2,332,787,084 UART: [art] PUB.X = 004C2D0E88791DF6AA549DDD1940388295686F799BB11686858D91430DF270E30B8EE2E5AEABDDFBC9D8141C6A58ECCB
2,332,794,309 UART: [art] PUB.Y = C176600C85D077D51B38B2EFE44B3F04CA32D9ABB5BD4247D11D6B5EC6AB4A66939C8CC469EFB6A4F49AA4B84264447E
2,332,801,573 UART: [art] SIG.R = AA0E9626AB5E7C85A87947A332EFF2F603678AD4B2A766B586D84524D4EA943237A217EDCB566D2F2512F5812185662A
2,332,808,941 UART: [art] SIG.S = 7822B26E231E2537AF533589A07BFFD15C9CA0BC53C17BAE3E6E9C6C3A30321E7AA7A03C110030692D60C7BC3725A320
2,333,788,295 UART: Caliptra RT
2,333,788,987 UART: [state] CFI Enabled
2,334,124,815 UART: [rt] RT listening for mailbox commands...
2,334,126,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,334,270,971 UART:
2,334,271,271 UART: Running Caliptra ROM ...
2,334,272,311 UART:
2,334,272,465 UART: [state] CFI Enabled
2,334,337,180 UART: [state] LifecycleState = Unprovisioned
2,334,339,187 UART: [state] DebugLocked = No
2,334,341,646 UART: [state] WD Timer not started. Device not locked for debugging
2,334,345,837 UART: [kat] SHA2-256
2,334,535,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,334,546,434 UART: [kat] ++
2,334,546,899 UART: [kat] sha1
2,334,559,035 UART: [kat] SHA2-256
2,334,562,059 UART: [kat] SHA2-384
2,334,568,977 UART: [kat] SHA2-512-ACC
2,334,571,551 UART: [kat] ECC-384
2,337,023,278 UART: [kat] HMAC-384Kdf
2,337,047,394 UART: [kat] LMS
2,337,578,951 UART: [kat] --
2,337,581,555 UART: [update-reset] ++
2,341,032,673 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,341,035,194 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,341,641,721 >>> mbox cmd response: success
2,341,643,382 UART: [update-reset] Copying MAN_2 To MAN_1
2,341,680,910 UART: [update-reset Success] --
2,341,684,523 UART: [state] Locking Datavault
2,341,686,773 UART: [state] Locking PCR0, PCR1 and PCR31
2,341,688,929 UART: [state] Locking ICCM
2,341,691,314 UART: [exit] Launching FMC @ 0x40000130
2,341,699,999 UART:
2,341,700,238 UART: Running Caliptra FMC ...
2,341,701,564 UART:
2,341,701,737 UART: [state] CFI Enabled
2,341,793,056 UART: [art] Extend RT PCRs Done
2,341,794,241 UART: [art] Lock RT PCRs Done
2,341,795,321 UART: [art] Populate DV Done
2,341,800,844 UART: [fht] FMC Alias Private Key: 7
2,341,802,492 UART: [art] Derive CDI
2,341,803,313 UART: [art] Store in in slot 0x4
2,341,861,602 UART: [art] Derive Key Pair
2,341,862,646 UART: [art] Store priv key in slot 0x5
2,344,325,749 UART: [art] Derive Key Pair - Done
2,344,338,583 UART: [art] Signing Cert with AUTHO
2,344,339,893 UART: RITY.KEYID = 7
2,346,051,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,346,053,016 UART: [art] PUB.X = 1BE7AE086EF359354F9006BFB25F829C76AEAC468BAA198DE60A1E3157ECE688C65C00847C934619FCCB791559CECCB4
2,346,060,294 UART: [art] PUB.Y = 31020FD8BD6327E653354A76843632BE394F6D5923CC3514886EAE49AE036ADA1ED28C98DCF297ED38EB7BC0CE47B036
2,346,067,551 UART: [art] SIG.R = F7A2DBAA2306666C439F92CDDBE6FD91F94708267E4E9E5BA6A852B0D914D0A442EA61E539ACFCE3550A8E3BB90900C8
2,346,074,925 UART: [art] SIG.S = ACEDDCCDD575F3EF35B1360737F0A4B265C099CB17E53D59E8062DB9E1EDF5F1E359AE0040216D2772A3610CF58C2007
2,347,052,981 UART: Caliptra RT
2,347,053,679 UART: [state] CFI Enabled
2,347,390,688 UART: [rt] RT listening for mailbox commands...
2,347,392,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,347,536,679 UART:
2,347,536,989 UART: Running Caliptra ROM ...
2,347,538,112 UART:
2,347,538,274 UART: [state] CFI Enabled
2,347,605,368 UART: [state] LifecycleState = Unprovisioned
2,347,607,409 UART: [state] DebugLocked = No
2,347,610,075 UART: [state] WD Timer not started. Device not locked for debugging
2,347,614,008 UART: [kat] SHA2-256
2,347,803,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,347,814,647 UART: [kat] ++
2,347,815,110 UART: [kat] sha1
2,347,826,488 UART: [kat] SHA2-256
2,347,829,512 UART: [kat] SHA2-384
2,347,834,915 UART: [kat] SHA2-512-ACC
2,347,837,500 UART: [kat] ECC-384
2,350,290,047 UART: [kat] HMAC-384Kdf
2,350,314,808 UART: [kat] LMS
2,350,846,385 UART: [kat] --
2,350,851,025 UART: [update-reset] ++
2,354,307,149 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,354,310,923 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,354,917,495 >>> mbox cmd response: success
2,354,919,013 UART: [update-reset] Copying MAN_2 To MAN_1
2,354,956,598 UART: [update-reset Success] --
2,354,958,680 UART: [state] Locking Datavault
2,354,962,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,354,964,863 UART: [state] Locking ICCM
2,354,967,377 UART: [exit] Launching FMC @ 0x40000130
2,354,976,010 UART:
2,354,976,261 UART: Running Caliptra FMC ...
2,354,977,367 UART:
2,354,977,528 UART: [state] CFI Enabled
2,355,083,762 UART: [art] Extend RT PCRs Done
2,355,084,975 UART: [art] Lock RT PCRs Done
2,355,086,147 UART: [art] Populate DV Done
2,355,091,832 UART: [fht] FMC Alias Private Key: 7
2,355,093,350 UART: [art] Derive CDI
2,355,094,119 UART: [art] Store in in slot 0x4
2,355,152,424 UART: [art] Derive Key Pair
2,355,153,468 UART: [art] Store priv key in slot 0x5
2,357,616,817 UART: [art] Derive Key Pair - Done
2,357,629,440 UART: [art] Signing Cert with AUTHO
2,357,630,804 UART: RITY.KEYID = 7
2,359,343,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,359,345,002 UART: [art] PUB.X = 004C2D0E88791DF6AA549DDD1940388295686F799BB11686858D91430DF270E30B8EE2E5AEABDDFBC9D8141C6A58ECCB
2,359,352,274 UART: [art] PUB.Y = C176600C85D077D51B38B2EFE44B3F04CA32D9ABB5BD4247D11D6B5EC6AB4A66939C8CC469EFB6A4F49AA4B84264447E
2,359,359,539 UART: [art] SIG.R = AA0E9626AB5E7C85A87947A332EFF2F603678AD4B2A766B586D84524D4EA943237A217EDCB566D2F2512F5812185662A
2,359,366,906 UART: [art] SIG.S = 7822B26E231E2537AF533589A07BFFD15C9CA0BC53C17BAE3E6E9C6C3A30321E7AA7A03C110030692D60C7BC3725A320
2,360,346,113 UART: Caliptra RT
2,360,346,834 UART: [state] CFI Enabled
2,360,683,162 UART: [rt] RT listening for mailbox commands...
2,360,685,034 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,360,829,414 UART:
2,360,829,722 UART: Running Caliptra ROM ...
2,360,830,840 UART:
2,360,831,002 UART: [state] CFI Enabled
2,360,899,396 UART: [state] LifecycleState = Unprovisioned
2,360,901,455 UART: [state] DebugLocked = No
2,360,903,058 UART: [state] WD Timer not started. Device not locked for debugging
2,360,907,555 UART: [kat] SHA2-256
2,361,097,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,361,108,166 UART: [kat] ++
2,361,108,654 UART: [kat] sha1
2,361,120,468 UART: [kat] SHA2-256
2,361,123,474 UART: [kat] SHA2-384
2,361,129,098 UART: [kat] SHA2-512-ACC
2,361,131,730 UART: [kat] ECC-384
2,363,581,536 UART: [kat] HMAC-384Kdf
2,363,606,310 UART: [kat] LMS
2,364,137,879 UART: [kat] --
2,364,142,436 UART: [update-reset] ++
2,367,598,717 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,367,602,797 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,368,209,348 >>> mbox cmd response: success
2,368,211,044 UART: [update-reset] Copying MAN_2 To MAN_1
2,368,248,633 UART: [update-reset Success] --
2,368,252,763 UART: [state] Locking Datavault
2,368,256,251 UART: [state] Locking PCR0, PCR1 and PCR31
2,368,258,402 UART: [state] Locking ICCM
2,368,260,888 UART: [exit] Launching FMC @ 0x40000130
2,368,269,570 UART:
2,368,269,821 UART: Running Caliptra FMC ...
2,368,270,927 UART:
2,368,271,090 UART: [state] CFI Enabled
2,368,372,878 UART: [art] Extend RT PCRs Done
2,368,374,061 UART: [art] Lock RT PCRs Done
2,368,375,721 UART: [art] Populate DV Done
2,368,381,560 UART: [fht] FMC Alias Private Key: 7
2,368,383,151 UART: [art] Derive CDI
2,368,383,896 UART: [art] Store in in slot 0x4
2,368,441,904 UART: [art] Derive Key Pair
2,368,442,949 UART: [art] Store priv key in slot 0x5
2,370,905,769 UART: [art] Derive Key Pair - Done
2,370,918,551 UART: [art] Signing Cert with AUTHO
2,370,919,858 UART: RITY.KEYID = 7
2,372,631,511 UART: [art] Erasing AUTHORITY.KEYID = 7
2,372,633,018 UART: [art] PUB.X = 1BE7AE086EF359354F9006BFB25F829C76AEAC468BAA198DE60A1E3157ECE688C65C00847C934619FCCB791559CECCB4
2,372,640,296 UART: [art] PUB.Y = 31020FD8BD6327E653354A76843632BE394F6D5923CC3514886EAE49AE036ADA1ED28C98DCF297ED38EB7BC0CE47B036
2,372,647,564 UART: [art] SIG.R = F7A2DBAA2306666C439F92CDDBE6FD91F94708267E4E9E5BA6A852B0D914D0A442EA61E539ACFCE3550A8E3BB90900C8
2,372,654,983 UART: [art] SIG.S = ACEDDCCDD575F3EF35B1360737F0A4B265C099CB17E53D59E8062DB9E1EDF5F1E359AE0040216D2772A3610CF58C2007
2,373,633,378 UART: Caliptra RT
2,373,634,079 UART: [state] CFI Enabled
2,373,967,842 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 333.76s
Truncated 715189 bytes from beginning
64E3643A6F413A720BAB024334A7EFF
2,393,772,794 UART: [art] SIG.R = 974EEB330DB106F41968F51350508D5A3A6EA1DBA7243A9ADC740DB316063FC186FA13F99BB744BD6ACD299524984D6D
2,393,780,187 UART: [art] SIG.S = 538B1636617ECAAAD497950C06756CED88A2CBBEE57812C0AAF5ED53213B4253B6BDB0E47B0ABBD112B7A8DB9D7AFA59
2,394,759,416 UART: Caliptra RT
2,394,760,108 UART: [state] CFI Enabled
2,395,099,557 UART: [rt] RT listening for mailbox commands...
2,395,101,450 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,402,912,140 >>> mbox cmd response: success
2,402,947,334 UART:
2,402,947,645 UART: Running Caliptra FMC ...
2,402,948,768 UART:
2,402,948,937 UART: [state] CFI Enabled
2,403,038,717 UART: [art] Extend RT PCRs Done
2,403,039,938 UART: [art] Lock RT PCRs Done
2,403,041,188 UART: [art] Populate DV Done
2,403,046,798 UART: [fht] FMC Alias Private Key: 7
2,403,048,496 UART: [art] Derive CDI
2,403,049,317 UART: [art] Store in in slot 0x4
2,403,108,084 UART: [art] Derive Key Pair
2,403,109,124 UART: [art] Store priv key in slot 0x5
2,405,571,295 UART: [art] Derive Key Pair - Done
2,405,584,409 UART: [art] Signing Cert with AUTHO
2,405,585,739 UART: RITY.KEYID = 7
2,407,297,018 UART: [art] Erasing AUTHORITY.KEYID = 7
2,407,298,529 UART: [art] PUB.X = A6F02D07B347E47AC9FD5CF5D68D7E14A9C1FD8E794CC00EF43A4AF2F7FB383140D3F78CA4B9EA35784B94F8C6DA0A84
2,407,305,882 UART: [art] PUB.Y = E03609FADEC73EB436A8ADBDC3F415D2FF301A3A8A456056727DA139E71B4DCE8FEC672984A452CC9A52D5F3A26F3077
2,407,313,116 UART: [art] SIG.R = 1361F2B38E30A4503166E1ACC90B829C1DDA2C456648B86B9F123CE84B26725225660B1375B48A35C3266FF5C7755B64
2,407,320,515 UART: [art] SIG.S = DAE7E05F0188DD3AC6B4ACDFAE5AFC4785CC80BC350AC19E44B516E5A7F0D3A770CE2C55F9835D82154AD7929AFDE726
2,408,299,481 UART: Caliptra RT
2,408,300,197 UART: [state] CFI Enabled
2,408,633,222 UART: [rt] RT listening for mailbox commands...
2,408,635,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,416,434,659 >>> mbox cmd response: success
2,416,470,431 UART:
2,416,470,729 UART: Running Caliptra FMC ...
2,416,471,856 UART:
2,416,472,041 UART: [state] CFI Enabled
2,416,561,567 UART: [art] Extend RT PCRs Done
2,416,562,773 UART: [art] Lock RT PCRs Done
2,416,564,021 UART: [art] Populate DV Done
2,416,569,397 UART: [fht] FMC Alias Private Key: 7
2,416,570,938 UART: [art] Derive CDI
2,416,571,755 UART: [art] Store in in slot 0x4
2,416,630,534 UART: [art] Derive Key Pair
2,416,631,568 UART: [art] Store priv key in slot 0x5
2,419,094,220 UART: [art] Derive Key Pair - Done
2,419,107,220 UART: [art] Signing Cert with AUTHO
2,419,108,531 UART: RITY.KEYID = 7
2,420,819,575 UART: [art] Erasing AUTHORITY.KEYID = 7
2,420,821,082 UART: [art] PUB.X = 0D8774D9C1C3F5524DE0BB1C06102622294490C2D74F40C71C632E71B7ED3E91C58009EEC4D7C80EE20A12EF5D4C76E5
2,420,828,388 UART: [art] PUB.Y = 93E17F78646CDF414FAFA32114249A8114880D4CBBA5EDCF0E3CF896845DB08D664E3643A6F413A720BAB024334A7EFF
2,420,835,614 UART: [art] SIG.R = 974EEB330DB106F41968F51350508D5A3A6EA1DBA7243A9ADC740DB316063FC186FA13F99BB744BD6ACD299524984D6D
2,420,843,013 UART: [art] SIG.S = 538B1636617ECAAAD497950C06756CED88A2CBBEE57812C0AAF5ED53213B4253B6BDB0E47B0ABBD112B7A8DB9D7AFA59
2,421,821,305 UART: Caliptra RT
2,421,822,016 UART: [state] CFI Enabled
2,422,153,410 UART: [rt] RT listening for mailbox commands...
2,422,155,277 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,429,972,152 >>> mbox cmd response: success
2,430,006,598 UART:
2,430,006,881 UART: Running Caliptra FMC ...
2,430,008,012 UART:
2,430,008,193 UART: [state] CFI Enabled
2,430,104,056 UART: [art] Extend RT PCRs Done
2,430,105,248 UART: [art] Lock RT PCRs Done
2,430,106,868 UART: [art] Populate DV Done
2,430,111,956 UART: [fht] FMC Alias Private Key: 7
2,430,113,554 UART: [art] Derive CDI
2,430,114,375 UART: [art] Store in in slot 0x4
2,430,172,943 UART: [art] Derive Key Pair
2,430,173,983 UART: [art] Store priv key in slot 0x5
2,432,637,136 UART: [art] Derive Key Pair - Done
2,432,650,135 UART: [art] Signing Cert with AUTHO
2,432,651,440 UART: RITY.KEYID = 7
2,434,362,823 UART: [art] Erasing AUTHORITY.KEYID = 7
2,434,364,328 UART: [art] PUB.X = A6F02D07B347E47AC9FD5CF5D68D7E14A9C1FD8E794CC00EF43A4AF2F7FB383140D3F78CA4B9EA35784B94F8C6DA0A84
2,434,371,644 UART: [art] PUB.Y = E03609FADEC73EB436A8ADBDC3F415D2FF301A3A8A456056727DA139E71B4DCE8FEC672984A452CC9A52D5F3A26F3077
2,434,378,880 UART: [art] SIG.R = 1361F2B38E30A4503166E1ACC90B829C1DDA2C456648B86B9F123CE84B26725225660B1375B48A35C3266FF5C7755B64
2,434,386,267 UART: [art] SIG.S = DAE7E05F0188DD3AC6B4ACDFAE5AFC4785CC80BC350AC19E44B516E5A7F0D3A770CE2C55F9835D82154AD7929AFDE726
2,435,365,334 UART: Caliptra RT
2,435,366,048 UART: [state] CFI Enabled
2,435,704,365 UART: [rt] RT listening for mailbox commands...
2,435,706,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,443,519,537 >>> mbox cmd response: success
2,443,555,921 UART:
2,443,556,202 UART: Running Caliptra FMC ...
2,443,557,321 UART:
2,443,557,504 UART: [state] CFI Enabled
2,443,651,370 UART: [art] Extend RT PCRs Done
2,443,652,563 UART: [art] Lock RT PCRs Done
2,443,653,862 UART: [art] Populate DV Done
2,443,659,382 UART: [fht] FMC Alias Private Key: 7
2,443,661,142 UART: [art] Derive CDI
2,443,661,963 UART: [art] Store in in slot 0x4
2,443,720,304 UART: [art] Derive Key Pair
2,443,721,301 UART: [art] Store priv key in slot 0x5
2,446,183,713 UART: [art] Derive Key Pair - Done
2,446,196,986 UART: [art] Signing Cert with AUTHO
2,446,198,300 UART: RITY.KEYID = 7
2,447,910,077 UART: [art] Erasing AUTHORITY.KEYID = 7
2,447,911,591 UART: [art] PUB.X = 0D8774D9C1C3F5524DE0BB1C06102622294490C2D74F40C71C632E71B7ED3E91C58009EEC4D7C80EE20A12EF5D4C76E5
2,447,918,845 UART: [art] PUB.Y = 93E17F78646CDF414FAFA32114249A8114880D4CBBA5EDCF0E3CF896845DB08D664E3643A6F413A720BAB024334A7EFF
2,447,926,129 UART: [art] SIG.R = 974EEB330DB106F41968F51350508D5A3A6EA1DBA7243A9ADC740DB316063FC186FA13F99BB744BD6ACD299524984D6D
2,447,933,531 UART: [art] SIG.S = 538B1636617ECAAAD497950C06756CED88A2CBBEE57812C0AAF5ED53213B4253B6BDB0E47B0ABBD112B7A8DB9D7AFA59
2,448,912,882 UART: Caliptra RT
2,448,913,572 UART: [state] CFI Enabled
2,449,251,340 UART: [rt] RT listening for mailbox commands...
2,449,253,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,457,065,036 >>> mbox cmd response: success
2,457,098,504 UART:
2,457,098,816 UART: Running Caliptra FMC ...
2,457,099,947 UART:
2,457,100,115 UART: [state] CFI Enabled
2,457,196,723 UART: [art] Extend RT PCRs Done
2,457,197,915 UART: [art] Lock RT PCRs Done
2,457,199,213 UART: [art] Populate DV Done
2,457,204,625 UART: [fht] FMC Alias Private Key: 7
2,457,206,108 UART: [art] Derive CDI
2,457,206,877 UART: [art] Store in in slot 0x4
2,457,266,248 UART: [art] Derive Key Pair
2,457,267,305 UART: [art] Store priv key in slot 0x5
2,459,730,379 UART: [art] Derive Key Pair - Done
2,459,743,645 UART: [art] Signing Cert with AUTHO
2,459,744,945 UART: RITY.KEYID = 7
2,461,455,592 UART: [art] Erasing AUTHORITY.KEYID = 7
2,461,457,094 UART: [art] PUB.X = A6F02D07B347E47AC9FD5CF5D68D7E14A9C1FD8E794CC00EF43A4AF2F7FB383140D3F78CA4B9EA35784B94F8C6DA0A84
2,461,464,394 UART: [art] PUB.Y = E03609FADEC73EB436A8ADBDC3F415D2FF301A3A8A456056727DA139E71B4DCE8FEC672984A452CC9A52D5F3A26F3077
2,461,471,676 UART: [art] SIG.R = 1361F2B38E30A4503166E1ACC90B829C1DDA2C456648B86B9F123CE84B26725225660B1375B48A35C3266FF5C7755B64
2,461,479,006 UART: [art] SIG.S = DAE7E05F0188DD3AC6B4ACDFAE5AFC4785CC80BC350AC19E44B516E5A7F0D3A770CE2C55F9835D82154AD7929AFDE726
2,462,457,888 UART: Caliptra RT
2,462,458,605 UART: [state] CFI Enabled
2,462,795,744 UART: [rt] RT listening for mailbox commands...
2,462,797,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,470,617,419 >>> mbox cmd response: success
2,470,653,979 UART:
2,470,654,281 UART: Running Caliptra FMC ...
2,470,655,400 UART:
2,470,655,573 UART: [state] CFI Enabled
2,470,760,452 UART: [art] Extend RT PCRs Done
2,470,761,645 UART: [art] Lock RT PCRs Done
2,470,763,105 UART: [art] Populate DV Done
2,470,768,610 UART: [fht] FMC Alias Private Key: 7
2,470,770,194 UART: [art] Derive CDI
2,470,771,020 UART: [art] Store in in slot 0x4
2,470,829,744 UART: [art] Derive Key Pair
2,470,830,749 UART: [art] Store priv key in slot 0x5
2,473,293,365 UART: [art] Derive Key Pair - Done
2,473,306,523 UART: [art] Signing Cert with AUTHO
2,473,307,833 UART: RITY.KEYID = 7
2,475,019,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,475,021,076 UART: [art] PUB.X = 0D8774D9C1C3F5524DE0BB1C06102622294490C2D74F40C71C632E71B7ED3E91C58009EEC4D7C80EE20A12EF5D4C76E5
2,475,028,305 UART: [art] PUB.Y = 93E17F78646CDF414FAFA32114249A8114880D4CBBA5EDCF0E3CF896845DB08D664E3643A6F413A720BAB024334A7EFF
2,475,035,550 UART: [art] SIG.R = 974EEB330DB106F41968F51350508D5A3A6EA1DBA7243A9ADC740DB316063FC186FA13F99BB744BD6ACD299524984D6D
2,475,042,948 UART: [art] SIG.S = 538B1636617ECAAAD497950C06756CED88A2CBBEE57812C0AAF5ED53213B4253B6BDB0E47B0ABBD112B7A8DB9D7AFA59
2,476,022,474 UART: Caliptra RT
2,476,023,171 UART: [state] CFI Enabled
2,476,362,296 UART: [rt] RT listening for mailbox commands...
2,476,364,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,484,172,215 >>> mbox cmd response: success
2,484,206,969 UART:
2,484,207,268 UART: Running Caliptra FMC ...
2,484,208,386 UART:
2,484,208,554 UART: [state] CFI Enabled
2,484,307,536 UART: [art] Extend RT PCRs Done
2,484,308,720 UART: [art] Lock RT PCRs Done
2,484,310,289 UART: [art] Populate DV Done
2,484,315,702 UART: [fht] FMC Alias Private Key: 7
2,484,317,417 UART: [art] Derive CDI
2,484,318,236 UART: [art] Store in in slot 0x4
2,484,376,846 UART: [art] Derive Key Pair
2,484,377,885 UART: [art] Store priv key in slot 0x5
2,486,840,348 UART: [art] Derive Key Pair - Done
2,486,853,386 UART: [art] Signing Cert with AUTHO
2,486,854,734 UART: RITY.KEYID = 7
2,488,566,888 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,568,396 UART: [art] PUB.X = A6F02D07B347E47AC9FD5CF5D68D7E14A9C1FD8E794CC00EF43A4AF2F7FB383140D3F78CA4B9EA35784B94F8C6DA0A84
2,488,575,641 UART: [art] PUB.Y = E03609FADEC73EB436A8ADBDC3F415D2FF301A3A8A456056727DA139E71B4DCE8FEC672984A452CC9A52D5F3A26F3077
2,488,582,933 UART: [art] SIG.R = 1361F2B38E30A4503166E1ACC90B829C1DDA2C456648B86B9F123CE84B26725225660B1375B48A35C3266FF5C7755B64
2,488,590,332 UART: [art] SIG.S = DAE7E05F0188DD3AC6B4ACDFAE5AFC4785CC80BC350AC19E44B516E5A7F0D3A770CE2C55F9835D82154AD7929AFDE726
2,489,569,368 UART: Caliptra RT
2,489,570,080 UART: [state] CFI Enabled
2,489,905,757 UART: [rt] RT listening for mailbox commands...
2,489,907,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,497,721,043 >>> mbox cmd response: success
2,497,755,480 UART:
2,497,755,786 UART: Running Caliptra FMC ...
2,497,756,829 UART:
2,497,756,983 UART: [state] CFI Enabled
2,497,852,727 UART: [art] Extend RT PCRs Done
2,497,853,916 UART: [art] Lock RT PCRs Done
2,497,855,292 UART: [art] Populate DV Done
2,497,860,762 UART: [fht] FMC Alias Private Key: 7
2,497,862,301 UART: [art] Derive CDI
2,497,863,039 UART: [art] Store in in slot 0x4
2,497,921,388 UART: [art] Derive Key Pair
2,497,922,427 UART: [art] Store priv key in slot 0x5
2,500,385,678 UART: [art] Derive Key Pair - Done
2,500,398,561 UART: [art] Signing Cert with AUTHO
2,500,399,861 UART: RITY.KEYID = 7
2,502,111,106 UART: [art] Erasing AUTHORITY.KEYID = 7
2,502,112,616 UART: [art] PUB.X = 0D8774D9C1C3F5524DE0BB1C06102622294490C2D74F40C71C632E71B7ED3E91C58009EEC4D7C80EE20A12EF5D4C76E5
2,502,119,856 UART: [art] PUB.Y = 93E17F78646CDF414FAFA32114249A8114880D4CBBA5EDCF0E3CF896845DB08D664E3643A6F413A720BAB024334A7EFF
2,502,127,118 UART: [art] SIG.R = 974EEB330DB106F41968F51350508D5A3A6EA1DBA7243A9ADC740DB316063FC186FA13F99BB744BD6ACD299524984D6D
2,502,134,529 UART: [art] SIG.S = 538B1636617ECAAAD497950C06756CED88A2CBBEE57812C0AAF5ED53213B4253B6BDB0E47B0ABBD112B7A8DB9D7AFA59
2,503,113,559 UART: Caliptra RT
2,503,114,247 UART: [state] CFI Enabled
2,503,448,232 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 340.24s
Truncated 1329928 bytes from beginning
RT:
2,358,696,642 UART: Running Caliptra FMC ...
2,358,697,750 UART:
2,358,697,922 UART: [state] CFI Enabled
2,358,742,537 UART: [art] Extend RT PCRs Done
2,358,743,688 UART: [art] Lock RT PCRs Done
2,358,744,976 UART: [art] Populate DV Done
2,358,750,442 UART: [fht] FMC Alias Private Key: 7
2,358,752,038 UART: [art] Derive CDI
2,358,752,860 UART: [art] Store in in slot 0x4
2,358,795,132 UART: [art] Derive Key Pair
2,358,796,196 UART: [art] Store priv key in slot 0x5
2,361,223,367 UART: [art] Derive Key Pair - Done
2,361,236,371 UART: [art] Signing Cert with AUTHO
2,361,237,690 UART: RITY.KEYID = 7
2,362,943,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,944,753 UART: [art] PUB.X = 082B2160CF49B742837C2A1C84FF5CB8B4A7A51D2D91C6C07040616D14474081527AE13DF997E5C8E886DF03F1F45EB7
2,362,952,004 UART: [art] PUB.Y = F75ECB2890DE4EA924670EE735812C3C3544A6EDBFCAC0D31C11D9FD85DC9A53C79535B2984CA1A5311BCC57F68D7499
2,362,959,247 UART: [art] SIG.R = F606E2989F66CA58CF55537E4467A26FD33369D377F1BBAAEFF3CF54121D176A633DFA6896C5287D237E3E532C6EB459
2,362,966,644 UART: [art] SIG.S = F1746726984A40DDCDD8D44DEA4701C525E0DD7AB9084933D8753C8A8EC32B02691DD5890D91658D9F21EE5223A5F679
2,363,946,096 UART: Caliptra RT
2,363,946,817 UART: [state] CFI Enabled
2,364,238,421 UART: [rt] RT listening for mailbox commands...
2,364,240,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,364,384,785 UART:
2,364,385,091 UART: Running Caliptra ROM ...
2,364,386,217 UART:
2,364,386,408 UART: [state] CFI Enabled
2,365,361,798 UART: [state] LifecycleState = Unprovisioned
2,365,363,694 UART: [state] DebugLocked = No
2,365,365,524 UART: [state] WD Timer not started. Device not locked for debugging
2,365,369,774 UART: [kat] SHA2-256
2,365,559,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,365,570,421 UART: [kat] ++
2,365,570,911 UART: [kat] sha1
2,365,582,724 UART: [kat] SHA2-256
2,365,585,701 UART: [kat] SHA2-384
2,365,590,236 UART: [kat] SHA2-512-ACC
2,365,592,862 UART: [kat] ECC-384
2,368,035,042 UART: [kat] HMAC-384Kdf
2,368,047,232 UART: [kat] LMS
2,368,578,838 UART: [kat] --
2,368,583,911 UART: [update-reset] ++
2,372,041,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,046,206 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,372,652,236 >>> mbox cmd response: success
2,372,653,185 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,690,773 UART: [update-reset Success] --
2,372,696,616 UART: [state] Locking Datavault
2,372,701,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,703,483 UART: [state] Locking ICCM
2,372,706,077 UART: [exit] Launching FMC @ 0x40000130
2,372,714,760 UART:
2,372,714,998 UART: Running Caliptra FMC ...
2,372,716,105 UART:
2,372,716,270 UART: [state] CFI Enabled
2,372,760,177 UART: [art] Extend RT PCRs Done
2,372,761,326 UART: [art] Lock RT PCRs Done
2,372,762,774 UART: [art] Populate DV Done
2,372,768,582 UART: [fht] FMC Alias Private Key: 7
2,372,770,115 UART: [art] Derive CDI
2,372,770,944 UART: [art] Store in in slot 0x4
2,372,813,382 UART: [art] Derive Key Pair
2,372,814,386 UART: [art] Store priv key in slot 0x5
2,375,241,143 UART: [art] Derive Key Pair - Done
2,375,254,023 UART: [art] Signing Cert with AUTHO
2,375,255,360 UART: RITY.KEYID = 7
2,376,960,432 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,961,939 UART: [art] PUB.X = 83168ABAC27EA4173E432655186DBA36A404592D6C74CEA41CB3887212FC27BBA3456B558D141947E04EC8FE3576E8C0
2,376,969,191 UART: [art] PUB.Y = C95DF7CB284385ED1FBF7F0B0651F8A723833F015D8E252D6F626C2577EE707EDB17B119E73E722D7E52F27A9BA3E865
2,376,976,484 UART: [art] SIG.R = 5F55D333837890C3C77FEE0843DF125C73E9E026B77515C5FDF793E2194DB4200282F8D01483F585218EBEAB710AA63E
2,376,983,879 UART: [art] SIG.S = 3DD88600096495127504C0AF93880C609B8BFCBF15F35A11CB91788A4920FEA9AC2AA76D72C89F6AAB3B0EDD92BDF6EA
2,377,962,997 UART: Caliptra RT
2,377,963,706 UART: [state] CFI Enabled
2,378,250,510 UART: [rt] RT listening for mailbox commands...
2,378,252,400 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,378,397,020 UART:
2,378,397,347 UART: Running Caliptra ROM ...
2,378,398,470 UART:
2,378,398,634 UART: [state] CFI Enabled
2,378,413,711 UART: [state] LifecycleState = Unprovisioned
2,378,415,603 UART: [state] DebugLocked = No
2,378,417,908 UART: [state] WD Timer not started. Device not locked for debugging
2,378,422,264 UART: [kat] SHA2-256
2,378,612,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,622,923 UART: [kat] ++
2,378,623,411 UART: [kat] sha1
2,378,634,851 UART: [kat] SHA2-256
2,378,637,876 UART: [kat] SHA2-384
2,378,644,743 UART: [kat] SHA2-512-ACC
2,378,647,313 UART: [kat] ECC-384
2,381,089,147 UART: [kat] HMAC-384Kdf
2,381,102,034 UART: [kat] LMS
2,381,633,675 UART: [kat] --
2,381,639,772 UART: [update-reset] ++
2,385,105,758 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,109,947 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,385,716,485 >>> mbox cmd response: success
2,385,718,164 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,755,761 UART: [update-reset Success] --
2,385,758,574 UART: [state] Locking Datavault
2,385,761,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,763,499 UART: [state] Locking ICCM
2,385,765,923 UART: [exit] Launching FMC @ 0x40000130
2,385,774,603 UART:
2,385,774,841 UART: Running Caliptra FMC ...
2,385,775,947 UART:
2,385,776,131 UART: [state] CFI Enabled
2,385,820,042 UART: [art] Extend RT PCRs Done
2,385,821,229 UART: [art] Lock RT PCRs Done
2,385,822,611 UART: [art] Populate DV Done
2,385,828,186 UART: [fht] FMC Alias Private Key: 7
2,385,829,834 UART: [art] Derive CDI
2,385,830,577 UART: [art] Store in in slot 0x4
2,385,873,339 UART: [art] Derive Key Pair
2,385,874,340 UART: [art] Store priv key in slot 0x5
2,388,301,562 UART: [art] Derive Key Pair - Done
2,388,314,559 UART: [art] Signing Cert with AUTHO
2,388,315,867 UART: RITY.KEYID = 7
2,390,021,358 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,022,873 UART: [art] PUB.X = 082B2160CF49B742837C2A1C84FF5CB8B4A7A51D2D91C6C07040616D14474081527AE13DF997E5C8E886DF03F1F45EB7
2,390,030,130 UART: [art] PUB.Y = F75ECB2890DE4EA924670EE735812C3C3544A6EDBFCAC0D31C11D9FD85DC9A53C79535B2984CA1A5311BCC57F68D7499
2,390,037,421 UART: [art] SIG.R = F606E2989F66CA58CF55537E4467A26FD33369D377F1BBAAEFF3CF54121D176A633DFA6896C5287D237E3E532C6EB459
2,390,044,823 UART: [art] SIG.S = F1746726984A40DDCDD8D44DEA4701C525E0DD7AB9084933D8753C8A8EC32B02691DD5890D91658D9F21EE5223A5F679
2,391,023,805 UART: Caliptra RT
2,391,024,515 UART: [state] CFI Enabled
2,391,311,915 UART: [rt] RT listening for mailbox commands...
2,391,313,780 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,391,458,166 UART:
2,391,458,471 UART: Running Caliptra ROM ...
2,391,459,508 UART:
2,391,459,772 UART: [state] CFI Enabled
2,391,475,828 UART: [state] LifecycleState = Unprovisioned
2,391,477,721 UART: [state] DebugLocked = No
2,391,480,618 UART: [state] WD Timer not started. Device not locked for debugging
2,391,484,532 UART: [kat] SHA2-256
2,391,674,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,391,685,165 UART: [kat] ++
2,391,685,757 UART: [kat] sha1
2,391,697,051 UART: [kat] SHA2-256
2,391,700,077 UART: [kat] SHA2-384
2,391,704,512 UART: [kat] SHA2-512-ACC
2,391,707,092 UART: [kat] ECC-384
2,394,150,898 UART: [kat] HMAC-384Kdf
2,394,164,258 UART: [kat] LMS
2,394,695,862 UART: [kat] --
2,394,701,046 UART: [update-reset] ++
2,398,162,295 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,166,540 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,398,773,121 >>> mbox cmd response: success
2,398,773,499 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,810,966 UART: [update-reset Success] --
2,398,815,691 UART: [state] Locking Datavault
2,398,819,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,821,527 UART: [state] Locking ICCM
2,398,823,601 UART: [exit] Launching FMC @ 0x40000130
2,398,832,283 UART:
2,398,832,523 UART: Running Caliptra FMC ...
2,398,833,556 UART:
2,398,833,709 UART: [state] CFI Enabled
2,398,877,892 UART: [art] Extend RT PCRs Done
2,398,879,075 UART: [art] Lock RT PCRs Done
2,398,880,402 UART: [art] Populate DV Done
2,398,885,709 UART: [fht] FMC Alias Private Key: 7
2,398,887,249 UART: [art] Derive CDI
2,398,887,989 UART: [art] Store in in slot 0x4
2,398,930,421 UART: [art] Derive Key Pair
2,398,931,461 UART: [art] Store priv key in slot 0x5
2,401,358,917 UART: [art] Derive Key Pair - Done
2,401,371,734 UART: [art] Signing Cert with AUTHO
2,401,373,051 UART: RITY.KEYID = 7
2,403,078,721 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,080,239 UART: [art] PUB.X = 83168ABAC27EA4173E432655186DBA36A404592D6C74CEA41CB3887212FC27BBA3456B558D141947E04EC8FE3576E8C0
2,403,087,523 UART: [art] PUB.Y = C95DF7CB284385ED1FBF7F0B0651F8A723833F015D8E252D6F626C2577EE707EDB17B119E73E722D7E52F27A9BA3E865
2,403,094,740 UART: [art] SIG.R = 5F55D333837890C3C77FEE0843DF125C73E9E026B77515C5FDF793E2194DB4200282F8D01483F585218EBEAB710AA63E
2,403,102,146 UART: [art] SIG.S = 3DD88600096495127504C0AF93880C609B8BFCBF15F35A11CB91788A4920FEA9AC2AA76D72C89F6AAB3B0EDD92BDF6EA
2,404,081,244 UART: Caliptra RT
2,404,081,966 UART: [state] CFI Enabled
2,404,368,975 UART: [rt] RT listening for mailbox commands...
2,404,370,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,404,514,933 UART:
2,404,515,229 UART: Running Caliptra ROM ...
2,404,516,353 UART:
2,404,516,576 UART: [state] CFI Enabled
2,405,488,117 UART: [state] LifecycleState = Unprovisioned
2,405,490,029 UART: [state] DebugLocked = No
2,405,492,512 UART: [state] WD Timer not started. Device not locked for debugging
2,405,497,211 UART: [kat] SHA2-256
2,405,687,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,405,697,889 UART: [kat] ++
2,405,698,598 UART: [kat] sha1
2,405,709,604 UART: [kat] SHA2-256
2,405,712,567 UART: [kat] SHA2-384
2,405,718,730 UART: [kat] SHA2-512-ACC
2,405,721,300 UART: [kat] ECC-384
2,408,166,587 UART: [kat] HMAC-384Kdf
2,408,179,949 UART: [kat] LMS
2,408,711,569 UART: [kat] --
2,408,715,672 UART: [update-reset] ++
2,412,178,772 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,182,805 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
2,412,789,349 >>> mbox cmd response: success
2,412,791,027 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,828,621 UART: [update-reset Success] --
2,412,833,510 UART: [state] Locking Datavault
2,412,837,042 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,839,247 UART: [state] Locking ICCM
2,412,840,704 UART: [exit] Launching FMC @ 0x40000130
2,412,849,390 UART:
2,412,849,667 UART: Running Caliptra FMC ...
2,412,850,705 UART:
2,412,850,859 UART: [state] CFI Enabled
2,412,894,501 UART: [art] Extend RT PCRs Done
2,412,895,652 UART: [art] Lock RT PCRs Done
2,412,897,027 UART: [art] Populate DV Done
2,412,902,498 UART: [fht] FMC Alias Private Key: 7
2,412,904,088 UART: [art] Derive CDI
2,412,904,839 UART: [art] Store in in slot 0x4
2,412,947,427 UART: [art] Derive Key Pair
2,412,948,494 UART: [art] Store priv key in slot 0x5
2,415,375,489 UART: [art] Derive Key Pair - Done
2,415,388,833 UART: [art] Signing Cert with AUTHO
2,415,390,141 UART: RITY.KEYID = 7
2,417,095,742 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,097,251 UART: [art] PUB.X = 082B2160CF49B742837C2A1C84FF5CB8B4A7A51D2D91C6C07040616D14474081527AE13DF997E5C8E886DF03F1F45EB7
2,417,104,521 UART: [art] PUB.Y = F75ECB2890DE4EA924670EE735812C3C3544A6EDBFCAC0D31C11D9FD85DC9A53C79535B2984CA1A5311BCC57F68D7499
2,417,111,760 UART: [art] SIG.R = F606E2989F66CA58CF55537E4467A26FD33369D377F1BBAAEFF3CF54121D176A633DFA6896C5287D237E3E532C6EB459
2,417,119,160 UART: [art] SIG.S = F1746726984A40DDCDD8D44DEA4701C525E0DD7AB9084933D8753C8A8EC32B02691DD5890D91658D9F21EE5223A5F679
2,418,098,080 UART: Caliptra RT
2,418,098,795 UART: [state] CFI Enabled
2,418,386,618 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 335.99s
Truncated 715093 bytes from beginning
2A2DCD4DF0A6A162C8B7F156EFAE2D3
2,310,120,977 UART: [art] SIG.R = 0A2C7B48974E39D5FF86C1DCE63C39D539CA28F2004F46ABA8B6ED353E3EB15663FA201DEAA957E57866FC5C8DD41642
2,310,128,368 UART: [art] SIG.S = 7127DB31DE22B9722D45B7845AC08CD5A49E10C473AE1D2FB7F785191E0406E208BFF36509E049BB4F5097D50BF55811
2,311,107,818 UART: Caliptra RT
2,311,108,510 UART: [state] CFI Enabled
2,311,399,210 UART: [rt] RT listening for mailbox commands...
2,311,401,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,319,131,378 >>> mbox cmd response: success
2,319,165,777 UART:
2,319,166,046 UART: Running Caliptra FMC ...
2,319,167,167 UART:
2,319,167,340 UART: [state] CFI Enabled
2,319,211,911 UART: [art] Extend RT PCRs Done
2,319,213,101 UART: [art] Lock RT PCRs Done
2,319,214,613 UART: [art] Populate DV Done
2,319,219,866 UART: [fht] FMC Alias Private Key: 7
2,319,221,497 UART: [art] Derive CDI
2,319,222,248 UART: [art] Store in in slot 0x4
2,319,264,739 UART: [art] Derive Key Pair
2,319,265,777 UART: [art] Store priv key in slot 0x5
2,321,692,787 UART: [art] Derive Key Pair - Done
2,321,705,575 UART: [art] Signing Cert with AUTHO
2,321,706,886 UART: RITY.KEYID = 7
2,323,412,570 UART: [art] Erasing AUTHORITY.KEYID = 7
2,323,414,081 UART: [art] PUB.X = 0EC1A20ED744E6F03BDD3F8BE8491F7B474825204737CC548E38B47BB3650B404B25F1FEB8118FCEADE39350FC7EDABE
2,323,421,345 UART: [art] PUB.Y = EDC46D4874741CBDB162E40F1A9251AC26B52AC0F5E029B49034024B376699EB7CF34CFD09C963456900570AD274364D
2,323,428,588 UART: [art] SIG.R = BF5A42FDFB68215FA12B078D976348B307741DC7D02032EF530C327DF54C21BE8B6504EA10CAB12682BB7D76C9AB7CAC
2,323,435,981 UART: [art] SIG.S = F2F5B4171BC6D72CB79C05439D40234845A157B6D94C8101B9475B10664C594D2AE467B8AEEC5571492FBE20A7D59E94
2,324,415,304 UART: Caliptra RT
2,324,416,016 UART: [state] CFI Enabled
2,324,703,159 UART: [rt] RT listening for mailbox commands...
2,324,705,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,332,657,951 >>> mbox cmd response: success
2,332,695,155 UART:
2,332,695,462 UART: Running Caliptra FMC ...
2,332,696,586 UART:
2,332,696,757 UART: [state] CFI Enabled
2,332,740,888 UART: [art] Extend RT PCRs Done
2,332,742,029 UART: [art] Lock RT PCRs Done
2,332,743,449 UART: [art] Populate DV Done
2,332,749,029 UART: [fht] FMC Alias Private Key: 7
2,332,750,623 UART: [art] Derive CDI
2,332,751,443 UART: [art] Store in in slot 0x4
2,332,794,049 UART: [art] Derive Key Pair
2,332,795,087 UART: [art] Store priv key in slot 0x5
2,335,222,414 UART: [art] Derive Key Pair - Done
2,335,235,144 UART: [art] Signing Cert with AUTHO
2,335,236,453 UART: RITY.KEYID = 7
2,336,941,692 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,943,203 UART: [art] PUB.X = 3A88EE64191886935634B2AD0CF37462AE677AAA7B61B79F6F6746B9CB228A173818D247644D03349ED16A5084B0556A
2,336,950,453 UART: [art] PUB.Y = 0805D9BB97D55D30CDFF8CE12015D435F16FB68516E021A23600E7E94FE7916012A2DCD4DF0A6A162C8B7F156EFAE2D3
2,336,957,742 UART: [art] SIG.R = 0A2C7B48974E39D5FF86C1DCE63C39D539CA28F2004F46ABA8B6ED353E3EB15663FA201DEAA957E57866FC5C8DD41642
2,336,965,079 UART: [art] SIG.S = 7127DB31DE22B9722D45B7845AC08CD5A49E10C473AE1D2FB7F785191E0406E208BFF36509E049BB4F5097D50BF55811
2,337,944,149 UART: Caliptra RT
2,337,944,868 UART: [state] CFI Enabled
2,338,229,738 UART: [rt] RT listening for mailbox commands...
2,338,231,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,345,962,641 >>> mbox cmd response: success
2,345,998,065 UART:
2,345,998,386 UART: Running Caliptra FMC ...
2,345,999,458 UART:
2,345,999,621 UART: [state] CFI Enabled
2,346,043,426 UART: [art] Extend RT PCRs Done
2,346,044,579 UART: [art] Lock RT PCRs Done
2,346,046,089 UART: [art] Populate DV Done
2,346,051,616 UART: [fht] FMC Alias Private Key: 7
2,346,053,306 UART: [art] Derive CDI
2,346,054,129 UART: [art] Store in in slot 0x4
2,346,096,404 UART: [art] Derive Key Pair
2,346,097,414 UART: [art] Store priv key in slot 0x5
2,348,524,117 UART: [art] Derive Key Pair - Done
2,348,536,969 UART: [art] Signing Cert with AUTHO
2,348,538,306 UART: RITY.KEYID = 7
2,350,243,753 UART: [art] Erasing AUTHORITY.KEYID = 7
2,350,245,262 UART: [art] PUB.X = 0EC1A20ED744E6F03BDD3F8BE8491F7B474825204737CC548E38B47BB3650B404B25F1FEB8118FCEADE39350FC7EDABE
2,350,252,511 UART: [art] PUB.Y = EDC46D4874741CBDB162E40F1A9251AC26B52AC0F5E029B49034024B376699EB7CF34CFD09C963456900570AD274364D
2,350,259,750 UART: [art] SIG.R = BF5A42FDFB68215FA12B078D976348B307741DC7D02032EF530C327DF54C21BE8B6504EA10CAB12682BB7D76C9AB7CAC
2,350,267,141 UART: [art] SIG.S = F2F5B4171BC6D72CB79C05439D40234845A157B6D94C8101B9475B10664C594D2AE467B8AEEC5571492FBE20A7D59E94
2,351,246,255 UART: Caliptra RT
2,351,246,965 UART: [state] CFI Enabled
2,351,537,553 UART: [rt] RT listening for mailbox commands...
2,351,539,432 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,359,264,612 >>> mbox cmd response: success
2,359,297,009 UART:
2,359,297,294 UART: Running Caliptra FMC ...
2,359,298,336 UART:
2,359,298,489 UART: [state] CFI Enabled
2,359,342,757 UART: [art] Extend RT PCRs Done
2,359,343,942 UART: [art] Lock RT PCRs Done
2,359,345,549 UART: [art] Populate DV Done
2,359,350,961 UART: [fht] FMC Alias Private Key: 7
2,359,352,564 UART: [art] Derive CDI
2,359,353,308 UART: [art] Store in in slot 0x4
2,359,395,626 UART: [art] Derive Key Pair
2,359,396,629 UART: [art] Store priv key in slot 0x5
2,361,823,686 UART: [art] Derive Key Pair - Done
2,361,836,630 UART: [art] Signing Cert with AUTHO
2,361,837,933 UART: RITY.KEYID = 7
2,363,543,250 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,544,757 UART: [art] PUB.X = 3A88EE64191886935634B2AD0CF37462AE677AAA7B61B79F6F6746B9CB228A173818D247644D03349ED16A5084B0556A
2,363,552,001 UART: [art] PUB.Y = 0805D9BB97D55D30CDFF8CE12015D435F16FB68516E021A23600E7E94FE7916012A2DCD4DF0A6A162C8B7F156EFAE2D3
2,363,559,294 UART: [art] SIG.R = 0A2C7B48974E39D5FF86C1DCE63C39D539CA28F2004F46ABA8B6ED353E3EB15663FA201DEAA957E57866FC5C8DD41642
2,363,566,637 UART: [art] SIG.S = 7127DB31DE22B9722D45B7845AC08CD5A49E10C473AE1D2FB7F785191E0406E208BFF36509E049BB4F5097D50BF55811
2,364,545,374 UART: Caliptra RT
2,364,546,062 UART: [state] CFI Enabled
2,364,832,223 UART: [rt] RT listening for mailbox commands...
2,364,834,104 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,372,777,820 >>> mbox cmd response: success
2,372,810,813 UART:
2,372,811,086 UART: Running Caliptra FMC ...
2,372,812,134 UART:
2,372,812,298 UART: [state] CFI Enabled
2,372,856,267 UART: [art] Extend RT PCRs Done
2,372,857,447 UART: [art] Lock RT PCRs Done
2,372,858,905 UART: [art] Populate DV Done
2,372,864,637 UART: [fht] FMC Alias Private Key: 7
2,372,866,340 UART: [art] Derive CDI
2,372,867,150 UART: [art] Store in in slot 0x4
2,372,910,068 UART: [art] Derive Key Pair
2,372,911,094 UART: [art] Store priv key in slot 0x5
2,375,338,069 UART: [art] Derive Key Pair - Done
2,375,351,333 UART: [art] Signing Cert with AUTHO
2,375,352,637 UART: RITY.KEYID = 7
2,377,058,243 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,059,742 UART: [art] PUB.X = 0EC1A20ED744E6F03BDD3F8BE8491F7B474825204737CC548E38B47BB3650B404B25F1FEB8118FCEADE39350FC7EDABE
2,377,066,988 UART: [art] PUB.Y = EDC46D4874741CBDB162E40F1A9251AC26B52AC0F5E029B49034024B376699EB7CF34CFD09C963456900570AD274364D
2,377,074,231 UART: [art] SIG.R = BF5A42FDFB68215FA12B078D976348B307741DC7D02032EF530C327DF54C21BE8B6504EA10CAB12682BB7D76C9AB7CAC
2,377,081,628 UART: [art] SIG.S = F2F5B4171BC6D72CB79C05439D40234845A157B6D94C8101B9475B10664C594D2AE467B8AEEC5571492FBE20A7D59E94
2,378,060,851 UART: Caliptra RT
2,378,061,570 UART: [state] CFI Enabled
2,378,353,520 UART: [rt] RT listening for mailbox commands...
2,378,355,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,386,086,382 >>> mbox cmd response: success
2,386,118,716 UART:
2,386,118,993 UART: Running Caliptra FMC ...
2,386,120,127 UART:
2,386,120,292 UART: [state] CFI Enabled
2,386,164,482 UART: [art] Extend RT PCRs Done
2,386,165,666 UART: [art] Lock RT PCRs Done
2,386,167,098 UART: [art] Populate DV Done
2,386,172,604 UART: [fht] FMC Alias Private Key: 7
2,386,174,212 UART: [art] Derive CDI
2,386,174,953 UART: [art] Store in in slot 0x4
2,386,217,676 UART: [art] Derive Key Pair
2,386,218,746 UART: [art] Store priv key in slot 0x5
2,388,645,020 UART: [art] Derive Key Pair - Done
2,388,657,978 UART: [art] Signing Cert with AUTHO
2,388,659,283 UART: RITY.KEYID = 7
2,390,364,944 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,366,439 UART: [art] PUB.X = 3A88EE64191886935634B2AD0CF37462AE677AAA7B61B79F6F6746B9CB228A173818D247644D03349ED16A5084B0556A
2,390,373,753 UART: [art] PUB.Y = 0805D9BB97D55D30CDFF8CE12015D435F16FB68516E021A23600E7E94FE7916012A2DCD4DF0A6A162C8B7F156EFAE2D3
2,390,380,961 UART: [art] SIG.R = 0A2C7B48974E39D5FF86C1DCE63C39D539CA28F2004F46ABA8B6ED353E3EB15663FA201DEAA957E57866FC5C8DD41642
2,390,388,367 UART: [art] SIG.S = 7127DB31DE22B9722D45B7845AC08CD5A49E10C473AE1D2FB7F785191E0406E208BFF36509E049BB4F5097D50BF55811
2,391,366,826 UART: Caliptra RT
2,391,367,520 UART: [state] CFI Enabled
2,391,655,058 UART: [rt] RT listening for mailbox commands...
2,391,656,927 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,399,380,336 >>> mbox cmd response: success
2,399,414,591 UART:
2,399,414,903 UART: Running Caliptra FMC ...
2,399,416,031 UART:
2,399,416,206 UART: [state] CFI Enabled
2,399,460,442 UART: [art] Extend RT PCRs Done
2,399,461,590 UART: [art] Lock RT PCRs Done
2,399,463,017 UART: [art] Populate DV Done
2,399,468,263 UART: [fht] FMC Alias Private Key: 7
2,399,469,754 UART: [art] Derive CDI
2,399,470,539 UART: [art] Store in in slot 0x4
2,399,513,033 UART: [art] Derive Key Pair
2,399,514,081 UART: [art] Store priv key in slot 0x5
2,401,940,650 UART: [art] Derive Key Pair - Done
2,401,953,316 UART: [art] Signing Cert with AUTHO
2,401,954,614 UART: RITY.KEYID = 7
2,403,660,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,661,576 UART: [art] PUB.X = 0EC1A20ED744E6F03BDD3F8BE8491F7B474825204737CC548E38B47BB3650B404B25F1FEB8118FCEADE39350FC7EDABE
2,403,668,879 UART: [art] PUB.Y = EDC46D4874741CBDB162E40F1A9251AC26B52AC0F5E029B49034024B376699EB7CF34CFD09C963456900570AD274364D
2,403,676,110 UART: [art] SIG.R = BF5A42FDFB68215FA12B078D976348B307741DC7D02032EF530C327DF54C21BE8B6504EA10CAB12682BB7D76C9AB7CAC
2,403,683,510 UART: [art] SIG.S = F2F5B4171BC6D72CB79C05439D40234845A157B6D94C8101B9475B10664C594D2AE467B8AEEC5571492FBE20A7D59E94
2,404,662,523 UART: Caliptra RT
2,404,663,229 UART: [state] CFI Enabled
2,404,951,558 UART: [rt] RT listening for mailbox commands...
2,404,953,446 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,412,894,587 >>> mbox cmd response: success
2,412,930,457 UART:
2,412,930,734 UART: Running Caliptra FMC ...
2,412,931,849 UART:
2,412,932,026 UART: [state] CFI Enabled
2,412,976,415 UART: [art] Extend RT PCRs Done
2,412,977,581 UART: [art] Lock RT PCRs Done
2,412,979,200 UART: [art] Populate DV Done
2,412,984,665 UART: [fht] FMC Alias Private Key: 7
2,412,986,258 UART: [art] Derive CDI
2,412,987,075 UART: [art] Store in in slot 0x4
2,413,029,838 UART: [art] Derive Key Pair
2,413,030,885 UART: [art] Store priv key in slot 0x5
2,415,457,899 UART: [art] Derive Key Pair - Done
2,415,471,012 UART: [art] Signing Cert with AUTHO
2,415,472,329 UART: RITY.KEYID = 7
2,417,177,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,179,087 UART: [art] PUB.X = 3A88EE64191886935634B2AD0CF37462AE677AAA7B61B79F6F6746B9CB228A173818D247644D03349ED16A5084B0556A
2,417,186,334 UART: [art] PUB.Y = 0805D9BB97D55D30CDFF8CE12015D435F16FB68516E021A23600E7E94FE7916012A2DCD4DF0A6A162C8B7F156EFAE2D3
2,417,193,575 UART: [art] SIG.R = 0A2C7B48974E39D5FF86C1DCE63C39D539CA28F2004F46ABA8B6ED353E3EB15663FA201DEAA957E57866FC5C8DD41642
2,417,200,966 UART: [art] SIG.S = 7127DB31DE22B9722D45B7845AC08CD5A49E10C473AE1D2FB7F785191E0406E208BFF36509E049BB4F5097D50BF55811
2,418,180,004 UART: Caliptra RT
2,418,180,734 UART: [state] CFI Enabled
2,418,467,722 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 335.99s
Truncated 1358286 bytes from beginning
9 UART: [art] Store in in slot 0x4
1,716,494,564 UART: [art] Derive Key Pair
1,716,494,924 UART: [art] Store priv key in slot 0x5
1,716,507,720 UART: [art] Derive Key Pair - Done
1,716,522,194 UART: [art] Signing Cert with AUTHO
1,716,522,674 UART: RITY.KEYID = 7
1,716,537,792 UART: [art] Erasing AUTHORITY.KEYID = 7
1,716,538,557 UART: [art] PUB.X = 66AC4A5BDC70781FBC01973A3D3A78ADEEC3A9D72129CF61579345701943C10CBADD71ADA99F8367D78CC39F199A22C0
1,716,545,333 UART: [art] PUB.Y = D58930055F49E826EBF8926DD7A3ED90D335F802AD1D501034FF4F3E7CC5081BB8A240C9F6A1411BF68843643D603840
1,716,552,274 UART: [art] SIG.R = 8A3ED98A97076531F0AF12CCBC56697FFA0A6A81D74F708FECF5D0D5A9430706B5D8560C9BDECFF4A63D841E3E35380B
1,716,559,042 UART: [art] SIG.S = 616CB3ACACC8D0CF7BB15330C3340C215C17935B4F9C6DEF68A7DA9419E6C5C45DF8CED2A5500B71ACF495598C09B9A7
1,716,582,778 UART: Caliptra RT
1,716,583,031 UART: [state] CFI Enabled
1,716,866,682 UART: [rt] RT listening for mailbox commands...
1,716,867,352 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,716,868,556 UART:
1,716,868,572 UART: Running Caliptra ROM ...
1,716,868,980 UART:
1,716,869,034 UART: [state] CFI Enabled
1,716,872,004 UART: [state] LifecycleState = Unprovisioned
1,716,872,659 UART: [state] DebugLocked = No
1,716,873,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,716,874,818 UART: [kat] SHA2-256
1,717,668,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,717,672,864 UART: [kat] ++
1,717,673,016 UART: [kat] sha1
1,717,677,258 UART: [kat] SHA2-256
1,717,679,196 UART: [kat] SHA2-384
1,717,681,941 UART: [kat] SHA2-512-ACC
1,717,683,841 UART: [kat] ECC-384
1,717,689,724 UART: [kat] HMAC-384Kdf
1,717,694,230 UART: [kat] LMS
1,718,262,426 UART: [kat] --
1,718,263,307 UART: [update-reset] ++
1,719,596,133 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,719,597,247 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,719,746,877 >>> mbox cmd response: success
1,719,747,062 UART: [update-reset] Copying MAN_2 To MAN_1
1,719,755,076 UART: [update-reset Success] --
1,719,756,005 UART: [state] Locking Datavault
1,719,756,747 UART: [state] Locking PCR0, PCR1 and PCR31
1,719,757,351 UART: [state] Locking ICCM
1,719,757,937 UART: [exit] Launching FMC @ 0x40000130
1,719,763,266 UART:
1,719,763,282 UART: Running Caliptra FMC ...
1,719,763,690 UART:
1,719,763,744 UART: [state] CFI Enabled
1,719,852,859 UART: [art] Extend RT PCRs Done
1,719,853,287 UART: [art] Lock RT PCRs Done
1,719,854,580 UART: [art] Populate DV Done
1,719,862,821 UART: [fht] FMC Alias Private Key: 7
1,719,863,881 UART: [art] Derive CDI
1,719,864,161 UART: [art] Store in in slot 0x4
1,719,949,688 UART: [art] Derive Key Pair
1,719,950,048 UART: [art] Store priv key in slot 0x5
1,719,963,078 UART: [art] Derive Key Pair - Done
1,719,977,800 UART: [art] Signing Cert with AUTHO
1,719,978,280 UART: RITY.KEYID = 7
1,719,993,188 UART: [art] Erasing AUTHORITY.KEYID = 7
1,719,993,953 UART: [art] PUB.X = FF6CB9FD2913786E271399FDB098C1278FBBB70063FEFDDD5537DDD0996C079FBDD3C5789E43BE5EE3B487CEFA06311D
1,720,000,715 UART: [art] PUB.Y = C4087C0E5730A6CFCF506AE6DCEB4C9ED84B1861DFAF412319B1228F1E9D7CC21F9A27C073403CBE5D56A46AA79B29F2
1,720,007,677 UART: [art] SIG.R = AD608DB368816CDE3EFEE284ECB2E8E1DD1FE0B7B9B87499FB1211E47BDF6EBB084659A18524B15D07F8A7646880345D
1,720,014,455 UART: [art] SIG.S = A8AD539CA1EA0B3ACC8D453D286C8FCD43299E6CF98AB31DA2BE18AD8E90507E84995801F3C5D53692458BDCA2C13320
1,720,038,128 UART: Caliptra RT
1,720,038,381 UART: [state] CFI Enabled
1,720,315,331 UART: [rt] RT listening for mailbox commands...
1,720,316,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,720,317,011 UART:
1,720,317,027 UART: Running Caliptra ROM ...
1,720,317,435 UART:
1,720,317,489 UART: [state] CFI Enabled
1,720,320,345 UART: [state] LifecycleState = Unprovisioned
1,720,321,000 UART: [state] DebugLocked = No
1,720,321,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,720,323,035 UART: [kat] SHA2-256
1,721,116,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,721,121,081 UART: [kat] ++
1,721,121,233 UART: [kat] sha1
1,721,125,479 UART: [kat] SHA2-256
1,721,127,417 UART: [kat] SHA2-384
1,721,130,158 UART: [kat] SHA2-512-ACC
1,721,132,058 UART: [kat] ECC-384
1,721,137,457 UART: [kat] HMAC-384Kdf
1,721,141,967 UART: [kat] LMS
1,721,710,163 UART: [kat] --
1,721,711,114 UART: [update-reset] ++
1,723,045,170 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,723,046,272 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,723,195,902 >>> mbox cmd response: success
1,723,196,191 UART: [update-reset] Copying MAN_2 To MAN_1
1,723,204,205 UART: [update-reset Success] --
1,723,205,266 UART: [state] Locking Datavault
1,723,206,276 UART: [state] Locking PCR0, PCR1 and PCR31
1,723,206,880 UART: [state] Locking ICCM
1,723,207,326 UART: [exit] Launching FMC @ 0x40000130
1,723,212,655 UART:
1,723,212,671 UART: Running Caliptra FMC ...
1,723,213,079 UART:
1,723,213,133 UART: [state] CFI Enabled
1,723,301,796 UART: [art] Extend RT PCRs Done
1,723,302,224 UART: [art] Lock RT PCRs Done
1,723,303,587 UART: [art] Populate DV Done
1,723,311,876 UART: [fht] FMC Alias Private Key: 7
1,723,313,058 UART: [art] Derive CDI
1,723,313,338 UART: [art] Store in in slot 0x4
1,723,398,529 UART: [art] Derive Key Pair
1,723,398,889 UART: [art] Store priv key in slot 0x5
1,723,411,783 UART: [art] Derive Key Pair - Done
1,723,426,733 UART: [art] Signing Cert with AUTHO
1,723,427,213 UART: RITY.KEYID = 7
1,723,442,441 UART: [art] Erasing AUTHORITY.KEYID = 7
1,723,443,206 UART: [art] PUB.X = 66AC4A5BDC70781FBC01973A3D3A78ADEEC3A9D72129CF61579345701943C10CBADD71ADA99F8367D78CC39F199A22C0
1,723,449,982 UART: [art] PUB.Y = D58930055F49E826EBF8926DD7A3ED90D335F802AD1D501034FF4F3E7CC5081BB8A240C9F6A1411BF68843643D603840
1,723,456,923 UART: [art] SIG.R = 8A3ED98A97076531F0AF12CCBC56697FFA0A6A81D74F708FECF5D0D5A9430706B5D8560C9BDECFF4A63D841E3E35380B
1,723,463,691 UART: [art] SIG.S = 616CB3ACACC8D0CF7BB15330C3340C215C17935B4F9C6DEF68A7DA9419E6C5C45DF8CED2A5500B71ACF495598C09B9A7
1,723,487,645 UART: Caliptra RT
1,723,487,898 UART: [state] CFI Enabled
1,723,773,067 UART: [rt] RT listening for mailbox commands...
1,723,773,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,723,774,675 UART:
1,723,774,691 UART: Running Caliptra ROM ...
1,723,775,099 UART:
1,723,775,153 UART: [state] CFI Enabled
1,723,778,123 UART: [state] LifecycleState = Unprovisioned
1,723,778,778 UART: [state] DebugLocked = No
1,723,779,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,723,781,073 UART: [kat] SHA2-256
1,724,575,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,724,579,119 UART: [kat] ++
1,724,579,271 UART: [kat] sha1
1,724,583,445 UART: [kat] SHA2-256
1,724,585,383 UART: [kat] SHA2-384
1,724,588,278 UART: [kat] SHA2-512-ACC
1,724,590,178 UART: [kat] ECC-384
1,724,595,737 UART: [kat] HMAC-384Kdf
1,724,600,223 UART: [kat] LMS
1,725,168,419 UART: [kat] --
1,725,169,612 UART: [update-reset] ++
1,726,502,192 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,726,503,236 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,726,652,866 >>> mbox cmd response: success
1,726,653,171 UART: [update-reset] Copying MAN_2 To MAN_1
1,726,661,185 UART: [update-reset Success] --
1,726,662,322 UART: [state] Locking Datavault
1,726,663,004 UART: [state] Locking PCR0, PCR1 and PCR31
1,726,663,608 UART: [state] Locking ICCM
1,726,664,040 UART: [exit] Launching FMC @ 0x40000130
1,726,669,369 UART:
1,726,669,385 UART: Running Caliptra FMC ...
1,726,669,793 UART:
1,726,669,847 UART: [state] CFI Enabled
1,726,758,898 UART: [art] Extend RT PCRs Done
1,726,759,326 UART: [art] Lock RT PCRs Done
1,726,760,601 UART: [art] Populate DV Done
1,726,768,748 UART: [fht] FMC Alias Private Key: 7
1,726,769,778 UART: [art] Derive CDI
1,726,770,058 UART: [art] Store in in slot 0x4
1,726,855,773 UART: [art] Derive Key Pair
1,726,856,133 UART: [art] Store priv key in slot 0x5
1,726,869,227 UART: [art] Derive Key Pair - Done
1,726,884,007 UART: [art] Signing Cert with AUTHO
1,726,884,487 UART: RITY.KEYID = 7
1,726,899,769 UART: [art] Erasing AUTHORITY.KEYID = 7
1,726,900,534 UART: [art] PUB.X = FF6CB9FD2913786E271399FDB098C1278FBBB70063FEFDDD5537DDD0996C079FBDD3C5789E43BE5EE3B487CEFA06311D
1,726,907,296 UART: [art] PUB.Y = C4087C0E5730A6CFCF506AE6DCEB4C9ED84B1861DFAF412319B1228F1E9D7CC21F9A27C073403CBE5D56A46AA79B29F2
1,726,914,258 UART: [art] SIG.R = AD608DB368816CDE3EFEE284ECB2E8E1DD1FE0B7B9B87499FB1211E47BDF6EBB084659A18524B15D07F8A7646880345D
1,726,921,036 UART: [art] SIG.S = A8AD539CA1EA0B3ACC8D453D286C8FCD43299E6CF98AB31DA2BE18AD8E90507E84995801F3C5D53692458BDCA2C13320
1,726,944,495 UART: Caliptra RT
1,726,944,748 UART: [state] CFI Enabled
1,727,226,844 UART: [rt] RT listening for mailbox commands...
1,727,227,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,727,228,442 UART:
1,727,228,458 UART: Running Caliptra ROM ...
1,727,228,866 UART:
1,727,228,920 UART: [state] CFI Enabled
1,727,231,124 UART: [state] LifecycleState = Unprovisioned
1,727,231,779 UART: [state] DebugLocked = No
1,727,232,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,727,233,926 UART: [kat] SHA2-256
1,728,027,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,728,031,972 UART: [kat] ++
1,728,032,124 UART: [kat] sha1
1,728,036,430 UART: [kat] SHA2-256
1,728,038,368 UART: [kat] SHA2-384
1,728,041,007 UART: [kat] SHA2-512-ACC
1,728,042,907 UART: [kat] ECC-384
1,728,048,620 UART: [kat] HMAC-384Kdf
1,728,053,170 UART: [kat] LMS
1,728,621,366 UART: [kat] --
1,728,622,335 UART: [update-reset] ++
1,729,955,445 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,729,956,533 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,730,106,163 >>> mbox cmd response: success
1,730,106,512 UART: [update-reset] Copying MAN_2 To MAN_1
1,730,114,526 UART: [update-reset Success] --
1,730,115,589 UART: [state] Locking Datavault
1,730,116,403 UART: [state] Locking PCR0, PCR1 and PCR31
1,730,117,007 UART: [state] Locking ICCM
1,730,117,481 UART: [exit] Launching FMC @ 0x40000130
1,730,122,810 UART:
1,730,122,826 UART: Running Caliptra FMC ...
1,730,123,234 UART:
1,730,123,288 UART: [state] CFI Enabled
1,730,212,025 UART: [art] Extend RT PCRs Done
1,730,212,453 UART: [art] Lock RT PCRs Done
1,730,213,394 UART: [art] Populate DV Done
1,730,221,579 UART: [fht] FMC Alias Private Key: 7
1,730,222,625 UART: [art] Derive CDI
1,730,222,905 UART: [art] Store in in slot 0x4
1,730,308,822 UART: [art] Derive Key Pair
1,730,309,182 UART: [art] Store priv key in slot 0x5
1,730,322,246 UART: [art] Derive Key Pair - Done
1,730,337,108 UART: [art] Signing Cert with AUTHO
1,730,337,588 UART: RITY.KEYID = 7
1,730,352,542 UART: [art] Erasing AUTHORITY.KEYID = 7
1,730,353,307 UART: [art] PUB.X = 66AC4A5BDC70781FBC01973A3D3A78ADEEC3A9D72129CF61579345701943C10CBADD71ADA99F8367D78CC39F199A22C0
1,730,360,083 UART: [art] PUB.Y = D58930055F49E826EBF8926DD7A3ED90D335F802AD1D501034FF4F3E7CC5081BB8A240C9F6A1411BF68843643D603840
1,730,367,024 UART: [art] SIG.R = 8A3ED98A97076531F0AF12CCBC56697FFA0A6A81D74F708FECF5D0D5A9430706B5D8560C9BDECFF4A63D841E3E35380B
1,730,373,792 UART: [art] SIG.S = 616CB3ACACC8D0CF7BB15330C3340C215C17935B4F9C6DEF68A7DA9419E6C5C45DF8CED2A5500B71ACF495598C09B9A7
1,730,398,112 UART: Caliptra RT
1,730,398,365 UART: [state] CFI Enabled
1,730,684,976 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 335.17s
Truncated 734952 bytes from beginning
4 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,645,716,161 >>> mbox cmd response: success
1,645,729,384 UART:
1,645,729,400 UART: Running Caliptra FMC ...
1,645,729,808 UART:
1,645,729,862 UART: [state] CFI Enabled
1,645,819,119 UART: [art] Extend RT PCRs Done
1,645,819,547 UART: [art] Lock RT PCRs Done
1,645,820,860 UART: [art] Populate DV Done
1,645,829,185 UART: [fht] FMC Alias Private Key: 7
1,645,830,219 UART: [art] Derive CDI
1,645,830,499 UART: [art] Store in in slot 0x4
1,645,916,352 UART: [art] Derive Key Pair
1,645,916,712 UART: [art] Store priv key in slot 0x5
1,645,930,610 UART: [art] Derive Key Pair - Done
1,645,945,216 UART: [art] Signing Cert with AUTHO
1,645,945,696 UART: RITY.KEYID = 7
1,645,960,638 UART: [art] Erasing AUTHORITY.KEYID = 7
1,645,961,403 UART: [art] PUB.X = 2D83773DBA15327C634956F0FE979FE4B3BC63189276EE3B98DB82E6C94B58795F8E62F9F7A49683D9A9AECC847EE5F8
1,645,968,181 UART: [art] PUB.Y = 41DB22F84CA7A1573843BE6DA22EC2C0508C880D89B833F4A660904FE224B2C0B8028081DB2FEA361DC043CE6C776C0D
1,645,975,130 UART: [art] SIG.R = 5F0FA12D2A87E1051AA1A6FD333E0A2F52F09F9015DA047ACA3FA004532FA485AC16B40AB85EB803D4200CB34EBAE88A
1,645,981,894 UART: [art] SIG.S = D99CD221DA891C50E1CDE954ACDDD9CD384F07D8DE5849297C4CA2BCD3108915DAC890D301338DECF008BA90B0531DE6
1,646,005,992 UART: Caliptra RT
1,646,006,245 UART: [state] CFI Enabled
1,646,291,396 UART: [rt] RT listening for mailbox commands...
1,646,292,066 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,649,052,107 >>> mbox cmd response: success
1,649,065,684 UART:
1,649,065,700 UART: Running Caliptra FMC ...
1,649,066,108 UART:
1,649,066,162 UART: [state] CFI Enabled
1,649,154,939 UART: [art] Extend RT PCRs Done
1,649,155,367 UART: [art] Lock RT PCRs Done
1,649,156,442 UART: [art] Populate DV Done
1,649,164,577 UART: [fht] FMC Alias Private Key: 7
1,649,165,575 UART: [art] Derive CDI
1,649,165,855 UART: [art] Store in in slot 0x4
1,649,251,332 UART: [art] Derive Key Pair
1,649,251,692 UART: [art] Store priv key in slot 0x5
1,649,264,358 UART: [art] Derive Key Pair - Done
1,649,279,163 UART: [art] Signing Cert with AUTHO
1,649,279,643 UART: RITY.KEYID = 7
1,649,295,087 UART: [art] Erasing AUTHORITY.KEYID = 7
1,649,295,852 UART: [art] PUB.X = 122103B6D96F4387EECC9D55AE9ED56133471C93FCDD03F9FE7806216AD39FA60A9CDE9F5516C92F82365013B980F249
1,649,302,614 UART: [art] PUB.Y = 1B5AB3BEC7E8B4696E316045F578824A8931B8A3C2C2FF65138DCBAED45D10B4345C0741D955CB177F78C7AE31D89177
1,649,309,567 UART: [art] SIG.R = E8CDECD91F83771563976D95533C1CD5381DB7CDDF7DEB2335AC818A5EDC38129C87D4F1465F4BF8E4B2869D07CA5FE1
1,649,316,350 UART: [art] SIG.S = 0B940C24B5AE305F65F83AFE3AD04029E7C46F12D163661EC17001AA2C495417F783C39620A3E6941FB9DE5A64AA38B0
1,649,340,194 UART: Caliptra RT
1,649,340,447 UART: [state] CFI Enabled
1,649,620,844 UART: [rt] RT listening for mailbox commands...
1,649,621,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,652,381,727 >>> mbox cmd response: success
1,652,395,496 UART:
1,652,395,512 UART: Running Caliptra FMC ...
1,652,395,920 UART:
1,652,395,974 UART: [state] CFI Enabled
1,652,485,073 UART: [art] Extend RT PCRs Done
1,652,485,501 UART: [art] Lock RT PCRs Done
1,652,486,696 UART: [art] Populate DV Done
1,652,495,029 UART: [fht] FMC Alias Private Key: 7
1,652,496,023 UART: [art] Derive CDI
1,652,496,303 UART: [art] Store in in slot 0x4
1,652,582,170 UART: [art] Derive Key Pair
1,652,582,530 UART: [art] Store priv key in slot 0x5
1,652,595,292 UART: [art] Derive Key Pair - Done
1,652,610,178 UART: [art] Signing Cert with AUTHO
1,652,610,658 UART: RITY.KEYID = 7
1,652,625,672 UART: [art] Erasing AUTHORITY.KEYID = 7
1,652,626,437 UART: [art] PUB.X = 2D83773DBA15327C634956F0FE979FE4B3BC63189276EE3B98DB82E6C94B58795F8E62F9F7A49683D9A9AECC847EE5F8
1,652,633,215 UART: [art] PUB.Y = 41DB22F84CA7A1573843BE6DA22EC2C0508C880D89B833F4A660904FE224B2C0B8028081DB2FEA361DC043CE6C776C0D
1,652,640,164 UART: [art] SIG.R = 5F0FA12D2A87E1051AA1A6FD333E0A2F52F09F9015DA047ACA3FA004532FA485AC16B40AB85EB803D4200CB34EBAE88A
1,652,646,928 UART: [art] SIG.S = D99CD221DA891C50E1CDE954ACDDD9CD384F07D8DE5849297C4CA2BCD3108915DAC890D301338DECF008BA90B0531DE6
1,652,670,910 UART: Caliptra RT
1,652,671,163 UART: [state] CFI Enabled
1,652,955,044 UART: [rt] RT listening for mailbox commands...
1,652,955,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,655,715,823 >>> mbox cmd response: success
1,655,729,040 UART:
1,655,729,056 UART: Running Caliptra FMC ...
1,655,729,464 UART:
1,655,729,518 UART: [state] CFI Enabled
1,655,818,715 UART: [art] Extend RT PCRs Done
1,655,819,143 UART: [art] Lock RT PCRs Done
1,655,820,444 UART: [art] Populate DV Done
1,655,828,633 UART: [fht] FMC Alias Private Key: 7
1,655,829,621 UART: [art] Derive CDI
1,655,829,901 UART: [art] Store in in slot 0x4
1,655,915,518 UART: [art] Derive Key Pair
1,655,915,878 UART: [art] Store priv key in slot 0x5
1,655,929,476 UART: [art] Derive Key Pair - Done
1,655,944,239 UART: [art] Signing Cert with AUTHO
1,655,944,719 UART: RITY.KEYID = 7
1,655,959,943 UART: [art] Erasing AUTHORITY.KEYID = 7
1,655,960,708 UART: [art] PUB.X = 122103B6D96F4387EECC9D55AE9ED56133471C93FCDD03F9FE7806216AD39FA60A9CDE9F5516C92F82365013B980F249
1,655,967,470 UART: [art] PUB.Y = 1B5AB3BEC7E8B4696E316045F578824A8931B8A3C2C2FF65138DCBAED45D10B4345C0741D955CB177F78C7AE31D89177
1,655,974,423 UART: [art] SIG.R = E8CDECD91F83771563976D95533C1CD5381DB7CDDF7DEB2335AC818A5EDC38129C87D4F1465F4BF8E4B2869D07CA5FE1
1,655,981,206 UART: [art] SIG.S = 0B940C24B5AE305F65F83AFE3AD04029E7C46F12D163661EC17001AA2C495417F783C39620A3E6941FB9DE5A64AA38B0
1,656,005,536 UART: Caliptra RT
1,656,005,789 UART: [state] CFI Enabled
1,656,287,184 UART: [rt] RT listening for mailbox commands...
1,656,287,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,659,048,523 >>> mbox cmd response: success
1,659,061,728 UART:
1,659,061,744 UART: Running Caliptra FMC ...
1,659,062,152 UART:
1,659,062,206 UART: [state] CFI Enabled
1,659,151,055 UART: [art] Extend RT PCRs Done
1,659,151,483 UART: [art] Lock RT PCRs Done
1,659,152,648 UART: [art] Populate DV Done
1,659,160,777 UART: [fht] FMC Alias Private Key: 7
1,659,161,833 UART: [art] Derive CDI
1,659,162,113 UART: [art] Store in in slot 0x4
1,659,247,470 UART: [art] Derive Key Pair
1,659,247,830 UART: [art] Store priv key in slot 0x5
1,659,261,282 UART: [art] Derive Key Pair - Done
1,659,276,220 UART: [art] Signing Cert with AUTHO
1,659,276,700 UART: RITY.KEYID = 7
1,659,291,520 UART: [art] Erasing AUTHORITY.KEYID = 7
1,659,292,285 UART: [art] PUB.X = 2D83773DBA15327C634956F0FE979FE4B3BC63189276EE3B98DB82E6C94B58795F8E62F9F7A49683D9A9AECC847EE5F8
1,659,299,063 UART: [art] PUB.Y = 41DB22F84CA7A1573843BE6DA22EC2C0508C880D89B833F4A660904FE224B2C0B8028081DB2FEA361DC043CE6C776C0D
1,659,306,012 UART: [art] SIG.R = 5F0FA12D2A87E1051AA1A6FD333E0A2F52F09F9015DA047ACA3FA004532FA485AC16B40AB85EB803D4200CB34EBAE88A
1,659,312,776 UART: [art] SIG.S = D99CD221DA891C50E1CDE954ACDDD9CD384F07D8DE5849297C4CA2BCD3108915DAC890D301338DECF008BA90B0531DE6
1,659,336,524 UART: Caliptra RT
1,659,336,777 UART: [state] CFI Enabled
1,659,621,594 UART: [rt] RT listening for mailbox commands...
1,659,622,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,662,380,909 >>> mbox cmd response: success
1,662,394,384 UART:
1,662,394,400 UART: Running Caliptra FMC ...
1,662,394,808 UART:
1,662,394,862 UART: [state] CFI Enabled
1,662,483,845 UART: [art] Extend RT PCRs Done
1,662,484,273 UART: [art] Lock RT PCRs Done
1,662,485,690 UART: [art] Populate DV Done
1,662,493,789 UART: [fht] FMC Alias Private Key: 7
1,662,494,887 UART: [art] Derive CDI
1,662,495,167 UART: [art] Store in in slot 0x4
1,662,580,606 UART: [art] Derive Key Pair
1,662,580,966 UART: [art] Store priv key in slot 0x5
1,662,593,480 UART: [art] Derive Key Pair - Done
1,662,608,377 UART: [art] Signing Cert with AUTHO
1,662,608,857 UART: RITY.KEYID = 7
1,662,623,951 UART: [art] Erasing AUTHORITY.KEYID = 7
1,662,624,716 UART: [art] PUB.X = 122103B6D96F4387EECC9D55AE9ED56133471C93FCDD03F9FE7806216AD39FA60A9CDE9F5516C92F82365013B980F249
1,662,631,478 UART: [art] PUB.Y = 1B5AB3BEC7E8B4696E316045F578824A8931B8A3C2C2FF65138DCBAED45D10B4345C0741D955CB177F78C7AE31D89177
1,662,638,431 UART: [art] SIG.R = E8CDECD91F83771563976D95533C1CD5381DB7CDDF7DEB2335AC818A5EDC38129C87D4F1465F4BF8E4B2869D07CA5FE1
1,662,645,214 UART: [art] SIG.S = 0B940C24B5AE305F65F83AFE3AD04029E7C46F12D163661EC17001AA2C495417F783C39620A3E6941FB9DE5A64AA38B0
1,662,669,108 UART: Caliptra RT
1,662,669,361 UART: [state] CFI Enabled
1,662,951,380 UART: [rt] RT listening for mailbox commands...
1,662,952,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,665,712,461 >>> mbox cmd response: success
1,665,725,808 UART:
1,665,725,824 UART: Running Caliptra FMC ...
1,665,726,232 UART:
1,665,726,286 UART: [state] CFI Enabled
1,665,815,631 UART: [art] Extend RT PCRs Done
1,665,816,059 UART: [art] Lock RT PCRs Done
1,665,817,102 UART: [art] Populate DV Done
1,665,825,507 UART: [fht] FMC Alias Private Key: 7
1,665,826,661 UART: [art] Derive CDI
1,665,826,941 UART: [art] Store in in slot 0x4
1,665,912,614 UART: [art] Derive Key Pair
1,665,912,974 UART: [art] Store priv key in slot 0x5
1,665,926,302 UART: [art] Derive Key Pair - Done
1,665,941,270 UART: [art] Signing Cert with AUTHO
1,665,941,750 UART: RITY.KEYID = 7
1,665,956,432 UART: [art] Erasing AUTHORITY.KEYID = 7
1,665,957,197 UART: [art] PUB.X = 2D83773DBA15327C634956F0FE979FE4B3BC63189276EE3B98DB82E6C94B58795F8E62F9F7A49683D9A9AECC847EE5F8
1,665,963,975 UART: [art] PUB.Y = 41DB22F84CA7A1573843BE6DA22EC2C0508C880D89B833F4A660904FE224B2C0B8028081DB2FEA361DC043CE6C776C0D
1,665,970,924 UART: [art] SIG.R = 5F0FA12D2A87E1051AA1A6FD333E0A2F52F09F9015DA047ACA3FA004532FA485AC16B40AB85EB803D4200CB34EBAE88A
1,665,977,688 UART: [art] SIG.S = D99CD221DA891C50E1CDE954ACDDD9CD384F07D8DE5849297C4CA2BCD3108915DAC890D301338DECF008BA90B0531DE6
1,666,001,622 UART: Caliptra RT
1,666,001,875 UART: [state] CFI Enabled
1,666,279,610 UART: [rt] RT listening for mailbox commands...
1,666,280,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,669,040,283 >>> mbox cmd response: success
1,669,053,818 UART:
1,669,053,834 UART: Running Caliptra FMC ...
1,669,054,242 UART:
1,669,054,296 UART: [state] CFI Enabled
1,669,142,925 UART: [art] Extend RT PCRs Done
1,669,143,353 UART: [art] Lock RT PCRs Done
1,669,144,392 UART: [art] Populate DV Done
1,669,152,759 UART: [fht] FMC Alias Private Key: 7
1,669,153,821 UART: [art] Derive CDI
1,669,154,101 UART: [art] Store in in slot 0x4
1,669,239,884 UART: [art] Derive Key Pair
1,669,240,244 UART: [art] Store priv key in slot 0x5
1,669,253,346 UART: [art] Derive Key Pair - Done
1,669,267,789 UART: [art] Signing Cert with AUTHO
1,669,268,269 UART: RITY.KEYID = 7
1,669,283,499 UART: [art] Erasing AUTHORITY.KEYID = 7
1,669,284,264 UART: [art] PUB.X = 122103B6D96F4387EECC9D55AE9ED56133471C93FCDD03F9FE7806216AD39FA60A9CDE9F5516C92F82365013B980F249
1,669,291,026 UART: [art] PUB.Y = 1B5AB3BEC7E8B4696E316045F578824A8931B8A3C2C2FF65138DCBAED45D10B4345C0741D955CB177F78C7AE31D89177
1,669,297,979 UART: [art] SIG.R = E8CDECD91F83771563976D95533C1CD5381DB7CDDF7DEB2335AC818A5EDC38129C87D4F1465F4BF8E4B2869D07CA5FE1
1,669,304,762 UART: [art] SIG.S = 0B940C24B5AE305F65F83AFE3AD04029E7C46F12D163661EC17001AA2C495417F783C39620A3E6941FB9DE5A64AA38B0
1,669,328,638 UART: Caliptra RT
1,669,328,891 UART: [state] CFI Enabled
1,669,609,194 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 328.21s
Truncated 1358290 bytes from beginning
7 UART: [art] Store in in slot 0x4
1,716,951,392 UART: [art] Derive Key Pair
1,716,951,752 UART: [art] Store priv key in slot 0x5
1,716,965,286 UART: [art] Derive Key Pair - Done
1,716,980,291 UART: [art] Signing Cert with AUTHO
1,716,980,771 UART: RITY.KEYID = 7
1,716,995,817 UART: [art] Erasing AUTHORITY.KEYID = 7
1,716,996,582 UART: [art] PUB.X = 36912657BF60F2BDE1442D1C6220EC2C8FC7046EDD2BAE8594CF5E980467F7F9AC691DA3B19A60F77965C3EF5F39D303
1,717,003,353 UART: [art] PUB.Y = 20A96757B7048CB261808F693A21E02362C0CB82BE096F0324E2A3E02ADB007533E3531C899C881FE3D1805B2D25E548
1,717,010,266 UART: [art] SIG.R = A603A188E76A099C05A5529A3BCB75DF800AADE4E703991EEBA87B900A922D94991C0A891B30C61E25ABEBBB607E8487
1,717,017,025 UART: [art] SIG.S = 5830C99458D0E9338BF139C4BD79EEC18EFCF3756D8D8295C0EDB046C5B35A1CCA5C60F6F3858BA3F48BE07F8CAC2F6B
1,717,040,954 UART: Caliptra RT
1,717,041,299 UART: [state] CFI Enabled
1,717,327,920 UART: [rt] RT listening for mailbox commands...
1,717,328,590 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,717,329,644 UART:
1,717,329,660 UART: Running Caliptra ROM ...
1,717,330,068 UART:
1,717,330,209 UART: [state] CFI Enabled
1,717,333,019 UART: [state] LifecycleState = Unprovisioned
1,717,333,674 UART: [state] DebugLocked = No
1,717,334,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,717,335,791 UART: [kat] SHA2-256
1,718,129,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,718,133,837 UART: [kat] ++
1,718,133,989 UART: [kat] sha1
1,718,138,145 UART: [kat] SHA2-256
1,718,140,083 UART: [kat] SHA2-384
1,718,142,888 UART: [kat] SHA2-512-ACC
1,718,144,788 UART: [kat] ECC-384
1,718,150,341 UART: [kat] HMAC-384Kdf
1,718,155,091 UART: [kat] LMS
1,718,723,287 UART: [kat] --
1,718,724,250 UART: [update-reset] ++
1,720,058,028 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,720,059,098 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,720,208,728 >>> mbox cmd response: success
1,720,209,071 UART: [update-reset] Copying MAN_2 To MAN_1
1,720,217,085 UART: [update-reset Success] --
1,720,217,886 UART: [state] Locking Datavault
1,720,218,706 UART: [state] Locking PCR0, PCR1 and PCR31
1,720,219,310 UART: [state] Locking ICCM
1,720,219,782 UART: [exit] Launching FMC @ 0x40000130
1,720,225,111 UART:
1,720,225,127 UART: Running Caliptra FMC ...
1,720,225,535 UART:
1,720,225,678 UART: [state] CFI Enabled
1,720,314,859 UART: [art] Extend RT PCRs Done
1,720,315,287 UART: [art] Lock RT PCRs Done
1,720,316,548 UART: [art] Populate DV Done
1,720,324,715 UART: [fht] FMC Alias Private Key: 7
1,720,325,865 UART: [art] Derive CDI
1,720,326,145 UART: [art] Store in in slot 0x4
1,720,411,722 UART: [art] Derive Key Pair
1,720,412,082 UART: [art] Store priv key in slot 0x5
1,720,425,532 UART: [art] Derive Key Pair - Done
1,720,440,397 UART: [art] Signing Cert with AUTHO
1,720,440,877 UART: RITY.KEYID = 7
1,720,456,091 UART: [art] Erasing AUTHORITY.KEYID = 7
1,720,456,856 UART: [art] PUB.X = B132EC1B64B28DC58A554C1F632ABFA1DDF5762E9EC8DF46D2F054F9A7FFAB0FE857E991C584307BD1E7E829712EB017
1,720,463,641 UART: [art] PUB.Y = 1465B220038F9291E0DD48E94224F0C533E37DE3470ED053AAC7CD741C8A42D0F4081920EE5F05211BE0804A9D019890
1,720,470,572 UART: [art] SIG.R = 296060022E9A4F76A4D0ACAF133310BCCE53CF0BDF89285283958372BC71A2502070E5F1DF1F8B3E5E96088417BD7652
1,720,477,333 UART: [art] SIG.S = 58FAA6FDC94D375CFD18DB7BAEADAEC9469D06E8C92D339B06AE2E6EDCE50CBA8FEB83957AFEF2EA371ADD1D949A11D8
1,720,501,115 UART: Caliptra RT
1,720,501,460 UART: [state] CFI Enabled
1,720,786,474 UART: [rt] RT listening for mailbox commands...
1,720,787,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,720,788,158 UART:
1,720,788,174 UART: Running Caliptra ROM ...
1,720,788,582 UART:
1,720,788,723 UART: [state] CFI Enabled
1,720,792,077 UART: [state] LifecycleState = Unprovisioned
1,720,792,732 UART: [state] DebugLocked = No
1,720,793,398 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,720,794,969 UART: [kat] SHA2-256
1,721,588,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,721,593,015 UART: [kat] ++
1,721,593,167 UART: [kat] sha1
1,721,597,175 UART: [kat] SHA2-256
1,721,599,113 UART: [kat] SHA2-384
1,721,601,886 UART: [kat] SHA2-512-ACC
1,721,603,786 UART: [kat] ECC-384
1,721,609,171 UART: [kat] HMAC-384Kdf
1,721,613,827 UART: [kat] LMS
1,722,182,023 UART: [kat] --
1,722,182,740 UART: [update-reset] ++
1,723,516,426 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,723,517,652 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,723,667,282 >>> mbox cmd response: success
1,723,667,517 UART: [update-reset] Copying MAN_2 To MAN_1
1,723,675,531 UART: [update-reset Success] --
1,723,676,612 UART: [state] Locking Datavault
1,723,677,356 UART: [state] Locking PCR0, PCR1 and PCR31
1,723,677,960 UART: [state] Locking ICCM
1,723,678,632 UART: [exit] Launching FMC @ 0x40000130
1,723,683,961 UART:
1,723,683,977 UART: Running Caliptra FMC ...
1,723,684,385 UART:
1,723,684,528 UART: [state] CFI Enabled
1,723,773,279 UART: [art] Extend RT PCRs Done
1,723,773,707 UART: [art] Lock RT PCRs Done
1,723,775,254 UART: [art] Populate DV Done
1,723,783,657 UART: [fht] FMC Alias Private Key: 7
1,723,784,733 UART: [art] Derive CDI
1,723,785,013 UART: [art] Store in in slot 0x4
1,723,870,662 UART: [art] Derive Key Pair
1,723,871,022 UART: [art] Store priv key in slot 0x5
1,723,884,116 UART: [art] Derive Key Pair - Done
1,723,898,925 UART: [art] Signing Cert with AUTHO
1,723,899,405 UART: RITY.KEYID = 7
1,723,914,863 UART: [art] Erasing AUTHORITY.KEYID = 7
1,723,915,628 UART: [art] PUB.X = 36912657BF60F2BDE1442D1C6220EC2C8FC7046EDD2BAE8594CF5E980467F7F9AC691DA3B19A60F77965C3EF5F39D303
1,723,922,399 UART: [art] PUB.Y = 20A96757B7048CB261808F693A21E02362C0CB82BE096F0324E2A3E02ADB007533E3531C899C881FE3D1805B2D25E548
1,723,929,312 UART: [art] SIG.R = A603A188E76A099C05A5529A3BCB75DF800AADE4E703991EEBA87B900A922D94991C0A891B30C61E25ABEBBB607E8487
1,723,936,071 UART: [art] SIG.S = 5830C99458D0E9338BF139C4BD79EEC18EFCF3756D8D8295C0EDB046C5B35A1CCA5C60F6F3858BA3F48BE07F8CAC2F6B
1,723,959,900 UART: Caliptra RT
1,723,960,245 UART: [state] CFI Enabled
1,724,241,100 UART: [rt] RT listening for mailbox commands...
1,724,241,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,724,242,552 UART:
1,724,242,568 UART: Running Caliptra ROM ...
1,724,242,976 UART:
1,724,243,117 UART: [state] CFI Enabled
1,724,245,975 UART: [state] LifecycleState = Unprovisioned
1,724,246,630 UART: [state] DebugLocked = No
1,724,247,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,724,248,819 UART: [kat] SHA2-256
1,725,042,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,725,046,865 UART: [kat] ++
1,725,047,017 UART: [kat] sha1
1,725,051,363 UART: [kat] SHA2-256
1,725,053,301 UART: [kat] SHA2-384
1,725,055,998 UART: [kat] SHA2-512-ACC
1,725,057,898 UART: [kat] ECC-384
1,725,063,751 UART: [kat] HMAC-384Kdf
1,725,068,281 UART: [kat] LMS
1,725,636,477 UART: [kat] --
1,725,637,672 UART: [update-reset] ++
1,726,971,312 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,726,972,476 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,727,122,106 >>> mbox cmd response: success
1,727,122,451 UART: [update-reset] Copying MAN_2 To MAN_1
1,727,130,465 UART: [update-reset Success] --
1,727,131,286 UART: [state] Locking Datavault
1,727,131,994 UART: [state] Locking PCR0, PCR1 and PCR31
1,727,132,598 UART: [state] Locking ICCM
1,727,133,156 UART: [exit] Launching FMC @ 0x40000130
1,727,138,485 UART:
1,727,138,501 UART: Running Caliptra FMC ...
1,727,138,909 UART:
1,727,139,052 UART: [state] CFI Enabled
1,727,227,865 UART: [art] Extend RT PCRs Done
1,727,228,293 UART: [art] Lock RT PCRs Done
1,727,229,456 UART: [art] Populate DV Done
1,727,237,663 UART: [fht] FMC Alias Private Key: 7
1,727,238,603 UART: [art] Derive CDI
1,727,238,883 UART: [art] Store in in slot 0x4
1,727,324,722 UART: [art] Derive Key Pair
1,727,325,082 UART: [art] Store priv key in slot 0x5
1,727,338,232 UART: [art] Derive Key Pair - Done
1,727,352,863 UART: [art] Signing Cert with AUTHO
1,727,353,343 UART: RITY.KEYID = 7
1,727,368,839 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,369,604 UART: [art] PUB.X = B132EC1B64B28DC58A554C1F632ABFA1DDF5762E9EC8DF46D2F054F9A7FFAB0FE857E991C584307BD1E7E829712EB017
1,727,376,389 UART: [art] PUB.Y = 1465B220038F9291E0DD48E94224F0C533E37DE3470ED053AAC7CD741C8A42D0F4081920EE5F05211BE0804A9D019890
1,727,383,320 UART: [art] SIG.R = 296060022E9A4F76A4D0ACAF133310BCCE53CF0BDF89285283958372BC71A2502070E5F1DF1F8B3E5E96088417BD7652
1,727,390,081 UART: [art] SIG.S = 58FAA6FDC94D375CFD18DB7BAEADAEC9469D06E8C92D339B06AE2E6EDCE50CBA8FEB83957AFEF2EA371ADD1D949A11D8
1,727,414,537 UART: Caliptra RT
1,727,414,882 UART: [state] CFI Enabled
1,727,698,294 UART: [rt] RT listening for mailbox commands...
1,727,698,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,727,699,858 UART:
1,727,699,874 UART: Running Caliptra ROM ...
1,727,700,282 UART:
1,727,700,423 UART: [state] CFI Enabled
1,727,703,465 UART: [state] LifecycleState = Unprovisioned
1,727,704,120 UART: [state] DebugLocked = No
1,727,704,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,727,706,385 UART: [kat] SHA2-256
1,728,500,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,728,504,431 UART: [kat] ++
1,728,504,583 UART: [kat] sha1
1,728,508,815 UART: [kat] SHA2-256
1,728,510,753 UART: [kat] SHA2-384
1,728,513,624 UART: [kat] SHA2-512-ACC
1,728,515,524 UART: [kat] ECC-384
1,728,521,069 UART: [kat] HMAC-384Kdf
1,728,525,717 UART: [kat] LMS
1,729,093,913 UART: [kat] --
1,729,094,606 UART: [update-reset] ++
1,730,427,596 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,730,428,712 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
1,730,578,342 >>> mbox cmd response: success
1,730,578,543 UART: [update-reset] Copying MAN_2 To MAN_1
1,730,586,557 UART: [update-reset Success] --
1,730,587,438 UART: [state] Locking Datavault
1,730,588,312 UART: [state] Locking PCR0, PCR1 and PCR31
1,730,588,916 UART: [state] Locking ICCM
1,730,589,440 UART: [exit] Launching FMC @ 0x40000130
1,730,594,769 UART:
1,730,594,785 UART: Running Caliptra FMC ...
1,730,595,193 UART:
1,730,595,336 UART: [state] CFI Enabled
1,730,684,115 UART: [art] Extend RT PCRs Done
1,730,684,543 UART: [art] Lock RT PCRs Done
1,730,685,730 UART: [art] Populate DV Done
1,730,693,861 UART: [fht] FMC Alias Private Key: 7
1,730,694,841 UART: [art] Derive CDI
1,730,695,121 UART: [art] Store in in slot 0x4
1,730,780,858 UART: [art] Derive Key Pair
1,730,781,218 UART: [art] Store priv key in slot 0x5
1,730,794,030 UART: [art] Derive Key Pair - Done
1,730,808,653 UART: [art] Signing Cert with AUTHO
1,730,809,133 UART: RITY.KEYID = 7
1,730,824,369 UART: [art] Erasing AUTHORITY.KEYID = 7
1,730,825,134 UART: [art] PUB.X = 36912657BF60F2BDE1442D1C6220EC2C8FC7046EDD2BAE8594CF5E980467F7F9AC691DA3B19A60F77965C3EF5F39D303
1,730,831,905 UART: [art] PUB.Y = 20A96757B7048CB261808F693A21E02362C0CB82BE096F0324E2A3E02ADB007533E3531C899C881FE3D1805B2D25E548
1,730,838,818 UART: [art] SIG.R = A603A188E76A099C05A5529A3BCB75DF800AADE4E703991EEBA87B900A922D94991C0A891B30C61E25ABEBBB607E8487
1,730,845,577 UART: [art] SIG.S = 5830C99458D0E9338BF139C4BD79EEC18EFCF3756D8D8295C0EDB046C5B35A1CCA5C60F6F3858BA3F48BE07F8CAC2F6B
1,730,868,738 UART: Caliptra RT
1,730,869,083 UART: [state] CFI Enabled
1,731,150,122 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 334.69s
Truncated 734956 bytes from beginning
9 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,646,292,789 >>> mbox cmd response: success
1,646,306,268 UART:
1,646,306,284 UART: Running Caliptra FMC ...
1,646,306,692 UART:
1,646,306,835 UART: [state] CFI Enabled
1,646,395,580 UART: [art] Extend RT PCRs Done
1,646,396,008 UART: [art] Lock RT PCRs Done
1,646,397,175 UART: [art] Populate DV Done
1,646,405,448 UART: [fht] FMC Alias Private Key: 7
1,646,406,466 UART: [art] Derive CDI
1,646,406,746 UART: [art] Store in in slot 0x4
1,646,492,737 UART: [art] Derive Key Pair
1,646,493,097 UART: [art] Store priv key in slot 0x5
1,646,506,243 UART: [art] Derive Key Pair - Done
1,646,520,995 UART: [art] Signing Cert with AUTHO
1,646,521,475 UART: RITY.KEYID = 7
1,646,537,041 UART: [art] Erasing AUTHORITY.KEYID = 7
1,646,537,806 UART: [art] PUB.X = 8DE0AA4CC42340886D76792CF2925B989AE8F9F241B3886865FF71FE3DAAB898AA07B6EE2201C404E3D3F2D490FBD603
1,646,544,574 UART: [art] PUB.Y = 70721B3B4FAB3649C6C31F3AC2FCE896DC2529A151A1DA0976B604AD9779516243CA0590305D79A95EA8E8905BCE6339
1,646,551,517 UART: [art] SIG.R = C5D8D9FFC0486B121A2E3836CA3BDBF6A64E7F4D2EDE0ED9069711910BE2473A84AAE2A0BE9460A1260ACC407D918FEF
1,646,558,295 UART: [art] SIG.S = E46F11BCFE994C2E8F0CFE49733031D1B4E8B3718EB31738AE82C945DA64159A97A8E6E977E2FE6B1C5BB0FAC6F17671
1,646,582,299 UART: Caliptra RT
1,646,582,644 UART: [state] CFI Enabled
1,646,864,158 UART: [rt] RT listening for mailbox commands...
1,646,864,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,649,626,002 >>> mbox cmd response: success
1,649,639,683 UART:
1,649,639,699 UART: Running Caliptra FMC ...
1,649,640,107 UART:
1,649,640,250 UART: [state] CFI Enabled
1,649,729,257 UART: [art] Extend RT PCRs Done
1,649,729,685 UART: [art] Lock RT PCRs Done
1,649,730,922 UART: [art] Populate DV Done
1,649,739,091 UART: [fht] FMC Alias Private Key: 7
1,649,740,271 UART: [art] Derive CDI
1,649,740,551 UART: [art] Store in in slot 0x4
1,649,826,260 UART: [art] Derive Key Pair
1,649,826,620 UART: [art] Store priv key in slot 0x5
1,649,839,642 UART: [art] Derive Key Pair - Done
1,649,854,557 UART: [art] Signing Cert with AUTHO
1,649,855,037 UART: RITY.KEYID = 7
1,649,870,025 UART: [art] Erasing AUTHORITY.KEYID = 7
1,649,870,790 UART: [art] PUB.X = A2BBC433648EFEB526CDF135AC70887EAFA0111CE1D8B1B14EACFF431B5912835688D42DF0D8EB1E4FA64B9D69728BD3
1,649,877,580 UART: [art] PUB.Y = 1230B39D68278EB6C3B94F4611416953F88F7B5A59DFAFA1D9EC1201C882962C3FB736CD94AEEB033150963D4A6702AC
1,649,884,525 UART: [art] SIG.R = A38B781F17224C4DEE11C52AA15AFE019266F2BAA933C98D8B085C826434C30351C4451D40490A17025D97354B506191
1,649,891,272 UART: [art] SIG.S = BEF76A1E331A6A42322BC8039F0ED0639169EEAD5D980A3424C06C6EE505F8A593445053122C28A6B7AF96E36AD10DE2
1,649,915,014 UART: Caliptra RT
1,649,915,359 UART: [state] CFI Enabled
1,650,197,007 UART: [rt] RT listening for mailbox commands...
1,650,197,677 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,652,959,355 >>> mbox cmd response: success
1,652,972,730 UART:
1,652,972,746 UART: Running Caliptra FMC ...
1,652,973,154 UART:
1,652,973,297 UART: [state] CFI Enabled
1,653,062,950 UART: [art] Extend RT PCRs Done
1,653,063,378 UART: [art] Lock RT PCRs Done
1,653,064,731 UART: [art] Populate DV Done
1,653,073,260 UART: [fht] FMC Alias Private Key: 7
1,653,074,296 UART: [art] Derive CDI
1,653,074,576 UART: [art] Store in in slot 0x4
1,653,160,517 UART: [art] Derive Key Pair
1,653,160,877 UART: [art] Store priv key in slot 0x5
1,653,174,083 UART: [art] Derive Key Pair - Done
1,653,189,053 UART: [art] Signing Cert with AUTHO
1,653,189,533 UART: RITY.KEYID = 7
1,653,204,377 UART: [art] Erasing AUTHORITY.KEYID = 7
1,653,205,142 UART: [art] PUB.X = 8DE0AA4CC42340886D76792CF2925B989AE8F9F241B3886865FF71FE3DAAB898AA07B6EE2201C404E3D3F2D490FBD603
1,653,211,910 UART: [art] PUB.Y = 70721B3B4FAB3649C6C31F3AC2FCE896DC2529A151A1DA0976B604AD9779516243CA0590305D79A95EA8E8905BCE6339
1,653,218,853 UART: [art] SIG.R = C5D8D9FFC0486B121A2E3836CA3BDBF6A64E7F4D2EDE0ED9069711910BE2473A84AAE2A0BE9460A1260ACC407D918FEF
1,653,225,631 UART: [art] SIG.S = E46F11BCFE994C2E8F0CFE49733031D1B4E8B3718EB31738AE82C945DA64159A97A8E6E977E2FE6B1C5BB0FAC6F17671
1,653,249,327 UART: Caliptra RT
1,653,249,672 UART: [state] CFI Enabled
1,653,531,632 UART: [rt] RT listening for mailbox commands...
1,653,532,302 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,656,290,452 >>> mbox cmd response: success
1,656,303,783 UART:
1,656,303,799 UART: Running Caliptra FMC ...
1,656,304,207 UART:
1,656,304,350 UART: [state] CFI Enabled
1,656,393,417 UART: [art] Extend RT PCRs Done
1,656,393,845 UART: [art] Lock RT PCRs Done
1,656,395,142 UART: [art] Populate DV Done
1,656,403,383 UART: [fht] FMC Alias Private Key: 7
1,656,404,401 UART: [art] Derive CDI
1,656,404,681 UART: [art] Store in in slot 0x4
1,656,490,396 UART: [art] Derive Key Pair
1,656,490,756 UART: [art] Store priv key in slot 0x5
1,656,504,222 UART: [art] Derive Key Pair - Done
1,656,519,085 UART: [art] Signing Cert with AUTHO
1,656,519,565 UART: RITY.KEYID = 7
1,656,534,867 UART: [art] Erasing AUTHORITY.KEYID = 7
1,656,535,632 UART: [art] PUB.X = A2BBC433648EFEB526CDF135AC70887EAFA0111CE1D8B1B14EACFF431B5912835688D42DF0D8EB1E4FA64B9D69728BD3
1,656,542,422 UART: [art] PUB.Y = 1230B39D68278EB6C3B94F4611416953F88F7B5A59DFAFA1D9EC1201C882962C3FB736CD94AEEB033150963D4A6702AC
1,656,549,367 UART: [art] SIG.R = A38B781F17224C4DEE11C52AA15AFE019266F2BAA933C98D8B085C826434C30351C4451D40490A17025D97354B506191
1,656,556,114 UART: [art] SIG.S = BEF76A1E331A6A42322BC8039F0ED0639169EEAD5D980A3424C06C6EE505F8A593445053122C28A6B7AF96E36AD10DE2
1,656,579,928 UART: Caliptra RT
1,656,580,273 UART: [state] CFI Enabled
1,656,866,807 UART: [rt] RT listening for mailbox commands...
1,656,867,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,659,627,107 >>> mbox cmd response: success
1,659,640,510 UART:
1,659,640,526 UART: Running Caliptra FMC ...
1,659,640,934 UART:
1,659,641,077 UART: [state] CFI Enabled
1,659,730,112 UART: [art] Extend RT PCRs Done
1,659,730,540 UART: [art] Lock RT PCRs Done
1,659,732,137 UART: [art] Populate DV Done
1,659,740,284 UART: [fht] FMC Alias Private Key: 7
1,659,741,284 UART: [art] Derive CDI
1,659,741,564 UART: [art] Store in in slot 0x4
1,659,827,371 UART: [art] Derive Key Pair
1,659,827,731 UART: [art] Store priv key in slot 0x5
1,659,841,497 UART: [art] Derive Key Pair - Done
1,659,856,585 UART: [art] Signing Cert with AUTHO
1,659,857,065 UART: RITY.KEYID = 7
1,659,872,147 UART: [art] Erasing AUTHORITY.KEYID = 7
1,659,872,912 UART: [art] PUB.X = 8DE0AA4CC42340886D76792CF2925B989AE8F9F241B3886865FF71FE3DAAB898AA07B6EE2201C404E3D3F2D490FBD603
1,659,879,680 UART: [art] PUB.Y = 70721B3B4FAB3649C6C31F3AC2FCE896DC2529A151A1DA0976B604AD9779516243CA0590305D79A95EA8E8905BCE6339
1,659,886,623 UART: [art] SIG.R = C5D8D9FFC0486B121A2E3836CA3BDBF6A64E7F4D2EDE0ED9069711910BE2473A84AAE2A0BE9460A1260ACC407D918FEF
1,659,893,401 UART: [art] SIG.S = E46F11BCFE994C2E8F0CFE49733031D1B4E8B3718EB31738AE82C945DA64159A97A8E6E977E2FE6B1C5BB0FAC6F17671
1,659,917,007 UART: Caliptra RT
1,659,917,352 UART: [state] CFI Enabled
1,660,197,380 UART: [rt] RT listening for mailbox commands...
1,660,198,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,662,959,224 >>> mbox cmd response: success
1,662,972,483 UART:
1,662,972,499 UART: Running Caliptra FMC ...
1,662,972,907 UART:
1,662,973,050 UART: [state] CFI Enabled
1,663,062,039 UART: [art] Extend RT PCRs Done
1,663,062,467 UART: [art] Lock RT PCRs Done
1,663,063,626 UART: [art] Populate DV Done
1,663,071,755 UART: [fht] FMC Alias Private Key: 7
1,663,072,937 UART: [art] Derive CDI
1,663,073,217 UART: [art] Store in in slot 0x4
1,663,158,920 UART: [art] Derive Key Pair
1,663,159,280 UART: [art] Store priv key in slot 0x5
1,663,172,474 UART: [art] Derive Key Pair - Done
1,663,187,037 UART: [art] Signing Cert with AUTHO
1,663,187,517 UART: RITY.KEYID = 7
1,663,202,535 UART: [art] Erasing AUTHORITY.KEYID = 7
1,663,203,300 UART: [art] PUB.X = A2BBC433648EFEB526CDF135AC70887EAFA0111CE1D8B1B14EACFF431B5912835688D42DF0D8EB1E4FA64B9D69728BD3
1,663,210,090 UART: [art] PUB.Y = 1230B39D68278EB6C3B94F4611416953F88F7B5A59DFAFA1D9EC1201C882962C3FB736CD94AEEB033150963D4A6702AC
1,663,217,035 UART: [art] SIG.R = A38B781F17224C4DEE11C52AA15AFE019266F2BAA933C98D8B085C826434C30351C4451D40490A17025D97354B506191
1,663,223,782 UART: [art] SIG.S = BEF76A1E331A6A42322BC8039F0ED0639169EEAD5D980A3424C06C6EE505F8A593445053122C28A6B7AF96E36AD10DE2
1,663,247,254 UART: Caliptra RT
1,663,247,599 UART: [state] CFI Enabled
1,663,526,843 UART: [rt] RT listening for mailbox commands...
1,663,527,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,666,286,503 >>> mbox cmd response: success
1,666,299,906 UART:
1,666,299,922 UART: Running Caliptra FMC ...
1,666,300,330 UART:
1,666,300,473 UART: [state] CFI Enabled
1,666,389,834 UART: [art] Extend RT PCRs Done
1,666,390,262 UART: [art] Lock RT PCRs Done
1,666,391,625 UART: [art] Populate DV Done
1,666,399,748 UART: [fht] FMC Alias Private Key: 7
1,666,400,796 UART: [art] Derive CDI
1,666,401,076 UART: [art] Store in in slot 0x4
1,666,486,635 UART: [art] Derive Key Pair
1,666,486,995 UART: [art] Store priv key in slot 0x5
1,666,500,677 UART: [art] Derive Key Pair - Done
1,666,515,463 UART: [art] Signing Cert with AUTHO
1,666,515,943 UART: RITY.KEYID = 7
1,666,531,157 UART: [art] Erasing AUTHORITY.KEYID = 7
1,666,531,922 UART: [art] PUB.X = 8DE0AA4CC42340886D76792CF2925B989AE8F9F241B3886865FF71FE3DAAB898AA07B6EE2201C404E3D3F2D490FBD603
1,666,538,690 UART: [art] PUB.Y = 70721B3B4FAB3649C6C31F3AC2FCE896DC2529A151A1DA0976B604AD9779516243CA0590305D79A95EA8E8905BCE6339
1,666,545,633 UART: [art] SIG.R = C5D8D9FFC0486B121A2E3836CA3BDBF6A64E7F4D2EDE0ED9069711910BE2473A84AAE2A0BE9460A1260ACC407D918FEF
1,666,552,411 UART: [art] SIG.S = E46F11BCFE994C2E8F0CFE49733031D1B4E8B3718EB31738AE82C945DA64159A97A8E6E977E2FE6B1C5BB0FAC6F17671
1,666,576,297 UART: Caliptra RT
1,666,576,642 UART: [state] CFI Enabled
1,666,860,466 UART: [rt] RT listening for mailbox commands...
1,666,861,136 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,669,623,528 >>> mbox cmd response: success
1,669,636,717 UART:
1,669,636,733 UART: Running Caliptra FMC ...
1,669,637,141 UART:
1,669,637,284 UART: [state] CFI Enabled
1,669,726,353 UART: [art] Extend RT PCRs Done
1,669,726,781 UART: [art] Lock RT PCRs Done
1,669,728,246 UART: [art] Populate DV Done
1,669,736,465 UART: [fht] FMC Alias Private Key: 7
1,669,737,499 UART: [art] Derive CDI
1,669,737,779 UART: [art] Store in in slot 0x4
1,669,823,644 UART: [art] Derive Key Pair
1,669,824,004 UART: [art] Store priv key in slot 0x5
1,669,837,140 UART: [art] Derive Key Pair - Done
1,669,851,991 UART: [art] Signing Cert with AUTHO
1,669,852,471 UART: RITY.KEYID = 7
1,669,868,019 UART: [art] Erasing AUTHORITY.KEYID = 7
1,669,868,784 UART: [art] PUB.X = A2BBC433648EFEB526CDF135AC70887EAFA0111CE1D8B1B14EACFF431B5912835688D42DF0D8EB1E4FA64B9D69728BD3
1,669,875,574 UART: [art] PUB.Y = 1230B39D68278EB6C3B94F4611416953F88F7B5A59DFAFA1D9EC1201C882962C3FB736CD94AEEB033150963D4A6702AC
1,669,882,519 UART: [art] SIG.R = A38B781F17224C4DEE11C52AA15AFE019266F2BAA933C98D8B085C826434C30351C4451D40490A17025D97354B506191
1,669,889,266 UART: [art] SIG.S = BEF76A1E331A6A42322BC8039F0ED0639169EEAD5D980A3424C06C6EE505F8A593445053122C28A6B7AF96E36AD10DE2
1,669,913,110 UART: Caliptra RT
1,669,913,455 UART: [state] CFI Enabled
1,670,200,519 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 330.02s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,553,898,143 UART: [fht] FMC Alias Private Key: 7
1,553,899,167 UART: [art] Derive CDI
1,553,899,447 UART: [art] Store in in slot 0x4
1,553,985,372 UART: [art] Derive Key Pair
1,553,985,732 UART: [art] Store priv key in slot 0x5
1,553,998,922 UART: [art] Derive Key Pair - Done
1,554,013,572 UART: [art] Signing Cert with AUTHO
1,554,014,052 UART: RITY.KEYID = 7
1,554,029,614 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,030,379 UART: [art] PUB.X = 6EB6274BA70CCF68F319D1EBBACB525F777F30254F7F5E9025848D2123AA5A495D4CF942746CD915A2C6075145B7A11E
1,554,037,149 UART: [art] PUB.Y = E78F0C79D15EB51322743428C9531F85CEFF687A27E5E49125E4F47EDE10281E894E39310D3BFD3F846DCC7ADBF575A6
1,554,044,101 UART: [art] SIG.R = F0035D0BA80BD2D97C90D27440E1847DB53FE4EECC85D22362341A574D2D48CA7A4E9019C9DF6C5F6695B15021042D57
1,554,050,863 UART: [art] SIG.S = 3A0E4847F0A757C0800DD8B7367EC8AD00D64C9010F4B2986C28B38D113E517AC0A846B38B8F16EE3E903EF1B7BDC4C8
1,554,074,614 UART: Caliptra RT
1,554,074,867 UART: [state] CFI Enabled
1,554,351,962 UART: [rt] RT listening for mailbox commands...
1,554,352,632 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,353,479 UART:
1,554,353,495 UART: Running Caliptra ROM ...
1,554,353,903 UART:
1,554,353,958 UART: [state] CFI Enabled
1,554,356,424 UART: [state] LifecycleState = Unprovisioned
1,554,357,079 UART: [state] DebugLocked = No
1,554,357,731 UART: [state] WD Timer not started. Device not locked for debugging
1,554,358,901 UART: [kat] SHA2-256
1,555,164,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,555,168,676 UART: [kat] ++
1,555,168,828 UART: [kat] sha1
1,555,173,110 UART: [kat] SHA2-256
1,555,175,050 UART: [kat] SHA2-384
1,555,177,681 UART: [kat] SHA2-512-ACC
1,555,179,581 UART: [kat] ECC-384
1,555,189,574 UART: [kat] HMAC-384Kdf
1,555,193,986 UART: [kat] LMS
1,555,442,314 UART: [kat] --
1,555,442,826 UART: [update-reset] ++
1,556,754,362 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,755,439 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,556,905,017 >>> mbox cmd response: success
1,556,905,310 UART: [update-reset] Copying MAN_2 To MAN_1
1,556,913,324 UART: [update-reset Success] --
1,556,914,267 UART: [state] Locking Datavault
1,556,915,193 UART: [state] Locking PCR0, PCR1 and PCR31
1,556,915,797 UART: [state] Locking ICCM
1,556,916,347 UART: [exit] Launching FMC @ 0x40000130
1,556,921,676 UART:
1,556,921,692 UART: Running Caliptra FMC ...
1,556,922,100 UART:
1,556,922,154 UART: [state] CFI Enabled
1,557,010,815 UART: [art] Extend RT PCRs Done
1,557,011,243 UART: [art] Lock RT PCRs Done
1,557,012,426 UART: [art] Populate DV Done
1,557,020,847 UART: [fht] FMC Alias Private Key: 7
1,557,021,965 UART: [art] Derive CDI
1,557,022,245 UART: [art] Store in in slot 0x4
1,557,107,958 UART: [art] Derive Key Pair
1,557,108,318 UART: [art] Store priv key in slot 0x5
1,557,121,272 UART: [art] Derive Key Pair - Done
1,557,135,912 UART: [art] Signing Cert with AUTHO
1,557,136,392 UART: RITY.KEYID = 7
1,557,151,622 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,152,387 UART: [art] PUB.X = 36E2B6C72DBE40C4339EE944E10F6913D57D8D4236BBDB067EA5D82DDFBFA48A631D43729D6B019B6E76105DB0CF732B
1,557,159,162 UART: [art] PUB.Y = 28C0062E5594E1123DA2A6F90092EA43DF9960A643610A11B943B1D342B812AC9D594B2F4591BFA6BE7A65052E34967D
1,557,166,079 UART: [art] SIG.R = A5B3FCB8E7F3FF916F91AD8EE10FE64F3B24F36016EFCD780AAC4E1F5451392A162DBD5D1ABD345D75BDD38642AD0041
1,557,172,843 UART: [art] SIG.S = E7D2E86DC9E18F95D59CEB31D30FA71034F56D2EE61B0875C96AC399E0D234001E974D16DF14A66185EB82A8330150DE
1,557,196,471 UART: Caliptra RT
1,557,196,724 UART: [state] CFI Enabled
1,557,476,712 UART: [rt] RT listening for mailbox commands...
1,557,477,382 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,478,401 UART:
1,557,478,417 UART: Running Caliptra ROM ...
1,557,478,825 UART:
1,557,478,880 UART: [state] CFI Enabled
1,557,481,686 UART: [state] LifecycleState = Unprovisioned
1,557,482,341 UART: [state] DebugLocked = No
1,557,483,019 UART: [state] WD Timer not started. Device not locked for debugging
1,557,484,333 UART: [kat] SHA2-256
1,558,289,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,558,294,108 UART: [kat] ++
1,558,294,260 UART: [kat] sha1
1,558,298,620 UART: [kat] SHA2-256
1,558,300,560 UART: [kat] SHA2-384
1,558,303,433 UART: [kat] SHA2-512-ACC
1,558,305,333 UART: [kat] ECC-384
1,558,314,918 UART: [kat] HMAC-384Kdf
1,558,319,466 UART: [kat] LMS
1,558,567,794 UART: [kat] --
1,558,568,534 UART: [update-reset] ++
1,559,878,150 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,879,123 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,560,028,701 >>> mbox cmd response: success
1,560,028,998 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,037,012 UART: [update-reset Success] --
1,560,037,875 UART: [state] Locking Datavault
1,560,038,505 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,039,109 UART: [state] Locking ICCM
1,560,039,687 UART: [exit] Launching FMC @ 0x40000130
1,560,045,016 UART:
1,560,045,032 UART: Running Caliptra FMC ...
1,560,045,440 UART:
1,560,045,494 UART: [state] CFI Enabled
1,560,133,731 UART: [art] Extend RT PCRs Done
1,560,134,159 UART: [art] Lock RT PCRs Done
1,560,135,498 UART: [art] Populate DV Done
1,560,143,711 UART: [fht] FMC Alias Private Key: 7
1,560,144,811 UART: [art] Derive CDI
1,560,145,091 UART: [art] Store in in slot 0x4
1,560,230,574 UART: [art] Derive Key Pair
1,560,230,934 UART: [art] Store priv key in slot 0x5
1,560,244,190 UART: [art] Derive Key Pair - Done
1,560,258,940 UART: [art] Signing Cert with AUTHO
1,560,259,420 UART: RITY.KEYID = 7
1,560,274,326 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,275,091 UART: [art] PUB.X = 6EB6274BA70CCF68F319D1EBBACB525F777F30254F7F5E9025848D2123AA5A495D4CF942746CD915A2C6075145B7A11E
1,560,281,861 UART: [art] PUB.Y = E78F0C79D15EB51322743428C9531F85CEFF687A27E5E49125E4F47EDE10281E894E39310D3BFD3F846DCC7ADBF575A6
1,560,288,813 UART: [art] SIG.R = F0035D0BA80BD2D97C90D27440E1847DB53FE4EECC85D22362341A574D2D48CA7A4E9019C9DF6C5F6695B15021042D57
1,560,295,575 UART: [art] SIG.S = 3A0E4847F0A757C0800DD8B7367EC8AD00D64C9010F4B2986C28B38D113E517AC0A846B38B8F16EE3E903EF1B7BDC4C8
1,560,319,110 UART: Caliptra RT
1,560,319,363 UART: [state] CFI Enabled
1,560,599,174 UART: [rt] RT listening for mailbox commands...
1,560,599,844 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,560,600,817 UART:
1,560,600,833 UART: Running Caliptra ROM ...
1,560,601,241 UART:
1,560,601,296 UART: [state] CFI Enabled
1,560,604,048 UART: [state] LifecycleState = Unprovisioned
1,560,604,703 UART: [state] DebugLocked = No
1,560,605,431 UART: [state] WD Timer not started. Device not locked for debugging
1,560,606,607 UART: [kat] SHA2-256
1,561,412,257 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,561,416,382 UART: [kat] ++
1,561,416,534 UART: [kat] sha1
1,561,420,820 UART: [kat] SHA2-256
1,561,422,760 UART: [kat] SHA2-384
1,561,425,469 UART: [kat] SHA2-512-ACC
1,561,427,369 UART: [kat] ECC-384
1,561,437,414 UART: [kat] HMAC-384Kdf
1,561,441,848 UART: [kat] LMS
1,561,690,176 UART: [kat] --
1,561,691,094 UART: [update-reset] ++
1,563,002,690 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,003,853 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,563,153,431 >>> mbox cmd response: success
1,563,153,702 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,161,716 UART: [update-reset Success] --
1,563,162,543 UART: [state] Locking Datavault
1,563,163,323 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,163,927 UART: [state] Locking ICCM
1,563,164,415 UART: [exit] Launching FMC @ 0x40000130
1,563,169,744 UART:
1,563,169,760 UART: Running Caliptra FMC ...
1,563,170,168 UART:
1,563,170,222 UART: [state] CFI Enabled
1,563,259,597 UART: [art] Extend RT PCRs Done
1,563,260,025 UART: [art] Lock RT PCRs Done
1,563,261,240 UART: [art] Populate DV Done
1,563,269,477 UART: [fht] FMC Alias Private Key: 7
1,563,270,417 UART: [art] Derive CDI
1,563,270,697 UART: [art] Store in in slot 0x4
1,563,356,376 UART: [art] Derive Key Pair
1,563,356,736 UART: [art] Store priv key in slot 0x5
1,563,370,068 UART: [art] Derive Key Pair - Done
1,563,384,682 UART: [art] Signing Cert with AUTHO
1,563,385,162 UART: RITY.KEYID = 7
1,563,400,482 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,401,247 UART: [art] PUB.X = 36E2B6C72DBE40C4339EE944E10F6913D57D8D4236BBDB067EA5D82DDFBFA48A631D43729D6B019B6E76105DB0CF732B
1,563,408,022 UART: [art] PUB.Y = 28C0062E5594E1123DA2A6F90092EA43DF9960A643610A11B943B1D342B812AC9D594B2F4591BFA6BE7A65052E34967D
1,563,414,939 UART: [art] SIG.R = A5B3FCB8E7F3FF916F91AD8EE10FE64F3B24F36016EFCD780AAC4E1F5451392A162DBD5D1ABD345D75BDD38642AD0041
1,563,421,703 UART: [art] SIG.S = E7D2E86DC9E18F95D59CEB31D30FA71034F56D2EE61B0875C96AC399E0D234001E974D16DF14A66185EB82A8330150DE
1,563,445,491 UART: Caliptra RT
1,563,445,744 UART: [state] CFI Enabled
1,563,725,012 UART: [rt] RT listening for mailbox commands...
1,563,725,682 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,726,809 UART:
1,563,726,825 UART: Running Caliptra ROM ...
1,563,727,233 UART:
1,563,727,288 UART: [state] CFI Enabled
1,563,730,074 UART: [state] LifecycleState = Unprovisioned
1,563,730,729 UART: [state] DebugLocked = No
1,563,731,301 UART: [state] WD Timer not started. Device not locked for debugging
1,563,732,477 UART: [kat] SHA2-256
1,564,538,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,564,542,252 UART: [kat] ++
1,564,542,404 UART: [kat] sha1
1,564,546,614 UART: [kat] SHA2-256
1,564,548,554 UART: [kat] SHA2-384
1,564,551,465 UART: [kat] SHA2-512-ACC
1,564,553,365 UART: [kat] ECC-384
1,564,563,254 UART: [kat] HMAC-384Kdf
1,564,567,932 UART: [kat] LMS
1,564,816,260 UART: [kat] --
1,564,817,116 UART: [update-reset] ++
1,566,128,800 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,129,789 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,566,279,367 >>> mbox cmd response: success
1,566,279,632 UART: [update-reset] Copying MAN_2 To MAN_1
1,566,287,646 UART: [update-reset Success] --
1,566,288,521 UART: [state] Locking Datavault
1,566,289,413 UART: [state] Locking PCR0, PCR1 and PCR31
1,566,290,017 UART: [state] Locking ICCM
1,566,290,587 UART: [exit] Launching FMC @ 0x40000130
1,566,295,916 UART:
1,566,295,932 UART: Running Caliptra FMC ...
1,566,296,340 UART:
1,566,296,394 UART: [state] CFI Enabled
1,566,385,535 UART: [art] Extend RT PCRs Done
1,566,385,963 UART: [art] Lock RT PCRs Done
1,566,387,218 UART: [art] Populate DV Done
1,566,395,351 UART: [fht] FMC Alias Private Key: 7
1,566,396,333 UART: [art] Derive CDI
1,566,396,613 UART: [art] Store in in slot 0x4
1,566,482,434 UART: [art] Derive Key Pair
1,566,482,794 UART: [art] Store priv key in slot 0x5
1,566,495,872 UART: [art] Derive Key Pair - Done
1,566,511,038 UART: [art] Signing Cert with AUTHO
1,566,511,518 UART: RITY.KEYID = 7
1,566,526,710 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,527,475 UART: [art] PUB.X = 6EB6274BA70CCF68F319D1EBBACB525F777F30254F7F5E9025848D2123AA5A495D4CF942746CD915A2C6075145B7A11E
1,566,534,245 UART: [art] PUB.Y = E78F0C79D15EB51322743428C9531F85CEFF687A27E5E49125E4F47EDE10281E894E39310D3BFD3F846DCC7ADBF575A6
1,566,541,197 UART: [art] SIG.R = F0035D0BA80BD2D97C90D27440E1847DB53FE4EECC85D22362341A574D2D48CA7A4E9019C9DF6C5F6695B15021042D57
1,566,547,959 UART: [art] SIG.S = 3A0E4847F0A757C0800DD8B7367EC8AD00D64C9010F4B2986C28B38D113E517AC0A846B38B8F16EE3E903EF1B7BDC4C8
1,566,571,792 UART: Caliptra RT
1,566,572,045 UART: [state] CFI Enabled
1,566,851,776 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 316.82s
Truncated 733352 bytes from beginning
9 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,297,983 >>> mbox cmd response: success
1,485,311,293 UART:
1,485,311,309 UART: Running Caliptra FMC ...
1,485,311,717 UART:
1,485,311,771 UART: [state] CFI Enabled
1,485,401,150 UART: [art] Extend RT PCRs Done
1,485,401,578 UART: [art] Lock RT PCRs Done
1,485,402,611 UART: [art] Populate DV Done
1,485,410,946 UART: [fht] FMC Alias Private Key: 7
1,485,411,964 UART: [art] Derive CDI
1,485,412,244 UART: [art] Store in in slot 0x4
1,485,497,605 UART: [art] Derive Key Pair
1,485,497,965 UART: [art] Store priv key in slot 0x5
1,485,511,111 UART: [art] Derive Key Pair - Done
1,485,526,172 UART: [art] Signing Cert with AUTHO
1,485,526,652 UART: RITY.KEYID = 7
1,485,541,996 UART: [art] Erasing AUTHORITY.KEYID = 7
1,485,542,761 UART: [art] PUB.X = 120205E567B6A3E7CAD326D6DAD80CBB736B5F06FECAC2361467F34B7BCAED2B7A5B057EE5A73AA17C8D66C8353795F0
1,485,549,534 UART: [art] PUB.Y = BB2037CFA501D069802AAA29523856B38528FDE8D007DE8469EFC97BB095FB02390EDBB5408696DCC3D960E35EA40ACB
1,485,556,481 UART: [art] SIG.R = 09E8FA4A55610644A5ECD0F92A5AAAAB618E1086725861BB1F36DD41C21DD15CB55DFD27F97FB18D5F44A4295C6B5FD0
1,485,563,261 UART: [art] SIG.S = D9330089EEBFF335651A4308F2E7EA4F8519C85C02108166B2E0902CE388CABF42876E50E7651C88C7D8E6B133365FB4
1,485,586,834 UART: Caliptra RT
1,485,587,087 UART: [state] CFI Enabled
1,485,869,490 UART: [rt] RT listening for mailbox commands...
1,485,870,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,488,305,656 >>> mbox cmd response: success
1,488,318,980 UART:
1,488,318,996 UART: Running Caliptra FMC ...
1,488,319,404 UART:
1,488,319,458 UART: [state] CFI Enabled
1,488,408,705 UART: [art] Extend RT PCRs Done
1,488,409,133 UART: [art] Lock RT PCRs Done
1,488,410,268 UART: [art] Populate DV Done
1,488,418,689 UART: [fht] FMC Alias Private Key: 7
1,488,419,679 UART: [art] Derive CDI
1,488,419,959 UART: [art] Store in in slot 0x4
1,488,505,456 UART: [art] Derive Key Pair
1,488,505,816 UART: [art] Store priv key in slot 0x5
1,488,518,378 UART: [art] Derive Key Pair - Done
1,488,533,268 UART: [art] Signing Cert with AUTHO
1,488,533,748 UART: RITY.KEYID = 7
1,488,549,116 UART: [art] Erasing AUTHORITY.KEYID = 7
1,488,549,881 UART: [art] PUB.X = 4AE8B331289B6AF4E907BC71CF285F361DDFEB5E2A47FB7EE7C9C435C63133747EFEA88DCE3B15CF6F1CB44C2CD3D8DF
1,488,556,676 UART: [art] PUB.Y = EA4AF7F4CB58D89940CDC4EF8094F7E2C2562DB121026786A9B411EAE431948075002F739F8EBB1D2761E26D556AA77F
1,488,563,607 UART: [art] SIG.R = FF68FACCCC6E8A2F6A7211BB4C521DEFF9157F7B3581F5BB998F5DF85FE84978FEC926F293F5126E860737555A8BEFB2
1,488,570,392 UART: [art] SIG.S = 48D9828240ED3FA7D3FE505573C9BB6FF24E050BA290873F5C1E00F9639FAAFD1AF37540F1D3B05360EDDF5D58E85116
1,488,594,613 UART: Caliptra RT
1,488,594,866 UART: [state] CFI Enabled
1,488,878,517 UART: [rt] RT listening for mailbox commands...
1,488,879,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,491,315,129 >>> mbox cmd response: success
1,491,328,559 UART:
1,491,328,575 UART: Running Caliptra FMC ...
1,491,328,983 UART:
1,491,329,037 UART: [state] CFI Enabled
1,491,418,432 UART: [art] Extend RT PCRs Done
1,491,418,860 UART: [art] Lock RT PCRs Done
1,491,420,167 UART: [art] Populate DV Done
1,491,428,494 UART: [fht] FMC Alias Private Key: 7
1,491,429,576 UART: [art] Derive CDI
1,491,429,856 UART: [art] Store in in slot 0x4
1,491,515,385 UART: [art] Derive Key Pair
1,491,515,745 UART: [art] Store priv key in slot 0x5
1,491,528,845 UART: [art] Derive Key Pair - Done
1,491,543,608 UART: [art] Signing Cert with AUTHO
1,491,544,088 UART: RITY.KEYID = 7
1,491,559,598 UART: [art] Erasing AUTHORITY.KEYID = 7
1,491,560,363 UART: [art] PUB.X = 120205E567B6A3E7CAD326D6DAD80CBB736B5F06FECAC2361467F34B7BCAED2B7A5B057EE5A73AA17C8D66C8353795F0
1,491,567,136 UART: [art] PUB.Y = BB2037CFA501D069802AAA29523856B38528FDE8D007DE8469EFC97BB095FB02390EDBB5408696DCC3D960E35EA40ACB
1,491,574,083 UART: [art] SIG.R = 09E8FA4A55610644A5ECD0F92A5AAAAB618E1086725861BB1F36DD41C21DD15CB55DFD27F97FB18D5F44A4295C6B5FD0
1,491,580,863 UART: [art] SIG.S = D9330089EEBFF335651A4308F2E7EA4F8519C85C02108166B2E0902CE388CABF42876E50E7651C88C7D8E6B133365FB4
1,491,604,862 UART: Caliptra RT
1,491,605,115 UART: [state] CFI Enabled
1,491,887,056 UART: [rt] RT listening for mailbox commands...
1,491,887,726 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,494,323,482 >>> mbox cmd response: success
1,494,336,724 UART:
1,494,336,740 UART: Running Caliptra FMC ...
1,494,337,148 UART:
1,494,337,202 UART: [state] CFI Enabled
1,494,426,625 UART: [art] Extend RT PCRs Done
1,494,427,053 UART: [art] Lock RT PCRs Done
1,494,428,450 UART: [art] Populate DV Done
1,494,436,703 UART: [fht] FMC Alias Private Key: 7
1,494,437,697 UART: [art] Derive CDI
1,494,437,977 UART: [art] Store in in slot 0x4
1,494,523,512 UART: [art] Derive Key Pair
1,494,523,872 UART: [art] Store priv key in slot 0x5
1,494,536,808 UART: [art] Derive Key Pair - Done
1,494,551,454 UART: [art] Signing Cert with AUTHO
1,494,551,934 UART: RITY.KEYID = 7
1,494,567,200 UART: [art] Erasing AUTHORITY.KEYID = 7
1,494,567,965 UART: [art] PUB.X = 4AE8B331289B6AF4E907BC71CF285F361DDFEB5E2A47FB7EE7C9C435C63133747EFEA88DCE3B15CF6F1CB44C2CD3D8DF
1,494,574,760 UART: [art] PUB.Y = EA4AF7F4CB58D89940CDC4EF8094F7E2C2562DB121026786A9B411EAE431948075002F739F8EBB1D2761E26D556AA77F
1,494,581,691 UART: [art] SIG.R = FF68FACCCC6E8A2F6A7211BB4C521DEFF9157F7B3581F5BB998F5DF85FE84978FEC926F293F5126E860737555A8BEFB2
1,494,588,476 UART: [art] SIG.S = 48D9828240ED3FA7D3FE505573C9BB6FF24E050BA290873F5C1E00F9639FAAFD1AF37540F1D3B05360EDDF5D58E85116
1,494,612,471 UART: Caliptra RT
1,494,612,724 UART: [state] CFI Enabled
1,494,893,617 UART: [rt] RT listening for mailbox commands...
1,494,894,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,497,331,799 >>> mbox cmd response: success
1,497,345,407 UART:
1,497,345,423 UART: Running Caliptra FMC ...
1,497,345,831 UART:
1,497,345,885 UART: [state] CFI Enabled
1,497,435,194 UART: [art] Extend RT PCRs Done
1,497,435,622 UART: [art] Lock RT PCRs Done
1,497,436,869 UART: [art] Populate DV Done
1,497,445,032 UART: [fht] FMC Alias Private Key: 7
1,497,446,192 UART: [art] Derive CDI
1,497,446,472 UART: [art] Store in in slot 0x4
1,497,531,907 UART: [art] Derive Key Pair
1,497,532,267 UART: [art] Store priv key in slot 0x5
1,497,545,395 UART: [art] Derive Key Pair - Done
1,497,560,244 UART: [art] Signing Cert with AUTHO
1,497,560,724 UART: RITY.KEYID = 7
1,497,575,788 UART: [art] Erasing AUTHORITY.KEYID = 7
1,497,576,553 UART: [art] PUB.X = 120205E567B6A3E7CAD326D6DAD80CBB736B5F06FECAC2361467F34B7BCAED2B7A5B057EE5A73AA17C8D66C8353795F0
1,497,583,326 UART: [art] PUB.Y = BB2037CFA501D069802AAA29523856B38528FDE8D007DE8469EFC97BB095FB02390EDBB5408696DCC3D960E35EA40ACB
1,497,590,273 UART: [art] SIG.R = 09E8FA4A55610644A5ECD0F92A5AAAAB618E1086725861BB1F36DD41C21DD15CB55DFD27F97FB18D5F44A4295C6B5FD0
1,497,597,053 UART: [art] SIG.S = D9330089EEBFF335651A4308F2E7EA4F8519C85C02108166B2E0902CE388CABF42876E50E7651C88C7D8E6B133365FB4
1,497,620,884 UART: Caliptra RT
1,497,621,137 UART: [state] CFI Enabled
1,497,907,248 UART: [rt] RT listening for mailbox commands...
1,497,907,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,500,342,524 >>> mbox cmd response: success
1,500,355,942 UART:
1,500,355,958 UART: Running Caliptra FMC ...
1,500,356,366 UART:
1,500,356,420 UART: [state] CFI Enabled
1,500,444,891 UART: [art] Extend RT PCRs Done
1,500,445,319 UART: [art] Lock RT PCRs Done
1,500,446,302 UART: [art] Populate DV Done
1,500,454,391 UART: [fht] FMC Alias Private Key: 7
1,500,455,517 UART: [art] Derive CDI
1,500,455,797 UART: [art] Store in in slot 0x4
1,500,541,752 UART: [art] Derive Key Pair
1,500,542,112 UART: [art] Store priv key in slot 0x5
1,500,555,766 UART: [art] Derive Key Pair - Done
1,500,570,738 UART: [art] Signing Cert with AUTHO
1,500,571,218 UART: RITY.KEYID = 7
1,500,586,260 UART: [art] Erasing AUTHORITY.KEYID = 7
1,500,587,025 UART: [art] PUB.X = 4AE8B331289B6AF4E907BC71CF285F361DDFEB5E2A47FB7EE7C9C435C63133747EFEA88DCE3B15CF6F1CB44C2CD3D8DF
1,500,593,820 UART: [art] PUB.Y = EA4AF7F4CB58D89940CDC4EF8094F7E2C2562DB121026786A9B411EAE431948075002F739F8EBB1D2761E26D556AA77F
1,500,600,751 UART: [art] SIG.R = FF68FACCCC6E8A2F6A7211BB4C521DEFF9157F7B3581F5BB998F5DF85FE84978FEC926F293F5126E860737555A8BEFB2
1,500,607,536 UART: [art] SIG.S = 48D9828240ED3FA7D3FE505573C9BB6FF24E050BA290873F5C1E00F9639FAAFD1AF37540F1D3B05360EDDF5D58E85116
1,500,631,255 UART: Caliptra RT
1,500,631,508 UART: [state] CFI Enabled
1,500,911,951 UART: [rt] RT listening for mailbox commands...
1,500,912,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,503,348,693 >>> mbox cmd response: success
1,503,362,441 UART:
1,503,362,457 UART: Running Caliptra FMC ...
1,503,362,865 UART:
1,503,362,919 UART: [state] CFI Enabled
1,503,452,210 UART: [art] Extend RT PCRs Done
1,503,452,638 UART: [art] Lock RT PCRs Done
1,503,453,969 UART: [art] Populate DV Done
1,503,462,258 UART: [fht] FMC Alias Private Key: 7
1,503,463,424 UART: [art] Derive CDI
1,503,463,704 UART: [art] Store in in slot 0x4
1,503,549,765 UART: [art] Derive Key Pair
1,503,550,125 UART: [art] Store priv key in slot 0x5
1,503,563,389 UART: [art] Derive Key Pair - Done
1,503,578,106 UART: [art] Signing Cert with AUTHO
1,503,578,586 UART: RITY.KEYID = 7
1,503,594,288 UART: [art] Erasing AUTHORITY.KEYID = 7
1,503,595,053 UART: [art] PUB.X = 120205E567B6A3E7CAD326D6DAD80CBB736B5F06FECAC2361467F34B7BCAED2B7A5B057EE5A73AA17C8D66C8353795F0
1,503,601,826 UART: [art] PUB.Y = BB2037CFA501D069802AAA29523856B38528FDE8D007DE8469EFC97BB095FB02390EDBB5408696DCC3D960E35EA40ACB
1,503,608,773 UART: [art] SIG.R = 09E8FA4A55610644A5ECD0F92A5AAAAB618E1086725861BB1F36DD41C21DD15CB55DFD27F97FB18D5F44A4295C6B5FD0
1,503,615,553 UART: [art] SIG.S = D9330089EEBFF335651A4308F2E7EA4F8519C85C02108166B2E0902CE388CABF42876E50E7651C88C7D8E6B133365FB4
1,503,639,424 UART: Caliptra RT
1,503,639,677 UART: [state] CFI Enabled
1,503,923,500 UART: [rt] RT listening for mailbox commands...
1,503,924,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,506,358,792 >>> mbox cmd response: success
1,506,372,302 UART:
1,506,372,318 UART: Running Caliptra FMC ...
1,506,372,726 UART:
1,506,372,780 UART: [state] CFI Enabled
1,506,461,941 UART: [art] Extend RT PCRs Done
1,506,462,369 UART: [art] Lock RT PCRs Done
1,506,464,044 UART: [art] Populate DV Done
1,506,471,975 UART: [fht] FMC Alias Private Key: 7
1,506,473,157 UART: [art] Derive CDI
1,506,473,437 UART: [art] Store in in slot 0x4
1,506,558,976 UART: [art] Derive Key Pair
1,506,559,336 UART: [art] Store priv key in slot 0x5
1,506,572,508 UART: [art] Derive Key Pair - Done
1,506,586,982 UART: [art] Signing Cert with AUTHO
1,506,587,462 UART: RITY.KEYID = 7
1,506,602,570 UART: [art] Erasing AUTHORITY.KEYID = 7
1,506,603,335 UART: [art] PUB.X = 4AE8B331289B6AF4E907BC71CF285F361DDFEB5E2A47FB7EE7C9C435C63133747EFEA88DCE3B15CF6F1CB44C2CD3D8DF
1,506,610,130 UART: [art] PUB.Y = EA4AF7F4CB58D89940CDC4EF8094F7E2C2562DB121026786A9B411EAE431948075002F739F8EBB1D2761E26D556AA77F
1,506,617,061 UART: [art] SIG.R = FF68FACCCC6E8A2F6A7211BB4C521DEFF9157F7B3581F5BB998F5DF85FE84978FEC926F293F5126E860737555A8BEFB2
1,506,623,846 UART: [art] SIG.S = 48D9828240ED3FA7D3FE505573C9BB6FF24E050BA290873F5C1E00F9639FAAFD1AF37540F1D3B05360EDDF5D58E85116
1,506,647,789 UART: Caliptra RT
1,506,648,042 UART: [state] CFI Enabled
1,506,929,311 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 302.65s
Truncated 1339593 bytes from beginning
[art] Populate DV Done
1,554,378,136 UART: [fht] FMC Alias Private Key: 7
1,554,379,282 UART: [art] Derive CDI
1,554,379,562 UART: [art] Store in in slot 0x4
1,554,465,071 UART: [art] Derive Key Pair
1,554,465,431 UART: [art] Store priv key in slot 0x5
1,554,478,395 UART: [art] Derive Key Pair - Done
1,554,493,503 UART: [art] Signing Cert with AUTHO
1,554,493,983 UART: RITY.KEYID = 7
1,554,509,483 UART: [art] Erasing AUTHORITY.KEYID = 7
1,554,510,248 UART: [art] PUB.X = B3F66BB54497F6A13723CF5C66CE852DDA623EDA68EF1C24BD470CE08A77C620C41F26C6EC35261427AC86F3531005D0
1,554,517,020 UART: [art] PUB.Y = 8C72B1F25CD71D59D6BD8EF2F67186CE457A3DC3EAD7C256A6C2D28B5F8AF57AD614AA73BB3F10908AE52C003C2020C2
1,554,523,966 UART: [art] SIG.R = C122A5986874B5A62629C0DF0C2BEA33315560C2534892614B67D69DD9DA54F9799F2DEB3061184AD4CB5DAC2B243E8F
1,554,530,737 UART: [art] SIG.S = 0C73CAE744A1C71D6788D270782B753F877B22A929469AC37A7CCC98650557DAC6BCF4206908C474B1D546FC7F04CA52
1,554,554,640 UART: Caliptra RT
1,554,554,985 UART: [state] CFI Enabled
1,554,839,164 UART: [rt] RT listening for mailbox commands...
1,554,839,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,554,841,053 UART:
1,554,841,069 UART: Running Caliptra ROM ...
1,554,841,477 UART:
1,554,841,619 UART: [state] CFI Enabled
1,554,844,421 UART: [state] LifecycleState = Unprovisioned
1,554,845,076 UART: [state] DebugLocked = No
1,554,845,804 UART: [state] WD Timer not started. Device not locked for debugging
1,554,846,956 UART: [kat] SHA2-256
1,555,652,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,555,656,731 UART: [kat] ++
1,555,656,883 UART: [kat] sha1
1,555,661,193 UART: [kat] SHA2-256
1,555,663,133 UART: [kat] SHA2-384
1,555,665,764 UART: [kat] SHA2-512-ACC
1,555,667,664 UART: [kat] ECC-384
1,555,677,223 UART: [kat] HMAC-384Kdf
1,555,681,861 UART: [kat] LMS
1,555,930,189 UART: [kat] --
1,555,930,977 UART: [update-reset] ++
1,557,241,745 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,557,242,832 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,557,392,410 >>> mbox cmd response: success
1,557,392,517 UART: [update-reset] Copying MAN_2 To MAN_1
1,557,400,531 UART: [update-reset Success] --
1,557,401,450 UART: [state] Locking Datavault
1,557,402,414 UART: [state] Locking PCR0, PCR1 and PCR31
1,557,403,018 UART: [state] Locking ICCM
1,557,403,456 UART: [exit] Launching FMC @ 0x40000130
1,557,408,785 UART:
1,557,408,801 UART: Running Caliptra FMC ...
1,557,409,209 UART:
1,557,409,352 UART: [state] CFI Enabled
1,557,498,731 UART: [art] Extend RT PCRs Done
1,557,499,159 UART: [art] Lock RT PCRs Done
1,557,500,272 UART: [art] Populate DV Done
1,557,508,275 UART: [fht] FMC Alias Private Key: 7
1,557,509,373 UART: [art] Derive CDI
1,557,509,653 UART: [art] Store in in slot 0x4
1,557,595,164 UART: [art] Derive Key Pair
1,557,595,524 UART: [art] Store priv key in slot 0x5
1,557,608,034 UART: [art] Derive Key Pair - Done
1,557,622,634 UART: [art] Signing Cert with AUTHO
1,557,623,114 UART: RITY.KEYID = 7
1,557,638,772 UART: [art] Erasing AUTHORITY.KEYID = 7
1,557,639,537 UART: [art] PUB.X = 4D209D427A4184B848019099C291A7B2D10FA20DDB9A180D35C14B3919FB91BDE87A93C2D726A6952633E8E45481481B
1,557,646,291 UART: [art] PUB.Y = AB1182D8323FB6284049B4CF236BC707D7EDEC8F0A70202CADCD26E8B6088E570017A33980FE31AA4DBA7CCA42D387F7
1,557,653,224 UART: [art] SIG.R = F0285C25ECB98E589D805E43B3B2AC5AF9EAEE02C6BB1516FF0178992F9DE9A4B864A12A51B83808A1355A341AB2678A
1,557,659,995 UART: [art] SIG.S = C0849E8B0FD96494F8C4DAD6EDE06E4AD5B1F291B7CC2580C104E5EA2E21603C44B3774C6EF41D533F9F8242938433D5
1,557,683,748 UART: Caliptra RT
1,557,684,093 UART: [state] CFI Enabled
1,557,967,119 UART: [rt] RT listening for mailbox commands...
1,557,967,789 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,557,968,826 UART:
1,557,968,842 UART: Running Caliptra ROM ...
1,557,969,250 UART:
1,557,969,392 UART: [state] CFI Enabled
1,557,972,318 UART: [state] LifecycleState = Unprovisioned
1,557,972,973 UART: [state] DebugLocked = No
1,557,973,671 UART: [state] WD Timer not started. Device not locked for debugging
1,557,974,887 UART: [kat] SHA2-256
1,558,780,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,558,784,662 UART: [kat] ++
1,558,784,814 UART: [kat] sha1
1,558,789,116 UART: [kat] SHA2-256
1,558,791,056 UART: [kat] SHA2-384
1,558,793,759 UART: [kat] SHA2-512-ACC
1,558,795,659 UART: [kat] ECC-384
1,558,805,494 UART: [kat] HMAC-384Kdf
1,558,810,102 UART: [kat] LMS
1,559,058,430 UART: [kat] --
1,559,059,148 UART: [update-reset] ++
1,560,368,658 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,560,369,787 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,560,519,365 >>> mbox cmd response: success
1,560,519,692 UART: [update-reset] Copying MAN_2 To MAN_1
1,560,527,706 UART: [update-reset Success] --
1,560,528,801 UART: [state] Locking Datavault
1,560,529,459 UART: [state] Locking PCR0, PCR1 and PCR31
1,560,530,063 UART: [state] Locking ICCM
1,560,530,647 UART: [exit] Launching FMC @ 0x40000130
1,560,535,976 UART:
1,560,535,992 UART: Running Caliptra FMC ...
1,560,536,400 UART:
1,560,536,543 UART: [state] CFI Enabled
1,560,625,650 UART: [art] Extend RT PCRs Done
1,560,626,078 UART: [art] Lock RT PCRs Done
1,560,627,521 UART: [art] Populate DV Done
1,560,635,954 UART: [fht] FMC Alias Private Key: 7
1,560,637,056 UART: [art] Derive CDI
1,560,637,336 UART: [art] Store in in slot 0x4
1,560,723,109 UART: [art] Derive Key Pair
1,560,723,469 UART: [art] Store priv key in slot 0x5
1,560,736,957 UART: [art] Derive Key Pair - Done
1,560,751,867 UART: [art] Signing Cert with AUTHO
1,560,752,347 UART: RITY.KEYID = 7
1,560,767,479 UART: [art] Erasing AUTHORITY.KEYID = 7
1,560,768,244 UART: [art] PUB.X = B3F66BB54497F6A13723CF5C66CE852DDA623EDA68EF1C24BD470CE08A77C620C41F26C6EC35261427AC86F3531005D0
1,560,775,016 UART: [art] PUB.Y = 8C72B1F25CD71D59D6BD8EF2F67186CE457A3DC3EAD7C256A6C2D28B5F8AF57AD614AA73BB3F10908AE52C003C2020C2
1,560,781,962 UART: [art] SIG.R = C122A5986874B5A62629C0DF0C2BEA33315560C2534892614B67D69DD9DA54F9799F2DEB3061184AD4CB5DAC2B243E8F
1,560,788,733 UART: [art] SIG.S = 0C73CAE744A1C71D6788D270782B753F877B22A929469AC37A7CCC98650557DAC6BCF4206908C474B1D546FC7F04CA52
1,560,812,926 UART: Caliptra RT
1,560,813,271 UART: [state] CFI Enabled
1,561,096,924 UART: [rt] RT listening for mailbox commands...
1,561,097,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,561,098,425 UART:
1,561,098,441 UART: Running Caliptra ROM ...
1,561,098,849 UART:
1,561,098,991 UART: [state] CFI Enabled
1,561,101,631 UART: [state] LifecycleState = Unprovisioned
1,561,102,286 UART: [state] DebugLocked = No
1,561,102,902 UART: [state] WD Timer not started. Device not locked for debugging
1,561,104,088 UART: [kat] SHA2-256
1,561,909,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,561,913,863 UART: [kat] ++
1,561,914,015 UART: [kat] sha1
1,561,918,329 UART: [kat] SHA2-256
1,561,920,269 UART: [kat] SHA2-384
1,561,922,896 UART: [kat] SHA2-512-ACC
1,561,924,796 UART: [kat] ECC-384
1,561,934,433 UART: [kat] HMAC-384Kdf
1,561,939,047 UART: [kat] LMS
1,562,187,375 UART: [kat] --
1,562,188,551 UART: [update-reset] ++
1,563,500,717 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,563,501,826 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,563,651,404 >>> mbox cmd response: success
1,563,651,581 UART: [update-reset] Copying MAN_2 To MAN_1
1,563,659,595 UART: [update-reset Success] --
1,563,660,782 UART: [state] Locking Datavault
1,563,661,580 UART: [state] Locking PCR0, PCR1 and PCR31
1,563,662,184 UART: [state] Locking ICCM
1,563,662,770 UART: [exit] Launching FMC @ 0x40000130
1,563,668,099 UART:
1,563,668,115 UART: Running Caliptra FMC ...
1,563,668,523 UART:
1,563,668,666 UART: [state] CFI Enabled
1,563,757,937 UART: [art] Extend RT PCRs Done
1,563,758,365 UART: [art] Lock RT PCRs Done
1,563,759,618 UART: [art] Populate DV Done
1,563,767,881 UART: [fht] FMC Alias Private Key: 7
1,563,769,059 UART: [art] Derive CDI
1,563,769,339 UART: [art] Store in in slot 0x4
1,563,855,100 UART: [art] Derive Key Pair
1,563,855,460 UART: [art] Store priv key in slot 0x5
1,563,868,940 UART: [art] Derive Key Pair - Done
1,563,883,890 UART: [art] Signing Cert with AUTHO
1,563,884,370 UART: RITY.KEYID = 7
1,563,899,578 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,900,343 UART: [art] PUB.X = 4D209D427A4184B848019099C291A7B2D10FA20DDB9A180D35C14B3919FB91BDE87A93C2D726A6952633E8E45481481B
1,563,907,097 UART: [art] PUB.Y = AB1182D8323FB6284049B4CF236BC707D7EDEC8F0A70202CADCD26E8B6088E570017A33980FE31AA4DBA7CCA42D387F7
1,563,914,030 UART: [art] SIG.R = F0285C25ECB98E589D805E43B3B2AC5AF9EAEE02C6BB1516FF0178992F9DE9A4B864A12A51B83808A1355A341AB2678A
1,563,920,801 UART: [art] SIG.S = C0849E8B0FD96494F8C4DAD6EDE06E4AD5B1F291B7CC2580C104E5EA2E21603C44B3774C6EF41D533F9F8242938433D5
1,563,944,250 UART: Caliptra RT
1,563,944,595 UART: [state] CFI Enabled
1,564,224,765 UART: [rt] RT listening for mailbox commands...
1,564,225,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,564,226,142 UART:
1,564,226,158 UART: Running Caliptra ROM ...
1,564,226,566 UART:
1,564,226,708 UART: [state] CFI Enabled
1,564,229,832 UART: [state] LifecycleState = Unprovisioned
1,564,230,487 UART: [state] DebugLocked = No
1,564,231,173 UART: [state] WD Timer not started. Device not locked for debugging
1,564,232,375 UART: [kat] SHA2-256
1,565,038,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,565,042,150 UART: [kat] ++
1,565,042,302 UART: [kat] sha1
1,565,046,458 UART: [kat] SHA2-256
1,565,048,398 UART: [kat] SHA2-384
1,565,051,297 UART: [kat] SHA2-512-ACC
1,565,053,197 UART: [kat] ECC-384
1,565,062,948 UART: [kat] HMAC-384Kdf
1,565,067,670 UART: [kat] LMS
1,565,315,998 UART: [kat] --
1,565,316,556 UART: [update-reset] ++
1,566,627,566 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,566,628,717 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,566,778,295 >>> mbox cmd response: success
1,566,778,416 UART: [update-reset] Copying MAN_2 To MAN_1
1,566,786,430 UART: [update-reset Success] --
1,566,787,225 UART: [state] Locking Datavault
1,566,787,913 UART: [state] Locking PCR0, PCR1 and PCR31
1,566,788,517 UART: [state] Locking ICCM
1,566,789,001 UART: [exit] Launching FMC @ 0x40000130
1,566,794,330 UART:
1,566,794,346 UART: Running Caliptra FMC ...
1,566,794,754 UART:
1,566,794,897 UART: [state] CFI Enabled
1,566,884,384 UART: [art] Extend RT PCRs Done
1,566,884,812 UART: [art] Lock RT PCRs Done
1,566,886,063 UART: [art] Populate DV Done
1,566,894,404 UART: [fht] FMC Alias Private Key: 7
1,566,895,476 UART: [art] Derive CDI
1,566,895,756 UART: [art] Store in in slot 0x4
1,566,981,295 UART: [art] Derive Key Pair
1,566,981,655 UART: [art] Store priv key in slot 0x5
1,566,994,903 UART: [art] Derive Key Pair - Done
1,567,009,627 UART: [art] Signing Cert with AUTHO
1,567,010,107 UART: RITY.KEYID = 7
1,567,025,487 UART: [art] Erasing AUTHORITY.KEYID = 7
1,567,026,252 UART: [art] PUB.X = B3F66BB54497F6A13723CF5C66CE852DDA623EDA68EF1C24BD470CE08A77C620C41F26C6EC35261427AC86F3531005D0
1,567,033,024 UART: [art] PUB.Y = 8C72B1F25CD71D59D6BD8EF2F67186CE457A3DC3EAD7C256A6C2D28B5F8AF57AD614AA73BB3F10908AE52C003C2020C2
1,567,039,970 UART: [art] SIG.R = C122A5986874B5A62629C0DF0C2BEA33315560C2534892614B67D69DD9DA54F9799F2DEB3061184AD4CB5DAC2B243E8F
1,567,046,741 UART: [art] SIG.S = 0C73CAE744A1C71D6788D270782B753F877B22A929469AC37A7CCC98650557DAC6BCF4206908C474B1D546FC7F04CA52
1,567,070,444 UART: Caliptra RT
1,567,070,789 UART: [state] CFI Enabled
1,567,349,596 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 324.22s
Truncated 733352 bytes from beginning
7 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,809,410 >>> mbox cmd response: success
1,485,822,672 UART:
1,485,822,688 UART: Running Caliptra FMC ...
1,485,823,096 UART:
1,485,823,239 UART: [state] CFI Enabled
1,485,912,826 UART: [art] Extend RT PCRs Done
1,485,913,254 UART: [art] Lock RT PCRs Done
1,485,914,679 UART: [art] Populate DV Done
1,485,923,144 UART: [fht] FMC Alias Private Key: 7
1,485,924,092 UART: [art] Derive CDI
1,485,924,372 UART: [art] Store in in slot 0x4
1,486,009,715 UART: [art] Derive Key Pair
1,486,010,075 UART: [art] Store priv key in slot 0x5
1,486,023,829 UART: [art] Derive Key Pair - Done
1,486,038,507 UART: [art] Signing Cert with AUTHO
1,486,038,987 UART: RITY.KEYID = 7
1,486,054,565 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,055,330 UART: [art] PUB.X = 80ABDF3D208ABB78E911DD39E8714E6EC3AE5E16A7CAD0B04263381C51A05C33FBB628B87BFD814A3E1385FF13032AC1
1,486,062,113 UART: [art] PUB.Y = 7A71996602BF45630FE71EA6770BD7A0A87287390041DA8C4CF34DCD43E7D34C59256BAC7FAE7899B0B7FA9171F89D15
1,486,069,038 UART: [art] SIG.R = BEB3A28E5AC910D69633F467762971406AF1FB3E5356B304778252849E4D75601B6938B2635A83EC14B212E98B343E76
1,486,075,795 UART: [art] SIG.S = 2D62FAFEEFD19516C42FEEA4AC0DFF07D9CF8062A998CB69D354909228FB524CCF5EFFF95AEE9F4B00A32B9EFCA98F0F
1,486,099,655 UART: Caliptra RT
1,486,100,000 UART: [state] CFI Enabled
1,486,382,833 UART: [rt] RT listening for mailbox commands...
1,486,383,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,488,820,072 >>> mbox cmd response: success
1,488,833,496 UART:
1,488,833,512 UART: Running Caliptra FMC ...
1,488,833,920 UART:
1,488,834,063 UART: [state] CFI Enabled
1,488,923,084 UART: [art] Extend RT PCRs Done
1,488,923,512 UART: [art] Lock RT PCRs Done
1,488,924,763 UART: [art] Populate DV Done
1,488,933,028 UART: [fht] FMC Alias Private Key: 7
1,488,934,080 UART: [art] Derive CDI
1,488,934,360 UART: [art] Store in in slot 0x4
1,489,019,781 UART: [art] Derive Key Pair
1,489,020,141 UART: [art] Store priv key in slot 0x5
1,489,033,439 UART: [art] Derive Key Pair - Done
1,489,048,481 UART: [art] Signing Cert with AUTHO
1,489,048,961 UART: RITY.KEYID = 7
1,489,064,113 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,064,878 UART: [art] PUB.X = EE83BC250EBDE15AC4499134255EA789A58AFC005657BB4F6B1D7344B488804DAECF76F1CCF55BECC03D77FBDB783AF5
1,489,071,645 UART: [art] PUB.Y = 66C83BEF22517DEE066277A902774BB2621BA55CF14B3D8F7751726F2EC3EBAE7D4DC26893E4568DC05D1B55B8510020
1,489,078,571 UART: [art] SIG.R = AF2FCD62A265679C8D5AF3115F632555F49D129D2D9DF57876DBED7D464E5E0938A4968C35F239BA34C6466F812CD1FD
1,489,085,346 UART: [art] SIG.S = F118C4D74B8610D9B5AD27C418C3E895F8B226ABB7C668B03B8E8DF6490B35C4BFA3DB7B18298C4BCF8697A117007599
1,489,109,194 UART: Caliptra RT
1,489,109,539 UART: [state] CFI Enabled
1,489,395,331 UART: [rt] RT listening for mailbox commands...
1,489,396,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,491,832,114 >>> mbox cmd response: success
1,491,845,538 UART:
1,491,845,554 UART: Running Caliptra FMC ...
1,491,845,962 UART:
1,491,846,105 UART: [state] CFI Enabled
1,491,935,758 UART: [art] Extend RT PCRs Done
1,491,936,186 UART: [art] Lock RT PCRs Done
1,491,937,493 UART: [art] Populate DV Done
1,491,945,644 UART: [fht] FMC Alias Private Key: 7
1,491,946,686 UART: [art] Derive CDI
1,491,946,966 UART: [art] Store in in slot 0x4
1,492,033,057 UART: [art] Derive Key Pair
1,492,033,417 UART: [art] Store priv key in slot 0x5
1,492,046,279 UART: [art] Derive Key Pair - Done
1,492,061,047 UART: [art] Signing Cert with AUTHO
1,492,061,527 UART: RITY.KEYID = 7
1,492,076,507 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,077,272 UART: [art] PUB.X = 80ABDF3D208ABB78E911DD39E8714E6EC3AE5E16A7CAD0B04263381C51A05C33FBB628B87BFD814A3E1385FF13032AC1
1,492,084,055 UART: [art] PUB.Y = 7A71996602BF45630FE71EA6770BD7A0A87287390041DA8C4CF34DCD43E7D34C59256BAC7FAE7899B0B7FA9171F89D15
1,492,090,980 UART: [art] SIG.R = BEB3A28E5AC910D69633F467762971406AF1FB3E5356B304778252849E4D75601B6938B2635A83EC14B212E98B343E76
1,492,097,737 UART: [art] SIG.S = 2D62FAFEEFD19516C42FEEA4AC0DFF07D9CF8062A998CB69D354909228FB524CCF5EFFF95AEE9F4B00A32B9EFCA98F0F
1,492,121,901 UART: Caliptra RT
1,492,122,246 UART: [state] CFI Enabled
1,492,400,947 UART: [rt] RT listening for mailbox commands...
1,492,401,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,494,837,406 >>> mbox cmd response: success
1,494,851,006 UART:
1,494,851,022 UART: Running Caliptra FMC ...
1,494,851,430 UART:
1,494,851,573 UART: [state] CFI Enabled
1,494,940,440 UART: [art] Extend RT PCRs Done
1,494,940,868 UART: [art] Lock RT PCRs Done
1,494,942,287 UART: [art] Populate DV Done
1,494,950,402 UART: [fht] FMC Alias Private Key: 7
1,494,951,462 UART: [art] Derive CDI
1,494,951,742 UART: [art] Store in in slot 0x4
1,495,037,399 UART: [art] Derive Key Pair
1,495,037,759 UART: [art] Store priv key in slot 0x5
1,495,050,757 UART: [art] Derive Key Pair - Done
1,495,065,415 UART: [art] Signing Cert with AUTHO
1,495,065,895 UART: RITY.KEYID = 7
1,495,081,051 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,081,816 UART: [art] PUB.X = EE83BC250EBDE15AC4499134255EA789A58AFC005657BB4F6B1D7344B488804DAECF76F1CCF55BECC03D77FBDB783AF5
1,495,088,583 UART: [art] PUB.Y = 66C83BEF22517DEE066277A902774BB2621BA55CF14B3D8F7751726F2EC3EBAE7D4DC26893E4568DC05D1B55B8510020
1,495,095,509 UART: [art] SIG.R = AF2FCD62A265679C8D5AF3115F632555F49D129D2D9DF57876DBED7D464E5E0938A4968C35F239BA34C6466F812CD1FD
1,495,102,284 UART: [art] SIG.S = F118C4D74B8610D9B5AD27C418C3E895F8B226ABB7C668B03B8E8DF6490B35C4BFA3DB7B18298C4BCF8697A117007599
1,495,126,308 UART: Caliptra RT
1,495,126,653 UART: [state] CFI Enabled
1,495,410,309 UART: [rt] RT listening for mailbox commands...
1,495,410,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,497,847,730 >>> mbox cmd response: success
1,497,860,982 UART:
1,497,860,998 UART: Running Caliptra FMC ...
1,497,861,406 UART:
1,497,861,549 UART: [state] CFI Enabled
1,497,950,330 UART: [art] Extend RT PCRs Done
1,497,950,758 UART: [art] Lock RT PCRs Done
1,497,951,751 UART: [art] Populate DV Done
1,497,960,128 UART: [fht] FMC Alias Private Key: 7
1,497,961,066 UART: [art] Derive CDI
1,497,961,346 UART: [art] Store in in slot 0x4
1,498,047,059 UART: [art] Derive Key Pair
1,498,047,419 UART: [art] Store priv key in slot 0x5
1,498,060,387 UART: [art] Derive Key Pair - Done
1,498,074,885 UART: [art] Signing Cert with AUTHO
1,498,075,365 UART: RITY.KEYID = 7
1,498,090,517 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,091,282 UART: [art] PUB.X = 80ABDF3D208ABB78E911DD39E8714E6EC3AE5E16A7CAD0B04263381C51A05C33FBB628B87BFD814A3E1385FF13032AC1
1,498,098,065 UART: [art] PUB.Y = 7A71996602BF45630FE71EA6770BD7A0A87287390041DA8C4CF34DCD43E7D34C59256BAC7FAE7899B0B7FA9171F89D15
1,498,104,990 UART: [art] SIG.R = BEB3A28E5AC910D69633F467762971406AF1FB3E5356B304778252849E4D75601B6938B2635A83EC14B212E98B343E76
1,498,111,747 UART: [art] SIG.S = 2D62FAFEEFD19516C42FEEA4AC0DFF07D9CF8062A998CB69D354909228FB524CCF5EFFF95AEE9F4B00A32B9EFCA98F0F
1,498,135,571 UART: Caliptra RT
1,498,135,916 UART: [state] CFI Enabled
1,498,418,317 UART: [rt] RT listening for mailbox commands...
1,498,418,987 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,500,855,502 >>> mbox cmd response: success
1,500,868,858 UART:
1,500,868,874 UART: Running Caliptra FMC ...
1,500,869,282 UART:
1,500,869,425 UART: [state] CFI Enabled
1,500,958,776 UART: [art] Extend RT PCRs Done
1,500,959,204 UART: [art] Lock RT PCRs Done
1,500,960,609 UART: [art] Populate DV Done
1,500,968,714 UART: [fht] FMC Alias Private Key: 7
1,500,969,712 UART: [art] Derive CDI
1,500,969,992 UART: [art] Store in in slot 0x4
1,501,055,265 UART: [art] Derive Key Pair
1,501,055,625 UART: [art] Store priv key in slot 0x5
1,501,068,869 UART: [art] Derive Key Pair - Done
1,501,083,577 UART: [art] Signing Cert with AUTHO
1,501,084,057 UART: RITY.KEYID = 7
1,501,099,361 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,100,126 UART: [art] PUB.X = EE83BC250EBDE15AC4499134255EA789A58AFC005657BB4F6B1D7344B488804DAECF76F1CCF55BECC03D77FBDB783AF5
1,501,106,893 UART: [art] PUB.Y = 66C83BEF22517DEE066277A902774BB2621BA55CF14B3D8F7751726F2EC3EBAE7D4DC26893E4568DC05D1B55B8510020
1,501,113,819 UART: [art] SIG.R = AF2FCD62A265679C8D5AF3115F632555F49D129D2D9DF57876DBED7D464E5E0938A4968C35F239BA34C6466F812CD1FD
1,501,120,594 UART: [art] SIG.S = F118C4D74B8610D9B5AD27C418C3E895F8B226ABB7C668B03B8E8DF6490B35C4BFA3DB7B18298C4BCF8697A117007599
1,501,144,484 UART: Caliptra RT
1,501,144,829 UART: [state] CFI Enabled
1,501,425,895 UART: [rt] RT listening for mailbox commands...
1,501,426,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,503,861,348 >>> mbox cmd response: success
1,503,875,296 UART:
1,503,875,312 UART: Running Caliptra FMC ...
1,503,875,720 UART:
1,503,875,863 UART: [state] CFI Enabled
1,503,964,948 UART: [art] Extend RT PCRs Done
1,503,965,376 UART: [art] Lock RT PCRs Done
1,503,966,499 UART: [art] Populate DV Done
1,503,974,716 UART: [fht] FMC Alias Private Key: 7
1,503,975,722 UART: [art] Derive CDI
1,503,976,002 UART: [art] Store in in slot 0x4
1,504,061,681 UART: [art] Derive Key Pair
1,504,062,041 UART: [art] Store priv key in slot 0x5
1,504,075,843 UART: [art] Derive Key Pair - Done
1,504,090,197 UART: [art] Signing Cert with AUTHO
1,504,090,677 UART: RITY.KEYID = 7
1,504,105,945 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,106,710 UART: [art] PUB.X = 80ABDF3D208ABB78E911DD39E8714E6EC3AE5E16A7CAD0B04263381C51A05C33FBB628B87BFD814A3E1385FF13032AC1
1,504,113,493 UART: [art] PUB.Y = 7A71996602BF45630FE71EA6770BD7A0A87287390041DA8C4CF34DCD43E7D34C59256BAC7FAE7899B0B7FA9171F89D15
1,504,120,418 UART: [art] SIG.R = BEB3A28E5AC910D69633F467762971406AF1FB3E5356B304778252849E4D75601B6938B2635A83EC14B212E98B343E76
1,504,127,175 UART: [art] SIG.S = 2D62FAFEEFD19516C42FEEA4AC0DFF07D9CF8062A998CB69D354909228FB524CCF5EFFF95AEE9F4B00A32B9EFCA98F0F
1,504,150,921 UART: Caliptra RT
1,504,151,266 UART: [state] CFI Enabled
1,504,434,715 UART: [rt] RT listening for mailbox commands...
1,504,435,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,506,872,352 >>> mbox cmd response: success
1,506,885,522 UART:
1,506,885,538 UART: Running Caliptra FMC ...
1,506,885,946 UART:
1,506,886,089 UART: [state] CFI Enabled
1,506,975,468 UART: [art] Extend RT PCRs Done
1,506,975,896 UART: [art] Lock RT PCRs Done
1,506,977,157 UART: [art] Populate DV Done
1,506,985,348 UART: [fht] FMC Alias Private Key: 7
1,506,986,472 UART: [art] Derive CDI
1,506,986,752 UART: [art] Store in in slot 0x4
1,507,072,523 UART: [art] Derive Key Pair
1,507,072,883 UART: [art] Store priv key in slot 0x5
1,507,087,145 UART: [art] Derive Key Pair - Done
1,507,101,677 UART: [art] Signing Cert with AUTHO
1,507,102,157 UART: RITY.KEYID = 7
1,507,117,369 UART: [art] Erasing AUTHORITY.KEYID = 7
1,507,118,134 UART: [art] PUB.X = EE83BC250EBDE15AC4499134255EA789A58AFC005657BB4F6B1D7344B488804DAECF76F1CCF55BECC03D77FBDB783AF5
1,507,124,901 UART: [art] PUB.Y = 66C83BEF22517DEE066277A902774BB2621BA55CF14B3D8F7751726F2EC3EBAE7D4DC26893E4568DC05D1B55B8510020
1,507,131,827 UART: [art] SIG.R = AF2FCD62A265679C8D5AF3115F632555F49D129D2D9DF57876DBED7D464E5E0938A4968C35F239BA34C6466F812CD1FD
1,507,138,602 UART: [art] SIG.S = F118C4D74B8610D9B5AD27C418C3E895F8B226ABB7C668B03B8E8DF6490B35C4BFA3DB7B18298C4BCF8697A117007599
1,507,162,452 UART: Caliptra RT
1,507,162,797 UART: [state] CFI Enabled
1,507,447,815 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 311.96s
Truncated 1339531 bytes from beginning
[art] Populate DV Done
1,552,674,942 UART: [fht] FMC Alias Private Key: 7
1,552,675,878 UART: [art] Derive CDI
1,552,676,158 UART: [art] Store in in slot 0x4
1,552,761,093 UART: [art] Derive Key Pair
1,552,761,453 UART: [art] Store priv key in slot 0x5
1,552,774,573 UART: [art] Derive Key Pair - Done
1,552,789,497 UART: [art] Signing Cert with AUTHO
1,552,789,977 UART: RITY.KEYID = 7
1,552,805,299 UART: [art] Erasing AUTHORITY.KEYID = 7
1,552,806,064 UART: [art] PUB.X = 8C1E078838A5FD22CF9C5871B61B9729F1C36B8C93C3DC71759979D2E790D1419D47D80CC96631ED5587D94194ADA42D
1,552,812,828 UART: [art] PUB.Y = 28FCFB412470A3D976F87A1EB79C4605590D3AA7961DC813F4BAD162751F97DFDA28016D922B563B2550F85893F41B93
1,552,819,769 UART: [art] SIG.R = 63E5FF4CA4F5919B1269D2A6728FB89741FC3EB9FD430A2CC0F1BD0FB699A896B8CC53E1C2F32BB0EB58D11296E6A07C
1,552,826,551 UART: [art] SIG.S = EB68ED7816F563775F179D860A6373233F96A9F692D6A98434C2DCDA3144ED8FAE2E23140ABC6791667A6BA792A46622
1,552,850,686 UART: Caliptra RT
1,552,850,939 UART: [state] CFI Enabled
1,553,130,214 UART: [rt] RT listening for mailbox commands...
1,553,130,884 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,553,131,743 UART:
1,553,131,759 UART: Running Caliptra ROM ...
1,553,132,167 UART:
1,553,132,222 UART: [state] CFI Enabled
1,553,134,768 UART: [state] LifecycleState = Unprovisioned
1,553,135,423 UART: [state] DebugLocked = No
1,553,135,979 UART: [state] WD Timer not started. Device not locked for debugging
1,553,137,167 UART: [kat] SHA2-256
1,553,940,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,553,944,846 UART: [kat] ++
1,553,944,998 UART: [kat] sha1
1,553,949,264 UART: [kat] SHA2-256
1,553,951,204 UART: [kat] SHA2-384
1,553,954,043 UART: [kat] SHA2-512-ACC
1,553,955,943 UART: [kat] ECC-384
1,553,965,820 UART: [kat] HMAC-384Kdf
1,553,970,330 UART: [kat] LMS
1,554,218,642 UART: [kat] --
1,554,219,606 UART: [update-reset] ++
1,555,530,831 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,555,531,958 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,555,681,536 >>> mbox cmd response: success
1,555,681,773 UART: [update-reset] Copying MAN_2 To MAN_1
1,555,689,787 UART: [update-reset Success] --
1,555,690,630 UART: [state] Locking Datavault
1,555,691,294 UART: [state] Locking PCR0, PCR1 and PCR31
1,555,691,898 UART: [state] Locking ICCM
1,555,692,536 UART: [exit] Launching FMC @ 0x40000130
1,555,697,865 UART:
1,555,697,881 UART: Running Caliptra FMC ...
1,555,698,289 UART:
1,555,698,343 UART: [state] CFI Enabled
1,555,786,892 UART: [art] Extend RT PCRs Done
1,555,787,320 UART: [art] Lock RT PCRs Done
1,555,788,487 UART: [art] Populate DV Done
1,555,796,792 UART: [fht] FMC Alias Private Key: 7
1,555,797,856 UART: [art] Derive CDI
1,555,798,136 UART: [art] Store in in slot 0x4
1,555,883,873 UART: [art] Derive Key Pair
1,555,884,233 UART: [art] Store priv key in slot 0x5
1,555,897,453 UART: [art] Derive Key Pair - Done
1,555,912,470 UART: [art] Signing Cert with AUTHO
1,555,912,950 UART: RITY.KEYID = 7
1,555,928,010 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,928,775 UART: [art] PUB.X = D01AA26D06F22AEE8CCB6E1BE52EFAFE4DD57E237C8316677102761060B8E1505A30E2743AD01727ED20050FCEBB3C69
1,555,935,545 UART: [art] PUB.Y = E5EA9B2BCE2B439A8250FBB303E756EC9CE9EC81C176CD65A7F1ED508154C697113EEBDB704DA5F3187A23714D7D2D20
1,555,942,508 UART: [art] SIG.R = 8DC59D4569DDD1EC276968526CBB206C36DA478D5EFF86B04A3EAABFE30E1DD2F9B2FF6DAB3D4E262C98829730855899
1,555,949,291 UART: [art] SIG.S = B251212465B74A6B7FFD6E8346B805816BAA97BBFE7BFBB00A52EEACDAB3C7A53860F608B04C259EBDD4D1D18E4B9648
1,555,972,433 UART: Caliptra RT
1,555,972,686 UART: [state] CFI Enabled
1,556,256,926 UART: [rt] RT listening for mailbox commands...
1,556,257,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,556,258,371 UART:
1,556,258,387 UART: Running Caliptra ROM ...
1,556,258,795 UART:
1,556,258,850 UART: [state] CFI Enabled
1,556,261,178 UART: [state] LifecycleState = Unprovisioned
1,556,261,833 UART: [state] DebugLocked = No
1,556,262,507 UART: [state] WD Timer not started. Device not locked for debugging
1,556,263,689 UART: [kat] SHA2-256
1,557,067,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,557,071,368 UART: [kat] ++
1,557,071,520 UART: [kat] sha1
1,557,075,722 UART: [kat] SHA2-256
1,557,077,662 UART: [kat] SHA2-384
1,557,080,533 UART: [kat] SHA2-512-ACC
1,557,082,433 UART: [kat] ECC-384
1,557,092,040 UART: [kat] HMAC-384Kdf
1,557,096,698 UART: [kat] LMS
1,557,345,010 UART: [kat] --
1,557,345,882 UART: [update-reset] ++
1,558,656,975 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,558,658,048 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,558,807,626 >>> mbox cmd response: success
1,558,807,865 UART: [update-reset] Copying MAN_2 To MAN_1
1,558,815,879 UART: [update-reset Success] --
1,558,816,814 UART: [state] Locking Datavault
1,558,817,620 UART: [state] Locking PCR0, PCR1 and PCR31
1,558,818,224 UART: [state] Locking ICCM
1,558,818,658 UART: [exit] Launching FMC @ 0x40000130
1,558,823,987 UART:
1,558,824,003 UART: Running Caliptra FMC ...
1,558,824,411 UART:
1,558,824,465 UART: [state] CFI Enabled
1,558,913,124 UART: [art] Extend RT PCRs Done
1,558,913,552 UART: [art] Lock RT PCRs Done
1,558,914,651 UART: [art] Populate DV Done
1,558,922,648 UART: [fht] FMC Alias Private Key: 7
1,558,923,688 UART: [art] Derive CDI
1,558,923,968 UART: [art] Store in in slot 0x4
1,559,009,381 UART: [art] Derive Key Pair
1,559,009,741 UART: [art] Store priv key in slot 0x5
1,559,022,911 UART: [art] Derive Key Pair - Done
1,559,037,525 UART: [art] Signing Cert with AUTHO
1,559,038,005 UART: RITY.KEYID = 7
1,559,052,943 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,053,708 UART: [art] PUB.X = 8C1E078838A5FD22CF9C5871B61B9729F1C36B8C93C3DC71759979D2E790D1419D47D80CC96631ED5587D94194ADA42D
1,559,060,472 UART: [art] PUB.Y = 28FCFB412470A3D976F87A1EB79C4605590D3AA7961DC813F4BAD162751F97DFDA28016D922B563B2550F85893F41B93
1,559,067,413 UART: [art] SIG.R = 63E5FF4CA4F5919B1269D2A6728FB89741FC3EB9FD430A2CC0F1BD0FB699A896B8CC53E1C2F32BB0EB58D11296E6A07C
1,559,074,195 UART: [art] SIG.S = EB68ED7816F563775F179D860A6373233F96A9F692D6A98434C2DCDA3144ED8FAE2E23140ABC6791667A6BA792A46622
1,559,098,212 UART: Caliptra RT
1,559,098,465 UART: [state] CFI Enabled
1,559,375,612 UART: [rt] RT listening for mailbox commands...
1,559,376,282 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,377,111 UART:
1,559,377,127 UART: Running Caliptra ROM ...
1,559,377,535 UART:
1,559,377,590 UART: [state] CFI Enabled
1,559,380,336 UART: [state] LifecycleState = Unprovisioned
1,559,380,991 UART: [state] DebugLocked = No
1,559,381,589 UART: [state] WD Timer not started. Device not locked for debugging
1,559,382,867 UART: [kat] SHA2-256
1,560,186,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,560,190,546 UART: [kat] ++
1,560,190,698 UART: [kat] sha1
1,560,194,860 UART: [kat] SHA2-256
1,560,196,800 UART: [kat] SHA2-384
1,560,199,569 UART: [kat] SHA2-512-ACC
1,560,201,469 UART: [kat] ECC-384
1,560,211,552 UART: [kat] HMAC-384Kdf
1,560,215,986 UART: [kat] LMS
1,560,464,298 UART: [kat] --
1,560,464,920 UART: [update-reset] ++
1,561,774,131 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,561,775,246 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,561,924,824 >>> mbox cmd response: success
1,561,925,013 UART: [update-reset] Copying MAN_2 To MAN_1
1,561,933,027 UART: [update-reset Success] --
1,561,934,036 UART: [state] Locking Datavault
1,561,934,680 UART: [state] Locking PCR0, PCR1 and PCR31
1,561,935,284 UART: [state] Locking ICCM
1,561,935,938 UART: [exit] Launching FMC @ 0x40000130
1,561,941,267 UART:
1,561,941,283 UART: Running Caliptra FMC ...
1,561,941,691 UART:
1,561,941,745 UART: [state] CFI Enabled
1,562,030,914 UART: [art] Extend RT PCRs Done
1,562,031,342 UART: [art] Lock RT PCRs Done
1,562,032,855 UART: [art] Populate DV Done
1,562,041,096 UART: [fht] FMC Alias Private Key: 7
1,562,042,230 UART: [art] Derive CDI
1,562,042,510 UART: [art] Store in in slot 0x4
1,562,128,011 UART: [art] Derive Key Pair
1,562,128,371 UART: [art] Store priv key in slot 0x5
1,562,141,649 UART: [art] Derive Key Pair - Done
1,562,156,536 UART: [art] Signing Cert with AUTHO
1,562,157,016 UART: RITY.KEYID = 7
1,562,171,878 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,172,643 UART: [art] PUB.X = D01AA26D06F22AEE8CCB6E1BE52EFAFE4DD57E237C8316677102761060B8E1505A30E2743AD01727ED20050FCEBB3C69
1,562,179,413 UART: [art] PUB.Y = E5EA9B2BCE2B439A8250FBB303E756EC9CE9EC81C176CD65A7F1ED508154C697113EEBDB704DA5F3187A23714D7D2D20
1,562,186,376 UART: [art] SIG.R = 8DC59D4569DDD1EC276968526CBB206C36DA478D5EFF86B04A3EAABFE30E1DD2F9B2FF6DAB3D4E262C98829730855899
1,562,193,159 UART: [art] SIG.S = B251212465B74A6B7FFD6E8346B805816BAA97BBFE7BFBB00A52EEACDAB3C7A53860F608B04C259EBDD4D1D18E4B9648
1,562,216,995 UART: Caliptra RT
1,562,217,248 UART: [state] CFI Enabled
1,562,495,520 UART: [rt] RT listening for mailbox commands...
1,562,496,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,562,497,269 UART:
1,562,497,285 UART: Running Caliptra ROM ...
1,562,497,693 UART:
1,562,497,748 UART: [state] CFI Enabled
1,562,500,494 UART: [state] LifecycleState = Unprovisioned
1,562,501,149 UART: [state] DebugLocked = No
1,562,501,759 UART: [state] WD Timer not started. Device not locked for debugging
1,562,503,001 UART: [kat] SHA2-256
1,563,306,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,563,310,680 UART: [kat] ++
1,563,310,832 UART: [kat] sha1
1,563,315,108 UART: [kat] SHA2-256
1,563,317,048 UART: [kat] SHA2-384
1,563,319,611 UART: [kat] SHA2-512-ACC
1,563,321,511 UART: [kat] ECC-384
1,563,331,152 UART: [kat] HMAC-384Kdf
1,563,335,796 UART: [kat] LMS
1,563,584,108 UART: [kat] --
1,563,585,064 UART: [update-reset] ++
1,564,896,773 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,564,897,984 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,565,047,562 >>> mbox cmd response: success
1,565,047,917 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,055,931 UART: [update-reset Success] --
1,565,057,052 UART: [state] Locking Datavault
1,565,057,962 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,058,566 UART: [state] Locking ICCM
1,565,059,130 UART: [exit] Launching FMC @ 0x40000130
1,565,064,459 UART:
1,565,064,475 UART: Running Caliptra FMC ...
1,565,064,883 UART:
1,565,064,937 UART: [state] CFI Enabled
1,565,154,188 UART: [art] Extend RT PCRs Done
1,565,154,616 UART: [art] Lock RT PCRs Done
1,565,155,735 UART: [art] Populate DV Done
1,565,164,114 UART: [fht] FMC Alias Private Key: 7
1,565,165,116 UART: [art] Derive CDI
1,565,165,396 UART: [art] Store in in slot 0x4
1,565,251,225 UART: [art] Derive Key Pair
1,565,251,585 UART: [art] Store priv key in slot 0x5
1,565,264,631 UART: [art] Derive Key Pair - Done
1,565,279,383 UART: [art] Signing Cert with AUTHO
1,565,279,863 UART: RITY.KEYID = 7
1,565,295,221 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,295,986 UART: [art] PUB.X = 8C1E078838A5FD22CF9C5871B61B9729F1C36B8C93C3DC71759979D2E790D1419D47D80CC96631ED5587D94194ADA42D
1,565,302,750 UART: [art] PUB.Y = 28FCFB412470A3D976F87A1EB79C4605590D3AA7961DC813F4BAD162751F97DFDA28016D922B563B2550F85893F41B93
1,565,309,691 UART: [art] SIG.R = 63E5FF4CA4F5919B1269D2A6728FB89741FC3EB9FD430A2CC0F1BD0FB699A896B8CC53E1C2F32BB0EB58D11296E6A07C
1,565,316,473 UART: [art] SIG.S = EB68ED7816F563775F179D860A6373233F96A9F692D6A98434C2DCDA3144ED8FAE2E23140ABC6791667A6BA792A46622
1,565,340,300 UART: Caliptra RT
1,565,340,553 UART: [state] CFI Enabled
1,565,623,124 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 317.30s
Truncated 733306 bytes from beginning
2 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,482,975,297 >>> mbox cmd response: success
1,482,988,765 UART:
1,482,988,781 UART: Running Caliptra FMC ...
1,482,989,189 UART:
1,482,989,243 UART: [state] CFI Enabled
1,483,078,318 UART: [art] Extend RT PCRs Done
1,483,078,746 UART: [art] Lock RT PCRs Done
1,483,079,845 UART: [art] Populate DV Done
1,483,087,988 UART: [fht] FMC Alias Private Key: 7
1,483,088,956 UART: [art] Derive CDI
1,483,089,236 UART: [art] Store in in slot 0x4
1,483,174,853 UART: [art] Derive Key Pair
1,483,175,213 UART: [art] Store priv key in slot 0x5
1,483,188,447 UART: [art] Derive Key Pair - Done
1,483,203,184 UART: [art] Signing Cert with AUTHO
1,483,203,664 UART: RITY.KEYID = 7
1,483,218,804 UART: [art] Erasing AUTHORITY.KEYID = 7
1,483,219,569 UART: [art] PUB.X = 7543D798949F8B15E75463A7CF95D4C6D0F016D73C37711B64399A7A5E2CCE016CAA201F2F0AF1BCD22FE9C83140ACA6
1,483,226,343 UART: [art] PUB.Y = B9B51545FB639CDEA5D046125A00A5D730FF562A307176E196DC4C5CC60C3B77A17358B9F82B0775FB433F5F8606637A
1,483,233,264 UART: [art] SIG.R = 78E88C8811F2026F0A26EAF3957791821A9B9CAE9308FD8756170BCE245282D7C85A1E286D40584DC0DB21737661821E
1,483,240,016 UART: [art] SIG.S = BFFB0B6CD987901D6FDC403CE912FFEFFF4C0F91767EA66E1D81380C159778EFE6F2F484662395909AC77298DADD5908
1,483,264,173 UART: Caliptra RT
1,483,264,426 UART: [state] CFI Enabled
1,483,544,721 UART: [rt] RT listening for mailbox commands...
1,483,545,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,485,977,898 >>> mbox cmd response: success
1,485,990,992 UART:
1,485,991,008 UART: Running Caliptra FMC ...
1,485,991,416 UART:
1,485,991,470 UART: [state] CFI Enabled
1,486,080,085 UART: [art] Extend RT PCRs Done
1,486,080,513 UART: [art] Lock RT PCRs Done
1,486,081,904 UART: [art] Populate DV Done
1,486,090,331 UART: [fht] FMC Alias Private Key: 7
1,486,091,371 UART: [art] Derive CDI
1,486,091,651 UART: [art] Store in in slot 0x4
1,486,177,118 UART: [art] Derive Key Pair
1,486,177,478 UART: [art] Store priv key in slot 0x5
1,486,190,588 UART: [art] Derive Key Pair - Done
1,486,205,084 UART: [art] Signing Cert with AUTHO
1,486,205,564 UART: RITY.KEYID = 7
1,486,220,920 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,221,685 UART: [art] PUB.X = 3AAAC855EB9BD0318CC26346797C49E974168645ED48283182297D67C51267CC9B2AA35211E52F3177DA454A506BB26D
1,486,228,451 UART: [art] PUB.Y = 9479BC696022FDCB0A905F57A8F0F70E7FAC0EE6767D1C9D8BAFC25BD4D85ADCF2B41C006D53639B396EDD3390106DD0
1,486,235,388 UART: [art] SIG.R = 0472C5CC3A8D81A725025E7512659F578211915AF61A0B2126C9B50F5E45FA591748CDAF3B9491459D85CFA319AC485C
1,486,242,144 UART: [art] SIG.S = 7990EEC2FFB31FD72BC95C05121698EC3C7ADE3E54D3763DD2E3CB330ED1CB336010B850219CA7CFFD6F44FF6C46A5CC
1,486,265,355 UART: Caliptra RT
1,486,265,608 UART: [state] CFI Enabled
1,486,545,383 UART: [rt] RT listening for mailbox commands...
1,486,546,053 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,488,978,098 >>> mbox cmd response: success
1,488,991,612 UART:
1,488,991,628 UART: Running Caliptra FMC ...
1,488,992,036 UART:
1,488,992,090 UART: [state] CFI Enabled
1,489,080,983 UART: [art] Extend RT PCRs Done
1,489,081,411 UART: [art] Lock RT PCRs Done
1,489,082,598 UART: [art] Populate DV Done
1,489,091,079 UART: [fht] FMC Alias Private Key: 7
1,489,092,235 UART: [art] Derive CDI
1,489,092,515 UART: [art] Store in in slot 0x4
1,489,178,012 UART: [art] Derive Key Pair
1,489,178,372 UART: [art] Store priv key in slot 0x5
1,489,192,240 UART: [art] Derive Key Pair - Done
1,489,206,973 UART: [art] Signing Cert with AUTHO
1,489,207,453 UART: RITY.KEYID = 7
1,489,222,173 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,222,938 UART: [art] PUB.X = 7543D798949F8B15E75463A7CF95D4C6D0F016D73C37711B64399A7A5E2CCE016CAA201F2F0AF1BCD22FE9C83140ACA6
1,489,229,712 UART: [art] PUB.Y = B9B51545FB639CDEA5D046125A00A5D730FF562A307176E196DC4C5CC60C3B77A17358B9F82B0775FB433F5F8606637A
1,489,236,633 UART: [art] SIG.R = 78E88C8811F2026F0A26EAF3957791821A9B9CAE9308FD8756170BCE245282D7C85A1E286D40584DC0DB21737661821E
1,489,243,385 UART: [art] SIG.S = BFFB0B6CD987901D6FDC403CE912FFEFFF4C0F91767EA66E1D81380C159778EFE6F2F484662395909AC77298DADD5908
1,489,267,218 UART: Caliptra RT
1,489,267,471 UART: [state] CFI Enabled
1,489,551,514 UART: [rt] RT listening for mailbox commands...
1,489,552,184 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,491,985,313 >>> mbox cmd response: success
1,491,998,877 UART:
1,491,998,893 UART: Running Caliptra FMC ...
1,491,999,301 UART:
1,491,999,355 UART: [state] CFI Enabled
1,492,088,296 UART: [art] Extend RT PCRs Done
1,492,088,724 UART: [art] Lock RT PCRs Done
1,492,089,831 UART: [art] Populate DV Done
1,492,098,102 UART: [fht] FMC Alias Private Key: 7
1,492,099,088 UART: [art] Derive CDI
1,492,099,368 UART: [art] Store in in slot 0x4
1,492,184,731 UART: [art] Derive Key Pair
1,492,185,091 UART: [art] Store priv key in slot 0x5
1,492,198,799 UART: [art] Derive Key Pair - Done
1,492,213,279 UART: [art] Signing Cert with AUTHO
1,492,213,759 UART: RITY.KEYID = 7
1,492,229,013 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,229,778 UART: [art] PUB.X = 3AAAC855EB9BD0318CC26346797C49E974168645ED48283182297D67C51267CC9B2AA35211E52F3177DA454A506BB26D
1,492,236,544 UART: [art] PUB.Y = 9479BC696022FDCB0A905F57A8F0F70E7FAC0EE6767D1C9D8BAFC25BD4D85ADCF2B41C006D53639B396EDD3390106DD0
1,492,243,481 UART: [art] SIG.R = 0472C5CC3A8D81A725025E7512659F578211915AF61A0B2126C9B50F5E45FA591748CDAF3B9491459D85CFA319AC485C
1,492,250,237 UART: [art] SIG.S = 7990EEC2FFB31FD72BC95C05121698EC3C7ADE3E54D3763DD2E3CB330ED1CB336010B850219CA7CFFD6F44FF6C46A5CC
1,492,273,838 UART: Caliptra RT
1,492,274,091 UART: [state] CFI Enabled
1,492,558,454 UART: [rt] RT listening for mailbox commands...
1,492,559,124 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,494,991,411 >>> mbox cmd response: success
1,495,004,965 UART:
1,495,004,981 UART: Running Caliptra FMC ...
1,495,005,389 UART:
1,495,005,443 UART: [state] CFI Enabled
1,495,094,478 UART: [art] Extend RT PCRs Done
1,495,094,906 UART: [art] Lock RT PCRs Done
1,495,096,227 UART: [art] Populate DV Done
1,495,104,490 UART: [fht] FMC Alias Private Key: 7
1,495,105,602 UART: [art] Derive CDI
1,495,105,882 UART: [art] Store in in slot 0x4
1,495,191,275 UART: [art] Derive Key Pair
1,495,191,635 UART: [art] Store priv key in slot 0x5
1,495,204,893 UART: [art] Derive Key Pair - Done
1,495,219,594 UART: [art] Signing Cert with AUTHO
1,495,220,074 UART: RITY.KEYID = 7
1,495,235,474 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,236,239 UART: [art] PUB.X = 7543D798949F8B15E75463A7CF95D4C6D0F016D73C37711B64399A7A5E2CCE016CAA201F2F0AF1BCD22FE9C83140ACA6
1,495,243,013 UART: [art] PUB.Y = B9B51545FB639CDEA5D046125A00A5D730FF562A307176E196DC4C5CC60C3B77A17358B9F82B0775FB433F5F8606637A
1,495,249,934 UART: [art] SIG.R = 78E88C8811F2026F0A26EAF3957791821A9B9CAE9308FD8756170BCE245282D7C85A1E286D40584DC0DB21737661821E
1,495,256,686 UART: [art] SIG.S = BFFB0B6CD987901D6FDC403CE912FFEFFF4C0F91767EA66E1D81380C159778EFE6F2F484662395909AC77298DADD5908
1,495,280,879 UART: Caliptra RT
1,495,281,132 UART: [state] CFI Enabled
1,495,562,877 UART: [rt] RT listening for mailbox commands...
1,495,563,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,497,994,774 >>> mbox cmd response: success
1,498,008,064 UART:
1,498,008,080 UART: Running Caliptra FMC ...
1,498,008,488 UART:
1,498,008,542 UART: [state] CFI Enabled
1,498,097,197 UART: [art] Extend RT PCRs Done
1,498,097,625 UART: [art] Lock RT PCRs Done
1,498,099,136 UART: [art] Populate DV Done
1,498,107,509 UART: [fht] FMC Alias Private Key: 7
1,498,108,465 UART: [art] Derive CDI
1,498,108,745 UART: [art] Store in in slot 0x4
1,498,194,390 UART: [art] Derive Key Pair
1,498,194,750 UART: [art] Store priv key in slot 0x5
1,498,208,496 UART: [art] Derive Key Pair - Done
1,498,223,056 UART: [art] Signing Cert with AUTHO
1,498,223,536 UART: RITY.KEYID = 7
1,498,238,696 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,239,461 UART: [art] PUB.X = 3AAAC855EB9BD0318CC26346797C49E974168645ED48283182297D67C51267CC9B2AA35211E52F3177DA454A506BB26D
1,498,246,227 UART: [art] PUB.Y = 9479BC696022FDCB0A905F57A8F0F70E7FAC0EE6767D1C9D8BAFC25BD4D85ADCF2B41C006D53639B396EDD3390106DD0
1,498,253,164 UART: [art] SIG.R = 0472C5CC3A8D81A725025E7512659F578211915AF61A0B2126C9B50F5E45FA591748CDAF3B9491459D85CFA319AC485C
1,498,259,920 UART: [art] SIG.S = 7990EEC2FFB31FD72BC95C05121698EC3C7ADE3E54D3763DD2E3CB330ED1CB336010B850219CA7CFFD6F44FF6C46A5CC
1,498,283,995 UART: Caliptra RT
1,498,284,248 UART: [state] CFI Enabled
1,498,565,771 UART: [rt] RT listening for mailbox commands...
1,498,566,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,500,997,596 >>> mbox cmd response: success
1,501,010,942 UART:
1,501,010,958 UART: Running Caliptra FMC ...
1,501,011,366 UART:
1,501,011,420 UART: [state] CFI Enabled
1,501,100,847 UART: [art] Extend RT PCRs Done
1,501,101,275 UART: [art] Lock RT PCRs Done
1,501,102,690 UART: [art] Populate DV Done
1,501,111,085 UART: [fht] FMC Alias Private Key: 7
1,501,112,047 UART: [art] Derive CDI
1,501,112,327 UART: [art] Store in in slot 0x4
1,501,197,950 UART: [art] Derive Key Pair
1,501,198,310 UART: [art] Store priv key in slot 0x5
1,501,211,306 UART: [art] Derive Key Pair - Done
1,501,226,099 UART: [art] Signing Cert with AUTHO
1,501,226,579 UART: RITY.KEYID = 7
1,501,241,939 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,242,704 UART: [art] PUB.X = 7543D798949F8B15E75463A7CF95D4C6D0F016D73C37711B64399A7A5E2CCE016CAA201F2F0AF1BCD22FE9C83140ACA6
1,501,249,478 UART: [art] PUB.Y = B9B51545FB639CDEA5D046125A00A5D730FF562A307176E196DC4C5CC60C3B77A17358B9F82B0775FB433F5F8606637A
1,501,256,399 UART: [art] SIG.R = 78E88C8811F2026F0A26EAF3957791821A9B9CAE9308FD8756170BCE245282D7C85A1E286D40584DC0DB21737661821E
1,501,263,151 UART: [art] SIG.S = BFFB0B6CD987901D6FDC403CE912FFEFFF4C0F91767EA66E1D81380C159778EFE6F2F484662395909AC77298DADD5908
1,501,286,882 UART: Caliptra RT
1,501,287,135 UART: [state] CFI Enabled
1,501,570,460 UART: [rt] RT listening for mailbox commands...
1,501,571,130 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,001,925 >>> mbox cmd response: success
1,504,015,119 UART:
1,504,015,135 UART: Running Caliptra FMC ...
1,504,015,543 UART:
1,504,015,597 UART: [state] CFI Enabled
1,504,104,726 UART: [art] Extend RT PCRs Done
1,504,105,154 UART: [art] Lock RT PCRs Done
1,504,106,323 UART: [art] Populate DV Done
1,504,114,442 UART: [fht] FMC Alias Private Key: 7
1,504,115,530 UART: [art] Derive CDI
1,504,115,810 UART: [art] Store in in slot 0x4
1,504,201,387 UART: [art] Derive Key Pair
1,504,201,747 UART: [art] Store priv key in slot 0x5
1,504,214,861 UART: [art] Derive Key Pair - Done
1,504,229,557 UART: [art] Signing Cert with AUTHO
1,504,230,037 UART: RITY.KEYID = 7
1,504,244,809 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,245,574 UART: [art] PUB.X = 3AAAC855EB9BD0318CC26346797C49E974168645ED48283182297D67C51267CC9B2AA35211E52F3177DA454A506BB26D
1,504,252,340 UART: [art] PUB.Y = 9479BC696022FDCB0A905F57A8F0F70E7FAC0EE6767D1C9D8BAFC25BD4D85ADCF2B41C006D53639B396EDD3390106DD0
1,504,259,277 UART: [art] SIG.R = 0472C5CC3A8D81A725025E7512659F578211915AF61A0B2126C9B50F5E45FA591748CDAF3B9491459D85CFA319AC485C
1,504,266,033 UART: [art] SIG.S = 7990EEC2FFB31FD72BC95C05121698EC3C7ADE3E54D3763DD2E3CB330ED1CB336010B850219CA7CFFD6F44FF6C46A5CC
1,504,290,102 UART: Caliptra RT
1,504,290,355 UART: [state] CFI Enabled
1,504,570,364 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 305.25s
Truncated 1339555 bytes from beginning
[art] Populate DV Done
1,553,268,592 UART: [fht] FMC Alias Private Key: 7
1,553,269,686 UART: [art] Derive CDI
1,553,269,966 UART: [art] Store in in slot 0x4
1,553,355,707 UART: [art] Derive Key Pair
1,553,356,067 UART: [art] Store priv key in slot 0x5
1,553,368,887 UART: [art] Derive Key Pair - Done
1,553,383,498 UART: [art] Signing Cert with AUTHO
1,553,383,978 UART: RITY.KEYID = 7
1,553,399,326 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,400,091 UART: [art] PUB.X = 5FBAAFE53D146C48DEDC06D562A1B25B45915C0FB17A2B2210FBE88898A39E75BEFEC297A703C7EFE40A99A3DEDA062A
1,553,406,870 UART: [art] PUB.Y = F29B55833BEBD922418089E51A6A45DE11318DDBDA3807D991248DC2844A2774ECC311A183241FEBAAF0104522FCFF1D
1,553,413,825 UART: [art] SIG.R = C7B83CB1AC22DE93CD22DF34EC88BC98CE86EB129DE092322B3FCB297F17ABC6FF9E66A739F9D72B77C2314EEF392C7C
1,553,420,619 UART: [art] SIG.S = 538308EF4E785D2B50D8380CEC0E924B06B3F9166B623FBF291A7C6C569B9F5EB8EE74B5E522F6BBC82B9E8DAE729F92
1,553,444,548 UART: Caliptra RT
1,553,444,893 UART: [state] CFI Enabled
1,553,724,558 UART: [rt] RT listening for mailbox commands...
1,553,725,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,553,726,019 UART:
1,553,726,035 UART: Running Caliptra ROM ...
1,553,726,443 UART:
1,553,726,585 UART: [state] CFI Enabled
1,553,729,007 UART: [state] LifecycleState = Unprovisioned
1,553,729,662 UART: [state] DebugLocked = No
1,553,730,284 UART: [state] WD Timer not started. Device not locked for debugging
1,553,731,606 UART: [kat] SHA2-256
1,554,535,156 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,554,539,285 UART: [kat] ++
1,554,539,437 UART: [kat] sha1
1,554,543,665 UART: [kat] SHA2-256
1,554,545,605 UART: [kat] SHA2-384
1,554,548,456 UART: [kat] SHA2-512-ACC
1,554,550,356 UART: [kat] ECC-384
1,554,560,223 UART: [kat] HMAC-384Kdf
1,554,564,881 UART: [kat] LMS
1,554,813,193 UART: [kat] --
1,554,813,909 UART: [update-reset] ++
1,556,124,790 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,556,125,891 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,556,275,469 >>> mbox cmd response: success
1,556,275,734 UART: [update-reset] Copying MAN_2 To MAN_1
1,556,283,748 UART: [update-reset Success] --
1,556,284,749 UART: [state] Locking Datavault
1,556,285,419 UART: [state] Locking PCR0, PCR1 and PCR31
1,556,286,023 UART: [state] Locking ICCM
1,556,286,581 UART: [exit] Launching FMC @ 0x40000130
1,556,291,910 UART:
1,556,291,926 UART: Running Caliptra FMC ...
1,556,292,334 UART:
1,556,292,477 UART: [state] CFI Enabled
1,556,381,538 UART: [art] Extend RT PCRs Done
1,556,381,966 UART: [art] Lock RT PCRs Done
1,556,383,075 UART: [art] Populate DV Done
1,556,391,372 UART: [fht] FMC Alias Private Key: 7
1,556,392,382 UART: [art] Derive CDI
1,556,392,662 UART: [art] Store in in slot 0x4
1,556,478,425 UART: [art] Derive Key Pair
1,556,478,785 UART: [art] Store priv key in slot 0x5
1,556,492,301 UART: [art] Derive Key Pair - Done
1,556,506,750 UART: [art] Signing Cert with AUTHO
1,556,507,230 UART: RITY.KEYID = 7
1,556,522,656 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,523,421 UART: [art] PUB.X = 8ADF3A0AC3D4B25C41954E928E7DCBC84E6D26938F9257131DE5FDAC96CB2622E426AEEC57BD587D647FF63B205DC388
1,556,530,204 UART: [art] PUB.Y = 52E592934E9A856E376B3E831CEB24BCD6A0D8B4B274B560A7BCC35C066B23BBCD6648E92A997A3D2437DCC1A51264FD
1,556,537,163 UART: [art] SIG.R = 66AF53495D2BFA54E3ABDDDA242250E89617D7A0A38ADCF118795B38DA496EB69EAA17A03695BC3DDB3FBD61E2A52028
1,556,543,951 UART: [art] SIG.S = BF2BE6B60BC8D6A461B53010F1023F592FDD32AC393B7B7BA75DA8508653FEBF25AEAFC8EA023BEED63CA98DC956F35F
1,556,567,133 UART: Caliptra RT
1,556,567,478 UART: [state] CFI Enabled
1,556,851,415 UART: [rt] RT listening for mailbox commands...
1,556,852,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,556,852,842 UART:
1,556,852,858 UART: Running Caliptra ROM ...
1,556,853,266 UART:
1,556,853,408 UART: [state] CFI Enabled
1,556,856,338 UART: [state] LifecycleState = Unprovisioned
1,556,856,993 UART: [state] DebugLocked = No
1,556,857,629 UART: [state] WD Timer not started. Device not locked for debugging
1,556,858,873 UART: [kat] SHA2-256
1,557,662,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,557,666,552 UART: [kat] ++
1,557,666,704 UART: [kat] sha1
1,557,671,088 UART: [kat] SHA2-256
1,557,673,028 UART: [kat] SHA2-384
1,557,675,761 UART: [kat] SHA2-512-ACC
1,557,677,661 UART: [kat] ECC-384
1,557,687,200 UART: [kat] HMAC-384Kdf
1,557,691,858 UART: [kat] LMS
1,557,940,170 UART: [kat] --
1,557,940,992 UART: [update-reset] ++
1,559,251,519 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,559,252,546 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,559,402,124 >>> mbox cmd response: success
1,559,402,229 UART: [update-reset] Copying MAN_2 To MAN_1
1,559,410,243 UART: [update-reset Success] --
1,559,411,022 UART: [state] Locking Datavault
1,559,411,988 UART: [state] Locking PCR0, PCR1 and PCR31
1,559,412,592 UART: [state] Locking ICCM
1,559,413,130 UART: [exit] Launching FMC @ 0x40000130
1,559,418,459 UART:
1,559,418,475 UART: Running Caliptra FMC ...
1,559,418,883 UART:
1,559,419,026 UART: [state] CFI Enabled
1,559,507,921 UART: [art] Extend RT PCRs Done
1,559,508,349 UART: [art] Lock RT PCRs Done
1,559,509,680 UART: [art] Populate DV Done
1,559,517,905 UART: [fht] FMC Alias Private Key: 7
1,559,519,021 UART: [art] Derive CDI
1,559,519,301 UART: [art] Store in in slot 0x4
1,559,604,730 UART: [art] Derive Key Pair
1,559,605,090 UART: [art] Store priv key in slot 0x5
1,559,618,036 UART: [art] Derive Key Pair - Done
1,559,632,587 UART: [art] Signing Cert with AUTHO
1,559,633,067 UART: RITY.KEYID = 7
1,559,648,385 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,649,150 UART: [art] PUB.X = 5FBAAFE53D146C48DEDC06D562A1B25B45915C0FB17A2B2210FBE88898A39E75BEFEC297A703C7EFE40A99A3DEDA062A
1,559,655,929 UART: [art] PUB.Y = F29B55833BEBD922418089E51A6A45DE11318DDBDA3807D991248DC2844A2774ECC311A183241FEBAAF0104522FCFF1D
1,559,662,884 UART: [art] SIG.R = C7B83CB1AC22DE93CD22DF34EC88BC98CE86EB129DE092322B3FCB297F17ABC6FF9E66A739F9D72B77C2314EEF392C7C
1,559,669,678 UART: [art] SIG.S = 538308EF4E785D2B50D8380CEC0E924B06B3F9166B623FBF291A7C6C569B9F5EB8EE74B5E522F6BBC82B9E8DAE729F92
1,559,693,265 UART: Caliptra RT
1,559,693,610 UART: [state] CFI Enabled
1,559,972,579 UART: [rt] RT listening for mailbox commands...
1,559,973,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,559,974,228 UART:
1,559,974,244 UART: Running Caliptra ROM ...
1,559,974,652 UART:
1,559,974,794 UART: [state] CFI Enabled
1,559,977,310 UART: [state] LifecycleState = Unprovisioned
1,559,977,965 UART: [state] DebugLocked = No
1,559,978,627 UART: [state] WD Timer not started. Device not locked for debugging
1,559,979,961 UART: [kat] SHA2-256
1,560,783,511 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,560,787,640 UART: [kat] ++
1,560,787,792 UART: [kat] sha1
1,560,791,838 UART: [kat] SHA2-256
1,560,793,778 UART: [kat] SHA2-384
1,560,796,433 UART: [kat] SHA2-512-ACC
1,560,798,333 UART: [kat] ECC-384
1,560,807,530 UART: [kat] HMAC-384Kdf
1,560,812,176 UART: [kat] LMS
1,561,060,488 UART: [kat] --
1,561,061,276 UART: [update-reset] ++
1,562,370,659 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,562,371,664 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,562,521,242 >>> mbox cmd response: success
1,562,521,451 UART: [update-reset] Copying MAN_2 To MAN_1
1,562,529,465 UART: [update-reset Success] --
1,562,530,420 UART: [state] Locking Datavault
1,562,531,160 UART: [state] Locking PCR0, PCR1 and PCR31
1,562,531,764 UART: [state] Locking ICCM
1,562,532,360 UART: [exit] Launching FMC @ 0x40000130
1,562,537,689 UART:
1,562,537,705 UART: Running Caliptra FMC ...
1,562,538,113 UART:
1,562,538,256 UART: [state] CFI Enabled
1,562,627,483 UART: [art] Extend RT PCRs Done
1,562,627,911 UART: [art] Lock RT PCRs Done
1,562,629,182 UART: [art] Populate DV Done
1,562,637,263 UART: [fht] FMC Alias Private Key: 7
1,562,638,217 UART: [art] Derive CDI
1,562,638,497 UART: [art] Store in in slot 0x4
1,562,723,892 UART: [art] Derive Key Pair
1,562,724,252 UART: [art] Store priv key in slot 0x5
1,562,737,278 UART: [art] Derive Key Pair - Done
1,562,752,239 UART: [art] Signing Cert with AUTHO
1,562,752,719 UART: RITY.KEYID = 7
1,562,768,137 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,768,902 UART: [art] PUB.X = 8ADF3A0AC3D4B25C41954E928E7DCBC84E6D26938F9257131DE5FDAC96CB2622E426AEEC57BD587D647FF63B205DC388
1,562,775,685 UART: [art] PUB.Y = 52E592934E9A856E376B3E831CEB24BCD6A0D8B4B274B560A7BCC35C066B23BBCD6648E92A997A3D2437DCC1A51264FD
1,562,782,644 UART: [art] SIG.R = 66AF53495D2BFA54E3ABDDDA242250E89617D7A0A38ADCF118795B38DA496EB69EAA17A03695BC3DDB3FBD61E2A52028
1,562,789,432 UART: [art] SIG.S = BF2BE6B60BC8D6A461B53010F1023F592FDD32AC393B7B7BA75DA8508653FEBF25AEAFC8EA023BEED63CA98DC956F35F
1,562,814,024 UART: Caliptra RT
1,562,814,369 UART: [state] CFI Enabled
1,563,094,698 UART: [rt] RT listening for mailbox commands...
1,563,095,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,563,096,181 UART:
1,563,096,197 UART: Running Caliptra ROM ...
1,563,096,605 UART:
1,563,096,747 UART: [state] CFI Enabled
1,563,099,515 UART: [state] LifecycleState = Unprovisioned
1,563,100,170 UART: [state] DebugLocked = No
1,563,100,722 UART: [state] WD Timer not started. Device not locked for debugging
1,563,101,878 UART: [kat] SHA2-256
1,563,905,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,563,909,557 UART: [kat] ++
1,563,909,709 UART: [kat] sha1
1,563,914,069 UART: [kat] SHA2-256
1,563,916,009 UART: [kat] SHA2-384
1,563,918,724 UART: [kat] SHA2-512-ACC
1,563,920,624 UART: [kat] ECC-384
1,563,930,133 UART: [kat] HMAC-384Kdf
1,563,934,773 UART: [kat] LMS
1,564,183,085 UART: [kat] --
1,564,183,771 UART: [update-reset] ++
1,565,493,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,565,494,955 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
1,565,644,533 >>> mbox cmd response: success
1,565,644,636 UART: [update-reset] Copying MAN_2 To MAN_1
1,565,652,650 UART: [update-reset Success] --
1,565,653,607 UART: [state] Locking Datavault
1,565,654,339 UART: [state] Locking PCR0, PCR1 and PCR31
1,565,654,943 UART: [state] Locking ICCM
1,565,655,453 UART: [exit] Launching FMC @ 0x40000130
1,565,660,782 UART:
1,565,660,798 UART: Running Caliptra FMC ...
1,565,661,206 UART:
1,565,661,349 UART: [state] CFI Enabled
1,565,750,408 UART: [art] Extend RT PCRs Done
1,565,750,836 UART: [art] Lock RT PCRs Done
1,565,752,059 UART: [art] Populate DV Done
1,565,760,324 UART: [fht] FMC Alias Private Key: 7
1,565,761,288 UART: [art] Derive CDI
1,565,761,568 UART: [art] Store in in slot 0x4
1,565,847,061 UART: [art] Derive Key Pair
1,565,847,421 UART: [art] Store priv key in slot 0x5
1,565,860,819 UART: [art] Derive Key Pair - Done
1,565,875,962 UART: [art] Signing Cert with AUTHO
1,565,876,442 UART: RITY.KEYID = 7
1,565,891,872 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,892,637 UART: [art] PUB.X = 5FBAAFE53D146C48DEDC06D562A1B25B45915C0FB17A2B2210FBE88898A39E75BEFEC297A703C7EFE40A99A3DEDA062A
1,565,899,416 UART: [art] PUB.Y = F29B55833BEBD922418089E51A6A45DE11318DDBDA3807D991248DC2844A2774ECC311A183241FEBAAF0104522FCFF1D
1,565,906,371 UART: [art] SIG.R = C7B83CB1AC22DE93CD22DF34EC88BC98CE86EB129DE092322B3FCB297F17ABC6FF9E66A739F9D72B77C2314EEF392C7C
1,565,913,165 UART: [art] SIG.S = 538308EF4E785D2B50D8380CEC0E924B06B3F9166B623FBF291A7C6C569B9F5EB8EE74B5E522F6BBC82B9E8DAE729F92
1,565,937,130 UART: Caliptra RT
1,565,937,475 UART: [state] CFI Enabled
1,566,215,710 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 322.39s
Truncated 733342 bytes from beginning
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,483,580,633 >>> mbox cmd response: success
1,483,594,547 UART:
1,483,594,563 UART: Running Caliptra FMC ...
1,483,594,971 UART:
1,483,595,114 UART: [state] CFI Enabled
1,483,684,851 UART: [art] Extend RT PCRs Done
1,483,685,279 UART: [art] Lock RT PCRs Done
1,483,686,390 UART: [art] Populate DV Done
1,483,694,787 UART: [fht] FMC Alias Private Key: 7
1,483,695,959 UART: [art] Derive CDI
1,483,696,239 UART: [art] Store in in slot 0x4
1,483,782,012 UART: [art] Derive Key Pair
1,483,782,372 UART: [art] Store priv key in slot 0x5
1,483,795,680 UART: [art] Derive Key Pair - Done
1,483,810,462 UART: [art] Signing Cert with AUTHO
1,483,810,942 UART: RITY.KEYID = 7
1,483,825,836 UART: [art] Erasing AUTHORITY.KEYID = 7
1,483,826,601 UART: [art] PUB.X = 18DBE2ECEEF6804644B1503F6449ED4BD4D0CA40E6D7F82A6A9D35273E74677152DB140B91AEF03A9D939CD9DAF87E42
1,483,833,382 UART: [art] PUB.Y = 380899375A40462B81A770AD6331EF0FB9DC06729B62A7107907A478DDE55FCC738FF0CDE9C844F0F5FA75E44102FAD1
1,483,840,323 UART: [art] SIG.R = 0DDBF4F354286916F6A9BEAD1F33E18CC15FD145B8985300468E0B969D9AEB3B146EF263D23417FB3E67F50C156126D3
1,483,847,068 UART: [art] SIG.S = B992D9226A40BD67E28FA95E8AF35FE0B31A3CC34C1B975FB622FB87EC4D48F8CE9C3D759F34F52586591F0457CCBB80
1,483,870,524 UART: Caliptra RT
1,483,870,869 UART: [state] CFI Enabled
1,484,147,704 UART: [rt] RT listening for mailbox commands...
1,484,148,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,486,579,240 >>> mbox cmd response: success
1,486,592,782 UART:
1,486,592,798 UART: Running Caliptra FMC ...
1,486,593,206 UART:
1,486,593,349 UART: [state] CFI Enabled
1,486,682,056 UART: [art] Extend RT PCRs Done
1,486,682,484 UART: [art] Lock RT PCRs Done
1,486,683,629 UART: [art] Populate DV Done
1,486,691,990 UART: [fht] FMC Alias Private Key: 7
1,486,692,958 UART: [art] Derive CDI
1,486,693,238 UART: [art] Store in in slot 0x4
1,486,778,929 UART: [art] Derive Key Pair
1,486,779,289 UART: [art] Store priv key in slot 0x5
1,486,791,983 UART: [art] Derive Key Pair - Done
1,486,806,974 UART: [art] Signing Cert with AUTHO
1,486,807,454 UART: RITY.KEYID = 7
1,486,822,592 UART: [art] Erasing AUTHORITY.KEYID = 7
1,486,823,357 UART: [art] PUB.X = EED3EDF7B4CC9FCA59088A0DB5294785AD576443EE1F0F8C8BFB2732A1DCACA6CCEDB6E56997ABAF9BE88DDA4EA38F12
1,486,830,154 UART: [art] PUB.Y = 47F3E03F787D58D8606A0FE2F499A5D154E434DD44AE1B8AF8C74407E1B34C2E48B166BAD03B6E3B962A74A0A7845EAE
1,486,837,110 UART: [art] SIG.R = B03B6341908BA24D4E3ADE15B66EA6929E4EEA9CB97F99CD4474EEDAB0BC8DE596503A831A20A124B4059DD480B036A0
1,486,843,891 UART: [art] SIG.S = E918367D5A302CC9B4106CDF2E86129CBF70B4EF0EC2ECE67EBFC3D269E9482BA265D614BCD2875E511851C1C28F33BF
1,486,867,753 UART: Caliptra RT
1,486,868,098 UART: [state] CFI Enabled
1,487,149,646 UART: [rt] RT listening for mailbox commands...
1,487,150,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,489,582,118 >>> mbox cmd response: success
1,489,595,658 UART:
1,489,595,674 UART: Running Caliptra FMC ...
1,489,596,082 UART:
1,489,596,225 UART: [state] CFI Enabled
1,489,685,716 UART: [art] Extend RT PCRs Done
1,489,686,144 UART: [art] Lock RT PCRs Done
1,489,687,171 UART: [art] Populate DV Done
1,489,695,374 UART: [fht] FMC Alias Private Key: 7
1,489,696,416 UART: [art] Derive CDI
1,489,696,696 UART: [art] Store in in slot 0x4
1,489,782,403 UART: [art] Derive Key Pair
1,489,782,763 UART: [art] Store priv key in slot 0x5
1,489,796,165 UART: [art] Derive Key Pair - Done
1,489,811,295 UART: [art] Signing Cert with AUTHO
1,489,811,775 UART: RITY.KEYID = 7
1,489,826,449 UART: [art] Erasing AUTHORITY.KEYID = 7
1,489,827,214 UART: [art] PUB.X = 18DBE2ECEEF6804644B1503F6449ED4BD4D0CA40E6D7F82A6A9D35273E74677152DB140B91AEF03A9D939CD9DAF87E42
1,489,833,995 UART: [art] PUB.Y = 380899375A40462B81A770AD6331EF0FB9DC06729B62A7107907A478DDE55FCC738FF0CDE9C844F0F5FA75E44102FAD1
1,489,840,936 UART: [art] SIG.R = 0DDBF4F354286916F6A9BEAD1F33E18CC15FD145B8985300468E0B969D9AEB3B146EF263D23417FB3E67F50C156126D3
1,489,847,681 UART: [art] SIG.S = B992D9226A40BD67E28FA95E8AF35FE0B31A3CC34C1B975FB622FB87EC4D48F8CE9C3D759F34F52586591F0457CCBB80
1,489,871,521 UART: Caliptra RT
1,489,871,866 UART: [state] CFI Enabled
1,490,154,977 UART: [rt] RT listening for mailbox commands...
1,490,155,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,492,588,315 >>> mbox cmd response: success
1,492,601,439 UART:
1,492,601,455 UART: Running Caliptra FMC ...
1,492,601,863 UART:
1,492,602,006 UART: [state] CFI Enabled
1,492,691,597 UART: [art] Extend RT PCRs Done
1,492,692,025 UART: [art] Lock RT PCRs Done
1,492,693,100 UART: [art] Populate DV Done
1,492,701,407 UART: [fht] FMC Alias Private Key: 7
1,492,702,471 UART: [art] Derive CDI
1,492,702,751 UART: [art] Store in in slot 0x4
1,492,788,374 UART: [art] Derive Key Pair
1,492,788,734 UART: [art] Store priv key in slot 0x5
1,492,802,482 UART: [art] Derive Key Pair - Done
1,492,816,901 UART: [art] Signing Cert with AUTHO
1,492,817,381 UART: RITY.KEYID = 7
1,492,832,847 UART: [art] Erasing AUTHORITY.KEYID = 7
1,492,833,612 UART: [art] PUB.X = EED3EDF7B4CC9FCA59088A0DB5294785AD576443EE1F0F8C8BFB2732A1DCACA6CCEDB6E56997ABAF9BE88DDA4EA38F12
1,492,840,409 UART: [art] PUB.Y = 47F3E03F787D58D8606A0FE2F499A5D154E434DD44AE1B8AF8C74407E1B34C2E48B166BAD03B6E3B962A74A0A7845EAE
1,492,847,365 UART: [art] SIG.R = B03B6341908BA24D4E3ADE15B66EA6929E4EEA9CB97F99CD4474EEDAB0BC8DE596503A831A20A124B4059DD480B036A0
1,492,854,146 UART: [art] SIG.S = E918367D5A302CC9B4106CDF2E86129CBF70B4EF0EC2ECE67EBFC3D269E9482BA265D614BCD2875E511851C1C28F33BF
1,492,878,124 UART: Caliptra RT
1,492,878,469 UART: [state] CFI Enabled
1,493,157,321 UART: [rt] RT listening for mailbox commands...
1,493,157,991 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,495,590,035 >>> mbox cmd response: success
1,495,603,425 UART:
1,495,603,441 UART: Running Caliptra FMC ...
1,495,603,849 UART:
1,495,603,992 UART: [state] CFI Enabled
1,495,693,271 UART: [art] Extend RT PCRs Done
1,495,693,699 UART: [art] Lock RT PCRs Done
1,495,694,956 UART: [art] Populate DV Done
1,495,703,121 UART: [fht] FMC Alias Private Key: 7
1,495,704,269 UART: [art] Derive CDI
1,495,704,549 UART: [art] Store in in slot 0x4
1,495,790,216 UART: [art] Derive Key Pair
1,495,790,576 UART: [art] Store priv key in slot 0x5
1,495,803,838 UART: [art] Derive Key Pair - Done
1,495,818,498 UART: [art] Signing Cert with AUTHO
1,495,818,978 UART: RITY.KEYID = 7
1,495,833,970 UART: [art] Erasing AUTHORITY.KEYID = 7
1,495,834,735 UART: [art] PUB.X = 18DBE2ECEEF6804644B1503F6449ED4BD4D0CA40E6D7F82A6A9D35273E74677152DB140B91AEF03A9D939CD9DAF87E42
1,495,841,516 UART: [art] PUB.Y = 380899375A40462B81A770AD6331EF0FB9DC06729B62A7107907A478DDE55FCC738FF0CDE9C844F0F5FA75E44102FAD1
1,495,848,457 UART: [art] SIG.R = 0DDBF4F354286916F6A9BEAD1F33E18CC15FD145B8985300468E0B969D9AEB3B146EF263D23417FB3E67F50C156126D3
1,495,855,202 UART: [art] SIG.S = B992D9226A40BD67E28FA95E8AF35FE0B31A3CC34C1B975FB622FB87EC4D48F8CE9C3D759F34F52586591F0457CCBB80
1,495,878,626 UART: Caliptra RT
1,495,878,971 UART: [state] CFI Enabled
1,496,159,384 UART: [rt] RT listening for mailbox commands...
1,496,160,054 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,498,590,294 >>> mbox cmd response: success
1,498,603,912 UART:
1,498,603,928 UART: Running Caliptra FMC ...
1,498,604,336 UART:
1,498,604,479 UART: [state] CFI Enabled
1,498,693,662 UART: [art] Extend RT PCRs Done
1,498,694,090 UART: [art] Lock RT PCRs Done
1,498,695,145 UART: [art] Populate DV Done
1,498,703,406 UART: [fht] FMC Alias Private Key: 7
1,498,704,516 UART: [art] Derive CDI
1,498,704,796 UART: [art] Store in in slot 0x4
1,498,790,263 UART: [art] Derive Key Pair
1,498,790,623 UART: [art] Store priv key in slot 0x5
1,498,803,761 UART: [art] Derive Key Pair - Done
1,498,818,406 UART: [art] Signing Cert with AUTHO
1,498,818,886 UART: RITY.KEYID = 7
1,498,834,230 UART: [art] Erasing AUTHORITY.KEYID = 7
1,498,834,995 UART: [art] PUB.X = EED3EDF7B4CC9FCA59088A0DB5294785AD576443EE1F0F8C8BFB2732A1DCACA6CCEDB6E56997ABAF9BE88DDA4EA38F12
1,498,841,792 UART: [art] PUB.Y = 47F3E03F787D58D8606A0FE2F499A5D154E434DD44AE1B8AF8C74407E1B34C2E48B166BAD03B6E3B962A74A0A7845EAE
1,498,848,748 UART: [art] SIG.R = B03B6341908BA24D4E3ADE15B66EA6929E4EEA9CB97F99CD4474EEDAB0BC8DE596503A831A20A124B4059DD480B036A0
1,498,855,529 UART: [art] SIG.S = E918367D5A302CC9B4106CDF2E86129CBF70B4EF0EC2ECE67EBFC3D269E9482BA265D614BCD2875E511851C1C28F33BF
1,498,879,033 UART: Caliptra RT
1,498,879,378 UART: [state] CFI Enabled
1,499,159,016 UART: [rt] RT listening for mailbox commands...
1,499,159,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,501,592,354 >>> mbox cmd response: success
1,501,605,744 UART:
1,501,605,760 UART: Running Caliptra FMC ...
1,501,606,168 UART:
1,501,606,311 UART: [state] CFI Enabled
1,501,694,980 UART: [art] Extend RT PCRs Done
1,501,695,408 UART: [art] Lock RT PCRs Done
1,501,696,505 UART: [art] Populate DV Done
1,501,704,576 UART: [fht] FMC Alias Private Key: 7
1,501,705,630 UART: [art] Derive CDI
1,501,705,910 UART: [art] Store in in slot 0x4
1,501,791,449 UART: [art] Derive Key Pair
1,501,791,809 UART: [art] Store priv key in slot 0x5
1,501,805,465 UART: [art] Derive Key Pair - Done
1,501,820,657 UART: [art] Signing Cert with AUTHO
1,501,821,137 UART: RITY.KEYID = 7
1,501,836,651 UART: [art] Erasing AUTHORITY.KEYID = 7
1,501,837,416 UART: [art] PUB.X = 18DBE2ECEEF6804644B1503F6449ED4BD4D0CA40E6D7F82A6A9D35273E74677152DB140B91AEF03A9D939CD9DAF87E42
1,501,844,197 UART: [art] PUB.Y = 380899375A40462B81A770AD6331EF0FB9DC06729B62A7107907A478DDE55FCC738FF0CDE9C844F0F5FA75E44102FAD1
1,501,851,138 UART: [art] SIG.R = 0DDBF4F354286916F6A9BEAD1F33E18CC15FD145B8985300468E0B969D9AEB3B146EF263D23417FB3E67F50C156126D3
1,501,857,883 UART: [art] SIG.S = B992D9226A40BD67E28FA95E8AF35FE0B31A3CC34C1B975FB622FB87EC4D48F8CE9C3D759F34F52586591F0457CCBB80
1,501,881,727 UART: Caliptra RT
1,501,882,072 UART: [state] CFI Enabled
1,502,162,287 UART: [rt] RT listening for mailbox commands...
1,502,162,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,504,595,441 >>> mbox cmd response: success
1,504,608,525 UART:
1,504,608,541 UART: Running Caliptra FMC ...
1,504,608,949 UART:
1,504,609,092 UART: [state] CFI Enabled
1,504,698,389 UART: [art] Extend RT PCRs Done
1,504,698,817 UART: [art] Lock RT PCRs Done
1,504,700,298 UART: [art] Populate DV Done
1,504,708,469 UART: [fht] FMC Alias Private Key: 7
1,504,709,639 UART: [art] Derive CDI
1,504,709,919 UART: [art] Store in in slot 0x4
1,504,795,494 UART: [art] Derive Key Pair
1,504,795,854 UART: [art] Store priv key in slot 0x5
1,504,809,068 UART: [art] Derive Key Pair - Done
1,504,823,991 UART: [art] Signing Cert with AUTHO
1,504,824,471 UART: RITY.KEYID = 7
1,504,839,917 UART: [art] Erasing AUTHORITY.KEYID = 7
1,504,840,682 UART: [art] PUB.X = EED3EDF7B4CC9FCA59088A0DB5294785AD576443EE1F0F8C8BFB2732A1DCACA6CCEDB6E56997ABAF9BE88DDA4EA38F12
1,504,847,479 UART: [art] PUB.Y = 47F3E03F787D58D8606A0FE2F499A5D154E434DD44AE1B8AF8C74407E1B34C2E48B166BAD03B6E3B962A74A0A7845EAE
1,504,854,435 UART: [art] SIG.R = B03B6341908BA24D4E3ADE15B66EA6929E4EEA9CB97F99CD4474EEDAB0BC8DE596503A831A20A124B4059DD480B036A0
1,504,861,216 UART: [art] SIG.S = E918367D5A302CC9B4106CDF2E86129CBF70B4EF0EC2ECE67EBFC3D269E9482BA265D614BCD2875E511851C1C28F33BF
1,504,885,366 UART: Caliptra RT
1,504,885,711 UART: [state] CFI Enabled
1,505,167,833 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 312.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,272 UART:
192,646 UART: Running Caliptra ROM ...
193,844 UART:
193,998 UART: [state] CFI Enabled
255,990 UART: [state] LifecycleState = Unprovisioned
257,907 UART: [state] DebugLocked = No
260,856 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,439 UART: [kat] SHA2-256
435,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,704 UART: [kat] ++
446,152 UART: [kat] sha1
457,019 UART: [kat] SHA2-256
459,746 UART: [kat] SHA2-384
464,660 UART: [kat] SHA2-512-ACC
467,022 UART: [kat] ECC-384
2,760,934 UART: [kat] HMAC-384Kdf
2,781,983 UART: [kat] LMS
3,972,319 UART: [kat] --
3,977,535 UART: [cold-reset] ++
3,980,031 UART: [fht] Storing FHT @ 0x50003400
3,992,691 UART: [idev] ++
3,993,333 UART: [idev] CDI.KEYID = 6
3,994,226 UART: [idev] SUBJECT.KEYID = 7
3,995,288 UART: [idev] UDS.KEYID = 0
3,996,375 ready_for_fw is high
3,996,592 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,139,760 UART: [idev] Erasing UDS.KEYID = 0
7,329,663 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,721 UART: [idev] --
7,355,290 UART: [ldev] ++
7,355,891 UART: [ldev] CDI.KEYID = 6
7,356,771 UART: [ldev] SUBJECT.KEYID = 5
7,358,032 UART: [ldev] AUTHORITY.KEYID = 7
7,359,260 UART: [ldev] FE.KEYID = 1
7,405,143 UART: [ldev] Erasing FE.KEYID = 1
10,737,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,117,324 UART: [ldev] --
13,121,874 UART: [fwproc] Waiting for Commands...
13,123,862 UART: [fwproc] Received command 0x46574c44
13,126,092 UART: [fwproc] Received Image of size 113844 bytes
17,178,984 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,377 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,636,008 >>> mbox cmd response: success
17,636,534 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,780,434 UART: [afmc] ++
17,781,073 UART: [afmc] CDI.KEYID = 6
17,781,999 UART: [afmc] SUBJECT.KEYID = 7
17,783,101 UART: [afmc] AUTHORITY.KEYID = 5
21,013,650 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,311,599 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,854 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,308 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,121 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,357,607 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,379,354 UART: [afmc] --
23,382,346 UART: [cold-reset] --
23,385,772 UART: [state] Locking Datavault
23,390,418 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,120 UART: [state] Locking ICCM
23,394,912 UART: [exit] Launching FMC @ 0x40000130
23,403,301 UART:
23,403,526 UART: Running Caliptra FMC ...
23,404,617 UART:
23,404,773 UART: [state] CFI Enabled
23,471,903 UART: [fht] FMC Alias Private Key: 7
25,809,901 UART: [art] Extend RT PCRs Done
25,811,122 UART: [art] Lock RT PCRs Done
25,812,741 UART: [art] Populate DV Done
25,818,121 UART: [fht] FMC Alias Private Key: 7
25,819,867 UART: [art] Derive CDI
25,820,683 UART: [art] Store in in slot 0x4
25,880,622 UART: [art] Derive Key Pair
25,881,657 UART: [art] Store priv key in slot 0x5
29,174,587 UART: [art] Derive Key Pair - Done
29,187,804 UART: [art] Signing Cert with AUTHO
29,189,112 UART: RITY.KEYID = 7
31,476,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,350 UART: [art] PUB.X = 170AB06B44A48519155DEB0D3FF1C56367D35AD0B397111EE4FF4FD42FD89F3B3FDE2146FF4547BD904F76CE5B9EB2E9
31,485,601 UART: [art] PUB.Y = 48D170983C8F1A246D6C8F6A3E10FD27E43A4DAB8BF693F83A2F8E391B609936BF6EA4C27A7953910CCDB487D2E9F53B
31,492,889 UART: [art] SIG.R = 3A3606162D8C971DD402106ADE22CC65569937481EB717E98CAFC8C2428F221DE6EAD99B56C6D8912BB48DE10D8B9E14
31,500,222 UART: [art] SIG.S = 09A86F057078894C92833AE3560D5E2378030E1364019D0F0C0192D017DD09DBC669547A0F67A9107E851DFC74A8C4AD
32,804,833 UART: Caliptra RT
32,805,537 UART: [state] CFI Enabled
32,967,040 UART: [rt] RT listening for mailbox commands...
32,970,160 UART:
32,970,408 UART: Running Caliptra ROM ...
32,971,431 UART:
32,971,575 UART: [state] CFI Enabled
33,038,292 UART: [state] LifecycleState = Unprovisioned
33,040,217 UART: [state] DebugLocked = No
33,042,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,047,804 UART: [kat] SHA2-256
33,217,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,228,017 UART: [kat] ++
33,228,554 UART: [kat] sha1
33,240,307 UART: [kat] SHA2-256
33,242,989 UART: [kat] SHA2-384
33,247,882 UART: [kat] SHA2-512-ACC
33,250,229 UART: [kat] ECC-384
35,536,038 UART: [kat] HMAC-384Kdf
35,549,079 UART: [kat] LMS
36,739,402 UART: [kat] --
36,743,605 UART: [update-reset] ++
40,874,483 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,878,636 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
41,259,892 >>> mbox cmd response: success
41,261,766 UART: [update-reset] Copying MAN_2 To MAN_1
41,284,203 UART: [update-reset Success] --
41,288,305 UART: [state] Locking Datavault
41,291,772 UART: [state] Locking PCR0, PCR1 and PCR31
41,293,515 UART: [state] Locking ICCM
41,294,659 UART: [exit] Launching FMC @ 0x40000130
41,303,042 UART:
41,303,278 UART: Running Caliptra FMC ...
41,304,300 UART:
41,304,461 UART: [state] CFI Enabled
41,405,171 UART: [art] Extend RT PCRs Done
41,406,351 UART: [art] Lock RT PCRs Done
41,407,880 UART: [art] Populate DV Done
41,413,278 UART: [fht] FMC Alias Private Key: 7
41,414,970 UART: [art] Derive CDI
41,415,790 UART: [art] Store in in slot 0x4
41,473,800 UART: [art] Derive Key Pair
41,474,866 UART: [art] Store priv key in slot 0x5
44,767,948 UART: [art] Derive Key Pair - Done
44,780,843 UART: [art] Signing Cert with AUTHO
44,782,138 UART: RITY.KEYID = 7
47,068,976 UART: [art] Erasing AUTHORITY.KEYID = 7
47,070,482 UART: [art] PUB.X = 8BF16ADE43879278E890631F2132350AD0604050C27DDA470BB6AB6DB56688863464E3C3E648770B4640667E01E717A4
47,077,702 UART: [art] PUB.Y = DFD09194CD436E97EF8A152B9A5583D8AC28E871D3A8790A284199ECFDDF407E3EFC06253D8C79030D61F57EBB31B59D
47,084,912 UART: [art] SIG.R = 816E1EA577AE9A65DA6F00A70A48214646B0CB44FEC9A3C036437F86CF1C187D82532BD865EE4BFD852C5CA5862B0D10
47,092,357 UART: [art] SIG.S = 102EBBF820893A56F521F96824EC1E961DF6ED454E8BDD169236D83923B49487CCA22FB969DDCCDAD46EAC5DF93D652C
48,396,618 UART: Caliptra RT
48,397,334 UART: [state] CFI Enabled
48,729,600 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,804,356 ready_for_fw is high
3,804,890 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,847,442 >>> mbox cmd response: success
17,848,115 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,543,897 UART:
23,544,313 UART: Running Caliptra FMC ...
23,545,463 UART:
23,545,616 UART: [state] CFI Enabled
23,612,821 UART: [fht] FMC Alias Private Key: 7
25,951,162 UART: [art] Extend RT PCRs Done
25,952,393 UART: [art] Lock RT PCRs Done
25,954,071 UART: [art] Populate DV Done
25,959,313 UART: [fht] FMC Alias Private Key: 7
25,960,949 UART: [art] Derive CDI
25,961,752 UART: [art] Store in in slot 0x4
26,021,297 UART: [art] Derive Key Pair
26,022,337 UART: [art] Store priv key in slot 0x5
29,315,052 UART: [art] Derive Key Pair - Done
29,327,670 UART: [art] Signing Cert with AUTHO
29,328,969 UART: RITY.KEYID = 7
31,616,023 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,531 UART: [art] PUB.X = EB33FC0E9B3FC4EF3A4FA79FAEEF58E8DAB588C5F532A62E6663C4664BF6AAAB81B456DF2818920DBCD877D00F049F89
31,624,804 UART: [art] PUB.Y = 47A987853202A1703675FBDBCFEADA6B0CE6CFC8653A278842EB32A8868F630DB6251FF4581B1D666820D78E392BCF7D
31,632,025 UART: [art] SIG.R = 378B83AD11E46C5FA73F102358E664118FDBD6C7458D80DAACFDC621C65E0E6E0DA2B988850105E75D21A7B69112AD6F
31,639,421 UART: [art] SIG.S = FB7BCCFB6E6655DD6F51ACB6A920517B9FD1D650CEFB555EE52EA6A599100888F6FA9C7C1032E8F033E044DB0C5CAE1C
32,944,764 UART: Caliptra RT
32,945,477 UART: [state] CFI Enabled
33,125,483 UART: [rt] RT listening for mailbox commands...
41,717,063 >>> mbox cmd response: success
41,752,111 UART:
41,752,412 UART: Running Caliptra FMC ...
41,753,470 UART:
41,753,615 UART: [state] CFI Enabled
41,860,587 UART: [art] Extend RT PCRs Done
41,861,761 UART: [art] Lock RT PCRs Done
41,863,420 UART: [art] Populate DV Done
41,868,681 UART: [fht] FMC Alias Private Key: 7
41,870,217 UART: [art] Derive CDI
41,871,043 UART: [art] Store in in slot 0x4
41,929,326 UART: [art] Derive Key Pair
41,930,360 UART: [art] Store priv key in slot 0x5
45,223,119 UART: [art] Derive Key Pair - Done
45,235,909 UART: [art] Signing Cert with AUTHO
45,237,204 UART: RITY.KEYID = 7
47,524,314 UART: [art] Erasing AUTHORITY.KEYID = 7
47,525,817 UART: [art] PUB.X = 51F6B002803C647BD7B3C2AAAF8ABDD982EB8485F76581C8A1ED63933E349942A138D6A533B3EBB8B5EC12A6B78D4AF6
47,533,074 UART: [art] PUB.Y = 843858AFA2EF71C1CC521A1D19A8D5B0E79729E821F00337F62B252F7CBD0C4F25FFB9C0F5B04184B1FDEEE6877A78CC
47,540,365 UART: [art] SIG.R = 8E2D38FAC6A5E118995791069F7969BCE71CD528B1E0B9366B72C968D2B001180A34B3E244AB909D2EC3EFCFC5566017
47,547,747 UART: [art] SIG.S = 5AA9450DE8C7B455A3ABE21514F4301E83EFA7DE3962AF99BF9DA889DA468A926BBE31BBE0AA1E7BBF8B1590F33DBA8D
48,852,747 UART: Caliptra RT
48,853,448 UART: [state] CFI Enabled
49,184,282 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
192,447 UART:
192,818 UART: Running Caliptra ROM ...
193,915 UART:
603,634 UART: [state] CFI Enabled
618,229 UART: [state] LifecycleState = Unprovisioned
620,116 UART: [state] DebugLocked = No
621,859 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,381 UART: [kat] SHA2-256
797,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,632 UART: [kat] ++
808,082 UART: [kat] sha1
819,753 UART: [kat] SHA2-256
822,473 UART: [kat] SHA2-384
828,105 UART: [kat] SHA2-512-ACC
830,478 UART: [kat] ECC-384
3,114,867 UART: [kat] HMAC-384Kdf
3,126,693 UART: [kat] LMS
4,316,960 UART: [kat] --
4,321,843 UART: [cold-reset] ++
4,323,925 UART: [fht] Storing FHT @ 0x50003400
4,334,763 UART: [idev] ++
4,335,338 UART: [idev] CDI.KEYID = 6
4,336,284 UART: [idev] SUBJECT.KEYID = 7
4,337,547 UART: [idev] UDS.KEYID = 0
4,338,694 ready_for_fw is high
4,338,934 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,044 UART: [idev] Erasing UDS.KEYID = 0
7,628,962 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,839 UART: [idev] --
7,653,662 UART: [ldev] ++
7,654,231 UART: [ldev] CDI.KEYID = 6
7,655,200 UART: [ldev] SUBJECT.KEYID = 5
7,656,414 UART: [ldev] AUTHORITY.KEYID = 7
7,657,696 UART: [ldev] FE.KEYID = 1
7,670,424 UART: [ldev] Erasing FE.KEYID = 1
10,953,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,448 UART: [ldev] --
13,313,711 UART: [fwproc] Waiting for Commands...
13,315,376 UART: [fwproc] Received command 0x46574c44
13,317,553 UART: [fwproc] Received Image of size 113844 bytes
17,367,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,471 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,826,939 >>> mbox cmd response: success
17,827,486 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,971,044 UART: [afmc] ++
17,971,692 UART: [afmc] CDI.KEYID = 6
17,972,587 UART: [afmc] SUBJECT.KEYID = 7
17,973,640 UART: [afmc] AUTHORITY.KEYID = 5
21,150,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,635 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,026 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,844 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,261 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,860 UART: [afmc] --
23,515,182 UART: [cold-reset] --
23,520,184 UART: [state] Locking Datavault
23,527,258 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,019 UART: [state] Locking ICCM
23,531,556 UART: [exit] Launching FMC @ 0x40000130
23,539,955 UART:
23,540,201 UART: Running Caliptra FMC ...
23,541,301 UART:
23,541,460 UART: [state] CFI Enabled
23,549,833 UART: [fht] FMC Alias Private Key: 7
25,880,835 UART: [art] Extend RT PCRs Done
25,882,079 UART: [art] Lock RT PCRs Done
25,883,714 UART: [art] Populate DV Done
25,888,985 UART: [fht] FMC Alias Private Key: 7
25,890,639 UART: [art] Derive CDI
25,891,382 UART: [art] Store in in slot 0x4
25,934,142 UART: [art] Derive Key Pair
25,935,178 UART: [art] Store priv key in slot 0x5
29,177,050 UART: [art] Derive Key Pair - Done
29,189,887 UART: [art] Signing Cert with AUTHO
29,191,183 UART: RITY.KEYID = 7
31,470,713 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,229 UART: [art] PUB.X = F7E483E8EBC6A11B23614716454DC043AF66801D0718B882F2347E71E33B44D783DA577C168B6A8FC952D8238F57D94D
31,479,481 UART: [art] PUB.Y = 725D1089018E58230F46954E0D88BC7B770E6E3196036C5EAF694C1BA6DCE2311FF35D6A531B1414A727E49528B83F5F
31,486,678 UART: [art] SIG.R = B950DA116143332F5F7246D225659F2AFD6DE6124600726053EFB9882EC62AC092C3B5A6A4A4083DDBE8E1203F1A14A8
31,494,027 UART: [art] SIG.S = C379E46FFF271092A62C8C5BC75F44D6B49DE723FA6ACEBAA346BC0AE2ECFF81EF698A569BFE099DC20DC467975BEE7B
32,799,246 UART: Caliptra RT
32,799,968 UART: [state] CFI Enabled
32,917,296 UART: [rt] RT listening for mailbox commands...
32,920,250 UART:
32,920,459 UART: Running Caliptra ROM ...
32,921,484 UART:
32,921,908 UART: [state] CFI Enabled
32,935,056 UART: [state] LifecycleState = Unprovisioned
32,936,955 UART: [state] DebugLocked = No
32,939,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,944,092 UART: [kat] SHA2-256
33,113,808 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,124,328 UART: [kat] ++
33,124,786 UART: [kat] sha1
33,135,132 UART: [kat] SHA2-256
33,137,816 UART: [kat] SHA2-384
33,142,607 UART: [kat] SHA2-512-ACC
33,144,979 UART: [kat] ECC-384
35,431,110 UART: [kat] HMAC-384Kdf
35,442,294 UART: [kat] LMS
36,632,341 UART: [kat] --
36,635,052 UART: [update-reset] ++
40,769,147 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,773,304 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
41,154,569 >>> mbox cmd response: success
41,155,224 UART: [update-reset] Copying MAN_2 To MAN_1
41,177,607 UART: [update-reset Success] --
41,181,724 UART: [state] Locking Datavault
41,184,756 UART: [state] Locking PCR0, PCR1 and PCR31
41,186,508 UART: [state] Locking ICCM
41,187,875 UART: [exit] Launching FMC @ 0x40000130
41,196,321 UART:
41,196,560 UART: Running Caliptra FMC ...
41,197,806 UART:
41,197,965 UART: [state] CFI Enabled
41,241,902 UART: [art] Extend RT PCRs Done
41,243,051 UART: [art] Lock RT PCRs Done
41,244,478 UART: [art] Populate DV Done
41,249,880 UART: [fht] FMC Alias Private Key: 7
41,251,463 UART: [art] Derive CDI
41,252,201 UART: [art] Store in in slot 0x4
41,295,000 UART: [art] Derive Key Pair
41,296,037 UART: [art] Store priv key in slot 0x5
44,538,672 UART: [art] Derive Key Pair - Done
44,551,562 UART: [art] Signing Cert with AUTHO
44,552,870 UART: RITY.KEYID = 7
46,832,352 UART: [art] Erasing AUTHORITY.KEYID = 7
46,833,896 UART: [art] PUB.X = 259D8270A92BE445118A4746644CC3945DE8941DB4B5B09BAB1EA9B5D633DB907D3BD4CA9FE8189F121653EA07CE7506
46,841,113 UART: [art] PUB.Y = 499769B272D0734430B708AD75A6BA0C6DA06B54633990F1638724AAC3BE370651174D5B72C8B2A27A58B3E8BBA2E547
46,848,327 UART: [art] SIG.R = 6B55E4F225D6EED30F6170FE819800227574FBE53A63F935AF856607A5EAAFCCD5C96BFA79446E7A6AEE73535AC4ED72
46,855,735 UART: [art] SIG.S = 8B99212DAB02AED1DF6C099A19B9C52806BACB61FAAB1AFFAC179C4D6A3B98B57025DCF9D0013609E26FDE143E6679CA
48,161,107 UART: Caliptra RT
48,161,821 UART: [state] CFI Enabled
48,449,687 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
4,130,542 ready_for_fw is high
4,131,056 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,072,746 >>> mbox cmd response: success
18,073,531 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,715,168 UART:
23,715,582 UART: Running Caliptra FMC ...
23,716,751 UART:
23,716,918 UART: [state] CFI Enabled
23,724,437 UART: [fht] FMC Alias Private Key: 7
26,054,752 UART: [art] Extend RT PCRs Done
26,055,984 UART: [art] Lock RT PCRs Done
26,057,561 UART: [art] Populate DV Done
26,062,943 UART: [fht] FMC Alias Private Key: 7
26,064,655 UART: [art] Derive CDI
26,065,487 UART: [art] Store in in slot 0x4
26,108,031 UART: [art] Derive Key Pair
26,109,038 UART: [art] Store priv key in slot 0x5
29,350,681 UART: [art] Derive Key Pair - Done
29,363,841 UART: [art] Signing Cert with AUTHO
29,365,145 UART: RITY.KEYID = 7
31,644,744 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,251 UART: [art] PUB.X = 9ED71A63C180E8C2BD43BE0656E8D86E2C4A1BA3E490B77FE8949DEA60DC9C2B67A4CF695CB112132E40B585A87CFE3D
31,653,530 UART: [art] PUB.Y = 38AAAA62D6CC6C52F47CE1B305C4B0B441FE4F6615F64CD295A2E94B163E6FD8641D09EF29A37F6881608D426CB885F3
31,660,734 UART: [art] SIG.R = 75745CBDD75426833DDBFF1379EECE752DB33733A06B2173A5C7C8B3901DB6A2CB2482641C5DFC441158A1A0C6587C9D
31,668,136 UART: [art] SIG.S = 28F9DBA8C4951BF0333F95AF6871D20109A79149AD96CF8DB2C74077BF3CB56B229C23039FD924175F9005504A0926C0
32,972,967 UART: Caliptra RT
32,973,687 UART: [state] CFI Enabled
33,091,288 UART: [rt] RT listening for mailbox commands...
41,601,293 >>> mbox cmd response: success
41,636,555 UART:
41,636,826 UART: Running Caliptra FMC ...
41,637,862 UART:
41,638,011 UART: [state] CFI Enabled
41,682,144 UART: [art] Extend RT PCRs Done
41,683,332 UART: [art] Lock RT PCRs Done
41,684,984 UART: [art] Populate DV Done
41,690,457 UART: [fht] FMC Alias Private Key: 7
41,692,156 UART: [art] Derive CDI
41,692,916 UART: [art] Store in in slot 0x4
41,735,564 UART: [art] Derive Key Pair
41,736,566 UART: [art] Store priv key in slot 0x5
44,978,348 UART: [art] Derive Key Pair - Done
44,991,397 UART: [art] Signing Cert with AUTHO
44,992,704 UART: RITY.KEYID = 7
47,271,607 UART: [art] Erasing AUTHORITY.KEYID = 7
47,273,115 UART: [art] PUB.X = 2E92B2DBBC123AB6AEBD04FF5E69D204802F0E134D6F562DDAB235B56532FB79046807B2040D339763B9C496F901889B
47,280,376 UART: [art] PUB.Y = 673767D12A703806B2E11B1E48EDF1251C20C60806F1B8FEE6C5EE45AB9C5A7038D497E6B1FEF40FD97B956A12FD8615
47,287,617 UART: [art] SIG.R = C5D92F404A12985B94607392265A1CAC7AAFE84A02D65C67E95C29CA1639855521B06D8FF83A2A23B850B618177A5046
47,294,962 UART: [art] SIG.S = 479CF28E6E6758FE424F24B7A404D134E470FD508A876EEFE1561AF829373A9FCE3C46DBA492E3BBE564CCF86B0F38DB
48,600,138 UART: Caliptra RT
48,600,837 UART: [state] CFI Enabled
48,888,843 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
191,986 UART:
192,408 UART: Running Caliptra ROM ...
193,511 UART:
193,657 UART: [state] CFI Enabled
257,718 UART: [state] LifecycleState = Unprovisioned
259,567 UART: [state] DebugLocked = No
261,368 UART: [state] WD Timer not started. Device not locked for debugging
264,575 UART: [kat] SHA2-256
443,694 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
455,288 UART: [kat] ++
455,817 UART: [kat] sha1
466,911 UART: [kat] SHA2-256
469,911 UART: [kat] SHA2-384
476,321 UART: [kat] SHA2-512-ACC
479,267 UART: [kat] ECC-384
2,928,646 UART: [kat] HMAC-384Kdf
2,950,631 UART: [kat] LMS
3,480,084 UART: [kat] --
3,485,169 UART: [cold-reset] ++
3,487,524 UART: [fht] FHT @ 0x50003400
3,499,138 UART: [idev] ++
3,499,710 UART: [idev] CDI.KEYID = 6
3,500,702 UART: [idev] SUBJECT.KEYID = 7
3,501,894 UART: [idev] UDS.KEYID = 0
3,502,824 ready_for_fw is high
3,503,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,647,231 UART: [idev] Erasing UDS.KEYID = 0
6,006,828 UART: [idev] Sha1 KeyId Algorithm
6,030,550 UART: [idev] --
6,033,450 UART: [ldev] ++
6,034,043 UART: [ldev] CDI.KEYID = 6
6,034,959 UART: [ldev] SUBJECT.KEYID = 5
6,036,129 UART: [ldev] AUTHORITY.KEYID = 7
6,037,368 UART: [ldev] FE.KEYID = 1
6,079,621 UART: [ldev] Erasing FE.KEYID = 1
8,580,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,963 UART: [ldev] --
10,389,932 UART: [fwproc] Wait for Commands...
10,392,944 UART: [fwproc] Recv command 0x46574c44
10,395,035 UART: [fwproc] Recv'd Img size: 114168 bytes
13,798,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,869,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,938,286 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,255,165 >>> mbox cmd response: success
14,260,097 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,404,732 UART: [afmc] ++
14,405,391 UART: [afmc] CDI.KEYID = 6
14,406,309 UART: [afmc] SUBJECT.KEYID = 7
14,407,361 UART: [afmc] AUTHORITY.KEYID = 5
16,805,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,241 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,097 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,995 UART: [afmc] --
18,604,658 UART: [cold-reset] --
18,610,145 UART: [state] Locking Datavault
18,615,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,254 UART: [state] Locking ICCM
18,619,816 UART: [exit] Launching FMC @ 0x40000130
18,628,208 UART:
18,628,444 UART: Running Caliptra FMC ...
18,629,563 UART:
18,629,720 UART: [state] CFI Enabled
18,686,758 UART: [fht] FMC Alias Private Key: 7
20,450,911 UART: [art] Extend RT PCRs Done
20,452,134 UART: [art] Lock RT PCRs Done
20,453,677 UART: [art] Populate DV Done
20,459,093 UART: [fht] FMC Alias Private Key: 7
20,460,797 UART: [art] Derive CDI
20,461,534 UART: [art] Store in in slot 0x4
20,518,505 UART: [art] Derive Key Pair
20,519,544 UART: [art] Store priv key in slot 0x5
22,982,365 UART: [art] Derive Key Pair - Done
22,995,470 UART: [art] Signing Cert with AUTHO
22,996,769 UART: RITY.KEYID = 7
24,707,909 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,421 UART: [art] PUB.X = 19BDC0EEC97A8C5BD4FACA8B1F2D64372D29C824E67A168436DEB260E2E78627B0997366847505CB56016A8A8FF233DC
24,716,707 UART: [art] PUB.Y = B4207B07B4F866E5F8A276639A4E63EDA77265D5B68FA2AD5D9C1BC74947A1F7DFADC4C3FCA0C45EA6C5E1CD1CA5C8D4
24,723,962 UART: [art] SIG.R = 5D0E108629592A79F11E4CCDBA5ECEC2FC3B045AEF15CECE86F70D706E3547FB5684E6AD6F55659907ADAFACCFACC2FB
24,731,370 UART: [art] SIG.S = B45A45408CD2678401A6762E8C8BB4F13453D8B13AA8213B7D90708264954A2CAC9D5B225E134A70E02FC9F8440CB64A
25,710,414 UART: Caliptra RT
25,711,120 UART: [state] CFI Enabled
25,876,485 UART: [rt] RT listening for mailbox commands...
25,879,333 UART:
25,879,587 UART: Running Caliptra ROM ...
25,880,691 UART:
25,880,850 UART: [state] CFI Enabled
25,941,764 UART: [state] LifecycleState = Unprovisioned
25,943,628 UART: [state] DebugLocked = No
25,945,907 UART: [state] WD Timer not started. Device not locked for debugging
25,950,137 UART: [kat] SHA2-256
26,129,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,140,834 UART: [kat] ++
26,141,306 UART: [kat] sha1
26,151,973 UART: [kat] SHA2-256
26,154,991 UART: [kat] SHA2-384
26,160,656 UART: [kat] SHA2-512-ACC
26,163,603 UART: [kat] ECC-384
28,626,134 UART: [kat] HMAC-384Kdf
28,650,788 UART: [kat] LMS
29,180,236 UART: [kat] --
29,186,284 UART: [update-reset] ++
32,601,338 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,604,660 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
32,986,961 >>> mbox cmd response: success
32,987,557 UART: [update-reset] Copying MAN_2 To MAN_1
33,009,901 UART: [update-reset Success] --
33,012,849 UART: [state] Locking Datavault
33,014,594 UART: [state] Locking PCR0, PCR1 and PCR31
33,016,270 UART: [state] Locking ICCM
33,017,341 UART: [exit] Launching FMC @ 0x40000130
33,025,744 UART:
33,025,988 UART: Running Caliptra FMC ...
33,027,099 UART:
33,027,275 UART: [state] CFI Enabled
33,119,769 UART: [art] Extend RT PCRs Done
33,120,956 UART: [art] Lock RT PCRs Done
33,122,304 UART: [art] Populate DV Done
33,127,989 UART: [fht] FMC Alias Private Key: 7
33,129,641 UART: [art] Derive CDI
33,130,455 UART: [art] Store in in slot 0x4
33,188,578 UART: [art] Derive Key Pair
33,189,620 UART: [art] Store priv key in slot 0x5
35,652,094 UART: [art] Derive Key Pair - Done
35,665,413 UART: [art] Signing Cert with AUTHO
35,666,743 UART: RITY.KEYID = 7
37,377,694 UART: [art] Erasing AUTHORITY.KEYID = 7
37,379,193 UART: [art] PUB.X = D7BEE2549CA3ADB8E86522711AE7869C4DA29E90C4AF13D4D9D398560D3363170EE7773E0322D443ADB8F1B55CEC6323
37,386,488 UART: [art] PUB.Y = 83BDA2BE9FE59A4F2DABDA6D2885149D9F01C6B94F56C56F08F9C69A4EF96AC1E88DB221F4A11EC53133B4E1C48D34E4
37,393,748 UART: [art] SIG.R = D4248116C09E4839BB56F985FBF658600C2608D4133E3B2581F372A393753D22EBA98919F5BC1C325FC15B60BDF96923
37,401,114 UART: [art] SIG.S = 7097ECCCFCBBB0245E56D634F5E0DB6FB251BA8F034E3951DC0FDAF2E7A5060500501AA6AED9D93AE17F6D58B3AD3569
38,380,842 UART: Caliptra RT
38,381,540 UART: [state] CFI Enabled
38,715,263 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,380,731 ready_for_fw is high
3,381,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,056,610 >>> mbox cmd response: success
14,060,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,346,164 UART:
18,346,578 UART: Running Caliptra FMC ...
18,347,705 UART:
18,347,868 UART: [state] CFI Enabled
18,412,566 UART: [fht] FMC Alias Private Key: 7
20,176,224 UART: [art] Extend RT PCRs Done
20,177,447 UART: [art] Lock RT PCRs Done
20,179,157 UART: [art] Populate DV Done
20,184,630 UART: [fht] FMC Alias Private Key: 7
20,186,171 UART: [art] Derive CDI
20,186,986 UART: [art] Store in in slot 0x4
20,245,093 UART: [art] Derive Key Pair
20,246,132 UART: [art] Store priv key in slot 0x5
22,707,781 UART: [art] Derive Key Pair - Done
22,720,990 UART: [art] Signing Cert with AUTHO
22,722,292 UART: RITY.KEYID = 7
24,446,180 UART: [art] Erasing AUTHORITY.KEYID = 7
24,447,683 UART: [art] PUB.X = D18E74B1F302CD86F11302EA2B6E738CE0045C6BFE1E7578CDC2E9FC2883EB39B5DE0E0969EC76686B784C1C5A6DE2A1
24,454,992 UART: [art] PUB.Y = F130F9011A0AFE02F5CC6B541E85337E4B4D4BEF15CCA3DC71EF1635DE4ABC32BD410C3822F402CF296D1BB3CF14B162
24,462,299 UART: [art] SIG.R = D7D68BBAD871B42E75AA43E600114A74A40A8B66CE9C100E16B11959171EBA916E02D0D529A29618787DB12CC1D7F70E
24,469,653 UART: [art] SIG.S = CD9AFF1E5F4721DD21815B9AC882B47A511693C5E38D25F4BA5A34F509AE4B4502962B79DC43C8A9B337756254B9906E
25,449,366 UART: Caliptra RT
25,450,063 UART: [state] CFI Enabled
25,612,963 UART: [rt] RT listening for mailbox commands...
32,604,400 >>> mbox cmd response: success
32,638,432 UART:
32,638,702 UART: Running Caliptra FMC ...
32,639,815 UART:
32,639,978 UART: [state] CFI Enabled
32,727,080 UART: [art] Extend RT PCRs Done
32,728,278 UART: [art] Lock RT PCRs Done
32,729,789 UART: [art] Populate DV Done
32,735,213 UART: [fht] FMC Alias Private Key: 7
32,736,859 UART: [art] Derive CDI
32,737,671 UART: [art] Store in in slot 0x4
32,796,712 UART: [art] Derive Key Pair
32,797,784 UART: [art] Store priv key in slot 0x5
35,260,895 UART: [art] Derive Key Pair - Done
35,273,838 UART: [art] Signing Cert with AUTHO
35,275,139 UART: RITY.KEYID = 7
36,986,623 UART: [art] Erasing AUTHORITY.KEYID = 7
36,988,123 UART: [art] PUB.X = E878FFDCAF4530EA290AAAF4E7BF6C877C7547906EDDA8837F24D805FF820E3A1DF06DDE40CC046CEA53A4894275EADA
36,995,416 UART: [art] PUB.Y = 680EDD131ACAEC1DB570B1D9F7AA2122FDEACBCE990163E52F58E2FA8BEDEB7281A358D5A9B75272127FE3D4381807CE
37,002,677 UART: [art] SIG.R = 560F891C8455253FA01B15EF14B124E1516EF37C0FA22DBAE69C151C84D7CA2EA53BE6EC015479D05EA699CAADED82C0
37,010,143 UART: [art] SIG.S = 3627FD205CB0DC45991AAB53716EDA10F223A95D9CA22A87DB2828F4C51B5F7C144AE65434599066BEBA5AC483617AD0
37,989,259 UART: Caliptra RT
37,989,962 UART: [state] CFI Enabled
38,330,763 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,797 writing to cptra_bootfsm_go
193,076 UART:
193,459 UART: Running Caliptra ROM ...
194,582 UART:
604,246 UART: [state] CFI Enabled
617,366 UART: [state] LifecycleState = Unprovisioned
619,234 UART: [state] DebugLocked = No
620,550 UART: [state] WD Timer not started. Device not locked for debugging
623,672 UART: [kat] SHA2-256
802,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,421 UART: [kat] ++
814,951 UART: [kat] sha1
827,623 UART: [kat] SHA2-256
830,690 UART: [kat] SHA2-384
835,766 UART: [kat] SHA2-512-ACC
838,700 UART: [kat] ECC-384
3,280,085 UART: [kat] HMAC-384Kdf
3,293,172 UART: [kat] LMS
3,822,646 UART: [kat] --
3,827,567 UART: [cold-reset] ++
3,829,573 UART: [fht] FHT @ 0x50003400
3,840,410 UART: [idev] ++
3,840,980 UART: [idev] CDI.KEYID = 6
3,841,903 UART: [idev] SUBJECT.KEYID = 7
3,843,078 UART: [idev] UDS.KEYID = 0
3,844,133 ready_for_fw is high
3,844,375 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,886 UART: [idev] Erasing UDS.KEYID = 0
6,316,810 UART: [idev] Sha1 KeyId Algorithm
6,338,758 UART: [idev] --
6,342,641 UART: [ldev] ++
6,343,206 UART: [ldev] CDI.KEYID = 6
6,344,086 UART: [ldev] SUBJECT.KEYID = 5
6,345,342 UART: [ldev] AUTHORITY.KEYID = 7
6,346,551 UART: [ldev] FE.KEYID = 1
6,358,147 UART: [ldev] Erasing FE.KEYID = 1
8,833,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,155 UART: [ldev] --
10,624,714 UART: [fwproc] Wait for Commands...
10,626,538 UART: [fwproc] Recv command 0x46574c44
10,628,631 UART: [fwproc] Recv'd Img size: 114168 bytes
14,032,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,492,348 >>> mbox cmd response: success
14,497,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,641,581 UART: [afmc] ++
14,642,237 UART: [afmc] CDI.KEYID = 6
14,643,160 UART: [afmc] SUBJECT.KEYID = 7
14,644,209 UART: [afmc] AUTHORITY.KEYID = 5
17,000,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,608 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,446 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,628 UART: [afmc] --
18,794,010 UART: [cold-reset] --
18,798,955 UART: [state] Locking Datavault
18,802,902 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,547 UART: [state] Locking ICCM
18,806,856 UART: [exit] Launching FMC @ 0x40000130
18,815,253 UART:
18,815,499 UART: Running Caliptra FMC ...
18,816,605 UART:
18,816,761 UART: [state] CFI Enabled
18,825,142 UART: [fht] FMC Alias Private Key: 7
20,582,852 UART: [art] Extend RT PCRs Done
20,584,102 UART: [art] Lock RT PCRs Done
20,585,746 UART: [art] Populate DV Done
20,591,074 UART: [fht] FMC Alias Private Key: 7
20,592,620 UART: [art] Derive CDI
20,593,362 UART: [art] Store in in slot 0x4
20,635,898 UART: [art] Derive Key Pair
20,636,899 UART: [art] Store priv key in slot 0x5
23,063,708 UART: [art] Derive Key Pair - Done
23,076,527 UART: [art] Signing Cert with AUTHO
23,077,854 UART: RITY.KEYID = 7
24,782,968 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,480 UART: [art] PUB.X = EA43CDA7CF8ECEA1136DD531BB6A1455F81D4088B0AA130196BB48E2C5168987AC56E28B4FE634761407C6AA2CC8C700
24,791,743 UART: [art] PUB.Y = 852B0A063F44BBD05767932FF0E4E7536F8982CA94BF5DEE741A2967ACEA46F157196F54792B5F311F2AE81B62419A6E
24,798,982 UART: [art] SIG.R = 10868BD034057D4B6F1A32DF1CFE13C737DBA0C5C652A242C4C8BD1FD2A30D2CF333B326C2053D0DEE0D46EAABA313E4
24,806,376 UART: [art] SIG.S = 6E8FE36E4820619908A440E2C1E130A9B88811488D623FF69684E8DDE8CDB215A6F6C06B3D400B1B8F406BBAEA5DDCF1
25,785,149 UART: Caliptra RT
25,785,854 UART: [state] CFI Enabled
25,903,128 UART: [rt] RT listening for mailbox commands...
25,906,023 UART:
25,906,273 UART: Running Caliptra ROM ...
25,907,387 UART:
25,907,549 UART: [state] CFI Enabled
25,920,736 UART: [state] LifecycleState = Unprovisioned
25,922,573 UART: [state] DebugLocked = No
25,925,354 UART: [state] WD Timer not started. Device not locked for debugging
25,928,767 UART: [kat] SHA2-256
26,107,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,119,545 UART: [kat] ++
26,120,092 UART: [kat] sha1
26,131,531 UART: [kat] SHA2-256
26,134,555 UART: [kat] SHA2-384
26,142,220 UART: [kat] SHA2-512-ACC
26,145,164 UART: [kat] ECC-384
28,584,232 UART: [kat] HMAC-384Kdf
28,595,885 UART: [kat] LMS
29,125,435 UART: [kat] --
29,129,528 UART: [update-reset] ++
32,559,193 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,562,798 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
32,945,099 >>> mbox cmd response: success
32,946,326 UART: [update-reset] Copying MAN_2 To MAN_1
32,968,669 UART: [update-reset Success] --
32,973,818 UART: [state] Locking Datavault
32,977,392 UART: [state] Locking PCR0, PCR1 and PCR31
32,979,087 UART: [state] Locking ICCM
32,980,516 UART: [exit] Launching FMC @ 0x40000130
32,988,911 UART:
32,989,183 UART: Running Caliptra FMC ...
32,990,215 UART:
32,990,384 UART: [state] CFI Enabled
33,034,242 UART: [art] Extend RT PCRs Done
33,035,393 UART: [art] Lock RT PCRs Done
33,037,139 UART: [art] Populate DV Done
33,042,597 UART: [fht] FMC Alias Private Key: 7
33,044,241 UART: [art] Derive CDI
33,044,980 UART: [art] Store in in slot 0x4
33,087,745 UART: [art] Derive Key Pair
33,088,787 UART: [art] Store priv key in slot 0x5
35,515,179 UART: [art] Derive Key Pair - Done
35,528,398 UART: [art] Signing Cert with AUTHO
35,529,704 UART: RITY.KEYID = 7
37,235,271 UART: [art] Erasing AUTHORITY.KEYID = 7
37,236,777 UART: [art] PUB.X = A8B7681057210BEBE7489830818B138EF4D5DE8F10769BE2899103CE93A5A36EBFF22D32D14F2B56F23E2FE41146F75D
37,244,032 UART: [art] PUB.Y = E18FA3FC61249C5B3DB1EBE7C6666B20DB8EA4A45F0BA86DD4D6FF26CD49D704A3CE256F0B9A78A964ED8836E5A5F39E
37,251,340 UART: [art] SIG.R = 22956365614D75786E9909E3D5A2ADE4EDC54DA9C6DECE3876CD2985846998B65FC97635B79910EBC53D7714EEFB9D7C
37,258,707 UART: [art] SIG.S = C1F90FE3E2200E19DDC4D02A2B301146E59F0AD85C6D072C28329A6B36BDE98E021DBC4F8816EFE0771482D98F212708
38,237,870 UART: Caliptra RT
38,238,572 UART: [state] CFI Enabled
38,528,969 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,283 writing to cptra_bootfsm_go
3,696,505 ready_for_fw is high
3,696,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,017 >>> mbox cmd response: success
14,277,285 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,524,673 UART:
18,525,073 UART: Running Caliptra FMC ...
18,526,201 UART:
18,526,359 UART: [state] CFI Enabled
18,534,629 UART: [fht] FMC Alias Private Key: 7
20,291,401 UART: [art] Extend RT PCRs Done
20,292,627 UART: [art] Lock RT PCRs Done
20,294,255 UART: [art] Populate DV Done
20,299,665 UART: [fht] FMC Alias Private Key: 7
20,301,365 UART: [art] Derive CDI
20,302,104 UART: [art] Store in in slot 0x4
20,344,467 UART: [art] Derive Key Pair
20,345,504 UART: [art] Store priv key in slot 0x5
22,772,407 UART: [art] Derive Key Pair - Done
22,785,128 UART: [art] Signing Cert with AUTHO
22,786,436 UART: RITY.KEYID = 7
24,492,214 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,717 UART: [art] PUB.X = EB8CF6AB03AE59657B28CB1F3B54EA99E794000FAED2E111FA13026A8E699BF201719A9F8493A91771A83A6C16D7E7BD
24,500,968 UART: [art] PUB.Y = 9EAACB653021CDA0F7F34732E1FEA628DAE671E57DB72F37C9BB5E1F8C8D76ADA8CB26AB3AEB612EB2A6108022762291
24,508,241 UART: [art] SIG.R = 71243F2DD8A3D7E6FD4BF0DCCBB6D61AA9888D27809842A46AFAFAC5AF3FABA47E26783DDE932278E80D5E0EDEEE14E0
24,515,694 UART: [art] SIG.S = 1274ABFFF760D260587E47606D367C020FEC45D67A908B0671452AA141FEF895992E2E65D461DEAA9386ACD1EE7C7B26
25,495,172 UART: Caliptra RT
25,495,899 UART: [state] CFI Enabled
25,613,286 UART: [rt] RT listening for mailbox commands...
32,509,518 >>> mbox cmd response: success
32,543,808 UART:
32,544,077 UART: Running Caliptra FMC ...
32,545,193 UART:
32,545,373 UART: [state] CFI Enabled
32,589,334 UART: [art] Extend RT PCRs Done
32,590,514 UART: [art] Lock RT PCRs Done
32,592,032 UART: [art] Populate DV Done
32,597,530 UART: [fht] FMC Alias Private Key: 7
32,599,123 UART: [art] Derive CDI
32,599,891 UART: [art] Store in in slot 0x4
32,642,457 UART: [art] Derive Key Pair
32,643,459 UART: [art] Store priv key in slot 0x5
35,070,104 UART: [art] Derive Key Pair - Done
35,083,053 UART: [art] Signing Cert with AUTHO
35,084,368 UART: RITY.KEYID = 7
36,789,743 UART: [art] Erasing AUTHORITY.KEYID = 7
36,791,248 UART: [art] PUB.X = DC2D3272987B993AD61B352B37C22AAEE98BF17232DFB622372C6FF88FDBAE59657E225789BAFAC1DF10A456E83B9847
36,798,499 UART: [art] PUB.Y = 82EE43CCFA825538356F3E34AD68C6F1A1423C2DB2537CF625F97DF017C714372A822D0E79529A5DC8DBF2265DD9549C
36,805,782 UART: [art] SIG.R = DDCD8707D31D4694CA45BD823EF537EF9313198A36D09CF0B2692CC36760AD56C12F656FA0BACD81AB0988DCB04D5F36
36,813,213 UART: [art] SIG.S = 66D297E709008074EE58729590ACA48CCE9406EDC192B80A00F1B3DB334AFA2696AA2DF506617D6CE828ECDEBCC3ACCA
37,791,901 UART: Caliptra RT
37,792,604 UART: [state] CFI Enabled
38,079,088 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,221 UART:
192,601 UART: Running Caliptra ROM ...
193,808 UART:
193,985 UART: [state] CFI Enabled
263,565 UART: [state] LifecycleState = Unprovisioned
266,068 UART: [state] DebugLocked = No
268,673 UART: [state] WD Timer not started. Device not locked for debugging
273,997 UART: [kat] SHA2-256
463,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,668 UART: [kat] ++
475,149 UART: [kat] sha1
486,953 UART: [kat] SHA2-256
489,972 UART: [kat] SHA2-384
497,100 UART: [kat] SHA2-512-ACC
499,685 UART: [kat] ECC-384
2,947,969 UART: [kat] HMAC-384Kdf
2,972,819 UART: [kat] LMS
3,504,538 UART: [kat] --
3,509,493 UART: [cold-reset] ++
3,511,960 UART: [fht] FHT @ 0x50003400
3,522,940 UART: [idev] ++
3,523,576 UART: [idev] CDI.KEYID = 6
3,524,608 UART: [idev] SUBJECT.KEYID = 7
3,525,783 UART: [idev] UDS.KEYID = 0
3,526,727 ready_for_fw is high
3,526,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,681 UART: [idev] Erasing UDS.KEYID = 0
6,031,331 UART: [idev] Sha1 KeyId Algorithm
6,054,097 UART: [idev] --
6,058,274 UART: [ldev] ++
6,058,960 UART: [ldev] CDI.KEYID = 6
6,059,894 UART: [ldev] SUBJECT.KEYID = 5
6,061,058 UART: [ldev] AUTHORITY.KEYID = 7
6,062,295 UART: [ldev] FE.KEYID = 1
6,101,477 UART: [ldev] Erasing FE.KEYID = 1
8,606,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,061 UART: [ldev] --
10,415,662 UART: [fwproc] Wait for Commands...
10,417,647 UART: [fwproc] Recv command 0x46574c44
10,419,899 UART: [fwproc] Recv'd Img size: 114168 bytes
13,867,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,680 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,606,021 >>> mbox cmd response: success
14,606,592 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,750,866 UART: [afmc] ++
14,751,519 UART: [afmc] CDI.KEYID = 6
14,752,434 UART: [afmc] SUBJECT.KEYID = 7
14,753,488 UART: [afmc] AUTHORITY.KEYID = 5
17,151,011 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,881,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,883,372 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,898,537 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,913,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,928,673 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,951,591 UART: [afmc] --
18,955,067 UART: [cold-reset] --
18,958,995 UART: [state] Locking Datavault
18,964,143 UART: [state] Locking PCR0, PCR1 and PCR31
18,966,289 UART: [state] Locking ICCM
18,967,963 UART: [exit] Launching FMC @ 0x40000130
18,976,594 UART:
18,976,827 UART: Running Caliptra FMC ...
18,977,876 UART:
18,978,026 UART: [state] CFI Enabled
19,039,476 UART: [fht] FMC Alias Private Key: 7
20,803,691 UART: [art] Extend RT PCRs Done
20,804,908 UART: [art] Lock RT PCRs Done
20,806,557 UART: [art] Populate DV Done
20,812,073 UART: [fht] FMC Alias Private Key: 7
20,813,614 UART: [art] Derive CDI
20,814,349 UART: [art] Store in in slot 0x4
20,872,060 UART: [art] Derive Key Pair
20,873,097 UART: [art] Store priv key in slot 0x5
23,335,860 UART: [art] Derive Key Pair - Done
23,348,734 UART: [art] Signing Cert with AUTHO
23,350,071 UART: RITY.KEYID = 7
25,061,493 UART: [art] Erasing AUTHORITY.KEYID = 7
25,062,999 UART: [art] PUB.X = EA65214019EE942C4480F9F7F7C1985A02624871BAE95181BB92781065D05C7E7ECEE53DB7821AFC32DB9187DDF08C45
25,070,294 UART: [art] PUB.Y = 1179F9AC331D2A51D19CCCE22909095EF41A8D8DCF1D89343AF52E2B0AF11A43455F0C993CB6BCB64467730010B34FD2
25,077,548 UART: [art] SIG.R = 9BE745FCBC44BE44598E51803353EC73D1F9303831EB88B58915AE6D01EC759294507C286C168DE231F54A73F404E4A7
25,084,909 UART: [art] SIG.S = 40253C2C08C5E321253A434D5E1700F9E5BE48946B555A398AC7F57A727E4AD86ABAF0E908AD5CD13D9203A26342D4A0
26,063,883 UART: Caliptra RT
26,064,579 UART: [state] CFI Enabled
26,228,937 UART: [rt] RT listening for mailbox commands...
26,232,395 UART:
26,232,643 UART: Running Caliptra ROM ...
26,233,748 UART:
26,233,905 UART: [state] CFI Enabled
26,299,102 UART: [state] LifecycleState = Unprovisioned
26,301,160 UART: [state] DebugLocked = No
26,302,862 UART: [state] WD Timer not started. Device not locked for debugging
26,308,280 UART: [kat] SHA2-256
26,498,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,508,941 UART: [kat] ++
26,509,443 UART: [kat] sha1
26,520,174 UART: [kat] SHA2-256
26,523,198 UART: [kat] SHA2-384
26,529,033 UART: [kat] SHA2-512-ACC
26,531,606 UART: [kat] ECC-384
28,980,355 UART: [kat] HMAC-384Kdf
29,004,450 UART: [kat] LMS
29,536,018 UART: [kat] --
29,539,684 UART: [update-reset] ++
33,000,711 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,003,676 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
33,610,252 >>> mbox cmd response: success
33,611,487 UART: [update-reset] Copying MAN_2 To MAN_1
33,649,062 UART: [update-reset Success] --
33,653,513 UART: [state] Locking Datavault
33,656,894 UART: [state] Locking PCR0, PCR1 and PCR31
33,659,054 UART: [state] Locking ICCM
33,661,895 UART: [exit] Launching FMC @ 0x40000130
33,670,528 UART:
33,670,800 UART: Running Caliptra FMC ...
33,671,829 UART:
33,671,977 UART: [state] CFI Enabled
33,771,167 UART: [art] Extend RT PCRs Done
33,772,352 UART: [art] Lock RT PCRs Done
33,774,013 UART: [art] Populate DV Done
33,779,370 UART: [fht] FMC Alias Private Key: 7
33,780,961 UART: [art] Derive CDI
33,781,772 UART: [art] Store in in slot 0x4
33,840,645 UART: [art] Derive Key Pair
33,841,681 UART: [art] Store priv key in slot 0x5
36,304,130 UART: [art] Derive Key Pair - Done
36,317,127 UART: [art] Signing Cert with AUTHO
36,318,477 UART: RITY.KEYID = 7
38,029,322 UART: [art] Erasing AUTHORITY.KEYID = 7
38,030,834 UART: [art] PUB.X = B273678D1EA5E534EC3C045B9EC0FFA1B691D29457CB6F45A3E3984E96E376CD247F410012A57095AEEB5C462351DD1E
38,038,056 UART: [art] PUB.Y = 88DFACAFB64030466BB2FBBC40931BFD944893B1ED3AF9BADE2870E817D142FB951342D38C746BF875417EACB7AD4C80
38,045,320 UART: [art] SIG.R = 91689C3A6DE13FB0F5A58C287DC7A40E178884EEAB5D9C0A7A6E919F60EA96A009C0CF1EF915A9F636D339ACED1A1CE7
38,052,744 UART: [art] SIG.S = E6D3B645C9D293ABDC530FF2CD992A0E457F1BFBF2A600CD7C04400BA7BAB8A032D408E330E363B0928DB5ED86F8D046
39,031,764 UART: Caliptra RT
39,032,483 UART: [state] CFI Enabled
39,366,682 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,438,832 ready_for_fw is high
3,439,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,763,924 >>> mbox cmd response: success
14,764,510 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,059,090 UART:
19,059,507 UART: Running Caliptra FMC ...
19,060,739 UART:
19,060,916 UART: [state] CFI Enabled
19,127,013 UART: [fht] FMC Alias Private Key: 7
20,890,968 UART: [art] Extend RT PCRs Done
20,892,198 UART: [art] Lock RT PCRs Done
20,893,504 UART: [art] Populate DV Done
20,898,757 UART: [fht] FMC Alias Private Key: 7
20,900,300 UART: [art] Derive CDI
20,901,115 UART: [art] Store in in slot 0x4
20,959,284 UART: [art] Derive Key Pair
20,960,322 UART: [art] Store priv key in slot 0x5
23,423,485 UART: [art] Derive Key Pair - Done
23,436,380 UART: [art] Signing Cert with AUTHO
23,437,681 UART: RITY.KEYID = 7
25,148,464 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,967 UART: [art] PUB.X = D2106917DBBAFBCA8333EA8202891CF28DF65B814D731ADB148DFAF418040F6CCBC72A28B786CDE407A9C158A457C876
25,157,263 UART: [art] PUB.Y = A48B0AC91198773F7204FF7C1BF0C64075FE829052B4CC7312CC5D07BFF317EE76884E9CD5461377995EB3C39B1749BB
25,164,487 UART: [art] SIG.R = 8E2D6A842EDA2B6EC8FDAEA02B4842671ADAA9273CFDDDE0A3152283C9A929B8FBDBC0730EEF3A99DD46219FF5B924A4
25,171,947 UART: [art] SIG.S = F54E97924C9A231D815FD1D39934B530DE01784FD0231798CA2BC708FF52AF33ECC9296115DF9F792E9030B2E3BCB2D1
26,151,061 UART: Caliptra RT
26,151,780 UART: [state] CFI Enabled
26,315,841 UART: [rt] RT listening for mailbox commands...
33,962,704 >>> mbox cmd response: success
33,996,053 UART:
33,996,378 UART: Running Caliptra FMC ...
33,997,420 UART:
33,997,568 UART: [state] CFI Enabled
34,104,477 UART: [art] Extend RT PCRs Done
34,105,665 UART: [art] Lock RT PCRs Done
34,107,252 UART: [art] Populate DV Done
34,112,611 UART: [fht] FMC Alias Private Key: 7
34,114,148 UART: [art] Derive CDI
34,114,882 UART: [art] Store in in slot 0x4
34,173,325 UART: [art] Derive Key Pair
34,174,361 UART: [art] Store priv key in slot 0x5
36,637,278 UART: [art] Derive Key Pair - Done
36,650,323 UART: [art] Signing Cert with AUTHO
36,651,623 UART: RITY.KEYID = 7
38,362,570 UART: [art] Erasing AUTHORITY.KEYID = 7
38,364,082 UART: [art] PUB.X = 336EA4AA4C0D1B1A40F95A359576E44B4DB8697FD681A49082352C3AFEB8493B2B99C626B20A7118A0D354B7F6285980
38,371,329 UART: [art] PUB.Y = 470C8B1515C1077812909EA62D5F50C0C8F5D467A28569472E9E9836D517A11B90370584FC4EB7A52E6C7E86C8E4B155
38,378,549 UART: [art] SIG.R = 00A77191ECE68A924B46BBBA241F8114E511F68EA2673F6AE221906531793AA3638FDADB4113F81A469B7C76ED493A00
38,385,896 UART: [art] SIG.S = E342E17FA731056D65E4C0F40787650F7BB72DB1794895CCDA9A8CBFF0BAFC1B06C486EF629A8658F190111E155AE533
39,364,916 UART: Caliptra RT
39,365,605 UART: [state] CFI Enabled
39,701,187 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,849 writing to cptra_bootfsm_go
192,945 UART:
193,310 UART: Running Caliptra ROM ...
194,436 UART:
604,114 UART: [state] CFI Enabled
617,583 UART: [state] LifecycleState = Unprovisioned
619,912 UART: [state] DebugLocked = No
622,790 UART: [state] WD Timer not started. Device not locked for debugging
627,031 UART: [kat] SHA2-256
816,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,689 UART: [kat] ++
828,299 UART: [kat] sha1
839,750 UART: [kat] SHA2-256
842,829 UART: [kat] SHA2-384
849,100 UART: [kat] SHA2-512-ACC
851,689 UART: [kat] ECC-384
3,295,153 UART: [kat] HMAC-384Kdf
3,307,693 UART: [kat] LMS
3,839,493 UART: [kat] --
3,843,278 UART: [cold-reset] ++
3,845,212 UART: [fht] FHT @ 0x50003400
3,856,758 UART: [idev] ++
3,857,394 UART: [idev] CDI.KEYID = 6
3,858,428 UART: [idev] SUBJECT.KEYID = 7
3,859,489 UART: [idev] UDS.KEYID = 0
3,860,482 ready_for_fw is high
3,860,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,219 UART: [idev] Erasing UDS.KEYID = 0
6,337,635 UART: [idev] Sha1 KeyId Algorithm
6,359,736 UART: [idev] --
6,365,888 UART: [ldev] ++
6,366,624 UART: [ldev] CDI.KEYID = 6
6,367,534 UART: [ldev] SUBJECT.KEYID = 5
6,368,701 UART: [ldev] AUTHORITY.KEYID = 7
6,369,886 UART: [ldev] FE.KEYID = 1
6,380,402 UART: [ldev] Erasing FE.KEYID = 1
8,861,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,733 UART: [ldev] --
10,652,033 UART: [fwproc] Wait for Commands...
10,654,348 UART: [fwproc] Recv command 0x46574c44
10,656,603 UART: [fwproc] Recv'd Img size: 114168 bytes
14,105,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,847,015 >>> mbox cmd response: success
14,847,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,991,621 UART: [afmc] ++
14,992,259 UART: [afmc] CDI.KEYID = 6
14,993,156 UART: [afmc] SUBJECT.KEYID = 7
14,994,266 UART: [afmc] AUTHORITY.KEYID = 5
17,354,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,239 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,582 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,614 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,408 UART: [afmc] --
19,150,603 UART: [cold-reset] --
19,152,793 UART: [state] Locking Datavault
19,159,018 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,189 UART: [state] Locking ICCM
19,164,213 UART: [exit] Launching FMC @ 0x40000130
19,172,834 UART:
19,173,068 UART: Running Caliptra FMC ...
19,174,100 UART:
19,174,253 UART: [state] CFI Enabled
19,182,492 UART: [fht] FMC Alias Private Key: 7
20,940,109 UART: [art] Extend RT PCRs Done
20,941,343 UART: [art] Lock RT PCRs Done
20,943,166 UART: [art] Populate DV Done
20,948,473 UART: [fht] FMC Alias Private Key: 7
20,950,227 UART: [art] Derive CDI
20,950,970 UART: [art] Store in in slot 0x4
20,993,683 UART: [art] Derive Key Pair
20,994,723 UART: [art] Store priv key in slot 0x5
23,421,644 UART: [art] Derive Key Pair - Done
23,434,650 UART: [art] Signing Cert with AUTHO
23,436,138 UART: RITY.KEYID = 7
25,141,161 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,669 UART: [art] PUB.X = A415E6C6D5D0948B9B0D851ACE1592F7AAEFDD05A2778152F4FC304FB46452A640E401D40AADB065DE1F7752A5D9459E
25,149,922 UART: [art] PUB.Y = 8FAF2891E26C2DE96FEF51FEE27B7B477324B1A85EBEE106A651AABEB123C3B3888205D33C203A9EE2D2F174E16C7D1E
25,157,215 UART: [art] SIG.R = 79FB8EB524F9D19C720D0ADF9EDDC00848D3EDA3E5066F67844562121CB0A192329082176ECD675C7D16B9C06A8682D4
25,164,607 UART: [art] SIG.S = 954B5C27A1CE46A48501469414D04D1F2574305ED0E975DF665C6D5310FDB0DC2324F280A93913E69AAE6BCB0DC8A261
26,142,919 UART: Caliptra RT
26,143,620 UART: [state] CFI Enabled
26,261,343 UART: [rt] RT listening for mailbox commands...
26,264,295 UART:
26,264,547 UART: Running Caliptra ROM ...
26,265,581 UART:
26,265,953 UART: [state] CFI Enabled
26,278,445 UART: [state] LifecycleState = Unprovisioned
26,280,269 UART: [state] DebugLocked = No
26,281,808 UART: [state] WD Timer not started. Device not locked for debugging
26,286,802 UART: [kat] SHA2-256
26,476,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,487,424 UART: [kat] ++
26,488,022 UART: [kat] sha1
26,500,002 UART: [kat] SHA2-256
26,502,979 UART: [kat] SHA2-384
26,509,345 UART: [kat] SHA2-512-ACC
26,511,915 UART: [kat] ECC-384
28,955,909 UART: [kat] HMAC-384Kdf
28,968,786 UART: [kat] LMS
29,500,375 UART: [kat] --
29,505,572 UART: [update-reset] ++
32,962,825 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,965,815 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
33,572,381 >>> mbox cmd response: success
33,574,272 UART: [update-reset] Copying MAN_2 To MAN_1
33,611,790 UART: [update-reset Success] --
33,615,522 UART: [state] Locking Datavault
33,619,162 UART: [state] Locking PCR0, PCR1 and PCR31
33,621,359 UART: [state] Locking ICCM
33,623,516 UART: [exit] Launching FMC @ 0x40000130
33,632,190 UART:
33,632,426 UART: Running Caliptra FMC ...
33,633,455 UART:
33,633,608 UART: [state] CFI Enabled
33,677,889 UART: [art] Extend RT PCRs Done
33,679,068 UART: [art] Lock RT PCRs Done
33,680,450 UART: [art] Populate DV Done
33,686,352 UART: [fht] FMC Alias Private Key: 7
33,687,996 UART: [art] Derive CDI
33,688,736 UART: [art] Store in in slot 0x4
33,731,088 UART: [art] Derive Key Pair
33,732,096 UART: [art] Store priv key in slot 0x5
36,159,085 UART: [art] Derive Key Pair - Done
36,171,999 UART: [art] Signing Cert with AUTHO
36,173,307 UART: RITY.KEYID = 7
37,878,775 UART: [art] Erasing AUTHORITY.KEYID = 7
37,880,281 UART: [art] PUB.X = 675A5C05358515293979C5731D2C6AFBAE6CBF9678F10FE823CC9891DCD4E31F0FFC3BF451AD38BA4C52D53AB5CDECAC
37,887,592 UART: [art] PUB.Y = 35CD3E03B582A2C85200B0F28E9CE512273912FD4F0E83B99F3AE65FA5554457A1E23EF70AB690ADDFFB61388B041524
37,894,827 UART: [art] SIG.R = E28516593273F6369F62E274E9F86EBDE4EAA3EE586D8FBB4066EE8255ED327D42B7E655CE14E822F8FC283A17A3C0B8
37,902,222 UART: [art] SIG.S = A817DE2C922DFDC0991410D25F1F8937F8EF90C11F624FC609E703A74A73E78D5AFD732AABECC072A8A8094AAAB235B2
38,881,149 UART: Caliptra RT
38,881,833 UART: [state] CFI Enabled
39,168,157 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,611 writing to cptra_bootfsm_go
3,756,439 ready_for_fw is high
3,756,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,971,038 >>> mbox cmd response: success
14,971,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,219,267 UART:
19,219,669 UART: Running Caliptra FMC ...
19,220,905 UART:
19,221,108 UART: [state] CFI Enabled
19,228,783 UART: [fht] FMC Alias Private Key: 7
20,985,894 UART: [art] Extend RT PCRs Done
20,987,115 UART: [art] Lock RT PCRs Done
20,988,688 UART: [art] Populate DV Done
20,994,364 UART: [fht] FMC Alias Private Key: 7
20,995,912 UART: [art] Derive CDI
20,996,680 UART: [art] Store in in slot 0x4
21,039,168 UART: [art] Derive Key Pair
21,040,178 UART: [art] Store priv key in slot 0x5
23,466,996 UART: [art] Derive Key Pair - Done
23,479,783 UART: [art] Signing Cert with AUTHO
23,481,089 UART: RITY.KEYID = 7
25,186,706 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,206 UART: [art] PUB.X = 6ECC045AB7BB41977BD6ADBD7653027F84DC0351106E5F2CFC084350C29E8DFD7A5A9EADF8B2F1C447D0CDE1062E0334
25,195,453 UART: [art] PUB.Y = CE3CBF05260D137D9E02A97C1819276F69F7B1F1F46377A5934C919E47937A9CE53B12EEBB8452698098C4EFBA343F90
25,202,737 UART: [art] SIG.R = 910F85F24A711901F6E6D664555184C9067E59E14435015CD5F1E5290EA6EEAD427C4E9C16B5D799A3AB74CEAFCCACE9
25,210,303 UART: [art] SIG.S = 6C01C42361A96D3AB38472B4F214E8237045C7BED9CBB0C35EF5D739CF820CE0423460BCC2A1CB99E06415C57D559D70
26,189,233 UART: Caliptra RT
26,189,949 UART: [state] CFI Enabled
26,307,876 UART: [rt] RT listening for mailbox commands...
33,905,651 >>> mbox cmd response: success
33,937,201 UART:
33,937,502 UART: Running Caliptra FMC ...
33,938,542 UART:
33,938,697 UART: [state] CFI Enabled
33,982,993 UART: [art] Extend RT PCRs Done
33,984,145 UART: [art] Lock RT PCRs Done
33,985,682 UART: [art] Populate DV Done
33,991,214 UART: [fht] FMC Alias Private Key: 7
33,992,869 UART: [art] Derive CDI
33,993,606 UART: [art] Store in in slot 0x4
34,036,284 UART: [art] Derive Key Pair
34,037,333 UART: [art] Store priv key in slot 0x5
36,464,545 UART: [art] Derive Key Pair - Done
36,477,495 UART: [art] Signing Cert with AUTHO
36,478,811 UART: RITY.KEYID = 7
38,184,221 UART: [art] Erasing AUTHORITY.KEYID = 7
38,185,726 UART: [art] PUB.X = 81391691F628DF6353AB7C34B1EEE1F78231F3EBC89366A3C04DD35576C5692539DFA1D4647C02D41C34F693C1629380
38,192,974 UART: [art] PUB.Y = DB4347F5CEBDC8207C13CC19E0F078D6740243BA925EE24E29509A89703C2B7920173DEAA17F8ED4224C8CF045D15D8A
38,200,259 UART: [art] SIG.R = 6F753300F424659966B60AE3A0E319CDE58354D4F695BEE08CE9A55E69AC66085D3CC96D653954A74F49ED1A2856251B
38,207,591 UART: [art] SIG.S = 11A4DD7FDD95A3C4B7CBC7D5027983E1452596851ED4DDA0655B3761CE72326CD9D1E3668C4ABEE8AAAE091ED05DE08F
39,185,804 UART: Caliptra RT
39,186,510 UART: [state] CFI Enabled
39,473,301 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
895,212 UART: [kat] SHA2-512-ACC
897,113 UART: [kat] ECC-384
902,570 UART: [kat] HMAC-384Kdf
907,078 UART: [kat] LMS
1,475,274 UART: [kat] --
1,476,335 UART: [cold-reset] ++
1,476,749 UART: [fht] Storing FHT @ 0x50003400
1,479,556 UART: [idev] ++
1,479,724 UART: [idev] CDI.KEYID = 6
1,480,084 UART: [idev] SUBJECT.KEYID = 7
1,480,508 UART: [idev] UDS.KEYID = 0
1,480,853 ready_for_fw is high
1,480,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,505,178 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,800 UART: [idev] --
1,514,831 UART: [ldev] ++
1,514,999 UART: [ldev] CDI.KEYID = 6
1,515,362 UART: [ldev] SUBJECT.KEYID = 5
1,515,788 UART: [ldev] AUTHORITY.KEYID = 7
1,516,251 UART: [ldev] FE.KEYID = 1
1,521,501 UART: [ldev] Erasing FE.KEYID = 1
1,546,948 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,574 UART: [ldev] --
1,585,947 UART: [fwproc] Waiting for Commands...
1,586,666 UART: [fwproc] Received command 0x46574c44
1,587,457 UART: [fwproc] Received Image of size 114168 bytes
2,882,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,160 >>> mbox cmd response: success
3,075,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,076,334 UART: [afmc] ++
3,076,502 UART: [afmc] CDI.KEYID = 6
3,076,864 UART: [afmc] SUBJECT.KEYID = 7
3,077,289 UART: [afmc] AUTHORITY.KEYID = 5
3,111,842 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,292 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,685 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,375 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,198 UART: [afmc] --
3,155,194 UART: [cold-reset] --
3,156,098 UART: [state] Locking Datavault
3,157,123 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,727 UART: [state] Locking ICCM
3,158,273 UART: [exit] Launching FMC @ 0x40000130
3,163,602 UART:
3,163,618 UART: Running Caliptra FMC ...
3,164,026 UART:
3,164,080 UART: [state] CFI Enabled
3,175,053 UART: [fht] FMC Alias Private Key: 7
3,282,426 UART: [art] Extend RT PCRs Done
3,282,854 UART: [art] Lock RT PCRs Done
3,284,238 UART: [art] Populate DV Done
3,292,581 UART: [fht] FMC Alias Private Key: 7
3,293,725 UART: [art] Derive CDI
3,294,005 UART: [art] Store in in slot 0x4
3,380,138 UART: [art] Derive Key Pair
3,380,498 UART: [art] Store priv key in slot 0x5
3,393,312 UART: [art] Derive Key Pair - Done
3,408,181 UART: [art] Signing Cert with AUTHO
3,408,661 UART: RITY.KEYID = 7
3,424,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,156 UART: [art] PUB.X = E29A3A908BCD523116468537108185DD9730FF921D2A1A9D5F37595067F9AF5715199FADD30F1E55B38915162A193C8B
3,431,917 UART: [art] PUB.Y = 318272C3FE22E5AA53505088E08F4A875FB8A95BA64BA909E688965735ABF1A31E4D4E74B9A3C896D25450E3FD74DA71
3,438,868 UART: [art] SIG.R = B8DD4F157C6E46D03CCACB70F2EBD702D15B50F089434BA0D188EBD8C7D1CB469BCADF420AD63D97C56FF4DAAA726E3B
3,445,662 UART: [art] SIG.S = A74A8FE0C1732FB794445C659B7F2351A79736FBBCC4FAAC253566C158C05AC0DCFCD175BD90BE8052136E14BF2921D4
3,469,761 UART: Caliptra RT
3,470,014 UART: [state] CFI Enabled
3,578,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,805 UART:
3,580,821 UART: Running Caliptra ROM ...
3,581,229 UART:
3,581,283 UART: [state] CFI Enabled
3,584,059 UART: [state] LifecycleState = Unprovisioned
3,584,714 UART: [state] DebugLocked = No
3,585,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,586,843 UART: [kat] SHA2-256
4,380,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,384,889 UART: [kat] ++
4,385,041 UART: [kat] sha1
4,389,199 UART: [kat] SHA2-256
4,391,137 UART: [kat] SHA2-384
4,394,014 UART: [kat] SHA2-512-ACC
4,395,914 UART: [kat] ECC-384
4,401,395 UART: [kat] HMAC-384Kdf
4,405,947 UART: [kat] LMS
4,974,143 UART: [kat] --
4,974,718 UART: [update-reset] ++
6,308,008 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,309,104 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,458,734 >>> mbox cmd response: success
6,459,011 UART: [update-reset] Copying MAN_2 To MAN_1
6,467,025 UART: [update-reset Success] --
6,467,828 UART: [state] Locking Datavault
6,468,510 UART: [state] Locking PCR0, PCR1 and PCR31
6,469,114 UART: [state] Locking ICCM
6,469,778 UART: [exit] Launching FMC @ 0x40000130
6,475,107 UART:
6,475,123 UART: Running Caliptra FMC ...
6,475,531 UART:
6,475,585 UART: [state] CFI Enabled
6,564,612 UART: [art] Extend RT PCRs Done
6,565,040 UART: [art] Lock RT PCRs Done
6,566,419 UART: [art] Populate DV Done
6,574,616 UART: [fht] FMC Alias Private Key: 7
6,575,730 UART: [art] Derive CDI
6,576,010 UART: [art] Store in in slot 0x4
6,661,561 UART: [art] Derive Key Pair
6,661,921 UART: [art] Store priv key in slot 0x5
6,674,841 UART: [art] Derive Key Pair - Done
6,689,379 UART: [art] Signing Cert with AUTHO
6,689,859 UART: RITY.KEYID = 7
6,705,073 UART: [art] Erasing AUTHORITY.KEYID = 7
6,705,838 UART: [art] PUB.X = 8DA126C0C6EA183FB0D9BFBF11E476E0087C7F5E3362BF8FCA9D5E662F4696E611B8795C72F9D4B07A8FB5F2C9DD9351
6,712,621 UART: [art] PUB.Y = 529F7C06CF3B9D1D5B5C07D3DC27A1B526A5607C3E229C63B26EE9C0BA20210966F86556AFCEC22D28F28B31F2684B9D
6,719,572 UART: [art] SIG.R = 9BA0E891DF71527F92D6A863F9DD479A73A9285BBF960B6DC118F215FA9B7FB62B12BE0B147303F23EFE94FB941082CC
6,726,345 UART: [art] SIG.S = A9B551454047BC30305FC7A4D25ACD467DDA9C77B7C44ADF66BFAEAC9C4E8C7601C964B38335E0EAAFDBEE272DC20FA3
6,750,072 UART: Caliptra RT
6,750,325 UART: [state] CFI Enabled
7,032,703 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 ready_for_fw is high
1,362,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,840 >>> mbox cmd response: success
2,926,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,988,048 UART:
2,988,064 UART: Running Caliptra FMC ...
2,988,472 UART:
2,988,526 UART: [state] CFI Enabled
2,999,195 UART: [fht] FMC Alias Private Key: 7
3,107,286 UART: [art] Extend RT PCRs Done
3,107,714 UART: [art] Lock RT PCRs Done
3,109,124 UART: [art] Populate DV Done
3,117,091 UART: [fht] FMC Alias Private Key: 7
3,118,043 UART: [art] Derive CDI
3,118,323 UART: [art] Store in in slot 0x4
3,204,172 UART: [art] Derive Key Pair
3,204,532 UART: [art] Store priv key in slot 0x5
3,218,022 UART: [art] Derive Key Pair - Done
3,232,809 UART: [art] Signing Cert with AUTHO
3,233,289 UART: RITY.KEYID = 7
3,248,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,202 UART: [art] PUB.X = C6191E5913AFB1FCF77494E95B3B75B7DE2D3E625ED4A174C27CFD907A7F01DBE99C1BC3DB7C2EE256A32801D35CD217
3,255,984 UART: [art] PUB.Y = 72397D4EFD8F195EF8A955BA92FFBDA89F5BE7558C42C7E3B02C48748AF5E92E8BAA6C572591F230944A6DDCF84F998B
3,262,950 UART: [art] SIG.R = F981D36A5B0FE95E404AC4D0AC175C95014505EDE9BBAF5626223C5889283ABA7D3DFC3840F283E0083B914C758A8DC9
3,269,716 UART: [art] SIG.S = 3C2D307FCC0559F3CD52C6E4636F09E2A7F02282275717808F0251F493AE56946B07CA419479340CFE02502BAF4FC346
3,293,757 UART: Caliptra RT
3,294,010 UART: [state] CFI Enabled
3,401,315 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,162,071 >>> mbox cmd response: success
6,175,436 UART:
6,175,452 UART: Running Caliptra FMC ...
6,175,860 UART:
6,175,914 UART: [state] CFI Enabled
6,264,917 UART: [art] Extend RT PCRs Done
6,265,345 UART: [art] Lock RT PCRs Done
6,266,452 UART: [art] Populate DV Done
6,275,021 UART: [fht] FMC Alias Private Key: 7
6,276,021 UART: [art] Derive CDI
6,276,301 UART: [art] Store in in slot 0x4
6,361,828 UART: [art] Derive Key Pair
6,362,188 UART: [art] Store priv key in slot 0x5
6,375,100 UART: [art] Derive Key Pair - Done
6,389,755 UART: [art] Signing Cert with AUTHO
6,390,235 UART: RITY.KEYID = 7
6,405,853 UART: [art] Erasing AUTHORITY.KEYID = 7
6,406,618 UART: [art] PUB.X = 103D8EBB5E630D17354E7C65E47A3C30CA0FBC6A1A9EA1919AF8F078C028B5593846330FE53C86216DC498D370069637
6,413,376 UART: [art] PUB.Y = 03FDA5A4A65B785E7AEBC67E35C2EA33245962B94536BBA9D4518D45D15BB1A55E30623ECACB9C4382AAAFBC3BBF8A2D
6,420,347 UART: [art] SIG.R = FEAE369A13FC1ED5B63AAF906185E1FF375BCE18895099A2C160A3AD1E9F10F44C3711B55D076657DAF627C7619FC112
6,427,124 UART: [art] SIG.S = D174277D2AD4FE89DA4BD6C772B7528F54487C179D67C79BC4A4C712811F2305D8F2BB84783937CD8EB3440343BEA468
6,450,755 UART: Caliptra RT
6,451,008 UART: [state] CFI Enabled
6,736,818 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,079 UART: [state] LifecycleState = Unprovisioned
86,734 UART: [state] DebugLocked = No
87,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,952 UART: [kat] SHA2-256
882,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,998 UART: [kat] ++
887,150 UART: [kat] sha1
891,336 UART: [kat] SHA2-256
893,274 UART: [kat] SHA2-384
896,145 UART: [kat] SHA2-512-ACC
898,046 UART: [kat] ECC-384
903,557 UART: [kat] HMAC-384Kdf
908,139 UART: [kat] LMS
1,476,335 UART: [kat] --
1,477,308 UART: [cold-reset] ++
1,477,774 UART: [fht] Storing FHT @ 0x50003400
1,480,601 UART: [idev] ++
1,480,769 UART: [idev] CDI.KEYID = 6
1,481,129 UART: [idev] SUBJECT.KEYID = 7
1,481,553 UART: [idev] UDS.KEYID = 0
1,481,898 ready_for_fw is high
1,481,898 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,549 UART: [idev] Erasing UDS.KEYID = 0
1,506,417 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,913 UART: [idev] --
1,515,984 UART: [ldev] ++
1,516,152 UART: [ldev] CDI.KEYID = 6
1,516,515 UART: [ldev] SUBJECT.KEYID = 5
1,516,941 UART: [ldev] AUTHORITY.KEYID = 7
1,517,404 UART: [ldev] FE.KEYID = 1
1,522,646 UART: [ldev] Erasing FE.KEYID = 1
1,548,437 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,613 UART: [ldev] --
1,587,888 UART: [fwproc] Waiting for Commands...
1,588,577 UART: [fwproc] Received command 0x46574c44
1,589,368 UART: [fwproc] Received Image of size 114168 bytes
2,886,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,862 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,214 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,079,877 >>> mbox cmd response: success
3,079,877 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,080,955 UART: [afmc] ++
3,081,123 UART: [afmc] CDI.KEYID = 6
3,081,485 UART: [afmc] SUBJECT.KEYID = 7
3,081,910 UART: [afmc] AUTHORITY.KEYID = 5
3,117,647 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,134,021 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,134,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,140,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,146,414 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,152,104 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,160,127 UART: [afmc] --
3,161,233 UART: [cold-reset] --
3,162,109 UART: [state] Locking Datavault
3,162,970 UART: [state] Locking PCR0, PCR1 and PCR31
3,163,574 UART: [state] Locking ICCM
3,164,126 UART: [exit] Launching FMC @ 0x40000130
3,169,455 UART:
3,169,471 UART: Running Caliptra FMC ...
3,169,879 UART:
3,170,022 UART: [state] CFI Enabled
3,180,677 UART: [fht] FMC Alias Private Key: 7
3,288,514 UART: [art] Extend RT PCRs Done
3,288,942 UART: [art] Lock RT PCRs Done
3,290,544 UART: [art] Populate DV Done
3,298,789 UART: [fht] FMC Alias Private Key: 7
3,299,737 UART: [art] Derive CDI
3,300,017 UART: [art] Store in in slot 0x4
3,385,676 UART: [art] Derive Key Pair
3,386,036 UART: [art] Store priv key in slot 0x5
3,399,228 UART: [art] Derive Key Pair - Done
3,414,093 UART: [art] Signing Cert with AUTHO
3,414,573 UART: RITY.KEYID = 7
3,430,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,880 UART: [art] PUB.X = 1875CFE707F357FBA865454615E2BEBCD9AC8E0EF0CB2E49B576E38B894475E6B348300896F195190C225D97E34FB800
3,437,618 UART: [art] PUB.Y = 5317F0FFFB398387F8D258BD7E1593231F76C999640B11BDBB10E6900094C04848ECABD796240092E6FCCDBB3CDFAC9C
3,444,533 UART: [art] SIG.R = A2574EA98B05C92E4936E6C9513AD2359C266ADECD3B9A6EE97107F51E3BF0B978464D11836293996ACF8A5CF5737BD5
3,451,303 UART: [art] SIG.S = 468B0B2F3A5BFE724FC2722FED7CC6BCDE31E3F6BE8A1DFB21A6120D8677AB2A4B8E8620BADE44E46C6B3A61FC32ABBA
3,475,296 UART: Caliptra RT
3,475,641 UART: [state] CFI Enabled
3,583,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,525 UART:
3,585,541 UART: Running Caliptra ROM ...
3,585,949 UART:
3,586,090 UART: [state] CFI Enabled
3,588,876 UART: [state] LifecycleState = Unprovisioned
3,589,531 UART: [state] DebugLocked = No
3,590,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,591,848 UART: [kat] SHA2-256
4,385,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,894 UART: [kat] ++
4,390,046 UART: [kat] sha1
4,394,360 UART: [kat] SHA2-256
4,396,298 UART: [kat] SHA2-384
4,398,823 UART: [kat] SHA2-512-ACC
4,400,723 UART: [kat] ECC-384
4,406,688 UART: [kat] HMAC-384Kdf
4,411,254 UART: [kat] LMS
4,979,450 UART: [kat] --
4,980,389 UART: [update-reset] ++
6,313,587 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,314,793 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,464,423 >>> mbox cmd response: success
6,464,630 UART: [update-reset] Copying MAN_2 To MAN_1
6,472,644 UART: [update-reset Success] --
6,473,541 UART: [state] Locking Datavault
6,474,491 UART: [state] Locking PCR0, PCR1 and PCR31
6,475,095 UART: [state] Locking ICCM
6,475,573 UART: [exit] Launching FMC @ 0x40000130
6,480,902 UART:
6,480,918 UART: Running Caliptra FMC ...
6,481,326 UART:
6,481,469 UART: [state] CFI Enabled
6,570,990 UART: [art] Extend RT PCRs Done
6,571,418 UART: [art] Lock RT PCRs Done
6,572,649 UART: [art] Populate DV Done
6,580,758 UART: [fht] FMC Alias Private Key: 7
6,581,686 UART: [art] Derive CDI
6,581,966 UART: [art] Store in in slot 0x4
6,667,643 UART: [art] Derive Key Pair
6,668,003 UART: [art] Store priv key in slot 0x5
6,681,509 UART: [art] Derive Key Pair - Done
6,696,613 UART: [art] Signing Cert with AUTHO
6,697,093 UART: RITY.KEYID = 7
6,712,553 UART: [art] Erasing AUTHORITY.KEYID = 7
6,713,318 UART: [art] PUB.X = 977F27278D5D57C06F3F449385A717963570C507CE190D0080F00FF62A7258E6BA8B9E586EC02BD8BFE3EA875494261A
6,720,055 UART: [art] PUB.Y = 3D64A658358C87ED2C383F530DDD61D25C32F1B9AC0C0C8226FD90CC6773CA687E88DACDE1AE0AAA6B7DFA4F5B6BB5CB
6,727,021 UART: [art] SIG.R = 9F7C7E0B48FFEDAD977D86CE15C9E8461F737807458F27F63F1DC7BA87A87893906A9B5D0F56AD56C4A0D4C7A94843C7
6,733,792 UART: [art] SIG.S = E58068BE657EB93AB006BE665638B3611B48DBB0B130AC2AD0DEEF16984099A8AA0897F2978734E33EAA3D915699D180
6,757,255 UART: Caliptra RT
6,757,600 UART: [state] CFI Enabled
7,040,874 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,424 ready_for_fw is high
1,362,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,311 >>> mbox cmd response: success
2,926,311 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,987,463 UART:
2,987,479 UART: Running Caliptra FMC ...
2,987,887 UART:
2,988,030 UART: [state] CFI Enabled
2,998,683 UART: [fht] FMC Alias Private Key: 7
3,106,548 UART: [art] Extend RT PCRs Done
3,106,976 UART: [art] Lock RT PCRs Done
3,108,268 UART: [art] Populate DV Done
3,116,749 UART: [fht] FMC Alias Private Key: 7
3,117,741 UART: [art] Derive CDI
3,118,021 UART: [art] Store in in slot 0x4
3,203,586 UART: [art] Derive Key Pair
3,203,946 UART: [art] Store priv key in slot 0x5
3,217,542 UART: [art] Derive Key Pair - Done
3,231,947 UART: [art] Signing Cert with AUTHO
3,232,427 UART: RITY.KEYID = 7
3,247,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,042 UART: [art] PUB.X = E77F15924EC5F46CBAE1C276C1ABFD862BDED401A72C743038E7A8C5B8F53BF4A1DC6206446E6E38088F50BDBC9E2946
3,254,819 UART: [art] PUB.Y = DB69EF3BB2E79C47772C017353569FC22ECDA2ABD17C830565460779B8334244285AA996896B3A699DB744EE40CFC7B2
3,261,762 UART: [art] SIG.R = 9B6DB5FBE8B9B80C5D3D52957370DAD4EB134DE093FE192A63465819807CEBA038F9351CD6FFC00E3B5A4B5D26B387E8
3,268,540 UART: [art] SIG.S = 7050C85A6322978D9C4A0AD6BE88EDA1A6E14E3B4CF977FE5CCD421EF987EBB1CFF88D25B65FA21D068EDCA87A9F85D6
3,292,205 UART: Caliptra RT
3,292,550 UART: [state] CFI Enabled
3,400,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,161,344 >>> mbox cmd response: success
6,174,753 UART:
6,174,769 UART: Running Caliptra FMC ...
6,175,177 UART:
6,175,320 UART: [state] CFI Enabled
6,264,381 UART: [art] Extend RT PCRs Done
6,264,809 UART: [art] Lock RT PCRs Done
6,266,088 UART: [art] Populate DV Done
6,274,153 UART: [fht] FMC Alias Private Key: 7
6,275,201 UART: [art] Derive CDI
6,275,481 UART: [art] Store in in slot 0x4
6,361,246 UART: [art] Derive Key Pair
6,361,606 UART: [art] Store priv key in slot 0x5
6,374,814 UART: [art] Derive Key Pair - Done
6,389,647 UART: [art] Signing Cert with AUTHO
6,390,127 UART: RITY.KEYID = 7
6,405,119 UART: [art] Erasing AUTHORITY.KEYID = 7
6,405,884 UART: [art] PUB.X = 8081F3D8717B8FAC37989C23BE8782FCC57B470F06472ED7608913F48930C7F550BB5711A69B9D2D696D587D56053A44
6,412,639 UART: [art] PUB.Y = E4A65BCD1EC50D3EA9FDB249438C098D922F32B9720691A72204AC78A3588BE96E435716970616DF7D15F6716C897133
6,419,570 UART: [art] SIG.R = 0D99A5AEB17DFC42B8A2B9670E21D886FEEC1B831363F83421A607D2138FC30DBBE9B8718ED2310E4788A53226D7D3E7
6,426,333 UART: [art] SIG.S = 35F24D7488F07C7800C32329DD3077CE6AA15D6493B84A2FF4E623D6172989E0CB07104E3791414E1F785107B20BAFD0
6,449,867 UART: Caliptra RT
6,450,212 UART: [state] CFI Enabled
6,731,114 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
893,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,479 UART: [kat] ++
897,631 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,670 UART: [kat] SHA2-512-ACC
908,571 UART: [kat] ECC-384
918,282 UART: [kat] HMAC-384Kdf
923,092 UART: [kat] LMS
1,171,420 UART: [kat] --
1,172,313 UART: [cold-reset] ++
1,172,709 UART: [fht] FHT @ 0x50003400
1,175,556 UART: [idev] ++
1,175,724 UART: [idev] CDI.KEYID = 6
1,176,084 UART: [idev] SUBJECT.KEYID = 7
1,176,508 UART: [idev] UDS.KEYID = 0
1,176,853 ready_for_fw is high
1,176,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,428 UART: [idev] Erasing UDS.KEYID = 0
1,201,679 UART: [idev] Sha1 KeyId Algorithm
1,210,061 UART: [idev] --
1,211,293 UART: [ldev] ++
1,211,461 UART: [ldev] CDI.KEYID = 6
1,211,824 UART: [ldev] SUBJECT.KEYID = 5
1,212,250 UART: [ldev] AUTHORITY.KEYID = 7
1,212,713 UART: [ldev] FE.KEYID = 1
1,217,701 UART: [ldev] Erasing FE.KEYID = 1
1,243,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,999 UART: [ldev] --
1,283,330 UART: [fwproc] Wait for Commands...
1,284,108 UART: [fwproc] Recv command 0x46574c44
1,284,836 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,698 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,149 >>> mbox cmd response: success
2,774,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,775,329 UART: [afmc] ++
2,775,497 UART: [afmc] CDI.KEYID = 6
2,775,859 UART: [afmc] SUBJECT.KEYID = 7
2,776,284 UART: [afmc] AUTHORITY.KEYID = 5
2,811,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,844 UART: [afmc] --
2,854,834 UART: [cold-reset] --
2,855,648 UART: [state] Locking Datavault
2,856,823 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,427 UART: [state] Locking ICCM
2,858,009 UART: [exit] Launching FMC @ 0x40000130
2,863,338 UART:
2,863,354 UART: Running Caliptra FMC ...
2,863,762 UART:
2,863,816 UART: [state] CFI Enabled
2,874,219 UART: [fht] FMC Alias Private Key: 7
2,982,304 UART: [art] Extend RT PCRs Done
2,982,732 UART: [art] Lock RT PCRs Done
2,984,434 UART: [art] Populate DV Done
2,992,819 UART: [fht] FMC Alias Private Key: 7
2,993,933 UART: [art] Derive CDI
2,994,213 UART: [art] Store in in slot 0x4
3,079,852 UART: [art] Derive Key Pair
3,080,212 UART: [art] Store priv key in slot 0x5
3,093,246 UART: [art] Derive Key Pair - Done
3,108,049 UART: [art] Signing Cert with AUTHO
3,108,529 UART: RITY.KEYID = 7
3,123,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,554 UART: [art] PUB.X = 31B2D6A08B2E8F652252687ACD07EAF36935C2309E3F4FFB147AD0416CFB9263CE1921424072FB3E03F279A76D9FBE0F
3,131,323 UART: [art] PUB.Y = 3C678E8F33386C3F3FACC01F689FC4A256A8237D0636F54120663618B0D02C0F4AEBD3BC8034E79E37C6419F637E31ED
3,138,271 UART: [art] SIG.R = BFC9338B369233581B5FAEC43D5E60DBEAFE4C2E64C485D7A2778E89434FE10D73802564CEC81318374985AF2524CA6F
3,145,044 UART: [art] SIG.S = 2C2B52D139F98E0C3682ADF5B20DBD2882B2205BD2958D0B4C12FB9442DF5AEAE79352B4BC6ADBDB9C0C5B69A7470DD8
3,168,998 UART: Caliptra RT
3,169,251 UART: [state] CFI Enabled
3,277,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,480 UART:
3,279,496 UART: Running Caliptra ROM ...
3,279,904 UART:
3,279,959 UART: [state] CFI Enabled
3,282,661 UART: [state] LifecycleState = Unprovisioned
3,283,316 UART: [state] DebugLocked = No
3,283,906 UART: [state] WD Timer not started. Device not locked for debugging
3,285,066 UART: [kat] SHA2-256
4,090,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,841 UART: [kat] ++
4,094,993 UART: [kat] sha1
4,099,367 UART: [kat] SHA2-256
4,101,307 UART: [kat] SHA2-384
4,103,868 UART: [kat] SHA2-512-ACC
4,105,768 UART: [kat] ECC-384
4,115,293 UART: [kat] HMAC-384Kdf
4,119,769 UART: [kat] LMS
4,368,097 UART: [kat] --
4,368,821 UART: [update-reset] ++
5,678,351 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,679,348 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,828,926 >>> mbox cmd response: success
5,829,247 UART: [update-reset] Copying MAN_2 To MAN_1
5,837,261 UART: [update-reset Success] --
5,838,232 UART: [state] Locking Datavault
5,838,968 UART: [state] Locking PCR0, PCR1 and PCR31
5,839,572 UART: [state] Locking ICCM
5,840,230 UART: [exit] Launching FMC @ 0x40000130
5,845,559 UART:
5,845,575 UART: Running Caliptra FMC ...
5,845,983 UART:
5,846,037 UART: [state] CFI Enabled
5,934,984 UART: [art] Extend RT PCRs Done
5,935,412 UART: [art] Lock RT PCRs Done
5,936,613 UART: [art] Populate DV Done
5,944,720 UART: [fht] FMC Alias Private Key: 7
5,945,780 UART: [art] Derive CDI
5,946,060 UART: [art] Store in in slot 0x4
6,031,577 UART: [art] Derive Key Pair
6,031,937 UART: [art] Store priv key in slot 0x5
6,045,449 UART: [art] Derive Key Pair - Done
6,060,142 UART: [art] Signing Cert with AUTHO
6,060,622 UART: RITY.KEYID = 7
6,075,360 UART: [art] Erasing AUTHORITY.KEYID = 7
6,076,125 UART: [art] PUB.X = 19BB2D5C377373F94F20E75F86936203906A0B50742D1004B26183694E5D0321A7E7ACE3F1D9727A7607B8FC5F6A9E21
6,082,874 UART: [art] PUB.Y = 634D18BBFE8E7909DC724852151FA23D712629CFEED348994954F85D43AC951795AADE38E855B3E06CAE1FA5542895F3
6,089,825 UART: [art] SIG.R = C5FC4933A78A9720791EBB90D133D39CBC6A9372D7F4CE138D61655A7A07F79E68F0501033F840A848241BD221CF9BE4
6,096,594 UART: [art] SIG.S = CAFE7770ECE71C3F9A703AA4C80132C8413F7E490A87B2E6CD8E01B92E964B227E4FB895284B68AE36994458DECB6575
6,120,356 UART: Caliptra RT
6,120,609 UART: [state] CFI Enabled
6,403,151 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,347 ready_for_fw is high
1,061,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,810 >>> mbox cmd response: success
2,623,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,685,848 UART:
2,685,864 UART: Running Caliptra FMC ...
2,686,272 UART:
2,686,326 UART: [state] CFI Enabled
2,696,719 UART: [fht] FMC Alias Private Key: 7
2,804,890 UART: [art] Extend RT PCRs Done
2,805,318 UART: [art] Lock RT PCRs Done
2,806,794 UART: [art] Populate DV Done
2,814,855 UART: [fht] FMC Alias Private Key: 7
2,815,917 UART: [art] Derive CDI
2,816,197 UART: [art] Store in in slot 0x4
2,901,814 UART: [art] Derive Key Pair
2,902,174 UART: [art] Store priv key in slot 0x5
2,915,162 UART: [art] Derive Key Pair - Done
2,930,070 UART: [art] Signing Cert with AUTHO
2,930,550 UART: RITY.KEYID = 7
2,945,710 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,475 UART: [art] PUB.X = F40CB7750C589E32A233111F6129B1137133D5A344D14C5E421788E5CF0E8AC8CAFB9A353EE21B3E5DCF4581E22144A3
2,953,240 UART: [art] PUB.Y = 338096C458D9B0684206CB01E5E36673F90258FAB80C6EA7C332ED79B84C6BF95B6615725D08BD18959E92FCE71B7459
2,960,173 UART: [art] SIG.R = CB87D56E208457BA4D18B6F133DA6A555E3DBDC57D38CEC41807EE08C2A69027C06E7B5996AA8980F0AC51E01439A552
2,966,945 UART: [art] SIG.S = 7B00C6E9D7806516458C92AA17F5651C8E060505E25B52E7D852E93EBE71A0DD698A8628AD0D9FAB97DA3836A9142AC9
2,990,034 UART: Caliptra RT
2,990,287 UART: [state] CFI Enabled
3,098,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,535,701 >>> mbox cmd response: success
5,549,327 UART:
5,549,343 UART: Running Caliptra FMC ...
5,549,751 UART:
5,549,805 UART: [state] CFI Enabled
5,638,210 UART: [art] Extend RT PCRs Done
5,638,638 UART: [art] Lock RT PCRs Done
5,640,095 UART: [art] Populate DV Done
5,648,448 UART: [fht] FMC Alias Private Key: 7
5,649,418 UART: [art] Derive CDI
5,649,698 UART: [art] Store in in slot 0x4
5,735,375 UART: [art] Derive Key Pair
5,735,735 UART: [art] Store priv key in slot 0x5
5,749,127 UART: [art] Derive Key Pair - Done
5,763,936 UART: [art] Signing Cert with AUTHO
5,764,416 UART: RITY.KEYID = 7
5,779,930 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,695 UART: [art] PUB.X = D22A87550ED63A6FF6729CAA960254170D30DA52BE22346278EA933A5FBD48A28A7E96DB0F6C6B3B8A8B14A98ACB6827
5,787,463 UART: [art] PUB.Y = 3A687F20931B810F3B7259E35239935AD8B95FE91FDFC994E45D1C0EDFEEFC3EE5C95A87568BFE14D973751004C26565
5,794,410 UART: [art] SIG.R = 5C87C217DD88B6396C0507AF4777D8C7FF23228D77BC0B083735443DD35FD5CA081E8BBF1B1AC885AE747BC5C66C80A8
5,801,175 UART: [art] SIG.S = 61A1E59B027D19D280F64B0A4154DEBEA5469CE2C175FE5C48B091CCCE990D0B8E6C8A6475D12638E6ACFEB9919F48A1
5,825,018 UART: Caliptra RT
5,825,271 UART: [state] CFI Enabled
6,107,900 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,126 UART: [kat] SHA2-256
904,066 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,663 UART: [kat] HMAC-384Kdf
923,415 UART: [kat] LMS
1,171,743 UART: [kat] --
1,172,408 UART: [cold-reset] ++
1,172,900 UART: [fht] FHT @ 0x50003400
1,175,525 UART: [idev] ++
1,175,693 UART: [idev] CDI.KEYID = 6
1,176,053 UART: [idev] SUBJECT.KEYID = 7
1,176,477 UART: [idev] UDS.KEYID = 0
1,176,822 ready_for_fw is high
1,176,822 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,707 UART: [idev] Erasing UDS.KEYID = 0
1,202,462 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,782 UART: [ldev] ++
1,211,950 UART: [ldev] CDI.KEYID = 6
1,212,313 UART: [ldev] SUBJECT.KEYID = 5
1,212,739 UART: [ldev] AUTHORITY.KEYID = 7
1,213,202 UART: [ldev] FE.KEYID = 1
1,218,556 UART: [ldev] Erasing FE.KEYID = 1
1,245,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,878 UART: [ldev] --
1,284,233 UART: [fwproc] Wait for Commands...
1,284,851 UART: [fwproc] Recv command 0x46574c44
1,285,579 UART: [fwproc] Recv'd Img size: 114168 bytes
2,583,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,198 >>> mbox cmd response: success
2,775,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,776,290 UART: [afmc] ++
2,776,458 UART: [afmc] CDI.KEYID = 6
2,776,820 UART: [afmc] SUBJECT.KEYID = 7
2,777,245 UART: [afmc] AUTHORITY.KEYID = 5
2,812,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,095 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,571 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,885 UART: [afmc] --
2,855,947 UART: [cold-reset] --
2,856,801 UART: [state] Locking Datavault
2,857,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,298 UART: [state] Locking ICCM
2,858,852 UART: [exit] Launching FMC @ 0x40000130
2,864,181 UART:
2,864,197 UART: Running Caliptra FMC ...
2,864,605 UART:
2,864,748 UART: [state] CFI Enabled
2,875,151 UART: [fht] FMC Alias Private Key: 7
2,983,398 UART: [art] Extend RT PCRs Done
2,983,826 UART: [art] Lock RT PCRs Done
2,985,510 UART: [art] Populate DV Done
2,993,651 UART: [fht] FMC Alias Private Key: 7
2,994,727 UART: [art] Derive CDI
2,995,007 UART: [art] Store in in slot 0x4
3,080,610 UART: [art] Derive Key Pair
3,080,970 UART: [art] Store priv key in slot 0x5
3,093,862 UART: [art] Derive Key Pair - Done
3,108,477 UART: [art] Signing Cert with AUTHO
3,108,957 UART: RITY.KEYID = 7
3,124,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,184 UART: [art] PUB.X = F0F17DBAE9FFB2091FBC2CE0CF7994FFEAA50613FABD0C40F0E0E081E1587D5A9C0118636F8C42C87FDE56837E60AF00
3,131,942 UART: [art] PUB.Y = 029F59258F437F081FE165C241E9F377EE1A15907A79FB53E2628AA3D414D232BACA569D233CEA6051E3A35954944777
3,138,882 UART: [art] SIG.R = 13D5F4B4ECAC1A331901518DFB8098A00D9A6FA31829F18C9382E95C56C5D2D6A75E0753F59F59B40F6896C56EEA5C2A
3,145,648 UART: [art] SIG.S = 62B7F60AF53CA5ADF31DC41205A725EBE8E0E055D71A517E4AABEC3514CE031FEBBBFB5771F5374D76713061631072EA
3,169,100 UART: Caliptra RT
3,169,445 UART: [state] CFI Enabled
3,278,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,452 UART:
3,280,468 UART: Running Caliptra ROM ...
3,280,876 UART:
3,281,018 UART: [state] CFI Enabled
3,284,172 UART: [state] LifecycleState = Unprovisioned
3,284,827 UART: [state] DebugLocked = No
3,285,427 UART: [state] WD Timer not started. Device not locked for debugging
3,286,549 UART: [kat] SHA2-256
4,092,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,096,324 UART: [kat] ++
4,096,476 UART: [kat] sha1
4,100,714 UART: [kat] SHA2-256
4,102,654 UART: [kat] SHA2-384
4,105,363 UART: [kat] SHA2-512-ACC
4,107,263 UART: [kat] ECC-384
4,117,018 UART: [kat] HMAC-384Kdf
4,121,502 UART: [kat] LMS
4,369,830 UART: [kat] --
4,370,816 UART: [update-reset] ++
5,682,854 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,683,827 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,833,405 >>> mbox cmd response: success
5,833,682 UART: [update-reset] Copying MAN_2 To MAN_1
5,841,696 UART: [update-reset Success] --
5,842,769 UART: [state] Locking Datavault
5,843,601 UART: [state] Locking PCR0, PCR1 and PCR31
5,844,205 UART: [state] Locking ICCM
5,844,753 UART: [exit] Launching FMC @ 0x40000130
5,850,082 UART:
5,850,098 UART: Running Caliptra FMC ...
5,850,506 UART:
5,850,649 UART: [state] CFI Enabled
5,940,136 UART: [art] Extend RT PCRs Done
5,940,564 UART: [art] Lock RT PCRs Done
5,941,837 UART: [art] Populate DV Done
5,950,262 UART: [fht] FMC Alias Private Key: 7
5,951,416 UART: [art] Derive CDI
5,951,696 UART: [art] Store in in slot 0x4
6,037,277 UART: [art] Derive Key Pair
6,037,637 UART: [art] Store priv key in slot 0x5
6,050,475 UART: [art] Derive Key Pair - Done
6,065,613 UART: [art] Signing Cert with AUTHO
6,066,093 UART: RITY.KEYID = 7
6,081,151 UART: [art] Erasing AUTHORITY.KEYID = 7
6,081,916 UART: [art] PUB.X = B885E38297BDE34592E826CDC60FBC8DF4B7C8D634B3622EA9074C865D04C16D9D94B7850985F83F2EECC22AA14FE228
6,088,684 UART: [art] PUB.Y = A08ED5F497F02C64B17CC46C2DA63D5C71D29622AE22640717E52C76DB1640C2A2EA4019995400C5F20595584562970C
6,095,597 UART: [art] SIG.R = BBFFC120280A81E243ADA95F891800CD0F98961F36E6E1DA1BFD84FE03048699CA1E34FA72DCE44F940D59B32D05872E
6,102,339 UART: [art] SIG.S = C3603E5425DAE2832449CCA83E17246EF6304CEB3C5CF679B128D9F16422B50192A090B960610F900EFA73532712641B
6,126,157 UART: Caliptra RT
6,126,502 UART: [state] CFI Enabled
6,406,194 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,594 ready_for_fw is high
1,060,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,349 >>> mbox cmd response: success
2,624,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,687,001 UART:
2,687,017 UART: Running Caliptra FMC ...
2,687,425 UART:
2,687,568 UART: [state] CFI Enabled
2,698,143 UART: [fht] FMC Alias Private Key: 7
2,806,334 UART: [art] Extend RT PCRs Done
2,806,762 UART: [art] Lock RT PCRs Done
2,808,288 UART: [art] Populate DV Done
2,816,439 UART: [fht] FMC Alias Private Key: 7
2,817,519 UART: [art] Derive CDI
2,817,799 UART: [art] Store in in slot 0x4
2,903,668 UART: [art] Derive Key Pair
2,904,028 UART: [art] Store priv key in slot 0x5
2,917,262 UART: [art] Derive Key Pair - Done
2,932,180 UART: [art] Signing Cert with AUTHO
2,932,660 UART: RITY.KEYID = 7
2,948,178 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,943 UART: [art] PUB.X = 3004B8FD91A87F8E3E139E1A7536DEA21AB517441583D0DEA6F67515C5416D9CEC64AFAD747BD4EBD71938B5B877FDA1
2,955,724 UART: [art] PUB.Y = 035F6FEC420929A052D5986FE887C5B894541EFC480DBA295956D1017B20B046EF43E8354A00E76711B58A3B2D743350
2,962,634 UART: [art] SIG.R = 385B8A8CF9134548750509929DDA07984A958EC84D378FA66000E8AE6CB95A8257BAC53CEA807B46FCC5D732E22F2F14
2,969,377 UART: [art] SIG.S = CB6F4C4667B5DD20DF9C80436FAF35777E46C6AD493B8E495B9F2870207A76A441696E7F46F4FECEFF91151359406E2F
2,993,056 UART: Caliptra RT
2,993,401 UART: [state] CFI Enabled
3,100,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,538,832 >>> mbox cmd response: success
5,551,990 UART:
5,552,006 UART: Running Caliptra FMC ...
5,552,414 UART:
5,552,557 UART: [state] CFI Enabled
5,642,160 UART: [art] Extend RT PCRs Done
5,642,588 UART: [art] Lock RT PCRs Done
5,643,627 UART: [art] Populate DV Done
5,651,542 UART: [fht] FMC Alias Private Key: 7
5,652,612 UART: [art] Derive CDI
5,652,892 UART: [art] Store in in slot 0x4
5,738,369 UART: [art] Derive Key Pair
5,738,729 UART: [art] Store priv key in slot 0x5
5,752,029 UART: [art] Derive Key Pair - Done
5,766,695 UART: [art] Signing Cert with AUTHO
5,767,175 UART: RITY.KEYID = 7
5,782,173 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,938 UART: [art] PUB.X = 0481453948CD11B1DA143964BDB7514A34BF7C09988510E5B90F94E3B862FD74611E167241CDE61EDAE5BD33A32EB8AB
5,789,705 UART: [art] PUB.Y = 89851F1B6DCA82B4EF80DA1AB1AC8D6040ABD4584D75C4B040F3DC7BB51B48115EE5374DE3F22B3F81BAE995A1EE028D
5,796,672 UART: [art] SIG.R = D5FF6AFF24C6E57F7D880B6B3D271FDA52D753624B533CE0B42F4844B93A69820C1BFD1F8390828C4DC3DA913DCE26DD
5,803,452 UART: [art] SIG.S = 996E7DE745635841F1ED2275A872F6657762F8E1DE7CF891E1CE2095C351AF4FD1C03D1892D8A97D2C48DD890EE04756
5,826,722 UART: Caliptra RT
5,827,067 UART: [state] CFI Enabled
6,108,425 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,696 UART: [kat] SHA2-512-ACC
906,597 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
920,950 UART: [kat] LMS
1,169,262 UART: [kat] --
1,170,225 UART: [cold-reset] ++
1,170,739 UART: [fht] FHT @ 0x50003400
1,173,423 UART: [idev] ++
1,173,591 UART: [idev] CDI.KEYID = 6
1,173,952 UART: [idev] SUBJECT.KEYID = 7
1,174,377 UART: [idev] UDS.KEYID = 0
1,174,723 ready_for_fw is high
1,174,723 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,005 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,984 UART: [ldev] ++
1,209,152 UART: [ldev] CDI.KEYID = 6
1,209,516 UART: [ldev] SUBJECT.KEYID = 5
1,209,943 UART: [ldev] AUTHORITY.KEYID = 7
1,210,406 UART: [ldev] FE.KEYID = 1
1,215,428 UART: [ldev] Erasing FE.KEYID = 1
1,241,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,422 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,339 UART: [fwproc] Recv command 0x46574c44
1,282,072 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,036 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,029 >>> mbox cmd response: success
2,770,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,771,176 UART: [afmc] ++
2,771,344 UART: [afmc] CDI.KEYID = 6
2,771,707 UART: [afmc] SUBJECT.KEYID = 7
2,772,133 UART: [afmc] AUTHORITY.KEYID = 5
2,808,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,169 UART: [afmc] --
2,851,183 UART: [cold-reset] --
2,851,977 UART: [state] Locking Datavault
2,853,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,696 UART: [state] Locking ICCM
2,854,360 UART: [exit] Launching FMC @ 0x40000130
2,859,689 UART:
2,859,705 UART: Running Caliptra FMC ...
2,860,113 UART:
2,860,167 UART: [state] CFI Enabled
2,870,458 UART: [fht] FMC Alias Private Key: 7
2,978,501 UART: [art] Extend RT PCRs Done
2,978,929 UART: [art] Lock RT PCRs Done
2,980,203 UART: [art] Populate DV Done
2,988,298 UART: [fht] FMC Alias Private Key: 7
2,989,438 UART: [art] Derive CDI
2,989,718 UART: [art] Store in in slot 0x4
3,074,925 UART: [art] Derive Key Pair
3,075,285 UART: [art] Store priv key in slot 0x5
3,087,901 UART: [art] Derive Key Pair - Done
3,102,789 UART: [art] Signing Cert with AUTHO
3,103,269 UART: RITY.KEYID = 7
3,118,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,250 UART: [art] PUB.X = 35F0FA08DA3952B9884D43AFD2A1DFA49909490F8892D56D111493E8EAAF1FA749E5198DBD118F58606400EECAFD019E
3,125,996 UART: [art] PUB.Y = 37A6B0ABF45A9D502E64B581259B5181AE399BBF06C0585DD766E29C3EF122054E7D5316502CE3DB04886F6ED819E24F
3,132,941 UART: [art] SIG.R = A8499C114D557C1564AE9684D0A31E73D50121A95F64992091DAF05BED3376F8AC64A222061C546B8CDAA7EE4C727609
3,139,702 UART: [art] SIG.S = 13FFB08E4401B5E00E48C5D27F786A3AEBC842F23134708233679F55DE7B63841706532C4F3EB440B0538750CBDCD82D
3,163,924 UART: Caliptra RT
3,164,177 UART: [state] CFI Enabled
3,271,506 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,273,696 UART:
3,273,712 UART: Running Caliptra ROM ...
3,274,120 UART:
3,274,175 UART: [state] CFI Enabled
3,277,015 UART: [state] LifecycleState = Unprovisioned
3,277,670 UART: [state] DebugLocked = No
3,278,326 UART: [state] WD Timer not started. Device not locked for debugging
3,279,526 UART: [kat] SHA2-256
4,083,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,087,205 UART: [kat] ++
4,087,357 UART: [kat] sha1
4,091,527 UART: [kat] SHA2-256
4,093,467 UART: [kat] SHA2-384
4,096,254 UART: [kat] SHA2-512-ACC
4,098,154 UART: [kat] ECC-384
4,108,045 UART: [kat] HMAC-384Kdf
4,112,559 UART: [kat] LMS
4,360,871 UART: [kat] --
4,361,661 UART: [update-reset] ++
5,672,326 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,673,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,823,009 >>> mbox cmd response: success
5,823,344 UART: [update-reset] Copying MAN_2 To MAN_1
5,831,358 UART: [update-reset Success] --
5,832,543 UART: [state] Locking Datavault
5,833,355 UART: [state] Locking PCR0, PCR1 and PCR31
5,833,959 UART: [state] Locking ICCM
5,834,539 UART: [exit] Launching FMC @ 0x40000130
5,839,868 UART:
5,839,884 UART: Running Caliptra FMC ...
5,840,292 UART:
5,840,346 UART: [state] CFI Enabled
5,929,751 UART: [art] Extend RT PCRs Done
5,930,179 UART: [art] Lock RT PCRs Done
5,931,704 UART: [art] Populate DV Done
5,939,913 UART: [fht] FMC Alias Private Key: 7
5,941,065 UART: [art] Derive CDI
5,941,345 UART: [art] Store in in slot 0x4
6,026,692 UART: [art] Derive Key Pair
6,027,052 UART: [art] Store priv key in slot 0x5
6,039,904 UART: [art] Derive Key Pair - Done
6,054,609 UART: [art] Signing Cert with AUTHO
6,055,089 UART: RITY.KEYID = 7
6,070,601 UART: [art] Erasing AUTHORITY.KEYID = 7
6,071,366 UART: [art] PUB.X = AA720D646EEBC2C23CE176B5DB9482D374DE565BD6698F3E0D163A14912293F1361DD2375C190286A9146733C3AD6514
6,078,125 UART: [art] PUB.Y = C5A07DB18B34ACFE6A06D3CD7AF20A7ECC155664886C3BA5F62668A10292E606960C41EA0A3F54E7656D26F4C9538B62
6,085,065 UART: [art] SIG.R = 25BCC357E5E8CE98F2A820FF4075EF446FA8B473924E9547792C2B36D257E09C061F6310BF95F95E1F01063089FD0CBD
6,091,827 UART: [art] SIG.S = 5CD413CB8DB25833B975935B7DBF9402652BB19D722E830DD55C815ECB1F4991F52C28F54461C22BF8DDB2A161BAD9DF
6,116,082 UART: Caliptra RT
6,116,335 UART: [state] CFI Enabled
6,397,224 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,440 ready_for_fw is high
1,055,440 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,551 >>> mbox cmd response: success
2,619,551 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,681,849 UART:
2,681,865 UART: Running Caliptra FMC ...
2,682,273 UART:
2,682,327 UART: [state] CFI Enabled
2,692,604 UART: [fht] FMC Alias Private Key: 7
2,800,349 UART: [art] Extend RT PCRs Done
2,800,777 UART: [art] Lock RT PCRs Done
2,802,397 UART: [art] Populate DV Done
2,810,954 UART: [fht] FMC Alias Private Key: 7
2,811,884 UART: [art] Derive CDI
2,812,164 UART: [art] Store in in slot 0x4
2,898,217 UART: [art] Derive Key Pair
2,898,577 UART: [art] Store priv key in slot 0x5
2,911,667 UART: [art] Derive Key Pair - Done
2,926,610 UART: [art] Signing Cert with AUTHO
2,927,090 UART: RITY.KEYID = 7
2,942,234 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,999 UART: [art] PUB.X = B58B1C877B9CA02C4174A10A8135CEC7BDEFC5D3EE8EDFF1670C72AA4258C333545A036E6BA269BE0FED39F3AC17FDBF
2,949,783 UART: [art] PUB.Y = F93E03FD288FFF22064D8E97E97FDBA1DC0841840DFFFE119BCD0CB9937912550E080B1144E0EB38B4E72DB3B7DB9922
2,956,723 UART: [art] SIG.R = A8CFA5BCF4E1355AE97F17A15E5A5300D04F9F18B524EC54CE294C571089E9DD4C85696D98FE83E73EA9B671E05C0D4C
2,963,482 UART: [art] SIG.S = C438258EC1A01DCE77609D9625E30F169036D92CEB797240CCB56977F7C1B1BB02C0C0CFABFDE04C5CF1124CFB6C744C
2,987,503 UART: Caliptra RT
2,987,756 UART: [state] CFI Enabled
3,096,402 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,529,090 >>> mbox cmd response: success
5,542,408 UART:
5,542,424 UART: Running Caliptra FMC ...
5,542,832 UART:
5,542,886 UART: [state] CFI Enabled
5,631,603 UART: [art] Extend RT PCRs Done
5,632,031 UART: [art] Lock RT PCRs Done
5,633,464 UART: [art] Populate DV Done
5,641,419 UART: [fht] FMC Alias Private Key: 7
5,642,561 UART: [art] Derive CDI
5,642,841 UART: [art] Store in in slot 0x4
5,728,732 UART: [art] Derive Key Pair
5,729,092 UART: [art] Store priv key in slot 0x5
5,742,142 UART: [art] Derive Key Pair - Done
5,756,841 UART: [art] Signing Cert with AUTHO
5,757,321 UART: RITY.KEYID = 7
5,772,533 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,298 UART: [art] PUB.X = AC7E5740049FC71616E82B381FB7450144FBA892799D34C3A046708D9D8F8B5CB97CCF99A1F6803FE21DA4494FE0E671
5,780,066 UART: [art] PUB.Y = 7F518B15A67F370723AB7434BD5E4AA9934175A71B08AD13D03865694EC5177A407ABA72638FCF1FBF8D20B7AD2CCFAA
5,787,022 UART: [art] SIG.R = 1CE2A82DD64EA47290BE9AC063D410840C3B835B1969695D337B84DB8547EE7FF7D01E56B117ED8C7D7732B28390097E
5,793,788 UART: [art] SIG.S = DD6AC0C84B2225D6BE9CBE1B00261712943AF3BE4AE0B92F2642DE492414A734C74C73E09F494EF46C726B098AB6512E
5,817,602 UART: Caliptra RT
5,817,855 UART: [state] CFI Enabled
6,100,384 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,320 UART: [kat] SHA2-256
902,260 UART: [kat] SHA2-384
905,145 UART: [kat] SHA2-512-ACC
907,046 UART: [kat] ECC-384
916,749 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,174,582 ready_for_fw is high
1,174,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,199,648 UART: [idev] Sha1 KeyId Algorithm
1,208,656 UART: [idev] --
1,209,791 UART: [ldev] ++
1,209,959 UART: [ldev] CDI.KEYID = 6
1,210,323 UART: [ldev] SUBJECT.KEYID = 5
1,210,750 UART: [ldev] AUTHORITY.KEYID = 7
1,211,213 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,979 UART: [ldev] --
1,282,377 UART: [fwproc] Wait for Commands...
1,283,026 UART: [fwproc] Recv command 0x46574c44
1,283,759 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,606 >>> mbox cmd response: success
2,772,606 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,773,657 UART: [afmc] ++
2,773,825 UART: [afmc] CDI.KEYID = 6
2,774,188 UART: [afmc] SUBJECT.KEYID = 7
2,774,614 UART: [afmc] AUTHORITY.KEYID = 5
2,810,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,238 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,957 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,898 UART: [afmc] --
2,853,880 UART: [cold-reset] --
2,854,680 UART: [state] Locking Datavault
2,855,989 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,593 UART: [state] Locking ICCM
2,857,049 UART: [exit] Launching FMC @ 0x40000130
2,862,378 UART:
2,862,394 UART: Running Caliptra FMC ...
2,862,802 UART:
2,862,945 UART: [state] CFI Enabled
2,873,764 UART: [fht] FMC Alias Private Key: 7
2,981,773 UART: [art] Extend RT PCRs Done
2,982,201 UART: [art] Lock RT PCRs Done
2,983,463 UART: [art] Populate DV Done
2,991,546 UART: [fht] FMC Alias Private Key: 7
2,992,698 UART: [art] Derive CDI
2,992,978 UART: [art] Store in in slot 0x4
3,078,403 UART: [art] Derive Key Pair
3,078,763 UART: [art] Store priv key in slot 0x5
3,092,025 UART: [art] Derive Key Pair - Done
3,106,944 UART: [art] Signing Cert with AUTHO
3,107,424 UART: RITY.KEYID = 7
3,123,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,833 UART: [art] PUB.X = BC2DBB80B8873598DC5535857A69AF320A01CEA8C3B4149A285BE0CED24CEBDCE61C845C68D0D43C2FB45060AF65DBC7
3,130,617 UART: [art] PUB.Y = 999033B8C95B5C7E226A4F56E604F7D3C85F5E76D9C5F78137327A6D010D9703D8B0789DECAC294B6908C3E0B3F3D70D
3,137,553 UART: [art] SIG.R = 84750BC0A56A477FD355F0E2AA07638B8F315D5255DADBDE78E76FD150724C3CBA72D1A0F246753377333CBE87067715
3,144,316 UART: [art] SIG.S = 8BB157DCDD89445C0BA9E4FB32E9E115561A9DB3CF8D80686F792E960A81040899C595EA81E1AB73281870284CCDC8BD
3,168,491 UART: Caliptra RT
3,168,836 UART: [state] CFI Enabled
3,277,288 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,376 UART:
3,279,392 UART: Running Caliptra ROM ...
3,279,800 UART:
3,279,942 UART: [state] CFI Enabled
3,282,686 UART: [state] LifecycleState = Unprovisioned
3,283,341 UART: [state] DebugLocked = No
3,284,021 UART: [state] WD Timer not started. Device not locked for debugging
3,285,301 UART: [kat] SHA2-256
4,088,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,092,980 UART: [kat] ++
4,093,132 UART: [kat] sha1
4,097,192 UART: [kat] SHA2-256
4,099,132 UART: [kat] SHA2-384
4,102,013 UART: [kat] SHA2-512-ACC
4,103,913 UART: [kat] ECC-384
4,113,764 UART: [kat] HMAC-384Kdf
4,118,494 UART: [kat] LMS
4,366,806 UART: [kat] --
4,367,840 UART: [update-reset] ++
5,678,234 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,679,265 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,828,843 >>> mbox cmd response: success
5,829,142 UART: [update-reset] Copying MAN_2 To MAN_1
5,837,156 UART: [update-reset Success] --
5,838,005 UART: [state] Locking Datavault
5,838,805 UART: [state] Locking PCR0, PCR1 and PCR31
5,839,409 UART: [state] Locking ICCM
5,840,027 UART: [exit] Launching FMC @ 0x40000130
5,845,356 UART:
5,845,372 UART: Running Caliptra FMC ...
5,845,780 UART:
5,845,923 UART: [state] CFI Enabled
5,934,844 UART: [art] Extend RT PCRs Done
5,935,272 UART: [art] Lock RT PCRs Done
5,936,499 UART: [art] Populate DV Done
5,944,720 UART: [fht] FMC Alias Private Key: 7
5,945,874 UART: [art] Derive CDI
5,946,154 UART: [art] Store in in slot 0x4
6,032,031 UART: [art] Derive Key Pair
6,032,391 UART: [art] Store priv key in slot 0x5
6,045,617 UART: [art] Derive Key Pair - Done
6,060,690 UART: [art] Signing Cert with AUTHO
6,061,170 UART: RITY.KEYID = 7
6,077,024 UART: [art] Erasing AUTHORITY.KEYID = 7
6,077,789 UART: [art] PUB.X = 577AB15918AD6C3D1D55DD027C127DF88D8A273C6380BD48AA78F0CD160EAA008ED40AE66398491464EF48AD45A707C0
6,084,533 UART: [art] PUB.Y = 001384CA036D0DFC59389F1923C8308F33AB1409A6F7A03C335DC8A6DCEF38E905BAB74A8CE1AA93E86B43FCA642D786
6,091,461 UART: [art] SIG.R = 0F7A3E67BF0B8510AEAB18EAFFFF32E96615BCF3BE3108BE9D429A4E54132E53938E159ECB7E031E33957C8A0C4C8192
6,098,230 UART: [art] SIG.S = 030660225D42F0B7A8B5D58622871CA37CABA0CF21A3C8A989371F9C455F048D306E119E9DE0BAC964E5F1348547F119
6,122,154 UART: Caliptra RT
6,122,499 UART: [state] CFI Enabled
6,404,478 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,657 ready_for_fw is high
1,056,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,270 >>> mbox cmd response: success
2,622,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,684,616 UART:
2,684,632 UART: Running Caliptra FMC ...
2,685,040 UART:
2,685,183 UART: [state] CFI Enabled
2,695,780 UART: [fht] FMC Alias Private Key: 7
2,803,867 UART: [art] Extend RT PCRs Done
2,804,295 UART: [art] Lock RT PCRs Done
2,805,699 UART: [art] Populate DV Done
2,813,872 UART: [fht] FMC Alias Private Key: 7
2,814,956 UART: [art] Derive CDI
2,815,236 UART: [art] Store in in slot 0x4
2,901,279 UART: [art] Derive Key Pair
2,901,639 UART: [art] Store priv key in slot 0x5
2,914,299 UART: [art] Derive Key Pair - Done
2,928,855 UART: [art] Signing Cert with AUTHO
2,929,335 UART: RITY.KEYID = 7
2,945,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,778 UART: [art] PUB.X = D92008B2E9B3B854780CA2A963F885709E646EA0BF9ADB4C2F9EFD67D8C859E9D3BC80888B167970BE9B1BD36507733C
2,952,547 UART: [art] PUB.Y = 35D31921C0AE1C056CF1754CF9058C86E6A67B3F99B5C45EFB0D3A13E613DE585B55E92825FC7E16918C8E80B61E3DEA
2,959,498 UART: [art] SIG.R = 888E039C52C1C05148CDB57DAD1C21DCCBA899686ABCFE86DB9F465AA88FC68309D4C95A624C3817E094C3460F5406AC
2,966,268 UART: [art] SIG.S = 781ACB412DE7798D3BA6DB6C12AAFCB95EE854FA145EF3E551BD45F8237B822F72870EB2D92BF6CB897B39E810294E09
2,989,521 UART: Caliptra RT
2,989,866 UART: [state] CFI Enabled
3,098,217 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,529,832 >>> mbox cmd response: success
5,543,108 UART:
5,543,124 UART: Running Caliptra FMC ...
5,543,532 UART:
5,543,675 UART: [state] CFI Enabled
5,632,954 UART: [art] Extend RT PCRs Done
5,633,382 UART: [art] Lock RT PCRs Done
5,634,817 UART: [art] Populate DV Done
5,643,106 UART: [fht] FMC Alias Private Key: 7
5,644,144 UART: [art] Derive CDI
5,644,424 UART: [art] Store in in slot 0x4
5,730,333 UART: [art] Derive Key Pair
5,730,693 UART: [art] Store priv key in slot 0x5
5,744,567 UART: [art] Derive Key Pair - Done
5,759,455 UART: [art] Signing Cert with AUTHO
5,759,935 UART: RITY.KEYID = 7
5,775,401 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,166 UART: [art] PUB.X = 4A5D812C51B2FCAF2C7A8B078829DFDE18B2A4662D5BA90E1A49AD4E4F6CE9F24D452025FC1CAC3D7CC9589846F5FC18
5,782,950 UART: [art] PUB.Y = A0B41A41C3AB87F48749A89D8CDE76BFCA044678A33F105CF55E408B6C564693973622FE53DD208F4D9FCB334A48B91C
5,789,905 UART: [art] SIG.R = 710C19C1758953A6ECFD855816DEEBB0E5B92A72DBD88437A60C9BD9C66C2FF0CD84F2D97AEFD5034271515BBAFA2A03
5,796,681 UART: [art] SIG.S = A13C856051BCE0A1CA2761A6FD04F09B8B074767DC0047715D25911F665F665E5C3722EA31B8F617EAB942F228108955
5,820,006 UART: Caliptra RT
5,820,351 UART: [state] CFI Enabled
6,103,192 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,779 writing to cptra_bootfsm_go
192,998 UART:
193,351 UART: Running Caliptra ROM ...
194,451 UART:
194,595 UART: [state] CFI Enabled
267,264 UART: [state] LifecycleState = Unprovisioned
269,170 UART: [state] DebugLocked = No
271,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,050 UART: [kat] SHA2-256
445,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,248 UART: [kat] ++
456,842 UART: [kat] sha1
466,793 UART: [kat] SHA2-256
469,524 UART: [kat] SHA2-384
476,638 UART: [kat] SHA2-512-ACC
478,999 UART: [kat] ECC-384
2,768,274 UART: [kat] HMAC-384Kdf
2,801,399 UART: [kat] LMS
3,991,737 UART: [kat] --
3,995,900 UART: [cold-reset] ++
3,997,050 UART: [fht] Storing FHT @ 0x50003400
4,008,408 UART: [idev] ++
4,009,013 UART: [idev] CDI.KEYID = 6
4,009,934 UART: [idev] SUBJECT.KEYID = 7
4,011,113 UART: [idev] UDS.KEYID = 0
4,012,173 ready_for_fw is high
4,012,404 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,536 UART: [idev] Erasing UDS.KEYID = 0
7,347,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,074 UART: [idev] --
7,374,418 UART: [ldev] ++
7,374,988 UART: [ldev] CDI.KEYID = 6
7,375,962 UART: [ldev] SUBJECT.KEYID = 5
7,377,171 UART: [ldev] AUTHORITY.KEYID = 7
7,378,446 UART: [ldev] FE.KEYID = 1
7,424,761 UART: [ldev] Erasing FE.KEYID = 1
10,754,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,993 UART: [ldev] --
13,119,570 UART: [fwproc] Waiting for Commands...
13,122,750 UART: [fwproc] Received command 0x46574c44
13,124,976 UART: [fwproc] Received Image of size 113844 bytes
17,171,108 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,912 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,775 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,630,782 >>> mbox cmd response: success
17,634,426 UART: [afmc] ++
17,635,024 UART: [afmc] CDI.KEYID = 6
17,635,933 UART: [afmc] SUBJECT.KEYID = 7
17,637,203 UART: [afmc] AUTHORITY.KEYID = 5
21,009,787 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,243 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,519 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,923 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,731 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,147 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,378,030 UART: [afmc] --
23,381,633 UART: [cold-reset] --
23,384,760 UART: [state] Locking Datavault
23,390,817 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,569 UART: [state] Locking ICCM
23,393,610 UART: [exit] Launching FMC @ 0x40000130
23,402,003 UART:
23,402,246 UART: Running Caliptra FMC ...
23,403,344 UART:
23,403,495 UART: [state] CFI Enabled
23,471,646 UART: [fht] FMC Alias Private Key: 7
25,809,197 UART: [art] Extend RT PCRs Done
25,810,414 UART: [art] Lock RT PCRs Done
25,811,955 UART: [art] Populate DV Done
25,817,377 UART: [fht] FMC Alias Private Key: 7
25,819,127 UART: [art] Derive CDI
25,819,941 UART: [art] Store in in slot 0x4
25,880,726 UART: [art] Derive Key Pair
25,881,782 UART: [art] Store priv key in slot 0x5
29,175,074 UART: [art] Derive Key Pair - Done
29,188,127 UART: [art] Signing Cert with AUTHO
29,189,434 UART: RITY.KEYID = 7
31,476,434 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,937 UART: [art] PUB.X = E61755119D7928280EB9C6703A3F8AC5758E3EA05ADF24460CF457C19BA695CDA47B83510DDFACA4CD8D30DECCE5CFE3
31,485,197 UART: [art] PUB.Y = 4DE0811E94C4245E19B87FF2D8228B5982BC3C4427D30755286DB8326D2780E27278C9461D29F7AC489C797199E06E84
31,492,401 UART: [art] SIG.R = 65FCA68F1C0A39D10E98DD3174C0DC06B7F893D1CF65F3EA997F8A7BA454EC366F83388320013771F4D663490F7A4078
31,499,763 UART: [art] SIG.S = 4C42B0497BDF87D1FDEF52388371838596C3BF56D9EB4C2E9CE02709941678B6FBDC480E0959F50CF916B837DCAB02B3
32,804,680 UART: Caliptra RT
32,805,392 UART: [state] CFI Enabled
32,967,218 UART: [rt] RT listening for mailbox commands...
32,969,118 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,999,826 UART: [rt]cmd =0x434b4558, len=80
38,731,381 >>> mbox cmd response data (6280 bytes)
38,764,806 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,795,037 UART: [rt]cmd =0x414c544e, len=41
38,797,434 >>> mbox cmd response data (8 bytes)
38,797,929 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,828,108 UART: [rt]cmd =0x434b4558, len=80
44,576,380 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,806,570 ready_for_fw is high
3,807,202 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,871,374 >>> mbox cmd response: success
23,572,895 UART:
23,573,379 UART: Running Caliptra FMC ...
23,574,483 UART:
23,574,636 UART: [state] CFI Enabled
23,641,361 UART: [fht] FMC Alias Private Key: 7
25,978,934 UART: [art] Extend RT PCRs Done
25,980,159 UART: [art] Lock RT PCRs Done
25,982,056 UART: [art] Populate DV Done
25,987,626 UART: [fht] FMC Alias Private Key: 7
25,989,115 UART: [art] Derive CDI
25,989,870 UART: [art] Store in in slot 0x4
26,050,365 UART: [art] Derive Key Pair
26,051,406 UART: [art] Store priv key in slot 0x5
29,344,203 UART: [art] Derive Key Pair - Done
29,357,179 UART: [art] Signing Cert with AUTHO
29,358,487 UART: RITY.KEYID = 7
31,645,932 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,483 UART: [art] PUB.X = EDD06278F185A7322D2D6EC5442DA906296D44AD30EE63CDE91935901687F16F669BE0977079C71ADF91AC4A43E1216F
31,654,694 UART: [art] PUB.Y = B4DDDBED01549793805E003AC6C9A8DE419BC10725AD85EF05440603283D07326711131FFB424DAE300F1DA7F1C0F9C1
31,661,894 UART: [art] SIG.R = 6CFCDDBD6D0F5EE4908F491637A9B753D5C8641C583A4D63D8F0CF28DFB3BD2AA75300C8735C09E519159FFD62A1F88A
31,669,290 UART: [art] SIG.S = 5C7B0C8867074B41D26B4A29C0B5A8F9271A3C7170ADAF1187A5E4DB63D3E397C745BE50C3D567FA4815640188888EAB
32,973,833 UART: Caliptra RT
32,975,124 UART: [state] CFI Enabled
33,138,250 UART: [rt] RT listening for mailbox commands...
33,140,179 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,171,150 UART: [rt]cmd =0x434b4558, len=80
38,922,654 >>> mbox cmd response data (6280 bytes)
38,956,366 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,986,914 UART: [rt]cmd =0x414c544e, len=41
38,989,179 >>> mbox cmd response data (8 bytes)
38,989,746 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,020,162 UART: [rt]cmd =0x434b4558, len=80
44,767,754 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,484 UART:
192,839 UART: Running Caliptra ROM ...
193,968 UART:
603,528 UART: [state] CFI Enabled
616,982 UART: [state] LifecycleState = Unprovisioned
618,932 UART: [state] DebugLocked = No
621,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,106 UART: [kat] SHA2-256
795,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,357 UART: [kat] ++
806,829 UART: [kat] sha1
816,352 UART: [kat] SHA2-256
819,075 UART: [kat] SHA2-384
824,427 UART: [kat] SHA2-512-ACC
826,792 UART: [kat] ECC-384
3,112,799 UART: [kat] HMAC-384Kdf
3,124,321 UART: [kat] LMS
4,314,391 UART: [kat] --
4,318,270 UART: [cold-reset] ++
4,320,937 UART: [fht] Storing FHT @ 0x50003400
4,333,058 UART: [idev] ++
4,333,626 UART: [idev] CDI.KEYID = 6
4,334,660 UART: [idev] SUBJECT.KEYID = 7
4,335,834 UART: [idev] UDS.KEYID = 0
4,336,878 ready_for_fw is high
4,337,089 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,078 UART: [idev] Erasing UDS.KEYID = 0
7,619,331 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,486 UART: [idev] --
7,644,682 UART: [ldev] ++
7,645,287 UART: [ldev] CDI.KEYID = 6
7,646,174 UART: [ldev] SUBJECT.KEYID = 5
7,647,443 UART: [ldev] AUTHORITY.KEYID = 7
7,648,676 UART: [ldev] FE.KEYID = 1
7,660,860 UART: [ldev] Erasing FE.KEYID = 1
10,948,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,413 UART: [ldev] --
13,308,570 UART: [fwproc] Waiting for Commands...
13,310,552 UART: [fwproc] Received command 0x46574c44
13,312,734 UART: [fwproc] Received Image of size 113844 bytes
17,361,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,433,668 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,502,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,819,269 >>> mbox cmd response: success
17,824,101 UART: [afmc] ++
17,824,699 UART: [afmc] CDI.KEYID = 6
17,825,617 UART: [afmc] SUBJECT.KEYID = 7
17,826,910 UART: [afmc] AUTHORITY.KEYID = 5
21,139,061 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,432,367 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,434,615 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,997 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,809 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,478,282 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,330 UART: [afmc] --
23,503,472 UART: [cold-reset] --
23,506,361 UART: [state] Locking Datavault
23,512,905 UART: [state] Locking PCR0, PCR1 and PCR31
23,514,665 UART: [state] Locking ICCM
23,516,060 UART: [exit] Launching FMC @ 0x40000130
23,524,463 UART:
23,524,701 UART: Running Caliptra FMC ...
23,525,805 UART:
23,525,983 UART: [state] CFI Enabled
23,533,875 UART: [fht] FMC Alias Private Key: 7
25,864,702 UART: [art] Extend RT PCRs Done
25,865,938 UART: [art] Lock RT PCRs Done
25,867,701 UART: [art] Populate DV Done
25,873,297 UART: [fht] FMC Alias Private Key: 7
25,874,783 UART: [art] Derive CDI
25,875,548 UART: [art] Store in in slot 0x4
25,917,922 UART: [art] Derive Key Pair
25,918,952 UART: [art] Store priv key in slot 0x5
29,160,767 UART: [art] Derive Key Pair - Done
29,173,592 UART: [art] Signing Cert with AUTHO
29,174,928 UART: RITY.KEYID = 7
31,454,367 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,869 UART: [art] PUB.X = 376C1E26C338615E13C23C17DFF1B8E947E94941F2CAC0A62D5ED272FE3205B1F8DD8109CB3E2B3B4D089B4480712091
31,463,140 UART: [art] PUB.Y = F7961C5F3F5956994A07E4A045B15CCD67B939217BBAE8FE4106DDAAFF30A75A328A7827D78A83A4600048C337C3F4FB
31,470,356 UART: [art] SIG.R = E4A5D03474DC1753C456490932D8D64921A7FACB184CF2D5201911568BE7D84578404B412EE5FA58C731D1217FCAA0D6
31,477,711 UART: [art] SIG.S = 6B08A48E337D98050F69595DB5D49B61A43324100A69DED82074D68F00E9C2ACBC5A0FC96100613F6483C5FE099853BC
32,782,732 UART: Caliptra RT
32,783,444 UART: [state] CFI Enabled
32,900,726 UART: [rt] RT listening for mailbox commands...
32,902,607 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,933,726 UART: [rt]cmd =0x434b4558, len=80
38,592,215 >>> mbox cmd response data (6280 bytes)
38,626,147 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,656,443 UART: [rt]cmd =0x414c544e, len=41
38,658,887 >>> mbox cmd response data (8 bytes)
38,659,393 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,689,957 UART: [rt]cmd =0x434b4558, len=80
44,348,661 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
4,128,716 ready_for_fw is high
4,129,357 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,059,492 >>> mbox cmd response: success
23,702,329 UART:
23,702,736 UART: Running Caliptra FMC ...
23,703,894 UART:
23,704,084 UART: [state] CFI Enabled
23,712,108 UART: [fht] FMC Alias Private Key: 7
26,042,735 UART: [art] Extend RT PCRs Done
26,043,966 UART: [art] Lock RT PCRs Done
26,045,543 UART: [art] Populate DV Done
26,051,017 UART: [fht] FMC Alias Private Key: 7
26,052,569 UART: [art] Derive CDI
26,053,390 UART: [art] Store in in slot 0x4
26,095,990 UART: [art] Derive Key Pair
26,097,039 UART: [art] Store priv key in slot 0x5
29,338,747 UART: [art] Derive Key Pair - Done
29,352,068 UART: [art] Signing Cert with AUTHO
29,353,565 UART: RITY.KEYID = 7
31,632,659 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,164 UART: [art] PUB.X = 8C2F0B753505D4E7739D12B9CF83273EB736DE3D55228BDD52C3A282633F271A5AD4CE44581FEF80020D40D5EDB31661
31,641,363 UART: [art] PUB.Y = 438FCDBCAE475BC08B979414F27432B34623524D3A9DB0642C4E558F0E4B1B6FDB280F6ED4495FC4EFD73B6AFD7CE1E7
31,648,624 UART: [art] SIG.R = DC1601733C345835D7E06F0DE7F52B5CA8250A1C699A4C9BFC46BC1FD99701EE9258032C50E0C34BC16A4F84E084147F
31,656,035 UART: [art] SIG.S = 1C19FE3029BA4C51CB1BF7950758920B3F46DA8EBC1F57C9FB9A8A2FD0F63C253098B907E2B2B4CBA9760B29893DBF4A
32,960,970 UART: Caliptra RT
32,961,671 UART: [state] CFI Enabled
33,078,674 UART: [rt] RT listening for mailbox commands...
33,080,567 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,111,631 UART: [rt]cmd =0x434b4558, len=80
38,770,577 >>> mbox cmd response data (6280 bytes)
38,804,250 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,834,753 UART: [rt]cmd =0x414c544e, len=41
38,837,196 >>> mbox cmd response data (8 bytes)
38,837,756 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,868,103 UART: [rt]cmd =0x434b4558, len=80
44,526,938 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,018 UART:
192,392 UART: Running Caliptra ROM ...
193,542 UART:
193,689 UART: [state] CFI Enabled
267,009 UART: [state] LifecycleState = Unprovisioned
268,869 UART: [state] DebugLocked = No
271,545 UART: [state] WD Timer not started. Device not locked for debugging
275,731 UART: [kat] SHA2-256
454,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,442 UART: [kat] ++
466,974 UART: [kat] sha1
478,065 UART: [kat] SHA2-256
481,073 UART: [kat] SHA2-384
487,366 UART: [kat] SHA2-512-ACC
490,197 UART: [kat] ECC-384
2,948,102 UART: [kat] HMAC-384Kdf
2,973,065 UART: [kat] LMS
3,502,509 UART: [kat] --
3,508,091 UART: [cold-reset] ++
3,508,968 UART: [fht] FHT @ 0x50003400
3,519,732 UART: [idev] ++
3,520,300 UART: [idev] CDI.KEYID = 6
3,521,186 UART: [idev] SUBJECT.KEYID = 7
3,522,437 UART: [idev] UDS.KEYID = 0
3,523,380 ready_for_fw is high
3,523,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,174 UART: [idev] Erasing UDS.KEYID = 0
6,029,393 UART: [idev] Sha1 KeyId Algorithm
6,052,358 UART: [idev] --
6,056,357 UART: [ldev] ++
6,056,937 UART: [ldev] CDI.KEYID = 6
6,057,871 UART: [ldev] SUBJECT.KEYID = 5
6,059,034 UART: [ldev] AUTHORITY.KEYID = 7
6,060,269 UART: [ldev] FE.KEYID = 1
6,101,921 UART: [ldev] Erasing FE.KEYID = 1
8,604,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,306 UART: [ldev] --
10,415,579 UART: [fwproc] Wait for Commands...
10,417,680 UART: [fwproc] Recv command 0x46574c44
10,419,782 UART: [fwproc] Recv'd Img size: 114168 bytes
13,816,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,275,043 >>> mbox cmd response: success
14,278,669 UART: [afmc] ++
14,279,269 UART: [afmc] CDI.KEYID = 6
14,280,153 UART: [afmc] SUBJECT.KEYID = 7
14,281,256 UART: [afmc] AUTHORITY.KEYID = 5
16,808,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,485 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,296 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,312 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,202 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,374 UART: [afmc] --
18,610,724 UART: [cold-reset] --
18,612,857 UART: [state] Locking Datavault
18,618,542 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,194 UART: [state] Locking ICCM
18,621,336 UART: [exit] Launching FMC @ 0x40000130
18,629,740 UART:
18,629,975 UART: Running Caliptra FMC ...
18,631,074 UART:
18,631,238 UART: [state] CFI Enabled
18,693,501 UART: [fht] FMC Alias Private Key: 7
20,457,211 UART: [art] Extend RT PCRs Done
20,458,432 UART: [art] Lock RT PCRs Done
20,460,188 UART: [art] Populate DV Done
20,465,491 UART: [fht] FMC Alias Private Key: 7
20,467,038 UART: [art] Derive CDI
20,467,777 UART: [art] Store in in slot 0x4
20,526,854 UART: [art] Derive Key Pair
20,527,886 UART: [art] Store priv key in slot 0x5
22,990,554 UART: [art] Derive Key Pair - Done
23,003,449 UART: [art] Signing Cert with AUTHO
23,004,785 UART: RITY.KEYID = 7
24,715,816 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,315 UART: [art] PUB.X = 0A5AA8B4A44FDBBBEC1A4C2359D3D918E644B67CAD13DA830456B87118132DEEFAEE70CE19F6CEABC11D04BE7B6FA26F
24,724,630 UART: [art] PUB.Y = 6D92E5121F053AF04068B283E70BE9FC9BB537670B34F12F996B36DF92EB5A87EA4A4744B66458BE413CE76BDBF2F49C
24,731,895 UART: [art] SIG.R = BA1B2980AB906C13C3E9329AEB57CA14D988A9F4AA4C668265378B3D0A592C58050BB3F2A1FCDC5DD5BC2E7D261C2448
24,739,307 UART: [art] SIG.S = 495D8992258D193EDF73A6762163F8E9C2FF498820E983DA85951C6A324F020305DCD7A314E6D9F4ADDE7E515F1D7DCC
25,717,687 UART: Caliptra RT
25,718,387 UART: [state] CFI Enabled
25,884,474 UART: [rt] RT listening for mailbox commands...
25,886,373 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,917,505 UART: [rt]cmd =0x434b4558, len=80
30,262,882 >>> mbox cmd response data (6280 bytes)
30,296,420 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,326,749 UART: [rt]cmd =0x414c544e, len=41
30,329,099 >>> mbox cmd response data (8 bytes)
30,329,648 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,360,098 UART: [rt]cmd =0x434b4558, len=80
34,698,932 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,381,796 ready_for_fw is high
3,382,226 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,063,223 >>> mbox cmd response: success
18,344,970 UART:
18,345,378 UART: Running Caliptra FMC ...
18,346,477 UART:
18,346,632 UART: [state] CFI Enabled
18,412,058 UART: [fht] FMC Alias Private Key: 7
20,176,263 UART: [art] Extend RT PCRs Done
20,177,490 UART: [art] Lock RT PCRs Done
20,179,578 UART: [art] Populate DV Done
20,184,664 UART: [fht] FMC Alias Private Key: 7
20,186,213 UART: [art] Derive CDI
20,186,951 UART: [art] Store in in slot 0x4
20,244,578 UART: [art] Derive Key Pair
20,245,579 UART: [art] Store priv key in slot 0x5
22,708,822 UART: [art] Derive Key Pair - Done
22,721,767 UART: [art] Signing Cert with AUTHO
22,723,077 UART: RITY.KEYID = 7
24,434,508 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,037 UART: [art] PUB.X = D08D13EBB09A390C584C44A34200532C4429392370CCFA03F891CFE09597FA9F7FF37B28E71B7903893F10F92B359F8E
24,443,234 UART: [art] PUB.Y = F68CE5F82CB6A77B6EAFB2FA885659034F8FE923C19C58DE24A398C2AD6DF68729DDBE055A83057CBAD1C25E50CB3580
24,450,525 UART: [art] SIG.R = E4C1733D75081C70BC6925309B02F427F14AEBED47C216E937175015B7A974DE3652A5E80D140C0F20DD04EA5D31FEB6
24,457,905 UART: [art] SIG.S = C575E36801821319FF92ABC9E0D109B2AF829D823D1F9CAB63791B7E54784700A19D17AC2403FD46DE937BE4906229BB
25,436,751 UART: Caliptra RT
25,437,470 UART: [state] CFI Enabled
25,603,625 UART: [rt] RT listening for mailbox commands...
25,605,525 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,636,536 UART: [rt]cmd =0x434b4558, len=80
29,983,445 >>> mbox cmd response data (6280 bytes)
30,017,405 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,047,641 UART: [rt]cmd =0x414c544e, len=41
30,050,040 >>> mbox cmd response data (8 bytes)
30,050,527 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,080,772 UART: [rt]cmd =0x434b4558, len=80
34,420,888 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
192,956 UART:
193,322 UART: Running Caliptra ROM ...
194,458 UART:
603,885 UART: [state] CFI Enabled
616,645 UART: [state] LifecycleState = Unprovisioned
618,521 UART: [state] DebugLocked = No
620,838 UART: [state] WD Timer not started. Device not locked for debugging
623,733 UART: [kat] SHA2-256
802,861 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,442 UART: [kat] ++
814,981 UART: [kat] sha1
826,568 UART: [kat] SHA2-256
829,577 UART: [kat] SHA2-384
836,584 UART: [kat] SHA2-512-ACC
839,560 UART: [kat] ECC-384
3,281,493 UART: [kat] HMAC-384Kdf
3,293,968 UART: [kat] LMS
3,823,444 UART: [kat] --
3,828,685 UART: [cold-reset] ++
3,830,049 UART: [fht] FHT @ 0x50003400
3,841,474 UART: [idev] ++
3,842,044 UART: [idev] CDI.KEYID = 6
3,842,950 UART: [idev] SUBJECT.KEYID = 7
3,844,193 UART: [idev] UDS.KEYID = 0
3,845,123 ready_for_fw is high
3,845,336 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,836 UART: [idev] Erasing UDS.KEYID = 0
6,316,652 UART: [idev] Sha1 KeyId Algorithm
6,338,641 UART: [idev] --
6,343,444 UART: [ldev] ++
6,344,012 UART: [ldev] CDI.KEYID = 6
6,344,899 UART: [ldev] SUBJECT.KEYID = 5
6,346,111 UART: [ldev] AUTHORITY.KEYID = 7
6,347,394 UART: [ldev] FE.KEYID = 1
6,357,315 UART: [ldev] Erasing FE.KEYID = 1
8,831,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,615 UART: [ldev] --
10,623,961 UART: [fwproc] Wait for Commands...
10,625,841 UART: [fwproc] Recv command 0x46574c44
10,627,934 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,754 >>> mbox cmd response: success
14,491,696 UART: [afmc] ++
14,492,303 UART: [afmc] CDI.KEYID = 6
14,493,189 UART: [afmc] SUBJECT.KEYID = 7
14,494,292 UART: [afmc] AUTHORITY.KEYID = 5
16,998,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,104 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,955 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,910 UART: [afmc] --
18,793,618 UART: [cold-reset] --
18,797,042 UART: [state] Locking Datavault
18,802,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,629 UART: [state] Locking ICCM
18,806,833 UART: [exit] Launching FMC @ 0x40000130
18,815,279 UART:
18,815,521 UART: Running Caliptra FMC ...
18,816,623 UART:
18,816,781 UART: [state] CFI Enabled
18,824,899 UART: [fht] FMC Alias Private Key: 7
20,581,588 UART: [art] Extend RT PCRs Done
20,582,805 UART: [art] Lock RT PCRs Done
20,584,562 UART: [art] Populate DV Done
20,589,866 UART: [fht] FMC Alias Private Key: 7
20,591,348 UART: [art] Derive CDI
20,592,084 UART: [art] Store in in slot 0x4
20,634,893 UART: [art] Derive Key Pair
20,635,934 UART: [art] Store priv key in slot 0x5
23,062,743 UART: [art] Derive Key Pair - Done
23,075,629 UART: [art] Signing Cert with AUTHO
23,076,970 UART: RITY.KEYID = 7
24,782,122 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,627 UART: [art] PUB.X = 95FD74C7CB67EB8982C1F73586C4C71383CC7FF246BBA8427C212C154456933C94E61237B0E1BA50915028EBC74E0C06
24,790,895 UART: [art] PUB.Y = 046A3BD7CF5DD847F78BBBAFF6A319233530BA618F663F3FD6CE45DA546DD7E81889654AF25036CA5C146BB85A6C0D1F
24,798,136 UART: [art] SIG.R = 964844250BEEA85CC436FAE1DA0065599BAC3F0F6D3B6849218536D63C8AA7BCC5387B9B0A7105434ADB58DE434F98B6
24,805,552 UART: [art] SIG.S = F9E732F0E9525BA7AB86D602921FC2D2F10937860AF93288204849891F6E4FA9C5F797C77A8B66FEBEAFF5B1D5F26AFE
25,783,889 UART: Caliptra RT
25,784,592 UART: [state] CFI Enabled
25,901,354 UART: [rt] RT listening for mailbox commands...
25,903,257 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,934,475 UART: [rt]cmd =0x434b4558, len=80
30,204,422 >>> mbox cmd response data (6280 bytes)
30,237,992 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,268,166 UART: [rt]cmd =0x414c544e, len=41
30,270,397 >>> mbox cmd response data (8 bytes)
30,270,868 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,301,100 UART: [rt]cmd =0x434b4558, len=80
34,571,513 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,739 writing to cptra_bootfsm_go
3,698,307 ready_for_fw is high
3,698,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,682 >>> mbox cmd response: success
18,513,993 UART:
18,514,388 UART: Running Caliptra FMC ...
18,515,593 UART:
18,515,769 UART: [state] CFI Enabled
18,523,459 UART: [fht] FMC Alias Private Key: 7
20,280,401 UART: [art] Extend RT PCRs Done
20,281,626 UART: [art] Lock RT PCRs Done
20,283,522 UART: [art] Populate DV Done
20,288,769 UART: [fht] FMC Alias Private Key: 7
20,290,257 UART: [art] Derive CDI
20,290,995 UART: [art] Store in in slot 0x4
20,333,589 UART: [art] Derive Key Pair
20,334,635 UART: [art] Store priv key in slot 0x5
22,761,753 UART: [art] Derive Key Pair - Done
22,774,484 UART: [art] Signing Cert with AUTHO
22,775,782 UART: RITY.KEYID = 7
24,481,044 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,556 UART: [art] PUB.X = B7F4C3A7505E8CAF0C46D9D73BA364B41EC3C2330F45F4EE3A0E01B221DA791F7F5E4B2E6D4231DCEFE33D83B572131A
24,489,858 UART: [art] PUB.Y = F01FEFAA1CAA4F1711C93420A55D544A639DCA59DEAB0B2D5098FB520517306169BA39BBA77119D8DF2CBD4293EE6158
24,497,116 UART: [art] SIG.R = 0CD5635E6AC214CEE6503860E6CD3170880840FC11D1D69B819CF2902D890EF0D59D4D0DAEE21EAC08E662EE28FE16B9
24,504,534 UART: [art] SIG.S = 8ACDB78B897421785CB95679978F7AC8DB6EB32CB4CFD60F6CBC3C3DC319BDEE0AA56E5BA8F896CCCB02D5D72510D964
25,482,921 UART: Caliptra RT
25,483,643 UART: [state] CFI Enabled
25,600,667 UART: [rt] RT listening for mailbox commands...
25,602,559 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,633,733 UART: [rt]cmd =0x434b4558, len=80
29,903,815 >>> mbox cmd response data (6280 bytes)
29,937,909 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
29,968,137 UART: [rt]cmd =0x414c544e, len=41
29,970,696 >>> mbox cmd response data (8 bytes)
29,971,241 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,001,379 UART: [rt]cmd =0x434b4558, len=80
34,269,894 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,153 UART:
192,527 UART: Running Caliptra ROM ...
193,725 UART:
193,878 UART: [state] CFI Enabled
259,711 UART: [state] LifecycleState = Unprovisioned
261,781 UART: [state] DebugLocked = No
263,394 UART: [state] WD Timer not started. Device not locked for debugging
267,510 UART: [kat] SHA2-256
457,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,156 UART: [kat] ++
468,603 UART: [kat] sha1
479,636 UART: [kat] SHA2-256
482,633 UART: [kat] SHA2-384
487,786 UART: [kat] SHA2-512-ACC
490,368 UART: [kat] ECC-384
2,946,570 UART: [kat] HMAC-384Kdf
2,961,448 UART: [kat] LMS
3,493,231 UART: [kat] --
3,498,149 UART: [cold-reset] ++
3,500,151 UART: [fht] FHT @ 0x50003400
3,511,059 UART: [idev] ++
3,511,772 UART: [idev] CDI.KEYID = 6
3,512,694 UART: [idev] SUBJECT.KEYID = 7
3,514,393 UART: [idev] UDS.KEYID = 0
3,515,352 ready_for_fw is high
3,515,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,659,103 UART: [idev] Erasing UDS.KEYID = 0
6,019,750 UART: [idev] Sha1 KeyId Algorithm
6,043,303 UART: [idev] --
6,048,599 UART: [ldev] ++
6,049,286 UART: [ldev] CDI.KEYID = 6
6,050,198 UART: [ldev] SUBJECT.KEYID = 5
6,051,361 UART: [ldev] AUTHORITY.KEYID = 7
6,052,594 UART: [ldev] FE.KEYID = 1
6,090,641 UART: [ldev] Erasing FE.KEYID = 1
8,597,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,129 UART: [ldev] --
10,402,650 UART: [fwproc] Wait for Commands...
10,404,858 UART: [fwproc] Recv command 0x46574c44
10,407,163 UART: [fwproc] Recv'd Img size: 114168 bytes
13,859,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,614 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,596,996 >>> mbox cmd response: success
14,601,171 UART: [afmc] ++
14,601,873 UART: [afmc] CDI.KEYID = 6
14,603,039 UART: [afmc] SUBJECT.KEYID = 7
14,604,539 UART: [afmc] AUTHORITY.KEYID = 5
17,140,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,862,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,864,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,879,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,894,396 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,909,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,932,833 UART: [afmc] --
18,935,615 UART: [cold-reset] --
18,940,080 UART: [state] Locking Datavault
18,945,671 UART: [state] Locking PCR0, PCR1 and PCR31
18,947,830 UART: [state] Locking ICCM
18,950,619 UART: [exit] Launching FMC @ 0x40000130
18,959,258 UART:
18,959,540 UART: Running Caliptra FMC ...
18,960,577 UART:
18,960,726 UART: [state] CFI Enabled
19,018,120 UART: [fht] FMC Alias Private Key: 7
20,781,978 UART: [art] Extend RT PCRs Done
20,783,196 UART: [art] Lock RT PCRs Done
20,784,638 UART: [art] Populate DV Done
20,789,909 UART: [fht] FMC Alias Private Key: 7
20,791,555 UART: [art] Derive CDI
20,792,297 UART: [art] Store in in slot 0x4
20,850,633 UART: [art] Derive Key Pair
20,851,672 UART: [art] Store priv key in slot 0x5
23,314,603 UART: [art] Derive Key Pair - Done
23,327,490 UART: [art] Signing Cert with AUTHO
23,328,791 UART: RITY.KEYID = 7
25,040,048 UART: [art] Erasing AUTHORITY.KEYID = 7
25,041,559 UART: [art] PUB.X = 4AE849376B1B3C9F98D0EBC1501F2AF343B45FC071BC65CB033C36A65D0012A14A0CD94078746F2F25EA9718252DC644
25,048,830 UART: [art] PUB.Y = 6E2DE7E559A94FD600B587A6E5D5CF07AFFE4BE19FC7665A4C95F7B9F987BB3FFB58902198E79C33E0B9A4F402A4993D
25,056,083 UART: [art] SIG.R = 139ACC3F5D2F73155B020C36A792A3F3899AD2268513EA9283EC54E2DA358D46F945091DE83AA0713BD678B3E2AB8253
25,063,470 UART: [art] SIG.S = C310F80FA0B7597BD6B84E3C64F49B55373092A5CEA3F1B451CA390F83622F029413333D672C5647F7BA0B4D21F27350
26,042,651 UART: Caliptra RT
26,043,340 UART: [state] CFI Enabled
26,207,422 UART: [rt] RT listening for mailbox commands...
26,209,348 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,240,396 UART: [rt]cmd =0x434b4558, len=80
30,586,920 >>> mbox cmd response data (6280 bytes)
30,620,518 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,650,605 UART: [rt]cmd =0x414c544e, len=41
30,653,085 >>> mbox cmd response data (8 bytes)
30,653,688 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,684,101 UART: [rt]cmd =0x434b4558, len=80
35,024,336 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,437,342 ready_for_fw is high
3,437,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,754,158 >>> mbox cmd response: success
19,045,042 UART:
19,045,442 UART: Running Caliptra FMC ...
19,046,548 UART:
19,046,705 UART: [state] CFI Enabled
19,115,414 UART: [fht] FMC Alias Private Key: 7
20,879,746 UART: [art] Extend RT PCRs Done
20,880,974 UART: [art] Lock RT PCRs Done
20,882,737 UART: [art] Populate DV Done
20,888,049 UART: [fht] FMC Alias Private Key: 7
20,889,590 UART: [art] Derive CDI
20,890,325 UART: [art] Store in in slot 0x4
20,948,402 UART: [art] Derive Key Pair
20,949,441 UART: [art] Store priv key in slot 0x5
23,412,242 UART: [art] Derive Key Pair - Done
23,425,243 UART: [art] Signing Cert with AUTHO
23,426,566 UART: RITY.KEYID = 7
25,137,399 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,915 UART: [art] PUB.X = FA0F7AF3F42D92E328FD0CF273A58105185F3A4E81A176553A1639B3108E910196F6EE98B1BA6E95C9D2671D956C1626
25,146,149 UART: [art] PUB.Y = C2D184D0D8023CCAFE4F863262352400D48614F443413F50C95D1FA64FE51D70D73D48F031B7BE2DDBA78BC7EB2817A9
25,153,420 UART: [art] SIG.R = 81A9E0BB6AD44F77C43F326BC5150AF4738DEF9EDA6147C21523E7C8BEC4846BF7D7CE8FFFAB230599B0B52DE800459F
25,160,798 UART: [art] SIG.S = 1D4A9C46ACA4368B55FEE3575851D4BA83724E6E96AD41D85D6A8F0F2F4A86209D4E77B193AF3C1D0448E9491588A55D
26,139,411 UART: Caliptra RT
26,140,100 UART: [state] CFI Enabled
26,305,323 UART: [rt] RT listening for mailbox commands...
26,307,223 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,338,269 UART: [rt]cmd =0x434b4558, len=80
30,684,144 >>> mbox cmd response data (6280 bytes)
30,717,755 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,748,190 UART: [rt]cmd =0x414c544e, len=41
30,750,699 >>> mbox cmd response data (8 bytes)
30,751,252 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,781,600 UART: [rt]cmd =0x434b4558, len=80
35,120,526 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
192,871 UART:
193,239 UART: Running Caliptra ROM ...
194,422 UART:
604,083 UART: [state] CFI Enabled
615,263 UART: [state] LifecycleState = Unprovisioned
617,631 UART: [state] DebugLocked = No
620,013 UART: [state] WD Timer not started. Device not locked for debugging
624,474 UART: [kat] SHA2-256
814,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,189 UART: [kat] ++
825,792 UART: [kat] sha1
837,312 UART: [kat] SHA2-256
840,323 UART: [kat] SHA2-384
844,986 UART: [kat] SHA2-512-ACC
847,575 UART: [kat] ECC-384
3,290,467 UART: [kat] HMAC-384Kdf
3,304,558 UART: [kat] LMS
3,836,429 UART: [kat] --
3,840,773 UART: [cold-reset] ++
3,843,270 UART: [fht] FHT @ 0x50003400
3,855,878 UART: [idev] ++
3,856,592 UART: [idev] CDI.KEYID = 6
3,857,624 UART: [idev] SUBJECT.KEYID = 7
3,858,747 UART: [idev] UDS.KEYID = 0
3,859,729 ready_for_fw is high
3,859,950 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,422 UART: [idev] Erasing UDS.KEYID = 0
6,334,376 UART: [idev] Sha1 KeyId Algorithm
6,356,903 UART: [idev] --
6,360,575 UART: [ldev] ++
6,361,284 UART: [ldev] CDI.KEYID = 6
6,362,355 UART: [ldev] SUBJECT.KEYID = 5
6,363,465 UART: [ldev] AUTHORITY.KEYID = 7
6,364,644 UART: [ldev] FE.KEYID = 1
6,375,952 UART: [ldev] Erasing FE.KEYID = 1
8,853,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,523 UART: [ldev] --
10,645,143 UART: [fwproc] Wait for Commands...
10,648,017 UART: [fwproc] Recv command 0x46574c44
10,650,384 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,375 >>> mbox cmd response: success
14,835,757 UART: [afmc] ++
14,836,460 UART: [afmc] CDI.KEYID = 6
14,837,653 UART: [afmc] SUBJECT.KEYID = 7
14,839,093 UART: [afmc] AUTHORITY.KEYID = 5
17,344,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,238 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,529 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,585 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,768 UART: [afmc] --
19,140,587 UART: [cold-reset] --
19,143,694 UART: [state] Locking Datavault
19,149,432 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,622 UART: [state] Locking ICCM
19,153,933 UART: [exit] Launching FMC @ 0x40000130
19,162,620 UART:
19,162,893 UART: Running Caliptra FMC ...
19,164,004 UART:
19,164,174 UART: [state] CFI Enabled
19,172,277 UART: [fht] FMC Alias Private Key: 7
20,929,295 UART: [art] Extend RT PCRs Done
20,930,522 UART: [art] Lock RT PCRs Done
20,932,169 UART: [art] Populate DV Done
20,937,965 UART: [fht] FMC Alias Private Key: 7
20,939,665 UART: [art] Derive CDI
20,940,491 UART: [art] Store in in slot 0x4
20,982,400 UART: [art] Derive Key Pair
20,983,403 UART: [art] Store priv key in slot 0x5
23,410,313 UART: [art] Derive Key Pair - Done
23,423,304 UART: [art] Signing Cert with AUTHO
23,424,607 UART: RITY.KEYID = 7
25,130,099 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,612 UART: [art] PUB.X = B5C7FB345D55A48B04165E0719BD8CF79E3F9FD9D4A0028456ABA3210CBB557FB4C7355795FD5C7ADCD81D5DE738A4D9
25,138,919 UART: [art] PUB.Y = 7E8FAE907122BA843F7E363D41D74D03A2D9625F272E50288075C77F9B27FCB15016142CFC4DA6AAC984EC36A12181C7
25,146,154 UART: [art] SIG.R = DB765F3E82A35A0EFF1419948CC5CDA971EE93C0A7CFA53277E06F13BF3794FF8A226C6ABE136FDFCF31E0AD04AAC1C9
25,153,599 UART: [art] SIG.S = 0D6CB548EB8D96FBB2DCB8F1F65918EB210931B4D7998104ECFCBBC158B534F1645555385ADEAA5E652E5635235C3B14
26,132,367 UART: Caliptra RT
26,133,073 UART: [state] CFI Enabled
26,250,424 UART: [rt] RT listening for mailbox commands...
26,252,308 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,283,153 UART: [rt]cmd =0x434b4558, len=80
30,552,371 >>> mbox cmd response data (6280 bytes)
30,585,781 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,615,834 UART: [rt]cmd =0x414c544e, len=41
30,618,365 >>> mbox cmd response data (8 bytes)
30,618,938 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,649,297 UART: [rt]cmd =0x434b4558, len=80
34,918,916 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
3,755,234 ready_for_fw is high
3,755,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,948,834 >>> mbox cmd response: success
19,206,520 UART:
19,206,918 UART: Running Caliptra FMC ...
19,208,015 UART:
19,208,171 UART: [state] CFI Enabled
19,216,517 UART: [fht] FMC Alias Private Key: 7
20,972,894 UART: [art] Extend RT PCRs Done
20,974,129 UART: [art] Lock RT PCRs Done
20,975,947 UART: [art] Populate DV Done
20,981,146 UART: [fht] FMC Alias Private Key: 7
20,982,846 UART: [art] Derive CDI
20,983,589 UART: [art] Store in in slot 0x4
21,026,232 UART: [art] Derive Key Pair
21,027,234 UART: [art] Store priv key in slot 0x5
23,454,429 UART: [art] Derive Key Pair - Done
23,467,376 UART: [art] Signing Cert with AUTHO
23,468,679 UART: RITY.KEYID = 7
25,174,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,684 UART: [art] PUB.X = 13BCE7DFCF7CC91EF36BBB4875B24AEEA3BD64122440FBF10C2341550FF85630BF8FE78109111CD7AC00B03180692452
25,182,985 UART: [art] PUB.Y = CED444A50CCC368A5C495B5DC9F23C5E320D2F0205644E0E059A99214A74D07E0A5BA3ABE247075CBB14F4BB7CBA97DB
25,190,265 UART: [art] SIG.R = C240B58850D909B9E260ED528BE8F75C0AE801B477EE080997431A22DAC080BD51AEA92533EA52207B0E41660E2AB159
25,197,606 UART: [art] SIG.S = 3653C0AFC34FC26F5369E4CA792F5766359632B8D62211EEA6AB5BBDA5A53D40D030AD14E1B814E3C1A1FF9A7A08F78B
26,176,496 UART: Caliptra RT
26,177,218 UART: [state] CFI Enabled
26,294,934 UART: [rt] RT listening for mailbox commands...
26,296,853 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,327,821 UART: [rt]cmd =0x434b4558, len=80
30,597,491 >>> mbox cmd response data (6280 bytes)
30,631,044 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,661,307 UART: [rt]cmd =0x414c544e, len=41
30,663,565 >>> mbox cmd response data (8 bytes)
30,664,148 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,694,405 UART: [rt]cmd =0x434b4558, len=80
34,964,923 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Unprovisioned
85,279 UART: [state] DebugLocked = No
85,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,471 UART: [kat] SHA2-256
881,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,517 UART: [kat] ++
885,669 UART: [kat] sha1
889,939 UART: [kat] SHA2-256
891,877 UART: [kat] SHA2-384
894,568 UART: [kat] SHA2-512-ACC
896,469 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
906,950 UART: [kat] LMS
1,475,146 UART: [kat] --
1,475,863 UART: [cold-reset] ++
1,476,241 UART: [fht] Storing FHT @ 0x50003400
1,479,076 UART: [idev] ++
1,479,244 UART: [idev] CDI.KEYID = 6
1,479,604 UART: [idev] SUBJECT.KEYID = 7
1,480,028 UART: [idev] UDS.KEYID = 0
1,480,373 ready_for_fw is high
1,480,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,914 UART: [idev] Erasing UDS.KEYID = 0
1,504,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,752 UART: [idev] --
1,513,761 UART: [ldev] ++
1,513,929 UART: [ldev] CDI.KEYID = 6
1,514,292 UART: [ldev] SUBJECT.KEYID = 5
1,514,718 UART: [ldev] AUTHORITY.KEYID = 7
1,515,181 UART: [ldev] FE.KEYID = 1
1,520,307 UART: [ldev] Erasing FE.KEYID = 1
1,545,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,998 UART: [ldev] --
1,585,273 UART: [fwproc] Waiting for Commands...
1,586,002 UART: [fwproc] Received command 0x46574c44
1,586,793 UART: [fwproc] Received Image of size 114168 bytes
2,883,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,437 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,368 >>> mbox cmd response: success
3,077,614 UART: [afmc] ++
3,077,782 UART: [afmc] CDI.KEYID = 6
3,078,144 UART: [afmc] SUBJECT.KEYID = 7
3,078,569 UART: [afmc] AUTHORITY.KEYID = 5
3,113,546 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,742 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,135 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,825 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,546 UART: [afmc] --
3,156,550 UART: [cold-reset] --
3,157,638 UART: [state] Locking Datavault
3,158,973 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,577 UART: [state] Locking ICCM
3,160,169 UART: [exit] Launching FMC @ 0x40000130
3,165,498 UART:
3,165,514 UART: Running Caliptra FMC ...
3,165,922 UART:
3,165,976 UART: [state] CFI Enabled
3,176,609 UART: [fht] FMC Alias Private Key: 7
3,284,646 UART: [art] Extend RT PCRs Done
3,285,074 UART: [art] Lock RT PCRs Done
3,286,414 UART: [art] Populate DV Done
3,294,857 UART: [fht] FMC Alias Private Key: 7
3,295,909 UART: [art] Derive CDI
3,296,189 UART: [art] Store in in slot 0x4
3,381,744 UART: [art] Derive Key Pair
3,382,104 UART: [art] Store priv key in slot 0x5
3,395,250 UART: [art] Derive Key Pair - Done
3,410,180 UART: [art] Signing Cert with AUTHO
3,410,660 UART: RITY.KEYID = 7
3,426,138 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,903 UART: [art] PUB.X = 17A682C7D17FE6431BEE8631AB6E492ADC1F6155B780A17FE5785585EFE4BCE16F45DC1729DF65DE78517E987FFA7410
3,433,683 UART: [art] PUB.Y = 1A2FFD3EC64DAC41EC4BD812C1B768DD242FED4877EB922D7B3800858462BC64848DFBB93A8D14321351025FC5778B06
3,440,613 UART: [art] SIG.R = EEF1D51559C56ABB321BDE850848738FDD4AB9A845F7DD200E13B0BE151B205DBC742BC7B8661DA21B7ADA34AB8ED6CF
3,447,401 UART: [art] SIG.S = A585F44E52BB1014D01CB55553BDBA370DD4829ABFAB0BD2CDACF5005EB73060F4C2EA0A85827985D72EF4E1C5C72AF2
3,471,435 UART: Caliptra RT
3,471,688 UART: [state] CFI Enabled
3,580,292 UART: [rt] RT listening for mailbox commands...
3,580,962 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,368 UART: [rt]cmd =0x434b4558, len=80
3,779,966 >>> mbox cmd response data (6280 bytes)
3,779,967 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,491 UART: [rt]cmd =0x414c544e, len=41
3,811,574 >>> mbox cmd response data (8 bytes)
3,811,575 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,298 UART: [rt]cmd =0x434b4558, len=80
4,010,960 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,897 ready_for_fw is high
1,362,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,752 >>> mbox cmd response: success
2,987,872 UART:
2,987,888 UART: Running Caliptra FMC ...
2,988,296 UART:
2,988,350 UART: [state] CFI Enabled
2,998,813 UART: [fht] FMC Alias Private Key: 7
3,106,236 UART: [art] Extend RT PCRs Done
3,106,664 UART: [art] Lock RT PCRs Done
3,108,396 UART: [art] Populate DV Done
3,116,815 UART: [fht] FMC Alias Private Key: 7
3,117,973 UART: [art] Derive CDI
3,118,253 UART: [art] Store in in slot 0x4
3,203,960 UART: [art] Derive Key Pair
3,204,320 UART: [art] Store priv key in slot 0x5
3,216,984 UART: [art] Derive Key Pair - Done
3,231,271 UART: [art] Signing Cert with AUTHO
3,231,751 UART: RITY.KEYID = 7
3,246,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,730 UART: [art] PUB.X = CD5541F9B17504AB4CFCA65DAA5D74F8C52725A78909D18C76C4108CA8F24401E3254269A9FD5D7DD47669986D976E77
3,254,493 UART: [art] PUB.Y = C31E3725DB2E9C3E52B59AA2C348AA7D77D182E1B1AEFF909307091F46116E7B0D51A1AABBE05CEBBD9A5949EEAA33C9
3,261,456 UART: [art] SIG.R = C8D63FE3B21E6772004343D9CE983481AE3ECBF8068130FF3F7061B25A2E912DA516B48F8A6E43A7FEEA75085B6FD8F6
3,268,208 UART: [art] SIG.S = 25C86E63321BA33E536C584458B1D49C85E4FF1873E29C19F6D3017DC8E6669C158E32668B3DCB03CA3830E97F9FB84D
3,291,499 UART: Caliptra RT
3,291,752 UART: [state] CFI Enabled
3,400,135 UART: [rt] RT listening for mailbox commands...
3,400,805 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,389 UART: [rt]cmd =0x434b4558, len=80
3,599,790 >>> mbox cmd response data (6280 bytes)
3,599,791 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,259 UART: [rt]cmd =0x414c544e, len=41
3,631,222 >>> mbox cmd response data (8 bytes)
3,631,223 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,198 UART: [rt]cmd =0x434b4558, len=80
3,829,763 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,641 UART: [kat] SHA2-512-ACC
897,542 UART: [kat] ECC-384
903,359 UART: [kat] HMAC-384Kdf
908,143 UART: [kat] LMS
1,476,339 UART: [kat] --
1,477,316 UART: [cold-reset] ++
1,477,644 UART: [fht] Storing FHT @ 0x50003400
1,480,377 UART: [idev] ++
1,480,545 UART: [idev] CDI.KEYID = 6
1,480,905 UART: [idev] SUBJECT.KEYID = 7
1,481,329 UART: [idev] UDS.KEYID = 0
1,481,674 ready_for_fw is high
1,481,674 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,506,039 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,845 UART: [idev] --
1,515,788 UART: [ldev] ++
1,515,956 UART: [ldev] CDI.KEYID = 6
1,516,319 UART: [ldev] SUBJECT.KEYID = 5
1,516,745 UART: [ldev] AUTHORITY.KEYID = 7
1,517,208 UART: [ldev] FE.KEYID = 1
1,522,682 UART: [ldev] Erasing FE.KEYID = 1
1,548,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,009 UART: [ldev] --
1,587,284 UART: [fwproc] Waiting for Commands...
1,588,075 UART: [fwproc] Received command 0x46574c44
1,588,866 UART: [fwproc] Received Image of size 114168 bytes
2,885,338 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,118 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,470 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,173 >>> mbox cmd response: success
3,079,333 UART: [afmc] ++
3,079,501 UART: [afmc] CDI.KEYID = 6
3,079,863 UART: [afmc] SUBJECT.KEYID = 7
3,080,288 UART: [afmc] AUTHORITY.KEYID = 5
3,114,699 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,547 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,432 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,122 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,223 UART: [afmc] --
3,158,301 UART: [cold-reset] --
3,159,231 UART: [state] Locking Datavault
3,160,392 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,996 UART: [state] Locking ICCM
3,161,524 UART: [exit] Launching FMC @ 0x40000130
3,166,853 UART:
3,166,869 UART: Running Caliptra FMC ...
3,167,277 UART:
3,167,420 UART: [state] CFI Enabled
3,177,695 UART: [fht] FMC Alias Private Key: 7
3,285,668 UART: [art] Extend RT PCRs Done
3,286,096 UART: [art] Lock RT PCRs Done
3,287,740 UART: [art] Populate DV Done
3,295,877 UART: [fht] FMC Alias Private Key: 7
3,297,037 UART: [art] Derive CDI
3,297,317 UART: [art] Store in in slot 0x4
3,382,568 UART: [art] Derive Key Pair
3,382,928 UART: [art] Store priv key in slot 0x5
3,396,414 UART: [art] Derive Key Pair - Done
3,411,076 UART: [art] Signing Cert with AUTHO
3,411,556 UART: RITY.KEYID = 7
3,426,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,539 UART: [art] PUB.X = 81029CAC03A3D41E89D066436ECB859109651348DB5F3096FFF2581CDCAA7B0622531FC1154EE2294BE8C30717D2BA2C
3,434,298 UART: [art] PUB.Y = 8A14E22AEFA12EF6D9592C165AA7987170F393C8C57896641F46103795E0531E46F66417F0F2C10A42EF07EB28BF6C75
3,441,240 UART: [art] SIG.R = A9AC59E00A777E0C3637794E04A80BF69B913F2EFB031076DA733CD8812CA3BBFE65E2CC347023621B6250C564A93DF6
3,448,001 UART: [art] SIG.S = 889EFA4EE20C2C4D2D348D1B83A039F3EE594449DA256672EFB22B574BDFA8D02B73EE9216F1F57EBBECC43A4F3E7CD5
3,472,033 UART: Caliptra RT
3,472,378 UART: [state] CFI Enabled
3,579,782 UART: [rt] RT listening for mailbox commands...
3,580,452 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,662 UART: [rt]cmd =0x434b4558, len=80
3,779,986 >>> mbox cmd response data (6280 bytes)
3,779,987 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,667 UART: [rt]cmd =0x414c544e, len=41
3,811,612 >>> mbox cmd response data (8 bytes)
3,811,613 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,841,564 UART: [rt]cmd =0x434b4558, len=80
4,010,564 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 ready_for_fw is high
1,363,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,885 >>> mbox cmd response: success
2,990,821 UART:
2,990,837 UART: Running Caliptra FMC ...
2,991,245 UART:
2,991,388 UART: [state] CFI Enabled
3,001,901 UART: [fht] FMC Alias Private Key: 7
3,109,554 UART: [art] Extend RT PCRs Done
3,109,982 UART: [art] Lock RT PCRs Done
3,111,492 UART: [art] Populate DV Done
3,119,805 UART: [fht] FMC Alias Private Key: 7
3,120,733 UART: [art] Derive CDI
3,121,013 UART: [art] Store in in slot 0x4
3,206,680 UART: [art] Derive Key Pair
3,207,040 UART: [art] Store priv key in slot 0x5
3,220,026 UART: [art] Derive Key Pair - Done
3,234,770 UART: [art] Signing Cert with AUTHO
3,235,250 UART: RITY.KEYID = 7
3,250,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,269 UART: [art] PUB.X = A59FDA0E4DBD738965FA59F771F639E5CE8DABDD949AB8C54ADE0F14357DB7923CFC2C092EE0A2FF8001456DC7675CAE
3,258,051 UART: [art] PUB.Y = DD36F7542944FF651F5552E95C94BE9F44CFE9B35992F5948A7AE5EB98425733E5FF996658FF4EF9459A5AE551BBF428
3,265,007 UART: [art] SIG.R = 6B69A46154754D46EA5EBCE5CCC4BF0872F2F58CC695F40289A44E32087335418FAC6CDD169A9DEDD9F06977E337C32B
3,271,778 UART: [art] SIG.S = A42D96CA2AD866BD1A13317885653F92E6AB9739234A50914FC59CBA65A0C793A8D407B60DE8B9076288B3A0BB18649D
3,295,832 UART: Caliptra RT
3,296,177 UART: [state] CFI Enabled
3,404,364 UART: [rt] RT listening for mailbox commands...
3,405,034 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,490 UART: [rt]cmd =0x434b4558, len=80
3,604,787 >>> mbox cmd response data (6280 bytes)
3,604,788 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,256 UART: [rt]cmd =0x414c544e, len=41
3,636,221 >>> mbox cmd response data (8 bytes)
3,636,222 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,025 UART: [rt]cmd =0x434b4558, len=80
3,834,870 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,813 UART: [state] WD Timer not started. Device not locked for debugging
88,162 UART: [kat] SHA2-256
893,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,937 UART: [kat] ++
898,089 UART: [kat] sha1
902,205 UART: [kat] SHA2-256
904,145 UART: [kat] SHA2-384
907,096 UART: [kat] SHA2-512-ACC
908,997 UART: [kat] ECC-384
918,714 UART: [kat] HMAC-384Kdf
923,390 UART: [kat] LMS
1,171,718 UART: [kat] --
1,172,431 UART: [cold-reset] ++
1,172,973 UART: [fht] FHT @ 0x50003400
1,175,598 UART: [idev] ++
1,175,766 UART: [idev] CDI.KEYID = 6
1,176,126 UART: [idev] SUBJECT.KEYID = 7
1,176,550 UART: [idev] UDS.KEYID = 0
1,176,895 ready_for_fw is high
1,176,895 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,794 UART: [idev] Erasing UDS.KEYID = 0
1,201,659 UART: [idev] Sha1 KeyId Algorithm
1,210,049 UART: [idev] --
1,211,089 UART: [ldev] ++
1,211,257 UART: [ldev] CDI.KEYID = 6
1,211,620 UART: [ldev] SUBJECT.KEYID = 5
1,212,046 UART: [ldev] AUTHORITY.KEYID = 7
1,212,509 UART: [ldev] FE.KEYID = 1
1,217,537 UART: [ldev] Erasing FE.KEYID = 1
1,244,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,217 UART: [ldev] --
1,283,524 UART: [fwproc] Wait for Commands...
1,284,134 UART: [fwproc] Recv command 0x46574c44
1,284,862 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,587 >>> mbox cmd response: success
2,773,681 UART: [afmc] ++
2,773,849 UART: [afmc] CDI.KEYID = 6
2,774,211 UART: [afmc] SUBJECT.KEYID = 7
2,774,636 UART: [afmc] AUTHORITY.KEYID = 5
2,809,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,328 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,056 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,941 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,660 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,618 UART: [afmc] --
2,853,598 UART: [cold-reset] --
2,854,146 UART: [state] Locking Datavault
2,855,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,941 UART: [state] Locking ICCM
2,856,549 UART: [exit] Launching FMC @ 0x40000130
2,861,878 UART:
2,861,894 UART: Running Caliptra FMC ...
2,862,302 UART:
2,862,356 UART: [state] CFI Enabled
2,873,083 UART: [fht] FMC Alias Private Key: 7
2,981,190 UART: [art] Extend RT PCRs Done
2,981,618 UART: [art] Lock RT PCRs Done
2,982,940 UART: [art] Populate DV Done
2,991,209 UART: [fht] FMC Alias Private Key: 7
2,992,323 UART: [art] Derive CDI
2,992,603 UART: [art] Store in in slot 0x4
3,078,354 UART: [art] Derive Key Pair
3,078,714 UART: [art] Store priv key in slot 0x5
3,091,646 UART: [art] Derive Key Pair - Done
3,106,285 UART: [art] Signing Cert with AUTHO
3,106,765 UART: RITY.KEYID = 7
3,121,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,764 UART: [art] PUB.X = 8D6C2ABE967852F0EF5722933A416FBD5096A00C6B3E59A62CB4AAE004A3B65636E16AB1A8714F0ED1CC121E792CDBC5
3,129,539 UART: [art] PUB.Y = 35D791A644E83A9EC28E30F3AB665B55B5996C5394B00B74F0617E6969DC7E79362EB8E32D8682F4ED098E3732E243BB
3,136,483 UART: [art] SIG.R = 33870F34812DD506D83679E7E95FCEABAE811FDAB2A63A0C5D18D4F6B6E56B1D0C5DA71953E0D8913180045BF4B12DD2
3,143,250 UART: [art] SIG.S = 07821E17C9DC46F800FE68592A23B28E0B05D5A1D4EBE2F2E75E37D582CF989D8DA93D72AFD0D7FFA10358DDEE717DE6
3,167,687 UART: Caliptra RT
3,167,940 UART: [state] CFI Enabled
3,275,989 UART: [rt] RT listening for mailbox commands...
3,276,659 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,895 UART: [rt]cmd =0x434b4558, len=80
3,475,838 >>> mbox cmd response data (6280 bytes)
3,475,839 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,277 UART: [rt]cmd =0x414c544e, len=41
3,507,296 >>> mbox cmd response data (8 bytes)
3,507,297 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,246 UART: [rt]cmd =0x434b4558, len=80
3,705,435 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,463 ready_for_fw is high
1,059,463 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,258 >>> mbox cmd response: success
2,688,204 UART:
2,688,220 UART: Running Caliptra FMC ...
2,688,628 UART:
2,688,682 UART: [state] CFI Enabled
2,699,109 UART: [fht] FMC Alias Private Key: 7
2,807,368 UART: [art] Extend RT PCRs Done
2,807,796 UART: [art] Lock RT PCRs Done
2,808,966 UART: [art] Populate DV Done
2,817,043 UART: [fht] FMC Alias Private Key: 7
2,818,155 UART: [art] Derive CDI
2,818,435 UART: [art] Store in in slot 0x4
2,903,750 UART: [art] Derive Key Pair
2,904,110 UART: [art] Store priv key in slot 0x5
2,917,082 UART: [art] Derive Key Pair - Done
2,931,974 UART: [art] Signing Cert with AUTHO
2,932,454 UART: RITY.KEYID = 7
2,947,332 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,097 UART: [art] PUB.X = 2B1DFE003DE7124A1F1D727EA002A83F3B6EC49B8C2B96083220554E571C4D0F87497C0A048264E3AD9865E40B906F2C
2,954,829 UART: [art] PUB.Y = E17625DF30674385175B63D78A2E57718FE41C57BDA2039312E8EF78A076315CAB6F88ABC598748508A6D6A0E4A4489F
2,961,771 UART: [art] SIG.R = 677607319A1B28008347EAB3B828979E4F5D53B516C42BA74F3AD08173F460173EDEBF0CF17B7DB7556C27F8B00F3404
2,968,507 UART: [art] SIG.S = 77060798BEAC433098D9DC9A9C0AC45B29C90C807AA7026C5C7E41999CD78F88B57C5F7E022F4738415D136712D008F7
2,991,971 UART: Caliptra RT
2,992,224 UART: [state] CFI Enabled
3,099,151 UART: [rt] RT listening for mailbox commands...
3,099,821 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,319 UART: [rt]cmd =0x434b4558, len=80
3,298,150 >>> mbox cmd response data (6280 bytes)
3,298,151 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,661 UART: [rt]cmd =0x414c544e, len=41
3,329,502 >>> mbox cmd response data (8 bytes)
3,329,503 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,098 UART: [rt]cmd =0x434b4558, len=80
3,527,269 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
893,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,776 UART: [kat] ++
897,928 UART: [kat] sha1
902,128 UART: [kat] SHA2-256
904,068 UART: [kat] SHA2-384
906,727 UART: [kat] SHA2-512-ACC
908,628 UART: [kat] ECC-384
918,519 UART: [kat] HMAC-384Kdf
923,241 UART: [kat] LMS
1,171,569 UART: [kat] --
1,172,520 UART: [cold-reset] ++
1,172,860 UART: [fht] FHT @ 0x50003400
1,175,363 UART: [idev] ++
1,175,531 UART: [idev] CDI.KEYID = 6
1,175,891 UART: [idev] SUBJECT.KEYID = 7
1,176,315 UART: [idev] UDS.KEYID = 0
1,176,660 ready_for_fw is high
1,176,660 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,202,492 UART: [idev] Sha1 KeyId Algorithm
1,210,950 UART: [idev] --
1,211,972 UART: [ldev] ++
1,212,140 UART: [ldev] CDI.KEYID = 6
1,212,503 UART: [ldev] SUBJECT.KEYID = 5
1,212,929 UART: [ldev] AUTHORITY.KEYID = 7
1,213,392 UART: [ldev] FE.KEYID = 1
1,218,538 UART: [ldev] Erasing FE.KEYID = 1
1,244,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,030 UART: [ldev] --
1,284,317 UART: [fwproc] Wait for Commands...
1,284,903 UART: [fwproc] Recv command 0x46574c44
1,285,631 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,870 >>> mbox cmd response: success
2,775,124 UART: [afmc] ++
2,775,292 UART: [afmc] CDI.KEYID = 6
2,775,654 UART: [afmc] SUBJECT.KEYID = 7
2,776,079 UART: [afmc] AUTHORITY.KEYID = 5
2,811,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,561 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,446 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,165 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,937 UART: [afmc] --
2,854,913 UART: [cold-reset] --
2,855,819 UART: [state] Locking Datavault
2,857,160 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,764 UART: [state] Locking ICCM
2,858,332 UART: [exit] Launching FMC @ 0x40000130
2,863,661 UART:
2,863,677 UART: Running Caliptra FMC ...
2,864,085 UART:
2,864,228 UART: [state] CFI Enabled
2,874,701 UART: [fht] FMC Alias Private Key: 7
2,983,144 UART: [art] Extend RT PCRs Done
2,983,572 UART: [art] Lock RT PCRs Done
2,984,900 UART: [art] Populate DV Done
2,993,255 UART: [fht] FMC Alias Private Key: 7
2,994,337 UART: [art] Derive CDI
2,994,617 UART: [art] Store in in slot 0x4
3,080,668 UART: [art] Derive Key Pair
3,081,028 UART: [art] Store priv key in slot 0x5
3,094,424 UART: [art] Derive Key Pair - Done
3,108,926 UART: [art] Signing Cert with AUTHO
3,109,406 UART: RITY.KEYID = 7
3,125,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,803 UART: [art] PUB.X = 1BCF9DBF49908485DE2ECD2F7A5F747015BCA3469382C48DFEC456D5E238A6644184CE7171225CE523C62270D98F1CEB
3,132,581 UART: [art] PUB.Y = 59A602A8ADF92F1A5DB706BB8A3644A10BA4C06705993DA5C59423A83AAFD7F628B58BB1245CEF12078C82A011353271
3,139,520 UART: [art] SIG.R = B11618F80B592BA0DF6F016C9E3FA6F81064BB2B5AC7CA8C9889C86A556199779FF616E3FFDB2DD92CC833A8572D129A
3,146,296 UART: [art] SIG.S = 2358BA1E2F0BA0AD29BD21999BDCDB124B6E4504E7E92F7BCE9CAD12314F2754A7F4A4E15891205B7C6F9B944C57362A
3,170,867 UART: Caliptra RT
3,171,212 UART: [state] CFI Enabled
3,278,835 UART: [rt] RT listening for mailbox commands...
3,279,505 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,821 UART: [rt]cmd =0x434b4558, len=80
3,478,214 >>> mbox cmd response data (6280 bytes)
3,478,215 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,597 UART: [rt]cmd =0x414c544e, len=41
3,509,588 >>> mbox cmd response data (8 bytes)
3,509,589 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,552 UART: [rt]cmd =0x434b4558, len=80
3,709,209 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,882 ready_for_fw is high
1,060,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,349 >>> mbox cmd response: success
2,688,797 UART:
2,688,813 UART: Running Caliptra FMC ...
2,689,221 UART:
2,689,364 UART: [state] CFI Enabled
2,699,847 UART: [fht] FMC Alias Private Key: 7
2,807,784 UART: [art] Extend RT PCRs Done
2,808,212 UART: [art] Lock RT PCRs Done
2,809,542 UART: [art] Populate DV Done
2,817,857 UART: [fht] FMC Alias Private Key: 7
2,818,837 UART: [art] Derive CDI
2,819,117 UART: [art] Store in in slot 0x4
2,905,006 UART: [art] Derive Key Pair
2,905,366 UART: [art] Store priv key in slot 0x5
2,918,704 UART: [art] Derive Key Pair - Done
2,933,327 UART: [art] Signing Cert with AUTHO
2,933,807 UART: RITY.KEYID = 7
2,949,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,256 UART: [art] PUB.X = 4CAD247A0D2E3F4966CD2CB3ADBF1545E4CFE6B96EF002599C9F0539B805CEE920DD16497A0F644D149980557BB0A1E4
2,957,023 UART: [art] PUB.Y = D7213AAFA9ABEDFC77AB8AE7AA18A43A453E5E93B8A0B304903C1BF177D7622896ABFE1FCF4AF26B3EA665F8B5BF23BC
2,964,000 UART: [art] SIG.R = 4603374FB8BE419E48347EFEF8DCAF902E3D285A2CBA58EFCA51F87920784EFEE1FDA3A995C5DD3664EAC69931782BF0
2,970,785 UART: [art] SIG.S = 983BDF6F697BC60E3A9066B8B8654B419A18589DF233EE13A9BAAA137FBF6E9A2952347B57692780577DBE1D126B3529
2,994,393 UART: Caliptra RT
2,994,738 UART: [state] CFI Enabled
3,102,119 UART: [rt] RT listening for mailbox commands...
3,102,789 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,423 UART: [rt]cmd =0x434b4558, len=80
3,302,483 >>> mbox cmd response data (6280 bytes)
3,302,484 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,952 UART: [rt]cmd =0x414c544e, len=41
3,334,033 >>> mbox cmd response data (8 bytes)
3,334,034 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,015 UART: [rt]cmd =0x434b4558, len=80
3,532,811 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,630 UART: [state] LifecycleState = Unprovisioned
85,285 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,284 UART: [kat] SHA2-256
890,834 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,963 UART: [kat] ++
895,115 UART: [kat] sha1
899,357 UART: [kat] SHA2-256
901,297 UART: [kat] SHA2-384
903,924 UART: [kat] SHA2-512-ACC
905,825 UART: [kat] ECC-384
915,374 UART: [kat] HMAC-384Kdf
919,858 UART: [kat] LMS
1,168,170 UART: [kat] --
1,169,325 UART: [cold-reset] ++
1,169,679 UART: [fht] FHT @ 0x50003400
1,172,445 UART: [idev] ++
1,172,613 UART: [idev] CDI.KEYID = 6
1,172,974 UART: [idev] SUBJECT.KEYID = 7
1,173,399 UART: [idev] UDS.KEYID = 0
1,173,745 ready_for_fw is high
1,173,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,137 UART: [idev] Sha1 KeyId Algorithm
1,207,021 UART: [idev] --
1,208,244 UART: [ldev] ++
1,208,412 UART: [ldev] CDI.KEYID = 6
1,208,776 UART: [ldev] SUBJECT.KEYID = 5
1,209,203 UART: [ldev] AUTHORITY.KEYID = 7
1,209,666 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,240,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,612 UART: [ldev] --
1,280,006 UART: [fwproc] Wait for Commands...
1,280,817 UART: [fwproc] Recv command 0x46574c44
1,281,550 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,121 >>> mbox cmd response: success
2,770,196 UART: [afmc] ++
2,770,364 UART: [afmc] CDI.KEYID = 6
2,770,727 UART: [afmc] SUBJECT.KEYID = 7
2,771,153 UART: [afmc] AUTHORITY.KEYID = 5
2,806,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,953 UART: [afmc] --
2,849,991 UART: [cold-reset] --
2,850,719 UART: [state] Locking Datavault
2,852,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,614 UART: [state] Locking ICCM
2,853,216 UART: [exit] Launching FMC @ 0x40000130
2,858,545 UART:
2,858,561 UART: Running Caliptra FMC ...
2,858,969 UART:
2,859,023 UART: [state] CFI Enabled
2,869,104 UART: [fht] FMC Alias Private Key: 7
2,977,717 UART: [art] Extend RT PCRs Done
2,978,145 UART: [art] Lock RT PCRs Done
2,979,987 UART: [art] Populate DV Done
2,988,180 UART: [fht] FMC Alias Private Key: 7
2,989,216 UART: [art] Derive CDI
2,989,496 UART: [art] Store in in slot 0x4
3,075,627 UART: [art] Derive Key Pair
3,075,987 UART: [art] Store priv key in slot 0x5
3,089,347 UART: [art] Derive Key Pair - Done
3,104,267 UART: [art] Signing Cert with AUTHO
3,104,747 UART: RITY.KEYID = 7
3,120,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,830 UART: [art] PUB.X = A8115BAD7DB8A43ADCAA5B04773347728B7D8C651F9DA7A5DA6C430E0B54B71DBD23B6564EFECDC138568875F37262D5
3,127,605 UART: [art] PUB.Y = 2230BEBDD53AD024D1ACE2906530349D4352295B98C6EF24F2525F3167E1CA290A9BFFDE6B86472A793C55FD59C8F356
3,134,558 UART: [art] SIG.R = 8E5CA288CEF2E53499C1A4CDEF29852C4A93A7BE57D6F34386049325201679B56EE3E3230F7BB527DC5B1EDF25505444
3,141,326 UART: [art] SIG.S = DD71F788FF1A4A8DA294198A6C6D517A47383C5C4DDBC333A5BFA9D5607B249CBA115656CCFD93DEC2D78D48D206FD45
3,164,684 UART: Caliptra RT
3,164,937 UART: [state] CFI Enabled
3,272,533 UART: [rt] RT listening for mailbox commands...
3,273,203 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,877 UART: [rt]cmd =0x434b4558, len=80
3,473,173 >>> mbox cmd response data (6280 bytes)
3,473,174 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,890 UART: [rt]cmd =0x414c544e, len=41
3,504,969 >>> mbox cmd response data (8 bytes)
3,504,970 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,717 UART: [rt]cmd =0x434b4558, len=80
3,702,651 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,538 ready_for_fw is high
1,056,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,965 >>> mbox cmd response: success
2,683,177 UART:
2,683,193 UART: Running Caliptra FMC ...
2,683,601 UART:
2,683,655 UART: [state] CFI Enabled
2,694,122 UART: [fht] FMC Alias Private Key: 7
2,802,155 UART: [art] Extend RT PCRs Done
2,802,583 UART: [art] Lock RT PCRs Done
2,803,993 UART: [art] Populate DV Done
2,812,236 UART: [fht] FMC Alias Private Key: 7
2,813,268 UART: [art] Derive CDI
2,813,548 UART: [art] Store in in slot 0x4
2,899,195 UART: [art] Derive Key Pair
2,899,555 UART: [art] Store priv key in slot 0x5
2,912,573 UART: [art] Derive Key Pair - Done
2,927,194 UART: [art] Signing Cert with AUTHO
2,927,674 UART: RITY.KEYID = 7
2,942,732 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,497 UART: [art] PUB.X = 75CCAEE0519E769E3B7BB1865B1B583A71EDFE42D2E9765E877D2B5A1936069149754CD7529E5813B73709B2A51E6ECE
2,950,265 UART: [art] PUB.Y = 91DE38A55AD196430ADAADA588FA4744C0BB6480A0EBD2F5A84BB6D283CF96B4A6BD3DF1A5B76585941861915BF78785
2,957,224 UART: [art] SIG.R = E71ED7914D0D40948C0617FF8CCBEBA4439EF40BD406AED3F2ABAB08645D21F71EA3A3A3FEF426424D629446A601F933
2,963,990 UART: [art] SIG.S = B3B74867A3EB79E2A71EE7362A0CCF90DD24944848B3239D3C39E1B761BC3BD439DB3B269D4F022D0D7AA9B5B3997B73
2,988,002 UART: Caliptra RT
2,988,255 UART: [state] CFI Enabled
3,096,087 UART: [rt] RT listening for mailbox commands...
3,096,757 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,085 UART: [rt]cmd =0x434b4558, len=80
3,296,430 >>> mbox cmd response data (6280 bytes)
3,296,431 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,081 UART: [rt]cmd =0x414c544e, len=41
3,328,240 >>> mbox cmd response data (8 bytes)
3,328,241 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,018 UART: [rt]cmd =0x434b4558, len=80
3,527,015 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
900,060 UART: [kat] SHA2-256
902,000 UART: [kat] SHA2-384
904,611 UART: [kat] SHA2-512-ACC
906,512 UART: [kat] ECC-384
916,337 UART: [kat] HMAC-384Kdf
920,983 UART: [kat] LMS
1,169,295 UART: [kat] --
1,170,216 UART: [cold-reset] ++
1,170,586 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,412 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,216,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,417 UART: [ldev] --
1,281,885 UART: [fwproc] Wait for Commands...
1,282,476 UART: [fwproc] Recv command 0x46574c44
1,283,209 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,834 >>> mbox cmd response: success
2,772,099 UART: [afmc] ++
2,772,267 UART: [afmc] CDI.KEYID = 6
2,772,630 UART: [afmc] SUBJECT.KEYID = 7
2,773,056 UART: [afmc] AUTHORITY.KEYID = 5
2,808,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,906 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,635 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,518 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,237 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,286 UART: [afmc] --
2,852,418 UART: [cold-reset] --
2,853,134 UART: [state] Locking Datavault
2,854,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,985 UART: [state] Locking ICCM
2,855,637 UART: [exit] Launching FMC @ 0x40000130
2,860,966 UART:
2,860,982 UART: Running Caliptra FMC ...
2,861,390 UART:
2,861,533 UART: [state] CFI Enabled
2,871,770 UART: [fht] FMC Alias Private Key: 7
2,979,939 UART: [art] Extend RT PCRs Done
2,980,367 UART: [art] Lock RT PCRs Done
2,981,987 UART: [art] Populate DV Done
2,990,260 UART: [fht] FMC Alias Private Key: 7
2,991,386 UART: [art] Derive CDI
2,991,666 UART: [art] Store in in slot 0x4
3,077,647 UART: [art] Derive Key Pair
3,078,007 UART: [art] Store priv key in slot 0x5
3,090,449 UART: [art] Derive Key Pair - Done
3,105,334 UART: [art] Signing Cert with AUTHO
3,105,814 UART: RITY.KEYID = 7
3,121,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,907 UART: [art] PUB.X = FE3B558ABE126F43A16FD05F5EFEA7D6477E4E328A11D03A6A58BAD38BEBB27EB3888D455697BC99F8B5C190EF41D54A
3,128,697 UART: [art] PUB.Y = 601C5DBC32CD4E9FEAAE59692D6927081AFD4D770AAAED9C189BD60F17FD4C047FBDCF6FBF8A057B83B399D816F1140B
3,135,653 UART: [art] SIG.R = C179227AA61C04641DC584ACE8C627140DF309E91DAB31D9F77D955F80B3A3AB43AF29ABE0C12082BDB5C9ABFF18DA54
3,142,432 UART: [art] SIG.S = 5BF33D48D6022F4061F3A6A40ED7396BB1BC57A408A989D69A0CD53B215B63660FDFB9C4E9B0BF21CDC201D6CC210672
3,166,146 UART: Caliptra RT
3,166,491 UART: [state] CFI Enabled
3,275,184 UART: [rt] RT listening for mailbox commands...
3,275,854 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,328 UART: [rt]cmd =0x434b4558, len=80
3,475,433 >>> mbox cmd response data (6280 bytes)
3,475,434 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,505,088 UART: [rt]cmd =0x414c544e, len=41
3,507,051 >>> mbox cmd response data (8 bytes)
3,507,052 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,873 UART: [rt]cmd =0x434b4558, len=80
3,706,016 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,391 ready_for_fw is high
1,056,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,064 >>> mbox cmd response: success
2,684,218 UART:
2,684,234 UART: Running Caliptra FMC ...
2,684,642 UART:
2,684,785 UART: [state] CFI Enabled
2,695,378 UART: [fht] FMC Alias Private Key: 7
2,803,047 UART: [art] Extend RT PCRs Done
2,803,475 UART: [art] Lock RT PCRs Done
2,804,683 UART: [art] Populate DV Done
2,812,948 UART: [fht] FMC Alias Private Key: 7
2,814,130 UART: [art] Derive CDI
2,814,410 UART: [art] Store in in slot 0x4
2,900,135 UART: [art] Derive Key Pair
2,900,495 UART: [art] Store priv key in slot 0x5
2,913,709 UART: [art] Derive Key Pair - Done
2,928,701 UART: [art] Signing Cert with AUTHO
2,929,181 UART: RITY.KEYID = 7
2,944,365 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,130 UART: [art] PUB.X = CA2C2772428CB6CCBBF79B9629F9E253732F3764E9452E9BDC6A94070619E352A9C773E125EEC22761919D4D6B815FEF
2,951,898 UART: [art] PUB.Y = 56686DCE5D84055DBCBDB8BBE4B6BEE66028B25FB0693D371D678931B54E4BC8A6599BD4A2437C8ED698E6F6520942FC
2,958,854 UART: [art] SIG.R = B6056BF1FAA8C6517C491EE8846975278529FE108662BCFE4552A7098C5E42009EDCDA148CC7209E498293AFE2E0A92F
2,965,600 UART: [art] SIG.S = 77780831326E0531EC770E70EFC3C875F63480AE7DFAF53CFD7107763F593A32582954C55BB750EDC6C74614A5AC8964
2,989,585 UART: Caliptra RT
2,989,930 UART: [state] CFI Enabled
3,097,327 UART: [rt] RT listening for mailbox commands...
3,097,997 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,255 UART: [rt]cmd =0x434b4558, len=80
3,297,625 >>> mbox cmd response data (6280 bytes)
3,297,626 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,040 UART: [rt]cmd =0x414c544e, len=41
3,328,809 >>> mbox cmd response data (8 bytes)
3,328,810 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,651 UART: [rt]cmd =0x434b4558, len=80
3,527,643 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,249 UART:
192,607 UART: Running Caliptra ROM ...
193,811 UART:
193,971 UART: [state] CFI Enabled
278,512 UART: [state] LifecycleState = Unprovisioned
280,499 UART: [state] DebugLocked = No
282,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
286,807 UART: [kat] SHA2-256
456,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
467,017 UART: [kat] ++
467,466 UART: [kat] sha1
479,260 UART: [kat] SHA2-256
481,983 UART: [kat] SHA2-384
486,973 UART: [kat] SHA2-512-ACC
489,335 UART: [kat] ECC-384
2,782,498 UART: [kat] HMAC-384Kdf
2,812,925 UART: [kat] LMS
4,003,271 UART: [kat] --
4,006,888 UART: [cold-reset] ++
4,008,398 UART: [fht] Storing FHT @ 0x50003400
4,020,796 UART: [idev] ++
4,021,363 UART: [idev] CDI.KEYID = 6
4,022,392 UART: [idev] SUBJECT.KEYID = 7
4,023,559 UART: [idev] UDS.KEYID = 0
4,024,602 ready_for_fw is high
4,024,795 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,167,974 UART: [idev] Erasing UDS.KEYID = 0
7,360,504 UART: [idev] Using Sha1 for KeyId Algorithm
7,383,173 UART: [idev] --
7,387,380 UART: [ldev] ++
7,387,946 UART: [ldev] CDI.KEYID = 6
7,388,911 UART: [ldev] SUBJECT.KEYID = 5
7,390,116 UART: [ldev] AUTHORITY.KEYID = 7
7,391,399 UART: [ldev] FE.KEYID = 1
7,437,597 UART: [ldev] Erasing FE.KEYID = 1
10,771,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,528 UART: [ldev] --
13,127,817 UART: [fwproc] Waiting for Commands...
13,130,821 UART: [fwproc] Received command 0x46574c44
13,132,990 UART: [fwproc] Received Image of size 113844 bytes
17,184,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,472 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,649,093 >>> mbox cmd response: success
17,653,668 UART: [afmc] ++
17,654,286 UART: [afmc] CDI.KEYID = 6
17,655,196 UART: [afmc] SUBJECT.KEYID = 7
17,656,415 UART: [afmc] AUTHORITY.KEYID = 5
21,023,223 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,145 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,455 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,339,883 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,699 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,369,135 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,389,537 UART: [afmc] --
23,393,990 UART: [cold-reset] --
23,397,358 UART: [state] Locking Datavault
23,402,824 UART: [state] Locking PCR0, PCR1 and PCR31
23,404,573 UART: [state] Locking ICCM
23,405,881 UART: [exit] Launching FMC @ 0x40000130
23,414,227 UART:
23,414,499 UART: Running Caliptra FMC ...
23,415,545 UART:
23,415,690 UART: [state] CFI Enabled
23,483,664 UART: [fht] FMC Alias Private Key: 7
25,821,821 UART: [art] Extend RT PCRs Done
25,823,047 UART: [art] Lock RT PCRs Done
25,824,430 UART: [art] Populate DV Done
25,829,841 UART: [fht] FMC Alias Private Key: 7
25,831,540 UART: [art] Derive CDI
25,832,353 UART: [art] Store in in slot 0x4
25,892,388 UART: [art] Derive Key Pair
25,893,424 UART: [art] Store priv key in slot 0x5
29,186,680 UART: [art] Derive Key Pair - Done
29,200,000 UART: [art] Signing Cert with AUTHO
29,201,303 UART: RITY.KEYID = 7
31,488,674 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,183 UART: [art] PUB.X = CC6EB1225D35820FD869CC4ED10C3EB01E4AD7FBB8221D5A2CC62155582D89D5A331CF1AC3F029D3257432967CCC5730
31,497,438 UART: [art] PUB.Y = 1992C428EC1E5B93739423B2F477C2E12D4623F1569CC667EDB8B537660FE6EC54DB1259DB9CE79549365204652D20D8
31,504,647 UART: [art] SIG.R = 55AAB2C6939F3A1295108E23B7C293342A8D8140E61E56C5C3848B4BED90E5FE205D35F446E9068ABE04F5431E54F163
31,512,003 UART: [art] SIG.S = D167742E5453E6D134717D4CB37A820368540E3FB312FE2C6AAF1CF3D8B91CD76A99E2CDD38B063CDBE4B2FDCB568912
32,816,825 UART: Caliptra RT
32,817,536 UART: [state] CFI Enabled
32,978,164 UART: [rt] RT listening for mailbox commands...
32,980,093 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,010,851 UART: [rt]cmd =0x414c544e, len=41
33,013,464 >>> mbox cmd response data (8 bytes)
33,014,378 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,044,785 UART: [rt]cmd =0x434b4558, len=80
38,786,844 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,784,031 ready_for_fw is high
3,784,612 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,856,141 >>> mbox cmd response: success
23,542,750 UART:
23,543,121 UART: Running Caliptra FMC ...
23,544,308 UART:
23,544,492 UART: [state] CFI Enabled
23,612,802 UART: [fht] FMC Alias Private Key: 7
25,950,953 UART: [art] Extend RT PCRs Done
25,952,174 UART: [art] Lock RT PCRs Done
25,954,229 UART: [art] Populate DV Done
25,959,582 UART: [fht] FMC Alias Private Key: 7
25,961,114 UART: [art] Derive CDI
25,962,085 UART: [art] Store in in slot 0x4
26,020,873 UART: [art] Derive Key Pair
26,021,865 UART: [art] Store priv key in slot 0x5
29,314,930 UART: [art] Derive Key Pair - Done
29,327,867 UART: [art] Signing Cert with AUTHO
29,329,200 UART: RITY.KEYID = 7
31,616,670 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,170 UART: [art] PUB.X = B0295A5356BF605E9B91ED98523B4A810FDE57D115A4AFDD45AA6333DA0A58EBD99286015199D04267B266C8859DE861
31,625,435 UART: [art] PUB.Y = 4CA09C3368CFEE87448FB101FDB2961FE2A5EB05FDFF58993BEB6E4BC0F55835D2DCB5D1A753688AA4713292B46DF7EC
31,632,693 UART: [art] SIG.R = 669CDEDEAA467F622BFA89BC845F0A4A8FABFC2FBB09CE4074A44F508838035CB23CF23EB6A55539C4C41855747F0515
31,640,100 UART: [art] SIG.S = 87F45588E519A9207131058468F779E7DD73150E8224D34D6CC03B8ED36942A0E331C30B6D05CE7B455AB2A36E1E24D4
32,945,421 UART: Caliptra RT
32,946,121 UART: [state] CFI Enabled
33,106,858 UART: [rt] RT listening for mailbox commands...
33,108,768 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,139,628 UART: [rt]cmd =0x414c544e, len=41
33,142,118 >>> mbox cmd response data (8 bytes)
33,142,978 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,173,412 UART: [rt]cmd =0x434b4558, len=80
38,912,245 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,452 UART:
192,835 UART: Running Caliptra ROM ...
194,038 UART:
603,785 UART: [state] CFI Enabled
621,915 UART: [state] LifecycleState = Unprovisioned
623,807 UART: [state] DebugLocked = No
625,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,202 UART: [kat] SHA2-256
798,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,457 UART: [kat] ++
809,938 UART: [kat] sha1
820,621 UART: [kat] SHA2-256
823,307 UART: [kat] SHA2-384
829,941 UART: [kat] SHA2-512-ACC
832,307 UART: [kat] ECC-384
3,113,829 UART: [kat] HMAC-384Kdf
3,126,994 UART: [kat] LMS
4,317,095 UART: [kat] --
4,322,172 UART: [cold-reset] ++
4,323,677 UART: [fht] Storing FHT @ 0x50003400
4,334,592 UART: [idev] ++
4,335,376 UART: [idev] CDI.KEYID = 6
4,336,268 UART: [idev] SUBJECT.KEYID = 7
4,337,319 UART: [idev] UDS.KEYID = 0
4,338,316 ready_for_fw is high
4,338,510 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,385 UART: [idev] Erasing UDS.KEYID = 0
7,628,074 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,664 UART: [idev] --
7,654,626 UART: [ldev] ++
7,655,191 UART: [ldev] CDI.KEYID = 6
7,656,129 UART: [ldev] SUBJECT.KEYID = 5
7,657,342 UART: [ldev] AUTHORITY.KEYID = 7
7,658,632 UART: [ldev] FE.KEYID = 1
7,667,312 UART: [ldev] Erasing FE.KEYID = 1
10,956,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,686 UART: [ldev] --
13,317,027 UART: [fwproc] Waiting for Commands...
13,319,345 UART: [fwproc] Received command 0x46574c44
13,321,526 UART: [fwproc] Received Image of size 113844 bytes
17,368,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,835,999 >>> mbox cmd response: success
17,840,708 UART: [afmc] ++
17,841,313 UART: [afmc] CDI.KEYID = 6
17,842,229 UART: [afmc] SUBJECT.KEYID = 7
17,843,444 UART: [afmc] AUTHORITY.KEYID = 5
21,154,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,643 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,894 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,302 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,117 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,542 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,657 UART: [afmc] --
23,519,113 UART: [cold-reset] --
23,523,031 UART: [state] Locking Datavault
23,528,766 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,465 UART: [state] Locking ICCM
23,533,049 UART: [exit] Launching FMC @ 0x40000130
23,541,428 UART:
23,541,677 UART: Running Caliptra FMC ...
23,542,781 UART:
23,542,942 UART: [state] CFI Enabled
23,551,267 UART: [fht] FMC Alias Private Key: 7
25,881,786 UART: [art] Extend RT PCRs Done
25,883,011 UART: [art] Lock RT PCRs Done
25,884,910 UART: [art] Populate DV Done
25,890,271 UART: [fht] FMC Alias Private Key: 7
25,891,810 UART: [art] Derive CDI
25,892,625 UART: [art] Store in in slot 0x4
25,935,278 UART: [art] Derive Key Pair
25,936,315 UART: [art] Store priv key in slot 0x5
29,178,658 UART: [art] Derive Key Pair - Done
29,191,393 UART: [art] Signing Cert with AUTHO
29,192,734 UART: RITY.KEYID = 7
31,472,082 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,592 UART: [art] PUB.X = 332912AFE36F0A3AB244C8DAFB51E0C7503A6C0787F3D820E18166E1A7AD3FD2204D732C05C698646E4A0082DD056DC4
31,480,798 UART: [art] PUB.Y = A494B40C44037D10146B5D07363A0A8DD3DE200C3FFACFB5EC36070255405A815B55F8837AF9065AEE74C6071C826EF5
31,488,044 UART: [art] SIG.R = 97FDD3224B67EA2752822D4F4E2DBB30361C8115BA3E07217C3695DD13B57C074FF1FF75D93BB3EC4C5E786859BC7D78
31,495,452 UART: [art] SIG.S = C872D3EDB77E183DBEC963CD42EBE4424595F9BC2B5F3B1E55D2B967DF9269A6755BA9C7EF95F36B3248B88D4F48C2C5
32,800,667 UART: Caliptra RT
32,801,367 UART: [state] CFI Enabled
32,919,299 UART: [rt] RT listening for mailbox commands...
32,921,181 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
32,951,728 UART: [rt]cmd =0x414c544e, len=41
32,954,173 >>> mbox cmd response data (8 bytes)
32,954,903 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,985,182 UART: [rt]cmd =0x434b4558, len=80
38,647,911 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,132,341 ready_for_fw is high
4,132,743 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,064,266 >>> mbox cmd response: success
23,709,331 UART:
23,709,729 UART: Running Caliptra FMC ...
23,710,848 UART:
23,711,003 UART: [state] CFI Enabled
23,719,029 UART: [fht] FMC Alias Private Key: 7
26,049,857 UART: [art] Extend RT PCRs Done
26,051,086 UART: [art] Lock RT PCRs Done
26,052,806 UART: [art] Populate DV Done
26,058,059 UART: [fht] FMC Alias Private Key: 7
26,059,604 UART: [art] Derive CDI
26,060,342 UART: [art] Store in in slot 0x4
26,103,316 UART: [art] Derive Key Pair
26,104,359 UART: [art] Store priv key in slot 0x5
29,345,875 UART: [art] Derive Key Pair - Done
29,358,712 UART: [art] Signing Cert with AUTHO
29,360,022 UART: RITY.KEYID = 7
31,639,093 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,601 UART: [art] PUB.X = 7F2CB186C992884351E138B4E77F0FDB236BE9EE8CC92313C50E4AA6AE10659F4C86C7444115DF6A6933F76D1650E2D2
31,647,857 UART: [art] PUB.Y = 28F8BC799B4FB182A979E6108E5640EE2813122C60FAFE4D277ABD04F27B977D0BCFC8EA6B592B6A517B23B700EDE016
31,655,110 UART: [art] SIG.R = 60AA84B5E34697BB0EC2897BC84D522AD9BBC88A769DA5169E449CED78674E149A3CF068984EE7DD671751C9A169FBAE
31,662,504 UART: [art] SIG.S = DBF3C0D691A523FA647F44300ED67FF0C65C3D5A659CECCC50248EA0C5FA5E0DE5AD0E102CD50056077121D029FE5280
32,967,788 UART: Caliptra RT
32,968,491 UART: [state] CFI Enabled
33,085,829 UART: [rt] RT listening for mailbox commands...
33,087,709 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,118,529 UART: [rt]cmd =0x414c544e, len=41
33,120,973 >>> mbox cmd response data (8 bytes)
33,121,718 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,152,312 UART: [rt]cmd =0x434b4558, len=80
38,814,726 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
192,235 UART:
192,609 UART: Running Caliptra ROM ...
193,814 UART:
193,976 UART: [state] CFI Enabled
265,661 UART: [state] LifecycleState = Unprovisioned
267,507 UART: [state] DebugLocked = No
269,047 UART: [state] WD Timer not started. Device not locked for debugging
271,955 UART: [kat] SHA2-256
451,108 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,659 UART: [kat] ++
463,222 UART: [kat] sha1
473,400 UART: [kat] SHA2-256
476,406 UART: [kat] SHA2-384
482,614 UART: [kat] SHA2-512-ACC
485,623 UART: [kat] ECC-384
2,948,151 UART: [kat] HMAC-384Kdf
2,972,333 UART: [kat] LMS
3,501,745 UART: [kat] --
3,507,515 UART: [cold-reset] ++
3,508,380 UART: [fht] FHT @ 0x50003400
3,518,292 UART: [idev] ++
3,518,860 UART: [idev] CDI.KEYID = 6
3,519,777 UART: [idev] SUBJECT.KEYID = 7
3,520,947 UART: [idev] UDS.KEYID = 0
3,521,999 ready_for_fw is high
3,522,217 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,860 UART: [idev] Erasing UDS.KEYID = 0
6,025,838 UART: [idev] Sha1 KeyId Algorithm
6,048,639 UART: [idev] --
6,053,612 UART: [ldev] ++
6,054,186 UART: [ldev] CDI.KEYID = 6
6,055,267 UART: [ldev] SUBJECT.KEYID = 5
6,056,403 UART: [ldev] AUTHORITY.KEYID = 7
6,057,598 UART: [ldev] FE.KEYID = 1
6,101,227 UART: [ldev] Erasing FE.KEYID = 1
8,604,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,406 UART: [ldev] --
10,413,557 UART: [fwproc] Wait for Commands...
10,415,504 UART: [fwproc] Recv command 0x46574c44
10,417,594 UART: [fwproc] Recv'd Img size: 114168 bytes
13,821,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,675 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,282,302 >>> mbox cmd response: success
14,286,061 UART: [afmc] ++
14,286,672 UART: [afmc] CDI.KEYID = 6
14,287,591 UART: [afmc] SUBJECT.KEYID = 7
14,288,695 UART: [afmc] AUTHORITY.KEYID = 5
16,824,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,233 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,994 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,010 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,857 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,263 UART: [afmc] --
18,629,357 UART: [cold-reset] --
18,633,974 UART: [state] Locking Datavault
18,639,387 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,103 UART: [state] Locking ICCM
18,643,773 UART: [exit] Launching FMC @ 0x40000130
18,652,176 UART:
18,652,411 UART: Running Caliptra FMC ...
18,653,512 UART:
18,653,674 UART: [state] CFI Enabled
18,710,260 UART: [fht] FMC Alias Private Key: 7
20,474,415 UART: [art] Extend RT PCRs Done
20,475,637 UART: [art] Lock RT PCRs Done
20,477,532 UART: [art] Populate DV Done
20,483,165 UART: [fht] FMC Alias Private Key: 7
20,484,660 UART: [art] Derive CDI
20,485,443 UART: [art] Store in in slot 0x4
20,542,477 UART: [art] Derive Key Pair
20,543,514 UART: [art] Store priv key in slot 0x5
23,005,959 UART: [art] Derive Key Pair - Done
23,018,854 UART: [art] Signing Cert with AUTHO
23,020,211 UART: RITY.KEYID = 7
24,731,754 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,238 UART: [art] PUB.X = D98ADD4C64F84C120A2FE9FA4A836B44CBBF4BFA48AE1D4CC374B7B886B7EABCF62A582D54C8509BCA68C7D959564572
24,740,541 UART: [art] PUB.Y = 6912A45CAF8F89E5DD2AEBBD3A394956CA01663E7E9F7C1460453B88A220A547A150C55F3B6C36D54DCA3862FFBA6F8D
24,747,842 UART: [art] SIG.R = 9298CB8F5348E75A2E0AA41CDABEA6F40C63B1ED699BF1B79DFBCBAB68DAF90F492A6C098A75A15CD58A135F1B1E754A
24,755,249 UART: [art] SIG.S = AAC5400BAA8E04CE982E1BCF8E19C1BD3755AE751725EEEF4E1C4984C2CFDE364D1005ABB8B1995F59B2835F2585ABB3
25,733,757 UART: Caliptra RT
25,734,484 UART: [state] CFI Enabled
25,899,821 UART: [rt] RT listening for mailbox commands...
25,901,723 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,932,388 UART: [rt]cmd =0x414c544e, len=41
25,935,020 >>> mbox cmd response data (8 bytes)
25,935,716 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,965,861 UART: [rt]cmd =0x434b4558, len=80
30,301,053 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,379,773 ready_for_fw is high
3,380,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,490 >>> mbox cmd response: success
18,360,060 UART:
18,360,468 UART: Running Caliptra FMC ...
18,361,577 UART:
18,361,733 UART: [state] CFI Enabled
18,431,034 UART: [fht] FMC Alias Private Key: 7
20,194,173 UART: [art] Extend RT PCRs Done
20,195,414 UART: [art] Lock RT PCRs Done
20,196,799 UART: [art] Populate DV Done
20,202,436 UART: [fht] FMC Alias Private Key: 7
20,204,032 UART: [art] Derive CDI
20,204,773 UART: [art] Store in in slot 0x4
20,262,891 UART: [art] Derive Key Pair
20,263,890 UART: [art] Store priv key in slot 0x5
22,726,689 UART: [art] Derive Key Pair - Done
22,739,647 UART: [art] Signing Cert with AUTHO
22,740,954 UART: RITY.KEYID = 7
24,452,347 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,849 UART: [art] PUB.X = B1E9FB167831276EAD99930FB774CBE75A49CDB7318C4C7D5F2D85A408583F4FDCA53B7D8352693B99EFA89244C1508D
24,461,080 UART: [art] PUB.Y = 0B7C32E15D2C0F0032B27E865BFE879A213C186E6D6A99EFFD9F7FD358EB0A12880A80C5F2DEAFAB37B80FC615070AEF
24,468,380 UART: [art] SIG.R = 6F066C365C54296DEEF927314C61EDE0B6EA106119D9E522BAC3F947AF60A9C47093DD98AA4E42E7FA88D37EA068F54B
24,475,764 UART: [art] SIG.S = 6852C971870DF66AD38C52F24CCA9A64C428965492C8C25EE8D19A4C1763A368FD14A8E5E465856497C7885A06E2C800
25,455,455 UART: Caliptra RT
25,456,156 UART: [state] CFI Enabled
25,619,599 UART: [rt] RT listening for mailbox commands...
25,621,485 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,652,122 UART: [rt]cmd =0x414c544e, len=41
25,654,598 >>> mbox cmd response data (8 bytes)
25,655,451 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,685,915 UART: [rt]cmd =0x434b4558, len=80
30,020,220 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,832 writing to cptra_bootfsm_go
193,077 UART:
193,480 UART: Running Caliptra ROM ...
194,683 UART:
604,268 UART: [state] CFI Enabled
622,141 UART: [state] LifecycleState = Unprovisioned
623,962 UART: [state] DebugLocked = No
626,212 UART: [state] WD Timer not started. Device not locked for debugging
630,405 UART: [kat] SHA2-256
809,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
821,101 UART: [kat] ++
821,632 UART: [kat] sha1
832,585 UART: [kat] SHA2-256
835,660 UART: [kat] SHA2-384
842,503 UART: [kat] SHA2-512-ACC
845,445 UART: [kat] ECC-384
3,286,527 UART: [kat] HMAC-384Kdf
3,299,180 UART: [kat] LMS
3,828,671 UART: [kat] --
3,832,379 UART: [cold-reset] ++
3,833,454 UART: [fht] FHT @ 0x50003400
3,843,221 UART: [idev] ++
3,843,785 UART: [idev] CDI.KEYID = 6
3,844,714 UART: [idev] SUBJECT.KEYID = 7
3,845,890 UART: [idev] UDS.KEYID = 0
3,846,816 ready_for_fw is high
3,847,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,459 UART: [idev] Erasing UDS.KEYID = 0
6,322,209 UART: [idev] Sha1 KeyId Algorithm
6,345,322 UART: [idev] --
6,348,409 UART: [ldev] ++
6,348,985 UART: [ldev] CDI.KEYID = 6
6,349,871 UART: [ldev] SUBJECT.KEYID = 5
6,351,029 UART: [ldev] AUTHORITY.KEYID = 7
6,352,335 UART: [ldev] FE.KEYID = 1
6,362,672 UART: [ldev] Erasing FE.KEYID = 1
8,835,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,274 UART: [ldev] --
10,625,788 UART: [fwproc] Wait for Commands...
10,627,392 UART: [fwproc] Recv command 0x46574c44
10,629,426 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,490,950 >>> mbox cmd response: success
14,495,364 UART: [afmc] ++
14,495,979 UART: [afmc] CDI.KEYID = 6
14,496,891 UART: [afmc] SUBJECT.KEYID = 7
14,497,994 UART: [afmc] AUTHORITY.KEYID = 5
17,001,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,455 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,770 UART: [afmc] --
18,799,294 UART: [cold-reset] --
18,802,028 UART: [state] Locking Datavault
18,805,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,682 UART: [state] Locking ICCM
18,809,181 UART: [exit] Launching FMC @ 0x40000130
18,817,585 UART:
18,817,838 UART: Running Caliptra FMC ...
18,818,946 UART:
18,819,113 UART: [state] CFI Enabled
18,827,377 UART: [fht] FMC Alias Private Key: 7
20,583,940 UART: [art] Extend RT PCRs Done
20,585,147 UART: [art] Lock RT PCRs Done
20,586,876 UART: [art] Populate DV Done
20,592,341 UART: [fht] FMC Alias Private Key: 7
20,593,883 UART: [art] Derive CDI
20,594,702 UART: [art] Store in in slot 0x4
20,637,240 UART: [art] Derive Key Pair
20,638,280 UART: [art] Store priv key in slot 0x5
23,064,690 UART: [art] Derive Key Pair - Done
23,077,693 UART: [art] Signing Cert with AUTHO
23,078,997 UART: RITY.KEYID = 7
24,784,878 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,403 UART: [art] PUB.X = E5A91DBE871DCB11EBB99879C87C4D00DFC2B00A186790870C0CCEFFD6B324012DB2056A0F54DFB074C0E047C8CCAF3A
24,793,669 UART: [art] PUB.Y = D6B6CC65668F1CFFC67564A3C1DF577D5FD6DA8A57616A7854731D40C9EFA3B7C2C4C7F756F71A21AC0CF182927DEC5E
24,800,962 UART: [art] SIG.R = 085AEEBC796142EE574393400E34957E84A365CB6E529F6C1DEB019350490716341BFBD8CBA4BA180B7CFBB527D435F9
24,808,303 UART: [art] SIG.S = 9D056635FFB18DAA2B9255A3F2FA25E156F9E1723CAE255049587F9ABC4B85CBBD500A18290B941B074FE9E8D9F6C0D2
25,787,569 UART: Caliptra RT
25,788,279 UART: [state] CFI Enabled
25,905,790 UART: [rt] RT listening for mailbox commands...
25,907,675 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,938,334 UART: [rt]cmd =0x414c544e, len=41
25,940,772 >>> mbox cmd response data (8 bytes)
25,941,630 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,972,018 UART: [rt]cmd =0x434b4558, len=80
30,244,123 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,804 writing to cptra_bootfsm_go
3,701,182 ready_for_fw is high
3,701,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,274,045 >>> mbox cmd response: success
18,527,783 UART:
18,528,183 UART: Running Caliptra FMC ...
18,529,294 UART:
18,529,451 UART: [state] CFI Enabled
18,537,468 UART: [fht] FMC Alias Private Key: 7
20,294,398 UART: [art] Extend RT PCRs Done
20,295,627 UART: [art] Lock RT PCRs Done
20,297,123 UART: [art] Populate DV Done
20,302,717 UART: [fht] FMC Alias Private Key: 7
20,304,316 UART: [art] Derive CDI
20,305,059 UART: [art] Store in in slot 0x4
20,347,714 UART: [art] Derive Key Pair
20,348,755 UART: [art] Store priv key in slot 0x5
22,775,737 UART: [art] Derive Key Pair - Done
22,788,682 UART: [art] Signing Cert with AUTHO
22,789,983 UART: RITY.KEYID = 7
24,495,330 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,835 UART: [art] PUB.X = DA1D1775DC2C63AEFFB2C1BF8221081FE40B4B583ACD42CC07A5B2AEAB85A2057935972339B5D2FBB06DCD3D967AD15F
24,504,160 UART: [art] PUB.Y = 1B231DF939C3B6B96DB5897F964C4E92F203B9B1676671772631B715F5B7EA4AFB820E81607ED85C107114D4623CCB58
24,511,430 UART: [art] SIG.R = 2ABB0908D1A8282DEFC1A7BB9BA67BB62D5458BE7FEA2644C2206E9D97D8BCD5B8D6CD4D0ADA324AD976183E2A99A446
24,518,829 UART: [art] SIG.S = 71230459FDE3C94989734CC1EDDC8E89D6FEF4504336E5A347D29E60950BD960C4601A1BC892D0A09C707D239FBD2E09
25,497,973 UART: Caliptra RT
25,498,686 UART: [state] CFI Enabled
25,615,105 UART: [rt] RT listening for mailbox commands...
25,617,002 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,647,593 UART: [rt]cmd =0x414c544e, len=41
25,650,055 >>> mbox cmd response data (8 bytes)
25,650,921 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,681,392 UART: [rt]cmd =0x434b4558, len=80
29,953,646 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,233 UART:
192,602 UART: Running Caliptra ROM ...
193,796 UART:
193,951 UART: [state] CFI Enabled
265,181 UART: [state] LifecycleState = Unprovisioned
267,597 UART: [state] DebugLocked = No
270,272 UART: [state] WD Timer not started. Device not locked for debugging
275,331 UART: [kat] SHA2-256
465,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,938 UART: [kat] ++
476,574 UART: [kat] sha1
489,235 UART: [kat] SHA2-256
492,265 UART: [kat] SHA2-384
498,618 UART: [kat] SHA2-512-ACC
501,202 UART: [kat] ECC-384
2,946,310 UART: [kat] HMAC-384Kdf
2,972,058 UART: [kat] LMS
3,503,864 UART: [kat] --
3,508,215 UART: [cold-reset] ++
3,509,723 UART: [fht] FHT @ 0x50003400
3,520,582 UART: [idev] ++
3,521,256 UART: [idev] CDI.KEYID = 6
3,522,295 UART: [idev] SUBJECT.KEYID = 7
3,523,409 UART: [idev] UDS.KEYID = 0
3,524,335 ready_for_fw is high
3,524,529 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,972 UART: [idev] Erasing UDS.KEYID = 0
6,026,531 UART: [idev] Sha1 KeyId Algorithm
6,048,163 UART: [idev] --
6,053,352 UART: [ldev] ++
6,054,035 UART: [ldev] CDI.KEYID = 6
6,054,927 UART: [ldev] SUBJECT.KEYID = 5
6,056,143 UART: [ldev] AUTHORITY.KEYID = 7
6,057,381 UART: [ldev] FE.KEYID = 1
6,100,411 UART: [ldev] Erasing FE.KEYID = 1
8,604,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,487 UART: [ldev] --
10,414,357 UART: [fwproc] Wait for Commands...
10,417,098 UART: [fwproc] Recv command 0x46574c44
10,419,408 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,131 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,594,817 >>> mbox cmd response: success
14,599,545 UART: [afmc] ++
14,600,203 UART: [afmc] CDI.KEYID = 6
14,601,377 UART: [afmc] SUBJECT.KEYID = 7
14,602,874 UART: [afmc] AUTHORITY.KEYID = 5
17,149,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,032 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,243 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,380 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,129 UART: [afmc] --
18,968,010 UART: [cold-reset] --
18,973,738 UART: [state] Locking Datavault
18,981,332 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,500 UART: [state] Locking ICCM
18,985,693 UART: [exit] Launching FMC @ 0x40000130
18,994,327 UART:
18,994,564 UART: Running Caliptra FMC ...
18,995,666 UART:
18,995,821 UART: [state] CFI Enabled
19,048,605 UART: [fht] FMC Alias Private Key: 7
20,812,388 UART: [art] Extend RT PCRs Done
20,813,650 UART: [art] Lock RT PCRs Done
20,814,979 UART: [art] Populate DV Done
20,820,401 UART: [fht] FMC Alias Private Key: 7
20,822,049 UART: [art] Derive CDI
20,822,793 UART: [art] Store in in slot 0x4
20,881,990 UART: [art] Derive Key Pair
20,883,052 UART: [art] Store priv key in slot 0x5
23,345,833 UART: [art] Derive Key Pair - Done
23,358,820 UART: [art] Signing Cert with AUTHO
23,360,148 UART: RITY.KEYID = 7
25,071,076 UART: [art] Erasing AUTHORITY.KEYID = 7
25,072,595 UART: [art] PUB.X = 56980623E4AF5EF97004D9509DED98D542BD0609A31B58F312DB874478C8CD1E18F0255CA78B810FBFBFEB982B2CFD71
25,079,866 UART: [art] PUB.Y = EEDFADE4B255E58A5AD5C601389F991A52F3EE54DE8E6BE4C11FBA451D218DC2635381DBDCBCCC07B0C6E8B3465B0C36
25,087,131 UART: [art] SIG.R = DE0017E6C5744E9D607477E01FDFDC193F4931E9080F0E12B9BE8A9675B8EF2694AEB3C994D804539DE69849FF8633A4
25,094,498 UART: [art] SIG.S = 3A1E4B8C27B3DC0C9B823E835B38E4B4F28FC50855BA3FF172583C545C46302A51AEAB963FEED42A196EBC8C0CFEF427
26,073,703 UART: Caliptra RT
26,074,413 UART: [state] CFI Enabled
26,238,252 UART: [rt] RT listening for mailbox commands...
26,240,146 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,270,882 UART: [rt]cmd =0x414c544e, len=41
26,273,158 >>> mbox cmd response data (8 bytes)
26,274,091 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,304,477 UART: [rt]cmd =0x434b4558, len=80
30,638,500 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,439,690 ready_for_fw is high
3,440,136 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,717,383 >>> mbox cmd response: success
19,006,489 UART:
19,006,884 UART: Running Caliptra FMC ...
19,007,991 UART:
19,008,152 UART: [state] CFI Enabled
19,072,870 UART: [fht] FMC Alias Private Key: 7
20,836,792 UART: [art] Extend RT PCRs Done
20,838,036 UART: [art] Lock RT PCRs Done
20,839,748 UART: [art] Populate DV Done
20,845,164 UART: [fht] FMC Alias Private Key: 7
20,846,754 UART: [art] Derive CDI
20,847,569 UART: [art] Store in in slot 0x4
20,905,144 UART: [art] Derive Key Pair
20,906,145 UART: [art] Store priv key in slot 0x5
23,369,118 UART: [art] Derive Key Pair - Done
23,382,293 UART: [art] Signing Cert with AUTHO
23,383,595 UART: RITY.KEYID = 7
25,095,332 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,843 UART: [art] PUB.X = 203DD8F2806C772BA81D51C2F135BEA6520C032714148325E5D239DE2E0752D33B965602BE0D148B793F9ADDA578EC5E
25,104,078 UART: [art] PUB.Y = 392E1BDEC7DCF638AC89DAA62E2186C0033FD6F4A684E867B703863BA69797772A5C3E092C77F0AA2D5CCADA666DFE3C
25,111,348 UART: [art] SIG.R = 090F737D5368F103B39BE8FD432F782F2FFE585284575ECD0DC5476A4C251BAA4D73B53190584DAA2083EA38A6A88A14
25,118,727 UART: [art] SIG.S = 7D2FF9B4621E428217999D47CBDF41FBABE7892D6FCC24C3EBC7C8C1DAD42FF30BF6EB877E6B7AA2A7AA30A66A41B696
26,097,270 UART: Caliptra RT
26,097,983 UART: [state] CFI Enabled
26,263,213 UART: [rt] RT listening for mailbox commands...
26,265,126 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,295,871 UART: [rt]cmd =0x414c544e, len=41
26,298,513 >>> mbox cmd response data (8 bytes)
26,299,282 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,329,639 UART: [rt]cmd =0x434b4558, len=80
30,665,458 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,558 writing to cptra_bootfsm_go
192,810 UART:
193,197 UART: Running Caliptra ROM ...
194,295 UART:
603,995 UART: [state] CFI Enabled
619,599 UART: [state] LifecycleState = Unprovisioned
621,976 UART: [state] DebugLocked = No
624,510 UART: [state] WD Timer not started. Device not locked for debugging
629,927 UART: [kat] SHA2-256
819,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,571 UART: [kat] ++
831,176 UART: [kat] sha1
842,625 UART: [kat] SHA2-256
845,706 UART: [kat] SHA2-384
852,263 UART: [kat] SHA2-512-ACC
854,840 UART: [kat] ECC-384
3,296,716 UART: [kat] HMAC-384Kdf
3,310,308 UART: [kat] LMS
3,842,129 UART: [kat] --
3,846,553 UART: [cold-reset] ++
3,848,414 UART: [fht] FHT @ 0x50003400
3,860,033 UART: [idev] ++
3,860,747 UART: [idev] CDI.KEYID = 6
3,861,707 UART: [idev] SUBJECT.KEYID = 7
3,862,881 UART: [idev] UDS.KEYID = 0
3,863,822 ready_for_fw is high
3,864,031 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,462 UART: [idev] Erasing UDS.KEYID = 0
6,339,334 UART: [idev] Sha1 KeyId Algorithm
6,361,867 UART: [idev] --
6,368,025 UART: [ldev] ++
6,368,708 UART: [ldev] CDI.KEYID = 6
6,369,623 UART: [ldev] SUBJECT.KEYID = 5
6,370,782 UART: [ldev] AUTHORITY.KEYID = 7
6,372,032 UART: [ldev] FE.KEYID = 1
6,381,712 UART: [ldev] Erasing FE.KEYID = 1
8,860,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,866 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,110 UART: [ldev] --
10,651,555 UART: [fwproc] Wait for Commands...
10,654,622 UART: [fwproc] Recv command 0x46574c44
10,656,877 UART: [fwproc] Recv'd Img size: 114168 bytes
14,106,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,520 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,843,894 >>> mbox cmd response: success
14,848,347 UART: [afmc] ++
14,849,089 UART: [afmc] CDI.KEYID = 6
14,850,179 UART: [afmc] SUBJECT.KEYID = 7
14,851,730 UART: [afmc] AUTHORITY.KEYID = 5
17,355,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,429 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,173 UART: [afmc] --
19,150,995 UART: [cold-reset] --
19,155,563 UART: [state] Locking Datavault
19,161,247 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,439 UART: [state] Locking ICCM
19,166,186 UART: [exit] Launching FMC @ 0x40000130
19,174,865 UART:
19,175,119 UART: Running Caliptra FMC ...
19,176,221 UART:
19,176,384 UART: [state] CFI Enabled
19,184,754 UART: [fht] FMC Alias Private Key: 7
20,942,290 UART: [art] Extend RT PCRs Done
20,943,497 UART: [art] Lock RT PCRs Done
20,945,336 UART: [art] Populate DV Done
20,950,867 UART: [fht] FMC Alias Private Key: 7
20,952,490 UART: [art] Derive CDI
20,953,261 UART: [art] Store in in slot 0x4
20,995,649 UART: [art] Derive Key Pair
20,996,655 UART: [art] Store priv key in slot 0x5
23,423,441 UART: [art] Derive Key Pair - Done
23,436,601 UART: [art] Signing Cert with AUTHO
23,437,929 UART: RITY.KEYID = 7
25,143,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,725 UART: [art] PUB.X = F713E7CD16484713DE3481AA55AF239DF4FA5A529582253098D44966198D9EC9CE70177D0B7E733142225500B7D1894F
25,151,919 UART: [art] PUB.Y = 4AC29C6DB6C6F169DA9B045C6A6C7848B7B9F81202964661188FA3E342AC57AC06C7634CB93670B54706F7CC8E91909D
25,159,208 UART: [art] SIG.R = A3202D546B618E10B90203575A5CD636D1A04EE57D1440481C3CF59DBEAB87C89FB129916D17106E46EE901AE6C6FEBA
25,166,610 UART: [art] SIG.S = B92BC2113F9703B49515DBB600F6992C8941AE06530F682A93F6041427A29D7C4E75DAD1CB575B85DADD8D0D5DD2455A
26,145,337 UART: Caliptra RT
26,146,052 UART: [state] CFI Enabled
26,263,722 UART: [rt] RT listening for mailbox commands...
26,265,614 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,296,289 UART: [rt]cmd =0x414c544e, len=41
26,298,622 >>> mbox cmd response data (8 bytes)
26,299,528 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,329,908 UART: [rt]cmd =0x434b4558, len=80
30,603,199 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,650 writing to cptra_bootfsm_go
3,756,308 ready_for_fw is high
3,756,708 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,944,494 >>> mbox cmd response: success
19,197,449 UART:
19,197,848 UART: Running Caliptra FMC ...
19,199,166 UART:
19,199,350 UART: [state] CFI Enabled
19,206,994 UART: [fht] FMC Alias Private Key: 7
20,963,932 UART: [art] Extend RT PCRs Done
20,965,151 UART: [art] Lock RT PCRs Done
20,966,859 UART: [art] Populate DV Done
20,972,351 UART: [fht] FMC Alias Private Key: 7
20,973,791 UART: [art] Derive CDI
20,974,530 UART: [art] Store in in slot 0x4
21,017,392 UART: [art] Derive Key Pair
21,018,390 UART: [art] Store priv key in slot 0x5
23,445,546 UART: [art] Derive Key Pair - Done
23,458,373 UART: [art] Signing Cert with AUTHO
23,459,668 UART: RITY.KEYID = 7
25,165,018 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,529 UART: [art] PUB.X = F412C4A0B1E2C27BC528E9FA97A577CA19A9687E946CDAE2B6D9BF5287E484F26F33E3D0317FD317BCD6E8687CBB7049
25,173,829 UART: [art] PUB.Y = ADDF263347918B43D3269B0195D9E9363F9C2275F60EBA0DC495FA6F9E0B7FA58E18A0CE79D17AF171F0997B784ED497
25,181,062 UART: [art] SIG.R = 171CD2B57AF3D212F0390DB890365ACE2800C779432A46FCA6899796D8CCD1BC022CE0FF98CCF6FE3D37501149180611
25,188,470 UART: [art] SIG.S = 54314E6A52D3A973C8B980256F8ECDA17B16842E00DB789E68ACD36CD73D3CD239DE9438A25CB55827CE94296F1F1C9A
26,168,020 UART: Caliptra RT
26,168,713 UART: [state] CFI Enabled
26,285,773 UART: [rt] RT listening for mailbox commands...
26,287,676 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,318,379 UART: [rt]cmd =0x414c544e, len=41
26,320,797 >>> mbox cmd response data (8 bytes)
26,321,674 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,351,979 UART: [rt]cmd =0x434b4558, len=80
30,624,156 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,592 UART: [state] LifecycleState = Unprovisioned
86,247 UART: [state] DebugLocked = No
86,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,557 UART: [kat] SHA2-256
882,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,603 UART: [kat] ++
886,755 UART: [kat] sha1
891,103 UART: [kat] SHA2-256
893,041 UART: [kat] SHA2-384
895,728 UART: [kat] SHA2-512-ACC
897,629 UART: [kat] ECC-384
902,998 UART: [kat] HMAC-384Kdf
907,566 UART: [kat] LMS
1,475,762 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,477,141 UART: [fht] Storing FHT @ 0x50003400
1,480,000 UART: [idev] ++
1,480,168 UART: [idev] CDI.KEYID = 6
1,480,528 UART: [idev] SUBJECT.KEYID = 7
1,480,952 UART: [idev] UDS.KEYID = 0
1,481,297 ready_for_fw is high
1,481,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,018 UART: [idev] Erasing UDS.KEYID = 0
1,505,556 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,256 UART: [idev] --
1,515,243 UART: [ldev] ++
1,515,411 UART: [ldev] CDI.KEYID = 6
1,515,774 UART: [ldev] SUBJECT.KEYID = 5
1,516,200 UART: [ldev] AUTHORITY.KEYID = 7
1,516,663 UART: [ldev] FE.KEYID = 1
1,521,611 UART: [ldev] Erasing FE.KEYID = 1
1,546,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,564 UART: [ldev] --
1,586,073 UART: [fwproc] Waiting for Commands...
1,586,802 UART: [fwproc] Received command 0x46574c44
1,587,593 UART: [fwproc] Received Image of size 114168 bytes
2,884,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,905 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,986 >>> mbox cmd response: success
3,078,122 UART: [afmc] ++
3,078,290 UART: [afmc] CDI.KEYID = 6
3,078,652 UART: [afmc] SUBJECT.KEYID = 7
3,079,077 UART: [afmc] AUTHORITY.KEYID = 5
3,114,372 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,380 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,160 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,773 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,463 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,328 UART: [afmc] --
3,157,418 UART: [cold-reset] --
3,158,046 UART: [state] Locking Datavault
3,159,325 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,929 UART: [state] Locking ICCM
3,160,505 UART: [exit] Launching FMC @ 0x40000130
3,165,834 UART:
3,165,850 UART: Running Caliptra FMC ...
3,166,258 UART:
3,166,312 UART: [state] CFI Enabled
3,176,777 UART: [fht] FMC Alias Private Key: 7
3,284,480 UART: [art] Extend RT PCRs Done
3,284,908 UART: [art] Lock RT PCRs Done
3,286,408 UART: [art] Populate DV Done
3,294,671 UART: [fht] FMC Alias Private Key: 7
3,295,615 UART: [art] Derive CDI
3,295,895 UART: [art] Store in in slot 0x4
3,381,752 UART: [art] Derive Key Pair
3,382,112 UART: [art] Store priv key in slot 0x5
3,395,048 UART: [art] Derive Key Pair - Done
3,409,704 UART: [art] Signing Cert with AUTHO
3,410,184 UART: RITY.KEYID = 7
3,425,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,527 UART: [art] PUB.X = 91D539BA9E384202093B40ACCAFD47098A9E92D616BEA0A8ADC9BF9A5AEF28BB6E91D2746D1AF31A2226F91A913828F4
3,433,302 UART: [art] PUB.Y = F7F7B0786BBF4985E351B8597286AC3B5A8E7607296E9CA133D8752D1C94221361F05FB83F4D3F0D13FFBEBA3FDDE5B0
3,440,258 UART: [art] SIG.R = A87F051F872962955E852207E29F3E7EAC3277A3C923AD52025F795D99C0E7304A836E0B18E4F4D2E58ED815FC0DEB2E
3,447,017 UART: [art] SIG.S = 0EFD6C268B5B95AE1A3B9C4D6EF24EB594D95D0E679DAC232262CAC9E084402195E22448006897657AE9288C72EA5991
3,471,006 UART: Caliptra RT
3,471,259 UART: [state] CFI Enabled
3,579,294 UART: [rt] RT listening for mailbox commands...
3,579,964 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,911 UART: [rt]cmd =0x414c544e, len=41
3,611,860 >>> mbox cmd response data (8 bytes)
3,611,861 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,662 UART: [rt]cmd =0x434b4558, len=80
3,813,485 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,467 ready_for_fw is high
1,362,467 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,148 >>> mbox cmd response: success
2,986,934 UART:
2,986,950 UART: Running Caliptra FMC ...
2,987,358 UART:
2,987,412 UART: [state] CFI Enabled
2,998,105 UART: [fht] FMC Alias Private Key: 7
3,105,862 UART: [art] Extend RT PCRs Done
3,106,290 UART: [art] Lock RT PCRs Done
3,107,680 UART: [art] Populate DV Done
3,115,841 UART: [fht] FMC Alias Private Key: 7
3,116,975 UART: [art] Derive CDI
3,117,255 UART: [art] Store in in slot 0x4
3,203,310 UART: [art] Derive Key Pair
3,203,670 UART: [art] Store priv key in slot 0x5
3,216,874 UART: [art] Derive Key Pair - Done
3,231,824 UART: [art] Signing Cert with AUTHO
3,232,304 UART: RITY.KEYID = 7
3,247,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,059 UART: [art] PUB.X = 6304E3E4465E10D2B337C5E6F5BAAAB558BEB9143E2B1D8DD080DEBC19E67198DA8F7F6AB06CEBD2F106E6B51FC8D493
3,254,845 UART: [art] PUB.Y = 5E41400D934722F633CAC473DF0E372EC1DF44EDEB4CCD7F0A144BB3C743790E61563A95F4BE278FE24CACDE262A4A9F
3,261,801 UART: [art] SIG.R = 695461A40D69EC5447F4909DF484F1DF68AAB9ED5BCECB86CBDE37FA570336EFC4530BB98CB2F74F8AF37BBC9D22DD7B
3,268,588 UART: [art] SIG.S = 9C2D815B6327859B89E8E0420A33F1051CF74D1ED23F000B38860AC981BBAB7E357217253D419D4EAFD82F43B003EB2B
3,291,992 UART: Caliptra RT
3,292,245 UART: [state] CFI Enabled
3,400,266 UART: [rt] RT listening for mailbox commands...
3,400,936 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,183 UART: [rt]cmd =0x414c544e, len=41
3,433,178 >>> mbox cmd response data (8 bytes)
3,433,179 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,810 UART: [rt]cmd =0x434b4558, len=80
3,633,905 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,004 UART: [kat] SHA2-256
881,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,050 UART: [kat] ++
886,202 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
895,093 UART: [kat] SHA2-512-ACC
896,994 UART: [kat] ECC-384
902,717 UART: [kat] HMAC-384Kdf
907,409 UART: [kat] LMS
1,475,605 UART: [kat] --
1,476,438 UART: [cold-reset] ++
1,476,994 UART: [fht] Storing FHT @ 0x50003400
1,479,717 UART: [idev] ++
1,479,885 UART: [idev] CDI.KEYID = 6
1,480,245 UART: [idev] SUBJECT.KEYID = 7
1,480,669 UART: [idev] UDS.KEYID = 0
1,481,014 ready_for_fw is high
1,481,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,827 UART: [idev] Erasing UDS.KEYID = 0
1,505,657 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,211 UART: [idev] --
1,515,372 UART: [ldev] ++
1,515,540 UART: [ldev] CDI.KEYID = 6
1,515,903 UART: [ldev] SUBJECT.KEYID = 5
1,516,329 UART: [ldev] AUTHORITY.KEYID = 7
1,516,792 UART: [ldev] FE.KEYID = 1
1,522,090 UART: [ldev] Erasing FE.KEYID = 1
1,548,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,471 UART: [ldev] --
1,587,906 UART: [fwproc] Waiting for Commands...
1,588,727 UART: [fwproc] Received command 0x46574c44
1,589,518 UART: [fwproc] Received Image of size 114168 bytes
2,886,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,712 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,064 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,751 >>> mbox cmd response: success
3,079,835 UART: [afmc] ++
3,080,003 UART: [afmc] CDI.KEYID = 6
3,080,365 UART: [afmc] SUBJECT.KEYID = 7
3,080,790 UART: [afmc] AUTHORITY.KEYID = 5
3,116,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,202 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,892 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,655 UART: [afmc] --
3,159,771 UART: [cold-reset] --
3,160,557 UART: [state] Locking Datavault
3,161,568 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,172 UART: [state] Locking ICCM
3,162,722 UART: [exit] Launching FMC @ 0x40000130
3,168,051 UART:
3,168,067 UART: Running Caliptra FMC ...
3,168,475 UART:
3,168,618 UART: [state] CFI Enabled
3,179,279 UART: [fht] FMC Alias Private Key: 7
3,287,478 UART: [art] Extend RT PCRs Done
3,287,906 UART: [art] Lock RT PCRs Done
3,289,478 UART: [art] Populate DV Done
3,297,495 UART: [fht] FMC Alias Private Key: 7
3,298,637 UART: [art] Derive CDI
3,298,917 UART: [art] Store in in slot 0x4
3,384,784 UART: [art] Derive Key Pair
3,385,144 UART: [art] Store priv key in slot 0x5
3,399,158 UART: [art] Derive Key Pair - Done
3,413,645 UART: [art] Signing Cert with AUTHO
3,414,125 UART: RITY.KEYID = 7
3,429,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,230 UART: [art] PUB.X = 15CF933892116E5756A4744F037D460C487DD0B68D00F2DAD7C05901ECFBE3EE1620A8845D4DFC3DBD89BD0B477C782F
3,436,976 UART: [art] PUB.Y = 1BD97B99C5DB509510AF19C29157F4F3DD7084659E882B91D1074E753F689838E152A7C3D4AF4DDEBD5AA6EC4C319FD3
3,443,933 UART: [art] SIG.R = 13FF25A6A09506D79645D345FA27A9AE6D4BE914981EFAF7962C260AC42FABB7183243263A4EAE9D88551EB8D7B0F0CF
3,450,709 UART: [art] SIG.S = 4C656E785AAFC8C6F8192F4CC0B1F29F55CC2239E8CE93BD5A0DE48A218757F972EBA254ADDE738A72B65F0F90AF4985
3,474,856 UART: Caliptra RT
3,475,201 UART: [state] CFI Enabled
3,582,799 UART: [rt] RT listening for mailbox commands...
3,583,469 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,176 UART: [rt]cmd =0x414c544e, len=41
3,615,203 >>> mbox cmd response data (8 bytes)
3,615,204 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,165 UART: [rt]cmd =0x434b4558, len=80
3,816,964 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,690 ready_for_fw is high
1,363,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,915 >>> mbox cmd response: success
2,990,497 UART:
2,990,513 UART: Running Caliptra FMC ...
2,990,921 UART:
2,991,064 UART: [state] CFI Enabled
3,002,039 UART: [fht] FMC Alias Private Key: 7
3,109,604 UART: [art] Extend RT PCRs Done
3,110,032 UART: [art] Lock RT PCRs Done
3,111,544 UART: [art] Populate DV Done
3,119,951 UART: [fht] FMC Alias Private Key: 7
3,121,097 UART: [art] Derive CDI
3,121,377 UART: [art] Store in in slot 0x4
3,207,042 UART: [art] Derive Key Pair
3,207,402 UART: [art] Store priv key in slot 0x5
3,220,582 UART: [art] Derive Key Pair - Done
3,235,873 UART: [art] Signing Cert with AUTHO
3,236,353 UART: RITY.KEYID = 7
3,251,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,276 UART: [art] PUB.X = 20A9D5ACEA353F41056DFEFB24659C7153D4DE0392CBFF58A08851EC974BFC3247B206117C8DC20FF04514ACBB06B4EE
3,259,047 UART: [art] PUB.Y = 57F5DE0CDD85483AA42E32DC7172FFBECA3128B669675B2DAADA853B1FDF4FB1F12720775A6C58FC2BA97A194E742219
3,266,010 UART: [art] SIG.R = 094A247516FB0C8E09851592D5EB408861D57973D723D14E6087A537E9A1E13E2F61F5E2FEAEECE99D99F164DE089D51
3,272,770 UART: [art] SIG.S = 7A122561D6535C1DAC532C3BDAFD1BC639949D10707BBE7A3B9D32A34F625057C684A516223A9DFD06855FB0F18A76B5
3,296,166 UART: Caliptra RT
3,296,511 UART: [state] CFI Enabled
3,404,397 UART: [rt] RT listening for mailbox commands...
3,405,067 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,266 UART: [rt]cmd =0x414c544e, len=41
3,437,177 >>> mbox cmd response data (8 bytes)
3,437,178 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,085 UART: [rt]cmd =0x434b4558, len=80
3,638,333 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,470 UART: [kat] SHA2-512-ACC
908,371 UART: [kat] ECC-384
918,140 UART: [kat] HMAC-384Kdf
922,656 UART: [kat] LMS
1,170,984 UART: [kat] --
1,171,837 UART: [cold-reset] ++
1,172,205 UART: [fht] FHT @ 0x50003400
1,175,040 UART: [idev] ++
1,175,208 UART: [idev] CDI.KEYID = 6
1,175,568 UART: [idev] SUBJECT.KEYID = 7
1,175,992 UART: [idev] UDS.KEYID = 0
1,176,337 ready_for_fw is high
1,176,337 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,443 UART: [idev] Sha1 KeyId Algorithm
1,208,825 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,276 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,242,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,061 UART: [ldev] --
1,281,324 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,991 >>> mbox cmd response: success
2,772,237 UART: [afmc] ++
2,772,405 UART: [afmc] CDI.KEYID = 6
2,772,767 UART: [afmc] SUBJECT.KEYID = 7
2,773,192 UART: [afmc] AUTHORITY.KEYID = 5
2,808,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,215 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,690 UART: [afmc] --
2,851,820 UART: [cold-reset] --
2,852,520 UART: [state] Locking Datavault
2,853,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,501 UART: [state] Locking ICCM
2,854,959 UART: [exit] Launching FMC @ 0x40000130
2,860,288 UART:
2,860,304 UART: Running Caliptra FMC ...
2,860,712 UART:
2,860,766 UART: [state] CFI Enabled
2,871,027 UART: [fht] FMC Alias Private Key: 7
2,979,252 UART: [art] Extend RT PCRs Done
2,979,680 UART: [art] Lock RT PCRs Done
2,980,978 UART: [art] Populate DV Done
2,989,179 UART: [fht] FMC Alias Private Key: 7
2,990,245 UART: [art] Derive CDI
2,990,525 UART: [art] Store in in slot 0x4
3,076,314 UART: [art] Derive Key Pair
3,076,674 UART: [art] Store priv key in slot 0x5
3,090,022 UART: [art] Derive Key Pair - Done
3,105,059 UART: [art] Signing Cert with AUTHO
3,105,539 UART: RITY.KEYID = 7
3,120,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,444 UART: [art] PUB.X = 665632F1A6C08376ADD004A112341255D9F8E874E2C9494DE1787931800A2B93F7BF81FAB4341567DC788C2B26692060
3,128,198 UART: [art] PUB.Y = 23EDB7D9F57771334240FD1ADEB706C6B61364A2E076E1770E119A41342E51AACFC218848C501A482F0CD1A7451BEE53
3,135,143 UART: [art] SIG.R = 416C0DC145458EB745A9D77FC30D36C13144CC67F40CC1FD5B299525555BD333E77808A501A3EBD619670BCB41E92287
3,141,895 UART: [art] SIG.S = 64943454C666152B162D56FE69D86B4A52836C4825471FABBF9AE95AB01F837EBE22C8C7A017A15E32D5C1D187034B6D
3,164,953 UART: Caliptra RT
3,165,206 UART: [state] CFI Enabled
3,272,925 UART: [rt] RT listening for mailbox commands...
3,273,595 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,624 UART: [rt]cmd =0x414c544e, len=41
3,305,637 >>> mbox cmd response data (8 bytes)
3,305,638 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,445 UART: [rt]cmd =0x434b4558, len=80
3,506,516 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,785 ready_for_fw is high
1,059,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,074 >>> mbox cmd response: success
2,685,028 UART:
2,685,044 UART: Running Caliptra FMC ...
2,685,452 UART:
2,685,506 UART: [state] CFI Enabled
2,696,125 UART: [fht] FMC Alias Private Key: 7
2,803,950 UART: [art] Extend RT PCRs Done
2,804,378 UART: [art] Lock RT PCRs Done
2,805,962 UART: [art] Populate DV Done
2,814,297 UART: [fht] FMC Alias Private Key: 7
2,815,247 UART: [art] Derive CDI
2,815,527 UART: [art] Store in in slot 0x4
2,900,850 UART: [art] Derive Key Pair
2,901,210 UART: [art] Store priv key in slot 0x5
2,914,020 UART: [art] Derive Key Pair - Done
2,928,460 UART: [art] Signing Cert with AUTHO
2,928,940 UART: RITY.KEYID = 7
2,944,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,003 UART: [art] PUB.X = B25EF17C615A5AC1C54F9DFAA05230A52CC1D95F0F24812400F955F546E3A2B8CE08E2D385E42A09282E1259E2FE818B
2,951,750 UART: [art] PUB.Y = 0140CFB2FFA7DD22148B5D41EB3ACC97D779FD66366F6DADE96499CCD76A97A54A88A9D127DAE80DA1EB2B71A9D947F6
2,958,716 UART: [art] SIG.R = DB73E43996703CD717F81387A3FC62BCD97946861DEF13E32553C6E6094CCCF8A45D519910EB664246D1D0FDC34C118B
2,965,487 UART: [art] SIG.S = BABF71267965BDC0CF48164A09606A6334C7B3349B5003E281B3B89E5120CFB8AF6E7E87E177361691A8ED7794C542E4
2,988,968 UART: Caliptra RT
2,989,221 UART: [state] CFI Enabled
3,096,761 UART: [rt] RT listening for mailbox commands...
3,097,431 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,486 UART: [rt]cmd =0x414c544e, len=41
3,129,557 >>> mbox cmd response data (8 bytes)
3,129,558 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,455 UART: [rt]cmd =0x434b4558, len=80
3,330,669 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
893,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,550 UART: [kat] ++
897,702 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,811 UART: [kat] SHA2-512-ACC
908,712 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,687 UART: [kat] LMS
1,171,015 UART: [kat] --
1,172,064 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,435 UART: [idev] ++
1,175,603 UART: [idev] CDI.KEYID = 6
1,175,963 UART: [idev] SUBJECT.KEYID = 7
1,176,387 UART: [idev] UDS.KEYID = 0
1,176,732 ready_for_fw is high
1,176,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,479 UART: [idev] Erasing UDS.KEYID = 0
1,201,868 UART: [idev] Sha1 KeyId Algorithm
1,210,380 UART: [idev] --
1,211,406 UART: [ldev] ++
1,211,574 UART: [ldev] CDI.KEYID = 6
1,211,937 UART: [ldev] SUBJECT.KEYID = 5
1,212,363 UART: [ldev] AUTHORITY.KEYID = 7
1,212,826 UART: [ldev] FE.KEYID = 1
1,218,118 UART: [ldev] Erasing FE.KEYID = 1
1,244,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,052 UART: [ldev] --
1,284,331 UART: [fwproc] Wait for Commands...
1,285,063 UART: [fwproc] Recv command 0x46574c44
1,285,791 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,706 >>> mbox cmd response: success
2,775,906 UART: [afmc] ++
2,776,074 UART: [afmc] CDI.KEYID = 6
2,776,436 UART: [afmc] SUBJECT.KEYID = 7
2,776,861 UART: [afmc] AUTHORITY.KEYID = 5
2,812,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,099 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,984 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,703 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,535 UART: [afmc] --
2,855,481 UART: [cold-reset] --
2,856,443 UART: [state] Locking Datavault
2,857,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,420 UART: [state] Locking ICCM
2,858,986 UART: [exit] Launching FMC @ 0x40000130
2,864,315 UART:
2,864,331 UART: Running Caliptra FMC ...
2,864,739 UART:
2,864,882 UART: [state] CFI Enabled
2,876,017 UART: [fht] FMC Alias Private Key: 7
2,983,906 UART: [art] Extend RT PCRs Done
2,984,334 UART: [art] Lock RT PCRs Done
2,985,994 UART: [art] Populate DV Done
2,994,147 UART: [fht] FMC Alias Private Key: 7
2,995,239 UART: [art] Derive CDI
2,995,519 UART: [art] Store in in slot 0x4
3,081,304 UART: [art] Derive Key Pair
3,081,664 UART: [art] Store priv key in slot 0x5
3,094,726 UART: [art] Derive Key Pair - Done
3,109,352 UART: [art] Signing Cert with AUTHO
3,109,832 UART: RITY.KEYID = 7
3,124,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,493 UART: [art] PUB.X = CA96CD0549BB9CBA04ACB6956DE814FA70BE9EE373D6D6D07D9D8E4EE77347D24AA68DC2F8DB284FEE37AF006B7028E1
3,132,259 UART: [art] PUB.Y = 4D3A08B4055A3C6407FAF6FFEE37204E697C8CCF76BFE634792DA9C73F0070489A1AF3AA868DD2089965904DFD0DFCFD
3,139,188 UART: [art] SIG.R = 446C92A8C7A883ADF743409F8647A674EE4D8900C1FEA7598D140973BE50D4E3459ACD93CFFCFCBCFBFA12744B852BBA
3,145,951 UART: [art] SIG.S = A015038BBBE34C00E9455C804BC6CB1D03500E07C0EA57288548C05F5D50552889A1FE5BE425BDE2B905B24B4BD77154
3,169,711 UART: Caliptra RT
3,170,056 UART: [state] CFI Enabled
3,279,025 UART: [rt] RT listening for mailbox commands...
3,279,695 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,500 UART: [rt]cmd =0x414c544e, len=41
3,311,349 >>> mbox cmd response data (8 bytes)
3,311,350 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,301 UART: [rt]cmd =0x434b4558, len=80
3,512,907 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,828 ready_for_fw is high
1,059,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,837 >>> mbox cmd response: success
2,687,195 UART:
2,687,211 UART: Running Caliptra FMC ...
2,687,619 UART:
2,687,762 UART: [state] CFI Enabled
2,698,457 UART: [fht] FMC Alias Private Key: 7
2,806,436 UART: [art] Extend RT PCRs Done
2,806,864 UART: [art] Lock RT PCRs Done
2,808,520 UART: [art] Populate DV Done
2,816,661 UART: [fht] FMC Alias Private Key: 7
2,817,741 UART: [art] Derive CDI
2,818,021 UART: [art] Store in in slot 0x4
2,904,050 UART: [art] Derive Key Pair
2,904,410 UART: [art] Store priv key in slot 0x5
2,917,242 UART: [art] Derive Key Pair - Done
2,932,091 UART: [art] Signing Cert with AUTHO
2,932,571 UART: RITY.KEYID = 7
2,947,957 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,722 UART: [art] PUB.X = 07035482476E5D6835FFA3DFB8C2AC31A63BEA7F236BAC52F74075055FB975654D13C2BE96DA17B974A367A3640EBA83
2,955,486 UART: [art] PUB.Y = 9CA3E65CEAFCF85D6715E579AF95CEFAFCAB656238990FAF39169047B96B8451A2CF392BAC37F06112B66F436AC370DE
2,962,449 UART: [art] SIG.R = 6F4C07767FB69CDF110A01D33D746C5083711CC6168267DBA26CFDF0ACAEB3C385B1FDF242DA2220645E0231C9BBDB85
2,969,221 UART: [art] SIG.S = 5543A8EFAE61160722996EAC00563AE265A5CAA05E7EF3E4609F696422AD80B73E3551BB0362A3579132133DDED94FD6
2,992,698 UART: Caliptra RT
2,993,043 UART: [state] CFI Enabled
3,100,736 UART: [rt] RT listening for mailbox commands...
3,101,406 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,585 UART: [rt]cmd =0x414c544e, len=41
3,133,570 >>> mbox cmd response data (8 bytes)
3,133,571 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,118 UART: [rt]cmd =0x434b4558, len=80
3,334,140 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,447 UART: [kat] ++
895,599 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,360 UART: [kat] LMS
1,168,672 UART: [kat] --
1,169,357 UART: [cold-reset] ++
1,169,881 UART: [fht] FHT @ 0x50003400
1,172,669 UART: [idev] ++
1,172,837 UART: [idev] CDI.KEYID = 6
1,173,198 UART: [idev] SUBJECT.KEYID = 7
1,173,623 UART: [idev] UDS.KEYID = 0
1,173,969 ready_for_fw is high
1,173,969 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,729 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,208,015 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,241,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,124 UART: [fwproc] Wait for Commands...
1,281,843 UART: [fwproc] Recv command 0x46574c44
1,282,576 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,467 >>> mbox cmd response: success
2,771,570 UART: [afmc] ++
2,771,738 UART: [afmc] CDI.KEYID = 6
2,772,101 UART: [afmc] SUBJECT.KEYID = 7
2,772,527 UART: [afmc] AUTHORITY.KEYID = 5
2,807,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,755 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,086 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,089 UART: [afmc] --
2,851,183 UART: [cold-reset] --
2,852,293 UART: [state] Locking Datavault
2,853,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,160 UART: [state] Locking ICCM
2,854,718 UART: [exit] Launching FMC @ 0x40000130
2,860,047 UART:
2,860,063 UART: Running Caliptra FMC ...
2,860,471 UART:
2,860,525 UART: [state] CFI Enabled
2,870,978 UART: [fht] FMC Alias Private Key: 7
2,979,317 UART: [art] Extend RT PCRs Done
2,979,745 UART: [art] Lock RT PCRs Done
2,981,171 UART: [art] Populate DV Done
2,989,476 UART: [fht] FMC Alias Private Key: 7
2,990,576 UART: [art] Derive CDI
2,990,856 UART: [art] Store in in slot 0x4
3,076,465 UART: [art] Derive Key Pair
3,076,825 UART: [art] Store priv key in slot 0x5
3,089,993 UART: [art] Derive Key Pair - Done
3,104,430 UART: [art] Signing Cert with AUTHO
3,104,910 UART: RITY.KEYID = 7
3,120,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,935 UART: [art] PUB.X = EE675A19C7823F3FA7C3574237B2598586A9CC3E1A467C107B1C65F65753F1F323846813DC8028AFC34E5656A0688B43
3,127,699 UART: [art] PUB.Y = 8BDE705B5E5737E86EFCD6C30885646684C52E06493FD3B49FC3F50AFDCED72AE6BFD6A89E096EC3D0DB7EAD963831EF
3,134,659 UART: [art] SIG.R = 415DDDBD6F49EAED002F81C685D91F7C590E57C2B88BC5FDB2D95E82C60EF982D6420435A76781F7EA9420CBCE86E38C
3,141,414 UART: [art] SIG.S = FD8012F8395F50565A920D000D0E78A37B35AB95DF1183089F698AD0395001F3551854EE8927FA16BCDECDD5C2336922
3,165,042 UART: Caliptra RT
3,165,295 UART: [state] CFI Enabled
3,273,734 UART: [rt] RT listening for mailbox commands...
3,274,404 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,561 UART: [rt]cmd =0x414c544e, len=41
3,306,588 >>> mbox cmd response data (8 bytes)
3,306,589 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,356 UART: [rt]cmd =0x434b4558, len=80
3,507,788 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,154 ready_for_fw is high
1,057,154 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,805 >>> mbox cmd response: success
2,684,377 UART:
2,684,393 UART: Running Caliptra FMC ...
2,684,801 UART:
2,684,855 UART: [state] CFI Enabled
2,695,298 UART: [fht] FMC Alias Private Key: 7
2,803,595 UART: [art] Extend RT PCRs Done
2,804,023 UART: [art] Lock RT PCRs Done
2,805,395 UART: [art] Populate DV Done
2,813,780 UART: [fht] FMC Alias Private Key: 7
2,814,896 UART: [art] Derive CDI
2,815,176 UART: [art] Store in in slot 0x4
2,900,875 UART: [art] Derive Key Pair
2,901,235 UART: [art] Store priv key in slot 0x5
2,914,129 UART: [art] Derive Key Pair - Done
2,928,924 UART: [art] Signing Cert with AUTHO
2,929,404 UART: RITY.KEYID = 7
2,944,548 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,313 UART: [art] PUB.X = 31DB535F61DA4B07D6339378729D5A18CB0534C87A7DA167D5FC17D31BDACD4270D9BF99D0EC563EA2D3AB320E31B678
2,952,086 UART: [art] PUB.Y = 8F291D041F8B2258A9B94F86AAC195736A893DB4D4303C4A0B96C4B70E4EC62108A775DC058E01BE8C4C4413A7D4C654
2,959,022 UART: [art] SIG.R = 38AD91EC15905CEA082FD897BACD672F8D57CFC2955A94A9C9EE9A0A03E57971B482E7ECE3D82FB5052BC9B4AE58711A
2,965,798 UART: [art] SIG.S = BF855AC24A376CB6EF8D03F0D3B587E8CD849F1EB6CC3F24E4CF8AD70D736162176A85A70B39A14CF9A6AC00B76CFDFB
2,989,866 UART: Caliptra RT
2,990,119 UART: [state] CFI Enabled
3,097,928 UART: [rt] RT listening for mailbox commands...
3,098,598 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,747 UART: [rt]cmd =0x414c544e, len=41
3,130,610 >>> mbox cmd response data (8 bytes)
3,130,611 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,506 UART: [rt]cmd =0x434b4558, len=80
3,331,326 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
891,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,794 UART: [kat] ++
895,946 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,733 UART: [kat] SHA2-512-ACC
906,634 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,954 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,414 UART: [idev] Erasing UDS.KEYID = 0
1,199,742 UART: [idev] Sha1 KeyId Algorithm
1,208,638 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,242,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,363 UART: [fwproc] Wait for Commands...
1,282,060 UART: [fwproc] Recv command 0x46574c44
1,282,793 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,234 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,710 >>> mbox cmd response: success
2,772,939 UART: [afmc] ++
2,773,107 UART: [afmc] CDI.KEYID = 6
2,773,470 UART: [afmc] SUBJECT.KEYID = 7
2,773,896 UART: [afmc] AUTHORITY.KEYID = 5
2,809,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,416 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,145 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,028 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,747 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,568 UART: [afmc] --
2,852,618 UART: [cold-reset] --
2,853,306 UART: [state] Locking Datavault
2,854,345 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,949 UART: [state] Locking ICCM
2,855,417 UART: [exit] Launching FMC @ 0x40000130
2,860,746 UART:
2,860,762 UART: Running Caliptra FMC ...
2,861,170 UART:
2,861,313 UART: [state] CFI Enabled
2,872,070 UART: [fht] FMC Alias Private Key: 7
2,979,301 UART: [art] Extend RT PCRs Done
2,979,729 UART: [art] Lock RT PCRs Done
2,981,001 UART: [art] Populate DV Done
2,989,550 UART: [fht] FMC Alias Private Key: 7
2,990,558 UART: [art] Derive CDI
2,990,838 UART: [art] Store in in slot 0x4
3,076,169 UART: [art] Derive Key Pair
3,076,529 UART: [art] Store priv key in slot 0x5
3,089,951 UART: [art] Derive Key Pair - Done
3,104,878 UART: [art] Signing Cert with AUTHO
3,105,358 UART: RITY.KEYID = 7
3,120,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,429 UART: [art] PUB.X = 72F9A812270AF9F51E28A8741299003DEC5362A0D1DF8EF872489BB56281D6D41904386D387856E66170F2AAE26BB741
3,128,165 UART: [art] PUB.Y = 7F4E28889F8602A4328BE4365A9A972512160F3CFEEEFCA2DBB7340CCF108938C8A85A2201598794A059D207CF098E4C
3,135,099 UART: [art] SIG.R = 09C6928DEB91B04216EA3FB2DD567E875AAE1670DDB8A37FACF59AF022EAAAD9118DA12982CA9AAC9268DBB355A6AFE6
3,141,892 UART: [art] SIG.S = 7B2A235D100E237BAEDB2A03C09BFCFA4C128E8B82B7689DDA8102D436C674CA80E8466A97E100FADB1AC0E4E1B17C93
3,165,774 UART: Caliptra RT
3,166,119 UART: [state] CFI Enabled
3,273,450 UART: [rt] RT listening for mailbox commands...
3,274,120 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,331 UART: [rt]cmd =0x414c544e, len=41
3,306,334 >>> mbox cmd response data (8 bytes)
3,306,335 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,232 UART: [rt]cmd =0x434b4558, len=80
3,507,212 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,621 ready_for_fw is high
1,056,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,394 >>> mbox cmd response: success
2,684,028 UART:
2,684,044 UART: Running Caliptra FMC ...
2,684,452 UART:
2,684,595 UART: [state] CFI Enabled
2,695,344 UART: [fht] FMC Alias Private Key: 7
2,803,119 UART: [art] Extend RT PCRs Done
2,803,547 UART: [art] Lock RT PCRs Done
2,805,179 UART: [art] Populate DV Done
2,813,310 UART: [fht] FMC Alias Private Key: 7
2,814,408 UART: [art] Derive CDI
2,814,688 UART: [art] Store in in slot 0x4
2,900,179 UART: [art] Derive Key Pair
2,900,539 UART: [art] Store priv key in slot 0x5
2,913,859 UART: [art] Derive Key Pair - Done
2,928,660 UART: [art] Signing Cert with AUTHO
2,929,140 UART: RITY.KEYID = 7
2,944,314 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,079 UART: [art] PUB.X = 474E86E37032EF30E933046BBAAA8334B23004F34C3CAB2CB0C31493CBF9E7774B65723845DC3340070D4D97F543C928
2,951,835 UART: [art] PUB.Y = 62C4A79218BE2359B1C17A96BE73AFB1972CB258E84195E97075B45D8E433D1F376AC3D4D1A7048B69F1F95548F80B70
2,958,779 UART: [art] SIG.R = 2A287C97B75847B4E3EA1E28047AB65C9781D5F08162A04BF1339BC0C9BE85CDFCA1D58A011A4100B867DA68A1FBAA91
2,965,533 UART: [art] SIG.S = D21CF9334CD10B924C484D845DEE20436667D993D38CD065558006B52461B77DBC7CAD411CA73BCD608143F36573CDBC
2,989,424 UART: Caliptra RT
2,989,769 UART: [state] CFI Enabled
3,097,822 UART: [rt] RT listening for mailbox commands...
3,098,492 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,727 UART: [rt]cmd =0x414c544e, len=41
3,130,762 >>> mbox cmd response data (8 bytes)
3,130,763 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,768 UART: [rt]cmd =0x434b4558, len=80
3,332,031 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,021 UART:
192,391 UART: Running Caliptra ROM ...
193,532 UART:
193,675 UART: [state] CFI Enabled
267,657 UART: [state] LifecycleState = Unprovisioned
269,575 UART: [state] DebugLocked = No
271,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,322 UART: [kat] SHA2-256
445,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,549 UART: [kat] ++
456,021 UART: [kat] sha1
467,177 UART: [kat] SHA2-256
469,827 UART: [kat] SHA2-384
474,319 UART: [kat] SHA2-512-ACC
476,745 UART: [kat] ECC-384
2,767,951 UART: [kat] HMAC-384Kdf
2,799,298 UART: [kat] LMS
3,989,594 UART: [kat] --
3,994,168 UART: [cold-reset] ++
3,996,314 UART: [fht] Storing FHT @ 0x50003400
4,008,782 UART: [idev] ++
4,009,346 UART: [idev] CDI.KEYID = 6
4,010,324 UART: [idev] SUBJECT.KEYID = 7
4,011,563 UART: [idev] UDS.KEYID = 0
4,012,591 ready_for_fw is high
4,012,784 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,994 UART: [idev] Erasing UDS.KEYID = 0
7,344,691 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,712 UART: [idev] --
7,372,193 UART: [ldev] ++
7,372,769 UART: [ldev] CDI.KEYID = 6
7,373,733 UART: [ldev] SUBJECT.KEYID = 5
7,374,936 UART: [ldev] AUTHORITY.KEYID = 7
7,376,158 UART: [ldev] FE.KEYID = 1
7,422,577 UART: [ldev] Erasing FE.KEYID = 1
10,755,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,092 UART: [ldev] --
13,135,861 UART: [fwproc] Waiting for Commands...
13,138,600 UART: [fwproc] Received command 0x46574c44
13,140,774 UART: [fwproc] Received Image of size 113844 bytes
17,190,518 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,802 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,704 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,652,517 >>> mbox cmd response: success
17,657,151 UART: [afmc] ++
17,657,742 UART: [afmc] CDI.KEYID = 6
17,658,666 UART: [afmc] SUBJECT.KEYID = 7
17,659,879 UART: [afmc] AUTHORITY.KEYID = 5
21,028,522 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,836 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,227 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,090 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,510 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,179 UART: [afmc] --
23,401,249 UART: [cold-reset] --
23,406,784 UART: [state] Locking Datavault
23,410,722 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,484 UART: [state] Locking ICCM
23,413,762 UART: [exit] Launching FMC @ 0x40000130
23,422,149 UART:
23,422,372 UART: Running Caliptra FMC ...
23,423,481 UART:
23,423,638 UART: [state] CFI Enabled
23,488,701 UART: [fht] FMC Alias Private Key: 7
25,826,282 UART: [art] Extend RT PCRs Done
25,827,501 UART: [art] Lock RT PCRs Done
25,829,125 UART: [art] Populate DV Done
25,834,744 UART: [fht] FMC Alias Private Key: 7
25,836,302 UART: [art] Derive CDI
25,837,109 UART: [art] Store in in slot 0x4
25,897,869 UART: [art] Derive Key Pair
25,898,926 UART: [art] Store priv key in slot 0x5
29,191,436 UART: [art] Derive Key Pair - Done
29,204,377 UART: [art] Signing Cert with AUTHO
29,205,682 UART: RITY.KEYID = 7
31,492,931 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,470 UART: [art] PUB.X = 1EDC6143A7667AC40D29FF5BADDA7C987691BAC6A286EDE882DE98F5BC572D8173FDE530BAAE3EBB03F8D69B7936CECF
31,501,699 UART: [art] PUB.Y = C6A845C8E6A72B39510C7A021F1C8177057A8DE720AA2887CFF6B5C2A3E4875E55CA48D88BD77D7EDC18C0583790E864
31,508,953 UART: [art] SIG.R = 4113C051F7F2B84E15877834B5C316043C22BE98E38910105D4723E97B29B33C2225AA8E60BD206F0FD1707008B261E9
31,516,310 UART: [art] SIG.S = 675946EF1DAD57095176E1A321C16FD73177A1FAF6553D97389147D4BA7B4C993A87EDC0204A24848034796195D80F1B
32,821,405 UART: Caliptra RT
32,822,117 UART: [state] CFI Enabled
32,982,682 UART: [rt] RT listening for mailbox commands...
32,984,563 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,015,026 UART: [rt]cmd =0x414c544e, len=20
33,016,670 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,794,269 ready_for_fw is high
3,794,895 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,874,255 >>> mbox cmd response: success
23,572,000 UART:
23,572,453 UART: Running Caliptra FMC ...
23,573,562 UART:
23,573,711 UART: [state] CFI Enabled
23,624,861 UART: [fht] FMC Alias Private Key: 7
25,961,989 UART: [art] Extend RT PCRs Done
25,963,237 UART: [art] Lock RT PCRs Done
25,965,048 UART: [art] Populate DV Done
25,970,257 UART: [fht] FMC Alias Private Key: 7
25,971,792 UART: [art] Derive CDI
25,972,568 UART: [art] Store in in slot 0x4
26,032,745 UART: [art] Derive Key Pair
26,033,792 UART: [art] Store priv key in slot 0x5
29,326,797 UART: [art] Derive Key Pair - Done
29,339,689 UART: [art] Signing Cert with AUTHO
29,340,991 UART: RITY.KEYID = 7
31,628,492 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,008 UART: [art] PUB.X = 6C9A78E592758D7395932E0710F368D757A7A81B0570BE2917AD56C09D57734A38EC4F1BD9F86752DFC6FDB590B22ADC
31,637,218 UART: [art] PUB.Y = 9B58E1E729E3AD659E914EED0EB6221BE494FC81DC133AFC29DC87357EF1B870FB846EC955E040A872BD53456708BC54
31,644,466 UART: [art] SIG.R = 4587274949FB3F80BA24D623A3121E9A56F36F29FE8595AB49AAABC441192721DCDEFC583A5CE0B760133287B905CD0D
31,651,862 UART: [art] SIG.S = 306071A2791C995B90A2DA9202C320D36BA846F5B516A879EB9EC96AE97A2547F20B852A0CAE43F20737A2B41BE4617E
32,957,090 UART: Caliptra RT
32,957,802 UART: [state] CFI Enabled
33,116,966 UART: [rt] RT listening for mailbox commands...
33,118,849 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,149,579 UART: [rt]cmd =0x414c544e, len=20
33,151,243 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,198 writing to cptra_bootfsm_go
193,575 UART:
193,934 UART: Running Caliptra ROM ...
195,039 UART:
604,774 UART: [state] CFI Enabled
619,164 UART: [state] LifecycleState = Unprovisioned
621,038 UART: [state] DebugLocked = No
622,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,917 UART: [kat] SHA2-256
796,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,167 UART: [kat] ++
807,614 UART: [kat] sha1
819,517 UART: [kat] SHA2-256
822,185 UART: [kat] SHA2-384
828,457 UART: [kat] SHA2-512-ACC
830,825 UART: [kat] ECC-384
3,115,817 UART: [kat] HMAC-384Kdf
3,127,270 UART: [kat] LMS
4,317,399 UART: [kat] --
4,322,261 UART: [cold-reset] ++
4,323,315 UART: [fht] Storing FHT @ 0x50003400
4,335,362 UART: [idev] ++
4,335,994 UART: [idev] CDI.KEYID = 6
4,336,880 UART: [idev] SUBJECT.KEYID = 7
4,338,123 UART: [idev] UDS.KEYID = 0
4,339,088 ready_for_fw is high
4,339,291 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,131 UART: [idev] Erasing UDS.KEYID = 0
7,626,060 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,438 UART: [idev] --
7,652,400 UART: [ldev] ++
7,653,021 UART: [ldev] CDI.KEYID = 6
7,653,910 UART: [ldev] SUBJECT.KEYID = 5
7,655,169 UART: [ldev] AUTHORITY.KEYID = 7
7,656,397 UART: [ldev] FE.KEYID = 1
7,667,155 UART: [ldev] Erasing FE.KEYID = 1
10,956,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,207 UART: [ldev] --
13,316,361 UART: [fwproc] Waiting for Commands...
13,318,678 UART: [fwproc] Received command 0x46574c44
13,320,880 UART: [fwproc] Received Image of size 113844 bytes
17,377,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,257 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,127 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,837,333 >>> mbox cmd response: success
17,842,195 UART: [afmc] ++
17,842,795 UART: [afmc] CDI.KEYID = 6
17,844,072 UART: [afmc] SUBJECT.KEYID = 7
17,845,188 UART: [afmc] AUTHORITY.KEYID = 5
21,158,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,452 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,706 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,106 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,908 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,379 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,818 UART: [afmc] --
23,526,308 UART: [cold-reset] --
23,529,584 UART: [state] Locking Datavault
23,536,404 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,156 UART: [state] Locking ICCM
23,539,229 UART: [exit] Launching FMC @ 0x40000130
23,547,619 UART:
23,547,854 UART: Running Caliptra FMC ...
23,548,953 UART:
23,549,117 UART: [state] CFI Enabled
23,557,462 UART: [fht] FMC Alias Private Key: 7
25,887,949 UART: [art] Extend RT PCRs Done
25,889,168 UART: [art] Lock RT PCRs Done
25,890,902 UART: [art] Populate DV Done
25,896,313 UART: [fht] FMC Alias Private Key: 7
25,898,008 UART: [art] Derive CDI
25,898,865 UART: [art] Store in in slot 0x4
25,941,655 UART: [art] Derive Key Pair
25,942,716 UART: [art] Store priv key in slot 0x5
29,185,071 UART: [art] Derive Key Pair - Done
29,198,058 UART: [art] Signing Cert with AUTHO
29,199,366 UART: RITY.KEYID = 7
31,478,394 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,899 UART: [art] PUB.X = 2EADF4E515845AC34314D62495EC2A8C25B2617D658E48AC344FA0136A8A099DE57FC317D2A3CDF752E905F117F01A13
31,487,157 UART: [art] PUB.Y = 737B87BAD1105E04E91924C0820C7B96FA0942E8A2B8962843FBCA9ED1A3AE5F144C9020CED76336AB5145E33A2BBCD7
31,494,404 UART: [art] SIG.R = 537F2180BF449DAEAB887ECB6D80EC449A1B8882E37FA36FF2D5D950E5CE0E8D6D2D652E7F3B5C3EACA652C62403F0FC
31,501,807 UART: [art] SIG.S = AB5B3E63429D140D4185A22164E198FF415C6887238046BB11F5A0774EB21BA3E0146E54E6482F79656BE2DA3BA4FA0A
32,806,774 UART: Caliptra RT
32,807,480 UART: [state] CFI Enabled
32,925,147 UART: [rt] RT listening for mailbox commands...
32,927,029 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
32,957,595 UART: [rt]cmd =0x414c544e, len=20
32,959,359 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,132,046 ready_for_fw is high
4,132,922 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,533 >>> mbox cmd response: success
23,706,233 UART:
23,706,650 UART: Running Caliptra FMC ...
23,707,791 UART:
23,707,957 UART: [state] CFI Enabled
23,716,073 UART: [fht] FMC Alias Private Key: 7
26,046,577 UART: [art] Extend RT PCRs Done
26,047,811 UART: [art] Lock RT PCRs Done
26,049,337 UART: [art] Populate DV Done
26,054,753 UART: [fht] FMC Alias Private Key: 7
26,056,342 UART: [art] Derive CDI
26,057,097 UART: [art] Store in in slot 0x4
26,099,443 UART: [art] Derive Key Pair
26,100,511 UART: [art] Store priv key in slot 0x5
29,342,385 UART: [art] Derive Key Pair - Done
29,355,379 UART: [art] Signing Cert with AUTHO
29,356,705 UART: RITY.KEYID = 7
31,636,113 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,617 UART: [art] PUB.X = 6BDFFE9037BB4D8F80C5F96CEBCEB7F1A8BDF6CDB4D15511C0621675DAF42669F5026E599EB508782F8F74C05E09D948
31,644,835 UART: [art] PUB.Y = 338FF526CA2C63079FECB0915B16BB67FAD94B2A3787414A2952421A88E05E050894C03A5779F3363427873795BFE32B
31,652,093 UART: [art] SIG.R = 91FE61B39CD3539855B410C05C136004315D59E5AF5AF940AA9B4F2699F2558AE163B00F27FD514CD4BF6BE2AE75AB01
31,659,445 UART: [art] SIG.S = 728FAF95F06979396390FC8A4D8D27126E9EFCB8F966391F4D7D2E7072827847DA2271363E960DEF61F608D6CB7E6993
32,964,468 UART: Caliptra RT
32,965,178 UART: [state] CFI Enabled
33,083,484 UART: [rt] RT listening for mailbox commands...
33,085,381 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,116,078 UART: [rt]cmd =0x414c544e, len=20
33,117,769 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
191,965 UART:
192,335 UART: Running Caliptra ROM ...
193,529 UART:
193,688 UART: [state] CFI Enabled
265,853 UART: [state] LifecycleState = Unprovisioned
267,768 UART: [state] DebugLocked = No
270,396 UART: [state] WD Timer not started. Device not locked for debugging
274,939 UART: [kat] SHA2-256
454,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,697 UART: [kat] ++
466,233 UART: [kat] sha1
477,037 UART: [kat] SHA2-256
480,112 UART: [kat] SHA2-384
487,517 UART: [kat] SHA2-512-ACC
490,521 UART: [kat] ECC-384
2,949,218 UART: [kat] HMAC-384Kdf
2,972,473 UART: [kat] LMS
3,501,890 UART: [kat] --
3,506,956 UART: [cold-reset] ++
3,508,035 UART: [fht] FHT @ 0x50003400
3,519,579 UART: [idev] ++
3,520,140 UART: [idev] CDI.KEYID = 6
3,521,190 UART: [idev] SUBJECT.KEYID = 7
3,522,295 UART: [idev] UDS.KEYID = 0
3,523,239 ready_for_fw is high
3,523,430 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,013 UART: [idev] Erasing UDS.KEYID = 0
6,023,299 UART: [idev] Sha1 KeyId Algorithm
6,046,151 UART: [idev] --
6,051,220 UART: [ldev] ++
6,051,790 UART: [ldev] CDI.KEYID = 6
6,052,681 UART: [ldev] SUBJECT.KEYID = 5
6,053,896 UART: [ldev] AUTHORITY.KEYID = 7
6,055,076 UART: [ldev] FE.KEYID = 1
6,100,291 UART: [ldev] Erasing FE.KEYID = 1
8,603,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,535 UART: [ldev] --
10,416,423 UART: [fwproc] Wait for Commands...
10,419,605 UART: [fwproc] Recv command 0x46574c44
10,421,737 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,087 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,645 >>> mbox cmd response: success
14,285,838 UART: [afmc] ++
14,286,433 UART: [afmc] CDI.KEYID = 6
14,287,315 UART: [afmc] SUBJECT.KEYID = 7
14,288,522 UART: [afmc] AUTHORITY.KEYID = 5
16,824,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,942 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,595 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,422 UART: [afmc] --
18,629,905 UART: [cold-reset] --
18,635,388 UART: [state] Locking Datavault
18,642,038 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,682 UART: [state] Locking ICCM
18,644,724 UART: [exit] Launching FMC @ 0x40000130
18,653,120 UART:
18,653,360 UART: Running Caliptra FMC ...
18,654,393 UART:
18,654,542 UART: [state] CFI Enabled
18,709,603 UART: [fht] FMC Alias Private Key: 7
20,473,602 UART: [art] Extend RT PCRs Done
20,474,838 UART: [art] Lock RT PCRs Done
20,476,168 UART: [art] Populate DV Done
20,481,692 UART: [fht] FMC Alias Private Key: 7
20,483,229 UART: [art] Derive CDI
20,483,961 UART: [art] Store in in slot 0x4
20,542,619 UART: [art] Derive Key Pair
20,543,657 UART: [art] Store priv key in slot 0x5
23,006,507 UART: [art] Derive Key Pair - Done
23,019,775 UART: [art] Signing Cert with AUTHO
23,021,088 UART: RITY.KEYID = 7
24,732,514 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,013 UART: [art] PUB.X = 43D7379D6E4B6E991D51DE622B41195ACA83EEECEB9EDD8E1C5D3AF9171A630FB2A6E1F6B4EE6A0E458DEE0F5DF434CD
24,741,323 UART: [art] PUB.Y = 2370DAF7BC65DD34E01560C49E11B9DE23B8B9D8F6A357BBDE1438B732FAF5B1037A866FBDDA67C40E0C2F4C6D233CCF
24,748,626 UART: [art] SIG.R = DB2A7F5441690DE46BC8AE76C418F2684EAFA5A26076C0EA014ABC73F99F4AD41DC656E8487D56E32576328852F84441
24,755,992 UART: [art] SIG.S = F07B4C045B9CE15F4FF256030CF76932374AEC52E74AAAB103B64B60E9088F78AACA03C3C55BB85CFE062F3CEDEDEBBB
25,735,108 UART: Caliptra RT
25,735,837 UART: [state] CFI Enabled
25,901,504 UART: [rt] RT listening for mailbox commands...
25,903,384 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,933,952 UART: [rt]cmd =0x414c544e, len=20
25,935,722 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,360,528 ready_for_fw is high
3,360,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,036,124 >>> mbox cmd response: success
18,334,777 UART:
18,335,178 UART: Running Caliptra FMC ...
18,336,487 UART:
18,336,663 UART: [state] CFI Enabled
18,402,671 UART: [fht] FMC Alias Private Key: 7
20,166,052 UART: [art] Extend RT PCRs Done
20,167,266 UART: [art] Lock RT PCRs Done
20,168,953 UART: [art] Populate DV Done
20,174,417 UART: [fht] FMC Alias Private Key: 7
20,175,910 UART: [art] Derive CDI
20,176,672 UART: [art] Store in in slot 0x4
20,235,229 UART: [art] Derive Key Pair
20,236,280 UART: [art] Store priv key in slot 0x5
22,700,199 UART: [art] Derive Key Pair - Done
22,712,767 UART: [art] Signing Cert with AUTHO
22,714,077 UART: RITY.KEYID = 7
24,425,703 UART: [art] Erasing AUTHORITY.KEYID = 7
24,427,202 UART: [art] PUB.X = 3B5B33F3581C0CA402FE08B892F110F612ADC3D2E8FA568BD80EECB9AD6DD436CB658EF12676547FBB424FE79E66001B
24,434,513 UART: [art] PUB.Y = 315A8B4CF35C3D76ED2A2A097091791B031ECEC77DB8B32F49DAC92F6A723B06340F9FDF792DB1554D07D3BC2133BADE
24,441,757 UART: [art] SIG.R = E984259B16CF208251D11D4EDA5B902C8A9D65028DB45424FADA13D85BE58886C8B9BAD1F02D76702D58CF4392D96C63
24,449,141 UART: [art] SIG.S = 5D0FF62E7BDA33BDC624CE8E2B530DE43589C981B6D13203B952B575F9118CC7DE2EA6FBB54A3B63D105F49AA72D06BF
25,428,061 UART: Caliptra RT
25,428,761 UART: [state] CFI Enabled
25,592,351 UART: [rt] RT listening for mailbox commands...
25,594,232 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,624,814 UART: [rt]cmd =0x414c544e, len=20
25,626,478 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
193,060 UART:
193,432 UART: Running Caliptra ROM ...
194,609 UART:
604,115 UART: [state] CFI Enabled
617,489 UART: [state] LifecycleState = Unprovisioned
619,351 UART: [state] DebugLocked = No
621,655 UART: [state] WD Timer not started. Device not locked for debugging
626,116 UART: [kat] SHA2-256
805,195 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,780 UART: [kat] ++
817,224 UART: [kat] sha1
827,809 UART: [kat] SHA2-256
830,882 UART: [kat] SHA2-384
837,529 UART: [kat] SHA2-512-ACC
840,461 UART: [kat] ECC-384
3,280,859 UART: [kat] HMAC-384Kdf
3,294,010 UART: [kat] LMS
3,823,504 UART: [kat] --
3,826,243 UART: [cold-reset] ++
3,827,322 UART: [fht] FHT @ 0x50003400
3,838,458 UART: [idev] ++
3,839,065 UART: [idev] CDI.KEYID = 6
3,839,957 UART: [idev] SUBJECT.KEYID = 7
3,841,137 UART: [idev] UDS.KEYID = 0
3,842,065 ready_for_fw is high
3,842,262 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,564 UART: [idev] Erasing UDS.KEYID = 0
6,312,188 UART: [idev] Sha1 KeyId Algorithm
6,334,339 UART: [idev] --
6,338,967 UART: [ldev] ++
6,339,544 UART: [ldev] CDI.KEYID = 6
6,340,459 UART: [ldev] SUBJECT.KEYID = 5
6,341,670 UART: [ldev] AUTHORITY.KEYID = 7
6,342,897 UART: [ldev] FE.KEYID = 1
6,355,319 UART: [ldev] Erasing FE.KEYID = 1
8,827,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,166 UART: [ldev] --
10,620,183 UART: [fwproc] Wait for Commands...
10,622,919 UART: [fwproc] Recv command 0x46574c44
10,625,014 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,497,248 >>> mbox cmd response: success
14,501,379 UART: [afmc] ++
14,501,974 UART: [afmc] CDI.KEYID = 6
14,502,891 UART: [afmc] SUBJECT.KEYID = 7
14,504,048 UART: [afmc] AUTHORITY.KEYID = 5
17,001,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,283 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,117 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,951 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,396 UART: [afmc] --
18,798,675 UART: [cold-reset] --
18,803,052 UART: [state] Locking Datavault
18,806,874 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,575 UART: [state] Locking ICCM
18,810,943 UART: [exit] Launching FMC @ 0x40000130
18,819,340 UART:
18,819,574 UART: Running Caliptra FMC ...
18,820,672 UART:
18,820,835 UART: [state] CFI Enabled
18,829,372 UART: [fht] FMC Alias Private Key: 7
20,585,971 UART: [art] Extend RT PCRs Done
20,587,183 UART: [art] Lock RT PCRs Done
20,588,834 UART: [art] Populate DV Done
20,594,291 UART: [fht] FMC Alias Private Key: 7
20,595,928 UART: [art] Derive CDI
20,596,666 UART: [art] Store in in slot 0x4
20,639,059 UART: [art] Derive Key Pair
20,640,092 UART: [art] Store priv key in slot 0x5
23,066,283 UART: [art] Derive Key Pair - Done
23,079,440 UART: [art] Signing Cert with AUTHO
23,080,743 UART: RITY.KEYID = 7
24,786,522 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,026 UART: [art] PUB.X = 36610DB0F991DA00C4A871E5AD0E03BA3A8A617B917BFFE2F742E74542252F71C4A4C8E04C68AD577C56D67484C77382
24,795,283 UART: [art] PUB.Y = FE8BDD0CC0776B999804CFC1696500743A17125C288553FC25AEDB8552601306444F86022ECF038D6AE4CD11EECA4C1E
24,802,516 UART: [art] SIG.R = 1367362753B131F532DA96D150DC7CBB6D6043DEFB04A80E57DE5826162906E131D23A6C9F13C5425385022EE1D65E80
24,809,869 UART: [art] SIG.S = 09426BB15AC339A5BE36D6FA5E1A9AF9A3A773615C74D06CC53B10CA328F1EBAB815E671AB31179D3CAD6735C907CCC4
25,788,517 UART: Caliptra RT
25,789,219 UART: [state] CFI Enabled
25,905,679 UART: [rt] RT listening for mailbox commands...
25,907,560 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,938,196 UART: [rt]cmd =0x414c544e, len=20
25,939,887 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
3,695,576 ready_for_fw is high
3,696,031 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,256,623 >>> mbox cmd response: success
18,510,676 UART:
18,511,081 UART: Running Caliptra FMC ...
18,512,206 UART:
18,512,363 UART: [state] CFI Enabled
18,520,374 UART: [fht] FMC Alias Private Key: 7
20,277,753 UART: [art] Extend RT PCRs Done
20,278,979 UART: [art] Lock RT PCRs Done
20,280,487 UART: [art] Populate DV Done
20,285,788 UART: [fht] FMC Alias Private Key: 7
20,287,431 UART: [art] Derive CDI
20,288,170 UART: [art] Store in in slot 0x4
20,330,601 UART: [art] Derive Key Pair
20,331,599 UART: [art] Store priv key in slot 0x5
22,757,647 UART: [art] Derive Key Pair - Done
22,770,666 UART: [art] Signing Cert with AUTHO
22,771,978 UART: RITY.KEYID = 7
24,477,593 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,101 UART: [art] PUB.X = 58C973418B55FDE997F4A615DE536AD1B53893A18FDD1694CE7477C43BA9DB87664BFE28C0E66AD799F2523FD696D955
24,486,356 UART: [art] PUB.Y = 430B4C9F265EEF418DBC04292983560B9EFA6F02E6CD53C9D63AE99497A5B1BE268618C7EF46DACB0C1650D1859099CF
24,493,609 UART: [art] SIG.R = 7436ACA795EA5CE2896432094BBED2CEAAE7C94322B4B2B13DC0564D4779AFF50A8CC60B40E52091E10CE3313ECF16F5
24,501,003 UART: [art] SIG.S = 147C5D7FB43C913FEBE9E652ECD30EA1C50DA2FA13A1F0E9C1D27313C85FA704C92404510C14F0F5F27BD517FEB96260
25,479,771 UART: Caliptra RT
25,480,489 UART: [state] CFI Enabled
25,597,942 UART: [rt] RT listening for mailbox commands...
25,599,813 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,630,074 UART: [rt]cmd =0x414c544e, len=20
25,631,673 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,145 UART:
192,522 UART: Running Caliptra ROM ...
193,715 UART:
193,870 UART: [state] CFI Enabled
260,496 UART: [state] LifecycleState = Unprovisioned
262,908 UART: [state] DebugLocked = No
264,376 UART: [state] WD Timer not started. Device not locked for debugging
268,851 UART: [kat] SHA2-256
458,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,520 UART: [kat] ++
470,012 UART: [kat] sha1
481,818 UART: [kat] SHA2-256
484,829 UART: [kat] SHA2-384
492,309 UART: [kat] SHA2-512-ACC
494,898 UART: [kat] ECC-384
2,945,148 UART: [kat] HMAC-384Kdf
2,972,895 UART: [kat] LMS
3,504,709 UART: [kat] --
3,508,992 UART: [cold-reset] ++
3,510,078 UART: [fht] FHT @ 0x50003400
3,522,622 UART: [idev] ++
3,523,328 UART: [idev] CDI.KEYID = 6
3,524,245 UART: [idev] SUBJECT.KEYID = 7
3,525,486 UART: [idev] UDS.KEYID = 0
3,526,411 ready_for_fw is high
3,526,613 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,255 UART: [idev] Erasing UDS.KEYID = 0
6,029,025 UART: [idev] Sha1 KeyId Algorithm
6,050,423 UART: [idev] --
6,055,829 UART: [ldev] ++
6,056,516 UART: [ldev] CDI.KEYID = 6
6,057,438 UART: [ldev] SUBJECT.KEYID = 5
6,058,871 UART: [ldev] AUTHORITY.KEYID = 7
6,060,069 UART: [ldev] FE.KEYID = 1
6,101,775 UART: [ldev] Erasing FE.KEYID = 1
8,608,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,836 UART: [ldev] --
10,415,163 UART: [fwproc] Wait for Commands...
10,416,878 UART: [fwproc] Recv command 0x46574c44
10,419,133 UART: [fwproc] Recv'd Img size: 114168 bytes
13,861,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,591,126 >>> mbox cmd response: success
14,594,702 UART: [afmc] ++
14,595,420 UART: [afmc] CDI.KEYID = 6
14,596,531 UART: [afmc] SUBJECT.KEYID = 7
14,598,084 UART: [afmc] AUTHORITY.KEYID = 5
17,125,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,229 UART: [afmc] --
18,926,468 UART: [cold-reset] --
18,929,147 UART: [state] Locking Datavault
18,935,925 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,082 UART: [state] Locking ICCM
18,940,610 UART: [exit] Launching FMC @ 0x40000130
18,949,284 UART:
18,949,537 UART: Running Caliptra FMC ...
18,950,639 UART:
18,950,795 UART: [state] CFI Enabled
19,008,239 UART: [fht] FMC Alias Private Key: 7
20,771,758 UART: [art] Extend RT PCRs Done
20,772,976 UART: [art] Lock RT PCRs Done
20,774,980 UART: [art] Populate DV Done
20,780,285 UART: [fht] FMC Alias Private Key: 7
20,781,970 UART: [art] Derive CDI
20,782,794 UART: [art] Store in in slot 0x4
20,840,366 UART: [art] Derive Key Pair
20,841,367 UART: [art] Store priv key in slot 0x5
23,304,203 UART: [art] Derive Key Pair - Done
23,317,130 UART: [art] Signing Cert with AUTHO
23,318,429 UART: RITY.KEYID = 7
25,029,097 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,620 UART: [art] PUB.X = 65F3792E8666892C27E40B0B9C9D6DB0AE887E82346972EF65CAC16ADFEAA4BF38BC0776DE8920F91CAB01534F7F3F94
25,037,891 UART: [art] PUB.Y = F69986B65F3A848618113587F0BEE7CC41A2BDD092D32B7C15E27F72377CC9D6BD19CF0EB3952E2FD3A638F0CBD5079E
25,045,152 UART: [art] SIG.R = 11E3C64C06F51119148ED192DAA18480904DC78BEBADB0BCED8DE366ACD44F4A88CE46462B529CF555FBB68113C4C5E1
25,052,574 UART: [art] SIG.S = EBD18C5B1104388B68CFA04984C35EC7C4148A3F3717F3A40DDF9CAA7F444A752A1FAEC221514CD1F731F4404EB1D7AF
26,031,568 UART: Caliptra RT
26,032,262 UART: [state] CFI Enabled
26,196,032 UART: [rt] RT listening for mailbox commands...
26,197,918 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,228,512 UART: [rt]cmd =0x414c544e, len=20
26,230,309 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,438,077 ready_for_fw is high
3,438,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,708,858 >>> mbox cmd response: success
19,005,488 UART:
19,005,892 UART: Running Caliptra FMC ...
19,007,036 UART:
19,007,213 UART: [state] CFI Enabled
19,072,337 UART: [fht] FMC Alias Private Key: 7
20,836,365 UART: [art] Extend RT PCRs Done
20,837,624 UART: [art] Lock RT PCRs Done
20,838,933 UART: [art] Populate DV Done
20,844,351 UART: [fht] FMC Alias Private Key: 7
20,845,997 UART: [art] Derive CDI
20,846,813 UART: [art] Store in in slot 0x4
20,904,934 UART: [art] Derive Key Pair
20,905,966 UART: [art] Store priv key in slot 0x5
23,369,098 UART: [art] Derive Key Pair - Done
23,381,875 UART: [art] Signing Cert with AUTHO
23,383,179 UART: RITY.KEYID = 7
25,094,501 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,022 UART: [art] PUB.X = 6693486E6D5AEB650B920FD79CD800A2A7E673A09DEAB92681F578F75AD02AA0659C3930723412F7D00EAB8DA089AEBA
25,103,266 UART: [art] PUB.Y = 30DA37FAC7169920A1074F7A1E0AB3D39E9969BA8D466022A72C161B64C5F60CE6876795991A281830F2FC44E80A87DF
25,110,549 UART: [art] SIG.R = 00909D77BDAC95CFB8A4FCAE7A588148DB4E7D57AB1DACF5416DE7F6E6BEA446AA85932BA4F7BCFA1E6FCA2AF02B6575
25,117,965 UART: [art] SIG.S = D8517D433227D1F3CF4C62A3B792169F5EF3119BB49A0EDCFA37D63631F36ABE677985A001E18E2E42C15B71C2C6C959
26,096,496 UART: Caliptra RT
26,097,227 UART: [state] CFI Enabled
26,263,304 UART: [rt] RT listening for mailbox commands...
26,265,183 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,295,813 UART: [rt]cmd =0x414c544e, len=20
26,297,519 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,612 writing to cptra_bootfsm_go
192,857 UART:
193,234 UART: Running Caliptra ROM ...
194,418 UART:
604,206 UART: [state] CFI Enabled
620,209 UART: [state] LifecycleState = Unprovisioned
622,579 UART: [state] DebugLocked = No
624,324 UART: [state] WD Timer not started. Device not locked for debugging
628,355 UART: [kat] SHA2-256
818,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,030 UART: [kat] ++
829,553 UART: [kat] sha1
842,621 UART: [kat] SHA2-256
845,628 UART: [kat] SHA2-384
851,198 UART: [kat] SHA2-512-ACC
853,777 UART: [kat] ECC-384
3,293,086 UART: [kat] HMAC-384Kdf
3,307,267 UART: [kat] LMS
3,839,117 UART: [kat] --
3,843,261 UART: [cold-reset] ++
3,845,693 UART: [fht] FHT @ 0x50003400
3,856,970 UART: [idev] ++
3,857,640 UART: [idev] CDI.KEYID = 6
3,858,679 UART: [idev] SUBJECT.KEYID = 7
3,859,786 UART: [idev] UDS.KEYID = 0
3,860,721 ready_for_fw is high
3,860,927 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,191 UART: [idev] Erasing UDS.KEYID = 0
6,338,359 UART: [idev] Sha1 KeyId Algorithm
6,359,377 UART: [idev] --
6,363,414 UART: [ldev] ++
6,364,089 UART: [ldev] CDI.KEYID = 6
6,365,020 UART: [ldev] SUBJECT.KEYID = 5
6,366,188 UART: [ldev] AUTHORITY.KEYID = 7
6,367,423 UART: [ldev] FE.KEYID = 1
6,379,042 UART: [ldev] Erasing FE.KEYID = 1
8,858,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,087 UART: [ldev] --
10,651,429 UART: [fwproc] Wait for Commands...
10,654,116 UART: [fwproc] Recv command 0x46574c44
10,656,452 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,750 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,842,866 >>> mbox cmd response: success
14,847,775 UART: [afmc] ++
14,848,482 UART: [afmc] CDI.KEYID = 6
14,849,726 UART: [afmc] SUBJECT.KEYID = 7
14,851,158 UART: [afmc] AUTHORITY.KEYID = 5
17,354,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,929 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,130 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,149,233 UART: [afmc] --
19,153,156 UART: [cold-reset] --
19,156,541 UART: [state] Locking Datavault
19,161,362 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,497 UART: [state] Locking ICCM
19,165,827 UART: [exit] Launching FMC @ 0x40000130
19,174,503 UART:
19,174,746 UART: Running Caliptra FMC ...
19,175,850 UART:
19,176,018 UART: [state] CFI Enabled
19,183,857 UART: [fht] FMC Alias Private Key: 7
20,940,503 UART: [art] Extend RT PCRs Done
20,941,800 UART: [art] Lock RT PCRs Done
20,943,231 UART: [art] Populate DV Done
20,948,693 UART: [fht] FMC Alias Private Key: 7
20,950,341 UART: [art] Derive CDI
20,951,151 UART: [art] Store in in slot 0x4
20,993,673 UART: [art] Derive Key Pair
20,994,714 UART: [art] Store priv key in slot 0x5
23,422,193 UART: [art] Derive Key Pair - Done
23,435,193 UART: [art] Signing Cert with AUTHO
23,436,515 UART: RITY.KEYID = 7
25,141,560 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,064 UART: [art] PUB.X = 9AB4A23AB99B45C2DE2C31C7504F3CE9A71EFA1F384CF7EE792581C40F5D5F8DFD3E9E22A5116A84DA61EA1131F6C283
25,150,307 UART: [art] PUB.Y = 1BAECA284AF27CA7D7924FF351B778D5F7FF144BE13F44C6B8E40EA014CA3914CF4CFCF2779259D2C66D018C1B4EDAFD
25,157,644 UART: [art] SIG.R = CA79E019E991ECC5F5280746E7E1732325D398FCD1767C704D04035FB36C605B82F0DFB35BCC835EF97BA9B307CF02DA
25,165,035 UART: [art] SIG.S = A216BC0B047E77F5DF1744D710FEA1D8809A5016B0398BEFEFBF798645C043B26337235C8BDCE84C0712B427B815CC9D
26,144,152 UART: Caliptra RT
26,144,860 UART: [state] CFI Enabled
26,262,146 UART: [rt] RT listening for mailbox commands...
26,264,028 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,294,363 UART: [rt]cmd =0x414c544e, len=20
26,296,185 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,763 writing to cptra_bootfsm_go
3,757,934 ready_for_fw is high
3,758,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,955,269 >>> mbox cmd response: success
19,213,129 UART:
19,213,533 UART: Running Caliptra FMC ...
19,214,670 UART:
19,214,836 UART: [state] CFI Enabled
19,222,442 UART: [fht] FMC Alias Private Key: 7
20,979,649 UART: [art] Extend RT PCRs Done
20,980,871 UART: [art] Lock RT PCRs Done
20,982,665 UART: [art] Populate DV Done
20,988,237 UART: [fht] FMC Alias Private Key: 7
20,989,989 UART: [art] Derive CDI
20,990,806 UART: [art] Store in in slot 0x4
21,033,482 UART: [art] Derive Key Pair
21,034,489 UART: [art] Store priv key in slot 0x5
23,461,688 UART: [art] Derive Key Pair - Done
23,474,625 UART: [art] Signing Cert with AUTHO
23,475,928 UART: RITY.KEYID = 7
25,181,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,837 UART: [art] PUB.X = 8C66E30973ACF02AB54A05676103F97424C46506B59B0872F080C0E0ACA38E315E1FA836796F3BD548A36AF52D8A2B64
25,190,096 UART: [art] PUB.Y = 67E802A8BEC869E01F9971714B74A5A6BD3B19EE38E75C48981BF061BB881740627CE96922F395E177946635D0F60822
25,197,336 UART: [art] SIG.R = 63B53D6DF573E5BF45527B6EBA7F7A7B1638886D7C092FC97781ABD8171399FB254973E404BC9D474F8C59E41C6AE6EE
25,204,729 UART: [art] SIG.S = 68585C45B4CE766BDDAA80550BE58A820ED2E8780FDFA1E4E4E3AEF494BAD45CA39A408F370B756DEEC73E949CC26821
26,183,914 UART: Caliptra RT
26,184,637 UART: [state] CFI Enabled
26,301,869 UART: [rt] RT listening for mailbox commands...
26,303,744 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,334,233 UART: [rt]cmd =0x414c544e, len=20
26,335,994 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,331 UART: [kat] SHA2-256
882,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,377 UART: [kat] ++
886,529 UART: [kat] sha1
890,727 UART: [kat] SHA2-256
892,665 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
903,074 UART: [kat] HMAC-384Kdf
907,572 UART: [kat] LMS
1,475,768 UART: [kat] --
1,476,579 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,510 UART: [idev] ++
1,479,678 UART: [idev] CDI.KEYID = 6
1,480,038 UART: [idev] SUBJECT.KEYID = 7
1,480,462 UART: [idev] UDS.KEYID = 0
1,480,807 ready_for_fw is high
1,480,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,666 UART: [idev] Erasing UDS.KEYID = 0
1,505,552 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,960 UART: [idev] --
1,514,907 UART: [ldev] ++
1,515,075 UART: [ldev] CDI.KEYID = 6
1,515,438 UART: [ldev] SUBJECT.KEYID = 5
1,515,864 UART: [ldev] AUTHORITY.KEYID = 7
1,516,327 UART: [ldev] FE.KEYID = 1
1,521,475 UART: [ldev] Erasing FE.KEYID = 1
1,547,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,006 UART: [ldev] --
1,586,371 UART: [fwproc] Waiting for Commands...
1,587,098 UART: [fwproc] Received command 0x46574c44
1,587,889 UART: [fwproc] Received Image of size 114168 bytes
2,882,969 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,763 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,692 >>> mbox cmd response: success
3,075,876 UART: [afmc] ++
3,076,044 UART: [afmc] CDI.KEYID = 6
3,076,406 UART: [afmc] SUBJECT.KEYID = 7
3,076,831 UART: [afmc] AUTHORITY.KEYID = 5
3,111,998 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,690 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,575 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,265 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,028 UART: [afmc] --
3,154,956 UART: [cold-reset] --
3,155,910 UART: [state] Locking Datavault
3,157,189 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,793 UART: [state] Locking ICCM
3,158,375 UART: [exit] Launching FMC @ 0x40000130
3,163,704 UART:
3,163,720 UART: Running Caliptra FMC ...
3,164,128 UART:
3,164,182 UART: [state] CFI Enabled
3,174,855 UART: [fht] FMC Alias Private Key: 7
3,282,562 UART: [art] Extend RT PCRs Done
3,282,990 UART: [art] Lock RT PCRs Done
3,284,786 UART: [art] Populate DV Done
3,292,671 UART: [fht] FMC Alias Private Key: 7
3,293,625 UART: [art] Derive CDI
3,293,905 UART: [art] Store in in slot 0x4
3,379,746 UART: [art] Derive Key Pair
3,380,106 UART: [art] Store priv key in slot 0x5
3,393,236 UART: [art] Derive Key Pair - Done
3,407,612 UART: [art] Signing Cert with AUTHO
3,408,092 UART: RITY.KEYID = 7
3,423,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,223 UART: [art] PUB.X = 9B875A3EEFF94505FC3C4AB1E364E107E2AFAD44FBB0793A6DCF3CF076D6652C773D9C24F4B11F68A7AC9A9C37990C23
3,431,002 UART: [art] PUB.Y = 88E4CDC427075BD9EAC97273BBFAC27F801006D4DDCE439C433D74A26B6C5583011C58E77EC778657AB113CA2578B36C
3,437,951 UART: [art] SIG.R = C28EB5717110835A1F28E184CD91FC84FD94D1590E424C75871C745E17C574FD73AFCAA38BDE7E3AF77192F12C2707B0
3,444,721 UART: [art] SIG.S = A1806043ED14D32C3703CA1631CEB41F1098B155FCF5E03A9ED339AACC0AFA00E97B442A639588E7126C8D7BFFE3A021
3,468,146 UART: Caliptra RT
3,468,399 UART: [state] CFI Enabled
3,576,203 UART: [rt] RT listening for mailbox commands...
3,576,873 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,931 UART: [rt]cmd =0x414c544e, len=20
3,608,201 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,099 ready_for_fw is high
1,362,099 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,544 >>> mbox cmd response: success
2,988,024 UART:
2,988,040 UART: Running Caliptra FMC ...
2,988,448 UART:
2,988,502 UART: [state] CFI Enabled
2,998,995 UART: [fht] FMC Alias Private Key: 7
3,106,532 UART: [art] Extend RT PCRs Done
3,106,960 UART: [art] Lock RT PCRs Done
3,108,480 UART: [art] Populate DV Done
3,116,579 UART: [fht] FMC Alias Private Key: 7
3,117,689 UART: [art] Derive CDI
3,117,969 UART: [art] Store in in slot 0x4
3,203,930 UART: [art] Derive Key Pair
3,204,290 UART: [art] Store priv key in slot 0x5
3,217,230 UART: [art] Derive Key Pair - Done
3,232,026 UART: [art] Signing Cert with AUTHO
3,232,506 UART: RITY.KEYID = 7
3,247,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,181 UART: [art] PUB.X = F947BA8CC38229430D7BF5B04AD9C7730785443A04F5CB50FB63B9F3DF7A3A28D34250A30434616C9E0A7AC5ADD2C4DC
3,254,948 UART: [art] PUB.Y = E886BB69415947A6067EA72A0BC0E37F4C19B231DBCB9A10540F89B4615F116487B3302601BEFE59709D69A67299BAE7
3,261,886 UART: [art] SIG.R = 095BDCCB4DDAA9B8BC4890471167FFFBED76B8FCDE85B7F5637C36A6F8098F0A33DE52315CD7DBE8990B9EDA0DA6EEE6
3,268,671 UART: [art] SIG.S = BDD2014F991FB2C193225BE5EA0DB032C10B3761103ACC4233A507EAC12B24A6AD1E6F68EE97703FF4E294D7B33621E7
3,291,940 UART: Caliptra RT
3,292,193 UART: [state] CFI Enabled
3,400,598 UART: [rt] RT listening for mailbox commands...
3,401,268 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,010 UART: [rt]cmd =0x414c544e, len=20
3,432,346 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,564 UART: [kat] SHA2-256
892,502 UART: [kat] SHA2-384
895,375 UART: [kat] SHA2-512-ACC
897,276 UART: [kat] ECC-384
902,765 UART: [kat] HMAC-384Kdf
907,257 UART: [kat] LMS
1,475,453 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,476,902 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 ready_for_fw is high
1,481,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,671 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,173 UART: [idev] --
1,515,426 UART: [ldev] ++
1,515,594 UART: [ldev] CDI.KEYID = 6
1,515,957 UART: [ldev] SUBJECT.KEYID = 5
1,516,383 UART: [ldev] AUTHORITY.KEYID = 7
1,516,846 UART: [ldev] FE.KEYID = 1
1,522,318 UART: [ldev] Erasing FE.KEYID = 1
1,548,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,977 UART: [ldev] --
1,587,310 UART: [fwproc] Waiting for Commands...
1,588,107 UART: [fwproc] Received command 0x46574c44
1,588,898 UART: [fwproc] Received Image of size 114168 bytes
2,886,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,458 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,555 >>> mbox cmd response: success
3,079,585 UART: [afmc] ++
3,079,753 UART: [afmc] CDI.KEYID = 6
3,080,115 UART: [afmc] SUBJECT.KEYID = 7
3,080,540 UART: [afmc] AUTHORITY.KEYID = 5
3,115,587 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,172 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,862 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,567 UART: [afmc] --
3,158,567 UART: [cold-reset] --
3,159,525 UART: [state] Locking Datavault
3,160,690 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,294 UART: [state] Locking ICCM
3,161,778 UART: [exit] Launching FMC @ 0x40000130
3,167,107 UART:
3,167,123 UART: Running Caliptra FMC ...
3,167,531 UART:
3,167,674 UART: [state] CFI Enabled
3,178,591 UART: [fht] FMC Alias Private Key: 7
3,286,806 UART: [art] Extend RT PCRs Done
3,287,234 UART: [art] Lock RT PCRs Done
3,288,938 UART: [art] Populate DV Done
3,297,145 UART: [fht] FMC Alias Private Key: 7
3,298,081 UART: [art] Derive CDI
3,298,361 UART: [art] Store in in slot 0x4
3,383,798 UART: [art] Derive Key Pair
3,384,158 UART: [art] Store priv key in slot 0x5
3,397,374 UART: [art] Derive Key Pair - Done
3,412,017 UART: [art] Signing Cert with AUTHO
3,412,497 UART: RITY.KEYID = 7
3,427,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,072 UART: [art] PUB.X = 575117D6BC4CD9A0A931096BEB6B57FD0DB4CAD428F0F4122811DAB56E32FAF73542638ED6A0A3F405DC701A953FD828
3,434,845 UART: [art] PUB.Y = 5AB638E1DBCCD80B637662451907F20792C29002D52347A0F541017A52EAA9D4AAAA7A530B85130FEA7D48E32BBFFD81
3,441,782 UART: [art] SIG.R = 42B3D6B406E4191071F33CE489C314049606178BB6CBF107F4CB7E6D2FDB8E03353D8E1681DCC828C3CA9B81038F6333
3,448,536 UART: [art] SIG.S = FEBE744F4994F2F4F3142E837A37ACDD8996D77E6B36DA85F9AEBAD4A8F2287078ED21FE763224342155D79ED7052F0D
3,471,965 UART: Caliptra RT
3,472,310 UART: [state] CFI Enabled
3,580,539 UART: [rt] RT listening for mailbox commands...
3,581,209 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,119 UART: [rt]cmd =0x414c544e, len=20
3,612,225 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,468 ready_for_fw is high
1,362,468 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,135 >>> mbox cmd response: success
2,987,971 UART:
2,987,987 UART: Running Caliptra FMC ...
2,988,395 UART:
2,988,538 UART: [state] CFI Enabled
2,999,191 UART: [fht] FMC Alias Private Key: 7
3,107,480 UART: [art] Extend RT PCRs Done
3,107,908 UART: [art] Lock RT PCRs Done
3,109,786 UART: [art] Populate DV Done
3,117,983 UART: [fht] FMC Alias Private Key: 7
3,119,127 UART: [art] Derive CDI
3,119,407 UART: [art] Store in in slot 0x4
3,204,924 UART: [art] Derive Key Pair
3,205,284 UART: [art] Store priv key in slot 0x5
3,218,258 UART: [art] Derive Key Pair - Done
3,233,044 UART: [art] Signing Cert with AUTHO
3,233,524 UART: RITY.KEYID = 7
3,248,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,443 UART: [art] PUB.X = 2AF887E745F90A95A98F9E0CE94028FA93938CDE7405406D26B6EC68D041573F6E9E1BD4D7F921C8D5A781405F99D25E
3,256,208 UART: [art] PUB.Y = FF9FD05FD80428155DFD9E4BAA930DE892ED418E3FAD80591892B2DE3730E29391FC4B9164EEE69E22F685D8FFD7FB8C
3,263,170 UART: [art] SIG.R = 63FDA776FC39F92CAF5E8FFB3487345354AFB8D76694DD36D366AFF348F5B9C23869AC51F0436C7FE18DFA9F3F308161
3,269,952 UART: [art] SIG.S = 53267FB1025786B2BEFBAB70DEDCFE9079C19B8E78988BC739283A95544268EDF9C80955014D8BC1896E6ABC501A1455
3,293,938 UART: Caliptra RT
3,294,283 UART: [state] CFI Enabled
3,402,549 UART: [rt] RT listening for mailbox commands...
3,403,219 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,385 UART: [rt]cmd =0x414c544e, len=20
3,434,695 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
893,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,845 UART: [kat] ++
897,997 UART: [kat] sha1
902,283 UART: [kat] SHA2-256
904,223 UART: [kat] SHA2-384
907,010 UART: [kat] SHA2-512-ACC
908,911 UART: [kat] ECC-384
918,214 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,833 UART: [cold-reset] ++
1,172,197 UART: [fht] FHT @ 0x50003400
1,174,716 UART: [idev] ++
1,174,884 UART: [idev] CDI.KEYID = 6
1,175,244 UART: [idev] SUBJECT.KEYID = 7
1,175,668 UART: [idev] UDS.KEYID = 0
1,176,013 ready_for_fw is high
1,176,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,754 UART: [idev] Erasing UDS.KEYID = 0
1,200,991 UART: [idev] Sha1 KeyId Algorithm
1,209,539 UART: [idev] --
1,210,675 UART: [ldev] ++
1,210,843 UART: [ldev] CDI.KEYID = 6
1,211,206 UART: [ldev] SUBJECT.KEYID = 5
1,211,632 UART: [ldev] AUTHORITY.KEYID = 7
1,212,095 UART: [ldev] FE.KEYID = 1
1,217,499 UART: [ldev] Erasing FE.KEYID = 1
1,244,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,863 UART: [ldev] --
1,283,156 UART: [fwproc] Wait for Commands...
1,283,784 UART: [fwproc] Recv command 0x46574c44
1,284,512 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,801 >>> mbox cmd response: success
2,775,015 UART: [afmc] ++
2,775,183 UART: [afmc] CDI.KEYID = 6
2,775,545 UART: [afmc] SUBJECT.KEYID = 7
2,775,970 UART: [afmc] AUTHORITY.KEYID = 5
2,811,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,833 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,552 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,422 UART: [afmc] --
2,854,546 UART: [cold-reset] --
2,855,254 UART: [state] Locking Datavault
2,856,483 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,087 UART: [state] Locking ICCM
2,857,601 UART: [exit] Launching FMC @ 0x40000130
2,862,930 UART:
2,862,946 UART: Running Caliptra FMC ...
2,863,354 UART:
2,863,408 UART: [state] CFI Enabled
2,874,215 UART: [fht] FMC Alias Private Key: 7
2,982,156 UART: [art] Extend RT PCRs Done
2,982,584 UART: [art] Lock RT PCRs Done
2,984,204 UART: [art] Populate DV Done
2,992,457 UART: [fht] FMC Alias Private Key: 7
2,993,503 UART: [art] Derive CDI
2,993,783 UART: [art] Store in in slot 0x4
3,079,216 UART: [art] Derive Key Pair
3,079,576 UART: [art] Store priv key in slot 0x5
3,092,650 UART: [art] Derive Key Pair - Done
3,107,567 UART: [art] Signing Cert with AUTHO
3,108,047 UART: RITY.KEYID = 7
3,123,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,936 UART: [art] PUB.X = 47FC07B5B6B531289D34F849B236B465394652B2B3E0F1CA42A8E3D3DBA1865C6BDDD0E50E8B3519C71EF9EA5B29D09D
3,130,712 UART: [art] PUB.Y = 13DDBB5BB7941280AB925AD7867219F94560F56173306487C8885A6678DD2DEDD3B1B4844005A14E44AE9591CCAC8E82
3,137,659 UART: [art] SIG.R = C2121D0AACBAB32C14F912529A2B52F5609ED4AC6EC2AEBEE097A6C1B2A1DB724AAC273ACF7C6DCAF5AE4175847D360E
3,144,451 UART: [art] SIG.S = 12897F2CE5BFA170A27DB098B1C14CD801D458C4840F247477B85F4DE3CC9CB313FD5313BB2095EFD8F2372881682F3A
3,167,684 UART: Caliptra RT
3,167,937 UART: [state] CFI Enabled
3,275,224 UART: [rt] RT listening for mailbox commands...
3,275,894 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,952 UART: [rt]cmd =0x414c544e, len=20
3,307,124 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,196 >>> mbox cmd response: success
2,687,060 UART:
2,687,076 UART: Running Caliptra FMC ...
2,687,484 UART:
2,687,538 UART: [state] CFI Enabled
2,698,041 UART: [fht] FMC Alias Private Key: 7
2,806,384 UART: [art] Extend RT PCRs Done
2,806,812 UART: [art] Lock RT PCRs Done
2,808,374 UART: [art] Populate DV Done
2,816,781 UART: [fht] FMC Alias Private Key: 7
2,817,833 UART: [art] Derive CDI
2,818,113 UART: [art] Store in in slot 0x4
2,903,618 UART: [art] Derive Key Pair
2,903,978 UART: [art] Store priv key in slot 0x5
2,917,100 UART: [art] Derive Key Pair - Done
2,932,206 UART: [art] Signing Cert with AUTHO
2,932,686 UART: RITY.KEYID = 7
2,947,776 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,541 UART: [art] PUB.X = 164EED46D9709934ED4AEED78D1980AB25B7E3892706E94B520646EE346BA485D5C8C0CD23B21D94DB66D0C597046F56
2,955,306 UART: [art] PUB.Y = ABC73400F0D252EE1E15DD197BAE061E027797DD61DC7EADCA5AEFF09EAFE027999AD7BB83F910FE803A3B65C03EB840
2,962,252 UART: [art] SIG.R = 605BD114B744DACA593BE70F61D5A9BF693FDAB7EF437BC69B65A776AAD81C46B307463DD6F08F312B70753F1B2046EE
2,969,030 UART: [art] SIG.S = 098F7E11D89688398C8C8EA005A745E1A136BA6D6CA53E7F1E551CF029F1F8B0A9754B90B544470BF96737DEBD924DBF
2,993,074 UART: Caliptra RT
2,993,327 UART: [state] CFI Enabled
3,101,482 UART: [rt] RT listening for mailbox commands...
3,102,152 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,074 UART: [rt]cmd =0x414c544e, len=20
3,133,410 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
893,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,626 UART: [kat] ++
897,778 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
906,939 UART: [kat] SHA2-512-ACC
908,840 UART: [kat] ECC-384
918,879 UART: [kat] HMAC-384Kdf
923,485 UART: [kat] LMS
1,171,813 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,946 UART: [fht] FHT @ 0x50003400
1,175,491 UART: [idev] ++
1,175,659 UART: [idev] CDI.KEYID = 6
1,176,019 UART: [idev] SUBJECT.KEYID = 7
1,176,443 UART: [idev] UDS.KEYID = 0
1,176,788 ready_for_fw is high
1,176,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,267 UART: [idev] Erasing UDS.KEYID = 0
1,200,948 UART: [idev] Sha1 KeyId Algorithm
1,209,258 UART: [idev] --
1,210,310 UART: [ldev] ++
1,210,478 UART: [ldev] CDI.KEYID = 6
1,210,841 UART: [ldev] SUBJECT.KEYID = 5
1,211,267 UART: [ldev] AUTHORITY.KEYID = 7
1,211,730 UART: [ldev] FE.KEYID = 1
1,217,216 UART: [ldev] Erasing FE.KEYID = 1
1,243,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,544 UART: [ldev] --
1,282,925 UART: [fwproc] Wait for Commands...
1,283,561 UART: [fwproc] Recv command 0x46574c44
1,284,289 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,731 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,035 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,612 >>> mbox cmd response: success
2,774,686 UART: [afmc] ++
2,774,854 UART: [afmc] CDI.KEYID = 6
2,775,216 UART: [afmc] SUBJECT.KEYID = 7
2,775,641 UART: [afmc] AUTHORITY.KEYID = 5
2,811,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,757 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,485 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,370 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,089 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,091 UART: [afmc] --
2,855,051 UART: [cold-reset] --
2,855,999 UART: [state] Locking Datavault
2,857,016 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,620 UART: [state] Locking ICCM
2,858,128 UART: [exit] Launching FMC @ 0x40000130
2,863,457 UART:
2,863,473 UART: Running Caliptra FMC ...
2,863,881 UART:
2,864,024 UART: [state] CFI Enabled
2,874,543 UART: [fht] FMC Alias Private Key: 7
2,982,946 UART: [art] Extend RT PCRs Done
2,983,374 UART: [art] Lock RT PCRs Done
2,985,110 UART: [art] Populate DV Done
2,993,269 UART: [fht] FMC Alias Private Key: 7
2,994,423 UART: [art] Derive CDI
2,994,703 UART: [art] Store in in slot 0x4
3,080,906 UART: [art] Derive Key Pair
3,081,266 UART: [art] Store priv key in slot 0x5
3,095,260 UART: [art] Derive Key Pair - Done
3,109,928 UART: [art] Signing Cert with AUTHO
3,110,408 UART: RITY.KEYID = 7
3,125,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,483 UART: [art] PUB.X = A8465AD78342EA0E9D17A867AED7914ED7C5C5653E679C28EC7A19222CAA1162D59CDD0CACBD70CE2C07873BB661F16D
3,133,260 UART: [art] PUB.Y = 0499974E58F86517D8C2C7ED8EC3903F0C5034DABD245D0D2332D9B47F6440198C450BCFCF9501EDD15F11DDF02AA076
3,140,203 UART: [art] SIG.R = C79148C3B533854261A98AB993FC9E3B184FDD7755DE24A8D4C709B1833822DF584206C5B9515BE3D2C3F81B206BA90D
3,146,966 UART: [art] SIG.S = 0EB0E51140BEA61EFE3B4D8A33961819732A7B3E6642B31D1768712A9964BC40915A3E204231D273B5820FC980FDE6BF
3,170,411 UART: Caliptra RT
3,170,756 UART: [state] CFI Enabled
3,278,985 UART: [rt] RT listening for mailbox commands...
3,279,655 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,783 UART: [rt]cmd =0x414c544e, len=20
3,310,851 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,038 ready_for_fw is high
1,061,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,701 >>> mbox cmd response: success
2,689,453 UART:
2,689,469 UART: Running Caliptra FMC ...
2,689,877 UART:
2,690,020 UART: [state] CFI Enabled
2,700,699 UART: [fht] FMC Alias Private Key: 7
2,808,648 UART: [art] Extend RT PCRs Done
2,809,076 UART: [art] Lock RT PCRs Done
2,810,726 UART: [art] Populate DV Done
2,818,683 UART: [fht] FMC Alias Private Key: 7
2,819,715 UART: [art] Derive CDI
2,819,995 UART: [art] Store in in slot 0x4
2,905,710 UART: [art] Derive Key Pair
2,906,070 UART: [art] Store priv key in slot 0x5
2,919,198 UART: [art] Derive Key Pair - Done
2,934,008 UART: [art] Signing Cert with AUTHO
2,934,488 UART: RITY.KEYID = 7
2,949,564 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,329 UART: [art] PUB.X = C58FA727534B01CC282C57ACAB1FEC439B803E8C14AFEC511CA7285A04C5ACF38651A52C745A7DE10C8847880FC6D167
2,957,099 UART: [art] PUB.Y = 846FF320481983410375096AD9B046537AFF417687F34D733414D59D3A18BAFD75EF089291829F9BFC500011E10A89E1
2,964,005 UART: [art] SIG.R = 12C30275046F7FF65B7547D40F85D6B1545C61E17C3613B574DF0504461CB3E8080A856ED4E4BAF137A707213CFB40B6
2,970,749 UART: [art] SIG.S = 01B9C1BE879E6A79746581D3B66DC5D19B1149A3DAD43D59F5F67B7D0869FD5F1084A098C2BFF8531D8DEE1B656FCE18
2,994,200 UART: Caliptra RT
2,994,545 UART: [state] CFI Enabled
3,102,458 UART: [rt] RT listening for mailbox commands...
3,103,128 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,040 UART: [rt]cmd =0x414c544e, len=20
3,134,404 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
890,954 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,083 UART: [kat] ++
895,235 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,543 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,174,555 ready_for_fw is high
1,174,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,220 UART: [ldev] Erasing FE.KEYID = 1
1,241,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,156 UART: [ldev] --
1,281,596 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,873 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,365 >>> mbox cmd response: success
2,771,524 UART: [afmc] ++
2,771,692 UART: [afmc] CDI.KEYID = 6
2,772,055 UART: [afmc] SUBJECT.KEYID = 7
2,772,481 UART: [afmc] AUTHORITY.KEYID = 5
2,808,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,323 UART: [afmc] --
2,851,201 UART: [cold-reset] --
2,852,211 UART: [state] Locking Datavault
2,853,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,938 UART: [state] Locking ICCM
2,854,382 UART: [exit] Launching FMC @ 0x40000130
2,859,711 UART:
2,859,727 UART: Running Caliptra FMC ...
2,860,135 UART:
2,860,189 UART: [state] CFI Enabled
2,870,822 UART: [fht] FMC Alias Private Key: 7
2,978,367 UART: [art] Extend RT PCRs Done
2,978,795 UART: [art] Lock RT PCRs Done
2,980,351 UART: [art] Populate DV Done
2,988,742 UART: [fht] FMC Alias Private Key: 7
2,989,730 UART: [art] Derive CDI
2,990,010 UART: [art] Store in in slot 0x4
3,075,481 UART: [art] Derive Key Pair
3,075,841 UART: [art] Store priv key in slot 0x5
3,089,283 UART: [art] Derive Key Pair - Done
3,104,045 UART: [art] Signing Cert with AUTHO
3,104,525 UART: RITY.KEYID = 7
3,119,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,328 UART: [art] PUB.X = 4CCE7687C2B4A738A2E99312F332BF76D728B861025721E90DBAC04A7C3BE5A45C39B73B49C0FF96E525E0DC86FB5257
3,127,100 UART: [art] PUB.Y = FE1E4D7572CC41EF2E0B6109B6E0DD0FE3B3828ED562FB2F921B01DDB4D6249B1CEB6B9493CCC9DCC3D8740C211CA163
3,134,057 UART: [art] SIG.R = 7B57272A0C39588EE004FFE8878387C7CF4E45828BB76B8C1F40D01372C35489A68C1B7D7CDE5DD28108F1C53C16134F
3,140,820 UART: [art] SIG.S = EED1455A2A065AF22D8BE3AD35E80DC52EDB1B1A1D1998F9B51DE29D8A688F001F401AED4C88447B2D5D6619D8879EFE
3,164,443 UART: Caliptra RT
3,164,696 UART: [state] CFI Enabled
3,272,347 UART: [rt] RT listening for mailbox commands...
3,273,017 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,897 UART: [rt]cmd =0x414c544e, len=20
3,304,179 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,976 ready_for_fw is high
1,055,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,923 >>> mbox cmd response: success
2,681,565 UART:
2,681,581 UART: Running Caliptra FMC ...
2,681,989 UART:
2,682,043 UART: [state] CFI Enabled
2,692,680 UART: [fht] FMC Alias Private Key: 7
2,800,583 UART: [art] Extend RT PCRs Done
2,801,011 UART: [art] Lock RT PCRs Done
2,802,897 UART: [art] Populate DV Done
2,811,274 UART: [fht] FMC Alias Private Key: 7
2,812,382 UART: [art] Derive CDI
2,812,662 UART: [art] Store in in slot 0x4
2,898,769 UART: [art] Derive Key Pair
2,899,129 UART: [art] Store priv key in slot 0x5
2,912,163 UART: [art] Derive Key Pair - Done
2,926,868 UART: [art] Signing Cert with AUTHO
2,927,348 UART: RITY.KEYID = 7
2,942,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,987 UART: [art] PUB.X = B825A0DF263ACFF8F39C83D0603305D78C45D6EDB96AEAA6DCDE85472289533D80ABCC82D4B6E3B92F5CE190AB7DF810
2,949,774 UART: [art] PUB.Y = 095213A4062A4425BCEE610970A9DB3A2952297FD407D60D2FDA7E49245F61CD4A7C933842BC460C16E9C14722472B71
2,956,702 UART: [art] SIG.R = 02D27DECD22D7A78D942C93DF88C7C6059D0E5254214BC720909D68F337B51363C184959D197E31A65A9E8CED18C5025
2,963,461 UART: [art] SIG.S = 986998EB5BBA44888D055B6F9A2A4342B1B81481456686DD8F0713C2EFFED5E009B5D2C148D7E72BA9278DB79FC55C4D
2,987,863 UART: Caliptra RT
2,988,116 UART: [state] CFI Enabled
3,096,975 UART: [rt] RT listening for mailbox commands...
3,097,645 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,599 UART: [rt]cmd =0x414c544e, len=20
3,128,815 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,650 UART: [kat] ++
895,802 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,325 UART: [kat] HMAC-384Kdf
921,065 UART: [kat] LMS
1,169,377 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,448 UART: [idev] ++
1,173,616 UART: [idev] CDI.KEYID = 6
1,173,977 UART: [idev] SUBJECT.KEYID = 7
1,174,402 UART: [idev] UDS.KEYID = 0
1,174,748 ready_for_fw is high
1,174,748 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,772 UART: [idev] Sha1 KeyId Algorithm
1,208,808 UART: [idev] --
1,209,849 UART: [ldev] ++
1,210,017 UART: [ldev] CDI.KEYID = 6
1,210,381 UART: [ldev] SUBJECT.KEYID = 5
1,210,808 UART: [ldev] AUTHORITY.KEYID = 7
1,211,271 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,243,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,527 UART: [fwproc] Wait for Commands...
1,283,238 UART: [fwproc] Recv command 0x46574c44
1,283,971 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,644 >>> mbox cmd response: success
2,773,791 UART: [afmc] ++
2,773,959 UART: [afmc] CDI.KEYID = 6
2,774,322 UART: [afmc] SUBJECT.KEYID = 7
2,774,748 UART: [afmc] AUTHORITY.KEYID = 5
2,810,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,992 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,604 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,323 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,120 UART: [afmc] --
2,853,242 UART: [cold-reset] --
2,854,336 UART: [state] Locking Datavault
2,855,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,885 UART: [state] Locking ICCM
2,856,491 UART: [exit] Launching FMC @ 0x40000130
2,861,820 UART:
2,861,836 UART: Running Caliptra FMC ...
2,862,244 UART:
2,862,387 UART: [state] CFI Enabled
2,873,022 UART: [fht] FMC Alias Private Key: 7
2,981,509 UART: [art] Extend RT PCRs Done
2,981,937 UART: [art] Lock RT PCRs Done
2,983,567 UART: [art] Populate DV Done
2,991,632 UART: [fht] FMC Alias Private Key: 7
2,992,784 UART: [art] Derive CDI
2,993,064 UART: [art] Store in in slot 0x4
3,078,917 UART: [art] Derive Key Pair
3,079,277 UART: [art] Store priv key in slot 0x5
3,092,583 UART: [art] Derive Key Pair - Done
3,107,343 UART: [art] Signing Cert with AUTHO
3,107,823 UART: RITY.KEYID = 7
3,122,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,478 UART: [art] PUB.X = 20B7656B112AE44522573B632FB609C82B1F290FEA6B358FD78B55104069A7E1826F0D1541AE1890181507F65A144501
3,130,221 UART: [art] PUB.Y = 3BBBCB976B38D6FF8F15A231BDFDE56B4A301FA1CACBFAA47ED89C80B06A5FF68DC1B025373F72FAAAEA87413EF31186
3,137,201 UART: [art] SIG.R = 611BA2516453F3328264074F0F4A599F011C6D7B128A48410B47A5F4FD3C435665FBD9D25530B7BA0736A53A5262FBE7
3,143,952 UART: [art] SIG.S = 27469F2CD1C86BB8E72B78C773E48E92A9118C4D917C47633FAE79E281F8564E7C38DFE2963089484EE4B2A7F6D378BC
3,167,395 UART: Caliptra RT
3,167,740 UART: [state] CFI Enabled
3,274,973 UART: [rt] RT listening for mailbox commands...
3,275,643 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,589 UART: [rt]cmd =0x414c544e, len=20
3,306,991 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,083 ready_for_fw is high
1,056,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,314 >>> mbox cmd response: success
2,682,618 UART:
2,682,634 UART: Running Caliptra FMC ...
2,683,042 UART:
2,683,185 UART: [state] CFI Enabled
2,693,390 UART: [fht] FMC Alias Private Key: 7
2,801,027 UART: [art] Extend RT PCRs Done
2,801,455 UART: [art] Lock RT PCRs Done
2,803,005 UART: [art] Populate DV Done
2,811,264 UART: [fht] FMC Alias Private Key: 7
2,812,400 UART: [art] Derive CDI
2,812,680 UART: [art] Store in in slot 0x4
2,898,311 UART: [art] Derive Key Pair
2,898,671 UART: [art] Store priv key in slot 0x5
2,912,221 UART: [art] Derive Key Pair - Done
2,927,014 UART: [art] Signing Cert with AUTHO
2,927,494 UART: RITY.KEYID = 7
2,943,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,917 UART: [art] PUB.X = 42DBEAE264E615809D07D5A5236E954EB1C05EB1EA6BC449443758635258C16A0D9E4785F197B2FC6B0438AFEA79F2F6
2,950,684 UART: [art] PUB.Y = 7BA2B58ACED053B0D0DC43474BFBFAE14ED9E5D8E4740C9E9507BC2F0DABE1CEA6E39EAA0B1963DCD56FAA0E43658599
2,957,649 UART: [art] SIG.R = FFCB5989657DCD9795CC67D4F89F8DBE6883A12DCDE98FDBE0E84E2F84E05592742E5179A02B68C2457733884EA4D0AF
2,964,431 UART: [art] SIG.S = 73C05B8A5EB1719F8884EAB0EA4DB3B7F77031CAB71850E41A79BD4B55FA6BCEAB181B724D6EE202AE4A98A76E22E4FF
2,988,075 UART: Caliptra RT
2,988,420 UART: [state] CFI Enabled
3,096,225 UART: [rt] RT listening for mailbox commands...
3,096,895 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,539 UART: [rt]cmd =0x414c544e, len=20
3,127,709 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,540,720 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,417 UART: [state] Locking ICCM
23,544,722 UART: [exit] Launching FMC @ 0x40000130
23,553,114 UART:
23,553,339 UART: Running Caliptra FMC ...
23,554,432 UART:
23,554,584 UART: [state] CFI Enabled
23,619,711 UART: [fht] FMC Alias Private Key: 7
25,957,767 UART: [art] Extend RT PCRs Done
25,958,982 UART: [art] Lock RT PCRs Done
25,960,712 UART: [art] Populate DV Done
25,966,116 UART: [fht] FMC Alias Private Key: 7
25,967,754 UART: [art] Derive CDI
25,968,574 UART: [art] Store in in slot 0x4
26,028,226 UART: [art] Derive Key Pair
26,029,267 UART: [art] Store priv key in slot 0x5
29,322,379 UART: [art] Derive Key Pair - Done
29,335,328 UART: [art] Signing Cert with AUTHO
29,336,635 UART: RITY.KEYID = 7
31,624,345 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,848 UART: [art] PUB.X = 49A9DFA9DE7BB7E8681E769400A1F22FF848ECFA6942B1EAC43E7751613F7203D70213CD17B1786BC1B9DBDD8C2B778D
31,633,073 UART: [art] PUB.Y = 7C6A01D8C2FCDD6CFAC3928F2951A708F96348BEDD678AD7B8630AA81DDFED8DBDBBA9DD52A838578837512219683394
31,640,372 UART: [art] SIG.R = 5923BAFB0A95DBEA4F8AAEFEB1CDD43C506FF11F502DFB6F5C9C562CCED318A8E896021A280AFFD16507DED6B83158F7
31,647,768 UART: [art] SIG.S = 55CB7A7AB26DEE67FF86F937E5F947561805D16102F7B51F04D3975EF1F2420B0DA67BA247DBE9C2FC886409E7331258
32,953,181 UART: Caliptra RT
32,953,876 UART: [state] CFI Enabled
33,126,741 UART: [rt] RT listening for mailbox commands...
33,158,706 UART: [rt]cmd =0x44504543, len=92
38,913,072 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,080 writing to cptra_bootfsm_go
190,183 UART:
190,481 UART: Running Caliptra ROM ...
191,531 UART:
191,674 UART: [state] CFI Enabled
253,988 UART: [state] LifecycleState = Unprovisioned
255,985 UART: [state] DebugLocked = No
257,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
261,340 UART: [kat] SHA2-256
431,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,577 UART: [kat] ++
442,213 UART: [kat] sha1
452,808 UART: [kat] SHA2-256
455,532 UART: [kat] SHA2-384
461,731 UART: [kat] SHA2-512-ACC
464,113 UART: [kat] ECC-384
2,758,351 UART: [kat] HMAC-384Kdf
2,770,790 UART: [kat] LMS
3,961,066 UART: [kat] --
3,966,201 UART: [cold-reset] ++
3,968,342 UART: [fht] Storing FHT @ 0x50003400
3,980,176 UART: [idev] ++
3,980,743 UART: [idev] CDI.KEYID = 6
3,981,768 UART: [idev] SUBJECT.KEYID = 7
3,982,936 UART: [idev] UDS.KEYID = 0
3,983,976 ready_for_fw is high
3,984,165 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,127,260 UART: [idev] Erasing UDS.KEYID = 0
7,307,882 UART: [idev] Using Sha1 for KeyId Algorithm
7,330,283 UART: [idev] --
7,333,623 UART: [ldev] ++
7,334,205 UART: [ldev] CDI.KEYID = 6
7,335,105 UART: [ldev] SUBJECT.KEYID = 5
7,336,371 UART: [ldev] AUTHORITY.KEYID = 7
7,337,594 UART: [ldev] FE.KEYID = 1
7,383,773 UART: [ldev] Erasing FE.KEYID = 1
10,719,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,570 UART: [ldev] --
13,095,882 UART: [fwproc] Waiting for Commands...
13,097,767 UART: [fwproc] Received command 0x46574c44
13,099,946 UART: [fwproc] Received Image of size 113844 bytes
17,146,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,468 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,610,363 >>> mbox cmd response: success
17,610,733 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,613,953 UART: [afmc] ++
17,614,556 UART: [afmc] CDI.KEYID = 6
17,615,465 UART: [afmc] SUBJECT.KEYID = 7
17,616,729 UART: [afmc] AUTHORITY.KEYID = 5
20,987,902 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,027 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,461 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,297 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,725 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,718 UART: [afmc] --
23,359,008 UART: [cold-reset] --
23,361,620 UART: [state] Locking Datavault
23,367,041 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,787 UART: [state] Locking ICCM
23,370,153 UART: [exit] Launching FMC @ 0x40000130
23,378,547 UART:
23,378,815 UART: Running Caliptra FMC ...
23,379,842 UART:
23,379,989 UART: [state] CFI Enabled
23,445,552 UART: [fht] FMC Alias Private Key: 7
25,783,771 UART: [art] Extend RT PCRs Done
25,784,986 UART: [art] Lock RT PCRs Done
25,786,459 UART: [art] Populate DV Done
25,792,191 UART: [fht] FMC Alias Private Key: 7
25,793,659 UART: [art] Derive CDI
25,794,414 UART: [art] Store in in slot 0x4
25,853,419 UART: [art] Derive Key Pair
25,854,616 UART: [art] Store priv key in slot 0x5
29,146,967 UART: [art] Derive Key Pair - Done
29,159,744 UART: [art] Signing Cert with AUTHO
29,161,048 UART: RITY.KEYID = 7
31,448,315 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,828 UART: [art] PUB.X = 49A9DFA9DE7BB7E8681E769400A1F22FF848ECFA6942B1EAC43E7751613F7203D70213CD17B1786BC1B9DBDD8C2B778D
31,457,096 UART: [art] PUB.Y = 7C6A01D8C2FCDD6CFAC3928F2951A708F96348BEDD678AD7B8630AA81DDFED8DBDBBA9DD52A838578837512219683394
31,464,374 UART: [art] SIG.R = 5923BAFB0A95DBEA4F8AAEFEB1CDD43C506FF11F502DFB6F5C9C562CCED318A8E896021A280AFFD16507DED6B83158F7
31,471,762 UART: [art] SIG.S = 55CB7A7AB26DEE67FF86F937E5F947561805D16102F7B51F04D3975EF1F2420B0DA67BA247DBE9C2FC886409E7331258
32,777,121 UART: Caliptra RT
32,777,829 UART: [state] CFI Enabled
32,958,725 UART: [rt] RT listening for mailbox commands...
32,990,765 UART: [rt]cmd =0x4d454153, len=108
33,008,910 >>> mbox cmd response data (12 bytes)
33,009,433 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,039,746 UART: [rt]cmd =0x44504543, len=92
38,799,411 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,074 writing to cptra_bootfsm_go
190,202 UART:
190,501 UART: Running Caliptra ROM ...
191,609 UART:
191,760 UART: [state] CFI Enabled
252,928 UART: [state] LifecycleState = Unprovisioned
254,860 UART: [state] DebugLocked = No
256,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,363 UART: [kat] SHA2-256
430,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
440,551 UART: [kat] ++
441,065 UART: [kat] sha1
451,005 UART: [kat] SHA2-256
453,651 UART: [kat] SHA2-384
459,215 UART: [kat] SHA2-512-ACC
461,598 UART: [kat] ECC-384
2,755,492 UART: [kat] HMAC-384Kdf
2,768,579 UART: [kat] LMS
3,958,889 UART: [kat] --
3,963,534 UART: [cold-reset] ++
3,965,189 UART: [fht] Storing FHT @ 0x50003400
3,976,879 UART: [idev] ++
3,977,506 UART: [idev] CDI.KEYID = 6
3,978,406 UART: [idev] SUBJECT.KEYID = 7
3,979,645 UART: [idev] UDS.KEYID = 0
3,980,636 ready_for_fw is high
3,980,827 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,123,939 UART: [idev] Erasing UDS.KEYID = 0
7,315,332 UART: [idev] Using Sha1 for KeyId Algorithm
7,335,891 UART: [idev] --
7,339,882 UART: [ldev] ++
7,340,528 UART: [ldev] CDI.KEYID = 6
7,341,432 UART: [ldev] SUBJECT.KEYID = 5
7,342,560 UART: [ldev] AUTHORITY.KEYID = 7
7,343,808 UART: [ldev] FE.KEYID = 1
7,390,919 UART: [ldev] Erasing FE.KEYID = 1
10,724,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,036,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,050,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,065,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,079,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,249 UART: [ldev] --
13,105,455 UART: [fwproc] Waiting for Commands...
13,108,192 UART: [fwproc] Received command 0x46574c44
13,110,386 UART: [fwproc] Received Image of size 113844 bytes
17,157,594 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,044 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,617,234 >>> mbox cmd response: success
17,617,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,620,752 UART: [afmc] ++
17,621,323 UART: [afmc] CDI.KEYID = 6
17,622,255 UART: [afmc] SUBJECT.KEYID = 7
17,623,515 UART: [afmc] AUTHORITY.KEYID = 5
20,997,869 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,294,852 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,297,156 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,311,544 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,326,363 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,340,788 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,362,754 UART: [afmc] --
23,367,220 UART: [cold-reset] --
23,370,808 UART: [state] Locking Datavault
23,375,746 UART: [state] Locking PCR0, PCR1 and PCR31
23,377,492 UART: [state] Locking ICCM
23,378,823 UART: [exit] Launching FMC @ 0x40000130
23,387,209 UART:
23,387,447 UART: Running Caliptra FMC ...
23,388,544 UART:
23,388,699 UART: [state] CFI Enabled
23,456,534 UART: [fht] FMC Alias Private Key: 7
25,794,150 UART: [art] Extend RT PCRs Done
25,795,392 UART: [art] Lock RT PCRs Done
25,797,150 UART: [art] Populate DV Done
25,802,778 UART: [fht] FMC Alias Private Key: 7
25,804,468 UART: [art] Derive CDI
25,805,198 UART: [art] Store in in slot 0x4
25,864,853 UART: [art] Derive Key Pair
25,865,891 UART: [art] Store priv key in slot 0x5
29,158,163 UART: [art] Derive Key Pair - Done
29,170,993 UART: [art] Signing Cert with AUTHO
29,172,301 UART: RITY.KEYID = 7
31,459,726 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,237 UART: [art] PUB.X = 49A9DFA9DE7BB7E8681E769400A1F22FF848ECFA6942B1EAC43E7751613F7203D70213CD17B1786BC1B9DBDD8C2B778D
31,468,478 UART: [art] PUB.Y = 7C6A01D8C2FCDD6CFAC3928F2951A708F96348BEDD678AD7B8630AA81DDFED8DBDBBA9DD52A838578837512219683394
31,475,748 UART: [art] SIG.R = 5923BAFB0A95DBEA4F8AAEFEB1CDD43C506FF11F502DFB6F5C9C562CCED318A8E896021A280AFFD16507DED6B83158F7
31,483,159 UART: [art] SIG.S = 55CB7A7AB26DEE67FF86F937E5F947561805D16102F7B51F04D3975EF1F2420B0DA67BA247DBE9C2FC886409E7331258
32,788,373 UART: Caliptra RT
32,789,083 UART: [state] CFI Enabled
32,949,847 UART: [rt] RT listening for mailbox commands...
32,982,057 UART: [rt]cmd =0x44504543, len=96
33,012,993 >>> mbox cmd response data (56 bytes)
33,013,854 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,044,293 UART: [rt]cmd =0x44504543, len=92
38,811,431 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,873,789 >>> mbox cmd response data (12 bytes)
12,875,093 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,045,406 >>> mbox cmd response: success
18,045,888 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,739,000 UART:
23,739,392 UART: Running Caliptra FMC ...
23,740,546 UART:
23,740,694 UART: [state] CFI Enabled
23,805,656 UART: [fht] FMC Alias Private Key: 7
26,143,119 UART: [art] Extend RT PCRs Done
26,144,342 UART: [art] Lock RT PCRs Done
26,146,312 UART: [art] Populate DV Done
26,151,724 UART: [fht] FMC Alias Private Key: 7
26,153,420 UART: [art] Derive CDI
26,154,242 UART: [art] Store in in slot 0x4
26,213,547 UART: [art] Derive Key Pair
26,214,580 UART: [art] Store priv key in slot 0x5
29,507,691 UART: [art] Derive Key Pair - Done
29,520,583 UART: [art] Signing Cert with AUTHO
29,521,889 UART: RITY.KEYID = 7
31,808,602 UART: [art] Erasing AUTHORITY.KEYID = 7
31,810,100 UART: [art] PUB.X = AFF1E1E2BB61981E5CBCC6110A8DC5BCE19E70E7B16CC95C2E3E739B8EEF3DBC6FF1C177EABBAD0870D0A4F813B8CD88
31,817,460 UART: [art] PUB.Y = 2AFAAD7D0C21488297BEAD54B0DFA2B083B27AACE5441684E29BB358423E7A75E1A1C71A4091BB878C0DF422CAB9C79A
31,824,700 UART: [art] SIG.R = 8BB710B88C1B3241C6BFAD12ECBEF66193F2A3CF3F9AA170BF354B462194E97699C712501D3BD3BEF2A8FA3C42300023
31,832,062 UART: [art] SIG.S = 3B437F6E188E9580E2DDF63B93B197377C3D439FA610F170949EF0F29FE0D34A909B9AB7892FA9F5EFF8E885052EB2BC
33,137,175 UART: Caliptra RT
33,137,890 UART: [state] CFI Enabled
33,309,401 UART: [rt] RT listening for mailbox commands...
33,341,505 UART: [rt]cmd =0x44504543, len=92
39,098,073 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,109 writing to cptra_bootfsm_go
3,792,586 ready_for_fw is high
3,792,942 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,854,679 >>> mbox cmd response: success
17,855,187 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,577,190 UART:
23,577,530 UART: Running Caliptra FMC ...
23,578,568 UART:
23,578,716 UART: [state] CFI Enabled
23,647,370 UART: [fht] FMC Alias Private Key: 7
25,984,696 UART: [art] Extend RT PCRs Done
25,985,923 UART: [art] Lock RT PCRs Done
25,987,440 UART: [art] Populate DV Done
25,992,785 UART: [fht] FMC Alias Private Key: 7
25,994,314 UART: [art] Derive CDI
25,995,076 UART: [art] Store in in slot 0x4
26,055,830 UART: [art] Derive Key Pair
26,056,874 UART: [art] Store priv key in slot 0x5
29,349,741 UART: [art] Derive Key Pair - Done
29,362,680 UART: [art] Signing Cert with AUTHO
29,364,012 UART: RITY.KEYID = 7
31,651,856 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,360 UART: [art] PUB.X = AFF1E1E2BB61981E5CBCC6110A8DC5BCE19E70E7B16CC95C2E3E739B8EEF3DBC6FF1C177EABBAD0870D0A4F813B8CD88
31,660,645 UART: [art] PUB.Y = 2AFAAD7D0C21488297BEAD54B0DFA2B083B27AACE5441684E29BB358423E7A75E1A1C71A4091BB878C0DF422CAB9C79A
31,667,877 UART: [art] SIG.R = 8BB710B88C1B3241C6BFAD12ECBEF66193F2A3CF3F9AA170BF354B462194E97699C712501D3BD3BEF2A8FA3C42300023
31,675,250 UART: [art] SIG.S = 3B437F6E188E9580E2DDF63B93B197377C3D439FA610F170949EF0F29FE0D34A909B9AB7892FA9F5EFF8E885052EB2BC
32,980,586 UART: Caliptra RT
32,981,312 UART: [state] CFI Enabled
33,143,056 UART: [rt] RT listening for mailbox commands...
33,175,207 UART: [rt]cmd =0x4d454153, len=108
33,193,946 >>> mbox cmd response data (12 bytes)
33,194,468 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,225,014 UART: [rt]cmd =0x44504543, len=92
38,982,471 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,059 writing to cptra_bootfsm_go
3,795,999 ready_for_fw is high
3,796,359 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,883,582 >>> mbox cmd response: success
17,884,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,571,831 UART:
23,572,155 UART: Running Caliptra FMC ...
23,573,225 UART:
23,573,377 UART: [state] CFI Enabled
23,640,835 UART: [fht] FMC Alias Private Key: 7
25,979,025 UART: [art] Extend RT PCRs Done
25,980,237 UART: [art] Lock RT PCRs Done
25,982,190 UART: [art] Populate DV Done
25,987,456 UART: [fht] FMC Alias Private Key: 7
25,989,072 UART: [art] Derive CDI
25,989,883 UART: [art] Store in in slot 0x4
26,048,890 UART: [art] Derive Key Pair
26,049,928 UART: [art] Store priv key in slot 0x5
29,342,768 UART: [art] Derive Key Pair - Done
29,355,910 UART: [art] Signing Cert with AUTHO
29,357,241 UART: RITY.KEYID = 7
31,643,975 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,489 UART: [art] PUB.X = AFF1E1E2BB61981E5CBCC6110A8DC5BCE19E70E7B16CC95C2E3E739B8EEF3DBC6FF1C177EABBAD0870D0A4F813B8CD88
31,652,731 UART: [art] PUB.Y = 2AFAAD7D0C21488297BEAD54B0DFA2B083B27AACE5441684E29BB358423E7A75E1A1C71A4091BB878C0DF422CAB9C79A
31,660,006 UART: [art] SIG.R = 8BB710B88C1B3241C6BFAD12ECBEF66193F2A3CF3F9AA170BF354B462194E97699C712501D3BD3BEF2A8FA3C42300023
31,667,392 UART: [art] SIG.S = 3B437F6E188E9580E2DDF63B93B197377C3D439FA610F170949EF0F29FE0D34A909B9AB7892FA9F5EFF8E885052EB2BC
32,972,584 UART: Caliptra RT
32,973,290 UART: [state] CFI Enabled
33,133,262 UART: [rt] RT listening for mailbox commands...
33,165,397 UART: [rt]cmd =0x44504543, len=96
33,196,061 >>> mbox cmd response data (56 bytes)
33,196,890 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,227,419 UART: [rt]cmd =0x44504543, len=92
38,995,661 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 5.97s
Truncated 4094 bytes from beginning
UART: [state] Locking Datavault
23,687,551 UART: [state] Locking PCR0, PCR1 and PCR31
23,689,255 UART: [state] Locking ICCM
23,691,169 UART: [exit] Launching FMC @ 0x40000130
23,699,559 UART:
23,699,794 UART: Running Caliptra FMC ...
23,700,828 UART:
23,700,980 UART: [state] CFI Enabled
23,709,095 UART: [fht] FMC Alias Private Key: 7
26,039,707 UART: [art] Extend RT PCRs Done
26,040,931 UART: [art] Lock RT PCRs Done
26,042,643 UART: [art] Populate DV Done
26,048,279 UART: [fht] FMC Alias Private Key: 7
26,049,874 UART: [art] Derive CDI
26,050,693 UART: [art] Store in in slot 0x4
26,093,128 UART: [art] Derive Key Pair
26,094,133 UART: [art] Store priv key in slot 0x5
29,336,214 UART: [art] Derive Key Pair - Done
29,349,381 UART: [art] Signing Cert with AUTHO
29,350,681 UART: RITY.KEYID = 7
31,629,741 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,259 UART: [art] PUB.X = 0F69A17FE6209F52F6725E2A607EFAFF191B151063B0B04AA99E10E99E4678DD2AEDAE5CEA02193A6D4275025E962675
31,638,465 UART: [art] PUB.Y = 60EF2250D7CC23CC55B827B3A4FE615411495B8DB0BF5B787171496C1ECF791400E7B1A8F89DB4DF7EEFF50585FB4C58
31,645,718 UART: [art] SIG.R = F41F2EDE42984A8A601C1900FD436895F0BE3330AB6AA0F6CE606935C5638C2972A167C088EEB697C36ED59AF7D79F52
31,653,062 UART: [art] SIG.S = 8C3C38FE09BE7B9AA829150E8813F7CBACA652987E322872E9C4DFCA4B1DCE6FDAB567EFA44189A01941ED7086186445
32,957,933 UART: Caliptra RT
32,958,642 UART: [state] CFI Enabled
33,089,491 UART: [rt] RT listening for mailbox commands...
33,121,229 UART: [rt]cmd =0x44504543, len=92
38,801,212 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,105 writing to cptra_bootfsm_go
190,243 UART:
190,535 UART: Running Caliptra ROM ...
191,651 UART:
1,690,622 UART: [state] CFI Enabled
1,705,635 UART: [state] LifecycleState = Unprovisioned
1,707,552 UART: [state] DebugLocked = No
1,709,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,713,638 UART: [kat] SHA2-256
1,883,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,893,940 UART: [kat] ++
1,894,427 UART: [kat] sha1
1,905,676 UART: [kat] SHA2-256
1,908,409 UART: [kat] SHA2-384
1,913,482 UART: [kat] SHA2-512-ACC
1,915,869 UART: [kat] ECC-384
4,199,399 UART: [kat] HMAC-384Kdf
4,210,700 UART: [kat] LMS
5,400,802 UART: [kat] --
5,405,383 UART: [cold-reset] ++
5,406,606 UART: [fht] Storing FHT @ 0x50003400
5,417,239 UART: [idev] ++
5,417,812 UART: [idev] CDI.KEYID = 6
5,418,795 UART: [idev] SUBJECT.KEYID = 7
5,420,043 UART: [idev] UDS.KEYID = 0
5,420,970 ready_for_fw is high
5,421,178 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,564,084 UART: [idev] Erasing UDS.KEYID = 0
8,706,107 UART: [idev] Using Sha1 for KeyId Algorithm
8,727,589 UART: [idev] --
8,732,477 UART: [ldev] ++
8,733,106 UART: [ldev] CDI.KEYID = 6
8,734,018 UART: [ldev] SUBJECT.KEYID = 5
8,735,237 UART: [ldev] AUTHORITY.KEYID = 7
8,736,535 UART: [ldev] FE.KEYID = 1
8,749,511 UART: [ldev] Erasing FE.KEYID = 1
12,035,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,327,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,341,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,356,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,371,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,390,717 UART: [ldev] --
14,395,681 UART: [fwproc] Waiting for Commands...
14,397,400 UART: [fwproc] Received command 0x46574c44
14,399,640 UART: [fwproc] Received Image of size 113844 bytes
18,448,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,525,280 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,594,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
18,910,817 >>> mbox cmd response: success
18,911,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,915,177 UART: [afmc] ++
18,915,758 UART: [afmc] CDI.KEYID = 6
18,916,696 UART: [afmc] SUBJECT.KEYID = 7
18,917,973 UART: [afmc] AUTHORITY.KEYID = 5
22,241,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,535,100 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,537,356 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,551,743 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,566,595 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,581,025 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,601,715 UART: [afmc] --
24,606,008 UART: [cold-reset] --
24,608,473 UART: [state] Locking Datavault
24,614,744 UART: [state] Locking PCR0, PCR1 and PCR31
24,616,495 UART: [state] Locking ICCM
24,618,864 UART: [exit] Launching FMC @ 0x40000130
24,627,258 UART:
24,627,503 UART: Running Caliptra FMC ...
24,628,605 UART:
24,628,766 UART: [state] CFI Enabled
24,636,870 UART: [fht] FMC Alias Private Key: 7
26,967,907 UART: [art] Extend RT PCRs Done
26,969,124 UART: [art] Lock RT PCRs Done
26,970,694 UART: [art] Populate DV Done
26,976,284 UART: [fht] FMC Alias Private Key: 7
26,977,831 UART: [art] Derive CDI
26,978,653 UART: [art] Store in in slot 0x4
27,021,497 UART: [art] Derive Key Pair
27,022,498 UART: [art] Store priv key in slot 0x5
30,264,667 UART: [art] Derive Key Pair - Done
30,277,666 UART: [art] Signing Cert with AUTHO
30,278,963 UART: RITY.KEYID = 7
32,558,486 UART: [art] Erasing AUTHORITY.KEYID = 7
32,560,023 UART: [art] PUB.X = 0F69A17FE6209F52F6725E2A607EFAFF191B151063B0B04AA99E10E99E4678DD2AEDAE5CEA02193A6D4275025E962675
32,567,225 UART: [art] PUB.Y = 60EF2250D7CC23CC55B827B3A4FE615411495B8DB0BF5B787171496C1ECF791400E7B1A8F89DB4DF7EEFF50585FB4C58
32,574,477 UART: [art] SIG.R = F41F2EDE42984A8A601C1900FD436895F0BE3330AB6AA0F6CE606935C5638C2972A167C088EEB697C36ED59AF7D79F52
32,581,831 UART: [art] SIG.S = 8C3C38FE09BE7B9AA829150E8813F7CBACA652987E322872E9C4DFCA4B1DCE6FDAB567EFA44189A01941ED7086186445
33,886,185 UART: Caliptra RT
33,886,886 UART: [state] CFI Enabled
34,004,397 UART: [rt] RT listening for mailbox commands...
34,036,313 UART: [rt]cmd =0x4d454153, len=108
34,055,350 >>> mbox cmd response data (12 bytes)
34,055,896 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,086,422 UART: [rt]cmd =0x44504543, len=92
39,766,787 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,054 writing to cptra_bootfsm_go
190,185 UART:
190,473 UART: Running Caliptra ROM ...
191,586 UART:
2,013,289 UART: [state] CFI Enabled
2,027,934 UART: [state] LifecycleState = Unprovisioned
2,029,858 UART: [state] DebugLocked = No
2,032,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,037,303 UART: [kat] SHA2-256
2,207,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,217,623 UART: [kat] ++
2,218,164 UART: [kat] sha1
2,228,565 UART: [kat] SHA2-256
2,231,293 UART: [kat] SHA2-384
2,236,510 UART: [kat] SHA2-512-ACC
2,238,827 UART: [kat] ECC-384
4,521,813 UART: [kat] HMAC-384Kdf
4,531,833 UART: [kat] LMS
5,721,960 UART: [kat] --
5,726,406 UART: [cold-reset] ++
5,728,406 UART: [fht] Storing FHT @ 0x50003400
5,740,455 UART: [idev] ++
5,741,027 UART: [idev] CDI.KEYID = 6
5,741,940 UART: [idev] SUBJECT.KEYID = 7
5,743,189 UART: [idev] UDS.KEYID = 0
5,744,242 ready_for_fw is high
5,744,456 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,887,446 UART: [idev] Erasing UDS.KEYID = 0
9,030,672 UART: [idev] Using Sha1 for KeyId Algorithm
9,051,243 UART: [idev] --
9,054,973 UART: [ldev] ++
9,055,546 UART: [ldev] CDI.KEYID = 6
9,056,570 UART: [ldev] SUBJECT.KEYID = 5
9,057,747 UART: [ldev] AUTHORITY.KEYID = 7
9,058,909 UART: [ldev] FE.KEYID = 1
9,070,047 UART: [ldev] Erasing FE.KEYID = 1
12,358,558 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,650,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,665,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,680,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,694,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,713,537 UART: [ldev] --
14,718,616 UART: [fwproc] Waiting for Commands...
14,721,148 UART: [fwproc] Received command 0x46574c44
14,723,345 UART: [fwproc] Received Image of size 113844 bytes
18,769,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,852,277 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
18,921,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,237,990 >>> mbox cmd response: success
19,238,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,242,791 UART: [afmc] ++
19,243,433 UART: [afmc] CDI.KEYID = 6
19,244,351 UART: [afmc] SUBJECT.KEYID = 7
19,245,571 UART: [afmc] AUTHORITY.KEYID = 5
22,560,510 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,855,602 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,857,878 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
24,872,256 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
24,887,095 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
24,901,513 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
24,923,118 UART: [afmc] --
24,927,345 UART: [cold-reset] --
24,931,001 UART: [state] Locking Datavault
24,937,012 UART: [state] Locking PCR0, PCR1 and PCR31
24,938,712 UART: [state] Locking ICCM
24,940,185 UART: [exit] Launching FMC @ 0x40000130
24,948,578 UART:
24,948,821 UART: Running Caliptra FMC ...
24,949,925 UART:
24,950,088 UART: [state] CFI Enabled
24,958,244 UART: [fht] FMC Alias Private Key: 7
27,288,613 UART: [art] Extend RT PCRs Done
27,289,830 UART: [art] Lock RT PCRs Done
27,291,507 UART: [art] Populate DV Done
27,297,097 UART: [fht] FMC Alias Private Key: 7
27,298,641 UART: [art] Derive CDI
27,299,459 UART: [art] Store in in slot 0x4
27,341,622 UART: [art] Derive Key Pair
27,342,651 UART: [art] Store priv key in slot 0x5
30,585,271 UART: [art] Derive Key Pair - Done
30,597,990 UART: [art] Signing Cert with AUTHO
30,599,301 UART: RITY.KEYID = 7
32,878,704 UART: [art] Erasing AUTHORITY.KEYID = 7
32,880,221 UART: [art] PUB.X = 0F69A17FE6209F52F6725E2A607EFAFF191B151063B0B04AA99E10E99E4678DD2AEDAE5CEA02193A6D4275025E962675
32,887,427 UART: [art] PUB.Y = 60EF2250D7CC23CC55B827B3A4FE615411495B8DB0BF5B787171496C1ECF791400E7B1A8F89DB4DF7EEFF50585FB4C58
32,894,667 UART: [art] SIG.R = F41F2EDE42984A8A601C1900FD436895F0BE3330AB6AA0F6CE606935C5638C2972A167C088EEB697C36ED59AF7D79F52
32,902,023 UART: [art] SIG.S = 8C3C38FE09BE7B9AA829150E8813F7CBACA652987E322872E9C4DFCA4B1DCE6FDAB567EFA44189A01941ED7086186445
34,207,800 UART: Caliptra RT
34,208,516 UART: [state] CFI Enabled
34,325,419 UART: [rt] RT listening for mailbox commands...
34,357,336 UART: [rt]cmd =0x44504543, len=96
34,388,758 >>> mbox cmd response data (56 bytes)
34,389,682 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,420,230 UART: [rt]cmd =0x44504543, len=92
40,100,314 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 6.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
4,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,037,930 >>> mbox cmd response data (12 bytes)
13,039,215 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,207,572 >>> mbox cmd response: success
18,208,477 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,848,461 UART:
23,849,404 UART: Running Caliptra FMC ...
23,850,575 UART:
23,850,734 UART: [state] CFI Enabled
23,857,813 UART: [fht] FMC Alias Private Key: 7
26,188,410 UART: [art] Extend RT PCRs Done
26,189,647 UART: [art] Lock RT PCRs Done
26,191,301 UART: [art] Populate DV Done
26,196,563 UART: [fht] FMC Alias Private Key: 7
26,198,236 UART: [art] Derive CDI
26,199,056 UART: [art] Store in in slot 0x4
26,241,550 UART: [art] Derive Key Pair
26,242,551 UART: [art] Store priv key in slot 0x5
29,484,745 UART: [art] Derive Key Pair - Done
29,497,478 UART: [art] Signing Cert with AUTHO
29,498,788 UART: RITY.KEYID = 7
31,778,365 UART: [art] Erasing AUTHORITY.KEYID = 7
31,779,870 UART: [art] PUB.X = E53A49B317D14C07B62AFA9FC7293FEE6BC72061C1771DE2C10CF3E0D63EEAFA851199496715079FD7A7699F48608665
31,787,168 UART: [art] PUB.Y = 21C0FCF581616AC3216E23A2526A6E92DBCC547585F6AD1BFA79AE1B7A4B0D523472FDA6FB751F34CC09202546BCF991
31,794,369 UART: [art] SIG.R = 173261D8E4647289DFFE9A1356F56CB2BDC1087D572FF8F8B2B1D6A2652F53C9441EC05C6E7967EE0885D7A31E163DDE
31,801,766 UART: [art] SIG.S = 14FE9D91EC9BED03B5099DD89A757FBC969027FAA468B5BCA5BB9407B89A4708AC2DF5DCF11C7B4EC2CE0F9B24B7CB4E
33,107,122 UART: Caliptra RT
33,107,823 UART: [state] CFI Enabled
33,236,432 UART: [rt] RT listening for mailbox commands...
33,268,706 UART: [rt]cmd =0x44504543, len=92
38,948,335 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,105 writing to cptra_bootfsm_go
5,070,248 ready_for_fw is high
5,070,607 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,012,062 >>> mbox cmd response: success
19,012,485 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,657,046 UART:
24,657,362 UART: Running Caliptra FMC ...
24,658,436 UART:
24,658,595 UART: [state] CFI Enabled
24,666,814 UART: [fht] FMC Alias Private Key: 7
26,998,131 UART: [art] Extend RT PCRs Done
26,999,350 UART: [art] Lock RT PCRs Done
27,000,979 UART: [art] Populate DV Done
27,006,351 UART: [fht] FMC Alias Private Key: 7
27,007,965 UART: [art] Derive CDI
27,008,792 UART: [art] Store in in slot 0x4
27,051,072 UART: [art] Derive Key Pair
27,052,120 UART: [art] Store priv key in slot 0x5
30,294,587 UART: [art] Derive Key Pair - Done
30,307,578 UART: [art] Signing Cert with AUTHO
30,308,884 UART: RITY.KEYID = 7
32,588,173 UART: [art] Erasing AUTHORITY.KEYID = 7
32,589,685 UART: [art] PUB.X = E53A49B317D14C07B62AFA9FC7293FEE6BC72061C1771DE2C10CF3E0D63EEAFA851199496715079FD7A7699F48608665
32,596,942 UART: [art] PUB.Y = 21C0FCF581616AC3216E23A2526A6E92DBCC547585F6AD1BFA79AE1B7A4B0D523472FDA6FB751F34CC09202546BCF991
32,604,193 UART: [art] SIG.R = 173261D8E4647289DFFE9A1356F56CB2BDC1087D572FF8F8B2B1D6A2652F53C9441EC05C6E7967EE0885D7A31E163DDE
32,611,543 UART: [art] SIG.S = 14FE9D91EC9BED03B5099DD89A757FBC969027FAA468B5BCA5BB9407B89A4708AC2DF5DCF11C7B4EC2CE0F9B24B7CB4E
33,916,770 UART: Caliptra RT
33,917,473 UART: [state] CFI Enabled
34,035,306 UART: [rt] RT listening for mailbox commands...
34,067,315 UART: [rt]cmd =0x4d454153, len=108
34,085,291 >>> mbox cmd response data (12 bytes)
34,085,878 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,116,523 UART: [rt]cmd =0x44504543, len=92
39,797,155 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,061 writing to cptra_bootfsm_go
5,369,776 ready_for_fw is high
5,370,131 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,305,185 >>> mbox cmd response: success
19,305,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,946,950 UART:
24,947,298 UART: Running Caliptra FMC ...
24,948,375 UART:
24,948,531 UART: [state] CFI Enabled
24,956,631 UART: [fht] FMC Alias Private Key: 7
27,287,193 UART: [art] Extend RT PCRs Done
27,288,428 UART: [art] Lock RT PCRs Done
27,290,064 UART: [art] Populate DV Done
27,295,699 UART: [fht] FMC Alias Private Key: 7
27,297,233 UART: [art] Derive CDI
27,298,000 UART: [art] Store in in slot 0x4
27,340,695 UART: [art] Derive Key Pair
27,341,707 UART: [art] Store priv key in slot 0x5
30,583,991 UART: [art] Derive Key Pair - Done
30,596,929 UART: [art] Signing Cert with AUTHO
30,598,242 UART: RITY.KEYID = 7
32,877,216 UART: [art] Erasing AUTHORITY.KEYID = 7
32,878,723 UART: [art] PUB.X = E53A49B317D14C07B62AFA9FC7293FEE6BC72061C1771DE2C10CF3E0D63EEAFA851199496715079FD7A7699F48608665
32,885,924 UART: [art] PUB.Y = 21C0FCF581616AC3216E23A2526A6E92DBCC547585F6AD1BFA79AE1B7A4B0D523472FDA6FB751F34CC09202546BCF991
32,893,163 UART: [art] SIG.R = 173261D8E4647289DFFE9A1356F56CB2BDC1087D572FF8F8B2B1D6A2652F53C9441EC05C6E7967EE0885D7A31E163DDE
32,900,611 UART: [art] SIG.S = 14FE9D91EC9BED03B5099DD89A757FBC969027FAA468B5BCA5BB9407B89A4708AC2DF5DCF11C7B4EC2CE0F9B24B7CB4E
34,205,818 UART: Caliptra RT
34,206,542 UART: [state] CFI Enabled
34,323,767 UART: [rt] RT listening for mailbox commands...
34,355,917 UART: [rt]cmd =0x44504543, len=96
34,387,957 >>> mbox cmd response data (56 bytes)
34,388,781 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,419,267 UART: [rt]cmd =0x44504543, len=92
40,098,994 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 6.07s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,757,712 UART: [afmc] --
18,762,276 UART: [cold-reset] --
18,764,306 UART: [state] Locking Datavault
18,770,491 UART: [state] Locking PCR0, PCR1 and PCR31
18,772,139 UART: [state] Locking ICCM
18,773,780 UART: [exit] Launching FMC @ 0x40000130
18,782,186 UART:
18,782,465 UART: Running Caliptra FMC ...
18,783,495 UART:
18,783,641 UART: [state] CFI Enabled
18,845,702 UART: [fht] FMC Alias Private Key: 7
20,609,447 UART: [art] Extend RT PCRs Done
20,610,663 UART: [art] Lock RT PCRs Done
20,612,285 UART: [art] Populate DV Done
20,617,697 UART: [fht] FMC Alias Private Key: 7
20,619,260 UART: [art] Derive CDI
20,620,007 UART: [art] Store in in slot 0x4
20,678,987 UART: [art] Derive Key Pair
20,679,988 UART: [art] Store priv key in slot 0x5
23,142,550 UART: [art] Derive Key Pair - Done
23,155,498 UART: [art] Signing Cert with AUTHO
23,156,798 UART: RITY.KEYID = 7
24,868,374 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,914 UART: [art] PUB.X = 349FC5B5692DE6601B997EED2FABEA9CE539A46F05676EBD2B2CCEF51D514E0D2600288742302F56BFAA2FB7E3ADC2FE
24,877,123 UART: [art] PUB.Y = 24D5BA35BE8B1B8C27E5B37511E112F64142E75D565198F10706A1975DE31218DB26699B4DC4D425D2B2EC3D37A4F42E
24,884,382 UART: [art] SIG.R = FE99FB8328052B5D85DF3D452B8244C2B15664A55C7377EB9576264DBF1FE7924B27F73D64B1602CA5728B150E7DBCE5
24,891,794 UART: [art] SIG.S = 85F73D5D14903BCD24BB5DD343029FBCF5CC766B9A345AA770F38D1B38377533CE0913A7A08D7F60B3AC64DBA29EE883
25,870,951 UART: Caliptra RT
25,871,636 UART: [state] CFI Enabled
26,046,645 UART: [rt] RT listening for mailbox commands...
26,078,609 UART: [rt]cmd =0x44504543, len=92
30,429,292 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,109 writing to cptra_bootfsm_go
190,246 UART:
190,553 UART: Running Caliptra ROM ...
191,609 UART:
191,753 UART: [state] CFI Enabled
253,922 UART: [state] LifecycleState = Unprovisioned
255,780 UART: [state] DebugLocked = No
257,669 UART: [state] WD Timer not started. Device not locked for debugging
260,889 UART: [kat] SHA2-256
439,986 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
451,546 UART: [kat] ++
451,991 UART: [kat] sha1
462,720 UART: [kat] SHA2-256
465,726 UART: [kat] SHA2-384
471,513 UART: [kat] SHA2-512-ACC
474,525 UART: [kat] ECC-384
2,935,756 UART: [kat] HMAC-384Kdf
2,959,504 UART: [kat] LMS
3,488,777 UART: [kat] --
3,495,966 UART: [cold-reset] ++
3,496,978 UART: [fht] FHT @ 0x50003400
3,507,605 UART: [idev] ++
3,508,176 UART: [idev] CDI.KEYID = 6
3,509,088 UART: [idev] SUBJECT.KEYID = 7
3,510,265 UART: [idev] UDS.KEYID = 0
3,511,191 ready_for_fw is high
3,511,376 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,654,883 UART: [idev] Erasing UDS.KEYID = 0
6,015,715 UART: [idev] Sha1 KeyId Algorithm
6,038,793 UART: [idev] --
6,043,608 UART: [ldev] ++
6,044,189 UART: [ldev] CDI.KEYID = 6
6,045,079 UART: [ldev] SUBJECT.KEYID = 5
6,046,244 UART: [ldev] AUTHORITY.KEYID = 7
6,047,557 UART: [ldev] FE.KEYID = 1
6,088,278 UART: [ldev] Erasing FE.KEYID = 1
8,592,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,043 UART: [ldev] --
10,402,200 UART: [fwproc] Wait for Commands...
10,405,201 UART: [fwproc] Recv command 0x46574c44
10,407,312 UART: [fwproc] Recv'd Img size: 114168 bytes
13,809,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,139 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,264,555 >>> mbox cmd response: success
14,264,940 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,268,401 UART: [afmc] ++
14,268,981 UART: [afmc] CDI.KEYID = 6
14,269,893 UART: [afmc] SUBJECT.KEYID = 7
14,271,050 UART: [afmc] AUTHORITY.KEYID = 5
16,797,515 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,520,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,522,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,538,381 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,554,442 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,570,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,593,546 UART: [afmc] --
18,596,598 UART: [cold-reset] --
18,602,023 UART: [state] Locking Datavault
18,607,810 UART: [state] Locking PCR0, PCR1 and PCR31
18,609,459 UART: [state] Locking ICCM
18,611,884 UART: [exit] Launching FMC @ 0x40000130
18,620,299 UART:
18,620,538 UART: Running Caliptra FMC ...
18,621,642 UART:
18,621,801 UART: [state] CFI Enabled
18,678,997 UART: [fht] FMC Alias Private Key: 7
20,442,539 UART: [art] Extend RT PCRs Done
20,443,746 UART: [art] Lock RT PCRs Done
20,445,477 UART: [art] Populate DV Done
20,450,994 UART: [fht] FMC Alias Private Key: 7
20,452,646 UART: [art] Derive CDI
20,453,462 UART: [art] Store in in slot 0x4
20,512,220 UART: [art] Derive Key Pair
20,513,260 UART: [art] Store priv key in slot 0x5
22,976,651 UART: [art] Derive Key Pair - Done
22,989,534 UART: [art] Signing Cert with AUTHO
22,990,835 UART: RITY.KEYID = 7
24,702,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,703,598 UART: [art] PUB.X = 349FC5B5692DE6601B997EED2FABEA9CE539A46F05676EBD2B2CCEF51D514E0D2600288742302F56BFAA2FB7E3ADC2FE
24,710,862 UART: [art] PUB.Y = 24D5BA35BE8B1B8C27E5B37511E112F64142E75D565198F10706A1975DE31218DB26699B4DC4D425D2B2EC3D37A4F42E
24,718,169 UART: [art] SIG.R = FE99FB8328052B5D85DF3D452B8244C2B15664A55C7377EB9576264DBF1FE7924B27F73D64B1602CA5728B150E7DBCE5
24,725,553 UART: [art] SIG.S = 85F73D5D14903BCD24BB5DD343029FBCF5CC766B9A345AA770F38D1B38377533CE0913A7A08D7F60B3AC64DBA29EE883
25,705,124 UART: Caliptra RT
25,705,810 UART: [state] CFI Enabled
25,870,134 UART: [rt] RT listening for mailbox commands...
25,902,347 UART: [rt]cmd =0x4d454153, len=108
25,921,042 >>> mbox cmd response data (12 bytes)
25,921,595 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,952,073 UART: [rt]cmd =0x44504543, len=92
30,306,491 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,052 writing to cptra_bootfsm_go
190,173 UART:
190,481 UART: Running Caliptra ROM ...
191,512 UART:
191,653 UART: [state] CFI Enabled
253,468 UART: [state] LifecycleState = Unprovisioned
255,334 UART: [state] DebugLocked = No
257,784 UART: [state] WD Timer not started. Device not locked for debugging
261,066 UART: [kat] SHA2-256
440,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
451,783 UART: [kat] ++
452,228 UART: [kat] sha1
463,027 UART: [kat] SHA2-256
466,041 UART: [kat] SHA2-384
472,306 UART: [kat] SHA2-512-ACC
475,252 UART: [kat] ECC-384
2,936,974 UART: [kat] HMAC-384Kdf
2,959,654 UART: [kat] LMS
3,489,041 UART: [kat] --
3,496,190 UART: [cold-reset] ++
3,497,352 UART: [fht] FHT @ 0x50003400
3,508,003 UART: [idev] ++
3,508,618 UART: [idev] CDI.KEYID = 6
3,509,530 UART: [idev] SUBJECT.KEYID = 7
3,510,707 UART: [idev] UDS.KEYID = 0
3,511,615 ready_for_fw is high
3,511,800 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,655,158 UART: [idev] Erasing UDS.KEYID = 0
6,011,259 UART: [idev] Sha1 KeyId Algorithm
6,033,458 UART: [idev] --
6,036,104 UART: [ldev] ++
6,036,679 UART: [ldev] CDI.KEYID = 6
6,037,591 UART: [ldev] SUBJECT.KEYID = 5
6,038,756 UART: [ldev] AUTHORITY.KEYID = 7
6,040,067 UART: [ldev] FE.KEYID = 1
6,066,934 UART: [ldev] Erasing FE.KEYID = 1
8,572,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,308,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,324,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,340,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,356,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,377,453 UART: [ldev] --
10,381,909 UART: [fwproc] Wait for Commands...
10,384,114 UART: [fwproc] Recv command 0x46574c44
10,386,042 UART: [fwproc] Recv'd Img size: 114168 bytes
13,793,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,868,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,937,563 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,254,487 >>> mbox cmd response: success
14,254,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,258,543 UART: [afmc] ++
14,259,124 UART: [afmc] CDI.KEYID = 6
14,260,011 UART: [afmc] SUBJECT.KEYID = 7
14,261,227 UART: [afmc] AUTHORITY.KEYID = 5
16,793,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,518,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,520,681 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,536,488 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,552,513 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,568,345 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,590,837 UART: [afmc] --
18,594,262 UART: [cold-reset] --
18,597,359 UART: [state] Locking Datavault
18,603,092 UART: [state] Locking PCR0, PCR1 and PCR31
18,604,792 UART: [state] Locking ICCM
18,606,028 UART: [exit] Launching FMC @ 0x40000130
18,614,451 UART:
18,614,698 UART: Running Caliptra FMC ...
18,615,799 UART:
18,615,956 UART: [state] CFI Enabled
18,676,032 UART: [fht] FMC Alias Private Key: 7
20,440,499 UART: [art] Extend RT PCRs Done
20,441,712 UART: [art] Lock RT PCRs Done
20,443,199 UART: [art] Populate DV Done
20,448,773 UART: [fht] FMC Alias Private Key: 7
20,450,471 UART: [art] Derive CDI
20,451,210 UART: [art] Store in in slot 0x4
20,508,808 UART: [art] Derive Key Pair
20,509,848 UART: [art] Store priv key in slot 0x5
22,972,582 UART: [art] Derive Key Pair - Done
22,985,681 UART: [art] Signing Cert with AUTHO
22,986,988 UART: RITY.KEYID = 7
24,698,013 UART: [art] Erasing AUTHORITY.KEYID = 7
24,699,529 UART: [art] PUB.X = 349FC5B5692DE6601B997EED2FABEA9CE539A46F05676EBD2B2CCEF51D514E0D2600288742302F56BFAA2FB7E3ADC2FE
24,706,811 UART: [art] PUB.Y = 24D5BA35BE8B1B8C27E5B37511E112F64142E75D565198F10706A1975DE31218DB26699B4DC4D425D2B2EC3D37A4F42E
24,714,068 UART: [art] SIG.R = FE99FB8328052B5D85DF3D452B8244C2B15664A55C7377EB9576264DBF1FE7924B27F73D64B1602CA5728B150E7DBCE5
24,721,435 UART: [art] SIG.S = 85F73D5D14903BCD24BB5DD343029FBCF5CC766B9A345AA770F38D1B38377533CE0913A7A08D7F60B3AC64DBA29EE883
25,700,313 UART: Caliptra RT
25,701,020 UART: [state] CFI Enabled
25,865,089 UART: [rt] RT listening for mailbox commands...
25,896,936 UART: [rt]cmd =0x44504543, len=96
25,928,939 >>> mbox cmd response data (56 bytes)
25,929,812 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,960,350 UART: [rt]cmd =0x44504543, len=92
30,322,572 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,847 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,207,773 >>> mbox cmd response data (12 bytes)
10,208,774 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,222,781 >>> mbox cmd response: success
14,223,253 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,516,044 UART:
18,516,451 UART: Running Caliptra FMC ...
18,517,630 UART:
18,517,800 UART: [state] CFI Enabled
18,581,473 UART: [fht] FMC Alias Private Key: 7
20,345,399 UART: [art] Extend RT PCRs Done
20,346,621 UART: [art] Lock RT PCRs Done
20,348,358 UART: [art] Populate DV Done
20,353,618 UART: [fht] FMC Alias Private Key: 7
20,355,327 UART: [art] Derive CDI
20,356,147 UART: [art] Store in in slot 0x4
20,413,944 UART: [art] Derive Key Pair
20,415,015 UART: [art] Store priv key in slot 0x5
22,877,922 UART: [art] Derive Key Pair - Done
22,890,920 UART: [art] Signing Cert with AUTHO
22,892,225 UART: RITY.KEYID = 7
24,603,795 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,296 UART: [art] PUB.X = FCCDEA5026ED9E122E5356DF0F81EB1C04118395C6A1FC37A81CCF08B7956B490F83F8800FD8EE2979B036A90D48AECA
24,612,619 UART: [art] PUB.Y = 5FC65AA3ABC96A2A89B01F9EF9FFC0FB5065EE897713E09F8579D8F201587F724F34BEE318DB0356F66F72844BFC63F1
24,619,851 UART: [art] SIG.R = 808C4BE4C7A3877254CCAC0F257F84546F3438E5B370703659A1FDD73A9FBE26AB4745AE1D88FB481BF9E32C14BAE865
24,627,242 UART: [art] SIG.S = 89025B74914B67FBD4CC7BE5D9D11EBB863B5CBB9EF8DA2F4D5A9DBEFE2568C4648B9096001B6543D28C4D8536CE9C73
25,606,671 UART: Caliptra RT
25,607,376 UART: [state] CFI Enabled
25,784,272 UART: [rt] RT listening for mailbox commands...
25,816,602 UART: [rt]cmd =0x44504543, len=92
30,166,241 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,083 writing to cptra_bootfsm_go
3,370,091 ready_for_fw is high
3,370,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,071,030 >>> mbox cmd response: success
14,071,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,352,669 UART:
18,353,007 UART: Running Caliptra FMC ...
18,354,057 UART:
18,354,214 UART: [state] CFI Enabled
18,408,501 UART: [fht] FMC Alias Private Key: 7
20,172,644 UART: [art] Extend RT PCRs Done
20,173,889 UART: [art] Lock RT PCRs Done
20,175,762 UART: [art] Populate DV Done
20,181,067 UART: [fht] FMC Alias Private Key: 7
20,182,566 UART: [art] Derive CDI
20,183,334 UART: [art] Store in in slot 0x4
20,240,568 UART: [art] Derive Key Pair
20,241,568 UART: [art] Store priv key in slot 0x5
22,705,795 UART: [art] Derive Key Pair - Done
22,718,900 UART: [art] Signing Cert with AUTHO
22,720,212 UART: RITY.KEYID = 7
24,432,289 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,818 UART: [art] PUB.X = FCCDEA5026ED9E122E5356DF0F81EB1C04118395C6A1FC37A81CCF08B7956B490F83F8800FD8EE2979B036A90D48AECA
24,441,063 UART: [art] PUB.Y = 5FC65AA3ABC96A2A89B01F9EF9FFC0FB5065EE897713E09F8579D8F201587F724F34BEE318DB0356F66F72844BFC63F1
24,448,362 UART: [art] SIG.R = 808C4BE4C7A3877254CCAC0F257F84546F3438E5B370703659A1FDD73A9FBE26AB4745AE1D88FB481BF9E32C14BAE865
24,455,755 UART: [art] SIG.S = 89025B74914B67FBD4CC7BE5D9D11EBB863B5CBB9EF8DA2F4D5A9DBEFE2568C4648B9096001B6543D28C4D8536CE9C73
25,434,711 UART: Caliptra RT
25,435,425 UART: [state] CFI Enabled
25,599,683 UART: [rt] RT listening for mailbox commands...
25,631,686 UART: [rt]cmd =0x4d454153, len=108
25,650,640 >>> mbox cmd response data (12 bytes)
25,651,279 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,681,892 UART: [rt]cmd =0x44504543, len=92
30,036,324 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,121 writing to cptra_bootfsm_go
3,368,408 ready_for_fw is high
3,368,772 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,163 >>> mbox cmd response: success
14,068,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,350,595 UART:
18,350,928 UART: Running Caliptra FMC ...
18,352,021 UART:
18,352,180 UART: [state] CFI Enabled
18,421,484 UART: [fht] FMC Alias Private Key: 7
20,185,249 UART: [art] Extend RT PCRs Done
20,186,463 UART: [art] Lock RT PCRs Done
20,188,091 UART: [art] Populate DV Done
20,193,405 UART: [fht] FMC Alias Private Key: 7
20,194,987 UART: [art] Derive CDI
20,195,811 UART: [art] Store in in slot 0x4
20,254,180 UART: [art] Derive Key Pair
20,255,171 UART: [art] Store priv key in slot 0x5
22,718,641 UART: [art] Derive Key Pair - Done
22,731,468 UART: [art] Signing Cert with AUTHO
22,732,767 UART: RITY.KEYID = 7
24,444,000 UART: [art] Erasing AUTHORITY.KEYID = 7
24,445,509 UART: [art] PUB.X = FCCDEA5026ED9E122E5356DF0F81EB1C04118395C6A1FC37A81CCF08B7956B490F83F8800FD8EE2979B036A90D48AECA
24,452,831 UART: [art] PUB.Y = 5FC65AA3ABC96A2A89B01F9EF9FFC0FB5065EE897713E09F8579D8F201587F724F34BEE318DB0356F66F72844BFC63F1
24,460,068 UART: [art] SIG.R = 808C4BE4C7A3877254CCAC0F257F84546F3438E5B370703659A1FDD73A9FBE26AB4745AE1D88FB481BF9E32C14BAE865
24,467,460 UART: [art] SIG.S = 89025B74914B67FBD4CC7BE5D9D11EBB863B5CBB9EF8DA2F4D5A9DBEFE2568C4648B9096001B6543D28C4D8536CE9C73
25,446,221 UART: Caliptra RT
25,446,914 UART: [state] CFI Enabled
25,611,884 UART: [rt] RT listening for mailbox commands...
25,643,928 UART: [rt]cmd =0x44504543, len=96
25,676,077 >>> mbox cmd response data (56 bytes)
25,676,857 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,707,448 UART: [rt]cmd =0x44504543, len=92
30,071,253 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.63s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,934,145 UART: [afmc] --
18,937,749 UART: [cold-reset] --
18,943,032 UART: [state] Locking Datavault
18,948,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,949,776 UART: [state] Locking ICCM
18,950,990 UART: [exit] Launching FMC @ 0x40000130
18,959,436 UART:
18,959,670 UART: Running Caliptra FMC ...
18,960,773 UART:
18,960,929 UART: [state] CFI Enabled
18,968,924 UART: [fht] FMC Alias Private Key: 7
20,725,884 UART: [art] Extend RT PCRs Done
20,727,103 UART: [art] Lock RT PCRs Done
20,728,838 UART: [art] Populate DV Done
20,734,307 UART: [fht] FMC Alias Private Key: 7
20,735,951 UART: [art] Derive CDI
20,736,764 UART: [art] Store in in slot 0x4
20,779,014 UART: [art] Derive Key Pair
20,780,066 UART: [art] Store priv key in slot 0x5
23,207,012 UART: [art] Derive Key Pair - Done
23,220,079 UART: [art] Signing Cert with AUTHO
23,221,393 UART: RITY.KEYID = 7
24,926,764 UART: [art] Erasing AUTHORITY.KEYID = 7
24,928,269 UART: [art] PUB.X = 35E6DBF72477E513810CDF547D754A360366C57454E28052C047A26E019FF5758FBF7398A1535FDFC48606F3C2CA4CF2
24,935,517 UART: [art] PUB.Y = BA5C409010DC188D76179CBBABFE2540F8C42EBD6BF3DF8A04FB503AC1FB49CBE559DC4E1BE902F1592B81B442DF1E45
24,942,819 UART: [art] SIG.R = 0161627A348E56F04FDE7F7530D1DC3B76060942306837649BEB961E28CADC9DBDAA7A622EBEDCB15201852E229D1671
24,950,215 UART: [art] SIG.S = 7D147125F7458F2B671CB87470EBA9B62916857AB42F60FC53449C546E94B3F746B437A2996E723536E07C4EB4AECE9B
25,929,174 UART: Caliptra RT
25,929,882 UART: [state] CFI Enabled
26,058,740 UART: [rt] RT listening for mailbox commands...
26,091,024 UART: [rt]cmd =0x44504543, len=92
30,381,532 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,094 writing to cptra_bootfsm_go
190,249 UART:
190,535 UART: Running Caliptra ROM ...
191,563 UART:
10,114,902 UART: [state] CFI Enabled
10,125,712 UART: [state] LifecycleState = Unprovisioned
10,127,558 UART: [state] DebugLocked = No
10,129,445 UART: [state] WD Timer not started. Device not locked for debugging
10,133,656 UART: [kat] SHA2-256
10,312,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,324,382 UART: [kat] ++
10,324,925 UART: [kat] sha1
10,335,676 UART: [kat] SHA2-256
10,338,757 UART: [kat] SHA2-384
10,344,183 UART: [kat] SHA2-512-ACC
10,347,137 UART: [kat] ECC-384
12,787,692 UART: [kat] HMAC-384Kdf
12,799,993 UART: [kat] LMS
13,329,501 UART: [kat] --
13,333,878 UART: [cold-reset] ++
13,336,092 UART: [fht] FHT @ 0x50003400
13,346,152 UART: [idev] ++
13,346,724 UART: [idev] CDI.KEYID = 6
13,347,639 UART: [idev] SUBJECT.KEYID = 7
13,348,816 UART: [idev] UDS.KEYID = 0
13,349,743 ready_for_fw is high
13,349,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,493,244 UART: [idev] Erasing UDS.KEYID = 0
15,822,944 UART: [idev] Sha1 KeyId Algorithm
15,846,005 UART: [idev] --
15,849,514 UART: [ldev] ++
15,850,082 UART: [ldev] CDI.KEYID = 6
15,850,995 UART: [ldev] SUBJECT.KEYID = 5
15,852,171 UART: [ldev] AUTHORITY.KEYID = 7
15,853,402 UART: [ldev] FE.KEYID = 1
15,864,345 UART: [ldev] Erasing FE.KEYID = 1
18,341,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,060,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,076,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,092,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,107,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,129,289 UART: [ldev] --
20,133,111 UART: [fwproc] Wait for Commands...
20,136,124 UART: [fwproc] Recv command 0x46574c44
20,138,228 UART: [fwproc] Recv'd Img size: 114168 bytes
23,550,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,618,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,687,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
24,005,120 >>> mbox cmd response: success
24,005,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,009,855 UART: [afmc] ++
24,010,440 UART: [afmc] CDI.KEYID = 6
24,011,357 UART: [afmc] SUBJECT.KEYID = 7
24,012,518 UART: [afmc] AUTHORITY.KEYID = 5
26,513,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,236,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,237,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,253,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,269,730 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,285,634 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,308,699 UART: [afmc] --
28,311,801 UART: [cold-reset] --
28,314,365 UART: [state] Locking Datavault
28,320,854 UART: [state] Locking PCR0, PCR1 and PCR31
28,322,552 UART: [state] Locking ICCM
28,324,239 UART: [exit] Launching FMC @ 0x40000130
28,332,634 UART:
28,332,869 UART: Running Caliptra FMC ...
28,333,968 UART:
28,334,124 UART: [state] CFI Enabled
28,342,170 UART: [fht] FMC Alias Private Key: 7
30,098,704 UART: [art] Extend RT PCRs Done
30,099,930 UART: [art] Lock RT PCRs Done
30,101,286 UART: [art] Populate DV Done
30,106,751 UART: [fht] FMC Alias Private Key: 7
30,108,235 UART: [art] Derive CDI
30,108,990 UART: [art] Store in in slot 0x4
30,151,743 UART: [art] Derive Key Pair
30,152,783 UART: [art] Store priv key in slot 0x5
32,579,310 UART: [art] Derive Key Pair - Done
32,592,030 UART: [art] Signing Cert with AUTHO
32,593,359 UART: RITY.KEYID = 7
34,298,418 UART: [art] Erasing AUTHORITY.KEYID = 7
34,299,933 UART: [art] PUB.X = 35E6DBF72477E513810CDF547D754A360366C57454E28052C047A26E019FF5758FBF7398A1535FDFC48606F3C2CA4CF2
34,307,192 UART: [art] PUB.Y = BA5C409010DC188D76179CBBABFE2540F8C42EBD6BF3DF8A04FB503AC1FB49CBE559DC4E1BE902F1592B81B442DF1E45
34,314,488 UART: [art] SIG.R = 0161627A348E56F04FDE7F7530D1DC3B76060942306837649BEB961E28CADC9DBDAA7A622EBEDCB15201852E229D1671
34,321,881 UART: [art] SIG.S = 7D147125F7458F2B671CB87470EBA9B62916857AB42F60FC53449C546E94B3F746B437A2996E723536E07C4EB4AECE9B
35,301,017 UART: Caliptra RT
35,301,727 UART: [state] CFI Enabled
35,418,318 UART: [rt] RT listening for mailbox commands...
35,450,658 UART: [rt]cmd =0x4d454153, len=108
35,469,321 >>> mbox cmd response data (12 bytes)
35,469,812 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,500,688 UART: [rt]cmd =0x44504543, len=92
39,791,167 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,024 writing to cptra_bootfsm_go
190,183 UART:
190,484 UART: Running Caliptra ROM ...
191,599 UART:
10,412,956 UART: [state] CFI Enabled
10,426,159 UART: [state] LifecycleState = Unprovisioned
10,428,008 UART: [state] DebugLocked = No
10,429,973 UART: [state] WD Timer not started. Device not locked for debugging
10,433,487 UART: [kat] SHA2-256
10,612,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,624,204 UART: [kat] ++
10,624,744 UART: [kat] sha1
10,634,998 UART: [kat] SHA2-256
10,638,009 UART: [kat] SHA2-384
10,642,946 UART: [kat] SHA2-512-ACC
10,645,901 UART: [kat] ECC-384
13,088,569 UART: [kat] HMAC-384Kdf
13,101,265 UART: [kat] LMS
13,630,790 UART: [kat] --
13,636,556 UART: [cold-reset] ++
13,638,480 UART: [fht] FHT @ 0x50003400
13,649,608 UART: [idev] ++
13,650,175 UART: [idev] CDI.KEYID = 6
13,651,208 UART: [idev] SUBJECT.KEYID = 7
13,652,311 UART: [idev] UDS.KEYID = 0
13,653,243 ready_for_fw is high
13,653,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,796,790 UART: [idev] Erasing UDS.KEYID = 0
16,122,905 UART: [idev] Sha1 KeyId Algorithm
16,144,934 UART: [idev] --
16,149,223 UART: [ldev] ++
16,149,796 UART: [ldev] CDI.KEYID = 6
16,150,705 UART: [ldev] SUBJECT.KEYID = 5
16,151,884 UART: [ldev] AUTHORITY.KEYID = 7
16,153,116 UART: [ldev] FE.KEYID = 1
16,162,683 UART: [ldev] Erasing FE.KEYID = 1
18,636,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,356,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,372,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,387,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,403,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,425,220 UART: [ldev] --
20,429,242 UART: [fwproc] Wait for Commands...
20,432,038 UART: [fwproc] Recv command 0x46574c44
20,434,144 UART: [fwproc] Recv'd Img size: 114168 bytes
23,836,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,910,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,978,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
24,295,758 >>> mbox cmd response: success
24,296,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,299,320 UART: [afmc] ++
24,299,905 UART: [afmc] CDI.KEYID = 6
24,300,819 UART: [afmc] SUBJECT.KEYID = 7
24,302,037 UART: [afmc] AUTHORITY.KEYID = 5
26,801,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,523,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,525,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,541,451 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,557,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,573,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,597,470 UART: [afmc] --
28,601,874 UART: [cold-reset] --
28,604,382 UART: [state] Locking Datavault
28,610,055 UART: [state] Locking PCR0, PCR1 and PCR31
28,611,697 UART: [state] Locking ICCM
28,613,433 UART: [exit] Launching FMC @ 0x40000130
28,621,818 UART:
28,622,067 UART: Running Caliptra FMC ...
28,623,168 UART:
28,623,327 UART: [state] CFI Enabled
28,631,539 UART: [fht] FMC Alias Private Key: 7
30,388,488 UART: [art] Extend RT PCRs Done
30,389,686 UART: [art] Lock RT PCRs Done
30,391,248 UART: [art] Populate DV Done
30,396,654 UART: [fht] FMC Alias Private Key: 7
30,398,203 UART: [art] Derive CDI
30,399,022 UART: [art] Store in in slot 0x4
30,441,779 UART: [art] Derive Key Pair
30,442,777 UART: [art] Store priv key in slot 0x5
32,869,772 UART: [art] Derive Key Pair - Done
32,882,636 UART: [art] Signing Cert with AUTHO
32,883,957 UART: RITY.KEYID = 7
34,589,039 UART: [art] Erasing AUTHORITY.KEYID = 7
34,590,539 UART: [art] PUB.X = 35E6DBF72477E513810CDF547D754A360366C57454E28052C047A26E019FF5758FBF7398A1535FDFC48606F3C2CA4CF2
34,597,844 UART: [art] PUB.Y = BA5C409010DC188D76179CBBABFE2540F8C42EBD6BF3DF8A04FB503AC1FB49CBE559DC4E1BE902F1592B81B442DF1E45
34,605,132 UART: [art] SIG.R = 0161627A348E56F04FDE7F7530D1DC3B76060942306837649BEB961E28CADC9DBDAA7A622EBEDCB15201852E229D1671
34,612,532 UART: [art] SIG.S = 7D147125F7458F2B671CB87470EBA9B62916857AB42F60FC53449C546E94B3F746B437A2996E723536E07C4EB4AECE9B
35,590,984 UART: Caliptra RT
35,591,697 UART: [state] CFI Enabled
35,709,191 UART: [rt] RT listening for mailbox commands...
35,741,228 UART: [rt]cmd =0x44504543, len=96
35,771,971 >>> mbox cmd response data (56 bytes)
35,772,814 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,803,246 UART: [rt]cmd =0x44504543, len=92
40,094,462 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 5.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,966 writing to cptra_bootfsm_go
4,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,413,626 >>> mbox cmd response data (12 bytes)
10,414,459 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,419,279 >>> mbox cmd response: success
14,419,728 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,671,393 UART:
18,671,790 UART: Running Caliptra FMC ...
18,673,022 UART:
18,673,200 UART: [state] CFI Enabled
18,681,182 UART: [fht] FMC Alias Private Key: 7
20,438,093 UART: [art] Extend RT PCRs Done
20,439,319 UART: [art] Lock RT PCRs Done
20,441,301 UART: [art] Populate DV Done
20,446,516 UART: [fht] FMC Alias Private Key: 7
20,448,058 UART: [art] Derive CDI
20,448,798 UART: [art] Store in in slot 0x4
20,490,962 UART: [art] Derive Key Pair
20,491,998 UART: [art] Store priv key in slot 0x5
22,919,484 UART: [art] Derive Key Pair - Done
22,932,317 UART: [art] Signing Cert with AUTHO
22,933,618 UART: RITY.KEYID = 7
24,639,328 UART: [art] Erasing AUTHORITY.KEYID = 7
24,640,851 UART: [art] PUB.X = F3EC4869DFC258EED2B0F381AB99DB1755B435D435E55E166E2C1BAB97603CBCA826051420D0FCD7D906F6EB1CE2B8D6
24,648,100 UART: [art] PUB.Y = 3C4F65FCED3A6B7184F8544A90929A8B39E549C1407C35314E09513FADB6A4FCFC140DB6B6E0ABB42B9323917A979604
24,655,394 UART: [art] SIG.R = 72F6132B94257F1D988FF1DC79156687EAB56DED61F3BE1A437651781D468E4D996DB8A1F82E5DA0A5D4CE5B15EB7BD0
24,662,794 UART: [art] SIG.S = 5D9C0CF3DA9F4DAB72C69ED89A050846FD9FB428CEB69E177EF913A7A1102D3020827B999E5649BA8D66B784D83C59A5
25,641,373 UART: Caliptra RT
25,642,087 UART: [state] CFI Enabled
25,771,310 UART: [rt] RT listening for mailbox commands...
25,803,004 UART: [rt]cmd =0x44504543, len=92
30,093,764 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,106 writing to cptra_bootfsm_go
13,493,741 ready_for_fw is high
13,494,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,067,818 >>> mbox cmd response: success
24,068,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,318,679 UART:
28,319,028 UART: Running Caliptra FMC ...
28,320,166 UART:
28,320,339 UART: [state] CFI Enabled
28,328,235 UART: [fht] FMC Alias Private Key: 7
30,084,807 UART: [art] Extend RT PCRs Done
30,086,157 UART: [art] Lock RT PCRs Done
30,087,692 UART: [art] Populate DV Done
30,092,972 UART: [fht] FMC Alias Private Key: 7
30,094,623 UART: [art] Derive CDI
30,095,444 UART: [art] Store in in slot 0x4
30,138,048 UART: [art] Derive Key Pair
30,139,093 UART: [art] Store priv key in slot 0x5
32,565,562 UART: [art] Derive Key Pair - Done
32,578,453 UART: [art] Signing Cert with AUTHO
32,579,765 UART: RITY.KEYID = 7
34,285,263 UART: [art] Erasing AUTHORITY.KEYID = 7
34,286,795 UART: [art] PUB.X = F3EC4869DFC258EED2B0F381AB99DB1755B435D435E55E166E2C1BAB97603CBCA826051420D0FCD7D906F6EB1CE2B8D6
34,294,043 UART: [art] PUB.Y = 3C4F65FCED3A6B7184F8544A90929A8B39E549C1407C35314E09513FADB6A4FCFC140DB6B6E0ABB42B9323917A979604
34,301,339 UART: [art] SIG.R = 72F6132B94257F1D988FF1DC79156687EAB56DED61F3BE1A437651781D468E4D996DB8A1F82E5DA0A5D4CE5B15EB7BD0
34,308,730 UART: [art] SIG.S = 5D9C0CF3DA9F4DAB72C69ED89A050846FD9FB428CEB69E177EF913A7A1102D3020827B999E5649BA8D66B784D83C59A5
35,288,371 UART: Caliptra RT
35,289,090 UART: [state] CFI Enabled
35,406,763 UART: [rt] RT listening for mailbox commands...
35,438,562 UART: [rt]cmd =0x4d454153, len=108
35,457,762 >>> mbox cmd response data (12 bytes)
35,458,284 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,488,814 UART: [rt]cmd =0x44504543, len=92
39,779,385 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,107 writing to cptra_bootfsm_go
13,790,276 ready_for_fw is high
13,790,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,369,992 >>> mbox cmd response: success
24,371,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,617,855 UART:
28,618,629 UART: Running Caliptra FMC ...
28,619,683 UART:
28,619,837 UART: [state] CFI Enabled
28,627,385 UART: [fht] FMC Alias Private Key: 7
30,384,187 UART: [art] Extend RT PCRs Done
30,385,645 UART: [art] Lock RT PCRs Done
30,386,900 UART: [art] Populate DV Done
30,392,317 UART: [fht] FMC Alias Private Key: 7
30,393,949 UART: [art] Derive CDI
30,394,733 UART: [art] Store in in slot 0x4
30,437,230 UART: [art] Derive Key Pair
30,438,238 UART: [art] Store priv key in slot 0x5
32,865,508 UART: [art] Derive Key Pair - Done
32,878,535 UART: [art] Signing Cert with AUTHO
32,879,835 UART: RITY.KEYID = 7
34,584,966 UART: [art] Erasing AUTHORITY.KEYID = 7
34,586,474 UART: [art] PUB.X = F3EC4869DFC258EED2B0F381AB99DB1755B435D435E55E166E2C1BAB97603CBCA826051420D0FCD7D906F6EB1CE2B8D6
34,593,722 UART: [art] PUB.Y = 3C4F65FCED3A6B7184F8544A90929A8B39E549C1407C35314E09513FADB6A4FCFC140DB6B6E0ABB42B9323917A979604
34,601,002 UART: [art] SIG.R = 72F6132B94257F1D988FF1DC79156687EAB56DED61F3BE1A437651781D468E4D996DB8A1F82E5DA0A5D4CE5B15EB7BD0
34,608,406 UART: [art] SIG.S = 5D9C0CF3DA9F4DAB72C69ED89A050846FD9FB428CEB69E177EF913A7A1102D3020827B999E5649BA8D66B784D83C59A5
35,587,306 UART: Caliptra RT
35,588,018 UART: [state] CFI Enabled
35,705,137 UART: [rt] RT listening for mailbox commands...
35,737,332 UART: [rt]cmd =0x44504543, len=96
35,768,929 >>> mbox cmd response data (56 bytes)
35,769,950 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,800,333 UART: [rt]cmd =0x44504543, len=92
40,090,652 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 5.62s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,091,077 UART: [afmc] --
19,094,246 UART: [cold-reset] --
19,097,897 UART: [state] Locking Datavault
19,103,965 UART: [state] Locking PCR0, PCR1 and PCR31
19,106,107 UART: [state] Locking ICCM
19,108,625 UART: [exit] Launching FMC @ 0x40000130
19,117,299 UART:
19,117,541 UART: Running Caliptra FMC ...
19,118,643 UART:
19,118,802 UART: [state] CFI Enabled
19,176,009 UART: [fht] FMC Alias Private Key: 7
20,939,771 UART: [art] Extend RT PCRs Done
20,940,991 UART: [art] Lock RT PCRs Done
20,942,778 UART: [art] Populate DV Done
20,948,353 UART: [fht] FMC Alias Private Key: 7
20,949,891 UART: [art] Derive CDI
20,950,655 UART: [art] Store in in slot 0x4
21,008,587 UART: [art] Derive Key Pair
21,009,632 UART: [art] Store priv key in slot 0x5
23,472,302 UART: [art] Derive Key Pair - Done
23,485,407 UART: [art] Signing Cert with AUTHO
23,486,712 UART: RITY.KEYID = 7
25,198,843 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,351 UART: [art] PUB.X = A8BA60912438882FC0745D9B03A314894437213FD78112DD377F51DD979CAF1F8D7AF9C98EBE0F1B420FF3FFFE4107B3
25,207,630 UART: [art] PUB.Y = C2E7BC028C356DBECE9BE3941AE2D7587CB8E6A7DB2F21E728CEB0A6F3AB1E6EAF37E289D856153A9EEE7A387875E768
25,214,887 UART: [art] SIG.R = 615D986C64A80977AE7C01426B0EFF551FD8D15AAACE0909DF05ABED837F1997EF0DDEA8FA034BA582963F7EB132699C
25,222,307 UART: [art] SIG.S = B2E2AD868B689F29FF5979DB6EB61C0A130662819B2A762BD5A365EE28BEAFC7E2903FD3D64DE1C11F98636B4A8BE5D0
26,201,058 UART: Caliptra RT
26,201,771 UART: [state] CFI Enabled
26,380,007 UART: [rt] RT listening for mailbox commands...
26,412,013 UART: [rt]cmd =0x44504543, len=92
30,761,086 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,125 writing to cptra_bootfsm_go
190,239 UART:
190,535 UART: Running Caliptra ROM ...
191,567 UART:
191,707 UART: [state] CFI Enabled
251,874 UART: [state] LifecycleState = Unprovisioned
254,273 UART: [state] DebugLocked = No
256,604 UART: [state] WD Timer not started. Device not locked for debugging
260,937 UART: [kat] SHA2-256
450,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,604 UART: [kat] ++
462,049 UART: [kat] sha1
474,084 UART: [kat] SHA2-256
477,104 UART: [kat] SHA2-384
483,668 UART: [kat] SHA2-512-ACC
486,258 UART: [kat] ECC-384
2,935,518 UART: [kat] HMAC-384Kdf
2,959,472 UART: [kat] LMS
3,491,246 UART: [kat] --
3,494,706 UART: [cold-reset] ++
3,497,073 UART: [fht] FHT @ 0x50003400
3,508,131 UART: [idev] ++
3,508,855 UART: [idev] CDI.KEYID = 6
3,509,893 UART: [idev] SUBJECT.KEYID = 7
3,510,994 UART: [idev] UDS.KEYID = 0
3,511,923 ready_for_fw is high
3,512,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,655,626 UART: [idev] Erasing UDS.KEYID = 0
6,014,903 UART: [idev] Sha1 KeyId Algorithm
6,036,421 UART: [idev] --
6,040,698 UART: [ldev] ++
6,041,386 UART: [ldev] CDI.KEYID = 6
6,042,307 UART: [ldev] SUBJECT.KEYID = 5
6,043,470 UART: [ldev] AUTHORITY.KEYID = 7
6,044,705 UART: [ldev] FE.KEYID = 1
6,086,366 UART: [ldev] Erasing FE.KEYID = 1
8,595,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,528 UART: [ldev] --
10,391,336 UART: [fwproc] Wait for Commands...
10,393,005 UART: [fwproc] Recv command 0x46574c44
10,395,299 UART: [fwproc] Recv'd Img size: 114168 bytes
13,840,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,688 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,031,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,572,853 >>> mbox cmd response: success
14,573,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,576,688 UART: [afmc] ++
14,577,410 UART: [afmc] CDI.KEYID = 6
14,578,657 UART: [afmc] SUBJECT.KEYID = 7
14,580,091 UART: [afmc] AUTHORITY.KEYID = 5
17,107,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,831,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,833,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,848,903 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,864,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,879,054 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,904,340 UART: [afmc] --
18,907,336 UART: [cold-reset] --
18,911,805 UART: [state] Locking Datavault
18,917,175 UART: [state] Locking PCR0, PCR1 and PCR31
18,919,376 UART: [state] Locking ICCM
18,921,971 UART: [exit] Launching FMC @ 0x40000130
18,930,650 UART:
18,930,884 UART: Running Caliptra FMC ...
18,931,987 UART:
18,932,149 UART: [state] CFI Enabled
18,989,188 UART: [fht] FMC Alias Private Key: 7
20,752,843 UART: [art] Extend RT PCRs Done
20,754,063 UART: [art] Lock RT PCRs Done
20,755,803 UART: [art] Populate DV Done
20,761,269 UART: [fht] FMC Alias Private Key: 7
20,762,750 UART: [art] Derive CDI
20,763,536 UART: [art] Store in in slot 0x4
20,822,471 UART: [art] Derive Key Pair
20,823,500 UART: [art] Store priv key in slot 0x5
23,286,062 UART: [art] Derive Key Pair - Done
23,298,946 UART: [art] Signing Cert with AUTHO
23,300,270 UART: RITY.KEYID = 7
25,012,442 UART: [art] Erasing AUTHORITY.KEYID = 7
25,013,951 UART: [art] PUB.X = A8BA60912438882FC0745D9B03A314894437213FD78112DD377F51DD979CAF1F8D7AF9C98EBE0F1B420FF3FFFE4107B3
25,021,169 UART: [art] PUB.Y = C2E7BC028C356DBECE9BE3941AE2D7587CB8E6A7DB2F21E728CEB0A6F3AB1E6EAF37E289D856153A9EEE7A387875E768
25,028,487 UART: [art] SIG.R = 615D986C64A80977AE7C01426B0EFF551FD8D15AAACE0909DF05ABED837F1997EF0DDEA8FA034BA582963F7EB132699C
25,035,902 UART: [art] SIG.S = B2E2AD868B689F29FF5979DB6EB61C0A130662819B2A762BD5A365EE28BEAFC7E2903FD3D64DE1C11F98636B4A8BE5D0
26,014,644 UART: Caliptra RT
26,015,333 UART: [state] CFI Enabled
26,179,511 UART: [rt] RT listening for mailbox commands...
26,211,874 UART: [rt]cmd =0x4d454153, len=108
26,230,925 >>> mbox cmd response data (12 bytes)
26,231,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,262,218 UART: [rt]cmd =0x44504543, len=92
30,614,610 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,080 writing to cptra_bootfsm_go
190,195 UART:
190,491 UART: Running Caliptra ROM ...
191,524 UART:
191,665 UART: [state] CFI Enabled
248,495 UART: [state] LifecycleState = Unprovisioned
250,831 UART: [state] DebugLocked = No
253,452 UART: [state] WD Timer not started. Device not locked for debugging
258,491 UART: [kat] SHA2-256
448,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,099 UART: [kat] ++
459,550 UART: [kat] sha1
472,509 UART: [kat] SHA2-256
475,528 UART: [kat] SHA2-384
480,531 UART: [kat] SHA2-512-ACC
483,116 UART: [kat] ECC-384
2,935,787 UART: [kat] HMAC-384Kdf
2,958,741 UART: [kat] LMS
3,490,559 UART: [kat] --
3,493,147 UART: [cold-reset] ++
3,494,655 UART: [fht] FHT @ 0x50003400
3,506,210 UART: [idev] ++
3,506,922 UART: [idev] CDI.KEYID = 6
3,507,876 UART: [idev] SUBJECT.KEYID = 7
3,509,051 UART: [idev] UDS.KEYID = 0
3,509,960 ready_for_fw is high
3,510,150 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,653,645 UART: [idev] Erasing UDS.KEYID = 0
6,014,134 UART: [idev] Sha1 KeyId Algorithm
6,035,770 UART: [idev] --
6,040,906 UART: [ldev] ++
6,041,596 UART: [ldev] CDI.KEYID = 6
6,042,663 UART: [ldev] SUBJECT.KEYID = 5
6,043,777 UART: [ldev] AUTHORITY.KEYID = 7
6,044,957 UART: [ldev] FE.KEYID = 1
6,084,678 UART: [ldev] Erasing FE.KEYID = 1
8,591,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,427 UART: [ldev] --
10,398,313 UART: [fwproc] Wait for Commands...
10,400,085 UART: [fwproc] Recv command 0x46574c44
10,402,379 UART: [fwproc] Recv'd Img size: 114168 bytes
13,840,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,918,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,034,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,576,994 >>> mbox cmd response: success
14,577,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,580,244 UART: [afmc] ++
14,580,992 UART: [afmc] CDI.KEYID = 6
14,582,186 UART: [afmc] SUBJECT.KEYID = 7
14,583,625 UART: [afmc] AUTHORITY.KEYID = 5
17,113,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,834,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,836,236 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,851,383 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,866,544 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,881,531 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,906,317 UART: [afmc] --
18,910,193 UART: [cold-reset] --
18,914,278 UART: [state] Locking Datavault
18,919,804 UART: [state] Locking PCR0, PCR1 and PCR31
18,921,949 UART: [state] Locking ICCM
18,924,858 UART: [exit] Launching FMC @ 0x40000130
18,933,535 UART:
18,933,766 UART: Running Caliptra FMC ...
18,934,868 UART:
18,935,023 UART: [state] CFI Enabled
18,991,683 UART: [fht] FMC Alias Private Key: 7
20,755,407 UART: [art] Extend RT PCRs Done
20,756,627 UART: [art] Lock RT PCRs Done
20,758,445 UART: [art] Populate DV Done
20,763,802 UART: [fht] FMC Alias Private Key: 7
20,765,512 UART: [art] Derive CDI
20,766,345 UART: [art] Store in in slot 0x4
20,823,794 UART: [art] Derive Key Pair
20,824,827 UART: [art] Store priv key in slot 0x5
23,287,357 UART: [art] Derive Key Pair - Done
23,300,557 UART: [art] Signing Cert with AUTHO
23,301,892 UART: RITY.KEYID = 7
25,013,413 UART: [art] Erasing AUTHORITY.KEYID = 7
25,014,915 UART: [art] PUB.X = A8BA60912438882FC0745D9B03A314894437213FD78112DD377F51DD979CAF1F8D7AF9C98EBE0F1B420FF3FFFE4107B3
25,022,142 UART: [art] PUB.Y = C2E7BC028C356DBECE9BE3941AE2D7587CB8E6A7DB2F21E728CEB0A6F3AB1E6EAF37E289D856153A9EEE7A387875E768
25,029,452 UART: [art] SIG.R = 615D986C64A80977AE7C01426B0EFF551FD8D15AAACE0909DF05ABED837F1997EF0DDEA8FA034BA582963F7EB132699C
25,036,865 UART: [art] SIG.S = B2E2AD868B689F29FF5979DB6EB61C0A130662819B2A762BD5A365EE28BEAFC7E2903FD3D64DE1C11F98636B4A8BE5D0
26,015,782 UART: Caliptra RT
26,016,485 UART: [state] CFI Enabled
26,181,047 UART: [rt] RT listening for mailbox commands...
26,212,786 UART: [rt]cmd =0x44504543, len=96
26,244,858 >>> mbox cmd response data (56 bytes)
26,245,656 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,276,097 UART: [rt]cmd =0x44504543, len=92
30,639,788 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,787 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,228,202 >>> mbox cmd response data (12 bytes)
10,229,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,855,008 >>> mbox cmd response: success
14,855,501 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,171,975 UART:
19,172,386 UART: Running Caliptra FMC ...
19,173,582 UART:
19,173,742 UART: [state] CFI Enabled
19,239,691 UART: [fht] FMC Alias Private Key: 7
21,004,052 UART: [art] Extend RT PCRs Done
21,005,284 UART: [art] Lock RT PCRs Done
21,006,865 UART: [art] Populate DV Done
21,012,342 UART: [fht] FMC Alias Private Key: 7
21,013,947 UART: [art] Derive CDI
21,014,717 UART: [art] Store in in slot 0x4
21,072,597 UART: [art] Derive Key Pair
21,073,637 UART: [art] Store priv key in slot 0x5
23,536,930 UART: [art] Derive Key Pair - Done
23,549,811 UART: [art] Signing Cert with AUTHO
23,551,142 UART: RITY.KEYID = 7
25,262,743 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,256 UART: [art] PUB.X = BE6A80F465E4245CE029075320BE0DE884D3A9AE460F52A30F85F2AE30B19B6C377275A120B030F31318030A7FEA6C9E
25,271,505 UART: [art] PUB.Y = DEB66ACFE9E020C3E16A87044AC293BEBA525AA8D0FF0D5D00AB1E24CDA5FA5E1F1C8E8103F696362EEAD21D741E1FF9
25,278,784 UART: [art] SIG.R = C602F1402D6B54F880C7B1C63EA1C1AF4ABE1AD4AFC4B1FD013A1E4B31BDB74DDCDFF49FD338B60464F48C37072999FF
25,286,169 UART: [art] SIG.S = 33723725DFD082D78C618E8A01B0041D998EE26D6879D3A4BE6CB64FB30565F5ABCC626F8E60397FED0CF6E8448B25C3
26,265,355 UART: Caliptra RT
26,266,046 UART: [state] CFI Enabled
26,443,038 UART: [rt] RT listening for mailbox commands...
26,475,133 UART: [rt]cmd =0x44504543, len=92
30,825,191 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,123 writing to cptra_bootfsm_go
3,403,932 ready_for_fw is high
3,404,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,698,119 >>> mbox cmd response: success
14,698,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,998,869 UART:
18,999,236 UART: Running Caliptra FMC ...
19,000,310 UART:
19,000,480 UART: [state] CFI Enabled
19,064,020 UART: [fht] FMC Alias Private Key: 7
20,828,009 UART: [art] Extend RT PCRs Done
20,829,237 UART: [art] Lock RT PCRs Done
20,830,920 UART: [art] Populate DV Done
20,836,226 UART: [fht] FMC Alias Private Key: 7
20,837,821 UART: [art] Derive CDI
20,838,636 UART: [art] Store in in slot 0x4
20,895,269 UART: [art] Derive Key Pair
20,896,318 UART: [art] Store priv key in slot 0x5
23,359,135 UART: [art] Derive Key Pair - Done
23,371,998 UART: [art] Signing Cert with AUTHO
23,373,306 UART: RITY.KEYID = 7
25,086,684 UART: [art] Erasing AUTHORITY.KEYID = 7
25,088,521 UART: [art] PUB.X = BE6A80F465E4245CE029075320BE0DE884D3A9AE460F52A30F85F2AE30B19B6C377275A120B030F31318030A7FEA6C9E
25,095,423 UART: [art] PUB.Y = DEB66ACFE9E020C3E16A87044AC293BEBA525AA8D0FF0D5D00AB1E24CDA5FA5E1F1C8E8103F696362EEAD21D741E1FF9
25,102,724 UART: [art] SIG.R = C602F1402D6B54F880C7B1C63EA1C1AF4ABE1AD4AFC4B1FD013A1E4B31BDB74DDCDFF49FD338B60464F48C37072999FF
25,110,116 UART: [art] SIG.S = 33723725DFD082D78C618E8A01B0041D998EE26D6879D3A4BE6CB64FB30565F5ABCC626F8E60397FED0CF6E8448B25C3
26,088,468 UART: Caliptra RT
26,089,171 UART: [state] CFI Enabled
26,253,231 UART: [rt] RT listening for mailbox commands...
26,285,238 UART: [rt]cmd =0x4d454153, len=108
26,303,896 >>> mbox cmd response data (12 bytes)
26,304,547 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,334,985 UART: [rt]cmd =0x44504543, len=92
30,691,123 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,109 writing to cptra_bootfsm_go
3,425,484 ready_for_fw is high
3,425,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,724,678 >>> mbox cmd response: success
14,725,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,031,417 UART:
19,031,763 UART: Running Caliptra FMC ...
19,032,855 UART:
19,033,025 UART: [state] CFI Enabled
19,100,232 UART: [fht] FMC Alias Private Key: 7
20,864,003 UART: [art] Extend RT PCRs Done
20,865,231 UART: [art] Lock RT PCRs Done
20,867,096 UART: [art] Populate DV Done
20,872,519 UART: [fht] FMC Alias Private Key: 7
20,874,115 UART: [art] Derive CDI
20,874,931 UART: [art] Store in in slot 0x4
20,932,545 UART: [art] Derive Key Pair
20,933,589 UART: [art] Store priv key in slot 0x5
23,395,918 UART: [art] Derive Key Pair - Done
23,408,747 UART: [art] Signing Cert with AUTHO
23,410,052 UART: RITY.KEYID = 7
25,121,975 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,492 UART: [art] PUB.X = BE6A80F465E4245CE029075320BE0DE884D3A9AE460F52A30F85F2AE30B19B6C377275A120B030F31318030A7FEA6C9E
25,130,767 UART: [art] PUB.Y = DEB66ACFE9E020C3E16A87044AC293BEBA525AA8D0FF0D5D00AB1E24CDA5FA5E1F1C8E8103F696362EEAD21D741E1FF9
25,138,001 UART: [art] SIG.R = C602F1402D6B54F880C7B1C63EA1C1AF4ABE1AD4AFC4B1FD013A1E4B31BDB74DDCDFF49FD338B60464F48C37072999FF
25,145,464 UART: [art] SIG.S = 33723725DFD082D78C618E8A01B0041D998EE26D6879D3A4BE6CB64FB30565F5ABCC626F8E60397FED0CF6E8448B25C3
26,124,360 UART: Caliptra RT
26,125,066 UART: [state] CFI Enabled
26,289,300 UART: [rt] RT listening for mailbox commands...
26,321,075 UART: [rt]cmd =0x44504543, len=96
26,353,875 >>> mbox cmd response data (56 bytes)
26,354,681 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,385,335 UART: [rt]cmd =0x44504543, len=92
30,747,871 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.73s
Truncated 3871 bytes from beginning
A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,296,731 UART: [afmc] --
19,300,172 UART: [cold-reset] --
19,303,336 UART: [state] Locking Datavault
19,310,389 UART: [state] Locking PCR0, PCR1 and PCR31
19,312,589 UART: [state] Locking ICCM
19,315,396 UART: [exit] Launching FMC @ 0x40000130
19,324,069 UART:
19,324,320 UART: Running Caliptra FMC ...
19,325,423 UART:
19,325,583 UART: [state] CFI Enabled
19,333,471 UART: [fht] FMC Alias Private Key: 7
21,090,143 UART: [art] Extend RT PCRs Done
21,091,361 UART: [art] Lock RT PCRs Done
21,092,855 UART: [art] Populate DV Done
21,098,107 UART: [fht] FMC Alias Private Key: 7
21,099,628 UART: [art] Derive CDI
21,100,372 UART: [art] Store in in slot 0x4
21,143,017 UART: [art] Derive Key Pair
21,144,017 UART: [art] Store priv key in slot 0x5
23,570,393 UART: [art] Derive Key Pair - Done
23,583,435 UART: [art] Signing Cert with AUTHO
23,584,772 UART: RITY.KEYID = 7
25,290,792 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,293 UART: [art] PUB.X = 8F8C495EF1F6E5CD7A01460E412AEAC394F3B83AD291C893F9B78C3ACB4C3923D506A8CF8BB7C8EEBA1B42B6AAAD9A23
25,299,595 UART: [art] PUB.Y = 1D1FC0835AAC1D50466B550C54315722D255973EC8E7F29472E7060376066F7F28115D6F18FF6763A5D27292F7A34051
25,306,832 UART: [art] SIG.R = F71514968C3FB5325F447A83894FE63BF114746B894699BD31173C00A0ADE77CAA3BECB1A51299EFADD3B6DD291085C4
25,314,222 UART: [art] SIG.S = 676047F1B8A2E2D90C3433B5BC25A249602961B8562C24A4F5D72329059181814394CC7E94E1F78948B62D1A25D560DA
26,292,835 UART: Caliptra RT
26,293,543 UART: [state] CFI Enabled
26,422,175 UART: [rt] RT listening for mailbox commands...
26,453,860 UART: [rt]cmd =0x44504543, len=92
30,745,291 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,108 writing to cptra_bootfsm_go
190,215 UART:
190,529 UART: Running Caliptra ROM ...
191,587 UART:
9,753,818 UART: [state] CFI Enabled
9,765,178 UART: [state] LifecycleState = Unprovisioned
9,767,554 UART: [state] DebugLocked = No
9,769,032 UART: [state] WD Timer not started. Device not locked for debugging
9,774,542 UART: [kat] SHA2-256
9,964,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,975,181 UART: [kat] ++
9,975,795 UART: [kat] sha1
9,987,895 UART: [kat] SHA2-256
9,990,926 UART: [kat] SHA2-384
9,996,145 UART: [kat] SHA2-512-ACC
9,998,739 UART: [kat] ECC-384
12,442,063 UART: [kat] HMAC-384Kdf
12,453,728 UART: [kat] LMS
12,985,579 UART: [kat] --
12,990,516 UART: [cold-reset] ++
12,992,875 UART: [fht] FHT @ 0x50003400
13,004,562 UART: [idev] ++
13,005,204 UART: [idev] CDI.KEYID = 6
13,006,163 UART: [idev] SUBJECT.KEYID = 7
13,007,408 UART: [idev] UDS.KEYID = 0
13,008,315 ready_for_fw is high
13,008,512 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,151,828 UART: [idev] Erasing UDS.KEYID = 0
15,483,060 UART: [idev] Sha1 KeyId Algorithm
15,505,650 UART: [idev] --
15,511,215 UART: [ldev] ++
15,511,897 UART: [ldev] CDI.KEYID = 6
15,512,804 UART: [ldev] SUBJECT.KEYID = 5
15,514,018 UART: [ldev] AUTHORITY.KEYID = 7
15,515,214 UART: [ldev] FE.KEYID = 1
15,525,328 UART: [ldev] Erasing FE.KEYID = 1
18,006,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,726,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,741,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,756,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,792,852 UART: [ldev] --
19,797,960 UART: [fwproc] Wait for Commands...
19,799,413 UART: [fwproc] Recv command 0x46574c44
19,801,349 UART: [fwproc] Recv'd Img size: 114168 bytes
23,246,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,320,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,436,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,977,677 >>> mbox cmd response: success
23,978,092 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,981,451 UART: [afmc] ++
23,982,149 UART: [afmc] CDI.KEYID = 6
23,983,336 UART: [afmc] SUBJECT.KEYID = 7
23,984,824 UART: [afmc] AUTHORITY.KEYID = 5
26,491,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,213,559 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,215,472 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,230,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,245,791 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,260,857 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,283,740 UART: [afmc] --
28,287,817 UART: [cold-reset] --
28,291,894 UART: [state] Locking Datavault
28,297,143 UART: [state] Locking PCR0, PCR1 and PCR31
28,299,283 UART: [state] Locking ICCM
28,301,705 UART: [exit] Launching FMC @ 0x40000130
28,310,403 UART:
28,310,647 UART: Running Caliptra FMC ...
28,311,754 UART:
28,311,920 UART: [state] CFI Enabled
28,319,923 UART: [fht] FMC Alias Private Key: 7
30,076,434 UART: [art] Extend RT PCRs Done
30,077,653 UART: [art] Lock RT PCRs Done
30,079,446 UART: [art] Populate DV Done
30,084,968 UART: [fht] FMC Alias Private Key: 7
30,086,656 UART: [art] Derive CDI
30,087,486 UART: [art] Store in in slot 0x4
30,129,983 UART: [art] Derive Key Pair
30,131,040 UART: [art] Store priv key in slot 0x5
32,557,754 UART: [art] Derive Key Pair - Done
32,570,898 UART: [art] Signing Cert with AUTHO
32,572,233 UART: RITY.KEYID = 7
34,277,680 UART: [art] Erasing AUTHORITY.KEYID = 7
34,279,195 UART: [art] PUB.X = 8F8C495EF1F6E5CD7A01460E412AEAC394F3B83AD291C893F9B78C3ACB4C3923D506A8CF8BB7C8EEBA1B42B6AAAD9A23
34,286,443 UART: [art] PUB.Y = 1D1FC0835AAC1D50466B550C54315722D255973EC8E7F29472E7060376066F7F28115D6F18FF6763A5D27292F7A34051
34,293,727 UART: [art] SIG.R = F71514968C3FB5325F447A83894FE63BF114746B894699BD31173C00A0ADE77CAA3BECB1A51299EFADD3B6DD291085C4
34,301,060 UART: [art] SIG.S = 676047F1B8A2E2D90C3433B5BC25A249602961B8562C24A4F5D72329059181814394CC7E94E1F78948B62D1A25D560DA
35,279,772 UART: Caliptra RT
35,280,460 UART: [state] CFI Enabled
35,397,906 UART: [rt] RT listening for mailbox commands...
35,430,128 UART: [rt]cmd =0x4d454153, len=108
35,449,840 >>> mbox cmd response data (12 bytes)
35,450,430 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,480,913 UART: [rt]cmd =0x44504543, len=92
39,771,780 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,092 writing to cptra_bootfsm_go
190,218 UART:
190,525 UART: Running Caliptra ROM ...
191,557 UART:
10,076,742 UART: [state] CFI Enabled
10,090,999 UART: [state] LifecycleState = Unprovisioned
10,093,357 UART: [state] DebugLocked = No
10,094,901 UART: [state] WD Timer not started. Device not locked for debugging
10,099,408 UART: [kat] SHA2-256
10,289,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,300,026 UART: [kat] ++
10,300,556 UART: [kat] sha1
10,312,715 UART: [kat] SHA2-256
10,315,727 UART: [kat] SHA2-384
10,323,146 UART: [kat] SHA2-512-ACC
10,325,743 UART: [kat] ECC-384
12,766,919 UART: [kat] HMAC-384Kdf
12,779,706 UART: [kat] LMS
13,311,513 UART: [kat] --
13,314,586 UART: [cold-reset] ++
13,317,081 UART: [fht] FHT @ 0x50003400
13,328,650 UART: [idev] ++
13,329,391 UART: [idev] CDI.KEYID = 6
13,330,309 UART: [idev] SUBJECT.KEYID = 7
13,331,552 UART: [idev] UDS.KEYID = 0
13,332,479 ready_for_fw is high
13,332,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,475,830 UART: [idev] Erasing UDS.KEYID = 0
15,809,054 UART: [idev] Sha1 KeyId Algorithm
15,830,996 UART: [idev] --
15,835,529 UART: [ldev] ++
15,836,212 UART: [ldev] CDI.KEYID = 6
15,837,120 UART: [ldev] SUBJECT.KEYID = 5
15,838,333 UART: [ldev] AUTHORITY.KEYID = 7
15,839,528 UART: [ldev] FE.KEYID = 1
15,850,879 UART: [ldev] Erasing FE.KEYID = 1
18,330,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,052,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,067,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,082,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,097,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,119,032 UART: [ldev] --
20,125,378 UART: [fwproc] Wait for Commands...
20,127,345 UART: [fwproc] Recv command 0x46574c44
20,129,670 UART: [fwproc] Recv'd Img size: 114168 bytes
23,571,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,653,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,769,235 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
24,309,894 >>> mbox cmd response: success
24,310,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,314,109 UART: [afmc] ++
24,314,806 UART: [afmc] CDI.KEYID = 6
24,315,997 UART: [afmc] SUBJECT.KEYID = 7
24,317,433 UART: [afmc] AUTHORITY.KEYID = 5
26,821,050 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,544,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,545,994 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
28,561,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
28,576,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
28,591,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
28,615,547 UART: [afmc] --
28,619,100 UART: [cold-reset] --
28,622,634 UART: [state] Locking Datavault
28,625,995 UART: [state] Locking PCR0, PCR1 and PCR31
28,628,142 UART: [state] Locking ICCM
28,630,027 UART: [exit] Launching FMC @ 0x40000130
28,638,730 UART:
28,638,970 UART: Running Caliptra FMC ...
28,640,073 UART:
28,640,234 UART: [state] CFI Enabled
28,647,907 UART: [fht] FMC Alias Private Key: 7
30,404,377 UART: [art] Extend RT PCRs Done
30,405,597 UART: [art] Lock RT PCRs Done
30,407,155 UART: [art] Populate DV Done
30,412,890 UART: [fht] FMC Alias Private Key: 7
30,414,600 UART: [art] Derive CDI
30,415,414 UART: [art] Store in in slot 0x4
30,458,225 UART: [art] Derive Key Pair
30,459,263 UART: [art] Store priv key in slot 0x5
32,886,041 UART: [art] Derive Key Pair - Done
32,898,981 UART: [art] Signing Cert with AUTHO
32,900,276 UART: RITY.KEYID = 7
34,605,874 UART: [art] Erasing AUTHORITY.KEYID = 7
34,607,385 UART: [art] PUB.X = 8F8C495EF1F6E5CD7A01460E412AEAC394F3B83AD291C893F9B78C3ACB4C3923D506A8CF8BB7C8EEBA1B42B6AAAD9A23
34,614,684 UART: [art] PUB.Y = 1D1FC0835AAC1D50466B550C54315722D255973EC8E7F29472E7060376066F7F28115D6F18FF6763A5D27292F7A34051
34,621,968 UART: [art] SIG.R = F71514968C3FB5325F447A83894FE63BF114746B894699BD31173C00A0ADE77CAA3BECB1A51299EFADD3B6DD291085C4
34,629,315 UART: [art] SIG.S = 676047F1B8A2E2D90C3433B5BC25A249602961B8562C24A4F5D72329059181814394CC7E94E1F78948B62D1A25D560DA
35,608,478 UART: Caliptra RT
35,609,196 UART: [state] CFI Enabled
35,726,312 UART: [rt] RT listening for mailbox commands...
35,758,217 UART: [rt]cmd =0x44504543, len=96
35,789,587 >>> mbox cmd response data (56 bytes)
35,790,414 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,821,025 UART: [rt]cmd =0x44504543, len=92
40,111,356 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 5.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,651 writing to cptra_bootfsm_go
4,773 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,485,638 >>> mbox cmd response data (12 bytes)
10,487,089 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,109,759 >>> mbox cmd response: success
15,110,261 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,368,975 UART:
19,369,367 UART: Running Caliptra FMC ...
19,370,616 UART:
19,370,784 UART: [state] CFI Enabled
19,378,490 UART: [fht] FMC Alias Private Key: 7
21,135,338 UART: [art] Extend RT PCRs Done
21,136,556 UART: [art] Lock RT PCRs Done
21,138,128 UART: [art] Populate DV Done
21,143,716 UART: [fht] FMC Alias Private Key: 7
21,145,202 UART: [art] Derive CDI
21,145,967 UART: [art] Store in in slot 0x4
21,188,349 UART: [art] Derive Key Pair
21,189,384 UART: [art] Store priv key in slot 0x5
23,616,103 UART: [art] Derive Key Pair - Done
23,629,155 UART: [art] Signing Cert with AUTHO
23,630,491 UART: RITY.KEYID = 7
25,336,023 UART: [art] Erasing AUTHORITY.KEYID = 7
25,337,806 UART: [art] PUB.X = 25D6F3E421264DFF90526FFBD2B7202246F59DB13FB3FA7CB2064F90B60BB36DC9095DC63D09DD0223DA13AD5EB3BCA8
25,344,790 UART: [art] PUB.Y = 07C4B21410262AFFFD5BB7270016196FA6A50857EC6062DA6A9B8F497AA52CB17A7918A1627A577195599B1D547E243B
25,352,031 UART: [art] SIG.R = DA686374286679B051E64894797D13A0CA3FD0A1BCB2B475D18ECD071259FDF58355931AF83CA9D0FBD08E95207B7FC7
25,359,421 UART: [art] SIG.S = 008E43B17489BF675712A0F17896ABE2A761AACC327242CE10666861383A7BED664499E50FD34CCF3B4C452A5DAA3B39
26,338,232 UART: Caliptra RT
26,338,933 UART: [state] CFI Enabled
26,467,992 UART: [rt] RT listening for mailbox commands...
26,500,052 UART: [rt]cmd =0x44504543, len=92
30,790,154 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,127 writing to cptra_bootfsm_go
12,863,060 ready_for_fw is high
12,863,443 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,060,782 >>> mbox cmd response: success
24,061,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,311,004 UART:
28,311,350 UART: Running Caliptra FMC ...
28,312,593 UART:
28,312,755 UART: [state] CFI Enabled
28,320,434 UART: [fht] FMC Alias Private Key: 7
30,077,897 UART: [art] Extend RT PCRs Done
30,079,116 UART: [art] Lock RT PCRs Done
30,080,472 UART: [art] Populate DV Done
30,085,779 UART: [fht] FMC Alias Private Key: 7
30,087,375 UART: [art] Derive CDI
30,088,192 UART: [art] Store in in slot 0x4
30,130,138 UART: [art] Derive Key Pair
30,131,150 UART: [art] Store priv key in slot 0x5
32,558,234 UART: [art] Derive Key Pair - Done
32,571,171 UART: [art] Signing Cert with AUTHO
32,572,509 UART: RITY.KEYID = 7
34,277,362 UART: [art] Erasing AUTHORITY.KEYID = 7
34,279,370 UART: [art] PUB.X = 25D6F3E421264DFF90526FFBD2B7202246F59DB13FB3FA7CB2064F90B60BB36DC9095DC63D09DD0223DA13AD5EB3BCA8
34,286,137 UART: [art] PUB.Y = 07C4B21410262AFFFD5BB7270016196FA6A50857EC6062DA6A9B8F497AA52CB17A7918A1627A577195599B1D547E243B
34,293,366 UART: [art] SIG.R = DA686374286679B051E64894797D13A0CA3FD0A1BCB2B475D18ECD071259FDF58355931AF83CA9D0FBD08E95207B7FC7
34,300,755 UART: [art] SIG.S = 008E43B17489BF675712A0F17896ABE2A761AACC327242CE10666861383A7BED664499E50FD34CCF3B4C452A5DAA3B39
35,279,742 UART: Caliptra RT
35,280,436 UART: [state] CFI Enabled
35,397,174 UART: [rt] RT listening for mailbox commands...
35,429,337 UART: [rt]cmd =0x4d454153, len=108
35,448,335 >>> mbox cmd response data (12 bytes)
35,449,145 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,479,839 UART: [rt]cmd =0x44504543, len=92
39,770,851 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,106 writing to cptra_bootfsm_go
13,177,304 ready_for_fw is high
13,177,670 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,382,350 >>> mbox cmd response: success
24,382,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,630,162 UART:
28,630,503 UART: Running Caliptra FMC ...
28,631,565 UART:
28,631,718 UART: [state] CFI Enabled
28,640,264 UART: [fht] FMC Alias Private Key: 7
30,397,391 UART: [art] Extend RT PCRs Done
30,398,621 UART: [art] Lock RT PCRs Done
30,400,299 UART: [art] Populate DV Done
30,405,827 UART: [fht] FMC Alias Private Key: 7
30,407,420 UART: [art] Derive CDI
30,408,235 UART: [art] Store in in slot 0x4
30,450,835 UART: [art] Derive Key Pair
30,451,877 UART: [art] Store priv key in slot 0x5
32,878,511 UART: [art] Derive Key Pair - Done
32,891,460 UART: [art] Signing Cert with AUTHO
32,892,768 UART: RITY.KEYID = 7
34,597,832 UART: [art] Erasing AUTHORITY.KEYID = 7
34,599,338 UART: [art] PUB.X = 25D6F3E421264DFF90526FFBD2B7202246F59DB13FB3FA7CB2064F90B60BB36DC9095DC63D09DD0223DA13AD5EB3BCA8
34,606,663 UART: [art] PUB.Y = 07C4B21410262AFFFD5BB7270016196FA6A50857EC6062DA6A9B8F497AA52CB17A7918A1627A577195599B1D547E243B
34,613,865 UART: [art] SIG.R = DA686374286679B051E64894797D13A0CA3FD0A1BCB2B475D18ECD071259FDF58355931AF83CA9D0FBD08E95207B7FC7
34,621,262 UART: [art] SIG.S = 008E43B17489BF675712A0F17896ABE2A761AACC327242CE10666861383A7BED664499E50FD34CCF3B4C452A5DAA3B39
35,599,935 UART: Caliptra RT
35,600,622 UART: [state] CFI Enabled
35,717,570 UART: [rt] RT listening for mailbox commands...
35,749,444 UART: [rt]cmd =0x44504543, len=96
35,780,622 >>> mbox cmd response data (56 bytes)
35,781,474 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,811,751 UART: [rt]cmd =0x44504543, len=92
40,103,452 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 5.65s
Truncated 5006 bytes from beginning
1C0EFA2C395E4790A6B7D8622E409B8104038
3,438,026 UART: [art] PUB.Y = 4155DE7A17FB09F0BDF4968AA5413C76CF1474EF6985681B4EDC074DF3D23A87BD29B11B1D84049C01E2EC9D8CB29CAD
3,444,980 UART: [art] SIG.R = 6303DC682D84DF90BF21DC9C3CAEB0888A823B0308484163C6976574A292851DC7CA853E42642C09F208C87DFF8BA1B9
3,451,737 UART: [art] SIG.S = B395D2DD9B6B25988F3E26402674F02131559B66C92C167656AD7AEC620E30151D11795020DFEA6717F2FF85857ED9B8
3,475,855 UART: Caliptra RT
3,476,108 UART: [state] CFI Enabled
3,595,877 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,981 UART: [rt]cmd =0x44504543, len=92
3,818,289 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,545 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,567 UART: [kat] SHA2-256
892,505 UART: [kat] SHA2-384
895,096 UART: [kat] SHA2-512-ACC
896,997 UART: [kat] ECC-384
902,514 UART: [kat] HMAC-384Kdf
907,180 UART: [kat] LMS
1,475,376 UART: [kat] --
1,476,261 UART: [cold-reset] ++
1,476,827 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 ready_for_fw is high
1,480,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,826 UART: [idev] Erasing UDS.KEYID = 0
1,504,794 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,322 UART: [idev] --
1,514,539 UART: [ldev] ++
1,514,707 UART: [ldev] CDI.KEYID = 6
1,515,070 UART: [ldev] SUBJECT.KEYID = 5
1,515,496 UART: [ldev] AUTHORITY.KEYID = 7
1,515,959 UART: [ldev] FE.KEYID = 1
1,521,173 UART: [ldev] Erasing FE.KEYID = 1
1,547,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,208 UART: [ldev] --
1,586,513 UART: [fwproc] Waiting for Commands...
1,587,344 UART: [fwproc] Received command 0x46574c44
1,588,135 UART: [fwproc] Received Image of size 114168 bytes
2,884,917 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,413 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,498 >>> mbox cmd response: success
3,077,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,078,566 UART: [afmc] ++
3,078,734 UART: [afmc] CDI.KEYID = 6
3,079,096 UART: [afmc] SUBJECT.KEYID = 7
3,079,521 UART: [afmc] AUTHORITY.KEYID = 5
3,114,006 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,998 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,506 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,391 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,081 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,130 UART: [afmc] --
3,157,120 UART: [cold-reset] --
3,158,080 UART: [state] Locking Datavault
3,159,537 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,141 UART: [state] Locking ICCM
3,160,745 UART: [exit] Launching FMC @ 0x40000130
3,166,074 UART:
3,166,090 UART: Running Caliptra FMC ...
3,166,498 UART:
3,166,552 UART: [state] CFI Enabled
3,177,111 UART: [fht] FMC Alias Private Key: 7
3,285,066 UART: [art] Extend RT PCRs Done
3,285,494 UART: [art] Lock RT PCRs Done
3,287,322 UART: [art] Populate DV Done
3,295,333 UART: [fht] FMC Alias Private Key: 7
3,296,443 UART: [art] Derive CDI
3,296,723 UART: [art] Store in in slot 0x4
3,382,700 UART: [art] Derive Key Pair
3,383,060 UART: [art] Store priv key in slot 0x5
3,396,516 UART: [art] Derive Key Pair - Done
3,411,121 UART: [art] Signing Cert with AUTHO
3,411,601 UART: RITY.KEYID = 7
3,426,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,258 UART: [art] PUB.X = B102BC72756803F21FC73EE30DA3BD4F7E46F673E48262979719C2319351C0EFA2C395E4790A6B7D8622E409B8104038
3,434,007 UART: [art] PUB.Y = 4155DE7A17FB09F0BDF4968AA5413C76CF1474EF6985681B4EDC074DF3D23A87BD29B11B1D84049C01E2EC9D8CB29CAD
3,440,961 UART: [art] SIG.R = 6303DC682D84DF90BF21DC9C3CAEB0888A823B0308484163C6976574A292851DC7CA853E42642C09F208C87DFF8BA1B9
3,447,718 UART: [art] SIG.S = B395D2DD9B6B25988F3E26402674F02131559B66C92C167656AD7AEC620E30151D11795020DFEA6717F2FF85857ED9B8
3,471,290 UART: Caliptra RT
3,471,543 UART: [state] CFI Enabled
3,578,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,094 UART: [rt]cmd =0x4d454153, len=108
3,630,129 >>> mbox cmd response data (12 bytes)
3,630,130 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,233 UART: [rt]cmd =0x44504543, len=92
3,850,613 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,721 UART: [kat] SHA2-256
881,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,767 UART: [kat] ++
885,919 UART: [kat] sha1
890,267 UART: [kat] SHA2-256
892,205 UART: [kat] SHA2-384
894,892 UART: [kat] SHA2-512-ACC
896,793 UART: [kat] ECC-384
902,596 UART: [kat] HMAC-384Kdf
907,390 UART: [kat] LMS
1,475,586 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,476,823 UART: [fht] Storing FHT @ 0x50003400
1,479,648 UART: [idev] ++
1,479,816 UART: [idev] CDI.KEYID = 6
1,480,176 UART: [idev] SUBJECT.KEYID = 7
1,480,600 UART: [idev] UDS.KEYID = 0
1,480,945 ready_for_fw is high
1,480,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,505,558 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,238 UART: [idev] --
1,515,433 UART: [ldev] ++
1,515,601 UART: [ldev] CDI.KEYID = 6
1,515,964 UART: [ldev] SUBJECT.KEYID = 5
1,516,390 UART: [ldev] AUTHORITY.KEYID = 7
1,516,853 UART: [ldev] FE.KEYID = 1
1,522,215 UART: [ldev] Erasing FE.KEYID = 1
1,547,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,270 UART: [ldev] --
1,586,693 UART: [fwproc] Waiting for Commands...
1,587,418 UART: [fwproc] Received command 0x46574c44
1,588,209 UART: [fwproc] Received Image of size 114168 bytes
2,885,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,625 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,496 >>> mbox cmd response: success
3,078,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,079,696 UART: [afmc] ++
3,079,864 UART: [afmc] CDI.KEYID = 6
3,080,226 UART: [afmc] SUBJECT.KEYID = 7
3,080,651 UART: [afmc] AUTHORITY.KEYID = 5
3,116,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,346 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,074 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,959 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,649 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,518 UART: [afmc] --
3,159,508 UART: [cold-reset] --
3,160,364 UART: [state] Locking Datavault
3,161,661 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,265 UART: [state] Locking ICCM
3,162,825 UART: [exit] Launching FMC @ 0x40000130
3,168,154 UART:
3,168,170 UART: Running Caliptra FMC ...
3,168,578 UART:
3,168,632 UART: [state] CFI Enabled
3,179,095 UART: [fht] FMC Alias Private Key: 7
3,287,220 UART: [art] Extend RT PCRs Done
3,287,648 UART: [art] Lock RT PCRs Done
3,289,220 UART: [art] Populate DV Done
3,297,421 UART: [fht] FMC Alias Private Key: 7
3,298,443 UART: [art] Derive CDI
3,298,723 UART: [art] Store in in slot 0x4
3,384,624 UART: [art] Derive Key Pair
3,384,984 UART: [art] Store priv key in slot 0x5
3,398,188 UART: [art] Derive Key Pair - Done
3,413,143 UART: [art] Signing Cert with AUTHO
3,413,623 UART: RITY.KEYID = 7
3,428,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,662 UART: [art] PUB.X = B102BC72756803F21FC73EE30DA3BD4F7E46F673E48262979719C2319351C0EFA2C395E4790A6B7D8622E409B8104038
3,436,411 UART: [art] PUB.Y = 4155DE7A17FB09F0BDF4968AA5413C76CF1474EF6985681B4EDC074DF3D23A87BD29B11B1D84049C01E2EC9D8CB29CAD
3,443,365 UART: [art] SIG.R = 6303DC682D84DF90BF21DC9C3CAEB0888A823B0308484163C6976574A292851DC7CA853E42642C09F208C87DFF8BA1B9
3,450,122 UART: [art] SIG.S = B395D2DD9B6B25988F3E26402674F02131559B66C92C167656AD7AEC620E30151D11795020DFEA6717F2FF85857ED9B8
3,473,834 UART: Caliptra RT
3,474,087 UART: [state] CFI Enabled
3,581,366 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,232 UART: [rt]cmd =0x44504543, len=96
3,644,873 >>> mbox cmd response data (56 bytes)
3,644,874 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,707 UART: [rt]cmd =0x44504543, len=92
3,865,505 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,343 >>> mbox cmd response data (12 bytes)
1,444,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,547 >>> mbox cmd response: success
2,928,547 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,989,709 UART:
2,989,725 UART: Running Caliptra FMC ...
2,990,133 UART:
2,990,187 UART: [state] CFI Enabled
3,000,568 UART: [fht] FMC Alias Private Key: 7
3,108,451 UART: [art] Extend RT PCRs Done
3,108,879 UART: [art] Lock RT PCRs Done
3,110,379 UART: [art] Populate DV Done
3,118,620 UART: [fht] FMC Alias Private Key: 7
3,119,568 UART: [art] Derive CDI
3,119,848 UART: [art] Store in in slot 0x4
3,205,719 UART: [art] Derive Key Pair
3,206,079 UART: [art] Store priv key in slot 0x5
3,218,959 UART: [art] Derive Key Pair - Done
3,233,901 UART: [art] Signing Cert with AUTHO
3,234,381 UART: RITY.KEYID = 7
3,249,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,480 UART: [art] PUB.X = 25F82AA70B9C18916FBFEF0CE9A60F06E2F9715D42B20336C256856E4EE5B6176FB1A89603AF16A85B18364C2D7DAC6A
3,257,242 UART: [art] PUB.Y = F94F26CFAAE46BDF6C7B13763B485A53CC79E01D0F75037F0C01151430DEFFF5BB69E094B5E5F145B317BEA02B2C5E2C
3,264,198 UART: [art] SIG.R = 7988E0CCE4A445473F74B34A87571DF55DEC36ABCF738C3AD5C2A3ADF800C65131AABCCFE41C2454478823BFE02059F1
3,270,960 UART: [art] SIG.S = 1C209EFCD1F807193E1CDFED2431BB6822F4D96350B1C740D0C569F5B2C19AF03D32344DE50B442A84C82890D64E08F6
3,294,458 UART: Caliptra RT
3,294,711 UART: [state] CFI Enabled
3,415,091 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,021 UART: [rt]cmd =0x44504543, len=92
3,636,847 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 ready_for_fw is high
1,362,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,780 >>> mbox cmd response: success
2,926,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,987,960 UART:
2,987,976 UART: Running Caliptra FMC ...
2,988,384 UART:
2,988,438 UART: [state] CFI Enabled
2,999,025 UART: [fht] FMC Alias Private Key: 7
3,107,574 UART: [art] Extend RT PCRs Done
3,108,002 UART: [art] Lock RT PCRs Done
3,109,310 UART: [art] Populate DV Done
3,117,379 UART: [fht] FMC Alias Private Key: 7
3,118,343 UART: [art] Derive CDI
3,118,623 UART: [art] Store in in slot 0x4
3,204,010 UART: [art] Derive Key Pair
3,204,370 UART: [art] Store priv key in slot 0x5
3,217,720 UART: [art] Derive Key Pair - Done
3,232,368 UART: [art] Signing Cert with AUTHO
3,232,848 UART: RITY.KEYID = 7
3,247,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,719 UART: [art] PUB.X = 25F82AA70B9C18916FBFEF0CE9A60F06E2F9715D42B20336C256856E4EE5B6176FB1A89603AF16A85B18364C2D7DAC6A
3,255,481 UART: [art] PUB.Y = F94F26CFAAE46BDF6C7B13763B485A53CC79E01D0F75037F0C01151430DEFFF5BB69E094B5E5F145B317BEA02B2C5E2C
3,262,437 UART: [art] SIG.R = 7988E0CCE4A445473F74B34A87571DF55DEC36ABCF738C3AD5C2A3ADF800C65131AABCCFE41C2454478823BFE02059F1
3,269,199 UART: [art] SIG.S = 1C209EFCD1F807193E1CDFED2431BB6822F4D96350B1C740D0C569F5B2C19AF03D32344DE50B442A84C82890D64E08F6
3,293,369 UART: Caliptra RT
3,293,622 UART: [state] CFI Enabled
3,401,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,762 UART: [rt]cmd =0x4d454153, len=108
3,453,007 >>> mbox cmd response data (12 bytes)
3,453,008 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,877 UART: [rt]cmd =0x44504543, len=92
3,673,477 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,647 ready_for_fw is high
1,361,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,522 >>> mbox cmd response: success
2,923,522 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,984,620 UART:
2,984,636 UART: Running Caliptra FMC ...
2,985,044 UART:
2,985,098 UART: [state] CFI Enabled
2,995,649 UART: [fht] FMC Alias Private Key: 7
3,104,202 UART: [art] Extend RT PCRs Done
3,104,630 UART: [art] Lock RT PCRs Done
3,106,106 UART: [art] Populate DV Done
3,114,275 UART: [fht] FMC Alias Private Key: 7
3,115,457 UART: [art] Derive CDI
3,115,737 UART: [art] Store in in slot 0x4
3,201,314 UART: [art] Derive Key Pair
3,201,674 UART: [art] Store priv key in slot 0x5
3,214,892 UART: [art] Derive Key Pair - Done
3,229,906 UART: [art] Signing Cert with AUTHO
3,230,386 UART: RITY.KEYID = 7
3,245,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,799 UART: [art] PUB.X = 25F82AA70B9C18916FBFEF0CE9A60F06E2F9715D42B20336C256856E4EE5B6176FB1A89603AF16A85B18364C2D7DAC6A
3,252,561 UART: [art] PUB.Y = F94F26CFAAE46BDF6C7B13763B485A53CC79E01D0F75037F0C01151430DEFFF5BB69E094B5E5F145B317BEA02B2C5E2C
3,259,517 UART: [art] SIG.R = 7988E0CCE4A445473F74B34A87571DF55DEC36ABCF738C3AD5C2A3ADF800C65131AABCCFE41C2454478823BFE02059F1
3,266,279 UART: [art] SIG.S = 1C209EFCD1F807193E1CDFED2431BB6822F4D96350B1C740D0C569F5B2C19AF03D32344DE50B442A84C82890D64E08F6
3,290,245 UART: Caliptra RT
3,290,498 UART: [state] CFI Enabled
3,398,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,468 UART: [rt]cmd =0x44504543, len=96
3,461,983 >>> mbox cmd response data (56 bytes)
3,461,984 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,041 UART: [rt]cmd =0x44504543, len=92
3,682,991 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.84s
Truncated 5006 bytes from beginning
697DA61AB2AA61BE252736A3776E72E23C46B
3,439,147 UART: [art] PUB.Y = 7E8DA83CD2A9B200A6759F8FFD44CCA67F4D504038CD6014AC78BB4082E7E9E1848DBF0F749985101A51470F477F575E
3,446,075 UART: [art] SIG.R = 164365F2E6E57FF4F73E942D64B9A8F187C151E984AD3696F7B988792ABA6B8E8DFB5C07C2CF52D05D9FD6D283D24FD3
3,452,854 UART: [art] SIG.S = A955D2A6AB0C31B2367452A0093FD323EF69B3074DEE63026C822EB2771309BD83DA31C69E310DE58F5A20C4F608FBE8
3,476,450 UART: Caliptra RT
3,476,795 UART: [state] CFI Enabled
3,597,794 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,482 UART: [rt]cmd =0x44504543, len=92
3,819,353 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,758 UART: [kat] SHA2-256
882,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,804 UART: [kat] ++
886,956 UART: [kat] sha1
891,184 UART: [kat] SHA2-256
893,122 UART: [kat] SHA2-384
895,769 UART: [kat] SHA2-512-ACC
897,670 UART: [kat] ECC-384
903,445 UART: [kat] HMAC-384Kdf
908,215 UART: [kat] LMS
1,476,411 UART: [kat] --
1,477,476 UART: [cold-reset] ++
1,477,884 UART: [fht] Storing FHT @ 0x50003400
1,480,807 UART: [idev] ++
1,480,975 UART: [idev] CDI.KEYID = 6
1,481,335 UART: [idev] SUBJECT.KEYID = 7
1,481,759 UART: [idev] UDS.KEYID = 0
1,482,104 ready_for_fw is high
1,482,104 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,589 UART: [idev] Erasing UDS.KEYID = 0
1,506,299 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,947 UART: [idev] --
1,516,136 UART: [ldev] ++
1,516,304 UART: [ldev] CDI.KEYID = 6
1,516,667 UART: [ldev] SUBJECT.KEYID = 5
1,517,093 UART: [ldev] AUTHORITY.KEYID = 7
1,517,556 UART: [ldev] FE.KEYID = 1
1,522,898 UART: [ldev] Erasing FE.KEYID = 1
1,548,457 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,595 UART: [ldev] --
1,588,100 UART: [fwproc] Waiting for Commands...
1,588,763 UART: [fwproc] Received command 0x46574c44
1,589,554 UART: [fwproc] Received Image of size 114168 bytes
2,885,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,072 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,653 >>> mbox cmd response: success
3,077,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,078,853 UART: [afmc] ++
3,079,021 UART: [afmc] CDI.KEYID = 6
3,079,383 UART: [afmc] SUBJECT.KEYID = 7
3,079,808 UART: [afmc] AUTHORITY.KEYID = 5
3,115,147 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,469 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,862 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,552 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,339 UART: [afmc] --
3,158,329 UART: [cold-reset] --
3,159,279 UART: [state] Locking Datavault
3,160,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,356 UART: [state] Locking ICCM
3,162,030 UART: [exit] Launching FMC @ 0x40000130
3,167,359 UART:
3,167,375 UART: Running Caliptra FMC ...
3,167,783 UART:
3,167,926 UART: [state] CFI Enabled
3,178,743 UART: [fht] FMC Alias Private Key: 7
3,286,274 UART: [art] Extend RT PCRs Done
3,286,702 UART: [art] Lock RT PCRs Done
3,288,546 UART: [art] Populate DV Done
3,297,011 UART: [fht] FMC Alias Private Key: 7
3,298,057 UART: [art] Derive CDI
3,298,337 UART: [art] Store in in slot 0x4
3,383,604 UART: [art] Derive Key Pair
3,383,964 UART: [art] Store priv key in slot 0x5
3,397,642 UART: [art] Derive Key Pair - Done
3,412,305 UART: [art] Signing Cert with AUTHO
3,412,785 UART: RITY.KEYID = 7
3,427,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,560 UART: [art] PUB.X = 2590FB0845AF6386003F414F6CC9FA0C32A7451027D1EB73138BE399FB5697DA61AB2AA61BE252736A3776E72E23C46B
3,435,304 UART: [art] PUB.Y = 7E8DA83CD2A9B200A6759F8FFD44CCA67F4D504038CD6014AC78BB4082E7E9E1848DBF0F749985101A51470F477F575E
3,442,232 UART: [art] SIG.R = 164365F2E6E57FF4F73E942D64B9A8F187C151E984AD3696F7B988792ABA6B8E8DFB5C07C2CF52D05D9FD6D283D24FD3
3,449,011 UART: [art] SIG.S = A955D2A6AB0C31B2367452A0093FD323EF69B3074DEE63026C822EB2771309BD83DA31C69E310DE58F5A20C4F608FBE8
3,472,985 UART: Caliptra RT
3,473,330 UART: [state] CFI Enabled
3,581,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,795 UART: [rt]cmd =0x4d454153, len=108
3,633,094 >>> mbox cmd response data (12 bytes)
3,633,095 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,902 UART: [rt]cmd =0x44504543, len=92
3,854,741 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,354 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,038 UART: [kat] SHA2-256
881,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,084 UART: [kat] ++
886,236 UART: [kat] sha1
890,294 UART: [kat] SHA2-256
892,232 UART: [kat] SHA2-384
895,075 UART: [kat] SHA2-512-ACC
896,976 UART: [kat] ECC-384
902,711 UART: [kat] HMAC-384Kdf
907,393 UART: [kat] LMS
1,475,589 UART: [kat] --
1,476,348 UART: [cold-reset] ++
1,476,898 UART: [fht] Storing FHT @ 0x50003400
1,479,609 UART: [idev] ++
1,479,777 UART: [idev] CDI.KEYID = 6
1,480,137 UART: [idev] SUBJECT.KEYID = 7
1,480,561 UART: [idev] UDS.KEYID = 0
1,480,906 ready_for_fw is high
1,480,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,269 UART: [idev] Erasing UDS.KEYID = 0
1,505,377 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,955 UART: [idev] --
1,515,134 UART: [ldev] ++
1,515,302 UART: [ldev] CDI.KEYID = 6
1,515,665 UART: [ldev] SUBJECT.KEYID = 5
1,516,091 UART: [ldev] AUTHORITY.KEYID = 7
1,516,554 UART: [ldev] FE.KEYID = 1
1,521,550 UART: [ldev] Erasing FE.KEYID = 1
1,547,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,899 UART: [ldev] --
1,586,312 UART: [fwproc] Waiting for Commands...
1,587,135 UART: [fwproc] Received command 0x46574c44
1,587,926 UART: [fwproc] Received Image of size 114168 bytes
2,884,116 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,378 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,730 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,269 >>> mbox cmd response: success
3,076,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,077,393 UART: [afmc] ++
3,077,561 UART: [afmc] CDI.KEYID = 6
3,077,923 UART: [afmc] SUBJECT.KEYID = 7
3,078,348 UART: [afmc] AUTHORITY.KEYID = 5
3,113,997 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,574 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,264 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,103 UART: [afmc] --
3,157,183 UART: [cold-reset] --
3,158,235 UART: [state] Locking Datavault
3,159,284 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,888 UART: [state] Locking ICCM
3,160,418 UART: [exit] Launching FMC @ 0x40000130
3,165,747 UART:
3,165,763 UART: Running Caliptra FMC ...
3,166,171 UART:
3,166,314 UART: [state] CFI Enabled
3,177,195 UART: [fht] FMC Alias Private Key: 7
3,285,392 UART: [art] Extend RT PCRs Done
3,285,820 UART: [art] Lock RT PCRs Done
3,287,364 UART: [art] Populate DV Done
3,295,723 UART: [fht] FMC Alias Private Key: 7
3,296,703 UART: [art] Derive CDI
3,296,983 UART: [art] Store in in slot 0x4
3,382,756 UART: [art] Derive Key Pair
3,383,116 UART: [art] Store priv key in slot 0x5
3,396,414 UART: [art] Derive Key Pair - Done
3,410,975 UART: [art] Signing Cert with AUTHO
3,411,455 UART: RITY.KEYID = 7
3,426,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,726 UART: [art] PUB.X = 2590FB0845AF6386003F414F6CC9FA0C32A7451027D1EB73138BE399FB5697DA61AB2AA61BE252736A3776E72E23C46B
3,434,470 UART: [art] PUB.Y = 7E8DA83CD2A9B200A6759F8FFD44CCA67F4D504038CD6014AC78BB4082E7E9E1848DBF0F749985101A51470F477F575E
3,441,398 UART: [art] SIG.R = 164365F2E6E57FF4F73E942D64B9A8F187C151E984AD3696F7B988792ABA6B8E8DFB5C07C2CF52D05D9FD6D283D24FD3
3,448,177 UART: [art] SIG.S = A955D2A6AB0C31B2367452A0093FD323EF69B3074DEE63026C822EB2771309BD83DA31C69E310DE58F5A20C4F608FBE8
3,472,185 UART: Caliptra RT
3,472,530 UART: [state] CFI Enabled
3,580,223 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,245 UART: [rt]cmd =0x44504543, len=96
3,643,720 >>> mbox cmd response data (56 bytes)
3,643,721 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,692 UART: [rt]cmd =0x44504543, len=92
3,864,515 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,445,462 >>> mbox cmd response data (12 bytes)
1,445,463 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,930,832 >>> mbox cmd response: success
2,930,832 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,992,572 UART:
2,992,588 UART: Running Caliptra FMC ...
2,992,996 UART:
2,993,139 UART: [state] CFI Enabled
3,003,814 UART: [fht] FMC Alias Private Key: 7
3,111,419 UART: [art] Extend RT PCRs Done
3,111,847 UART: [art] Lock RT PCRs Done
3,113,599 UART: [art] Populate DV Done
3,121,770 UART: [fht] FMC Alias Private Key: 7
3,122,806 UART: [art] Derive CDI
3,123,086 UART: [art] Store in in slot 0x4
3,208,739 UART: [art] Derive Key Pair
3,209,099 UART: [art] Store priv key in slot 0x5
3,222,561 UART: [art] Derive Key Pair - Done
3,237,681 UART: [art] Signing Cert with AUTHO
3,238,161 UART: RITY.KEYID = 7
3,253,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,254,314 UART: [art] PUB.X = 981A6787CF563E0EA30731E7A342FFA3D782202EF3756FA6C61D03FF093B64995CD32E174AC7CE11D3B37CFEB25298D8
3,261,080 UART: [art] PUB.Y = C44969031365DF79FCAC65C80B21166C8D56C6BF9CC0103EE7D625C8171949B24EF7BFA5AA220D5B33B520B922AB09C1
3,268,026 UART: [art] SIG.R = 01D57DA6369FAC12406B3E1BAFFDA394F8C82353B0AFE47D9D17601E5CA75997BCE4D72192ABFA349C32D77600D17CC0
3,274,785 UART: [art] SIG.S = 6B0A2B24EF1B920ABD178C3D4B4EB2B1DDAABF74AA08EC71407C6B0DAECDC55163BB7CC0F7CBBE1BFF676D4656901461
3,298,814 UART: Caliptra RT
3,299,159 UART: [state] CFI Enabled
3,420,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,451,903 UART: [rt]cmd =0x44504543, len=92
3,644,043 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,238 ready_for_fw is high
1,362,238 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,725 >>> mbox cmd response: success
2,927,725 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,989,773 UART:
2,989,789 UART: Running Caliptra FMC ...
2,990,197 UART:
2,990,340 UART: [state] CFI Enabled
3,001,169 UART: [fht] FMC Alias Private Key: 7
3,108,994 UART: [art] Extend RT PCRs Done
3,109,422 UART: [art] Lock RT PCRs Done
3,110,868 UART: [art] Populate DV Done
3,119,211 UART: [fht] FMC Alias Private Key: 7
3,120,261 UART: [art] Derive CDI
3,120,541 UART: [art] Store in in slot 0x4
3,205,914 UART: [art] Derive Key Pair
3,206,274 UART: [art] Store priv key in slot 0x5
3,219,904 UART: [art] Derive Key Pair - Done
3,234,564 UART: [art] Signing Cert with AUTHO
3,235,044 UART: RITY.KEYID = 7
3,250,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,091 UART: [art] PUB.X = 981A6787CF563E0EA30731E7A342FFA3D782202EF3756FA6C61D03FF093B64995CD32E174AC7CE11D3B37CFEB25298D8
3,257,857 UART: [art] PUB.Y = C44969031365DF79FCAC65C80B21166C8D56C6BF9CC0103EE7D625C8171949B24EF7BFA5AA220D5B33B520B922AB09C1
3,264,803 UART: [art] SIG.R = 01D57DA6369FAC12406B3E1BAFFDA394F8C82353B0AFE47D9D17601E5CA75997BCE4D72192ABFA349C32D77600D17CC0
3,271,562 UART: [art] SIG.S = 6B0A2B24EF1B920ABD178C3D4B4EB2B1DDAABF74AA08EC71407C6B0DAECDC55163BB7CC0F7CBBE1BFF676D4656901461
3,295,481 UART: Caliptra RT
3,295,826 UART: [state] CFI Enabled
3,404,530 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,326 UART: [rt]cmd =0x4d454153, len=108
3,456,487 >>> mbox cmd response data (12 bytes)
3,456,488 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,323 UART: [rt]cmd =0x44504543, len=92
3,677,339 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,216 ready_for_fw is high
1,362,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,635 >>> mbox cmd response: success
2,927,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,989,459 UART:
2,989,475 UART: Running Caliptra FMC ...
2,989,883 UART:
2,990,026 UART: [state] CFI Enabled
3,000,563 UART: [fht] FMC Alias Private Key: 7
3,108,342 UART: [art] Extend RT PCRs Done
3,108,770 UART: [art] Lock RT PCRs Done
3,110,508 UART: [art] Populate DV Done
3,118,707 UART: [fht] FMC Alias Private Key: 7
3,119,833 UART: [art] Derive CDI
3,120,113 UART: [art] Store in in slot 0x4
3,205,810 UART: [art] Derive Key Pair
3,206,170 UART: [art] Store priv key in slot 0x5
3,219,150 UART: [art] Derive Key Pair - Done
3,233,980 UART: [art] Signing Cert with AUTHO
3,234,460 UART: RITY.KEYID = 7
3,250,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,883 UART: [art] PUB.X = 981A6787CF563E0EA30731E7A342FFA3D782202EF3756FA6C61D03FF093B64995CD32E174AC7CE11D3B37CFEB25298D8
3,257,649 UART: [art] PUB.Y = C44969031365DF79FCAC65C80B21166C8D56C6BF9CC0103EE7D625C8171949B24EF7BFA5AA220D5B33B520B922AB09C1
3,264,595 UART: [art] SIG.R = 01D57DA6369FAC12406B3E1BAFFDA394F8C82353B0AFE47D9D17601E5CA75997BCE4D72192ABFA349C32D77600D17CC0
3,271,354 UART: [art] SIG.S = 6B0A2B24EF1B920ABD178C3D4B4EB2B1DDAABF74AA08EC71407C6B0DAECDC55163BB7CC0F7CBBE1BFF676D4656901461
3,295,399 UART: Caliptra RT
3,295,744 UART: [state] CFI Enabled
3,403,572 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,548 UART: [rt]cmd =0x44504543, len=96
3,467,165 >>> mbox cmd response data (56 bytes)
3,467,166 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,081 UART: [rt]cmd =0x44504543, len=92
3,688,833 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.90s
Truncated 4783 bytes from beginning
7
3,125,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,628 UART: [art] PUB.X = 2E9448F0EC5000AF7E730DF72479E797B60633CF9AE45C666C252EDF60F5F0B5B3251361790A8090BE214B563FE13D2E
3,133,369 UART: [art] PUB.Y = F3319F9178CAB6E3D0A96401BC176253A553BFBA56D29273D4C965FB07AD04485C01163FABE21CA7CECF223CB019C58E
3,140,319 UART: [art] SIG.R = AB3A1EA8EBCD528DE0AF5DBAB234257D79889B91A4DFD9227911CB45A0B105F9673EDCAF2D6ED6E74F974A13F42E9E1C
3,147,110 UART: [art] SIG.S = 6A174790B76E26B51F0A14436B006330BDE3E0750EC3DBFD4EB2FC9DB9ED9DBA55BBA318A49B14A5AE99240045C062C2
3,171,655 UART: Caliptra RT
3,171,908 UART: [state] CFI Enabled
3,293,419 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,431 UART: [rt]cmd =0x44504543, len=92
3,515,316 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
917,986 UART: [kat] HMAC-384Kdf
922,606 UART: [kat] LMS
1,170,934 UART: [kat] --
1,171,763 UART: [cold-reset] ++
1,172,129 UART: [fht] FHT @ 0x50003400
1,174,756 UART: [idev] ++
1,174,924 UART: [idev] CDI.KEYID = 6
1,175,284 UART: [idev] SUBJECT.KEYID = 7
1,175,708 UART: [idev] UDS.KEYID = 0
1,176,053 ready_for_fw is high
1,176,053 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,573 UART: [idev] Sha1 KeyId Algorithm
1,209,149 UART: [idev] --
1,210,131 UART: [ldev] ++
1,210,299 UART: [ldev] CDI.KEYID = 6
1,210,662 UART: [ldev] SUBJECT.KEYID = 5
1,211,088 UART: [ldev] AUTHORITY.KEYID = 7
1,211,551 UART: [ldev] FE.KEYID = 1
1,216,735 UART: [ldev] Erasing FE.KEYID = 1
1,242,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,701 UART: [ldev] --
1,282,014 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,974 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,771 >>> mbox cmd response: success
2,770,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,772,001 UART: [afmc] ++
2,772,169 UART: [afmc] CDI.KEYID = 6
2,772,531 UART: [afmc] SUBJECT.KEYID = 7
2,772,956 UART: [afmc] AUTHORITY.KEYID = 5
2,807,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,722 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,450 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,054 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,806 UART: [afmc] --
2,850,878 UART: [cold-reset] --
2,851,722 UART: [state] Locking Datavault
2,852,571 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,175 UART: [state] Locking ICCM
2,853,835 UART: [exit] Launching FMC @ 0x40000130
2,859,164 UART:
2,859,180 UART: Running Caliptra FMC ...
2,859,588 UART:
2,859,642 UART: [state] CFI Enabled
2,869,817 UART: [fht] FMC Alias Private Key: 7
2,977,268 UART: [art] Extend RT PCRs Done
2,977,696 UART: [art] Lock RT PCRs Done
2,979,130 UART: [art] Populate DV Done
2,987,271 UART: [fht] FMC Alias Private Key: 7
2,988,407 UART: [art] Derive CDI
2,988,687 UART: [art] Store in in slot 0x4
3,074,692 UART: [art] Derive Key Pair
3,075,052 UART: [art] Store priv key in slot 0x5
3,088,214 UART: [art] Derive Key Pair - Done
3,102,682 UART: [art] Signing Cert with AUTHO
3,103,162 UART: RITY.KEYID = 7
3,118,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,215 UART: [art] PUB.X = 2E9448F0EC5000AF7E730DF72479E797B60633CF9AE45C666C252EDF60F5F0B5B3251361790A8090BE214B563FE13D2E
3,125,956 UART: [art] PUB.Y = F3319F9178CAB6E3D0A96401BC176253A553BFBA56D29273D4C965FB07AD04485C01163FABE21CA7CECF223CB019C58E
3,132,906 UART: [art] SIG.R = AB3A1EA8EBCD528DE0AF5DBAB234257D79889B91A4DFD9227911CB45A0B105F9673EDCAF2D6ED6E74F974A13F42E9E1C
3,139,697 UART: [art] SIG.S = 6A174790B76E26B51F0A14436B006330BDE3E0750EC3DBFD4EB2FC9DB9ED9DBA55BBA318A49B14A5AE99240045C062C2
3,163,710 UART: Caliptra RT
3,163,963 UART: [state] CFI Enabled
3,270,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,120 UART: [rt]cmd =0x4d454153, len=108
3,321,969 >>> mbox cmd response data (12 bytes)
3,321,970 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,705 UART: [rt]cmd =0x44504543, len=92
3,543,370 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
893,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,845 UART: [kat] ++
897,997 UART: [kat] sha1
902,445 UART: [kat] SHA2-256
904,385 UART: [kat] SHA2-384
907,198 UART: [kat] SHA2-512-ACC
909,099 UART: [kat] ECC-384
919,058 UART: [kat] HMAC-384Kdf
923,546 UART: [kat] LMS
1,171,874 UART: [kat] --
1,172,559 UART: [cold-reset] ++
1,173,095 UART: [fht] FHT @ 0x50003400
1,175,660 UART: [idev] ++
1,175,828 UART: [idev] CDI.KEYID = 6
1,176,188 UART: [idev] SUBJECT.KEYID = 7
1,176,612 UART: [idev] UDS.KEYID = 0
1,176,957 ready_for_fw is high
1,176,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,406 UART: [idev] Erasing UDS.KEYID = 0
1,201,485 UART: [idev] Sha1 KeyId Algorithm
1,209,787 UART: [idev] --
1,210,775 UART: [ldev] ++
1,210,943 UART: [ldev] CDI.KEYID = 6
1,211,306 UART: [ldev] SUBJECT.KEYID = 5
1,211,732 UART: [ldev] AUTHORITY.KEYID = 7
1,212,195 UART: [ldev] FE.KEYID = 1
1,217,361 UART: [ldev] Erasing FE.KEYID = 1
1,244,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,279 UART: [ldev] --
1,283,784 UART: [fwproc] Wait for Commands...
1,284,498 UART: [fwproc] Recv command 0x46574c44
1,285,226 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,931 >>> mbox cmd response: success
2,774,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,776,011 UART: [afmc] ++
2,776,179 UART: [afmc] CDI.KEYID = 6
2,776,541 UART: [afmc] SUBJECT.KEYID = 7
2,776,966 UART: [afmc] AUTHORITY.KEYID = 5
2,813,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,206 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,934 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,819 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,538 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,362 UART: [afmc] --
2,856,314 UART: [cold-reset] --
2,857,158 UART: [state] Locking Datavault
2,858,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,013 UART: [state] Locking ICCM
2,859,511 UART: [exit] Launching FMC @ 0x40000130
2,864,840 UART:
2,864,856 UART: Running Caliptra FMC ...
2,865,264 UART:
2,865,318 UART: [state] CFI Enabled
2,875,869 UART: [fht] FMC Alias Private Key: 7
2,983,578 UART: [art] Extend RT PCRs Done
2,984,006 UART: [art] Lock RT PCRs Done
2,985,458 UART: [art] Populate DV Done
2,993,733 UART: [fht] FMC Alias Private Key: 7
2,994,751 UART: [art] Derive CDI
2,995,031 UART: [art] Store in in slot 0x4
3,081,102 UART: [art] Derive Key Pair
3,081,462 UART: [art] Store priv key in slot 0x5
3,094,506 UART: [art] Derive Key Pair - Done
3,109,258 UART: [art] Signing Cert with AUTHO
3,109,738 UART: RITY.KEYID = 7
3,124,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,549 UART: [art] PUB.X = 2E9448F0EC5000AF7E730DF72479E797B60633CF9AE45C666C252EDF60F5F0B5B3251361790A8090BE214B563FE13D2E
3,132,290 UART: [art] PUB.Y = F3319F9178CAB6E3D0A96401BC176253A553BFBA56D29273D4C965FB07AD04485C01163FABE21CA7CECF223CB019C58E
3,139,240 UART: [art] SIG.R = AB3A1EA8EBCD528DE0AF5DBAB234257D79889B91A4DFD9227911CB45A0B105F9673EDCAF2D6ED6E74F974A13F42E9E1C
3,146,031 UART: [art] SIG.S = 6A174790B76E26B51F0A14436B006330BDE3E0750EC3DBFD4EB2FC9DB9ED9DBA55BBA318A49B14A5AE99240045C062C2
3,170,078 UART: Caliptra RT
3,170,331 UART: [state] CFI Enabled
3,277,862 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,922 UART: [rt]cmd =0x44504543, len=96
3,342,051 >>> mbox cmd response data (56 bytes)
3,342,052 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,953 UART: [rt]cmd =0x44504543, len=92
3,563,926 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,015 >>> mbox cmd response data (12 bytes)
1,142,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,987 >>> mbox cmd response: success
2,626,987 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,517 UART:
2,689,533 UART: Running Caliptra FMC ...
2,689,941 UART:
2,689,995 UART: [state] CFI Enabled
2,700,232 UART: [fht] FMC Alias Private Key: 7
2,808,005 UART: [art] Extend RT PCRs Done
2,808,433 UART: [art] Lock RT PCRs Done
2,809,893 UART: [art] Populate DV Done
2,818,160 UART: [fht] FMC Alias Private Key: 7
2,819,172 UART: [art] Derive CDI
2,819,452 UART: [art] Store in in slot 0x4
2,904,771 UART: [art] Derive Key Pair
2,905,131 UART: [art] Store priv key in slot 0x5
2,918,289 UART: [art] Derive Key Pair - Done
2,932,961 UART: [art] Signing Cert with AUTHO
2,933,441 UART: RITY.KEYID = 7
2,948,409 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,174 UART: [art] PUB.X = D93FA0280DF55556AAE8789AF77298BA4C8468BE11A483CC000A40ACF3C143426DCF58EE0EBCA83D4CD2B257ACACF4A6
2,955,935 UART: [art] PUB.Y = 2B565C2730A6628024D84F7E325E7944C0AEA32D4D2C61ADE70A849832ACCF43B0080D3737047432D58E3259785E9865
2,962,865 UART: [art] SIG.R = 952965E60348AA0A1551D90A6CB19E61B028F9B7551F1B09F9983D7884DB06CB887184C0D484B595BDAE0E8B7352F36C
2,969,617 UART: [art] SIG.S = 3AEBE2E63FEA478FD94913B160A6D249C53F832C8A16365C081552C171860947B667467C336F7060702BFF2F8CB0510E
2,993,547 UART: Caliptra RT
2,993,800 UART: [state] CFI Enabled
3,114,503 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,443 UART: [rt]cmd =0x44504543, len=92
3,337,224 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,751 ready_for_fw is high
1,059,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,238 >>> mbox cmd response: success
2,624,238 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,686,704 UART:
2,686,720 UART: Running Caliptra FMC ...
2,687,128 UART:
2,687,182 UART: [state] CFI Enabled
2,697,669 UART: [fht] FMC Alias Private Key: 7
2,805,940 UART: [art] Extend RT PCRs Done
2,806,368 UART: [art] Lock RT PCRs Done
2,807,870 UART: [art] Populate DV Done
2,816,245 UART: [fht] FMC Alias Private Key: 7
2,817,217 UART: [art] Derive CDI
2,817,497 UART: [art] Store in in slot 0x4
2,903,192 UART: [art] Derive Key Pair
2,903,552 UART: [art] Store priv key in slot 0x5
2,916,154 UART: [art] Derive Key Pair - Done
2,930,982 UART: [art] Signing Cert with AUTHO
2,931,462 UART: RITY.KEYID = 7
2,946,846 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,611 UART: [art] PUB.X = D93FA0280DF55556AAE8789AF77298BA4C8468BE11A483CC000A40ACF3C143426DCF58EE0EBCA83D4CD2B257ACACF4A6
2,954,372 UART: [art] PUB.Y = 2B565C2730A6628024D84F7E325E7944C0AEA32D4D2C61ADE70A849832ACCF43B0080D3737047432D58E3259785E9865
2,961,302 UART: [art] SIG.R = 952965E60348AA0A1551D90A6CB19E61B028F9B7551F1B09F9983D7884DB06CB887184C0D484B595BDAE0E8B7352F36C
2,968,054 UART: [art] SIG.S = 3AEBE2E63FEA478FD94913B160A6D249C53F832C8A16365C081552C171860947B667467C336F7060702BFF2F8CB0510E
2,992,042 UART: Caliptra RT
2,992,295 UART: [state] CFI Enabled
3,099,172 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,222 UART: [rt]cmd =0x4d454153, len=108
3,151,179 >>> mbox cmd response data (12 bytes)
3,151,180 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,047 UART: [rt]cmd =0x44504543, len=92
3,373,148 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,735 ready_for_fw is high
1,059,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,442 >>> mbox cmd response: success
2,624,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,228 UART:
2,686,244 UART: Running Caliptra FMC ...
2,686,652 UART:
2,686,706 UART: [state] CFI Enabled
2,697,219 UART: [fht] FMC Alias Private Key: 7
2,805,692 UART: [art] Extend RT PCRs Done
2,806,120 UART: [art] Lock RT PCRs Done
2,807,632 UART: [art] Populate DV Done
2,815,967 UART: [fht] FMC Alias Private Key: 7
2,817,045 UART: [art] Derive CDI
2,817,325 UART: [art] Store in in slot 0x4
2,903,032 UART: [art] Derive Key Pair
2,903,392 UART: [art] Store priv key in slot 0x5
2,916,346 UART: [art] Derive Key Pair - Done
2,931,522 UART: [art] Signing Cert with AUTHO
2,932,002 UART: RITY.KEYID = 7
2,947,502 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,267 UART: [art] PUB.X = D93FA0280DF55556AAE8789AF77298BA4C8468BE11A483CC000A40ACF3C143426DCF58EE0EBCA83D4CD2B257ACACF4A6
2,955,028 UART: [art] PUB.Y = 2B565C2730A6628024D84F7E325E7944C0AEA32D4D2C61ADE70A849832ACCF43B0080D3737047432D58E3259785E9865
2,961,958 UART: [art] SIG.R = 952965E60348AA0A1551D90A6CB19E61B028F9B7551F1B09F9983D7884DB06CB887184C0D484B595BDAE0E8B7352F36C
2,968,710 UART: [art] SIG.S = 3AEBE2E63FEA478FD94913B160A6D249C53F832C8A16365C081552C171860947B667467C336F7060702BFF2F8CB0510E
2,992,812 UART: Caliptra RT
2,993,065 UART: [state] CFI Enabled
3,101,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,184 UART: [rt]cmd =0x44504543, len=96
3,164,567 >>> mbox cmd response data (56 bytes)
3,164,568 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,411 UART: [rt]cmd =0x44504543, len=92
3,385,212 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
Truncated 4783 bytes from beginning
7
3,129,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,889 UART: [art] PUB.X = F56BF3A026D92E4D9CF2C0F5DA3E71E2D455BD3153B6737A6369FD03DED698367475CC4E25EDDBD06DA1EAE7405F24E4
3,136,674 UART: [art] PUB.Y = B550B50FFAC1A3571663464E4E53EA5A1FEEF3345C85ADDF0EBE1445306A72184A5375F57C0416F5F01B63CF3AAC5CBC
3,143,631 UART: [art] SIG.R = 4415BBB064E42765D8CF8A2A33ACC03E2A5D2714D485FA03623A197D92EF34C28FBF8BBAF75E796F1C5EEFA290D0E17F
3,150,416 UART: [art] SIG.S = F63D5A75716B390AD3484A6F229FBCAF63CD5AF424C0A9869D4F6B09D2661FFEBC5F475F9A54D7DB149EE96B9145B79D
3,174,379 UART: Caliptra RT
3,174,724 UART: [state] CFI Enabled
3,294,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,271 UART: [rt]cmd =0x44504543, len=92
3,516,441 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
893,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,482 UART: [kat] ++
897,634 UART: [kat] sha1
901,808 UART: [kat] SHA2-256
903,748 UART: [kat] SHA2-384
906,437 UART: [kat] SHA2-512-ACC
908,338 UART: [kat] ECC-384
918,211 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,171,884 UART: [cold-reset] ++
1,172,430 UART: [fht] FHT @ 0x50003400
1,175,115 UART: [idev] ++
1,175,283 UART: [idev] CDI.KEYID = 6
1,175,643 UART: [idev] SUBJECT.KEYID = 7
1,176,067 UART: [idev] UDS.KEYID = 0
1,176,412 ready_for_fw is high
1,176,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,901 UART: [idev] Erasing UDS.KEYID = 0
1,200,722 UART: [idev] Sha1 KeyId Algorithm
1,209,172 UART: [idev] --
1,210,228 UART: [ldev] ++
1,210,396 UART: [ldev] CDI.KEYID = 6
1,210,759 UART: [ldev] SUBJECT.KEYID = 5
1,211,185 UART: [ldev] AUTHORITY.KEYID = 7
1,211,648 UART: [ldev] FE.KEYID = 1
1,217,056 UART: [ldev] Erasing FE.KEYID = 1
1,243,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,118 UART: [ldev] --
1,283,405 UART: [fwproc] Wait for Commands...
1,284,091 UART: [fwproc] Recv command 0x46574c44
1,284,819 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,591 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,042 >>> mbox cmd response: success
2,773,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,774,172 UART: [afmc] ++
2,774,340 UART: [afmc] CDI.KEYID = 6
2,774,702 UART: [afmc] SUBJECT.KEYID = 7
2,775,127 UART: [afmc] AUTHORITY.KEYID = 5
2,810,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,389 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,117 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,517 UART: [afmc] --
2,854,441 UART: [cold-reset] --
2,855,343 UART: [state] Locking Datavault
2,856,514 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,118 UART: [state] Locking ICCM
2,857,558 UART: [exit] Launching FMC @ 0x40000130
2,862,887 UART:
2,862,903 UART: Running Caliptra FMC ...
2,863,311 UART:
2,863,454 UART: [state] CFI Enabled
2,874,379 UART: [fht] FMC Alias Private Key: 7
2,981,248 UART: [art] Extend RT PCRs Done
2,981,676 UART: [art] Lock RT PCRs Done
2,983,516 UART: [art] Populate DV Done
2,991,773 UART: [fht] FMC Alias Private Key: 7
2,992,875 UART: [art] Derive CDI
2,993,155 UART: [art] Store in in slot 0x4
3,078,490 UART: [art] Derive Key Pair
3,078,850 UART: [art] Store priv key in slot 0x5
3,091,480 UART: [art] Derive Key Pair - Done
3,106,437 UART: [art] Signing Cert with AUTHO
3,106,917 UART: RITY.KEYID = 7
3,121,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,724 UART: [art] PUB.X = F56BF3A026D92E4D9CF2C0F5DA3E71E2D455BD3153B6737A6369FD03DED698367475CC4E25EDDBD06DA1EAE7405F24E4
3,129,509 UART: [art] PUB.Y = B550B50FFAC1A3571663464E4E53EA5A1FEEF3345C85ADDF0EBE1445306A72184A5375F57C0416F5F01B63CF3AAC5CBC
3,136,466 UART: [art] SIG.R = 4415BBB064E42765D8CF8A2A33ACC03E2A5D2714D485FA03623A197D92EF34C28FBF8BBAF75E796F1C5EEFA290D0E17F
3,143,251 UART: [art] SIG.S = F63D5A75716B390AD3484A6F229FBCAF63CD5AF424C0A9869D4F6B09D2661FFEBC5F475F9A54D7DB149EE96B9145B79D
3,166,696 UART: Caliptra RT
3,167,041 UART: [state] CFI Enabled
3,274,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,932 UART: [rt]cmd =0x4d454153, len=108
3,326,489 >>> mbox cmd response data (12 bytes)
3,326,490 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,507 UART: [rt]cmd =0x44504543, len=92
3,547,697 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
87,024 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
893,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,974 UART: [kat] ++
898,126 UART: [kat] sha1
902,542 UART: [kat] SHA2-256
904,482 UART: [kat] SHA2-384
907,169 UART: [kat] SHA2-512-ACC
909,070 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,271 UART: [kat] LMS
1,171,599 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,172,948 UART: [fht] FHT @ 0x50003400
1,175,817 UART: [idev] ++
1,175,985 UART: [idev] CDI.KEYID = 6
1,176,345 UART: [idev] SUBJECT.KEYID = 7
1,176,769 UART: [idev] UDS.KEYID = 0
1,177,114 ready_for_fw is high
1,177,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,457 UART: [idev] Erasing UDS.KEYID = 0
1,201,584 UART: [idev] Sha1 KeyId Algorithm
1,210,038 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,988 UART: [ldev] --
1,283,475 UART: [fwproc] Wait for Commands...
1,284,197 UART: [fwproc] Recv command 0x46574c44
1,284,925 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,869 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,774 >>> mbox cmd response: success
2,774,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,776,022 UART: [afmc] ++
2,776,190 UART: [afmc] CDI.KEYID = 6
2,776,552 UART: [afmc] SUBJECT.KEYID = 7
2,776,977 UART: [afmc] AUTHORITY.KEYID = 5
2,812,426 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,840 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,239 UART: [afmc] --
2,855,125 UART: [cold-reset] --
2,855,739 UART: [state] Locking Datavault
2,856,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,498 UART: [state] Locking ICCM
2,858,066 UART: [exit] Launching FMC @ 0x40000130
2,863,395 UART:
2,863,411 UART: Running Caliptra FMC ...
2,863,819 UART:
2,863,962 UART: [state] CFI Enabled
2,874,493 UART: [fht] FMC Alias Private Key: 7
2,982,600 UART: [art] Extend RT PCRs Done
2,983,028 UART: [art] Lock RT PCRs Done
2,984,570 UART: [art] Populate DV Done
2,992,641 UART: [fht] FMC Alias Private Key: 7
2,993,763 UART: [art] Derive CDI
2,994,043 UART: [art] Store in in slot 0x4
3,079,330 UART: [art] Derive Key Pair
3,079,690 UART: [art] Store priv key in slot 0x5
3,092,938 UART: [art] Derive Key Pair - Done
3,107,407 UART: [art] Signing Cert with AUTHO
3,107,887 UART: RITY.KEYID = 7
3,123,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,800 UART: [art] PUB.X = F56BF3A026D92E4D9CF2C0F5DA3E71E2D455BD3153B6737A6369FD03DED698367475CC4E25EDDBD06DA1EAE7405F24E4
3,130,585 UART: [art] PUB.Y = B550B50FFAC1A3571663464E4E53EA5A1FEEF3345C85ADDF0EBE1445306A72184A5375F57C0416F5F01B63CF3AAC5CBC
3,137,542 UART: [art] SIG.R = 4415BBB064E42765D8CF8A2A33ACC03E2A5D2714D485FA03623A197D92EF34C28FBF8BBAF75E796F1C5EEFA290D0E17F
3,144,327 UART: [art] SIG.S = F63D5A75716B390AD3484A6F229FBCAF63CD5AF424C0A9869D4F6B09D2661FFEBC5F475F9A54D7DB149EE96B9145B79D
3,168,224 UART: Caliptra RT
3,168,569 UART: [state] CFI Enabled
3,276,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,694 UART: [rt]cmd =0x44504543, len=96
3,339,505 >>> mbox cmd response data (56 bytes)
3,339,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,419 UART: [rt]cmd =0x44504543, len=92
3,560,497 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,168 >>> mbox cmd response data (12 bytes)
1,143,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,658 >>> mbox cmd response: success
2,626,658 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,464 UART:
2,689,480 UART: Running Caliptra FMC ...
2,689,888 UART:
2,690,031 UART: [state] CFI Enabled
2,700,754 UART: [fht] FMC Alias Private Key: 7
2,808,145 UART: [art] Extend RT PCRs Done
2,808,573 UART: [art] Lock RT PCRs Done
2,810,025 UART: [art] Populate DV Done
2,818,374 UART: [fht] FMC Alias Private Key: 7
2,819,338 UART: [art] Derive CDI
2,819,618 UART: [art] Store in in slot 0x4
2,905,435 UART: [art] Derive Key Pair
2,905,795 UART: [art] Store priv key in slot 0x5
2,918,929 UART: [art] Derive Key Pair - Done
2,933,481 UART: [art] Signing Cert with AUTHO
2,933,961 UART: RITY.KEYID = 7
2,949,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,242 UART: [art] PUB.X = 66B7A92535808F4E33278658ACF4FC78F9BF50B734DD2D438AFE9610F80AB83903E2A287A6D2BC2F6C35B51764CA7D4B
2,957,014 UART: [art] PUB.Y = F960E980496F54DC9EC701DA014F6778F0D1D369643516E9FCC5BA305D0CAEF4BB786E121EF9DACCE38E70DA8DE89034
2,963,971 UART: [art] SIG.R = A8601D30E66B0EB4B482C334628D6A157879032F039F158A22AA5D00BC2B8049B3F671CE2E2D01774BC2A07FE99024D9
2,970,707 UART: [art] SIG.S = 35B14944AA9439B97966A79857CEF4F19E539F6AB0665F568FDAB029EF3196056285360CB40DB274B8D89B0D04F7B4F7
2,994,545 UART: Caliptra RT
2,994,890 UART: [state] CFI Enabled
3,114,511 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,145,759 UART: [rt]cmd =0x44504543, len=92
3,336,789 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,010 ready_for_fw is high
1,061,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,993 >>> mbox cmd response: success
2,624,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,686,455 UART:
2,686,471 UART: Running Caliptra FMC ...
2,686,879 UART:
2,687,022 UART: [state] CFI Enabled
2,697,283 UART: [fht] FMC Alias Private Key: 7
2,805,362 UART: [art] Extend RT PCRs Done
2,805,790 UART: [art] Lock RT PCRs Done
2,807,692 UART: [art] Populate DV Done
2,815,819 UART: [fht] FMC Alias Private Key: 7
2,816,979 UART: [art] Derive CDI
2,817,259 UART: [art] Store in in slot 0x4
2,903,380 UART: [art] Derive Key Pair
2,903,740 UART: [art] Store priv key in slot 0x5
2,916,978 UART: [art] Derive Key Pair - Done
2,931,840 UART: [art] Signing Cert with AUTHO
2,932,320 UART: RITY.KEYID = 7
2,947,402 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,167 UART: [art] PUB.X = 66B7A92535808F4E33278658ACF4FC78F9BF50B734DD2D438AFE9610F80AB83903E2A287A6D2BC2F6C35B51764CA7D4B
2,954,939 UART: [art] PUB.Y = F960E980496F54DC9EC701DA014F6778F0D1D369643516E9FCC5BA305D0CAEF4BB786E121EF9DACCE38E70DA8DE89034
2,961,896 UART: [art] SIG.R = A8601D30E66B0EB4B482C334628D6A157879032F039F158A22AA5D00BC2B8049B3F671CE2E2D01774BC2A07FE99024D9
2,968,632 UART: [art] SIG.S = 35B14944AA9439B97966A79857CEF4F19E539F6AB0665F568FDAB029EF3196056285360CB40DB274B8D89B0D04F7B4F7
2,992,664 UART: Caliptra RT
2,993,009 UART: [state] CFI Enabled
3,101,262 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,240 UART: [rt]cmd =0x4d454153, len=108
3,152,577 >>> mbox cmd response data (12 bytes)
3,152,578 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,635 UART: [rt]cmd =0x44504543, len=92
3,374,509 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,406 ready_for_fw is high
1,061,406 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,401 >>> mbox cmd response: success
2,626,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,688,003 UART:
2,688,019 UART: Running Caliptra FMC ...
2,688,427 UART:
2,688,570 UART: [state] CFI Enabled
2,699,319 UART: [fht] FMC Alias Private Key: 7
2,807,558 UART: [art] Extend RT PCRs Done
2,807,986 UART: [art] Lock RT PCRs Done
2,809,382 UART: [art] Populate DV Done
2,817,707 UART: [fht] FMC Alias Private Key: 7
2,818,881 UART: [art] Derive CDI
2,819,161 UART: [art] Store in in slot 0x4
2,904,584 UART: [art] Derive Key Pair
2,904,944 UART: [art] Store priv key in slot 0x5
2,918,726 UART: [art] Derive Key Pair - Done
2,933,292 UART: [art] Signing Cert with AUTHO
2,933,772 UART: RITY.KEYID = 7
2,949,106 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,871 UART: [art] PUB.X = 66B7A92535808F4E33278658ACF4FC78F9BF50B734DD2D438AFE9610F80AB83903E2A287A6D2BC2F6C35B51764CA7D4B
2,956,643 UART: [art] PUB.Y = F960E980496F54DC9EC701DA014F6778F0D1D369643516E9FCC5BA305D0CAEF4BB786E121EF9DACCE38E70DA8DE89034
2,963,600 UART: [art] SIG.R = A8601D30E66B0EB4B482C334628D6A157879032F039F158A22AA5D00BC2B8049B3F671CE2E2D01774BC2A07FE99024D9
2,970,336 UART: [art] SIG.S = 35B14944AA9439B97966A79857CEF4F19E539F6AB0665F568FDAB029EF3196056285360CB40DB274B8D89B0D04F7B4F7
2,994,092 UART: Caliptra RT
2,994,437 UART: [state] CFI Enabled
3,103,602 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,380 UART: [rt]cmd =0x44504543, len=96
3,167,115 >>> mbox cmd response data (56 bytes)
3,167,116 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,885 UART: [rt]cmd =0x44504543, len=92
3,388,611 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.71s
Truncated 4783 bytes from beginning
7
3,121,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,240 UART: [art] PUB.X = EBED353872596C7C0EF1A54CFFA0BCFDFDF8C4A332A091DA4D640991D9E688178B75D7B12A75A9D3671CE420B7EB1936
3,129,020 UART: [art] PUB.Y = 4871275E018FC3CC536E818946EEA9EB72BA702777ACB8B07246AFC569E1EF49B126C0BF2DD5768462C0CDA47A170F32
3,135,972 UART: [art] SIG.R = 6340A5A3D1C1ED7ACAC50C1B108CEAD5F47F4E1D70866689606915DEE2EB21AADCFA9304466289C5F99F4CCB54358263
3,142,748 UART: [art] SIG.S = 87F6B85A021D9CA30EB67F50745869A0D6E1631EDA8DEDDDD04DCDB36FCC44269B0D4C94B9F6EFBF64728FAF08DEFE25
3,166,419 UART: Caliptra RT
3,166,672 UART: [state] CFI Enabled
3,286,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,429 UART: [rt]cmd =0x44504543, len=92
3,508,019 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
891,604 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,910 UART: [kat] LMS
1,169,222 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,174,239 ready_for_fw is high
1,174,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,565 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,207,211 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,192 UART: [ldev] Erasing FE.KEYID = 1
1,241,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,822 UART: [ldev] --
1,280,102 UART: [fwproc] Wait for Commands...
1,280,789 UART: [fwproc] Recv command 0x46574c44
1,281,522 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,249 >>> mbox cmd response: success
2,769,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,770,300 UART: [afmc] ++
2,770,468 UART: [afmc] CDI.KEYID = 6
2,770,831 UART: [afmc] SUBJECT.KEYID = 7
2,771,257 UART: [afmc] AUTHORITY.KEYID = 5
2,806,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,846 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,729 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,448 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,235 UART: [afmc] --
2,849,273 UART: [cold-reset] --
2,850,257 UART: [state] Locking Datavault
2,851,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,926 UART: [state] Locking ICCM
2,852,502 UART: [exit] Launching FMC @ 0x40000130
2,857,831 UART:
2,857,847 UART: Running Caliptra FMC ...
2,858,255 UART:
2,858,309 UART: [state] CFI Enabled
2,868,562 UART: [fht] FMC Alias Private Key: 7
2,976,963 UART: [art] Extend RT PCRs Done
2,977,391 UART: [art] Lock RT PCRs Done
2,979,323 UART: [art] Populate DV Done
2,987,388 UART: [fht] FMC Alias Private Key: 7
2,988,520 UART: [art] Derive CDI
2,988,800 UART: [art] Store in in slot 0x4
3,074,431 UART: [art] Derive Key Pair
3,074,791 UART: [art] Store priv key in slot 0x5
3,088,007 UART: [art] Derive Key Pair - Done
3,102,666 UART: [art] Signing Cert with AUTHO
3,103,146 UART: RITY.KEYID = 7
3,118,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,567 UART: [art] PUB.X = EBED353872596C7C0EF1A54CFFA0BCFDFDF8C4A332A091DA4D640991D9E688178B75D7B12A75A9D3671CE420B7EB1936
3,126,347 UART: [art] PUB.Y = 4871275E018FC3CC536E818946EEA9EB72BA702777ACB8B07246AFC569E1EF49B126C0BF2DD5768462C0CDA47A170F32
3,133,299 UART: [art] SIG.R = 6340A5A3D1C1ED7ACAC50C1B108CEAD5F47F4E1D70866689606915DEE2EB21AADCFA9304466289C5F99F4CCB54358263
3,140,075 UART: [art] SIG.S = 87F6B85A021D9CA30EB67F50745869A0D6E1631EDA8DEDDDD04DCDB36FCC44269B0D4C94B9F6EFBF64728FAF08DEFE25
3,163,734 UART: Caliptra RT
3,163,987 UART: [state] CFI Enabled
3,272,384 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,608 UART: [rt]cmd =0x4d454153, len=108
3,324,003 >>> mbox cmd response data (12 bytes)
3,324,004 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,353,979 UART: [rt]cmd =0x44504543, len=92
3,545,673 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,587 UART: [kat] ++
895,739 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
905,044 UART: [kat] SHA2-512-ACC
906,945 UART: [kat] ECC-384
916,810 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,255 UART: [cold-reset] ++
1,170,751 UART: [fht] FHT @ 0x50003400
1,173,571 UART: [idev] ++
1,173,739 UART: [idev] CDI.KEYID = 6
1,174,100 UART: [idev] SUBJECT.KEYID = 7
1,174,525 UART: [idev] UDS.KEYID = 0
1,174,871 ready_for_fw is high
1,174,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,199,175 UART: [idev] Sha1 KeyId Algorithm
1,208,031 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,281,016 UART: [fwproc] Wait for Commands...
1,281,677 UART: [fwproc] Recv command 0x46574c44
1,282,410 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,002 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,311 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,805 >>> mbox cmd response: success
2,769,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,770,844 UART: [afmc] ++
2,771,012 UART: [afmc] CDI.KEYID = 6
2,771,375 UART: [afmc] SUBJECT.KEYID = 7
2,771,801 UART: [afmc] AUTHORITY.KEYID = 5
2,806,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,810 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,412 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,261 UART: [afmc] --
2,850,305 UART: [cold-reset] --
2,851,139 UART: [state] Locking Datavault
2,852,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,868 UART: [state] Locking ICCM
2,853,390 UART: [exit] Launching FMC @ 0x40000130
2,858,719 UART:
2,858,735 UART: Running Caliptra FMC ...
2,859,143 UART:
2,859,197 UART: [state] CFI Enabled
2,869,722 UART: [fht] FMC Alias Private Key: 7
2,977,713 UART: [art] Extend RT PCRs Done
2,978,141 UART: [art] Lock RT PCRs Done
2,979,791 UART: [art] Populate DV Done
2,988,330 UART: [fht] FMC Alias Private Key: 7
2,989,358 UART: [art] Derive CDI
2,989,638 UART: [art] Store in in slot 0x4
3,075,409 UART: [art] Derive Key Pair
3,075,769 UART: [art] Store priv key in slot 0x5
3,089,171 UART: [art] Derive Key Pair - Done
3,103,928 UART: [art] Signing Cert with AUTHO
3,104,408 UART: RITY.KEYID = 7
3,119,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,513 UART: [art] PUB.X = EBED353872596C7C0EF1A54CFFA0BCFDFDF8C4A332A091DA4D640991D9E688178B75D7B12A75A9D3671CE420B7EB1936
3,127,293 UART: [art] PUB.Y = 4871275E018FC3CC536E818946EEA9EB72BA702777ACB8B07246AFC569E1EF49B126C0BF2DD5768462C0CDA47A170F32
3,134,245 UART: [art] SIG.R = 6340A5A3D1C1ED7ACAC50C1B108CEAD5F47F4E1D70866689606915DEE2EB21AADCFA9304466289C5F99F4CCB54358263
3,141,021 UART: [art] SIG.S = 87F6B85A021D9CA30EB67F50745869A0D6E1631EDA8DEDDDD04DCDB36FCC44269B0D4C94B9F6EFBF64728FAF08DEFE25
3,164,490 UART: Caliptra RT
3,164,743 UART: [state] CFI Enabled
3,272,196 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,192 UART: [rt]cmd =0x44504543, len=96
3,335,457 >>> mbox cmd response data (56 bytes)
3,335,458 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,213 UART: [rt]cmd =0x44504543, len=92
3,556,315 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,138,930 >>> mbox cmd response data (12 bytes)
1,138,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,829 >>> mbox cmd response: success
2,623,829 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,685,357 UART:
2,685,373 UART: Running Caliptra FMC ...
2,685,781 UART:
2,685,835 UART: [state] CFI Enabled
2,696,556 UART: [fht] FMC Alias Private Key: 7
2,804,597 UART: [art] Extend RT PCRs Done
2,805,025 UART: [art] Lock RT PCRs Done
2,806,481 UART: [art] Populate DV Done
2,814,792 UART: [fht] FMC Alias Private Key: 7
2,815,786 UART: [art] Derive CDI
2,816,066 UART: [art] Store in in slot 0x4
2,901,793 UART: [art] Derive Key Pair
2,902,153 UART: [art] Store priv key in slot 0x5
2,915,441 UART: [art] Derive Key Pair - Done
2,930,283 UART: [art] Signing Cert with AUTHO
2,930,763 UART: RITY.KEYID = 7
2,946,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,834 UART: [art] PUB.X = 848F53DE47872FA183868AD3A7604D03EE0538D1D2C74B77DDDCACFD85A95370CF871DED0822FE2C252FD370C4FF181A
2,953,609 UART: [art] PUB.Y = 9A08A02939E4148680AD194885790609E513BA9FFBD864B56C139D08ACF87E0409D1760C791C8DD537813D4D1803DCE7
2,960,531 UART: [art] SIG.R = BC7508CEAA9F6D192C99235FA72649C13DEE26817027E7B41FAF0150353B77D299E423AC08EA3A0A0D0B2568D65834AD
2,967,289 UART: [art] SIG.S = B16593124FEE45A23AB830F39F9EE6AB32D0586A1B9FD83456CF4C29736E2D983B0CEBA8A61116753442C43890836347
2,991,317 UART: Caliptra RT
2,991,570 UART: [state] CFI Enabled
3,111,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,136 UART: [rt]cmd =0x44504543, len=92
3,334,178 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,476 ready_for_fw is high
1,056,476 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,895 >>> mbox cmd response: success
2,621,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,684,053 UART:
2,684,069 UART: Running Caliptra FMC ...
2,684,477 UART:
2,684,531 UART: [state] CFI Enabled
2,695,196 UART: [fht] FMC Alias Private Key: 7
2,802,811 UART: [art] Extend RT PCRs Done
2,803,239 UART: [art] Lock RT PCRs Done
2,804,895 UART: [art] Populate DV Done
2,813,028 UART: [fht] FMC Alias Private Key: 7
2,814,108 UART: [art] Derive CDI
2,814,388 UART: [art] Store in in slot 0x4
2,900,011 UART: [art] Derive Key Pair
2,900,371 UART: [art] Store priv key in slot 0x5
2,913,299 UART: [art] Derive Key Pair - Done
2,928,313 UART: [art] Signing Cert with AUTHO
2,928,793 UART: RITY.KEYID = 7
2,943,949 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,714 UART: [art] PUB.X = 848F53DE47872FA183868AD3A7604D03EE0538D1D2C74B77DDDCACFD85A95370CF871DED0822FE2C252FD370C4FF181A
2,951,489 UART: [art] PUB.Y = 9A08A02939E4148680AD194885790609E513BA9FFBD864B56C139D08ACF87E0409D1760C791C8DD537813D4D1803DCE7
2,958,411 UART: [art] SIG.R = BC7508CEAA9F6D192C99235FA72649C13DEE26817027E7B41FAF0150353B77D299E423AC08EA3A0A0D0B2568D65834AD
2,965,169 UART: [art] SIG.S = B16593124FEE45A23AB830F39F9EE6AB32D0586A1B9FD83456CF4C29736E2D983B0CEBA8A61116753442C43890836347
2,988,311 UART: Caliptra RT
2,988,564 UART: [state] CFI Enabled
3,096,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,742 UART: [rt]cmd =0x4d454153, len=108
3,147,643 >>> mbox cmd response data (12 bytes)
3,147,644 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,177,613 UART: [rt]cmd =0x44504543, len=92
3,368,621 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,924 ready_for_fw is high
1,055,924 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,657 >>> mbox cmd response: success
2,619,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,681,553 UART:
2,681,569 UART: Running Caliptra FMC ...
2,681,977 UART:
2,682,031 UART: [state] CFI Enabled
2,692,474 UART: [fht] FMC Alias Private Key: 7
2,800,931 UART: [art] Extend RT PCRs Done
2,801,359 UART: [art] Lock RT PCRs Done
2,802,749 UART: [art] Populate DV Done
2,810,716 UART: [fht] FMC Alias Private Key: 7
2,811,776 UART: [art] Derive CDI
2,812,056 UART: [art] Store in in slot 0x4
2,897,367 UART: [art] Derive Key Pair
2,897,727 UART: [art] Store priv key in slot 0x5
2,910,795 UART: [art] Derive Key Pair - Done
2,925,905 UART: [art] Signing Cert with AUTHO
2,926,385 UART: RITY.KEYID = 7
2,941,317 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,082 UART: [art] PUB.X = 848F53DE47872FA183868AD3A7604D03EE0538D1D2C74B77DDDCACFD85A95370CF871DED0822FE2C252FD370C4FF181A
2,948,857 UART: [art] PUB.Y = 9A08A02939E4148680AD194885790609E513BA9FFBD864B56C139D08ACF87E0409D1760C791C8DD537813D4D1803DCE7
2,955,779 UART: [art] SIG.R = BC7508CEAA9F6D192C99235FA72649C13DEE26817027E7B41FAF0150353B77D299E423AC08EA3A0A0D0B2568D65834AD
2,962,537 UART: [art] SIG.S = B16593124FEE45A23AB830F39F9EE6AB32D0586A1B9FD83456CF4C29736E2D983B0CEBA8A61116753442C43890836347
2,986,843 UART: Caliptra RT
2,987,096 UART: [state] CFI Enabled
3,094,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,804 UART: [rt]cmd =0x44504543, len=96
3,158,323 >>> mbox cmd response data (56 bytes)
3,158,324 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,145 UART: [rt]cmd =0x44504543, len=92
3,379,041 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.67s
Truncated 4783 bytes from beginning
7
3,125,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,303 UART: [art] PUB.X = 54A3174FF8C32819808F3B607BD38B698F44146EFD3C1B11249A204F5685D71F1437BBD497E9FFA67857F30E5323B2FC
3,133,070 UART: [art] PUB.Y = 5AF5F15AC7B9EEF334035AF364BC7188EF7E81B12740AF4E02C6699300A4DEBAC7E922608649206CF8BE4BEB51C22DDD
3,140,008 UART: [art] SIG.R = 8FE3290A73092AA5985F8A469ED3ABF7DEC8766FA3882ED5C51C0460AD55980E1E455840EA5B5B5B72FAC96278C987B6
3,146,774 UART: [art] SIG.S = 93F33F46EACEEA9A9E0FF2B431889F6B1C89500FC5DB58CBF5A4FF88EEA67081AF129ECC5188380FF347689BA2964858
3,170,744 UART: Caliptra RT
3,171,089 UART: [state] CFI Enabled
3,291,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,543 UART: [rt]cmd =0x44504543, len=92
3,512,606 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,637 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,530 UART: [cold-reset] ++
1,171,062 UART: [fht] FHT @ 0x50003400
1,173,556 UART: [idev] ++
1,173,724 UART: [idev] CDI.KEYID = 6
1,174,085 UART: [idev] SUBJECT.KEYID = 7
1,174,510 UART: [idev] UDS.KEYID = 0
1,174,856 ready_for_fw is high
1,174,856 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,176 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,241,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,551 UART: [ldev] --
1,280,911 UART: [fwproc] Wait for Commands...
1,281,664 UART: [fwproc] Recv command 0x46574c44
1,282,397 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,514 >>> mbox cmd response: success
2,771,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,772,691 UART: [afmc] ++
2,772,859 UART: [afmc] CDI.KEYID = 6
2,773,222 UART: [afmc] SUBJECT.KEYID = 7
2,773,648 UART: [afmc] AUTHORITY.KEYID = 5
2,809,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,122 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,841 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,698 UART: [afmc] --
2,852,718 UART: [cold-reset] --
2,853,592 UART: [state] Locking Datavault
2,854,701 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,305 UART: [state] Locking ICCM
2,855,869 UART: [exit] Launching FMC @ 0x40000130
2,861,198 UART:
2,861,214 UART: Running Caliptra FMC ...
2,861,622 UART:
2,861,765 UART: [state] CFI Enabled
2,872,446 UART: [fht] FMC Alias Private Key: 7
2,980,147 UART: [art] Extend RT PCRs Done
2,980,575 UART: [art] Lock RT PCRs Done
2,982,045 UART: [art] Populate DV Done
2,990,456 UART: [fht] FMC Alias Private Key: 7
2,991,630 UART: [art] Derive CDI
2,991,910 UART: [art] Store in in slot 0x4
3,077,627 UART: [art] Derive Key Pair
3,077,987 UART: [art] Store priv key in slot 0x5
3,091,253 UART: [art] Derive Key Pair - Done
3,105,987 UART: [art] Signing Cert with AUTHO
3,106,467 UART: RITY.KEYID = 7
3,121,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,384 UART: [art] PUB.X = 54A3174FF8C32819808F3B607BD38B698F44146EFD3C1B11249A204F5685D71F1437BBD497E9FFA67857F30E5323B2FC
3,129,151 UART: [art] PUB.Y = 5AF5F15AC7B9EEF334035AF364BC7188EF7E81B12740AF4E02C6699300A4DEBAC7E922608649206CF8BE4BEB51C22DDD
3,136,089 UART: [art] SIG.R = 8FE3290A73092AA5985F8A469ED3ABF7DEC8766FA3882ED5C51C0460AD55980E1E455840EA5B5B5B72FAC96278C987B6
3,142,855 UART: [art] SIG.S = 93F33F46EACEEA9A9E0FF2B431889F6B1C89500FC5DB58CBF5A4FF88EEA67081AF129ECC5188380FF347689BA2964858
3,166,919 UART: Caliptra RT
3,167,264 UART: [state] CFI Enabled
3,274,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,236 UART: [rt]cmd =0x4d454153, len=108
3,326,847 >>> mbox cmd response data (12 bytes)
3,326,848 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,811 UART: [rt]cmd =0x44504543, len=92
3,548,728 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,613 UART: [kat] HMAC-384Kdf
921,255 UART: [kat] LMS
1,169,567 UART: [kat] --
1,170,562 UART: [cold-reset] ++
1,171,120 UART: [fht] FHT @ 0x50003400
1,173,768 UART: [idev] ++
1,173,936 UART: [idev] CDI.KEYID = 6
1,174,297 UART: [idev] SUBJECT.KEYID = 7
1,174,722 UART: [idev] UDS.KEYID = 0
1,175,068 ready_for_fw is high
1,175,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,200,154 UART: [idev] Sha1 KeyId Algorithm
1,208,920 UART: [idev] --
1,210,073 UART: [ldev] ++
1,210,241 UART: [ldev] CDI.KEYID = 6
1,210,605 UART: [ldev] SUBJECT.KEYID = 5
1,211,032 UART: [ldev] AUTHORITY.KEYID = 7
1,211,495 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,243,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,677 UART: [ldev] --
1,283,173 UART: [fwproc] Wait for Commands...
1,283,872 UART: [fwproc] Recv command 0x46574c44
1,284,605 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,651 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,502 >>> mbox cmd response: success
2,773,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,585 UART: [afmc] ++
2,774,753 UART: [afmc] CDI.KEYID = 6
2,775,116 UART: [afmc] SUBJECT.KEYID = 7
2,775,542 UART: [afmc] AUTHORITY.KEYID = 5
2,811,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,271 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,154 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,873 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,688 UART: [afmc] --
2,854,628 UART: [cold-reset] --
2,855,524 UART: [state] Locking Datavault
2,856,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,373 UART: [state] Locking ICCM
2,857,967 UART: [exit] Launching FMC @ 0x40000130
2,863,296 UART:
2,863,312 UART: Running Caliptra FMC ...
2,863,720 UART:
2,863,863 UART: [state] CFI Enabled
2,874,290 UART: [fht] FMC Alias Private Key: 7
2,981,903 UART: [art] Extend RT PCRs Done
2,982,331 UART: [art] Lock RT PCRs Done
2,983,863 UART: [art] Populate DV Done
2,991,984 UART: [fht] FMC Alias Private Key: 7
2,992,928 UART: [art] Derive CDI
2,993,208 UART: [art] Store in in slot 0x4
3,078,801 UART: [art] Derive Key Pair
3,079,161 UART: [art] Store priv key in slot 0x5
3,092,667 UART: [art] Derive Key Pair - Done
3,107,395 UART: [art] Signing Cert with AUTHO
3,107,875 UART: RITY.KEYID = 7
3,123,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,992 UART: [art] PUB.X = 54A3174FF8C32819808F3B607BD38B698F44146EFD3C1B11249A204F5685D71F1437BBD497E9FFA67857F30E5323B2FC
3,130,759 UART: [art] PUB.Y = 5AF5F15AC7B9EEF334035AF364BC7188EF7E81B12740AF4E02C6699300A4DEBAC7E922608649206CF8BE4BEB51C22DDD
3,137,697 UART: [art] SIG.R = 8FE3290A73092AA5985F8A469ED3ABF7DEC8766FA3882ED5C51C0460AD55980E1E455840EA5B5B5B72FAC96278C987B6
3,144,463 UART: [art] SIG.S = 93F33F46EACEEA9A9E0FF2B431889F6B1C89500FC5DB58CBF5A4FF88EEA67081AF129ECC5188380FF347689BA2964858
3,168,425 UART: Caliptra RT
3,168,770 UART: [state] CFI Enabled
3,275,752 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,996 UART: [rt]cmd =0x44504543, len=96
3,339,851 >>> mbox cmd response data (56 bytes)
3,339,852 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,903 UART: [rt]cmd =0x44504543, len=92
3,561,604 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,577 >>> mbox cmd response data (12 bytes)
1,142,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,974 >>> mbox cmd response: success
2,627,974 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,689,988 UART:
2,690,004 UART: Running Caliptra FMC ...
2,690,412 UART:
2,690,555 UART: [state] CFI Enabled
2,701,530 UART: [fht] FMC Alias Private Key: 7
2,808,591 UART: [art] Extend RT PCRs Done
2,809,019 UART: [art] Lock RT PCRs Done
2,810,463 UART: [art] Populate DV Done
2,818,620 UART: [fht] FMC Alias Private Key: 7
2,819,686 UART: [art] Derive CDI
2,819,966 UART: [art] Store in in slot 0x4
2,905,821 UART: [art] Derive Key Pair
2,906,181 UART: [art] Store priv key in slot 0x5
2,920,135 UART: [art] Derive Key Pair - Done
2,935,069 UART: [art] Signing Cert with AUTHO
2,935,549 UART: RITY.KEYID = 7
2,950,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,494 UART: [art] PUB.X = 8C55D14AAEC2D6ACDDEEA135AAFDB86783337AA4AC4CEA70F33A29EFA872C6B2A5BB9C0E25A62F020FD753ED964A0064
2,958,261 UART: [art] PUB.Y = FED803F9DD8EC05C8F22962B31978971BE76DBB92118031B6841E0FFCC51753786DC9A0BB5DAFC50F9102F02FE624C74
2,965,209 UART: [art] SIG.R = 90D495F61E5BC9FC84723042D4091800C6A4562817D2A642C775A5D0094F43130BA1E144150347828EDD68939F6A6B7B
2,971,935 UART: [art] SIG.S = 63BECC541104F26BBE7B0A85EA0B47A3C79793F3D9D5C204AC3D0BA473A56E04F633F455D8F71CBB35668D8707858C7B
2,995,467 UART: Caliptra RT
2,995,812 UART: [state] CFI Enabled
3,116,075 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,146,975 UART: [rt]cmd =0x44504543, len=92
3,338,282 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,607 ready_for_fw is high
1,056,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,250 >>> mbox cmd response: success
2,623,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,685,060 UART:
2,685,076 UART: Running Caliptra FMC ...
2,685,484 UART:
2,685,627 UART: [state] CFI Enabled
2,696,428 UART: [fht] FMC Alias Private Key: 7
2,804,255 UART: [art] Extend RT PCRs Done
2,804,683 UART: [art] Lock RT PCRs Done
2,806,347 UART: [art] Populate DV Done
2,814,370 UART: [fht] FMC Alias Private Key: 7
2,815,474 UART: [art] Derive CDI
2,815,754 UART: [art] Store in in slot 0x4
2,901,511 UART: [art] Derive Key Pair
2,901,871 UART: [art] Store priv key in slot 0x5
2,915,433 UART: [art] Derive Key Pair - Done
2,930,249 UART: [art] Signing Cert with AUTHO
2,930,729 UART: RITY.KEYID = 7
2,946,289 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,054 UART: [art] PUB.X = 8C55D14AAEC2D6ACDDEEA135AAFDB86783337AA4AC4CEA70F33A29EFA872C6B2A5BB9C0E25A62F020FD753ED964A0064
2,953,821 UART: [art] PUB.Y = FED803F9DD8EC05C8F22962B31978971BE76DBB92118031B6841E0FFCC51753786DC9A0BB5DAFC50F9102F02FE624C74
2,960,769 UART: [art] SIG.R = 90D495F61E5BC9FC84723042D4091800C6A4562817D2A642C775A5D0094F43130BA1E144150347828EDD68939F6A6B7B
2,967,495 UART: [art] SIG.S = 63BECC541104F26BBE7B0A85EA0B47A3C79793F3D9D5C204AC3D0BA473A56E04F633F455D8F71CBB35668D8707858C7B
2,990,959 UART: Caliptra RT
2,991,304 UART: [state] CFI Enabled
3,098,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,759 UART: [rt]cmd =0x4d454153, len=108
3,150,444 >>> mbox cmd response data (12 bytes)
3,150,445 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,414 UART: [rt]cmd =0x44504543, len=92
3,371,509 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,421 ready_for_fw is high
1,056,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,436 >>> mbox cmd response: success
2,620,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,683,522 UART:
2,683,538 UART: Running Caliptra FMC ...
2,683,946 UART:
2,684,089 UART: [state] CFI Enabled
2,694,642 UART: [fht] FMC Alias Private Key: 7
2,802,553 UART: [art] Extend RT PCRs Done
2,802,981 UART: [art] Lock RT PCRs Done
2,804,697 UART: [art] Populate DV Done
2,813,052 UART: [fht] FMC Alias Private Key: 7
2,814,150 UART: [art] Derive CDI
2,814,430 UART: [art] Store in in slot 0x4
2,899,719 UART: [art] Derive Key Pair
2,900,079 UART: [art] Store priv key in slot 0x5
2,913,701 UART: [art] Derive Key Pair - Done
2,928,469 UART: [art] Signing Cert with AUTHO
2,928,949 UART: RITY.KEYID = 7
2,944,665 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,430 UART: [art] PUB.X = 8C55D14AAEC2D6ACDDEEA135AAFDB86783337AA4AC4CEA70F33A29EFA872C6B2A5BB9C0E25A62F020FD753ED964A0064
2,952,197 UART: [art] PUB.Y = FED803F9DD8EC05C8F22962B31978971BE76DBB92118031B6841E0FFCC51753786DC9A0BB5DAFC50F9102F02FE624C74
2,959,145 UART: [art] SIG.R = 90D495F61E5BC9FC84723042D4091800C6A4562817D2A642C775A5D0094F43130BA1E144150347828EDD68939F6A6B7B
2,965,871 UART: [art] SIG.S = 63BECC541104F26BBE7B0A85EA0B47A3C79793F3D9D5C204AC3D0BA473A56E04F633F455D8F71CBB35668D8707858C7B
2,989,163 UART: Caliptra RT
2,989,508 UART: [state] CFI Enabled
3,097,815 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,199 UART: [rt]cmd =0x44504543, len=96
3,161,622 >>> mbox cmd response data (56 bytes)
3,161,623 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,424 UART: [rt]cmd =0x44504543, len=92
3,383,501 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,981 UART:
192,346 UART: Running Caliptra ROM ...
193,522 UART:
193,672 UART: [state] CFI Enabled
264,823 UART: [state] LifecycleState = Unprovisioned
266,730 UART: [state] DebugLocked = No
269,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,812 UART: [kat] SHA2-256
444,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,987 UART: [kat] ++
455,440 UART: [kat] sha1
467,020 UART: [kat] SHA2-256
469,674 UART: [kat] SHA2-384
476,934 UART: [kat] SHA2-512-ACC
479,292 UART: [kat] ECC-384
2,766,660 UART: [kat] HMAC-384Kdf
2,799,373 UART: [kat] LMS
3,989,682 UART: [kat] --
3,994,876 UART: [cold-reset] ++
3,997,219 UART: [fht] Storing FHT @ 0x50003400
4,009,684 UART: [idev] ++
4,010,318 UART: [idev] CDI.KEYID = 6
4,011,198 UART: [idev] SUBJECT.KEYID = 7
4,012,502 UART: [idev] UDS.KEYID = 0
4,013,451 ready_for_fw is high
4,013,641 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,833 UART: [idev] Erasing UDS.KEYID = 0
7,339,122 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,471 UART: [idev] --
7,365,398 UART: [ldev] ++
7,365,959 UART: [ldev] CDI.KEYID = 6
7,366,913 UART: [ldev] SUBJECT.KEYID = 5
7,368,133 UART: [ldev] AUTHORITY.KEYID = 7
7,369,357 UART: [ldev] FE.KEYID = 1
7,399,330 UART: [ldev] Erasing FE.KEYID = 1
10,732,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,726 UART: [ldev] --
13,115,259 UART: [fwproc] Waiting for Commands...
13,117,775 UART: [fwproc] Received command 0x46574c44
13,119,947 UART: [fwproc] Received Image of size 113844 bytes
17,170,223 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,452 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,630,971 >>> mbox cmd response: success
17,631,477 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,635,979 UART: [afmc] ++
17,636,560 UART: [afmc] CDI.KEYID = 6
17,637,467 UART: [afmc] SUBJECT.KEYID = 7
17,638,740 UART: [afmc] AUTHORITY.KEYID = 5
20,996,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,300,607 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,302,857 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,317,272 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,332,126 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,346,538 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,367,805 UART: [afmc] --
23,371,663 UART: [cold-reset] --
23,376,865 UART: [state] Locking Datavault
23,381,454 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,193 UART: [state] Locking ICCM
23,384,247 UART: [exit] Launching FMC @ 0x40000130
23,392,633 UART:
23,392,860 UART: Running Caliptra FMC ...
23,393,952 UART:
23,394,105 UART: [state] CFI Enabled
23,461,994 UART: [fht] FMC Alias Private Key: 7
25,800,449 UART: [art] Extend RT PCRs Done
25,801,672 UART: [art] Lock RT PCRs Done
25,803,130 UART: [art] Populate DV Done
25,808,592 UART: [fht] FMC Alias Private Key: 7
25,810,158 UART: [art] Derive CDI
25,810,977 UART: [art] Store in in slot 0x4
25,871,279 UART: [art] Derive Key Pair
25,872,272 UART: [art] Store priv key in slot 0x5
29,165,087 UART: [art] Derive Key Pair - Done
29,178,084 UART: [art] Signing Cert with AUTHO
29,179,438 UART: RITY.KEYID = 7
31,466,487 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,999 UART: [art] PUB.X = 22497EACF82ABFEDC328B9DB1C648056C893CA0504F38E179A7DB62866D0EE90308911894FE9BB9A889FC0344A0398E3
31,475,245 UART: [art] PUB.Y = 385F00B07CA17BE51635415B78BD60AA75EEC1FBFFCAB59F520A8AFD51118E99F4CFA08908F5FF689BB89FC9D1863114
31,482,533 UART: [art] SIG.R = EA1AD9BE32FBBEBA54B160E4B57EB3B89B90C7EEF257385D503FAE0535F768089A74CB13B6876FD56CAB905733BF5654
31,489,954 UART: [art] SIG.S = AB2929492798C55B321646BB0215C7BD29940A27B237CA7C2C41D1F5E902FECE86BA8B48F486990300134098F79758C0
32,795,255 UART: Caliptra RT
32,795,967 UART: [state] CFI Enabled
32,955,923 UART: [rt] RT listening for mailbox commands...
32,987,225 UART: [rt]cmd =0x43455252, len=4
32,998,568 >>> mbox cmd response data (784 bytes)
33,042,415 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,073,136 UART: [rt]cmd =0x44504543, len=92
38,838,895 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,784,232 ready_for_fw is high
3,784,629 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,842,917 >>> mbox cmd response: success
17,843,720 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,543,442 UART:
23,543,819 UART: Running Caliptra FMC ...
23,544,909 UART:
23,545,054 UART: [state] CFI Enabled
23,615,556 UART: [fht] FMC Alias Private Key: 7
25,953,942 UART: [art] Extend RT PCRs Done
25,955,165 UART: [art] Lock RT PCRs Done
25,956,704 UART: [art] Populate DV Done
25,962,074 UART: [fht] FMC Alias Private Key: 7
25,963,725 UART: [art] Derive CDI
25,964,458 UART: [art] Store in in slot 0x4
26,023,945 UART: [art] Derive Key Pair
26,024,941 UART: [art] Store priv key in slot 0x5
29,317,119 UART: [art] Derive Key Pair - Done
29,329,796 UART: [art] Signing Cert with AUTHO
29,331,096 UART: RITY.KEYID = 7
31,619,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,733 UART: [art] PUB.X = D0EF1F125E920940CEA7B6630E5C183EB9F2914324B2122733FFD29F0BEBE16664338E92291A3E686BFFDD6C35353CBE
31,627,994 UART: [art] PUB.Y = 36100AE806C679B4A654852089020387A5956EA270CCCF4C06A38E5F6A98459094FC73B0E1B6E3F9CD4B26C72D22EEC4
31,635,221 UART: [art] SIG.R = C1C1993B8A771023D8B14D92457A3D5D7675E2430C2FCF829C1B6B22AA3B8F677D5411F725AFDE03C30576A094A22D12
31,642,617 UART: [art] SIG.S = 67C15B5B5A5E5DB1B04253C2B095654EA95D04974FD3A1C894C58C90764C4459132A03E271E3F924F216683A8183AEF7
32,947,598 UART: Caliptra RT
32,948,315 UART: [state] CFI Enabled
33,107,615 UART: [rt] RT listening for mailbox commands...
33,138,943 UART: [rt]cmd =0x43455252, len=4
33,150,458 >>> mbox cmd response data (783 bytes)
33,194,648 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,225,453 UART: [rt]cmd =0x44504543, len=92
38,991,781 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,548 UART:
192,941 UART: Running Caliptra ROM ...
194,043 UART:
603,565 UART: [state] CFI Enabled
617,017 UART: [state] LifecycleState = Unprovisioned
618,974 UART: [state] DebugLocked = No
621,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,788 UART: [kat] SHA2-256
795,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,058 UART: [kat] ++
806,545 UART: [kat] sha1
817,366 UART: [kat] SHA2-256
820,057 UART: [kat] SHA2-384
826,913 UART: [kat] SHA2-512-ACC
829,290 UART: [kat] ECC-384
3,112,391 UART: [kat] HMAC-384Kdf
3,123,570 UART: [kat] LMS
4,313,673 UART: [kat] --
4,318,898 UART: [cold-reset] ++
4,320,901 UART: [fht] Storing FHT @ 0x50003400
4,332,592 UART: [idev] ++
4,333,166 UART: [idev] CDI.KEYID = 6
4,334,050 UART: [idev] SUBJECT.KEYID = 7
4,335,374 UART: [idev] UDS.KEYID = 0
4,336,421 ready_for_fw is high
4,336,630 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,530 UART: [idev] Erasing UDS.KEYID = 0
7,621,153 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,651 UART: [idev] --
7,645,292 UART: [ldev] ++
7,645,863 UART: [ldev] CDI.KEYID = 6
7,646,775 UART: [ldev] SUBJECT.KEYID = 5
7,647,990 UART: [ldev] AUTHORITY.KEYID = 7
7,649,294 UART: [ldev] FE.KEYID = 1
7,659,947 UART: [ldev] Erasing FE.KEYID = 1
10,947,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,803 UART: [ldev] --
13,305,587 UART: [fwproc] Waiting for Commands...
13,308,227 UART: [fwproc] Received command 0x46574c44
13,310,413 UART: [fwproc] Received Image of size 113844 bytes
17,363,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,266 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,823,548 >>> mbox cmd response: success
17,824,052 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,827,779 UART: [afmc] ++
17,828,367 UART: [afmc] CDI.KEYID = 6
17,829,279 UART: [afmc] SUBJECT.KEYID = 7
17,830,554 UART: [afmc] AUTHORITY.KEYID = 5
21,142,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,027 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,279 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,690 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,470,500 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,921 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,108 UART: [afmc] --
23,511,729 UART: [cold-reset] --
23,516,397 UART: [state] Locking Datavault
23,522,035 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,740 UART: [state] Locking ICCM
23,526,484 UART: [exit] Launching FMC @ 0x40000130
23,535,014 UART:
23,535,300 UART: Running Caliptra FMC ...
23,536,412 UART:
23,536,583 UART: [state] CFI Enabled
23,544,471 UART: [fht] FMC Alias Private Key: 7
25,874,539 UART: [art] Extend RT PCRs Done
25,875,762 UART: [art] Lock RT PCRs Done
25,877,333 UART: [art] Populate DV Done
25,883,016 UART: [fht] FMC Alias Private Key: 7
25,884,561 UART: [art] Derive CDI
25,885,305 UART: [art] Store in in slot 0x4
25,927,948 UART: [art] Derive Key Pair
25,928,947 UART: [art] Store priv key in slot 0x5
29,171,479 UART: [art] Derive Key Pair - Done
29,184,102 UART: [art] Signing Cert with AUTHO
29,185,416 UART: RITY.KEYID = 7
31,464,497 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,009 UART: [art] PUB.X = 864398271597222DA5C68558E63146DEAF70B798C5CAE760A8E6A5C7A8CE23CFEA7A9DA95298BD80C59B941AA68FFD7B
31,473,274 UART: [art] PUB.Y = E7A7AB921DC81895F56FCA6D4FE9D6999DB29343CE9A0958C09FEC98FC1060DE85CF11A67DEC523A50AA9F198053BF17
31,480,515 UART: [art] SIG.R = 4EC87C40E30FDED65A07BAABE25B067F01195535C9A60CB305A702D2F412301CA22743682435046BBB04B46DC8DDB0B0
31,487,922 UART: [art] SIG.S = 2B04AC2F8756E9074D63CD53FCFA2CE7EE37E771ABE7E891BB4BE8EB81952233C10296787549BD59536E3B67256DD133
32,793,397 UART: Caliptra RT
32,794,116 UART: [state] CFI Enabled
32,911,626 UART: [rt] RT listening for mailbox commands...
32,942,610 UART: [rt]cmd =0x43455252, len=4
32,954,125 >>> mbox cmd response data (782 bytes)
32,997,981 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,028,513 UART: [rt]cmd =0x44504543, len=92
38,702,267 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
4,130,851 ready_for_fw is high
4,131,222 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,064,366 >>> mbox cmd response: success
18,065,249 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,705,016 UART:
23,705,409 UART: Running Caliptra FMC ...
23,706,527 UART:
23,706,689 UART: [state] CFI Enabled
23,714,562 UART: [fht] FMC Alias Private Key: 7
26,044,950 UART: [art] Extend RT PCRs Done
26,046,169 UART: [art] Lock RT PCRs Done
26,047,935 UART: [art] Populate DV Done
26,053,359 UART: [fht] FMC Alias Private Key: 7
26,054,947 UART: [art] Derive CDI
26,055,828 UART: [art] Store in in slot 0x4
26,098,557 UART: [art] Derive Key Pair
26,099,603 UART: [art] Store priv key in slot 0x5
29,341,293 UART: [art] Derive Key Pair - Done
29,354,604 UART: [art] Signing Cert with AUTHO
29,355,941 UART: RITY.KEYID = 7
31,635,104 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,610 UART: [art] PUB.X = 4A82324316DA067689514EBEBCFA494F4D1A0DCA9F5AF54329CA134ED5247F6E6DB4B54A687ABC74D334EF1B0853B8F3
31,643,868 UART: [art] PUB.Y = 6BAD7ACDD67DEB2D48752CAF5E42827E79C5FE08E316F450FE9608C468C5F23CDB1BD5EC16F3E0340C322C09FD5C64CA
31,651,134 UART: [art] SIG.R = 645DD9D1E3776B84864D7CDCF481BDC34D302F658100EBF06324ED2212A9FDB6E8BB487DC0E3CEAD6A36317067246AD0
31,658,551 UART: [art] SIG.S = E6875DFFED1178056318F33A0BB832B29D62376F355A3B748DCE36D3176D487322097FBB7E2814C83A0095102479C28F
32,963,072 UART: Caliptra RT
32,963,794 UART: [state] CFI Enabled
33,080,718 UART: [rt] RT listening for mailbox commands...
33,112,130 UART: [rt]cmd =0x43455252, len=4
33,123,606 >>> mbox cmd response data (783 bytes)
33,167,102 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,198,079 UART: [rt]cmd =0x44504543, len=92
38,871,766 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,002 UART:
192,380 UART: Running Caliptra ROM ...
193,566 UART:
193,741 UART: [state] CFI Enabled
262,419 UART: [state] LifecycleState = Unprovisioned
264,336 UART: [state] DebugLocked = No
266,446 UART: [state] WD Timer not started. Device not locked for debugging
269,596 UART: [kat] SHA2-256
448,727 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,322 UART: [kat] ++
460,859 UART: [kat] sha1
470,956 UART: [kat] SHA2-256
473,959 UART: [kat] SHA2-384
480,509 UART: [kat] SHA2-512-ACC
483,523 UART: [kat] ECC-384
2,948,660 UART: [kat] HMAC-384Kdf
2,970,914 UART: [kat] LMS
3,500,375 UART: [kat] --
3,504,654 UART: [cold-reset] ++
3,505,535 UART: [fht] FHT @ 0x50003400
3,516,515 UART: [idev] ++
3,517,078 UART: [idev] CDI.KEYID = 6
3,517,967 UART: [idev] SUBJECT.KEYID = 7
3,519,211 UART: [idev] UDS.KEYID = 0
3,520,294 ready_for_fw is high
3,520,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,094 UART: [idev] Erasing UDS.KEYID = 0
6,025,174 UART: [idev] Sha1 KeyId Algorithm
6,049,103 UART: [idev] --
6,054,075 UART: [ldev] ++
6,054,650 UART: [ldev] CDI.KEYID = 6
6,055,564 UART: [ldev] SUBJECT.KEYID = 5
6,056,727 UART: [ldev] AUTHORITY.KEYID = 7
6,057,958 UART: [ldev] FE.KEYID = 1
6,098,833 UART: [ldev] Erasing FE.KEYID = 1
8,599,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,252 UART: [ldev] --
10,391,025 UART: [fwproc] Wait for Commands...
10,393,554 UART: [fwproc] Recv command 0x46574c44
10,395,643 UART: [fwproc] Recv'd Img size: 114168 bytes
13,796,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,941,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,258,121 >>> mbox cmd response: success
14,258,689 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,261,692 UART: [afmc] ++
14,262,314 UART: [afmc] CDI.KEYID = 6
14,263,223 UART: [afmc] SUBJECT.KEYID = 7
14,264,386 UART: [afmc] AUTHORITY.KEYID = 5
16,800,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,896 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,737 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,582 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,592 UART: [afmc] --
18,607,015 UART: [cold-reset] --
18,610,505 UART: [state] Locking Datavault
18,616,075 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,723 UART: [state] Locking ICCM
18,619,959 UART: [exit] Launching FMC @ 0x40000130
18,628,350 UART:
18,628,583 UART: Running Caliptra FMC ...
18,629,701 UART:
18,629,860 UART: [state] CFI Enabled
18,685,676 UART: [fht] FMC Alias Private Key: 7
20,449,901 UART: [art] Extend RT PCRs Done
20,451,116 UART: [art] Lock RT PCRs Done
20,452,792 UART: [art] Populate DV Done
20,458,200 UART: [fht] FMC Alias Private Key: 7
20,459,792 UART: [art] Derive CDI
20,460,604 UART: [art] Store in in slot 0x4
20,518,864 UART: [art] Derive Key Pair
20,519,899 UART: [art] Store priv key in slot 0x5
22,982,898 UART: [art] Derive Key Pair - Done
22,995,570 UART: [art] Signing Cert with AUTHO
22,996,870 UART: RITY.KEYID = 7
24,707,645 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,148 UART: [art] PUB.X = 55575936CB40848B649FC4DBA2792BD7765961154060F5C6245A71E6E5B8F0FCFFE75D3504FAA70D66A1C32F5DFE17F7
24,716,430 UART: [art] PUB.Y = E7D1E143A7920CF332781BF6C4486610ACC9033C69FAABA6EA47EEEE7CED7C155AD17DD8FE1364C01591D5224DD4B77F
24,723,687 UART: [art] SIG.R = F023B6E6ECD75BB7631428FE08CC6940AD5DDAD6FE12DC4093EEA62DCBBFE6077BF4A7D4A1359C28608E1C0FB173A74F
24,731,102 UART: [art] SIG.S = 35B657CF3B8785A22B1E9CB5890F685B56A90FE4DFE6907C6EA902AC67F86942D08D46EAFD9147EB983F23A2C5909EB2
25,709,928 UART: Caliptra RT
25,710,643 UART: [state] CFI Enabled
25,876,096 UART: [rt] RT listening for mailbox commands...
25,907,683 UART: [rt]cmd =0x43455252, len=4
25,919,048 >>> mbox cmd response data (783 bytes)
25,962,574 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,993,469 UART: [rt]cmd =0x44504543, len=92
30,353,202 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,358,811 ready_for_fw is high
3,359,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,022 >>> mbox cmd response: success
14,068,856 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,363,944 UART:
18,364,331 UART: Running Caliptra FMC ...
18,365,459 UART:
18,365,621 UART: [state] CFI Enabled
18,429,565 UART: [fht] FMC Alias Private Key: 7
20,192,940 UART: [art] Extend RT PCRs Done
20,194,166 UART: [art] Lock RT PCRs Done
20,195,971 UART: [art] Populate DV Done
20,201,497 UART: [fht] FMC Alias Private Key: 7
20,203,151 UART: [art] Derive CDI
20,203,891 UART: [art] Store in in slot 0x4
20,261,944 UART: [art] Derive Key Pair
20,262,989 UART: [art] Store priv key in slot 0x5
22,726,055 UART: [art] Derive Key Pair - Done
22,738,963 UART: [art] Signing Cert with AUTHO
22,740,268 UART: RITY.KEYID = 7
24,450,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,347 UART: [art] PUB.X = 6FCC7F3E11FAA28093FBEFD4A028BCC6347B3B909F36639FE42DEB37C16C3F05646E936F8D51443EABAE66682D6BD00C
24,459,645 UART: [art] PUB.Y = 251AEBC92F651537EC10C921AB5FD1F9DCA112709B9F5C15D734B34E9C0F6C39A1ED9E68EAC76A95CE46C72944F32EE5
24,466,897 UART: [art] SIG.R = 70CA1D90A69CF744C2E293586B8B26FB9B948016E8674CA1FA60E3ABBFBA4C3677F7C2522458B554A3C92647C97986C5
24,474,291 UART: [art] SIG.S = B559EBF81214216BAFFF2CD1C6E8F3C708544B9EC9DD5EFC51B54BD70A87CAE40B4EB05E07BCD1D1AEB626B36651B1AD
25,453,502 UART: Caliptra RT
25,454,227 UART: [state] CFI Enabled
25,618,297 UART: [rt] RT listening for mailbox commands...
25,649,824 UART: [rt]cmd =0x43455252, len=4
25,661,392 >>> mbox cmd response data (783 bytes)
25,704,275 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,735,283 UART: [rt]cmd =0x44504543, len=92
30,074,827 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
1,063 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,795 writing to cptra_bootfsm_go
194,077 UART:
194,537 UART: Running Caliptra ROM ...
195,701 UART:
605,294 UART: [state] CFI Enabled
619,542 UART: [state] LifecycleState = Unprovisioned
621,416 UART: [state] DebugLocked = No
623,373 UART: [state] WD Timer not started. Device not locked for debugging
627,489 UART: [kat] SHA2-256
806,659 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,242 UART: [kat] ++
818,778 UART: [kat] sha1
829,231 UART: [kat] SHA2-256
832,304 UART: [kat] SHA2-384
838,159 UART: [kat] SHA2-512-ACC
841,165 UART: [kat] ECC-384
3,279,742 UART: [kat] HMAC-384Kdf
3,291,332 UART: [kat] LMS
3,820,829 UART: [kat] --
3,825,592 UART: [cold-reset] ++
3,827,588 UART: [fht] FHT @ 0x50003400
3,837,583 UART: [idev] ++
3,838,159 UART: [idev] CDI.KEYID = 6
3,839,072 UART: [idev] SUBJECT.KEYID = 7
3,840,439 UART: [idev] UDS.KEYID = 0
3,841,380 ready_for_fw is high
3,841,592 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,902 UART: [idev] Erasing UDS.KEYID = 0
6,317,345 UART: [idev] Sha1 KeyId Algorithm
6,341,330 UART: [idev] --
6,345,734 UART: [ldev] ++
6,346,308 UART: [ldev] CDI.KEYID = 6
6,347,225 UART: [ldev] SUBJECT.KEYID = 5
6,348,385 UART: [ldev] AUTHORITY.KEYID = 7
6,349,667 UART: [ldev] FE.KEYID = 1
6,360,636 UART: [ldev] Erasing FE.KEYID = 1
8,832,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,509 UART: [ldev] --
10,622,422 UART: [fwproc] Wait for Commands...
10,625,651 UART: [fwproc] Recv command 0x46574c44
10,627,746 UART: [fwproc] Recv'd Img size: 114168 bytes
14,030,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,981 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,492,070 >>> mbox cmd response: success
14,492,607 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,495,983 UART: [afmc] ++
14,496,571 UART: [afmc] CDI.KEYID = 6
14,497,488 UART: [afmc] SUBJECT.KEYID = 7
14,498,670 UART: [afmc] AUTHORITY.KEYID = 5
16,998,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,377 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,754 UART: [afmc] --
18,793,807 UART: [cold-reset] --
18,797,992 UART: [state] Locking Datavault
18,804,212 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,902 UART: [state] Locking ICCM
18,808,278 UART: [exit] Launching FMC @ 0x40000130
18,816,732 UART:
18,816,970 UART: Running Caliptra FMC ...
18,818,068 UART:
18,818,248 UART: [state] CFI Enabled
18,826,625 UART: [fht] FMC Alias Private Key: 7
20,583,654 UART: [art] Extend RT PCRs Done
20,584,861 UART: [art] Lock RT PCRs Done
20,586,395 UART: [art] Populate DV Done
20,591,858 UART: [fht] FMC Alias Private Key: 7
20,593,555 UART: [art] Derive CDI
20,594,290 UART: [art] Store in in slot 0x4
20,637,152 UART: [art] Derive Key Pair
20,638,149 UART: [art] Store priv key in slot 0x5
23,065,160 UART: [art] Derive Key Pair - Done
23,078,056 UART: [art] Signing Cert with AUTHO
23,079,368 UART: RITY.KEYID = 7
24,784,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,467 UART: [art] PUB.X = 910896D41C3879E8DD8DF22C4DDA29A216282CD4BDAB5C6FD23F9875A66FF8113EAEE6E1E3EF0D3887929A69426E38F1
24,793,760 UART: [art] PUB.Y = F14034DD9E05253469C59A9AB028FC3B61642B86F6886F12537FC9E6D37BED930368EBBDCB671BA21320A423EC682573
24,801,044 UART: [art] SIG.R = C141D31CFB3BC14101AD5A5205AD3A1F57CA7A8F578070B224778AA8DFB567A394D7AFDA0166BBD7E55AF0563D542F28
24,808,461 UART: [art] SIG.S = 59E5C9CE3BFED56424AB3D5EB317301F9482BB6BCA7538751AB920AAF39947DAA9D6BBFF3234C9E8E1839DE468BF75EB
25,787,046 UART: Caliptra RT
25,787,758 UART: [state] CFI Enabled
25,905,142 UART: [rt] RT listening for mailbox commands...
25,936,489 UART: [rt]cmd =0x43455252, len=4
25,947,707 >>> mbox cmd response data (783 bytes)
25,990,739 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,021,421 UART: [rt]cmd =0x44504543, len=92
30,305,771 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
3,694,658 ready_for_fw is high
3,695,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,258,289 >>> mbox cmd response: success
14,259,096 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,509,067 UART:
18,509,467 UART: Running Caliptra FMC ...
18,510,604 UART:
18,510,763 UART: [state] CFI Enabled
18,518,658 UART: [fht] FMC Alias Private Key: 7
20,275,827 UART: [art] Extend RT PCRs Done
20,277,054 UART: [art] Lock RT PCRs Done
20,278,876 UART: [art] Populate DV Done
20,284,290 UART: [fht] FMC Alias Private Key: 7
20,285,830 UART: [art] Derive CDI
20,286,564 UART: [art] Store in in slot 0x4
20,329,265 UART: [art] Derive Key Pair
20,330,264 UART: [art] Store priv key in slot 0x5
22,756,972 UART: [art] Derive Key Pair - Done
22,769,867 UART: [art] Signing Cert with AUTHO
22,771,168 UART: RITY.KEYID = 7
24,476,473 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,976 UART: [art] PUB.X = F072163C51CE97C40886A7137710D3FB66C60C204D1E6DEE41632C7F43220B8343D7DD10BAB5ABB297E2EBACEBF52031
24,485,279 UART: [art] PUB.Y = E62C3C55DABC749636131DE0198ED6FB49435B25B7E43D5000F0E5127A711A252C2BB47F26DCA30E57A0A52F35B36C34
24,492,538 UART: [art] SIG.R = 6B947545AE1F77874A5CC18E86BA2C735C224B7D8425CE3235A509D8030B58FFA017858E59A586FC2E501EAAD0367762
24,499,879 UART: [art] SIG.S = 462601B94173571EE27FFE48E6CB19E1F69A5C284C09D65A558FCBE14D5F30934E9D819C2E71C083E1CEF5A687CBCDA8
25,478,938 UART: Caliptra RT
25,479,640 UART: [state] CFI Enabled
25,596,648 UART: [rt] RT listening for mailbox commands...
25,627,833 UART: [rt]cmd =0x43455252, len=4
25,639,430 >>> mbox cmd response data (782 bytes)
25,682,382 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,713,160 UART: [rt]cmd =0x44504543, len=92
29,998,474 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,376 UART:
192,734 UART: Running Caliptra ROM ...
193,930 UART:
194,088 UART: [state] CFI Enabled
264,732 UART: [state] LifecycleState = Unprovisioned
267,144 UART: [state] DebugLocked = No
269,672 UART: [state] WD Timer not started. Device not locked for debugging
274,649 UART: [kat] SHA2-256
464,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,265 UART: [kat] ++
475,717 UART: [kat] sha1
486,872 UART: [kat] SHA2-256
489,869 UART: [kat] SHA2-384
496,371 UART: [kat] SHA2-512-ACC
498,953 UART: [kat] ECC-384
2,948,354 UART: [kat] HMAC-384Kdf
2,973,698 UART: [kat] LMS
3,505,434 UART: [kat] --
3,508,649 UART: [cold-reset] ++
3,510,092 UART: [fht] FHT @ 0x50003400
3,521,024 UART: [idev] ++
3,521,774 UART: [idev] CDI.KEYID = 6
3,522,694 UART: [idev] SUBJECT.KEYID = 7
3,523,870 UART: [idev] UDS.KEYID = 0
3,524,795 ready_for_fw is high
3,524,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,446 UART: [idev] Erasing UDS.KEYID = 0
6,028,240 UART: [idev] Sha1 KeyId Algorithm
6,049,118 UART: [idev] --
6,054,743 UART: [ldev] ++
6,055,429 UART: [ldev] CDI.KEYID = 6
6,056,345 UART: [ldev] SUBJECT.KEYID = 5
6,057,571 UART: [ldev] AUTHORITY.KEYID = 7
6,058,755 UART: [ldev] FE.KEYID = 1
6,102,151 UART: [ldev] Erasing FE.KEYID = 1
8,609,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,362 UART: [ldev] --
10,415,593 UART: [fwproc] Wait for Commands...
10,418,663 UART: [fwproc] Recv command 0x46574c44
10,420,916 UART: [fwproc] Recv'd Img size: 114168 bytes
13,867,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,835 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,609,722 >>> mbox cmd response: success
14,610,230 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,613,925 UART: [afmc] ++
14,614,621 UART: [afmc] CDI.KEYID = 6
14,615,813 UART: [afmc] SUBJECT.KEYID = 7
14,617,310 UART: [afmc] AUTHORITY.KEYID = 5
17,154,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,600 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,925,699 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,940,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,479 UART: [afmc] --
18,967,382 UART: [cold-reset] --
18,970,130 UART: [state] Locking Datavault
18,974,369 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,512 UART: [state] Locking ICCM
18,979,480 UART: [exit] Launching FMC @ 0x40000130
18,988,159 UART:
18,988,406 UART: Running Caliptra FMC ...
18,989,513 UART:
18,989,669 UART: [state] CFI Enabled
19,050,688 UART: [fht] FMC Alias Private Key: 7
20,814,695 UART: [art] Extend RT PCRs Done
20,815,915 UART: [art] Lock RT PCRs Done
20,817,353 UART: [art] Populate DV Done
20,822,824 UART: [fht] FMC Alias Private Key: 7
20,824,473 UART: [art] Derive CDI
20,825,288 UART: [art] Store in in slot 0x4
20,883,620 UART: [art] Derive Key Pair
20,884,656 UART: [art] Store priv key in slot 0x5
23,347,294 UART: [art] Derive Key Pair - Done
23,360,075 UART: [art] Signing Cert with AUTHO
23,361,437 UART: RITY.KEYID = 7
25,073,568 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,082 UART: [art] PUB.X = F90D39C774C9E6B42468358929F7391A39BDA4F4CE15E56CCCCF44CB03DFB8FC79613622926079845D352B7CC1865EA3
25,082,299 UART: [art] PUB.Y = 595FD1C789B2878DD357FC5EB94C2008F5A94829C5F65D8795C231DDB04EAC498CC7DA0730EBC388B75E2DA1C388CA04
25,089,609 UART: [art] SIG.R = 0BDD7076498B578BF74DC0FB5B670BBA8A7368ED24339A2ABE9BDF24BDC03177840AACED6600684029B36619E0DCE830
25,096,981 UART: [art] SIG.S = BB1E9232E4E1D19BD13ECC54C8ADA8E2CFFB7FA3112F03FA5887B894CC66623CF5973DD7283F517133BFA631C54A7131
26,076,595 UART: Caliptra RT
26,077,286 UART: [state] CFI Enabled
26,242,649 UART: [rt] RT listening for mailbox commands...
26,274,220 UART: [rt]cmd =0x43455252, len=4
26,285,735 >>> mbox cmd response data (783 bytes)
26,329,158 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,359,906 UART: [rt]cmd =0x44504543, len=92
30,721,592 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,441,142 ready_for_fw is high
3,441,754 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,729,906 >>> mbox cmd response: success
14,730,527 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,044,992 UART:
19,045,378 UART: Running Caliptra FMC ...
19,046,589 UART:
19,046,764 UART: [state] CFI Enabled
19,113,075 UART: [fht] FMC Alias Private Key: 7
20,876,824 UART: [art] Extend RT PCRs Done
20,878,061 UART: [art] Lock RT PCRs Done
20,879,807 UART: [art] Populate DV Done
20,885,119 UART: [fht] FMC Alias Private Key: 7
20,886,727 UART: [art] Derive CDI
20,887,545 UART: [art] Store in in slot 0x4
20,945,817 UART: [art] Derive Key Pair
20,946,858 UART: [art] Store priv key in slot 0x5
23,410,248 UART: [art] Derive Key Pair - Done
23,423,145 UART: [art] Signing Cert with AUTHO
23,424,455 UART: RITY.KEYID = 7
25,135,629 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,149 UART: [art] PUB.X = 782854F46CE734B51D5CEDD4F20420729B242A29B7482A9BD8F08F68FF1862355306187D023F17242F9B316DA1A32375
25,144,423 UART: [art] PUB.Y = 2D8C895536326E0C2A74747E5114455D9CB3A93615A87FCDF4A56BBFEF7541FDFC65F5B1937A2FFB4AD10F2BDF3B5A8F
25,151,664 UART: [art] SIG.R = 89D80E3CC20883F140E8133DECAE8C5EE5864FC67586ADA1E572B71586D59331ECA600C83EB07D5045770BEDC6D00FAE
25,159,079 UART: [art] SIG.S = 5D1B34A00F60003694A9EE07BFCAA5C817A55AC984DFDCDC1EE243976A3A57789953A68F642334EB29C053B6E4CAA6CD
26,137,910 UART: Caliptra RT
26,138,598 UART: [state] CFI Enabled
26,304,268 UART: [rt] RT listening for mailbox commands...
26,335,795 UART: [rt]cmd =0x43455252, len=4
26,347,091 >>> mbox cmd response data (783 bytes)
26,390,024 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,420,759 UART: [rt]cmd =0x44504543, len=92
30,760,216 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
192,977 UART:
193,349 UART: Running Caliptra ROM ...
194,546 UART:
604,150 UART: [state] CFI Enabled
618,186 UART: [state] LifecycleState = Unprovisioned
620,560 UART: [state] DebugLocked = No
622,939 UART: [state] WD Timer not started. Device not locked for debugging
627,615 UART: [kat] SHA2-256
817,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,325 UART: [kat] ++
828,845 UART: [kat] sha1
840,357 UART: [kat] SHA2-256
843,370 UART: [kat] SHA2-384
849,004 UART: [kat] SHA2-512-ACC
851,593 UART: [kat] ECC-384
3,291,778 UART: [kat] HMAC-384Kdf
3,305,505 UART: [kat] LMS
3,837,344 UART: [kat] --
3,841,077 UART: [cold-reset] ++
3,842,731 UART: [fht] FHT @ 0x50003400
3,855,646 UART: [idev] ++
3,856,292 UART: [idev] CDI.KEYID = 6
3,857,332 UART: [idev] SUBJECT.KEYID = 7
3,858,508 UART: [idev] UDS.KEYID = 0
3,859,436 ready_for_fw is high
3,859,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,008 UART: [idev] Erasing UDS.KEYID = 0
6,334,459 UART: [idev] Sha1 KeyId Algorithm
6,356,943 UART: [idev] --
6,362,130 UART: [ldev] ++
6,362,866 UART: [ldev] CDI.KEYID = 6
6,363,779 UART: [ldev] SUBJECT.KEYID = 5
6,364,936 UART: [ldev] AUTHORITY.KEYID = 7
6,366,170 UART: [ldev] FE.KEYID = 1
6,378,545 UART: [ldev] Erasing FE.KEYID = 1
8,860,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,938 UART: [ldev] --
10,654,241 UART: [fwproc] Wait for Commands...
10,655,741 UART: [fwproc] Recv command 0x46574c44
10,658,048 UART: [fwproc] Recv'd Img size: 114168 bytes
14,100,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,758 >>> mbox cmd response: success
14,832,254 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,836,173 UART: [afmc] ++
14,836,867 UART: [afmc] CDI.KEYID = 6
14,838,109 UART: [afmc] SUBJECT.KEYID = 7
14,839,563 UART: [afmc] AUTHORITY.KEYID = 5
17,338,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,880 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,874 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,172 UART: [afmc] --
19,137,287 UART: [cold-reset] --
19,141,422 UART: [state] Locking Datavault
19,148,244 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,387 UART: [state] Locking ICCM
19,153,456 UART: [exit] Launching FMC @ 0x40000130
19,162,081 UART:
19,162,325 UART: Running Caliptra FMC ...
19,163,369 UART:
19,163,539 UART: [state] CFI Enabled
19,171,788 UART: [fht] FMC Alias Private Key: 7
20,929,031 UART: [art] Extend RT PCRs Done
20,930,252 UART: [art] Lock RT PCRs Done
20,931,712 UART: [art] Populate DV Done
20,936,854 UART: [fht] FMC Alias Private Key: 7
20,938,391 UART: [art] Derive CDI
20,939,207 UART: [art] Store in in slot 0x4
20,981,371 UART: [art] Derive Key Pair
20,982,411 UART: [art] Store priv key in slot 0x5
23,408,943 UART: [art] Derive Key Pair - Done
23,421,779 UART: [art] Signing Cert with AUTHO
23,423,083 UART: RITY.KEYID = 7
25,128,592 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,096 UART: [art] PUB.X = D8EC423F2C3814F532D1F14B96519C8759E1EEFB44C9A20FDC7B06611FDDE22C6895C520816B518352E16A239A37F686
25,137,348 UART: [art] PUB.Y = DF43E1DACB2A02DE50D109D4311525F9B95BBD8D978704A468D4BA791D34040676580FE201EEAF7C747DF8805B8A60C3
25,144,596 UART: [art] SIG.R = E68D1C54339B0109F3C4C6353816C9FD5A88A941FA45C6CC2A399E934D840D1F5BF3480D7F1B63BEF9B640C154A68DB0
25,151,994 UART: [art] SIG.S = 5F135DA77E07D41A30248A6D3357E8F52B3FA8E175602FE7F27AA0A4B68698E5B7CB9A902DACEC87947BED0103550E3B
26,130,821 UART: Caliptra RT
26,131,539 UART: [state] CFI Enabled
26,248,833 UART: [rt] RT listening for mailbox commands...
26,280,355 UART: [rt]cmd =0x43455252, len=4
26,291,708 >>> mbox cmd response data (783 bytes)
26,335,000 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,365,785 UART: [rt]cmd =0x44504543, len=92
30,651,089 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
3,760,455 ready_for_fw is high
3,760,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,964,433 >>> mbox cmd response: success
14,965,044 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,213,606 UART:
19,213,986 UART: Running Caliptra FMC ...
19,215,090 UART:
19,215,247 UART: [state] CFI Enabled
19,223,260 UART: [fht] FMC Alias Private Key: 7
20,980,105 UART: [art] Extend RT PCRs Done
20,981,315 UART: [art] Lock RT PCRs Done
20,982,965 UART: [art] Populate DV Done
20,988,592 UART: [fht] FMC Alias Private Key: 7
20,990,309 UART: [art] Derive CDI
20,991,135 UART: [art] Store in in slot 0x4
21,033,654 UART: [art] Derive Key Pair
21,034,686 UART: [art] Store priv key in slot 0x5
23,461,228 UART: [art] Derive Key Pair - Done
23,474,056 UART: [art] Signing Cert with AUTHO
23,475,392 UART: RITY.KEYID = 7
25,180,651 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,150 UART: [art] PUB.X = 9F82768481BAB64A0174172B2A97E38ED276F88D115DAB755136700AD8E487D6C22A6CBF7D01F1D9A9509239523FC6A6
25,189,452 UART: [art] PUB.Y = 84D118ABDE9F5F58002C3DAB77F515F144F827C2A25CACFBFFC3EAA03671AD91DCA07E1DEA6B588A4A381914A2618EB4
25,196,687 UART: [art] SIG.R = 0D14DAC07D3B8B4735F8244F27F889CB340E97BF0DA71963BCC26A3294A396AFE4B48DDCB749E369AB0BDE9D8F3064D6
25,204,080 UART: [art] SIG.S = 1A5943724B0C9F638042A394217931CAFCF4A6E899D536C620FCAC88443F4F164A16438A5AD77DEBEC105F7A1171CCA0
26,183,112 UART: Caliptra RT
26,183,975 UART: [state] CFI Enabled
26,300,408 UART: [rt] RT listening for mailbox commands...
26,332,038 UART: [rt]cmd =0x43455252, len=4
26,343,235 >>> mbox cmd response data (782 bytes)
26,386,375 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,417,127 UART: [rt]cmd =0x44504543, len=92
30,701,218 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
86,075 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,755 UART: [kat] SHA2-256
881,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,801 UART: [kat] ++
885,953 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,706 UART: [kat] SHA2-512-ACC
896,607 UART: [kat] ECC-384
902,446 UART: [kat] HMAC-384Kdf
906,940 UART: [kat] LMS
1,475,136 UART: [kat] --
1,475,939 UART: [cold-reset] ++
1,476,473 UART: [fht] Storing FHT @ 0x50003400
1,479,266 UART: [idev] ++
1,479,434 UART: [idev] CDI.KEYID = 6
1,479,794 UART: [idev] SUBJECT.KEYID = 7
1,480,218 UART: [idev] UDS.KEYID = 0
1,480,563 ready_for_fw is high
1,480,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,116 UART: [idev] Erasing UDS.KEYID = 0
1,504,440 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,058 UART: [idev] --
1,513,897 UART: [ldev] ++
1,514,065 UART: [ldev] CDI.KEYID = 6
1,514,428 UART: [ldev] SUBJECT.KEYID = 5
1,514,854 UART: [ldev] AUTHORITY.KEYID = 7
1,515,317 UART: [ldev] FE.KEYID = 1
1,520,621 UART: [ldev] Erasing FE.KEYID = 1
1,546,126 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,146 UART: [ldev] --
1,585,529 UART: [fwproc] Waiting for Commands...
1,586,318 UART: [fwproc] Received command 0x46574c44
1,587,109 UART: [fwproc] Received Image of size 114168 bytes
2,884,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,927 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,958 >>> mbox cmd response: success
3,076,958 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,076 UART: [afmc] ++
3,078,244 UART: [afmc] CDI.KEYID = 6
3,078,606 UART: [afmc] SUBJECT.KEYID = 7
3,079,031 UART: [afmc] AUTHORITY.KEYID = 5
3,113,868 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,441 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,131 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,064 UART: [afmc] --
3,157,062 UART: [cold-reset] --
3,158,020 UART: [state] Locking Datavault
3,159,173 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,777 UART: [state] Locking ICCM
3,160,379 UART: [exit] Launching FMC @ 0x40000130
3,165,708 UART:
3,165,724 UART: Running Caliptra FMC ...
3,166,132 UART:
3,166,186 UART: [state] CFI Enabled
3,176,611 UART: [fht] FMC Alias Private Key: 7
3,284,080 UART: [art] Extend RT PCRs Done
3,284,508 UART: [art] Lock RT PCRs Done
3,285,836 UART: [art] Populate DV Done
3,294,279 UART: [fht] FMC Alias Private Key: 7
3,295,217 UART: [art] Derive CDI
3,295,497 UART: [art] Store in in slot 0x4
3,381,588 UART: [art] Derive Key Pair
3,381,948 UART: [art] Store priv key in slot 0x5
3,395,252 UART: [art] Derive Key Pair - Done
3,409,864 UART: [art] Signing Cert with AUTHO
3,410,344 UART: RITY.KEYID = 7
3,425,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,709 UART: [art] PUB.X = 434A20B69242FB95655C1CB10B7602519B5D07CCBBF4F1A039A7016B507EC60A6A96C4DA271983032EB797705664D52C
3,433,459 UART: [art] PUB.Y = 6BEEF75074C02BF0E5FD10C4F8455A84CBFC035248DB0AB2766E02EFC81774CAE1A83762E2BA25B0819B066AF9B23381
3,440,409 UART: [art] SIG.R = A3D012E9E12133C2FBACB665ECC4A455E80770AAEA232BE91D5F1569D27E7AD578B757A16DA0E0A74FC398B3AFE8ECD5
3,447,198 UART: [art] SIG.S = 4DE949A620DF4A7096C97F7AE9B4DD41DC6012AE880A7FF3F3F0E9384F51A06B651968E0C39E66451F2516105BE0317E
3,471,094 UART: Caliptra RT
3,471,347 UART: [state] CFI Enabled
3,578,866 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,282 UART: [rt]cmd =0x43455252, len=4
3,619,902 >>> mbox cmd response data (783 bytes)
3,619,903 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,756 UART: [rt]cmd =0x44504543, len=92
3,833,427 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,547 ready_for_fw is high
1,362,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,906 >>> mbox cmd response: success
2,925,906 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,986,888 UART:
2,986,904 UART: Running Caliptra FMC ...
2,987,312 UART:
2,987,366 UART: [state] CFI Enabled
2,997,831 UART: [fht] FMC Alias Private Key: 7
3,105,688 UART: [art] Extend RT PCRs Done
3,106,116 UART: [art] Lock RT PCRs Done
3,107,786 UART: [art] Populate DV Done
3,116,047 UART: [fht] FMC Alias Private Key: 7
3,117,047 UART: [art] Derive CDI
3,117,327 UART: [art] Store in in slot 0x4
3,203,508 UART: [art] Derive Key Pair
3,203,868 UART: [art] Store priv key in slot 0x5
3,217,220 UART: [art] Derive Key Pair - Done
3,232,110 UART: [art] Signing Cert with AUTHO
3,232,590 UART: RITY.KEYID = 7
3,247,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,501 UART: [art] PUB.X = 79F16CC185DB3EE3D0E8915C894AA0C079D14654BFA397973BFA5320F181827D2A04D41CE24F0A8244066959DD208304
3,255,257 UART: [art] PUB.Y = 4ACE8530F3A46AE8D151EDC1DFA8C47463215CD46F011B19CEE6B0A0F4DD02E6A556E4C48F782F434F5F4BD259A14965
3,262,215 UART: [art] SIG.R = F7050BDE8E2D512F0ED951B0703D2720546EF8A0F207D97A3632DA2946EE8949430D5FC1521F79101CF04CC88195CD30
3,268,970 UART: [art] SIG.S = 26533E824D08D8013219F991035B88C638F94B7DF857DF61F6E4A8049F64F5E4C52038B710E5606435ED0B08DFB800C8
3,292,853 UART: Caliptra RT
3,293,106 UART: [state] CFI Enabled
3,400,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,155 UART: [rt]cmd =0x43455252, len=4
3,442,099 >>> mbox cmd response data (783 bytes)
3,442,100 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,897 UART: [rt]cmd =0x44504543, len=92
3,654,094 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,434 UART: [kat] SHA2-256
882,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,480 UART: [kat] ++
886,632 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
903,011 UART: [kat] HMAC-384Kdf
907,643 UART: [kat] LMS
1,475,839 UART: [kat] --
1,476,756 UART: [cold-reset] ++
1,477,110 UART: [fht] Storing FHT @ 0x50003400
1,480,031 UART: [idev] ++
1,480,199 UART: [idev] CDI.KEYID = 6
1,480,559 UART: [idev] SUBJECT.KEYID = 7
1,480,983 UART: [idev] UDS.KEYID = 0
1,481,328 ready_for_fw is high
1,481,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,281 UART: [idev] Erasing UDS.KEYID = 0
1,505,769 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,459 UART: [idev] --
1,515,458 UART: [ldev] ++
1,515,626 UART: [ldev] CDI.KEYID = 6
1,515,989 UART: [ldev] SUBJECT.KEYID = 5
1,516,415 UART: [ldev] AUTHORITY.KEYID = 7
1,516,878 UART: [ldev] FE.KEYID = 1
1,522,340 UART: [ldev] Erasing FE.KEYID = 1
1,547,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,025 UART: [ldev] --
1,587,510 UART: [fwproc] Waiting for Commands...
1,588,273 UART: [fwproc] Received command 0x46574c44
1,589,064 UART: [fwproc] Received Image of size 114168 bytes
2,885,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,562 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,914 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,433 >>> mbox cmd response: success
3,077,433 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,541 UART: [afmc] ++
3,078,709 UART: [afmc] CDI.KEYID = 6
3,079,071 UART: [afmc] SUBJECT.KEYID = 7
3,079,496 UART: [afmc] AUTHORITY.KEYID = 5
3,115,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,678 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,368 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,171 UART: [afmc] --
3,158,153 UART: [cold-reset] --
3,158,925 UART: [state] Locking Datavault
3,160,126 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,730 UART: [state] Locking ICCM
3,161,396 UART: [exit] Launching FMC @ 0x40000130
3,166,725 UART:
3,166,741 UART: Running Caliptra FMC ...
3,167,149 UART:
3,167,292 UART: [state] CFI Enabled
3,177,717 UART: [fht] FMC Alias Private Key: 7
3,285,618 UART: [art] Extend RT PCRs Done
3,286,046 UART: [art] Lock RT PCRs Done
3,287,750 UART: [art] Populate DV Done
3,295,925 UART: [fht] FMC Alias Private Key: 7
3,296,859 UART: [art] Derive CDI
3,297,139 UART: [art] Store in in slot 0x4
3,382,934 UART: [art] Derive Key Pair
3,383,294 UART: [art] Store priv key in slot 0x5
3,396,602 UART: [art] Derive Key Pair - Done
3,410,790 UART: [art] Signing Cert with AUTHO
3,411,270 UART: RITY.KEYID = 7
3,426,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,173 UART: [art] PUB.X = C1836E0E9043806FBBA8F787BFE529C9D74A06EE77C13A0E7D81DF75458215ED6B0633C1562C4B7248567F63B4F147AA
3,433,935 UART: [art] PUB.Y = 97A60A2ECECAAE7A8B7C75D2D3BA27C64FB9454B487DEFCE47F04ABED46B4A74016D67F4E21321C0D519349CA6B00289
3,440,894 UART: [art] SIG.R = E7E0BA6575DD0F9A676637892B37F9F1EF6B9102D0853E67DEEABF4FD8F35CF324D1477600B3FBB5181D7B492829FFB8
3,447,648 UART: [art] SIG.S = 3A4F79AAB594E82D1147E4A45C73A6A67FC4D9C9C6864C0613B2F6E88822ECEFB9A708FED2629C341D09423DC08B43CA
3,471,328 UART: Caliptra RT
3,471,673 UART: [state] CFI Enabled
3,579,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,380 UART: [rt]cmd =0x43455252, len=4
3,621,056 >>> mbox cmd response data (783 bytes)
3,621,057 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,236 UART: [rt]cmd =0x44504543, len=92
3,834,310 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,596 ready_for_fw is high
1,362,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,014 >>> mbox cmd response: success
2,927,014 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,987,966 UART:
2,987,982 UART: Running Caliptra FMC ...
2,988,390 UART:
2,988,533 UART: [state] CFI Enabled
2,999,152 UART: [fht] FMC Alias Private Key: 7
3,107,383 UART: [art] Extend RT PCRs Done
3,107,811 UART: [art] Lock RT PCRs Done
3,109,261 UART: [art] Populate DV Done
3,117,576 UART: [fht] FMC Alias Private Key: 7
3,118,742 UART: [art] Derive CDI
3,119,022 UART: [art] Store in in slot 0x4
3,205,001 UART: [art] Derive Key Pair
3,205,361 UART: [art] Store priv key in slot 0x5
3,218,175 UART: [art] Derive Key Pair - Done
3,232,997 UART: [art] Signing Cert with AUTHO
3,233,477 UART: RITY.KEYID = 7
3,248,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,404 UART: [art] PUB.X = 7FB7AFABB4677C36CB19F006994C52A472585A29996B41B6BFBCE8E7D9EA836BD71EB3366E788043BB0C73E75F563510
3,256,176 UART: [art] PUB.Y = C2C7952B8403CCA30E5D680F456EAF05BF462303292766937FD303EF1B220A2757B75E24E327C2084296BDF0DDFD5D60
3,263,104 UART: [art] SIG.R = 7F2AB11596D3C65B82E462AEAE5A54FCCFC29E983E19DFEEDADBEE030A28E21612958E2F54DC9A9D484C0F0CA114649E
3,269,884 UART: [art] SIG.S = E9D167E38DC2F22482D0B0F09DC713E9B3845DAF2D5C3A6749D525EAC45BA91946236DBC9614CC2A37BE26E03874A444
3,293,933 UART: Caliptra RT
3,294,278 UART: [state] CFI Enabled
3,401,973 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,931 UART: [rt]cmd =0x43455252, len=4
3,443,735 >>> mbox cmd response data (783 bytes)
3,443,736 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,707 UART: [rt]cmd =0x44504543, len=92
3,656,420 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
902,023 UART: [kat] SHA2-256
903,963 UART: [kat] SHA2-384
906,818 UART: [kat] SHA2-512-ACC
908,719 UART: [kat] ECC-384
918,602 UART: [kat] HMAC-384Kdf
923,196 UART: [kat] LMS
1,171,524 UART: [kat] --
1,172,113 UART: [cold-reset] ++
1,172,525 UART: [fht] FHT @ 0x50003400
1,175,104 UART: [idev] ++
1,175,272 UART: [idev] CDI.KEYID = 6
1,175,632 UART: [idev] SUBJECT.KEYID = 7
1,176,056 UART: [idev] UDS.KEYID = 0
1,176,401 ready_for_fw is high
1,176,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,178 UART: [idev] Erasing UDS.KEYID = 0
1,200,653 UART: [idev] Sha1 KeyId Algorithm
1,209,127 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,768 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,217,125 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,553 UART: [ldev] --
1,282,970 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,653 >>> mbox cmd response: success
2,772,653 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,719 UART: [afmc] ++
2,773,887 UART: [afmc] CDI.KEYID = 6
2,774,249 UART: [afmc] SUBJECT.KEYID = 7
2,774,674 UART: [afmc] AUTHORITY.KEYID = 5
2,810,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,908 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,636 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,521 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,240 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,888 UART: [afmc] --
2,853,802 UART: [cold-reset] --
2,854,650 UART: [state] Locking Datavault
2,855,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,477 UART: [state] Locking ICCM
2,857,027 UART: [exit] Launching FMC @ 0x40000130
2,862,356 UART:
2,862,372 UART: Running Caliptra FMC ...
2,862,780 UART:
2,862,834 UART: [state] CFI Enabled
2,873,345 UART: [fht] FMC Alias Private Key: 7
2,980,852 UART: [art] Extend RT PCRs Done
2,981,280 UART: [art] Lock RT PCRs Done
2,982,728 UART: [art] Populate DV Done
2,991,047 UART: [fht] FMC Alias Private Key: 7
2,992,047 UART: [art] Derive CDI
2,992,327 UART: [art] Store in in slot 0x4
3,078,190 UART: [art] Derive Key Pair
3,078,550 UART: [art] Store priv key in slot 0x5
3,091,314 UART: [art] Derive Key Pair - Done
3,106,396 UART: [art] Signing Cert with AUTHO
3,106,876 UART: RITY.KEYID = 7
3,121,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,627 UART: [art] PUB.X = F58D356B2D4535A89CA89B844DF8E0DB63E89A3FA63E7E46866363972B668F6E5A14D6258C45B7CA49B0713E3F7DE822
3,129,401 UART: [art] PUB.Y = A1952EB8D3E7DDFFBE557D6694542B7F0C8BDAD473F21307765E5D2544AB25ADEB3DA644FBE0F52C54EFEB20950E1029
3,136,360 UART: [art] SIG.R = B2B860C97A2F84FF49CD5CEE404B28D44EDE4CF492BAD4D135419EB30EE7F04D2C3B87E27422B6B5F2B1A02B864FDD99
3,143,147 UART: [art] SIG.S = 66869D286C10AD01E63E16CDAC7C1F31D5A9748C2F6C5C802AA9DD2C827A0A31721F5AAF5C60F05355450F83CCCCCA3B
3,166,457 UART: Caliptra RT
3,166,710 UART: [state] CFI Enabled
3,274,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,669 UART: [rt]cmd =0x43455252, len=4
3,315,369 >>> mbox cmd response data (783 bytes)
3,315,370 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,437 UART: [rt]cmd =0x44504543, len=92
3,528,949 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,901 ready_for_fw is high
1,060,901 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,584 >>> mbox cmd response: success
2,625,584 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,226 UART:
2,687,242 UART: Running Caliptra FMC ...
2,687,650 UART:
2,687,704 UART: [state] CFI Enabled
2,697,977 UART: [fht] FMC Alias Private Key: 7
2,806,658 UART: [art] Extend RT PCRs Done
2,807,086 UART: [art] Lock RT PCRs Done
2,808,562 UART: [art] Populate DV Done
2,816,755 UART: [fht] FMC Alias Private Key: 7
2,817,903 UART: [art] Derive CDI
2,818,183 UART: [art] Store in in slot 0x4
2,903,772 UART: [art] Derive Key Pair
2,904,132 UART: [art] Store priv key in slot 0x5
2,917,000 UART: [art] Derive Key Pair - Done
2,931,964 UART: [art] Signing Cert with AUTHO
2,932,444 UART: RITY.KEYID = 7
2,947,684 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,449 UART: [art] PUB.X = BF6E49DBEFF2ECFF0CBF82E42AEF5472B3A60183222E712AF9983ABE4023CF2F9B465230BA20222FACB36191EC94D062
2,955,231 UART: [art] PUB.Y = 22EF2F0CED9198FE484117B9C26B395E60945E6DF638991DEE3A5E9F3628F8D5D594407456E940BCAAB825DCF3CEDD01
2,962,187 UART: [art] SIG.R = E9CD32CFB5B89B52F3504C1C245549A7E7BCD3585F9FBB04AE0EBC6AEA504088738429CC36569044CDAC23951043AD5B
2,968,963 UART: [art] SIG.S = 6118FE2211B64BD1103CBC020CE2942378763DBEA4ADFC9B317D697D2A251B784E709E8C9A9D76581B12C61B2F67C4D1
2,993,304 UART: Caliptra RT
2,993,557 UART: [state] CFI Enabled
3,100,462 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,960 UART: [rt]cmd =0x43455252, len=4
3,141,666 >>> mbox cmd response data (783 bytes)
3,141,667 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,768 UART: [rt]cmd =0x44504543, len=92
3,355,596 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,027 UART: [state] LifecycleState = Unprovisioned
86,682 UART: [state] DebugLocked = No
87,266 UART: [state] WD Timer not started. Device not locked for debugging
88,449 UART: [kat] SHA2-256
894,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,224 UART: [kat] ++
898,376 UART: [kat] sha1
902,482 UART: [kat] SHA2-256
904,422 UART: [kat] SHA2-384
907,091 UART: [kat] SHA2-512-ACC
908,992 UART: [kat] ECC-384
918,529 UART: [kat] HMAC-384Kdf
922,931 UART: [kat] LMS
1,171,259 UART: [kat] --
1,172,120 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,203 UART: [idev] ++
1,175,371 UART: [idev] CDI.KEYID = 6
1,175,731 UART: [idev] SUBJECT.KEYID = 7
1,176,155 UART: [idev] UDS.KEYID = 0
1,176,500 ready_for_fw is high
1,176,500 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,403 UART: [idev] Erasing UDS.KEYID = 0
1,201,592 UART: [idev] Sha1 KeyId Algorithm
1,210,088 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,244,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,972 UART: [ldev] --
1,283,463 UART: [fwproc] Wait for Commands...
1,284,039 UART: [fwproc] Recv command 0x46574c44
1,284,767 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,243 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,854 >>> mbox cmd response: success
2,773,854 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,110 UART: [afmc] ++
2,775,278 UART: [afmc] CDI.KEYID = 6
2,775,640 UART: [afmc] SUBJECT.KEYID = 7
2,776,065 UART: [afmc] AUTHORITY.KEYID = 5
2,811,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,687 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,300 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,019 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,835 UART: [afmc] --
2,854,739 UART: [cold-reset] --
2,855,735 UART: [state] Locking Datavault
2,856,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,522 UART: [state] Locking ICCM
2,858,070 UART: [exit] Launching FMC @ 0x40000130
2,863,399 UART:
2,863,415 UART: Running Caliptra FMC ...
2,863,823 UART:
2,863,966 UART: [state] CFI Enabled
2,874,205 UART: [fht] FMC Alias Private Key: 7
2,982,844 UART: [art] Extend RT PCRs Done
2,983,272 UART: [art] Lock RT PCRs Done
2,984,988 UART: [art] Populate DV Done
2,993,201 UART: [fht] FMC Alias Private Key: 7
2,994,251 UART: [art] Derive CDI
2,994,531 UART: [art] Store in in slot 0x4
3,079,822 UART: [art] Derive Key Pair
3,080,182 UART: [art] Store priv key in slot 0x5
3,092,670 UART: [art] Derive Key Pair - Done
3,107,254 UART: [art] Signing Cert with AUTHO
3,107,734 UART: RITY.KEYID = 7
3,123,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,947 UART: [art] PUB.X = B9E08F1E6369A5368C533DD203613F71DCEBDFAE979082AC61D141108A699DD1CD4FBC1EC456D0ECAA7028E6E44FA743
3,130,730 UART: [art] PUB.Y = 699E52AD286781464211FBF866F5701042746E7016ADFD1E66AD74D934A5735BD4FEA81772C2DDA9FEE2C6B800DE7627
3,137,662 UART: [art] SIG.R = 5C29DB0CEE77EE31688C6DA248887420C00F34A086843117AF5CE9709477E4E5C5B61A5A8EC604E453C91DF45FA5201B
3,144,427 UART: [art] SIG.S = C4AFF76C18CD51AD32E72F419A78E57357BC9F449489FDBB5D4558D5080D2D26092E90A414A42BD7D78387A3E61382E5
3,168,405 UART: Caliptra RT
3,168,750 UART: [state] CFI Enabled
3,276,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,809 UART: [rt]cmd =0x43455252, len=4
3,317,799 >>> mbox cmd response data (783 bytes)
3,317,800 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,607 UART: [rt]cmd =0x44504543, len=92
3,531,560 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,422 ready_for_fw is high
1,060,422 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,635 >>> mbox cmd response: success
2,625,635 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,261 UART:
2,687,277 UART: Running Caliptra FMC ...
2,687,685 UART:
2,687,828 UART: [state] CFI Enabled
2,698,973 UART: [fht] FMC Alias Private Key: 7
2,807,232 UART: [art] Extend RT PCRs Done
2,807,660 UART: [art] Lock RT PCRs Done
2,809,086 UART: [art] Populate DV Done
2,817,333 UART: [fht] FMC Alias Private Key: 7
2,818,423 UART: [art] Derive CDI
2,818,703 UART: [art] Store in in slot 0x4
2,904,344 UART: [art] Derive Key Pair
2,904,704 UART: [art] Store priv key in slot 0x5
2,918,184 UART: [art] Derive Key Pair - Done
2,932,956 UART: [art] Signing Cert with AUTHO
2,933,436 UART: RITY.KEYID = 7
2,949,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,813 UART: [art] PUB.X = 2B5DA1B6A4A6518DC955F6FE7AEAB22E378B20EB6241C50B9788AAF3BCA39CC7F2AA2CA454561EBCECD348CB7CF34549
2,956,606 UART: [art] PUB.Y = 4A19022BA28AB78FD088F0A461A83FA7304B982FC4C0CF3E48C44555E2F5471C47CDA08712CAA4721A15D594188B5735
2,963,555 UART: [art] SIG.R = 1DAA5240CBED354AA9731D77AFDAAFE0A8087F1D9DFF2D17EA16970AB586D5C1D313BCBEBBC5AC9F7DE78E473730D2DE
2,970,351 UART: [art] SIG.S = 119BC54CAEBD5E255D0FF9FC7E4B2183DAA94ADEFABB1031C84A3C25AAA6ADCB6822D2718856E1179EF68D57F1BDEBEA
2,994,265 UART: Caliptra RT
2,994,610 UART: [state] CFI Enabled
3,102,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,017 UART: [rt]cmd =0x43455252, len=4
3,143,871 >>> mbox cmd response data (782 bytes)
3,143,872 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,173,831 UART: [rt]cmd =0x44504543, len=92
3,357,450 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,326 UART: [kat] LMS
1,168,638 UART: [kat] --
1,169,661 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,173,971 ready_for_fw is high
1,173,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,535 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,208,051 UART: [idev] --
1,209,180 UART: [ldev] ++
1,209,348 UART: [ldev] CDI.KEYID = 6
1,209,712 UART: [ldev] SUBJECT.KEYID = 5
1,210,139 UART: [ldev] AUTHORITY.KEYID = 7
1,210,602 UART: [ldev] FE.KEYID = 1
1,215,744 UART: [ldev] Erasing FE.KEYID = 1
1,242,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,572 UART: [ldev] --
1,282,020 UART: [fwproc] Wait for Commands...
1,282,653 UART: [fwproc] Recv command 0x46574c44
1,283,386 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,768 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,747 >>> mbox cmd response: success
2,770,747 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,771,762 UART: [afmc] ++
2,771,930 UART: [afmc] CDI.KEYID = 6
2,772,293 UART: [afmc] SUBJECT.KEYID = 7
2,772,719 UART: [afmc] AUTHORITY.KEYID = 5
2,808,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,805 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,524 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,395 UART: [afmc] --
2,851,449 UART: [cold-reset] --
2,852,263 UART: [state] Locking Datavault
2,853,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,880 UART: [state] Locking ICCM
2,854,302 UART: [exit] Launching FMC @ 0x40000130
2,859,631 UART:
2,859,647 UART: Running Caliptra FMC ...
2,860,055 UART:
2,860,109 UART: [state] CFI Enabled
2,870,218 UART: [fht] FMC Alias Private Key: 7
2,977,761 UART: [art] Extend RT PCRs Done
2,978,189 UART: [art] Lock RT PCRs Done
2,979,539 UART: [art] Populate DV Done
2,987,662 UART: [fht] FMC Alias Private Key: 7
2,988,708 UART: [art] Derive CDI
2,988,988 UART: [art] Store in in slot 0x4
3,074,699 UART: [art] Derive Key Pair
3,075,059 UART: [art] Store priv key in slot 0x5
3,088,127 UART: [art] Derive Key Pair - Done
3,103,135 UART: [art] Signing Cert with AUTHO
3,103,615 UART: RITY.KEYID = 7
3,118,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,600 UART: [art] PUB.X = BD020F40937A2086761E6BBBB52E228E61D8995AACF6BD2738CE1ADECDE48D19119A973BF8621AB971725DE5C00843F6
3,126,371 UART: [art] PUB.Y = AAB0A6156C9DCD0F87782DBE65F0488B8A585E7CFFEDAC66B1529AEBA4C64A6D987772AE277DD6247D897CE0235E667A
3,133,336 UART: [art] SIG.R = 2A1E17A9349DC8F9E38A4B60156D1FD3080B060284C6FA5E4C85175BAAD1DA9D016E37E2DDE11BFAF4B51F3F64161C7A
3,140,107 UART: [art] SIG.S = 2D975FA3A56A9DA3104532381A72529376EED1ED5B7CD84B1687E16E5F945640E737DD3553E686A6CAE8D484BF8863B0
3,164,244 UART: Caliptra RT
3,164,497 UART: [state] CFI Enabled
3,272,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,546 UART: [rt]cmd =0x43455252, len=4
3,313,458 >>> mbox cmd response data (782 bytes)
3,313,459 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,336 UART: [rt]cmd =0x44504543, len=92
3,527,205 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,108 ready_for_fw is high
1,056,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,981 >>> mbox cmd response: success
2,619,981 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,682,059 UART:
2,682,075 UART: Running Caliptra FMC ...
2,682,483 UART:
2,682,537 UART: [state] CFI Enabled
2,692,874 UART: [fht] FMC Alias Private Key: 7
2,801,009 UART: [art] Extend RT PCRs Done
2,801,437 UART: [art] Lock RT PCRs Done
2,802,833 UART: [art] Populate DV Done
2,811,152 UART: [fht] FMC Alias Private Key: 7
2,812,220 UART: [art] Derive CDI
2,812,500 UART: [art] Store in in slot 0x4
2,898,317 UART: [art] Derive Key Pair
2,898,677 UART: [art] Store priv key in slot 0x5
2,911,353 UART: [art] Derive Key Pair - Done
2,926,211 UART: [art] Signing Cert with AUTHO
2,926,691 UART: RITY.KEYID = 7
2,942,155 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,920 UART: [art] PUB.X = 0FD41A62B117311926F7F8FE2658BFB16529C5ED6AD01616A2E3D5E064B3F48093A48ED5F411F084A9D4855F09218A2C
2,949,686 UART: [art] PUB.Y = D7FB201D03324A0902D6F87FDB9E99AE6CFF465D25BE944FC98A42A3E9B4C7E557B02F67150E194CE5A11F6F4F51E7CE
2,956,640 UART: [art] SIG.R = E94F66FD7641BA69BC620730570955B7FCB09B205C620672A90C607F5E6FC4C6D1590161DC6CC1A6B39CFE50A53D0B99
2,963,398 UART: [art] SIG.S = 92A17EFA22332D8062B2C64A23646853085D7B2D966865A384182148747EF747A1C947FD03600C72E37719EBA62CEEBE
2,986,876 UART: Caliptra RT
2,987,129 UART: [state] CFI Enabled
3,094,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,665 UART: [rt]cmd =0x43455252, len=4
3,135,268 >>> mbox cmd response data (784 bytes)
3,135,269 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,106 UART: [rt]cmd =0x44504543, len=92
3,348,134 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,469 UART: [kat] SHA2-512-ACC
906,370 UART: [kat] ECC-384
916,277 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,384 UART: [fht] FHT @ 0x50003400
1,172,980 UART: [idev] ++
1,173,148 UART: [idev] CDI.KEYID = 6
1,173,509 UART: [idev] SUBJECT.KEYID = 7
1,173,934 UART: [idev] UDS.KEYID = 0
1,174,280 ready_for_fw is high
1,174,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,772 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,256 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,337 UART: [ldev] --
1,281,799 UART: [fwproc] Wait for Commands...
1,282,540 UART: [fwproc] Recv command 0x46574c44
1,283,273 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,196 >>> mbox cmd response: success
2,772,196 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,773,213 UART: [afmc] ++
2,773,381 UART: [afmc] CDI.KEYID = 6
2,773,744 UART: [afmc] SUBJECT.KEYID = 7
2,774,170 UART: [afmc] AUTHORITY.KEYID = 5
2,810,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,500 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,548 UART: [afmc] --
2,853,526 UART: [cold-reset] --
2,854,524 UART: [state] Locking Datavault
2,855,939 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,543 UART: [state] Locking ICCM
2,857,091 UART: [exit] Launching FMC @ 0x40000130
2,862,420 UART:
2,862,436 UART: Running Caliptra FMC ...
2,862,844 UART:
2,862,987 UART: [state] CFI Enabled
2,873,650 UART: [fht] FMC Alias Private Key: 7
2,982,481 UART: [art] Extend RT PCRs Done
2,982,909 UART: [art] Lock RT PCRs Done
2,984,713 UART: [art] Populate DV Done
2,992,956 UART: [fht] FMC Alias Private Key: 7
2,994,130 UART: [art] Derive CDI
2,994,410 UART: [art] Store in in slot 0x4
3,079,883 UART: [art] Derive Key Pair
3,080,243 UART: [art] Store priv key in slot 0x5
3,093,803 UART: [art] Derive Key Pair - Done
3,108,561 UART: [art] Signing Cert with AUTHO
3,109,041 UART: RITY.KEYID = 7
3,124,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,036 UART: [art] PUB.X = 6109E4C7A55FBDCE83A99B586AE2A0FA55C8F35D1381AD125F48B1DD29038444AA7ED729DB6818E089EA59FF3D794E61
3,131,812 UART: [art] PUB.Y = 9E0F6C04CC7EEF6B3B8ACEB013DAFBCD1DB6803CE00D2151FF67C17734171AC1132D7952D448D13536A5FF15982ED47F
3,138,769 UART: [art] SIG.R = 6B759047F6E4448F347A8B9A52BD4816686F47B2553C99F58830A038DAE8E38E7F124F4DB767E676743447CD729811D9
3,145,531 UART: [art] SIG.S = 54C24395FBEC6B75CA97F2ED3181CEC7DDE35A1338DD246B31C13031E116EE234DD792362952648A8A80ABCB1D0D033C
3,169,302 UART: Caliptra RT
3,169,647 UART: [state] CFI Enabled
3,278,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,658 UART: [rt]cmd =0x43455252, len=4
3,319,638 >>> mbox cmd response data (782 bytes)
3,319,639 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,520 UART: [rt]cmd =0x44504543, len=92
3,532,672 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,781 ready_for_fw is high
1,056,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,048 >>> mbox cmd response: success
2,622,048 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,684,192 UART:
2,684,208 UART: Running Caliptra FMC ...
2,684,616 UART:
2,684,759 UART: [state] CFI Enabled
2,695,184 UART: [fht] FMC Alias Private Key: 7
2,803,609 UART: [art] Extend RT PCRs Done
2,804,037 UART: [art] Lock RT PCRs Done
2,805,523 UART: [art] Populate DV Done
2,813,614 UART: [fht] FMC Alias Private Key: 7
2,814,732 UART: [art] Derive CDI
2,815,012 UART: [art] Store in in slot 0x4
2,900,729 UART: [art] Derive Key Pair
2,901,089 UART: [art] Store priv key in slot 0x5
2,914,897 UART: [art] Derive Key Pair - Done
2,930,068 UART: [art] Signing Cert with AUTHO
2,930,548 UART: RITY.KEYID = 7
2,945,758 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,523 UART: [art] PUB.X = 7B305F7FEF6EA9435FBA4A15D45CA75A2E79B9CD246E04F66D2EFC770C08B344FE5D63C377ADBC0D519936F8CBFDF685
2,953,303 UART: [art] PUB.Y = 1E98CB78189926F678CB616EB97A3B42246FE78B638567063DF9DBC2E3C026358397EC0512DEAE28C7920EA52DE54B91
2,960,246 UART: [art] SIG.R = FF1118F1D69442C22AF983F292CDCA307AE4A49663A67145C9203586390FB1020EE336A968765B0962874D30118075DB
2,966,994 UART: [art] SIG.S = B53F395EE9D2F7121ABE81CFEA59ED5C42B1957282CC70E713684D63E9F2BBF6F2BEE71D80FFB719B144E93809820AFF
2,990,457 UART: Caliptra RT
2,990,802 UART: [state] CFI Enabled
3,099,520 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,966 UART: [rt]cmd =0x43455252, len=4
3,140,815 >>> mbox cmd response data (784 bytes)
3,140,816 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,727 UART: [rt]cmd =0x44504543, len=92
3,353,256 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,140 UART:
192,520 UART: Running Caliptra ROM ...
193,611 UART:
193,750 UART: [state] CFI Enabled
265,205 UART: [state] LifecycleState = Unprovisioned
267,192 UART: [state] DebugLocked = No
269,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,849 UART: [kat] SHA2-256
444,584 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,096 UART: [kat] ++
455,541 UART: [kat] sha1
466,481 UART: [kat] SHA2-256
469,190 UART: [kat] SHA2-384
475,810 UART: [kat] SHA2-512-ACC
478,176 UART: [kat] ECC-384
2,767,420 UART: [kat] HMAC-384Kdf
2,800,966 UART: [kat] LMS
3,991,244 UART: [kat] --
3,994,907 UART: [cold-reset] ++
3,996,059 UART: [fht] Storing FHT @ 0x50003400
4,006,328 UART: [idev] ++
4,006,894 UART: [idev] CDI.KEYID = 6
4,007,923 UART: [idev] SUBJECT.KEYID = 7
4,009,094 UART: [idev] UDS.KEYID = 0
4,010,247 ready_for_fw is high
4,010,451 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,477 UART: [idev] Erasing UDS.KEYID = 0
7,345,173 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,917 UART: [idev] --
7,371,454 UART: [ldev] ++
7,372,057 UART: [ldev] CDI.KEYID = 6
7,373,025 UART: [ldev] SUBJECT.KEYID = 5
7,374,232 UART: [ldev] AUTHORITY.KEYID = 7
7,375,473 UART: [ldev] FE.KEYID = 1
7,422,569 UART: [ldev] Erasing FE.KEYID = 1
10,753,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,997 UART: [ldev] --
13,117,656 UART: [fwproc] Waiting for Commands...
13,120,980 UART: [fwproc] Received command 0x46574c44
13,123,157 UART: [fwproc] Received Image of size 113844 bytes
17,166,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,586 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,632,441 >>> mbox cmd response: success
17,632,924 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,636,955 UART: [afmc] ++
17,637,591 UART: [afmc] CDI.KEYID = 6
17,638,471 UART: [afmc] SUBJECT.KEYID = 7
17,639,733 UART: [afmc] AUTHORITY.KEYID = 5
21,004,798 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,308,057 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,334 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,729 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,559 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,989 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,371 UART: [afmc] --
23,379,001 UART: [cold-reset] --
23,382,271 UART: [state] Locking Datavault
23,386,160 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,904 UART: [state] Locking ICCM
23,389,290 UART: [exit] Launching FMC @ 0x40000130
23,397,696 UART:
23,397,933 UART: Running Caliptra FMC ...
23,399,026 UART:
23,399,186 UART: [state] CFI Enabled
23,467,710 UART: [fht] FMC Alias Private Key: 7
25,805,756 UART: [art] Extend RT PCRs Done
25,806,971 UART: [art] Lock RT PCRs Done
25,808,998 UART: [art] Populate DV Done
25,814,404 UART: [fht] FMC Alias Private Key: 7
25,816,036 UART: [art] Derive CDI
25,816,767 UART: [art] Store in in slot 0x4
25,875,771 UART: [art] Derive Key Pair
25,876,807 UART: [art] Store priv key in slot 0x5
29,169,647 UART: [art] Derive Key Pair - Done
29,182,588 UART: [art] Signing Cert with AUTHO
29,183,886 UART: RITY.KEYID = 7
31,470,670 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,176 UART: [art] PUB.X = 861CEEBD087C6A5F9610F1A4DBA4B6AD048CCB6627AB9533BF17DEFDBCC99C60E0C83859B29D51B08E433B3E3E1877CF
31,479,415 UART: [art] PUB.Y = 6521EDCD03F22B42D0537222F0E38DB0964C676757816F27F9883528880CBC5E37E127F9ABFC2E5917B6C889BED74B5B
31,486,678 UART: [art] SIG.R = 9602E20BB895689E44618951793E5634C8A910F024DE85E83665167E520A80C9C66F8548A62CE1D9E6485CCF608A045C
31,494,032 UART: [art] SIG.S = 622D710C30333694C3ACE021608FBDA7C6C043908E31C71DCCC1ADE4FB06651F5396D171B9A985CA5BC297F5B28EC03F
32,799,459 UART: Caliptra RT
32,800,168 UART: [state] CFI Enabled
32,961,323 UART: [rt] RT listening for mailbox commands...
32,992,724 UART: [rt]cmd =0x4c444556, len=4
33,003,732 >>> mbox cmd response data (687 bytes)
33,044,862 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,074,975 UART: [rt]cmd =0x43455246, len=4
33,087,927 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,783,087 ready_for_fw is high
3,783,481 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,855,810 >>> mbox cmd response: success
17,856,614 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,556,194 UART:
23,556,638 UART: Running Caliptra FMC ...
23,557,743 UART:
23,557,889 UART: [state] CFI Enabled
23,625,505 UART: [fht] FMC Alias Private Key: 7
25,963,266 UART: [art] Extend RT PCRs Done
25,964,511 UART: [art] Lock RT PCRs Done
25,966,028 UART: [art] Populate DV Done
25,971,715 UART: [fht] FMC Alias Private Key: 7
25,973,410 UART: [art] Derive CDI
25,974,220 UART: [art] Store in in slot 0x4
26,033,900 UART: [art] Derive Key Pair
26,034,928 UART: [art] Store priv key in slot 0x5
29,327,563 UART: [art] Derive Key Pair - Done
29,340,460 UART: [art] Signing Cert with AUTHO
29,341,766 UART: RITY.KEYID = 7
31,628,233 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,742 UART: [art] PUB.X = AA604432752622A8F43ECA30E1A52B28CADDAB0E924C525162048BA409CEA47974BD96B0DDD2EAC917D7B5DB8A15A456
31,636,996 UART: [art] PUB.Y = 3D10A84AD8BEEAE06D411134F87A5896D9CC54A361BF16AD2D94013DFD9DBC6EDA8BAA5885014392165BFC93D799A34D
31,644,242 UART: [art] SIG.R = D09B4A747593B563EA2683638F7AB08D9D6FCC8659D60A68DDBD9ED36C4EBB04186B18F5EB2BA38C15E1C31271D9268F
31,651,623 UART: [art] SIG.S = 91B856B4D590DD219F60E3346058FD6CC9BB914F559AE956133F34F46B281DAD027A61CFE130D4F8CCEA314E69515CAD
32,956,362 UART: Caliptra RT
32,957,058 UART: [state] CFI Enabled
33,116,305 UART: [rt] RT listening for mailbox commands...
33,147,825 UART: [rt]cmd =0x4c444556, len=4
33,159,064 >>> mbox cmd response data (687 bytes)
33,200,659 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,230,886 UART: [rt]cmd =0x43455246, len=4
33,244,004 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,512 UART:
192,874 UART: Running Caliptra ROM ...
194,012 UART:
603,694 UART: [state] CFI Enabled
615,730 UART: [state] LifecycleState = Unprovisioned
617,672 UART: [state] DebugLocked = No
619,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,944 UART: [kat] SHA2-256
794,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,205 UART: [kat] ++
805,679 UART: [kat] sha1
817,125 UART: [kat] SHA2-256
819,853 UART: [kat] SHA2-384
825,203 UART: [kat] SHA2-512-ACC
827,567 UART: [kat] ECC-384
3,111,336 UART: [kat] HMAC-384Kdf
3,123,431 UART: [kat] LMS
4,313,577 UART: [kat] --
4,316,881 UART: [cold-reset] ++
4,318,321 UART: [fht] Storing FHT @ 0x50003400
4,329,881 UART: [idev] ++
4,330,470 UART: [idev] CDI.KEYID = 6
4,331,431 UART: [idev] SUBJECT.KEYID = 7
4,332,678 UART: [idev] UDS.KEYID = 0
4,333,660 ready_for_fw is high
4,333,865 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,323 UART: [idev] Erasing UDS.KEYID = 0
7,618,762 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,482 UART: [idev] --
7,645,282 UART: [ldev] ++
7,645,859 UART: [ldev] CDI.KEYID = 6
7,646,822 UART: [ldev] SUBJECT.KEYID = 5
7,648,031 UART: [ldev] AUTHORITY.KEYID = 7
7,649,267 UART: [ldev] FE.KEYID = 1
7,662,072 UART: [ldev] Erasing FE.KEYID = 1
10,953,144 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,526 UART: [ldev] --
13,312,516 UART: [fwproc] Waiting for Commands...
13,314,287 UART: [fwproc] Received command 0x46574c44
13,316,515 UART: [fwproc] Received Image of size 113844 bytes
17,371,312 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,830,174 >>> mbox cmd response: success
17,830,663 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,833,608 UART: [afmc] ++
17,834,194 UART: [afmc] CDI.KEYID = 6
17,835,220 UART: [afmc] SUBJECT.KEYID = 7
17,836,382 UART: [afmc] AUTHORITY.KEYID = 5
21,151,147 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,422 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,807 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,634 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,069 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,906 UART: [afmc] --
23,517,874 UART: [cold-reset] --
23,521,789 UART: [state] Locking Datavault
23,527,088 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,855 UART: [state] Locking ICCM
23,531,655 UART: [exit] Launching FMC @ 0x40000130
23,540,051 UART:
23,540,290 UART: Running Caliptra FMC ...
23,541,394 UART:
23,541,556 UART: [state] CFI Enabled
23,549,843 UART: [fht] FMC Alias Private Key: 7
25,881,313 UART: [art] Extend RT PCRs Done
25,882,537 UART: [art] Lock RT PCRs Done
25,884,113 UART: [art] Populate DV Done
25,889,584 UART: [fht] FMC Alias Private Key: 7
25,891,122 UART: [art] Derive CDI
25,891,936 UART: [art] Store in in slot 0x4
25,934,745 UART: [art] Derive Key Pair
25,935,745 UART: [art] Store priv key in slot 0x5
29,178,353 UART: [art] Derive Key Pair - Done
29,191,185 UART: [art] Signing Cert with AUTHO
29,192,495 UART: RITY.KEYID = 7
31,471,990 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,489 UART: [art] PUB.X = D35D273511FAEEF0F526E4B1A948BFEDCD82EC9A92AF23CEEF236D4AC7534CBE452D6F3A75A3C728AA41EB4079EAE981
31,480,765 UART: [art] PUB.Y = 7C8F989F3D0B8D22B2F2343B639CA9F0AB61E0DB912C8400A5BAD066F09370BFC98EFA13CB22C731B0875288142C05DC
31,488,010 UART: [art] SIG.R = EC895983C2A4F889A241B84594B6ED05C31EFF99373BCB23985EB056D3F7625EB462F6EF78159DFB8A45A40E19CA7F6D
31,495,437 UART: [art] SIG.S = F41A5F242624A325D83E7475E6A21D01A63EBB176B01B0881234858106BB05518F61A5C4C5BF0D0DC0BF5BF111FF5C7E
32,800,958 UART: Caliptra RT
32,801,672 UART: [state] CFI Enabled
32,919,781 UART: [rt] RT listening for mailbox commands...
32,951,409 UART: [rt]cmd =0x4c444556, len=4
32,962,659 >>> mbox cmd response data (687 bytes)
33,004,699 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,034,564 UART: [rt]cmd =0x43455246, len=4
33,047,258 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
4,126,929 ready_for_fw is high
4,127,643 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,067,617 >>> mbox cmd response: success
18,068,270 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,705,786 UART:
23,706,189 UART: Running Caliptra FMC ...
23,707,300 UART:
23,707,455 UART: [state] CFI Enabled
23,715,558 UART: [fht] FMC Alias Private Key: 7
26,045,937 UART: [art] Extend RT PCRs Done
26,047,172 UART: [art] Lock RT PCRs Done
26,048,776 UART: [art] Populate DV Done
26,054,134 UART: [fht] FMC Alias Private Key: 7
26,055,652 UART: [art] Derive CDI
26,056,394 UART: [art] Store in in slot 0x4
26,099,117 UART: [art] Derive Key Pair
26,100,159 UART: [art] Store priv key in slot 0x5
29,342,332 UART: [art] Derive Key Pair - Done
29,355,281 UART: [art] Signing Cert with AUTHO
29,356,598 UART: RITY.KEYID = 7
31,636,307 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,816 UART: [art] PUB.X = 0561B66DAE1900BD805684B53965151C39D0035B3C99814651379DD73B8E1BEA8B32C48B5A9B4E65D1C24FCB69619639
31,645,018 UART: [art] PUB.Y = 1E1D3E64FB4FA912A72AB9F0BC3CE419DD85130D010D42AF1B9BD912FDB661F591E024970AD482CDAC7806298167CD79
31,652,329 UART: [art] SIG.R = 46CD702CFC194D23C9745F9F9A18F91B24CBFA8494D83A31D8C3A3DFA90765A82FDDD6574FFC89AAC569595FD61B692E
31,659,737 UART: [art] SIG.S = A368F7BC3DBEE6C3E9343E854515D9CBBBD98B5309AA82AB55F333E98961A55F06B34B8E9A8C96C2DE92955043814ECB
32,964,633 UART: Caliptra RT
32,965,345 UART: [state] CFI Enabled
33,082,091 UART: [rt] RT listening for mailbox commands...
33,113,458 UART: [rt]cmd =0x4c444556, len=4
33,124,484 >>> mbox cmd response data (687 bytes)
33,166,232 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,196,223 UART: [rt]cmd =0x43455246, len=4
33,209,233 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,051 UART:
192,453 UART: Running Caliptra ROM ...
193,624 UART:
193,773 UART: [state] CFI Enabled
264,340 UART: [state] LifecycleState = Unprovisioned
266,416 UART: [state] DebugLocked = No
269,015 UART: [state] WD Timer not started. Device not locked for debugging
271,849 UART: [kat] SHA2-256
450,976 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,569 UART: [kat] ++
463,099 UART: [kat] sha1
474,197 UART: [kat] SHA2-256
477,193 UART: [kat] SHA2-384
484,451 UART: [kat] SHA2-512-ACC
487,395 UART: [kat] ECC-384
2,950,119 UART: [kat] HMAC-384Kdf
2,972,447 UART: [kat] LMS
3,501,892 UART: [kat] --
3,507,391 UART: [cold-reset] ++
3,508,898 UART: [fht] FHT @ 0x50003400
3,520,158 UART: [idev] ++
3,520,716 UART: [idev] CDI.KEYID = 6
3,521,594 UART: [idev] SUBJECT.KEYID = 7
3,522,835 UART: [idev] UDS.KEYID = 0
3,523,760 ready_for_fw is high
3,523,949 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,550 UART: [idev] Erasing UDS.KEYID = 0
6,025,640 UART: [idev] Sha1 KeyId Algorithm
6,050,101 UART: [idev] --
6,054,590 UART: [ldev] ++
6,055,166 UART: [ldev] CDI.KEYID = 6
6,056,053 UART: [ldev] SUBJECT.KEYID = 5
6,057,270 UART: [ldev] AUTHORITY.KEYID = 7
6,058,526 UART: [ldev] FE.KEYID = 1
6,100,470 UART: [ldev] Erasing FE.KEYID = 1
8,601,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,174 UART: [ldev] --
10,393,839 UART: [fwproc] Wait for Commands...
10,395,876 UART: [fwproc] Recv command 0x46574c44
10,397,963 UART: [fwproc] Recv'd Img size: 114168 bytes
13,800,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,462 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,266,408 >>> mbox cmd response: success
14,266,934 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,270,971 UART: [afmc] ++
14,271,558 UART: [afmc] CDI.KEYID = 6
14,272,446 UART: [afmc] SUBJECT.KEYID = 7
14,273,659 UART: [afmc] AUTHORITY.KEYID = 5
16,807,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,203 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,062 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,043 UART: [afmc] --
18,606,416 UART: [cold-reset] --
18,608,770 UART: [state] Locking Datavault
18,612,884 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,585 UART: [state] Locking ICCM
18,616,749 UART: [exit] Launching FMC @ 0x40000130
18,625,164 UART:
18,625,408 UART: Running Caliptra FMC ...
18,626,511 UART:
18,626,670 UART: [state] CFI Enabled
18,689,618 UART: [fht] FMC Alias Private Key: 7
20,453,712 UART: [art] Extend RT PCRs Done
20,454,935 UART: [art] Lock RT PCRs Done
20,456,590 UART: [art] Populate DV Done
20,461,999 UART: [fht] FMC Alias Private Key: 7
20,463,640 UART: [art] Derive CDI
20,464,379 UART: [art] Store in in slot 0x4
20,521,936 UART: [art] Derive Key Pair
20,522,972 UART: [art] Store priv key in slot 0x5
22,985,839 UART: [art] Derive Key Pair - Done
22,998,611 UART: [art] Signing Cert with AUTHO
22,999,915 UART: RITY.KEYID = 7
24,712,120 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,626 UART: [art] PUB.X = 889CBEFFB3822BEB3467EA8E48DCE4948C61C2F4CF87A2F9A1E000EBD2A12EF9B4EAC54C235D123867BD8FC40882AD2C
24,720,894 UART: [art] PUB.Y = 9250C1668F1AEB33A9F3682DBA1658341BA0FE5DAE2129CD0C0D0D1030115A6897F053E877E70D4BEE79F5541371A225
24,728,154 UART: [art] SIG.R = 8B37CD56D2860E22E72C2F6701C72201EA7261DAE441C0F63B5087873658863A96B1E86B582E1575C9593C4F9F313DB4
24,735,512 UART: [art] SIG.S = 952532BB43F170DC66770B2AD3D51CC479922D0FDC4403EA677C117E738EFC6274F39344D1AA591079828B1730DE12A5
25,714,242 UART: Caliptra RT
25,714,941 UART: [state] CFI Enabled
25,879,258 UART: [rt] RT listening for mailbox commands...
25,910,584 UART: [rt]cmd =0x4c444556, len=4
25,921,559 >>> mbox cmd response data (687 bytes)
25,962,789 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,993,053 UART: [rt]cmd =0x43455246, len=4
26,005,697 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,381,326 ready_for_fw is high
3,381,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,078,162 >>> mbox cmd response: success
14,078,992 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,366,112 UART:
18,366,506 UART: Running Caliptra FMC ...
18,367,638 UART:
18,367,795 UART: [state] CFI Enabled
18,436,780 UART: [fht] FMC Alias Private Key: 7
20,200,636 UART: [art] Extend RT PCRs Done
20,201,874 UART: [art] Lock RT PCRs Done
20,203,611 UART: [art] Populate DV Done
20,209,348 UART: [fht] FMC Alias Private Key: 7
20,210,845 UART: [art] Derive CDI
20,211,608 UART: [art] Store in in slot 0x4
20,269,655 UART: [art] Derive Key Pair
20,270,685 UART: [art] Store priv key in slot 0x5
22,733,736 UART: [art] Derive Key Pair - Done
22,746,730 UART: [art] Signing Cert with AUTHO
22,748,038 UART: RITY.KEYID = 7
24,459,740 UART: [art] Erasing AUTHORITY.KEYID = 7
24,461,409 UART: [art] PUB.X = E8E5265D6B9A7064EE380F16B044F9970C659113FFDE76CBCDB12687FC213C36E763BA962ACA7EAE46B49BE8C4880A5F
24,468,567 UART: [art] PUB.Y = 8C5352D8A9397CAB3D03B64241F2E5E58C167B7B05EFBA21807C5554A1DF9FD0C4BA5FEB415D24F751562BEB482BEFC8
24,475,879 UART: [art] SIG.R = 853859AD9A765EEB28309488B52AB9497D4231ECD779B2A872C121942007EBEF117A3381477C0A6C123D5A365C3C13FB
24,483,215 UART: [art] SIG.S = C7B89A78F4DAF8A2906977CC291C1F63030319FBC8FD015CFEA6C04388D6DCBB37A41104FC36024F05D90E9AD0F01AAE
25,461,487 UART: Caliptra RT
25,462,224 UART: [state] CFI Enabled
25,626,189 UART: [rt] RT listening for mailbox commands...
25,657,501 UART: [rt]cmd =0x4c444556, len=4
25,668,694 >>> mbox cmd response data (687 bytes)
25,709,619 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,739,560 UART: [rt]cmd =0x43455246, len=4
25,752,275 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
192,810 UART:
193,179 UART: Running Caliptra ROM ...
194,368 UART:
603,873 UART: [state] CFI Enabled
619,540 UART: [state] LifecycleState = Unprovisioned
621,418 UART: [state] DebugLocked = No
622,943 UART: [state] WD Timer not started. Device not locked for debugging
626,893 UART: [kat] SHA2-256
805,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,530 UART: [kat] ++
817,978 UART: [kat] sha1
828,922 UART: [kat] SHA2-256
831,923 UART: [kat] SHA2-384
838,264 UART: [kat] SHA2-512-ACC
841,267 UART: [kat] ECC-384
3,282,637 UART: [kat] HMAC-384Kdf
3,293,654 UART: [kat] LMS
3,823,143 UART: [kat] --
3,826,776 UART: [cold-reset] ++
3,828,938 UART: [fht] FHT @ 0x50003400
3,839,424 UART: [idev] ++
3,839,986 UART: [idev] CDI.KEYID = 6
3,841,019 UART: [idev] SUBJECT.KEYID = 7
3,842,151 UART: [idev] UDS.KEYID = 0
3,843,079 ready_for_fw is high
3,843,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,665 UART: [idev] Erasing UDS.KEYID = 0
6,318,280 UART: [idev] Sha1 KeyId Algorithm
6,341,879 UART: [idev] --
6,346,360 UART: [ldev] ++
6,346,934 UART: [ldev] CDI.KEYID = 6
6,347,993 UART: [ldev] SUBJECT.KEYID = 5
6,349,094 UART: [ldev] AUTHORITY.KEYID = 7
6,350,269 UART: [ldev] FE.KEYID = 1
6,359,824 UART: [ldev] Erasing FE.KEYID = 1
8,833,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,552 UART: [ldev] --
10,624,652 UART: [fwproc] Wait for Commands...
10,626,736 UART: [fwproc] Recv command 0x46574c44
10,628,841 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,171 >>> mbox cmd response: success
14,487,665 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,491,961 UART: [afmc] ++
14,492,549 UART: [afmc] CDI.KEYID = 6
14,493,438 UART: [afmc] SUBJECT.KEYID = 7
14,494,659 UART: [afmc] AUTHORITY.KEYID = 5
16,990,341 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,348 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,131 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,005 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,979 UART: [afmc] --
18,784,936 UART: [cold-reset] --
18,788,891 UART: [state] Locking Datavault
18,793,436 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,131 UART: [state] Locking ICCM
18,797,469 UART: [exit] Launching FMC @ 0x40000130
18,805,906 UART:
18,806,146 UART: Running Caliptra FMC ...
18,807,173 UART:
18,807,322 UART: [state] CFI Enabled
18,815,502 UART: [fht] FMC Alias Private Key: 7
20,571,966 UART: [art] Extend RT PCRs Done
20,573,205 UART: [art] Lock RT PCRs Done
20,574,856 UART: [art] Populate DV Done
20,580,213 UART: [fht] FMC Alias Private Key: 7
20,581,751 UART: [art] Derive CDI
20,582,565 UART: [art] Store in in slot 0x4
20,625,585 UART: [art] Derive Key Pair
20,626,618 UART: [art] Store priv key in slot 0x5
23,053,367 UART: [art] Derive Key Pair - Done
23,066,627 UART: [art] Signing Cert with AUTHO
23,067,937 UART: RITY.KEYID = 7
24,773,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,765 UART: [art] PUB.X = D4E268EEFEFD95ED73FC4BB2566082D1F628ECE147818653016A9EBFA4F5320C5F4C69684A98CC635FBEDCE4177F4211
24,782,019 UART: [art] PUB.Y = F2E4241FE48C94595FA94B56D1D47B2F9B9B4AF32B817103E17795E6AB9F72C126ACAA37ECBB0B56F7547FF1B030A59D
24,789,287 UART: [art] SIG.R = D41B0F8E20C8F358F300E4B7564CAE29D698A088E8B2649EE03ACA481845E45773487C6DEBA85E6425AA0016CEEF5559
24,796,690 UART: [art] SIG.S = 584BFCB42D7E4202D0AA4654A7AB2BFB4B87EA02F72E09E87495A94BE9C3F1B5F320523DE178EDD34DB4C4D4A007EA1D
25,775,475 UART: Caliptra RT
25,776,203 UART: [state] CFI Enabled
25,893,000 UART: [rt] RT listening for mailbox commands...
25,924,193 UART: [rt]cmd =0x4c444556, len=4
25,935,412 >>> mbox cmd response data (687 bytes)
25,976,862 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,006,841 UART: [rt]cmd =0x43455246, len=4
26,019,741 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,776 writing to cptra_bootfsm_go
3,696,083 ready_for_fw is high
3,696,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,271,770 >>> mbox cmd response: success
14,272,541 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,520,401 UART:
18,520,778 UART: Running Caliptra FMC ...
18,521,969 UART:
18,522,138 UART: [state] CFI Enabled
18,530,136 UART: [fht] FMC Alias Private Key: 7
20,287,210 UART: [art] Extend RT PCRs Done
20,288,446 UART: [art] Lock RT PCRs Done
20,290,186 UART: [art] Populate DV Done
20,295,835 UART: [fht] FMC Alias Private Key: 7
20,297,489 UART: [art] Derive CDI
20,298,303 UART: [art] Store in in slot 0x4
20,340,863 UART: [art] Derive Key Pair
20,341,905 UART: [art] Store priv key in slot 0x5
22,768,805 UART: [art] Derive Key Pair - Done
22,781,473 UART: [art] Signing Cert with AUTHO
22,782,779 UART: RITY.KEYID = 7
24,488,091 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,595 UART: [art] PUB.X = B20AA9F87940C13F905584E5816F6CDAEB37E75DCD4CA6A2DF8340A60A8487D75FFAA23E781E7002ED2A093CEA013BA4
24,496,895 UART: [art] PUB.Y = DFF430FFB1DCD24E307138139D72F788FB7237722D593EB11B2926D5B0639EA5D483E121A2B3C37DBF426681205983C4
24,504,164 UART: [art] SIG.R = 25FE005668E8DBAC541D40B4AE27AD65D2EE4B0A4B35366FF9BB7B6767016F882CF09EAE6D1B4B983DC99426C415FCEB
24,511,559 UART: [art] SIG.S = 0CF2F068C3969A361D169865FEAC80795D552EF53A6295B0EC34010D2F3465BAA96303AF44AADD192EC1D0E45DDAEAFF
25,490,425 UART: Caliptra RT
25,491,125 UART: [state] CFI Enabled
25,608,415 UART: [rt] RT listening for mailbox commands...
25,639,901 UART: [rt]cmd =0x4c444556, len=4
25,651,148 >>> mbox cmd response data (687 bytes)
25,692,516 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,722,425 UART: [rt]cmd =0x43455246, len=4
25,735,169 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,877 writing to cptra_bootfsm_go
193,094 UART:
193,471 UART: Running Caliptra ROM ...
194,617 UART:
194,770 UART: [state] CFI Enabled
264,258 UART: [state] LifecycleState = Unprovisioned
266,606 UART: [state] DebugLocked = No
268,573 UART: [state] WD Timer not started. Device not locked for debugging
272,984 UART: [kat] SHA2-256
462,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,652 UART: [kat] ++
474,129 UART: [kat] sha1
484,820 UART: [kat] SHA2-256
487,883 UART: [kat] SHA2-384
494,879 UART: [kat] SHA2-512-ACC
497,467 UART: [kat] ECC-384
2,947,926 UART: [kat] HMAC-384Kdf
2,972,804 UART: [kat] LMS
3,504,600 UART: [kat] --
3,508,803 UART: [cold-reset] ++
3,511,371 UART: [fht] FHT @ 0x50003400
3,523,016 UART: [idev] ++
3,523,696 UART: [idev] CDI.KEYID = 6
3,524,616 UART: [idev] SUBJECT.KEYID = 7
3,525,868 UART: [idev] UDS.KEYID = 0
3,526,791 ready_for_fw is high
3,526,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,437 UART: [idev] Erasing UDS.KEYID = 0
6,028,935 UART: [idev] Sha1 KeyId Algorithm
6,050,362 UART: [idev] --
6,055,440 UART: [ldev] ++
6,056,125 UART: [ldev] CDI.KEYID = 6
6,057,050 UART: [ldev] SUBJECT.KEYID = 5
6,058,208 UART: [ldev] AUTHORITY.KEYID = 7
6,059,439 UART: [ldev] FE.KEYID = 1
6,101,305 UART: [ldev] Erasing FE.KEYID = 1
8,605,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,270 UART: [ldev] --
10,413,764 UART: [fwproc] Wait for Commands...
10,415,698 UART: [fwproc] Recv command 0x46574c44
10,418,003 UART: [fwproc] Recv'd Img size: 114168 bytes
13,869,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,683 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,603,870 >>> mbox cmd response: success
14,604,399 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,607,725 UART: [afmc] ++
14,608,413 UART: [afmc] CDI.KEYID = 6
14,609,577 UART: [afmc] SUBJECT.KEYID = 7
14,611,141 UART: [afmc] AUTHORITY.KEYID = 5
17,152,979 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,519 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,969 UART: [afmc] --
18,952,105 UART: [cold-reset] --
18,957,269 UART: [state] Locking Datavault
18,962,588 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,772 UART: [state] Locking ICCM
18,967,150 UART: [exit] Launching FMC @ 0x40000130
18,975,829 UART:
18,976,064 UART: Running Caliptra FMC ...
18,977,165 UART:
18,977,345 UART: [state] CFI Enabled
19,034,084 UART: [fht] FMC Alias Private Key: 7
20,798,356 UART: [art] Extend RT PCRs Done
20,799,559 UART: [art] Lock RT PCRs Done
20,801,183 UART: [art] Populate DV Done
20,806,758 UART: [fht] FMC Alias Private Key: 7
20,808,290 UART: [art] Derive CDI
20,809,057 UART: [art] Store in in slot 0x4
20,866,786 UART: [art] Derive Key Pair
20,867,782 UART: [art] Store priv key in slot 0x5
23,330,689 UART: [art] Derive Key Pair - Done
23,343,152 UART: [art] Signing Cert with AUTHO
23,344,463 UART: RITY.KEYID = 7
25,056,891 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,388 UART: [art] PUB.X = 07162F7EFE544834242490910929CE14E203878F4C662588AA5155D427FD0188563D9F522438C6711D81E82799645886
25,065,604 UART: [art] PUB.Y = 19C7C3B4606A1DF6E830DDA1489A7CB663DBD3CC6CE687C39BBF45EA72223051CC16F7DBDE32918022EBB2F036B05348
25,072,929 UART: [art] SIG.R = E76D7AB9B42AA03A0DA4282AEAB9B3E6A68D4AAF38EFA2C34CDDE1A7D445F936B2CAF603FAAB9D15BB12712213BBD591
25,080,345 UART: [art] SIG.S = 5BF07C5C764B91FAFF2E1298A9A03B6B921364EECBCD38B5DB78A64706A8B8092BFE37A34842F3295055CAC37FA3BCC5
26,059,406 UART: Caliptra RT
26,060,119 UART: [state] CFI Enabled
26,226,401 UART: [rt] RT listening for mailbox commands...
26,257,635 UART: [rt]cmd =0x4c444556, len=4
26,268,643 >>> mbox cmd response data (687 bytes)
26,309,811 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,339,720 UART: [rt]cmd =0x43455246, len=4
26,352,448 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,434,680 ready_for_fw is high
3,435,076 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,727,217 >>> mbox cmd response: success
14,727,832 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,043,190 UART:
19,043,590 UART: Running Caliptra FMC ...
19,044,793 UART:
19,044,977 UART: [state] CFI Enabled
19,113,578 UART: [fht] FMC Alias Private Key: 7
20,877,295 UART: [art] Extend RT PCRs Done
20,878,512 UART: [art] Lock RT PCRs Done
20,880,465 UART: [art] Populate DV Done
20,885,995 UART: [fht] FMC Alias Private Key: 7
20,887,591 UART: [art] Derive CDI
20,888,406 UART: [art] Store in in slot 0x4
20,946,673 UART: [art] Derive Key Pair
20,947,736 UART: [art] Store priv key in slot 0x5
23,410,762 UART: [art] Derive Key Pair - Done
23,423,709 UART: [art] Signing Cert with AUTHO
23,425,018 UART: RITY.KEYID = 7
25,137,092 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,606 UART: [art] PUB.X = 68125798E9E23DF202C101C2C8378745216A71805149AACC18E7FBFDD6FD8E3AF52E871D417DA72748C651E44A334881
25,145,848 UART: [art] PUB.Y = F869E2A331D28DE60835F6BEE3F090DD079E2BA3B35F0333414AF3E3DB387664C60E817E78A33CE90FD482002C935736
25,153,077 UART: [art] SIG.R = 7475CB79D9D15C2E29B570FB6D39E094EE60AE13A2B6F750398F3FD1CBDF9A00137121EEC888336339FFC34A10F5B1CC
25,160,476 UART: [art] SIG.S = E49AA1BDC53D24E016AA1BFFCE564893377D540046133ADA1C7098EE278D5896056ED764A8BACE3B0E15454ED079A2B7
26,139,677 UART: Caliptra RT
26,140,366 UART: [state] CFI Enabled
26,304,968 UART: [rt] RT listening for mailbox commands...
26,336,346 UART: [rt]cmd =0x4c444556, len=4
26,347,327 >>> mbox cmd response data (687 bytes)
26,388,555 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,418,614 UART: [rt]cmd =0x43455246, len=4
26,431,315 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,827 writing to cptra_bootfsm_go
192,968 UART:
193,326 UART: Running Caliptra ROM ...
194,517 UART:
604,011 UART: [state] CFI Enabled
618,386 UART: [state] LifecycleState = Unprovisioned
620,756 UART: [state] DebugLocked = No
623,351 UART: [state] WD Timer not started. Device not locked for debugging
628,171 UART: [kat] SHA2-256
817,993 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,798 UART: [kat] ++
829,308 UART: [kat] sha1
839,608 UART: [kat] SHA2-256
842,692 UART: [kat] SHA2-384
848,047 UART: [kat] SHA2-512-ACC
850,634 UART: [kat] ECC-384
3,294,970 UART: [kat] HMAC-384Kdf
3,306,920 UART: [kat] LMS
3,838,706 UART: [kat] --
3,844,399 UART: [cold-reset] ++
3,846,047 UART: [fht] FHT @ 0x50003400
3,857,312 UART: [idev] ++
3,858,020 UART: [idev] CDI.KEYID = 6
3,858,937 UART: [idev] SUBJECT.KEYID = 7
3,860,181 UART: [idev] UDS.KEYID = 0
3,861,278 ready_for_fw is high
3,861,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,824 UART: [idev] Erasing UDS.KEYID = 0
6,335,384 UART: [idev] Sha1 KeyId Algorithm
6,358,370 UART: [idev] --
6,364,034 UART: [ldev] ++
6,364,714 UART: [ldev] CDI.KEYID = 6
6,365,623 UART: [ldev] SUBJECT.KEYID = 5
6,366,782 UART: [ldev] AUTHORITY.KEYID = 7
6,368,008 UART: [ldev] FE.KEYID = 1
6,379,739 UART: [ldev] Erasing FE.KEYID = 1
8,853,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,460 UART: [ldev] --
10,645,060 UART: [fwproc] Wait for Commands...
10,648,238 UART: [fwproc] Recv command 0x46574c44
10,650,546 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,839,701 >>> mbox cmd response: success
14,840,215 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,843,434 UART: [afmc] ++
14,844,145 UART: [afmc] CDI.KEYID = 6
14,845,336 UART: [afmc] SUBJECT.KEYID = 7
14,846,773 UART: [afmc] AUTHORITY.KEYID = 5
17,347,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,115 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,387 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,476 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,453 UART: [afmc] --
19,145,939 UART: [cold-reset] --
19,149,486 UART: [state] Locking Datavault
19,156,251 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,451 UART: [state] Locking ICCM
19,159,791 UART: [exit] Launching FMC @ 0x40000130
19,168,463 UART:
19,168,709 UART: Running Caliptra FMC ...
19,169,815 UART:
19,169,981 UART: [state] CFI Enabled
19,178,465 UART: [fht] FMC Alias Private Key: 7
20,934,854 UART: [art] Extend RT PCRs Done
20,936,077 UART: [art] Lock RT PCRs Done
20,937,753 UART: [art] Populate DV Done
20,943,496 UART: [fht] FMC Alias Private Key: 7
20,944,984 UART: [art] Derive CDI
20,945,751 UART: [art] Store in in slot 0x4
20,988,563 UART: [art] Derive Key Pair
20,989,596 UART: [art] Store priv key in slot 0x5
23,415,829 UART: [art] Derive Key Pair - Done
23,428,711 UART: [art] Signing Cert with AUTHO
23,430,023 UART: RITY.KEYID = 7
25,135,534 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,081 UART: [art] PUB.X = C2ECEDB0CA3366E7469118692C26F1451F7D0693F412C8E6E253723285F69DF909E56536098F80379DDBFA85AA15117D
25,144,285 UART: [art] PUB.Y = DED37C8F0A052286D7FC92914F13AA1E3BCDFCA6A37BCAF696261F2A3FC41A7440891543F75E615AEC151E83A1FF50BA
25,151,574 UART: [art] SIG.R = DCD4DA22FD546060710C5E0A7CA11057A56AE0E1FA8F883DDAA2A1D4BEAF1280D06F0BB43E8D16844EB8FFF7557DAE95
25,159,023 UART: [art] SIG.S = 1ECC6DE35DB19AAC7398E3E154A1FC716F0273602FC288F783888B56D39A7DF0BC4A9D0BBDC89A9D1401078A083A63B8
26,137,469 UART: Caliptra RT
26,138,175 UART: [state] CFI Enabled
26,255,750 UART: [rt] RT listening for mailbox commands...
26,287,002 UART: [rt]cmd =0x4c444556, len=4
26,297,934 >>> mbox cmd response data (687 bytes)
26,339,753 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,369,910 UART: [rt]cmd =0x43455246, len=4
26,382,604 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
3,759,007 ready_for_fw is high
3,759,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,948,141 >>> mbox cmd response: success
14,948,949 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,201,097 UART:
19,201,493 UART: Running Caliptra FMC ...
19,202,678 UART:
19,202,842 UART: [state] CFI Enabled
19,210,624 UART: [fht] FMC Alias Private Key: 7
20,967,294 UART: [art] Extend RT PCRs Done
20,968,534 UART: [art] Lock RT PCRs Done
20,970,327 UART: [art] Populate DV Done
20,975,864 UART: [fht] FMC Alias Private Key: 7
20,977,410 UART: [art] Derive CDI
20,978,223 UART: [art] Store in in slot 0x4
21,020,680 UART: [art] Derive Key Pair
21,021,717 UART: [art] Store priv key in slot 0x5
23,448,475 UART: [art] Derive Key Pair - Done
23,461,692 UART: [art] Signing Cert with AUTHO
23,462,998 UART: RITY.KEYID = 7
25,168,394 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,905 UART: [art] PUB.X = D10A2DA7F9C543E03F8866086FB44635C11785A63C344DFF79E18ED760E5A9AE455A8DDBF69AE3955327F18C7DE151F9
25,177,143 UART: [art] PUB.Y = BB29DD762030DF87B0C6D1A6F4467CFD45017F5A5C5E8506FA125E66701044CA10079BCA3C17BF70E0E3C911B819FF7F
25,184,386 UART: [art] SIG.R = 531D3FDBCFE85C4087B64CBB9181D280CB24EB6DFD41B589F7E8ACB7F924E27CD787F8D70348123BD5EEEB5ABB48D46F
25,191,834 UART: [art] SIG.S = 960D297B3233992315F0FBE4D4CEFF0EEEB92CA72ADC509FB7E29CA49ED258A32838B2E12C7234D38A0DB97FA44E93FA
26,170,549 UART: Caliptra RT
26,171,258 UART: [state] CFI Enabled
26,288,268 UART: [rt] RT listening for mailbox commands...
26,319,935 UART: [rt]cmd =0x4c444556, len=4
26,331,041 >>> mbox cmd response data (687 bytes)
26,373,102 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,402,876 UART: [rt]cmd =0x43455246, len=4
26,415,459 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,949 UART: [kat] SHA2-256
881,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,995 UART: [kat] ++
886,147 UART: [kat] sha1
890,379 UART: [kat] SHA2-256
892,317 UART: [kat] SHA2-384
895,068 UART: [kat] SHA2-512-ACC
896,969 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
906,978 UART: [kat] LMS
1,475,174 UART: [kat] --
1,476,175 UART: [cold-reset] ++
1,476,649 UART: [fht] Storing FHT @ 0x50003400
1,479,516 UART: [idev] ++
1,479,684 UART: [idev] CDI.KEYID = 6
1,480,044 UART: [idev] SUBJECT.KEYID = 7
1,480,468 UART: [idev] UDS.KEYID = 0
1,480,813 ready_for_fw is high
1,480,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,532 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,710 UART: [idev] --
1,514,919 UART: [ldev] ++
1,515,087 UART: [ldev] CDI.KEYID = 6
1,515,450 UART: [ldev] SUBJECT.KEYID = 5
1,515,876 UART: [ldev] AUTHORITY.KEYID = 7
1,516,339 UART: [ldev] FE.KEYID = 1
1,521,301 UART: [ldev] Erasing FE.KEYID = 1
1,546,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,636 UART: [ldev] --
1,586,149 UART: [fwproc] Waiting for Commands...
1,586,988 UART: [fwproc] Received command 0x46574c44
1,587,779 UART: [fwproc] Received Image of size 114168 bytes
2,884,305 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,964 >>> mbox cmd response: success
3,076,964 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,078,154 UART: [afmc] ++
3,078,322 UART: [afmc] CDI.KEYID = 6
3,078,684 UART: [afmc] SUBJECT.KEYID = 7
3,079,109 UART: [afmc] AUTHORITY.KEYID = 5
3,114,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,123 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,813 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,638 UART: [afmc] --
3,157,640 UART: [cold-reset] --
3,158,464 UART: [state] Locking Datavault
3,159,659 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,263 UART: [state] Locking ICCM
3,160,683 UART: [exit] Launching FMC @ 0x40000130
3,166,012 UART:
3,166,028 UART: Running Caliptra FMC ...
3,166,436 UART:
3,166,490 UART: [state] CFI Enabled
3,176,989 UART: [fht] FMC Alias Private Key: 7
3,284,368 UART: [art] Extend RT PCRs Done
3,284,796 UART: [art] Lock RT PCRs Done
3,286,676 UART: [art] Populate DV Done
3,294,999 UART: [fht] FMC Alias Private Key: 7
3,295,999 UART: [art] Derive CDI
3,296,279 UART: [art] Store in in slot 0x4
3,381,764 UART: [art] Derive Key Pair
3,382,124 UART: [art] Store priv key in slot 0x5
3,395,348 UART: [art] Derive Key Pair - Done
3,410,110 UART: [art] Signing Cert with AUTHO
3,410,590 UART: RITY.KEYID = 7
3,425,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,299 UART: [art] PUB.X = 8DB0B2A8DAA327D57E156688BF3E60234A4BC918D71AD4C403FC30D75E7A48E28AE160069A7967F642645DB3BBE121E3
3,433,071 UART: [art] PUB.Y = 7A146F8FD8FFDF7DC81284E88B73DBBAB50608CAB914CFD03A194DBAE6FFB4281ACF2EBC7C4946A6B491413AAFF7B4AE
3,440,047 UART: [art] SIG.R = 015FD1835849C03AB08B634393A0614E060E1F5F046A1EE2B3A4C835E4240B08AF53C6FB24785BB24E100973B244B655
3,446,792 UART: [art] SIG.S = 95C0588C84268AA2B94AEB214330B97E41D14C77E502AF4EF60F9974521DDA3788FFDD1EADF60C2E57705DC63FDB14F8
3,470,286 UART: Caliptra RT
3,470,539 UART: [state] CFI Enabled
3,578,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,830 UART: [rt]cmd =0x4c444556, len=4
3,619,341 >>> mbox cmd response data (687 bytes)
3,619,342 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,703 UART: [rt]cmd =0x43455246, len=4
3,661,092 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,649 ready_for_fw is high
1,362,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,260 >>> mbox cmd response: success
2,926,260 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,987,858 UART:
2,987,874 UART: Running Caliptra FMC ...
2,988,282 UART:
2,988,336 UART: [state] CFI Enabled
2,999,115 UART: [fht] FMC Alias Private Key: 7
3,106,552 UART: [art] Extend RT PCRs Done
3,106,980 UART: [art] Lock RT PCRs Done
3,108,566 UART: [art] Populate DV Done
3,117,009 UART: [fht] FMC Alias Private Key: 7
3,118,055 UART: [art] Derive CDI
3,118,335 UART: [art] Store in in slot 0x4
3,203,718 UART: [art] Derive Key Pair
3,204,078 UART: [art] Store priv key in slot 0x5
3,217,014 UART: [art] Derive Key Pair - Done
3,231,789 UART: [art] Signing Cert with AUTHO
3,232,269 UART: RITY.KEYID = 7
3,247,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,096 UART: [art] PUB.X = 9AE0E4EE086721747FB4653C5788B15CC0CAC7D125D44F9D57CD91CA5D62D47934ADAC98CF782712687E625A953EBC3E
3,254,873 UART: [art] PUB.Y = 666D7D34E6E18421269A60A30FEA147503F7F4AE812DA052F7B56F50277969B079F179B1AC210119248043C737131C8C
3,261,804 UART: [art] SIG.R = 7444BE38504D97FCA919215DFB211418313F43BA8DE70681A7AD4397B115ECA210B2E8A68E1AC19398C16EFEE52FB738
3,268,577 UART: [art] SIG.S = 5599EC4C3468FE7405F8B15ED908E2E1D1CDC6D01FB6DD0E37E40E5FD2D183CCA328EBA2FE42F2ACEA37C65ADD8A9E60
3,292,310 UART: Caliptra RT
3,292,563 UART: [state] CFI Enabled
3,400,691 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,983 UART: [rt]cmd =0x4c444556, len=4
3,441,368 >>> mbox cmd response data (687 bytes)
3,441,369 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,696 UART: [rt]cmd =0x43455246, len=4
3,483,163 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,234 UART: [kat] SHA2-256
882,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,280 UART: [kat] ++
886,432 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,245 UART: [kat] SHA2-512-ACC
897,146 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,597 UART: [kat] LMS
1,475,793 UART: [kat] --
1,476,584 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 ready_for_fw is high
1,481,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,939 UART: [idev] Erasing UDS.KEYID = 0
1,505,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,773 UART: [idev] --
1,514,932 UART: [ldev] ++
1,515,100 UART: [ldev] CDI.KEYID = 6
1,515,463 UART: [ldev] SUBJECT.KEYID = 5
1,515,889 UART: [ldev] AUTHORITY.KEYID = 7
1,516,352 UART: [ldev] FE.KEYID = 1
1,521,806 UART: [ldev] Erasing FE.KEYID = 1
1,547,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,445 UART: [ldev] --
1,586,734 UART: [fwproc] Waiting for Commands...
1,587,445 UART: [fwproc] Received command 0x46574c44
1,588,236 UART: [fwproc] Received Image of size 114168 bytes
2,885,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,514 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,866 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,433 >>> mbox cmd response: success
3,078,433 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,079,553 UART: [afmc] ++
3,079,721 UART: [afmc] CDI.KEYID = 6
3,080,083 UART: [afmc] SUBJECT.KEYID = 7
3,080,508 UART: [afmc] AUTHORITY.KEYID = 5
3,115,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,411 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,804 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,494 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,201 UART: [afmc] --
3,159,183 UART: [cold-reset] --
3,160,019 UART: [state] Locking Datavault
3,161,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,620 UART: [state] Locking ICCM
3,162,128 UART: [exit] Launching FMC @ 0x40000130
3,167,457 UART:
3,167,473 UART: Running Caliptra FMC ...
3,167,881 UART:
3,168,024 UART: [state] CFI Enabled
3,178,761 UART: [fht] FMC Alias Private Key: 7
3,287,412 UART: [art] Extend RT PCRs Done
3,287,840 UART: [art] Lock RT PCRs Done
3,289,844 UART: [art] Populate DV Done
3,298,285 UART: [fht] FMC Alias Private Key: 7
3,299,215 UART: [art] Derive CDI
3,299,495 UART: [art] Store in in slot 0x4
3,385,128 UART: [art] Derive Key Pair
3,385,488 UART: [art] Store priv key in slot 0x5
3,398,762 UART: [art] Derive Key Pair - Done
3,413,665 UART: [art] Signing Cert with AUTHO
3,414,145 UART: RITY.KEYID = 7
3,428,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,598 UART: [art] PUB.X = D704DAC157C1DF65B0CF75952F5563225AC73D4C6A958110668303435A8B4D3FEA9E80BAA18974A56AB975CABBDD4D7B
3,436,374 UART: [art] PUB.Y = 357B544FA6072F55DC2132E1252E970C5C93A9AC59BA5EB98C8DF8550AD57C338983F88B0BF354BF56DF5958206A139E
3,443,316 UART: [art] SIG.R = C137BDC6FDAD47861041ADD03B9E379A3DC29E4870E88B62A6C9F7DF546A6632FFFC4FF5AF9EF1B587DA74AD00C4028A
3,450,083 UART: [art] SIG.S = DFE8D6D654F0A0BA27AA9D7462FC643549827C2C1C8D36CFBDE8BD5165B93FF4EDDFEC9480BC16865FA8BDA571130D03
3,473,668 UART: Caliptra RT
3,474,013 UART: [state] CFI Enabled
3,582,163 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,639 UART: [rt]cmd =0x4c444556, len=4
3,623,048 >>> mbox cmd response data (687 bytes)
3,623,049 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,652,602 UART: [rt]cmd =0x43455246, len=4
3,664,955 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,410 ready_for_fw is high
1,362,410 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,807 >>> mbox cmd response: success
2,925,807 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,987,087 UART:
2,987,103 UART: Running Caliptra FMC ...
2,987,511 UART:
2,987,654 UART: [state] CFI Enabled
2,998,099 UART: [fht] FMC Alias Private Key: 7
3,105,728 UART: [art] Extend RT PCRs Done
3,106,156 UART: [art] Lock RT PCRs Done
3,107,572 UART: [art] Populate DV Done
3,115,813 UART: [fht] FMC Alias Private Key: 7
3,116,843 UART: [art] Derive CDI
3,117,123 UART: [art] Store in in slot 0x4
3,203,148 UART: [art] Derive Key Pair
3,203,508 UART: [art] Store priv key in slot 0x5
3,217,714 UART: [art] Derive Key Pair - Done
3,232,607 UART: [art] Signing Cert with AUTHO
3,233,087 UART: RITY.KEYID = 7
3,248,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,588 UART: [art] PUB.X = 269872C45384163E02B89E8683F95F02AF69040D30810F3F6683FB1C7B35BB20CF79139299503F63365A05B8381FFA45
3,256,328 UART: [art] PUB.Y = D82FC60AA3A2BD58FBBF5E5EE40AF8AB8B4638792C1D7276ED6CFE530031309FA8B94F61484BADA9E7B288234B0D9867
3,263,263 UART: [art] SIG.R = B170E5F7AB4EDF449742C7D2AD63EEDEC00AE85290AD2170D9159A91F5CC8BD0A38D9DA3644AF36AB6F0B5459B041F32
3,270,045 UART: [art] SIG.S = B375A3EB903454C9C85A9294DC26D222DDCE67EDC0398E2D30DC2B8124699BF9D3CC7DCCBD0F6FBBCB98F643C317E770
3,293,857 UART: Caliptra RT
3,294,202 UART: [state] CFI Enabled
3,401,674 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,928 UART: [rt]cmd =0x4c444556, len=4
3,442,385 >>> mbox cmd response data (687 bytes)
3,442,386 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,613 UART: [rt]cmd =0x43455246, len=4
3,483,742 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
85,921 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
892,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,903 UART: [kat] ++
897,055 UART: [kat] sha1
901,449 UART: [kat] SHA2-256
903,389 UART: [kat] SHA2-384
906,316 UART: [kat] SHA2-512-ACC
908,217 UART: [kat] ECC-384
917,678 UART: [kat] HMAC-384Kdf
922,432 UART: [kat] LMS
1,170,760 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,043 UART: [fht] FHT @ 0x50003400
1,174,840 UART: [idev] ++
1,175,008 UART: [idev] CDI.KEYID = 6
1,175,368 UART: [idev] SUBJECT.KEYID = 7
1,175,792 UART: [idev] UDS.KEYID = 0
1,176,137 ready_for_fw is high
1,176,137 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,762 UART: [idev] Erasing UDS.KEYID = 0
1,200,821 UART: [idev] Sha1 KeyId Algorithm
1,209,203 UART: [idev] --
1,210,367 UART: [ldev] ++
1,210,535 UART: [ldev] CDI.KEYID = 6
1,210,898 UART: [ldev] SUBJECT.KEYID = 5
1,211,324 UART: [ldev] AUTHORITY.KEYID = 7
1,211,787 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,441 UART: [ldev] --
1,282,886 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,150 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,055 >>> mbox cmd response: success
2,773,055 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,187 UART: [afmc] ++
2,774,355 UART: [afmc] CDI.KEYID = 6
2,774,717 UART: [afmc] SUBJECT.KEYID = 7
2,775,142 UART: [afmc] AUTHORITY.KEYID = 5
2,810,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,032 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,794 UART: [afmc] --
2,853,802 UART: [cold-reset] --
2,854,844 UART: [state] Locking Datavault
2,855,943 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,547 UART: [state] Locking ICCM
2,857,077 UART: [exit] Launching FMC @ 0x40000130
2,862,406 UART:
2,862,422 UART: Running Caliptra FMC ...
2,862,830 UART:
2,862,884 UART: [state] CFI Enabled
2,873,383 UART: [fht] FMC Alias Private Key: 7
2,980,790 UART: [art] Extend RT PCRs Done
2,981,218 UART: [art] Lock RT PCRs Done
2,982,448 UART: [art] Populate DV Done
2,990,817 UART: [fht] FMC Alias Private Key: 7
2,991,899 UART: [art] Derive CDI
2,992,179 UART: [art] Store in in slot 0x4
3,077,760 UART: [art] Derive Key Pair
3,078,120 UART: [art] Store priv key in slot 0x5
3,091,468 UART: [art] Derive Key Pair - Done
3,106,164 UART: [art] Signing Cert with AUTHO
3,106,644 UART: RITY.KEYID = 7
3,121,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,501 UART: [art] PUB.X = F4E06C7B936807ABA90DC609DC451E63A1CBBC6F6A6EAB2776E90B9CC2D97F99C3E794C48290DA5DC89DBB3D001F877C
3,129,257 UART: [art] PUB.Y = 936CDA165CA5EA8A34313E5001BCCFC42A009672B88C5F321775074DE6B32DA96B127E3CC9264C6572E539543B677B1B
3,136,181 UART: [art] SIG.R = 8E15480FFB7A9B69AB727E329189FA3E901AB81B0F96AD47B5BF8FA508875673C2B2643C60F9CFAD1C9B1B4A9995B5AE
3,142,956 UART: [art] SIG.S = 002D4177DEF3F2021C5A3127A2F949F5381541011D95F0D9D68B058A0983878DBFDB867649346C1E5ACCE8CA19B2582C
3,166,811 UART: Caliptra RT
3,167,064 UART: [state] CFI Enabled
3,275,968 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,334 UART: [rt]cmd =0x4c444556, len=4
3,316,749 >>> mbox cmd response data (687 bytes)
3,316,750 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,197 UART: [rt]cmd =0x43455246, len=4
3,358,418 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,537 ready_for_fw is high
1,060,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,692 >>> mbox cmd response: success
2,624,692 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,560 UART:
2,687,576 UART: Running Caliptra FMC ...
2,687,984 UART:
2,688,038 UART: [state] CFI Enabled
2,698,353 UART: [fht] FMC Alias Private Key: 7
2,806,208 UART: [art] Extend RT PCRs Done
2,806,636 UART: [art] Lock RT PCRs Done
2,808,416 UART: [art] Populate DV Done
2,816,519 UART: [fht] FMC Alias Private Key: 7
2,817,483 UART: [art] Derive CDI
2,817,763 UART: [art] Store in in slot 0x4
2,903,198 UART: [art] Derive Key Pair
2,903,558 UART: [art] Store priv key in slot 0x5
2,916,788 UART: [art] Derive Key Pair - Done
2,931,191 UART: [art] Signing Cert with AUTHO
2,931,671 UART: RITY.KEYID = 7
2,947,123 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,888 UART: [art] PUB.X = FAF2FCE3C7F81C414EC5007FF1C18D5A770692036444DA84D6D735807A430A672E232E05D1CD74D84DFE21AF68A4D379
2,954,632 UART: [art] PUB.Y = 91963D062389FDFAECBA429D14744C0AE932CDD9273F0C75AFEC8DA9DD86CC370A2D35D57B891637ADF46DDCFA265263
2,961,588 UART: [art] SIG.R = 2119557B537F16FCED320B4ADD64969B946EACC93AC8240344F4C17B044CC3459E715E29122FAF0A4C424EB3782D49FF
2,968,352 UART: [art] SIG.S = 40E98D7EBF671D69B74EFDD8FBB6D1CC96D56ED81FBF9843C97D574FA2B491A6A5EE1FA5A085AABED7A3B444D66D7944
2,992,347 UART: Caliptra RT
2,992,600 UART: [state] CFI Enabled
3,099,955 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,409 UART: [rt]cmd =0x4c444556, len=4
3,140,796 >>> mbox cmd response data (687 bytes)
3,140,797 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,169,972 UART: [rt]cmd =0x43455246, len=4
3,181,953 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
893,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,676 UART: [kat] ++
897,828 UART: [kat] sha1
902,116 UART: [kat] SHA2-256
904,056 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,295 UART: [kat] LMS
1,171,623 UART: [kat] --
1,172,496 UART: [cold-reset] ++
1,173,066 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,633 UART: [idev] Erasing UDS.KEYID = 0
1,201,808 UART: [idev] Sha1 KeyId Algorithm
1,210,316 UART: [idev] --
1,211,314 UART: [ldev] ++
1,211,482 UART: [ldev] CDI.KEYID = 6
1,211,845 UART: [ldev] SUBJECT.KEYID = 5
1,212,271 UART: [ldev] AUTHORITY.KEYID = 7
1,212,734 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,874 UART: [ldev] --
1,283,337 UART: [fwproc] Wait for Commands...
1,284,129 UART: [fwproc] Recv command 0x46574c44
1,284,857 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,909 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,602 >>> mbox cmd response: success
2,771,602 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,778 UART: [afmc] ++
2,772,946 UART: [afmc] CDI.KEYID = 6
2,773,308 UART: [afmc] SUBJECT.KEYID = 7
2,773,733 UART: [afmc] AUTHORITY.KEYID = 5
2,809,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,639 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,367 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,971 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,747 UART: [afmc] --
2,852,663 UART: [cold-reset] --
2,853,429 UART: [state] Locking Datavault
2,854,522 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,126 UART: [state] Locking ICCM
2,855,648 UART: [exit] Launching FMC @ 0x40000130
2,860,977 UART:
2,860,993 UART: Running Caliptra FMC ...
2,861,401 UART:
2,861,544 UART: [state] CFI Enabled
2,872,135 UART: [fht] FMC Alias Private Key: 7
2,980,106 UART: [art] Extend RT PCRs Done
2,980,534 UART: [art] Lock RT PCRs Done
2,981,978 UART: [art] Populate DV Done
2,990,229 UART: [fht] FMC Alias Private Key: 7
2,991,325 UART: [art] Derive CDI
2,991,605 UART: [art] Store in in slot 0x4
3,077,198 UART: [art] Derive Key Pair
3,077,558 UART: [art] Store priv key in slot 0x5
3,090,724 UART: [art] Derive Key Pair - Done
3,105,293 UART: [art] Signing Cert with AUTHO
3,105,773 UART: RITY.KEYID = 7
3,120,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,552 UART: [art] PUB.X = ADC90F372A9FDC65B7D52F49DAF2021E66563F7C68B907D0301BFA8A48750A599576EB7D1B89F4BAFF80A8D90444E1D5
3,128,319 UART: [art] PUB.Y = 5C5547A6501BD5643BF9DB837F92B7A552A3F06B3A73A92A37F49B8DB643519735155501CB76B5DE5F6F2BA233D4A3F1
3,135,270 UART: [art] SIG.R = F0BA5FB0ACF939046827F251DBA3DD181437263AB33021478A598E041DB407C2FE331D432D898F9404E4AFD130ABB48D
3,142,034 UART: [art] SIG.S = 38BE749272C016BCFDB079F551F268A917D6E8B520C5349193ADE8DD44B6A966F1A180BEE955A4CDF8DB152C8E22E1A1
3,166,047 UART: Caliptra RT
3,166,392 UART: [state] CFI Enabled
3,274,505 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,203 UART: [rt]cmd =0x4c444556, len=4
3,315,748 >>> mbox cmd response data (687 bytes)
3,315,749 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,094 UART: [rt]cmd =0x43455246, len=4
3,357,281 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,898 ready_for_fw is high
1,060,898 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,805 >>> mbox cmd response: success
2,625,805 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,849 UART:
2,687,865 UART: Running Caliptra FMC ...
2,688,273 UART:
2,688,416 UART: [state] CFI Enabled
2,698,933 UART: [fht] FMC Alias Private Key: 7
2,807,376 UART: [art] Extend RT PCRs Done
2,807,804 UART: [art] Lock RT PCRs Done
2,809,292 UART: [art] Populate DV Done
2,817,601 UART: [fht] FMC Alias Private Key: 7
2,818,563 UART: [art] Derive CDI
2,818,843 UART: [art] Store in in slot 0x4
2,904,644 UART: [art] Derive Key Pair
2,905,004 UART: [art] Store priv key in slot 0x5
2,919,046 UART: [art] Derive Key Pair - Done
2,933,935 UART: [art] Signing Cert with AUTHO
2,934,415 UART: RITY.KEYID = 7
2,949,355 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,120 UART: [art] PUB.X = 588E5333C4B373C75961A15B4CA97FA7C836DF7825C080AD5B693D86D9E9554F72D80E5120D6249D5FA0DE5C99C1C3A9
2,956,891 UART: [art] PUB.Y = 8EF55BDD9A739CBB46C4610E02E5043FDB1C562670804D1C28368AA11ED54F8F0393BB6A655D8D4638E9C800AA2F68D0
2,963,815 UART: [art] SIG.R = B83684C8ED96F14170977F6899F62AD5A5C7AC9EB470DD8621C5D8940CEC2EDC5363B3FC6C7B8A04EB1C997FEED35A44
2,970,595 UART: [art] SIG.S = 6E1A9578774A73F8A0B5EF55EADF99C827BA821D02BC44642C0B83135336A421C48DC95E8018266A245EB80A460EA71F
2,994,388 UART: Caliptra RT
2,994,733 UART: [state] CFI Enabled
3,103,524 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,816 UART: [rt]cmd =0x4c444556, len=4
3,144,307 >>> mbox cmd response data (687 bytes)
3,144,308 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,173,641 UART: [rt]cmd =0x43455246, len=4
3,185,636 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,239 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,208,095 UART: [idev] --
1,209,144 UART: [ldev] ++
1,209,312 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,103 UART: [ldev] AUTHORITY.KEYID = 7
1,210,566 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,090 UART: [fwproc] Wait for Commands...
1,281,681 UART: [fwproc] Recv command 0x46574c44
1,282,414 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,919 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,451 >>> mbox cmd response: success
2,770,451 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,771,508 UART: [afmc] ++
2,771,676 UART: [afmc] CDI.KEYID = 6
2,772,039 UART: [afmc] SUBJECT.KEYID = 7
2,772,465 UART: [afmc] AUTHORITY.KEYID = 5
2,807,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,888 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,309 UART: [afmc] --
2,851,271 UART: [cold-reset] --
2,852,123 UART: [state] Locking Datavault
2,853,378 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,982 UART: [state] Locking ICCM
2,854,594 UART: [exit] Launching FMC @ 0x40000130
2,859,923 UART:
2,859,939 UART: Running Caliptra FMC ...
2,860,347 UART:
2,860,401 UART: [state] CFI Enabled
2,871,108 UART: [fht] FMC Alias Private Key: 7
2,978,803 UART: [art] Extend RT PCRs Done
2,979,231 UART: [art] Lock RT PCRs Done
2,980,683 UART: [art] Populate DV Done
2,989,112 UART: [fht] FMC Alias Private Key: 7
2,990,152 UART: [art] Derive CDI
2,990,432 UART: [art] Store in in slot 0x4
3,076,219 UART: [art] Derive Key Pair
3,076,579 UART: [art] Store priv key in slot 0x5
3,089,379 UART: [art] Derive Key Pair - Done
3,103,966 UART: [art] Signing Cert with AUTHO
3,104,446 UART: RITY.KEYID = 7
3,119,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,247 UART: [art] PUB.X = 2FB8B7076B413C29EA4B14083E1A3503A2604D88FEC56E31BDA2232BA67DA3F9FBE57F74A36AFFB23279C09E1388F182
3,127,018 UART: [art] PUB.Y = 2F165B7DA3ADF25A5A8A631BE106F16370E05DD2A96A22B4575DF138F54CD1945FEE3D13FA91D483898B4C9ECA9E0350
3,133,974 UART: [art] SIG.R = 56A2CBCA2B178404C2E1D94C5EC5FD753C7999B136C052B00BAAA9AE2D59C2B0F1E17D366A034872D31F8B6BCA9FDC22
3,140,753 UART: [art] SIG.S = ED775D78049E743C6D1A7E448317030EE760AD6AD00FDE9A886ADF0B3BE55AE09EA6C10F636F47940D0B9CFAC6973F07
3,164,461 UART: Caliptra RT
3,164,714 UART: [state] CFI Enabled
3,273,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,121 UART: [rt]cmd =0x4c444556, len=4
3,314,610 >>> mbox cmd response data (687 bytes)
3,314,611 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,026 UART: [rt]cmd =0x43455246, len=4
3,356,207 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,356 ready_for_fw is high
1,055,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,761 >>> mbox cmd response: success
2,619,761 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,681,207 UART:
2,681,223 UART: Running Caliptra FMC ...
2,681,631 UART:
2,681,685 UART: [state] CFI Enabled
2,692,436 UART: [fht] FMC Alias Private Key: 7
2,799,487 UART: [art] Extend RT PCRs Done
2,799,915 UART: [art] Lock RT PCRs Done
2,801,417 UART: [art] Populate DV Done
2,809,798 UART: [fht] FMC Alias Private Key: 7
2,810,888 UART: [art] Derive CDI
2,811,168 UART: [art] Store in in slot 0x4
2,896,679 UART: [art] Derive Key Pair
2,897,039 UART: [art] Store priv key in slot 0x5
2,909,829 UART: [art] Derive Key Pair - Done
2,924,343 UART: [art] Signing Cert with AUTHO
2,924,823 UART: RITY.KEYID = 7
2,939,815 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,580 UART: [art] PUB.X = 87DD274EF8FF3CA0BFB8C7001E46FE00B8B993AA47E1CAD408F18FB9056EBFB5A2233288102F994609C078890F0D03C8
2,947,298 UART: [art] PUB.Y = 0F190C2F184C5CCC1A9F9841A891AD512D0A68EEF936209201EC0E3F424C9ED732DDC2389F8CCA77D1C94703FCFD3359
2,954,242 UART: [art] SIG.R = 63483510CE891708FAC9F1FB44AB1285C766EE84078874A050E03159880C220858CD26CA66E38BF5DD9993BCFB10DF5A
2,961,002 UART: [art] SIG.S = 60B15B1645E5B51754A909E2605BE0DD63B2733636D66D3E78F97794A4D3F4693362F7F6D909E4A5EA2B658B222D1A74
2,984,491 UART: Caliptra RT
2,984,744 UART: [state] CFI Enabled
3,092,151 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,122,635 UART: [rt]cmd =0x4c444556, len=4
3,133,024 >>> mbox cmd response data (687 bytes)
3,133,025 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,340 UART: [rt]cmd =0x43455246, len=4
3,174,587 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,201 UART: [state] LifecycleState = Unprovisioned
86,856 UART: [state] DebugLocked = No
87,426 UART: [state] WD Timer not started. Device not locked for debugging
88,635 UART: [kat] SHA2-256
892,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,314 UART: [kat] ++
896,466 UART: [kat] sha1
900,686 UART: [kat] SHA2-256
902,626 UART: [kat] SHA2-384
905,407 UART: [kat] SHA2-512-ACC
907,308 UART: [kat] ECC-384
916,893 UART: [kat] HMAC-384Kdf
921,585 UART: [kat] LMS
1,169,897 UART: [kat] --
1,170,952 UART: [cold-reset] ++
1,171,286 UART: [fht] FHT @ 0x50003400
1,174,010 UART: [idev] ++
1,174,178 UART: [idev] CDI.KEYID = 6
1,174,539 UART: [idev] SUBJECT.KEYID = 7
1,174,964 UART: [idev] UDS.KEYID = 0
1,175,310 ready_for_fw is high
1,175,310 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,217 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,951 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,282,962 UART: [fwproc] Recv command 0x46574c44
1,283,695 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,421 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,236 >>> mbox cmd response: success
2,773,236 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,445 UART: [afmc] ++
2,774,613 UART: [afmc] CDI.KEYID = 6
2,774,976 UART: [afmc] SUBJECT.KEYID = 7
2,775,402 UART: [afmc] AUTHORITY.KEYID = 5
2,810,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,337 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,876 UART: [afmc] --
2,853,978 UART: [cold-reset] --
2,854,882 UART: [state] Locking Datavault
2,855,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,569 UART: [state] Locking ICCM
2,857,001 UART: [exit] Launching FMC @ 0x40000130
2,862,330 UART:
2,862,346 UART: Running Caliptra FMC ...
2,862,754 UART:
2,862,897 UART: [state] CFI Enabled
2,873,474 UART: [fht] FMC Alias Private Key: 7
2,981,035 UART: [art] Extend RT PCRs Done
2,981,463 UART: [art] Lock RT PCRs Done
2,983,257 UART: [art] Populate DV Done
2,991,470 UART: [fht] FMC Alias Private Key: 7
2,992,628 UART: [art] Derive CDI
2,992,908 UART: [art] Store in in slot 0x4
3,078,343 UART: [art] Derive Key Pair
3,078,703 UART: [art] Store priv key in slot 0x5
3,092,129 UART: [art] Derive Key Pair - Done
3,106,873 UART: [art] Signing Cert with AUTHO
3,107,353 UART: RITY.KEYID = 7
3,122,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,076 UART: [art] PUB.X = 0D19C1558E491958393E40E56C1F67897450D633292452F505E23AD9AC3112899A9981AB15375F834690B7B9B797738D
3,129,822 UART: [art] PUB.Y = DEC4B23DA3E6CF0011397E32089A2A3C9A97F2C5AE6E33E1617CBBB7BFCCE0B1D2109C5E519A32F354805FFE7780AA51
3,136,765 UART: [art] SIG.R = 4F7D4214892BB727C33694997B9E03591ADCFFE9407AC55AA43CF0E91FD09AAC40647BF026026D98BAC98CF98FD91A7E
3,143,541 UART: [art] SIG.S = 4A5E328EB08602434D82D6BD6DB9688BD2F3D78C7FC2254135C85F74702924EADC770E10A3599F27043BEA8631AE28D7
3,167,667 UART: Caliptra RT
3,168,012 UART: [state] CFI Enabled
3,276,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,595 UART: [rt]cmd =0x4c444556, len=4
3,317,068 >>> mbox cmd response data (687 bytes)
3,317,069 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,346,454 UART: [rt]cmd =0x43455246, len=4
3,358,387 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,659 ready_for_fw is high
1,056,659 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,610 >>> mbox cmd response: success
2,621,610 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,558 UART:
2,683,574 UART: Running Caliptra FMC ...
2,683,982 UART:
2,684,125 UART: [state] CFI Enabled
2,695,220 UART: [fht] FMC Alias Private Key: 7
2,802,859 UART: [art] Extend RT PCRs Done
2,803,287 UART: [art] Lock RT PCRs Done
2,804,961 UART: [art] Populate DV Done
2,813,082 UART: [fht] FMC Alias Private Key: 7
2,814,066 UART: [art] Derive CDI
2,814,346 UART: [art] Store in in slot 0x4
2,899,787 UART: [art] Derive Key Pair
2,900,147 UART: [art] Store priv key in slot 0x5
2,913,439 UART: [art] Derive Key Pair - Done
2,928,590 UART: [art] Signing Cert with AUTHO
2,929,070 UART: RITY.KEYID = 7
2,944,406 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,171 UART: [art] PUB.X = DECC7AC439057B0EE1DCAB48826D2E251A639EFC43FD071979A2718DFDEDC6AC530D9279056F59DAAC663663F5D1E40F
2,951,941 UART: [art] PUB.Y = FC795B0D232A19EFD5F6F362078D5C5D26C2254EE2AD4770DE02D43F000D75FE7AAF20F89B555C04580C14D64F46C20E
2,958,858 UART: [art] SIG.R = DFCBFFCF169A51868AC78AB1F8910A107AF138D4B3277CBBE6BB480B48A96E17C8362AA718272A2D99B4AA3323C19B3F
2,965,638 UART: [art] SIG.S = 88623D4C4877043BEFE90B74472F97A86F2372CC68817512A52104B21FEFA798B304B87CE13A1D56CE28BB75F32E33A7
2,989,901 UART: Caliptra RT
2,990,246 UART: [state] CFI Enabled
3,098,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,616 UART: [rt]cmd =0x4c444556, len=4
3,138,871 >>> mbox cmd response data (687 bytes)
3,138,872 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,253 UART: [rt]cmd =0x43455246, len=4
3,180,418 >>> mbox cmd response data (887 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,275 UART:
192,617 UART: Running Caliptra ROM ...
193,804 UART:
193,965 UART: [state] CFI Enabled
263,229 UART: [state] LifecycleState = Unprovisioned
265,139 UART: [state] DebugLocked = No
268,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,245 UART: [kat] SHA2-256
441,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,448 UART: [kat] ++
452,930 UART: [kat] sha1
464,363 UART: [kat] SHA2-256
467,019 UART: [kat] SHA2-384
472,156 UART: [kat] SHA2-512-ACC
474,509 UART: [kat] ECC-384
2,768,134 UART: [kat] HMAC-384Kdf
2,799,797 UART: [kat] LMS
3,990,084 UART: [kat] --
3,995,768 UART: [cold-reset] ++
3,997,231 UART: [fht] Storing FHT @ 0x50003400
4,008,571 UART: [idev] ++
4,009,141 UART: [idev] CDI.KEYID = 6
4,010,027 UART: [idev] SUBJECT.KEYID = 7
4,011,342 UART: [idev] UDS.KEYID = 0
4,012,313 ready_for_fw is high
4,012,519 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,754 UART: [idev] Erasing UDS.KEYID = 0
7,348,940 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,715 UART: [idev] --
7,374,709 UART: [ldev] ++
7,375,280 UART: [ldev] CDI.KEYID = 6
7,376,252 UART: [ldev] SUBJECT.KEYID = 5
7,377,457 UART: [ldev] AUTHORITY.KEYID = 7
7,378,687 UART: [ldev] FE.KEYID = 1
7,421,101 UART: [ldev] Erasing FE.KEYID = 1
10,753,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,821 UART: [ldev] --
13,111,776 UART: [fwproc] Waiting for Commands...
13,113,818 UART: [fwproc] Received command 0x46574c44
13,116,057 UART: [fwproc] Received Image of size 113844 bytes
17,164,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,300 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,623,692 >>> mbox cmd response: success
17,624,214 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,627,694 UART: [afmc] ++
17,628,297 UART: [afmc] CDI.KEYID = 6
17,629,173 UART: [afmc] SUBJECT.KEYID = 7
17,630,441 UART: [afmc] AUTHORITY.KEYID = 5
21,006,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,981 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,275 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,690 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,495 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,126 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,327 UART: [afmc] --
23,378,838 UART: [cold-reset] --
23,383,772 UART: [state] Locking Datavault
23,388,850 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,599 UART: [state] Locking ICCM
23,392,847 UART: [exit] Launching FMC @ 0x40000130
23,401,235 UART:
23,401,487 UART: Running Caliptra FMC ...
23,402,584 UART:
23,402,734 UART: [state] CFI Enabled
23,466,905 UART: [fht] FMC Alias Private Key: 7
25,805,095 UART: [art] Extend RT PCRs Done
25,806,313 UART: [art] Lock RT PCRs Done
25,807,691 UART: [art] Populate DV Done
25,813,148 UART: [fht] FMC Alias Private Key: 7
25,814,741 UART: [art] Derive CDI
25,815,550 UART: [art] Store in in slot 0x4
25,876,016 UART: [art] Derive Key Pair
25,877,056 UART: [art] Store priv key in slot 0x5
29,169,852 UART: [art] Derive Key Pair - Done
29,182,844 UART: [art] Signing Cert with AUTHO
29,184,137 UART: RITY.KEYID = 7
31,472,423 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,938 UART: [art] PUB.X = 1C551CD287877D7EDFBAC7F83E59524604DECC6478F67E96C66370AA2B50C8DBED386C3A9F12D9F008DC64EEF5F71F8D
31,481,224 UART: [art] PUB.Y = 80146A7B550D355B2CAD88DD395A76BE7FC503B21E9DE16C92FC2BA9C640EBF5F52241FFF32DDE9B071DFB2CA9EC0812
31,488,452 UART: [art] SIG.R = E7165F695703379D845918B9D7562C7691B1081D3EB0A868C5E04920545158A7489012BF3041873D5A3B86C0B9CDB9F4
31,495,773 UART: [art] SIG.S = 4E2B03D74B790F80B42CCC20D346867A4A5EB9436ABAE17BCA65536E749A1D45F0D6CD9D9233D0283B799EF4CAF0982A
32,801,336 UART: Caliptra RT
32,802,055 UART: [state] CFI Enabled
32,964,731 UART: [rt] RT listening for mailbox commands...
32,995,929 UART: [rt]cmd =0x4c444556, len=4
33,006,850 >>> mbox cmd response data (687 bytes)
33,048,481 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,078,459 UART: [rt]cmd =0x43455246, len=4
33,091,416 >>> mbox cmd response data (920 bytes)
33,108,344 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,138,490 UART: [rt]cmd =0x43455252, len=4
33,149,781 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
3,779,514 ready_for_fw is high
3,779,883 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,845,880 >>> mbox cmd response: success
17,846,459 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,551,685 UART:
23,552,064 UART: Running Caliptra FMC ...
23,553,165 UART:
23,553,313 UART: [state] CFI Enabled
23,618,291 UART: [fht] FMC Alias Private Key: 7
25,956,302 UART: [art] Extend RT PCRs Done
25,957,527 UART: [art] Lock RT PCRs Done
25,959,011 UART: [art] Populate DV Done
25,964,262 UART: [fht] FMC Alias Private Key: 7
25,965,793 UART: [art] Derive CDI
25,966,525 UART: [art] Store in in slot 0x4
26,027,367 UART: [art] Derive Key Pair
26,028,407 UART: [art] Store priv key in slot 0x5
29,321,109 UART: [art] Derive Key Pair - Done
29,334,037 UART: [art] Signing Cert with AUTHO
29,335,372 UART: RITY.KEYID = 7
31,623,808 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,318 UART: [art] PUB.X = 29DD99798053308ADF82B4206719AF7E86EBA23DB7617DBF88CDADA0FCB5B60D0F02AFC05ED417A5A8DB663B603233EC
31,632,594 UART: [art] PUB.Y = 7409D5A841AF87A50E3926B131FCC25B9F3DD1290D97D6DF77FAF402839EDF368AFD9DBBC26C95A3514AB6CA5FFFC93B
31,639,817 UART: [art] SIG.R = A4B49F020FDACED0F24438FC30EE30BECABC06259272A757F4FEF6F02554C8D446179552847E6EB8392C05737D0EA6C1
31,647,209 UART: [art] SIG.S = 1E32A652DA8642621DF463A5F84AE8BD5EE7124C1F39CC75E0EAC78398A3BA61A73EA608155A43098AC25F277F727439
32,952,652 UART: Caliptra RT
32,953,365 UART: [state] CFI Enabled
33,114,726 UART: [rt] RT listening for mailbox commands...
33,146,410 UART: [rt]cmd =0x4c444556, len=4
33,157,600 >>> mbox cmd response data (687 bytes)
33,198,988 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,229,112 UART: [rt]cmd =0x43455246, len=4
33,242,073 >>> mbox cmd response data (920 bytes)
33,259,234 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,289,002 UART: [rt]cmd =0x43455252, len=4
33,300,185 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,849 writing to cptra_bootfsm_go
193,950 UART:
194,301 UART: Running Caliptra ROM ...
195,481 UART:
605,079 UART: [state] CFI Enabled
619,397 UART: [state] LifecycleState = Unprovisioned
621,351 UART: [state] DebugLocked = No
623,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,382 UART: [kat] SHA2-256
798,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,694 UART: [kat] ++
809,231 UART: [kat] sha1
819,403 UART: [kat] SHA2-256
822,136 UART: [kat] SHA2-384
828,912 UART: [kat] SHA2-512-ACC
831,283 UART: [kat] ECC-384
3,114,968 UART: [kat] HMAC-384Kdf
3,127,005 UART: [kat] LMS
4,317,159 UART: [kat] --
4,322,882 UART: [cold-reset] ++
4,324,433 UART: [fht] Storing FHT @ 0x50003400
4,337,348 UART: [idev] ++
4,337,919 UART: [idev] CDI.KEYID = 6
4,338,873 UART: [idev] SUBJECT.KEYID = 7
4,340,138 UART: [idev] UDS.KEYID = 0
4,341,143 ready_for_fw is high
4,341,352 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,409 UART: [idev] Erasing UDS.KEYID = 0
7,625,518 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,035 UART: [idev] --
7,651,928 UART: [ldev] ++
7,652,550 UART: [ldev] CDI.KEYID = 6
7,653,483 UART: [ldev] SUBJECT.KEYID = 5
7,654,693 UART: [ldev] AUTHORITY.KEYID = 7
7,655,991 UART: [ldev] FE.KEYID = 1
7,666,504 UART: [ldev] Erasing FE.KEYID = 1
10,954,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,566 UART: [ldev] --
13,314,920 UART: [fwproc] Waiting for Commands...
13,317,013 UART: [fwproc] Received command 0x46574c44
13,319,207 UART: [fwproc] Received Image of size 113844 bytes
17,366,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,107 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,203 >>> mbox cmd response: success
17,827,729 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,830,941 UART: [afmc] ++
17,831,527 UART: [afmc] CDI.KEYID = 6
17,832,465 UART: [afmc] SUBJECT.KEYID = 7
17,833,742 UART: [afmc] AUTHORITY.KEYID = 5
21,150,065 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,119 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,373 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,770 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,633 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,060 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,058 UART: [afmc] --
23,515,660 UART: [cold-reset] --
23,521,312 UART: [state] Locking Datavault
23,528,923 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,688 UART: [state] Locking ICCM
23,531,870 UART: [exit] Launching FMC @ 0x40000130
23,540,279 UART:
23,540,524 UART: Running Caliptra FMC ...
23,541,579 UART:
23,541,734 UART: [state] CFI Enabled
23,549,560 UART: [fht] FMC Alias Private Key: 7
25,880,159 UART: [art] Extend RT PCRs Done
25,881,377 UART: [art] Lock RT PCRs Done
25,883,131 UART: [art] Populate DV Done
25,888,439 UART: [fht] FMC Alias Private Key: 7
25,890,087 UART: [art] Derive CDI
25,890,906 UART: [art] Store in in slot 0x4
25,933,658 UART: [art] Derive Key Pair
25,934,695 UART: [art] Store priv key in slot 0x5
29,177,068 UART: [art] Derive Key Pair - Done
29,190,014 UART: [art] Signing Cert with AUTHO
29,191,319 UART: RITY.KEYID = 7
31,470,622 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,126 UART: [art] PUB.X = 25CE77F391E30E826477253C7EB2E0FD3074B63C326E8F02C121E1E00D1E238B3ED1D160D8221EF244B342245DAD4B50
31,479,324 UART: [art] PUB.Y = EC51CB5EC62997BE0FC5EA411E24E16E3053880EDDD2D4224A2781D37708874C498A503F6386375D1A06E1611B97B69D
31,486,557 UART: [art] SIG.R = C902902D48972B42F411F92C76FBC1B8F5C3401955AB0FDB70B448E95688029E693A7A7FAC704D18378A400236BF2615
31,493,906 UART: [art] SIG.S = 9127E2C97F47ACFDAF839D385938946D3FCA8B12F56F994333AD349E1DA4EC13CFF376EC70300F60B7F7F901677A795D
32,799,333 UART: Caliptra RT
32,800,049 UART: [state] CFI Enabled
32,917,636 UART: [rt] RT listening for mailbox commands...
32,949,097 UART: [rt]cmd =0x4c444556, len=4
32,960,192 >>> mbox cmd response data (687 bytes)
33,001,832 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,031,824 UART: [rt]cmd =0x43455246, len=4
33,044,915 >>> mbox cmd response data (920 bytes)
33,061,864 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,091,566 UART: [rt]cmd =0x43455252, len=4
33,102,688 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,131,154 ready_for_fw is high
4,131,549 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,648 >>> mbox cmd response: success
18,062,242 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,700,191 UART:
23,700,578 UART: Running Caliptra FMC ...
23,701,784 UART:
23,701,953 UART: [state] CFI Enabled
23,709,909 UART: [fht] FMC Alias Private Key: 7
26,041,082 UART: [art] Extend RT PCRs Done
26,042,306 UART: [art] Lock RT PCRs Done
26,043,689 UART: [art] Populate DV Done
26,049,337 UART: [fht] FMC Alias Private Key: 7
26,050,917 UART: [art] Derive CDI
26,051,745 UART: [art] Store in in slot 0x4
26,094,242 UART: [art] Derive Key Pair
26,095,243 UART: [art] Store priv key in slot 0x5
29,336,999 UART: [art] Derive Key Pair - Done
29,349,780 UART: [art] Signing Cert with AUTHO
29,351,086 UART: RITY.KEYID = 7
31,630,441 UART: [art] Erasing AUTHORITY.KEYID = 7
31,631,952 UART: [art] PUB.X = 079689A95D5CEAF4929BB9BBDD214FFB83AA19E25D5DABE53BAD9C23AED60A002905E7FC44E47BD799021224714E8002
31,639,219 UART: [art] PUB.Y = 69D9D8E13F42CFAA0AAD367E024636C3B80B5CF385B55957D7ECA82FD18503616197F616BD29F517AD2BEDD4DF8C44C8
31,646,521 UART: [art] SIG.R = DED855730FD44DB9C686EF8B0CA05A1E3710040D38E942C238594297E5CB0B2AFD2332D53BCC0074810488162F378704
31,653,854 UART: [art] SIG.S = CB335573153CC007F7F1FB4C617D6ED225EE2FD84EB15520BE14739F17372206BAD103AD372981BD383475553F8AED32
32,958,692 UART: Caliptra RT
32,959,395 UART: [state] CFI Enabled
33,077,126 UART: [rt] RT listening for mailbox commands...
33,108,360 UART: [rt]cmd =0x4c444556, len=4
33,119,367 >>> mbox cmd response data (687 bytes)
33,160,837 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,190,889 UART: [rt]cmd =0x43455246, len=4
33,203,782 >>> mbox cmd response data (920 bytes)
33,220,670 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,250,532 UART: [rt]cmd =0x43455252, len=4
33,261,690 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,007 UART:
192,383 UART: Running Caliptra ROM ...
193,573 UART:
193,735 UART: [state] CFI Enabled
263,784 UART: [state] LifecycleState = Unprovisioned
265,608 UART: [state] DebugLocked = No
267,640 UART: [state] WD Timer not started. Device not locked for debugging
271,102 UART: [kat] SHA2-256
450,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,806 UART: [kat] ++
462,346 UART: [kat] sha1
472,376 UART: [kat] SHA2-256
475,446 UART: [kat] SHA2-384
481,650 UART: [kat] SHA2-512-ACC
484,656 UART: [kat] ECC-384
2,949,766 UART: [kat] HMAC-384Kdf
2,971,182 UART: [kat] LMS
3,500,652 UART: [kat] --
3,505,788 UART: [cold-reset] ++
3,506,803 UART: [fht] FHT @ 0x50003400
3,516,239 UART: [idev] ++
3,516,806 UART: [idev] CDI.KEYID = 6
3,517,715 UART: [idev] SUBJECT.KEYID = 7
3,518,890 UART: [idev] UDS.KEYID = 0
3,519,885 ready_for_fw is high
3,520,081 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,742 UART: [idev] Erasing UDS.KEYID = 0
6,027,915 UART: [idev] Sha1 KeyId Algorithm
6,051,508 UART: [idev] --
6,056,160 UART: [ldev] ++
6,056,746 UART: [ldev] CDI.KEYID = 6
6,057,662 UART: [ldev] SUBJECT.KEYID = 5
6,058,827 UART: [ldev] AUTHORITY.KEYID = 7
6,060,120 UART: [ldev] FE.KEYID = 1
6,099,395 UART: [ldev] Erasing FE.KEYID = 1
8,602,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,630 UART: [ldev] --
10,412,119 UART: [fwproc] Wait for Commands...
10,414,816 UART: [fwproc] Recv command 0x46574c44
10,416,912 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,368 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,280,102 >>> mbox cmd response: success
14,280,621 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,283,991 UART: [afmc] ++
14,284,578 UART: [afmc] CDI.KEYID = 6
14,285,488 UART: [afmc] SUBJECT.KEYID = 7
14,286,666 UART: [afmc] AUTHORITY.KEYID = 5
16,827,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,186 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,936 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,747 UART: [afmc] --
18,629,233 UART: [cold-reset] --
18,633,306 UART: [state] Locking Datavault
18,640,069 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,774 UART: [state] Locking ICCM
18,643,330 UART: [exit] Launching FMC @ 0x40000130
18,651,731 UART:
18,652,008 UART: Running Caliptra FMC ...
18,653,128 UART:
18,653,318 UART: [state] CFI Enabled
18,709,792 UART: [fht] FMC Alias Private Key: 7
20,473,982 UART: [art] Extend RT PCRs Done
20,475,199 UART: [art] Lock RT PCRs Done
20,476,962 UART: [art] Populate DV Done
20,482,372 UART: [fht] FMC Alias Private Key: 7
20,483,913 UART: [art] Derive CDI
20,484,651 UART: [art] Store in in slot 0x4
20,542,254 UART: [art] Derive Key Pair
20,543,291 UART: [art] Store priv key in slot 0x5
23,005,963 UART: [art] Derive Key Pair - Done
23,018,905 UART: [art] Signing Cert with AUTHO
23,020,208 UART: RITY.KEYID = 7
24,730,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,394 UART: [art] PUB.X = 4C41C6226C562776EE5E4E1947FDF2CBABF672B972A06ECF50087ACD727416E22C1684A73AA8C3CC3C94F7CE5526F65E
24,739,657 UART: [art] PUB.Y = 1ECB697B5258A8C290800C69C6B09C1C9530F8B9870717A4561F6EC91E7CE8BB40F2C87590A205F75DC776A2F0B14286
24,746,931 UART: [art] SIG.R = 987E614D3AC86F7E8BA26435BEE0027EDA47057255E3005346D4B64182F0D1859DB8DDEF860AD18CC47925DF0C4C5581
24,754,341 UART: [art] SIG.S = E56A3ABBB3757DDD205E230E27F79E68C08F81BF56BBA779460380700F7D3A648DCE43875D80CBCFCFF99ECA0027977F
25,732,819 UART: Caliptra RT
25,733,520 UART: [state] CFI Enabled
25,899,810 UART: [rt] RT listening for mailbox commands...
25,931,295 UART: [rt]cmd =0x4c444556, len=4
25,942,471 >>> mbox cmd response data (687 bytes)
25,983,741 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,013,599 UART: [rt]cmd =0x43455246, len=4
26,026,067 >>> mbox cmd response data (887 bytes)
26,042,595 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,072,300 UART: [rt]cmd =0x43455252, len=4
26,083,377 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,380,287 ready_for_fw is high
3,380,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,062,752 >>> mbox cmd response: success
14,063,678 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,361,952 UART:
18,362,349 UART: Running Caliptra FMC ...
18,363,447 UART:
18,363,600 UART: [state] CFI Enabled
18,427,615 UART: [fht] FMC Alias Private Key: 7
20,191,603 UART: [art] Extend RT PCRs Done
20,192,841 UART: [art] Lock RT PCRs Done
20,194,607 UART: [art] Populate DV Done
20,199,910 UART: [fht] FMC Alias Private Key: 7
20,201,394 UART: [art] Derive CDI
20,202,123 UART: [art] Store in in slot 0x4
20,260,657 UART: [art] Derive Key Pair
20,261,696 UART: [art] Store priv key in slot 0x5
22,724,731 UART: [art] Derive Key Pair - Done
22,737,626 UART: [art] Signing Cert with AUTHO
22,738,955 UART: RITY.KEYID = 7
24,450,558 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,066 UART: [art] PUB.X = 73BB7CD098EA71F2046372498D0596E90DB7477B9C812AAF4C2E17C826F1ABDD1161BAEE03412CD048B92B433A1A5AF6
24,459,369 UART: [art] PUB.Y = 4F3FB3FED71D98C021D30EC7A4B63CC1BE08132AE089A2D638A2BAB2CD8572E8B56F4F4610A140FE817A60E83535FD22
24,466,626 UART: [art] SIG.R = 2A5A0924B8D1DCA95F7292019288D1EFD43B418C1C96B3D7F1E8E485D43A68D371976FBC3E7422A96751DE485FF7CF92
24,474,027 UART: [art] SIG.S = FAD0DDBEBF86F486117E4CE89965020440DBD2014C4588FB225E67FC812B591D1D95D4233FA06CBA2BC7EAEF5DEE5A3A
25,452,619 UART: Caliptra RT
25,453,343 UART: [state] CFI Enabled
25,620,141 UART: [rt] RT listening for mailbox commands...
25,651,502 UART: [rt]cmd =0x4c444556, len=4
25,662,588 >>> mbox cmd response data (687 bytes)
25,703,459 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,733,593 UART: [rt]cmd =0x43455246, len=4
25,746,406 >>> mbox cmd response data (887 bytes)
25,763,104 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,793,087 UART: [rt]cmd =0x43455252, len=4
25,804,540 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
193,017 UART:
193,390 UART: Running Caliptra ROM ...
194,579 UART:
604,356 UART: [state] CFI Enabled
619,808 UART: [state] LifecycleState = Unprovisioned
621,697 UART: [state] DebugLocked = No
623,726 UART: [state] WD Timer not started. Device not locked for debugging
627,198 UART: [kat] SHA2-256
806,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,874 UART: [kat] ++
818,404 UART: [kat] sha1
829,992 UART: [kat] SHA2-256
833,017 UART: [kat] SHA2-384
838,828 UART: [kat] SHA2-512-ACC
841,845 UART: [kat] ECC-384
3,287,451 UART: [kat] HMAC-384Kdf
3,300,534 UART: [kat] LMS
3,830,018 UART: [kat] --
3,833,944 UART: [cold-reset] ++
3,836,098 UART: [fht] FHT @ 0x50003400
3,848,139 UART: [idev] ++
3,848,721 UART: [idev] CDI.KEYID = 6
3,849,639 UART: [idev] SUBJECT.KEYID = 7
3,850,813 UART: [idev] UDS.KEYID = 0
3,851,861 ready_for_fw is high
3,852,057 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,995,443 UART: [idev] Erasing UDS.KEYID = 0
6,323,955 UART: [idev] Sha1 KeyId Algorithm
6,347,582 UART: [idev] --
6,351,783 UART: [ldev] ++
6,352,554 UART: [ldev] CDI.KEYID = 6
6,353,480 UART: [ldev] SUBJECT.KEYID = 5
6,354,585 UART: [ldev] AUTHORITY.KEYID = 7
6,355,762 UART: [ldev] FE.KEYID = 1
6,366,621 UART: [ldev] Erasing FE.KEYID = 1
8,837,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,999 UART: [ldev] --
10,630,398 UART: [fwproc] Wait for Commands...
10,632,705 UART: [fwproc] Recv command 0x46574c44
10,634,796 UART: [fwproc] Recv'd Img size: 114168 bytes
14,040,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,354 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,497,716 >>> mbox cmd response: success
14,498,277 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,501,281 UART: [afmc] ++
14,501,867 UART: [afmc] CDI.KEYID = 6
14,502,782 UART: [afmc] SUBJECT.KEYID = 7
14,503,943 UART: [afmc] AUTHORITY.KEYID = 5
17,007,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,446 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,246 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,271 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,819 UART: [afmc] --
18,805,385 UART: [cold-reset] --
18,808,374 UART: [state] Locking Datavault
18,812,597 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,294 UART: [state] Locking ICCM
18,815,579 UART: [exit] Launching FMC @ 0x40000130
18,823,983 UART:
18,824,221 UART: Running Caliptra FMC ...
18,825,326 UART:
18,825,487 UART: [state] CFI Enabled
18,833,453 UART: [fht] FMC Alias Private Key: 7
20,589,907 UART: [art] Extend RT PCRs Done
20,591,157 UART: [art] Lock RT PCRs Done
20,592,756 UART: [art] Populate DV Done
20,598,434 UART: [fht] FMC Alias Private Key: 7
20,600,090 UART: [art] Derive CDI
20,600,913 UART: [art] Store in in slot 0x4
20,643,461 UART: [art] Derive Key Pair
20,644,460 UART: [art] Store priv key in slot 0x5
23,071,621 UART: [art] Derive Key Pair - Done
23,084,477 UART: [art] Signing Cert with AUTHO
23,085,792 UART: RITY.KEYID = 7
24,791,101 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,608 UART: [art] PUB.X = B378FA998D1A288C96877E045A8101EB6CFFB76F8639390A12B5A345601A8203EDE7121A10744A21BD53F03CDB6677D4
24,799,872 UART: [art] PUB.Y = 35BAF73517B51465893738B0C6DF656E531844375E1DC1AD5182FB0FC3C0A6745E8F59938BDD8EB774B4F03BA2CC98BF
24,807,119 UART: [art] SIG.R = C5D30C88525C93416FA1066CD1D769CA2E5521AA9E321F8CDB6F75C4164B96C399409ECCC32C2409477A70C262E7463C
24,814,536 UART: [art] SIG.S = 06B812BA1D7B3C06006CF1E56898F52E7AE24C2D693901C32EF6739F78BCC80B836AB08AE4548FE3B89F97A74FD568D8
25,793,777 UART: Caliptra RT
25,794,486 UART: [state] CFI Enabled
25,911,610 UART: [rt] RT listening for mailbox commands...
25,942,807 UART: [rt]cmd =0x4c444556, len=4
25,953,934 >>> mbox cmd response data (687 bytes)
25,995,276 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,025,093 UART: [rt]cmd =0x43455246, len=4
26,037,765 >>> mbox cmd response data (887 bytes)
26,054,338 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,084,358 UART: [rt]cmd =0x43455252, len=4
26,095,640 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
3,695,702 ready_for_fw is high
3,696,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,271,871 >>> mbox cmd response: success
14,272,641 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,521,542 UART:
18,521,928 UART: Running Caliptra FMC ...
18,523,026 UART:
18,523,185 UART: [state] CFI Enabled
18,531,092 UART: [fht] FMC Alias Private Key: 7
20,288,126 UART: [art] Extend RT PCRs Done
20,289,331 UART: [art] Lock RT PCRs Done
20,291,364 UART: [art] Populate DV Done
20,296,675 UART: [fht] FMC Alias Private Key: 7
20,298,217 UART: [art] Derive CDI
20,298,953 UART: [art] Store in in slot 0x4
20,341,549 UART: [art] Derive Key Pair
20,342,547 UART: [art] Store priv key in slot 0x5
22,769,466 UART: [art] Derive Key Pair - Done
22,782,254 UART: [art] Signing Cert with AUTHO
22,783,560 UART: RITY.KEYID = 7
24,489,099 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,584 UART: [art] PUB.X = E3D27526A0B86BDD93D01ADB6002ECB1B064A3F9212309B87C240CC00005CB54F083157642FA75FB074A1AA49CBEFB57
24,497,828 UART: [art] PUB.Y = 3A9B80EBEDD70CF550CCA9B4F5519286D30E33185A4E601DC598CC6CE69D4045D042379989545A7527432EB796E9CB70
24,505,082 UART: [art] SIG.R = D1CB97C159D9005AB3F5F134B45405FD0F0428A5B21920C46A02CE3DD3C8B71A30D477DF22B7D48DE3F100BF82EF2C88
24,512,476 UART: [art] SIG.S = BBE3DEDD47401257B568048B60B70BB0499515AF9BD70E87C193EB8E74C41E77E8FA6651D61518FA54509941AF45D140
25,491,619 UART: Caliptra RT
25,492,337 UART: [state] CFI Enabled
25,608,916 UART: [rt] RT listening for mailbox commands...
25,640,319 UART: [rt]cmd =0x4c444556, len=4
25,651,479 >>> mbox cmd response data (687 bytes)
25,692,415 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,722,424 UART: [rt]cmd =0x43455246, len=4
25,734,982 >>> mbox cmd response data (887 bytes)
25,751,618 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,781,461 UART: [rt]cmd =0x43455252, len=4
25,792,749 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,226 UART:
192,606 UART: Running Caliptra ROM ...
193,802 UART:
193,957 UART: [state] CFI Enabled
265,389 UART: [state] LifecycleState = Unprovisioned
267,814 UART: [state] DebugLocked = No
269,634 UART: [state] WD Timer not started. Device not locked for debugging
274,613 UART: [kat] SHA2-256
464,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,276 UART: [kat] ++
475,751 UART: [kat] sha1
487,112 UART: [kat] SHA2-256
490,095 UART: [kat] SHA2-384
495,391 UART: [kat] SHA2-512-ACC
497,974 UART: [kat] ECC-384
2,948,168 UART: [kat] HMAC-384Kdf
2,971,067 UART: [kat] LMS
3,502,879 UART: [kat] --
3,506,873 UART: [cold-reset] ++
3,509,367 UART: [fht] FHT @ 0x50003400
3,521,776 UART: [idev] ++
3,522,441 UART: [idev] CDI.KEYID = 6
3,523,402 UART: [idev] SUBJECT.KEYID = 7
3,524,648 UART: [idev] UDS.KEYID = 0
3,525,547 ready_for_fw is high
3,525,741 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,182 UART: [idev] Erasing UDS.KEYID = 0
6,027,764 UART: [idev] Sha1 KeyId Algorithm
6,049,583 UART: [idev] --
6,053,481 UART: [ldev] ++
6,054,167 UART: [ldev] CDI.KEYID = 6
6,055,114 UART: [ldev] SUBJECT.KEYID = 5
6,056,286 UART: [ldev] AUTHORITY.KEYID = 7
6,057,463 UART: [ldev] FE.KEYID = 1
6,101,015 UART: [ldev] Erasing FE.KEYID = 1
8,605,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,296 UART: [ldev] --
10,413,631 UART: [fwproc] Wait for Commands...
10,415,294 UART: [fwproc] Recv command 0x46574c44
10,417,547 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,012 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,599,478 >>> mbox cmd response: success
14,599,997 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,604,011 UART: [afmc] ++
14,604,714 UART: [afmc] CDI.KEYID = 6
14,605,911 UART: [afmc] SUBJECT.KEYID = 7
14,607,352 UART: [afmc] AUTHORITY.KEYID = 5
17,146,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,188 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,404 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,491 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,496 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,480 UART: [afmc] --
18,947,617 UART: [cold-reset] --
18,950,456 UART: [state] Locking Datavault
18,954,200 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,415 UART: [state] Locking ICCM
18,959,143 UART: [exit] Launching FMC @ 0x40000130
18,967,822 UART:
18,968,083 UART: Running Caliptra FMC ...
18,969,117 UART:
18,969,267 UART: [state] CFI Enabled
19,030,830 UART: [fht] FMC Alias Private Key: 7
20,795,177 UART: [art] Extend RT PCRs Done
20,796,400 UART: [art] Lock RT PCRs Done
20,798,060 UART: [art] Populate DV Done
20,803,599 UART: [fht] FMC Alias Private Key: 7
20,805,230 UART: [art] Derive CDI
20,806,055 UART: [art] Store in in slot 0x4
20,863,781 UART: [art] Derive Key Pair
20,864,785 UART: [art] Store priv key in slot 0x5
23,327,810 UART: [art] Derive Key Pair - Done
23,341,076 UART: [art] Signing Cert with AUTHO
23,342,384 UART: RITY.KEYID = 7
25,053,788 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,303 UART: [art] PUB.X = 08CB0292284BCA9E2ADF47178786E17FD1BC59DD422FC92D769CB87736B3802104B4B96E4A358767A84047380EC9B592
25,062,575 UART: [art] PUB.Y = 37B35E9C5E87218C768284F0493E69CE9F0EDB763EB997F7015E4D4A5B7800787486E5E06E3E4E86CFED0AF2C72B3F90
25,069,774 UART: [art] SIG.R = 0ABC2F736D6158CF672027D57C970B459558579FF552C0F96BC494D130B05AA4F1FBEBC68780E9E555065C6ECDA1DB0E
25,077,196 UART: [art] SIG.S = AAF6C410336AF4ECDC07695156314277832B0A39D989A0238B05357130D28DC98D70BC20624B179D495F982D5300928B
26,055,514 UART: Caliptra RT
26,056,226 UART: [state] CFI Enabled
26,219,969 UART: [rt] RT listening for mailbox commands...
26,251,320 UART: [rt]cmd =0x4c444556, len=4
26,262,437 >>> mbox cmd response data (687 bytes)
26,303,824 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,333,607 UART: [rt]cmd =0x43455246, len=4
26,346,241 >>> mbox cmd response data (887 bytes)
26,363,011 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,392,982 UART: [rt]cmd =0x43455252, len=4
26,404,324 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,438,021 ready_for_fw is high
3,438,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,723,904 >>> mbox cmd response: success
14,724,481 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,996,647 UART:
18,997,038 UART: Running Caliptra FMC ...
18,998,142 UART:
18,998,296 UART: [state] CFI Enabled
19,066,357 UART: [fht] FMC Alias Private Key: 7
20,830,095 UART: [art] Extend RT PCRs Done
20,831,322 UART: [art] Lock RT PCRs Done
20,832,818 UART: [art] Populate DV Done
20,838,292 UART: [fht] FMC Alias Private Key: 7
20,840,050 UART: [art] Derive CDI
20,840,890 UART: [art] Store in in slot 0x4
20,898,410 UART: [art] Derive Key Pair
20,899,454 UART: [art] Store priv key in slot 0x5
23,361,972 UART: [art] Derive Key Pair - Done
23,374,811 UART: [art] Signing Cert with AUTHO
23,376,116 UART: RITY.KEYID = 7
25,088,237 UART: [art] Erasing AUTHORITY.KEYID = 7
25,089,752 UART: [art] PUB.X = 605C7BE3D1DFCED838D7491D460082F1D62F79BAC66E0917544CA63ABC46C141F6A767E1183781F78FA14946BBDC4362
25,096,997 UART: [art] PUB.Y = C9867D538A56F2E959EA31D1964E57307FD0607301E7863E3731ADDEBAC35129311AC4D5CC9E33A5848B4499D86C5A67
25,104,269 UART: [art] SIG.R = 53BBB916E141C417BE42B52714E38C581059540B94047DC53C1078AF35B6D981D7649106A02873F217A6C4A581847632
25,111,618 UART: [art] SIG.S = 15ACD7505F68D6D91197B3C69CA2923234B99F3C88BE790F729AAD15B74E29E99650E3737F3B437F80AD810C428CE243
26,090,667 UART: Caliptra RT
26,091,382 UART: [state] CFI Enabled
26,255,044 UART: [rt] RT listening for mailbox commands...
26,286,567 UART: [rt]cmd =0x4c444556, len=4
26,297,816 >>> mbox cmd response data (687 bytes)
26,339,044 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,369,127 UART: [rt]cmd =0x43455246, len=4
26,381,704 >>> mbox cmd response data (887 bytes)
26,398,353 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,428,320 UART: [rt]cmd =0x43455252, len=4
26,439,662 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,718 writing to cptra_bootfsm_go
192,802 UART:
193,174 UART: Running Caliptra ROM ...
194,677 UART:
603,966 UART: [state] CFI Enabled
616,700 UART: [state] LifecycleState = Unprovisioned
618,721 UART: [state] DebugLocked = No
621,265 UART: [state] WD Timer not started. Device not locked for debugging
625,174 UART: [kat] SHA2-256
815,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,821 UART: [kat] ++
826,378 UART: [kat] sha1
838,503 UART: [kat] SHA2-256
841,483 UART: [kat] SHA2-384
848,755 UART: [kat] SHA2-512-ACC
851,337 UART: [kat] ECC-384
3,291,938 UART: [kat] HMAC-384Kdf
3,305,246 UART: [kat] LMS
3,837,022 UART: [kat] --
3,840,321 UART: [cold-reset] ++
3,842,753 UART: [fht] FHT @ 0x50003400
3,853,870 UART: [idev] ++
3,854,441 UART: [idev] CDI.KEYID = 6
3,855,416 UART: [idev] SUBJECT.KEYID = 7
3,856,591 UART: [idev] UDS.KEYID = 0
3,857,495 ready_for_fw is high
3,857,687 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,061 UART: [idev] Erasing UDS.KEYID = 0
6,336,172 UART: [idev] Sha1 KeyId Algorithm
6,358,407 UART: [idev] --
6,361,726 UART: [ldev] ++
6,362,412 UART: [ldev] CDI.KEYID = 6
6,363,330 UART: [ldev] SUBJECT.KEYID = 5
6,364,494 UART: [ldev] AUTHORITY.KEYID = 7
6,365,724 UART: [ldev] FE.KEYID = 1
6,377,881 UART: [ldev] Erasing FE.KEYID = 1
8,857,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,629 UART: [ldev] --
10,650,969 UART: [fwproc] Wait for Commands...
10,653,865 UART: [fwproc] Recv command 0x46574c44
10,656,171 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,826 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,933 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,839,563 >>> mbox cmd response: success
14,840,068 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,844,042 UART: [afmc] ++
14,844,738 UART: [afmc] CDI.KEYID = 6
14,845,899 UART: [afmc] SUBJECT.KEYID = 7
14,847,441 UART: [afmc] AUTHORITY.KEYID = 5
17,353,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,846 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,926 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,088 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,148 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,372 UART: [afmc] --
19,150,241 UART: [cold-reset] --
19,154,542 UART: [state] Locking Datavault
19,161,836 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,042 UART: [state] Locking ICCM
19,166,638 UART: [exit] Launching FMC @ 0x40000130
19,175,317 UART:
19,175,553 UART: Running Caliptra FMC ...
19,176,657 UART:
19,176,816 UART: [state] CFI Enabled
19,185,081 UART: [fht] FMC Alias Private Key: 7
20,942,338 UART: [art] Extend RT PCRs Done
20,943,562 UART: [art] Lock RT PCRs Done
20,945,345 UART: [art] Populate DV Done
20,950,812 UART: [fht] FMC Alias Private Key: 7
20,952,514 UART: [art] Derive CDI
20,953,331 UART: [art] Store in in slot 0x4
20,995,989 UART: [art] Derive Key Pair
20,997,028 UART: [art] Store priv key in slot 0x5
23,423,764 UART: [art] Derive Key Pair - Done
23,436,553 UART: [art] Signing Cert with AUTHO
23,437,855 UART: RITY.KEYID = 7
25,143,381 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,888 UART: [art] PUB.X = 092DE3A62344BF4FD65D80C854FC85380C947F05D5E5454E018FE640D500E9F8C68731944FB3172DE948E558A77742DA
25,152,084 UART: [art] PUB.Y = EA28D6FDDC5EAED244113C760D91FC99F05AF50482588295C53BD1EF46690F1424DBF87D1F51B099F667863F5CC571BC
25,159,349 UART: [art] SIG.R = EC4828F157F76BC14FFF12812709A006A2D02C9210C51CE9A2111B0E0D2D162014E381884B6FA87833938139F5431665
25,166,692 UART: [art] SIG.S = F25E0F4633545AA7ABCA5870738E6D7BC1CBD9B45188B9009593B28803E3668C253D2D373F6292CA39863C3DE6B6B526
26,145,394 UART: Caliptra RT
26,146,104 UART: [state] CFI Enabled
26,263,216 UART: [rt] RT listening for mailbox commands...
26,294,622 UART: [rt]cmd =0x4c444556, len=4
26,305,845 >>> mbox cmd response data (687 bytes)
26,347,291 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,377,331 UART: [rt]cmd =0x43455246, len=4
26,389,958 >>> mbox cmd response data (887 bytes)
26,406,828 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,436,717 UART: [rt]cmd =0x43455252, len=4
26,448,028 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,628 writing to cptra_bootfsm_go
3,754,713 ready_for_fw is high
3,755,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,544 >>> mbox cmd response: success
14,957,321 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,208,117 UART:
19,208,493 UART: Running Caliptra FMC ...
19,209,688 UART:
19,209,856 UART: [state] CFI Enabled
19,217,600 UART: [fht] FMC Alias Private Key: 7
20,974,133 UART: [art] Extend RT PCRs Done
20,975,367 UART: [art] Lock RT PCRs Done
20,976,784 UART: [art] Populate DV Done
20,982,211 UART: [fht] FMC Alias Private Key: 7
20,983,700 UART: [art] Derive CDI
20,984,463 UART: [art] Store in in slot 0x4
21,027,168 UART: [art] Derive Key Pair
21,028,164 UART: [art] Store priv key in slot 0x5
23,455,000 UART: [art] Derive Key Pair - Done
23,467,682 UART: [art] Signing Cert with AUTHO
23,468,982 UART: RITY.KEYID = 7
25,174,919 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,426 UART: [art] PUB.X = 961EEAD80886C9BA7457770E0AF18B4E816CA6060DF6A3DE6B3BC0E8E5E0C0C700C64335AE3A0A057F672D9FA4F4933E
25,183,665 UART: [art] PUB.Y = 607A640E9C5B36D8C34EFE432734184A658EFDC18B27A5512BD00AC1A976B16827466DC07A30D205B482D287CF719853
25,190,900 UART: [art] SIG.R = 74B8230CBF2A5BF0A2B96B1D31E33BAA85B2F25C1DFF803B66AAED22B19D82E51D663D17A0C54B4147E4C518BBB3E280
25,198,332 UART: [art] SIG.S = 44B66E3B175A7BE8080AA525BEB03E490BB7659A25F80849925D914464D14A84BBFC0D91E3A3A482E2183F60CF0635F3
26,176,969 UART: Caliptra RT
26,177,677 UART: [state] CFI Enabled
26,295,979 UART: [rt] RT listening for mailbox commands...
26,327,268 UART: [rt]cmd =0x4c444556, len=4
26,338,488 >>> mbox cmd response data (687 bytes)
26,379,669 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,409,476 UART: [rt]cmd =0x43455246, len=4
26,422,312 >>> mbox cmd response data (887 bytes)
26,438,921 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,468,990 UART: [rt]cmd =0x43455252, len=4
26,480,333 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,609 UART: [kat] SHA2-256
892,547 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
902,464 UART: [kat] HMAC-384Kdf
907,088 UART: [kat] LMS
1,475,284 UART: [kat] --
1,476,233 UART: [cold-reset] ++
1,476,759 UART: [fht] Storing FHT @ 0x50003400
1,479,688 UART: [idev] ++
1,479,856 UART: [idev] CDI.KEYID = 6
1,480,216 UART: [idev] SUBJECT.KEYID = 7
1,480,640 UART: [idev] UDS.KEYID = 0
1,480,985 ready_for_fw is high
1,480,985 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,688 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,692 UART: [idev] --
1,514,581 UART: [ldev] ++
1,514,749 UART: [ldev] CDI.KEYID = 6
1,515,112 UART: [ldev] SUBJECT.KEYID = 5
1,515,538 UART: [ldev] AUTHORITY.KEYID = 7
1,516,001 UART: [ldev] FE.KEYID = 1
1,520,895 UART: [ldev] Erasing FE.KEYID = 1
1,546,288 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,924 UART: [ldev] --
1,585,189 UART: [fwproc] Waiting for Commands...
1,585,890 UART: [fwproc] Received command 0x46574c44
1,586,681 UART: [fwproc] Received Image of size 114168 bytes
2,883,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,517 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,010 >>> mbox cmd response: success
3,075,010 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,076,256 UART: [afmc] ++
3,076,424 UART: [afmc] CDI.KEYID = 6
3,076,786 UART: [afmc] SUBJECT.KEYID = 7
3,077,211 UART: [afmc] AUTHORITY.KEYID = 5
3,112,482 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,802 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,582 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,310 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,195 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,885 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,924 UART: [afmc] --
3,155,926 UART: [cold-reset] --
3,156,636 UART: [state] Locking Datavault
3,157,711 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,315 UART: [state] Locking ICCM
3,158,927 UART: [exit] Launching FMC @ 0x40000130
3,164,256 UART:
3,164,272 UART: Running Caliptra FMC ...
3,164,680 UART:
3,164,734 UART: [state] CFI Enabled
3,175,187 UART: [fht] FMC Alias Private Key: 7
3,283,480 UART: [art] Extend RT PCRs Done
3,283,908 UART: [art] Lock RT PCRs Done
3,285,694 UART: [art] Populate DV Done
3,293,745 UART: [fht] FMC Alias Private Key: 7
3,294,921 UART: [art] Derive CDI
3,295,201 UART: [art] Store in in slot 0x4
3,380,340 UART: [art] Derive Key Pair
3,380,700 UART: [art] Store priv key in slot 0x5
3,394,190 UART: [art] Derive Key Pair - Done
3,409,035 UART: [art] Signing Cert with AUTHO
3,409,515 UART: RITY.KEYID = 7
3,424,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,410 UART: [art] PUB.X = 974E7D9B9D15C99D24FD8ACFBBBB7F9DEB10DAF34F07F9F985754C3296BDD4DA92B70B218ED70A28922FBB3766035B37
3,432,186 UART: [art] PUB.Y = 2E59780CF138302772A9C12C5121AC0B0D864EE47D4AE7296A66F3E2E45A842CD85F47C0BA9473B513A30D016E2ADDB2
3,439,127 UART: [art] SIG.R = 71BBCBE5CACF1CB285290331C1EB52DD17F56C3EA35E795D646981C38D70EB44F3C4266083F24426EB18F5EDCD3E87E2
3,445,908 UART: [art] SIG.S = 9B2380BCA6659593ABA1F348CDBB6F863968B31C565F0BF4C55968793733C8F9815A8C50094EE7656EE38CD9480C4099
3,469,570 UART: Caliptra RT
3,469,823 UART: [state] CFI Enabled
3,579,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,926 UART: [rt]cmd =0x4c444556, len=4
3,620,249 >>> mbox cmd response data (687 bytes)
3,620,250 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,649,639 UART: [rt]cmd =0x43455246, len=4
3,661,898 >>> mbox cmd response data (920 bytes)
3,661,899 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,120 UART: [rt]cmd =0x43455252, len=4
3,702,168 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,991 ready_for_fw is high
1,361,991 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,548 >>> mbox cmd response: success
2,926,548 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,094 UART:
2,988,110 UART: Running Caliptra FMC ...
2,988,518 UART:
2,988,572 UART: [state] CFI Enabled
2,999,173 UART: [fht] FMC Alias Private Key: 7
3,106,256 UART: [art] Extend RT PCRs Done
3,106,684 UART: [art] Lock RT PCRs Done
3,108,476 UART: [art] Populate DV Done
3,116,581 UART: [fht] FMC Alias Private Key: 7
3,117,533 UART: [art] Derive CDI
3,117,813 UART: [art] Store in in slot 0x4
3,203,564 UART: [art] Derive Key Pair
3,203,924 UART: [art] Store priv key in slot 0x5
3,217,294 UART: [art] Derive Key Pair - Done
3,231,789 UART: [art] Signing Cert with AUTHO
3,232,269 UART: RITY.KEYID = 7
3,247,575 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,340 UART: [art] PUB.X = FACB1521BD60EE3CC5D2FEA51E45932883FBC6AE3545945D38FDC8598E6E5B407C1CF162881A5ACAE454B941DE409E39
3,255,126 UART: [art] PUB.Y = 09A23F72AACBCD9421AEBA24931C1E213A5104953802B6D02B54FF096E2F33CB05800F81A6A471FC9CFE3D7CC514A408
3,262,065 UART: [art] SIG.R = 6703458795A6AF276254A9B607CECACA3D6000E75508043F5A035DF6F50B7D861440CED02062D1CF183ED348A5BD35C6
3,268,797 UART: [art] SIG.S = 0C6520C0B66E8E09723D72B5FA4342F0DD32C59226790C8D87B4C2FDB289BBD802C8E8E9BEF89E7193A542EF31943E8B
3,292,352 UART: Caliptra RT
3,292,605 UART: [state] CFI Enabled
3,401,355 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,851 UART: [rt]cmd =0x4c444556, len=4
3,442,194 >>> mbox cmd response data (687 bytes)
3,442,195 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,471,328 UART: [rt]cmd =0x43455246, len=4
3,483,743 >>> mbox cmd response data (920 bytes)
3,483,744 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,225 UART: [rt]cmd =0x43455252, len=4
3,524,127 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,772 UART: [kat] SHA2-256
892,710 UART: [kat] SHA2-384
895,667 UART: [kat] SHA2-512-ACC
897,568 UART: [kat] ECC-384
903,501 UART: [kat] HMAC-384Kdf
907,913 UART: [kat] LMS
1,476,109 UART: [kat] --
1,477,018 UART: [cold-reset] ++
1,477,516 UART: [fht] Storing FHT @ 0x50003400
1,480,409 UART: [idev] ++
1,480,577 UART: [idev] CDI.KEYID = 6
1,480,937 UART: [idev] SUBJECT.KEYID = 7
1,481,361 UART: [idev] UDS.KEYID = 0
1,481,706 ready_for_fw is high
1,481,706 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,343 UART: [idev] Erasing UDS.KEYID = 0
1,506,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,517 UART: [idev] --
1,515,514 UART: [ldev] ++
1,515,682 UART: [ldev] CDI.KEYID = 6
1,516,045 UART: [ldev] SUBJECT.KEYID = 5
1,516,471 UART: [ldev] AUTHORITY.KEYID = 7
1,516,934 UART: [ldev] FE.KEYID = 1
1,522,336 UART: [ldev] Erasing FE.KEYID = 1
1,547,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,651 UART: [ldev] --
1,586,916 UART: [fwproc] Waiting for Commands...
1,587,557 UART: [fwproc] Received command 0x46574c44
1,588,348 UART: [fwproc] Received Image of size 114168 bytes
2,884,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,952 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,304 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,907 >>> mbox cmd response: success
3,076,907 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,078,089 UART: [afmc] ++
3,078,257 UART: [afmc] CDI.KEYID = 6
3,078,619 UART: [afmc] SUBJECT.KEYID = 7
3,079,044 UART: [afmc] AUTHORITY.KEYID = 5
3,114,027 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,891 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,776 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,466 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,399 UART: [afmc] --
3,157,509 UART: [cold-reset] --
3,158,357 UART: [state] Locking Datavault
3,159,664 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,268 UART: [state] Locking ICCM
3,160,850 UART: [exit] Launching FMC @ 0x40000130
3,166,179 UART:
3,166,195 UART: Running Caliptra FMC ...
3,166,603 UART:
3,166,746 UART: [state] CFI Enabled
3,177,805 UART: [fht] FMC Alias Private Key: 7
3,286,046 UART: [art] Extend RT PCRs Done
3,286,474 UART: [art] Lock RT PCRs Done
3,287,888 UART: [art] Populate DV Done
3,296,011 UART: [fht] FMC Alias Private Key: 7
3,297,073 UART: [art] Derive CDI
3,297,353 UART: [art] Store in in slot 0x4
3,383,394 UART: [art] Derive Key Pair
3,383,754 UART: [art] Store priv key in slot 0x5
3,397,246 UART: [art] Derive Key Pair - Done
3,412,025 UART: [art] Signing Cert with AUTHO
3,412,505 UART: RITY.KEYID = 7
3,427,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,394 UART: [art] PUB.X = 8F1A82E48E25DF6FA5A8248BF66C3A30DAE245631033CF1C7AB8FE2888D3882BB5CFBE3C18EAC65E0B52ACA198622EB0
3,435,181 UART: [art] PUB.Y = 09A3DFC2C5BECAC9977A2A0F5070823E5BA68CBB333B5713BDD43CEFBC5B2CB9AB5FA6C9D59149D23DB8CA83E4FB4656
3,442,153 UART: [art] SIG.R = 3FD1A8F8813BBE764216B7363FAF66483DD65A5107A655F1513930D1F9C899F2805E8A89BB81A867F9652DD862FD5E5B
3,448,922 UART: [art] SIG.S = 1BA6B75BD86A9531095AEB870BD4BCD7486D4693FB960C5A3270719AEF06D9889FE6B91D8D358A465EE908A2F04FB0BA
3,472,796 UART: Caliptra RT
3,473,141 UART: [state] CFI Enabled
3,580,913 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,525 UART: [rt]cmd =0x4c444556, len=4
3,621,902 >>> mbox cmd response data (687 bytes)
3,621,903 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,651,312 UART: [rt]cmd =0x43455246, len=4
3,663,579 >>> mbox cmd response data (920 bytes)
3,663,580 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,811 UART: [rt]cmd =0x43455252, len=4
3,703,777 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,188 ready_for_fw is high
1,363,188 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,307 >>> mbox cmd response: success
2,927,307 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,657 UART:
2,988,673 UART: Running Caliptra FMC ...
2,989,081 UART:
2,989,224 UART: [state] CFI Enabled
2,999,909 UART: [fht] FMC Alias Private Key: 7
3,108,316 UART: [art] Extend RT PCRs Done
3,108,744 UART: [art] Lock RT PCRs Done
3,110,042 UART: [art] Populate DV Done
3,118,015 UART: [fht] FMC Alias Private Key: 7
3,118,995 UART: [art] Derive CDI
3,119,275 UART: [art] Store in in slot 0x4
3,204,954 UART: [art] Derive Key Pair
3,205,314 UART: [art] Store priv key in slot 0x5
3,218,892 UART: [art] Derive Key Pair - Done
3,233,908 UART: [art] Signing Cert with AUTHO
3,234,388 UART: RITY.KEYID = 7
3,249,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,665 UART: [art] PUB.X = 236CFA1FACA431145D4D78CD935F7E4C1EB6CA294F9965FF3599892BC1D199BE662822DAF6BEAB3F17419AB1D7D25FD6
3,257,453 UART: [art] PUB.Y = 7CC386D92F4FCD52A17AD3AE877F3F300E5DF824BBC40094E2B1746956BE61D8FA6620F57C8AE406FB8F2799B78E6D0D
3,264,386 UART: [art] SIG.R = 9571AFAF571C853561D2645814CCC7978C0FF42B70548812747D06F95E356AFA20F98FEFEAD7EEF724B21836443B0F56
3,271,149 UART: [art] SIG.S = 4656D53EEF7780FD7B5572D05D941CC589D0B44BDA0C04AA62729338A11C14B171F756668B8D94C541C6E518BF818048
3,295,150 UART: Caliptra RT
3,295,495 UART: [state] CFI Enabled
3,403,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,196 UART: [rt]cmd =0x4c444556, len=4
3,444,727 >>> mbox cmd response data (687 bytes)
3,444,728 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,259 UART: [rt]cmd =0x43455246, len=4
3,486,506 >>> mbox cmd response data (920 bytes)
3,486,507 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,740 UART: [rt]cmd =0x43455252, len=4
3,526,462 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,578 UART: [state] LifecycleState = Unprovisioned
86,233 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
893,688 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,813 UART: [kat] ++
897,965 UART: [kat] sha1
902,175 UART: [kat] SHA2-256
904,115 UART: [kat] SHA2-384
906,954 UART: [kat] SHA2-512-ACC
908,855 UART: [kat] ECC-384
918,784 UART: [kat] HMAC-384Kdf
923,402 UART: [kat] LMS
1,171,730 UART: [kat] --
1,172,591 UART: [cold-reset] ++
1,173,015 UART: [fht] FHT @ 0x50003400
1,175,662 UART: [idev] ++
1,175,830 UART: [idev] CDI.KEYID = 6
1,176,190 UART: [idev] SUBJECT.KEYID = 7
1,176,614 UART: [idev] UDS.KEYID = 0
1,176,959 ready_for_fw is high
1,176,959 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,794 UART: [idev] Erasing UDS.KEYID = 0
1,201,991 UART: [idev] Sha1 KeyId Algorithm
1,210,473 UART: [idev] --
1,211,655 UART: [ldev] ++
1,211,823 UART: [ldev] CDI.KEYID = 6
1,212,186 UART: [ldev] SUBJECT.KEYID = 5
1,212,612 UART: [ldev] AUTHORITY.KEYID = 7
1,213,075 UART: [ldev] FE.KEYID = 1
1,218,483 UART: [ldev] Erasing FE.KEYID = 1
1,244,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,797 UART: [ldev] --
1,283,160 UART: [fwproc] Wait for Commands...
1,283,748 UART: [fwproc] Recv command 0x46574c44
1,284,476 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,449 >>> mbox cmd response: success
2,771,449 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,621 UART: [afmc] ++
2,772,789 UART: [afmc] CDI.KEYID = 6
2,773,151 UART: [afmc] SUBJECT.KEYID = 7
2,773,576 UART: [afmc] AUTHORITY.KEYID = 5
2,808,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,136 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,497 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,216 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,914 UART: [afmc] --
2,851,810 UART: [cold-reset] --
2,852,724 UART: [state] Locking Datavault
2,854,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,759 UART: [state] Locking ICCM
2,855,189 UART: [exit] Launching FMC @ 0x40000130
2,860,518 UART:
2,860,534 UART: Running Caliptra FMC ...
2,860,942 UART:
2,860,996 UART: [state] CFI Enabled
2,871,337 UART: [fht] FMC Alias Private Key: 7
2,979,176 UART: [art] Extend RT PCRs Done
2,979,604 UART: [art] Lock RT PCRs Done
2,981,148 UART: [art] Populate DV Done
2,989,395 UART: [fht] FMC Alias Private Key: 7
2,990,523 UART: [art] Derive CDI
2,990,803 UART: [art] Store in in slot 0x4
3,076,624 UART: [art] Derive Key Pair
3,076,984 UART: [art] Store priv key in slot 0x5
3,089,898 UART: [art] Derive Key Pair - Done
3,104,519 UART: [art] Signing Cert with AUTHO
3,104,999 UART: RITY.KEYID = 7
3,119,507 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,272 UART: [art] PUB.X = ED612B0B90E0B0C201F2BFE10ED132F8A16AC9044B3E665710BF91C610196692BAEB1FE0551B1CF26FE36626224A9BE2
3,127,040 UART: [art] PUB.Y = 3CC7FEF5B10570A838C862C1BA2153C619CE41BEF51ACA81293B9261FA19A215A6591469DCB89FD4EEBB1FB4774B96AE
3,134,003 UART: [art] SIG.R = 1F04DA8C2F131FC6319067BFF255863F0D7AAF4A0F065AA66A82A8CA5FEB5BD14E9561697624513DF4F5D2E66A49F5E5
3,140,773 UART: [art] SIG.S = 9F7A1F1808BD72A3329C283659886F6B9F6890B7CF8E3C331E46BDB733A43D9DF178D1D227001B17690D3C7EB2EF958C
3,164,550 UART: Caliptra RT
3,164,803 UART: [state] CFI Enabled
3,272,292 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,746 UART: [rt]cmd =0x4c444556, len=4
3,313,247 >>> mbox cmd response data (687 bytes)
3,313,248 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,707 UART: [rt]cmd =0x43455246, len=4
3,354,954 >>> mbox cmd response data (887 bytes)
3,354,955 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,268 UART: [rt]cmd =0x43455252, len=4
3,394,950 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,009 ready_for_fw is high
1,060,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,240 >>> mbox cmd response: success
2,623,240 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,684,700 UART:
2,684,716 UART: Running Caliptra FMC ...
2,685,124 UART:
2,685,178 UART: [state] CFI Enabled
2,695,491 UART: [fht] FMC Alias Private Key: 7
2,803,914 UART: [art] Extend RT PCRs Done
2,804,342 UART: [art] Lock RT PCRs Done
2,805,776 UART: [art] Populate DV Done
2,814,005 UART: [fht] FMC Alias Private Key: 7
2,814,981 UART: [art] Derive CDI
2,815,261 UART: [art] Store in in slot 0x4
2,900,750 UART: [art] Derive Key Pair
2,901,110 UART: [art] Store priv key in slot 0x5
2,914,404 UART: [art] Derive Key Pair - Done
2,928,960 UART: [art] Signing Cert with AUTHO
2,929,440 UART: RITY.KEYID = 7
2,944,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,393 UART: [art] PUB.X = 9969D2DCF8B661B8EDF577423CC492E2AC3D6EDB8DD56499710F25ED23E71CEDD4D8C6B4006F007B72482A05A8BCDB57
2,952,129 UART: [art] PUB.Y = F6A185DE6E85EDAFB9E6AE9570F9BF8AD4A5935BC96D404C6948DCE48D705690E571C8CD53F535A2BFD968F1CC473DC1
2,959,099 UART: [art] SIG.R = 123C8AEB14E118D83800F6B3A25DB09648767439D8232F7AE12ED907378C77854D0BE7101F0BA0741C45C601860F7F88
2,965,826 UART: [art] SIG.S = 6EB0022B3021223EEE2944392B9037DDA593E6DB6EA935FC6362737F0EFF985B7483D1E02BC86B1B13EBCEDEE5A6E700
2,988,789 UART: Caliptra RT
2,989,042 UART: [state] CFI Enabled
3,097,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,803 UART: [rt]cmd =0x4c444556, len=4
3,138,284 >>> mbox cmd response data (687 bytes)
3,138,285 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,656 UART: [rt]cmd =0x43455246, len=4
3,179,665 >>> mbox cmd response data (887 bytes)
3,179,666 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,209,151 UART: [rt]cmd =0x43455252, len=4
3,219,965 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
907,045 UART: [kat] SHA2-512-ACC
908,946 UART: [kat] ECC-384
918,539 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,154 UART: [cold-reset] ++
1,172,686 UART: [fht] FHT @ 0x50003400
1,175,251 UART: [idev] ++
1,175,419 UART: [idev] CDI.KEYID = 6
1,175,779 UART: [idev] SUBJECT.KEYID = 7
1,176,203 UART: [idev] UDS.KEYID = 0
1,176,548 ready_for_fw is high
1,176,548 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,281 UART: [idev] Erasing UDS.KEYID = 0
1,201,450 UART: [idev] Sha1 KeyId Algorithm
1,209,846 UART: [idev] --
1,210,862 UART: [ldev] ++
1,211,030 UART: [ldev] CDI.KEYID = 6
1,211,393 UART: [ldev] SUBJECT.KEYID = 5
1,211,819 UART: [ldev] AUTHORITY.KEYID = 7
1,212,282 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,243,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,378 UART: [ldev] --
1,282,649 UART: [fwproc] Wait for Commands...
1,283,343 UART: [fwproc] Recv command 0x46574c44
1,284,071 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,294 >>> mbox cmd response: success
2,773,294 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,338 UART: [afmc] ++
2,774,506 UART: [afmc] CDI.KEYID = 6
2,774,868 UART: [afmc] SUBJECT.KEYID = 7
2,775,293 UART: [afmc] AUTHORITY.KEYID = 5
2,810,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,083 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,811 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,696 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,415 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,401 UART: [afmc] --
2,854,291 UART: [cold-reset] --
2,855,123 UART: [state] Locking Datavault
2,856,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,842 UART: [state] Locking ICCM
2,857,476 UART: [exit] Launching FMC @ 0x40000130
2,862,805 UART:
2,862,821 UART: Running Caliptra FMC ...
2,863,229 UART:
2,863,372 UART: [state] CFI Enabled
2,874,381 UART: [fht] FMC Alias Private Key: 7
2,982,836 UART: [art] Extend RT PCRs Done
2,983,264 UART: [art] Lock RT PCRs Done
2,984,796 UART: [art] Populate DV Done
2,993,027 UART: [fht] FMC Alias Private Key: 7
2,994,093 UART: [art] Derive CDI
2,994,373 UART: [art] Store in in slot 0x4
3,080,130 UART: [art] Derive Key Pair
3,080,490 UART: [art] Store priv key in slot 0x5
3,093,758 UART: [art] Derive Key Pair - Done
3,108,551 UART: [art] Signing Cert with AUTHO
3,109,031 UART: RITY.KEYID = 7
3,124,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,862 UART: [art] PUB.X = 40F9CDF11E46975E5B351357C1C3820F11ADC31B98BBE76878B76263C555093772CFE7468A72119338CF6E0E5F7514B2
3,131,619 UART: [art] PUB.Y = 364A57A3D57B27EDD1534945746F21BE90A1D5DC44516CF00AD975E379E416E4D47209C917C48D03C26C38D40C7869A0
3,138,555 UART: [art] SIG.R = E63143F079D8D7C367FBAEBC8C2E20384B438C30C0586F1B823AC1D61B1435C7414CF4F034512589CC04184AE3605816
3,145,320 UART: [art] SIG.S = 557C14A7B77CBF62AD1172F5FE738599F313E78774A99D5A2BDB75FF36DECB7F71870FC8666934E0076D826C2A362257
3,169,405 UART: Caliptra RT
3,169,750 UART: [state] CFI Enabled
3,278,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,769 UART: [rt]cmd =0x4c444556, len=4
3,319,274 >>> mbox cmd response data (687 bytes)
3,319,275 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,450 UART: [rt]cmd =0x43455246, len=4
3,360,295 >>> mbox cmd response data (887 bytes)
3,360,296 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,635 UART: [rt]cmd =0x43455252, len=4
3,400,375 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,268 ready_for_fw is high
1,060,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,197 >>> mbox cmd response: success
2,625,197 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,055 UART:
2,687,071 UART: Running Caliptra FMC ...
2,687,479 UART:
2,687,622 UART: [state] CFI Enabled
2,698,185 UART: [fht] FMC Alias Private Key: 7
2,806,304 UART: [art] Extend RT PCRs Done
2,806,732 UART: [art] Lock RT PCRs Done
2,808,244 UART: [art] Populate DV Done
2,816,329 UART: [fht] FMC Alias Private Key: 7
2,817,487 UART: [art] Derive CDI
2,817,767 UART: [art] Store in in slot 0x4
2,903,550 UART: [art] Derive Key Pair
2,903,910 UART: [art] Store priv key in slot 0x5
2,917,712 UART: [art] Derive Key Pair - Done
2,932,592 UART: [art] Signing Cert with AUTHO
2,933,072 UART: RITY.KEYID = 7
2,947,866 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,631 UART: [art] PUB.X = B3A202BD87B3486130AD4F3D757B318581FE5FB0A5339B2D11FFCC639A37304970F6F646BFC99D744A459485CCDE2907
2,955,399 UART: [art] PUB.Y = 3F7305A5C0984879ABF45AEB0D928EE3C4D80FA966307398D3DBF3278907F08A3109FBE3E4CAC3C56D3AD982A9B69D8D
2,962,346 UART: [art] SIG.R = 8835665FEE610B8CAA281B8D3139C6D7F0DCD93C9DCA83A5F44D45C2FEAD9AE948B6A557AE390901806F8ED9F2F836B3
2,969,123 UART: [art] SIG.S = 3BC68AE91ADD5C9BAD824C2171AD409202E4B1FD20F33FDD8F45DA921849F1A663429EE7C30B11A98DD88F6B7388F08D
2,992,800 UART: Caliptra RT
2,993,145 UART: [state] CFI Enabled
3,100,462 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,734 UART: [rt]cmd =0x4c444556, len=4
3,141,341 >>> mbox cmd response data (687 bytes)
3,141,342 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,571 UART: [rt]cmd =0x43455246, len=4
3,182,594 >>> mbox cmd response data (887 bytes)
3,182,595 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,211,746 UART: [rt]cmd =0x43455252, len=4
3,222,542 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,074 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,223 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,174,283 ready_for_fw is high
1,174,283 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,911 UART: [idev] Erasing UDS.KEYID = 0
1,198,305 UART: [idev] Sha1 KeyId Algorithm
1,207,189 UART: [idev] --
1,208,156 UART: [ldev] ++
1,208,324 UART: [ldev] CDI.KEYID = 6
1,208,688 UART: [ldev] SUBJECT.KEYID = 5
1,209,115 UART: [ldev] AUTHORITY.KEYID = 7
1,209,578 UART: [ldev] FE.KEYID = 1
1,215,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,740 UART: [ldev] --
1,280,088 UART: [fwproc] Wait for Commands...
1,280,883 UART: [fwproc] Recv command 0x46574c44
1,281,616 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,096 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,009 >>> mbox cmd response: success
2,771,009 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,170 UART: [afmc] ++
2,772,338 UART: [afmc] CDI.KEYID = 6
2,772,701 UART: [afmc] SUBJECT.KEYID = 7
2,773,127 UART: [afmc] AUTHORITY.KEYID = 5
2,808,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,163 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,882 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,621 UART: [afmc] --
2,851,609 UART: [cold-reset] --
2,852,375 UART: [state] Locking Datavault
2,853,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,464 UART: [state] Locking ICCM
2,854,910 UART: [exit] Launching FMC @ 0x40000130
2,860,239 UART:
2,860,255 UART: Running Caliptra FMC ...
2,860,663 UART:
2,860,717 UART: [state] CFI Enabled
2,871,576 UART: [fht] FMC Alias Private Key: 7
2,979,337 UART: [art] Extend RT PCRs Done
2,979,765 UART: [art] Lock RT PCRs Done
2,981,487 UART: [art] Populate DV Done
2,989,798 UART: [fht] FMC Alias Private Key: 7
2,990,902 UART: [art] Derive CDI
2,991,182 UART: [art] Store in in slot 0x4
3,077,175 UART: [art] Derive Key Pair
3,077,535 UART: [art] Store priv key in slot 0x5
3,091,461 UART: [art] Derive Key Pair - Done
3,105,868 UART: [art] Signing Cert with AUTHO
3,106,348 UART: RITY.KEYID = 7
3,121,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,199 UART: [art] PUB.X = AC7CE48FAEFB976760929BF9FEA94CD6D5AEBF083CD23BB0192961E0A7C01FF8AAE429401E7A282B85AEAD08AA4C376F
3,128,989 UART: [art] PUB.Y = DE6C76EED076FD76B9DC211EAE92DAE8EB59D572C52FB9010487211ED02B4AC91EDD1420E79091EF252F64A7C529E05A
3,135,949 UART: [art] SIG.R = 4D0D57E028BE1B5255E25295ED9C512036D2B7787C63BB06F7F77F2EF4A18FA5EA8FB03B1E1F412792FD38CD54BE71E3
3,142,725 UART: [art] SIG.S = 65F1758ABE36BCF0C6475A5804F4472B76F816D2E1FA30E49685207CA57816DE8DA1F69AD166F9DC9B79119D640ACC69
3,166,736 UART: Caliptra RT
3,166,989 UART: [state] CFI Enabled
3,275,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,622 UART: [rt]cmd =0x4c444556, len=4
3,316,225 >>> mbox cmd response data (687 bytes)
3,316,226 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,667 UART: [rt]cmd =0x43455246, len=4
3,357,684 >>> mbox cmd response data (887 bytes)
3,357,685 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,086 UART: [rt]cmd =0x43455252, len=4
3,398,014 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,456 ready_for_fw is high
1,055,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,033 >>> mbox cmd response: success
2,621,033 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,113 UART:
2,683,129 UART: Running Caliptra FMC ...
2,683,537 UART:
2,683,591 UART: [state] CFI Enabled
2,694,300 UART: [fht] FMC Alias Private Key: 7
2,802,785 UART: [art] Extend RT PCRs Done
2,803,213 UART: [art] Lock RT PCRs Done
2,804,615 UART: [art] Populate DV Done
2,813,078 UART: [fht] FMC Alias Private Key: 7
2,814,132 UART: [art] Derive CDI
2,814,412 UART: [art] Store in in slot 0x4
2,899,751 UART: [art] Derive Key Pair
2,900,111 UART: [art] Store priv key in slot 0x5
2,913,495 UART: [art] Derive Key Pair - Done
2,928,240 UART: [art] Signing Cert with AUTHO
2,928,720 UART: RITY.KEYID = 7
2,944,134 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,899 UART: [art] PUB.X = 02920217F04E661C1CF44C9CB61054C3AE1DF10C07647E07E5171BEFD9E860E470A9F16262F1BE57510A33D1D8277330
2,951,649 UART: [art] PUB.Y = BCF4237CA365848F630861ED57849F5EB6D422B6180074DBFC375ACFB29CEA89D332B2FBDB5E218F52E717BC190FABD0
2,958,587 UART: [art] SIG.R = 61E0F7F7E12D4E973659FD7A68996CE28F448DBFDBA63BE9D89D94F671EAFAD6C6BF3DDB65003A19D64F0FBEC6C6B332
2,965,356 UART: [art] SIG.S = BF2957D680EA1802755C35A5C086146D384873DEB406D87A94F72EA23364046A45CD0FCF62A0666632C82FF7945DCCDB
2,989,311 UART: Caliptra RT
2,989,564 UART: [state] CFI Enabled
3,096,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,221 UART: [rt]cmd =0x4c444556, len=4
3,137,830 >>> mbox cmd response data (687 bytes)
3,137,831 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,242 UART: [rt]cmd =0x43455246, len=4
3,179,269 >>> mbox cmd response data (887 bytes)
3,179,270 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,208,605 UART: [rt]cmd =0x43455252, len=4
3,219,531 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,155 UART: [kat] LMS
1,168,467 UART: [kat] --
1,169,596 UART: [cold-reset] ++
1,170,140 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,174,134 ready_for_fw is high
1,174,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,060 UART: [idev] Sha1 KeyId Algorithm
1,207,938 UART: [idev] --
1,208,905 UART: [ldev] ++
1,209,073 UART: [ldev] CDI.KEYID = 6
1,209,437 UART: [ldev] SUBJECT.KEYID = 5
1,209,864 UART: [ldev] AUTHORITY.KEYID = 7
1,210,327 UART: [ldev] FE.KEYID = 1
1,215,273 UART: [ldev] Erasing FE.KEYID = 1
1,241,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,159 UART: [ldev] --
1,280,641 UART: [fwproc] Wait for Commands...
1,281,234 UART: [fwproc] Recv command 0x46574c44
1,281,967 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,252 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,740 >>> mbox cmd response: success
2,771,740 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,901 UART: [afmc] ++
2,773,069 UART: [afmc] CDI.KEYID = 6
2,773,432 UART: [afmc] SUBJECT.KEYID = 7
2,773,858 UART: [afmc] AUTHORITY.KEYID = 5
2,809,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,494 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,223 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,106 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,825 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,622 UART: [afmc] --
2,852,652 UART: [cold-reset] --
2,853,400 UART: [state] Locking Datavault
2,854,331 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,935 UART: [state] Locking ICCM
2,855,393 UART: [exit] Launching FMC @ 0x40000130
2,860,722 UART:
2,860,738 UART: Running Caliptra FMC ...
2,861,146 UART:
2,861,289 UART: [state] CFI Enabled
2,872,348 UART: [fht] FMC Alias Private Key: 7
2,979,943 UART: [art] Extend RT PCRs Done
2,980,371 UART: [art] Lock RT PCRs Done
2,981,839 UART: [art] Populate DV Done
2,990,184 UART: [fht] FMC Alias Private Key: 7
2,991,360 UART: [art] Derive CDI
2,991,640 UART: [art] Store in in slot 0x4
3,077,283 UART: [art] Derive Key Pair
3,077,643 UART: [art] Store priv key in slot 0x5
3,091,151 UART: [art] Derive Key Pair - Done
3,105,807 UART: [art] Signing Cert with AUTHO
3,106,287 UART: RITY.KEYID = 7
3,121,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,114 UART: [art] PUB.X = 02513562B18405914395C6BB04DC2917C7DCE6BABDC4F70C9BBABB2B4E1849E7D4E199F7ED9DC1710A02404C3C0AFD9D
3,128,879 UART: [art] PUB.Y = C9C78AB8C874AEB02466B859DCECBA75660B5AEB3C1520A9313DF9181B852166FCC57FB753E6432EFE5B9D463A76D969
3,135,838 UART: [art] SIG.R = 7291BE014B83EB78D8C1DCDE941F21BFEFC1AC9EC551095B0D380E14F924BE6AC076B692CA84480E91EC27ABF2FD19D8
3,142,613 UART: [art] SIG.S = FCCE68A582763FF53D1F4597B5F0F24A38D6D0CC06385093110E6DAE05C1217887AC6B7B6C54500406A87FE1985884DE
3,166,495 UART: Caliptra RT
3,166,840 UART: [state] CFI Enabled
3,274,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,863 UART: [rt]cmd =0x4c444556, len=4
3,315,282 >>> mbox cmd response data (687 bytes)
3,315,283 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,616 UART: [rt]cmd =0x43455246, len=4
3,356,671 >>> mbox cmd response data (887 bytes)
3,356,672 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,386,101 UART: [rt]cmd =0x43455252, len=4
3,397,075 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,619 ready_for_fw is high
1,056,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,248 >>> mbox cmd response: success
2,620,248 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,682,880 UART:
2,682,896 UART: Running Caliptra FMC ...
2,683,304 UART:
2,683,447 UART: [state] CFI Enabled
2,694,354 UART: [fht] FMC Alias Private Key: 7
2,802,661 UART: [art] Extend RT PCRs Done
2,803,089 UART: [art] Lock RT PCRs Done
2,804,635 UART: [art] Populate DV Done
2,812,968 UART: [fht] FMC Alias Private Key: 7
2,814,076 UART: [art] Derive CDI
2,814,356 UART: [art] Store in in slot 0x4
2,900,435 UART: [art] Derive Key Pair
2,900,795 UART: [art] Store priv key in slot 0x5
2,914,481 UART: [art] Derive Key Pair - Done
2,928,957 UART: [art] Signing Cert with AUTHO
2,929,437 UART: RITY.KEYID = 7
2,944,397 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,162 UART: [art] PUB.X = F1976CF19FF7D33822194CB353FA5F15A08154D05F295A4E6E9BAA33043DA799FA56137D77611A9DB693951E1C718384
2,951,927 UART: [art] PUB.Y = 12E3E2A079F982EAE571E56671205394B210F159B1D663166E947C9C8B36496CFD52D37B77FFD65CC224F679711A6B71
2,958,873 UART: [art] SIG.R = 257EF3C374BA847F0A9DA5C64CFDE31B2A3F2A2915D4A8CE107B3D5328FCA008E66C29213690A33AC264ECF7A1C5F1EB
2,965,655 UART: [art] SIG.S = 8519EAC2806E27EEC8C715B9D6DA9637BD91F58E673CAEC7E8B1A1DFF83682B58A68461D2DEC2EACDAC0A18AA32F02E8
2,989,003 UART: Caliptra RT
2,989,348 UART: [state] CFI Enabled
3,097,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,213 UART: [rt]cmd =0x4c444556, len=4
3,138,506 >>> mbox cmd response data (687 bytes)
3,138,507 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,167,982 UART: [rt]cmd =0x43455246, len=4
3,180,143 >>> mbox cmd response data (887 bytes)
3,180,144 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,209,619 UART: [rt]cmd =0x43455252, len=4
3,220,329 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
191,982 UART:
192,348 UART: Running Caliptra ROM ...
193,441 UART:
193,578 UART: [state] CFI Enabled
262,931 UART: [state] LifecycleState = Unprovisioned
264,919 UART: [state] DebugLocked = No
267,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,787 UART: [kat] SHA2-256
441,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,974 UART: [kat] ++
452,416 UART: [kat] sha1
463,356 UART: [kat] SHA2-256
466,067 UART: [kat] SHA2-384
472,696 UART: [kat] SHA2-512-ACC
475,082 UART: [kat] ECC-384
2,768,121 UART: [kat] HMAC-384Kdf
2,798,684 UART: [kat] LMS
3,989,048 UART: [kat] --
3,993,325 UART: [cold-reset] ++
3,995,174 UART: [fht] Storing FHT @ 0x50003400
4,007,285 UART: [idev] ++
4,007,915 UART: [idev] CDI.KEYID = 6
4,008,821 UART: [idev] SUBJECT.KEYID = 7
4,010,064 UART: [idev] UDS.KEYID = 0
4,011,060 ready_for_fw is high
4,011,247 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,429 UART: [idev] Erasing UDS.KEYID = 0
7,346,209 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,542 UART: [idev] --
7,373,069 UART: [ldev] ++
7,373,662 UART: [ldev] CDI.KEYID = 6
7,374,569 UART: [ldev] SUBJECT.KEYID = 5
7,375,817 UART: [ldev] AUTHORITY.KEYID = 7
7,376,991 UART: [ldev] FE.KEYID = 1
7,422,510 UART: [ldev] Erasing FE.KEYID = 1
10,757,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,939 UART: [ldev] --
13,135,928 UART: [fwproc] Waiting for Commands...
13,139,300 UART: [fwproc] Received command 0x46574c44
13,141,480 UART: [fwproc] Received Image of size 113844 bytes
17,192,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,722 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,648,795 >>> mbox cmd response: success
18,114,043 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,115,099 UART: [afmc] ++
18,115,635 UART: [afmc] CDI.KEYID = 6
18,116,532 UART: [afmc] SUBJECT.KEYID = 7
18,117,616 UART: [afmc] AUTHORITY.KEYID = 5
21,028,110 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,327,295 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,563 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,953 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,776 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,373,204 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,815 UART: [afmc] --
23,397,990 UART: [cold-reset] --
23,402,279 UART: [state] Locking Datavault
23,406,440 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,183 UART: [state] Locking ICCM
23,409,763 UART: [exit] Launching FMC @ 0x40000130
23,418,155 UART:
23,418,383 UART: Running Caliptra FMC ...
23,419,570 UART:
23,419,728 UART: [state] CFI Enabled
23,484,870 UART: [fht] FMC Alias Private Key: 7
25,823,437 UART: [art] Extend RT PCRs Done
25,824,662 UART: [art] Lock RT PCRs Done
25,826,368 UART: [art] Populate DV Done
25,831,610 UART: [fht] FMC Alias Private Key: 7
25,833,249 UART: [art] Derive CDI
25,834,057 UART: [art] Store in in slot 0x4
25,893,555 UART: [art] Derive Key Pair
25,894,594 UART: [art] Store priv key in slot 0x5
29,187,692 UART: [art] Derive Key Pair - Done
29,200,849 UART: [art] Signing Cert with AUTHO
29,202,177 UART: RITY.KEYID = 7
31,489,145 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,653 UART: [art] PUB.X = 66E671B93F2BC4E3A0602CF1B90BFB28C89B79EE2793B0DE19FC17B754F15D1DC37BBE724F009A344667C1522C1FD079
31,497,921 UART: [art] PUB.Y = A04EDB4C4D818847D3713946E00666ECA8C41F86F98A340EA1E7F78EFEF6B56F19AB4C2B59DFB6C69D0AB7160A37C670
31,505,156 UART: [art] SIG.R = A87780523955F3D09BC1DC3D67F7620C64E4943C5D9601D62DAD683E4FB00B29E8A7F9FF88DC9F55C6268A08F37F5730
31,512,573 UART: [art] SIG.S = 0FBBC3007D097DD7A51B6B7D21B265AAE19DC9621771668ADCBDA73A1C43464D7C595CD8C99F59F0943530B268704A95
32,817,926 UART: Caliptra RT
32,818,628 UART: [state] CFI Enabled
32,979,239 UART: [rt] RT listening for mailbox commands...
33,012,712 UART: [rt]cmd =0x49444543, len=327
33,021,981 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,804,828 ready_for_fw is high
3,805,475 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,891,967 >>> mbox cmd response: success
18,358,095 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,589,658 UART:
23,590,083 UART: Running Caliptra FMC ...
23,591,373 UART:
23,591,568 UART: [state] CFI Enabled
23,660,796 UART: [fht] FMC Alias Private Key: 7
25,998,840 UART: [art] Extend RT PCRs Done
26,000,094 UART: [art] Lock RT PCRs Done
26,001,674 UART: [art] Populate DV Done
26,007,156 UART: [fht] FMC Alias Private Key: 7
26,008,732 UART: [art] Derive CDI
26,009,474 UART: [art] Store in in slot 0x4
26,069,403 UART: [art] Derive Key Pair
26,070,404 UART: [art] Store priv key in slot 0x5
29,363,194 UART: [art] Derive Key Pair - Done
29,376,185 UART: [art] Signing Cert with AUTHO
29,377,523 UART: RITY.KEYID = 7
31,665,916 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,418 UART: [art] PUB.X = 331615293920CB8D2E9879486C3AF9B37FF7741648772861EE43D38260C029E89C9866BD1674B0E762879A8B15D7663F
31,674,613 UART: [art] PUB.Y = C9352B2A75533AED05C4DB32BFBB2802E77BB4FB80DA28DBB9223AECA3B19A3C2D0A5EF65CDC812D0C07DE3CC055B070
31,681,915 UART: [art] SIG.R = 86A795CFD54873DE8D98076429D45D12632936B4936482DE76FDF4AC42E9017F1D365826257847263E89489703DAB52E
31,689,291 UART: [art] SIG.S = 0F0F17842CE235BFF548451ADBD03F53AF176CA8C886CC404D616235B66A2A7D003A8CD765E2B3A5BD4C2C455FF0BD30
32,993,519 UART: Caliptra RT
32,994,228 UART: [state] CFI Enabled
33,155,045 UART: [rt] RT listening for mailbox commands...
33,188,938 UART: [rt]cmd =0x49444543, len=327
33,197,710 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,529 UART:
192,885 UART: Running Caliptra ROM ...
194,068 UART:
603,667 UART: [state] CFI Enabled
621,306 UART: [state] LifecycleState = Unprovisioned
623,251 UART: [state] DebugLocked = No
626,270 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,435 UART: [kat] SHA2-256
801,212 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,738 UART: [kat] ++
812,221 UART: [kat] sha1
824,308 UART: [kat] SHA2-256
826,970 UART: [kat] SHA2-384
833,182 UART: [kat] SHA2-512-ACC
835,550 UART: [kat] ECC-384
3,119,752 UART: [kat] HMAC-384Kdf
3,131,060 UART: [kat] LMS
4,321,115 UART: [kat] --
4,325,627 UART: [cold-reset] ++
4,326,879 UART: [fht] Storing FHT @ 0x50003400
4,339,426 UART: [idev] ++
4,340,062 UART: [idev] CDI.KEYID = 6
4,340,995 UART: [idev] SUBJECT.KEYID = 7
4,342,238 UART: [idev] UDS.KEYID = 0
4,343,230 ready_for_fw is high
4,343,434 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,395 UART: [idev] Erasing UDS.KEYID = 0
7,632,537 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,145 UART: [idev] --
7,658,434 UART: [ldev] ++
7,659,010 UART: [ldev] CDI.KEYID = 6
7,659,947 UART: [ldev] SUBJECT.KEYID = 5
7,661,213 UART: [ldev] AUTHORITY.KEYID = 7
7,662,442 UART: [ldev] FE.KEYID = 1
7,674,476 UART: [ldev] Erasing FE.KEYID = 1
10,963,113 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,258,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,273,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,302,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,321,652 UART: [ldev] --
13,326,813 UART: [fwproc] Waiting for Commands...
13,329,391 UART: [fwproc] Received command 0x46574c44
13,331,574 UART: [fwproc] Received Image of size 113844 bytes
17,376,425 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,848 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,721 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,838,357 >>> mbox cmd response: success
18,300,543 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,301,605 UART: [afmc] ++
18,302,171 UART: [afmc] CDI.KEYID = 6
18,303,064 UART: [afmc] SUBJECT.KEYID = 7
18,304,096 UART: [afmc] AUTHORITY.KEYID = 5
21,162,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,022 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,375 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,235 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,660 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,360 UART: [afmc] --
23,532,018 UART: [cold-reset] --
23,535,723 UART: [state] Locking Datavault
23,540,654 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,356 UART: [state] Locking ICCM
23,543,886 UART: [exit] Launching FMC @ 0x40000130
23,552,279 UART:
23,552,514 UART: Running Caliptra FMC ...
23,553,612 UART:
23,553,774 UART: [state] CFI Enabled
23,561,845 UART: [fht] FMC Alias Private Key: 7
25,892,462 UART: [art] Extend RT PCRs Done
25,893,679 UART: [art] Lock RT PCRs Done
25,895,306 UART: [art] Populate DV Done
25,900,826 UART: [fht] FMC Alias Private Key: 7
25,902,311 UART: [art] Derive CDI
25,903,073 UART: [art] Store in in slot 0x4
25,945,616 UART: [art] Derive Key Pair
25,946,658 UART: [art] Store priv key in slot 0x5
29,188,629 UART: [art] Derive Key Pair - Done
29,201,776 UART: [art] Signing Cert with AUTHO
29,203,118 UART: RITY.KEYID = 7
31,482,670 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,180 UART: [art] PUB.X = 34B903A0A892D44726E19BDCDBBAB0F786F3841BFA69C493E86F25E96006E7F88D5832DB59DEF61B5222E2BD35F9F5BE
31,491,432 UART: [art] PUB.Y = F9D26272A9D1A5903CDA9E210EEF8FC6E1BD83A5AEAB9FB0DDD314E24221EF1931930D06BF12A4F50601CDE3F8DC6AF1
31,498,727 UART: [art] SIG.R = 5046DED4ADE13846E4A1763E9A3CD2D30B128AC968EF3E888EB03CEA44D6AA2ADF19006787CFACB14F71EE62D6B24855
31,506,160 UART: [art] SIG.S = E405DE2CA650D1E7713F044088EBF49AE4F0EA2A9A0DB96EC27745FF1D1E568A3F06C4EC319A135B2663D37842AA75A5
32,810,811 UART: Caliptra RT
32,811,531 UART: [state] CFI Enabled
32,929,509 UART: [rt] RT listening for mailbox commands...
32,963,208 UART: [rt]cmd =0x49444543, len=327
32,972,236 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
4,129,977 ready_for_fw is high
4,130,485 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,062,301 >>> mbox cmd response: success
18,524,410 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,701,089 UART:
23,701,503 UART: Running Caliptra FMC ...
23,702,609 UART:
23,702,769 UART: [state] CFI Enabled
23,710,675 UART: [fht] FMC Alias Private Key: 7
26,040,803 UART: [art] Extend RT PCRs Done
26,042,040 UART: [art] Lock RT PCRs Done
26,043,717 UART: [art] Populate DV Done
26,049,333 UART: [fht] FMC Alias Private Key: 7
26,051,042 UART: [art] Derive CDI
26,051,788 UART: [art] Store in in slot 0x4
26,094,343 UART: [art] Derive Key Pair
26,095,386 UART: [art] Store priv key in slot 0x5
29,337,285 UART: [art] Derive Key Pair - Done
29,350,331 UART: [art] Signing Cert with AUTHO
29,351,638 UART: RITY.KEYID = 7
31,631,155 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,662 UART: [art] PUB.X = F463627BF89D21953FE28F338CFB6632FBFF148054EDC8DB77506297AFD986218622EA5F03C0B1C4C11B73F60A14E478
31,639,866 UART: [art] PUB.Y = B66953FD4D39950C36118BDAEBADCA69714D83CB5117FA68BDF2405888FBFD991A703E0B3B62E55B8BCC40EECD0D6E9C
31,647,134 UART: [art] SIG.R = 4DDC98F394ECD040DD2AA49446874D219D639CC2813EE7CEAF87FA3B9C33865D864C2011EA57FA71C585E9D47F76BBF4
31,654,595 UART: [art] SIG.S = 8B4C39BA4912BF1C247BCFAA9B9154D6D8C69CCDA6F7D1B0BC040D29E8EAB702E7B8AC1B666257D21C1C9CFAC6ED093B
32,960,090 UART: Caliptra RT
32,960,805 UART: [state] CFI Enabled
33,078,999 UART: [rt] RT listening for mailbox commands...
33,112,699 UART: [rt]cmd =0x49444543, len=327
33,121,607 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
191,994 UART:
192,369 UART: Running Caliptra ROM ...
193,581 UART:
193,735 UART: [state] CFI Enabled
262,403 UART: [state] LifecycleState = Unprovisioned
264,333 UART: [state] DebugLocked = No
265,731 UART: [state] WD Timer not started. Device not locked for debugging
270,058 UART: [kat] SHA2-256
449,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,733 UART: [kat] ++
461,268 UART: [kat] sha1
471,508 UART: [kat] SHA2-256
474,520 UART: [kat] SHA2-384
481,572 UART: [kat] SHA2-512-ACC
484,579 UART: [kat] ECC-384
2,948,889 UART: [kat] HMAC-384Kdf
2,971,641 UART: [kat] LMS
3,501,124 UART: [kat] --
3,506,141 UART: [cold-reset] ++
3,507,085 UART: [fht] FHT @ 0x50003400
3,518,072 UART: [idev] ++
3,518,639 UART: [idev] CDI.KEYID = 6
3,519,564 UART: [idev] SUBJECT.KEYID = 7
3,520,736 UART: [idev] UDS.KEYID = 0
3,521,660 ready_for_fw is high
3,521,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,837 UART: [idev] Erasing UDS.KEYID = 0
6,025,163 UART: [idev] Sha1 KeyId Algorithm
6,047,599 UART: [idev] --
6,051,009 UART: [ldev] ++
6,051,592 UART: [ldev] CDI.KEYID = 6
6,052,518 UART: [ldev] SUBJECT.KEYID = 5
6,053,684 UART: [ldev] AUTHORITY.KEYID = 7
6,054,917 UART: [ldev] FE.KEYID = 1
6,100,153 UART: [ldev] Erasing FE.KEYID = 1
8,604,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,873 UART: [ldev] --
10,414,364 UART: [fwproc] Wait for Commands...
10,417,577 UART: [fwproc] Recv command 0x46574c44
10,419,619 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,879,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,265,556 >>> mbox cmd response: success
14,729,431 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,730,495 UART: [afmc] ++
14,731,031 UART: [afmc] CDI.KEYID = 6
14,731,916 UART: [afmc] SUBJECT.KEYID = 7
14,733,167 UART: [afmc] AUTHORITY.KEYID = 5
16,809,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,627 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,432 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,360 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,477 UART: [afmc] --
18,606,882 UART: [cold-reset] --
18,610,039 UART: [state] Locking Datavault
18,614,811 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,460 UART: [state] Locking ICCM
18,618,518 UART: [exit] Launching FMC @ 0x40000130
18,626,911 UART:
18,627,148 UART: Running Caliptra FMC ...
18,628,245 UART:
18,628,410 UART: [state] CFI Enabled
18,688,751 UART: [fht] FMC Alias Private Key: 7
20,453,035 UART: [art] Extend RT PCRs Done
20,454,269 UART: [art] Lock RT PCRs Done
20,456,118 UART: [art] Populate DV Done
20,461,585 UART: [fht] FMC Alias Private Key: 7
20,463,252 UART: [art] Derive CDI
20,464,069 UART: [art] Store in in slot 0x4
20,521,374 UART: [art] Derive Key Pair
20,522,410 UART: [art] Store priv key in slot 0x5
22,985,243 UART: [art] Derive Key Pair - Done
22,998,570 UART: [art] Signing Cert with AUTHO
22,999,879 UART: RITY.KEYID = 7
24,711,206 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,709 UART: [art] PUB.X = 83CFF58DB04DEE6C9D43822D46579528B51FDE7245BC0A614C5A34957D708F777680437B11702A09787F4ED846E2A55C
24,719,980 UART: [art] PUB.Y = 3B008C18A006434EA8722B2C3D1CA8C64BEE99C627E295E60B623970519A03F59D75A279B2399F3956194C78510BB0E0
24,727,177 UART: [art] SIG.R = D614A8DF1A4DF18F90FEB71048851061527ECD65844AA366889F1A6E894805A46516E1400F9CABA13EDE1959729BA817
24,734,727 UART: [art] SIG.S = 7BC9A9C6532AB0EDF7BD2A27B7CBB47ADB70639D62E770181AD6E1C4E26DA08BF052570734FCFA67F32867DE17246BE3
25,713,390 UART: Caliptra RT
25,714,087 UART: [state] CFI Enabled
25,879,501 UART: [rt] RT listening for mailbox commands...
25,913,348 UART: [rt]cmd =0x49444543, len=327
25,922,264 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,361,082 ready_for_fw is high
3,361,484 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,033,327 >>> mbox cmd response: success
14,498,665 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,321,712 UART:
18,322,151 UART: Running Caliptra FMC ...
18,323,273 UART:
18,323,445 UART: [state] CFI Enabled
18,387,825 UART: [fht] FMC Alias Private Key: 7
20,152,866 UART: [art] Extend RT PCRs Done
20,154,096 UART: [art] Lock RT PCRs Done
20,155,674 UART: [art] Populate DV Done
20,161,125 UART: [fht] FMC Alias Private Key: 7
20,162,778 UART: [art] Derive CDI
20,163,594 UART: [art] Store in in slot 0x4
20,220,498 UART: [art] Derive Key Pair
20,221,535 UART: [art] Store priv key in slot 0x5
22,684,205 UART: [art] Derive Key Pair - Done
22,697,200 UART: [art] Signing Cert with AUTHO
22,698,510 UART: RITY.KEYID = 7
24,410,109 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,613 UART: [art] PUB.X = 586A891859AEF12E6CBF700CCD2D2578F0EE4E744CD93A69B24C76CDEA6EF91477F38CA041D6F4E3FB8F2D10C34E5623
24,418,959 UART: [art] PUB.Y = 37A0F7FAA3B0915F0799D61869E11E035B59C0E199CE985CAC81E1C0D3A689D756683A7857B919144C187D081A52451C
24,426,170 UART: [art] SIG.R = A8F12DCC45D2B1C955EFCE34BC8F3D77210F0A82F1893C63A23B2C16FC68CB4D623BDF5FFB1AE229B3E369D1FA400CC6
24,433,559 UART: [art] SIG.S = ED10B0237404A46482BD4CE20B95F35A22554FF593C5FF35CB05D793E2345ED7E118B2B5154B9C87AFED841794EC39DC
25,412,177 UART: Caliptra RT
25,412,892 UART: [state] CFI Enabled
25,577,984 UART: [rt] RT listening for mailbox commands...
25,611,987 UART: [rt]cmd =0x49444543, len=327
25,620,763 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,794 writing to cptra_bootfsm_go
193,018 UART:
193,394 UART: Running Caliptra ROM ...
194,586 UART:
604,160 UART: [state] CFI Enabled
614,728 UART: [state] LifecycleState = Unprovisioned
616,564 UART: [state] DebugLocked = No
618,240 UART: [state] WD Timer not started. Device not locked for debugging
622,418 UART: [kat] SHA2-256
801,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,170 UART: [kat] ++
813,703 UART: [kat] sha1
826,074 UART: [kat] SHA2-256
829,088 UART: [kat] SHA2-384
835,440 UART: [kat] SHA2-512-ACC
838,383 UART: [kat] ECC-384
3,280,726 UART: [kat] HMAC-384Kdf
3,293,533 UART: [kat] LMS
3,822,991 UART: [kat] --
3,828,108 UART: [cold-reset] ++
3,829,772 UART: [fht] FHT @ 0x50003400
3,840,543 UART: [idev] ++
3,841,114 UART: [idev] CDI.KEYID = 6
3,842,071 UART: [idev] SUBJECT.KEYID = 7
3,843,245 UART: [idev] UDS.KEYID = 0
3,844,146 ready_for_fw is high
3,844,345 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,756 UART: [idev] Erasing UDS.KEYID = 0
6,308,793 UART: [idev] Sha1 KeyId Algorithm
6,332,084 UART: [idev] --
6,336,356 UART: [ldev] ++
6,336,922 UART: [ldev] CDI.KEYID = 6
6,337,831 UART: [ldev] SUBJECT.KEYID = 5
6,338,989 UART: [ldev] AUTHORITY.KEYID = 7
6,340,271 UART: [ldev] FE.KEYID = 1
6,351,566 UART: [ldev] Erasing FE.KEYID = 1
8,821,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,537,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,553,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,568,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,584,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,604,010 UART: [ldev] --
10,609,224 UART: [fwproc] Wait for Commands...
10,612,387 UART: [fwproc] Recv command 0x46574c44
10,614,433 UART: [fwproc] Recv'd Img size: 114168 bytes
14,016,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,957 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,479,575 >>> mbox cmd response: success
14,941,951 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,942,968 UART: [afmc] ++
14,943,492 UART: [afmc] CDI.KEYID = 6
14,944,474 UART: [afmc] SUBJECT.KEYID = 7
14,945,509 UART: [afmc] AUTHORITY.KEYID = 5
16,988,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,335 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,871 UART: [afmc] --
18,785,395 UART: [cold-reset] --
18,790,667 UART: [state] Locking Datavault
18,796,180 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,878 UART: [state] Locking ICCM
18,799,869 UART: [exit] Launching FMC @ 0x40000130
18,808,263 UART:
18,808,508 UART: Running Caliptra FMC ...
18,809,609 UART:
18,809,779 UART: [state] CFI Enabled
18,818,120 UART: [fht] FMC Alias Private Key: 7
20,575,933 UART: [art] Extend RT PCRs Done
20,577,137 UART: [art] Lock RT PCRs Done
20,578,756 UART: [art] Populate DV Done
20,584,060 UART: [fht] FMC Alias Private Key: 7
20,585,654 UART: [art] Derive CDI
20,586,468 UART: [art] Store in in slot 0x4
20,628,738 UART: [art] Derive Key Pair
20,629,774 UART: [art] Store priv key in slot 0x5
23,056,102 UART: [art] Derive Key Pair - Done
23,069,223 UART: [art] Signing Cert with AUTHO
23,070,538 UART: RITY.KEYID = 7
24,775,730 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,213 UART: [art] PUB.X = E6CBB303BEC20FFC114DBD297FF2645221FD7947C5C9B85A5F30F2DD3FC7C57C6441917BB694607821ED4E79035BE18C
24,784,517 UART: [art] PUB.Y = 2C8431741B5415D6AA9FE1D15024172CE76E32DCD6D968983C985A55750B6C992FF0297B99C44619C1197D4C803DA965
24,791,754 UART: [art] SIG.R = 5994696274C1DE85C17F39FB01149C55B4EE710D4366DD241AD0B369ECC5D34D89A63BF2A989AC5010E25E0EC2F7BA94
24,799,114 UART: [art] SIG.S = AC6869366CB5B3A7CCD5FA5AE6C91EDC510CAED25C25AED088B499E248901F72219A75D5895502DBD79E925B66B8D40A
25,777,756 UART: Caliptra RT
25,778,478 UART: [state] CFI Enabled
25,895,719 UART: [rt] RT listening for mailbox commands...
25,929,461 UART: [rt]cmd =0x49444543, len=327
25,938,454 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,689 writing to cptra_bootfsm_go
3,696,197 ready_for_fw is high
3,696,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,749 >>> mbox cmd response: success
14,731,285 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,518,086 UART:
18,518,477 UART: Running Caliptra FMC ...
18,519,592 UART:
18,519,759 UART: [state] CFI Enabled
18,527,970 UART: [fht] FMC Alias Private Key: 7
20,284,882 UART: [art] Extend RT PCRs Done
20,286,117 UART: [art] Lock RT PCRs Done
20,287,606 UART: [art] Populate DV Done
20,292,998 UART: [fht] FMC Alias Private Key: 7
20,294,589 UART: [art] Derive CDI
20,295,332 UART: [art] Store in in slot 0x4
20,337,869 UART: [art] Derive Key Pair
20,338,869 UART: [art] Store priv key in slot 0x5
22,765,979 UART: [art] Derive Key Pair - Done
22,779,094 UART: [art] Signing Cert with AUTHO
22,780,397 UART: RITY.KEYID = 7
24,485,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,124 UART: [art] PUB.X = DA776831282D2F752B2EEFF41E44A9742F11310B42DC27207DB3D9E8FF4CBCBD560A4DA6DBD0BBB50D3619505EC1C7BF
24,494,437 UART: [art] PUB.Y = D1E12C62A5F593C1AE8414DE8970D45144F85AD39ACBAE12B0F936E39F47D67A534D94DADBDCE245B3F0AB520CEF0110
24,501,752 UART: [art] SIG.R = 3C00E1193637FBB6C7E98F88BBB172AA9375FBE3F704B8A436D0D61E55D4D55DB70A236E2AA5F14A711A7732DB52B789
24,509,094 UART: [art] SIG.S = DED1D91D0788AAD61BFD528DCFD060015A0CFB5FD070B45B642AC6C071803E324EA97EE3D62D78A5FDAF8507293A61D1
25,488,353 UART: Caliptra RT
25,489,059 UART: [state] CFI Enabled
25,606,696 UART: [rt] RT listening for mailbox commands...
25,640,592 UART: [rt]cmd =0x49444543, len=327
25,649,655 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,119 UART:
192,491 UART: Running Caliptra ROM ...
193,698 UART:
193,853 UART: [state] CFI Enabled
263,809 UART: [state] LifecycleState = Unprovisioned
266,227 UART: [state] DebugLocked = No
268,542 UART: [state] WD Timer not started. Device not locked for debugging
272,799 UART: [kat] SHA2-256
462,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,457 UART: [kat] ++
473,935 UART: [kat] sha1
485,235 UART: [kat] SHA2-256
488,247 UART: [kat] SHA2-384
494,097 UART: [kat] SHA2-512-ACC
496,695 UART: [kat] ECC-384
2,946,368 UART: [kat] HMAC-384Kdf
2,971,379 UART: [kat] LMS
3,503,136 UART: [kat] --
3,508,126 UART: [cold-reset] ++
3,509,061 UART: [fht] FHT @ 0x50003400
3,519,823 UART: [idev] ++
3,520,531 UART: [idev] CDI.KEYID = 6
3,521,482 UART: [idev] SUBJECT.KEYID = 7
3,522,726 UART: [idev] UDS.KEYID = 0
3,523,630 ready_for_fw is high
3,523,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,413 UART: [idev] Erasing UDS.KEYID = 0
6,027,808 UART: [idev] Sha1 KeyId Algorithm
6,048,983 UART: [idev] --
6,052,946 UART: [ldev] ++
6,053,643 UART: [ldev] CDI.KEYID = 6
6,054,555 UART: [ldev] SUBJECT.KEYID = 5
6,055,665 UART: [ldev] AUTHORITY.KEYID = 7
6,056,959 UART: [ldev] FE.KEYID = 1
6,099,069 UART: [ldev] Erasing FE.KEYID = 1
8,609,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,200 UART: [ldev] --
10,409,733 UART: [fwproc] Wait for Commands...
10,412,527 UART: [fwproc] Recv command 0x46574c44
10,414,840 UART: [fwproc] Recv'd Img size: 114168 bytes
13,857,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,693 >>> mbox cmd response: success
15,066,983 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,068,061 UART: [afmc] ++
15,068,601 UART: [afmc] CDI.KEYID = 6
15,069,486 UART: [afmc] SUBJECT.KEYID = 7
15,070,507 UART: [afmc] AUTHORITY.KEYID = 5
17,151,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,316 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,677 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,843 UART: [afmc] --
18,950,672 UART: [cold-reset] --
18,953,470 UART: [state] Locking Datavault
18,959,054 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,253 UART: [state] Locking ICCM
18,962,651 UART: [exit] Launching FMC @ 0x40000130
18,971,345 UART:
18,971,590 UART: Running Caliptra FMC ...
18,972,690 UART:
18,972,851 UART: [state] CFI Enabled
19,031,221 UART: [fht] FMC Alias Private Key: 7
20,794,861 UART: [art] Extend RT PCRs Done
20,796,081 UART: [art] Lock RT PCRs Done
20,797,735 UART: [art] Populate DV Done
20,803,148 UART: [fht] FMC Alias Private Key: 7
20,804,634 UART: [art] Derive CDI
20,805,405 UART: [art] Store in in slot 0x4
20,862,860 UART: [art] Derive Key Pair
20,863,908 UART: [art] Store priv key in slot 0x5
23,327,082 UART: [art] Derive Key Pair - Done
23,339,902 UART: [art] Signing Cert with AUTHO
23,341,245 UART: RITY.KEYID = 7
25,053,907 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,417 UART: [art] PUB.X = A38879CB0FC7814E6D70AB1A590FF1ED50CF3E19E4CC2C4B879EF0E77FA63B46392E0DB0079BDF2AB1A5C93194F7E6B1
25,062,708 UART: [art] PUB.Y = 7757125A29B31616FED005BD478D67C4CCCF57DED70B03DB4B3A9B3F8978DAD548A933832F325646A891EBEB4C3C423E
25,069,965 UART: [art] SIG.R = DF97E5D2B48251559B130579A64AB265CF16DA98E195C9E5D0DB921D79F871F0CE704EA7B0D52E8B0CD16E3B0282B0BB
25,077,385 UART: [art] SIG.S = 53EBA2337F28B30D66B2A109B6B5ABF592B71110BC2E19EA316028CC67913798D8B572CA057C3797A5E38754005A6957
26,056,117 UART: Caliptra RT
26,056,807 UART: [state] CFI Enabled
26,221,580 UART: [rt] RT listening for mailbox commands...
26,255,202 UART: [rt]cmd =0x49444543, len=327
26,264,200 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,426,178 ready_for_fw is high
3,426,786 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,721,938 >>> mbox cmd response: success
15,187,693 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,013,372 UART:
19,013,787 UART: Running Caliptra FMC ...
19,014,979 UART:
19,015,159 UART: [state] CFI Enabled
19,082,620 UART: [fht] FMC Alias Private Key: 7
20,845,876 UART: [art] Extend RT PCRs Done
20,847,100 UART: [art] Lock RT PCRs Done
20,848,850 UART: [art] Populate DV Done
20,854,236 UART: [fht] FMC Alias Private Key: 7
20,855,835 UART: [art] Derive CDI
20,856,652 UART: [art] Store in in slot 0x4
20,915,071 UART: [art] Derive Key Pair
20,916,108 UART: [art] Store priv key in slot 0x5
23,378,939 UART: [art] Derive Key Pair - Done
23,392,320 UART: [art] Signing Cert with AUTHO
23,393,626 UART: RITY.KEYID = 7
25,104,518 UART: [art] Erasing AUTHORITY.KEYID = 7
25,106,022 UART: [art] PUB.X = C00DDF32A2D334064010ADB207AC32EC9F0469CB9DF5DF1D28DC4E7E71948AF352D3A4D698FD190583FC7334C870ADEC
25,113,291 UART: [art] PUB.Y = 7BA1B5F30A8938C269D4188ECCBDA19AD6CB100B8FEAD2660291FBFB93E2F98EE4022E2584D4E375B6F259F1C4DFE1C3
25,120,542 UART: [art] SIG.R = 7E84F47F3FE0B601D7F3C88CFEE30689416A900E70466DAD748448F75CEA0611E7345CF375083A48116FB02D14A443DE
25,127,942 UART: [art] SIG.S = A0DAB837BCB7B2B7BCF1F8E345C1EA01F65BE869CB7668E5F9E29564834A0E29ADFC5995D2E30B946CDAD38F1CACD4B5
26,106,997 UART: Caliptra RT
26,107,716 UART: [state] CFI Enabled
26,270,930 UART: [rt] RT listening for mailbox commands...
26,304,842 UART: [rt]cmd =0x49444543, len=327
26,313,843 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,614 writing to cptra_bootfsm_go
192,831 UART:
193,186 UART: Running Caliptra ROM ...
194,276 UART:
604,172 UART: [state] CFI Enabled
616,343 UART: [state] LifecycleState = Unprovisioned
618,753 UART: [state] DebugLocked = No
621,340 UART: [state] WD Timer not started. Device not locked for debugging
625,728 UART: [kat] SHA2-256
815,622 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,414 UART: [kat] ++
826,934 UART: [kat] sha1
838,800 UART: [kat] SHA2-256
841,803 UART: [kat] SHA2-384
847,717 UART: [kat] SHA2-512-ACC
850,324 UART: [kat] ECC-384
3,291,732 UART: [kat] HMAC-384Kdf
3,305,177 UART: [kat] LMS
3,837,000 UART: [kat] --
3,840,930 UART: [cold-reset] ++
3,842,427 UART: [fht] FHT @ 0x50003400
3,854,562 UART: [idev] ++
3,855,206 UART: [idev] CDI.KEYID = 6
3,856,241 UART: [idev] SUBJECT.KEYID = 7
3,857,418 UART: [idev] UDS.KEYID = 0
3,858,351 ready_for_fw is high
3,858,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,915 UART: [idev] Erasing UDS.KEYID = 0
6,337,022 UART: [idev] Sha1 KeyId Algorithm
6,358,980 UART: [idev] --
6,362,654 UART: [ldev] ++
6,363,389 UART: [ldev] CDI.KEYID = 6
6,364,304 UART: [ldev] SUBJECT.KEYID = 5
6,365,464 UART: [ldev] AUTHORITY.KEYID = 7
6,366,700 UART: [ldev] FE.KEYID = 1
6,377,086 UART: [ldev] Erasing FE.KEYID = 1
8,857,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,325 UART: [ldev] --
10,646,001 UART: [fwproc] Wait for Commands...
10,648,691 UART: [fwproc] Recv command 0x46574c44
10,650,999 UART: [fwproc] Recv'd Img size: 114168 bytes
14,093,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,240 >>> mbox cmd response: success
15,295,164 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,296,181 UART: [afmc] ++
15,296,701 UART: [afmc] CDI.KEYID = 6
15,297,618 UART: [afmc] SUBJECT.KEYID = 7
15,298,736 UART: [afmc] AUTHORITY.KEYID = 5
17,345,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,577 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,923 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,121 UART: [afmc] --
19,140,570 UART: [cold-reset] --
19,144,767 UART: [state] Locking Datavault
19,152,128 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,329 UART: [state] Locking ICCM
19,156,912 UART: [exit] Launching FMC @ 0x40000130
19,165,582 UART:
19,165,819 UART: Running Caliptra FMC ...
19,166,924 UART:
19,167,087 UART: [state] CFI Enabled
19,175,474 UART: [fht] FMC Alias Private Key: 7
20,932,152 UART: [art] Extend RT PCRs Done
20,933,379 UART: [art] Lock RT PCRs Done
20,934,682 UART: [art] Populate DV Done
20,940,209 UART: [fht] FMC Alias Private Key: 7
20,941,860 UART: [art] Derive CDI
20,942,599 UART: [art] Store in in slot 0x4
20,985,407 UART: [art] Derive Key Pair
20,986,409 UART: [art] Store priv key in slot 0x5
23,413,274 UART: [art] Derive Key Pair - Done
23,426,430 UART: [art] Signing Cert with AUTHO
23,427,729 UART: RITY.KEYID = 7
25,133,093 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,606 UART: [art] PUB.X = 6E90D0E087B3C4A902451ECC213A85F8847890BFA5CD1BE5CC3A139EAECF248CAA48E2CB8D3E9C7F5433EC9FBC968759
25,141,852 UART: [art] PUB.Y = 2DEBF6A2EA55FFAAC8765CEBE07238CC175BFD961DA5D3DC541C6DCA6564160B234E0E6051B1FC69CCD40E7532F13CAF
25,149,194 UART: [art] SIG.R = 6B62A14D9856EEA73E27E9DD83B6374BF354D299981E877C016B438F8E0557C9B77D91D581B919FBCCF03393732B7291
25,156,539 UART: [art] SIG.S = 29B2311C8233FED36DD14296272975911DC558D123820DCE7EE2F7D7BAD7F807B9336A5E08B5D2422C46C26679A36B17
26,136,054 UART: Caliptra RT
26,136,770 UART: [state] CFI Enabled
26,253,842 UART: [rt] RT listening for mailbox commands...
26,287,687 UART: [rt]cmd =0x49444543, len=327
26,296,797 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,745 writing to cptra_bootfsm_go
3,759,739 ready_for_fw is high
3,760,178 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,949,706 >>> mbox cmd response: success
15,413,152 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,200,716 UART:
19,201,150 UART: Running Caliptra FMC ...
19,202,272 UART:
19,202,432 UART: [state] CFI Enabled
19,210,151 UART: [fht] FMC Alias Private Key: 7
20,967,140 UART: [art] Extend RT PCRs Done
20,968,379 UART: [art] Lock RT PCRs Done
20,969,927 UART: [art] Populate DV Done
20,975,218 UART: [fht] FMC Alias Private Key: 7
20,976,869 UART: [art] Derive CDI
20,977,613 UART: [art] Store in in slot 0x4
21,020,096 UART: [art] Derive Key Pair
21,021,143 UART: [art] Store priv key in slot 0x5
23,447,560 UART: [art] Derive Key Pair - Done
23,460,645 UART: [art] Signing Cert with AUTHO
23,461,974 UART: RITY.KEYID = 7
25,167,377 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,889 UART: [art] PUB.X = EDA77401D6F0A07DA4B295F08246848C7221C75A75E6FEDFEE92172CBCE245B0D63BB1956198BCC18FA8C1695B2DD210
25,176,206 UART: [art] PUB.Y = C1E7D08DE358D42A6A99E0ED84137CF2F94905FA9E36DD973C2FC996DE64A886F3AA4849E8E4FD5353799D60FAAA26F1
25,183,422 UART: [art] SIG.R = EAD9E1C772DEE15327FCED40E7F0CBC58EE7F96AF36D54B2846F32651BD2BD113529DF5DD09159E7EFAC5E4F35149388
25,190,820 UART: [art] SIG.S = 0CDC61541E6634BE699ED54993E2225119EC88DCDD04BADD3F606B9AA15E6D9108C6B6EE87F9E35197EAC1822DEB0585
26,169,706 UART: Caliptra RT
26,170,412 UART: [state] CFI Enabled
26,288,230 UART: [rt] RT listening for mailbox commands...
26,321,683 UART: [rt]cmd =0x49444543, len=327
26,330,714 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,631 UART: [kat] SHA2-256
892,569 UART: [kat] SHA2-384
895,220 UART: [kat] SHA2-512-ACC
897,121 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,691 UART: [fht] Storing FHT @ 0x50003400
1,479,346 UART: [idev] ++
1,479,514 UART: [idev] CDI.KEYID = 6
1,479,874 UART: [idev] SUBJECT.KEYID = 7
1,480,298 UART: [idev] UDS.KEYID = 0
1,480,643 ready_for_fw is high
1,480,643 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,146 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,910 UART: [idev] --
1,514,983 UART: [ldev] ++
1,515,151 UART: [ldev] CDI.KEYID = 6
1,515,514 UART: [ldev] SUBJECT.KEYID = 5
1,515,940 UART: [ldev] AUTHORITY.KEYID = 7
1,516,403 UART: [ldev] FE.KEYID = 1
1,521,719 UART: [ldev] Erasing FE.KEYID = 1
1,546,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,012 UART: [ldev] --
1,586,397 UART: [fwproc] Waiting for Commands...
1,587,140 UART: [fwproc] Received command 0x46574c44
1,587,931 UART: [fwproc] Received Image of size 114168 bytes
2,883,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,333 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,430 >>> mbox cmd response: success
3,075,430 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,076,486 UART: [afmc] ++
3,076,654 UART: [afmc] CDI.KEYID = 6
3,077,016 UART: [afmc] SUBJECT.KEYID = 7
3,077,441 UART: [afmc] AUTHORITY.KEYID = 5
3,112,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,424 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,204 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,817 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,507 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,518 UART: [afmc] --
3,156,622 UART: [cold-reset] --
3,157,618 UART: [state] Locking Datavault
3,158,571 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,175 UART: [state] Locking ICCM
3,159,609 UART: [exit] Launching FMC @ 0x40000130
3,164,938 UART:
3,164,954 UART: Running Caliptra FMC ...
3,165,362 UART:
3,165,416 UART: [state] CFI Enabled
3,175,491 UART: [fht] FMC Alias Private Key: 7
3,282,842 UART: [art] Extend RT PCRs Done
3,283,270 UART: [art] Lock RT PCRs Done
3,285,004 UART: [art] Populate DV Done
3,293,127 UART: [fht] FMC Alias Private Key: 7
3,294,289 UART: [art] Derive CDI
3,294,569 UART: [art] Store in in slot 0x4
3,380,098 UART: [art] Derive Key Pair
3,380,458 UART: [art] Store priv key in slot 0x5
3,393,204 UART: [art] Derive Key Pair - Done
3,407,839 UART: [art] Signing Cert with AUTHO
3,408,319 UART: RITY.KEYID = 7
3,423,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,018 UART: [art] PUB.X = 7ED42A0296170613246C11D5F28C9113BAB040BBAA58066D944AF7583D5880AF229ECDD450F5C0B8A7CE92B3F89F742B
3,430,785 UART: [art] PUB.Y = B5FE4BA6D3C5EA485F0FA69C95B502C9199155805CA5A9064B4E964D27E6C918D92466A272361C4AA41D8598155B4BA1
3,437,728 UART: [art] SIG.R = A925446BD1BB2EC05A6C6661DC4A734FE793C765BCED9CAD1A3EB185EB2DB01821921F7BDE0F48F7812A0761126F3183
3,444,504 UART: [art] SIG.S = 5DD5D014ED606CEBA00F109AA547AE8AEDE634AFDA52BE50770397011CBAF4A859D6A905C102D248838544E62512B5B2
3,468,652 UART: Caliptra RT
3,468,905 UART: [state] CFI Enabled
3,575,826 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,505 UART: [rt]cmd =0x49444543, len=327
3,616,879 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 ready_for_fw is high
1,362,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,180 >>> mbox cmd response: success
2,925,180 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,986,876 UART:
2,986,892 UART: Running Caliptra FMC ...
2,987,300 UART:
2,987,354 UART: [state] CFI Enabled
2,998,051 UART: [fht] FMC Alias Private Key: 7
3,106,066 UART: [art] Extend RT PCRs Done
3,106,494 UART: [art] Lock RT PCRs Done
3,108,272 UART: [art] Populate DV Done
3,116,681 UART: [fht] FMC Alias Private Key: 7
3,117,635 UART: [art] Derive CDI
3,117,915 UART: [art] Store in in slot 0x4
3,203,640 UART: [art] Derive Key Pair
3,204,000 UART: [art] Store priv key in slot 0x5
3,217,208 UART: [art] Derive Key Pair - Done
3,232,235 UART: [art] Signing Cert with AUTHO
3,232,715 UART: RITY.KEYID = 7
3,247,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,630 UART: [art] PUB.X = 009108ED964219FC1ED5DCCDAA965BE41E1500B7C9329E8FB1DDEFF30614023F902A7315A28D086C957A3409AD06CED8
3,255,348 UART: [art] PUB.Y = 6F407A92B5E96EB02A5B80D8AEE65956624224EB734D003BFB4DF1994BBAA0E6459466476DB293A2594BD0E8284C22EC
3,262,282 UART: [art] SIG.R = E44EC60841F6B1AE415851543A6B90B3C82C00B81645BD53B4A6FC0257CA4386B241A042DAF95FD8D63723C5C4C01B6E
3,269,030 UART: [art] SIG.S = 80BCB7C185DF321FF19F4ADFEE719E0276E91ADE0D30181E963D391A2B3E9208F1CA1351BC9BBF9CCA1167AF8CD05B38
3,292,598 UART: Caliptra RT
3,292,851 UART: [state] CFI Enabled
3,400,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,872 UART: [rt]cmd =0x49444543, len=327
3,441,215 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,478 UART: [kat] SHA2-256
882,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,524 UART: [kat] ++
886,676 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
903,069 UART: [kat] HMAC-384Kdf
907,695 UART: [kat] LMS
1,475,891 UART: [kat] --
1,476,808 UART: [cold-reset] ++
1,477,294 UART: [fht] Storing FHT @ 0x50003400
1,479,953 UART: [idev] ++
1,480,121 UART: [idev] CDI.KEYID = 6
1,480,481 UART: [idev] SUBJECT.KEYID = 7
1,480,905 UART: [idev] UDS.KEYID = 0
1,481,250 ready_for_fw is high
1,481,250 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,165 UART: [idev] Erasing UDS.KEYID = 0
1,506,223 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,843 UART: [idev] --
1,515,874 UART: [ldev] ++
1,516,042 UART: [ldev] CDI.KEYID = 6
1,516,405 UART: [ldev] SUBJECT.KEYID = 5
1,516,831 UART: [ldev] AUTHORITY.KEYID = 7
1,517,294 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,169 UART: [ldev] --
1,587,468 UART: [fwproc] Waiting for Commands...
1,588,311 UART: [fwproc] Received command 0x46574c44
1,589,102 UART: [fwproc] Received Image of size 114168 bytes
2,886,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,622 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,974 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,709 >>> mbox cmd response: success
3,078,709 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,079,831 UART: [afmc] ++
3,079,999 UART: [afmc] CDI.KEYID = 6
3,080,361 UART: [afmc] SUBJECT.KEYID = 7
3,080,786 UART: [afmc] AUTHORITY.KEYID = 5
3,115,561 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,865 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,478 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,168 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,847 UART: [afmc] --
3,158,971 UART: [cold-reset] --
3,159,781 UART: [state] Locking Datavault
3,160,822 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,426 UART: [state] Locking ICCM
3,162,054 UART: [exit] Launching FMC @ 0x40000130
3,167,383 UART:
3,167,399 UART: Running Caliptra FMC ...
3,167,807 UART:
3,167,950 UART: [state] CFI Enabled
3,178,293 UART: [fht] FMC Alias Private Key: 7
3,285,918 UART: [art] Extend RT PCRs Done
3,286,346 UART: [art] Lock RT PCRs Done
3,287,708 UART: [art] Populate DV Done
3,295,733 UART: [fht] FMC Alias Private Key: 7
3,296,741 UART: [art] Derive CDI
3,297,021 UART: [art] Store in in slot 0x4
3,382,810 UART: [art] Derive Key Pair
3,383,170 UART: [art] Store priv key in slot 0x5
3,396,718 UART: [art] Derive Key Pair - Done
3,411,248 UART: [art] Signing Cert with AUTHO
3,411,728 UART: RITY.KEYID = 7
3,426,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,523 UART: [art] PUB.X = A1726ACF0ED858FB8E2D8C23ECBC4067ABADC64BB4495C82A3F694E9C82DECDEAB0C4C2BC5995D2BCD4BAC2A95A00589
3,434,316 UART: [art] PUB.Y = 7F650352AE4CE83079F0F652E7A72EFF32DF05992BD67B90DF427E6D9B216010BAA3AF42735D7DA7A2E5D8CF8AE26A5D
3,441,276 UART: [art] SIG.R = 38413F30788738CE9FA7E352BF39AA59638414BF07B3BC6537D5F016E66A085923FD0575CC606DF2EFA14700234A31D1
3,448,013 UART: [art] SIG.S = 00448E57C9911E00DAABF75982118463C1D1134FA59CAB93E87DCE087035A0B5662DE1DC016BCF33ECB60B9E613042AB
3,471,227 UART: Caliptra RT
3,471,572 UART: [state] CFI Enabled
3,580,388 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,855 UART: [rt]cmd =0x49444543, len=327
3,621,187 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,298 ready_for_fw is high
1,362,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,595 >>> mbox cmd response: success
2,926,595 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,988,569 UART:
2,988,585 UART: Running Caliptra FMC ...
2,988,993 UART:
2,989,136 UART: [state] CFI Enabled
2,999,955 UART: [fht] FMC Alias Private Key: 7
3,107,776 UART: [art] Extend RT PCRs Done
3,108,204 UART: [art] Lock RT PCRs Done
3,109,964 UART: [art] Populate DV Done
3,118,211 UART: [fht] FMC Alias Private Key: 7
3,119,297 UART: [art] Derive CDI
3,119,577 UART: [art] Store in in slot 0x4
3,204,952 UART: [art] Derive Key Pair
3,205,312 UART: [art] Store priv key in slot 0x5
3,218,268 UART: [art] Derive Key Pair - Done
3,232,680 UART: [art] Signing Cert with AUTHO
3,233,160 UART: RITY.KEYID = 7
3,248,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,009 UART: [art] PUB.X = 9054881F0B5A441922AE0E47C0BCF0CFFDDFFA1587172DC22507F92F7DDC4642DAEE6809C810094594FFC43631E1C86A
3,255,774 UART: [art] PUB.Y = 9B609A0CA52C8A720C85DA4160684D3D443119B007E8576BE31FC70B7887F10A36EBDFBFFF3D48E2734FA83C766229B1
3,262,715 UART: [art] SIG.R = 9A8678D3E2A0A494C8431A06E9061C4A22706DB1657AFFC401397E125940EEC047B17A7F678A367C6986ADE3BA443E2B
3,269,478 UART: [art] SIG.S = D6CE1F6A02E57D8E9A0549446194C4CC30AB3E2F784938AF185FC2AD8CD1B704D29B14D0BC7C41C0E2851F276840862D
3,293,590 UART: Caliptra RT
3,293,935 UART: [state] CFI Enabled
3,401,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,496 UART: [rt]cmd =0x49444543, len=327
3,442,984 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
893,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,359 UART: [kat] ++
897,511 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,472 UART: [kat] SHA2-512-ACC
908,373 UART: [kat] ECC-384
917,822 UART: [kat] HMAC-384Kdf
922,414 UART: [kat] LMS
1,170,742 UART: [kat] --
1,171,471 UART: [cold-reset] ++
1,171,895 UART: [fht] FHT @ 0x50003400
1,174,510 UART: [idev] ++
1,174,678 UART: [idev] CDI.KEYID = 6
1,175,038 UART: [idev] SUBJECT.KEYID = 7
1,175,462 UART: [idev] UDS.KEYID = 0
1,175,807 ready_for_fw is high
1,175,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,220 UART: [idev] Erasing UDS.KEYID = 0
1,200,359 UART: [idev] Sha1 KeyId Algorithm
1,208,705 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,238 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,241,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,205 UART: [ldev] --
1,280,600 UART: [fwproc] Wait for Commands...
1,281,216 UART: [fwproc] Recv command 0x46574c44
1,281,944 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,727 >>> mbox cmd response: success
2,769,727 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,770,761 UART: [afmc] ++
2,770,929 UART: [afmc] CDI.KEYID = 6
2,771,291 UART: [afmc] SUBJECT.KEYID = 7
2,771,716 UART: [afmc] AUTHORITY.KEYID = 5
2,807,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,696 UART: [afmc] --
2,850,594 UART: [cold-reset] --
2,851,542 UART: [state] Locking Datavault
2,852,533 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,137 UART: [state] Locking ICCM
2,853,639 UART: [exit] Launching FMC @ 0x40000130
2,858,968 UART:
2,858,984 UART: Running Caliptra FMC ...
2,859,392 UART:
2,859,446 UART: [state] CFI Enabled
2,870,343 UART: [fht] FMC Alias Private Key: 7
2,977,248 UART: [art] Extend RT PCRs Done
2,977,676 UART: [art] Lock RT PCRs Done
2,979,188 UART: [art] Populate DV Done
2,987,369 UART: [fht] FMC Alias Private Key: 7
2,988,371 UART: [art] Derive CDI
2,988,651 UART: [art] Store in in slot 0x4
3,074,142 UART: [art] Derive Key Pair
3,074,502 UART: [art] Store priv key in slot 0x5
3,088,122 UART: [art] Derive Key Pair - Done
3,102,683 UART: [art] Signing Cert with AUTHO
3,103,163 UART: RITY.KEYID = 7
3,118,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,100 UART: [art] PUB.X = A620E37ED8273D8C3D849DD3335DA6C4AD691B142A754B08266178CDDD330B107345A06914C4AEC9A5DABE8F09B8197C
3,125,869 UART: [art] PUB.Y = 28CFFB0A7B929945E83A027F0CF4D449D74F3C4DC961523052E7BF8C0210ECCFA2A4D8D598CC6554F776EF8F0E54778F
3,132,816 UART: [art] SIG.R = C8A926637D41AB38583CB8CCFEEA600B981C592CDBFF7068D4EE5FC18AAB1A8608FB2C09FE34E3308A7D4EF29DA89EA6
3,139,601 UART: [art] SIG.S = 7101CF4D233630491741E03B7F58FAB6458D2AF0E8FDC1878488A65BE194E1E4792FD6B7833F33132ACE1AEE64AF6552
3,163,771 UART: Caliptra RT
3,164,024 UART: [state] CFI Enabled
3,271,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,958 UART: [rt]cmd =0x49444543, len=327
3,312,536 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,449 ready_for_fw is high
1,060,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,374 >>> mbox cmd response: success
2,626,374 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,688,230 UART:
2,688,246 UART: Running Caliptra FMC ...
2,688,654 UART:
2,688,708 UART: [state] CFI Enabled
2,699,399 UART: [fht] FMC Alias Private Key: 7
2,807,500 UART: [art] Extend RT PCRs Done
2,807,928 UART: [art] Lock RT PCRs Done
2,809,280 UART: [art] Populate DV Done
2,817,417 UART: [fht] FMC Alias Private Key: 7
2,818,433 UART: [art] Derive CDI
2,818,713 UART: [art] Store in in slot 0x4
2,904,456 UART: [art] Derive Key Pair
2,904,816 UART: [art] Store priv key in slot 0x5
2,918,032 UART: [art] Derive Key Pair - Done
2,932,761 UART: [art] Signing Cert with AUTHO
2,933,241 UART: RITY.KEYID = 7
2,948,651 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,416 UART: [art] PUB.X = DA5B3309EFC0A83D877076EA90659FD63736D582A02041102209F9B9BFB0C03C39406C7A464C1011191184AB88D285BC
2,956,176 UART: [art] PUB.Y = 1804DCE14163E402C7F1797D0BE7472A09CF8BD69455F7F85CB90796DF219CE19AD116356C6F9D178E504D53027A5CBE
2,963,112 UART: [art] SIG.R = FCB1B6E79CDD5A2F347E3F34340FB89FE517B8E5E6DA342B93BCCB1142130D1F0E8D9DE9A8F1C97BF4268A46DA161B9F
2,969,895 UART: [art] SIG.S = E1FA59422F294325A9A36E5494BD4F78BA33799E1FFA75E6672E56F8112F5119763C2FB55DD1A3F1B12C81EA542FF510
2,993,350 UART: Caliptra RT
2,993,603 UART: [state] CFI Enabled
3,101,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,126 UART: [rt]cmd =0x49444543, len=327
3,142,517 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,007 UART: [kat] SHA2-512-ACC
908,908 UART: [kat] ECC-384
918,839 UART: [kat] HMAC-384Kdf
923,595 UART: [kat] LMS
1,171,923 UART: [kat] --
1,172,700 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,859 UART: [idev] ++
1,176,027 UART: [idev] CDI.KEYID = 6
1,176,387 UART: [idev] SUBJECT.KEYID = 7
1,176,811 UART: [idev] UDS.KEYID = 0
1,177,156 ready_for_fw is high
1,177,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,113 UART: [idev] Erasing UDS.KEYID = 0
1,202,328 UART: [idev] Sha1 KeyId Algorithm
1,210,858 UART: [idev] --
1,211,888 UART: [ldev] ++
1,212,056 UART: [ldev] CDI.KEYID = 6
1,212,419 UART: [ldev] SUBJECT.KEYID = 5
1,212,845 UART: [ldev] AUTHORITY.KEYID = 7
1,213,308 UART: [ldev] FE.KEYID = 1
1,218,976 UART: [ldev] Erasing FE.KEYID = 1
1,245,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,442 UART: [ldev] --
1,284,855 UART: [fwproc] Wait for Commands...
1,285,437 UART: [fwproc] Recv command 0x46574c44
1,286,165 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,206 >>> mbox cmd response: success
2,774,206 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,775,408 UART: [afmc] ++
2,775,576 UART: [afmc] CDI.KEYID = 6
2,775,938 UART: [afmc] SUBJECT.KEYID = 7
2,776,363 UART: [afmc] AUTHORITY.KEYID = 5
2,812,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,815 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,975 UART: [afmc] --
2,856,091 UART: [cold-reset] --
2,856,837 UART: [state] Locking Datavault
2,858,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,680 UART: [state] Locking ICCM
2,859,184 UART: [exit] Launching FMC @ 0x40000130
2,864,513 UART:
2,864,529 UART: Running Caliptra FMC ...
2,864,937 UART:
2,865,080 UART: [state] CFI Enabled
2,875,527 UART: [fht] FMC Alias Private Key: 7
2,983,088 UART: [art] Extend RT PCRs Done
2,983,516 UART: [art] Lock RT PCRs Done
2,985,054 UART: [art] Populate DV Done
2,993,339 UART: [fht] FMC Alias Private Key: 7
2,994,387 UART: [art] Derive CDI
2,994,667 UART: [art] Store in in slot 0x4
3,080,410 UART: [art] Derive Key Pair
3,080,770 UART: [art] Store priv key in slot 0x5
3,093,856 UART: [art] Derive Key Pair - Done
3,108,562 UART: [art] Signing Cert with AUTHO
3,109,042 UART: RITY.KEYID = 7
3,124,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,317 UART: [art] PUB.X = 994920D0CE1D1286507AEAF29403693AE8E0B0E8E5DDD9C528E8935195B714B632CD4A3FDB4D0E5D22491B78C459F7AF
3,132,089 UART: [art] PUB.Y = 196A6E8245CAC76CDB809669A69FC39415E0946D9E182C782C154606450FA72668F2B6760FB14711BD458F1BEDBC22BC
3,139,032 UART: [art] SIG.R = C75DEAC70B491588A6E58A02A98F6F861F6D269320D2226B31291FF348DFF26E505AB0FB1ECAF7CA70980DA97F4EE4D9
3,145,807 UART: [art] SIG.S = 1F8C4163A0F4AD9E8269933258FF64C8404BBC135EFF7C962B14E20A093B67C703162C9FA7A91B94A284805155D0BCE0
3,170,337 UART: Caliptra RT
3,170,682 UART: [state] CFI Enabled
3,278,571 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,164 UART: [rt]cmd =0x49444543, len=327
3,319,456 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,604 ready_for_fw is high
1,061,604 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,935 >>> mbox cmd response: success
2,624,935 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,687,345 UART:
2,687,361 UART: Running Caliptra FMC ...
2,687,769 UART:
2,687,912 UART: [state] CFI Enabled
2,698,845 UART: [fht] FMC Alias Private Key: 7
2,807,310 UART: [art] Extend RT PCRs Done
2,807,738 UART: [art] Lock RT PCRs Done
2,809,132 UART: [art] Populate DV Done
2,817,191 UART: [fht] FMC Alias Private Key: 7
2,818,271 UART: [art] Derive CDI
2,818,551 UART: [art] Store in in slot 0x4
2,903,960 UART: [art] Derive Key Pair
2,904,320 UART: [art] Store priv key in slot 0x5
2,917,408 UART: [art] Derive Key Pair - Done
2,931,750 UART: [art] Signing Cert with AUTHO
2,932,230 UART: RITY.KEYID = 7
2,946,924 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,689 UART: [art] PUB.X = A3C0D1851F4DA5FA2817AF9BC67712948DE7E99472D074F383845FBE83F3E0E5CA6038950AC35B7A4E462332948ABD92
2,954,460 UART: [art] PUB.Y = 12EB8B1B2A7E4C16CDC42E33AEE1B479941AE3A60949FB2E9310F5E3F63837A2E35837D9AA5FFA69C27CAC4C9BF3F876
2,961,425 UART: [art] SIG.R = 795EDD1849C20E0EDCF0F6BE696799B58DF249011A7F342EF52A9DF81BFAC5906F9B11F561F965665259F0554ECEEDDB
2,968,200 UART: [art] SIG.S = B6D202DAE286EDCB9E198E48925D7EFCDAFBEF4C3EBBE2CE9A2A266687C127C10C304C237A4AF743E4327F0DAA966A8E
2,991,800 UART: Caliptra RT
2,992,145 UART: [state] CFI Enabled
3,099,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,923 UART: [rt]cmd =0x49444543, len=327
3,140,457 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
921,036 UART: [kat] LMS
1,169,348 UART: [kat] --
1,170,025 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,093 UART: [idev] ++
1,173,261 UART: [idev] CDI.KEYID = 6
1,173,622 UART: [idev] SUBJECT.KEYID = 7
1,174,047 UART: [idev] UDS.KEYID = 0
1,174,393 ready_for_fw is high
1,174,393 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,821 UART: [idev] Erasing UDS.KEYID = 0
1,198,901 UART: [idev] Sha1 KeyId Algorithm
1,207,749 UART: [idev] --
1,208,686 UART: [ldev] ++
1,208,854 UART: [ldev] CDI.KEYID = 6
1,209,218 UART: [ldev] SUBJECT.KEYID = 5
1,209,645 UART: [ldev] AUTHORITY.KEYID = 7
1,210,108 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,358 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,491 UART: [fwproc] Recv command 0x46574c44
1,282,224 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,686 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,671 >>> mbox cmd response: success
2,770,671 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,771,848 UART: [afmc] ++
2,772,016 UART: [afmc] CDI.KEYID = 6
2,772,379 UART: [afmc] SUBJECT.KEYID = 7
2,772,805 UART: [afmc] AUTHORITY.KEYID = 5
2,807,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,417 UART: [afmc] --
2,851,447 UART: [cold-reset] --
2,852,165 UART: [state] Locking Datavault
2,853,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,044 UART: [state] Locking ICCM
2,854,528 UART: [exit] Launching FMC @ 0x40000130
2,859,857 UART:
2,859,873 UART: Running Caliptra FMC ...
2,860,281 UART:
2,860,335 UART: [state] CFI Enabled
2,870,976 UART: [fht] FMC Alias Private Key: 7
2,978,539 UART: [art] Extend RT PCRs Done
2,978,967 UART: [art] Lock RT PCRs Done
2,980,557 UART: [art] Populate DV Done
2,988,940 UART: [fht] FMC Alias Private Key: 7
2,990,116 UART: [art] Derive CDI
2,990,396 UART: [art] Store in in slot 0x4
3,076,277 UART: [art] Derive Key Pair
3,076,637 UART: [art] Store priv key in slot 0x5
3,089,917 UART: [art] Derive Key Pair - Done
3,104,705 UART: [art] Signing Cert with AUTHO
3,105,185 UART: RITY.KEYID = 7
3,120,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,380 UART: [art] PUB.X = 42E8C089617EA69B589588112FA3FC92CCD74F7E9F9146CDC0C5463FFB1E68FCBD24F5245E45C116D1D56116A25EFF02
3,128,157 UART: [art] PUB.Y = 9D205811AF10495C2E323610CE0AB869F179607C6B7E15D3CC72B5E31DED844326CE63A09C307B3F5A0C9F08AF715BF3
3,135,104 UART: [art] SIG.R = 08CED29D5D4217579F021EE53BBC11574B730362A45C8F5EC9D6F9F438CDA3354B02D01320F862A782BAC3CD29333CE2
3,141,868 UART: [art] SIG.S = 38AF7283E9198395114C3CC0178812797A96445FDA18245113F11732E6E78777A00692DB726363B3EB0B54FA66AF59B4
3,165,313 UART: Caliptra RT
3,165,566 UART: [state] CFI Enabled
3,273,335 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,290 UART: [rt]cmd =0x49444543, len=327
3,314,866 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,650 ready_for_fw is high
1,055,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,651 >>> mbox cmd response: success
2,621,651 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,683,323 UART:
2,683,339 UART: Running Caliptra FMC ...
2,683,747 UART:
2,683,801 UART: [state] CFI Enabled
2,694,098 UART: [fht] FMC Alias Private Key: 7
2,801,687 UART: [art] Extend RT PCRs Done
2,802,115 UART: [art] Lock RT PCRs Done
2,803,613 UART: [art] Populate DV Done
2,811,682 UART: [fht] FMC Alias Private Key: 7
2,812,666 UART: [art] Derive CDI
2,812,946 UART: [art] Store in in slot 0x4
2,898,801 UART: [art] Derive Key Pair
2,899,161 UART: [art] Store priv key in slot 0x5
2,912,463 UART: [art] Derive Key Pair - Done
2,927,426 UART: [art] Signing Cert with AUTHO
2,927,906 UART: RITY.KEYID = 7
2,943,284 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,049 UART: [art] PUB.X = FF4F9BE2A213CAD01EFC19DBAE09FA59B782E8D63E3C2CBE2F7451CE9D9A612E7C31AF340BCACDBDF3580AAE4809B815
2,950,839 UART: [art] PUB.Y = 6C251BD5E8D23F71C83E407B9912DF2DCC049FA7E13D4A5BFD907D9EFC5DD055F5637DF9AB9823254C6CA13F763A70CA
2,957,804 UART: [art] SIG.R = 76AE0AA2249E8C9E79AB210F0FA7567D8B8902F80E707B7298D8BED5C25B1BF656AB1048B924D58642FAB0ECDB9EB49C
2,964,575 UART: [art] SIG.S = B41F04D4565B840855FF844C98A0A128030AC54DA178A1DAFA0E36F38812C4F1A92BAE07E2275028A21B92D64F6FA74F
2,987,770 UART: Caliptra RT
2,988,023 UART: [state] CFI Enabled
3,095,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,011 UART: [rt]cmd =0x49444543, len=327
3,136,582 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 ready_for_fw is high
1,174,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,412 UART: [idev] Sha1 KeyId Algorithm
1,207,186 UART: [idev] --
1,208,267 UART: [ldev] ++
1,208,435 UART: [ldev] CDI.KEYID = 6
1,208,799 UART: [ldev] SUBJECT.KEYID = 5
1,209,226 UART: [ldev] AUTHORITY.KEYID = 7
1,209,689 UART: [ldev] FE.KEYID = 1
1,215,025 UART: [ldev] Erasing FE.KEYID = 1
1,241,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,219 UART: [ldev] --
1,280,557 UART: [fwproc] Wait for Commands...
1,281,192 UART: [fwproc] Recv command 0x46574c44
1,281,925 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,270 >>> mbox cmd response: success
2,769,270 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,770,521 UART: [afmc] ++
2,770,689 UART: [afmc] CDI.KEYID = 6
2,771,052 UART: [afmc] SUBJECT.KEYID = 7
2,771,478 UART: [afmc] AUTHORITY.KEYID = 5
2,807,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,592 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,204 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,923 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,990 UART: [afmc] --
2,850,920 UART: [cold-reset] --
2,851,872 UART: [state] Locking Datavault
2,853,115 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,719 UART: [state] Locking ICCM
2,854,145 UART: [exit] Launching FMC @ 0x40000130
2,859,474 UART:
2,859,490 UART: Running Caliptra FMC ...
2,859,898 UART:
2,860,041 UART: [state] CFI Enabled
2,870,830 UART: [fht] FMC Alias Private Key: 7
2,979,773 UART: [art] Extend RT PCRs Done
2,980,201 UART: [art] Lock RT PCRs Done
2,981,575 UART: [art] Populate DV Done
2,989,704 UART: [fht] FMC Alias Private Key: 7
2,990,676 UART: [art] Derive CDI
2,990,956 UART: [art] Store in in slot 0x4
3,077,027 UART: [art] Derive Key Pair
3,077,387 UART: [art] Store priv key in slot 0x5
3,090,389 UART: [art] Derive Key Pair - Done
3,105,125 UART: [art] Signing Cert with AUTHO
3,105,605 UART: RITY.KEYID = 7
3,120,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,666 UART: [art] PUB.X = 5D7B2A4AE557D17BBDD4430803D01AC839580118FD9FC6D80A2B37BA193AA453AD8E7C800B5CA1D4EEA5F2D873067827
3,128,430 UART: [art] PUB.Y = F948014B30F9B828EFA6E935114F04C8828B06FC7413A12BC819B9E9B6DC2FADA46C60D37A7342EA790C9B5AF75BE252
3,135,378 UART: [art] SIG.R = 7BDF03863E79BBBBC7D801FD34BD32134993D5636E45CD8CDA3E052207D8889DEE9F7138B77F40E410CB16FFAD6A12CA
3,142,152 UART: [art] SIG.S = 008F936716CAC0EFB9800486E083EFB792452A4EF6418C243D2606C5243C22C75A15BB63DE191EE9361169A2D36E1197
3,166,385 UART: Caliptra RT
3,166,730 UART: [state] CFI Enabled
3,274,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,213 UART: [rt]cmd =0x49444543, len=327
3,315,512 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,407 ready_for_fw is high
1,056,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,644 >>> mbox cmd response: success
2,622,644 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,684,066 UART:
2,684,082 UART: Running Caliptra FMC ...
2,684,490 UART:
2,684,633 UART: [state] CFI Enabled
2,695,348 UART: [fht] FMC Alias Private Key: 7
2,803,897 UART: [art] Extend RT PCRs Done
2,804,325 UART: [art] Lock RT PCRs Done
2,805,865 UART: [art] Populate DV Done
2,814,328 UART: [fht] FMC Alias Private Key: 7
2,815,280 UART: [art] Derive CDI
2,815,560 UART: [art] Store in in slot 0x4
2,901,469 UART: [art] Derive Key Pair
2,901,829 UART: [art] Store priv key in slot 0x5
2,914,931 UART: [art] Derive Key Pair - Done
2,929,510 UART: [art] Signing Cert with AUTHO
2,929,990 UART: RITY.KEYID = 7
2,945,314 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,079 UART: [art] PUB.X = 18F382E1E1AC30C91B5216ED575A3F93E5E7A1B52B5F45E4C9D122DC196DA6D4C8FA99466B1EF388D5050FC74D143283
2,952,851 UART: [art] PUB.Y = 53CAEDD983E76629A60D407D349E88389B95F2B62C10B50CB7C7D64BD9459440FED606BBA938AC852651DF3B20BF7C1D
2,959,802 UART: [art] SIG.R = 14659A4F87FEF854D72861C0BD831878642DA075C8B78EE65ED3C4201C4FA6A0802EAE09B341C27796C877BD95DCE106
2,966,570 UART: [art] SIG.S = 093E76E389C0455898360E1AE50928F05B6E36C256EEA90ECE7F5BF89C588747BFD7B41CFB062835C2DCDC22F82C0381
2,989,859 UART: Caliptra RT
2,990,204 UART: [state] CFI Enabled
3,097,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,316 UART: [rt]cmd =0x49444543, len=327
3,138,772 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,115 UART:
192,471 UART: Running Caliptra ROM ...
193,610 UART:
193,752 UART: [state] CFI Enabled
265,532 UART: [state] LifecycleState = Unprovisioned
267,527 UART: [state] DebugLocked = No
269,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,063 UART: [kat] SHA2-256
443,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,290 UART: [kat] ++
454,731 UART: [kat] sha1
465,196 UART: [kat] SHA2-256
467,882 UART: [kat] SHA2-384
473,795 UART: [kat] SHA2-512-ACC
476,153 UART: [kat] ECC-384
2,765,911 UART: [kat] HMAC-384Kdf
2,779,351 UART: [kat] LMS
3,969,634 UART: [kat] --
3,973,725 UART: [cold-reset] ++
3,975,947 UART: [fht] Storing FHT @ 0x50003400
3,988,669 UART: [idev] ++
3,989,274 UART: [idev] CDI.KEYID = 6
3,990,185 UART: [idev] SUBJECT.KEYID = 7
3,991,425 UART: [idev] UDS.KEYID = 0
3,992,483 ready_for_fw is high
3,992,679 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,703 UART: [idev] Erasing UDS.KEYID = 0
7,324,597 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,937 UART: [idev] --
7,348,140 UART: [ldev] ++
7,348,715 UART: [ldev] CDI.KEYID = 6
7,349,673 UART: [ldev] SUBJECT.KEYID = 5
7,350,877 UART: [ldev] AUTHORITY.KEYID = 7
7,352,151 UART: [ldev] FE.KEYID = 1
7,379,751 UART: [ldev] Erasing FE.KEYID = 1
10,715,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,050 UART: [ldev] --
13,094,526 UART: [fwproc] Waiting for Commands...
13,096,515 UART: [fwproc] Received command 0x46574c44
13,098,692 UART: [fwproc] Received Image of size 113844 bytes
17,148,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,571 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,605,604 >>> mbox cmd response: success
17,606,120 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,610,625 UART: [afmc] ++
17,611,208 UART: [afmc] CDI.KEYID = 6
17,612,122 UART: [afmc] SUBJECT.KEYID = 7
17,613,407 UART: [afmc] AUTHORITY.KEYID = 5
20,983,099 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,403 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,713 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,062 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,939 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,374 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,101 UART: [afmc] --
23,355,819 UART: [cold-reset] --
23,360,338 UART: [state] Locking Datavault
23,366,013 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,707 UART: [state] Locking ICCM
23,369,528 UART: [exit] Launching FMC @ 0x40000130
23,377,921 UART:
23,378,151 UART: Running Caliptra FMC ...
23,379,243 UART:
23,379,415 UART: [state] CFI Enabled
23,444,604 UART: [fht] FMC Alias Private Key: 7
25,782,667 UART: [art] Extend RT PCRs Done
25,783,885 UART: [art] Lock RT PCRs Done
25,785,936 UART: [art] Populate DV Done
25,791,610 UART: [fht] FMC Alias Private Key: 7
25,793,192 UART: [art] Derive CDI
25,793,999 UART: [art] Store in in slot 0x4
25,853,934 UART: [art] Derive Key Pair
25,854,994 UART: [art] Store priv key in slot 0x5
29,148,063 UART: [art] Derive Key Pair - Done
29,161,274 UART: [art] Signing Cert with AUTHO
29,162,574 UART: RITY.KEYID = 7
31,449,659 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,162 UART: [art] PUB.X = 586310967B8F1081148850932EA202260578D5EAAE9EBD8DB203C90F1E5EB8EEAB96BE5C7754D981FFC1876762B98210
31,458,397 UART: [art] PUB.Y = 4664A023B937549B3D7DAF0577899080E8FD8134F08B1B85645C5684608B0B49166ABE72A2FD5F53D358A7ED7FA2D53A
31,465,667 UART: [art] SIG.R = DF0D7A6826743692FE0AB04F35A907FA6E684C172CC8B47B2F16F11C5A20AC62D8FAD9597096E392DE4338A6114CA883
31,473,047 UART: [art] SIG.S = A4A5D58B6390CDB886653F0276947109FA965E87BCCC717DE3EB05E62E6610658851DB2F9352D614FA4872F3BB0B432C
32,777,700 UART: Caliptra RT
32,778,411 UART: [state] CFI Enabled
32,940,941 UART: [rt] RT listening for mailbox commands...
32,972,061 UART: [rt]cmd =0x4c444556, len=4
32,983,256 >>> mbox cmd response data (687 bytes)
33,024,840 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,054,718 UART: [rt]cmd =0x49444549, len=4
33,057,521 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,784,932 ready_for_fw is high
3,785,299 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,828,717 >>> mbox cmd response: success
17,829,499 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,523,214 UART:
23,523,594 UART: Running Caliptra FMC ...
23,524,796 UART:
23,524,962 UART: [state] CFI Enabled
23,591,684 UART: [fht] FMC Alias Private Key: 7
25,929,502 UART: [art] Extend RT PCRs Done
25,930,752 UART: [art] Lock RT PCRs Done
25,932,676 UART: [art] Populate DV Done
25,937,891 UART: [fht] FMC Alias Private Key: 7
25,939,539 UART: [art] Derive CDI
25,940,348 UART: [art] Store in in slot 0x4
25,999,739 UART: [art] Derive Key Pair
26,000,780 UART: [art] Store priv key in slot 0x5
29,293,018 UART: [art] Derive Key Pair - Done
29,305,973 UART: [art] Signing Cert with AUTHO
29,307,277 UART: RITY.KEYID = 7
31,593,189 UART: [art] Erasing AUTHORITY.KEYID = 7
31,594,697 UART: [art] PUB.X = 7403A15A45B2616C9F978FD71B49C7A2BE8E25883D321A30C12BC0DFFA3C2C799F5745F2AD81F82C793D22A6D3037E87
31,601,941 UART: [art] PUB.Y = 0F209F5B80D345E32D2C2E2E834755361E260C50C0B869CC22EDD9CFE27D92908A2EEAC19F838F0D98AFB91A28DFA588
31,609,164 UART: [art] SIG.R = 43D8F752D6B4B6214DA3E271D79CB920F043E9D181F2A64ABDCEFCFA3446F2370358024C13473250AE6739E5739CC354
31,616,554 UART: [art] SIG.S = 9435261F0348164AC869CEBAFBE88D81DCE31BF2141A52FD187900383E8BF389C071AAAB3277A6F51AF17D2E48EC7B2F
32,921,252 UART: Caliptra RT
32,921,964 UART: [state] CFI Enabled
33,083,118 UART: [rt] RT listening for mailbox commands...
33,114,768 UART: [rt]cmd =0x4c444556, len=4
33,125,687 >>> mbox cmd response data (687 bytes)
33,167,257 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,197,257 UART: [rt]cmd =0x49444549, len=4
33,199,998 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,236 writing to cptra_bootfsm_go
193,592 UART:
193,952 UART: Running Caliptra ROM ...
195,062 UART:
604,787 UART: [state] CFI Enabled
616,907 UART: [state] LifecycleState = Unprovisioned
618,782 UART: [state] DebugLocked = No
621,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,298 UART: [kat] SHA2-256
795,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,625 UART: [kat] ++
806,073 UART: [kat] sha1
817,023 UART: [kat] SHA2-256
819,758 UART: [kat] SHA2-384
824,547 UART: [kat] SHA2-512-ACC
826,932 UART: [kat] ECC-384
3,110,129 UART: [kat] HMAC-384Kdf
3,120,387 UART: [kat] LMS
4,310,485 UART: [kat] --
4,313,703 UART: [cold-reset] ++
4,314,783 UART: [fht] Storing FHT @ 0x50003400
4,326,138 UART: [idev] ++
4,326,742 UART: [idev] CDI.KEYID = 6
4,327,677 UART: [idev] SUBJECT.KEYID = 7
4,328,865 UART: [idev] UDS.KEYID = 0
4,329,937 ready_for_fw is high
4,330,155 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,473,108 UART: [idev] Erasing UDS.KEYID = 0
7,613,519 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,892 UART: [idev] --
7,641,699 UART: [ldev] ++
7,642,295 UART: [ldev] CDI.KEYID = 6
7,643,259 UART: [ldev] SUBJECT.KEYID = 5
7,644,419 UART: [ldev] AUTHORITY.KEYID = 7
7,645,708 UART: [ldev] FE.KEYID = 1
7,657,707 UART: [ldev] Erasing FE.KEYID = 1
10,940,452 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,809 UART: [ldev] --
13,305,405 UART: [fwproc] Waiting for Commands...
13,307,506 UART: [fwproc] Received command 0x46574c44
13,309,688 UART: [fwproc] Received Image of size 113844 bytes
17,359,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,434,668 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,819,692 >>> mbox cmd response: success
17,820,199 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,823,789 UART: [afmc] ++
17,824,370 UART: [afmc] CDI.KEYID = 6
17,825,394 UART: [afmc] SUBJECT.KEYID = 7
17,826,560 UART: [afmc] AUTHORITY.KEYID = 5
21,139,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,432,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,434,559 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,961 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,733 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,478,216 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,377 UART: [afmc] --
23,503,298 UART: [cold-reset] --
23,508,617 UART: [state] Locking Datavault
23,515,287 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,986 UART: [state] Locking ICCM
23,519,004 UART: [exit] Launching FMC @ 0x40000130
23,527,363 UART:
23,527,639 UART: Running Caliptra FMC ...
23,528,751 UART:
23,528,910 UART: [state] CFI Enabled
23,536,958 UART: [fht] FMC Alias Private Key: 7
25,867,143 UART: [art] Extend RT PCRs Done
25,868,361 UART: [art] Lock RT PCRs Done
25,870,042 UART: [art] Populate DV Done
25,875,667 UART: [fht] FMC Alias Private Key: 7
25,877,371 UART: [art] Derive CDI
25,878,182 UART: [art] Store in in slot 0x4
25,920,828 UART: [art] Derive Key Pair
25,922,021 UART: [art] Store priv key in slot 0x5
29,163,907 UART: [art] Derive Key Pair - Done
29,176,687 UART: [art] Signing Cert with AUTHO
29,177,995 UART: RITY.KEYID = 7
31,457,199 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,715 UART: [art] PUB.X = 2ED2775B79E573D471991F0A8316F556376C9DAAA1011140E30EF701BA5C50C535BD3E6C27495BCDE4C19E89E812ACB4
31,465,933 UART: [art] PUB.Y = 1FD9D0023A4EA9ACC543E309EBF056D934460F335E94D3F16E42837CA546E0B18DAABD349754ACBFEE02233CD574FAC9
31,473,198 UART: [art] SIG.R = ED7B4A1DE1F97A99CEE0839766DAC8452CC59835B641A57879AAA25AE3EB499CA544DA7D1EB687FB516B8F46D5F8D858
31,480,591 UART: [art] SIG.S = 1C6EDED2F67C66695DBCEEAB6092187467C5167F411D6D75A9D8FD161CE7F41584A0C2A2BBAA539C20D4B9332FD8748B
32,786,097 UART: Caliptra RT
32,786,819 UART: [state] CFI Enabled
32,903,576 UART: [rt] RT listening for mailbox commands...
32,934,725 UART: [rt]cmd =0x4c444556, len=4
32,945,759 >>> mbox cmd response data (687 bytes)
32,987,798 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,017,583 UART: [rt]cmd =0x49444549, len=4
33,020,446 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,130,637 ready_for_fw is high
4,131,052 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,078,305 >>> mbox cmd response: success
18,079,260 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,721,432 UART:
23,721,829 UART: Running Caliptra FMC ...
23,722,946 UART:
23,723,097 UART: [state] CFI Enabled
23,731,002 UART: [fht] FMC Alias Private Key: 7
26,061,542 UART: [art] Extend RT PCRs Done
26,062,770 UART: [art] Lock RT PCRs Done
26,064,160 UART: [art] Populate DV Done
26,069,682 UART: [fht] FMC Alias Private Key: 7
26,071,222 UART: [art] Derive CDI
26,071,961 UART: [art] Store in in slot 0x4
26,114,610 UART: [art] Derive Key Pair
26,115,651 UART: [art] Store priv key in slot 0x5
29,357,758 UART: [art] Derive Key Pair - Done
29,370,600 UART: [art] Signing Cert with AUTHO
29,371,959 UART: RITY.KEYID = 7
31,651,075 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,581 UART: [art] PUB.X = 40807FF905688447DEF542DE5397743A90D141899847A52B283BAF387CB9BE5ED0A529064360B6846CB9F355797B1157
31,659,789 UART: [art] PUB.Y = 6B922B40B84BCBFE62415A7E84FEF627F546D0ACCA4FF27DC9E612C7EACE96A183B0B3DA28EBA700255ECAB4FE916674
31,667,036 UART: [art] SIG.R = F12BA29BDDFE1934F7BB0ADBF59C605EFAAA3D15E8930F2FE83B25936D83DAE8241505D5A76989EE89759ED69C2411F2
31,674,487 UART: [art] SIG.S = 154EC8CD0F7940FDAE27381381C735FC0EB1FCB52F55A8182719B8C6E1169EFEC917BFC90CC3C71EB333C9DF45007E17
32,979,373 UART: Caliptra RT
32,980,088 UART: [state] CFI Enabled
33,097,589 UART: [rt] RT listening for mailbox commands...
33,128,999 UART: [rt]cmd =0x4c444556, len=4
33,140,164 >>> mbox cmd response data (687 bytes)
33,181,761 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,211,765 UART: [rt]cmd =0x49444549, len=4
33,214,542 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,224 UART:
192,576 UART: Running Caliptra ROM ...
193,787 UART:
193,942 UART: [state] CFI Enabled
263,684 UART: [state] LifecycleState = Unprovisioned
265,595 UART: [state] DebugLocked = No
267,484 UART: [state] WD Timer not started. Device not locked for debugging
270,613 UART: [kat] SHA2-256
449,744 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,357 UART: [kat] ++
461,890 UART: [kat] sha1
471,207 UART: [kat] SHA2-256
474,281 UART: [kat] SHA2-384
480,053 UART: [kat] SHA2-512-ACC
483,019 UART: [kat] ECC-384
2,926,033 UART: [kat] HMAC-384Kdf
2,950,574 UART: [kat] LMS
3,480,053 UART: [kat] --
3,485,342 UART: [cold-reset] ++
3,487,848 UART: [fht] FHT @ 0x50003400
3,498,628 UART: [idev] ++
3,499,241 UART: [idev] CDI.KEYID = 6
3,500,173 UART: [idev] SUBJECT.KEYID = 7
3,501,350 UART: [idev] UDS.KEYID = 0
3,502,279 ready_for_fw is high
3,502,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,645,915 UART: [idev] Erasing UDS.KEYID = 0
6,004,357 UART: [idev] Sha1 KeyId Algorithm
6,027,049 UART: [idev] --
6,029,859 UART: [ldev] ++
6,030,453 UART: [ldev] CDI.KEYID = 6
6,031,371 UART: [ldev] SUBJECT.KEYID = 5
6,032,537 UART: [ldev] AUTHORITY.KEYID = 7
6,033,776 UART: [ldev] FE.KEYID = 1
6,078,835 UART: [ldev] Erasing FE.KEYID = 1
8,580,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,282 UART: [ldev] --
10,391,964 UART: [fwproc] Wait for Commands...
10,394,168 UART: [fwproc] Recv command 0x46574c44
10,396,259 UART: [fwproc] Recv'd Img size: 114168 bytes
13,793,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,862,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,931,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,248,387 >>> mbox cmd response: success
14,248,909 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,253,197 UART: [afmc] ++
14,253,784 UART: [afmc] CDI.KEYID = 6
14,254,696 UART: [afmc] SUBJECT.KEYID = 7
14,255,856 UART: [afmc] AUTHORITY.KEYID = 5
16,785,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,509,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,511,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,526,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,542,844 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,558,691 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,580,659 UART: [afmc] --
18,584,687 UART: [cold-reset] --
18,586,708 UART: [state] Locking Datavault
18,592,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,594,481 UART: [state] Locking ICCM
18,596,202 UART: [exit] Launching FMC @ 0x40000130
18,604,658 UART:
18,604,893 UART: Running Caliptra FMC ...
18,605,988 UART:
18,606,148 UART: [state] CFI Enabled
18,668,258 UART: [fht] FMC Alias Private Key: 7
20,431,842 UART: [art] Extend RT PCRs Done
20,433,064 UART: [art] Lock RT PCRs Done
20,434,627 UART: [art] Populate DV Done
20,440,203 UART: [fht] FMC Alias Private Key: 7
20,441,900 UART: [art] Derive CDI
20,442,634 UART: [art] Store in in slot 0x4
20,500,776 UART: [art] Derive Key Pair
20,501,816 UART: [art] Store priv key in slot 0x5
22,965,326 UART: [art] Derive Key Pair - Done
22,977,612 UART: [art] Signing Cert with AUTHO
22,978,911 UART: RITY.KEYID = 7
24,690,337 UART: [art] Erasing AUTHORITY.KEYID = 7
24,691,839 UART: [art] PUB.X = C0F3F74363F5E7A4F56E96CDA5D8864FB055B7C1AC5E369DA6A1BB33B7D33CC4F1C0D67F09C48098683C6BB322C2DB2A
24,699,119 UART: [art] PUB.Y = 0299D3CC0A315C98BAB06D86BE7C1F7292C47FC6F697A66719943208B2FB19520B8A6A8D865E67063106D89AAC3983B3
24,706,336 UART: [art] SIG.R = E54B18CA720DA0CBFE7CB2A81B0DFC92E91B02B713B8E38D7E0BBF7C3031AB22B7B7800AA74AFE14CAA309C9C0AD3817
24,713,753 UART: [art] SIG.S = DC2D7CFFFEE8F5B562FFF131815DF63CE0EECF265BFDA95C8F9B5179F0739BCDCC32E96407A2FBB1F74B0FF91B6C8EA5
25,693,130 UART: Caliptra RT
25,693,833 UART: [state] CFI Enabled
25,857,743 UART: [rt] RT listening for mailbox commands...
25,889,210 UART: [rt]cmd =0x4c444556, len=4
25,900,338 >>> mbox cmd response data (687 bytes)
25,941,630 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,971,914 UART: [rt]cmd =0x49444549, len=4
25,974,561 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,359,393 ready_for_fw is high
3,359,780 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,064,372 >>> mbox cmd response: success
14,065,209 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,340,649 UART:
18,341,033 UART: Running Caliptra FMC ...
18,342,140 UART:
18,342,295 UART: [state] CFI Enabled
18,411,451 UART: [fht] FMC Alias Private Key: 7
20,175,566 UART: [art] Extend RT PCRs Done
20,176,788 UART: [art] Lock RT PCRs Done
20,178,092 UART: [art] Populate DV Done
20,183,347 UART: [fht] FMC Alias Private Key: 7
20,184,889 UART: [art] Derive CDI
20,185,622 UART: [art] Store in in slot 0x4
20,244,395 UART: [art] Derive Key Pair
20,245,439 UART: [art] Store priv key in slot 0x5
22,708,439 UART: [art] Derive Key Pair - Done
22,721,057 UART: [art] Signing Cert with AUTHO
22,722,399 UART: RITY.KEYID = 7
24,434,523 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,030 UART: [art] PUB.X = 5CBA66B217D0A361950E8A38E4B50FF6F09E6C5393BA39CC4FB052F408D21D63CC97DF114D18531ABDE9E82F0F3E40A8
24,443,335 UART: [art] PUB.Y = F6E3B3A461C3B0E4EDF4FCFC3B9A4521A539DF505385BA80E06E95ED56B7476DA45603B7936DBEAC4600EFFC1DA20B91
24,450,589 UART: [art] SIG.R = 05D23D4689D4D8CB5628BBB45515AB7AC0199BB81A3FCD02D0AF26048F73F1AFF3749CDE15EAF0AEE46D5D1F8918401D
24,458,033 UART: [art] SIG.S = 6F51EB878CFFCE48E5F9F1662EC42128DD1CA1B8F4B1D51319AF8FBF8CA58AAD8E0417C2D8D54ABEE8086EBCD5A6FDF1
25,437,201 UART: Caliptra RT
25,437,903 UART: [state] CFI Enabled
25,603,322 UART: [rt] RT listening for mailbox commands...
25,634,416 UART: [rt]cmd =0x4c444556, len=4
25,645,236 >>> mbox cmd response data (687 bytes)
25,686,388 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,716,220 UART: [rt]cmd =0x49444549, len=4
25,719,032 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,629 writing to cptra_bootfsm_go
194,738 UART:
195,204 UART: Running Caliptra ROM ...
196,352 UART:
605,715 UART: [state] CFI Enabled
622,924 UART: [state] LifecycleState = Unprovisioned
624,797 UART: [state] DebugLocked = No
626,179 UART: [state] WD Timer not started. Device not locked for debugging
630,578 UART: [kat] SHA2-256
809,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
821,233 UART: [kat] ++
821,761 UART: [kat] sha1
832,287 UART: [kat] SHA2-256
835,291 UART: [kat] SHA2-384
842,557 UART: [kat] SHA2-512-ACC
845,494 UART: [kat] ECC-384
3,284,524 UART: [kat] HMAC-384Kdf
3,297,156 UART: [kat] LMS
3,826,663 UART: [kat] --
3,830,656 UART: [cold-reset] ++
3,832,803 UART: [fht] FHT @ 0x50003400
3,845,005 UART: [idev] ++
3,845,613 UART: [idev] CDI.KEYID = 6
3,846,538 UART: [idev] SUBJECT.KEYID = 7
3,847,714 UART: [idev] UDS.KEYID = 0
3,848,640 ready_for_fw is high
3,848,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,144 UART: [idev] Erasing UDS.KEYID = 0
6,320,465 UART: [idev] Sha1 KeyId Algorithm
6,344,330 UART: [idev] --
6,348,016 UART: [ldev] ++
6,348,609 UART: [ldev] CDI.KEYID = 6
6,349,499 UART: [ldev] SUBJECT.KEYID = 5
6,350,748 UART: [ldev] AUTHORITY.KEYID = 7
6,351,930 UART: [ldev] FE.KEYID = 1
6,364,203 UART: [ldev] Erasing FE.KEYID = 1
8,834,962 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,370 UART: [ldev] --
10,626,713 UART: [fwproc] Wait for Commands...
10,629,399 UART: [fwproc] Recv command 0x46574c44
10,631,447 UART: [fwproc] Recv'd Img size: 114168 bytes
14,030,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,649 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,433 >>> mbox cmd response: success
14,487,956 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,492,154 UART: [afmc] ++
14,492,735 UART: [afmc] CDI.KEYID = 6
14,493,615 UART: [afmc] SUBJECT.KEYID = 7
14,494,834 UART: [afmc] AUTHORITY.KEYID = 5
16,994,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,196 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,951 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,833 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,008 UART: [afmc] --
18,787,981 UART: [cold-reset] --
18,792,545 UART: [state] Locking Datavault
18,797,215 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,912 UART: [state] Locking ICCM
18,801,225 UART: [exit] Launching FMC @ 0x40000130
18,809,631 UART:
18,809,886 UART: Running Caliptra FMC ...
18,810,992 UART:
18,811,153 UART: [state] CFI Enabled
18,819,251 UART: [fht] FMC Alias Private Key: 7
20,575,731 UART: [art] Extend RT PCRs Done
20,576,960 UART: [art] Lock RT PCRs Done
20,578,558 UART: [art] Populate DV Done
20,583,804 UART: [fht] FMC Alias Private Key: 7
20,585,283 UART: [art] Derive CDI
20,586,020 UART: [art] Store in in slot 0x4
20,628,664 UART: [art] Derive Key Pair
20,629,659 UART: [art] Store priv key in slot 0x5
23,057,251 UART: [art] Derive Key Pair - Done
23,070,090 UART: [art] Signing Cert with AUTHO
23,071,401 UART: RITY.KEYID = 7
24,776,688 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,184 UART: [art] PUB.X = 9F65B5CE98EF7633770C7DD6FC969663A444B862AC811625C1A7FDD6A0D3D4FBE32E565395161984AA614BC4BD03B315
24,785,489 UART: [art] PUB.Y = 026E9A6926899715E0B24047707F4553288630803F8A8D283CB944E6BA7CB828E9D328320CDA781B84C1B52278CBEC33
24,792,725 UART: [art] SIG.R = BA79114A503CC91F2A21C3EABDC6FFCCA8CC671FE916E8DF8238029AF839A7F120DE928B3B3B1BD21AEFFE68F287BD89
24,800,120 UART: [art] SIG.S = 8D239BD3249132ED6F4EDF8F2713FDD08AE8EAD7CF42B742EB51D3421E1164C9A5D543662E22F30BFE17A751ABC6BCE4
25,779,871 UART: Caliptra RT
25,780,567 UART: [state] CFI Enabled
25,897,459 UART: [rt] RT listening for mailbox commands...
25,929,045 UART: [rt]cmd =0x4c444556, len=4
25,940,073 >>> mbox cmd response data (687 bytes)
25,981,425 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,011,432 UART: [rt]cmd =0x49444549, len=4
26,014,337 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,957 writing to cptra_bootfsm_go
3,696,928 ready_for_fw is high
3,697,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,281,588 >>> mbox cmd response: success
14,282,328 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,531,239 UART:
18,531,631 UART: Running Caliptra FMC ...
18,532,734 UART:
18,532,889 UART: [state] CFI Enabled
18,540,953 UART: [fht] FMC Alias Private Key: 7
20,298,349 UART: [art] Extend RT PCRs Done
20,299,725 UART: [art] Lock RT PCRs Done
20,301,003 UART: [art] Populate DV Done
20,306,373 UART: [fht] FMC Alias Private Key: 7
20,307,973 UART: [art] Derive CDI
20,308,716 UART: [art] Store in in slot 0x4
20,351,036 UART: [art] Derive Key Pair
20,352,045 UART: [art] Store priv key in slot 0x5
22,779,120 UART: [art] Derive Key Pair - Done
22,792,490 UART: [art] Signing Cert with AUTHO
22,793,787 UART: RITY.KEYID = 7
24,499,214 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,713 UART: [art] PUB.X = 822908219E350C72815E0CA137B49BA62DD220811AE923666AF33BD677FC5839837260FCAD510C02EF10A2EB50B591C4
24,507,956 UART: [art] PUB.Y = 20D90688C8DDDBA143129142B12B6C57BABB5B92783F54D5432AE97D9698F22D11C044757D6876765793FC192B036012
24,515,208 UART: [art] SIG.R = 0DE9D74AC15AAC263CBCEE00A8C8CF86A777762631B039A5A1DD0C3302087A996E9E369A593DC463BCC592B7EA83AB02
24,522,611 UART: [art] SIG.S = CE528B8240FD1C41E7902CF72FCCE18D4862615225DF6795EAB34D8CD1B6099A4FAEADE0D83EC16C19C7932BFCBB33DD
25,501,317 UART: Caliptra RT
25,502,035 UART: [state] CFI Enabled
25,619,526 UART: [rt] RT listening for mailbox commands...
25,650,823 UART: [rt]cmd =0x4c444556, len=4
25,661,893 >>> mbox cmd response data (687 bytes)
25,702,958 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,732,987 UART: [rt]cmd =0x49444549, len=4
25,735,686 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
193,210 UART:
193,612 UART: Running Caliptra ROM ...
194,781 UART:
194,934 UART: [state] CFI Enabled
264,440 UART: [state] LifecycleState = Unprovisioned
266,812 UART: [state] DebugLocked = No
268,304 UART: [state] WD Timer not started. Device not locked for debugging
272,297 UART: [kat] SHA2-256
461,981 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,737 UART: [kat] ++
473,187 UART: [kat] sha1
485,625 UART: [kat] SHA2-256
488,635 UART: [kat] SHA2-384
493,772 UART: [kat] SHA2-512-ACC
496,352 UART: [kat] ECC-384
2,946,406 UART: [kat] HMAC-384Kdf
2,970,502 UART: [kat] LMS
3,502,285 UART: [kat] --
3,506,983 UART: [cold-reset] ++
3,508,275 UART: [fht] FHT @ 0x50003400
3,518,402 UART: [idev] ++
3,519,117 UART: [idev] CDI.KEYID = 6
3,520,048 UART: [idev] SUBJECT.KEYID = 7
3,521,228 UART: [idev] UDS.KEYID = 0
3,522,157 ready_for_fw is high
3,522,355 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,973 UART: [idev] Erasing UDS.KEYID = 0
6,028,940 UART: [idev] Sha1 KeyId Algorithm
6,050,352 UART: [idev] --
6,055,575 UART: [ldev] ++
6,056,275 UART: [ldev] CDI.KEYID = 6
6,057,351 UART: [ldev] SUBJECT.KEYID = 5
6,058,460 UART: [ldev] AUTHORITY.KEYID = 7
6,059,642 UART: [ldev] FE.KEYID = 1
6,098,000 UART: [ldev] Erasing FE.KEYID = 1
8,607,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,377 UART: [ldev] --
10,412,610 UART: [fwproc] Wait for Commands...
10,415,084 UART: [fwproc] Recv command 0x46574c44
10,417,394 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,169 >>> mbox cmd response: success
14,597,700 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,601,831 UART: [afmc] ++
14,602,579 UART: [afmc] CDI.KEYID = 6
14,603,681 UART: [afmc] SUBJECT.KEYID = 7
14,605,223 UART: [afmc] AUTHORITY.KEYID = 5
17,144,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,869,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,871,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,886,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,031 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,082 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,039 UART: [afmc] --
18,945,528 UART: [cold-reset] --
18,948,424 UART: [state] Locking Datavault
18,953,948 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,150 UART: [state] Locking ICCM
18,958,012 UART: [exit] Launching FMC @ 0x40000130
18,966,686 UART:
18,966,924 UART: Running Caliptra FMC ...
18,967,987 UART:
18,968,137 UART: [state] CFI Enabled
19,026,688 UART: [fht] FMC Alias Private Key: 7
20,791,073 UART: [art] Extend RT PCRs Done
20,792,308 UART: [art] Lock RT PCRs Done
20,793,689 UART: [art] Populate DV Done
20,798,942 UART: [fht] FMC Alias Private Key: 7
20,800,544 UART: [art] Derive CDI
20,801,363 UART: [art] Store in in slot 0x4
20,860,222 UART: [art] Derive Key Pair
20,861,257 UART: [art] Store priv key in slot 0x5
23,324,113 UART: [art] Derive Key Pair - Done
23,337,050 UART: [art] Signing Cert with AUTHO
23,338,362 UART: RITY.KEYID = 7
25,050,302 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,813 UART: [art] PUB.X = 533A4E1783B2628AE2FE55D04DD731CD1A89AE2E3BBDF91E950557FBCD6355862AC1075D9C0C9EA943716CC7E4CA02DC
25,059,137 UART: [art] PUB.Y = A4CFD92D9A845018001ACC846652724593008E50820755144C4D37DE6ACD1A15A790E414C634F9D55FAC80FE9646E9D1
25,066,338 UART: [art] SIG.R = D1DDE984B9F02E659DCEC1F3AEE0C0A10F43226D36D84999B64286032DCAE61A790E82B338FAE690C930E0974CEBC6D1
25,073,781 UART: [art] SIG.S = 23A3EF28319C3BB0741871CAFDC93D9F16512595AC9370A8E1A4E3245135CF3BDD3C4B382EECFE9B468805F9505E0B93
26,052,832 UART: Caliptra RT
26,053,523 UART: [state] CFI Enabled
26,218,556 UART: [rt] RT listening for mailbox commands...
26,250,022 UART: [rt]cmd =0x4c444556, len=4
26,261,155 >>> mbox cmd response data (687 bytes)
26,302,823 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,332,603 UART: [rt]cmd =0x49444549, len=4
26,335,189 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
3,414,257 ready_for_fw is high
3,414,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,716,727 >>> mbox cmd response: success
14,717,348 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,001,171 UART:
19,001,563 UART: Running Caliptra FMC ...
19,002,691 UART:
19,002,858 UART: [state] CFI Enabled
19,067,438 UART: [fht] FMC Alias Private Key: 7
20,831,647 UART: [art] Extend RT PCRs Done
20,832,880 UART: [art] Lock RT PCRs Done
20,834,537 UART: [art] Populate DV Done
20,840,167 UART: [fht] FMC Alias Private Key: 7
20,841,815 UART: [art] Derive CDI
20,842,551 UART: [art] Store in in slot 0x4
20,899,190 UART: [art] Derive Key Pair
20,900,228 UART: [art] Store priv key in slot 0x5
23,363,388 UART: [art] Derive Key Pair - Done
23,376,551 UART: [art] Signing Cert with AUTHO
23,377,849 UART: RITY.KEYID = 7
25,088,296 UART: [art] Erasing AUTHORITY.KEYID = 7
25,089,805 UART: [art] PUB.X = 7BA41951D030DC641D7AECC5E444A40EE7EA434F55BE715A7DACEE5CE6B4202140510A46B6238FEA30A808E874B055CF
25,097,123 UART: [art] PUB.Y = 3C6F8498EF379FF4950449BD11934DD67E7892333D67FBAD31E39669EBEDA69B990C3F085E6A0E40D250B917D60714AC
25,104,355 UART: [art] SIG.R = 9FB6DCB4EC3BAE74CDED28227E4D47D7717421E61D1173DD33DE34D8F54DD2110F12D26EBCE655E584EE97246C3B2592
25,111,740 UART: [art] SIG.S = 959ACABC337CB1181776A44DEA8D2115F81C09B8681AEF57EF8512DBF23D2B65F080196B82455335C48BE92E3435364A
26,090,731 UART: Caliptra RT
26,091,441 UART: [state] CFI Enabled
26,256,854 UART: [rt] RT listening for mailbox commands...
26,288,164 UART: [rt]cmd =0x4c444556, len=4
26,299,145 >>> mbox cmd response data (687 bytes)
26,340,392 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,370,498 UART: [rt]cmd =0x49444549, len=4
26,373,305 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,739 writing to cptra_bootfsm_go
192,964 UART:
193,348 UART: Running Caliptra ROM ...
194,534 UART:
604,257 UART: [state] CFI Enabled
616,140 UART: [state] LifecycleState = Unprovisioned
618,508 UART: [state] DebugLocked = No
621,380 UART: [state] WD Timer not started. Device not locked for debugging
626,408 UART: [kat] SHA2-256
816,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,098 UART: [kat] ++
827,551 UART: [kat] sha1
839,775 UART: [kat] SHA2-256
842,784 UART: [kat] SHA2-384
848,847 UART: [kat] SHA2-512-ACC
851,447 UART: [kat] ECC-384
3,292,249 UART: [kat] HMAC-384Kdf
3,305,777 UART: [kat] LMS
3,837,603 UART: [kat] --
3,841,275 UART: [cold-reset] ++
3,842,641 UART: [fht] FHT @ 0x50003400
3,853,127 UART: [idev] ++
3,853,762 UART: [idev] CDI.KEYID = 6
3,854,794 UART: [idev] SUBJECT.KEYID = 7
3,855,974 UART: [idev] UDS.KEYID = 0
3,856,957 ready_for_fw is high
3,857,155 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,560 UART: [idev] Erasing UDS.KEYID = 0
6,335,448 UART: [idev] Sha1 KeyId Algorithm
6,357,792 UART: [idev] --
6,361,638 UART: [ldev] ++
6,362,340 UART: [ldev] CDI.KEYID = 6
6,363,255 UART: [ldev] SUBJECT.KEYID = 5
6,364,412 UART: [ldev] AUTHORITY.KEYID = 7
6,365,642 UART: [ldev] FE.KEYID = 1
6,375,538 UART: [ldev] Erasing FE.KEYID = 1
8,854,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,517 UART: [ldev] --
10,642,421 UART: [fwproc] Wait for Commands...
10,643,970 UART: [fwproc] Recv command 0x46574c44
10,646,220 UART: [fwproc] Recv'd Img size: 114168 bytes
14,087,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,822,686 >>> mbox cmd response: success
14,823,191 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,827,648 UART: [afmc] ++
14,828,353 UART: [afmc] CDI.KEYID = 6
14,829,548 UART: [afmc] SUBJECT.KEYID = 7
14,830,987 UART: [afmc] AUTHORITY.KEYID = 5
17,333,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,053,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,055,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,070,303 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,085,429 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,100,422 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,123,752 UART: [afmc] --
19,128,214 UART: [cold-reset] --
19,132,305 UART: [state] Locking Datavault
19,136,551 UART: [state] Locking PCR0, PCR1 and PCR31
19,138,691 UART: [state] Locking ICCM
19,140,564 UART: [exit] Launching FMC @ 0x40000130
19,149,205 UART:
19,149,451 UART: Running Caliptra FMC ...
19,150,555 UART:
19,150,717 UART: [state] CFI Enabled
19,158,821 UART: [fht] FMC Alias Private Key: 7
20,916,111 UART: [art] Extend RT PCRs Done
20,917,339 UART: [art] Lock RT PCRs Done
20,918,857 UART: [art] Populate DV Done
20,924,328 UART: [fht] FMC Alias Private Key: 7
20,925,921 UART: [art] Derive CDI
20,926,732 UART: [art] Store in in slot 0x4
20,969,057 UART: [art] Derive Key Pair
20,970,059 UART: [art] Store priv key in slot 0x5
23,396,778 UART: [art] Derive Key Pair - Done
23,409,558 UART: [art] Signing Cert with AUTHO
23,410,868 UART: RITY.KEYID = 7
25,115,974 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,492 UART: [art] PUB.X = 54FDB8CA04D06668DCAAC3A88FFE5CF29F4158289BF520FC62718CAEB39A5F096FA32F0E185B3E0D5000EFB095C80ADB
25,124,747 UART: [art] PUB.Y = CFF6EBA7357BF2FA892AD774D32F517C201EDA034BC77EAF7E0374FA0977EB5BF696D72E074C69D03D8BD6AAB86E8F89
25,132,034 UART: [art] SIG.R = A92B77D0FEA8FEBC9FDD6E29DEA3B278F5409F967DBF01EA5458EA65F9524D4414B1365981109BCB763D59B0D966A0C5
25,139,629 UART: [art] SIG.S = F182AE2C6985E6D949106B0701FA3D461CD3750A08F0748F5C7B9987F79C73B122BA1694E31D21FEB3BE96D239F839D3
26,118,124 UART: Caliptra RT
26,118,831 UART: [state] CFI Enabled
26,236,352 UART: [rt] RT listening for mailbox commands...
26,267,753 UART: [rt]cmd =0x4c444556, len=4
26,278,869 >>> mbox cmd response data (687 bytes)
26,320,488 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,350,453 UART: [rt]cmd =0x49444549, len=4
26,353,292 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,823 writing to cptra_bootfsm_go
3,751,049 ready_for_fw is high
3,751,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,950,022 >>> mbox cmd response: success
14,950,600 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,198,747 UART:
19,199,137 UART: Running Caliptra FMC ...
19,200,234 UART:
19,200,387 UART: [state] CFI Enabled
19,208,638 UART: [fht] FMC Alias Private Key: 7
20,965,680 UART: [art] Extend RT PCRs Done
20,966,905 UART: [art] Lock RT PCRs Done
20,968,663 UART: [art] Populate DV Done
20,973,857 UART: [fht] FMC Alias Private Key: 7
20,975,559 UART: [art] Derive CDI
20,976,374 UART: [art] Store in in slot 0x4
21,018,859 UART: [art] Derive Key Pair
21,019,864 UART: [art] Store priv key in slot 0x5
23,447,231 UART: [art] Derive Key Pair - Done
23,460,121 UART: [art] Signing Cert with AUTHO
23,461,426 UART: RITY.KEYID = 7
25,166,611 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,117 UART: [art] PUB.X = 867D5CEEEAA075B1C985BBF260FCAD9D57EDA79F6C4EFF443FE80EEA91CF4A5251D2BB392230579897003FCF5AD8431B
25,175,361 UART: [art] PUB.Y = 9E2BD550CC3103ED68FD46C0E911F59FD9FFCDB43AAB97CF9DCC2AC3F7B808DE5552F3CCD2BA46DB763B5B89F51384AE
25,182,696 UART: [art] SIG.R = 7D4ECE75B6476865B5A0B26686C7F42375EA8A5132A0528B561F9E9A074A622BCE096BFB32FF903951C9FBCCA0D3994E
25,190,113 UART: [art] SIG.S = C5D98701967ECBC54708866173A7DEF83FC86A835DF3902B8A13CB11064404A01713A1E1236C30B64F631691E483257E
26,169,700 UART: Caliptra RT
26,170,413 UART: [state] CFI Enabled
26,288,069 UART: [rt] RT listening for mailbox commands...
26,319,360 UART: [rt]cmd =0x4c444556, len=4
26,330,470 >>> mbox cmd response data (687 bytes)
26,371,486 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,401,566 UART: [rt]cmd =0x49444549, len=4
26,404,405 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,837 UART: [kat] SHA2-256
881,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,883 UART: [kat] ++
886,035 UART: [kat] sha1
890,217 UART: [kat] SHA2-256
892,155 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
902,388 UART: [kat] HMAC-384Kdf
906,872 UART: [kat] LMS
1,475,068 UART: [kat] --
1,476,037 UART: [cold-reset] ++
1,476,529 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 ready_for_fw is high
1,480,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,338 UART: [idev] --
1,514,317 UART: [ldev] ++
1,514,485 UART: [ldev] CDI.KEYID = 6
1,514,848 UART: [ldev] SUBJECT.KEYID = 5
1,515,274 UART: [ldev] AUTHORITY.KEYID = 7
1,515,737 UART: [ldev] FE.KEYID = 1
1,521,051 UART: [ldev] Erasing FE.KEYID = 1
1,546,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,654 UART: [ldev] --
1,586,005 UART: [fwproc] Waiting for Commands...
1,586,622 UART: [fwproc] Received command 0x46574c44
1,587,413 UART: [fwproc] Received Image of size 114168 bytes
2,883,715 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,337 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,689 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,424 >>> mbox cmd response: success
3,075,424 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,076,594 UART: [afmc] ++
3,076,762 UART: [afmc] CDI.KEYID = 6
3,077,124 UART: [afmc] SUBJECT.KEYID = 7
3,077,549 UART: [afmc] AUTHORITY.KEYID = 5
3,111,558 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,253 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,943 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,906 UART: [afmc] --
3,154,972 UART: [cold-reset] --
3,156,086 UART: [state] Locking Datavault
3,157,181 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,785 UART: [state] Locking ICCM
3,158,377 UART: [exit] Launching FMC @ 0x40000130
3,163,706 UART:
3,163,722 UART: Running Caliptra FMC ...
3,164,130 UART:
3,164,184 UART: [state] CFI Enabled
3,174,523 UART: [fht] FMC Alias Private Key: 7
3,282,186 UART: [art] Extend RT PCRs Done
3,282,614 UART: [art] Lock RT PCRs Done
3,284,274 UART: [art] Populate DV Done
3,292,789 UART: [fht] FMC Alias Private Key: 7
3,293,815 UART: [art] Derive CDI
3,294,095 UART: [art] Store in in slot 0x4
3,379,752 UART: [art] Derive Key Pair
3,380,112 UART: [art] Store priv key in slot 0x5
3,392,792 UART: [art] Derive Key Pair - Done
3,407,339 UART: [art] Signing Cert with AUTHO
3,407,819 UART: RITY.KEYID = 7
3,423,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,190 UART: [art] PUB.X = D6D63B092C6BF1B70E5E7E3A538D2E1C372494975B7A99E3551DD324B454F386C8AA2301A8943AC1464EB6379EC30B9F
3,430,952 UART: [art] PUB.Y = A088C7D7AC4B3E18DAE2495EB069B417F36A56F9ABF0E3CC395E849A8C3B84C3D3D0FE6342BA3A505D448535C89A76AF
3,437,918 UART: [art] SIG.R = E5FEC3C66806D5700503EC5D167EBF90E31DCB539C37435AF16F2A993EB01BBF4BA3E3098FAEF1EEB9E238FC77382F20
3,444,694 UART: [art] SIG.S = A447C85128123BE62ADB6CDF45E73DE3DE9D14AC3DF2D758C701DD2F4A1046696DDE6CE193CDA387E50BD30C51D4C3A8
3,468,668 UART: Caliptra RT
3,468,921 UART: [state] CFI Enabled
3,577,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,763 UART: [rt]cmd =0x4c444556, len=4
3,618,334 >>> mbox cmd response data (687 bytes)
3,618,335 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,798 UART: [rt]cmd =0x49444549, len=4
3,650,353 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,665 ready_for_fw is high
1,362,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,546 >>> mbox cmd response: success
2,925,546 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,986,220 UART:
2,986,236 UART: Running Caliptra FMC ...
2,986,644 UART:
2,986,698 UART: [state] CFI Enabled
2,997,609 UART: [fht] FMC Alias Private Key: 7
3,105,458 UART: [art] Extend RT PCRs Done
3,105,886 UART: [art] Lock RT PCRs Done
3,107,368 UART: [art] Populate DV Done
3,115,549 UART: [fht] FMC Alias Private Key: 7
3,116,545 UART: [art] Derive CDI
3,116,825 UART: [art] Store in in slot 0x4
3,202,268 UART: [art] Derive Key Pair
3,202,628 UART: [art] Store priv key in slot 0x5
3,216,066 UART: [art] Derive Key Pair - Done
3,230,358 UART: [art] Signing Cert with AUTHO
3,230,838 UART: RITY.KEYID = 7
3,245,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,541 UART: [art] PUB.X = 64B9D15138FF49BD30DDCA3EFF3670C8D4E2995088F91E1DF7035B5ECE68E601AF852E53C02426E4437D0C0B6EA9CBB4
3,253,313 UART: [art] PUB.Y = 05866CF65854B5206C61C209890BFE5770FB1276176914AF0C965CDB9D6E21A019F6B31B69F5FCB8C029ACE4CF3A955C
3,260,257 UART: [art] SIG.R = 7A85C4EB74A9216CC11EF6A466F8CBEA53D20F40863DB936EE2217EF61C10CBA5488096EC4D6D9A16BC192A38D30AB36
3,267,032 UART: [art] SIG.S = 6E3B374251720D086216455826D43EEDD26F0C3FB7D2B44FF2110115AEF247E936521A7D141D656A074C1D4474A3BFA1
3,291,786 UART: Caliptra RT
3,292,039 UART: [state] CFI Enabled
3,400,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,725 UART: [rt]cmd =0x4c444556, len=4
3,441,186 >>> mbox cmd response data (687 bytes)
3,441,187 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,328 UART: [rt]cmd =0x49444549, len=4
3,472,721 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,096 UART: [kat] SHA2-256
882,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,142 UART: [kat] ++
886,294 UART: [kat] sha1
890,446 UART: [kat] SHA2-256
892,384 UART: [kat] SHA2-384
895,071 UART: [kat] SHA2-512-ACC
896,972 UART: [kat] ECC-384
902,649 UART: [kat] HMAC-384Kdf
907,123 UART: [kat] LMS
1,475,319 UART: [kat] --
1,476,308 UART: [cold-reset] ++
1,476,730 UART: [fht] Storing FHT @ 0x50003400
1,479,611 UART: [idev] ++
1,479,779 UART: [idev] CDI.KEYID = 6
1,480,139 UART: [idev] SUBJECT.KEYID = 7
1,480,563 UART: [idev] UDS.KEYID = 0
1,480,908 ready_for_fw is high
1,480,908 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,993 UART: [idev] Erasing UDS.KEYID = 0
1,505,963 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,479 UART: [idev] --
1,515,574 UART: [ldev] ++
1,515,742 UART: [ldev] CDI.KEYID = 6
1,516,105 UART: [ldev] SUBJECT.KEYID = 5
1,516,531 UART: [ldev] AUTHORITY.KEYID = 7
1,516,994 UART: [ldev] FE.KEYID = 1
1,522,074 UART: [ldev] Erasing FE.KEYID = 1
1,547,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,365 UART: [ldev] --
1,586,660 UART: [fwproc] Waiting for Commands...
1,587,473 UART: [fwproc] Received command 0x46574c44
1,588,264 UART: [fwproc] Received Image of size 114168 bytes
2,883,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,274 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,626 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,299 >>> mbox cmd response: success
3,075,299 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,076,499 UART: [afmc] ++
3,076,667 UART: [afmc] CDI.KEYID = 6
3,077,029 UART: [afmc] SUBJECT.KEYID = 7
3,077,454 UART: [afmc] AUTHORITY.KEYID = 5
3,112,763 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,637 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,522 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,212 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,039 UART: [afmc] --
3,156,095 UART: [cold-reset] --
3,157,009 UART: [state] Locking Datavault
3,158,056 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,660 UART: [state] Locking ICCM
3,159,226 UART: [exit] Launching FMC @ 0x40000130
3,164,555 UART:
3,164,571 UART: Running Caliptra FMC ...
3,164,979 UART:
3,165,122 UART: [state] CFI Enabled
3,175,773 UART: [fht] FMC Alias Private Key: 7
3,283,752 UART: [art] Extend RT PCRs Done
3,284,180 UART: [art] Lock RT PCRs Done
3,285,894 UART: [art] Populate DV Done
3,293,883 UART: [fht] FMC Alias Private Key: 7
3,294,851 UART: [art] Derive CDI
3,295,131 UART: [art] Store in in slot 0x4
3,380,464 UART: [art] Derive Key Pair
3,380,824 UART: [art] Store priv key in slot 0x5
3,394,182 UART: [art] Derive Key Pair - Done
3,408,785 UART: [art] Signing Cert with AUTHO
3,409,265 UART: RITY.KEYID = 7
3,424,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,640 UART: [art] PUB.X = B406C40C6A1D3BBE5EDE8541B9AC4B573024075257146E54DE5F7F7F869970708B4E8B22D43F21381AEB7BABE50AF18A
3,432,408 UART: [art] PUB.Y = 95ED54952EB2915A2B48AE2D3ADB8FC1253B267465FB58680F6AFF1EB1ED2CED50444DA472FA77E8F6442AA6FC6B0D4D
3,439,372 UART: [art] SIG.R = E0EAD7D07507D570128E0FC2414EBCFBD853575F7BBDBF34D6114E40C58AA521C832BF1AC2E271FCB1B0B75F8C9D0579
3,446,151 UART: [art] SIG.S = 1B99670579CEBC27ABD4CF0B1397287E1459ABEB31FE0A0A7CDBF70A5FC2B853D202C958081FEA21F8D2A539A2B22876
3,470,145 UART: Caliptra RT
3,470,490 UART: [state] CFI Enabled
3,578,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,057 UART: [rt]cmd =0x4c444556, len=4
3,619,564 >>> mbox cmd response data (687 bytes)
3,619,565 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,936 UART: [rt]cmd =0x49444549, len=4
3,651,179 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,566 ready_for_fw is high
1,362,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,181 >>> mbox cmd response: success
2,926,181 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,988,475 UART:
2,988,491 UART: Running Caliptra FMC ...
2,988,899 UART:
2,989,042 UART: [state] CFI Enabled
2,999,881 UART: [fht] FMC Alias Private Key: 7
3,108,326 UART: [art] Extend RT PCRs Done
3,108,754 UART: [art] Lock RT PCRs Done
3,110,468 UART: [art] Populate DV Done
3,118,757 UART: [fht] FMC Alias Private Key: 7
3,119,927 UART: [art] Derive CDI
3,120,207 UART: [art] Store in in slot 0x4
3,206,042 UART: [art] Derive Key Pair
3,206,402 UART: [art] Store priv key in slot 0x5
3,220,044 UART: [art] Derive Key Pair - Done
3,234,876 UART: [art] Signing Cert with AUTHO
3,235,356 UART: RITY.KEYID = 7
3,250,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,231 UART: [art] PUB.X = 070CE8C968FF4129EDE7FB435C8A580A3E3F31F88621FA4F4B7E3CA6A858BD20EC504A9235E98A08948B08B34B7AEDF9
3,258,000 UART: [art] PUB.Y = 1FCCAE07765C01ABF4618D98CF9314F8FABC2822E9433DE5525842852C2298084878FB002E5B955177F73D555293C4FD
3,264,917 UART: [art] SIG.R = 17A3A1D5C56B6326F723A9E4CCC9957817543FA4D380509EF6010F7ECAEDFE569ADAF21C713D5B8A344D7DEE89F62DED
3,271,699 UART: [art] SIG.S = 0152B1DCBC0A507774EEC74C2D20AACD1FD283B68767AC103A3938A3AACC0F46FB897D0D27820F28A70CF840C056CBEC
3,295,746 UART: Caliptra RT
3,296,091 UART: [state] CFI Enabled
3,404,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,553 UART: [rt]cmd =0x4c444556, len=4
3,445,070 >>> mbox cmd response data (687 bytes)
3,445,071 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,234 UART: [rt]cmd =0x49444549, len=4
3,476,567 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,937 UART: [kat] SHA2-256
903,877 UART: [kat] SHA2-384
906,496 UART: [kat] SHA2-512-ACC
908,397 UART: [kat] ECC-384
917,874 UART: [kat] HMAC-384Kdf
922,590 UART: [kat] LMS
1,170,918 UART: [kat] --
1,171,717 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,174,910 UART: [idev] ++
1,175,078 UART: [idev] CDI.KEYID = 6
1,175,438 UART: [idev] SUBJECT.KEYID = 7
1,175,862 UART: [idev] UDS.KEYID = 0
1,176,207 ready_for_fw is high
1,176,207 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,638 UART: [idev] Erasing UDS.KEYID = 0
1,201,161 UART: [idev] Sha1 KeyId Algorithm
1,209,591 UART: [idev] --
1,210,707 UART: [ldev] ++
1,210,875 UART: [ldev] CDI.KEYID = 6
1,211,238 UART: [ldev] SUBJECT.KEYID = 5
1,211,664 UART: [ldev] AUTHORITY.KEYID = 7
1,212,127 UART: [ldev] FE.KEYID = 1
1,217,091 UART: [ldev] Erasing FE.KEYID = 1
1,243,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,717 UART: [ldev] --
1,283,216 UART: [fwproc] Wait for Commands...
1,284,026 UART: [fwproc] Recv command 0x46574c44
1,284,754 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,289 >>> mbox cmd response: success
2,771,289 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,772,389 UART: [afmc] ++
2,772,557 UART: [afmc] CDI.KEYID = 6
2,772,919 UART: [afmc] SUBJECT.KEYID = 7
2,773,344 UART: [afmc] AUTHORITY.KEYID = 5
2,808,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,528 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,256 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,141 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,860 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,526 UART: [afmc] --
2,851,480 UART: [cold-reset] --
2,852,044 UART: [state] Locking Datavault
2,853,291 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,895 UART: [state] Locking ICCM
2,854,495 UART: [exit] Launching FMC @ 0x40000130
2,859,824 UART:
2,859,840 UART: Running Caliptra FMC ...
2,860,248 UART:
2,860,302 UART: [state] CFI Enabled
2,870,679 UART: [fht] FMC Alias Private Key: 7
2,978,442 UART: [art] Extend RT PCRs Done
2,978,870 UART: [art] Lock RT PCRs Done
2,980,730 UART: [art] Populate DV Done
2,988,949 UART: [fht] FMC Alias Private Key: 7
2,990,097 UART: [art] Derive CDI
2,990,377 UART: [art] Store in in slot 0x4
3,075,932 UART: [art] Derive Key Pair
3,076,292 UART: [art] Store priv key in slot 0x5
3,089,608 UART: [art] Derive Key Pair - Done
3,104,723 UART: [art] Signing Cert with AUTHO
3,105,203 UART: RITY.KEYID = 7
3,120,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,118 UART: [art] PUB.X = B60A92CEC17FD7F21143E43311BC29DE0F8E143BF0F84A38566515D4AADC8A913133ABDE920A76C91E20E9D64736108E
3,127,887 UART: [art] PUB.Y = 050AC7DC5D21BCE3D6D65085D5EBCE9341AADBC9C0527DFE5C9B7905526EECB59E1E2D3EE5ED19CDE1FA0A35B82C9077
3,134,853 UART: [art] SIG.R = E6C8AC48DBF7685D2B3447A55AD6FF0A63C3F52F9238755DF6BDA68119E8CE24EFB828908FF9C36A308BED8D64D179A2
3,141,636 UART: [art] SIG.S = C535AFE0AF3689A524E2EDCCBB2B049CAADCA68839F78DDDE78A8FF8741C96BCEAB06E22F732F7FEDDE531FC3118D30C
3,165,985 UART: Caliptra RT
3,166,238 UART: [state] CFI Enabled
3,272,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,438 UART: [rt]cmd =0x4c444556, len=4
3,313,877 >>> mbox cmd response data (687 bytes)
3,313,878 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,293 UART: [rt]cmd =0x49444549, len=4
3,345,572 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,697 ready_for_fw is high
1,060,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,718 >>> mbox cmd response: success
2,624,718 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,686,720 UART:
2,686,736 UART: Running Caliptra FMC ...
2,687,144 UART:
2,687,198 UART: [state] CFI Enabled
2,697,879 UART: [fht] FMC Alias Private Key: 7
2,805,702 UART: [art] Extend RT PCRs Done
2,806,130 UART: [art] Lock RT PCRs Done
2,807,758 UART: [art] Populate DV Done
2,816,145 UART: [fht] FMC Alias Private Key: 7
2,817,327 UART: [art] Derive CDI
2,817,607 UART: [art] Store in in slot 0x4
2,903,178 UART: [art] Derive Key Pair
2,903,538 UART: [art] Store priv key in slot 0x5
2,916,168 UART: [art] Derive Key Pair - Done
2,930,398 UART: [art] Signing Cert with AUTHO
2,930,878 UART: RITY.KEYID = 7
2,946,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,881 UART: [art] PUB.X = 460C6DD8521A72F21F309455C3A03AE8705FE0DF095872354CC081095D1C3CB9E052874ABDCBF0910BBA059B79DEA83F
2,953,644 UART: [art] PUB.Y = 0B0146E433985DE8C34F34A2B4821E8B4494CB4683ACC4C12C05455DA6DBCB7531736993936321678D70CE75B3FC9CDC
2,960,587 UART: [art] SIG.R = EBEFF9217CA33CC7E5BE183F707FF010DC954E6EE7D6765D6C2EA70377B35506CF5C48B3D93EFB36B287931E3393EABB
2,967,369 UART: [art] SIG.S = D86F8CCACA366AFC7AED4DD2CA2E60AAA8F2D1798E352E87FE461F0EC922BBE2E1D264E11BBD7B39834F2D676292BD40
2,991,511 UART: Caliptra RT
2,991,764 UART: [state] CFI Enabled
3,100,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,176 UART: [rt]cmd =0x4c444556, len=4
3,141,807 >>> mbox cmd response data (687 bytes)
3,141,808 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,170,999 UART: [rt]cmd =0x49444549, len=4
3,173,250 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,242 UART: [kat] SHA2-256
904,182 UART: [kat] SHA2-384
906,987 UART: [kat] SHA2-512-ACC
908,888 UART: [kat] ECC-384
918,811 UART: [kat] HMAC-384Kdf
923,485 UART: [kat] LMS
1,171,813 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,770 UART: [fht] FHT @ 0x50003400
1,175,427 UART: [idev] ++
1,175,595 UART: [idev] CDI.KEYID = 6
1,175,955 UART: [idev] SUBJECT.KEYID = 7
1,176,379 UART: [idev] UDS.KEYID = 0
1,176,724 ready_for_fw is high
1,176,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,655 UART: [idev] Erasing UDS.KEYID = 0
1,201,058 UART: [idev] Sha1 KeyId Algorithm
1,209,492 UART: [idev] --
1,210,372 UART: [ldev] ++
1,210,540 UART: [ldev] CDI.KEYID = 6
1,210,903 UART: [ldev] SUBJECT.KEYID = 5
1,211,329 UART: [ldev] AUTHORITY.KEYID = 7
1,211,792 UART: [ldev] FE.KEYID = 1
1,216,940 UART: [ldev] Erasing FE.KEYID = 1
1,243,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,006 UART: [ldev] --
1,282,419 UART: [fwproc] Wait for Commands...
1,283,141 UART: [fwproc] Recv command 0x46574c44
1,283,869 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,284 >>> mbox cmd response: success
2,773,284 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,774,502 UART: [afmc] ++
2,774,670 UART: [afmc] CDI.KEYID = 6
2,775,032 UART: [afmc] SUBJECT.KEYID = 7
2,775,457 UART: [afmc] AUTHORITY.KEYID = 5
2,811,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,771 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,656 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,375 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,133 UART: [afmc] --
2,855,093 UART: [cold-reset] --
2,855,761 UART: [state] Locking Datavault
2,856,902 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,506 UART: [state] Locking ICCM
2,858,004 UART: [exit] Launching FMC @ 0x40000130
2,863,333 UART:
2,863,349 UART: Running Caliptra FMC ...
2,863,757 UART:
2,863,900 UART: [state] CFI Enabled
2,874,145 UART: [fht] FMC Alias Private Key: 7
2,982,400 UART: [art] Extend RT PCRs Done
2,982,828 UART: [art] Lock RT PCRs Done
2,984,324 UART: [art] Populate DV Done
2,992,589 UART: [fht] FMC Alias Private Key: 7
2,993,771 UART: [art] Derive CDI
2,994,051 UART: [art] Store in in slot 0x4
3,079,592 UART: [art] Derive Key Pair
3,079,952 UART: [art] Store priv key in slot 0x5
3,093,364 UART: [art] Derive Key Pair - Done
3,108,377 UART: [art] Signing Cert with AUTHO
3,108,857 UART: RITY.KEYID = 7
3,124,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,924 UART: [art] PUB.X = A57D479D02617672BF3D700A74C570EAFB03DE70F4294F928C20B36D525B213DD666967D954F0D7DB75F81D016F1CB5E
3,131,686 UART: [art] PUB.Y = 256EB1A2C75D8F7296AB1806682B0D1720EE069377737C1BBDC6EB479AB1B7D66B81BE1C002548C06E2D4C9C5C0CB8E1
3,138,612 UART: [art] SIG.R = 3F33E0CC9046B9819239B03A9945E392C21BBB12B312EA1E9F944B2CC066A06DEAE2DEC18AD5E69DA6C092132B1D6C9C
3,145,396 UART: [art] SIG.S = C00B5D8C1FFEBB51B001FB0F60611057C006E82F366D2377D27911EAB9BE1888441612231EE2784E17BC761CC6B8AFBE
3,169,217 UART: Caliptra RT
3,169,562 UART: [state] CFI Enabled
3,277,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,849 UART: [rt]cmd =0x4c444556, len=4
3,318,290 >>> mbox cmd response data (687 bytes)
3,318,291 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,742 UART: [rt]cmd =0x49444549, len=4
3,350,033 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,012 ready_for_fw is high
1,061,012 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,711 >>> mbox cmd response: success
2,625,711 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,687,709 UART:
2,687,725 UART: Running Caliptra FMC ...
2,688,133 UART:
2,688,276 UART: [state] CFI Enabled
2,699,401 UART: [fht] FMC Alias Private Key: 7
2,807,422 UART: [art] Extend RT PCRs Done
2,807,850 UART: [art] Lock RT PCRs Done
2,809,226 UART: [art] Populate DV Done
2,817,307 UART: [fht] FMC Alias Private Key: 7
2,818,265 UART: [art] Derive CDI
2,818,545 UART: [art] Store in in slot 0x4
2,904,220 UART: [art] Derive Key Pair
2,904,580 UART: [art] Store priv key in slot 0x5
2,918,336 UART: [art] Derive Key Pair - Done
2,933,073 UART: [art] Signing Cert with AUTHO
2,933,553 UART: RITY.KEYID = 7
2,948,653 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,418 UART: [art] PUB.X = 1754150CFD0F3F0F58AFEAB12C448E8759D3181A2EF99CDDB1A1C454A3DC9F2CB01C8CCD2F855E0A41BC4CD0E8B3AA48
2,956,202 UART: [art] PUB.Y = D180B1AEC697BA48B9DD14E6E2C9A5546A05DBF254D7171F95383984803F0028E24C45A9DCA19F15A7CC0FCE414DEBD2
2,963,138 UART: [art] SIG.R = C473285CABE34517B93897F1587FCD29C8EDB0DAFBADFDA3229AB519FB9ED2248EF1F93687C17B4BD47C0DFCC2CC7023
2,969,929 UART: [art] SIG.S = F8260E9D06BD1892DC650234FDFEDDD6753D49898F0C7120F41B6EEB2644236C484FF9A80805E9E2EAC83DFCFFBB8AED
2,993,450 UART: Caliptra RT
2,993,795 UART: [state] CFI Enabled
3,101,737 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,343 UART: [rt]cmd =0x4c444556, len=4
3,142,902 >>> mbox cmd response data (687 bytes)
3,142,903 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,244 UART: [rt]cmd =0x49444549, len=4
3,174,687 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,902 UART: [kat] SHA2-256
891,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
900,197 UART: [kat] SHA2-256
902,137 UART: [kat] SHA2-384
904,964 UART: [kat] SHA2-512-ACC
906,865 UART: [kat] ECC-384
916,392 UART: [kat] HMAC-384Kdf
920,850 UART: [kat] LMS
1,169,162 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,174,369 ready_for_fw is high
1,174,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,419 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,195 UART: [idev] --
1,208,244 UART: [ldev] ++
1,208,412 UART: [ldev] CDI.KEYID = 6
1,208,776 UART: [ldev] SUBJECT.KEYID = 5
1,209,203 UART: [ldev] AUTHORITY.KEYID = 7
1,209,666 UART: [ldev] FE.KEYID = 1
1,214,636 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,604 UART: [ldev] --
1,280,006 UART: [fwproc] Wait for Commands...
1,280,805 UART: [fwproc] Recv command 0x46574c44
1,281,538 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,364 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,305 >>> mbox cmd response: success
2,770,305 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,771,328 UART: [afmc] ++
2,771,496 UART: [afmc] CDI.KEYID = 6
2,771,859 UART: [afmc] SUBJECT.KEYID = 7
2,772,285 UART: [afmc] AUTHORITY.KEYID = 5
2,808,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,684 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,567 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,286 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,215 UART: [afmc] --
2,851,183 UART: [cold-reset] --
2,852,125 UART: [state] Locking Datavault
2,853,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,044 UART: [state] Locking ICCM
2,854,482 UART: [exit] Launching FMC @ 0x40000130
2,859,811 UART:
2,859,827 UART: Running Caliptra FMC ...
2,860,235 UART:
2,860,289 UART: [state] CFI Enabled
2,870,588 UART: [fht] FMC Alias Private Key: 7
2,977,915 UART: [art] Extend RT PCRs Done
2,978,343 UART: [art] Lock RT PCRs Done
2,979,809 UART: [art] Populate DV Done
2,987,914 UART: [fht] FMC Alias Private Key: 7
2,989,048 UART: [art] Derive CDI
2,989,328 UART: [art] Store in in slot 0x4
3,074,991 UART: [art] Derive Key Pair
3,075,351 UART: [art] Store priv key in slot 0x5
3,088,291 UART: [art] Derive Key Pair - Done
3,103,079 UART: [art] Signing Cert with AUTHO
3,103,559 UART: RITY.KEYID = 7
3,118,905 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,670 UART: [art] PUB.X = DECC1100C178620F2B138DB542596B43D47707375488E41A5AF7B904D0B59FD0EE24EE3E0F46932311307F8CB02B468B
3,126,406 UART: [art] PUB.Y = FFD4C121D07BF28C11BC69AF593D1A824695D3ED22393294F62F29A95A165757E00D1EE0A50AB1E7E49D3C9317B07A41
3,133,356 UART: [art] SIG.R = 957EA21F0B7E927770B662EAA9556CBE2DED37714F04AFDC62F0C1E77DC0716085F99D663654CA9411516D9CD38E97ED
3,140,128 UART: [art] SIG.S = B8D5EA0ED3306AAD488A54D75EFECA7CC864075188D0609FCCBB0E6E70CAE1A6641F49814115CB8CBDAB6D8BD0AA423A
3,163,724 UART: Caliptra RT
3,163,977 UART: [state] CFI Enabled
3,271,369 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,731 UART: [rt]cmd =0x4c444556, len=4
3,312,062 >>> mbox cmd response data (687 bytes)
3,312,063 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,694 UART: [rt]cmd =0x49444549, len=4
3,343,945 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,726 ready_for_fw is high
1,055,726 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,707 >>> mbox cmd response: success
2,620,707 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,465 UART:
2,683,481 UART: Running Caliptra FMC ...
2,683,889 UART:
2,683,943 UART: [state] CFI Enabled
2,694,556 UART: [fht] FMC Alias Private Key: 7
2,802,541 UART: [art] Extend RT PCRs Done
2,802,969 UART: [art] Lock RT PCRs Done
2,804,353 UART: [art] Populate DV Done
2,812,554 UART: [fht] FMC Alias Private Key: 7
2,813,614 UART: [art] Derive CDI
2,813,894 UART: [art] Store in in slot 0x4
2,899,871 UART: [art] Derive Key Pair
2,900,231 UART: [art] Store priv key in slot 0x5
2,913,307 UART: [art] Derive Key Pair - Done
2,928,349 UART: [art] Signing Cert with AUTHO
2,928,829 UART: RITY.KEYID = 7
2,944,117 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,882 UART: [art] PUB.X = A5572EAC5E082A35478A7C5EFAFED2B096657E27E63E86938A6CB4590F8374DE26CE3A6305654D13A60A8B95D32A77F1
2,951,646 UART: [art] PUB.Y = C9ED17E286D9A21FD57AFEAADDE7965CB710ED5CBB74C0D92C1FA58022B56AC9767DC4355E418F0CC925F6F4DD09D96B
2,958,614 UART: [art] SIG.R = 43EEB7DAD7D1B2659A8679AFCEEDA911A16754F96DF7C5D339180DB6C6366B67AB3B0D5868BC6D0529AB717C813197AF
2,965,389 UART: [art] SIG.S = 6AC88309DC2D9E8C2FC87EFB6EC60220BEF615FE216C987C8EE9CBB5B7F9D969E350FD59D8AA944F56B089DD297BE39C
2,989,392 UART: Caliptra RT
2,989,645 UART: [state] CFI Enabled
3,096,252 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,696 UART: [rt]cmd =0x4c444556, len=4
3,136,931 >>> mbox cmd response data (687 bytes)
3,136,932 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,203 UART: [rt]cmd =0x49444549, len=4
3,168,602 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
915,769 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,174,408 ready_for_fw is high
1,174,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,208,118 UART: [idev] --
1,209,275 UART: [ldev] ++
1,209,443 UART: [ldev] CDI.KEYID = 6
1,209,807 UART: [ldev] SUBJECT.KEYID = 5
1,210,234 UART: [ldev] AUTHORITY.KEYID = 7
1,210,697 UART: [ldev] FE.KEYID = 1
1,216,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,676 UART: [fwproc] Recv command 0x46574c44
1,283,409 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,192 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,694 >>> mbox cmd response: success
2,770,694 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,771,851 UART: [afmc] ++
2,772,019 UART: [afmc] CDI.KEYID = 6
2,772,382 UART: [afmc] SUBJECT.KEYID = 7
2,772,808 UART: [afmc] AUTHORITY.KEYID = 5
2,808,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,662 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,381 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,032 UART: [afmc] --
2,850,924 UART: [cold-reset] --
2,851,588 UART: [state] Locking Datavault
2,852,711 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,315 UART: [state] Locking ICCM
2,853,775 UART: [exit] Launching FMC @ 0x40000130
2,859,104 UART:
2,859,120 UART: Running Caliptra FMC ...
2,859,528 UART:
2,859,671 UART: [state] CFI Enabled
2,870,184 UART: [fht] FMC Alias Private Key: 7
2,978,045 UART: [art] Extend RT PCRs Done
2,978,473 UART: [art] Lock RT PCRs Done
2,980,045 UART: [art] Populate DV Done
2,988,236 UART: [fht] FMC Alias Private Key: 7
2,989,224 UART: [art] Derive CDI
2,989,504 UART: [art] Store in in slot 0x4
3,075,223 UART: [art] Derive Key Pair
3,075,583 UART: [art] Store priv key in slot 0x5
3,089,169 UART: [art] Derive Key Pair - Done
3,104,195 UART: [art] Signing Cert with AUTHO
3,104,675 UART: RITY.KEYID = 7
3,119,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,292 UART: [art] PUB.X = 94D54E0C3DFA23F8E5177AD2680378966E0CF8FA78C763E5114CA211AE187AFFB6278F547877179C37B68CAF718B0C16
3,127,054 UART: [art] PUB.Y = C89FB2735B3B6D2E94B8D640650745A2D0DAC1712FD8D3C02EADA6DD20CE410A981E3D4BC5BFB1D2F211623E9E791671
3,134,012 UART: [art] SIG.R = CCEC477A65B50F3C50CAB55118F8F9BE8FCB89885400BB1AD404AE929797CC637A7B21670DCD5BF79F6B3BA0ADEB129D
3,140,773 UART: [art] SIG.S = 79221F01D0A32F1E1A1ED500A47578CCD333E27A00173F0E32761C83B7C4794E884D72BE60C49114043AEE744584F137
3,164,545 UART: Caliptra RT
3,164,890 UART: [state] CFI Enabled
3,273,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,381 UART: [rt]cmd =0x4c444556, len=4
3,313,792 >>> mbox cmd response data (687 bytes)
3,313,793 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,174 UART: [rt]cmd =0x49444549, len=4
3,345,301 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,329 ready_for_fw is high
1,056,329 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,264 >>> mbox cmd response: success
2,621,264 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,683,736 UART:
2,683,752 UART: Running Caliptra FMC ...
2,684,160 UART:
2,684,303 UART: [state] CFI Enabled
2,694,948 UART: [fht] FMC Alias Private Key: 7
2,803,009 UART: [art] Extend RT PCRs Done
2,803,437 UART: [art] Lock RT PCRs Done
2,805,085 UART: [art] Populate DV Done
2,813,248 UART: [fht] FMC Alias Private Key: 7
2,814,240 UART: [art] Derive CDI
2,814,520 UART: [art] Store in in slot 0x4
2,900,171 UART: [art] Derive Key Pair
2,900,531 UART: [art] Store priv key in slot 0x5
2,913,611 UART: [art] Derive Key Pair - Done
2,928,310 UART: [art] Signing Cert with AUTHO
2,928,790 UART: RITY.KEYID = 7
2,943,960 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,725 UART: [art] PUB.X = D3D7D20B5162659FC7E7B1FCAF333C18FB2E98DE7EE86D3AC8A37B9DC2B1290F510F18A5CAF23AD67FB687A5D0794F5D
2,951,508 UART: [art] PUB.Y = 02AC76280F208A939477FB21EDAD61159BB33FE86B8E4C28F3E17973DE5CFA7DAC18E28A6966E6E8FEA86FDB73E82509
2,958,463 UART: [art] SIG.R = D003086C05C5D681FEEEB317B3A52CD4C3422610218847B03EFB9CB58CF2924C4FB12C9A06F6CA9B84AEC5EBAA0C43B2
2,965,236 UART: [art] SIG.S = E4152C40820E6885E3F2154E6E68401F850F4E07E6EE83B9094A22C512AC33A4A4F5F723061B67D6247B231A8458FB67
2,989,008 UART: Caliptra RT
2,989,353 UART: [state] CFI Enabled
3,097,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,155 UART: [rt]cmd =0x4c444556, len=4
3,138,622 >>> mbox cmd response data (687 bytes)
3,138,623 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,032 UART: [rt]cmd =0x49444549, len=4
3,170,385 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,116 UART:
192,478 UART: Running Caliptra ROM ...
193,665 UART:
193,811 UART: [state] CFI Enabled
262,810 UART: [state] LifecycleState = Unprovisioned
264,797 UART: [state] DebugLocked = No
267,244 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,249 UART: [kat] SHA2-256
440,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,469 UART: [kat] ++
452,002 UART: [kat] sha1
461,604 UART: [kat] SHA2-256
464,315 UART: [kat] SHA2-384
469,015 UART: [kat] SHA2-512-ACC
471,384 UART: [kat] ECC-384
2,766,911 UART: [kat] HMAC-384Kdf
2,798,930 UART: [kat] LMS
3,989,183 UART: [kat] --
3,992,507 UART: [cold-reset] ++
3,993,590 UART: [fht] Storing FHT @ 0x50003400
4,003,819 UART: [idev] ++
4,004,459 UART: [idev] CDI.KEYID = 6
4,005,608 UART: [idev] SUBJECT.KEYID = 7
4,006,642 UART: [idev] UDS.KEYID = 0
4,007,622 ready_for_fw is high
4,007,838 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,150,941 UART: [idev] Erasing UDS.KEYID = 0
7,346,263 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,043 UART: [idev] --
7,373,034 UART: [ldev] ++
7,373,613 UART: [ldev] CDI.KEYID = 6
7,374,572 UART: [ldev] SUBJECT.KEYID = 5
7,375,799 UART: [ldev] AUTHORITY.KEYID = 7
7,377,025 UART: [ldev] FE.KEYID = 1
7,422,387 UART: [ldev] Erasing FE.KEYID = 1
10,754,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,977 UART: [ldev] --
13,115,798 UART: [fwproc] Waiting for Commands...
13,118,365 UART: [fwproc] Received command 0x46574c44
13,120,552 UART: [fwproc] Received Image of size 113844 bytes
17,169,956 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,611 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,507 >>> mbox cmd response: success
17,634,044 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,637,749 UART: [afmc] ++
17,638,332 UART: [afmc] CDI.KEYID = 6
17,639,242 UART: [afmc] SUBJECT.KEYID = 7
17,640,511 UART: [afmc] AUTHORITY.KEYID = 5
21,005,968 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,827 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,080 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,488 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,315 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,770 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,066 UART: [afmc] --
23,378,833 UART: [cold-reset] --
23,382,258 UART: [state] Locking Datavault
23,386,957 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,648 UART: [state] Locking ICCM
23,389,839 UART: [exit] Launching FMC @ 0x40000130
23,398,227 UART:
23,398,453 UART: Running Caliptra FMC ...
23,399,549 UART:
23,399,699 UART: [state] CFI Enabled
23,465,528 UART: [fht] FMC Alias Private Key: 7
25,803,692 UART: [art] Extend RT PCRs Done
25,804,916 UART: [art] Lock RT PCRs Done
25,806,105 UART: [art] Populate DV Done
25,811,459 UART: [fht] FMC Alias Private Key: 7
25,813,041 UART: [art] Derive CDI
25,813,847 UART: [art] Store in in slot 0x4
25,874,643 UART: [art] Derive Key Pair
25,875,682 UART: [art] Store priv key in slot 0x5
29,168,274 UART: [art] Derive Key Pair - Done
29,181,701 UART: [art] Signing Cert with AUTHO
29,183,020 UART: RITY.KEYID = 7
31,470,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,591 UART: [art] PUB.X = 2919D6B117E8FDD57F79926EC32C0C2D02075ECBE346CFD0CC8E4467BC6977ECDC2BD70E7E89265B6EE80FED8C809355
31,478,883 UART: [art] PUB.Y = 1B771AAF5A60D2AA94D618A7CEBB57FAF6F7A07E206E0454EFA81628B3C8518B6BB258CD573071FBD9E24A80BCBB9EAC
31,486,149 UART: [art] SIG.R = A6D1E2C229AC1F9F689BA9D45298D1AA99FE566C3A457042B6BA339D224D501D93635D175E113B676188077545EB241F
31,493,480 UART: [art] SIG.S = 8816C98C3C4092E3C4C1F78666F17C145956FA62B4EB5AF4B22CDEDB10D0CC8CB9CECF8274394011248FF099FE56F366
32,797,941 UART: Caliptra RT
32,798,658 UART: [state] CFI Enabled
32,961,926 UART: [rt] RT listening for mailbox commands...
32,993,231 UART: [rt]cmd =0x43455246, len=4
33,006,259 >>> mbox cmd response data (920 bytes)
33,048,693 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,078,764 UART: [rt]cmd =0x43455252, len=4
33,090,000 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,805,482 ready_for_fw is high
3,805,848 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,859,946 >>> mbox cmd response: success
17,860,504 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,548,561 UART:
23,548,921 UART: Running Caliptra FMC ...
23,550,105 UART:
23,550,267 UART: [state] CFI Enabled
23,615,612 UART: [fht] FMC Alias Private Key: 7
25,953,036 UART: [art] Extend RT PCRs Done
25,954,263 UART: [art] Lock RT PCRs Done
25,955,957 UART: [art] Populate DV Done
25,961,204 UART: [fht] FMC Alias Private Key: 7
25,962,795 UART: [art] Derive CDI
25,963,604 UART: [art] Store in in slot 0x4
26,025,857 UART: [art] Derive Key Pair
26,026,911 UART: [art] Store priv key in slot 0x5
29,319,742 UART: [art] Derive Key Pair - Done
29,332,577 UART: [art] Signing Cert with AUTHO
29,333,868 UART: RITY.KEYID = 7
31,621,000 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,512 UART: [art] PUB.X = F7DDDC548E09E98657CC022135091A83FD64A7ADA25FD47931E83B19BC7748B63FF861C2B56BFF84C3C9149E766BECCE
31,629,794 UART: [art] PUB.Y = 25B7D31869D06DCA7604AA4241078D53A0AA4336B3D1B9DADC5182C9513DB9022238543C3BB9F1FFD7CD0A596CBA5755
31,637,029 UART: [art] SIG.R = 9AE3E4CB1E23BFCE75513968330DA791776C98E4EAEBD93E89B1ADEA70B9738643524A805AF641B8AB3F6CEE97B218AF
31,644,410 UART: [art] SIG.S = A8C85E578C4D194E5F175B6E4947A63A47D7F1F379BFB7122433836467B2D69CA976D545D9EA90BEC2CBC377FC8111D8
32,949,703 UART: Caliptra RT
32,950,416 UART: [state] CFI Enabled
33,110,192 UART: [rt] RT listening for mailbox commands...
33,141,538 UART: [rt]cmd =0x43455246, len=4
33,154,395 >>> mbox cmd response data (920 bytes)
33,196,863 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,226,837 UART: [rt]cmd =0x43455252, len=4
33,238,223 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,434 UART:
192,794 UART: Running Caliptra ROM ...
193,983 UART:
603,772 UART: [state] CFI Enabled
620,130 UART: [state] LifecycleState = Unprovisioned
622,108 UART: [state] DebugLocked = No
624,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,519 UART: [kat] SHA2-256
799,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,811 UART: [kat] ++
810,366 UART: [kat] sha1
821,958 UART: [kat] SHA2-256
824,690 UART: [kat] SHA2-384
831,036 UART: [kat] SHA2-512-ACC
833,408 UART: [kat] ECC-384
3,118,408 UART: [kat] HMAC-384Kdf
3,130,713 UART: [kat] LMS
4,320,818 UART: [kat] --
4,325,451 UART: [cold-reset] ++
4,326,531 UART: [fht] Storing FHT @ 0x50003400
4,337,513 UART: [idev] ++
4,338,099 UART: [idev] CDI.KEYID = 6
4,339,014 UART: [idev] SUBJECT.KEYID = 7
4,340,272 UART: [idev] UDS.KEYID = 0
4,341,258 ready_for_fw is high
4,341,452 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,419 UART: [idev] Erasing UDS.KEYID = 0
7,628,044 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,113 UART: [idev] --
7,652,842 UART: [ldev] ++
7,653,411 UART: [ldev] CDI.KEYID = 6
7,654,348 UART: [ldev] SUBJECT.KEYID = 5
7,655,613 UART: [ldev] AUTHORITY.KEYID = 7
7,656,763 UART: [ldev] FE.KEYID = 1
7,671,167 UART: [ldev] Erasing FE.KEYID = 1
10,957,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,375 UART: [ldev] --
13,316,612 UART: [fwproc] Waiting for Commands...
13,319,521 UART: [fwproc] Received command 0x46574c44
13,321,755 UART: [fwproc] Received Image of size 113844 bytes
17,363,272 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,172 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,023 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,661 >>> mbox cmd response: success
17,828,196 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,831,973 UART: [afmc] ++
17,832,588 UART: [afmc] CDI.KEYID = 6
17,833,478 UART: [afmc] SUBJECT.KEYID = 7
17,834,751 UART: [afmc] AUTHORITY.KEYID = 5
21,152,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,087 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,346 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,728 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,554 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,978 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,563 UART: [afmc] --
23,516,466 UART: [cold-reset] --
23,521,308 UART: [state] Locking Datavault
23,526,287 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,041 UART: [state] Locking ICCM
23,529,439 UART: [exit] Launching FMC @ 0x40000130
23,537,785 UART:
23,538,026 UART: Running Caliptra FMC ...
23,539,128 UART:
23,539,287 UART: [state] CFI Enabled
23,547,301 UART: [fht] FMC Alias Private Key: 7
25,878,017 UART: [art] Extend RT PCRs Done
25,879,239 UART: [art] Lock RT PCRs Done
25,881,132 UART: [art] Populate DV Done
25,886,489 UART: [fht] FMC Alias Private Key: 7
25,888,266 UART: [art] Derive CDI
25,889,081 UART: [art] Store in in slot 0x4
25,931,408 UART: [art] Derive Key Pair
25,932,444 UART: [art] Store priv key in slot 0x5
29,174,982 UART: [art] Derive Key Pair - Done
29,187,863 UART: [art] Signing Cert with AUTHO
29,189,165 UART: RITY.KEYID = 7
31,468,473 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,984 UART: [art] PUB.X = 01B5618698A18DDFD564834EAA2115784B48F976BA30B089623CE1A1674423BA475F4E08770712041B8983B7BBDAD6A7
31,477,184 UART: [art] PUB.Y = A87B2BEE55A9D5B3FF54219EE4914B0C7F3023C11A16C80D364E2B3970F8DE35E56BE49D038A62DD2DE0347EA3549055
31,484,435 UART: [art] SIG.R = 1308A35722BFD29E4FF3F6D38AAE4BF67B36874EEA9A9E5BCC9221B1C003DAB246C0030B9CBAA65F293BDF137689FEC4
31,491,855 UART: [art] SIG.S = 34C5B92269921AB90ECFD970D81BAD6762298C7EF0B788A469419BA5F737D8B455360E6A12138D3474E888935FB0A133
32,797,040 UART: Caliptra RT
32,797,759 UART: [state] CFI Enabled
32,914,398 UART: [rt] RT listening for mailbox commands...
32,945,813 UART: [rt]cmd =0x43455246, len=4
32,958,942 >>> mbox cmd response data (920 bytes)
33,001,796 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,032,124 UART: [rt]cmd =0x43455252, len=4
33,043,610 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,131,493 ready_for_fw is high
4,131,912 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,063,046 >>> mbox cmd response: success
18,063,635 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,709,576 UART:
23,709,965 UART: Running Caliptra FMC ...
23,711,070 UART:
23,711,226 UART: [state] CFI Enabled
23,719,231 UART: [fht] FMC Alias Private Key: 7
26,049,682 UART: [art] Extend RT PCRs Done
26,050,917 UART: [art] Lock RT PCRs Done
26,052,531 UART: [art] Populate DV Done
26,057,683 UART: [fht] FMC Alias Private Key: 7
26,059,184 UART: [art] Derive CDI
26,059,928 UART: [art] Store in in slot 0x4
26,102,630 UART: [art] Derive Key Pair
26,103,635 UART: [art] Store priv key in slot 0x5
29,345,480 UART: [art] Derive Key Pair - Done
29,358,535 UART: [art] Signing Cert with AUTHO
29,359,843 UART: RITY.KEYID = 7
31,639,285 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,789 UART: [art] PUB.X = 8D4524D29627AC1229CA3D3C725383E639E2E5AE45C98F58F9872EB304754FF773A126AC3CD2E5E471DB1EF329CCF3CC
31,648,041 UART: [art] PUB.Y = 910AA03453A09C3F0FD88C620328C9CECC67D2242B2D68161EEE88EB5EEA905141BB532871F0E63C5D97A1567101B8C4
31,655,299 UART: [art] SIG.R = 0575A6CD1461F004184EE15A56D7D1D2D621407D6DD12B25D1C8FD2C2F112B3072B2B71A678B89BB7334B8096AA365D6
31,662,666 UART: [art] SIG.S = F6CB9DE396F38A99AEC9C8DAAE3BBC98843655A14E84FEB5222B7C892C7DA35028E3324FBB877AEC90D5FF372839A26A
32,968,064 UART: Caliptra RT
32,968,781 UART: [state] CFI Enabled
33,086,993 UART: [rt] RT listening for mailbox commands...
33,118,682 UART: [rt]cmd =0x43455246, len=4
33,131,607 >>> mbox cmd response data (920 bytes)
33,174,286 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,204,088 UART: [rt]cmd =0x43455252, len=4
33,215,545 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,148 UART:
192,537 UART: Running Caliptra ROM ...
193,737 UART:
193,892 UART: [state] CFI Enabled
264,060 UART: [state] LifecycleState = Unprovisioned
265,918 UART: [state] DebugLocked = No
268,449 UART: [state] WD Timer not started. Device not locked for debugging
272,774 UART: [kat] SHA2-256
451,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,443 UART: [kat] ++
463,985 UART: [kat] sha1
474,476 UART: [kat] SHA2-256
477,521 UART: [kat] SHA2-384
485,073 UART: [kat] SHA2-512-ACC
488,023 UART: [kat] ECC-384
2,950,815 UART: [kat] HMAC-384Kdf
2,974,005 UART: [kat] LMS
3,503,482 UART: [kat] --
3,508,345 UART: [cold-reset] ++
3,510,092 UART: [fht] FHT @ 0x50003400
3,520,868 UART: [idev] ++
3,521,433 UART: [idev] CDI.KEYID = 6
3,522,345 UART: [idev] SUBJECT.KEYID = 7
3,523,516 UART: [idev] UDS.KEYID = 0
3,524,562 ready_for_fw is high
3,524,758 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,317 UART: [idev] Erasing UDS.KEYID = 0
6,028,090 UART: [idev] Sha1 KeyId Algorithm
6,050,395 UART: [idev] --
6,054,339 UART: [ldev] ++
6,054,909 UART: [ldev] CDI.KEYID = 6
6,055,796 UART: [ldev] SUBJECT.KEYID = 5
6,057,013 UART: [ldev] AUTHORITY.KEYID = 7
6,058,220 UART: [ldev] FE.KEYID = 1
6,100,505 UART: [ldev] Erasing FE.KEYID = 1
8,599,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,758 UART: [ldev] --
10,392,358 UART: [fwproc] Wait for Commands...
10,393,866 UART: [fwproc] Recv command 0x46574c44
10,395,962 UART: [fwproc] Recv'd Img size: 114168 bytes
13,795,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,526 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,262,650 >>> mbox cmd response: success
14,263,142 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,267,423 UART: [afmc] ++
14,268,060 UART: [afmc] CDI.KEYID = 6
14,268,956 UART: [afmc] SUBJECT.KEYID = 7
14,270,169 UART: [afmc] AUTHORITY.KEYID = 5
16,812,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,534,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,536,496 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,302 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,317 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,155 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,523 UART: [afmc] --
18,611,067 UART: [cold-reset] --
18,616,283 UART: [state] Locking Datavault
18,621,481 UART: [state] Locking PCR0, PCR1 and PCR31
18,623,126 UART: [state] Locking ICCM
18,625,814 UART: [exit] Launching FMC @ 0x40000130
18,634,211 UART:
18,634,463 UART: Running Caliptra FMC ...
18,635,576 UART:
18,635,759 UART: [state] CFI Enabled
18,693,769 UART: [fht] FMC Alias Private Key: 7
20,457,500 UART: [art] Extend RT PCRs Done
20,458,713 UART: [art] Lock RT PCRs Done
20,460,177 UART: [art] Populate DV Done
20,465,477 UART: [fht] FMC Alias Private Key: 7
20,466,992 UART: [art] Derive CDI
20,467,736 UART: [art] Store in in slot 0x4
20,526,321 UART: [art] Derive Key Pair
20,527,327 UART: [art] Store priv key in slot 0x5
22,990,566 UART: [art] Derive Key Pair - Done
23,003,717 UART: [art] Signing Cert with AUTHO
23,005,027 UART: RITY.KEYID = 7
24,715,602 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,105 UART: [art] PUB.X = C19FDC8EE49CA458641CE5096D08915BADE7F83CB88A34C8CA2BB12BD7E7C109999C417412D3186590CAA5CBFFBC3412
24,724,373 UART: [art] PUB.Y = FF0457E00B6624F5D80E229A0137B69FE89A8EB612CE782EBC44CF7352B3FB5D4BB41E3A2EC1D3723B6E2E690C01614A
24,731,653 UART: [art] SIG.R = 7CC542683910452DFA6A176B75E8548A1C2ACF7450829F8A554AEB2A781BFDF0EF7AB50DC41F136C8D062562B1CF0717
24,739,012 UART: [art] SIG.S = 62B60848FF8F9F8D4AE7B7A49F7081873AFE223C05210DAD6DB2E6F3FE2EC391AA7396F93D12B97D605CF65CBAD8EAB3
25,718,221 UART: Caliptra RT
25,718,935 UART: [state] CFI Enabled
25,883,807 UART: [rt] RT listening for mailbox commands...
25,915,215 UART: [rt]cmd =0x43455246, len=4
25,928,003 >>> mbox cmd response data (887 bytes)
25,970,319 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,000,243 UART: [rt]cmd =0x43455252, len=4
26,011,460 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,385,181 ready_for_fw is high
3,385,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,065,689 >>> mbox cmd response: success
14,066,284 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,343,273 UART:
18,343,665 UART: Running Caliptra FMC ...
18,344,855 UART:
18,345,023 UART: [state] CFI Enabled
18,412,068 UART: [fht] FMC Alias Private Key: 7
20,175,890 UART: [art] Extend RT PCRs Done
20,177,119 UART: [art] Lock RT PCRs Done
20,178,644 UART: [art] Populate DV Done
20,184,056 UART: [fht] FMC Alias Private Key: 7
20,185,712 UART: [art] Derive CDI
20,186,531 UART: [art] Store in in slot 0x4
20,244,955 UART: [art] Derive Key Pair
20,245,998 UART: [art] Store priv key in slot 0x5
22,709,340 UART: [art] Derive Key Pair - Done
22,722,348 UART: [art] Signing Cert with AUTHO
22,723,658 UART: RITY.KEYID = 7
24,435,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,650 UART: [art] PUB.X = F3B434ECCAD5FEC05DE63ECE9D7A21461FE9673DB4FC7E8ECC650B113A1E58AB81D797733AD0587B02E09DE5D9B474C0
24,443,954 UART: [art] PUB.Y = 12774338182CB9A1FC0E840812A211F9CACF425ED4BB5B93959FB90D8306393E0F2C155592D60322257B1B80BC6084F8
24,451,218 UART: [art] SIG.R = 1B2ECAFF6ACBAD397685EE0DADAAC636BEF752176BACF6D624F3A29BA9E6BD2C1F59F4F4C1411BA8476069AD27CBE1A8
24,458,609 UART: [art] SIG.S = 04F559E96C6D49774E4B96B0A8065AE8D27214E558DC259167DFC9C337062EA7705157C3DFA38091167ECE585BB998AD
25,437,073 UART: Caliptra RT
25,437,783 UART: [state] CFI Enabled
25,603,847 UART: [rt] RT listening for mailbox commands...
25,635,459 UART: [rt]cmd =0x43455246, len=4
25,648,411 >>> mbox cmd response data (887 bytes)
25,690,234 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,720,336 UART: [rt]cmd =0x43455252, len=4
25,731,732 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,844 writing to cptra_bootfsm_go
192,908 UART:
193,292 UART: Running Caliptra ROM ...
194,489 UART:
603,883 UART: [state] CFI Enabled
618,278 UART: [state] LifecycleState = Unprovisioned
620,103 UART: [state] DebugLocked = No
621,706 UART: [state] WD Timer not started. Device not locked for debugging
626,089 UART: [kat] SHA2-256
805,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,805 UART: [kat] ++
817,360 UART: [kat] sha1
828,528 UART: [kat] SHA2-256
831,539 UART: [kat] SHA2-384
836,534 UART: [kat] SHA2-512-ACC
839,480 UART: [kat] ECC-384
3,282,557 UART: [kat] HMAC-384Kdf
3,295,102 UART: [kat] LMS
3,824,603 UART: [kat] --
3,829,744 UART: [cold-reset] ++
3,830,751 UART: [fht] FHT @ 0x50003400
3,843,362 UART: [idev] ++
3,843,930 UART: [idev] CDI.KEYID = 6
3,844,854 UART: [idev] SUBJECT.KEYID = 7
3,846,030 UART: [idev] UDS.KEYID = 0
3,847,081 ready_for_fw is high
3,847,294 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,754 UART: [idev] Erasing UDS.KEYID = 0
6,320,762 UART: [idev] Sha1 KeyId Algorithm
6,343,549 UART: [idev] --
6,347,592 UART: [ldev] ++
6,348,161 UART: [ldev] CDI.KEYID = 6
6,349,175 UART: [ldev] SUBJECT.KEYID = 5
6,350,278 UART: [ldev] AUTHORITY.KEYID = 7
6,351,503 UART: [ldev] FE.KEYID = 1
6,362,257 UART: [ldev] Erasing FE.KEYID = 1
8,832,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,368 UART: [ldev] --
10,621,873 UART: [fwproc] Wait for Commands...
10,624,428 UART: [fwproc] Recv command 0x46574c44
10,626,506 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,109,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,178,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,494,717 >>> mbox cmd response: success
14,495,217 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,499,292 UART: [afmc] ++
14,499,874 UART: [afmc] CDI.KEYID = 6
14,500,756 UART: [afmc] SUBJECT.KEYID = 7
14,501,967 UART: [afmc] AUTHORITY.KEYID = 5
16,996,146 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,949 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,953 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,048 UART: [afmc] --
18,792,040 UART: [cold-reset] --
18,796,335 UART: [state] Locking Datavault
18,800,766 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,401 UART: [state] Locking ICCM
18,804,117 UART: [exit] Launching FMC @ 0x40000130
18,812,518 UART:
18,812,763 UART: Running Caliptra FMC ...
18,813,863 UART:
18,814,023 UART: [state] CFI Enabled
18,822,099 UART: [fht] FMC Alias Private Key: 7
20,579,627 UART: [art] Extend RT PCRs Done
20,580,846 UART: [art] Lock RT PCRs Done
20,582,714 UART: [art] Populate DV Done
20,588,129 UART: [fht] FMC Alias Private Key: 7
20,589,633 UART: [art] Derive CDI
20,590,370 UART: [art] Store in in slot 0x4
20,633,287 UART: [art] Derive Key Pair
20,634,325 UART: [art] Store priv key in slot 0x5
23,060,903 UART: [art] Derive Key Pair - Done
23,073,952 UART: [art] Signing Cert with AUTHO
23,075,257 UART: RITY.KEYID = 7
24,780,793 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,290 UART: [art] PUB.X = 145D2D832D15781C2E100C2E9B371BF9F1CCC36678D421FC69BAAD6BCCB781421F64DA255EB1E29097A22AF0E27A20FE
24,789,615 UART: [art] PUB.Y = 632922342970E03BAED86FF1EF18959CCD49611B067722B9EA66155FD57EB122E7382F3E7667CF04C99C42A04BB42552
24,796,810 UART: [art] SIG.R = 9C5A0E9FA69F09370780B568A0A652E7D8D9D4C318B0AE6778ECEEB70AD16932866A8CB963BEDA7397FCCEBCB972F95A
24,804,201 UART: [art] SIG.S = 3E51FC87546C0817F73A2A035A4670D9F0C481131B7ADCDDED36F3BE46F5CF3A049A7BBD2435A89CC92D80EFD906B388
25,783,364 UART: Caliptra RT
25,784,062 UART: [state] CFI Enabled
25,901,013 UART: [rt] RT listening for mailbox commands...
25,932,250 UART: [rt]cmd =0x43455246, len=4
25,945,154 >>> mbox cmd response data (887 bytes)
25,987,644 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,017,712 UART: [rt]cmd =0x43455252, len=4
26,028,948 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,776 writing to cptra_bootfsm_go
3,697,982 ready_for_fw is high
3,698,389 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,475 >>> mbox cmd response: success
14,266,101 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,514,952 UART:
18,515,342 UART: Running Caliptra FMC ...
18,516,542 UART:
18,516,710 UART: [state] CFI Enabled
18,524,495 UART: [fht] FMC Alias Private Key: 7
20,280,756 UART: [art] Extend RT PCRs Done
20,281,974 UART: [art] Lock RT PCRs Done
20,283,604 UART: [art] Populate DV Done
20,288,871 UART: [fht] FMC Alias Private Key: 7
20,290,411 UART: [art] Derive CDI
20,291,227 UART: [art] Store in in slot 0x4
20,333,549 UART: [art] Derive Key Pair
20,334,550 UART: [art] Store priv key in slot 0x5
22,760,824 UART: [art] Derive Key Pair - Done
22,774,088 UART: [art] Signing Cert with AUTHO
22,775,391 UART: RITY.KEYID = 7
24,480,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,395 UART: [art] PUB.X = 28923BDBA0F3CEFF86601B5C232F859544938FEBB68D12D23073941C13F29B4E92D1A15C67FC92B119497A3D9333E181
24,489,645 UART: [art] PUB.Y = 382FD98DD99FF41C3AF794A2D0AC4F547BB86B8754E525FCF5544C4702075C2B386107FC8690D105211033BBB72B191E
24,496,894 UART: [art] SIG.R = 8684FD009004C66786E6DD7F53CA55E76D54092B608ABEE5AD860C566DF96F6841C7EEE31EF52B5A8A47F2FADD54D3FE
24,504,338 UART: [art] SIG.S = 9D8FB15152B419BF643F90EA9AF684BEC971D7ECBB89BBAD0D8E6ADA8994429CEA15E0EF6C421082A608E78EEF8068BB
25,483,716 UART: Caliptra RT
25,484,434 UART: [state] CFI Enabled
25,601,822 UART: [rt] RT listening for mailbox commands...
25,633,061 UART: [rt]cmd =0x43455246, len=4
25,645,903 >>> mbox cmd response data (887 bytes)
25,687,933 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,717,937 UART: [rt]cmd =0x43455252, len=4
25,729,319 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,168 UART:
192,538 UART: Running Caliptra ROM ...
193,735 UART:
193,890 UART: [state] CFI Enabled
265,599 UART: [state] LifecycleState = Unprovisioned
268,016 UART: [state] DebugLocked = No
270,543 UART: [state] WD Timer not started. Device not locked for debugging
274,406 UART: [kat] SHA2-256
464,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,039 UART: [kat] ++
475,493 UART: [kat] sha1
486,864 UART: [kat] SHA2-256
489,878 UART: [kat] SHA2-384
496,221 UART: [kat] SHA2-512-ACC
498,803 UART: [kat] ECC-384
2,946,025 UART: [kat] HMAC-384Kdf
2,972,051 UART: [kat] LMS
3,503,856 UART: [kat] --
3,510,645 UART: [cold-reset] ++
3,513,007 UART: [fht] FHT @ 0x50003400
3,525,837 UART: [idev] ++
3,526,548 UART: [idev] CDI.KEYID = 6
3,527,461 UART: [idev] SUBJECT.KEYID = 7
3,528,720 UART: [idev] UDS.KEYID = 0
3,529,646 ready_for_fw is high
3,529,847 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,673,441 UART: [idev] Erasing UDS.KEYID = 0
6,027,123 UART: [idev] Sha1 KeyId Algorithm
6,049,165 UART: [idev] --
6,053,956 UART: [ldev] ++
6,054,650 UART: [ldev] CDI.KEYID = 6
6,055,547 UART: [ldev] SUBJECT.KEYID = 5
6,056,711 UART: [ldev] AUTHORITY.KEYID = 7
6,057,867 UART: [ldev] FE.KEYID = 1
6,101,430 UART: [ldev] Erasing FE.KEYID = 1
8,604,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,854 UART: [ldev] --
10,393,692 UART: [fwproc] Wait for Commands...
10,396,001 UART: [fwproc] Recv command 0x46574c44
10,398,316 UART: [fwproc] Recv'd Img size: 114168 bytes
13,845,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,037,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,578,348 >>> mbox cmd response: success
14,578,898 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,583,297 UART: [afmc] ++
14,583,994 UART: [afmc] CDI.KEYID = 6
14,585,241 UART: [afmc] SUBJECT.KEYID = 7
14,586,680 UART: [afmc] AUTHORITY.KEYID = 5
17,125,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,856,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,858,294 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,873,497 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,888,612 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,903,641 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,927,982 UART: [afmc] --
18,931,449 UART: [cold-reset] --
18,934,887 UART: [state] Locking Datavault
18,941,116 UART: [state] Locking PCR0, PCR1 and PCR31
18,943,313 UART: [state] Locking ICCM
18,944,817 UART: [exit] Launching FMC @ 0x40000130
18,953,495 UART:
18,953,729 UART: Running Caliptra FMC ...
18,954,830 UART:
18,954,989 UART: [state] CFI Enabled
19,011,003 UART: [fht] FMC Alias Private Key: 7
20,774,846 UART: [art] Extend RT PCRs Done
20,776,079 UART: [art] Lock RT PCRs Done
20,777,818 UART: [art] Populate DV Done
20,783,334 UART: [fht] FMC Alias Private Key: 7
20,784,827 UART: [art] Derive CDI
20,785,590 UART: [art] Store in in slot 0x4
20,843,791 UART: [art] Derive Key Pair
20,844,782 UART: [art] Store priv key in slot 0x5
23,307,548 UART: [art] Derive Key Pair - Done
23,320,815 UART: [art] Signing Cert with AUTHO
23,322,123 UART: RITY.KEYID = 7
25,033,051 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,566 UART: [art] PUB.X = F1C9FAB7E2571D97C301BD2729E112CF7847B792BE73FDC9A6A2EFDA8396060078426A42C11599323B369CD1B70DF305
25,041,844 UART: [art] PUB.Y = 4F16DBFA94365D6A19E1E8BB59CA008DC0E2BDB1FE60D6A62DD24403657507B08BF6F65DD1C88FFF8B73CC897AB0F604
25,049,104 UART: [art] SIG.R = C47E10C7A41FF7499084403AD11ED2D2C636055C6FA8FFBFDA9FD8EA8089DB4FBB80E846B019DA1774B26D8017417BA7
25,056,473 UART: [art] SIG.S = 3D0511FEA675DA65586BB9360D30A2A9C120A4303C00F520900CDCF293159F075CA5341D2E75F2947E75D502BA018137
26,036,028 UART: Caliptra RT
26,036,768 UART: [state] CFI Enabled
26,202,762 UART: [rt] RT listening for mailbox commands...
26,233,985 UART: [rt]cmd =0x43455246, len=4
26,246,749 >>> mbox cmd response data (887 bytes)
26,289,110 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,319,077 UART: [rt]cmd =0x43455252, len=4
26,330,531 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
3,439,701 ready_for_fw is high
3,440,275 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,753,170 >>> mbox cmd response: success
14,753,788 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,069,144 UART:
19,069,533 UART: Running Caliptra FMC ...
19,070,658 UART:
19,070,821 UART: [state] CFI Enabled
19,138,513 UART: [fht] FMC Alias Private Key: 7
20,902,836 UART: [art] Extend RT PCRs Done
20,904,073 UART: [art] Lock RT PCRs Done
20,905,736 UART: [art] Populate DV Done
20,911,208 UART: [fht] FMC Alias Private Key: 7
20,912,749 UART: [art] Derive CDI
20,913,484 UART: [art] Store in in slot 0x4
20,971,368 UART: [art] Derive Key Pair
20,972,410 UART: [art] Store priv key in slot 0x5
23,435,697 UART: [art] Derive Key Pair - Done
23,448,639 UART: [art] Signing Cert with AUTHO
23,449,940 UART: RITY.KEYID = 7
25,161,502 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,015 UART: [art] PUB.X = 7F2D540C9CB7162A4CAA1A4EA4D1290D9B34C847D4CC533386F228153058D60F140E343ED75B2BC858D4417B800F6869
25,170,278 UART: [art] PUB.Y = B523F964BD4453DDBF691464A28CE864A6B0E51D500A68EF0A0E89BC176FC1DB491FD29C9518B73E2199F85FDE86BE11
25,177,508 UART: [art] SIG.R = 9419B65D8D0F61988730464ED9DFCEF312D8883C7FAB27302FB764971F5194A0434A4FC37E8682C5A643772CD58E3DCD
25,184,960 UART: [art] SIG.S = D6E9D2A2A03D637E3940728D844E9F87735FB112DB6A0941893044125DB8B57282CC779919CA6307C754357169693ABF
26,164,263 UART: Caliptra RT
26,164,973 UART: [state] CFI Enabled
26,328,938 UART: [rt] RT listening for mailbox commands...
26,360,248 UART: [rt]cmd =0x43455246, len=4
26,372,902 >>> mbox cmd response data (887 bytes)
26,415,104 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,444,882 UART: [rt]cmd =0x43455252, len=4
26,456,171 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
192,852 UART:
193,224 UART: Running Caliptra ROM ...
194,333 UART:
604,032 UART: [state] CFI Enabled
619,603 UART: [state] LifecycleState = Unprovisioned
621,979 UART: [state] DebugLocked = No
623,718 UART: [state] WD Timer not started. Device not locked for debugging
628,753 UART: [kat] SHA2-256
818,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,410 UART: [kat] ++
829,969 UART: [kat] sha1
841,128 UART: [kat] SHA2-256
844,144 UART: [kat] SHA2-384
850,420 UART: [kat] SHA2-512-ACC
853,070 UART: [kat] ECC-384
3,295,547 UART: [kat] HMAC-384Kdf
3,309,925 UART: [kat] LMS
3,841,775 UART: [kat] --
3,847,326 UART: [cold-reset] ++
3,848,401 UART: [fht] FHT @ 0x50003400
3,858,452 UART: [idev] ++
3,859,166 UART: [idev] CDI.KEYID = 6
3,860,077 UART: [idev] SUBJECT.KEYID = 7
3,861,351 UART: [idev] UDS.KEYID = 0
3,862,287 ready_for_fw is high
3,862,476 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,737 UART: [idev] Erasing UDS.KEYID = 0
6,335,832 UART: [idev] Sha1 KeyId Algorithm
6,358,084 UART: [idev] --
6,363,080 UART: [ldev] ++
6,363,770 UART: [ldev] CDI.KEYID = 6
6,364,702 UART: [ldev] SUBJECT.KEYID = 5
6,365,867 UART: [ldev] AUTHORITY.KEYID = 7
6,367,097 UART: [ldev] FE.KEYID = 1
6,375,964 UART: [ldev] Erasing FE.KEYID = 1
8,854,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,537 UART: [ldev] --
10,646,122 UART: [fwproc] Wait for Commands...
10,647,892 UART: [fwproc] Recv command 0x46574c44
10,650,198 UART: [fwproc] Recv'd Img size: 114168 bytes
14,094,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,105 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,406 >>> mbox cmd response: success
14,832,919 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,835,912 UART: [afmc] ++
14,836,611 UART: [afmc] CDI.KEYID = 6
14,837,859 UART: [afmc] SUBJECT.KEYID = 7
14,839,298 UART: [afmc] AUTHORITY.KEYID = 5
17,339,400 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,578 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,739 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,661 UART: [afmc] --
19,135,633 UART: [cold-reset] --
19,140,253 UART: [state] Locking Datavault
19,144,960 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,185 UART: [state] Locking ICCM
19,149,721 UART: [exit] Launching FMC @ 0x40000130
19,158,403 UART:
19,158,640 UART: Running Caliptra FMC ...
19,159,737 UART:
19,159,900 UART: [state] CFI Enabled
19,168,056 UART: [fht] FMC Alias Private Key: 7
20,925,353 UART: [art] Extend RT PCRs Done
20,926,572 UART: [art] Lock RT PCRs Done
20,928,298 UART: [art] Populate DV Done
20,933,930 UART: [fht] FMC Alias Private Key: 7
20,935,578 UART: [art] Derive CDI
20,936,391 UART: [art] Store in in slot 0x4
20,979,101 UART: [art] Derive Key Pair
20,980,103 UART: [art] Store priv key in slot 0x5
23,406,356 UART: [art] Derive Key Pair - Done
23,419,536 UART: [art] Signing Cert with AUTHO
23,420,852 UART: RITY.KEYID = 7
25,126,538 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,043 UART: [art] PUB.X = 9616BC0CE652EFCBFEBB62ABC7805AFBDA055F5F565A3469C9F970260E943A06D8F58851A0C12CEE5733CE31171C2520
25,135,343 UART: [art] PUB.Y = 091F46E69E9CE008B250F2D38B4CB7230E8071CE0CC6F8DEEB53B6848F47AD3FC81EB9CB8BD3C537B77D7E3B12DBBD9A
25,142,609 UART: [art] SIG.R = D3CA5B6035114EDE46015D5B6643CCA06DE237A10A32B11189DD72C6E7219EC76868EE33C0273FBF99F5B4B9B1A9560A
25,150,012 UART: [art] SIG.S = 6B5C39DDB23F3416DB6AE2E41680015EC52FD3BD1FC83388B1DE1B228F52B6A6B212DD3C29C81388000D36676D6D030A
26,129,388 UART: Caliptra RT
26,130,099 UART: [state] CFI Enabled
26,247,300 UART: [rt] RT listening for mailbox commands...
26,278,596 UART: [rt]cmd =0x43455246, len=4
26,291,330 >>> mbox cmd response data (887 bytes)
26,333,830 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,363,730 UART: [rt]cmd =0x43455252, len=4
26,375,065 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
3,752,096 ready_for_fw is high
3,752,546 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,955,006 >>> mbox cmd response: success
14,955,575 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,204,218 UART:
19,204,613 UART: Running Caliptra FMC ...
19,205,937 UART:
19,206,110 UART: [state] CFI Enabled
19,214,013 UART: [fht] FMC Alias Private Key: 7
20,970,240 UART: [art] Extend RT PCRs Done
20,971,460 UART: [art] Lock RT PCRs Done
20,973,222 UART: [art] Populate DV Done
20,978,854 UART: [fht] FMC Alias Private Key: 7
20,980,393 UART: [art] Derive CDI
20,981,129 UART: [art] Store in in slot 0x4
21,023,830 UART: [art] Derive Key Pair
21,024,834 UART: [art] Store priv key in slot 0x5
23,452,096 UART: [art] Derive Key Pair - Done
23,465,047 UART: [art] Signing Cert with AUTHO
23,466,364 UART: RITY.KEYID = 7
25,172,027 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,564 UART: [art] PUB.X = 8849492F9ADB0DE776136E28AB18EE6B7E48524AB6AECE1A9E72FD6941F83C7EC8FF2B67C1AB25F1F3581581C288E776
25,180,810 UART: [art] PUB.Y = E27EB86C1EA5E21D7A099041F6C7235760D3FB1D2A7B197AE6A13E016F432E88848886C4FE092FE8C509A9D6D5513BAD
25,188,099 UART: [art] SIG.R = 17BC2383B382262775BE1C2E8E0562DC7BC68AEF0FE685BEB8B9173D7CDB9039977ACE2C738A3F1B87513BB40FCDBABB
25,195,492 UART: [art] SIG.S = D52F3C9736E6FF457AEF85E7347F09840E466219374576E640B0634CF2A56D0CF9B02AA88E18A61CE14282797DE849E6
26,174,348 UART: Caliptra RT
26,175,059 UART: [state] CFI Enabled
26,292,896 UART: [rt] RT listening for mailbox commands...
26,324,415 UART: [rt]cmd =0x43455246, len=4
26,337,273 >>> mbox cmd response data (887 bytes)
26,379,588 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,409,241 UART: [rt]cmd =0x43455252, len=4
26,420,654 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
85,947 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,583 UART: [kat] SHA2-256
881,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,629 UART: [kat] ++
885,781 UART: [kat] sha1
890,005 UART: [kat] SHA2-256
891,943 UART: [kat] SHA2-384
894,716 UART: [kat] SHA2-512-ACC
896,617 UART: [kat] ECC-384
902,410 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,605 UART: [fht] Storing FHT @ 0x50003400
1,479,348 UART: [idev] ++
1,479,516 UART: [idev] CDI.KEYID = 6
1,479,876 UART: [idev] SUBJECT.KEYID = 7
1,480,300 UART: [idev] UDS.KEYID = 0
1,480,645 ready_for_fw is high
1,480,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,046 UART: [idev] Erasing UDS.KEYID = 0
1,504,772 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,370 UART: [idev] --
1,514,289 UART: [ldev] ++
1,514,457 UART: [ldev] CDI.KEYID = 6
1,514,820 UART: [ldev] SUBJECT.KEYID = 5
1,515,246 UART: [ldev] AUTHORITY.KEYID = 7
1,515,709 UART: [ldev] FE.KEYID = 1
1,521,097 UART: [ldev] Erasing FE.KEYID = 1
1,546,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,168 UART: [ldev] --
1,585,591 UART: [fwproc] Waiting for Commands...
1,586,448 UART: [fwproc] Received command 0x46574c44
1,587,239 UART: [fwproc] Received Image of size 114168 bytes
2,883,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,591 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,542 >>> mbox cmd response: success
3,076,542 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,077,738 UART: [afmc] ++
3,077,906 UART: [afmc] CDI.KEYID = 6
3,078,268 UART: [afmc] SUBJECT.KEYID = 7
3,078,693 UART: [afmc] AUTHORITY.KEYID = 5
3,113,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,704 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,484 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,212 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,097 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,787 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,512 UART: [afmc] --
3,156,538 UART: [cold-reset] --
3,157,396 UART: [state] Locking Datavault
3,158,439 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,043 UART: [state] Locking ICCM
3,159,533 UART: [exit] Launching FMC @ 0x40000130
3,164,862 UART:
3,164,878 UART: Running Caliptra FMC ...
3,165,286 UART:
3,165,340 UART: [state] CFI Enabled
3,175,393 UART: [fht] FMC Alias Private Key: 7
3,283,650 UART: [art] Extend RT PCRs Done
3,284,078 UART: [art] Lock RT PCRs Done
3,285,618 UART: [art] Populate DV Done
3,293,899 UART: [fht] FMC Alias Private Key: 7
3,294,841 UART: [art] Derive CDI
3,295,121 UART: [art] Store in in slot 0x4
3,380,958 UART: [art] Derive Key Pair
3,381,318 UART: [art] Store priv key in slot 0x5
3,394,902 UART: [art] Derive Key Pair - Done
3,409,388 UART: [art] Signing Cert with AUTHO
3,409,868 UART: RITY.KEYID = 7
3,425,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,007 UART: [art] PUB.X = BD135BE413E966EFF33B5E73ECF423F10CA38EC42BE7294B297EDD9F337C79BFA28FAF9AD4C50A87FDF28DACBC81D759
3,432,799 UART: [art] PUB.Y = 9D4ED11FE27CF9F06ACB3648FD4F1DA4D8620EB5E6760D371EDDE5EAE26A6BC2FFA89A0DB25F796CF678572EE754CFAC
3,439,770 UART: [art] SIG.R = 3CFD715EE72B0EC51FB1E25D83607D26498562FF4044DDE3DC808A4EFF41894B74173A3861D862EDCC3EA1DCEDF04212
3,446,551 UART: [art] SIG.S = 4DF1626DBA5952726961A24D4930C30EAC9F46CC1B76233A8F2D30583E8E2AAEB0217B5E4D4F0E7823073A88A77BB2EF
3,470,649 UART: Caliptra RT
3,470,902 UART: [state] CFI Enabled
3,578,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,996 UART: [rt]cmd =0x43455246, len=4
3,621,479 >>> mbox cmd response data (920 bytes)
3,621,480 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,650,855 UART: [rt]cmd =0x43455252, len=4
3,661,767 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,739 ready_for_fw is high
1,362,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,604 >>> mbox cmd response: success
2,926,604 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,988,444 UART:
2,988,460 UART: Running Caliptra FMC ...
2,988,868 UART:
2,988,922 UART: [state] CFI Enabled
2,999,537 UART: [fht] FMC Alias Private Key: 7
3,107,256 UART: [art] Extend RT PCRs Done
3,107,684 UART: [art] Lock RT PCRs Done
3,109,124 UART: [art] Populate DV Done
3,117,279 UART: [fht] FMC Alias Private Key: 7
3,118,271 UART: [art] Derive CDI
3,118,551 UART: [art] Store in in slot 0x4
3,204,246 UART: [art] Derive Key Pair
3,204,606 UART: [art] Store priv key in slot 0x5
3,217,622 UART: [art] Derive Key Pair - Done
3,232,358 UART: [art] Signing Cert with AUTHO
3,232,838 UART: RITY.KEYID = 7
3,247,894 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,659 UART: [art] PUB.X = C112689E65688E720443B4A6E54380B9744B9AB9D13B90DB98A5464618851B6252655310B418673B9CDD1DF4A086AAD1
3,255,418 UART: [art] PUB.Y = 64CB012340E641706B5F71CB4341B092FDE1DF2269FA3D111727509D2803B169B822AF102821BBBFCF00C5FA5BC3C25B
3,262,346 UART: [art] SIG.R = 9D22B22E65349815BA486C169994806877E9ACF5185E7FF6F852363F51444E24BDC276200C58A3485FDEE3185464AA68
3,269,105 UART: [art] SIG.S = C7F537F7A4A491C4DC062317690F98E4C0D68DCF06E4B4B055DFB19F31645210DB076B95EAA0F725A05B9C9B623D30A1
3,293,116 UART: Caliptra RT
3,293,369 UART: [state] CFI Enabled
3,402,669 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,485 UART: [rt]cmd =0x43455246, len=4
3,445,788 >>> mbox cmd response data (920 bytes)
3,445,789 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,475,290 UART: [rt]cmd =0x43455252, len=4
3,486,097 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,455 UART: [kat] SHA2-512-ACC
897,356 UART: [kat] ECC-384
902,969 UART: [kat] HMAC-384Kdf
907,543 UART: [kat] LMS
1,475,739 UART: [kat] --
1,476,644 UART: [cold-reset] ++
1,477,060 UART: [fht] Storing FHT @ 0x50003400
1,479,867 UART: [idev] ++
1,480,035 UART: [idev] CDI.KEYID = 6
1,480,395 UART: [idev] SUBJECT.KEYID = 7
1,480,819 UART: [idev] UDS.KEYID = 0
1,481,164 ready_for_fw is high
1,481,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,507 UART: [idev] Erasing UDS.KEYID = 0
1,505,481 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,131 UART: [idev] --
1,515,242 UART: [ldev] ++
1,515,410 UART: [ldev] CDI.KEYID = 6
1,515,773 UART: [ldev] SUBJECT.KEYID = 5
1,516,199 UART: [ldev] AUTHORITY.KEYID = 7
1,516,662 UART: [ldev] FE.KEYID = 1
1,522,080 UART: [ldev] Erasing FE.KEYID = 1
1,547,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,647 UART: [ldev] --
1,587,084 UART: [fwproc] Waiting for Commands...
1,587,831 UART: [fwproc] Received command 0x46574c44
1,588,622 UART: [fwproc] Received Image of size 114168 bytes
2,884,716 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,769 >>> mbox cmd response: success
3,077,769 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,991 UART: [afmc] ++
3,079,159 UART: [afmc] CDI.KEYID = 6
3,079,521 UART: [afmc] SUBJECT.KEYID = 7
3,079,946 UART: [afmc] AUTHORITY.KEYID = 5
3,115,189 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,533 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,313 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,926 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,616 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,473 UART: [afmc] --
3,158,545 UART: [cold-reset] --
3,159,197 UART: [state] Locking Datavault
3,160,504 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,108 UART: [state] Locking ICCM
3,161,624 UART: [exit] Launching FMC @ 0x40000130
3,166,953 UART:
3,166,969 UART: Running Caliptra FMC ...
3,167,377 UART:
3,167,520 UART: [state] CFI Enabled
3,178,279 UART: [fht] FMC Alias Private Key: 7
3,286,260 UART: [art] Extend RT PCRs Done
3,286,688 UART: [art] Lock RT PCRs Done
3,288,402 UART: [art] Populate DV Done
3,296,735 UART: [fht] FMC Alias Private Key: 7
3,297,757 UART: [art] Derive CDI
3,298,037 UART: [art] Store in in slot 0x4
3,383,744 UART: [art] Derive Key Pair
3,384,104 UART: [art] Store priv key in slot 0x5
3,397,880 UART: [art] Derive Key Pair - Done
3,412,651 UART: [art] Signing Cert with AUTHO
3,413,131 UART: RITY.KEYID = 7
3,428,495 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,260 UART: [art] PUB.X = F3CD50C922C6A3078E8E2A4E45355148B6AAB978047678C9528BE9F44C6892976026F9C1927652F23CED6B74243CA4A9
3,436,020 UART: [art] PUB.Y = 57A297008EA608AD08D2FC21F52878C1BBA05A2186F6F7E1CCAD84D434F6A8E8EDA69A597F4C8914109FF07557E68045
3,442,948 UART: [art] SIG.R = EE50A9BF5AF692E7E3786E83E8DDFF158834E463D6BC981EE78E565948AFDE6C39631D09FAAF00DD1CC776898F5A35C2
3,449,709 UART: [art] SIG.S = 3A1AF46D513A7A025DA1194C7BC4BBC22C757739FB045C5854BCFE0C4FFF4C5155A424928FEAEFC586059AA93A89E8B2
3,473,662 UART: Caliptra RT
3,474,007 UART: [state] CFI Enabled
3,581,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,186 UART: [rt]cmd =0x43455246, len=4
3,624,655 >>> mbox cmd response data (920 bytes)
3,624,656 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,654,035 UART: [rt]cmd =0x43455252, len=4
3,664,851 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,436 ready_for_fw is high
1,363,436 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,547 >>> mbox cmd response: success
2,927,547 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,988,851 UART:
2,988,867 UART: Running Caliptra FMC ...
2,989,275 UART:
2,989,418 UART: [state] CFI Enabled
3,000,001 UART: [fht] FMC Alias Private Key: 7
3,108,206 UART: [art] Extend RT PCRs Done
3,108,634 UART: [art] Lock RT PCRs Done
3,109,904 UART: [art] Populate DV Done
3,118,467 UART: [fht] FMC Alias Private Key: 7
3,119,451 UART: [art] Derive CDI
3,119,731 UART: [art] Store in in slot 0x4
3,205,158 UART: [art] Derive Key Pair
3,205,518 UART: [art] Store priv key in slot 0x5
3,218,024 UART: [art] Derive Key Pair - Done
3,232,782 UART: [art] Signing Cert with AUTHO
3,233,262 UART: RITY.KEYID = 7
3,248,356 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,121 UART: [art] PUB.X = F2C79C45862AAAFC42CCDAB5F609F2F9745354DF387E8D5E7E43008BEA109997C699665BD9F20929F1C92C2F3B3BAB34
3,255,875 UART: [art] PUB.Y = F64C9A15E4878181FC205A5218C07399C694AF5FFD9A1B2B671D6174B17E9C5525F1FABCC590F0A46B2B9A372789A07C
3,262,831 UART: [art] SIG.R = 2C68DB1FDD3B55841A0D50557FAAF69CF00C5E58A7B1A9937217B990C4961B8430D76509E6C647CFDC21873F465BAEE2
3,269,600 UART: [art] SIG.S = 31E4E022137DBAA1D753CB741EF39DD13D782418F7AC654760F8A7C7423A63DF43FEB2E42B1C432CD9F1AD0D4EFCBC08
3,293,617 UART: Caliptra RT
3,293,962 UART: [state] CFI Enabled
3,402,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,326 UART: [rt]cmd =0x43455246, len=4
3,445,551 >>> mbox cmd response data (920 bytes)
3,445,552 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,965 UART: [rt]cmd =0x43455252, len=4
3,485,879 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,601 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
893,512 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,637 UART: [kat] ++
897,789 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,960 UART: [kat] SHA2-512-ACC
908,861 UART: [kat] ECC-384
918,234 UART: [kat] HMAC-384Kdf
922,920 UART: [kat] LMS
1,171,248 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,757 UART: [fht] FHT @ 0x50003400
1,175,476 UART: [idev] ++
1,175,644 UART: [idev] CDI.KEYID = 6
1,176,004 UART: [idev] SUBJECT.KEYID = 7
1,176,428 UART: [idev] UDS.KEYID = 0
1,176,773 ready_for_fw is high
1,176,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,834 UART: [idev] Erasing UDS.KEYID = 0
1,202,083 UART: [idev] Sha1 KeyId Algorithm
1,210,417 UART: [idev] --
1,211,567 UART: [ldev] ++
1,211,735 UART: [ldev] CDI.KEYID = 6
1,212,098 UART: [ldev] SUBJECT.KEYID = 5
1,212,524 UART: [ldev] AUTHORITY.KEYID = 7
1,212,987 UART: [ldev] FE.KEYID = 1
1,218,545 UART: [ldev] Erasing FE.KEYID = 1
1,244,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,575 UART: [ldev] --
1,283,852 UART: [fwproc] Wait for Commands...
1,284,544 UART: [fwproc] Recv command 0x46574c44
1,285,272 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,102 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,406 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,009 >>> mbox cmd response: success
2,774,009 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,775,157 UART: [afmc] ++
2,775,325 UART: [afmc] CDI.KEYID = 6
2,775,687 UART: [afmc] SUBJECT.KEYID = 7
2,776,112 UART: [afmc] AUTHORITY.KEYID = 5
2,811,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,782 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,510 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,395 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,114 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,090 UART: [afmc] --
2,855,042 UART: [cold-reset] --
2,855,960 UART: [state] Locking Datavault
2,857,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,745 UART: [state] Locking ICCM
2,858,297 UART: [exit] Launching FMC @ 0x40000130
2,863,626 UART:
2,863,642 UART: Running Caliptra FMC ...
2,864,050 UART:
2,864,104 UART: [state] CFI Enabled
2,874,559 UART: [fht] FMC Alias Private Key: 7
2,983,020 UART: [art] Extend RT PCRs Done
2,983,448 UART: [art] Lock RT PCRs Done
2,985,266 UART: [art] Populate DV Done
2,993,495 UART: [fht] FMC Alias Private Key: 7
2,994,481 UART: [art] Derive CDI
2,994,761 UART: [art] Store in in slot 0x4
3,080,244 UART: [art] Derive Key Pair
3,080,604 UART: [art] Store priv key in slot 0x5
3,094,180 UART: [art] Derive Key Pair - Done
3,108,842 UART: [art] Signing Cert with AUTHO
3,109,322 UART: RITY.KEYID = 7
3,124,598 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,363 UART: [art] PUB.X = 242A5742829B146B870F22E7FEAA9F7EBAB03E3B16959CB633D67DF0F763AFD6927AF517F0D5B7E95EC65D526690412B
3,132,138 UART: [art] PUB.Y = 7A1DD75D4F82B06AC7134E761C367C39BF58D9D2B48A0229E1D853FAB841EBA3CDC8D757FADDBBCE54A7997B76036D61
3,139,100 UART: [art] SIG.R = CB3E795676C6B8587A496BA4217B3D27597CE4917C3391A300D0EA74D8FFD2459498E308FECB848933955D445D8A6CA5
3,145,845 UART: [art] SIG.S = 87D5178E7369F4E9FB57EC8D63B999CF4574EEDF94F9FC796293AC3DD610407FAE2D2C9E292D772CAC61CD0B92FDC01F
3,169,919 UART: Caliptra RT
3,170,172 UART: [state] CFI Enabled
3,277,652 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,122 UART: [rt]cmd =0x43455246, len=4
3,319,979 >>> mbox cmd response data (887 bytes)
3,319,980 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,349,371 UART: [rt]cmd =0x43455252, len=4
3,360,038 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,757 ready_for_fw is high
1,060,757 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,738 >>> mbox cmd response: success
2,623,738 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,685,686 UART:
2,685,702 UART: Running Caliptra FMC ...
2,686,110 UART:
2,686,164 UART: [state] CFI Enabled
2,696,597 UART: [fht] FMC Alias Private Key: 7
2,804,368 UART: [art] Extend RT PCRs Done
2,804,796 UART: [art] Lock RT PCRs Done
2,806,600 UART: [art] Populate DV Done
2,814,811 UART: [fht] FMC Alias Private Key: 7
2,815,943 UART: [art] Derive CDI
2,816,223 UART: [art] Store in in slot 0x4
2,901,932 UART: [art] Derive Key Pair
2,902,292 UART: [art] Store priv key in slot 0x5
2,915,556 UART: [art] Derive Key Pair - Done
2,930,417 UART: [art] Signing Cert with AUTHO
2,930,897 UART: RITY.KEYID = 7
2,946,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,354 UART: [art] PUB.X = 170AA58215F292E75FE684660B1A2E18B7E941A3C33C4BA5EBB91DF3CDF07E9064656CC1CB9E7494F0A3DE284456532B
2,954,126 UART: [art] PUB.Y = 73066995AABCBD75A421AF15B6B81E87CC8511E48115DD5BE5DBFAD72B99E40F8ED811471D721647731508428A16CF76
2,961,071 UART: [art] SIG.R = 043D5442D3B0A1AB829BA6E1B75605634A4EDEFEF9A13C865E2149770FE01DFDE7EBAAA3A72F1F5FF8167707BBE91F34
2,967,847 UART: [art] SIG.S = 4F984B0ADD7D4978752653A3E6A0144C502CE46107295E406E954B1D560103528EDA2C884AF686C4D703A793BC64AD17
2,991,815 UART: Caliptra RT
2,992,068 UART: [state] CFI Enabled
3,100,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,611 UART: [rt]cmd =0x43455246, len=4
3,142,562 >>> mbox cmd response data (887 bytes)
3,142,563 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,171,868 UART: [rt]cmd =0x43455252, len=4
3,182,690 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
893,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,282 UART: [kat] ++
897,434 UART: [kat] sha1
901,706 UART: [kat] SHA2-256
903,646 UART: [kat] SHA2-384
906,449 UART: [kat] SHA2-512-ACC
908,350 UART: [kat] ECC-384
918,431 UART: [kat] HMAC-384Kdf
922,945 UART: [kat] LMS
1,171,273 UART: [kat] --
1,172,098 UART: [cold-reset] ++
1,172,468 UART: [fht] FHT @ 0x50003400
1,175,067 UART: [idev] ++
1,175,235 UART: [idev] CDI.KEYID = 6
1,175,595 UART: [idev] SUBJECT.KEYID = 7
1,176,019 UART: [idev] UDS.KEYID = 0
1,176,364 ready_for_fw is high
1,176,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,183 UART: [idev] Erasing UDS.KEYID = 0
1,201,448 UART: [idev] Sha1 KeyId Algorithm
1,209,916 UART: [idev] --
1,211,038 UART: [ldev] ++
1,211,206 UART: [ldev] CDI.KEYID = 6
1,211,569 UART: [ldev] SUBJECT.KEYID = 5
1,211,995 UART: [ldev] AUTHORITY.KEYID = 7
1,212,458 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,426 UART: [ldev] --
1,283,719 UART: [fwproc] Wait for Commands...
1,284,491 UART: [fwproc] Recv command 0x46574c44
1,285,219 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,432 >>> mbox cmd response: success
2,773,432 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,774,540 UART: [afmc] ++
2,774,708 UART: [afmc] CDI.KEYID = 6
2,775,070 UART: [afmc] SUBJECT.KEYID = 7
2,775,495 UART: [afmc] AUTHORITY.KEYID = 5
2,810,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,873 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,486 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,205 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,089 UART: [afmc] --
2,854,157 UART: [cold-reset] --
2,855,051 UART: [state] Locking Datavault
2,856,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,852 UART: [state] Locking ICCM
2,857,490 UART: [exit] Launching FMC @ 0x40000130
2,862,819 UART:
2,862,835 UART: Running Caliptra FMC ...
2,863,243 UART:
2,863,386 UART: [state] CFI Enabled
2,874,111 UART: [fht] FMC Alias Private Key: 7
2,981,638 UART: [art] Extend RT PCRs Done
2,982,066 UART: [art] Lock RT PCRs Done
2,983,358 UART: [art] Populate DV Done
2,991,575 UART: [fht] FMC Alias Private Key: 7
2,992,655 UART: [art] Derive CDI
2,992,935 UART: [art] Store in in slot 0x4
3,078,764 UART: [art] Derive Key Pair
3,079,124 UART: [art] Store priv key in slot 0x5
3,091,978 UART: [art] Derive Key Pair - Done
3,106,977 UART: [art] Signing Cert with AUTHO
3,107,457 UART: RITY.KEYID = 7
3,122,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,744 UART: [art] PUB.X = F362D78EF7DB47870D5361F77D790C7A07A43ACD89798845B772F4E63250F3C791F014E2A95A2A13E5A289CE3976A7BF
3,130,507 UART: [art] PUB.Y = FA12CCB2CA7F82FB565242834BA9E47C9C1FDADA99BD8077F8706CFA08EF7D59B331AC188EBF97AC3E3C6870351465A1
3,137,472 UART: [art] SIG.R = 489291B6D783A503E8E48A7BA89DC5B35A2A6506487425BBE76543BC2A7E85B469E75E60674CD4E5BC4D6F88745B2978
3,144,236 UART: [art] SIG.S = B4517CB19A91C94BC2067719816A6D2F0544A4F58AFE4D7A090F5A0E61F8E6321D77E6311B7300DECE7FF4C448DCB889
3,167,456 UART: Caliptra RT
3,167,801 UART: [state] CFI Enabled
3,275,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,016 UART: [rt]cmd =0x43455246, len=4
3,318,145 >>> mbox cmd response data (887 bytes)
3,318,146 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,347,355 UART: [rt]cmd =0x43455252, len=4
3,358,279 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,122 ready_for_fw is high
1,061,122 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,743 >>> mbox cmd response: success
2,624,743 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,687,195 UART:
2,687,211 UART: Running Caliptra FMC ...
2,687,619 UART:
2,687,762 UART: [state] CFI Enabled
2,698,201 UART: [fht] FMC Alias Private Key: 7
2,805,722 UART: [art] Extend RT PCRs Done
2,806,150 UART: [art] Lock RT PCRs Done
2,807,364 UART: [art] Populate DV Done
2,815,685 UART: [fht] FMC Alias Private Key: 7
2,816,643 UART: [art] Derive CDI
2,816,923 UART: [art] Store in in slot 0x4
2,902,440 UART: [art] Derive Key Pair
2,902,800 UART: [art] Store priv key in slot 0x5
2,916,098 UART: [art] Derive Key Pair - Done
2,931,191 UART: [art] Signing Cert with AUTHO
2,931,671 UART: RITY.KEYID = 7
2,946,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,374 UART: [art] PUB.X = EB9B619264C8FD2B225AB7DB83FBE10EF975464E88F7BDE3534A3C03247578341E6C7B4281F07FA36DC92B440CF3DCA9
2,954,147 UART: [art] PUB.Y = 3D8A2A91CD17E75D048AEC3B9B6DBEB00D7DD7C726EB460F022A698AB6FEB3398B1CB1941D57431C54ABA38E36E04C3D
2,961,105 UART: [art] SIG.R = 92F6BDE824FB2E4C46E3E382A7E7284D457539146406EDC9913B66F82A298C7544B5591922EC5B38266DBA3D89C5B986
2,967,870 UART: [art] SIG.S = AA473D2EA805DE2F988283A39A56EE033E6C6D46390FE0078EF84918CE590C6C4BFE861A2CF3BFD881A5CF3B5ECC461B
2,991,572 UART: Caliptra RT
2,991,917 UART: [state] CFI Enabled
3,099,955 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,385 UART: [rt]cmd =0x43455246, len=4
3,142,648 >>> mbox cmd response data (887 bytes)
3,142,649 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,172,084 UART: [rt]cmd =0x43455252, len=4
3,182,699 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,345 UART: [kat] SHA2-256
901,285 UART: [kat] SHA2-384
904,058 UART: [kat] SHA2-512-ACC
905,959 UART: [kat] ECC-384
915,524 UART: [kat] HMAC-384Kdf
919,982 UART: [kat] LMS
1,168,294 UART: [kat] --
1,169,369 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,645 UART: [idev] ++
1,172,813 UART: [idev] CDI.KEYID = 6
1,173,174 UART: [idev] SUBJECT.KEYID = 7
1,173,599 UART: [idev] UDS.KEYID = 0
1,173,945 ready_for_fw is high
1,173,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,473 UART: [idev] Erasing UDS.KEYID = 0
1,199,053 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,554 UART: [ldev] Erasing FE.KEYID = 1
1,242,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,342 UART: [ldev] --
1,281,806 UART: [fwproc] Wait for Commands...
1,282,613 UART: [fwproc] Recv command 0x46574c44
1,283,346 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,723 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,221 >>> mbox cmd response: success
2,771,221 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,772,422 UART: [afmc] ++
2,772,590 UART: [afmc] CDI.KEYID = 6
2,772,953 UART: [afmc] SUBJECT.KEYID = 7
2,773,379 UART: [afmc] AUTHORITY.KEYID = 5
2,808,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,405 UART: [afmc] --
2,852,311 UART: [cold-reset] --
2,853,061 UART: [state] Locking Datavault
2,854,448 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,052 UART: [state] Locking ICCM
2,855,630 UART: [exit] Launching FMC @ 0x40000130
2,860,959 UART:
2,860,975 UART: Running Caliptra FMC ...
2,861,383 UART:
2,861,437 UART: [state] CFI Enabled
2,871,864 UART: [fht] FMC Alias Private Key: 7
2,979,793 UART: [art] Extend RT PCRs Done
2,980,221 UART: [art] Lock RT PCRs Done
2,981,641 UART: [art] Populate DV Done
2,990,048 UART: [fht] FMC Alias Private Key: 7
2,991,170 UART: [art] Derive CDI
2,991,450 UART: [art] Store in in slot 0x4
3,077,037 UART: [art] Derive Key Pair
3,077,397 UART: [art] Store priv key in slot 0x5
3,089,863 UART: [art] Derive Key Pair - Done
3,104,801 UART: [art] Signing Cert with AUTHO
3,105,281 UART: RITY.KEYID = 7
3,120,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,226 UART: [art] PUB.X = 88360A3BFF65A29EAE0F40137BA2E34702D006BCC96175D6ED39546D953BDC691935257D5B271639D347B6CC19C2E5BF
3,127,988 UART: [art] PUB.Y = 17F6F22E884726F174E8A196A9CDE405756C6808716D394921856E92A6DCA5D3ABA457806C4D1602D3B35C1962D70DF9
3,134,922 UART: [art] SIG.R = A5C752159A642FE748F4CCA770DE9DB918F84FE720216D6BFE654462E0291D02C0319AF12279662A4928A809370666EF
3,141,679 UART: [art] SIG.S = A8B7D4E37BBA9D937EDA8ED6735461A9F020E25463D9013D6A4818CD10F76793A6EEC2483F79AEEDB1A2E20E6B4D2BF0
3,164,880 UART: Caliptra RT
3,165,133 UART: [state] CFI Enabled
3,272,037 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,263 UART: [rt]cmd =0x43455246, len=4
3,314,320 >>> mbox cmd response data (887 bytes)
3,314,321 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,882 UART: [rt]cmd =0x43455252, len=4
3,354,715 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,846 ready_for_fw is high
1,055,846 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,349 >>> mbox cmd response: success
2,618,349 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,679,995 UART:
2,680,011 UART: Running Caliptra FMC ...
2,680,419 UART:
2,680,473 UART: [state] CFI Enabled
2,690,890 UART: [fht] FMC Alias Private Key: 7
2,798,585 UART: [art] Extend RT PCRs Done
2,799,013 UART: [art] Lock RT PCRs Done
2,800,651 UART: [art] Populate DV Done
2,809,050 UART: [fht] FMC Alias Private Key: 7
2,809,996 UART: [art] Derive CDI
2,810,276 UART: [art] Store in in slot 0x4
2,895,895 UART: [art] Derive Key Pair
2,896,255 UART: [art] Store priv key in slot 0x5
2,909,559 UART: [art] Derive Key Pair - Done
2,924,285 UART: [art] Signing Cert with AUTHO
2,924,765 UART: RITY.KEYID = 7
2,940,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,242 UART: [art] PUB.X = 233A52DB0E4E58F561BFB7426B2E8D6103D70D5D5CA75814C505883070A469A396656D17B755857FAF7336A00C45FCDA
2,947,997 UART: [art] PUB.Y = BEAF5BFCE84366D77F494AC7B373BC67B29D32630E12567604AB1B35344C401BA7D976AFDAB5097BAA0E21A299939850
2,954,943 UART: [art] SIG.R = 1FEA9CC1477BDC8F5B37FAC9676D17CE8E8BA21CA5500CE5CC948CDF2614016AACFF0EB4C9A75E9392B68F0A186E7D4F
2,961,727 UART: [art] SIG.S = C943EDBE2CAF1C1907326ECEE975E09051B4303A9FD8ED7D1FBEDFF69813839B51BFD18392EB90DE7F2ED468CA893E7B
2,985,763 UART: Caliptra RT
2,986,016 UART: [state] CFI Enabled
3,093,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,475 UART: [rt]cmd =0x43455246, len=4
3,135,642 >>> mbox cmd response data (887 bytes)
3,135,643 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,092 UART: [rt]cmd =0x43455252, len=4
3,175,952 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,698 UART: [kat] ++
895,850 UART: [kat] sha1
900,178 UART: [kat] SHA2-256
902,118 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,355 UART: [kat] LMS
1,169,667 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,820 UART: [fht] FHT @ 0x50003400
1,173,342 UART: [idev] ++
1,173,510 UART: [idev] CDI.KEYID = 6
1,173,871 UART: [idev] SUBJECT.KEYID = 7
1,174,296 UART: [idev] UDS.KEYID = 0
1,174,642 ready_for_fw is high
1,174,642 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,026 UART: [idev] Sha1 KeyId Algorithm
1,208,000 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,379 UART: [ldev] --
1,281,821 UART: [fwproc] Wait for Commands...
1,282,470 UART: [fwproc] Recv command 0x46574c44
1,283,203 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,076 >>> mbox cmd response: success
2,771,076 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,772,237 UART: [afmc] ++
2,772,405 UART: [afmc] CDI.KEYID = 6
2,772,768 UART: [afmc] SUBJECT.KEYID = 7
2,773,194 UART: [afmc] AUTHORITY.KEYID = 5
2,808,699 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,512 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,231 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,938 UART: [afmc] --
2,852,028 UART: [cold-reset] --
2,853,104 UART: [state] Locking Datavault
2,854,099 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,703 UART: [state] Locking ICCM
2,855,337 UART: [exit] Launching FMC @ 0x40000130
2,860,666 UART:
2,860,682 UART: Running Caliptra FMC ...
2,861,090 UART:
2,861,233 UART: [state] CFI Enabled
2,872,226 UART: [fht] FMC Alias Private Key: 7
2,980,221 UART: [art] Extend RT PCRs Done
2,980,649 UART: [art] Lock RT PCRs Done
2,982,105 UART: [art] Populate DV Done
2,990,622 UART: [fht] FMC Alias Private Key: 7
2,991,714 UART: [art] Derive CDI
2,991,994 UART: [art] Store in in slot 0x4
3,077,815 UART: [art] Derive Key Pair
3,078,175 UART: [art] Store priv key in slot 0x5
3,091,739 UART: [art] Derive Key Pair - Done
3,106,661 UART: [art] Signing Cert with AUTHO
3,107,141 UART: RITY.KEYID = 7
3,122,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,516 UART: [art] PUB.X = 409FEDC35EC3F54F322845CC640AD8776C1DE10F23A0DD89297A1C11121FAD5D05BD400E06E1CA300C2AFA10E0E2C38C
3,130,284 UART: [art] PUB.Y = 0F945886A37C4B67E692684B68F12BC5BD11C40F2CB2C8067DA1EEBD45C804A715B037B1B439D3EFE4FD8A17E9459CCF
3,137,236 UART: [art] SIG.R = 7824BCA78D648970F8E9E294665AB19FE3DA17A3CD1FAE530EC27F094FD50A1FCE5D2283140C35DCF2654297F168EE24
3,144,004 UART: [art] SIG.S = 39BC07A5394D5BC46A0C667BC05413C9A74DA67A0B8A11FC74801B00D0C92D458F933B6188FF8A798E12AE951451CCA4
3,167,896 UART: Caliptra RT
3,168,241 UART: [state] CFI Enabled
3,276,738 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,062 UART: [rt]cmd =0x43455246, len=4
3,319,195 >>> mbox cmd response data (887 bytes)
3,319,196 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,721 UART: [rt]cmd =0x43455252, len=4
3,359,499 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,847 ready_for_fw is high
1,056,847 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,976 >>> mbox cmd response: success
2,621,976 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,684,650 UART:
2,684,666 UART: Running Caliptra FMC ...
2,685,074 UART:
2,685,217 UART: [state] CFI Enabled
2,695,786 UART: [fht] FMC Alias Private Key: 7
2,803,773 UART: [art] Extend RT PCRs Done
2,804,201 UART: [art] Lock RT PCRs Done
2,805,665 UART: [art] Populate DV Done
2,813,554 UART: [fht] FMC Alias Private Key: 7
2,814,594 UART: [art] Derive CDI
2,814,874 UART: [art] Store in in slot 0x4
2,900,617 UART: [art] Derive Key Pair
2,900,977 UART: [art] Store priv key in slot 0x5
2,914,027 UART: [art] Derive Key Pair - Done
2,928,961 UART: [art] Signing Cert with AUTHO
2,929,441 UART: RITY.KEYID = 7
2,944,769 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,534 UART: [art] PUB.X = C853E0CA31A3E859E3C48AE86320D1A1F797491589B273FA7D9AD6FF9AB941BCB6509CD05473658D6B5C62802FC1B0BC
2,952,314 UART: [art] PUB.Y = 66F09F4EEADFCAF6ABF524B91E05316D7B6C814484E59C05F050E918AEBA649DCDF09417FAA6DB895938B619EC8ADB67
2,959,278 UART: [art] SIG.R = B3FC97079913556CD7FEBFF9E3CF4C279F54ACEDB102B513654B1E5F49B81CF0D7E8773860E5FADD1811BC7BB0941F6E
2,966,060 UART: [art] SIG.S = 260E306E2452B40DEA031F7B9F309A9BE04DBD03431E0693F739C446EBDACB8FE1418E26CC8146BADD6B8B4CF374BA05
2,989,655 UART: Caliptra RT
2,990,000 UART: [state] CFI Enabled
3,096,695 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,153 UART: [rt]cmd =0x43455246, len=4
3,139,306 >>> mbox cmd response data (887 bytes)
3,139,307 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,664 UART: [rt]cmd =0x43455252, len=4
3,179,556 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,115 UART:
192,470 UART: Running Caliptra ROM ...
193,598 UART:
193,738 UART: [state] CFI Enabled
266,613 UART: [state] LifecycleState = Unprovisioned
268,529 UART: [state] DebugLocked = No
270,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,331 UART: [kat] SHA2-256
446,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,539 UART: [kat] ++
457,108 UART: [kat] sha1
467,059 UART: [kat] SHA2-256
469,788 UART: [kat] SHA2-384
475,629 UART: [kat] SHA2-512-ACC
477,988 UART: [kat] ECC-384
2,767,777 UART: [kat] HMAC-384Kdf
2,797,939 UART: [kat] LMS
3,988,294 UART: [kat] --
3,993,541 UART: [cold-reset] ++
3,995,904 UART: [fht] Storing FHT @ 0x50003400
4,006,600 UART: [idev] ++
4,007,164 UART: [idev] CDI.KEYID = 6
4,008,225 UART: [idev] SUBJECT.KEYID = 7
4,009,331 UART: [idev] UDS.KEYID = 0
4,010,435 ready_for_fw is high
4,010,667 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,037 UART: [idev] Erasing UDS.KEYID = 0
7,343,369 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,466 UART: [idev] --
7,370,490 UART: [ldev] ++
7,371,110 UART: [ldev] CDI.KEYID = 6
7,372,017 UART: [ldev] SUBJECT.KEYID = 5
7,373,229 UART: [ldev] AUTHORITY.KEYID = 7
7,374,512 UART: [ldev] FE.KEYID = 1
7,422,100 UART: [ldev] Erasing FE.KEYID = 1
10,753,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,218 UART: [ldev] --
13,115,942 UART: [fwproc] Waiting for Commands...
13,119,286 UART: [fwproc] Received command 0x46574c44
13,121,461 UART: [fwproc] Received Image of size 113844 bytes
17,169,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,375 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,284 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,632,647 >>> mbox cmd response: success
17,633,173 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,638,296 UART: [afmc] ++
17,638,885 UART: [afmc] CDI.KEYID = 6
17,639,822 UART: [afmc] SUBJECT.KEYID = 7
17,641,087 UART: [afmc] AUTHORITY.KEYID = 5
21,009,209 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,148 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,400 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,808 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,660 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,355,072 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,377,012 UART: [afmc] --
23,380,493 UART: [cold-reset] --
23,384,564 UART: [state] Locking Datavault
23,389,477 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,238 UART: [state] Locking ICCM
23,392,412 UART: [exit] Launching FMC @ 0x40000130
23,400,800 UART:
23,401,029 UART: Running Caliptra FMC ...
23,402,128 UART:
23,402,284 UART: [state] CFI Enabled
23,470,013 UART: [fht] FMC Alias Private Key: 7
25,807,764 UART: [art] Extend RT PCRs Done
25,808,988 UART: [art] Lock RT PCRs Done
25,810,442 UART: [art] Populate DV Done
25,815,746 UART: [fht] FMC Alias Private Key: 7
25,817,336 UART: [art] Derive CDI
25,818,172 UART: [art] Store in in slot 0x4
25,878,429 UART: [art] Derive Key Pair
25,879,427 UART: [art] Store priv key in slot 0x5
29,172,807 UART: [art] Derive Key Pair - Done
29,186,021 UART: [art] Signing Cert with AUTHO
29,187,366 UART: RITY.KEYID = 7
31,474,880 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,390 UART: [art] PUB.X = A0567C78800ECF9DB8EC427B41C5FEE5D37DE2DC4AB561C784EACB0234F58A177D08E7254AE2EF4EF88AB7D28376B6A1
31,483,642 UART: [art] PUB.Y = 600F391D1DCB24FF2275D16ED9CCC90C7656A4477330E504BA93CF443922EE0CDB3500CC51730DB6D26BBFCD5DBFC7F9
31,490,924 UART: [art] SIG.R = 6C0A3A71D4254FB595A905A62927506BA5EA892E375BADAF997C7437E52127421C61ADA5A2D92BD36EBCD065F015EC31
31,498,295 UART: [art] SIG.S = A96FA3323226B61520E92FA6799B2011D62B70BE41BFAAB3758BBD8330DF4B33E8FBF4C6A22D7DA4EE8D0A522716BF13
32,803,206 UART: Caliptra RT
32,803,916 UART: [state] CFI Enabled
32,964,199 UART: [rt] RT listening for mailbox commands...
32,995,587 UART: [rt]cmd =0x43455252, len=4
33,007,219 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,805,857 ready_for_fw is high
3,806,480 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,888,977 >>> mbox cmd response: success
17,889,674 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,587,439 UART:
23,587,864 UART: Running Caliptra FMC ...
23,589,011 UART:
23,589,171 UART: [state] CFI Enabled
23,656,646 UART: [fht] FMC Alias Private Key: 7
25,994,673 UART: [art] Extend RT PCRs Done
25,995,904 UART: [art] Lock RT PCRs Done
25,997,907 UART: [art] Populate DV Done
26,003,321 UART: [fht] FMC Alias Private Key: 7
26,004,807 UART: [art] Derive CDI
26,005,562 UART: [art] Store in in slot 0x4
26,064,949 UART: [art] Derive Key Pair
26,066,004 UART: [art] Store priv key in slot 0x5
29,358,196 UART: [art] Derive Key Pair - Done
29,371,421 UART: [art] Signing Cert with AUTHO
29,372,721 UART: RITY.KEYID = 7
31,659,254 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,779 UART: [art] PUB.X = 6D3B5F9BC9D95E48DEB4894EDB4E3CAEC75D377A66D64185FAB30BD37D78A58BF46F67075C91BCA7B70B78CD78F48A8B
31,668,028 UART: [art] PUB.Y = CD7F158A233138F3AB2597C658311805A221DD363615681E58D6CFBEB9209B70C01324900045E14C43CA982CD7755C97
31,675,270 UART: [art] SIG.R = 7791A10F4A27597B90700FB4BF7DE56AE047E0A58B72C80FCA4E8EE678DE987F68505C1361BD575E3FFD12968DBBC90B
31,682,658 UART: [art] SIG.S = 333B3745D95140839D6CF5CADAE3E7E30AFE1AD2C39F36181C0894C1299859A6ADF865D9A3EB83E5A39C0C272851F0A2
32,987,993 UART: Caliptra RT
32,988,706 UART: [state] CFI Enabled
33,149,230 UART: [rt] RT listening for mailbox commands...
33,180,628 UART: [rt]cmd =0x43455252, len=4
33,191,954 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,551 UART:
192,925 UART: Running Caliptra ROM ...
194,025 UART:
603,701 UART: [state] CFI Enabled
622,302 UART: [state] LifecycleState = Unprovisioned
624,252 UART: [state] DebugLocked = No
626,566 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,442 UART: [kat] SHA2-256
801,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,712 UART: [kat] ++
812,189 UART: [kat] sha1
823,522 UART: [kat] SHA2-256
826,181 UART: [kat] SHA2-384
831,492 UART: [kat] SHA2-512-ACC
833,841 UART: [kat] ECC-384
3,118,748 UART: [kat] HMAC-384Kdf
3,131,260 UART: [kat] LMS
4,321,313 UART: [kat] --
4,325,552 UART: [cold-reset] ++
4,326,781 UART: [fht] Storing FHT @ 0x50003400
4,338,188 UART: [idev] ++
4,338,753 UART: [idev] CDI.KEYID = 6
4,339,667 UART: [idev] SUBJECT.KEYID = 7
4,340,931 UART: [idev] UDS.KEYID = 0
4,341,976 ready_for_fw is high
4,342,183 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,184 UART: [idev] Erasing UDS.KEYID = 0
7,631,534 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,478 UART: [idev] --
7,657,438 UART: [ldev] ++
7,658,012 UART: [ldev] CDI.KEYID = 6
7,658,981 UART: [ldev] SUBJECT.KEYID = 5
7,660,194 UART: [ldev] AUTHORITY.KEYID = 7
7,661,426 UART: [ldev] FE.KEYID = 1
7,670,720 UART: [ldev] Erasing FE.KEYID = 1
10,960,974 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,844 UART: [ldev] --
13,322,222 UART: [fwproc] Waiting for Commands...
13,324,377 UART: [fwproc] Received command 0x46574c44
13,326,573 UART: [fwproc] Received Image of size 113844 bytes
17,378,977 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,445 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,841,017 >>> mbox cmd response: success
17,841,511 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,845,265 UART: [afmc] ++
17,845,861 UART: [afmc] CDI.KEYID = 6
17,846,750 UART: [afmc] SUBJECT.KEYID = 7
17,848,023 UART: [afmc] AUTHORITY.KEYID = 5
21,165,436 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,553 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,020 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,757 UART: [afmc] SIG.R = D11B25590D224DF7895CB1E4C26F7FFB4CFC97CB1C4C5050B7E2C1A322DC460794B7515D7961874F763DCDB033F20153
23,506,149 UART: [afmc] SIG.S = 085B9B7C6AACF0BE487A5656E044DC9D1CC867877C499599594A48BFF86D7CBB77B13F91A8EB61DAFB12749364BB5B23
23,527,936 UART: [afmc] --
23,532,659 UART: [cold-reset] --
23,537,435 UART: [state] Locking Datavault
23,543,650 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,361 UART: [state] Locking ICCM
23,546,892 UART: [exit] Launching FMC @ 0x40000130
23,555,252 UART:
23,555,534 UART: Running Caliptra FMC ...
23,556,561 UART:
23,556,710 UART: [state] CFI Enabled
23,564,923 UART: [fht] FMC Alias Private Key: 7
25,895,170 UART: [art] Extend RT PCRs Done
25,896,412 UART: [art] Lock RT PCRs Done
25,898,120 UART: [art] Populate DV Done
25,903,586 UART: [fht] FMC Alias Private Key: 7
25,905,290 UART: [art] Derive CDI
25,906,029 UART: [art] Store in in slot 0x4
25,948,680 UART: [art] Derive Key Pair
25,949,678 UART: [art] Store priv key in slot 0x5
29,191,621 UART: [art] Derive Key Pair - Done
29,204,991 UART: [art] Signing Cert with AUTHO
29,206,293 UART: RITY.KEYID = 7
31,485,889 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,394 UART: [art] PUB.X = D8C4B6B8A6B1D8705A123B35B60D0553E0B984E6D333F170F7ADEAF3ADBD6DF428405264EB7CAC309B45907E4C0FED40
31,494,651 UART: [art] PUB.Y = 37FC4DE0A0FF20EFE5A42CD2A7208661A418DA6EB22A680543226915DE5B5F91B3C464172119D2D221707515AEBBB668
31,501,886 UART: [art] SIG.R = 0F9F6E678A9EF78A1F26275D8E4A649FDC2BEA88DD8FA34E77DC4B0FD34A745D52179702CC94E9E0838738F9FA1F815A
31,509,293 UART: [art] SIG.S = FC96579FB8137DD245EBA9CF6948C0C1D75A5494F67DAF21B28BCE0050FA88889B3CD86E380B24A6219AAB104CB49EC7
32,815,078 UART: Caliptra RT
32,815,820 UART: [state] CFI Enabled
32,933,494 UART: [rt] RT listening for mailbox commands...
32,964,905 UART: [rt]cmd =0x43455252, len=4
32,976,260 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
4,129,485 ready_for_fw is high
4,129,997 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,144 >>> mbox cmd response: success
18,070,779 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,708,862 UART:
23,709,265 UART: Running Caliptra FMC ...
23,710,374 UART:
23,710,530 UART: [state] CFI Enabled
23,718,498 UART: [fht] FMC Alias Private Key: 7
26,049,043 UART: [art] Extend RT PCRs Done
26,050,318 UART: [art] Lock RT PCRs Done
26,051,929 UART: [art] Populate DV Done
26,057,303 UART: [fht] FMC Alias Private Key: 7
26,058,961 UART: [art] Derive CDI
26,059,798 UART: [art] Store in in slot 0x4
26,101,970 UART: [art] Derive Key Pair
26,103,018 UART: [art] Store priv key in slot 0x5
29,344,984 UART: [art] Derive Key Pair - Done
29,358,132 UART: [art] Signing Cert with AUTHO
29,359,469 UART: RITY.KEYID = 7
31,638,708 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,213 UART: [art] PUB.X = 849F0ED6FA90932C9D79E45B137349AB927AE849334A2E18D44B37FF64F5F498518DA9D2A58F891A95FF3DB5E9F1D412
31,647,470 UART: [art] PUB.Y = 83AE2F42C71AD52C0701BF567C5D5809C0D41C90993ACD61A6D7C6FA8111B9D3280474F1E71727F87708E28B967F47A5
31,654,709 UART: [art] SIG.R = 53632C70173208E4D67391439034DD927612F95CB6EE92EEDDA07F6098CAF028E1BEBC914130CBACACC527E2E6B913F7
31,662,133 UART: [art] SIG.S = 23580DBF2F61A97C829FF0E6C30C1B51C05C8A2272D8288F3BBDCA8D079ECF7E63CE9AD1F2458F69C18536DF14F841A9
32,966,156 UART: Caliptra RT
32,966,868 UART: [state] CFI Enabled
33,084,579 UART: [rt] RT listening for mailbox commands...
33,115,922 UART: [rt]cmd =0x43455252, len=4
33,127,262 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,182 UART:
192,544 UART: Running Caliptra ROM ...
193,693 UART:
193,842 UART: [state] CFI Enabled
266,164 UART: [state] LifecycleState = Unprovisioned
268,065 UART: [state] DebugLocked = No
269,749 UART: [state] WD Timer not started. Device not locked for debugging
272,796 UART: [kat] SHA2-256
451,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,490 UART: [kat] ++
464,033 UART: [kat] sha1
473,997 UART: [kat] SHA2-256
477,000 UART: [kat] SHA2-384
482,920 UART: [kat] SHA2-512-ACC
485,870 UART: [kat] ECC-384
2,947,442 UART: [kat] HMAC-384Kdf
2,969,776 UART: [kat] LMS
3,499,193 UART: [kat] --
3,504,892 UART: [cold-reset] ++
3,506,470 UART: [fht] FHT @ 0x50003400
3,515,886 UART: [idev] ++
3,516,449 UART: [idev] CDI.KEYID = 6
3,517,358 UART: [idev] SUBJECT.KEYID = 7
3,518,604 UART: [idev] UDS.KEYID = 0
3,519,530 ready_for_fw is high
3,519,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,292 UART: [idev] Erasing UDS.KEYID = 0
6,024,302 UART: [idev] Sha1 KeyId Algorithm
6,046,403 UART: [idev] --
6,050,978 UART: [ldev] ++
6,051,579 UART: [ldev] CDI.KEYID = 6
6,052,468 UART: [ldev] SUBJECT.KEYID = 5
6,053,688 UART: [ldev] AUTHORITY.KEYID = 7
6,054,924 UART: [ldev] FE.KEYID = 1
6,098,530 UART: [ldev] Erasing FE.KEYID = 1
8,604,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,979 UART: [ldev] --
10,413,542 UART: [fwproc] Wait for Commands...
10,415,743 UART: [fwproc] Recv command 0x46574c44
10,417,832 UART: [fwproc] Recv'd Img size: 114168 bytes
13,818,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,280,276 >>> mbox cmd response: success
14,280,793 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,285,790 UART: [afmc] ++
14,286,429 UART: [afmc] CDI.KEYID = 6
14,287,324 UART: [afmc] SUBJECT.KEYID = 7
14,288,374 UART: [afmc] AUTHORITY.KEYID = 5
16,825,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,306 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,107 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,103 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,599,991 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,622,061 UART: [afmc] --
18,625,566 UART: [cold-reset] --
18,630,616 UART: [state] Locking Datavault
18,635,779 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,425 UART: [state] Locking ICCM
18,639,903 UART: [exit] Launching FMC @ 0x40000130
18,648,309 UART:
18,648,544 UART: Running Caliptra FMC ...
18,649,644 UART:
18,649,805 UART: [state] CFI Enabled
18,708,742 UART: [fht] FMC Alias Private Key: 7
20,472,975 UART: [art] Extend RT PCRs Done
20,474,182 UART: [art] Lock RT PCRs Done
20,476,126 UART: [art] Populate DV Done
20,481,647 UART: [fht] FMC Alias Private Key: 7
20,483,240 UART: [art] Derive CDI
20,484,053 UART: [art] Store in in slot 0x4
20,541,735 UART: [art] Derive Key Pair
20,542,802 UART: [art] Store priv key in slot 0x5
23,005,670 UART: [art] Derive Key Pair - Done
23,019,050 UART: [art] Signing Cert with AUTHO
23,020,354 UART: RITY.KEYID = 7
24,731,663 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,163 UART: [art] PUB.X = 31C081B889E8D34D2947FF1807CA22DF0116E96EBC1A033D9F69E2EFB22543364D36037B83DD63C009B7BE32BD251915
24,740,428 UART: [art] PUB.Y = 2A397DC20AC10FC350ABBC905D09F58814718A1520BC93CE24BF4594470A13595F8C765B6161FD91F59A17E380C02EA8
24,747,682 UART: [art] SIG.R = D645F0439B95097295852E215C4C23C98A0C7036E7EB39DB20D81DE25B0BE62231A95AD4C6B92919728A44F7F78B33D8
24,755,036 UART: [art] SIG.S = 29968416427B1FB2680288CF22A19CACE2252B6D2653270DF4DBFA137FC685DB61EA380FB723508B317835F906356EEE
25,734,028 UART: Caliptra RT
25,734,732 UART: [state] CFI Enabled
25,900,581 UART: [rt] RT listening for mailbox commands...
25,932,098 UART: [rt]cmd =0x43455252, len=4
25,943,401 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,381,864 ready_for_fw is high
3,382,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,055,401 >>> mbox cmd response: success
14,056,010 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,340,262 UART:
18,340,644 UART: Running Caliptra FMC ...
18,341,771 UART:
18,341,929 UART: [state] CFI Enabled
18,408,799 UART: [fht] FMC Alias Private Key: 7
20,173,063 UART: [art] Extend RT PCRs Done
20,174,292 UART: [art] Lock RT PCRs Done
20,175,703 UART: [art] Populate DV Done
20,181,436 UART: [fht] FMC Alias Private Key: 7
20,183,042 UART: [art] Derive CDI
20,183,866 UART: [art] Store in in slot 0x4
20,241,458 UART: [art] Derive Key Pair
20,242,551 UART: [art] Store priv key in slot 0x5
22,705,410 UART: [art] Derive Key Pair - Done
22,718,889 UART: [art] Signing Cert with AUTHO
22,720,198 UART: RITY.KEYID = 7
24,429,983 UART: [art] Erasing AUTHORITY.KEYID = 7
24,431,478 UART: [art] PUB.X = 2C14D5F1E667057036FC906BC7B7C3E0AB40055DE63D1E13920538B898B0888EFACE300F5D090AF98B0ED643FC652207
24,438,776 UART: [art] PUB.Y = E53887C5B15646216428703682D9A746B058DE980C59C3E5B6C7058B243909E9687532CC4A13BA3E381B1CC3B3A77ABB
24,446,026 UART: [art] SIG.R = 784A1161A1A5B6B4115AB41D87533E67049A41F0829B12F2C8E7EA06B05BCE29F73E22795B7C400A2761985D5328571E
24,453,362 UART: [art] SIG.S = FD3FA8FDF0E08642AD2EB98864BB3E2900C545A412F925FBCDFC108DEE7C4A5E68A3BFBED7D21D6F1B1BB9CCD7842290
25,432,353 UART: Caliptra RT
25,433,075 UART: [state] CFI Enabled
25,598,268 UART: [rt] RT listening for mailbox commands...
25,629,682 UART: [rt]cmd =0x43455252, len=4
25,641,199 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
193,052 UART:
193,427 UART: Running Caliptra ROM ...
194,557 UART:
604,053 UART: [state] CFI Enabled
617,532 UART: [state] LifecycleState = Unprovisioned
619,408 UART: [state] DebugLocked = No
621,220 UART: [state] WD Timer not started. Device not locked for debugging
624,976 UART: [kat] SHA2-256
804,089 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,681 UART: [kat] ++
816,210 UART: [kat] sha1
827,658 UART: [kat] SHA2-256
830,669 UART: [kat] SHA2-384
837,437 UART: [kat] SHA2-512-ACC
840,430 UART: [kat] ECC-384
3,278,457 UART: [kat] HMAC-384Kdf
3,291,427 UART: [kat] LMS
3,820,942 UART: [kat] --
3,824,439 UART: [cold-reset] ++
3,826,812 UART: [fht] FHT @ 0x50003400
3,838,571 UART: [idev] ++
3,839,134 UART: [idev] CDI.KEYID = 6
3,840,055 UART: [idev] SUBJECT.KEYID = 7
3,841,232 UART: [idev] UDS.KEYID = 0
3,842,281 ready_for_fw is high
3,842,498 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,947 UART: [idev] Erasing UDS.KEYID = 0
6,316,720 UART: [idev] Sha1 KeyId Algorithm
6,340,319 UART: [idev] --
6,345,280 UART: [ldev] ++
6,345,852 UART: [ldev] CDI.KEYID = 6
6,346,765 UART: [ldev] SUBJECT.KEYID = 5
6,347,920 UART: [ldev] AUTHORITY.KEYID = 7
6,349,144 UART: [ldev] FE.KEYID = 1
6,358,429 UART: [ldev] Erasing FE.KEYID = 1
8,834,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,357 UART: [ldev] --
10,623,712 UART: [fwproc] Wait for Commands...
10,626,019 UART: [fwproc] Recv command 0x46574c44
10,628,114 UART: [fwproc] Recv'd Img size: 114168 bytes
14,024,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,907 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,322 >>> mbox cmd response: success
14,484,824 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,488,440 UART: [afmc] ++
14,489,025 UART: [afmc] CDI.KEYID = 6
14,489,956 UART: [afmc] SUBJECT.KEYID = 7
14,491,120 UART: [afmc] AUTHORITY.KEYID = 5
16,991,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,778 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,565 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,764,483 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,787,275 UART: [afmc] --
18,790,383 UART: [cold-reset] --
18,795,486 UART: [state] Locking Datavault
18,799,917 UART: [state] Locking PCR0, PCR1 and PCR31
18,801,560 UART: [state] Locking ICCM
18,804,303 UART: [exit] Launching FMC @ 0x40000130
18,812,752 UART:
18,812,984 UART: Running Caliptra FMC ...
18,814,100 UART:
18,814,263 UART: [state] CFI Enabled
18,822,390 UART: [fht] FMC Alias Private Key: 7
20,579,321 UART: [art] Extend RT PCRs Done
20,580,542 UART: [art] Lock RT PCRs Done
20,582,486 UART: [art] Populate DV Done
20,587,949 UART: [fht] FMC Alias Private Key: 7
20,589,427 UART: [art] Derive CDI
20,590,190 UART: [art] Store in in slot 0x4
20,632,723 UART: [art] Derive Key Pair
20,633,760 UART: [art] Store priv key in slot 0x5
23,060,750 UART: [art] Derive Key Pair - Done
23,074,228 UART: [art] Signing Cert with AUTHO
23,075,528 UART: RITY.KEYID = 7
24,780,824 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,332 UART: [art] PUB.X = C6887AC2EE6DF148AE3A2A690C82BDC27514D4955D271925A586B2EEE6175E0984324230F16425C022C3506D43675989
24,789,552 UART: [art] PUB.Y = 53A3A81D0D0E4309B48EF6FA477D6F2CB8B8CD50C36442D548F8C52AEE5E52FA589C19240FC4237A34A88D3BF7A4C645
24,796,845 UART: [art] SIG.R = E5E99B03396EBC3AF04D3B657EF1208499938EE9C9294DE1FEB5D03041661AEB9EDBDE02E55C6F3E50175DF5B4500CB2
24,804,241 UART: [art] SIG.S = F8EA983E4A0C790A5E1C01C0FFF3F3EAC58F8095F28FAE55EC1538BE741D79388A53BE45C5A5201959EB65F4C711FBEE
25,783,456 UART: Caliptra RT
25,784,167 UART: [state] CFI Enabled
25,902,055 UART: [rt] RT listening for mailbox commands...
25,933,528 UART: [rt]cmd =0x43455252, len=4
25,944,829 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
3,698,527 ready_for_fw is high
3,699,052 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,278,785 >>> mbox cmd response: success
14,279,403 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,527,448 UART:
18,527,854 UART: Running Caliptra FMC ...
18,528,987 UART:
18,529,152 UART: [state] CFI Enabled
18,537,061 UART: [fht] FMC Alias Private Key: 7
20,293,931 UART: [art] Extend RT PCRs Done
20,295,160 UART: [art] Lock RT PCRs Done
20,296,844 UART: [art] Populate DV Done
20,302,293 UART: [fht] FMC Alias Private Key: 7
20,303,924 UART: [art] Derive CDI
20,304,754 UART: [art] Store in in slot 0x4
20,347,300 UART: [art] Derive Key Pair
20,348,304 UART: [art] Store priv key in slot 0x5
22,775,000 UART: [art] Derive Key Pair - Done
22,787,923 UART: [art] Signing Cert with AUTHO
22,789,275 UART: RITY.KEYID = 7
24,494,801 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,312 UART: [art] PUB.X = AAC96E29F4DEB95A55DD157C15FB4A31766F97EF6D4C501756DEEC2CDE30643F17D97C605257D714BC4C37ACE6741CFE
24,503,630 UART: [art] PUB.Y = 837864DAA1CDB68D44438209DA0B855EF554D3258E55BF1A7845CCC37492A9851E3A83F8FD2A5E6C669E01FBBC22FF2E
24,510,888 UART: [art] SIG.R = 2F125807B0C70804D1BC8E347E481AAF27414768DBAFB7CEDEDA06B2CC88C7660608D9E6F1232288E209E6B598B9F597
24,518,283 UART: [art] SIG.S = 0BD8BA9F44EFD8D71D16D5D04C77F18B37B3FF5FCDBCB500000BF1497ABF2966C51E9D627BB2D79F9472297385214C4E
25,497,274 UART: Caliptra RT
25,497,978 UART: [state] CFI Enabled
25,614,948 UART: [rt] RT listening for mailbox commands...
25,646,196 UART: [rt]cmd =0x43455252, len=4
25,657,713 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,130 UART:
192,491 UART: Running Caliptra ROM ...
193,671 UART:
193,827 UART: [state] CFI Enabled
261,782 UART: [state] LifecycleState = Unprovisioned
264,184 UART: [state] DebugLocked = No
265,748 UART: [state] WD Timer not started. Device not locked for debugging
271,248 UART: [kat] SHA2-256
461,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,939 UART: [kat] ++
472,429 UART: [kat] sha1
484,766 UART: [kat] SHA2-256
487,776 UART: [kat] SHA2-384
493,200 UART: [kat] SHA2-512-ACC
495,780 UART: [kat] ECC-384
2,948,672 UART: [kat] HMAC-384Kdf
2,972,279 UART: [kat] LMS
3,504,049 UART: [kat] --
3,508,370 UART: [cold-reset] ++
3,510,914 UART: [fht] FHT @ 0x50003400
3,523,532 UART: [idev] ++
3,524,244 UART: [idev] CDI.KEYID = 6
3,525,278 UART: [idev] SUBJECT.KEYID = 7
3,526,383 UART: [idev] UDS.KEYID = 0
3,527,310 ready_for_fw is high
3,527,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,192 UART: [idev] Erasing UDS.KEYID = 0
6,031,373 UART: [idev] Sha1 KeyId Algorithm
6,053,846 UART: [idev] --
6,059,729 UART: [ldev] ++
6,060,411 UART: [ldev] CDI.KEYID = 6
6,061,325 UART: [ldev] SUBJECT.KEYID = 5
6,062,487 UART: [ldev] AUTHORITY.KEYID = 7
6,063,725 UART: [ldev] FE.KEYID = 1
6,101,758 UART: [ldev] Erasing FE.KEYID = 1
8,609,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,231 UART: [ldev] --
10,415,009 UART: [fwproc] Wait for Commands...
10,418,196 UART: [fwproc] Recv command 0x46574c44
10,420,505 UART: [fwproc] Recv'd Img size: 114168 bytes
13,862,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,596,367 >>> mbox cmd response: success
14,596,843 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,601,182 UART: [afmc] ++
14,601,883 UART: [afmc] CDI.KEYID = 6
14,603,135 UART: [afmc] SUBJECT.KEYID = 7
14,604,573 UART: [afmc] AUTHORITY.KEYID = 5
17,149,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,651 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
18,920,667 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
18,944,041 UART: [afmc] --
18,947,215 UART: [cold-reset] --
18,952,091 UART: [state] Locking Datavault
18,958,167 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,366 UART: [state] Locking ICCM
18,963,116 UART: [exit] Launching FMC @ 0x40000130
18,971,805 UART:
18,972,040 UART: Running Caliptra FMC ...
18,973,147 UART:
18,973,310 UART: [state] CFI Enabled
19,029,780 UART: [fht] FMC Alias Private Key: 7
20,793,581 UART: [art] Extend RT PCRs Done
20,794,801 UART: [art] Lock RT PCRs Done
20,796,481 UART: [art] Populate DV Done
20,801,752 UART: [fht] FMC Alias Private Key: 7
20,803,240 UART: [art] Derive CDI
20,804,002 UART: [art] Store in in slot 0x4
20,862,902 UART: [art] Derive Key Pair
20,863,892 UART: [art] Store priv key in slot 0x5
23,326,609 UART: [art] Derive Key Pair - Done
23,339,880 UART: [art] Signing Cert with AUTHO
23,341,183 UART: RITY.KEYID = 7
25,052,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,079 UART: [art] PUB.X = CDAC33D1361D8B8E17CA499637A0C7039284A85B07FD006EB5B0DC55F12D4C9E23F885D1D6C91308BEDB8C15C206845F
25,061,294 UART: [art] PUB.Y = 18F6FA972AFA1183F27209421F2D60521A413DF05BF10BA55D80504922A5965F81B9FE0F1D5A71178EAFD657B97E28A7
25,068,557 UART: [art] SIG.R = E83D669FCE5737FFC8C43C28B739AB40A5F55DAB02FF2563D3C91CB51BBE4D62FAA318E76B4CC8D75BF1F2DBE94E4FE1
25,075,971 UART: [art] SIG.S = 48A20DC54B0A3E5FFF867450F4832F44CE43744A0275CE16F6C4D7DA01628BA1D3ABBBCF08AB6B9625422C27BD6275FD
26,055,184 UART: Caliptra RT
26,055,903 UART: [state] CFI Enabled
26,220,406 UART: [rt] RT listening for mailbox commands...
26,251,863 UART: [rt]cmd =0x43455252, len=4
26,263,366 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,435,916 ready_for_fw is high
3,436,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,750,493 >>> mbox cmd response: success
14,751,140 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,026,001 UART:
19,026,415 UART: Running Caliptra FMC ...
19,027,617 UART:
19,027,793 UART: [state] CFI Enabled
19,094,826 UART: [fht] FMC Alias Private Key: 7
20,858,559 UART: [art] Extend RT PCRs Done
20,859,794 UART: [art] Lock RT PCRs Done
20,861,431 UART: [art] Populate DV Done
20,867,058 UART: [fht] FMC Alias Private Key: 7
20,868,555 UART: [art] Derive CDI
20,869,321 UART: [art] Store in in slot 0x4
20,927,152 UART: [art] Derive Key Pair
20,928,194 UART: [art] Store priv key in slot 0x5
23,390,830 UART: [art] Derive Key Pair - Done
23,404,199 UART: [art] Signing Cert with AUTHO
23,405,538 UART: RITY.KEYID = 7
25,116,517 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,045 UART: [art] PUB.X = BDEC26F118B7C5F4CFBF12BE84677FEFBFBB1C29DCDDBA25521516BDE3307FBCFD73EA053AAEF408D1FB10E307D4CC9E
25,125,308 UART: [art] PUB.Y = B20BDFCA38583EBF66548E9486E47E81A976901C4FA8D543A1EE2AC6ED04270137C1C92531BC1DC59DB30D0058907E1F
25,132,534 UART: [art] SIG.R = 38DDD4472847734E8034E6643423553AC9EC8946C9D2075E1244569CFD41433A34FA338524E722C6EEBD1E8FF992D98C
25,139,922 UART: [art] SIG.S = 8F7DDCF97E9217875125566474BEE3A332B2622295D3D2A8D191C48EF0B1BB5AF13C71AD94F82360A1C34EC1CEE915B4
26,118,870 UART: Caliptra RT
26,119,583 UART: [state] CFI Enabled
26,284,516 UART: [rt] RT listening for mailbox commands...
26,315,662 UART: [rt]cmd =0x43455252, len=4
26,327,185 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
192,938 UART:
193,328 UART: Running Caliptra ROM ...
194,519 UART:
604,195 UART: [state] CFI Enabled
616,364 UART: [state] LifecycleState = Unprovisioned
618,739 UART: [state] DebugLocked = No
620,833 UART: [state] WD Timer not started. Device not locked for debugging
626,209 UART: [kat] SHA2-256
816,079 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,883 UART: [kat] ++
827,484 UART: [kat] sha1
838,153 UART: [kat] SHA2-256
841,164 UART: [kat] SHA2-384
846,803 UART: [kat] SHA2-512-ACC
849,382 UART: [kat] ECC-384
3,292,095 UART: [kat] HMAC-384Kdf
3,303,686 UART: [kat] LMS
3,835,501 UART: [kat] --
3,841,057 UART: [cold-reset] ++
3,842,002 UART: [fht] FHT @ 0x50003400
3,853,481 UART: [idev] ++
3,854,194 UART: [idev] CDI.KEYID = 6
3,855,103 UART: [idev] SUBJECT.KEYID = 7
3,856,349 UART: [idev] UDS.KEYID = 0
3,857,274 ready_for_fw is high
3,857,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,838 UART: [idev] Erasing UDS.KEYID = 0
6,336,600 UART: [idev] Sha1 KeyId Algorithm
6,358,913 UART: [idev] --
6,363,456 UART: [ldev] ++
6,364,135 UART: [ldev] CDI.KEYID = 6
6,365,044 UART: [ldev] SUBJECT.KEYID = 5
6,366,208 UART: [ldev] AUTHORITY.KEYID = 7
6,367,455 UART: [ldev] FE.KEYID = 1
6,377,943 UART: [ldev] Erasing FE.KEYID = 1
8,857,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,887 UART: [ldev] --
10,645,562 UART: [fwproc] Wait for Commands...
10,648,632 UART: [fwproc] Recv command 0x46574c44
10,650,940 UART: [fwproc] Recv'd Img size: 114168 bytes
14,098,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,049 >>> mbox cmd response: success
14,841,551 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,845,973 UART: [afmc] ++
14,846,689 UART: [afmc] CDI.KEYID = 6
14,847,936 UART: [afmc] SUBJECT.KEYID = 7
14,849,377 UART: [afmc] AUTHORITY.KEYID = 5
17,349,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,293 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,593 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
19,118,739 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
19,141,881 UART: [afmc] --
19,145,540 UART: [cold-reset] --
19,149,563 UART: [state] Locking Datavault
19,155,947 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,137 UART: [state] Locking ICCM
19,160,752 UART: [exit] Launching FMC @ 0x40000130
19,169,383 UART:
19,169,621 UART: Running Caliptra FMC ...
19,170,648 UART:
19,170,796 UART: [state] CFI Enabled
19,179,066 UART: [fht] FMC Alias Private Key: 7
20,936,357 UART: [art] Extend RT PCRs Done
20,937,574 UART: [art] Lock RT PCRs Done
20,939,072 UART: [art] Populate DV Done
20,944,594 UART: [fht] FMC Alias Private Key: 7
20,946,302 UART: [art] Derive CDI
20,947,115 UART: [art] Store in in slot 0x4
20,989,575 UART: [art] Derive Key Pair
20,990,586 UART: [art] Store priv key in slot 0x5
23,416,772 UART: [art] Derive Key Pair - Done
23,430,021 UART: [art] Signing Cert with AUTHO
23,431,352 UART: RITY.KEYID = 7
25,136,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,242 UART: [art] PUB.X = 075BD46EB5A875F472F383023EB5961E55C84E1EE573B358A8855F441F35ECD05127EE5D2E512B98AA0FE7EF6F5DEB73
25,145,540 UART: [art] PUB.Y = AC4AE45135AE9977FC1F2E0DFC3A7F7C38E7B1033132E6CB3E91145547F8AE5EAFCA39CEFDFC0AD19CFCB02FA9523750
25,152,826 UART: [art] SIG.R = C4E682AA929B1A88E3A2912E66E206CE52DC0CF8DB07803BDED73140DB73FFA6AB135C5F2537A037B1F184C0F586EF3D
25,160,225 UART: [art] SIG.S = A00F3DE5C4D96986F0BDEE595AFA0582C568E9824F9F1AF12AC1874AF368C2514D493F6A50AB8B91520B8FE8395C4DDB
26,138,640 UART: Caliptra RT
26,139,356 UART: [state] CFI Enabled
26,256,864 UART: [rt] RT listening for mailbox commands...
26,288,174 UART: [rt]cmd =0x43455252, len=4
26,299,694 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,664 writing to cptra_bootfsm_go
3,755,878 ready_for_fw is high
3,756,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,969,009 >>> mbox cmd response: success
14,969,718 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,223,544 UART:
19,223,939 UART: Running Caliptra FMC ...
19,225,080 UART:
19,225,249 UART: [state] CFI Enabled
19,233,203 UART: [fht] FMC Alias Private Key: 7
20,989,461 UART: [art] Extend RT PCRs Done
20,990,692 UART: [art] Lock RT PCRs Done
20,992,314 UART: [art] Populate DV Done
20,997,801 UART: [fht] FMC Alias Private Key: 7
20,999,278 UART: [art] Derive CDI
21,000,049 UART: [art] Store in in slot 0x4
21,042,604 UART: [art] Derive Key Pair
21,043,614 UART: [art] Store priv key in slot 0x5
23,470,100 UART: [art] Derive Key Pair - Done
23,483,688 UART: [art] Signing Cert with AUTHO
23,485,047 UART: RITY.KEYID = 7
25,190,290 UART: [art] Erasing AUTHORITY.KEYID = 7
25,191,790 UART: [art] PUB.X = EF5AEAA81B7D6C88E6A277A88BBACCE5946CAA0D6BCF30D15BEEB47FBAE0A1CAA6965B14C76CF92577D71280816F3ED2
25,199,088 UART: [art] PUB.Y = E0DC4DA4528FEB5F96123CA2E55245E87E9D0C5CA7D757CBC076CEEF84C6FCB4815ED25C6D81DDDF846410D96333B567
25,206,380 UART: [art] SIG.R = 394E160B922C3F58A335BB19807368A28EC1217D39AC9473596DAD9DD3AA7F9CA6021BF4B03F916424505304FF3A0C55
25,213,776 UART: [art] SIG.S = CE37ED78FE22DD2FCE630C6FA71316EA6170D6C9F5FAAD1384C2C51C990C1D15B2DA54EDA8FEAAA1CB3267031861B8A1
26,193,014 UART: Caliptra RT
26,193,709 UART: [state] CFI Enabled
26,309,921 UART: [rt] RT listening for mailbox commands...
26,341,229 UART: [rt]cmd =0x43455252, len=4
26,352,799 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,599 UART: [kat] SHA2-256
892,537 UART: [kat] SHA2-384
895,276 UART: [kat] SHA2-512-ACC
897,177 UART: [kat] ECC-384
902,894 UART: [kat] HMAC-384Kdf
907,238 UART: [kat] LMS
1,475,434 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,739 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 ready_for_fw is high
1,480,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,514 UART: [idev] Erasing UDS.KEYID = 0
1,505,118 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,515,107 UART: [ldev] ++
1,515,275 UART: [ldev] CDI.KEYID = 6
1,515,638 UART: [ldev] SUBJECT.KEYID = 5
1,516,064 UART: [ldev] AUTHORITY.KEYID = 7
1,516,527 UART: [ldev] FE.KEYID = 1
1,521,443 UART: [ldev] Erasing FE.KEYID = 1
1,546,564 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,330 UART: [ldev] --
1,585,811 UART: [fwproc] Waiting for Commands...
1,586,446 UART: [fwproc] Received command 0x46574c44
1,587,237 UART: [fwproc] Received Image of size 114168 bytes
2,884,089 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,259 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,164 >>> mbox cmd response: success
3,077,164 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,078,566 UART: [afmc] ++
3,078,734 UART: [afmc] CDI.KEYID = 6
3,079,096 UART: [afmc] SUBJECT.KEYID = 7
3,079,521 UART: [afmc] AUTHORITY.KEYID = 5
3,114,544 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,824 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,217 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,148,929 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,156,995 UART: [afmc] --
3,158,083 UART: [cold-reset] --
3,158,797 UART: [state] Locking Datavault
3,160,018 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,622 UART: [state] Locking ICCM
3,161,286 UART: [exit] Launching FMC @ 0x40000130
3,166,615 UART:
3,166,631 UART: Running Caliptra FMC ...
3,167,039 UART:
3,167,093 UART: [state] CFI Enabled
3,177,678 UART: [fht] FMC Alias Private Key: 7
3,285,041 UART: [art] Extend RT PCRs Done
3,285,469 UART: [art] Lock RT PCRs Done
3,286,825 UART: [art] Populate DV Done
3,294,876 UART: [fht] FMC Alias Private Key: 7
3,296,018 UART: [art] Derive CDI
3,296,298 UART: [art] Store in in slot 0x4
3,381,947 UART: [art] Derive Key Pair
3,382,307 UART: [art] Store priv key in slot 0x5
3,395,927 UART: [art] Derive Key Pair - Done
3,411,051 UART: [art] Signing Cert with AUTHO
3,411,531 UART: RITY.KEYID = 7
3,426,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,508 UART: [art] PUB.X = 695EBCAC9030E852B2277E254EE9E4FAE7A081F71AE06212B3498644D16CF155ACED361FFDF1D3FCFD51860B3CC15C17
3,434,291 UART: [art] PUB.Y = 9D1DE6589367F1FA5AF07AE58BE8ED45C242E8CF010AB1683536AD8107CA327CB350F5F06C615056F5A5355355C2421D
3,441,236 UART: [art] SIG.R = 286E3E3F3A57DCA1AB3E7E831F0B9F6A9E599085A07D57F9D65A82140586EC915FFD412F2B05F95C210894B1C7B49033
3,447,998 UART: [art] SIG.S = 9874F1E18BD6ED980905FC85963660078F3F49E35048A92133CE81D1AE885978D10F1D5227CA4236E5E306AAE06B4968
3,472,180 UART: Caliptra RT
3,472,433 UART: [state] CFI Enabled
3,580,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,025 UART: [rt]cmd =0x43455252, len=4
3,622,133 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,161 ready_for_fw is high
1,362,161 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,774 >>> mbox cmd response: success
2,925,774 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,986,466 UART:
2,986,482 UART: Running Caliptra FMC ...
2,986,890 UART:
2,986,944 UART: [state] CFI Enabled
2,997,531 UART: [fht] FMC Alias Private Key: 7
3,105,168 UART: [art] Extend RT PCRs Done
3,105,596 UART: [art] Lock RT PCRs Done
3,106,976 UART: [art] Populate DV Done
3,115,175 UART: [fht] FMC Alias Private Key: 7
3,116,119 UART: [art] Derive CDI
3,116,399 UART: [art] Store in in slot 0x4
3,202,186 UART: [art] Derive Key Pair
3,202,546 UART: [art] Store priv key in slot 0x5
3,215,546 UART: [art] Derive Key Pair - Done
3,230,430 UART: [art] Signing Cert with AUTHO
3,230,910 UART: RITY.KEYID = 7
3,246,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,095 UART: [art] PUB.X = 6AEF19A7466A8F1C1F4BDFA66DB8BB2739C39F99E664DAC2877E96C813FEFB46F1BB5F973918659551F96B829F774183
3,253,873 UART: [art] PUB.Y = 82AC0741A1A4D8992C5E32EB2C669965BC40F2D4E9E66B7E1F527AE16DDC8CAB31A8918D325F36244BF17505E5AB1209
3,260,822 UART: [art] SIG.R = 5C94E242A621A0D57DE516E855088E6534FD52B6AC3D780404B4359C43E8A82A58B138C93D334EB1C6C1A493713B1942
3,267,579 UART: [art] SIG.S = 71AFEE33A3BB6CAAFBBFA863B88A899828F62F319E1A46487E43B740AE3A728FF93620B9D537987A4F821FA832E0608C
3,290,972 UART: Caliptra RT
3,291,225 UART: [state] CFI Enabled
3,399,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,456 UART: [rt]cmd =0x43455252, len=4
3,440,220 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,336 UART: [kat] SHA2-256
882,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,382 UART: [kat] ++
886,534 UART: [kat] sha1
890,596 UART: [kat] SHA2-256
892,534 UART: [kat] SHA2-384
895,247 UART: [kat] SHA2-512-ACC
897,148 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,611 UART: [kat] LMS
1,475,807 UART: [kat] --
1,476,652 UART: [cold-reset] ++
1,477,146 UART: [fht] Storing FHT @ 0x50003400
1,479,923 UART: [idev] ++
1,480,091 UART: [idev] CDI.KEYID = 6
1,480,451 UART: [idev] SUBJECT.KEYID = 7
1,480,875 UART: [idev] UDS.KEYID = 0
1,481,220 ready_for_fw is high
1,481,220 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,837 UART: [idev] Erasing UDS.KEYID = 0
1,504,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,607 UART: [idev] --
1,514,494 UART: [ldev] ++
1,514,662 UART: [ldev] CDI.KEYID = 6
1,515,025 UART: [ldev] SUBJECT.KEYID = 5
1,515,451 UART: [ldev] AUTHORITY.KEYID = 7
1,515,914 UART: [ldev] FE.KEYID = 1
1,521,334 UART: [ldev] Erasing FE.KEYID = 1
1,546,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,615 UART: [ldev] --
1,586,130 UART: [fwproc] Waiting for Commands...
1,586,939 UART: [fwproc] Received command 0x46574c44
1,587,730 UART: [fwproc] Received Image of size 114168 bytes
2,883,894 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,343 >>> mbox cmd response: success
3,076,343 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,077,567 UART: [afmc] ++
3,077,735 UART: [afmc] CDI.KEYID = 6
3,078,097 UART: [afmc] SUBJECT.KEYID = 7
3,078,522 UART: [afmc] AUTHORITY.KEYID = 5
3,113,847 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,763 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,648 UART: [afmc] SIG.R = 1A743C3A7D904AB160CD61DC895A36FA36F447F58D4DDDA3052B0AD9776D66E7B60BFE7137FFC32B58F5ADDFF97E3916
3,148,360 UART: [afmc] SIG.S = CAC50B695CBE242FDD8B0AA6597D17EDA5AEF329775580D553F8608A51D5B147B9505EDF40F3AB8CC947D612826E0DFF
3,156,226 UART: [afmc] --
3,157,196 UART: [cold-reset] --
3,158,328 UART: [state] Locking Datavault
3,159,457 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,061 UART: [state] Locking ICCM
3,160,489 UART: [exit] Launching FMC @ 0x40000130
3,165,818 UART:
3,165,834 UART: Running Caliptra FMC ...
3,166,242 UART:
3,166,385 UART: [state] CFI Enabled
3,176,724 UART: [fht] FMC Alias Private Key: 7
3,284,773 UART: [art] Extend RT PCRs Done
3,285,201 UART: [art] Lock RT PCRs Done
3,286,747 UART: [art] Populate DV Done
3,295,064 UART: [fht] FMC Alias Private Key: 7
3,296,110 UART: [art] Derive CDI
3,296,390 UART: [art] Store in in slot 0x4
3,382,255 UART: [art] Derive Key Pair
3,382,615 UART: [art] Store priv key in slot 0x5
3,395,387 UART: [art] Derive Key Pair - Done
3,410,298 UART: [art] Signing Cert with AUTHO
3,410,778 UART: RITY.KEYID = 7
3,425,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,749 UART: [art] PUB.X = AB725DDDCE3AB8BA549DE3B1F8CB7949961C3E0FE7873A228C36B3C26F119B941C177341FA2138570134689221AF40E5
3,433,517 UART: [art] PUB.Y = B286515B21A1C2918ACB7B67B9EB6E86D1DBCCA523AE3E6C762F7682D2A09046922DD2AD56403CAFF23B6E4E9AEBA3A7
3,440,487 UART: [art] SIG.R = E3E0AD32F4561950C57B77EF63E4511EDBC90746F655D166E837B67EDE68FB528C0975CF4DDC9E02F529A6A2C4C19815
3,447,256 UART: [art] SIG.S = 9552EF64858EC9157EDB577CB4DE00C8EEFCB96DABEF9E65BF3FCB5EE438EB6AC862A9654B4722B79F46E06335F39C15
3,471,111 UART: Caliptra RT
3,471,456 UART: [state] CFI Enabled
3,580,109 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,791 UART: [rt]cmd =0x43455252, len=4
3,621,500 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,886 ready_for_fw is high
1,362,886 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,947 >>> mbox cmd response: success
2,926,947 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,989,055 UART:
2,989,071 UART: Running Caliptra FMC ...
2,989,479 UART:
2,989,622 UART: [state] CFI Enabled
3,000,113 UART: [fht] FMC Alias Private Key: 7
3,107,682 UART: [art] Extend RT PCRs Done
3,108,110 UART: [art] Lock RT PCRs Done
3,109,560 UART: [art] Populate DV Done
3,117,697 UART: [fht] FMC Alias Private Key: 7
3,118,669 UART: [art] Derive CDI
3,118,949 UART: [art] Store in in slot 0x4
3,204,282 UART: [art] Derive Key Pair
3,204,642 UART: [art] Store priv key in slot 0x5
3,217,420 UART: [art] Derive Key Pair - Done
3,232,708 UART: [art] Signing Cert with AUTHO
3,233,188 UART: RITY.KEYID = 7
3,248,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,845 UART: [art] PUB.X = 93B9AA6E22B4F5EC50F711CD52551F67FB3AF49BC86794A75C68B9767BB61DE45EEBE0D9E43569015C9FAB381B63DE1B
3,255,628 UART: [art] PUB.Y = 42980D0DB0F479998BC9CF8EBEC14407AF32F42C070D3C8092318819A656B6B71EB8291D7D37FD31D46E83751BD9F209
3,262,562 UART: [art] SIG.R = E5F6C09555E2B6C3B4DD4A4BDF06205BFAA2FE5B253741F65EA0EC1C19AB2FAFBAF926151BAC7FED8E117DBF1384DE93
3,269,359 UART: [art] SIG.S = 3EEB42DFD85C38B9B4411090C5EB2E1EAE8173FC6966A9CAD766AD29A78D9EFCA72C038B31F32754116E7B02BABEB1C7
3,293,590 UART: Caliptra RT
3,293,935 UART: [state] CFI Enabled
3,402,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,903 UART: [rt]cmd =0x43455252, len=4
3,443,711 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
893,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,357 UART: [kat] ++
897,509 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,470 UART: [kat] SHA2-512-ACC
908,371 UART: [kat] ECC-384
917,992 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,759 UART: [cold-reset] ++
1,172,311 UART: [fht] FHT @ 0x50003400
1,175,048 UART: [idev] ++
1,175,216 UART: [idev] CDI.KEYID = 6
1,175,576 UART: [idev] SUBJECT.KEYID = 7
1,176,000 UART: [idev] UDS.KEYID = 0
1,176,345 ready_for_fw is high
1,176,345 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,020 UART: [idev] Erasing UDS.KEYID = 0
1,201,817 UART: [idev] Sha1 KeyId Algorithm
1,210,351 UART: [idev] --
1,211,457 UART: [ldev] ++
1,211,625 UART: [ldev] CDI.KEYID = 6
1,211,988 UART: [ldev] SUBJECT.KEYID = 5
1,212,414 UART: [ldev] AUTHORITY.KEYID = 7
1,212,877 UART: [ldev] FE.KEYID = 1
1,218,107 UART: [ldev] Erasing FE.KEYID = 1
1,244,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,095 UART: [ldev] --
1,283,562 UART: [fwproc] Wait for Commands...
1,284,200 UART: [fwproc] Recv command 0x46574c44
1,284,928 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,839 >>> mbox cmd response: success
2,773,839 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,775,157 UART: [afmc] ++
2,775,325 UART: [afmc] CDI.KEYID = 6
2,775,687 UART: [afmc] SUBJECT.KEYID = 7
2,776,112 UART: [afmc] AUTHORITY.KEYID = 5
2,811,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,341 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,846,051 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,853,665 UART: [afmc] --
2,854,573 UART: [cold-reset] --
2,855,445 UART: [state] Locking Datavault
2,856,640 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,244 UART: [state] Locking ICCM
2,857,766 UART: [exit] Launching FMC @ 0x40000130
2,863,095 UART:
2,863,111 UART: Running Caliptra FMC ...
2,863,519 UART:
2,863,573 UART: [state] CFI Enabled
2,874,056 UART: [fht] FMC Alias Private Key: 7
2,982,193 UART: [art] Extend RT PCRs Done
2,982,621 UART: [art] Lock RT PCRs Done
2,983,929 UART: [art] Populate DV Done
2,991,882 UART: [fht] FMC Alias Private Key: 7
2,992,868 UART: [art] Derive CDI
2,993,148 UART: [art] Store in in slot 0x4
3,078,851 UART: [art] Derive Key Pair
3,079,211 UART: [art] Store priv key in slot 0x5
3,092,023 UART: [art] Derive Key Pair - Done
3,107,059 UART: [art] Signing Cert with AUTHO
3,107,539 UART: RITY.KEYID = 7
3,122,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,016 UART: [art] PUB.X = A65ABA414C8389D7C90ED05CB3691002EF448F4CC918CAB285B743D00ACE96E352C0BB78E8484EFD66CBD457A936CA47
3,129,791 UART: [art] PUB.Y = C944A2E502945106D034239392D0379A1A10E3F336FB99F6EF28842CCB9E55D0AC058160E44FD39BF657760313B072F9
3,136,723 UART: [art] SIG.R = BB8CAA13A72379DFA4D694996B1FD2F8591DB78F95D098AD5B41369161F37032CB1BBBDEE8D766EBE91B2D9E5A7616C0
3,143,509 UART: [art] SIG.S = E4CFA5C4FDB642747BAC5CE1F1ABFF7C4DB07D9A750182DC9364D364B50227CCFFFB0C1A242694B3044ABE395A7CCAD1
3,166,812 UART: Caliptra RT
3,167,065 UART: [state] CFI Enabled
3,275,512 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,896 UART: [rt]cmd =0x43455252, len=4
3,316,679 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,499 ready_for_fw is high
1,060,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,894 >>> mbox cmd response: success
2,624,894 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,687,584 UART:
2,687,600 UART: Running Caliptra FMC ...
2,688,008 UART:
2,688,062 UART: [state] CFI Enabled
2,698,089 UART: [fht] FMC Alias Private Key: 7
2,806,784 UART: [art] Extend RT PCRs Done
2,807,212 UART: [art] Lock RT PCRs Done
2,808,606 UART: [art] Populate DV Done
2,816,847 UART: [fht] FMC Alias Private Key: 7
2,817,851 UART: [art] Derive CDI
2,818,131 UART: [art] Store in in slot 0x4
2,903,818 UART: [art] Derive Key Pair
2,904,178 UART: [art] Store priv key in slot 0x5
2,917,488 UART: [art] Derive Key Pair - Done
2,932,703 UART: [art] Signing Cert with AUTHO
2,933,183 UART: RITY.KEYID = 7
2,948,559 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,324 UART: [art] PUB.X = B45D545E2D6F1EBC01207039816EE3A704A8FA0A9FDD8CFF6BFAD2C2742419E4DF813270EAE486136001A51E84288930
2,956,088 UART: [art] PUB.Y = 9FA7FA05383BA77FBCD2A9634AC6F513882C25CA1C8206CD4E5B194C657814F7C59A86AAEB0BFF7931FBC72F0B59E11D
2,963,044 UART: [art] SIG.R = 9DA3CA46E5822D8D6DBC040E30277CE58386A5331335D2358648AEE7116E1276300B5402BCFD1435193B501C45EF91BF
2,969,800 UART: [art] SIG.S = 8430CFF85DB8B7D990CF86057346D0BD93DD1E4F7A90940B84DAE61827E73000B90278BDBFEA17F3EC67CEB79E50179D
2,993,600 UART: Caliptra RT
2,993,853 UART: [state] CFI Enabled
3,102,524 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,010 UART: [rt]cmd =0x43455252, len=4
3,143,825 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,170 UART: [state] WD Timer not started. Device not locked for debugging
88,513 UART: [kat] SHA2-256
894,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,288 UART: [kat] ++
898,440 UART: [kat] sha1
902,730 UART: [kat] SHA2-256
904,670 UART: [kat] SHA2-384
907,469 UART: [kat] SHA2-512-ACC
909,370 UART: [kat] ECC-384
918,815 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,664 UART: [cold-reset] ++
1,173,088 UART: [fht] FHT @ 0x50003400
1,175,951 UART: [idev] ++
1,176,119 UART: [idev] CDI.KEYID = 6
1,176,479 UART: [idev] SUBJECT.KEYID = 7
1,176,903 UART: [idev] UDS.KEYID = 0
1,177,248 ready_for_fw is high
1,177,248 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,749 UART: [idev] Erasing UDS.KEYID = 0
1,202,348 UART: [idev] Sha1 KeyId Algorithm
1,210,910 UART: [idev] --
1,212,024 UART: [ldev] ++
1,212,192 UART: [ldev] CDI.KEYID = 6
1,212,555 UART: [ldev] SUBJECT.KEYID = 5
1,212,981 UART: [ldev] AUTHORITY.KEYID = 7
1,213,444 UART: [ldev] FE.KEYID = 1
1,218,186 UART: [ldev] Erasing FE.KEYID = 1
1,244,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,834 UART: [ldev] --
1,284,285 UART: [fwproc] Wait for Commands...
1,285,063 UART: [fwproc] Recv command 0x46574c44
1,285,791 UART: [fwproc] Recv'd Img size: 114168 bytes
2,583,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,710 >>> mbox cmd response: success
2,775,710 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,777,124 UART: [afmc] ++
2,777,292 UART: [afmc] CDI.KEYID = 6
2,777,654 UART: [afmc] SUBJECT.KEYID = 7
2,778,079 UART: [afmc] AUTHORITY.KEYID = 5
2,813,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,358 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,848,068 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,855,854 UART: [afmc] --
2,856,828 UART: [cold-reset] --
2,857,652 UART: [state] Locking Datavault
2,859,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,745 UART: [state] Locking ICCM
2,860,321 UART: [exit] Launching FMC @ 0x40000130
2,865,650 UART:
2,865,666 UART: Running Caliptra FMC ...
2,866,074 UART:
2,866,217 UART: [state] CFI Enabled
2,876,688 UART: [fht] FMC Alias Private Key: 7
2,983,801 UART: [art] Extend RT PCRs Done
2,984,229 UART: [art] Lock RT PCRs Done
2,985,707 UART: [art] Populate DV Done
2,993,778 UART: [fht] FMC Alias Private Key: 7
2,994,908 UART: [art] Derive CDI
2,995,188 UART: [art] Store in in slot 0x4
3,080,839 UART: [art] Derive Key Pair
3,081,199 UART: [art] Store priv key in slot 0x5
3,093,981 UART: [art] Derive Key Pair - Done
3,108,854 UART: [art] Signing Cert with AUTHO
3,109,334 UART: RITY.KEYID = 7
3,124,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,277 UART: [art] PUB.X = 29C948C8C608C1B979DB24742C0909490CC17C755BF4FA02CF4DAEFE4E3E661BF63DFE876F7C97B7C60833A66F944000
3,132,015 UART: [art] PUB.Y = E8E766CF0232C248FB33D11980C0F1FA3F4F3E1BDC7CBBC2EC08255D49050536EB6B32EE128827E13710C2B67BB907B9
3,138,960 UART: [art] SIG.R = DC003D20BB9BB08717298998525E4A21131376A16FD8691276D9663981BB4AFFDF5CBE47377510618E221B4DFEAFC9B9
3,145,710 UART: [art] SIG.S = 6CF37DD2146DE8392B4D72F760032018644EF4376287C866E47C9F899723A8EDB18608F3B15BA1C527D72845F6F20FE9
3,169,204 UART: Caliptra RT
3,169,549 UART: [state] CFI Enabled
3,276,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,767 UART: [rt]cmd =0x43455252, len=4
3,317,639 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,134 ready_for_fw is high
1,061,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,527 >>> mbox cmd response: success
2,626,527 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,688,307 UART:
2,688,323 UART: Running Caliptra FMC ...
2,688,731 UART:
2,688,874 UART: [state] CFI Enabled
2,699,463 UART: [fht] FMC Alias Private Key: 7
2,807,018 UART: [art] Extend RT PCRs Done
2,807,446 UART: [art] Lock RT PCRs Done
2,809,004 UART: [art] Populate DV Done
2,817,509 UART: [fht] FMC Alias Private Key: 7
2,818,611 UART: [art] Derive CDI
2,818,891 UART: [art] Store in in slot 0x4
2,904,964 UART: [art] Derive Key Pair
2,905,324 UART: [art] Store priv key in slot 0x5
2,918,802 UART: [art] Derive Key Pair - Done
2,933,701 UART: [art] Signing Cert with AUTHO
2,934,181 UART: RITY.KEYID = 7
2,949,419 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,184 UART: [art] PUB.X = 6CF393C5403819EA00B5453315A9594FBCD6EDAC271752ECFC785712A81713C378C71DF1503A0479C9DD04D0592F7BE9
2,956,928 UART: [art] PUB.Y = 7E00D9B4480030DF2A18A97D7487116C6460E4119FD49BCC1EFCCB926B17CBF83D1D70281ABB4007BF188B0F2F027759
2,963,831 UART: [art] SIG.R = E0FD5672DA168DCD9749BF8115ABD32C9090930C07F5735076C5451D7CED1E9E48C6BAB1535B41D2407B79C30B3F072D
2,970,595 UART: [art] SIG.S = 3A19B8804D622E84B19CAFEE694649383E8CCA8652CDE630F0FB5DA71F1C52325817B9C9B9808BDC034D615CC3A73574
2,994,005 UART: Caliptra RT
2,994,350 UART: [state] CFI Enabled
3,102,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,792 UART: [rt]cmd =0x43455252, len=4
3,143,758 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,426 UART: [kat] LMS
1,168,738 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,729 UART: [idev] ++
1,172,897 UART: [idev] CDI.KEYID = 6
1,173,258 UART: [idev] SUBJECT.KEYID = 7
1,173,683 UART: [idev] UDS.KEYID = 0
1,174,029 ready_for_fw is high
1,174,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,821 UART: [idev] Sha1 KeyId Algorithm
1,207,709 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,030 UART: [ldev] Erasing FE.KEYID = 1
1,240,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,358 UART: [ldev] --
1,279,798 UART: [fwproc] Wait for Commands...
1,280,457 UART: [fwproc] Recv command 0x46574c44
1,281,190 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,155 >>> mbox cmd response: success
2,769,155 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,770,478 UART: [afmc] ++
2,770,646 UART: [afmc] CDI.KEYID = 6
2,771,009 UART: [afmc] SUBJECT.KEYID = 7
2,771,435 UART: [afmc] AUTHORITY.KEYID = 5
2,806,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,949 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,678 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,561 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,841,271 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,849,072 UART: [afmc] --
2,850,096 UART: [cold-reset] --
2,850,974 UART: [state] Locking Datavault
2,852,037 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,641 UART: [state] Locking ICCM
2,853,239 UART: [exit] Launching FMC @ 0x40000130
2,858,568 UART:
2,858,584 UART: Running Caliptra FMC ...
2,858,992 UART:
2,859,046 UART: [state] CFI Enabled
2,869,795 UART: [fht] FMC Alias Private Key: 7
2,977,540 UART: [art] Extend RT PCRs Done
2,977,968 UART: [art] Lock RT PCRs Done
2,979,532 UART: [art] Populate DV Done
2,987,659 UART: [fht] FMC Alias Private Key: 7
2,988,717 UART: [art] Derive CDI
2,988,997 UART: [art] Store in in slot 0x4
3,074,748 UART: [art] Derive Key Pair
3,075,108 UART: [art] Store priv key in slot 0x5
3,088,542 UART: [art] Derive Key Pair - Done
3,103,520 UART: [art] Signing Cert with AUTHO
3,104,000 UART: RITY.KEYID = 7
3,118,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,685 UART: [art] PUB.X = FA229752D7D9A5B9D9CD905C2807E7D61AB729D6E915A730117413E96C975E3A4D1E9E50918D9E881EC86F7B0166047C
3,126,446 UART: [art] PUB.Y = 15B634C23F7F6126FFBD82DED4E994BC34A162D6974605B1355F4DC72FDEF36D570A65DFCA0AFFC676BFA2AFD548B196
3,133,407 UART: [art] SIG.R = 41D5BA9872B0960F11918709FBA179A325E6FAA4557A66321B3215ACDBE339FA94E5ED8B0270CAE0229A3DFD95A2894B
3,140,176 UART: [art] SIG.S = 11FA54F782D1AFE8CC1E9C6F9BC15C6739623B0941716D7C0E239E8A2CAECF9C4F2D00164B9885AD78A285DD0307D7F8
3,163,737 UART: Caliptra RT
3,163,990 UART: [state] CFI Enabled
3,271,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,998 UART: [rt]cmd =0x43455252, len=4
3,312,846 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,838 ready_for_fw is high
1,055,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,519 >>> mbox cmd response: success
2,619,519 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,682,103 UART:
2,682,119 UART: Running Caliptra FMC ...
2,682,527 UART:
2,682,581 UART: [state] CFI Enabled
2,693,094 UART: [fht] FMC Alias Private Key: 7
2,800,471 UART: [art] Extend RT PCRs Done
2,800,899 UART: [art] Lock RT PCRs Done
2,802,059 UART: [art] Populate DV Done
2,810,246 UART: [fht] FMC Alias Private Key: 7
2,811,328 UART: [art] Derive CDI
2,811,608 UART: [art] Store in in slot 0x4
2,896,925 UART: [art] Derive Key Pair
2,897,285 UART: [art] Store priv key in slot 0x5
2,910,341 UART: [art] Derive Key Pair - Done
2,925,255 UART: [art] Signing Cert with AUTHO
2,925,735 UART: RITY.KEYID = 7
2,940,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,484 UART: [art] PUB.X = 4267972486D5EED86C6AD61158476684038430A9ED40D74216824DCAC611EAD7149520D85C80C96E03FC8F7451DD9B48
2,948,242 UART: [art] PUB.Y = 8C78DFC9739C4B57EE07B923E74EE4153E630A9FADD253036B09BCF0959956D21FC773FC8A47232698DF6CBC26BF0564
2,955,185 UART: [art] SIG.R = 6613825F206D912D99D2DC41241B20522C8FDBEC2720AED933B6C15F2E5F54B4F6420D50BAB40297F5C476E8452BAEE8
2,961,955 UART: [art] SIG.S = 1377F401C50E1C7676CF80DB9A9DD4D48B3E8CFB01D3EC17439BC3C6D0C211D947E6B7AB20EA15C27D7CDFABD785634A
2,985,801 UART: Caliptra RT
2,986,054 UART: [state] CFI Enabled
3,094,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,720 UART: [rt]cmd =0x43455252, len=4
3,135,686 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,618 UART: [kat] ++
895,770 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,174,152 ready_for_fw is high
1,174,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,695 UART: [ldev] ++
1,209,863 UART: [ldev] CDI.KEYID = 6
1,210,227 UART: [ldev] SUBJECT.KEYID = 5
1,210,654 UART: [ldev] AUTHORITY.KEYID = 7
1,211,117 UART: [ldev] FE.KEYID = 1
1,216,273 UART: [ldev] Erasing FE.KEYID = 1
1,242,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,175 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,697 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,524 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,020 >>> mbox cmd response: success
2,771,020 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,772,383 UART: [afmc] ++
2,772,551 UART: [afmc] CDI.KEYID = 6
2,772,914 UART: [afmc] SUBJECT.KEYID = 7
2,773,340 UART: [afmc] AUTHORITY.KEYID = 5
2,808,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,616 UART: [afmc] SIG.R = 034EAD0A573B0CD09145BEC0B0848A58A67051751073EB8FF5DA5E60DBACC5A8142EB8E5BEDDE2724C534FB7853470F2
2,843,326 UART: [afmc] SIG.S = CFEBCA4B5BF83A4BE62566CCE879322F0A5B1AA3B1BF0FFA043F2E3F625A59FD651F30DD620C370ED52146F685495D57
2,851,049 UART: [afmc] --
2,852,005 UART: [cold-reset] --
2,852,997 UART: [state] Locking Datavault
2,853,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,560 UART: [state] Locking ICCM
2,855,208 UART: [exit] Launching FMC @ 0x40000130
2,860,537 UART:
2,860,553 UART: Running Caliptra FMC ...
2,860,961 UART:
2,861,104 UART: [state] CFI Enabled
2,871,765 UART: [fht] FMC Alias Private Key: 7
2,979,610 UART: [art] Extend RT PCRs Done
2,980,038 UART: [art] Lock RT PCRs Done
2,981,568 UART: [art] Populate DV Done
2,989,485 UART: [fht] FMC Alias Private Key: 7
2,990,529 UART: [art] Derive CDI
2,990,809 UART: [art] Store in in slot 0x4
3,076,792 UART: [art] Derive Key Pair
3,077,152 UART: [art] Store priv key in slot 0x5
3,090,808 UART: [art] Derive Key Pair - Done
3,105,653 UART: [art] Signing Cert with AUTHO
3,106,133 UART: RITY.KEYID = 7
3,121,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,004 UART: [art] PUB.X = 5D847A2DB2A7CEA9D25F003758DCD2D628D010C72979F1DB62BC9C602517377283AD19F8EEF665D0815FECF352402281
3,128,756 UART: [art] PUB.Y = B44394FF91F42C3CE8F0EBEFC7466687D7214D3921BA29C5FFC0F687AE9EE22CBDC55686EE32AE2DDA4E833B00D29A9F
3,135,706 UART: [art] SIG.R = 66C67A2EC53D5CEAE6ED81418F8E03003BAE43144F3E816ADDFC6621A9552A8AA2B687D676B53E35D0C5EDA25BB21AB2
3,142,469 UART: [art] SIG.S = FB882F9CB587E37D03072BEF22B47E47F3384D2C0D9C2C3FBDBE5AD4E0B5FB960F40B935FE82ABF44D230A0ADC6E2AFB
3,166,294 UART: Caliptra RT
3,166,639 UART: [state] CFI Enabled
3,273,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,305 UART: [rt]cmd =0x43455252, len=4
3,315,141 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,807 ready_for_fw is high
1,056,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,098 >>> mbox cmd response: success
2,621,098 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,683,972 UART:
2,683,988 UART: Running Caliptra FMC ...
2,684,396 UART:
2,684,539 UART: [state] CFI Enabled
2,695,032 UART: [fht] FMC Alias Private Key: 7
2,802,649 UART: [art] Extend RT PCRs Done
2,803,077 UART: [art] Lock RT PCRs Done
2,804,987 UART: [art] Populate DV Done
2,813,428 UART: [fht] FMC Alias Private Key: 7
2,814,462 UART: [art] Derive CDI
2,814,742 UART: [art] Store in in slot 0x4
2,900,743 UART: [art] Derive Key Pair
2,901,103 UART: [art] Store priv key in slot 0x5
2,914,547 UART: [art] Derive Key Pair - Done
2,929,466 UART: [art] Signing Cert with AUTHO
2,929,946 UART: RITY.KEYID = 7
2,945,058 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,823 UART: [art] PUB.X = B021F47D6F299B7829E83431C6F42E39D9F69A23D52A507E0194C4115BAA1EFDA9E937B6FE196806AF211CE3F4E9089C
2,952,590 UART: [art] PUB.Y = 67D4AD8C11730B7985F65442E8913F917909398B94F82741B84283C3A3590F2824052663CB5B699A85ACEC498E40D8F6
2,959,516 UART: [art] SIG.R = 99A6DFA4792F0BA4D3F5A2AE5FDC1A5FAB8BD275803CAB73B79C600E238300CA107AE3457C3401F148F2980F05448B70
2,966,259 UART: [art] SIG.S = 751377649D0A76E80424DF2265978E788A03B7F1C6061B3813F2F8D93CEB4CE2D578B4E091B5CE31BC0AF813F92E200B
2,989,594 UART: Caliptra RT
2,989,939 UART: [state] CFI Enabled
3,097,691 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,297 UART: [rt]cmd =0x43455252, len=4
3,139,247 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,344 UART:
192,693 UART: Running Caliptra ROM ...
193,866 UART:
194,012 UART: [state] CFI Enabled
263,035 UART: [state] LifecycleState = Unprovisioned
264,984 UART: [state] DebugLocked = No
267,236 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,666 UART: [kat] SHA2-256
442,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,859 UART: [kat] ++
453,461 UART: [kat] sha1
463,793 UART: [kat] SHA2-256
466,489 UART: [kat] SHA2-384
473,330 UART: [kat] SHA2-512-ACC
475,692 UART: [kat] ECC-384
2,766,850 UART: [kat] HMAC-384Kdf
2,798,010 UART: [kat] LMS
3,988,344 UART: [kat] --
3,991,344 UART: [cold-reset] ++
3,993,342 UART: [fht] Storing FHT @ 0x50003400
4,003,957 UART: [idev] ++
4,004,517 UART: [idev] CDI.KEYID = 6
4,005,543 UART: [idev] SUBJECT.KEYID = 7
4,006,721 UART: [idev] UDS.KEYID = 0
4,007,800 ready_for_fw is high
4,008,029 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,151,262 UART: [idev] Erasing UDS.KEYID = 0
7,343,587 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,593 UART: [idev] --
7,371,177 UART: [ldev] ++
7,371,739 UART: [ldev] CDI.KEYID = 6
7,372,748 UART: [ldev] SUBJECT.KEYID = 5
7,373,896 UART: [ldev] AUTHORITY.KEYID = 7
7,375,169 UART: [ldev] FE.KEYID = 1
7,421,146 UART: [ldev] Erasing FE.KEYID = 1
10,753,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,603 UART: [ldev] --
13,113,989 UART: [fwproc] Waiting for Commands...
13,116,834 UART: [fwproc] Received command 0x46574c44
13,119,006 UART: [fwproc] Received Image of size 113844 bytes
17,169,498 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,364 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,137 >>> mbox cmd response: success
17,633,637 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,636,980 UART: [afmc] ++
17,637,565 UART: [afmc] CDI.KEYID = 6
17,638,574 UART: [afmc] SUBJECT.KEYID = 7
17,639,726 UART: [afmc] AUTHORITY.KEYID = 5
21,003,731 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,617 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,880 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,300 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,098 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,549 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,397 UART: [afmc] --
23,377,983 UART: [cold-reset] --
23,381,722 UART: [state] Locking Datavault
23,386,310 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,052 UART: [state] Locking ICCM
23,389,470 UART: [exit] Launching FMC @ 0x40000130
23,397,858 UART:
23,398,083 UART: Running Caliptra FMC ...
23,399,117 UART:
23,399,263 UART: [state] CFI Enabled
23,468,553 UART: [fht] FMC Alias Private Key: 7
25,806,902 UART: [art] Extend RT PCRs Done
25,808,129 UART: [art] Lock RT PCRs Done
25,809,743 UART: [art] Populate DV Done
25,815,473 UART: [fht] FMC Alias Private Key: 7
25,817,167 UART: [art] Derive CDI
25,817,968 UART: [art] Store in in slot 0x4
25,877,054 UART: [art] Derive Key Pair
25,878,074 UART: [art] Store priv key in slot 0x5
29,170,896 UART: [art] Derive Key Pair - Done
29,183,857 UART: [art] Signing Cert with AUTHO
29,185,180 UART: RITY.KEYID = 7
31,472,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,932 UART: [art] PUB.X = FB6EBF211CB787472A648DCE9F22E2DD13EB487F745F161A63C68DCED489CB5F1D7696E50DCBBEB945F31E169DF1CE82
31,481,206 UART: [art] PUB.Y = 2802C10D691D42DFE59DAC4F8C2E3351AF392C87CD78EA88351463C752C04FC2A7C410BD7C9BE1A87EA469B4DC43EDAD
31,488,510 UART: [art] SIG.R = DC9C4D593190E9F68FAAD9FAF4A2F84FED43250E4E55E8F34FD5E0F31F2E1628B9B542A9EB73A3A00709D18AAECC4B15
31,495,899 UART: [art] SIG.S = 532FCCCA14CF977EB57DB6D099C6F198F2D44F8BEAF07C74CC96955A7650BA25F9EF958B2AA616423A28E60D8B60E2CE
32,800,840 UART: Caliptra RT
32,801,556 UART: [state] CFI Enabled
32,962,837 UART: [rt] RT listening for mailbox commands...
32,994,470 UART: [rt]cmd =0x4453424c, len=4
36,315,555 >>> mbox cmd response data (8 bytes)
38,370,594 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
38,515,452 UART:
38,515,827 UART: Running Caliptra ROM ...
38,516,955 UART:
38,517,120 UART: [state] CFI Enabled
38,570,869 UART: [state] LifecycleState = Unprovisioned
38,572,801 UART: [state] DebugLocked = No
38,574,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,578,835 UART: [kat] SHA2-256
38,748,528 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,759,033 UART: [kat] ++
38,759,491 UART: [kat] sha1
38,771,285 UART: [kat] SHA2-256
38,773,962 UART: [kat] SHA2-384
38,780,050 UART: [kat] SHA2-512-ACC
38,782,443 UART: [kat] ECC-384
41,077,640 UART: [kat] HMAC-384Kdf
41,109,157 UART: [kat] LMS
42,299,501 UART: [kat] --
42,306,047 UART: [update-reset] ++
46,441,279 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,444,509 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
46,825,829 >>> mbox cmd response: success
46,826,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,827,108 UART: [update-reset] Copying MAN_2 To MAN_1
46,849,537 UART: [update-reset Success] --
46,852,294 UART: [state] Locking Datavault
46,855,317 UART: [state] Locking PCR0, PCR1 and PCR31
46,857,060 UART: [state] Locking ICCM
46,858,598 UART: [exit] Launching FMC @ 0x40000130
46,867,033 UART:
46,867,272 UART: Running Caliptra FMC ...
46,868,367 UART:
46,868,514 UART: [state] CFI Enabled
46,965,530 UART: [art] Extend RT PCRs Done
46,966,715 UART: [art] Lock RT PCRs Done
46,968,008 UART: [art] Populate DV Done
46,973,637 UART: [fht] FMC Alias Private Key: 7
46,975,142 UART: [art] Derive CDI
46,975,898 UART: [art] Store in in slot 0x4
47,035,033 UART: [art] Derive Key Pair
47,036,077 UART: [art] Store priv key in slot 0x5
50,329,264 UART: [art] Derive Key Pair - Done
50,342,429 UART: [art] Signing Cert with AUTHO
50,343,736 UART: RITY.KEYID = 7
52,630,769 UART: [art] Erasing AUTHORITY.KEYID = 7
52,632,281 UART: [art] PUB.X = 3C0A7EE3EF7CA49841C010D50FCBFDA12410B87E4D2C1D385D8F5DFE5253FA85843D5237AA76D6FDFB067F3A64EA09DB
52,639,528 UART: [art] PUB.Y = 55ECA88D4E573EAD1A19A81128A27ECF23A0D1637FE4FD977BD99735A13968DD4E42028F11FA9DF6B37789EFC4B0DE18
52,646,811 UART: [art] SIG.R = 10974A0D5307E25DF241B30B1933B90FB4DFC85642ABFD2D49AF28DE754899ECE7A9E829E5A0877C01511F4D020AA162
52,654,189 UART: [art] SIG.S = 86177D8F43EE4E8E96ED8CC59811204EC51A9BFCE73F9386F6D842C744C2BF76E55EA3569DD6406E1631143B41B072A6
53,959,430 UART: Caliptra RT
53,960,117 UART: [state] CFI Enabled
57,614,753 UART: [rt] RT listening for mailbox commands...
57,645,765 UART: [rt]cmd =0x494e464f, len=4
57,649,943 >>> mbox cmd response data (312 bytes)
57,651,845 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,681,742 UART: [rt]cmd =0x43455252, len=4
57,692,968 >>> mbox cmd response data (783 bytes)
57,734,180 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,765,159 UART: [rt]cmd =0x44504543, len=92
63,524,981 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,803,656 ready_for_fw is high
3,804,060 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,896,483 >>> mbox cmd response: success
17,897,206 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,577,647 UART:
23,578,053 UART: Running Caliptra FMC ...
23,579,218 UART:
23,579,380 UART: [state] CFI Enabled
23,630,801 UART: [fht] FMC Alias Private Key: 7
25,969,621 UART: [art] Extend RT PCRs Done
25,970,844 UART: [art] Lock RT PCRs Done
25,972,414 UART: [art] Populate DV Done
25,977,664 UART: [fht] FMC Alias Private Key: 7
25,979,203 UART: [art] Derive CDI
25,980,010 UART: [art] Store in in slot 0x4
26,039,415 UART: [art] Derive Key Pair
26,040,452 UART: [art] Store priv key in slot 0x5
29,333,362 UART: [art] Derive Key Pair - Done
29,346,196 UART: [art] Signing Cert with AUTHO
29,347,498 UART: RITY.KEYID = 7
31,635,310 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,819 UART: [art] PUB.X = F9165780A39B87DD4BF9E8641DAAD29532E0941D823D904AC12CF235D19CDDF6BE198909A2D6B95C815B1A1E7B281F6A
31,644,072 UART: [art] PUB.Y = 5BD50C769F5C3BD0F2A2ED10C035E2B59B2026F8739BB4C3BC10773C81E5F0DBA9383EA954C12D87E6048A926445C58C
31,651,346 UART: [art] SIG.R = BF1EDBC24C09848A3DE059FFA59D3F131F1DC3FBD2DE5FEA0AD7258C81372AEFF0DEAEEA324DD58E4F34886CAF427302
31,658,763 UART: [art] SIG.S = 03B3D50DEA35BC94ACA349C1238999720C2515EE0BE5C55EDE782B04BEECA3AD6140DF5C38536ACBEBF69AA18341EA60
32,963,706 UART: Caliptra RT
32,964,409 UART: [state] CFI Enabled
33,125,177 UART: [rt] RT listening for mailbox commands...
33,156,501 UART: [rt]cmd =0x4453424c, len=4
36,458,625 >>> mbox cmd response data (8 bytes)
38,512,300 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
47,219,226 >>> mbox cmd response: success
47,219,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,253,740 UART:
47,254,051 UART: Running Caliptra FMC ...
47,255,173 UART:
47,255,333 UART: [state] CFI Enabled
47,344,705 UART: [art] Extend RT PCRs Done
47,345,891 UART: [art] Lock RT PCRs Done
47,347,262 UART: [art] Populate DV Done
47,352,511 UART: [fht] FMC Alias Private Key: 7
47,354,200 UART: [art] Derive CDI
47,355,009 UART: [art] Store in in slot 0x4
47,413,758 UART: [art] Derive Key Pair
47,414,791 UART: [art] Store priv key in slot 0x5
50,707,531 UART: [art] Derive Key Pair - Done
50,720,798 UART: [art] Signing Cert with AUTHO
50,722,108 UART: RITY.KEYID = 7
53,009,362 UART: [art] Erasing AUTHORITY.KEYID = 7
53,010,872 UART: [art] PUB.X = DBBF82B4A5543ADADAA910DD3592342C51C81BBBF110CA9B3A5F84D6CB5B3B9CB80C99118B3BFDF8569BED71E770FE46
53,018,169 UART: [art] PUB.Y = F4EDAE3CB107A2F15FC2C22935D6CFA421F70BB8225D5F2820FD5D824CD017E3DAB73E133516CD33535FDE2C6B6124DD
53,025,445 UART: [art] SIG.R = 18D72182847E9C3F0ED5C5F029B43227C235D52225A00126323630926744B7796D889305B094CFFD94279D235B4AF232
53,032,786 UART: [art] SIG.S = A6A0F854FD56A2038DBB3A72924FDD4AB543F597438DCE77FC287AD474F361D9CA89B75D0CABD86471ADC3E57D522B3A
54,338,828 UART: Caliptra RT
54,339,520 UART: [state] CFI Enabled
57,971,244 UART: [rt] RT listening for mailbox commands...
58,002,204 UART: [rt]cmd =0x494e464f, len=4
58,006,604 >>> mbox cmd response data (312 bytes)
58,008,455 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
58,038,375 UART: [rt]cmd =0x43455252, len=4
58,049,815 >>> mbox cmd response data (783 bytes)
58,091,232 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,122,083 UART: [rt]cmd =0x44504543, len=92
63,882,609 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,100 writing to cptra_bootfsm_go
193,417 UART:
193,771 UART: Running Caliptra ROM ...
194,963 UART:
604,603 UART: [state] CFI Enabled
617,416 UART: [state] LifecycleState = Unprovisioned
619,387 UART: [state] DebugLocked = No
621,052 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,991 UART: [kat] SHA2-256
795,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,328 UART: [kat] ++
806,784 UART: [kat] sha1
817,516 UART: [kat] SHA2-256
820,236 UART: [kat] SHA2-384
825,730 UART: [kat] SHA2-512-ACC
828,098 UART: [kat] ECC-384
3,112,860 UART: [kat] HMAC-384Kdf
3,125,039 UART: [kat] LMS
4,315,143 UART: [kat] --
4,319,803 UART: [cold-reset] ++
4,321,528 UART: [fht] Storing FHT @ 0x50003400
4,333,188 UART: [idev] ++
4,333,803 UART: [idev] CDI.KEYID = 6
4,334,726 UART: [idev] SUBJECT.KEYID = 7
4,335,976 UART: [idev] UDS.KEYID = 0
4,337,092 ready_for_fw is high
4,337,318 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,264 UART: [idev] Erasing UDS.KEYID = 0
7,626,119 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,325 UART: [idev] --
7,652,266 UART: [ldev] ++
7,652,841 UART: [ldev] CDI.KEYID = 6
7,653,856 UART: [ldev] SUBJECT.KEYID = 5
7,655,018 UART: [ldev] AUTHORITY.KEYID = 7
7,656,308 UART: [ldev] FE.KEYID = 1
7,666,198 UART: [ldev] Erasing FE.KEYID = 1
10,954,365 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,684 UART: [ldev] --
13,311,660 UART: [fwproc] Waiting for Commands...
13,314,942 UART: [fwproc] Received command 0x46574c44
13,317,125 UART: [fwproc] Received Image of size 113844 bytes
17,366,116 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,532 >>> mbox cmd response: success
17,828,036 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,830,981 UART: [afmc] ++
17,831,635 UART: [afmc] CDI.KEYID = 6
17,832,522 UART: [afmc] SUBJECT.KEYID = 7
17,833,795 UART: [afmc] AUTHORITY.KEYID = 5
21,153,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,217 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,526 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,901 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,715 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,135 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,037 UART: [afmc] --
23,517,748 UART: [cold-reset] --
23,523,773 UART: [state] Locking Datavault
23,529,175 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,933 UART: [state] Locking ICCM
23,532,386 UART: [exit] Launching FMC @ 0x40000130
23,540,782 UART:
23,541,025 UART: Running Caliptra FMC ...
23,542,132 UART:
23,542,290 UART: [state] CFI Enabled
23,550,682 UART: [fht] FMC Alias Private Key: 7
25,881,205 UART: [art] Extend RT PCRs Done
25,882,435 UART: [art] Lock RT PCRs Done
25,884,289 UART: [art] Populate DV Done
25,889,596 UART: [fht] FMC Alias Private Key: 7
25,891,244 UART: [art] Derive CDI
25,892,059 UART: [art] Store in in slot 0x4
25,934,609 UART: [art] Derive Key Pair
25,935,648 UART: [art] Store priv key in slot 0x5
29,177,287 UART: [art] Derive Key Pair - Done
29,190,287 UART: [art] Signing Cert with AUTHO
29,191,600 UART: RITY.KEYID = 7
31,471,370 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,876 UART: [art] PUB.X = AA89CADC770889E718FCEBAB1575D5333B9AB253BCDCE3A41699208ABCC440DA07BDA1ADA1A9E6C8C0D8161DA5438EC9
31,480,134 UART: [art] PUB.Y = CBBE07B80DECE20B0187F15B0068AE18BD13F196B325CBF2C21C9AB744FB1912E5B1E0B1A60DC9019CB5BE26B9200522
31,487,377 UART: [art] SIG.R = BCF33AC24C7A57D5602F71E9839C46281861F2207C212CCE20EFB728B62A9D2A9D208A711E7F4E77F5B3A99A069426F2
31,494,793 UART: [art] SIG.S = 56177A03D4B10FB50E5428A227FFD820E9F557EBC90517CA59FA7594F1E5CDEC4A417EC660FC06509F8C29C2439ED02A
32,800,314 UART: Caliptra RT
32,801,029 UART: [state] CFI Enabled
32,917,845 UART: [rt] RT listening for mailbox commands...
32,949,587 UART: [rt]cmd =0x4453424c, len=4
36,195,824 >>> mbox cmd response data (8 bytes)
38,323,009 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
38,467,768 UART:
38,468,132 UART: Running Caliptra ROM ...
38,469,186 UART:
38,469,396 UART: [state] CFI Enabled
38,484,192 UART: [state] LifecycleState = Unprovisioned
38,486,180 UART: [state] DebugLocked = No
38,488,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,492,917 UART: [kat] SHA2-256
38,662,612 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,673,166 UART: [kat] ++
38,673,626 UART: [kat] sha1
38,685,388 UART: [kat] SHA2-256
38,688,083 UART: [kat] SHA2-384
38,694,345 UART: [kat] SHA2-512-ACC
38,696,749 UART: [kat] ECC-384
40,981,763 UART: [kat] HMAC-384Kdf
40,994,741 UART: [kat] LMS
42,184,835 UART: [kat] --
42,188,821 UART: [update-reset] ++
46,321,718 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,325,372 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
46,706,645 >>> mbox cmd response: success
46,706,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,707,875 UART: [update-reset] Copying MAN_2 To MAN_1
46,730,311 UART: [update-reset Success] --
46,736,361 UART: [state] Locking Datavault
46,739,850 UART: [state] Locking PCR0, PCR1 and PCR31
46,741,555 UART: [state] Locking ICCM
46,743,007 UART: [exit] Launching FMC @ 0x40000130
46,751,465 UART:
46,751,702 UART: Running Caliptra FMC ...
46,752,802 UART:
46,752,962 UART: [state] CFI Enabled
46,796,867 UART: [art] Extend RT PCRs Done
46,798,013 UART: [art] Lock RT PCRs Done
46,799,522 UART: [art] Populate DV Done
46,804,912 UART: [fht] FMC Alias Private Key: 7
46,806,559 UART: [art] Derive CDI
46,807,384 UART: [art] Store in in slot 0x4
46,850,411 UART: [art] Derive Key Pair
46,851,436 UART: [art] Store priv key in slot 0x5
50,093,598 UART: [art] Derive Key Pair - Done
50,106,494 UART: [art] Signing Cert with AUTHO
50,107,798 UART: RITY.KEYID = 7
52,387,090 UART: [art] Erasing AUTHORITY.KEYID = 7
52,388,608 UART: [art] PUB.X = 86FE198917F9AB17F1F64CC2D3EBFE1A8D5283F20B457ECC288825F687B28CB3F5AC2241E26FDC4C5F28816A16364BE8
52,395,865 UART: [art] PUB.Y = E83A4C2AA57941340A8CCA1B8C533D26261DEBA78AE3C9268FB1506ADB56654E7EC53FE39389FF62EEDA5DFD1F9A6017
52,403,114 UART: [art] SIG.R = FBA7AA4C556B136ABFA5C4D2FF1A882DBEF016F7DFE14F82521ACE028A0CE93577439DFFAFC25897427B18E7B1B52510
52,410,550 UART: [art] SIG.S = 3F8EF5ACFD42ED229910B9CDDFEFA7813D5A74EE85476DD8113824F5C3CB7ADC9D2176EC90B284C124EFB2D29C5CA0DF
53,715,594 UART: Caliptra RT
53,716,296 UART: [state] CFI Enabled
57,251,264 UART: [rt] RT listening for mailbox commands...
57,282,403 UART: [rt]cmd =0x494e464f, len=4
57,286,662 >>> mbox cmd response data (312 bytes)
57,288,579 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,318,295 UART: [rt]cmd =0x43455252, len=4
57,329,704 >>> mbox cmd response data (783 bytes)
57,371,861 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,402,513 UART: [rt]cmd =0x44504543, len=92
63,075,737 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,122,987 ready_for_fw is high
4,123,398 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,052,668 >>> mbox cmd response: success
18,053,592 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,694,129 UART:
23,694,518 UART: Running Caliptra FMC ...
23,695,724 UART:
23,695,899 UART: [state] CFI Enabled
23,703,750 UART: [fht] FMC Alias Private Key: 7
26,034,484 UART: [art] Extend RT PCRs Done
26,035,705 UART: [art] Lock RT PCRs Done
26,037,355 UART: [art] Populate DV Done
26,042,397 UART: [fht] FMC Alias Private Key: 7
26,043,942 UART: [art] Derive CDI
26,044,763 UART: [art] Store in in slot 0x4
26,087,096 UART: [art] Derive Key Pair
26,088,144 UART: [art] Store priv key in slot 0x5
29,330,174 UART: [art] Derive Key Pair - Done
29,343,704 UART: [art] Signing Cert with AUTHO
29,345,040 UART: RITY.KEYID = 7
31,624,234 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,752 UART: [art] PUB.X = 3AF4A406D1A439A515577C2D2E3072694906F284AE34CC0DD3FE298692006BCE427AD9AA3DB4972F8D38C5E466541E3B
31,633,009 UART: [art] PUB.Y = 54DA4646E151B4CCA63C7EC8D54DED22F06EBF7A3B3D245E49D88ED852855847A24A82F0CD58A470BE830DD849B388C9
31,640,250 UART: [art] SIG.R = B506E49930AF03AB02B3ECE6C42F2B04825650789FC66CA9D74337331E6828A721A73BB34D37DFE7BA31DD0432E75483
31,647,654 UART: [art] SIG.S = 328CB363580344CA15D7797DE6B30512D96A54368344DEBD816229981BC4404F80C61E7EDFDDD30142B0DC696A57EB0D
32,953,237 UART: Caliptra RT
32,953,953 UART: [state] CFI Enabled
33,071,418 UART: [rt] RT listening for mailbox commands...
33,102,880 UART: [rt]cmd =0x4453424c, len=4
36,349,184 >>> mbox cmd response data (8 bytes)
38,473,907 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
47,122,886 >>> mbox cmd response: success
47,123,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,156,455 UART:
47,156,724 UART: Running Caliptra FMC ...
47,157,758 UART:
47,157,906 UART: [state] CFI Enabled
47,201,892 UART: [art] Extend RT PCRs Done
47,203,099 UART: [art] Lock RT PCRs Done
47,204,693 UART: [art] Populate DV Done
47,210,230 UART: [fht] FMC Alias Private Key: 7
47,211,932 UART: [art] Derive CDI
47,212,674 UART: [art] Store in in slot 0x4
47,255,389 UART: [art] Derive Key Pair
47,256,440 UART: [art] Store priv key in slot 0x5
50,498,771 UART: [art] Derive Key Pair - Done
50,511,835 UART: [art] Signing Cert with AUTHO
50,513,140 UART: RITY.KEYID = 7
52,792,119 UART: [art] Erasing AUTHORITY.KEYID = 7
52,793,628 UART: [art] PUB.X = 28B128404D04AE1261C0893BD85F385F08EB588B8671D249F3E03177116ED4927C99628A6B30BDDD26FE9E8FDBC2BC6F
52,800,892 UART: [art] PUB.Y = A11B314581DBAB5E9F0D7CD970017B0C2E1BD22B5916DDAC3C69C7C746CBDBE637C4153CE534C300FD35C18C66780CC4
52,808,138 UART: [art] SIG.R = C4A96A6441A606D9FBF0FF341564F551CE98562591E51EE2131FC922193F0BA865B6764BC5100C1B5CBEB0ED90D1E770
52,815,551 UART: [art] SIG.S = 9CE1F8FA5B26FA9DB0E2EF389995FA46225922B13CDEDD0582A92EB093146F23D8AF49CBFCE2A21FC5DAEC4A4CB733B2
54,121,114 UART: Caliptra RT
54,121,809 UART: [state] CFI Enabled
57,655,612 UART: [rt] RT listening for mailbox commands...
57,686,472 UART: [rt]cmd =0x494e464f, len=4
57,690,761 >>> mbox cmd response data (312 bytes)
57,692,625 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,722,343 UART: [rt]cmd =0x43455252, len=4
57,733,816 >>> mbox cmd response data (784 bytes)
57,775,441 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,806,458 UART: [rt]cmd =0x44504543, len=92
63,480,759 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,149 UART:
192,539 UART: Running Caliptra ROM ...
193,748 UART:
193,906 UART: [state] CFI Enabled
266,892 UART: [state] LifecycleState = Unprovisioned
268,807 UART: [state] DebugLocked = No
270,414 UART: [state] WD Timer not started. Device not locked for debugging
274,952 UART: [kat] SHA2-256
454,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,692 UART: [kat] ++
466,224 UART: [kat] sha1
478,032 UART: [kat] SHA2-256
481,047 UART: [kat] SHA2-384
486,968 UART: [kat] SHA2-512-ACC
489,905 UART: [kat] ECC-384
2,961,990 UART: [kat] HMAC-384Kdf
2,986,329 UART: [kat] LMS
3,515,805 UART: [kat] --
3,518,674 UART: [cold-reset] ++
3,520,534 UART: [fht] FHT @ 0x50003400
3,531,443 UART: [idev] ++
3,532,005 UART: [idev] CDI.KEYID = 6
3,533,039 UART: [idev] SUBJECT.KEYID = 7
3,534,146 UART: [idev] UDS.KEYID = 0
3,535,084 ready_for_fw is high
3,535,312 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,679,032 UART: [idev] Erasing UDS.KEYID = 0
6,040,451 UART: [idev] Sha1 KeyId Algorithm
6,062,018 UART: [idev] --
6,066,561 UART: [ldev] ++
6,067,136 UART: [ldev] CDI.KEYID = 6
6,068,072 UART: [ldev] SUBJECT.KEYID = 5
6,069,247 UART: [ldev] AUTHORITY.KEYID = 7
6,070,483 UART: [ldev] FE.KEYID = 1
6,113,489 UART: [ldev] Erasing FE.KEYID = 1
8,617,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,127 UART: [ldev] --
10,426,803 UART: [fwproc] Wait for Commands...
10,429,224 UART: [fwproc] Recv command 0x46574c44
10,431,315 UART: [fwproc] Recv'd Img size: 114168 bytes
13,827,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,279,248 >>> mbox cmd response: success
14,279,898 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,283,034 UART: [afmc] ++
14,283,622 UART: [afmc] CDI.KEYID = 6
14,284,536 UART: [afmc] SUBJECT.KEYID = 7
14,285,697 UART: [afmc] AUTHORITY.KEYID = 5
16,813,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,545,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,925 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,562,695 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,578,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,594,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,618,757 UART: [afmc] --
18,622,304 UART: [cold-reset] --
18,627,300 UART: [state] Locking Datavault
18,632,925 UART: [state] Locking PCR0, PCR1 and PCR31
18,634,644 UART: [state] Locking ICCM
18,637,069 UART: [exit] Launching FMC @ 0x40000130
18,645,526 UART:
18,645,768 UART: Running Caliptra FMC ...
18,646,877 UART:
18,647,031 UART: [state] CFI Enabled
18,703,436 UART: [fht] FMC Alias Private Key: 7
20,466,823 UART: [art] Extend RT PCRs Done
20,468,080 UART: [art] Lock RT PCRs Done
20,469,474 UART: [art] Populate DV Done
20,474,892 UART: [fht] FMC Alias Private Key: 7
20,476,591 UART: [art] Derive CDI
20,477,405 UART: [art] Store in in slot 0x4
20,536,861 UART: [art] Derive Key Pair
20,537,897 UART: [art] Store priv key in slot 0x5
23,000,923 UART: [art] Derive Key Pair - Done
23,013,670 UART: [art] Signing Cert with AUTHO
23,014,977 UART: RITY.KEYID = 7
24,726,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,727,655 UART: [art] PUB.X = CB005EB90FA589391399FC30D966A28B92EAEC34E9591CC6E50A3D8C42FE7272A3019DDDA6789869436542A28CDD0EC7
24,734,920 UART: [art] PUB.Y = 1F52582C25D60BC295A738376CC28857117BC9E9F0952C7300FAB5C76DFCFBB2A1C212B16F4D4421E85298374301D0A0
24,742,114 UART: [art] SIG.R = 33D22CE5AFD0238B5B6AAA131FBCD54485CE1B00AD9BB368C337184A110E95B91CB230700DCCE8A00AF7B7B9549020DA
24,749,530 UART: [art] SIG.S = 751F710FEF27A1F485423466EA38D6FB81707B904E0977C01E35BAE712285FA47961C05CE44CFB316840A2A097AD870B
25,728,729 UART: Caliptra RT
25,729,439 UART: [state] CFI Enabled
25,894,747 UART: [rt] RT listening for mailbox commands...
25,926,113 UART: [rt]cmd =0x4453424c, len=4
28,418,711 >>> mbox cmd response data (8 bytes)
30,469,970 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,615,101 UART:
30,615,468 UART: Running Caliptra ROM ...
30,616,559 UART:
30,616,718 UART: [state] CFI Enabled
30,677,353 UART: [state] LifecycleState = Unprovisioned
30,679,201 UART: [state] DebugLocked = No
30,680,539 UART: [state] WD Timer not started. Device not locked for debugging
30,683,498 UART: [kat] SHA2-256
30,862,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,874,209 UART: [kat] ++
30,874,751 UART: [kat] sha1
30,886,459 UART: [kat] SHA2-256
30,889,470 UART: [kat] SHA2-384
30,894,804 UART: [kat] SHA2-512-ACC
30,897,748 UART: [kat] ECC-384
33,357,704 UART: [kat] HMAC-384Kdf
33,381,115 UART: [kat] LMS
33,910,598 UART: [kat] --
33,913,395 UART: [update-reset] ++
37,343,308 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,347,171 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
37,729,486 >>> mbox cmd response: success
37,729,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,730,529 UART: [update-reset] Copying MAN_2 To MAN_1
37,752,817 UART: [update-reset Success] --
37,758,517 UART: [state] Locking Datavault
37,761,069 UART: [state] Locking PCR0, PCR1 and PCR31
37,762,725 UART: [state] Locking ICCM
37,764,451 UART: [exit] Launching FMC @ 0x40000130
37,772,909 UART:
37,773,149 UART: Running Caliptra FMC ...
37,774,268 UART:
37,774,427 UART: [state] CFI Enabled
37,870,190 UART: [art] Extend RT PCRs Done
37,871,372 UART: [art] Lock RT PCRs Done
37,872,720 UART: [art] Populate DV Done
37,878,401 UART: [fht] FMC Alias Private Key: 7
37,879,989 UART: [art] Derive CDI
37,880,785 UART: [art] Store in in slot 0x4
37,939,271 UART: [art] Derive Key Pair
37,940,275 UART: [art] Store priv key in slot 0x5
40,403,210 UART: [art] Derive Key Pair - Done
40,416,104 UART: [art] Signing Cert with AUTHO
40,417,409 UART: RITY.KEYID = 7
42,128,469 UART: [art] Erasing AUTHORITY.KEYID = 7
42,129,971 UART: [art] PUB.X = 6D4FD3C3C9A07CE63C12037DF06CDE19D6423853388C088C84F6E5BE844D57362602E0B4ADF26B575F291B45FDE9D90C
42,137,241 UART: [art] PUB.Y = 7E173B0817BCD66A3A822EC796EC5173C047039D2083388AC9104DEDFBD8BF7E6C9043B94F0A798FCE1086EEF671F5C3
42,144,508 UART: [art] SIG.R = 8DFCC638EBCAAD54218D5C7DB7985FAACBA25577D1F2F49FE759232B3B50AA963E971A9DF08E75A8694982C8B5DE9458
42,151,933 UART: [art] SIG.S = 61E027B6EB66DDE25D5E5D7583CC936F1DA92A490D9962445FB6C344C82475387ACF0775770141F3519EB87BC2546ADD
43,131,106 UART: Caliptra RT
43,131,812 UART: [state] CFI Enabled
45,936,920 UART: [rt] RT listening for mailbox commands...
45,968,097 UART: [rt]cmd =0x494e464f, len=4
45,972,483 >>> mbox cmd response data (312 bytes)
45,974,362 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,004,111 UART: [rt]cmd =0x43455252, len=4
46,015,418 >>> mbox cmd response data (783 bytes)
46,057,569 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,088,174 UART: [rt]cmd =0x44504543, len=92
50,438,515 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,359,893 ready_for_fw is high
3,360,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,045,052 >>> mbox cmd response: success
14,045,733 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,341,787 UART:
18,342,208 UART: Running Caliptra FMC ...
18,343,312 UART:
18,343,474 UART: [state] CFI Enabled
18,410,788 UART: [fht] FMC Alias Private Key: 7
20,174,867 UART: [art] Extend RT PCRs Done
20,176,109 UART: [art] Lock RT PCRs Done
20,177,857 UART: [art] Populate DV Done
20,183,273 UART: [fht] FMC Alias Private Key: 7
20,184,975 UART: [art] Derive CDI
20,185,786 UART: [art] Store in in slot 0x4
20,243,450 UART: [art] Derive Key Pair
20,244,490 UART: [art] Store priv key in slot 0x5
22,707,491 UART: [art] Derive Key Pair - Done
22,720,550 UART: [art] Signing Cert with AUTHO
22,721,853 UART: RITY.KEYID = 7
24,433,707 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,393 UART: [art] PUB.X = A539ADAB969ADC7ACEBD30E70D064DAEACDB2F8F9C1A7BDEC6D7587A1796CF4A3EE6E510AAC279ECF580BF01A79F5ACD
24,442,531 UART: [art] PUB.Y = 08045663E2648AF66113110C00469DFFFCE0B238585633170C8DEFC9A2862A0BEA26DA9970F8986CBD249CF8F5351CCC
24,449,791 UART: [art] SIG.R = 25FE34765116077F380EB4B660D6AE72A3937BEFDF3EE5E27E7195577B041E8270AA04D7A7747153B8F2218678DDE7E9
24,457,186 UART: [art] SIG.S = 1267BB658583626FB87117E8EFB0266AC5F5DB6C3E561626913AD692509FB4D3A8EEF21D02B47AAD499275F2820397CC
25,435,553 UART: Caliptra RT
25,436,289 UART: [state] CFI Enabled
25,601,700 UART: [rt] RT listening for mailbox commands...
25,632,957 UART: [rt]cmd =0x4453424c, len=4
28,125,361 >>> mbox cmd response data (8 bytes)
30,176,876 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
37,306,066 >>> mbox cmd response: success
37,306,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,340,755 UART:
37,341,090 UART: Running Caliptra FMC ...
37,342,131 UART:
37,342,285 UART: [state] CFI Enabled
37,430,555 UART: [art] Extend RT PCRs Done
37,431,760 UART: [art] Lock RT PCRs Done
37,433,314 UART: [art] Populate DV Done
37,438,619 UART: [fht] FMC Alias Private Key: 7
37,440,263 UART: [art] Derive CDI
37,441,074 UART: [art] Store in in slot 0x4
37,499,503 UART: [art] Derive Key Pair
37,500,535 UART: [art] Store priv key in slot 0x5
39,963,388 UART: [art] Derive Key Pair - Done
39,975,751 UART: [art] Signing Cert with AUTHO
39,977,055 UART: RITY.KEYID = 7
41,689,206 UART: [art] Erasing AUTHORITY.KEYID = 7
41,690,695 UART: [art] PUB.X = 24B802A63C3D94F41C89066C8328AF30F86F9A7347F246274DAFB02415D46CD813A94AAF38A197E10A8C65FECD1F0B71
41,697,990 UART: [art] PUB.Y = A4C46A35D2FD8862CFDC914D92FDF70749B014F0009AB72F805D230CD0B550641EABF04C4432F0A4E25B7B3626CC8FB8
41,705,269 UART: [art] SIG.R = 8C65979D747492DDB21E8A285CE8CDBF52B6BC292BC0E537A90734A42D963F6A54D22752CB68DF4BF4D546AFE57CDB7C
41,712,659 UART: [art] SIG.S = 6DADD69E458F88363D217F88D0B7F76F8A8DEFEC7C6DBE0197876919CA05E834E0BD010793D56FA354DABAB53CF55D15
42,691,669 UART: Caliptra RT
42,692,396 UART: [state] CFI Enabled
45,500,908 UART: [rt] RT listening for mailbox commands...
45,532,191 UART: [rt]cmd =0x494e464f, len=4
45,536,584 >>> mbox cmd response data (312 bytes)
45,538,450 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,568,314 UART: [rt]cmd =0x43455252, len=4
45,579,755 >>> mbox cmd response data (783 bytes)
45,620,891 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,651,526 UART: [rt]cmd =0x44504543, len=92
50,002,146 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,733 writing to cptra_bootfsm_go
192,831 UART:
193,187 UART: Running Caliptra ROM ...
194,317 UART:
604,129 UART: [state] CFI Enabled
617,504 UART: [state] LifecycleState = Unprovisioned
619,303 UART: [state] DebugLocked = No
622,170 UART: [state] WD Timer not started. Device not locked for debugging
625,430 UART: [kat] SHA2-256
804,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,107 UART: [kat] ++
816,555 UART: [kat] sha1
829,200 UART: [kat] SHA2-256
832,199 UART: [kat] SHA2-384
837,504 UART: [kat] SHA2-512-ACC
840,264 UART: [kat] ECC-384
3,282,469 UART: [kat] HMAC-384Kdf
3,294,423 UART: [kat] LMS
3,823,919 UART: [kat] --
3,829,044 UART: [cold-reset] ++
3,831,480 UART: [fht] FHT @ 0x50003400
3,842,672 UART: [idev] ++
3,843,233 UART: [idev] CDI.KEYID = 6
3,844,188 UART: [idev] SUBJECT.KEYID = 7
3,845,361 UART: [idev] UDS.KEYID = 0
3,846,337 ready_for_fw is high
3,846,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,958 UART: [idev] Erasing UDS.KEYID = 0
6,319,526 UART: [idev] Sha1 KeyId Algorithm
6,343,364 UART: [idev] --
6,347,838 UART: [ldev] ++
6,348,410 UART: [ldev] CDI.KEYID = 6
6,349,346 UART: [ldev] SUBJECT.KEYID = 5
6,350,508 UART: [ldev] AUTHORITY.KEYID = 7
6,351,797 UART: [ldev] FE.KEYID = 1
6,362,062 UART: [ldev] Erasing FE.KEYID = 1
8,831,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,568 UART: [ldev] --
10,620,434 UART: [fwproc] Wait for Commands...
10,622,749 UART: [fwproc] Recv command 0x46574c44
10,624,838 UART: [fwproc] Recv'd Img size: 114168 bytes
14,023,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,551 >>> mbox cmd response: success
14,488,042 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,491,919 UART: [afmc] ++
14,492,534 UART: [afmc] CDI.KEYID = 6
14,493,419 UART: [afmc] SUBJECT.KEYID = 7
14,494,525 UART: [afmc] AUTHORITY.KEYID = 5
16,998,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,864 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,560 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,529 UART: [afmc] --
18,794,824 UART: [cold-reset] --
18,798,300 UART: [state] Locking Datavault
18,804,943 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,592 UART: [state] Locking ICCM
18,808,934 UART: [exit] Launching FMC @ 0x40000130
18,817,325 UART:
18,817,576 UART: Running Caliptra FMC ...
18,818,601 UART:
18,818,751 UART: [state] CFI Enabled
18,826,987 UART: [fht] FMC Alias Private Key: 7
20,584,314 UART: [art] Extend RT PCRs Done
20,585,517 UART: [art] Lock RT PCRs Done
20,587,279 UART: [art] Populate DV Done
20,592,631 UART: [fht] FMC Alias Private Key: 7
20,594,220 UART: [art] Derive CDI
20,594,960 UART: [art] Store in in slot 0x4
20,637,820 UART: [art] Derive Key Pair
20,638,859 UART: [art] Store priv key in slot 0x5
23,065,669 UART: [art] Derive Key Pair - Done
23,079,042 UART: [art] Signing Cert with AUTHO
23,080,375 UART: RITY.KEYID = 7
24,786,058 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,573 UART: [art] PUB.X = F56F51DF411AA203BEA2987B25DED29C2B859B951982A45D398D4DD65260AAE914E5E768B66FA9EC427F8902E69410CF
24,794,828 UART: [art] PUB.Y = D3408FF0FE5F78B438E608543AA26E4C51ECC4E9D6C595513C1B370E747046394DF0C8DFD010455A3C2E292610825B57
24,802,069 UART: [art] SIG.R = DFD79A67A8AB02CBB39313547139C89A9BB302BF7530DFF80DF5FFB7BB4DC60ADF5D22B65D483C2BFDB385C5CB5B37F0
24,809,524 UART: [art] SIG.S = A45D89F9BC96BFB62477A5B7E3526B3851D08F9DE4C2EA7F777151CD7C8F190FCA8BD77CE281835AFA3BCC6EEA649FFB
25,787,747 UART: Caliptra RT
25,788,456 UART: [state] CFI Enabled
25,905,184 UART: [rt] RT listening for mailbox commands...
25,936,490 UART: [rt]cmd =0x4453424c, len=4
28,367,136 >>> mbox cmd response data (8 bytes)
30,417,305 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,562,494 UART:
30,562,870 UART: Running Caliptra ROM ...
30,564,025 UART:
30,564,201 UART: [state] CFI Enabled
30,576,099 UART: [state] LifecycleState = Unprovisioned
30,577,941 UART: [state] DebugLocked = No
30,579,599 UART: [state] WD Timer not started. Device not locked for debugging
30,582,746 UART: [kat] SHA2-256
30,761,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,773,477 UART: [kat] ++
30,773,932 UART: [kat] sha1
30,785,409 UART: [kat] SHA2-256
30,788,427 UART: [kat] SHA2-384
30,794,037 UART: [kat] SHA2-512-ACC
30,796,980 UART: [kat] ECC-384
33,239,266 UART: [kat] HMAC-384Kdf
33,251,064 UART: [kat] LMS
33,780,583 UART: [kat] --
33,785,407 UART: [update-reset] ++
37,204,035 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,207,092 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
37,589,441 >>> mbox cmd response: success
37,589,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,590,102 UART: [update-reset] Copying MAN_2 To MAN_1
37,612,319 UART: [update-reset Success] --
37,614,879 UART: [state] Locking Datavault
37,619,431 UART: [state] Locking PCR0, PCR1 and PCR31
37,621,076 UART: [state] Locking ICCM
37,623,512 UART: [exit] Launching FMC @ 0x40000130
37,631,962 UART:
37,632,197 UART: Running Caliptra FMC ...
37,633,300 UART:
37,633,463 UART: [state] CFI Enabled
37,677,487 UART: [art] Extend RT PCRs Done
37,678,691 UART: [art] Lock RT PCRs Done
37,680,259 UART: [art] Populate DV Done
37,685,994 UART: [fht] FMC Alias Private Key: 7
37,687,528 UART: [art] Derive CDI
37,688,339 UART: [art] Store in in slot 0x4
37,730,828 UART: [art] Derive Key Pair
37,731,859 UART: [art] Store priv key in slot 0x5
40,159,067 UART: [art] Derive Key Pair - Done
40,172,305 UART: [art] Signing Cert with AUTHO
40,173,600 UART: RITY.KEYID = 7
41,879,017 UART: [art] Erasing AUTHORITY.KEYID = 7
41,880,520 UART: [art] PUB.X = F5A4F59A00550114F8C8D92D76BCC9E0933FDAADA2466ADFCD0160C62E7448D3678FDB8CF613624127AD15B3F5DD7CF1
41,887,781 UART: [art] PUB.Y = 8770F77337AB9B093919F0C044F39D65FD8CB62C3511D9840E3EAB5AB652A4C4347F873FE309D408C7A5E889440AA6DC
41,895,020 UART: [art] SIG.R = A32CA6C7DBE62B6A360E53BC079BA401F6CB3DBCE9BC00355F199D4654B20F883BA8785B429F69770FE24D72FE8ED42A
41,902,416 UART: [art] SIG.S = EEF73BC9B29D56EF31F966C6B89006136E5863820517AFD13445873E55A5CC47B824C2D5D55A5DF6A884B93634FC0DB0
42,881,189 UART: Caliptra RT
42,881,924 UART: [state] CFI Enabled
45,602,773 UART: [rt] RT listening for mailbox commands...
45,633,789 UART: [rt]cmd =0x494e464f, len=4
45,638,176 >>> mbox cmd response data (312 bytes)
45,640,046 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,670,015 UART: [rt]cmd =0x43455252, len=4
45,681,315 >>> mbox cmd response data (784 bytes)
45,723,529 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,754,571 UART: [rt]cmd =0x44504543, len=92
50,039,083 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,855 writing to cptra_bootfsm_go
3,699,330 ready_for_fw is high
3,699,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,281,914 >>> mbox cmd response: success
14,282,542 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,534,800 UART:
18,535,186 UART: Running Caliptra FMC ...
18,536,311 UART:
18,536,472 UART: [state] CFI Enabled
18,544,105 UART: [fht] FMC Alias Private Key: 7
20,301,136 UART: [art] Extend RT PCRs Done
20,302,365 UART: [art] Lock RT PCRs Done
20,303,850 UART: [art] Populate DV Done
20,309,427 UART: [fht] FMC Alias Private Key: 7
20,311,084 UART: [art] Derive CDI
20,311,904 UART: [art] Store in in slot 0x4
20,354,294 UART: [art] Derive Key Pair
20,355,335 UART: [art] Store priv key in slot 0x5
22,782,324 UART: [art] Derive Key Pair - Done
22,795,602 UART: [art] Signing Cert with AUTHO
22,796,904 UART: RITY.KEYID = 7
24,502,419 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,929 UART: [art] PUB.X = 91956FFAF1144659E41B2877F8E497730E4562ED8B6FBCFEC0BAA23C1C7DD2F981146CAB353E8177D71C7B3FBDB5A62C
24,511,227 UART: [art] PUB.Y = A7C42467A5D7A0A1B26F168C20AB4B97A5D2E2360B8ACFBA9BDE9EC68453595F308DFC2E65478EDAF4F71269180F54B8
24,518,484 UART: [art] SIG.R = D6C2B6F4F948817120442E13DFCCC25B2CF2EF8504885A50B61E65493E17042969682244A027AD780433CECC5DDD554C
24,525,895 UART: [art] SIG.S = 68CA80945099229E9CC661EB3F7C0D25E75F294A781B2940987DBE18531B6BABAB034DC5222BC765D58C14101E418091
25,504,391 UART: Caliptra RT
25,505,094 UART: [state] CFI Enabled
25,621,746 UART: [rt] RT listening for mailbox commands...
25,653,142 UART: [rt]cmd =0x4453424c, len=4
28,083,610 >>> mbox cmd response data (8 bytes)
30,134,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
37,181,559 >>> mbox cmd response: success
37,182,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,216,000 UART:
37,216,296 UART: Running Caliptra FMC ...
37,217,338 UART:
37,217,491 UART: [state] CFI Enabled
37,261,845 UART: [art] Extend RT PCRs Done
37,263,030 UART: [art] Lock RT PCRs Done
37,264,289 UART: [art] Populate DV Done
37,269,769 UART: [fht] FMC Alias Private Key: 7
37,271,303 UART: [art] Derive CDI
37,272,040 UART: [art] Store in in slot 0x4
37,314,852 UART: [art] Derive Key Pair
37,315,910 UART: [art] Store priv key in slot 0x5
39,742,609 UART: [art] Derive Key Pair - Done
39,755,615 UART: [art] Signing Cert with AUTHO
39,756,923 UART: RITY.KEYID = 7
41,462,192 UART: [art] Erasing AUTHORITY.KEYID = 7
41,463,697 UART: [art] PUB.X = 68E1EEFB2C7E254919A686BF6A8BF6357F20D811786F0EB02A0EED43DCC2747E7A0AD93B81699DE0F44D4CAB1274A8C0
41,471,007 UART: [art] PUB.Y = 44148667D2C35719A0CEF2AA0B57C0E34EF2BA132D207F96DF7871357960CE2FA3A9008B63A5EBFECFB3A14CC8B7D8C4
41,478,274 UART: [art] SIG.R = 415FE7901C75197874F89B228B01F5ECCD4EC52A7B55EB044FA1C6A731C902E0055CCA4B51FFDDB7CAD3E242474BAB46
41,485,678 UART: [art] SIG.S = 1867FE5A01B62DACB26119E9E391670E300CE2E6513BA4B64529B5887628F3358438D54CCC8CCEBB76D8B2571FE80A27
42,464,873 UART: Caliptra RT
42,465,570 UART: [state] CFI Enabled
45,184,213 UART: [rt] RT listening for mailbox commands...
45,215,329 UART: [rt]cmd =0x494e464f, len=4
45,219,721 >>> mbox cmd response data (312 bytes)
45,221,579 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,251,449 UART: [rt]cmd =0x43455252, len=4
45,262,939 >>> mbox cmd response data (782 bytes)
45,303,958 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,334,584 UART: [rt]cmd =0x44504543, len=92
49,619,728 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,078 UART:
192,451 UART: Running Caliptra ROM ...
193,564 UART:
193,707 UART: [state] CFI Enabled
265,374 UART: [state] LifecycleState = Unprovisioned
267,795 UART: [state] DebugLocked = No
269,109 UART: [state] WD Timer not started. Device not locked for debugging
274,511 UART: [kat] SHA2-256
464,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,158 UART: [kat] ++
475,606 UART: [kat] sha1
487,118 UART: [kat] SHA2-256
490,127 UART: [kat] SHA2-384
496,190 UART: [kat] SHA2-512-ACC
498,772 UART: [kat] ECC-384
2,951,497 UART: [kat] HMAC-384Kdf
2,971,856 UART: [kat] LMS
3,503,620 UART: [kat] --
3,507,763 UART: [cold-reset] ++
3,508,843 UART: [fht] FHT @ 0x50003400
3,521,451 UART: [idev] ++
3,522,157 UART: [idev] CDI.KEYID = 6
3,523,189 UART: [idev] SUBJECT.KEYID = 7
3,524,290 UART: [idev] UDS.KEYID = 0
3,525,236 ready_for_fw is high
3,525,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,026 UART: [idev] Erasing UDS.KEYID = 0
6,032,180 UART: [idev] Sha1 KeyId Algorithm
6,054,386 UART: [idev] --
6,058,168 UART: [ldev] ++
6,058,850 UART: [ldev] CDI.KEYID = 6
6,059,740 UART: [ldev] SUBJECT.KEYID = 5
6,060,978 UART: [ldev] AUTHORITY.KEYID = 7
6,062,109 UART: [ldev] FE.KEYID = 1
6,100,822 UART: [ldev] Erasing FE.KEYID = 1
8,607,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,952 UART: [ldev] --
10,417,187 UART: [fwproc] Wait for Commands...
10,419,713 UART: [fwproc] Recv command 0x46574c44
10,422,124 UART: [fwproc] Recv'd Img size: 114168 bytes
13,878,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,613,812 >>> mbox cmd response: success
14,614,322 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,617,361 UART: [afmc] ++
14,618,082 UART: [afmc] CDI.KEYID = 6
14,619,286 UART: [afmc] SUBJECT.KEYID = 7
14,620,726 UART: [afmc] AUTHORITY.KEYID = 5
17,150,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,323 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,459 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,517 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,792 UART: [afmc] --
18,948,869 UART: [cold-reset] --
18,953,054 UART: [state] Locking Datavault
18,957,933 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,082 UART: [state] Locking ICCM
18,961,344 UART: [exit] Launching FMC @ 0x40000130
18,969,690 UART:
18,969,922 UART: Running Caliptra FMC ...
18,971,022 UART:
18,971,181 UART: [state] CFI Enabled
19,032,206 UART: [fht] FMC Alias Private Key: 7
20,796,244 UART: [art] Extend RT PCRs Done
20,797,461 UART: [art] Lock RT PCRs Done
20,798,915 UART: [art] Populate DV Done
20,804,172 UART: [fht] FMC Alias Private Key: 7
20,805,665 UART: [art] Derive CDI
20,806,429 UART: [art] Store in in slot 0x4
20,864,794 UART: [art] Derive Key Pair
20,865,830 UART: [art] Store priv key in slot 0x5
23,328,886 UART: [art] Derive Key Pair - Done
23,341,829 UART: [art] Signing Cert with AUTHO
23,343,154 UART: RITY.KEYID = 7
25,055,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,522 UART: [art] PUB.X = 34335F217F442C8CB09FFCAB3D6FCC3D77021D3622E4E69C409A493AB3FEE243AE012FC3800C1AE065014527D8A02584
25,063,825 UART: [art] PUB.Y = 894A604C7FF926851EFC59C0EBE2EBF91622C22516D9DAA486ED8A975328C65213350D87B81EB8F3AA28A1C555B65F0C
25,071,062 UART: [art] SIG.R = 14F05D6F4FC72D21F1A558828AFAF600A3365834EA37A88E223892555243ED6BF18F68EFBF713A7CC0626BDACCEB3F11
25,078,434 UART: [art] SIG.S = 567DAFDC0C7CDF6E3A2C86979EA620A2EA29ED31706AD036EEF494DE616687C8BD4B31E2CBB97D32DF73F7DEC8060300
26,057,283 UART: Caliptra RT
26,057,995 UART: [state] CFI Enabled
26,223,363 UART: [rt] RT listening for mailbox commands...
26,254,998 UART: [rt]cmd =0x4453424c, len=4
28,748,166 >>> mbox cmd response data (8 bytes)
30,802,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,947,689 UART:
30,948,079 UART: Running Caliptra ROM ...
30,949,169 UART:
30,949,341 UART: [state] CFI Enabled
31,003,963 UART: [state] LifecycleState = Unprovisioned
31,006,081 UART: [state] DebugLocked = No
31,008,858 UART: [state] WD Timer not started. Device not locked for debugging
31,013,927 UART: [kat] SHA2-256
31,203,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,214,535 UART: [kat] ++
31,215,021 UART: [kat] sha1
31,226,673 UART: [kat] SHA2-256
31,229,680 UART: [kat] SHA2-384
31,235,084 UART: [kat] SHA2-512-ACC
31,237,660 UART: [kat] ECC-384
33,691,160 UART: [kat] HMAC-384Kdf
33,713,730 UART: [kat] LMS
34,245,322 UART: [kat] --
34,249,823 UART: [update-reset] ++
37,708,772 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,711,346 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
38,317,926 >>> mbox cmd response: success
38,318,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,319,434 UART: [update-reset] Copying MAN_2 To MAN_1
38,357,007 UART: [update-reset Success] --
38,360,910 UART: [state] Locking Datavault
38,365,205 UART: [state] Locking PCR0, PCR1 and PCR31
38,367,413 UART: [state] Locking ICCM
38,369,300 UART: [exit] Launching FMC @ 0x40000130
38,377,981 UART:
38,378,215 UART: Running Caliptra FMC ...
38,379,335 UART:
38,379,496 UART: [state] CFI Enabled
38,480,430 UART: [art] Extend RT PCRs Done
38,481,613 UART: [art] Lock RT PCRs Done
38,482,911 UART: [art] Populate DV Done
38,488,644 UART: [fht] FMC Alias Private Key: 7
38,490,394 UART: [art] Derive CDI
38,491,204 UART: [art] Store in in slot 0x4
38,549,510 UART: [art] Derive Key Pair
38,550,549 UART: [art] Store priv key in slot 0x5
41,013,325 UART: [art] Derive Key Pair - Done
41,026,269 UART: [art] Signing Cert with AUTHO
41,027,581 UART: RITY.KEYID = 7
42,738,906 UART: [art] Erasing AUTHORITY.KEYID = 7
42,740,412 UART: [art] PUB.X = F0A1A1629F02A2191556BCA882195003ACDF7BCFCE3B6FF7854400B30A533DCCD89D2F2B4A8A439F8270B5E69EB967FB
42,747,698 UART: [art] PUB.Y = A67487D475E9D26B01285ABD891CB022B845D22B4C60440EC85A982DDF49A6518D879618984228EE1A10D3735DB09192
42,754,874 UART: [art] SIG.R = 217B75A0277887DF797CC9DF012F89FCE78F717527C8EA37775686B6FC2C7AEC3CC3D208DA0916728F3565BEC840EB3F
42,762,302 UART: [art] SIG.S = 676535D93C64D7BBF13168B85968A3409EC01CE9EAF65AA7BD23BF03850E4D2DA9CDDA61DCECF57BB8515AA44EBA0DAC
43,740,963 UART: Caliptra RT
43,741,648 UART: [state] CFI Enabled
46,547,577 UART: [rt] RT listening for mailbox commands...
46,578,756 UART: [rt]cmd =0x494e464f, len=4
46,583,043 >>> mbox cmd response data (312 bytes)
46,585,155 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,614,855 UART: [rt]cmd =0x43455252, len=4
46,626,487 >>> mbox cmd response data (782 bytes)
46,667,644 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,698,329 UART: [rt]cmd =0x44504543, len=92
51,049,919 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,856 writing to cptra_bootfsm_go
3,439,510 ready_for_fw is high
3,439,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,729,948 >>> mbox cmd response: success
14,730,705 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,022,956 UART:
19,023,342 UART: Running Caliptra FMC ...
19,024,542 UART:
19,024,719 UART: [state] CFI Enabled
19,090,463 UART: [fht] FMC Alias Private Key: 7
20,854,898 UART: [art] Extend RT PCRs Done
20,856,126 UART: [art] Lock RT PCRs Done
20,857,650 UART: [art] Populate DV Done
20,862,948 UART: [fht] FMC Alias Private Key: 7
20,864,650 UART: [art] Derive CDI
20,865,465 UART: [art] Store in in slot 0x4
20,922,668 UART: [art] Derive Key Pair
20,923,710 UART: [art] Store priv key in slot 0x5
23,386,185 UART: [art] Derive Key Pair - Done
23,399,237 UART: [art] Signing Cert with AUTHO
23,400,553 UART: RITY.KEYID = 7
25,111,851 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,358 UART: [art] PUB.X = C4A99975ED45C8A521981D0F5DD3CE1B0F377FB10FB19B134215794F72D03A40BB490B4B5F604D0600976C0CA55EA275
25,120,613 UART: [art] PUB.Y = 5FB95D97045B8B7FFF118A75BC9C28D71DF6D3733AA39504F2E75697AF2D832E3451C235029F11C29018B2EEAACD3155
25,127,886 UART: [art] SIG.R = 768A9ADAB029985B93B3D715E861E086AA9B8A867D2E0FA39339E9D127C3A6E330B599B031BA8931A6C52F9B0830C648
25,135,285 UART: [art] SIG.S = 66D9F478F031483FBB3C4C7A99509A2430864C529BBEAB47689933FCE8C1A87E34554C552CD31B33C8E6D2B6AB5EC8D4
26,114,086 UART: Caliptra RT
26,114,799 UART: [state] CFI Enabled
26,278,937 UART: [rt] RT listening for mailbox commands...
26,309,971 UART: [rt]cmd =0x4453424c, len=4
28,782,153 >>> mbox cmd response data (8 bytes)
30,836,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,640,157 >>> mbox cmd response: success
38,640,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,675,580 UART:
38,675,911 UART: Running Caliptra FMC ...
38,676,960 UART:
38,677,110 UART: [state] CFI Enabled
38,770,556 UART: [art] Extend RT PCRs Done
38,771,741 UART: [art] Lock RT PCRs Done
38,773,347 UART: [art] Populate DV Done
38,778,764 UART: [fht] FMC Alias Private Key: 7
38,780,304 UART: [art] Derive CDI
38,781,040 UART: [art] Store in in slot 0x4
38,839,523 UART: [art] Derive Key Pair
38,840,560 UART: [art] Store priv key in slot 0x5
41,303,424 UART: [art] Derive Key Pair - Done
41,316,416 UART: [art] Signing Cert with AUTHO
41,317,730 UART: RITY.KEYID = 7
43,028,640 UART: [art] Erasing AUTHORITY.KEYID = 7
43,030,152 UART: [art] PUB.X = 14721650819FFA0A63F729F53B09A4A7E4F9224B7EF2D82C5F3BF68A8001AAC0D67BE8B2CCBB01F7A590BA62D89F60BC
43,037,399 UART: [art] PUB.Y = F92F3133277DB03BC6A35E5EC0B48567535F4D92A91A2862AEA8E5489A39D27B84B51F5C11A4E8EB3A0BF614BBCCF091
43,044,711 UART: [art] SIG.R = 1706094EBEA6B3718E8603205325932D8EBEEDFCA127B082749E672CB01689C28E31395029406542165733163E97763C
43,052,062 UART: [art] SIG.S = FB58A246A623FE5E783E048695D4FDA60AF622E08B4274C00DDD72CD8A036E407C52E5DF36CD185F72D08CE2A61B5928
44,031,094 UART: Caliptra RT
44,031,783 UART: [state] CFI Enabled
46,840,010 UART: [rt] RT listening for mailbox commands...
46,870,973 UART: [rt]cmd =0x494e464f, len=4
46,875,424 >>> mbox cmd response data (312 bytes)
46,877,283 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,906,893 UART: [rt]cmd =0x43455252, len=4
46,918,284 >>> mbox cmd response data (783 bytes)
46,959,723 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,990,438 UART: [rt]cmd =0x44504543, len=92
51,339,554 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,647 writing to cptra_bootfsm_go
192,906 UART:
193,262 UART: Running Caliptra ROM ...
194,450 UART:
604,004 UART: [state] CFI Enabled
617,764 UART: [state] LifecycleState = Unprovisioned
620,146 UART: [state] DebugLocked = No
621,457 UART: [state] WD Timer not started. Device not locked for debugging
626,137 UART: [kat] SHA2-256
815,991 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,793 UART: [kat] ++
827,395 UART: [kat] sha1
837,564 UART: [kat] SHA2-256
840,600 UART: [kat] SHA2-384
846,665 UART: [kat] SHA2-512-ACC
849,245 UART: [kat] ECC-384
3,289,769 UART: [kat] HMAC-384Kdf
3,302,504 UART: [kat] LMS
3,834,312 UART: [kat] --
3,838,869 UART: [cold-reset] ++
3,839,728 UART: [fht] FHT @ 0x50003400
3,851,267 UART: [idev] ++
3,851,898 UART: [idev] CDI.KEYID = 6
3,852,851 UART: [idev] SUBJECT.KEYID = 7
3,854,097 UART: [idev] UDS.KEYID = 0
3,855,002 ready_for_fw is high
3,855,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,540 UART: [idev] Erasing UDS.KEYID = 0
6,328,630 UART: [idev] Sha1 KeyId Algorithm
6,351,338 UART: [idev] --
6,355,816 UART: [ldev] ++
6,356,495 UART: [ldev] CDI.KEYID = 6
6,357,475 UART: [ldev] SUBJECT.KEYID = 5
6,358,632 UART: [ldev] AUTHORITY.KEYID = 7
6,359,812 UART: [ldev] FE.KEYID = 1
6,368,457 UART: [ldev] Erasing FE.KEYID = 1
8,847,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,076 UART: [ldev] --
10,642,267 UART: [fwproc] Wait for Commands...
10,644,191 UART: [fwproc] Recv command 0x46574c44
10,646,441 UART: [fwproc] Recv'd Img size: 114168 bytes
14,097,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,397 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,840,367 >>> mbox cmd response: success
14,840,839 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,844,807 UART: [afmc] ++
14,845,511 UART: [afmc] CDI.KEYID = 6
14,846,674 UART: [afmc] SUBJECT.KEYID = 7
14,848,162 UART: [afmc] AUTHORITY.KEYID = 5
17,354,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,080 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,429 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,460 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,170 UART: [afmc] --
19,148,846 UART: [cold-reset] --
19,152,117 UART: [state] Locking Datavault
19,157,746 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,941 UART: [state] Locking ICCM
19,162,641 UART: [exit] Launching FMC @ 0x40000130
19,171,316 UART:
19,171,550 UART: Running Caliptra FMC ...
19,172,651 UART:
19,172,813 UART: [state] CFI Enabled
19,181,078 UART: [fht] FMC Alias Private Key: 7
20,937,823 UART: [art] Extend RT PCRs Done
20,939,047 UART: [art] Lock RT PCRs Done
20,940,842 UART: [art] Populate DV Done
20,946,310 UART: [fht] FMC Alias Private Key: 7
20,947,906 UART: [art] Derive CDI
20,948,670 UART: [art] Store in in slot 0x4
20,991,404 UART: [art] Derive Key Pair
20,992,423 UART: [art] Store priv key in slot 0x5
23,418,399 UART: [art] Derive Key Pair - Done
23,430,641 UART: [art] Signing Cert with AUTHO
23,431,965 UART: RITY.KEYID = 7
25,137,431 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,922 UART: [art] PUB.X = BD8B2489F067A20F4795CAC5D38E0EAFCC914BADAD71A82FB3FF196EF7ADD733B9225480256CCEFDB083E146D70D8003
25,146,214 UART: [art] PUB.Y = 95D3E3B5CB675DA196AAAE7B97FD34F1732B2DE9E318C6BADC0994B2F516B6B45601688948C099F505930228391DA07D
25,153,496 UART: [art] SIG.R = CAA8512BC8918A8628D2F93704E4E65454F28EF6BCC9611EC9981546ACF838F919E52116388F9311B991DAA763C6A8A3
25,160,893 UART: [art] SIG.S = 28229611B70A50C7E6C920D57F2CEED4E22B6402AE561957EFFFED7719712EDD6D58A9FED59BAEC48851F78F69F07580
26,139,885 UART: Caliptra RT
26,140,593 UART: [state] CFI Enabled
26,258,200 UART: [rt] RT listening for mailbox commands...
26,289,450 UART: [rt]cmd =0x4453424c, len=4
28,720,273 >>> mbox cmd response data (8 bytes)
30,773,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,918,492 UART:
30,918,874 UART: Running Caliptra ROM ...
30,919,953 UART:
30,920,110 UART: [state] CFI Enabled
30,934,712 UART: [state] LifecycleState = Unprovisioned
30,936,556 UART: [state] DebugLocked = No
30,938,211 UART: [state] WD Timer not started. Device not locked for debugging
30,942,997 UART: [kat] SHA2-256
31,132,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,143,648 UART: [kat] ++
31,144,163 UART: [kat] sha1
31,156,045 UART: [kat] SHA2-256
31,159,070 UART: [kat] SHA2-384
31,164,953 UART: [kat] SHA2-512-ACC
31,167,576 UART: [kat] ECC-384
33,607,644 UART: [kat] HMAC-384Kdf
33,620,373 UART: [kat] LMS
34,151,976 UART: [kat] --
34,158,521 UART: [update-reset] ++
37,612,542 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,616,355 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
38,222,920 >>> mbox cmd response: success
38,223,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,224,493 UART: [update-reset] Copying MAN_2 To MAN_1
38,262,053 UART: [update-reset Success] --
38,266,492 UART: [state] Locking Datavault
38,270,141 UART: [state] Locking PCR0, PCR1 and PCR31
38,272,357 UART: [state] Locking ICCM
38,273,734 UART: [exit] Launching FMC @ 0x40000130
38,282,405 UART:
38,282,640 UART: Running Caliptra FMC ...
38,283,741 UART:
38,283,897 UART: [state] CFI Enabled
38,328,238 UART: [art] Extend RT PCRs Done
38,329,423 UART: [art] Lock RT PCRs Done
38,330,797 UART: [art] Populate DV Done
38,336,151 UART: [fht] FMC Alias Private Key: 7
38,337,736 UART: [art] Derive CDI
38,338,473 UART: [art] Store in in slot 0x4
38,381,061 UART: [art] Derive Key Pair
38,382,060 UART: [art] Store priv key in slot 0x5
40,808,793 UART: [art] Derive Key Pair - Done
40,821,846 UART: [art] Signing Cert with AUTHO
40,823,167 UART: RITY.KEYID = 7
42,528,195 UART: [art] Erasing AUTHORITY.KEYID = 7
42,529,703 UART: [art] PUB.X = 2FF9C93FA04779AF97CB490C5BA46E0035A332C9DB31EF07DA88C0E31EBC680DF246219DCB78ED10B8344348DD32F34D
42,536,952 UART: [art] PUB.Y = 2DAC3B0F5E2CF2BA05E42CAB1902DD737EA0F4ED188FFE397A06CA443B4011429254B627C3A70AA76B47702897AA5167
42,544,238 UART: [art] SIG.R = B9E52F5560533ECD25F00B6C5B103D639640834A4F44A28FDC1E44316B6E76DCBC84A2343998C776E10F141D5AC4A73F
42,551,653 UART: [art] SIG.S = 03D78E627AD02BB61F07FFF6981B74C5DAA1239E78628F48C59AFB790844EEE91CE976485263043660C4D44C6A0EC701
43,530,251 UART: Caliptra RT
43,530,935 UART: [state] CFI Enabled
46,248,362 UART: [rt] RT listening for mailbox commands...
46,279,220 UART: [rt]cmd =0x494e464f, len=4
46,283,565 >>> mbox cmd response data (312 bytes)
46,285,428 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,315,089 UART: [rt]cmd =0x43455252, len=4
46,326,471 >>> mbox cmd response data (783 bytes)
46,367,204 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,398,143 UART: [rt]cmd =0x44504543, len=92
50,682,258 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,836 writing to cptra_bootfsm_go
3,756,023 ready_for_fw is high
3,756,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,959,925 >>> mbox cmd response: success
14,960,592 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,213,044 UART:
19,213,438 UART: Running Caliptra FMC ...
19,214,629 UART:
19,214,798 UART: [state] CFI Enabled
19,222,809 UART: [fht] FMC Alias Private Key: 7
20,980,044 UART: [art] Extend RT PCRs Done
20,981,260 UART: [art] Lock RT PCRs Done
20,983,102 UART: [art] Populate DV Done
20,988,684 UART: [fht] FMC Alias Private Key: 7
20,990,280 UART: [art] Derive CDI
20,991,098 UART: [art] Store in in slot 0x4
21,033,996 UART: [art] Derive Key Pair
21,035,069 UART: [art] Store priv key in slot 0x5
23,462,036 UART: [art] Derive Key Pair - Done
23,474,933 UART: [art] Signing Cert with AUTHO
23,476,264 UART: RITY.KEYID = 7
25,181,361 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,877 UART: [art] PUB.X = 54A4488295856EB0497A90BF9C127239B1B839DB754B9F265EA2E5612135C9185AE79C961ED00CAF9595603169932456
25,190,075 UART: [art] PUB.Y = ADFAC6460EDB8B92BDEDEFB13D14E8DDF7F44B9DCF0683D69EA0B5E54EFE3E8021B0572CF7C37E457173DD8430381952
25,197,375 UART: [art] SIG.R = 8D100DB24CD0000AA8C0B8D0560CC55854FB321FA055C436A9433706590113F0CFCCB8C045150DE0411BE8821780268E
25,204,714 UART: [art] SIG.S = 04A02173A3E39D5686777B7D626EE77E01B27D650D184D882E9699F36183F65129838FEA0912C3E0FED78E34AC702456
26,183,535 UART: Caliptra RT
26,184,226 UART: [state] CFI Enabled
26,300,708 UART: [rt] RT listening for mailbox commands...
26,332,128 UART: [rt]cmd =0x4453424c, len=4
28,762,839 >>> mbox cmd response data (8 bytes)
30,816,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
38,544,701 >>> mbox cmd response: success
38,545,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,578,497 UART:
38,578,787 UART: Running Caliptra FMC ...
38,579,822 UART:
38,579,973 UART: [state] CFI Enabled
38,623,944 UART: [art] Extend RT PCRs Done
38,625,128 UART: [art] Lock RT PCRs Done
38,626,743 UART: [art] Populate DV Done
38,632,317 UART: [fht] FMC Alias Private Key: 7
38,634,074 UART: [art] Derive CDI
38,634,819 UART: [art] Store in in slot 0x4
38,677,579 UART: [art] Derive Key Pair
38,678,577 UART: [art] Store priv key in slot 0x5
41,106,005 UART: [art] Derive Key Pair - Done
41,118,868 UART: [art] Signing Cert with AUTHO
41,120,173 UART: RITY.KEYID = 7
42,825,547 UART: [art] Erasing AUTHORITY.KEYID = 7
42,827,052 UART: [art] PUB.X = 3F30B8250C0C6020FACBD8C74CA8954FA9BFFC853E8BA49654E5DD0C86336D14836269474D93AE6000AB49ED5FCD87B3
42,834,295 UART: [art] PUB.Y = 5F74ED7019BDD62FDF295DD1C8017BA8B4C33B9DC35D964CD481EE761F5320DCFF39D49DC370AE3EE2F397016EE3F07C
42,841,587 UART: [art] SIG.R = AEA8581959ED717B64EBBF2989414DC93797726D6AA6C6006F40874F7314CFF06AE6A35E2837187E03FD32315D5E9316
42,848,932 UART: [art] SIG.S = F06320D0B13FCC368910D53077E48F3B025FF48704D155726DECF1C96B0F2E1312575C05FDF64F9AC3E414E11805BA99
43,827,995 UART: Caliptra RT
43,828,682 UART: [state] CFI Enabled
46,547,214 UART: [rt] RT listening for mailbox commands...
46,578,096 UART: [rt]cmd =0x494e464f, len=4
46,582,610 >>> mbox cmd response data (312 bytes)
46,584,510 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,614,483 UART: [rt]cmd =0x43455252, len=4
46,625,766 >>> mbox cmd response data (784 bytes)
46,667,348 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,698,165 UART: [rt]cmd =0x44504543, len=92
50,983,081 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,123 UART: [kat] SHA2-256
882,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,169 UART: [kat] ++
886,321 UART: [kat] sha1
890,689 UART: [kat] SHA2-256
892,627 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,600 UART: [kat] HMAC-384Kdf
907,418 UART: [kat] LMS
1,475,614 UART: [kat] --
1,476,679 UART: [cold-reset] ++
1,477,247 UART: [fht] Storing FHT @ 0x50003400
1,479,914 UART: [idev] ++
1,480,082 UART: [idev] CDI.KEYID = 6
1,480,442 UART: [idev] SUBJECT.KEYID = 7
1,480,866 UART: [idev] UDS.KEYID = 0
1,481,211 ready_for_fw is high
1,481,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,858 UART: [idev] Erasing UDS.KEYID = 0
1,505,226 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,948 UART: [idev] --
1,515,145 UART: [ldev] ++
1,515,313 UART: [ldev] CDI.KEYID = 6
1,515,676 UART: [ldev] SUBJECT.KEYID = 5
1,516,102 UART: [ldev] AUTHORITY.KEYID = 7
1,516,565 UART: [ldev] FE.KEYID = 1
1,521,583 UART: [ldev] Erasing FE.KEYID = 1
1,547,036 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,210 UART: [ldev] --
1,586,723 UART: [fwproc] Waiting for Commands...
1,587,504 UART: [fwproc] Received command 0x46574c44
1,588,295 UART: [fwproc] Received Image of size 114168 bytes
2,885,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,269 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,621 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,126 >>> mbox cmd response: success
3,077,126 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,078,320 UART: [afmc] ++
3,078,488 UART: [afmc] CDI.KEYID = 6
3,078,850 UART: [afmc] SUBJECT.KEYID = 7
3,079,275 UART: [afmc] AUTHORITY.KEYID = 5
3,113,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,385 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,075 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,852 UART: [afmc] --
3,156,860 UART: [cold-reset] --
3,157,712 UART: [state] Locking Datavault
3,158,797 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,401 UART: [state] Locking ICCM
3,159,827 UART: [exit] Launching FMC @ 0x40000130
3,165,156 UART:
3,165,172 UART: Running Caliptra FMC ...
3,165,580 UART:
3,165,634 UART: [state] CFI Enabled
3,176,119 UART: [fht] FMC Alias Private Key: 7
3,284,018 UART: [art] Extend RT PCRs Done
3,284,446 UART: [art] Lock RT PCRs Done
3,285,914 UART: [art] Populate DV Done
3,294,045 UART: [fht] FMC Alias Private Key: 7
3,295,023 UART: [art] Derive CDI
3,295,303 UART: [art] Store in in slot 0x4
3,380,614 UART: [art] Derive Key Pair
3,380,974 UART: [art] Store priv key in slot 0x5
3,394,060 UART: [art] Derive Key Pair - Done
3,408,506 UART: [art] Signing Cert with AUTHO
3,408,986 UART: RITY.KEYID = 7
3,424,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,771 UART: [art] PUB.X = 5E24B59A350EE44031EA0E36948D87DC14F548C2170B5CF7A7C9BB85B83B29A936A7DFAD3293C1CE146F4C7417323F0A
3,431,537 UART: [art] PUB.Y = D4005F7F701D57DF6A7D381CBCAB4100D0E44E91ED52653DFE18E06B8626FC6980BC5932661F74277CDBE4A74EDAC129
3,438,455 UART: [art] SIG.R = B8A007058EB6C588D19C3FB63C158103324A4905D0BE43A5DF961556DF3BCD168D3F3E0352E251FAC79C24BC066EF793
3,445,213 UART: [art] SIG.S = D345E7B6601A3CCA55C8080ECDC8543D7FA01C510A7BC80797D1C3732C5C0B12903B699E86A58756BE93A5CBA1A386C6
3,468,905 UART: Caliptra RT
3,469,158 UART: [state] CFI Enabled
3,577,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,396 UART: [rt]cmd =0x4453424c, len=4
3,625,898 >>> mbox cmd response data (8 bytes)
3,625,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,579 UART:
3,626,595 UART: Running Caliptra ROM ...
3,627,003 UART:
3,627,057 UART: [state] CFI Enabled
3,629,755 UART: [state] LifecycleState = Unprovisioned
3,630,410 UART: [state] DebugLocked = No
3,631,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,632,539 UART: [kat] SHA2-256
4,426,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,430,585 UART: [kat] ++
4,430,737 UART: [kat] sha1
4,434,895 UART: [kat] SHA2-256
4,436,833 UART: [kat] SHA2-384
4,439,348 UART: [kat] SHA2-512-ACC
4,441,248 UART: [kat] ECC-384
4,446,773 UART: [kat] HMAC-384Kdf
4,451,343 UART: [kat] LMS
5,019,539 UART: [kat] --
5,020,326 UART: [update-reset] ++
6,352,928 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,354,126 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,503,756 >>> mbox cmd response: success
6,503,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,503,997 UART: [update-reset] Copying MAN_2 To MAN_1
6,512,011 UART: [update-reset Success] --
6,512,866 UART: [state] Locking Datavault
6,513,698 UART: [state] Locking PCR0, PCR1 and PCR31
6,514,302 UART: [state] Locking ICCM
6,514,762 UART: [exit] Launching FMC @ 0x40000130
6,520,091 UART:
6,520,107 UART: Running Caliptra FMC ...
6,520,515 UART:
6,520,569 UART: [state] CFI Enabled
6,610,136 UART: [art] Extend RT PCRs Done
6,610,564 UART: [art] Lock RT PCRs Done
6,612,027 UART: [art] Populate DV Done
6,620,204 UART: [fht] FMC Alias Private Key: 7
6,621,254 UART: [art] Derive CDI
6,621,534 UART: [art] Store in in slot 0x4
6,706,909 UART: [art] Derive Key Pair
6,707,269 UART: [art] Store priv key in slot 0x5
6,720,395 UART: [art] Derive Key Pair - Done
6,735,393 UART: [art] Signing Cert with AUTHO
6,735,873 UART: RITY.KEYID = 7
6,751,517 UART: [art] Erasing AUTHORITY.KEYID = 7
6,752,282 UART: [art] PUB.X = 84E9F33C03CA6461087C4D6CFA5DF0DF0265EE596E494149549A9D18A13615C07986744DD08B2B4615A784E171A6BC53
6,759,041 UART: [art] PUB.Y = 590CA1D14A39D7D9AA49125A25C00AA5F59D4784CE8DC01F05A1896C45934FFA020A74E298CCB26A8A9C8A69241468C2
6,765,982 UART: [art] SIG.R = 26D9EED7C249C84CBFF9A239ADD7BE89CBF387B53B26953DB19D4C2434B27CAD06B69A168878D34CDAE0521A1D7A5C97
6,772,767 UART: [art] SIG.S = FBC101FC1A3BDB81909C015F6F8024F546283BF47A411C71F58A7D3E06DAAE27554992AAD5563C0405526BCC0E9BF67B
6,797,032 UART: Caliptra RT
6,797,285 UART: [state] CFI Enabled
7,095,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,125,782 UART: [rt]cmd =0x494e464f, len=4
7,129,709 >>> mbox cmd response data (312 bytes)
7,129,710 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,159,039 UART: [rt]cmd =0x43455252, len=4
7,170,009 >>> mbox cmd response data (783 bytes)
7,170,010 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,199,753 UART: [rt]cmd =0x44504543, len=92
7,383,307 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,157 ready_for_fw is high
1,363,157 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,580 >>> mbox cmd response: success
2,927,580 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,988,544 UART:
2,988,560 UART: Running Caliptra FMC ...
2,988,968 UART:
2,989,022 UART: [state] CFI Enabled
2,999,439 UART: [fht] FMC Alias Private Key: 7
3,107,390 UART: [art] Extend RT PCRs Done
3,107,818 UART: [art] Lock RT PCRs Done
3,109,236 UART: [art] Populate DV Done
3,117,473 UART: [fht] FMC Alias Private Key: 7
3,118,567 UART: [art] Derive CDI
3,118,847 UART: [art] Store in in slot 0x4
3,204,384 UART: [art] Derive Key Pair
3,204,744 UART: [art] Store priv key in slot 0x5
3,218,608 UART: [art] Derive Key Pair - Done
3,233,627 UART: [art] Signing Cert with AUTHO
3,234,107 UART: RITY.KEYID = 7
3,249,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,184 UART: [art] PUB.X = C177AA5BC7B56F96082B80A60064BF162FC57384F00C698D6B25D6ABBBCA27412DDF30880006654B2726E0D38BE131DF
3,256,907 UART: [art] PUB.Y = DC8B0AF0A857F40C390D73C7EFB762CD76D4D628B1057F4217F4F1CBCABA8920A2B5702DB8B96681CD25EB55DEAA8B88
3,263,865 UART: [art] SIG.R = DD021A34C75FF3C75D75D8566FE07528A04DD65023E1BD0C8885CA287D08AC505F75CE0F1557B6A24D6CBFEFFA8FADED
3,270,645 UART: [art] SIG.S = D7D0D0B865E48830809E19CCA9AA60CC59A370EB90F733A04B7086B22F3C917E511F4550D9FD7712574BD33B40F2F016
3,294,490 UART: Caliptra RT
3,294,743 UART: [state] CFI Enabled
3,403,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,023 UART: [rt]cmd =0x4453424c, len=4
3,450,979 >>> mbox cmd response data (8 bytes)
3,450,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,211,579 >>> mbox cmd response: success
6,211,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,224,658 UART:
6,224,674 UART: Running Caliptra FMC ...
6,225,082 UART:
6,225,136 UART: [state] CFI Enabled
6,313,951 UART: [art] Extend RT PCRs Done
6,314,379 UART: [art] Lock RT PCRs Done
6,315,740 UART: [art] Populate DV Done
6,323,947 UART: [fht] FMC Alias Private Key: 7
6,324,917 UART: [art] Derive CDI
6,325,197 UART: [art] Store in in slot 0x4
6,410,636 UART: [art] Derive Key Pair
6,410,996 UART: [art] Store priv key in slot 0x5
6,424,514 UART: [art] Derive Key Pair - Done
6,439,265 UART: [art] Signing Cert with AUTHO
6,439,745 UART: RITY.KEYID = 7
6,455,055 UART: [art] Erasing AUTHORITY.KEYID = 7
6,455,820 UART: [art] PUB.X = 5C5CD49B7C4EDDEC66E7383B17A12BBF9ACA39F8D504944B112DAC0773EBD4DA44630B931426BB6711C2D53B6E3B51E4
6,462,597 UART: [art] PUB.Y = 78AAA7D4784EB156DC35BF015A5C51EA2CBFC0AEC3645823D3BE248F6315C3DBBB27663CC0360EB6FBE3CB355A517764
6,469,559 UART: [art] SIG.R = 5531095B753498FDA5E172D5253B9F295AD2D850AF2F1C824A113FD23A74A302760E42F8EB4511D64B5A8B449F66EB42
6,476,320 UART: [art] SIG.S = 0EA11AE2E8F2EBD4A99D0596FF0E973F8CB63EB12EEF35444E856805D4166284384CDCAFBBA01B0C999789C2A20B38AF
6,499,855 UART: Caliptra RT
6,500,108 UART: [state] CFI Enabled
6,794,951 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,825,108 UART: [rt]cmd =0x494e464f, len=4
6,828,835 >>> mbox cmd response data (312 bytes)
6,828,836 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,858,247 UART: [rt]cmd =0x43455252, len=4
6,869,167 >>> mbox cmd response data (782 bytes)
6,869,168 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,899,365 UART: [rt]cmd =0x44504543, len=92
7,082,398 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
890,954 UART: [kat] SHA2-256
892,892 UART: [kat] SHA2-384
895,707 UART: [kat] SHA2-512-ACC
897,608 UART: [kat] ECC-384
903,193 UART: [kat] HMAC-384Kdf
907,791 UART: [kat] LMS
1,475,987 UART: [kat] --
1,476,870 UART: [cold-reset] ++
1,477,414 UART: [fht] Storing FHT @ 0x50003400
1,480,197 UART: [idev] ++
1,480,365 UART: [idev] CDI.KEYID = 6
1,480,725 UART: [idev] SUBJECT.KEYID = 7
1,481,149 UART: [idev] UDS.KEYID = 0
1,481,494 ready_for_fw is high
1,481,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,223 UART: [idev] Erasing UDS.KEYID = 0
1,505,995 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,525 UART: [idev] --
1,515,442 UART: [ldev] ++
1,515,610 UART: [ldev] CDI.KEYID = 6
1,515,973 UART: [ldev] SUBJECT.KEYID = 5
1,516,399 UART: [ldev] AUTHORITY.KEYID = 7
1,516,862 UART: [ldev] FE.KEYID = 1
1,522,106 UART: [ldev] Erasing FE.KEYID = 1
1,546,979 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,957 UART: [ldev] --
1,586,426 UART: [fwproc] Waiting for Commands...
1,587,181 UART: [fwproc] Received command 0x46574c44
1,587,972 UART: [fwproc] Received Image of size 114168 bytes
2,884,910 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,614 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,966 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,551 >>> mbox cmd response: success
3,077,551 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,078,687 UART: [afmc] ++
3,078,855 UART: [afmc] CDI.KEYID = 6
3,079,217 UART: [afmc] SUBJECT.KEYID = 7
3,079,642 UART: [afmc] AUTHORITY.KEYID = 5
3,115,015 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,367 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,875 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,760 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,450 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,257 UART: [afmc] --
3,158,271 UART: [cold-reset] --
3,158,937 UART: [state] Locking Datavault
3,160,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,712 UART: [state] Locking ICCM
3,161,164 UART: [exit] Launching FMC @ 0x40000130
3,166,493 UART:
3,166,509 UART: Running Caliptra FMC ...
3,166,917 UART:
3,167,060 UART: [state] CFI Enabled
3,177,887 UART: [fht] FMC Alias Private Key: 7
3,286,122 UART: [art] Extend RT PCRs Done
3,286,550 UART: [art] Lock RT PCRs Done
3,288,086 UART: [art] Populate DV Done
3,296,323 UART: [fht] FMC Alias Private Key: 7
3,297,315 UART: [art] Derive CDI
3,297,595 UART: [art] Store in in slot 0x4
3,383,220 UART: [art] Derive Key Pair
3,383,580 UART: [art] Store priv key in slot 0x5
3,397,346 UART: [art] Derive Key Pair - Done
3,412,347 UART: [art] Signing Cert with AUTHO
3,412,827 UART: RITY.KEYID = 7
3,428,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,100 UART: [art] PUB.X = 163057E4965C90FA6E91BD2DD27B3E80533CF8D2025C0B169DCC670D8918DB75F61527E13361F46D7913E6AE79A3E879
3,435,861 UART: [art] PUB.Y = DA7783686CABFCF5BD18D87A10A14DA1EA721D507DE75CA138F17E59963E4D27F70AF8BDA16B67B90928BCCBA6A59451
3,442,823 UART: [art] SIG.R = 36D3DEFE7611256B79F275D8D959331ABF987F9329D24451663932572F6E354511DB93242C1C13857E68A5E9DDD3968D
3,449,585 UART: [art] SIG.S = 79A442436DE6C2A3DB3C2A87B3B4E5E41B3718E49F5ABEF841F6AE4A3C9DA50FEE3806A19C1EF3831156B1680639EDC2
3,473,219 UART: Caliptra RT
3,473,564 UART: [state] CFI Enabled
3,581,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,536 UART: [rt]cmd =0x4453424c, len=4
3,630,022 >>> mbox cmd response data (8 bytes)
3,630,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,823 UART:
3,630,839 UART: Running Caliptra ROM ...
3,631,247 UART:
3,631,388 UART: [state] CFI Enabled
3,634,608 UART: [state] LifecycleState = Unprovisioned
3,635,263 UART: [state] DebugLocked = No
3,635,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,637,508 UART: [kat] SHA2-256
4,431,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,435,554 UART: [kat] ++
4,435,706 UART: [kat] sha1
4,439,750 UART: [kat] SHA2-256
4,441,688 UART: [kat] SHA2-384
4,444,457 UART: [kat] SHA2-512-ACC
4,446,357 UART: [kat] ECC-384
4,451,886 UART: [kat] HMAC-384Kdf
4,456,706 UART: [kat] LMS
5,024,902 UART: [kat] --
5,025,661 UART: [update-reset] ++
6,357,923 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,359,097 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,508,727 >>> mbox cmd response: success
6,508,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,508,924 UART: [update-reset] Copying MAN_2 To MAN_1
6,516,938 UART: [update-reset Success] --
6,518,031 UART: [state] Locking Datavault
6,518,881 UART: [state] Locking PCR0, PCR1 and PCR31
6,519,485 UART: [state] Locking ICCM
6,520,105 UART: [exit] Launching FMC @ 0x40000130
6,525,434 UART:
6,525,450 UART: Running Caliptra FMC ...
6,525,858 UART:
6,526,001 UART: [state] CFI Enabled
6,615,606 UART: [art] Extend RT PCRs Done
6,616,034 UART: [art] Lock RT PCRs Done
6,617,215 UART: [art] Populate DV Done
6,625,322 UART: [fht] FMC Alias Private Key: 7
6,626,464 UART: [art] Derive CDI
6,626,744 UART: [art] Store in in slot 0x4
6,712,853 UART: [art] Derive Key Pair
6,713,213 UART: [art] Store priv key in slot 0x5
6,726,893 UART: [art] Derive Key Pair - Done
6,741,358 UART: [art] Signing Cert with AUTHO
6,741,838 UART: RITY.KEYID = 7
6,757,448 UART: [art] Erasing AUTHORITY.KEYID = 7
6,758,213 UART: [art] PUB.X = 9D7EF4CECFADA2B2F5D1EF7305E9CAB3107C4FA15A85A01AF1EEDACCDC546242512BA9CA0DEACAC39B985E0584D713A6
6,765,008 UART: [art] PUB.Y = 51BB127491FC42BA2E6939B34FA74C98221163EC1EEF4F71B6155D45E9063A8B354C5DCE25B3F2024DBBAA5DC85AFA77
6,771,966 UART: [art] SIG.R = 9FF5C9BA4D1C35856167AACA7E4504265DD5490421B15CD2E941DC526C9F6B935D89FCE94E2A4010F9FA9AB8BC7370C6
6,778,742 UART: [art] SIG.S = CA953D252554E17B83EDE88F6ED742052BC2D66E518BBB131539957D36443DC7E1B1AA51F180C43380E9DFEB2DFDD7AD
6,802,274 UART: Caliptra RT
6,802,619 UART: [state] CFI Enabled
7,099,422 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,129,439 UART: [rt]cmd =0x494e464f, len=4
7,133,098 >>> mbox cmd response data (312 bytes)
7,133,099 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,162,450 UART: [rt]cmd =0x43455252, len=4
7,173,135 >>> mbox cmd response data (784 bytes)
7,173,136 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,202,837 UART: [rt]cmd =0x44504543, len=92
7,386,017 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,226 ready_for_fw is high
1,363,226 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,799 >>> mbox cmd response: success
2,928,799 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,991,147 UART:
2,991,163 UART: Running Caliptra FMC ...
2,991,571 UART:
2,991,714 UART: [state] CFI Enabled
3,002,687 UART: [fht] FMC Alias Private Key: 7
3,110,546 UART: [art] Extend RT PCRs Done
3,110,974 UART: [art] Lock RT PCRs Done
3,112,492 UART: [art] Populate DV Done
3,120,689 UART: [fht] FMC Alias Private Key: 7
3,121,701 UART: [art] Derive CDI
3,121,981 UART: [art] Store in in slot 0x4
3,207,636 UART: [art] Derive Key Pair
3,207,996 UART: [art] Store priv key in slot 0x5
3,221,024 UART: [art] Derive Key Pair - Done
3,235,299 UART: [art] Signing Cert with AUTHO
3,235,779 UART: RITY.KEYID = 7
3,250,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,696 UART: [art] PUB.X = 0C9731B57E8898EFE07F16E5A9441295F81AE308858841CDF1CE6F7F40B5BABB644839AC47EF29B80DE85CEFE8D0CF32
3,258,471 UART: [art] PUB.Y = 6F6E3A8E5772B5351F2FD9DC6E7DE79C2AC0B6F57F1AE1B4F47F92A6B254B57B7CD950CE0135E636FCAE2EA4626E2001
3,265,433 UART: [art] SIG.R = B817BBAA0A83A880B43CBE0FE6D6804276C9CDA87F62E814336E0BE4B2B92CE6796AF3594200271D41A7DA8881926180
3,272,176 UART: [art] SIG.S = 86CCC00952076D0A47019163FAE1C97E68CDFD2D80CA073573CE6EF4367C3DF44D2413DA381BD4C38DEBD12340D81021
3,296,126 UART: Caliptra RT
3,296,471 UART: [state] CFI Enabled
3,405,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,777 UART: [rt]cmd =0x4453424c, len=4
3,453,377 >>> mbox cmd response data (8 bytes)
3,453,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,212,356 >>> mbox cmd response: success
6,212,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,225,829 UART:
6,225,845 UART: Running Caliptra FMC ...
6,226,253 UART:
6,226,396 UART: [state] CFI Enabled
6,315,717 UART: [art] Extend RT PCRs Done
6,316,145 UART: [art] Lock RT PCRs Done
6,317,396 UART: [art] Populate DV Done
6,325,447 UART: [fht] FMC Alias Private Key: 7
6,326,449 UART: [art] Derive CDI
6,326,729 UART: [art] Store in in slot 0x4
6,412,414 UART: [art] Derive Key Pair
6,412,774 UART: [art] Store priv key in slot 0x5
6,426,576 UART: [art] Derive Key Pair - Done
6,441,364 UART: [art] Signing Cert with AUTHO
6,441,844 UART: RITY.KEYID = 7
6,456,910 UART: [art] Erasing AUTHORITY.KEYID = 7
6,457,675 UART: [art] PUB.X = 7E5DEEA87EFF4425D75F35D8CA89590252DC9023E5B968918B915703164CD69C2A924343914851CB4F045441B40277D2
6,464,425 UART: [art] PUB.Y = 755A271EA7BF0BC9064B5CE069FBFBA6F850602B84E2A8ED2DF06FA8569DFE39DBCB1B75B0ABAE7EA104ABE339621E90
6,471,392 UART: [art] SIG.R = 9BC8B0286207818E9D2650A0F2FEF743EE5BBF1A57D33C6B2A37B9DEBBD54AC37E76829516D3E9563DFE671BC6A3EB48
6,478,175 UART: [art] SIG.S = 6CAB58086C47AC3FF2E9A10D4FAFE79BA535B0A52D250EFE16209BEE063AF8769B740D516534158BA5D6805C75353E16
6,502,553 UART: Caliptra RT
6,502,898 UART: [state] CFI Enabled
6,797,890 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,827,997 UART: [rt]cmd =0x494e464f, len=4
6,831,584 >>> mbox cmd response data (312 bytes)
6,831,585 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,860,992 UART: [rt]cmd =0x43455252, len=4
6,871,858 >>> mbox cmd response data (783 bytes)
6,871,859 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,901,738 UART: [rt]cmd =0x44504543, len=92
7,084,856 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,545 UART: [kat] SHA2-256
903,485 UART: [kat] SHA2-384
906,170 UART: [kat] SHA2-512-ACC
908,071 UART: [kat] ECC-384
917,632 UART: [kat] HMAC-384Kdf
922,278 UART: [kat] LMS
1,170,606 UART: [kat] --
1,171,681 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 ready_for_fw is high
1,176,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,708 UART: [idev] Erasing UDS.KEYID = 0
1,200,315 UART: [idev] Sha1 KeyId Algorithm
1,208,735 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,268 UART: [ldev] SUBJECT.KEYID = 5
1,210,694 UART: [ldev] AUTHORITY.KEYID = 7
1,211,157 UART: [ldev] FE.KEYID = 1
1,216,357 UART: [ldev] Erasing FE.KEYID = 1
1,243,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,115 UART: [ldev] --
1,282,480 UART: [fwproc] Wait for Commands...
1,283,116 UART: [fwproc] Recv command 0x46574c44
1,283,844 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,355 >>> mbox cmd response: success
2,772,355 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,773,385 UART: [afmc] ++
2,773,553 UART: [afmc] CDI.KEYID = 6
2,773,915 UART: [afmc] SUBJECT.KEYID = 7
2,774,340 UART: [afmc] AUTHORITY.KEYID = 5
2,809,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,640 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,525 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,932 UART: [afmc] --
2,853,006 UART: [cold-reset] --
2,853,880 UART: [state] Locking Datavault
2,854,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,585 UART: [state] Locking ICCM
2,856,225 UART: [exit] Launching FMC @ 0x40000130
2,861,554 UART:
2,861,570 UART: Running Caliptra FMC ...
2,861,978 UART:
2,862,032 UART: [state] CFI Enabled
2,872,293 UART: [fht] FMC Alias Private Key: 7
2,980,436 UART: [art] Extend RT PCRs Done
2,980,864 UART: [art] Lock RT PCRs Done
2,982,434 UART: [art] Populate DV Done
2,990,773 UART: [fht] FMC Alias Private Key: 7
2,991,875 UART: [art] Derive CDI
2,992,155 UART: [art] Store in in slot 0x4
3,077,640 UART: [art] Derive Key Pair
3,078,000 UART: [art] Store priv key in slot 0x5
3,091,346 UART: [art] Derive Key Pair - Done
3,106,013 UART: [art] Signing Cert with AUTHO
3,106,493 UART: RITY.KEYID = 7
3,121,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,538 UART: [art] PUB.X = C097041DA3EAC7C6998DCD202A066EA9192B573EC3F96CF47C42207705E7E1C88E0C4A3D3A41F29F60EBA10B3B2EBB2F
3,129,309 UART: [art] PUB.Y = D11C32059CC2D885E5F580B8B82424D243187B97A94C1471BBDEE79CE6452B99300F3C8139232D377243CF6843BB3862
3,136,247 UART: [art] SIG.R = 84283F74CDB5212C32FA80B0B30EDC3C9892FBAA59AA6EDC91EC9297C5B25E26EC84F94A899F59D350C49399A1E90472
3,143,021 UART: [art] SIG.S = 93902ADE4757C31859F8BC774E246BA1F80F7B47CE1C7531E6E99E235A66B0D1C79BB0089D8F318F54B91CE8B5270188
3,166,661 UART: Caliptra RT
3,166,914 UART: [state] CFI Enabled
3,274,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,526 UART: [rt]cmd =0x4453424c, len=4
3,321,200 >>> mbox cmd response data (8 bytes)
3,321,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,046 UART:
3,322,062 UART: Running Caliptra ROM ...
3,322,470 UART:
3,322,525 UART: [state] CFI Enabled
3,325,581 UART: [state] LifecycleState = Unprovisioned
3,326,236 UART: [state] DebugLocked = No
3,326,822 UART: [state] WD Timer not started. Device not locked for debugging
3,328,060 UART: [kat] SHA2-256
4,133,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,137,835 UART: [kat] ++
4,137,987 UART: [kat] sha1
4,142,241 UART: [kat] SHA2-256
4,144,181 UART: [kat] SHA2-384
4,146,822 UART: [kat] SHA2-512-ACC
4,148,722 UART: [kat] ECC-384
4,158,317 UART: [kat] HMAC-384Kdf
4,162,995 UART: [kat] LMS
4,411,323 UART: [kat] --
4,412,087 UART: [update-reset] ++
5,723,891 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,724,982 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,874,560 >>> mbox cmd response: success
5,874,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,874,767 UART: [update-reset] Copying MAN_2 To MAN_1
5,882,781 UART: [update-reset Success] --
5,883,824 UART: [state] Locking Datavault
5,884,564 UART: [state] Locking PCR0, PCR1 and PCR31
5,885,168 UART: [state] Locking ICCM
5,885,824 UART: [exit] Launching FMC @ 0x40000130
5,891,153 UART:
5,891,169 UART: Running Caliptra FMC ...
5,891,577 UART:
5,891,631 UART: [state] CFI Enabled
5,980,842 UART: [art] Extend RT PCRs Done
5,981,270 UART: [art] Lock RT PCRs Done
5,982,635 UART: [art] Populate DV Done
5,991,196 UART: [fht] FMC Alias Private Key: 7
5,992,240 UART: [art] Derive CDI
5,992,520 UART: [art] Store in in slot 0x4
6,078,177 UART: [art] Derive Key Pair
6,078,537 UART: [art] Store priv key in slot 0x5
6,091,821 UART: [art] Derive Key Pair - Done
6,106,739 UART: [art] Signing Cert with AUTHO
6,107,219 UART: RITY.KEYID = 7
6,122,683 UART: [art] Erasing AUTHORITY.KEYID = 7
6,123,448 UART: [art] PUB.X = 7EC86C7B09B0FFC098E6B9768B1CD663F26D074D7C251DB7F8E4365D50959C7B24B9878AE734FC4B58CED00D66FC3F94
6,130,221 UART: [art] PUB.Y = 14C55869C888DA5629D23C247A8CF44E1BE64049C41DCD12F98C8C0756D4B0EC2479369152DFADC2CE0F5B4437271B75
6,137,169 UART: [art] SIG.R = 9F3ED86DE09D22864A13E4CC6685286BBDE8831A4D55A68AE4067A8C64D2C9CD68906986221E6200ECCE99C66A98E802
6,143,915 UART: [art] SIG.S = C03C912FFC9628B82B6B106915BBBC5992B09881A1919EAE40878DC7E59D50153A522A22942979948D9302C53F69CDC4
6,168,285 UART: Caliptra RT
6,168,538 UART: [state] CFI Enabled
6,468,715 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,498,690 UART: [rt]cmd =0x494e464f, len=4
6,502,427 >>> mbox cmd response data (312 bytes)
6,502,428 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,531,701 UART: [rt]cmd =0x43455252, len=4
6,542,362 >>> mbox cmd response data (784 bytes)
6,542,363 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,572,040 UART: [rt]cmd =0x44504543, len=92
6,755,108 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,003 ready_for_fw is high
1,060,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,412 >>> mbox cmd response: success
2,623,412 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,684,688 UART:
2,684,704 UART: Running Caliptra FMC ...
2,685,112 UART:
2,685,166 UART: [state] CFI Enabled
2,695,981 UART: [fht] FMC Alias Private Key: 7
2,803,524 UART: [art] Extend RT PCRs Done
2,803,952 UART: [art] Lock RT PCRs Done
2,805,516 UART: [art] Populate DV Done
2,813,913 UART: [fht] FMC Alias Private Key: 7
2,815,029 UART: [art] Derive CDI
2,815,309 UART: [art] Store in in slot 0x4
2,900,768 UART: [art] Derive Key Pair
2,901,128 UART: [art] Store priv key in slot 0x5
2,914,754 UART: [art] Derive Key Pair - Done
2,929,464 UART: [art] Signing Cert with AUTHO
2,929,944 UART: RITY.KEYID = 7
2,945,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,179 UART: [art] PUB.X = FAA0DC54C1C3CA82AA67808583105CFB88FE417CCA66AFC3812C258AFC02A0B554ECB52C7983FB568B82B123E97E5E2A
2,952,964 UART: [art] PUB.Y = 1DCEBEEA88DC58C0FC3175A249A6EDA7C81F26C3F4CB3633C10C6330823E1F237B4E8EC7B159FD1ECFDDF0F503947EBD
2,959,934 UART: [art] SIG.R = 43EA35D8AC31D13F6F38FA7AB0B3C024297A0BB39D60D1FD7F8E7E5AD09392A06EF66D89B667E6A27E50ED12C46E317B
2,966,717 UART: [art] SIG.S = 902594338591A4EE805BC628CD835C1E8BF4177AEBE695A2DDEBAF5480B834280653CA8926303411721F7C79DB41B70F
2,990,828 UART: Caliptra RT
2,991,081 UART: [state] CFI Enabled
3,098,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,214 UART: [rt]cmd =0x4453424c, len=4
3,146,766 >>> mbox cmd response data (8 bytes)
3,146,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,206 >>> mbox cmd response: success
5,583,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,596,400 UART:
5,596,416 UART: Running Caliptra FMC ...
5,596,824 UART:
5,596,878 UART: [state] CFI Enabled
5,685,163 UART: [art] Extend RT PCRs Done
5,685,591 UART: [art] Lock RT PCRs Done
5,686,968 UART: [art] Populate DV Done
5,695,219 UART: [fht] FMC Alias Private Key: 7
5,696,347 UART: [art] Derive CDI
5,696,627 UART: [art] Store in in slot 0x4
5,781,852 UART: [art] Derive Key Pair
5,782,212 UART: [art] Store priv key in slot 0x5
5,795,388 UART: [art] Derive Key Pair - Done
5,810,302 UART: [art] Signing Cert with AUTHO
5,810,782 UART: RITY.KEYID = 7
5,825,974 UART: [art] Erasing AUTHORITY.KEYID = 7
5,826,739 UART: [art] PUB.X = 9521EDC9B5DAD42B2537E0F79D2625C296A69574EBF84515BD1B7AE6CC5E6AD86065464351F82B2FF2F4CC66F30684F4
5,833,514 UART: [art] PUB.Y = C6427CC9B8ABBA443E58E9ADDC387BA1C6EE93ACAF6AA14C2771C93C442C7061BAB879320B0CB25F0E941C0F0A640D98
5,840,466 UART: [art] SIG.R = 74EBA75C1083261EFB4C58EC1B613E88005EDB63A2AD7BE3407F9E7BC80C506B9CD1142CDD7EF541DA0A2026D739EFC1
5,847,226 UART: [art] SIG.S = 2BC945FA1CC995A6D50BD6C753E743C3FCC810AF3284C7F4F55C7CBF6116C523F356BA927D6A68EF4CCEBB5E5EEABEFB
5,870,742 UART: Caliptra RT
5,870,995 UART: [state] CFI Enabled
6,167,703 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,197,992 UART: [rt]cmd =0x494e464f, len=4
6,201,693 >>> mbox cmd response data (312 bytes)
6,201,694 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,231,087 UART: [rt]cmd =0x43455252, len=4
6,242,015 >>> mbox cmd response data (782 bytes)
6,242,016 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,271,983 UART: [rt]cmd =0x44504543, len=92
6,455,500 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,831 UART: [kat] SHA2-256
893,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,606 UART: [kat] ++
897,758 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
918,495 UART: [kat] HMAC-384Kdf
922,913 UART: [kat] LMS
1,171,241 UART: [kat] --
1,171,982 UART: [cold-reset] ++
1,172,368 UART: [fht] FHT @ 0x50003400
1,174,899 UART: [idev] ++
1,175,067 UART: [idev] CDI.KEYID = 6
1,175,427 UART: [idev] SUBJECT.KEYID = 7
1,175,851 UART: [idev] UDS.KEYID = 0
1,176,196 ready_for_fw is high
1,176,196 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,027 UART: [idev] Erasing UDS.KEYID = 0
1,200,850 UART: [idev] Sha1 KeyId Algorithm
1,209,358 UART: [idev] --
1,210,310 UART: [ldev] ++
1,210,478 UART: [ldev] CDI.KEYID = 6
1,210,841 UART: [ldev] SUBJECT.KEYID = 5
1,211,267 UART: [ldev] AUTHORITY.KEYID = 7
1,211,730 UART: [ldev] FE.KEYID = 1
1,217,104 UART: [ldev] Erasing FE.KEYID = 1
1,243,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,424 UART: [ldev] --
1,282,903 UART: [fwproc] Wait for Commands...
1,283,579 UART: [fwproc] Recv command 0x46574c44
1,284,307 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,904 >>> mbox cmd response: success
2,772,904 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,774,052 UART: [afmc] ++
2,774,220 UART: [afmc] CDI.KEYID = 6
2,774,582 UART: [afmc] SUBJECT.KEYID = 7
2,775,007 UART: [afmc] AUTHORITY.KEYID = 5
2,810,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,915 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,800 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,423 UART: [afmc] --
2,853,351 UART: [cold-reset] --
2,854,043 UART: [state] Locking Datavault
2,855,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,718 UART: [state] Locking ICCM
2,856,182 UART: [exit] Launching FMC @ 0x40000130
2,861,511 UART:
2,861,527 UART: Running Caliptra FMC ...
2,861,935 UART:
2,862,078 UART: [state] CFI Enabled
2,872,735 UART: [fht] FMC Alias Private Key: 7
2,980,982 UART: [art] Extend RT PCRs Done
2,981,410 UART: [art] Lock RT PCRs Done
2,983,056 UART: [art] Populate DV Done
2,991,001 UART: [fht] FMC Alias Private Key: 7
2,991,953 UART: [art] Derive CDI
2,992,233 UART: [art] Store in in slot 0x4
3,078,010 UART: [art] Derive Key Pair
3,078,370 UART: [art] Store priv key in slot 0x5
3,090,936 UART: [art] Derive Key Pair - Done
3,105,930 UART: [art] Signing Cert with AUTHO
3,106,410 UART: RITY.KEYID = 7
3,121,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,685 UART: [art] PUB.X = B2BCBCD61F7AED400E958CAA40D2E57DEA8B0995CEF35640A0FA2D0F82F6C4800B77EAB6F92C8166E7B432F0C97872E5
3,129,463 UART: [art] PUB.Y = FC73E7200ECEF855F500AE758545A4AC9464E45D2924BE70E901E0B560865E756C5D2511522EB579A201F78D98F63CC0
3,136,382 UART: [art] SIG.R = 9AF830D72F5342ECB07174044ADAAB1ABDE9CEB8895F141787DABBABEAECF3E7F014461AC5243CA839435B0EBDF17D57
3,143,170 UART: [art] SIG.S = 97BBB65A6E09DF6113DD743A1F365DFF04C35388BA6362102DBE85C9A785EF0D598AFD16EEC492A5D79BEF1EC008C09A
3,167,251 UART: Caliptra RT
3,167,596 UART: [state] CFI Enabled
3,275,406 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,742 UART: [rt]cmd =0x4453424c, len=4
3,322,832 >>> mbox cmd response data (8 bytes)
3,322,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,636 UART:
3,323,652 UART: Running Caliptra ROM ...
3,324,060 UART:
3,324,202 UART: [state] CFI Enabled
3,326,734 UART: [state] LifecycleState = Unprovisioned
3,327,389 UART: [state] DebugLocked = No
3,327,995 UART: [state] WD Timer not started. Device not locked for debugging
3,329,261 UART: [kat] SHA2-256
4,134,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,139,036 UART: [kat] ++
4,139,188 UART: [kat] sha1
4,143,486 UART: [kat] SHA2-256
4,145,426 UART: [kat] SHA2-384
4,148,361 UART: [kat] SHA2-512-ACC
4,150,261 UART: [kat] ECC-384
4,160,186 UART: [kat] HMAC-384Kdf
4,164,684 UART: [kat] LMS
4,413,012 UART: [kat] --
4,413,822 UART: [update-reset] ++
5,724,024 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,725,129 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,874,707 >>> mbox cmd response: success
5,874,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,874,832 UART: [update-reset] Copying MAN_2 To MAN_1
5,882,846 UART: [update-reset Success] --
5,883,581 UART: [state] Locking Datavault
5,884,421 UART: [state] Locking PCR0, PCR1 and PCR31
5,885,025 UART: [state] Locking ICCM
5,885,661 UART: [exit] Launching FMC @ 0x40000130
5,890,990 UART:
5,891,006 UART: Running Caliptra FMC ...
5,891,414 UART:
5,891,557 UART: [state] CFI Enabled
5,981,320 UART: [art] Extend RT PCRs Done
5,981,748 UART: [art] Lock RT PCRs Done
5,983,063 UART: [art] Populate DV Done
5,991,590 UART: [fht] FMC Alias Private Key: 7
5,992,646 UART: [art] Derive CDI
5,992,926 UART: [art] Store in in slot 0x4
6,078,725 UART: [art] Derive Key Pair
6,079,085 UART: [art] Store priv key in slot 0x5
6,092,753 UART: [art] Derive Key Pair - Done
6,107,707 UART: [art] Signing Cert with AUTHO
6,108,187 UART: RITY.KEYID = 7
6,123,725 UART: [art] Erasing AUTHORITY.KEYID = 7
6,124,490 UART: [art] PUB.X = 7AD6DB3CF142E83B60BF46332782F4962C24B35C225BA3D0FD4585729B80C8672D9263F7E351BCE479638681433AECA0
6,131,260 UART: [art] PUB.Y = 72A5CED55CD302093A3314BE0095CDA21AA505688746C1179B9CEA99E5576B1EAC5B8372AF1BBDA0A192ECF57CAA7016
6,138,193 UART: [art] SIG.R = AB3B1AB3ADDA955EDABCB3E1AD75EDF4CAF7FF9AB687769024418621A0337801E5CC06B1D068C93D02F6C0BB87A5A9C0
6,144,978 UART: [art] SIG.S = 7B96C9E32A8D09F5DBE1A51B457DC828596BF01E13AF57B3AA54C0EB5248415B4D2AAA026B163AC222842C8887120DB5
6,168,930 UART: Caliptra RT
6,169,275 UART: [state] CFI Enabled
6,463,291 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,493,580 UART: [rt]cmd =0x494e464f, len=4
6,497,387 >>> mbox cmd response data (312 bytes)
6,497,388 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,526,859 UART: [rt]cmd =0x43455252, len=4
6,537,647 >>> mbox cmd response data (783 bytes)
6,537,648 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,567,601 UART: [rt]cmd =0x44504543, len=92
6,751,230 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,060 ready_for_fw is high
1,061,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,899 >>> mbox cmd response: success
2,625,899 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,688,851 UART:
2,688,867 UART: Running Caliptra FMC ...
2,689,275 UART:
2,689,418 UART: [state] CFI Enabled
2,700,345 UART: [fht] FMC Alias Private Key: 7
2,808,442 UART: [art] Extend RT PCRs Done
2,808,870 UART: [art] Lock RT PCRs Done
2,810,688 UART: [art] Populate DV Done
2,818,823 UART: [fht] FMC Alias Private Key: 7
2,819,993 UART: [art] Derive CDI
2,820,273 UART: [art] Store in in slot 0x4
2,905,862 UART: [art] Derive Key Pair
2,906,222 UART: [art] Store priv key in slot 0x5
2,919,590 UART: [art] Derive Key Pair - Done
2,934,426 UART: [art] Signing Cert with AUTHO
2,934,906 UART: RITY.KEYID = 7
2,949,968 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,733 UART: [art] PUB.X = 7A62E45D0CDA0BC1CD71A0DFC5239FDE64D7E0181723E91FAD649DA06F1BDD86E14EF1446DBB7B0889318B80FAC1B8E3
2,957,516 UART: [art] PUB.Y = 7063D1637D4906470E405138F1FC50E0778647DE06318EC53B28F4603EA6A1FFBBD0641DA305E559562FBFEA4E26AECB
2,964,460 UART: [art] SIG.R = C9047A69611B4865B688D21AAD0627B9AEBF7A50B5EFA0831BBDCAE0FF960CB0B1AECB06561E4497B9B158200001B4BB
2,971,209 UART: [art] SIG.S = C41C38696555843EB9561AB77FEBB99FB11F84174A22998C7D41CF4BEC6C7FB5CB5F391303480C60506EDEE319067C6E
2,994,751 UART: Caliptra RT
2,995,096 UART: [state] CFI Enabled
3,103,812 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,116 UART: [rt]cmd =0x4453424c, len=4
3,151,286 >>> mbox cmd response data (8 bytes)
3,151,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,236 >>> mbox cmd response: success
5,587,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,600,636 UART:
5,600,652 UART: Running Caliptra FMC ...
5,601,060 UART:
5,601,203 UART: [state] CFI Enabled
5,690,094 UART: [art] Extend RT PCRs Done
5,690,522 UART: [art] Lock RT PCRs Done
5,691,921 UART: [art] Populate DV Done
5,700,346 UART: [fht] FMC Alias Private Key: 7
5,701,416 UART: [art] Derive CDI
5,701,696 UART: [art] Store in in slot 0x4
5,787,135 UART: [art] Derive Key Pair
5,787,495 UART: [art] Store priv key in slot 0x5
5,800,679 UART: [art] Derive Key Pair - Done
5,815,565 UART: [art] Signing Cert with AUTHO
5,816,045 UART: RITY.KEYID = 7
5,831,437 UART: [art] Erasing AUTHORITY.KEYID = 7
5,832,202 UART: [art] PUB.X = BC69BE31698DE5F3FE6C68A4835332587E7E1D76EA76A3F966A508149A2C295E0A125F1F5869AF7A2925507EBCEB753F
5,838,972 UART: [art] PUB.Y = 245BAA24C4B74DC2B18C46BEADD2CD9A714BE244617F074E77F71808C0DEB0E961925AC0FEE70F2DEB47505305396E98
5,845,922 UART: [art] SIG.R = 2260E42F8CF09E54B0E8CA7816BEAB0B9C20DF1DF651989E6E4FCA8E80A0E22A4D2098B29182C07CF63FBAC7BBD2523B
5,852,709 UART: [art] SIG.S = E5A75ED2B64A8011BAE741DDB990CBB85B237E4182C4CC4873C17462F80F65D83EE217744B2405FB049C68E8586DDDCB
5,876,661 UART: Caliptra RT
5,877,006 UART: [state] CFI Enabled
6,174,510 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,645 UART: [rt]cmd =0x494e464f, len=4
6,208,544 >>> mbox cmd response data (312 bytes)
6,208,545 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,237,916 UART: [rt]cmd =0x43455252, len=4
6,248,842 >>> mbox cmd response data (783 bytes)
6,248,843 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,278,704 UART: [rt]cmd =0x44504543, len=92
6,462,028 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,168 UART: [kat] SHA2-512-ACC
906,069 UART: [kat] ECC-384
915,598 UART: [kat] HMAC-384Kdf
920,370 UART: [kat] LMS
1,168,682 UART: [kat] --
1,169,393 UART: [cold-reset] ++
1,169,809 UART: [fht] FHT @ 0x50003400
1,172,323 UART: [idev] ++
1,172,491 UART: [idev] CDI.KEYID = 6
1,172,852 UART: [idev] SUBJECT.KEYID = 7
1,173,277 UART: [idev] UDS.KEYID = 0
1,173,623 ready_for_fw is high
1,173,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,695 UART: [idev] Erasing UDS.KEYID = 0
1,197,443 UART: [idev] Sha1 KeyId Algorithm
1,206,497 UART: [idev] --
1,207,558 UART: [ldev] ++
1,207,726 UART: [ldev] CDI.KEYID = 6
1,208,090 UART: [ldev] SUBJECT.KEYID = 5
1,208,517 UART: [ldev] AUTHORITY.KEYID = 7
1,208,980 UART: [ldev] FE.KEYID = 1
1,213,892 UART: [ldev] Erasing FE.KEYID = 1
1,240,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,248 UART: [ldev] --
1,279,538 UART: [fwproc] Wait for Commands...
1,280,193 UART: [fwproc] Recv command 0x46574c44
1,280,926 UART: [fwproc] Recv'd Img size: 114168 bytes
2,575,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,018 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,767,969 >>> mbox cmd response: success
2,767,969 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,769,084 UART: [afmc] ++
2,769,252 UART: [afmc] CDI.KEYID = 6
2,769,615 UART: [afmc] SUBJECT.KEYID = 7
2,770,041 UART: [afmc] AUTHORITY.KEYID = 5
2,805,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,337 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,066 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,833,949 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,839,668 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,361 UART: [afmc] --
2,848,251 UART: [cold-reset] --
2,848,879 UART: [state] Locking Datavault
2,849,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,850,510 UART: [state] Locking ICCM
2,851,096 UART: [exit] Launching FMC @ 0x40000130
2,856,425 UART:
2,856,441 UART: Running Caliptra FMC ...
2,856,849 UART:
2,856,903 UART: [state] CFI Enabled
2,867,496 UART: [fht] FMC Alias Private Key: 7
2,975,091 UART: [art] Extend RT PCRs Done
2,975,519 UART: [art] Lock RT PCRs Done
2,976,919 UART: [art] Populate DV Done
2,984,762 UART: [fht] FMC Alias Private Key: 7
2,985,854 UART: [art] Derive CDI
2,986,134 UART: [art] Store in in slot 0x4
3,071,689 UART: [art] Derive Key Pair
3,072,049 UART: [art] Store priv key in slot 0x5
3,085,069 UART: [art] Derive Key Pair - Done
3,100,112 UART: [art] Signing Cert with AUTHO
3,100,592 UART: RITY.KEYID = 7
3,115,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,116,327 UART: [art] PUB.X = B8CEC7C580C859A0736AFFF5D755FBC36301A05B72C16556091CBF98291D56C6C97A68E6CDC66C3FC133676BA241D0B0
3,123,101 UART: [art] PUB.Y = C25701E5D86C618BD8DBD6B4598BB5AE121D6D0CF1DDA36CA27B02858AED16009972EECB5B9EAA5B8289222F735FC6C0
3,130,038 UART: [art] SIG.R = 96CB295FA29AFA3C33AEB11578816C00DB51E209180B04BA659DDB84DFAB5C2B139EDA188AB3872C7E38558978BD07A8
3,136,786 UART: [art] SIG.S = 183C8AC9A9CB39F98ABEB278E7A2EF843A19EFF4412AF3ADD275DD51E1D9DEA16ADCD2CFA2471B6DA43FC4F7616D74FA
3,160,511 UART: Caliptra RT
3,160,764 UART: [state] CFI Enabled
3,268,197 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,298,629 UART: [rt]cmd =0x4453424c, len=4
3,315,837 >>> mbox cmd response data (8 bytes)
3,315,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,393 UART:
3,316,409 UART: Running Caliptra ROM ...
3,316,817 UART:
3,316,872 UART: [state] CFI Enabled
3,319,858 UART: [state] LifecycleState = Unprovisioned
3,320,513 UART: [state] DebugLocked = No
3,321,045 UART: [state] WD Timer not started. Device not locked for debugging
3,322,193 UART: [kat] SHA2-256
4,125,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,129,872 UART: [kat] ++
4,130,024 UART: [kat] sha1
4,134,372 UART: [kat] SHA2-256
4,136,312 UART: [kat] SHA2-384
4,139,169 UART: [kat] SHA2-512-ACC
4,141,069 UART: [kat] ECC-384
4,150,890 UART: [kat] HMAC-384Kdf
4,155,338 UART: [kat] LMS
4,403,650 UART: [kat] --
4,404,460 UART: [update-reset] ++
5,714,199 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,715,386 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,864,964 >>> mbox cmd response: success
5,864,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,865,261 UART: [update-reset] Copying MAN_2 To MAN_1
5,873,275 UART: [update-reset Success] --
5,874,496 UART: [state] Locking Datavault
5,875,182 UART: [state] Locking PCR0, PCR1 and PCR31
5,875,786 UART: [state] Locking ICCM
5,876,206 UART: [exit] Launching FMC @ 0x40000130
5,881,535 UART:
5,881,551 UART: Running Caliptra FMC ...
5,881,959 UART:
5,882,013 UART: [state] CFI Enabled
5,970,688 UART: [art] Extend RT PCRs Done
5,971,116 UART: [art] Lock RT PCRs Done
5,972,147 UART: [art] Populate DV Done
5,980,370 UART: [fht] FMC Alias Private Key: 7
5,981,420 UART: [art] Derive CDI
5,981,700 UART: [art] Store in in slot 0x4
6,067,183 UART: [art] Derive Key Pair
6,067,543 UART: [art] Store priv key in slot 0x5
6,080,267 UART: [art] Derive Key Pair - Done
6,094,874 UART: [art] Signing Cert with AUTHO
6,095,354 UART: RITY.KEYID = 7
6,109,974 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,739 UART: [art] PUB.X = CAC54F254C32212C621E3E7E1050DB0091359FA3870D0E1BCE4B2634A54CAAA46E2D33E7F12F3C75B270AADB3B7E1EDD
6,117,499 UART: [art] PUB.Y = CA96ACBE2416BAF1363232D57BBE731B78D88681E204FE16E5A70E78AA37F73B91BDAA552370D35D649FBC56664E570B
6,124,450 UART: [art] SIG.R = 9283FD3453B7B237CD68756DAAEBE9CBE8364AA4B748BEE1F0DC715A8758139E267E9AC4B95A3E1A1E30B280727DC678
6,131,232 UART: [art] SIG.S = D0FDC823C03FE219BB54337B9BA80956C233942FFDF0D2ABE3ABBA1F4B589E4967580C234174C14807AD074EAAA9EBB9
6,154,825 UART: Caliptra RT
6,155,078 UART: [state] CFI Enabled
6,451,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,481,750 UART: [rt]cmd =0x494e464f, len=4
6,485,419 >>> mbox cmd response data (312 bytes)
6,485,420 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,514,585 UART: [rt]cmd =0x43455252, len=4
6,525,182 >>> mbox cmd response data (784 bytes)
6,525,183 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,555,052 UART: [rt]cmd =0x44504543, len=92
6,738,770 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,728 ready_for_fw is high
1,055,728 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,365 >>> mbox cmd response: success
2,620,365 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,681,947 UART:
2,681,963 UART: Running Caliptra FMC ...
2,682,371 UART:
2,682,425 UART: [state] CFI Enabled
2,693,038 UART: [fht] FMC Alias Private Key: 7
2,800,429 UART: [art] Extend RT PCRs Done
2,800,857 UART: [art] Lock RT PCRs Done
2,802,593 UART: [art] Populate DV Done
2,811,146 UART: [fht] FMC Alias Private Key: 7
2,812,136 UART: [art] Derive CDI
2,812,416 UART: [art] Store in in slot 0x4
2,898,333 UART: [art] Derive Key Pair
2,898,693 UART: [art] Store priv key in slot 0x5
2,911,733 UART: [art] Derive Key Pair - Done
2,926,794 UART: [art] Signing Cert with AUTHO
2,927,274 UART: RITY.KEYID = 7
2,942,300 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,065 UART: [art] PUB.X = 4CD83F0524E4E63B39F2C81C1CD63B077C958D0FCF48452528BE9F015C586CE34D8CDB1E0C58BB62C73F148DFAC9F292
2,949,834 UART: [art] PUB.Y = B6125B272B5FFC1055F3852B7B24721FFE055F60CC8F4CA202FD96A0D20132CD71C71F78D1A586FD20E84867C0C60617
2,956,776 UART: [art] SIG.R = 2357A7892B8B38073B6A2596AD4787A34561C1BB78E761AEA35D02632B7DDDE95C6543BD868AB7DF683CA910A4A1D2DC
2,963,548 UART: [art] SIG.S = 8F0391E39FE6AF0EFE0325D205B98489169991AB5C5EA557B6C5A15D52128D24556D8E3BDBD060A9752F4D1EDE19B5B9
2,987,097 UART: Caliptra RT
2,987,350 UART: [state] CFI Enabled
3,095,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,977 UART: [rt]cmd =0x4453424c, len=4
3,142,413 >>> mbox cmd response data (8 bytes)
3,142,414 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,574,655 >>> mbox cmd response: success
5,574,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,588,173 UART:
5,588,189 UART: Running Caliptra FMC ...
5,588,597 UART:
5,588,651 UART: [state] CFI Enabled
5,677,344 UART: [art] Extend RT PCRs Done
5,677,772 UART: [art] Lock RT PCRs Done
5,678,847 UART: [art] Populate DV Done
5,687,366 UART: [fht] FMC Alias Private Key: 7
5,688,324 UART: [art] Derive CDI
5,688,604 UART: [art] Store in in slot 0x4
5,774,101 UART: [art] Derive Key Pair
5,774,461 UART: [art] Store priv key in slot 0x5
5,787,463 UART: [art] Derive Key Pair - Done
5,802,217 UART: [art] Signing Cert with AUTHO
5,802,697 UART: RITY.KEYID = 7
5,817,491 UART: [art] Erasing AUTHORITY.KEYID = 7
5,818,256 UART: [art] PUB.X = DC83E7855F9F97C0FCCE72D781FA0AADAC3C93D54CD84CF8B27749D6A8661D4EC843F62B765462A370EFDCBB12A23A46
5,825,043 UART: [art] PUB.Y = 7FAABE60A5C6930610EED666F4034BACE0C035479DC6C07B6C5066FD7683A8EDE12FDF50C2D17BCA2E2C6C8068717988
5,832,001 UART: [art] SIG.R = 68546A4554EC63081CD873D32895EA672E86194CCF3AD25A89C7132053460A281EF344720039BA73D2E6894BC29853CD
5,838,735 UART: [art] SIG.S = EF4528373DF5F6747DB727020F097FE34DE1EB9CE0686DF69E12E23F67016FBE3118F69E9456D994967D8FA93BB39C5D
5,862,662 UART: Caliptra RT
5,862,915 UART: [state] CFI Enabled
6,162,529 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,192,614 UART: [rt]cmd =0x494e464f, len=4
6,196,315 >>> mbox cmd response data (312 bytes)
6,196,316 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,225,751 UART: [rt]cmd =0x43455252, len=4
6,236,479 >>> mbox cmd response data (783 bytes)
6,236,480 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,266,365 UART: [rt]cmd =0x44504543, len=92
6,449,586 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,182 UART: [kat] SHA2-256
902,122 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
917,089 UART: [kat] HMAC-384Kdf
921,811 UART: [kat] LMS
1,170,123 UART: [kat] --
1,170,758 UART: [cold-reset] ++
1,171,096 UART: [fht] FHT @ 0x50003400
1,173,982 UART: [idev] ++
1,174,150 UART: [idev] CDI.KEYID = 6
1,174,511 UART: [idev] SUBJECT.KEYID = 7
1,174,936 UART: [idev] UDS.KEYID = 0
1,175,282 ready_for_fw is high
1,175,282 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,574 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,649 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,635 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,590 >>> mbox cmd response: success
2,770,590 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,771,669 UART: [afmc] ++
2,771,837 UART: [afmc] CDI.KEYID = 6
2,772,200 UART: [afmc] SUBJECT.KEYID = 7
2,772,626 UART: [afmc] AUTHORITY.KEYID = 5
2,808,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,808 UART: [afmc] --
2,851,746 UART: [cold-reset] --
2,852,660 UART: [state] Locking Datavault
2,854,119 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,723 UART: [state] Locking ICCM
2,855,339 UART: [exit] Launching FMC @ 0x40000130
2,860,668 UART:
2,860,684 UART: Running Caliptra FMC ...
2,861,092 UART:
2,861,235 UART: [state] CFI Enabled
2,872,092 UART: [fht] FMC Alias Private Key: 7
2,979,987 UART: [art] Extend RT PCRs Done
2,980,415 UART: [art] Lock RT PCRs Done
2,982,129 UART: [art] Populate DV Done
2,990,458 UART: [fht] FMC Alias Private Key: 7
2,991,474 UART: [art] Derive CDI
2,991,754 UART: [art] Store in in slot 0x4
3,077,227 UART: [art] Derive Key Pair
3,077,587 UART: [art] Store priv key in slot 0x5
3,091,285 UART: [art] Derive Key Pair - Done
3,106,000 UART: [art] Signing Cert with AUTHO
3,106,480 UART: RITY.KEYID = 7
3,121,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,339 UART: [art] PUB.X = 3B56EB4EE4D24683CC12C097953FA99A6A2356C4FC93E5CBDC9090DACF919CB8B76AFDE4C6B4860A73EFE1BB68722AD9
3,129,128 UART: [art] PUB.Y = 70F5F9774F6262AE25142693B1C4EF5AE448E6CD9909F01DA4EFAC733AFA042BF4CD78CA4FDB86F54D67C9F6777D5325
3,136,086 UART: [art] SIG.R = 05D0994861041007F6DD7A26BF91FA2CBDC47A3F4CAD0880CB64B409DC69A8C8710D120283BAE2398836C930097C93B3
3,142,834 UART: [art] SIG.S = B6271B3FF1BECBFEC5A9D4439D8D64E64EF62A3C4AED872C26A356C84C838255DCFEC9E5199A52CF810C200F40122CDD
3,167,111 UART: Caliptra RT
3,167,456 UART: [state] CFI Enabled
3,275,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,397 UART: [rt]cmd =0x4453424c, len=4
3,323,425 >>> mbox cmd response data (8 bytes)
3,323,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,333 UART:
3,324,349 UART: Running Caliptra ROM ...
3,324,757 UART:
3,324,899 UART: [state] CFI Enabled
3,328,213 UART: [state] LifecycleState = Unprovisioned
3,328,868 UART: [state] DebugLocked = No
3,329,566 UART: [state] WD Timer not started. Device not locked for debugging
3,330,686 UART: [kat] SHA2-256
4,134,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,138,365 UART: [kat] ++
4,138,517 UART: [kat] sha1
4,142,763 UART: [kat] SHA2-256
4,144,703 UART: [kat] SHA2-384
4,147,546 UART: [kat] SHA2-512-ACC
4,149,446 UART: [kat] ECC-384
4,159,045 UART: [kat] HMAC-384Kdf
4,163,851 UART: [kat] LMS
4,412,163 UART: [kat] --
4,413,109 UART: [update-reset] ++
5,723,224 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,724,249 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,873,827 >>> mbox cmd response: success
5,873,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,874,132 UART: [update-reset] Copying MAN_2 To MAN_1
5,882,146 UART: [update-reset Success] --
5,883,049 UART: [state] Locking Datavault
5,883,969 UART: [state] Locking PCR0, PCR1 and PCR31
5,884,573 UART: [state] Locking ICCM
5,885,219 UART: [exit] Launching FMC @ 0x40000130
5,890,548 UART:
5,890,564 UART: Running Caliptra FMC ...
5,890,972 UART:
5,891,115 UART: [state] CFI Enabled
5,980,106 UART: [art] Extend RT PCRs Done
5,980,534 UART: [art] Lock RT PCRs Done
5,981,777 UART: [art] Populate DV Done
5,989,756 UART: [fht] FMC Alias Private Key: 7
5,990,926 UART: [art] Derive CDI
5,991,206 UART: [art] Store in in slot 0x4
6,076,741 UART: [art] Derive Key Pair
6,077,101 UART: [art] Store priv key in slot 0x5
6,090,791 UART: [art] Derive Key Pair - Done
6,105,575 UART: [art] Signing Cert with AUTHO
6,106,055 UART: RITY.KEYID = 7
6,121,449 UART: [art] Erasing AUTHORITY.KEYID = 7
6,122,214 UART: [art] PUB.X = 1FF1626B7F9CE88E43408C4271D5E473FB3FDF02416F577BE0EEC5E450120971F68B955B9D137DADD905CBE8A18B0370
6,128,980 UART: [art] PUB.Y = BE332638C18295B2C7E80F5E73467B3257B1B7F55DA68DB0B3E06F6A2AB507D54F9B6DE9B67C776CFE43966941CFA6D7
6,135,934 UART: [art] SIG.R = 34DADB4AA702724D1F19C011A3B841A2E05A65E1B2E7DA9BB0B71A497B537253FD06911A0F36F80734F9EE3C3F5201F6
6,142,697 UART: [art] SIG.S = C31B308B76499E15B92D4B481B2F154EE125B1AE39E3546652ADD9BD81BBEB963A0241491E0D662E0623CD1E48E7D543
6,166,275 UART: Caliptra RT
6,166,620 UART: [state] CFI Enabled
6,464,886 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,495,035 UART: [rt]cmd =0x494e464f, len=4
6,498,752 >>> mbox cmd response data (312 bytes)
6,498,753 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,528,102 UART: [rt]cmd =0x43455252, len=4
6,539,186 >>> mbox cmd response data (783 bytes)
6,539,187 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,569,074 UART: [rt]cmd =0x44504543, len=92
6,753,429 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,783 ready_for_fw is high
1,056,783 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,968 >>> mbox cmd response: success
2,621,968 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,684,272 UART:
2,684,288 UART: Running Caliptra FMC ...
2,684,696 UART:
2,684,839 UART: [state] CFI Enabled
2,695,532 UART: [fht] FMC Alias Private Key: 7
2,803,895 UART: [art] Extend RT PCRs Done
2,804,323 UART: [art] Lock RT PCRs Done
2,805,939 UART: [art] Populate DV Done
2,814,298 UART: [fht] FMC Alias Private Key: 7
2,815,328 UART: [art] Derive CDI
2,815,608 UART: [art] Store in in slot 0x4
2,901,333 UART: [art] Derive Key Pair
2,901,693 UART: [art] Store priv key in slot 0x5
2,915,129 UART: [art] Derive Key Pair - Done
2,929,932 UART: [art] Signing Cert with AUTHO
2,930,412 UART: RITY.KEYID = 7
2,945,720 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,485 UART: [art] PUB.X = 0140D735E7ACB7D274503C756179EC7B676811739EDE5A9FB851D2C453A3E018B8CEDD10DE2FADEA45326B7568EA246D
2,953,262 UART: [art] PUB.Y = 5A0D8B18FEAE76C25077C8C313FF917CA68880384CE7FA042524DBFC8C46E0D03B2CC5F3326708EE8DC88718CCFB0F48
2,960,214 UART: [art] SIG.R = 4FDB1B42B188CA95C444DAF23EC4CD3AD928FE211A1D7DB7C554DF0387DF300858399A7492761B65C54B85897C9F67B2
2,966,986 UART: [art] SIG.S = EA09AFB54F273C628D4EE96E4F2F1F45DB132506396047D2551A6D5686CEEE6DFA5D642318A98E26B5E86A14383D07B3
2,991,512 UART: Caliptra RT
2,991,857 UART: [state] CFI Enabled
3,100,808 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,210 UART: [rt]cmd =0x4453424c, len=4
3,148,346 >>> mbox cmd response data (8 bytes)
3,148,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,580,533 >>> mbox cmd response: success
5,580,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,593,745 UART:
5,593,761 UART: Running Caliptra FMC ...
5,594,169 UART:
5,594,312 UART: [state] CFI Enabled
5,682,605 UART: [art] Extend RT PCRs Done
5,683,033 UART: [art] Lock RT PCRs Done
5,684,540 UART: [art] Populate DV Done
5,692,785 UART: [fht] FMC Alias Private Key: 7
5,693,835 UART: [art] Derive CDI
5,694,115 UART: [art] Store in in slot 0x4
5,779,884 UART: [art] Derive Key Pair
5,780,244 UART: [art] Store priv key in slot 0x5
5,794,114 UART: [art] Derive Key Pair - Done
5,808,732 UART: [art] Signing Cert with AUTHO
5,809,212 UART: RITY.KEYID = 7
5,824,402 UART: [art] Erasing AUTHORITY.KEYID = 7
5,825,167 UART: [art] PUB.X = 57ECEB19940F1B0ADFA9E2A6EE1D66048A0D3571087D08FE93344BD617582CA7B0DD988CAB072DA9A5CD06D8B47C612C
5,831,929 UART: [art] PUB.Y = CB3D7F7FDCAC4DFFF064017DDEA126BAA381346D2F1918402C8228C730CD0C134AC15A361B2BDF833102D7904249BE68
5,838,882 UART: [art] SIG.R = F7820D68B4D7DBDBCF67DB4943305BFC87D63DCF7385003C73E2FAD934AA3E882DF6FE8A7718099E768A69A8A0A20CB1
5,845,637 UART: [art] SIG.S = 4F60A03D6AF4E32E64A9EA17BD49D8CB02ACC6E8A99E41017A9EE72F24B2A6FE4479F71B77384F2B8A185184DF99EFB1
5,869,592 UART: Caliptra RT
5,869,937 UART: [state] CFI Enabled
6,170,969 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,201,212 UART: [rt]cmd =0x494e464f, len=4
6,204,889 >>> mbox cmd response data (312 bytes)
6,204,890 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,234,191 UART: [rt]cmd =0x43455252, len=4
6,244,865 >>> mbox cmd response data (783 bytes)
6,244,866 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,274,813 UART: [rt]cmd =0x44504543, len=92
6,459,443 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,022 UART:
192,403 UART: Running Caliptra ROM ...
193,501 UART:
193,648 UART: [state] CFI Enabled
268,270 UART: [state] LifecycleState = Unprovisioned
270,182 UART: [state] DebugLocked = No
271,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,132 UART: [kat] SHA2-256
446,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,355 UART: [kat] ++
457,830 UART: [kat] sha1
468,056 UART: [kat] SHA2-256
470,752 UART: [kat] SHA2-384
475,963 UART: [kat] SHA2-512-ACC
478,335 UART: [kat] ECC-384
2,769,597 UART: [kat] HMAC-384Kdf
2,801,791 UART: [kat] LMS
3,992,119 UART: [kat] --
3,997,312 UART: [cold-reset] ++
3,998,248 UART: [fht] Storing FHT @ 0x50003400
4,009,222 UART: [idev] ++
4,009,782 UART: [idev] CDI.KEYID = 6
4,010,837 UART: [idev] SUBJECT.KEYID = 7
4,011,939 UART: [idev] UDS.KEYID = 0
4,012,974 ready_for_fw is high
4,013,175 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,371 UART: [idev] Erasing UDS.KEYID = 0
7,349,692 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,275 UART: [idev] --
7,376,209 UART: [ldev] ++
7,376,773 UART: [ldev] CDI.KEYID = 6
7,377,753 UART: [ldev] SUBJECT.KEYID = 5
7,378,956 UART: [ldev] AUTHORITY.KEYID = 7
7,380,206 UART: [ldev] FE.KEYID = 1
7,428,660 UART: [ldev] Erasing FE.KEYID = 1
10,761,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,074,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,089,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,104,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,118,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,138,966 UART: [ldev] --
13,142,919 UART: [fwproc] Waiting for Commands...
13,144,675 UART: [fwproc] Received command 0x46574c44
13,146,896 UART: [fwproc] Received Image of size 113844 bytes
17,195,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,347 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,656,103 >>> mbox cmd response: success
17,656,731 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,660,576 UART: [afmc] ++
17,661,151 UART: [afmc] CDI.KEYID = 6
17,662,088 UART: [afmc] SUBJECT.KEYID = 7
17,663,219 UART: [afmc] AUTHORITY.KEYID = 5
21,032,467 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,335,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,337,349 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,351,794 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,366,633 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,381,030 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,403,282 UART: [afmc] --
23,407,448 UART: [cold-reset] --
23,412,175 UART: [state] Locking Datavault
23,417,422 UART: [state] Locking PCR0, PCR1 and PCR31
23,419,191 UART: [state] Locking ICCM
23,420,524 UART: [exit] Launching FMC @ 0x40000130
23,428,913 UART:
23,429,138 UART: Running Caliptra FMC ...
23,430,180 UART:
23,430,323 UART: [state] CFI Enabled
23,494,512 UART: [fht] FMC Alias Private Key: 7
25,832,171 UART: [art] Extend RT PCRs Done
25,833,392 UART: [art] Lock RT PCRs Done
25,835,445 UART: [art] Populate DV Done
25,840,684 UART: [fht] FMC Alias Private Key: 7
25,842,371 UART: [art] Derive CDI
25,843,178 UART: [art] Store in in slot 0x4
25,903,178 UART: [art] Derive Key Pair
25,904,212 UART: [art] Store priv key in slot 0x5
29,197,900 UART: [art] Derive Key Pair - Done
29,210,862 UART: [art] Signing Cert with AUTHO
29,212,167 UART: RITY.KEYID = 7
31,499,848 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,357 UART: [art] PUB.X = 25B5F57E3F9ECF145B93062989282B2972F542F1E08F6950B89D5E05DD81AFA15998DCF0B094C455F9E69C5375C2F436
31,508,609 UART: [art] PUB.Y = 9721B1A6AD3BCA09955D5B5E54AE4EEE96B89F418B0E87792006F9AE7E73D5319449892D4CEEB249907ABEEEA620633B
31,515,840 UART: [art] SIG.R = CA9D3AF19CD5168ED2BD3A75DFABE8A13A840E5E3D74A8726DC854D6575AB8A36A0F8EA3D76BDB1AC2A883874943326F
31,523,250 UART: [art] SIG.S = C930DB02A386DA03622BC3A8D8E2A737FB77980FBE09E6CB4B3D998B376629959BCE4F946BC1BBFF0A4F4B6E703D3F71
32,828,595 UART: Caliptra RT
32,829,306 UART: [state] CFI Enabled
32,989,533 UART: [rt] RT listening for mailbox commands...
33,021,959 UART: [rt]cmd =0x44504543, len=136
38,646,441 >>> mbox cmd response data (136 bytes)
38,647,903 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,677,527 UART: [rt]cmd =0x4453424c, len=4
41,997,541 >>> mbox cmd response data (8 bytes)
41,998,105 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,028,340 UART: [rt]cmd =0x44504543, len=92
47,791,802 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
3,785,463 ready_for_fw is high
3,786,020 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,851,898 >>> mbox cmd response: success
17,852,622 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,547,939 UART:
23,548,330 UART: Running Caliptra FMC ...
23,549,467 UART:
23,549,628 UART: [state] CFI Enabled
23,617,740 UART: [fht] FMC Alias Private Key: 7
25,955,678 UART: [art] Extend RT PCRs Done
25,956,907 UART: [art] Lock RT PCRs Done
25,958,640 UART: [art] Populate DV Done
25,964,212 UART: [fht] FMC Alias Private Key: 7
25,965,694 UART: [art] Derive CDI
25,966,471 UART: [art] Store in in slot 0x4
26,025,759 UART: [art] Derive Key Pair
26,026,805 UART: [art] Store priv key in slot 0x5
29,319,199 UART: [art] Derive Key Pair - Done
29,332,252 UART: [art] Signing Cert with AUTHO
29,333,554 UART: RITY.KEYID = 7
31,620,129 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,640 UART: [art] PUB.X = 192FB682044EEF77B26E4D59AE9420CDC680A95B30E766BF11E64D4BD50C55AC90744107FA0A316013EE9C534D8A123A
31,628,869 UART: [art] PUB.Y = 0D80DA6462D3C7B1B4CC473A27F10C4DA8D11A18D94B171D723ECA58EAEC3BB2165AE49F069447FCB12022CAB3AEBCE1
31,636,121 UART: [art] SIG.R = 95E8F823C7F5DC3F9474030D837797B7B096A1D04D8C65E8FFBB8DED24B088BF67D67B4273503297D6A894A665626052
31,643,499 UART: [art] SIG.S = 2A431780995C498AEA8AC21DD444DC1B784BEB4A1F47FBE8D04528C27CBD2892C085BA438418AF18A987CEF39C7851E6
32,948,600 UART: Caliptra RT
32,949,319 UART: [state] CFI Enabled
33,129,212 UART: [rt] RT listening for mailbox commands...
33,161,550 UART: [rt]cmd =0x44504543, len=136
38,784,391 >>> mbox cmd response data (136 bytes)
38,785,714 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,815,609 UART: [rt]cmd =0x4453424c, len=4
42,134,203 >>> mbox cmd response data (8 bytes)
42,134,716 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,165,212 UART: [rt]cmd =0x44504543, len=92
47,925,739 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,458 UART:
192,820 UART: Running Caliptra ROM ...
193,917 UART:
603,715 UART: [state] CFI Enabled
616,594 UART: [state] LifecycleState = Unprovisioned
618,550 UART: [state] DebugLocked = No
620,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,496 UART: [kat] SHA2-256
795,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,786 UART: [kat] ++
806,268 UART: [kat] sha1
817,946 UART: [kat] SHA2-256
820,670 UART: [kat] SHA2-384
826,938 UART: [kat] SHA2-512-ACC
829,311 UART: [kat] ECC-384
3,113,198 UART: [kat] HMAC-384Kdf
3,124,238 UART: [kat] LMS
4,314,381 UART: [kat] --
4,318,612 UART: [cold-reset] ++
4,319,976 UART: [fht] Storing FHT @ 0x50003400
4,331,239 UART: [idev] ++
4,331,880 UART: [idev] CDI.KEYID = 6
4,332,786 UART: [idev] SUBJECT.KEYID = 7
4,334,035 UART: [idev] UDS.KEYID = 0
4,335,034 ready_for_fw is high
4,335,236 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,218 UART: [idev] Erasing UDS.KEYID = 0
7,621,830 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,968 UART: [idev] --
7,648,664 UART: [ldev] ++
7,649,240 UART: [ldev] CDI.KEYID = 6
7,650,177 UART: [ldev] SUBJECT.KEYID = 5
7,651,387 UART: [ldev] AUTHORITY.KEYID = 7
7,652,669 UART: [ldev] FE.KEYID = 1
7,663,669 UART: [ldev] Erasing FE.KEYID = 1
10,951,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,623 UART: [ldev] --
13,310,449 UART: [fwproc] Waiting for Commands...
13,313,078 UART: [fwproc] Received command 0x46574c44
13,315,282 UART: [fwproc] Received Image of size 113844 bytes
17,368,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,989 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,855 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,833,067 >>> mbox cmd response: success
17,833,621 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,836,434 UART: [afmc] ++
17,837,037 UART: [afmc] CDI.KEYID = 6
17,837,925 UART: [afmc] SUBJECT.KEYID = 7
17,839,199 UART: [afmc] AUTHORITY.KEYID = 5
21,150,272 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,224 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,489 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,883 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,737 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,160 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,224 UART: [afmc] --
23,514,285 UART: [cold-reset] --
23,516,482 UART: [state] Locking Datavault
23,522,055 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,754 UART: [state] Locking ICCM
23,525,636 UART: [exit] Launching FMC @ 0x40000130
23,534,033 UART:
23,534,275 UART: Running Caliptra FMC ...
23,535,379 UART:
23,535,539 UART: [state] CFI Enabled
23,543,532 UART: [fht] FMC Alias Private Key: 7
25,874,473 UART: [art] Extend RT PCRs Done
25,875,694 UART: [art] Lock RT PCRs Done
25,877,374 UART: [art] Populate DV Done
25,882,678 UART: [fht] FMC Alias Private Key: 7
25,884,327 UART: [art] Derive CDI
25,885,161 UART: [art] Store in in slot 0x4
25,927,866 UART: [art] Derive Key Pair
25,928,907 UART: [art] Store priv key in slot 0x5
29,171,009 UART: [art] Derive Key Pair - Done
29,184,050 UART: [art] Signing Cert with AUTHO
29,185,390 UART: RITY.KEYID = 7
31,464,810 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,313 UART: [art] PUB.X = 848B46EDE68063E3907CAF0C0CACF673F00231B8C79894833D0A1412BC3F000D4B39693506D0E6FE1909BAE61CB8C3E4
31,473,560 UART: [art] PUB.Y = CE40DB21E375157D681DF15CE303B9E04247ABE377A6F3B752D8FC01B3151AEDF8DABA73F9A2633E39771A5EC0FE4388
31,480,856 UART: [art] SIG.R = A3BA99BC7C8B0AA82EC7155C1EA88F6B854636D0CF6191440928ED817F8552F29B3BDF0EB0B5E6DEC05B77C13D0EC0B9
31,488,265 UART: [art] SIG.S = 9FE1C2B62740A5E5EE13299ED4B0BAE64BCA353F26D6BE4100078D805569B45F1281A87FBE73A5E430D9CDF1D33A18AF
32,793,794 UART: Caliptra RT
32,794,493 UART: [state] CFI Enabled
32,912,253 UART: [rt] RT listening for mailbox commands...
32,944,569 UART: [rt]cmd =0x44504543, len=136
38,502,851 >>> mbox cmd response data (136 bytes)
38,504,183 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,533,873 UART: [rt]cmd =0x4453424c, len=4
41,780,220 >>> mbox cmd response data (8 bytes)
41,780,740 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,811,114 UART: [rt]cmd =0x44504543, len=92
47,484,098 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,523 writing to cptra_bootfsm_go
4,129,555 ready_for_fw is high
4,130,170 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,071,383 >>> mbox cmd response: success
18,072,112 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,711,246 UART:
23,711,643 UART: Running Caliptra FMC ...
23,712,748 UART:
23,712,901 UART: [state] CFI Enabled
23,721,105 UART: [fht] FMC Alias Private Key: 7
26,052,358 UART: [art] Extend RT PCRs Done
26,053,583 UART: [art] Lock RT PCRs Done
26,055,406 UART: [art] Populate DV Done
26,060,763 UART: [fht] FMC Alias Private Key: 7
26,062,367 UART: [art] Derive CDI
26,063,129 UART: [art] Store in in slot 0x4
26,105,511 UART: [art] Derive Key Pair
26,106,513 UART: [art] Store priv key in slot 0x5
29,348,834 UART: [art] Derive Key Pair - Done
29,361,463 UART: [art] Signing Cert with AUTHO
29,362,773 UART: RITY.KEYID = 7
31,642,080 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,595 UART: [art] PUB.X = 9963FAAED3F6C3CF8E5B6ED416580C8C5320FF88C52DC450472E5B9F03B61407E4AFD37F07E6877288A2E802F4B1A118
31,650,873 UART: [art] PUB.Y = 7DE6A3164BBD2187196AA912DB5706417BE039D66DCA9C1DAA89DC4A7CBBBC6D695BC0D336295E80399E0679C6767A72
31,658,065 UART: [art] SIG.R = 478973A2EF1AF2C71CFED4D8D85CDD4ABD2808E6A0FA65A09FE17749C3D5ECD6907DE281FAD5EA997B0B61A9A0CD7A55
31,665,523 UART: [art] SIG.S = B969BDFCC70F43A118592A672654BA826A0B82F4FF137B456C5B8F97D942303061B04DFBD541D5AEAD9E493AFD2FC965
32,970,603 UART: Caliptra RT
32,971,350 UART: [state] CFI Enabled
33,088,266 UART: [rt] RT listening for mailbox commands...
33,120,654 UART: [rt]cmd =0x44504543, len=136
38,679,932 >>> mbox cmd response data (136 bytes)
38,681,296 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,711,351 UART: [rt]cmd =0x4453424c, len=4
41,957,041 >>> mbox cmd response data (8 bytes)
41,957,599 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,988,237 UART: [rt]cmd =0x44504543, len=92
47,662,140 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,980 UART:
192,347 UART: Running Caliptra ROM ...
193,559 UART:
193,715 UART: [state] CFI Enabled
263,571 UART: [state] LifecycleState = Unprovisioned
265,469 UART: [state] DebugLocked = No
268,283 UART: [state] WD Timer not started. Device not locked for debugging
272,751 UART: [kat] SHA2-256
451,870 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,467 UART: [kat] ++
464,004 UART: [kat] sha1
476,456 UART: [kat] SHA2-256
479,468 UART: [kat] SHA2-384
486,240 UART: [kat] SHA2-512-ACC
489,172 UART: [kat] ECC-384
2,951,115 UART: [kat] HMAC-384Kdf
2,973,014 UART: [kat] LMS
3,502,409 UART: [kat] --
3,506,655 UART: [cold-reset] ++
3,508,877 UART: [fht] FHT @ 0x50003400
3,520,988 UART: [idev] ++
3,521,551 UART: [idev] CDI.KEYID = 6
3,522,581 UART: [idev] SUBJECT.KEYID = 7
3,523,687 UART: [idev] UDS.KEYID = 0
3,524,735 ready_for_fw is high
3,524,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,506 UART: [idev] Erasing UDS.KEYID = 0
6,027,739 UART: [idev] Sha1 KeyId Algorithm
6,050,799 UART: [idev] --
6,054,885 UART: [ldev] ++
6,055,471 UART: [ldev] CDI.KEYID = 6
6,056,360 UART: [ldev] SUBJECT.KEYID = 5
6,057,490 UART: [ldev] AUTHORITY.KEYID = 7
6,058,783 UART: [ldev] FE.KEYID = 1
6,102,781 UART: [ldev] Erasing FE.KEYID = 1
8,604,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,900 UART: [ldev] --
10,394,202 UART: [fwproc] Wait for Commands...
10,396,950 UART: [fwproc] Recv command 0x46574c44
10,399,043 UART: [fwproc] Recv'd Img size: 114168 bytes
13,793,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,936,074 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,252,928 >>> mbox cmd response: success
14,253,555 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,256,836 UART: [afmc] ++
14,257,452 UART: [afmc] CDI.KEYID = 6
14,258,341 UART: [afmc] SUBJECT.KEYID = 7
14,259,502 UART: [afmc] AUTHORITY.KEYID = 5
16,787,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,512,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,514,151 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,529,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,545,964 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,561,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,585,383 UART: [afmc] --
18,589,026 UART: [cold-reset] --
18,591,652 UART: [state] Locking Datavault
18,597,817 UART: [state] Locking PCR0, PCR1 and PCR31
18,599,461 UART: [state] Locking ICCM
18,601,913 UART: [exit] Launching FMC @ 0x40000130
18,610,294 UART:
18,610,568 UART: Running Caliptra FMC ...
18,611,674 UART:
18,611,835 UART: [state] CFI Enabled
18,669,736 UART: [fht] FMC Alias Private Key: 7
20,434,125 UART: [art] Extend RT PCRs Done
20,435,345 UART: [art] Lock RT PCRs Done
20,437,026 UART: [art] Populate DV Done
20,442,224 UART: [fht] FMC Alias Private Key: 7
20,443,836 UART: [art] Derive CDI
20,444,767 UART: [art] Store in in slot 0x4
20,502,600 UART: [art] Derive Key Pair
20,503,599 UART: [art] Store priv key in slot 0x5
22,966,730 UART: [art] Derive Key Pair - Done
22,980,049 UART: [art] Signing Cert with AUTHO
22,981,357 UART: RITY.KEYID = 7
24,692,575 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,100 UART: [art] PUB.X = 95ADE7854918CA746183BDDF3FFCE37D1D82844BC05528294D2B9B793BCED2999692CB43B1ED5673E55D44CB27ED716F
24,701,367 UART: [art] PUB.Y = CA1D1931446BBA8CD5BC32556B6D8E79E957B1E3907A2CC0783AEA6B105FF669BF71E4FE8703B69BDFAAFCB47813574F
24,708,619 UART: [art] SIG.R = D10AC176F76A510EEA0EA9B8C1E0CF4FEF158D4CFFE6F61802838A5C9C817D29AE0235665B10825DFF7823974AAA73C9
24,716,048 UART: [art] SIG.S = D74C719C281534228B045FC3250D446D234A1BCCB5B83DA00B1622CF286D6207E17B7D786DF25C89FB49ED98B54B91AD
25,694,943 UART: Caliptra RT
25,695,641 UART: [state] CFI Enabled
25,860,708 UART: [rt] RT listening for mailbox commands...
25,892,718 UART: [rt]cmd =0x44504543, len=136
30,111,936 >>> mbox cmd response data (136 bytes)
30,113,266 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,142,795 UART: [rt]cmd =0x4453424c, len=4
32,630,901 >>> mbox cmd response data (8 bytes)
32,631,439 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,661,864 UART: [rt]cmd =0x44504543, len=92
37,017,378 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,382,878 ready_for_fw is high
3,383,293 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,048,582 >>> mbox cmd response: success
14,049,271 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,340,875 UART:
18,341,277 UART: Running Caliptra FMC ...
18,342,381 UART:
18,342,560 UART: [state] CFI Enabled
18,411,062 UART: [fht] FMC Alias Private Key: 7
20,174,301 UART: [art] Extend RT PCRs Done
20,175,523 UART: [art] Lock RT PCRs Done
20,176,960 UART: [art] Populate DV Done
20,182,374 UART: [fht] FMC Alias Private Key: 7
20,183,908 UART: [art] Derive CDI
20,184,675 UART: [art] Store in in slot 0x4
20,243,575 UART: [art] Derive Key Pair
20,244,566 UART: [art] Store priv key in slot 0x5
22,707,617 UART: [art] Derive Key Pair - Done
22,720,667 UART: [art] Signing Cert with AUTHO
22,721,971 UART: RITY.KEYID = 7
24,433,460 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,975 UART: [art] PUB.X = 3E1219C8176159BBF8405CE0B8E4EC39FB762C823E9ACA626B13990C53B902E4C5D01AC7B728E296D6860F81812C355F
24,442,221 UART: [art] PUB.Y = 535ECA777AA9DEECEBF15CF6502157B36AD7EFA41243A0A678AFFFCEB2F47513F86B0478948310825525D92F28B94E53
24,449,489 UART: [art] SIG.R = 7D4DAD4005CE68FBFBA8CCE84FB38CEDBF70C8DE5F5CA940A1672069798BE9A31F849C9ED4CA9218F69D92EE4191EF9C
24,456,931 UART: [art] SIG.S = 9B89264F4A9E79C40CC6A7274E218E9F0BA13E9F1B908B2B7203F9BEEBAB184F3E9068C6E78B130BA1DAB78BB38238E0
25,436,185 UART: Caliptra RT
25,436,896 UART: [state] CFI Enabled
25,601,595 UART: [rt] RT listening for mailbox commands...
25,634,134 UART: [rt]cmd =0x44504543, len=136
29,851,108 >>> mbox cmd response data (136 bytes)
29,852,408 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,882,301 UART: [rt]cmd =0x4453424c, len=4
32,370,145 >>> mbox cmd response data (8 bytes)
32,370,653 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,401,347 UART: [rt]cmd =0x44504543, len=92
36,755,592 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,964 writing to cptra_bootfsm_go
193,084 UART:
193,449 UART: Running Caliptra ROM ...
194,548 UART:
604,401 UART: [state] CFI Enabled
616,378 UART: [state] LifecycleState = Unprovisioned
618,284 UART: [state] DebugLocked = No
619,599 UART: [state] WD Timer not started. Device not locked for debugging
622,858 UART: [kat] SHA2-256
801,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,522 UART: [kat] ++
813,973 UART: [kat] sha1
825,413 UART: [kat] SHA2-256
828,399 UART: [kat] SHA2-384
834,257 UART: [kat] SHA2-512-ACC
837,190 UART: [kat] ECC-384
3,279,776 UART: [kat] HMAC-384Kdf
3,292,830 UART: [kat] LMS
3,822,296 UART: [kat] --
3,826,285 UART: [cold-reset] ++
3,828,348 UART: [fht] FHT @ 0x50003400
3,838,328 UART: [idev] ++
3,838,939 UART: [idev] CDI.KEYID = 6
3,839,855 UART: [idev] SUBJECT.KEYID = 7
3,841,032 UART: [idev] UDS.KEYID = 0
3,841,962 ready_for_fw is high
3,842,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,582 UART: [idev] Erasing UDS.KEYID = 0
6,314,589 UART: [idev] Sha1 KeyId Algorithm
6,337,657 UART: [idev] --
6,343,102 UART: [ldev] ++
6,343,671 UART: [ldev] CDI.KEYID = 6
6,344,582 UART: [ldev] SUBJECT.KEYID = 5
6,345,794 UART: [ldev] AUTHORITY.KEYID = 7
6,347,019 UART: [ldev] FE.KEYID = 1
6,356,855 UART: [ldev] Erasing FE.KEYID = 1
8,824,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,220 UART: [ldev] --
10,615,906 UART: [fwproc] Wait for Commands...
10,618,662 UART: [fwproc] Recv command 0x46574c44
10,620,706 UART: [fwproc] Recv'd Img size: 114168 bytes
14,013,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,477,675 >>> mbox cmd response: success
14,478,291 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,482,349 UART: [afmc] ++
14,482,935 UART: [afmc] CDI.KEYID = 6
14,483,848 UART: [afmc] SUBJECT.KEYID = 7
14,485,063 UART: [afmc] AUTHORITY.KEYID = 5
16,985,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,462 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,288 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,536 UART: [afmc] --
18,781,675 UART: [cold-reset] --
18,785,681 UART: [state] Locking Datavault
18,790,167 UART: [state] Locking PCR0, PCR1 and PCR31
18,791,813 UART: [state] Locking ICCM
18,794,535 UART: [exit] Launching FMC @ 0x40000130
18,802,968 UART:
18,803,211 UART: Running Caliptra FMC ...
18,804,265 UART:
18,804,419 UART: [state] CFI Enabled
18,812,517 UART: [fht] FMC Alias Private Key: 7
20,568,345 UART: [art] Extend RT PCRs Done
20,569,564 UART: [art] Lock RT PCRs Done
20,571,085 UART: [art] Populate DV Done
20,576,229 UART: [fht] FMC Alias Private Key: 7
20,577,872 UART: [art] Derive CDI
20,578,685 UART: [art] Store in in slot 0x4
20,621,007 UART: [art] Derive Key Pair
20,622,050 UART: [art] Store priv key in slot 0x5
23,048,755 UART: [art] Derive Key Pair - Done
23,061,857 UART: [art] Signing Cert with AUTHO
23,063,153 UART: RITY.KEYID = 7
24,768,791 UART: [art] Erasing AUTHORITY.KEYID = 7
24,770,289 UART: [art] PUB.X = 32F44E03F7DF05270AD254328F390DDBB6F79172688BF9E3AF09BCABCA03B68007120D04C0EB9E229420EAAD957ED0BB
24,777,612 UART: [art] PUB.Y = 2845CF2609E1C5D6D735A53A2ABDAD28D7D88A97302588EB5483C13DE7398B46110C936B2BCE0DA350AF0BFFE42CA494
24,784,858 UART: [art] SIG.R = ED02ECB36A09745E429E9381F88EA14250B95B0EA6E327978545404ECC854EA6F29C0FD175D72A652C236D181B315714
24,792,268 UART: [art] SIG.S = D1395B8258C16E2894A7A6BA3929409BC63A76495D3A3A8E78287EED80CA7B63F11F6285D31502385595CBC47C0B1D55
25,771,283 UART: Caliptra RT
25,771,995 UART: [state] CFI Enabled
25,888,294 UART: [rt] RT listening for mailbox commands...
25,920,664 UART: [rt]cmd =0x44504543, len=136
30,090,394 >>> mbox cmd response data (136 bytes)
30,091,724 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,121,671 UART: [rt]cmd =0x4453424c, len=4
32,552,131 >>> mbox cmd response data (8 bytes)
32,552,671 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,583,264 UART: [rt]cmd =0x44504543, len=92
36,868,099 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
3,694,376 ready_for_fw is high
3,694,764 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,256,484 >>> mbox cmd response: success
14,257,120 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,508,709 UART:
18,509,095 UART: Running Caliptra FMC ...
18,510,319 UART:
18,510,492 UART: [state] CFI Enabled
18,518,060 UART: [fht] FMC Alias Private Key: 7
20,275,032 UART: [art] Extend RT PCRs Done
20,276,262 UART: [art] Lock RT PCRs Done
20,278,000 UART: [art] Populate DV Done
20,283,535 UART: [fht] FMC Alias Private Key: 7
20,285,028 UART: [art] Derive CDI
20,285,793 UART: [art] Store in in slot 0x4
20,328,338 UART: [art] Derive Key Pair
20,329,378 UART: [art] Store priv key in slot 0x5
22,756,110 UART: [art] Derive Key Pair - Done
22,769,163 UART: [art] Signing Cert with AUTHO
22,770,462 UART: RITY.KEYID = 7
24,475,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,468 UART: [art] PUB.X = 5D47DB35E97C163AADEF63F7E8082E438A85302B4DC54A1FC80B19DE02A75F38918C4B4D56FC434EF37A669BD2DE5906
24,484,800 UART: [art] PUB.Y = CF9F0F49D1176E9F20BCC27CDB53A9B5E28F48B7C3D617D9128907298499BB1191663F22EBF2E1646C226C66A933FD44
24,492,005 UART: [art] SIG.R = 84D3F5028C20112E1EBC90275A57E109DBA76ADAFA6BE61A11D4BEEDD1637CC3EDFA4E8693E0C2C3E8088DA81B79C24D
24,499,461 UART: [art] SIG.S = B18919C414AE4F0DBBF406C65D1A83C4402ED9B65F55EF337AA91D099EA4CC0E95279A4A22FEC8DF0B3CF56DEADA4622
25,477,702 UART: Caliptra RT
25,478,400 UART: [state] CFI Enabled
25,595,532 UART: [rt] RT listening for mailbox commands...
25,627,481 UART: [rt]cmd =0x44504543, len=136
29,797,419 >>> mbox cmd response data (136 bytes)
29,798,675 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
29,828,499 UART: [rt]cmd =0x4453424c, len=4
32,258,773 >>> mbox cmd response data (8 bytes)
32,259,264 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,289,902 UART: [rt]cmd =0x44504543, len=92
36,574,624 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,028 UART:
192,498 UART: Running Caliptra ROM ...
193,623 UART:
193,774 UART: [state] CFI Enabled
262,944 UART: [state] LifecycleState = Unprovisioned
265,378 UART: [state] DebugLocked = No
267,341 UART: [state] WD Timer not started. Device not locked for debugging
271,184 UART: [kat] SHA2-256
461,043 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,813 UART: [kat] ++
472,335 UART: [kat] sha1
483,141 UART: [kat] SHA2-256
486,160 UART: [kat] SHA2-384
493,305 UART: [kat] SHA2-512-ACC
495,838 UART: [kat] ECC-384
2,948,984 UART: [kat] HMAC-384Kdf
2,970,892 UART: [kat] LMS
3,502,705 UART: [kat] --
3,506,199 UART: [cold-reset] ++
3,507,632 UART: [fht] FHT @ 0x50003400
3,519,530 UART: [idev] ++
3,520,234 UART: [idev] CDI.KEYID = 6
3,521,264 UART: [idev] SUBJECT.KEYID = 7
3,522,369 UART: [idev] UDS.KEYID = 0
3,523,301 ready_for_fw is high
3,523,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,159 UART: [idev] Erasing UDS.KEYID = 0
6,027,687 UART: [idev] Sha1 KeyId Algorithm
6,050,957 UART: [idev] --
6,055,332 UART: [ldev] ++
6,056,069 UART: [ldev] CDI.KEYID = 6
6,056,983 UART: [ldev] SUBJECT.KEYID = 5
6,058,151 UART: [ldev] AUTHORITY.KEYID = 7
6,059,340 UART: [ldev] FE.KEYID = 1
6,100,398 UART: [ldev] Erasing FE.KEYID = 1
8,605,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,625 UART: [ldev] --
10,413,417 UART: [fwproc] Wait for Commands...
10,415,488 UART: [fwproc] Recv command 0x46574c44
10,417,794 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,595,665 >>> mbox cmd response: success
14,596,278 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,599,350 UART: [afmc] ++
14,600,048 UART: [afmc] CDI.KEYID = 6
14,601,302 UART: [afmc] SUBJECT.KEYID = 7
14,602,742 UART: [afmc] AUTHORITY.KEYID = 5
17,131,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,855,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,857,573 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,872,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,887,863 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,902,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,789 UART: [afmc] --
18,929,062 UART: [cold-reset] --
18,932,447 UART: [state] Locking Datavault
18,936,515 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,663 UART: [state] Locking ICCM
18,940,171 UART: [exit] Launching FMC @ 0x40000130
18,948,851 UART:
18,949,084 UART: Running Caliptra FMC ...
18,950,184 UART:
18,950,340 UART: [state] CFI Enabled
19,012,177 UART: [fht] FMC Alias Private Key: 7
20,777,180 UART: [art] Extend RT PCRs Done
20,778,413 UART: [art] Lock RT PCRs Done
20,780,448 UART: [art] Populate DV Done
20,785,978 UART: [fht] FMC Alias Private Key: 7
20,787,534 UART: [art] Derive CDI
20,788,351 UART: [art] Store in in slot 0x4
20,845,476 UART: [art] Derive Key Pair
20,846,516 UART: [art] Store priv key in slot 0x5
23,309,487 UART: [art] Derive Key Pair - Done
23,322,329 UART: [art] Signing Cert with AUTHO
23,323,639 UART: RITY.KEYID = 7
25,035,682 UART: [art] Erasing AUTHORITY.KEYID = 7
25,037,185 UART: [art] PUB.X = B53F249CE50C9EC5FAF73B6A613E937BC7B5A5CFC2E521277934859A78046235A15B7C72F99767E2D8A2FEB70841C6C4
25,044,458 UART: [art] PUB.Y = B873BF40DBCD76C0F7769BC75775D9347F95879335E269F27F516B5E63A67D3F5A45D8165A8749C3E0408D1D311EC79F
25,051,687 UART: [art] SIG.R = 13553625DEE50C0B9C421B6543683A036AD8FC8A4A2FD95F86A14FC235F5D8A2A73CB14EF7574FE265DDBF16675015A6
25,059,108 UART: [art] SIG.S = EAF488904241442AA22D0CE0BF517C3E6394472CB87B0EC89CF65E0D53E0DE800910364B02383FE964186011C4B33CF8
26,037,551 UART: Caliptra RT
26,038,266 UART: [state] CFI Enabled
26,202,229 UART: [rt] RT listening for mailbox commands...
26,234,731 UART: [rt]cmd =0x44504543, len=136
30,452,041 >>> mbox cmd response data (136 bytes)
30,453,380 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,483,104 UART: [rt]cmd =0x4453424c, len=4
32,970,075 >>> mbox cmd response data (8 bytes)
32,970,595 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,001,124 UART: [rt]cmd =0x44504543, len=92
37,355,519 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,438,958 ready_for_fw is high
3,439,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,738,141 >>> mbox cmd response: success
14,738,776 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,025,961 UART:
19,026,360 UART: Running Caliptra FMC ...
19,027,514 UART:
19,027,680 UART: [state] CFI Enabled
19,094,629 UART: [fht] FMC Alias Private Key: 7
20,858,326 UART: [art] Extend RT PCRs Done
20,859,550 UART: [art] Lock RT PCRs Done
20,861,028 UART: [art] Populate DV Done
20,866,340 UART: [fht] FMC Alias Private Key: 7
20,868,044 UART: [art] Derive CDI
20,868,889 UART: [art] Store in in slot 0x4
20,927,498 UART: [art] Derive Key Pair
20,928,544 UART: [art] Store priv key in slot 0x5
23,390,837 UART: [art] Derive Key Pair - Done
23,403,727 UART: [art] Signing Cert with AUTHO
23,405,027 UART: RITY.KEYID = 7
25,117,220 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,724 UART: [art] PUB.X = 7EC6FA1B9F87A2A980C921495D2E7D42436446599FDBC5C6365EAE085EA1033AB9BC37447F49EAF89A57F3E4F5329706
25,125,973 UART: [art] PUB.Y = AA27F77EFB3B07CA583682A3562E3A508276F156253BF7FDD846B1894B2A9F965877BAB40B08B36B5689A3E7F31179F3
25,133,266 UART: [art] SIG.R = 23BE87E052E758203FF75288616598475FA59DE7B4C86D30C10BF378B3314780041069C9E31036E254A41EE2ED11D7D1
25,140,598 UART: [art] SIG.S = B11FB278E880EB34A5C0B5F22ECF225D4596508D0506C9BB64DDBEF063FF8D7EB97CD0570521ABE695AA7FBF883C8FD1
26,119,739 UART: Caliptra RT
26,120,448 UART: [state] CFI Enabled
26,285,169 UART: [rt] RT listening for mailbox commands...
26,317,721 UART: [rt]cmd =0x44504543, len=136
30,535,331 >>> mbox cmd response data (136 bytes)
30,536,662 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,566,442 UART: [rt]cmd =0x4453424c, len=4
33,055,043 >>> mbox cmd response data (8 bytes)
33,055,549 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,086,035 UART: [rt]cmd =0x44504543, len=92
37,439,846 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,740 writing to cptra_bootfsm_go
192,810 UART:
193,191 UART: Running Caliptra ROM ...
194,287 UART:
604,074 UART: [state] CFI Enabled
619,229 UART: [state] LifecycleState = Unprovisioned
621,601 UART: [state] DebugLocked = No
623,776 UART: [state] WD Timer not started. Device not locked for debugging
628,873 UART: [kat] SHA2-256
818,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,527 UART: [kat] ++
830,073 UART: [kat] sha1
840,387 UART: [kat] SHA2-256
843,395 UART: [kat] SHA2-384
848,458 UART: [kat] SHA2-512-ACC
851,040 UART: [kat] ECC-384
3,292,165 UART: [kat] HMAC-384Kdf
3,304,821 UART: [kat] LMS
3,836,631 UART: [kat] --
3,840,592 UART: [cold-reset] ++
3,842,241 UART: [fht] FHT @ 0x50003400
3,852,937 UART: [idev] ++
3,853,648 UART: [idev] CDI.KEYID = 6
3,854,626 UART: [idev] SUBJECT.KEYID = 7
3,855,806 UART: [idev] UDS.KEYID = 0
3,856,710 ready_for_fw is high
3,856,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,428 UART: [idev] Erasing UDS.KEYID = 0
6,333,868 UART: [idev] Sha1 KeyId Algorithm
6,356,003 UART: [idev] --
6,361,271 UART: [ldev] ++
6,361,960 UART: [ldev] CDI.KEYID = 6
6,362,892 UART: [ldev] SUBJECT.KEYID = 5
6,364,051 UART: [ldev] AUTHORITY.KEYID = 7
6,365,285 UART: [ldev] FE.KEYID = 1
6,375,337 UART: [ldev] Erasing FE.KEYID = 1
8,858,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,684 UART: [ldev] --
10,650,627 UART: [fwproc] Wait for Commands...
10,653,478 UART: [fwproc] Recv command 0x46574c44
10,655,731 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,835,232 >>> mbox cmd response: success
14,835,818 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,839,995 UART: [afmc] ++
14,840,687 UART: [afmc] CDI.KEYID = 6
14,841,928 UART: [afmc] SUBJECT.KEYID = 7
14,843,363 UART: [afmc] AUTHORITY.KEYID = 5
17,350,875 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,998 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,114 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,755 UART: [afmc] --
19,145,706 UART: [cold-reset] --
19,151,137 UART: [state] Locking Datavault
19,156,162 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,306 UART: [state] Locking ICCM
19,159,867 UART: [exit] Launching FMC @ 0x40000130
19,168,542 UART:
19,168,777 UART: Running Caliptra FMC ...
19,169,878 UART:
19,170,041 UART: [state] CFI Enabled
19,178,281 UART: [fht] FMC Alias Private Key: 7
20,935,199 UART: [art] Extend RT PCRs Done
20,936,416 UART: [art] Lock RT PCRs Done
20,938,232 UART: [art] Populate DV Done
20,943,481 UART: [fht] FMC Alias Private Key: 7
20,945,029 UART: [art] Derive CDI
20,945,850 UART: [art] Store in in slot 0x4
20,988,227 UART: [art] Derive Key Pair
20,989,416 UART: [art] Store priv key in slot 0x5
23,415,664 UART: [art] Derive Key Pair - Done
23,428,553 UART: [art] Signing Cert with AUTHO
23,429,850 UART: RITY.KEYID = 7
25,135,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,773 UART: [art] PUB.X = 03F2C3AE0E1151CCB4724E42216B097BEBD997573B4CAECAF2C31C5E15947ADF8EE857503968CC6F7B12C6CECF5A254E
25,144,075 UART: [art] PUB.Y = C51899D36A27445E575EF9CFCFE3D44267A96379BC62CC8E94E02A804B0C826023910D1FF13E4AB58476D1890D7E63E1
25,151,338 UART: [art] SIG.R = 4FF0D8982F836FCB57432EF6EBB1A45FE4BA9A47750C08C4F8E10D3DF29447C5202CA0FD6C957AD8102090E7ED64E2D3
25,158,748 UART: [art] SIG.S = FD4A1CA775C8986B59A758738E70C681B4D80990E94D31A41C7C4490011BAAC54B82FB02EAA65F26A3BB675B1EF7DE39
26,138,006 UART: Caliptra RT
26,138,694 UART: [state] CFI Enabled
26,255,038 UART: [rt] RT listening for mailbox commands...
26,287,244 UART: [rt]cmd =0x44504543, len=136
30,456,595 >>> mbox cmd response data (136 bytes)
30,457,909 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,487,801 UART: [rt]cmd =0x4453424c, len=4
32,918,043 >>> mbox cmd response data (8 bytes)
32,918,564 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,948,943 UART: [rt]cmd =0x44504543, len=92
37,233,124 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,715 writing to cptra_bootfsm_go
3,753,196 ready_for_fw is high
3,753,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,952,801 >>> mbox cmd response: success
14,953,704 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,207,854 UART:
19,208,242 UART: Running Caliptra FMC ...
19,209,437 UART:
19,209,608 UART: [state] CFI Enabled
19,217,211 UART: [fht] FMC Alias Private Key: 7
20,974,058 UART: [art] Extend RT PCRs Done
20,975,288 UART: [art] Lock RT PCRs Done
20,976,651 UART: [art] Populate DV Done
20,982,189 UART: [fht] FMC Alias Private Key: 7
20,983,786 UART: [art] Derive CDI
20,984,603 UART: [art] Store in in slot 0x4
21,026,993 UART: [art] Derive Key Pair
21,028,036 UART: [art] Store priv key in slot 0x5
23,454,783 UART: [art] Derive Key Pair - Done
23,467,942 UART: [art] Signing Cert with AUTHO
23,469,239 UART: RITY.KEYID = 7
25,174,531 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,034 UART: [art] PUB.X = B8197D5355ADEA902A3296993FF4B13827F203297989736614382EC9762542537770E8ED482EA4EA1BF669FF9075C647
25,183,282 UART: [art] PUB.Y = E62CCDCFBB0803F59B80133BB871C3FDE5418488B743CF565ACA20D340A97F69065420CBD264CDC72C30E768265C9F09
25,190,511 UART: [art] SIG.R = 9C520F832A17463B0359D0FF7466BE55B9144F8AE911AED042D67E4920D3A7D8DFA36902BEE04B0D32B2313559015160
25,197,927 UART: [art] SIG.S = 7EFEDF6728E3BADCFF7CAAD180D61E49771F1E18D6CD13BD430EE8A431C1266859B26C71D9C69BC708752B5F40124AC5
26,176,525 UART: Caliptra RT
26,177,236 UART: [state] CFI Enabled
26,294,991 UART: [rt] RT listening for mailbox commands...
26,327,591 UART: [rt]cmd =0x44504543, len=136
30,497,814 >>> mbox cmd response data (136 bytes)
30,499,100 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,528,898 UART: [rt]cmd =0x4453424c, len=4
32,959,779 >>> mbox cmd response data (8 bytes)
32,960,293 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,990,712 UART: [rt]cmd =0x44504543, len=92
37,274,579 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,853 UART: [kat] SHA2-256
881,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,899 UART: [kat] ++
886,051 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
894,968 UART: [kat] SHA2-512-ACC
896,869 UART: [kat] ECC-384
902,202 UART: [kat] HMAC-384Kdf
906,678 UART: [kat] LMS
1,474,874 UART: [kat] --
1,475,615 UART: [cold-reset] ++
1,475,965 UART: [fht] Storing FHT @ 0x50003400
1,478,830 UART: [idev] ++
1,478,998 UART: [idev] CDI.KEYID = 6
1,479,358 UART: [idev] SUBJECT.KEYID = 7
1,479,782 UART: [idev] UDS.KEYID = 0
1,480,127 ready_for_fw is high
1,480,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,100 UART: [idev] Erasing UDS.KEYID = 0
1,504,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,862 UART: [idev] --
1,514,079 UART: [ldev] ++
1,514,247 UART: [ldev] CDI.KEYID = 6
1,514,610 UART: [ldev] SUBJECT.KEYID = 5
1,515,036 UART: [ldev] AUTHORITY.KEYID = 7
1,515,499 UART: [ldev] FE.KEYID = 1
1,520,587 UART: [ldev] Erasing FE.KEYID = 1
1,546,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,106 UART: [ldev] --
1,585,383 UART: [fwproc] Waiting for Commands...
1,586,028 UART: [fwproc] Received command 0x46574c44
1,586,819 UART: [fwproc] Received Image of size 114168 bytes
2,884,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,053 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,114 >>> mbox cmd response: success
3,076,114 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,077,294 UART: [afmc] ++
3,077,462 UART: [afmc] CDI.KEYID = 6
3,077,824 UART: [afmc] SUBJECT.KEYID = 7
3,078,249 UART: [afmc] AUTHORITY.KEYID = 5
3,113,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,438 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,218 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,831 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,521 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,342 UART: [afmc] --
3,156,248 UART: [cold-reset] --
3,157,220 UART: [state] Locking Datavault
3,158,463 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,067 UART: [state] Locking ICCM
3,159,601 UART: [exit] Launching FMC @ 0x40000130
3,164,930 UART:
3,164,946 UART: Running Caliptra FMC ...
3,165,354 UART:
3,165,408 UART: [state] CFI Enabled
3,175,577 UART: [fht] FMC Alias Private Key: 7
3,283,206 UART: [art] Extend RT PCRs Done
3,283,634 UART: [art] Lock RT PCRs Done
3,285,322 UART: [art] Populate DV Done
3,293,505 UART: [fht] FMC Alias Private Key: 7
3,294,453 UART: [art] Derive CDI
3,294,733 UART: [art] Store in in slot 0x4
3,380,438 UART: [art] Derive Key Pair
3,380,798 UART: [art] Store priv key in slot 0x5
3,393,582 UART: [art] Derive Key Pair - Done
3,408,343 UART: [art] Signing Cert with AUTHO
3,408,823 UART: RITY.KEYID = 7
3,423,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,528 UART: [art] PUB.X = DA287F3F40C51A348EC969302EB72958622DCE8D95229947FC39DC5573C30B54E7CC4608F950DEE2BDDDC300EFC8FA76
3,431,282 UART: [art] PUB.Y = E3D2C58E083C6AEA5FE611CD459FD3E91C7E7186814DEB77D1BB6FDEE197E6809B7AA52436F860F9AF1FA15F00BA4E1C
3,438,229 UART: [art] SIG.R = C54D23F5450F95647C71BACF890D5FD0214F1E3420615121D171FD5FA0F0B1C8B0FCD1A2820399E7CF7E6109FEFDF1AA
3,445,001 UART: [art] SIG.S = 3BEAD5B58FF8FE78D0BC752CC34E1FF668213A7D1E69077DAB4E0EF99CB36DFF1ED16F138E1E9EC2B9310416B38EEB31
3,469,567 UART: Caliptra RT
3,469,820 UART: [state] CFI Enabled
3,577,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,367 UART: [rt]cmd =0x44504543, len=136
3,672,879 >>> mbox cmd response data (136 bytes)
3,672,880 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,943 UART: [rt]cmd =0x4453424c, len=4
3,718,901 >>> mbox cmd response data (8 bytes)
3,718,902 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,921 UART: [rt]cmd =0x44504543, len=92
3,932,245 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,873 ready_for_fw is high
1,362,873 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,222 >>> mbox cmd response: success
2,927,222 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,988,416 UART:
2,988,432 UART: Running Caliptra FMC ...
2,988,840 UART:
2,988,894 UART: [state] CFI Enabled
2,999,209 UART: [fht] FMC Alias Private Key: 7
3,107,602 UART: [art] Extend RT PCRs Done
3,108,030 UART: [art] Lock RT PCRs Done
3,109,656 UART: [art] Populate DV Done
3,117,851 UART: [fht] FMC Alias Private Key: 7
3,118,831 UART: [art] Derive CDI
3,119,111 UART: [art] Store in in slot 0x4
3,204,530 UART: [art] Derive Key Pair
3,204,890 UART: [art] Store priv key in slot 0x5
3,218,494 UART: [art] Derive Key Pair - Done
3,233,130 UART: [art] Signing Cert with AUTHO
3,233,610 UART: RITY.KEYID = 7
3,249,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,801 UART: [art] PUB.X = EFF765970D217AB6E4075DE63DDB8C2F81D8534AD2251AE2DE0A73439D4909E795D27B9F04112B9ADE642258189F1A62
3,256,560 UART: [art] PUB.Y = 99CBD2F8F5E7026C6C45544A7FDEAF2EFF45C7513C35E8B4D07D9ADEBEFCE895A3C4C536EF63B6B252A99B1FC808E201
3,263,525 UART: [art] SIG.R = B824D982AC5DCBC073B1CD02BA17F0CD84F2DA4A1932698A9607C59A910755A03FA6804872BF08DA70145CCA60DC98D2
3,270,293 UART: [art] SIG.S = 636A153757A62039B491262B6B8BC52A8863A09F6072A53FF849ED5E1D32EC678679F5BA2F98003DBED2475802D93C3E
3,293,835 UART: Caliptra RT
3,294,088 UART: [state] CFI Enabled
3,401,887 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,287 UART: [rt]cmd =0x44504543, len=136
3,496,471 >>> mbox cmd response data (136 bytes)
3,496,472 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,901 UART: [rt]cmd =0x4453424c, len=4
3,543,089 >>> mbox cmd response data (8 bytes)
3,543,090 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,083 UART: [rt]cmd =0x44504543, len=92
3,755,610 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,228 UART: [kat] SHA2-256
882,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,274 UART: [kat] ++
886,426 UART: [kat] sha1
890,466 UART: [kat] SHA2-256
892,404 UART: [kat] SHA2-384
895,069 UART: [kat] SHA2-512-ACC
896,970 UART: [kat] ECC-384
902,569 UART: [kat] HMAC-384Kdf
907,175 UART: [kat] LMS
1,475,371 UART: [kat] --
1,476,310 UART: [cold-reset] ++
1,476,636 UART: [fht] Storing FHT @ 0x50003400
1,479,391 UART: [idev] ++
1,479,559 UART: [idev] CDI.KEYID = 6
1,479,919 UART: [idev] SUBJECT.KEYID = 7
1,480,343 UART: [idev] UDS.KEYID = 0
1,480,688 ready_for_fw is high
1,480,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,459 UART: [idev] Erasing UDS.KEYID = 0
1,505,017 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,629 UART: [idev] --
1,514,710 UART: [ldev] ++
1,514,878 UART: [ldev] CDI.KEYID = 6
1,515,241 UART: [ldev] SUBJECT.KEYID = 5
1,515,667 UART: [ldev] AUTHORITY.KEYID = 7
1,516,130 UART: [ldev] FE.KEYID = 1
1,521,306 UART: [ldev] Erasing FE.KEYID = 1
1,546,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,131 UART: [ldev] --
1,586,566 UART: [fwproc] Waiting for Commands...
1,587,269 UART: [fwproc] Received command 0x46574c44
1,588,060 UART: [fwproc] Received Image of size 114168 bytes
2,883,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,300 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,652 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,303 >>> mbox cmd response: success
3,076,303 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,077,441 UART: [afmc] ++
3,077,609 UART: [afmc] CDI.KEYID = 6
3,077,971 UART: [afmc] SUBJECT.KEYID = 7
3,078,396 UART: [afmc] AUTHORITY.KEYID = 5
3,113,163 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,551 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,331 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,059 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,944 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,634 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,531 UART: [afmc] --
3,156,597 UART: [cold-reset] --
3,157,363 UART: [state] Locking Datavault
3,158,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,080 UART: [state] Locking ICCM
3,159,606 UART: [exit] Launching FMC @ 0x40000130
3,164,935 UART:
3,164,951 UART: Running Caliptra FMC ...
3,165,359 UART:
3,165,502 UART: [state] CFI Enabled
3,175,879 UART: [fht] FMC Alias Private Key: 7
3,283,524 UART: [art] Extend RT PCRs Done
3,283,952 UART: [art] Lock RT PCRs Done
3,285,428 UART: [art] Populate DV Done
3,293,597 UART: [fht] FMC Alias Private Key: 7
3,294,587 UART: [art] Derive CDI
3,294,867 UART: [art] Store in in slot 0x4
3,380,552 UART: [art] Derive Key Pair
3,380,912 UART: [art] Store priv key in slot 0x5
3,394,022 UART: [art] Derive Key Pair - Done
3,408,697 UART: [art] Signing Cert with AUTHO
3,409,177 UART: RITY.KEYID = 7
3,424,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,214 UART: [art] PUB.X = D2C5C9C317289BC2FBD25B3E77DBBEBFA36610E8A0D1822E36E0E1E098A5790E7D842B8A5956D185A612C5750C407401
3,431,981 UART: [art] PUB.Y = 8731F0525157A637EBEF21E6329F8EB2CCAEEFFEE92F4C4DD58EF3E125D3B58D9F26BCE223720DB9697300CB1B611B0E
3,438,921 UART: [art] SIG.R = B8F6D226D247202270AB4CEC549374E008BBB7521AC65E3ACD55FA08329790F3F1EF404D7C2763CF0943FB005204843B
3,445,659 UART: [art] SIG.S = A43CA9120A82EC394215CC2C7055653D24063F0B815458B01E426457B612DB7FE4E7E65F7C3339D0979BBFC478EC0F93
3,469,290 UART: Caliptra RT
3,469,635 UART: [state] CFI Enabled
3,577,965 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,285 UART: [rt]cmd =0x44504543, len=136
3,672,687 >>> mbox cmd response data (136 bytes)
3,672,688 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,947 UART: [rt]cmd =0x4453424c, len=4
3,719,737 >>> mbox cmd response data (8 bytes)
3,719,738 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,749,695 UART: [rt]cmd =0x44504543, len=92
3,932,571 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,554 ready_for_fw is high
1,362,554 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,099 >>> mbox cmd response: success
2,926,099 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,987,629 UART:
2,987,645 UART: Running Caliptra FMC ...
2,988,053 UART:
2,988,196 UART: [state] CFI Enabled
2,998,633 UART: [fht] FMC Alias Private Key: 7
3,105,640 UART: [art] Extend RT PCRs Done
3,106,068 UART: [art] Lock RT PCRs Done
3,107,500 UART: [art] Populate DV Done
3,115,765 UART: [fht] FMC Alias Private Key: 7
3,116,933 UART: [art] Derive CDI
3,117,213 UART: [art] Store in in slot 0x4
3,202,578 UART: [art] Derive Key Pair
3,202,938 UART: [art] Store priv key in slot 0x5
3,216,462 UART: [art] Derive Key Pair - Done
3,231,097 UART: [art] Signing Cert with AUTHO
3,231,577 UART: RITY.KEYID = 7
3,246,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,548 UART: [art] PUB.X = 1D0C8D4B0727B51A4611279E24C990271D9E9ABA64C1ADF44B5033AF7BC4679ED2950AF00DA89A348D54504F1D2950F1
3,254,310 UART: [art] PUB.Y = 003A6394E4EEF13330B40A2E8A3BEA14D2D9B4287D836038BD71DA41862CF204BD10DFC87C3B2F06CB7825C380AA0A92
3,261,236 UART: [art] SIG.R = 04681C13BDFB6B620B01BC3BA34111AD2C41F0347448B36D068DF26535432AE965399E2EEA7D0E19349B484FEE8E4E38
3,267,995 UART: [art] SIG.S = 0AE7E264232F7E8F4E125F4F926E3373550A944F31A5F0C2AB7019953BAA271AF4C9B6E06E483D0FC3355EAB3085DCF1
3,292,385 UART: Caliptra RT
3,292,730 UART: [state] CFI Enabled
3,401,952 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,558 UART: [rt]cmd =0x44504543, len=136
3,496,908 >>> mbox cmd response data (136 bytes)
3,496,909 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,294 UART: [rt]cmd =0x4453424c, len=4
3,544,004 >>> mbox cmd response data (8 bytes)
3,544,005 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,906 UART: [rt]cmd =0x44504543, len=92
3,757,408 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,798 UART: [state] LifecycleState = Unprovisioned
85,453 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
893,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,143 UART: [kat] ++
897,295 UART: [kat] sha1
901,477 UART: [kat] SHA2-256
903,417 UART: [kat] SHA2-384
906,248 UART: [kat] SHA2-512-ACC
908,149 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,556 UART: [kat] LMS
1,170,884 UART: [kat] --
1,171,627 UART: [cold-reset] ++
1,172,095 UART: [fht] FHT @ 0x50003400
1,174,642 UART: [idev] ++
1,174,810 UART: [idev] CDI.KEYID = 6
1,175,170 UART: [idev] SUBJECT.KEYID = 7
1,175,594 UART: [idev] UDS.KEYID = 0
1,175,939 ready_for_fw is high
1,175,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,758 UART: [idev] Erasing UDS.KEYID = 0
1,200,165 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,761 UART: [ldev] ++
1,209,929 UART: [ldev] CDI.KEYID = 6
1,210,292 UART: [ldev] SUBJECT.KEYID = 5
1,210,718 UART: [ldev] AUTHORITY.KEYID = 7
1,211,181 UART: [ldev] FE.KEYID = 1
1,216,295 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,485 UART: [ldev] --
1,281,844 UART: [fwproc] Wait for Commands...
1,282,440 UART: [fwproc] Recv command 0x46574c44
1,283,168 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,423 >>> mbox cmd response: success
2,771,423 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,531 UART: [afmc] ++
2,772,699 UART: [afmc] CDI.KEYID = 6
2,773,061 UART: [afmc] SUBJECT.KEYID = 7
2,773,486 UART: [afmc] AUTHORITY.KEYID = 5
2,809,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,336 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,221 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,940 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,564 UART: [afmc] --
2,852,492 UART: [cold-reset] --
2,853,478 UART: [state] Locking Datavault
2,854,719 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,323 UART: [state] Locking ICCM
2,855,985 UART: [exit] Launching FMC @ 0x40000130
2,861,314 UART:
2,861,330 UART: Running Caliptra FMC ...
2,861,738 UART:
2,861,792 UART: [state] CFI Enabled
2,872,637 UART: [fht] FMC Alias Private Key: 7
2,980,190 UART: [art] Extend RT PCRs Done
2,980,618 UART: [art] Lock RT PCRs Done
2,982,016 UART: [art] Populate DV Done
2,990,513 UART: [fht] FMC Alias Private Key: 7
2,991,525 UART: [art] Derive CDI
2,991,805 UART: [art] Store in in slot 0x4
3,076,958 UART: [art] Derive Key Pair
3,077,318 UART: [art] Store priv key in slot 0x5
3,090,110 UART: [art] Derive Key Pair - Done
3,105,138 UART: [art] Signing Cert with AUTHO
3,105,618 UART: RITY.KEYID = 7
3,120,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,529 UART: [art] PUB.X = 6CF64332B1FF636CD72B6CCE3949F74056DD1B89E5A3E4D7EB2A5A1698A024D106DF0B7AA524AEDBFB08CCC19DE9A788
3,128,312 UART: [art] PUB.Y = F1DB36B9E048964826D30410D6EF33A7DF679F9E9F798CD19CFAC6EC7E7AFD0DF4EB9D3893FBD17B3CE27C1291F21F63
3,135,276 UART: [art] SIG.R = 933E28D8B6EF8790E587204F3C8FE484A7FB5B6E3E84D70E10C1448BFA3B7F0A8EBDAB56DEB5A993212E7DF8C021BD2F
3,142,060 UART: [art] SIG.S = 7F6B89C23E7E457E078A0F9C210BBA5AE9529A9F3FDB2D06340C4FF5129228004347A52974E477CC443F1CA60680D40B
3,165,286 UART: Caliptra RT
3,165,539 UART: [state] CFI Enabled
3,272,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,174 UART: [rt]cmd =0x44504543, len=136
3,367,784 >>> mbox cmd response data (136 bytes)
3,367,785 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,120 UART: [rt]cmd =0x4453424c, len=4
3,414,130 >>> mbox cmd response data (8 bytes)
3,414,131 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,322 UART: [rt]cmd =0x44504543, len=92
3,627,746 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,253 ready_for_fw is high
1,060,253 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,388 >>> mbox cmd response: success
2,624,388 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,686,102 UART:
2,686,118 UART: Running Caliptra FMC ...
2,686,526 UART:
2,686,580 UART: [state] CFI Enabled
2,696,889 UART: [fht] FMC Alias Private Key: 7
2,804,492 UART: [art] Extend RT PCRs Done
2,804,920 UART: [art] Lock RT PCRs Done
2,806,164 UART: [art] Populate DV Done
2,814,307 UART: [fht] FMC Alias Private Key: 7
2,815,277 UART: [art] Derive CDI
2,815,557 UART: [art] Store in in slot 0x4
2,901,050 UART: [art] Derive Key Pair
2,901,410 UART: [art] Store priv key in slot 0x5
2,914,254 UART: [art] Derive Key Pair - Done
2,928,735 UART: [art] Signing Cert with AUTHO
2,929,215 UART: RITY.KEYID = 7
2,943,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,682 UART: [art] PUB.X = ACE29F98A950E575777B08F15EE4832BB46DBF2D4FD06018CD9DF06B08AC568999E0ADEE9ED7ABFB0E72E359B47BAF3E
2,951,467 UART: [art] PUB.Y = 170010502B92CDCA0918CDC154C3C57439C8F8D5119C683795530AAB9D5F7E38530568751A0F71243CA8DB78FACBFD14
2,958,385 UART: [art] SIG.R = A7027EDB564D39ACFE5DAAB7C79C0AE3D73CD39D4C4FA06BE854626F0E40FC1DF2A5A2645D6AD000B9DFED0CC6AA1ED5
2,965,155 UART: [art] SIG.S = F18AA598064A47F32298965B4D52D24D45C5BA1756FDB4AA478C2CEEB2E8FE5C508E4E7C4FFC344BDC1C5E6AB1A89B52
2,988,999 UART: Caliptra RT
2,989,252 UART: [state] CFI Enabled
3,096,856 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,068 UART: [rt]cmd =0x44504543, len=136
3,191,906 >>> mbox cmd response data (136 bytes)
3,191,907 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,374 UART: [rt]cmd =0x4453424c, len=4
3,238,928 >>> mbox cmd response data (8 bytes)
3,238,929 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,268,748 UART: [rt]cmd =0x44504543, len=92
3,451,286 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,154 UART: [state] WD Timer not started. Device not locked for debugging
88,469 UART: [kat] SHA2-256
894,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,244 UART: [kat] ++
898,396 UART: [kat] sha1
902,658 UART: [kat] SHA2-256
904,598 UART: [kat] SHA2-384
907,271 UART: [kat] SHA2-512-ACC
909,172 UART: [kat] ECC-384
918,679 UART: [kat] HMAC-384Kdf
923,411 UART: [kat] LMS
1,171,739 UART: [kat] --
1,172,602 UART: [cold-reset] ++
1,173,112 UART: [fht] FHT @ 0x50003400
1,175,859 UART: [idev] ++
1,176,027 UART: [idev] CDI.KEYID = 6
1,176,387 UART: [idev] SUBJECT.KEYID = 7
1,176,811 UART: [idev] UDS.KEYID = 0
1,177,156 ready_for_fw is high
1,177,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,241 UART: [idev] Erasing UDS.KEYID = 0
1,202,514 UART: [idev] Sha1 KeyId Algorithm
1,210,800 UART: [idev] --
1,211,916 UART: [ldev] ++
1,212,084 UART: [ldev] CDI.KEYID = 6
1,212,447 UART: [ldev] SUBJECT.KEYID = 5
1,212,873 UART: [ldev] AUTHORITY.KEYID = 7
1,213,336 UART: [ldev] FE.KEYID = 1
1,218,906 UART: [ldev] Erasing FE.KEYID = 1
1,245,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,430 UART: [ldev] --
1,284,693 UART: [fwproc] Wait for Commands...
1,285,423 UART: [fwproc] Recv command 0x46574c44
1,286,151 UART: [fwproc] Recv'd Img size: 114168 bytes
2,583,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,058 >>> mbox cmd response: success
2,775,058 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,776,074 UART: [afmc] ++
2,776,242 UART: [afmc] CDI.KEYID = 6
2,776,604 UART: [afmc] SUBJECT.KEYID = 7
2,777,029 UART: [afmc] AUTHORITY.KEYID = 5
2,812,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,233 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,118 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,631 UART: [afmc] --
2,855,729 UART: [cold-reset] --
2,856,683 UART: [state] Locking Datavault
2,857,582 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,186 UART: [state] Locking ICCM
2,858,616 UART: [exit] Launching FMC @ 0x40000130
2,863,945 UART:
2,863,961 UART: Running Caliptra FMC ...
2,864,369 UART:
2,864,512 UART: [state] CFI Enabled
2,875,387 UART: [fht] FMC Alias Private Key: 7
2,983,380 UART: [art] Extend RT PCRs Done
2,983,808 UART: [art] Lock RT PCRs Done
2,985,092 UART: [art] Populate DV Done
2,993,025 UART: [fht] FMC Alias Private Key: 7
2,994,205 UART: [art] Derive CDI
2,994,485 UART: [art] Store in in slot 0x4
3,079,872 UART: [art] Derive Key Pair
3,080,232 UART: [art] Store priv key in slot 0x5
3,093,350 UART: [art] Derive Key Pair - Done
3,108,373 UART: [art] Signing Cert with AUTHO
3,108,853 UART: RITY.KEYID = 7
3,123,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,490 UART: [art] PUB.X = A7E2FD7C4E872260CF3F5B597C04AA11ADA7C191A4E9B69F4C3066D8DC56E7E19B77A9DBB165FFCD5A70AD2A57F44D47
3,131,279 UART: [art] PUB.Y = 589054077B53FAABACACC84DFD558FF7F97DB951419E8DF720E8DC61C39454CE1C60E19C18A927A4BBC88D49677E76B8
3,138,240 UART: [art] SIG.R = A98EEE12FE62CBD94A3D65C77D40AD8409DAED0873E04BCB24183473A026D5048AE91BD0C225EA63EBB0520BFC01F412
3,145,011 UART: [art] SIG.S = 174C17082D47FFDE4A70A50FB5492DA48F39B0E08BD4F91060070D20EB1E71AA6FD284D98EFCBBC7C7D95850C3B04ED4
3,168,720 UART: Caliptra RT
3,169,065 UART: [state] CFI Enabled
3,276,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,510 UART: [rt]cmd =0x44504543, len=136
3,371,192 >>> mbox cmd response data (136 bytes)
3,371,193 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,444 UART: [rt]cmd =0x4453424c, len=4
3,418,030 >>> mbox cmd response data (8 bytes)
3,418,031 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,912 UART: [rt]cmd =0x44504543, len=92
3,631,490 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,630 ready_for_fw is high
1,060,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,167 >>> mbox cmd response: success
2,625,167 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,621 UART:
2,687,637 UART: Running Caliptra FMC ...
2,688,045 UART:
2,688,188 UART: [state] CFI Enabled
2,698,695 UART: [fht] FMC Alias Private Key: 7
2,806,702 UART: [art] Extend RT PCRs Done
2,807,130 UART: [art] Lock RT PCRs Done
2,808,796 UART: [art] Populate DV Done
2,817,101 UART: [fht] FMC Alias Private Key: 7
2,818,097 UART: [art] Derive CDI
2,818,377 UART: [art] Store in in slot 0x4
2,903,906 UART: [art] Derive Key Pair
2,904,266 UART: [art] Store priv key in slot 0x5
2,917,496 UART: [art] Derive Key Pair - Done
2,931,920 UART: [art] Signing Cert with AUTHO
2,932,400 UART: RITY.KEYID = 7
2,947,612 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,377 UART: [art] PUB.X = AE122F17613F46DC779CA145AB49A6F326549B8E2AACE83A6A9275976C7031B27A5929CA560BDC850C9D1040E3C6A9BC
2,955,149 UART: [art] PUB.Y = 2F8E748E6C59F0DD3C0631595A3CEB065A999308A91C4C3E27FD0FE032F80907A52BA88D6B2E187B438EDD556ABA6F8D
2,962,093 UART: [art] SIG.R = E86928BB7AC6A97C01CC2833D9F45E9D3A586F2AB6A185D3F0F1C68084BB723D36376EC00CEF6A8310B850C3B7E58B48
2,968,867 UART: [art] SIG.S = A0CBA36585431D956BA12FAF53628509B789038211410828E24E03FAAC80BD43C8AEAD4143FC41374E676C49CE3AAE02
2,992,379 UART: Caliptra RT
2,992,724 UART: [state] CFI Enabled
3,100,178 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,508 UART: [rt]cmd =0x44504543, len=136
3,195,358 >>> mbox cmd response data (136 bytes)
3,195,359 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,732 UART: [rt]cmd =0x4453424c, len=4
3,242,102 >>> mbox cmd response data (8 bytes)
3,242,103 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,271,924 UART: [rt]cmd =0x44504543, len=92
3,455,326 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,650 UART: [kat] SHA2-512-ACC
906,551 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
921,156 UART: [kat] LMS
1,169,468 UART: [kat] --
1,170,505 UART: [cold-reset] ++
1,170,873 UART: [fht] FHT @ 0x50003400
1,173,633 UART: [idev] ++
1,173,801 UART: [idev] CDI.KEYID = 6
1,174,162 UART: [idev] SUBJECT.KEYID = 7
1,174,587 UART: [idev] UDS.KEYID = 0
1,174,933 ready_for_fw is high
1,174,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,343 UART: [idev] Erasing UDS.KEYID = 0
1,198,753 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,398 UART: [ldev] --
1,280,806 UART: [fwproc] Wait for Commands...
1,281,495 UART: [fwproc] Recv command 0x46574c44
1,282,228 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,907 >>> mbox cmd response: success
2,770,907 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,771,954 UART: [afmc] ++
2,772,122 UART: [afmc] CDI.KEYID = 6
2,772,485 UART: [afmc] SUBJECT.KEYID = 7
2,772,911 UART: [afmc] AUTHORITY.KEYID = 5
2,808,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,319 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,038 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,013 UART: [afmc] --
2,852,057 UART: [cold-reset] --
2,852,915 UART: [state] Locking Datavault
2,853,968 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,572 UART: [state] Locking ICCM
2,855,056 UART: [exit] Launching FMC @ 0x40000130
2,860,385 UART:
2,860,401 UART: Running Caliptra FMC ...
2,860,809 UART:
2,860,863 UART: [state] CFI Enabled
2,871,146 UART: [fht] FMC Alias Private Key: 7
2,978,993 UART: [art] Extend RT PCRs Done
2,979,421 UART: [art] Lock RT PCRs Done
2,981,087 UART: [art] Populate DV Done
2,989,410 UART: [fht] FMC Alias Private Key: 7
2,990,552 UART: [art] Derive CDI
2,990,832 UART: [art] Store in in slot 0x4
3,076,385 UART: [art] Derive Key Pair
3,076,745 UART: [art] Store priv key in slot 0x5
3,089,571 UART: [art] Derive Key Pair - Done
3,103,966 UART: [art] Signing Cert with AUTHO
3,104,446 UART: RITY.KEYID = 7
3,119,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,587 UART: [art] PUB.X = 3EC27A5ED2F2D11511567C3A341E71DB5F9548EAF8D3C4F0C37B2B26950F4EBCA7788D8EF7DF84921FD6259CD6E950D0
3,127,368 UART: [art] PUB.Y = 636030FE4B10BEBB9C58D2B64ED12EF7C0A41328C0826D9E6DC288926BC8E1AE777B2514C201F9D864AE0A8326605695
3,134,316 UART: [art] SIG.R = E6D15EC7CD46DA7CB0DC357C64A90CFA223AD88BE123602642B715762F155383B80AB092A05E8004F3F951E13F857A5B
3,141,083 UART: [art] SIG.S = EF06C9B8E83ED5797BC15136E1B15B974649DC37EB2A52EDC3B83F8528894CEBC2D5B6BE11B5E0CAB4724EC51C1A8077
3,164,835 UART: Caliptra RT
3,165,088 UART: [state] CFI Enabled
3,273,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,080 UART: [rt]cmd =0x44504543, len=136
3,368,618 >>> mbox cmd response data (136 bytes)
3,368,619 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,042 UART: [rt]cmd =0x4453424c, len=4
3,415,644 >>> mbox cmd response data (8 bytes)
3,415,645 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,560 UART: [rt]cmd =0x44504543, len=92
3,628,783 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,412 ready_for_fw is high
1,055,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,039 >>> mbox cmd response: success
2,619,039 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,681,053 UART:
2,681,069 UART: Running Caliptra FMC ...
2,681,477 UART:
2,681,531 UART: [state] CFI Enabled
2,691,978 UART: [fht] FMC Alias Private Key: 7
2,799,789 UART: [art] Extend RT PCRs Done
2,800,217 UART: [art] Lock RT PCRs Done
2,801,441 UART: [art] Populate DV Done
2,809,586 UART: [fht] FMC Alias Private Key: 7
2,810,694 UART: [art] Derive CDI
2,810,974 UART: [art] Store in in slot 0x4
2,896,379 UART: [art] Derive Key Pair
2,896,739 UART: [art] Store priv key in slot 0x5
2,909,793 UART: [art] Derive Key Pair - Done
2,924,832 UART: [art] Signing Cert with AUTHO
2,925,312 UART: RITY.KEYID = 7
2,940,452 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,217 UART: [art] PUB.X = 17C8E625A1EE346BC3A4CF1596D6455FE1809095907B766885227901584EA6A472F7A46719C23187D45664E00512FEBB
2,947,971 UART: [art] PUB.Y = 9466866DEAF11DE74233F7CAF2CF04EC73926257965BE11715D829A9EFF3319962121ABC36D949809FC338EF1D9B36D7
2,954,920 UART: [art] SIG.R = 8BCF1A644137F92FCBE37DE02FBEEBCBF5A7B203404D40A3C1726C59B7488573D78DD9A10EDAD59522926C98910D3BF0
2,961,695 UART: [art] SIG.S = 0F137A1843FB27313913119566D92198FB65DF47610DD886DB1B293C344F18FD6485B294FAE039345B715E149F8EF8F5
2,985,026 UART: Caliptra RT
2,985,279 UART: [state] CFI Enabled
3,092,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,194 UART: [rt]cmd =0x44504543, len=136
3,187,352 >>> mbox cmd response data (136 bytes)
3,187,353 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,216,778 UART: [rt]cmd =0x4453424c, len=4
3,233,502 >>> mbox cmd response data (8 bytes)
3,233,503 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,263,332 UART: [rt]cmd =0x44504543, len=92
3,447,096 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,515 UART: [kat] SHA2-256
891,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,194 UART: [kat] ++
895,346 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
916,071 UART: [kat] HMAC-384Kdf
920,627 UART: [kat] LMS
1,168,939 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,144 UART: [idev] ++
1,173,312 UART: [idev] CDI.KEYID = 6
1,173,673 UART: [idev] SUBJECT.KEYID = 7
1,174,098 UART: [idev] UDS.KEYID = 0
1,174,444 ready_for_fw is high
1,174,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,803 UART: [ldev] Erasing FE.KEYID = 1
1,241,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,091 UART: [ldev] --
1,281,421 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,556 >>> mbox cmd response: success
2,771,556 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,711 UART: [afmc] ++
2,772,879 UART: [afmc] CDI.KEYID = 6
2,773,242 UART: [afmc] SUBJECT.KEYID = 7
2,773,668 UART: [afmc] AUTHORITY.KEYID = 5
2,808,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,452 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,171 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,132 UART: [afmc] --
2,852,042 UART: [cold-reset] --
2,853,002 UART: [state] Locking Datavault
2,853,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,497 UART: [state] Locking ICCM
2,855,165 UART: [exit] Launching FMC @ 0x40000130
2,860,494 UART:
2,860,510 UART: Running Caliptra FMC ...
2,860,918 UART:
2,861,061 UART: [state] CFI Enabled
2,871,642 UART: [fht] FMC Alias Private Key: 7
2,979,813 UART: [art] Extend RT PCRs Done
2,980,241 UART: [art] Lock RT PCRs Done
2,982,077 UART: [art] Populate DV Done
2,990,264 UART: [fht] FMC Alias Private Key: 7
2,991,378 UART: [art] Derive CDI
2,991,658 UART: [art] Store in in slot 0x4
3,077,027 UART: [art] Derive Key Pair
3,077,387 UART: [art] Store priv key in slot 0x5
3,090,435 UART: [art] Derive Key Pair - Done
3,105,195 UART: [art] Signing Cert with AUTHO
3,105,675 UART: RITY.KEYID = 7
3,121,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,988 UART: [art] PUB.X = 3AB20404E400A4ABBCF278FDB41B7F286660AC4E29A34373B60A62DC3CDE13346B52A855FC7713E406DF672C9AD62ECD
3,128,738 UART: [art] PUB.Y = F91C29F67CB6C2B5485875A92524BBF8E05AF8DEF5A3C969FDDE7D5809C0A79DA691964F40370E348D03781577800EC6
3,135,680 UART: [art] SIG.R = D9364449FC7B714EDBDA41BFC2F8495687505F2637EE5FEAC86AA9FDDC8A1A36F091976EDD2193B0A2C14CDDE45A5125
3,142,468 UART: [art] SIG.S = 9F9276248B66F8182C7BFD6F0B6E06A269A44F3A6BA4C5C616D77E2189B906DDB323ED9A67969A873CB364D9AB4FB7C8
3,166,258 UART: Caliptra RT
3,166,603 UART: [state] CFI Enabled
3,273,651 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,993 UART: [rt]cmd =0x44504543, len=136
3,368,203 >>> mbox cmd response data (136 bytes)
3,368,204 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,683 UART: [rt]cmd =0x4453424c, len=4
3,414,865 >>> mbox cmd response data (8 bytes)
3,414,866 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,669 UART: [rt]cmd =0x44504543, len=92
3,628,335 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,039 ready_for_fw is high
1,056,039 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,434 >>> mbox cmd response: success
2,621,434 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,683,224 UART:
2,683,240 UART: Running Caliptra FMC ...
2,683,648 UART:
2,683,791 UART: [state] CFI Enabled
2,694,314 UART: [fht] FMC Alias Private Key: 7
2,802,433 UART: [art] Extend RT PCRs Done
2,802,861 UART: [art] Lock RT PCRs Done
2,804,301 UART: [art] Populate DV Done
2,812,524 UART: [fht] FMC Alias Private Key: 7
2,813,460 UART: [art] Derive CDI
2,813,740 UART: [art] Store in in slot 0x4
2,899,679 UART: [art] Derive Key Pair
2,900,039 UART: [art] Store priv key in slot 0x5
2,913,565 UART: [art] Derive Key Pair - Done
2,928,394 UART: [art] Signing Cert with AUTHO
2,928,874 UART: RITY.KEYID = 7
2,944,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,837 UART: [art] PUB.X = 8FDFB52A9D7BBDDEACDDAD6D6EE6797580352DB52106B93D07E1F7BA588E94552907D5672B7E931B8ED154062F0E397B
2,951,606 UART: [art] PUB.Y = F1DFD27832E26D042F55D257FD1B1B5548A929392D931C2F489FBFC6577ABE3FDA56E79A9CEA7F595352E3E0C7D5AF4D
2,958,569 UART: [art] SIG.R = 75899C87EC96B07FD5030779ADF78551A37385BA8B70D3F6C91743357445F3655D37A04075D73E8494CEB818E87DE3BA
2,965,329 UART: [art] SIG.S = 4E97C88CECBB21AB6658D2E4605D2E1A275F85F4EA740312D831EA64873266EFFC081827AC9F2311092307EE402B88D5
2,988,930 UART: Caliptra RT
2,989,275 UART: [state] CFI Enabled
3,096,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,348 UART: [rt]cmd =0x44504543, len=136
3,191,176 >>> mbox cmd response data (136 bytes)
3,191,177 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,372 UART: [rt]cmd =0x4453424c, len=4
3,237,638 >>> mbox cmd response data (8 bytes)
3,237,639 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,267,722 UART: [rt]cmd =0x44504543, len=92
3,451,147 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 10.29s
Truncated 38223 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 10.28s
Truncated 34849 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 10.29s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.85s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.86s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.84s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.87s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.88s
Truncated 38149 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.88s
Truncated 34848 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 7.88s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.46s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.46s
Truncated 47782 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.56s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.48s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.16s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.15s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.44s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.99s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.53s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.44s
Truncated 47709 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.59s
Truncated 44408 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 5.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
192,123 UART:
192,488 UART: Running Caliptra ROM ...
193,587 UART:
193,725 UART: [state] CFI Enabled
265,533 UART: [state] LifecycleState = Unprovisioned
267,461 UART: [state] DebugLocked = No
270,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,043 UART: [kat] SHA2-256
445,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,166 UART: [kat] ++
456,689 UART: [kat] sha1
466,704 UART: [kat] SHA2-256
469,376 UART: [kat] SHA2-384
474,366 UART: [kat] SHA2-512-ACC
476,724 UART: [kat] ECC-384
2,769,597 UART: [kat] HMAC-384Kdf
2,799,952 UART: [kat] LMS
3,990,249 UART: [kat] --
3,992,919 UART: [cold-reset] ++
3,994,070 UART: [fht] Storing FHT @ 0x50003400
4,004,971 UART: [idev] ++
4,005,533 UART: [idev] CDI.KEYID = 6
4,006,562 UART: [idev] SUBJECT.KEYID = 7
4,007,733 UART: [idev] UDS.KEYID = 0
4,008,773 ready_for_fw is high
4,008,987 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,152,204 UART: [idev] Erasing UDS.KEYID = 0
7,344,622 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,799 UART: [idev] --
7,369,799 UART: [ldev] ++
7,370,417 UART: [ldev] CDI.KEYID = 6
7,371,374 UART: [ldev] SUBJECT.KEYID = 5
7,372,577 UART: [ldev] AUTHORITY.KEYID = 7
7,373,804 UART: [ldev] FE.KEYID = 1
7,422,035 UART: [ldev] Erasing FE.KEYID = 1
10,753,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,225 UART: [ldev] --
13,116,586 UART: [fwproc] Waiting for Commands...
13,118,942 UART: [fwproc] Received command 0x46574c44
13,121,169 UART: [fwproc] Received Image of size 113844 bytes
17,167,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,293 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,634,449 >>> mbox cmd response: success
17,634,982 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,639,226 UART: [afmc] ++
17,639,874 UART: [afmc] CDI.KEYID = 6
17,640,779 UART: [afmc] SUBJECT.KEYID = 7
17,641,991 UART: [afmc] AUTHORITY.KEYID = 5
21,008,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,413 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,808 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,667 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,094 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,226 UART: [afmc] --
23,377,585 UART: [cold-reset] --
23,381,060 UART: [state] Locking Datavault
23,384,707 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,433 UART: [state] Locking ICCM
23,388,826 UART: [exit] Launching FMC @ 0x40000130
23,397,211 UART:
23,397,441 UART: Running Caliptra FMC ...
23,398,462 UART:
23,398,604 UART: [state] CFI Enabled
23,469,784 UART: [fht] FMC Alias Private Key: 7
25,808,215 UART: [art] Extend RT PCRs Done
25,809,434 UART: [art] Lock RT PCRs Done
25,811,294 UART: [art] Populate DV Done
25,816,426 UART: [fht] FMC Alias Private Key: 7
25,818,062 UART: [art] Derive CDI
25,818,873 UART: [art] Store in in slot 0x4
25,878,668 UART: [art] Derive Key Pair
25,879,708 UART: [art] Store priv key in slot 0x5
29,172,608 UART: [art] Derive Key Pair - Done
29,185,444 UART: [art] Signing Cert with AUTHO
29,186,747 UART: RITY.KEYID = 7
31,474,897 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,404 UART: [art] PUB.X = 3D185B296F5970CCCE7BCE611F5BF38505718F1D816A8A172E587FBEC15494CDF8841FC59B6E3FDEA92C55AE5D9BCA11
31,483,681 UART: [art] PUB.Y = A0669A7913734881620B7268AD5E757729B8A534B3B67C3078D1677508434E11A434546A1485C9CFD577AD4BC1A7A682
31,490,902 UART: [art] SIG.R = 2DD10876403E7EA5172F14DA5ED9B3F629E8524C3355011B681D3A0DA4A3582B00CADB528D4BC6880E6ACA05649F5A64
31,498,260 UART: [art] SIG.S = FC87F3B7FE42FDFEABE78503C32B3FB686BA47645CD2FA564B7AC2E04FDD9551B437C8B5C9EEDB3E3B7381CADB22014F
32,803,116 UART: Caliptra RT
32,803,829 UART: [state] CFI Enabled
32,967,123 UART: [rt] RT listening for mailbox commands...
32,999,608 UART: [rt]cmd =0x53494756, len=196
33,004,454 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,803,559 ready_for_fw is high
3,803,966 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,873,235 >>> mbox cmd response: success
17,874,073 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,568,880 UART:
23,569,267 UART: Running Caliptra FMC ...
23,570,403 UART:
23,570,560 UART: [state] CFI Enabled
23,637,586 UART: [fht] FMC Alias Private Key: 7
25,975,173 UART: [art] Extend RT PCRs Done
25,976,395 UART: [art] Lock RT PCRs Done
25,978,339 UART: [art] Populate DV Done
25,983,718 UART: [fht] FMC Alias Private Key: 7
25,985,368 UART: [art] Derive CDI
25,986,177 UART: [art] Store in in slot 0x4
26,045,620 UART: [art] Derive Key Pair
26,046,660 UART: [art] Store priv key in slot 0x5
29,341,139 UART: [art] Derive Key Pair - Done
29,354,245 UART: [art] Signing Cert with AUTHO
29,355,551 UART: RITY.KEYID = 7
31,642,900 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,404 UART: [art] PUB.X = 0EDD11BAC29697D8ABAB3C128AC27162EF12D9989075C641B9F38F6F6D87FA0B4C61F4B8B5E6A9B7B1005F7C5534F783
31,651,660 UART: [art] PUB.Y = EC53ED6F22CACC5BF602C9C5946DF742E0634FDEA24D03221270A733CAEBEFFEC69286E4F2391C7500F3A2280F8CBC78
31,658,889 UART: [art] SIG.R = C7DE9CC3850D22E8302BF1F15C63FAE53A35151DD259E1027715D82BA4687871775524609601F909B6F1FE704B6B69D8
31,666,259 UART: [art] SIG.S = CC8030FCFDB10932E232B9D42A59B4380109C25BCD9E9B89985CEFDBECA3169D1FC125FCE7D1C2D915E815CA09FDCB39
32,971,471 UART: Caliptra RT
32,972,188 UART: [state] CFI Enabled
33,132,683 UART: [rt] RT listening for mailbox commands...
33,165,615 UART: [rt]cmd =0x53494756, len=196
33,170,219 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,540 UART:
192,913 UART: Running Caliptra ROM ...
194,071 UART:
603,609 UART: [state] CFI Enabled
618,719 UART: [state] LifecycleState = Unprovisioned
620,635 UART: [state] DebugLocked = No
622,591 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,380 UART: [kat] SHA2-256
797,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,664 UART: [kat] ++
808,139 UART: [kat] sha1
818,587 UART: [kat] SHA2-256
821,307 UART: [kat] SHA2-384
826,943 UART: [kat] SHA2-512-ACC
829,313 UART: [kat] ECC-384
3,113,385 UART: [kat] HMAC-384Kdf
3,123,643 UART: [kat] LMS
4,313,764 UART: [kat] --
4,317,773 UART: [cold-reset] ++
4,318,998 UART: [fht] Storing FHT @ 0x50003400
4,331,055 UART: [idev] ++
4,331,629 UART: [idev] CDI.KEYID = 6
4,332,544 UART: [idev] SUBJECT.KEYID = 7
4,333,786 UART: [idev] UDS.KEYID = 0
4,334,858 ready_for_fw is high
4,335,090 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,191 UART: [idev] Erasing UDS.KEYID = 0
7,621,312 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,338 UART: [idev] --
7,648,417 UART: [ldev] ++
7,649,042 UART: [ldev] CDI.KEYID = 6
7,650,147 UART: [ldev] SUBJECT.KEYID = 5
7,651,268 UART: [ldev] AUTHORITY.KEYID = 7
7,652,449 UART: [ldev] FE.KEYID = 1
7,664,823 UART: [ldev] Erasing FE.KEYID = 1
10,952,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,999 UART: [ldev] --
13,314,126 UART: [fwproc] Waiting for Commands...
13,315,893 UART: [fwproc] Received command 0x46574c44
13,318,128 UART: [fwproc] Received Image of size 113844 bytes
17,368,616 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,209 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,832,216 >>> mbox cmd response: success
17,832,759 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,836,563 UART: [afmc] ++
17,837,161 UART: [afmc] CDI.KEYID = 6
17,838,098 UART: [afmc] SUBJECT.KEYID = 7
17,839,324 UART: [afmc] AUTHORITY.KEYID = 5
21,149,039 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,190 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,438 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,816 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,665 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,141 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,091 UART: [afmc] --
23,512,480 UART: [cold-reset] --
23,517,745 UART: [state] Locking Datavault
23,524,949 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,725 UART: [state] Locking ICCM
23,527,796 UART: [exit] Launching FMC @ 0x40000130
23,536,192 UART:
23,536,429 UART: Running Caliptra FMC ...
23,537,536 UART:
23,537,696 UART: [state] CFI Enabled
23,545,537 UART: [fht] FMC Alias Private Key: 7
25,876,226 UART: [art] Extend RT PCRs Done
25,877,450 UART: [art] Lock RT PCRs Done
25,879,209 UART: [art] Populate DV Done
25,884,456 UART: [fht] FMC Alias Private Key: 7
25,885,938 UART: [art] Derive CDI
25,886,676 UART: [art] Store in in slot 0x4
25,928,838 UART: [art] Derive Key Pair
25,929,871 UART: [art] Store priv key in slot 0x5
29,172,017 UART: [art] Derive Key Pair - Done
29,185,353 UART: [art] Signing Cert with AUTHO
29,186,661 UART: RITY.KEYID = 7
31,465,857 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,358 UART: [art] PUB.X = 4F01268617D28B2AB880B9643CBCAC63E2EAE62989553C738718BC4A31499C5E43E3C3C77A4C8F12A96294F1005C09AF
31,474,613 UART: [art] PUB.Y = 9E480F32A4E994EB9875BE8B7AE10C47E0A5239DB6C72C09D1516783ED7E140238275E02EB28F9FB2361D9A84A991972
31,481,858 UART: [art] SIG.R = F4DDD85456169A601E04560C51CE6B2E15D2855FF717E27858EA66F16469BF3532EAE703C7BC2E3A9B7D41C8EEA96C6E
31,489,261 UART: [art] SIG.S = 38CD6DF07BDAD5E5E613BE546F997E2329EF9A36BCEE23DC0518198E98C781E2410D39AA0AEC107A14496F33EB96C831
32,795,192 UART: Caliptra RT
32,795,893 UART: [state] CFI Enabled
32,913,972 UART: [rt] RT listening for mailbox commands...
32,946,978 UART: [rt]cmd =0x53494756, len=196
32,951,066 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,129,975 ready_for_fw is high
4,130,493 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,045 >>> mbox cmd response: success
18,068,713 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,711,774 UART:
23,712,176 UART: Running Caliptra FMC ...
23,713,283 UART:
23,713,438 UART: [state] CFI Enabled
23,720,968 UART: [fht] FMC Alias Private Key: 7
26,051,929 UART: [art] Extend RT PCRs Done
26,053,163 UART: [art] Lock RT PCRs Done
26,054,835 UART: [art] Populate DV Done
26,060,253 UART: [fht] FMC Alias Private Key: 7
26,061,798 UART: [art] Derive CDI
26,062,538 UART: [art] Store in in slot 0x4
26,105,195 UART: [art] Derive Key Pair
26,106,240 UART: [art] Store priv key in slot 0x5
29,348,072 UART: [art] Derive Key Pair - Done
29,360,795 UART: [art] Signing Cert with AUTHO
29,362,104 UART: RITY.KEYID = 7
31,641,751 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,253 UART: [art] PUB.X = 34D120F2E7437F369516851E1AD37BBF0E85B92081FB6354AA41C1A8514D42A5E59E900B61F90C9506E6154A4618A60A
31,650,515 UART: [art] PUB.Y = 75690254ACAD44D4D44B101A480E42571847103D34FF2D84861076C56FAF0CB28E1DCD6D661A63A39FE4747500F81BA9
31,657,708 UART: [art] SIG.R = 708B6EA90D50C332BC67FE6315B1E8B8F3076F199D7717C1560A19DCD2E8C652A4C8314253714B918F461AABCA14D9C1
31,665,104 UART: [art] SIG.S = 69EA8F4B66B0B215AD2B98DDF1A9E8940A0C09298B475FDD88FE06A886D5EFF1DAA42DE3E54ADF7663AB01E54BD50018
32,970,710 UART: Caliptra RT
32,971,424 UART: [state] CFI Enabled
33,089,784 UART: [rt] RT listening for mailbox commands...
33,122,595 UART: [rt]cmd =0x53494756, len=196
33,127,439 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,031 UART:
192,403 UART: Running Caliptra ROM ...
193,555 UART:
193,706 UART: [state] CFI Enabled
265,246 UART: [state] LifecycleState = Unprovisioned
267,090 UART: [state] DebugLocked = No
269,982 UART: [state] WD Timer not started. Device not locked for debugging
273,036 UART: [kat] SHA2-256
452,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,683 UART: [kat] ++
464,222 UART: [kat] sha1
475,744 UART: [kat] SHA2-256
478,760 UART: [kat] SHA2-384
485,549 UART: [kat] SHA2-512-ACC
488,490 UART: [kat] ECC-384
2,947,693 UART: [kat] HMAC-384Kdf
2,972,439 UART: [kat] LMS
3,501,878 UART: [kat] --
3,508,316 UART: [cold-reset] ++
3,509,330 UART: [fht] FHT @ 0x50003400
3,520,733 UART: [idev] ++
3,521,304 UART: [idev] CDI.KEYID = 6
3,522,214 UART: [idev] SUBJECT.KEYID = 7
3,523,388 UART: [idev] UDS.KEYID = 0
3,524,314 ready_for_fw is high
3,524,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,064 UART: [idev] Erasing UDS.KEYID = 0
6,030,996 UART: [idev] Sha1 KeyId Algorithm
6,054,764 UART: [idev] --
6,058,081 UART: [ldev] ++
6,058,662 UART: [ldev] CDI.KEYID = 6
6,059,576 UART: [ldev] SUBJECT.KEYID = 5
6,060,736 UART: [ldev] AUTHORITY.KEYID = 7
6,061,969 UART: [ldev] FE.KEYID = 1
6,101,187 UART: [ldev] Erasing FE.KEYID = 1
8,607,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,124 UART: [ldev] --
10,412,035 UART: [fwproc] Wait for Commands...
10,414,778 UART: [fwproc] Recv command 0x46574c44
10,416,864 UART: [fwproc] Recv'd Img size: 114168 bytes
13,818,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,826 >>> mbox cmd response: success
14,282,357 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,285,523 UART: [afmc] ++
14,286,118 UART: [afmc] CDI.KEYID = 6
14,287,028 UART: [afmc] SUBJECT.KEYID = 7
14,288,189 UART: [afmc] AUTHORITY.KEYID = 5
16,829,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,780 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,834 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,469 UART: [afmc] --
18,627,413 UART: [cold-reset] --
18,631,722 UART: [state] Locking Datavault
18,639,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,054 UART: [state] Locking ICCM
18,642,479 UART: [exit] Launching FMC @ 0x40000130
18,650,923 UART:
18,651,157 UART: Running Caliptra FMC ...
18,652,255 UART:
18,652,411 UART: [state] CFI Enabled
18,710,447 UART: [fht] FMC Alias Private Key: 7
20,474,037 UART: [art] Extend RT PCRs Done
20,475,263 UART: [art] Lock RT PCRs Done
20,477,131 UART: [art] Populate DV Done
20,482,488 UART: [fht] FMC Alias Private Key: 7
20,484,031 UART: [art] Derive CDI
20,484,797 UART: [art] Store in in slot 0x4
20,542,732 UART: [art] Derive Key Pair
20,543,790 UART: [art] Store priv key in slot 0x5
23,007,265 UART: [art] Derive Key Pair - Done
23,020,670 UART: [art] Signing Cert with AUTHO
23,021,978 UART: RITY.KEYID = 7
24,733,056 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,561 UART: [art] PUB.X = 4D5D694B3319A9E773027FC9D89B0F94B8B62D8D6586EBA13C40484A17899B983A858C8DC88AEA37EEC31062B6128B94
24,741,835 UART: [art] PUB.Y = 6D2C05DF299E9686985C29FC84F3802A92C76693A872B342AC4F151411ECC373055E396D8F66272F90177D6E4B196D1E
24,749,058 UART: [art] SIG.R = E0A17BB495F0360C4F359410D0F57B3636E313478BA4FA1CD612F2EB17C422C38178A7348D3F7470A7771284FBF3D24A
24,756,429 UART: [art] SIG.S = 7675B7479B92BB6CD5573A2C0F826F37863EE3BEA51571F594374ED6639295DF91DC639D9E2B1CFB28486D8C5283CEF2
25,735,747 UART: Caliptra RT
25,736,447 UART: [state] CFI Enabled
25,900,625 UART: [rt] RT listening for mailbox commands...
25,933,389 UART: [rt]cmd =0x53494756, len=196
25,937,939 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,361,968 ready_for_fw is high
3,362,590 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,038,950 >>> mbox cmd response: success
14,039,719 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,326,130 UART:
18,326,523 UART: Running Caliptra FMC ...
18,327,654 UART:
18,327,819 UART: [state] CFI Enabled
18,392,652 UART: [fht] FMC Alias Private Key: 7
20,156,951 UART: [art] Extend RT PCRs Done
20,158,174 UART: [art] Lock RT PCRs Done
20,159,748 UART: [art] Populate DV Done
20,165,209 UART: [fht] FMC Alias Private Key: 7
20,166,698 UART: [art] Derive CDI
20,167,460 UART: [art] Store in in slot 0x4
20,225,659 UART: [art] Derive Key Pair
20,226,660 UART: [art] Store priv key in slot 0x5
22,689,904 UART: [art] Derive Key Pair - Done
22,703,014 UART: [art] Signing Cert with AUTHO
22,704,318 UART: RITY.KEYID = 7
24,415,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,067 UART: [art] PUB.X = 07476D8F0BDED9BCDBDC54B1513AED96E0E5056C8C7180BB242210C65CE8ABC5B8FA068C4152C0A8818E333EB0D0ABFD
24,424,365 UART: [art] PUB.Y = 3763D854889835CE161D9E8F02BF57E3DEC30059CCADCF7176448702D5E5F668BE9AC990B3994B7AA6816DDC2B634995
24,431,617 UART: [art] SIG.R = 3E685AAEC7C9149520ABA9CDFBE52A82EC1C6C6294E0DAC92289E0C1CEF5603625FC40DB95221F91CCA7F709C80AAA6C
24,439,027 UART: [art] SIG.S = A669684AC1141AC6B7FC3EDC29FCB20AE296B95E7779FC22998B65545674F1039A1275E5C6AF2E0C46F6C6AA0053A08E
25,417,691 UART: Caliptra RT
25,418,412 UART: [state] CFI Enabled
25,583,921 UART: [rt] RT listening for mailbox commands...
25,616,736 UART: [rt]cmd =0x53494756, len=196
25,621,254 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
193,055 UART:
193,435 UART: Running Caliptra ROM ...
194,579 UART:
604,051 UART: [state] CFI Enabled
616,441 UART: [state] LifecycleState = Unprovisioned
618,304 UART: [state] DebugLocked = No
620,471 UART: [state] WD Timer not started. Device not locked for debugging
624,890 UART: [kat] SHA2-256
804,017 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,566 UART: [kat] ++
816,108 UART: [kat] sha1
827,739 UART: [kat] SHA2-256
830,794 UART: [kat] SHA2-384
836,437 UART: [kat] SHA2-512-ACC
839,373 UART: [kat] ECC-384
3,282,711 UART: [kat] HMAC-384Kdf
3,294,026 UART: [kat] LMS
3,823,493 UART: [kat] --
3,828,869 UART: [cold-reset] ++
3,830,159 UART: [fht] FHT @ 0x50003400
3,840,876 UART: [idev] ++
3,841,437 UART: [idev] CDI.KEYID = 6
3,842,396 UART: [idev] SUBJECT.KEYID = 7
3,843,584 UART: [idev] UDS.KEYID = 0
3,844,489 ready_for_fw is high
3,844,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,158 UART: [idev] Erasing UDS.KEYID = 0
6,317,041 UART: [idev] Sha1 KeyId Algorithm
6,339,427 UART: [idev] --
6,343,852 UART: [ldev] ++
6,344,429 UART: [ldev] CDI.KEYID = 6
6,345,342 UART: [ldev] SUBJECT.KEYID = 5
6,346,655 UART: [ldev] AUTHORITY.KEYID = 7
6,347,787 UART: [ldev] FE.KEYID = 1
6,357,866 UART: [ldev] Erasing FE.KEYID = 1
8,830,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,979 UART: [ldev] --
10,619,297 UART: [fwproc] Wait for Commands...
10,621,722 UART: [fwproc] Recv command 0x46574c44
10,623,812 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,635 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,491,448 >>> mbox cmd response: success
14,491,989 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,496,356 UART: [afmc] ++
14,496,942 UART: [afmc] CDI.KEYID = 6
14,497,852 UART: [afmc] SUBJECT.KEYID = 7
14,499,013 UART: [afmc] AUTHORITY.KEYID = 5
16,994,327 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,054 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,949 UART: [afmc] --
18,792,895 UART: [cold-reset] --
18,797,619 UART: [state] Locking Datavault
18,802,387 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,029 UART: [state] Locking ICCM
18,806,506 UART: [exit] Launching FMC @ 0x40000130
18,814,899 UART:
18,815,135 UART: Running Caliptra FMC ...
18,816,231 UART:
18,816,394 UART: [state] CFI Enabled
18,824,358 UART: [fht] FMC Alias Private Key: 7
20,580,380 UART: [art] Extend RT PCRs Done
20,581,622 UART: [art] Lock RT PCRs Done
20,582,895 UART: [art] Populate DV Done
20,587,989 UART: [fht] FMC Alias Private Key: 7
20,589,511 UART: [art] Derive CDI
20,590,249 UART: [art] Store in in slot 0x4
20,633,275 UART: [art] Derive Key Pair
20,634,273 UART: [art] Store priv key in slot 0x5
23,061,209 UART: [art] Derive Key Pair - Done
23,074,317 UART: [art] Signing Cert with AUTHO
23,075,646 UART: RITY.KEYID = 7
24,781,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,665 UART: [art] PUB.X = 319ED590B95C4614003034AF6010D246CE5AF67CEA892B174AEFACF5AD2B6FF527285BD5EEC3CE3C69EB3078B524D486
24,789,919 UART: [art] PUB.Y = D2BB8693955D97DF24B37112EB4B43D6A8B3406645FCC261135EA129B7C1AAF3D525DD3422744720BECBAB69064F8583
24,797,161 UART: [art] SIG.R = 4D444A64621EF4F8BBB97BCF06997C7F476E19E7181228E9BEF386968AD6B06DD903C7CB4FA45373CE505D884ACC8355
24,804,562 UART: [art] SIG.S = 613E889DE9FF0D8CD6F027AF0790F3EAEA7F0A5CB363533932DF50DAC2B4CCF2773451895FB53C32E319F450BE7FFE80
25,783,643 UART: Caliptra RT
25,784,377 UART: [state] CFI Enabled
25,900,871 UART: [rt] RT listening for mailbox commands...
25,933,423 UART: [rt]cmd =0x53494756, len=196
25,938,188 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,817 writing to cptra_bootfsm_go
3,699,911 ready_for_fw is high
3,700,500 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,284,624 >>> mbox cmd response: success
14,285,303 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,538,971 UART:
18,539,362 UART: Running Caliptra FMC ...
18,540,471 UART:
18,540,626 UART: [state] CFI Enabled
18,548,637 UART: [fht] FMC Alias Private Key: 7
20,305,814 UART: [art] Extend RT PCRs Done
20,307,047 UART: [art] Lock RT PCRs Done
20,308,925 UART: [art] Populate DV Done
20,314,284 UART: [fht] FMC Alias Private Key: 7
20,315,982 UART: [art] Derive CDI
20,316,719 UART: [art] Store in in slot 0x4
20,359,480 UART: [art] Derive Key Pair
20,360,524 UART: [art] Store priv key in slot 0x5
22,787,063 UART: [art] Derive Key Pair - Done
22,800,017 UART: [art] Signing Cert with AUTHO
22,801,328 UART: RITY.KEYID = 7
24,506,492 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,994 UART: [art] PUB.X = 59F3511FEDC3F459E4A6457434245B4C606930F05E65C06CD7322B405344A9547EDB45F519B4A858D3160E9F0198B012
24,515,258 UART: [art] PUB.Y = 7A9822760FC57E45DDCB26FFBD4D69E69199FF8C0C299B5E7A7EDCE9ED04E6691F4DDB557EDBDF47A37AD9C533BE8676
24,522,563 UART: [art] SIG.R = DDF5C16B8CA245501FE2787771CE5FE24749543AB268846F47564E6237E73BDF48FF5AC75824F2D487D64F2C8822A1BE
24,529,921 UART: [art] SIG.S = 7C7BDA0288D9FD2F2C5FC0E7E6D550930A5A7E8CCA1A36AFE429DD286A889E35DB964065A3C44FCFB52398ED4902AF96
25,508,568 UART: Caliptra RT
25,509,284 UART: [state] CFI Enabled
25,625,752 UART: [rt] RT listening for mailbox commands...
25,658,071 UART: [rt]cmd =0x53494756, len=196
25,662,644 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,023 UART:
192,412 UART: Running Caliptra ROM ...
193,571 UART:
193,724 UART: [state] CFI Enabled
263,649 UART: [state] LifecycleState = Unprovisioned
266,086 UART: [state] DebugLocked = No
267,636 UART: [state] WD Timer not started. Device not locked for debugging
272,696 UART: [kat] SHA2-256
462,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,351 UART: [kat] ++
473,839 UART: [kat] sha1
486,634 UART: [kat] SHA2-256
489,667 UART: [kat] SHA2-384
496,228 UART: [kat] SHA2-512-ACC
498,811 UART: [kat] ECC-384
2,947,612 UART: [kat] HMAC-384Kdf
2,971,550 UART: [kat] LMS
3,503,309 UART: [kat] --
3,507,821 UART: [cold-reset] ++
3,510,118 UART: [fht] FHT @ 0x50003400
3,520,825 UART: [idev] ++
3,521,463 UART: [idev] CDI.KEYID = 6
3,522,444 UART: [idev] SUBJECT.KEYID = 7
3,523,622 UART: [idev] UDS.KEYID = 0
3,524,555 ready_for_fw is high
3,524,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,450 UART: [idev] Erasing UDS.KEYID = 0
6,028,390 UART: [idev] Sha1 KeyId Algorithm
6,050,280 UART: [idev] --
6,055,121 UART: [ldev] ++
6,055,872 UART: [ldev] CDI.KEYID = 6
6,056,786 UART: [ldev] SUBJECT.KEYID = 5
6,057,946 UART: [ldev] AUTHORITY.KEYID = 7
6,059,128 UART: [ldev] FE.KEYID = 1
6,100,565 UART: [ldev] Erasing FE.KEYID = 1
8,607,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,062 UART: [ldev] --
10,413,931 UART: [fwproc] Wait for Commands...
10,415,547 UART: [fwproc] Recv command 0x46574c44
10,417,856 UART: [fwproc] Recv'd Img size: 114168 bytes
13,855,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,046,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,587,803 >>> mbox cmd response: success
14,588,360 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,592,119 UART: [afmc] ++
14,592,811 UART: [afmc] CDI.KEYID = 6
14,594,059 UART: [afmc] SUBJECT.KEYID = 7
14,595,503 UART: [afmc] AUTHORITY.KEYID = 5
17,127,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,148 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,130 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,680 UART: [afmc] --
18,947,529 UART: [cold-reset] --
18,950,972 UART: [state] Locking Datavault
18,956,988 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,183 UART: [state] Locking ICCM
18,961,123 UART: [exit] Launching FMC @ 0x40000130
18,969,754 UART:
18,969,990 UART: Running Caliptra FMC ...
18,971,087 UART:
18,971,256 UART: [state] CFI Enabled
19,028,797 UART: [fht] FMC Alias Private Key: 7
20,792,580 UART: [art] Extend RT PCRs Done
20,793,791 UART: [art] Lock RT PCRs Done
20,795,524 UART: [art] Populate DV Done
20,800,722 UART: [fht] FMC Alias Private Key: 7
20,802,472 UART: [art] Derive CDI
20,803,295 UART: [art] Store in in slot 0x4
20,861,285 UART: [art] Derive Key Pair
20,862,329 UART: [art] Store priv key in slot 0x5
23,324,990 UART: [art] Derive Key Pair - Done
23,337,716 UART: [art] Signing Cert with AUTHO
23,339,050 UART: RITY.KEYID = 7
25,050,764 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,260 UART: [art] PUB.X = 778A7DCE856697745AA03A06F9FEF46EDF2B747FAE90A61BEB395498DBA32B08E1E56C074C305D354FDD315280FEBCE7
25,059,591 UART: [art] PUB.Y = 48E2D51F83387169037225E2F01E5A3B88BE68422564274DE45FEBF9E5B45DFF218CF45458AC436FB2EB711FDA751D79
25,066,854 UART: [art] SIG.R = E9C687DE79CDE3D186FBF42271778011857EAFC298FB5609561D89AE254432CF64C3C556B88BDE705BF62C027E69CB1B
25,074,216 UART: [art] SIG.S = F118586D26AF6CF80ED41F445A7CC07116B23FAB27AE85C4D319BE264ECA0FFECF7CA6A224F0B083720E004111A52ADA
26,053,718 UART: Caliptra RT
26,054,433 UART: [state] CFI Enabled
26,218,230 UART: [rt] RT listening for mailbox commands...
26,250,619 UART: [rt]cmd =0x53494756, len=196
26,255,111 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,438,509 ready_for_fw is high
3,439,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,720,188 >>> mbox cmd response: success
14,720,828 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,012,890 UART:
19,013,301 UART: Running Caliptra FMC ...
19,014,521 UART:
19,014,699 UART: [state] CFI Enabled
19,085,254 UART: [fht] FMC Alias Private Key: 7
20,848,887 UART: [art] Extend RT PCRs Done
20,850,100 UART: [art] Lock RT PCRs Done
20,851,642 UART: [art] Populate DV Done
20,857,425 UART: [fht] FMC Alias Private Key: 7
20,858,973 UART: [art] Derive CDI
20,859,707 UART: [art] Store in in slot 0x4
20,917,967 UART: [art] Derive Key Pair
20,919,007 UART: [art] Store priv key in slot 0x5
23,381,596 UART: [art] Derive Key Pair - Done
23,394,436 UART: [art] Signing Cert with AUTHO
23,395,753 UART: RITY.KEYID = 7
25,108,098 UART: [art] Erasing AUTHORITY.KEYID = 7
25,109,613 UART: [art] PUB.X = BBDB64D066504C8B4038A933585BEBBF0C1DF3780F3F5C77EF525BB26DD5DE8C9D780FFD22A01CBFCB832C0E78ED4606
25,116,918 UART: [art] PUB.Y = 260F3383A53693D85B1D8C7A17AFDAC556331181B602B8401345461081ACC9471007D689244BAE321012E95A7651265E
25,124,146 UART: [art] SIG.R = 73CF1C52C4F67159639BD9F446A14D794818166E0DF385A2D30247E8D6BBC0DA6E504151CD35A8BB8ADAE5B0456B6781
25,131,526 UART: [art] SIG.S = 8A09C71F0645056BC85FE87DEF25B04EC6778A3B4CEAFFBA70F7FE56DF5A27221BDD419D19F57DBF6D5C68C0B72EF9E7
26,110,675 UART: Caliptra RT
26,111,388 UART: [state] CFI Enabled
26,276,206 UART: [rt] RT listening for mailbox commands...
26,308,864 UART: [rt]cmd =0x53494756, len=196
26,313,302 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,718 writing to cptra_bootfsm_go
192,983 UART:
193,355 UART: Running Caliptra ROM ...
194,567 UART:
604,231 UART: [state] CFI Enabled
614,342 UART: [state] LifecycleState = Unprovisioned
616,719 UART: [state] DebugLocked = No
617,966 UART: [state] WD Timer not started. Device not locked for debugging
622,646 UART: [kat] SHA2-256
812,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,329 UART: [kat] ++
823,812 UART: [kat] sha1
836,180 UART: [kat] SHA2-256
839,202 UART: [kat] SHA2-384
846,825 UART: [kat] SHA2-512-ACC
849,410 UART: [kat] ECC-384
3,292,596 UART: [kat] HMAC-384Kdf
3,306,400 UART: [kat] LMS
3,838,218 UART: [kat] --
3,842,638 UART: [cold-reset] ++
3,844,423 UART: [fht] FHT @ 0x50003400
3,855,612 UART: [idev] ++
3,856,320 UART: [idev] CDI.KEYID = 6
3,857,272 UART: [idev] SUBJECT.KEYID = 7
3,858,443 UART: [idev] UDS.KEYID = 0
3,859,350 ready_for_fw is high
3,859,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,915 UART: [idev] Erasing UDS.KEYID = 0
6,335,062 UART: [idev] Sha1 KeyId Algorithm
6,357,780 UART: [idev] --
6,363,018 UART: [ldev] ++
6,363,708 UART: [ldev] CDI.KEYID = 6
6,364,625 UART: [ldev] SUBJECT.KEYID = 5
6,365,788 UART: [ldev] AUTHORITY.KEYID = 7
6,367,019 UART: [ldev] FE.KEYID = 1
6,379,070 UART: [ldev] Erasing FE.KEYID = 1
8,855,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,171 UART: [ldev] --
10,646,262 UART: [fwproc] Wait for Commands...
10,648,144 UART: [fwproc] Recv command 0x46574c44
10,650,397 UART: [fwproc] Recv'd Img size: 114168 bytes
14,098,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,833,625 >>> mbox cmd response: success
14,834,175 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,837,515 UART: [afmc] ++
14,838,207 UART: [afmc] CDI.KEYID = 6
14,839,392 UART: [afmc] SUBJECT.KEYID = 7
14,840,879 UART: [afmc] AUTHORITY.KEYID = 5
17,345,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,291 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,402 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,350 UART: [afmc] --
19,144,620 UART: [cold-reset] --
19,147,948 UART: [state] Locking Datavault
19,153,304 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,506 UART: [state] Locking ICCM
19,157,929 UART: [exit] Launching FMC @ 0x40000130
19,166,603 UART:
19,166,837 UART: Running Caliptra FMC ...
19,167,938 UART:
19,168,103 UART: [state] CFI Enabled
19,176,421 UART: [fht] FMC Alias Private Key: 7
20,933,413 UART: [art] Extend RT PCRs Done
20,934,631 UART: [art] Lock RT PCRs Done
20,935,876 UART: [art] Populate DV Done
20,941,191 UART: [fht] FMC Alias Private Key: 7
20,942,837 UART: [art] Derive CDI
20,943,658 UART: [art] Store in in slot 0x4
20,986,334 UART: [art] Derive Key Pair
20,987,374 UART: [art] Store priv key in slot 0x5
23,413,602 UART: [art] Derive Key Pair - Done
23,426,711 UART: [art] Signing Cert with AUTHO
23,428,013 UART: RITY.KEYID = 7
25,133,684 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,198 UART: [art] PUB.X = 656699BBC03FD96A1234963E27C20BE9BAAC02CC2C8DD5C7FBC974F971426A8BD3F33F131F004B6A96046D4D6B38AAD1
25,142,446 UART: [art] PUB.Y = D169B49C1A719460DC213AA7FC465F9C6538D82AD88EE52F1BE667E1EC6C1A14E6D75746C217718A6B0340B9112DE1AC
25,149,730 UART: [art] SIG.R = 0D6571A03D1683ACE846403B17BE91832646967DCFC02B2E03952800CCFE0FC0E5599FE224425F71398DD0B8F620FCFB
25,157,074 UART: [art] SIG.S = 84C50AAA33DBDAA6F539DBD813C445C6423D37A53B6D526ACF8DDCEC5744B1F9F973B252800D9F89F2BACD7E8826D25D
26,136,270 UART: Caliptra RT
26,136,983 UART: [state] CFI Enabled
26,254,707 UART: [rt] RT listening for mailbox commands...
26,287,801 UART: [rt]cmd =0x53494756, len=196
26,292,240 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,660 writing to cptra_bootfsm_go
3,758,025 ready_for_fw is high
3,758,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,968,376 >>> mbox cmd response: success
14,969,086 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,220,636 UART:
19,221,028 UART: Running Caliptra FMC ...
19,222,132 UART:
19,222,286 UART: [state] CFI Enabled
19,230,190 UART: [fht] FMC Alias Private Key: 7
20,987,822 UART: [art] Extend RT PCRs Done
20,989,034 UART: [art] Lock RT PCRs Done
20,990,365 UART: [art] Populate DV Done
20,995,675 UART: [fht] FMC Alias Private Key: 7
20,997,328 UART: [art] Derive CDI
20,998,142 UART: [art] Store in in slot 0x4
21,040,579 UART: [art] Derive Key Pair
21,041,617 UART: [art] Store priv key in slot 0x5
23,468,379 UART: [art] Derive Key Pair - Done
23,481,971 UART: [art] Signing Cert with AUTHO
23,483,290 UART: RITY.KEYID = 7
25,189,031 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,533 UART: [art] PUB.X = 731FBB4A655F76A02B1B37F9D532A00F4854FB138D802C8881A8716AAA829E11F52DBD747CE78132C0AAC70BE822F94E
25,197,832 UART: [art] PUB.Y = DC62B20654C12A851B06E8D04B49E664C393EC2862016B2F6DBCEC45FB45755DFEAB575A8E4E397AAE9F5A4F617808AD
25,205,098 UART: [art] SIG.R = 7C0D425D97EE426D53EFCEB9556C430435CF5BA56FDD48F4A5BD4719EA552F38D85274A2E2A6057052E9C9D1A19D6A16
25,212,508 UART: [art] SIG.S = 4A250AE7CA61C0EDD41E88EF291C8DC99CBC7FA0C8C78A013F64DE73DB6F9D51C3AE27DC7459D83B33A51E94DE7C1701
26,190,983 UART: Caliptra RT
26,191,698 UART: [state] CFI Enabled
26,309,083 UART: [rt] RT listening for mailbox commands...
26,341,991 UART: [rt]cmd =0x53494756, len=196
26,346,133 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,340 UART:
192,701 UART: Running Caliptra ROM ...
193,792 UART:
193,929 UART: [state] CFI Enabled
261,970 UART: [state] LifecycleState = Unprovisioned
263,885 UART: [state] DebugLocked = No
265,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,400 UART: [kat] SHA2-256
440,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,565 UART: [kat] ++
451,164 UART: [kat] sha1
462,679 UART: [kat] SHA2-256
465,363 UART: [kat] SHA2-384
470,607 UART: [kat] SHA2-512-ACC
472,997 UART: [kat] ECC-384
2,766,488 UART: [kat] HMAC-384Kdf
2,797,920 UART: [kat] LMS
3,988,273 UART: [kat] --
3,990,821 UART: [cold-reset] ++
3,992,178 UART: [fht] Storing FHT @ 0x50003400
4,003,439 UART: [idev] ++
4,004,010 UART: [idev] CDI.KEYID = 6
4,004,967 UART: [idev] SUBJECT.KEYID = 7
4,006,204 UART: [idev] UDS.KEYID = 0
4,007,180 ready_for_fw is high
4,007,402 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,150,663 UART: [idev] Erasing UDS.KEYID = 0
7,341,580 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,519 UART: [idev] --
7,366,276 UART: [ldev] ++
7,366,926 UART: [ldev] CDI.KEYID = 6
7,367,849 UART: [ldev] SUBJECT.KEYID = 5
7,369,054 UART: [ldev] AUTHORITY.KEYID = 7
7,370,280 UART: [ldev] FE.KEYID = 1
7,397,660 UART: [ldev] Erasing FE.KEYID = 1
10,728,205 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,593 UART: [ldev] --
13,090,584 UART: [fwproc] Waiting for Commands...
13,092,182 UART: [fwproc] Received command 0x46574c44
13,094,359 UART: [fwproc] Received Image of size 113844 bytes
17,143,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,220,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,289,720 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,606,160 >>> mbox cmd response: success
17,606,681 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,611,182 UART: [afmc] ++
17,611,776 UART: [afmc] CDI.KEYID = 6
17,612,655 UART: [afmc] SUBJECT.KEYID = 7
17,613,921 UART: [afmc] AUTHORITY.KEYID = 5
20,972,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,271,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,273,492 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,287,929 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,302,728 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,317,180 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,339,567 UART: [afmc] --
23,343,481 UART: [cold-reset] --
23,348,472 UART: [state] Locking Datavault
23,353,396 UART: [state] Locking PCR0, PCR1 and PCR31
23,355,101 UART: [state] Locking ICCM
23,357,921 UART: [exit] Launching FMC @ 0x40000130
23,366,306 UART:
23,366,536 UART: Running Caliptra FMC ...
23,367,627 UART:
23,367,777 UART: [state] CFI Enabled
23,432,205 UART: [fht] FMC Alias Private Key: 7
25,770,299 UART: [art] Extend RT PCRs Done
25,771,513 UART: [art] Lock RT PCRs Done
25,773,429 UART: [art] Populate DV Done
25,779,046 UART: [fht] FMC Alias Private Key: 7
25,780,633 UART: [art] Derive CDI
25,781,363 UART: [art] Store in in slot 0x4
25,841,929 UART: [art] Derive Key Pair
25,842,966 UART: [art] Store priv key in slot 0x5
29,135,705 UART: [art] Derive Key Pair - Done
29,148,589 UART: [art] Signing Cert with AUTHO
29,149,896 UART: RITY.KEYID = 7
31,437,906 UART: [art] Erasing AUTHORITY.KEYID = 7
31,439,407 UART: [art] PUB.X = 5CD57318A895B98888D7E8CD34576DD58AFA2B78FC9DB9392A510712703A1FF4AA4E72AE0304F9B0BD845A83A5B6293A
31,446,635 UART: [art] PUB.Y = 3F1EA32D209F9DB90B1A8187AF18D81E0625B6D697F05EC26EC924EB6EFDF2873AEE7F6D8113439E934F2D53E6974A82
31,453,889 UART: [art] SIG.R = AA09CF5D069CEA343583B86462DB8C9B639B70CE1E387559E07527009D5064EB6D36E95AC09C368A367A868CFBCC7C10
31,461,284 UART: [art] SIG.S = 0F6CB7CBD9F1A8E60ADF5FCB8D6D6ADD9125CED99D1AF99A64B008E2AB67688E898170FA6972B3A304FB5307E3B10CC6
32,766,506 UART: Caliptra RT
32,767,210 UART: [state] CFI Enabled
32,927,706 UART: [rt] RT listening for mailbox commands...
32,942,845 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,804,825 ready_for_fw is high
3,805,234 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,835,289 >>> mbox cmd response: success
17,835,911 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,518,794 UART:
23,519,201 UART: Running Caliptra FMC ...
23,520,394 UART:
23,520,578 UART: [state] CFI Enabled
23,590,092 UART: [fht] FMC Alias Private Key: 7
25,927,519 UART: [art] Extend RT PCRs Done
25,928,747 UART: [art] Lock RT PCRs Done
25,930,275 UART: [art] Populate DV Done
25,935,629 UART: [fht] FMC Alias Private Key: 7
25,937,216 UART: [art] Derive CDI
25,938,020 UART: [art] Store in in slot 0x4
25,997,872 UART: [art] Derive Key Pair
25,998,909 UART: [art] Store priv key in slot 0x5
29,291,639 UART: [art] Derive Key Pair - Done
29,304,793 UART: [art] Signing Cert with AUTHO
29,306,092 UART: RITY.KEYID = 7
31,594,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,595,820 UART: [art] PUB.X = F7341C237D5A07BF852817488BD25C2D843133533572BC28A3EA4F500C6438746BAF8C78E91C0C6F80473C91AADDA3DA
31,603,078 UART: [art] PUB.Y = E923B6F5C20111F6D621D0485CC160A6A3B14445169989E4AB527A6BC41D9F18501ACAE5B6AB438BFEE07AD7EF367DD1
31,610,361 UART: [art] SIG.R = 07EE0F7BA68CB279EAE292AADB3E5AF5BC612AE6C807C1650BB42DE3957324A6832A1AFD15126FAB7C64A47E10321499
31,617,747 UART: [art] SIG.S = 691F89CF36233CC8C886EAB03F36C59330F472BEE0ACF3CB41BA79ACAC275D339E896517970A2A796B2ECCBFE3F56AA3
32,923,121 UART: Caliptra RT
32,923,820 UART: [state] CFI Enabled
33,084,401 UART: [rt] RT listening for mailbox commands...
33,099,504 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,520 UART:
192,885 UART: Running Caliptra ROM ...
194,069 UART:
603,721 UART: [state] CFI Enabled
617,692 UART: [state] LifecycleState = Unprovisioned
619,653 UART: [state] DebugLocked = No
621,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,068 UART: [kat] SHA2-256
795,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,324 UART: [kat] ++
806,927 UART: [kat] sha1
819,251 UART: [kat] SHA2-256
821,939 UART: [kat] SHA2-384
828,222 UART: [kat] SHA2-512-ACC
830,529 UART: [kat] ECC-384
3,115,674 UART: [kat] HMAC-384Kdf
3,127,685 UART: [kat] LMS
4,317,795 UART: [kat] --
4,321,016 UART: [cold-reset] ++
4,322,598 UART: [fht] Storing FHT @ 0x50003400
4,332,872 UART: [idev] ++
4,333,436 UART: [idev] CDI.KEYID = 6
4,334,445 UART: [idev] SUBJECT.KEYID = 7
4,335,627 UART: [idev] UDS.KEYID = 0
4,336,614 ready_for_fw is high
4,336,814 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,213 UART: [idev] Erasing UDS.KEYID = 0
7,625,620 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,961 UART: [idev] --
7,651,576 UART: [ldev] ++
7,652,142 UART: [ldev] CDI.KEYID = 6
7,653,078 UART: [ldev] SUBJECT.KEYID = 5
7,654,304 UART: [ldev] AUTHORITY.KEYID = 7
7,655,598 UART: [ldev] FE.KEYID = 1
7,667,028 UART: [ldev] Erasing FE.KEYID = 1
10,954,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,905 UART: [ldev] --
13,315,152 UART: [fwproc] Waiting for Commands...
13,318,003 UART: [fwproc] Received command 0x46574c44
13,320,243 UART: [fwproc] Received Image of size 113844 bytes
17,372,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,834,765 >>> mbox cmd response: success
17,835,290 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,839,113 UART: [afmc] ++
17,839,691 UART: [afmc] CDI.KEYID = 6
17,840,659 UART: [afmc] SUBJECT.KEYID = 7
17,841,874 UART: [afmc] AUTHORITY.KEYID = 5
21,160,174 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,951 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,370 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,614 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,432 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,865 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,217 UART: [afmc] --
23,526,647 UART: [cold-reset] --
23,531,208 UART: [state] Locking Datavault
23,535,747 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,516 UART: [state] Locking ICCM
23,539,198 UART: [exit] Launching FMC @ 0x40000130
23,547,556 UART:
23,547,797 UART: Running Caliptra FMC ...
23,548,900 UART:
23,549,060 UART: [state] CFI Enabled
23,557,109 UART: [fht] FMC Alias Private Key: 7
25,888,227 UART: [art] Extend RT PCRs Done
25,889,448 UART: [art] Lock RT PCRs Done
25,891,096 UART: [art] Populate DV Done
25,896,241 UART: [fht] FMC Alias Private Key: 7
25,897,726 UART: [art] Derive CDI
25,898,459 UART: [art] Store in in slot 0x4
25,941,003 UART: [art] Derive Key Pair
25,942,049 UART: [art] Store priv key in slot 0x5
29,184,533 UART: [art] Derive Key Pair - Done
29,197,371 UART: [art] Signing Cert with AUTHO
29,198,678 UART: RITY.KEYID = 7
31,478,263 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,772 UART: [art] PUB.X = 948751BE09CF535A323C748EF382FACC337EBA877EDDEDB7E858DD59B72FE2931019ACC76925E612491558EB89415E7B
31,486,985 UART: [art] PUB.Y = A2867586C547B4AD2A0F6190C74981A94DB354F808F175DA5784E78829D9B4D1C74D0AFBCA9D4430F5F08B1E6C0C8F12
31,494,234 UART: [art] SIG.R = 205EA327185B362267634A1A619D58F91756E5D2151B27F3BEABB6FB999B61FE490E48464B3727878141D2A7EBA25498
31,501,632 UART: [art] SIG.S = 0428CADE127E782A5C0276FF6F8D3E9D10BA75804D53DF49358CACF9DBDD56F4B505C2F3E1DFCA249A6C4C3AD9B95919
32,806,622 UART: Caliptra RT
32,807,331 UART: [state] CFI Enabled
32,924,793 UART: [rt] RT listening for mailbox commands...
32,939,720 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
4,128,510 ready_for_fw is high
4,128,886 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,067,814 >>> mbox cmd response: success
18,068,429 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,709,898 UART:
23,710,279 UART: Running Caliptra FMC ...
23,711,387 UART:
23,711,543 UART: [state] CFI Enabled
23,719,545 UART: [fht] FMC Alias Private Key: 7
26,050,941 UART: [art] Extend RT PCRs Done
26,052,161 UART: [art] Lock RT PCRs Done
26,054,033 UART: [art] Populate DV Done
26,059,564 UART: [fht] FMC Alias Private Key: 7
26,061,227 UART: [art] Derive CDI
26,061,969 UART: [art] Store in in slot 0x4
26,104,782 UART: [art] Derive Key Pair
26,105,840 UART: [art] Store priv key in slot 0x5
29,348,182 UART: [art] Derive Key Pair - Done
29,361,276 UART: [art] Signing Cert with AUTHO
29,362,604 UART: RITY.KEYID = 7
31,642,242 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,757 UART: [art] PUB.X = 3CCAB112BF0A4DEDC3CAFAB58BB8924845EB2759E0EB8E01AD060E1D3E8CB8EE619168C08FFAAE8BA032C916938C6FD7
31,651,007 UART: [art] PUB.Y = 132AE1FC3E1F7DC95DCA493B86D24F6A5C2F843EB10FDC2B25B621E3732871EAD30D375F71C2397564E22720449A270B
31,658,262 UART: [art] SIG.R = E67A2FA627FB8E756A881A94AF837D4588BED832ADFDF3C176CF3D549DE4221E891C71840DCF60B4CE272FA2EA3BCACE
31,665,657 UART: [art] SIG.S = 1BCB6BC13390B5A37D5938287BB48BDDDBA2C4E28610DF27F5F9FCB2B9405228B44E4B697313A249E05F0A714CD4C8B0
32,970,920 UART: Caliptra RT
32,971,627 UART: [state] CFI Enabled
33,089,392 UART: [rt] RT listening for mailbox commands...
33,104,643 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,336 UART:
192,707 UART: Running Caliptra ROM ...
193,896 UART:
194,047 UART: [state] CFI Enabled
261,878 UART: [state] LifecycleState = Unprovisioned
263,781 UART: [state] DebugLocked = No
265,455 UART: [state] WD Timer not started. Device not locked for debugging
269,211 UART: [kat] SHA2-256
448,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,909 UART: [kat] ++
460,451 UART: [kat] sha1
471,918 UART: [kat] SHA2-256
474,920 UART: [kat] SHA2-384
481,260 UART: [kat] SHA2-512-ACC
484,193 UART: [kat] ECC-384
2,959,500 UART: [kat] HMAC-384Kdf
2,982,949 UART: [kat] LMS
3,512,358 UART: [kat] --
3,516,569 UART: [cold-reset] ++
3,518,285 UART: [fht] FHT @ 0x50003400
3,529,681 UART: [idev] ++
3,530,241 UART: [idev] CDI.KEYID = 6
3,531,155 UART: [idev] SUBJECT.KEYID = 7
3,532,398 UART: [idev] UDS.KEYID = 0
3,533,323 ready_for_fw is high
3,533,536 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,677,195 UART: [idev] Erasing UDS.KEYID = 0
6,036,106 UART: [idev] Sha1 KeyId Algorithm
6,058,800 UART: [idev] --
6,061,540 UART: [ldev] ++
6,062,124 UART: [ldev] CDI.KEYID = 6
6,063,019 UART: [ldev] SUBJECT.KEYID = 5
6,064,155 UART: [ldev] AUTHORITY.KEYID = 7
6,065,498 UART: [ldev] FE.KEYID = 1
6,111,177 UART: [ldev] Erasing FE.KEYID = 1
8,616,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,349,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,365,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,397,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,417,838 UART: [ldev] --
10,423,151 UART: [fwproc] Wait for Commands...
10,424,972 UART: [fwproc] Recv command 0x46574c44
10,427,029 UART: [fwproc] Recv'd Img size: 114168 bytes
13,832,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,907,467 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,976,269 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,293,211 >>> mbox cmd response: success
14,293,720 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,297,079 UART: [afmc] ++
14,297,716 UART: [afmc] CDI.KEYID = 6
14,298,600 UART: [afmc] SUBJECT.KEYID = 7
14,299,704 UART: [afmc] AUTHORITY.KEYID = 5
16,839,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,563,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,565,480 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,581,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,597,264 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,613,136 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,635,117 UART: [afmc] --
18,639,379 UART: [cold-reset] --
18,644,320 UART: [state] Locking Datavault
18,648,647 UART: [state] Locking PCR0, PCR1 and PCR31
18,650,294 UART: [state] Locking ICCM
18,652,337 UART: [exit] Launching FMC @ 0x40000130
18,660,728 UART:
18,660,959 UART: Running Caliptra FMC ...
18,662,056 UART:
18,662,217 UART: [state] CFI Enabled
18,720,022 UART: [fht] FMC Alias Private Key: 7
20,484,589 UART: [art] Extend RT PCRs Done
20,485,798 UART: [art] Lock RT PCRs Done
20,487,238 UART: [art] Populate DV Done
20,492,596 UART: [fht] FMC Alias Private Key: 7
20,494,288 UART: [art] Derive CDI
20,495,045 UART: [art] Store in in slot 0x4
20,553,359 UART: [art] Derive Key Pair
20,554,395 UART: [art] Store priv key in slot 0x5
23,017,106 UART: [art] Derive Key Pair - Done
23,029,728 UART: [art] Signing Cert with AUTHO
23,031,033 UART: RITY.KEYID = 7
24,743,457 UART: [art] Erasing AUTHORITY.KEYID = 7
24,744,965 UART: [art] PUB.X = 1B3ADA2F1B492E5A7229282B5AE885A9D26BACF039B843C51DA177EC4FC13A2CF3C0BD57F19707A3010AF5D58225ABD7
24,752,239 UART: [art] PUB.Y = CD4100E56D248B8867A109B23FB6C057FD4561E8EA2BCBFD0875B7CC543848FC214C4B38D6ED6126101C93B888D1EC2A
24,759,499 UART: [art] SIG.R = 7E6BF0C3FCAA04A83542C1C66752A3BE43E712AC15B4E130C2B8D85C550E4F3E94CE3480D62B37B84D5B74CBDF238D86
24,766,921 UART: [art] SIG.S = 7F6ED6A98007307E71560C0D8F69E557FE35E365EE8D3E52F3D0F9C9A055836F3B662B760A97C828EC9618CE5332377C
25,745,680 UART: Caliptra RT
25,746,391 UART: [state] CFI Enabled
25,911,922 UART: [rt] RT listening for mailbox commands...
25,927,012 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,380,256 ready_for_fw is high
3,380,672 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,082,062 >>> mbox cmd response: success
14,082,937 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,367,100 UART:
18,367,496 UART: Running Caliptra FMC ...
18,368,629 UART:
18,368,792 UART: [state] CFI Enabled
18,432,482 UART: [fht] FMC Alias Private Key: 7
20,196,613 UART: [art] Extend RT PCRs Done
20,197,836 UART: [art] Lock RT PCRs Done
20,199,452 UART: [art] Populate DV Done
20,204,719 UART: [fht] FMC Alias Private Key: 7
20,206,430 UART: [art] Derive CDI
20,207,247 UART: [art] Store in in slot 0x4
20,264,957 UART: [art] Derive Key Pair
20,265,952 UART: [art] Store priv key in slot 0x5
22,729,247 UART: [art] Derive Key Pair - Done
22,742,250 UART: [art] Signing Cert with AUTHO
22,743,551 UART: RITY.KEYID = 7
24,454,620 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,128 UART: [art] PUB.X = 5F8A1C7055557A58E798CFF73E87B42214E5C4F1357732AD6E80FACFD185568FB6A9E5260189B2F679D71A9CA3A84FAA
24,463,370 UART: [art] PUB.Y = 5869DAC6DE40F081D298BB1C146E836DC0C850D3F44B61F6A7B25467140485CB9640CF1A27DF1F6DE0DE8F874072C829
24,470,636 UART: [art] SIG.R = DB7B939D597137E53C87CCFC2DABE75B01EA31286EFA130AAB2E3A92BE7EC12831FE628992E7B78C065F91115AFB9C2A
24,478,080 UART: [art] SIG.S = 6540A0F3917D79C91B2CFDDF1B1D1DF36710ACD60FC7578753EB3671A9B474FDE6F9E4BC97D3335CE290A894D950713D
25,456,187 UART: Caliptra RT
25,456,886 UART: [state] CFI Enabled
25,622,031 UART: [rt] RT listening for mailbox commands...
25,637,502 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
193,107 UART:
193,472 UART: Running Caliptra ROM ...
194,660 UART:
603,970 UART: [state] CFI Enabled
621,252 UART: [state] LifecycleState = Unprovisioned
623,049 UART: [state] DebugLocked = No
624,357 UART: [state] WD Timer not started. Device not locked for debugging
627,883 UART: [kat] SHA2-256
807,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,543 UART: [kat] ++
818,991 UART: [kat] sha1
831,208 UART: [kat] SHA2-256
834,210 UART: [kat] SHA2-384
840,856 UART: [kat] SHA2-512-ACC
843,800 UART: [kat] ECC-384
3,285,201 UART: [kat] HMAC-384Kdf
3,297,151 UART: [kat] LMS
3,826,654 UART: [kat] --
3,830,880 UART: [cold-reset] ++
3,833,095 UART: [fht] FHT @ 0x50003400
3,844,126 UART: [idev] ++
3,844,711 UART: [idev] CDI.KEYID = 6
3,845,630 UART: [idev] SUBJECT.KEYID = 7
3,846,801 UART: [idev] UDS.KEYID = 0
3,847,876 ready_for_fw is high
3,848,075 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,305 UART: [idev] Erasing UDS.KEYID = 0
6,319,040 UART: [idev] Sha1 KeyId Algorithm
6,343,094 UART: [idev] --
6,347,810 UART: [ldev] ++
6,348,384 UART: [ldev] CDI.KEYID = 6
6,349,307 UART: [ldev] SUBJECT.KEYID = 5
6,350,464 UART: [ldev] AUTHORITY.KEYID = 7
6,351,745 UART: [ldev] FE.KEYID = 1
6,362,501 UART: [ldev] Erasing FE.KEYID = 1
8,836,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,011 UART: [ldev] --
10,626,302 UART: [fwproc] Wait for Commands...
10,628,661 UART: [fwproc] Recv command 0x46574c44
10,630,699 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,489,999 >>> mbox cmd response: success
14,490,522 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,493,886 UART: [afmc] ++
14,494,467 UART: [afmc] CDI.KEYID = 6
14,495,379 UART: [afmc] SUBJECT.KEYID = 7
14,496,541 UART: [afmc] AUTHORITY.KEYID = 5
16,998,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,072 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,921 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,708 UART: [afmc] --
18,792,972 UART: [cold-reset] --
18,796,151 UART: [state] Locking Datavault
18,802,569 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,273 UART: [state] Locking ICCM
18,805,557 UART: [exit] Launching FMC @ 0x40000130
18,813,950 UART:
18,814,205 UART: Running Caliptra FMC ...
18,815,260 UART:
18,815,415 UART: [state] CFI Enabled
18,823,749 UART: [fht] FMC Alias Private Key: 7
20,581,084 UART: [art] Extend RT PCRs Done
20,582,308 UART: [art] Lock RT PCRs Done
20,583,720 UART: [art] Populate DV Done
20,589,292 UART: [fht] FMC Alias Private Key: 7
20,590,831 UART: [art] Derive CDI
20,591,645 UART: [art] Store in in slot 0x4
20,634,185 UART: [art] Derive Key Pair
20,635,403 UART: [art] Store priv key in slot 0x5
23,061,928 UART: [art] Derive Key Pair - Done
23,074,920 UART: [art] Signing Cert with AUTHO
23,076,232 UART: RITY.KEYID = 7
24,781,807 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,319 UART: [art] PUB.X = 5A72B3D400D5D17C8DB66710E8D4392BF9C456C327240368CF1A52DFBEDA7383BFF3B8E78567D02D90B80AFA17CD4283
24,790,582 UART: [art] PUB.Y = B9FFF26FBD662179C6CBBB0940BEAAEA8BF130320299611A39D05EDF27C01F943C40ABEC2AFC13EA25F6C565A1371F11
24,797,860 UART: [art] SIG.R = C82B0B401FE009DE0AE1B52B12113E6199315D47958E81ADE8B519026CFE9150A45D15021064640F2E525A6619FFFCAC
24,805,267 UART: [art] SIG.S = 46A22DE6E189F18781F52D13601195950BF8A1778737866A110B605B4996AA70FBC821F99DAC750F11CCC49358860548
25,783,590 UART: Caliptra RT
25,784,292 UART: [state] CFI Enabled
25,900,757 UART: [rt] RT listening for mailbox commands...
25,915,616 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,726 writing to cptra_bootfsm_go
3,703,709 ready_for_fw is high
3,704,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,279,294 >>> mbox cmd response: success
14,280,098 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,527,332 UART:
18,527,728 UART: Running Caliptra FMC ...
18,528,848 UART:
18,529,005 UART: [state] CFI Enabled
18,536,807 UART: [fht] FMC Alias Private Key: 7
20,292,992 UART: [art] Extend RT PCRs Done
20,294,238 UART: [art] Lock RT PCRs Done
20,296,107 UART: [art] Populate DV Done
20,301,462 UART: [fht] FMC Alias Private Key: 7
20,303,176 UART: [art] Derive CDI
20,303,917 UART: [art] Store in in slot 0x4
20,346,675 UART: [art] Derive Key Pair
20,347,677 UART: [art] Store priv key in slot 0x5
22,774,622 UART: [art] Derive Key Pair - Done
22,787,509 UART: [art] Signing Cert with AUTHO
22,788,806 UART: RITY.KEYID = 7
24,494,402 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,883 UART: [art] PUB.X = 331872A1F3D99A792EF6E9F21F97A79850ABDB4476887FF285E3DDC8BFACA562AECBA3F5C4C808EF4D2F6FEF34AE890B
24,503,177 UART: [art] PUB.Y = 4170465A7A6B5C0A3134B5943F137EBD4C38C57BD798BD39743DBE400C471AC7B341B3B69E42DE3B3860404A14488E4B
24,510,481 UART: [art] SIG.R = A39482E32C37F46E19440E0D4D74AD11AEA8AE471040C248CAD111A77E2093912548D6066847992328800B6BDD340D20
24,517,830 UART: [art] SIG.S = EC5C04637A4C51AD6A88483E853296270BBEBDF1B9D62B960560E61865F92A1D0FD3CF045295D628494ED23EF8DA2DF4
25,496,607 UART: Caliptra RT
25,497,344 UART: [state] CFI Enabled
25,613,917 UART: [rt] RT listening for mailbox commands...
25,629,219 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
192,077 UART:
192,451 UART: Running Caliptra ROM ...
193,594 UART:
193,740 UART: [state] CFI Enabled
263,809 UART: [state] LifecycleState = Unprovisioned
266,212 UART: [state] DebugLocked = No
268,036 UART: [state] WD Timer not started. Device not locked for debugging
271,743 UART: [kat] SHA2-256
461,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,386 UART: [kat] ++
472,922 UART: [kat] sha1
484,018 UART: [kat] SHA2-256
487,036 UART: [kat] SHA2-384
492,817 UART: [kat] SHA2-512-ACC
495,398 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,971,236 UART: [kat] LMS
3,503,004 UART: [kat] --
3,506,231 UART: [cold-reset] ++
3,508,519 UART: [fht] FHT @ 0x50003400
3,519,996 UART: [idev] ++
3,520,709 UART: [idev] CDI.KEYID = 6
3,521,663 UART: [idev] SUBJECT.KEYID = 7
3,522,908 UART: [idev] UDS.KEYID = 0
3,524,049 ready_for_fw is high
3,524,250 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,827 UART: [idev] Erasing UDS.KEYID = 0
6,027,561 UART: [idev] Sha1 KeyId Algorithm
6,050,295 UART: [idev] --
6,054,706 UART: [ldev] ++
6,055,401 UART: [ldev] CDI.KEYID = 6
6,056,311 UART: [ldev] SUBJECT.KEYID = 5
6,057,486 UART: [ldev] AUTHORITY.KEYID = 7
6,058,667 UART: [ldev] FE.KEYID = 1
6,100,695 UART: [ldev] Erasing FE.KEYID = 1
8,606,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,139 UART: [ldev] --
10,413,673 UART: [fwproc] Wait for Commands...
10,415,771 UART: [fwproc] Recv command 0x46574c44
10,418,076 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,307 >>> mbox cmd response: success
14,597,792 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,602,014 UART: [afmc] ++
14,602,730 UART: [afmc] CDI.KEYID = 6
14,603,916 UART: [afmc] SUBJECT.KEYID = 7
14,605,372 UART: [afmc] AUTHORITY.KEYID = 5
17,128,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,855,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,857,121 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,872,323 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,887,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,902,469 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,687 UART: [afmc] --
18,929,047 UART: [cold-reset] --
18,933,953 UART: [state] Locking Datavault
18,938,578 UART: [state] Locking PCR0, PCR1 and PCR31
18,940,747 UART: [state] Locking ICCM
18,943,284 UART: [exit] Launching FMC @ 0x40000130
18,951,966 UART:
18,952,198 UART: Running Caliptra FMC ...
18,953,300 UART:
18,953,455 UART: [state] CFI Enabled
19,009,622 UART: [fht] FMC Alias Private Key: 7
20,773,936 UART: [art] Extend RT PCRs Done
20,775,151 UART: [art] Lock RT PCRs Done
20,776,730 UART: [art] Populate DV Done
20,782,192 UART: [fht] FMC Alias Private Key: 7
20,783,736 UART: [art] Derive CDI
20,784,551 UART: [art] Store in in slot 0x4
20,841,779 UART: [art] Derive Key Pair
20,842,776 UART: [art] Store priv key in slot 0x5
23,305,421 UART: [art] Derive Key Pair - Done
23,318,326 UART: [art] Signing Cert with AUTHO
23,319,635 UART: RITY.KEYID = 7
25,031,211 UART: [art] Erasing AUTHORITY.KEYID = 7
25,032,717 UART: [art] PUB.X = C3A191AA7DC1074ADEF4623897ABBE8934D60C2C4B55ACA3E605D4B70E250EE861928BDB5B04C3A9D04E8BEDFEBD1D85
25,040,059 UART: [art] PUB.Y = 86C6D58C15F1058491EFD56F29B4D67E171B285F837F0119CC051FA41D515991499DBD7BF1915C650D4C78ED01106CD1
25,047,280 UART: [art] SIG.R = 398F7CC81BB4D202AF5C03897F5A42E772CDFE017E9DC1A702B25F4645E3B180A31B5F456E40BC1464090BB7FB182E7B
25,054,703 UART: [art] SIG.S = 4F08831140E53C3F251EE84371FD25B15C64A21541FA9A1167CB1EE9EAB79E4CA0AE46766D33F139D6A092387F68C6A5
26,033,348 UART: Caliptra RT
26,034,064 UART: [state] CFI Enabled
26,199,317 UART: [rt] RT listening for mailbox commands...
26,214,614 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,438,071 ready_for_fw is high
3,438,668 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,741,763 >>> mbox cmd response: success
14,742,416 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,025,172 UART:
19,025,571 UART: Running Caliptra FMC ...
19,026,689 UART:
19,026,849 UART: [state] CFI Enabled
19,097,136 UART: [fht] FMC Alias Private Key: 7
20,860,284 UART: [art] Extend RT PCRs Done
20,861,506 UART: [art] Lock RT PCRs Done
20,862,948 UART: [art] Populate DV Done
20,868,147 UART: [fht] FMC Alias Private Key: 7
20,869,795 UART: [art] Derive CDI
20,870,533 UART: [art] Store in in slot 0x4
20,929,495 UART: [art] Derive Key Pair
20,930,534 UART: [art] Store priv key in slot 0x5
23,393,507 UART: [art] Derive Key Pair - Done
23,406,260 UART: [art] Signing Cert with AUTHO
23,407,594 UART: RITY.KEYID = 7
25,119,383 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,885 UART: [art] PUB.X = 548C2D05E3EB3A0DB9705FFD57D0FD7D6E1FF8BF393048A40AB93E55ECF33D0E8F658718DFEA79070CEBB43167B2D007
25,128,181 UART: [art] PUB.Y = 59902DC4DCD594EB78671EBA012F2D24F05731C1CD05A1AAF8268AE523D1C85EF0981F129D0ACE9F469466C1D4D82869
25,135,410 UART: [art] SIG.R = E6C6ECA8ADEB22F66418EBB2407B498DA47203EEBDF33363D4F589D53A6CEF40BF61EF9005CC7E00164910DA13FA0151
25,142,801 UART: [art] SIG.S = 8F15FF6F5F557CC564B9326F7BFA633DD68951B10EE69D1B3CE5D6A60C6D3846DBAB901E5866F72869345DF09899C53A
26,121,497 UART: Caliptra RT
26,122,185 UART: [state] CFI Enabled
26,288,456 UART: [rt] RT listening for mailbox commands...
26,303,648 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,852 writing to cptra_bootfsm_go
192,940 UART:
193,309 UART: Running Caliptra ROM ...
194,420 UART:
604,216 UART: [state] CFI Enabled
618,113 UART: [state] LifecycleState = Unprovisioned
620,482 UART: [state] DebugLocked = No
622,509 UART: [state] WD Timer not started. Device not locked for debugging
626,904 UART: [kat] SHA2-256
816,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,560 UART: [kat] ++
828,116 UART: [kat] sha1
840,155 UART: [kat] SHA2-256
843,208 UART: [kat] SHA2-384
849,919 UART: [kat] SHA2-512-ACC
852,511 UART: [kat] ECC-384
3,294,244 UART: [kat] HMAC-384Kdf
3,307,823 UART: [kat] LMS
3,839,622 UART: [kat] --
3,841,627 UART: [cold-reset] ++
3,842,572 UART: [fht] FHT @ 0x50003400
3,854,042 UART: [idev] ++
3,854,750 UART: [idev] CDI.KEYID = 6
3,855,700 UART: [idev] SUBJECT.KEYID = 7
3,856,966 UART: [idev] UDS.KEYID = 0
3,857,866 ready_for_fw is high
3,858,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,431 UART: [idev] Erasing UDS.KEYID = 0
6,329,905 UART: [idev] Sha1 KeyId Algorithm
6,353,617 UART: [idev] --
6,356,853 UART: [ldev] ++
6,357,561 UART: [ldev] CDI.KEYID = 6
6,358,447 UART: [ldev] SUBJECT.KEYID = 5
6,359,664 UART: [ldev] AUTHORITY.KEYID = 7
6,360,791 UART: [ldev] FE.KEYID = 1
6,374,082 UART: [ldev] Erasing FE.KEYID = 1
8,848,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,352 UART: [ldev] --
10,638,019 UART: [fwproc] Wait for Commands...
10,640,980 UART: [fwproc] Recv command 0x46574c44
10,643,285 UART: [fwproc] Recv'd Img size: 114168 bytes
14,086,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,276,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,818,445 >>> mbox cmd response: success
14,818,934 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,821,750 UART: [afmc] ++
14,822,449 UART: [afmc] CDI.KEYID = 6
14,823,616 UART: [afmc] SUBJECT.KEYID = 7
14,825,159 UART: [afmc] AUTHORITY.KEYID = 5
17,327,504 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,052,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,054,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,069,966 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,085,110 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,100,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,124,614 UART: [afmc] --
19,128,530 UART: [cold-reset] --
19,131,420 UART: [state] Locking Datavault
19,137,974 UART: [state] Locking PCR0, PCR1 and PCR31
19,140,165 UART: [state] Locking ICCM
19,142,641 UART: [exit] Launching FMC @ 0x40000130
19,151,261 UART:
19,151,495 UART: Running Caliptra FMC ...
19,152,600 UART:
19,152,760 UART: [state] CFI Enabled
19,160,763 UART: [fht] FMC Alias Private Key: 7
20,918,650 UART: [art] Extend RT PCRs Done
20,919,889 UART: [art] Lock RT PCRs Done
20,921,701 UART: [art] Populate DV Done
20,927,218 UART: [fht] FMC Alias Private Key: 7
20,928,917 UART: [art] Derive CDI
20,929,660 UART: [art] Store in in slot 0x4
20,972,248 UART: [art] Derive Key Pair
20,973,245 UART: [art] Store priv key in slot 0x5
23,400,096 UART: [art] Derive Key Pair - Done
23,412,981 UART: [art] Signing Cert with AUTHO
23,414,285 UART: RITY.KEYID = 7
25,119,370 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,872 UART: [art] PUB.X = B099CF789629356EB32B4E90A092AA753D3A909F74C26CFC9C08FBA2A65CB5CAB3B8BBA89D9BBE418DAF5B9A128B0676
25,128,115 UART: [art] PUB.Y = 26E5D2CDBFE8993D03B4B694DD3EAB4C23F6558FA31F6BBFD905EBA4C203935C18355EC5F33CAAE5777CAA9584F29098
25,135,459 UART: [art] SIG.R = 94A94B908C8CFF77A873F4039627FEB24349ECBB316EBB0818B2EB875E5E900BA20CAEC99AF63C38CF1A95AFB60AADAD
25,142,852 UART: [art] SIG.S = 4862D6E090FFDCFBED25778234A67D39F2AF8DFD5450E0AE5B250DDB952ECE369B4F10911F0EDA03B50608EB26C1C7D8
26,121,807 UART: Caliptra RT
26,122,529 UART: [state] CFI Enabled
26,239,325 UART: [rt] RT listening for mailbox commands...
26,254,573 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,665 writing to cptra_bootfsm_go
3,755,502 ready_for_fw is high
3,756,093 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,340 >>> mbox cmd response: success
14,953,988 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,206,609 UART:
19,207,006 UART: Running Caliptra FMC ...
19,208,213 UART:
19,208,383 UART: [state] CFI Enabled
19,216,334 UART: [fht] FMC Alias Private Key: 7
20,972,931 UART: [art] Extend RT PCRs Done
20,974,168 UART: [art] Lock RT PCRs Done
20,975,633 UART: [art] Populate DV Done
20,981,051 UART: [fht] FMC Alias Private Key: 7
20,982,537 UART: [art] Derive CDI
20,983,303 UART: [art] Store in in slot 0x4
21,025,969 UART: [art] Derive Key Pair
21,026,979 UART: [art] Store priv key in slot 0x5
23,454,204 UART: [art] Derive Key Pair - Done
23,466,872 UART: [art] Signing Cert with AUTHO
23,468,183 UART: RITY.KEYID = 7
25,173,929 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,451 UART: [art] PUB.X = 188326C802A6E81606A0652E19207DDC18A2BD1EC18F6AEA1E1F0BF0ADADB356F6A47630D85F5D99F3A95011E6BE60A1
25,182,754 UART: [art] PUB.Y = 72086D3F84F3612A0966FE15F499B6A7C86325E3AE72C316EC03E33FFDFC6C30AB761477CB4C912FFBA7BCA62CCA41C4
25,190,017 UART: [art] SIG.R = B9CB2F50975B010320217F081062F76B63698CCC75672F5BAB42FCEE0F0C99ECF5B9207F6E61DFEF4A91041BDD08E39B
25,197,423 UART: [art] SIG.S = ED4B90F61FD7B0ED720DBEF0FF61703D1510DE7B44D5390CD173C4C1EA3C43E81C67E1C398E7194B53C9B977225AB20A
26,176,172 UART: Caliptra RT
26,176,885 UART: [state] CFI Enabled
26,294,058 UART: [rt] RT listening for mailbox commands...
26,309,360 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,127 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,753 UART: [kat] SHA2-256
881,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,799 UART: [kat] ++
885,951 UART: [kat] sha1
890,291 UART: [kat] SHA2-256
892,229 UART: [kat] SHA2-384
895,018 UART: [kat] SHA2-512-ACC
896,919 UART: [kat] ECC-384
902,568 UART: [kat] HMAC-384Kdf
907,144 UART: [kat] LMS
1,475,340 UART: [kat] --
1,476,369 UART: [cold-reset] ++
1,476,699 UART: [fht] Storing FHT @ 0x50003400
1,479,400 UART: [idev] ++
1,479,568 UART: [idev] CDI.KEYID = 6
1,479,928 UART: [idev] SUBJECT.KEYID = 7
1,480,352 UART: [idev] UDS.KEYID = 0
1,480,697 ready_for_fw is high
1,480,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,306 UART: [idev] Erasing UDS.KEYID = 0
1,504,788 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,404 UART: [idev] --
1,514,453 UART: [ldev] ++
1,514,621 UART: [ldev] CDI.KEYID = 6
1,514,984 UART: [ldev] SUBJECT.KEYID = 5
1,515,410 UART: [ldev] AUTHORITY.KEYID = 7
1,515,873 UART: [ldev] FE.KEYID = 1
1,521,125 UART: [ldev] Erasing FE.KEYID = 1
1,546,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,202 UART: [ldev] --
1,586,505 UART: [fwproc] Waiting for Commands...
1,587,248 UART: [fwproc] Received command 0x46574c44
1,588,039 UART: [fwproc] Received Image of size 114168 bytes
2,884,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,661 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,013 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,704 >>> mbox cmd response: success
3,076,704 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,077,886 UART: [afmc] ++
3,078,054 UART: [afmc] CDI.KEYID = 6
3,078,416 UART: [afmc] SUBJECT.KEYID = 7
3,078,841 UART: [afmc] AUTHORITY.KEYID = 5
3,113,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,916 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,696 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,309 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,999 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,738 UART: [afmc] --
3,156,722 UART: [cold-reset] --
3,157,646 UART: [state] Locking Datavault
3,159,079 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,683 UART: [state] Locking ICCM
3,160,321 UART: [exit] Launching FMC @ 0x40000130
3,165,650 UART:
3,165,666 UART: Running Caliptra FMC ...
3,166,074 UART:
3,166,128 UART: [state] CFI Enabled
3,176,771 UART: [fht] FMC Alias Private Key: 7
3,284,654 UART: [art] Extend RT PCRs Done
3,285,082 UART: [art] Lock RT PCRs Done
3,286,506 UART: [art] Populate DV Done
3,294,953 UART: [fht] FMC Alias Private Key: 7
3,296,039 UART: [art] Derive CDI
3,296,319 UART: [art] Store in in slot 0x4
3,381,714 UART: [art] Derive Key Pair
3,382,074 UART: [art] Store priv key in slot 0x5
3,394,912 UART: [art] Derive Key Pair - Done
3,409,650 UART: [art] Signing Cert with AUTHO
3,410,130 UART: RITY.KEYID = 7
3,425,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,059 UART: [art] PUB.X = 293E74817450C813571A1EB68810E4E96664AFAE640E0B2FF4627C033E813787759B55C7C8B76F88357526D115D9CA22
3,432,810 UART: [art] PUB.Y = F2ED0CC7E48CC20C1B0484D4850E2D482416314AD696A550BEF1EAC77391F5847D8679E93B7D981EFF69E3DCD1C20A98
3,439,755 UART: [art] SIG.R = 0938D2A314627BA782CFA2F3393CC4CF56AF3E43889A992FE7E1473608727DC8F01BFDD0CDAA22FCAEF3CD43BE169FAD
3,446,541 UART: [art] SIG.S = 9631B445FD32255B06C99486F09982FC539843A1AD3D8C5C9685BDDD7CD3942D9B2E776BB40C69559B3E13F30782B6A9
3,470,605 UART: Caliptra RT
3,470,858 UART: [state] CFI Enabled
3,578,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,006 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,971 ready_for_fw is high
1,362,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,526 >>> mbox cmd response: success
2,925,526 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,987,210 UART:
2,987,226 UART: Running Caliptra FMC ...
2,987,634 UART:
2,987,688 UART: [state] CFI Enabled
2,998,181 UART: [fht] FMC Alias Private Key: 7
3,106,338 UART: [art] Extend RT PCRs Done
3,106,766 UART: [art] Lock RT PCRs Done
3,108,280 UART: [art] Populate DV Done
3,116,717 UART: [fht] FMC Alias Private Key: 7
3,117,873 UART: [art] Derive CDI
3,118,153 UART: [art] Store in in slot 0x4
3,203,690 UART: [art] Derive Key Pair
3,204,050 UART: [art] Store priv key in slot 0x5
3,217,012 UART: [art] Derive Key Pair - Done
3,231,975 UART: [art] Signing Cert with AUTHO
3,232,455 UART: RITY.KEYID = 7
3,247,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,220 UART: [art] PUB.X = 755BA5EA0ECC53885EEE1409E70557A9462531E7FC4807727F58940EE3B56C55CAB73D6664974616FD549D4EFEB6FB83
3,254,979 UART: [art] PUB.Y = 38BECB00C128B9FAC8D785444068E0509CB80577D4EA0C9F42AE8FF1AF42B08F78316F832D911C30A74F6E17F7F04F3F
3,261,911 UART: [art] SIG.R = F3CF22186B0EEF65CD3AAFC79EB6E6C99887399B9886D28958EF1302641C0723AACBB9600E93446A400AC946D3CE7F14
3,268,674 UART: [art] SIG.S = 31B46653AD855DB288FDE3246A7EC41E1AC21552B15AAAA5C2629FC95929F15586FED2AC9247E49B8DF9463B1435FA36
3,292,645 UART: Caliptra RT
3,292,898 UART: [state] CFI Enabled
3,401,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,892 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,358 UART: [kat] SHA2-256
892,296 UART: [kat] SHA2-384
895,203 UART: [kat] SHA2-512-ACC
897,104 UART: [kat] ECC-384
902,761 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,742 UART: [fht] Storing FHT @ 0x50003400
1,479,713 UART: [idev] ++
1,479,881 UART: [idev] CDI.KEYID = 6
1,480,241 UART: [idev] SUBJECT.KEYID = 7
1,480,665 UART: [idev] UDS.KEYID = 0
1,481,010 ready_for_fw is high
1,481,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,083 UART: [idev] Erasing UDS.KEYID = 0
1,505,411 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,049 UART: [idev] --
1,515,128 UART: [ldev] ++
1,515,296 UART: [ldev] CDI.KEYID = 6
1,515,659 UART: [ldev] SUBJECT.KEYID = 5
1,516,085 UART: [ldev] AUTHORITY.KEYID = 7
1,516,548 UART: [ldev] FE.KEYID = 1
1,522,014 UART: [ldev] Erasing FE.KEYID = 1
1,547,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,213 UART: [ldev] --
1,586,602 UART: [fwproc] Waiting for Commands...
1,587,309 UART: [fwproc] Received command 0x46574c44
1,588,100 UART: [fwproc] Received Image of size 114168 bytes
2,884,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,626 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,978 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,661 >>> mbox cmd response: success
3,077,661 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,078,685 UART: [afmc] ++
3,078,853 UART: [afmc] CDI.KEYID = 6
3,079,215 UART: [afmc] SUBJECT.KEYID = 7
3,079,640 UART: [afmc] AUTHORITY.KEYID = 5
3,115,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,519 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,299 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,027 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,912 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,602 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,507 UART: [afmc] --
3,158,639 UART: [cold-reset] --
3,159,511 UART: [state] Locking Datavault
3,160,488 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,092 UART: [state] Locking ICCM
3,161,720 UART: [exit] Launching FMC @ 0x40000130
3,167,049 UART:
3,167,065 UART: Running Caliptra FMC ...
3,167,473 UART:
3,167,616 UART: [state] CFI Enabled
3,178,333 UART: [fht] FMC Alias Private Key: 7
3,286,910 UART: [art] Extend RT PCRs Done
3,287,338 UART: [art] Lock RT PCRs Done
3,289,022 UART: [art] Populate DV Done
3,297,179 UART: [fht] FMC Alias Private Key: 7
3,298,137 UART: [art] Derive CDI
3,298,417 UART: [art] Store in in slot 0x4
3,384,330 UART: [art] Derive Key Pair
3,384,690 UART: [art] Store priv key in slot 0x5
3,398,464 UART: [art] Derive Key Pair - Done
3,413,160 UART: [art] Signing Cert with AUTHO
3,413,640 UART: RITY.KEYID = 7
3,429,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,855 UART: [art] PUB.X = B899A8743FC939A336A7C84C7F49E46B4121DA73BC8A26B5278E714AA01CA3A1A76152EE995B7D04BCCE88F52C8F8F82
3,436,632 UART: [art] PUB.Y = 2C0B5A0B8BF4AAC4D15F90FC3BDC0A7F7C8E1619F83C61CB1138FC8B32BC42C54EC7F70117567CA876A46999D3898B1E
3,443,586 UART: [art] SIG.R = 90926439B5EED183CBC2CF14A1A183D270F0038097CD4C96DE148E787E72AB51907C848E91F878741A1D23A613E2A9C6
3,450,353 UART: [art] SIG.S = 3B1D6C08250EE45516854D7523D2B4B736FCF6B6F60E100B42F34B1CDEC3F556575AB1A0F0A63E968B91F9B512C824F5
3,474,582 UART: Caliptra RT
3,474,927 UART: [state] CFI Enabled
3,582,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,597,271 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,871 >>> mbox cmd response: success
2,925,871 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,987,395 UART:
2,987,411 UART: Running Caliptra FMC ...
2,987,819 UART:
2,987,962 UART: [state] CFI Enabled
2,998,453 UART: [fht] FMC Alias Private Key: 7
3,106,818 UART: [art] Extend RT PCRs Done
3,107,246 UART: [art] Lock RT PCRs Done
3,108,674 UART: [art] Populate DV Done
3,117,135 UART: [fht] FMC Alias Private Key: 7
3,118,137 UART: [art] Derive CDI
3,118,417 UART: [art] Store in in slot 0x4
3,203,750 UART: [art] Derive Key Pair
3,204,110 UART: [art] Store priv key in slot 0x5
3,218,018 UART: [art] Derive Key Pair - Done
3,232,804 UART: [art] Signing Cert with AUTHO
3,233,284 UART: RITY.KEYID = 7
3,248,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,163 UART: [art] PUB.X = 231FDDA8B554F714D437517F25FF21F39A7F6F650A4F25F339FE6FE200E851F10B7CB783F98EEFE347C14C686B54F4CA
3,255,917 UART: [art] PUB.Y = 26D72A2F28D8F1C419C4D0AC7C379482F75CF0034DAEE6CB96F9EFAFE1839E2FF3AAB7EE8E7693575927FF4D4A66DEE0
3,262,886 UART: [art] SIG.R = 06DEEDD18C10934DA893393EF9E87C9461302F2956FF987246C5C82FD2BEBDFE2DC77E67B8F917E61F9ECBAB9E32C337
3,269,669 UART: [art] SIG.S = 91BD6247B62E7B723922DC0123162E4A1179B3F38A37D6C64945014032973671D537098C605F61FA88A8E26D101F37D1
3,293,205 UART: Caliptra RT
3,293,550 UART: [state] CFI Enabled
3,401,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,660 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
893,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,581 UART: [kat] ++
897,733 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
917,864 UART: [kat] HMAC-384Kdf
922,262 UART: [kat] LMS
1,170,590 UART: [kat] --
1,171,529 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,696 UART: [idev] ++
1,174,864 UART: [idev] CDI.KEYID = 6
1,175,224 UART: [idev] SUBJECT.KEYID = 7
1,175,648 UART: [idev] UDS.KEYID = 0
1,175,993 ready_for_fw is high
1,175,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,624 UART: [idev] Erasing UDS.KEYID = 0
1,200,821 UART: [idev] Sha1 KeyId Algorithm
1,209,325 UART: [idev] --
1,210,523 UART: [ldev] ++
1,210,691 UART: [ldev] CDI.KEYID = 6
1,211,054 UART: [ldev] SUBJECT.KEYID = 5
1,211,480 UART: [ldev] AUTHORITY.KEYID = 7
1,211,943 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,243,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,073 UART: [ldev] --
1,283,548 UART: [fwproc] Wait for Commands...
1,284,284 UART: [fwproc] Recv command 0x46574c44
1,285,012 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,776 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,325 >>> mbox cmd response: success
2,774,325 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,775,355 UART: [afmc] ++
2,775,523 UART: [afmc] CDI.KEYID = 6
2,775,885 UART: [afmc] SUBJECT.KEYID = 7
2,776,310 UART: [afmc] AUTHORITY.KEYID = 5
2,812,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,124 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,009 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,728 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,558 UART: [afmc] --
2,855,450 UART: [cold-reset] --
2,856,102 UART: [state] Locking Datavault
2,857,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,773 UART: [state] Locking ICCM
2,858,199 UART: [exit] Launching FMC @ 0x40000130
2,863,528 UART:
2,863,544 UART: Running Caliptra FMC ...
2,863,952 UART:
2,864,006 UART: [state] CFI Enabled
2,874,627 UART: [fht] FMC Alias Private Key: 7
2,983,014 UART: [art] Extend RT PCRs Done
2,983,442 UART: [art] Lock RT PCRs Done
2,985,082 UART: [art] Populate DV Done
2,993,231 UART: [fht] FMC Alias Private Key: 7
2,994,225 UART: [art] Derive CDI
2,994,505 UART: [art] Store in in slot 0x4
3,080,336 UART: [art] Derive Key Pair
3,080,696 UART: [art] Store priv key in slot 0x5
3,093,928 UART: [art] Derive Key Pair - Done
3,108,430 UART: [art] Signing Cert with AUTHO
3,108,910 UART: RITY.KEYID = 7
3,124,198 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,963 UART: [art] PUB.X = BBC505A2227168A32B73699D09B88C67D97DB451D2E175AB458C9DC63EBEC0CC037829E48C9FFC587A9891F52936944B
3,131,728 UART: [art] PUB.Y = DE71B2433EB3BEDC54154FFD0030C678BC3B8AFD02680E1D43E4FABEE97A4173481ACFAF06EF069B57551D9372DBBEA1
3,138,666 UART: [art] SIG.R = 571254788DD4C165D173B3202A89952643D553F0F3191B860E3078307526D8D52F4EBA4F71B6EAAA29B990D955DD528F
3,145,427 UART: [art] SIG.S = 25F1397379FA2A719FA3FE288E7B239031D00A7D515A6F8344F5975B2EEBA5F918EF925AD79E18B2360FE8422F16C9DC
3,169,310 UART: Caliptra RT
3,169,563 UART: [state] CFI Enabled
3,278,192 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,292,221 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,391 ready_for_fw is high
1,059,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,398 >>> mbox cmd response: success
2,624,398 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,686,826 UART:
2,686,842 UART: Running Caliptra FMC ...
2,687,250 UART:
2,687,304 UART: [state] CFI Enabled
2,697,359 UART: [fht] FMC Alias Private Key: 7
2,805,680 UART: [art] Extend RT PCRs Done
2,806,108 UART: [art] Lock RT PCRs Done
2,807,568 UART: [art] Populate DV Done
2,815,901 UART: [fht] FMC Alias Private Key: 7
2,816,995 UART: [art] Derive CDI
2,817,275 UART: [art] Store in in slot 0x4
2,903,014 UART: [art] Derive Key Pair
2,903,374 UART: [art] Store priv key in slot 0x5
2,916,212 UART: [art] Derive Key Pair - Done
2,930,880 UART: [art] Signing Cert with AUTHO
2,931,360 UART: RITY.KEYID = 7
2,946,744 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,509 UART: [art] PUB.X = 7DD00158B1755A76C02613FDCF652507971B46BEAF729223F8DF5C425ABFA812EFCA07B8EED5FBB3385E1EBC8E0C839A
2,954,285 UART: [art] PUB.Y = 15F7B2EF485028FFDC79618AC11B2A1FF1FA7FB778AEEB6E13DD56E5C0A23179C81F4A1425998EEFC25479077BB4C802
2,961,243 UART: [art] SIG.R = 28DCC1067E8991DEA014D6F8EA73728AB02E7E06459EEE01A924D3DEB851049E77536C9EA61040050E98C065D476A95B
2,967,997 UART: [art] SIG.S = CCBE14AAA3CC5629F0B742DD450B4C717F507841510210230E66BA6949ACF077B491D024F6FAF895DCCA302405D820DB
2,992,752 UART: Caliptra RT
2,993,005 UART: [state] CFI Enabled
3,100,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,114,813 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
893,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,022 UART: [kat] ++
898,174 UART: [kat] sha1
902,382 UART: [kat] SHA2-256
904,322 UART: [kat] SHA2-384
907,095 UART: [kat] SHA2-512-ACC
908,996 UART: [kat] ECC-384
918,555 UART: [kat] HMAC-384Kdf
923,245 UART: [kat] LMS
1,171,573 UART: [kat] --
1,172,714 UART: [cold-reset] ++
1,173,106 UART: [fht] FHT @ 0x50003400
1,175,631 UART: [idev] ++
1,175,799 UART: [idev] CDI.KEYID = 6
1,176,159 UART: [idev] SUBJECT.KEYID = 7
1,176,583 UART: [idev] UDS.KEYID = 0
1,176,928 ready_for_fw is high
1,176,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,429 UART: [idev] Erasing UDS.KEYID = 0
1,202,176 UART: [idev] Sha1 KeyId Algorithm
1,210,754 UART: [idev] --
1,211,992 UART: [ldev] ++
1,212,160 UART: [ldev] CDI.KEYID = 6
1,212,523 UART: [ldev] SUBJECT.KEYID = 5
1,212,949 UART: [ldev] AUTHORITY.KEYID = 7
1,213,412 UART: [ldev] FE.KEYID = 1
1,218,648 UART: [ldev] Erasing FE.KEYID = 1
1,245,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,044 UART: [ldev] --
1,284,361 UART: [fwproc] Wait for Commands...
1,285,175 UART: [fwproc] Recv command 0x46574c44
1,285,903 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,105 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,628 >>> mbox cmd response: success
2,774,628 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,775,798 UART: [afmc] ++
2,775,966 UART: [afmc] CDI.KEYID = 6
2,776,328 UART: [afmc] SUBJECT.KEYID = 7
2,776,753 UART: [afmc] AUTHORITY.KEYID = 5
2,812,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,552 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,271 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,011 UART: [afmc] --
2,855,949 UART: [cold-reset] --
2,856,763 UART: [state] Locking Datavault
2,857,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,526 UART: [state] Locking ICCM
2,859,178 UART: [exit] Launching FMC @ 0x40000130
2,864,507 UART:
2,864,523 UART: Running Caliptra FMC ...
2,864,931 UART:
2,865,074 UART: [state] CFI Enabled
2,875,737 UART: [fht] FMC Alias Private Key: 7
2,983,974 UART: [art] Extend RT PCRs Done
2,984,402 UART: [art] Lock RT PCRs Done
2,985,770 UART: [art] Populate DV Done
2,994,025 UART: [fht] FMC Alias Private Key: 7
2,994,983 UART: [art] Derive CDI
2,995,263 UART: [art] Store in in slot 0x4
3,080,718 UART: [art] Derive Key Pair
3,081,078 UART: [art] Store priv key in slot 0x5
3,094,448 UART: [art] Derive Key Pair - Done
3,109,110 UART: [art] Signing Cert with AUTHO
3,109,590 UART: RITY.KEYID = 7
3,124,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,045 UART: [art] PUB.X = 392B5003967FD98927975A504E1373E25DD3316C0308F2BCEA05DB202279E6DB141A3046791B614C09D74B890B52AEE0
3,131,791 UART: [art] PUB.Y = D8EB78EA507CCB6FBB5303FE862F683911C3F0F548A097C7DB41E395E76771BCF1A5CEE199BF60748D9375EBA51C1EFC
3,138,756 UART: [art] SIG.R = 1EB874275C6FEBB2FB0DF591ADAE4B9819DF67AAB53CC50E2529D4D65F907C8FE6F4CB7233AACEFC1559443F080FD20C
3,145,535 UART: [art] SIG.S = D11F7EFF083F4B790B2ED1098435FE8DF9F8FF1B1ED20B62B714A519C9A401D47FD8C567FE5E2780F74CDBBA22E5B510
3,169,253 UART: Caliptra RT
3,169,598 UART: [state] CFI Enabled
3,277,287 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,291,388 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,900 ready_for_fw is high
1,061,900 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,739 >>> mbox cmd response: success
2,625,739 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,688,181 UART:
2,688,197 UART: Running Caliptra FMC ...
2,688,605 UART:
2,688,748 UART: [state] CFI Enabled
2,699,355 UART: [fht] FMC Alias Private Key: 7
2,806,680 UART: [art] Extend RT PCRs Done
2,807,108 UART: [art] Lock RT PCRs Done
2,808,864 UART: [art] Populate DV Done
2,817,095 UART: [fht] FMC Alias Private Key: 7
2,818,211 UART: [art] Derive CDI
2,818,491 UART: [art] Store in in slot 0x4
2,904,630 UART: [art] Derive Key Pair
2,904,990 UART: [art] Store priv key in slot 0x5
2,917,866 UART: [art] Derive Key Pair - Done
2,932,316 UART: [art] Signing Cert with AUTHO
2,932,796 UART: RITY.KEYID = 7
2,948,000 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,765 UART: [art] PUB.X = 65C293037DC716CC015ADD1BA60EED4D84A504EDF2EEC27A8092C2D5A18A11B1FFEA8BABCD2907B53A531B1F1C1051A6
2,955,542 UART: [art] PUB.Y = D5EBE8CB353E56123161A31BDD869A0687059A28DA7EB2DE202677F23A047BAA3DD7307762C7189921970911F3335B01
2,962,473 UART: [art] SIG.R = CC91B4709D115076AB1D8D697EDAA9703DA78609D454624070C50B2F33912834C11403E9E28DE17C9192FBB55A31552C
2,969,230 UART: [art] SIG.S = B204F71E9B47AAAC5358999EDFF948779F70D98B8F864D4B8DF878658A3B45ACC42BDAF81E53578FAE64A4DFD530D896
2,992,766 UART: Caliptra RT
2,993,111 UART: [state] CFI Enabled
3,101,173 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,115,034 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,365 UART: [kat] SHA2-256
901,305 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,658 UART: [kat] HMAC-384Kdf
920,412 UART: [kat] LMS
1,168,724 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,170,069 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 ready_for_fw is high
1,173,829 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,431 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,306 UART: [ldev] ++
1,208,474 UART: [ldev] CDI.KEYID = 6
1,208,838 UART: [ldev] SUBJECT.KEYID = 5
1,209,265 UART: [ldev] AUTHORITY.KEYID = 7
1,209,728 UART: [ldev] FE.KEYID = 1
1,214,700 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,004 UART: [ldev] --
1,280,282 UART: [fwproc] Wait for Commands...
1,281,103 UART: [fwproc] Recv command 0x46574c44
1,281,836 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,453 >>> mbox cmd response: success
2,770,453 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,771,582 UART: [afmc] ++
2,771,750 UART: [afmc] CDI.KEYID = 6
2,772,113 UART: [afmc] SUBJECT.KEYID = 7
2,772,539 UART: [afmc] AUTHORITY.KEYID = 5
2,807,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,545 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,274 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,157 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,761 UART: [afmc] --
2,850,869 UART: [cold-reset] --
2,851,809 UART: [state] Locking Datavault
2,852,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,432 UART: [state] Locking ICCM
2,853,934 UART: [exit] Launching FMC @ 0x40000130
2,859,263 UART:
2,859,279 UART: Running Caliptra FMC ...
2,859,687 UART:
2,859,741 UART: [state] CFI Enabled
2,870,394 UART: [fht] FMC Alias Private Key: 7
2,978,797 UART: [art] Extend RT PCRs Done
2,979,225 UART: [art] Lock RT PCRs Done
2,980,959 UART: [art] Populate DV Done
2,988,980 UART: [fht] FMC Alias Private Key: 7
2,989,920 UART: [art] Derive CDI
2,990,200 UART: [art] Store in in slot 0x4
3,075,623 UART: [art] Derive Key Pair
3,075,983 UART: [art] Store priv key in slot 0x5
3,088,395 UART: [art] Derive Key Pair - Done
3,103,131 UART: [art] Signing Cert with AUTHO
3,103,611 UART: RITY.KEYID = 7
3,118,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,684 UART: [art] PUB.X = C72A32F91BDA0013507FD7A8A65B1995C6DA952D2F276D0ABEFCB435CB4E85307EC2C01858124E3D1984BB9D619593C9
3,126,437 UART: [art] PUB.Y = 61450A173CF5F03D3D83E88854EB05EA97562AC94F81F9919FD2D689B1A78C642BE6C42E8ACABCE669D095288567DC38
3,133,387 UART: [art] SIG.R = 16677A8F7FBF9007B19A5D0AE15D4FEDADBE556028257ABFAA19203A94344BE6EEFE5EDF23824D1D5C51EEFF6CB2FBD4
3,140,179 UART: [art] SIG.S = 4D5FF8418D5C7BA27BBB6D2ABFE82FAEC5AD919C384199467C60F71203A96B6B1E4E3469842D51F894D8A3C8F6359B6A
3,164,447 UART: Caliptra RT
3,164,700 UART: [state] CFI Enabled
3,272,785 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,710 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,608 ready_for_fw is high
1,056,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,023 >>> mbox cmd response: success
2,620,023 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,681,227 UART:
2,681,243 UART: Running Caliptra FMC ...
2,681,651 UART:
2,681,705 UART: [state] CFI Enabled
2,692,150 UART: [fht] FMC Alias Private Key: 7
2,800,391 UART: [art] Extend RT PCRs Done
2,800,819 UART: [art] Lock RT PCRs Done
2,802,121 UART: [art] Populate DV Done
2,810,162 UART: [fht] FMC Alias Private Key: 7
2,811,208 UART: [art] Derive CDI
2,811,488 UART: [art] Store in in slot 0x4
2,897,095 UART: [art] Derive Key Pair
2,897,455 UART: [art] Store priv key in slot 0x5
2,910,737 UART: [art] Derive Key Pair - Done
2,925,361 UART: [art] Signing Cert with AUTHO
2,925,841 UART: RITY.KEYID = 7
2,941,555 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,320 UART: [art] PUB.X = 351F596D96DBD234682453006BE92A2977C7DE29CDB86E3A170A9C9A9165476D92802138D75A12683BDF9FED8ECD32F2
2,949,067 UART: [art] PUB.Y = 4E3002DBF0A29AD847E238347BCDFE7935376CB8FD5EDDF6C5EAA4424D1636DDF7F4E9C7F741E08A89A06E649D63EC80
2,956,032 UART: [art] SIG.R = 89A4808486C83D274AB7759249D755761F32DDF154260685A29D9C92F73AC3D90CE154F21F0A0D42235DB5CCC5FB733A
2,962,790 UART: [art] SIG.S = 03A49236ED7A7807EC8C53B64E9791FAB179207A492F34B3BBE0DD24E2E3945594871D5E0E34A0665799D0594B166820
2,986,672 UART: Caliptra RT
2,986,925 UART: [state] CFI Enabled
3,094,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,108,075 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,234 UART: [kat] ++
895,386 UART: [kat] sha1
899,612 UART: [kat] SHA2-256
901,552 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,417 UART: [kat] LMS
1,168,729 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,170,018 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,173,996 ready_for_fw is high
1,173,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,220 UART: [idev] Erasing UDS.KEYID = 0
1,198,230 UART: [idev] Sha1 KeyId Algorithm
1,207,184 UART: [idev] --
1,208,243 UART: [ldev] ++
1,208,411 UART: [ldev] CDI.KEYID = 6
1,208,775 UART: [ldev] SUBJECT.KEYID = 5
1,209,202 UART: [ldev] AUTHORITY.KEYID = 7
1,209,665 UART: [ldev] FE.KEYID = 1
1,214,897 UART: [ldev] Erasing FE.KEYID = 1
1,241,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,911 UART: [ldev] --
1,281,389 UART: [fwproc] Wait for Commands...
1,282,204 UART: [fwproc] Recv command 0x46574c44
1,282,937 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,474 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,982 >>> mbox cmd response: success
2,768,982 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,770,077 UART: [afmc] ++
2,770,245 UART: [afmc] CDI.KEYID = 6
2,770,608 UART: [afmc] SUBJECT.KEYID = 7
2,771,034 UART: [afmc] AUTHORITY.KEYID = 5
2,807,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,801 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,176 UART: [afmc] --
2,850,232 UART: [cold-reset] --
2,851,136 UART: [state] Locking Datavault
2,852,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,055 UART: [state] Locking ICCM
2,853,719 UART: [exit] Launching FMC @ 0x40000130
2,859,048 UART:
2,859,064 UART: Running Caliptra FMC ...
2,859,472 UART:
2,859,615 UART: [state] CFI Enabled
2,870,112 UART: [fht] FMC Alias Private Key: 7
2,978,287 UART: [art] Extend RT PCRs Done
2,978,715 UART: [art] Lock RT PCRs Done
2,980,273 UART: [art] Populate DV Done
2,988,648 UART: [fht] FMC Alias Private Key: 7
2,989,796 UART: [art] Derive CDI
2,990,076 UART: [art] Store in in slot 0x4
3,075,875 UART: [art] Derive Key Pair
3,076,235 UART: [art] Store priv key in slot 0x5
3,090,071 UART: [art] Derive Key Pair - Done
3,104,654 UART: [art] Signing Cert with AUTHO
3,105,134 UART: RITY.KEYID = 7
3,120,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,155 UART: [art] PUB.X = 9861E2E4C378E8ABF320DA5A2C0215595EA1FBE99596DBEACE7B3DCF8D506E81D8F6592DD88A6B25E3C08366AEDC7DFE
3,127,946 UART: [art] PUB.Y = F99350DCB054873EB01B59070C1161BFDFD52EC390DB7DC3FC05EC2DF9E2C6D0AB5D07D73BD4562460709909144F23E4
3,134,891 UART: [art] SIG.R = 5481F0C0E5F027EE88540120F9960EDC9952B69F100554C27F1C475A6DF57203580ABB2B6F2594F2787F3633A4F83399
3,141,638 UART: [art] SIG.S = E3A226D1B7EC8767C3D19F6A715E1F6FC76863FA1895B7173B951E9DF4EDE0F849D3EF07BD21BB159F777A832C1D63C5
3,165,430 UART: Caliptra RT
3,165,775 UART: [state] CFI Enabled
3,272,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,679 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,801 ready_for_fw is high
1,056,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,676 >>> mbox cmd response: success
2,621,676 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,684,242 UART:
2,684,258 UART: Running Caliptra FMC ...
2,684,666 UART:
2,684,809 UART: [state] CFI Enabled
2,695,568 UART: [fht] FMC Alias Private Key: 7
2,803,715 UART: [art] Extend RT PCRs Done
2,804,143 UART: [art] Lock RT PCRs Done
2,805,477 UART: [art] Populate DV Done
2,813,886 UART: [fht] FMC Alias Private Key: 7
2,814,910 UART: [art] Derive CDI
2,815,190 UART: [art] Store in in slot 0x4
2,901,033 UART: [art] Derive Key Pair
2,901,393 UART: [art] Store priv key in slot 0x5
2,914,641 UART: [art] Derive Key Pair - Done
2,929,458 UART: [art] Signing Cert with AUTHO
2,929,938 UART: RITY.KEYID = 7
2,945,042 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,807 UART: [art] PUB.X = 94602A5BE09340AD36240181CBF6BA6D32A79ED48369674D3DC0C1041C6611F0729C737335567A8CF2DFEE1C8025ABB6
2,952,573 UART: [art] PUB.Y = ADC9A1AD0505F6817A4AD8802F46BD1E6A2ACC18D33EC72B9B7C2ECD0E01D8D70B3340F4F822C0A087D37FA39538A85E
2,959,526 UART: [art] SIG.R = 33C6496DCF6924A2147692ADF872110D9647418E71E1DF63D2343D663BE87479470FF259D42017906DD8780F90564E5C
2,966,275 UART: [art] SIG.S = 6ABD29D5EA3227257378B53EA55809C4CAABAC14FA590F1773A97209794307E0CC72BF641512F960D2700B67038ABB3C
2,990,282 UART: Caliptra RT
2,990,627 UART: [state] CFI Enabled
3,098,032 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,112,207 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,046 UART:
192,434 UART: Running Caliptra ROM ...
193,624 UART:
193,776 UART: [state] CFI Enabled
262,743 UART: [state] LifecycleState = Unprovisioned
264,734 UART: [state] DebugLocked = No
267,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,125 UART: [kat] SHA2-256
440,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,383 UART: [kat] ++
451,906 UART: [kat] sha1
463,208 UART: [kat] SHA2-256
465,852 UART: [kat] SHA2-384
472,114 UART: [kat] SHA2-512-ACC
474,472 UART: [kat] ECC-384
2,768,868 UART: [kat] HMAC-384Kdf
2,798,728 UART: [kat] LMS
3,989,033 UART: [kat] --
3,994,182 UART: [cold-reset] ++
3,995,331 UART: [fht] Storing FHT @ 0x50003400
4,008,361 UART: [idev] ++
4,009,000 UART: [idev] CDI.KEYID = 6
4,009,924 UART: [idev] SUBJECT.KEYID = 7
4,011,166 UART: [idev] UDS.KEYID = 0
4,012,200 ready_for_fw is high
4,012,395 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,576 UART: [idev] Erasing UDS.KEYID = 0
7,344,384 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,398 UART: [idev] --
7,370,705 UART: [ldev] ++
7,371,269 UART: [ldev] CDI.KEYID = 6
7,372,230 UART: [ldev] SUBJECT.KEYID = 5
7,373,435 UART: [ldev] AUTHORITY.KEYID = 7
7,374,945 UART: [ldev] FE.KEYID = 1
7,421,593 UART: [ldev] Erasing FE.KEYID = 1
10,751,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,738 UART: [ldev] --
13,113,612 UART: [fwproc] Waiting for Commands...
13,115,859 UART: [fwproc] Received command 0x46574c44
13,118,086 UART: [fwproc] Received Image of size 113844 bytes
17,170,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,985 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,583 >>> mbox cmd response: success
17,637,880 UART: [afmc] ++
17,638,491 UART: [afmc] CDI.KEYID = 6
17,639,396 UART: [afmc] SUBJECT.KEYID = 7
17,640,605 UART: [afmc] AUTHORITY.KEYID = 5
21,009,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,704 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,113 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,931 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,366 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,451 UART: [afmc] --
23,381,031 UART: [cold-reset] --
23,386,033 UART: [state] Locking Datavault
23,391,609 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,361 UART: [state] Locking ICCM
23,395,125 UART: [exit] Launching FMC @ 0x40000130
23,403,517 UART:
23,403,773 UART: Running Caliptra FMC ...
23,404,869 UART:
23,405,025 UART: [state] CFI Enabled
23,466,201 UART: [fht] FMC Alias Private Key: 7
25,804,799 UART: [art] Extend RT PCRs Done
25,806,021 UART: [art] Lock RT PCRs Done
25,807,425 UART: [art] Populate DV Done
25,812,452 UART: [fht] FMC Alias Private Key: 7
25,813,941 UART: [art] Derive CDI
25,814,695 UART: [art] Store in in slot 0x4
25,874,057 UART: [art] Derive Key Pair
25,875,096 UART: [art] Store priv key in slot 0x5
29,167,211 UART: [art] Derive Key Pair - Done
29,180,423 UART: [art] Signing Cert with AUTHO
29,181,720 UART: RITY.KEYID = 7
31,468,558 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,079 UART: [art] PUB.X = 8DEF6910A098EF089779861B8AFE4CEDEE471B8E395A8CEA1D310F3BC02A29015BDDD8B4E1C93C0E1A4E92A839B8C171
31,477,298 UART: [art] PUB.Y = 6B7554AAA3A9A3A4F630F682EEDC15F79171AB959507EF9F691C017C3F9F22C163BA1F3B15A18291F98BC2BF1AEF702E
31,484,550 UART: [art] SIG.R = FF260A301950C1476343599DB70030785237F2DAED5E86F478AEF519431071471BC009AFA576181F49079ACA2EEC1863
31,491,905 UART: [art] SIG.S = 3801A2D458FA61E777B4D17D49514D9DE75AFE211E6F9DFD7E099C109F6E25BD9DA188976D8FCC1F7812BACE8EF3A3D7
32,797,038 UART: Caliptra RT
32,797,751 UART: [state] CFI Enabled
32,958,282 UART: [rt] RT listening for mailbox commands...
32,961,035 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,992,937 UART: [rt]cmd =0x53494756, len=196
34,284,625 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,785,263 ready_for_fw is high
3,785,833 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,842,850 >>> mbox cmd response: success
23,523,888 UART:
23,524,313 UART: Running Caliptra FMC ...
23,525,637 UART:
23,525,800 UART: [state] CFI Enabled
23,595,559 UART: [fht] FMC Alias Private Key: 7
25,933,614 UART: [art] Extend RT PCRs Done
25,934,849 UART: [art] Lock RT PCRs Done
25,936,638 UART: [art] Populate DV Done
25,941,996 UART: [fht] FMC Alias Private Key: 7
25,943,532 UART: [art] Derive CDI
25,944,294 UART: [art] Store in in slot 0x4
26,006,693 UART: [art] Derive Key Pair
26,007,743 UART: [art] Store priv key in slot 0x5
29,300,949 UART: [art] Derive Key Pair - Done
29,313,621 UART: [art] Signing Cert with AUTHO
29,314,926 UART: RITY.KEYID = 7
31,601,766 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,267 UART: [art] PUB.X = 575CB5C14913CAD5CB61AB3CB690DBA2327D60F5E3AAE5A02A7642FFCE6485638E12D83A3AEB79D82A23C9145DD02666
31,610,532 UART: [art] PUB.Y = D9DAB4D802A09F7F2E58BD3CDF8A51181C0C91C799813AAECF81FF39EEE03B78FF52FED73654259AF648633577DCE96D
31,617,785 UART: [art] SIG.R = 5DECEE848D50567202F6871FB2FE374CCBA12C84BBC72BC78332EA7A0100FA1BF2629577586D921DB380FB7B157C429D
31,625,171 UART: [art] SIG.S = B0205CF69C9D27716E0029079AB5872E6379897CBF69546AEA77D14FAA19E05FB5FF18CD5A8A7EFC04704DB665DB9858
32,930,147 UART: Caliptra RT
32,930,865 UART: [state] CFI Enabled
33,090,844 UART: [rt] RT listening for mailbox commands...
33,093,646 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,125,748 UART: [rt]cmd =0x53494756, len=196
34,417,436 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,498 UART:
192,862 UART: Running Caliptra ROM ...
194,045 UART:
603,634 UART: [state] CFI Enabled
615,194 UART: [state] LifecycleState = Unprovisioned
617,156 UART: [state] DebugLocked = No
619,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,747 UART: [kat] SHA2-256
795,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,966 UART: [kat] ++
806,460 UART: [kat] sha1
817,336 UART: [kat] SHA2-256
820,055 UART: [kat] SHA2-384
825,633 UART: [kat] SHA2-512-ACC
828,002 UART: [kat] ECC-384
3,113,119 UART: [kat] HMAC-384Kdf
3,125,774 UART: [kat] LMS
4,315,930 UART: [kat] --
4,319,772 UART: [cold-reset] ++
4,321,131 UART: [fht] Storing FHT @ 0x50003400
4,333,536 UART: [idev] ++
4,334,170 UART: [idev] CDI.KEYID = 6
4,335,077 UART: [idev] SUBJECT.KEYID = 7
4,336,342 UART: [idev] UDS.KEYID = 0
4,337,385 ready_for_fw is high
4,337,595 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,016 UART: [idev] Erasing UDS.KEYID = 0
7,627,421 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,409 UART: [idev] --
7,652,505 UART: [ldev] ++
7,653,078 UART: [ldev] CDI.KEYID = 6
7,654,095 UART: [ldev] SUBJECT.KEYID = 5
7,655,259 UART: [ldev] AUTHORITY.KEYID = 7
7,656,499 UART: [ldev] FE.KEYID = 1
7,667,470 UART: [ldev] Erasing FE.KEYID = 1
10,956,848 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,237 UART: [ldev] --
13,316,202 UART: [fwproc] Waiting for Commands...
13,318,685 UART: [fwproc] Received command 0x46574c44
13,320,867 UART: [fwproc] Received Image of size 113844 bytes
17,365,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,825,099 >>> mbox cmd response: success
17,828,744 UART: [afmc] ++
17,829,353 UART: [afmc] CDI.KEYID = 6
17,830,265 UART: [afmc] SUBJECT.KEYID = 7
17,831,535 UART: [afmc] AUTHORITY.KEYID = 5
21,152,546 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,436 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,742 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,101 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,914 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,347 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,613 UART: [afmc] --
23,518,271 UART: [cold-reset] --
23,522,624 UART: [state] Locking Datavault
23,527,112 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,865 UART: [state] Locking ICCM
23,531,071 UART: [exit] Launching FMC @ 0x40000130
23,539,423 UART:
23,539,662 UART: Running Caliptra FMC ...
23,540,767 UART:
23,540,927 UART: [state] CFI Enabled
23,548,977 UART: [fht] FMC Alias Private Key: 7
25,879,741 UART: [art] Extend RT PCRs Done
25,880,961 UART: [art] Lock RT PCRs Done
25,882,873 UART: [art] Populate DV Done
25,888,614 UART: [fht] FMC Alias Private Key: 7
25,890,154 UART: [art] Derive CDI
25,890,967 UART: [art] Store in in slot 0x4
25,933,615 UART: [art] Derive Key Pair
25,934,653 UART: [art] Store priv key in slot 0x5
29,176,656 UART: [art] Derive Key Pair - Done
29,189,690 UART: [art] Signing Cert with AUTHO
29,191,019 UART: RITY.KEYID = 7
31,470,202 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,701 UART: [art] PUB.X = 19688963A6416C61016EB9955DA19DFCC33030C5FDA1B748FDDDC37ED54437CF071DCB3B9375164015DF708647207DA2
31,478,909 UART: [art] PUB.Y = 05D3CEAD793375A61B6F29615826F7F6AB6E364256C853FA3644104C5F63A80FACEB0CF13869DDEBCEFA27D586A738D1
31,486,152 UART: [art] SIG.R = 0AB3B022E015E31F194F141F473F54E8222D22152F784DFA3BB671F97C0D55C77CC455320A27F6C6FFA5CE84CADC5D13
31,493,558 UART: [art] SIG.S = 49A601BA708E1E9A4B225E53DD60A91D3A8C32FD252B391C01F95961DDF2542E70B19C6DAAF1B88DD3E4BB748ACB80F0
32,798,802 UART: Caliptra RT
32,799,502 UART: [state] CFI Enabled
32,917,220 UART: [rt] RT listening for mailbox commands...
32,919,963 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,952,312 UART: [rt]cmd =0x53494756, len=196
34,243,599 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
4,127,137 ready_for_fw is high
4,127,737 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,065,320 >>> mbox cmd response: success
23,701,394 UART:
23,701,806 UART: Running Caliptra FMC ...
23,702,948 UART:
23,703,113 UART: [state] CFI Enabled
23,711,126 UART: [fht] FMC Alias Private Key: 7
26,041,730 UART: [art] Extend RT PCRs Done
26,042,963 UART: [art] Lock RT PCRs Done
26,044,918 UART: [art] Populate DV Done
26,050,065 UART: [fht] FMC Alias Private Key: 7
26,051,704 UART: [art] Derive CDI
26,052,451 UART: [art] Store in in slot 0x4
26,095,100 UART: [art] Derive Key Pair
26,096,109 UART: [art] Store priv key in slot 0x5
29,338,146 UART: [art] Derive Key Pair - Done
29,351,097 UART: [art] Signing Cert with AUTHO
29,352,424 UART: RITY.KEYID = 7
31,631,464 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,968 UART: [art] PUB.X = 55D3D294D35C855FC064049453F14F62080C224DDDD9FEF341D02EAFC1275895E7B3627EBA9B8651134272DCE116B75F
31,640,173 UART: [art] PUB.Y = 8A04F3C6AA545F52592AA7A40000FE218250A69DCF8AA04888864C4741FA3056595020DD072038597FB500D0B2D62ACA
31,647,364 UART: [art] SIG.R = 38C11375E268AA52EA0B5957DC49734AEE66E76C7174EA3567FC4CFB51507DA01D2ECF81C05FF308B3ED713AED398CEF
31,654,807 UART: [art] SIG.S = 090AC5210059F053A4A2065090A85C76BFEAFC14158BB0C267BB06134573B6DB61EFF05651B5896645D5F243A4D468FF
32,959,882 UART: Caliptra RT
32,960,590 UART: [state] CFI Enabled
33,078,787 UART: [rt] RT listening for mailbox commands...
33,081,547 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,113,542 UART: [rt]cmd =0x53494756, len=196
34,405,160 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,997 UART:
192,382 UART: Running Caliptra ROM ...
193,575 UART:
193,734 UART: [state] CFI Enabled
264,542 UART: [state] LifecycleState = Unprovisioned
266,309 UART: [state] DebugLocked = No
268,554 UART: [state] WD Timer not started. Device not locked for debugging
273,094 UART: [kat] SHA2-256
452,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,727 UART: [kat] ++
464,270 UART: [kat] sha1
475,221 UART: [kat] SHA2-256
478,228 UART: [kat] SHA2-384
483,716 UART: [kat] SHA2-512-ACC
486,655 UART: [kat] ECC-384
2,952,713 UART: [kat] HMAC-384Kdf
2,972,911 UART: [kat] LMS
3,502,353 UART: [kat] --
3,507,343 UART: [cold-reset] ++
3,508,854 UART: [fht] FHT @ 0x50003400
3,520,327 UART: [idev] ++
3,520,890 UART: [idev] CDI.KEYID = 6
3,521,920 UART: [idev] SUBJECT.KEYID = 7
3,523,021 UART: [idev] UDS.KEYID = 0
3,523,971 ready_for_fw is high
3,524,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,933 UART: [idev] Erasing UDS.KEYID = 0
6,027,604 UART: [idev] Sha1 KeyId Algorithm
6,050,615 UART: [idev] --
6,054,236 UART: [ldev] ++
6,054,811 UART: [ldev] CDI.KEYID = 6
6,055,727 UART: [ldev] SUBJECT.KEYID = 5
6,056,831 UART: [ldev] AUTHORITY.KEYID = 7
6,058,136 UART: [ldev] FE.KEYID = 1
6,101,944 UART: [ldev] Erasing FE.KEYID = 1
8,605,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,331 UART: [ldev] --
10,418,217 UART: [fwproc] Wait for Commands...
10,419,773 UART: [fwproc] Recv command 0x46574c44
10,421,814 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,273,786 >>> mbox cmd response: success
14,277,910 UART: [afmc] ++
14,278,528 UART: [afmc] CDI.KEYID = 6
14,279,493 UART: [afmc] SUBJECT.KEYID = 7
14,280,595 UART: [afmc] AUTHORITY.KEYID = 5
16,807,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,142 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,987 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,160 UART: [afmc] --
18,607,824 UART: [cold-reset] --
18,613,362 UART: [state] Locking Datavault
18,618,614 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,262 UART: [state] Locking ICCM
18,621,876 UART: [exit] Launching FMC @ 0x40000130
18,630,279 UART:
18,630,541 UART: Running Caliptra FMC ...
18,631,646 UART:
18,631,801 UART: [state] CFI Enabled
18,689,625 UART: [fht] FMC Alias Private Key: 7
20,453,780 UART: [art] Extend RT PCRs Done
20,454,998 UART: [art] Lock RT PCRs Done
20,457,034 UART: [art] Populate DV Done
20,462,454 UART: [fht] FMC Alias Private Key: 7
20,464,105 UART: [art] Derive CDI
20,464,918 UART: [art] Store in in slot 0x4
20,521,690 UART: [art] Derive Key Pair
20,522,727 UART: [art] Store priv key in slot 0x5
22,985,796 UART: [art] Derive Key Pair - Done
22,998,501 UART: [art] Signing Cert with AUTHO
22,999,802 UART: RITY.KEYID = 7
24,712,418 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,936 UART: [art] PUB.X = 9D4631407CD9C666CC6E67C637B14E7FFD4983451C78C9C62A4642E232F2566007A2810B9FFA5F577AB5E27823D68D59
24,721,192 UART: [art] PUB.Y = 43264B35FA1B2A923E5F2D6AD1356CBF722D906A64F6B16C74A66C57E451AE90BC6F2F39DB9698284D901C9DB0343C40
24,728,441 UART: [art] SIG.R = 31985B8C8F6C275401B64B4A9B59EE0E1877419CA2D3D5B6CA8D730CBE76CAA84A290245C597299487FF16A920744DB2
24,735,818 UART: [art] SIG.S = FBC0504EE6E376D6D9DC3EAFE4B22A462D681FB7B0B0C7A3737B087EDBBD17960BF5C30E6508697B2C6D7CFFBF87BC5C
25,714,833 UART: Caliptra RT
25,715,541 UART: [state] CFI Enabled
25,879,482 UART: [rt] RT listening for mailbox commands...
25,882,259 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,914,482 UART: [rt]cmd =0x53494756, len=196
26,880,098 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,377,739 ready_for_fw is high
3,378,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,067,861 >>> mbox cmd response: success
18,364,835 UART:
18,365,367 UART: Running Caliptra FMC ...
18,366,482 UART:
18,366,646 UART: [state] CFI Enabled
18,433,289 UART: [fht] FMC Alias Private Key: 7
20,196,731 UART: [art] Extend RT PCRs Done
20,197,953 UART: [art] Lock RT PCRs Done
20,199,501 UART: [art] Populate DV Done
20,204,701 UART: [fht] FMC Alias Private Key: 7
20,206,414 UART: [art] Derive CDI
20,207,233 UART: [art] Store in in slot 0x4
20,265,747 UART: [art] Derive Key Pair
20,266,788 UART: [art] Store priv key in slot 0x5
22,729,779 UART: [art] Derive Key Pair - Done
22,742,774 UART: [art] Signing Cert with AUTHO
22,744,099 UART: RITY.KEYID = 7
24,455,961 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,466 UART: [art] PUB.X = 6AA31D7EC7FE9F0E16D6ADF1D0008A6B5CE4F5B0EC4690C116379C1C8FB5C65B870108149FE3FF7B4A1CB97B83E9FEC6
24,464,777 UART: [art] PUB.Y = E9AD965F5BC4A3C0F5AAFCD7B0AC8D913F9281947F2B452DE9FE912C9F68C111B97BF953D88D2EAAED75D74ABCD1AFE6
24,472,078 UART: [art] SIG.R = 95D127849693E0CE97DAF5710EAF33677CD2A930C9FA1A48CA3DF5C9750C04DFF7D141EBE629E1AEAC43416B71A9E26F
24,479,462 UART: [art] SIG.S = F73BB27302BDDC604C8DF5DAE8F335CA1E742F79B497417395114CC9D2A261039E5295B51FBEDBACCD63DED88F57B11A
25,458,362 UART: Caliptra RT
25,459,071 UART: [state] CFI Enabled
25,624,688 UART: [rt] RT listening for mailbox commands...
25,627,508 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,659,372 UART: [rt]cmd =0x53494756, len=196
26,624,791 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
192,945 UART:
193,324 UART: Running Caliptra ROM ...
194,503 UART:
604,237 UART: [state] CFI Enabled
615,425 UART: [state] LifecycleState = Unprovisioned
617,306 UART: [state] DebugLocked = No
618,762 UART: [state] WD Timer not started. Device not locked for debugging
621,731 UART: [kat] SHA2-256
800,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,447 UART: [kat] ++
812,902 UART: [kat] sha1
824,416 UART: [kat] SHA2-256
827,431 UART: [kat] SHA2-384
834,491 UART: [kat] SHA2-512-ACC
837,428 UART: [kat] ECC-384
3,282,447 UART: [kat] HMAC-384Kdf
3,293,641 UART: [kat] LMS
3,823,089 UART: [kat] --
3,827,504 UART: [cold-reset] ++
3,829,076 UART: [fht] FHT @ 0x50003400
3,838,365 UART: [idev] ++
3,838,967 UART: [idev] CDI.KEYID = 6
3,839,885 UART: [idev] SUBJECT.KEYID = 7
3,841,058 UART: [idev] UDS.KEYID = 0
3,841,983 ready_for_fw is high
3,842,181 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,415 UART: [idev] Erasing UDS.KEYID = 0
6,311,155 UART: [idev] Sha1 KeyId Algorithm
6,334,704 UART: [idev] --
6,338,917 UART: [ldev] ++
6,339,486 UART: [ldev] CDI.KEYID = 6
6,340,374 UART: [ldev] SUBJECT.KEYID = 5
6,341,524 UART: [ldev] AUTHORITY.KEYID = 7
6,342,807 UART: [ldev] FE.KEYID = 1
6,353,537 UART: [ldev] Erasing FE.KEYID = 1
8,823,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,555,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,939 UART: [ldev] --
10,612,553 UART: [fwproc] Wait for Commands...
10,614,108 UART: [fwproc] Recv command 0x46574c44
10,616,199 UART: [fwproc] Recv'd Img size: 114168 bytes
14,014,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,478,124 >>> mbox cmd response: success
14,482,054 UART: [afmc] ++
14,482,658 UART: [afmc] CDI.KEYID = 6
14,483,570 UART: [afmc] SUBJECT.KEYID = 7
14,484,785 UART: [afmc] AUTHORITY.KEYID = 5
16,991,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,175 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,072 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,933 UART: [afmc] --
18,787,826 UART: [cold-reset] --
18,790,549 UART: [state] Locking Datavault
18,795,205 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,941 UART: [state] Locking ICCM
18,798,988 UART: [exit] Launching FMC @ 0x40000130
18,807,407 UART:
18,807,647 UART: Running Caliptra FMC ...
18,808,750 UART:
18,808,917 UART: [state] CFI Enabled
18,816,913 UART: [fht] FMC Alias Private Key: 7
20,573,285 UART: [art] Extend RT PCRs Done
20,574,506 UART: [art] Lock RT PCRs Done
20,576,561 UART: [art] Populate DV Done
20,581,973 UART: [fht] FMC Alias Private Key: 7
20,583,724 UART: [art] Derive CDI
20,584,540 UART: [art] Store in in slot 0x4
20,627,217 UART: [art] Derive Key Pair
20,628,210 UART: [art] Store priv key in slot 0x5
23,055,225 UART: [art] Derive Key Pair - Done
23,068,645 UART: [art] Signing Cert with AUTHO
23,069,945 UART: RITY.KEYID = 7
24,774,932 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,437 UART: [art] PUB.X = CC947803C9051996885E96875772D3A65AE415B8F98E13C1DE7D57B48A383F2EB9CD2FE178BF74F02B6DCAC8E1B298BE
24,783,687 UART: [art] PUB.Y = 369808087FAB0FB9DFF4D00251EBE408335AE2CF8BA929D14202A710C5C3F6E8E1F5E2A37063FC84D097EE4BA38FF75F
24,790,983 UART: [art] SIG.R = 827B924F075F37D32F6F0681411751E1C3ED3D86481C25223A661B902350298C259D0597385E5F53BCC0F97D684DB601
24,798,341 UART: [art] SIG.S = 58D25FBC4533140517D4D80FD5AD62CAA042EF629A2C8D6C7C9F605A389F241EAA0DF0FC3C9947F6D7A10BBC7A7253DC
25,776,984 UART: Caliptra RT
25,777,697 UART: [state] CFI Enabled
25,893,677 UART: [rt] RT listening for mailbox commands...
25,896,455 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,928,387 UART: [rt]cmd =0x53494756, len=196
26,893,821 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
3,697,559 ready_for_fw is high
3,698,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,119 >>> mbox cmd response: success
18,520,466 UART:
18,520,891 UART: Running Caliptra FMC ...
18,522,000 UART:
18,522,174 UART: [state] CFI Enabled
18,529,768 UART: [fht] FMC Alias Private Key: 7
20,286,667 UART: [art] Extend RT PCRs Done
20,287,899 UART: [art] Lock RT PCRs Done
20,289,549 UART: [art] Populate DV Done
20,295,130 UART: [fht] FMC Alias Private Key: 7
20,296,668 UART: [art] Derive CDI
20,297,407 UART: [art] Store in in slot 0x4
20,339,785 UART: [art] Derive Key Pair
20,340,988 UART: [art] Store priv key in slot 0x5
22,767,517 UART: [art] Derive Key Pair - Done
22,780,737 UART: [art] Signing Cert with AUTHO
22,782,047 UART: RITY.KEYID = 7
24,487,457 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,972 UART: [art] PUB.X = 762FF9624AD8537D915426DC020AE370D5A4450DD246CF374663DDB711294A0500A4C412229060880089146484C539C5
24,496,118 UART: [art] PUB.Y = F0BEB898F082C4C76B22B458ADB0C5B9A99839FA009F795746BC3ADFF7E8DA489A0D3B4C76E9F0380F7D18BBCAD85FE6
24,503,411 UART: [art] SIG.R = D5769C1EAFF949A8E4FCA6F37DF39C8CF3436AF59D4F6632FEAAC223280A5265DFDA1FEA0D258D02C8FF1F24FAB180AB
24,510,832 UART: [art] SIG.S = 8A87D395917DB45060B01C4F1CBC1997A91892C1D71778A35F4294CE564C260A579B4CBCCB35C47272328D07BAF1FD28
25,489,385 UART: Caliptra RT
25,490,090 UART: [state] CFI Enabled
25,607,690 UART: [rt] RT listening for mailbox commands...
25,610,491 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,642,740 UART: [rt]cmd =0x53494756, len=196
26,608,261 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,146 UART:
192,523 UART: Running Caliptra ROM ...
193,635 UART:
193,780 UART: [state] CFI Enabled
265,743 UART: [state] LifecycleState = Unprovisioned
268,160 UART: [state] DebugLocked = No
269,748 UART: [state] WD Timer not started. Device not locked for debugging
274,783 UART: [kat] SHA2-256
464,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,426 UART: [kat] ++
475,868 UART: [kat] sha1
488,109 UART: [kat] SHA2-256
491,152 UART: [kat] SHA2-384
496,172 UART: [kat] SHA2-512-ACC
498,694 UART: [kat] ECC-384
2,952,074 UART: [kat] HMAC-384Kdf
2,972,448 UART: [kat] LMS
3,504,261 UART: [kat] --
3,508,752 UART: [cold-reset] ++
3,510,758 UART: [fht] FHT @ 0x50003400
3,522,726 UART: [idev] ++
3,523,440 UART: [idev] CDI.KEYID = 6
3,524,551 UART: [idev] SUBJECT.KEYID = 7
3,525,614 UART: [idev] UDS.KEYID = 0
3,526,511 ready_for_fw is high
3,526,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,183 UART: [idev] Erasing UDS.KEYID = 0
6,032,545 UART: [idev] Sha1 KeyId Algorithm
6,054,123 UART: [idev] --
6,058,748 UART: [ldev] ++
6,059,438 UART: [ldev] CDI.KEYID = 6
6,060,357 UART: [ldev] SUBJECT.KEYID = 5
6,061,517 UART: [ldev] AUTHORITY.KEYID = 7
6,062,746 UART: [ldev] FE.KEYID = 1
6,101,690 UART: [ldev] Erasing FE.KEYID = 1
8,607,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,087 UART: [ldev] --
10,414,554 UART: [fwproc] Wait for Commands...
10,416,017 UART: [fwproc] Recv command 0x46574c44
10,417,978 UART: [fwproc] Recv'd Img size: 114168 bytes
13,867,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,532 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,600,928 >>> mbox cmd response: success
14,605,100 UART: [afmc] ++
14,605,811 UART: [afmc] CDI.KEYID = 6
14,606,929 UART: [afmc] SUBJECT.KEYID = 7
14,608,484 UART: [afmc] AUTHORITY.KEYID = 5
17,146,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,086 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,130 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,876 UART: [afmc] --
18,945,040 UART: [cold-reset] --
18,947,781 UART: [state] Locking Datavault
18,953,988 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,148 UART: [state] Locking ICCM
18,957,927 UART: [exit] Launching FMC @ 0x40000130
18,966,567 UART:
18,966,839 UART: Running Caliptra FMC ...
18,967,948 UART:
18,968,108 UART: [state] CFI Enabled
19,030,091 UART: [fht] FMC Alias Private Key: 7
20,794,415 UART: [art] Extend RT PCRs Done
20,795,635 UART: [art] Lock RT PCRs Done
20,797,345 UART: [art] Populate DV Done
20,802,756 UART: [fht] FMC Alias Private Key: 7
20,804,566 UART: [art] Derive CDI
20,805,335 UART: [art] Store in in slot 0x4
20,863,362 UART: [art] Derive Key Pair
20,864,363 UART: [art] Store priv key in slot 0x5
23,327,229 UART: [art] Derive Key Pair - Done
23,339,854 UART: [art] Signing Cert with AUTHO
23,341,154 UART: RITY.KEYID = 7
25,054,917 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,432 UART: [art] PUB.X = 2417B270CA12EFB9F97CE740798C1C1E99519C837F785F0AF6DCB99F5B6A46D2D64FE7B5AB0550DBCBE29336B6C7A08B
25,063,696 UART: [art] PUB.Y = E3B2071679B5F8439182F79B8CB6C6F5E35FD5CCA65B9DC05A4CC585A91E4D6C42965AA31056FF67560EA6375C08565D
25,070,962 UART: [art] SIG.R = 7D50923F2224E65256CA2F9BBDACF62437EF3E24F38D50A9DB1E2584DA615EEB276B5AE37CE334885A576F67DCEA1D9A
25,078,348 UART: [art] SIG.S = AB83B8507660D9EBCFC2D729C6C6085D8FD3C5832E0A6EAB707552740E7AB706A670F6A1BD4C8E2DD3BD42E07A451225
26,057,828 UART: Caliptra RT
26,058,542 UART: [state] CFI Enabled
26,222,309 UART: [rt] RT listening for mailbox commands...
26,225,173 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,257,051 UART: [rt]cmd =0x53494756, len=196
27,222,482 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,439,618 ready_for_fw is high
3,440,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,737,065 >>> mbox cmd response: success
19,022,738 UART:
19,023,169 UART: Running Caliptra FMC ...
19,024,310 UART:
19,024,478 UART: [state] CFI Enabled
19,092,495 UART: [fht] FMC Alias Private Key: 7
20,857,087 UART: [art] Extend RT PCRs Done
20,858,318 UART: [art] Lock RT PCRs Done
20,860,139 UART: [art] Populate DV Done
20,865,502 UART: [fht] FMC Alias Private Key: 7
20,867,117 UART: [art] Derive CDI
20,867,936 UART: [art] Store in in slot 0x4
20,924,823 UART: [art] Derive Key Pair
20,925,867 UART: [art] Store priv key in slot 0x5
23,388,532 UART: [art] Derive Key Pair - Done
23,401,638 UART: [art] Signing Cert with AUTHO
23,402,987 UART: RITY.KEYID = 7
25,114,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,009 UART: [art] PUB.X = 523977E2BDF16B9022749A72F64E37C820749F7D8FC4E3A7E46BBF35A2420075574DB22997AD05826F0951C4E485A4B1
25,123,254 UART: [art] PUB.Y = 6337D8CCBCA72F2944E9FE2A5F73AA79CD09670CCF59B51EB42FD25ACE3CE835A344B07B5D441A329D7A658C67CA38C4
25,130,543 UART: [art] SIG.R = C4E1A47E888370B525C27B9874875DFD45AE6528E550CBD6A0CD4FA943D4F01695E016268D400D3F9F9889C5305FC87C
25,137,926 UART: [art] SIG.S = D2BDAD9870EC4CFCD84FAF33DC432C4928269655379A099ECDF35604D2118766D5E3737AC677AB520E53F2991BE84800
26,117,206 UART: Caliptra RT
26,117,917 UART: [state] CFI Enabled
26,281,693 UART: [rt] RT listening for mailbox commands...
26,284,543 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,316,609 UART: [rt]cmd =0x53494756, len=196
27,282,486 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,630 writing to cptra_bootfsm_go
192,902 UART:
193,260 UART: Running Caliptra ROM ...
194,557 UART:
603,974 UART: [state] CFI Enabled
615,799 UART: [state] LifecycleState = Unprovisioned
618,165 UART: [state] DebugLocked = No
619,626 UART: [state] WD Timer not started. Device not locked for debugging
624,295 UART: [kat] SHA2-256
814,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,914 UART: [kat] ++
825,461 UART: [kat] sha1
836,309 UART: [kat] SHA2-256
839,343 UART: [kat] SHA2-384
844,114 UART: [kat] SHA2-512-ACC
846,708 UART: [kat] ECC-384
3,287,916 UART: [kat] HMAC-384Kdf
3,299,511 UART: [kat] LMS
3,831,348 UART: [kat] --
3,835,866 UART: [cold-reset] ++
3,837,306 UART: [fht] FHT @ 0x50003400
3,849,071 UART: [idev] ++
3,849,717 UART: [idev] CDI.KEYID = 6
3,850,674 UART: [idev] SUBJECT.KEYID = 7
3,851,923 UART: [idev] UDS.KEYID = 0
3,852,825 ready_for_fw is high
3,853,017 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,996,410 UART: [idev] Erasing UDS.KEYID = 0
6,327,427 UART: [idev] Sha1 KeyId Algorithm
6,350,115 UART: [idev] --
6,353,427 UART: [ldev] ++
6,354,107 UART: [ldev] CDI.KEYID = 6
6,354,992 UART: [ldev] SUBJECT.KEYID = 5
6,356,206 UART: [ldev] AUTHORITY.KEYID = 7
6,357,439 UART: [ldev] FE.KEYID = 1
6,368,849 UART: [ldev] Erasing FE.KEYID = 1
8,845,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,725 UART: [ldev] --
10,636,938 UART: [fwproc] Wait for Commands...
10,639,734 UART: [fwproc] Recv command 0x46574c44
10,641,996 UART: [fwproc] Recv'd Img size: 114168 bytes
14,085,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,280,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,821,675 >>> mbox cmd response: success
14,826,608 UART: [afmc] ++
14,827,316 UART: [afmc] CDI.KEYID = 6
14,828,564 UART: [afmc] SUBJECT.KEYID = 7
14,830,006 UART: [afmc] AUTHORITY.KEYID = 5
17,329,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,050,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,052,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,067,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,083,134 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,098,137 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,121,831 UART: [afmc] --
19,125,640 UART: [cold-reset] --
19,128,966 UART: [state] Locking Datavault
19,133,428 UART: [state] Locking PCR0, PCR1 and PCR31
19,135,580 UART: [state] Locking ICCM
19,137,300 UART: [exit] Launching FMC @ 0x40000130
19,145,973 UART:
19,146,211 UART: Running Caliptra FMC ...
19,147,310 UART:
19,147,472 UART: [state] CFI Enabled
19,155,409 UART: [fht] FMC Alias Private Key: 7
20,912,701 UART: [art] Extend RT PCRs Done
20,913,923 UART: [art] Lock RT PCRs Done
20,915,729 UART: [art] Populate DV Done
20,921,038 UART: [fht] FMC Alias Private Key: 7
20,922,615 UART: [art] Derive CDI
20,923,354 UART: [art] Store in in slot 0x4
20,965,834 UART: [art] Derive Key Pair
20,966,832 UART: [art] Store priv key in slot 0x5
23,393,746 UART: [art] Derive Key Pair - Done
23,406,402 UART: [art] Signing Cert with AUTHO
23,407,732 UART: RITY.KEYID = 7
25,112,736 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,240 UART: [art] PUB.X = 037A677B6E60B6926A0E9D8FFA0D94790CD3E9B82B3D6F04E6365709539CC9695C8EC25DA68282A6A80E3656CCA58DBA
25,121,486 UART: [art] PUB.Y = 57506684EDE86FF76F721E877D3598E10A98FD46B8A9BBBD56EBF17B5AF5E0AA9FA59A10C752A13B1D9D08BCC480751E
25,128,820 UART: [art] SIG.R = 6D30AD3E069902007A1FA85350DD826C971EEF0D8593FC33B12A1D4611A6D9FD18C966941303A9EEC8FAFCFA71F155B3
25,136,161 UART: [art] SIG.S = 0B69BA6A60F8E147A482C87847019DD050112FF68A311BED9A1B3EEC96A776FE4B489BB9EDAEC859DE7B8D183232215E
26,115,288 UART: Caliptra RT
26,115,974 UART: [state] CFI Enabled
26,232,657 UART: [rt] RT listening for mailbox commands...
26,235,434 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,267,596 UART: [rt]cmd =0x53494756, len=196
27,233,179 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,626 writing to cptra_bootfsm_go
3,753,292 ready_for_fw is high
3,753,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,257 >>> mbox cmd response: success
19,207,392 UART:
19,207,781 UART: Running Caliptra FMC ...
19,208,986 UART:
19,209,154 UART: [state] CFI Enabled
19,217,160 UART: [fht] FMC Alias Private Key: 7
20,973,519 UART: [art] Extend RT PCRs Done
20,974,746 UART: [art] Lock RT PCRs Done
20,976,398 UART: [art] Populate DV Done
20,982,143 UART: [fht] FMC Alias Private Key: 7
20,983,721 UART: [art] Derive CDI
20,984,460 UART: [art] Store in in slot 0x4
21,027,543 UART: [art] Derive Key Pair
21,028,545 UART: [art] Store priv key in slot 0x5
23,455,560 UART: [art] Derive Key Pair - Done
23,468,572 UART: [art] Signing Cert with AUTHO
23,469,902 UART: RITY.KEYID = 7
25,175,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,003 UART: [art] PUB.X = E2AB45AFD32387DEF988D0B83899FF12B83257879D52E0CCC4B71696927F182CEC8CE4815031B2370DBA5164181A7A47
25,184,252 UART: [art] PUB.Y = 6AC21B4A6A9E72A5A303649FFD734C0EBF35FFBB4BB0948EE4E071271304ED3F527E020FE8779E37E21A63D800E4BDB7
25,191,485 UART: [art] SIG.R = 0C26658FB3A897499367A58D280BAAB7C7DC5317215F1FC968FFEC05DC03BCCB82AA9A7522C9511FB4B71FACC58D9054
25,198,930 UART: [art] SIG.S = 7256F203F26F7C1F25B5F2512C8C6A4F7DC13C570CFF7A985C94E48A5E4F3554EDE927D27A49528E9A469CB74309B226
26,177,870 UART: Caliptra RT
26,178,579 UART: [state] CFI Enabled
26,295,870 UART: [rt] RT listening for mailbox commands...
26,298,586 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,330,624 UART: [rt]cmd =0x53494756, len=196
27,296,289 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,213 UART: [kat] SHA2-256
882,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,259 UART: [kat] ++
886,411 UART: [kat] sha1
890,843 UART: [kat] SHA2-256
892,781 UART: [kat] SHA2-384
895,658 UART: [kat] SHA2-512-ACC
897,559 UART: [kat] ECC-384
903,340 UART: [kat] HMAC-384Kdf
907,710 UART: [kat] LMS
1,475,906 UART: [kat] --
1,476,649 UART: [cold-reset] ++
1,477,211 UART: [fht] Storing FHT @ 0x50003400
1,480,196 UART: [idev] ++
1,480,364 UART: [idev] CDI.KEYID = 6
1,480,724 UART: [idev] SUBJECT.KEYID = 7
1,481,148 UART: [idev] UDS.KEYID = 0
1,481,493 ready_for_fw is high
1,481,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,104 UART: [idev] Erasing UDS.KEYID = 0
1,505,680 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,312 UART: [idev] --
1,515,323 UART: [ldev] ++
1,515,491 UART: [ldev] CDI.KEYID = 6
1,515,854 UART: [ldev] SUBJECT.KEYID = 5
1,516,280 UART: [ldev] AUTHORITY.KEYID = 7
1,516,743 UART: [ldev] FE.KEYID = 1
1,521,883 UART: [ldev] Erasing FE.KEYID = 1
1,547,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,070 UART: [ldev] --
1,586,359 UART: [fwproc] Waiting for Commands...
1,587,206 UART: [fwproc] Received command 0x46574c44
1,587,997 UART: [fwproc] Received Image of size 114168 bytes
2,884,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,045 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,890 >>> mbox cmd response: success
3,078,028 UART: [afmc] ++
3,078,196 UART: [afmc] CDI.KEYID = 6
3,078,558 UART: [afmc] SUBJECT.KEYID = 7
3,078,983 UART: [afmc] AUTHORITY.KEYID = 5
3,114,778 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,718 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,498 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,111 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,801 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,664 UART: [afmc] --
3,157,612 UART: [cold-reset] --
3,158,486 UART: [state] Locking Datavault
3,159,657 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,261 UART: [state] Locking ICCM
3,160,907 UART: [exit] Launching FMC @ 0x40000130
3,166,236 UART:
3,166,252 UART: Running Caliptra FMC ...
3,166,660 UART:
3,166,714 UART: [state] CFI Enabled
3,177,317 UART: [fht] FMC Alias Private Key: 7
3,285,592 UART: [art] Extend RT PCRs Done
3,286,020 UART: [art] Lock RT PCRs Done
3,287,434 UART: [art] Populate DV Done
3,295,587 UART: [fht] FMC Alias Private Key: 7
3,296,725 UART: [art] Derive CDI
3,297,005 UART: [art] Store in in slot 0x4
3,382,520 UART: [art] Derive Key Pair
3,382,880 UART: [art] Store priv key in slot 0x5
3,395,594 UART: [art] Derive Key Pair - Done
3,410,433 UART: [art] Signing Cert with AUTHO
3,410,913 UART: RITY.KEYID = 7
3,426,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,776 UART: [art] PUB.X = C570FB17A36FAF2035B993701180C90AD7AD8570468E1295758918CC27C7B220DB1D0D93B00C6F6FF2E89B766D695C98
3,433,537 UART: [art] PUB.Y = A16A3C8E53AE8DD4CC576665F9C8C07176ACAD08D114A96CAAB2FEDFA5B56240DD37827E3CE2FF4479920ABA70C97BFA
3,440,505 UART: [art] SIG.R = 5D996179F19728CC612E957D85FFB1610A78549651D471714626CFA8CC78D641DE87A91A0FE168182428BAD1D56B6961
3,447,263 UART: [art] SIG.S = D760E28A321ED3284ED88753E3FB7D18FAA2C3FB703C9D2C683F1E75F3097F826C111C0E9C553370747875F518CBFA36
3,470,886 UART: Caliptra RT
3,471,139 UART: [state] CFI Enabled
3,578,488 UART: [rt] RT listening for mailbox commands...
3,579,158 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,240 UART: [rt]cmd =0x53494756, len=196
3,615,718 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,903 ready_for_fw is high
1,362,903 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,992 >>> mbox cmd response: success
2,987,774 UART:
2,987,790 UART: Running Caliptra FMC ...
2,988,198 UART:
2,988,252 UART: [state] CFI Enabled
2,998,651 UART: [fht] FMC Alias Private Key: 7
3,106,604 UART: [art] Extend RT PCRs Done
3,107,032 UART: [art] Lock RT PCRs Done
3,108,864 UART: [art] Populate DV Done
3,117,241 UART: [fht] FMC Alias Private Key: 7
3,118,323 UART: [art] Derive CDI
3,118,603 UART: [art] Store in in slot 0x4
3,204,022 UART: [art] Derive Key Pair
3,204,382 UART: [art] Store priv key in slot 0x5
3,217,804 UART: [art] Derive Key Pair - Done
3,232,653 UART: [art] Signing Cert with AUTHO
3,233,133 UART: RITY.KEYID = 7
3,248,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,048 UART: [art] PUB.X = 94F1FE2516D382989BFB5227B20C897074F019A6756137525881E28AFFE7F42DC30B36C791F5420E9C74FF7C51A2E1E9
3,255,807 UART: [art] PUB.Y = 4F1D607E9BB1A4779C59BCA77A9163957D038430F232902DA4F274C0EC77F6BA7AD23CB6AD0D24965744B8BEC826554F
3,262,757 UART: [art] SIG.R = BE6A46D10DAEF6B83B7997446665D22974D724818B4111A50C8189B669E6377927C00D4FB6FFAF69CEF5A4BB26554D33
3,269,520 UART: [art] SIG.S = 2180153F2484249C4839147DDEBD091DEA4664F82F128702A9E65CF5FED10B500F5FD5C20F611968235ADA0F1D99E933
3,293,073 UART: Caliptra RT
3,293,326 UART: [state] CFI Enabled
3,401,389 UART: [rt] RT listening for mailbox commands...
3,402,059 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,397 UART: [rt]cmd =0x53494756, len=196
3,438,719 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,900 UART: [kat] SHA2-256
881,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,946 UART: [kat] ++
886,098 UART: [kat] sha1
890,198 UART: [kat] SHA2-256
892,136 UART: [kat] SHA2-384
894,777 UART: [kat] SHA2-512-ACC
896,678 UART: [kat] ECC-384
902,549 UART: [kat] HMAC-384Kdf
907,255 UART: [kat] LMS
1,475,451 UART: [kat] --
1,476,440 UART: [cold-reset] ++
1,476,780 UART: [fht] Storing FHT @ 0x50003400
1,479,603 UART: [idev] ++
1,479,771 UART: [idev] CDI.KEYID = 6
1,480,131 UART: [idev] SUBJECT.KEYID = 7
1,480,555 UART: [idev] UDS.KEYID = 0
1,480,900 ready_for_fw is high
1,480,900 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,565 UART: [idev] Erasing UDS.KEYID = 0
1,504,851 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,293 UART: [idev] --
1,514,320 UART: [ldev] ++
1,514,488 UART: [ldev] CDI.KEYID = 6
1,514,851 UART: [ldev] SUBJECT.KEYID = 5
1,515,277 UART: [ldev] AUTHORITY.KEYID = 7
1,515,740 UART: [ldev] FE.KEYID = 1
1,520,966 UART: [ldev] Erasing FE.KEYID = 1
1,546,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,377 UART: [ldev] --
1,585,666 UART: [fwproc] Waiting for Commands...
1,586,317 UART: [fwproc] Received command 0x46574c44
1,587,108 UART: [fwproc] Received Image of size 114168 bytes
2,884,710 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,998 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,017 >>> mbox cmd response: success
3,078,027 UART: [afmc] ++
3,078,195 UART: [afmc] CDI.KEYID = 6
3,078,557 UART: [afmc] SUBJECT.KEYID = 7
3,078,982 UART: [afmc] AUTHORITY.KEYID = 5
3,113,519 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,291 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,019 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,904 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,594 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,323 UART: [afmc] --
3,156,381 UART: [cold-reset] --
3,157,117 UART: [state] Locking Datavault
3,158,046 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,650 UART: [state] Locking ICCM
3,159,126 UART: [exit] Launching FMC @ 0x40000130
3,164,455 UART:
3,164,471 UART: Running Caliptra FMC ...
3,164,879 UART:
3,165,022 UART: [state] CFI Enabled
3,175,227 UART: [fht] FMC Alias Private Key: 7
3,282,882 UART: [art] Extend RT PCRs Done
3,283,310 UART: [art] Lock RT PCRs Done
3,285,026 UART: [art] Populate DV Done
3,293,227 UART: [fht] FMC Alias Private Key: 7
3,294,349 UART: [art] Derive CDI
3,294,629 UART: [art] Store in in slot 0x4
3,380,642 UART: [art] Derive Key Pair
3,381,002 UART: [art] Store priv key in slot 0x5
3,394,728 UART: [art] Derive Key Pair - Done
3,409,474 UART: [art] Signing Cert with AUTHO
3,409,954 UART: RITY.KEYID = 7
3,425,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,859 UART: [art] PUB.X = D98E7AF6B9F55A3E63ACF7D39D32CDA9863F670A6FFACF88C26E59DEE8EFE667079D26FC0E559595BF9BC683569163F5
3,432,638 UART: [art] PUB.Y = 5482277D37D8AB68962886B1945C7413F890EC9D1BB7C95C448EEE11FCD194D7491DF2D734A2CB37C33C89D2860042B7
3,439,566 UART: [art] SIG.R = 6103E1C1882A6775DFAAFD8D96C848CF08DCB18DD444A254F1334F857D82F9CAFF7C2E5A940B37E39A15AD7225CEE9D9
3,446,343 UART: [art] SIG.S = 2512CB144DE3DC3FEE8F34B333BF31B648C8F5E6C3A64F2017F6F7A4321FEDE8E72BEB3AA9105A95938C979E264AC788
3,469,960 UART: Caliptra RT
3,470,305 UART: [state] CFI Enabled
3,579,211 UART: [rt] RT listening for mailbox commands...
3,579,881 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,963 UART: [rt]cmd =0x53494756, len=196
3,616,111 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,932 ready_for_fw is high
1,361,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,021 >>> mbox cmd response: success
2,988,201 UART:
2,988,217 UART: Running Caliptra FMC ...
2,988,625 UART:
2,988,768 UART: [state] CFI Enabled
2,999,261 UART: [fht] FMC Alias Private Key: 7
3,107,518 UART: [art] Extend RT PCRs Done
3,107,946 UART: [art] Lock RT PCRs Done
3,109,460 UART: [art] Populate DV Done
3,117,901 UART: [fht] FMC Alias Private Key: 7
3,118,971 UART: [art] Derive CDI
3,119,251 UART: [art] Store in in slot 0x4
3,204,858 UART: [art] Derive Key Pair
3,205,218 UART: [art] Store priv key in slot 0x5
3,218,580 UART: [art] Derive Key Pair - Done
3,233,308 UART: [art] Signing Cert with AUTHO
3,233,788 UART: RITY.KEYID = 7
3,249,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,969 UART: [art] PUB.X = 1DDC3E7FE59479DB0330172246793F752C73333AD1E5058D5B8CC8E807EE628B48B101595C684E9AAE6E87D61D548910
3,256,725 UART: [art] PUB.Y = 1748C4DD14FC1B2039761C3F281D9F69A6820A665ED6887F5CF643987A81B7D27069CCA3675B2A810D3D4C3D71A5520B
3,263,666 UART: [art] SIG.R = 51E59E96AE846D4018D2F21F56E940955F0637C21349EB03ED214C6653DB927C1EA43B79D184D536171643F7BF11A724
3,270,424 UART: [art] SIG.S = 5739BA6F2CA0108BE720D9BD8D1B56E5E55F8DD5205FCE3A32A764A68B875B74EDE1A90B496992DE5A5B68AD1560ED9A
3,294,950 UART: Caliptra RT
3,295,295 UART: [state] CFI Enabled
3,402,677 UART: [rt] RT listening for mailbox commands...
3,403,347 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,569 UART: [rt]cmd =0x53494756, len=196
3,439,769 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
893,334 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,459 UART: [kat] ++
897,611 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,476 UART: [kat] SHA2-512-ACC
908,377 UART: [kat] ECC-384
918,220 UART: [kat] HMAC-384Kdf
922,790 UART: [kat] LMS
1,171,118 UART: [kat] --
1,171,803 UART: [cold-reset] ++
1,172,365 UART: [fht] FHT @ 0x50003400
1,175,096 UART: [idev] ++
1,175,264 UART: [idev] CDI.KEYID = 6
1,175,624 UART: [idev] SUBJECT.KEYID = 7
1,176,048 UART: [idev] UDS.KEYID = 0
1,176,393 ready_for_fw is high
1,176,393 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,290 UART: [idev] Erasing UDS.KEYID = 0
1,201,207 UART: [idev] Sha1 KeyId Algorithm
1,209,473 UART: [idev] --
1,210,645 UART: [ldev] ++
1,210,813 UART: [ldev] CDI.KEYID = 6
1,211,176 UART: [ldev] SUBJECT.KEYID = 5
1,211,602 UART: [ldev] AUTHORITY.KEYID = 7
1,212,065 UART: [ldev] FE.KEYID = 1
1,217,175 UART: [ldev] Erasing FE.KEYID = 1
1,243,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,651 UART: [ldev] --
1,282,912 UART: [fwproc] Wait for Commands...
1,283,700 UART: [fwproc] Recv command 0x46574c44
1,284,428 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,382 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,353 >>> mbox cmd response: success
2,773,457 UART: [afmc] ++
2,773,625 UART: [afmc] CDI.KEYID = 6
2,773,987 UART: [afmc] SUBJECT.KEYID = 7
2,774,412 UART: [afmc] AUTHORITY.KEYID = 5
2,809,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,803 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,194 UART: [afmc] --
2,853,216 UART: [cold-reset] --
2,853,828 UART: [state] Locking Datavault
2,854,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,487 UART: [state] Locking ICCM
2,855,971 UART: [exit] Launching FMC @ 0x40000130
2,861,300 UART:
2,861,316 UART: Running Caliptra FMC ...
2,861,724 UART:
2,861,778 UART: [state] CFI Enabled
2,872,399 UART: [fht] FMC Alias Private Key: 7
2,980,446 UART: [art] Extend RT PCRs Done
2,980,874 UART: [art] Lock RT PCRs Done
2,982,470 UART: [art] Populate DV Done
2,990,545 UART: [fht] FMC Alias Private Key: 7
2,991,581 UART: [art] Derive CDI
2,991,861 UART: [art] Store in in slot 0x4
3,077,448 UART: [art] Derive Key Pair
3,077,808 UART: [art] Store priv key in slot 0x5
3,091,270 UART: [art] Derive Key Pair - Done
3,106,202 UART: [art] Signing Cert with AUTHO
3,106,682 UART: RITY.KEYID = 7
3,121,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,009 UART: [art] PUB.X = 2E5C6859E0F031FDACADAC92667F95941424B8EE38E17A7F83E2BD750C95D98E7AEDEA5F0436B37ABD1523D5C72A5F14
3,128,789 UART: [art] PUB.Y = B12C3A7C0BBFA6DD9694153E933F5CD9AA91AE2DDA2C97D6ACCDABAD449BEBAC1711FF9DC7B4744148EB9F2BDF234340
3,135,768 UART: [art] SIG.R = 701D00E6291D43386A8A1A9BE2FE741760746BD4B6D83B5B7CCB7363A8C402C2E56F6CD0FB03DE9B84CC2CAA7D3D5B56
3,142,526 UART: [art] SIG.S = 78970D28F36F0B8920155BF1B6B1C349FA90D08234E77307B40B6EEF53751574327A6F9050206446AAF378737D4D7D3C
3,165,913 UART: Caliptra RT
3,166,166 UART: [state] CFI Enabled
3,274,373 UART: [rt] RT listening for mailbox commands...
3,275,043 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,315 UART: [rt]cmd =0x53494756, len=196
3,311,603 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,955 ready_for_fw is high
1,060,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,316 >>> mbox cmd response: success
2,686,350 UART:
2,686,366 UART: Running Caliptra FMC ...
2,686,774 UART:
2,686,828 UART: [state] CFI Enabled
2,697,249 UART: [fht] FMC Alias Private Key: 7
2,804,784 UART: [art] Extend RT PCRs Done
2,805,212 UART: [art] Lock RT PCRs Done
2,806,512 UART: [art] Populate DV Done
2,814,865 UART: [fht] FMC Alias Private Key: 7
2,815,893 UART: [art] Derive CDI
2,816,173 UART: [art] Store in in slot 0x4
2,902,100 UART: [art] Derive Key Pair
2,902,460 UART: [art] Store priv key in slot 0x5
2,915,838 UART: [art] Derive Key Pair - Done
2,930,851 UART: [art] Signing Cert with AUTHO
2,931,331 UART: RITY.KEYID = 7
2,946,745 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,510 UART: [art] PUB.X = 920A13C5415EA91E58E7E924E4DF1DDF2426F53819F944947E58C4EC3064A7157B15529835E5068E811B120C498AA817
2,954,263 UART: [art] PUB.Y = DD2571A68A4412B35714D9783C1A444329EEDA401DF23A7595348A6B502C6DAB5E3D6DDDB8885B4D0093F27E56CDED28
2,961,199 UART: [art] SIG.R = C531A76F5BEFE3BC198D4DED59663B014314BD3DF8163B92C371BEF8CC9EEA4E0DE6B6DC8F1E4DA5E7AF7FBF299939E0
2,967,991 UART: [art] SIG.S = 4ACE9AD76DD2C9F6DF6B434DDB023B48FCC6E4088F0746ECD9403B62870674949F27C7FB3B445099F6CE010A0B3C25D5
2,991,041 UART: Caliptra RT
2,991,294 UART: [state] CFI Enabled
3,098,701 UART: [rt] RT listening for mailbox commands...
3,099,371 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,573 UART: [rt]cmd =0x53494756, len=196
3,135,827 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
893,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,444 UART: [kat] ++
897,596 UART: [kat] sha1
901,762 UART: [kat] SHA2-256
903,702 UART: [kat] SHA2-384
906,393 UART: [kat] SHA2-512-ACC
908,294 UART: [kat] ECC-384
917,739 UART: [kat] HMAC-384Kdf
922,475 UART: [kat] LMS
1,170,803 UART: [kat] --
1,171,926 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,174,957 UART: [idev] ++
1,175,125 UART: [idev] CDI.KEYID = 6
1,175,485 UART: [idev] SUBJECT.KEYID = 7
1,175,909 UART: [idev] UDS.KEYID = 0
1,176,254 ready_for_fw is high
1,176,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,681 UART: [idev] Erasing UDS.KEYID = 0
1,200,702 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,210,028 UART: [ldev] ++
1,210,196 UART: [ldev] CDI.KEYID = 6
1,210,559 UART: [ldev] SUBJECT.KEYID = 5
1,210,985 UART: [ldev] AUTHORITY.KEYID = 7
1,211,448 UART: [ldev] FE.KEYID = 1
1,216,684 UART: [ldev] Erasing FE.KEYID = 1
1,243,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,480 UART: [ldev] --
1,282,977 UART: [fwproc] Wait for Commands...
1,283,801 UART: [fwproc] Recv command 0x46574c44
1,284,529 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,447 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,751 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,298 >>> mbox cmd response: success
2,773,422 UART: [afmc] ++
2,773,590 UART: [afmc] CDI.KEYID = 6
2,773,952 UART: [afmc] SUBJECT.KEYID = 7
2,774,377 UART: [afmc] AUTHORITY.KEYID = 5
2,810,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,027 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,755 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,640 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,359 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,309 UART: [afmc] --
2,853,233 UART: [cold-reset] --
2,854,033 UART: [state] Locking Datavault
2,855,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,824 UART: [state] Locking ICCM
2,856,276 UART: [exit] Launching FMC @ 0x40000130
2,861,605 UART:
2,861,621 UART: Running Caliptra FMC ...
2,862,029 UART:
2,862,172 UART: [state] CFI Enabled
2,872,757 UART: [fht] FMC Alias Private Key: 7
2,980,552 UART: [art] Extend RT PCRs Done
2,980,980 UART: [art] Lock RT PCRs Done
2,982,648 UART: [art] Populate DV Done
2,991,167 UART: [fht] FMC Alias Private Key: 7
2,992,345 UART: [art] Derive CDI
2,992,625 UART: [art] Store in in slot 0x4
3,078,428 UART: [art] Derive Key Pair
3,078,788 UART: [art] Store priv key in slot 0x5
3,092,468 UART: [art] Derive Key Pair - Done
3,107,297 UART: [art] Signing Cert with AUTHO
3,107,777 UART: RITY.KEYID = 7
3,122,995 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,760 UART: [art] PUB.X = 804DB3D0DFAC80C6D14380F4FE850F97EAA9BD88851963D4915B1B1E0F61176C2A32FDA55108CDDA57B972F7FF92A7E2
3,130,535 UART: [art] PUB.Y = BDDABCFC631D53CED7F018D3A2349E85649D5F1A4BFF837ECCCD6EDDDC21DB7858B9B086D0206DFE6A8306422E5E57F7
3,137,508 UART: [art] SIG.R = 9D31F5810C5A2124F40E6A774EF966DEDB40815215A5C40CD2A7C002EEE8329470496BDEFBC931DCF3590E4DDCF60517
3,144,270 UART: [art] SIG.S = 69CAEE8F88709A1512E8278EADF78E2C5ADAAB6734ADCDCA10A818053A6BB00FF67076E668042C26790EA806E5E1EA98
3,167,720 UART: Caliptra RT
3,168,065 UART: [state] CFI Enabled
3,276,092 UART: [rt] RT listening for mailbox commands...
3,276,762 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,940 UART: [rt]cmd =0x53494756, len=196
3,313,282 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,830 ready_for_fw is high
1,059,830 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,461 >>> mbox cmd response: success
2,686,295 UART:
2,686,311 UART: Running Caliptra FMC ...
2,686,719 UART:
2,686,862 UART: [state] CFI Enabled
2,697,455 UART: [fht] FMC Alias Private Key: 7
2,805,284 UART: [art] Extend RT PCRs Done
2,805,712 UART: [art] Lock RT PCRs Done
2,807,066 UART: [art] Populate DV Done
2,815,413 UART: [fht] FMC Alias Private Key: 7
2,816,509 UART: [art] Derive CDI
2,816,789 UART: [art] Store in in slot 0x4
2,902,668 UART: [art] Derive Key Pair
2,903,028 UART: [art] Store priv key in slot 0x5
2,915,908 UART: [art] Derive Key Pair - Done
2,930,831 UART: [art] Signing Cert with AUTHO
2,931,311 UART: RITY.KEYID = 7
2,946,563 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,328 UART: [art] PUB.X = 0A7946612B2107BCC03AA471B7E938852B9702A77B90B81B6547B939B3A33F66E7495E958426E63578CB14D2E3EBCBED
2,954,089 UART: [art] PUB.Y = E86EB4484A8379A2A84E4B891AA53863BA51F4FF13381734C485C9270281348F90A5CCAE8FC938EBC279DDCC60B462B7
2,961,042 UART: [art] SIG.R = 513906D011E8C08A9C40A621CFE015E8DDDD96ACC01770473131499B2B46CC08C4C76B15523E2319FB53D9A74E262D58
2,967,806 UART: [art] SIG.S = D70220A9A313CFB4EB695C90BEFD6E109B56E981F4C6B8267B5C9F8F24A159E42516DC93B5A53C65791F3937F415D8F2
2,991,240 UART: Caliptra RT
2,991,585 UART: [state] CFI Enabled
3,099,686 UART: [rt] RT listening for mailbox commands...
3,100,356 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,582 UART: [rt]cmd =0x53494756, len=196
3,136,916 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,603 UART: [kat] SHA2-256
901,543 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,490 UART: [kat] LMS
1,168,802 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 ready_for_fw is high
1,174,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,330 UART: [ldev] ++
1,209,498 UART: [ldev] CDI.KEYID = 6
1,209,862 UART: [ldev] SUBJECT.KEYID = 5
1,210,289 UART: [ldev] AUTHORITY.KEYID = 7
1,210,752 UART: [ldev] FE.KEYID = 1
1,215,804 UART: [ldev] Erasing FE.KEYID = 1
1,241,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,944 UART: [fwproc] Wait for Commands...
1,281,519 UART: [fwproc] Recv command 0x46574c44
1,282,252 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,571 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,159 >>> mbox cmd response: success
2,771,278 UART: [afmc] ++
2,771,446 UART: [afmc] CDI.KEYID = 6
2,771,809 UART: [afmc] SUBJECT.KEYID = 7
2,772,235 UART: [afmc] AUTHORITY.KEYID = 5
2,807,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,375 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,104 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,987 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,706 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,369 UART: [afmc] --
2,850,445 UART: [cold-reset] --
2,851,313 UART: [state] Locking Datavault
2,852,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,112 UART: [state] Locking ICCM
2,853,638 UART: [exit] Launching FMC @ 0x40000130
2,858,967 UART:
2,858,983 UART: Running Caliptra FMC ...
2,859,391 UART:
2,859,445 UART: [state] CFI Enabled
2,869,818 UART: [fht] FMC Alias Private Key: 7
2,977,549 UART: [art] Extend RT PCRs Done
2,977,977 UART: [art] Lock RT PCRs Done
2,979,243 UART: [art] Populate DV Done
2,987,858 UART: [fht] FMC Alias Private Key: 7
2,988,964 UART: [art] Derive CDI
2,989,244 UART: [art] Store in in slot 0x4
3,074,545 UART: [art] Derive Key Pair
3,074,905 UART: [art] Store priv key in slot 0x5
3,088,379 UART: [art] Derive Key Pair - Done
3,102,792 UART: [art] Signing Cert with AUTHO
3,103,272 UART: RITY.KEYID = 7
3,118,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,567 UART: [art] PUB.X = 072493217DFC22A18ADD38018FBA0653C0B8AEAC1CFEA32CED3134FC84D99E3886DDCD53B4766F8A2FA2DDDF734B67B7
3,126,350 UART: [art] PUB.Y = 8CA09E8BEB232375A33E424C8260AE98C74596B7C22CE7A5E68BE698BF93F9F89E88019837699E9632EF9E2ACA552C2C
3,133,303 UART: [art] SIG.R = 4D7A31716430754BF3A4217C3CADAA4132F51769E9A783AE6E6BA2B9CCC081D9181DAE5FC7EB3013A17500A325A3268E
3,140,059 UART: [art] SIG.S = 09A8921A344F970C7DEA079564FBD1D0CB6EABA63D92895368EA787BE73AC1119ED6FB3998F80E14766C5589E8A81983
3,164,200 UART: Caliptra RT
3,164,453 UART: [state] CFI Enabled
3,272,578 UART: [rt] RT listening for mailbox commands...
3,273,248 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,392 UART: [rt]cmd =0x53494756, len=196
3,309,962 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,272 ready_for_fw is high
1,056,272 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,401 >>> mbox cmd response: success
2,683,931 UART:
2,683,947 UART: Running Caliptra FMC ...
2,684,355 UART:
2,684,409 UART: [state] CFI Enabled
2,694,920 UART: [fht] FMC Alias Private Key: 7
2,802,169 UART: [art] Extend RT PCRs Done
2,802,597 UART: [art] Lock RT PCRs Done
2,804,063 UART: [art] Populate DV Done
2,812,054 UART: [fht] FMC Alias Private Key: 7
2,813,134 UART: [art] Derive CDI
2,813,414 UART: [art] Store in in slot 0x4
2,899,071 UART: [art] Derive Key Pair
2,899,431 UART: [art] Store priv key in slot 0x5
2,912,689 UART: [art] Derive Key Pair - Done
2,927,468 UART: [art] Signing Cert with AUTHO
2,927,948 UART: RITY.KEYID = 7
2,942,684 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,449 UART: [art] PUB.X = 0AD690B3327F17191B1DD2175F28A02549D76F2150F8DEAC41818D6609087F5C1C789C464A4E629FA83AFA7E386CFB44
2,950,212 UART: [art] PUB.Y = EEC21F899CDC8D7AB6830FB350CD42C8A9DA464AAF1033C5CA93E57A61D01FA2A74E2B6A1E29D5C7453B14B06ED4695E
2,957,179 UART: [art] SIG.R = 5F64E18DDA240EC150DBBFF945E7A309820747053F4A1416E704D3AD018EA8EA1DDECDE9318921D63BFF58C98141E1C1
2,963,943 UART: [art] SIG.S = 5AC3783FDE5E592F85FEFDBDAFF1B35C3A62BFD8C4CDAD41B98ADD3AEAC7BA8BC823B9228FF01C1C87DCDEE4D46B0FA4
2,987,233 UART: Caliptra RT
2,987,486 UART: [state] CFI Enabled
3,095,213 UART: [rt] RT listening for mailbox commands...
3,095,883 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,977 UART: [rt]cmd =0x53494756, len=196
3,132,071 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,538 UART: [kat] ++
895,690 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
920,805 UART: [kat] LMS
1,169,117 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,052 UART: [fht] FHT @ 0x50003400
1,172,738 UART: [idev] ++
1,172,906 UART: [idev] CDI.KEYID = 6
1,173,267 UART: [idev] SUBJECT.KEYID = 7
1,173,692 UART: [idev] UDS.KEYID = 0
1,174,038 ready_for_fw is high
1,174,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,842 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Sha1 KeyId Algorithm
1,207,342 UART: [idev] --
1,208,335 UART: [ldev] ++
1,208,503 UART: [ldev] CDI.KEYID = 6
1,208,867 UART: [ldev] SUBJECT.KEYID = 5
1,209,294 UART: [ldev] AUTHORITY.KEYID = 7
1,209,757 UART: [ldev] FE.KEYID = 1
1,214,975 UART: [ldev] Erasing FE.KEYID = 1
1,241,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,109 UART: [fwproc] Wait for Commands...
1,281,846 UART: [fwproc] Recv command 0x46574c44
1,282,579 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,502 >>> mbox cmd response: success
2,770,683 UART: [afmc] ++
2,770,851 UART: [afmc] CDI.KEYID = 6
2,771,214 UART: [afmc] SUBJECT.KEYID = 7
2,771,640 UART: [afmc] AUTHORITY.KEYID = 5
2,807,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,170 UART: [afmc] --
2,851,156 UART: [cold-reset] --
2,852,172 UART: [state] Locking Datavault
2,853,481 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,085 UART: [state] Locking ICCM
2,854,553 UART: [exit] Launching FMC @ 0x40000130
2,859,882 UART:
2,859,898 UART: Running Caliptra FMC ...
2,860,306 UART:
2,860,449 UART: [state] CFI Enabled
2,871,014 UART: [fht] FMC Alias Private Key: 7
2,979,299 UART: [art] Extend RT PCRs Done
2,979,727 UART: [art] Lock RT PCRs Done
2,981,459 UART: [art] Populate DV Done
2,989,594 UART: [fht] FMC Alias Private Key: 7
2,990,540 UART: [art] Derive CDI
2,990,820 UART: [art] Store in in slot 0x4
3,076,089 UART: [art] Derive Key Pair
3,076,449 UART: [art] Store priv key in slot 0x5
3,089,733 UART: [art] Derive Key Pair - Done
3,104,821 UART: [art] Signing Cert with AUTHO
3,105,301 UART: RITY.KEYID = 7
3,120,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,110 UART: [art] PUB.X = A67798C0EA9B7219E5C1608CAF7A8A888DB85D96415B8FCF1CAE87C9D6CA7756EC37A24C5A9E96BC8559210BA6F2E0BF
3,127,895 UART: [art] PUB.Y = F22959A824C59C06AE62ACA0EA841A5D3B3EE6765476F9352D860558C027C383E886EF3BE7FBFD1D0A77A2488C7657E4
3,134,842 UART: [art] SIG.R = 6B6B0DE7BEC513F0FC5C22EEF9E0BABCEEA39E848CA88753BE8BC0EDEFD60B40609A93FCE7D97ED72DD07A936856930B
3,141,633 UART: [art] SIG.S = 1EBD48B44F1124B4B92F1195AFC4FF1589BB6B2697ED9F905E18A56458E0A10DFE7E26DDA483C5642416BAA10DB39D29
3,165,432 UART: Caliptra RT
3,165,777 UART: [state] CFI Enabled
3,273,308 UART: [rt] RT listening for mailbox commands...
3,273,978 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,376 UART: [rt]cmd =0x53494756, len=196
3,311,210 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,827 ready_for_fw is high
1,056,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,310 >>> mbox cmd response: success
2,683,884 UART:
2,683,900 UART: Running Caliptra FMC ...
2,684,308 UART:
2,684,451 UART: [state] CFI Enabled
2,695,112 UART: [fht] FMC Alias Private Key: 7
2,803,325 UART: [art] Extend RT PCRs Done
2,803,753 UART: [art] Lock RT PCRs Done
2,805,405 UART: [art] Populate DV Done
2,813,278 UART: [fht] FMC Alias Private Key: 7
2,814,274 UART: [art] Derive CDI
2,814,554 UART: [art] Store in in slot 0x4
2,899,803 UART: [art] Derive Key Pair
2,900,163 UART: [art] Store priv key in slot 0x5
2,913,529 UART: [art] Derive Key Pair - Done
2,928,518 UART: [art] Signing Cert with AUTHO
2,928,998 UART: RITY.KEYID = 7
2,944,226 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,991 UART: [art] PUB.X = 523D3AC140B25379D2C40F542D9DBFADC1DC28F9B709B71C9FF9C5E75AFB550A7C72BA6CE3F8123385B5AA0169C4B6D9
2,951,767 UART: [art] PUB.Y = 866FC7F738B4DBF08481DAA0331688E0CF2CF53B5E8FD3F7FCF2B6F628103F6DFDADA81CC22A3BF082FF3D2A1191DED5
2,958,743 UART: [art] SIG.R = 2981B6B89B82460335B14B1C5AF2F1A4E4B09DD73E2BE962509D69B7C9376CACA995E255DD1369FF64931C87CA696915
2,965,512 UART: [art] SIG.S = 426F9BD86F29CA639FAB0BA31AE8C9E5E311B9A5F2E47FFDC94BF468F5A5C494DFA9924DED70F70A36C07616E4AFEFA1
2,988,943 UART: Caliptra RT
2,989,288 UART: [state] CFI Enabled
3,096,901 UART: [rt] RT listening for mailbox commands...
3,097,571 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,577 UART: [rt]cmd =0x53494756, len=196
3,133,849 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,208 UART:
192,574 UART: Running Caliptra ROM ...
193,764 UART:
193,914 UART: [state] CFI Enabled
264,546 UART: [state] LifecycleState = Unprovisioned
266,525 UART: [state] DebugLocked = No
269,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,839 UART: [kat] SHA2-256
443,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,092 UART: [kat] ++
454,542 UART: [kat] sha1
465,268 UART: [kat] SHA2-256
468,019 UART: [kat] SHA2-384
473,056 UART: [kat] SHA2-512-ACC
475,429 UART: [kat] ECC-384
2,767,826 UART: [kat] HMAC-384Kdf
2,799,313 UART: [kat] LMS
3,989,603 UART: [kat] --
3,994,118 UART: [cold-reset] ++
3,995,553 UART: [fht] Storing FHT @ 0x50003400
4,005,962 UART: [idev] ++
4,006,604 UART: [idev] CDI.KEYID = 6
4,007,526 UART: [idev] SUBJECT.KEYID = 7
4,008,767 UART: [idev] UDS.KEYID = 0
4,009,858 ready_for_fw is high
4,010,073 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,322 UART: [idev] Erasing UDS.KEYID = 0
7,346,932 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,727 UART: [idev] --
7,372,125 UART: [ldev] ++
7,372,685 UART: [ldev] CDI.KEYID = 6
7,373,616 UART: [ldev] SUBJECT.KEYID = 5
7,374,870 UART: [ldev] AUTHORITY.KEYID = 7
7,376,147 UART: [ldev] FE.KEYID = 1
7,422,223 UART: [ldev] Erasing FE.KEYID = 1
10,754,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,575 UART: [ldev] --
13,134,025 UART: [fwproc] Waiting for Commands...
13,135,998 UART: [fwproc] Received command 0x46574c44
13,138,222 UART: [fwproc] Received Image of size 113844 bytes
17,185,832 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,172 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,052 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,644,875 >>> mbox cmd response: success
17,645,403 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,649,098 UART: [afmc] ++
17,649,681 UART: [afmc] CDI.KEYID = 6
17,650,620 UART: [afmc] SUBJECT.KEYID = 7
17,651,881 UART: [afmc] AUTHORITY.KEYID = 5
21,010,619 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,878 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,291 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,104 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,616 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,402 UART: [afmc] --
23,377,995 UART: [cold-reset] --
23,382,549 UART: [state] Locking Datavault
23,387,794 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,546 UART: [state] Locking ICCM
23,391,826 UART: [exit] Launching FMC @ 0x40000130
23,400,211 UART:
23,400,437 UART: Running Caliptra FMC ...
23,401,456 UART:
23,401,594 UART: [state] CFI Enabled
23,467,385 UART: [fht] FMC Alias Private Key: 7
25,804,911 UART: [art] Extend RT PCRs Done
25,806,126 UART: [art] Lock RT PCRs Done
25,807,853 UART: [art] Populate DV Done
25,813,258 UART: [fht] FMC Alias Private Key: 7
25,814,905 UART: [art] Derive CDI
25,815,634 UART: [art] Store in in slot 0x4
25,875,348 UART: [art] Derive Key Pair
25,876,381 UART: [art] Store priv key in slot 0x5
29,168,718 UART: [art] Derive Key Pair - Done
29,181,982 UART: [art] Signing Cert with AUTHO
29,183,284 UART: RITY.KEYID = 7
31,469,202 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,707 UART: [art] PUB.X = 52C61059E67250BDB717C2501C11C72CE465F69FAD6C69E2C4D423FD016E21F03786F81322FF62EB67C96856A9858A6A
31,477,966 UART: [art] PUB.Y = 2C94A6881DA4B7FE0561D42D6B032D159EC9A3851F1AABF0868B2444547D367978D1D0343B5E8EDB32ADA0A63E5B6E6B
31,485,196 UART: [art] SIG.R = A7F5672DF172D46144711C5E4B1C2E2582A2355D371DD22859515D91AA94E8D87CF3480AC0E43E4290E8B41D84C5F035
31,492,581 UART: [art] SIG.S = 0913F39A27864648F59ED9114228228E20CCE68B549FEA048629C990C4DDD387F97E2DB07C2C2214329D21AB083869FD
32,797,636 UART: Caliptra RT
32,798,346 UART: [state] CFI Enabled
32,957,954 UART: [rt] RT listening for mailbox commands...
32,989,531 UART: [rt]cmd =0x46505344, len=4
33,099,644 >>> mbox cmd response data (8 bytes)
33,100,200 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,100,493 UART: Fatal Error: 0x000E0008
33,101,600 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,782,490 ready_for_fw is high
3,782,872 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,843,428 >>> mbox cmd response: success
17,844,246 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,544,746 UART:
23,545,127 UART: Running Caliptra FMC ...
23,546,271 UART:
23,546,443 UART: [state] CFI Enabled
23,614,121 UART: [fht] FMC Alias Private Key: 7
25,951,944 UART: [art] Extend RT PCRs Done
25,953,160 UART: [art] Lock RT PCRs Done
25,954,781 UART: [art] Populate DV Done
25,960,134 UART: [fht] FMC Alias Private Key: 7
25,961,879 UART: [art] Derive CDI
25,962,683 UART: [art] Store in in slot 0x4
26,021,917 UART: [art] Derive Key Pair
26,022,958 UART: [art] Store priv key in slot 0x5
29,315,229 UART: [art] Derive Key Pair - Done
29,328,221 UART: [art] Signing Cert with AUTHO
29,329,523 UART: RITY.KEYID = 7
31,619,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,569 UART: [art] PUB.X = 8B047158F803CCCFFE8B1346D1AC968944847C8554D6C00138029DA72A98D79CD62BDA8777B49199233CB41721FCCAEB
31,627,774 UART: [art] PUB.Y = 4B1D15460D05DFD83D6BD884DB9FDC9A8A645752FA5E526A750AC4D109C71CD903D92FB0AC57EFC1F3497C1F050AE66B
31,635,087 UART: [art] SIG.R = 15A9C8BD7E7CF948A138F321D608542AE3CD4BD880BC9B6DC5F6BECA5D3F44037C62239E2B9D798B0B458B8956D76CF5
31,642,455 UART: [art] SIG.S = 07C5D7E0D6204C8E9F509AFD785FB26FE57ACE99D4ACE099DE94A89F83482727DDE44DB94A40984ADF76BC23A99E8CCB
32,948,095 UART: Caliptra RT
32,948,813 UART: [state] CFI Enabled
33,108,669 UART: [rt] RT listening for mailbox commands...
33,140,186 UART: [rt]cmd =0x46505344, len=4
33,249,888 >>> mbox cmd response data (8 bytes)
33,250,420 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,250,755 UART: Fatal Error: 0x000E0008
33,251,878 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,531 UART:
192,897 UART: Running Caliptra ROM ...
194,044 UART:
603,918 UART: [state] CFI Enabled
618,361 UART: [state] LifecycleState = Unprovisioned
620,301 UART: [state] DebugLocked = No
621,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,775 UART: [kat] SHA2-256
795,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,026 UART: [kat] ++
806,682 UART: [kat] sha1
817,919 UART: [kat] SHA2-256
820,668 UART: [kat] SHA2-384
826,666 UART: [kat] SHA2-512-ACC
829,031 UART: [kat] ECC-384
3,112,241 UART: [kat] HMAC-384Kdf
3,123,057 UART: [kat] LMS
4,313,145 UART: [kat] --
4,316,661 UART: [cold-reset] ++
4,317,817 UART: [fht] Storing FHT @ 0x50003400
4,329,391 UART: [idev] ++
4,329,993 UART: [idev] CDI.KEYID = 6
4,330,940 UART: [idev] SUBJECT.KEYID = 7
4,332,115 UART: [idev] UDS.KEYID = 0
4,333,164 ready_for_fw is high
4,333,392 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,476,364 UART: [idev] Erasing UDS.KEYID = 0
7,621,137 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,868 UART: [idev] --
7,647,806 UART: [ldev] ++
7,648,376 UART: [ldev] CDI.KEYID = 6
7,649,312 UART: [ldev] SUBJECT.KEYID = 5
7,650,573 UART: [ldev] AUTHORITY.KEYID = 7
7,651,723 UART: [ldev] FE.KEYID = 1
7,662,229 UART: [ldev] Erasing FE.KEYID = 1
10,953,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,925 UART: [ldev] --
13,315,423 UART: [fwproc] Waiting for Commands...
13,318,606 UART: [fwproc] Received command 0x46574c44
13,320,797 UART: [fwproc] Received Image of size 113844 bytes
17,371,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,310 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,837,276 >>> mbox cmd response: success
17,837,791 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,841,921 UART: [afmc] ++
17,842,513 UART: [afmc] CDI.KEYID = 6
17,843,423 UART: [afmc] SUBJECT.KEYID = 7
17,844,696 UART: [afmc] AUTHORITY.KEYID = 5
21,159,498 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,456,094 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,483 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,309 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,831 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,900 UART: [afmc] --
23,523,716 UART: [cold-reset] --
23,528,727 UART: [state] Locking Datavault
23,532,349 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,057 UART: [state] Locking ICCM
23,535,835 UART: [exit] Launching FMC @ 0x40000130
23,544,177 UART:
23,544,413 UART: Running Caliptra FMC ...
23,545,515 UART:
23,545,674 UART: [state] CFI Enabled
23,553,613 UART: [fht] FMC Alias Private Key: 7
25,884,291 UART: [art] Extend RT PCRs Done
25,885,516 UART: [art] Lock RT PCRs Done
25,887,108 UART: [art] Populate DV Done
25,892,656 UART: [fht] FMC Alias Private Key: 7
25,894,252 UART: [art] Derive CDI
25,894,990 UART: [art] Store in in slot 0x4
25,937,698 UART: [art] Derive Key Pair
25,938,739 UART: [art] Store priv key in slot 0x5
29,180,973 UART: [art] Derive Key Pair - Done
29,193,802 UART: [art] Signing Cert with AUTHO
29,195,105 UART: RITY.KEYID = 7
31,474,444 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,948 UART: [art] PUB.X = ADC1DF11C422E555B5968AFA8AD9D5C5C43CA3879BB6D382308F520D0262BD23AE6268706714B78CA8F208FE33370D63
31,483,155 UART: [art] PUB.Y = FB2D883E13E4D6E9CAFA3805F5E0F469C4EC260F8ABFCFC400A440D231DD0C28C812356346F2A609640D53AE122D83B9
31,490,448 UART: [art] SIG.R = 35663F49D1B9046613E4E33EB92100D928546BAB50C3BA9D8347F83D2F4CBF02250EC19AF30A79472D283E64CD0E6596
31,497,795 UART: [art] SIG.S = 730DABE531B40482B93E808BE06A9CE4DDD376E46FFDE4B0DA0A31A014E5F13BB62E2447DBDC02D0C9B989F97F866E04
32,803,353 UART: Caliptra RT
32,804,064 UART: [state] CFI Enabled
32,921,729 UART: [rt] RT listening for mailbox commands...
32,952,782 UART: [rt]cmd =0x46505344, len=4
33,062,525 >>> mbox cmd response data (8 bytes)
33,063,080 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,063,378 UART: Fatal Error: 0x000E0008
33,064,462 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,127,935 ready_for_fw is high
4,128,344 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,148 >>> mbox cmd response: success
18,068,954 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,703,231 UART:
23,703,623 UART: Running Caliptra FMC ...
23,704,735 UART:
23,704,891 UART: [state] CFI Enabled
23,713,182 UART: [fht] FMC Alias Private Key: 7
26,044,212 UART: [art] Extend RT PCRs Done
26,045,439 UART: [art] Lock RT PCRs Done
26,046,718 UART: [art] Populate DV Done
26,052,140 UART: [fht] FMC Alias Private Key: 7
26,053,685 UART: [art] Derive CDI
26,054,454 UART: [art] Store in in slot 0x4
26,097,549 UART: [art] Derive Key Pair
26,098,581 UART: [art] Store priv key in slot 0x5
29,341,242 UART: [art] Derive Key Pair - Done
29,354,075 UART: [art] Signing Cert with AUTHO
29,355,387 UART: RITY.KEYID = 7
31,635,149 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,652 UART: [art] PUB.X = 586209EC8AEC25E94470DF51B7AF56CCD1046D4D13C79DDBB75B9B1184E711E3AA5E08C2F130A1D4F6234A154C686247
31,643,903 UART: [art] PUB.Y = 8FE4FCA1F183209DF1365645C853C05B97A2A55D994FE2CE7DFF10681E82B1F26B1C1BB8A354E8015E890D28EB7CA95B
31,651,151 UART: [art] SIG.R = 01179869EE5D6FDD5072A399D491F625C4C3DFBFC0B1F4023F67F5754EC1F2AE7DD820B80E700FD4DDB993D19C799B51
31,658,552 UART: [art] SIG.S = B427602D82A55BDE49B5B571D87276468A3F72D4E85A630B1D5E38A0FCD4FA6D1336EAF966A08FA52CBF4693CB58B1CF
32,964,143 UART: Caliptra RT
32,964,849 UART: [state] CFI Enabled
33,082,778 UART: [rt] RT listening for mailbox commands...
33,113,809 UART: [rt]cmd =0x46505344, len=4
33,223,778 >>> mbox cmd response data (8 bytes)
33,224,307 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,224,630 UART: Fatal Error: 0x000E0008
33,225,743 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,853 writing to cptra_bootfsm_go
193,037 UART:
193,409 UART: Running Caliptra ROM ...
194,518 UART:
194,661 UART: [state] CFI Enabled
264,383 UART: [state] LifecycleState = Unprovisioned
266,299 UART: [state] DebugLocked = No
268,316 UART: [state] WD Timer not started. Device not locked for debugging
272,138 UART: [kat] SHA2-256
451,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,840 UART: [kat] ++
463,308 UART: [kat] sha1
474,608 UART: [kat] SHA2-256
477,618 UART: [kat] SHA2-384
483,410 UART: [kat] SHA2-512-ACC
486,377 UART: [kat] ECC-384
2,949,432 UART: [kat] HMAC-384Kdf
2,971,972 UART: [kat] LMS
3,501,442 UART: [kat] --
3,506,936 UART: [cold-reset] ++
3,508,302 UART: [fht] FHT @ 0x50003400
3,519,286 UART: [idev] ++
3,519,854 UART: [idev] CDI.KEYID = 6
3,520,780 UART: [idev] SUBJECT.KEYID = 7
3,522,088 UART: [idev] UDS.KEYID = 0
3,523,029 ready_for_fw is high
3,523,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,779 UART: [idev] Erasing UDS.KEYID = 0
6,026,334 UART: [idev] Sha1 KeyId Algorithm
6,048,597 UART: [idev] --
6,051,788 UART: [ldev] ++
6,052,366 UART: [ldev] CDI.KEYID = 6
6,053,278 UART: [ldev] SUBJECT.KEYID = 5
6,054,438 UART: [ldev] AUTHORITY.KEYID = 7
6,055,729 UART: [ldev] FE.KEYID = 1
6,100,959 UART: [ldev] Erasing FE.KEYID = 1
8,605,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,513 UART: [ldev] --
10,412,194 UART: [fwproc] Wait for Commands...
10,414,911 UART: [fwproc] Recv command 0x46574c44
10,417,004 UART: [fwproc] Recv'd Img size: 114168 bytes
13,820,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,275,112 >>> mbox cmd response: success
14,275,639 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,279,980 UART: [afmc] ++
14,280,571 UART: [afmc] CDI.KEYID = 6
14,281,453 UART: [afmc] SUBJECT.KEYID = 7
14,282,666 UART: [afmc] AUTHORITY.KEYID = 5
16,808,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,496 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,298 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,183 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,690 UART: [afmc] --
18,609,126 UART: [cold-reset] --
18,613,037 UART: [state] Locking Datavault
18,617,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,447 UART: [state] Locking ICCM
18,621,062 UART: [exit] Launching FMC @ 0x40000130
18,629,465 UART:
18,629,698 UART: Running Caliptra FMC ...
18,630,801 UART:
18,630,962 UART: [state] CFI Enabled
18,693,187 UART: [fht] FMC Alias Private Key: 7
20,456,424 UART: [art] Extend RT PCRs Done
20,457,643 UART: [art] Lock RT PCRs Done
20,459,297 UART: [art] Populate DV Done
20,464,711 UART: [fht] FMC Alias Private Key: 7
20,466,319 UART: [art] Derive CDI
20,467,059 UART: [art] Store in in slot 0x4
20,525,477 UART: [art] Derive Key Pair
20,526,508 UART: [art] Store priv key in slot 0x5
22,989,540 UART: [art] Derive Key Pair - Done
23,002,857 UART: [art] Signing Cert with AUTHO
23,004,208 UART: RITY.KEYID = 7
24,715,737 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,237 UART: [art] PUB.X = D360AB611967BAADAA9C7FE266234569B82F66E81E84507B3ADB4DC21B8CF95906DAEBCECC30DD6FC199B7518FD66ECB
24,724,576 UART: [art] PUB.Y = ED0097B521E5D7DF8DB01F8E08586B9A88C466F82FADE91964257C950F35745936E42E980FA1A8EBE9CA0EAF61FCF166
24,731,780 UART: [art] SIG.R = 0F191F85CCE70B19B9EEE99DF412A1EF20C39BC182D1FD5F33EC70CFB73166541D2BF61F5BC9A8A19CC1DAA8C3AEA29D
24,739,249 UART: [art] SIG.S = 2AB71A32878171268CEB3F68C0380A58C27C3147DF1C0F8F597F7E01E48601E469DD84888D242F9934835A0575E29347
25,718,289 UART: Caliptra RT
25,719,000 UART: [state] CFI Enabled
25,882,690 UART: [rt] RT listening for mailbox commands...
25,913,835 UART: [rt]cmd =0x46505344, len=4
26,023,664 >>> mbox cmd response data (8 bytes)
26,024,222 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,024,518 UART: Fatal Error: 0x000E0008
26,025,660 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,382,516 ready_for_fw is high
3,382,908 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,080,370 >>> mbox cmd response: success
14,081,191 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,382,402 UART:
18,382,802 UART: Running Caliptra FMC ...
18,384,106 UART:
18,384,269 UART: [state] CFI Enabled
18,450,778 UART: [fht] FMC Alias Private Key: 7
20,214,662 UART: [art] Extend RT PCRs Done
20,215,888 UART: [art] Lock RT PCRs Done
20,217,650 UART: [art] Populate DV Done
20,222,952 UART: [fht] FMC Alias Private Key: 7
20,224,648 UART: [art] Derive CDI
20,225,387 UART: [art] Store in in slot 0x4
20,282,889 UART: [art] Derive Key Pair
20,283,888 UART: [art] Store priv key in slot 0x5
22,746,307 UART: [art] Derive Key Pair - Done
22,759,375 UART: [art] Signing Cert with AUTHO
22,760,710 UART: RITY.KEYID = 7
24,472,048 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,562 UART: [art] PUB.X = 3F40B30CDD77D3D979AEBFCDAE1FD413B676DC644C33AA101D24800B8433CFA43CEDD4847CD3FCF78709DB7C53FF6133
24,480,866 UART: [art] PUB.Y = 356B513836CDBEB8251C9B3DDCAB46A7EF093567E584C3F258C0755E7A039A0849C1DBE369B90B7FEB2419C9A1791A34
24,488,113 UART: [art] SIG.R = 0347CC92766101F4033F70A57EDEAB98F6B9A67F1827F0961F7F8F94ADEAC5893B69E0D6A9DF8B39AA457F94A546E906
24,495,497 UART: [art] SIG.S = 766644CBBE2CFDFA424DD8A75601ED35EDD9A43C8CEDDA97834B39017E2AAB70122F1AAA38904924509D9875490C15D5
25,474,670 UART: Caliptra RT
25,475,376 UART: [state] CFI Enabled
25,641,023 UART: [rt] RT listening for mailbox commands...
25,672,641 UART: [rt]cmd =0x46505344, len=4
25,782,470 >>> mbox cmd response data (8 bytes)
25,782,987 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,783,270 UART: Fatal Error: 0x000E0008
25,784,451 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,841 writing to cptra_bootfsm_go
193,118 UART:
193,480 UART: Running Caliptra ROM ...
194,662 UART:
604,352 UART: [state] CFI Enabled
616,108 UART: [state] LifecycleState = Unprovisioned
617,968 UART: [state] DebugLocked = No
620,483 UART: [state] WD Timer not started. Device not locked for debugging
623,808 UART: [kat] SHA2-256
802,905 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,476 UART: [kat] ++
814,922 UART: [kat] sha1
826,502 UART: [kat] SHA2-256
829,504 UART: [kat] SHA2-384
835,653 UART: [kat] SHA2-512-ACC
838,625 UART: [kat] ECC-384
3,279,620 UART: [kat] HMAC-384Kdf
3,293,349 UART: [kat] LMS
3,822,836 UART: [kat] --
3,826,352 UART: [cold-reset] ++
3,828,642 UART: [fht] FHT @ 0x50003400
3,838,712 UART: [idev] ++
3,839,277 UART: [idev] CDI.KEYID = 6
3,840,412 UART: [idev] SUBJECT.KEYID = 7
3,841,622 UART: [idev] UDS.KEYID = 0
3,842,552 ready_for_fw is high
3,842,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,126 UART: [idev] Erasing UDS.KEYID = 0
6,310,465 UART: [idev] Sha1 KeyId Algorithm
6,333,743 UART: [idev] --
6,336,333 UART: [ldev] ++
6,336,900 UART: [ldev] CDI.KEYID = 6
6,337,813 UART: [ldev] SUBJECT.KEYID = 5
6,338,972 UART: [ldev] AUTHORITY.KEYID = 7
6,340,205 UART: [ldev] FE.KEYID = 1
6,350,039 UART: [ldev] Erasing FE.KEYID = 1
8,826,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,191 UART: [ldev] --
10,618,507 UART: [fwproc] Wait for Commands...
10,620,601 UART: [fwproc] Recv command 0x46574c44
10,622,644 UART: [fwproc] Recv'd Img size: 114168 bytes
14,017,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,878 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,681 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,479,380 >>> mbox cmd response: success
14,479,902 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,483,336 UART: [afmc] ++
14,483,924 UART: [afmc] CDI.KEYID = 6
14,484,835 UART: [afmc] SUBJECT.KEYID = 7
14,486,074 UART: [afmc] AUTHORITY.KEYID = 5
16,988,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,459 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,245 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,129 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,700 UART: [afmc] --
18,783,320 UART: [cold-reset] --
18,788,483 UART: [state] Locking Datavault
18,795,671 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,312 UART: [state] Locking ICCM
18,799,191 UART: [exit] Launching FMC @ 0x40000130
18,807,590 UART:
18,807,825 UART: Running Caliptra FMC ...
18,808,925 UART:
18,809,106 UART: [state] CFI Enabled
18,817,212 UART: [fht] FMC Alias Private Key: 7
20,573,752 UART: [art] Extend RT PCRs Done
20,574,973 UART: [art] Lock RT PCRs Done
20,576,678 UART: [art] Populate DV Done
20,582,202 UART: [fht] FMC Alias Private Key: 7
20,583,685 UART: [art] Derive CDI
20,584,450 UART: [art] Store in in slot 0x4
20,626,719 UART: [art] Derive Key Pair
20,627,761 UART: [art] Store priv key in slot 0x5
23,055,019 UART: [art] Derive Key Pair - Done
23,067,908 UART: [art] Signing Cert with AUTHO
23,069,214 UART: RITY.KEYID = 7
24,774,599 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,135 UART: [art] PUB.X = 22EE54D8AA0EBE3437C5D8DE9914965A16DD8BE8BE4AB1C8CC9875CE1759A44CA7C2B9BA501F99E7DB4280608A54BC01
24,783,401 UART: [art] PUB.Y = 14B58158EC932138470566A96CC554FF48784694A57961F97CD3CA7204043E1284A85F5236B955E48A83893CE0479D4B
24,790,603 UART: [art] SIG.R = D245609ABB0C06F969091534EDE36193F38D3D1DD4EC002BD8A54E6203A305B2A4DDC5ADD3F860209A259132FA94BBA4
24,797,941 UART: [art] SIG.S = 9DBB19A72B24A8D8C0873284C4BE7A41250F5CDC05EECFCEBA839C61FA03E5823BD3B64ACD867D77955D0ABF976FFC74
25,777,368 UART: Caliptra RT
25,778,069 UART: [state] CFI Enabled
25,894,714 UART: [rt] RT listening for mailbox commands...
25,926,016 UART: [rt]cmd =0x46505344, len=4
26,035,759 >>> mbox cmd response data (8 bytes)
26,036,326 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,036,621 UART: Fatal Error: 0x000E0008
26,037,707 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
3,697,936 ready_for_fw is high
3,698,355 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,922 >>> mbox cmd response: success
14,269,694 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,524,108 UART:
18,524,498 UART: Running Caliptra FMC ...
18,525,601 UART:
18,525,753 UART: [state] CFI Enabled
18,533,650 UART: [fht] FMC Alias Private Key: 7
20,291,381 UART: [art] Extend RT PCRs Done
20,292,607 UART: [art] Lock RT PCRs Done
20,294,313 UART: [art] Populate DV Done
20,299,671 UART: [fht] FMC Alias Private Key: 7
20,301,153 UART: [art] Derive CDI
20,301,889 UART: [art] Store in in slot 0x4
20,344,532 UART: [art] Derive Key Pair
20,345,527 UART: [art] Store priv key in slot 0x5
22,771,976 UART: [art] Derive Key Pair - Done
22,784,866 UART: [art] Signing Cert with AUTHO
22,786,169 UART: RITY.KEYID = 7
24,491,359 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,836 UART: [art] PUB.X = 3D462F82EB094E16632B1775EDC356725655D0941D3E451F76C41B7A538D8AB037696D3BDF436E5EE13C7E6483B2E082
24,500,074 UART: [art] PUB.Y = FF28F42473A005AB6975F6A866D680D0B386372E6B57E53EA29A7E2FCC64789A122B161F63022B00CF9371133C0CF6FC
24,507,331 UART: [art] SIG.R = 875B553AA666625A14997C18AEFD8F57B7AFA6859778EE63CBF3EFF8794E390076B49AEAC5C004926F9A3F8BA8A0DBDE
24,514,724 UART: [art] SIG.S = 3909EAE3823DBBE62646FB6CC35DE360D83F12BC3EFC0B7FBA925ABD4DDFD25DC80992E3444C7868452913E865C122BB
25,493,720 UART: Caliptra RT
25,494,455 UART: [state] CFI Enabled
25,611,677 UART: [rt] RT listening for mailbox commands...
25,642,897 UART: [rt]cmd =0x46505344, len=4
25,752,819 >>> mbox cmd response data (8 bytes)
25,753,341 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,753,625 UART: Fatal Error: 0x000E0008
25,754,792 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,204 UART:
192,574 UART: Running Caliptra ROM ...
193,679 UART:
193,822 UART: [state] CFI Enabled
264,008 UART: [state] LifecycleState = Unprovisioned
266,369 UART: [state] DebugLocked = No
269,170 UART: [state] WD Timer not started. Device not locked for debugging
274,360 UART: [kat] SHA2-256
464,237 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,052 UART: [kat] ++
475,529 UART: [kat] sha1
486,273 UART: [kat] SHA2-256
489,299 UART: [kat] SHA2-384
493,946 UART: [kat] SHA2-512-ACC
496,535 UART: [kat] ECC-384
2,946,486 UART: [kat] HMAC-384Kdf
2,969,863 UART: [kat] LMS
3,501,601 UART: [kat] --
3,505,801 UART: [cold-reset] ++
3,507,305 UART: [fht] FHT @ 0x50003400
3,519,362 UART: [idev] ++
3,520,110 UART: [idev] CDI.KEYID = 6
3,521,030 UART: [idev] SUBJECT.KEYID = 7
3,522,214 UART: [idev] UDS.KEYID = 0
3,523,141 ready_for_fw is high
3,523,331 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,946 UART: [idev] Erasing UDS.KEYID = 0
6,028,015 UART: [idev] Sha1 KeyId Algorithm
6,050,551 UART: [idev] --
6,055,902 UART: [ldev] ++
6,056,590 UART: [ldev] CDI.KEYID = 6
6,057,506 UART: [ldev] SUBJECT.KEYID = 5
6,058,675 UART: [ldev] AUTHORITY.KEYID = 7
6,059,910 UART: [ldev] FE.KEYID = 1
6,099,214 UART: [ldev] Erasing FE.KEYID = 1
8,606,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,225 UART: [ldev] --
10,413,482 UART: [fwproc] Wait for Commands...
10,415,059 UART: [fwproc] Recv command 0x46574c44
10,417,322 UART: [fwproc] Recv'd Img size: 114168 bytes
13,861,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,598,663 >>> mbox cmd response: success
14,599,181 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,602,821 UART: [afmc] ++
14,603,527 UART: [afmc] CDI.KEYID = 6
14,604,717 UART: [afmc] SUBJECT.KEYID = 7
14,606,204 UART: [afmc] AUTHORITY.KEYID = 5
17,148,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,948 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,838 UART: [afmc] --
18,948,277 UART: [cold-reset] --
18,954,519 UART: [state] Locking Datavault
18,961,327 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,489 UART: [state] Locking ICCM
18,965,165 UART: [exit] Launching FMC @ 0x40000130
18,973,850 UART:
18,974,083 UART: Running Caliptra FMC ...
18,975,191 UART:
18,975,353 UART: [state] CFI Enabled
19,032,448 UART: [fht] FMC Alias Private Key: 7
20,796,666 UART: [art] Extend RT PCRs Done
20,797,885 UART: [art] Lock RT PCRs Done
20,799,433 UART: [art] Populate DV Done
20,804,572 UART: [fht] FMC Alias Private Key: 7
20,806,071 UART: [art] Derive CDI
20,806,891 UART: [art] Store in in slot 0x4
20,865,042 UART: [art] Derive Key Pair
20,866,047 UART: [art] Store priv key in slot 0x5
23,329,089 UART: [art] Derive Key Pair - Done
23,341,870 UART: [art] Signing Cert with AUTHO
23,343,172 UART: RITY.KEYID = 7
25,055,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,786 UART: [art] PUB.X = BD02AF69F460A72161090BAEE6699EF6AFFC7356FF2B4DA37A0A5282ADFC22E4F1CE9973556C1E7DBA324ADBF6A72F89
25,064,053 UART: [art] PUB.Y = DDCF1AE3F6E076DFF1B47FCDA6910E3D87202B1A41E52927D74242AD3815AB4FC0607088186D3F84735AB12D19D4CA7C
25,071,319 UART: [art] SIG.R = BFF18021988DD0C0D07FF5A01C2BCAFF4DE5F6F74C921FCB11C86EFF124EF1BDFA440EDB06E2847004A53A0AE087CA9B
25,078,732 UART: [art] SIG.S = 9EC86DFA4D6772C8105AEF8DC72BE9BB537BE6DA3D7F5272EA76A42FB8296EF0970DAD9F31D2C90F8D0F862119D3AD68
26,057,706 UART: Caliptra RT
26,058,406 UART: [state] CFI Enabled
26,223,444 UART: [rt] RT listening for mailbox commands...
26,254,837 UART: [rt]cmd =0x46505344, len=4
26,364,831 >>> mbox cmd response data (8 bytes)
26,365,376 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,365,658 UART: Fatal Error: 0x000E0008
26,366,800 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,440,161 ready_for_fw is high
3,440,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,732,184 >>> mbox cmd response: success
14,732,995 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,043,262 UART:
19,043,669 UART: Running Caliptra FMC ...
19,044,784 UART:
19,044,945 UART: [state] CFI Enabled
19,111,781 UART: [fht] FMC Alias Private Key: 7
20,875,162 UART: [art] Extend RT PCRs Done
20,876,375 UART: [art] Lock RT PCRs Done
20,878,507 UART: [art] Populate DV Done
20,883,799 UART: [fht] FMC Alias Private Key: 7
20,885,292 UART: [art] Derive CDI
20,886,028 UART: [art] Store in in slot 0x4
20,943,655 UART: [art] Derive Key Pair
20,944,668 UART: [art] Store priv key in slot 0x5
23,407,127 UART: [art] Derive Key Pair - Done
23,420,403 UART: [art] Signing Cert with AUTHO
23,421,707 UART: RITY.KEYID = 7
25,132,766 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,263 UART: [art] PUB.X = AD4361666F7811DFC26300B88C2C011C168ECDD1B352838610C68DEDC6725CCA428EEA5CE00FC7E142C9762389783174
25,141,506 UART: [art] PUB.Y = 8DDC384391D78F5126AD4732E110161BCCB0695EE1F58B4662699228C26C97C670DF1CCFE95D89BEA0A939D0F8ED8905
25,148,785 UART: [art] SIG.R = 02E5C54B2E81720D5B16015A0ADF3E7AF05AB5B2BC67F4B9B1C09B86D3CA1F7F84549DF4F214E4A6FC6715F7373577FA
25,156,171 UART: [art] SIG.S = 624D414F865AE16F0458A95EB6C60D72889DECAC6F9C588A47E0457B5DE90758CBAE110BAFD910630694D9DA0C46684B
26,134,722 UART: Caliptra RT
26,135,440 UART: [state] CFI Enabled
26,300,414 UART: [rt] RT listening for mailbox commands...
26,332,031 UART: [rt]cmd =0x46505344, len=4
26,441,693 >>> mbox cmd response data (8 bytes)
26,442,230 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,442,519 UART: Fatal Error: 0x000E0008
26,443,676 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,804 writing to cptra_bootfsm_go
192,888 UART:
193,257 UART: Running Caliptra ROM ...
194,436 UART:
604,155 UART: [state] CFI Enabled
617,034 UART: [state] LifecycleState = Unprovisioned
619,410 UART: [state] DebugLocked = No
621,368 UART: [state] WD Timer not started. Device not locked for debugging
626,337 UART: [kat] SHA2-256
816,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,020 UART: [kat] ++
827,476 UART: [kat] sha1
838,280 UART: [kat] SHA2-256
841,291 UART: [kat] SHA2-384
847,140 UART: [kat] SHA2-512-ACC
849,723 UART: [kat] ECC-384
3,289,611 UART: [kat] HMAC-384Kdf
3,301,786 UART: [kat] LMS
3,833,621 UART: [kat] --
3,838,909 UART: [cold-reset] ++
3,840,057 UART: [fht] FHT @ 0x50003400
3,851,113 UART: [idev] ++
3,851,759 UART: [idev] CDI.KEYID = 6
3,852,789 UART: [idev] SUBJECT.KEYID = 7
3,853,970 UART: [idev] UDS.KEYID = 0
3,854,897 ready_for_fw is high
3,855,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,469 UART: [idev] Erasing UDS.KEYID = 0
6,331,263 UART: [idev] Sha1 KeyId Algorithm
6,353,785 UART: [idev] --
6,358,676 UART: [ldev] ++
6,359,356 UART: [ldev] CDI.KEYID = 6
6,360,243 UART: [ldev] SUBJECT.KEYID = 5
6,361,457 UART: [ldev] AUTHORITY.KEYID = 7
6,362,688 UART: [ldev] FE.KEYID = 1
6,371,977 UART: [ldev] Erasing FE.KEYID = 1
8,848,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,834 UART: [ldev] --
10,640,150 UART: [fwproc] Wait for Commands...
10,642,023 UART: [fwproc] Recv command 0x46574c44
10,644,275 UART: [fwproc] Recv'd Img size: 114168 bytes
14,092,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,283,829 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,825,557 >>> mbox cmd response: success
14,826,067 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,829,765 UART: [afmc] ++
14,830,486 UART: [afmc] CDI.KEYID = 6
14,831,594 UART: [afmc] SUBJECT.KEYID = 7
14,833,137 UART: [afmc] AUTHORITY.KEYID = 5
17,337,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,059,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,061,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,077,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,092,302 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,107,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,549 UART: [afmc] --
19,134,308 UART: [cold-reset] --
19,138,556 UART: [state] Locking Datavault
19,144,392 UART: [state] Locking PCR0, PCR1 and PCR31
19,146,598 UART: [state] Locking ICCM
19,147,944 UART: [exit] Launching FMC @ 0x40000130
19,156,620 UART:
19,156,876 UART: Running Caliptra FMC ...
19,157,993 UART:
19,158,158 UART: [state] CFI Enabled
19,166,484 UART: [fht] FMC Alias Private Key: 7
20,923,691 UART: [art] Extend RT PCRs Done
20,924,914 UART: [art] Lock RT PCRs Done
20,926,727 UART: [art] Populate DV Done
20,932,143 UART: [fht] FMC Alias Private Key: 7
20,933,626 UART: [art] Derive CDI
20,934,388 UART: [art] Store in in slot 0x4
20,977,143 UART: [art] Derive Key Pair
20,978,314 UART: [art] Store priv key in slot 0x5
23,404,668 UART: [art] Derive Key Pair - Done
23,417,882 UART: [art] Signing Cert with AUTHO
23,419,186 UART: RITY.KEYID = 7
25,124,910 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,438 UART: [art] PUB.X = 0AAD7AF86321E29D656F18BA3148A8A69F76D5A0CFE5B8315E75843646C79DD9A7746E523B4BFC47FD6EE4B64BEDAF81
25,133,681 UART: [art] PUB.Y = F35C3473CF137CADE232A04EC062D6339E855222C1560A49763FFCDF134DB755CA3324870756BCC12A81C12C87BAE769
25,140,945 UART: [art] SIG.R = 5DA7C5768F36608655C3380F7901C0662D09FBEF0421115B46A2DF81409A13D83DB5669DB85816E7EF2C6105DA6A5A95
25,148,351 UART: [art] SIG.S = CA4681402630244909C5420E3DB78ECA56F9F16875DE17EE7B7F09C0A4E7FF00E5173CC647995B914B3FA1C7E692E22E
26,126,804 UART: Caliptra RT
26,127,514 UART: [state] CFI Enabled
26,245,761 UART: [rt] RT listening for mailbox commands...
26,277,271 UART: [rt]cmd =0x46505344, len=4
26,387,134 >>> mbox cmd response data (8 bytes)
26,387,707 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,388,045 UART: Fatal Error: 0x000E0008
26,389,079 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
3,758,046 ready_for_fw is high
3,758,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,948,627 >>> mbox cmd response: success
14,949,276 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,200,692 UART:
19,201,079 UART: Running Caliptra FMC ...
19,202,176 UART:
19,202,331 UART: [state] CFI Enabled
19,210,298 UART: [fht] FMC Alias Private Key: 7
20,967,282 UART: [art] Extend RT PCRs Done
20,968,507 UART: [art] Lock RT PCRs Done
20,970,002 UART: [art] Populate DV Done
20,975,425 UART: [fht] FMC Alias Private Key: 7
20,977,021 UART: [art] Derive CDI
20,977,768 UART: [art] Store in in slot 0x4
21,020,523 UART: [art] Derive Key Pair
21,021,568 UART: [art] Store priv key in slot 0x5
23,448,746 UART: [art] Derive Key Pair - Done
23,461,578 UART: [art] Signing Cert with AUTHO
23,462,885 UART: RITY.KEYID = 7
25,168,560 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,071 UART: [art] PUB.X = 5AB4CF6215F9295CF7E4BCE93FD9EAFEC169783F1F2E966AEE51D68CC2ED40F37C668218BB8C4E8BB89D3780A9A1931E
25,177,375 UART: [art] PUB.Y = FB44CA92C29F197E01D09A7E7B9B61B91D9D8BF97709A5267180A2B0776107BB501FF2C123F3A88EE33DE7532B9729AA
25,184,615 UART: [art] SIG.R = 533B981271EE5170CD938528FE508CA40EAB9154F5D46F22ACF2FEFE10177F730988DB34686C99375E6294DD91CC62AE
25,192,003 UART: [art] SIG.S = B5B7255F2CC4169D66AAF6F77EDF9EA627EC2286F3C1B21BAD2F38FA2A5C54F32189728A7859A9DE585406599A84E9AA
26,170,706 UART: Caliptra RT
26,171,397 UART: [state] CFI Enabled
26,289,220 UART: [rt] RT listening for mailbox commands...
26,320,850 UART: [rt]cmd =0x46505344, len=4
26,430,485 >>> mbox cmd response data (8 bytes)
26,431,002 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,431,290 UART: Fatal Error: 0x000E0008
26,432,432 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,481 UART: [kat] SHA2-256
892,419 UART: [kat] SHA2-384
895,092 UART: [kat] SHA2-512-ACC
896,993 UART: [kat] ECC-384
902,802 UART: [kat] HMAC-384Kdf
907,284 UART: [kat] LMS
1,475,480 UART: [kat] --
1,476,509 UART: [cold-reset] ++
1,477,041 UART: [fht] Storing FHT @ 0x50003400
1,479,624 UART: [idev] ++
1,479,792 UART: [idev] CDI.KEYID = 6
1,480,152 UART: [idev] SUBJECT.KEYID = 7
1,480,576 UART: [idev] UDS.KEYID = 0
1,480,921 ready_for_fw is high
1,480,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,654 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,692 UART: [idev] --
1,514,661 UART: [ldev] ++
1,514,829 UART: [ldev] CDI.KEYID = 6
1,515,192 UART: [ldev] SUBJECT.KEYID = 5
1,515,618 UART: [ldev] AUTHORITY.KEYID = 7
1,516,081 UART: [ldev] FE.KEYID = 1
1,521,289 UART: [ldev] Erasing FE.KEYID = 1
1,546,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,862 UART: [ldev] --
1,586,313 UART: [fwproc] Waiting for Commands...
1,587,046 UART: [fwproc] Received command 0x46574c44
1,587,837 UART: [fwproc] Received Image of size 114168 bytes
2,883,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,635 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,580 >>> mbox cmd response: success
3,075,580 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,076,828 UART: [afmc] ++
3,076,996 UART: [afmc] CDI.KEYID = 6
3,077,358 UART: [afmc] SUBJECT.KEYID = 7
3,077,783 UART: [afmc] AUTHORITY.KEYID = 5
3,112,546 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,578 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,358 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,971 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,661 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,746 UART: [afmc] --
3,155,708 UART: [cold-reset] --
3,156,268 UART: [state] Locking Datavault
3,157,643 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,247 UART: [state] Locking ICCM
3,158,801 UART: [exit] Launching FMC @ 0x40000130
3,164,130 UART:
3,164,146 UART: Running Caliptra FMC ...
3,164,554 UART:
3,164,608 UART: [state] CFI Enabled
3,175,229 UART: [fht] FMC Alias Private Key: 7
3,282,758 UART: [art] Extend RT PCRs Done
3,283,186 UART: [art] Lock RT PCRs Done
3,284,772 UART: [art] Populate DV Done
3,292,723 UART: [fht] FMC Alias Private Key: 7
3,293,761 UART: [art] Derive CDI
3,294,041 UART: [art] Store in in slot 0x4
3,379,530 UART: [art] Derive Key Pair
3,379,890 UART: [art] Store priv key in slot 0x5
3,392,860 UART: [art] Derive Key Pair - Done
3,407,775 UART: [art] Signing Cert with AUTHO
3,408,255 UART: RITY.KEYID = 7
3,423,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,094 UART: [art] PUB.X = 1445F609BA05056ED0FAB9B528DAFA78BEFE8DFD84424726A6D1AA8CAA3FDD96BE6509FBC923696C641C3EBF325F1D7A
3,430,876 UART: [art] PUB.Y = 7052164F4509D3FE9234E7C1623292CFE9624E5FC40430B913172371C418EFDE67F9118C80AAD7811C3623636D0E5B09
3,437,806 UART: [art] SIG.R = 98DBD91D40B22152FFABF1807E50869F28545C5E152229F4B967883A8A258039640498FB80DC2D686F6CA86C1563A8DC
3,444,571 UART: [art] SIG.S = 890B68DC63F6C18DF66761183FBC48C2C44F0D1A43F9C1CB7F6D30259D089936E16A1FD742F7FCC5B55918F4CA66BDAB
3,468,367 UART: Caliptra RT
3,468,620 UART: [state] CFI Enabled
3,577,690 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,192 UART: [rt]cmd =0x46505344, len=4
3,716,638 >>> mbox cmd response data (8 bytes)
3,716,639 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,716,675 UART: Fatal Error: 0x000E0008
3,717,798 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 ready_for_fw is high
1,362,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,460 >>> mbox cmd response: success
2,924,460 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,986,016 UART:
2,986,032 UART: Running Caliptra FMC ...
2,986,440 UART:
2,986,494 UART: [state] CFI Enabled
2,997,109 UART: [fht] FMC Alias Private Key: 7
3,105,394 UART: [art] Extend RT PCRs Done
3,105,822 UART: [art] Lock RT PCRs Done
3,107,252 UART: [art] Populate DV Done
3,115,605 UART: [fht] FMC Alias Private Key: 7
3,116,537 UART: [art] Derive CDI
3,116,817 UART: [art] Store in in slot 0x4
3,202,378 UART: [art] Derive Key Pair
3,202,738 UART: [art] Store priv key in slot 0x5
3,216,188 UART: [art] Derive Key Pair - Done
3,231,043 UART: [art] Signing Cert with AUTHO
3,231,523 UART: RITY.KEYID = 7
3,246,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,658 UART: [art] PUB.X = 2D78205CB59E14C6D2C4DE4E6D19CC073388444126490B680BCD016BB95EB9B9A63F80E390EE11E1B5A848DD78629166
3,254,418 UART: [art] PUB.Y = 6C51EEAC69C524231B8FE008EA1328512CC786CD0B612DF70F8BB82CB9A6356D2CC8D003FF6B4F3930C5C84E2E0777BD
3,261,367 UART: [art] SIG.R = A29C1277450B83137AA6984994D6D7B7FA13219F6C462052537111BE9FFB725B351884859A80F3E14845FF58A7E6A52C
3,268,126 UART: [art] SIG.S = FCD8B138FB2A8B0B6177847074B595E6D0746E33AE6A3AC5201F12CF004A98093C701BD99319402CF629FFEC677D037A
3,292,230 UART: Caliptra RT
3,292,483 UART: [state] CFI Enabled
3,400,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,977 UART: [rt]cmd =0x46505344, len=4
3,538,741 >>> mbox cmd response data (8 bytes)
3,538,742 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,538,778 UART: Fatal Error: 0x000E0008
3,539,901 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,620 UART: [kat] SHA2-256
892,558 UART: [kat] SHA2-384
895,225 UART: [kat] SHA2-512-ACC
897,126 UART: [kat] ECC-384
902,969 UART: [kat] HMAC-384Kdf
907,647 UART: [kat] LMS
1,475,843 UART: [kat] --
1,476,844 UART: [cold-reset] ++
1,477,316 UART: [fht] Storing FHT @ 0x50003400
1,480,085 UART: [idev] ++
1,480,253 UART: [idev] CDI.KEYID = 6
1,480,613 UART: [idev] SUBJECT.KEYID = 7
1,481,037 UART: [idev] UDS.KEYID = 0
1,481,382 ready_for_fw is high
1,481,382 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,565 UART: [idev] Erasing UDS.KEYID = 0
1,506,139 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,603 UART: [idev] --
1,515,624 UART: [ldev] ++
1,515,792 UART: [ldev] CDI.KEYID = 6
1,516,155 UART: [ldev] SUBJECT.KEYID = 5
1,516,581 UART: [ldev] AUTHORITY.KEYID = 7
1,517,044 UART: [ldev] FE.KEYID = 1
1,522,260 UART: [ldev] Erasing FE.KEYID = 1
1,548,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,161 UART: [ldev] --
1,587,440 UART: [fwproc] Waiting for Commands...
1,588,251 UART: [fwproc] Received command 0x46574c44
1,589,042 UART: [fwproc] Received Image of size 114168 bytes
2,885,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,628 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,980 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,719 >>> mbox cmd response: success
3,077,719 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,078,809 UART: [afmc] ++
3,078,977 UART: [afmc] CDI.KEYID = 6
3,079,339 UART: [afmc] SUBJECT.KEYID = 7
3,079,764 UART: [afmc] AUTHORITY.KEYID = 5
3,114,675 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,711 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,596 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,286 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,041 UART: [afmc] --
3,158,129 UART: [cold-reset] --
3,158,973 UART: [state] Locking Datavault
3,160,288 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,892 UART: [state] Locking ICCM
3,161,476 UART: [exit] Launching FMC @ 0x40000130
3,166,805 UART:
3,166,821 UART: Running Caliptra FMC ...
3,167,229 UART:
3,167,372 UART: [state] CFI Enabled
3,177,673 UART: [fht] FMC Alias Private Key: 7
3,285,750 UART: [art] Extend RT PCRs Done
3,286,178 UART: [art] Lock RT PCRs Done
3,287,568 UART: [art] Populate DV Done
3,295,857 UART: [fht] FMC Alias Private Key: 7
3,296,869 UART: [art] Derive CDI
3,297,149 UART: [art] Store in in slot 0x4
3,382,752 UART: [art] Derive Key Pair
3,383,112 UART: [art] Store priv key in slot 0x5
3,396,268 UART: [art] Derive Key Pair - Done
3,411,103 UART: [art] Signing Cert with AUTHO
3,411,583 UART: RITY.KEYID = 7
3,426,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,708 UART: [art] PUB.X = 89838D47F8EB6A2E7FBF7D85CE33D97CFD2C2720E86DE03DB777C411869464905DDE733567B3D460BF344DE19A575B01
3,434,481 UART: [art] PUB.Y = 2FF61E2DD6136E4BA61D27378463E8513BFEC2925F5B710865C8D23993F67D36C9FFBBC30032221216D9128C0C469F03
3,441,398 UART: [art] SIG.R = D692728088ADC738B949E12B27FE988AFD05DCA8362FB57E325388BDC3B01A41C5C8AE68823ED93683E9E0F2C97C417F
3,448,173 UART: [art] SIG.S = 59913CDDE1FC947C8A061E5D493DF431430C0B15CD7741540AA443272DC39F0C4DA5FE4E39427740B21B4D7B0D4C9937
3,472,388 UART: Caliptra RT
3,472,733 UART: [state] CFI Enabled
3,581,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,222 UART: [rt]cmd =0x46505344, len=4
3,720,592 >>> mbox cmd response data (8 bytes)
3,720,593 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,720,629 UART: Fatal Error: 0x000E0008
3,721,752 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,970 ready_for_fw is high
1,362,970 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,787 >>> mbox cmd response: success
2,926,787 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,988,463 UART:
2,988,479 UART: Running Caliptra FMC ...
2,988,887 UART:
2,989,030 UART: [state] CFI Enabled
2,999,793 UART: [fht] FMC Alias Private Key: 7
3,107,694 UART: [art] Extend RT PCRs Done
3,108,122 UART: [art] Lock RT PCRs Done
3,109,514 UART: [art] Populate DV Done
3,117,833 UART: [fht] FMC Alias Private Key: 7
3,118,825 UART: [art] Derive CDI
3,119,105 UART: [art] Store in in slot 0x4
3,204,818 UART: [art] Derive Key Pair
3,205,178 UART: [art] Store priv key in slot 0x5
3,218,324 UART: [art] Derive Key Pair - Done
3,232,968 UART: [art] Signing Cert with AUTHO
3,233,448 UART: RITY.KEYID = 7
3,248,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,503 UART: [art] PUB.X = 8ACDAB204A37772153CAD081571FCC2352209D45349B664F3EA696D93A56D41A243AD337F5C49732B6635D7DA8D3D238
3,256,273 UART: [art] PUB.Y = 1BD05189A3BD046EAE6E4483627AA64E0D2AB78CDC99A0B153054B96520CA24AE248844F9FA484DA862812C313FE9A6E
3,263,219 UART: [art] SIG.R = BD9C22C5AE717A726D55F2F5650FFB0E83490A5C467E8B5AC9602BC26DAA19CF1170FA5C09CDE2CCBDC783FF3E9E8074
3,269,999 UART: [art] SIG.S = 02A58849E0A907E101A6DE74C69A0576B8E700AD1DADF356A673F4E47441F17F2B10698654E2E1A7A74FE424A9D4D386
3,293,420 UART: Caliptra RT
3,293,765 UART: [state] CFI Enabled
3,401,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,366 UART: [rt]cmd =0x46505344, len=4
3,540,284 >>> mbox cmd response data (8 bytes)
3,540,285 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,540,321 UART: Fatal Error: 0x000E0008
3,541,444 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
892,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,071 UART: [kat] ++
897,223 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
906,050 UART: [kat] SHA2-512-ACC
907,951 UART: [kat] ECC-384
917,596 UART: [kat] HMAC-384Kdf
922,152 UART: [kat] LMS
1,170,480 UART: [kat] --
1,171,189 UART: [cold-reset] ++
1,171,543 UART: [fht] FHT @ 0x50003400
1,174,196 UART: [idev] ++
1,174,364 UART: [idev] CDI.KEYID = 6
1,174,724 UART: [idev] SUBJECT.KEYID = 7
1,175,148 UART: [idev] UDS.KEYID = 0
1,175,493 ready_for_fw is high
1,175,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,318 UART: [idev] Erasing UDS.KEYID = 0
1,200,259 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,733 UART: [ldev] ++
1,209,901 UART: [ldev] CDI.KEYID = 6
1,210,264 UART: [ldev] SUBJECT.KEYID = 5
1,210,690 UART: [ldev] AUTHORITY.KEYID = 7
1,211,153 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,595 UART: [ldev] --
1,282,002 UART: [fwproc] Wait for Commands...
1,282,706 UART: [fwproc] Recv command 0x46574c44
1,283,434 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,307 >>> mbox cmd response: success
2,773,307 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,774,411 UART: [afmc] ++
2,774,579 UART: [afmc] CDI.KEYID = 6
2,774,941 UART: [afmc] SUBJECT.KEYID = 7
2,775,366 UART: [afmc] AUTHORITY.KEYID = 5
2,810,119 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,104 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,832 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,717 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,436 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,260 UART: [afmc] --
2,853,174 UART: [cold-reset] --
2,854,084 UART: [state] Locking Datavault
2,855,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,027 UART: [state] Locking ICCM
2,856,457 UART: [exit] Launching FMC @ 0x40000130
2,861,786 UART:
2,861,802 UART: Running Caliptra FMC ...
2,862,210 UART:
2,862,264 UART: [state] CFI Enabled
2,872,801 UART: [fht] FMC Alias Private Key: 7
2,980,800 UART: [art] Extend RT PCRs Done
2,981,228 UART: [art] Lock RT PCRs Done
2,982,944 UART: [art] Populate DV Done
2,991,309 UART: [fht] FMC Alias Private Key: 7
2,992,451 UART: [art] Derive CDI
2,992,731 UART: [art] Store in in slot 0x4
3,078,366 UART: [art] Derive Key Pair
3,078,726 UART: [art] Store priv key in slot 0x5
3,091,864 UART: [art] Derive Key Pair - Done
3,106,467 UART: [art] Signing Cert with AUTHO
3,106,947 UART: RITY.KEYID = 7
3,122,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,182 UART: [art] PUB.X = 24BF0186EF7BC460566D1E445B8D7101A87CB7BEC4EABAE9353D5A2E71EECCF0083EB334DA264B96BD6A0CC3A00BC62C
3,129,961 UART: [art] PUB.Y = 18262AF88A610AEB8C5F78DBBFAB073716F9BFBEB32979A04C129104AC505B97FA632D0BE17846F514A20ED345F2E399
3,136,906 UART: [art] SIG.R = 0A923743A927D5F55F49B66F05B339318842D2BF6FE4CB140D5F9691A2DB5C1A238B2C45DAAD0C89DD426CEB89B579B2
3,143,674 UART: [art] SIG.S = 7883A6C0F77A3DFD58818105A03F742BC1F931EC544942E254CA042DB1261DF76FD3BA4C1F81D9CE806DD2A9340C6DC4
3,167,444 UART: Caliptra RT
3,167,697 UART: [state] CFI Enabled
3,276,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,660 UART: [rt]cmd =0x46505344, len=4
3,414,744 >>> mbox cmd response data (8 bytes)
3,414,745 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,414,781 UART: Fatal Error: 0x000E0008
3,415,904 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,407 ready_for_fw is high
1,059,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,504 >>> mbox cmd response: success
2,622,504 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,683,950 UART:
2,683,966 UART: Running Caliptra FMC ...
2,684,374 UART:
2,684,428 UART: [state] CFI Enabled
2,694,805 UART: [fht] FMC Alias Private Key: 7
2,802,994 UART: [art] Extend RT PCRs Done
2,803,422 UART: [art] Lock RT PCRs Done
2,805,008 UART: [art] Populate DV Done
2,813,387 UART: [fht] FMC Alias Private Key: 7
2,814,549 UART: [art] Derive CDI
2,814,829 UART: [art] Store in in slot 0x4
2,900,442 UART: [art] Derive Key Pair
2,900,802 UART: [art] Store priv key in slot 0x5
2,913,630 UART: [art] Derive Key Pair - Done
2,928,358 UART: [art] Signing Cert with AUTHO
2,928,838 UART: RITY.KEYID = 7
2,943,496 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,261 UART: [art] PUB.X = FD91DF0318BFCF11E983E74D522E3E2300197AB4445638E6BB57F770E2AB57E05AC724644892C9E077D25677E7DD35E3
2,951,008 UART: [art] PUB.Y = B85F40BB6493194A9FD036E088E113AD22B7D279B4138725F77B4087CDCC9F8A7F6C1D996E221F2BD526E00A7F3AF2C3
2,957,963 UART: [art] SIG.R = 4DB2F3D30A980A9CEEA59514949F0D91D1B22C190A228F3310DCDD801F1A65436F5FE5DD97682F71D5286C402BC83938
2,964,725 UART: [art] SIG.S = 8F0FA7CD8C1A07C4034910B0FCE0CAC846A03BDB9C6563530D1DC6930F3A2C6A9A6850A6B54AF4DE79CF5A50606DDE1C
2,988,363 UART: Caliptra RT
2,988,616 UART: [state] CFI Enabled
3,096,357 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,895 UART: [rt]cmd =0x46505344, len=4
3,235,163 >>> mbox cmd response data (8 bytes)
3,235,164 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,235,200 UART: Fatal Error: 0x000E0008
3,236,323 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,553 UART: [kat] HMAC-384Kdf
923,251 UART: [kat] LMS
1,171,579 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,912 UART: [fht] FHT @ 0x50003400
1,175,645 UART: [idev] ++
1,175,813 UART: [idev] CDI.KEYID = 6
1,176,173 UART: [idev] SUBJECT.KEYID = 7
1,176,597 UART: [idev] UDS.KEYID = 0
1,176,942 ready_for_fw is high
1,176,942 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,836 UART: [idev] Sha1 KeyId Algorithm
1,210,230 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,704 UART: [ldev] Erasing FE.KEYID = 1
1,244,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,274 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,327 UART: [fwproc] Recv command 0x46574c44
1,285,055 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,997 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,524 >>> mbox cmd response: success
2,773,524 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,774,714 UART: [afmc] ++
2,774,882 UART: [afmc] CDI.KEYID = 6
2,775,244 UART: [afmc] SUBJECT.KEYID = 7
2,775,669 UART: [afmc] AUTHORITY.KEYID = 5
2,810,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,063 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,791 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,676 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,395 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,093 UART: [afmc] --
2,854,013 UART: [cold-reset] --
2,854,901 UART: [state] Locking Datavault
2,855,938 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,542 UART: [state] Locking ICCM
2,857,066 UART: [exit] Launching FMC @ 0x40000130
2,862,395 UART:
2,862,411 UART: Running Caliptra FMC ...
2,862,819 UART:
2,862,962 UART: [state] CFI Enabled
2,873,649 UART: [fht] FMC Alias Private Key: 7
2,981,258 UART: [art] Extend RT PCRs Done
2,981,686 UART: [art] Lock RT PCRs Done
2,982,936 UART: [art] Populate DV Done
2,991,247 UART: [fht] FMC Alias Private Key: 7
2,992,347 UART: [art] Derive CDI
2,992,627 UART: [art] Store in in slot 0x4
3,078,278 UART: [art] Derive Key Pair
3,078,638 UART: [art] Store priv key in slot 0x5
3,091,852 UART: [art] Derive Key Pair - Done
3,106,958 UART: [art] Signing Cert with AUTHO
3,107,438 UART: RITY.KEYID = 7
3,123,226 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,991 UART: [art] PUB.X = E672A4D40CFB840A3C2BF6FC952626956324A647759A82B686DCEBF978A5D79DACFC013E4E7D32D2B6256197AEEC2F56
3,130,764 UART: [art] PUB.Y = 5007ADD5E5AB88280685A6BA25EF4411FEC2FB0892AB9FB1708120234BE436EC918FC915A48654094CE926E746D3F5E4
3,137,706 UART: [art] SIG.R = 794F6C9DE530F442E73F57CFC5617B0F2941B3F556BF080332BADF1E80D22C1764A80F43C16E93D764F518D09801C975
3,144,461 UART: [art] SIG.S = 247FF33100A523746F8077D5AC641E1EB8710639563FAC09788DD44B1E8478CB6F9B0BF01096473F6195FE66FD42163A
3,168,409 UART: Caliptra RT
3,168,754 UART: [state] CFI Enabled
3,276,729 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,927 UART: [rt]cmd =0x46505344, len=4
3,415,295 >>> mbox cmd response data (8 bytes)
3,415,296 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,415,332 UART: Fatal Error: 0x000E0008
3,416,455 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,010 ready_for_fw is high
1,061,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,327 >>> mbox cmd response: success
2,625,327 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,688,633 UART:
2,688,649 UART: Running Caliptra FMC ...
2,689,057 UART:
2,689,200 UART: [state] CFI Enabled
2,699,933 UART: [fht] FMC Alias Private Key: 7
2,807,318 UART: [art] Extend RT PCRs Done
2,807,746 UART: [art] Lock RT PCRs Done
2,809,296 UART: [art] Populate DV Done
2,817,499 UART: [fht] FMC Alias Private Key: 7
2,818,551 UART: [art] Derive CDI
2,818,831 UART: [art] Store in in slot 0x4
2,904,850 UART: [art] Derive Key Pair
2,905,210 UART: [art] Store priv key in slot 0x5
2,918,640 UART: [art] Derive Key Pair - Done
2,933,069 UART: [art] Signing Cert with AUTHO
2,933,549 UART: RITY.KEYID = 7
2,948,381 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,146 UART: [art] PUB.X = 0BA504A69ACE17DB4084317FFBB8A6FFAAE98505339353EE2D22986126572A178A5BBF03C74684F3DE92F028BF5264B9
2,955,910 UART: [art] PUB.Y = 451A7D760DFF6497F6AECE3EC992484998F80A5D5C347C0AF9DE11FA3433230F1021F18347AA38D4292DBF96E4FD123B
2,962,856 UART: [art] SIG.R = 8A8FCB810A4E19B18246801B6E5938C2260D0C0210792D63A6FFB10DFC96EAE74A8EEEDC95CBEEC8CA129D6DEACB11A4
2,969,635 UART: [art] SIG.S = 9379839263C013488B52556C86ED32F699D6DF792C2892AD08F3478961C55B4D10C87176975A2CDCF344DFE8E9CAE62D
2,993,647 UART: Caliptra RT
2,993,992 UART: [state] CFI Enabled
3,102,214 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,546 UART: [rt]cmd =0x46505344, len=4
3,240,674 >>> mbox cmd response data (8 bytes)
3,240,675 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,240,711 UART: Fatal Error: 0x000E0008
3,241,834 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,461 UART: [kat] SHA2-256
901,401 UART: [kat] SHA2-384
904,002 UART: [kat] SHA2-512-ACC
905,903 UART: [kat] ECC-384
915,580 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,781 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,174,067 ready_for_fw is high
1,174,067 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,275 UART: [idev] Sha1 KeyId Algorithm
1,208,049 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,215,658 UART: [ldev] Erasing FE.KEYID = 1
1,242,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,388 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,393 UART: [fwproc] Recv command 0x46574c44
1,283,126 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,837 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,431 >>> mbox cmd response: success
2,771,431 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,772,630 UART: [afmc] ++
2,772,798 UART: [afmc] CDI.KEYID = 6
2,773,161 UART: [afmc] SUBJECT.KEYID = 7
2,773,587 UART: [afmc] AUTHORITY.KEYID = 5
2,809,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,574 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,937 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,425 UART: [afmc] --
2,852,357 UART: [cold-reset] --
2,853,217 UART: [state] Locking Datavault
2,854,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,112 UART: [state] Locking ICCM
2,855,786 UART: [exit] Launching FMC @ 0x40000130
2,861,115 UART:
2,861,131 UART: Running Caliptra FMC ...
2,861,539 UART:
2,861,593 UART: [state] CFI Enabled
2,871,976 UART: [fht] FMC Alias Private Key: 7
2,980,447 UART: [art] Extend RT PCRs Done
2,980,875 UART: [art] Lock RT PCRs Done
2,982,519 UART: [art] Populate DV Done
2,990,920 UART: [fht] FMC Alias Private Key: 7
2,991,924 UART: [art] Derive CDI
2,992,204 UART: [art] Store in in slot 0x4
3,077,901 UART: [art] Derive Key Pair
3,078,261 UART: [art] Store priv key in slot 0x5
3,091,321 UART: [art] Derive Key Pair - Done
3,106,427 UART: [art] Signing Cert with AUTHO
3,106,907 UART: RITY.KEYID = 7
3,122,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,782 UART: [art] PUB.X = 7FA4CCA7D1F6EA383F6E793AA45ADD0355DD368C256749C54DA457425158B182255CAB05B49BEF2CD5BCC638DB211854
3,129,558 UART: [art] PUB.Y = E06356176D3D2C8B1AEEFE151B8938276002575D527DCCC99ECC2C5CA3D7C7A961594BAD51649DAB5653C35C0A90FF6F
3,136,514 UART: [art] SIG.R = D0AE4FECEB4E098C67AEBCD2F71E67FEF2AA32561799EA70CC612363044F86964CC6024DD45B71F4E9F84167E5F2AA3B
3,143,293 UART: [art] SIG.S = B6A12B36AD5F301B83B899B89169DF467E9508FFE9FE4352B99BDC1022F0948B869A17B85356A01503A685C995CD3251
3,167,120 UART: Caliptra RT
3,167,373 UART: [state] CFI Enabled
3,275,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,219 UART: [rt]cmd =0x46505344, len=4
3,414,731 >>> mbox cmd response data (8 bytes)
3,414,732 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,414,768 UART: Fatal Error: 0x000E0008
3,415,891 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,332 ready_for_fw is high
1,056,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,675 >>> mbox cmd response: success
2,620,675 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,682,479 UART:
2,682,495 UART: Running Caliptra FMC ...
2,682,903 UART:
2,682,957 UART: [state] CFI Enabled
2,693,330 UART: [fht] FMC Alias Private Key: 7
2,801,235 UART: [art] Extend RT PCRs Done
2,801,663 UART: [art] Lock RT PCRs Done
2,803,175 UART: [art] Populate DV Done
2,811,334 UART: [fht] FMC Alias Private Key: 7
2,812,406 UART: [art] Derive CDI
2,812,686 UART: [art] Store in in slot 0x4
2,898,427 UART: [art] Derive Key Pair
2,898,787 UART: [art] Store priv key in slot 0x5
2,911,701 UART: [art] Derive Key Pair - Done
2,926,427 UART: [art] Signing Cert with AUTHO
2,926,907 UART: RITY.KEYID = 7
2,942,207 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,972 UART: [art] PUB.X = F5FF5C23E13C3A38238DA4CDBB8DE383D93C746C9C1A414EF8A41AAC687832FB305D940551726E7252D5BD82DF255DCB
2,949,753 UART: [art] PUB.Y = 0116713A53881D4DCB9C8C25979FAD56C5D9B62578141771D6AAC98ABB4BB3A2EB42E2B22E8604BE1C72EC2F27850150
2,956,700 UART: [art] SIG.R = EC63A8035B9D420688ED982BDB01022D06D7FDA8E98263F05A6E4BFF486E14DD0278CB550D927C7D9AB78A2BFD5E821C
2,963,463 UART: [art] SIG.S = 4AA3F44F9557C195697B41996E3F33DDE2910498AA4D4F951A8628BB612EE3D765DCB664B731DB74271278E47DD4101B
2,987,303 UART: Caliptra RT
2,987,556 UART: [state] CFI Enabled
3,096,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,467 UART: [rt]cmd =0x46505344, len=4
3,234,703 >>> mbox cmd response data (8 bytes)
3,234,704 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,234,740 UART: Fatal Error: 0x000E0008
3,235,863 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
891,359 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,635 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,728 UART: [cold-reset] ++
1,171,182 UART: [fht] FHT @ 0x50003400
1,173,952 UART: [idev] ++
1,174,120 UART: [idev] CDI.KEYID = 6
1,174,481 UART: [idev] SUBJECT.KEYID = 7
1,174,906 UART: [idev] UDS.KEYID = 0
1,175,252 ready_for_fw is high
1,175,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,048 UART: [idev] Erasing UDS.KEYID = 0
1,200,008 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,475 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,763 UART: [ldev] Erasing FE.KEYID = 1
1,243,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,931 UART: [ldev] --
1,283,373 UART: [fwproc] Wait for Commands...
1,284,074 UART: [fwproc] Recv command 0x46574c44
1,284,807 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,816 >>> mbox cmd response: success
2,773,816 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,774,905 UART: [afmc] ++
2,775,073 UART: [afmc] CDI.KEYID = 6
2,775,436 UART: [afmc] SUBJECT.KEYID = 7
2,775,862 UART: [afmc] AUTHORITY.KEYID = 5
2,811,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,106 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,718 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,334 UART: [afmc] --
2,855,432 UART: [cold-reset] --
2,856,282 UART: [state] Locking Datavault
2,857,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,715 UART: [state] Locking ICCM
2,858,317 UART: [exit] Launching FMC @ 0x40000130
2,863,646 UART:
2,863,662 UART: Running Caliptra FMC ...
2,864,070 UART:
2,864,213 UART: [state] CFI Enabled
2,874,890 UART: [fht] FMC Alias Private Key: 7
2,982,025 UART: [art] Extend RT PCRs Done
2,982,453 UART: [art] Lock RT PCRs Done
2,983,657 UART: [art] Populate DV Done
2,991,834 UART: [fht] FMC Alias Private Key: 7
2,992,856 UART: [art] Derive CDI
2,993,136 UART: [art] Store in in slot 0x4
3,078,399 UART: [art] Derive Key Pair
3,078,759 UART: [art] Store priv key in slot 0x5
3,092,549 UART: [art] Derive Key Pair - Done
3,107,098 UART: [art] Signing Cert with AUTHO
3,107,578 UART: RITY.KEYID = 7
3,122,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,737 UART: [art] PUB.X = F0170E3D3D5946E97C0FCC27217B580756B793C59C3DE9EC3AB85B43A0AC6171D718CA4B81BD7EB185770524318EA687
3,130,499 UART: [art] PUB.Y = 7D5FF779A53440F0A8463BF14CD4D060D6F07AA04B7D0A8ABB9A39C1CFDBB3394DE4B83A8D429EA6521BD25B0B1784ED
3,137,463 UART: [art] SIG.R = E3C3793B0B578CF9B60DAC41EAF7D0D018028C6E7EBFA296C67E5D2705300F8F965EDAECB724BD1DD1F7ECEE164589E1
3,144,240 UART: [art] SIG.S = 3D254360492922F3250DCDBB4588DC30B54A4BA5EC659208CABDC1BB6E70490ABF796DF46A54FB7C92070F45A926389F
3,168,226 UART: Caliptra RT
3,168,571 UART: [state] CFI Enabled
3,275,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,132 UART: [rt]cmd =0x46505344, len=4
3,414,414 >>> mbox cmd response data (8 bytes)
3,414,415 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,414,451 UART: Fatal Error: 0x000E0008
3,415,574 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,407 ready_for_fw is high
1,055,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,392 >>> mbox cmd response: success
2,620,392 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,683,364 UART:
2,683,380 UART: Running Caliptra FMC ...
2,683,788 UART:
2,683,931 UART: [state] CFI Enabled
2,694,710 UART: [fht] FMC Alias Private Key: 7
2,802,271 UART: [art] Extend RT PCRs Done
2,802,699 UART: [art] Lock RT PCRs Done
2,804,133 UART: [art] Populate DV Done
2,812,542 UART: [fht] FMC Alias Private Key: 7
2,813,662 UART: [art] Derive CDI
2,813,942 UART: [art] Store in in slot 0x4
2,899,665 UART: [art] Derive Key Pair
2,900,025 UART: [art] Store priv key in slot 0x5
2,913,369 UART: [art] Derive Key Pair - Done
2,927,953 UART: [art] Signing Cert with AUTHO
2,928,433 UART: RITY.KEYID = 7
2,943,109 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,874 UART: [art] PUB.X = C8B1600FC80378A95F9A7F333950EBCC9D1404113158769C48CB298930381E96CF11F9D5218B24A0AECE5C05CBF31867
2,950,632 UART: [art] PUB.Y = 5468A01F01AC0DE08545E0308F595416E7BA3BD4D4755B326679F12003E2A39BCE14730E391D0533BBC5627C0CBD26D3
2,957,564 UART: [art] SIG.R = 681C50290742B4668850B15F145FE9E9AC3A79542F981242BD3F7A1589DBE50FF9A7FB047D778BD63B1DA823D68EED16
2,964,329 UART: [art] SIG.S = 7BC63B0A26845A1D88CA2083E31219C4A26041C369D5A770C9E543CC1A1F180331D549101D170408127BCA4ED9A2945E
2,988,120 UART: Caliptra RT
2,988,465 UART: [state] CFI Enabled
3,096,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,790 UART: [rt]cmd =0x46505344, len=4
3,234,914 >>> mbox cmd response data (8 bytes)
3,234,915 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,234,951 UART: Fatal Error: 0x000E0008
3,236,074 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,007 UART:
192,394 UART: Running Caliptra ROM ...
193,581 UART:
193,750 UART: [state] CFI Enabled
268,604 UART: [state] LifecycleState = Unprovisioned
270,603 UART: [state] DebugLocked = No
272,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,424 UART: [kat] SHA2-256
447,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,614 UART: [kat] ++
458,207 UART: [kat] sha1
468,369 UART: [kat] SHA2-256
471,089 UART: [kat] SHA2-384
476,790 UART: [kat] SHA2-512-ACC
479,149 UART: [kat] ECC-384
2,770,042 UART: [kat] HMAC-384Kdf
2,802,597 UART: [kat] LMS
3,992,865 UART: [kat] --
3,997,227 UART: [cold-reset] ++
3,999,099 UART: [fht] Storing FHT @ 0x50003400
4,010,077 UART: [idev] ++
4,010,641 UART: [idev] CDI.KEYID = 6
4,011,623 UART: [idev] SUBJECT.KEYID = 7
4,012,789 UART: [idev] UDS.KEYID = 0
4,013,828 ready_for_fw is high
4,014,025 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,207 UART: [idev] Erasing UDS.KEYID = 0
7,346,392 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,064 UART: [idev] --
7,371,792 UART: [ldev] ++
7,372,362 UART: [ldev] CDI.KEYID = 6
7,373,372 UART: [ldev] SUBJECT.KEYID = 5
7,374,523 UART: [ldev] AUTHORITY.KEYID = 7
7,375,794 UART: [ldev] FE.KEYID = 1
7,423,243 UART: [ldev] Erasing FE.KEYID = 1
10,756,927 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,585 UART: [ldev] --
13,138,882 UART: [fwproc] Waiting for Commands...
13,142,092 UART: [fwproc] Received command 0x46574c44
13,144,329 UART: [fwproc] Received Image of size 113844 bytes
17,199,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,655 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,514 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,659,049 >>> mbox cmd response: success
17,659,586 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,663,404 UART: [afmc] ++
17,663,987 UART: [afmc] CDI.KEYID = 6
17,664,975 UART: [afmc] SUBJECT.KEYID = 7
17,666,184 UART: [afmc] AUTHORITY.KEYID = 5
21,028,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,533 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,833 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,234 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,045 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,481 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,788 UART: [afmc] --
23,399,739 UART: [cold-reset] --
23,403,109 UART: [state] Locking Datavault
23,408,776 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,538 UART: [state] Locking ICCM
23,411,601 UART: [exit] Launching FMC @ 0x40000130
23,419,987 UART:
23,420,212 UART: Running Caliptra FMC ...
23,421,327 UART:
23,421,487 UART: [state] CFI Enabled
23,491,793 UART: [fht] FMC Alias Private Key: 7
25,830,122 UART: [art] Extend RT PCRs Done
25,831,339 UART: [art] Lock RT PCRs Done
25,832,926 UART: [art] Populate DV Done
25,838,382 UART: [fht] FMC Alias Private Key: 7
25,839,972 UART: [art] Derive CDI
25,840,703 UART: [art] Store in in slot 0x4
25,901,323 UART: [art] Derive Key Pair
25,902,354 UART: [art] Store priv key in slot 0x5
29,194,962 UART: [art] Derive Key Pair - Done
29,208,061 UART: [art] Signing Cert with AUTHO
29,209,358 UART: RITY.KEYID = 7
31,496,312 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,820 UART: [art] PUB.X = 18698973FC4215F1FC10406880D57C29806AE64A293D41F4F0578DDCBF71B8B046E6EA0C52E396C212BF7C2CE71632CB
31,505,062 UART: [art] PUB.Y = D5F5CB92D928E7C70FD5BF05B3625C4EA2A383A29E9E6585D9512AF04051BC5A4217A8C147C8028F0108FD368F7B0B55
31,512,290 UART: [art] SIG.R = 196A4700E86CC01C2A8AFA738A4D15D813D3C4BB5B00A68E934FF697F86901A058745030776A9DAA50ACBAF529CF842C
31,519,661 UART: [art] SIG.S = 52B6E51D45978E2F3364A2B77A92A2FBD0830B781C50CAA43C754D1677E25550D9C052C1EC68ECBC1C9BC287973DF316
32,824,895 UART: Caliptra RT
32,825,593 UART: [state] CFI Enabled
32,987,467 UART: [rt] RT listening for mailbox commands...
33,018,679 UART: [rt]cmd =0x46505652, len=4
33,019,925 UART: [rt] FIPS Version
33,021,186 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,805,208 ready_for_fw is high
3,806,178 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,870,548 >>> mbox cmd response: success
17,871,516 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,570,378 UART:
23,570,762 UART: Running Caliptra FMC ...
23,571,897 UART:
23,572,049 UART: [state] CFI Enabled
23,639,852 UART: [fht] FMC Alias Private Key: 7
25,977,769 UART: [art] Extend RT PCRs Done
25,979,027 UART: [art] Lock RT PCRs Done
25,980,789 UART: [art] Populate DV Done
25,985,983 UART: [fht] FMC Alias Private Key: 7
25,987,622 UART: [art] Derive CDI
25,988,351 UART: [art] Store in in slot 0x4
26,048,511 UART: [art] Derive Key Pair
26,049,554 UART: [art] Store priv key in slot 0x5
29,342,207 UART: [art] Derive Key Pair - Done
29,355,368 UART: [art] Signing Cert with AUTHO
29,356,672 UART: RITY.KEYID = 7
31,644,881 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,424 UART: [art] PUB.X = 3D08218C51E4F4508B16D2B9FEF3389B5BF580C5DA35BACEC2F8C745D34B2A850D51FA06828F67E8FC8B4E67F8DAEE7C
31,653,712 UART: [art] PUB.Y = 88F44B67ED4F8204CC3DF04076A7B5D539EAAB19228DA5E75B52ED0EEE4B169F4E44ED7D388EC6532A4CC372863B18F6
31,660,912 UART: [art] SIG.R = 0E0CAA66A33B0D2EBD474236CBF7BCBE127B861CB97D1F7BEE379C53207403D7322B3A76324724712EF03BDE9025BEA8
31,668,283 UART: [art] SIG.S = B87368931676B752C4EA942E1F1FF2DE9F48D2F5F888D20E07EDED3A64B0924E76E58DE5592A69F55AE70973848CD022
32,973,493 UART: Caliptra RT
32,974,203 UART: [state] CFI Enabled
33,135,422 UART: [rt] RT listening for mailbox commands...
33,166,831 UART: [rt]cmd =0x46505652, len=4
33,168,108 UART: [rt] FIPS Version
33,169,485 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,453 UART:
192,836 UART: Running Caliptra ROM ...
193,948 UART:
603,772 UART: [state] CFI Enabled
618,722 UART: [state] LifecycleState = Unprovisioned
620,659 UART: [state] DebugLocked = No
622,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,056 UART: [kat] SHA2-256
796,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,369 UART: [kat] ++
807,818 UART: [kat] sha1
820,128 UART: [kat] SHA2-256
822,815 UART: [kat] SHA2-384
829,029 UART: [kat] SHA2-512-ACC
831,399 UART: [kat] ECC-384
3,115,678 UART: [kat] HMAC-384Kdf
3,126,843 UART: [kat] LMS
4,316,942 UART: [kat] --
4,321,784 UART: [cold-reset] ++
4,323,855 UART: [fht] Storing FHT @ 0x50003400
4,335,003 UART: [idev] ++
4,335,608 UART: [idev] CDI.KEYID = 6
4,336,548 UART: [idev] SUBJECT.KEYID = 7
4,337,804 UART: [idev] UDS.KEYID = 0
4,338,797 ready_for_fw is high
4,339,002 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,896 UART: [idev] Erasing UDS.KEYID = 0
7,627,632 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,006 UART: [idev] --
7,652,961 UART: [ldev] ++
7,653,529 UART: [ldev] CDI.KEYID = 6
7,654,463 UART: [ldev] SUBJECT.KEYID = 5
7,655,729 UART: [ldev] AUTHORITY.KEYID = 7
7,656,962 UART: [ldev] FE.KEYID = 1
7,670,015 UART: [ldev] Erasing FE.KEYID = 1
10,959,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,235 UART: [ldev] --
13,318,905 UART: [fwproc] Waiting for Commands...
13,320,725 UART: [fwproc] Received command 0x46574c44
13,322,906 UART: [fwproc] Received Image of size 113844 bytes
17,379,782 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,292 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,209 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,839,739 >>> mbox cmd response: success
17,840,251 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,844,060 UART: [afmc] ++
17,844,641 UART: [afmc] CDI.KEYID = 6
17,845,523 UART: [afmc] SUBJECT.KEYID = 7
17,846,796 UART: [afmc] AUTHORITY.KEYID = 5
21,161,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,210 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,517 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,850 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,707 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,123 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,469 UART: [afmc] --
23,525,278 UART: [cold-reset] --
23,528,338 UART: [state] Locking Datavault
23,533,655 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,452 UART: [state] Locking ICCM
23,537,823 UART: [exit] Launching FMC @ 0x40000130
23,546,218 UART:
23,546,453 UART: Running Caliptra FMC ...
23,547,551 UART:
23,547,712 UART: [state] CFI Enabled
23,555,649 UART: [fht] FMC Alias Private Key: 7
25,886,493 UART: [art] Extend RT PCRs Done
25,887,708 UART: [art] Lock RT PCRs Done
25,889,357 UART: [art] Populate DV Done
25,894,604 UART: [fht] FMC Alias Private Key: 7
25,896,302 UART: [art] Derive CDI
25,897,113 UART: [art] Store in in slot 0x4
25,939,750 UART: [art] Derive Key Pair
25,940,778 UART: [art] Store priv key in slot 0x5
29,182,620 UART: [art] Derive Key Pair - Done
29,195,800 UART: [art] Signing Cert with AUTHO
29,197,107 UART: RITY.KEYID = 7
31,476,568 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,067 UART: [art] PUB.X = BBBB98BC199E89D1005774BF907D0BF94C598E1F149874C211ADEBEDDEBE154254368DEEAD20831FECAA0165B0D11CD7
31,485,324 UART: [art] PUB.Y = 54F4B1030C2BBBDE3261A31689797095283C5F78599BCA360C5BCEB3CA92252B28161469C3F0DD2BEF1282D7583EE3EF
31,492,631 UART: [art] SIG.R = 1FFF468C773F743CB899563ED210765BABA429A359513F79F6A81816ABC4E7002A2145EF8ADB8E7DC859BA2F4707C9E5
31,499,981 UART: [art] SIG.S = E2EA4192E42BE1B3264CF10833E3579B987F621F206918CD1C839E014A1385A1DD05CCE39D75E6461BEE0B5C16D25F56
32,805,626 UART: Caliptra RT
32,806,335 UART: [state] CFI Enabled
32,924,107 UART: [rt] RT listening for mailbox commands...
32,955,524 UART: [rt]cmd =0x46505652, len=4
32,956,775 UART: [rt] FIPS Version
32,958,208 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,130,141 ready_for_fw is high
4,130,535 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,072,951 >>> mbox cmd response: success
18,073,572 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,714,924 UART:
23,715,308 UART: Running Caliptra FMC ...
23,716,415 UART:
23,716,567 UART: [state] CFI Enabled
23,724,557 UART: [fht] FMC Alias Private Key: 7
26,055,067 UART: [art] Extend RT PCRs Done
26,056,304 UART: [art] Lock RT PCRs Done
26,058,396 UART: [art] Populate DV Done
26,063,868 UART: [fht] FMC Alias Private Key: 7
26,065,583 UART: [art] Derive CDI
26,066,410 UART: [art] Store in in slot 0x4
26,109,072 UART: [art] Derive Key Pair
26,110,118 UART: [art] Store priv key in slot 0x5
29,352,379 UART: [art] Derive Key Pair - Done
29,365,449 UART: [art] Signing Cert with AUTHO
29,366,797 UART: RITY.KEYID = 7
31,646,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,914 UART: [art] PUB.X = C81E16A69B0F0040F51C253F480034910A4B4A898F8A049E31E0D14A351E8990C6242EB5DDE255F591978DBCBB23C493
31,655,109 UART: [art] PUB.Y = C69BA1DFC4C00791C288548287D1A7629FB359B7CF09E84990E7BB06865FEBEF67C5C511E98E917D3E4D49E91AAFE15A
31,662,370 UART: [art] SIG.R = B36C5E3059C4757D71C6D5EC78D5A6147F9A7789AD8D819A77F253B25CD075FA5411500A812667295F60059A75D67A2D
31,669,764 UART: [art] SIG.S = B589D117578E4DA16807E9DBEBFC6791EF312578794EB2D8A1BADD04506FAE73DA67AF28CD286B76CB907751E175B86F
32,974,833 UART: Caliptra RT
32,975,549 UART: [state] CFI Enabled
33,093,795 UART: [rt] RT listening for mailbox commands...
33,125,034 UART: [rt]cmd =0x46505652, len=4
33,126,315 UART: [rt] FIPS Version
33,127,320 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,091 UART:
192,467 UART: Running Caliptra ROM ...
193,667 UART:
193,826 UART: [state] CFI Enabled
264,965 UART: [state] LifecycleState = Unprovisioned
266,820 UART: [state] DebugLocked = No
268,508 UART: [state] WD Timer not started. Device not locked for debugging
271,305 UART: [kat] SHA2-256
450,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,037 UART: [kat] ++
462,577 UART: [kat] sha1
473,527 UART: [kat] SHA2-256
476,599 UART: [kat] SHA2-384
483,365 UART: [kat] SHA2-512-ACC
486,371 UART: [kat] ECC-384
2,949,611 UART: [kat] HMAC-384Kdf
2,971,727 UART: [kat] LMS
3,501,141 UART: [kat] --
3,506,277 UART: [cold-reset] ++
3,507,431 UART: [fht] FHT @ 0x50003400
3,518,412 UART: [idev] ++
3,518,972 UART: [idev] CDI.KEYID = 6
3,519,950 UART: [idev] SUBJECT.KEYID = 7
3,521,146 UART: [idev] UDS.KEYID = 0
3,522,073 ready_for_fw is high
3,522,260 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,859 UART: [idev] Erasing UDS.KEYID = 0
6,028,859 UART: [idev] Sha1 KeyId Algorithm
6,051,572 UART: [idev] --
6,054,008 UART: [ldev] ++
6,054,587 UART: [ldev] CDI.KEYID = 6
6,055,509 UART: [ldev] SUBJECT.KEYID = 5
6,056,673 UART: [ldev] AUTHORITY.KEYID = 7
6,057,908 UART: [ldev] FE.KEYID = 1
6,098,969 UART: [ldev] Erasing FE.KEYID = 1
8,600,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,441 UART: [ldev] --
10,389,578 UART: [fwproc] Wait for Commands...
10,392,162 UART: [fwproc] Recv command 0x46574c44
10,394,255 UART: [fwproc] Recv'd Img size: 114168 bytes
13,786,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,856,500 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,925,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,242,430 >>> mbox cmd response: success
14,243,017 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,246,830 UART: [afmc] ++
14,247,411 UART: [afmc] CDI.KEYID = 6
14,248,290 UART: [afmc] SUBJECT.KEYID = 7
14,249,501 UART: [afmc] AUTHORITY.KEYID = 5
16,788,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,504 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,282 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,129 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,264 UART: [afmc] --
18,605,617 UART: [cold-reset] --
18,610,624 UART: [state] Locking Datavault
18,616,630 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,331 UART: [state] Locking ICCM
18,619,511 UART: [exit] Launching FMC @ 0x40000130
18,627,905 UART:
18,628,147 UART: Running Caliptra FMC ...
18,629,251 UART:
18,629,411 UART: [state] CFI Enabled
18,686,126 UART: [fht] FMC Alias Private Key: 7
20,450,893 UART: [art] Extend RT PCRs Done
20,452,129 UART: [art] Lock RT PCRs Done
20,453,679 UART: [art] Populate DV Done
20,458,764 UART: [fht] FMC Alias Private Key: 7
20,460,404 UART: [art] Derive CDI
20,461,140 UART: [art] Store in in slot 0x4
20,518,305 UART: [art] Derive Key Pair
20,519,343 UART: [art] Store priv key in slot 0x5
22,982,646 UART: [art] Derive Key Pair - Done
22,996,064 UART: [art] Signing Cert with AUTHO
22,997,398 UART: RITY.KEYID = 7
24,707,465 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,961 UART: [art] PUB.X = 7D0A1B62E6CAEC8577DBF8423B7AACADE631162047CB0F57712512AEE631F4FA042D71F99D632D402CC6FFBA5EFFB44C
24,716,282 UART: [art] PUB.Y = 0A7F048ABCCBB6A0AA11A3D5E7047EF192953739C04BD406EED2EF08860D131C41AB4D00C31714AD8B3DFA55012490C6
24,723,535 UART: [art] SIG.R = 735B5EFD2216D79AA29D91F3DB0AE8FEBC474C00431A579DC0D123129711EECC0DB2A3A6A9BC9EE2C3080653FB4307BB
24,730,894 UART: [art] SIG.S = 0D5864027BA959327C641BAFBA37724DC6C74A27E3EEAE2EF507B4075D6067312F0F45F9E5CD8185D05E1E7AD97613A4
25,709,459 UART: Caliptra RT
25,710,187 UART: [state] CFI Enabled
25,874,528 UART: [rt] RT listening for mailbox commands...
25,905,780 UART: [rt]cmd =0x46505652, len=4
25,907,026 UART: [rt] FIPS Version
25,908,400 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,360,895 ready_for_fw is high
3,361,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,062,344 >>> mbox cmd response: success
14,062,970 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,345,817 UART:
18,346,204 UART: Running Caliptra FMC ...
18,347,301 UART:
18,347,454 UART: [state] CFI Enabled
18,413,415 UART: [fht] FMC Alias Private Key: 7
20,176,646 UART: [art] Extend RT PCRs Done
20,178,019 UART: [art] Lock RT PCRs Done
20,179,463 UART: [art] Populate DV Done
20,184,832 UART: [fht] FMC Alias Private Key: 7
20,186,503 UART: [art] Derive CDI
20,187,321 UART: [art] Store in in slot 0x4
20,246,727 UART: [art] Derive Key Pair
20,247,718 UART: [art] Store priv key in slot 0x5
22,710,754 UART: [art] Derive Key Pair - Done
22,723,867 UART: [art] Signing Cert with AUTHO
22,725,170 UART: RITY.KEYID = 7
24,436,585 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,093 UART: [art] PUB.X = 347A5F2D3EA9C654A6693E88D7A96149B7DF5E797AEDF4F844374FCF7E2627C8F3BF647E15A25175851064D9FAAB8BC5
24,445,342 UART: [art] PUB.Y = D842CD61DB7F36770E5526D3FF864780776699B21866C1B2A18697F880834B05F8BB4A4206F3EB320E41C7F5EF68E2EB
24,452,598 UART: [art] SIG.R = BDAC78E2D61D45AFE1C87B7B52779838A1655ECED9C0AC8896A36CD23A968C0A9187E4F3C92C036DD546029AEA8DA067
24,460,043 UART: [art] SIG.S = 121B26C9A04301992520D796DA779A13343148460B3364245718E3DC0FA8D731463FE9566ED48FC8ECB59CBEAC7A3D2A
25,438,701 UART: Caliptra RT
25,439,403 UART: [state] CFI Enabled
25,604,746 UART: [rt] RT listening for mailbox commands...
25,635,795 UART: [rt]cmd =0x46505652, len=4
25,637,114 UART: [rt] FIPS Version
25,638,310 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,027 writing to cptra_bootfsm_go
193,110 UART:
193,475 UART: Running Caliptra ROM ...
194,607 UART:
604,230 UART: [state] CFI Enabled
618,827 UART: [state] LifecycleState = Unprovisioned
620,717 UART: [state] DebugLocked = No
623,585 UART: [state] WD Timer not started. Device not locked for debugging
627,769 UART: [kat] SHA2-256
806,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,456 UART: [kat] ++
818,910 UART: [kat] sha1
831,132 UART: [kat] SHA2-256
834,155 UART: [kat] SHA2-384
839,581 UART: [kat] SHA2-512-ACC
842,586 UART: [kat] ECC-384
3,282,378 UART: [kat] HMAC-384Kdf
3,294,468 UART: [kat] LMS
3,824,000 UART: [kat] --
3,828,351 UART: [cold-reset] ++
3,830,206 UART: [fht] FHT @ 0x50003400
3,841,535 UART: [idev] ++
3,842,099 UART: [idev] CDI.KEYID = 6
3,843,012 UART: [idev] SUBJECT.KEYID = 7
3,844,191 UART: [idev] UDS.KEYID = 0
3,845,169 ready_for_fw is high
3,845,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,706 UART: [idev] Erasing UDS.KEYID = 0
6,316,106 UART: [idev] Sha1 KeyId Algorithm
6,340,644 UART: [idev] --
6,344,682 UART: [ldev] ++
6,345,247 UART: [ldev] CDI.KEYID = 6
6,346,214 UART: [ldev] SUBJECT.KEYID = 5
6,347,368 UART: [ldev] AUTHORITY.KEYID = 7
6,348,605 UART: [ldev] FE.KEYID = 1
6,358,852 UART: [ldev] Erasing FE.KEYID = 1
8,832,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,411 UART: [ldev] --
10,622,274 UART: [fwproc] Wait for Commands...
10,625,127 UART: [fwproc] Recv command 0x46574c44
10,627,175 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,308 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,993 >>> mbox cmd response: success
14,485,492 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,489,621 UART: [afmc] ++
14,490,206 UART: [afmc] CDI.KEYID = 6
14,491,271 UART: [afmc] SUBJECT.KEYID = 7
14,492,377 UART: [afmc] AUTHORITY.KEYID = 5
16,992,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,628 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,413 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,464 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,777 UART: [afmc] --
18,788,920 UART: [cold-reset] --
18,792,301 UART: [state] Locking Datavault
18,795,713 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,408 UART: [state] Locking ICCM
18,799,989 UART: [exit] Launching FMC @ 0x40000130
18,808,382 UART:
18,808,625 UART: Running Caliptra FMC ...
18,809,732 UART:
18,809,895 UART: [state] CFI Enabled
18,818,022 UART: [fht] FMC Alias Private Key: 7
20,574,967 UART: [art] Extend RT PCRs Done
20,576,190 UART: [art] Lock RT PCRs Done
20,577,494 UART: [art] Populate DV Done
20,582,795 UART: [fht] FMC Alias Private Key: 7
20,584,438 UART: [art] Derive CDI
20,585,250 UART: [art] Store in in slot 0x4
20,628,242 UART: [art] Derive Key Pair
20,629,282 UART: [art] Store priv key in slot 0x5
23,055,623 UART: [art] Derive Key Pair - Done
23,068,840 UART: [art] Signing Cert with AUTHO
23,070,143 UART: RITY.KEYID = 7
24,775,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,983 UART: [art] PUB.X = 21861A9110571418F710924EB966C89DD2DC92AC66CDEEAB1868705997E3EA2E75132EC5A8AF3E613B5B5B7C08FCAFFD
24,784,280 UART: [art] PUB.Y = 4ED9EA1B68C58EDDFFDE2669AFB01012CB6501EC8D4CC4027D55765C30F759A83680F92861BDF0B43C22A031C756FC7A
24,791,533 UART: [art] SIG.R = FE6E259412C233EDE417A4F50D4FE433215AF90118AD1EE77DD237E4BFC0A90E41D31CA0A242627ABFDF5132634577A5
24,798,927 UART: [art] SIG.S = 54B46220141B868CFF5601A7782BECC4B5BF33063EABA38B0FEED735BC23E91F9A696B77CC76E935FA1AE64B516E3745
25,777,574 UART: Caliptra RT
25,778,285 UART: [state] CFI Enabled
25,895,484 UART: [rt] RT listening for mailbox commands...
25,927,283 UART: [rt]cmd =0x46505652, len=4
25,928,526 UART: [rt] FIPS Version
25,929,906 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,736 writing to cptra_bootfsm_go
3,696,289 ready_for_fw is high
3,696,676 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,276,739 >>> mbox cmd response: success
14,277,342 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,527,213 UART:
18,527,581 UART: Running Caliptra FMC ...
18,528,780 UART:
18,528,965 UART: [state] CFI Enabled
18,536,868 UART: [fht] FMC Alias Private Key: 7
20,294,195 UART: [art] Extend RT PCRs Done
20,295,424 UART: [art] Lock RT PCRs Done
20,297,165 UART: [art] Populate DV Done
20,302,791 UART: [fht] FMC Alias Private Key: 7
20,304,495 UART: [art] Derive CDI
20,305,311 UART: [art] Store in in slot 0x4
20,347,859 UART: [art] Derive Key Pair
20,348,858 UART: [art] Store priv key in slot 0x5
22,776,028 UART: [art] Derive Key Pair - Done
22,789,138 UART: [art] Signing Cert with AUTHO
22,790,446 UART: RITY.KEYID = 7
24,495,848 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,349 UART: [art] PUB.X = 7F50B59D9B147B9433B438726E9D3032668401BE89585DEF4F74CB37D083A8AB957CA7E7CEAB74DCF07F24E8FC3E4B44
24,504,649 UART: [art] PUB.Y = 13B0F973D98221A9EFBA9309F6B1397C71A118A11FDD086DEDF1FA67565DC12B18E521E1E34559F43CF723BDE17C9D3D
24,511,969 UART: [art] SIG.R = 9047C33FA5B214C501705DD98CFFB983D06B3FCC9536760B5EF270605B709F210065E7818874EF127537BDB7BB2FA186
24,519,306 UART: [art] SIG.S = 4EC26BC1884A04427D3A42B87963C36FB24FD314834433DF134DCF9B9E527FF7F9929899201F0500967202517AD41BB0
25,498,389 UART: Caliptra RT
25,499,108 UART: [state] CFI Enabled
25,616,495 UART: [rt] RT listening for mailbox commands...
25,648,001 UART: [rt]cmd =0x46505652, len=4
25,649,282 UART: [rt] FIPS Version
25,650,394 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,127 UART:
192,505 UART: Running Caliptra ROM ...
193,702 UART:
193,860 UART: [state] CFI Enabled
263,948 UART: [state] LifecycleState = Unprovisioned
266,303 UART: [state] DebugLocked = No
267,786 UART: [state] WD Timer not started. Device not locked for debugging
273,255 UART: [kat] SHA2-256
463,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,887 UART: [kat] ++
474,338 UART: [kat] sha1
486,780 UART: [kat] SHA2-256
489,786 UART: [kat] SHA2-384
495,489 UART: [kat] SHA2-512-ACC
498,076 UART: [kat] ECC-384
2,946,452 UART: [kat] HMAC-384Kdf
2,970,911 UART: [kat] LMS
3,502,721 UART: [kat] --
3,508,846 UART: [cold-reset] ++
3,511,473 UART: [fht] FHT @ 0x50003400
3,523,031 UART: [idev] ++
3,523,673 UART: [idev] CDI.KEYID = 6
3,524,650 UART: [idev] SUBJECT.KEYID = 7
3,525,822 UART: [idev] UDS.KEYID = 0
3,526,751 ready_for_fw is high
3,526,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,649 UART: [idev] Erasing UDS.KEYID = 0
6,034,097 UART: [idev] Sha1 KeyId Algorithm
6,056,839 UART: [idev] --
6,061,030 UART: [ldev] ++
6,061,723 UART: [ldev] CDI.KEYID = 6
6,062,618 UART: [ldev] SUBJECT.KEYID = 5
6,063,791 UART: [ldev] AUTHORITY.KEYID = 7
6,065,026 UART: [ldev] FE.KEYID = 1
6,107,897 UART: [ldev] Erasing FE.KEYID = 1
8,611,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,736 UART: [ldev] --
10,419,732 UART: [fwproc] Wait for Commands...
10,421,558 UART: [fwproc] Recv command 0x46574c44
10,423,864 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,598,466 >>> mbox cmd response: success
14,598,996 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,603,383 UART: [afmc] ++
14,604,117 UART: [afmc] CDI.KEYID = 6
14,605,232 UART: [afmc] SUBJECT.KEYID = 7
14,606,779 UART: [afmc] AUTHORITY.KEYID = 5
17,134,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,854,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,856,016 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,226 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,376 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,925,626 UART: [afmc] --
18,929,744 UART: [cold-reset] --
18,934,968 UART: [state] Locking Datavault
18,942,114 UART: [state] Locking PCR0, PCR1 and PCR31
18,944,260 UART: [state] Locking ICCM
18,946,952 UART: [exit] Launching FMC @ 0x40000130
18,955,588 UART:
18,955,822 UART: Running Caliptra FMC ...
18,956,922 UART:
18,957,080 UART: [state] CFI Enabled
19,013,104 UART: [fht] FMC Alias Private Key: 7
20,776,867 UART: [art] Extend RT PCRs Done
20,778,076 UART: [art] Lock RT PCRs Done
20,779,550 UART: [art] Populate DV Done
20,784,909 UART: [fht] FMC Alias Private Key: 7
20,786,448 UART: [art] Derive CDI
20,787,267 UART: [art] Store in in slot 0x4
20,845,043 UART: [art] Derive Key Pair
20,846,081 UART: [art] Store priv key in slot 0x5
23,308,937 UART: [art] Derive Key Pair - Done
23,321,442 UART: [art] Signing Cert with AUTHO
23,322,775 UART: RITY.KEYID = 7
25,034,086 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,607 UART: [art] PUB.X = 65571AE73577573DF9B2A1C004EBD4079A8C77DD9E78002139E4DEE4B17A55FC47597D72EA3BDB99DAA72BCE56CB5D98
25,042,878 UART: [art] PUB.Y = E924706D10A140B63471B9611593D8EEBBF4F5EA06C46CC119685EED464B94F4407B3FD252774F684887F251208DE305
25,050,076 UART: [art] SIG.R = 9D1996510C70E2069BCC695531E69759EA32CB2B6FA0474CD86F20C4C09AF5AD8AFBAFDFD17E08181214E6D8DE2295C9
25,057,487 UART: [art] SIG.S = FD137029A9A33187D2809B2E9F78F6F9D5C379D3EC67C1821A865DE8CA95D4149EACB238D4888626D0BC3A1700B495A1
26,036,338 UART: Caliptra RT
26,037,055 UART: [state] CFI Enabled
26,202,256 UART: [rt] RT listening for mailbox commands...
26,233,674 UART: [rt]cmd =0x46505652, len=4
26,234,926 UART: [rt] FIPS Version
26,236,188 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,440,505 ready_for_fw is high
3,440,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,760,184 >>> mbox cmd response: success
14,761,022 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,045,020 UART:
19,045,395 UART: Running Caliptra FMC ...
19,046,599 UART:
19,046,775 UART: [state] CFI Enabled
19,115,288 UART: [fht] FMC Alias Private Key: 7
20,880,045 UART: [art] Extend RT PCRs Done
20,881,276 UART: [art] Lock RT PCRs Done
20,883,020 UART: [art] Populate DV Done
20,888,548 UART: [fht] FMC Alias Private Key: 7
20,890,040 UART: [art] Derive CDI
20,890,829 UART: [art] Store in in slot 0x4
20,948,012 UART: [art] Derive Key Pair
20,949,059 UART: [art] Store priv key in slot 0x5
23,411,934 UART: [art] Derive Key Pair - Done
23,424,826 UART: [art] Signing Cert with AUTHO
23,426,131 UART: RITY.KEYID = 7
25,136,983 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,499 UART: [art] PUB.X = 0775B02D48034E03FFE5B15FF6D9CAF120BFCF4B5E0C6A20DE208E915826EDFD22486551C7B8AD3A699285CC6CB53449
25,145,746 UART: [art] PUB.Y = F683E96AF72E6756031B95663ED2159ABF3B99534CB097C9919CE7FD3E83AE26866AE9D5DCA8321043902EF901D06E66
25,153,031 UART: [art] SIG.R = 02CF5037366C7AAE1F74A986E838DD1334DB7D666600C5A329226096CE09927481852B0401123FF31F25ADBE7BF23841
25,160,380 UART: [art] SIG.S = 6DB059DCD3CEB27703E3A103FD9325E60BA0B6E7F68CEC738C62BD785EB15F1C2F7307563EB3486D106BBE12EE2C6581
26,139,265 UART: Caliptra RT
26,139,961 UART: [state] CFI Enabled
26,303,855 UART: [rt] RT listening for mailbox commands...
26,335,062 UART: [rt]cmd =0x46505652, len=4
26,336,317 UART: [rt] FIPS Version
26,337,388 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,824 writing to cptra_bootfsm_go
193,090 UART:
193,472 UART: Running Caliptra ROM ...
194,637 UART:
604,272 UART: [state] CFI Enabled
616,445 UART: [state] LifecycleState = Unprovisioned
618,813 UART: [state] DebugLocked = No
621,567 UART: [state] WD Timer not started. Device not locked for debugging
625,900 UART: [kat] SHA2-256
815,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,573 UART: [kat] ++
827,099 UART: [kat] sha1
836,912 UART: [kat] SHA2-256
839,929 UART: [kat] SHA2-384
845,181 UART: [kat] SHA2-512-ACC
847,768 UART: [kat] ECC-384
3,291,204 UART: [kat] HMAC-384Kdf
3,304,000 UART: [kat] LMS
3,835,855 UART: [kat] --
3,841,478 UART: [cold-reset] ++
3,843,619 UART: [fht] FHT @ 0x50003400
3,854,592 UART: [idev] ++
3,855,303 UART: [idev] CDI.KEYID = 6
3,856,354 UART: [idev] SUBJECT.KEYID = 7
3,857,460 UART: [idev] UDS.KEYID = 0
3,858,391 ready_for_fw is high
3,858,604 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,077 UART: [idev] Erasing UDS.KEYID = 0
6,334,570 UART: [idev] Sha1 KeyId Algorithm
6,356,324 UART: [idev] --
6,360,769 UART: [ldev] ++
6,361,492 UART: [ldev] CDI.KEYID = 6
6,362,387 UART: [ldev] SUBJECT.KEYID = 5
6,363,544 UART: [ldev] AUTHORITY.KEYID = 7
6,364,722 UART: [ldev] FE.KEYID = 1
6,376,990 UART: [ldev] Erasing FE.KEYID = 1
8,857,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,734 UART: [ldev] --
10,649,109 UART: [fwproc] Wait for Commands...
10,651,637 UART: [fwproc] Recv command 0x46574c44
10,653,941 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,178,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,836,330 >>> mbox cmd response: success
14,836,891 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,840,744 UART: [afmc] ++
14,841,478 UART: [afmc] CDI.KEYID = 6
14,842,618 UART: [afmc] SUBJECT.KEYID = 7
14,844,109 UART: [afmc] AUTHORITY.KEYID = 5
17,346,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,201 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,089 UART: [afmc] --
19,142,953 UART: [cold-reset] --
19,148,066 UART: [state] Locking Datavault
19,153,321 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,517 UART: [state] Locking ICCM
19,157,890 UART: [exit] Launching FMC @ 0x40000130
19,166,544 UART:
19,166,864 UART: Running Caliptra FMC ...
19,167,905 UART:
19,168,055 UART: [state] CFI Enabled
19,176,431 UART: [fht] FMC Alias Private Key: 7
20,933,955 UART: [art] Extend RT PCRs Done
20,935,178 UART: [art] Lock RT PCRs Done
20,936,717 UART: [art] Populate DV Done
20,942,129 UART: [fht] FMC Alias Private Key: 7
20,943,665 UART: [art] Derive CDI
20,944,399 UART: [art] Store in in slot 0x4
20,987,271 UART: [art] Derive Key Pair
20,988,270 UART: [art] Store priv key in slot 0x5
23,414,945 UART: [art] Derive Key Pair - Done
23,427,936 UART: [art] Signing Cert with AUTHO
23,429,248 UART: RITY.KEYID = 7
25,134,773 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,279 UART: [art] PUB.X = 2657127320A99B94F5509100BCB93C55E51311088EF9CA5C030BADB7F626507440802A73609F13D95915C2C9771A4F13
25,143,525 UART: [art] PUB.Y = 692AF393565FDC45C9C100E2D994704573AD5A3FC38C67C6C830C7FF891402BB1D5BEC7BD17926530B18CA992B7D391D
25,150,755 UART: [art] SIG.R = F151F0AEE0E782BEFD934D8404D81D98545F037EE2BC23E962D32C520DC0AECE05E641B6D85DA244F7969F766908F33A
25,158,145 UART: [art] SIG.S = 7DD24914B5765F29AD7A66E15817EA496872E01B74B80FD5EAD86370C7C9F34B3A2737C262FD2205D68157970D2D0F69
26,136,573 UART: Caliptra RT
26,137,282 UART: [state] CFI Enabled
26,254,179 UART: [rt] RT listening for mailbox commands...
26,285,526 UART: [rt]cmd =0x46505652, len=4
26,286,802 UART: [rt] FIPS Version
26,288,123 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,686 writing to cptra_bootfsm_go
3,755,339 ready_for_fw is high
3,755,963 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,844 >>> mbox cmd response: success
14,955,563 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,208,917 UART:
19,209,322 UART: Running Caliptra FMC ...
19,210,465 UART:
19,210,624 UART: [state] CFI Enabled
19,218,475 UART: [fht] FMC Alias Private Key: 7
20,975,530 UART: [art] Extend RT PCRs Done
20,976,753 UART: [art] Lock RT PCRs Done
20,978,384 UART: [art] Populate DV Done
20,983,799 UART: [fht] FMC Alias Private Key: 7
20,985,435 UART: [art] Derive CDI
20,986,280 UART: [art] Store in in slot 0x4
21,028,994 UART: [art] Derive Key Pair
21,030,008 UART: [art] Store priv key in slot 0x5
23,456,700 UART: [art] Derive Key Pair - Done
23,469,373 UART: [art] Signing Cert with AUTHO
23,470,705 UART: RITY.KEYID = 7
25,176,161 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,670 UART: [art] PUB.X = 01A70236E56752280CDF11236D5AE0053F197F3472FA12F7A53E7DD0EDFAC5E611842FA9BA43A83E39FC055A8EE05FDD
25,184,917 UART: [art] PUB.Y = 1D9219D431568BAF697756B9BABD5CD61E741E2AFC692FD2F0B59B2D96D4CDE38FDB74CFF6E6B441E7835BF90FC23B06
25,192,213 UART: [art] SIG.R = 1BECD83F30A8B7CC4017FE3ED9AEE59A2213FD5DAA711EA46453F73F063EC976A875CD8FDF752FE27395E7815D5774FC
25,199,651 UART: [art] SIG.S = A0DAC87CBABFA77BDBE65E9C4D3730F2E56A92283E4560DC2DB633752D44D035837BAE467054614C2F8C526C2ACFA46A
26,178,870 UART: Caliptra RT
26,179,555 UART: [state] CFI Enabled
26,296,732 UART: [rt] RT listening for mailbox commands...
26,328,252 UART: [rt]cmd =0x46505652, len=4
26,329,494 UART: [rt] FIPS Version
26,330,781 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,069 UART: [kat] SHA2-256
882,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,115 UART: [kat] ++
886,267 UART: [kat] sha1
890,427 UART: [kat] SHA2-256
892,365 UART: [kat] SHA2-384
895,094 UART: [kat] SHA2-512-ACC
896,995 UART: [kat] ECC-384
902,716 UART: [kat] HMAC-384Kdf
907,346 UART: [kat] LMS
1,475,542 UART: [kat] --
1,476,627 UART: [cold-reset] ++
1,476,979 UART: [fht] Storing FHT @ 0x50003400
1,479,692 UART: [idev] ++
1,479,860 UART: [idev] CDI.KEYID = 6
1,480,220 UART: [idev] SUBJECT.KEYID = 7
1,480,644 UART: [idev] UDS.KEYID = 0
1,480,989 ready_for_fw is high
1,480,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,404 UART: [idev] Erasing UDS.KEYID = 0
1,505,126 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,694 UART: [idev] --
1,514,729 UART: [ldev] ++
1,514,897 UART: [ldev] CDI.KEYID = 6
1,515,260 UART: [ldev] SUBJECT.KEYID = 5
1,515,686 UART: [ldev] AUTHORITY.KEYID = 7
1,516,149 UART: [ldev] FE.KEYID = 1
1,521,467 UART: [ldev] Erasing FE.KEYID = 1
1,546,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,358 UART: [ldev] --
1,585,801 UART: [fwproc] Waiting for Commands...
1,586,550 UART: [fwproc] Received command 0x46574c44
1,587,341 UART: [fwproc] Received Image of size 114168 bytes
2,884,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,294 >>> mbox cmd response: success
3,076,294 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,304 UART: [afmc] ++
3,077,472 UART: [afmc] CDI.KEYID = 6
3,077,834 UART: [afmc] SUBJECT.KEYID = 7
3,078,259 UART: [afmc] AUTHORITY.KEYID = 5
3,113,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,244 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,024 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,752 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,637 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,327 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,318 UART: [afmc] --
3,156,264 UART: [cold-reset] --
3,157,020 UART: [state] Locking Datavault
3,158,053 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,657 UART: [state] Locking ICCM
3,159,229 UART: [exit] Launching FMC @ 0x40000130
3,164,558 UART:
3,164,574 UART: Running Caliptra FMC ...
3,164,982 UART:
3,165,036 UART: [state] CFI Enabled
3,175,735 UART: [fht] FMC Alias Private Key: 7
3,283,864 UART: [art] Extend RT PCRs Done
3,284,292 UART: [art] Lock RT PCRs Done
3,285,692 UART: [art] Populate DV Done
3,294,097 UART: [fht] FMC Alias Private Key: 7
3,295,159 UART: [art] Derive CDI
3,295,439 UART: [art] Store in in slot 0x4
3,381,334 UART: [art] Derive Key Pair
3,381,694 UART: [art] Store priv key in slot 0x5
3,394,508 UART: [art] Derive Key Pair - Done
3,409,470 UART: [art] Signing Cert with AUTHO
3,409,950 UART: RITY.KEYID = 7
3,425,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,009 UART: [art] PUB.X = F5D1E3F434C052107B734C2589CF79797FD2A47E5679372A1E9908C77BD3C2A3CE247DF77C22CD2547F9FA70A93D8AE7
3,432,782 UART: [art] PUB.Y = 9042F6CD70EAE108DAE4988B78C7FB2AD658390B1C8DCB839AEA0BD3A125B3D602B3D0228893E5384AD1708E7AF268C9
3,439,732 UART: [art] SIG.R = A5068E70C621969F38A1F2D53094DD68572F18D4B1B0D844C3114E432FBC649D42DDF10054CA5F36ABCD90122B3F21D2
3,446,481 UART: [art] SIG.S = BBC1909E6AEBDD7451C78669715A1703C6D75E9CDBAA1E2E0A903BDE560A7080A2C981E21593891AF45F8DAA73FBD8BD
3,470,381 UART: Caliptra RT
3,470,634 UART: [state] CFI Enabled
3,578,262 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,724 UART: [rt]cmd =0x46505652, len=4
3,609,384 UART: [rt] FIPS Version
3,610,531 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,317 ready_for_fw is high
1,362,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,924 >>> mbox cmd response: success
2,924,924 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,986,352 UART:
2,986,368 UART: Running Caliptra FMC ...
2,986,776 UART:
2,986,830 UART: [state] CFI Enabled
2,997,349 UART: [fht] FMC Alias Private Key: 7
3,105,502 UART: [art] Extend RT PCRs Done
3,105,930 UART: [art] Lock RT PCRs Done
3,107,582 UART: [art] Populate DV Done
3,115,681 UART: [fht] FMC Alias Private Key: 7
3,116,849 UART: [art] Derive CDI
3,117,129 UART: [art] Store in in slot 0x4
3,202,716 UART: [art] Derive Key Pair
3,203,076 UART: [art] Store priv key in slot 0x5
3,216,074 UART: [art] Derive Key Pair - Done
3,231,193 UART: [art] Signing Cert with AUTHO
3,231,673 UART: RITY.KEYID = 7
3,247,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,840 UART: [art] PUB.X = E50639EFB138260F8578B6B4E05AEC27E37132FCC153E3F6B47386671E45FD52B6584F4A187C1B3C9795F3D99C9FFA95
3,254,608 UART: [art] PUB.Y = F4909CA7C15AF8AF12A666E831361B3453785BB9E7EEBF52E82798905FA1920C75DA22EA3F3DA2DE2C8AE3B3D56C9BA3
3,261,571 UART: [art] SIG.R = D7D10967177E5EBFFD185ECBF43F0F75B4E81B761266BE147F6FEAA21628B521B1EC682B459E4B9904C6918D95CC0DD6
3,268,341 UART: [art] SIG.S = 8BEACF52C4F9F2F8FF8F0FE019DFD911ED796D4AC57E811A7969606E5B32E29C8B06BE45B6BBEE7D5A02FED2350F409B
3,292,012 UART: Caliptra RT
3,292,265 UART: [state] CFI Enabled
3,401,197 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,945 UART: [rt]cmd =0x46505652, len=4
3,432,605 UART: [rt] FIPS Version
3,433,744 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,497 UART: [kat] SHA2-512-ACC
897,398 UART: [kat] ECC-384
902,735 UART: [kat] HMAC-384Kdf
907,471 UART: [kat] LMS
1,475,667 UART: [kat] --
1,476,722 UART: [cold-reset] ++
1,477,166 UART: [fht] Storing FHT @ 0x50003400
1,480,039 UART: [idev] ++
1,480,207 UART: [idev] CDI.KEYID = 6
1,480,567 UART: [idev] SUBJECT.KEYID = 7
1,480,991 UART: [idev] UDS.KEYID = 0
1,481,336 ready_for_fw is high
1,481,336 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,677 UART: [idev] Erasing UDS.KEYID = 0
1,505,613 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,379 UART: [idev] --
1,515,336 UART: [ldev] ++
1,515,504 UART: [ldev] CDI.KEYID = 6
1,515,867 UART: [ldev] SUBJECT.KEYID = 5
1,516,293 UART: [ldev] AUTHORITY.KEYID = 7
1,516,756 UART: [ldev] FE.KEYID = 1
1,521,904 UART: [ldev] Erasing FE.KEYID = 1
1,547,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,489 UART: [ldev] --
1,586,866 UART: [fwproc] Waiting for Commands...
1,587,539 UART: [fwproc] Received command 0x46574c44
1,588,330 UART: [fwproc] Received Image of size 114168 bytes
2,884,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,364 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,397 >>> mbox cmd response: success
3,077,397 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,447 UART: [afmc] ++
3,078,615 UART: [afmc] CDI.KEYID = 6
3,078,977 UART: [afmc] SUBJECT.KEYID = 7
3,079,402 UART: [afmc] AUTHORITY.KEYID = 5
3,114,117 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,607 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,000 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,690 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,703 UART: [afmc] --
3,157,585 UART: [cold-reset] --
3,158,521 UART: [state] Locking Datavault
3,159,790 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,394 UART: [state] Locking ICCM
3,160,994 UART: [exit] Launching FMC @ 0x40000130
3,166,323 UART:
3,166,339 UART: Running Caliptra FMC ...
3,166,747 UART:
3,166,890 UART: [state] CFI Enabled
3,177,439 UART: [fht] FMC Alias Private Key: 7
3,284,802 UART: [art] Extend RT PCRs Done
3,285,230 UART: [art] Lock RT PCRs Done
3,286,894 UART: [art] Populate DV Done
3,295,241 UART: [fht] FMC Alias Private Key: 7
3,296,363 UART: [art] Derive CDI
3,296,643 UART: [art] Store in in slot 0x4
3,382,288 UART: [art] Derive Key Pair
3,382,648 UART: [art] Store priv key in slot 0x5
3,396,038 UART: [art] Derive Key Pair - Done
3,410,506 UART: [art] Signing Cert with AUTHO
3,410,986 UART: RITY.KEYID = 7
3,426,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,425 UART: [art] PUB.X = 7D783181539D8FBB18E13BD9C79EFA32BF2B4BA9EF8F4806A35F01718E06A481B225F2FED3A681CDEA0ACF25B57C8CB3
3,434,203 UART: [art] PUB.Y = 6ADC7702761E70945C5B7EF5DD2D28FFA989B4FD857CDBF11A447FC5FAE98897C5CDF157A85197B9D8F79DE3E9A0ADC0
3,441,172 UART: [art] SIG.R = DFB8362BD6ABA8B64E391FB273BE2D545E17170B7B2F150EF6469D3E4D0550FC2FAFF450DD601921C5A2BCD4525DFBC7
3,447,953 UART: [art] SIG.S = DD7B8AC4A19A64FA985D594665558F8BBF61332C5B3D02205C666518358BB93422090476055DF13C6D287717FFC07F55
3,471,824 UART: Caliptra RT
3,472,169 UART: [state] CFI Enabled
3,579,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,035 UART: [rt]cmd =0x46505652, len=4
3,610,695 UART: [rt] FIPS Version
3,611,676 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,160 ready_for_fw is high
1,363,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,819 >>> mbox cmd response: success
2,926,819 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,811 UART:
2,988,827 UART: Running Caliptra FMC ...
2,989,235 UART:
2,989,378 UART: [state] CFI Enabled
3,000,359 UART: [fht] FMC Alias Private Key: 7
3,108,354 UART: [art] Extend RT PCRs Done
3,108,782 UART: [art] Lock RT PCRs Done
3,110,420 UART: [art] Populate DV Done
3,118,719 UART: [fht] FMC Alias Private Key: 7
3,119,747 UART: [art] Derive CDI
3,120,027 UART: [art] Store in in slot 0x4
3,205,848 UART: [art] Derive Key Pair
3,206,208 UART: [art] Store priv key in slot 0x5
3,219,730 UART: [art] Derive Key Pair - Done
3,234,322 UART: [art] Signing Cert with AUTHO
3,234,802 UART: RITY.KEYID = 7
3,250,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,929 UART: [art] PUB.X = CBC32F3BA1E29A2C2F5731AB74B7738652C199038682B029835F288B0EB10011006A5FC081C8BCB77FEDD6ABCB4DFB16
3,257,661 UART: [art] PUB.Y = 95EE82E550AE521EB619969BB3034395F0A9A4B9120902F109D16E279014B8D5B99812FD6BEEDB9382423BCD7930562E
3,264,597 UART: [art] SIG.R = 8A81464BEB83B4232B8727B2D56552AA32BC22403387D8BEF27EBA2C253C4D0602645F16D1A9E537937FDA90034457C7
3,271,356 UART: [art] SIG.S = A381CE060C8FE7F5A34FBB631FD92F019553010E892B972579E430C9FFC6AB15F6D903EB1310C29F76EC1AE53D4F79F5
3,294,967 UART: Caliptra RT
3,295,312 UART: [state] CFI Enabled
3,404,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,904 UART: [rt]cmd =0x46505652, len=4
3,435,564 UART: [rt] FIPS Version
3,436,689 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,094 UART: [kat] SHA2-256
893,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,869 UART: [kat] ++
898,021 UART: [kat] sha1
902,209 UART: [kat] SHA2-256
904,149 UART: [kat] SHA2-384
906,984 UART: [kat] SHA2-512-ACC
908,885 UART: [kat] ECC-384
918,718 UART: [kat] HMAC-384Kdf
923,406 UART: [kat] LMS
1,171,734 UART: [kat] --
1,172,667 UART: [cold-reset] ++
1,173,083 UART: [fht] FHT @ 0x50003400
1,175,870 UART: [idev] ++
1,176,038 UART: [idev] CDI.KEYID = 6
1,176,398 UART: [idev] SUBJECT.KEYID = 7
1,176,822 UART: [idev] UDS.KEYID = 0
1,177,167 ready_for_fw is high
1,177,167 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,442 UART: [idev] Erasing UDS.KEYID = 0
1,201,521 UART: [idev] Sha1 KeyId Algorithm
1,209,997 UART: [idev] --
1,210,981 UART: [ldev] ++
1,211,149 UART: [ldev] CDI.KEYID = 6
1,211,512 UART: [ldev] SUBJECT.KEYID = 5
1,211,938 UART: [ldev] AUTHORITY.KEYID = 7
1,212,401 UART: [ldev] FE.KEYID = 1
1,217,743 UART: [ldev] Erasing FE.KEYID = 1
1,244,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,183 UART: [ldev] --
1,283,566 UART: [fwproc] Wait for Commands...
1,284,316 UART: [fwproc] Recv command 0x46574c44
1,285,044 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,490 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,973 >>> mbox cmd response: success
2,773,973 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,019 UART: [afmc] ++
2,775,187 UART: [afmc] CDI.KEYID = 6
2,775,549 UART: [afmc] SUBJECT.KEYID = 7
2,775,974 UART: [afmc] AUTHORITY.KEYID = 5
2,811,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,342 UART: [afmc] --
2,854,396 UART: [cold-reset] --
2,855,124 UART: [state] Locking Datavault
2,856,149 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,753 UART: [state] Locking ICCM
2,857,195 UART: [exit] Launching FMC @ 0x40000130
2,862,524 UART:
2,862,540 UART: Running Caliptra FMC ...
2,862,948 UART:
2,863,002 UART: [state] CFI Enabled
2,873,233 UART: [fht] FMC Alias Private Key: 7
2,980,992 UART: [art] Extend RT PCRs Done
2,981,420 UART: [art] Lock RT PCRs Done
2,982,808 UART: [art] Populate DV Done
2,990,941 UART: [fht] FMC Alias Private Key: 7
2,992,053 UART: [art] Derive CDI
2,992,333 UART: [art] Store in in slot 0x4
3,077,610 UART: [art] Derive Key Pair
3,077,970 UART: [art] Store priv key in slot 0x5
3,090,996 UART: [art] Derive Key Pair - Done
3,105,759 UART: [art] Signing Cert with AUTHO
3,106,239 UART: RITY.KEYID = 7
3,120,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,700 UART: [art] PUB.X = 9CF0CC1C1E67DFB4B5ED5B785A32DD8678B5EB7635B9569AA60AD45BAE90F371A7BE5930EFC55D72A3A00F3E30FAF9C6
3,128,488 UART: [art] PUB.Y = 9999FD71F7AA4A0526CB125120E7F4C443E78D99D4B953F55C655607C9267D4C14E2E2109C96EB2596441B49A5A561EE
3,135,430 UART: [art] SIG.R = 441635155920EFE65D940047F8762117DA8396D19393CF914EB6384F2071F74FFF54FBA21D050F2DC47DBC1F330CCD05
3,142,166 UART: [art] SIG.S = 57BFF7CE85956ABB86A266C73B9826E14978019483E3ED3337C6B94FC409B2BEE0BD09B76660C65F8FDD854C1A296FAE
3,166,074 UART: Caliptra RT
3,166,327 UART: [state] CFI Enabled
3,274,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,536 UART: [rt]cmd =0x46505652, len=4
3,305,196 UART: [rt] FIPS Version
3,306,085 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,027 ready_for_fw is high
1,060,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,534 >>> mbox cmd response: success
2,623,534 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,685,652 UART:
2,685,668 UART: Running Caliptra FMC ...
2,686,076 UART:
2,686,130 UART: [state] CFI Enabled
2,695,903 UART: [fht] FMC Alias Private Key: 7
2,803,656 UART: [art] Extend RT PCRs Done
2,804,084 UART: [art] Lock RT PCRs Done
2,805,608 UART: [art] Populate DV Done
2,813,763 UART: [fht] FMC Alias Private Key: 7
2,814,939 UART: [art] Derive CDI
2,815,219 UART: [art] Store in in slot 0x4
2,900,588 UART: [art] Derive Key Pair
2,900,948 UART: [art] Store priv key in slot 0x5
2,913,478 UART: [art] Derive Key Pair - Done
2,928,175 UART: [art] Signing Cert with AUTHO
2,928,655 UART: RITY.KEYID = 7
2,943,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,664 UART: [art] PUB.X = 64162D3F42E6C4A1075ED3679E07C32AC6CC51ED59846AD7B9A64974D0E6F6ABC894AE2C4B7402796232BF394FD6BE00
2,951,411 UART: [art] PUB.Y = 69F1D7EDC309D27BD866DAA1B0F02A20E7652919B60B03AF18B604B80B6CA52210928866D7462B87B9D903485210FB4D
2,958,343 UART: [art] SIG.R = 52CCCF6590086BFE8B0C9C555C5117B96694A637E8C5AAAF93092A4716DF00FAB27EC8C6D0EFFE0ABB98F232E53CC91B
2,965,099 UART: [art] SIG.S = 5A9CD8C63B3546A5BC1D12F4247FBC30FAE40A9709E05E3B161619B3ACEAC71B120DD08C395485BFF033EC3245E8EF59
2,988,711 UART: Caliptra RT
2,988,964 UART: [state] CFI Enabled
3,097,847 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,317 UART: [rt]cmd =0x46505652, len=4
3,128,977 UART: [rt] FIPS Version
3,129,996 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,405 UART: [kat] SHA2-512-ACC
908,306 UART: [kat] ECC-384
918,319 UART: [kat] HMAC-384Kdf
922,975 UART: [kat] LMS
1,171,303 UART: [kat] --
1,172,266 UART: [cold-reset] ++
1,172,794 UART: [fht] FHT @ 0x50003400
1,175,585 UART: [idev] ++
1,175,753 UART: [idev] CDI.KEYID = 6
1,176,113 UART: [idev] SUBJECT.KEYID = 7
1,176,537 UART: [idev] UDS.KEYID = 0
1,176,882 ready_for_fw is high
1,176,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,202,074 UART: [idev] Sha1 KeyId Algorithm
1,210,594 UART: [idev] --
1,211,724 UART: [ldev] ++
1,211,892 UART: [ldev] CDI.KEYID = 6
1,212,255 UART: [ldev] SUBJECT.KEYID = 5
1,212,681 UART: [ldev] AUTHORITY.KEYID = 7
1,213,144 UART: [ldev] FE.KEYID = 1
1,218,256 UART: [ldev] Erasing FE.KEYID = 1
1,245,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,226 UART: [ldev] --
1,284,641 UART: [fwproc] Wait for Commands...
1,285,297 UART: [fwproc] Recv command 0x46574c44
1,286,025 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,647 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,951 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,502 >>> mbox cmd response: success
2,774,502 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,756 UART: [afmc] ++
2,775,924 UART: [afmc] CDI.KEYID = 6
2,776,286 UART: [afmc] SUBJECT.KEYID = 7
2,776,711 UART: [afmc] AUTHORITY.KEYID = 5
2,812,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,531 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,425 UART: [afmc] --
2,855,363 UART: [cold-reset] --
2,856,121 UART: [state] Locking Datavault
2,857,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,192 UART: [state] Locking ICCM
2,858,688 UART: [exit] Launching FMC @ 0x40000130
2,864,017 UART:
2,864,033 UART: Running Caliptra FMC ...
2,864,441 UART:
2,864,584 UART: [state] CFI Enabled
2,875,341 UART: [fht] FMC Alias Private Key: 7
2,983,702 UART: [art] Extend RT PCRs Done
2,984,130 UART: [art] Lock RT PCRs Done
2,985,862 UART: [art] Populate DV Done
2,993,963 UART: [fht] FMC Alias Private Key: 7
2,995,019 UART: [art] Derive CDI
2,995,299 UART: [art] Store in in slot 0x4
3,080,770 UART: [art] Derive Key Pair
3,081,130 UART: [art] Store priv key in slot 0x5
3,094,738 UART: [art] Derive Key Pair - Done
3,109,271 UART: [art] Signing Cert with AUTHO
3,109,751 UART: RITY.KEYID = 7
3,125,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,906 UART: [art] PUB.X = B61788B99BEA445055DDA6D5DC879CD3FC74CADDF536A0443767741008554DDC2E4530681624389D285BF3A395DD6395
3,132,673 UART: [art] PUB.Y = F62A09EAA922B4D8FFE7ADFE974D0F84CF44BFEBC2E32A25B41B86550CC3A060E796478035DCCC8009719AF94CB624CE
3,139,631 UART: [art] SIG.R = C6A41221A1B7D7D1BEB1A1FB99E8E09E780896F0D17197367F26C4CC0DF7641E9DC0A00C530F8F5E0C384CB9B073010B
3,146,390 UART: [art] SIG.S = 541F737DC76AC0A91429CBE0BE055E0AF4F23E0DFAFF6DA2707FEBBE20DAE23982758ADC70A44C7AA43B8861188BA2B2
3,170,116 UART: Caliptra RT
3,170,461 UART: [state] CFI Enabled
3,278,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,844 UART: [rt]cmd =0x46505652, len=4
3,309,504 UART: [rt] FIPS Version
3,310,593 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,498 ready_for_fw is high
1,061,498 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,245 >>> mbox cmd response: success
2,627,245 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,689,801 UART:
2,689,817 UART: Running Caliptra FMC ...
2,690,225 UART:
2,690,368 UART: [state] CFI Enabled
2,700,821 UART: [fht] FMC Alias Private Key: 7
2,808,656 UART: [art] Extend RT PCRs Done
2,809,084 UART: [art] Lock RT PCRs Done
2,810,396 UART: [art] Populate DV Done
2,818,857 UART: [fht] FMC Alias Private Key: 7
2,820,037 UART: [art] Derive CDI
2,820,317 UART: [art] Store in in slot 0x4
2,906,086 UART: [art] Derive Key Pair
2,906,446 UART: [art] Store priv key in slot 0x5
2,919,166 UART: [art] Derive Key Pair - Done
2,934,111 UART: [art] Signing Cert with AUTHO
2,934,591 UART: RITY.KEYID = 7
2,949,331 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,096 UART: [art] PUB.X = 9CB4974647D07076D5DF00989E4FEDF7B77159B378C5BCF310E8D04D41FCF662133194F62A9FD553294C05B2A3599D2B
2,956,843 UART: [art] PUB.Y = 8B2BAC68A4E3910D87AFF232BCD8AEE315CD63CA1F8F7D547A83D7132A9F53D17541F8515BD37056F9801F2D9514CC78
2,963,800 UART: [art] SIG.R = 78FFFB46B05860BD7FD2CD386766DDD4CA1EB2C8EA1C8291F67D2350596E4690B5BB6AFEEFCBEE48245311F502CB4535
2,970,585 UART: [art] SIG.S = 0A185337C3BAB8D814A245350D6995B40F6C5891CB235D06062E1510D1AB272D69548F5DD4D7965407A7E7C23A42D474
2,994,748 UART: Caliptra RT
2,995,093 UART: [state] CFI Enabled
3,102,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,024 UART: [rt]cmd =0x46505652, len=4
3,133,684 UART: [rt] FIPS Version
3,134,559 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,907 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,174,479 ready_for_fw is high
1,174,479 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,057 UART: [idev] Erasing UDS.KEYID = 0
1,198,369 UART: [idev] Sha1 KeyId Algorithm
1,207,247 UART: [idev] --
1,208,392 UART: [ldev] ++
1,208,560 UART: [ldev] CDI.KEYID = 6
1,208,924 UART: [ldev] SUBJECT.KEYID = 5
1,209,351 UART: [ldev] AUTHORITY.KEYID = 7
1,209,814 UART: [ldev] FE.KEYID = 1
1,215,156 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,896 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,107 >>> mbox cmd response: success
2,771,107 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,160 UART: [afmc] ++
2,772,328 UART: [afmc] CDI.KEYID = 6
2,772,691 UART: [afmc] SUBJECT.KEYID = 7
2,773,117 UART: [afmc] AUTHORITY.KEYID = 5
2,808,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,867 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,479 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,198 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,147 UART: [afmc] --
2,852,237 UART: [cold-reset] --
2,853,175 UART: [state] Locking Datavault
2,854,372 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,976 UART: [state] Locking ICCM
2,855,558 UART: [exit] Launching FMC @ 0x40000130
2,860,887 UART:
2,860,903 UART: Running Caliptra FMC ...
2,861,311 UART:
2,861,365 UART: [state] CFI Enabled
2,871,568 UART: [fht] FMC Alias Private Key: 7
2,979,715 UART: [art] Extend RT PCRs Done
2,980,143 UART: [art] Lock RT PCRs Done
2,981,523 UART: [art] Populate DV Done
2,989,716 UART: [fht] FMC Alias Private Key: 7
2,990,734 UART: [art] Derive CDI
2,991,014 UART: [art] Store in in slot 0x4
3,076,869 UART: [art] Derive Key Pair
3,077,229 UART: [art] Store priv key in slot 0x5
3,091,155 UART: [art] Derive Key Pair - Done
3,105,971 UART: [art] Signing Cert with AUTHO
3,106,451 UART: RITY.KEYID = 7
3,122,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,786 UART: [art] PUB.X = 2DECC98C5E16E57272D853DF6FE28B94E209EE2C4B052B5CE8946D6EECC3A0C590D2A9A15B68CD2178E0145AD7AA197B
3,129,568 UART: [art] PUB.Y = 9B414515A56434C26B0393C1C590D63426582F960F37B6AEB594E4241F9AEA51FE3868FBD2728FCA371F54F83C43B35C
3,136,512 UART: [art] SIG.R = 40B322DC6AB611125F69ED747662C8D0D48335F6511B082A8079BAA186C1B7441727A136B390946A01617759FBC29258
3,143,264 UART: [art] SIG.S = E95B1266781083C90ADFC5389A2B239CEF3FF8BA3AAC42B4F5C6E780DC905A241084B12F3711DFE150E47C6FB40266B2
3,167,269 UART: Caliptra RT
3,167,522 UART: [state] CFI Enabled
3,274,437 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,105 UART: [rt]cmd =0x46505652, len=4
3,305,765 UART: [rt] FIPS Version
3,306,948 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,830 ready_for_fw is high
1,055,830 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,989 >>> mbox cmd response: success
2,619,989 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,681,879 UART:
2,681,895 UART: Running Caliptra FMC ...
2,682,303 UART:
2,682,357 UART: [state] CFI Enabled
2,692,660 UART: [fht] FMC Alias Private Key: 7
2,800,949 UART: [art] Extend RT PCRs Done
2,801,377 UART: [art] Lock RT PCRs Done
2,802,501 UART: [art] Populate DV Done
2,810,616 UART: [fht] FMC Alias Private Key: 7
2,811,552 UART: [art] Derive CDI
2,811,832 UART: [art] Store in in slot 0x4
2,897,247 UART: [art] Derive Key Pair
2,897,607 UART: [art] Store priv key in slot 0x5
2,910,705 UART: [art] Derive Key Pair - Done
2,925,470 UART: [art] Signing Cert with AUTHO
2,925,950 UART: RITY.KEYID = 7
2,940,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,603 UART: [art] PUB.X = 714A4A1B86856D51F0627C94D6E72ADB9FC704CDCA6CDAF38F86FE4F17A7873D11A704E29B962A7B9C00E2CD9410283F
2,948,357 UART: [art] PUB.Y = EA64ABDF337504AB2621D83ED4BEE3115F7F15DD0357E0BFC05850A9B67AD9A32B0919806DA4EED60230EEC801B6DE24
2,955,308 UART: [art] SIG.R = CB7423992148E1F741B7C4B33A1C3EFCE91230990A319669259DECE5073B526B05049BF0FCDB9B21224BDB55A59C8AB0
2,962,072 UART: [art] SIG.S = 94723357166F07ED56D0E80F952AF891A549A9326C85A0E8E6E1FA6BFC31790C8A801F0CA6B473D8312EAF2363CEB745
2,985,469 UART: Caliptra RT
2,985,722 UART: [state] CFI Enabled
3,093,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,826 UART: [rt]cmd =0x46505652, len=4
3,124,486 UART: [rt] FIPS Version
3,125,539 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,740 UART: [kat] ++
895,892 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,743 UART: [kat] SHA2-512-ACC
906,644 UART: [kat] ECC-384
916,663 UART: [kat] HMAC-384Kdf
921,371 UART: [kat] LMS
1,169,683 UART: [kat] --
1,170,472 UART: [cold-reset] ++
1,170,880 UART: [fht] FHT @ 0x50003400
1,173,702 UART: [idev] ++
1,173,870 UART: [idev] CDI.KEYID = 6
1,174,231 UART: [idev] SUBJECT.KEYID = 7
1,174,656 UART: [idev] UDS.KEYID = 0
1,175,002 ready_for_fw is high
1,175,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,800 UART: [idev] Erasing UDS.KEYID = 0
1,200,148 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,633 UART: [ldev] Erasing FE.KEYID = 1
1,243,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,673 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,177 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,005 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,314 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,828 >>> mbox cmd response: success
2,771,828 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,011 UART: [afmc] ++
2,773,179 UART: [afmc] CDI.KEYID = 6
2,773,542 UART: [afmc] SUBJECT.KEYID = 7
2,773,968 UART: [afmc] AUTHORITY.KEYID = 5
2,809,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,529 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,412 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,120 UART: [afmc] --
2,853,108 UART: [cold-reset] --
2,853,904 UART: [state] Locking Datavault
2,855,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,623 UART: [state] Locking ICCM
2,856,259 UART: [exit] Launching FMC @ 0x40000130
2,861,588 UART:
2,861,604 UART: Running Caliptra FMC ...
2,862,012 UART:
2,862,155 UART: [state] CFI Enabled
2,872,692 UART: [fht] FMC Alias Private Key: 7
2,980,457 UART: [art] Extend RT PCRs Done
2,980,885 UART: [art] Lock RT PCRs Done
2,982,289 UART: [art] Populate DV Done
2,990,754 UART: [fht] FMC Alias Private Key: 7
2,991,846 UART: [art] Derive CDI
2,992,126 UART: [art] Store in in slot 0x4
3,077,631 UART: [art] Derive Key Pair
3,077,991 UART: [art] Store priv key in slot 0x5
3,091,041 UART: [art] Derive Key Pair - Done
3,105,942 UART: [art] Signing Cert with AUTHO
3,106,422 UART: RITY.KEYID = 7
3,121,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,245 UART: [art] PUB.X = E95C0B63CFA5A387C289FD7950CCA0E95C482B7E1A7079D198000B915D3665483C717E0D05FFE08106A58709117BC7D1
3,128,975 UART: [art] PUB.Y = 8A2C3D648B17071C75A7F472A75EDEEC445CCF337CEB06F86D5CF799522EA44391B940E8E57EDC2EFBE1849C11DC09F6
3,135,932 UART: [art] SIG.R = A768ED6033E5C959BAC5F8EAD40DF5D1BBC22F00C9EE38A4BE97BC60EC6E10262C75C06BCEE5147994CE9CCDF78E5023
3,142,701 UART: [art] SIG.S = 6AE2EC69DC8EB5F03DA6DFB6B6D05B973D2CAA3049B8334104436B53A8239BFA5B39CB2607CCE3B242F193945008EB75
3,166,481 UART: Caliptra RT
3,166,826 UART: [state] CFI Enabled
3,273,945 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,569 UART: [rt]cmd =0x46505652, len=4
3,305,229 UART: [rt] FIPS Version
3,306,224 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,373 ready_for_fw is high
1,056,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,418 >>> mbox cmd response: success
2,620,418 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,944 UART:
2,682,960 UART: Running Caliptra FMC ...
2,683,368 UART:
2,683,511 UART: [state] CFI Enabled
2,694,492 UART: [fht] FMC Alias Private Key: 7
2,802,467 UART: [art] Extend RT PCRs Done
2,802,895 UART: [art] Lock RT PCRs Done
2,804,617 UART: [art] Populate DV Done
2,812,646 UART: [fht] FMC Alias Private Key: 7
2,813,610 UART: [art] Derive CDI
2,813,890 UART: [art] Store in in slot 0x4
2,899,587 UART: [art] Derive Key Pair
2,899,947 UART: [art] Store priv key in slot 0x5
2,913,241 UART: [art] Derive Key Pair - Done
2,927,949 UART: [art] Signing Cert with AUTHO
2,928,429 UART: RITY.KEYID = 7
2,943,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,648 UART: [art] PUB.X = 121C86E4DD8308EA408F0F24031B36515128A653EF6FA2333EBCDD0A6CDDEF361FC70D16435BF6B947083119C0A5C86B
2,951,408 UART: [art] PUB.Y = EA4E75FB754F3AE6E0372A0848264B6C07A9576FC715EAA292719C6CDFD77885FFF2267E8251B04C8B9455522DDF2932
2,958,356 UART: [art] SIG.R = 93D4C7FAE27AFFCA274BEE4368D9EFA8291FD8C537F4C4758E3C9D4723F7C36E3CF418BEE6DBC39DF7400215022D7882
2,965,136 UART: [art] SIG.S = 0D0F75979F1B93F2B6FB1F5AF8C814A88630B1C6DD115174455303613B0352E2EB37E3FB0B154E76B0A355FA32FF4FDF
2,989,214 UART: Caliptra RT
2,989,559 UART: [state] CFI Enabled
3,098,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,194 UART: [rt]cmd =0x46505652, len=4
3,129,854 UART: [rt] FIPS Version
3,131,031 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,048 UART:
192,524 UART: Running Caliptra ROM ...
193,652 UART:
193,800 UART: [state] CFI Enabled
264,264 UART: [state] LifecycleState = Unprovisioned
266,182 UART: [state] DebugLocked = No
268,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,919 UART: [kat] SHA2-256
443,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,141 UART: [kat] ++
454,618 UART: [kat] sha1
465,418 UART: [kat] SHA2-256
468,060 UART: [kat] SHA2-384
473,338 UART: [kat] SHA2-512-ACC
475,698 UART: [kat] ECC-384
2,765,777 UART: [kat] HMAC-384Kdf
2,800,025 UART: [kat] LMS
3,990,283 UART: [kat] --
3,995,269 UART: [cold-reset] ++
3,997,403 UART: [fht] Storing FHT @ 0x50003400
4,008,658 UART: [idev] ++
4,009,218 UART: [idev] CDI.KEYID = 6
4,010,122 UART: [idev] SUBJECT.KEYID = 7
4,011,360 UART: [idev] UDS.KEYID = 0
4,012,401 ready_for_fw is high
4,012,617 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,242 UART: [idev] Erasing UDS.KEYID = 0
7,346,996 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,104 UART: [idev] --
7,371,768 UART: [ldev] ++
7,372,329 UART: [ldev] CDI.KEYID = 6
7,373,286 UART: [ldev] SUBJECT.KEYID = 5
7,374,492 UART: [ldev] AUTHORITY.KEYID = 7
7,375,788 UART: [ldev] FE.KEYID = 1
7,403,066 UART: [ldev] Erasing FE.KEYID = 1
10,727,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,890 UART: [ldev] --
13,106,335 UART: [fwproc] Waiting for Commands...
13,108,751 UART: [fwproc] Received command 0x46574c44
13,110,926 UART: [fwproc] Received Image of size 113844 bytes
17,159,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,239,780 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,308,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,625,419 >>> mbox cmd response: success
17,625,925 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,629,672 UART: [afmc] ++
17,630,329 UART: [afmc] CDI.KEYID = 6
17,631,240 UART: [afmc] SUBJECT.KEYID = 7
17,632,450 UART: [afmc] AUTHORITY.KEYID = 5
20,999,797 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,299,967 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,302,220 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,316,656 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,331,493 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,345,926 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,367,568 UART: [afmc] --
23,371,270 UART: [cold-reset] --
23,375,826 UART: [state] Locking Datavault
23,382,792 UART: [state] Locking PCR0, PCR1 and PCR31
23,384,540 UART: [state] Locking ICCM
23,386,628 UART: [exit] Launching FMC @ 0x40000130
23,394,984 UART:
23,395,215 UART: Running Caliptra FMC ...
23,396,308 UART:
23,396,461 UART: [state] CFI Enabled
23,460,081 UART: [fht] FMC Alias Private Key: 7
25,797,157 UART: [art] Extend RT PCRs Done
25,798,373 UART: [art] Lock RT PCRs Done
25,800,184 UART: [art] Populate DV Done
25,805,703 UART: [fht] FMC Alias Private Key: 7
25,807,326 UART: [art] Derive CDI
25,808,064 UART: [art] Store in in slot 0x4
25,868,258 UART: [art] Derive Key Pair
25,869,254 UART: [art] Store priv key in slot 0x5
29,162,214 UART: [art] Derive Key Pair - Done
29,175,476 UART: [art] Signing Cert with AUTHO
29,176,813 UART: RITY.KEYID = 7
31,463,909 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,415 UART: [art] PUB.X = 1EA281419E213F4062BB3D20205CAB6D67A8F6D64125BC545F28261E6C7B98DFBE58D82FF35FF2138A1FAAEAEA9F0680
31,472,650 UART: [art] PUB.Y = 9D520476BC272F5A6F6C275FF05F868DBFC4D372A4491BE388515DE9A37CA76B765522994C4CB06D1D326C5D484530C7
31,479,919 UART: [art] SIG.R = 203BD4EB874E5BC2FAFDF906B85C65E439F069F5C72EFCE980E8173B25D2359034CB107C295FE6FA4592A3B3F1B94621
31,487,304 UART: [art] SIG.S = 2B5D341BFBA8B9E55A6045D165A509A5E11DD18E549416B9622BEE902C4CA73674AEC66CC37AA29A9FB118A29321F022
32,792,241 UART: Caliptra RT
32,792,941 UART: [state] CFI Enabled
32,954,790 UART: [rt] RT listening for mailbox commands...
32,986,043 UART: [rt]cmd =0x464d4352, len=4
32,993,343 >>> mbox cmd response data (524 bytes)
33,162,662 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,192,716 UART: [rt]cmd =0x43455252, len=4
33,204,191 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,781,906 ready_for_fw is high
3,782,285 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,840,534 >>> mbox cmd response: success
17,841,329 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,523,642 UART:
23,524,061 UART: Running Caliptra FMC ...
23,525,212 UART:
23,525,373 UART: [state] CFI Enabled
23,596,140 UART: [fht] FMC Alias Private Key: 7
25,933,724 UART: [art] Extend RT PCRs Done
25,934,992 UART: [art] Lock RT PCRs Done
25,936,670 UART: [art] Populate DV Done
25,941,864 UART: [fht] FMC Alias Private Key: 7
25,943,346 UART: [art] Derive CDI
25,944,102 UART: [art] Store in in slot 0x4
26,004,784 UART: [art] Derive Key Pair
26,005,852 UART: [art] Store priv key in slot 0x5
29,299,035 UART: [art] Derive Key Pair - Done
29,311,850 UART: [art] Signing Cert with AUTHO
29,313,154 UART: RITY.KEYID = 7
31,601,932 UART: [art] Erasing AUTHORITY.KEYID = 7
31,603,743 UART: [art] PUB.X = 7B4734678E35008163D20BBD6D13F68DF1E2C91E30710A430C9313FEBDC084F4DFBF01FDBF2FFFE30025A0406A4129D6
31,610,737 UART: [art] PUB.Y = 2C76A7B4BC72A98FF86BDBB6A7A84EC3AC9FE6502608150F8F56D505B3C956481013E3EE69B044B58BA1FE8DC7E91672
31,617,957 UART: [art] SIG.R = 737164D5F0E600301E9A230B2CF578B63BB6FD6E495962CBA5B856F465F3C0F25788B4DA32D5680429CFF0AAC7AD06F5
31,625,339 UART: [art] SIG.S = 64A13BB245078869491E5DFDF734128AE685D77745599598AB2D26409D19E5EFF9C6A223E0EA55F07FBAA1AF00FCC477
32,930,388 UART: Caliptra RT
32,931,120 UART: [state] CFI Enabled
33,091,523 UART: [rt] RT listening for mailbox commands...
33,122,850 UART: [rt]cmd =0x464d4352, len=4
33,130,406 >>> mbox cmd response data (524 bytes)
33,299,551 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,329,680 UART: [rt]cmd =0x43455252, len=4
33,340,907 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,512 UART:
192,889 UART: Running Caliptra ROM ...
193,989 UART:
603,870 UART: [state] CFI Enabled
617,887 UART: [state] LifecycleState = Unprovisioned
619,825 UART: [state] DebugLocked = No
622,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,164 UART: [kat] SHA2-256
797,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,433 UART: [kat] ++
808,904 UART: [kat] sha1
818,933 UART: [kat] SHA2-256
821,593 UART: [kat] SHA2-384
827,442 UART: [kat] SHA2-512-ACC
829,810 UART: [kat] ECC-384
3,114,474 UART: [kat] HMAC-384Kdf
3,127,152 UART: [kat] LMS
4,317,266 UART: [kat] --
4,322,063 UART: [cold-reset] ++
4,324,002 UART: [fht] Storing FHT @ 0x50003400
4,334,922 UART: [idev] ++
4,335,486 UART: [idev] CDI.KEYID = 6
4,336,490 UART: [idev] SUBJECT.KEYID = 7
4,337,666 UART: [idev] UDS.KEYID = 0
4,338,749 ready_for_fw is high
4,338,974 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,050 UART: [idev] Erasing UDS.KEYID = 0
7,623,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,527 UART: [idev] --
7,649,065 UART: [ldev] ++
7,649,643 UART: [ldev] CDI.KEYID = 6
7,650,607 UART: [ldev] SUBJECT.KEYID = 5
7,651,822 UART: [ldev] AUTHORITY.KEYID = 7
7,653,053 UART: [ldev] FE.KEYID = 1
7,663,755 UART: [ldev] Erasing FE.KEYID = 1
10,953,416 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,775 UART: [ldev] --
13,313,608 UART: [fwproc] Waiting for Commands...
13,316,086 UART: [fwproc] Received command 0x46574c44
13,318,318 UART: [fwproc] Received Image of size 113844 bytes
17,364,652 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,362 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,819,986 >>> mbox cmd response: success
17,820,499 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,824,487 UART: [afmc] ++
17,825,067 UART: [afmc] CDI.KEYID = 6
17,825,981 UART: [afmc] SUBJECT.KEYID = 7
17,827,251 UART: [afmc] AUTHORITY.KEYID = 5
21,144,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,519 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,745 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,127 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,983 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,442 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,851 UART: [afmc] --
23,512,991 UART: [cold-reset] --
23,515,785 UART: [state] Locking Datavault
23,522,648 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,401 UART: [state] Locking ICCM
23,526,181 UART: [exit] Launching FMC @ 0x40000130
23,534,579 UART:
23,534,815 UART: Running Caliptra FMC ...
23,535,918 UART:
23,536,080 UART: [state] CFI Enabled
23,544,289 UART: [fht] FMC Alias Private Key: 7
25,874,834 UART: [art] Extend RT PCRs Done
25,876,047 UART: [art] Lock RT PCRs Done
25,877,620 UART: [art] Populate DV Done
25,882,908 UART: [fht] FMC Alias Private Key: 7
25,884,394 UART: [art] Derive CDI
25,885,133 UART: [art] Store in in slot 0x4
25,927,780 UART: [art] Derive Key Pair
25,928,785 UART: [art] Store priv key in slot 0x5
29,170,970 UART: [art] Derive Key Pair - Done
29,183,915 UART: [art] Signing Cert with AUTHO
29,185,218 UART: RITY.KEYID = 7
31,463,903 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,407 UART: [art] PUB.X = CD40E2CFA0B2183DBD713E49FA78778AF0A33B971B1BD041EF7285AA04454F9FD925D24CE3C37E3B4D4EDCF0327CD789
31,472,685 UART: [art] PUB.Y = 228698F5233DD004EB029F3E4037114475E3460E03AFCC2C57385A85AEE683977CD08F52D5F8AC8010212F3EE9D27788
31,479,910 UART: [art] SIG.R = C75519C09702D794D376C33AFC5506313FA8D78510352621B3B23F09D79C0FE4427521E2B8F3CF3CCB27CB586319142D
31,487,262 UART: [art] SIG.S = 9D74DF1D64CBE54BB853C9C524366209C6B2B998B1441160ADC2EAECB98B17A43C459674860793AE775DB5F9CB3254B7
32,792,557 UART: Caliptra RT
32,793,258 UART: [state] CFI Enabled
32,910,806 UART: [rt] RT listening for mailbox commands...
32,942,123 UART: [rt]cmd =0x464d4352, len=4
32,949,772 >>> mbox cmd response data (524 bytes)
33,118,710 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,148,818 UART: [rt]cmd =0x43455252, len=4
33,160,134 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
4,127,945 ready_for_fw is high
4,128,508 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,651 >>> mbox cmd response: success
18,062,291 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,707,898 UART:
23,708,291 UART: Running Caliptra FMC ...
23,709,646 UART:
23,709,822 UART: [state] CFI Enabled
23,717,312 UART: [fht] FMC Alias Private Key: 7
26,048,484 UART: [art] Extend RT PCRs Done
26,049,723 UART: [art] Lock RT PCRs Done
26,051,630 UART: [art] Populate DV Done
26,057,155 UART: [fht] FMC Alias Private Key: 7
26,058,648 UART: [art] Derive CDI
26,059,418 UART: [art] Store in in slot 0x4
26,101,798 UART: [art] Derive Key Pair
26,102,800 UART: [art] Store priv key in slot 0x5
29,344,137 UART: [art] Derive Key Pair - Done
29,357,208 UART: [art] Signing Cert with AUTHO
29,358,515 UART: RITY.KEYID = 7
31,637,838 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,847 UART: [art] PUB.X = 0707D3DEC3DD0E81E6E18019CF9ACD041F63DB629036B8485942E6F13BDFC4E3545CDF0CF6267CBF2D2616AB8E510706
31,646,583 UART: [art] PUB.Y = 849A9EAD22BE91FDCDAC08BF6066649DBB769EB960FF6E5B4F7E1B39A5DDC7A8748AED0AF85D472D7FE01C921E2445B8
31,653,847 UART: [art] SIG.R = 84642BF76F11C4B08DAB276CE80679E03E8EFCE9E29E45EF0652A8CA4D8A1F75C3E018642B262BDBBB52479FA77A9420
31,661,204 UART: [art] SIG.S = 2DFC544426FCA7FF6C7F43E2952F0A04DB0AD121BB68A9BD978D9E86BCAD3ED16249A904155A177DE7B75DC13FB224DC
32,966,416 UART: Caliptra RT
32,967,142 UART: [state] CFI Enabled
33,085,096 UART: [rt] RT listening for mailbox commands...
33,116,627 UART: [rt]cmd =0x464d4352, len=4
33,124,200 >>> mbox cmd response data (524 bytes)
33,293,229 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,323,494 UART: [rt]cmd =0x43455252, len=4
33,334,882 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,094 UART:
192,466 UART: Running Caliptra ROM ...
193,669 UART:
193,826 UART: [state] CFI Enabled
269,117 UART: [state] LifecycleState = Unprovisioned
271,035 UART: [state] DebugLocked = No
272,148 UART: [state] WD Timer not started. Device not locked for debugging
275,327 UART: [kat] SHA2-256
454,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,026 UART: [kat] ++
466,572 UART: [kat] sha1
476,892 UART: [kat] SHA2-256
479,910 UART: [kat] SHA2-384
486,327 UART: [kat] SHA2-512-ACC
489,261 UART: [kat] ECC-384
2,950,422 UART: [kat] HMAC-384Kdf
2,973,668 UART: [kat] LMS
3,503,164 UART: [kat] --
3,506,328 UART: [cold-reset] ++
3,507,203 UART: [fht] FHT @ 0x50003400
3,518,251 UART: [idev] ++
3,518,822 UART: [idev] CDI.KEYID = 6
3,519,732 UART: [idev] SUBJECT.KEYID = 7
3,520,975 UART: [idev] UDS.KEYID = 0
3,521,901 ready_for_fw is high
3,522,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,700 UART: [idev] Erasing UDS.KEYID = 0
6,025,666 UART: [idev] Sha1 KeyId Algorithm
6,048,108 UART: [idev] --
6,051,340 UART: [ldev] ++
6,051,914 UART: [ldev] CDI.KEYID = 6
6,052,834 UART: [ldev] SUBJECT.KEYID = 5
6,054,052 UART: [ldev] AUTHORITY.KEYID = 7
6,055,286 UART: [ldev] FE.KEYID = 1
6,100,516 UART: [ldev] Erasing FE.KEYID = 1
8,607,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,782 UART: [ldev] --
10,415,319 UART: [fwproc] Wait for Commands...
10,418,504 UART: [fwproc] Recv command 0x46574c44
10,420,596 UART: [fwproc] Recv'd Img size: 114168 bytes
13,816,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,277,489 >>> mbox cmd response: success
14,278,019 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,281,986 UART: [afmc] ++
14,282,573 UART: [afmc] CDI.KEYID = 6
14,283,458 UART: [afmc] SUBJECT.KEYID = 7
14,284,667 UART: [afmc] AUTHORITY.KEYID = 5
16,829,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,869 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,730 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,106 UART: [afmc] --
18,628,756 UART: [cold-reset] --
18,632,130 UART: [state] Locking Datavault
18,638,572 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,222 UART: [state] Locking ICCM
18,641,595 UART: [exit] Launching FMC @ 0x40000130
18,650,044 UART:
18,650,283 UART: Running Caliptra FMC ...
18,651,507 UART:
18,651,659 UART: [state] CFI Enabled
18,711,337 UART: [fht] FMC Alias Private Key: 7
20,474,923 UART: [art] Extend RT PCRs Done
20,476,145 UART: [art] Lock RT PCRs Done
20,478,016 UART: [art] Populate DV Done
20,483,339 UART: [fht] FMC Alias Private Key: 7
20,485,094 UART: [art] Derive CDI
20,485,838 UART: [art] Store in in slot 0x4
20,543,722 UART: [art] Derive Key Pair
20,544,761 UART: [art] Store priv key in slot 0x5
23,008,224 UART: [art] Derive Key Pair - Done
23,020,852 UART: [art] Signing Cert with AUTHO
23,022,160 UART: RITY.KEYID = 7
24,734,296 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,797 UART: [art] PUB.X = 83989BA38E13AB934F316558B09508494C951C2C185BC1D763B68D0990B41AEFA6CE600677EDF2BEE5CB8F36DEDA1195
24,743,062 UART: [art] PUB.Y = 539C75CA81CC0E83F2FE4421B243CF3678F38A693AF4FB7C50EDCEB4BC060F526A221EE87C1A80FD2CB57D066883F39F
24,750,372 UART: [art] SIG.R = 5DE54C40B288EF111CF53AD0B426DB1CF831A9F3EA689DD8D0C21C90D89B51AD2D509C1C2288509D79C8E33AD42A34C9
24,757,785 UART: [art] SIG.S = E6E36AB7F99C5272E5F21F3DACBABC75B1E7F02F1824D21C762CBDCAF78B066A300F714D295D1FC1770D58DFB8B369FD
25,737,057 UART: Caliptra RT
25,737,796 UART: [state] CFI Enabled
25,902,926 UART: [rt] RT listening for mailbox commands...
25,934,413 UART: [rt]cmd =0x464d4352, len=4
25,941,812 >>> mbox cmd response data (524 bytes)
26,112,051 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,142,192 UART: [rt]cmd =0x43455252, len=4
26,153,595 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,382,585 ready_for_fw is high
3,383,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,082,752 >>> mbox cmd response: success
14,083,364 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,362,915 UART:
18,363,303 UART: Running Caliptra FMC ...
18,364,427 UART:
18,364,597 UART: [state] CFI Enabled
18,428,394 UART: [fht] FMC Alias Private Key: 7
20,192,254 UART: [art] Extend RT PCRs Done
20,193,489 UART: [art] Lock RT PCRs Done
20,195,445 UART: [art] Populate DV Done
20,200,859 UART: [fht] FMC Alias Private Key: 7
20,202,454 UART: [art] Derive CDI
20,203,272 UART: [art] Store in in slot 0x4
20,260,233 UART: [art] Derive Key Pair
20,261,233 UART: [art] Store priv key in slot 0x5
22,724,337 UART: [art] Derive Key Pair - Done
22,737,350 UART: [art] Signing Cert with AUTHO
22,738,668 UART: RITY.KEYID = 7
24,449,613 UART: [art] Erasing AUTHORITY.KEYID = 7
24,451,127 UART: [art] PUB.X = 687530370A6D0A2C3577C9F06234664C476F83574BD310896C9C79614CE2545654322D2901AB55CAB23B3443DB66315C
24,458,344 UART: [art] PUB.Y = 323554812B58665C28EB7FB85FFDD7FF33532A70E55547B9F48A533EB7B282843956E04B304915F8B19F21B0547CF57F
24,465,594 UART: [art] SIG.R = BDF3E444212139FCCF4C8F682DC3526DF508436B9B3206F7EA3331AFD070F6C256C82016A3F5DF17CED232DA5EA677F5
24,473,039 UART: [art] SIG.S = 26B11EC929B38A8452DF8CBE5A89E2A50C3AC1FC342A6D547AD0B81162DCB9C7357F367356B91C86B42ADFEEC23722CB
25,451,989 UART: Caliptra RT
25,452,732 UART: [state] CFI Enabled
25,617,583 UART: [rt] RT listening for mailbox commands...
25,648,940 UART: [rt]cmd =0x464d4352, len=4
25,656,334 >>> mbox cmd response data (524 bytes)
25,825,450 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,855,335 UART: [rt]cmd =0x43455252, len=4
25,866,558 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,831 writing to cptra_bootfsm_go
192,924 UART:
193,287 UART: Running Caliptra ROM ...
194,385 UART:
603,897 UART: [state] CFI Enabled
616,794 UART: [state] LifecycleState = Unprovisioned
618,669 UART: [state] DebugLocked = No
621,554 UART: [state] WD Timer not started. Device not locked for debugging
625,157 UART: [kat] SHA2-256
804,337 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,850 UART: [kat] ++
816,390 UART: [kat] sha1
827,272 UART: [kat] SHA2-256
830,290 UART: [kat] SHA2-384
836,847 UART: [kat] SHA2-512-ACC
839,855 UART: [kat] ECC-384
3,280,028 UART: [kat] HMAC-384Kdf
3,291,707 UART: [kat] LMS
3,821,150 UART: [kat] --
3,826,060 UART: [cold-reset] ++
3,827,997 UART: [fht] FHT @ 0x50003400
3,838,403 UART: [idev] ++
3,838,962 UART: [idev] CDI.KEYID = 6
3,839,841 UART: [idev] SUBJECT.KEYID = 7
3,841,081 UART: [idev] UDS.KEYID = 0
3,841,981 ready_for_fw is high
3,842,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,605 UART: [idev] Erasing UDS.KEYID = 0
6,311,716 UART: [idev] Sha1 KeyId Algorithm
6,333,763 UART: [idev] --
6,337,940 UART: [ldev] ++
6,338,522 UART: [ldev] CDI.KEYID = 6
6,339,435 UART: [ldev] SUBJECT.KEYID = 5
6,340,591 UART: [ldev] AUTHORITY.KEYID = 7
6,341,873 UART: [ldev] FE.KEYID = 1
6,352,300 UART: [ldev] Erasing FE.KEYID = 1
8,825,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,618 UART: [ldev] --
10,615,197 UART: [fwproc] Wait for Commands...
10,616,924 UART: [fwproc] Recv command 0x46574c44
10,619,020 UART: [fwproc] Recv'd Img size: 114168 bytes
14,021,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,476,952 >>> mbox cmd response: success
14,477,533 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,482,012 UART: [afmc] ++
14,482,611 UART: [afmc] CDI.KEYID = 6
14,483,523 UART: [afmc] SUBJECT.KEYID = 7
14,484,686 UART: [afmc] AUTHORITY.KEYID = 5
16,985,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,706,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,996 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,843 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,601 UART: [afmc] --
18,780,528 UART: [cold-reset] --
18,784,877 UART: [state] Locking Datavault
18,792,499 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,198 UART: [state] Locking ICCM
18,796,890 UART: [exit] Launching FMC @ 0x40000130
18,805,287 UART:
18,805,524 UART: Running Caliptra FMC ...
18,806,574 UART:
18,806,736 UART: [state] CFI Enabled
18,814,772 UART: [fht] FMC Alias Private Key: 7
20,571,714 UART: [art] Extend RT PCRs Done
20,573,071 UART: [art] Lock RT PCRs Done
20,574,807 UART: [art] Populate DV Done
20,580,347 UART: [fht] FMC Alias Private Key: 7
20,581,842 UART: [art] Derive CDI
20,582,605 UART: [art] Store in in slot 0x4
20,624,932 UART: [art] Derive Key Pair
20,625,937 UART: [art] Store priv key in slot 0x5
23,052,996 UART: [art] Derive Key Pair - Done
23,065,886 UART: [art] Signing Cert with AUTHO
23,067,188 UART: RITY.KEYID = 7
24,772,868 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,366 UART: [art] PUB.X = 49567D59C1389C3F2406923C56CD8B8D68E0CE2FDA0623E5649DE29DB13505156878B1594E35A6DB34D94CDAC2F982DC
24,781,616 UART: [art] PUB.Y = 4CB8AB2F8E75C2E0D37D22D3E21D9637FA3259A372E305C49C875A00BB8BE56CC37B58D49F7998274892A0F4721458AE
24,788,856 UART: [art] SIG.R = 8F804CBB1FD3D8CD851FE9C179BC7BA28D6AE4DC1A54FF1298577DB1EEE2AA19A812989401C77C2764C3DAC3B3E2F24A
24,796,258 UART: [art] SIG.S = D4D1578340CBCF80FB948ED7E28038FB7E168A036CF91EC711CA11F45CD7D2CF85B6973DE87A6E63731D9426A93404B3
25,774,967 UART: Caliptra RT
25,775,684 UART: [state] CFI Enabled
25,893,070 UART: [rt] RT listening for mailbox commands...
25,924,066 UART: [rt]cmd =0x464d4352, len=4
25,931,531 >>> mbox cmd response data (524 bytes)
26,099,943 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,130,087 UART: [rt]cmd =0x43455252, len=4
26,141,377 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
3,692,857 ready_for_fw is high
3,693,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,271,903 >>> mbox cmd response: success
14,272,532 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,523,467 UART:
18,523,874 UART: Running Caliptra FMC ...
18,525,002 UART:
18,525,173 UART: [state] CFI Enabled
18,532,866 UART: [fht] FMC Alias Private Key: 7
20,289,191 UART: [art] Extend RT PCRs Done
20,290,418 UART: [art] Lock RT PCRs Done
20,291,992 UART: [art] Populate DV Done
20,297,411 UART: [fht] FMC Alias Private Key: 7
20,299,098 UART: [art] Derive CDI
20,299,879 UART: [art] Store in in slot 0x4
20,342,324 UART: [art] Derive Key Pair
20,343,333 UART: [art] Store priv key in slot 0x5
22,770,577 UART: [art] Derive Key Pair - Done
22,784,003 UART: [art] Signing Cert with AUTHO
22,785,336 UART: RITY.KEYID = 7
24,490,828 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,332 UART: [art] PUB.X = 9F954645B63E1F370BCEA6D3347AC9096EBB9AE14362A58400C93BE8D0FC85DACE7347143775E00B7D02674DF3D286A5
24,499,573 UART: [art] PUB.Y = F664F97B70174C66994422A1E6A935974D3593FF912E46A0D8BBD1324E15379B55D686185916D1A7681225A30AEC9782
24,506,833 UART: [art] SIG.R = DCFDC208C06B503C5450D1F4354D7C494024FA25597B8FE1A7BF507F0BB7CBB5BBC6185DC142EC50E6DBF20A1D6FD932
24,514,225 UART: [art] SIG.S = 336FF192EFF19D741DADE4BC74818C7440D31A956E3DA003107C6C1F3A772CC67DDDE2097E7F5510B10D95E5964F92F6
25,493,099 UART: Caliptra RT
25,493,817 UART: [state] CFI Enabled
25,611,958 UART: [rt] RT listening for mailbox commands...
25,643,215 UART: [rt]cmd =0x464d4352, len=4
25,650,790 >>> mbox cmd response data (524 bytes)
25,818,849 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,848,918 UART: [rt]cmd =0x43455252, len=4
25,860,325 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,276 UART:
192,648 UART: Running Caliptra ROM ...
193,829 UART:
193,983 UART: [state] CFI Enabled
264,009 UART: [state] LifecycleState = Unprovisioned
266,357 UART: [state] DebugLocked = No
268,034 UART: [state] WD Timer not started. Device not locked for debugging
272,295 UART: [kat] SHA2-256
462,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,964 UART: [kat] ++
473,446 UART: [kat] sha1
484,462 UART: [kat] SHA2-256
487,475 UART: [kat] SHA2-384
493,182 UART: [kat] SHA2-512-ACC
495,763 UART: [kat] ECC-384
2,948,980 UART: [kat] HMAC-384Kdf
2,969,906 UART: [kat] LMS
3,501,732 UART: [kat] --
3,507,432 UART: [cold-reset] ++
3,509,504 UART: [fht] FHT @ 0x50003400
3,522,347 UART: [idev] ++
3,522,992 UART: [idev] CDI.KEYID = 6
3,523,953 UART: [idev] SUBJECT.KEYID = 7
3,525,198 UART: [idev] UDS.KEYID = 0
3,526,100 ready_for_fw is high
3,526,315 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,985 UART: [idev] Erasing UDS.KEYID = 0
6,026,364 UART: [idev] Sha1 KeyId Algorithm
6,049,592 UART: [idev] --
6,054,646 UART: [ldev] ++
6,055,362 UART: [ldev] CDI.KEYID = 6
6,056,254 UART: [ldev] SUBJECT.KEYID = 5
6,057,363 UART: [ldev] AUTHORITY.KEYID = 7
6,058,660 UART: [ldev] FE.KEYID = 1
6,099,034 UART: [ldev] Erasing FE.KEYID = 1
8,606,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,296 UART: [ldev] --
10,409,974 UART: [fwproc] Wait for Commands...
10,412,013 UART: [fwproc] Recv command 0x46574c44
10,414,323 UART: [fwproc] Recv'd Img size: 114168 bytes
13,856,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,896 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,592,285 >>> mbox cmd response: success
14,592,765 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,596,085 UART: [afmc] ++
14,596,803 UART: [afmc] CDI.KEYID = 6
14,597,919 UART: [afmc] SUBJECT.KEYID = 7
14,599,484 UART: [afmc] AUTHORITY.KEYID = 5
17,123,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,847,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,849,408 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,864,622 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,879,713 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,894,732 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,917,879 UART: [afmc] --
18,920,557 UART: [cold-reset] --
18,923,456 UART: [state] Locking Datavault
18,929,412 UART: [state] Locking PCR0, PCR1 and PCR31
18,931,609 UART: [state] Locking ICCM
18,933,217 UART: [exit] Launching FMC @ 0x40000130
18,941,852 UART:
18,942,096 UART: Running Caliptra FMC ...
18,943,204 UART:
18,943,384 UART: [state] CFI Enabled
19,004,576 UART: [fht] FMC Alias Private Key: 7
20,768,832 UART: [art] Extend RT PCRs Done
20,770,051 UART: [art] Lock RT PCRs Done
20,771,978 UART: [art] Populate DV Done
20,777,207 UART: [fht] FMC Alias Private Key: 7
20,778,923 UART: [art] Derive CDI
20,779,662 UART: [art] Store in in slot 0x4
20,837,005 UART: [art] Derive Key Pair
20,838,008 UART: [art] Store priv key in slot 0x5
23,300,321 UART: [art] Derive Key Pair - Done
23,313,535 UART: [art] Signing Cert with AUTHO
23,314,831 UART: RITY.KEYID = 7
25,026,992 UART: [art] Erasing AUTHORITY.KEYID = 7
25,028,501 UART: [art] PUB.X = 5A48D0803969A82448CD69C9F5E4668C27FDA0E4C9A0AE0A409E54F277F717462123372B4834ED71D6BFAF19A6E474FA
25,035,764 UART: [art] PUB.Y = 4A82EC995302E4D8D69179327ED69EA1632FA6E772F8CD1281313A9487124F52BC33DEE9DF3FA22A9E7EB5291BBAD626
25,043,036 UART: [art] SIG.R = 7F950FB1BCE1887295AFC111D69512C8625CA2E1245B36631DE9A0D610F695952CE28E50BD87F324AF680070F8E2FACA
25,050,408 UART: [art] SIG.S = 51442C54433E49FF3C03EDB3EB7E678E28C1F38A79515A3ECD121365C13D315EAEBDF5FA6BA719D9296832BB5CAEE82B
26,029,609 UART: Caliptra RT
26,030,325 UART: [state] CFI Enabled
26,195,910 UART: [rt] RT listening for mailbox commands...
26,227,157 UART: [rt]cmd =0x464d4352, len=4
26,234,917 >>> mbox cmd response data (524 bytes)
26,405,200 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,435,289 UART: [rt]cmd =0x43455252, len=4
26,446,625 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,436,796 ready_for_fw is high
3,437,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,724,987 >>> mbox cmd response: success
14,725,796 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,025,978 UART:
19,026,389 UART: Running Caliptra FMC ...
19,027,525 UART:
19,027,692 UART: [state] CFI Enabled
19,092,732 UART: [fht] FMC Alias Private Key: 7
20,856,393 UART: [art] Extend RT PCRs Done
20,857,619 UART: [art] Lock RT PCRs Done
20,859,572 UART: [art] Populate DV Done
20,864,933 UART: [fht] FMC Alias Private Key: 7
20,866,587 UART: [art] Derive CDI
20,867,405 UART: [art] Store in in slot 0x4
20,925,615 UART: [art] Derive Key Pair
20,926,615 UART: [art] Store priv key in slot 0x5
23,389,882 UART: [art] Derive Key Pair - Done
23,402,993 UART: [art] Signing Cert with AUTHO
23,404,300 UART: RITY.KEYID = 7
25,115,648 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,171 UART: [art] PUB.X = 5084D3BB25C45BE5C9CBA020CA806EBF226F339941E4B02B9B77640DB6FB2CE0CEF21E1397B6C163827020A1E6B882CE
25,124,471 UART: [art] PUB.Y = 686894547F9844660B836ED55C85B6CCCFAA24F26D92D884A5BACE6DDA4AE923C21D68F20E6BCA500D23C2D236A28EDD
25,131,703 UART: [art] SIG.R = C5973039934773F61E5D77C8DC4953EE13ADA18BDC2CBD6BB4F18883E46B9C8AD72CBC470EE406A1B5BE71707171F284
25,139,149 UART: [art] SIG.S = BE07D1745EC5A5C3C69EAAD4E95A7E9ABAE1FA181A61BCA4188B7F715FAE614E17F3C29D604D46A4984F179437D957E2
26,117,702 UART: Caliptra RT
26,118,392 UART: [state] CFI Enabled
26,282,981 UART: [rt] RT listening for mailbox commands...
26,314,327 UART: [rt]cmd =0x464d4352, len=4
26,321,958 >>> mbox cmd response data (524 bytes)
26,491,958 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,521,928 UART: [rt]cmd =0x43455252, len=4
26,533,328 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
192,958 UART:
193,343 UART: Running Caliptra ROM ...
194,433 UART:
604,099 UART: [state] CFI Enabled
618,897 UART: [state] LifecycleState = Unprovisioned
621,254 UART: [state] DebugLocked = No
622,846 UART: [state] WD Timer not started. Device not locked for debugging
626,700 UART: [kat] SHA2-256
816,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,440 UART: [kat] ++
827,893 UART: [kat] sha1
838,982 UART: [kat] SHA2-256
841,997 UART: [kat] SHA2-384
848,057 UART: [kat] SHA2-512-ACC
850,641 UART: [kat] ECC-384
3,292,515 UART: [kat] HMAC-384Kdf
3,305,101 UART: [kat] LMS
3,836,951 UART: [kat] --
3,843,506 UART: [cold-reset] ++
3,845,364 UART: [fht] FHT @ 0x50003400
3,857,542 UART: [idev] ++
3,858,254 UART: [idev] CDI.KEYID = 6
3,859,139 UART: [idev] SUBJECT.KEYID = 7
3,860,716 UART: [idev] UDS.KEYID = 0
3,861,629 ready_for_fw is high
3,861,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,158 UART: [idev] Erasing UDS.KEYID = 0
6,339,529 UART: [idev] Sha1 KeyId Algorithm
6,362,551 UART: [idev] --
6,366,332 UART: [ldev] ++
6,367,008 UART: [ldev] CDI.KEYID = 6
6,367,892 UART: [ldev] SUBJECT.KEYID = 5
6,369,100 UART: [ldev] AUTHORITY.KEYID = 7
6,370,279 UART: [ldev] FE.KEYID = 1
6,379,927 UART: [ldev] Erasing FE.KEYID = 1
8,861,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,338 UART: [ldev] --
10,653,028 UART: [fwproc] Wait for Commands...
10,655,827 UART: [fwproc] Recv command 0x46574c44
10,658,136 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,837,984 >>> mbox cmd response: success
14,838,484 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,841,707 UART: [afmc] ++
14,842,409 UART: [afmc] CDI.KEYID = 6
14,843,653 UART: [afmc] SUBJECT.KEYID = 7
14,845,089 UART: [afmc] AUTHORITY.KEYID = 5
17,357,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,908 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,070 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,192 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,238 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,873 UART: [afmc] --
19,154,583 UART: [cold-reset] --
19,159,256 UART: [state] Locking Datavault
19,164,019 UART: [state] Locking PCR0, PCR1 and PCR31
19,166,219 UART: [state] Locking ICCM
19,168,264 UART: [exit] Launching FMC @ 0x40000130
19,176,882 UART:
19,177,119 UART: Running Caliptra FMC ...
19,178,220 UART:
19,178,384 UART: [state] CFI Enabled
19,186,410 UART: [fht] FMC Alias Private Key: 7
20,942,864 UART: [art] Extend RT PCRs Done
20,944,109 UART: [art] Lock RT PCRs Done
20,945,789 UART: [art] Populate DV Done
20,951,476 UART: [fht] FMC Alias Private Key: 7
20,953,014 UART: [art] Derive CDI
20,953,834 UART: [art] Store in in slot 0x4
20,996,432 UART: [art] Derive Key Pair
20,997,474 UART: [art] Store priv key in slot 0x5
23,424,035 UART: [art] Derive Key Pair - Done
23,437,030 UART: [art] Signing Cert with AUTHO
23,438,333 UART: RITY.KEYID = 7
25,143,751 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,257 UART: [art] PUB.X = DD393869001166FED25AA350F5805FB30212F00B4676C31FC815FB33939D60BCE1976ABBFD5D2ADE59510BF8A3A5015A
25,152,498 UART: [art] PUB.Y = 7F05BB56B1CFF771D6E459B760B35FFA12FAE2A99FA1B218FD214E32DC50A63863A3D98087B9414D28A47F1219DF7192
25,159,726 UART: [art] SIG.R = 74B9EB3707D36FCCFDE87E02010B3B356203F39410CD2A72CBB9DB65692503CE82EB5ECD3502C7B486210621F8CD4B15
25,167,168 UART: [art] SIG.S = E91B17B7288B6E6047CB2FC0DC98960C3F215FA77970EAEB13A24F608A71BEEC062D14C5B562AFAAE8174DF225DE080D
26,145,945 UART: Caliptra RT
26,146,670 UART: [state] CFI Enabled
26,262,814 UART: [rt] RT listening for mailbox commands...
26,293,914 UART: [rt]cmd =0x464d4352, len=4
26,301,756 >>> mbox cmd response data (524 bytes)
26,470,086 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,500,054 UART: [rt]cmd =0x43455252, len=4
26,511,510 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,596 writing to cptra_bootfsm_go
3,755,572 ready_for_fw is high
3,756,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,601 >>> mbox cmd response: success
14,954,240 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,206,398 UART:
19,206,795 UART: Running Caliptra FMC ...
19,207,898 UART:
19,208,050 UART: [state] CFI Enabled
19,215,856 UART: [fht] FMC Alias Private Key: 7
20,972,320 UART: [art] Extend RT PCRs Done
20,973,549 UART: [art] Lock RT PCRs Done
20,975,450 UART: [art] Populate DV Done
20,980,755 UART: [fht] FMC Alias Private Key: 7
20,982,405 UART: [art] Derive CDI
20,983,220 UART: [art] Store in in slot 0x4
21,025,605 UART: [art] Derive Key Pair
21,026,651 UART: [art] Store priv key in slot 0x5
23,454,008 UART: [art] Derive Key Pair - Done
23,467,079 UART: [art] Signing Cert with AUTHO
23,468,390 UART: RITY.KEYID = 7
25,173,804 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,315 UART: [art] PUB.X = C571E1DCF940406D8193E5581DB4AFF20C418B96C06347AA6E26585DF9500F587538584CB3063040DCFAF9C91ECCC48C
25,182,567 UART: [art] PUB.Y = 4389FC6B47F50AC700D3F24E2ED029BDAC579D4DEC35015C17802EA3B9B720EAF56588CAD9276F18920931325B4BD25D
25,189,801 UART: [art] SIG.R = 34D94AFCB3FBEAA89D2B5179747AF2E90A4B2F976906DD8DD24602495461925DD09E0C22D88475863E566D4BC6A1D069
25,197,191 UART: [art] SIG.S = 416B25C81F77E3C4D09D90DEA109105FA99C7F7FA495ACA1DD311662183A530058084C7D85CB12DE5435BC8EADC891C7
26,175,920 UART: Caliptra RT
26,176,646 UART: [state] CFI Enabled
26,293,854 UART: [rt] RT listening for mailbox commands...
26,325,273 UART: [rt]cmd =0x464d4352, len=4
26,332,786 >>> mbox cmd response data (524 bytes)
26,500,855 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,530,874 UART: [rt]cmd =0x43455252, len=4
26,542,481 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,025 UART: [kat] SHA2-256
881,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,071 UART: [kat] ++
886,223 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,288 UART: [kat] SHA2-512-ACC
897,189 UART: [kat] ECC-384
902,788 UART: [kat] HMAC-384Kdf
907,470 UART: [kat] LMS
1,475,666 UART: [kat] --
1,476,675 UART: [cold-reset] ++
1,477,147 UART: [fht] Storing FHT @ 0x50003400
1,479,994 UART: [idev] ++
1,480,162 UART: [idev] CDI.KEYID = 6
1,480,522 UART: [idev] SUBJECT.KEYID = 7
1,480,946 UART: [idev] UDS.KEYID = 0
1,481,291 ready_for_fw is high
1,481,291 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,056 UART: [idev] Erasing UDS.KEYID = 0
1,505,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,304 UART: [idev] --
1,515,515 UART: [ldev] ++
1,515,683 UART: [ldev] CDI.KEYID = 6
1,516,046 UART: [ldev] SUBJECT.KEYID = 5
1,516,472 UART: [ldev] AUTHORITY.KEYID = 7
1,516,935 UART: [ldev] FE.KEYID = 1
1,522,077 UART: [ldev] Erasing FE.KEYID = 1
1,546,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,658 UART: [ldev] --
1,585,929 UART: [fwproc] Waiting for Commands...
1,586,580 UART: [fwproc] Received command 0x46574c44
1,587,371 UART: [fwproc] Received Image of size 114168 bytes
2,883,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,141 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,493 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,166 >>> mbox cmd response: success
3,076,166 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,077,328 UART: [afmc] ++
3,077,496 UART: [afmc] CDI.KEYID = 6
3,077,858 UART: [afmc] SUBJECT.KEYID = 7
3,078,283 UART: [afmc] AUTHORITY.KEYID = 5
3,112,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,268 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,661 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,351 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,354 UART: [afmc] --
3,156,262 UART: [cold-reset] --
3,157,314 UART: [state] Locking Datavault
3,158,695 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,299 UART: [state] Locking ICCM
3,159,873 UART: [exit] Launching FMC @ 0x40000130
3,165,202 UART:
3,165,218 UART: Running Caliptra FMC ...
3,165,626 UART:
3,165,680 UART: [state] CFI Enabled
3,176,263 UART: [fht] FMC Alias Private Key: 7
3,284,434 UART: [art] Extend RT PCRs Done
3,284,862 UART: [art] Lock RT PCRs Done
3,286,238 UART: [art] Populate DV Done
3,294,537 UART: [fht] FMC Alias Private Key: 7
3,295,613 UART: [art] Derive CDI
3,295,893 UART: [art] Store in in slot 0x4
3,381,570 UART: [art] Derive Key Pair
3,381,930 UART: [art] Store priv key in slot 0x5
3,395,198 UART: [art] Derive Key Pair - Done
3,409,960 UART: [art] Signing Cert with AUTHO
3,410,440 UART: RITY.KEYID = 7
3,425,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,669 UART: [art] PUB.X = 71DEA03233BF2082BCB3F5608F57FB9D8ACD6956844B1153ABAA087B3B504D19B21D5F2E67A6D50C05FBE890310D9CB1
3,433,439 UART: [art] PUB.Y = 03C76D5E5B28F2D18E6D989778FD86B9207A8AA768E543D49E1FBE908E10A90A5E32D0B7F62AF78E0158D27C91F8D94C
3,440,388 UART: [art] SIG.R = 5630C6C2EF901EA332144867025AC94ECF2197992E8627F5019B6AD54AB4D04AB7F114BDEA0F86BE1A76EFC95DA078F6
3,447,159 UART: [art] SIG.S = 42707044AD6ABDC8549FF6CDD9CD5F4B4CF0F7F026605BFEC734F32A3999DAD5257CD639005CB75C1A29C6D41EC0AB71
3,470,604 UART: Caliptra RT
3,470,857 UART: [state] CFI Enabled
3,579,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,749 UART: [rt]cmd =0x464d4352, len=4
3,616,842 >>> mbox cmd response data (524 bytes)
3,616,843 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,130 UART: [rt]cmd =0x43455252, len=4
3,656,888 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,571 ready_for_fw is high
1,361,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,378 >>> mbox cmd response: success
2,923,378 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,984,786 UART:
2,984,802 UART: Running Caliptra FMC ...
2,985,210 UART:
2,985,264 UART: [state] CFI Enabled
2,995,831 UART: [fht] FMC Alias Private Key: 7
3,103,568 UART: [art] Extend RT PCRs Done
3,103,996 UART: [art] Lock RT PCRs Done
3,105,740 UART: [art] Populate DV Done
3,114,025 UART: [fht] FMC Alias Private Key: 7
3,115,143 UART: [art] Derive CDI
3,115,423 UART: [art] Store in in slot 0x4
3,200,888 UART: [art] Derive Key Pair
3,201,248 UART: [art] Store priv key in slot 0x5
3,214,452 UART: [art] Derive Key Pair - Done
3,228,889 UART: [art] Signing Cert with AUTHO
3,229,369 UART: RITY.KEYID = 7
3,244,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,400 UART: [art] PUB.X = B327CDF9FE37FEEB5BFF8350484C521BF6577E231396E8D343F8E943B2718D470A4200EDB28014D7853DB92A0F57E28E
3,252,148 UART: [art] PUB.Y = A63480FCD5BC98A566709967A12B1D9CB70BD469AC6752CBB09C975F311EC3B20E83371D7A82223F5B60E7708CDC1155
3,259,096 UART: [art] SIG.R = FBF09B70A52CFA92EA197DD931802DD189896883B05CA9266A49D9AA1859D503562298B449D2D4A78E3DBB025B979CF2
3,265,864 UART: [art] SIG.S = AF76BCD746CDF5610B1523C4B4899EA6E7E685FF060A4B0DBE35CB9F3ACC1D57390C695DFB5B8526C86CCE53AB053BB4
3,290,235 UART: Caliptra RT
3,290,488 UART: [state] CFI Enabled
3,400,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,576 UART: [rt]cmd =0x464d4352, len=4
3,437,593 >>> mbox cmd response data (524 bytes)
3,437,594 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,903 UART: [rt]cmd =0x43455252, len=4
3,477,684 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,708 UART: [cold-reset] ++
1,477,036 UART: [fht] Storing FHT @ 0x50003400
1,479,883 UART: [idev] ++
1,480,051 UART: [idev] CDI.KEYID = 6
1,480,411 UART: [idev] SUBJECT.KEYID = 7
1,480,835 UART: [idev] UDS.KEYID = 0
1,481,180 ready_for_fw is high
1,481,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,751 UART: [idev] Erasing UDS.KEYID = 0
1,505,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,103 UART: [idev] --
1,515,182 UART: [ldev] ++
1,515,350 UART: [ldev] CDI.KEYID = 6
1,515,713 UART: [ldev] SUBJECT.KEYID = 5
1,516,139 UART: [ldev] AUTHORITY.KEYID = 7
1,516,602 UART: [ldev] FE.KEYID = 1
1,522,044 UART: [ldev] Erasing FE.KEYID = 1
1,547,643 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,821 UART: [ldev] --
1,587,222 UART: [fwproc] Waiting for Commands...
1,587,851 UART: [fwproc] Received command 0x46574c44
1,588,642 UART: [fwproc] Received Image of size 114168 bytes
2,885,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,496 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,485 >>> mbox cmd response: success
3,078,485 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,079,593 UART: [afmc] ++
3,079,761 UART: [afmc] CDI.KEYID = 6
3,080,123 UART: [afmc] SUBJECT.KEYID = 7
3,080,548 UART: [afmc] AUTHORITY.KEYID = 5
3,115,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,320 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,010 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,951 UART: [afmc] --
3,158,863 UART: [cold-reset] --
3,159,891 UART: [state] Locking Datavault
3,161,082 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,686 UART: [state] Locking ICCM
3,162,298 UART: [exit] Launching FMC @ 0x40000130
3,167,627 UART:
3,167,643 UART: Running Caliptra FMC ...
3,168,051 UART:
3,168,194 UART: [state] CFI Enabled
3,178,307 UART: [fht] FMC Alias Private Key: 7
3,285,954 UART: [art] Extend RT PCRs Done
3,286,382 UART: [art] Lock RT PCRs Done
3,287,844 UART: [art] Populate DV Done
3,295,897 UART: [fht] FMC Alias Private Key: 7
3,296,917 UART: [art] Derive CDI
3,297,197 UART: [art] Store in in slot 0x4
3,382,866 UART: [art] Derive Key Pair
3,383,226 UART: [art] Store priv key in slot 0x5
3,396,274 UART: [art] Derive Key Pair - Done
3,411,294 UART: [art] Signing Cert with AUTHO
3,411,774 UART: RITY.KEYID = 7
3,426,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,671 UART: [art] PUB.X = 8CF8CA06C25951FFDD95E790E4600DFCFCACC0FE1E772CAF1AAA62BF59210328B73CBCA74B0FA37F955935C99648F4F1
3,434,451 UART: [art] PUB.Y = 36E1C24337D7DC0D2FF507CEF5588A195AB83B35669174DB7BFE21133726C77AB6D327D24DED3057DA4535C5733BC1A2
3,441,401 UART: [art] SIG.R = 2487A5506F3ADB8CD84F41D264165EA9B965663AE6E54850BBF03AD5A560AE500D0FF966284BE295BE211DDB8541AB81
3,448,173 UART: [art] SIG.S = 803164A59773BEB8494C5FB90B9399778AABCFDAF2FD0F97185C06B14319DEAD9ABF3167A00DF1008F5A0B342B1FD1C3
3,471,727 UART: Caliptra RT
3,472,072 UART: [state] CFI Enabled
3,580,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,111 UART: [rt]cmd =0x464d4352, len=4
3,618,192 >>> mbox cmd response data (524 bytes)
3,618,193 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,694 UART: [rt]cmd =0x43455252, len=4
3,658,650 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,000 ready_for_fw is high
1,363,000 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,947 >>> mbox cmd response: success
2,926,947 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,989,177 UART:
2,989,193 UART: Running Caliptra FMC ...
2,989,601 UART:
2,989,744 UART: [state] CFI Enabled
3,000,083 UART: [fht] FMC Alias Private Key: 7
3,108,232 UART: [art] Extend RT PCRs Done
3,108,660 UART: [art] Lock RT PCRs Done
3,110,164 UART: [art] Populate DV Done
3,118,423 UART: [fht] FMC Alias Private Key: 7
3,119,537 UART: [art] Derive CDI
3,119,817 UART: [art] Store in in slot 0x4
3,205,468 UART: [art] Derive Key Pair
3,205,828 UART: [art] Store priv key in slot 0x5
3,219,292 UART: [art] Derive Key Pair - Done
3,234,057 UART: [art] Signing Cert with AUTHO
3,234,537 UART: RITY.KEYID = 7
3,249,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,446 UART: [art] PUB.X = 060CD4B50AC9C80F09D1D5D327ACD44D6B8405390B5597E4F62279E9FB71835D7F0CC9A0BF18FAB8B70DF54A05EE1E60
3,257,200 UART: [art] PUB.Y = 2D78461B920159581CE884131B16D335299F6618C6B9FEF788455386235F0212346A3B4CD56099CC81CECA230032DA7B
3,264,112 UART: [art] SIG.R = E7A746099DCEB674E9C92D2826506622253A581259F4F4C0F4FF65F4997A68AE778CD641455CF575E8938644CF0F4956
3,270,870 UART: [art] SIG.S = FA1AEE4AC7E5EF97347AC46FF89B664A38B42A085E2CCFFF3C23016BA18C60303A8E63DA321CDC66D88EE921D15646C0
3,295,323 UART: Caliptra RT
3,295,668 UART: [state] CFI Enabled
3,403,282 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,560 UART: [rt]cmd =0x464d4352, len=4
3,440,581 >>> mbox cmd response data (524 bytes)
3,440,582 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,623 UART: [rt]cmd =0x43455252, len=4
3,480,524 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,737 UART: [kat] SHA2-256
903,677 UART: [kat] SHA2-384
906,238 UART: [kat] SHA2-512-ACC
908,139 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,682 UART: [kat] LMS
1,171,010 UART: [kat] --
1,171,613 UART: [cold-reset] ++
1,171,959 UART: [fht] FHT @ 0x50003400
1,174,464 UART: [idev] ++
1,174,632 UART: [idev] CDI.KEYID = 6
1,174,992 UART: [idev] SUBJECT.KEYID = 7
1,175,416 UART: [idev] UDS.KEYID = 0
1,175,761 ready_for_fw is high
1,175,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,192 UART: [idev] Erasing UDS.KEYID = 0
1,200,019 UART: [idev] Sha1 KeyId Algorithm
1,208,389 UART: [idev] --
1,209,339 UART: [ldev] ++
1,209,507 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,825 UART: [ldev] --
1,281,124 UART: [fwproc] Wait for Commands...
1,281,786 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,587 >>> mbox cmd response: success
2,771,587 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,772,709 UART: [afmc] ++
2,772,877 UART: [afmc] CDI.KEYID = 6
2,773,239 UART: [afmc] SUBJECT.KEYID = 7
2,773,664 UART: [afmc] AUTHORITY.KEYID = 5
2,808,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,285 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,004 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,812 UART: [afmc] --
2,851,938 UART: [cold-reset] --
2,852,666 UART: [state] Locking Datavault
2,853,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,281 UART: [state] Locking ICCM
2,854,705 UART: [exit] Launching FMC @ 0x40000130
2,860,034 UART:
2,860,050 UART: Running Caliptra FMC ...
2,860,458 UART:
2,860,512 UART: [state] CFI Enabled
2,870,519 UART: [fht] FMC Alias Private Key: 7
2,978,122 UART: [art] Extend RT PCRs Done
2,978,550 UART: [art] Lock RT PCRs Done
2,979,926 UART: [art] Populate DV Done
2,988,333 UART: [fht] FMC Alias Private Key: 7
2,989,447 UART: [art] Derive CDI
2,989,727 UART: [art] Store in in slot 0x4
3,075,440 UART: [art] Derive Key Pair
3,075,800 UART: [art] Store priv key in slot 0x5
3,088,878 UART: [art] Derive Key Pair - Done
3,103,710 UART: [art] Signing Cert with AUTHO
3,104,190 UART: RITY.KEYID = 7
3,119,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,875 UART: [art] PUB.X = 5C1C22F2DA6D0C4F00EF8D2E9B0F535BAA7905B4108AABBC5CABD148D14A112DF9D98574237D5DDF2DA618299772C5EF
3,126,634 UART: [art] PUB.Y = 1768FBE6B555F2948C6A7947BEF2B13FBA6A343D43FEDB97854B33549C53285BA50BBD79958DABD48D7965593FC9039E
3,133,586 UART: [art] SIG.R = F85A12FC1CCB50FE4F144D6984DABB9766D6509AFA55ED7A17C9D6CC2A97D6AE82CC8277F6E2EF47918753B7DC06B4DC
3,140,375 UART: [art] SIG.S = BA56374BB765341C7F5E264D4D7ED26B5B5F06D23D9A18E940F22B93DE1F736B8E6DAA20ABAB6B3C0AB8C56434CAAC36
3,164,174 UART: Caliptra RT
3,164,427 UART: [state] CFI Enabled
3,272,437 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,983 UART: [rt]cmd =0x464d4352, len=4
3,309,744 >>> mbox cmd response data (524 bytes)
3,309,745 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,034 UART: [rt]cmd =0x43455252, len=4
3,349,769 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 ready_for_fw is high
1,059,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,310 >>> mbox cmd response: success
2,623,310 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,684,892 UART:
2,684,908 UART: Running Caliptra FMC ...
2,685,316 UART:
2,685,370 UART: [state] CFI Enabled
2,696,239 UART: [fht] FMC Alias Private Key: 7
2,805,262 UART: [art] Extend RT PCRs Done
2,805,690 UART: [art] Lock RT PCRs Done
2,807,164 UART: [art] Populate DV Done
2,815,341 UART: [fht] FMC Alias Private Key: 7
2,816,387 UART: [art] Derive CDI
2,816,667 UART: [art] Store in in slot 0x4
2,902,482 UART: [art] Derive Key Pair
2,902,842 UART: [art] Store priv key in slot 0x5
2,915,998 UART: [art] Derive Key Pair - Done
2,930,796 UART: [art] Signing Cert with AUTHO
2,931,276 UART: RITY.KEYID = 7
2,946,446 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,211 UART: [art] PUB.X = 40107EF6EDF578C868172F51F01A49DA96B997FCBE777B9FE08309723C90FF305836C30827AACC2CF11173719CAE3BB9
2,953,981 UART: [art] PUB.Y = 3987F0ABE6402C2BC2F4C0F143C267D97D5B5AD60BE35A6B3307220C0076472C7E34F8F97F470DCE8B46C757743DC837
2,960,901 UART: [art] SIG.R = BECED31200EB853F3F80FAFEDC2C46FE62FD4D1F9F7D0CF1D2BA8B52ECF73CB0317AF34E1C1D35DF06474A5320618CE3
2,967,671 UART: [art] SIG.S = E653F1B1B5742D430FB685D57205135E1B16093E023D3D83BF56F91876735B2F8F8B587283679FB7A0D05DC315D9BFCB
2,991,864 UART: Caliptra RT
2,992,117 UART: [state] CFI Enabled
3,099,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,633 UART: [rt]cmd =0x464d4352, len=4
3,137,146 >>> mbox cmd response data (524 bytes)
3,137,147 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,166,560 UART: [rt]cmd =0x43455252, len=4
3,177,477 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
893,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,390 UART: [kat] ++
897,542 UART: [kat] sha1
901,652 UART: [kat] SHA2-256
903,592 UART: [kat] SHA2-384
906,321 UART: [kat] SHA2-512-ACC
908,222 UART: [kat] ECC-384
917,607 UART: [kat] HMAC-384Kdf
922,101 UART: [kat] LMS
1,170,429 UART: [kat] --
1,171,312 UART: [cold-reset] ++
1,171,736 UART: [fht] FHT @ 0x50003400
1,174,281 UART: [idev] ++
1,174,449 UART: [idev] CDI.KEYID = 6
1,174,809 UART: [idev] SUBJECT.KEYID = 7
1,175,233 UART: [idev] UDS.KEYID = 0
1,175,578 ready_for_fw is high
1,175,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,627 UART: [idev] Erasing UDS.KEYID = 0
1,200,706 UART: [idev] Sha1 KeyId Algorithm
1,209,378 UART: [idev] --
1,210,434 UART: [ldev] ++
1,210,602 UART: [ldev] CDI.KEYID = 6
1,210,965 UART: [ldev] SUBJECT.KEYID = 5
1,211,391 UART: [ldev] AUTHORITY.KEYID = 7
1,211,854 UART: [ldev] FE.KEYID = 1
1,216,900 UART: [ldev] Erasing FE.KEYID = 1
1,243,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,748 UART: [ldev] --
1,283,083 UART: [fwproc] Wait for Commands...
1,283,887 UART: [fwproc] Recv command 0x46574c44
1,284,615 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,701 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,005 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,628 >>> mbox cmd response: success
2,772,628 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,773,746 UART: [afmc] ++
2,773,914 UART: [afmc] CDI.KEYID = 6
2,774,276 UART: [afmc] SUBJECT.KEYID = 7
2,774,701 UART: [afmc] AUTHORITY.KEYID = 5
2,810,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,741 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,354 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,073 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,779 UART: [afmc] --
2,853,709 UART: [cold-reset] --
2,854,595 UART: [state] Locking Datavault
2,855,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,540 UART: [state] Locking ICCM
2,857,086 UART: [exit] Launching FMC @ 0x40000130
2,862,415 UART:
2,862,431 UART: Running Caliptra FMC ...
2,862,839 UART:
2,862,982 UART: [state] CFI Enabled
2,873,489 UART: [fht] FMC Alias Private Key: 7
2,981,704 UART: [art] Extend RT PCRs Done
2,982,132 UART: [art] Lock RT PCRs Done
2,983,774 UART: [art] Populate DV Done
2,992,121 UART: [fht] FMC Alias Private Key: 7
2,993,279 UART: [art] Derive CDI
2,993,559 UART: [art] Store in in slot 0x4
3,079,254 UART: [art] Derive Key Pair
3,079,614 UART: [art] Store priv key in slot 0x5
3,092,638 UART: [art] Derive Key Pair - Done
3,107,257 UART: [art] Signing Cert with AUTHO
3,107,737 UART: RITY.KEYID = 7
3,122,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,606 UART: [art] PUB.X = FE65617601A839D886B333550F08AF9A2D88453F9C23EA811192E423C8349C018B8B01CB50BED0B4B9927707A344997A
3,130,352 UART: [art] PUB.Y = 241C33640190E3B67167199183A1E896F3A0E8B32315805D1AD4637BAFC0574950BAD02BA8EF46F53BA59591B8D1E03B
3,137,297 UART: [art] SIG.R = 336407DA427C46ABA17636232EA138EC0C17E72D847B9BC5A707CBC6721316E9ED0FB7DED5EC63132D2F4A7AE2EAF16D
3,144,071 UART: [art] SIG.S = D27396E6EE7E39D7D51B101003DF4D34F5C10893D7521AB2C96A20D422AFCE2D22EDC9A8ECC941A43E024868179C00B3
3,168,011 UART: Caliptra RT
3,168,356 UART: [state] CFI Enabled
3,275,991 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,887 UART: [rt]cmd =0x464d4352, len=4
3,313,882 >>> mbox cmd response data (524 bytes)
3,313,883 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,124 UART: [rt]cmd =0x43455252, len=4
3,353,824 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 ready_for_fw is high
1,060,020 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,219 >>> mbox cmd response: success
2,624,219 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,686,069 UART:
2,686,085 UART: Running Caliptra FMC ...
2,686,493 UART:
2,686,636 UART: [state] CFI Enabled
2,697,045 UART: [fht] FMC Alias Private Key: 7
2,804,956 UART: [art] Extend RT PCRs Done
2,805,384 UART: [art] Lock RT PCRs Done
2,807,084 UART: [art] Populate DV Done
2,815,343 UART: [fht] FMC Alias Private Key: 7
2,816,369 UART: [art] Derive CDI
2,816,649 UART: [art] Store in in slot 0x4
2,902,368 UART: [art] Derive Key Pair
2,902,728 UART: [art] Store priv key in slot 0x5
2,916,010 UART: [art] Derive Key Pair - Done
2,931,119 UART: [art] Signing Cert with AUTHO
2,931,599 UART: RITY.KEYID = 7
2,947,273 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,038 UART: [art] PUB.X = 628C4716F8DB81C395BC05689AEFD57FB023B742D733D10D53DE5AAEAF88ED76981593BE7CE46385770D8CA4D169D2C1
2,954,809 UART: [art] PUB.Y = 13EC41AC7D4C72EDF678BA46799D5E09A7EDA44AB0671691A8D95BD46D197DBBE41D4D5803B8E5F08BDAE8EDCDF6E0A3
2,961,779 UART: [art] SIG.R = 984EADDFCF8DBF768D1EEB1B05618C2504C5E5F3B2B0A53A5704760DD6435FD1738A1BF4341550451468DD1BC587F043
2,968,545 UART: [art] SIG.S = 4C2E4048D280A2805FA51B2001B72CB806882E1807997AADE6AA7E4BB1CA27CEA3DD5BEA9DE9FF18D4A29F9188CEF673
2,992,889 UART: Caliptra RT
2,993,234 UART: [state] CFI Enabled
3,101,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,725 UART: [rt]cmd =0x464d4352, len=4
3,138,622 >>> mbox cmd response data (524 bytes)
3,138,623 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,168,104 UART: [rt]cmd =0x43455252, len=4
3,178,766 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
890,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,041 UART: [kat] ++
895,193 UART: [kat] sha1
899,607 UART: [kat] SHA2-256
901,547 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,174,375 ready_for_fw is high
1,174,375 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,198,481 UART: [idev] Sha1 KeyId Algorithm
1,207,279 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,214,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,038 UART: [ldev] --
1,280,416 UART: [fwproc] Wait for Commands...
1,281,089 UART: [fwproc] Recv command 0x46574c44
1,281,822 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,448 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,309 >>> mbox cmd response: success
2,770,309 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,771,334 UART: [afmc] ++
2,771,502 UART: [afmc] CDI.KEYID = 6
2,771,865 UART: [afmc] SUBJECT.KEYID = 7
2,772,291 UART: [afmc] AUTHORITY.KEYID = 5
2,807,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,801 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,413 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,063 UART: [afmc] --
2,851,101 UART: [cold-reset] --
2,851,947 UART: [state] Locking Datavault
2,853,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,738 UART: [state] Locking ICCM
2,854,372 UART: [exit] Launching FMC @ 0x40000130
2,859,701 UART:
2,859,717 UART: Running Caliptra FMC ...
2,860,125 UART:
2,860,179 UART: [state] CFI Enabled
2,870,348 UART: [fht] FMC Alias Private Key: 7
2,978,695 UART: [art] Extend RT PCRs Done
2,979,123 UART: [art] Lock RT PCRs Done
2,981,115 UART: [art] Populate DV Done
2,989,400 UART: [fht] FMC Alias Private Key: 7
2,990,504 UART: [art] Derive CDI
2,990,784 UART: [art] Store in in slot 0x4
3,076,221 UART: [art] Derive Key Pair
3,076,581 UART: [art] Store priv key in slot 0x5
3,090,065 UART: [art] Derive Key Pair - Done
3,104,616 UART: [art] Signing Cert with AUTHO
3,105,096 UART: RITY.KEYID = 7
3,120,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,073 UART: [art] PUB.X = 1B81706DEF8E20A80D227E24FC32280F4B84E31B05E55E444DAE025CCBC01C8376294CBC8FDAFEF9CFB8B73B959C34D5
3,127,849 UART: [art] PUB.Y = CD75F8A58BBD512B0E447128AF98032EDAE4FC9FBBEF775ABF06DB275A70A6DA1F6AD7CDBD4BE16CF4DFE55D5250EB76
3,134,824 UART: [art] SIG.R = 68A1F98814F18C14925D13E1AA8730447D124CC23B04298350197B002B57EE7D169296EF4FD73A48A47B39EDFE5B28C8
3,141,567 UART: [art] SIG.S = 409FBE5A9614FDD432B19CA3E809DE2929D0AA19D404B7E830F04A71FE7AE085B9EAC6A5C7CBA2B2A8E11A8ADFC9EBFB
3,165,450 UART: Caliptra RT
3,165,703 UART: [state] CFI Enabled
3,273,764 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,938 UART: [rt]cmd =0x464d4352, len=4
3,310,975 >>> mbox cmd response data (524 bytes)
3,310,976 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,455 UART: [rt]cmd =0x43455252, len=4
3,351,377 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,246 ready_for_fw is high
1,055,246 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,419 >>> mbox cmd response: success
2,620,419 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,681,963 UART:
2,681,979 UART: Running Caliptra FMC ...
2,682,387 UART:
2,682,441 UART: [state] CFI Enabled
2,693,098 UART: [fht] FMC Alias Private Key: 7
2,800,421 UART: [art] Extend RT PCRs Done
2,800,849 UART: [art] Lock RT PCRs Done
2,802,469 UART: [art] Populate DV Done
2,810,554 UART: [fht] FMC Alias Private Key: 7
2,811,702 UART: [art] Derive CDI
2,811,982 UART: [art] Store in in slot 0x4
2,897,615 UART: [art] Derive Key Pair
2,897,975 UART: [art] Store priv key in slot 0x5
2,911,225 UART: [art] Derive Key Pair - Done
2,926,076 UART: [art] Signing Cert with AUTHO
2,926,556 UART: RITY.KEYID = 7
2,941,950 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,715 UART: [art] PUB.X = BCB545D54D5B58A2269DE556CDF526C75395CD3EB4E862ACC768A88B8B8BDA311F63C9086EDFF82571C0798485332852
2,949,488 UART: [art] PUB.Y = 3964CE02B8488366F93589296B454BDF0C24D1C13B0A2D2D6C407DA763D4F8CC978B8C89FB420639C24F8FAFBD53402D
2,956,432 UART: [art] SIG.R = 0D779A1D3BC8BBDE301933D08F288D1CC2C2155B2CFCAC407766C8B46485D94F8A1A98CA028359091B71A5C3E6743F8B
2,963,201 UART: [art] SIG.S = 623FEF5B1BED14D12CC26B55FB6BDCC2A6465FC1F07EA08355EF3B1259EB1D070C7B72ED6675E75ABE3275A8F065DF74
2,986,892 UART: Caliptra RT
2,987,145 UART: [state] CFI Enabled
3,095,514 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,786 UART: [rt]cmd =0x464d4352, len=4
3,132,853 >>> mbox cmd response data (524 bytes)
3,132,854 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,281 UART: [rt]cmd =0x43455252, len=4
3,173,023 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,233 UART: [kat] LMS
1,169,545 UART: [kat] --
1,170,624 UART: [cold-reset] ++
1,171,166 UART: [fht] FHT @ 0x50003400
1,174,028 UART: [idev] ++
1,174,196 UART: [idev] CDI.KEYID = 6
1,174,557 UART: [idev] SUBJECT.KEYID = 7
1,174,982 UART: [idev] UDS.KEYID = 0
1,175,328 ready_for_fw is high
1,175,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,880 UART: [idev] Erasing UDS.KEYID = 0
1,199,862 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,491 UART: [ldev] Erasing FE.KEYID = 1
1,243,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,507 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,883 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,442 >>> mbox cmd response: success
2,773,442 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,774,475 UART: [afmc] ++
2,774,643 UART: [afmc] CDI.KEYID = 6
2,775,006 UART: [afmc] SUBJECT.KEYID = 7
2,775,432 UART: [afmc] AUTHORITY.KEYID = 5
2,810,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,908 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,627 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,464 UART: [afmc] --
2,854,436 UART: [cold-reset] --
2,855,516 UART: [state] Locking Datavault
2,856,801 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,405 UART: [state] Locking ICCM
2,858,009 UART: [exit] Launching FMC @ 0x40000130
2,863,338 UART:
2,863,354 UART: Running Caliptra FMC ...
2,863,762 UART:
2,863,905 UART: [state] CFI Enabled
2,874,548 UART: [fht] FMC Alias Private Key: 7
2,982,555 UART: [art] Extend RT PCRs Done
2,982,983 UART: [art] Lock RT PCRs Done
2,984,313 UART: [art] Populate DV Done
2,992,478 UART: [fht] FMC Alias Private Key: 7
2,993,514 UART: [art] Derive CDI
2,993,794 UART: [art] Store in in slot 0x4
3,079,593 UART: [art] Derive Key Pair
3,079,953 UART: [art] Store priv key in slot 0x5
3,093,651 UART: [art] Derive Key Pair - Done
3,108,573 UART: [art] Signing Cert with AUTHO
3,109,053 UART: RITY.KEYID = 7
3,123,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,532 UART: [art] PUB.X = 39BD492AC8B6EA8DAA785ED45D3D96E79DD715C0EC4561B7B42901DD002BB21421009280506715850DD165235702CF53
3,131,247 UART: [art] PUB.Y = CF64817261856BEC0480A31F696EEEA79B700FF0FAFDCC3ACDEAF41468405D832FABD9CEF9779EB8E0FB060356BA46F4
3,138,207 UART: [art] SIG.R = 9CC01F326DD9FBE8A518E2061BF53212841B2A24333ACD1DC336B8276B2FBEE7C4D7678CC0C0B75541FF0A32F9A91B2C
3,144,985 UART: [art] SIG.S = 264EAD2987D7F8E13B7214A96433275C5391FC5CC07F3C6D95DE6E5F007AD7B5C6AC4C59DA66D21E363BA89F492D2748
3,168,612 UART: Caliptra RT
3,168,957 UART: [state] CFI Enabled
3,276,844 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,376 UART: [rt]cmd =0x464d4352, len=4
3,314,391 >>> mbox cmd response data (524 bytes)
3,314,392 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,777 UART: [rt]cmd =0x43455252, len=4
3,354,593 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,673 ready_for_fw is high
1,056,673 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,310 >>> mbox cmd response: success
2,622,310 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,684,786 UART:
2,684,802 UART: Running Caliptra FMC ...
2,685,210 UART:
2,685,353 UART: [state] CFI Enabled
2,695,700 UART: [fht] FMC Alias Private Key: 7
2,804,037 UART: [art] Extend RT PCRs Done
2,804,465 UART: [art] Lock RT PCRs Done
2,806,043 UART: [art] Populate DV Done
2,814,288 UART: [fht] FMC Alias Private Key: 7
2,815,326 UART: [art] Derive CDI
2,815,606 UART: [art] Store in in slot 0x4
2,901,321 UART: [art] Derive Key Pair
2,901,681 UART: [art] Store priv key in slot 0x5
2,914,995 UART: [art] Derive Key Pair - Done
2,929,711 UART: [art] Signing Cert with AUTHO
2,930,191 UART: RITY.KEYID = 7
2,945,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,064 UART: [art] PUB.X = 8A18BC98B373E83539EFF355F76D8F62161C32BC3396BBDA92A5F0A310D2066DBBB349E241CACC63DAA5CB68C76A68DD
2,952,849 UART: [art] PUB.Y = BB5D1DD7253484410642C01ABC8EEFFF61A5FE95D1088406728BD12704FB2B21068A694B95311C96FE1C4E89FF42BDDF
2,959,794 UART: [art] SIG.R = 201EEA48FD9AC6C5C4655D2AE98592BB40FF8D4104E950151F95B1621B44F435F2052ABBE62B5294582AB4F0C714CB6D
2,966,566 UART: [art] SIG.S = 6527896C7CF8615D165E1B6EAC5A7897BDC10F1D81F39153FDBAB3FFE32AA8E142C7879004B27004DAC028192FE7E08F
2,990,594 UART: Caliptra RT
2,990,939 UART: [state] CFI Enabled
3,098,550 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,196 UART: [rt]cmd =0x464d4352, len=4
3,136,083 >>> mbox cmd response data (524 bytes)
3,136,084 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,165,221 UART: [rt]cmd =0x43455252, len=4
3,176,139 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,099 UART:
192,462 UART: Running Caliptra ROM ...
193,639 UART:
193,786 UART: [state] CFI Enabled
262,327 UART: [state] LifecycleState = Unprovisioned
264,325 UART: [state] DebugLocked = No
266,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,131 UART: [kat] SHA2-256
440,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,358 UART: [kat] ++
451,842 UART: [kat] sha1
463,136 UART: [kat] SHA2-256
466,011 UART: [kat] SHA2-384
472,901 UART: [kat] SHA2-512-ACC
475,283 UART: [kat] ECC-384
2,767,823 UART: [kat] HMAC-384Kdf
2,799,531 UART: [kat] LMS
3,989,850 UART: [kat] --
3,995,439 UART: [cold-reset] ++
3,997,798 UART: [fht] Storing FHT @ 0x50003400
4,010,474 UART: [idev] ++
4,011,056 UART: [idev] CDI.KEYID = 6
4,011,978 UART: [idev] SUBJECT.KEYID = 7
4,013,220 UART: [idev] UDS.KEYID = 0
4,032,297 UART: [idev] Erasing UDS.KEYID = 0
7,343,005 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,437 UART: [idev] CSR upload requested
7,369,616 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,675,427 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,690,108 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,704,665 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,719,059 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,741,969 UART: [idev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
9,865,930 UART: [idev] CSR uploaded
9,879,169 ready_for_fw is high
9,879,464 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,022,748 UART: [idev] --
10,023,440 UART: [ldev] ++
10,023,932 UART: [ldev] CDI.KEYID = 6
10,024,859 UART: [ldev] SUBJECT.KEYID = 5
10,025,872 UART: [ldev] AUTHORITY.KEYID = 7
10,026,954 UART: [ldev] FE.KEYID = 1
10,027,811 UART: [ldev] Erasing FE.KEYID = 1
13,248,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,541,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,556,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,571,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,585,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,603,637 UART: [ldev] --
15,607,709 UART: [fwproc] Waiting for Commands...
15,610,549 UART: [fwproc] Received command 0x46574c44
15,612,725 UART: [fwproc] Received Image of size 113844 bytes
19,660,632 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,738,877 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,807,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,123,445 >>> mbox cmd response: success
20,123,939 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,127,126 UART: [afmc] ++
20,127,709 UART: [afmc] CDI.KEYID = 6
20,128,611 UART: [afmc] SUBJECT.KEYID = 7
20,129,878 UART: [afmc] AUTHORITY.KEYID = 5
23,500,236 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,801,185 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,803,489 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,817,853 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,832,699 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,847,134 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,868,133 UART: [afmc] --
25,872,208 UART: [cold-reset] --
25,876,676 UART: [state] Locking Datavault
25,882,019 UART: [state] Locking PCR0, PCR1 and PCR31
25,883,761 UART: [state] Locking ICCM
25,885,308 UART: [exit] Launching FMC @ 0x40000130
25,893,744 UART:
25,893,967 UART: Running Caliptra FMC ...
25,895,058 UART:
25,895,212 UART: [state] CFI Enabled
25,961,815 UART: [fht] FMC Alias Private Key: 7
28,300,523 UART: [art] Extend RT PCRs Done
28,301,744 UART: [art] Lock RT PCRs Done
28,303,472 UART: [art] Populate DV Done
28,308,821 UART: [fht] FMC Alias Private Key: 7
28,310,499 UART: [art] Derive CDI
28,311,315 UART: [art] Store in in slot 0x4
28,370,435 UART: [art] Derive Key Pair
28,371,438 UART: [art] Store priv key in slot 0x5
31,664,143 UART: [art] Derive Key Pair - Done
31,677,183 UART: [art] Signing Cert with AUTHO
31,678,513 UART: RITY.KEYID = 7
33,966,436 UART: [art] Erasing AUTHORITY.KEYID = 7
33,967,986 UART: [art] PUB.X = 65C9B86DE423CB8C1AE1DAF46398B354BD0AF667A39A43CA18200BF66766F9951CC9FEB8B361143EBA229CFA7C1B15AB
33,975,173 UART: [art] PUB.Y = 8FD9AACC8805D96381746AFDFE348D8387CB01B76F1BB220F6CB94A8A14A1F5D46989398C868367461DBC4B4C55CB7B2
33,982,453 UART: [art] SIG.R = 8843F9629BC4A9AFA9D8206CF586E2B419C231205EBE7095472151DBD092DF9D83C646E5580DD1FE2F8B6E8082D3CFAD
33,989,883 UART: [art] SIG.S = B33597F237529BB38396D185ADB078FBBCD051A135003DC784356F104AA486290A41AE3EB90C3A79E67E1A56D2CEFCB1
35,294,959 UART: Caliptra RT
35,295,679 UART: [state] CFI Enabled
35,456,297 UART: [rt] RT listening for mailbox commands...
35,487,767 UART: [rt]cmd =0x49444352, len=4
35,489,482 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
9,475,677 ready_for_fw is high
9,476,201 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,202,113 >>> mbox cmd response: success
20,202,689 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,901,774 UART:
25,902,174 UART: Running Caliptra FMC ...
25,903,282 UART:
25,903,429 UART: [state] CFI Enabled
25,974,604 UART: [fht] FMC Alias Private Key: 7
28,312,196 UART: [art] Extend RT PCRs Done
28,313,424 UART: [art] Lock RT PCRs Done
28,315,290 UART: [art] Populate DV Done
28,320,450 UART: [fht] FMC Alias Private Key: 7
28,322,147 UART: [art] Derive CDI
28,322,952 UART: [art] Store in in slot 0x4
28,383,314 UART: [art] Derive Key Pair
28,384,350 UART: [art] Store priv key in slot 0x5
31,677,423 UART: [art] Derive Key Pair - Done
31,690,262 UART: [art] Signing Cert with AUTHO
31,691,563 UART: RITY.KEYID = 7
33,978,628 UART: [art] Erasing AUTHORITY.KEYID = 7
33,980,132 UART: [art] PUB.X = D382717D998EE8D8FF5A5590493B88B835F153828C734F0413D6ADCA6B39902DA8724F55FF01284866766FC52082ACB6
33,987,330 UART: [art] PUB.Y = BA5AD3DCE51D266DF420CA4F1BC50BAD3EDAF97E57CFC8F9913B4BB34C735F3F64FB43EC4E24F8C3C9F3548C03FDDFF1
33,994,619 UART: [art] SIG.R = 5C7884B7E6DF1A94DF75E0698DAA90F54635FEC11E93AF539CDD6DE35187467E763A3134716ED9544B42B153434497F8
34,002,004 UART: [art] SIG.S = A85BC63382600DDD64800503DFEA184362D50BF867A3885D3002397BEDC06AA2871DD61C5B246723618B5D5A75C48139
35,307,181 UART: Caliptra RT
35,307,896 UART: [state] CFI Enabled
35,467,594 UART: [rt] RT listening for mailbox commands...
35,499,096 UART: [rt]cmd =0x49444352, len=4
35,501,169 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,387 UART:
192,761 UART: Running Caliptra ROM ...
193,931 UART:
603,671 UART: [state] CFI Enabled
618,750 UART: [state] LifecycleState = Unprovisioned
620,623 UART: [state] DebugLocked = No
623,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,707 UART: [kat] SHA2-256
797,508 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,020 UART: [kat] ++
808,470 UART: [kat] sha1
819,729 UART: [kat] SHA2-256
822,392 UART: [kat] SHA2-384
828,665 UART: [kat] SHA2-512-ACC
831,035 UART: [kat] ECC-384
3,114,582 UART: [kat] HMAC-384Kdf
3,126,533 UART: [kat] LMS
4,316,618 UART: [kat] --
4,319,784 UART: [cold-reset] ++
4,320,865 UART: [fht] Storing FHT @ 0x50003400
4,334,065 UART: [idev] ++
4,334,630 UART: [idev] CDI.KEYID = 6
4,335,586 UART: [idev] SUBJECT.KEYID = 7
4,336,832 UART: [idev] UDS.KEYID = 0
4,353,460 UART: [idev] Erasing UDS.KEYID = 0
7,623,405 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,797 UART: [idev] CSR upload requested
7,650,980 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,944,682 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,959,271 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,973,900 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,988,236 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,011,186 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,135,130 UART: [idev] CSR uploaded
10,148,375 ready_for_fw is high
10,148,676 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,291,720 UART: [idev] --
10,292,399 UART: [ldev] ++
10,292,897 UART: [ldev] CDI.KEYID = 6
10,293,774 UART: [ldev] SUBJECT.KEYID = 5
10,294,838 UART: [ldev] AUTHORITY.KEYID = 7
10,295,966 UART: [ldev] FE.KEYID = 1
10,296,830 UART: [ldev] Erasing FE.KEYID = 1
13,460,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,751,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,766,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,781,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,795,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,814,834 UART: [ldev] --
15,818,763 UART: [fwproc] Waiting for Commands...
15,821,103 UART: [fwproc] Received command 0x46574c44
15,823,285 UART: [fwproc] Received Image of size 113844 bytes
19,881,974 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,953,022 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,021,895 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,337,877 >>> mbox cmd response: success
20,338,376 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,342,853 UART: [afmc] ++
20,343,442 UART: [afmc] CDI.KEYID = 6
20,344,324 UART: [afmc] SUBJECT.KEYID = 7
20,345,598 UART: [afmc] AUTHORITY.KEYID = 5
23,662,587 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,959,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,961,666 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,976,075 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,990,915 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
26,005,371 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
26,026,617 UART: [afmc] --
26,029,680 UART: [cold-reset] --
26,034,571 UART: [state] Locking Datavault
26,039,401 UART: [state] Locking PCR0, PCR1 and PCR31
26,041,195 UART: [state] Locking ICCM
26,043,364 UART: [exit] Launching FMC @ 0x40000130
26,051,765 UART:
26,052,010 UART: Running Caliptra FMC ...
26,053,124 UART:
26,053,285 UART: [state] CFI Enabled
26,061,689 UART: [fht] FMC Alias Private Key: 7
28,392,474 UART: [art] Extend RT PCRs Done
28,393,683 UART: [art] Lock RT PCRs Done
28,395,469 UART: [art] Populate DV Done
28,400,884 UART: [fht] FMC Alias Private Key: 7
28,402,438 UART: [art] Derive CDI
28,403,255 UART: [art] Store in in slot 0x4
28,445,629 UART: [art] Derive Key Pair
28,446,657 UART: [art] Store priv key in slot 0x5
31,688,064 UART: [art] Derive Key Pair - Done
31,701,218 UART: [art] Signing Cert with AUTHO
31,702,519 UART: RITY.KEYID = 7
33,982,023 UART: [art] Erasing AUTHORITY.KEYID = 7
33,983,560 UART: [art] PUB.X = C05ECE7020F981CDA2A7E6ED4D349100DD0CDEEB144C3706709B948080A7F2F5FFD27364BE272BFAA2C719AE57FA3D5E
33,990,758 UART: [art] PUB.Y = C17A5AE2E0024066A8C382CE8035544F21532BEE5F6B462752052327E5CEA21CE77E56068352ACA5183E561A01E30071
33,998,002 UART: [art] SIG.R = 8ECA374A95AA9692A9D1A3DAAAFFBCBEBB40FC8035DEC11EC63392EECFD24E433E59CD85F9AC522226E05BC0A20C3C5A
34,005,399 UART: [art] SIG.S = 2672BEFF7F86966A57F58B186E9601B9519EBDACBCAA1224ECBEF303E94B450B63FC4CA211E8A3E043D42D9B212AE12D
35,310,797 UART: Caliptra RT
35,311,511 UART: [state] CFI Enabled
35,428,948 UART: [rt] RT listening for mailbox commands...
35,460,363 UART: [rt]cmd =0x49444352, len=4
35,462,367 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
9,737,852 ready_for_fw is high
9,738,516 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,363,373 >>> mbox cmd response: success
20,363,966 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,006,252 UART:
26,006,654 UART: Running Caliptra FMC ...
26,007,803 UART:
26,007,972 UART: [state] CFI Enabled
26,016,538 UART: [fht] FMC Alias Private Key: 7
28,347,720 UART: [art] Extend RT PCRs Done
28,348,951 UART: [art] Lock RT PCRs Done
28,350,750 UART: [art] Populate DV Done
28,356,440 UART: [fht] FMC Alias Private Key: 7
28,357,978 UART: [art] Derive CDI
28,358,795 UART: [art] Store in in slot 0x4
28,401,076 UART: [art] Derive Key Pair
28,402,086 UART: [art] Store priv key in slot 0x5
31,644,322 UART: [art] Derive Key Pair - Done
31,657,388 UART: [art] Signing Cert with AUTHO
31,658,689 UART: RITY.KEYID = 7
33,938,237 UART: [art] Erasing AUTHORITY.KEYID = 7
33,939,749 UART: [art] PUB.X = 0C5CE7396B95C41D0B79803C9F9853A5E2ED80BF0AECF8886B9BA1179383CC50422FAE2683F636463B055F3C54725735
33,946,958 UART: [art] PUB.Y = 9B3E217A24B0645345FFD85078F9EC53DD32D780FCBD949DDA816426281BC30007E466D96F53DDDE75E651831DA8B934
33,954,204 UART: [art] SIG.R = 4D75FDBC22CF080D30AEBC322F73D548843A6892B737FF21FCFCD81380B5E30FC1F6C13DF365C470A23FE2B06D743D3B
33,961,596 UART: [art] SIG.S = 2D3FCC2F5143011F1E7D4C2EFC191A81D4440D4CC0C452605728AD4E8340AF6B481F5195176935043093242847900E03
35,266,791 UART: Caliptra RT
35,267,507 UART: [state] CFI Enabled
35,384,701 UART: [rt] RT listening for mailbox commands...
35,416,010 UART: [rt]cmd =0x49444352, len=4
35,417,626 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
193,051 UART:
193,443 UART: Running Caliptra ROM ...
194,636 UART:
194,797 UART: [state] CFI Enabled
262,107 UART: [state] LifecycleState = Unprovisioned
263,948 UART: [state] DebugLocked = No
265,347 UART: [state] WD Timer not started. Device not locked for debugging
269,604 UART: [kat] SHA2-256
448,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,271 UART: [kat] ++
460,720 UART: [kat] sha1
471,803 UART: [kat] SHA2-256
474,808 UART: [kat] SHA2-384
480,794 UART: [kat] SHA2-512-ACC
483,753 UART: [kat] ECC-384
2,947,198 UART: [kat] HMAC-384Kdf
2,972,311 UART: [kat] LMS
3,501,787 UART: [kat] --
3,508,476 UART: [cold-reset] ++
3,509,702 UART: [fht] FHT @ 0x50003400
3,520,679 UART: [idev] ++
3,521,242 UART: [idev] CDI.KEYID = 6
3,522,166 UART: [idev] SUBJECT.KEYID = 7
3,523,538 UART: [idev] UDS.KEYID = 0
3,543,838 UART: [idev] Erasing UDS.KEYID = 0
6,027,408 UART: [idev] Sha1 KeyId Algorithm
6,048,453 UART: [idev] CSR upload begun
6,053,176 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,780,838 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,796,951 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,812,873 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,828,709 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,852,563 UART: [idev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
7,994,702 UART: [idev] CSR uploaded
8,010,773 ready_for_fw is high
8,011,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,154,741 UART: [idev] --
8,155,380 UART: [ldev] ++
8,155,878 UART: [ldev] CDI.KEYID = 6
8,156,755 UART: [ldev] SUBJECT.KEYID = 5
8,157,868 UART: [ldev] AUTHORITY.KEYID = 7
8,158,967 UART: [ldev] FE.KEYID = 1
8,159,898 UART: [ldev] Erasing FE.KEYID = 1
10,565,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,303,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,320,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,335,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,351,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,372,465 UART: [ldev] --
12,376,939 UART: [fwproc] Wait for Commands...
12,380,072 UART: [fwproc] Recv command 0x46574c44
12,382,120 UART: [fwproc] Recv'd Img size: 114168 bytes
15,778,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,862,314 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,931,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,248,373 >>> mbox cmd response: success
16,248,967 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,253,513 UART: [afmc] ++
16,254,092 UART: [afmc] CDI.KEYID = 6
16,255,008 UART: [afmc] SUBJECT.KEYID = 7
16,256,230 UART: [afmc] AUTHORITY.KEYID = 5
18,793,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,517,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,519,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,535,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,551,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,567,240 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,590,443 UART: [afmc] --
20,594,412 UART: [cold-reset] --
20,597,894 UART: [state] Locking Datavault
20,603,580 UART: [state] Locking PCR0, PCR1 and PCR31
20,605,226 UART: [state] Locking ICCM
20,606,893 UART: [exit] Launching FMC @ 0x40000130
20,615,343 UART:
20,615,577 UART: Running Caliptra FMC ...
20,616,628 UART:
20,616,780 UART: [state] CFI Enabled
20,675,741 UART: [fht] FMC Alias Private Key: 7
22,439,177 UART: [art] Extend RT PCRs Done
22,440,386 UART: [art] Lock RT PCRs Done
22,442,354 UART: [art] Populate DV Done
22,447,843 UART: [fht] FMC Alias Private Key: 7
22,449,384 UART: [art] Derive CDI
22,450,122 UART: [art] Store in in slot 0x4
22,507,889 UART: [art] Derive Key Pair
22,508,923 UART: [art] Store priv key in slot 0x5
24,972,006 UART: [art] Derive Key Pair - Done
24,985,292 UART: [art] Signing Cert with AUTHO
24,986,603 UART: RITY.KEYID = 7
26,697,420 UART: [art] Erasing AUTHORITY.KEYID = 7
26,698,898 UART: [art] PUB.X = 82CBE0160E5F77052A4F91F3C8E48DB7ADFCE7E112888022395A36A7CEFF8F403FB914B7C745BBB45AFDD481B82401DC
26,706,244 UART: [art] PUB.Y = 230E0C888ED8E065BFC0DFE107CF73C754888E44B0131C17FAEA6B212934CCFC0A78AE329A7A5139AC6F96999A5CBEF6
26,713,488 UART: [art] SIG.R = B36D77E99D3431963DBAC29ACE1FAD384E793DEEBEC008432127CC9D53BBC7F02120FD9E0CE8FBC460AFC1C0019ECDAF
26,720,896 UART: [art] SIG.S = 3396418E86262F0806102F2962885AE24FA824CC495D5F352F62D23F2979EEAA6770DC6D6FE28DF5A4AE5C23C1F49476
27,699,988 UART: Caliptra RT
27,700,695 UART: [state] CFI Enabled
27,865,067 UART: [rt] RT listening for mailbox commands...
27,896,542 UART: [rt]cmd =0x49444352, len=4
27,904,011 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
7,662,918 ready_for_fw is high
7,663,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,806,062 >>> mbox cmd response: success
15,806,777 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,090,552 UART:
20,090,962 UART: Running Caliptra FMC ...
20,092,113 UART:
20,092,285 UART: [state] CFI Enabled
20,163,497 UART: [fht] FMC Alias Private Key: 7
21,927,048 UART: [art] Extend RT PCRs Done
21,928,270 UART: [art] Lock RT PCRs Done
21,930,328 UART: [art] Populate DV Done
21,935,841 UART: [fht] FMC Alias Private Key: 7
21,937,411 UART: [art] Derive CDI
21,938,233 UART: [art] Store in in slot 0x4
21,996,598 UART: [art] Derive Key Pair
21,997,628 UART: [art] Store priv key in slot 0x5
24,460,832 UART: [art] Derive Key Pair - Done
24,473,717 UART: [art] Signing Cert with AUTHO
24,475,022 UART: RITY.KEYID = 7
26,186,414 UART: [art] Erasing AUTHORITY.KEYID = 7
26,187,920 UART: [art] PUB.X = 47FC0FBEAE65B0C90C2ADAF426BF9F2CE57D34DBC36547376F9376D9F5EE785D68057F4072182C042991D38A16FD5D9D
26,195,222 UART: [art] PUB.Y = A86FF06C49A225249DAF148AB556A13FB4A03B8A4B85932C089782CCBC11C09D4136837BF20BFAE3D7FDC87D480019F9
26,202,474 UART: [art] SIG.R = A577F0E89F2C6A333CC338915398D1244C4A942C35FB22A21F1B1601E051B3D3DDC6081474E0AA55675450EE4A0A9B47
26,209,861 UART: [art] SIG.S = A01BD90817BF90E0333A8F8998E1A4E1026D922F86EDA5374A5942C24107FDA94CD062AC054C70179BC0DDC2B5590BB0
27,188,813 UART: Caliptra RT
27,189,499 UART: [state] CFI Enabled
27,352,814 UART: [rt] RT listening for mailbox commands...
27,384,021 UART: [rt]cmd =0x49444352, len=4
27,391,270 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
192,986 UART:
193,354 UART: Running Caliptra ROM ...
194,478 UART:
603,931 UART: [state] CFI Enabled
616,811 UART: [state] LifecycleState = Unprovisioned
618,705 UART: [state] DebugLocked = No
620,520 UART: [state] WD Timer not started. Device not locked for debugging
623,933 UART: [kat] SHA2-256
803,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,615 UART: [kat] ++
815,068 UART: [kat] sha1
827,010 UART: [kat] SHA2-256
830,018 UART: [kat] SHA2-384
836,159 UART: [kat] SHA2-512-ACC
839,115 UART: [kat] ECC-384
3,278,576 UART: [kat] HMAC-384Kdf
3,291,181 UART: [kat] LMS
3,820,694 UART: [kat] --
3,825,563 UART: [cold-reset] ++
3,828,064 UART: [fht] FHT @ 0x50003400
3,838,908 UART: [idev] ++
3,839,471 UART: [idev] CDI.KEYID = 6
3,840,350 UART: [idev] SUBJECT.KEYID = 7
3,841,591 UART: [idev] UDS.KEYID = 0
3,860,467 UART: [idev] Erasing UDS.KEYID = 0
6,319,228 UART: [idev] Sha1 KeyId Algorithm
6,339,337 UART: [idev] CSR upload begun
6,344,048 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,059,754 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,075,795 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,091,794 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,107,613 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,131,430 UART: [idev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
8,273,633 UART: [idev] CSR uploaded
8,289,738 ready_for_fw is high
8,290,059 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,433,404 UART: [idev] --
8,434,039 UART: [ldev] ++
8,434,532 UART: [ldev] CDI.KEYID = 6
8,435,440 UART: [ldev] SUBJECT.KEYID = 5
8,436,503 UART: [ldev] AUTHORITY.KEYID = 7
8,437,597 UART: [ldev] FE.KEYID = 1
8,438,520 UART: [ldev] Erasing FE.KEYID = 1
10,782,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,498,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,514,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,529,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,545,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,565,754 UART: [ldev] --
12,571,286 UART: [fwproc] Wait for Commands...
12,573,380 UART: [fwproc] Recv command 0x46574c44
12,575,424 UART: [fwproc] Recv'd Img size: 114168 bytes
15,982,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,057,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,126,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,444,071 >>> mbox cmd response: success
16,444,554 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,448,341 UART: [afmc] ++
16,448,921 UART: [afmc] CDI.KEYID = 6
16,449,828 UART: [afmc] SUBJECT.KEYID = 7
16,450,984 UART: [afmc] AUTHORITY.KEYID = 5
18,948,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,670,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,672,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,688,706 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,704,713 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,720,533 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,743,880 UART: [afmc] --
20,747,628 UART: [cold-reset] --
20,751,809 UART: [state] Locking Datavault
20,758,294 UART: [state] Locking PCR0, PCR1 and PCR31
20,760,136 UART: [state] Locking ICCM
20,762,670 UART: [exit] Launching FMC @ 0x40000130
20,771,123 UART:
20,771,357 UART: Running Caliptra FMC ...
20,772,462 UART:
20,772,627 UART: [state] CFI Enabled
20,780,995 UART: [fht] FMC Alias Private Key: 7
22,537,755 UART: [art] Extend RT PCRs Done
22,538,976 UART: [art] Lock RT PCRs Done
22,540,437 UART: [art] Populate DV Done
22,545,531 UART: [fht] FMC Alias Private Key: 7
22,547,173 UART: [art] Derive CDI
22,547,990 UART: [art] Store in in slot 0x4
22,590,532 UART: [art] Derive Key Pair
22,591,531 UART: [art] Store priv key in slot 0x5
25,018,093 UART: [art] Derive Key Pair - Done
25,031,312 UART: [art] Signing Cert with AUTHO
25,032,621 UART: RITY.KEYID = 7
26,738,312 UART: [art] Erasing AUTHORITY.KEYID = 7
26,739,817 UART: [art] PUB.X = E760F5F5146FFBA5F9DF681EE784D40455954B14159B3DFD79CD09F5017CCA6C6E75BCB246E9C99CD5BC928C2881DCF4
26,747,103 UART: [art] PUB.Y = 8902B5C87580FE178399F2B8BF38ECC122A5312E7BE12A378CD5946F7045C8BDC9ED12214B000E4BFC6B33310D7B73BA
26,754,355 UART: [art] SIG.R = A7D7E7E986F4A1E9F1ACC23C6F9F8B3D4FC93A7E2AA9717B9D2C054B65F150FFF77EF5D994BC19B21C916D470DD839CF
26,761,779 UART: [art] SIG.S = AE09CAA942E7EADC004555A6832E0DE09B3D311F7F2A923971E77D36CC2EB870FF3F6BBFA439783790AEF82E60FB321A
27,740,719 UART: Caliptra RT
27,741,418 UART: [state] CFI Enabled
27,858,206 UART: [rt] RT listening for mailbox commands...
27,889,282 UART: [rt]cmd =0x49444352, len=4
27,896,727 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,850 writing to cptra_bootfsm_go
7,933,737 ready_for_fw is high
7,934,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,006,426 >>> mbox cmd response: success
16,007,042 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,255,665 UART:
20,256,068 UART: Running Caliptra FMC ...
20,257,175 UART:
20,257,347 UART: [state] CFI Enabled
20,264,924 UART: [fht] FMC Alias Private Key: 7
22,021,843 UART: [art] Extend RT PCRs Done
22,023,068 UART: [art] Lock RT PCRs Done
22,024,402 UART: [art] Populate DV Done
22,029,979 UART: [fht] FMC Alias Private Key: 7
22,031,579 UART: [art] Derive CDI
22,032,398 UART: [art] Store in in slot 0x4
22,074,781 UART: [art] Derive Key Pair
22,075,822 UART: [art] Store priv key in slot 0x5
24,502,681 UART: [art] Derive Key Pair - Done
24,515,896 UART: [art] Signing Cert with AUTHO
24,517,203 UART: RITY.KEYID = 7
26,222,690 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,202 UART: [art] PUB.X = AFCE4E3372CF0095D87A68AB0E1DCCE83082C7B8ADC47FD2B7FD40502121D931079BB970301922B3B51B422CC44AEDCE
26,231,444 UART: [art] PUB.Y = A9545956B227611401E47BDA9F4084CBF13438F01C46753862CAA0E5DEA26F5276BBDE9ACD6B37F5192B43257F876F2B
26,238,714 UART: [art] SIG.R = 3EA97BAF50F9F63DB2EC57EE4643853BFA0D8353F7A826C9B01CE6C3159D631AAC5AD8CC9D21C71D052720F2C2E5BCED
26,246,109 UART: [art] SIG.S = 80557BAC3F0EB260B550DA3250BBFA4E5B9B58D79EF166B5CAEE071BCDF52642387FEF68D359F5E315D86A8F5CE9AFB3
27,224,931 UART: Caliptra RT
27,225,621 UART: [state] CFI Enabled
27,343,167 UART: [rt] RT listening for mailbox commands...
27,374,360 UART: [rt]cmd =0x49444352, len=4
27,381,875 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,191 UART:
192,563 UART: Running Caliptra ROM ...
193,753 UART:
193,910 UART: [state] CFI Enabled
264,123 UART: [state] LifecycleState = Unprovisioned
266,733 UART: [state] DebugLocked = No
268,908 UART: [state] WD Timer not started. Device not locked for debugging
273,952 UART: [kat] SHA2-256
463,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,612 UART: [kat] ++
475,098 UART: [kat] sha1
486,996 UART: [kat] SHA2-256
490,013 UART: [kat] SHA2-384
495,382 UART: [kat] SHA2-512-ACC
497,963 UART: [kat] ECC-384
2,947,877 UART: [kat] HMAC-384Kdf
2,971,546 UART: [kat] LMS
3,503,301 UART: [kat] --
3,509,287 UART: [cold-reset] ++
3,510,864 UART: [fht] FHT @ 0x50003400
3,523,419 UART: [idev] ++
3,524,053 UART: [idev] CDI.KEYID = 6
3,525,090 UART: [idev] SUBJECT.KEYID = 7
3,526,267 UART: [idev] UDS.KEYID = 0
3,543,022 UART: [idev] Erasing UDS.KEYID = 0
6,028,939 UART: [idev] Sha1 KeyId Algorithm
6,051,758 UART: [idev] CSR upload begun
6,056,494 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,783,470 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,798,745 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,813,742 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,828,784 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,853,921 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,983,612 UART: [idev] CSR uploaded
7,991,669 ready_for_fw is high
7,991,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,135,730 UART: [idev] --
8,136,373 UART: [ldev] ++
8,136,873 UART: [ldev] CDI.KEYID = 6
8,137,777 UART: [ldev] SUBJECT.KEYID = 5
8,138,839 UART: [ldev] AUTHORITY.KEYID = 7
8,140,025 UART: [ldev] FE.KEYID = 1
8,140,907 UART: [ldev] Erasing FE.KEYID = 1
10,546,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,283,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,298,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,313,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,328,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,350,436 UART: [ldev] --
12,356,008 UART: [fwproc] Wait for Commands...
12,358,601 UART: [fwproc] Recv command 0x46574c44
12,360,918 UART: [fwproc] Recv'd Img size: 114168 bytes
15,813,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,895,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,339 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,552,924 >>> mbox cmd response: success
16,553,414 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,556,773 UART: [afmc] ++
16,557,477 UART: [afmc] CDI.KEYID = 6
16,558,606 UART: [afmc] SUBJECT.KEYID = 7
16,560,154 UART: [afmc] AUTHORITY.KEYID = 5
19,090,682 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,814,859 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,816,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,831,987 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,847,183 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,862,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,885,496 UART: [afmc] --
20,889,517 UART: [cold-reset] --
20,892,952 UART: [state] Locking Datavault
20,899,500 UART: [state] Locking PCR0, PCR1 and PCR31
20,901,642 UART: [state] Locking ICCM
20,903,907 UART: [exit] Launching FMC @ 0x40000130
20,912,589 UART:
20,912,862 UART: Running Caliptra FMC ...
20,914,013 UART:
20,914,177 UART: [state] CFI Enabled
20,973,634 UART: [fht] FMC Alias Private Key: 7
22,736,635 UART: [art] Extend RT PCRs Done
22,737,861 UART: [art] Lock RT PCRs Done
22,739,409 UART: [art] Populate DV Done
22,744,818 UART: [fht] FMC Alias Private Key: 7
22,746,352 UART: [art] Derive CDI
22,747,084 UART: [art] Store in in slot 0x4
22,806,351 UART: [art] Derive Key Pair
22,807,366 UART: [art] Store priv key in slot 0x5
25,270,495 UART: [art] Derive Key Pair - Done
25,283,325 UART: [art] Signing Cert with AUTHO
25,284,632 UART: RITY.KEYID = 7
26,996,592 UART: [art] Erasing AUTHORITY.KEYID = 7
26,998,098 UART: [art] PUB.X = 6655D62837C5B0D1CF71C2176CAE75F946A4A77DB282DAA48190C13AAAD26FA69AAFA675EF349C628AF6C3F712FEF678
27,005,383 UART: [art] PUB.Y = 5760484EA221A1181F025D5B49C6ED8F7F0BD357C0CEE6D888E82DEB1569F1B2D951C87C8E45C05B4389319CC9EAECA8
27,012,655 UART: [art] SIG.R = 000D85A5C514FC972FD9E10088AEF275F181C605EAC80BD87370E5FE84B4A05550C013BAB8827782C6C9A53896606438
27,019,985 UART: [art] SIG.S = 5E1CDFC3EBDE9560FB81F835085537BE20B45610967DC70DD86BA90CE6074376E347600486938581E0064B10D68B59E9
27,998,756 UART: Caliptra RT
27,999,915 UART: [state] CFI Enabled
28,165,740 UART: [rt] RT listening for mailbox commands...
28,197,096 UART: [rt]cmd =0x49444352, len=4
28,198,801 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
7,716,013 ready_for_fw is high
7,716,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,517,786 >>> mbox cmd response: success
16,518,398 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,800,727 UART:
20,801,119 UART: Running Caliptra FMC ...
20,802,252 UART:
20,802,414 UART: [state] CFI Enabled
20,868,706 UART: [fht] FMC Alias Private Key: 7
22,632,403 UART: [art] Extend RT PCRs Done
22,633,631 UART: [art] Lock RT PCRs Done
22,635,309 UART: [art] Populate DV Done
22,640,672 UART: [fht] FMC Alias Private Key: 7
22,642,164 UART: [art] Derive CDI
22,642,926 UART: [art] Store in in slot 0x4
22,701,462 UART: [art] Derive Key Pair
22,702,506 UART: [art] Store priv key in slot 0x5
25,165,048 UART: [art] Derive Key Pair - Done
25,177,924 UART: [art] Signing Cert with AUTHO
25,179,239 UART: RITY.KEYID = 7
26,891,396 UART: [art] Erasing AUTHORITY.KEYID = 7
26,892,877 UART: [art] PUB.X = 32586C078D8316A82E82C964497C6F23E8BF0C0475E5AB7DFA608554A9D3B6D6DF874E8A9139A0F115E97FFA53763018
26,900,175 UART: [art] PUB.Y = F0338A86CA37C8A8D0AD803574A4CE176B0BB2239583D6CA5FAE6EFD51010098E3E042EABB9E24C0DF8B5ECD7DDE0EC2
26,907,457 UART: [art] SIG.R = DBF3C20617B4DAA55650B7D531F603DCF910954514E76602C164A63B8D82B8889F867728602E99309986EF9F2B6CC5B3
26,914,793 UART: [art] SIG.S = C576C22041C15B550E3471589058C2DD44D16A8B1A292E6C0F98B616D9DA6E9590741A23CDD68E21C8B464AE88F8E449
27,894,179 UART: Caliptra RT
27,894,918 UART: [state] CFI Enabled
28,060,380 UART: [rt] RT listening for mailbox commands...
28,091,901 UART: [rt]cmd =0x49444352, len=4
28,093,731 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,809 writing to cptra_bootfsm_go
192,972 UART:
193,400 UART: Running Caliptra ROM ...
194,565 UART:
603,930 UART: [state] CFI Enabled
618,083 UART: [state] LifecycleState = Unprovisioned
620,457 UART: [state] DebugLocked = No
623,403 UART: [state] WD Timer not started. Device not locked for debugging
628,018 UART: [kat] SHA2-256
817,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,706 UART: [kat] ++
829,183 UART: [kat] sha1
841,482 UART: [kat] SHA2-256
844,494 UART: [kat] SHA2-384
851,409 UART: [kat] SHA2-512-ACC
853,986 UART: [kat] ECC-384
3,296,064 UART: [kat] HMAC-384Kdf
3,309,348 UART: [kat] LMS
3,841,202 UART: [kat] --
3,845,425 UART: [cold-reset] ++
3,847,501 UART: [fht] FHT @ 0x50003400
3,858,907 UART: [idev] ++
3,859,545 UART: [idev] CDI.KEYID = 6
3,860,526 UART: [idev] SUBJECT.KEYID = 7
3,861,698 UART: [idev] UDS.KEYID = 0
3,878,542 UART: [idev] Erasing UDS.KEYID = 0
6,339,468 UART: [idev] Sha1 KeyId Algorithm
6,362,439 UART: [idev] CSR upload begun
6,367,176 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,085,942 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,101,192 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,116,161 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,131,211 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,156,339 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,286,048 UART: [idev] CSR uploaded
8,294,193 ready_for_fw is high
8,294,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
8,437,979 UART: [idev] --
8,438,623 UART: [ldev] ++
8,439,124 UART: [ldev] CDI.KEYID = 6
8,440,091 UART: [ldev] SUBJECT.KEYID = 5
8,441,251 UART: [ldev] AUTHORITY.KEYID = 7
8,442,427 UART: [ldev] FE.KEYID = 1
8,443,299 UART: [ldev] Erasing FE.KEYID = 1
10,797,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,517,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,533,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,548,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,563,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,583,326 UART: [ldev] --
12,589,284 UART: [fwproc] Wait for Commands...
12,591,565 UART: [fwproc] Recv command 0x46574c44
12,593,877 UART: [fwproc] Recv'd Img size: 114168 bytes
16,034,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,112,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,229,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,769,841 >>> mbox cmd response: success
16,770,358 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,773,432 UART: [afmc] ++
16,774,126 UART: [afmc] CDI.KEYID = 6
16,775,365 UART: [afmc] SUBJECT.KEYID = 7
16,776,798 UART: [afmc] AUTHORITY.KEYID = 5
19,281,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,003,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,005,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,020,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,035,782 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,050,787 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,074,834 UART: [afmc] --
21,079,303 UART: [cold-reset] --
21,083,387 UART: [state] Locking Datavault
21,089,508 UART: [state] Locking PCR0, PCR1 and PCR31
21,091,749 UART: [state] Locking ICCM
21,093,865 UART: [exit] Launching FMC @ 0x40000130
21,102,546 UART:
21,102,782 UART: Running Caliptra FMC ...
21,103,885 UART:
21,104,046 UART: [state] CFI Enabled
21,112,044 UART: [fht] FMC Alias Private Key: 7
22,868,688 UART: [art] Extend RT PCRs Done
22,869,908 UART: [art] Lock RT PCRs Done
22,871,639 UART: [art] Populate DV Done
22,876,886 UART: [fht] FMC Alias Private Key: 7
22,878,492 UART: [art] Derive CDI
22,879,235 UART: [art] Store in in slot 0x4
22,921,880 UART: [art] Derive Key Pair
22,922,914 UART: [art] Store priv key in slot 0x5
25,349,543 UART: [art] Derive Key Pair - Done
25,362,534 UART: [art] Signing Cert with AUTHO
25,363,831 UART: RITY.KEYID = 7
27,069,571 UART: [art] Erasing AUTHORITY.KEYID = 7
27,071,074 UART: [art] PUB.X = E8CA691A331119D67633A663A950486426785285007AA4F3E294FB4A7B3D6686CA5B44F5C7F3BE7FE7C2BE46A9E81EC1
27,078,316 UART: [art] PUB.Y = 5EB97AAF8E875D71C89261802C1E9D9AAED839C07F6D46E9F622F5A513E3B23EC79CA347A9AB9389C067FC16CC2EC386
27,085,608 UART: [art] SIG.R = D1EE0EA18CB81D20FFF720BC9B36965608FAF1EEDF6EDAC1888A2C6E2E4529A1E1861CDB9587584A50A900D6A852DC03
27,093,004 UART: [art] SIG.S = 3383D69ACEE054042763746DF4108E2A8FEE7F8CE6770FEEFCF13FFC350F9E2329007C8151A7A7D5B771D80DE0DBBF42
28,072,084 UART: Caliptra RT
28,072,785 UART: [state] CFI Enabled
28,189,521 UART: [rt] RT listening for mailbox commands...
28,220,830 UART: [rt]cmd =0x49444352, len=4
28,222,781 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,648 writing to cptra_bootfsm_go
7,987,175 ready_for_fw is high
7,987,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,700,662 >>> mbox cmd response: success
16,701,310 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,950,864 UART:
20,951,267 UART: Running Caliptra FMC ...
20,952,408 UART:
20,952,571 UART: [state] CFI Enabled
20,960,640 UART: [fht] FMC Alias Private Key: 7
22,717,604 UART: [art] Extend RT PCRs Done
22,718,826 UART: [art] Lock RT PCRs Done
22,720,341 UART: [art] Populate DV Done
22,725,649 UART: [fht] FMC Alias Private Key: 7
22,727,242 UART: [art] Derive CDI
22,728,078 UART: [art] Store in in slot 0x4
22,770,519 UART: [art] Derive Key Pair
22,771,556 UART: [art] Store priv key in slot 0x5
25,197,837 UART: [art] Derive Key Pair - Done
25,210,884 UART: [art] Signing Cert with AUTHO
25,212,185 UART: RITY.KEYID = 7
26,917,688 UART: [art] Erasing AUTHORITY.KEYID = 7
26,919,186 UART: [art] PUB.X = 2C44F8F1F416B4F5543A67934BADE3ED827B10B9F32B1B606FA72C0CE049133ECAF4766E7FB83ABF2AEA8EE25B585556
26,926,479 UART: [art] PUB.Y = A2DB844EC3E03B2796EF50193747F21B5EBD89C7AC58E4FF2E51F8452BC80F3B83E307D0DA8CA59C147CF1554F6ABDD0
26,933,763 UART: [art] SIG.R = 107A763D4516B12BF57158265D0C48CB80C5E9B0DAB92CA0696351A9E1ACA19BC845F6791FB80A390D1BAB7468C9EDD3
26,941,158 UART: [art] SIG.S = A5F2AC655F72224C0D90ACE90780789D2202D6E12E1C9C3E51E2A5A2E49DBC53929BC7BE40EA179392423EDEA0F25551
27,919,606 UART: Caliptra RT
27,920,338 UART: [state] CFI Enabled
28,037,142 UART: [rt] RT listening for mailbox commands...
28,068,500 UART: [rt]cmd =0x49444352, len=4
28,070,274 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,139 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,687 UART: [kat] SHA2-256
881,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,733 UART: [kat] ++
885,885 UART: [kat] sha1
889,969 UART: [kat] SHA2-256
891,907 UART: [kat] SHA2-384
894,704 UART: [kat] SHA2-512-ACC
896,605 UART: [kat] ECC-384
902,278 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,227 UART: [cold-reset] ++
1,476,761 UART: [fht] Storing FHT @ 0x50003400
1,479,728 UART: [idev] ++
1,479,896 UART: [idev] CDI.KEYID = 6
1,480,256 UART: [idev] SUBJECT.KEYID = 7
1,480,680 UART: [idev] UDS.KEYID = 0
1,488,434 UART: [idev] Erasing UDS.KEYID = 0
1,505,056 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,715 UART: [idev] CSR upload requested
1,515,561 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,738 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,445 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,327 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,032 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,452 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,602,600 UART: [idev] CSR uploaded
1,604,981 ready_for_fw is high
1,604,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,605,152 UART: [idev] --
1,606,301 UART: [ldev] ++
1,606,469 UART: [ldev] CDI.KEYID = 6
1,606,832 UART: [ldev] SUBJECT.KEYID = 5
1,607,258 UART: [ldev] AUTHORITY.KEYID = 7
1,607,721 UART: [ldev] FE.KEYID = 1
1,612,885 UART: [ldev] Erasing FE.KEYID = 1
1,638,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,652,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,658,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,872 UART: [ldev] --
1,678,381 UART: [fwproc] Waiting for Commands...
1,679,022 UART: [fwproc] Received command 0x46574c44
1,679,813 UART: [fwproc] Received Image of size 114168 bytes
2,976,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,003,635 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,032,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,168,554 >>> mbox cmd response: success
3,168,554 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,169,628 UART: [afmc] ++
3,169,796 UART: [afmc] CDI.KEYID = 6
3,170,158 UART: [afmc] SUBJECT.KEYID = 7
3,170,583 UART: [afmc] AUTHORITY.KEYID = 5
3,206,228 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,222,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,223,236 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,228,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,234,849 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,240,539 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,248,472 UART: [afmc] --
3,249,562 UART: [cold-reset] --
3,250,456 UART: [state] Locking Datavault
3,251,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,251,959 UART: [state] Locking ICCM
3,252,421 UART: [exit] Launching FMC @ 0x40000130
3,257,750 UART:
3,257,766 UART: Running Caliptra FMC ...
3,258,174 UART:
3,258,228 UART: [state] CFI Enabled
3,268,879 UART: [fht] FMC Alias Private Key: 7
3,376,790 UART: [art] Extend RT PCRs Done
3,377,218 UART: [art] Lock RT PCRs Done
3,378,874 UART: [art] Populate DV Done
3,387,117 UART: [fht] FMC Alias Private Key: 7
3,388,069 UART: [art] Derive CDI
3,388,349 UART: [art] Store in in slot 0x4
3,474,130 UART: [art] Derive Key Pair
3,474,490 UART: [art] Store priv key in slot 0x5
3,487,436 UART: [art] Derive Key Pair - Done
3,502,244 UART: [art] Signing Cert with AUTHO
3,502,724 UART: RITY.KEYID = 7
3,517,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,727 UART: [art] PUB.X = B7A7C10C1B415F0DBF0EBEE910C3DAB137EE8531C756CF4F461BA014F1EB005FCE458A01D889275530AC1CA7DC679152
3,525,479 UART: [art] PUB.Y = 97DAA2FA99C3DCAB863300368D0FA25B046AF8FF3B62E29A6613B6451F16C8E690B223C138BF768B106879ADFC9F2183
3,532,409 UART: [art] SIG.R = 28AD72DE659C5F6D462466D1B94902D711751D5F910395ABC78B695DE12290403E7E9391B81542A04340296EB91624F6
3,539,161 UART: [art] SIG.S = 23E04E78F2FD98FCEA026AC885A8C2AE406165227D29A806E32310A2C287A0FC705E7006C374950C011D6DA9E91AB4C6
3,563,077 UART: Caliptra RT
3,563,330 UART: [state] CFI Enabled
3,671,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,730 UART: [rt]cmd =0x49444352, len=4
3,703,269 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,410,698 ready_for_fw is high
1,410,698 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,944,089 >>> mbox cmd response: success
2,944,089 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,005,863 UART:
3,005,879 UART: Running Caliptra FMC ...
3,006,287 UART:
3,006,341 UART: [state] CFI Enabled
3,016,824 UART: [fht] FMC Alias Private Key: 7
3,124,961 UART: [art] Extend RT PCRs Done
3,125,389 UART: [art] Lock RT PCRs Done
3,126,921 UART: [art] Populate DV Done
3,135,200 UART: [fht] FMC Alias Private Key: 7
3,136,212 UART: [art] Derive CDI
3,136,492 UART: [art] Store in in slot 0x4
3,221,959 UART: [art] Derive Key Pair
3,222,319 UART: [art] Store priv key in slot 0x5
3,235,971 UART: [art] Derive Key Pair - Done
3,250,589 UART: [art] Signing Cert with AUTHO
3,251,069 UART: RITY.KEYID = 7
3,266,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,266,766 UART: [art] PUB.X = 4FE9ADAE6AFA1C9CA9006A39DAC60EFC0D1016D5BADEE9D2F55571BB42B6A767798150969D8E7E5966ADD71A0889761E
3,273,523 UART: [art] PUB.Y = 568AC16BAA91D0CD086983F92F76F7DDE0E74C68E4F9BC37412F1AD7CFC5BBA5EAEAEC82157921C1FD01E23B4B20740A
3,280,486 UART: [art] SIG.R = 039C6559D07CD57CEB452D42E77D8479114ED149D24D7EDBED41BA480AD15FE0700753A52E1D009B26D3186A36C674D7
3,287,229 UART: [art] SIG.S = 787010F4CDAB0F271A83466617FC138EE4A8FBECDFFF19C20F2EA17C894D0FAD3584941DDAB8DD4671EB5ADF0C98EA3D
3,310,926 UART: Caliptra RT
3,311,179 UART: [state] CFI Enabled
3,419,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,733 UART: [rt]cmd =0x49444352, len=4
3,451,164 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,572 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,296 UART: [kat] SHA2-256
882,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,342 UART: [kat] ++
886,494 UART: [kat] sha1
890,666 UART: [kat] SHA2-256
892,604 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,275 UART: [kat] LMS
1,475,471 UART: [kat] --
1,476,536 UART: [cold-reset] ++
1,476,914 UART: [fht] Storing FHT @ 0x50003400
1,479,533 UART: [idev] ++
1,479,701 UART: [idev] CDI.KEYID = 6
1,480,061 UART: [idev] SUBJECT.KEYID = 7
1,480,485 UART: [idev] UDS.KEYID = 0
1,488,699 UART: [idev] Erasing UDS.KEYID = 0
1,505,857 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,268 UART: [idev] CSR upload requested
1,516,114 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,709 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,416 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,298 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,544,003 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,423 UART: [idev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
1,602,571 UART: [idev] CSR uploaded
1,604,952 ready_for_fw is high
1,604,952 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,605,123 UART: [idev] --
1,606,136 UART: [ldev] ++
1,606,304 UART: [ldev] CDI.KEYID = 6
1,606,667 UART: [ldev] SUBJECT.KEYID = 5
1,607,093 UART: [ldev] AUTHORITY.KEYID = 7
1,607,556 UART: [ldev] FE.KEYID = 1
1,613,098 UART: [ldev] Erasing FE.KEYID = 1
1,638,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,651,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,657,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,663,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,669,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,676,081 UART: [ldev] --
1,677,582 UART: [fwproc] Waiting for Commands...
1,678,199 UART: [fwproc] Received command 0x46574c44
1,678,990 UART: [fwproc] Received Image of size 114168 bytes
2,976,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,003,528 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
3,032,880 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,168,609 >>> mbox cmd response: success
3,168,609 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,169,701 UART: [afmc] ++
3,169,869 UART: [afmc] CDI.KEYID = 6
3,170,231 UART: [afmc] SUBJECT.KEYID = 7
3,170,656 UART: [afmc] AUTHORITY.KEYID = 5
3,205,941 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,221,789 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,222,569 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,228,297 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,234,182 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,239,872 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,247,677 UART: [afmc] --
3,248,787 UART: [cold-reset] --
3,249,741 UART: [state] Locking Datavault
3,251,060 UART: [state] Locking PCR0, PCR1 and PCR31
3,251,664 UART: [state] Locking ICCM
3,252,122 UART: [exit] Launching FMC @ 0x40000130
3,257,451 UART:
3,257,467 UART: Running Caliptra FMC ...
3,257,875 UART:
3,258,018 UART: [state] CFI Enabled
3,268,677 UART: [fht] FMC Alias Private Key: 7
3,377,422 UART: [art] Extend RT PCRs Done
3,377,850 UART: [art] Lock RT PCRs Done
3,379,460 UART: [art] Populate DV Done
3,387,657 UART: [fht] FMC Alias Private Key: 7
3,388,699 UART: [art] Derive CDI
3,388,979 UART: [art] Store in in slot 0x4
3,474,318 UART: [art] Derive Key Pair
3,474,678 UART: [art] Store priv key in slot 0x5
3,487,806 UART: [art] Derive Key Pair - Done
3,502,750 UART: [art] Signing Cert with AUTHO
3,503,230 UART: RITY.KEYID = 7
3,518,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,519,113 UART: [art] PUB.X = 635B2DC3B0EB93F21900CA79C67E205BD2DEFC2DADCD0FB05D1B51D49CBC97EC64D2E4D731CF6CC1F609CFBFD56F381C
3,525,887 UART: [art] PUB.Y = E298F6FAA561AC6BF36B6CECF68495D76B413F34D0DD5309A51E90EFDDDA84BC7077681A5FAE083BE05014117D057D93
3,532,842 UART: [art] SIG.R = 38187D235B7D1445D6FC57C6B898A4FB9715D7FC6C4C6834431CCFA23C17DBE8B64F92A8C78550FB1CF2B8B2165BE287
3,539,622 UART: [art] SIG.S = 6591C7F8DF20C913D71BD6A67275C897E0E7CBA48FB6F3F52F73EC799BA5090CD69A72721E03E5E82031F8153767F116
3,563,372 UART: Caliptra RT
3,563,717 UART: [state] CFI Enabled
3,672,067 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,723 UART: [rt]cmd =0x49444352, len=4
3,704,090 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,865 ready_for_fw is high
1,411,865 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,944,564 >>> mbox cmd response: success
2,944,564 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,005,852 UART:
3,005,868 UART: Running Caliptra FMC ...
3,006,276 UART:
3,006,419 UART: [state] CFI Enabled
3,017,240 UART: [fht] FMC Alias Private Key: 7
3,124,953 UART: [art] Extend RT PCRs Done
3,125,381 UART: [art] Lock RT PCRs Done
3,126,555 UART: [art] Populate DV Done
3,134,758 UART: [fht] FMC Alias Private Key: 7
3,135,790 UART: [art] Derive CDI
3,136,070 UART: [art] Store in in slot 0x4
3,221,723 UART: [art] Derive Key Pair
3,222,083 UART: [art] Store priv key in slot 0x5
3,234,907 UART: [art] Derive Key Pair - Done
3,249,446 UART: [art] Signing Cert with AUTHO
3,249,926 UART: RITY.KEYID = 7
3,264,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,265,539 UART: [art] PUB.X = 307517FA2484716E45CB1C47D99B0A55026ECF4E07BECC1F665A2D5323F2EB70A3E5069DC5582578D3B6FC27E63782F9
3,272,301 UART: [art] PUB.Y = D430D604FD2B2610401A2ACDC741A9C3E0535458919B2AA97EFCBB2E1887FE324C0488710CDE706C1DFC7EB9CCE34B1E
3,279,258 UART: [art] SIG.R = 51A70A98EFB4986AA38A97039919CDF7C83D34E7EC2ED471714170F9F0590008F9BF380CCDE6D2DECB164676ADA25A3B
3,286,006 UART: [art] SIG.S = 0DEBB747A9D5198EEF81C223C72BA17841FD96CE483182F335E06BC6DF97D11E9A14CC144BD0B1CE5F77AA706D05E9C5
3,310,093 UART: Caliptra RT
3,310,438 UART: [state] CFI Enabled
3,419,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,449,744 UART: [rt]cmd =0x49444352, len=4
3,450,931 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,793 UART: [kat] SHA2-256
903,733 UART: [kat] SHA2-384
906,528 UART: [kat] SHA2-512-ACC
908,429 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,722 UART: [kat] LMS
1,171,050 UART: [kat] --
1,172,013 UART: [cold-reset] ++
1,172,471 UART: [fht] FHT @ 0x50003400
1,175,044 UART: [idev] ++
1,175,212 UART: [idev] CDI.KEYID = 6
1,175,572 UART: [idev] SUBJECT.KEYID = 7
1,175,996 UART: [idev] UDS.KEYID = 0
1,183,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,627 UART: [idev] Sha1 KeyId Algorithm
1,208,899 UART: [idev] CSR upload begun
1,210,680 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,954 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,661 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,543 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,248 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,668 UART: [idev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
1,296,816 UART: [idev] CSR uploaded
1,299,195 ready_for_fw is high
1,299,195 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,299,366 UART: [idev] --
1,300,300 UART: [ldev] ++
1,300,468 UART: [ldev] CDI.KEYID = 6
1,300,831 UART: [ldev] SUBJECT.KEYID = 5
1,301,257 UART: [ldev] AUTHORITY.KEYID = 7
1,301,720 UART: [ldev] FE.KEYID = 1
1,306,970 UART: [ldev] Erasing FE.KEYID = 1
1,333,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,982 UART: [ldev] --
1,372,267 UART: [fwproc] Wait for Commands...
1,372,877 UART: [fwproc] Recv command 0x46574c44
1,373,605 UART: [fwproc] Recv'd Img size: 114168 bytes
2,670,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,137 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,441 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,864,090 >>> mbox cmd response: success
2,864,090 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,865,352 UART: [afmc] ++
2,865,520 UART: [afmc] CDI.KEYID = 6
2,865,882 UART: [afmc] SUBJECT.KEYID = 7
2,866,307 UART: [afmc] AUTHORITY.KEYID = 5
2,901,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,031 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,363 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,287 UART: [afmc] --
2,945,329 UART: [cold-reset] --
2,946,149 UART: [state] Locking Datavault
2,947,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,044 UART: [state] Locking ICCM
2,948,582 UART: [exit] Launching FMC @ 0x40000130
2,953,911 UART:
2,953,927 UART: Running Caliptra FMC ...
2,954,335 UART:
2,954,389 UART: [state] CFI Enabled
2,964,776 UART: [fht] FMC Alias Private Key: 7
3,072,817 UART: [art] Extend RT PCRs Done
3,073,245 UART: [art] Lock RT PCRs Done
3,074,963 UART: [art] Populate DV Done
3,082,984 UART: [fht] FMC Alias Private Key: 7
3,084,102 UART: [art] Derive CDI
3,084,382 UART: [art] Store in in slot 0x4
3,170,507 UART: [art] Derive Key Pair
3,170,867 UART: [art] Store priv key in slot 0x5
3,184,021 UART: [art] Derive Key Pair - Done
3,198,820 UART: [art] Signing Cert with AUTHO
3,199,300 UART: RITY.KEYID = 7
3,214,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,357 UART: [art] PUB.X = 1DD615FC1E82609C28A518E64E89C62141EAB88685E0D41D99AA5E6FC59FDEF687F8F58B1E33BA973A381CA4237840FD
3,222,137 UART: [art] PUB.Y = 7F55B536D0FB41CC585F45D5533288CDC8F50AA7CD9F07F0545A178380773211A695C2D9AF0C51044AB2897F515422C4
3,229,073 UART: [art] SIG.R = D40ECA30E690C5D4D18E11590156F68C18B59F712AB5D12D47676E651CB9D0FA2726D01FB13CAE13D29A2ADF5EFEE5C6
3,235,853 UART: [art] SIG.S = 2C1A0B5B296D283E3FB31E0A6FE48870483941D52B47F2685F4439C265BD44B32E471FF52197B33B1B58D37D660B843C
3,259,355 UART: Caliptra RT
3,259,608 UART: [state] CFI Enabled
3,368,013 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,625 UART: [rt]cmd =0x49444352, len=4
3,400,048 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,036 ready_for_fw is high
1,110,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,641,038 >>> mbox cmd response: success
2,641,038 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,703,136 UART:
2,703,152 UART: Running Caliptra FMC ...
2,703,560 UART:
2,703,614 UART: [state] CFI Enabled
2,714,333 UART: [fht] FMC Alias Private Key: 7
2,823,152 UART: [art] Extend RT PCRs Done
2,823,580 UART: [art] Lock RT PCRs Done
2,824,924 UART: [art] Populate DV Done
2,833,189 UART: [fht] FMC Alias Private Key: 7
2,834,217 UART: [art] Derive CDI
2,834,497 UART: [art] Store in in slot 0x4
2,919,922 UART: [art] Derive Key Pair
2,920,282 UART: [art] Store priv key in slot 0x5
2,933,738 UART: [art] Derive Key Pair - Done
2,948,389 UART: [art] Signing Cert with AUTHO
2,948,869 UART: RITY.KEYID = 7
2,964,207 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,972 UART: [art] PUB.X = 802ADAC45BB6950A814E0BB050CA4E415AFC9B6F5C32DDBBFCF411CE9E60A50BBAA12C5D35E58B816811DFA8119918E3
2,971,755 UART: [art] PUB.Y = 06C698CCBB5AB1D5D54A96AA40B8E7379B044764216B795D02E095C9323FFF51978DA0206B80DC6C9F559B6C83F25042
2,978,698 UART: [art] SIG.R = 8232969E80DBF915FD9AAE7D8386BA33A129F74B1C567073F51E7E8D89E3D60AF0C6C3EEB271AE3CB6B8B0D173A146D7
2,985,479 UART: [art] SIG.S = 18C6921F6D295D26F4DDEEC7D0B7E99AE617038C2CAF2E46ABE3A80BB6E488D8A863E05EDF9343842E169C72E46A2800
3,009,034 UART: Caliptra RT
3,009,287 UART: [state] CFI Enabled
3,117,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,147,872 UART: [rt]cmd =0x49444352, len=4
3,149,219 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
893,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,986 UART: [kat] ++
898,138 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
906,753 UART: [kat] SHA2-512-ACC
908,654 UART: [kat] ECC-384
918,819 UART: [kat] HMAC-384Kdf
923,473 UART: [kat] LMS
1,171,801 UART: [kat] --
1,172,812 UART: [cold-reset] ++
1,173,234 UART: [fht] FHT @ 0x50003400
1,175,909 UART: [idev] ++
1,176,077 UART: [idev] CDI.KEYID = 6
1,176,437 UART: [idev] SUBJECT.KEYID = 7
1,176,861 UART: [idev] UDS.KEYID = 0
1,184,835 UART: [idev] Erasing UDS.KEYID = 0
1,201,810 UART: [idev] Sha1 KeyId Algorithm
1,210,300 UART: [idev] CSR upload begun
1,212,081 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,597 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,304 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,186 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,891 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,311 UART: [idev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
1,298,459 UART: [idev] CSR uploaded
1,300,838 ready_for_fw is high
1,300,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,301,009 UART: [idev] --
1,302,109 UART: [ldev] ++
1,302,277 UART: [ldev] CDI.KEYID = 6
1,302,640 UART: [ldev] SUBJECT.KEYID = 5
1,303,066 UART: [ldev] AUTHORITY.KEYID = 7
1,303,529 UART: [ldev] FE.KEYID = 1
1,308,965 UART: [ldev] Erasing FE.KEYID = 1
1,335,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,745 UART: [ldev] --
1,375,056 UART: [fwproc] Wait for Commands...
1,375,738 UART: [fwproc] Recv command 0x46574c44
1,376,466 UART: [fwproc] Recv'd Img size: 114168 bytes
2,672,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,864,721 >>> mbox cmd response: success
2,864,721 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,865,747 UART: [afmc] ++
2,865,915 UART: [afmc] CDI.KEYID = 6
2,866,277 UART: [afmc] SUBJECT.KEYID = 7
2,866,702 UART: [afmc] AUTHORITY.KEYID = 5
2,901,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,468 UART: [afmc] --
2,945,506 UART: [cold-reset] --
2,946,384 UART: [state] Locking Datavault
2,947,723 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,327 UART: [state] Locking ICCM
2,948,917 UART: [exit] Launching FMC @ 0x40000130
2,954,246 UART:
2,954,262 UART: Running Caliptra FMC ...
2,954,670 UART:
2,954,813 UART: [state] CFI Enabled
2,965,440 UART: [fht] FMC Alias Private Key: 7
3,073,745 UART: [art] Extend RT PCRs Done
3,074,173 UART: [art] Lock RT PCRs Done
3,075,623 UART: [art] Populate DV Done
3,083,856 UART: [fht] FMC Alias Private Key: 7
3,084,992 UART: [art] Derive CDI
3,085,272 UART: [art] Store in in slot 0x4
3,171,191 UART: [art] Derive Key Pair
3,171,551 UART: [art] Store priv key in slot 0x5
3,184,621 UART: [art] Derive Key Pair - Done
3,199,711 UART: [art] Signing Cert with AUTHO
3,200,191 UART: RITY.KEYID = 7
3,215,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,450 UART: [art] PUB.X = F980AF5C75C3930B2403CF7BA4B5B9C42B6D3CC9DE2DC085650A390ADA7A9D75CC85E037766DF2F251320A2574D08839
3,223,213 UART: [art] PUB.Y = 84262672ECD8566339149AA0A12A8FB36589F117644D69B4183C0AE63993EA0F628AD3797C04545FBB46DEF5A3ED4610
3,230,152 UART: [art] SIG.R = 84D4F0A6444E18A8826F617EC484F165F0033A344F0F3D2FF791513B044E1B14C9D032CE2A956D3EF03338BD0EDBA367
3,236,914 UART: [art] SIG.S = 0CB46F08CE8023219366DDA99EBC47C092A039482ACF3B4940016AA72CEF74A570F09B1EFE2C8D662FDC940803C131A1
3,261,250 UART: Caliptra RT
3,261,595 UART: [state] CFI Enabled
3,370,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,602 UART: [rt]cmd =0x49444352, len=4
3,401,965 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,089 ready_for_fw is high
1,109,089 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,639,041 >>> mbox cmd response: success
2,639,041 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,701,533 UART:
2,701,549 UART: Running Caliptra FMC ...
2,701,957 UART:
2,702,100 UART: [state] CFI Enabled
2,712,959 UART: [fht] FMC Alias Private Key: 7
2,821,032 UART: [art] Extend RT PCRs Done
2,821,460 UART: [art] Lock RT PCRs Done
2,823,050 UART: [art] Populate DV Done
2,830,999 UART: [fht] FMC Alias Private Key: 7
2,831,965 UART: [art] Derive CDI
2,832,245 UART: [art] Store in in slot 0x4
2,918,146 UART: [art] Derive Key Pair
2,918,506 UART: [art] Store priv key in slot 0x5
2,932,180 UART: [art] Derive Key Pair - Done
2,946,663 UART: [art] Signing Cert with AUTHO
2,947,143 UART: RITY.KEYID = 7
2,962,199 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,964 UART: [art] PUB.X = C4F7C38B6262F3A142B47973100898D53D03BF0A4ACF65C0B41C895DB8FBEE3D351AC925D6254A4440BC9184B13DD21F
2,969,733 UART: [art] PUB.Y = AE9DE12FF74367F38CC02E091543014EC4D8F9BBB09EE09AC9E869A3477428E1CBB98EA1964D3D6603DAF3A21C0766CA
2,976,685 UART: [art] SIG.R = DDF017EBEFAD23159CAF92272F84338A213E9BDEBCF9C5747930C6EFAA5D56CFA12BCA938C8476D572860962DB6EF14D
2,983,472 UART: [art] SIG.S = 941F3321ED8C1B23FDC31756FC5948E7AC9456129358D6870118F2766803116CE2EBA63D74BCE4C276FDBE6A8E7F766F
3,006,989 UART: Caliptra RT
3,007,334 UART: [state] CFI Enabled
3,114,186 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,768 UART: [rt]cmd =0x49444352, len=4
3,146,157 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
904,326 UART: [kat] SHA2-512-ACC
906,227 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,095 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,875 UART: [idev] Sha1 KeyId Algorithm
1,207,201 UART: [idev] CSR upload begun
1,208,980 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,587 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,295 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,180 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,886 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,315 UART: [idev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
1,296,809 UART: [idev] CSR uploaded
1,299,854 ready_for_fw is high
1,299,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,023 UART: [idev] --
1,301,136 UART: [ldev] ++
1,301,304 UART: [ldev] CDI.KEYID = 6
1,301,668 UART: [ldev] SUBJECT.KEYID = 5
1,302,095 UART: [ldev] AUTHORITY.KEYID = 7
1,302,558 UART: [ldev] FE.KEYID = 1
1,307,728 UART: [ldev] Erasing FE.KEYID = 1
1,334,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,730 UART: [ldev] --
1,373,008 UART: [fwproc] Wait for Commands...
1,373,797 UART: [fwproc] Recv command 0x46574c44
1,374,530 UART: [fwproc] Recv'd Img size: 114168 bytes
2,671,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,699,008 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,728,317 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,863,965 >>> mbox cmd response: success
2,863,965 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,865,010 UART: [afmc] ++
2,865,178 UART: [afmc] CDI.KEYID = 6
2,865,541 UART: [afmc] SUBJECT.KEYID = 7
2,865,967 UART: [afmc] AUTHORITY.KEYID = 5
2,901,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,918,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,918,783 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,924,512 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,930,395 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,936,114 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,943,981 UART: [afmc] --
2,945,055 UART: [cold-reset] --
2,946,105 UART: [state] Locking Datavault
2,947,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,947,860 UART: [state] Locking ICCM
2,948,404 UART: [exit] Launching FMC @ 0x40000130
2,953,733 UART:
2,953,749 UART: Running Caliptra FMC ...
2,954,157 UART:
2,954,211 UART: [state] CFI Enabled
2,964,940 UART: [fht] FMC Alias Private Key: 7
3,072,709 UART: [art] Extend RT PCRs Done
3,073,137 UART: [art] Lock RT PCRs Done
3,074,585 UART: [art] Populate DV Done
3,082,652 UART: [fht] FMC Alias Private Key: 7
3,083,800 UART: [art] Derive CDI
3,084,080 UART: [art] Store in in slot 0x4
3,169,193 UART: [art] Derive Key Pair
3,169,553 UART: [art] Store priv key in slot 0x5
3,182,931 UART: [art] Derive Key Pair - Done
3,197,501 UART: [art] Signing Cert with AUTHO
3,197,981 UART: RITY.KEYID = 7
3,213,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,168 UART: [art] PUB.X = FBDD8149D024992C6EF5643A24E8BCEC191DE57EE24E01BBDD61397D81660C9E886B17EED3BBAE13185E63417BBA85B6
3,220,948 UART: [art] PUB.Y = 6082A8A6E02814D53378BD53CA27CFCF7F90A41F8097065F25085ED175E694BD8C75A4E256AE6EE98D50BD0E4F002E6B
3,227,875 UART: [art] SIG.R = 891B0A5D06FDC5C9914B9D4B2E8732A51E1C3516FED39B58285C59F94DD59423182A47AFCDEFAC436270DE66A681A8DB
3,234,651 UART: [art] SIG.S = B92B6E1096D2FA55D9F8F55C8E60C4DB7E6BD56B3AAB424CBF08ED75BDA21D5AF53AF8E9050F8555653ADF770D587DEC
3,258,540 UART: Caliptra RT
3,258,793 UART: [state] CFI Enabled
3,366,241 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,641 UART: [rt]cmd =0x49444352, len=4
3,403,727 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,685 ready_for_fw is high
1,107,685 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,637,438 >>> mbox cmd response: success
2,637,438 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,700,018 UART:
2,700,034 UART: Running Caliptra FMC ...
2,700,442 UART:
2,700,496 UART: [state] CFI Enabled
2,711,253 UART: [fht] FMC Alias Private Key: 7
2,819,388 UART: [art] Extend RT PCRs Done
2,819,816 UART: [art] Lock RT PCRs Done
2,821,372 UART: [art] Populate DV Done
2,829,483 UART: [fht] FMC Alias Private Key: 7
2,830,575 UART: [art] Derive CDI
2,830,855 UART: [art] Store in in slot 0x4
2,916,610 UART: [art] Derive Key Pair
2,916,970 UART: [art] Store priv key in slot 0x5
2,929,472 UART: [art] Derive Key Pair - Done
2,944,591 UART: [art] Signing Cert with AUTHO
2,945,071 UART: RITY.KEYID = 7
2,960,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,154 UART: [art] PUB.X = BD6469EEACB9825670545FBA8B09C3B5428FCE3AF53A3CAE0628ED7B19068C9EEB4987958F22FBBA8B465C7390DF561D
2,967,931 UART: [art] PUB.Y = AF6BD9943CF07043C7773E87E689B78804C63609B928681A9FA745D976A0B0537D41F7E59FB1221756A84B9B36FA8E38
2,974,871 UART: [art] SIG.R = 2438B18DF4C4CB15313D9CF2A0C7C4BC23077743E449AEB08065B03A7DFE773FFC7B052786DA71BD68B9CA5BBC1E045A
2,981,648 UART: [art] SIG.S = F51A2E9A418A730B692FE4BD004DBA3EB2DFA06FEDDCB037617CF8F519B2545C468B629CC9DDBB35F9A0617EDD1AC5A8
3,005,210 UART: Caliptra RT
3,005,463 UART: [state] CFI Enabled
3,113,130 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,352 UART: [rt]cmd =0x49444352, len=4
3,150,316 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,887 UART: [state] LifecycleState = Unprovisioned
85,542 UART: [state] DebugLocked = No
86,100 UART: [state] WD Timer not started. Device not locked for debugging
87,299 UART: [kat] SHA2-256
890,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,978 UART: [kat] ++
895,130 UART: [kat] sha1
899,344 UART: [kat] SHA2-256
901,284 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
915,649 UART: [kat] HMAC-384Kdf
920,337 UART: [kat] LMS
1,168,649 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,160 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,181,662 UART: [idev] Erasing UDS.KEYID = 0
1,198,756 UART: [idev] Sha1 KeyId Algorithm
1,207,194 UART: [idev] CSR upload begun
1,208,973 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,906 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,614 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,499 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,205 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,634 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,297,128 UART: [idev] CSR uploaded
1,300,173 ready_for_fw is high
1,300,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,300,342 UART: [idev] --
1,301,493 UART: [ldev] ++
1,301,661 UART: [ldev] CDI.KEYID = 6
1,302,025 UART: [ldev] SUBJECT.KEYID = 5
1,302,452 UART: [ldev] AUTHORITY.KEYID = 7
1,302,915 UART: [ldev] FE.KEYID = 1
1,308,533 UART: [ldev] Erasing FE.KEYID = 1
1,335,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,283 UART: [ldev] --
1,374,777 UART: [fwproc] Wait for Commands...
1,375,404 UART: [fwproc] Recv command 0x46574c44
1,376,137 UART: [fwproc] Recv'd Img size: 114168 bytes
2,672,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,700,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,729,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,865,024 >>> mbox cmd response: success
2,865,024 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,866,201 UART: [afmc] ++
2,866,369 UART: [afmc] CDI.KEYID = 6
2,866,732 UART: [afmc] SUBJECT.KEYID = 7
2,867,158 UART: [afmc] AUTHORITY.KEYID = 5
2,902,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,919,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,919,770 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,925,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,931,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,937,101 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,944,810 UART: [afmc] --
2,945,734 UART: [cold-reset] --
2,946,614 UART: [state] Locking Datavault
2,947,827 UART: [state] Locking PCR0, PCR1 and PCR31
2,948,431 UART: [state] Locking ICCM
2,948,995 UART: [exit] Launching FMC @ 0x40000130
2,954,324 UART:
2,954,340 UART: Running Caliptra FMC ...
2,954,748 UART:
2,954,891 UART: [state] CFI Enabled
2,965,316 UART: [fht] FMC Alias Private Key: 7
3,072,653 UART: [art] Extend RT PCRs Done
3,073,081 UART: [art] Lock RT PCRs Done
3,074,475 UART: [art] Populate DV Done
3,082,878 UART: [fht] FMC Alias Private Key: 7
3,083,964 UART: [art] Derive CDI
3,084,244 UART: [art] Store in in slot 0x4
3,169,977 UART: [art] Derive Key Pair
3,170,337 UART: [art] Store priv key in slot 0x5
3,183,941 UART: [art] Derive Key Pair - Done
3,198,351 UART: [art] Signing Cert with AUTHO
3,198,831 UART: RITY.KEYID = 7
3,213,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,214,606 UART: [art] PUB.X = 5B3088A1DFA452E93B565CCA91E2E9AEAE6607A520C7373A489E679D8CB9AAD9D3BB21225CF3D62B0607F0A8D695BEE2
3,221,383 UART: [art] PUB.Y = 1279F4D4BC1D67125141F3D8718FDE8A14CA48B1249E43A58E85C2557E0A8E10680295288BF6946DABBE9791B97050F2
3,228,325 UART: [art] SIG.R = 46B7CF511D910324094E50AD0E534F164701ED42FDA7C9FAD4DA9C34BB4B7CB403217D4DB3057C6BB390998D73BBF5E8
3,235,089 UART: [art] SIG.S = 378C2AAC880958B23DCF2055BC4C1E30C290F797C0A52BE290F0512E091677E646E2E8CF92AEF93F5BEAC3CB901224CA
3,258,932 UART: Caliptra RT
3,259,277 UART: [state] CFI Enabled
3,366,554 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,086 UART: [rt]cmd =0x49444352, len=4
3,404,122 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,107,534 ready_for_fw is high
1,107,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,638,969 >>> mbox cmd response: success
2,638,969 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,701,135 UART:
2,701,151 UART: Running Caliptra FMC ...
2,701,559 UART:
2,701,702 UART: [state] CFI Enabled
2,712,629 UART: [fht] FMC Alias Private Key: 7
2,820,780 UART: [art] Extend RT PCRs Done
2,821,208 UART: [art] Lock RT PCRs Done
2,822,470 UART: [art] Populate DV Done
2,830,467 UART: [fht] FMC Alias Private Key: 7
2,831,507 UART: [art] Derive CDI
2,831,787 UART: [art] Store in in slot 0x4
2,917,200 UART: [art] Derive Key Pair
2,917,560 UART: [art] Store priv key in slot 0x5
2,930,846 UART: [art] Derive Key Pair - Done
2,945,565 UART: [art] Signing Cert with AUTHO
2,946,045 UART: RITY.KEYID = 7
2,961,131 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,896 UART: [art] PUB.X = BE0C75310B41DF47E58D0C2512540BAA70CE812C2F66E1A977D72C93C2FF3782E5C0C53D2106C988981DE5A5A75F860B
2,968,654 UART: [art] PUB.Y = D2A1FE8F95146242CC861F1C20F61E78440C2C132296DF4624F98AE1BF2E0BAF60ADEDFE53724EB1F9A083268C3A3937
2,975,608 UART: [art] SIG.R = 978E589F0495DDC30EA3A1297E40DA7679EA9A25F179248D3D1B073FBB5966AABC945ACBC0C1ABB33A4675DD9FC59F95
2,982,385 UART: [art] SIG.S = 03C1A4BA5714F1E388835A23F7CC3D718C83E1EA7C63587B8A5289A323AF0779F6BB2717B453F6C1347C38036F1007A6
3,006,404 UART: Caliptra RT
3,006,749 UART: [state] CFI Enabled
3,114,066 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,450 UART: [rt]cmd =0x49444352, len=4
3,151,486 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,052 UART:
192,416 UART: Running Caliptra ROM ...
193,542 UART:
193,681 UART: [state] CFI Enabled
265,038 UART: [state] LifecycleState = Unprovisioned
267,016 UART: [state] DebugLocked = No
268,621 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,253 UART: [kat] SHA2-256
443,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,508 UART: [kat] ++
455,033 UART: [kat] sha1
465,770 UART: [kat] SHA2-256
468,484 UART: [kat] SHA2-384
474,625 UART: [kat] SHA2-512-ACC
476,998 UART: [kat] ECC-384
2,767,048 UART: [kat] HMAC-384Kdf
2,798,816 UART: [kat] LMS
3,989,127 UART: [kat] --
3,992,719 UART: [cold-reset] ++
3,993,727 UART: [fht] Storing FHT @ 0x50003400
4,005,481 UART: [idev] ++
4,006,052 UART: [idev] CDI.KEYID = 6
4,006,966 UART: [idev] SUBJECT.KEYID = 7
4,008,214 UART: [idev] UDS.KEYID = 0
4,009,253 ready_for_fw is high
4,009,447 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,152,640 UART: [idev] Erasing UDS.KEYID = 0
7,344,391 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,943 UART: [idev] --
7,370,552 UART: [ldev] ++
7,371,115 UART: [ldev] CDI.KEYID = 6
7,372,076 UART: [ldev] SUBJECT.KEYID = 5
7,373,282 UART: [ldev] AUTHORITY.KEYID = 7
7,374,561 UART: [ldev] FE.KEYID = 1
7,421,785 UART: [ldev] Erasing FE.KEYID = 1
10,755,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,677 UART: [ldev] --
13,136,607 UART: [fwproc] Waiting for Commands...
13,138,363 UART: [fwproc] Received command 0x46574c44
13,140,542 UART: [fwproc] Received Image of size 113844 bytes
17,186,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,261,735 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,647,114 >>> mbox cmd response: success
17,652,023 UART: [afmc] ++
17,652,633 UART: [afmc] CDI.KEYID = 6
17,653,574 UART: [afmc] SUBJECT.KEYID = 7
17,654,783 UART: [afmc] AUTHORITY.KEYID = 5
21,028,062 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,634 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,899 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,302 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,177 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,604 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,958 UART: [afmc] --
23,399,081 UART: [cold-reset] --
23,402,989 UART: [state] Locking Datavault
23,408,851 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,650 UART: [state] Locking ICCM
23,412,294 UART: [exit] Launching FMC @ 0x40000130
23,420,637 UART:
23,420,873 UART: Running Caliptra FMC ...
23,421,969 UART:
23,422,125 UART: [state] CFI Enabled
23,485,346 UART: [fht] FMC Alias Private Key: 7
25,823,365 UART: [art] Extend RT PCRs Done
25,824,588 UART: [art] Lock RT PCRs Done
25,826,102 UART: [art] Populate DV Done
25,831,615 UART: [fht] FMC Alias Private Key: 7
25,833,207 UART: [art] Derive CDI
25,834,015 UART: [art] Store in in slot 0x4
25,893,685 UART: [art] Derive Key Pair
25,894,720 UART: [art] Store priv key in slot 0x5
29,187,505 UART: [art] Derive Key Pair - Done
29,200,448 UART: [art] Signing Cert with AUTHO
29,201,748 UART: RITY.KEYID = 7
31,489,239 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,745 UART: [art] PUB.X = BF74842071F543B86D162F0C0B0C4FB8BD319F8D5C6940318C1F0B114C3FFE86DD52FD2E74AAB912A5F798898752D438
31,497,997 UART: [art] PUB.Y = 55CA591BB8157AC6CFCE7CAD0039122214590994A21E4DA64793BBB1623E4AB973C761376AFCAEC6C231D4C2A18E6E39
31,505,249 UART: [art] SIG.R = CC50B6015EB1C243DDEB736EF62CB60031A6C6E7EFA6AA3CDB5BE4095D2272F8E40C6091C4EE6351C88BD8EC8F502A5C
31,512,601 UART: [art] SIG.S = 51CD8499D16AB24B4FFD92DD91DFB5A5FBE663B6DC5F88EADAC82EE15CC5D2FCEF7CAA72AF2BF2205B85AA96D8638CDD
32,817,376 UART: Caliptra RT
32,818,089 UART: [state] CFI Enabled
32,977,643 UART: [rt] RT listening for mailbox commands...
32,979,527 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,009,754 UART: [rt]cmd =0x49444352, len=4
33,011,489 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,805,326 ready_for_fw is high
3,805,707 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,867,574 >>> mbox cmd response: success
23,556,970 UART:
23,557,349 UART: Running Caliptra FMC ...
23,558,480 UART:
23,558,637 UART: [state] CFI Enabled
23,609,179 UART: [fht] FMC Alias Private Key: 7
25,947,433 UART: [art] Extend RT PCRs Done
25,948,658 UART: [art] Lock RT PCRs Done
25,950,061 UART: [art] Populate DV Done
25,955,421 UART: [fht] FMC Alias Private Key: 7
25,956,958 UART: [art] Derive CDI
25,957,767 UART: [art] Store in in slot 0x4
26,018,917 UART: [art] Derive Key Pair
26,019,953 UART: [art] Store priv key in slot 0x5
29,312,574 UART: [art] Derive Key Pair - Done
29,325,810 UART: [art] Signing Cert with AUTHO
29,327,122 UART: RITY.KEYID = 7
31,613,973 UART: [art] Erasing AUTHORITY.KEYID = 7
31,615,480 UART: [art] PUB.X = E418C43F8405139002B27BEAEA1F723F07300462BAC65F92C779004D88BE7DF1C962A2C0E3707A84375347DA5967CD2E
31,622,814 UART: [art] PUB.Y = 3BD8BE0A519A66C6299AD66CF6E949E7A231560345707FCC336B0E2A4AED4AF8B786B6D4C847F37AE8C95446C316ED05
31,630,014 UART: [art] SIG.R = E0820DAA290E524D2AD8DD13A9EB2B4134BDB7FCF4B4D4E5F3B66B5CBA1F506CEAB3C54BF43AB034B1D7BFA34421E7E6
31,637,461 UART: [art] SIG.S = A6D8D1951DA09B0AAF4B196BD48EFD1A0BA1D37BF69F6E12966D38DE41C1716FE5AA2D0381DCAAC0B92F834256B4F6D5
32,943,004 UART: Caliptra RT
32,943,725 UART: [state] CFI Enabled
33,104,514 UART: [rt] RT listening for mailbox commands...
33,106,357 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,136,834 UART: [rt]cmd =0x49444352, len=4
33,138,541 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,395 UART:
192,770 UART: Running Caliptra ROM ...
194,082 UART:
603,484 UART: [state] CFI Enabled
618,085 UART: [state] LifecycleState = Unprovisioned
620,068 UART: [state] DebugLocked = No
621,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,038 UART: [kat] SHA2-256
796,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,352 UART: [kat] ++
807,880 UART: [kat] sha1
818,781 UART: [kat] SHA2-256
821,441 UART: [kat] SHA2-384
826,645 UART: [kat] SHA2-512-ACC
829,009 UART: [kat] ECC-384
3,114,945 UART: [kat] HMAC-384Kdf
3,126,900 UART: [kat] LMS
4,317,016 UART: [kat] --
4,322,430 UART: [cold-reset] ++
4,324,719 UART: [fht] Storing FHT @ 0x50003400
4,337,688 UART: [idev] ++
4,338,253 UART: [idev] CDI.KEYID = 6
4,339,285 UART: [idev] SUBJECT.KEYID = 7
4,340,464 UART: [idev] UDS.KEYID = 0
4,341,449 ready_for_fw is high
4,341,654 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,639 UART: [idev] Erasing UDS.KEYID = 0
7,626,312 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,472 UART: [idev] --
7,649,864 UART: [ldev] ++
7,650,457 UART: [ldev] CDI.KEYID = 6
7,651,428 UART: [ldev] SUBJECT.KEYID = 5
7,652,644 UART: [ldev] AUTHORITY.KEYID = 7
7,653,872 UART: [ldev] FE.KEYID = 1
7,664,787 UART: [ldev] Erasing FE.KEYID = 1
10,953,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,931 UART: [ldev] --
13,313,109 UART: [fwproc] Waiting for Commands...
13,314,823 UART: [fwproc] Received command 0x46574c44
13,317,022 UART: [fwproc] Received Image of size 113844 bytes
17,360,373 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,623 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,821,643 >>> mbox cmd response: success
17,826,242 UART: [afmc] ++
17,826,901 UART: [afmc] CDI.KEYID = 6
17,827,812 UART: [afmc] SUBJECT.KEYID = 7
17,829,027 UART: [afmc] AUTHORITY.KEYID = 5
21,143,580 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,976 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,347 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,166 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,638 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,507,365 UART: [afmc] --
23,510,714 UART: [cold-reset] --
23,515,773 UART: [state] Locking Datavault
23,521,292 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,993 UART: [state] Locking ICCM
23,524,440 UART: [exit] Launching FMC @ 0x40000130
23,532,840 UART:
23,533,083 UART: Running Caliptra FMC ...
23,534,185 UART:
23,534,350 UART: [state] CFI Enabled
23,542,374 UART: [fht] FMC Alias Private Key: 7
25,874,277 UART: [art] Extend RT PCRs Done
25,875,520 UART: [art] Lock RT PCRs Done
25,877,211 UART: [art] Populate DV Done
25,882,624 UART: [fht] FMC Alias Private Key: 7
25,884,336 UART: [art] Derive CDI
25,885,157 UART: [art] Store in in slot 0x4
25,927,697 UART: [art] Derive Key Pair
25,928,741 UART: [art] Store priv key in slot 0x5
29,170,147 UART: [art] Derive Key Pair - Done
29,183,242 UART: [art] Signing Cert with AUTHO
29,184,543 UART: RITY.KEYID = 7
31,463,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,435 UART: [art] PUB.X = D14312DAF040ACEB8F731FD42D4017D93531AEC483245EEE1949A86D8656EDB42B68B43DE28AF55516DDF8B4D3DAC3F0
31,472,697 UART: [art] PUB.Y = 3FBEA879AA1929F6F9C9C4450E1E2840D1CE32FE98280BB9ABEE5F35D0E623CA1F98B865188C6B01CF36C1C42B096EE7
31,479,939 UART: [art] SIG.R = A4A478C4DBB98AB01AF90AF851D223E7582A1AD72DE39A9D8B46AF80DFF24B7080D4E82266C30D9764116A33D88405B4
31,487,344 UART: [art] SIG.S = 87F781DA5320970A8E1A27F681F3F3AB02619D6FECFD49867BD00CE4FAF3340955F0E98C39449B8269993F9CC19CDA7A
32,793,078 UART: Caliptra RT
32,793,804 UART: [state] CFI Enabled
32,911,622 UART: [rt] RT listening for mailbox commands...
32,913,463 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
32,943,847 UART: [rt]cmd =0x49444352, len=4
32,945,454 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
4,128,675 ready_for_fw is high
4,129,064 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,065,415 >>> mbox cmd response: success
23,709,044 UART:
23,709,465 UART: Running Caliptra FMC ...
23,710,579 UART:
23,710,735 UART: [state] CFI Enabled
23,718,416 UART: [fht] FMC Alias Private Key: 7
26,049,031 UART: [art] Extend RT PCRs Done
26,050,275 UART: [art] Lock RT PCRs Done
26,051,552 UART: [art] Populate DV Done
26,056,881 UART: [fht] FMC Alias Private Key: 7
26,058,519 UART: [art] Derive CDI
26,059,268 UART: [art] Store in in slot 0x4
26,101,705 UART: [art] Derive Key Pair
26,102,705 UART: [art] Store priv key in slot 0x5
29,345,282 UART: [art] Derive Key Pair - Done
29,358,118 UART: [art] Signing Cert with AUTHO
29,359,418 UART: RITY.KEYID = 7
31,638,820 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,348 UART: [art] PUB.X = E7D3E5FA7922307B57A87B0241A962BABAACB4027F8AE3897C94A8F9FFC6DD4420A23666628E7E446079C68A5B9349B5
31,647,544 UART: [art] PUB.Y = 3796520C34EC78949C10DA26D56CA82A50C87F422C2492433C0594F467E25E19FFA93497368F37445BFE6F2C992A77D6
31,654,807 UART: [art] SIG.R = A718E82665B73908634377CB9EC529B153BE7841CE2CC4B33F6275BF5D0149AD84F07561B9D6349F0D7BF44A37D74213
31,662,159 UART: [art] SIG.S = B1695A43877B52EE9BF0FFDEAE1C79CD1AF9210ACD1524DBBA2D278C330620BF0B828D5D753AC7545CC66DE1EB7EEF1E
32,967,476 UART: Caliptra RT
32,968,187 UART: [state] CFI Enabled
33,086,489 UART: [rt] RT listening for mailbox commands...
33,088,329 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,118,766 UART: [rt]cmd =0x49444352, len=4
33,120,751 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,073 UART:
192,446 UART: Running Caliptra ROM ...
193,580 UART:
193,727 UART: [state] CFI Enabled
262,098 UART: [state] LifecycleState = Unprovisioned
263,963 UART: [state] DebugLocked = No
265,708 UART: [state] WD Timer not started. Device not locked for debugging
269,035 UART: [kat] SHA2-256
448,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,785 UART: [kat] ++
460,317 UART: [kat] sha1
471,762 UART: [kat] SHA2-256
474,765 UART: [kat] SHA2-384
479,542 UART: [kat] SHA2-512-ACC
482,475 UART: [kat] ECC-384
2,927,092 UART: [kat] HMAC-384Kdf
2,950,067 UART: [kat] LMS
3,479,564 UART: [kat] --
3,483,443 UART: [cold-reset] ++
3,485,661 UART: [fht] FHT @ 0x50003400
3,496,357 UART: [idev] ++
3,496,927 UART: [idev] CDI.KEYID = 6
3,497,812 UART: [idev] SUBJECT.KEYID = 7
3,499,061 UART: [idev] UDS.KEYID = 0
3,499,990 ready_for_fw is high
3,500,186 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,643,797 UART: [idev] Erasing UDS.KEYID = 0
6,002,900 UART: [idev] Sha1 KeyId Algorithm
6,026,304 UART: [idev] --
6,030,032 UART: [ldev] ++
6,030,616 UART: [ldev] CDI.KEYID = 6
6,031,730 UART: [ldev] SUBJECT.KEYID = 5
6,032,810 UART: [ldev] AUTHORITY.KEYID = 7
6,033,998 UART: [ldev] FE.KEYID = 1
6,080,243 UART: [ldev] Erasing FE.KEYID = 1
8,588,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,671 UART: [ldev] --
10,395,297 UART: [fwproc] Wait for Commands...
10,397,608 UART: [fwproc] Recv command 0x46574c44
10,399,645 UART: [fwproc] Recv'd Img size: 114168 bytes
13,799,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,871,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,256,717 >>> mbox cmd response: success
14,261,741 UART: [afmc] ++
14,262,343 UART: [afmc] CDI.KEYID = 6
14,263,256 UART: [afmc] SUBJECT.KEYID = 7
14,264,353 UART: [afmc] AUTHORITY.KEYID = 5
16,786,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,511,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,984 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,528,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,544,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,560,638 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,323 UART: [afmc] --
18,587,999 UART: [cold-reset] --
18,590,187 UART: [state] Locking Datavault
18,595,931 UART: [state] Locking PCR0, PCR1 and PCR31
18,597,623 UART: [state] Locking ICCM
18,598,976 UART: [exit] Launching FMC @ 0x40000130
18,607,392 UART:
18,607,631 UART: Running Caliptra FMC ...
18,608,732 UART:
18,608,905 UART: [state] CFI Enabled
18,669,105 UART: [fht] FMC Alias Private Key: 7
20,433,195 UART: [art] Extend RT PCRs Done
20,434,409 UART: [art] Lock RT PCRs Done
20,436,143 UART: [art] Populate DV Done
20,441,736 UART: [fht] FMC Alias Private Key: 7
20,443,276 UART: [art] Derive CDI
20,444,094 UART: [art] Store in in slot 0x4
20,501,459 UART: [art] Derive Key Pair
20,502,460 UART: [art] Store priv key in slot 0x5
22,965,367 UART: [art] Derive Key Pair - Done
22,978,259 UART: [art] Signing Cert with AUTHO
22,979,565 UART: RITY.KEYID = 7
24,691,979 UART: [art] Erasing AUTHORITY.KEYID = 7
24,693,480 UART: [art] PUB.X = 2E983D2B29B32DEDD1097DA5A799A57B9740EBDCB30E550A0B440F94CD3401CDF16E21C60F6C3ABCEC351DD03A9C7B83
24,700,729 UART: [art] PUB.Y = DC312BF3B3797B49E13754B569E0A3964344C3528E4C3460C159A6F3A656FE26047B8A9DCAD93D0E5E97583AFFC82B98
24,708,019 UART: [art] SIG.R = E7CF30A57A309DF31841445122A29A09BDD576A22A777B6FC625EC8A9C0E220B5B2EB44F7E527ED223AB7F3CA6B39242
24,715,402 UART: [art] SIG.S = D72634605DC1F13906558A177ADCBEB21EA0A4A2DD31524ADC912D0A96CCEAC7453F648FCAF248EE5D158B740DCD8949
25,694,914 UART: Caliptra RT
25,695,617 UART: [state] CFI Enabled
25,860,515 UART: [rt] RT listening for mailbox commands...
25,862,385 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,892,974 UART: [rt]cmd =0x49444352, len=4
25,894,793 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,358,815 ready_for_fw is high
3,359,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,077,236 >>> mbox cmd response: success
18,364,036 UART:
18,364,443 UART: Running Caliptra FMC ...
18,365,579 UART:
18,365,741 UART: [state] CFI Enabled
18,432,227 UART: [fht] FMC Alias Private Key: 7
20,196,481 UART: [art] Extend RT PCRs Done
20,197,710 UART: [art] Lock RT PCRs Done
20,199,341 UART: [art] Populate DV Done
20,204,547 UART: [fht] FMC Alias Private Key: 7
20,206,035 UART: [art] Derive CDI
20,206,855 UART: [art] Store in in slot 0x4
20,264,548 UART: [art] Derive Key Pair
20,265,589 UART: [art] Store priv key in slot 0x5
22,728,664 UART: [art] Derive Key Pair - Done
22,741,542 UART: [art] Signing Cert with AUTHO
22,742,855 UART: RITY.KEYID = 7
24,453,903 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,414 UART: [art] PUB.X = 983E091396E22DAC57F64BE973C1551698707B0D85C84D62ED721AE4886F4F57C97DC4186D77F7F98A0DC62D4A702181
24,462,645 UART: [art] PUB.Y = 8E5B86F5C0A56D67914DD6AA17D7BD07D2AA8CC50C9B581EF0D10A2ACCA164FB859F7692CB67A2A326DF8D7CA972FD5C
24,469,930 UART: [art] SIG.R = 350B18A543E003A4B3873E7B86A67A54DA9D3F0A3921BD58D6DE68ABB06AC16FEBDA2A53D8675D3AD7732EE447AA26C2
24,477,374 UART: [art] SIG.S = D02565B361D8C0E36322035F670BE949D5A39B4DD715419DAA013C2FDD0E0B863EFC7866CD9838E6254CBECB2F39193B
25,456,122 UART: Caliptra RT
25,456,826 UART: [state] CFI Enabled
25,621,191 UART: [rt] RT listening for mailbox commands...
25,623,031 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,653,211 UART: [rt]cmd =0x49444352, len=4
25,654,947 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,736 writing to cptra_bootfsm_go
193,000 UART:
193,381 UART: Running Caliptra ROM ...
194,550 UART:
604,294 UART: [state] CFI Enabled
614,689 UART: [state] LifecycleState = Unprovisioned
616,560 UART: [state] DebugLocked = No
617,798 UART: [state] WD Timer not started. Device not locked for debugging
621,763 UART: [kat] SHA2-256
800,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,456 UART: [kat] ++
812,986 UART: [kat] sha1
824,220 UART: [kat] SHA2-256
827,230 UART: [kat] SHA2-384
832,438 UART: [kat] SHA2-512-ACC
835,442 UART: [kat] ECC-384
3,278,528 UART: [kat] HMAC-384Kdf
3,292,058 UART: [kat] LMS
3,821,510 UART: [kat] --
3,827,649 UART: [cold-reset] ++
3,829,369 UART: [fht] FHT @ 0x50003400
3,841,833 UART: [idev] ++
3,842,409 UART: [idev] CDI.KEYID = 6
3,843,321 UART: [idev] SUBJECT.KEYID = 7
3,844,495 UART: [idev] UDS.KEYID = 0
3,845,429 ready_for_fw is high
3,845,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,365 UART: [idev] Erasing UDS.KEYID = 0
6,313,473 UART: [idev] Sha1 KeyId Algorithm
6,336,315 UART: [idev] --
6,340,825 UART: [ldev] ++
6,341,403 UART: [ldev] CDI.KEYID = 6
6,342,316 UART: [ldev] SUBJECT.KEYID = 5
6,343,471 UART: [ldev] AUTHORITY.KEYID = 7
6,344,753 UART: [ldev] FE.KEYID = 1
6,356,120 UART: [ldev] Erasing FE.KEYID = 1
8,829,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,865 UART: [ldev] --
10,624,534 UART: [fwproc] Wait for Commands...
10,627,598 UART: [fwproc] Recv command 0x46574c44
10,629,693 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,355 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,486,030 >>> mbox cmd response: success
14,490,828 UART: [afmc] ++
14,491,465 UART: [afmc] CDI.KEYID = 6
14,492,404 UART: [afmc] SUBJECT.KEYID = 7
14,493,515 UART: [afmc] AUTHORITY.KEYID = 5
16,992,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,194 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,981 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,829 UART: [afmc] --
18,788,144 UART: [cold-reset] --
18,792,919 UART: [state] Locking Datavault
18,798,105 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,798 UART: [state] Locking ICCM
18,801,760 UART: [exit] Launching FMC @ 0x40000130
18,810,208 UART:
18,810,489 UART: Running Caliptra FMC ...
18,811,538 UART:
18,811,688 UART: [state] CFI Enabled
18,819,688 UART: [fht] FMC Alias Private Key: 7
20,576,247 UART: [art] Extend RT PCRs Done
20,577,499 UART: [art] Lock RT PCRs Done
20,579,150 UART: [art] Populate DV Done
20,584,616 UART: [fht] FMC Alias Private Key: 7
20,586,314 UART: [art] Derive CDI
20,587,130 UART: [art] Store in in slot 0x4
20,629,520 UART: [art] Derive Key Pair
20,630,519 UART: [art] Store priv key in slot 0x5
23,057,217 UART: [art] Derive Key Pair - Done
23,069,895 UART: [art] Signing Cert with AUTHO
23,071,203 UART: RITY.KEYID = 7
24,776,030 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,528 UART: [art] PUB.X = CDDF7739078831795B1FE2E4206D8FA7AB8689DE53725104665DEAFAA76D62F34931A0C614E205B331B072DA1EE1AADE
24,784,857 UART: [art] PUB.Y = 291BADAF37681237E6DAC8F4500D232DF9193C69F6BB2A1D97ACB24CB4A22C49AA0062DB513493FDCC6D0D2BF7862B4D
24,792,097 UART: [art] SIG.R = 1664A7EED275378DD3AB2489BAC9B2FADA1E509BA22C90FD7F7AC76444BFB1C0AD301DF59691039636CC78F492E00799
24,799,504 UART: [art] SIG.S = 97876738FC28948E2E07BF9D018A55824486F49BA7E9F741F9C7B17B181F1D1C7D01611753160F27ABD0629508EB21A6
25,778,495 UART: Caliptra RT
25,779,193 UART: [state] CFI Enabled
25,896,362 UART: [rt] RT listening for mailbox commands...
25,898,196 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,928,334 UART: [rt]cmd =0x49444352, len=4
25,930,357 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,864 writing to cptra_bootfsm_go
3,700,533 ready_for_fw is high
3,701,073 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,278,871 >>> mbox cmd response: success
18,533,028 UART:
18,533,438 UART: Running Caliptra FMC ...
18,534,577 UART:
18,534,742 UART: [state] CFI Enabled
18,542,465 UART: [fht] FMC Alias Private Key: 7
20,299,390 UART: [art] Extend RT PCRs Done
20,300,616 UART: [art] Lock RT PCRs Done
20,302,349 UART: [art] Populate DV Done
20,307,759 UART: [fht] FMC Alias Private Key: 7
20,309,306 UART: [art] Derive CDI
20,310,068 UART: [art] Store in in slot 0x4
20,352,936 UART: [art] Derive Key Pair
20,353,939 UART: [art] Store priv key in slot 0x5
22,780,914 UART: [art] Derive Key Pair - Done
22,793,750 UART: [art] Signing Cert with AUTHO
22,795,060 UART: RITY.KEYID = 7
24,499,761 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,281 UART: [art] PUB.X = 95D60E9DE70DBE6327414E61F4B0EEB6B4DB9AAF5B9007916A0B0EF6D571BC800E5ACD7A7BB6DE28F321B132D1138B91
24,508,537 UART: [art] PUB.Y = 76EA9C3567B875FDBFE896D7A3DE1B7443564620F5EB9AC016C1AF8CD797C79A767723D88C52FFFC9B8EE463E227A9DB
24,515,850 UART: [art] SIG.R = 0BDF09E9EE9EF47D976617EAA36A7906B06A87C416A19FD99B3CB97B3A3F2F86AF84ADD62604B3E37CA3E5F1409168E6
24,523,247 UART: [art] SIG.S = 10B6CBEAEEABA6786ECA444F01397D24F9D686A0846898800C689A3E7456C605BAD3236C4111A3BC3278C5EBBB56F1D9
25,502,437 UART: Caliptra RT
25,503,133 UART: [state] CFI Enabled
25,621,157 UART: [rt] RT listening for mailbox commands...
25,622,986 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,653,326 UART: [rt]cmd =0x49444352, len=4
25,654,950 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,055 UART:
192,420 UART: Running Caliptra ROM ...
193,564 UART:
193,711 UART: [state] CFI Enabled
261,168 UART: [state] LifecycleState = Unprovisioned
263,233 UART: [state] DebugLocked = No
265,554 UART: [state] WD Timer not started. Device not locked for debugging
269,887 UART: [kat] SHA2-256
459,794 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,528 UART: [kat] ++
471,000 UART: [kat] sha1
481,760 UART: [kat] SHA2-256
484,823 UART: [kat] SHA2-384
492,033 UART: [kat] SHA2-512-ACC
494,630 UART: [kat] ECC-384
2,946,295 UART: [kat] HMAC-384Kdf
2,973,127 UART: [kat] LMS
3,504,880 UART: [kat] --
3,507,841 UART: [cold-reset] ++
3,509,862 UART: [fht] FHT @ 0x50003400
3,520,601 UART: [idev] ++
3,521,349 UART: [idev] CDI.KEYID = 6
3,522,276 UART: [idev] SUBJECT.KEYID = 7
3,523,459 UART: [idev] UDS.KEYID = 0
3,524,402 ready_for_fw is high
3,524,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,187 UART: [idev] Erasing UDS.KEYID = 0
6,032,835 UART: [idev] Sha1 KeyId Algorithm
6,056,125 UART: [idev] --
6,062,123 UART: [ldev] ++
6,062,809 UART: [ldev] CDI.KEYID = 6
6,063,727 UART: [ldev] SUBJECT.KEYID = 5
6,064,888 UART: [ldev] AUTHORITY.KEYID = 7
6,066,067 UART: [ldev] FE.KEYID = 1
6,102,799 UART: [ldev] Erasing FE.KEYID = 1
8,606,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,026 UART: [ldev] --
10,417,305 UART: [fwproc] Wait for Commands...
10,419,669 UART: [fwproc] Recv command 0x46574c44
10,421,974 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,394 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,545 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,596,229 >>> mbox cmd response: success
14,600,938 UART: [afmc] ++
14,601,658 UART: [afmc] CDI.KEYID = 6
14,602,854 UART: [afmc] SUBJECT.KEYID = 7
14,604,351 UART: [afmc] AUTHORITY.KEYID = 5
17,134,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,858,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,860,766 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,875,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,891,080 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,906,135 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,931,204 UART: [afmc] --
18,935,443 UART: [cold-reset] --
18,940,016 UART: [state] Locking Datavault
18,945,065 UART: [state] Locking PCR0, PCR1 and PCR31
18,947,227 UART: [state] Locking ICCM
18,949,704 UART: [exit] Launching FMC @ 0x40000130
18,958,341 UART:
18,958,611 UART: Running Caliptra FMC ...
18,959,718 UART:
18,959,880 UART: [state] CFI Enabled
19,014,771 UART: [fht] FMC Alias Private Key: 7
20,779,199 UART: [art] Extend RT PCRs Done
20,780,421 UART: [art] Lock RT PCRs Done
20,782,099 UART: [art] Populate DV Done
20,787,427 UART: [fht] FMC Alias Private Key: 7
20,789,140 UART: [art] Derive CDI
20,789,956 UART: [art] Store in in slot 0x4
20,846,839 UART: [art] Derive Key Pair
20,847,880 UART: [art] Store priv key in slot 0x5
23,310,709 UART: [art] Derive Key Pair - Done
23,323,702 UART: [art] Signing Cert with AUTHO
23,324,997 UART: RITY.KEYID = 7
25,036,627 UART: [art] Erasing AUTHORITY.KEYID = 7
25,038,277 UART: [art] PUB.X = 2C30E0EBA13B84EF485D4241062853D85E979B775F755750DA2E52E36166C9FA486D7014F43D8F20D20B332E1AB68551
25,045,339 UART: [art] PUB.Y = 44A21F73BB968558E5CEB7A9A47F69027575CD93C1F792EB15D305A01E2CBA95C9B4517A9BE0ED61EA5CE5F8E34A7CD2
25,052,657 UART: [art] SIG.R = 91EEDD4D986E6CA1C96FB327D69D32483A4BE2CC4F7AE2C33AB21E02588356E8AE784EA62D9B1B8539638EC08EDFFA6E
25,060,039 UART: [art] SIG.S = 32FA73ACB7C6B04A899DC6EE91F896EB91C421FFD2D74383DBA410B7E0044C57A4299B5B94AB13DC799BA4AE0D521F9B
26,038,591 UART: Caliptra RT
26,039,282 UART: [state] CFI Enabled
26,203,893 UART: [rt] RT listening for mailbox commands...
26,205,757 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,236,234 UART: [rt]cmd =0x49444352, len=4
26,237,861 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,438,320 ready_for_fw is high
3,438,729 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,732,369 >>> mbox cmd response: success
19,044,268 UART:
19,044,659 UART: Running Caliptra FMC ...
19,045,776 UART:
19,045,935 UART: [state] CFI Enabled
19,111,631 UART: [fht] FMC Alias Private Key: 7
20,875,302 UART: [art] Extend RT PCRs Done
20,876,531 UART: [art] Lock RT PCRs Done
20,878,152 UART: [art] Populate DV Done
20,883,624 UART: [fht] FMC Alias Private Key: 7
20,885,167 UART: [art] Derive CDI
20,885,904 UART: [art] Store in in slot 0x4
20,944,083 UART: [art] Derive Key Pair
20,945,124 UART: [art] Store priv key in slot 0x5
23,407,830 UART: [art] Derive Key Pair - Done
23,420,942 UART: [art] Signing Cert with AUTHO
23,422,251 UART: RITY.KEYID = 7
25,133,842 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,349 UART: [art] PUB.X = A5E42EE4E0E93DA3B9BD232F2622BA2482B7F6CD84BD211C2A21CF28C8B7C9445710D8BD679810DC40985CA8C7B5AA88
25,142,635 UART: [art] PUB.Y = 8C8064176E6ED655E7D1D1354126267423F40CC6CDEEB9BDE05249944BAD7DB8F11C9B89A59D0BCC92B216461E6AEE96
25,149,902 UART: [art] SIG.R = EC754ED138BA484200650A8B346E746FF49F6E7326AD1C1B38660FE3D89DA35C0B61CC1AC8797FB159C88E55B846E3EB
25,157,343 UART: [art] SIG.S = 27705A02BED80437BA89231BB74C3B68AF6463B2D61AF65ACAB471799174FA166ECCB7BBF632112EF4443E3C340E4B57
26,135,845 UART: Caliptra RT
26,136,554 UART: [state] CFI Enabled
26,301,141 UART: [rt] RT listening for mailbox commands...
26,302,985 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,333,513 UART: [rt]cmd =0x49444352, len=4
26,335,618 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,826 writing to cptra_bootfsm_go
193,017 UART:
193,404 UART: Running Caliptra ROM ...
194,597 UART:
604,049 UART: [state] CFI Enabled
621,976 UART: [state] LifecycleState = Unprovisioned
624,362 UART: [state] DebugLocked = No
626,593 UART: [state] WD Timer not started. Device not locked for debugging
630,338 UART: [kat] SHA2-256
820,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,015 UART: [kat] ++
831,539 UART: [kat] sha1
843,122 UART: [kat] SHA2-256
846,126 UART: [kat] SHA2-384
852,050 UART: [kat] SHA2-512-ACC
854,632 UART: [kat] ECC-384
3,297,609 UART: [kat] HMAC-384Kdf
3,310,816 UART: [kat] LMS
3,842,632 UART: [kat] --
3,847,914 UART: [cold-reset] ++
3,850,281 UART: [fht] FHT @ 0x50003400
3,862,463 UART: [idev] ++
3,863,186 UART: [idev] CDI.KEYID = 6
3,864,114 UART: [idev] SUBJECT.KEYID = 7
3,865,291 UART: [idev] UDS.KEYID = 0
3,866,223 ready_for_fw is high
3,866,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,009,879 UART: [idev] Erasing UDS.KEYID = 0
6,344,791 UART: [idev] Sha1 KeyId Algorithm
6,367,793 UART: [idev] --
6,373,455 UART: [ldev] ++
6,374,184 UART: [ldev] CDI.KEYID = 6
6,375,093 UART: [ldev] SUBJECT.KEYID = 5
6,376,253 UART: [ldev] AUTHORITY.KEYID = 7
6,377,483 UART: [ldev] FE.KEYID = 1
6,387,296 UART: [ldev] Erasing FE.KEYID = 1
8,865,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,428 UART: [ldev] --
10,657,315 UART: [fwproc] Wait for Commands...
10,658,976 UART: [fwproc] Recv command 0x46574c44
10,661,292 UART: [fwproc] Recv'd Img size: 114168 bytes
14,109,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,854 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,096 >>> mbox cmd response: success
14,846,027 UART: [afmc] ++
14,846,740 UART: [afmc] CDI.KEYID = 6
14,847,979 UART: [afmc] SUBJECT.KEYID = 7
14,849,413 UART: [afmc] AUTHORITY.KEYID = 5
17,357,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,953 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,132 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,277 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,281 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,772 UART: [afmc] --
19,152,045 UART: [cold-reset] --
19,157,419 UART: [state] Locking Datavault
19,163,001 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,200 UART: [state] Locking ICCM
19,166,489 UART: [exit] Launching FMC @ 0x40000130
19,175,164 UART:
19,175,400 UART: Running Caliptra FMC ...
19,176,498 UART:
19,176,661 UART: [state] CFI Enabled
19,184,760 UART: [fht] FMC Alias Private Key: 7
20,941,411 UART: [art] Extend RT PCRs Done
20,942,634 UART: [art] Lock RT PCRs Done
20,944,423 UART: [art] Populate DV Done
20,949,781 UART: [fht] FMC Alias Private Key: 7
20,951,299 UART: [art] Derive CDI
20,952,039 UART: [art] Store in in slot 0x4
20,994,692 UART: [art] Derive Key Pair
20,995,693 UART: [art] Store priv key in slot 0x5
23,422,493 UART: [art] Derive Key Pair - Done
23,435,315 UART: [art] Signing Cert with AUTHO
23,436,650 UART: RITY.KEYID = 7
25,142,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,744 UART: [art] PUB.X = A2C428773BB7E1E7E90341062D957173D636AE2B3FE43E67F19D3107ECA87A6561AFE80A2162AB2106986714D21537BD
25,150,987 UART: [art] PUB.Y = 0A744239A2AA6957CFC817AF9B4E7E268D4A1A1EA406E392185B1A709DBF32DF6E5A90E827CAA0BCA72E074851AE3675
25,158,214 UART: [art] SIG.R = 3B2C4E68CF7227D5879303799B7810E717402C925077B9C3CBA9A84D04E1CF33ADE7A97BA4620D7217CDE494A9E588B5
25,165,608 UART: [art] SIG.S = DD887B9C5429D6356F3501F04F3DA094EE17A95294362CEBE88475533728904FC5DB2248D758D9E6B1973046620B6C37
26,144,323 UART: Caliptra RT
26,145,008 UART: [state] CFI Enabled
26,262,304 UART: [rt] RT listening for mailbox commands...
26,264,135 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,294,472 UART: [rt]cmd =0x49444352, len=4
26,296,255 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,683 writing to cptra_bootfsm_go
3,764,743 ready_for_fw is high
3,765,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,849 >>> mbox cmd response: success
19,211,349 UART:
19,211,744 UART: Running Caliptra FMC ...
19,212,848 UART:
19,213,012 UART: [state] CFI Enabled
19,221,125 UART: [fht] FMC Alias Private Key: 7
20,978,335 UART: [art] Extend RT PCRs Done
20,979,551 UART: [art] Lock RT PCRs Done
20,981,042 UART: [art] Populate DV Done
20,986,674 UART: [fht] FMC Alias Private Key: 7
20,988,179 UART: [art] Derive CDI
20,988,922 UART: [art] Store in in slot 0x4
21,031,517 UART: [art] Derive Key Pair
21,032,566 UART: [art] Store priv key in slot 0x5
23,459,156 UART: [art] Derive Key Pair - Done
23,471,997 UART: [art] Signing Cert with AUTHO
23,473,305 UART: RITY.KEYID = 7
25,178,594 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,086 UART: [art] PUB.X = 9E4EFE01C388585977C87E1D867184F60ED8A87C6ADA42AA1DA9F3590FDF39F88DE6989B02116DF45546557EA24232D3
25,187,389 UART: [art] PUB.Y = 96F5783B2190B8685DC96B2F11AA9F5C564E5FEC023A77B8C9B591AD62084F2157DA700C56DF50FB7B358CE1AD04D74E
25,194,620 UART: [art] SIG.R = 34A014751DD564FBBCCAEE602193D55AA11DD458CD63E56AA8FE0A18FE161B9D4F9D897DFE5A4545B9819F93F5285912
25,202,014 UART: [art] SIG.S = E6B66A171663D4D30ED78D8C17E9950B3BBDC41159C0735C66BD04CB3F595B21318316B4641A038348291368E11459E5
26,181,054 UART: Caliptra RT
26,181,771 UART: [state] CFI Enabled
26,298,138 UART: [rt] RT listening for mailbox commands...
26,300,007 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,330,545 UART: [rt]cmd =0x49444352, len=4
26,332,231 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,642 UART: [state] LifecycleState = Unprovisioned
85,297 UART: [state] DebugLocked = No
85,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,401 UART: [kat] SHA2-256
881,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,447 UART: [kat] ++
885,599 UART: [kat] sha1
889,853 UART: [kat] SHA2-256
891,791 UART: [kat] SHA2-384
894,616 UART: [kat] SHA2-512-ACC
896,517 UART: [kat] ECC-384
901,896 UART: [kat] HMAC-384Kdf
906,666 UART: [kat] LMS
1,474,862 UART: [kat] --
1,475,609 UART: [cold-reset] ++
1,476,049 UART: [fht] Storing FHT @ 0x50003400
1,478,814 UART: [idev] ++
1,478,982 UART: [idev] CDI.KEYID = 6
1,479,342 UART: [idev] SUBJECT.KEYID = 7
1,479,766 UART: [idev] UDS.KEYID = 0
1,480,111 ready_for_fw is high
1,480,111 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,906 UART: [idev] Erasing UDS.KEYID = 0
1,504,522 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,254 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,521,213 UART: [ldev] Erasing FE.KEYID = 1
1,546,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,952 UART: [ldev] --
1,585,323 UART: [fwproc] Waiting for Commands...
1,586,164 UART: [fwproc] Received command 0x46574c44
1,586,955 UART: [fwproc] Received Image of size 114168 bytes
2,883,437 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,001 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,064 >>> mbox cmd response: success
3,077,162 UART: [afmc] ++
3,077,330 UART: [afmc] CDI.KEYID = 6
3,077,692 UART: [afmc] SUBJECT.KEYID = 7
3,078,117 UART: [afmc] AUTHORITY.KEYID = 5
3,112,990 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,920 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,313 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,003 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,870 UART: [afmc] --
3,155,784 UART: [cold-reset] --
3,156,752 UART: [state] Locking Datavault
3,158,019 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,623 UART: [state] Locking ICCM
3,159,259 UART: [exit] Launching FMC @ 0x40000130
3,164,588 UART:
3,164,604 UART: Running Caliptra FMC ...
3,165,012 UART:
3,165,066 UART: [state] CFI Enabled
3,175,243 UART: [fht] FMC Alias Private Key: 7
3,282,990 UART: [art] Extend RT PCRs Done
3,283,418 UART: [art] Lock RT PCRs Done
3,285,048 UART: [art] Populate DV Done
3,293,227 UART: [fht] FMC Alias Private Key: 7
3,294,261 UART: [art] Derive CDI
3,294,541 UART: [art] Store in in slot 0x4
3,380,188 UART: [art] Derive Key Pair
3,380,548 UART: [art] Store priv key in slot 0x5
3,393,642 UART: [art] Derive Key Pair - Done
3,408,707 UART: [art] Signing Cert with AUTHO
3,409,187 UART: RITY.KEYID = 7
3,424,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,226 UART: [art] PUB.X = 56138DD45B21DB006925E85E23BDC803C4C039E0F7883E4B43DF510B30B430456D8CC27B9FB5334F884A25E8666F228C
3,431,968 UART: [art] PUB.Y = 9499C85B48D01311CEA32CA18F666F0FFED9B91253FE6002C2825B3A1D7ECE251E36526ED7D16B8ACB290680C4310004
3,438,888 UART: [art] SIG.R = E388D652077D37DB1F8E342D10DC9001CDBB44284699CBE63A8D7F9BCCE82FFE2806900C3CE3563E8348CF74856B34B6
3,445,654 UART: [art] SIG.S = 75A2EFB8D0678EFC769F01077146758D3054ECC2402450764A06476385D607A725433B7DA0D8898BD1C4140AC8769EFB
3,469,444 UART: Caliptra RT
3,469,697 UART: [state] CFI Enabled
3,577,516 UART: [rt] RT listening for mailbox commands...
3,578,186 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,856 UART: [rt]cmd =0x49444352, len=4
3,609,351 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,529 ready_for_fw is high
1,362,529 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,642 >>> mbox cmd response: success
2,986,468 UART:
2,986,484 UART: Running Caliptra FMC ...
2,986,892 UART:
2,986,946 UART: [state] CFI Enabled
2,997,437 UART: [fht] FMC Alias Private Key: 7
3,105,054 UART: [art] Extend RT PCRs Done
3,105,482 UART: [art] Lock RT PCRs Done
3,107,046 UART: [art] Populate DV Done
3,115,107 UART: [fht] FMC Alias Private Key: 7
3,116,065 UART: [art] Derive CDI
3,116,345 UART: [art] Store in in slot 0x4
3,201,710 UART: [art] Derive Key Pair
3,202,070 UART: [art] Store priv key in slot 0x5
3,215,528 UART: [art] Derive Key Pair - Done
3,230,092 UART: [art] Signing Cert with AUTHO
3,230,572 UART: RITY.KEYID = 7
3,246,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,801 UART: [art] PUB.X = 445A0D00EE7692331D9FAFC4380666153630FD88C0A251E6B57A14B6D9B8CD39CC7D6E2DEF7B10EB1C3918F120D848E3
3,253,551 UART: [art] PUB.Y = DEE9165BCE4228294E2CDB00D20E162F955DFC7C25ECB21164085E5BEF895E2C3901B6227BD8F528CA4C773EC565002D
3,260,458 UART: [art] SIG.R = C773FDC9385C6E03ACD3C5990DFC22E58714E4BDC4DE905B765447DFEAA67A801CEC39E01140D0858ECA3114F6C3164D
3,267,236 UART: [art] SIG.S = 4FBEE6BB7721946ECCEFE1DA105856EB42A13E3B7E33680C460DB96BAE9A6E1D9A5394E952E45385F542A958919A633D
3,290,945 UART: Caliptra RT
3,291,198 UART: [state] CFI Enabled
3,399,311 UART: [rt] RT listening for mailbox commands...
3,399,981 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,653 UART: [rt]cmd =0x49444352, len=4
3,431,180 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
891,034 UART: [kat] SHA2-256
892,972 UART: [kat] SHA2-384
895,729 UART: [kat] SHA2-512-ACC
897,630 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,687 UART: [kat] LMS
1,475,883 UART: [kat] --
1,476,772 UART: [cold-reset] ++
1,477,258 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 ready_for_fw is high
1,481,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,845 UART: [idev] Erasing UDS.KEYID = 0
1,505,661 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,131 UART: [idev] --
1,515,138 UART: [ldev] ++
1,515,306 UART: [ldev] CDI.KEYID = 6
1,515,669 UART: [ldev] SUBJECT.KEYID = 5
1,516,095 UART: [ldev] AUTHORITY.KEYID = 7
1,516,558 UART: [ldev] FE.KEYID = 1
1,521,918 UART: [ldev] Erasing FE.KEYID = 1
1,547,505 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,673 UART: [ldev] --
1,586,978 UART: [fwproc] Waiting for Commands...
1,587,623 UART: [fwproc] Received command 0x46574c44
1,588,414 UART: [fwproc] Received Image of size 114168 bytes
2,884,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,544 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,399 >>> mbox cmd response: success
3,078,431 UART: [afmc] ++
3,078,599 UART: [afmc] CDI.KEYID = 6
3,078,961 UART: [afmc] SUBJECT.KEYID = 7
3,079,386 UART: [afmc] AUTHORITY.KEYID = 5
3,114,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,491 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,219 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,104 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,794 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,609 UART: [afmc] --
3,157,551 UART: [cold-reset] --
3,158,527 UART: [state] Locking Datavault
3,159,698 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,302 UART: [state] Locking ICCM
3,160,950 UART: [exit] Launching FMC @ 0x40000130
3,166,279 UART:
3,166,295 UART: Running Caliptra FMC ...
3,166,703 UART:
3,166,846 UART: [state] CFI Enabled
3,177,503 UART: [fht] FMC Alias Private Key: 7
3,284,776 UART: [art] Extend RT PCRs Done
3,285,204 UART: [art] Lock RT PCRs Done
3,286,928 UART: [art] Populate DV Done
3,295,169 UART: [fht] FMC Alias Private Key: 7
3,296,285 UART: [art] Derive CDI
3,296,565 UART: [art] Store in in slot 0x4
3,382,534 UART: [art] Derive Key Pair
3,382,894 UART: [art] Store priv key in slot 0x5
3,396,254 UART: [art] Derive Key Pair - Done
3,410,993 UART: [art] Signing Cert with AUTHO
3,411,473 UART: RITY.KEYID = 7
3,426,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,954 UART: [art] PUB.X = 23B9FA1F0B8C9B762E48D29BCF54582807FA32A98C5CB52993270D58FAADD47D93E56B60E56C806F43E6DA8E2F61D32A
3,433,727 UART: [art] PUB.Y = 7A5FA529F1B54C0609EDBD1F885036069E604C7E3FF450D342B95A7EE53B016C63B3DE077A46E060AE62CC59DA4960FF
3,440,672 UART: [art] SIG.R = 178B161ECF763A0498B088E3EA6334F503096BE35F745AE528C60E2FE701FDF410BB1B3C5A9B84802219F3E58E04F0C5
3,447,428 UART: [art] SIG.S = BAF6EA2C9961823816695F36AB8BBC392CDE35193B8AF506614D6C8C1C83DD6C91A75675EF4394ED20C4427980467DBE
3,470,886 UART: Caliptra RT
3,471,231 UART: [state] CFI Enabled
3,579,946 UART: [rt] RT listening for mailbox commands...
3,580,616 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,668 UART: [rt]cmd =0x49444352, len=4
3,611,815 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 ready_for_fw is high
1,363,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,873 >>> mbox cmd response: success
2,987,971 UART:
2,987,987 UART: Running Caliptra FMC ...
2,988,395 UART:
2,988,538 UART: [state] CFI Enabled
2,999,091 UART: [fht] FMC Alias Private Key: 7
3,106,146 UART: [art] Extend RT PCRs Done
3,106,574 UART: [art] Lock RT PCRs Done
3,108,230 UART: [art] Populate DV Done
3,116,769 UART: [fht] FMC Alias Private Key: 7
3,117,769 UART: [art] Derive CDI
3,118,049 UART: [art] Store in in slot 0x4
3,203,966 UART: [art] Derive Key Pair
3,204,326 UART: [art] Store priv key in slot 0x5
3,217,340 UART: [art] Derive Key Pair - Done
3,232,181 UART: [art] Signing Cert with AUTHO
3,232,661 UART: RITY.KEYID = 7
3,247,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,746 UART: [art] PUB.X = 280D9EDCA9AF110D4322AB1ED674028291D4601472FECA3A153B84672641733C491FBE7B1AE15A964ABC7C21C597EF08
3,255,510 UART: [art] PUB.Y = 247E97873C39A4E733032FCE71A2E891CAEB0FC9B0FDF69A3863DE3C321B1A6D0AEA0EFFAB5965AE51C52FBCE8B4F688
3,262,472 UART: [art] SIG.R = 2B67FFCF82ECF0857478882038521B5BF567A88142722725388F20338A4179089C4C5F357B2F82AA7E864BF4D9A0D4EC
3,269,235 UART: [art] SIG.S = ECD7C2BDCC999EFE4331D04CB6B0384CA9AE96563E542112C654C025871EAFE7DF50DFE2B8BBAE572E63ADC8BA3FC785
3,292,920 UART: Caliptra RT
3,293,265 UART: [state] CFI Enabled
3,401,716 UART: [rt] RT listening for mailbox commands...
3,402,386 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,434 UART: [rt]cmd =0x49444352, len=4
3,433,855 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,893 UART: [state] WD Timer not started. Device not locked for debugging
88,162 UART: [kat] SHA2-256
893,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,937 UART: [kat] ++
898,089 UART: [kat] sha1
902,439 UART: [kat] SHA2-256
904,379 UART: [kat] SHA2-384
907,040 UART: [kat] SHA2-512-ACC
908,941 UART: [kat] ECC-384
918,758 UART: [kat] HMAC-384Kdf
923,394 UART: [kat] LMS
1,171,722 UART: [kat] --
1,172,647 UART: [cold-reset] ++
1,173,009 UART: [fht] FHT @ 0x50003400
1,175,600 UART: [idev] ++
1,175,768 UART: [idev] CDI.KEYID = 6
1,176,128 UART: [idev] SUBJECT.KEYID = 7
1,176,552 UART: [idev] UDS.KEYID = 0
1,176,897 ready_for_fw is high
1,176,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,706 UART: [idev] Erasing UDS.KEYID = 0
1,201,437 UART: [idev] Sha1 KeyId Algorithm
1,209,947 UART: [idev] --
1,210,923 UART: [ldev] ++
1,211,091 UART: [ldev] CDI.KEYID = 6
1,211,454 UART: [ldev] SUBJECT.KEYID = 5
1,211,880 UART: [ldev] AUTHORITY.KEYID = 7
1,212,343 UART: [ldev] FE.KEYID = 1
1,217,235 UART: [ldev] Erasing FE.KEYID = 1
1,243,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,733 UART: [ldev] --
1,282,108 UART: [fwproc] Wait for Commands...
1,282,762 UART: [fwproc] Recv command 0x46574c44
1,283,490 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,193 >>> mbox cmd response: success
2,772,287 UART: [afmc] ++
2,772,455 UART: [afmc] CDI.KEYID = 6
2,772,817 UART: [afmc] SUBJECT.KEYID = 7
2,773,242 UART: [afmc] AUTHORITY.KEYID = 5
2,809,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,332 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,217 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,936 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,682 UART: [afmc] --
2,852,768 UART: [cold-reset] --
2,853,496 UART: [state] Locking Datavault
2,854,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,281 UART: [state] Locking ICCM
2,855,955 UART: [exit] Launching FMC @ 0x40000130
2,861,284 UART:
2,861,300 UART: Running Caliptra FMC ...
2,861,708 UART:
2,861,762 UART: [state] CFI Enabled
2,872,139 UART: [fht] FMC Alias Private Key: 7
2,980,162 UART: [art] Extend RT PCRs Done
2,980,590 UART: [art] Lock RT PCRs Done
2,982,092 UART: [art] Populate DV Done
2,990,553 UART: [fht] FMC Alias Private Key: 7
2,991,641 UART: [art] Derive CDI
2,991,921 UART: [art] Store in in slot 0x4
3,077,434 UART: [art] Derive Key Pair
3,077,794 UART: [art] Store priv key in slot 0x5
3,091,514 UART: [art] Derive Key Pair - Done
3,106,063 UART: [art] Signing Cert with AUTHO
3,106,543 UART: RITY.KEYID = 7
3,121,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,592 UART: [art] PUB.X = 3D42DFAD2DCCB6510C5B7A7683FED7022EAAAE8ADDC80EF122716C23238265A75C136722CD5F131A6E0F916728C2D93E
3,129,364 UART: [art] PUB.Y = 59ACEED0A6AB5C6EC248F2444D138530C0A85740B6C3D015FF08F57DA97493C11FC0CFB49EAC55C6FD2032D69FC7941B
3,136,327 UART: [art] SIG.R = 60A56C80D8AE6FA7D931C15F2E094FA5EA1A46609EFCD1D4A222DE0FD32E8E8C5852482F4006D901B35A549EEDA66F74
3,143,099 UART: [art] SIG.S = 2AD10FEC374DD615B5987123C12BB173330A9A69C21E74460DAB0ADD7EF392C24A1F1C2396A1496D4F467138B601D655
3,166,555 UART: Caliptra RT
3,166,808 UART: [state] CFI Enabled
3,274,991 UART: [rt] RT listening for mailbox commands...
3,275,661 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,765 UART: [rt]cmd =0x49444352, len=4
3,306,926 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,503 ready_for_fw is high
1,060,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,554 >>> mbox cmd response: success
2,686,514 UART:
2,686,530 UART: Running Caliptra FMC ...
2,686,938 UART:
2,686,992 UART: [state] CFI Enabled
2,697,209 UART: [fht] FMC Alias Private Key: 7
2,804,828 UART: [art] Extend RT PCRs Done
2,805,256 UART: [art] Lock RT PCRs Done
2,806,778 UART: [art] Populate DV Done
2,815,163 UART: [fht] FMC Alias Private Key: 7
2,816,169 UART: [art] Derive CDI
2,816,449 UART: [art] Store in in slot 0x4
2,901,822 UART: [art] Derive Key Pair
2,902,182 UART: [art] Store priv key in slot 0x5
2,915,764 UART: [art] Derive Key Pair - Done
2,930,718 UART: [art] Signing Cert with AUTHO
2,931,198 UART: RITY.KEYID = 7
2,946,524 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,289 UART: [art] PUB.X = BBC733EE0B68CDA535DBE37748EBD72EEAB09F7E215C1CB835EEFA672CF6FE9BACEF37B84E2AE2EEC06A7747EFB4ED1B
2,954,096 UART: [art] PUB.Y = 5B3EC5D2515591D0C349C01036985A5815A67FD7165FDE3B3A4386071F35013211444AC1DE946258D9DD35E495145DAC
2,961,034 UART: [art] SIG.R = 543520D9409CAD3145F75EF1925A034E22FE1BC5AAF1770ED4CF7BD86287698C63A2D616761AE6F8F9B9A42E00C86F6A
2,967,784 UART: [art] SIG.S = B3C9CFD8AB028C94D9A310CFBDED1E67AC0908EDC15FAC7E5CE13B3726002ECE375AFD34472B5D3E3F0776DB3CEC76C4
2,991,441 UART: Caliptra RT
2,991,694 UART: [state] CFI Enabled
3,099,533 UART: [rt] RT listening for mailbox commands...
3,100,203 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,811 UART: [rt]cmd =0x49444352, len=4
3,131,292 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
902,076 UART: [kat] SHA2-256
904,016 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,233 UART: [kat] HMAC-384Kdf
922,735 UART: [kat] LMS
1,171,063 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,452 UART: [fht] FHT @ 0x50003400
1,175,117 UART: [idev] ++
1,175,285 UART: [idev] CDI.KEYID = 6
1,175,645 UART: [idev] SUBJECT.KEYID = 7
1,176,069 UART: [idev] UDS.KEYID = 0
1,176,414 ready_for_fw is high
1,176,414 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,263 UART: [idev] Erasing UDS.KEYID = 0
1,201,440 UART: [idev] Sha1 KeyId Algorithm
1,209,876 UART: [idev] --
1,210,966 UART: [ldev] ++
1,211,134 UART: [ldev] CDI.KEYID = 6
1,211,497 UART: [ldev] SUBJECT.KEYID = 5
1,211,923 UART: [ldev] AUTHORITY.KEYID = 7
1,212,386 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,243,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,594 UART: [ldev] --
1,283,083 UART: [fwproc] Wait for Commands...
1,283,659 UART: [fwproc] Recv command 0x46574c44
1,284,387 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,896 >>> mbox cmd response: success
2,775,068 UART: [afmc] ++
2,775,236 UART: [afmc] CDI.KEYID = 6
2,775,598 UART: [afmc] SUBJECT.KEYID = 7
2,776,023 UART: [afmc] AUTHORITY.KEYID = 5
2,812,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,713 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,029 UART: [afmc] --
2,855,151 UART: [cold-reset] --
2,856,045 UART: [state] Locking Datavault
2,857,312 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,916 UART: [state] Locking ICCM
2,858,392 UART: [exit] Launching FMC @ 0x40000130
2,863,721 UART:
2,863,737 UART: Running Caliptra FMC ...
2,864,145 UART:
2,864,288 UART: [state] CFI Enabled
2,875,357 UART: [fht] FMC Alias Private Key: 7
2,983,546 UART: [art] Extend RT PCRs Done
2,983,974 UART: [art] Lock RT PCRs Done
2,985,432 UART: [art] Populate DV Done
2,993,561 UART: [fht] FMC Alias Private Key: 7
2,994,645 UART: [art] Derive CDI
2,994,925 UART: [art] Store in in slot 0x4
3,080,866 UART: [art] Derive Key Pair
3,081,226 UART: [art] Store priv key in slot 0x5
3,094,958 UART: [art] Derive Key Pair - Done
3,109,542 UART: [art] Signing Cert with AUTHO
3,110,022 UART: RITY.KEYID = 7
3,125,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,159 UART: [art] PUB.X = 5156EAD1CA8BF68FBBD7D0BFDA71EF90B7279EFBBC1EAA47EE0D5C519F0714F5FED0D13681F7B37D337CCD4F5AEAA7DA
3,132,961 UART: [art] PUB.Y = 1A184E60DFFAA5F23AAE84E4AFD5943208921E409C18374A15B982B3A48EA27260EDC6A31248D077D4E1BAC04237656B
3,139,914 UART: [art] SIG.R = 1F79D91322EE5CE8B1485B74DAAE879E5EADF83C4E5E03A807353CC7281E2A84E3E04BF45F8C73ADC27EDB77D515DCA7
3,146,698 UART: [art] SIG.S = 478B273913DAC4DC645EA5ED454CF51E868DA661918E2D0A915E93EB84C3BDB7259350F59FC6C27C8A5699F86ECDAB41
3,170,696 UART: Caliptra RT
3,171,041 UART: [state] CFI Enabled
3,278,850 UART: [rt] RT listening for mailbox commands...
3,279,520 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,286 UART: [rt]cmd =0x49444352, len=4
3,310,933 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,980 ready_for_fw is high
1,059,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,269 >>> mbox cmd response: success
2,686,261 UART:
2,686,277 UART: Running Caliptra FMC ...
2,686,685 UART:
2,686,828 UART: [state] CFI Enabled
2,697,147 UART: [fht] FMC Alias Private Key: 7
2,804,918 UART: [art] Extend RT PCRs Done
2,805,346 UART: [art] Lock RT PCRs Done
2,806,998 UART: [art] Populate DV Done
2,815,333 UART: [fht] FMC Alias Private Key: 7
2,816,315 UART: [art] Derive CDI
2,816,595 UART: [art] Store in in slot 0x4
2,902,182 UART: [art] Derive Key Pair
2,902,542 UART: [art] Store priv key in slot 0x5
2,915,812 UART: [art] Derive Key Pair - Done
2,930,736 UART: [art] Signing Cert with AUTHO
2,931,216 UART: RITY.KEYID = 7
2,946,132 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,897 UART: [art] PUB.X = A0D3ADFC75AC70CFC5A76F74A7C875E5F94D5C2A9EDD5D8E11796952791D089C76A683FBC166089E3C65DC89A6975756
2,953,671 UART: [art] PUB.Y = 2E9BA8EB8FD7B06B7B0F6955D0F968ADF94F7B41B24CC0432796A03A73F81429EFBAF47E674B519BE6DDAFB64028F665
2,960,634 UART: [art] SIG.R = 5903D4DE51975AB576568DC715E435908AF814A0F0B6082E17E637A6679C394E8B384894E9758CB4173A4E25007E4D51
2,967,366 UART: [art] SIG.S = CB10434A2D096B49E69E649B8BBC7CD12B51435C81A56AC4AFA9BF796EDAA414D27CCE340B09EBE7B58EC2848C2134D5
2,991,368 UART: Caliptra RT
2,991,713 UART: [state] CFI Enabled
3,098,970 UART: [rt] RT listening for mailbox commands...
3,099,640 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,308 UART: [rt]cmd =0x49444352, len=4
3,130,419 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,025 UART: [kat] ++
895,177 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,542 UART: [kat] HMAC-384Kdf
920,036 UART: [kat] LMS
1,168,348 UART: [kat] --
1,169,283 UART: [cold-reset] ++
1,169,667 UART: [fht] FHT @ 0x50003400
1,172,247 UART: [idev] ++
1,172,415 UART: [idev] CDI.KEYID = 6
1,172,776 UART: [idev] SUBJECT.KEYID = 7
1,173,201 UART: [idev] UDS.KEYID = 0
1,173,547 ready_for_fw is high
1,173,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,179 UART: [idev] Erasing UDS.KEYID = 0
1,197,871 UART: [idev] Sha1 KeyId Algorithm
1,206,727 UART: [idev] --
1,207,792 UART: [ldev] ++
1,207,960 UART: [ldev] CDI.KEYID = 6
1,208,324 UART: [ldev] SUBJECT.KEYID = 5
1,208,751 UART: [ldev] AUTHORITY.KEYID = 7
1,209,214 UART: [ldev] FE.KEYID = 1
1,214,236 UART: [ldev] Erasing FE.KEYID = 1
1,240,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,626 UART: [ldev] --
1,280,140 UART: [fwproc] Wait for Commands...
1,280,819 UART: [fwproc] Recv command 0x46574c44
1,281,552 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,076 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,897 >>> mbox cmd response: success
2,770,126 UART: [afmc] ++
2,770,294 UART: [afmc] CDI.KEYID = 6
2,770,657 UART: [afmc] SUBJECT.KEYID = 7
2,771,083 UART: [afmc] AUTHORITY.KEYID = 5
2,807,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,969 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,698 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,300 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,117 UART: [afmc] --
2,850,013 UART: [cold-reset] --
2,851,027 UART: [state] Locking Datavault
2,852,208 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,812 UART: [state] Locking ICCM
2,853,310 UART: [exit] Launching FMC @ 0x40000130
2,858,639 UART:
2,858,655 UART: Running Caliptra FMC ...
2,859,063 UART:
2,859,117 UART: [state] CFI Enabled
2,869,808 UART: [fht] FMC Alias Private Key: 7
2,977,925 UART: [art] Extend RT PCRs Done
2,978,353 UART: [art] Lock RT PCRs Done
2,979,799 UART: [art] Populate DV Done
2,987,982 UART: [fht] FMC Alias Private Key: 7
2,988,998 UART: [art] Derive CDI
2,989,278 UART: [art] Store in in slot 0x4
3,074,889 UART: [art] Derive Key Pair
3,075,249 UART: [art] Store priv key in slot 0x5
3,088,025 UART: [art] Derive Key Pair - Done
3,102,560 UART: [art] Signing Cert with AUTHO
3,103,040 UART: RITY.KEYID = 7
3,118,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,769 UART: [art] PUB.X = 84FF46C347B89E3B9A59F4EA6DF2A99DF657E57AC787E78AA2B79319B234CEFCD9A3DEE652D275EDC192705514D3ADBA
3,125,559 UART: [art] PUB.Y = 0603710FCEFF6CA3ABA2E1259DBA2F95B55779906A6E76AEE3C0D6C9466DF086814C35112847F8C7EAA4D50D05759DC6
3,132,504 UART: [art] SIG.R = 77329B57233FCFA4D393C37957EE4895136A9C5B8D1D40B154A8D0986DA43C8D99C73C3169CC852943671C5B7ABE68B0
3,139,274 UART: [art] SIG.S = A3DCD432F2EDAF290CD6A53453296F5AA7DD5F27492F37CC301B6C1CDE465BDA6F49AFA16DE720EE54B34C6BEFB33EBC
3,162,444 UART: Caliptra RT
3,162,697 UART: [state] CFI Enabled
3,269,776 UART: [rt] RT listening for mailbox commands...
3,270,446 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,299,952 UART: [rt]cmd =0x49444352, len=4
3,301,259 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,806 ready_for_fw is high
1,055,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,863 >>> mbox cmd response: success
2,682,061 UART:
2,682,077 UART: Running Caliptra FMC ...
2,682,485 UART:
2,682,539 UART: [state] CFI Enabled
2,693,050 UART: [fht] FMC Alias Private Key: 7
2,800,909 UART: [art] Extend RT PCRs Done
2,801,337 UART: [art] Lock RT PCRs Done
2,803,041 UART: [art] Populate DV Done
2,811,340 UART: [fht] FMC Alias Private Key: 7
2,812,414 UART: [art] Derive CDI
2,812,694 UART: [art] Store in in slot 0x4
2,898,519 UART: [art] Derive Key Pair
2,898,879 UART: [art] Store priv key in slot 0x5
2,911,615 UART: [art] Derive Key Pair - Done
2,926,461 UART: [art] Signing Cert with AUTHO
2,926,941 UART: RITY.KEYID = 7
2,942,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,040 UART: [art] PUB.X = 20B788DBFF3B1B2B56F83F9616690DDDFB46C366AEEC5B793332BF4904E9E13A7F04149F9F2D0B626546807076F62C6B
2,949,804 UART: [art] PUB.Y = 2218EF5F49A28906C4C824EAF5B695729ED572DA4A6E33FDA20E651255A628C5F3AFBB21299854B16BDFEFCA6957B4B2
2,956,760 UART: [art] SIG.R = C5A86688EBED7C592B0EB68DE77A58A001DFB93F6E92BE66575A6548F57F0AF333273C996FA5DE3A5E447188D550CD32
2,963,531 UART: [art] SIG.S = 306FB16354FD0406499EF4F40C5B9BCA72D075D47120EA2EFF8AD2403DB868DAE232B7330B6F8E467CFC8010218B08CF
2,987,097 UART: Caliptra RT
2,987,350 UART: [state] CFI Enabled
3,094,377 UART: [rt] RT listening for mailbox commands...
3,095,047 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,039 UART: [rt]cmd =0x49444352, len=4
3,126,302 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,147 UART: [kat] HMAC-384Kdf
920,713 UART: [kat] LMS
1,169,025 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,172,976 UART: [idev] ++
1,173,144 UART: [idev] CDI.KEYID = 6
1,173,505 UART: [idev] SUBJECT.KEYID = 7
1,173,930 UART: [idev] UDS.KEYID = 0
1,174,276 ready_for_fw is high
1,174,276 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,252 UART: [idev] Erasing UDS.KEYID = 0
1,198,824 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,897 UART: [ldev] ++
1,209,065 UART: [ldev] CDI.KEYID = 6
1,209,429 UART: [ldev] SUBJECT.KEYID = 5
1,209,856 UART: [ldev] AUTHORITY.KEYID = 7
1,210,319 UART: [ldev] FE.KEYID = 1
1,215,353 UART: [ldev] Erasing FE.KEYID = 1
1,241,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,881 UART: [ldev] --
1,281,371 UART: [fwproc] Wait for Commands...
1,281,952 UART: [fwproc] Recv command 0x46574c44
1,282,685 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,942 >>> mbox cmd response: success
2,772,055 UART: [afmc] ++
2,772,223 UART: [afmc] CDI.KEYID = 6
2,772,586 UART: [afmc] SUBJECT.KEYID = 7
2,773,012 UART: [afmc] AUTHORITY.KEYID = 5
2,808,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,048 UART: [afmc] --
2,852,154 UART: [cold-reset] --
2,853,250 UART: [state] Locking Datavault
2,854,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,969 UART: [state] Locking ICCM
2,855,457 UART: [exit] Launching FMC @ 0x40000130
2,860,786 UART:
2,860,802 UART: Running Caliptra FMC ...
2,861,210 UART:
2,861,353 UART: [state] CFI Enabled
2,871,674 UART: [fht] FMC Alias Private Key: 7
2,980,201 UART: [art] Extend RT PCRs Done
2,980,629 UART: [art] Lock RT PCRs Done
2,981,921 UART: [art] Populate DV Done
2,990,040 UART: [fht] FMC Alias Private Key: 7
2,991,170 UART: [art] Derive CDI
2,991,450 UART: [art] Store in in slot 0x4
3,076,931 UART: [art] Derive Key Pair
3,077,291 UART: [art] Store priv key in slot 0x5
3,090,801 UART: [art] Derive Key Pair - Done
3,105,287 UART: [art] Signing Cert with AUTHO
3,105,767 UART: RITY.KEYID = 7
3,120,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,178 UART: [art] PUB.X = ECC02E290CCDCE904DBF3B3029271E662AC52C037F7C3C7CDF7EA3B4B3A8C2FE45A2635C103352D08ABDFBC7A34F198B
3,127,966 UART: [art] PUB.Y = C2B293330DF31950EBD9765EABCB42EAAE56F0FB8266C74F8E7B1BAD7A4FE9D3D83BFC8285025253A4067635742FABE3
3,134,923 UART: [art] SIG.R = E4000C3DEC97D1AD6004F462542B35D8B4E6401192090AF9B2065D3177A24E5F8A63CE173E5CBCD8359C11332068B951
3,141,654 UART: [art] SIG.S = 9497816B6BC99564D6121479C7DCAB127290F12F1C5C6FD95783B656A588F1E091301039D98ACC037BE232CA8099A871
3,165,528 UART: Caliptra RT
3,165,873 UART: [state] CFI Enabled
3,273,377 UART: [rt] RT listening for mailbox commands...
3,274,047 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,813 UART: [rt]cmd =0x49444352, len=4
3,305,024 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,711 ready_for_fw is high
1,056,711 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,082 >>> mbox cmd response: success
2,684,358 UART:
2,684,374 UART: Running Caliptra FMC ...
2,684,782 UART:
2,684,925 UART: [state] CFI Enabled
2,695,372 UART: [fht] FMC Alias Private Key: 7
2,803,077 UART: [art] Extend RT PCRs Done
2,803,505 UART: [art] Lock RT PCRs Done
2,804,865 UART: [art] Populate DV Done
2,813,214 UART: [fht] FMC Alias Private Key: 7
2,814,306 UART: [art] Derive CDI
2,814,586 UART: [art] Store in in slot 0x4
2,900,331 UART: [art] Derive Key Pair
2,900,691 UART: [art] Store priv key in slot 0x5
2,913,693 UART: [art] Derive Key Pair - Done
2,928,480 UART: [art] Signing Cert with AUTHO
2,928,960 UART: RITY.KEYID = 7
2,943,870 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,635 UART: [art] PUB.X = DF5F54DB6A21C7E1B2A6A527C0F458834EE01653310B0E2F5B5EE37BFF7AE402994C06E4E0816833E44487C67BB96472
2,951,397 UART: [art] PUB.Y = 6057D2197177574EB7E29A0EA6A2BD07480B1393EDE9743932A8048B7BDB2416F7E72F444CD0C5975296673A6565A67C
2,958,329 UART: [art] SIG.R = CF09B1520439064A9D334FCD92FC2F07A8FEF13600D4A0EDE7EA4098704836B70980A12324C32D44DD2C53A6885BCCE0
2,965,068 UART: [art] SIG.S = 0718FE59B1F6C0693D8F7D84174A3FE36078EEE2890D5FFA999C47FD0AFD9F925D36708863445A9DF037212C6C94C66C
2,988,142 UART: Caliptra RT
2,988,487 UART: [state] CFI Enabled
3,095,952 UART: [rt] RT listening for mailbox commands...
3,096,622 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,104 UART: [rt]cmd =0x49444352, len=4
3,127,667 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,011 UART:
192,376 UART: Running Caliptra ROM ...
193,483 UART:
193,620 UART: [state] CFI Enabled
266,776 UART: [state] LifecycleState = Unprovisioned
268,789 UART: [state] DebugLocked = No
270,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,252 UART: [kat] SHA2-256
444,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,415 UART: [kat] ++
455,894 UART: [kat] sha1
467,119 UART: [kat] SHA2-256
469,835 UART: [kat] SHA2-384
475,826 UART: [kat] SHA2-512-ACC
478,184 UART: [kat] ECC-384
2,766,006 UART: [kat] HMAC-384Kdf
2,779,245 UART: [kat] LMS
3,969,563 UART: [kat] --
3,975,253 UART: [cold-reset] ++
3,977,115 UART: [fht] Storing FHT @ 0x50003400
3,988,724 UART: [idev] ++
3,989,350 UART: [idev] CDI.KEYID = 6
3,990,251 UART: [idev] SUBJECT.KEYID = 7
3,991,486 UART: [idev] UDS.KEYID = 0
3,992,461 ready_for_fw is high
3,992,697 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,963 UART: [idev] Erasing UDS.KEYID = 0
7,325,747 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,838 UART: [idev] --
7,351,998 UART: [ldev] ++
7,352,618 UART: [ldev] CDI.KEYID = 6
7,353,524 UART: [ldev] SUBJECT.KEYID = 5
7,354,784 UART: [ldev] AUTHORITY.KEYID = 7
7,356,007 UART: [ldev] FE.KEYID = 1
7,403,603 UART: [ldev] Erasing FE.KEYID = 1
10,732,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,771 UART: [ldev] --
13,098,344 UART: [fwproc] Waiting for Commands...
13,100,915 UART: [fwproc] Received command 0x46574c44
13,103,082 UART: [fwproc] Received Image of size 113844 bytes
17,152,702 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,227,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,296,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,613,902 >>> mbox cmd response: success
17,614,424 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,617,785 UART: [afmc] ++
17,618,367 UART: [afmc] CDI.KEYID = 6
17,619,245 UART: [afmc] SUBJECT.KEYID = 7
17,620,510 UART: [afmc] AUTHORITY.KEYID = 5
20,991,016 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,291,149 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,293,457 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,307,851 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,635 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,337,118 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,856 UART: [afmc] --
23,362,201 UART: [cold-reset] --
23,367,033 UART: [state] Locking Datavault
23,371,794 UART: [state] Locking PCR0, PCR1 and PCR31
23,373,533 UART: [state] Locking ICCM
23,374,547 UART: [exit] Launching FMC @ 0x40000130
23,382,941 UART:
23,383,171 UART: Running Caliptra FMC ...
23,384,264 UART:
23,384,417 UART: [state] CFI Enabled
23,452,888 UART: [fht] FMC Alias Private Key: 7
25,790,305 UART: [art] Extend RT PCRs Done
25,791,526 UART: [art] Lock RT PCRs Done
25,793,096 UART: [art] Populate DV Done
25,798,363 UART: [fht] FMC Alias Private Key: 7
25,800,114 UART: [art] Derive CDI
25,800,920 UART: [art] Store in in slot 0x4
25,861,594 UART: [art] Derive Key Pair
25,862,631 UART: [art] Store priv key in slot 0x5
29,155,226 UART: [art] Derive Key Pair - Done
29,168,004 UART: [art] Signing Cert with AUTHO
29,169,315 UART: RITY.KEYID = 7
31,457,037 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,547 UART: [art] PUB.X = 7F5FE08867D5E8F296B8D68779A863EDFDF4731305EF1E2A57A085FCC5D165955563A10F95437A895BE401D7A078BFD6
31,465,784 UART: [art] PUB.Y = E5B82FA2672ACB89859F2C99E5979EAFD02D1CAF08B23D34456C2304184AF0CCA7E37C627B3BE07AB9BA324F3A95A3D0
31,473,018 UART: [art] SIG.R = 7AECB4895AC1CA0397C3A76FF5B7915137AB065C9064DB2DA896D1C1A7E9F9050E231EE49965C5DD516CB63E4D36503C
31,480,378 UART: [art] SIG.S = C52BAB3AE4CDAF7DAF828A2895568AA730C911A809108F83847137415677AF0F37B1F66FF0BDB3C15F123771EAC6F1A9
32,785,772 UART: Caliptra RT
32,786,490 UART: [state] CFI Enabled
32,947,643 UART: [rt] RT listening for mailbox commands...
32,979,015 UART: [rt]cmd =0x43415053, len=4
32,980,786 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,802,529 ready_for_fw is high
3,802,892 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,844,163 >>> mbox cmd response: success
17,844,878 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,538,450 UART:
23,538,821 UART: Running Caliptra FMC ...
23,539,953 UART:
23,540,109 UART: [state] CFI Enabled
23,593,372 UART: [fht] FMC Alias Private Key: 7
25,931,084 UART: [art] Extend RT PCRs Done
25,932,312 UART: [art] Lock RT PCRs Done
25,934,126 UART: [art] Populate DV Done
25,939,643 UART: [fht] FMC Alias Private Key: 7
25,941,175 UART: [art] Derive CDI
25,941,906 UART: [art] Store in in slot 0x4
26,001,884 UART: [art] Derive Key Pair
26,002,924 UART: [art] Store priv key in slot 0x5
29,295,846 UART: [art] Derive Key Pair - Done
29,308,793 UART: [art] Signing Cert with AUTHO
29,310,089 UART: RITY.KEYID = 7
31,598,075 UART: [art] Erasing AUTHORITY.KEYID = 7
31,599,590 UART: [art] PUB.X = 2D6A6F1A11C3153398E5603ADC795C091EBBF9F42A2C18A8B3231FEC17B6D628F467447F22A17B0661E2AD63EFE2920E
31,606,823 UART: [art] PUB.Y = 8B4034264C44E972A29631C1B59100B49BF50BA8EA1EB1B3C01D56D023FBBCCDB7C5716842B579F3C61170EE91A7B08D
31,614,061 UART: [art] SIG.R = DF5A23AE53B87BF726A5ED036FD4B1AFCAAD709ECE3E697CA2CD356AD6EF1A91A80820FCD4381EBFB6B9A4BDB7FBEBAC
31,621,518 UART: [art] SIG.S = 287DFACC581DDF9703596DFEE49F38A5D76188F117C97AE9E074F8BBB656DE48DD6B56D3F21485091BC903AC2BB873B6
32,926,198 UART: Caliptra RT
32,926,905 UART: [state] CFI Enabled
33,090,218 UART: [rt] RT listening for mailbox commands...
33,121,569 UART: [rt]cmd =0x43415053, len=4
33,123,224 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,515 UART:
192,900 UART: Running Caliptra ROM ...
194,032 UART:
603,891 UART: [state] CFI Enabled
618,073 UART: [state] LifecycleState = Unprovisioned
620,026 UART: [state] DebugLocked = No
622,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,931 UART: [kat] SHA2-256
796,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,238 UART: [kat] ++
807,712 UART: [kat] sha1
818,684 UART: [kat] SHA2-256
821,379 UART: [kat] SHA2-384
828,016 UART: [kat] SHA2-512-ACC
830,388 UART: [kat] ECC-384
3,115,100 UART: [kat] HMAC-384Kdf
3,125,837 UART: [kat] LMS
4,316,004 UART: [kat] --
4,319,223 UART: [cold-reset] ++
4,321,861 UART: [fht] Storing FHT @ 0x50003400
4,333,076 UART: [idev] ++
4,333,684 UART: [idev] CDI.KEYID = 6
4,334,614 UART: [idev] SUBJECT.KEYID = 7
4,335,793 UART: [idev] UDS.KEYID = 0
4,336,872 ready_for_fw is high
4,337,112 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,035 UART: [idev] Erasing UDS.KEYID = 0
7,624,877 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,227 UART: [idev] --
7,650,674 UART: [ldev] ++
7,651,249 UART: [ldev] CDI.KEYID = 6
7,652,216 UART: [ldev] SUBJECT.KEYID = 5
7,653,430 UART: [ldev] AUTHORITY.KEYID = 7
7,654,664 UART: [ldev] FE.KEYID = 1
7,664,289 UART: [ldev] Erasing FE.KEYID = 1
10,954,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,152 UART: [ldev] --
13,318,659 UART: [fwproc] Waiting for Commands...
13,321,297 UART: [fwproc] Received command 0x46574c44
13,323,479 UART: [fwproc] Received Image of size 113844 bytes
17,372,945 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,728 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,601 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,309 >>> mbox cmd response: success
17,827,794 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,832,190 UART: [afmc] ++
17,832,775 UART: [afmc] CDI.KEYID = 6
17,833,668 UART: [afmc] SUBJECT.KEYID = 7
17,834,933 UART: [afmc] AUTHORITY.KEYID = 5
21,147,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,025 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,386 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,235 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,659 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,640 UART: [afmc] --
23,513,318 UART: [cold-reset] --
23,516,150 UART: [state] Locking Datavault
23,522,044 UART: [state] Locking PCR0, PCR1 and PCR31
23,523,796 UART: [state] Locking ICCM
23,526,288 UART: [exit] Launching FMC @ 0x40000130
23,534,643 UART:
23,534,918 UART: Running Caliptra FMC ...
23,536,030 UART:
23,536,191 UART: [state] CFI Enabled
23,544,563 UART: [fht] FMC Alias Private Key: 7
25,875,411 UART: [art] Extend RT PCRs Done
25,876,665 UART: [art] Lock RT PCRs Done
25,878,159 UART: [art] Populate DV Done
25,883,697 UART: [fht] FMC Alias Private Key: 7
25,885,265 UART: [art] Derive CDI
25,886,082 UART: [art] Store in in slot 0x4
25,929,000 UART: [art] Derive Key Pair
25,930,010 UART: [art] Store priv key in slot 0x5
29,172,128 UART: [art] Derive Key Pair - Done
29,185,121 UART: [art] Signing Cert with AUTHO
29,186,426 UART: RITY.KEYID = 7
31,465,668 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,171 UART: [art] PUB.X = 0B3D589C35FC75B8C75B13DCD0E9D0AC001A371ADDCC8DB363745D300BF7995DB62074B0775DCB235E2D49C32A542A3A
31,474,381 UART: [art] PUB.Y = 1D6DB8C3128FA76983D1EEF310A464AB7A64ADE1ABC70C8046D0254263AC897F9EFFBA67264210F0910C06E084E87474
31,481,678 UART: [art] SIG.R = 16118A09E21434778DAD4841B89C3AE5F3B38EC9E3FDA57AC8BE067856D74863927CECC68E72F118FDEEDB7D604C928B
31,489,073 UART: [art] SIG.S = 9AC0D998E6E8CC2D9B8DCA0974CA9CDADF6D1801F09A1B08C746E45604BD1919107B3A22816DB562B04274810D299DE6
32,794,374 UART: Caliptra RT
32,795,098 UART: [state] CFI Enabled
32,912,073 UART: [rt] RT listening for mailbox commands...
32,943,396 UART: [rt]cmd =0x43415053, len=4
32,945,024 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,124,855 ready_for_fw is high
4,125,534 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,076,379 >>> mbox cmd response: success
18,077,039 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,718,586 UART:
23,719,015 UART: Running Caliptra FMC ...
23,720,131 UART:
23,720,297 UART: [state] CFI Enabled
23,727,877 UART: [fht] FMC Alias Private Key: 7
26,058,894 UART: [art] Extend RT PCRs Done
26,060,120 UART: [art] Lock RT PCRs Done
26,061,853 UART: [art] Populate DV Done
26,067,481 UART: [fht] FMC Alias Private Key: 7
26,069,140 UART: [art] Derive CDI
26,069,881 UART: [art] Store in in slot 0x4
26,112,594 UART: [art] Derive Key Pair
26,113,636 UART: [art] Store priv key in slot 0x5
29,355,303 UART: [art] Derive Key Pair - Done
29,368,579 UART: [art] Signing Cert with AUTHO
29,370,558 UART: RITY.KEYID = 7
31,649,574 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,423 UART: [art] PUB.X = C0C2A210EAB2A5A681DBCFB0F02F31F4E595F204B51FFC325D418F7908551AE6F1AC26CFDE3B35853335A2A0B4F37A03
31,658,362 UART: [art] PUB.Y = 55BD60AF5CCE668A67CB3271AFB0ED07D65A577DA6C88E3ED5448B30B139229E037395C6ADBFAE103D38A4C6B947145B
31,665,567 UART: [art] SIG.R = 2FA979DBC803F170587DB0F8B01FEF691E2681C2D61106E2667A67A612836D72947D400E5EC5ADCF5FA172FA21DBF329
31,672,969 UART: [art] SIG.S = B2F52412D425749B12701A407673871CF9F4BAFA48EE5D63173A74C2AC4D2C8309041B274371DD84779E7F76B23D2BEC
32,978,355 UART: Caliptra RT
32,979,599 UART: [state] CFI Enabled
33,096,133 UART: [rt] RT listening for mailbox commands...
33,127,857 UART: [rt]cmd =0x43415053, len=4
33,129,706 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,085 UART:
192,457 UART: Running Caliptra ROM ...
193,646 UART:
193,799 UART: [state] CFI Enabled
264,151 UART: [state] LifecycleState = Unprovisioned
266,005 UART: [state] DebugLocked = No
268,853 UART: [state] WD Timer not started. Device not locked for debugging
272,149 UART: [kat] SHA2-256
451,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,863 UART: [kat] ++
463,402 UART: [kat] sha1
475,065 UART: [kat] SHA2-256
478,148 UART: [kat] SHA2-384
484,921 UART: [kat] SHA2-512-ACC
487,858 UART: [kat] ECC-384
2,948,694 UART: [kat] HMAC-384Kdf
2,971,595 UART: [kat] LMS
3,501,050 UART: [kat] --
3,504,828 UART: [cold-reset] ++
3,507,186 UART: [fht] FHT @ 0x50003400
3,518,658 UART: [idev] ++
3,519,223 UART: [idev] CDI.KEYID = 6
3,520,140 UART: [idev] SUBJECT.KEYID = 7
3,521,308 UART: [idev] UDS.KEYID = 0
3,522,233 ready_for_fw is high
3,522,436 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,038 UART: [idev] Erasing UDS.KEYID = 0
6,027,770 UART: [idev] Sha1 KeyId Algorithm
6,051,506 UART: [idev] --
6,055,777 UART: [ldev] ++
6,056,349 UART: [ldev] CDI.KEYID = 6
6,057,282 UART: [ldev] SUBJECT.KEYID = 5
6,058,446 UART: [ldev] AUTHORITY.KEYID = 7
6,059,676 UART: [ldev] FE.KEYID = 1
6,101,487 UART: [ldev] Erasing FE.KEYID = 1
8,603,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,585 UART: [ldev] --
10,415,449 UART: [fwproc] Wait for Commands...
10,418,355 UART: [fwproc] Recv command 0x46574c44
10,420,446 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,288,628 >>> mbox cmd response: success
14,289,124 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,292,441 UART: [afmc] ++
14,293,032 UART: [afmc] CDI.KEYID = 6
14,293,950 UART: [afmc] SUBJECT.KEYID = 7
14,295,165 UART: [afmc] AUTHORITY.KEYID = 5
16,828,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,401 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,182 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,109 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,585 UART: [afmc] --
18,627,510 UART: [cold-reset] --
18,631,371 UART: [state] Locking Datavault
18,637,921 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,585 UART: [state] Locking ICCM
18,641,033 UART: [exit] Launching FMC @ 0x40000130
18,649,491 UART:
18,649,724 UART: Running Caliptra FMC ...
18,650,822 UART:
18,650,980 UART: [state] CFI Enabled
18,709,912 UART: [fht] FMC Alias Private Key: 7
20,473,794 UART: [art] Extend RT PCRs Done
20,474,997 UART: [art] Lock RT PCRs Done
20,476,886 UART: [art] Populate DV Done
20,482,036 UART: [fht] FMC Alias Private Key: 7
20,483,738 UART: [art] Derive CDI
20,484,476 UART: [art] Store in in slot 0x4
20,542,134 UART: [art] Derive Key Pair
20,543,171 UART: [art] Store priv key in slot 0x5
23,006,000 UART: [art] Derive Key Pair - Done
23,018,978 UART: [art] Signing Cert with AUTHO
23,020,294 UART: RITY.KEYID = 7
24,731,697 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,179 UART: [art] PUB.X = AC0B242AB8F8FD8D741271B9930555ED9331D0C3072C9F41912EF537A985D34732A01E9FEDDCD9583B36D48AFF8397C2
24,740,440 UART: [art] PUB.Y = C0955DA79B1EBFD1217B0D780B3683004013B5601591C546AE5077A285A16923EBAD0AB0C8521BD5EBD6054A3EFB3376
24,747,690 UART: [art] SIG.R = BA5FE4613833FB5F2EA3B0C6926435B87984B46569F9D952F4033C90F3686D04123DA8234F6B6CD69FC2F57B97291B4E
24,755,126 UART: [art] SIG.S = F681DA689DCF665DA741A5E38B31473447B92416E5CA0228BA7E203AD7043CB4D15A5AE96A1FC2514B44BD99FA5DB651
25,733,823 UART: Caliptra RT
25,734,537 UART: [state] CFI Enabled
25,899,804 UART: [rt] RT listening for mailbox commands...
25,931,110 UART: [rt]cmd =0x43415053, len=4
25,932,851 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,381,041 ready_for_fw is high
3,381,651 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,053,995 >>> mbox cmd response: success
14,054,643 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,360,525 UART:
18,360,921 UART: Running Caliptra FMC ...
18,362,057 UART:
18,362,218 UART: [state] CFI Enabled
18,430,011 UART: [fht] FMC Alias Private Key: 7
20,192,939 UART: [art] Extend RT PCRs Done
20,194,171 UART: [art] Lock RT PCRs Done
20,195,860 UART: [art] Populate DV Done
20,200,909 UART: [fht] FMC Alias Private Key: 7
20,202,503 UART: [art] Derive CDI
20,203,316 UART: [art] Store in in slot 0x4
20,262,451 UART: [art] Derive Key Pair
20,263,489 UART: [art] Store priv key in slot 0x5
22,726,277 UART: [art] Derive Key Pair - Done
22,739,219 UART: [art] Signing Cert with AUTHO
22,740,525 UART: RITY.KEYID = 7
24,451,391 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,904 UART: [art] PUB.X = 43C33431A02D0577B41C6D4E9BDC210C985719483EBB6EB5D1CCC55EB039184602478409963BEAFAAF8946AB35B5CA74
24,460,203 UART: [art] PUB.Y = DCD54CAE3F00D9098264692AA284E17E7D171603ED7041A5A0DD923E7A11F5A0AD058F3FAFC52A0B764CAA7D71C62701
24,467,407 UART: [art] SIG.R = FB706481B7CDF0034CC27FCDF25224F40611FCC216DDECF5EB6DB77D342C46A14E77F727118991AAC2D354A3C4DD982F
24,474,850 UART: [art] SIG.S = 376F7074F5332341BFF5D9CA69F194DD43A1077121F55ADEC8626D29100459510E8270EB15300D09307FEFC30ADDD61E
25,453,665 UART: Caliptra RT
25,454,384 UART: [state] CFI Enabled
25,618,348 UART: [rt] RT listening for mailbox commands...
25,649,623 UART: [rt]cmd =0x43415053, len=4
25,651,365 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,804 writing to cptra_bootfsm_go
192,966 UART:
193,327 UART: Running Caliptra ROM ...
194,458 UART:
603,971 UART: [state] CFI Enabled
621,202 UART: [state] LifecycleState = Unprovisioned
623,097 UART: [state] DebugLocked = No
625,260 UART: [state] WD Timer not started. Device not locked for debugging
628,891 UART: [kat] SHA2-256
807,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,555 UART: [kat] ++
820,000 UART: [kat] sha1
830,732 UART: [kat] SHA2-256
833,736 UART: [kat] SHA2-384
839,582 UART: [kat] SHA2-512-ACC
842,592 UART: [kat] ECC-384
3,283,762 UART: [kat] HMAC-384Kdf
3,296,391 UART: [kat] LMS
3,825,883 UART: [kat] --
3,830,248 UART: [cold-reset] ++
3,832,534 UART: [fht] FHT @ 0x50003400
3,842,659 UART: [idev] ++
3,843,228 UART: [idev] CDI.KEYID = 6
3,844,152 UART: [idev] SUBJECT.KEYID = 7
3,845,348 UART: [idev] UDS.KEYID = 0
3,846,328 ready_for_fw is high
3,846,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,019 UART: [idev] Erasing UDS.KEYID = 0
6,319,617 UART: [idev] Sha1 KeyId Algorithm
6,343,920 UART: [idev] --
6,346,616 UART: [ldev] ++
6,347,185 UART: [ldev] CDI.KEYID = 6
6,348,097 UART: [ldev] SUBJECT.KEYID = 5
6,349,257 UART: [ldev] AUTHORITY.KEYID = 7
6,350,538 UART: [ldev] FE.KEYID = 1
6,358,866 UART: [ldev] Erasing FE.KEYID = 1
8,835,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,349 UART: [ldev] --
10,627,518 UART: [fwproc] Wait for Commands...
10,629,013 UART: [fwproc] Recv command 0x46574c44
10,631,105 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,595 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,168,388 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,486,373 >>> mbox cmd response: success
14,486,879 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,490,088 UART: [afmc] ++
14,490,673 UART: [afmc] CDI.KEYID = 6
14,491,583 UART: [afmc] SUBJECT.KEYID = 7
14,492,744 UART: [afmc] AUTHORITY.KEYID = 5
16,991,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,955 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,823 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,417 UART: [afmc] --
18,788,445 UART: [cold-reset] --
18,792,842 UART: [state] Locking Datavault
18,798,246 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,946 UART: [state] Locking ICCM
18,802,636 UART: [exit] Launching FMC @ 0x40000130
18,811,026 UART:
18,811,272 UART: Running Caliptra FMC ...
18,812,378 UART:
18,812,539 UART: [state] CFI Enabled
18,820,690 UART: [fht] FMC Alias Private Key: 7
20,577,421 UART: [art] Extend RT PCRs Done
20,578,653 UART: [art] Lock RT PCRs Done
20,580,329 UART: [art] Populate DV Done
20,585,850 UART: [fht] FMC Alias Private Key: 7
20,587,329 UART: [art] Derive CDI
20,588,142 UART: [art] Store in in slot 0x4
20,630,848 UART: [art] Derive Key Pair
20,631,882 UART: [art] Store priv key in slot 0x5
23,058,518 UART: [art] Derive Key Pair - Done
23,071,636 UART: [art] Signing Cert with AUTHO
23,072,951 UART: RITY.KEYID = 7
24,778,345 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,893 UART: [art] PUB.X = CBDE1D3E1CE04FACD2B69E8C3D84A7BC9E27FA71A5E84AAD3AE2CCDA071AC1BE8211CDA2DBAE0CD37D095A19781730BC
24,787,201 UART: [art] PUB.Y = E5F25C6149D11A14B810EA2015DD83D77872DBD5C3A0DD10299D891CA9AE73583AFF447A5823D885ADF1497BE743252B
24,794,444 UART: [art] SIG.R = 47586E1A2695E0A3AD9551086AE600B0AB132E4E1302FB5B235FF2DC1ECC558124D65224B4C37428D6A76DB864E8A7D6
24,801,782 UART: [art] SIG.S = 579BEAC64D9B1EC22A2EAB55A2EC037FB82FCC11202C911121FA569C3ED9DEF937B259878F6060E43C138882A25BC6B5
25,780,442 UART: Caliptra RT
25,781,164 UART: [state] CFI Enabled
25,898,008 UART: [rt] RT listening for mailbox commands...
25,929,483 UART: [rt]cmd =0x43415053, len=4
25,931,214 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
3,700,423 ready_for_fw is high
3,700,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,979 >>> mbox cmd response: success
14,276,776 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,526,048 UART:
18,526,533 UART: Running Caliptra FMC ...
18,527,642 UART:
18,527,801 UART: [state] CFI Enabled
18,535,719 UART: [fht] FMC Alias Private Key: 7
20,292,102 UART: [art] Extend RT PCRs Done
20,293,329 UART: [art] Lock RT PCRs Done
20,294,906 UART: [art] Populate DV Done
20,300,163 UART: [fht] FMC Alias Private Key: 7
20,301,704 UART: [art] Derive CDI
20,302,468 UART: [art] Store in in slot 0x4
20,345,287 UART: [art] Derive Key Pair
20,346,318 UART: [art] Store priv key in slot 0x5
22,772,895 UART: [art] Derive Key Pair - Done
22,785,990 UART: [art] Signing Cert with AUTHO
22,787,302 UART: RITY.KEYID = 7
24,492,743 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,242 UART: [art] PUB.X = 7F9CB9AB7392A9C321A6C9CB866D08F7495C886336EB5BA7AC76D23B66CC70D5BDC5C78D61017237FF1A72F58EE49F97
24,501,488 UART: [art] PUB.Y = 57F5251E47350557FD797E3F31558CC8B062D1AAE2FDC75FC82DFCAA113AA52EE429EA73333F7D3AE05D52821D3093B8
24,508,801 UART: [art] SIG.R = 3FF23015705EADF3B3CE48B2C5BC43BB9CB3A1A52174D8D7E44EF1D54A203CAAD2711E95D62A3D9E73F633BFEF09DE0B
24,516,194 UART: [art] SIG.S = 5B8B23BFAD5B3F5650F597A60E4BA63BE580D0318381BDFE48FDE1620460E9E9EF0947813E0580D39DE92BEA7196F50D
25,495,228 UART: Caliptra RT
25,495,944 UART: [state] CFI Enabled
25,613,896 UART: [rt] RT listening for mailbox commands...
25,644,943 UART: [rt]cmd =0x43415053, len=4
25,646,682 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,133 UART:
192,524 UART: Running Caliptra ROM ...
193,660 UART:
193,812 UART: [state] CFI Enabled
263,599 UART: [state] LifecycleState = Unprovisioned
265,968 UART: [state] DebugLocked = No
268,067 UART: [state] WD Timer not started. Device not locked for debugging
271,841 UART: [kat] SHA2-256
461,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,492 UART: [kat] ++
472,966 UART: [kat] sha1
484,196 UART: [kat] SHA2-256
487,208 UART: [kat] SHA2-384
492,636 UART: [kat] SHA2-512-ACC
495,218 UART: [kat] ECC-384
2,946,757 UART: [kat] HMAC-384Kdf
2,972,709 UART: [kat] LMS
3,504,475 UART: [kat] --
3,509,816 UART: [cold-reset] ++
3,511,823 UART: [fht] FHT @ 0x50003400
3,524,082 UART: [idev] ++
3,524,799 UART: [idev] CDI.KEYID = 6
3,525,709 UART: [idev] SUBJECT.KEYID = 7
3,526,958 UART: [idev] UDS.KEYID = 0
3,527,885 ready_for_fw is high
3,528,106 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,763 UART: [idev] Erasing UDS.KEYID = 0
6,029,412 UART: [idev] Sha1 KeyId Algorithm
6,052,208 UART: [idev] --
6,056,511 UART: [ldev] ++
6,057,201 UART: [ldev] CDI.KEYID = 6
6,058,092 UART: [ldev] SUBJECT.KEYID = 5
6,059,309 UART: [ldev] AUTHORITY.KEYID = 7
6,060,510 UART: [ldev] FE.KEYID = 1
6,100,677 UART: [ldev] Erasing FE.KEYID = 1
8,608,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,187 UART: [ldev] --
10,413,421 UART: [fwproc] Wait for Commands...
10,415,244 UART: [fwproc] Recv command 0x46574c44
10,417,508 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,373 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,461 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,059,612 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,893 >>> mbox cmd response: success
14,602,390 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,605,393 UART: [afmc] ++
14,606,097 UART: [afmc] CDI.KEYID = 6
14,607,397 UART: [afmc] SUBJECT.KEYID = 7
14,608,785 UART: [afmc] AUTHORITY.KEYID = 5
17,148,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,141 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,064 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,368 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,837 UART: [afmc] --
18,948,821 UART: [cold-reset] --
18,951,510 UART: [state] Locking Datavault
18,954,777 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,978 UART: [state] Locking ICCM
18,959,407 UART: [exit] Launching FMC @ 0x40000130
18,968,052 UART:
18,968,292 UART: Running Caliptra FMC ...
18,969,391 UART:
18,969,554 UART: [state] CFI Enabled
19,031,895 UART: [fht] FMC Alias Private Key: 7
20,795,667 UART: [art] Extend RT PCRs Done
20,796,883 UART: [art] Lock RT PCRs Done
20,798,723 UART: [art] Populate DV Done
20,804,133 UART: [fht] FMC Alias Private Key: 7
20,805,673 UART: [art] Derive CDI
20,806,488 UART: [art] Store in in slot 0x4
20,864,639 UART: [art] Derive Key Pair
20,865,682 UART: [art] Store priv key in slot 0x5
23,328,602 UART: [art] Derive Key Pair - Done
23,341,380 UART: [art] Signing Cert with AUTHO
23,342,694 UART: RITY.KEYID = 7
25,054,431 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,943 UART: [art] PUB.X = F9E9483B863190F1F83CE00A701A3AB2CF75181883586311637C5FBE982DC0C4F98E3D813777F9FFA07141553A80C496
25,063,171 UART: [art] PUB.Y = 9E595E239908CA28DF83F1A20116F86EA8F8CD780440F14FFAEBD78DAF2E842D7C68997DFF091E0FD2E16BD1A0D12132
25,070,494 UART: [art] SIG.R = 768D83CD09D1D9BECF9BCE71E5F2A6C6480377EBEE30E0BCC6F687F26168C2139CD601CCAE4CC11A80B2F0F60B960057
25,077,917 UART: [art] SIG.S = 7F6F4DB3F464E17352F25156D6A3A4FA38509951498D1CD68E32A9EE69DB61CEADA1B0215C86318E568D6C99948465CF
26,056,456 UART: Caliptra RT
26,057,145 UART: [state] CFI Enabled
26,223,161 UART: [rt] RT listening for mailbox commands...
26,254,736 UART: [rt]cmd =0x43415053, len=4
26,256,367 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,437,444 ready_for_fw is high
3,437,832 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,736,675 >>> mbox cmd response: success
14,737,511 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,027,942 UART:
19,028,331 UART: Running Caliptra FMC ...
19,029,443 UART:
19,029,597 UART: [state] CFI Enabled
19,096,539 UART: [fht] FMC Alias Private Key: 7
20,860,194 UART: [art] Extend RT PCRs Done
20,861,417 UART: [art] Lock RT PCRs Done
20,863,183 UART: [art] Populate DV Done
20,868,455 UART: [fht] FMC Alias Private Key: 7
20,869,944 UART: [art] Derive CDI
20,870,680 UART: [art] Store in in slot 0x4
20,929,206 UART: [art] Derive Key Pair
20,930,243 UART: [art] Store priv key in slot 0x5
23,392,915 UART: [art] Derive Key Pair - Done
23,406,078 UART: [art] Signing Cert with AUTHO
23,407,416 UART: RITY.KEYID = 7
25,119,301 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,826 UART: [art] PUB.X = 0F0ABAE188A904607F81A0A84550AEE59FEAD36B6C7B6453E04C1AEFBB1A700C4FB483374B6BEB33BEAFB464F4CA1E2B
25,128,077 UART: [art] PUB.Y = B06DC85CC23EC0A48DE9EFBA7CE102E269B3D2B4007EC2D6D9ECD2E67F14D1D377B647A02D4C3DFD6F21F87EAF38E14F
25,135,364 UART: [art] SIG.R = 71E442556E7FFE8BE23DC80FCC3BFDEB64BABD033A964C403739BC603612901C4BEA9681001DBE9697DCE46E683BB5F2
25,142,747 UART: [art] SIG.S = A720490597C8E62A8B193785953E0C19F4F09DE9C6E2137F619F6FEAA284F47BF1D31A095FBD839878FAC8EC18BED3D7
26,121,817 UART: Caliptra RT
26,122,525 UART: [state] CFI Enabled
26,288,127 UART: [rt] RT listening for mailbox commands...
26,319,238 UART: [rt]cmd =0x43415053, len=4
26,320,940 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,666 writing to cptra_bootfsm_go
192,933 UART:
193,308 UART: Running Caliptra ROM ...
194,471 UART:
604,067 UART: [state] CFI Enabled
616,816 UART: [state] LifecycleState = Unprovisioned
619,183 UART: [state] DebugLocked = No
621,992 UART: [state] WD Timer not started. Device not locked for debugging
627,105 UART: [kat] SHA2-256
817,002 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,759 UART: [kat] ++
828,280 UART: [kat] sha1
840,237 UART: [kat] SHA2-256
843,281 UART: [kat] SHA2-384
849,698 UART: [kat] SHA2-512-ACC
852,286 UART: [kat] ECC-384
3,293,232 UART: [kat] HMAC-384Kdf
3,307,033 UART: [kat] LMS
3,838,856 UART: [kat] --
3,844,010 UART: [cold-reset] ++
3,845,873 UART: [fht] FHT @ 0x50003400
3,857,489 UART: [idev] ++
3,858,130 UART: [idev] CDI.KEYID = 6
3,859,166 UART: [idev] SUBJECT.KEYID = 7
3,860,343 UART: [idev] UDS.KEYID = 0
3,861,275 ready_for_fw is high
3,861,502 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,004 UART: [idev] Erasing UDS.KEYID = 0
6,340,069 UART: [idev] Sha1 KeyId Algorithm
6,362,700 UART: [idev] --
6,368,502 UART: [ldev] ++
6,369,191 UART: [ldev] CDI.KEYID = 6
6,370,106 UART: [ldev] SUBJECT.KEYID = 5
6,371,263 UART: [ldev] AUTHORITY.KEYID = 7
6,372,495 UART: [ldev] FE.KEYID = 1
6,384,868 UART: [ldev] Erasing FE.KEYID = 1
8,858,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,611 UART: [ldev] --
10,649,388 UART: [fwproc] Wait for Commands...
10,651,484 UART: [fwproc] Recv command 0x46574c44
10,653,791 UART: [fwproc] Recv'd Img size: 114168 bytes
14,105,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,096 >>> mbox cmd response: success
14,838,598 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,841,706 UART: [afmc] ++
14,842,401 UART: [afmc] CDI.KEYID = 6
14,843,650 UART: [afmc] SUBJECT.KEYID = 7
14,845,094 UART: [afmc] AUTHORITY.KEYID = 5
17,347,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,962 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,278 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,274 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,301 UART: [afmc] --
19,144,708 UART: [cold-reset] --
19,147,758 UART: [state] Locking Datavault
19,156,094 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,335 UART: [state] Locking ICCM
19,159,826 UART: [exit] Launching FMC @ 0x40000130
19,168,504 UART:
19,168,743 UART: Running Caliptra FMC ...
19,169,793 UART:
19,169,945 UART: [state] CFI Enabled
19,178,294 UART: [fht] FMC Alias Private Key: 7
20,935,212 UART: [art] Extend RT PCRs Done
20,936,432 UART: [art] Lock RT PCRs Done
20,938,250 UART: [art] Populate DV Done
20,943,681 UART: [fht] FMC Alias Private Key: 7
20,945,166 UART: [art] Derive CDI
20,945,903 UART: [art] Store in in slot 0x4
20,988,438 UART: [art] Derive Key Pair
20,989,433 UART: [art] Store priv key in slot 0x5
23,416,164 UART: [art] Derive Key Pair - Done
23,428,928 UART: [art] Signing Cert with AUTHO
23,430,227 UART: RITY.KEYID = 7
25,135,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,996 UART: [art] PUB.X = 72E7B4CFC5DEA39561C275262729634EC0AB026BF5E549C48757B57E39E2FF14E7936AF59E35F883496EEA3CC31999B5
25,144,253 UART: [art] PUB.Y = 6AAB6A698BAC43B77869FA965CE34CEF4E18D84F8162C3391894FF139B705AD8AE649E84C4B7BD4626008D9859BA318B
25,151,661 UART: [art] SIG.R = 776F1F34B4F4DC12D7DD0B85DC407D5F2314FD05271FA632A365990B9A038F13F88EDFBB86994E3BB7DBA2924EADF71C
25,158,974 UART: [art] SIG.S = FFD0BB24C127EFB4D265433E99ABED47B1E37FEC2DBFC8AE3C3A5C4F959F0634119D34DC01D101C05BC8EE751C99E889
26,137,339 UART: Caliptra RT
26,138,024 UART: [state] CFI Enabled
26,255,035 UART: [rt] RT listening for mailbox commands...
26,286,440 UART: [rt]cmd =0x43415053, len=4
26,288,097 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
3,755,561 ready_for_fw is high
3,755,922 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,945,600 >>> mbox cmd response: success
14,946,324 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,192,708 UART:
19,193,116 UART: Running Caliptra FMC ...
19,194,255 UART:
19,194,422 UART: [state] CFI Enabled
19,202,474 UART: [fht] FMC Alias Private Key: 7
20,959,040 UART: [art] Extend RT PCRs Done
20,960,267 UART: [art] Lock RT PCRs Done
20,961,731 UART: [art] Populate DV Done
20,967,096 UART: [fht] FMC Alias Private Key: 7
20,968,855 UART: [art] Derive CDI
20,969,666 UART: [art] Store in in slot 0x4
21,012,424 UART: [art] Derive Key Pair
21,013,431 UART: [art] Store priv key in slot 0x5
23,440,412 UART: [art] Derive Key Pair - Done
23,453,316 UART: [art] Signing Cert with AUTHO
23,454,629 UART: RITY.KEYID = 7
25,160,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,717 UART: [art] PUB.X = A80B5B53B30B33A847CFDD3C279A60C265C68C97566E172780879966B9BC8CB27CF0BAAA06172AB7C161B3E9940B28F3
25,169,014 UART: [art] PUB.Y = E51C81A9BF02E21B3D7934E5332EA4D5BA3E5B0AC62289D2556202CB5597FC47A567CC68D7D1CBACE84775E91C69B0F3
25,176,251 UART: [art] SIG.R = 0604A5F2729197EE6C1023DE9EB4505CE4F35B8159BB2C66AFC10B9589650314D5D8B8BB4594B3A3DA0A3E8529209349
25,183,695 UART: [art] SIG.S = 2023163698478EFDA0C6897C9B1F8EE7AD5AA3644C16FF638A4E4288242771C4923840F1D9BC964376C898C41E8EA879
26,162,866 UART: Caliptra RT
26,163,560 UART: [state] CFI Enabled
26,281,379 UART: [rt] RT listening for mailbox commands...
26,312,557 UART: [rt]cmd =0x43415053, len=4
26,314,321 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,831 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,319 UART: [kat] SHA2-256
882,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,365 UART: [kat] ++
886,517 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
903,078 UART: [kat] HMAC-384Kdf
907,580 UART: [kat] LMS
1,475,776 UART: [kat] --
1,476,605 UART: [cold-reset] ++
1,477,073 UART: [fht] Storing FHT @ 0x50003400
1,479,880 UART: [idev] ++
1,480,048 UART: [idev] CDI.KEYID = 6
1,480,408 UART: [idev] SUBJECT.KEYID = 7
1,480,832 UART: [idev] UDS.KEYID = 0
1,481,177 ready_for_fw is high
1,481,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,438 UART: [idev] Erasing UDS.KEYID = 0
1,505,038 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,546 UART: [idev] --
1,514,657 UART: [ldev] ++
1,514,825 UART: [ldev] CDI.KEYID = 6
1,515,188 UART: [ldev] SUBJECT.KEYID = 5
1,515,614 UART: [ldev] AUTHORITY.KEYID = 7
1,516,077 UART: [ldev] FE.KEYID = 1
1,521,447 UART: [ldev] Erasing FE.KEYID = 1
1,546,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,328 UART: [ldev] --
1,585,803 UART: [fwproc] Waiting for Commands...
1,586,648 UART: [fwproc] Received command 0x46574c44
1,587,439 UART: [fwproc] Received Image of size 114168 bytes
2,883,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,680 >>> mbox cmd response: success
3,075,680 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,076,810 UART: [afmc] ++
3,076,978 UART: [afmc] CDI.KEYID = 6
3,077,340 UART: [afmc] SUBJECT.KEYID = 7
3,077,765 UART: [afmc] AUTHORITY.KEYID = 5
3,112,574 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,219 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,909 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,748 UART: [afmc] --
3,155,706 UART: [cold-reset] --
3,156,648 UART: [state] Locking Datavault
3,157,931 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,535 UART: [state] Locking ICCM
3,159,105 UART: [exit] Launching FMC @ 0x40000130
3,164,434 UART:
3,164,450 UART: Running Caliptra FMC ...
3,164,858 UART:
3,164,912 UART: [state] CFI Enabled
3,175,459 UART: [fht] FMC Alias Private Key: 7
3,284,354 UART: [art] Extend RT PCRs Done
3,284,782 UART: [art] Lock RT PCRs Done
3,286,640 UART: [art] Populate DV Done
3,294,845 UART: [fht] FMC Alias Private Key: 7
3,295,837 UART: [art] Derive CDI
3,296,117 UART: [art] Store in in slot 0x4
3,381,940 UART: [art] Derive Key Pair
3,382,300 UART: [art] Store priv key in slot 0x5
3,395,776 UART: [art] Derive Key Pair - Done
3,410,790 UART: [art] Signing Cert with AUTHO
3,411,270 UART: RITY.KEYID = 7
3,426,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,215 UART: [art] PUB.X = 1B690BF84C8EF52909B856C95148A2EDEC85529D22D89032D40C0A440948A8DC664C60B3A164C81D0BEDFBF049B390C3
3,433,973 UART: [art] PUB.Y = 293382540A100AD6940CCF5A1E7ACC0371E48CFD8C5ECC73A22556A004BD5A2765E8DBF51AF5FAF3EFB99171053417E9
3,440,917 UART: [art] SIG.R = F852984B16AE0B14D58954C1DB09E7C95E4A7020835923C6EB3F9180B1F2BC02B1F4C94FE58ABFBB4AE91BC69AACA32D
3,447,696 UART: [art] SIG.S = 07B4BBCE54CA5E058F3A590539973FE90E91970223CE5FC7B924B71DE1E979510B9A2A2463AE47AF6DF7F4170F5C09B8
3,471,099 UART: Caliptra RT
3,471,352 UART: [state] CFI Enabled
3,580,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,825 UART: [rt]cmd =0x43415053, len=4
3,612,102 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,501 ready_for_fw is high
1,362,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,352 >>> mbox cmd response: success
2,927,352 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,988,124 UART:
2,988,140 UART: Running Caliptra FMC ...
2,988,548 UART:
2,988,602 UART: [state] CFI Enabled
2,999,113 UART: [fht] FMC Alias Private Key: 7
3,107,046 UART: [art] Extend RT PCRs Done
3,107,474 UART: [art] Lock RT PCRs Done
3,109,084 UART: [art] Populate DV Done
3,117,583 UART: [fht] FMC Alias Private Key: 7
3,118,597 UART: [art] Derive CDI
3,118,877 UART: [art] Store in in slot 0x4
3,204,474 UART: [art] Derive Key Pair
3,204,834 UART: [art] Store priv key in slot 0x5
3,218,228 UART: [art] Derive Key Pair - Done
3,233,082 UART: [art] Signing Cert with AUTHO
3,233,562 UART: RITY.KEYID = 7
3,248,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,387 UART: [art] PUB.X = 9AB01AFBA6F180022737F44BC0D4EA29867871997B96C305E114A64F7E641F3AEA7B6CE51A530617300BCF75CC8FE228
3,256,151 UART: [art] PUB.Y = B339994FF547046F74D3FC7053ADE7ABB93CEEDC6475C58AC781F1F1EDA0E6E91027FFEE82879620AD86055B6484E456
3,263,105 UART: [art] SIG.R = 919AC8AE11639115743103090F65A6DCC5A8D010E78112F181AF953FC5F7C4A706F91C8FD5A2FDC8E06303D576482FFE
3,269,864 UART: [art] SIG.S = F7DCF8A42B362B228608A23B577737ABA6C8F4B51EDB82C12921C36B47F1BDE3A319148DEF4D561E7A865906BA394272
3,293,417 UART: Caliptra RT
3,293,670 UART: [state] CFI Enabled
3,401,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,870 UART: [rt]cmd =0x43415053, len=4
3,432,981 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
891,014 UART: [kat] SHA2-256
892,952 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,349 UART: [kat] HMAC-384Kdf
907,983 UART: [kat] LMS
1,476,179 UART: [kat] --
1,477,134 UART: [cold-reset] ++
1,477,482 UART: [fht] Storing FHT @ 0x50003400
1,480,215 UART: [idev] ++
1,480,383 UART: [idev] CDI.KEYID = 6
1,480,743 UART: [idev] SUBJECT.KEYID = 7
1,481,167 UART: [idev] UDS.KEYID = 0
1,481,512 ready_for_fw is high
1,481,512 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,217 UART: [idev] Erasing UDS.KEYID = 0
1,506,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,829 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,670 UART: [ldev] Erasing FE.KEYID = 1
1,548,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,433 UART: [ldev] --
1,587,856 UART: [fwproc] Waiting for Commands...
1,588,571 UART: [fwproc] Received command 0x46574c44
1,589,362 UART: [fwproc] Received Image of size 114168 bytes
2,885,232 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,857 >>> mbox cmd response: success
3,077,857 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,078,903 UART: [afmc] ++
3,079,071 UART: [afmc] CDI.KEYID = 6
3,079,433 UART: [afmc] SUBJECT.KEYID = 7
3,079,858 UART: [afmc] AUTHORITY.KEYID = 5
3,114,767 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,963 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,356 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,046 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,971 UART: [afmc] --
3,157,949 UART: [cold-reset] --
3,158,771 UART: [state] Locking Datavault
3,160,100 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,704 UART: [state] Locking ICCM
3,161,266 UART: [exit] Launching FMC @ 0x40000130
3,166,595 UART:
3,166,611 UART: Running Caliptra FMC ...
3,167,019 UART:
3,167,162 UART: [state] CFI Enabled
3,177,745 UART: [fht] FMC Alias Private Key: 7
3,285,880 UART: [art] Extend RT PCRs Done
3,286,308 UART: [art] Lock RT PCRs Done
3,287,650 UART: [art] Populate DV Done
3,295,881 UART: [fht] FMC Alias Private Key: 7
3,296,817 UART: [art] Derive CDI
3,297,097 UART: [art] Store in in slot 0x4
3,382,700 UART: [art] Derive Key Pair
3,383,060 UART: [art] Store priv key in slot 0x5
3,396,136 UART: [art] Derive Key Pair - Done
3,411,064 UART: [art] Signing Cert with AUTHO
3,411,544 UART: RITY.KEYID = 7
3,426,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,119 UART: [art] PUB.X = 7E75BE74E0DED065DBEC5843F62607EF7733F69904A647923C5307F2AE848E62B1A2DE862A6E5557652D96526DAEE81C
3,433,884 UART: [art] PUB.Y = BF66D738C9A7DF3DE26FD9C14C69B61162DEEB861AC78F0EBFDF7DCECA655BD779D01F45973D63435EC88456AD66E6E2
3,440,853 UART: [art] SIG.R = 4C1333684F39635347A9B9E957938E31AAD7A932ABC77648CB333105952205641D8B6E9461F5FD33E164852F1FDFE597
3,447,609 UART: [art] SIG.S = F75084A44D37904040F4E312148E202D463D30916FF2DCD6594C627C7756FE53C6655511A6002EABCE21A61DB8684161
3,471,072 UART: Caliptra RT
3,471,417 UART: [state] CFI Enabled
3,579,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,118 UART: [rt]cmd =0x43415053, len=4
3,611,213 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,268 ready_for_fw is high
1,362,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,201 >>> mbox cmd response: success
2,925,201 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,986,931 UART:
2,986,947 UART: Running Caliptra FMC ...
2,987,355 UART:
2,987,498 UART: [state] CFI Enabled
2,998,061 UART: [fht] FMC Alias Private Key: 7
3,106,362 UART: [art] Extend RT PCRs Done
3,106,790 UART: [art] Lock RT PCRs Done
3,108,658 UART: [art] Populate DV Done
3,116,695 UART: [fht] FMC Alias Private Key: 7
3,117,829 UART: [art] Derive CDI
3,118,109 UART: [art] Store in in slot 0x4
3,204,214 UART: [art] Derive Key Pair
3,204,574 UART: [art] Store priv key in slot 0x5
3,218,206 UART: [art] Derive Key Pair - Done
3,232,729 UART: [art] Signing Cert with AUTHO
3,233,209 UART: RITY.KEYID = 7
3,248,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,446 UART: [art] PUB.X = 67CCA60DA8F33C47A55083438FA3397745F7BBAF0C4DEF782D5C74FC08C7AC88CD4C5A188C9D61FB74885728E0DDC86E
3,256,223 UART: [art] PUB.Y = 00109B7D13DF0DADC9440A62D216854C2AA232E08CCE718F01CCA0D15969824BDD9CFB10412409F4BA6D8D566202CFFA
3,263,148 UART: [art] SIG.R = 80B53BD25D1469AEB1083C1B77EFFA4856173EB3187655F15814BC6BC9342A929F0062500DE01ECD210129C01865AB8C
3,269,887 UART: [art] SIG.S = DFD19788697CB91151D5A2F62D78BA1C845635F230CEE6A37C53E022154F2DD172BEB6208C8C242DEC11B72E2FEF8F03
3,293,231 UART: Caliptra RT
3,293,576 UART: [state] CFI Enabled
3,403,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,818 UART: [rt]cmd =0x43415053, len=4
3,435,029 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
893,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,259 UART: [kat] ++
897,411 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
918,042 UART: [kat] HMAC-384Kdf
922,782 UART: [kat] LMS
1,171,110 UART: [kat] --
1,172,047 UART: [cold-reset] ++
1,172,531 UART: [fht] FHT @ 0x50003400
1,174,994 UART: [idev] ++
1,175,162 UART: [idev] CDI.KEYID = 6
1,175,522 UART: [idev] SUBJECT.KEYID = 7
1,175,946 UART: [idev] UDS.KEYID = 0
1,176,291 ready_for_fw is high
1,176,291 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,730 UART: [idev] Erasing UDS.KEYID = 0
1,201,181 UART: [idev] Sha1 KeyId Algorithm
1,209,671 UART: [idev] --
1,210,687 UART: [ldev] ++
1,210,855 UART: [ldev] CDI.KEYID = 6
1,211,218 UART: [ldev] SUBJECT.KEYID = 5
1,211,644 UART: [ldev] AUTHORITY.KEYID = 7
1,212,107 UART: [ldev] FE.KEYID = 1
1,217,283 UART: [ldev] Erasing FE.KEYID = 1
1,243,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,975 UART: [ldev] --
1,283,462 UART: [fwproc] Wait for Commands...
1,284,084 UART: [fwproc] Recv command 0x46574c44
1,284,812 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,876 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,699 >>> mbox cmd response: success
2,772,699 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,773,717 UART: [afmc] ++
2,773,885 UART: [afmc] CDI.KEYID = 6
2,774,247 UART: [afmc] SUBJECT.KEYID = 7
2,774,672 UART: [afmc] AUTHORITY.KEYID = 5
2,810,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,556 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,260 UART: [afmc] --
2,854,344 UART: [cold-reset] --
2,855,182 UART: [state] Locking Datavault
2,856,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,059 UART: [state] Locking ICCM
2,857,623 UART: [exit] Launching FMC @ 0x40000130
2,862,952 UART:
2,862,968 UART: Running Caliptra FMC ...
2,863,376 UART:
2,863,430 UART: [state] CFI Enabled
2,873,839 UART: [fht] FMC Alias Private Key: 7
2,981,930 UART: [art] Extend RT PCRs Done
2,982,358 UART: [art] Lock RT PCRs Done
2,984,256 UART: [art] Populate DV Done
2,992,595 UART: [fht] FMC Alias Private Key: 7
2,993,531 UART: [art] Derive CDI
2,993,811 UART: [art] Store in in slot 0x4
3,079,240 UART: [art] Derive Key Pair
3,079,600 UART: [art] Store priv key in slot 0x5
3,092,104 UART: [art] Derive Key Pair - Done
3,106,841 UART: [art] Signing Cert with AUTHO
3,107,321 UART: RITY.KEYID = 7
3,122,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,458 UART: [art] PUB.X = 135F5076C0C54A808223F2F5A3F3E1648EEFE13752161D7771A4EEA856C70BE25E4C1B8C827729F12BCE4CBBFD1B0C5B
3,130,234 UART: [art] PUB.Y = 4FBF994888B472E7DF75046EA025C3AD1923B4D114C6C3198C9700D4C244A4F9BCCE0369D0287EDDC4653423321C6F49
3,137,158 UART: [art] SIG.R = A629E126CA0DA72C8DBBE4C73579CC8AF7CE7168BCFE50146B5BFB9FA6B1A474BFC811DE6BDCAEE84542A155FE8ADF61
3,143,957 UART: [art] SIG.S = DEECD2848514C230430535C16608F53AAF4C4715557C4DCE0A696C10457FF5934D4AC79BE5843810581CCFE442882324
3,167,975 UART: Caliptra RT
3,168,228 UART: [state] CFI Enabled
3,276,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,390 UART: [rt]cmd =0x43415053, len=4
3,307,681 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,849 ready_for_fw is high
1,060,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,488 >>> mbox cmd response: success
2,624,488 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,686,408 UART:
2,686,424 UART: Running Caliptra FMC ...
2,686,832 UART:
2,686,886 UART: [state] CFI Enabled
2,697,375 UART: [fht] FMC Alias Private Key: 7
2,804,902 UART: [art] Extend RT PCRs Done
2,805,330 UART: [art] Lock RT PCRs Done
2,806,946 UART: [art] Populate DV Done
2,814,937 UART: [fht] FMC Alias Private Key: 7
2,815,965 UART: [art] Derive CDI
2,816,245 UART: [art] Store in in slot 0x4
2,902,200 UART: [art] Derive Key Pair
2,902,560 UART: [art] Store priv key in slot 0x5
2,915,584 UART: [art] Derive Key Pair - Done
2,930,257 UART: [art] Signing Cert with AUTHO
2,930,737 UART: RITY.KEYID = 7
2,945,783 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,548 UART: [art] PUB.X = C400E27025C10A76605F9BD887D12C004E5EDFD1AC88F31D3A1B97670879164FFEFAD578D4629038AD67DC2D29FD9770
2,953,274 UART: [art] PUB.Y = 33B7C2277CDCF3EE7E4E768802735F61B7302E5DC0F59A46AE442F87A34AC1F80C9D547AF520B6FDE6DD544209A17689
2,960,223 UART: [art] SIG.R = B3D6A9D8183370218FEABE0A34DD15513D927249CC86F3C10F3E30038ED999C870054FF0C2443C1BDBAD3E17FEE904D0
2,966,988 UART: [art] SIG.S = E0965B35364BA3759297CFBAB8E4FA5579CAA1830C5B18E5CE0FAC42FFA33F37360C9DB4584ACEDF22215473137F8390
2,991,310 UART: Caliptra RT
2,991,563 UART: [state] CFI Enabled
3,099,063 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,463 UART: [rt]cmd =0x43415053, len=4
3,130,638 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,875 UART: [state] LifecycleState = Unprovisioned
86,530 UART: [state] DebugLocked = No
87,086 UART: [state] WD Timer not started. Device not locked for debugging
88,357 UART: [kat] SHA2-256
894,007 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,132 UART: [kat] ++
898,284 UART: [kat] sha1
902,462 UART: [kat] SHA2-256
904,402 UART: [kat] SHA2-384
907,147 UART: [kat] SHA2-512-ACC
909,048 UART: [kat] ECC-384
918,729 UART: [kat] HMAC-384Kdf
923,431 UART: [kat] LMS
1,171,759 UART: [kat] --
1,172,578 UART: [cold-reset] ++
1,173,062 UART: [fht] FHT @ 0x50003400
1,175,835 UART: [idev] ++
1,176,003 UART: [idev] CDI.KEYID = 6
1,176,363 UART: [idev] SUBJECT.KEYID = 7
1,176,787 UART: [idev] UDS.KEYID = 0
1,177,132 ready_for_fw is high
1,177,132 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,889 UART: [idev] Erasing UDS.KEYID = 0
1,201,910 UART: [idev] Sha1 KeyId Algorithm
1,210,464 UART: [idev] --
1,211,422 UART: [ldev] ++
1,211,590 UART: [ldev] CDI.KEYID = 6
1,211,953 UART: [ldev] SUBJECT.KEYID = 5
1,212,379 UART: [ldev] AUTHORITY.KEYID = 7
1,212,842 UART: [ldev] FE.KEYID = 1
1,217,964 UART: [ldev] Erasing FE.KEYID = 1
1,245,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,474 UART: [ldev] --
1,284,755 UART: [fwproc] Wait for Commands...
1,285,487 UART: [fwproc] Recv command 0x46574c44
1,286,215 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,081 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,385 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,842 >>> mbox cmd response: success
2,773,842 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,774,912 UART: [afmc] ++
2,775,080 UART: [afmc] CDI.KEYID = 6
2,775,442 UART: [afmc] SUBJECT.KEYID = 7
2,775,867 UART: [afmc] AUTHORITY.KEYID = 5
2,811,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,957 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,685 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,181 UART: [afmc] --
2,855,307 UART: [cold-reset] --
2,856,309 UART: [state] Locking Datavault
2,857,474 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,078 UART: [state] Locking ICCM
2,858,700 UART: [exit] Launching FMC @ 0x40000130
2,864,029 UART:
2,864,045 UART: Running Caliptra FMC ...
2,864,453 UART:
2,864,596 UART: [state] CFI Enabled
2,875,153 UART: [fht] FMC Alias Private Key: 7
2,982,482 UART: [art] Extend RT PCRs Done
2,982,910 UART: [art] Lock RT PCRs Done
2,984,510 UART: [art] Populate DV Done
2,992,751 UART: [fht] FMC Alias Private Key: 7
2,993,879 UART: [art] Derive CDI
2,994,159 UART: [art] Store in in slot 0x4
3,080,098 UART: [art] Derive Key Pair
3,080,458 UART: [art] Store priv key in slot 0x5
3,093,576 UART: [art] Derive Key Pair - Done
3,108,133 UART: [art] Signing Cert with AUTHO
3,108,613 UART: RITY.KEYID = 7
3,123,727 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,492 UART: [art] PUB.X = 00B5B0C5305450E775687410203AA6FA53873D71E13969B5F4F3DE65D3016138E581794CD4DC0CA0FFE9E2EE1A7D372A
3,131,236 UART: [art] PUB.Y = D55B14FC75504CAB3B574960C31CB2EA2879B3A3A23219A2F885703FD879AF0BDF3543B221C1D0CF25B7098B824572EE
3,138,186 UART: [art] SIG.R = 49B19E07E8A68F6041C6A03AE877DC06423F4EDB756961A875908F719E370F4F4EAB185C997260217C6F5FD6B888E355
3,144,945 UART: [art] SIG.S = E316AD51A9B24A32A4AB61EE79CEC52182236A3BF1D59AA4263AAEE7CD4AC2CB5188E77C3CAF99FBA9289F0CDB0FBBCA
3,168,376 UART: Caliptra RT
3,168,721 UART: [state] CFI Enabled
3,276,496 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,008 UART: [rt]cmd =0x43415053, len=4
3,308,467 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,544 ready_for_fw is high
1,060,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,409 >>> mbox cmd response: success
2,625,409 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,687,735 UART:
2,687,751 UART: Running Caliptra FMC ...
2,688,159 UART:
2,688,302 UART: [state] CFI Enabled
2,698,955 UART: [fht] FMC Alias Private Key: 7
2,806,488 UART: [art] Extend RT PCRs Done
2,806,916 UART: [art] Lock RT PCRs Done
2,808,462 UART: [art] Populate DV Done
2,816,831 UART: [fht] FMC Alias Private Key: 7
2,817,811 UART: [art] Derive CDI
2,818,091 UART: [art] Store in in slot 0x4
2,904,044 UART: [art] Derive Key Pair
2,904,404 UART: [art] Store priv key in slot 0x5
2,917,622 UART: [art] Derive Key Pair - Done
2,932,256 UART: [art] Signing Cert with AUTHO
2,932,736 UART: RITY.KEYID = 7
2,947,846 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,611 UART: [art] PUB.X = 5D07F5ACEE55141D0153F745A17B446B1816A8E9B030DE20D8A3E1DA31C2D6BFB1A19E079AE4A48D13C34B35AA9EA004
2,955,383 UART: [art] PUB.Y = 0BA3CEC2DC353EF5A51D09A76F01D1DC778F45E316ED3B4F3EA599697A2342BB8EE9BE3A37907CC3694DF40BCB947536
2,962,337 UART: [art] SIG.R = FDCBC8FC0F469FBA6C197066470AC61C1D9A0A8D4DA54430C79610BC799D4ECE5A76C080C2CA5BBA38235446712966CA
2,969,112 UART: [art] SIG.S = A393A6F163B801AF3283674B290650BE8F40E4D9B0F7600805A4ABB52B848DF4C790BD19E1392E5E6A54E8E9EEF86907
2,993,020 UART: Caliptra RT
2,993,365 UART: [state] CFI Enabled
3,101,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,811 UART: [rt]cmd =0x43415053, len=4
3,132,998 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,378 UART: [kat] LMS
1,168,690 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,639 UART: [idev] ++
1,172,807 UART: [idev] CDI.KEYID = 6
1,173,168 UART: [idev] SUBJECT.KEYID = 7
1,173,593 UART: [idev] UDS.KEYID = 0
1,173,939 ready_for_fw is high
1,173,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,315 UART: [idev] Erasing UDS.KEYID = 0
1,198,275 UART: [idev] Sha1 KeyId Algorithm
1,207,211 UART: [idev] --
1,208,206 UART: [ldev] ++
1,208,374 UART: [ldev] CDI.KEYID = 6
1,208,738 UART: [ldev] SUBJECT.KEYID = 5
1,209,165 UART: [ldev] AUTHORITY.KEYID = 7
1,209,628 UART: [ldev] FE.KEYID = 1
1,214,646 UART: [ldev] Erasing FE.KEYID = 1
1,240,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,926 UART: [ldev] --
1,280,308 UART: [fwproc] Wait for Commands...
1,280,897 UART: [fwproc] Recv command 0x46574c44
1,281,630 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,985 >>> mbox cmd response: success
2,769,985 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,771,194 UART: [afmc] ++
2,771,362 UART: [afmc] CDI.KEYID = 6
2,771,725 UART: [afmc] SUBJECT.KEYID = 7
2,772,151 UART: [afmc] AUTHORITY.KEYID = 5
2,806,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,620 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,371 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,100 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,983 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,702 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,511 UART: [afmc] --
2,850,549 UART: [cold-reset] --
2,851,447 UART: [state] Locking Datavault
2,852,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,306 UART: [state] Locking ICCM
2,853,878 UART: [exit] Launching FMC @ 0x40000130
2,859,207 UART:
2,859,223 UART: Running Caliptra FMC ...
2,859,631 UART:
2,859,685 UART: [state] CFI Enabled
2,870,030 UART: [fht] FMC Alias Private Key: 7
2,977,625 UART: [art] Extend RT PCRs Done
2,978,053 UART: [art] Lock RT PCRs Done
2,979,625 UART: [art] Populate DV Done
2,987,646 UART: [fht] FMC Alias Private Key: 7
2,988,704 UART: [art] Derive CDI
2,988,984 UART: [art] Store in in slot 0x4
3,074,531 UART: [art] Derive Key Pair
3,074,891 UART: [art] Store priv key in slot 0x5
3,088,303 UART: [art] Derive Key Pair - Done
3,103,353 UART: [art] Signing Cert with AUTHO
3,103,833 UART: RITY.KEYID = 7
3,118,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,504 UART: [art] PUB.X = 83993B0AF5BF76E50F2B04DECF0AD2C9B3BD6CD74CF17B068DA3AB9C007EF8B7952DF1385CA8D7FED08CCCD009EA76F7
3,126,264 UART: [art] PUB.Y = 3C3197473E2251CA0069CCFAD2B83204F4C05B638B5B27ABE3A07392AB8A17DBED80A26BC48A08E0C7CB6F8ABC21DF4A
3,133,206 UART: [art] SIG.R = 49939208557EB5D743643679C7F673BFEF755925E2CB3F7ECBCE444E63E19E3859BBDBAE36DB52B76482DD8EF7791983
3,139,979 UART: [art] SIG.S = F8B4D2DCC4A51B487DDFE1BF70D13EC3189C7B6A0A22EF4F1C1B75ABC666AA57B7CAF36F23930E8B2B272AF4BA0F5F60
3,164,419 UART: Caliptra RT
3,164,672 UART: [state] CFI Enabled
3,272,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,103 UART: [rt]cmd =0x43415053, len=4
3,304,558 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,406 ready_for_fw is high
1,055,406 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,483 >>> mbox cmd response: success
2,619,483 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,681,461 UART:
2,681,477 UART: Running Caliptra FMC ...
2,681,885 UART:
2,681,939 UART: [state] CFI Enabled
2,692,756 UART: [fht] FMC Alias Private Key: 7
2,800,105 UART: [art] Extend RT PCRs Done
2,800,533 UART: [art] Lock RT PCRs Done
2,802,017 UART: [art] Populate DV Done
2,810,248 UART: [fht] FMC Alias Private Key: 7
2,811,414 UART: [art] Derive CDI
2,811,694 UART: [art] Store in in slot 0x4
2,897,617 UART: [art] Derive Key Pair
2,897,977 UART: [art] Store priv key in slot 0x5
2,911,067 UART: [art] Derive Key Pair - Done
2,925,718 UART: [art] Signing Cert with AUTHO
2,926,198 UART: RITY.KEYID = 7
2,941,798 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,563 UART: [art] PUB.X = 4E1A72EAF9184205004D895E5E3E29DF02B1EE378501346F4937F945448032CF8D3EDC814A3265D6FFA723E199258A3A
2,949,300 UART: [art] PUB.Y = 6AAF88CB8F3D6DF3DF4DED74CF7F088DFBF54CE5CDB79E602007E1CB2A85069BD228E5A52DCA593A9A25839CCC99450B
2,956,264 UART: [art] SIG.R = 75D13741C7EB7559EDAD850E481EF6F5742D49001C26420DF497D328C5AEC62A7AC7E48D70EEC15854EF7B222A14CB02
2,963,011 UART: [art] SIG.S = AE621376B8FE3F9F9BA20347257A49CB52807D4499BE52844FA30DD3CAD16F5B475EEFFD2FAA3A472A0453AF5A425ED1
2,986,871 UART: Caliptra RT
2,987,124 UART: [state] CFI Enabled
3,094,357 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,109 UART: [rt]cmd =0x43415053, len=4
3,126,300 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,721 UART: [kat] SHA2-512-ACC
906,622 UART: [kat] ECC-384
916,841 UART: [kat] HMAC-384Kdf
921,419 UART: [kat] LMS
1,169,731 UART: [kat] --
1,170,796 UART: [cold-reset] ++
1,171,356 UART: [fht] FHT @ 0x50003400
1,174,188 UART: [idev] ++
1,174,356 UART: [idev] CDI.KEYID = 6
1,174,717 UART: [idev] SUBJECT.KEYID = 7
1,175,142 UART: [idev] UDS.KEYID = 0
1,175,488 ready_for_fw is high
1,175,488 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,962 UART: [idev] Erasing UDS.KEYID = 0
1,200,038 UART: [idev] Sha1 KeyId Algorithm
1,208,878 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,495 UART: [ldev] SUBJECT.KEYID = 5
1,210,922 UART: [ldev] AUTHORITY.KEYID = 7
1,211,385 UART: [ldev] FE.KEYID = 1
1,216,665 UART: [ldev] Erasing FE.KEYID = 1
1,243,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,165 UART: [ldev] --
1,282,653 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,999 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,616 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,110 >>> mbox cmd response: success
2,772,110 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,773,279 UART: [afmc] ++
2,773,447 UART: [afmc] CDI.KEYID = 6
2,773,810 UART: [afmc] SUBJECT.KEYID = 7
2,774,236 UART: [afmc] AUTHORITY.KEYID = 5
2,810,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,002 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,721 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,690 UART: [afmc] --
2,853,784 UART: [cold-reset] --
2,854,748 UART: [state] Locking Datavault
2,855,985 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,589 UART: [state] Locking ICCM
2,857,033 UART: [exit] Launching FMC @ 0x40000130
2,862,362 UART:
2,862,378 UART: Running Caliptra FMC ...
2,862,786 UART:
2,862,929 UART: [state] CFI Enabled
2,873,560 UART: [fht] FMC Alias Private Key: 7
2,981,749 UART: [art] Extend RT PCRs Done
2,982,177 UART: [art] Lock RT PCRs Done
2,983,411 UART: [art] Populate DV Done
2,991,508 UART: [fht] FMC Alias Private Key: 7
2,992,662 UART: [art] Derive CDI
2,992,942 UART: [art] Store in in slot 0x4
3,078,589 UART: [art] Derive Key Pair
3,078,949 UART: [art] Store priv key in slot 0x5
3,091,849 UART: [art] Derive Key Pair - Done
3,106,938 UART: [art] Signing Cert with AUTHO
3,107,418 UART: RITY.KEYID = 7
3,122,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,253 UART: [art] PUB.X = DA7041ABDB33627CA026891994BAC4A9C6580DCC59107719D6B5B936F9A398627B64D5FD13639EDCAA242F41E26895E6
3,130,024 UART: [art] PUB.Y = 9A444E2C10A54F283E0C4BC8BFBA4F90619E61D7253F153EFF4EC72DE90A05D7248D9160D6F5AA5FD0AF0C468BBE635A
3,136,980 UART: [art] SIG.R = 1BD185A4E2F1782C67C33B7C61D7E8B68B916B297E7D26A38CA7017057BE50505546DCDCBD43238FE324B129B822B0EF
3,143,753 UART: [art] SIG.S = FA0B56FD90667234F6EDC920AE9A34B67D04C16D510499275846BD3C134CD9F52A62CEF2C737616839E3F3ED6E0EB7BD
3,167,710 UART: Caliptra RT
3,168,055 UART: [state] CFI Enabled
3,275,516 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,000 UART: [rt]cmd =0x43415053, len=4
3,307,113 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,441 ready_for_fw is high
1,056,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,408 >>> mbox cmd response: success
2,621,408 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,683,332 UART:
2,683,348 UART: Running Caliptra FMC ...
2,683,756 UART:
2,683,899 UART: [state] CFI Enabled
2,694,186 UART: [fht] FMC Alias Private Key: 7
2,802,041 UART: [art] Extend RT PCRs Done
2,802,469 UART: [art] Lock RT PCRs Done
2,804,087 UART: [art] Populate DV Done
2,812,140 UART: [fht] FMC Alias Private Key: 7
2,813,250 UART: [art] Derive CDI
2,813,530 UART: [art] Store in in slot 0x4
2,898,923 UART: [art] Derive Key Pair
2,899,283 UART: [art] Store priv key in slot 0x5
2,913,093 UART: [art] Derive Key Pair - Done
2,927,893 UART: [art] Signing Cert with AUTHO
2,928,373 UART: RITY.KEYID = 7
2,943,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,394 UART: [art] PUB.X = 2059FCE70D435578A52190BCC5C49A6FC8C9AC65551B34811F48F0D7D28858413A0D7EB29924524AD40FF87150AC6C2F
2,951,157 UART: [art] PUB.Y = 8210A7E9B089BD95D41CCB292263F396FF12DF429169D9ABAADB71C805985DFE7A3C6893AE303B3B0F5FD9A12D2D594D
2,958,115 UART: [art] SIG.R = 65C0E5E77EF105F801C6E77AA07A0848FDCE23C94E33DFDB1206BC779C5B17848875602E5ADCC641B3064602868869BF
2,964,871 UART: [art] SIG.S = 9AD5B99BC00C1C2A51AE4D29AB37CF30B65C5292CB89119C54C97918DA68C48A85D930AE240D42F3D18BFD3545AE1AF0
2,988,788 UART: Caliptra RT
2,989,133 UART: [state] CFI Enabled
3,096,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,252 UART: [rt]cmd =0x43415053, len=4
3,128,629 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,373,514 UART: [ldev] SUBJECT.KEYID = 5
7,374,770 UART: [ldev] AUTHORITY.KEYID = 7
7,375,964 UART: [ldev] FE.KEYID = 1
7,421,581 UART: [ldev] Erasing FE.KEYID = 1
10,754,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,020 UART: [ldev] --
13,115,311 UART: [fwproc] Waiting for Commands...
13,118,533 UART: [fwproc] Received command 0x46574c44
13,120,705 UART: [fwproc] Received Image of size 113844 bytes
17,170,103 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,056 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,968 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,630,845 >>> mbox cmd response: success
17,631,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,634,288 UART: [afmc] ++
17,634,918 UART: [afmc] CDI.KEYID = 6
17,635,801 UART: [afmc] SUBJECT.KEYID = 7
17,637,065 UART: [afmc] AUTHORITY.KEYID = 5
21,006,298 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,812 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,323,398 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,338,188 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,352,687 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,374,929 UART: [afmc] --
23,378,351 UART: [cold-reset] --
23,381,452 UART: [state] Locking Datavault
23,387,877 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,638 UART: [state] Locking ICCM
23,391,276 UART: [exit] Launching FMC @ 0x40000130
23,399,664 UART:
23,399,890 UART: Running Caliptra FMC ...
23,400,919 UART:
23,401,061 UART: [state] CFI Enabled
23,466,810 UART: [fht] FMC Alias Private Key: 7
25,804,764 UART: [art] Extend RT PCRs Done
25,805,992 UART: [art] Lock RT PCRs Done
25,807,856 UART: [art] Populate DV Done
25,812,939 UART: [fht] FMC Alias Private Key: 7
25,814,632 UART: [art] Derive CDI
25,815,438 UART: [art] Store in in slot 0x4
25,875,799 UART: [art] Derive Key Pair
25,876,827 UART: [art] Store priv key in slot 0x5
29,169,091 UART: [art] Derive Key Pair - Done
29,181,763 UART: [art] Signing Cert with AUTHO
29,183,060 UART: RITY.KEYID = 7
31,471,691 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,194 UART: [art] PUB.X = 65EFDFF09D2971C65514CCA12BB0C8A4D3B11DC7584005438C0462622F3743F4CDC2B17B514802A2624AA406C2669BF8
31,480,475 UART: [art] PUB.Y = 61C60F188E09941A5C53A810C4549605AEBB90A73302A6B2BFD38922A07F1FA70B167B9B3419527ED3C4D03E7DA92187
31,487,668 UART: [art] SIG.R = 081BD2E85F209BEC3A5AC12CE4696E047B2515E5E3C2AC60A3E77E4737639F3536D81749CF031B981B8C68D6704E201C
31,495,014 UART: [art] SIG.S = 4672FBDD5ED4AD90B3C0FA5D2756F480B741FF1B99B64A28CB52FBF1D9E23FACDEA0333DF778A993397465DAC193F766
32,799,828 UART: Caliptra RT
32,800,542 UART: [state] CFI Enabled
32,960,874 UART: [rt] RT listening for mailbox commands...
32,992,065 UART: [rt]cmd =0x494e464f, len=4
32,996,484 >>> mbox cmd response data (312 bytes)
35,056,815 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,201,503 UART:
35,201,864 UART: Running Caliptra ROM ...
35,202,941 UART:
35,203,087 UART: [state] CFI Enabled
35,265,877 UART: [state] LifecycleState = Unprovisioned
35,267,832 UART: [state] DebugLocked = No
35,269,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,274,505 UART: [kat] SHA2-256
35,444,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,454,716 UART: [kat] ++
35,455,163 UART: [kat] sha1
35,464,796 UART: [kat] SHA2-256
35,467,470 UART: [kat] SHA2-384
35,472,859 UART: [kat] SHA2-512-ACC
35,475,196 UART: [kat] ECC-384
37,770,202 UART: [kat] HMAC-384Kdf
37,801,878 UART: [kat] LMS
38,992,190 UART: [kat] --
38,996,500 UART: [update-reset] ++
43,126,235 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,130,813 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
43,512,063 >>> mbox cmd response: success
43,513,223 UART: [update-reset] Copying MAN_2 To MAN_1
43,535,650 UART: [update-reset Success] --
43,540,290 UART: [state] Locking Datavault
43,544,122 UART: [state] Locking PCR0, PCR1 and PCR31
43,545,877 UART: [state] Locking ICCM
43,547,616 UART: [exit] Launching FMC @ 0x40000130
43,556,016 UART:
43,556,243 UART: Running Caliptra FMC ...
43,557,264 UART:
43,557,408 UART: [state] CFI Enabled
43,658,330 UART: [art] Extend RT PCRs Done
43,659,507 UART: [art] Lock RT PCRs Done
43,661,056 UART: [art] Populate DV Done
43,666,402 UART: [fht] FMC Alias Private Key: 7
43,668,101 UART: [art] Derive CDI
43,668,832 UART: [art] Store in in slot 0x4
43,727,206 UART: [art] Derive Key Pair
43,728,237 UART: [art] Store priv key in slot 0x5
47,021,063 UART: [art] Derive Key Pair - Done
47,034,065 UART: [art] Signing Cert with AUTHO
47,035,365 UART: RITY.KEYID = 7
49,322,680 UART: [art] Erasing AUTHORITY.KEYID = 7
49,324,184 UART: [art] PUB.X = 8AF15123F14A208F6F3FE055C8FC1DABC8C5AABBE7EEFCE5E2F7F221403B56238B4690582C89391D817E4FEFD1DFE4A3
49,331,424 UART: [art] PUB.Y = 4DCD2D3580316D393285CCCA8B2E83395E3F0DE73919691842E29BCE877037162AECC5CBF910D839A26B3E27AF04F9E5
49,338,680 UART: [art] SIG.R = F644B335590139DDB90C071F283A75D20D86F2E16C6940333CAF9C90B5FA752A47992224CE51E4B57CD73E034A914E20
49,346,036 UART: [art] SIG.S = B22E672F5E3BB4A28F512080C5154F7683A01EB22CB605AB74AD4B59F90091F106D786BE014FBDB885EF4866C837C87F
50,651,441 UART: Caliptra RT
50,652,129 UART: [state] CFI Enabled
50,980,425 UART: [rt] RT listening for mailbox commands...
50,982,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,012,030 UART: [rt]cmd =0x494e464f, len=4
51,016,526 >>> mbox cmd response data (312 bytes)
53,075,711 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
53,220,332 UART:
53,220,697 UART: Running Caliptra ROM ...
53,221,787 UART:
53,221,942 UART: [state] CFI Enabled
53,291,370 UART: [state] LifecycleState = Unprovisioned
53,293,324 UART: [state] DebugLocked = No
53,294,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,300,065 UART: [kat] SHA2-256
53,469,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,480,244 UART: [kat] ++
53,480,721 UART: [kat] sha1
53,493,221 UART: [kat] SHA2-256
53,495,916 UART: [kat] SHA2-384
53,502,653 UART: [kat] SHA2-512-ACC
53,505,054 UART: [kat] ECC-384
55,794,209 UART: [kat] HMAC-384Kdf
55,824,777 UART: [kat] LMS
57,015,106 UART: [kat] --
57,019,612 UART: [update-reset] ++
61,159,035 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,162,641 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
61,543,918 >>> mbox cmd response: success
61,545,842 UART: [update-reset] Copying MAN_2 To MAN_1
61,568,250 UART: [update-reset Success] --
61,572,315 UART: [state] Locking Datavault
61,575,662 UART: [state] Locking PCR0, PCR1 and PCR31
61,577,349 UART: [state] Locking ICCM
61,580,152 UART: [exit] Launching FMC @ 0x40000130
61,588,590 UART:
61,588,819 UART: Running Caliptra FMC ...
61,589,914 UART:
61,590,072 UART: [state] CFI Enabled
61,679,142 UART: [art] Extend RT PCRs Done
61,680,322 UART: [art] Lock RT PCRs Done
61,681,712 UART: [art] Populate DV Done
61,687,120 UART: [fht] FMC Alias Private Key: 7
61,688,809 UART: [art] Derive CDI
61,689,612 UART: [art] Store in in slot 0x4
61,748,263 UART: [art] Derive Key Pair
61,749,349 UART: [art] Store priv key in slot 0x5
65,041,913 UART: [art] Derive Key Pair - Done
65,055,183 UART: [art] Signing Cert with AUTHO
65,056,485 UART: RITY.KEYID = 7
67,344,133 UART: [art] Erasing AUTHORITY.KEYID = 7
67,345,647 UART: [art] PUB.X = 6495B449DCDD9524856B785291C4CB192DE1DEE5D96BD4036693DF92E821BCB6510D265C5CE8141D833BA5AA927BF5E0
67,352,922 UART: [art] PUB.Y = A956F2F630E09E29000521378A8EBBE3309316207E5FB19E49D927E85AE6A14A24B6A6513920B5738CFE13B084C9FE67
67,360,127 UART: [art] SIG.R = 78602D6FF5EDA21A97CF7BA5AB17653897EBA5CF871893AD2E158ED86FA68F51ACBA442F04776ED265684FF7D1FCFEA2
67,367,595 UART: [art] SIG.S = 1762E506BDAE3CA26E8EB53141CB6503D1DECBC64F65497C08453F6A896AAC71BFD27380E4055B88D193DD451ABF3F11
68,672,782 UART: Caliptra RT
68,673,478 UART: [state] CFI Enabled
69,004,762 UART: [rt] RT listening for mailbox commands...
69,006,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,036,197 UART: [rt]cmd =0x494e464f, len=4
69,040,368 >>> mbox cmd response data (312 bytes)
69,042,276 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
69,186,549 UART:
69,186,855 UART: Running Caliptra ROM ...
69,187,883 UART:
69,188,025 UART: [state] CFI Enabled
69,264,453 UART: [state] LifecycleState = Unprovisioned
69,266,379 UART: [state] DebugLocked = No
69,268,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,273,634 UART: [kat] SHA2-256
69,443,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,453,861 UART: [kat] ++
69,454,400 UART: [kat] sha1
69,465,568 UART: [kat] SHA2-256
69,468,309 UART: [kat] SHA2-384
69,475,431 UART: [kat] SHA2-512-ACC
69,477,772 UART: [kat] ECC-384
71,766,627 UART: [kat] HMAC-384Kdf
71,798,952 UART: [kat] LMS
72,989,326 UART: [kat] --
72,992,983 UART: [update-reset] ++
77,138,244 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,141,389 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
77,522,699 >>> mbox cmd response: success
77,523,892 UART: [update-reset] Copying MAN_2 To MAN_1
77,546,272 UART: [update-reset Success] --
77,550,909 UART: [state] Locking Datavault
77,553,834 UART: [state] Locking PCR0, PCR1 and PCR31
77,555,588 UART: [state] Locking ICCM
77,556,628 UART: [exit] Launching FMC @ 0x40000130
77,565,031 UART:
77,565,259 UART: Running Caliptra FMC ...
77,566,288 UART:
77,566,430 UART: [state] CFI Enabled
77,653,735 UART: [art] Extend RT PCRs Done
77,654,916 UART: [art] Lock RT PCRs Done
77,656,231 UART: [art] Populate DV Done
77,661,701 UART: [fht] FMC Alias Private Key: 7
77,663,397 UART: [art] Derive CDI
77,664,129 UART: [art] Store in in slot 0x4
77,722,959 UART: [art] Derive Key Pair
77,724,017 UART: [art] Store priv key in slot 0x5
81,016,337 UART: [art] Derive Key Pair - Done
81,029,169 UART: [art] Signing Cert with AUTHO
81,030,471 UART: RITY.KEYID = 7
83,318,353 UART: [art] Erasing AUTHORITY.KEYID = 7
83,319,864 UART: [art] PUB.X = 8AF15123F14A208F6F3FE055C8FC1DABC8C5AABBE7EEFCE5E2F7F221403B56238B4690582C89391D817E4FEFD1DFE4A3
83,327,139 UART: [art] PUB.Y = 4DCD2D3580316D393285CCCA8B2E83395E3F0DE73919691842E29BCE877037162AECC5CBF910D839A26B3E27AF04F9E5
83,334,388 UART: [art] SIG.R = F644B335590139DDB90C071F283A75D20D86F2E16C6940333CAF9C90B5FA752A47992224CE51E4B57CD73E034A914E20
83,341,740 UART: [art] SIG.S = B22E672F5E3BB4A28F512080C5154F7683A01EB22CB605AB74AD4B59F90091F106D786BE014FBDB885EF4866C837C87F
84,647,307 UART: Caliptra RT
84,648,021 UART: [state] CFI Enabled
84,979,086 UART: [rt] RT listening for mailbox commands...
84,981,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,010,668 UART: [rt]cmd =0x494e464f, len=4
85,015,108 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,802,593 ready_for_fw is high
3,802,981 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,848,974 >>> mbox cmd response: success
17,850,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,549,211 UART:
23,549,594 UART: Running Caliptra FMC ...
23,550,784 UART:
23,550,975 UART: [state] CFI Enabled
23,616,412 UART: [fht] FMC Alias Private Key: 7
25,954,355 UART: [art] Extend RT PCRs Done
25,955,604 UART: [art] Lock RT PCRs Done
25,957,464 UART: [art] Populate DV Done
25,962,820 UART: [fht] FMC Alias Private Key: 7
25,964,465 UART: [art] Derive CDI
25,965,275 UART: [art] Store in in slot 0x4
26,024,910 UART: [art] Derive Key Pair
26,025,948 UART: [art] Store priv key in slot 0x5
29,318,589 UART: [art] Derive Key Pair - Done
29,331,698 UART: [art] Signing Cert with AUTHO
29,332,997 UART: RITY.KEYID = 7
31,619,580 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,085 UART: [art] PUB.X = 5BCD4780DC46C1B61FF89A84B424B0BDBE37B166376806F9203E77FBD33847A13CEE2CA529DCF4A1370ECB05B1F87943
31,628,339 UART: [art] PUB.Y = EBAA224CC92CB1317FD0641936B118940379ADEDC74485FBBCEE961EB2F89C276E7FA807BDE31BDBDDC30BAC3A4F5FB6
31,635,635 UART: [art] SIG.R = D27AB62BD789D151D96A40E9DE9605398D1B64BAD010D0E1B7FAA69B583D29126743B2C212EA4799D174BDDFEAB1EDB8
31,643,010 UART: [art] SIG.S = E3A3E4971D20AC5A278C56F134B718980FE5B1DC612C2ED03E605BFE6E027E0BC10093666AA236DE7FD463F9FB523F52
32,948,083 UART: Caliptra RT
32,948,955 UART: [state] CFI Enabled
33,107,624 UART: [rt] RT listening for mailbox commands...
33,138,890 UART: [rt]cmd =0x494e464f, len=4
33,143,333 >>> mbox cmd response data (312 bytes)
35,205,426 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,933,017 >>> mbox cmd response: success
43,967,717 UART:
43,968,013 UART: Running Caliptra FMC ...
43,969,125 UART:
43,969,307 UART: [state] CFI Enabled
44,061,971 UART: [art] Extend RT PCRs Done
44,063,163 UART: [art] Lock RT PCRs Done
44,064,541 UART: [art] Populate DV Done
44,070,216 UART: [fht] FMC Alias Private Key: 7
44,071,733 UART: [art] Derive CDI
44,072,468 UART: [art] Store in in slot 0x4
44,130,590 UART: [art] Derive Key Pair
44,131,587 UART: [art] Store priv key in slot 0x5
47,424,806 UART: [art] Derive Key Pair - Done
47,437,310 UART: [art] Signing Cert with AUTHO
47,438,644 UART: RITY.KEYID = 7
49,725,593 UART: [art] Erasing AUTHORITY.KEYID = 7
49,727,106 UART: [art] PUB.X = 11378DB52306D631FF0F6FEB41DAF2034206BC84E8C3DDFD03E21C9D5F56B82C3E12D786FA1BAEF4C4DCA479A42B691F
49,734,358 UART: [art] PUB.Y = B02AC805BAB1D8B0B85E9AB17AA0154979AC8FCE81A891589FE36C838281FB9D97155CFB1B9D26D5BC7E94119533E800
49,741,599 UART: [art] SIG.R = 40B5E6A7986C1876F6C50D5A2B063516CE02E759D6DB3479EE90AD9ACF170D42B5E46AEB4AE01D89FB5A2C95533A60D6
49,749,226 UART: [art] SIG.S = 2D59B39143CE9A41DA5CACF4661049A6998AB2B1E3DAF25A885E323FD1664547D5CFB97FE355C5A5B1640C1BE2C25096
51,054,486 UART: Caliptra RT
51,055,203 UART: [state] CFI Enabled
51,386,325 UART: [rt] RT listening for mailbox commands...
51,388,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,417,785 UART: [rt]cmd =0x494e464f, len=4
51,422,146 >>> mbox cmd response data (312 bytes)
53,478,679 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
62,214,179 >>> mbox cmd response: success
62,250,467 UART:
62,250,794 UART: Running Caliptra FMC ...
62,251,838 UART:
62,251,981 UART: [state] CFI Enabled
62,341,626 UART: [art] Extend RT PCRs Done
62,342,814 UART: [art] Lock RT PCRs Done
62,344,372 UART: [art] Populate DV Done
62,349,883 UART: [fht] FMC Alias Private Key: 7
62,351,580 UART: [art] Derive CDI
62,352,388 UART: [art] Store in in slot 0x4
62,410,947 UART: [art] Derive Key Pair
62,412,014 UART: [art] Store priv key in slot 0x5
65,704,445 UART: [art] Derive Key Pair - Done
65,717,228 UART: [art] Signing Cert with AUTHO
65,718,525 UART: RITY.KEYID = 7
68,006,621 UART: [art] Erasing AUTHORITY.KEYID = 7
68,008,134 UART: [art] PUB.X = 2F300FC2F0DCE665B7F801BDC81316735908B581A8F2CCFFA1169C76CB4421F291A04F68C81708649B536EFC2DC3C74B
68,015,393 UART: [art] PUB.Y = 15EA86A078795E7A1F9950F870D4BB01DE71CC0D6BD6B4D701BAFD0BEF212D689430FF823F60BEADEF2D73496F022FDE
68,022,629 UART: [art] SIG.R = A74FD9CCC6DCC72B72CD9D62FEC8D38212895F8A3F44CAB56F3E84E955072138964BFCAB5CF809C69546B35324A0FABA
68,030,028 UART: [art] SIG.S = C00FCAC3611C77FB31774684AB21C9FCE1EE0E3D874FF3B2EC3FA24CC6260514983C8CCEB1D2C8A24D1214C7D8736D86
69,335,238 UART: Caliptra RT
69,335,949 UART: [state] CFI Enabled
69,665,415 UART: [rt] RT listening for mailbox commands...
69,667,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,696,966 UART: [rt]cmd =0x494e464f, len=4
69,701,332 >>> mbox cmd response data (312 bytes)
69,703,204 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
78,418,455 >>> mbox cmd response: success
78,451,633 UART:
78,451,907 UART: Running Caliptra FMC ...
78,453,012 UART:
78,453,171 UART: [state] CFI Enabled
78,549,603 UART: [art] Extend RT PCRs Done
78,550,791 UART: [art] Lock RT PCRs Done
78,552,131 UART: [art] Populate DV Done
78,557,755 UART: [fht] FMC Alias Private Key: 7
78,559,464 UART: [art] Derive CDI
78,560,273 UART: [art] Store in in slot 0x4
78,618,681 UART: [art] Derive Key Pair
78,619,677 UART: [art] Store priv key in slot 0x5
81,912,576 UART: [art] Derive Key Pair - Done
81,925,528 UART: [art] Signing Cert with AUTHO
81,926,823 UART: RITY.KEYID = 7
84,214,709 UART: [art] Erasing AUTHORITY.KEYID = 7
84,216,215 UART: [art] PUB.X = 11378DB52306D631FF0F6FEB41DAF2034206BC84E8C3DDFD03E21C9D5F56B82C3E12D786FA1BAEF4C4DCA479A42B691F
84,223,438 UART: [art] PUB.Y = B02AC805BAB1D8B0B85E9AB17AA0154979AC8FCE81A891589FE36C838281FB9D97155CFB1B9D26D5BC7E94119533E800
84,230,696 UART: [art] SIG.R = 40B5E6A7986C1876F6C50D5A2B063516CE02E759D6DB3479EE90AD9ACF170D42B5E46AEB4AE01D89FB5A2C95533A60D6
84,238,126 UART: [art] SIG.S = 2D59B39143CE9A41DA5CACF4661049A6998AB2B1E3DAF25A885E323FD1664547D5CFB97FE355C5A5B1640C1BE2C25096
85,543,558 UART: Caliptra RT
85,544,271 UART: [state] CFI Enabled
85,875,965 UART: [rt] RT listening for mailbox commands...
85,877,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,907,532 UART: [rt]cmd =0x494e464f, len=4
85,911,811 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.41s
Truncated 1800 bytes from beginning
DI.KEYID = 6
7,648,483 UART: [ldev] SUBJECT.KEYID = 5
7,649,696 UART: [ldev] AUTHORITY.KEYID = 7
7,650,928 UART: [ldev] FE.KEYID = 1
7,662,277 UART: [ldev] Erasing FE.KEYID = 1
10,949,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,055 UART: [ldev] --
13,307,671 UART: [fwproc] Waiting for Commands...
13,309,765 UART: [fwproc] Received command 0x46574c44
13,311,969 UART: [fwproc] Received Image of size 113844 bytes
17,355,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,910 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,821,130 >>> mbox cmd response: success
17,822,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,825,402 UART: [afmc] ++
17,825,984 UART: [afmc] CDI.KEYID = 6
17,826,951 UART: [afmc] SUBJECT.KEYID = 7
17,828,219 UART: [afmc] AUTHORITY.KEYID = 5
21,141,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,434,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,436,559 UART: [afmc] PUB.X = 58869B145FC8A839D53FC6E5BE3D940FECEAEE2613F5D46CED8D5217DA34E93284C649DE649CF1FB360D4A8B9078C7BF
23,451,068 UART: [afmc] PUB.Y = 1ED4F8DEBE33D74A44A688A04CDC591E1B0F4468DC8B4DD11AFCC6F4B4CB3DBAD163E83E3F4F140E62CAC71F0B244458
23,465,878 UART: [afmc] SIG.R = A32F2EB2EA2ED491133AF4583EC0B9DFEFEC4DDEB8D7D5532B72B5C7F65FD418ADF34A9B09AD19B3FB5B3C1DBAC7506B
23,480,363 UART: [afmc] SIG.S = A385A20EC7B85D6B92927D55A3E741E77648405D323D471B48F02B8213BD0FC748FAB237AC679DF7398A53BCC0629E61
23,501,927 UART: [afmc] --
23,505,090 UART: [cold-reset] --
23,508,063 UART: [state] Locking Datavault
23,514,272 UART: [state] Locking PCR0, PCR1 and PCR31
23,516,040 UART: [state] Locking ICCM
23,517,062 UART: [exit] Launching FMC @ 0x40000130
23,525,460 UART:
23,525,698 UART: Running Caliptra FMC ...
23,526,798 UART:
23,526,965 UART: [state] CFI Enabled
23,534,973 UART: [fht] FMC Alias Private Key: 7
25,865,575 UART: [art] Extend RT PCRs Done
25,866,791 UART: [art] Lock RT PCRs Done
25,868,417 UART: [art] Populate DV Done
25,873,883 UART: [fht] FMC Alias Private Key: 7
25,875,530 UART: [art] Derive CDI
25,876,372 UART: [art] Store in in slot 0x4
25,918,727 UART: [art] Derive Key Pair
25,919,769 UART: [art] Store priv key in slot 0x5
29,162,050 UART: [art] Derive Key Pair - Done
29,174,879 UART: [art] Signing Cert with AUTHO
29,176,185 UART: RITY.KEYID = 7
31,455,322 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,839 UART: [art] PUB.X = 902EE2C95DF679247DF6286AD31F5931969AB009B36BCA61931A6DB77B238BCFC361B399E1110727728151DE17C7659F
31,464,041 UART: [art] PUB.Y = EA2D4BFB905121091CB6303E19EDD2C2D0D4DE2AAF4039B8FC84B8D9D4D60702D8174E16B063C30D96A8B948DD1E3D8D
31,471,344 UART: [art] SIG.R = D8F46B378F097EA9E3B6D0B8F0AE9185E7715ECBBF59000C9E659B7A9D1BE273238A165191B679921B43A8EC3F2044AD
31,478,687 UART: [art] SIG.S = 051B48652039AA16A4A145173BAE1CC31842FB551F21155B45A9FD4BD4F805ADFD6B8F8685406C100AEB43F2F1F587C1
32,783,663 UART: Caliptra RT
32,784,380 UART: [state] CFI Enabled
32,901,620 UART: [rt] RT listening for mailbox commands...
32,933,083 UART: [rt]cmd =0x494e464f, len=4
32,937,406 >>> mbox cmd response data (312 bytes)
35,063,506 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,208,370 UART:
35,208,753 UART: Running Caliptra ROM ...
35,209,893 UART:
35,210,065 UART: [state] CFI Enabled
35,225,366 UART: [state] LifecycleState = Unprovisioned
35,227,309 UART: [state] DebugLocked = No
35,229,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,234,027 UART: [kat] SHA2-256
35,403,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,414,264 UART: [kat] ++
35,414,721 UART: [kat] sha1
35,426,471 UART: [kat] SHA2-256
35,429,168 UART: [kat] SHA2-384
35,436,330 UART: [kat] SHA2-512-ACC
35,438,683 UART: [kat] ECC-384
37,720,799 UART: [kat] HMAC-384Kdf
37,732,932 UART: [kat] LMS
38,923,018 UART: [kat] --
38,927,949 UART: [update-reset] ++
43,063,550 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,066,997 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
43,448,331 >>> mbox cmd response: success
43,449,099 UART: [update-reset] Copying MAN_2 To MAN_1
43,471,539 UART: [update-reset Success] --
43,476,264 UART: [state] Locking Datavault
43,480,230 UART: [state] Locking PCR0, PCR1 and PCR31
43,481,989 UART: [state] Locking ICCM
43,484,145 UART: [exit] Launching FMC @ 0x40000130
43,492,599 UART:
43,492,839 UART: Running Caliptra FMC ...
43,493,961 UART:
43,494,123 UART: [state] CFI Enabled
43,538,361 UART: [art] Extend RT PCRs Done
43,539,547 UART: [art] Lock RT PCRs Done
43,540,841 UART: [art] Populate DV Done
43,546,410 UART: [fht] FMC Alias Private Key: 7
43,548,113 UART: [art] Derive CDI
43,548,930 UART: [art] Store in in slot 0x4
43,591,800 UART: [art] Derive Key Pair
43,592,836 UART: [art] Store priv key in slot 0x5
46,834,974 UART: [art] Derive Key Pair - Done
46,848,032 UART: [art] Signing Cert with AUTHO
46,849,339 UART: RITY.KEYID = 7
49,128,672 UART: [art] Erasing AUTHORITY.KEYID = 7
49,130,177 UART: [art] PUB.X = B8B50703F43DBB7F175999E2E22996DAB2EA23C8762D5B36846F606F1751849855FBAD3ACF943BF6902C9F01EF203BA3
49,137,441 UART: [art] PUB.Y = 69E8E0C04A999F0FBD8144B0D1B9FAED16E5ADC6F55BAE0A37CA5A650BFBEE9C70070B4DC69198EB38CE1B5938681560
49,144,684 UART: [art] SIG.R = 179F77E411AACA8836FF7FB033DF4410CC3BB77E4366A6925448639D051227C5BB2C118974301E4A619EDF252458E380
49,152,081 UART: [art] SIG.S = FD2A0B05CE64ED896BFB60ED01DAB7496BEE07DA21524C60FC0873B15D98013E24D17294C91765C98B052D128B9F549E
50,457,044 UART: Caliptra RT
50,457,749 UART: [state] CFI Enabled
50,746,968 UART: [rt] RT listening for mailbox commands...
50,748,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,778,359 UART: [rt]cmd =0x494e464f, len=4
50,782,749 >>> mbox cmd response data (312 bytes)
52,906,157 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
53,050,852 UART:
53,051,230 UART: Running Caliptra ROM ...
53,052,367 UART:
53,052,541 UART: [state] CFI Enabled
53,063,785 UART: [state] LifecycleState = Unprovisioned
53,065,682 UART: [state] DebugLocked = No
53,067,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,072,450 UART: [kat] SHA2-256
53,242,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,252,713 UART: [kat] ++
53,253,215 UART: [kat] sha1
53,264,371 UART: [kat] SHA2-256
53,267,060 UART: [kat] SHA2-384
53,273,215 UART: [kat] SHA2-512-ACC
53,275,631 UART: [kat] ECC-384
55,560,472 UART: [kat] HMAC-384Kdf
55,571,364 UART: [kat] LMS
56,761,422 UART: [kat] --
56,766,137 UART: [update-reset] ++
60,902,461 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,905,861 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
61,287,151 >>> mbox cmd response: success
61,288,256 UART: [update-reset] Copying MAN_2 To MAN_1
61,310,697 UART: [update-reset Success] --
61,315,734 UART: [state] Locking Datavault
61,317,474 UART: [state] Locking PCR0, PCR1 and PCR31
61,319,175 UART: [state] Locking ICCM
61,321,777 UART: [exit] Launching FMC @ 0x40000130
61,330,183 UART:
61,330,439 UART: Running Caliptra FMC ...
61,331,554 UART:
61,331,718 UART: [state] CFI Enabled
61,376,010 UART: [art] Extend RT PCRs Done
61,377,196 UART: [art] Lock RT PCRs Done
61,378,709 UART: [art] Populate DV Done
61,384,177 UART: [fht] FMC Alias Private Key: 7
61,385,668 UART: [art] Derive CDI
61,386,431 UART: [art] Store in in slot 0x4
61,428,873 UART: [art] Derive Key Pair
61,429,902 UART: [art] Store priv key in slot 0x5
64,672,434 UART: [art] Derive Key Pair - Done
64,685,274 UART: [art] Signing Cert with AUTHO
64,686,587 UART: RITY.KEYID = 7
66,966,065 UART: [art] Erasing AUTHORITY.KEYID = 7
66,967,569 UART: [art] PUB.X = 885DE4C1DE93DBEAD755681299D3F25ED9E7A6F7763328E96F8D454893F00404908CFDC8259CB834C52E74973ADDE02A
66,974,794 UART: [art] PUB.Y = 5572E8F6D79599644C78392B60CE615C6769EAB23B17C3FF758E9AC59E05D5343B2D9ED9173F6B5975292BFA511CC525
66,982,043 UART: [art] SIG.R = EC44C2BF1FCB687A2CB62CD03BB503E3EDEC846F0D849B82026C4775A8FBCD0EBEFF990D4DEF910FAF86BC3EBC921EAC
66,989,446 UART: [art] SIG.S = 91671D30C37C8403A37D4E6DCE4E38AEF91F3333DC99C3FF3170803B497AFD0AA5CBF159EEE37533278B825C0F5A7298
68,294,442 UART: Caliptra RT
68,295,150 UART: [state] CFI Enabled
68,579,853 UART: [rt] RT listening for mailbox commands...
68,581,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,611,468 UART: [rt]cmd =0x494e464f, len=4
68,615,798 >>> mbox cmd response data (312 bytes)
68,617,666 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
68,761,774 UART:
68,762,080 UART: Running Caliptra ROM ...
68,763,121 UART:
68,763,382 UART: [state] CFI Enabled
68,777,976 UART: [state] LifecycleState = Unprovisioned
68,779,920 UART: [state] DebugLocked = No
68,781,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,787,026 UART: [kat] SHA2-256
68,956,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,967,285 UART: [kat] ++
68,967,823 UART: [kat] sha1
68,977,862 UART: [kat] SHA2-256
68,980,559 UART: [kat] SHA2-384
68,985,464 UART: [kat] SHA2-512-ACC
68,987,862 UART: [kat] ECC-384
71,272,757 UART: [kat] HMAC-384Kdf
71,285,619 UART: [kat] LMS
72,475,694 UART: [kat] --
72,481,475 UART: [update-reset] ++
76,609,350 UART: [update-reset] Image verified using Vendor ECC Key Index 0
76,613,415 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
76,994,685 >>> mbox cmd response: success
76,996,119 UART: [update-reset] Copying MAN_2 To MAN_1
77,018,561 UART: [update-reset Success] --
77,023,553 UART: [state] Locking Datavault
77,026,756 UART: [state] Locking PCR0, PCR1 and PCR31
77,028,534 UART: [state] Locking ICCM
77,030,490 UART: [exit] Launching FMC @ 0x40000130
77,038,889 UART:
77,039,127 UART: Running Caliptra FMC ...
77,040,230 UART:
77,040,393 UART: [state] CFI Enabled
77,084,624 UART: [art] Extend RT PCRs Done
77,085,767 UART: [art] Lock RT PCRs Done
77,087,214 UART: [art] Populate DV Done
77,092,584 UART: [fht] FMC Alias Private Key: 7
77,094,264 UART: [art] Derive CDI
77,095,084 UART: [art] Store in in slot 0x4
77,137,437 UART: [art] Derive Key Pair
77,138,484 UART: [art] Store priv key in slot 0x5
80,380,554 UART: [art] Derive Key Pair - Done
80,393,696 UART: [art] Signing Cert with AUTHO
80,395,039 UART: RITY.KEYID = 7
82,674,295 UART: [art] Erasing AUTHORITY.KEYID = 7
82,675,807 UART: [art] PUB.X = B8B50703F43DBB7F175999E2E22996DAB2EA23C8762D5B36846F606F1751849855FBAD3ACF943BF6902C9F01EF203BA3
82,683,071 UART: [art] PUB.Y = 69E8E0C04A999F0FBD8144B0D1B9FAED16E5ADC6F55BAE0A37CA5A650BFBEE9C70070B4DC69198EB38CE1B5938681560
82,690,368 UART: [art] SIG.R = 179F77E411AACA8836FF7FB033DF4410CC3BB77E4366A6925448639D051227C5BB2C118974301E4A619EDF252458E380
82,697,712 UART: [art] SIG.S = FD2A0B05CE64ED896BFB60ED01DAB7496BEE07DA21524C60FC0873B15D98013E24D17294C91765C98B052D128B9F549E
84,003,184 UART: Caliptra RT
84,003,896 UART: [state] CFI Enabled
84,294,764 UART: [rt] RT listening for mailbox commands...
84,296,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,326,095 UART: [rt]cmd =0x494e464f, len=4
84,330,527 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
4,131,746 ready_for_fw is high
4,132,162 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,073,879 >>> mbox cmd response: success
18,075,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,709,622 UART:
23,710,011 UART: Running Caliptra FMC ...
23,711,148 UART:
23,711,315 UART: [state] CFI Enabled
23,719,146 UART: [fht] FMC Alias Private Key: 7
26,050,258 UART: [art] Extend RT PCRs Done
26,051,489 UART: [art] Lock RT PCRs Done
26,053,172 UART: [art] Populate DV Done
26,058,425 UART: [fht] FMC Alias Private Key: 7
26,059,972 UART: [art] Derive CDI
26,060,737 UART: [art] Store in in slot 0x4
26,102,899 UART: [art] Derive Key Pair
26,104,046 UART: [art] Store priv key in slot 0x5
29,345,723 UART: [art] Derive Key Pair - Done
29,358,992 UART: [art] Signing Cert with AUTHO
29,360,305 UART: RITY.KEYID = 7
31,639,803 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,305 UART: [art] PUB.X = 506C24AF7C069E657C40A792FF01E4096E885EBEDB8F91CF1CAA009704D5332511750172872FE0B8B8CA20BCDE6224CC
31,648,526 UART: [art] PUB.Y = 58ED190764BD653439BB6ADA18B645CD17A9F800A589D0A82004467AAE2A57B83C7FE03D3F8381B05B06BD818D118438
31,655,763 UART: [art] SIG.R = 4D2292E7A72013566FA4F891FD19BA6AF14089D4CDDD5775ACCC3C2CD20EB758A407CAE0B978173DA46FA6DD7E9833E6
31,663,182 UART: [art] SIG.S = AA3FBA870E6A540514B4BEE9D54D9117564CD1AF6B235ADDE67BBE32626DF424057A2141CAB21D02E4EB3353B55E566E
32,968,621 UART: Caliptra RT
32,969,338 UART: [state] CFI Enabled
33,085,787 UART: [rt] RT listening for mailbox commands...
33,117,104 UART: [rt]cmd =0x494e464f, len=4
33,121,332 >>> mbox cmd response data (312 bytes)
35,247,310 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,896,423 >>> mbox cmd response: success
43,930,977 UART:
43,931,304 UART: Running Caliptra FMC ...
43,932,360 UART:
43,932,514 UART: [state] CFI Enabled
43,976,385 UART: [art] Extend RT PCRs Done
43,977,574 UART: [art] Lock RT PCRs Done
43,979,043 UART: [art] Populate DV Done
43,984,517 UART: [fht] FMC Alias Private Key: 7
43,986,218 UART: [art] Derive CDI
43,986,956 UART: [art] Store in in slot 0x4
44,029,348 UART: [art] Derive Key Pair
44,030,390 UART: [art] Store priv key in slot 0x5
47,273,071 UART: [art] Derive Key Pair - Done
47,285,861 UART: [art] Signing Cert with AUTHO
47,287,169 UART: RITY.KEYID = 7
49,566,826 UART: [art] Erasing AUTHORITY.KEYID = 7
49,568,343 UART: [art] PUB.X = 13C6B4B50DFA6758EF23E7A57EAE5DCEAA13D7FC9E520232F271B0499FD0896EEB638F7765AABE5917D1922E92421793
49,575,577 UART: [art] PUB.Y = 91A1FEB9B38BCCCE804332D49F617E54458858160D595F0F47E7C508AC3A00F6D57ADD735D0E3847FF9E28D96FB1626E
49,582,817 UART: [art] SIG.R = D93C8448C07F9EB21F1DC3DF3262FDBAADB68993924F1E5A2190D0CE12B67CBE518869218DAA87BB672398DBCEA6B8E4
49,590,265 UART: [art] SIG.S = 7FEB30FCD384A17623CBF1A11696105B986356883A30474819433917E45370822DE32486F8F969BB6CF6E194F9CF10E5
50,895,642 UART: Caliptra RT
50,896,361 UART: [state] CFI Enabled
51,185,937 UART: [rt] RT listening for mailbox commands...
51,187,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,217,404 UART: [rt]cmd =0x494e464f, len=4
51,221,740 >>> mbox cmd response data (312 bytes)
53,345,730 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
61,986,528 >>> mbox cmd response: success
62,023,446 UART:
62,023,755 UART: Running Caliptra FMC ...
62,025,232 UART:
62,025,417 UART: [state] CFI Enabled
62,069,093 UART: [art] Extend RT PCRs Done
62,070,253 UART: [art] Lock RT PCRs Done
62,071,604 UART: [art] Populate DV Done
62,076,964 UART: [fht] FMC Alias Private Key: 7
62,078,511 UART: [art] Derive CDI
62,079,327 UART: [art] Store in in slot 0x4
62,121,730 UART: [art] Derive Key Pair
62,122,766 UART: [art] Store priv key in slot 0x5
65,363,986 UART: [art] Derive Key Pair - Done
65,376,713 UART: [art] Signing Cert with AUTHO
65,378,044 UART: RITY.KEYID = 7
67,657,584 UART: [art] Erasing AUTHORITY.KEYID = 7
67,659,189 UART: [art] PUB.X = 14F2091384156BB56001370ACC59D9E12C486AD59D7BCF8ED75F4349F31E5FB8EFCA02E34522942E82BE33291868859B
67,666,386 UART: [art] PUB.Y = FDDFDF1EF74610AF9C612AF50427453C4DE0D90A1F6C72577896D1302693AB97F6F5FB1116A50A8D6E7E8FC0420FA136
67,673,611 UART: [art] SIG.R = C08F05586F8A70EF43857E166B1F617DE94909811475BCE2B62E5850989CA007F65A589098978D8E4F8D945581F8B7E8
67,680,951 UART: [art] SIG.S = 36DDE93EFE3E3E99A47B69CF790BC8CD18358F8200982F8071FD5174219D68456DD99419E274FFF9D09DA4403C17A118
68,985,738 UART: Caliptra RT
68,986,424 UART: [state] CFI Enabled
69,273,297 UART: [rt] RT listening for mailbox commands...
69,275,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,304,797 UART: [rt]cmd =0x494e464f, len=4
69,309,021 >>> mbox cmd response data (312 bytes)
69,310,902 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
77,965,477 >>> mbox cmd response: success
78,001,869 UART:
78,002,135 UART: Running Caliptra FMC ...
78,003,257 UART:
78,003,432 UART: [state] CFI Enabled
78,047,839 UART: [art] Extend RT PCRs Done
78,049,023 UART: [art] Lock RT PCRs Done
78,050,716 UART: [art] Populate DV Done
78,056,074 UART: [fht] FMC Alias Private Key: 7
78,057,719 UART: [art] Derive CDI
78,058,538 UART: [art] Store in in slot 0x4
78,101,146 UART: [art] Derive Key Pair
78,102,170 UART: [art] Store priv key in slot 0x5
81,344,454 UART: [art] Derive Key Pair - Done
81,357,132 UART: [art] Signing Cert with AUTHO
81,358,438 UART: RITY.KEYID = 7
83,638,075 UART: [art] Erasing AUTHORITY.KEYID = 7
83,639,584 UART: [art] PUB.X = 13C6B4B50DFA6758EF23E7A57EAE5DCEAA13D7FC9E520232F271B0499FD0896EEB638F7765AABE5917D1922E92421793
83,646,831 UART: [art] PUB.Y = 91A1FEB9B38BCCCE804332D49F617E54458858160D595F0F47E7C508AC3A00F6D57ADD735D0E3847FF9E28D96FB1626E
83,654,130 UART: [art] SIG.R = D93C8448C07F9EB21F1DC3DF3262FDBAADB68993924F1E5A2190D0CE12B67CBE518869218DAA87BB672398DBCEA6B8E4
83,661,523 UART: [art] SIG.S = 7FEB30FCD384A17623CBF1A11696105B986356883A30474819433917E45370822DE32486F8F969BB6CF6E194F9CF10E5
84,967,149 UART: Caliptra RT
84,967,871 UART: [state] CFI Enabled
85,258,005 UART: [rt] RT listening for mailbox commands...
85,259,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,289,344 UART: [rt]cmd =0x494e464f, len=4
85,293,838 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.38s
Truncated 1634 bytes from beginning
,025,981 UART: [idev] Sha1 KeyId Algorithm
6,049,940 UART: [idev] --
6,053,239 UART: [ldev] ++
6,053,819 UART: [ldev] CDI.KEYID = 6
6,054,740 UART: [ldev] SUBJECT.KEYID = 5
6,055,905 UART: [ldev] AUTHORITY.KEYID = 7
6,057,141 UART: [ldev] FE.KEYID = 1
6,099,063 UART: [ldev] Erasing FE.KEYID = 1
8,600,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,791 UART: [ldev] --
10,409,870 UART: [fwproc] Wait for Commands...
10,411,638 UART: [fwproc] Recv command 0x46574c44
10,413,741 UART: [fwproc] Recv'd Img size: 114168 bytes
13,810,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,211 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,271,369 >>> mbox cmd response: success
14,272,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,276,313 UART: [afmc] ++
14,276,905 UART: [afmc] CDI.KEYID = 6
14,277,818 UART: [afmc] SUBJECT.KEYID = 7
14,278,975 UART: [afmc] AUTHORITY.KEYID = 5
16,800,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,936 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,544,946 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,560,991 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,576,948 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,599,680 UART: [afmc] --
18,604,155 UART: [cold-reset] --
18,608,721 UART: [state] Locking Datavault
18,614,401 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,087 UART: [state] Locking ICCM
18,617,358 UART: [exit] Launching FMC @ 0x40000130
18,625,758 UART:
18,625,992 UART: Running Caliptra FMC ...
18,627,304 UART:
18,627,474 UART: [state] CFI Enabled
18,686,834 UART: [fht] FMC Alias Private Key: 7
20,451,036 UART: [art] Extend RT PCRs Done
20,452,263 UART: [art] Lock RT PCRs Done
20,454,100 UART: [art] Populate DV Done
20,459,244 UART: [fht] FMC Alias Private Key: 7
20,460,899 UART: [art] Derive CDI
20,461,717 UART: [art] Store in in slot 0x4
20,519,575 UART: [art] Derive Key Pair
20,520,617 UART: [art] Store priv key in slot 0x5
22,983,949 UART: [art] Derive Key Pair - Done
22,997,106 UART: [art] Signing Cert with AUTHO
22,998,418 UART: RITY.KEYID = 7
24,709,923 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,427 UART: [art] PUB.X = F20CF78A52FA5B80BCAFB1858E6811FCBF77BEB70569CCC86D1F0E6EE9B70CCECE337649BBA109871324D128C8308E7F
24,718,703 UART: [art] PUB.Y = A9A1CE80BF88DDD42F7625525B3F3D586C48C274F3181ECF950EB9EFBE8E47C44FBAD802404E46F2A6956A4409731903
24,726,008 UART: [art] SIG.R = 887849E50F0090BE882005239C20121B5A6086413E7E7E5D0906AD74E29340844F0C61700B1B89E64156254A5BAFA89B
24,733,315 UART: [art] SIG.S = 0F4C1348526656927EAC7343AEB901AF80EC481F0C63D04F3E9C2AFF1B93FBA81EFC65628A073D7E7520F1C80C8D1792
25,712,218 UART: Caliptra RT
25,712,936 UART: [state] CFI Enabled
25,878,322 UART: [rt] RT listening for mailbox commands...
25,909,513 UART: [rt]cmd =0x494e464f, len=4
25,913,936 >>> mbox cmd response data (312 bytes)
27,978,963 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,124,137 UART:
28,124,514 UART: Running Caliptra ROM ...
28,125,575 UART:
28,125,727 UART: [state] CFI Enabled
28,187,748 UART: [state] LifecycleState = Unprovisioned
28,189,637 UART: [state] DebugLocked = No
28,191,650 UART: [state] WD Timer not started. Device not locked for debugging
28,195,882 UART: [kat] SHA2-256
28,374,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,386,552 UART: [kat] ++
28,387,034 UART: [kat] sha1
28,398,466 UART: [kat] SHA2-256
28,401,486 UART: [kat] SHA2-384
28,408,175 UART: [kat] SHA2-512-ACC
28,411,127 UART: [kat] ECC-384
30,870,521 UART: [kat] HMAC-384Kdf
30,894,196 UART: [kat] LMS
31,423,636 UART: [kat] --
31,428,315 UART: [update-reset] ++
34,851,088 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,854,532 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,236,882 >>> mbox cmd response: success
35,237,450 UART: [update-reset] Copying MAN_2 To MAN_1
35,259,734 UART: [update-reset Success] --
35,264,458 UART: [state] Locking Datavault
35,268,874 UART: [state] Locking PCR0, PCR1 and PCR31
35,270,567 UART: [state] Locking ICCM
35,273,104 UART: [exit] Launching FMC @ 0x40000130
35,281,567 UART:
35,281,800 UART: Running Caliptra FMC ...
35,282,904 UART:
35,283,064 UART: [state] CFI Enabled
35,384,202 UART: [art] Extend RT PCRs Done
35,385,383 UART: [art] Lock RT PCRs Done
35,387,001 UART: [art] Populate DV Done
35,392,476 UART: [fht] FMC Alias Private Key: 7
35,393,967 UART: [art] Derive CDI
35,394,784 UART: [art] Store in in slot 0x4
35,453,391 UART: [art] Derive Key Pair
35,454,431 UART: [art] Store priv key in slot 0x5
37,917,638 UART: [art] Derive Key Pair - Done
37,931,085 UART: [art] Signing Cert with AUTHO
37,932,396 UART: RITY.KEYID = 7
39,643,436 UART: [art] Erasing AUTHORITY.KEYID = 7
39,644,937 UART: [art] PUB.X = 067B6202A07D42080987BE043394895E6BB4DA2DA1D3A25BDFE149CB773DE6C8E837E28419D77EF9C43C7785444FFBEC
39,652,215 UART: [art] PUB.Y = DC007FF996038A177F2242C24A1FDFCEF39F1733C2CDC28105D2D4D3026AAB3BE55B32328D1C72E60A7DEFFE8FB38602
39,659,469 UART: [art] SIG.R = 1F366B76B788B1D58E5B7C97B525DF62166EAEB25A41BC15EDAEB529C421FD20254773C0241D8542A666811D22F10A54
39,667,016 UART: [art] SIG.S = 0238C592D666AF738B901141D516731820DFFCC576C5FED677756A90D50A34B2094F00616401CB0F41A6E9F9DBE071A0
40,645,802 UART: Caliptra RT
40,646,516 UART: [state] CFI Enabled
40,986,188 UART: [rt] RT listening for mailbox commands...
40,988,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,017,769 UART: [rt]cmd =0x494e464f, len=4
41,021,949 >>> mbox cmd response data (312 bytes)
43,079,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
43,224,891 UART:
43,225,254 UART: Running Caliptra ROM ...
43,226,394 UART:
43,226,572 UART: [state] CFI Enabled
43,291,255 UART: [state] LifecycleState = Unprovisioned
43,293,132 UART: [state] DebugLocked = No
43,294,301 UART: [state] WD Timer not started. Device not locked for debugging
43,297,140 UART: [kat] SHA2-256
43,476,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,487,822 UART: [kat] ++
43,488,371 UART: [kat] sha1
43,500,028 UART: [kat] SHA2-256
43,503,040 UART: [kat] SHA2-384
43,508,809 UART: [kat] SHA2-512-ACC
43,511,761 UART: [kat] ECC-384
45,972,259 UART: [kat] HMAC-384Kdf
45,997,128 UART: [kat] LMS
46,526,610 UART: [kat] --
46,531,164 UART: [update-reset] ++
49,957,351 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,959,982 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
50,342,311 >>> mbox cmd response: success
50,343,030 UART: [update-reset] Copying MAN_2 To MAN_1
50,365,368 UART: [update-reset Success] --
50,369,601 UART: [state] Locking Datavault
50,372,854 UART: [state] Locking PCR0, PCR1 and PCR31
50,374,500 UART: [state] Locking ICCM
50,377,084 UART: [exit] Launching FMC @ 0x40000130
50,385,540 UART:
50,385,780 UART: Running Caliptra FMC ...
50,387,105 UART:
50,387,273 UART: [state] CFI Enabled
50,487,884 UART: [art] Extend RT PCRs Done
50,489,065 UART: [art] Lock RT PCRs Done
50,490,421 UART: [art] Populate DV Done
50,496,039 UART: [fht] FMC Alias Private Key: 7
50,497,737 UART: [art] Derive CDI
50,498,550 UART: [art] Store in in slot 0x4
50,557,048 UART: [art] Derive Key Pair
50,558,092 UART: [art] Store priv key in slot 0x5
53,020,465 UART: [art] Derive Key Pair - Done
53,033,634 UART: [art] Signing Cert with AUTHO
53,034,981 UART: RITY.KEYID = 7
54,746,382 UART: [art] Erasing AUTHORITY.KEYID = 7
54,747,871 UART: [art] PUB.X = A083EAC15AD6E94A79004F6E70374B264766D4228B8ED12283182E364C16C50D38806126DA7695294092E5E0E80C7ABC
54,755,140 UART: [art] PUB.Y = 57A298D07265D130F7D9281C416E7B3D06BD02551B244A86DB71C679779EA66621D77AA1591B1CC369352F9D4405C1A8
54,762,351 UART: [art] SIG.R = 59D18F49387D123E4B3D3F0497CAF4F19D5CB24E118B185CA609C15BCC527BB1A1CB7676245FF67E7176B84FF6B9267C
54,769,773 UART: [art] SIG.S = FD2473D0367E2F42C437233F90529708002DCF371297AAA15E0F0109716E3AB420E4B4E63A82CBAA73E53EC271492B72
55,748,737 UART: Caliptra RT
55,749,449 UART: [state] CFI Enabled
56,083,400 UART: [rt] RT listening for mailbox commands...
56,085,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,114,984 UART: [rt]cmd =0x494e464f, len=4
56,119,530 >>> mbox cmd response data (312 bytes)
56,121,402 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
56,265,889 UART:
56,266,195 UART: Running Caliptra ROM ...
56,267,317 UART:
56,267,479 UART: [state] CFI Enabled
56,345,042 UART: [state] LifecycleState = Unprovisioned
56,346,922 UART: [state] DebugLocked = No
56,348,798 UART: [state] WD Timer not started. Device not locked for debugging
56,353,156 UART: [kat] SHA2-256
56,532,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
56,543,819 UART: [kat] ++
56,544,275 UART: [kat] sha1
56,554,943 UART: [kat] SHA2-256
56,557,995 UART: [kat] SHA2-384
56,563,828 UART: [kat] SHA2-512-ACC
56,566,774 UART: [kat] ECC-384
59,027,031 UART: [kat] HMAC-384Kdf
59,049,852 UART: [kat] LMS
59,579,281 UART: [kat] --
59,584,077 UART: [update-reset] ++
63,015,312 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,018,963 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
63,401,285 >>> mbox cmd response: success
63,402,489 UART: [update-reset] Copying MAN_2 To MAN_1
63,424,847 UART: [update-reset Success] --
63,428,061 UART: [state] Locking Datavault
63,430,971 UART: [state] Locking PCR0, PCR1 and PCR31
63,432,627 UART: [state] Locking ICCM
63,433,920 UART: [exit] Launching FMC @ 0x40000130
63,442,375 UART:
63,442,613 UART: Running Caliptra FMC ...
63,443,715 UART:
63,443,874 UART: [state] CFI Enabled
63,539,765 UART: [art] Extend RT PCRs Done
63,540,943 UART: [art] Lock RT PCRs Done
63,542,511 UART: [art] Populate DV Done
63,547,972 UART: [fht] FMC Alias Private Key: 7
63,549,508 UART: [art] Derive CDI
63,550,323 UART: [art] Store in in slot 0x4
63,608,660 UART: [art] Derive Key Pair
63,609,720 UART: [art] Store priv key in slot 0x5
66,072,416 UART: [art] Derive Key Pair - Done
66,085,746 UART: [art] Signing Cert with AUTHO
66,087,053 UART: RITY.KEYID = 7
67,797,691 UART: [art] Erasing AUTHORITY.KEYID = 7
67,799,205 UART: [art] PUB.X = 067B6202A07D42080987BE043394895E6BB4DA2DA1D3A25BDFE149CB773DE6C8E837E28419D77EF9C43C7785444FFBEC
67,806,419 UART: [art] PUB.Y = DC007FF996038A177F2242C24A1FDFCEF39F1733C2CDC28105D2D4D3026AAB3BE55B32328D1C72E60A7DEFFE8FB38602
67,813,729 UART: [art] SIG.R = 1F366B76B788B1D58E5B7C97B525DF62166EAEB25A41BC15EDAEB529C421FD20254773C0241D8542A666811D22F10A54
67,821,086 UART: [art] SIG.S = 0238C592D666AF738B901141D516731820DFFCC576C5FED677756A90D50A34B2094F00616401CB0F41A6E9F9DBE071A0
68,800,283 UART: Caliptra RT
68,800,967 UART: [state] CFI Enabled
69,138,202 UART: [rt] RT listening for mailbox commands...
69,140,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,169,656 UART: [rt]cmd =0x494e464f, len=4
69,173,986 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,378,857 ready_for_fw is high
3,379,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,078,659 >>> mbox cmd response: success
14,080,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,363,095 UART:
18,363,491 UART: Running Caliptra FMC ...
18,364,588 UART:
18,364,738 UART: [state] CFI Enabled
18,430,802 UART: [fht] FMC Alias Private Key: 7
20,194,277 UART: [art] Extend RT PCRs Done
20,195,500 UART: [art] Lock RT PCRs Done
20,196,995 UART: [art] Populate DV Done
20,202,186 UART: [fht] FMC Alias Private Key: 7
20,203,725 UART: [art] Derive CDI
20,204,480 UART: [art] Store in in slot 0x4
20,262,850 UART: [art] Derive Key Pair
20,263,856 UART: [art] Store priv key in slot 0x5
22,726,693 UART: [art] Derive Key Pair - Done
22,739,587 UART: [art] Signing Cert with AUTHO
22,740,896 UART: RITY.KEYID = 7
24,452,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,592 UART: [art] PUB.X = 75FD7AE08E7194FA2A1506C1F32E8379FF106F3D438141764B96083AA4AF975D3E02D92AF19DAEF935C6A2A5A0E2EC27
24,460,831 UART: [art] PUB.Y = 2A8B5C7D195D97A16198A90DDBE2394F255160204B72676F7FB1B6909708EC8ECBFAF65FF42143ADD10440C401024965
24,468,133 UART: [art] SIG.R = 55B1BC292ACD8C8D6BF395E77767F16EABF1C7A3493F578109C1AD8407154E2B111CD622DE8633C5C89513D1CC40F772
24,475,483 UART: [art] SIG.S = 9BD70FFBF9428AD02D56B7F4AB72CCADE73BD7362107C6B61E641BE0734FBC6BBABB86ACFBBABCF6151F5DB511C21349
25,454,209 UART: Caliptra RT
25,454,910 UART: [state] CFI Enabled
25,618,861 UART: [rt] RT listening for mailbox commands...
25,650,161 UART: [rt]cmd =0x494e464f, len=4
25,654,602 >>> mbox cmd response data (312 bytes)
27,723,872 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,847,325 >>> mbox cmd response: success
34,883,639 UART:
34,883,948 UART: Running Caliptra FMC ...
34,885,066 UART:
34,885,243 UART: [state] CFI Enabled
34,974,986 UART: [art] Extend RT PCRs Done
34,976,168 UART: [art] Lock RT PCRs Done
34,977,849 UART: [art] Populate DV Done
34,983,445 UART: [fht] FMC Alias Private Key: 7
34,985,100 UART: [art] Derive CDI
34,986,129 UART: [art] Store in in slot 0x4
35,044,303 UART: [art] Derive Key Pair
35,045,304 UART: [art] Store priv key in slot 0x5
37,507,795 UART: [art] Derive Key Pair - Done
37,520,750 UART: [art] Signing Cert with AUTHO
37,522,057 UART: RITY.KEYID = 7
39,232,930 UART: [art] Erasing AUTHORITY.KEYID = 7
39,234,448 UART: [art] PUB.X = 6FDBDC2F84555059FD4D9FCE71ED8ADE24881E2452A8F1A2A7F7E1399466188244832E951DE644291F5C1342911DDB8C
39,241,705 UART: [art] PUB.Y = 64B244F7EFF9961463FE1E11164122D350E1BEEC1FB5014BA155FBC7BBD563BEDCE8CFEF7A75A09DA54C0669B41B4D74
39,248,996 UART: [art] SIG.R = DF50685FEACDD89635F885F2A2754A6DE7E434B9FC1D9C34306008F838A3FB9DB8324B07648D09956AFCED84C55DA27F
39,256,385 UART: [art] SIG.S = 0F876E410370743E915F2F6B0F54BFA62D1CE462D4263FC39038E78F1F09E202DD38BAF834B60997CBD91F3A819B66DE
40,235,475 UART: Caliptra RT
40,236,189 UART: [state] CFI Enabled
40,577,096 UART: [rt] RT listening for mailbox commands...
40,578,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,608,603 UART: [rt]cmd =0x494e464f, len=4
40,612,979 >>> mbox cmd response data (312 bytes)
42,668,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
49,770,926 >>> mbox cmd response: success
49,806,644 UART:
49,806,982 UART: Running Caliptra FMC ...
49,808,028 UART:
49,808,182 UART: [state] CFI Enabled
49,904,034 UART: [art] Extend RT PCRs Done
49,905,227 UART: [art] Lock RT PCRs Done
49,906,874 UART: [art] Populate DV Done
49,912,524 UART: [fht] FMC Alias Private Key: 7
49,914,072 UART: [art] Derive CDI
49,914,814 UART: [art] Store in in slot 0x4
49,972,984 UART: [art] Derive Key Pair
49,974,026 UART: [art] Store priv key in slot 0x5
52,436,589 UART: [art] Derive Key Pair - Done
52,449,803 UART: [art] Signing Cert with AUTHO
52,451,114 UART: RITY.KEYID = 7
54,162,955 UART: [art] Erasing AUTHORITY.KEYID = 7
54,164,456 UART: [art] PUB.X = 464213C9EDF5FD89CE7EE5F4BCE1B261975FFD638D30E548C03DCA055E14DCB3B5D9F5197EB44F431A892840A7EBCD4F
54,171,723 UART: [art] PUB.Y = 94D86255678486A752656DE5B8269A7FD74FB381A6F4502A228DBF5FBF5B41C1100A18A9595433D47FAA4D2540FFC534
54,179,003 UART: [art] SIG.R = E9B325D45F5B7A0EAA7D3ACD3E7333ABC901ED867E11C95AE214F5977254D5C883B7BA3A1236B8E579F365B77FE20A4C
54,186,438 UART: [art] SIG.S = 376CB7B7C21A9F1CB13F655009E42E74A7E7BA07B6AD25F3B826C17B632C9D4D8E4040A8F17590756CE6B30F660C4174
55,165,464 UART: Caliptra RT
55,166,179 UART: [state] CFI Enabled
55,507,946 UART: [rt] RT listening for mailbox commands...
55,509,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,539,492 UART: [rt]cmd =0x494e464f, len=4
55,543,761 >>> mbox cmd response data (312 bytes)
55,545,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
62,667,553 >>> mbox cmd response: success
62,701,137 UART:
62,701,414 UART: Running Caliptra FMC ...
62,702,528 UART:
62,702,691 UART: [state] CFI Enabled
62,789,914 UART: [art] Extend RT PCRs Done
62,791,102 UART: [art] Lock RT PCRs Done
62,792,308 UART: [art] Populate DV Done
62,797,937 UART: [fht] FMC Alias Private Key: 7
62,799,528 UART: [art] Derive CDI
62,800,267 UART: [art] Store in in slot 0x4
62,858,773 UART: [art] Derive Key Pair
62,859,833 UART: [art] Store priv key in slot 0x5
65,321,916 UART: [art] Derive Key Pair - Done
65,334,486 UART: [art] Signing Cert with AUTHO
65,335,788 UART: RITY.KEYID = 7
67,048,674 UART: [art] Erasing AUTHORITY.KEYID = 7
67,050,156 UART: [art] PUB.X = 6FDBDC2F84555059FD4D9FCE71ED8ADE24881E2452A8F1A2A7F7E1399466188244832E951DE644291F5C1342911DDB8C
67,057,397 UART: [art] PUB.Y = 64B244F7EFF9961463FE1E11164122D350E1BEEC1FB5014BA155FBC7BBD563BEDCE8CFEF7A75A09DA54C0669B41B4D74
67,064,736 UART: [art] SIG.R = DF50685FEACDD89635F885F2A2754A6DE7E434B9FC1D9C34306008F838A3FB9DB8324B07648D09956AFCED84C55DA27F
67,072,166 UART: [art] SIG.S = 0F876E410370743E915F2F6B0F54BFA62D1CE462D4263FC39038E78F1F09E202DD38BAF834B60997CBD91F3A819B66DE
68,050,721 UART: Caliptra RT
68,051,431 UART: [state] CFI Enabled
68,386,970 UART: [rt] RT listening for mailbox commands...
68,388,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,418,464 UART: [rt]cmd =0x494e464f, len=4
68,422,899 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.54s
Truncated 1634 bytes from beginning
,311,773 UART: [idev] Sha1 KeyId Algorithm
6,335,390 UART: [idev] --
6,340,661 UART: [ldev] ++
6,341,237 UART: [ldev] CDI.KEYID = 6
6,342,120 UART: [ldev] SUBJECT.KEYID = 5
6,343,334 UART: [ldev] AUTHORITY.KEYID = 7
6,344,587 UART: [ldev] FE.KEYID = 1
6,355,857 UART: [ldev] Erasing FE.KEYID = 1
8,833,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,952 UART: [ldev] --
10,621,971 UART: [fwproc] Wait for Commands...
10,624,066 UART: [fwproc] Recv command 0x46574c44
10,626,158 UART: [fwproc] Recv'd Img size: 114168 bytes
14,020,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,334 >>> mbox cmd response: success
14,485,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,488,240 UART: [afmc] ++
14,488,825 UART: [afmc] CDI.KEYID = 6
14,489,734 UART: [afmc] SUBJECT.KEYID = 7
14,490,951 UART: [afmc] AUTHORITY.KEYID = 5
16,995,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,883 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,733,900 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,749,955 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,765,887 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,788,182 UART: [afmc] --
18,791,664 UART: [cold-reset] --
18,796,115 UART: [state] Locking Datavault
18,800,386 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,079 UART: [state] Locking ICCM
18,804,017 UART: [exit] Launching FMC @ 0x40000130
18,812,434 UART:
18,812,675 UART: Running Caliptra FMC ...
18,813,936 UART:
18,814,099 UART: [state] CFI Enabled
18,821,965 UART: [fht] FMC Alias Private Key: 7
20,578,993 UART: [art] Extend RT PCRs Done
20,580,214 UART: [art] Lock RT PCRs Done
20,582,133 UART: [art] Populate DV Done
20,587,375 UART: [fht] FMC Alias Private Key: 7
20,588,918 UART: [art] Derive CDI
20,589,738 UART: [art] Store in in slot 0x4
20,632,276 UART: [art] Derive Key Pair
20,633,275 UART: [art] Store priv key in slot 0x5
23,059,873 UART: [art] Derive Key Pair - Done
23,073,104 UART: [art] Signing Cert with AUTHO
23,074,402 UART: RITY.KEYID = 7
24,780,062 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,581 UART: [art] PUB.X = 0A351FA6D3A3392179E3B2174931164CA126D013B14EEA10C6C0FD03B3AEC456BD20C92C38BDE46AAE39032B57C2DA63
24,788,835 UART: [art] PUB.Y = 982881517DA1E97E537883011A63665F190DE6EA9E31DC6ABBE79AF55A4347C50A0069936E6922D489296F7F398F1288
24,796,083 UART: [art] SIG.R = A3EFEBD4EF5DF95C10B40CBE1265FDCDCD17BE5EAC11407B3E9ABC5B7B89496DBFB710C42FC7A8A7D269359D67509383
24,803,491 UART: [art] SIG.S = D0E11E90F45752C2E4C8B207DFF2A5EC472E659EC6AAD402CED11AD78EB5FB49A5D3FCE29FB8BBD84933F2854FCCEEE5
25,782,724 UART: Caliptra RT
25,783,427 UART: [state] CFI Enabled
25,901,348 UART: [rt] RT listening for mailbox commands...
25,932,651 UART: [rt]cmd =0x494e464f, len=4
25,937,102 >>> mbox cmd response data (312 bytes)
27,995,473 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,141,164 UART:
28,141,557 UART: Running Caliptra ROM ...
28,142,601 UART:
28,142,753 UART: [state] CFI Enabled
28,154,378 UART: [state] LifecycleState = Unprovisioned
28,156,219 UART: [state] DebugLocked = No
28,157,789 UART: [state] WD Timer not started. Device not locked for debugging
28,160,767 UART: [kat] SHA2-256
28,339,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,351,484 UART: [kat] ++
28,351,942 UART: [kat] sha1
28,363,473 UART: [kat] SHA2-256
28,366,483 UART: [kat] SHA2-384
28,371,713 UART: [kat] SHA2-512-ACC
28,374,668 UART: [kat] ECC-384
30,812,901 UART: [kat] HMAC-384Kdf
30,826,069 UART: [kat] LMS
31,355,557 UART: [kat] --
31,360,566 UART: [update-reset] ++
34,781,553 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,785,060 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,167,384 >>> mbox cmd response: success
35,168,925 UART: [update-reset] Copying MAN_2 To MAN_1
35,191,262 UART: [update-reset Success] --
35,194,088 UART: [state] Locking Datavault
35,196,749 UART: [state] Locking PCR0, PCR1 and PCR31
35,198,390 UART: [state] Locking ICCM
35,199,674 UART: [exit] Launching FMC @ 0x40000130
35,208,128 UART:
35,208,361 UART: Running Caliptra FMC ...
35,209,487 UART:
35,209,650 UART: [state] CFI Enabled
35,253,841 UART: [art] Extend RT PCRs Done
35,255,024 UART: [art] Lock RT PCRs Done
35,256,540 UART: [art] Populate DV Done
35,261,899 UART: [fht] FMC Alias Private Key: 7
35,263,599 UART: [art] Derive CDI
35,264,416 UART: [art] Store in in slot 0x4
35,306,866 UART: [art] Derive Key Pair
35,307,909 UART: [art] Store priv key in slot 0x5
37,735,188 UART: [art] Derive Key Pair - Done
37,748,090 UART: [art] Signing Cert with AUTHO
37,749,403 UART: RITY.KEYID = 7
39,455,025 UART: [art] Erasing AUTHORITY.KEYID = 7
39,456,532 UART: [art] PUB.X = 91A332D4772124CF56F2673E3B339E52BB286C1F4E7DF1417E7F7DDCB32F35D10916AB599006C3C7112032C974405398
39,463,793 UART: [art] PUB.Y = 3D709C88E69DC2B2CE0C0D984548EAD8527DA1EC72CB5524E7F5C60DD14B8BF3F58AD646E9076D09D103942E1551CB63
39,471,061 UART: [art] SIG.R = 9A6686606A12B7E90E81BA7F0DC9CDC251A2F2F34772358F731635F17F089CBFE4D7C501A4C748E2D72C74ADF5983DBF
39,478,410 UART: [art] SIG.S = 3770152A1063F1F9AF49E1E9BBA2B0C08F25CFA424E0D06BC64F44019BF53CA7D31AA85602B02912DE77DA4E283C6755
40,456,842 UART: Caliptra RT
40,457,546 UART: [state] CFI Enabled
40,745,536 UART: [rt] RT listening for mailbox commands...
40,747,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,777,210 UART: [rt]cmd =0x494e464f, len=4
40,781,600 >>> mbox cmd response data (312 bytes)
42,836,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
42,982,287 UART:
42,982,640 UART: Running Caliptra ROM ...
42,983,723 UART:
42,983,905 UART: [state] CFI Enabled
42,999,842 UART: [state] LifecycleState = Unprovisioned
43,001,676 UART: [state] DebugLocked = No
43,003,116 UART: [state] WD Timer not started. Device not locked for debugging
43,006,870 UART: [kat] SHA2-256
43,186,071 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
43,197,662 UART: [kat] ++
43,198,203 UART: [kat] sha1
43,208,393 UART: [kat] SHA2-256
43,211,456 UART: [kat] SHA2-384
43,217,813 UART: [kat] SHA2-512-ACC
43,220,752 UART: [kat] ECC-384
45,662,149 UART: [kat] HMAC-384Kdf
45,675,468 UART: [kat] LMS
46,204,971 UART: [kat] --
46,207,434 UART: [update-reset] ++
49,633,507 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,637,197 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
50,019,492 >>> mbox cmd response: success
50,019,921 UART: [update-reset] Copying MAN_2 To MAN_1
50,042,198 UART: [update-reset Success] --
50,045,946 UART: [state] Locking Datavault
50,050,384 UART: [state] Locking PCR0, PCR1 and PCR31
50,052,035 UART: [state] Locking ICCM
50,054,191 UART: [exit] Launching FMC @ 0x40000130
50,062,643 UART:
50,062,883 UART: Running Caliptra FMC ...
50,063,984 UART:
50,064,148 UART: [state] CFI Enabled
50,108,282 UART: [art] Extend RT PCRs Done
50,109,463 UART: [art] Lock RT PCRs Done
50,110,868 UART: [art] Populate DV Done
50,116,186 UART: [fht] FMC Alias Private Key: 7
50,117,894 UART: [art] Derive CDI
50,118,705 UART: [art] Store in in slot 0x4
50,161,348 UART: [art] Derive Key Pair
50,162,348 UART: [art] Store priv key in slot 0x5
52,588,967 UART: [art] Derive Key Pair - Done
52,601,797 UART: [art] Signing Cert with AUTHO
52,603,096 UART: RITY.KEYID = 7
54,308,495 UART: [art] Erasing AUTHORITY.KEYID = 7
54,310,014 UART: [art] PUB.X = EBD23CE9507151C929B4AC434341A4A79FFCE98064678CC8F713811A52A199D9F6025CF2B219F4113867E1709C4164D9
54,317,223 UART: [art] PUB.Y = 25FA4D2F3CAA5949E7B73C3985C7E64A2C99E1A26A379EA47D6BDEB406BDBFC9CA2B7F55E7ABA07664C1F63985EF5294
54,324,522 UART: [art] SIG.R = E346F8998C87F8B40A3D469703FAC5FC6852712296982B8513F7C1D748C16738DA9CC57F019F8E4A9C273F2805196750
54,331,876 UART: [art] SIG.S = 34CD226CF270F0017BD54BE4C78DC5942B550CCF707B1C75386A02302BF48AF4BAE675FC990235CD5CD3AC00738A5498
55,310,625 UART: Caliptra RT
55,311,334 UART: [state] CFI Enabled
55,596,464 UART: [rt] RT listening for mailbox commands...
55,598,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,628,167 UART: [rt]cmd =0x494e464f, len=4
55,632,530 >>> mbox cmd response data (312 bytes)
55,634,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
55,778,668 UART:
55,778,977 UART: Running Caliptra ROM ...
55,780,020 UART:
55,780,229 UART: [state] CFI Enabled
55,795,908 UART: [state] LifecycleState = Unprovisioned
55,797,746 UART: [state] DebugLocked = No
55,799,885 UART: [state] WD Timer not started. Device not locked for debugging
55,803,625 UART: [kat] SHA2-256
55,982,766 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
55,994,342 UART: [kat] ++
55,994,881 UART: [kat] sha1
56,006,044 UART: [kat] SHA2-256
56,009,085 UART: [kat] SHA2-384
56,015,293 UART: [kat] SHA2-512-ACC
56,018,220 UART: [kat] ECC-384
58,457,584 UART: [kat] HMAC-384Kdf
58,470,072 UART: [kat] LMS
58,999,607 UART: [kat] --
59,005,266 UART: [update-reset] ++
62,424,922 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,428,727 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
62,811,028 >>> mbox cmd response: success
62,811,629 UART: [update-reset] Copying MAN_2 To MAN_1
62,834,007 UART: [update-reset Success] --
62,838,007 UART: [state] Locking Datavault
62,841,104 UART: [state] Locking PCR0, PCR1 and PCR31
62,842,750 UART: [state] Locking ICCM
62,843,873 UART: [exit] Launching FMC @ 0x40000130
62,852,288 UART:
62,852,525 UART: Running Caliptra FMC ...
62,853,628 UART:
62,853,787 UART: [state] CFI Enabled
62,898,122 UART: [art] Extend RT PCRs Done
62,899,301 UART: [art] Lock RT PCRs Done
62,900,544 UART: [art] Populate DV Done
62,906,165 UART: [fht] FMC Alias Private Key: 7
62,907,704 UART: [art] Derive CDI
62,908,524 UART: [art] Store in in slot 0x4
62,951,221 UART: [art] Derive Key Pair
62,952,220 UART: [art] Store priv key in slot 0x5
65,378,676 UART: [art] Derive Key Pair - Done
65,391,621 UART: [art] Signing Cert with AUTHO
65,392,919 UART: RITY.KEYID = 7
67,098,667 UART: [art] Erasing AUTHORITY.KEYID = 7
67,100,200 UART: [art] PUB.X = 91A332D4772124CF56F2673E3B339E52BB286C1F4E7DF1417E7F7DDCB32F35D10916AB599006C3C7112032C974405398
67,107,402 UART: [art] PUB.Y = 3D709C88E69DC2B2CE0C0D984548EAD8527DA1EC72CB5524E7F5C60DD14B8BF3F58AD646E9076D09D103942E1551CB63
67,114,698 UART: [art] SIG.R = 9A6686606A12B7E90E81BA7F0DC9CDC251A2F2F34772358F731635F17F089CBFE4D7C501A4C748E2D72C74ADF5983DBF
67,122,049 UART: [art] SIG.S = 3770152A1063F1F9AF49E1E9BBA2B0C08F25CFA424E0D06BC64F44019BF53CA7D31AA85602B02912DE77DA4E283C6755
68,100,931 UART: Caliptra RT
68,101,641 UART: [state] CFI Enabled
68,391,359 UART: [rt] RT listening for mailbox commands...
68,393,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,422,956 UART: [rt]cmd =0x494e464f, len=4
68,427,319 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
3,695,353 ready_for_fw is high
3,695,753 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,014 >>> mbox cmd response: success
14,262,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,506,824 UART:
18,507,260 UART: Running Caliptra FMC ...
18,508,560 UART:
18,508,734 UART: [state] CFI Enabled
18,516,427 UART: [fht] FMC Alias Private Key: 7
20,273,415 UART: [art] Extend RT PCRs Done
20,274,648 UART: [art] Lock RT PCRs Done
20,276,275 UART: [art] Populate DV Done
20,281,792 UART: [fht] FMC Alias Private Key: 7
20,283,500 UART: [art] Derive CDI
20,284,337 UART: [art] Store in in slot 0x4
20,327,202 UART: [art] Derive Key Pair
20,328,196 UART: [art] Store priv key in slot 0x5
22,754,721 UART: [art] Derive Key Pair - Done
22,767,767 UART: [art] Signing Cert with AUTHO
22,769,077 UART: RITY.KEYID = 7
24,474,502 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,011 UART: [art] PUB.X = F3F85CE0ADAE1D9E9AAE99E7D46757EDE19ACB85AC9ADBE95399AE5105395CE880F78052C869B57EA09A2852A15E299E
24,483,265 UART: [art] PUB.Y = D66F6E06377C3CCAEF4CBAE42C1D1D3B0AA85483EAB258A36A12B08478B6995C3D44A8542364B5FF5F674E47E54643C9
24,490,540 UART: [art] SIG.R = 629230E991FC3B47D302FD75CDFB21C163D4501AF739A037711E9DF3A2022B89569973637EA2C7A07AA00FEF5FB0BCA3
24,497,938 UART: [art] SIG.S = 0EF95BFBD0CF5D0C6C859678AF63728F7979B82B5D2F7F83F10138B397AA98C8AB6FAE5F33DB6AF333A5CFF69625C04B
25,476,758 UART: Caliptra RT
25,477,465 UART: [state] CFI Enabled
25,594,691 UART: [rt] RT listening for mailbox commands...
25,626,100 UART: [rt]cmd =0x494e464f, len=4
25,630,409 >>> mbox cmd response data (312 bytes)
27,686,475 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,736,891 >>> mbox cmd response: success
34,772,988 UART:
34,773,326 UART: Running Caliptra FMC ...
34,774,459 UART:
34,774,633 UART: [state] CFI Enabled
34,818,546 UART: [art] Extend RT PCRs Done
34,819,697 UART: [art] Lock RT PCRs Done
34,821,250 UART: [art] Populate DV Done
34,826,413 UART: [fht] FMC Alias Private Key: 7
34,827,962 UART: [art] Derive CDI
34,828,731 UART: [art] Store in in slot 0x4
34,871,377 UART: [art] Derive Key Pair
34,872,397 UART: [art] Store priv key in slot 0x5
37,298,906 UART: [art] Derive Key Pair - Done
37,312,263 UART: [art] Signing Cert with AUTHO
37,313,609 UART: RITY.KEYID = 7
39,019,139 UART: [art] Erasing AUTHORITY.KEYID = 7
39,020,648 UART: [art] PUB.X = E1C76AFD5E5C6EC3CC3A2B5705479EF5ECF45FA0D9DCF1220070CB0BBF0E2755C24101EAC7A3D97AB0B1540985EAD82C
39,027,901 UART: [art] PUB.Y = 8A80322993151E4C2CDBE493061B93E72FCBF4156FAA6B2555341794E4F504284F8EA58172348312DFD5D3DC65A372AA
39,035,187 UART: [art] SIG.R = 496ADFE096073D1350847EC8B1FCC5070985CBA8A8A601BC533E66E76578E5F37187A34A4E3F288BAC01C36AE75817BD
39,042,587 UART: [art] SIG.S = CEB726308CC598C6D7A7BA03EC7F6753D3A7B672A8873B4009A5E62115DF1745C1A9103ADB9EEFDECBCEF70453D77ACF
40,021,691 UART: Caliptra RT
40,022,398 UART: [state] CFI Enabled
40,310,584 UART: [rt] RT listening for mailbox commands...
40,312,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,341,973 UART: [rt]cmd =0x494e464f, len=4
40,346,149 >>> mbox cmd response data (312 bytes)
42,404,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
49,444,515 >>> mbox cmd response: success
49,479,080 UART:
49,479,416 UART: Running Caliptra FMC ...
49,480,473 UART:
49,480,625 UART: [state] CFI Enabled
49,524,450 UART: [art] Extend RT PCRs Done
49,525,597 UART: [art] Lock RT PCRs Done
49,527,022 UART: [art] Populate DV Done
49,532,641 UART: [fht] FMC Alias Private Key: 7
49,534,343 UART: [art] Derive CDI
49,535,080 UART: [art] Store in in slot 0x4
49,577,459 UART: [art] Derive Key Pair
49,578,501 UART: [art] Store priv key in slot 0x5
52,005,160 UART: [art] Derive Key Pair - Done
52,018,012 UART: [art] Signing Cert with AUTHO
52,019,321 UART: RITY.KEYID = 7
53,725,110 UART: [art] Erasing AUTHORITY.KEYID = 7
53,726,617 UART: [art] PUB.X = 178C87AFA994F09B50E57EE227622DC1AF12C9F00FE0D8966382AF8A4EE82FAF1CA5CAB957283CD57B7642BC1F4F5074
53,733,870 UART: [art] PUB.Y = AF38D65587CAE2844F2B052F4FC2A2A2B57C4EE6943C5B4D4233749692BD6AFD74976EE40AD0B0EF63D2392EBCC3935F
53,741,161 UART: [art] SIG.R = BD893202DBF3B15189C2AB19B6C487974451E609BF708EACBE5A52281FC28722D011A7E51381DB88793F19E499240CDA
53,748,556 UART: [art] SIG.S = 5A1879210C2F06E6058F219831AD98E51B09C42CC38622648C1E42A065FE76DEA8F9542A6E8FE75B58F7C16E3D7B035A
54,727,177 UART: Caliptra RT
54,727,879 UART: [state] CFI Enabled
55,016,696 UART: [rt] RT listening for mailbox commands...
55,018,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,048,355 UART: [rt]cmd =0x494e464f, len=4
55,052,749 >>> mbox cmd response data (312 bytes)
55,054,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
62,089,429 >>> mbox cmd response: success
62,124,332 UART:
62,124,647 UART: Running Caliptra FMC ...
62,125,765 UART:
62,125,934 UART: [state] CFI Enabled
62,170,004 UART: [art] Extend RT PCRs Done
62,171,154 UART: [art] Lock RT PCRs Done
62,172,602 UART: [art] Populate DV Done
62,178,116 UART: [fht] FMC Alias Private Key: 7
62,179,758 UART: [art] Derive CDI
62,180,570 UART: [art] Store in in slot 0x4
62,222,849 UART: [art] Derive Key Pair
62,223,908 UART: [art] Store priv key in slot 0x5
64,650,484 UART: [art] Derive Key Pair - Done
64,663,426 UART: [art] Signing Cert with AUTHO
64,664,727 UART: RITY.KEYID = 7
66,370,105 UART: [art] Erasing AUTHORITY.KEYID = 7
66,371,610 UART: [art] PUB.X = E1C76AFD5E5C6EC3CC3A2B5705479EF5ECF45FA0D9DCF1220070CB0BBF0E2755C24101EAC7A3D97AB0B1540985EAD82C
66,378,909 UART: [art] PUB.Y = 8A80322993151E4C2CDBE493061B93E72FCBF4156FAA6B2555341794E4F504284F8EA58172348312DFD5D3DC65A372AA
66,386,139 UART: [art] SIG.R = 496ADFE096073D1350847EC8B1FCC5070985CBA8A8A601BC533E66E76578E5F37187A34A4E3F288BAC01C36AE75817BD
66,393,536 UART: [art] SIG.S = CEB726308CC598C6D7A7BA03EC7F6753D3A7B672A8873B4009A5E62115DF1745C1A9103ADB9EEFDECBCEF70453D77ACF
67,372,740 UART: Caliptra RT
67,373,441 UART: [state] CFI Enabled
67,659,118 UART: [rt] RT listening for mailbox commands...
67,660,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
67,690,717 UART: [rt]cmd =0x494e464f, len=4
67,694,940 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.50s
Truncated 1634 bytes from beginning
,031,464 UART: [idev] Sha1 KeyId Algorithm
6,054,218 UART: [idev] --
6,058,659 UART: [ldev] ++
6,059,345 UART: [ldev] CDI.KEYID = 6
6,060,261 UART: [ldev] SUBJECT.KEYID = 5
6,061,430 UART: [ldev] AUTHORITY.KEYID = 7
6,062,592 UART: [ldev] FE.KEYID = 1
6,101,024 UART: [ldev] Erasing FE.KEYID = 1
8,609,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,617 UART: [ldev] --
10,415,207 UART: [fwproc] Wait for Commands...
10,416,660 UART: [fwproc] Recv command 0x46574c44
10,418,649 UART: [fwproc] Recv'd Img size: 114168 bytes
13,864,915 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,487 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,596,691 >>> mbox cmd response: success
14,597,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,600,789 UART: [afmc] ++
14,601,491 UART: [afmc] CDI.KEYID = 6
14,602,745 UART: [afmc] SUBJECT.KEYID = 7
14,604,134 UART: [afmc] AUTHORITY.KEYID = 5
17,127,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,854,583 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
18,869,632 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
18,884,820 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
18,899,752 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
18,923,498 UART: [afmc] --
18,927,213 UART: [cold-reset] --
18,931,893 UART: [state] Locking Datavault
18,937,150 UART: [state] Locking PCR0, PCR1 and PCR31
18,939,349 UART: [state] Locking ICCM
18,941,641 UART: [exit] Launching FMC @ 0x40000130
18,950,313 UART:
18,950,554 UART: Running Caliptra FMC ...
18,951,592 UART:
18,951,742 UART: [state] CFI Enabled
19,011,167 UART: [fht] FMC Alias Private Key: 7
20,774,727 UART: [art] Extend RT PCRs Done
20,775,958 UART: [art] Lock RT PCRs Done
20,777,402 UART: [art] Populate DV Done
20,782,974 UART: [fht] FMC Alias Private Key: 7
20,784,510 UART: [art] Derive CDI
20,785,252 UART: [art] Store in in slot 0x4
20,843,555 UART: [art] Derive Key Pair
20,844,594 UART: [art] Store priv key in slot 0x5
23,307,349 UART: [art] Derive Key Pair - Done
23,320,303 UART: [art] Signing Cert with AUTHO
23,321,648 UART: RITY.KEYID = 7
25,033,763 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,263 UART: [art] PUB.X = 295AF21F997F914609D8B58833287C9098238024ED496A968B917366A75687C554497F3CE8F1D2E452BF201B80FEEDF8
25,042,532 UART: [art] PUB.Y = 3E23037CBD26003A3FC2F8618257266CDD3CB238D62A9C12ECFC7BC83151353F3C310D9BC056F788A4167F507470017A
25,049,731 UART: [art] SIG.R = 00E81FBD9A69725454C8DC490ED1034795C2852966F128C303789624D66A29C8C6EC6F8AA14294F16126DC620A485514
25,057,090 UART: [art] SIG.S = D477ED9057D00CF63BA8A949F59C30E5D69DEA3FF34EB166C9EFD2030F6BF3963C6865F12506FF02BBCBB5F1FEA8553C
26,036,187 UART: Caliptra RT
26,036,903 UART: [state] CFI Enabled
26,201,130 UART: [rt] RT listening for mailbox commands...
26,232,652 UART: [rt]cmd =0x494e464f, len=4
26,237,040 >>> mbox cmd response data (312 bytes)
28,297,935 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,442,930 UART:
28,443,318 UART: Running Caliptra ROM ...
28,444,474 UART:
28,444,671 UART: [state] CFI Enabled
28,505,443 UART: [state] LifecycleState = Unprovisioned
28,507,508 UART: [state] DebugLocked = No
28,509,698 UART: [state] WD Timer not started. Device not locked for debugging
28,514,268 UART: [kat] SHA2-256
28,704,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,714,909 UART: [kat] ++
28,715,409 UART: [kat] sha1
28,726,731 UART: [kat] SHA2-256
28,729,709 UART: [kat] SHA2-384
28,735,651 UART: [kat] SHA2-512-ACC
28,738,222 UART: [kat] ECC-384
31,191,872 UART: [kat] HMAC-384Kdf
31,214,360 UART: [kat] LMS
31,745,922 UART: [kat] --
31,749,981 UART: [update-reset] ++
35,207,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,211,287 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,817,857 >>> mbox cmd response: success
35,819,358 UART: [update-reset] Copying MAN_2 To MAN_1
35,856,881 UART: [update-reset Success] --
35,861,597 UART: [state] Locking Datavault
35,863,886 UART: [state] Locking PCR0, PCR1 and PCR31
35,866,026 UART: [state] Locking ICCM
35,867,975 UART: [exit] Launching FMC @ 0x40000130
35,876,668 UART:
35,876,943 UART: Running Caliptra FMC ...
35,878,057 UART:
35,878,232 UART: [state] CFI Enabled
35,981,755 UART: [art] Extend RT PCRs Done
35,982,932 UART: [art] Lock RT PCRs Done
35,984,603 UART: [art] Populate DV Done
35,990,249 UART: [fht] FMC Alias Private Key: 7
35,991,845 UART: [art] Derive CDI
35,992,657 UART: [art] Store in in slot 0x4
36,050,621 UART: [art] Derive Key Pair
36,051,659 UART: [art] Store priv key in slot 0x5
38,514,053 UART: [art] Derive Key Pair - Done
38,526,464 UART: [art] Signing Cert with AUTHO
38,527,767 UART: RITY.KEYID = 7
40,239,857 UART: [art] Erasing AUTHORITY.KEYID = 7
40,241,365 UART: [art] PUB.X = 4F9E244DEA044108F77FE4B945C0AADB7B38E6E0DAB284F5EAD261090C1FE242E4EE1D636E4768C922D08E73D51FE40A
40,248,687 UART: [art] PUB.Y = 87B430528F9E34CAAE70B0A122E9E6175C02D59CE3B2E71E8523EA2942A0FD5B5A1A00823FB96DDF3A71FB24A303A12A
40,255,888 UART: [art] SIG.R = 4F1515024DC86343BA171A95A88D2FE46446B6C6AF59E2884310EE034D800E72A64B85F6B70B8F043596FBE33F5F1DAA
40,263,309 UART: [art] SIG.S = F708ACC179662F8B6309F61F18131F18262DDD7D7023D9C1B9DEB9C4DEE78A047C7B55AD371C7DBD7BA9BA369BA79E0C
41,242,890 UART: Caliptra RT
41,243,578 UART: [state] CFI Enabled
41,580,475 UART: [rt] RT listening for mailbox commands...
41,582,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,612,288 UART: [rt]cmd =0x494e464f, len=4
41,616,568 >>> mbox cmd response data (312 bytes)
43,672,843 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
43,818,082 UART:
43,818,449 UART: Running Caliptra ROM ...
43,819,588 UART:
43,819,773 UART: [state] CFI Enabled
43,885,417 UART: [state] LifecycleState = Unprovisioned
43,887,521 UART: [state] DebugLocked = No
43,889,880 UART: [state] WD Timer not started. Device not locked for debugging
43,894,674 UART: [kat] SHA2-256
44,084,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,095,311 UART: [kat] ++
44,095,853 UART: [kat] sha1
44,106,748 UART: [kat] SHA2-256
44,109,768 UART: [kat] SHA2-384
44,116,174 UART: [kat] SHA2-512-ACC
44,118,773 UART: [kat] ECC-384
46,571,432 UART: [kat] HMAC-384Kdf
46,592,952 UART: [kat] LMS
47,124,484 UART: [kat] --
47,130,147 UART: [update-reset] ++
50,589,593 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,592,433 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
51,198,977 >>> mbox cmd response: success
51,200,033 UART: [update-reset] Copying MAN_2 To MAN_1
51,237,558 UART: [update-reset Success] --
51,241,794 UART: [state] Locking Datavault
51,246,634 UART: [state] Locking PCR0, PCR1 and PCR31
51,248,790 UART: [state] Locking ICCM
51,250,841 UART: [exit] Launching FMC @ 0x40000130
51,259,528 UART:
51,259,768 UART: Running Caliptra FMC ...
51,260,872 UART:
51,261,037 UART: [state] CFI Enabled
51,358,883 UART: [art] Extend RT PCRs Done
51,360,067 UART: [art] Lock RT PCRs Done
51,361,313 UART: [art] Populate DV Done
51,366,776 UART: [fht] FMC Alias Private Key: 7
51,368,310 UART: [art] Derive CDI
51,369,129 UART: [art] Store in in slot 0x4
51,428,438 UART: [art] Derive Key Pair
51,429,477 UART: [art] Store priv key in slot 0x5
53,892,440 UART: [art] Derive Key Pair - Done
53,905,335 UART: [art] Signing Cert with AUTHO
53,906,641 UART: RITY.KEYID = 7
55,616,823 UART: [art] Erasing AUTHORITY.KEYID = 7
55,618,331 UART: [art] PUB.X = B223923505BA526114C37C29C7672732E5753ABC3496363B76B0C84E746B77C30B14E643033BB050FFB064253E3C2B21
55,625,544 UART: [art] PUB.Y = 444037B3BC5533BF4619B62742FAA725C2E6C65878ED5D5451BFA6AD900BADF899B45A8CA0773D752A080528295C7EFB
55,632,802 UART: [art] SIG.R = 074EA83A07E7102A38FC9057F389D9FA086E2C2804AFCB31555BADC503691EBD61E2FCAF4046DFD75A389F6806325629
55,640,199 UART: [art] SIG.S = 57EF6C30F8D3D2DA5448D09D6919F1591E6F0AE32A6EA624BCEB8A570F241D326DDC1E3A0C8F538030905F5C7DF3F976
56,618,872 UART: Caliptra RT
56,619,595 UART: [state] CFI Enabled
56,956,270 UART: [rt] RT listening for mailbox commands...
56,958,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,988,033 UART: [rt]cmd =0x494e464f, len=4
56,992,316 >>> mbox cmd response data (312 bytes)
56,994,362 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
57,138,685 UART:
57,139,013 UART: Running Caliptra ROM ...
57,140,054 UART:
57,140,208 UART: [state] CFI Enabled
57,216,148 UART: [state] LifecycleState = Unprovisioned
57,218,203 UART: [state] DebugLocked = No
57,219,727 UART: [state] WD Timer not started. Device not locked for debugging
57,223,448 UART: [kat] SHA2-256
57,413,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,424,044 UART: [kat] ++
57,424,506 UART: [kat] sha1
57,436,584 UART: [kat] SHA2-256
57,439,609 UART: [kat] SHA2-384
57,444,253 UART: [kat] SHA2-512-ACC
57,446,880 UART: [kat] ECC-384
59,901,889 UART: [kat] HMAC-384Kdf
59,922,461 UART: [kat] LMS
60,454,010 UART: [kat] --
60,457,901 UART: [update-reset] ++
63,909,654 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,912,217 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
64,518,721 >>> mbox cmd response: success
64,520,295 UART: [update-reset] Copying MAN_2 To MAN_1
64,557,867 UART: [update-reset Success] --
64,561,989 UART: [state] Locking Datavault
64,565,905 UART: [state] Locking PCR0, PCR1 and PCR31
64,568,052 UART: [state] Locking ICCM
64,570,839 UART: [exit] Launching FMC @ 0x40000130
64,579,514 UART:
64,579,745 UART: Running Caliptra FMC ...
64,580,778 UART:
64,580,927 UART: [state] CFI Enabled
64,666,855 UART: [art] Extend RT PCRs Done
64,668,070 UART: [art] Lock RT PCRs Done
64,669,726 UART: [art] Populate DV Done
64,675,144 UART: [fht] FMC Alias Private Key: 7
64,676,826 UART: [art] Derive CDI
64,677,570 UART: [art] Store in in slot 0x4
64,736,291 UART: [art] Derive Key Pair
64,737,293 UART: [art] Store priv key in slot 0x5
67,199,991 UART: [art] Derive Key Pair - Done
67,213,210 UART: [art] Signing Cert with AUTHO
67,214,515 UART: RITY.KEYID = 7
68,924,722 UART: [art] Erasing AUTHORITY.KEYID = 7
68,926,204 UART: [art] PUB.X = 4F9E244DEA044108F77FE4B945C0AADB7B38E6E0DAB284F5EAD261090C1FE242E4EE1D636E4768C922D08E73D51FE40A
68,933,523 UART: [art] PUB.Y = 87B430528F9E34CAAE70B0A122E9E6175C02D59CE3B2E71E8523EA2942A0FD5B5A1A00823FB96DDF3A71FB24A303A12A
68,940,776 UART: [art] SIG.R = 4F1515024DC86343BA171A95A88D2FE46446B6C6AF59E2884310EE034D800E72A64B85F6B70B8F043596FBE33F5F1DAA
68,948,140 UART: [art] SIG.S = F708ACC179662F8B6309F61F18131F18262DDD7D7023D9C1B9DEB9C4DEE78A047C7B55AD371C7DBD7BA9BA369BA79E0C
69,927,118 UART: Caliptra RT
69,927,849 UART: [state] CFI Enabled
70,262,838 UART: [rt] RT listening for mailbox commands...
70,264,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,294,346 UART: [rt]cmd =0x494e464f, len=4
70,298,874 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
3,437,476 ready_for_fw is high
3,437,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,730,617 >>> mbox cmd response: success
14,731,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,026,242 UART:
19,026,629 UART: Running Caliptra FMC ...
19,028,024 UART:
19,028,208 UART: [state] CFI Enabled
19,092,732 UART: [fht] FMC Alias Private Key: 7
20,856,466 UART: [art] Extend RT PCRs Done
20,857,714 UART: [art] Lock RT PCRs Done
20,859,481 UART: [art] Populate DV Done
20,864,632 UART: [fht] FMC Alias Private Key: 7
20,866,331 UART: [art] Derive CDI
20,867,068 UART: [art] Store in in slot 0x4
20,924,288 UART: [art] Derive Key Pair
20,925,300 UART: [art] Store priv key in slot 0x5
23,388,703 UART: [art] Derive Key Pair - Done
23,401,972 UART: [art] Signing Cert with AUTHO
23,403,283 UART: RITY.KEYID = 7
25,113,606 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,110 UART: [art] PUB.X = 20B92FB471116C50B4976F4BAA6CF3E38F01D447DA7866566DFF62FDE87F3DD37AD4872C44EEF7BCD8EB070AD5C4DD0A
25,122,421 UART: [art] PUB.Y = 631972D04840552D0513B3763F9CBF7B0B654F37484053E0581957C575C7D39C70F149EA1221FA735EF84FD64BE05858
25,129,647 UART: [art] SIG.R = 0820DE11FF1B790C4789BC321AAD23C1443EA2E7D3CE090ECC8FDE06BDB23E6A83407883A6F117DA3A38F6AB928C06BB
25,137,090 UART: [art] SIG.S = 39C7EA86013BC29729DACC5F6F00CB5EAA33258FE0901FBDBAAF20AB2C01BFC2DAB007517818640ACCCF9E3F2483AB50
26,116,189 UART: Caliptra RT
26,116,922 UART: [state] CFI Enabled
26,281,131 UART: [rt] RT listening for mailbox commands...
26,312,447 UART: [rt]cmd =0x494e464f, len=4
26,316,599 >>> mbox cmd response data (312 bytes)
28,373,936 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
36,196,669 >>> mbox cmd response: success
36,233,166 UART:
36,233,495 UART: Running Caliptra FMC ...
36,234,641 UART:
36,234,815 UART: [state] CFI Enabled
36,338,883 UART: [art] Extend RT PCRs Done
36,340,074 UART: [art] Lock RT PCRs Done
36,341,629 UART: [art] Populate DV Done
36,347,041 UART: [fht] FMC Alias Private Key: 7
36,348,574 UART: [art] Derive CDI
36,349,337 UART: [art] Store in in slot 0x4
36,407,783 UART: [art] Derive Key Pair
36,408,841 UART: [art] Store priv key in slot 0x5
38,871,793 UART: [art] Derive Key Pair - Done
38,885,063 UART: [art] Signing Cert with AUTHO
38,886,373 UART: RITY.KEYID = 7
40,596,610 UART: [art] Erasing AUTHORITY.KEYID = 7
40,598,112 UART: [art] PUB.X = 18DDCF3641EB97120898D816AA9213CDC8FBB1C8EDBCA09D4CB477131103C4D19F46045367FBD3786AA1B3F517D822B6
40,605,360 UART: [art] PUB.Y = EDF00DDC0FC9110833DCDB76A5583DD5F494A00636357E0BE3F42AECD579DA9BC22B76A9590774EE35BD20FBB8122B5C
40,612,655 UART: [art] SIG.R = ECF047C2388A1E44EB3C963539698E1DC905094031B2B13167D2C1C08502B037A1C96F8955C6D1938E116A8B3B29F27A
40,620,048 UART: [art] SIG.S = CF4271AD745BEEE728E8BB74E331049F53B3C7F475AA3E1E67A0F9FFC5F19C2D1B98047C88027ADE07C199ABD991E865
41,598,812 UART: Caliptra RT
41,599,509 UART: [state] CFI Enabled
41,935,645 UART: [rt] RT listening for mailbox commands...
41,937,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,966,986 UART: [rt]cmd =0x494e464f, len=4
41,971,260 >>> mbox cmd response data (312 bytes)
44,027,741 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
51,821,742 >>> mbox cmd response: success
51,856,741 UART:
51,857,069 UART: Running Caliptra FMC ...
51,858,198 UART:
51,858,405 UART: [state] CFI Enabled
51,946,634 UART: [art] Extend RT PCRs Done
51,947,814 UART: [art] Lock RT PCRs Done
51,949,165 UART: [art] Populate DV Done
51,954,846 UART: [fht] FMC Alias Private Key: 7
51,956,492 UART: [art] Derive CDI
51,957,309 UART: [art] Store in in slot 0x4
52,016,488 UART: [art] Derive Key Pair
52,017,532 UART: [art] Store priv key in slot 0x5
54,479,948 UART: [art] Derive Key Pair - Done
54,493,214 UART: [art] Signing Cert with AUTHO
54,494,515 UART: RITY.KEYID = 7
56,205,437 UART: [art] Erasing AUTHORITY.KEYID = 7
56,206,956 UART: [art] PUB.X = 196502DEA9A1BCDD8268C0CECE620CE73D8C0C451CCE168D46308EB54AF19CE5E93FEE703835C1E2C226A4BA540FB068
56,214,209 UART: [art] PUB.Y = EF002D0AED35DAA500888AE492BFF801B6835219AE6681F94AC4B44E8C8BD68608354958D4D16D7DDFE2C53496C7B537
56,221,443 UART: [art] SIG.R = 08F1A72E37332BA29DD5AF4D273D2C475BEF376E41982EB2B76FC61ABB44790A2C6BB28AC7FE127488CA3CC3AD25C32C
56,228,886 UART: [art] SIG.S = 0D4BC13C8E819804CFC2D7D600875DB0B26E0E2B8DF4E1143352FE9161B8705D1DCE4C9968BF3A2528926742B285E93A
57,208,565 UART: Caliptra RT
57,209,276 UART: [state] CFI Enabled
57,542,328 UART: [rt] RT listening for mailbox commands...
57,544,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,573,891 UART: [rt]cmd =0x494e464f, len=4
57,578,057 >>> mbox cmd response data (312 bytes)
57,579,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
65,369,394 >>> mbox cmd response: success
65,405,134 UART:
65,405,413 UART: Running Caliptra FMC ...
65,406,531 UART:
65,406,691 UART: [state] CFI Enabled
65,509,673 UART: [art] Extend RT PCRs Done
65,510,889 UART: [art] Lock RT PCRs Done
65,512,410 UART: [art] Populate DV Done
65,518,051 UART: [fht] FMC Alias Private Key: 7
65,519,752 UART: [art] Derive CDI
65,520,564 UART: [art] Store in in slot 0x4
65,578,356 UART: [art] Derive Key Pair
65,579,352 UART: [art] Store priv key in slot 0x5
68,041,790 UART: [art] Derive Key Pair - Done
68,054,685 UART: [art] Signing Cert with AUTHO
68,055,996 UART: RITY.KEYID = 7
69,768,285 UART: [art] Erasing AUTHORITY.KEYID = 7
69,769,793 UART: [art] PUB.X = 18DDCF3641EB97120898D816AA9213CDC8FBB1C8EDBCA09D4CB477131103C4D19F46045367FBD3786AA1B3F517D822B6
69,777,031 UART: [art] PUB.Y = EDF00DDC0FC9110833DCDB76A5583DD5F494A00636357E0BE3F42AECD579DA9BC22B76A9590774EE35BD20FBB8122B5C
69,784,318 UART: [art] SIG.R = ECF047C2388A1E44EB3C963539698E1DC905094031B2B13167D2C1C08502B037A1C96F8955C6D1938E116A8B3B29F27A
69,791,708 UART: [art] SIG.S = CF4271AD745BEEE728E8BB74E331049F53B3C7F475AA3E1E67A0F9FFC5F19C2D1B98047C88027ADE07C199ABD991E865
70,770,958 UART: Caliptra RT
70,771,650 UART: [state] CFI Enabled
71,105,519 UART: [rt] RT listening for mailbox commands...
71,107,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,137,212 UART: [rt]cmd =0x494e464f, len=4
71,141,522 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.67s
Truncated 1634 bytes from beginning
,335,693 UART: [idev] Sha1 KeyId Algorithm
6,358,932 UART: [idev] --
6,363,628 UART: [ldev] ++
6,364,305 UART: [ldev] CDI.KEYID = 6
6,365,242 UART: [ldev] SUBJECT.KEYID = 5
6,366,398 UART: [ldev] AUTHORITY.KEYID = 7
6,367,632 UART: [ldev] FE.KEYID = 1
6,380,302 UART: [ldev] Erasing FE.KEYID = 1
8,858,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,007 UART: [ldev] --
10,650,138 UART: [fwproc] Wait for Commands...
10,651,621 UART: [fwproc] Recv command 0x46574c44
10,653,540 UART: [fwproc] Recv'd Img size: 114168 bytes
14,098,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,833,091 >>> mbox cmd response: success
14,834,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,837,867 UART: [afmc] ++
14,838,569 UART: [afmc] CDI.KEYID = 6
14,839,745 UART: [afmc] SUBJECT.KEYID = 7
14,841,234 UART: [afmc] AUTHORITY.KEYID = 5
17,347,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,247 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
19,085,309 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
19,100,481 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
19,115,422 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
19,138,337 UART: [afmc] --
19,142,478 UART: [cold-reset] --
19,145,469 UART: [state] Locking Datavault
19,151,960 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,107 UART: [state] Locking ICCM
19,156,825 UART: [exit] Launching FMC @ 0x40000130
19,165,493 UART:
19,165,725 UART: Running Caliptra FMC ...
19,166,772 UART:
19,166,925 UART: [state] CFI Enabled
19,175,487 UART: [fht] FMC Alias Private Key: 7
20,932,242 UART: [art] Extend RT PCRs Done
20,933,461 UART: [art] Lock RT PCRs Done
20,935,226 UART: [art] Populate DV Done
20,940,579 UART: [fht] FMC Alias Private Key: 7
20,942,056 UART: [art] Derive CDI
20,942,793 UART: [art] Store in in slot 0x4
20,985,765 UART: [art] Derive Key Pair
20,986,804 UART: [art] Store priv key in slot 0x5
23,413,096 UART: [art] Derive Key Pair - Done
23,426,306 UART: [art] Signing Cert with AUTHO
23,427,608 UART: RITY.KEYID = 7
25,132,646 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,151 UART: [art] PUB.X = 6E4B8AFAF7C7EEF3DE47BF75E087D43681BABB612916C47D3F00C54BFD532FB396E7B08524F6318BD1B8A45DB694384B
25,141,416 UART: [art] PUB.Y = 37185F87E80D0E3312916645BD28A30C5957E84C4994D4EF3F31E684CEF8632AFC266FAF3E9F2D8986A55548EC16669C
25,148,656 UART: [art] SIG.R = F15F6154E8B5817B24D00494A2668852BF65C644A1FA826B76B4DBCA2CFBC7F6F3404C7F430AAB72702C347430A2CD66
25,156,046 UART: [art] SIG.S = D405635D97FA1ACD12E5370BB668782C14CC572534D481A52016BCAE8879C5C494843559BD312CB312EB454F1CD94DF3
26,134,853 UART: Caliptra RT
26,135,542 UART: [state] CFI Enabled
26,252,447 UART: [rt] RT listening for mailbox commands...
26,283,802 UART: [rt]cmd =0x494e464f, len=4
26,288,135 >>> mbox cmd response data (312 bytes)
28,352,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,497,860 UART:
28,498,208 UART: Running Caliptra ROM ...
28,499,261 UART:
28,499,471 UART: [state] CFI Enabled
28,514,076 UART: [state] LifecycleState = Unprovisioned
28,515,976 UART: [state] DebugLocked = No
28,518,115 UART: [state] WD Timer not started. Device not locked for debugging
28,522,413 UART: [kat] SHA2-256
28,712,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,723,009 UART: [kat] ++
28,723,582 UART: [kat] sha1
28,734,536 UART: [kat] SHA2-256
28,737,548 UART: [kat] SHA2-384
28,743,869 UART: [kat] SHA2-512-ACC
28,746,436 UART: [kat] ECC-384
31,191,248 UART: [kat] HMAC-384Kdf
31,205,068 UART: [kat] LMS
31,736,675 UART: [kat] --
31,739,850 UART: [update-reset] ++
35,202,600 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,205,542 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,811,980 >>> mbox cmd response: success
35,812,812 UART: [update-reset] Copying MAN_2 To MAN_1
35,850,379 UART: [update-reset Success] --
35,854,755 UART: [state] Locking Datavault
35,858,230 UART: [state] Locking PCR0, PCR1 and PCR31
35,860,370 UART: [state] Locking ICCM
35,862,993 UART: [exit] Launching FMC @ 0x40000130
35,871,625 UART:
35,871,864 UART: Running Caliptra FMC ...
35,872,966 UART:
35,873,126 UART: [state] CFI Enabled
35,917,594 UART: [art] Extend RT PCRs Done
35,918,744 UART: [art] Lock RT PCRs Done
35,920,193 UART: [art] Populate DV Done
35,925,547 UART: [fht] FMC Alias Private Key: 7
35,927,068 UART: [art] Derive CDI
35,927,841 UART: [art] Store in in slot 0x4
35,970,060 UART: [art] Derive Key Pair
35,971,063 UART: [art] Store priv key in slot 0x5
38,397,883 UART: [art] Derive Key Pair - Done
38,410,975 UART: [art] Signing Cert with AUTHO
38,412,307 UART: RITY.KEYID = 7
40,118,034 UART: [art] Erasing AUTHORITY.KEYID = 7
40,119,542 UART: [art] PUB.X = F98CEA78E4C384AF3975B9DFB1BC95AFF64F0B2157933EE3C17EAE221053A09027F2482A5DA105D75A62D7297880D644
40,126,885 UART: [art] PUB.Y = 2D3E32166DE281D70AD7CA10F749E469F1E77F707FA3E71693A275B8F90E5BB5FA74983BE5714FFCBDCC072F8F1F73BC
40,134,109 UART: [art] SIG.R = 1606AEFBDE05180D6997D152D31DBA81D804EE15B80E14FB4B93346F4003BAAB95CE61DC91B73DAAAA3531921D6D310D
40,141,536 UART: [art] SIG.S = 39C7AD12C76D592C6D46A7D5A2410F3AD651916C24D06D91C5B0F0281E424D92000B284E3AE720B3660C23D9047965E3
41,120,677 UART: Caliptra RT
41,121,389 UART: [state] CFI Enabled
41,409,822 UART: [rt] RT listening for mailbox commands...
41,411,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,441,450 UART: [rt]cmd =0x494e464f, len=4
41,445,840 >>> mbox cmd response data (312 bytes)
43,501,245 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
43,646,135 UART:
43,646,498 UART: Running Caliptra ROM ...
43,647,641 UART:
43,647,816 UART: [state] CFI Enabled
43,663,059 UART: [state] LifecycleState = Unprovisioned
43,664,971 UART: [state] DebugLocked = No
43,667,386 UART: [state] WD Timer not started. Device not locked for debugging
43,672,117 UART: [kat] SHA2-256
43,861,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,872,801 UART: [kat] ++
43,873,261 UART: [kat] sha1
43,885,182 UART: [kat] SHA2-256
43,888,155 UART: [kat] SHA2-384
43,893,556 UART: [kat] SHA2-512-ACC
43,896,123 UART: [kat] ECC-384
46,336,259 UART: [kat] HMAC-384Kdf
46,349,144 UART: [kat] LMS
46,880,790 UART: [kat] --
46,886,058 UART: [update-reset] ++
50,343,232 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,345,965 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
50,952,555 >>> mbox cmd response: success
50,953,553 UART: [update-reset] Copying MAN_2 To MAN_1
50,991,122 UART: [update-reset Success] --
50,995,773 UART: [state] Locking Datavault
50,999,309 UART: [state] Locking PCR0, PCR1 and PCR31
51,001,505 UART: [state] Locking ICCM
51,004,477 UART: [exit] Launching FMC @ 0x40000130
51,013,111 UART:
51,013,349 UART: Running Caliptra FMC ...
51,014,452 UART:
51,014,613 UART: [state] CFI Enabled
51,058,840 UART: [art] Extend RT PCRs Done
51,060,025 UART: [art] Lock RT PCRs Done
51,061,644 UART: [art] Populate DV Done
51,067,322 UART: [fht] FMC Alias Private Key: 7
51,068,970 UART: [art] Derive CDI
51,069,801 UART: [art] Store in in slot 0x4
51,112,073 UART: [art] Derive Key Pair
51,113,074 UART: [art] Store priv key in slot 0x5
53,539,928 UART: [art] Derive Key Pair - Done
53,552,764 UART: [art] Signing Cert with AUTHO
53,554,071 UART: RITY.KEYID = 7
55,259,373 UART: [art] Erasing AUTHORITY.KEYID = 7
55,260,868 UART: [art] PUB.X = 4A95A1EFC9736307BF12D5443E975A9FCE1571AD6D46A5004ADA3B8AAD0AC0821720C641303BFE98DA3CDB48A80718E3
55,268,173 UART: [art] PUB.Y = A75FC1FB8C05EDF7B53A49C8820EDF1EF906FB680A1410B0D8C3FCC4207967E9EEEE150EB9AAB8B7308898F45F0813E0
55,275,458 UART: [art] SIG.R = F5FD00DA5C867FC58BA1AAE679305DD80C73C08803ACF5EE8F1A1449CBEB9D4D453783F90D93B30FF5D87849317EC6AD
55,282,796 UART: [art] SIG.S = 65537A53BCF1EBD082FDECA8BBE9B60651387E410EC8930AAEC7FA71F13A9DDB3834E13B8A41A1E440DBD7C9B85C30A5
56,261,410 UART: Caliptra RT
56,262,119 UART: [state] CFI Enabled
56,553,079 UART: [rt] RT listening for mailbox commands...
56,554,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,584,713 UART: [rt]cmd =0x494e464f, len=4
56,589,049 >>> mbox cmd response data (312 bytes)
56,590,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
56,735,690 UART:
56,735,997 UART: Running Caliptra ROM ...
56,737,110 UART:
56,737,281 UART: [state] CFI Enabled
56,752,303 UART: [state] LifecycleState = Unprovisioned
56,754,190 UART: [state] DebugLocked = No
56,756,003 UART: [state] WD Timer not started. Device not locked for debugging
56,759,761 UART: [kat] SHA2-256
56,949,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
56,960,149 UART: [kat] ++
56,960,738 UART: [kat] sha1
56,972,713 UART: [kat] SHA2-256
56,975,721 UART: [kat] SHA2-384
56,981,233 UART: [kat] SHA2-512-ACC
56,983,818 UART: [kat] ECC-384
59,423,838 UART: [kat] HMAC-384Kdf
59,436,762 UART: [kat] LMS
59,968,367 UART: [kat] --
59,971,613 UART: [update-reset] ++
63,425,027 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,428,572 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
64,035,149 >>> mbox cmd response: success
64,036,251 UART: [update-reset] Copying MAN_2 To MAN_1
64,073,780 UART: [update-reset Success] --
64,079,106 UART: [state] Locking Datavault
64,082,856 UART: [state] Locking PCR0, PCR1 and PCR31
64,085,057 UART: [state] Locking ICCM
64,086,822 UART: [exit] Launching FMC @ 0x40000130
64,095,468 UART:
64,095,722 UART: Running Caliptra FMC ...
64,096,774 UART:
64,096,928 UART: [state] CFI Enabled
64,141,597 UART: [art] Extend RT PCRs Done
64,142,741 UART: [art] Lock RT PCRs Done
64,144,249 UART: [art] Populate DV Done
64,149,761 UART: [fht] FMC Alias Private Key: 7
64,151,352 UART: [art] Derive CDI
64,152,164 UART: [art] Store in in slot 0x4
64,194,674 UART: [art] Derive Key Pair
64,195,716 UART: [art] Store priv key in slot 0x5
66,622,610 UART: [art] Derive Key Pair - Done
66,635,395 UART: [art] Signing Cert with AUTHO
66,636,697 UART: RITY.KEYID = 7
68,342,386 UART: [art] Erasing AUTHORITY.KEYID = 7
68,343,891 UART: [art] PUB.X = F98CEA78E4C384AF3975B9DFB1BC95AFF64F0B2157933EE3C17EAE221053A09027F2482A5DA105D75A62D7297880D644
68,351,138 UART: [art] PUB.Y = 2D3E32166DE281D70AD7CA10F749E469F1E77F707FA3E71693A275B8F90E5BB5FA74983BE5714FFCBDCC072F8F1F73BC
68,358,442 UART: [art] SIG.R = 1606AEFBDE05180D6997D152D31DBA81D804EE15B80E14FB4B93346F4003BAAB95CE61DC91B73DAAAA3531921D6D310D
68,365,833 UART: [art] SIG.S = 39C7AD12C76D592C6D46A7D5A2410F3AD651916C24D06D91C5B0F0281E424D92000B284E3AE720B3660C23D9047965E3
69,344,650 UART: Caliptra RT
69,345,336 UART: [state] CFI Enabled
69,631,379 UART: [rt] RT listening for mailbox commands...
69,633,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,662,767 UART: [rt]cmd =0x494e464f, len=4
69,666,985 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,746 writing to cptra_bootfsm_go
3,760,460 ready_for_fw is high
3,760,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,199 >>> mbox cmd response: success
14,952,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,204,134 UART:
19,204,547 UART: Running Caliptra FMC ...
19,205,655 UART:
19,205,810 UART: [state] CFI Enabled
19,213,780 UART: [fht] FMC Alias Private Key: 7
20,970,600 UART: [art] Extend RT PCRs Done
20,971,839 UART: [art] Lock RT PCRs Done
20,973,385 UART: [art] Populate DV Done
20,978,710 UART: [fht] FMC Alias Private Key: 7
20,980,416 UART: [art] Derive CDI
20,981,231 UART: [art] Store in in slot 0x4
21,024,099 UART: [art] Derive Key Pair
21,025,125 UART: [art] Store priv key in slot 0x5
23,451,903 UART: [art] Derive Key Pair - Done
23,464,899 UART: [art] Signing Cert with AUTHO
23,466,207 UART: RITY.KEYID = 7
25,171,574 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,083 UART: [art] PUB.X = 669F0B43F25D392D5DEE32D25437A67270507F73E3BCC4BA12B6D36CBA8D4DC60BC5FEDB370F9340B719DCC519659EE5
25,180,328 UART: [art] PUB.Y = 58CFEB6696DC582C0ECB9581136B8016FBE6DC042F64577CF9DF5FD9786C55EC84184F86162EFAB12876C2E6F84B9BB4
25,187,620 UART: [art] SIG.R = 148405C481B9E25C0A335771D9C65255C64CF90F805A57CE453A33C1A7DBC94E666735041511BD43C333448C9D09FD28
25,195,005 UART: [art] SIG.S = 018A70AAF35946375209D1368EAC2CCD01A43C3EE5A3A8175566574AF0A095B335BBC72BE6C4085083CC386E56DAA4F1
26,173,209 UART: Caliptra RT
26,173,919 UART: [state] CFI Enabled
26,291,087 UART: [rt] RT listening for mailbox commands...
26,322,493 UART: [rt]cmd =0x494e464f, len=4
26,326,857 >>> mbox cmd response data (312 bytes)
28,384,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
36,110,370 >>> mbox cmd response: success
36,143,559 UART:
36,143,867 UART: Running Caliptra FMC ...
36,144,990 UART:
36,145,167 UART: [state] CFI Enabled
36,189,307 UART: [art] Extend RT PCRs Done
36,190,491 UART: [art] Lock RT PCRs Done
36,191,801 UART: [art] Populate DV Done
36,197,049 UART: [fht] FMC Alias Private Key: 7
36,198,773 UART: [art] Derive CDI
36,199,591 UART: [art] Store in in slot 0x4
36,241,702 UART: [art] Derive Key Pair
36,242,772 UART: [art] Store priv key in slot 0x5
38,669,286 UART: [art] Derive Key Pair - Done
38,682,013 UART: [art] Signing Cert with AUTHO
38,683,311 UART: RITY.KEYID = 7
40,388,562 UART: [art] Erasing AUTHORITY.KEYID = 7
40,390,067 UART: [art] PUB.X = 7BBEE5ABD2F469C6BE7AFBC039D87649597A6257A9B66A970FFE61709B2FBBFB14552177B8F6F53CA07CD0E78F2724F5
40,397,313 UART: [art] PUB.Y = EA2B1B5D5ABF039981403210D367D9B7EE125FC5989576E25928DFFC295AD3DD48BE6A0CC84548F6A66493601CC91D75
40,404,594 UART: [art] SIG.R = 305F37E688B06E47FFE4E3FA5D4175D3D0D9AABD3625CE8F58001B1C9365A4BD1C3E3EA974CDC6595DF9FE560BF18463
40,411,997 UART: [art] SIG.S = 91C2AB5FFE8320C05C60C7643F8E98C3809EF56365A25F6698BE3B8C2C1F3FE7B2CE4A88962A2CD44BD6FD7E2BFAE9E6
41,390,443 UART: Caliptra RT
41,391,141 UART: [state] CFI Enabled
41,681,298 UART: [rt] RT listening for mailbox commands...
41,683,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,712,899 UART: [rt]cmd =0x494e464f, len=4
41,717,071 >>> mbox cmd response data (312 bytes)
43,770,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
51,501,201 >>> mbox cmd response: success
51,536,472 UART:
51,536,808 UART: Running Caliptra FMC ...
51,537,857 UART:
51,538,009 UART: [state] CFI Enabled
51,582,636 UART: [art] Extend RT PCRs Done
51,583,787 UART: [art] Lock RT PCRs Done
51,585,429 UART: [art] Populate DV Done
51,590,958 UART: [fht] FMC Alias Private Key: 7
51,592,532 UART: [art] Derive CDI
51,593,288 UART: [art] Store in in slot 0x4
51,635,791 UART: [art] Derive Key Pair
51,636,800 UART: [art] Store priv key in slot 0x5
54,063,461 UART: [art] Derive Key Pair - Done
54,076,304 UART: [art] Signing Cert with AUTHO
54,077,644 UART: RITY.KEYID = 7
55,783,049 UART: [art] Erasing AUTHORITY.KEYID = 7
55,784,560 UART: [art] PUB.X = 92D0A644CBCAE176679AEDB06433D864C0BED1B4494CC16E2BD864C7B3F6B0371D2BACE5693694E925FFE0E9742D40A9
55,791,807 UART: [art] PUB.Y = D51109A3206D40A3CA23D045F39DCCE0D19E201CECE61D3BEA67169E7B2CA3BEDA59CAB79E0F21B02A9ABB699629A117
55,799,094 UART: [art] SIG.R = 3100106B36B2D2F251408CB77472605B517309E768765A5AAE641DD8767C9E698B53AA8F269BF9B538297EC0078DBE7E
55,806,441 UART: [art] SIG.S = A19B4BC8289A779B9DCD8F3DAEF0C7F8D6C8808E19504282B6CA914491F0AF96EA3E6A6852D67FD2321DC32DA47BE335
56,785,515 UART: Caliptra RT
56,786,201 UART: [state] CFI Enabled
57,080,016 UART: [rt] RT listening for mailbox commands...
57,081,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,111,596 UART: [rt]cmd =0x494e464f, len=4
57,115,931 >>> mbox cmd response data (312 bytes)
57,117,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
64,847,576 >>> mbox cmd response: success
64,883,844 UART:
64,884,145 UART: Running Caliptra FMC ...
64,885,267 UART:
64,885,433 UART: [state] CFI Enabled
64,928,806 UART: [art] Extend RT PCRs Done
64,929,949 UART: [art] Lock RT PCRs Done
64,931,242 UART: [art] Populate DV Done
64,936,647 UART: [fht] FMC Alias Private Key: 7
64,938,182 UART: [art] Derive CDI
64,938,992 UART: [art] Store in in slot 0x4
64,981,638 UART: [art] Derive Key Pair
64,982,674 UART: [art] Store priv key in slot 0x5
67,409,496 UART: [art] Derive Key Pair - Done
67,422,422 UART: [art] Signing Cert with AUTHO
67,423,729 UART: RITY.KEYID = 7
69,129,361 UART: [art] Erasing AUTHORITY.KEYID = 7
69,130,880 UART: [art] PUB.X = 7BBEE5ABD2F469C6BE7AFBC039D87649597A6257A9B66A970FFE61709B2FBBFB14552177B8F6F53CA07CD0E78F2724F5
69,138,178 UART: [art] PUB.Y = EA2B1B5D5ABF039981403210D367D9B7EE125FC5989576E25928DFFC295AD3DD48BE6A0CC84548F6A66493601CC91D75
69,145,408 UART: [art] SIG.R = 305F37E688B06E47FFE4E3FA5D4175D3D0D9AABD3625CE8F58001B1C9365A4BD1C3E3EA974CDC6595DF9FE560BF18463
69,152,796 UART: [art] SIG.S = 91C2AB5FFE8320C05C60C7643F8E98C3809EF56365A25F6698BE3B8C2C1F3FE7B2CE4A88962A2CD44BD6FD7E2BFAE9E6
70,131,611 UART: Caliptra RT
70,132,330 UART: [state] CFI Enabled
70,422,379 UART: [rt] RT listening for mailbox commands...
70,424,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,453,868 UART: [rt]cmd =0x494e464f, len=4
70,458,150 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.64s
Truncated 2120 bytes from beginning
,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,242 UART: [ldev] --
1,586,737 UART: [fwproc] Waiting for Commands...
1,587,376 UART: [fwproc] Received command 0x46574c44
1,588,167 UART: [fwproc] Received Image of size 114168 bytes
2,884,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,024 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,376 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,009 >>> mbox cmd response: success
3,077,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,078,219 UART: [afmc] ++
3,078,387 UART: [afmc] CDI.KEYID = 6
3,078,749 UART: [afmc] SUBJECT.KEYID = 7
3,079,174 UART: [afmc] AUTHORITY.KEYID = 5
3,114,558 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,842 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,622 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,137,314 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,143,187 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,148,901 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,156,850 UART: [afmc] --
3,157,908 UART: [cold-reset] --
3,159,002 UART: [state] Locking Datavault
3,160,057 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,661 UART: [state] Locking ICCM
3,161,203 UART: [exit] Launching FMC @ 0x40000130
3,166,532 UART:
3,166,548 UART: Running Caliptra FMC ...
3,166,956 UART:
3,167,010 UART: [state] CFI Enabled
3,177,434 UART: [fht] FMC Alias Private Key: 7
3,285,551 UART: [art] Extend RT PCRs Done
3,285,979 UART: [art] Lock RT PCRs Done
3,287,503 UART: [art] Populate DV Done
3,295,511 UART: [fht] FMC Alias Private Key: 7
3,296,469 UART: [art] Derive CDI
3,296,749 UART: [art] Store in in slot 0x4
3,382,432 UART: [art] Derive Key Pair
3,382,792 UART: [art] Store priv key in slot 0x5
3,396,416 UART: [art] Derive Key Pair - Done
3,411,053 UART: [art] Signing Cert with AUTHO
3,411,533 UART: RITY.KEYID = 7
3,426,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,438 UART: [art] PUB.X = F9507C4D547577D6DD6B5CACCFAF52AFAF7CE6F6034C81B784E8D231956C81835DE634F38395A3688B379E28B3EFD451
3,434,215 UART: [art] PUB.Y = F1B45AAC11DA47E5FDCDB5ED8B43D52CB05E1A1D3667CFA9C5CA55863E239C56D91525C11669E35ADFEDC3E394CAF0D8
3,441,191 UART: [art] SIG.R = FDBD7A42686862DDBFDC59B002EBEB21BF1C8339B683FA9EA5F5632D267DDC11FC55A02FD34C070F9F2B62694D9E8F6E
3,447,974 UART: [art] SIG.S = 74FFA395DC4688B093BE7B37DD609E76CB4EF133CD18E4B79A9D79FD270B07307C97E60928FBC70C7316F32B236641F4
3,471,433 UART: Caliptra RT
3,471,686 UART: [state] CFI Enabled
3,578,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,577 UART: [rt]cmd =0x494e464f, len=4
3,613,116 >>> mbox cmd response data (312 bytes)
3,613,117 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,889 UART:
3,613,905 UART: Running Caliptra ROM ...
3,614,313 UART:
3,614,367 UART: [state] CFI Enabled
3,617,287 UART: [state] LifecycleState = Unprovisioned
3,617,942 UART: [state] DebugLocked = No
3,618,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,620,285 UART: [kat] SHA2-256
4,414,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,418,331 UART: [kat] ++
4,418,483 UART: [kat] sha1
4,422,859 UART: [kat] SHA2-256
4,424,797 UART: [kat] SHA2-384
4,427,674 UART: [kat] SHA2-512-ACC
4,429,574 UART: [kat] ECC-384
4,435,159 UART: [kat] HMAC-384Kdf
4,439,551 UART: [kat] LMS
5,007,747 UART: [kat] --
5,008,686 UART: [update-reset] ++
6,340,605 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,341,865 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,491,495 >>> mbox cmd response: success
6,491,768 UART: [update-reset] Copying MAN_2 To MAN_1
6,499,782 UART: [update-reset Success] --
6,500,997 UART: [state] Locking Datavault
6,501,813 UART: [state] Locking PCR0, PCR1 and PCR31
6,502,417 UART: [state] Locking ICCM
6,502,905 UART: [exit] Launching FMC @ 0x40000130
6,508,234 UART:
6,508,250 UART: Running Caliptra FMC ...
6,508,658 UART:
6,508,712 UART: [state] CFI Enabled
6,597,701 UART: [art] Extend RT PCRs Done
6,598,129 UART: [art] Lock RT PCRs Done
6,599,398 UART: [art] Populate DV Done
6,607,538 UART: [fht] FMC Alias Private Key: 7
6,608,500 UART: [art] Derive CDI
6,608,780 UART: [art] Store in in slot 0x4
6,694,083 UART: [art] Derive Key Pair
6,694,443 UART: [art] Store priv key in slot 0x5
6,708,129 UART: [art] Derive Key Pair - Done
6,722,654 UART: [art] Signing Cert with AUTHO
6,723,134 UART: RITY.KEYID = 7
6,738,426 UART: [art] Erasing AUTHORITY.KEYID = 7
6,739,191 UART: [art] PUB.X = 2C0559F7B2C2426D8CE2E604B5585942DE5F54B4D131A31A5EBD9329F81F681C03F35B6AB0A0C0AF7DA2DBB789612B29
6,745,962 UART: [art] PUB.Y = 74B4AE49AF4DC3E25DAC502829B19A4787BDFC48F7AB61BD8C7B4A2B7EDB60C20E33636A376116706EDA79294E29B9BD
6,752,925 UART: [art] SIG.R = C07E715461EA3AD9B64EA62620F4A65E28750015E1C11C948C0E10D95760FE7AD568D667A6C1A8E14DDAA0AFB9693FB9
6,759,680 UART: [art] SIG.S = 711DC9D1F429D526D460B502FB36F006A1D63B2C5060558BF667B4E6D5233C7374E7349715BEA2B59884DAA402ADF3F6
6,783,246 UART: Caliptra RT
6,783,499 UART: [state] CFI Enabled
7,066,726 UART: [rt] RT listening for mailbox commands...
7,067,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,096,795 UART: [rt]cmd =0x494e464f, len=4
7,100,612 >>> mbox cmd response data (312 bytes)
7,100,613 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,101,397 UART:
7,101,413 UART: Running Caliptra ROM ...
7,101,821 UART:
7,101,875 UART: [state] CFI Enabled
7,104,635 UART: [state] LifecycleState = Unprovisioned
7,105,290 UART: [state] DebugLocked = No
7,105,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,107,419 UART: [kat] SHA2-256
7,901,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,905,465 UART: [kat] ++
7,905,617 UART: [kat] sha1
7,909,937 UART: [kat] SHA2-256
7,911,875 UART: [kat] SHA2-384
7,914,456 UART: [kat] SHA2-512-ACC
7,916,356 UART: [kat] ECC-384
7,922,153 UART: [kat] HMAC-384Kdf
7,926,655 UART: [kat] LMS
8,494,851 UART: [kat] --
8,495,884 UART: [update-reset] ++
9,827,251 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,828,315 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
9,977,945 >>> mbox cmd response: success
9,978,086 UART: [update-reset] Copying MAN_2 To MAN_1
9,986,100 UART: [update-reset Success] --
9,987,145 UART: [state] Locking Datavault
9,987,943 UART: [state] Locking PCR0, PCR1 and PCR31
9,988,547 UART: [state] Locking ICCM
9,989,079 UART: [exit] Launching FMC @ 0x40000130
9,994,408 UART:
9,994,424 UART: Running Caliptra FMC ...
9,994,832 UART:
9,994,886 UART: [state] CFI Enabled
10,083,595 UART: [art] Extend RT PCRs Done
10,084,023 UART: [art] Lock RT PCRs Done
10,085,358 UART: [art] Populate DV Done
10,093,798 UART: [fht] FMC Alias Private Key: 7
10,094,832 UART: [art] Derive CDI
10,095,112 UART: [art] Store in in slot 0x4
10,180,363 UART: [art] Derive Key Pair
10,180,723 UART: [art] Store priv key in slot 0x5
10,193,517 UART: [art] Derive Key Pair - Done
10,208,702 UART: [art] Signing Cert with AUTHO
10,209,182 UART: RITY.KEYID = 7
10,224,048 UART: [art] Erasing AUTHORITY.KEYID = 7
10,224,813 UART: [art] PUB.X = 7D6D5E7C9FD8A5F3965D768FD5C4633F1CC79A766212F3948017543323969A4ABA06BDB92192E58DB54969E7574E31A1
10,231,578 UART: [art] PUB.Y = FF695ADDD6CCEA46D898EF30E6C339030E0A02CB8303CAD5A0C50F6CA0937325D9FEB9F8B49F842C3DFD076FFEDB3999
10,238,531 UART: [art] SIG.R = D895D6F6274B358322233B7ABFD391CD98B32DDBB460C35499FF57EBB3D61BC6B1496870446D1A57DA7BB67A8CB6E3D1
10,245,313 UART: [art] SIG.S = 844081C7E9593F3C72C0EA9D816D7BA556EE00FBA5B25A9C8D807042C28ED71DE540A3C7577588FB01869CD13F187B30
10,269,173 UART: Caliptra RT
10,269,426 UART: [state] CFI Enabled
10,549,290 UART: [rt] RT listening for mailbox commands...
10,549,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,579,465 UART: [rt]cmd =0x494e464f, len=4
10,583,042 >>> mbox cmd response data (312 bytes)
10,583,043 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,583,921 UART:
10,583,937 UART: Running Caliptra ROM ...
10,584,345 UART:
10,584,399 UART: [state] CFI Enabled
10,586,665 UART: [state] LifecycleState = Unprovisioned
10,587,320 UART: [state] DebugLocked = No
10,588,050 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,589,771 UART: [kat] SHA2-256
11,383,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,387,817 UART: [kat] ++
11,387,969 UART: [kat] sha1
11,392,087 UART: [kat] SHA2-256
11,394,025 UART: [kat] SHA2-384
11,396,594 UART: [kat] SHA2-512-ACC
11,398,494 UART: [kat] ECC-384
11,404,517 UART: [kat] HMAC-384Kdf
11,409,173 UART: [kat] LMS
11,977,369 UART: [kat] --
11,978,074 UART: [update-reset] ++
13,310,645 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,311,817 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
13,461,447 >>> mbox cmd response: success
13,461,784 UART: [update-reset] Copying MAN_2 To MAN_1
13,469,798 UART: [update-reset Success] --
13,470,931 UART: [state] Locking Datavault
13,471,563 UART: [state] Locking PCR0, PCR1 and PCR31
13,472,167 UART: [state] Locking ICCM
13,472,691 UART: [exit] Launching FMC @ 0x40000130
13,478,020 UART:
13,478,036 UART: Running Caliptra FMC ...
13,478,444 UART:
13,478,498 UART: [state] CFI Enabled
13,567,817 UART: [art] Extend RT PCRs Done
13,568,245 UART: [art] Lock RT PCRs Done
13,569,402 UART: [art] Populate DV Done
13,577,900 UART: [fht] FMC Alias Private Key: 7
13,578,934 UART: [art] Derive CDI
13,579,214 UART: [art] Store in in slot 0x4
13,664,685 UART: [art] Derive Key Pair
13,665,045 UART: [art] Store priv key in slot 0x5
13,678,017 UART: [art] Derive Key Pair - Done
13,693,202 UART: [art] Signing Cert with AUTHO
13,693,682 UART: RITY.KEYID = 7
13,708,998 UART: [art] Erasing AUTHORITY.KEYID = 7
13,709,763 UART: [art] PUB.X = 2C0559F7B2C2426D8CE2E604B5585942DE5F54B4D131A31A5EBD9329F81F681C03F35B6AB0A0C0AF7DA2DBB789612B29
13,716,534 UART: [art] PUB.Y = 74B4AE49AF4DC3E25DAC502829B19A4787BDFC48F7AB61BD8C7B4A2B7EDB60C20E33636A376116706EDA79294E29B9BD
13,723,497 UART: [art] SIG.R = C07E715461EA3AD9B64EA62620F4A65E28750015E1C11C948C0E10D95760FE7AD568D667A6C1A8E14DDAA0AFB9693FB9
13,730,252 UART: [art] SIG.S = 711DC9D1F429D526D460B502FB36F006A1D63B2C5060558BF667B4E6D5233C7374E7349715BEA2B59884DAA402ADF3F6
13,754,260 UART: Caliptra RT
13,754,513 UART: [state] CFI Enabled
14,033,380 UART: [rt] RT listening for mailbox commands...
14,034,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,063,515 UART: [rt]cmd =0x494e464f, len=4
14,067,094 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 4.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,403 ready_for_fw is high
1,362,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,147 >>> mbox cmd response: success
2,927,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,988,680 UART:
2,988,696 UART: Running Caliptra FMC ...
2,989,104 UART:
2,989,158 UART: [state] CFI Enabled
2,999,742 UART: [fht] FMC Alias Private Key: 7
3,107,411 UART: [art] Extend RT PCRs Done
3,107,839 UART: [art] Lock RT PCRs Done
3,109,739 UART: [art] Populate DV Done
3,117,927 UART: [fht] FMC Alias Private Key: 7
3,118,965 UART: [art] Derive CDI
3,119,245 UART: [art] Store in in slot 0x4
3,205,066 UART: [art] Derive Key Pair
3,205,426 UART: [art] Store priv key in slot 0x5
3,218,502 UART: [art] Derive Key Pair - Done
3,232,997 UART: [art] Signing Cert with AUTHO
3,233,477 UART: RITY.KEYID = 7
3,248,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,574 UART: [art] PUB.X = 9135D76BC8A8D41466B064A7E11B5FC816F692420ABC835A4C8CA432058003C673850B8A964364FBA38868DA7C1A51DA
3,256,332 UART: [art] PUB.Y = 864E78672FD0EEEBB5388E2FBAF6B78E5B007204CB01A60A1BA565912DDCED5CAEB69C3EA62E2467C584B38D36CE116F
3,263,271 UART: [art] SIG.R = B87A1C95FEE714D59332DF381FB5D17EE1AC54340777461063AADC6857753E7D19049B1B72BBCFC8BB2624B298B4BFA4
3,270,045 UART: [art] SIG.S = C246654534A7455B85003B8D750CA22ACE77580BA3DCF3CB3E902DCA459A54E3DD1B9C60925F6EB1169AA56BE1117CEF
3,294,422 UART: Caliptra RT
3,294,675 UART: [state] CFI Enabled
3,402,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,811 UART: [rt]cmd =0x494e464f, len=4
3,436,486 >>> mbox cmd response data (312 bytes)
3,436,487 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,196,495 >>> mbox cmd response: success
6,210,024 UART:
6,210,040 UART: Running Caliptra FMC ...
6,210,448 UART:
6,210,502 UART: [state] CFI Enabled
6,298,983 UART: [art] Extend RT PCRs Done
6,299,411 UART: [art] Lock RT PCRs Done
6,300,502 UART: [art] Populate DV Done
6,308,670 UART: [fht] FMC Alias Private Key: 7
6,309,850 UART: [art] Derive CDI
6,310,130 UART: [art] Store in in slot 0x4
6,396,091 UART: [art] Derive Key Pair
6,396,451 UART: [art] Store priv key in slot 0x5
6,410,051 UART: [art] Derive Key Pair - Done
6,424,877 UART: [art] Signing Cert with AUTHO
6,425,357 UART: RITY.KEYID = 7
6,440,559 UART: [art] Erasing AUTHORITY.KEYID = 7
6,441,324 UART: [art] PUB.X = 20368149AD17483A96382F49355D30367150F1A48E303197B512D33E1218ECC126BF092C2AA4375CCBC6DE474D1BE59B
6,448,087 UART: [art] PUB.Y = E72BA727106609F0EC9C4E29542AD9D2B01C0E1E78FF2ED08C31BABB7044BD4B735FE0ED6287BA2D66B63CC4096C1C24
6,455,044 UART: [art] SIG.R = 354C4B21F24DDAB3E83A51145AF35953B85BFA9C1C51BA6C23108D4F2145E6A5546E2FC7C03BADFA13233E929181EA90
6,461,824 UART: [art] SIG.S = B6D5116545DEFD23E3DE74741B933133E4C7DE7BC4090A8DF49A54BFEE7A4E384EA0E21A6701AFB7B02BF0A8494B338A
6,485,648 UART: Caliptra RT
6,485,901 UART: [state] CFI Enabled
6,767,864 UART: [rt] RT listening for mailbox commands...
6,768,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,798,009 UART: [rt]cmd =0x494e464f, len=4
6,801,622 >>> mbox cmd response data (312 bytes)
6,801,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,561,131 >>> mbox cmd response: success
9,574,686 UART:
9,574,702 UART: Running Caliptra FMC ...
9,575,110 UART:
9,575,164 UART: [state] CFI Enabled
9,663,301 UART: [art] Extend RT PCRs Done
9,663,729 UART: [art] Lock RT PCRs Done
9,665,228 UART: [art] Populate DV Done
9,673,388 UART: [fht] FMC Alias Private Key: 7
9,674,390 UART: [art] Derive CDI
9,674,670 UART: [art] Store in in slot 0x4
9,760,635 UART: [art] Derive Key Pair
9,760,995 UART: [art] Store priv key in slot 0x5
9,773,883 UART: [art] Derive Key Pair - Done
9,788,649 UART: [art] Signing Cert with AUTHO
9,789,129 UART: RITY.KEYID = 7
9,804,459 UART: [art] Erasing AUTHORITY.KEYID = 7
9,805,224 UART: [art] PUB.X = D76473C500737097E47199C6500C652B8A1DD8139B37D87222987B596CABDC3B29C5C17F52DC389D70CBB01DE0278BFC
9,811,971 UART: [art] PUB.Y = 6B54E4556EA96E915E8B0E0EDF5EBBC77224A1ED88EF2007FA7B89FD998846FC2423B12F094860F66456ABDE46F09069
9,818,917 UART: [art] SIG.R = 99C9749A65D9B2C8F94E0A0F41991C9E43023E9C900A81F95A57F2C8F4BDB699F0C1D5AAFF3B2B1F62F54A695D4C9A0F
9,825,686 UART: [art] SIG.S = 9292132BD59849A2476B2F962FC1D75A4F51F0B84531B1DA06E96AAB732E8412DB58A708F27088E08267806324F7056F
9,849,076 UART: Caliptra RT
9,849,329 UART: [state] CFI Enabled
10,129,549 UART: [rt] RT listening for mailbox commands...
10,130,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,159,716 UART: [rt]cmd =0x494e464f, len=4
10,163,295 >>> mbox cmd response data (312 bytes)
10,163,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,922,424 >>> mbox cmd response: success
12,935,713 UART:
12,935,729 UART: Running Caliptra FMC ...
12,936,137 UART:
12,936,191 UART: [state] CFI Enabled
13,024,928 UART: [art] Extend RT PCRs Done
13,025,356 UART: [art] Lock RT PCRs Done
13,026,613 UART: [art] Populate DV Done
13,034,475 UART: [fht] FMC Alias Private Key: 7
13,035,425 UART: [art] Derive CDI
13,035,705 UART: [art] Store in in slot 0x4
13,120,940 UART: [art] Derive Key Pair
13,121,300 UART: [art] Store priv key in slot 0x5
13,135,036 UART: [art] Derive Key Pair - Done
13,149,594 UART: [art] Signing Cert with AUTHO
13,150,074 UART: RITY.KEYID = 7
13,165,222 UART: [art] Erasing AUTHORITY.KEYID = 7
13,165,987 UART: [art] PUB.X = 20368149AD17483A96382F49355D30367150F1A48E303197B512D33E1218ECC126BF092C2AA4375CCBC6DE474D1BE59B
13,172,750 UART: [art] PUB.Y = E72BA727106609F0EC9C4E29542AD9D2B01C0E1E78FF2ED08C31BABB7044BD4B735FE0ED6287BA2D66B63CC4096C1C24
13,179,707 UART: [art] SIG.R = 354C4B21F24DDAB3E83A51145AF35953B85BFA9C1C51BA6C23108D4F2145E6A5546E2FC7C03BADFA13233E929181EA90
13,186,487 UART: [art] SIG.S = B6D5116545DEFD23E3DE74741B933133E4C7DE7BC4090A8DF49A54BFEE7A4E384EA0E21A6701AFB7B02BF0A8494B338A
13,210,275 UART: Caliptra RT
13,210,528 UART: [state] CFI Enabled
13,499,613 UART: [rt] RT listening for mailbox commands...
13,500,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,529,820 UART: [rt]cmd =0x494e464f, len=4
13,533,421 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.90s
Truncated 2120 bytes from beginning
,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,175 UART: [ldev] --
1,585,654 UART: [fwproc] Waiting for Commands...
1,586,367 UART: [fwproc] Received command 0x46574c44
1,587,158 UART: [fwproc] Received Image of size 114168 bytes
2,882,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,761 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,113 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,073,774 >>> mbox cmd response: success
3,073,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,074,790 UART: [afmc] ++
3,074,958 UART: [afmc] CDI.KEYID = 6
3,075,320 UART: [afmc] SUBJECT.KEYID = 7
3,075,745 UART: [afmc] AUTHORITY.KEYID = 5
3,110,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,021 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,801 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
3,133,493 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
3,139,366 UART: [afmc] SIG.R = 8F0A6885272083A6E8E8B8B95CD9E8F58F40896BA19AC0C6F7B194F4AEFDD2164CF5C4AB04A9FB1E996A4FAB4830A260
3,145,080 UART: [afmc] SIG.S = 60CE1CF9B19E3C4AC1AC951A7ABB78ECED5C30414CE58401BDA2F4C1F7C3BA9F88BA7370001A855F932D7F374DB30C1E
3,152,979 UART: [afmc] --
3,154,013 UART: [cold-reset] --
3,154,791 UART: [state] Locking Datavault
3,156,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,712 UART: [state] Locking ICCM
3,157,144 UART: [exit] Launching FMC @ 0x40000130
3,162,473 UART:
3,162,489 UART: Running Caliptra FMC ...
3,162,897 UART:
3,163,040 UART: [state] CFI Enabled
3,173,876 UART: [fht] FMC Alias Private Key: 7
3,281,237 UART: [art] Extend RT PCRs Done
3,281,665 UART: [art] Lock RT PCRs Done
3,283,093 UART: [art] Populate DV Done
3,291,153 UART: [fht] FMC Alias Private Key: 7
3,292,121 UART: [art] Derive CDI
3,292,401 UART: [art] Store in in slot 0x4
3,378,508 UART: [art] Derive Key Pair
3,378,868 UART: [art] Store priv key in slot 0x5
3,392,212 UART: [art] Derive Key Pair - Done
3,407,087 UART: [art] Signing Cert with AUTHO
3,407,567 UART: RITY.KEYID = 7
3,422,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,072 UART: [art] PUB.X = 3DDE55A8087D927C37986E7863F114977309BF4F03B425A227E7C9863AAAF72FA57B0B9EB1825013BA61D972E6C6D6CB
3,429,834 UART: [art] PUB.Y = 7DFE4ACB8901D09791181AA9B5654E08F5B93BDC02A46244A77210E5AEB4928DF213736EB3FE2B1F379D96D2BAE74844
3,436,783 UART: [art] SIG.R = C4E6B831E2073BCC18AEB3C9B067DB816C2ED96E732FDCF058843ABBB5AC7B3FF737044749B342C47CF15DF56EE83CB1
3,443,567 UART: [art] SIG.S = 6669B968EA11E7F90A8D96D3F62A12726CE33D079FEB0921C763CB3D1FB59EFD4826123BC700BBC98121E19020FF2496
3,467,859 UART: Caliptra RT
3,468,204 UART: [state] CFI Enabled
3,576,653 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,259 UART: [rt]cmd =0x494e464f, len=4
3,611,196 >>> mbox cmd response data (312 bytes)
3,611,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,845 UART:
3,611,861 UART: Running Caliptra ROM ...
3,612,269 UART:
3,612,410 UART: [state] CFI Enabled
3,615,608 UART: [state] LifecycleState = Unprovisioned
3,616,263 UART: [state] DebugLocked = No
3,616,893 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,618,410 UART: [kat] SHA2-256
4,412,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,416,456 UART: [kat] ++
4,416,608 UART: [kat] sha1
4,421,058 UART: [kat] SHA2-256
4,422,996 UART: [kat] SHA2-384
4,425,555 UART: [kat] SHA2-512-ACC
4,427,455 UART: [kat] ECC-384
4,433,140 UART: [kat] HMAC-384Kdf
4,437,884 UART: [kat] LMS
5,006,080 UART: [kat] --
5,007,129 UART: [update-reset] ++
6,340,770 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,341,878 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,491,508 >>> mbox cmd response: success
6,491,789 UART: [update-reset] Copying MAN_2 To MAN_1
6,499,803 UART: [update-reset Success] --
6,500,982 UART: [state] Locking Datavault
6,501,832 UART: [state] Locking PCR0, PCR1 and PCR31
6,502,436 UART: [state] Locking ICCM
6,503,110 UART: [exit] Launching FMC @ 0x40000130
6,508,439 UART:
6,508,455 UART: Running Caliptra FMC ...
6,508,863 UART:
6,509,006 UART: [state] CFI Enabled
6,597,985 UART: [art] Extend RT PCRs Done
6,598,413 UART: [art] Lock RT PCRs Done
6,599,844 UART: [art] Populate DV Done
6,607,954 UART: [fht] FMC Alias Private Key: 7
6,608,924 UART: [art] Derive CDI
6,609,204 UART: [art] Store in in slot 0x4
6,694,653 UART: [art] Derive Key Pair
6,695,013 UART: [art] Store priv key in slot 0x5
6,709,119 UART: [art] Derive Key Pair - Done
6,723,922 UART: [art] Signing Cert with AUTHO
6,724,402 UART: RITY.KEYID = 7
6,739,928 UART: [art] Erasing AUTHORITY.KEYID = 7
6,740,693 UART: [art] PUB.X = 32C053EC8D9B91BE54B9C088021A52FE49EB8C7E03199E9C22485065A71A0F54241303AF587E01143F483964D8F055C9
6,747,442 UART: [art] PUB.Y = 18254760029BDA4403FB87C3CEBC5C272A7745FA0A9D8E688B5AD630C739E7CAEFAEF3C3754EA91F4EFA8E87C46E2FAD
6,754,405 UART: [art] SIG.R = A14C2F8266705B9DC0FDED1C9CF9D8B8905DEC2EAD762B18A2009D49491BE28A085E1D550FDF8A4872ACEAF312094530
6,761,158 UART: [art] SIG.S = 721D72D5E603C3BC9BB3FA9431162D1A3A4DA19D8D08BA923450DF0A9BFAAF0943CF53CA439D163E0498EE583BCD0222
6,784,569 UART: Caliptra RT
6,784,914 UART: [state] CFI Enabled
7,068,771 UART: [rt] RT listening for mailbox commands...
7,069,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,099,078 UART: [rt]cmd =0x494e464f, len=4
7,102,963 >>> mbox cmd response data (312 bytes)
7,102,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,103,750 UART:
7,103,766 UART: Running Caliptra ROM ...
7,104,174 UART:
7,104,315 UART: [state] CFI Enabled
7,106,935 UART: [state] LifecycleState = Unprovisioned
7,107,590 UART: [state] DebugLocked = No
7,108,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,109,825 UART: [kat] SHA2-256
7,903,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,907,871 UART: [kat] ++
7,908,023 UART: [kat] sha1
7,912,191 UART: [kat] SHA2-256
7,914,129 UART: [kat] SHA2-384
7,916,812 UART: [kat] SHA2-512-ACC
7,918,712 UART: [kat] ECC-384
7,924,005 UART: [kat] HMAC-384Kdf
7,928,451 UART: [kat] LMS
8,496,647 UART: [kat] --
8,497,642 UART: [update-reset] ++
9,829,477 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,830,709 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
9,980,339 >>> mbox cmd response: success
9,980,506 UART: [update-reset] Copying MAN_2 To MAN_1
9,988,520 UART: [update-reset Success] --
9,989,307 UART: [state] Locking Datavault
9,989,929 UART: [state] Locking PCR0, PCR1 and PCR31
9,990,533 UART: [state] Locking ICCM
9,991,197 UART: [exit] Launching FMC @ 0x40000130
9,996,526 UART:
9,996,542 UART: Running Caliptra FMC ...
9,996,950 UART:
9,997,093 UART: [state] CFI Enabled
10,086,262 UART: [art] Extend RT PCRs Done
10,086,690 UART: [art] Lock RT PCRs Done
10,087,705 UART: [art] Populate DV Done
10,096,187 UART: [fht] FMC Alias Private Key: 7
10,097,253 UART: [art] Derive CDI
10,097,533 UART: [art] Store in in slot 0x4
10,183,150 UART: [art] Derive Key Pair
10,183,510 UART: [art] Store priv key in slot 0x5
10,197,258 UART: [art] Derive Key Pair - Done
10,211,771 UART: [art] Signing Cert with AUTHO
10,212,251 UART: RITY.KEYID = 7
10,227,231 UART: [art] Erasing AUTHORITY.KEYID = 7
10,227,996 UART: [art] PUB.X = 5136F5BC8E4FDBBB4F7C661D7002326E0F04094E117FFE532B31B638054FB4702400F5B80CA2E4ED2393F003ED8AFB47
10,234,731 UART: [art] PUB.Y = 739EF7B60B810A6731F6E9E5A6E313BBB0C50BB536AE386E48B8A600104C8F4DAA75EABA1BC6B62E80509442AFF39128
10,241,662 UART: [art] SIG.R = 58FE2A7DCA6A059DCFE9DEFE5FF4B27C127A7BAD18A3F00EB09755A3E87151A73EF396DD3A62B63BA97C200073C3FECB
10,248,430 UART: [art] SIG.S = F1F9B26B601FE824672BA8D91992BB4F71A45E87526B661EF05E5753255BDC177B133AEC24A70D807985B9E187C1D02E
10,271,680 UART: Caliptra RT
10,272,025 UART: [state] CFI Enabled
10,557,440 UART: [rt] RT listening for mailbox commands...
10,558,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,587,793 UART: [rt]cmd =0x494e464f, len=4
10,591,380 >>> mbox cmd response data (312 bytes)
10,591,381 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,592,141 UART:
10,592,157 UART: Running Caliptra ROM ...
10,592,565 UART:
10,592,706 UART: [state] CFI Enabled
10,595,520 UART: [state] LifecycleState = Unprovisioned
10,596,175 UART: [state] DebugLocked = No
10,596,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,598,270 UART: [kat] SHA2-256
11,392,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,396,316 UART: [kat] ++
11,396,468 UART: [kat] sha1
11,400,660 UART: [kat] SHA2-256
11,402,598 UART: [kat] SHA2-384
11,405,239 UART: [kat] SHA2-512-ACC
11,407,139 UART: [kat] ECC-384
11,412,872 UART: [kat] HMAC-384Kdf
11,417,398 UART: [kat] LMS
11,985,594 UART: [kat] --
11,986,423 UART: [update-reset] ++
13,318,732 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,319,888 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
13,469,518 >>> mbox cmd response: success
13,469,849 UART: [update-reset] Copying MAN_2 To MAN_1
13,477,863 UART: [update-reset Success] --
13,478,740 UART: [state] Locking Datavault
13,479,590 UART: [state] Locking PCR0, PCR1 and PCR31
13,480,194 UART: [state] Locking ICCM
13,480,704 UART: [exit] Launching FMC @ 0x40000130
13,486,033 UART:
13,486,049 UART: Running Caliptra FMC ...
13,486,457 UART:
13,486,600 UART: [state] CFI Enabled
13,575,257 UART: [art] Extend RT PCRs Done
13,575,685 UART: [art] Lock RT PCRs Done
13,576,806 UART: [art] Populate DV Done
13,584,944 UART: [fht] FMC Alias Private Key: 7
13,585,990 UART: [art] Derive CDI
13,586,270 UART: [art] Store in in slot 0x4
13,671,823 UART: [art] Derive Key Pair
13,672,183 UART: [art] Store priv key in slot 0x5
13,685,205 UART: [art] Derive Key Pair - Done
13,700,302 UART: [art] Signing Cert with AUTHO
13,700,782 UART: RITY.KEYID = 7
13,716,104 UART: [art] Erasing AUTHORITY.KEYID = 7
13,716,869 UART: [art] PUB.X = 32C053EC8D9B91BE54B9C088021A52FE49EB8C7E03199E9C22485065A71A0F54241303AF587E01143F483964D8F055C9
13,723,618 UART: [art] PUB.Y = 18254760029BDA4403FB87C3CEBC5C272A7745FA0A9D8E688B5AD630C739E7CAEFAEF3C3754EA91F4EFA8E87C46E2FAD
13,730,581 UART: [art] SIG.R = A14C2F8266705B9DC0FDED1C9CF9D8B8905DEC2EAD762B18A2009D49491BE28A085E1D550FDF8A4872ACEAF312094530
13,737,334 UART: [art] SIG.S = 721D72D5E603C3BC9BB3FA9431162D1A3A4DA19D8D08BA923450DF0A9BFAAF0943CF53CA439D163E0498EE583BCD0222
13,760,611 UART: Caliptra RT
13,760,956 UART: [state] CFI Enabled
14,041,753 UART: [rt] RT listening for mailbox commands...
14,042,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
14,071,844 UART: [rt]cmd =0x494e464f, len=4
14,075,361 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,440 ready_for_fw is high
1,363,440 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,164 >>> mbox cmd response: success
2,927,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,988,389 UART:
2,988,405 UART: Running Caliptra FMC ...
2,988,813 UART:
2,988,956 UART: [state] CFI Enabled
2,999,368 UART: [fht] FMC Alias Private Key: 7
3,108,017 UART: [art] Extend RT PCRs Done
3,108,445 UART: [art] Lock RT PCRs Done
3,109,779 UART: [art] Populate DV Done
3,118,167 UART: [fht] FMC Alias Private Key: 7
3,119,321 UART: [art] Derive CDI
3,119,601 UART: [art] Store in in slot 0x4
3,205,234 UART: [art] Derive Key Pair
3,205,594 UART: [art] Store priv key in slot 0x5
3,219,242 UART: [art] Derive Key Pair - Done
3,234,355 UART: [art] Signing Cert with AUTHO
3,234,835 UART: RITY.KEYID = 7
3,250,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,090 UART: [art] PUB.X = E0A3D1FB6BC5D80CB8A0644968125F73BBA6C62ECEAC034D389018739CDD1905AC9DFF8E975341A3B21BD59731326D55
3,257,861 UART: [art] PUB.Y = D4ED34E661A8B5E1D6DF8F2F3E5EA03AA0A705FE9A9226DA0DDD44B75E6D03C730230D8AB83FDA9EE59EAF7228516608
3,264,816 UART: [art] SIG.R = 4C5B0D27D976BF5AE3C52F9D38F81AD7ECAAC6B31EF88C7D5156305FA227DB79E49F1633F0920A7C38616B9E03E1ECDE
3,271,595 UART: [art] SIG.S = B86917CF4C5C713433CEF2BF4FFD99310B37ECB5778F7ADC98AD8620B4D74CA91EFA7C3A87401EA24A9C5F202308BCE9
3,295,030 UART: Caliptra RT
3,295,375 UART: [state] CFI Enabled
3,403,272 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,722 UART: [rt]cmd =0x494e464f, len=4
3,437,427 >>> mbox cmd response data (312 bytes)
3,437,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,199,033 >>> mbox cmd response: success
6,212,650 UART:
6,212,666 UART: Running Caliptra FMC ...
6,213,074 UART:
6,213,217 UART: [state] CFI Enabled
6,302,160 UART: [art] Extend RT PCRs Done
6,302,588 UART: [art] Lock RT PCRs Done
6,303,661 UART: [art] Populate DV Done
6,311,891 UART: [fht] FMC Alias Private Key: 7
6,313,021 UART: [art] Derive CDI
6,313,301 UART: [art] Store in in slot 0x4
6,398,966 UART: [art] Derive Key Pair
6,399,326 UART: [art] Store priv key in slot 0x5
6,412,304 UART: [art] Derive Key Pair - Done
6,426,620 UART: [art] Signing Cert with AUTHO
6,427,100 UART: RITY.KEYID = 7
6,442,468 UART: [art] Erasing AUTHORITY.KEYID = 7
6,443,233 UART: [art] PUB.X = F378D241A18D7F721DBC29E007820E104F1DE4B18E1FF1D1E0358BBD6F2ECBEB517D2FD7A08DF5A9A48456D96973C76E
6,450,013 UART: [art] PUB.Y = 487CB0790E4A94FA419B0184582CF9815E90859E84B4DDC5BB6124064AB058D88F24D7645E4B144F21DE5695A4E04A76
6,456,952 UART: [art] SIG.R = B916343B2EB8E84E4FE4925F44513034D5391A614579E5BB5CE574A12090D1DE7F5C75D1DFBA982B122179C38BE45528
6,463,722 UART: [art] SIG.S = FCFFE37ADBFE9E39DADF975F2060954F53ABE5425893B33E9C45E2D8EBD1095F36158257673867CA9C3E206EA980C8AC
6,487,426 UART: Caliptra RT
6,487,771 UART: [state] CFI Enabled
6,772,949 UART: [rt] RT listening for mailbox commands...
6,773,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,803,190 UART: [rt]cmd =0x494e464f, len=4
6,807,025 >>> mbox cmd response data (312 bytes)
6,807,026 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,568,223 >>> mbox cmd response: success
9,581,382 UART:
9,581,398 UART: Running Caliptra FMC ...
9,581,806 UART:
9,581,949 UART: [state] CFI Enabled
9,671,362 UART: [art] Extend RT PCRs Done
9,671,790 UART: [art] Lock RT PCRs Done
9,673,007 UART: [art] Populate DV Done
9,680,941 UART: [fht] FMC Alias Private Key: 7
9,682,061 UART: [art] Derive CDI
9,682,341 UART: [art] Store in in slot 0x4
9,768,134 UART: [art] Derive Key Pair
9,768,494 UART: [art] Store priv key in slot 0x5
9,781,318 UART: [art] Derive Key Pair - Done
9,796,084 UART: [art] Signing Cert with AUTHO
9,796,564 UART: RITY.KEYID = 7
9,811,882 UART: [art] Erasing AUTHORITY.KEYID = 7
9,812,647 UART: [art] PUB.X = 5019CFDF00807B6CC367E61E61E071B3D0DBAD320EF5FE5FAC16D92747924DFDF2761CD6972C4401DC5151A175B13BB0
9,819,401 UART: [art] PUB.Y = E27CA4E0DA8A1EFF801E13586D3DA7D356B229A51BD8130F84287A514113836A276663A8CD64906928A41F7C47AB19C0
9,826,348 UART: [art] SIG.R = 3BD2641DC671F34878598CA5EB63894676D33ECDC116F79901931497F62F3748BD5CEDD42AC91BCDE58FC54820C2D46B
9,833,121 UART: [art] SIG.S = C4016C561E8B4AAC988E243125815F506DF947E7F6807542F22F6DDEC2465470A94B87942E78F926243CFD1BF32BAB30
9,856,899 UART: Caliptra RT
9,857,244 UART: [state] CFI Enabled
10,140,913 UART: [rt] RT listening for mailbox commands...
10,141,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,170,964 UART: [rt]cmd =0x494e464f, len=4
10,174,663 >>> mbox cmd response data (312 bytes)
10,174,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,934,561 >>> mbox cmd response: success
12,947,494 UART:
12,947,510 UART: Running Caliptra FMC ...
12,947,918 UART:
12,948,061 UART: [state] CFI Enabled
13,037,624 UART: [art] Extend RT PCRs Done
13,038,052 UART: [art] Lock RT PCRs Done
13,039,015 UART: [art] Populate DV Done
13,047,201 UART: [fht] FMC Alias Private Key: 7
13,048,253 UART: [art] Derive CDI
13,048,533 UART: [art] Store in in slot 0x4
13,134,510 UART: [art] Derive Key Pair
13,134,870 UART: [art] Store priv key in slot 0x5
13,148,340 UART: [art] Derive Key Pair - Done
13,163,502 UART: [art] Signing Cert with AUTHO
13,163,982 UART: RITY.KEYID = 7
13,179,372 UART: [art] Erasing AUTHORITY.KEYID = 7
13,180,137 UART: [art] PUB.X = F378D241A18D7F721DBC29E007820E104F1DE4B18E1FF1D1E0358BBD6F2ECBEB517D2FD7A08DF5A9A48456D96973C76E
13,186,917 UART: [art] PUB.Y = 487CB0790E4A94FA419B0184582CF9815E90859E84B4DDC5BB6124064AB058D88F24D7645E4B144F21DE5695A4E04A76
13,193,856 UART: [art] SIG.R = B916343B2EB8E84E4FE4925F44513034D5391A614579E5BB5CE574A12090D1DE7F5C75D1DFBA982B122179C38BE45528
13,200,626 UART: [art] SIG.S = FCFFE37ADBFE9E39DADF975F2060954F53ABE5425893B33E9C45E2D8EBD1095F36158257673867CA9C3E206EA980C8AC
13,224,690 UART: Caliptra RT
13,225,035 UART: [state] CFI Enabled
13,507,557 UART: [rt] RT listening for mailbox commands...
13,508,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
13,537,774 UART: [rt]cmd =0x494e464f, len=4
13,541,527 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.75s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,821 UART: [ldev] --
1,281,306 UART: [fwproc] Wait for Commands...
1,281,912 UART: [fwproc] Recv command 0x46574c44
1,282,640 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,498 >>> mbox cmd response: success
2,771,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,772,620 UART: [afmc] ++
2,772,788 UART: [afmc] CDI.KEYID = 6
2,773,150 UART: [afmc] SUBJECT.KEYID = 7
2,773,575 UART: [afmc] AUTHORITY.KEYID = 5
2,808,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,792 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,831,484 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,837,357 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,843,059 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,850,884 UART: [afmc] --
2,851,802 UART: [cold-reset] --
2,852,676 UART: [state] Locking Datavault
2,853,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,117 UART: [state] Locking ICCM
2,854,769 UART: [exit] Launching FMC @ 0x40000130
2,860,098 UART:
2,860,114 UART: Running Caliptra FMC ...
2,860,522 UART:
2,860,576 UART: [state] CFI Enabled
2,871,078 UART: [fht] FMC Alias Private Key: 7
2,979,029 UART: [art] Extend RT PCRs Done
2,979,457 UART: [art] Lock RT PCRs Done
2,981,375 UART: [art] Populate DV Done
2,989,671 UART: [fht] FMC Alias Private Key: 7
2,990,721 UART: [art] Derive CDI
2,991,001 UART: [art] Store in in slot 0x4
3,076,424 UART: [art] Derive Key Pair
3,076,784 UART: [art] Store priv key in slot 0x5
3,090,008 UART: [art] Derive Key Pair - Done
3,104,579 UART: [art] Signing Cert with AUTHO
3,105,059 UART: RITY.KEYID = 7
3,120,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,070 UART: [art] PUB.X = 18AB9BC860C2E238594662922E56628411993E23DE16224F67A56110A1120619E6AFB51937EE673CCCDEBD898917A212
3,127,829 UART: [art] PUB.Y = 3C3947F3C71F225FC727357D9DA502EA092601A9A8F09D35E48EA9369B76914412CEA661B098794604B7D33753668087
3,134,755 UART: [art] SIG.R = 179CAB091B7CFD3B94B2E94B9B895F1BC6B89EF8A6B0B94B4EFB88BA0C06CC55AE3EB926FE0EB1445E1239D104CEFCB4
3,141,538 UART: [art] SIG.S = 23CA5875C3256660FE98A564DF9EE5C0644C3C117A43EBD53F8F3182D34A9B65A743BDF02412AB0B6F0C735412A23448
3,165,349 UART: Caliptra RT
3,165,602 UART: [state] CFI Enabled
3,273,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,164 UART: [rt]cmd =0x494e464f, len=4
3,307,887 >>> mbox cmd response data (312 bytes)
3,307,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,725 UART:
3,308,741 UART: Running Caliptra ROM ...
3,309,149 UART:
3,309,204 UART: [state] CFI Enabled
3,311,748 UART: [state] LifecycleState = Unprovisioned
3,312,403 UART: [state] DebugLocked = No
3,313,095 UART: [state] WD Timer not started. Device not locked for debugging
3,314,225 UART: [kat] SHA2-256
4,119,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,124,000 UART: [kat] ++
4,124,152 UART: [kat] sha1
4,128,260 UART: [kat] SHA2-256
4,130,200 UART: [kat] SHA2-384
4,132,959 UART: [kat] SHA2-512-ACC
4,134,859 UART: [kat] ECC-384
4,144,776 UART: [kat] HMAC-384Kdf
4,149,476 UART: [kat] LMS
4,397,804 UART: [kat] --
4,398,568 UART: [update-reset] ++
5,708,455 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,709,550 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,859,128 >>> mbox cmd response: success
5,859,409 UART: [update-reset] Copying MAN_2 To MAN_1
5,867,423 UART: [update-reset Success] --
5,868,476 UART: [state] Locking Datavault
5,869,240 UART: [state] Locking PCR0, PCR1 and PCR31
5,869,844 UART: [state] Locking ICCM
5,870,434 UART: [exit] Launching FMC @ 0x40000130
5,875,763 UART:
5,875,779 UART: Running Caliptra FMC ...
5,876,187 UART:
5,876,241 UART: [state] CFI Enabled
5,965,074 UART: [art] Extend RT PCRs Done
5,965,502 UART: [art] Lock RT PCRs Done
5,967,019 UART: [art] Populate DV Done
5,975,271 UART: [fht] FMC Alias Private Key: 7
5,976,443 UART: [art] Derive CDI
5,976,723 UART: [art] Store in in slot 0x4
6,062,424 UART: [art] Derive Key Pair
6,062,784 UART: [art] Store priv key in slot 0x5
6,075,754 UART: [art] Derive Key Pair - Done
6,090,297 UART: [art] Signing Cert with AUTHO
6,090,777 UART: RITY.KEYID = 7
6,105,931 UART: [art] Erasing AUTHORITY.KEYID = 7
6,106,696 UART: [art] PUB.X = E6E01D06089B0CFD53E226474588096B7A257B17ABE0656A22D9A5ABB5C5A4235DAF33BBE0AB5818E83A1625BE6BC54A
6,113,466 UART: [art] PUB.Y = E0FD7430D7E025F84D1A519EE5C7AE54F09593DE2E25B33DBB961FE6C05B093E44FB0B008B1DE303E6C79046ED23014C
6,120,394 UART: [art] SIG.R = B6C63ABAE88D26E591DBC7AF370A788C60A316570A749D7A43C7F76C858098027C58C0DC24587C987CF5C13236DC7B2E
6,127,161 UART: [art] SIG.S = 4907583C04F36DE3CABB6A8FB5B20F99627BD5DBB47B5B40534039F1F0B8E27FF25A473829F74D87A7BCC9BE5A592A62
6,150,573 UART: Caliptra RT
6,150,826 UART: [state] CFI Enabled
6,433,019 UART: [rt] RT listening for mailbox commands...
6,433,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,463,230 UART: [rt]cmd =0x494e464f, len=4
6,466,781 >>> mbox cmd response data (312 bytes)
6,466,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,467,591 UART:
6,467,607 UART: Running Caliptra ROM ...
6,468,015 UART:
6,468,070 UART: [state] CFI Enabled
6,470,704 UART: [state] LifecycleState = Unprovisioned
6,471,359 UART: [state] DebugLocked = No
6,471,869 UART: [state] WD Timer not started. Device not locked for debugging
6,473,065 UART: [kat] SHA2-256
7,278,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,282,840 UART: [kat] ++
7,282,992 UART: [kat] sha1
7,287,014 UART: [kat] SHA2-256
7,288,954 UART: [kat] SHA2-384
7,291,865 UART: [kat] SHA2-512-ACC
7,293,765 UART: [kat] ECC-384
7,303,136 UART: [kat] HMAC-384Kdf
7,307,914 UART: [kat] LMS
7,556,242 UART: [kat] --
7,557,128 UART: [update-reset] ++
8,867,725 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,868,914 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
9,018,492 >>> mbox cmd response: success
9,018,603 UART: [update-reset] Copying MAN_2 To MAN_1
9,026,617 UART: [update-reset Success] --
9,027,546 UART: [state] Locking Datavault
9,028,414 UART: [state] Locking PCR0, PCR1 and PCR31
9,029,018 UART: [state] Locking ICCM
9,029,510 UART: [exit] Launching FMC @ 0x40000130
9,034,839 UART:
9,034,855 UART: Running Caliptra FMC ...
9,035,263 UART:
9,035,317 UART: [state] CFI Enabled
9,123,476 UART: [art] Extend RT PCRs Done
9,123,904 UART: [art] Lock RT PCRs Done
9,125,025 UART: [art] Populate DV Done
9,133,031 UART: [fht] FMC Alias Private Key: 7
9,134,169 UART: [art] Derive CDI
9,134,449 UART: [art] Store in in slot 0x4
9,219,800 UART: [art] Derive Key Pair
9,220,160 UART: [art] Store priv key in slot 0x5
9,233,788 UART: [art] Derive Key Pair - Done
9,248,531 UART: [art] Signing Cert with AUTHO
9,249,011 UART: RITY.KEYID = 7
9,263,931 UART: [art] Erasing AUTHORITY.KEYID = 7
9,264,696 UART: [art] PUB.X = 3E35773F0DEF9FE90D0696922BB997ABFFB2B70400B1A27FE27EBD5EE7C90184EB2CED4F8FDB147463B0A14AE77847B0
9,271,447 UART: [art] PUB.Y = 35C0735245E83AF3743116E2CD04AC29301D3B9F6418F7A6B448AD1E46243E2C5821DEB3FCC80F26963D487AF8A1C171
9,278,393 UART: [art] SIG.R = 303836CE3EEBEE8E5E05FBE25B27FDC7976C86008D80A8BF381733D0642C5BD9EFD3956569D63C5C00239F777BCD7E84
9,285,126 UART: [art] SIG.S = 1804961A56C3F05FF2D4187F7329BFED6F9313D79DBDA0C935F44AC2C20F4947BFABBD700DDEDCCFF1F3B3E52EAD4B5F
9,308,454 UART: Caliptra RT
9,308,707 UART: [state] CFI Enabled
9,592,327 UART: [rt] RT listening for mailbox commands...
9,592,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,622,742 UART: [rt]cmd =0x494e464f, len=4
9,626,399 >>> mbox cmd response data (312 bytes)
9,626,400 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,627,127 UART:
9,627,143 UART: Running Caliptra ROM ...
9,627,551 UART:
9,627,606 UART: [state] CFI Enabled
9,630,136 UART: [state] LifecycleState = Unprovisioned
9,630,791 UART: [state] DebugLocked = No
9,631,461 UART: [state] WD Timer not started. Device not locked for debugging
9,632,589 UART: [kat] SHA2-256
10,438,239 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,442,364 UART: [kat] ++
10,442,516 UART: [kat] sha1
10,446,858 UART: [kat] SHA2-256
10,448,798 UART: [kat] SHA2-384
10,451,345 UART: [kat] SHA2-512-ACC
10,453,245 UART: [kat] ECC-384
10,462,844 UART: [kat] HMAC-384Kdf
10,467,306 UART: [kat] LMS
10,715,634 UART: [kat] --
10,716,576 UART: [update-reset] ++
12,026,545 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,027,590 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
12,177,168 >>> mbox cmd response: success
12,177,303 UART: [update-reset] Copying MAN_2 To MAN_1
12,185,317 UART: [update-reset Success] --
12,186,280 UART: [state] Locking Datavault
12,187,238 UART: [state] Locking PCR0, PCR1 and PCR31
12,187,842 UART: [state] Locking ICCM
12,188,434 UART: [exit] Launching FMC @ 0x40000130
12,193,763 UART:
12,193,779 UART: Running Caliptra FMC ...
12,194,187 UART:
12,194,241 UART: [state] CFI Enabled
12,283,178 UART: [art] Extend RT PCRs Done
12,283,606 UART: [art] Lock RT PCRs Done
12,285,003 UART: [art] Populate DV Done
12,293,355 UART: [fht] FMC Alias Private Key: 7
12,294,455 UART: [art] Derive CDI
12,294,735 UART: [art] Store in in slot 0x4
12,380,466 UART: [art] Derive Key Pair
12,380,826 UART: [art] Store priv key in slot 0x5
12,393,952 UART: [art] Derive Key Pair - Done
12,408,409 UART: [art] Signing Cert with AUTHO
12,408,889 UART: RITY.KEYID = 7
12,424,227 UART: [art] Erasing AUTHORITY.KEYID = 7
12,424,992 UART: [art] PUB.X = E6E01D06089B0CFD53E226474588096B7A257B17ABE0656A22D9A5ABB5C5A4235DAF33BBE0AB5818E83A1625BE6BC54A
12,431,762 UART: [art] PUB.Y = E0FD7430D7E025F84D1A519EE5C7AE54F09593DE2E25B33DBB961FE6C05B093E44FB0B008B1DE303E6C79046ED23014C
12,438,690 UART: [art] SIG.R = B6C63ABAE88D26E591DBC7AF370A788C60A316570A749D7A43C7F76C858098027C58C0DC24587C987CF5C13236DC7B2E
12,445,457 UART: [art] SIG.S = 4907583C04F36DE3CABB6A8FB5B20F99627BD5DBB47B5B40534039F1F0B8E27FF25A473829F74D87A7BCC9BE5A592A62
12,469,225 UART: Caliptra RT
12,469,478 UART: [state] CFI Enabled
12,753,725 UART: [rt] RT listening for mailbox commands...
12,754,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,783,994 UART: [rt]cmd =0x494e464f, len=4
12,787,667 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 ready_for_fw is high
1,060,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,445 >>> mbox cmd response: success
2,622,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,684,380 UART:
2,684,396 UART: Running Caliptra FMC ...
2,684,804 UART:
2,684,858 UART: [state] CFI Enabled
2,695,274 UART: [fht] FMC Alias Private Key: 7
2,803,349 UART: [art] Extend RT PCRs Done
2,803,777 UART: [art] Lock RT PCRs Done
2,805,525 UART: [art] Populate DV Done
2,813,693 UART: [fht] FMC Alias Private Key: 7
2,814,705 UART: [art] Derive CDI
2,814,985 UART: [art] Store in in slot 0x4
2,900,426 UART: [art] Derive Key Pair
2,900,786 UART: [art] Store priv key in slot 0x5
2,914,034 UART: [art] Derive Key Pair - Done
2,929,033 UART: [art] Signing Cert with AUTHO
2,929,513 UART: RITY.KEYID = 7
2,944,787 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,552 UART: [art] PUB.X = 59E1812CB7742D77A3309D044B8BECA7A21F9A7C46E4242B83B505DEDDC79D9248678EF12F834C0A12CF1145FD9D7A17
2,952,321 UART: [art] PUB.Y = BFB9911C2AA3DE95EB6478B45C29E945191556003897559B98FB3CEE5D17DED0BB579C4F9DC5C07F9F2A150E6E87CC38
2,959,258 UART: [art] SIG.R = CF26CAC8BE5A2894125E2A3611EBE33590920FF8AD0B622F93169FE242CA76759B3C4B72AAA5E0C26B5C12126B3CD712
2,966,032 UART: [art] SIG.S = 9DE9A0781703E1D85D64116518D9D22DC8CCF3A807E16F37796FBCEE2D1E49EEEE6422BEDEAED25055676CB2BD90A8A6
2,989,847 UART: Caliptra RT
2,990,100 UART: [state] CFI Enabled
3,097,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,125 UART: [rt]cmd =0x494e464f, len=4
3,131,960 >>> mbox cmd response data (312 bytes)
3,131,961 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,568,684 >>> mbox cmd response: success
5,582,418 UART:
5,582,434 UART: Running Caliptra FMC ...
5,582,842 UART:
5,582,896 UART: [state] CFI Enabled
5,671,789 UART: [art] Extend RT PCRs Done
5,672,217 UART: [art] Lock RT PCRs Done
5,673,592 UART: [art] Populate DV Done
5,681,720 UART: [fht] FMC Alias Private Key: 7
5,682,898 UART: [art] Derive CDI
5,683,178 UART: [art] Store in in slot 0x4
5,768,711 UART: [art] Derive Key Pair
5,769,071 UART: [art] Store priv key in slot 0x5
5,783,137 UART: [art] Derive Key Pair - Done
5,797,772 UART: [art] Signing Cert with AUTHO
5,798,252 UART: RITY.KEYID = 7
5,813,686 UART: [art] Erasing AUTHORITY.KEYID = 7
5,814,451 UART: [art] PUB.X = 149926BF703054EF28C3FAD73AFD760239D33D5589D0E789B75E7AD6B0851AF89576E4ECDDD523883DC28A2B142DDE8E
5,821,228 UART: [art] PUB.Y = 32ED2810CD90DD1B347C01F83A9CE01115E4909138E71EB70B749FFE03A28340AEF2CFAD644902F94C0C4A806FCBB1DB
5,828,177 UART: [art] SIG.R = 57C175E8C26F50E5A6FDA91A54A55B158E0807F1870D2FB4BA5E90E6F671B7E7D028BCBD01EAC36B2CB823210A7AA9B5
5,834,948 UART: [art] SIG.S = 747CE366EF6BF4D8A27D151CA0D2E31E49480949E6D7B86DDE10F48CA657857DA55C8A8782541FD0B1952FBE84C551A5
5,858,440 UART: Caliptra RT
5,858,693 UART: [state] CFI Enabled
6,139,573 UART: [rt] RT listening for mailbox commands...
6,140,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,632 UART: [rt]cmd =0x494e464f, len=4
6,173,281 >>> mbox cmd response data (312 bytes)
6,173,282 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,608,287 >>> mbox cmd response: success
8,621,379 UART:
8,621,395 UART: Running Caliptra FMC ...
8,621,803 UART:
8,621,857 UART: [state] CFI Enabled
8,711,268 UART: [art] Extend RT PCRs Done
8,711,696 UART: [art] Lock RT PCRs Done
8,713,043 UART: [art] Populate DV Done
8,721,281 UART: [fht] FMC Alias Private Key: 7
8,722,407 UART: [art] Derive CDI
8,722,687 UART: [art] Store in in slot 0x4
8,808,470 UART: [art] Derive Key Pair
8,808,830 UART: [art] Store priv key in slot 0x5
8,821,602 UART: [art] Derive Key Pair - Done
8,836,331 UART: [art] Signing Cert with AUTHO
8,836,811 UART: RITY.KEYID = 7
8,851,703 UART: [art] Erasing AUTHORITY.KEYID = 7
8,852,468 UART: [art] PUB.X = 24016074B527149E3ADA2AE9FCD566B9D7293A1CEAD9D812CAE40A8C90D49346878E460AE78D00686B420360CD5EB9F6
8,859,210 UART: [art] PUB.Y = 6D3190616906AB4AC72F07B905A2E51157E2B44DEC91EBF8EDFF2FB7AB589A41F14E221E9E92234EF88C1AE960B5AA97
8,866,165 UART: [art] SIG.R = D73F1A84A130D515FE61F2199331A31ADD2C67246DB81488E9B73E412F76A45550C290AFC0BCED04D85E713148A05AE4
8,872,936 UART: [art] SIG.S = D1D95FAC18164534B5782344ED635F951C15B21EFC661F6FF08A7B0616283193D040781024F6679CE099C6B0BDAEE3C9
8,896,288 UART: Caliptra RT
8,896,541 UART: [state] CFI Enabled
9,179,284 UART: [rt] RT listening for mailbox commands...
9,179,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,209,449 UART: [rt]cmd =0x494e464f, len=4
9,213,212 >>> mbox cmd response data (312 bytes)
9,213,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,648,220 >>> mbox cmd response: success
11,661,202 UART:
11,661,218 UART: Running Caliptra FMC ...
11,661,626 UART:
11,661,680 UART: [state] CFI Enabled
11,751,325 UART: [art] Extend RT PCRs Done
11,751,753 UART: [art] Lock RT PCRs Done
11,753,196 UART: [art] Populate DV Done
11,761,584 UART: [fht] FMC Alias Private Key: 7
11,762,684 UART: [art] Derive CDI
11,762,964 UART: [art] Store in in slot 0x4
11,848,557 UART: [art] Derive Key Pair
11,848,917 UART: [art] Store priv key in slot 0x5
11,862,405 UART: [art] Derive Key Pair - Done
11,877,278 UART: [art] Signing Cert with AUTHO
11,877,758 UART: RITY.KEYID = 7
11,893,252 UART: [art] Erasing AUTHORITY.KEYID = 7
11,894,017 UART: [art] PUB.X = 149926BF703054EF28C3FAD73AFD760239D33D5589D0E789B75E7AD6B0851AF89576E4ECDDD523883DC28A2B142DDE8E
11,900,794 UART: [art] PUB.Y = 32ED2810CD90DD1B347C01F83A9CE01115E4909138E71EB70B749FFE03A28340AEF2CFAD644902F94C0C4A806FCBB1DB
11,907,743 UART: [art] SIG.R = 57C175E8C26F50E5A6FDA91A54A55B158E0807F1870D2FB4BA5E90E6F671B7E7D028BCBD01EAC36B2CB823210A7AA9B5
11,914,514 UART: [art] SIG.S = 747CE366EF6BF4D8A27D151CA0D2E31E49480949E6D7B86DDE10F48CA657857DA55C8A8782541FD0B1952FBE84C551A5
11,938,624 UART: Caliptra RT
11,938,877 UART: [state] CFI Enabled
12,219,197 UART: [rt] RT listening for mailbox commands...
12,219,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,249,176 UART: [rt]cmd =0x494e464f, len=4
12,252,783 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.64s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,902 UART: [ldev] --
1,283,345 UART: [fwproc] Wait for Commands...
1,283,975 UART: [fwproc] Recv command 0x46574c44
1,284,703 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,063 >>> mbox cmd response: success
2,773,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,774,127 UART: [afmc] ++
2,774,295 UART: [afmc] CDI.KEYID = 6
2,774,657 UART: [afmc] SUBJECT.KEYID = 7
2,775,082 UART: [afmc] AUTHORITY.KEYID = 5
2,810,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,707 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,833,399 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,839,272 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,844,974 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,852,777 UART: [afmc] --
2,853,739 UART: [cold-reset] --
2,854,713 UART: [state] Locking Datavault
2,856,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,614 UART: [state] Locking ICCM
2,857,056 UART: [exit] Launching FMC @ 0x40000130
2,862,385 UART:
2,862,401 UART: Running Caliptra FMC ...
2,862,809 UART:
2,862,952 UART: [state] CFI Enabled
2,873,740 UART: [fht] FMC Alias Private Key: 7
2,981,885 UART: [art] Extend RT PCRs Done
2,982,313 UART: [art] Lock RT PCRs Done
2,984,195 UART: [art] Populate DV Done
2,992,327 UART: [fht] FMC Alias Private Key: 7
2,993,353 UART: [art] Derive CDI
2,993,633 UART: [art] Store in in slot 0x4
3,079,224 UART: [art] Derive Key Pair
3,079,584 UART: [art] Store priv key in slot 0x5
3,092,682 UART: [art] Derive Key Pair - Done
3,107,734 UART: [art] Signing Cert with AUTHO
3,108,214 UART: RITY.KEYID = 7
3,123,558 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,323 UART: [art] PUB.X = 74A47322E6AF4F10CF227713844407AD960DE0464CCC3E259E2496A985BAE78EF3747C17FF748EFC3768F74199BD6124
3,131,087 UART: [art] PUB.Y = 7CE208A19035ABEC2232BC3B498C350A06111E8B5BBEC4DC4388997201C0057B57375B6028DE86B757D4D6915A4B070C
3,138,016 UART: [art] SIG.R = 544AE19710E8AF7BE235C39DB278E96A3770E22DEDB0D8DBBD6FC86CB1876C93632F0670B0A248A11A0E529E5B75D68B
3,144,792 UART: [art] SIG.S = C213507466731B633B7C3A43FBAB258BAD26B89CD5809DB15886D249983605FF263CDCBF9F5DF7A65B54499007566274
3,169,159 UART: Caliptra RT
3,169,504 UART: [state] CFI Enabled
3,278,391 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,045 UART: [rt]cmd =0x494e464f, len=4
3,312,910 >>> mbox cmd response data (312 bytes)
3,312,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,544 UART:
3,313,560 UART: Running Caliptra ROM ...
3,313,968 UART:
3,314,110 UART: [state] CFI Enabled
3,317,264 UART: [state] LifecycleState = Unprovisioned
3,317,919 UART: [state] DebugLocked = No
3,318,641 UART: [state] WD Timer not started. Device not locked for debugging
3,319,897 UART: [kat] SHA2-256
4,125,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,129,672 UART: [kat] ++
4,129,824 UART: [kat] sha1
4,133,974 UART: [kat] SHA2-256
4,135,914 UART: [kat] SHA2-384
4,138,543 UART: [kat] SHA2-512-ACC
4,140,443 UART: [kat] ECC-384
4,150,468 UART: [kat] HMAC-384Kdf
4,154,878 UART: [kat] LMS
4,403,206 UART: [kat] --
4,404,150 UART: [update-reset] ++
5,714,289 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,715,290 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,864,868 >>> mbox cmd response: success
5,865,179 UART: [update-reset] Copying MAN_2 To MAN_1
5,873,193 UART: [update-reset Success] --
5,873,970 UART: [state] Locking Datavault
5,874,712 UART: [state] Locking PCR0, PCR1 and PCR31
5,875,316 UART: [state] Locking ICCM
5,875,964 UART: [exit] Launching FMC @ 0x40000130
5,881,293 UART:
5,881,309 UART: Running Caliptra FMC ...
5,881,717 UART:
5,881,860 UART: [state] CFI Enabled
5,970,817 UART: [art] Extend RT PCRs Done
5,971,245 UART: [art] Lock RT PCRs Done
5,972,616 UART: [art] Populate DV Done
5,981,084 UART: [fht] FMC Alias Private Key: 7
5,982,060 UART: [art] Derive CDI
5,982,340 UART: [art] Store in in slot 0x4
6,068,291 UART: [art] Derive Key Pair
6,068,651 UART: [art] Store priv key in slot 0x5
6,082,399 UART: [art] Derive Key Pair - Done
6,097,082 UART: [art] Signing Cert with AUTHO
6,097,562 UART: RITY.KEYID = 7
6,112,934 UART: [art] Erasing AUTHORITY.KEYID = 7
6,113,699 UART: [art] PUB.X = 19031CE89DA7C9FA287B5B18F2CD9A1D40559581FC00EAC81E51707A3F93EFBEC74E5C5231CEAA9EF60A037FE2C02798
6,120,454 UART: [art] PUB.Y = 49E8472EF96CFD3C62DEB1807974BFDA7C3C255D76098EA61114714D40532E9B9DD6E613BF28B380602CDEFA1D019BB9
6,127,408 UART: [art] SIG.R = 7237A8DAF02C066ED61A1587E31993F2213CC0BD60398F117A31DEC63FA506C90C97FFC250E98A864CAD32E57AADFA2A
6,134,183 UART: [art] SIG.S = 1A861FAAE180424EF4C29CF9A4B10CCFB19E980BFA3031E59F839198DBFC6E6077AE71C837E6A779B3A51AE16DB5D143
6,158,122 UART: Caliptra RT
6,158,467 UART: [state] CFI Enabled
6,439,683 UART: [rt] RT listening for mailbox commands...
6,440,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,470,040 UART: [rt]cmd =0x494e464f, len=4
6,473,803 >>> mbox cmd response data (312 bytes)
6,473,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,474,729 UART:
6,474,745 UART: Running Caliptra ROM ...
6,475,153 UART:
6,475,295 UART: [state] CFI Enabled
6,477,785 UART: [state] LifecycleState = Unprovisioned
6,478,440 UART: [state] DebugLocked = No
6,479,174 UART: [state] WD Timer not started. Device not locked for debugging
6,480,526 UART: [kat] SHA2-256
7,286,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,290,301 UART: [kat] ++
7,290,453 UART: [kat] sha1
7,294,797 UART: [kat] SHA2-256
7,296,737 UART: [kat] SHA2-384
7,299,626 UART: [kat] SHA2-512-ACC
7,301,526 UART: [kat] ECC-384
7,311,207 UART: [kat] HMAC-384Kdf
7,315,929 UART: [kat] LMS
7,564,257 UART: [kat] --
7,564,981 UART: [update-reset] ++
8,875,904 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,876,933 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
9,026,511 >>> mbox cmd response: success
9,026,636 UART: [update-reset] Copying MAN_2 To MAN_1
9,034,650 UART: [update-reset Success] --
9,035,797 UART: [state] Locking Datavault
9,036,647 UART: [state] Locking PCR0, PCR1 and PCR31
9,037,251 UART: [state] Locking ICCM
9,037,767 UART: [exit] Launching FMC @ 0x40000130
9,043,096 UART:
9,043,112 UART: Running Caliptra FMC ...
9,043,520 UART:
9,043,663 UART: [state] CFI Enabled
9,133,080 UART: [art] Extend RT PCRs Done
9,133,508 UART: [art] Lock RT PCRs Done
9,134,573 UART: [art] Populate DV Done
9,142,789 UART: [fht] FMC Alias Private Key: 7
9,143,721 UART: [art] Derive CDI
9,144,001 UART: [art] Store in in slot 0x4
9,229,598 UART: [art] Derive Key Pair
9,229,958 UART: [art] Store priv key in slot 0x5
9,243,138 UART: [art] Derive Key Pair - Done
9,257,998 UART: [art] Signing Cert with AUTHO
9,258,478 UART: RITY.KEYID = 7
9,273,790 UART: [art] Erasing AUTHORITY.KEYID = 7
9,274,555 UART: [art] PUB.X = CA12BE16FEC004944B19E47D64B2C060D23378F300B0E242CC015E731D1DB810AB67D8105540307A306FD068BBAAC43A
9,281,303 UART: [art] PUB.Y = 6BF071CFB45B835BF8426B212E135330B56A6D14BEE7DFDB10484519963FF91E3BE300FAC2A640EED028FB00ABB07244
9,288,221 UART: [art] SIG.R = B9BD5CDC880C6099A2BF501C3440B56930F6A153E6EED7A065EF30E9999FFD7EB484284AD7FFDF6DA4CBEBB31BFD234C
9,295,014 UART: [art] SIG.S = 924D8756BDC848FB6E4E6158A2A08CD98039970A25510035A2F657546008842AB74DAE29009C28EFC8A27B74DFAE0ECD
9,318,386 UART: Caliptra RT
9,318,731 UART: [state] CFI Enabled
9,598,864 UART: [rt] RT listening for mailbox commands...
9,599,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,629,165 UART: [rt]cmd =0x494e464f, len=4
9,632,874 >>> mbox cmd response data (312 bytes)
9,632,875 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,633,804 UART:
9,633,820 UART: Running Caliptra ROM ...
9,634,228 UART:
9,634,370 UART: [state] CFI Enabled
9,636,974 UART: [state] LifecycleState = Unprovisioned
9,637,629 UART: [state] DebugLocked = No
9,638,359 UART: [state] WD Timer not started. Device not locked for debugging
9,639,505 UART: [kat] SHA2-256
10,445,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,449,280 UART: [kat] ++
10,449,432 UART: [kat] sha1
10,453,640 UART: [kat] SHA2-256
10,455,580 UART: [kat] SHA2-384
10,458,239 UART: [kat] SHA2-512-ACC
10,460,139 UART: [kat] ECC-384
10,470,150 UART: [kat] HMAC-384Kdf
10,474,830 UART: [kat] LMS
10,723,158 UART: [kat] --
10,724,100 UART: [update-reset] ++
12,034,597 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,035,576 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
12,185,154 >>> mbox cmd response: success
12,185,297 UART: [update-reset] Copying MAN_2 To MAN_1
12,193,311 UART: [update-reset Success] --
12,194,310 UART: [state] Locking Datavault
12,195,182 UART: [state] Locking PCR0, PCR1 and PCR31
12,195,786 UART: [state] Locking ICCM
12,196,288 UART: [exit] Launching FMC @ 0x40000130
12,201,617 UART:
12,201,633 UART: Running Caliptra FMC ...
12,202,041 UART:
12,202,184 UART: [state] CFI Enabled
12,291,269 UART: [art] Extend RT PCRs Done
12,291,697 UART: [art] Lock RT PCRs Done
12,292,996 UART: [art] Populate DV Done
12,301,206 UART: [fht] FMC Alias Private Key: 7
12,302,284 UART: [art] Derive CDI
12,302,564 UART: [art] Store in in slot 0x4
12,388,913 UART: [art] Derive Key Pair
12,389,273 UART: [art] Store priv key in slot 0x5
12,402,343 UART: [art] Derive Key Pair - Done
12,416,900 UART: [art] Signing Cert with AUTHO
12,417,380 UART: RITY.KEYID = 7
12,432,172 UART: [art] Erasing AUTHORITY.KEYID = 7
12,432,937 UART: [art] PUB.X = 19031CE89DA7C9FA287B5B18F2CD9A1D40559581FC00EAC81E51707A3F93EFBEC74E5C5231CEAA9EF60A037FE2C02798
12,439,692 UART: [art] PUB.Y = 49E8472EF96CFD3C62DEB1807974BFDA7C3C255D76098EA61114714D40532E9B9DD6E613BF28B380602CDEFA1D019BB9
12,446,646 UART: [art] SIG.R = 7237A8DAF02C066ED61A1587E31993F2213CC0BD60398F117A31DEC63FA506C90C97FFC250E98A864CAD32E57AADFA2A
12,453,421 UART: [art] SIG.S = 1A861FAAE180424EF4C29CF9A4B10CCFB19E980BFA3031E59F839198DBFC6E6077AE71C837E6A779B3A51AE16DB5D143
12,476,766 UART: Caliptra RT
12,477,111 UART: [state] CFI Enabled
12,758,813 UART: [rt] RT listening for mailbox commands...
12,759,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,789,052 UART: [rt]cmd =0x494e464f, len=4
12,792,835 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,206 ready_for_fw is high
1,061,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,272 >>> mbox cmd response: success
2,625,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,687,163 UART:
2,687,179 UART: Running Caliptra FMC ...
2,687,587 UART:
2,687,730 UART: [state] CFI Enabled
2,698,084 UART: [fht] FMC Alias Private Key: 7
2,805,951 UART: [art] Extend RT PCRs Done
2,806,379 UART: [art] Lock RT PCRs Done
2,807,593 UART: [art] Populate DV Done
2,815,743 UART: [fht] FMC Alias Private Key: 7
2,816,743 UART: [art] Derive CDI
2,817,023 UART: [art] Store in in slot 0x4
2,902,724 UART: [art] Derive Key Pair
2,903,084 UART: [art] Store priv key in slot 0x5
2,916,052 UART: [art] Derive Key Pair - Done
2,930,712 UART: [art] Signing Cert with AUTHO
2,931,192 UART: RITY.KEYID = 7
2,946,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,429 UART: [art] PUB.X = 18C03144B987954BC08A8F4E9FBC1C65CA798C8E1BD401AA75B34AEC187CE623863F8B0E29C4B49AEE481396516973CB
2,954,201 UART: [art] PUB.Y = F6F77105C4A31E58B218FA472AC0E2739367E9FEB1B3997237F08E5F4A8433BBB7D857EEB135BDB5E179E824971FF2C7
2,961,156 UART: [art] SIG.R = 13E86E8AD0FC88D191B86C990D6C97E5DD8030FB647897F5F856002C6D4E4F3B4D884C8F77362AB1676C530E2B64E4E1
2,967,902 UART: [art] SIG.S = 7B1A8179262169FB65CEEC0D212FF60BE919AE51A9391CA4BD0063BF390F997EC5A39E88C20332435443D36DDC7F8976
2,991,957 UART: Caliptra RT
2,992,302 UART: [state] CFI Enabled
3,100,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,822 UART: [rt]cmd =0x494e464f, len=4
3,134,623 >>> mbox cmd response data (312 bytes)
3,134,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,569,300 >>> mbox cmd response: success
5,582,782 UART:
5,582,798 UART: Running Caliptra FMC ...
5,583,206 UART:
5,583,349 UART: [state] CFI Enabled
5,672,462 UART: [art] Extend RT PCRs Done
5,672,890 UART: [art] Lock RT PCRs Done
5,674,061 UART: [art] Populate DV Done
5,682,527 UART: [fht] FMC Alias Private Key: 7
5,683,461 UART: [art] Derive CDI
5,683,741 UART: [art] Store in in slot 0x4
5,768,900 UART: [art] Derive Key Pair
5,769,260 UART: [art] Store priv key in slot 0x5
5,782,376 UART: [art] Derive Key Pair - Done
5,797,336 UART: [art] Signing Cert with AUTHO
5,797,816 UART: RITY.KEYID = 7
5,812,534 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,299 UART: [art] PUB.X = 3E25305DB2374C4E41209A0344F5392F3D9BC5990B09E15588EFC949D8F6112AF1324380441C6F3FB9BBF18DC7FF8183
5,820,060 UART: [art] PUB.Y = 66625EC95B4153713D2E3E71466A90B8AD2A357900FAE6AEA56712D15A00B7B8E6FB1BF5CCA7C2742F405111B01FE7F1
5,826,974 UART: [art] SIG.R = AFDFBDCF2CC1F1542BD2F73BFEB089243B7E2A64660C1B61EBAA5FF4EF28E4D1404C807BBEB6CCE8A01871217C7CBA02
5,833,768 UART: [art] SIG.S = CAA0816F4E301655C8D53735F385B1BE74B1ED65A751F00D4B7829FD12D2F0991B1D246A52EEED8B146190EC854B9920
5,857,360 UART: Caliptra RT
5,857,705 UART: [state] CFI Enabled
6,141,592 UART: [rt] RT listening for mailbox commands...
6,142,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,171,859 UART: [rt]cmd =0x494e464f, len=4
6,175,476 >>> mbox cmd response data (312 bytes)
6,175,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,611,267 >>> mbox cmd response: success
8,624,713 UART:
8,624,729 UART: Running Caliptra FMC ...
8,625,137 UART:
8,625,280 UART: [state] CFI Enabled
8,714,149 UART: [art] Extend RT PCRs Done
8,714,577 UART: [art] Lock RT PCRs Done
8,716,064 UART: [art] Populate DV Done
8,724,128 UART: [fht] FMC Alias Private Key: 7
8,725,254 UART: [art] Derive CDI
8,725,534 UART: [art] Store in in slot 0x4
8,811,167 UART: [art] Derive Key Pair
8,811,527 UART: [art] Store priv key in slot 0x5
8,825,407 UART: [art] Derive Key Pair - Done
8,840,153 UART: [art] Signing Cert with AUTHO
8,840,633 UART: RITY.KEYID = 7
8,855,847 UART: [art] Erasing AUTHORITY.KEYID = 7
8,856,612 UART: [art] PUB.X = AA26FBBE11975899B5F40227C85A4A41364C4B1F5781799CE079C136241582F7C895E495044E0A0A01B762DF44724B1F
8,863,361 UART: [art] PUB.Y = 604655F12BEDBB665C95D6AEF934B0A85F0DD51A3F9ECFF9B9C7A5220DE1F07B56A856566E0A25762BEFCBBAD0AB95CC
8,870,328 UART: [art] SIG.R = E5D83EB1D4406384717CB54D8EFC6EE93AC719BA75372A3A440A890DADE330793F0FA2220CD85E9E32C47B0B2B0CBAE4
8,877,096 UART: [art] SIG.S = 42DC716F88A523AD008685F5D3A1673593150BB234A197E402EA3363C6C7F55B69F086FCC7A209C44B7E9971F8D69303
8,900,605 UART: Caliptra RT
8,900,950 UART: [state] CFI Enabled
9,184,675 UART: [rt] RT listening for mailbox commands...
9,185,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,214,794 UART: [rt]cmd =0x494e464f, len=4
9,218,403 >>> mbox cmd response data (312 bytes)
9,218,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,654,536 >>> mbox cmd response: success
11,667,696 UART:
11,667,712 UART: Running Caliptra FMC ...
11,668,120 UART:
11,668,263 UART: [state] CFI Enabled
11,757,184 UART: [art] Extend RT PCRs Done
11,757,612 UART: [art] Lock RT PCRs Done
11,758,717 UART: [art] Populate DV Done
11,767,013 UART: [fht] FMC Alias Private Key: 7
11,768,139 UART: [art] Derive CDI
11,768,419 UART: [art] Store in in slot 0x4
11,854,066 UART: [art] Derive Key Pair
11,854,426 UART: [art] Store priv key in slot 0x5
11,867,760 UART: [art] Derive Key Pair - Done
11,882,656 UART: [art] Signing Cert with AUTHO
11,883,136 UART: RITY.KEYID = 7
11,898,320 UART: [art] Erasing AUTHORITY.KEYID = 7
11,899,085 UART: [art] PUB.X = 3E25305DB2374C4E41209A0344F5392F3D9BC5990B09E15588EFC949D8F6112AF1324380441C6F3FB9BBF18DC7FF8183
11,905,846 UART: [art] PUB.Y = 66625EC95B4153713D2E3E71466A90B8AD2A357900FAE6AEA56712D15A00B7B8E6FB1BF5CCA7C2742F405111B01FE7F1
11,912,760 UART: [art] SIG.R = AFDFBDCF2CC1F1542BD2F73BFEB089243B7E2A64660C1B61EBAA5FF4EF28E4D1404C807BBEB6CCE8A01871217C7CBA02
11,919,554 UART: [art] SIG.S = CAA0816F4E301655C8D53735F385B1BE74B1ED65A751F00D4B7829FD12D2F0991B1D246A52EEED8B146190EC854B9920
11,942,788 UART: Caliptra RT
11,943,133 UART: [state] CFI Enabled
12,224,384 UART: [rt] RT listening for mailbox commands...
12,225,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,254,681 UART: [rt]cmd =0x494e464f, len=4
12,258,358 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.57s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,766 UART: [ldev] --
1,280,232 UART: [fwproc] Wait for Commands...
1,280,849 UART: [fwproc] Recv command 0x46574c44
1,281,582 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,774 >>> mbox cmd response: success
2,770,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,771,889 UART: [afmc] ++
2,772,057 UART: [afmc] CDI.KEYID = 6
2,772,420 UART: [afmc] SUBJECT.KEYID = 7
2,772,846 UART: [afmc] AUTHORITY.KEYID = 5
2,809,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,157 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,831,850 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,837,721 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,843,423 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,851,133 UART: [afmc] --
2,852,123 UART: [cold-reset] --
2,853,087 UART: [state] Locking Datavault
2,854,292 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,896 UART: [state] Locking ICCM
2,855,392 UART: [exit] Launching FMC @ 0x40000130
2,860,721 UART:
2,860,737 UART: Running Caliptra FMC ...
2,861,145 UART:
2,861,199 UART: [state] CFI Enabled
2,871,427 UART: [fht] FMC Alias Private Key: 7
2,980,062 UART: [art] Extend RT PCRs Done
2,980,490 UART: [art] Lock RT PCRs Done
2,982,048 UART: [art] Populate DV Done
2,990,288 UART: [fht] FMC Alias Private Key: 7
2,991,428 UART: [art] Derive CDI
2,991,708 UART: [art] Store in in slot 0x4
3,077,149 UART: [art] Derive Key Pair
3,077,509 UART: [art] Store priv key in slot 0x5
3,090,709 UART: [art] Derive Key Pair - Done
3,105,762 UART: [art] Signing Cert with AUTHO
3,106,242 UART: RITY.KEYID = 7
3,121,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,977 UART: [art] PUB.X = DBBE11B8BE5DB2D63ACCAADE466F1A6185DCFEBF7BCC599DB06E752AD2FA5D889465702CA9F696AEDBD6738544DCBBD2
3,128,783 UART: [art] PUB.Y = F753C9FADC6DCDFAD96F6B5D50E09D0349699B8156C9441C91F3ED8EA75C225EDF66325F2EC36F8A338BD5F086B2B465
3,135,746 UART: [art] SIG.R = DF8260CC3EEA48A624C842623813E5F2B457B12DD187867AED32389D331DA38312E9EDD1776CE8EB13E47E9B140FDCE5
3,142,523 UART: [art] SIG.S = DD6774066267CC25186F6AB74310B78951CCB5B48FA6A957F6B0C5C1B45E60F514FB7D4DBF44993EB599971329EA2722
3,166,699 UART: Caliptra RT
3,166,952 UART: [state] CFI Enabled
3,274,997 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,215 UART: [rt]cmd =0x494e464f, len=4
3,308,750 >>> mbox cmd response data (312 bytes)
3,308,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,560 UART:
3,309,576 UART: Running Caliptra ROM ...
3,309,984 UART:
3,310,039 UART: [state] CFI Enabled
3,312,855 UART: [state] LifecycleState = Unprovisioned
3,313,510 UART: [state] DebugLocked = No
3,314,150 UART: [state] WD Timer not started. Device not locked for debugging
3,315,440 UART: [kat] SHA2-256
4,118,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,119 UART: [kat] ++
4,123,271 UART: [kat] sha1
4,127,625 UART: [kat] SHA2-256
4,129,565 UART: [kat] SHA2-384
4,132,414 UART: [kat] SHA2-512-ACC
4,134,314 UART: [kat] ECC-384
4,143,895 UART: [kat] HMAC-384Kdf
4,148,513 UART: [kat] LMS
4,396,825 UART: [kat] --
4,397,877 UART: [update-reset] ++
5,708,527 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,709,560 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,859,138 >>> mbox cmd response: success
5,859,267 UART: [update-reset] Copying MAN_2 To MAN_1
5,867,281 UART: [update-reset Success] --
5,868,246 UART: [state] Locking Datavault
5,869,248 UART: [state] Locking PCR0, PCR1 and PCR31
5,869,852 UART: [state] Locking ICCM
5,870,438 UART: [exit] Launching FMC @ 0x40000130
5,875,767 UART:
5,875,783 UART: Running Caliptra FMC ...
5,876,191 UART:
5,876,245 UART: [state] CFI Enabled
5,965,086 UART: [art] Extend RT PCRs Done
5,965,514 UART: [art] Lock RT PCRs Done
5,967,083 UART: [art] Populate DV Done
5,975,295 UART: [fht] FMC Alias Private Key: 7
5,976,265 UART: [art] Derive CDI
5,976,545 UART: [art] Store in in slot 0x4
6,062,608 UART: [art] Derive Key Pair
6,062,968 UART: [art] Store priv key in slot 0x5
6,075,790 UART: [art] Derive Key Pair - Done
6,090,901 UART: [art] Signing Cert with AUTHO
6,091,381 UART: RITY.KEYID = 7
6,106,519 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,284 UART: [art] PUB.X = 4EAD91350C9845D0D9AE3E342D0F21BF060B19CAC46499A58791C0620954D541F2FC7C073EA62323594F74CB3C014775
6,114,031 UART: [art] PUB.Y = 7699346A8F06BB46B497EE12F76370F0800CAE504FDB331F5A9CD02E3CCA466A1C79C9241246A82332D85F9F8162C7AB
6,120,979 UART: [art] SIG.R = C22295BF6ADC238ACF5114A699539F7EABE1FA917A7E53EC6F1583A5827B5BCAB20D52021ADF4DCDD0B05E05B29B4765
6,127,758 UART: [art] SIG.S = B4969451133AF46445D8B39BDA2F1BA0C095CFB140918BC8FA65DA899CBD973865ECA6F17F65045D48FA85A622A09F03
6,151,123 UART: Caliptra RT
6,151,376 UART: [state] CFI Enabled
6,436,581 UART: [rt] RT listening for mailbox commands...
6,437,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,466,640 UART: [rt]cmd =0x494e464f, len=4
6,470,425 >>> mbox cmd response data (312 bytes)
6,470,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,471,447 UART:
6,471,463 UART: Running Caliptra ROM ...
6,471,871 UART:
6,471,926 UART: [state] CFI Enabled
6,474,156 UART: [state] LifecycleState = Unprovisioned
6,474,811 UART: [state] DebugLocked = No
6,475,315 UART: [state] WD Timer not started. Device not locked for debugging
6,476,657 UART: [kat] SHA2-256
7,280,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,284,336 UART: [kat] ++
7,284,488 UART: [kat] sha1
7,288,882 UART: [kat] SHA2-256
7,290,822 UART: [kat] SHA2-384
7,293,573 UART: [kat] SHA2-512-ACC
7,295,473 UART: [kat] ECC-384
7,305,116 UART: [kat] HMAC-384Kdf
7,309,698 UART: [kat] LMS
7,558,010 UART: [kat] --
7,558,930 UART: [update-reset] ++
8,869,016 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,870,209 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
9,019,787 >>> mbox cmd response: success
9,019,914 UART: [update-reset] Copying MAN_2 To MAN_1
9,027,928 UART: [update-reset Success] --
9,028,785 UART: [state] Locking Datavault
9,029,601 UART: [state] Locking PCR0, PCR1 and PCR31
9,030,205 UART: [state] Locking ICCM
9,030,813 UART: [exit] Launching FMC @ 0x40000130
9,036,142 UART:
9,036,158 UART: Running Caliptra FMC ...
9,036,566 UART:
9,036,620 UART: [state] CFI Enabled
9,125,545 UART: [art] Extend RT PCRs Done
9,125,973 UART: [art] Lock RT PCRs Done
9,127,042 UART: [art] Populate DV Done
9,135,318 UART: [fht] FMC Alias Private Key: 7
9,136,356 UART: [art] Derive CDI
9,136,636 UART: [art] Store in in slot 0x4
9,222,081 UART: [art] Derive Key Pair
9,222,441 UART: [art] Store priv key in slot 0x5
9,235,495 UART: [art] Derive Key Pair - Done
9,250,405 UART: [art] Signing Cert with AUTHO
9,250,885 UART: RITY.KEYID = 7
9,266,101 UART: [art] Erasing AUTHORITY.KEYID = 7
9,266,866 UART: [art] PUB.X = 73169F6B57B91B1BBBDD33D3668773661DC174739FB745278CC20358C4C335262ED1ACA528703B880EFE604E43067B75
9,273,623 UART: [art] PUB.Y = C4DB0576A0BCBF78113EA566AC859A86BF89C304DA72B35B9556F96159761A272EB62759FBB202B5BF4783F0019E5D5A
9,280,567 UART: [art] SIG.R = 338CD6EEDB1FF68D9212035FD211E50D83EF57F2359547B71415EB381E91F09C34E01A0604DD5D65F3910F3A558D760B
9,287,321 UART: [art] SIG.S = D4D7B7D5BD5821850A921F3B11B02BE04746CD563F28E5491EDEC2259E928A45044F7BD28FBC2D2C2E41BCA338BDB70E
9,311,183 UART: Caliptra RT
9,311,436 UART: [state] CFI Enabled
9,592,103 UART: [rt] RT listening for mailbox commands...
9,592,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,622,042 UART: [rt]cmd =0x494e464f, len=4
9,625,931 >>> mbox cmd response data (312 bytes)
9,625,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,626,771 UART:
9,626,787 UART: Running Caliptra ROM ...
9,627,195 UART:
9,627,250 UART: [state] CFI Enabled
9,629,766 UART: [state] LifecycleState = Unprovisioned
9,630,421 UART: [state] DebugLocked = No
9,631,053 UART: [state] WD Timer not started. Device not locked for debugging
9,632,375 UART: [kat] SHA2-256
10,435,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,440,054 UART: [kat] ++
10,440,206 UART: [kat] sha1
10,444,334 UART: [kat] SHA2-256
10,446,274 UART: [kat] SHA2-384
10,448,939 UART: [kat] SHA2-512-ACC
10,450,839 UART: [kat] ECC-384
10,460,538 UART: [kat] HMAC-384Kdf
10,465,156 UART: [kat] LMS
10,713,468 UART: [kat] --
10,714,052 UART: [update-reset] ++
12,024,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,025,907 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
12,175,485 >>> mbox cmd response: success
12,175,694 UART: [update-reset] Copying MAN_2 To MAN_1
12,183,708 UART: [update-reset Success] --
12,184,913 UART: [state] Locking Datavault
12,185,845 UART: [state] Locking PCR0, PCR1 and PCR31
12,186,449 UART: [state] Locking ICCM
12,186,887 UART: [exit] Launching FMC @ 0x40000130
12,192,216 UART:
12,192,232 UART: Running Caliptra FMC ...
12,192,640 UART:
12,192,694 UART: [state] CFI Enabled
12,281,451 UART: [art] Extend RT PCRs Done
12,281,879 UART: [art] Lock RT PCRs Done
12,283,140 UART: [art] Populate DV Done
12,291,650 UART: [fht] FMC Alias Private Key: 7
12,292,750 UART: [art] Derive CDI
12,293,030 UART: [art] Store in in slot 0x4
12,378,579 UART: [art] Derive Key Pair
12,378,939 UART: [art] Store priv key in slot 0x5
12,392,077 UART: [art] Derive Key Pair - Done
12,406,702 UART: [art] Signing Cert with AUTHO
12,407,182 UART: RITY.KEYID = 7
12,422,328 UART: [art] Erasing AUTHORITY.KEYID = 7
12,423,093 UART: [art] PUB.X = 4EAD91350C9845D0D9AE3E342D0F21BF060B19CAC46499A58791C0620954D541F2FC7C073EA62323594F74CB3C014775
12,429,840 UART: [art] PUB.Y = 7699346A8F06BB46B497EE12F76370F0800CAE504FDB331F5A9CD02E3CCA466A1C79C9241246A82332D85F9F8162C7AB
12,436,788 UART: [art] SIG.R = C22295BF6ADC238ACF5114A699539F7EABE1FA917A7E53EC6F1583A5827B5BCAB20D52021ADF4DCDD0B05E05B29B4765
12,443,567 UART: [art] SIG.S = B4969451133AF46445D8B39BDA2F1BA0C095CFB140918BC8FA65DA899CBD973865ECA6F17F65045D48FA85A622A09F03
12,467,328 UART: Caliptra RT
12,467,581 UART: [state] CFI Enabled
12,750,014 UART: [rt] RT listening for mailbox commands...
12,750,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,780,109 UART: [rt]cmd =0x494e464f, len=4
12,783,892 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,694 ready_for_fw is high
1,055,694 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,640 >>> mbox cmd response: success
2,619,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,680,607 UART:
2,680,623 UART: Running Caliptra FMC ...
2,681,031 UART:
2,681,085 UART: [state] CFI Enabled
2,691,553 UART: [fht] FMC Alias Private Key: 7
2,799,536 UART: [art] Extend RT PCRs Done
2,799,964 UART: [art] Lock RT PCRs Done
2,801,436 UART: [art] Populate DV Done
2,809,502 UART: [fht] FMC Alias Private Key: 7
2,810,554 UART: [art] Derive CDI
2,810,834 UART: [art] Store in in slot 0x4
2,896,757 UART: [art] Derive Key Pair
2,897,117 UART: [art] Store priv key in slot 0x5
2,910,143 UART: [art] Derive Key Pair - Done
2,924,534 UART: [art] Signing Cert with AUTHO
2,925,014 UART: RITY.KEYID = 7
2,940,094 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,859 UART: [art] PUB.X = 12A1D1DCECFE23B6FB8932ACA04EA3A81B2F0D44B26C88AB49CEEF40AF1913946B720FD6CEE746E1729FCF90C1E4BC78
2,947,649 UART: [art] PUB.Y = F06AB1FCF6CD7DB822A5A1044E48724F9030EDE13EBF16D1BC34ED8E3AD87A89142F3C2F99E37BD877745608493794C9
2,954,603 UART: [art] SIG.R = 2D5C90BD6C095BBBA54B477BA43B68D701560C9C1A5EB3024A3EB531F8DABEADC1289B767D780F0756247FFCC1A81D90
2,961,371 UART: [art] SIG.S = 20EBC150A0ECD3D20BC46F5300260E7453ECE83D69A495CC71384147398CF3053BC95FDFDD7DF7C662952016F13F9E7A
2,985,409 UART: Caliptra RT
2,985,662 UART: [state] CFI Enabled
3,092,858 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,708 UART: [rt]cmd =0x494e464f, len=4
3,127,577 >>> mbox cmd response data (312 bytes)
3,127,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,556,336 >>> mbox cmd response: success
5,570,112 UART:
5,570,128 UART: Running Caliptra FMC ...
5,570,536 UART:
5,570,590 UART: [state] CFI Enabled
5,659,605 UART: [art] Extend RT PCRs Done
5,660,033 UART: [art] Lock RT PCRs Done
5,661,234 UART: [art] Populate DV Done
5,669,302 UART: [fht] FMC Alias Private Key: 7
5,670,254 UART: [art] Derive CDI
5,670,534 UART: [art] Store in in slot 0x4
5,756,061 UART: [art] Derive Key Pair
5,756,421 UART: [art] Store priv key in slot 0x5
5,769,405 UART: [art] Derive Key Pair - Done
5,784,296 UART: [art] Signing Cert with AUTHO
5,784,776 UART: RITY.KEYID = 7
5,800,402 UART: [art] Erasing AUTHORITY.KEYID = 7
5,801,167 UART: [art] PUB.X = 353E5149CC6AD17FD7302AB72DD0B6E280693E60F04C94FF012660BA9EAF01CCDBD35E95E62CC8BA7DD3D0D18218FE46
5,807,949 UART: [art] PUB.Y = B649F19F08E211161050CE8A8B180CF7A827A0CBFADDB0B5878585D1C3DEADF6B9972B5EACC61695581C0C8E1BF9AC4C
5,814,910 UART: [art] SIG.R = 2797686C651475B254E1F3A0FAB59729CDBBDD12B4368A35E075209ADB90222AFE4C2A50B6CD684B9C83040D94E6CE24
5,821,680 UART: [art] SIG.S = F9B13E5AC7CC1213740400E6D280EF31CA89D71E17E72CA34C45DFACDFFA90B37CFA3C0ADF7811798629D1D839D95A6B
5,845,081 UART: Caliptra RT
5,845,334 UART: [state] CFI Enabled
6,131,457 UART: [rt] RT listening for mailbox commands...
6,132,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,161,406 UART: [rt]cmd =0x494e464f, len=4
6,165,223 >>> mbox cmd response data (312 bytes)
6,165,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,597,554 >>> mbox cmd response: success
8,610,624 UART:
8,610,640 UART: Running Caliptra FMC ...
8,611,048 UART:
8,611,102 UART: [state] CFI Enabled
8,700,205 UART: [art] Extend RT PCRs Done
8,700,633 UART: [art] Lock RT PCRs Done
8,701,724 UART: [art] Populate DV Done
8,709,932 UART: [fht] FMC Alias Private Key: 7
8,710,950 UART: [art] Derive CDI
8,711,230 UART: [art] Store in in slot 0x4
8,796,237 UART: [art] Derive Key Pair
8,796,597 UART: [art] Store priv key in slot 0x5
8,809,953 UART: [art] Derive Key Pair - Done
8,824,663 UART: [art] Signing Cert with AUTHO
8,825,143 UART: RITY.KEYID = 7
8,840,783 UART: [art] Erasing AUTHORITY.KEYID = 7
8,841,548 UART: [art] PUB.X = 5C9D38F872D6F4E7CEF367DE3FE37454B38F9689431348DA67C500720ADB36D9D6A1ED7C26C354F90A9B295E3F1E4753
8,848,296 UART: [art] PUB.Y = B12F5B775AD349F6762664EC12209B448D8EA30F91BC82A35930B430A48729BBD98F67CC7CA8D47AACE27E49B3FCEB27
8,855,255 UART: [art] SIG.R = 614B988AC6D0C9A14E3857EFE556048AFF5B07680C87EAF375B76F5120EA7489907DF2C603D48FCBF2903AE73BA81BFA
8,862,025 UART: [art] SIG.S = 2ECC0263A3194C14DF02ABF4A0FC14D0F0E2D6A09CE398B21BE01178243D5C404B01C02036359CAD71070B91436EE953
8,885,507 UART: Caliptra RT
8,885,760 UART: [state] CFI Enabled
9,167,562 UART: [rt] RT listening for mailbox commands...
9,168,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,197,747 UART: [rt]cmd =0x494e464f, len=4
9,201,452 >>> mbox cmd response data (312 bytes)
9,201,453 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,632,651 >>> mbox cmd response: success
11,645,867 UART:
11,645,883 UART: Running Caliptra FMC ...
11,646,291 UART:
11,646,345 UART: [state] CFI Enabled
11,735,898 UART: [art] Extend RT PCRs Done
11,736,326 UART: [art] Lock RT PCRs Done
11,737,661 UART: [art] Populate DV Done
11,745,903 UART: [fht] FMC Alias Private Key: 7
11,746,839 UART: [art] Derive CDI
11,747,119 UART: [art] Store in in slot 0x4
11,832,616 UART: [art] Derive Key Pair
11,832,976 UART: [art] Store priv key in slot 0x5
11,846,598 UART: [art] Derive Key Pair - Done
11,861,733 UART: [art] Signing Cert with AUTHO
11,862,213 UART: RITY.KEYID = 7
11,877,365 UART: [art] Erasing AUTHORITY.KEYID = 7
11,878,130 UART: [art] PUB.X = 353E5149CC6AD17FD7302AB72DD0B6E280693E60F04C94FF012660BA9EAF01CCDBD35E95E62CC8BA7DD3D0D18218FE46
11,884,912 UART: [art] PUB.Y = B649F19F08E211161050CE8A8B180CF7A827A0CBFADDB0B5878585D1C3DEADF6B9972B5EACC61695581C0C8E1BF9AC4C
11,891,873 UART: [art] SIG.R = 2797686C651475B254E1F3A0FAB59729CDBBDD12B4368A35E075209ADB90222AFE4C2A50B6CD684B9C83040D94E6CE24
11,898,643 UART: [art] SIG.S = F9B13E5AC7CC1213740400E6D280EF31CA89D71E17E72CA34C45DFACDFFA90B37CFA3C0ADF7811798629D1D839D95A6B
11,922,430 UART: Caliptra RT
11,922,683 UART: [state] CFI Enabled
12,208,558 UART: [rt] RT listening for mailbox commands...
12,209,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,238,819 UART: [rt]cmd =0x494e464f, len=4
12,242,376 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.50s
Truncated 1954 bytes from beginning
RT: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,181 UART: [fwproc] Wait for Commands...
1,282,002 UART: [fwproc] Recv command 0x46574c44
1,282,735 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,479 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,119 >>> mbox cmd response: success
2,770,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,771,382 UART: [afmc] ++
2,771,550 UART: [afmc] CDI.KEYID = 6
2,771,913 UART: [afmc] SUBJECT.KEYID = 7
2,772,339 UART: [afmc] AUTHORITY.KEYID = 5
2,808,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,384 UART: [afmc] PUB.X = 09CE272FE9916E00EDFD257E4143E01CB2B289C2E4C9F0F47118F81D75277911CA0911AEA4B9186B7D761F159377BD24
2,831,077 UART: [afmc] PUB.Y = 1EC81BEF0809E3026881F26666B33D60F7F5277ED90C95EA39C361B50D4E93332D52720D5B24558EA1261465FCA09F69
2,836,948 UART: [afmc] SIG.R = 1697CB9218E47DC9CB9E21C2A85A98BA8449336D89E7F0243AC4560535E4D410E65499A60780A3C5D14C1106A9CAA915
2,842,650 UART: [afmc] SIG.S = 50ACB9D1D4C290150AEDC065D3C4FCFA73F383E08A7D1286DBF05CD34039275525E46C42AAFBB608102A23852A204924
2,850,516 UART: [afmc] --
2,851,436 UART: [cold-reset] --
2,852,314 UART: [state] Locking Datavault
2,853,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,211 UART: [state] Locking ICCM
2,854,717 UART: [exit] Launching FMC @ 0x40000130
2,860,046 UART:
2,860,062 UART: Running Caliptra FMC ...
2,860,470 UART:
2,860,613 UART: [state] CFI Enabled
2,871,121 UART: [fht] FMC Alias Private Key: 7
2,978,762 UART: [art] Extend RT PCRs Done
2,979,190 UART: [art] Lock RT PCRs Done
2,980,310 UART: [art] Populate DV Done
2,988,652 UART: [fht] FMC Alias Private Key: 7
2,989,630 UART: [art] Derive CDI
2,989,910 UART: [art] Store in in slot 0x4
3,075,863 UART: [art] Derive Key Pair
3,076,223 UART: [art] Store priv key in slot 0x5
3,089,695 UART: [art] Derive Key Pair - Done
3,104,627 UART: [art] Signing Cert with AUTHO
3,105,107 UART: RITY.KEYID = 7
3,120,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,878 UART: [art] PUB.X = 0EEEF84CC49B5F96F474A7E25EFE21A803F16B74920B1FE5B29BCBC695ED80082F61D13D901A78352C57C72F025ABB0F
3,127,644 UART: [art] PUB.Y = DB87A65869ADDA3478F1C48A9ACA27C769E426CFEA328EBA7627F055944EC3DF614885CA91319F1FFBDA5142593E6223
3,134,604 UART: [art] SIG.R = AFC08CE2F1175DB2EBD54F58C0B856F0FB47DD914D1C8D9960F2FA49CE7E7BB7F8FB504A0FCC2A9AABF4BC45E5DD84F1
3,141,405 UART: [art] SIG.S = CD492FD5A4748E55F3201D698AEB8DEB74EEB30B48A302F69F177C31E4AD100FB1401D9CF7F0A73B3B275709BE866B7A
3,164,982 UART: Caliptra RT
3,165,327 UART: [state] CFI Enabled
3,273,196 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,598 UART: [rt]cmd =0x494e464f, len=4
3,307,375 >>> mbox cmd response data (312 bytes)
3,307,376 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,179 UART:
3,308,195 UART: Running Caliptra ROM ...
3,308,603 UART:
3,308,745 UART: [state] CFI Enabled
3,311,679 UART: [state] LifecycleState = Unprovisioned
3,312,334 UART: [state] DebugLocked = No
3,312,854 UART: [state] WD Timer not started. Device not locked for debugging
3,314,030 UART: [kat] SHA2-256
4,117,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,121,709 UART: [kat] ++
4,121,861 UART: [kat] sha1
4,126,161 UART: [kat] SHA2-256
4,128,101 UART: [kat] SHA2-384
4,130,836 UART: [kat] SHA2-512-ACC
4,132,736 UART: [kat] ECC-384
4,142,699 UART: [kat] HMAC-384Kdf
4,147,131 UART: [kat] LMS
4,395,443 UART: [kat] --
4,396,019 UART: [update-reset] ++
5,707,027 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,708,064 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,857,642 >>> mbox cmd response: success
5,857,835 UART: [update-reset] Copying MAN_2 To MAN_1
5,865,849 UART: [update-reset Success] --
5,866,842 UART: [state] Locking Datavault
5,867,660 UART: [state] Locking PCR0, PCR1 and PCR31
5,868,264 UART: [state] Locking ICCM
5,868,742 UART: [exit] Launching FMC @ 0x40000130
5,874,071 UART:
5,874,087 UART: Running Caliptra FMC ...
5,874,495 UART:
5,874,638 UART: [state] CFI Enabled
5,963,641 UART: [art] Extend RT PCRs Done
5,964,069 UART: [art] Lock RT PCRs Done
5,965,454 UART: [art] Populate DV Done
5,973,850 UART: [fht] FMC Alias Private Key: 7
5,974,790 UART: [art] Derive CDI
5,975,070 UART: [art] Store in in slot 0x4
6,060,559 UART: [art] Derive Key Pair
6,060,919 UART: [art] Store priv key in slot 0x5
6,074,117 UART: [art] Derive Key Pair - Done
6,088,900 UART: [art] Signing Cert with AUTHO
6,089,380 UART: RITY.KEYID = 7
6,104,726 UART: [art] Erasing AUTHORITY.KEYID = 7
6,105,491 UART: [art] PUB.X = 493D034158EBCC0587297C9CC8F590C435812446C6AF4A7733DBD2AD0E84041D798482766A5A52F999C46817783C30C5
6,112,241 UART: [art] PUB.Y = 7D61423055783525B93379870AFA7D4DA188050EB4B27BC78C989B91BE9406F295AF5E09BDD9CF99980D3F31826D04DB
6,119,170 UART: [art] SIG.R = 4D90EA48FC2400F44792E1A77A92ECA8738AA6B946E5A151BDFA3F08EF05F575A0B7EEB9A760E8F0C4778CA731657116
6,125,922 UART: [art] SIG.S = AC977C36E0EB37AEBA1FF59CAFB0A1715815227DA21E889750DED6BAB6CA0F27AC18C24F98ADA3CC2BFD6A2E8A67DAB3
6,149,980 UART: Caliptra RT
6,150,325 UART: [state] CFI Enabled
6,434,156 UART: [rt] RT listening for mailbox commands...
6,434,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,464,351 UART: [rt]cmd =0x494e464f, len=4
6,468,254 >>> mbox cmd response data (312 bytes)
6,468,255 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,469,110 UART:
6,469,126 UART: Running Caliptra ROM ...
6,469,534 UART:
6,469,676 UART: [state] CFI Enabled
6,472,830 UART: [state] LifecycleState = Unprovisioned
6,473,485 UART: [state] DebugLocked = No
6,474,089 UART: [state] WD Timer not started. Device not locked for debugging
6,475,397 UART: [kat] SHA2-256
7,278,947 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,283,076 UART: [kat] ++
7,283,228 UART: [kat] sha1
7,287,646 UART: [kat] SHA2-256
7,289,586 UART: [kat] SHA2-384
7,292,443 UART: [kat] SHA2-512-ACC
7,294,343 UART: [kat] ECC-384
7,303,884 UART: [kat] HMAC-384Kdf
7,308,378 UART: [kat] LMS
7,556,690 UART: [kat] --
7,557,572 UART: [update-reset] ++
8,868,204 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,869,181 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
9,018,759 >>> mbox cmd response: success
9,018,952 UART: [update-reset] Copying MAN_2 To MAN_1
9,026,966 UART: [update-reset Success] --
9,028,023 UART: [state] Locking Datavault
9,028,871 UART: [state] Locking PCR0, PCR1 and PCR31
9,029,475 UART: [state] Locking ICCM
9,030,045 UART: [exit] Launching FMC @ 0x40000130
9,035,374 UART:
9,035,390 UART: Running Caliptra FMC ...
9,035,798 UART:
9,035,941 UART: [state] CFI Enabled
9,124,962 UART: [art] Extend RT PCRs Done
9,125,390 UART: [art] Lock RT PCRs Done
9,126,871 UART: [art] Populate DV Done
9,134,829 UART: [fht] FMC Alias Private Key: 7
9,135,815 UART: [art] Derive CDI
9,136,095 UART: [art] Store in in slot 0x4
9,222,224 UART: [art] Derive Key Pair
9,222,584 UART: [art] Store priv key in slot 0x5
9,235,990 UART: [art] Derive Key Pair - Done
9,251,024 UART: [art] Signing Cert with AUTHO
9,251,504 UART: RITY.KEYID = 7
9,266,736 UART: [art] Erasing AUTHORITY.KEYID = 7
9,267,501 UART: [art] PUB.X = 0F4802199292386C7F38E5167814A0EC7CA5C94411DDDCE1558B7FC785F30480848CD2F84409C7F40391092CD0C1FC71
9,274,249 UART: [art] PUB.Y = 4EF5FFBC48908D9BDA68376F84EBFD61FA336BA9D3FD9087CF23BF2B7975386512851ABB1ED01606258B9738D5C864EC
9,281,208 UART: [art] SIG.R = 895EA04B6E0950071DF17345B1D892786BC9304167731C4DB8C606A3B1CF4B5EFD1816D406543E43627D344562EB3189
9,287,958 UART: [art] SIG.S = 5866D5E05120C05EAC3AC932AD695761A33C5880AE1ADB78775D9B30862FD1CB021B00718918D237F8379B8B61D6CF58
9,311,500 UART: Caliptra RT
9,311,845 UART: [state] CFI Enabled
9,592,130 UART: [rt] RT listening for mailbox commands...
9,592,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,622,453 UART: [rt]cmd =0x494e464f, len=4
9,626,264 >>> mbox cmd response data (312 bytes)
9,626,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,627,010 UART:
9,627,026 UART: Running Caliptra ROM ...
9,627,434 UART:
9,627,576 UART: [state] CFI Enabled
9,630,246 UART: [state] LifecycleState = Unprovisioned
9,630,901 UART: [state] DebugLocked = No
9,631,551 UART: [state] WD Timer not started. Device not locked for debugging
9,632,889 UART: [kat] SHA2-256
10,436,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,440,568 UART: [kat] ++
10,440,720 UART: [kat] sha1
10,445,102 UART: [kat] SHA2-256
10,447,042 UART: [kat] SHA2-384
10,449,653 UART: [kat] SHA2-512-ACC
10,451,553 UART: [kat] ECC-384
10,461,194 UART: [kat] HMAC-384Kdf
10,465,986 UART: [kat] LMS
10,714,298 UART: [kat] --
10,715,096 UART: [update-reset] ++
12,026,658 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,027,861 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
12,177,439 >>> mbox cmd response: success
12,177,600 UART: [update-reset] Copying MAN_2 To MAN_1
12,185,614 UART: [update-reset Success] --
12,186,507 UART: [state] Locking Datavault
12,187,411 UART: [state] Locking PCR0, PCR1 and PCR31
12,188,015 UART: [state] Locking ICCM
12,188,565 UART: [exit] Launching FMC @ 0x40000130
12,193,894 UART:
12,193,910 UART: Running Caliptra FMC ...
12,194,318 UART:
12,194,461 UART: [state] CFI Enabled
12,283,358 UART: [art] Extend RT PCRs Done
12,283,786 UART: [art] Lock RT PCRs Done
12,285,141 UART: [art] Populate DV Done
12,293,249 UART: [fht] FMC Alias Private Key: 7
12,294,241 UART: [art] Derive CDI
12,294,521 UART: [art] Store in in slot 0x4
12,380,600 UART: [art] Derive Key Pair
12,380,960 UART: [art] Store priv key in slot 0x5
12,394,604 UART: [art] Derive Key Pair - Done
12,409,367 UART: [art] Signing Cert with AUTHO
12,409,847 UART: RITY.KEYID = 7
12,425,257 UART: [art] Erasing AUTHORITY.KEYID = 7
12,426,022 UART: [art] PUB.X = 493D034158EBCC0587297C9CC8F590C435812446C6AF4A7733DBD2AD0E84041D798482766A5A52F999C46817783C30C5
12,432,772 UART: [art] PUB.Y = 7D61423055783525B93379870AFA7D4DA188050EB4B27BC78C989B91BE9406F295AF5E09BDD9CF99980D3F31826D04DB
12,439,701 UART: [art] SIG.R = 4D90EA48FC2400F44792E1A77A92ECA8738AA6B946E5A151BDFA3F08EF05F575A0B7EEB9A760E8F0C4778CA731657116
12,446,453 UART: [art] SIG.S = AC977C36E0EB37AEBA1FF59CAFB0A1715815227DA21E889750DED6BAB6CA0F27AC18C24F98ADA3CC2BFD6A2E8A67DAB3
12,470,531 UART: Caliptra RT
12,470,876 UART: [state] CFI Enabled
12,751,821 UART: [rt] RT listening for mailbox commands...
12,752,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,781,986 UART: [rt]cmd =0x494e464f, len=4
12,785,671 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,883 ready_for_fw is high
1,055,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,101 >>> mbox cmd response: success
2,621,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,683,048 UART:
2,683,064 UART: Running Caliptra FMC ...
2,683,472 UART:
2,683,615 UART: [state] CFI Enabled
2,694,067 UART: [fht] FMC Alias Private Key: 7
2,802,058 UART: [art] Extend RT PCRs Done
2,802,486 UART: [art] Lock RT PCRs Done
2,804,016 UART: [art] Populate DV Done
2,812,338 UART: [fht] FMC Alias Private Key: 7
2,813,416 UART: [art] Derive CDI
2,813,696 UART: [art] Store in in slot 0x4
2,899,461 UART: [art] Derive Key Pair
2,899,821 UART: [art] Store priv key in slot 0x5
2,913,333 UART: [art] Derive Key Pair - Done
2,928,123 UART: [art] Signing Cert with AUTHO
2,928,603 UART: RITY.KEYID = 7
2,943,527 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,292 UART: [art] PUB.X = 29A2A6C606E9789B671C1F66D396C092638DB19D9BAABEE32F9DE056EC929C6E7D94A8BB69F4539A8299952802D50286
2,951,055 UART: [art] PUB.Y = 707EDB8256305D9C5D5B407C3FD0A69A80AC300632F0EE41A3A28B0E3A5816F06165F8B48581C97736710EC190C8ECB7
2,957,998 UART: [art] SIG.R = EC4F3510CEC12E9AF08410BF2F3888D2E46016B87570BDA6A77EC31F2A48C4E817E83688CDBFD78D2CAD82B4B4D87BE8
2,964,786 UART: [art] SIG.S = 3798EFC47EA75BBE8E5409A089074D7514A5DE8AD6B21D903103A23910AC3B232B380582AB6407823973A37947001897
2,988,196 UART: Caliptra RT
2,988,541 UART: [state] CFI Enabled
3,096,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,796 UART: [rt]cmd =0x494e464f, len=4
3,130,597 >>> mbox cmd response data (312 bytes)
3,130,598 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,560,971 >>> mbox cmd response: success
5,574,683 UART:
5,574,699 UART: Running Caliptra FMC ...
5,575,107 UART:
5,575,250 UART: [state] CFI Enabled
5,664,327 UART: [art] Extend RT PCRs Done
5,664,755 UART: [art] Lock RT PCRs Done
5,665,996 UART: [art] Populate DV Done
5,674,412 UART: [fht] FMC Alias Private Key: 7
5,675,364 UART: [art] Derive CDI
5,675,644 UART: [art] Store in in slot 0x4
5,761,251 UART: [art] Derive Key Pair
5,761,611 UART: [art] Store priv key in slot 0x5
5,774,557 UART: [art] Derive Key Pair - Done
5,789,321 UART: [art] Signing Cert with AUTHO
5,789,801 UART: RITY.KEYID = 7
5,805,271 UART: [art] Erasing AUTHORITY.KEYID = 7
5,806,036 UART: [art] PUB.X = 3489D94A00E7D399B9ACE24F308EE35D214C78FF11AA2FD1714D52C4B41DB439FFAEA25F152551A53B7D5A4FD6DFAE98
5,812,802 UART: [art] PUB.Y = 29BDA313A3B47ECC39C735718752DD531AD2AD41B25BEEFB286DF27E0D3010798A2894D1167952EAC3426E9A8C29B48C
5,819,757 UART: [art] SIG.R = 302D3482CFD5147C75E9EFBE08A166282C1190BB421CB9FC05C13247242A14AD664AD057A87CC27DC3EECB916CA4AF66
5,826,533 UART: [art] SIG.S = 76E63CB31E77E7B24732C1A699FAFD9D386120134A4DBFA7524ACA461BDAE6BB4DECBE9FFB34150F87D5CD8531B5CF18
5,850,049 UART: Caliptra RT
5,850,394 UART: [state] CFI Enabled
6,129,326 UART: [rt] RT listening for mailbox commands...
6,129,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,159,557 UART: [rt]cmd =0x494e464f, len=4
6,163,322 >>> mbox cmd response data (312 bytes)
6,163,323 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,594,222 >>> mbox cmd response: success
8,607,264 UART:
8,607,280 UART: Running Caliptra FMC ...
8,607,688 UART:
8,607,831 UART: [state] CFI Enabled
8,697,414 UART: [art] Extend RT PCRs Done
8,697,842 UART: [art] Lock RT PCRs Done
8,699,415 UART: [art] Populate DV Done
8,707,401 UART: [fht] FMC Alias Private Key: 7
8,708,387 UART: [art] Derive CDI
8,708,667 UART: [art] Store in in slot 0x4
8,794,596 UART: [art] Derive Key Pair
8,794,956 UART: [art] Store priv key in slot 0x5
8,808,602 UART: [art] Derive Key Pair - Done
8,823,491 UART: [art] Signing Cert with AUTHO
8,823,971 UART: RITY.KEYID = 7
8,838,713 UART: [art] Erasing AUTHORITY.KEYID = 7
8,839,478 UART: [art] PUB.X = 753628F96BB60A08E37AA4EA988D1B42AA5696C2899C14866264FEA4F96C8CBF18F1F150C652C7781D4FFADB29E0D374
8,846,250 UART: [art] PUB.Y = D80618135B7BB7AE613C95422E1389EBC427E06D1108B4348F2F7FA17C7E04E6B1C329EFC8CA151B6FE53938751DF677
8,853,195 UART: [art] SIG.R = 1ACAFB61591CFFC4D1A858957F7D34D498B194A0EF7E004800BA16C3D76B8D3A51379B503D2E03C05E7C17B5A40C5497
8,859,923 UART: [art] SIG.S = 80A78163A6158AC88FC098B8AF3F3556127D39FB3E6758C7318F36120AFEB359CBEE566A57512E0C778BE971575F2E1B
8,883,180 UART: Caliptra RT
8,883,525 UART: [state] CFI Enabled
9,166,296 UART: [rt] RT listening for mailbox commands...
9,166,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
9,196,637 UART: [rt]cmd =0x494e464f, len=4
9,200,432 >>> mbox cmd response data (312 bytes)
9,200,433 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
11,632,632 >>> mbox cmd response: success
11,645,680 UART:
11,645,696 UART: Running Caliptra FMC ...
11,646,104 UART:
11,646,247 UART: [state] CFI Enabled
11,735,030 UART: [art] Extend RT PCRs Done
11,735,458 UART: [art] Lock RT PCRs Done
11,736,603 UART: [art] Populate DV Done
11,744,995 UART: [fht] FMC Alias Private Key: 7
11,746,069 UART: [art] Derive CDI
11,746,349 UART: [art] Store in in slot 0x4
11,832,248 UART: [art] Derive Key Pair
11,832,608 UART: [art] Store priv key in slot 0x5
11,845,830 UART: [art] Derive Key Pair - Done
11,860,408 UART: [art] Signing Cert with AUTHO
11,860,888 UART: RITY.KEYID = 7
11,876,266 UART: [art] Erasing AUTHORITY.KEYID = 7
11,877,031 UART: [art] PUB.X = 3489D94A00E7D399B9ACE24F308EE35D214C78FF11AA2FD1714D52C4B41DB439FFAEA25F152551A53B7D5A4FD6DFAE98
11,883,797 UART: [art] PUB.Y = 29BDA313A3B47ECC39C735718752DD531AD2AD41B25BEEFB286DF27E0D3010798A2894D1167952EAC3426E9A8C29B48C
11,890,752 UART: [art] SIG.R = 302D3482CFD5147C75E9EFBE08A166282C1190BB421CB9FC05C13247242A14AD664AD057A87CC27DC3EECB916CA4AF66
11,897,528 UART: [art] SIG.S = 76E63CB31E77E7B24732C1A699FAFD9D386120134A4DBFA7524ACA461BDAE6BB4DECBE9FFB34150F87D5CD8531B5CF18
11,921,398 UART: Caliptra RT
11,921,743 UART: [state] CFI Enabled
12,202,961 UART: [rt] RT listening for mailbox commands...
12,203,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,233,444 UART: [rt]cmd =0x494e464f, len=4
12,237,341 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
191,996 UART:
192,347 UART: Running Caliptra ROM ...
193,551 UART:
193,704 UART: [state] CFI Enabled
263,812 UART: [state] LifecycleState = Unprovisioned
265,731 UART: [state] DebugLocked = No
268,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,114 UART: [kat] SHA2-256
441,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,360 UART: [kat] ++
452,842 UART: [kat] sha1
463,290 UART: [kat] SHA2-256
465,988 UART: [kat] SHA2-384
472,627 UART: [kat] SHA2-512-ACC
474,988 UART: [kat] ECC-384
2,766,883 UART: [kat] HMAC-384Kdf
2,797,751 UART: [kat] LMS
3,987,993 UART: [kat] --
3,994,156 UART: [cold-reset] ++
3,996,802 UART: [fht] Storing FHT @ 0x50003400
4,008,128 UART: [idev] ++
4,008,687 UART: [idev] CDI.KEYID = 6
4,009,663 UART: [idev] SUBJECT.KEYID = 7
4,010,915 UART: [idev] UDS.KEYID = 0
4,011,889 ready_for_fw is high
4,012,074 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,245 UART: [idev] Erasing UDS.KEYID = 0
7,337,266 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,010 UART: [idev] --
7,364,685 UART: [ldev] ++
7,365,256 UART: [ldev] CDI.KEYID = 6
7,366,215 UART: [ldev] SUBJECT.KEYID = 5
7,367,417 UART: [ldev] AUTHORITY.KEYID = 7
7,368,699 UART: [ldev] FE.KEYID = 1
7,414,086 UART: [ldev] Erasing FE.KEYID = 1
10,746,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,038,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,082,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,648 UART: [ldev] --
13,106,078 UART: [fwproc] Waiting for Commands...
13,109,252 UART: [fwproc] Received command 0x46574c44
13,111,426 UART: [fwproc] Received Image of size 113844 bytes
17,156,710 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,953 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,615,858 >>> mbox cmd response: success
17,616,385 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,619,858 UART: [afmc] ++
17,620,457 UART: [afmc] CDI.KEYID = 6
17,621,359 UART: [afmc] SUBJECT.KEYID = 7
17,622,621 UART: [afmc] AUTHORITY.KEYID = 5
20,976,941 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,277,634 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,279,943 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,294,336 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,309,172 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,323,591 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,345,470 UART: [afmc] --
23,349,639 UART: [cold-reset] --
23,353,999 UART: [state] Locking Datavault
23,358,323 UART: [state] Locking PCR0, PCR1 and PCR31
23,360,071 UART: [state] Locking ICCM
23,362,162 UART: [exit] Launching FMC @ 0x40000130
23,370,550 UART:
23,370,805 UART: Running Caliptra FMC ...
23,371,902 UART:
23,372,061 UART: [state] CFI Enabled
23,437,844 UART: [fht] FMC Alias Private Key: 7
25,776,330 UART: [art] Extend RT PCRs Done
25,777,555 UART: [art] Lock RT PCRs Done
25,779,069 UART: [art] Populate DV Done
25,784,531 UART: [fht] FMC Alias Private Key: 7
25,786,273 UART: [art] Derive CDI
25,787,000 UART: [art] Store in in slot 0x4
25,846,546 UART: [art] Derive Key Pair
25,847,578 UART: [art] Store priv key in slot 0x5
29,141,072 UART: [art] Derive Key Pair - Done
29,154,120 UART: [art] Signing Cert with AUTHO
29,155,416 UART: RITY.KEYID = 7
31,443,023 UART: [art] Erasing AUTHORITY.KEYID = 7
31,444,547 UART: [art] PUB.X = 5DEAE51C2397329F44E805AFBB600977C268113306623A8DAEC37325E8654A2748FB930DAF368D59EF71E76EF14C5D51
31,451,780 UART: [art] PUB.Y = FD3F2DF35D9B9DA9D233D02BF0C832D7A1F04536B27D9080205E3AECCEC320DF0D059C745F36299A45764D5B64C58AAF
31,459,004 UART: [art] SIG.R = 0656982E6838B52DDB491BE7D6F913621F009A17512E2C9A9B1C82A114F28BCAD4C991F53856673510EC3C78906AFEED
31,466,393 UART: [art] SIG.S = BEFAD914766C2A1006C0DF55B745F0AF6E5498D5B7EF42884ED5C1CC306D38F75BE15A1BA6B465B33ED7FC2990B68AF0
32,770,833 UART: Caliptra RT
32,771,526 UART: [state] CFI Enabled
32,933,073 UART: [rt] RT listening for mailbox commands...
32,964,175 UART: [rt]cmd =0x49444549, len=4
32,966,917 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,804,892 ready_for_fw is high
3,805,302 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,885,756 >>> mbox cmd response: success
17,886,334 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,587,787 UART:
23,588,160 UART: Running Caliptra FMC ...
23,589,258 UART:
23,589,406 UART: [state] CFI Enabled
23,653,689 UART: [fht] FMC Alias Private Key: 7
25,991,076 UART: [art] Extend RT PCRs Done
25,992,305 UART: [art] Lock RT PCRs Done
25,993,827 UART: [art] Populate DV Done
25,999,230 UART: [fht] FMC Alias Private Key: 7
26,000,869 UART: [art] Derive CDI
26,001,685 UART: [art] Store in in slot 0x4
26,062,315 UART: [art] Derive Key Pair
26,063,310 UART: [art] Store priv key in slot 0x5
29,356,543 UART: [art] Derive Key Pair - Done
29,369,437 UART: [art] Signing Cert with AUTHO
29,370,736 UART: RITY.KEYID = 7
31,657,766 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,271 UART: [art] PUB.X = 79FEB7483B6C6E19F902778C655D5B992423B1B324BB9AACC2B30F201444EC70ED11222BB04F27AB50748B41F7529A36
31,666,519 UART: [art] PUB.Y = 50C62A98B2EC6C7D0165F0B081A3631592E1D755C11703752EB63AB489203003D46975026A4F955D220F29450CC71373
31,673,725 UART: [art] SIG.R = 8AE9001D56A341EE16EC4192B73C0FD03966BE887C89C94DBB4B20738DC1578B746BE7A92FECDDA77023D8FCBF943A92
31,681,154 UART: [art] SIG.S = B181FE73FED7BF59E5EE882FA27E69B55CDFAF8BD9B8EFCAD06C973DCC307E0FCECBB2060C0CEBA1D57D1DD905A87DF5
32,986,790 UART: Caliptra RT
32,987,506 UART: [state] CFI Enabled
33,148,804 UART: [rt] RT listening for mailbox commands...
33,180,012 UART: [rt]cmd =0x49444549, len=4
33,182,783 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,511 UART:
192,876 UART: Running Caliptra ROM ...
193,984 UART:
603,481 UART: [state] CFI Enabled
616,794 UART: [state] LifecycleState = Unprovisioned
618,669 UART: [state] DebugLocked = No
620,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,697 UART: [kat] SHA2-256
795,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,963 UART: [kat] ++
806,484 UART: [kat] sha1
816,895 UART: [kat] SHA2-256
819,591 UART: [kat] SHA2-384
824,952 UART: [kat] SHA2-512-ACC
827,322 UART: [kat] ECC-384
3,112,076 UART: [kat] HMAC-384Kdf
3,124,597 UART: [kat] LMS
4,314,662 UART: [kat] --
4,318,297 UART: [cold-reset] ++
4,319,734 UART: [fht] Storing FHT @ 0x50003400
4,331,588 UART: [idev] ++
4,332,196 UART: [idev] CDI.KEYID = 6
4,333,113 UART: [idev] SUBJECT.KEYID = 7
4,334,380 UART: [idev] UDS.KEYID = 0
4,335,433 ready_for_fw is high
4,335,644 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,482 UART: [idev] Erasing UDS.KEYID = 0
7,620,738 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,333 UART: [idev] --
7,646,169 UART: [ldev] ++
7,646,744 UART: [ldev] CDI.KEYID = 6
7,647,709 UART: [ldev] SUBJECT.KEYID = 5
7,648,927 UART: [ldev] AUTHORITY.KEYID = 7
7,650,161 UART: [ldev] FE.KEYID = 1
7,658,863 UART: [ldev] Erasing FE.KEYID = 1
10,946,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,206 UART: [ldev] --
13,306,424 UART: [fwproc] Waiting for Commands...
13,309,816 UART: [fwproc] Received command 0x46574c44
13,312,052 UART: [fwproc] Received Image of size 113844 bytes
17,355,944 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,817,215 >>> mbox cmd response: success
17,817,708 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,821,962 UART: [afmc] ++
17,822,553 UART: [afmc] CDI.KEYID = 6
17,823,497 UART: [afmc] SUBJECT.KEYID = 7
17,824,715 UART: [afmc] AUTHORITY.KEYID = 5
21,142,091 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,435,503 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,437,769 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,172 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,466,988 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,481,414 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,502,028 UART: [afmc] --
23,505,097 UART: [cold-reset] --
23,510,366 UART: [state] Locking Datavault
23,517,393 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,150 UART: [state] Locking ICCM
23,520,219 UART: [exit] Launching FMC @ 0x40000130
23,528,633 UART:
23,528,907 UART: Running Caliptra FMC ...
23,530,016 UART:
23,530,182 UART: [state] CFI Enabled
23,538,609 UART: [fht] FMC Alias Private Key: 7
25,868,964 UART: [art] Extend RT PCRs Done
25,870,200 UART: [art] Lock RT PCRs Done
25,871,986 UART: [art] Populate DV Done
25,877,666 UART: [fht] FMC Alias Private Key: 7
25,879,205 UART: [art] Derive CDI
25,879,968 UART: [art] Store in in slot 0x4
25,922,342 UART: [art] Derive Key Pair
25,923,343 UART: [art] Store priv key in slot 0x5
29,165,308 UART: [art] Derive Key Pair - Done
29,178,238 UART: [art] Signing Cert with AUTHO
29,179,538 UART: RITY.KEYID = 7
31,459,062 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,575 UART: [art] PUB.X = C98F2BC4A54433B0A06C6FA4B20FB0E27EBFE3138F3EFE0CEB4B9CB185697ABE16A34A4CBA89C82E9686B90CEE409015
31,467,832 UART: [art] PUB.Y = 5EC95750985EFF26309D42C3AA64968913C462270EAE5E685B1DE53530DC62133E0353C400E1E0B78BD565B7383BEB54
31,475,083 UART: [art] SIG.R = 588731CA31AEB5B2F25CB639DD137A945AA8DFA4B0286F0966D944ECB6CAF51499B69AF577632256BDC97DE33D3EF567
31,482,475 UART: [art] SIG.S = 62B866D74374C32A76EC90F9FF0149125FAAC97BA44227C0E92946B28AAC6E075B6E1A4C9AF83AA865E23EA75839DFFC
32,787,476 UART: Caliptra RT
32,788,209 UART: [state] CFI Enabled
32,905,975 UART: [rt] RT listening for mailbox commands...
32,937,282 UART: [rt]cmd =0x49444549, len=4
32,939,937 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,126,777 ready_for_fw is high
4,127,178 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,069,353 >>> mbox cmd response: success
18,069,949 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,718,354 UART:
23,718,757 UART: Running Caliptra FMC ...
23,719,970 UART:
23,720,144 UART: [state] CFI Enabled
23,728,310 UART: [fht] FMC Alias Private Key: 7
26,059,118 UART: [art] Extend RT PCRs Done
26,060,344 UART: [art] Lock RT PCRs Done
26,061,979 UART: [art] Populate DV Done
26,067,236 UART: [fht] FMC Alias Private Key: 7
26,068,737 UART: [art] Derive CDI
26,069,510 UART: [art] Store in in slot 0x4
26,112,051 UART: [art] Derive Key Pair
26,113,062 UART: [art] Store priv key in slot 0x5
29,355,189 UART: [art] Derive Key Pair - Done
29,367,976 UART: [art] Signing Cert with AUTHO
29,369,286 UART: RITY.KEYID = 7
31,648,347 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,874 UART: [art] PUB.X = E939D0D73A68B3C930FF3FD1446A7EB83C0075F1DD7554CEB8DFF0717E8EB7FAF63D580DAED81D2EB3157BF93343AD7D
31,657,155 UART: [art] PUB.Y = 4D45182452759D4BE543E1933AFE37D0186F403B9DCE0B85500D2EC456E69499CC3CA84E371D44A7BA2A5C0C7EFF7F5D
31,664,398 UART: [art] SIG.R = 41BD260EAE3028E5A64227AF2171D3865CCCBE0F7D0112E5ADA4D07C59AAFBF63E332D5B253AC461A0A7E4316508E01D
31,671,808 UART: [art] SIG.S = E9563A11FDDF8B1B3BE314DEE6096E83CA1E951117B8B9D78A9739812E4662E478B1073D5E892F0576C4A21103385AEE
32,977,420 UART: Caliptra RT
32,978,146 UART: [state] CFI Enabled
33,095,313 UART: [rt] RT listening for mailbox commands...
33,126,572 UART: [rt]cmd =0x49444549, len=4
33,129,393 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,224 UART:
192,594 UART: Running Caliptra ROM ...
193,786 UART:
193,943 UART: [state] CFI Enabled
259,706 UART: [state] LifecycleState = Unprovisioned
261,553 UART: [state] DebugLocked = No
263,514 UART: [state] WD Timer not started. Device not locked for debugging
267,983 UART: [kat] SHA2-256
447,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,651 UART: [kat] ++
459,099 UART: [kat] sha1
470,856 UART: [kat] SHA2-256
473,912 UART: [kat] SHA2-384
480,690 UART: [kat] SHA2-512-ACC
483,628 UART: [kat] ECC-384
2,928,349 UART: [kat] HMAC-384Kdf
2,951,562 UART: [kat] LMS
3,481,026 UART: [kat] --
3,485,810 UART: [cold-reset] ++
3,487,674 UART: [fht] FHT @ 0x50003400
3,497,941 UART: [idev] ++
3,498,507 UART: [idev] CDI.KEYID = 6
3,499,470 UART: [idev] SUBJECT.KEYID = 7
3,500,577 UART: [idev] UDS.KEYID = 0
3,501,626 ready_for_fw is high
3,501,829 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,645,415 UART: [idev] Erasing UDS.KEYID = 0
6,007,387 UART: [idev] Sha1 KeyId Algorithm
6,029,761 UART: [idev] --
6,033,275 UART: [ldev] ++
6,033,852 UART: [ldev] CDI.KEYID = 6
6,034,764 UART: [ldev] SUBJECT.KEYID = 5
6,035,936 UART: [ldev] AUTHORITY.KEYID = 7
6,037,230 UART: [ldev] FE.KEYID = 1
6,080,241 UART: [ldev] Erasing FE.KEYID = 1
8,584,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,758 UART: [ldev] --
10,394,304 UART: [fwproc] Wait for Commands...
10,397,003 UART: [fwproc] Recv command 0x46574c44
10,399,102 UART: [fwproc] Recv'd Img size: 114168 bytes
13,811,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,882,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,756 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,268,821 >>> mbox cmd response: success
14,269,355 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,272,954 UART: [afmc] ++
14,273,535 UART: [afmc] CDI.KEYID = 6
14,274,419 UART: [afmc] SUBJECT.KEYID = 7
14,275,632 UART: [afmc] AUTHORITY.KEYID = 5
16,806,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,447 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,480 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,213 UART: [afmc] --
18,610,481 UART: [cold-reset] --
18,614,393 UART: [state] Locking Datavault
18,619,265 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,937 UART: [state] Locking ICCM
18,623,587 UART: [exit] Launching FMC @ 0x40000130
18,631,984 UART:
18,632,263 UART: Running Caliptra FMC ...
18,633,373 UART:
18,633,532 UART: [state] CFI Enabled
18,692,561 UART: [fht] FMC Alias Private Key: 7
20,456,678 UART: [art] Extend RT PCRs Done
20,457,897 UART: [art] Lock RT PCRs Done
20,459,639 UART: [art] Populate DV Done
20,464,889 UART: [fht] FMC Alias Private Key: 7
20,466,610 UART: [art] Derive CDI
20,467,374 UART: [art] Store in in slot 0x4
20,524,774 UART: [art] Derive Key Pair
20,525,774 UART: [art] Store priv key in slot 0x5
22,989,075 UART: [art] Derive Key Pair - Done
23,001,940 UART: [art] Signing Cert with AUTHO
23,003,254 UART: RITY.KEYID = 7
24,715,109 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,619 UART: [art] PUB.X = 7F3572F9A131048503076C37B543115D29BB306B8147830E7E85BA2C9A8747F994C074845205CC510A32D9F9B50DC44A
24,723,899 UART: [art] PUB.Y = 3E52331C866C88C0AB9D798F502AE719D90E048682D21CAEE4CF12D1C40038D1BB693F03A24096A04F5086E2557E61F1
24,731,098 UART: [art] SIG.R = FFAA22D7BE6965107B534E86D12F30CCF91CB9684FFA7635835DD54BF78CF7ED7E3A8FFF0ACC4B56B77CE3FA93189FC5
24,738,523 UART: [art] SIG.S = CB88EBAE2C8E978C242695B80C660A5060F616F0E5BC9206D29CE4E6C6FDF691C6863A7CEB2A468930B559177E29806D
25,717,479 UART: Caliptra RT
25,718,194 UART: [state] CFI Enabled
25,883,234 UART: [rt] RT listening for mailbox commands...
25,914,595 UART: [rt]cmd =0x49444549, len=4
25,917,610 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,380,183 ready_for_fw is high
3,380,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,092,136 >>> mbox cmd response: success
14,092,759 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,386,723 UART:
18,387,106 UART: Running Caliptra FMC ...
18,388,301 UART:
18,388,495 UART: [state] CFI Enabled
18,455,417 UART: [fht] FMC Alias Private Key: 7
20,219,786 UART: [art] Extend RT PCRs Done
20,221,021 UART: [art] Lock RT PCRs Done
20,222,956 UART: [art] Populate DV Done
20,228,241 UART: [fht] FMC Alias Private Key: 7
20,229,913 UART: [art] Derive CDI
20,230,654 UART: [art] Store in in slot 0x4
20,288,155 UART: [art] Derive Key Pair
20,289,151 UART: [art] Store priv key in slot 0x5
22,751,776 UART: [art] Derive Key Pair - Done
22,764,615 UART: [art] Signing Cert with AUTHO
22,765,925 UART: RITY.KEYID = 7
24,478,056 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,559 UART: [art] PUB.X = 67DB6B1CCD0EA47FD8A29AE8FA6D71F7E247FD1EB12AE5184B8BBAA97F0AFA236415BBF408566E2C2C563AFFCDF0ACD9
24,486,858 UART: [art] PUB.Y = 94246C0C37B1C19DC4330F620CA207E84D3AAD923DCCCDE9A7787C143C04BA6AD8F6A1631527BFEB7823953EE6EB70DA
24,494,120 UART: [art] SIG.R = 7EF87EC3208D6D7DAD2D8F36A72A606BEF271E4CCA2F60D4AEE1F5F03FB0A64D0C23BB2A9B97BEC3C4EF3A02BFDE69BB
24,501,568 UART: [art] SIG.S = 9D5CA0565B9001D813B24578085B2A1FBD2CA4D00F0AAFAE71884710C1BC9D7A57710B9063055D5F370C9BB6093A86EE
25,480,379 UART: Caliptra RT
25,481,082 UART: [state] CFI Enabled
25,646,934 UART: [rt] RT listening for mailbox commands...
25,678,001 UART: [rt]cmd =0x49444549, len=4
25,680,773 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,715 writing to cptra_bootfsm_go
192,939 UART:
193,305 UART: Running Caliptra ROM ...
194,452 UART:
603,961 UART: [state] CFI Enabled
618,280 UART: [state] LifecycleState = Unprovisioned
620,153 UART: [state] DebugLocked = No
622,749 UART: [state] WD Timer not started. Device not locked for debugging
627,280 UART: [kat] SHA2-256
806,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,958 UART: [kat] ++
818,494 UART: [kat] sha1
830,581 UART: [kat] SHA2-256
833,595 UART: [kat] SHA2-384
839,036 UART: [kat] SHA2-512-ACC
842,008 UART: [kat] ECC-384
3,280,745 UART: [kat] HMAC-384Kdf
3,292,662 UART: [kat] LMS
3,822,196 UART: [kat] --
3,825,189 UART: [cold-reset] ++
3,827,190 UART: [fht] FHT @ 0x50003400
3,839,110 UART: [idev] ++
3,839,676 UART: [idev] CDI.KEYID = 6
3,840,636 UART: [idev] SUBJECT.KEYID = 7
3,841,811 UART: [idev] UDS.KEYID = 0
3,842,717 ready_for_fw is high
3,842,920 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,759 UART: [idev] Erasing UDS.KEYID = 0
6,311,064 UART: [idev] Sha1 KeyId Algorithm
6,333,745 UART: [idev] --
6,337,626 UART: [ldev] ++
6,338,198 UART: [ldev] CDI.KEYID = 6
6,339,105 UART: [ldev] SUBJECT.KEYID = 5
6,340,261 UART: [ldev] AUTHORITY.KEYID = 7
6,341,543 UART: [ldev] FE.KEYID = 1
6,353,374 UART: [ldev] Erasing FE.KEYID = 1
8,830,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,977 UART: [ldev] --
10,620,356 UART: [fwproc] Wait for Commands...
10,623,373 UART: [fwproc] Recv command 0x46574c44
10,625,464 UART: [fwproc] Recv'd Img size: 114168 bytes
14,019,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,086,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,155,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,473,100 >>> mbox cmd response: success
14,473,620 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,477,541 UART: [afmc] ++
14,478,122 UART: [afmc] CDI.KEYID = 6
14,479,003 UART: [afmc] SUBJECT.KEYID = 7
14,480,239 UART: [afmc] AUTHORITY.KEYID = 5
16,978,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,699,656 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,701,578 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,717,342 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,733,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,749,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,772,969 UART: [afmc] --
18,776,116 UART: [cold-reset] --
18,778,901 UART: [state] Locking Datavault
18,782,586 UART: [state] Locking PCR0, PCR1 and PCR31
18,784,234 UART: [state] Locking ICCM
18,786,945 UART: [exit] Launching FMC @ 0x40000130
18,795,346 UART:
18,795,579 UART: Running Caliptra FMC ...
18,796,677 UART:
18,796,864 UART: [state] CFI Enabled
18,805,136 UART: [fht] FMC Alias Private Key: 7
20,562,320 UART: [art] Extend RT PCRs Done
20,563,939 UART: [art] Lock RT PCRs Done
20,565,014 UART: [art] Populate DV Done
20,570,559 UART: [fht] FMC Alias Private Key: 7
20,572,203 UART: [art] Derive CDI
20,573,021 UART: [art] Store in in slot 0x4
20,615,494 UART: [art] Derive Key Pair
20,616,547 UART: [art] Store priv key in slot 0x5
23,043,548 UART: [art] Derive Key Pair - Done
23,056,850 UART: [art] Signing Cert with AUTHO
23,058,159 UART: RITY.KEYID = 7
24,763,592 UART: [art] Erasing AUTHORITY.KEYID = 7
24,765,096 UART: [art] PUB.X = 805396E396A6C60D02E576F83EA5F06AFC8A61A8EE7E056EE1BE847BFDC0EB16AB10313B7A9EF94FF33901B4465BB213
24,772,348 UART: [art] PUB.Y = 6D2231963272922C4E1DE3711A4530BFB1F7B0CBFC7258F0CC9B6D80C3451F64A1148A18369C604FD459DA73BC2777BC
24,779,607 UART: [art] SIG.R = 24B0E4BD959CC95CBDBB972C0116442807A9F143E9CCC5C0570D9A8A5C21949E3F22986B75E0886775BCBE761CDD26FE
24,787,060 UART: [art] SIG.S = D0E62FACCF89E89937D5C5A783000F6078466A6DC8574F0B14CDF7032AD540B508BF34D0C1D36E39FAABD5C35877B7DD
25,765,750 UART: Caliptra RT
25,766,449 UART: [state] CFI Enabled
25,884,151 UART: [rt] RT listening for mailbox commands...
25,915,615 UART: [rt]cmd =0x49444549, len=4
25,918,264 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,654 writing to cptra_bootfsm_go
3,698,509 ready_for_fw is high
3,698,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,262,717 >>> mbox cmd response: success
14,263,528 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,517,457 UART:
18,517,841 UART: Running Caliptra FMC ...
18,519,031 UART:
18,519,203 UART: [state] CFI Enabled
18,526,985 UART: [fht] FMC Alias Private Key: 7
20,283,984 UART: [art] Extend RT PCRs Done
20,285,217 UART: [art] Lock RT PCRs Done
20,287,032 UART: [art] Populate DV Done
20,292,502 UART: [fht] FMC Alias Private Key: 7
20,294,104 UART: [art] Derive CDI
20,294,921 UART: [art] Store in in slot 0x4
20,337,094 UART: [art] Derive Key Pair
20,338,138 UART: [art] Store priv key in slot 0x5
22,764,831 UART: [art] Derive Key Pair - Done
22,777,937 UART: [art] Signing Cert with AUTHO
22,779,241 UART: RITY.KEYID = 7
24,484,797 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,277 UART: [art] PUB.X = FE4C3E3B24E4DAFEF2ABE7CD9E09B24D21ABAB508E59A5FC9B600B67B746D73BE55170B2630AACF5E60D89E3DFD56EE8
24,493,625 UART: [art] PUB.Y = D8B66B766211EEE07C01382531A701F5562C540ABB9EAF696F3177E70D6154C6D5830822DFA819894035F9541576EBD1
24,500,891 UART: [art] SIG.R = 1C6ADA3F4AEB234E5853F7E70B489C2366F37E90C5979230861A83A2D8170C212F81AA49C510E876A51F7FAAA5515F20
24,508,237 UART: [art] SIG.S = 1D95E81A2D024AD9FFAD1535B24759D242CE5325DBB05C584BA949E0444D5718B5B851A5EEF59835DAF8C9DED9586E81
25,487,362 UART: Caliptra RT
25,488,099 UART: [state] CFI Enabled
25,604,611 UART: [rt] RT listening for mailbox commands...
25,635,867 UART: [rt]cmd =0x49444549, len=4
25,638,743 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,019 UART:
192,380 UART: Running Caliptra ROM ...
193,597 UART:
193,753 UART: [state] CFI Enabled
264,353 UART: [state] LifecycleState = Unprovisioned
266,758 UART: [state] DebugLocked = No
269,574 UART: [state] WD Timer not started. Device not locked for debugging
274,968 UART: [kat] SHA2-256
464,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,643 UART: [kat] ++
476,123 UART: [kat] sha1
487,423 UART: [kat] SHA2-256
490,438 UART: [kat] SHA2-384
496,360 UART: [kat] SHA2-512-ACC
499,013 UART: [kat] ECC-384
2,946,377 UART: [kat] HMAC-384Kdf
2,971,255 UART: [kat] LMS
3,503,045 UART: [kat] --
3,507,336 UART: [cold-reset] ++
3,509,135 UART: [fht] FHT @ 0x50003400
3,520,594 UART: [idev] ++
3,521,239 UART: [idev] CDI.KEYID = 6
3,522,221 UART: [idev] SUBJECT.KEYID = 7
3,523,393 UART: [idev] UDS.KEYID = 0
3,524,321 ready_for_fw is high
3,524,533 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,052 UART: [idev] Erasing UDS.KEYID = 0
6,025,782 UART: [idev] Sha1 KeyId Algorithm
6,048,422 UART: [idev] --
6,053,449 UART: [ldev] ++
6,054,198 UART: [ldev] CDI.KEYID = 6
6,055,099 UART: [ldev] SUBJECT.KEYID = 5
6,056,219 UART: [ldev] AUTHORITY.KEYID = 7
6,057,463 UART: [ldev] FE.KEYID = 1
6,099,576 UART: [ldev] Erasing FE.KEYID = 1
8,606,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,925 UART: [ldev] --
10,412,257 UART: [fwproc] Wait for Commands...
10,414,358 UART: [fwproc] Recv command 0x46574c44
10,416,664 UART: [fwproc] Recv'd Img size: 114168 bytes
13,859,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,927 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,030 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,594,115 >>> mbox cmd response: success
14,594,638 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,598,060 UART: [afmc] ++
14,598,779 UART: [afmc] CDI.KEYID = 6
14,599,982 UART: [afmc] SUBJECT.KEYID = 7
14,601,424 UART: [afmc] AUTHORITY.KEYID = 5
17,126,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,533 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,644 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,181 UART: [afmc] --
18,926,182 UART: [cold-reset] --
18,930,643 UART: [state] Locking Datavault
18,937,525 UART: [state] Locking PCR0, PCR1 and PCR31
18,939,665 UART: [state] Locking ICCM
18,942,719 UART: [exit] Launching FMC @ 0x40000130
18,951,388 UART:
18,951,682 UART: Running Caliptra FMC ...
18,952,719 UART:
18,952,871 UART: [state] CFI Enabled
19,006,962 UART: [fht] FMC Alias Private Key: 7
20,771,289 UART: [art] Extend RT PCRs Done
20,772,504 UART: [art] Lock RT PCRs Done
20,773,889 UART: [art] Populate DV Done
20,779,412 UART: [fht] FMC Alias Private Key: 7
20,780,896 UART: [art] Derive CDI
20,781,637 UART: [art] Store in in slot 0x4
20,839,137 UART: [art] Derive Key Pair
20,840,176 UART: [art] Store priv key in slot 0x5
23,303,540 UART: [art] Derive Key Pair - Done
23,316,583 UART: [art] Signing Cert with AUTHO
23,317,880 UART: RITY.KEYID = 7
25,028,747 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,279 UART: [art] PUB.X = 9255F4B7D32D856ECB5B6B5C6C07BDE0AC2A44125CF697CF7622F6627C67D5A7FDAC6E0A3E3679A5680DBABBBC5FF492
25,037,571 UART: [art] PUB.Y = 783D79A25E96ADA45DD0F193B34DE6FD68506E2F42594397030D7552DD2005B15AB8A809E8A0D86DDDFE361FC517FB79
25,044,841 UART: [art] SIG.R = FF32C03ED04AE4B90FD60C852678D9ADFC503CE20560514E654AA7E377314965A57F24F5CD9A0E4ABADEFFFB4135D5E2
25,052,200 UART: [art] SIG.S = 4EDADB4BE70228ADB04FF4DEC70B0AA5CC617F7901F471BCB7B6B07619895158402EC1373F4B3ADA25813A3CA8C089B7
26,031,390 UART: Caliptra RT
26,032,105 UART: [state] CFI Enabled
26,196,268 UART: [rt] RT listening for mailbox commands...
26,227,360 UART: [rt]cmd =0x49444549, len=4
26,230,286 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,439,260 ready_for_fw is high
3,439,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,711,811 >>> mbox cmd response: success
14,712,602 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,004,224 UART:
19,004,611 UART: Running Caliptra FMC ...
19,005,814 UART:
19,005,984 UART: [state] CFI Enabled
19,073,764 UART: [fht] FMC Alias Private Key: 7
20,837,723 UART: [art] Extend RT PCRs Done
20,838,957 UART: [art] Lock RT PCRs Done
20,840,828 UART: [art] Populate DV Done
20,846,359 UART: [fht] FMC Alias Private Key: 7
20,847,954 UART: [art] Derive CDI
20,848,770 UART: [art] Store in in slot 0x4
20,909,243 UART: [art] Derive Key Pair
20,910,284 UART: [art] Store priv key in slot 0x5
23,373,161 UART: [art] Derive Key Pair - Done
23,386,323 UART: [art] Signing Cert with AUTHO
23,387,631 UART: RITY.KEYID = 7
25,098,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,100,336 UART: [art] PUB.X = 66A83B21D3527BA86D5AB99304302C7A41AC5367DE6634E1165829CC9B99D571B88631990F28CA9F2BAC1F0EB301447B
25,107,645 UART: [art] PUB.Y = C31FFF96F3E532A2F0C093C9D13CAF2E31E383C7DB0A28DEA248C761E1D39049511E317AB324F8352D510C991F6AFBF2
25,114,881 UART: [art] SIG.R = 37985B0F43DDE276DCDE2E48D6E2F8A56345D4B42CE7F030E2C801B64D13A4F14428341C51D4B853BFE1FB4F92A29E6D
25,122,293 UART: [art] SIG.S = 2C9EAEF3B0EEA47344EA318A22B1F375B4E481F7AB85D0DFA45C8663BEFA626D0CBBCC54371F234C17835926C2760785
26,101,495 UART: Caliptra RT
26,102,227 UART: [state] CFI Enabled
26,266,413 UART: [rt] RT listening for mailbox commands...
26,297,988 UART: [rt]cmd =0x49444549, len=4
26,300,900 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,635 writing to cptra_bootfsm_go
192,854 UART:
193,247 UART: Running Caliptra ROM ...
194,371 UART:
603,880 UART: [state] CFI Enabled
615,978 UART: [state] LifecycleState = Unprovisioned
618,339 UART: [state] DebugLocked = No
620,033 UART: [state] WD Timer not started. Device not locked for debugging
624,567 UART: [kat] SHA2-256
814,466 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,193 UART: [kat] ++
825,797 UART: [kat] sha1
837,765 UART: [kat] SHA2-256
840,812 UART: [kat] SHA2-384
846,734 UART: [kat] SHA2-512-ACC
849,386 UART: [kat] ECC-384
3,293,857 UART: [kat] HMAC-384Kdf
3,307,121 UART: [kat] LMS
3,838,912 UART: [kat] --
3,842,975 UART: [cold-reset] ++
3,843,983 UART: [fht] FHT @ 0x50003400
3,855,173 UART: [idev] ++
3,855,806 UART: [idev] CDI.KEYID = 6
3,856,813 UART: [idev] SUBJECT.KEYID = 7
3,857,997 UART: [idev] UDS.KEYID = 0
3,858,925 ready_for_fw is high
3,859,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,616 UART: [idev] Erasing UDS.KEYID = 0
6,333,748 UART: [idev] Sha1 KeyId Algorithm
6,356,257 UART: [idev] --
6,361,252 UART: [ldev] ++
6,361,940 UART: [ldev] CDI.KEYID = 6
6,362,852 UART: [ldev] SUBJECT.KEYID = 5
6,364,011 UART: [ldev] AUTHORITY.KEYID = 7
6,365,243 UART: [ldev] FE.KEYID = 1
6,377,184 UART: [ldev] Erasing FE.KEYID = 1
8,852,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,020 UART: [ldev] --
10,644,122 UART: [fwproc] Wait for Commands...
10,646,162 UART: [fwproc] Recv command 0x46574c44
10,648,417 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,350 >>> mbox cmd response: success
14,832,861 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,835,811 UART: [afmc] ++
14,836,515 UART: [afmc] CDI.KEYID = 6
14,837,708 UART: [afmc] SUBJECT.KEYID = 7
14,839,142 UART: [afmc] AUTHORITY.KEYID = 5
17,341,173 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,465 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,813 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,570 UART: [afmc] --
19,136,809 UART: [cold-reset] --
19,142,562 UART: [state] Locking Datavault
19,149,270 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,505 UART: [state] Locking ICCM
19,154,358 UART: [exit] Launching FMC @ 0x40000130
19,163,031 UART:
19,163,268 UART: Running Caliptra FMC ...
19,164,293 UART:
19,164,443 UART: [state] CFI Enabled
19,172,869 UART: [fht] FMC Alias Private Key: 7
20,929,685 UART: [art] Extend RT PCRs Done
20,930,899 UART: [art] Lock RT PCRs Done
20,932,551 UART: [art] Populate DV Done
20,938,335 UART: [fht] FMC Alias Private Key: 7
20,939,978 UART: [art] Derive CDI
20,940,789 UART: [art] Store in in slot 0x4
20,983,816 UART: [art] Derive Key Pair
20,984,813 UART: [art] Store priv key in slot 0x5
23,411,648 UART: [art] Derive Key Pair - Done
23,424,473 UART: [art] Signing Cert with AUTHO
23,425,774 UART: RITY.KEYID = 7
25,131,855 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,356 UART: [art] PUB.X = 65581652D4A4CCF8584C3567F052D07F1D2B63FAB0D4DF5B0326B91E9DCE1F8FC3141FBC4E31878911838B63E978F359
25,140,656 UART: [art] PUB.Y = 72ABA1A148D6DBA71C899FCD5D2EBE9F3D40373CD647FACA2E54742A30260D4588D1C6C8B486AA5334BEE3737DA2FF17
25,147,945 UART: [art] SIG.R = 5C728DBB5677E353C1B0480D613B5D55B6E47DE3F8BDC907ED06AA9D3B1A17FC72AD0A94203F18730436210B4C2447F2
25,155,364 UART: [art] SIG.S = C9B346085452ACC2B9376A08B3593676ECE797F74CD4EF1DA7E5F092F27B50A62B0D095D1B6B57E05BA28C657A86263A
26,134,131 UART: Caliptra RT
26,134,815 UART: [state] CFI Enabled
26,251,368 UART: [rt] RT listening for mailbox commands...
26,282,855 UART: [rt]cmd =0x49444549, len=4
26,285,807 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
3,750,555 ready_for_fw is high
3,751,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,941,995 >>> mbox cmd response: success
14,942,664 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,192,091 UART:
19,192,506 UART: Running Caliptra FMC ...
19,193,643 UART:
19,193,803 UART: [state] CFI Enabled
19,202,026 UART: [fht] FMC Alias Private Key: 7
20,959,032 UART: [art] Extend RT PCRs Done
20,960,256 UART: [art] Lock RT PCRs Done
20,962,044 UART: [art] Populate DV Done
20,967,629 UART: [fht] FMC Alias Private Key: 7
20,969,338 UART: [art] Derive CDI
20,970,158 UART: [art] Store in in slot 0x4
21,012,667 UART: [art] Derive Key Pair
21,013,713 UART: [art] Store priv key in slot 0x5
23,440,578 UART: [art] Derive Key Pair - Done
23,453,251 UART: [art] Signing Cert with AUTHO
23,454,550 UART: RITY.KEYID = 7
25,160,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,536 UART: [art] PUB.X = 01A0820ABFAB03379990AE9834FB47B3C34B916E3C4BFC0530CEC1AF0DB5AFAA4B65C699753A6177F687A659463289AB
25,168,831 UART: [art] PUB.Y = DC510FAF6F9D8E02921DD2A0E562A0EBA5DCB3FCAC74E38A287DF216C66873D7A21FB8917F5CEBB3F37EF97CC58772F1
25,176,125 UART: [art] SIG.R = DC76213F9BE0ED5A7E4F7F4EE883B4B6B0AD8849D134A39F0E848256FE509C11A229C9639C1548D228CF475F8F9E8735
25,183,459 UART: [art] SIG.S = 1D4A7AF2CEC48F0D5F6A6CD053F3B065891BD7B27427EED6912FF3F5BFC2104192E3DFA93A9B50FBF99AC97A0AF46F9D
26,162,859 UART: Caliptra RT
26,163,572 UART: [state] CFI Enabled
26,280,814 UART: [rt] RT listening for mailbox commands...
26,311,904 UART: [rt]cmd =0x49444549, len=4
26,314,672 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,643 UART: [kat] SHA2-256
881,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,689 UART: [kat] ++
885,841 UART: [kat] sha1
889,987 UART: [kat] SHA2-256
891,925 UART: [kat] SHA2-384
894,670 UART: [kat] SHA2-512-ACC
896,571 UART: [kat] ECC-384
902,272 UART: [kat] HMAC-384Kdf
906,962 UART: [kat] LMS
1,475,158 UART: [kat] --
1,475,901 UART: [cold-reset] ++
1,476,295 UART: [fht] Storing FHT @ 0x50003400
1,479,104 UART: [idev] ++
1,479,272 UART: [idev] CDI.KEYID = 6
1,479,632 UART: [idev] SUBJECT.KEYID = 7
1,480,056 UART: [idev] UDS.KEYID = 0
1,480,401 ready_for_fw is high
1,480,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,960 UART: [idev] Erasing UDS.KEYID = 0
1,504,636 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,152 UART: [idev] --
1,514,295 UART: [ldev] ++
1,514,463 UART: [ldev] CDI.KEYID = 6
1,514,826 UART: [ldev] SUBJECT.KEYID = 5
1,515,252 UART: [ldev] AUTHORITY.KEYID = 7
1,515,715 UART: [ldev] FE.KEYID = 1
1,520,831 UART: [ldev] Erasing FE.KEYID = 1
1,546,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,200 UART: [ldev] --
1,585,479 UART: [fwproc] Waiting for Commands...
1,586,174 UART: [fwproc] Received command 0x46574c44
1,586,965 UART: [fwproc] Received Image of size 114168 bytes
2,884,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,247 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,599 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,280 >>> mbox cmd response: success
3,077,280 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,078,384 UART: [afmc] ++
3,078,552 UART: [afmc] CDI.KEYID = 6
3,078,914 UART: [afmc] SUBJECT.KEYID = 7
3,079,339 UART: [afmc] AUTHORITY.KEYID = 5
3,113,984 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,078 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,858 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,586 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,471 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,161 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,124 UART: [afmc] --
3,157,240 UART: [cold-reset] --
3,158,242 UART: [state] Locking Datavault
3,159,389 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,993 UART: [state] Locking ICCM
3,160,667 UART: [exit] Launching FMC @ 0x40000130
3,165,996 UART:
3,166,012 UART: Running Caliptra FMC ...
3,166,420 UART:
3,166,474 UART: [state] CFI Enabled
3,176,741 UART: [fht] FMC Alias Private Key: 7
3,284,296 UART: [art] Extend RT PCRs Done
3,284,724 UART: [art] Lock RT PCRs Done
3,286,290 UART: [art] Populate DV Done
3,294,593 UART: [fht] FMC Alias Private Key: 7
3,295,683 UART: [art] Derive CDI
3,295,963 UART: [art] Store in in slot 0x4
3,381,082 UART: [art] Derive Key Pair
3,381,442 UART: [art] Store priv key in slot 0x5
3,394,196 UART: [art] Derive Key Pair - Done
3,409,036 UART: [art] Signing Cert with AUTHO
3,409,516 UART: RITY.KEYID = 7
3,424,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,339 UART: [art] PUB.X = 30E28AB92BC047ECC2138BC9CA574DBF007DCE1D52054DD840DEB3942889C58075C9A3790AF0BD8004C1364FB1C22048
3,432,086 UART: [art] PUB.Y = 9C3A7B29EAE5C5E5553F727CF5918213313D4CE4D79F5CC71804F6BDED1201650C0D801449FA2F7488CB944637D46C2C
3,439,028 UART: [art] SIG.R = A8B30B79ED2589E4128FBC8EE425C6802C128A89FB8D0743568C3DF4046CC2E6636747E66BA6D006B3DE220D5B5785DD
3,445,789 UART: [art] SIG.S = 57B918CD1E78F2C0704D9952E7A1D275A04E06990155923BC9DBB884640E75F5EAD232CDD74F511AE4FFE83125D12AC6
3,468,979 UART: Caliptra RT
3,469,232 UART: [state] CFI Enabled
3,577,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,689 UART: [rt]cmd =0x49444549, len=4
3,610,140 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,977 ready_for_fw is high
1,362,977 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,456 >>> mbox cmd response: success
2,925,456 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,986,092 UART:
2,986,108 UART: Running Caliptra FMC ...
2,986,516 UART:
2,986,570 UART: [state] CFI Enabled
2,997,301 UART: [fht] FMC Alias Private Key: 7
3,105,214 UART: [art] Extend RT PCRs Done
3,105,642 UART: [art] Lock RT PCRs Done
3,107,154 UART: [art] Populate DV Done
3,115,045 UART: [fht] FMC Alias Private Key: 7
3,116,183 UART: [art] Derive CDI
3,116,463 UART: [art] Store in in slot 0x4
3,201,716 UART: [art] Derive Key Pair
3,202,076 UART: [art] Store priv key in slot 0x5
3,215,968 UART: [art] Derive Key Pair - Done
3,230,497 UART: [art] Signing Cert with AUTHO
3,230,977 UART: RITY.KEYID = 7
3,246,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,880 UART: [art] PUB.X = 36A31F44D7B096E04F1CBE806CA10BFC9AF321E2654DC7D06E61886C8CF79571789C7E7463051DC3C91961EE9702C664
3,253,643 UART: [art] PUB.Y = 4867C830C52E84EA1054FE9A1F600F467849BE2B4FE41B7C01F8A3910FE30B79D83FF85DE2FEDD0063B80C134EA13717
3,260,564 UART: [art] SIG.R = 33241B0EE2ACB1B316D6DE86CDAC4EB1DF66A0A8DC4AC728149E338F46EB7A76190962589F86C2CCD8CB13AEB5102BAD
3,267,350 UART: [art] SIG.S = B9870C5EBB7B2EFE582E0E94570700DF0F9A7D0B3191EF7FB3B3A36B129CC0EE6D0E94EE2E90C8B6E382D072BA091448
3,291,370 UART: Caliptra RT
3,291,623 UART: [state] CFI Enabled
3,399,866 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,274 UART: [rt]cmd =0x49444549, len=4
3,432,533 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,508 UART: [kat] SHA2-256
882,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,554 UART: [kat] ++
886,706 UART: [kat] sha1
891,000 UART: [kat] SHA2-256
892,938 UART: [kat] SHA2-384
895,725 UART: [kat] SHA2-512-ACC
897,626 UART: [kat] ECC-384
903,113 UART: [kat] HMAC-384Kdf
907,703 UART: [kat] LMS
1,475,899 UART: [kat] --
1,477,000 UART: [cold-reset] ++
1,477,528 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 ready_for_fw is high
1,481,606 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,495 UART: [idev] Erasing UDS.KEYID = 0
1,505,907 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,381 UART: [idev] --
1,515,446 UART: [ldev] ++
1,515,614 UART: [ldev] CDI.KEYID = 6
1,515,977 UART: [ldev] SUBJECT.KEYID = 5
1,516,403 UART: [ldev] AUTHORITY.KEYID = 7
1,516,866 UART: [ldev] FE.KEYID = 1
1,522,270 UART: [ldev] Erasing FE.KEYID = 1
1,548,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,269 UART: [ldev] --
1,588,620 UART: [fwproc] Waiting for Commands...
1,589,321 UART: [fwproc] Received command 0x46574c44
1,590,112 UART: [fwproc] Received Image of size 114168 bytes
2,885,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,184 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,139 >>> mbox cmd response: success
3,078,139 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,079,285 UART: [afmc] ++
3,079,453 UART: [afmc] CDI.KEYID = 6
3,079,815 UART: [afmc] SUBJECT.KEYID = 7
3,080,240 UART: [afmc] AUTHORITY.KEYID = 5
3,115,533 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,277 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,162 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,852 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,805 UART: [afmc] --
3,158,925 UART: [cold-reset] --
3,159,815 UART: [state] Locking Datavault
3,160,730 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,334 UART: [state] Locking ICCM
3,161,832 UART: [exit] Launching FMC @ 0x40000130
3,167,161 UART:
3,167,177 UART: Running Caliptra FMC ...
3,167,585 UART:
3,167,728 UART: [state] CFI Enabled
3,178,531 UART: [fht] FMC Alias Private Key: 7
3,286,198 UART: [art] Extend RT PCRs Done
3,286,626 UART: [art] Lock RT PCRs Done
3,287,934 UART: [art] Populate DV Done
3,296,161 UART: [fht] FMC Alias Private Key: 7
3,297,127 UART: [art] Derive CDI
3,297,407 UART: [art] Store in in slot 0x4
3,383,332 UART: [art] Derive Key Pair
3,383,692 UART: [art] Store priv key in slot 0x5
3,396,854 UART: [art] Derive Key Pair - Done
3,411,395 UART: [art] Signing Cert with AUTHO
3,411,875 UART: RITY.KEYID = 7
3,427,071 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,836 UART: [art] PUB.X = 00CD5D1D39BBC852426D307E70C0191777B9098A5DCE040D0807B9F75B884D8795046C46DE815EF34CA56E74A814745C
3,434,564 UART: [art] PUB.Y = C107608F216A834C73C84333D3E4C4CEA12C754B84CEDFE1C8CDAA3F8475ECE506CC9D3FDD3B141459538C4F1ED3074E
3,441,521 UART: [art] SIG.R = 934BF83AD63A7C017002ABF3C228EE5779C13EBF574C5632CA7079F5E67D25515990797FE5BF65B0BFABF82F90C94B60
3,448,293 UART: [art] SIG.S = C6789FEFDF25770C273BA13B6CC2104F2EC5838B3D92BBB62AFA427220E6A571AF70EBD0BB63CFE5345C219BD2EEA5BC
3,472,171 UART: Caliptra RT
3,472,516 UART: [state] CFI Enabled
3,580,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,422 UART: [rt]cmd =0x49444549, len=4
3,613,651 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,894 ready_for_fw is high
1,362,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,853 >>> mbox cmd response: success
2,926,853 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,988,303 UART:
2,988,319 UART: Running Caliptra FMC ...
2,988,727 UART:
2,988,870 UART: [state] CFI Enabled
2,999,539 UART: [fht] FMC Alias Private Key: 7
3,107,694 UART: [art] Extend RT PCRs Done
3,108,122 UART: [art] Lock RT PCRs Done
3,109,844 UART: [art] Populate DV Done
3,118,161 UART: [fht] FMC Alias Private Key: 7
3,119,207 UART: [art] Derive CDI
3,119,487 UART: [art] Store in in slot 0x4
3,205,042 UART: [art] Derive Key Pair
3,205,402 UART: [art] Store priv key in slot 0x5
3,218,886 UART: [art] Derive Key Pair - Done
3,233,840 UART: [art] Signing Cert with AUTHO
3,234,320 UART: RITY.KEYID = 7
3,249,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,197 UART: [art] PUB.X = CB81E2AF3E66B06A774E19F2A479CDA942C15DFE1E3A7231BF4963D41EEBA64D917260DD0EFD7A14383DAABC04A47865
3,256,979 UART: [art] PUB.Y = D99224B9FFC31F86DBC86BABCF38D62A976C0E2A55209536FFE484CECCB9E57E0F378514D66AA75DB68BF210C796D156
3,263,939 UART: [art] SIG.R = F6ABB93EEE2CE61C6A631799355CCF4ED3163278D80795567B406926BC94A60E9A2B4721A8510650F079776E6E91EAA1
3,270,700 UART: [art] SIG.S = 166FC383E5A629DEAF7E8B35EE50F00CCA5032E361AA39F9F8A083B02341B8EF9636B43093F6BF83B558B5A836799283
3,294,332 UART: Caliptra RT
3,294,677 UART: [state] CFI Enabled
3,402,944 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,140 UART: [rt]cmd =0x49444549, len=4
3,435,633 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,486 UART: [kat] SHA2-512-ACC
908,387 UART: [kat] ECC-384
918,182 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,172,079 UART: [cold-reset] ++
1,172,571 UART: [fht] FHT @ 0x50003400
1,175,390 UART: [idev] ++
1,175,558 UART: [idev] CDI.KEYID = 6
1,175,918 UART: [idev] SUBJECT.KEYID = 7
1,176,342 UART: [idev] UDS.KEYID = 0
1,176,687 ready_for_fw is high
1,176,687 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,336 UART: [idev] Erasing UDS.KEYID = 0
1,201,603 UART: [idev] Sha1 KeyId Algorithm
1,210,243 UART: [idev] --
1,211,453 UART: [ldev] ++
1,211,621 UART: [ldev] CDI.KEYID = 6
1,211,984 UART: [ldev] SUBJECT.KEYID = 5
1,212,410 UART: [ldev] AUTHORITY.KEYID = 7
1,212,873 UART: [ldev] FE.KEYID = 1
1,218,317 UART: [ldev] Erasing FE.KEYID = 1
1,244,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,939 UART: [ldev] --
1,284,316 UART: [fwproc] Wait for Commands...
1,285,004 UART: [fwproc] Recv command 0x46574c44
1,285,732 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,499 >>> mbox cmd response: success
2,774,499 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,775,595 UART: [afmc] ++
2,775,763 UART: [afmc] CDI.KEYID = 6
2,776,125 UART: [afmc] SUBJECT.KEYID = 7
2,776,550 UART: [afmc] AUTHORITY.KEYID = 5
2,811,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,394 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,122 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,007 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,726 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,564 UART: [afmc] --
2,854,506 UART: [cold-reset] --
2,855,260 UART: [state] Locking Datavault
2,856,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,827 UART: [state] Locking ICCM
2,857,305 UART: [exit] Launching FMC @ 0x40000130
2,862,634 UART:
2,862,650 UART: Running Caliptra FMC ...
2,863,058 UART:
2,863,112 UART: [state] CFI Enabled
2,873,489 UART: [fht] FMC Alias Private Key: 7
2,981,498 UART: [art] Extend RT PCRs Done
2,981,926 UART: [art] Lock RT PCRs Done
2,983,260 UART: [art] Populate DV Done
2,991,681 UART: [fht] FMC Alias Private Key: 7
2,992,651 UART: [art] Derive CDI
2,992,931 UART: [art] Store in in slot 0x4
3,078,892 UART: [art] Derive Key Pair
3,079,252 UART: [art] Store priv key in slot 0x5
3,092,878 UART: [art] Derive Key Pair - Done
3,107,847 UART: [art] Signing Cert with AUTHO
3,108,327 UART: RITY.KEYID = 7
3,123,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,094 UART: [art] PUB.X = FC726F23338DC6F4C87530D9358137EA73ACE20CE4821A8672A140BEA68856CC9EBE815F399870221F32DA3375E930D9
3,130,861 UART: [art] PUB.Y = E5E7955F225EDFC94996879835A3E8E736E26F6965747A45BC7D64DDD54FB8670E1A0ED24E3163F94488B47A9B7C55B3
3,137,807 UART: [art] SIG.R = 5B68816F49C7BF763B286F84A0BEA3510E834B686F256C7E0A3D52454ECE4C19F0D5BA869187988C968DB9973FBF964A
3,144,575 UART: [art] SIG.S = 3E6561B301DF6DE624067F2C24178B8DEA26A6FEDAC0694FE79AEA6EC66E2D38DC7557A6D2C3FCAD30816880E818218C
3,168,584 UART: Caliptra RT
3,168,837 UART: [state] CFI Enabled
3,276,876 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,244 UART: [rt]cmd =0x49444549, len=4
3,309,595 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,617 ready_for_fw is high
1,059,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,214 >>> mbox cmd response: success
2,624,214 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,685,634 UART:
2,685,650 UART: Running Caliptra FMC ...
2,686,058 UART:
2,686,112 UART: [state] CFI Enabled
2,696,703 UART: [fht] FMC Alias Private Key: 7
2,804,496 UART: [art] Extend RT PCRs Done
2,804,924 UART: [art] Lock RT PCRs Done
2,806,200 UART: [art] Populate DV Done
2,814,583 UART: [fht] FMC Alias Private Key: 7
2,815,709 UART: [art] Derive CDI
2,815,989 UART: [art] Store in in slot 0x4
2,901,564 UART: [art] Derive Key Pair
2,901,924 UART: [art] Store priv key in slot 0x5
2,914,898 UART: [art] Derive Key Pair - Done
2,929,838 UART: [art] Signing Cert with AUTHO
2,930,318 UART: RITY.KEYID = 7
2,945,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,427 UART: [art] PUB.X = 80D3E67006C443793966697750E7F093D8973196E1CCBC4FE4653E53047ADF7ACA3E0EE612B0134B469566C1B8AD1615
2,953,184 UART: [art] PUB.Y = 3283DBFA847C4B8E4E36F1E0DDC97D01C85BD644A768CB5FB7C55BFD5AE25CAC226186147816A0ACC602197BF44B66D7
2,960,144 UART: [art] SIG.R = 274F20FB1A00902549333D1A826EFACF2DB7093A7A2405D5439437480CB715821E486D8EE1A05D781CEC627EC4C38CC3
2,966,885 UART: [art] SIG.S = 1AF67D17447ACC4A71BC00E0EE068DDB798E1BDF7C1131C9B1B553E3E16508605F2FBB5255275D4C302FEB3B016226FA
2,990,395 UART: Caliptra RT
2,990,648 UART: [state] CFI Enabled
3,098,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,977 UART: [rt]cmd =0x49444549, len=4
3,131,334 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,356 UART: [kat] SHA2-256
904,296 UART: [kat] SHA2-384
907,109 UART: [kat] SHA2-512-ACC
909,010 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,095 UART: [kat] LMS
1,171,423 UART: [kat] --
1,172,004 UART: [cold-reset] ++
1,172,478 UART: [fht] FHT @ 0x50003400
1,175,101 UART: [idev] ++
1,175,269 UART: [idev] CDI.KEYID = 6
1,175,629 UART: [idev] SUBJECT.KEYID = 7
1,176,053 UART: [idev] UDS.KEYID = 0
1,176,398 ready_for_fw is high
1,176,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,823 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,092 UART: [ldev] ++
1,210,260 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,049 UART: [ldev] AUTHORITY.KEYID = 7
1,211,512 UART: [ldev] FE.KEYID = 1
1,216,816 UART: [ldev] Erasing FE.KEYID = 1
1,243,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,934 UART: [ldev] --
1,283,351 UART: [fwproc] Wait for Commands...
1,283,975 UART: [fwproc] Recv command 0x46574c44
1,284,703 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,751 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,055 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,578 >>> mbox cmd response: success
2,773,578 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,774,600 UART: [afmc] ++
2,774,768 UART: [afmc] CDI.KEYID = 6
2,775,130 UART: [afmc] SUBJECT.KEYID = 7
2,775,555 UART: [afmc] AUTHORITY.KEYID = 5
2,811,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,363 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,248 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,967 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,933 UART: [afmc] --
2,855,009 UART: [cold-reset] --
2,855,901 UART: [state] Locking Datavault
2,857,020 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,624 UART: [state] Locking ICCM
2,858,148 UART: [exit] Launching FMC @ 0x40000130
2,863,477 UART:
2,863,493 UART: Running Caliptra FMC ...
2,863,901 UART:
2,864,044 UART: [state] CFI Enabled
2,874,467 UART: [fht] FMC Alias Private Key: 7
2,982,692 UART: [art] Extend RT PCRs Done
2,983,120 UART: [art] Lock RT PCRs Done
2,984,782 UART: [art] Populate DV Done
2,993,097 UART: [fht] FMC Alias Private Key: 7
2,994,059 UART: [art] Derive CDI
2,994,339 UART: [art] Store in in slot 0x4
3,079,924 UART: [art] Derive Key Pair
3,080,284 UART: [art] Store priv key in slot 0x5
3,093,926 UART: [art] Derive Key Pair - Done
3,108,484 UART: [art] Signing Cert with AUTHO
3,108,964 UART: RITY.KEYID = 7
3,124,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,949 UART: [art] PUB.X = 7255D2A3D5FE6D843D695B32E2C6C15BA599DA9EE35963F18D0BFD1466B3AFF3C16667D08A70F995B3D71DDA6D05741D
3,131,725 UART: [art] PUB.Y = D7CBB93FD6E1BF47CEDEC3DCA72BFDDED12D02B02F6BF6443B79174354FA9F348297C38C3DD947CE2BBFA52A0E38353D
3,138,697 UART: [art] SIG.R = 07F7411CA12A3BA4D4E9A202C70502275EBEF03629D455CAF19306686BE04867E7D193657BAD10B6A962BA8C15CAE625
3,145,456 UART: [art] SIG.S = 503EFC875CA9EF54EE7A7866730DA455425F5F9935CDC96902B64E956A568992E863FE1529AAE049490E3B7F8373EAEB
3,169,074 UART: Caliptra RT
3,169,419 UART: [state] CFI Enabled
3,277,014 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,328 UART: [rt]cmd =0x49444549, len=4
3,309,695 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,952 ready_for_fw is high
1,060,952 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,169 >>> mbox cmd response: success
2,625,169 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,687,851 UART:
2,687,867 UART: Running Caliptra FMC ...
2,688,275 UART:
2,688,418 UART: [state] CFI Enabled
2,698,803 UART: [fht] FMC Alias Private Key: 7
2,807,458 UART: [art] Extend RT PCRs Done
2,807,886 UART: [art] Lock RT PCRs Done
2,809,666 UART: [art] Populate DV Done
2,817,769 UART: [fht] FMC Alias Private Key: 7
2,818,789 UART: [art] Derive CDI
2,819,069 UART: [art] Store in in slot 0x4
2,904,812 UART: [art] Derive Key Pair
2,905,172 UART: [art] Store priv key in slot 0x5
2,918,292 UART: [art] Derive Key Pair - Done
2,932,824 UART: [art] Signing Cert with AUTHO
2,933,304 UART: RITY.KEYID = 7
2,948,352 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,117 UART: [art] PUB.X = 6D69B1D05CA533854237F97EB6C7C7421E211ECDF3060088CA6DE99FE942C35BD21F683AC80967369F7948FC06110EE7
2,955,855 UART: [art] PUB.Y = 72C5D97E39079F174DEE248830B895FDA0DD07D22D8F4B138CD114CC7989756D0D8180321104D1184E0F5B8104F3ED51
2,962,785 UART: [art] SIG.R = 5FB1C00DC94A11E6F083FC14A5A28AD4C0A08E4985FB13F1C96B5C1DC4B2237C0EB5F541D16C4FDEE357B07CA96705BF
2,969,566 UART: [art] SIG.S = 0ADDDE856E666145760FCF98F3F9B2D08B402AE8EC7E38F5910EDA7E439EED43F0B510E3A77D5DB50FB5FFB86395412C
2,993,899 UART: Caliptra RT
2,994,244 UART: [state] CFI Enabled
3,101,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,379 UART: [rt]cmd =0x49444549, len=4
3,134,680 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,949 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,149 UART: [idev] ++
1,173,317 UART: [idev] CDI.KEYID = 6
1,173,678 UART: [idev] SUBJECT.KEYID = 7
1,174,103 UART: [idev] UDS.KEYID = 0
1,174,449 ready_for_fw is high
1,174,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,755 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,214,708 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,894 UART: [ldev] --
1,280,406 UART: [fwproc] Wait for Commands...
1,281,099 UART: [fwproc] Recv command 0x46574c44
1,281,832 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,795 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,419 >>> mbox cmd response: success
2,770,419 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,771,468 UART: [afmc] ++
2,771,636 UART: [afmc] CDI.KEYID = 6
2,771,999 UART: [afmc] SUBJECT.KEYID = 7
2,772,425 UART: [afmc] AUTHORITY.KEYID = 5
2,806,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,295 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,907 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,626 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,467 UART: [afmc] --
2,850,361 UART: [cold-reset] --
2,850,973 UART: [state] Locking Datavault
2,852,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,722 UART: [state] Locking ICCM
2,853,156 UART: [exit] Launching FMC @ 0x40000130
2,858,485 UART:
2,858,501 UART: Running Caliptra FMC ...
2,858,909 UART:
2,858,963 UART: [state] CFI Enabled
2,869,336 UART: [fht] FMC Alias Private Key: 7
2,977,293 UART: [art] Extend RT PCRs Done
2,977,721 UART: [art] Lock RT PCRs Done
2,979,489 UART: [art] Populate DV Done
2,987,880 UART: [fht] FMC Alias Private Key: 7
2,988,964 UART: [art] Derive CDI
2,989,244 UART: [art] Store in in slot 0x4
3,074,789 UART: [art] Derive Key Pair
3,075,149 UART: [art] Store priv key in slot 0x5
3,088,367 UART: [art] Derive Key Pair - Done
3,103,152 UART: [art] Signing Cert with AUTHO
3,103,632 UART: RITY.KEYID = 7
3,118,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,411 UART: [art] PUB.X = 02DA9E9A89FD0925CC962597D8EDADFD23C3253B888742E9A6164F5BE5D686C57B52B5D2E46591E3C1C655640A7F4EA5
3,126,180 UART: [art] PUB.Y = 27630A8D38551DE2396B0C28D6A4533B36A6226B9F28FC8A8E4A7FC36391210936388A963E68679C03DBCA46ADCD5703
3,133,113 UART: [art] SIG.R = 6F59B98CA63F6433BB213C5B6BE7D68092221CACE913ABB5D3AE2A623F93EB0F64B77C30DDC0D87B024C1DAE5DDA2502
3,139,894 UART: [art] SIG.S = 88D370D0215C4F34959E56C5EE833D033968604B033C4EA9EEB04ADF855CDCF57611DC547CDAC8B4269DD483ADF0CF97
3,164,045 UART: Caliptra RT
3,164,298 UART: [state] CFI Enabled
3,271,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,201 UART: [rt]cmd =0x49444549, len=4
3,304,530 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,942 ready_for_fw is high
1,055,942 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,884 >>> mbox cmd response: success
2,619,884 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,682,384 UART:
2,682,400 UART: Running Caliptra FMC ...
2,682,808 UART:
2,682,862 UART: [state] CFI Enabled
2,693,129 UART: [fht] FMC Alias Private Key: 7
2,801,810 UART: [art] Extend RT PCRs Done
2,802,238 UART: [art] Lock RT PCRs Done
2,803,994 UART: [art] Populate DV Done
2,812,297 UART: [fht] FMC Alias Private Key: 7
2,813,303 UART: [art] Derive CDI
2,813,583 UART: [art] Store in in slot 0x4
2,898,890 UART: [art] Derive Key Pair
2,899,250 UART: [art] Store priv key in slot 0x5
2,912,950 UART: [art] Derive Key Pair - Done
2,927,544 UART: [art] Signing Cert with AUTHO
2,928,024 UART: RITY.KEYID = 7
2,943,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,093 UART: [art] PUB.X = 9EA3AA98C28B9ABBA09A083D7070637D806DA673B6E6505F9C0DC56E520EDB07F4E7A5CD597B8223B91D89DC71C8493E
2,950,863 UART: [art] PUB.Y = 7B7F464EDCFBB300C262817CD9CD560342510EAEA7D7F2793E648ED23EC6D74E25D182E16F9DDFD154BB0208C05D82AF
2,957,795 UART: [art] SIG.R = 5A457F9D7B1C2209CBA3B46326140F8C48F44E86871E7BA4840283100A98A42A75B0066D37505E2ADAF79434B0EA3CA0
2,964,550 UART: [art] SIG.S = 68907B7A7BBE9FEEBE1978B3A5135A8E4B975DB642503D46641837DAC511C58D6AAA1EBCA21F2E07972A0A821EAC6C97
2,988,387 UART: Caliptra RT
2,988,640 UART: [state] CFI Enabled
3,096,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,231 UART: [rt]cmd =0x49444549, len=4
3,129,656 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,315 UART: [kat] LMS
1,169,627 UART: [kat] --
1,170,210 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,174,494 ready_for_fw is high
1,174,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,434 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,113 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,269 UART: [fwproc] Wait for Commands...
1,283,020 UART: [fwproc] Recv command 0x46574c44
1,283,753 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,063 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,908 >>> mbox cmd response: success
2,772,908 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,773,979 UART: [afmc] ++
2,774,147 UART: [afmc] CDI.KEYID = 6
2,774,510 UART: [afmc] SUBJECT.KEYID = 7
2,774,936 UART: [afmc] AUTHORITY.KEYID = 5
2,810,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,929 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,409 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,746 UART: [afmc] --
2,853,718 UART: [cold-reset] --
2,854,402 UART: [state] Locking Datavault
2,855,633 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,237 UART: [state] Locking ICCM
2,856,865 UART: [exit] Launching FMC @ 0x40000130
2,862,194 UART:
2,862,210 UART: Running Caliptra FMC ...
2,862,618 UART:
2,862,761 UART: [state] CFI Enabled
2,873,224 UART: [fht] FMC Alias Private Key: 7
2,981,541 UART: [art] Extend RT PCRs Done
2,981,969 UART: [art] Lock RT PCRs Done
2,983,415 UART: [art] Populate DV Done
2,991,646 UART: [fht] FMC Alias Private Key: 7
2,992,806 UART: [art] Derive CDI
2,993,086 UART: [art] Store in in slot 0x4
3,078,823 UART: [art] Derive Key Pair
3,079,183 UART: [art] Store priv key in slot 0x5
3,092,407 UART: [art] Derive Key Pair - Done
3,107,020 UART: [art] Signing Cert with AUTHO
3,107,500 UART: RITY.KEYID = 7
3,123,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,793 UART: [art] PUB.X = 66EADAF350D2BEF89756C69D9EF3BC7E6AFAA67F3ECB138506F4F715A67C8468EDD7C3113DA150352AF0E993B60F56D8
3,130,575 UART: [art] PUB.Y = B3E3131D758AAF290BF101208BDE326E8241E7479BCEC17A66916F85274989D9BB51F210BF7E2B71EF4221F8981CE9B8
3,137,523 UART: [art] SIG.R = 9B971AE7771B7C58E07647B6A6DE63ACD08D31A4129DD47BE4290EF8B43999E7FFC0A6F3EC3095E1BDEC1C69E5AD77FE
3,144,310 UART: [art] SIG.S = 0C178F98AEA8C8CF4721503F9532B31237E14A9FD4F4E50B628274002A463606F80D05CCB81FD6A356F56FE8BBF542B9
3,167,596 UART: Caliptra RT
3,167,941 UART: [state] CFI Enabled
3,275,904 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,200 UART: [rt]cmd =0x49444549, len=4
3,308,405 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,601 ready_for_fw is high
1,056,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,560 >>> mbox cmd response: success
2,622,560 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,684,942 UART:
2,684,958 UART: Running Caliptra FMC ...
2,685,366 UART:
2,685,509 UART: [state] CFI Enabled
2,696,634 UART: [fht] FMC Alias Private Key: 7
2,804,647 UART: [art] Extend RT PCRs Done
2,805,075 UART: [art] Lock RT PCRs Done
2,806,721 UART: [art] Populate DV Done
2,815,126 UART: [fht] FMC Alias Private Key: 7
2,816,270 UART: [art] Derive CDI
2,816,550 UART: [art] Store in in slot 0x4
2,902,097 UART: [art] Derive Key Pair
2,902,457 UART: [art] Store priv key in slot 0x5
2,916,399 UART: [art] Derive Key Pair - Done
2,931,128 UART: [art] Signing Cert with AUTHO
2,931,608 UART: RITY.KEYID = 7
2,946,606 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,371 UART: [art] PUB.X = 3D9D83B8F38AC3A5D10D3AC4411ED375D3EF0FA0B31DC273CA25C9FF1673F858FA8D2ECFCDC9B9E1E876C60B1E20D8F6
2,954,158 UART: [art] PUB.Y = F2C02D1676A4AEE16338A410004E08C27603493CCEB0038969D6A2C5ED8E3F0A03A10292A8EEA135D26B1FE333C5337D
2,961,072 UART: [art] SIG.R = D9AA7F0AAAD07FC3D8FBD28DCD93BAE3F79C58DA824EF90DC06107177353AE4FE23DD2F8CB7E7DE2A40475FD209481DE
2,967,858 UART: [art] SIG.S = CE996F224984B3F122BFA395A70B9F3EB5BF94E7E9BEBAFC18F9DCD43F37A72A95B742AE53560B527C379EF9EC139D69
2,991,429 UART: Caliptra RT
2,991,774 UART: [state] CFI Enabled
3,100,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,396 UART: [rt]cmd =0x49444549, len=4
3,132,795 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,063 UART:
192,452 UART: Running Caliptra ROM ...
193,558 UART:
193,702 UART: [state] CFI Enabled
266,165 UART: [state] LifecycleState = Unprovisioned
268,100 UART: [state] DebugLocked = No
269,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,078 UART: [kat] SHA2-256
444,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,272 UART: [kat] ++
455,715 UART: [kat] sha1
465,944 UART: [kat] SHA2-256
468,590 UART: [kat] SHA2-384
473,717 UART: [kat] SHA2-512-ACC
476,070 UART: [kat] ECC-384
2,769,715 UART: [kat] HMAC-384Kdf
2,800,279 UART: [kat] LMS
3,990,632 UART: [kat] --
3,994,647 UART: [cold-reset] ++
3,996,861 UART: [fht] Storing FHT @ 0x50003400
4,008,976 UART: [idev] ++
4,009,567 UART: [idev] CDI.KEYID = 6
4,010,546 UART: [idev] SUBJECT.KEYID = 7
4,011,791 UART: [idev] UDS.KEYID = 0
4,012,820 ready_for_fw is high
4,013,029 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,211 UART: [idev] Erasing UDS.KEYID = 0
7,346,709 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,943 UART: [idev] --
7,374,042 UART: [ldev] ++
7,374,663 UART: [ldev] CDI.KEYID = 6
7,375,625 UART: [ldev] SUBJECT.KEYID = 5
7,376,835 UART: [ldev] AUTHORITY.KEYID = 7
7,378,306 UART: [ldev] FE.KEYID = 1
7,423,662 UART: [ldev] Erasing FE.KEYID = 1
10,757,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,414 UART: [ldev] --
13,138,678 UART: [fwproc] Waiting for Commands...
13,140,481 UART: [fwproc] Received command 0x46574c44
13,142,660 UART: [fwproc] Received Image of size 113844 bytes
17,195,812 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,341,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,658,737 >>> mbox cmd response: success
17,662,771 UART: [afmc] ++
17,663,368 UART: [afmc] CDI.KEYID = 6
17,664,336 UART: [afmc] SUBJECT.KEYID = 7
17,665,547 UART: [afmc] AUTHORITY.KEYID = 5
21,021,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,104 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,376 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,767 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,613 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,041 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,418 UART: [afmc] --
23,398,094 UART: [cold-reset] --
23,401,684 UART: [state] Locking Datavault
23,405,141 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,893 UART: [state] Locking ICCM
23,408,332 UART: [exit] Launching FMC @ 0x40000130
23,416,729 UART:
23,416,957 UART: Running Caliptra FMC ...
23,418,050 UART:
23,418,206 UART: [state] CFI Enabled
23,485,494 UART: [fht] FMC Alias Private Key: 7
25,823,161 UART: [art] Extend RT PCRs Done
25,824,385 UART: [art] Lock RT PCRs Done
25,826,167 UART: [art] Populate DV Done
25,831,784 UART: [fht] FMC Alias Private Key: 7
25,833,312 UART: [art] Derive CDI
25,834,117 UART: [art] Store in in slot 0x4
25,893,369 UART: [art] Derive Key Pair
25,894,402 UART: [art] Store priv key in slot 0x5
29,187,530 UART: [art] Derive Key Pair - Done
29,200,906 UART: [art] Signing Cert with AUTHO
29,202,213 UART: RITY.KEYID = 7
31,488,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,109 UART: [art] PUB.X = 6E054F50D3D11BC9210747D0D991302F8D90D601CFCCE27649569221451964B88CD0EF1C19D13D4353FEF79F5EECE860
31,497,323 UART: [art] PUB.Y = E64F04EF5EFF4B2442578DCA4778E9E4FBB12DBC1C9277D81BB0EE463C12B32C6C5E25AE0805178BE007B83E4C7D3D25
31,504,573 UART: [art] SIG.R = 8D09093EE5AE20B94B10BC49920470FD90DC2EC99DC683C62CC03046DECE5F51B902C8BE16997B2E3621E81178458541
31,511,950 UART: [art] SIG.S = F10AFB3BAE0720D9DCA1BE87C05F042D198A470A481555F204E45AEF4CAEA2E4BA04469C2869685800258F06C2A3B1CC
32,817,162 UART: Caliptra RT
32,817,875 UART: [state] CFI Enabled
32,977,139 UART: [rt] RT listening for mailbox commands...
32,979,174 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,010,764 UART: [rt]cmd =0x44504543, len=136
38,633,740 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,803,522 ready_for_fw is high
3,803,891 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,897,497 >>> mbox cmd response: success
23,588,337 UART:
23,588,723 UART: Running Caliptra FMC ...
23,589,832 UART:
23,589,979 UART: [state] CFI Enabled
23,656,386 UART: [fht] FMC Alias Private Key: 7
25,993,803 UART: [art] Extend RT PCRs Done
25,995,027 UART: [art] Lock RT PCRs Done
25,996,787 UART: [art] Populate DV Done
26,002,416 UART: [fht] FMC Alias Private Key: 7
26,004,067 UART: [art] Derive CDI
26,004,808 UART: [art] Store in in slot 0x4
26,064,359 UART: [art] Derive Key Pair
26,065,396 UART: [art] Store priv key in slot 0x5
29,357,608 UART: [art] Derive Key Pair - Done
29,370,604 UART: [art] Signing Cert with AUTHO
29,371,912 UART: RITY.KEYID = 7
31,659,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,073 UART: [art] PUB.X = 886117EA26D84AFAB8764A65DA57FAD33AA79550622CAF9F023F320DFE818217CE8328D348FAFB856A7E0D91E5290966
31,668,327 UART: [art] PUB.Y = 7F96EAF8E514FF89F0A6597BAD489A2F29E4E017DC5B59FED070A2D0E71442E3F5D4732993DE2A073CBADB1A7714530C
31,675,553 UART: [art] SIG.R = FC801C7F4C42629B8D04D29AB47089A9A17B9EFC559C991A42EDF06AC9576F9EDC7000997748CB6A652F966C2ECB0574
31,682,954 UART: [art] SIG.S = D83E88AE15E763B6B0CC1056FFAB5D44D70F116121D54351C0EFD1D90F5CF4D940D2C5B894B8FBB581CD23256B5E34B4
32,988,470 UART: Caliptra RT
32,989,183 UART: [state] CFI Enabled
33,149,222 UART: [rt] RT listening for mailbox commands...
33,151,142 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,182,537 UART: [rt]cmd =0x44504543, len=136
38,803,004 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,532 UART:
192,898 UART: Running Caliptra ROM ...
194,085 UART:
603,773 UART: [state] CFI Enabled
617,255 UART: [state] LifecycleState = Unprovisioned
619,197 UART: [state] DebugLocked = No
620,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,500 UART: [kat] SHA2-256
795,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,743 UART: [kat] ++
806,340 UART: [kat] sha1
817,648 UART: [kat] SHA2-256
820,374 UART: [kat] SHA2-384
826,444 UART: [kat] SHA2-512-ACC
828,809 UART: [kat] ECC-384
3,110,863 UART: [kat] HMAC-384Kdf
3,123,243 UART: [kat] LMS
4,313,347 UART: [kat] --
4,316,734 UART: [cold-reset] ++
4,319,167 UART: [fht] Storing FHT @ 0x50003400
4,330,652 UART: [idev] ++
4,331,216 UART: [idev] CDI.KEYID = 6
4,332,259 UART: [idev] SUBJECT.KEYID = 7
4,333,456 UART: [idev] UDS.KEYID = 0
4,334,498 ready_for_fw is high
4,334,705 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,692 UART: [idev] Erasing UDS.KEYID = 0
7,619,720 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,415 UART: [idev] --
7,645,896 UART: [ldev] ++
7,646,508 UART: [ldev] CDI.KEYID = 6
7,647,480 UART: [ldev] SUBJECT.KEYID = 5
7,648,640 UART: [ldev] AUTHORITY.KEYID = 7
7,649,925 UART: [ldev] FE.KEYID = 1
7,662,913 UART: [ldev] Erasing FE.KEYID = 1
10,948,228 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,309 UART: [ldev] --
13,308,976 UART: [fwproc] Waiting for Commands...
13,311,182 UART: [fwproc] Received command 0x46574c44
13,313,364 UART: [fwproc] Received Image of size 113844 bytes
17,365,675 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,900 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,823,649 >>> mbox cmd response: success
17,828,067 UART: [afmc] ++
17,828,667 UART: [afmc] CDI.KEYID = 6
17,829,555 UART: [afmc] SUBJECT.KEYID = 7
17,830,826 UART: [afmc] AUTHORITY.KEYID = 5
21,147,605 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,211 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,469 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,885 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,698 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,179 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,683 UART: [afmc] --
23,515,437 UART: [cold-reset] --
23,519,782 UART: [state] Locking Datavault
23,525,457 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,151 UART: [state] Locking ICCM
23,529,766 UART: [exit] Launching FMC @ 0x40000130
23,538,152 UART:
23,538,385 UART: Running Caliptra FMC ...
23,539,411 UART:
23,539,562 UART: [state] CFI Enabled
23,548,259 UART: [fht] FMC Alias Private Key: 7
25,879,882 UART: [art] Extend RT PCRs Done
25,881,101 UART: [art] Lock RT PCRs Done
25,882,617 UART: [art] Populate DV Done
25,888,143 UART: [fht] FMC Alias Private Key: 7
25,889,718 UART: [art] Derive CDI
25,890,460 UART: [art] Store in in slot 0x4
25,933,319 UART: [art] Derive Key Pair
25,934,318 UART: [art] Store priv key in slot 0x5
29,176,186 UART: [art] Derive Key Pair - Done
29,189,260 UART: [art] Signing Cert with AUTHO
29,190,566 UART: RITY.KEYID = 7
31,469,772 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,278 UART: [art] PUB.X = B9CC0AE449AE77457EEBD65F0711EA03FF23C14ACADA39F21B7EED0861CDAEF6EBD7D3EBF92545D035B33977D784B660
31,478,481 UART: [art] PUB.Y = AE97FE60EE5D29A86088E1F5F6C6A7CE2E68D9C6A3C54022583F3ABE8B8A95C2950D899D0138ACC7D8850AD0E72C1277
31,485,759 UART: [art] SIG.R = 3492FE97F5D32D7AC1025EEA92EA2A5485A0E15CF536AF9AE93A206781DBF495DFEBB436C1F63AB901FFEAA849AB9D93
31,493,178 UART: [art] SIG.S = 750DA25001648C0ACA8C84E1420F28CBE8BC51363EFA77301C69499D16E9C7F35DF2606AC12E6CF5B85458E8AC1C9476
32,798,277 UART: Caliptra RT
32,798,972 UART: [state] CFI Enabled
32,916,588 UART: [rt] RT listening for mailbox commands...
32,918,503 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
32,949,956 UART: [rt]cmd =0x44504543, len=136
38,508,751 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
4,126,585 ready_for_fw is high
4,126,964 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,067 >>> mbox cmd response: success
23,704,518 UART:
23,704,912 UART: Running Caliptra FMC ...
23,706,115 UART:
23,706,291 UART: [state] CFI Enabled
23,714,129 UART: [fht] FMC Alias Private Key: 7
26,044,902 UART: [art] Extend RT PCRs Done
26,046,126 UART: [art] Lock RT PCRs Done
26,047,649 UART: [art] Populate DV Done
26,053,125 UART: [fht] FMC Alias Private Key: 7
26,054,837 UART: [art] Derive CDI
26,055,578 UART: [art] Store in in slot 0x4
26,098,297 UART: [art] Derive Key Pair
26,099,340 UART: [art] Store priv key in slot 0x5
29,341,131 UART: [art] Derive Key Pair - Done
29,353,958 UART: [art] Signing Cert with AUTHO
29,355,273 UART: RITY.KEYID = 7
31,634,554 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,063 UART: [art] PUB.X = 04CB437486C5585AE7C42B4AB2828B60863273C824C4A3002C4227A1A606B6E7F088CC3015F596D6244504EA303F18AF
31,643,265 UART: [art] PUB.Y = ADFE06ED5CC24F6D612536E4A3529C44680CCEFABCD62C38119E426B48CA230A8BE09000AC85F9AEFCE766AFF606D9D5
31,650,567 UART: [art] SIG.R = 764790C5E7A777B74E11D223AD4F77277656E0E2175DD6B0611C022ACB1D687189647C0962F32A87E495F106341EC4C1
31,657,937 UART: [art] SIG.S = 97681C94A572B21255C8EA934B11AFA5D275D15760D269DC94ABAB24E9708B46FCCC196489560A4E352E7D8AD7B80625
32,963,393 UART: Caliptra RT
32,964,106 UART: [state] CFI Enabled
33,081,765 UART: [rt] RT listening for mailbox commands...
33,083,692 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,115,280 UART: [rt]cmd =0x44504543, len=136
38,673,319 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,175 UART:
192,546 UART: Running Caliptra ROM ...
193,686 UART:
193,831 UART: [state] CFI Enabled
266,013 UART: [state] LifecycleState = Unprovisioned
267,937 UART: [state] DebugLocked = No
269,899 UART: [state] WD Timer not started. Device not locked for debugging
273,163 UART: [kat] SHA2-256
452,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,830 UART: [kat] ++
464,360 UART: [kat] sha1
476,536 UART: [kat] SHA2-256
479,616 UART: [kat] SHA2-384
485,248 UART: [kat] SHA2-512-ACC
488,181 UART: [kat] ECC-384
2,948,644 UART: [kat] HMAC-384Kdf
2,971,553 UART: [kat] LMS
3,500,939 UART: [kat] --
3,505,257 UART: [cold-reset] ++
3,507,200 UART: [fht] FHT @ 0x50003400
3,518,317 UART: [idev] ++
3,518,888 UART: [idev] CDI.KEYID = 6
3,519,775 UART: [idev] SUBJECT.KEYID = 7
3,520,890 UART: [idev] UDS.KEYID = 0
3,521,895 ready_for_fw is high
3,522,094 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,698 UART: [idev] Erasing UDS.KEYID = 0
6,024,803 UART: [idev] Sha1 KeyId Algorithm
6,047,172 UART: [idev] --
6,051,174 UART: [ldev] ++
6,051,749 UART: [ldev] CDI.KEYID = 6
6,052,633 UART: [ldev] SUBJECT.KEYID = 5
6,053,852 UART: [ldev] AUTHORITY.KEYID = 7
6,055,089 UART: [ldev] FE.KEYID = 1
6,101,023 UART: [ldev] Erasing FE.KEYID = 1
8,604,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,674 UART: [ldev] --
10,413,873 UART: [fwproc] Wait for Commands...
10,416,431 UART: [fwproc] Recv command 0x46574c44
10,418,527 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,888,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,957,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,274,026 >>> mbox cmd response: success
14,277,746 UART: [afmc] ++
14,278,344 UART: [afmc] CDI.KEYID = 6
14,279,233 UART: [afmc] SUBJECT.KEYID = 7
14,280,339 UART: [afmc] AUTHORITY.KEYID = 5
16,805,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,978 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,735 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,774 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,670 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,582 UART: [afmc] --
18,605,448 UART: [cold-reset] --
18,610,386 UART: [state] Locking Datavault
18,617,093 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,749 UART: [state] Locking ICCM
18,621,442 UART: [exit] Launching FMC @ 0x40000130
18,629,838 UART:
18,630,073 UART: Running Caliptra FMC ...
18,631,177 UART:
18,631,333 UART: [state] CFI Enabled
18,686,940 UART: [fht] FMC Alias Private Key: 7
20,451,097 UART: [art] Extend RT PCRs Done
20,452,323 UART: [art] Lock RT PCRs Done
20,453,821 UART: [art] Populate DV Done
20,459,202 UART: [fht] FMC Alias Private Key: 7
20,460,853 UART: [art] Derive CDI
20,461,594 UART: [art] Store in in slot 0x4
20,519,231 UART: [art] Derive Key Pair
20,520,270 UART: [art] Store priv key in slot 0x5
22,983,184 UART: [art] Derive Key Pair - Done
22,995,912 UART: [art] Signing Cert with AUTHO
22,997,214 UART: RITY.KEYID = 7
24,708,541 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,051 UART: [art] PUB.X = ADB3EBD488B63C782EA1B6A45C30E7953F56A20B76B664A381786586EACA1F6F207BC4977F7DC1B97190872BE358BCBD
24,717,321 UART: [art] PUB.Y = 8F8E948CE5E05C02A292579143D1044EC13352B6A2318EC25CD9962F3FC0B332F98F79E4412D237D2E8CBB90C8038AD8
24,724,557 UART: [art] SIG.R = D2016553137DBA68B74857E7EF3A738C2C25D111829FCDBCAEB114236CE9DD387968A163EC420BB606D8FCBB6B8CB84D
24,731,957 UART: [art] SIG.S = 95E7A2DA6F7E126210CA847CC7F132FDD13694824DDF5EF399EE2F076752C356789989AD1A1F7EBF20FB917AF7EEEBB2
25,711,038 UART: Caliptra RT
25,711,739 UART: [state] CFI Enabled
25,875,672 UART: [rt] RT listening for mailbox commands...
25,877,612 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,909,276 UART: [rt]cmd =0x44504543, len=136
30,125,875 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,379,146 ready_for_fw is high
3,379,595 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,096,574 >>> mbox cmd response: success
18,381,666 UART:
18,382,100 UART: Running Caliptra FMC ...
18,383,206 UART:
18,383,384 UART: [state] CFI Enabled
18,453,186 UART: [fht] FMC Alias Private Key: 7
20,217,073 UART: [art] Extend RT PCRs Done
20,218,300 UART: [art] Lock RT PCRs Done
20,219,792 UART: [art] Populate DV Done
20,225,307 UART: [fht] FMC Alias Private Key: 7
20,226,953 UART: [art] Derive CDI
20,227,686 UART: [art] Store in in slot 0x4
20,285,048 UART: [art] Derive Key Pair
20,286,091 UART: [art] Store priv key in slot 0x5
22,749,282 UART: [art] Derive Key Pair - Done
22,762,341 UART: [art] Signing Cert with AUTHO
22,763,646 UART: RITY.KEYID = 7
24,474,426 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,929 UART: [art] PUB.X = 6A681C623D2509FE72B7EB97AF8B84DDECBF6F1B979D1C0CFF7D341B062A2DD57FC31CDA27F4D91D676EFC054F8F4253
24,483,222 UART: [art] PUB.Y = BCB8BC1801C7C5E3A24F5BD07E156B462CFA0F69E85E2CEC3773A42913A91179C635108ADA896D589C6E072434FE5817
24,490,514 UART: [art] SIG.R = 20FEB9AE2F32DD2E3118EDBBCE701D01B0F1B7A2FF9CD6816D2E3A175F9AC0F47661CBB53F478F3CC14CF98BF4C1162A
24,497,906 UART: [art] SIG.S = A6CBEDC2925156CBA65405D2F0D80F22BD347CB30B449FE4C7CB8C4297862F30A04EDB4F76B473C6E80B4777C01BC160
25,476,867 UART: Caliptra RT
25,477,585 UART: [state] CFI Enabled
25,641,194 UART: [rt] RT listening for mailbox commands...
25,643,123 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,674,674 UART: [rt]cmd =0x44504543, len=136
29,892,598 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,926 writing to cptra_bootfsm_go
193,216 UART:
193,561 UART: Running Caliptra ROM ...
194,750 UART:
604,155 UART: [state] CFI Enabled
618,821 UART: [state] LifecycleState = Unprovisioned
620,649 UART: [state] DebugLocked = No
621,970 UART: [state] WD Timer not started. Device not locked for debugging
626,006 UART: [kat] SHA2-256
805,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,699 UART: [kat] ++
817,231 UART: [kat] sha1
827,754 UART: [kat] SHA2-256
830,824 UART: [kat] SHA2-384
836,910 UART: [kat] SHA2-512-ACC
839,851 UART: [kat] ECC-384
3,283,749 UART: [kat] HMAC-384Kdf
3,296,553 UART: [kat] LMS
3,826,082 UART: [kat] --
3,831,317 UART: [cold-reset] ++
3,833,682 UART: [fht] FHT @ 0x50003400
3,845,370 UART: [idev] ++
3,845,936 UART: [idev] CDI.KEYID = 6
3,846,859 UART: [idev] SUBJECT.KEYID = 7
3,848,033 UART: [idev] UDS.KEYID = 0
3,848,963 ready_for_fw is high
3,849,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,534 UART: [idev] Erasing UDS.KEYID = 0
6,317,150 UART: [idev] Sha1 KeyId Algorithm
6,339,897 UART: [idev] --
6,344,511 UART: [ldev] ++
6,345,082 UART: [ldev] CDI.KEYID = 6
6,346,000 UART: [ldev] SUBJECT.KEYID = 5
6,347,163 UART: [ldev] AUTHORITY.KEYID = 7
6,348,447 UART: [ldev] FE.KEYID = 1
6,358,278 UART: [ldev] Erasing FE.KEYID = 1
8,830,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,444 UART: [ldev] --
10,625,500 UART: [fwproc] Wait for Commands...
10,627,166 UART: [fwproc] Recv command 0x46574c44
10,629,267 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,996 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,490,123 >>> mbox cmd response: success
14,494,836 UART: [afmc] ++
14,495,429 UART: [afmc] CDI.KEYID = 6
14,496,339 UART: [afmc] SUBJECT.KEYID = 7
14,497,437 UART: [afmc] AUTHORITY.KEYID = 5
16,998,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,315 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,073 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,980 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,867 UART: [afmc] --
18,794,631 UART: [cold-reset] --
18,798,649 UART: [state] Locking Datavault
18,802,130 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,835 UART: [state] Locking ICCM
18,805,719 UART: [exit] Launching FMC @ 0x40000130
18,814,114 UART:
18,814,348 UART: Running Caliptra FMC ...
18,815,448 UART:
18,815,611 UART: [state] CFI Enabled
18,823,549 UART: [fht] FMC Alias Private Key: 7
20,580,055 UART: [art] Extend RT PCRs Done
20,581,273 UART: [art] Lock RT PCRs Done
20,582,839 UART: [art] Populate DV Done
20,588,628 UART: [fht] FMC Alias Private Key: 7
20,590,168 UART: [art] Derive CDI
20,590,983 UART: [art] Store in in slot 0x4
20,633,492 UART: [art] Derive Key Pair
20,634,521 UART: [art] Store priv key in slot 0x5
23,061,306 UART: [art] Derive Key Pair - Done
23,074,363 UART: [art] Signing Cert with AUTHO
23,075,668 UART: RITY.KEYID = 7
24,781,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,890 UART: [art] PUB.X = 12684F268B6AC3EEC74BF4A72888C50A3B76E3819314EB9F44F4F24820605EF7E68D34ED58DCA88C6AAC5FCE36DC6770
24,790,141 UART: [art] PUB.Y = 3E2834E45277F2756BE75BB649AEA470FA353F272D898D67C4E1EABB9DB34DF3300773617171A21C19A61674C645992A
24,797,387 UART: [art] SIG.R = C3DA9BAED61F53BFC2A60C949ACDACD09BF244ADC1D205AC9ECDD9E9FBDD32194B3DE40BB6147FD27D084CD50C0FA665
24,804,840 UART: [art] SIG.S = 02AB9B0E64FA6F34A2B349A1E75710E717EADBE0380D904BC6C715A0801ADF5631572ECB3FEADCC77AD77A3DE9343E75
25,783,819 UART: Caliptra RT
25,784,529 UART: [state] CFI Enabled
25,901,385 UART: [rt] RT listening for mailbox commands...
25,903,318 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,935,087 UART: [rt]cmd =0x44504543, len=136
30,104,829 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,733 writing to cptra_bootfsm_go
3,690,287 ready_for_fw is high
3,690,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,038 >>> mbox cmd response: success
18,508,410 UART:
18,508,800 UART: Running Caliptra FMC ...
18,509,988 UART:
18,510,155 UART: [state] CFI Enabled
18,518,257 UART: [fht] FMC Alias Private Key: 7
20,275,392 UART: [art] Extend RT PCRs Done
20,276,624 UART: [art] Lock RT PCRs Done
20,278,191 UART: [art] Populate DV Done
20,283,503 UART: [fht] FMC Alias Private Key: 7
20,285,190 UART: [art] Derive CDI
20,285,938 UART: [art] Store in in slot 0x4
20,328,372 UART: [art] Derive Key Pair
20,329,373 UART: [art] Store priv key in slot 0x5
22,755,759 UART: [art] Derive Key Pair - Done
22,768,752 UART: [art] Signing Cert with AUTHO
22,770,085 UART: RITY.KEYID = 7
24,475,271 UART: [art] Erasing AUTHORITY.KEYID = 7
24,476,785 UART: [art] PUB.X = 54CCE55C99DFB9825CDBAA4A4E7B61DF1D2AC4E069452380CE496C90DD263BAFB111F8E0CF16050A57FC697AB4D069A2
24,484,092 UART: [art] PUB.Y = 02CCF8C1835A5738A347EBA6A0A938E35EE70556BE488B6044B7309CD0A4947FC6A115B3ED4C476D12E16A21F04E11FF
24,491,313 UART: [art] SIG.R = BF45B9ACFF0CFAE875BDB122526A8037FEAD82E68E16DCC12C47FCCBB43D6258322CEB77D93AF1F448AC8F39B2716534
24,498,765 UART: [art] SIG.S = DD1423F87539A25812C06768AB2232516400EC71A2E3FA417305624CEE71B0ECFC5C452F5320002A1CD107F3B3A357A4
25,477,488 UART: Caliptra RT
25,478,205 UART: [state] CFI Enabled
25,595,800 UART: [rt] RT listening for mailbox commands...
25,597,739 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,629,269 UART: [rt]cmd =0x44504543, len=136
29,798,376 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,234 UART:
192,597 UART: Running Caliptra ROM ...
193,792 UART:
193,949 UART: [state] CFI Enabled
263,481 UART: [state] LifecycleState = Unprovisioned
265,554 UART: [state] DebugLocked = No
267,801 UART: [state] WD Timer not started. Device not locked for debugging
271,930 UART: [kat] SHA2-256
461,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,536 UART: [kat] ++
472,989 UART: [kat] sha1
484,080 UART: [kat] SHA2-256
487,104 UART: [kat] SHA2-384
492,667 UART: [kat] SHA2-512-ACC
495,249 UART: [kat] ECC-384
2,947,752 UART: [kat] HMAC-384Kdf
2,971,789 UART: [kat] LMS
3,503,521 UART: [kat] --
3,508,723 UART: [cold-reset] ++
3,509,804 UART: [fht] FHT @ 0x50003400
3,519,825 UART: [idev] ++
3,520,565 UART: [idev] CDI.KEYID = 6
3,521,452 UART: [idev] SUBJECT.KEYID = 7
3,522,704 UART: [idev] UDS.KEYID = 0
3,523,973 ready_for_fw is high
3,524,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,631 UART: [idev] Erasing UDS.KEYID = 0
6,028,338 UART: [idev] Sha1 KeyId Algorithm
6,050,514 UART: [idev] --
6,055,646 UART: [ldev] ++
6,056,336 UART: [ldev] CDI.KEYID = 6
6,057,224 UART: [ldev] SUBJECT.KEYID = 5
6,058,435 UART: [ldev] AUTHORITY.KEYID = 7
6,059,662 UART: [ldev] FE.KEYID = 1
6,098,511 UART: [ldev] Erasing FE.KEYID = 1
8,603,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,706 UART: [ldev] --
10,412,680 UART: [fwproc] Wait for Commands...
10,415,752 UART: [fwproc] Recv command 0x46574c44
10,418,057 UART: [fwproc] Recv'd Img size: 114168 bytes
13,868,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,158 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,315 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,605,045 >>> mbox cmd response: success
14,609,583 UART: [afmc] ++
14,610,294 UART: [afmc] CDI.KEYID = 6
14,611,488 UART: [afmc] SUBJECT.KEYID = 7
14,612,933 UART: [afmc] AUTHORITY.KEYID = 5
17,149,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,271 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,373 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,413 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,345 UART: [afmc] --
18,944,025 UART: [cold-reset] --
18,948,277 UART: [state] Locking Datavault
18,953,758 UART: [state] Locking PCR0, PCR1 and PCR31
18,955,954 UART: [state] Locking ICCM
18,958,389 UART: [exit] Launching FMC @ 0x40000130
18,967,030 UART:
18,967,269 UART: Running Caliptra FMC ...
18,968,367 UART:
18,968,529 UART: [state] CFI Enabled
19,028,620 UART: [fht] FMC Alias Private Key: 7
20,792,393 UART: [art] Extend RT PCRs Done
20,793,612 UART: [art] Lock RT PCRs Done
20,795,085 UART: [art] Populate DV Done
20,800,498 UART: [fht] FMC Alias Private Key: 7
20,801,980 UART: [art] Derive CDI
20,802,739 UART: [art] Store in in slot 0x4
20,861,513 UART: [art] Derive Key Pair
20,862,512 UART: [art] Store priv key in slot 0x5
23,326,041 UART: [art] Derive Key Pair - Done
23,339,040 UART: [art] Signing Cert with AUTHO
23,340,348 UART: RITY.KEYID = 7
25,051,660 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,154 UART: [art] PUB.X = AC23AEA63F6D990982867CD0BA733A5B9838C15987245A9ACA9B045E28655D21C09B3C4D847853DCF4DA4A0E02FC8FF0
25,060,433 UART: [art] PUB.Y = DA5676761D2095FE031FB0E05069A6677DB1F4811D7080DE55ABCF761FA3CF14DA29D72D437608DFFFABD4C6FD3A2C00
25,067,685 UART: [art] SIG.R = 4FF187C853DB3AADA92F5088514F2DD17B06B6F09E9B5865DE3EE0777A3A62F26913EE789398CF95873483A3B51E1EEE
25,075,100 UART: [art] SIG.S = 49762387FBCE8745CE9AEAC2ABE9BC3B191187D69155AB071D5096C5561B5B610DAA0E3E0C2EAF00414D6C6C3809EF2B
26,054,088 UART: Caliptra RT
26,054,808 UART: [state] CFI Enabled
26,218,202 UART: [rt] RT listening for mailbox commands...
26,220,124 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,251,692 UART: [rt]cmd =0x44504543, len=136
30,468,515 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,438,682 ready_for_fw is high
3,439,081 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,728,925 >>> mbox cmd response: success
19,048,855 UART:
19,049,245 UART: Running Caliptra FMC ...
19,050,457 UART:
19,050,651 UART: [state] CFI Enabled
19,113,979 UART: [fht] FMC Alias Private Key: 7
20,877,348 UART: [art] Extend RT PCRs Done
20,878,564 UART: [art] Lock RT PCRs Done
20,880,194 UART: [art] Populate DV Done
20,885,497 UART: [fht] FMC Alias Private Key: 7
20,887,091 UART: [art] Derive CDI
20,887,908 UART: [art] Store in in slot 0x4
20,946,306 UART: [art] Derive Key Pair
20,947,350 UART: [art] Store priv key in slot 0x5
23,410,113 UART: [art] Derive Key Pair - Done
23,423,110 UART: [art] Signing Cert with AUTHO
23,424,424 UART: RITY.KEYID = 7
25,135,254 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,769 UART: [art] PUB.X = E004768BB0216AA5555DFA224877A12A72DF17BB990C723B53B04F4710F7CE06534EB4CEEF86667F83FEB4D0E848F710
25,144,001 UART: [art] PUB.Y = 53CEED3A064CA3DB80C2B658DEEC36006CBC83D036C9C6102CA89F4AFA1EE7E67F5E991538E406421D305162A9AE1507
25,151,283 UART: [art] SIG.R = 76C7286087DDC677BD0CD1509DDB4DE94F0F2359100EC264619339379442B227CA469888D454ABFC1C3E36BD703A9427
25,158,632 UART: [art] SIG.S = 2FE9C707AEC31F5A6FBC06743F5BF1B936D7806F36F12BC4ADEB7B4AEFF8564C8040A1FFC7C1F25F03103815E6588AA9
26,138,765 UART: Caliptra RT
26,139,480 UART: [state] CFI Enabled
26,304,266 UART: [rt] RT listening for mailbox commands...
26,306,208 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,337,590 UART: [rt]cmd =0x44504543, len=136
30,554,229 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
192,859 UART:
193,232 UART: Running Caliptra ROM ...
194,421 UART:
604,172 UART: [state] CFI Enabled
618,221 UART: [state] LifecycleState = Unprovisioned
620,624 UART: [state] DebugLocked = No
621,808 UART: [state] WD Timer not started. Device not locked for debugging
626,139 UART: [kat] SHA2-256
816,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,848 UART: [kat] ++
827,449 UART: [kat] sha1
837,833 UART: [kat] SHA2-256
840,838 UART: [kat] SHA2-384
847,695 UART: [kat] SHA2-512-ACC
850,311 UART: [kat] ECC-384
3,291,063 UART: [kat] HMAC-384Kdf
3,305,277 UART: [kat] LMS
3,837,119 UART: [kat] --
3,842,652 UART: [cold-reset] ++
3,844,682 UART: [fht] FHT @ 0x50003400
3,856,010 UART: [idev] ++
3,856,738 UART: [idev] CDI.KEYID = 6
3,857,657 UART: [idev] SUBJECT.KEYID = 7
3,858,833 UART: [idev] UDS.KEYID = 0
3,859,765 ready_for_fw is high
3,859,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,474 UART: [idev] Erasing UDS.KEYID = 0
6,335,201 UART: [idev] Sha1 KeyId Algorithm
6,357,018 UART: [idev] --
6,360,917 UART: [ldev] ++
6,361,600 UART: [ldev] CDI.KEYID = 6
6,362,620 UART: [ldev] SUBJECT.KEYID = 5
6,363,727 UART: [ldev] AUTHORITY.KEYID = 7
6,364,954 UART: [ldev] FE.KEYID = 1
6,377,015 UART: [ldev] Erasing FE.KEYID = 1
8,852,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,724 UART: [ldev] --
10,643,306 UART: [fwproc] Wait for Commands...
10,646,154 UART: [fwproc] Recv command 0x46574c44
10,648,460 UART: [fwproc] Recv'd Img size: 114168 bytes
14,098,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,658 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,674 >>> mbox cmd response: success
14,836,689 UART: [afmc] ++
14,837,399 UART: [afmc] CDI.KEYID = 6
14,838,588 UART: [afmc] SUBJECT.KEYID = 7
14,840,021 UART: [afmc] AUTHORITY.KEYID = 5
17,344,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,318 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,386 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,374 UART: [afmc] --
19,137,750 UART: [cold-reset] --
19,140,914 UART: [state] Locking Datavault
19,146,976 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,114 UART: [state] Locking ICCM
19,150,510 UART: [exit] Launching FMC @ 0x40000130
19,159,183 UART:
19,159,427 UART: Running Caliptra FMC ...
19,160,528 UART:
19,160,692 UART: [state] CFI Enabled
19,168,638 UART: [fht] FMC Alias Private Key: 7
20,925,829 UART: [art] Extend RT PCRs Done
20,927,174 UART: [art] Lock RT PCRs Done
20,928,662 UART: [art] Populate DV Done
20,934,042 UART: [fht] FMC Alias Private Key: 7
20,935,601 UART: [art] Derive CDI
20,936,423 UART: [art] Store in in slot 0x4
20,979,348 UART: [art] Derive Key Pair
20,980,347 UART: [art] Store priv key in slot 0x5
23,407,371 UART: [art] Derive Key Pair - Done
23,420,472 UART: [art] Signing Cert with AUTHO
23,421,778 UART: RITY.KEYID = 7
25,127,046 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,552 UART: [art] PUB.X = 714E3FD09286AA2BDC8BCD73F0218463F5775DC541CC47F398CF3FFCACC8A10BB72CFBE06AB925DFB59C17BA789156ED
25,135,852 UART: [art] PUB.Y = 141005F65CDD86DDD086234FB11D39F409CE303EA9281D680211047CAA02902DB4B5D9CAB159269AA575953BB7C5B7E9
25,143,083 UART: [art] SIG.R = DD4374863264507AB729656D99986271E7BC6F513059A22612F3EE3D0EEAECEADD513B91DDBC888AE1D40ECC9733A947
25,150,476 UART: [art] SIG.S = 11C4C43EB297BE1A0D1DB4CB835B35A6EE410C2166810A353042BD698DADB73D95BECC61AE45E6F75CF8C6062A41FF3B
26,129,549 UART: Caliptra RT
26,130,230 UART: [state] CFI Enabled
26,248,096 UART: [rt] RT listening for mailbox commands...
26,250,007 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,281,835 UART: [rt]cmd =0x44504543, len=136
30,451,479 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,595 writing to cptra_bootfsm_go
3,756,573 ready_for_fw is high
3,756,977 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,748 >>> mbox cmd response: success
19,201,172 UART:
19,201,597 UART: Running Caliptra FMC ...
19,202,740 UART:
19,202,905 UART: [state] CFI Enabled
19,211,111 UART: [fht] FMC Alias Private Key: 7
20,967,944 UART: [art] Extend RT PCRs Done
20,969,144 UART: [art] Lock RT PCRs Done
20,970,441 UART: [art] Populate DV Done
20,975,956 UART: [fht] FMC Alias Private Key: 7
20,977,495 UART: [art] Derive CDI
20,978,255 UART: [art] Store in in slot 0x4
21,020,962 UART: [art] Derive Key Pair
21,022,002 UART: [art] Store priv key in slot 0x5
23,448,174 UART: [art] Derive Key Pair - Done
23,461,605 UART: [art] Signing Cert with AUTHO
23,463,082 UART: RITY.KEYID = 7
25,168,392 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,887 UART: [art] PUB.X = CDB08F784AE234C9F2BBFC5F63D7CD32C28BB3EEFCE299B7FF7250FF1EB4C3542461389162D4FBD27F9B8607AC673C46
25,177,184 UART: [art] PUB.Y = 05CF1386FEC96A3A64A4A5D09147B25B74B58BF5003848077E301F1E0ED34D356E10C9B13C5A7F6BCB4E334962B4DA59
25,184,424 UART: [art] SIG.R = 45F3CAA4AC996B63A90D641E9FA6B07E8D0D7AA5806776B814F3159EDDC05EDE8A900DFDB7360B651B907065C775C36A
25,191,824 UART: [art] SIG.S = FAD831FC243AF5E9BBE81FE9418D7418D8B41955B5331E5140FA3F1E69F981557F5EF639775088F04F681F8E93D2A3A0
26,171,061 UART: Caliptra RT
26,171,776 UART: [state] CFI Enabled
26,290,522 UART: [rt] RT listening for mailbox commands...
26,292,458 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,323,898 UART: [rt]cmd =0x44504543, len=136
30,495,151 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,387 UART: [kat] SHA2-256
882,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,433 UART: [kat] ++
886,585 UART: [kat] sha1
890,743 UART: [kat] SHA2-256
892,681 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,554 UART: [kat] LMS
1,475,750 UART: [kat] --
1,476,749 UART: [cold-reset] ++
1,477,305 UART: [fht] Storing FHT @ 0x50003400
1,479,964 UART: [idev] ++
1,480,132 UART: [idev] CDI.KEYID = 6
1,480,492 UART: [idev] SUBJECT.KEYID = 7
1,480,916 UART: [idev] UDS.KEYID = 0
1,481,261 ready_for_fw is high
1,481,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,764 UART: [idev] Erasing UDS.KEYID = 0
1,504,740 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,312 UART: [idev] --
1,514,221 UART: [ldev] ++
1,514,389 UART: [ldev] CDI.KEYID = 6
1,514,752 UART: [ldev] SUBJECT.KEYID = 5
1,515,178 UART: [ldev] AUTHORITY.KEYID = 7
1,515,641 UART: [ldev] FE.KEYID = 1
1,520,813 UART: [ldev] Erasing FE.KEYID = 1
1,546,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,092 UART: [ldev] --
1,585,375 UART: [fwproc] Waiting for Commands...
1,586,050 UART: [fwproc] Received command 0x46574c44
1,586,841 UART: [fwproc] Received Image of size 114168 bytes
2,883,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,101 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,453 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,988 >>> mbox cmd response: success
3,077,068 UART: [afmc] ++
3,077,236 UART: [afmc] CDI.KEYID = 6
3,077,598 UART: [afmc] SUBJECT.KEYID = 7
3,078,023 UART: [afmc] AUTHORITY.KEYID = 5
3,113,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,742 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,470 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,355 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,045 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,874 UART: [afmc] --
3,156,982 UART: [cold-reset] --
3,158,042 UART: [state] Locking Datavault
3,158,875 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,479 UART: [state] Locking ICCM
3,160,041 UART: [exit] Launching FMC @ 0x40000130
3,165,370 UART:
3,165,386 UART: Running Caliptra FMC ...
3,165,794 UART:
3,165,848 UART: [state] CFI Enabled
3,176,569 UART: [fht] FMC Alias Private Key: 7
3,284,528 UART: [art] Extend RT PCRs Done
3,284,956 UART: [art] Lock RT PCRs Done
3,286,512 UART: [art] Populate DV Done
3,294,971 UART: [fht] FMC Alias Private Key: 7
3,295,963 UART: [art] Derive CDI
3,296,243 UART: [art] Store in in slot 0x4
3,381,796 UART: [art] Derive Key Pair
3,382,156 UART: [art] Store priv key in slot 0x5
3,395,494 UART: [art] Derive Key Pair - Done
3,410,454 UART: [art] Signing Cert with AUTHO
3,410,934 UART: RITY.KEYID = 7
3,426,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,167 UART: [art] PUB.X = EC602E042D9E8D95ACCA9BAC3EAA8F08DA268040A9F2A6B818ADAF791DCFB4B709F9464193B8D9023815BEE0983A311B
3,433,943 UART: [art] PUB.Y = 54BF6D13C3221F0012D956FD1E8605ECCB0D90895D050DE092848DBA03BB55D75621E48523E75FE472C99C0E8618FA7E
3,440,857 UART: [art] SIG.R = 04AFA6E8B08EAAB8CA3BE11B05833B3580F159903B72054A79E8EB5C347C04D780C05B67657310D8A88B9335D75A9228
3,447,615 UART: [art] SIG.S = 331C0E595716D067A5D4000E85B694C1E7039E88A944286CCBAC471BCAE875D3B03B16DA66BAB58AEBDDADE311CB7E2B
3,471,197 UART: Caliptra RT
3,471,450 UART: [state] CFI Enabled
3,579,936 UART: [rt] RT listening for mailbox commands...
3,580,606 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,188 UART: [rt]cmd =0x44504543, len=136
3,674,694 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 ready_for_fw is high
1,362,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,086 >>> mbox cmd response: success
2,984,614 UART:
2,984,630 UART: Running Caliptra FMC ...
2,985,038 UART:
2,985,092 UART: [state] CFI Enabled
2,995,747 UART: [fht] FMC Alias Private Key: 7
3,103,710 UART: [art] Extend RT PCRs Done
3,104,138 UART: [art] Lock RT PCRs Done
3,105,696 UART: [art] Populate DV Done
3,114,097 UART: [fht] FMC Alias Private Key: 7
3,115,035 UART: [art] Derive CDI
3,115,315 UART: [art] Store in in slot 0x4
3,201,116 UART: [art] Derive Key Pair
3,201,476 UART: [art] Store priv key in slot 0x5
3,215,132 UART: [art] Derive Key Pair - Done
3,229,703 UART: [art] Signing Cert with AUTHO
3,230,183 UART: RITY.KEYID = 7
3,245,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,954 UART: [art] PUB.X = 8ECD9FD901AD48C96E66A961A4CBEB86E7011B90862B8A3D94E55BBBF8D89479E0D9455607941B4F92AF609E7B8FE84E
3,252,727 UART: [art] PUB.Y = BC50E69091407A089A48EEE06C9136920289D17818879D4AEF9A318687F8276B04932BFBF71F8E41729F8463F91C6A02
3,259,657 UART: [art] SIG.R = 6948059260D0DA24DF3C03CCA48FE1809EFB1C1FD1D3609538C96ECB2A72AE44855558FDEBCC3B3148970A366BE42313
3,266,426 UART: [art] SIG.S = EC3E6A4CAEBD6CC3C3F8289561B09CCA711CD9415D2390791A97E0B89F3DAEF6937DFBFA262A7917DF61312F51A29499
3,290,119 UART: Caliptra RT
3,290,372 UART: [state] CFI Enabled
3,397,413 UART: [rt] RT listening for mailbox commands...
3,398,083 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,543 UART: [rt]cmd =0x44504543, len=136
3,491,697 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
87,024 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,714 UART: [kat] SHA2-256
882,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,760 UART: [kat] ++
886,912 UART: [kat] sha1
890,952 UART: [kat] SHA2-256
892,890 UART: [kat] SHA2-384
895,575 UART: [kat] SHA2-512-ACC
897,476 UART: [kat] ECC-384
903,159 UART: [kat] HMAC-384Kdf
907,707 UART: [kat] LMS
1,475,903 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,184 UART: [fht] Storing FHT @ 0x50003400
1,480,133 UART: [idev] ++
1,480,301 UART: [idev] CDI.KEYID = 6
1,480,661 UART: [idev] SUBJECT.KEYID = 7
1,481,085 UART: [idev] UDS.KEYID = 0
1,481,430 ready_for_fw is high
1,481,430 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,205 UART: [idev] Erasing UDS.KEYID = 0
1,505,917 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,421 UART: [idev] --
1,515,586 UART: [ldev] ++
1,515,754 UART: [ldev] CDI.KEYID = 6
1,516,117 UART: [ldev] SUBJECT.KEYID = 5
1,516,543 UART: [ldev] AUTHORITY.KEYID = 7
1,517,006 UART: [ldev] FE.KEYID = 1
1,522,296 UART: [ldev] Erasing FE.KEYID = 1
1,547,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,611 UART: [ldev] --
1,586,922 UART: [fwproc] Waiting for Commands...
1,587,643 UART: [fwproc] Received command 0x46574c44
1,588,434 UART: [fwproc] Received Image of size 114168 bytes
2,885,466 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,222 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,067 >>> mbox cmd response: success
3,079,133 UART: [afmc] ++
3,079,301 UART: [afmc] CDI.KEYID = 6
3,079,663 UART: [afmc] SUBJECT.KEYID = 7
3,080,088 UART: [afmc] AUTHORITY.KEYID = 5
3,115,229 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,337 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,845 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,730 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,420 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,239 UART: [afmc] --
3,158,285 UART: [cold-reset] --
3,159,159 UART: [state] Locking Datavault
3,159,966 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,570 UART: [state] Locking ICCM
3,161,104 UART: [exit] Launching FMC @ 0x40000130
3,166,433 UART:
3,166,449 UART: Running Caliptra FMC ...
3,166,857 UART:
3,167,000 UART: [state] CFI Enabled
3,177,943 UART: [fht] FMC Alias Private Key: 7
3,286,854 UART: [art] Extend RT PCRs Done
3,287,282 UART: [art] Lock RT PCRs Done
3,288,888 UART: [art] Populate DV Done
3,297,035 UART: [fht] FMC Alias Private Key: 7
3,298,149 UART: [art] Derive CDI
3,298,429 UART: [art] Store in in slot 0x4
3,384,204 UART: [art] Derive Key Pair
3,384,564 UART: [art] Store priv key in slot 0x5
3,398,312 UART: [art] Derive Key Pair - Done
3,412,954 UART: [art] Signing Cert with AUTHO
3,413,434 UART: RITY.KEYID = 7
3,428,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,585 UART: [art] PUB.X = 809F6A0C3C47F6D0E253805AE982F650F61EFB349C59F63BE21974BFD7716B2FDE755654706599C8E525AA2A6A0DA89B
3,436,355 UART: [art] PUB.Y = 513B99F8E53C37632259A4B0D60345D054B1A95619A95657F2494DBD28A0E23B03513D703E5B03CAFEE559D16EFB9BA3
3,443,298 UART: [art] SIG.R = B8D166425420DC6285CB649B0531250E5A43E480B9AF1ECC55FE4D83242F81936FC88DD6F4CFA7A7B0AE8EB61D3A01D5
3,450,071 UART: [art] SIG.S = 43A1ECD27517838DB38ABA4F9E555438A90912544D87F535A097860163614C9AF066B02D570C2744AFBD7FCBC7489E51
3,474,041 UART: Caliptra RT
3,474,386 UART: [state] CFI Enabled
3,582,149 UART: [rt] RT listening for mailbox commands...
3,582,819 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,449 UART: [rt]cmd =0x44504543, len=136
3,677,413 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,898 ready_for_fw is high
1,363,898 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,965 >>> mbox cmd response: success
2,988,527 UART:
2,988,543 UART: Running Caliptra FMC ...
2,988,951 UART:
2,989,094 UART: [state] CFI Enabled
2,999,837 UART: [fht] FMC Alias Private Key: 7
3,107,524 UART: [art] Extend RT PCRs Done
3,107,952 UART: [art] Lock RT PCRs Done
3,109,274 UART: [art] Populate DV Done
3,117,243 UART: [fht] FMC Alias Private Key: 7
3,118,265 UART: [art] Derive CDI
3,118,545 UART: [art] Store in in slot 0x4
3,204,196 UART: [art] Derive Key Pair
3,204,556 UART: [art] Store priv key in slot 0x5
3,217,636 UART: [art] Derive Key Pair - Done
3,232,456 UART: [art] Signing Cert with AUTHO
3,232,936 UART: RITY.KEYID = 7
3,248,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,201 UART: [art] PUB.X = 2E04DFB892D7C8427C5BC3128B2D9BF9C3154A203613E73DFEEC508B7651A5D2D866EC54E3A4548D4DDD444BFC1B964B
3,255,982 UART: [art] PUB.Y = 5E50C30F83B0DC58E30E154F1ACEFB96A5ADB3B63FE954410CB79DBD11D5F17BB24BA9851D9A958FCEFE9B9FBF082183
3,262,944 UART: [art] SIG.R = 1E61A78D910CA66D55B723013BF6387B0ECE24B2992C60B2D786B9796402F723E150F985EAB3A34A01131537D708449E
3,269,690 UART: [art] SIG.S = CDAD6F47837FA9871508709818B11F32C27FB9584D8C9BA2B791FE9A9E031A5C4F5FBCB90DE39741A486306E183607C4
3,293,161 UART: Caliptra RT
3,293,506 UART: [state] CFI Enabled
3,401,981 UART: [rt] RT listening for mailbox commands...
3,402,651 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,205 UART: [rt]cmd =0x44504543, len=136
3,496,855 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
893,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,429 UART: [kat] ++
897,581 UART: [kat] sha1
901,797 UART: [kat] SHA2-256
903,737 UART: [kat] SHA2-384
906,622 UART: [kat] SHA2-512-ACC
908,523 UART: [kat] ECC-384
918,030 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,172,341 UART: [cold-reset] ++
1,172,855 UART: [fht] FHT @ 0x50003400
1,175,726 UART: [idev] ++
1,175,894 UART: [idev] CDI.KEYID = 6
1,176,254 UART: [idev] SUBJECT.KEYID = 7
1,176,678 UART: [idev] UDS.KEYID = 0
1,177,023 ready_for_fw is high
1,177,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,424 UART: [idev] Erasing UDS.KEYID = 0
1,200,977 UART: [idev] Sha1 KeyId Algorithm
1,209,513 UART: [idev] --
1,210,341 UART: [ldev] ++
1,210,509 UART: [ldev] CDI.KEYID = 6
1,210,872 UART: [ldev] SUBJECT.KEYID = 5
1,211,298 UART: [ldev] AUTHORITY.KEYID = 7
1,211,761 UART: [ldev] FE.KEYID = 1
1,217,041 UART: [ldev] Erasing FE.KEYID = 1
1,243,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,290 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,869 >>> mbox cmd response: success
2,773,003 UART: [afmc] ++
2,773,171 UART: [afmc] CDI.KEYID = 6
2,773,533 UART: [afmc] SUBJECT.KEYID = 7
2,773,958 UART: [afmc] AUTHORITY.KEYID = 5
2,809,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,064 UART: [afmc] --
2,853,140 UART: [cold-reset] --
2,853,960 UART: [state] Locking Datavault
2,855,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,957 UART: [state] Locking ICCM
2,856,613 UART: [exit] Launching FMC @ 0x40000130
2,861,942 UART:
2,861,958 UART: Running Caliptra FMC ...
2,862,366 UART:
2,862,420 UART: [state] CFI Enabled
2,873,091 UART: [fht] FMC Alias Private Key: 7
2,980,878 UART: [art] Extend RT PCRs Done
2,981,306 UART: [art] Lock RT PCRs Done
2,982,480 UART: [art] Populate DV Done
2,990,673 UART: [fht] FMC Alias Private Key: 7
2,991,645 UART: [art] Derive CDI
2,991,925 UART: [art] Store in in slot 0x4
3,077,820 UART: [art] Derive Key Pair
3,078,180 UART: [art] Store priv key in slot 0x5
3,091,438 UART: [art] Derive Key Pair - Done
3,106,274 UART: [art] Signing Cert with AUTHO
3,106,754 UART: RITY.KEYID = 7
3,121,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,693 UART: [art] PUB.X = 4F448C6777DBA55104C8E4CD339906D7F2BE74CE6C0AA6A7B3A8001C0CB5D2CC21B6FD78B59EAB1B1D8720491B6F61C1
3,129,445 UART: [art] PUB.Y = 8E62608EB6701724307BF4ABC9ABF31312B358ADD17EE5CE97CEBEC5B2B8857670ED2E490EADA330000E5CE5EB341FDD
3,136,387 UART: [art] SIG.R = 19BD32FCA93B6E335335F5698CDE173A07E26954323C383EAF216BCC04AB79C0CF511B1024FC1159ADA075904DD7DC5C
3,143,161 UART: [art] SIG.S = 7ECA8F19FA0A428550D825E02C2420F0B6D51B9ADB567DB568207A3719685D64FB63F9FF9241F5991DC84C2F759945D8
3,166,665 UART: Caliptra RT
3,166,918 UART: [state] CFI Enabled
3,274,457 UART: [rt] RT listening for mailbox commands...
3,275,127 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,727 UART: [rt]cmd =0x44504543, len=136
3,368,637 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,127 ready_for_fw is high
1,060,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,526 >>> mbox cmd response: success
2,686,502 UART:
2,686,518 UART: Running Caliptra FMC ...
2,686,926 UART:
2,686,980 UART: [state] CFI Enabled
2,698,015 UART: [fht] FMC Alias Private Key: 7
2,805,744 UART: [art] Extend RT PCRs Done
2,806,172 UART: [art] Lock RT PCRs Done
2,807,804 UART: [art] Populate DV Done
2,815,841 UART: [fht] FMC Alias Private Key: 7
2,817,023 UART: [art] Derive CDI
2,817,303 UART: [art] Store in in slot 0x4
2,903,214 UART: [art] Derive Key Pair
2,903,574 UART: [art] Store priv key in slot 0x5
2,916,708 UART: [art] Derive Key Pair - Done
2,931,440 UART: [art] Signing Cert with AUTHO
2,931,920 UART: RITY.KEYID = 7
2,947,308 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,073 UART: [art] PUB.X = 5DA6319A7FFB18AD6073773990C6ABE3926E89B0A179FC70679C84EB41C5F7A1F9D533DBBA80F7721F68075F3E44E74E
2,954,848 UART: [art] PUB.Y = 79D304155D93E76586159E873B023ABBDF13CE4EB46AF2FE10EA35EF0C0421BE83CE82DE5B66764FFEC430D884ECEA21
2,961,802 UART: [art] SIG.R = A7EE2ECBD5FA10023E6D02F96F11904F2A0FFF7D4FDCA291E95D49B10DAEA0A5B42F0AF591596FA950E3494DC40D1944
2,968,574 UART: [art] SIG.S = D74DC4E2AA850D8CB624F87D099D2399375E4E69249E98E94C98D3414446F47DFE1B7BD74BB7735C4863732E42A7F0AC
2,992,487 UART: Caliptra RT
2,992,740 UART: [state] CFI Enabled
3,101,026 UART: [rt] RT listening for mailbox commands...
3,101,696 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,318 UART: [rt]cmd =0x44504543, len=136
3,195,212 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
919,209 UART: [kat] HMAC-384Kdf
923,837 UART: [kat] LMS
1,172,165 UART: [kat] --
1,173,174 UART: [cold-reset] ++
1,173,612 UART: [fht] FHT @ 0x50003400
1,176,157 UART: [idev] ++
1,176,325 UART: [idev] CDI.KEYID = 6
1,176,685 UART: [idev] SUBJECT.KEYID = 7
1,177,109 UART: [idev] UDS.KEYID = 0
1,177,454 ready_for_fw is high
1,177,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,877 UART: [idev] Erasing UDS.KEYID = 0
1,202,240 UART: [idev] Sha1 KeyId Algorithm
1,210,614 UART: [idev] --
1,211,606 UART: [ldev] ++
1,211,774 UART: [ldev] CDI.KEYID = 6
1,212,137 UART: [ldev] SUBJECT.KEYID = 5
1,212,563 UART: [ldev] AUTHORITY.KEYID = 7
1,213,026 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,244,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,412 UART: [ldev] --
1,283,879 UART: [fwproc] Wait for Commands...
1,284,673 UART: [fwproc] Recv command 0x46574c44
1,285,401 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,054 >>> mbox cmd response: success
2,774,162 UART: [afmc] ++
2,774,330 UART: [afmc] CDI.KEYID = 6
2,774,692 UART: [afmc] SUBJECT.KEYID = 7
2,775,117 UART: [afmc] AUTHORITY.KEYID = 5
2,811,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,767 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,652 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,371 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,219 UART: [afmc] --
2,854,275 UART: [cold-reset] --
2,855,125 UART: [state] Locking Datavault
2,856,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,954 UART: [state] Locking ICCM
2,857,416 UART: [exit] Launching FMC @ 0x40000130
2,862,745 UART:
2,862,761 UART: Running Caliptra FMC ...
2,863,169 UART:
2,863,312 UART: [state] CFI Enabled
2,873,823 UART: [fht] FMC Alias Private Key: 7
2,982,234 UART: [art] Extend RT PCRs Done
2,982,662 UART: [art] Lock RT PCRs Done
2,984,208 UART: [art] Populate DV Done
2,992,441 UART: [fht] FMC Alias Private Key: 7
2,993,385 UART: [art] Derive CDI
2,993,665 UART: [art] Store in in slot 0x4
3,079,222 UART: [art] Derive Key Pair
3,079,582 UART: [art] Store priv key in slot 0x5
3,092,666 UART: [art] Derive Key Pair - Done
3,107,311 UART: [art] Signing Cert with AUTHO
3,107,791 UART: RITY.KEYID = 7
3,122,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,686 UART: [art] PUB.X = 7C8213D33FD6FB1F64F09F563925C27B77BE26509D5C96F9E7F7EE4DDC120BC1FA4D3795CFFF8419947DC13788728966
3,130,459 UART: [art] PUB.Y = 7007D7D95CF88937BAC20C817E4B3D2301FA9E5AE578DB65D45937957A865A3DE3774B1F164CA50E226DBA4B15F5BAA1
3,137,407 UART: [art] SIG.R = FB5C1784E5BD452658954BF847D32B38BABE8A4C5EFB6F31024EDA2AB23BD7F562ABEC68F9FFD4308B0B0C960F541627
3,144,183 UART: [art] SIG.S = B2DC70517D81FF143F60A21666664DEA068E8846CD6D0B3AB621052269292F18EF496A00BB43555F1CA67956A491481C
3,168,229 UART: Caliptra RT
3,168,574 UART: [state] CFI Enabled
3,276,536 UART: [rt] RT listening for mailbox commands...
3,277,206 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,000 UART: [rt]cmd =0x44504543, len=136
3,371,406 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,696 ready_for_fw is high
1,060,696 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,209 >>> mbox cmd response: success
2,688,413 UART:
2,688,429 UART: Running Caliptra FMC ...
2,688,837 UART:
2,688,980 UART: [state] CFI Enabled
2,699,347 UART: [fht] FMC Alias Private Key: 7
2,807,640 UART: [art] Extend RT PCRs Done
2,808,068 UART: [art] Lock RT PCRs Done
2,809,634 UART: [art] Populate DV Done
2,817,823 UART: [fht] FMC Alias Private Key: 7
2,818,789 UART: [art] Derive CDI
2,819,069 UART: [art] Store in in slot 0x4
2,904,496 UART: [art] Derive Key Pair
2,904,856 UART: [art] Store priv key in slot 0x5
2,918,216 UART: [art] Derive Key Pair - Done
2,932,942 UART: [art] Signing Cert with AUTHO
2,933,422 UART: RITY.KEYID = 7
2,948,568 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,333 UART: [art] PUB.X = 020543235268B77125FC7C29AA496C928866FDBCD4FA7ED29C300C3B1A8D3D0B8CDBB612ED3CBDAC97B43258E2E76228
2,956,103 UART: [art] PUB.Y = 9A03A0AEA30B25D55C1AADE8DBEF7F1BB88F2B770B9E6C4C9E4D5455B11333E9C88113D41D56ADDF04413E8CCF54A4EF
2,963,065 UART: [art] SIG.R = 57503B1F0BD2FEDE4199CACA9A48B42A5790BB4473C0BEB0DAE77FF91305F0251EC2422BA20024F4ADEC400CDD750FE1
2,969,821 UART: [art] SIG.S = 6B340B49886A46746350648D30DF8149DD10BF0B4FE7AC23078EEC6977274E0166FC4491EC4F42B14A76DF50F219F6BD
2,993,510 UART: Caliptra RT
2,993,855 UART: [state] CFI Enabled
3,102,250 UART: [rt] RT listening for mailbox commands...
3,102,920 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,506 UART: [rt]cmd =0x44504543, len=136
3,197,212 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,157 UART: [kat] ++
895,309 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,006 UART: [kat] SHA2-512-ACC
905,907 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,332 UART: [kat] LMS
1,168,644 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,169,963 UART: [fht] FHT @ 0x50003400
1,172,679 UART: [idev] ++
1,172,847 UART: [idev] CDI.KEYID = 6
1,173,208 UART: [idev] SUBJECT.KEYID = 7
1,173,633 UART: [idev] UDS.KEYID = 0
1,173,979 ready_for_fw is high
1,173,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,275 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,316 UART: [ldev] ++
1,208,484 UART: [ldev] CDI.KEYID = 6
1,208,848 UART: [ldev] SUBJECT.KEYID = 5
1,209,275 UART: [ldev] AUTHORITY.KEYID = 7
1,209,738 UART: [ldev] FE.KEYID = 1
1,214,980 UART: [ldev] Erasing FE.KEYID = 1
1,241,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,506 UART: [ldev] --
1,279,856 UART: [fwproc] Wait for Commands...
1,280,653 UART: [fwproc] Recv command 0x46574c44
1,281,386 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,379 >>> mbox cmd response: success
2,770,606 UART: [afmc] ++
2,770,774 UART: [afmc] CDI.KEYID = 6
2,771,137 UART: [afmc] SUBJECT.KEYID = 7
2,771,563 UART: [afmc] AUTHORITY.KEYID = 5
2,806,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,025 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,754 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,637 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,356 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,085 UART: [afmc] --
2,850,045 UART: [cold-reset] --
2,850,865 UART: [state] Locking Datavault
2,852,116 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,720 UART: [state] Locking ICCM
2,853,178 UART: [exit] Launching FMC @ 0x40000130
2,858,507 UART:
2,858,523 UART: Running Caliptra FMC ...
2,858,931 UART:
2,858,985 UART: [state] CFI Enabled
2,869,368 UART: [fht] FMC Alias Private Key: 7
2,977,173 UART: [art] Extend RT PCRs Done
2,977,601 UART: [art] Lock RT PCRs Done
2,979,087 UART: [art] Populate DV Done
2,987,358 UART: [fht] FMC Alias Private Key: 7
2,988,304 UART: [art] Derive CDI
2,988,584 UART: [art] Store in in slot 0x4
3,074,407 UART: [art] Derive Key Pair
3,074,767 UART: [art] Store priv key in slot 0x5
3,087,509 UART: [art] Derive Key Pair - Done
3,102,169 UART: [art] Signing Cert with AUTHO
3,102,649 UART: RITY.KEYID = 7
3,117,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,332 UART: [art] PUB.X = AF615997AEE6B2849354D337CF778AB5EC012BAA683267D11E75E45FE9A5FF4F8C3AC6BAE5CA09855781F581F517C3E9
3,125,108 UART: [art] PUB.Y = 6870D26ED74912C4556D9130AE5CC6EB25D25AC6CB4122E744AF350B89F8C964800AA552D9D0ECEAD45FC5DF7C87A4FD
3,132,068 UART: [art] SIG.R = AE931B32F269E941FA93C4C7103F83374768C6D614F21325AF1513B4D62D0A7243F4DFA977E1A467A3229944B8D1D59E
3,138,833 UART: [art] SIG.S = 6A71001F9C63BA8893EFFE65F1BB5BBEABB45E6555E8E09C3DD545736F3C329BE85A6513EC8A0ADFC6841B696DCA78F0
3,162,525 UART: Caliptra RT
3,162,778 UART: [state] CFI Enabled
3,270,959 UART: [rt] RT listening for mailbox commands...
3,271,629 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,427 UART: [rt]cmd =0x44504543, len=136
3,366,411 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,226 ready_for_fw is high
1,056,226 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,851 >>> mbox cmd response: success
2,683,905 UART:
2,683,921 UART: Running Caliptra FMC ...
2,684,329 UART:
2,684,383 UART: [state] CFI Enabled
2,694,696 UART: [fht] FMC Alias Private Key: 7
2,802,247 UART: [art] Extend RT PCRs Done
2,802,675 UART: [art] Lock RT PCRs Done
2,804,201 UART: [art] Populate DV Done
2,812,370 UART: [fht] FMC Alias Private Key: 7
2,813,334 UART: [art] Derive CDI
2,813,614 UART: [art] Store in in slot 0x4
2,899,095 UART: [art] Derive Key Pair
2,899,455 UART: [art] Store priv key in slot 0x5
2,913,073 UART: [art] Derive Key Pair - Done
2,927,950 UART: [art] Signing Cert with AUTHO
2,928,430 UART: RITY.KEYID = 7
2,943,636 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,401 UART: [art] PUB.X = AA3C332791379357874FF884E577AA8D485C6B9BFB9E2D87C5183E8518EED05ED2659ED186E3EFE9A4AC561163186B61
2,951,175 UART: [art] PUB.Y = 92D5AFF77A8CE50FFB88736926A0C9845508F319A7A224BDB7472743DC69113F51D0E1D83133D6CEEF8EFD87B50B79DC
2,958,126 UART: [art] SIG.R = 32D0E8690D55650A076B08DBFC5AD06D9F4542CD3F24E1BB5D214A8FE3D9CA92E9B4E51D2FAC92273F0F2A643847CD06
2,964,892 UART: [art] SIG.S = B7338365DED7204BC17D14E7488546D9282F541D7E4C65541D72D3CD67534D88BCB489B45A00FE426A5D7A9D22945880
2,988,749 UART: Caliptra RT
2,989,002 UART: [state] CFI Enabled
3,097,573 UART: [rt] RT listening for mailbox commands...
3,098,243 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,063 UART: [rt]cmd =0x44504543, len=136
3,192,589 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,870 UART: [kat] ++
896,022 UART: [kat] sha1
900,352 UART: [kat] SHA2-256
902,292 UART: [kat] SHA2-384
905,105 UART: [kat] SHA2-512-ACC
907,006 UART: [kat] ECC-384
916,939 UART: [kat] HMAC-384Kdf
921,659 UART: [kat] LMS
1,169,971 UART: [kat] --
1,170,946 UART: [cold-reset] ++
1,171,444 UART: [fht] FHT @ 0x50003400
1,174,006 UART: [idev] ++
1,174,174 UART: [idev] CDI.KEYID = 6
1,174,535 UART: [idev] SUBJECT.KEYID = 7
1,174,960 UART: [idev] UDS.KEYID = 0
1,175,306 ready_for_fw is high
1,175,306 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,044 UART: [idev] Sha1 KeyId Algorithm
1,208,898 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,639 UART: [ldev] Erasing FE.KEYID = 1
1,242,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,675 UART: [ldev] --
1,282,169 UART: [fwproc] Wait for Commands...
1,282,850 UART: [fwproc] Recv command 0x46574c44
1,283,583 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,615 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,046 >>> mbox cmd response: success
2,772,207 UART: [afmc] ++
2,772,375 UART: [afmc] CDI.KEYID = 6
2,772,738 UART: [afmc] SUBJECT.KEYID = 7
2,773,164 UART: [afmc] AUTHORITY.KEYID = 5
2,808,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,110 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,839 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,722 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,441 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,294 UART: [afmc] --
2,852,200 UART: [cold-reset] --
2,853,080 UART: [state] Locking Datavault
2,854,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,827 UART: [state] Locking ICCM
2,855,395 UART: [exit] Launching FMC @ 0x40000130
2,860,724 UART:
2,860,740 UART: Running Caliptra FMC ...
2,861,148 UART:
2,861,291 UART: [state] CFI Enabled
2,872,064 UART: [fht] FMC Alias Private Key: 7
2,979,659 UART: [art] Extend RT PCRs Done
2,980,087 UART: [art] Lock RT PCRs Done
2,981,893 UART: [art] Populate DV Done
2,990,168 UART: [fht] FMC Alias Private Key: 7
2,991,164 UART: [art] Derive CDI
2,991,444 UART: [art] Store in in slot 0x4
3,077,411 UART: [art] Derive Key Pair
3,077,771 UART: [art] Store priv key in slot 0x5
3,091,247 UART: [art] Derive Key Pair - Done
3,105,663 UART: [art] Signing Cert with AUTHO
3,106,143 UART: RITY.KEYID = 7
3,121,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,018 UART: [art] PUB.X = D0665CF599EE850A313377113DC9707777604BA51B8A7D4253E93CF6D9412EADE0314571C6FC08E018ECC9893B7ED672
3,128,782 UART: [art] PUB.Y = 02DE47D9AAFECB90EAB49B9D2A6636BB024AAA376C6F24A22B06F7C3EA5B29756AA6C0823FCB3CEC2A27EC8CB38F3904
3,135,746 UART: [art] SIG.R = E848736A7496F2F725E9B5FCA0F5B0EE6E2F42F56EA57CECC7DC591CA223527E05FF992476BBE19759267F8D850050E2
3,142,499 UART: [art] SIG.S = 4FECBE63913617045A8CDFAC0C9816A3263C1FE8B0934EB934DD367BCA40783C44DD3CEF53DD114FD1E6A96FD75587C7
3,165,570 UART: Caliptra RT
3,165,915 UART: [state] CFI Enabled
3,274,178 UART: [rt] RT listening for mailbox commands...
3,274,848 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,754 UART: [rt]cmd =0x44504543, len=136
3,369,368 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,855 ready_for_fw is high
1,055,855 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,626 >>> mbox cmd response: success
2,679,668 UART:
2,679,684 UART: Running Caliptra FMC ...
2,680,092 UART:
2,680,235 UART: [state] CFI Enabled
2,690,946 UART: [fht] FMC Alias Private Key: 7
2,799,441 UART: [art] Extend RT PCRs Done
2,799,869 UART: [art] Lock RT PCRs Done
2,801,567 UART: [art] Populate DV Done
2,809,862 UART: [fht] FMC Alias Private Key: 7
2,810,862 UART: [art] Derive CDI
2,811,142 UART: [art] Store in in slot 0x4
2,897,139 UART: [art] Derive Key Pair
2,897,499 UART: [art] Store priv key in slot 0x5
2,910,859 UART: [art] Derive Key Pair - Done
2,925,856 UART: [art] Signing Cert with AUTHO
2,926,336 UART: RITY.KEYID = 7
2,941,586 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,351 UART: [art] PUB.X = 15C8CFDC92FCF5C03D3ADB4FDF854694530231A6A3B6E8803A20A1185442E65A5919C95295B6E651E8379B6CB72125C5
2,949,120 UART: [art] PUB.Y = 90BB5E68B024D739DB54AF8F2D588C5F3F6ECCCC4D657D9919AADA4527D48206C4A881FB178668B406A03212385150EE
2,956,070 UART: [art] SIG.R = 6C1D237C1B1F58B821DA1AA9466BC5CD398780AC7C2D628CE66F03821AEE113FCF4EC0713059F382FCDF065646DF3D56
2,962,846 UART: [art] SIG.S = 2BB7DD656328300F6893E14CE694A13FB235BDE0F9B32B46CBD2D69ECCFF0E85C3BD9A54FA629464972C35FC139469F8
2,986,601 UART: Caliptra RT
2,986,946 UART: [state] CFI Enabled
3,094,549 UART: [rt] RT listening for mailbox commands...
3,095,219 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,825 UART: [rt]cmd =0x44504543, len=136
3,190,023 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,123 UART:
192,484 UART: Running Caliptra ROM ...
193,606 UART:
193,745 UART: [state] CFI Enabled
267,462 UART: [state] LifecycleState = Unprovisioned
269,472 UART: [state] DebugLocked = No
271,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,298 UART: [kat] SHA2-256
446,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,569 UART: [kat] ++
457,043 UART: [kat] sha1
467,847 UART: [kat] SHA2-256
470,497 UART: [kat] SHA2-384
475,057 UART: [kat] SHA2-512-ACC
477,418 UART: [kat] ECC-384
2,770,272 UART: [kat] HMAC-384Kdf
2,793,027 UART: [kat] LMS
3,983,361 UART: [kat] --
3,987,911 UART: [cold-reset] ++
3,989,191 UART: [fht] Storing FHT @ 0x50003400
4,001,017 UART: [idev] ++
4,001,597 UART: [idev] CDI.KEYID = 6
4,002,504 UART: [idev] SUBJECT.KEYID = 7
4,003,747 UART: [idev] UDS.KEYID = 0
4,004,776 ready_for_fw is high
4,004,972 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,148,172 UART: [idev] Erasing UDS.KEYID = 0
7,337,784 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,277 UART: [idev] --
7,362,298 UART: [ldev] ++
7,362,866 UART: [ldev] CDI.KEYID = 6
7,363,880 UART: [ldev] SUBJECT.KEYID = 5
7,365,033 UART: [ldev] AUTHORITY.KEYID = 7
7,366,313 UART: [ldev] FE.KEYID = 1
7,415,685 UART: [ldev] Erasing FE.KEYID = 1
10,745,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,391 UART: [ldev] --
13,105,413 UART: [fwproc] Waiting for Commands...
13,107,931 UART: [fwproc] Received command 0x46574c44
13,110,161 UART: [fwproc] Received Image of size 113844 bytes
17,167,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,095 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,698 >>> mbox cmd response: success
17,638,269 UART: [afmc] ++
17,638,858 UART: [afmc] CDI.KEYID = 6
17,639,740 UART: [afmc] SUBJECT.KEYID = 7
17,641,004 UART: [afmc] AUTHORITY.KEYID = 5
20,997,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,297,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,299,795 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,314,197 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,329,054 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,343,512 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,364,579 UART: [afmc] --
23,369,190 UART: [cold-reset] --
23,373,590 UART: [state] Locking Datavault
23,377,691 UART: [state] Locking PCR0, PCR1 and PCR31
23,379,440 UART: [state] Locking ICCM
23,382,149 UART: [exit] Launching FMC @ 0x40000130
23,390,533 UART:
23,390,769 UART: Running Caliptra FMC ...
23,391,862 UART:
23,392,013 UART: [state] CFI Enabled
23,458,331 UART: [fht] FMC Alias Private Key: 7
25,795,822 UART: [art] Extend RT PCRs Done
25,797,043 UART: [art] Lock RT PCRs Done
25,798,362 UART: [art] Populate DV Done
25,803,938 UART: [fht] FMC Alias Private Key: 7
25,805,633 UART: [art] Derive CDI
25,806,365 UART: [art] Store in in slot 0x4
25,866,156 UART: [art] Derive Key Pair
25,867,189 UART: [art] Store priv key in slot 0x5
29,160,064 UART: [art] Derive Key Pair - Done
29,172,565 UART: [art] Signing Cert with AUTHO
29,173,887 UART: RITY.KEYID = 7
31,461,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,519 UART: [art] PUB.X = 811A5718229E31EC4060231825F910CF9E7704A1D8CA47950DD9D75226E7B2B2C5C28448F9B6791AB670EA16A97FD26E
31,469,775 UART: [art] PUB.Y = 33A47151A889D50C27E4A290604F527100894DA53EB7FC0E57EC4E504E3B173F9A90B356AB81CD38A2A51D4E3BEB06BC
31,477,033 UART: [art] SIG.R = 85670A90DE2E65A65BD439B49CE33D4DAE6B8E90B60179EB22A9968637BD3E89A7679BC3AD38BBCC2A7D2E508A33886E
31,484,388 UART: [art] SIG.S = CF541589122E8A7386170C7550064BFBE8C4851BDB3B4C869C12AD31070420085C5EAC88EC22DDFC3B3F501954B59264
32,789,738 UART: Caliptra RT
32,790,439 UART: [state] CFI Enabled
32,951,924 UART: [rt] RT listening for mailbox commands...
32,954,301 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,985,574 UART: [rt]cmd =0x44504543, len=92
41,037,157 >>> mbox cmd response data (6284 bytes)
41,066,443 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,096,262 UART: [rt]cmd =0x43455252, len=4
41,107,830 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,787,011 ready_for_fw is high
3,787,393 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,868,856 >>> mbox cmd response: success
23,566,846 UART:
23,567,619 UART: Running Caliptra FMC ...
23,568,746 UART:
23,568,893 UART: [state] CFI Enabled
23,633,916 UART: [fht] FMC Alias Private Key: 7
25,971,804 UART: [art] Extend RT PCRs Done
25,973,450 UART: [art] Lock RT PCRs Done
25,974,569 UART: [art] Populate DV Done
25,979,688 UART: [fht] FMC Alias Private Key: 7
25,981,176 UART: [art] Derive CDI
25,981,953 UART: [art] Store in in slot 0x4
26,041,234 UART: [art] Derive Key Pair
26,042,313 UART: [art] Store priv key in slot 0x5
29,335,221 UART: [art] Derive Key Pair - Done
29,348,270 UART: [art] Signing Cert with AUTHO
29,349,566 UART: RITY.KEYID = 7
31,637,042 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,548 UART: [art] PUB.X = 6A2937836BC5C9F4DB0C4CB51E9223A046B895D768A876CE77F912A09B2FD37ED921D74D3B2378C2075FAE849F12E632
31,645,756 UART: [art] PUB.Y = 07201A6389F39058C8DE94468FD6E4307691B208205E2026D787125AB3CF776937B918D4624C455E5F44147A60B6C32A
31,653,015 UART: [art] SIG.R = 705CB55FAEA8E60A4469F4E83F0591354F67DBF32DBE9CC75EAE06937091A6BC387A7720325B95371307A0AB17D031B2
31,660,363 UART: [art] SIG.S = 535355D6AEC85326E7CAA0BB9EEB44DB045D21A1428A79EB3B0DD0646FE1C66C0DE2652F0FFFBDD33AAF81286E75A82D
32,965,571 UART: Caliptra RT
32,966,268 UART: [state] CFI Enabled
33,129,119 UART: [rt] RT listening for mailbox commands...
33,131,420 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,162,413 UART: [rt]cmd =0x44504543, len=92
41,214,503 >>> mbox cmd response data (6284 bytes)
41,243,823 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,273,527 UART: [rt]cmd =0x43455252, len=4
41,285,068 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,454 UART:
192,829 UART: Running Caliptra ROM ...
193,960 UART:
603,843 UART: [state] CFI Enabled
616,522 UART: [state] LifecycleState = Unprovisioned
618,403 UART: [state] DebugLocked = No
620,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,707 UART: [kat] SHA2-256
795,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,007 UART: [kat] ++
806,464 UART: [kat] sha1
816,201 UART: [kat] SHA2-256
818,922 UART: [kat] SHA2-384
825,408 UART: [kat] SHA2-512-ACC
827,771 UART: [kat] ECC-384
3,111,900 UART: [kat] HMAC-384Kdf
3,123,927 UART: [kat] LMS
4,314,013 UART: [kat] --
4,318,009 UART: [cold-reset] ++
4,319,532 UART: [fht] Storing FHT @ 0x50003400
4,330,893 UART: [idev] ++
4,331,464 UART: [idev] CDI.KEYID = 6
4,332,498 UART: [idev] SUBJECT.KEYID = 7
4,333,673 UART: [idev] UDS.KEYID = 0
4,334,719 ready_for_fw is high
4,334,915 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,899 UART: [idev] Erasing UDS.KEYID = 0
7,623,294 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,474 UART: [idev] --
7,649,087 UART: [ldev] ++
7,649,665 UART: [ldev] CDI.KEYID = 6
7,650,550 UART: [ldev] SUBJECT.KEYID = 5
7,651,813 UART: [ldev] AUTHORITY.KEYID = 7
7,653,099 UART: [ldev] FE.KEYID = 1
7,665,151 UART: [ldev] Erasing FE.KEYID = 1
10,954,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,381 UART: [ldev] --
13,312,344 UART: [fwproc] Waiting for Commands...
13,315,512 UART: [fwproc] Received command 0x46574c44
13,317,696 UART: [fwproc] Received Image of size 113844 bytes
17,364,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,829,614 >>> mbox cmd response: success
17,834,179 UART: [afmc] ++
17,834,777 UART: [afmc] CDI.KEYID = 6
17,835,695 UART: [afmc] SUBJECT.KEYID = 7
17,836,912 UART: [afmc] AUTHORITY.KEYID = 5
21,153,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,230 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,537 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,897 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,752 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,227 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,243 UART: [afmc] --
23,522,731 UART: [cold-reset] --
23,527,294 UART: [state] Locking Datavault
23,533,363 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,125 UART: [state] Locking ICCM
23,536,415 UART: [exit] Launching FMC @ 0x40000130
23,544,809 UART:
23,545,042 UART: Running Caliptra FMC ...
23,546,145 UART:
23,546,310 UART: [state] CFI Enabled
23,554,486 UART: [fht] FMC Alias Private Key: 7
25,885,775 UART: [art] Extend RT PCRs Done
25,886,994 UART: [art] Lock RT PCRs Done
25,888,726 UART: [art] Populate DV Done
25,894,141 UART: [fht] FMC Alias Private Key: 7
25,895,678 UART: [art] Derive CDI
25,896,496 UART: [art] Store in in slot 0x4
25,938,818 UART: [art] Derive Key Pair
25,939,813 UART: [art] Store priv key in slot 0x5
29,182,242 UART: [art] Derive Key Pair - Done
29,195,123 UART: [art] Signing Cert with AUTHO
29,196,428 UART: RITY.KEYID = 7
31,475,592 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,101 UART: [art] PUB.X = F624E4DD5347BB99881CF009DA45CAC7DC74E80045A8EBAFFFD9110A7538614040542A0B43FF8DF8E26E70C918FEE042
31,484,506 UART: [art] PUB.Y = DEF6AB3C140059BE536A027AD31C70B84416CA2D5C05E42765BEA281459D9C38C081B93396072F7CBD9B14CC19C58DD3
31,491,601 UART: [art] SIG.R = D96B99DE11A391EA70E3E11193BAD7CB2F4A46FBE8BF3970AC42D95F0EF43434CFA9C9F70BD57D9194B83A088323488E
31,499,019 UART: [art] SIG.S = F6FB4F12171E48B7523B8DA608A8336E98E70ECA3E02929501B0CD207D3059637766F4E8A651FBFCD14A857340C470A3
32,803,429 UART: Caliptra RT
32,804,143 UART: [state] CFI Enabled
32,921,741 UART: [rt] RT listening for mailbox commands...
32,924,179 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,955,513 UART: [rt]cmd =0x44504543, len=92
40,926,964 >>> mbox cmd response data (6284 bytes)
40,956,305 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
40,986,113 UART: [rt]cmd =0x43455252, len=4
40,997,262 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,126,310 ready_for_fw is high
4,126,692 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,051,677 >>> mbox cmd response: success
23,691,674 UART:
23,692,085 UART: Running Caliptra FMC ...
23,693,295 UART:
23,693,470 UART: [state] CFI Enabled
23,701,365 UART: [fht] FMC Alias Private Key: 7
26,032,443 UART: [art] Extend RT PCRs Done
26,033,669 UART: [art] Lock RT PCRs Done
26,035,408 UART: [art] Populate DV Done
26,040,952 UART: [fht] FMC Alias Private Key: 7
26,042,619 UART: [art] Derive CDI
26,043,444 UART: [art] Store in in slot 0x4
26,086,424 UART: [art] Derive Key Pair
26,087,558 UART: [art] Store priv key in slot 0x5
29,329,375 UART: [art] Derive Key Pair - Done
29,342,045 UART: [art] Signing Cert with AUTHO
29,343,377 UART: RITY.KEYID = 7
31,622,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,246 UART: [art] PUB.X = E8DB8EF3400768A34E8DACF3F729714256C9B1ED62BC52603F6BA9411F2038A6ADC2F121553F12ED662751AC10640C49
31,631,465 UART: [art] PUB.Y = E3B63C6D032BD86E7178DD6F9E6B6C1367D178F6F3370EC8B182210593445264B0C5E9D80ED6A896AA293B2813734B9F
31,638,718 UART: [art] SIG.R = DA4BF76B2EF53B479B7294E7690FC24D2C695D7EF6723FB8576DE2AFA06320911E194AEB727543E5EC13DFA085669F37
31,646,083 UART: [art] SIG.S = EDC29CEB72CC913DA4C786E9DB015F084EBE762F251CFD0E310C53591BDEC6F92D46545661E44E13553867439CBD2B73
32,951,139 UART: Caliptra RT
32,951,854 UART: [state] CFI Enabled
33,069,021 UART: [rt] RT listening for mailbox commands...
33,071,447 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,102,621 UART: [rt]cmd =0x44504543, len=92
41,074,568 >>> mbox cmd response data (6284 bytes)
41,103,985 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,134,184 UART: [rt]cmd =0x43455252, len=4
41,145,501 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,113 UART:
192,547 UART: Running Caliptra ROM ...
193,905 UART:
194,271 UART: [state] CFI Enabled
262,824 UART: [state] LifecycleState = Unprovisioned
264,707 UART: [state] DebugLocked = No
266,453 UART: [state] WD Timer not started. Device not locked for debugging
270,490 UART: [kat] SHA2-256
449,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,238 UART: [kat] ++
461,778 UART: [kat] sha1
473,584 UART: [kat] SHA2-256
476,661 UART: [kat] SHA2-384
483,355 UART: [kat] SHA2-512-ACC
486,285 UART: [kat] ECC-384
2,950,484 UART: [kat] HMAC-384Kdf
2,970,460 UART: [kat] LMS
3,499,937 UART: [kat] --
3,503,804 UART: [cold-reset] ++
3,505,520 UART: [fht] FHT @ 0x50003400
3,516,355 UART: [idev] ++
3,516,918 UART: [idev] CDI.KEYID = 6
3,517,830 UART: [idev] SUBJECT.KEYID = 7
3,519,074 UART: [idev] UDS.KEYID = 0
3,520,003 ready_for_fw is high
3,520,202 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,801 UART: [idev] Erasing UDS.KEYID = 0
6,027,020 UART: [idev] Sha1 KeyId Algorithm
6,048,947 UART: [idev] --
6,052,652 UART: [ldev] ++
6,053,231 UART: [ldev] CDI.KEYID = 6
6,054,145 UART: [ldev] SUBJECT.KEYID = 5
6,055,367 UART: [ldev] AUTHORITY.KEYID = 7
6,056,617 UART: [ldev] FE.KEYID = 1
6,097,406 UART: [ldev] Erasing FE.KEYID = 1
8,598,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,930 UART: [ldev] --
10,410,732 UART: [fwproc] Wait for Commands...
10,413,902 UART: [fwproc] Recv command 0x46574c44
10,415,998 UART: [fwproc] Recv'd Img size: 114168 bytes
13,814,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,357 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,147 >>> mbox cmd response: success
14,285,134 UART: [afmc] ++
14,285,753 UART: [afmc] CDI.KEYID = 6
14,286,668 UART: [afmc] SUBJECT.KEYID = 7
14,287,769 UART: [afmc] AUTHORITY.KEYID = 5
16,826,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,726 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,542 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,416 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,241 UART: [afmc] --
18,628,561 UART: [cold-reset] --
18,633,071 UART: [state] Locking Datavault
18,639,184 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,887 UART: [state] Locking ICCM
18,642,608 UART: [exit] Launching FMC @ 0x40000130
18,651,010 UART:
18,651,266 UART: Running Caliptra FMC ...
18,652,369 UART:
18,652,531 UART: [state] CFI Enabled
18,709,108 UART: [fht] FMC Alias Private Key: 7
20,473,451 UART: [art] Extend RT PCRs Done
20,474,662 UART: [art] Lock RT PCRs Done
20,476,549 UART: [art] Populate DV Done
20,481,524 UART: [fht] FMC Alias Private Key: 7
20,483,178 UART: [art] Derive CDI
20,483,998 UART: [art] Store in in slot 0x4
20,541,901 UART: [art] Derive Key Pair
20,542,935 UART: [art] Store priv key in slot 0x5
23,005,946 UART: [art] Derive Key Pair - Done
23,019,052 UART: [art] Signing Cert with AUTHO
23,020,365 UART: RITY.KEYID = 7
24,731,763 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,276 UART: [art] PUB.X = 4A0756D15A44501C57302C3C2821E1CAC6DDB396BC15D6AF7715F1CDB84C30DD4B169123AE39831DF7DEF461FEC729CB
24,740,528 UART: [art] PUB.Y = 143372B6B334B6C5AF4410754EDC174E4201BAB594C1FB0656294093A4A3CAE4963DB3B24984C255064495AF0B188CB2
24,747,818 UART: [art] SIG.R = 3F3B8C7C212726D6786BE364F8F49F05C2C56E872D67FEEB66169D94D83CCBF09F63455A8E0C04459698F2CC3A23ACCB
24,755,215 UART: [art] SIG.S = C1C3918F18F1E93768855FB562426254C98BBBC9EA11838C48E17D7D08BD21375F8AEBF0EB54CFE3C0E379AF699E4807
25,734,259 UART: Caliptra RT
25,734,959 UART: [state] CFI Enabled
25,899,009 UART: [rt] RT listening for mailbox commands...
25,901,363 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,932,502 UART: [rt]cmd =0x44504543, len=92
32,005,811 >>> mbox cmd response data (6284 bytes)
32,035,365 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,065,296 UART: [rt]cmd =0x43455252, len=4
32,076,996 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,381,780 ready_for_fw is high
3,382,215 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,084,071 >>> mbox cmd response: success
18,360,584 UART:
18,360,992 UART: Running Caliptra FMC ...
18,362,156 UART:
18,362,324 UART: [state] CFI Enabled
18,427,661 UART: [fht] FMC Alias Private Key: 7
20,192,408 UART: [art] Extend RT PCRs Done
20,193,633 UART: [art] Lock RT PCRs Done
20,195,370 UART: [art] Populate DV Done
20,200,840 UART: [fht] FMC Alias Private Key: 7
20,202,445 UART: [art] Derive CDI
20,203,268 UART: [art] Store in in slot 0x4
20,260,476 UART: [art] Derive Key Pair
20,261,476 UART: [art] Store priv key in slot 0x5
22,723,867 UART: [art] Derive Key Pair - Done
22,736,711 UART: [art] Signing Cert with AUTHO
22,738,013 UART: RITY.KEYID = 7
24,449,900 UART: [art] Erasing AUTHORITY.KEYID = 7
24,451,402 UART: [art] PUB.X = EA19AAA21A5534EB38A180C4C1A30C96D70EDD4AB4517B76AA5DFC1ABEEEA7B34DC27E209F0209D64D9FEC8BE609252E
24,458,717 UART: [art] PUB.Y = C1AF71FBFB4B1DFC264888152C041E8E9DB950BD1871BDF96C3B9B50FB6A929E0B1D68FFCF4618BD12C211B07372AD47
24,465,959 UART: [art] SIG.R = 0CFDA1E08E274162471B391E753953470E85FA75BFB134925D91A066DEEE072095829E75BE3AC23988023470D4E24A59
24,473,339 UART: [art] SIG.S = 12D1889F077F368599DF175DDD500A64F957A729F8A91965A5589BDDD5FCBF516C635F17E4397FDD4EC5B6187292FF5F
25,451,610 UART: Caliptra RT
25,452,318 UART: [state] CFI Enabled
25,618,524 UART: [rt] RT listening for mailbox commands...
25,620,948 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,651,933 UART: [rt]cmd =0x44504543, len=92
31,722,694 >>> mbox cmd response data (6284 bytes)
31,752,197 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,782,060 UART: [rt]cmd =0x43455252, len=4
31,793,560 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
192,924 UART:
193,296 UART: Running Caliptra ROM ...
194,482 UART:
603,955 UART: [state] CFI Enabled
619,594 UART: [state] LifecycleState = Unprovisioned
621,464 UART: [state] DebugLocked = No
622,785 UART: [state] WD Timer not started. Device not locked for debugging
626,773 UART: [kat] SHA2-256
805,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,459 UART: [kat] ++
817,909 UART: [kat] sha1
828,850 UART: [kat] SHA2-256
831,929 UART: [kat] SHA2-384
838,481 UART: [kat] SHA2-512-ACC
841,414 UART: [kat] ECC-384
3,285,465 UART: [kat] HMAC-384Kdf
3,298,694 UART: [kat] LMS
3,828,212 UART: [kat] --
3,831,496 UART: [cold-reset] ++
3,833,071 UART: [fht] FHT @ 0x50003400
3,844,972 UART: [idev] ++
3,845,535 UART: [idev] CDI.KEYID = 6
3,846,562 UART: [idev] SUBJECT.KEYID = 7
3,847,683 UART: [idev] UDS.KEYID = 0
3,848,613 ready_for_fw is high
3,848,824 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,283 UART: [idev] Erasing UDS.KEYID = 0
6,317,866 UART: [idev] Sha1 KeyId Algorithm
6,341,260 UART: [idev] --
6,346,032 UART: [ldev] ++
6,346,616 UART: [ldev] CDI.KEYID = 6
6,347,526 UART: [ldev] SUBJECT.KEYID = 5
6,348,684 UART: [ldev] AUTHORITY.KEYID = 7
6,349,915 UART: [ldev] FE.KEYID = 1
6,358,296 UART: [ldev] Erasing FE.KEYID = 1
8,832,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,921 UART: [ldev] --
10,621,022 UART: [fwproc] Wait for Commands...
10,622,476 UART: [fwproc] Recv command 0x46574c44
10,624,567 UART: [fwproc] Recv'd Img size: 114168 bytes
14,023,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,482,585 >>> mbox cmd response: success
14,486,222 UART: [afmc] ++
14,486,824 UART: [afmc] CDI.KEYID = 6
14,487,733 UART: [afmc] SUBJECT.KEYID = 7
14,488,892 UART: [afmc] AUTHORITY.KEYID = 5
16,989,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,134 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,937 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,912 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,789 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,631 UART: [afmc] --
18,784,852 UART: [cold-reset] --
18,789,358 UART: [state] Locking Datavault
18,795,629 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,325 UART: [state] Locking ICCM
18,799,364 UART: [exit] Launching FMC @ 0x40000130
18,807,820 UART:
18,808,053 UART: Running Caliptra FMC ...
18,809,156 UART:
18,809,318 UART: [state] CFI Enabled
18,817,530 UART: [fht] FMC Alias Private Key: 7
20,573,969 UART: [art] Extend RT PCRs Done
20,575,174 UART: [art] Lock RT PCRs Done
20,576,702 UART: [art] Populate DV Done
20,582,279 UART: [fht] FMC Alias Private Key: 7
20,583,824 UART: [art] Derive CDI
20,584,635 UART: [art] Store in in slot 0x4
20,627,125 UART: [art] Derive Key Pair
20,628,126 UART: [art] Store priv key in slot 0x5
23,055,565 UART: [art] Derive Key Pair - Done
23,068,788 UART: [art] Signing Cert with AUTHO
23,070,091 UART: RITY.KEYID = 7
24,775,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,868 UART: [art] PUB.X = CA3290794780A41C8903A0464203369FF6109BFC0955A8F58D24CA6C09D198E830E1C4AC503B9BB5589EE3208D4BB0CE
24,784,169 UART: [art] PUB.Y = ACAE5279FA13E70B0641B4382956E86DE25E2B23A12FAEDB558566403ED7788B5349640F34F22DD4E0C82A0169414442
24,791,403 UART: [art] SIG.R = B5E357C9DCBF831FA6BA1522538D7A565FDD6BC173FA1F34B4374AB3DD91C8A50A1F0236CAAD793DAE487E97F8B6AAB0
24,798,872 UART: [art] SIG.S = E491AF6A33EB951F2AFA7ECD1DD0FB24524FBACCF3A81EE0DE52BF7DAFA40F6605C467D5949E5029AA685312F1D7A26E
25,777,557 UART: Caliptra RT
25,778,272 UART: [state] CFI Enabled
25,895,791 UART: [rt] RT listening for mailbox commands...
25,898,209 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,929,159 UART: [rt]cmd =0x44504543, len=92
31,938,272 >>> mbox cmd response data (6284 bytes)
31,967,574 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,997,546 UART: [rt]cmd =0x43455252, len=4
32,008,867 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,760 writing to cptra_bootfsm_go
3,692,836 ready_for_fw is high
3,693,200 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,099 >>> mbox cmd response: success
18,513,768 UART:
18,514,161 UART: Running Caliptra FMC ...
18,515,348 UART:
18,515,519 UART: [state] CFI Enabled
18,523,469 UART: [fht] FMC Alias Private Key: 7
20,280,621 UART: [art] Extend RT PCRs Done
20,281,837 UART: [art] Lock RT PCRs Done
20,283,410 UART: [art] Populate DV Done
20,289,041 UART: [fht] FMC Alias Private Key: 7
20,290,633 UART: [art] Derive CDI
20,291,448 UART: [art] Store in in slot 0x4
20,334,378 UART: [art] Derive Key Pair
20,335,429 UART: [art] Store priv key in slot 0x5
22,762,707 UART: [art] Derive Key Pair - Done
22,775,767 UART: [art] Signing Cert with AUTHO
22,777,073 UART: RITY.KEYID = 7
24,482,708 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,213 UART: [art] PUB.X = EA9B96EB6F9D08D06E6909735CC2D0402C332354C195564FC6649732EFCA3F43FC9C021CCECEDCB683C7BCD62269D44A
24,491,494 UART: [art] PUB.Y = F4BAB249C97B5D2651DD3B5AC05E3EFBE4D39A0629F05346588D71E0571C539A1E411E5BBCB202C95834483B52E76B26
24,498,759 UART: [art] SIG.R = 2164D10EDBE1926896669D1C052578F410F7ED0417F8F9C6D635EA29A5014121C2F929FA13C242716C91C03AB0DE6AB2
24,506,100 UART: [art] SIG.S = 0E081D51AC9FAB6793BEA0C1CA816C1027147F43C861CD62CC589845FF60A515B3AE7EF69E9817FF52871E9C80DD0E19
25,485,557 UART: Caliptra RT
25,486,274 UART: [state] CFI Enabled
25,603,659 UART: [rt] RT listening for mailbox commands...
25,606,144 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,637,345 UART: [rt]cmd =0x44504543, len=92
31,645,773 >>> mbox cmd response data (6284 bytes)
31,675,328 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,705,071 UART: [rt]cmd =0x43455252, len=4
31,716,423 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,142 UART:
192,516 UART: Running Caliptra ROM ...
193,826 UART:
193,985 UART: [state] CFI Enabled
263,747 UART: [state] LifecycleState = Unprovisioned
266,166 UART: [state] DebugLocked = No
268,137 UART: [state] WD Timer not started. Device not locked for debugging
273,116 UART: [kat] SHA2-256
462,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,749 UART: [kat] ++
474,202 UART: [kat] sha1
487,476 UART: [kat] SHA2-256
490,488 UART: [kat] SHA2-384
497,161 UART: [kat] SHA2-512-ACC
499,717 UART: [kat] ECC-384
2,949,103 UART: [kat] HMAC-384Kdf
2,973,568 UART: [kat] LMS
3,505,305 UART: [kat] --
3,510,436 UART: [cold-reset] ++
3,512,791 UART: [fht] FHT @ 0x50003400
3,524,356 UART: [idev] ++
3,525,074 UART: [idev] CDI.KEYID = 6
3,526,012 UART: [idev] SUBJECT.KEYID = 7
3,527,193 UART: [idev] UDS.KEYID = 0
3,528,120 ready_for_fw is high
3,528,337 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,976 UART: [idev] Erasing UDS.KEYID = 0
6,031,678 UART: [idev] Sha1 KeyId Algorithm
6,055,123 UART: [idev] --
6,060,472 UART: [ldev] ++
6,061,161 UART: [ldev] CDI.KEYID = 6
6,062,078 UART: [ldev] SUBJECT.KEYID = 5
6,063,239 UART: [ldev] AUTHORITY.KEYID = 7
6,064,469 UART: [ldev] FE.KEYID = 1
6,101,748 UART: [ldev] Erasing FE.KEYID = 1
8,606,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,119 UART: [ldev] --
10,416,606 UART: [fwproc] Wait for Commands...
10,419,180 UART: [fwproc] Recv command 0x46574c44
10,421,496 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,180 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,592,476 >>> mbox cmd response: success
14,597,246 UART: [afmc] ++
14,597,971 UART: [afmc] CDI.KEYID = 6
14,599,164 UART: [afmc] SUBJECT.KEYID = 7
14,600,604 UART: [afmc] AUTHORITY.KEYID = 5
17,130,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,853,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,855,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,164 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,230 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,701 UART: [afmc] --
18,928,784 UART: [cold-reset] --
18,933,737 UART: [state] Locking Datavault
18,937,718 UART: [state] Locking PCR0, PCR1 and PCR31
18,939,937 UART: [state] Locking ICCM
18,942,026 UART: [exit] Launching FMC @ 0x40000130
18,950,665 UART:
18,950,901 UART: Running Caliptra FMC ...
18,951,928 UART:
18,952,079 UART: [state] CFI Enabled
19,012,637 UART: [fht] FMC Alias Private Key: 7
20,777,284 UART: [art] Extend RT PCRs Done
20,778,508 UART: [art] Lock RT PCRs Done
20,780,509 UART: [art] Populate DV Done
20,785,978 UART: [fht] FMC Alias Private Key: 7
20,787,570 UART: [art] Derive CDI
20,788,383 UART: [art] Store in in slot 0x4
20,845,480 UART: [art] Derive Key Pair
20,846,520 UART: [art] Store priv key in slot 0x5
23,309,635 UART: [art] Derive Key Pair - Done
23,322,848 UART: [art] Signing Cert with AUTHO
23,324,154 UART: RITY.KEYID = 7
25,034,990 UART: [art] Erasing AUTHORITY.KEYID = 7
25,036,495 UART: [art] PUB.X = A3ED9F29983CE4A20DD2766EEF50B02EECDDEB8284993B01A81960D951C40987E262522B4260BB9186BEEA96DCADB40D
25,043,756 UART: [art] PUB.Y = 419124FD730E36D6AB4A3442F00B174159D4BDC68672DD187779EF1051E5D6C2744F8A455D7AB9C31452A5D5596FD826
25,051,012 UART: [art] SIG.R = 57AA2BB8B49EB79598CFB2D538D5F1E2B740E44EC2B4D86B0A2370A2BA5879150629DA8A02B9193D4C2D832E296798A6
25,058,440 UART: [art] SIG.S = E352495F2D6CBE6AD76E63A3172390937A48FB80BF427D8EF7CCE00C449FE0B31FE5A0B9DF40FEF478474F501BD1F927
26,037,576 UART: Caliptra RT
26,038,285 UART: [state] CFI Enabled
26,202,145 UART: [rt] RT listening for mailbox commands...
26,204,530 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,235,411 UART: [rt]cmd =0x44504543, len=92
32,306,456 >>> mbox cmd response data (6284 bytes)
32,335,803 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,365,738 UART: [rt]cmd =0x43455252, len=4
32,377,313 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,437,170 ready_for_fw is high
3,437,740 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,725,377 >>> mbox cmd response: success
19,002,343 UART:
19,002,736 UART: Running Caliptra FMC ...
19,003,883 UART:
19,004,054 UART: [state] CFI Enabled
19,070,119 UART: [fht] FMC Alias Private Key: 7
20,833,906 UART: [art] Extend RT PCRs Done
20,835,126 UART: [art] Lock RT PCRs Done
20,836,704 UART: [art] Populate DV Done
20,842,076 UART: [fht] FMC Alias Private Key: 7
20,843,731 UART: [art] Derive CDI
20,844,547 UART: [art] Store in in slot 0x4
20,902,561 UART: [art] Derive Key Pair
20,903,608 UART: [art] Store priv key in slot 0x5
23,366,640 UART: [art] Derive Key Pair - Done
23,379,758 UART: [art] Signing Cert with AUTHO
23,381,071 UART: RITY.KEYID = 7
25,091,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,093,361 UART: [art] PUB.X = 476BF890F1FEF907670949DD9C80B461FE07DE6D3390F6B45B8B947C4424F358488211BF6987BA1AF2D62E8592308A18
25,100,648 UART: [art] PUB.Y = A38EE9810B84FA548AEEFD46729E518284F7B89E140EA75FC130A70972D0379C3D5C1B1FAF5BA2F02919393BBB154344
25,107,922 UART: [art] SIG.R = 825F379092424EB6D287DBF2806BAFD7AE39BFE91DC12BAD0B70BC2E16511659DC6C392C39A71A43A6BABD31F2CA23D4
25,115,302 UART: [art] SIG.S = 7DD99F55F9C3794F282C2FD8735FA2F940EB4EE5AA1220ACA325D0B30AD169AC7E169ABE6FB04E760A06843CDD15030A
26,094,105 UART: Caliptra RT
26,094,824 UART: [state] CFI Enabled
26,259,673 UART: [rt] RT listening for mailbox commands...
26,262,063 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,292,898 UART: [rt]cmd =0x44504543, len=92
32,363,379 >>> mbox cmd response data (6284 bytes)
32,393,066 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,422,839 UART: [rt]cmd =0x43455252, len=4
32,434,077 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,643 writing to cptra_bootfsm_go
192,768 UART:
193,168 UART: Running Caliptra ROM ...
194,274 UART:
604,026 UART: [state] CFI Enabled
617,050 UART: [state] LifecycleState = Unprovisioned
619,424 UART: [state] DebugLocked = No
621,950 UART: [state] WD Timer not started. Device not locked for debugging
626,124 UART: [kat] SHA2-256
815,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,735 UART: [kat] ++
827,254 UART: [kat] sha1
838,978 UART: [kat] SHA2-256
841,979 UART: [kat] SHA2-384
847,043 UART: [kat] SHA2-512-ACC
849,624 UART: [kat] ECC-384
3,291,684 UART: [kat] HMAC-384Kdf
3,305,211 UART: [kat] LMS
3,836,984 UART: [kat] --
3,841,491 UART: [cold-reset] ++
3,842,501 UART: [fht] FHT @ 0x50003400
3,853,567 UART: [idev] ++
3,854,239 UART: [idev] CDI.KEYID = 6
3,855,274 UART: [idev] SUBJECT.KEYID = 7
3,856,379 UART: [idev] UDS.KEYID = 0
3,857,312 ready_for_fw is high
3,857,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,844 UART: [idev] Erasing UDS.KEYID = 0
6,336,654 UART: [idev] Sha1 KeyId Algorithm
6,358,053 UART: [idev] --
6,362,959 UART: [ldev] ++
6,363,635 UART: [ldev] CDI.KEYID = 6
6,364,549 UART: [ldev] SUBJECT.KEYID = 5
6,365,706 UART: [ldev] AUTHORITY.KEYID = 7
6,366,954 UART: [ldev] FE.KEYID = 1
6,378,899 UART: [ldev] Erasing FE.KEYID = 1
8,858,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,555 UART: [ldev] --
10,649,036 UART: [fwproc] Wait for Commands...
10,650,956 UART: [fwproc] Recv command 0x46574c44
10,653,220 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,366 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,513 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,201 >>> mbox cmd response: success
14,836,805 UART: [afmc] ++
14,837,532 UART: [afmc] CDI.KEYID = 6
14,838,723 UART: [afmc] SUBJECT.KEYID = 7
14,840,163 UART: [afmc] AUTHORITY.KEYID = 5
17,341,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,183 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,355 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,949 UART: [afmc] --
19,139,914 UART: [cold-reset] --
19,143,456 UART: [state] Locking Datavault
19,147,521 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,716 UART: [state] Locking ICCM
19,152,406 UART: [exit] Launching FMC @ 0x40000130
19,161,029 UART:
19,161,287 UART: Running Caliptra FMC ...
19,162,388 UART:
19,162,545 UART: [state] CFI Enabled
19,170,643 UART: [fht] FMC Alias Private Key: 7
20,927,957 UART: [art] Extend RT PCRs Done
20,929,174 UART: [art] Lock RT PCRs Done
20,930,612 UART: [art] Populate DV Done
20,935,864 UART: [fht] FMC Alias Private Key: 7
20,937,410 UART: [art] Derive CDI
20,938,175 UART: [art] Store in in slot 0x4
20,981,095 UART: [art] Derive Key Pair
20,982,135 UART: [art] Store priv key in slot 0x5
23,408,240 UART: [art] Derive Key Pair - Done
23,421,339 UART: [art] Signing Cert with AUTHO
23,422,635 UART: RITY.KEYID = 7
25,127,839 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,364 UART: [art] PUB.X = 097215D2469801625765F59946FAA9202CD0ABD1C6B7E9A6940A1B314E813EE2F9003565B32B004F2A08A6D68A7C44DF
25,136,565 UART: [art] PUB.Y = 3403B1E79CEB963E0C1E88AC4273169514EEAA73E57021658960C177850A7059D0B7A43FBF4E4ABBB21393FD4F41E18F
25,143,848 UART: [art] SIG.R = C0447B0EF1AF48C7B54CE31729534119E3BA1E4090CC4BCBE13E500ADE1F50E903CBE394A2B4F49B0E74919A0CBC695D
25,151,254 UART: [art] SIG.S = 415AE22E9802E9D3EDC8B1A37ED6FD6B02FF5750FAD18E468A807AD18ED69E8495BBF7A3CBC6F7002A10B3C1BED7A8EA
26,129,952 UART: Caliptra RT
26,130,663 UART: [state] CFI Enabled
26,248,110 UART: [rt] RT listening for mailbox commands...
26,250,495 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,281,660 UART: [rt]cmd =0x44504543, len=92
32,289,965 >>> mbox cmd response data (6284 bytes)
32,319,316 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,349,401 UART: [rt]cmd =0x43455252, len=4
32,360,821 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,673 writing to cptra_bootfsm_go
3,759,559 ready_for_fw is high
3,760,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,935,279 >>> mbox cmd response: success
19,196,118 UART:
19,196,506 UART: Running Caliptra FMC ...
19,197,712 UART:
19,197,887 UART: [state] CFI Enabled
19,205,563 UART: [fht] FMC Alias Private Key: 7
20,962,818 UART: [art] Extend RT PCRs Done
20,964,045 UART: [art] Lock RT PCRs Done
20,965,731 UART: [art] Populate DV Done
20,971,249 UART: [fht] FMC Alias Private Key: 7
20,972,850 UART: [art] Derive CDI
20,973,668 UART: [art] Store in in slot 0x4
21,016,380 UART: [art] Derive Key Pair
21,017,427 UART: [art] Store priv key in slot 0x5
23,443,996 UART: [art] Derive Key Pair - Done
23,457,037 UART: [art] Signing Cert with AUTHO
23,458,334 UART: RITY.KEYID = 7
25,163,451 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,965 UART: [art] PUB.X = DC8696BF9719C2AB74D718332DA765FD88D0ABC9B0398819D456C08D6CF37B22CA693D2AFEEBD0439347EC08FA103B90
25,172,221 UART: [art] PUB.Y = 5A090D9C9198A2745A3C21C9EE2C2DA4006E4FFF4D02E815C09B0474CCC91019D2C5C750DB36F8638F7F979B8687F8CE
25,179,455 UART: [art] SIG.R = 8220025A50501F256180286E512226065DC82E8D5C04865258CD43E2894A74A13E4195A4D0C307A04893F4D6BEC5F99D
25,186,792 UART: [art] SIG.S = 79E95A86FB6842C22870848B0DF243F7F8C2D5D50AC1E028FEA8060232908EAF86323E3C843F9C74C4463B2D8CBEBDE2
26,165,696 UART: Caliptra RT
26,166,392 UART: [state] CFI Enabled
26,283,037 UART: [rt] RT listening for mailbox commands...
26,285,419 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,316,457 UART: [rt]cmd =0x44504543, len=92
32,325,160 >>> mbox cmd response data (6284 bytes)
32,354,633 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,384,456 UART: [rt]cmd =0x43455252, len=4
32,395,933 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,883 UART: [kat] SHA2-256
881,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,929 UART: [kat] ++
886,081 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
894,964 UART: [kat] SHA2-512-ACC
896,865 UART: [kat] ECC-384
902,506 UART: [kat] HMAC-384Kdf
907,026 UART: [kat] LMS
1,475,222 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,467 UART: [fht] Storing FHT @ 0x50003400
1,479,336 UART: [idev] ++
1,479,504 UART: [idev] CDI.KEYID = 6
1,479,864 UART: [idev] SUBJECT.KEYID = 7
1,480,288 UART: [idev] UDS.KEYID = 0
1,480,633 ready_for_fw is high
1,480,633 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,180 UART: [idev] Erasing UDS.KEYID = 0
1,505,194 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,822 UART: [idev] --
1,514,667 UART: [ldev] ++
1,514,835 UART: [ldev] CDI.KEYID = 6
1,515,198 UART: [ldev] SUBJECT.KEYID = 5
1,515,624 UART: [ldev] AUTHORITY.KEYID = 7
1,516,087 UART: [ldev] FE.KEYID = 1
1,521,145 UART: [ldev] Erasing FE.KEYID = 1
1,545,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,728 UART: [ldev] --
1,585,011 UART: [fwproc] Waiting for Commands...
1,585,756 UART: [fwproc] Received command 0x46574c44
1,586,547 UART: [fwproc] Received Image of size 114168 bytes
2,882,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,857 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,209 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,910 >>> mbox cmd response: success
3,076,090 UART: [afmc] ++
3,076,258 UART: [afmc] CDI.KEYID = 6
3,076,620 UART: [afmc] SUBJECT.KEYID = 7
3,077,045 UART: [afmc] AUTHORITY.KEYID = 5
3,111,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,175 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,865 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,964 UART: [afmc] --
3,154,908 UART: [cold-reset] --
3,155,600 UART: [state] Locking Datavault
3,156,659 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,263 UART: [state] Locking ICCM
3,157,935 UART: [exit] Launching FMC @ 0x40000130
3,163,264 UART:
3,163,280 UART: Running Caliptra FMC ...
3,163,688 UART:
3,163,742 UART: [state] CFI Enabled
3,174,089 UART: [fht] FMC Alias Private Key: 7
3,282,564 UART: [art] Extend RT PCRs Done
3,282,992 UART: [art] Lock RT PCRs Done
3,284,656 UART: [art] Populate DV Done
3,292,845 UART: [fht] FMC Alias Private Key: 7
3,293,795 UART: [art] Derive CDI
3,294,075 UART: [art] Store in in slot 0x4
3,379,874 UART: [art] Derive Key Pair
3,380,234 UART: [art] Store priv key in slot 0x5
3,393,634 UART: [art] Derive Key Pair - Done
3,408,336 UART: [art] Signing Cert with AUTHO
3,408,816 UART: RITY.KEYID = 7
3,424,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,161 UART: [art] PUB.X = 50154C7AADA59B4BFE3CAA2EEA37D8B2C8072D7EA60C9DD009A8F879307052AE38C7F48D27100CFFB162B7590FFDDA1F
3,431,938 UART: [art] PUB.Y = 25985C82A8D0A75CBBB0CE2C6B705989491866144BD84E16634ECA22979BC8A1F1775FE4C215EC6C8CB372E5EBE3DD43
3,438,898 UART: [art] SIG.R = D78D51250C6027ADE72F75F5EBBB134EE45E83C2F4D26D0C81694151DDDF2A1D7483E5A3026B286A8A9274939A0C1B69
3,445,662 UART: [art] SIG.S = 8379105AC01AEF47072373642D817A23CDC3AAE3C4A81AF72672BE7C4B848B8F3D3EE60705E56C2A483D43A42543A50B
3,469,277 UART: Caliptra RT
3,469,530 UART: [state] CFI Enabled
3,577,278 UART: [rt] RT listening for mailbox commands...
3,577,948 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,332 UART: [rt]cmd =0x44504543, len=92
3,824,497 >>> mbox cmd response data (6284 bytes)
3,824,498 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,711 UART: [rt]cmd =0x43455252, len=4
3,864,638 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 ready_for_fw is high
1,362,663 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,438 >>> mbox cmd response: success
2,986,302 UART:
2,986,318 UART: Running Caliptra FMC ...
2,986,726 UART:
2,986,780 UART: [state] CFI Enabled
2,997,195 UART: [fht] FMC Alias Private Key: 7
3,104,800 UART: [art] Extend RT PCRs Done
3,105,228 UART: [art] Lock RT PCRs Done
3,106,782 UART: [art] Populate DV Done
3,115,139 UART: [fht] FMC Alias Private Key: 7
3,116,255 UART: [art] Derive CDI
3,116,535 UART: [art] Store in in slot 0x4
3,202,034 UART: [art] Derive Key Pair
3,202,394 UART: [art] Store priv key in slot 0x5
3,215,940 UART: [art] Derive Key Pair - Done
3,230,736 UART: [art] Signing Cert with AUTHO
3,231,216 UART: RITY.KEYID = 7
3,246,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,427 UART: [art] PUB.X = AE27D1D777A722B1955A0D5F211F8FC17016C683FD682A03DF9DE95FB10E7281E0AE4C8C8B6C15057D2BC03883B9616D
3,254,193 UART: [art] PUB.Y = 991A4B1FA7C1E5852DFEF0108CE4DBCE1A79337455F1BDA2FF8E5E2F4865B6CC910B153DDE84AFF11395E7C3C9ADB738
3,261,162 UART: [art] SIG.R = 26CB78A6DE4B9A46529F049F9CCEF53039C4121A8C76A99F99E71355EC423BFC2472877C7487716A55FD57787EAA15D9
3,267,931 UART: [art] SIG.S = CCD3281802BA8D1FA5C5B3D59DF77B3527E8D7106FD8385E8693C55511FEE94D0290E69C6EDE413C7C250BECF8712A69
3,291,531 UART: Caliptra RT
3,291,784 UART: [state] CFI Enabled
3,400,181 UART: [rt] RT listening for mailbox commands...
3,400,851 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,501 UART: [rt]cmd =0x44504543, len=92
3,647,871 >>> mbox cmd response data (6284 bytes)
3,647,872 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,153 UART: [rt]cmd =0x43455252, len=4
3,688,097 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
890,882 UART: [kat] SHA2-256
892,820 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
902,985 UART: [kat] HMAC-384Kdf
907,781 UART: [kat] LMS
1,475,977 UART: [kat] --
1,476,968 UART: [cold-reset] ++
1,477,472 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 ready_for_fw is high
1,481,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,621 UART: [idev] Erasing UDS.KEYID = 0
1,506,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,791 UART: [idev] --
1,515,634 UART: [ldev] ++
1,515,802 UART: [ldev] CDI.KEYID = 6
1,516,165 UART: [ldev] SUBJECT.KEYID = 5
1,516,591 UART: [ldev] AUTHORITY.KEYID = 7
1,517,054 UART: [ldev] FE.KEYID = 1
1,522,658 UART: [ldev] Erasing FE.KEYID = 1
1,548,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,761 UART: [ldev] --
1,587,124 UART: [fwproc] Waiting for Commands...
1,587,935 UART: [fwproc] Received command 0x46574c44
1,588,726 UART: [fwproc] Received Image of size 114168 bytes
2,884,372 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,948 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,300 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,811 >>> mbox cmd response: success
3,077,905 UART: [afmc] ++
3,078,073 UART: [afmc] CDI.KEYID = 6
3,078,435 UART: [afmc] SUBJECT.KEYID = 7
3,078,860 UART: [afmc] AUTHORITY.KEYID = 5
3,114,863 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,065 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,573 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,458 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,148 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,967 UART: [afmc] --
3,158,013 UART: [cold-reset] --
3,158,815 UART: [state] Locking Datavault
3,159,798 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,402 UART: [state] Locking ICCM
3,160,896 UART: [exit] Launching FMC @ 0x40000130
3,166,225 UART:
3,166,241 UART: Running Caliptra FMC ...
3,166,649 UART:
3,166,792 UART: [state] CFI Enabled
3,177,451 UART: [fht] FMC Alias Private Key: 7
3,286,028 UART: [art] Extend RT PCRs Done
3,286,456 UART: [art] Lock RT PCRs Done
3,288,088 UART: [art] Populate DV Done
3,296,203 UART: [fht] FMC Alias Private Key: 7
3,297,235 UART: [art] Derive CDI
3,297,515 UART: [art] Store in in slot 0x4
3,383,096 UART: [art] Derive Key Pair
3,383,456 UART: [art] Store priv key in slot 0x5
3,397,116 UART: [art] Derive Key Pair - Done
3,411,700 UART: [art] Signing Cert with AUTHO
3,412,180 UART: RITY.KEYID = 7
3,426,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,637 UART: [art] PUB.X = BB0F1DF79650BAFC75B9D01D44DE81BAFA0A9189482FDD5762619F29D1D66BD671DA9D85F28326A7B3ECD4AB51B33EB7
3,434,421 UART: [art] PUB.Y = 00B3D4A9C913F8BE58F5F753F3C12F19D59F56D081D25F7A81C227F15FDC25121CE5CAAACCC77786F27C1CCD9AB40015
3,441,343 UART: [art] SIG.R = B2DA4D6A9F29FA6C8815695754AD4900A3FD7BE56848BFB7597ADDAE0F61064233159AAAAD41BAB89BE96B62B5F909CD
3,448,100 UART: [art] SIG.S = FA5FF81423D87E06F10CDCF55E940E120D9137071D3432BD384C34B8922A085A65D8EFCFCD66F350F97BB88FAF9E78A7
3,471,789 UART: Caliptra RT
3,472,134 UART: [state] CFI Enabled
3,580,728 UART: [rt] RT listening for mailbox commands...
3,581,398 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,518 UART: [rt]cmd =0x44504543, len=92
3,827,461 >>> mbox cmd response data (6284 bytes)
3,827,462 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,039 UART: [rt]cmd =0x43455252, len=4
3,867,882 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,582 ready_for_fw is high
1,362,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,585 >>> mbox cmd response: success
2,985,723 UART:
2,985,739 UART: Running Caliptra FMC ...
2,986,147 UART:
2,986,290 UART: [state] CFI Enabled
2,996,599 UART: [fht] FMC Alias Private Key: 7
3,104,236 UART: [art] Extend RT PCRs Done
3,104,664 UART: [art] Lock RT PCRs Done
3,106,198 UART: [art] Populate DV Done
3,114,585 UART: [fht] FMC Alias Private Key: 7
3,115,599 UART: [art] Derive CDI
3,115,879 UART: [art] Store in in slot 0x4
3,202,112 UART: [art] Derive Key Pair
3,202,472 UART: [art] Store priv key in slot 0x5
3,215,626 UART: [art] Derive Key Pair - Done
3,230,554 UART: [art] Signing Cert with AUTHO
3,231,034 UART: RITY.KEYID = 7
3,246,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,855 UART: [art] PUB.X = F3ACCFCF1F08AC458970C1A90A096760EB1AF50A3D4DF977AB09BF25695FE530C43A9199D2F23123E60DA906E9C11066
3,253,614 UART: [art] PUB.Y = 6D991C18C86450A93BABF390E001596DF63017B9EC0A82DD3179AE1D2A4EA21EA8F76B9FAADAC8FE9A6496A959E43386
3,260,572 UART: [art] SIG.R = DF3F702339B16A3FD8C332438646D145DA29A8B40CFF320AB5E0A761BBD4FA0B9619CE7AF7C8F1FFA8E4ED336D0F9C25
3,267,350 UART: [art] SIG.S = E0D4A897C08BBC19159807151656F3FD3AC1EFD14300B6216AFE809A9A1A3D0244D0E15E995AE3DBB9AA61181D4BADE3
3,291,007 UART: Caliptra RT
3,291,352 UART: [state] CFI Enabled
3,400,070 UART: [rt] RT listening for mailbox commands...
3,400,740 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,080 UART: [rt]cmd =0x44504543, len=92
3,648,113 >>> mbox cmd response data (6284 bytes)
3,648,114 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,355 UART: [rt]cmd =0x43455252, len=4
3,688,020 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
893,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,223 UART: [kat] ++
897,375 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,598 UART: [kat] SHA2-512-ACC
908,499 UART: [kat] ECC-384
918,048 UART: [kat] HMAC-384Kdf
922,392 UART: [kat] LMS
1,170,720 UART: [kat] --
1,171,261 UART: [cold-reset] ++
1,171,673 UART: [fht] FHT @ 0x50003400
1,174,222 UART: [idev] ++
1,174,390 UART: [idev] CDI.KEYID = 6
1,174,750 UART: [idev] SUBJECT.KEYID = 7
1,175,174 UART: [idev] UDS.KEYID = 0
1,175,519 ready_for_fw is high
1,175,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,114 UART: [idev] Erasing UDS.KEYID = 0
1,200,357 UART: [idev] Sha1 KeyId Algorithm
1,208,735 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,330 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,215,901 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,723 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,657 >>> mbox cmd response: success
2,772,763 UART: [afmc] ++
2,772,931 UART: [afmc] CDI.KEYID = 6
2,773,293 UART: [afmc] SUBJECT.KEYID = 7
2,773,718 UART: [afmc] AUTHORITY.KEYID = 5
2,809,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,642 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,118 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,003 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,722 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,752 UART: [afmc] --
2,852,650 UART: [cold-reset] --
2,853,688 UART: [state] Locking Datavault
2,854,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,581 UART: [state] Locking ICCM
2,856,185 UART: [exit] Launching FMC @ 0x40000130
2,861,514 UART:
2,861,530 UART: Running Caliptra FMC ...
2,861,938 UART:
2,861,992 UART: [state] CFI Enabled
2,872,461 UART: [fht] FMC Alias Private Key: 7
2,980,074 UART: [art] Extend RT PCRs Done
2,980,502 UART: [art] Lock RT PCRs Done
2,982,132 UART: [art] Populate DV Done
2,990,417 UART: [fht] FMC Alias Private Key: 7
2,991,535 UART: [art] Derive CDI
2,991,815 UART: [art] Store in in slot 0x4
3,077,554 UART: [art] Derive Key Pair
3,077,914 UART: [art] Store priv key in slot 0x5
3,091,056 UART: [art] Derive Key Pair - Done
3,106,178 UART: [art] Signing Cert with AUTHO
3,106,658 UART: RITY.KEYID = 7
3,122,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,879 UART: [art] PUB.X = 69C497444DAFC40047E8CCB4EC50394112EAA6A5FBD956697BB929A92E74506F0BF719F6027DA53AE3F75D23B89F86C9
3,129,629 UART: [art] PUB.Y = 783EDB1CA0709B5F64C9429E522A345BA6E4B77DC974D45410C073E388587FCBA12F8D457C1D54805CC0F5A81C40DBB7
3,136,587 UART: [art] SIG.R = B43D0F1707FE7A84A9CE2776286B5784A38F452F32A4B477F1DB8F45D96E17F6E00BCFD1E1CE9F92EDD72DEFD6BC556B
3,143,368 UART: [art] SIG.S = 057D3403D89DD5314CFBE4C8A6F18616BB56CEB236B47AA26EFF2A109E3889EA8C2489525AD43C8931512861739D4F7A
3,167,291 UART: Caliptra RT
3,167,544 UART: [state] CFI Enabled
3,274,955 UART: [rt] RT listening for mailbox commands...
3,275,625 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,353 UART: [rt]cmd =0x44504543, len=92
3,522,689 >>> mbox cmd response data (6284 bytes)
3,522,690 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,552,103 UART: [rt]cmd =0x43455252, len=4
3,562,927 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,996 >>> mbox cmd response: success
2,685,702 UART:
2,685,718 UART: Running Caliptra FMC ...
2,686,126 UART:
2,686,180 UART: [state] CFI Enabled
2,696,465 UART: [fht] FMC Alias Private Key: 7
2,804,700 UART: [art] Extend RT PCRs Done
2,805,128 UART: [art] Lock RT PCRs Done
2,806,760 UART: [art] Populate DV Done
2,814,853 UART: [fht] FMC Alias Private Key: 7
2,815,833 UART: [art] Derive CDI
2,816,113 UART: [art] Store in in slot 0x4
2,901,804 UART: [art] Derive Key Pair
2,902,164 UART: [art] Store priv key in slot 0x5
2,915,246 UART: [art] Derive Key Pair - Done
2,929,953 UART: [art] Signing Cert with AUTHO
2,930,433 UART: RITY.KEYID = 7
2,945,333 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,098 UART: [art] PUB.X = 2B38B6FC7728118AC5A320B4D0D9278D93C9B8A108FD0E6423A08F8C9FAF06AD63DFEE9C3C834C010F88873258A29183
2,952,859 UART: [art] PUB.Y = 8625AE93265C208F30843146689A5E8E1E5965DBEEC44FF8A48AC181EAD1ADEC958A4E71AE7EE0A3E92E8EB50EA8B16A
2,959,824 UART: [art] SIG.R = 798B2FA4406DF381652EAA65604C6AE3A8F1462D91338A0D8ACFA2A29D2437E084F94D62911BD0A59EC4BBA9913B256B
2,966,599 UART: [art] SIG.S = CFF6A6445C48503F849D915EF468C4D66595A016252772C29B3732FF04229AA756FB6EA91EC5F40FE01DB84258548E20
2,990,158 UART: Caliptra RT
2,990,411 UART: [state] CFI Enabled
3,098,988 UART: [rt] RT listening for mailbox commands...
3,099,658 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,700 UART: [rt]cmd =0x44504543, len=92
3,345,696 >>> mbox cmd response data (6284 bytes)
3,345,697 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,958 UART: [rt]cmd =0x43455252, len=4
3,385,768 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
893,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,962 UART: [kat] ++
898,114 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,715 UART: [kat] HMAC-384Kdf
923,419 UART: [kat] LMS
1,171,747 UART: [kat] --
1,172,542 UART: [cold-reset] ++
1,172,874 UART: [fht] FHT @ 0x50003400
1,175,483 UART: [idev] ++
1,175,651 UART: [idev] CDI.KEYID = 6
1,176,011 UART: [idev] SUBJECT.KEYID = 7
1,176,435 UART: [idev] UDS.KEYID = 0
1,176,780 ready_for_fw is high
1,176,780 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,249 UART: [idev] Erasing UDS.KEYID = 0
1,201,342 UART: [idev] Sha1 KeyId Algorithm
1,209,812 UART: [idev] --
1,210,956 UART: [ldev] ++
1,211,124 UART: [ldev] CDI.KEYID = 6
1,211,487 UART: [ldev] SUBJECT.KEYID = 5
1,211,913 UART: [ldev] AUTHORITY.KEYID = 7
1,212,376 UART: [ldev] FE.KEYID = 1
1,217,756 UART: [ldev] Erasing FE.KEYID = 1
1,244,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,938 UART: [ldev] --
1,284,287 UART: [fwproc] Wait for Commands...
1,285,111 UART: [fwproc] Recv command 0x46574c44
1,285,839 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,964 >>> mbox cmd response: success
2,775,010 UART: [afmc] ++
2,775,178 UART: [afmc] CDI.KEYID = 6
2,775,540 UART: [afmc] SUBJECT.KEYID = 7
2,775,965 UART: [afmc] AUTHORITY.KEYID = 5
2,811,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,549 UART: [afmc] --
2,854,671 UART: [cold-reset] --
2,855,617 UART: [state] Locking Datavault
2,857,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,786 UART: [state] Locking ICCM
2,858,206 UART: [exit] Launching FMC @ 0x40000130
2,863,535 UART:
2,863,551 UART: Running Caliptra FMC ...
2,863,959 UART:
2,864,102 UART: [state] CFI Enabled
2,874,833 UART: [fht] FMC Alias Private Key: 7
2,982,594 UART: [art] Extend RT PCRs Done
2,983,022 UART: [art] Lock RT PCRs Done
2,984,690 UART: [art] Populate DV Done
2,992,903 UART: [fht] FMC Alias Private Key: 7
2,993,973 UART: [art] Derive CDI
2,994,253 UART: [art] Store in in slot 0x4
3,080,232 UART: [art] Derive Key Pair
3,080,592 UART: [art] Store priv key in slot 0x5
3,094,264 UART: [art] Derive Key Pair - Done
3,108,740 UART: [art] Signing Cert with AUTHO
3,109,220 UART: RITY.KEYID = 7
3,124,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,449 UART: [art] PUB.X = A41909447A602A2329D39BA21C57BC16E17D372E556F1F73118B6B5C213F033D4D921520AC9C35375D4A67C1DDCAAB37
3,132,215 UART: [art] PUB.Y = 97E71A3D09D6DC14155347263E36D95DB23BCD046214D1FCD145AA9266D6F4CF3576A94FC27791D7EFFBB99262713625
3,139,161 UART: [art] SIG.R = 124C2A2F611B044D9398464D0ACF7A6B1FF7D9136467A61D9CA7E0CC0DD71DE7AE981A33E31B0C9B39CE55D1981659D4
3,145,929 UART: [art] SIG.S = E70EEB15BC1B1F2C45C22F7BB0C59E80C4699B62180037B44DBA21A90523DD683B0702E4520D9B98E9B3A20879397253
3,169,316 UART: Caliptra RT
3,169,661 UART: [state] CFI Enabled
3,277,704 UART: [rt] RT listening for mailbox commands...
3,278,374 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,902 UART: [rt]cmd =0x44504543, len=92
3,524,932 >>> mbox cmd response data (6284 bytes)
3,524,933 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,554,324 UART: [rt]cmd =0x43455252, len=4
3,565,178 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,526 ready_for_fw is high
1,060,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,321 >>> mbox cmd response: success
2,688,181 UART:
2,688,197 UART: Running Caliptra FMC ...
2,688,605 UART:
2,688,748 UART: [state] CFI Enabled
2,699,505 UART: [fht] FMC Alias Private Key: 7
2,807,514 UART: [art] Extend RT PCRs Done
2,807,942 UART: [art] Lock RT PCRs Done
2,809,424 UART: [art] Populate DV Done
2,817,597 UART: [fht] FMC Alias Private Key: 7
2,818,535 UART: [art] Derive CDI
2,818,815 UART: [art] Store in in slot 0x4
2,904,470 UART: [art] Derive Key Pair
2,904,830 UART: [art] Store priv key in slot 0x5
2,917,676 UART: [art] Derive Key Pair - Done
2,932,149 UART: [art] Signing Cert with AUTHO
2,932,629 UART: RITY.KEYID = 7
2,948,205 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,970 UART: [art] PUB.X = 435A17AB5A4928AC3E06367446998E44619B15BF63FEF961AD78258490125CF95AABBD53FB0B6492F5AB3BB47EC9F5BC
2,955,744 UART: [art] PUB.Y = 5CBE963434E6F86D6D3ECA2C76F600CEB66BD270CD13459DAA4F6DE5745D7B88695D403C69E1060EEE323A32569860AF
2,962,676 UART: [art] SIG.R = 401D9D743D041FC6F72A3D43C353B014AC3B196B2C9B34EF8C9527553227DEE3735FA19C22C5C97A6D72B4624095B567
2,969,443 UART: [art] SIG.S = 826C32144A170AFE1FAC155592265A09E4D2952B636A9EFC6E7CE1F96CD5E13F81E8C9A66ED17245ECB13F275577A2BB
2,993,650 UART: Caliptra RT
2,993,995 UART: [state] CFI Enabled
3,100,866 UART: [rt] RT listening for mailbox commands...
3,101,536 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,062 UART: [rt]cmd =0x44504543, len=92
3,348,007 >>> mbox cmd response data (6284 bytes)
3,348,008 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,271 UART: [rt]cmd =0x43455252, len=4
3,388,131 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,170,007 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,017 UART: [idev] ++
1,173,185 UART: [idev] CDI.KEYID = 6
1,173,546 UART: [idev] SUBJECT.KEYID = 7
1,173,971 UART: [idev] UDS.KEYID = 0
1,174,317 ready_for_fw is high
1,174,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,385 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,936 UART: [ldev] --
1,281,384 UART: [fwproc] Wait for Commands...
1,282,035 UART: [fwproc] Recv command 0x46574c44
1,282,768 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,723 >>> mbox cmd response: success
2,771,956 UART: [afmc] ++
2,772,124 UART: [afmc] CDI.KEYID = 6
2,772,487 UART: [afmc] SUBJECT.KEYID = 7
2,772,913 UART: [afmc] AUTHORITY.KEYID = 5
2,807,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,833 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,164 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,931 UART: [afmc] --
2,850,849 UART: [cold-reset] --
2,851,959 UART: [state] Locking Datavault
2,853,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,664 UART: [state] Locking ICCM
2,854,168 UART: [exit] Launching FMC @ 0x40000130
2,859,497 UART:
2,859,513 UART: Running Caliptra FMC ...
2,859,921 UART:
2,859,975 UART: [state] CFI Enabled
2,870,254 UART: [fht] FMC Alias Private Key: 7
2,978,243 UART: [art] Extend RT PCRs Done
2,978,671 UART: [art] Lock RT PCRs Done
2,980,097 UART: [art] Populate DV Done
2,988,510 UART: [fht] FMC Alias Private Key: 7
2,989,550 UART: [art] Derive CDI
2,989,830 UART: [art] Store in in slot 0x4
3,075,681 UART: [art] Derive Key Pair
3,076,041 UART: [art] Store priv key in slot 0x5
3,089,537 UART: [art] Derive Key Pair - Done
3,104,145 UART: [art] Signing Cert with AUTHO
3,104,625 UART: RITY.KEYID = 7
3,119,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,592 UART: [art] PUB.X = D3B783D83BC1BFB32C2EE45AADCE38501C81D66ADA808C7F898A23845E6058AFEBEF90E6F0143E161AADD0AD721E7319
3,127,382 UART: [art] PUB.Y = F27267A8B84347B1E8019A0901028B487DA388A94B373D439C9C9D1C25D1F161CF4EBCF956E06D2EE78E4587367C6F6D
3,134,322 UART: [art] SIG.R = 57A7417405A1E2A2F923FA31B1A3D3619A34BD4D6DDBD4D8E972D42964F5DE7902C4A0245A4B9BAD8BE9170AAF5187D7
3,141,095 UART: [art] SIG.S = 08BD817F3983B3B0DD965B342251E4FE05FA3ED7C4B54C8B2769C34BC78430ADD693B5FA5794F23C75E196636F9BED57
3,165,412 UART: Caliptra RT
3,165,665 UART: [state] CFI Enabled
3,274,294 UART: [rt] RT listening for mailbox commands...
3,274,964 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,112 UART: [rt]cmd =0x44504543, len=92
3,521,446 >>> mbox cmd response data (6284 bytes)
3,521,447 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,550,908 UART: [rt]cmd =0x43455252, len=4
3,561,762 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,378 ready_for_fw is high
1,056,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,355 >>> mbox cmd response: success
2,684,321 UART:
2,684,337 UART: Running Caliptra FMC ...
2,684,745 UART:
2,684,799 UART: [state] CFI Enabled
2,695,636 UART: [fht] FMC Alias Private Key: 7
2,803,509 UART: [art] Extend RT PCRs Done
2,803,937 UART: [art] Lock RT PCRs Done
2,805,681 UART: [art] Populate DV Done
2,814,016 UART: [fht] FMC Alias Private Key: 7
2,814,996 UART: [art] Derive CDI
2,815,276 UART: [art] Store in in slot 0x4
2,901,143 UART: [art] Derive Key Pair
2,901,503 UART: [art] Store priv key in slot 0x5
2,914,247 UART: [art] Derive Key Pair - Done
2,929,268 UART: [art] Signing Cert with AUTHO
2,929,748 UART: RITY.KEYID = 7
2,945,056 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,821 UART: [art] PUB.X = 3E979BE92B2516AFD918445625987E4B51561D098A3C5EB0A45485B9A55D770C697C4702B8379A65A90E1C298DA8ECBB
2,952,579 UART: [art] PUB.Y = 598E1066A00EA186688F8863A39231FA57BD314DF95A7054D349B515275FDAFF347ACA266170C1446DBC7684E8FF9841
2,959,524 UART: [art] SIG.R = 22936B264117B589334B0AA8700327AA68B7EB199FE8C07A8D4AE596130C047F197425C85E78E6AF05B12B93D58FE4FC
2,966,279 UART: [art] SIG.S = A54ED48A760EDD095F618D74A7D6E4E185ABE9110E673A7286EE56921D3387968BF78405FE4E1CF6B3000DB36D1C44ED
2,989,875 UART: Caliptra RT
2,990,128 UART: [state] CFI Enabled
3,098,167 UART: [rt] RT listening for mailbox commands...
3,098,837 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,267 UART: [rt]cmd =0x44504543, len=92
3,346,488 >>> mbox cmd response data (6284 bytes)
3,346,489 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,375,880 UART: [rt]cmd =0x43455252, len=4
3,386,820 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,429 UART: [kat] LMS
1,168,741 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,170,136 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,174,064 ready_for_fw is high
1,174,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,336 UART: [idev] Erasing UDS.KEYID = 0
1,198,384 UART: [idev] Sha1 KeyId Algorithm
1,207,438 UART: [idev] --
1,208,641 UART: [ldev] ++
1,208,809 UART: [ldev] CDI.KEYID = 6
1,209,173 UART: [ldev] SUBJECT.KEYID = 5
1,209,600 UART: [ldev] AUTHORITY.KEYID = 7
1,210,063 UART: [ldev] FE.KEYID = 1
1,215,367 UART: [ldev] Erasing FE.KEYID = 1
1,241,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,793 UART: [ldev] --
1,281,309 UART: [fwproc] Wait for Commands...
1,282,070 UART: [fwproc] Recv command 0x46574c44
1,282,803 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,846 >>> mbox cmd response: success
2,772,987 UART: [afmc] ++
2,773,155 UART: [afmc] CDI.KEYID = 6
2,773,518 UART: [afmc] SUBJECT.KEYID = 7
2,773,944 UART: [afmc] AUTHORITY.KEYID = 5
2,808,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,335 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,238 UART: [afmc] --
2,852,244 UART: [cold-reset] --
2,853,086 UART: [state] Locking Datavault
2,854,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,731 UART: [state] Locking ICCM
2,855,159 UART: [exit] Launching FMC @ 0x40000130
2,860,488 UART:
2,860,504 UART: Running Caliptra FMC ...
2,860,912 UART:
2,861,055 UART: [state] CFI Enabled
2,871,498 UART: [fht] FMC Alias Private Key: 7
2,979,477 UART: [art] Extend RT PCRs Done
2,979,905 UART: [art] Lock RT PCRs Done
2,981,359 UART: [art] Populate DV Done
2,989,440 UART: [fht] FMC Alias Private Key: 7
2,990,602 UART: [art] Derive CDI
2,990,882 UART: [art] Store in in slot 0x4
3,076,547 UART: [art] Derive Key Pair
3,076,907 UART: [art] Store priv key in slot 0x5
3,090,461 UART: [art] Derive Key Pair - Done
3,105,333 UART: [art] Signing Cert with AUTHO
3,105,813 UART: RITY.KEYID = 7
3,121,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,050 UART: [art] PUB.X = 5F5FE5965733A220F891F844E3733444F5B583319E868D562C9FF73F62BC1BFEE6FA0FFF39B3CA3374A43E02378452B8
3,128,816 UART: [art] PUB.Y = EA8C884FD11F500E856998F741493D7217E6598D269BC6E7894E1A783DE66044080813A45B0180F97DFDD5D8E1B017B3
3,135,750 UART: [art] SIG.R = 448F886298EA7233FF9C9AFE9604E655849D1A54410D7BA838C6F347264266E41DCA9AFF9FF831FFB24E3DA32E95E492
3,142,520 UART: [art] SIG.S = 042387E38E8DA4617EC5D04CE7552C22561CBEF13B44DC5256E6D989C68E5527B22FC167003F49248CEA88CB178F7E3E
3,166,756 UART: Caliptra RT
3,167,101 UART: [state] CFI Enabled
3,275,650 UART: [rt] RT listening for mailbox commands...
3,276,320 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,872 UART: [rt]cmd =0x44504543, len=92
3,524,226 >>> mbox cmd response data (6284 bytes)
3,524,227 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,553,574 UART: [rt]cmd =0x43455252, len=4
3,564,264 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,623 ready_for_fw is high
1,056,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,740 >>> mbox cmd response: success
2,682,926 UART:
2,682,942 UART: Running Caliptra FMC ...
2,683,350 UART:
2,683,493 UART: [state] CFI Enabled
2,693,922 UART: [fht] FMC Alias Private Key: 7
2,801,615 UART: [art] Extend RT PCRs Done
2,802,043 UART: [art] Lock RT PCRs Done
2,803,427 UART: [art] Populate DV Done
2,811,730 UART: [fht] FMC Alias Private Key: 7
2,812,732 UART: [art] Derive CDI
2,813,012 UART: [art] Store in in slot 0x4
2,898,881 UART: [art] Derive Key Pair
2,899,241 UART: [art] Store priv key in slot 0x5
2,912,421 UART: [art] Derive Key Pair - Done
2,927,231 UART: [art] Signing Cert with AUTHO
2,927,711 UART: RITY.KEYID = 7
2,942,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,724 UART: [art] PUB.X = 7E3297C58CA664592A8CB885D2402AC1ACCAD562A7229818344D0B606EEBBB88B1E410EDF3DF098F9DED6781478368D5
2,950,496 UART: [art] PUB.Y = 9E9C1A2F32615CB75DFA1FD88AC9785448ABF83FC055AB3677A774B75D7F99DC1D75E13B2348360E66F8F5E690674C01
2,957,446 UART: [art] SIG.R = B5CB9F04B1AB31DA50DA14FF3FF6EB4D734C39A975AA2F88FA2D5793743076C17BCC08EBD1A623FCDBFC63B3957633D5
2,964,232 UART: [art] SIG.S = 4310A27A246228E3D93A42CC6CC1ABFCA9CF58D2CF1B1CB43B9DE229EB0C3FC37BB6AFB698F6A6B8DEE6480A9DEE8B25
2,988,033 UART: Caliptra RT
2,988,378 UART: [state] CFI Enabled
3,095,883 UART: [rt] RT listening for mailbox commands...
3,096,553 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,247 UART: [rt]cmd =0x44504543, len=92
3,343,230 >>> mbox cmd response data (6284 bytes)
3,343,231 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,454 UART: [rt]cmd =0x43455252, len=4
3,383,338 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,135 UART:
192,481 UART: Running Caliptra ROM ...
193,665 UART:
193,820 UART: [state] CFI Enabled
262,878 UART: [state] LifecycleState = Unprovisioned
264,874 UART: [state] DebugLocked = No
267,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,613 UART: [kat] SHA2-256
442,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,816 UART: [kat] ++
453,349 UART: [kat] sha1
464,173 UART: [kat] SHA2-256
466,929 UART: [kat] SHA2-384
473,560 UART: [kat] SHA2-512-ACC
475,929 UART: [kat] ECC-384
2,766,263 UART: [kat] HMAC-384Kdf
2,789,183 UART: [kat] LMS
3,979,507 UART: [kat] --
3,983,675 UART: [cold-reset] ++
3,985,703 UART: [fht] Storing FHT @ 0x50003400
3,995,770 UART: [idev] ++
3,996,329 UART: [idev] CDI.KEYID = 6
3,997,349 UART: [idev] SUBJECT.KEYID = 7
3,998,515 UART: [idev] UDS.KEYID = 0
3,999,573 ready_for_fw is high
3,999,787 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,143,055 UART: [idev] Erasing UDS.KEYID = 0
7,336,904 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,462 UART: [idev] --
7,361,324 UART: [ldev] ++
7,361,950 UART: [ldev] CDI.KEYID = 6
7,362,858 UART: [ldev] SUBJECT.KEYID = 5
7,364,122 UART: [ldev] AUTHORITY.KEYID = 7
7,365,342 UART: [ldev] FE.KEYID = 1
7,410,898 UART: [ldev] Erasing FE.KEYID = 1
10,738,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,484 UART: [ldev] --
13,118,365 UART: [fwproc] Waiting for Commands...
13,121,506 UART: [fwproc] Received command 0x46574c44
13,123,685 UART: [fwproc] Received Image of size 113844 bytes
17,170,301 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,332 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,312,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,629,287 >>> mbox cmd response: success
17,629,880 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,633,313 UART: [afmc] ++
17,633,960 UART: [afmc] CDI.KEYID = 6
17,634,841 UART: [afmc] SUBJECT.KEYID = 7
17,636,108 UART: [afmc] AUTHORITY.KEYID = 5
20,990,523 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,873 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,292,178 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,571 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,387 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,832 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,356,784 UART: [afmc] --
23,360,811 UART: [cold-reset] --
23,363,635 UART: [state] Locking Datavault
23,368,606 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,348 UART: [state] Locking ICCM
23,373,114 UART: [exit] Launching FMC @ 0x40000130
23,381,499 UART:
23,381,727 UART: Running Caliptra FMC ...
23,382,747 UART:
23,382,890 UART: [state] CFI Enabled
23,450,374 UART: [fht] FMC Alias Private Key: 7
25,788,033 UART: [art] Extend RT PCRs Done
25,789,254 UART: [art] Lock RT PCRs Done
25,790,522 UART: [art] Populate DV Done
25,796,086 UART: [fht] FMC Alias Private Key: 7
25,797,690 UART: [art] Derive CDI
25,798,424 UART: [art] Store in in slot 0x4
25,859,047 UART: [art] Derive Key Pair
25,860,084 UART: [art] Store priv key in slot 0x5
29,153,094 UART: [art] Derive Key Pair - Done
29,166,092 UART: [art] Signing Cert with AUTHO
29,167,396 UART: RITY.KEYID = 7
31,455,214 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,718 UART: [art] PUB.X = 5D0D90C2B3E3F03845A5EA953574F0471AAC0AA8D7BB64FB5A1C4515EE74C2DCF554E16986490FE78B9F7A8111845C54
31,463,949 UART: [art] PUB.Y = D128DC077FF4CE6F8F6CB695571B6582FC5E7E84BF91134D149A382424D1552477FE8C1EBE15155154675558DC478781
31,471,188 UART: [art] SIG.R = 15E280E3B71944FEE01205BEAC2DAD39354FDD968B92ED1C22EF0162858E1E4C0106B282CE3EDA92FED2428B811F58AB
31,478,566 UART: [art] SIG.S = D158F0F107B595F235E4D5FE385C9F65E52374A83838721CC0BDB1CDACD699D99320849C22F6B4AA8C8F520ABC3FA2C0
32,783,236 UART: Caliptra RT
32,783,947 UART: [state] CFI Enabled
32,947,692 UART: [rt] RT listening for mailbox commands...
32,979,917 UART: [rt]cmd =0x44504543, len=92
38,745,227 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,795,524 ready_for_fw is high
3,796,079 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,883,379 >>> mbox cmd response: success
17,884,110 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,575,742 UART:
23,576,675 UART: Running Caliptra FMC ...
23,577,800 UART:
23,577,952 UART: [state] CFI Enabled
23,628,048 UART: [fht] FMC Alias Private Key: 7
25,965,665 UART: [art] Extend RT PCRs Done
25,966,901 UART: [art] Lock RT PCRs Done
25,968,418 UART: [art] Populate DV Done
25,973,997 UART: [fht] FMC Alias Private Key: 7
25,975,437 UART: [art] Derive CDI
25,976,171 UART: [art] Store in in slot 0x4
26,036,372 UART: [art] Derive Key Pair
26,037,412 UART: [art] Store priv key in slot 0x5
29,330,227 UART: [art] Derive Key Pair - Done
29,343,395 UART: [art] Signing Cert with AUTHO
29,344,726 UART: RITY.KEYID = 7
31,632,258 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,789 UART: [art] PUB.X = 71C116B3C1C4C2E3D3F34E1DF6EB7F3EEA9C90DFC0FE5F45CF3C6B01A1780C43EF6F43CF8F6F44B15A383DC524992707
31,641,001 UART: [art] PUB.Y = A2B7B814C9024A870524CE9617BF0A03414D21D271C6ADC7DE5AEC543016EE78538229C46149511990BE5DD2ED26E354
31,648,225 UART: [art] SIG.R = 2B2233BA117EA0C9DF48FB62FE3E1BF29A5024D3AA5CA32F92282F281394EFA3A78DD3BC92684887EC4D59B209AABD45
31,655,609 UART: [art] SIG.S = 6A3A2F9048AE74DD15CFA3D5653ABFFA2F9A5F6248172371250730B2D8E049BCDAB0B89C0DE951C6C8DEB3DE80F50260
32,960,609 UART: Caliptra RT
32,961,328 UART: [state] CFI Enabled
33,124,501 UART: [rt] RT listening for mailbox commands...
33,156,678 UART: [rt]cmd =0x44504543, len=92
38,921,904 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,422 UART:
192,789 UART: Running Caliptra ROM ...
193,919 UART:
603,684 UART: [state] CFI Enabled
619,623 UART: [state] LifecycleState = Unprovisioned
621,494 UART: [state] DebugLocked = No
623,938 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,511 UART: [kat] SHA2-256
799,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,796 UART: [kat] ++
810,952 UART: [kat] sha1
820,984 UART: [kat] SHA2-256
823,728 UART: [kat] SHA2-384
829,371 UART: [kat] SHA2-512-ACC
831,758 UART: [kat] ECC-384
3,115,034 UART: [kat] HMAC-384Kdf
3,126,000 UART: [kat] LMS
4,316,116 UART: [kat] --
4,319,736 UART: [cold-reset] ++
4,321,248 UART: [fht] Storing FHT @ 0x50003400
4,332,185 UART: [idev] ++
4,332,789 UART: [idev] CDI.KEYID = 6
4,333,721 UART: [idev] SUBJECT.KEYID = 7
4,334,972 UART: [idev] UDS.KEYID = 0
4,336,045 ready_for_fw is high
4,336,261 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,183 UART: [idev] Erasing UDS.KEYID = 0
7,624,607 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,923 UART: [idev] --
7,651,349 UART: [ldev] ++
7,651,942 UART: [ldev] CDI.KEYID = 6
7,652,911 UART: [ldev] SUBJECT.KEYID = 5
7,654,129 UART: [ldev] AUTHORITY.KEYID = 7
7,655,361 UART: [ldev] FE.KEYID = 1
7,666,388 UART: [ldev] Erasing FE.KEYID = 1
10,953,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,999 UART: [ldev] --
13,311,599 UART: [fwproc] Waiting for Commands...
13,313,750 UART: [fwproc] Received command 0x46574c44
13,315,994 UART: [fwproc] Received Image of size 113844 bytes
17,363,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,895 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,794 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,822,672 >>> mbox cmd response: success
17,823,288 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,826,716 UART: [afmc] ++
17,827,297 UART: [afmc] CDI.KEYID = 6
17,828,269 UART: [afmc] SUBJECT.KEYID = 7
17,829,486 UART: [afmc] AUTHORITY.KEYID = 5
21,142,013 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,953 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,216 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,606 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,429 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,902 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,390 UART: [afmc] --
23,509,089 UART: [cold-reset] --
23,512,584 UART: [state] Locking Datavault
23,517,581 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,341 UART: [state] Locking ICCM
23,521,330 UART: [exit] Launching FMC @ 0x40000130
23,529,728 UART:
23,529,970 UART: Running Caliptra FMC ...
23,531,292 UART:
23,531,465 UART: [state] CFI Enabled
23,539,089 UART: [fht] FMC Alias Private Key: 7
25,870,681 UART: [art] Extend RT PCRs Done
25,871,929 UART: [art] Lock RT PCRs Done
25,873,714 UART: [art] Populate DV Done
25,878,806 UART: [fht] FMC Alias Private Key: 7
25,880,301 UART: [art] Derive CDI
25,881,065 UART: [art] Store in in slot 0x4
25,923,827 UART: [art] Derive Key Pair
25,924,829 UART: [art] Store priv key in slot 0x5
29,167,133 UART: [art] Derive Key Pair - Done
29,180,400 UART: [art] Signing Cert with AUTHO
29,181,707 UART: RITY.KEYID = 7
31,461,142 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,661 UART: [art] PUB.X = 9FC6BF1D9002841BFDE4068432CB809CBA896D8951A836077F14C41B383283D6F8DC875F2A21B4BD0E885563F6386F57
31,469,854 UART: [art] PUB.Y = 756DE7BCF93BA0F7D4CE3ACEEB6B36F37281692F34ACFCC3AB09762FE9BD0BEAA4805634FDECCDF23ACFC2875DF3E9BB
31,477,159 UART: [art] SIG.R = 9724C7F86C2B3492818C5837DF086BE9C2A4DFDF72BF8B832ABED878865BFF5C1F400C799EB638CB27E9E0287A101F3D
31,484,555 UART: [art] SIG.S = 93D621893B44B8497E4776B436121E52BBAAF6FF0F6F652F67AF537B41E12D593C956497A7DA1C03A8B021779BD1ED05
32,789,758 UART: Caliptra RT
32,790,470 UART: [state] CFI Enabled
32,907,879 UART: [rt] RT listening for mailbox commands...
32,939,893 UART: [rt]cmd =0x44504543, len=92
38,614,483 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
4,130,711 ready_for_fw is high
4,131,382 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,072,454 >>> mbox cmd response: success
18,073,225 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,711,752 UART:
23,712,161 UART: Running Caliptra FMC ...
23,713,359 UART:
23,713,534 UART: [state] CFI Enabled
23,721,265 UART: [fht] FMC Alias Private Key: 7
26,052,034 UART: [art] Extend RT PCRs Done
26,053,261 UART: [art] Lock RT PCRs Done
26,054,974 UART: [art] Populate DV Done
26,060,445 UART: [fht] FMC Alias Private Key: 7
26,061,941 UART: [art] Derive CDI
26,062,717 UART: [art] Store in in slot 0x4
26,105,526 UART: [art] Derive Key Pair
26,106,532 UART: [art] Store priv key in slot 0x5
29,348,744 UART: [art] Derive Key Pair - Done
29,361,748 UART: [art] Signing Cert with AUTHO
29,363,053 UART: RITY.KEYID = 7
31,642,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,786 UART: [art] PUB.X = C1402FDA79BAE9EC33D6A8BFE77A213D326FCAF1E6EAD0DC8297D0680CC240A7332217D35147BCC3E9AA6FF14FF3DA6B
31,651,077 UART: [art] PUB.Y = 42B880AB1CBA2512709EB3B999096BD648695EF80D6AFBD0BFA809F7BFEEBB7F3F8DDF756B4DFA39B38F281D8DA0B155
31,658,291 UART: [art] SIG.R = 83FCF46C2A8F2969AFCED02CA33528514E1DBCB2C9E2BBFF6B7F5A107853E25CEF9F05D84F17AE3A8855ABA0D432727C
31,665,690 UART: [art] SIG.S = E66EEFB452E9E313028739E0F63BC6CBB1C7FCC54B72538897E5D102B572A4ABB3BF3A1FF36BD654B1B75CC7A8DFBF04
32,970,960 UART: Caliptra RT
32,971,678 UART: [state] CFI Enabled
33,089,278 UART: [rt] RT listening for mailbox commands...
33,121,125 UART: [rt]cmd =0x44504543, len=92
38,795,407 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,224 UART:
192,584 UART: Running Caliptra ROM ...
193,766 UART:
193,924 UART: [state] CFI Enabled
259,970 UART: [state] LifecycleState = Unprovisioned
261,886 UART: [state] DebugLocked = No
263,205 UART: [state] WD Timer not started. Device not locked for debugging
267,173 UART: [kat] SHA2-256
446,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,840 UART: [kat] ++
458,379 UART: [kat] sha1
470,468 UART: [kat] SHA2-256
473,467 UART: [kat] SHA2-384
478,982 UART: [kat] SHA2-512-ACC
481,969 UART: [kat] ECC-384
2,923,960 UART: [kat] HMAC-384Kdf
2,949,040 UART: [kat] LMS
3,478,479 UART: [kat] --
3,483,258 UART: [cold-reset] ++
3,485,471 UART: [fht] FHT @ 0x50003400
3,496,946 UART: [idev] ++
3,497,520 UART: [idev] CDI.KEYID = 6
3,498,435 UART: [idev] SUBJECT.KEYID = 7
3,499,607 UART: [idev] UDS.KEYID = 0
3,500,535 ready_for_fw is high
3,500,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,644,360 UART: [idev] Erasing UDS.KEYID = 0
6,004,887 UART: [idev] Sha1 KeyId Algorithm
6,029,258 UART: [idev] --
6,031,642 UART: [ldev] ++
6,032,219 UART: [ldev] CDI.KEYID = 6
6,033,135 UART: [ldev] SUBJECT.KEYID = 5
6,034,319 UART: [ldev] AUTHORITY.KEYID = 7
6,035,555 UART: [ldev] FE.KEYID = 1
6,078,571 UART: [ldev] Erasing FE.KEYID = 1
8,584,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,224 UART: [ldev] --
10,393,324 UART: [fwproc] Wait for Commands...
10,395,416 UART: [fwproc] Recv command 0x46574c44
10,397,499 UART: [fwproc] Recv'd Img size: 114168 bytes
13,799,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,870,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,939,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,257,348 >>> mbox cmd response: success
14,257,949 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,261,937 UART: [afmc] ++
14,262,523 UART: [afmc] CDI.KEYID = 6
14,263,430 UART: [afmc] SUBJECT.KEYID = 7
14,264,587 UART: [afmc] AUTHORITY.KEYID = 5
16,806,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,792 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,579 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,455 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,841 UART: [afmc] --
18,605,513 UART: [cold-reset] --
18,609,099 UART: [state] Locking Datavault
18,616,399 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,107 UART: [state] Locking ICCM
18,619,280 UART: [exit] Launching FMC @ 0x40000130
18,627,682 UART:
18,627,918 UART: Running Caliptra FMC ...
18,628,946 UART:
18,629,090 UART: [state] CFI Enabled
18,688,019 UART: [fht] FMC Alias Private Key: 7
20,451,865 UART: [art] Extend RT PCRs Done
20,453,092 UART: [art] Lock RT PCRs Done
20,454,817 UART: [art] Populate DV Done
20,460,231 UART: [fht] FMC Alias Private Key: 7
20,461,885 UART: [art] Derive CDI
20,462,702 UART: [art] Store in in slot 0x4
20,520,479 UART: [art] Derive Key Pair
20,521,520 UART: [art] Store priv key in slot 0x5
22,984,340 UART: [art] Derive Key Pair - Done
22,997,288 UART: [art] Signing Cert with AUTHO
22,998,613 UART: RITY.KEYID = 7
24,710,237 UART: [art] Erasing AUTHORITY.KEYID = 7
24,711,744 UART: [art] PUB.X = 4D9F30546306E54AE2FDA6E5AF73F952ECE74B8EFC7BC9D8CCD10367007FCBA094AD4CDB4FE436BA35A14C924293E1D1
24,719,015 UART: [art] PUB.Y = 844A5F5036EBBF3BC8A57FAD17A8B52DC0D4CE908CAF03B1BF5841D7A9297DDBF8D4A1762146E879B1EADB2C9B70FA2C
24,726,279 UART: [art] SIG.R = CDB90AAC9CEFA30211873F535859D66433EFA702F82BDA402D8DB91A5B52C5EE5530F7CBE2B53F89C94922C4CF82232A
24,733,690 UART: [art] SIG.S = 8C1453F50217A76FCA3BE564559BC354C2FC41D1DACE02A1D3DC6551519B1E1692FCBA62611E815837A387180220CB49
25,712,885 UART: Caliptra RT
25,713,602 UART: [state] CFI Enabled
25,878,102 UART: [rt] RT listening for mailbox commands...
25,910,273 UART: [rt]cmd =0x44504543, len=92
30,269,511 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,380,167 ready_for_fw is high
3,380,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,052,425 >>> mbox cmd response: success
14,053,083 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,342,264 UART:
18,342,654 UART: Running Caliptra FMC ...
18,343,744 UART:
18,343,899 UART: [state] CFI Enabled
18,410,061 UART: [fht] FMC Alias Private Key: 7
20,174,331 UART: [art] Extend RT PCRs Done
20,175,546 UART: [art] Lock RT PCRs Done
20,177,409 UART: [art] Populate DV Done
20,182,933 UART: [fht] FMC Alias Private Key: 7
20,184,526 UART: [art] Derive CDI
20,185,270 UART: [art] Store in in slot 0x4
20,242,620 UART: [art] Derive Key Pair
20,243,682 UART: [art] Store priv key in slot 0x5
22,706,733 UART: [art] Derive Key Pair - Done
22,719,412 UART: [art] Signing Cert with AUTHO
22,720,720 UART: RITY.KEYID = 7
24,432,231 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,727 UART: [art] PUB.X = 11F4D6E235BE864701C90D0B989990383C720164C7A5392EB2E3133946EFDE3A4DAA987A5FFB2F0E2AE04E72D7A9CD4D
24,440,992 UART: [art] PUB.Y = DFA547B1B43778A305374A3E24678B8D5DA9DD3C0B404F8F7FADAEA19407EA19BC3960F627BF285280663D9C6F6B98C2
24,448,251 UART: [art] SIG.R = 9F17D705B60D45626B2BD9D454436585C000C72801AA89F6D4E1D18F399ADEFF2961743EEE534BF888631E7CEF72A335
24,455,611 UART: [art] SIG.S = AF059C630CC9080FABA21D27679873B14B9F3B9D4E58705FDBCBEA0EC3E71F6048F453EFDCB7390B0CBFE53D10A56EEB
25,434,615 UART: Caliptra RT
25,435,330 UART: [state] CFI Enabled
25,599,838 UART: [rt] RT listening for mailbox commands...
25,631,950 UART: [rt]cmd =0x44504543, len=92
29,993,498 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
193,054 UART:
193,428 UART: Running Caliptra ROM ...
194,567 UART:
604,198 UART: [state] CFI Enabled
615,518 UART: [state] LifecycleState = Unprovisioned
617,382 UART: [state] DebugLocked = No
619,679 UART: [state] WD Timer not started. Device not locked for debugging
623,869 UART: [kat] SHA2-256
803,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,588 UART: [kat] ++
815,041 UART: [kat] sha1
825,988 UART: [kat] SHA2-256
828,994 UART: [kat] SHA2-384
835,699 UART: [kat] SHA2-512-ACC
838,658 UART: [kat] ECC-384
3,279,154 UART: [kat] HMAC-384Kdf
3,291,241 UART: [kat] LMS
3,820,776 UART: [kat] --
3,826,541 UART: [cold-reset] ++
3,828,112 UART: [fht] FHT @ 0x50003400
3,839,590 UART: [idev] ++
3,840,153 UART: [idev] CDI.KEYID = 6
3,841,107 UART: [idev] SUBJECT.KEYID = 7
3,842,278 UART: [idev] UDS.KEYID = 0
3,843,175 ready_for_fw is high
3,843,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,734 UART: [idev] Erasing UDS.KEYID = 0
6,315,892 UART: [idev] Sha1 KeyId Algorithm
6,338,470 UART: [idev] --
6,341,165 UART: [ldev] ++
6,341,755 UART: [ldev] CDI.KEYID = 6
6,342,665 UART: [ldev] SUBJECT.KEYID = 5
6,343,821 UART: [ldev] AUTHORITY.KEYID = 7
6,345,101 UART: [ldev] FE.KEYID = 1
6,355,906 UART: [ldev] Erasing FE.KEYID = 1
8,830,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,655 UART: [ldev] --
10,619,514 UART: [fwproc] Wait for Commands...
10,622,025 UART: [fwproc] Recv command 0x46574c44
10,624,136 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,490,450 >>> mbox cmd response: success
14,491,043 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,495,095 UART: [afmc] ++
14,495,684 UART: [afmc] CDI.KEYID = 6
14,496,595 UART: [afmc] SUBJECT.KEYID = 7
14,497,755 UART: [afmc] AUTHORITY.KEYID = 5
17,000,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,723,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,725,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,741,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,757,188 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,773,071 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,106 UART: [afmc] --
18,800,086 UART: [cold-reset] --
18,803,676 UART: [state] Locking Datavault
18,808,831 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,529 UART: [state] Locking ICCM
18,813,036 UART: [exit] Launching FMC @ 0x40000130
18,821,482 UART:
18,821,715 UART: Running Caliptra FMC ...
18,822,741 UART:
18,822,887 UART: [state] CFI Enabled
18,831,047 UART: [fht] FMC Alias Private Key: 7
20,587,750 UART: [art] Extend RT PCRs Done
20,588,971 UART: [art] Lock RT PCRs Done
20,590,871 UART: [art] Populate DV Done
20,596,285 UART: [fht] FMC Alias Private Key: 7
20,597,876 UART: [art] Derive CDI
20,598,689 UART: [art] Store in in slot 0x4
20,641,340 UART: [art] Derive Key Pair
20,642,381 UART: [art] Store priv key in slot 0x5
23,068,711 UART: [art] Derive Key Pair - Done
23,081,593 UART: [art] Signing Cert with AUTHO
23,082,899 UART: RITY.KEYID = 7
24,788,629 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,129 UART: [art] PUB.X = 2631410680E113404192D5BF75DBB55B29B06EC6B8B41D64B452D5B86483FD4EBE7ED75FA9E5510A4E61DB4ADF04B234
24,797,371 UART: [art] PUB.Y = 8107424DB46B11C14312AE575092313A220A084A6C6D617DAA573AA5AD1D01305A17D83E4558A77F8E28318482C163B6
24,804,612 UART: [art] SIG.R = A306F2487AF6DA010A595472C5C0A6D09C51DA5D76AF3F9B33AD8A39916705AB5BF283EDC62470F50A344762A7535390
24,811,955 UART: [art] SIG.S = E454F0334A8EA08EE8DDB6D8BE7AE27603AA4C9D91049B915DA7C6AA86AE4ADEE71267D8463C6A26764DE630BF614FBC
25,791,002 UART: Caliptra RT
25,791,716 UART: [state] CFI Enabled
25,907,939 UART: [rt] RT listening for mailbox commands...
25,940,054 UART: [rt]cmd =0x44504543, len=92
30,224,717 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
3,694,375 ready_for_fw is high
3,694,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,254,424 >>> mbox cmd response: success
14,255,124 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,505,404 UART:
18,505,795 UART: Running Caliptra FMC ...
18,506,990 UART:
18,507,162 UART: [state] CFI Enabled
18,515,170 UART: [fht] FMC Alias Private Key: 7
20,271,730 UART: [art] Extend RT PCRs Done
20,272,954 UART: [art] Lock RT PCRs Done
20,274,822 UART: [art] Populate DV Done
20,280,565 UART: [fht] FMC Alias Private Key: 7
20,282,219 UART: [art] Derive CDI
20,282,962 UART: [art] Store in in slot 0x4
20,325,398 UART: [art] Derive Key Pair
20,326,401 UART: [art] Store priv key in slot 0x5
22,753,032 UART: [art] Derive Key Pair - Done
22,765,598 UART: [art] Signing Cert with AUTHO
22,766,932 UART: RITY.KEYID = 7
24,472,699 UART: [art] Erasing AUTHORITY.KEYID = 7
24,474,209 UART: [art] PUB.X = 482C73E3FE3AC41539B06485E04ACCA16189BBF82E7E534241280ED7E9DB43A886D5308E45E06FB11CA48CE856D20DB5
24,481,463 UART: [art] PUB.Y = B45D75829829D52FF64C462446C9A9268E22AAF6678DA14682B9168BE1B911A6ADCFBAFE8F270E84D8995C502A6662F0
24,488,725 UART: [art] SIG.R = 2001B004B6158FB3BEB2F7C1092B76BB6B331BD3A6E2349D21B518DBE0601BEFE2D505C3D3AA034E2A20E7DE8F3BEE77
24,496,119 UART: [art] SIG.S = 3A13388A4F5CF394A9A5C3402728C188E4CF785CD19F381B5119B7172522FE60035FD660319C3310631F5DF1DF8361EA
25,475,220 UART: Caliptra RT
25,475,918 UART: [state] CFI Enabled
25,592,935 UART: [rt] RT listening for mailbox commands...
25,624,940 UART: [rt]cmd =0x44504543, len=92
29,909,295 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,034 UART:
192,399 UART: Running Caliptra ROM ...
193,615 UART:
193,774 UART: [state] CFI Enabled
263,528 UART: [state] LifecycleState = Unprovisioned
265,909 UART: [state] DebugLocked = No
267,648 UART: [state] WD Timer not started. Device not locked for debugging
271,553 UART: [kat] SHA2-256
461,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,207 UART: [kat] ++
472,687 UART: [kat] sha1
485,692 UART: [kat] SHA2-256
488,705 UART: [kat] SHA2-384
493,204 UART: [kat] SHA2-512-ACC
495,783 UART: [kat] ECC-384
2,950,694 UART: [kat] HMAC-384Kdf
2,972,443 UART: [kat] LMS
3,504,165 UART: [kat] --
3,509,414 UART: [cold-reset] ++
3,511,423 UART: [fht] FHT @ 0x50003400
3,524,112 UART: [idev] ++
3,524,821 UART: [idev] CDI.KEYID = 6
3,525,802 UART: [idev] SUBJECT.KEYID = 7
3,526,978 UART: [idev] UDS.KEYID = 0
3,527,908 ready_for_fw is high
3,528,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,717 UART: [idev] Erasing UDS.KEYID = 0
6,033,729 UART: [idev] Sha1 KeyId Algorithm
6,055,646 UART: [idev] --
6,060,674 UART: [ldev] ++
6,061,368 UART: [ldev] CDI.KEYID = 6
6,062,257 UART: [ldev] SUBJECT.KEYID = 5
6,063,467 UART: [ldev] AUTHORITY.KEYID = 7
6,064,704 UART: [ldev] FE.KEYID = 1
6,102,084 UART: [ldev] Erasing FE.KEYID = 1
8,609,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,567 UART: [ldev] --
10,415,342 UART: [fwproc] Wait for Commands...
10,417,759 UART: [fwproc] Recv command 0x46574c44
10,420,069 UART: [fwproc] Recv'd Img size: 114168 bytes
13,871,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,442 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,602,487 >>> mbox cmd response: success
14,603,084 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,606,143 UART: [afmc] ++
14,606,873 UART: [afmc] CDI.KEYID = 6
14,607,989 UART: [afmc] SUBJECT.KEYID = 7
14,609,485 UART: [afmc] AUTHORITY.KEYID = 5
17,148,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,062 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,266 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,375 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,359 UART: [afmc] --
18,945,854 UART: [cold-reset] --
18,949,659 UART: [state] Locking Datavault
18,956,062 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,211 UART: [state] Locking ICCM
18,959,582 UART: [exit] Launching FMC @ 0x40000130
18,968,215 UART:
18,968,471 UART: Running Caliptra FMC ...
18,969,572 UART:
18,969,731 UART: [state] CFI Enabled
19,030,669 UART: [fht] FMC Alias Private Key: 7
20,794,960 UART: [art] Extend RT PCRs Done
20,796,192 UART: [art] Lock RT PCRs Done
20,797,900 UART: [art] Populate DV Done
20,803,476 UART: [fht] FMC Alias Private Key: 7
20,804,958 UART: [art] Derive CDI
20,805,694 UART: [art] Store in in slot 0x4
20,863,244 UART: [art] Derive Key Pair
20,864,282 UART: [art] Store priv key in slot 0x5
23,326,905 UART: [art] Derive Key Pair - Done
23,339,739 UART: [art] Signing Cert with AUTHO
23,341,041 UART: RITY.KEYID = 7
25,052,716 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,247 UART: [art] PUB.X = 8AF148C2F8775FC28281A4DF98F29D9EC00A23EED00D1A29E14E57D81142F32E61DA7AE46128B613C6C7A589C18FED32
25,061,519 UART: [art] PUB.Y = 815096D83F7866ADBF777753BFF17B42438440B537BC5D4C8C735EF7728711EB801F112659BF94557E26FC7E908C6363
25,068,789 UART: [art] SIG.R = 84ACBBD4D1A846D479C290E3EE50DBDC609FED44E95108BCC7B507777F65D8FEB09480C893029CC1C0F1F09C3B166484
25,076,179 UART: [art] SIG.S = 7FD26486FFD8230BAB45E74CE79F88C47436DF5A6CB1653E9D4E8101B9CAC491D3CAB02459B0EBAB34F3DEB3C04A54D9
26,055,177 UART: Caliptra RT
26,055,865 UART: [state] CFI Enabled
26,220,899 UART: [rt] RT listening for mailbox commands...
26,253,226 UART: [rt]cmd =0x44504543, len=92
30,593,589 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,441,817 ready_for_fw is high
3,442,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,742,885 >>> mbox cmd response: success
14,743,515 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,029,213 UART:
19,029,610 UART: Running Caliptra FMC ...
19,030,750 UART:
19,030,915 UART: [state] CFI Enabled
19,098,176 UART: [fht] FMC Alias Private Key: 7
20,862,519 UART: [art] Extend RT PCRs Done
20,863,745 UART: [art] Lock RT PCRs Done
20,865,264 UART: [art] Populate DV Done
20,870,513 UART: [fht] FMC Alias Private Key: 7
20,872,075 UART: [art] Derive CDI
20,872,902 UART: [art] Store in in slot 0x4
20,929,987 UART: [art] Derive Key Pair
20,931,046 UART: [art] Store priv key in slot 0x5
23,394,401 UART: [art] Derive Key Pair - Done
23,407,363 UART: [art] Signing Cert with AUTHO
23,408,669 UART: RITY.KEYID = 7
25,120,417 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,930 UART: [art] PUB.X = 6B99933D6020E52D034D972C8F109D80D685DDB66BA1F4BB7BFD22509A071C5851375E0BD52C89171BA325EE381005CD
25,129,179 UART: [art] PUB.Y = 34BA55862A48EF8ED2A55CCC410C937EDFA4DCCE9D46B067009A5035CE4BF53468CDB2A431EB8606F7E2966A87420ED7
25,136,417 UART: [art] SIG.R = 0C014B2D62767E6701CD684033F4146C5B8CBAB7E0C0E6FBDB34C1CEC35589DE6FD13AAE5E5EE1C2DE852065E621D09E
25,143,867 UART: [art] SIG.S = C117966378BAA719CAC099AC02BBDCA54F06EE88DA72720E5E3EAF000BE435566F8775909028EE1C22CFDEB5E7C70EF7
26,122,260 UART: Caliptra RT
26,122,978 UART: [state] CFI Enabled
26,289,197 UART: [rt] RT listening for mailbox commands...
26,321,268 UART: [rt]cmd =0x44504543, len=92
30,682,657 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
192,999 UART:
193,357 UART: Running Caliptra ROM ...
194,456 UART:
604,048 UART: [state] CFI Enabled
616,578 UART: [state] LifecycleState = Unprovisioned
618,967 UART: [state] DebugLocked = No
620,913 UART: [state] WD Timer not started. Device not locked for debugging
625,238 UART: [kat] SHA2-256
815,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,959 UART: [kat] ++
826,404 UART: [kat] sha1
837,580 UART: [kat] SHA2-256
840,601 UART: [kat] SHA2-384
847,259 UART: [kat] SHA2-512-ACC
849,881 UART: [kat] ECC-384
3,292,963 UART: [kat] HMAC-384Kdf
3,304,638 UART: [kat] LMS
3,836,496 UART: [kat] --
3,842,549 UART: [cold-reset] ++
3,843,769 UART: [fht] FHT @ 0x50003400
3,855,029 UART: [idev] ++
3,855,747 UART: [idev] CDI.KEYID = 6
3,856,661 UART: [idev] SUBJECT.KEYID = 7
3,857,834 UART: [idev] UDS.KEYID = 0
3,858,882 ready_for_fw is high
3,859,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,467 UART: [idev] Erasing UDS.KEYID = 0
6,334,157 UART: [idev] Sha1 KeyId Algorithm
6,356,936 UART: [idev] --
6,362,339 UART: [ldev] ++
6,363,018 UART: [ldev] CDI.KEYID = 6
6,363,937 UART: [ldev] SUBJECT.KEYID = 5
6,365,097 UART: [ldev] AUTHORITY.KEYID = 7
6,366,332 UART: [ldev] FE.KEYID = 1
6,376,286 UART: [ldev] Erasing FE.KEYID = 1
8,852,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,269 UART: [ldev] --
10,643,934 UART: [fwproc] Wait for Commands...
10,646,562 UART: [fwproc] Recv command 0x46574c44
10,648,896 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,287,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,828,478 >>> mbox cmd response: success
14,829,088 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,832,799 UART: [afmc] ++
14,833,494 UART: [afmc] CDI.KEYID = 6
14,834,678 UART: [afmc] SUBJECT.KEYID = 7
14,836,167 UART: [afmc] AUTHORITY.KEYID = 5
17,336,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,058,889 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,074,060 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,089,208 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,104,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,127,979 UART: [afmc] --
19,130,822 UART: [cold-reset] --
19,135,766 UART: [state] Locking Datavault
19,142,421 UART: [state] Locking PCR0, PCR1 and PCR31
19,144,623 UART: [state] Locking ICCM
19,147,518 UART: [exit] Launching FMC @ 0x40000130
19,156,186 UART:
19,156,416 UART: Running Caliptra FMC ...
19,157,460 UART:
19,157,609 UART: [state] CFI Enabled
19,165,360 UART: [fht] FMC Alias Private Key: 7
20,921,878 UART: [art] Extend RT PCRs Done
20,923,101 UART: [art] Lock RT PCRs Done
20,924,509 UART: [art] Populate DV Done
20,930,142 UART: [fht] FMC Alias Private Key: 7
20,931,667 UART: [art] Derive CDI
20,932,454 UART: [art] Store in in slot 0x4
20,974,780 UART: [art] Derive Key Pair
20,975,783 UART: [art] Store priv key in slot 0x5
23,402,398 UART: [art] Derive Key Pair - Done
23,415,117 UART: [art] Signing Cert with AUTHO
23,416,445 UART: RITY.KEYID = 7
25,121,989 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,498 UART: [art] PUB.X = C83C0229EE955BAEAD3EF1C21101112339F2F11FBE6C9047CC33ADF2BDEB18A2C3A11A5AA609F28AC0203CC36F3FE7EB
25,130,806 UART: [art] PUB.Y = 3E4CA97051B76FB009E320AC018182604D6C448B1ACCAD6E95E7A47CD804DCF0FBF0D5F8701735A20E8CEBD25EEA6A97
25,138,103 UART: [art] SIG.R = 414FEB9C0321CD1B3001E78EF38E8EBA486070CCD55E1DAC30E111F9C7BA3D260DBDAD116FAA6165665273DB3CE61D7A
25,145,496 UART: [art] SIG.S = BFD2A4A3425DE85A177524CEB95EC48A62FE644C898DE615E1F086F2A9BD8B8CE2DBFF6CB050D1826CA59660A09CF7A4
26,124,595 UART: Caliptra RT
26,125,309 UART: [state] CFI Enabled
26,241,977 UART: [rt] RT listening for mailbox commands...
26,273,984 UART: [rt]cmd =0x44504543, len=92
30,557,864 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,669 writing to cptra_bootfsm_go
3,758,722 ready_for_fw is high
3,759,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,958,774 >>> mbox cmd response: success
14,959,587 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,207,767 UART:
19,208,154 UART: Running Caliptra FMC ...
19,209,355 UART:
19,209,527 UART: [state] CFI Enabled
19,217,375 UART: [fht] FMC Alias Private Key: 7
20,974,117 UART: [art] Extend RT PCRs Done
20,975,337 UART: [art] Lock RT PCRs Done
20,976,664 UART: [art] Populate DV Done
20,982,089 UART: [fht] FMC Alias Private Key: 7
20,983,801 UART: [art] Derive CDI
20,984,622 UART: [art] Store in in slot 0x4
21,027,296 UART: [art] Derive Key Pair
21,028,344 UART: [art] Store priv key in slot 0x5
23,454,837 UART: [art] Derive Key Pair - Done
23,468,006 UART: [art] Signing Cert with AUTHO
23,469,311 UART: RITY.KEYID = 7
25,174,416 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,925 UART: [art] PUB.X = E1FE3B44597C0607F5F61EB681152234E280DBB6E8BC441C65CFA34A63838DDD7813A421583C1B7C385D210EB8D69686
25,183,172 UART: [art] PUB.Y = 1D6E08EE1DE22CD06957C6F3F88B49EEA9568140C41062FEF1FE43EE93FDAF09A07A4F9B1CDD6054B4B47D0308DC96BC
25,190,461 UART: [art] SIG.R = A8BD4F91DF02D9AC60781A1B6F7E63D786E3E782A0824FEB24F720F2B6591A8B79B407A75B243403F129539626A745FE
25,197,856 UART: [art] SIG.S = 4DF6BE5C34B84C24009212D6DC0BCCC0C8D54CDA4CAF8D857C98FFA7A1D534C826539AD0C1B31363F9AE31346CA2BAC8
26,176,630 UART: Caliptra RT
26,177,335 UART: [state] CFI Enabled
26,294,313 UART: [rt] RT listening for mailbox commands...
26,326,433 UART: [rt]cmd =0x44504543, len=92
30,611,274 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,289 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,843 UART: [kat] SHA2-256
881,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,889 UART: [kat] ++
886,041 UART: [kat] sha1
890,101 UART: [kat] SHA2-256
892,039 UART: [kat] SHA2-384
894,692 UART: [kat] SHA2-512-ACC
896,593 UART: [kat] ECC-384
902,510 UART: [kat] HMAC-384Kdf
907,126 UART: [kat] LMS
1,475,322 UART: [kat] --
1,476,075 UART: [cold-reset] ++
1,476,643 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 ready_for_fw is high
1,480,809 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,468 UART: [idev] Erasing UDS.KEYID = 0
1,504,440 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,088 UART: [idev] --
1,513,995 UART: [ldev] ++
1,514,163 UART: [ldev] CDI.KEYID = 6
1,514,526 UART: [ldev] SUBJECT.KEYID = 5
1,514,952 UART: [ldev] AUTHORITY.KEYID = 7
1,515,415 UART: [ldev] FE.KEYID = 1
1,520,471 UART: [ldev] Erasing FE.KEYID = 1
1,546,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,168 UART: [ldev] --
1,585,503 UART: [fwproc] Waiting for Commands...
1,586,160 UART: [fwproc] Received command 0x46574c44
1,586,951 UART: [fwproc] Received Image of size 114168 bytes
2,883,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,643 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,995 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,638 >>> mbox cmd response: success
3,075,638 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,076,880 UART: [afmc] ++
3,077,048 UART: [afmc] CDI.KEYID = 6
3,077,410 UART: [afmc] SUBJECT.KEYID = 7
3,077,835 UART: [afmc] AUTHORITY.KEYID = 5
3,113,276 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,564 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,344 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,072 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,957 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,647 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,358 UART: [afmc] --
3,156,298 UART: [cold-reset] --
3,156,986 UART: [state] Locking Datavault
3,158,259 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,863 UART: [state] Locking ICCM
3,159,393 UART: [exit] Launching FMC @ 0x40000130
3,164,722 UART:
3,164,738 UART: Running Caliptra FMC ...
3,165,146 UART:
3,165,200 UART: [state] CFI Enabled
3,175,835 UART: [fht] FMC Alias Private Key: 7
3,283,940 UART: [art] Extend RT PCRs Done
3,284,368 UART: [art] Lock RT PCRs Done
3,285,974 UART: [art] Populate DV Done
3,294,059 UART: [fht] FMC Alias Private Key: 7
3,295,237 UART: [art] Derive CDI
3,295,517 UART: [art] Store in in slot 0x4
3,381,310 UART: [art] Derive Key Pair
3,381,670 UART: [art] Store priv key in slot 0x5
3,394,454 UART: [art] Derive Key Pair - Done
3,409,077 UART: [art] Signing Cert with AUTHO
3,409,557 UART: RITY.KEYID = 7
3,425,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,786 UART: [art] PUB.X = E07A32EC221CA1B9D2DB2457E9E06CC02CCB32299C72637E9C6F38B97093288B1FDB5E8C9C5AD630F98FADD604452A19
3,432,565 UART: [art] PUB.Y = F64D1FDDBF7C7D99AD624E15543EFD186D4DA4274F4A70F5E12127D44737129394296CB5D7B9286E517569A69F34672F
3,439,515 UART: [art] SIG.R = 2B8555F489EB0D69B4E30DE77B1B7E1561CE2BC0B097D5CBA0824C26B00002959DC3B920CC523AC7222F951300EABB9C
3,446,242 UART: [art] SIG.S = 56D21681C8CD8133BDEFAF41D24A4967F725492E4A2DF8A2D4F916965678BFC151DE32A897B105790EC894ED934D3CA5
3,469,535 UART: Caliptra RT
3,469,788 UART: [state] CFI Enabled
3,578,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,852 UART: [rt]cmd =0x44504543, len=92
3,793,697 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 ready_for_fw is high
1,362,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,602 >>> mbox cmd response: success
2,924,602 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,986,406 UART:
2,986,422 UART: Running Caliptra FMC ...
2,986,830 UART:
2,986,884 UART: [state] CFI Enabled
2,997,541 UART: [fht] FMC Alias Private Key: 7
3,104,808 UART: [art] Extend RT PCRs Done
3,105,236 UART: [art] Lock RT PCRs Done
3,106,826 UART: [art] Populate DV Done
3,114,907 UART: [fht] FMC Alias Private Key: 7
3,115,961 UART: [art] Derive CDI
3,116,241 UART: [art] Store in in slot 0x4
3,201,768 UART: [art] Derive Key Pair
3,202,128 UART: [art] Store priv key in slot 0x5
3,215,312 UART: [art] Derive Key Pair - Done
3,230,088 UART: [art] Signing Cert with AUTHO
3,230,568 UART: RITY.KEYID = 7
3,245,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,161 UART: [art] PUB.X = 1823265A2B08A6C0B244981BC8CAA61796C937B6114E43F9231B8419BB3D8600F1D8ECFC7F52CDB006F44191695ED9AE
3,252,907 UART: [art] PUB.Y = A345BD02B7A005FAFBB1D0BBAF00794F0638DC0157AD8A9FC9D3DD7E6E467A73CB006DC5E966141152E56B3CF34C32B6
3,259,819 UART: [art] SIG.R = DDE7F31CB0D2B4832FE94FD3B09F08DAD368B7B2D8839E2CF7D2D54D62288699AB3EA9AC09A1BF808F13CC5C8FC719CF
3,266,607 UART: [art] SIG.S = 17EA1A5E28F01D39AB53C6EE6923A9187326BCA1F8AC99DAC31EBE13A606F06DD79AF7F88660F7B4846FB3E666D629CF
3,290,263 UART: Caliptra RT
3,290,516 UART: [state] CFI Enabled
3,399,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,795 UART: [rt]cmd =0x44504543, len=92
3,613,712 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,938 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,978 UART: [kat] SHA2-256
892,916 UART: [kat] SHA2-384
895,623 UART: [kat] SHA2-512-ACC
897,524 UART: [kat] ECC-384
903,333 UART: [kat] HMAC-384Kdf
907,935 UART: [kat] LMS
1,476,131 UART: [kat] --
1,476,946 UART: [cold-reset] ++
1,477,308 UART: [fht] Storing FHT @ 0x50003400
1,480,159 UART: [idev] ++
1,480,327 UART: [idev] CDI.KEYID = 6
1,480,687 UART: [idev] SUBJECT.KEYID = 7
1,481,111 UART: [idev] UDS.KEYID = 0
1,481,456 ready_for_fw is high
1,481,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,671 UART: [idev] Erasing UDS.KEYID = 0
1,505,221 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,841 UART: [idev] --
1,514,908 UART: [ldev] ++
1,515,076 UART: [ldev] CDI.KEYID = 6
1,515,439 UART: [ldev] SUBJECT.KEYID = 5
1,515,865 UART: [ldev] AUTHORITY.KEYID = 7
1,516,328 UART: [ldev] FE.KEYID = 1
1,521,530 UART: [ldev] Erasing FE.KEYID = 1
1,546,817 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,707 UART: [ldev] --
1,586,080 UART: [fwproc] Waiting for Commands...
1,586,801 UART: [fwproc] Received command 0x46574c44
1,587,592 UART: [fwproc] Received Image of size 114168 bytes
2,884,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,663 >>> mbox cmd response: success
3,076,663 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,077,829 UART: [afmc] ++
3,077,997 UART: [afmc] CDI.KEYID = 6
3,078,359 UART: [afmc] SUBJECT.KEYID = 7
3,078,784 UART: [afmc] AUTHORITY.KEYID = 5
3,114,349 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,801 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,581 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,309 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,194 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,884 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,687 UART: [afmc] --
3,157,747 UART: [cold-reset] --
3,158,689 UART: [state] Locking Datavault
3,159,738 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,342 UART: [state] Locking ICCM
3,160,934 UART: [exit] Launching FMC @ 0x40000130
3,166,263 UART:
3,166,279 UART: Running Caliptra FMC ...
3,166,687 UART:
3,166,830 UART: [state] CFI Enabled
3,177,549 UART: [fht] FMC Alias Private Key: 7
3,285,138 UART: [art] Extend RT PCRs Done
3,285,566 UART: [art] Lock RT PCRs Done
3,286,890 UART: [art] Populate DV Done
3,294,861 UART: [fht] FMC Alias Private Key: 7
3,296,027 UART: [art] Derive CDI
3,296,307 UART: [art] Store in in slot 0x4
3,381,666 UART: [art] Derive Key Pair
3,382,026 UART: [art] Store priv key in slot 0x5
3,395,386 UART: [art] Derive Key Pair - Done
3,410,136 UART: [art] Signing Cert with AUTHO
3,410,616 UART: RITY.KEYID = 7
3,425,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,525 UART: [art] PUB.X = 416AD99FC88507F70216BB561FF25AE17670A8D868E73C8EC9D62B9B5007BB1406000A2A86E77B4E0981FCFEAD1F6910
3,433,261 UART: [art] PUB.Y = 1A293B251E3FACCF892F452627BBF98BD644E6701CA423DBD817B8CCB69B7B5A6C80885E492C0AA384BFF9712A54ADC4
3,440,224 UART: [art] SIG.R = D62D8AA632A38BAEC567D967DBF6B4C9D6414199DCD2AE0DDFE0C3E020C8BCAC973E308D39DE853A95F3A686596D5677
3,447,009 UART: [art] SIG.S = 44A9B36825D58A44997A8F0230F97CFDAD8B9D4E492E7CD19D852F92217B0FF04C10DB8829DB15714F8C6AA843CAE525
3,471,246 UART: Caliptra RT
3,471,591 UART: [state] CFI Enabled
3,579,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,910 UART: [rt]cmd =0x44504543, len=92
3,794,081 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,064 ready_for_fw is high
1,363,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,249 >>> mbox cmd response: success
2,926,249 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,987,973 UART:
2,987,989 UART: Running Caliptra FMC ...
2,988,397 UART:
2,988,540 UART: [state] CFI Enabled
2,999,335 UART: [fht] FMC Alias Private Key: 7
3,107,404 UART: [art] Extend RT PCRs Done
3,107,832 UART: [art] Lock RT PCRs Done
3,109,690 UART: [art] Populate DV Done
3,117,929 UART: [fht] FMC Alias Private Key: 7
3,118,867 UART: [art] Derive CDI
3,119,147 UART: [art] Store in in slot 0x4
3,204,736 UART: [art] Derive Key Pair
3,205,096 UART: [art] Store priv key in slot 0x5
3,218,436 UART: [art] Derive Key Pair - Done
3,233,224 UART: [art] Signing Cert with AUTHO
3,233,704 UART: RITY.KEYID = 7
3,248,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,535 UART: [art] PUB.X = 9EA01705A4674FB2F889B3B3C9BC2CB437F289F5A7D1BF627C1931A6CE3985E45DD483BB3CC7231632E0721D9A7226A1
3,256,308 UART: [art] PUB.Y = 690724E9708F1CA01EB0312D9A8AFC1D265BFBA969520C30D3E572021A4183B8FF95C8DB68FBD8A2A8AD197D742673E2
3,263,257 UART: [art] SIG.R = 7CD971AB285EEE791B80522C8C3E8888A7F569AEAA51BB6A0293080E34EF403D49708ED5FE56AB0535E0964899545BA9
3,270,019 UART: [art] SIG.S = 27D81B64311FC2CFA02D44CA79AA40B0D1A16204EBFC35761D0F6F80FBDFCF50A1B837A164A6071ADE9B63513876A73E
3,293,361 UART: Caliptra RT
3,293,706 UART: [state] CFI Enabled
3,401,828 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,878 UART: [rt]cmd =0x44504543, len=92
3,616,853 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
893,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,495 UART: [kat] ++
897,647 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
918,246 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,171,953 UART: [cold-reset] ++
1,172,393 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 ready_for_fw is high
1,176,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,014 UART: [idev] Erasing UDS.KEYID = 0
1,201,163 UART: [idev] Sha1 KeyId Algorithm
1,209,663 UART: [idev] --
1,210,793 UART: [ldev] ++
1,210,961 UART: [ldev] CDI.KEYID = 6
1,211,324 UART: [ldev] SUBJECT.KEYID = 5
1,211,750 UART: [ldev] AUTHORITY.KEYID = 7
1,212,213 UART: [ldev] FE.KEYID = 1
1,217,591 UART: [ldev] Erasing FE.KEYID = 1
1,243,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,329 UART: [ldev] --
1,282,688 UART: [fwproc] Wait for Commands...
1,283,344 UART: [fwproc] Recv command 0x46574c44
1,284,072 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,043 >>> mbox cmd response: success
2,771,043 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,772,251 UART: [afmc] ++
2,772,419 UART: [afmc] CDI.KEYID = 6
2,772,781 UART: [afmc] SUBJECT.KEYID = 7
2,773,206 UART: [afmc] AUTHORITY.KEYID = 5
2,808,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,600 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,204 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,906 UART: [afmc] --
2,852,014 UART: [cold-reset] --
2,852,902 UART: [state] Locking Datavault
2,854,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,623 UART: [state] Locking ICCM
2,855,073 UART: [exit] Launching FMC @ 0x40000130
2,860,402 UART:
2,860,418 UART: Running Caliptra FMC ...
2,860,826 UART:
2,860,880 UART: [state] CFI Enabled
2,871,687 UART: [fht] FMC Alias Private Key: 7
2,979,444 UART: [art] Extend RT PCRs Done
2,979,872 UART: [art] Lock RT PCRs Done
2,981,334 UART: [art] Populate DV Done
2,989,353 UART: [fht] FMC Alias Private Key: 7
2,990,395 UART: [art] Derive CDI
2,990,675 UART: [art] Store in in slot 0x4
3,076,486 UART: [art] Derive Key Pair
3,076,846 UART: [art] Store priv key in slot 0x5
3,090,022 UART: [art] Derive Key Pair - Done
3,104,866 UART: [art] Signing Cert with AUTHO
3,105,346 UART: RITY.KEYID = 7
3,120,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,997 UART: [art] PUB.X = 17BF9F1B6AC5EB10696752CE9D559639451A5BFE9522842CD12F285E0CF1B8FCA0FD68A7F5D618BCF42E51C8FABA3BCC
3,127,786 UART: [art] PUB.Y = 87072D9A41A270F07E0F3D98988E0418104F6677D334EBE6BF4D7E39B1637E2FC014C45302B1A98ACE81DA8E026C6BA4
3,134,725 UART: [art] SIG.R = AEE390588677DEB59ABC912852BE63A186C84FA27297BFCE025934382B00A3B70D42B3891F64BAC28DCA49C68A4FD9C4
3,141,477 UART: [art] SIG.S = 568696B23022615E2E889A2C0C6FBB16E6959D0E4FE61CCA729F97AE0F897ED92347C5058E4AF24DA8FF35D8C926291E
3,165,656 UART: Caliptra RT
3,165,909 UART: [state] CFI Enabled
3,274,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,432 UART: [rt]cmd =0x44504543, len=92
3,488,940 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,125 ready_for_fw is high
1,060,125 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,474 >>> mbox cmd response: success
2,623,474 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,685,238 UART:
2,685,254 UART: Running Caliptra FMC ...
2,685,662 UART:
2,685,716 UART: [state] CFI Enabled
2,695,989 UART: [fht] FMC Alias Private Key: 7
2,804,074 UART: [art] Extend RT PCRs Done
2,804,502 UART: [art] Lock RT PCRs Done
2,806,174 UART: [art] Populate DV Done
2,814,049 UART: [fht] FMC Alias Private Key: 7
2,815,069 UART: [art] Derive CDI
2,815,349 UART: [art] Store in in slot 0x4
2,900,656 UART: [art] Derive Key Pair
2,901,016 UART: [art] Store priv key in slot 0x5
2,914,084 UART: [art] Derive Key Pair - Done
2,928,914 UART: [art] Signing Cert with AUTHO
2,929,394 UART: RITY.KEYID = 7
2,944,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,937 UART: [art] PUB.X = 0DC965010DE0542EB2CCED889F02B8F697DF1A1607033CACAB5E28D5FBC8385D36C84B8DDF313308357267E97A62924A
2,951,694 UART: [art] PUB.Y = 80C13E2400B8C5CE34200C94CF9E8395335C8AC06B126888B855DFA6951EA3F242B6D2076FD475E431A140E6902D4629
2,958,612 UART: [art] SIG.R = E08114EEF8085450FF0F78EF20D7C9A60AF0F2613DBAB3EA9EF86EFAF7762E75FFAF44E4F067D9B477A834AC9FB799A5
2,965,395 UART: [art] SIG.S = 4FE43A06FB9E932A84AFDBEFB357988E924595969CA707DC41AB7520C0C48A77C5F97C2E27F97A3F1F47F1C86B6EFD3B
2,989,294 UART: Caliptra RT
2,989,547 UART: [state] CFI Enabled
3,096,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,970 UART: [rt]cmd =0x44504543, len=92
3,311,822 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,036 UART: [kat] SHA2-256
903,976 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,943 UART: [kat] HMAC-384Kdf
923,599 UART: [kat] LMS
1,171,927 UART: [kat] --
1,172,926 UART: [cold-reset] ++
1,173,464 UART: [fht] FHT @ 0x50003400
1,176,009 UART: [idev] ++
1,176,177 UART: [idev] CDI.KEYID = 6
1,176,537 UART: [idev] SUBJECT.KEYID = 7
1,176,961 UART: [idev] UDS.KEYID = 0
1,177,306 ready_for_fw is high
1,177,306 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,893 UART: [idev] Erasing UDS.KEYID = 0
1,202,044 UART: [idev] Sha1 KeyId Algorithm
1,210,456 UART: [idev] --
1,211,414 UART: [ldev] ++
1,211,582 UART: [ldev] CDI.KEYID = 6
1,211,945 UART: [ldev] SUBJECT.KEYID = 5
1,212,371 UART: [ldev] AUTHORITY.KEYID = 7
1,212,834 UART: [ldev] FE.KEYID = 1
1,218,130 UART: [ldev] Erasing FE.KEYID = 1
1,244,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,012 UART: [ldev] --
1,284,325 UART: [fwproc] Wait for Commands...
1,285,091 UART: [fwproc] Recv command 0x46574c44
1,285,819 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,451 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,308 >>> mbox cmd response: success
2,773,308 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,774,500 UART: [afmc] ++
2,774,668 UART: [afmc] CDI.KEYID = 6
2,775,030 UART: [afmc] SUBJECT.KEYID = 7
2,775,455 UART: [afmc] AUTHORITY.KEYID = 5
2,811,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,453 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,181 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,066 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,785 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,557 UART: [afmc] --
2,854,573 UART: [cold-reset] --
2,855,533 UART: [state] Locking Datavault
2,856,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,282 UART: [state] Locking ICCM
2,857,888 UART: [exit] Launching FMC @ 0x40000130
2,863,217 UART:
2,863,233 UART: Running Caliptra FMC ...
2,863,641 UART:
2,863,784 UART: [state] CFI Enabled
2,874,305 UART: [fht] FMC Alias Private Key: 7
2,982,394 UART: [art] Extend RT PCRs Done
2,982,822 UART: [art] Lock RT PCRs Done
2,984,322 UART: [art] Populate DV Done
2,992,703 UART: [fht] FMC Alias Private Key: 7
2,993,795 UART: [art] Derive CDI
2,994,075 UART: [art] Store in in slot 0x4
3,079,870 UART: [art] Derive Key Pair
3,080,230 UART: [art] Store priv key in slot 0x5
3,094,056 UART: [art] Derive Key Pair - Done
3,108,645 UART: [art] Signing Cert with AUTHO
3,109,125 UART: RITY.KEYID = 7
3,124,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,806 UART: [art] PUB.X = 236E41426744E54CB9E275C594E848B5B7AD8442435A2AE5C668586DE161B364EBE35DFFBFF69FB30F2A5EB2F88B5625
3,131,581 UART: [art] PUB.Y = B5869F07090197452FF78709BF47A55C8C62630DF8D72F263F05F47F0413B960F2175B220D2403AF3FE6091146AA2654
3,138,491 UART: [art] SIG.R = F5AD69C32DFCC923BA9615C7775D160685B47860C7E6AC1B3A65789C32535C28A55B8A92E3D06CE75A17B3D66A61EE95
3,145,264 UART: [art] SIG.S = 21A08389D7DB78FD64D0AEDCB85E9AA031CB80EF9AE82969FC4004AE55DBF2BE0A8C3C698D2414C61100F3D5090338EB
3,168,847 UART: Caliptra RT
3,169,192 UART: [state] CFI Enabled
3,276,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,877 UART: [rt]cmd =0x44504543, len=92
3,490,492 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,356 ready_for_fw is high
1,060,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,297 >>> mbox cmd response: success
2,625,297 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,687,985 UART:
2,688,001 UART: Running Caliptra FMC ...
2,688,409 UART:
2,688,552 UART: [state] CFI Enabled
2,699,605 UART: [fht] FMC Alias Private Key: 7
2,807,846 UART: [art] Extend RT PCRs Done
2,808,274 UART: [art] Lock RT PCRs Done
2,810,290 UART: [art] Populate DV Done
2,818,541 UART: [fht] FMC Alias Private Key: 7
2,819,489 UART: [art] Derive CDI
2,819,769 UART: [art] Store in in slot 0x4
2,905,956 UART: [art] Derive Key Pair
2,906,316 UART: [art] Store priv key in slot 0x5
2,919,632 UART: [art] Derive Key Pair - Done
2,934,351 UART: [art] Signing Cert with AUTHO
2,934,831 UART: RITY.KEYID = 7
2,950,383 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,148 UART: [art] PUB.X = 7E73930EDB11367CE00533783282372164619DF73CA5BE4F409B25E664EAB9DA1D229D261096D01F8C38628E21A47363
2,957,904 UART: [art] PUB.Y = 2339840E8646FDA0FBA149468435DF7E38F2FF3DB6246E54D7EE98570DFBAE70061E565C23C6F241F0FCEE4B7F93A2C2
2,964,857 UART: [art] SIG.R = B9DACADB52D0187C089050FADE0A083C35F8A03FCB66C5089CFBD266B532407109599F36A501C570FB2E1EBEDB02F595
2,971,620 UART: [art] SIG.S = C6107B3423C985DF65825306EB268C5236DA3424F10CECEF9C4BA50B6CFC9C058AB62074A06795367BCF26A126B73B65
2,995,183 UART: Caliptra RT
2,995,528 UART: [state] CFI Enabled
3,103,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,476 UART: [rt]cmd =0x44504543, len=92
3,317,280 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,059 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,965 UART: [kat] ++
895,117 UART: [kat] sha1
899,365 UART: [kat] SHA2-256
901,305 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,344 UART: [kat] LMS
1,168,656 UART: [kat] --
1,169,359 UART: [cold-reset] ++
1,169,769 UART: [fht] FHT @ 0x50003400
1,172,571 UART: [idev] ++
1,172,739 UART: [idev] CDI.KEYID = 6
1,173,100 UART: [idev] SUBJECT.KEYID = 7
1,173,525 UART: [idev] UDS.KEYID = 0
1,173,871 ready_for_fw is high
1,173,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,349 UART: [idev] Sha1 KeyId Algorithm
1,207,243 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,240,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,694 UART: [ldev] --
1,280,028 UART: [fwproc] Wait for Commands...
1,280,743 UART: [fwproc] Recv command 0x46574c44
1,281,476 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,805 >>> mbox cmd response: success
2,768,805 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,769,876 UART: [afmc] ++
2,770,044 UART: [afmc] CDI.KEYID = 6
2,770,407 UART: [afmc] SUBJECT.KEYID = 7
2,770,833 UART: [afmc] AUTHORITY.KEYID = 5
2,806,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,947 UART: [afmc] --
2,849,909 UART: [cold-reset] --
2,850,697 UART: [state] Locking Datavault
2,851,898 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,502 UART: [state] Locking ICCM
2,853,042 UART: [exit] Launching FMC @ 0x40000130
2,858,371 UART:
2,858,387 UART: Running Caliptra FMC ...
2,858,795 UART:
2,858,849 UART: [state] CFI Enabled
2,869,398 UART: [fht] FMC Alias Private Key: 7
2,977,615 UART: [art] Extend RT PCRs Done
2,978,043 UART: [art] Lock RT PCRs Done
2,979,657 UART: [art] Populate DV Done
2,988,058 UART: [fht] FMC Alias Private Key: 7
2,989,114 UART: [art] Derive CDI
2,989,394 UART: [art] Store in in slot 0x4
3,074,931 UART: [art] Derive Key Pair
3,075,291 UART: [art] Store priv key in slot 0x5
3,088,905 UART: [art] Derive Key Pair - Done
3,103,533 UART: [art] Signing Cert with AUTHO
3,104,013 UART: RITY.KEYID = 7
3,119,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,242 UART: [art] PUB.X = 30D7ADFD33875D10DA1BA427CAFBBFE5F08FB78E83B451372E1F08EC6D8AEF4E7B693DEE20DFE09B5E8A43C5E78D362D
3,127,037 UART: [art] PUB.Y = C1D5283ADBF1687F682EB869A59D7D28F373A803D0C8F9BAA2BEC3ABAFECF152293B4DE982CDE7763AA886AB029C85F4
3,134,003 UART: [art] SIG.R = 3098F8CA1CFD83A0A1853F9393670098460A7C56C1FFE71A0564CD6CDF571667B5BD1FFECD3694565624671C4021E1BB
3,140,749 UART: [art] SIG.S = B0DEB381BF9AEC4BE32640721AE9D9D6E574B93EA0ABB6D0C52310F361BE4C5643CEA57F8F5357DAED363D1676D9B62C
3,164,340 UART: Caliptra RT
3,164,593 UART: [state] CFI Enabled
3,272,072 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,240 UART: [rt]cmd =0x44504543, len=92
3,486,486 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,198 ready_for_fw is high
1,055,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,827 >>> mbox cmd response: success
2,617,827 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,680,231 UART:
2,680,247 UART: Running Caliptra FMC ...
2,680,655 UART:
2,680,709 UART: [state] CFI Enabled
2,691,074 UART: [fht] FMC Alias Private Key: 7
2,798,877 UART: [art] Extend RT PCRs Done
2,799,305 UART: [art] Lock RT PCRs Done
2,801,279 UART: [art] Populate DV Done
2,809,570 UART: [fht] FMC Alias Private Key: 7
2,810,620 UART: [art] Derive CDI
2,810,900 UART: [art] Store in in slot 0x4
2,896,289 UART: [art] Derive Key Pair
2,896,649 UART: [art] Store priv key in slot 0x5
2,909,773 UART: [art] Derive Key Pair - Done
2,924,162 UART: [art] Signing Cert with AUTHO
2,924,642 UART: RITY.KEYID = 7
2,939,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,579 UART: [art] PUB.X = B530E9ED97D5401FAE8D86BC99EF35FCC91AE6EFEA609BEC1EFB66E778CD411DE7F2ADEDBCBE39D73270F633ECE069FB
2,947,385 UART: [art] PUB.Y = 7F51A73EB891EAAABB056B15EE2FE1208D49D483B7506C7D82FC4E1A2EECCFC15BE62F9CCCDF4ED719F5584A442BC05B
2,954,360 UART: [art] SIG.R = C11F913FC5AEE9CD3A91F20A2132F84346E5B43478C9088F9A2A99B538566D0FF5058AD4C1077D3588723A395A883B47
2,961,113 UART: [art] SIG.S = 87B63BC869F8D14EAAC5ACD7C1DA191EC94CD7C76135FA611C2F288B9B951A600145ABFCB0BE696D2739B6FB4644D367
2,985,127 UART: Caliptra RT
2,985,380 UART: [state] CFI Enabled
3,092,964 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,122 UART: [rt]cmd =0x44504543, len=92
3,307,155 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
891,459 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
920,891 UART: [kat] LMS
1,169,203 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,334 UART: [idev] ++
1,173,502 UART: [idev] CDI.KEYID = 6
1,173,863 UART: [idev] SUBJECT.KEYID = 7
1,174,288 UART: [idev] UDS.KEYID = 0
1,174,634 ready_for_fw is high
1,174,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,668 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,210,091 UART: [ldev] ++
1,210,259 UART: [ldev] CDI.KEYID = 6
1,210,623 UART: [ldev] SUBJECT.KEYID = 5
1,211,050 UART: [ldev] AUTHORITY.KEYID = 7
1,211,513 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,399 UART: [ldev] --
1,281,831 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,217 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,674 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,214 >>> mbox cmd response: success
2,771,214 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,772,311 UART: [afmc] ++
2,772,479 UART: [afmc] CDI.KEYID = 6
2,772,842 UART: [afmc] SUBJECT.KEYID = 7
2,773,268 UART: [afmc] AUTHORITY.KEYID = 5
2,809,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,573 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,062 UART: [afmc] --
2,853,050 UART: [cold-reset] --
2,853,884 UART: [state] Locking Datavault
2,855,181 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,785 UART: [state] Locking ICCM
2,856,443 UART: [exit] Launching FMC @ 0x40000130
2,861,772 UART:
2,861,788 UART: Running Caliptra FMC ...
2,862,196 UART:
2,862,339 UART: [state] CFI Enabled
2,872,694 UART: [fht] FMC Alias Private Key: 7
2,981,289 UART: [art] Extend RT PCRs Done
2,981,717 UART: [art] Lock RT PCRs Done
2,983,205 UART: [art] Populate DV Done
2,991,270 UART: [fht] FMC Alias Private Key: 7
2,992,430 UART: [art] Derive CDI
2,992,710 UART: [art] Store in in slot 0x4
3,078,367 UART: [art] Derive Key Pair
3,078,727 UART: [art] Store priv key in slot 0x5
3,091,783 UART: [art] Derive Key Pair - Done
3,106,620 UART: [art] Signing Cert with AUTHO
3,107,100 UART: RITY.KEYID = 7
3,122,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,807 UART: [art] PUB.X = 06BC553B0A8F20978F9126E5960655C7CA6B3F555EB022311753D773E45B4906699D5D2B0A913715747A322B3BB08BBC
3,129,556 UART: [art] PUB.Y = 69DBFF3F52A5B43981531FB671354F9B3DB8D014B4A3DB2DA9025B04C6CCBCFA8C1DF96246ED7BAB23B1E328ACD170E7
3,136,522 UART: [art] SIG.R = 2BA688F9E388DEDA61781D589800A6F470B16714BED580EAA92684B5C9F41752A6B4A8EA42F0244178F86EC35B252D0F
3,143,271 UART: [art] SIG.S = 2E48CB796FE571215671A6E2992D8FECAD6F117A0AC863B18F19049DB7504E032AE3FAE6D5F5495194855B5EEED08840
3,167,227 UART: Caliptra RT
3,167,572 UART: [state] CFI Enabled
3,275,621 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,873 UART: [rt]cmd =0x44504543, len=92
3,489,620 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,665 ready_for_fw is high
1,056,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,980 >>> mbox cmd response: success
2,620,980 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,683,246 UART:
2,683,262 UART: Running Caliptra FMC ...
2,683,670 UART:
2,683,813 UART: [state] CFI Enabled
2,694,366 UART: [fht] FMC Alias Private Key: 7
2,802,629 UART: [art] Extend RT PCRs Done
2,803,057 UART: [art] Lock RT PCRs Done
2,804,761 UART: [art] Populate DV Done
2,812,922 UART: [fht] FMC Alias Private Key: 7
2,813,984 UART: [art] Derive CDI
2,814,264 UART: [art] Store in in slot 0x4
2,900,061 UART: [art] Derive Key Pair
2,900,421 UART: [art] Store priv key in slot 0x5
2,913,787 UART: [art] Derive Key Pair - Done
2,928,569 UART: [art] Signing Cert with AUTHO
2,929,049 UART: RITY.KEYID = 7
2,944,373 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,138 UART: [art] PUB.X = 4C934372133933F70EE5EBAE30C3B493DD0500FDDD658CD219498370B865C66B188E5DB44B527C3F2294634019CBDBA5
2,951,882 UART: [art] PUB.Y = C25F0A0B69387C1B74ED2DD03C4A39985C20D97557A39ECB82E25AFC1685BC01016C2F2D564E7C823D7E37F180A4DB6A
2,958,830 UART: [art] SIG.R = F91B95E97D9529DBEE91E6DA3186529073905642302E19B4B8C6014C423C62C7F9197D39433DA6B9E590CF183C81CA79
2,965,593 UART: [art] SIG.S = 727E99149587FEA6B5C03BAEE23B04570FE8F5D6107BFF4E4BDEF9348435675D13703B03B1A8FC9B4A3D0B0BE8FD28E8
2,988,849 UART: Caliptra RT
2,989,194 UART: [state] CFI Enabled
3,097,301 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,329 UART: [rt]cmd =0x44504543, len=92
3,312,069 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
191,940 UART:
192,321 UART: Running Caliptra ROM ...
193,507 UART:
193,651 UART: [state] CFI Enabled
266,492 UART: [state] LifecycleState = Unprovisioned
268,546 UART: [state] DebugLocked = No
270,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,791 UART: [kat] SHA2-256
445,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,998 UART: [kat] ++
456,482 UART: [kat] sha1
467,704 UART: [kat] SHA2-256
470,417 UART: [kat] SHA2-384
474,763 UART: [kat] SHA2-512-ACC
477,121 UART: [kat] ECC-384
2,766,835 UART: [kat] HMAC-384Kdf
2,781,224 UART: [kat] LMS
3,971,531 UART: [kat] --
3,976,041 UART: [cold-reset] ++
3,978,403 UART: [fht] Storing FHT @ 0x50003400
3,988,882 UART: [idev] ++
3,989,434 UART: [idev] CDI.KEYID = 6
3,990,379 UART: [idev] SUBJECT.KEYID = 7
3,991,613 UART: [idev] UDS.KEYID = 0
3,992,560 ready_for_fw is high
3,992,748 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,935 UART: [idev] Erasing UDS.KEYID = 0
7,328,616 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,648 UART: [idev] --
7,354,960 UART: [ldev] ++
7,355,531 UART: [ldev] CDI.KEYID = 6
7,356,490 UART: [ldev] SUBJECT.KEYID = 5
7,357,697 UART: [ldev] AUTHORITY.KEYID = 7
7,358,993 UART: [ldev] FE.KEYID = 1
7,403,125 UART: [ldev] Erasing FE.KEYID = 1
10,736,254 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,514 UART: [ldev] --
13,114,685 UART: [fwproc] Waiting for Commands...
13,116,769 UART: [fwproc] Received command 0x46574c44
13,118,942 UART: [fwproc] Received Image of size 113844 bytes
17,162,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,090 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,616,925 >>> mbox cmd response: success
17,621,471 UART: [afmc] ++
17,622,082 UART: [afmc] CDI.KEYID = 6
17,622,991 UART: [afmc] SUBJECT.KEYID = 7
17,624,199 UART: [afmc] AUTHORITY.KEYID = 5
20,982,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,284 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,682 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,536 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,967 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,594 UART: [afmc] --
23,358,100 UART: [cold-reset] --
23,361,479 UART: [state] Locking Datavault
23,366,016 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,770 UART: [state] Locking ICCM
23,369,101 UART: [exit] Launching FMC @ 0x40000130
23,377,491 UART:
23,377,748 UART: Running Caliptra FMC ...
23,378,848 UART:
23,379,002 UART: [state] CFI Enabled
23,444,943 UART: [fht] FMC Alias Private Key: 7
25,782,965 UART: [art] Extend RT PCRs Done
25,784,185 UART: [art] Lock RT PCRs Done
25,785,967 UART: [art] Populate DV Done
25,791,384 UART: [fht] FMC Alias Private Key: 7
25,793,068 UART: [art] Derive CDI
25,793,892 UART: [art] Store in in slot 0x4
25,852,612 UART: [art] Derive Key Pair
25,853,606 UART: [art] Store priv key in slot 0x5
29,146,792 UART: [art] Derive Key Pair - Done
29,159,730 UART: [art] Signing Cert with AUTHO
29,161,054 UART: RITY.KEYID = 7
31,447,947 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,502 UART: [art] PUB.X = 5B82B99D97A42B79D44F0A9CDD8D02CEF3CBEA2A74257C1C2342D083F7F3C559931EFD7BC8DEC92109CE8CA32137B46C
31,456,706 UART: [art] PUB.Y = 97EEEF596F75C1EBA8C88909C456BF330649DC2DE0A527DCEF1115233BF71E755A8D3A58C3607858FB91CC5F196DD04D
31,464,014 UART: [art] SIG.R = C5C635F1A2306CEBF0C132534ABF1B17FA95F89F34BBE9F19B8F890041D78AB3340989B0E41D7F1CD7EF093DADBF9E5F
31,471,412 UART: [art] SIG.S = 009C3140E8A2C17AF7CA8F3668BB1DBA2669730FFC73BAF48D62E4397C266177118D90D72893DFD212B137768476D6CC
32,776,860 UART: Caliptra RT
32,777,573 UART: [state] CFI Enabled
32,936,530 UART: [rt] RT listening for mailbox commands...
32,938,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,969,495 UART: [rt]cmd =0x44504543, len=96
38,733,042 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,785,029 ready_for_fw is high
3,785,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,844,445 >>> mbox cmd response: success
23,530,027 UART:
23,530,410 UART: Running Caliptra FMC ...
23,531,614 UART:
23,531,793 UART: [state] CFI Enabled
23,599,304 UART: [fht] FMC Alias Private Key: 7
25,937,459 UART: [art] Extend RT PCRs Done
25,938,685 UART: [art] Lock RT PCRs Done
25,940,171 UART: [art] Populate DV Done
25,945,910 UART: [fht] FMC Alias Private Key: 7
25,947,545 UART: [art] Derive CDI
25,948,276 UART: [art] Store in in slot 0x4
26,008,392 UART: [art] Derive Key Pair
26,009,389 UART: [art] Store priv key in slot 0x5
29,302,310 UART: [art] Derive Key Pair - Done
29,315,411 UART: [art] Signing Cert with AUTHO
29,316,727 UART: RITY.KEYID = 7
31,604,575 UART: [art] Erasing AUTHORITY.KEYID = 7
31,606,073 UART: [art] PUB.X = F690F85F0FE948D45AD009CFF91193E380CA8AB562EA5F39E805727FA2A674B78FDF412C79928A3176ADB8C1C1402BF0
31,613,572 UART: [art] PUB.Y = AF79D46A7C2BF51755E814DC34F53B70C5BF7A2900CD88A77AD6EC1EE48B87E07564F37D956D883A54E1E34964303804
31,620,578 UART: [art] SIG.R = B97CEEEB4C3DDEB40E296D6A632F4A55A666F2475C61501D1963F88E388DC86FC7E46DC994AAE1FC0A249340DB5045FA
31,627,940 UART: [art] SIG.S = 287078CC2585EE043EE718B82B52832ADBECAD8A30DB9AEC3BF67749C9DAEAAE58164076F115D76D3D7616BF4F05C52A
32,932,640 UART: Caliptra RT
32,933,362 UART: [state] CFI Enabled
33,095,518 UART: [rt] RT listening for mailbox commands...
33,097,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,128,580 UART: [rt]cmd =0x44504543, len=96
38,892,105 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,532 UART:
192,901 UART: Running Caliptra ROM ...
194,085 UART:
603,631 UART: [state] CFI Enabled
619,713 UART: [state] LifecycleState = Unprovisioned
621,684 UART: [state] DebugLocked = No
623,285 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,358 UART: [kat] SHA2-256
797,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,660 UART: [kat] ++
808,188 UART: [kat] sha1
819,708 UART: [kat] SHA2-256
822,385 UART: [kat] SHA2-384
828,553 UART: [kat] SHA2-512-ACC
830,928 UART: [kat] ECC-384
3,113,369 UART: [kat] HMAC-384Kdf
3,125,893 UART: [kat] LMS
4,315,948 UART: [kat] --
4,321,966 UART: [cold-reset] ++
4,322,841 UART: [fht] Storing FHT @ 0x50003400
4,335,383 UART: [idev] ++
4,335,965 UART: [idev] CDI.KEYID = 6
4,337,000 UART: [idev] SUBJECT.KEYID = 7
4,338,183 UART: [idev] UDS.KEYID = 0
4,339,289 ready_for_fw is high
4,339,524 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,589 UART: [idev] Erasing UDS.KEYID = 0
7,625,319 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,723 UART: [idev] --
7,651,552 UART: [ldev] ++
7,652,115 UART: [ldev] CDI.KEYID = 6
7,653,051 UART: [ldev] SUBJECT.KEYID = 5
7,654,319 UART: [ldev] AUTHORITY.KEYID = 7
7,655,475 UART: [ldev] FE.KEYID = 1
7,667,220 UART: [ldev] Erasing FE.KEYID = 1
10,956,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,477 UART: [ldev] --
13,318,856 UART: [fwproc] Waiting for Commands...
13,322,248 UART: [fwproc] Received command 0x46574c44
13,324,494 UART: [fwproc] Received Image of size 113844 bytes
17,374,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,597 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,837,534 >>> mbox cmd response: success
17,842,271 UART: [afmc] ++
17,842,923 UART: [afmc] CDI.KEYID = 6
17,843,851 UART: [afmc] SUBJECT.KEYID = 7
17,845,069 UART: [afmc] AUTHORITY.KEYID = 5
21,163,218 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,064 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,464 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,274 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,697 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,506 UART: [afmc] --
23,528,069 UART: [cold-reset] --
23,531,394 UART: [state] Locking Datavault
23,536,531 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,292 UART: [state] Locking ICCM
23,540,067 UART: [exit] Launching FMC @ 0x40000130
23,548,428 UART:
23,548,709 UART: Running Caliptra FMC ...
23,549,823 UART:
23,549,987 UART: [state] CFI Enabled
23,558,141 UART: [fht] FMC Alias Private Key: 7
25,888,882 UART: [art] Extend RT PCRs Done
25,890,102 UART: [art] Lock RT PCRs Done
25,891,561 UART: [art] Populate DV Done
25,896,971 UART: [fht] FMC Alias Private Key: 7
25,898,454 UART: [art] Derive CDI
25,899,219 UART: [art] Store in in slot 0x4
25,941,807 UART: [art] Derive Key Pair
25,942,985 UART: [art] Store priv key in slot 0x5
29,185,244 UART: [art] Derive Key Pair - Done
29,198,184 UART: [art] Signing Cert with AUTHO
29,199,500 UART: RITY.KEYID = 7
31,479,078 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,587 UART: [art] PUB.X = B13DA15E72E000474E86366E95B5B6F44494C9B989E876F68741554F71671A2ACA4782FA0447F9EF67F62F38AF935664
31,487,820 UART: [art] PUB.Y = EDDC2E1A7BCCB96D4F38EC305A246CB07AF9418F28BE1EA7C3E6A3AD131A0D1EB27CC13BB5853679CD6DE0E8E96AB4AB
31,495,117 UART: [art] SIG.R = 7898B33639B51F5A11B1A1B396A47D37E766E896B0A4966D2540C16F554DBC21157BE9571428146BA7265D0D53C53644
31,502,457 UART: [art] SIG.S = E43FDCB7B3A05B981B06577AC93B967CD26EF9A5755A3AE89E8FA4DC97F714B09E105D531FFC05501D058EB97C44BD87
32,808,013 UART: Caliptra RT
32,808,728 UART: [state] CFI Enabled
32,926,720 UART: [rt] RT listening for mailbox commands...
32,928,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,959,719 UART: [rt]cmd =0x44504543, len=96
38,631,182 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,127,135 ready_for_fw is high
4,127,720 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,052,955 >>> mbox cmd response: success
23,694,077 UART:
23,694,490 UART: Running Caliptra FMC ...
23,695,635 UART:
23,695,799 UART: [state] CFI Enabled
23,703,973 UART: [fht] FMC Alias Private Key: 7
26,034,736 UART: [art] Extend RT PCRs Done
26,035,963 UART: [art] Lock RT PCRs Done
26,037,534 UART: [art] Populate DV Done
26,043,058 UART: [fht] FMC Alias Private Key: 7
26,044,606 UART: [art] Derive CDI
26,045,570 UART: [art] Store in in slot 0x4
26,088,304 UART: [art] Derive Key Pair
26,089,307 UART: [art] Store priv key in slot 0x5
29,331,308 UART: [art] Derive Key Pair - Done
29,343,985 UART: [art] Signing Cert with AUTHO
29,345,288 UART: RITY.KEYID = 7
31,624,410 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,912 UART: [art] PUB.X = 67A8F661EB1A7619BD3B4D7388600ED4AFBCE076F4A7A7D7982FD244A4891E18ECEA79215F40B2D466A8CD37857638A5
31,633,180 UART: [art] PUB.Y = 634C26E19B05BA77277D2F72DFB3668D4C0D772C627D53F658F3534BC34FC5B7659B0973C11D5D65B8A5815B906A24A2
31,640,437 UART: [art] SIG.R = 39AD26E784FD89EE8A031AE79A1BE080BFD791CEB1C3DFD7BFE19BCF54C47FECFAFCF7DB7D05E3F0FA34441B4BB225CA
31,647,878 UART: [art] SIG.S = 94CB442D840310C1B7D548D926A2613DBE7D555C0C27EAEBA177B0D33A1D3C2633E91B70DC6EFFF1424798D50E4615ED
32,952,625 UART: Caliptra RT
32,953,335 UART: [state] CFI Enabled
33,070,575 UART: [rt] RT listening for mailbox commands...
33,072,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,103,748 UART: [rt]cmd =0x44504543, len=96
38,776,205 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,243 UART:
192,615 UART: Running Caliptra ROM ...
193,818 UART:
193,978 UART: [state] CFI Enabled
264,510 UART: [state] LifecycleState = Unprovisioned
266,407 UART: [state] DebugLocked = No
267,607 UART: [state] WD Timer not started. Device not locked for debugging
271,302 UART: [kat] SHA2-256
450,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,025 UART: [kat] ++
462,568 UART: [kat] sha1
473,521 UART: [kat] SHA2-256
476,562 UART: [kat] SHA2-384
483,190 UART: [kat] SHA2-512-ACC
486,149 UART: [kat] ECC-384
2,948,364 UART: [kat] HMAC-384Kdf
2,970,685 UART: [kat] LMS
3,500,135 UART: [kat] --
3,503,911 UART: [cold-reset] ++
3,505,274 UART: [fht] FHT @ 0x50003400
3,517,054 UART: [idev] ++
3,517,665 UART: [idev] CDI.KEYID = 6
3,518,620 UART: [idev] SUBJECT.KEYID = 7
3,519,731 UART: [idev] UDS.KEYID = 0
3,520,657 ready_for_fw is high
3,520,856 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,337 UART: [idev] Erasing UDS.KEYID = 0
6,025,506 UART: [idev] Sha1 KeyId Algorithm
6,049,272 UART: [idev] --
6,052,783 UART: [ldev] ++
6,053,357 UART: [ldev] CDI.KEYID = 6
6,054,272 UART: [ldev] SUBJECT.KEYID = 5
6,055,493 UART: [ldev] AUTHORITY.KEYID = 7
6,056,729 UART: [ldev] FE.KEYID = 1
6,099,799 UART: [ldev] Erasing FE.KEYID = 1
8,606,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,488 UART: [ldev] --
10,412,951 UART: [fwproc] Wait for Commands...
10,415,911 UART: [fwproc] Recv command 0x46574c44
10,418,005 UART: [fwproc] Recv'd Img size: 114168 bytes
13,821,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,280,055 >>> mbox cmd response: success
14,284,021 UART: [afmc] ++
14,284,620 UART: [afmc] CDI.KEYID = 6
14,285,534 UART: [afmc] SUBJECT.KEYID = 7
14,286,698 UART: [afmc] AUTHORITY.KEYID = 5
16,827,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,664 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,508 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,952 UART: [afmc] --
18,631,898 UART: [cold-reset] --
18,635,979 UART: [state] Locking Datavault
18,642,725 UART: [state] Locking PCR0, PCR1 and PCR31
18,644,389 UART: [state] Locking ICCM
18,645,951 UART: [exit] Launching FMC @ 0x40000130
18,654,350 UART:
18,654,584 UART: Running Caliptra FMC ...
18,655,683 UART:
18,655,842 UART: [state] CFI Enabled
18,712,519 UART: [fht] FMC Alias Private Key: 7
20,477,149 UART: [art] Extend RT PCRs Done
20,478,385 UART: [art] Lock RT PCRs Done
20,480,233 UART: [art] Populate DV Done
20,485,429 UART: [fht] FMC Alias Private Key: 7
20,487,083 UART: [art] Derive CDI
20,487,905 UART: [art] Store in in slot 0x4
20,545,549 UART: [art] Derive Key Pair
20,546,542 UART: [art] Store priv key in slot 0x5
23,009,595 UART: [art] Derive Key Pair - Done
23,022,766 UART: [art] Signing Cert with AUTHO
23,024,075 UART: RITY.KEYID = 7
24,735,565 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,071 UART: [art] PUB.X = AE003987558D2BA0EA9BD1455ACEDDA21A1A060380D76843DCA9916166AB1B79645DD960687FBB344C6AAF12685C9108
24,744,335 UART: [art] PUB.Y = 340504A1AC25D3FFF476EBC09163BFF4556D951BAE3A624F08D380120197F6927562DF86201F858011A15E6DBA23691E
24,751,520 UART: [art] SIG.R = 212431B5067097C020F7C8B85C5D32531B90A93FEB2AAAF50775BD7A057E26830302575CED744E0225D158C706983E66
24,758,921 UART: [art] SIG.S = 70E112FED690D2FA2416478D3D19F32121D99A0C19C1B58BFB7B8F60DB80031C01AE1F01AAC5D3629C545F48EC401C94
25,738,262 UART: Caliptra RT
25,738,997 UART: [state] CFI Enabled
25,904,058 UART: [rt] RT listening for mailbox commands...
25,905,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,937,434 UART: [rt]cmd =0x44504543, len=96
30,314,306 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,379,268 ready_for_fw is high
3,379,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,264 >>> mbox cmd response: success
18,361,156 UART:
18,361,576 UART: Running Caliptra FMC ...
18,362,712 UART:
18,362,872 UART: [state] CFI Enabled
18,430,926 UART: [fht] FMC Alias Private Key: 7
20,195,336 UART: [art] Extend RT PCRs Done
20,196,567 UART: [art] Lock RT PCRs Done
20,197,941 UART: [art] Populate DV Done
20,203,206 UART: [fht] FMC Alias Private Key: 7
20,204,745 UART: [art] Derive CDI
20,205,560 UART: [art] Store in in slot 0x4
20,263,752 UART: [art] Derive Key Pair
20,264,789 UART: [art] Store priv key in slot 0x5
22,727,358 UART: [art] Derive Key Pair - Done
22,740,686 UART: [art] Signing Cert with AUTHO
22,741,990 UART: RITY.KEYID = 7
24,453,855 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,362 UART: [art] PUB.X = 7D0496C5CA801D7AF80C4D8A04D75C037BC9E32DA3BDA3387CD260E3955D700ED5D9DF05CC89BD573EE669FFB43A02A7
24,462,652 UART: [art] PUB.Y = FC43D2F36C194072F547B474F7EE35543882EE4286FBCFC50151153CABDBC901BC0FEB698CF235066C6FC5AEFB581B35
24,469,898 UART: [art] SIG.R = AC8A25C76169E2A9E282DCD929FD7EE2EEF625EA9474B050421A513C0BE0675CE24F85F5BEC10AA026B3202B1D3D3388
24,477,366 UART: [art] SIG.S = 7429870BF516924FFDAEE50944226AF416D0FC201DD05CBF9306A26504DEF328E4C924B586AF9DD9EAF1AD4A1DC0776E
25,455,957 UART: Caliptra RT
25,456,660 UART: [state] CFI Enabled
25,619,746 UART: [rt] RT listening for mailbox commands...
25,621,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,652,927 UART: [rt]cmd =0x44504543, len=96
30,011,669 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,695 writing to cptra_bootfsm_go
192,932 UART:
193,303 UART: Running Caliptra ROM ...
194,441 UART:
604,114 UART: [state] CFI Enabled
618,056 UART: [state] LifecycleState = Unprovisioned
619,934 UART: [state] DebugLocked = No
621,674 UART: [state] WD Timer not started. Device not locked for debugging
625,571 UART: [kat] SHA2-256
804,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,238 UART: [kat] ++
816,779 UART: [kat] sha1
828,414 UART: [kat] SHA2-256
831,462 UART: [kat] SHA2-384
837,750 UART: [kat] SHA2-512-ACC
840,758 UART: [kat] ECC-384
3,281,291 UART: [kat] HMAC-384Kdf
3,292,668 UART: [kat] LMS
3,822,131 UART: [kat] --
3,826,051 UART: [cold-reset] ++
3,826,988 UART: [fht] FHT @ 0x50003400
3,839,243 UART: [idev] ++
3,839,812 UART: [idev] CDI.KEYID = 6
3,840,719 UART: [idev] SUBJECT.KEYID = 7
3,841,893 UART: [idev] UDS.KEYID = 0
3,842,834 ready_for_fw is high
3,843,035 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,889 UART: [idev] Erasing UDS.KEYID = 0
6,315,009 UART: [idev] Sha1 KeyId Algorithm
6,338,859 UART: [idev] --
6,343,862 UART: [ldev] ++
6,344,439 UART: [ldev] CDI.KEYID = 6
6,345,350 UART: [ldev] SUBJECT.KEYID = 5
6,346,507 UART: [ldev] AUTHORITY.KEYID = 7
6,347,746 UART: [ldev] FE.KEYID = 1
6,357,530 UART: [ldev] Erasing FE.KEYID = 1
8,827,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,756 UART: [ldev] --
10,618,485 UART: [fwproc] Wait for Commands...
10,620,304 UART: [fwproc] Recv command 0x46574c44
10,622,395 UART: [fwproc] Recv'd Img size: 114168 bytes
14,021,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,482,216 >>> mbox cmd response: success
14,487,005 UART: [afmc] ++
14,487,611 UART: [afmc] CDI.KEYID = 6
14,488,506 UART: [afmc] SUBJECT.KEYID = 7
14,489,725 UART: [afmc] AUTHORITY.KEYID = 5
16,989,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,729,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,745,494 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,761,374 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,671 UART: [afmc] --
18,787,213 UART: [cold-reset] --
18,791,122 UART: [state] Locking Datavault
18,797,118 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,811 UART: [state] Locking ICCM
18,799,800 UART: [exit] Launching FMC @ 0x40000130
18,808,187 UART:
18,808,428 UART: Running Caliptra FMC ...
18,809,453 UART:
18,809,599 UART: [state] CFI Enabled
18,818,026 UART: [fht] FMC Alias Private Key: 7
20,575,120 UART: [art] Extend RT PCRs Done
20,576,368 UART: [art] Lock RT PCRs Done
20,578,412 UART: [art] Populate DV Done
20,583,454 UART: [fht] FMC Alias Private Key: 7
20,585,156 UART: [art] Derive CDI
20,585,896 UART: [art] Store in in slot 0x4
20,628,383 UART: [art] Derive Key Pair
20,629,383 UART: [art] Store priv key in slot 0x5
23,056,144 UART: [art] Derive Key Pair - Done
23,068,903 UART: [art] Signing Cert with AUTHO
23,070,236 UART: RITY.KEYID = 7
24,775,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,520 UART: [art] PUB.X = 39457D7C1D7D8A466CE1EFF25AF93326EF19B1A12CB9DEB4909009361A25E0551F2E535F6956F8CC9BE9F6151B0C6C84
24,784,786 UART: [art] PUB.Y = 2AA288929C30B90F7E4B56C593E2967220FFF24C81E1017B31002F32F4D57FE0C8326AE635FDB509E252F622BFFAFDD2
24,792,033 UART: [art] SIG.R = A8AE87BBEBDA3547B2756C50FDD638DED712F73C65321E85FED1492E7396BC6E3C8FAF263E93BCD807DA6729A010E494
24,799,433 UART: [art] SIG.S = F48E5605B494652F6C3440926495F26C89D3F81F708A6F5B351C9056307FD2E7A05BE24C5836B435E19D38EA8A03773C
25,778,454 UART: Caliptra RT
25,779,169 UART: [state] CFI Enabled
25,896,230 UART: [rt] RT listening for mailbox commands...
25,898,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,929,497 UART: [rt]cmd =0x44504543, len=96
30,212,008 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,819 writing to cptra_bootfsm_go
3,694,824 ready_for_fw is high
3,695,229 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,272,642 >>> mbox cmd response: success
18,524,027 UART:
18,524,421 UART: Running Caliptra FMC ...
18,525,614 UART:
18,525,798 UART: [state] CFI Enabled
18,533,593 UART: [fht] FMC Alias Private Key: 7
20,290,890 UART: [art] Extend RT PCRs Done
20,292,122 UART: [art] Lock RT PCRs Done
20,293,780 UART: [art] Populate DV Done
20,298,989 UART: [fht] FMC Alias Private Key: 7
20,300,745 UART: [art] Derive CDI
20,301,562 UART: [art] Store in in slot 0x4
20,344,104 UART: [art] Derive Key Pair
20,345,167 UART: [art] Store priv key in slot 0x5
22,771,636 UART: [art] Derive Key Pair - Done
22,784,693 UART: [art] Signing Cert with AUTHO
22,786,002 UART: RITY.KEYID = 7
24,491,198 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,704 UART: [art] PUB.X = 06AA45BDBDFD8737A65CC536A4322B43D7B3E79E15243CC1FB160C324F7828D47A828A35CD57A987DDFFC933C5EE80C7
24,500,008 UART: [art] PUB.Y = 17890A1F7367CD6998B2505542F19C58CDACC15B9239B5A1475B644AAD5E0B8B950F5A21B18A203A77042BEC357656BC
24,507,273 UART: [art] SIG.R = DBDBB9FDC6D5ADF20E756C9D2044765E7E77D862FC31DC704AF13FB21BCC47A20C3184A0787ECC47AEA6C32464B51B3A
24,514,669 UART: [art] SIG.S = FAEECDF861A32388B1667D5E36AE06EBE6D0C102980CB626CCAC12E076F152295023F4ABC097F9F66BE4A59833BE11EC
25,493,420 UART: Caliptra RT
25,494,134 UART: [state] CFI Enabled
25,611,750 UART: [rt] RT listening for mailbox commands...
25,613,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,644,633 UART: [rt]cmd =0x44504543, len=96
29,926,814 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,305 UART:
192,660 UART: Running Caliptra ROM ...
193,856 UART:
194,017 UART: [state] CFI Enabled
260,554 UART: [state] LifecycleState = Unprovisioned
262,967 UART: [state] DebugLocked = No
265,209 UART: [state] WD Timer not started. Device not locked for debugging
269,326 UART: [kat] SHA2-256
459,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,992 UART: [kat] ++
470,480 UART: [kat] sha1
481,844 UART: [kat] SHA2-256
484,905 UART: [kat] SHA2-384
491,617 UART: [kat] SHA2-512-ACC
494,220 UART: [kat] ECC-384
2,947,632 UART: [kat] HMAC-384Kdf
2,970,910 UART: [kat] LMS
3,502,652 UART: [kat] --
3,506,148 UART: [cold-reset] ++
3,508,360 UART: [fht] FHT @ 0x50003400
3,520,205 UART: [idev] ++
3,520,947 UART: [idev] CDI.KEYID = 6
3,521,874 UART: [idev] SUBJECT.KEYID = 7
3,523,052 UART: [idev] UDS.KEYID = 0
3,523,983 ready_for_fw is high
3,524,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,740 UART: [idev] Erasing UDS.KEYID = 0
6,026,619 UART: [idev] Sha1 KeyId Algorithm
6,050,067 UART: [idev] --
6,053,852 UART: [ldev] ++
6,054,553 UART: [ldev] CDI.KEYID = 6
6,055,440 UART: [ldev] SUBJECT.KEYID = 5
6,056,656 UART: [ldev] AUTHORITY.KEYID = 7
6,057,837 UART: [ldev] FE.KEYID = 1
6,099,300 UART: [ldev] Erasing FE.KEYID = 1
8,606,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,596 UART: [ldev] --
10,411,273 UART: [fwproc] Wait for Commands...
10,412,884 UART: [fwproc] Recv command 0x46574c44
10,415,131 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,879 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,003 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,592,349 >>> mbox cmd response: success
14,596,152 UART: [afmc] ++
14,596,866 UART: [afmc] CDI.KEYID = 6
14,598,036 UART: [afmc] SUBJECT.KEYID = 7
14,599,534 UART: [afmc] AUTHORITY.KEYID = 5
17,130,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,456 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,196 UART: [afmc] --
18,947,795 UART: [cold-reset] --
18,951,936 UART: [state] Locking Datavault
18,958,073 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,304 UART: [state] Locking ICCM
18,963,118 UART: [exit] Launching FMC @ 0x40000130
18,971,764 UART:
18,972,002 UART: Running Caliptra FMC ...
18,973,110 UART:
18,973,270 UART: [state] CFI Enabled
19,030,976 UART: [fht] FMC Alias Private Key: 7
20,794,301 UART: [art] Extend RT PCRs Done
20,795,515 UART: [art] Lock RT PCRs Done
20,797,333 UART: [art] Populate DV Done
20,802,907 UART: [fht] FMC Alias Private Key: 7
20,804,511 UART: [art] Derive CDI
20,805,252 UART: [art] Store in in slot 0x4
20,863,745 UART: [art] Derive Key Pair
20,864,744 UART: [art] Store priv key in slot 0x5
23,327,792 UART: [art] Derive Key Pair - Done
23,340,803 UART: [art] Signing Cert with AUTHO
23,342,118 UART: RITY.KEYID = 7
25,053,973 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,493 UART: [art] PUB.X = C4D29257A62BF75DB92AC53087CF982C7F932F429B141F2CB99777BC36C24D640CA5AA8F203E71A68C6BFDA826A883C0
25,062,763 UART: [art] PUB.Y = D595C180AB2BBC8294C0F2DC3FE9DC8A4885804FCA5F81CF866BC2BDEB832B6057FC7C7F878DAABE0697862FE1BA26C1
25,070,075 UART: [art] SIG.R = 5D0CDC1B1CC0949F2D10D3127BD14908F4765307DCA641E07DD4629D1BCCB76AA37FCB998FA7963033E60C48CED43946
25,077,442 UART: [art] SIG.S = 8D9691BB5481264FF96FEB08E84F52B433E33C486D2A3D9BE4068DCE8C6E6875E24F92C1CB6005BCC117CFD9EA3A420E
26,056,876 UART: Caliptra RT
26,057,594 UART: [state] CFI Enabled
26,222,665 UART: [rt] RT listening for mailbox commands...
26,224,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,256,070 UART: [rt]cmd =0x44504543, len=96
30,635,376 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,437,817 ready_for_fw is high
3,438,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,750,387 >>> mbox cmd response: success
19,061,035 UART:
19,061,449 UART: Running Caliptra FMC ...
19,062,594 UART:
19,062,761 UART: [state] CFI Enabled
19,131,821 UART: [fht] FMC Alias Private Key: 7
20,895,168 UART: [art] Extend RT PCRs Done
20,896,391 UART: [art] Lock RT PCRs Done
20,898,293 UART: [art] Populate DV Done
20,903,820 UART: [fht] FMC Alias Private Key: 7
20,905,525 UART: [art] Derive CDI
20,906,345 UART: [art] Store in in slot 0x4
20,964,739 UART: [art] Derive Key Pair
20,965,779 UART: [art] Store priv key in slot 0x5
23,428,902 UART: [art] Derive Key Pair - Done
23,441,740 UART: [art] Signing Cert with AUTHO
23,443,051 UART: RITY.KEYID = 7
25,155,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,713 UART: [art] PUB.X = 8217AB793A3C46DA1D7B3FD0A73646BCFABCD66FB94DFF10C2D209537D0168210868310D345B797DC95DF63062452545
25,163,944 UART: [art] PUB.Y = 37EC050C272A434F9FD95E032D864317295E848D0E3FA5DFA0794180B09A4CDE156CAB36C48FBBCDA02C88911D324071
25,171,214 UART: [art] SIG.R = 4738769C8E6B4940CD3A27FA532D91D5ED4875011064CFEF1F3A99CFF74936F7623EC2B6F3BCFC743F9FE90C9E3C2298
25,178,682 UART: [art] SIG.S = EAC6141F9AA7FDF1CF505F2804D6FBB5B5B01DEB60E756FF2B351DCE2019A3A7911946B2CA5DDD089997E64D21704F80
26,157,231 UART: Caliptra RT
26,157,956 UART: [state] CFI Enabled
26,324,558 UART: [rt] RT listening for mailbox commands...
26,326,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,357,854 UART: [rt]cmd =0x44504543, len=96
30,716,421 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
192,843 UART:
193,210 UART: Running Caliptra ROM ...
194,311 UART:
604,082 UART: [state] CFI Enabled
618,318 UART: [state] LifecycleState = Unprovisioned
620,692 UART: [state] DebugLocked = No
623,359 UART: [state] WD Timer not started. Device not locked for debugging
627,467 UART: [kat] SHA2-256
817,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,160 UART: [kat] ++
828,677 UART: [kat] sha1
841,094 UART: [kat] SHA2-256
844,115 UART: [kat] SHA2-384
849,198 UART: [kat] SHA2-512-ACC
851,779 UART: [kat] ECC-384
3,291,468 UART: [kat] HMAC-384Kdf
3,303,959 UART: [kat] LMS
3,835,759 UART: [kat] --
3,840,250 UART: [cold-reset] ++
3,841,969 UART: [fht] FHT @ 0x50003400
3,854,364 UART: [idev] ++
3,855,067 UART: [idev] CDI.KEYID = 6
3,856,024 UART: [idev] SUBJECT.KEYID = 7
3,857,198 UART: [idev] UDS.KEYID = 0
3,858,099 ready_for_fw is high
3,858,309 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,767 UART: [idev] Erasing UDS.KEYID = 0
6,334,789 UART: [idev] Sha1 KeyId Algorithm
6,356,833 UART: [idev] --
6,362,411 UART: [ldev] ++
6,363,105 UART: [ldev] CDI.KEYID = 6
6,364,035 UART: [ldev] SUBJECT.KEYID = 5
6,365,197 UART: [ldev] AUTHORITY.KEYID = 7
6,366,377 UART: [ldev] FE.KEYID = 1
6,376,375 UART: [ldev] Erasing FE.KEYID = 1
8,858,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,528 UART: [ldev] --
10,646,194 UART: [fwproc] Wait for Commands...
10,648,337 UART: [fwproc] Recv command 0x46574c44
10,650,647 UART: [fwproc] Recv'd Img size: 114168 bytes
14,102,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,835,442 >>> mbox cmd response: success
14,840,265 UART: [afmc] ++
14,840,998 UART: [afmc] CDI.KEYID = 6
14,842,192 UART: [afmc] SUBJECT.KEYID = 7
14,843,624 UART: [afmc] AUTHORITY.KEYID = 5
17,345,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,311 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,399 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,419 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,987 UART: [afmc] --
19,144,175 UART: [cold-reset] --
19,149,230 UART: [state] Locking Datavault
19,157,514 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,580 UART: [state] Locking ICCM
19,162,141 UART: [exit] Launching FMC @ 0x40000130
19,170,824 UART:
19,171,066 UART: Running Caliptra FMC ...
19,172,173 UART:
19,172,330 UART: [state] CFI Enabled
19,180,700 UART: [fht] FMC Alias Private Key: 7
20,937,250 UART: [art] Extend RT PCRs Done
20,938,469 UART: [art] Lock RT PCRs Done
20,940,259 UART: [art] Populate DV Done
20,945,453 UART: [fht] FMC Alias Private Key: 7
20,947,147 UART: [art] Derive CDI
20,947,968 UART: [art] Store in in slot 0x4
20,990,408 UART: [art] Derive Key Pair
20,991,410 UART: [art] Store priv key in slot 0x5
23,418,436 UART: [art] Derive Key Pair - Done
23,431,533 UART: [art] Signing Cert with AUTHO
23,432,862 UART: RITY.KEYID = 7
25,138,868 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,368 UART: [art] PUB.X = 106EAE3E768734E43D172AD0F53C833FBB96E7F93FAC0102F6E7F8F4DDB884AEE5BABED06347B2EDF909C2AE3FDDE899
25,147,622 UART: [art] PUB.Y = 63FC1994B6CC1725758AFE0A79E2B699A0813A51D99CF8A9B7E5E4AB74B7FDCF62FE5E877FE1BD6447097FC973F0C9BF
25,154,912 UART: [art] SIG.R = ABCC59A01A27C30FD950638FA78334C3893099D52819D66DC9AB1E9D8C2396A042ADB0D64F281A12937ABF84996AABAE
25,162,331 UART: [art] SIG.S = 4ADFC65730534720C4C56D7F6C3DABE24528100873A8576D5E432A508D6A13273242F4CC1CB1314564ACA3EF85C2A21E
26,141,243 UART: Caliptra RT
26,141,947 UART: [state] CFI Enabled
26,259,761 UART: [rt] RT listening for mailbox commands...
26,261,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,292,988 UART: [rt]cmd =0x44504543, len=96
30,576,697 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,794 writing to cptra_bootfsm_go
3,753,651 ready_for_fw is high
3,754,199 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,383 >>> mbox cmd response: success
19,210,826 UART:
19,211,231 UART: Running Caliptra FMC ...
19,212,332 UART:
19,212,486 UART: [state] CFI Enabled
19,220,775 UART: [fht] FMC Alias Private Key: 7
20,977,267 UART: [art] Extend RT PCRs Done
20,978,493 UART: [art] Lock RT PCRs Done
20,980,315 UART: [art] Populate DV Done
20,985,841 UART: [fht] FMC Alias Private Key: 7
20,987,493 UART: [art] Derive CDI
20,988,233 UART: [art] Store in in slot 0x4
21,031,149 UART: [art] Derive Key Pair
21,032,213 UART: [art] Store priv key in slot 0x5
23,459,321 UART: [art] Derive Key Pair - Done
23,472,416 UART: [art] Signing Cert with AUTHO
23,473,711 UART: RITY.KEYID = 7
25,179,530 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,040 UART: [art] PUB.X = 6A765C521090638A634A5D060ABABB85869E87DE158C5BDA8FA407CA3184EAF52A9BA2623FEC09171FF8E3A301758C4F
25,188,282 UART: [art] PUB.Y = 50135CC79ABD04B66075C9F208477E29631C57617D9204A977BC5F78B354C2597E9D9CC3802BE11FCCCF754AA0F32C40
25,195,567 UART: [art] SIG.R = 0F0A79F96F1E66D485D401A090377D7184E8375BF74168E277D0F0414E55B7E1DF6411EBD91B72FE3A55AF22238BBFDE
25,202,965 UART: [art] SIG.S = 3ADFDE683CE1E23920BB2418867C6E1B228A966BA042A458D1F1BBF1CB61C03E429C70553F30C54DADEDAACD7038ABE0
26,182,680 UART: Caliptra RT
26,183,360 UART: [state] CFI Enabled
26,300,209 UART: [rt] RT listening for mailbox commands...
26,302,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,304 UART: [rt]cmd =0x44504543, len=96
30,616,584 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,959 UART: [kat] SHA2-256
881,890 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,005 UART: [kat] ++
886,157 UART: [kat] sha1
890,307 UART: [kat] SHA2-256
892,245 UART: [kat] SHA2-384
895,026 UART: [kat] SHA2-512-ACC
896,927 UART: [kat] ECC-384
902,744 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,761 UART: [cold-reset] ++
1,477,205 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 ready_for_fw is high
1,481,109 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,010 UART: [idev] Erasing UDS.KEYID = 0
1,505,524 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,154 UART: [idev] --
1,515,371 UART: [ldev] ++
1,515,539 UART: [ldev] CDI.KEYID = 6
1,515,902 UART: [ldev] SUBJECT.KEYID = 5
1,516,328 UART: [ldev] AUTHORITY.KEYID = 7
1,516,791 UART: [ldev] FE.KEYID = 1
1,521,739 UART: [ldev] Erasing FE.KEYID = 1
1,547,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,216 UART: [ldev] --
1,586,607 UART: [fwproc] Waiting for Commands...
1,587,240 UART: [fwproc] Received command 0x46574c44
1,588,031 UART: [fwproc] Received Image of size 114168 bytes
2,884,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,345 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,228 >>> mbox cmd response: success
3,077,360 UART: [afmc] ++
3,077,528 UART: [afmc] CDI.KEYID = 6
3,077,890 UART: [afmc] SUBJECT.KEYID = 7
3,078,315 UART: [afmc] AUTHORITY.KEYID = 5
3,113,512 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,626 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,354 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,239 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,929 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,744 UART: [afmc] --
3,156,798 UART: [cold-reset] --
3,157,514 UART: [state] Locking Datavault
3,158,779 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,383 UART: [state] Locking ICCM
3,160,049 UART: [exit] Launching FMC @ 0x40000130
3,165,378 UART:
3,165,394 UART: Running Caliptra FMC ...
3,165,802 UART:
3,165,856 UART: [state] CFI Enabled
3,176,219 UART: [fht] FMC Alias Private Key: 7
3,284,088 UART: [art] Extend RT PCRs Done
3,284,516 UART: [art] Lock RT PCRs Done
3,286,132 UART: [art] Populate DV Done
3,294,407 UART: [fht] FMC Alias Private Key: 7
3,295,565 UART: [art] Derive CDI
3,295,845 UART: [art] Store in in slot 0x4
3,381,570 UART: [art] Derive Key Pair
3,381,930 UART: [art] Store priv key in slot 0x5
3,395,118 UART: [art] Derive Key Pair - Done
3,409,572 UART: [art] Signing Cert with AUTHO
3,410,052 UART: RITY.KEYID = 7
3,425,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,139 UART: [art] PUB.X = 74820CDB3BF37A1B53F23C3C54BBBDFEF00CDE5170CD806F764CC3BF227ECD517A6B87F9495D08513456283B9E4358D9
3,432,912 UART: [art] PUB.Y = F8F679A08D8337F2883166E4255F8737F6643C3E1E11645596F240CD7CBB25F6A94E3A5831C800DFEEC127B1D912B5C8
3,439,840 UART: [art] SIG.R = 443BCDABE2941A291214370D87CC00C8D233D0EAFB813F62F75CDDBBF213FA4F5D5F829A4463AFB44A2FB12A3732BF5E
3,446,605 UART: [art] SIG.S = 87DD74FC2C757517F4276C4D84B0E14E5FD4B3978AF03B51FDAE13AD98EB38770DB5B4B6B63A3138E745C52615DD7C9D
3,470,571 UART: Caliptra RT
3,470,824 UART: [state] CFI Enabled
3,578,945 UART: [rt] RT listening for mailbox commands...
3,579,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,987 UART: [rt]cmd =0x44504543, len=96
3,790,135 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,165 ready_for_fw is high
1,362,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,712 >>> mbox cmd response: success
2,988,386 UART:
2,988,402 UART: Running Caliptra FMC ...
2,988,810 UART:
2,988,864 UART: [state] CFI Enabled
2,999,617 UART: [fht] FMC Alias Private Key: 7
3,107,864 UART: [art] Extend RT PCRs Done
3,108,292 UART: [art] Lock RT PCRs Done
3,109,868 UART: [art] Populate DV Done
3,118,145 UART: [fht] FMC Alias Private Key: 7
3,119,255 UART: [art] Derive CDI
3,119,535 UART: [art] Store in in slot 0x4
3,205,372 UART: [art] Derive Key Pair
3,205,732 UART: [art] Store priv key in slot 0x5
3,219,048 UART: [art] Derive Key Pair - Done
3,233,908 UART: [art] Signing Cert with AUTHO
3,234,388 UART: RITY.KEYID = 7
3,249,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,493 UART: [art] PUB.X = 9C904D0ADC5BCF5B8F02BDEBA6E2BED3B4670C31711880B445639474618B6FF243B0713B4B2EE4463597F838577AE1BA
3,257,262 UART: [art] PUB.Y = 5CB36FEA5B4F7D69FE610F32E32DDBCD0E0A9790DA7222A94FE68F12208E852F3734C9BF5FF9C9FE6F48471B84333324
3,264,215 UART: [art] SIG.R = 4065651381F35CB3DF785F6AC144C1F78612B76CC1F51A3CDE12A5D16F3393EFA594DDDAF1C9191C4A6D87764B78004F
3,270,971 UART: [art] SIG.S = 65B4AD542F01E1D8E6BF8669E622594E7E6F5EE11C8494991090A4B35481A94D94F8A4335B158E38311659784CA380C2
3,295,199 UART: Caliptra RT
3,295,452 UART: [state] CFI Enabled
3,403,856 UART: [rt] RT listening for mailbox commands...
3,404,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,046 UART: [rt]cmd =0x44504543, len=96
3,615,760 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,430 UART: [kat] SHA2-256
882,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,476 UART: [kat] ++
886,628 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,557 UART: [kat] SHA2-512-ACC
897,458 UART: [kat] ECC-384
903,079 UART: [kat] HMAC-384Kdf
907,807 UART: [kat] LMS
1,476,003 UART: [kat] --
1,476,770 UART: [cold-reset] ++
1,477,206 UART: [fht] Storing FHT @ 0x50003400
1,480,227 UART: [idev] ++
1,480,395 UART: [idev] CDI.KEYID = 6
1,480,755 UART: [idev] SUBJECT.KEYID = 7
1,481,179 UART: [idev] UDS.KEYID = 0
1,481,524 ready_for_fw is high
1,481,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,659 UART: [idev] Erasing UDS.KEYID = 0
1,506,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,007 UART: [idev] --
1,515,958 UART: [ldev] ++
1,516,126 UART: [ldev] CDI.KEYID = 6
1,516,489 UART: [ldev] SUBJECT.KEYID = 5
1,516,915 UART: [ldev] AUTHORITY.KEYID = 7
1,517,378 UART: [ldev] FE.KEYID = 1
1,522,602 UART: [ldev] Erasing FE.KEYID = 1
1,547,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,231 UART: [ldev] --
1,586,702 UART: [fwproc] Waiting for Commands...
1,587,539 UART: [fwproc] Received command 0x46574c44
1,588,330 UART: [fwproc] Received Image of size 114168 bytes
2,885,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,558 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,445 >>> mbox cmd response: success
3,078,637 UART: [afmc] ++
3,078,805 UART: [afmc] CDI.KEYID = 6
3,079,167 UART: [afmc] SUBJECT.KEYID = 7
3,079,592 UART: [afmc] AUTHORITY.KEYID = 5
3,114,171 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,903 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,788 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,478 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,401 UART: [afmc] --
3,157,379 UART: [cold-reset] --
3,158,073 UART: [state] Locking Datavault
3,159,160 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,764 UART: [state] Locking ICCM
3,160,322 UART: [exit] Launching FMC @ 0x40000130
3,165,651 UART:
3,165,667 UART: Running Caliptra FMC ...
3,166,075 UART:
3,166,218 UART: [state] CFI Enabled
3,176,911 UART: [fht] FMC Alias Private Key: 7
3,284,874 UART: [art] Extend RT PCRs Done
3,285,302 UART: [art] Lock RT PCRs Done
3,286,658 UART: [art] Populate DV Done
3,294,741 UART: [fht] FMC Alias Private Key: 7
3,295,731 UART: [art] Derive CDI
3,296,011 UART: [art] Store in in slot 0x4
3,381,700 UART: [art] Derive Key Pair
3,382,060 UART: [art] Store priv key in slot 0x5
3,395,426 UART: [art] Derive Key Pair - Done
3,409,984 UART: [art] Signing Cert with AUTHO
3,410,464 UART: RITY.KEYID = 7
3,425,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,741 UART: [art] PUB.X = 67755195F5584E9AC2EB077D52C81012E024A61B945252B937E9FB2E9E2CAD1907366FE1322A145B532143D68560ECEF
3,433,501 UART: [art] PUB.Y = 0226B5F81A5588FFB6A42BC49147F1750496D98E29B9AE995A1C811DF709FB0389D1CBA568BECC3FF19AA31515D5C24F
3,440,449 UART: [art] SIG.R = B5CE0E036724CF0D77761729AC9867838E1CA5A8D4A0300AAC9C0857D986A55B6D9DAE690D1139B8E228D7D8A7DBB893
3,447,209 UART: [art] SIG.S = D390963D929DB611805C863817CABC0C398596DAF8D6D6325A6E9C4EF153C456F7BE5B6B9AA20B09280AEFBB0A410D6D
3,470,788 UART: Caliptra RT
3,471,133 UART: [state] CFI Enabled
3,579,313 UART: [rt] RT listening for mailbox commands...
3,579,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,313 UART: [rt]cmd =0x44504543, len=96
3,790,366 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,738 ready_for_fw is high
1,362,738 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,685 >>> mbox cmd response: success
2,988,793 UART:
2,988,809 UART: Running Caliptra FMC ...
2,989,217 UART:
2,989,360 UART: [state] CFI Enabled
3,000,057 UART: [fht] FMC Alias Private Key: 7
3,106,934 UART: [art] Extend RT PCRs Done
3,107,362 UART: [art] Lock RT PCRs Done
3,108,750 UART: [art] Populate DV Done
3,116,823 UART: [fht] FMC Alias Private Key: 7
3,117,885 UART: [art] Derive CDI
3,118,165 UART: [art] Store in in slot 0x4
3,203,614 UART: [art] Derive Key Pair
3,203,974 UART: [art] Store priv key in slot 0x5
3,216,802 UART: [art] Derive Key Pair - Done
3,231,747 UART: [art] Signing Cert with AUTHO
3,232,227 UART: RITY.KEYID = 7
3,246,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,746 UART: [art] PUB.X = 7049E730BE96C7F719F0C25B3A3C62FEB14552F06906C10409EE3E1A515FAF9A8CE0D48C2E042C8D1CF0625ED3F97B8E
3,254,516 UART: [art] PUB.Y = 517FB0F2FB2209A93044EC591C3951E494CDABF47D341E945319EBFE0CD87C9EE9462C292A73D5D6E543256B66628839
3,261,462 UART: [art] SIG.R = F4BC073AB12DB74835135F30FF20911503A5092640ACEC368532AF11A7DEBC5E302672FA561760A409485AC72B3CBBFC
3,268,226 UART: [art] SIG.S = E43C863788935CF5E8DCEC87048BD594BD22B39ADC4CE7ED5ED973DBFC7D9D5E1D8B35F44DF4F9DFD0B12D730B80F3F4
3,291,757 UART: Caliptra RT
3,292,102 UART: [state] CFI Enabled
3,399,826 UART: [rt] RT listening for mailbox commands...
3,400,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,968 UART: [rt]cmd =0x44504543, len=96
3,611,245 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,959 UART: [kat] SHA2-256
903,899 UART: [kat] SHA2-384
906,704 UART: [kat] SHA2-512-ACC
908,605 UART: [kat] ECC-384
918,466 UART: [kat] HMAC-384Kdf
923,182 UART: [kat] LMS
1,171,510 UART: [kat] --
1,172,429 UART: [cold-reset] ++
1,172,991 UART: [fht] FHT @ 0x50003400
1,175,496 UART: [idev] ++
1,175,664 UART: [idev] CDI.KEYID = 6
1,176,024 UART: [idev] SUBJECT.KEYID = 7
1,176,448 UART: [idev] UDS.KEYID = 0
1,176,793 ready_for_fw is high
1,176,793 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,704 UART: [idev] Erasing UDS.KEYID = 0
1,201,867 UART: [idev] Sha1 KeyId Algorithm
1,210,249 UART: [idev] --
1,211,231 UART: [ldev] ++
1,211,399 UART: [ldev] CDI.KEYID = 6
1,211,762 UART: [ldev] SUBJECT.KEYID = 5
1,212,188 UART: [ldev] AUTHORITY.KEYID = 7
1,212,651 UART: [ldev] FE.KEYID = 1
1,217,801 UART: [ldev] Erasing FE.KEYID = 1
1,244,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,493 UART: [ldev] --
1,283,972 UART: [fwproc] Wait for Commands...
1,284,778 UART: [fwproc] Recv command 0x46574c44
1,285,506 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,247 >>> mbox cmd response: success
2,774,431 UART: [afmc] ++
2,774,599 UART: [afmc] CDI.KEYID = 6
2,774,961 UART: [afmc] SUBJECT.KEYID = 7
2,775,386 UART: [afmc] AUTHORITY.KEYID = 5
2,811,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,458 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,186 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,071 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,790 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,674 UART: [afmc] --
2,854,566 UART: [cold-reset] --
2,855,608 UART: [state] Locking Datavault
2,856,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,419 UART: [state] Locking ICCM
2,857,901 UART: [exit] Launching FMC @ 0x40000130
2,863,230 UART:
2,863,246 UART: Running Caliptra FMC ...
2,863,654 UART:
2,863,708 UART: [state] CFI Enabled
2,874,089 UART: [fht] FMC Alias Private Key: 7
2,982,052 UART: [art] Extend RT PCRs Done
2,982,480 UART: [art] Lock RT PCRs Done
2,983,676 UART: [art] Populate DV Done
2,991,733 UART: [fht] FMC Alias Private Key: 7
2,992,873 UART: [art] Derive CDI
2,993,153 UART: [art] Store in in slot 0x4
3,078,628 UART: [art] Derive Key Pair
3,078,988 UART: [art] Store priv key in slot 0x5
3,092,564 UART: [art] Derive Key Pair - Done
3,107,368 UART: [art] Signing Cert with AUTHO
3,107,848 UART: RITY.KEYID = 7
3,122,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,719 UART: [art] PUB.X = 78C022C013DD38D3441AAA88F11D5C25D5DA73BAF02A396483093DF3B1E6A20F6A78E6CF3C5C2A1EF64F67BE24CF707A
3,130,499 UART: [art] PUB.Y = 0B2A1A591B98C532587D10391BFEB2E7F5B0A1F8A6C1E68DCBEE4956401959EE438AAEB48E87A496A358051C72DF42F5
3,137,453 UART: [art] SIG.R = CD48F9B32FF9AE33D144F6010DBEB677E3D332CBB1A6D70CFD56F210633877EF19C4EA9168F43723CE735205434C03BB
3,144,218 UART: [art] SIG.S = 291D534035D2B9609F33D48E5856C571EE79D9F1F1C1AE427443A74955B1273C983D6F2DF7FBFFBD36366A3D7F40BCE0
3,168,361 UART: Caliptra RT
3,168,614 UART: [state] CFI Enabled
3,276,665 UART: [rt] RT listening for mailbox commands...
3,277,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,737 UART: [rt]cmd =0x44504543, len=96
3,488,237 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 ready_for_fw is high
1,060,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,302 >>> mbox cmd response: success
2,685,674 UART:
2,685,690 UART: Running Caliptra FMC ...
2,686,098 UART:
2,686,152 UART: [state] CFI Enabled
2,696,603 UART: [fht] FMC Alias Private Key: 7
2,804,576 UART: [art] Extend RT PCRs Done
2,805,004 UART: [art] Lock RT PCRs Done
2,806,622 UART: [art] Populate DV Done
2,814,645 UART: [fht] FMC Alias Private Key: 7
2,815,805 UART: [art] Derive CDI
2,816,085 UART: [art] Store in in slot 0x4
2,901,636 UART: [art] Derive Key Pair
2,901,996 UART: [art] Store priv key in slot 0x5
2,915,114 UART: [art] Derive Key Pair - Done
2,930,117 UART: [art] Signing Cert with AUTHO
2,930,597 UART: RITY.KEYID = 7
2,945,463 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,228 UART: [art] PUB.X = 978CE33536BD385EF63A7522587414D84E0D3EEE760564585C16855C5647EA0B411A9DB46F2626FEE99B072F6EC2996C
2,952,984 UART: [art] PUB.Y = F7B4BFF4429B8EDF2AEC35014E2C9A8C496EFC883A8D31FB8C08D8BA93D05D03470AE36655D44C7CF048775435DEE5D3
2,959,938 UART: [art] SIG.R = 762F835F5F232FB981B240F3C2F6FE1B355171A40E77D9ADFE0F976DEAF30E62D13A972812F6D0CDB380F3001FE4560A
2,966,684 UART: [art] SIG.S = 0CE2D6CED19AB18D7BBEA662933F49AE9A995BC38E603CECD571A397DC66525CAADE6067445D94A844C8CC55E0297AF9
2,990,854 UART: Caliptra RT
2,991,107 UART: [state] CFI Enabled
3,099,612 UART: [rt] RT listening for mailbox commands...
3,100,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,622 UART: [rt]cmd =0x44504543, len=96
3,311,156 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,377 UART: [kat] SHA2-256
893,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,152 UART: [kat] ++
897,304 UART: [kat] sha1
901,416 UART: [kat] SHA2-256
903,356 UART: [kat] SHA2-384
906,243 UART: [kat] SHA2-512-ACC
908,144 UART: [kat] ECC-384
917,709 UART: [kat] HMAC-384Kdf
922,151 UART: [kat] LMS
1,170,479 UART: [kat] --
1,171,332 UART: [cold-reset] ++
1,171,836 UART: [fht] FHT @ 0x50003400
1,174,411 UART: [idev] ++
1,174,579 UART: [idev] CDI.KEYID = 6
1,174,939 UART: [idev] SUBJECT.KEYID = 7
1,175,363 UART: [idev] UDS.KEYID = 0
1,175,708 ready_for_fw is high
1,175,708 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,311 UART: [idev] Erasing UDS.KEYID = 0
1,199,760 UART: [idev] Sha1 KeyId Algorithm
1,208,218 UART: [idev] --
1,209,326 UART: [ldev] ++
1,209,494 UART: [ldev] CDI.KEYID = 6
1,209,857 UART: [ldev] SUBJECT.KEYID = 5
1,210,283 UART: [ldev] AUTHORITY.KEYID = 7
1,210,746 UART: [ldev] FE.KEYID = 1
1,215,654 UART: [ldev] Erasing FE.KEYID = 1
1,242,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,493 UART: [fwproc] Wait for Commands...
1,282,249 UART: [fwproc] Recv command 0x46574c44
1,282,977 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,805 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,418 >>> mbox cmd response: success
2,772,494 UART: [afmc] ++
2,772,662 UART: [afmc] CDI.KEYID = 6
2,773,024 UART: [afmc] SUBJECT.KEYID = 7
2,773,449 UART: [afmc] AUTHORITY.KEYID = 5
2,808,882 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,641 UART: [afmc] --
2,852,557 UART: [cold-reset] --
2,853,307 UART: [state] Locking Datavault
2,854,324 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,928 UART: [state] Locking ICCM
2,855,546 UART: [exit] Launching FMC @ 0x40000130
2,860,875 UART:
2,860,891 UART: Running Caliptra FMC ...
2,861,299 UART:
2,861,442 UART: [state] CFI Enabled
2,871,841 UART: [fht] FMC Alias Private Key: 7
2,979,176 UART: [art] Extend RT PCRs Done
2,979,604 UART: [art] Lock RT PCRs Done
2,981,228 UART: [art] Populate DV Done
2,989,417 UART: [fht] FMC Alias Private Key: 7
2,990,371 UART: [art] Derive CDI
2,990,651 UART: [art] Store in in slot 0x4
3,076,532 UART: [art] Derive Key Pair
3,076,892 UART: [art] Store priv key in slot 0x5
3,090,202 UART: [art] Derive Key Pair - Done
3,104,827 UART: [art] Signing Cert with AUTHO
3,105,307 UART: RITY.KEYID = 7
3,120,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,082 UART: [art] PUB.X = 7D759AF645AF1D3E3F016BA428F85624C7E734B5C6A345CD5FFBA20ECB3311DCA874B7915AAA3BABA967575E603F0537
3,127,857 UART: [art] PUB.Y = 584FFB5D36D12DD9AD81FD4E6CD7A3E85AB79B5BD707D35E5A6AF083A260AED01187300D60E4DA1D030E8B66F17D7072
3,134,811 UART: [art] SIG.R = 68432CD83728FD06DC2A248895A769EE2569F7042A4B79F0BB6FF489909ADFA430F2878DA99F4D4AC5CB07C098DD8ED6
3,141,582 UART: [art] SIG.S = 2B8D9058FF646ABDC63C65EA261AF6D5FACE6BE0929131BB79C0C7B754E52C9C03CD07C2506291A1B52CE7D050A64D6F
3,165,513 UART: Caliptra RT
3,165,858 UART: [state] CFI Enabled
3,273,749 UART: [rt] RT listening for mailbox commands...
3,274,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,885 UART: [rt]cmd =0x44504543, len=96
3,486,664 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,460 ready_for_fw is high
1,061,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,625 >>> mbox cmd response: success
2,690,791 UART:
2,690,807 UART: Running Caliptra FMC ...
2,691,215 UART:
2,691,358 UART: [state] CFI Enabled
2,701,591 UART: [fht] FMC Alias Private Key: 7
2,809,276 UART: [art] Extend RT PCRs Done
2,809,704 UART: [art] Lock RT PCRs Done
2,811,274 UART: [art] Populate DV Done
2,819,771 UART: [fht] FMC Alias Private Key: 7
2,820,735 UART: [art] Derive CDI
2,821,015 UART: [art] Store in in slot 0x4
2,906,842 UART: [art] Derive Key Pair
2,907,202 UART: [art] Store priv key in slot 0x5
2,920,176 UART: [art] Derive Key Pair - Done
2,934,978 UART: [art] Signing Cert with AUTHO
2,935,458 UART: RITY.KEYID = 7
2,950,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,393 UART: [art] PUB.X = 7B9400A4DD7401C11636AFA812AF525E30A14C52B658E11F646F82BD645F74407F1C29C2BD6DC989D0A63C08A8340DB1
2,958,136 UART: [art] PUB.Y = 8B7925ADDEBF0409D3D30BABC68FC5722ECB2CD701833C06802EDBCF6DC99DADA1F1456E22086B6AA429524F60532A07
2,965,081 UART: [art] SIG.R = 15A0F11600BB16C9B132F1EDD7997DE8FB9A8198E827C8C34B682D5A1B433D4C6BC4596D30349903F003C158E48B16A3
2,971,825 UART: [art] SIG.S = 4BDE50CBEF0EDEDEA05A40CAB36148EB33250F639F89280B355723973090159CDE355A92D5389D29E16A0C779BE5E9E4
2,995,818 UART: Caliptra RT
2,996,163 UART: [state] CFI Enabled
3,103,776 UART: [rt] RT listening for mailbox commands...
3,104,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,014 UART: [rt]cmd =0x44504543, len=96
3,315,082 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,181 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,174,051 ready_for_fw is high
1,174,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,463 UART: [idev] Erasing UDS.KEYID = 0
1,198,037 UART: [idev] Sha1 KeyId Algorithm
1,206,743 UART: [idev] --
1,207,808 UART: [ldev] ++
1,207,976 UART: [ldev] CDI.KEYID = 6
1,208,340 UART: [ldev] SUBJECT.KEYID = 5
1,208,767 UART: [ldev] AUTHORITY.KEYID = 7
1,209,230 UART: [ldev] FE.KEYID = 1
1,214,434 UART: [ldev] Erasing FE.KEYID = 1
1,240,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,264 UART: [ldev] --
1,279,728 UART: [fwproc] Wait for Commands...
1,280,465 UART: [fwproc] Recv command 0x46574c44
1,281,198 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,321 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,981 >>> mbox cmd response: success
2,770,086 UART: [afmc] ++
2,770,254 UART: [afmc] CDI.KEYID = 6
2,770,617 UART: [afmc] SUBJECT.KEYID = 7
2,771,043 UART: [afmc] AUTHORITY.KEYID = 5
2,806,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,504 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,387 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,963 UART: [afmc] --
2,849,971 UART: [cold-reset] --
2,850,749 UART: [state] Locking Datavault
2,851,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,526 UART: [state] Locking ICCM
2,852,966 UART: [exit] Launching FMC @ 0x40000130
2,858,295 UART:
2,858,311 UART: Running Caliptra FMC ...
2,858,719 UART:
2,858,773 UART: [state] CFI Enabled
2,869,400 UART: [fht] FMC Alias Private Key: 7
2,977,241 UART: [art] Extend RT PCRs Done
2,977,669 UART: [art] Lock RT PCRs Done
2,979,289 UART: [art] Populate DV Done
2,987,400 UART: [fht] FMC Alias Private Key: 7
2,988,340 UART: [art] Derive CDI
2,988,620 UART: [art] Store in in slot 0x4
3,073,991 UART: [art] Derive Key Pair
3,074,351 UART: [art] Store priv key in slot 0x5
3,087,453 UART: [art] Derive Key Pair - Done
3,102,149 UART: [art] Signing Cert with AUTHO
3,102,629 UART: RITY.KEYID = 7
3,117,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,664 UART: [art] PUB.X = 0D76EB9EE72B7ADEDC7F1CB7BAFA149D3D092FCDA2DE2B3DC4AC9643F1D408E8A8A8DF106FF3316F52B639836E89B02E
3,125,453 UART: [art] PUB.Y = F785E207ECC78A227AD9BCF6842E37C3AB8EE1BB796AD839F08A96B3AC2A1CA4438C33DC252D505687F0D3985F8A6442
3,132,412 UART: [art] SIG.R = 85F8EA1742274575AE3668E918E906BFB5CADAE7E9CEE95BF927B5B7897492EF6BD67AF2B21C6C7B8A842F42E5E48D4A
3,139,195 UART: [art] SIG.S = 1E84619662FBD54FA7F53F7EBAA629BA9587E19D91743A8FF11925576752C1D79DC800EF5F91C83FBF38320E22863318
3,162,753 UART: Caliptra RT
3,163,006 UART: [state] CFI Enabled
3,270,521 UART: [rt] RT listening for mailbox commands...
3,271,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,699 UART: [rt]cmd =0x44504543, len=96
3,482,433 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,658 ready_for_fw is high
1,055,658 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,379 >>> mbox cmd response: success
2,681,279 UART:
2,681,295 UART: Running Caliptra FMC ...
2,681,703 UART:
2,681,757 UART: [state] CFI Enabled
2,692,354 UART: [fht] FMC Alias Private Key: 7
2,800,679 UART: [art] Extend RT PCRs Done
2,801,107 UART: [art] Lock RT PCRs Done
2,802,705 UART: [art] Populate DV Done
2,811,048 UART: [fht] FMC Alias Private Key: 7
2,812,126 UART: [art] Derive CDI
2,812,406 UART: [art] Store in in slot 0x4
2,898,297 UART: [art] Derive Key Pair
2,898,657 UART: [art] Store priv key in slot 0x5
2,910,953 UART: [art] Derive Key Pair - Done
2,925,793 UART: [art] Signing Cert with AUTHO
2,926,273 UART: RITY.KEYID = 7
2,941,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,994 UART: [art] PUB.X = BE1874403BE4AACB406E4570285BC0F57D12C4B6FEBC219C74F36056C992D82C3B984CBED273008F50475BDE3FF58D34
2,948,752 UART: [art] PUB.Y = 36ACE74CA14F3F94350F96C1A92D736237DBF464D8150693B29015C4522428ED8C1CC5D07EBF3E20B7DC199197D744FA
2,955,700 UART: [art] SIG.R = B3C7DD5C332AC7ABEE1701ED91DE9DA10845FFC53DAF803AA265BE97F741BC75A42AEB92FE158ECD9B391EC0F1A6FF7F
2,962,496 UART: [art] SIG.S = 6944A45703EF76B30D7D87DF1966EA5B61D72B95C2639C368DC557BE50334EAF70E3EF8A735A99E9C2100F055717F79C
2,985,925 UART: Caliptra RT
2,986,178 UART: [state] CFI Enabled
3,095,019 UART: [rt] RT listening for mailbox commands...
3,095,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,133 UART: [rt]cmd =0x44504543, len=96
3,306,688 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,657 UART: [kat] SHA2-512-ACC
906,558 UART: [kat] ECC-384
916,119 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,174,838 ready_for_fw is high
1,174,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,678 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,127 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,084 UART: [fwproc] Recv command 0x46574c44
1,282,817 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,127 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,092 >>> mbox cmd response: success
2,771,277 UART: [afmc] ++
2,771,445 UART: [afmc] CDI.KEYID = 6
2,771,808 UART: [afmc] SUBJECT.KEYID = 7
2,772,234 UART: [afmc] AUTHORITY.KEYID = 5
2,807,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,647 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,530 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,249 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,136 UART: [afmc] --
2,851,170 UART: [cold-reset] --
2,852,130 UART: [state] Locking Datavault
2,853,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,965 UART: [state] Locking ICCM
2,854,497 UART: [exit] Launching FMC @ 0x40000130
2,859,826 UART:
2,859,842 UART: Running Caliptra FMC ...
2,860,250 UART:
2,860,393 UART: [state] CFI Enabled
2,870,946 UART: [fht] FMC Alias Private Key: 7
2,980,131 UART: [art] Extend RT PCRs Done
2,980,559 UART: [art] Lock RT PCRs Done
2,982,219 UART: [art] Populate DV Done
2,990,660 UART: [fht] FMC Alias Private Key: 7
2,991,656 UART: [art] Derive CDI
2,991,936 UART: [art] Store in in slot 0x4
3,077,191 UART: [art] Derive Key Pair
3,077,551 UART: [art] Store priv key in slot 0x5
3,090,425 UART: [art] Derive Key Pair - Done
3,104,824 UART: [art] Signing Cert with AUTHO
3,105,304 UART: RITY.KEYID = 7
3,120,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,785 UART: [art] PUB.X = B989E94AA1FFD75CA9885D49420A9199E279D47CFA0CF7FFF39DA25A7069C338D23E4DD3D7598C831264A7EB8E3D035C
3,127,558 UART: [art] PUB.Y = 6C3413C4D4DDB1781BA483584B1CB4C9A09503EF9E66A575D1B9369417BA834E199D8BC4B157C69AE5614532712D15F4
3,134,505 UART: [art] SIG.R = 415CFC8613324D8F7831E99E154482CC57F27B0CB7D25F037B3444CF68143A130C1F04CB4573BB66998D733880E183A7
3,141,257 UART: [art] SIG.S = 0F753A21E6BE6E000C36FF7A1623BEEF8931DA89C9223C1BDF8F0C9D667F8118BE9E6E03D3C21783761CD6F1855B4D26
3,164,968 UART: Caliptra RT
3,165,313 UART: [state] CFI Enabled
3,273,450 UART: [rt] RT listening for mailbox commands...
3,274,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,752 UART: [rt]cmd =0x44504543, len=96
3,485,230 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,337 ready_for_fw is high
1,056,337 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,330 >>> mbox cmd response: success
2,683,632 UART:
2,683,648 UART: Running Caliptra FMC ...
2,684,056 UART:
2,684,199 UART: [state] CFI Enabled
2,694,924 UART: [fht] FMC Alias Private Key: 7
2,802,387 UART: [art] Extend RT PCRs Done
2,802,815 UART: [art] Lock RT PCRs Done
2,804,217 UART: [art] Populate DV Done
2,812,700 UART: [fht] FMC Alias Private Key: 7
2,813,722 UART: [art] Derive CDI
2,814,002 UART: [art] Store in in slot 0x4
2,899,815 UART: [art] Derive Key Pair
2,900,175 UART: [art] Store priv key in slot 0x5
2,913,525 UART: [art] Derive Key Pair - Done
2,928,320 UART: [art] Signing Cert with AUTHO
2,928,800 UART: RITY.KEYID = 7
2,943,638 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,403 UART: [art] PUB.X = 920A8929CB24DE4C4C1C5CB37DC29EA644CE156246D8B33A4BA98DF01E46814905BF01D74374E823CE3C3A00AA719830
2,951,148 UART: [art] PUB.Y = FE2911CCB8240FB1D303EB7E8C7CB0427B3BB2FE2B39DFD55CB7D3A7E8B4BF61A7450D6968D687E3D545B4454C91BF57
2,958,107 UART: [art] SIG.R = 8604ABDF98847BF24F4204D6250D0C565A3D20F48195D7CBA590052F80F36169CD0E9354D7283E197D49FF6C641F067D
2,964,854 UART: [art] SIG.S = 74F0A1E083D8DAD9619D8F3A62706CDFEC3D2CE834D1ADB8CC5EC949782FAEE20D964FE49FD2534743E43F72F55999A9
2,988,750 UART: Caliptra RT
2,989,095 UART: [state] CFI Enabled
3,097,188 UART: [rt] RT listening for mailbox commands...
3,097,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,508 UART: [rt]cmd =0x44504543, len=96
3,308,304 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,030 UART:
192,414 UART: Running Caliptra ROM ...
193,548 UART:
193,689 UART: [state] CFI Enabled
264,371 UART: [state] LifecycleState = Unprovisioned
266,296 UART: [state] DebugLocked = No
268,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,764 UART: [kat] SHA2-256
443,458 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,975 UART: [kat] ++
454,442 UART: [kat] sha1
465,804 UART: [kat] SHA2-256
468,515 UART: [kat] SHA2-384
473,360 UART: [kat] SHA2-512-ACC
475,727 UART: [kat] ECC-384
2,768,839 UART: [kat] HMAC-384Kdf
2,799,558 UART: [kat] LMS
3,989,871 UART: [kat] --
3,996,010 UART: [cold-reset] ++
3,998,655 UART: [fht] Storing FHT @ 0x50003400
4,011,278 UART: [idev] ++
4,011,880 UART: [idev] CDI.KEYID = 6
4,012,835 UART: [idev] SUBJECT.KEYID = 7
4,014,081 UART: [idev] UDS.KEYID = 0
4,015,077 ready_for_fw is high
4,015,268 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,158,299 UART: [idev] Erasing UDS.KEYID = 0
7,345,864 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,221 UART: [idev] --
7,369,198 UART: [ldev] ++
7,369,799 UART: [ldev] CDI.KEYID = 6
7,370,684 UART: [ldev] SUBJECT.KEYID = 5
7,371,949 UART: [ldev] AUTHORITY.KEYID = 7
7,373,180 UART: [ldev] FE.KEYID = 1
7,401,477 UART: [ldev] Erasing FE.KEYID = 1
10,735,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,430 UART: [ldev] --
13,114,499 UART: [fwproc] Waiting for Commands...
13,116,907 UART: [fwproc] Received command 0x46574c44
13,119,134 UART: [fwproc] Received Image of size 113844 bytes
17,165,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,165 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,067 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,629,533 >>> mbox cmd response: success
17,633,710 UART: [afmc] ++
17,634,306 UART: [afmc] CDI.KEYID = 6
17,635,212 UART: [afmc] SUBJECT.KEYID = 7
17,636,481 UART: [afmc] AUTHORITY.KEYID = 5
20,996,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,298,762 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,301,016 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,315,428 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,330,250 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,344,729 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,366,807 UART: [afmc] --
23,370,076 UART: [cold-reset] --
23,375,164 UART: [state] Locking Datavault
23,380,098 UART: [state] Locking PCR0, PCR1 and PCR31
23,381,799 UART: [state] Locking ICCM
23,382,968 UART: [exit] Launching FMC @ 0x40000130
23,391,364 UART:
23,391,592 UART: Running Caliptra FMC ...
23,392,688 UART:
23,392,841 UART: [state] CFI Enabled
23,458,818 UART: [fht] FMC Alias Private Key: 7
25,796,583 UART: [art] Extend RT PCRs Done
25,797,846 UART: [art] Lock RT PCRs Done
25,799,446 UART: [art] Populate DV Done
25,805,149 UART: [fht] FMC Alias Private Key: 7
25,806,840 UART: [art] Derive CDI
25,807,571 UART: [art] Store in in slot 0x4
25,867,472 UART: [art] Derive Key Pair
25,868,550 UART: [art] Store priv key in slot 0x5
29,161,531 UART: [art] Derive Key Pair - Done
29,174,358 UART: [art] Signing Cert with AUTHO
29,175,651 UART: RITY.KEYID = 7
31,462,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,165 UART: [art] PUB.X = 4FC5479849267ABCE6E29070957BB5BD9EE47AF87F33098C5300F8819D2E78B90AD6B2B4646E2476CB3A235C4DA8476D
31,471,438 UART: [art] PUB.Y = CB4D85E33D5F80CB1C44DE029B9A2B6B9F7C32D6239452919590673FBAD170707C1B394C7A56B03B1478C9EF99E38008
31,478,643 UART: [art] SIG.R = 8C13FD02E25B69DDB0E1730DC8B39D604D23F3BDA5CAB1280771E13D32BD93485DF531307B1C78F4DA2D71D61E101062
31,486,004 UART: [art] SIG.S = 9E62BE013B9B05EDD21AD49BCEC9148F9D8FFBCD60F3B640D9B52C94F27F5BBD4C3BEAC08D1442B4EC68CDB0754E1C79
32,791,122 UART: Caliptra RT
32,791,838 UART: [state] CFI Enabled
32,953,910 UART: [rt] RT listening for mailbox commands...
32,955,829 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,986,078 UART: [rt]cmd =0x44504543, len=28
33,028,846 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,786,013 ready_for_fw is high
3,786,420 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,861,749 >>> mbox cmd response: success
23,546,266 UART:
23,546,741 UART: Running Caliptra FMC ...
23,547,851 UART:
23,548,009 UART: [state] CFI Enabled
23,617,497 UART: [fht] FMC Alias Private Key: 7
25,955,865 UART: [art] Extend RT PCRs Done
25,957,092 UART: [art] Lock RT PCRs Done
25,958,835 UART: [art] Populate DV Done
25,964,136 UART: [fht] FMC Alias Private Key: 7
25,965,670 UART: [art] Derive CDI
25,966,426 UART: [art] Store in in slot 0x4
26,025,794 UART: [art] Derive Key Pair
26,026,839 UART: [art] Store priv key in slot 0x5
29,319,693 UART: [art] Derive Key Pair - Done
29,332,512 UART: [art] Signing Cert with AUTHO
29,333,825 UART: RITY.KEYID = 7
31,620,725 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,234 UART: [art] PUB.X = 6CC51013A14BD765920767023C2174B389F3A57548C943E1E556FED20E30AC80B7F1059B008878E5D4590C6520A2472C
31,629,436 UART: [art] PUB.Y = AA242D1693DED67D8D9AD1BF272956F3B3F083883D9C79DD62BDB7906C98EED0A5CA0C139A2AF38E3FB9D7CB0220A0F1
31,636,729 UART: [art] SIG.R = 538E8609A9EFDEA49E6DA4BE5FD8D98513056746719D106FD602CFEE43B30085D8521EAD79756BAEB3EE47F32D6598D7
31,644,123 UART: [art] SIG.S = 175721B7688EC0EA48C079F1C43830FD7B7C79E83A8C35A92A1DD6960AEE8A20D4380FA5FF7A3C79AA9E2CAD60F3E0CD
32,949,598 UART: Caliptra RT
32,950,296 UART: [state] CFI Enabled
33,110,508 UART: [rt] RT listening for mailbox commands...
33,112,562 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,143,323 UART: [rt]cmd =0x44504543, len=28
33,186,169 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,406 UART:
192,781 UART: Running Caliptra ROM ...
193,885 UART:
603,537 UART: [state] CFI Enabled
619,617 UART: [state] LifecycleState = Unprovisioned
621,499 UART: [state] DebugLocked = No
624,080 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,800 UART: [kat] SHA2-256
798,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,084 UART: [kat] ++
809,620 UART: [kat] sha1
820,145 UART: [kat] SHA2-256
822,870 UART: [kat] SHA2-384
827,944 UART: [kat] SHA2-512-ACC
830,273 UART: [kat] ECC-384
3,116,453 UART: [kat] HMAC-384Kdf
3,128,998 UART: [kat] LMS
4,319,105 UART: [kat] --
4,324,188 UART: [cold-reset] ++
4,325,838 UART: [fht] Storing FHT @ 0x50003400
4,336,039 UART: [idev] ++
4,336,609 UART: [idev] CDI.KEYID = 6
4,337,560 UART: [idev] SUBJECT.KEYID = 7
4,338,803 UART: [idev] UDS.KEYID = 0
4,339,771 ready_for_fw is high
4,339,988 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,067 UART: [idev] Erasing UDS.KEYID = 0
7,620,324 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,046 UART: [idev] --
7,645,986 UART: [ldev] ++
7,646,561 UART: [ldev] CDI.KEYID = 6
7,647,499 UART: [ldev] SUBJECT.KEYID = 5
7,648,789 UART: [ldev] AUTHORITY.KEYID = 7
7,649,944 UART: [ldev] FE.KEYID = 1
7,660,024 UART: [ldev] Erasing FE.KEYID = 1
10,950,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,891 UART: [ldev] --
13,310,550 UART: [fwproc] Waiting for Commands...
13,313,437 UART: [fwproc] Received command 0x46574c44
13,315,630 UART: [fwproc] Received Image of size 113844 bytes
17,364,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,656 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,832,582 >>> mbox cmd response: success
17,836,720 UART: [afmc] ++
17,837,327 UART: [afmc] CDI.KEYID = 6
17,838,244 UART: [afmc] SUBJECT.KEYID = 7
17,839,462 UART: [afmc] AUTHORITY.KEYID = 5
21,155,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,762 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,154 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,000 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,437 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,556 UART: [afmc] --
23,523,807 UART: [cold-reset] --
23,529,571 UART: [state] Locking Datavault
23,535,846 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,596 UART: [state] Locking ICCM
23,538,938 UART: [exit] Launching FMC @ 0x40000130
23,547,354 UART:
23,547,592 UART: Running Caliptra FMC ...
23,548,697 UART:
23,548,855 UART: [state] CFI Enabled
23,556,620 UART: [fht] FMC Alias Private Key: 7
25,887,841 UART: [art] Extend RT PCRs Done
25,889,060 UART: [art] Lock RT PCRs Done
25,890,419 UART: [art] Populate DV Done
25,895,734 UART: [fht] FMC Alias Private Key: 7
25,897,221 UART: [art] Derive CDI
25,897,986 UART: [art] Store in in slot 0x4
25,940,361 UART: [art] Derive Key Pair
25,941,362 UART: [art] Store priv key in slot 0x5
29,183,501 UART: [art] Derive Key Pair - Done
29,196,333 UART: [art] Signing Cert with AUTHO
29,197,634 UART: RITY.KEYID = 7
31,477,030 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,534 UART: [art] PUB.X = 33AF8F10849D05A4FC2D3C9A9C0885C2737DFD817ED6479CC23054534F2F89FFEBC75C5BB0B85A0ED49332AEA98A2710
31,485,741 UART: [art] PUB.Y = 40E838F2DBC42AD2298AC78CC31277EC849CC13C001BB65BD1606E44F2703B2D8AC063300030D95C6CECACF13A8BA4E1
31,492,992 UART: [art] SIG.R = 1BC91F4D83521EF4DA729A3422AAA048F0AB5678BCAA39F8A18FABF1984B5E39FCF05ACCCDCE494AF91B1EB61BD2E261
31,500,458 UART: [art] SIG.S = 677989B3ECDAEB081C7A074A248FCBAEB4F0B716FA5F550D2C269254FC97DBC0BCD1D7A7813E711A22EB9CEC17C60E3C
32,805,231 UART: Caliptra RT
32,805,937 UART: [state] CFI Enabled
32,923,345 UART: [rt] RT listening for mailbox commands...
32,925,306 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,956,092 UART: [rt]cmd =0x44504543, len=28
32,998,515 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,125,871 ready_for_fw is high
4,126,257 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,243 >>> mbox cmd response: success
23,701,954 UART:
23,702,342 UART: Running Caliptra FMC ...
23,703,467 UART:
23,703,623 UART: [state] CFI Enabled
23,711,631 UART: [fht] FMC Alias Private Key: 7
26,041,948 UART: [art] Extend RT PCRs Done
26,043,204 UART: [art] Lock RT PCRs Done
26,044,853 UART: [art] Populate DV Done
26,050,664 UART: [fht] FMC Alias Private Key: 7
26,052,203 UART: [art] Derive CDI
26,052,941 UART: [art] Store in in slot 0x4
26,095,334 UART: [art] Derive Key Pair
26,096,400 UART: [art] Store priv key in slot 0x5
29,338,852 UART: [art] Derive Key Pair - Done
29,351,919 UART: [art] Signing Cert with AUTHO
29,353,257 UART: RITY.KEYID = 7
31,632,438 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,951 UART: [art] PUB.X = 11E853E21D0C23B739A3417A9EEFE78FDFAA640D27DBB22A671E34E982BDBDBF6770B6DE8D8FFAFD9E14AB289A727616
31,641,238 UART: [art] PUB.Y = 28A1B50648C3FA2C9119842D26DC4BB2D63F4F24A9DC5DC44F5EBD4D248BDC810C550620B8730E9943CFB7EAD1EBF246
31,648,500 UART: [art] SIG.R = 79E094FECF06D67DD9002EE5F68415641897B010D2D76C18166EEB49BCB839E8B12E698661098D7CBFD83C7346552039
31,655,847 UART: [art] SIG.S = 115273ACB34F6E24C9BC531A3EA7D3A48D409A612DD6F01D9B87E70F4C8BD0A6444E28EA54C5534ED8B7D8938CCB79D7
32,961,277 UART: Caliptra RT
32,961,989 UART: [state] CFI Enabled
33,079,433 UART: [rt] RT listening for mailbox commands...
33,081,351 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,112,057 UART: [rt]cmd =0x44504543, len=28
33,154,609 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,173 UART:
192,542 UART: Running Caliptra ROM ...
193,677 UART:
193,825 UART: [state] CFI Enabled
263,188 UART: [state] LifecycleState = Unprovisioned
265,015 UART: [state] DebugLocked = No
266,698 UART: [state] WD Timer not started. Device not locked for debugging
269,531 UART: [kat] SHA2-256
448,668 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,223 UART: [kat] ++
460,788 UART: [kat] sha1
471,819 UART: [kat] SHA2-256
474,831 UART: [kat] SHA2-384
481,316 UART: [kat] SHA2-512-ACC
484,251 UART: [kat] ECC-384
2,949,604 UART: [kat] HMAC-384Kdf
2,972,716 UART: [kat] LMS
3,502,169 UART: [kat] --
3,506,156 UART: [cold-reset] ++
3,508,378 UART: [fht] FHT @ 0x50003400
3,520,351 UART: [idev] ++
3,520,911 UART: [idev] CDI.KEYID = 6
3,521,823 UART: [idev] SUBJECT.KEYID = 7
3,523,067 UART: [idev] UDS.KEYID = 0
3,524,000 ready_for_fw is high
3,524,217 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,889 UART: [idev] Erasing UDS.KEYID = 0
6,027,950 UART: [idev] Sha1 KeyId Algorithm
6,049,780 UART: [idev] --
6,054,350 UART: [ldev] ++
6,054,932 UART: [ldev] CDI.KEYID = 6
6,055,823 UART: [ldev] SUBJECT.KEYID = 5
6,056,986 UART: [ldev] AUTHORITY.KEYID = 7
6,058,219 UART: [ldev] FE.KEYID = 1
6,101,328 UART: [ldev] Erasing FE.KEYID = 1
8,603,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,895 UART: [ldev] --
10,414,106 UART: [fwproc] Wait for Commands...
10,416,544 UART: [fwproc] Recv command 0x46574c44
10,418,643 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,280,815 >>> mbox cmd response: success
14,284,596 UART: [afmc] ++
14,285,196 UART: [afmc] CDI.KEYID = 6
14,286,109 UART: [afmc] SUBJECT.KEYID = 7
14,287,274 UART: [afmc] AUTHORITY.KEYID = 5
16,830,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,534 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,292 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,293 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,371 UART: [afmc] --
18,631,511 UART: [cold-reset] --
18,635,868 UART: [state] Locking Datavault
18,641,225 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,872 UART: [state] Locking ICCM
18,645,348 UART: [exit] Launching FMC @ 0x40000130
18,653,802 UART:
18,654,046 UART: Running Caliptra FMC ...
18,655,154 UART:
18,655,314 UART: [state] CFI Enabled
18,712,487 UART: [fht] FMC Alias Private Key: 7
20,476,621 UART: [art] Extend RT PCRs Done
20,477,844 UART: [art] Lock RT PCRs Done
20,479,825 UART: [art] Populate DV Done
20,485,181 UART: [fht] FMC Alias Private Key: 7
20,486,772 UART: [art] Derive CDI
20,487,531 UART: [art] Store in in slot 0x4
20,545,757 UART: [art] Derive Key Pair
20,546,796 UART: [art] Store priv key in slot 0x5
23,009,249 UART: [art] Derive Key Pair - Done
23,022,135 UART: [art] Signing Cert with AUTHO
23,023,447 UART: RITY.KEYID = 7
24,735,392 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,901 UART: [art] PUB.X = D78C1BE84485E7CBF5021935FC14A783D50D05D44E9B7BBCE3415030CDD18465B116F1EE2B9C2682C92DA9B52C4A5BBA
24,744,153 UART: [art] PUB.Y = 609F897C1D41F4F84FA4B746F2DCDD2BD4D840F71DD4D092CA0CD1A345D0565D0402172C5A661EDCC7E8E2657EEE6C03
24,751,448 UART: [art] SIG.R = 4E968DB60E2404A6C3938AB5F1F173C0B7BADD8E7CFEEF62A6E25978ED964F2462D3B4D3DB724AD1890D6B6F0173BAFA
24,758,975 UART: [art] SIG.S = 9A8E67DFC0114E696CCBCE933D50CDF3758AF7E39E94439B98C505604AD80D1F8A044B1E5F7F0135577506BCFC5AD328
25,737,977 UART: Caliptra RT
25,738,687 UART: [state] CFI Enabled
25,904,249 UART: [rt] RT listening for mailbox commands...
25,906,163 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,936,799 UART: [rt]cmd =0x44504543, len=28
25,979,840 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,380,834 ready_for_fw is high
3,381,260 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,076,037 >>> mbox cmd response: success
18,365,652 UART:
18,366,050 UART: Running Caliptra FMC ...
18,367,244 UART:
18,367,416 UART: [state] CFI Enabled
18,432,541 UART: [fht] FMC Alias Private Key: 7
20,195,644 UART: [art] Extend RT PCRs Done
20,196,865 UART: [art] Lock RT PCRs Done
20,198,553 UART: [art] Populate DV Done
20,203,912 UART: [fht] FMC Alias Private Key: 7
20,205,397 UART: [art] Derive CDI
20,206,158 UART: [art] Store in in slot 0x4
20,265,842 UART: [art] Derive Key Pair
20,266,856 UART: [art] Store priv key in slot 0x5
22,732,032 UART: [art] Derive Key Pair - Done
22,744,986 UART: [art] Signing Cert with AUTHO
22,746,285 UART: RITY.KEYID = 7
24,457,812 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,316 UART: [art] PUB.X = 2B7C12114F3A08E4E04B2C87436FA6C8E151A78E84D19BD14BC0CC3A5A106DD0FA82D8B0FDBA544AE97419E8DC36F787
24,466,609 UART: [art] PUB.Y = CD1153B541CD5CEC944B6A77A42C0136039ED96CCF9C803123BD3DB2A267688EDAF3FDB3A823E0BE4AADAEE3A2ADF67B
24,473,900 UART: [art] SIG.R = BBB60CCB149B2BFBD47CABFD1AC920CB4A37A778AB03DE2B0939A8AF68DAA7C7681C3500B7B23BA0BF359127104F2EF4
24,481,339 UART: [art] SIG.S = 11984C4E0E390CEA6B8F1F4BEC4AE6D9DEA5BD9707417DAE374C6C7B3D2BAFBC4CFB71EB81C9B205FDBB586B02FBD095
25,460,094 UART: Caliptra RT
25,460,803 UART: [state] CFI Enabled
25,626,517 UART: [rt] RT listening for mailbox commands...
25,628,425 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,659,261 UART: [rt]cmd =0x44504543, len=28
25,701,586 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,723 writing to cptra_bootfsm_go
193,859 UART:
194,226 UART: Running Caliptra ROM ...
195,417 UART:
604,834 UART: [state] CFI Enabled
619,639 UART: [state] LifecycleState = Unprovisioned
621,446 UART: [state] DebugLocked = No
624,393 UART: [state] WD Timer not started. Device not locked for debugging
628,294 UART: [kat] SHA2-256
807,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,035 UART: [kat] ++
819,492 UART: [kat] sha1
831,168 UART: [kat] SHA2-256
834,249 UART: [kat] SHA2-384
839,882 UART: [kat] SHA2-512-ACC
842,898 UART: [kat] ECC-384
3,285,727 UART: [kat] HMAC-384Kdf
3,298,974 UART: [kat] LMS
3,828,459 UART: [kat] --
3,833,306 UART: [cold-reset] ++
3,834,597 UART: [fht] FHT @ 0x50003400
3,845,446 UART: [idev] ++
3,846,050 UART: [idev] CDI.KEYID = 6
3,846,972 UART: [idev] SUBJECT.KEYID = 7
3,848,144 UART: [idev] UDS.KEYID = 0
3,849,068 ready_for_fw is high
3,849,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,593 UART: [idev] Erasing UDS.KEYID = 0
6,317,178 UART: [idev] Sha1 KeyId Algorithm
6,340,238 UART: [idev] --
6,343,932 UART: [ldev] ++
6,344,509 UART: [ldev] CDI.KEYID = 6
6,345,423 UART: [ldev] SUBJECT.KEYID = 5
6,346,587 UART: [ldev] AUTHORITY.KEYID = 7
6,347,818 UART: [ldev] FE.KEYID = 1
6,360,187 UART: [ldev] Erasing FE.KEYID = 1
8,834,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,204 UART: [ldev] --
10,624,685 UART: [fwproc] Wait for Commands...
10,626,940 UART: [fwproc] Recv command 0x46574c44
10,629,050 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,492,836 >>> mbox cmd response: success
14,496,731 UART: [afmc] ++
14,497,328 UART: [afmc] CDI.KEYID = 6
14,498,241 UART: [afmc] SUBJECT.KEYID = 7
14,499,407 UART: [afmc] AUTHORITY.KEYID = 5
16,997,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,085 UART: [afmc] --
18,794,625 UART: [cold-reset] --
18,799,459 UART: [state] Locking Datavault
18,805,194 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,881 UART: [state] Locking ICCM
18,809,501 UART: [exit] Launching FMC @ 0x40000130
18,817,902 UART:
18,818,138 UART: Running Caliptra FMC ...
18,819,175 UART:
18,819,324 UART: [state] CFI Enabled
18,827,485 UART: [fht] FMC Alias Private Key: 7
20,584,246 UART: [art] Extend RT PCRs Done
20,585,477 UART: [art] Lock RT PCRs Done
20,587,294 UART: [art] Populate DV Done
20,592,656 UART: [fht] FMC Alias Private Key: 7
20,594,251 UART: [art] Derive CDI
20,594,992 UART: [art] Store in in slot 0x4
20,637,390 UART: [art] Derive Key Pair
20,638,391 UART: [art] Store priv key in slot 0x5
23,065,057 UART: [art] Derive Key Pair - Done
23,078,070 UART: [art] Signing Cert with AUTHO
23,079,381 UART: RITY.KEYID = 7
24,784,418 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,922 UART: [art] PUB.X = DA12929EC89762DE895591A510944128F929E2E24318CF8C8676737FECC5134BBAC3A2D2ECCB1F36C0EE703043F5B681
24,793,192 UART: [art] PUB.Y = FAF92BF173AB34969AF65DD4ED42DB3553BA7A1F97653A071E27402BF9824C247E130EC9654879B06FAC2AEC99BF1F2A
24,800,490 UART: [art] SIG.R = 3C9738F459F21206B48E0715A5280858146DA202C07FB265A937DFB764A4EE5B2C836BC9FF349FC9167D93D53A29D270
24,807,869 UART: [art] SIG.S = 17D9A3DC7825EC869936411D0C896E4C4BC7D0F63AE469ABCC93DB2B612272B172BC67CCC7F6D073C3ADF5FE4C486538
25,787,006 UART: Caliptra RT
25,787,718 UART: [state] CFI Enabled
25,905,874 UART: [rt] RT listening for mailbox commands...
25,907,786 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,938,221 UART: [rt]cmd =0x44504543, len=28
25,981,034 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
3,698,392 ready_for_fw is high
3,698,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,284,221 >>> mbox cmd response: success
18,533,623 UART:
18,534,419 UART: Running Caliptra FMC ...
18,535,557 UART:
18,535,721 UART: [state] CFI Enabled
18,543,050 UART: [fht] FMC Alias Private Key: 7
20,300,487 UART: [art] Extend RT PCRs Done
20,302,096 UART: [art] Lock RT PCRs Done
20,303,117 UART: [art] Populate DV Done
20,308,774 UART: [fht] FMC Alias Private Key: 7
20,310,317 UART: [art] Derive CDI
20,311,051 UART: [art] Store in in slot 0x4
20,353,974 UART: [art] Derive Key Pair
20,354,980 UART: [art] Store priv key in slot 0x5
22,782,203 UART: [art] Derive Key Pair - Done
22,794,887 UART: [art] Signing Cert with AUTHO
22,796,195 UART: RITY.KEYID = 7
24,501,633 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,145 UART: [art] PUB.X = F08E65625EAC5C04BFBE6711674F04E419D5356B6F36D42A826987BE8FAF91C63B206247164B4D32A504543F90C6E00D
24,510,419 UART: [art] PUB.Y = 15E410CFBE3C69BC1EBC80E0C38BB3A3878A68F445307AF0AD2D6E6842253C47F9DE0321F89BD1CC66E9DC5BB9DA118A
24,517,650 UART: [art] SIG.R = 8FA768509C35060028E9ADC1BC64824C5CC353CF498F69BE476BF53C0218B869B5E3FE502BEF4AF52487DD458DC3EB4F
24,525,096 UART: [art] SIG.S = 7F9914FCF8F03EA92C35C8D4F65E3E04514664FED8FE26855BF17FC32B4FEE33AF3B02A51BE02C25FEBA1437B873CCAC
25,503,998 UART: Caliptra RT
25,504,714 UART: [state] CFI Enabled
25,621,114 UART: [rt] RT listening for mailbox commands...
25,623,034 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,654,033 UART: [rt]cmd =0x44504543, len=28
25,696,799 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
192,220 UART:
192,584 UART: Running Caliptra ROM ...
193,783 UART:
193,935 UART: [state] CFI Enabled
262,512 UART: [state] LifecycleState = Unprovisioned
264,945 UART: [state] DebugLocked = No
266,556 UART: [state] WD Timer not started. Device not locked for debugging
271,317 UART: [kat] SHA2-256
461,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,986 UART: [kat] ++
472,466 UART: [kat] sha1
484,013 UART: [kat] SHA2-256
486,994 UART: [kat] SHA2-384
492,636 UART: [kat] SHA2-512-ACC
495,218 UART: [kat] ECC-384
2,948,717 UART: [kat] HMAC-384Kdf
2,970,573 UART: [kat] LMS
3,502,306 UART: [kat] --
3,507,442 UART: [cold-reset] ++
3,509,659 UART: [fht] FHT @ 0x50003400
3,521,583 UART: [idev] ++
3,522,266 UART: [idev] CDI.KEYID = 6
3,523,184 UART: [idev] SUBJECT.KEYID = 7
3,524,433 UART: [idev] UDS.KEYID = 0
3,525,357 ready_for_fw is high
3,525,549 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,987 UART: [idev] Erasing UDS.KEYID = 0
6,048,161 UART: [idev] Sha1 KeyId Algorithm
6,070,492 UART: [idev] --
6,076,592 UART: [ldev] ++
6,077,316 UART: [ldev] CDI.KEYID = 6
6,078,237 UART: [ldev] SUBJECT.KEYID = 5
6,079,401 UART: [ldev] AUTHORITY.KEYID = 7
6,080,581 UART: [ldev] FE.KEYID = 1
6,119,206 UART: [ldev] Erasing FE.KEYID = 1
8,625,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,359,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,389,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,425,340 UART: [ldev] --
10,430,550 UART: [fwproc] Wait for Commands...
10,433,074 UART: [fwproc] Recv command 0x46574c44
10,435,387 UART: [fwproc] Recv'd Img size: 114168 bytes
13,878,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,613,172 >>> mbox cmd response: success
14,616,363 UART: [afmc] ++
14,617,083 UART: [afmc] CDI.KEYID = 6
14,618,277 UART: [afmc] SUBJECT.KEYID = 7
14,619,777 UART: [afmc] AUTHORITY.KEYID = 5
17,147,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,891,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,893,312 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,908,469 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,923,622 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,938,663 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,961,763 UART: [afmc] --
18,965,212 UART: [cold-reset] --
18,969,755 UART: [state] Locking Datavault
18,974,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,541 UART: [state] Locking ICCM
18,979,167 UART: [exit] Launching FMC @ 0x40000130
18,987,801 UART:
18,988,034 UART: Running Caliptra FMC ...
18,989,067 UART:
18,989,215 UART: [state] CFI Enabled
19,047,903 UART: [fht] FMC Alias Private Key: 7
20,811,934 UART: [art] Extend RT PCRs Done
20,813,157 UART: [art] Lock RT PCRs Done
20,814,516 UART: [art] Populate DV Done
20,819,933 UART: [fht] FMC Alias Private Key: 7
20,821,573 UART: [art] Derive CDI
20,822,389 UART: [art] Store in in slot 0x4
20,880,404 UART: [art] Derive Key Pair
20,881,464 UART: [art] Store priv key in slot 0x5
23,344,141 UART: [art] Derive Key Pair - Done
23,357,237 UART: [art] Signing Cert with AUTHO
23,358,567 UART: RITY.KEYID = 7
25,070,020 UART: [art] Erasing AUTHORITY.KEYID = 7
25,071,533 UART: [art] PUB.X = A1E20691E4DEC411D46CBD06DE952FEFA4CE961B69D3214B003723FFC2CE06527DE7D5ACB0E3CC042FB2E222AA9B425E
25,078,800 UART: [art] PUB.Y = BEC535460C6DEB6E3BDCFE085729D947E3F1E1954224223DE9811E7B282F80B3C1329D40C8B105ED4F3833A35D9DCE7B
25,086,058 UART: [art] SIG.R = C4E7411E7C2676BB7A3019A293370055C250508FB48586F72E2C6E218A75B58B2172A2A90769EFDD8AA4FEDE70350A0A
25,093,421 UART: [art] SIG.S = F567BAB60D558266B651E4D64099C2B851AA26D32D2445BBA90BFBB3698A3C5457A3A695615B6CA0E267163B0183402A
26,072,128 UART: Caliptra RT
26,072,997 UART: [state] CFI Enabled
26,236,183 UART: [rt] RT listening for mailbox commands...
26,238,096 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,268,673 UART: [rt]cmd =0x44504543, len=28
26,311,085 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,413,629 ready_for_fw is high
3,414,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,706,419 >>> mbox cmd response: success
19,006,085 UART:
19,006,509 UART: Running Caliptra FMC ...
19,007,907 UART:
19,008,090 UART: [state] CFI Enabled
19,072,900 UART: [fht] FMC Alias Private Key: 7
20,836,899 UART: [art] Extend RT PCRs Done
20,838,132 UART: [art] Lock RT PCRs Done
20,839,821 UART: [art] Populate DV Done
20,845,131 UART: [fht] FMC Alias Private Key: 7
20,846,780 UART: [art] Derive CDI
20,847,801 UART: [art] Store in in slot 0x4
20,905,884 UART: [art] Derive Key Pair
20,906,887 UART: [art] Store priv key in slot 0x5
23,370,240 UART: [art] Derive Key Pair - Done
23,383,189 UART: [art] Signing Cert with AUTHO
23,384,491 UART: RITY.KEYID = 7
25,096,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,898 UART: [art] PUB.X = DA17AB59849AADF6039F4E94676693029025E4989D1B4B3F89E6A9F35B4B88852F633560C8ED1B1BAB37605A369EC956
25,105,144 UART: [art] PUB.Y = 29F60B60764AA70670928B86CBD7C834B05939CC746FAB0A7FC41E86311EBC67BE1BA3B4F651C1AF01113F10B0072F06
25,112,426 UART: [art] SIG.R = 9C037DDE70158A3CDDD3EF6CED0219E676398E1DCBAF7AB37505401EE2367337D4ABE490BFA765FE97AEF17397D866A9
25,119,804 UART: [art] SIG.S = 7EECE4E0D29CAB178CEDAD7116F8BE6EADE8400F06FCBAD8AC81B4B58648C0A48809B7E35BB67519FB7984B39F1CA44B
26,099,228 UART: Caliptra RT
26,099,941 UART: [state] CFI Enabled
26,265,445 UART: [rt] RT listening for mailbox commands...
26,267,370 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,298,098 UART: [rt]cmd =0x44504543, len=28
26,340,595 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
192,880 UART:
193,252 UART: Running Caliptra ROM ...
194,555 UART:
603,907 UART: [state] CFI Enabled
616,987 UART: [state] LifecycleState = Unprovisioned
619,349 UART: [state] DebugLocked = No
621,243 UART: [state] WD Timer not started. Device not locked for debugging
624,996 UART: [kat] SHA2-256
814,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,612 UART: [kat] ++
826,131 UART: [kat] sha1
837,802 UART: [kat] SHA2-256
840,820 UART: [kat] SHA2-384
847,947 UART: [kat] SHA2-512-ACC
850,525 UART: [kat] ECC-384
3,294,445 UART: [kat] HMAC-384Kdf
3,306,326 UART: [kat] LMS
3,838,149 UART: [kat] --
3,841,316 UART: [cold-reset] ++
3,842,826 UART: [fht] FHT @ 0x50003400
3,854,531 UART: [idev] ++
3,855,279 UART: [idev] CDI.KEYID = 6
3,856,194 UART: [idev] SUBJECT.KEYID = 7
3,857,442 UART: [idev] UDS.KEYID = 0
3,858,635 ready_for_fw is high
3,858,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,088 UART: [idev] Erasing UDS.KEYID = 0
6,336,362 UART: [idev] Sha1 KeyId Algorithm
6,358,463 UART: [idev] --
6,362,513 UART: [ldev] ++
6,363,193 UART: [ldev] CDI.KEYID = 6
6,364,101 UART: [ldev] SUBJECT.KEYID = 5
6,365,312 UART: [ldev] AUTHORITY.KEYID = 7
6,366,486 UART: [ldev] FE.KEYID = 1
6,376,752 UART: [ldev] Erasing FE.KEYID = 1
8,853,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,589 UART: [ldev] --
10,642,311 UART: [fwproc] Wait for Commands...
10,644,886 UART: [fwproc] Recv command 0x46574c44
10,647,167 UART: [fwproc] Recv'd Img size: 114168 bytes
14,091,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,064 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,606 >>> mbox cmd response: success
14,835,240 UART: [afmc] ++
14,835,946 UART: [afmc] CDI.KEYID = 6
14,837,137 UART: [afmc] SUBJECT.KEYID = 7
14,838,580 UART: [afmc] AUTHORITY.KEYID = 5
17,342,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,043 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,325 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,336 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,828 UART: [afmc] --
19,137,670 UART: [cold-reset] --
19,141,659 UART: [state] Locking Datavault
19,148,105 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,259 UART: [state] Locking ICCM
19,152,638 UART: [exit] Launching FMC @ 0x40000130
19,161,325 UART:
19,161,567 UART: Running Caliptra FMC ...
19,162,670 UART:
19,162,829 UART: [state] CFI Enabled
19,171,037 UART: [fht] FMC Alias Private Key: 7
20,927,690 UART: [art] Extend RT PCRs Done
20,928,912 UART: [art] Lock RT PCRs Done
20,930,833 UART: [art] Populate DV Done
20,936,301 UART: [fht] FMC Alias Private Key: 7
20,937,890 UART: [art] Derive CDI
20,938,704 UART: [art] Store in in slot 0x4
20,981,571 UART: [art] Derive Key Pair
20,982,602 UART: [art] Store priv key in slot 0x5
23,409,323 UART: [art] Derive Key Pair - Done
23,422,371 UART: [art] Signing Cert with AUTHO
23,423,678 UART: RITY.KEYID = 7
25,129,322 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,827 UART: [art] PUB.X = 5035BAEABF3D812DBD1EFCF5A17F14F117A6425EC93242E5320FCEDF6742D52DD276E4AA2819AF3B46CEAB8415EFDC03
25,138,139 UART: [art] PUB.Y = 3C0CDECD64815479B8FBEBD65189311F39E7E106D2BF21A37748C3229A41F049EAD390A591F74A4ADC9A7D05540951CC
25,145,372 UART: [art] SIG.R = 829EE1943DAC9FE6DA930A950996B6A5D149B8DF4A69D44AB5C3F076EE29715B89FC3A06CC81D0F74D1692380610EE6D
25,152,767 UART: [art] SIG.S = 001FEFED5D420C35885CAD1AB611AAD364F1E234DDA4F43D0EF2A35118B9EA709F55578B231BF502D5634BC65E2C7E3A
26,131,249 UART: Caliptra RT
26,131,935 UART: [state] CFI Enabled
26,249,330 UART: [rt] RT listening for mailbox commands...
26,251,231 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,281,779 UART: [rt]cmd =0x44504543, len=28
26,324,610 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,653 writing to cptra_bootfsm_go
3,746,783 ready_for_fw is high
3,747,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,959,157 >>> mbox cmd response: success
19,211,973 UART:
19,212,362 UART: Running Caliptra FMC ...
19,213,557 UART:
19,213,729 UART: [state] CFI Enabled
19,221,463 UART: [fht] FMC Alias Private Key: 7
20,978,026 UART: [art] Extend RT PCRs Done
20,979,244 UART: [art] Lock RT PCRs Done
20,980,873 UART: [art] Populate DV Done
20,986,447 UART: [fht] FMC Alias Private Key: 7
20,988,041 UART: [art] Derive CDI
20,988,857 UART: [art] Store in in slot 0x4
21,031,719 UART: [art] Derive Key Pair
21,032,724 UART: [art] Store priv key in slot 0x5
23,460,126 UART: [art] Derive Key Pair - Done
23,473,125 UART: [art] Signing Cert with AUTHO
23,474,445 UART: RITY.KEYID = 7
25,180,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,542 UART: [art] PUB.X = D4EAB3DD43CFD8E9240357FE1BDC5A4BA771411A9AAA1CB0E6B1DAB7C3072FAED8778EAFB7B83FF06F79920D601D7E9E
25,188,839 UART: [art] PUB.Y = F1B3AEE7CD0E1D808A94771020A0F387C845DEC52B431A1A8A03E546D2CA2B0E22342027724618FE0E03E48DFA74EF3C
25,196,121 UART: [art] SIG.R = 4CBB24C6105285EFD80276744AAFE2C9D2EDC3A0D39D0E7EBBF7BE5C9AD90FF4779982C1399EF823E7F5DDBA523277D7
25,203,553 UART: [art] SIG.S = C29497A04EEC66CEE6312E28796D0137F7EF8811CEFF225F4D4D13EB6D55651B6C69A43425E5DFB611746A71060E67E3
26,181,664 UART: Caliptra RT
26,182,366 UART: [state] CFI Enabled
26,299,805 UART: [rt] RT listening for mailbox commands...
26,301,722 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,332,220 UART: [rt]cmd =0x44504543, len=28
26,375,246 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,779 UART: [kat] SHA2-256
881,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,825 UART: [kat] ++
885,977 UART: [kat] sha1
890,003 UART: [kat] SHA2-256
891,941 UART: [kat] SHA2-384
894,704 UART: [kat] SHA2-512-ACC
896,605 UART: [kat] ECC-384
902,046 UART: [kat] HMAC-384Kdf
906,460 UART: [kat] LMS
1,474,656 UART: [kat] --
1,475,287 UART: [cold-reset] ++
1,475,691 UART: [fht] Storing FHT @ 0x50003400
1,478,620 UART: [idev] ++
1,478,788 UART: [idev] CDI.KEYID = 6
1,479,148 UART: [idev] SUBJECT.KEYID = 7
1,479,572 UART: [idev] UDS.KEYID = 0
1,479,917 ready_for_fw is high
1,479,917 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,828 UART: [idev] Erasing UDS.KEYID = 0
1,504,858 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,354 UART: [idev] --
1,514,413 UART: [ldev] ++
1,514,581 UART: [ldev] CDI.KEYID = 6
1,514,944 UART: [ldev] SUBJECT.KEYID = 5
1,515,370 UART: [ldev] AUTHORITY.KEYID = 7
1,515,833 UART: [ldev] FE.KEYID = 1
1,520,987 UART: [ldev] Erasing FE.KEYID = 1
1,546,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,554 UART: [ldev] --
1,585,947 UART: [fwproc] Waiting for Commands...
1,586,764 UART: [fwproc] Received command 0x46574c44
1,587,555 UART: [fwproc] Received Image of size 114168 bytes
2,883,893 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,926 >>> mbox cmd response: success
3,075,974 UART: [afmc] ++
3,076,142 UART: [afmc] CDI.KEYID = 6
3,076,504 UART: [afmc] SUBJECT.KEYID = 7
3,076,929 UART: [afmc] AUTHORITY.KEYID = 5
3,111,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,284 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,064 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,792 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,677 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,367 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,306 UART: [afmc] --
3,155,308 UART: [cold-reset] --
3,156,152 UART: [state] Locking Datavault
3,157,219 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,823 UART: [state] Locking ICCM
3,158,409 UART: [exit] Launching FMC @ 0x40000130
3,163,738 UART:
3,163,754 UART: Running Caliptra FMC ...
3,164,162 UART:
3,164,216 UART: [state] CFI Enabled
3,174,815 UART: [fht] FMC Alias Private Key: 7
3,282,530 UART: [art] Extend RT PCRs Done
3,282,958 UART: [art] Lock RT PCRs Done
3,284,236 UART: [art] Populate DV Done
3,292,531 UART: [fht] FMC Alias Private Key: 7
3,293,503 UART: [art] Derive CDI
3,293,783 UART: [art] Store in in slot 0x4
3,379,554 UART: [art] Derive Key Pair
3,379,914 UART: [art] Store priv key in slot 0x5
3,393,588 UART: [art] Derive Key Pair - Done
3,408,321 UART: [art] Signing Cert with AUTHO
3,408,801 UART: RITY.KEYID = 7
3,424,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,986 UART: [art] PUB.X = A7C69E586D781C94C9249ABCDFF189C0AD45EC98446B2A63DCEC01AACABEDE34367970673B24C4198840AF983DBBA9E5
3,431,771 UART: [art] PUB.Y = 8449C86901C2E5FB01EE822FB34FDFE059BE33136919A1CD79885E6B78F2C7E1158F66E75AD8E453867A4D7E62D8AC3C
3,438,723 UART: [art] SIG.R = 88A0679B84771A34AFAD0ADECB09E1DF59B9E269884DFE5A1AA419164F746DF84F19C5CA4299F32B8D9A6EB9BD4EC1F4
3,445,507 UART: [art] SIG.S = 41918683E047CB6DC4BA71EC33BE1AB48F96064EF61E97EBC4264F420282EFBBB37205F47D21DE94A310FC657B626886
3,469,297 UART: Caliptra RT
3,469,550 UART: [state] CFI Enabled
3,577,251 UART: [rt] RT listening for mailbox commands...
3,577,921 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,489 UART: [rt]cmd =0x44504543, len=28
3,650,665 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,381 ready_for_fw is high
1,362,381 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,514 >>> mbox cmd response: success
2,985,634 UART:
2,985,650 UART: Running Caliptra FMC ...
2,986,058 UART:
2,986,112 UART: [state] CFI Enabled
2,996,603 UART: [fht] FMC Alias Private Key: 7
3,104,544 UART: [art] Extend RT PCRs Done
3,104,972 UART: [art] Lock RT PCRs Done
3,106,650 UART: [art] Populate DV Done
3,114,771 UART: [fht] FMC Alias Private Key: 7
3,115,875 UART: [art] Derive CDI
3,116,155 UART: [art] Store in in slot 0x4
3,202,018 UART: [art] Derive Key Pair
3,202,378 UART: [art] Store priv key in slot 0x5
3,216,386 UART: [art] Derive Key Pair - Done
3,230,990 UART: [art] Signing Cert with AUTHO
3,231,470 UART: RITY.KEYID = 7
3,247,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,769 UART: [art] PUB.X = 59B65C06E5A1E1B2D7E7FA2DF68B9EA42AE7E29F97709E256EA67D77A149820E382B03C043BB22E25B97FC7FBB824C24
3,254,542 UART: [art] PUB.Y = FDFDC1102F28084AAF184358B4FF17BD90F4F364AD876072604FEE7E3293AA32604646A49BA2D55FC4666BD37D91D9EA
3,261,499 UART: [art] SIG.R = 3EA3111E6B64824A69D1BEBC6D805163ADE76CF777AFC215D4736329E65A8FEB9D9C064FD43CEEE0126982779990FC01
3,268,271 UART: [art] SIG.S = E5296FABA17E420BD17F6B49DBF521C61273080BAD634CAB17EE8A1AD3574C297516FE666D4FE8A5656F17E892D90F89
3,291,798 UART: Caliptra RT
3,292,051 UART: [state] CFI Enabled
3,400,406 UART: [rt] RT listening for mailbox commands...
3,401,076 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,328 UART: [rt]cmd =0x44504543, len=28
3,474,248 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,586 UART: [kat] SHA2-256
882,517 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,632 UART: [kat] ++
886,784 UART: [kat] sha1
890,888 UART: [kat] SHA2-256
892,826 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,743 UART: [kat] LMS
1,475,939 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,478 UART: [fht] Storing FHT @ 0x50003400
1,480,343 UART: [idev] ++
1,480,511 UART: [idev] CDI.KEYID = 6
1,480,871 UART: [idev] SUBJECT.KEYID = 7
1,481,295 UART: [idev] UDS.KEYID = 0
1,481,640 ready_for_fw is high
1,481,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,187 UART: [idev] Erasing UDS.KEYID = 0
1,506,001 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,607 UART: [idev] --
1,515,732 UART: [ldev] ++
1,515,900 UART: [ldev] CDI.KEYID = 6
1,516,263 UART: [ldev] SUBJECT.KEYID = 5
1,516,689 UART: [ldev] AUTHORITY.KEYID = 7
1,517,152 UART: [ldev] FE.KEYID = 1
1,522,542 UART: [ldev] Erasing FE.KEYID = 1
1,548,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,217 UART: [ldev] --
1,587,540 UART: [fwproc] Waiting for Commands...
1,588,289 UART: [fwproc] Received command 0x46574c44
1,589,080 UART: [fwproc] Received Image of size 114168 bytes
2,886,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,032 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,384 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,005 >>> mbox cmd response: success
3,079,211 UART: [afmc] ++
3,079,379 UART: [afmc] CDI.KEYID = 6
3,079,741 UART: [afmc] SUBJECT.KEYID = 7
3,080,166 UART: [afmc] AUTHORITY.KEYID = 5
3,116,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,256 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,946 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,941 UART: [afmc] --
3,159,949 UART: [cold-reset] --
3,160,769 UART: [state] Locking Datavault
3,162,070 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,674 UART: [state] Locking ICCM
3,163,338 UART: [exit] Launching FMC @ 0x40000130
3,168,667 UART:
3,168,683 UART: Running Caliptra FMC ...
3,169,091 UART:
3,169,234 UART: [state] CFI Enabled
3,179,951 UART: [fht] FMC Alias Private Key: 7
3,288,216 UART: [art] Extend RT PCRs Done
3,288,644 UART: [art] Lock RT PCRs Done
3,289,978 UART: [art] Populate DV Done
3,298,101 UART: [fht] FMC Alias Private Key: 7
3,299,207 UART: [art] Derive CDI
3,299,487 UART: [art] Store in in slot 0x4
3,385,134 UART: [art] Derive Key Pair
3,385,494 UART: [art] Store priv key in slot 0x5
3,398,738 UART: [art] Derive Key Pair - Done
3,413,382 UART: [art] Signing Cert with AUTHO
3,413,862 UART: RITY.KEYID = 7
3,428,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,761 UART: [art] PUB.X = 7EA49169AC59864F3D3CE67A4FEFAABCD9B532396898EEC981D9D2EDC8B1C3E9ED4A23A9983ADD268C37E84BF7BDA6C8
3,436,557 UART: [art] PUB.Y = CFA70CA16DA8BC8EE1FA7B180843B5E05A3D068D3517AF5ED96B57DBA41365104CD1A62BA04A51DC7B4279331F33410C
3,443,509 UART: [art] SIG.R = BFCF4880B8FFF5294450FD252A494731B9A773DB63C74396FBD53632813E4C9A758A049FAFEE1E886759E832B7C221C2
3,450,280 UART: [art] SIG.S = 5B4E7EFC8E053552E1E2086C825EC91950DF8087E5BD219CEC18AEDABBC02663122F679D68812DDF87B53D953D3601FD
3,474,244 UART: Caliptra RT
3,474,589 UART: [state] CFI Enabled
3,582,910 UART: [rt] RT listening for mailbox commands...
3,583,580 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,480 UART: [rt]cmd =0x44504543, len=28
3,656,746 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,968 ready_for_fw is high
1,362,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,859 >>> mbox cmd response: success
2,987,485 UART:
2,987,501 UART: Running Caliptra FMC ...
2,987,909 UART:
2,988,052 UART: [state] CFI Enabled
2,998,449 UART: [fht] FMC Alias Private Key: 7
3,107,034 UART: [art] Extend RT PCRs Done
3,107,462 UART: [art] Lock RT PCRs Done
3,108,900 UART: [art] Populate DV Done
3,116,863 UART: [fht] FMC Alias Private Key: 7
3,117,985 UART: [art] Derive CDI
3,118,265 UART: [art] Store in in slot 0x4
3,203,792 UART: [art] Derive Key Pair
3,204,152 UART: [art] Store priv key in slot 0x5
3,217,318 UART: [art] Derive Key Pair - Done
3,232,516 UART: [art] Signing Cert with AUTHO
3,232,996 UART: RITY.KEYID = 7
3,247,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,559 UART: [art] PUB.X = 6227277889E7E4C559039221540FF721B9CE811C32A0CF0FE519C1502366F8738BFDE758AD82F2D0AED82D748664F4C0
3,255,318 UART: [art] PUB.Y = 1F374161D41BFB818861FB22CF0FF4197C576925038775428BDB89B3F6EDE0D80A0025C4A76F0C4A539ECA78EC89046F
3,262,235 UART: [art] SIG.R = 4AD22229CFC016950D13BDCAF73924BBED8B74F319777C7DA31684AFC0A52ADE45D9F9E75F4C9CAA2E8AECAEC817ECCD
3,269,032 UART: [art] SIG.S = D1C4FAC57CA28B3A3FDF15DFF854DEB0B085E7208EFAFC99794DA2760464A42BB0EEC5E4A8C5BCE7F898A1E85C0F0317
3,293,332 UART: Caliptra RT
3,293,677 UART: [state] CFI Enabled
3,402,314 UART: [rt] RT listening for mailbox commands...
3,402,984 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,892 UART: [rt]cmd =0x44504543, len=28
3,475,812 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,137 UART: [kat] SHA2-256
904,077 UART: [kat] SHA2-384
906,876 UART: [kat] SHA2-512-ACC
908,777 UART: [kat] ECC-384
918,304 UART: [kat] HMAC-384Kdf
922,848 UART: [kat] LMS
1,171,176 UART: [kat] --
1,171,969 UART: [cold-reset] ++
1,172,489 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 ready_for_fw is high
1,176,575 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,988 UART: [idev] Erasing UDS.KEYID = 0
1,201,093 UART: [idev] Sha1 KeyId Algorithm
1,209,577 UART: [idev] --
1,210,667 UART: [ldev] ++
1,210,835 UART: [ldev] CDI.KEYID = 6
1,211,198 UART: [ldev] SUBJECT.KEYID = 5
1,211,624 UART: [ldev] AUTHORITY.KEYID = 7
1,212,087 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,243,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,521 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,556 UART: [fwproc] Recv command 0x46574c44
1,284,284 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,428 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,335 >>> mbox cmd response: success
2,774,347 UART: [afmc] ++
2,774,515 UART: [afmc] CDI.KEYID = 6
2,774,877 UART: [afmc] SUBJECT.KEYID = 7
2,775,302 UART: [afmc] AUTHORITY.KEYID = 5
2,810,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,480 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,084 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,892 UART: [afmc] --
2,853,962 UART: [cold-reset] --
2,854,774 UART: [state] Locking Datavault
2,855,863 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,467 UART: [state] Locking ICCM
2,857,021 UART: [exit] Launching FMC @ 0x40000130
2,862,350 UART:
2,862,366 UART: Running Caliptra FMC ...
2,862,774 UART:
2,862,828 UART: [state] CFI Enabled
2,873,187 UART: [fht] FMC Alias Private Key: 7
2,981,070 UART: [art] Extend RT PCRs Done
2,981,498 UART: [art] Lock RT PCRs Done
2,982,772 UART: [art] Populate DV Done
2,990,963 UART: [fht] FMC Alias Private Key: 7
2,992,049 UART: [art] Derive CDI
2,992,329 UART: [art] Store in in slot 0x4
3,077,996 UART: [art] Derive Key Pair
3,078,356 UART: [art] Store priv key in slot 0x5
3,091,874 UART: [art] Derive Key Pair - Done
3,106,775 UART: [art] Signing Cert with AUTHO
3,107,255 UART: RITY.KEYID = 7
3,123,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,768 UART: [art] PUB.X = 84A12577CC270153F6E94E1AD97092390977ECC80B2F22D5521362464F9F95088FE7AC37B846CF8602EB274C703EFF0E
3,130,518 UART: [art] PUB.Y = F75BE87D7FD28DAADAF29D451EE7E5E5F592711461BEF5E5C4A951984F68E4F72150A440643580D278ED07E293028E23
3,137,466 UART: [art] SIG.R = 998228D2D9A99D015E23C3314B1E3695E16FE5E0ED646D1FDCB3DD2ABDEEA810A60B38741B6266719A27724E8CFDFBF0
3,144,244 UART: [art] SIG.S = 9FDA95DAA3F4590D789F93C8D73664D3C3D73CA0CEEFFBBCA81E3A6C1E7D2D74DC9CB8D4E27E6865D18927EB1DA71235
3,168,276 UART: Caliptra RT
3,168,529 UART: [state] CFI Enabled
3,276,831 UART: [rt] RT listening for mailbox commands...
3,277,501 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,291 UART: [rt]cmd =0x44504543, len=28
3,350,449 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,323 ready_for_fw is high
1,060,323 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,496 >>> mbox cmd response: success
2,687,322 UART:
2,687,338 UART: Running Caliptra FMC ...
2,687,746 UART:
2,687,800 UART: [state] CFI Enabled
2,698,331 UART: [fht] FMC Alias Private Key: 7
2,806,744 UART: [art] Extend RT PCRs Done
2,807,172 UART: [art] Lock RT PCRs Done
2,808,782 UART: [art] Populate DV Done
2,817,117 UART: [fht] FMC Alias Private Key: 7
2,818,229 UART: [art] Derive CDI
2,818,509 UART: [art] Store in in slot 0x4
2,904,362 UART: [art] Derive Key Pair
2,904,722 UART: [art] Store priv key in slot 0x5
2,917,948 UART: [art] Derive Key Pair - Done
2,932,902 UART: [art] Signing Cert with AUTHO
2,933,382 UART: RITY.KEYID = 7
2,948,560 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,325 UART: [art] PUB.X = 14220A90B8A361E65824FFE4DA7BD1E3CBC9880CC7994082F675EB0195F1E0F5DCD25F91613535E23824953F9ABFBC95
2,956,092 UART: [art] PUB.Y = A3A7489ACE9C98131483C9C272EACED9E560F88B9C536B3FB37CB255164857D9EBF5661BDA5E6DAAEBF4A582BCF8B2CD
2,963,066 UART: [art] SIG.R = A3D434DBF620C801D2C3F8185ECA91AC4230A1CC54B359DE5545E4B56F30ABC39A1120860169AA37105192CE1A6B7940
2,969,834 UART: [art] SIG.S = E2A1106F9760744A1D37233E90AB39B68CD2186622B5B96ED8E1321F5F8B0F8A5EE6E8E52C1EE1648D44841CFB59B566
2,993,986 UART: Caliptra RT
2,994,239 UART: [state] CFI Enabled
3,101,219 UART: [rt] RT listening for mailbox commands...
3,101,889 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,739 UART: [rt]cmd =0x44504543, len=28
3,175,365 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [kat] SHA2-256
893,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,016 UART: [kat] ++
898,168 UART: [kat] sha1
902,338 UART: [kat] SHA2-256
904,278 UART: [kat] SHA2-384
907,061 UART: [kat] SHA2-512-ACC
908,962 UART: [kat] ECC-384
918,731 UART: [kat] HMAC-384Kdf
923,287 UART: [kat] LMS
1,171,615 UART: [kat] --
1,172,386 UART: [cold-reset] ++
1,172,730 UART: [fht] FHT @ 0x50003400
1,175,379 UART: [idev] ++
1,175,547 UART: [idev] CDI.KEYID = 6
1,175,907 UART: [idev] SUBJECT.KEYID = 7
1,176,331 UART: [idev] UDS.KEYID = 0
1,176,676 ready_for_fw is high
1,176,676 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,432 UART: [idev] Sha1 KeyId Algorithm
1,209,922 UART: [idev] --
1,211,138 UART: [ldev] ++
1,211,306 UART: [ldev] CDI.KEYID = 6
1,211,669 UART: [ldev] SUBJECT.KEYID = 5
1,212,095 UART: [ldev] AUTHORITY.KEYID = 7
1,212,558 UART: [ldev] FE.KEYID = 1
1,217,712 UART: [ldev] Erasing FE.KEYID = 1
1,244,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,116 UART: [ldev] --
1,283,561 UART: [fwproc] Wait for Commands...
1,284,313 UART: [fwproc] Recv command 0x46574c44
1,285,041 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,854 >>> mbox cmd response: success
2,776,102 UART: [afmc] ++
2,776,270 UART: [afmc] CDI.KEYID = 6
2,776,632 UART: [afmc] SUBJECT.KEYID = 7
2,777,057 UART: [afmc] AUTHORITY.KEYID = 5
2,812,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,813 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,698 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,417 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,145 UART: [afmc] --
2,856,047 UART: [cold-reset] --
2,856,953 UART: [state] Locking Datavault
2,858,276 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,880 UART: [state] Locking ICCM
2,859,386 UART: [exit] Launching FMC @ 0x40000130
2,864,715 UART:
2,864,731 UART: Running Caliptra FMC ...
2,865,139 UART:
2,865,282 UART: [state] CFI Enabled
2,875,859 UART: [fht] FMC Alias Private Key: 7
2,984,196 UART: [art] Extend RT PCRs Done
2,984,624 UART: [art] Lock RT PCRs Done
2,985,964 UART: [art] Populate DV Done
2,994,209 UART: [fht] FMC Alias Private Key: 7
2,995,207 UART: [art] Derive CDI
2,995,487 UART: [art] Store in in slot 0x4
3,081,222 UART: [art] Derive Key Pair
3,081,582 UART: [art] Store priv key in slot 0x5
3,094,596 UART: [art] Derive Key Pair - Done
3,109,378 UART: [art] Signing Cert with AUTHO
3,109,858 UART: RITY.KEYID = 7
3,124,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,539 UART: [art] PUB.X = A57760B3B9E391F7D3B51B63AA9521097949CD3F9566502BFFD31D51896ED92B85FE04F07B4C78E6BEF0655DDFDA54B2
3,132,313 UART: [art] PUB.Y = DB0B85CC935EBF6A37B70C76F11926D172BF8F8553D6E8402C65D6D5370FBA68C4124CDEC534D51EEEA99D0DEF0306C1
3,139,261 UART: [art] SIG.R = 493E51010186BB065A29D1648258406B0FC0DFDA3DA9049DFB5112D86A588F2F8F830879A4214B9B8040DDE6477BC0C8
3,146,013 UART: [art] SIG.S = 797AAA1CB31E90FE61257C1E47A04FF74D07FAB99E5148828A35A42CCC4682B46491ECA4F8B0D00A98B8EE7AC7A11AA7
3,169,598 UART: Caliptra RT
3,169,943 UART: [state] CFI Enabled
3,278,138 UART: [rt] RT listening for mailbox commands...
3,278,808 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,478 UART: [rt]cmd =0x44504543, len=28
3,351,760 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,352 ready_for_fw is high
1,061,352 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,269 >>> mbox cmd response: success
2,688,705 UART:
2,688,721 UART: Running Caliptra FMC ...
2,689,129 UART:
2,689,272 UART: [state] CFI Enabled
2,700,189 UART: [fht] FMC Alias Private Key: 7
2,808,176 UART: [art] Extend RT PCRs Done
2,808,604 UART: [art] Lock RT PCRs Done
2,810,176 UART: [art] Populate DV Done
2,818,379 UART: [fht] FMC Alias Private Key: 7
2,819,311 UART: [art] Derive CDI
2,819,591 UART: [art] Store in in slot 0x4
2,905,392 UART: [art] Derive Key Pair
2,905,752 UART: [art] Store priv key in slot 0x5
2,918,508 UART: [art] Derive Key Pair - Done
2,933,545 UART: [art] Signing Cert with AUTHO
2,934,025 UART: RITY.KEYID = 7
2,949,019 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,784 UART: [art] PUB.X = 723447F8068D525B96B6FE57D7D2A37BF6574027F8E78DB92091451341CAA26431BB43E535A302628430F46F063517C2
2,956,533 UART: [art] PUB.Y = A350F5A23D10CE3964924C6F00F76FCCDA704995C5B71148B685E394D967BA63E29761053043EFC802CC1E4E0DA4FFC5
2,963,458 UART: [art] SIG.R = 659B8DAF7D5F8B3BE5255EBA6DD0822BA85A3D07DEB935BFA244FDD179FEE3AE75074F22CA01A05E7907DC00F4000027
2,970,168 UART: [art] SIG.S = F254819980EFB2DE72804CDB8DCDB4482906D24B9995497AF78EB39D89338B13A7A067B2AC19C2E77C48F72C1150A42A
2,993,600 UART: Caliptra RT
2,993,945 UART: [state] CFI Enabled
3,102,600 UART: [rt] RT listening for mailbox commands...
3,103,270 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,202 UART: [rt]cmd =0x44504543, len=28
3,176,884 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,075 UART: [kat] ++
895,227 UART: [kat] sha1
899,473 UART: [kat] SHA2-256
901,413 UART: [kat] SHA2-384
904,132 UART: [kat] SHA2-512-ACC
906,033 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,134 UART: [kat] LMS
1,168,446 UART: [kat] --
1,169,137 UART: [cold-reset] ++
1,169,615 UART: [fht] FHT @ 0x50003400
1,172,151 UART: [idev] ++
1,172,319 UART: [idev] CDI.KEYID = 6
1,172,680 UART: [idev] SUBJECT.KEYID = 7
1,173,105 UART: [idev] UDS.KEYID = 0
1,173,451 ready_for_fw is high
1,173,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,581 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,215,262 UART: [ldev] Erasing FE.KEYID = 1
1,241,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,808 UART: [ldev] --
1,281,150 UART: [fwproc] Wait for Commands...
1,281,737 UART: [fwproc] Recv command 0x46574c44
1,282,470 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,861 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,449 >>> mbox cmd response: success
2,773,656 UART: [afmc] ++
2,773,824 UART: [afmc] CDI.KEYID = 6
2,774,187 UART: [afmc] SUBJECT.KEYID = 7
2,774,613 UART: [afmc] AUTHORITY.KEYID = 5
2,810,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,807 UART: [afmc] --
2,853,915 UART: [cold-reset] --
2,854,925 UART: [state] Locking Datavault
2,856,264 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,868 UART: [state] Locking ICCM
2,857,390 UART: [exit] Launching FMC @ 0x40000130
2,862,719 UART:
2,862,735 UART: Running Caliptra FMC ...
2,863,143 UART:
2,863,197 UART: [state] CFI Enabled
2,873,342 UART: [fht] FMC Alias Private Key: 7
2,980,809 UART: [art] Extend RT PCRs Done
2,981,237 UART: [art] Lock RT PCRs Done
2,983,043 UART: [art] Populate DV Done
2,991,422 UART: [fht] FMC Alias Private Key: 7
2,992,588 UART: [art] Derive CDI
2,992,868 UART: [art] Store in in slot 0x4
3,078,291 UART: [art] Derive Key Pair
3,078,651 UART: [art] Store priv key in slot 0x5
3,091,869 UART: [art] Derive Key Pair - Done
3,106,462 UART: [art] Signing Cert with AUTHO
3,106,942 UART: RITY.KEYID = 7
3,122,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,015 UART: [art] PUB.X = F3F8BD5F02CF789871995AE63A58C8E1E8F0702CDFAB3E197AC057138999E94F268F055C98F0E0D8B70F2A38C0C2AFC4
3,129,788 UART: [art] PUB.Y = 168A6ED4BAE01E7E27E6F9215D887D19A25C4266638D70E83703A8976ED04F29E508B54C1E91E23524E3BC30134CF4D1
3,136,732 UART: [art] SIG.R = 7CC5C6BF03283EE1929ACFF1BE1544AB770B5D507FE32F5941B506A34DBAF948AF4194297938AB2E99853F88E3DF245E
3,143,503 UART: [art] SIG.S = 10950C21D36243799938ED91785BE11D43FAA9424031F305941E21B1964A1A7AAC0D3694F77CDE491546FADC0E0562BD
3,167,565 UART: Caliptra RT
3,167,818 UART: [state] CFI Enabled
3,275,945 UART: [rt] RT listening for mailbox commands...
3,276,615 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,749 UART: [rt]cmd =0x44504543, len=28
3,350,135 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,088 ready_for_fw is high
1,056,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,539 >>> mbox cmd response: success
2,681,705 UART:
2,681,721 UART: Running Caliptra FMC ...
2,682,129 UART:
2,682,183 UART: [state] CFI Enabled
2,693,212 UART: [fht] FMC Alias Private Key: 7
2,801,223 UART: [art] Extend RT PCRs Done
2,801,651 UART: [art] Lock RT PCRs Done
2,803,389 UART: [art] Populate DV Done
2,811,768 UART: [fht] FMC Alias Private Key: 7
2,812,762 UART: [art] Derive CDI
2,813,042 UART: [art] Store in in slot 0x4
2,898,347 UART: [art] Derive Key Pair
2,898,707 UART: [art] Store priv key in slot 0x5
2,911,549 UART: [art] Derive Key Pair - Done
2,926,450 UART: [art] Signing Cert with AUTHO
2,926,930 UART: RITY.KEYID = 7
2,942,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,077 UART: [art] PUB.X = 8687B09A596F61487D902C2588E0B8392D77FAEC80BCB89B1BDFC5CC5106FC8A5F86D7942A724637F76C1B41BC8CC1F8
2,949,854 UART: [art] PUB.Y = 093E0D8C613A948E7B73D71F083146557E2B569DD4E5F39C0D44D7B46E3AFA6B29AFAA80FEAAAB1A9188CD85CECDC86B
2,956,814 UART: [art] SIG.R = 5AC19D4FA31ECA271E9F7AAEAF09E8FAA4AA6730D573218DAE21959910A7327722ED060661D1F47999F03AABD1B2617C
2,963,587 UART: [art] SIG.S = 309A40EAD8BC837E9406CA463D39413A5F33FB00CB4FDD28252DC2C45011004638CE1EDD1558F501F7CD85DF44333A27
2,987,504 UART: Caliptra RT
2,987,757 UART: [state] CFI Enabled
3,094,476 UART: [rt] RT listening for mailbox commands...
3,095,146 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,264 UART: [rt]cmd =0x44504543, len=28
3,168,600 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,270 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
891,099 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,228 UART: [kat] ++
895,380 UART: [kat] sha1
899,694 UART: [kat] SHA2-256
901,634 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
1,169,013 UART: [kat] --
1,169,818 UART: [cold-reset] ++
1,170,382 UART: [fht] FHT @ 0x50003400
1,173,060 UART: [idev] ++
1,173,228 UART: [idev] CDI.KEYID = 6
1,173,589 UART: [idev] SUBJECT.KEYID = 7
1,174,014 UART: [idev] UDS.KEYID = 0
1,174,360 ready_for_fw is high
1,174,360 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,199,086 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,459 UART: [ldev] SUBJECT.KEYID = 5
1,209,886 UART: [ldev] AUTHORITY.KEYID = 7
1,210,349 UART: [ldev] FE.KEYID = 1
1,215,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,423 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,886 >>> mbox cmd response: success
2,773,001 UART: [afmc] ++
2,773,169 UART: [afmc] CDI.KEYID = 6
2,773,532 UART: [afmc] SUBJECT.KEYID = 7
2,773,958 UART: [afmc] AUTHORITY.KEYID = 5
2,810,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,738 UART: [afmc] --
2,853,848 UART: [cold-reset] --
2,854,998 UART: [state] Locking Datavault
2,856,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,025 UART: [state] Locking ICCM
2,857,615 UART: [exit] Launching FMC @ 0x40000130
2,862,944 UART:
2,862,960 UART: Running Caliptra FMC ...
2,863,368 UART:
2,863,511 UART: [state] CFI Enabled
2,874,090 UART: [fht] FMC Alias Private Key: 7
2,981,905 UART: [art] Extend RT PCRs Done
2,982,333 UART: [art] Lock RT PCRs Done
2,983,595 UART: [art] Populate DV Done
2,991,614 UART: [fht] FMC Alias Private Key: 7
2,992,732 UART: [art] Derive CDI
2,993,012 UART: [art] Store in in slot 0x4
3,079,013 UART: [art] Derive Key Pair
3,079,373 UART: [art] Store priv key in slot 0x5
3,092,917 UART: [art] Derive Key Pair - Done
3,107,643 UART: [art] Signing Cert with AUTHO
3,108,123 UART: RITY.KEYID = 7
3,123,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,852 UART: [art] PUB.X = 3DC4840ADEC11FEF88731C84B874BEED198FF5137564F8BF5FE6DE819B9F945A59AC32D5FB3C2983DD5AC7E821224C1B
3,130,637 UART: [art] PUB.Y = 68D4069DA1713D007CD0B78063EDB8FD8AFC63321887A5D2EDE8D3CB2551A2877E1BC6F07B64A36698371CC98E9A7054
3,137,568 UART: [art] SIG.R = 614E61E4326037355EBCBDE269E3F01BDBDF10C9F023BA0E76D33675CD5BAC9F410D140A5FB35C50C84531AD157EA7BA
3,144,345 UART: [art] SIG.S = F005351BC9ED7D9E63FD6FA5E0345387ACB7AB404E777EFA21F8D280F0CFADEE7E035251ED724EB6A1D0CE799C8B7026
3,167,678 UART: Caliptra RT
3,168,023 UART: [state] CFI Enabled
3,275,872 UART: [rt] RT listening for mailbox commands...
3,276,542 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,508 UART: [rt]cmd =0x44504543, len=28
3,349,620 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,783 ready_for_fw is high
1,056,783 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,734 >>> mbox cmd response: success
2,684,652 UART:
2,684,668 UART: Running Caliptra FMC ...
2,685,076 UART:
2,685,219 UART: [state] CFI Enabled
2,696,074 UART: [fht] FMC Alias Private Key: 7
2,804,401 UART: [art] Extend RT PCRs Done
2,804,829 UART: [art] Lock RT PCRs Done
2,806,151 UART: [art] Populate DV Done
2,814,356 UART: [fht] FMC Alias Private Key: 7
2,815,516 UART: [art] Derive CDI
2,815,796 UART: [art] Store in in slot 0x4
2,901,309 UART: [art] Derive Key Pair
2,901,669 UART: [art] Store priv key in slot 0x5
2,915,227 UART: [art] Derive Key Pair - Done
2,929,960 UART: [art] Signing Cert with AUTHO
2,930,440 UART: RITY.KEYID = 7
2,945,870 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,635 UART: [art] PUB.X = 857DD2F01210239F1EE262DEDCC04D19EEE2A6F8D373806711BBBC5AA4A36F9B7211BD3530689C5D88E70062174FF1AF
2,953,393 UART: [art] PUB.Y = 58FCC3BC5EB2D823A942B0C0F36879DF96BAFE46CE29C9C8563252D8010232023AD935EC38AFF74BAC899A826374D765
2,960,342 UART: [art] SIG.R = B5A2DA0888A3D4B67B15A9116174A55B80F6A2B6099D7619BA46F632F00252EDDE761E3A0F2B756120BF4BB81E2CB9C6
2,967,108 UART: [art] SIG.S = 27A1C8265F8C04FBBCACA6A4C1883908C812816B3A326DBB743574EC6F2C8B1F074FF983F591EE1C575A617FF72C8D8E
2,991,002 UART: Caliptra RT
2,991,347 UART: [state] CFI Enabled
3,099,658 UART: [rt] RT listening for mailbox commands...
3,100,328 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,978 UART: [rt]cmd =0x44504543, len=28
3,173,258 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
191,973 UART:
192,464 UART: Running Caliptra ROM ...
193,657 UART:
193,808 UART: [state] CFI Enabled
264,806 UART: [state] LifecycleState = Unprovisioned
266,741 UART: [state] DebugLocked = No
268,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,216 UART: [kat] SHA2-256
442,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,400 UART: [kat] ++
453,884 UART: [kat] sha1
465,254 UART: [kat] SHA2-256
467,969 UART: [kat] SHA2-384
474,387 UART: [kat] SHA2-512-ACC
476,747 UART: [kat] ECC-384
2,769,389 UART: [kat] HMAC-384Kdf
2,801,297 UART: [kat] LMS
3,991,581 UART: [kat] --
3,995,461 UART: [cold-reset] ++
3,996,329 UART: [fht] Storing FHT @ 0x50003400
4,009,072 UART: [idev] ++
4,009,630 UART: [idev] CDI.KEYID = 6
4,010,582 UART: [idev] SUBJECT.KEYID = 7
4,011,818 UART: [idev] UDS.KEYID = 0
4,012,822 ready_for_fw is high
4,013,038 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,506 UART: [idev] Erasing UDS.KEYID = 0
7,346,015 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,062 UART: [idev] --
7,371,433 UART: [ldev] ++
7,372,050 UART: [ldev] CDI.KEYID = 6
7,372,956 UART: [ldev] SUBJECT.KEYID = 5
7,374,216 UART: [ldev] AUTHORITY.KEYID = 7
7,375,436 UART: [ldev] FE.KEYID = 1
7,402,551 UART: [ldev] Erasing FE.KEYID = 1
10,735,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,922 UART: [ldev] --
13,117,017 UART: [fwproc] Waiting for Commands...
13,119,422 UART: [fwproc] Received command 0x46574c44
13,121,592 UART: [fwproc] Received Image of size 113844 bytes
17,179,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,484 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,639,781 >>> mbox cmd response: success
17,643,868 UART: [afmc] ++
17,644,466 UART: [afmc] CDI.KEYID = 6
17,645,360 UART: [afmc] SUBJECT.KEYID = 7
17,646,629 UART: [afmc] AUTHORITY.KEYID = 5
21,009,288 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,013 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,284 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,325,710 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,340,511 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,354,958 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,048 UART: [afmc] --
23,381,125 UART: [cold-reset] --
23,385,033 UART: [state] Locking Datavault
23,391,303 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,177 UART: [state] Locking ICCM
23,394,684 UART: [exit] Launching FMC @ 0x40000130
23,403,077 UART:
23,403,306 UART: Running Caliptra FMC ...
23,404,400 UART:
23,404,551 UART: [state] CFI Enabled
23,469,873 UART: [fht] FMC Alias Private Key: 7
25,807,521 UART: [art] Extend RT PCRs Done
25,808,740 UART: [art] Lock RT PCRs Done
25,810,655 UART: [art] Populate DV Done
25,816,133 UART: [fht] FMC Alias Private Key: 7
25,817,826 UART: [art] Derive CDI
25,818,554 UART: [art] Store in in slot 0x4
25,877,892 UART: [art] Derive Key Pair
25,878,920 UART: [art] Store priv key in slot 0x5
29,171,954 UART: [art] Derive Key Pair - Done
29,184,785 UART: [art] Signing Cert with AUTHO
29,186,088 UART: RITY.KEYID = 7
31,474,100 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,610 UART: [art] PUB.X = 243FE66DCB5DD3B4EDC923D2968B3048F3731DFDF071EF090C8787200B90AFAA000989D368B2C22A9D83A1B3D674EB70
31,482,821 UART: [art] PUB.Y = 8B82418D0D9CE9BAAE8A757F0CB91A72AC03259578EC9760AA2E4207190B576C9B10A8A714269C96436CF493CA9C7E8D
31,490,076 UART: [art] SIG.R = 1DFF9A798631FA4AF2BEF2776DF765AD23CF35821D5C97ABCC32011EE40C9E29E4F8484CA89ED0EE04E729D3750900B3
31,497,489 UART: [art] SIG.S = E3260CCBBF622A01D671F6B625EB0815475327243EFF98863EE2627AE91FD2EA8FE74B71C8E825CE0619C72C55466F57
32,802,578 UART: Caliptra RT
32,803,289 UART: [state] CFI Enabled
32,966,609 UART: [rt] RT listening for mailbox commands...
32,968,541 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,999,167 UART: [rt]cmd =0x44504543, len=20
33,019,719 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,787,237 ready_for_fw is high
3,787,888 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,869,017 >>> mbox cmd response: success
23,568,289 UART:
23,568,696 UART: Running Caliptra FMC ...
23,569,803 UART:
23,569,953 UART: [state] CFI Enabled
23,636,874 UART: [fht] FMC Alias Private Key: 7
25,975,058 UART: [art] Extend RT PCRs Done
25,976,290 UART: [art] Lock RT PCRs Done
25,978,133 UART: [art] Populate DV Done
25,983,276 UART: [fht] FMC Alias Private Key: 7
25,984,919 UART: [art] Derive CDI
25,985,658 UART: [art] Store in in slot 0x4
26,045,941 UART: [art] Derive Key Pair
26,046,984 UART: [art] Store priv key in slot 0x5
29,339,927 UART: [art] Derive Key Pair - Done
29,352,948 UART: [art] Signing Cert with AUTHO
29,354,258 UART: RITY.KEYID = 7
31,641,959 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,464 UART: [art] PUB.X = FA96506E5B2F6F71BD202169D01210C57A2054EDED39D412ACB018B42B9A17E2979CDB058A0E9A3AE69A6B87A8904ED0
31,650,724 UART: [art] PUB.Y = 101DBC2A9932DC43ABC357FE438BAAA4D6B097E0D33EA1D4F19F5C20E3FD14F81534B65FEC890806C2FFA0E6C98120D0
31,657,970 UART: [art] SIG.R = 777AF8D3FBBC6A4DD8A82496420AB1D6B7E8DE6CAA41CA2186126C5A5F1DC98D5C4C9FB42CA6C11266E8781A0A798744
31,665,402 UART: [art] SIG.S = 0BBDA2A488FF1E8AD95CC14DE1F061D0627CDE769CFE49B8FF3C33547619F281DB0831EAF8FB488507D29006410008D4
32,970,471 UART: Caliptra RT
32,971,173 UART: [state] CFI Enabled
33,134,258 UART: [rt] RT listening for mailbox commands...
33,136,186 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,166,554 UART: [rt]cmd =0x44504543, len=20
33,186,671 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,502 UART:
192,870 UART: Running Caliptra ROM ...
194,003 UART:
603,598 UART: [state] CFI Enabled
617,681 UART: [state] LifecycleState = Unprovisioned
619,624 UART: [state] DebugLocked = No
621,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,436 UART: [kat] SHA2-256
795,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,735 UART: [kat] ++
806,227 UART: [kat] sha1
817,166 UART: [kat] SHA2-256
819,813 UART: [kat] SHA2-384
825,322 UART: [kat] SHA2-512-ACC
827,699 UART: [kat] ECC-384
3,110,253 UART: [kat] HMAC-384Kdf
3,122,493 UART: [kat] LMS
4,312,583 UART: [kat] --
4,317,006 UART: [cold-reset] ++
4,319,514 UART: [fht] Storing FHT @ 0x50003400
4,330,994 UART: [idev] ++
4,331,570 UART: [idev] CDI.KEYID = 6
4,332,478 UART: [idev] SUBJECT.KEYID = 7
4,333,722 UART: [idev] UDS.KEYID = 0
4,334,911 ready_for_fw is high
4,335,117 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,952 UART: [idev] Erasing UDS.KEYID = 0
7,617,075 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,047 UART: [idev] --
7,644,440 UART: [ldev] ++
7,645,007 UART: [ldev] CDI.KEYID = 6
7,645,984 UART: [ldev] SUBJECT.KEYID = 5
7,647,198 UART: [ldev] AUTHORITY.KEYID = 7
7,648,428 UART: [ldev] FE.KEYID = 1
7,658,694 UART: [ldev] Erasing FE.KEYID = 1
10,948,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,804 UART: [ldev] --
13,309,225 UART: [fwproc] Waiting for Commands...
13,311,179 UART: [fwproc] Received command 0x46574c44
13,313,363 UART: [fwproc] Received Image of size 113844 bytes
17,364,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,442,267 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,659 >>> mbox cmd response: success
17,831,588 UART: [afmc] ++
17,832,186 UART: [afmc] CDI.KEYID = 6
17,833,072 UART: [afmc] SUBJECT.KEYID = 7
17,834,345 UART: [afmc] AUTHORITY.KEYID = 5
21,149,669 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,731 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,032 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,418 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,237 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,654 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,704 UART: [afmc] --
23,517,517 UART: [cold-reset] --
23,521,433 UART: [state] Locking Datavault
23,527,271 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,024 UART: [state] Locking ICCM
23,530,903 UART: [exit] Launching FMC @ 0x40000130
23,539,332 UART:
23,539,611 UART: Running Caliptra FMC ...
23,540,721 UART:
23,540,883 UART: [state] CFI Enabled
23,548,984 UART: [fht] FMC Alias Private Key: 7
25,879,649 UART: [art] Extend RT PCRs Done
25,880,871 UART: [art] Lock RT PCRs Done
25,882,550 UART: [art] Populate DV Done
25,888,125 UART: [fht] FMC Alias Private Key: 7
25,889,830 UART: [art] Derive CDI
25,890,664 UART: [art] Store in in slot 0x4
25,933,307 UART: [art] Derive Key Pair
25,934,474 UART: [art] Store priv key in slot 0x5
29,176,265 UART: [art] Derive Key Pair - Done
29,189,098 UART: [art] Signing Cert with AUTHO
29,190,400 UART: RITY.KEYID = 7
31,469,753 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,262 UART: [art] PUB.X = E9AB0DD993F866FF30555E89697DE8F8DC3D9600481718ED4E7DED50A1FCC05FF4D0E73553CF22B363340C6D27EF8D9A
31,478,530 UART: [art] PUB.Y = 66164618584EDBD923B108A1A0EEACCA9C4FF3FFA243F14BF4F11B827498A5117DF00748EB1D56537CE7E513824579F6
31,485,783 UART: [art] SIG.R = 23C3B58739C290DB2B7A790E0496EB10E9A49BB421A7127C97AB9617CFDDC7723D33AAEA0350E086CE883076711E0A2E
31,493,180 UART: [art] SIG.S = E334F48894EB73594F2C67D68A745C807DB3F6B7688D94EDCECA36B1796F57D9732BD4C98F59AD5149B04DF3D3B3CF91
32,798,915 UART: Caliptra RT
32,799,625 UART: [state] CFI Enabled
32,916,592 UART: [rt] RT listening for mailbox commands...
32,918,502 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
32,949,155 UART: [rt]cmd =0x44504543, len=20
32,969,373 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,127,117 ready_for_fw is high
4,127,643 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,060 >>> mbox cmd response: success
23,709,976 UART:
23,710,388 UART: Running Caliptra FMC ...
23,711,497 UART:
23,711,653 UART: [state] CFI Enabled
23,719,451 UART: [fht] FMC Alias Private Key: 7
26,050,653 UART: [art] Extend RT PCRs Done
26,051,888 UART: [art] Lock RT PCRs Done
26,053,600 UART: [art] Populate DV Done
26,059,116 UART: [fht] FMC Alias Private Key: 7
26,060,777 UART: [art] Derive CDI
26,061,540 UART: [art] Store in in slot 0x4
26,104,032 UART: [art] Derive Key Pair
26,105,037 UART: [art] Store priv key in slot 0x5
29,347,044 UART: [art] Derive Key Pair - Done
29,359,907 UART: [art] Signing Cert with AUTHO
29,361,213 UART: RITY.KEYID = 7
31,640,591 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,092 UART: [art] PUB.X = 5F6D65893E25E8EF92B2ED6F0A667F2A9F55E5AD3EEFC02B01F063282CAB031296926B88CED86B9AAE2EB32ED6F3376F
31,649,361 UART: [art] PUB.Y = BAA2A8AF6D06A89B18B559C5FAC73C4488FC70482AEC9AE579C88E4847E81C4B54209EE0AA2E985311D60F6CA80FB90D
31,656,588 UART: [art] SIG.R = 0674EDB3C9C3D9C3595CA0A253AEFC87345E77402A9AABAA16EE71DD3B0F2DAB82E69B4D3FDE5282338AA0F1883253AC
31,663,999 UART: [art] SIG.S = 4405078EA803B72201A5E2D519DD579338F048A2CA038E5E91CFD315CEF06237334EC771F034F9BD5C5A7C94C267B327
32,969,698 UART: Caliptra RT
32,970,410 UART: [state] CFI Enabled
33,087,522 UART: [rt] RT listening for mailbox commands...
33,089,436 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,119,818 UART: [rt]cmd =0x44504543, len=20
33,140,180 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,114 UART:
192,475 UART: Running Caliptra ROM ...
193,663 UART:
193,820 UART: [state] CFI Enabled
263,646 UART: [state] LifecycleState = Unprovisioned
265,568 UART: [state] DebugLocked = No
266,958 UART: [state] WD Timer not started. Device not locked for debugging
269,799 UART: [kat] SHA2-256
448,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,541 UART: [kat] ++
461,072 UART: [kat] sha1
471,105 UART: [kat] SHA2-256
474,117 UART: [kat] SHA2-384
481,178 UART: [kat] SHA2-512-ACC
484,113 UART: [kat] ECC-384
2,950,303 UART: [kat] HMAC-384Kdf
2,973,278 UART: [kat] LMS
3,502,724 UART: [kat] --
3,505,317 UART: [cold-reset] ++
3,506,403 UART: [fht] FHT @ 0x50003400
3,516,456 UART: [idev] ++
3,517,029 UART: [idev] CDI.KEYID = 6
3,517,920 UART: [idev] SUBJECT.KEYID = 7
3,519,167 UART: [idev] UDS.KEYID = 0
3,520,065 ready_for_fw is high
3,520,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,826 UART: [idev] Erasing UDS.KEYID = 0
6,031,120 UART: [idev] Sha1 KeyId Algorithm
6,053,378 UART: [idev] --
6,057,430 UART: [ldev] ++
6,058,000 UART: [ldev] CDI.KEYID = 6
6,058,908 UART: [ldev] SUBJECT.KEYID = 5
6,060,075 UART: [ldev] AUTHORITY.KEYID = 7
6,061,367 UART: [ldev] FE.KEYID = 1
6,103,644 UART: [ldev] Erasing FE.KEYID = 1
8,603,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,202 UART: [ldev] --
10,396,653 UART: [fwproc] Wait for Commands...
10,398,962 UART: [fwproc] Recv command 0x46574c44
10,401,050 UART: [fwproc] Recv'd Img size: 114168 bytes
13,801,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,948,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,266,613 >>> mbox cmd response: success
14,271,222 UART: [afmc] ++
14,271,821 UART: [afmc] CDI.KEYID = 6
14,272,734 UART: [afmc] SUBJECT.KEYID = 7
14,273,897 UART: [afmc] AUTHORITY.KEYID = 5
16,810,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,536,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,538,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,553,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,569,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,585,734 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,608,653 UART: [afmc] --
18,613,170 UART: [cold-reset] --
18,617,406 UART: [state] Locking Datavault
18,623,085 UART: [state] Locking PCR0, PCR1 and PCR31
18,624,771 UART: [state] Locking ICCM
18,627,539 UART: [exit] Launching FMC @ 0x40000130
18,635,945 UART:
18,636,192 UART: Running Caliptra FMC ...
18,637,294 UART:
18,637,457 UART: [state] CFI Enabled
18,695,759 UART: [fht] FMC Alias Private Key: 7
20,459,861 UART: [art] Extend RT PCRs Done
20,461,078 UART: [art] Lock RT PCRs Done
20,462,708 UART: [art] Populate DV Done
20,468,394 UART: [fht] FMC Alias Private Key: 7
20,470,093 UART: [art] Derive CDI
20,470,909 UART: [art] Store in in slot 0x4
20,528,551 UART: [art] Derive Key Pair
20,529,589 UART: [art] Store priv key in slot 0x5
22,992,329 UART: [art] Derive Key Pair - Done
23,005,335 UART: [art] Signing Cert with AUTHO
23,006,667 UART: RITY.KEYID = 7
24,717,758 UART: [art] Erasing AUTHORITY.KEYID = 7
24,719,257 UART: [art] PUB.X = C090B2502E9F5ADBF5259B1F8F8DDD52CCEDCDF97476029E812DE44EBB3792FF115C75C615336CE2E4CD52D181DEC202
24,726,501 UART: [art] PUB.Y = F78FCEDE5FEF1ECB4C417B1408E31801E2AB57E12C906779729ADF0D68DE5CBCE8B8B3B9CB07D26BFA7A4AB442D554EF
24,733,793 UART: [art] SIG.R = E5D0750FE4131DE299D29FB8D190EDA2E934137EE6D6F89738FC56610C1A2BC5698F04003CDF3E53E73E3FB48A373C68
24,741,226 UART: [art] SIG.S = BDB149D5AFD6FC59119192DA65DA368BB70D1DF1308BCCB8BD5C5ADCE94CDE9DB43E9B4BA718945960D577EF8C07C5C8
25,719,918 UART: Caliptra RT
25,720,611 UART: [state] CFI Enabled
25,886,583 UART: [rt] RT listening for mailbox commands...
25,888,492 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,918,892 UART: [rt]cmd =0x44504543, len=20
25,939,170 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,381,081 ready_for_fw is high
3,381,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,066,254 >>> mbox cmd response: success
18,368,365 UART:
18,368,781 UART: Running Caliptra FMC ...
18,369,925 UART:
18,370,094 UART: [state] CFI Enabled
18,431,713 UART: [fht] FMC Alias Private Key: 7
20,195,774 UART: [art] Extend RT PCRs Done
20,196,997 UART: [art] Lock RT PCRs Done
20,198,513 UART: [art] Populate DV Done
20,203,652 UART: [fht] FMC Alias Private Key: 7
20,205,150 UART: [art] Derive CDI
20,205,908 UART: [art] Store in in slot 0x4
20,264,241 UART: [art] Derive Key Pair
20,265,283 UART: [art] Store priv key in slot 0x5
22,728,734 UART: [art] Derive Key Pair - Done
22,741,899 UART: [art] Signing Cert with AUTHO
22,743,211 UART: RITY.KEYID = 7
24,454,391 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,916 UART: [art] PUB.X = B33672C364D15DF9B5121486417C93461D976A43BD25188E0B7B0C47016F8E393E1ADF5C097DA5D29D3A190CCC4290A4
24,463,153 UART: [art] PUB.Y = 5B835586E999BF8DCAA54FD0ED6366CDFCD5CA8A59DD60E0871BDDBAB93BC8748666227BBC75EB03C61297C633B1CF23
24,470,422 UART: [art] SIG.R = 9DE3604966A95EEA971B43CF9055C314D15EAB2869DA97CD7E0899D3F02031B3C25DF4DC0DC1E66FB6E2A943DF8016E3
24,477,809 UART: [art] SIG.S = CAAC3744F362FA42CAAD71C5E07B77F2EEE07141410E40650056360075E7A6B415C95F80F3B74E769D082B2AE20093A3
25,456,909 UART: Caliptra RT
25,457,622 UART: [state] CFI Enabled
25,621,242 UART: [rt] RT listening for mailbox commands...
25,623,152 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,653,638 UART: [rt]cmd =0x44504543, len=20
25,674,019 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,880 writing to cptra_bootfsm_go
193,001 UART:
193,367 UART: Running Caliptra ROM ...
194,582 UART:
604,128 UART: [state] CFI Enabled
613,603 UART: [state] LifecycleState = Unprovisioned
615,400 UART: [state] DebugLocked = No
617,066 UART: [state] WD Timer not started. Device not locked for debugging
619,971 UART: [kat] SHA2-256
799,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
810,692 UART: [kat] ++
811,159 UART: [kat] sha1
823,240 UART: [kat] SHA2-256
826,247 UART: [kat] SHA2-384
832,874 UART: [kat] SHA2-512-ACC
835,816 UART: [kat] ECC-384
3,280,141 UART: [kat] HMAC-384Kdf
3,293,387 UART: [kat] LMS
3,822,820 UART: [kat] --
3,828,593 UART: [cold-reset] ++
3,830,547 UART: [fht] FHT @ 0x50003400
3,842,960 UART: [idev] ++
3,843,522 UART: [idev] CDI.KEYID = 6
3,844,447 UART: [idev] SUBJECT.KEYID = 7
3,845,624 UART: [idev] UDS.KEYID = 0
3,846,675 ready_for_fw is high
3,846,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,408 UART: [idev] Erasing UDS.KEYID = 0
6,316,278 UART: [idev] Sha1 KeyId Algorithm
6,340,268 UART: [idev] --
6,343,231 UART: [ldev] ++
6,343,802 UART: [ldev] CDI.KEYID = 6
6,344,686 UART: [ldev] SUBJECT.KEYID = 5
6,345,845 UART: [ldev] AUTHORITY.KEYID = 7
6,347,136 UART: [ldev] FE.KEYID = 1
6,356,349 UART: [ldev] Erasing FE.KEYID = 1
8,830,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,159 UART: [ldev] --
10,622,314 UART: [fwproc] Wait for Commands...
10,624,854 UART: [fwproc] Recv command 0x46574c44
10,626,901 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,482,000 >>> mbox cmd response: success
14,486,469 UART: [afmc] ++
14,487,071 UART: [afmc] CDI.KEYID = 6
14,487,985 UART: [afmc] SUBJECT.KEYID = 7
14,489,147 UART: [afmc] AUTHORITY.KEYID = 5
16,989,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,711,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,713,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,728,865 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,744,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,760,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,784,221 UART: [afmc] --
18,788,312 UART: [cold-reset] --
18,793,128 UART: [state] Locking Datavault
18,798,651 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,354 UART: [state] Locking ICCM
18,801,963 UART: [exit] Launching FMC @ 0x40000130
18,810,354 UART:
18,810,595 UART: Running Caliptra FMC ...
18,811,647 UART:
18,811,799 UART: [state] CFI Enabled
18,819,846 UART: [fht] FMC Alias Private Key: 7
20,576,286 UART: [art] Extend RT PCRs Done
20,577,488 UART: [art] Lock RT PCRs Done
20,579,268 UART: [art] Populate DV Done
20,584,782 UART: [fht] FMC Alias Private Key: 7
20,586,313 UART: [art] Derive CDI
20,587,145 UART: [art] Store in in slot 0x4
20,629,684 UART: [art] Derive Key Pair
20,630,718 UART: [art] Store priv key in slot 0x5
23,057,820 UART: [art] Derive Key Pair - Done
23,070,877 UART: [art] Signing Cert with AUTHO
23,072,183 UART: RITY.KEYID = 7
24,777,711 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,192 UART: [art] PUB.X = CD72BE3B22AE52C5301B9C25FC8AC1699D99D5A1BD03E06B5E116146A3FA10132CF81E1AA6890114BD28079AA0BC60E9
24,786,505 UART: [art] PUB.Y = 6FBDBC4ABE54433E16827BE2F3C2308DB8748A4F6B0CA8CD9D781C5EAE9DFBB58771CECB8DFBD8CE9ACCCB581F668910
24,793,778 UART: [art] SIG.R = 4EBE6EEEE41836E2933F8CB203F99F017CFB03F2BC10D4BC5D06F40904583EA12ADF2F1AF4A9F538F601272BD11A7227
24,801,189 UART: [art] SIG.S = 411B4EA28F39B5ABF688F84997E1C01BCFB64E5A58E3A1CDA4316D4FB2B504C4D433C4FD859B65DF8481F4B199686A9A
25,781,021 UART: Caliptra RT
25,781,733 UART: [state] CFI Enabled
25,898,715 UART: [rt] RT listening for mailbox commands...
25,900,624 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,931,070 UART: [rt]cmd =0x44504543, len=20
25,951,645 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,823 writing to cptra_bootfsm_go
3,700,574 ready_for_fw is high
3,700,978 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,272,914 >>> mbox cmd response: success
18,521,834 UART:
18,522,230 UART: Running Caliptra FMC ...
18,523,333 UART:
18,523,488 UART: [state] CFI Enabled
18,531,326 UART: [fht] FMC Alias Private Key: 7
20,288,148 UART: [art] Extend RT PCRs Done
20,289,389 UART: [art] Lock RT PCRs Done
20,291,147 UART: [art] Populate DV Done
20,296,557 UART: [fht] FMC Alias Private Key: 7
20,298,151 UART: [art] Derive CDI
20,298,970 UART: [art] Store in in slot 0x4
20,341,564 UART: [art] Derive Key Pair
20,342,595 UART: [art] Store priv key in slot 0x5
22,769,454 UART: [art] Derive Key Pair - Done
22,782,446 UART: [art] Signing Cert with AUTHO
22,783,755 UART: RITY.KEYID = 7
24,488,744 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,262 UART: [art] PUB.X = 0A81777BF8C3072EBA23138BFECF211E5E2264CDD0FB05E8B3992F1726959536A21A0A0CF6E4F4B9A5910CDE887B7D2F
24,497,529 UART: [art] PUB.Y = BA5F9509311E4194837E31BC1F21F7F2142ED0D1158956D7B63A1E415DFABF02CAE58485C92AF46C06281EE3D9F04BFA
24,504,807 UART: [art] SIG.R = 8BACDEEE152171ACC6A79DA271AB6131E1D57ACBDFABEB37D6AF0DDBBB2626B5AF47D822D25571E2159ABD97931875CA
24,512,204 UART: [art] SIG.S = 78A91B1E60F94B67EE93E4AEEB180A0241AEE35901C0119AC0733DF5E0F0EC30635EE40C402DA8918D6CEF3E6FC33BC0
25,490,880 UART: Caliptra RT
25,491,613 UART: [state] CFI Enabled
25,609,110 UART: [rt] RT listening for mailbox commands...
25,611,016 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,641,872 UART: [rt]cmd =0x44504543, len=20
25,662,212 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,005 UART:
192,387 UART: Running Caliptra ROM ...
193,597 UART:
193,757 UART: [state] CFI Enabled
264,442 UART: [state] LifecycleState = Unprovisioned
266,499 UART: [state] DebugLocked = No
268,462 UART: [state] WD Timer not started. Device not locked for debugging
272,383 UART: [kat] SHA2-256
462,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,993 UART: [kat] ++
473,443 UART: [kat] sha1
484,672 UART: [kat] SHA2-256
487,753 UART: [kat] SHA2-384
493,904 UART: [kat] SHA2-512-ACC
496,549 UART: [kat] ECC-384
2,947,324 UART: [kat] HMAC-384Kdf
2,971,503 UART: [kat] LMS
3,503,309 UART: [kat] --
3,509,114 UART: [cold-reset] ++
3,510,413 UART: [fht] FHT @ 0x50003400
3,522,173 UART: [idev] ++
3,522,887 UART: [idev] CDI.KEYID = 6
3,523,844 UART: [idev] SUBJECT.KEYID = 7
3,525,085 UART: [idev] UDS.KEYID = 0
3,526,279 ready_for_fw is high
3,526,483 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,089 UART: [idev] Erasing UDS.KEYID = 0
6,027,796 UART: [idev] Sha1 KeyId Algorithm
6,051,666 UART: [idev] --
6,057,288 UART: [ldev] ++
6,057,992 UART: [ldev] CDI.KEYID = 6
6,058,912 UART: [ldev] SUBJECT.KEYID = 5
6,060,080 UART: [ldev] AUTHORITY.KEYID = 7
6,061,261 UART: [ldev] FE.KEYID = 1
6,100,859 UART: [ldev] Erasing FE.KEYID = 1
8,607,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,087 UART: [ldev] --
10,413,655 UART: [fwproc] Wait for Commands...
10,416,222 UART: [fwproc] Recv command 0x46574c44
10,418,532 UART: [fwproc] Recv'd Img size: 114168 bytes
13,856,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,595,871 >>> mbox cmd response: success
14,599,813 UART: [afmc] ++
14,600,522 UART: [afmc] CDI.KEYID = 6
14,601,767 UART: [afmc] SUBJECT.KEYID = 7
14,603,206 UART: [afmc] AUTHORITY.KEYID = 5
17,130,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,854,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,856,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,437 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,940 UART: [afmc] --
18,928,809 UART: [cold-reset] --
18,933,974 UART: [state] Locking Datavault
18,941,353 UART: [state] Locking PCR0, PCR1 and PCR31
18,943,533 UART: [state] Locking ICCM
18,946,505 UART: [exit] Launching FMC @ 0x40000130
18,955,144 UART:
18,955,377 UART: Running Caliptra FMC ...
18,956,484 UART:
18,956,641 UART: [state] CFI Enabled
19,013,167 UART: [fht] FMC Alias Private Key: 7
20,777,491 UART: [art] Extend RT PCRs Done
20,778,712 UART: [art] Lock RT PCRs Done
20,780,448 UART: [art] Populate DV Done
20,786,084 UART: [fht] FMC Alias Private Key: 7
20,787,680 UART: [art] Derive CDI
20,788,492 UART: [art] Store in in slot 0x4
20,845,801 UART: [art] Derive Key Pair
20,846,837 UART: [art] Store priv key in slot 0x5
23,309,622 UART: [art] Derive Key Pair - Done
23,322,374 UART: [art] Signing Cert with AUTHO
23,323,686 UART: RITY.KEYID = 7
25,035,575 UART: [art] Erasing AUTHORITY.KEYID = 7
25,037,088 UART: [art] PUB.X = B6D7A46FD34094650C664C0B06E750EF2A5B4FB99F10ED827A514B9CFBDDBD9AAD647657D36DB8F026AF7F5881E96614
25,044,366 UART: [art] PUB.Y = 216396FD8E2F6F6EA4D9EED9E7A3A87E6734B3C210D6BD662AA0C3D1BB450233C7CAAA3C1C5C14B3F2D9700C775B43D5
25,051,623 UART: [art] SIG.R = B67CE9B8F0BE3E7C28A9B5623D78D7EB9732818F8F5F74B6698882A5E17F21BB1F3BDE2494598978B2D30E3A6A183327
25,059,024 UART: [art] SIG.S = D7F43C4CB5940653C8B30C2096ADFBAF5B12B9F04CF343DA930E754535A1B29E79658D0960E5734F49F74A0F1E564393
26,038,222 UART: Caliptra RT
26,038,934 UART: [state] CFI Enabled
26,203,781 UART: [rt] RT listening for mailbox commands...
26,205,689 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,236,005 UART: [rt]cmd =0x44504543, len=20
26,256,262 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,435,543 ready_for_fw is high
3,436,181 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,756,684 >>> mbox cmd response: success
19,045,407 UART:
19,045,805 UART: Running Caliptra FMC ...
19,047,001 UART:
19,047,178 UART: [state] CFI Enabled
19,112,421 UART: [fht] FMC Alias Private Key: 7
20,876,038 UART: [art] Extend RT PCRs Done
20,877,267 UART: [art] Lock RT PCRs Done
20,879,006 UART: [art] Populate DV Done
20,884,808 UART: [fht] FMC Alias Private Key: 7
20,886,456 UART: [art] Derive CDI
20,887,301 UART: [art] Store in in slot 0x4
20,944,055 UART: [art] Derive Key Pair
20,945,090 UART: [art] Store priv key in slot 0x5
23,408,445 UART: [art] Derive Key Pair - Done
23,421,226 UART: [art] Signing Cert with AUTHO
23,422,535 UART: RITY.KEYID = 7
25,134,189 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,695 UART: [art] PUB.X = 1B90AB1A3D2FC4B5B3F92BC70C5DD9F6E68275CC7ED30ABEFCA054544C597A7F10B88B5F390F0210FDA7FB403422FB9D
25,142,986 UART: [art] PUB.Y = 875BE3DE55152D3FD75AC1BF9F68A5DF5D5E13353B37248C3BE3C4E439EDDD20EF98B8E6DCAAE073B71D557A80D547D1
25,150,308 UART: [art] SIG.R = E755FC9E6A7FE9EFF62FB8CED47BCC18DB6BD546E2972795F17E2A01217B8DF55C5596525DD0BB4DBA93DC20BF7F573B
25,157,778 UART: [art] SIG.S = 6C02F61D25689C88D91731CFFCCF325980A63DBB9DDB3F6F3B4253B79302F6CC19B12C2CCA8CAF3D1BA874BD1ECCD015
26,136,642 UART: Caliptra RT
26,137,327 UART: [state] CFI Enabled
26,301,292 UART: [rt] RT listening for mailbox commands...
26,303,224 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,333,825 UART: [rt]cmd =0x44504543, len=20
26,354,223 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
192,773 UART:
193,142 UART: Running Caliptra ROM ...
194,258 UART:
604,121 UART: [state] CFI Enabled
618,645 UART: [state] LifecycleState = Unprovisioned
620,964 UART: [state] DebugLocked = No
623,697 UART: [state] WD Timer not started. Device not locked for debugging
627,958 UART: [kat] SHA2-256
817,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,643 UART: [kat] ++
829,163 UART: [kat] sha1
841,599 UART: [kat] SHA2-256
844,613 UART: [kat] SHA2-384
850,531 UART: [kat] SHA2-512-ACC
853,111 UART: [kat] ECC-384
3,291,269 UART: [kat] HMAC-384Kdf
3,304,239 UART: [kat] LMS
3,836,052 UART: [kat] --
3,840,139 UART: [cold-reset] ++
3,841,505 UART: [fht] FHT @ 0x50003400
3,853,480 UART: [idev] ++
3,854,123 UART: [idev] CDI.KEYID = 6
3,855,153 UART: [idev] SUBJECT.KEYID = 7
3,856,258 UART: [idev] UDS.KEYID = 0
3,857,198 ready_for_fw is high
3,857,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,938 UART: [idev] Erasing UDS.KEYID = 0
6,333,926 UART: [idev] Sha1 KeyId Algorithm
6,355,674 UART: [idev] --
6,359,954 UART: [ldev] ++
6,360,634 UART: [ldev] CDI.KEYID = 6
6,361,548 UART: [ldev] SUBJECT.KEYID = 5
6,362,707 UART: [ldev] AUTHORITY.KEYID = 7
6,363,935 UART: [ldev] FE.KEYID = 1
6,374,202 UART: [ldev] Erasing FE.KEYID = 1
8,851,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,418 UART: [ldev] --
10,639,110 UART: [fwproc] Wait for Commands...
10,640,935 UART: [fwproc] Recv command 0x46574c44
10,643,242 UART: [fwproc] Recv'd Img size: 114168 bytes
14,083,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,202 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,279,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,820,631 >>> mbox cmd response: success
14,823,872 UART: [afmc] ++
14,824,582 UART: [afmc] CDI.KEYID = 6
14,825,769 UART: [afmc] SUBJECT.KEYID = 7
14,827,201 UART: [afmc] AUTHORITY.KEYID = 5
17,328,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,051,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,053,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,068,719 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,083,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,098,856 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,123,403 UART: [afmc] --
19,126,296 UART: [cold-reset] --
19,129,403 UART: [state] Locking Datavault
19,135,419 UART: [state] Locking PCR0, PCR1 and PCR31
19,137,757 UART: [state] Locking ICCM
19,140,400 UART: [exit] Launching FMC @ 0x40000130
19,149,079 UART:
19,149,314 UART: Running Caliptra FMC ...
19,150,416 UART:
19,150,578 UART: [state] CFI Enabled
19,158,952 UART: [fht] FMC Alias Private Key: 7
20,915,446 UART: [art] Extend RT PCRs Done
20,916,669 UART: [art] Lock RT PCRs Done
20,918,617 UART: [art] Populate DV Done
20,924,249 UART: [fht] FMC Alias Private Key: 7
20,925,754 UART: [art] Derive CDI
20,926,572 UART: [art] Store in in slot 0x4
20,969,227 UART: [art] Derive Key Pair
20,970,231 UART: [art] Store priv key in slot 0x5
23,396,853 UART: [art] Derive Key Pair - Done
23,409,959 UART: [art] Signing Cert with AUTHO
23,411,265 UART: RITY.KEYID = 7
25,116,595 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,096 UART: [art] PUB.X = 645988AC76F551D1BD7D52E203657507D116CF56DD790447AA25A5A56D63C5409A6A1EDCB53AF54DE5CCF44D99B5CEA9
25,125,393 UART: [art] PUB.Y = F8954234E1C62B79F99B13B6AF7CBD142F4B75FF811F83B7AAE902FFC87B6510F11F8885673386EB95C23F7C9CE29B98
25,132,680 UART: [art] SIG.R = 4946281670E60C0CBA8B2B5D65555F75041165A2516922FAB8836B24566CA6210622884C16BEFD78A1FF04548A07D7F6
25,140,048 UART: [art] SIG.S = CFFEA2960A5D47EAFA61949278A6657530FD407C108EAE7B4F7E84ABF1F5D591FB377FD42410806024A3136DA1CDC0AB
26,118,840 UART: Caliptra RT
26,119,526 UART: [state] CFI Enabled
26,237,222 UART: [rt] RT listening for mailbox commands...
26,239,116 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,269,746 UART: [rt]cmd =0x44504543, len=20
26,290,091 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
3,757,306 ready_for_fw is high
3,757,909 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,958,600 >>> mbox cmd response: success
19,204,837 UART:
19,205,238 UART: Running Caliptra FMC ...
19,206,386 UART:
19,206,555 UART: [state] CFI Enabled
19,214,628 UART: [fht] FMC Alias Private Key: 7
20,971,330 UART: [art] Extend RT PCRs Done
20,972,569 UART: [art] Lock RT PCRs Done
20,974,519 UART: [art] Populate DV Done
20,979,773 UART: [fht] FMC Alias Private Key: 7
20,981,322 UART: [art] Derive CDI
20,982,081 UART: [art] Store in in slot 0x4
21,024,907 UART: [art] Derive Key Pair
21,025,954 UART: [art] Store priv key in slot 0x5
23,452,325 UART: [art] Derive Key Pair - Done
23,465,483 UART: [art] Signing Cert with AUTHO
23,466,781 UART: RITY.KEYID = 7
25,172,023 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,534 UART: [art] PUB.X = 711E2919F0DA512E0C9ADE6DBF5FDFF714E81DD8D7908B2EDBE0222A42F05838D31A6FA251D8732E42829BEFE33B0F93
25,180,832 UART: [art] PUB.Y = 9FB3D3C1AF84D5F59890774F5E427F61D80EAB4DEF0444D9954FAD734820C05F2EDA7C53DB3A67DEABBD0D8ED0975953
25,188,111 UART: [art] SIG.R = F95779E62F31373E769A80368B6EDFA0F624D5C293EC59E8E9A94CC4B330474DB94BBD637CFC2D89F8A6987F450B5BFE
25,195,511 UART: [art] SIG.S = 576E11B9789E560E64E7965F60342C434870883B8238A1E685D928DEB82F0433A9FBBE1414127CD4ED0F42D21C195730
26,173,931 UART: Caliptra RT
26,174,640 UART: [state] CFI Enabled
26,292,852 UART: [rt] RT listening for mailbox commands...
26,294,757 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,325,162 UART: [rt]cmd =0x44504543, len=20
26,345,525 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,211 UART: [kat] SHA2-256
882,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,257 UART: [kat] ++
886,409 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,118 UART: [kat] SHA2-512-ACC
897,019 UART: [kat] ECC-384
902,826 UART: [kat] HMAC-384Kdf
907,384 UART: [kat] LMS
1,475,580 UART: [kat] --
1,476,241 UART: [cold-reset] ++
1,476,701 UART: [fht] Storing FHT @ 0x50003400
1,479,696 UART: [idev] ++
1,479,864 UART: [idev] CDI.KEYID = 6
1,480,224 UART: [idev] SUBJECT.KEYID = 7
1,480,648 UART: [idev] UDS.KEYID = 0
1,480,993 ready_for_fw is high
1,480,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,620 UART: [idev] Erasing UDS.KEYID = 0
1,505,180 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,676 UART: [idev] --
1,514,813 UART: [ldev] ++
1,514,981 UART: [ldev] CDI.KEYID = 6
1,515,344 UART: [ldev] SUBJECT.KEYID = 5
1,515,770 UART: [ldev] AUTHORITY.KEYID = 7
1,516,233 UART: [ldev] FE.KEYID = 1
1,521,289 UART: [ldev] Erasing FE.KEYID = 1
1,546,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,612 UART: [ldev] --
1,586,047 UART: [fwproc] Waiting for Commands...
1,586,846 UART: [fwproc] Received command 0x46574c44
1,587,637 UART: [fwproc] Received Image of size 114168 bytes
2,883,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,579 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,472 >>> mbox cmd response: success
3,076,690 UART: [afmc] ++
3,076,858 UART: [afmc] CDI.KEYID = 6
3,077,220 UART: [afmc] SUBJECT.KEYID = 7
3,077,645 UART: [afmc] AUTHORITY.KEYID = 5
3,112,288 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,550 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,330 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,943 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,633 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,340 UART: [afmc] --
3,155,394 UART: [cold-reset] --
3,156,214 UART: [state] Locking Datavault
3,157,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,847 UART: [state] Locking ICCM
3,158,481 UART: [exit] Launching FMC @ 0x40000130
3,163,810 UART:
3,163,826 UART: Running Caliptra FMC ...
3,164,234 UART:
3,164,288 UART: [state] CFI Enabled
3,174,845 UART: [fht] FMC Alias Private Key: 7
3,282,830 UART: [art] Extend RT PCRs Done
3,283,258 UART: [art] Lock RT PCRs Done
3,285,092 UART: [art] Populate DV Done
3,293,281 UART: [fht] FMC Alias Private Key: 7
3,294,431 UART: [art] Derive CDI
3,294,711 UART: [art] Store in in slot 0x4
3,380,684 UART: [art] Derive Key Pair
3,381,044 UART: [art] Store priv key in slot 0x5
3,394,534 UART: [art] Derive Key Pair - Done
3,409,305 UART: [art] Signing Cert with AUTHO
3,409,785 UART: RITY.KEYID = 7
3,424,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,404 UART: [art] PUB.X = 4EEAD7B01130FF0A36C7499FF6E2DC8A14F9C7EC55A9A10F878F055E57AA2CCB5F2E928C94927DDB627800833A9377B2
3,432,155 UART: [art] PUB.Y = 31134A602A9A99AF9A7B32EAF80E7F2F0B1BA4A4210C2A831D700FCE6AC8018971597CF16A247E88443DD7FE5E4BDEC4
3,439,104 UART: [art] SIG.R = 589B5A38BD1CF33E51AE7AC9A77DC2403E746EF42ECE403B6F05168AF108499EB79F909EE8C696FF7973A4B29CAD0884
3,445,877 UART: [art] SIG.S = 3D954E7DB66A64702FC1D92F15877F95090B25C0919F0438A0A17E12293E7DAEE20ACE43CFBA00581CF02CF12C8A1E21
3,470,198 UART: Caliptra RT
3,470,451 UART: [state] CFI Enabled
3,578,345 UART: [rt] RT listening for mailbox commands...
3,579,015 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,231 UART: [rt]cmd =0x44504543, len=20
3,630,203 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,369 ready_for_fw is high
1,363,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,334 >>> mbox cmd response: success
2,987,032 UART:
2,987,048 UART: Running Caliptra FMC ...
2,987,456 UART:
2,987,510 UART: [state] CFI Enabled
2,998,109 UART: [fht] FMC Alias Private Key: 7
3,105,204 UART: [art] Extend RT PCRs Done
3,105,632 UART: [art] Lock RT PCRs Done
3,107,188 UART: [art] Populate DV Done
3,115,677 UART: [fht] FMC Alias Private Key: 7
3,116,677 UART: [art] Derive CDI
3,116,957 UART: [art] Store in in slot 0x4
3,202,676 UART: [art] Derive Key Pair
3,203,036 UART: [art] Store priv key in slot 0x5
3,216,058 UART: [art] Derive Key Pair - Done
3,230,945 UART: [art] Signing Cert with AUTHO
3,231,425 UART: RITY.KEYID = 7
3,246,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,198 UART: [art] PUB.X = 0F2BDFAAED570F4892495C9DC987C5A55AAD8BD0B1243489491EAA4BFEBBD654C787B3852F6D2A401FC398A341CA12B4
3,253,980 UART: [art] PUB.Y = 2C41954CDD59D96C19F2A19A917BBDAB60D49B2427E01E1362DE6F65E903F6BFE2CADE76DA8C7656864710062C1E9838
3,260,932 UART: [art] SIG.R = 45B6795780A6CE1632946978249B68E502CF99D1B8731B9C927B68E141C55AD183181C41E3DF80A662EBA01F3E74390C
3,267,690 UART: [art] SIG.S = 0C32C5974216554FDE3636EB05151F668A049FA8E0F089CB1C1EB39C8ABDD338AF8F926BCC3C5B800B55AC97913898B8
3,291,369 UART: Caliptra RT
3,291,622 UART: [state] CFI Enabled
3,400,460 UART: [rt] RT listening for mailbox commands...
3,401,130 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,282 UART: [rt]cmd =0x44504543, len=20
3,452,228 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,905 UART: [state] LifecycleState = Unprovisioned
85,560 UART: [state] DebugLocked = No
86,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,812 UART: [kat] SHA2-256
881,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,858 UART: [kat] ++
886,010 UART: [kat] sha1
890,246 UART: [kat] SHA2-256
892,184 UART: [kat] SHA2-384
895,025 UART: [kat] SHA2-512-ACC
896,926 UART: [kat] ECC-384
902,563 UART: [kat] HMAC-384Kdf
907,317 UART: [kat] LMS
1,475,513 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,647 UART: [idev] ++
1,479,815 UART: [idev] CDI.KEYID = 6
1,480,175 UART: [idev] SUBJECT.KEYID = 7
1,480,599 UART: [idev] UDS.KEYID = 0
1,480,944 ready_for_fw is high
1,480,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,665 UART: [idev] Erasing UDS.KEYID = 0
1,505,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,589 UART: [idev] --
1,514,454 UART: [ldev] ++
1,514,622 UART: [ldev] CDI.KEYID = 6
1,514,985 UART: [ldev] SUBJECT.KEYID = 5
1,515,411 UART: [ldev] AUTHORITY.KEYID = 7
1,515,874 UART: [ldev] FE.KEYID = 1
1,520,898 UART: [ldev] Erasing FE.KEYID = 1
1,546,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,663 UART: [ldev] --
1,586,072 UART: [fwproc] Waiting for Commands...
1,586,751 UART: [fwproc] Received command 0x46574c44
1,587,542 UART: [fwproc] Received Image of size 114168 bytes
2,883,654 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,452 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,804 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,507 >>> mbox cmd response: success
3,077,613 UART: [afmc] ++
3,077,781 UART: [afmc] CDI.KEYID = 6
3,078,143 UART: [afmc] SUBJECT.KEYID = 7
3,078,568 UART: [afmc] AUTHORITY.KEYID = 5
3,114,293 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,425 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,205 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,933 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,818 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,508 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,465 UART: [afmc] --
3,157,399 UART: [cold-reset] --
3,158,389 UART: [state] Locking Datavault
3,159,656 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,260 UART: [state] Locking ICCM
3,160,934 UART: [exit] Launching FMC @ 0x40000130
3,166,263 UART:
3,166,279 UART: Running Caliptra FMC ...
3,166,687 UART:
3,166,830 UART: [state] CFI Enabled
3,177,507 UART: [fht] FMC Alias Private Key: 7
3,285,526 UART: [art] Extend RT PCRs Done
3,285,954 UART: [art] Lock RT PCRs Done
3,287,162 UART: [art] Populate DV Done
3,295,279 UART: [fht] FMC Alias Private Key: 7
3,296,213 UART: [art] Derive CDI
3,296,493 UART: [art] Store in in slot 0x4
3,382,350 UART: [art] Derive Key Pair
3,382,710 UART: [art] Store priv key in slot 0x5
3,395,840 UART: [art] Derive Key Pair - Done
3,410,709 UART: [art] Signing Cert with AUTHO
3,411,189 UART: RITY.KEYID = 7
3,426,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,734 UART: [art] PUB.X = AEFBFF54476F2F32C4C4052F30D21D07671F8F5D91DE8EA3DC43B971FB3B59F68E2AF3B6AECC4836B9850F57730F8CC3
3,434,510 UART: [art] PUB.Y = 87882D11E0C87653F5FE8DFDF2326D9430CB089768AB780C9093266EA48F5F6932712F9D6244C96002DC276C6491888F
3,441,443 UART: [art] SIG.R = 634B8445B0B70DB8103A3B24C69089198BD22CDFF6A83696705359B9720BB7F6ACC483B46418CDAAECA2578AB8C8B31E
3,448,215 UART: [art] SIG.S = 853D6D7A0A700CE59047653510B00332FEF0DA3A4C6A90E25CB9A3B77A8A0DAFBE07ED34E292EAF614118D7AE2FD8337
3,472,175 UART: Caliptra RT
3,472,520 UART: [state] CFI Enabled
3,580,711 UART: [rt] RT listening for mailbox commands...
3,581,381 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,239 UART: [rt]cmd =0x44504543, len=20
3,631,943 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,322 ready_for_fw is high
1,363,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,687 >>> mbox cmd response: success
2,989,799 UART:
2,989,815 UART: Running Caliptra FMC ...
2,990,223 UART:
2,990,366 UART: [state] CFI Enabled
3,000,891 UART: [fht] FMC Alias Private Key: 7
3,108,526 UART: [art] Extend RT PCRs Done
3,108,954 UART: [art] Lock RT PCRs Done
3,110,326 UART: [art] Populate DV Done
3,118,647 UART: [fht] FMC Alias Private Key: 7
3,119,795 UART: [art] Derive CDI
3,120,075 UART: [art] Store in in slot 0x4
3,205,922 UART: [art] Derive Key Pair
3,206,282 UART: [art] Store priv key in slot 0x5
3,219,728 UART: [art] Derive Key Pair - Done
3,234,560 UART: [art] Signing Cert with AUTHO
3,235,040 UART: RITY.KEYID = 7
3,250,148 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,913 UART: [art] PUB.X = 20E72829F7DDF0AEFCCF8529A0DE91FA036086A4AEAFD41B26EB7BC25C5531030E5D529137B98B7AEDCF9D1CE67FCB9C
3,257,700 UART: [art] PUB.Y = 6CD103D49834035F02B5A5479C4767C390DB0015A92CE84DD50AA2CB854556B5252BB54FB605AFCF75D04718E331EB1F
3,264,617 UART: [art] SIG.R = 97BEABAED358A496DCE9BEE2C220D568107227E3F278CF7CEF91BA8B4537D9C7E33769B2F5C30D33594F94D3810B661D
3,271,393 UART: [art] SIG.S = 59125152C2E8F0D3B5B03E2B57DDBB23B630DEAB497732404045FBB3E95A8E419A1CB7828FC12C0CE46ABAEA44B0E799
3,295,385 UART: Caliptra RT
3,295,730 UART: [state] CFI Enabled
3,404,779 UART: [rt] RT listening for mailbox commands...
3,405,449 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,265 UART: [rt]cmd =0x44504543, len=20
3,455,721 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Unprovisioned
85,505 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
893,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,289 UART: [kat] ++
897,441 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,220 UART: [kat] SHA2-512-ACC
908,121 UART: [kat] ECC-384
918,272 UART: [kat] HMAC-384Kdf
922,904 UART: [kat] LMS
1,171,232 UART: [kat] --
1,172,103 UART: [cold-reset] ++
1,172,463 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 ready_for_fw is high
1,176,323 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,984 UART: [idev] Erasing UDS.KEYID = 0
1,201,355 UART: [idev] Sha1 KeyId Algorithm
1,209,835 UART: [idev] --
1,211,077 UART: [ldev] ++
1,211,245 UART: [ldev] CDI.KEYID = 6
1,211,608 UART: [ldev] SUBJECT.KEYID = 5
1,212,034 UART: [ldev] AUTHORITY.KEYID = 7
1,212,497 UART: [ldev] FE.KEYID = 1
1,217,593 UART: [ldev] Erasing FE.KEYID = 1
1,243,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,042 UART: [fwproc] Wait for Commands...
1,282,628 UART: [fwproc] Recv command 0x46574c44
1,283,356 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,497 >>> mbox cmd response: success
2,773,741 UART: [afmc] ++
2,773,909 UART: [afmc] CDI.KEYID = 6
2,774,271 UART: [afmc] SUBJECT.KEYID = 7
2,774,696 UART: [afmc] AUTHORITY.KEYID = 5
2,810,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,498 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,246 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,338 UART: [afmc] --
2,853,216 UART: [cold-reset] --
2,854,094 UART: [state] Locking Datavault
2,855,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,903 UART: [state] Locking ICCM
2,856,417 UART: [exit] Launching FMC @ 0x40000130
2,861,746 UART:
2,861,762 UART: Running Caliptra FMC ...
2,862,170 UART:
2,862,224 UART: [state] CFI Enabled
2,872,489 UART: [fht] FMC Alias Private Key: 7
2,980,576 UART: [art] Extend RT PCRs Done
2,981,004 UART: [art] Lock RT PCRs Done
2,982,606 UART: [art] Populate DV Done
2,990,635 UART: [fht] FMC Alias Private Key: 7
2,991,599 UART: [art] Derive CDI
2,991,879 UART: [art] Store in in slot 0x4
3,077,604 UART: [art] Derive Key Pair
3,077,964 UART: [art] Store priv key in slot 0x5
3,090,816 UART: [art] Derive Key Pair - Done
3,105,631 UART: [art] Signing Cert with AUTHO
3,106,111 UART: RITY.KEYID = 7
3,121,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,944 UART: [art] PUB.X = B9D107BA8ED42BAF98EE8A6E79FCC2955509B462516A6E9EFB19C200E7BD72BD15BBB183D328DFBABE65D06FEFF1FF1A
3,128,716 UART: [art] PUB.Y = D81D36A0C9B2AD6DF8A1B561E4D534B2743AEF2E0C2D0525CF78328C6D12383C059266982C3CEBCD98C4CC846FF2557C
3,135,669 UART: [art] SIG.R = AFB6498BF446D7044CAFAA23A0DD920E283718E83F6DE677E1729E7BA2C6B5A077DB7BA4BD56FF241BA9A827DE64AFC0
3,142,455 UART: [art] SIG.S = 81C7E7726DB858D75881D67A8A01A501CD73D6EC7F8C87A8EAC116AD9DACD2215FB4DDB492BA04EBA3229C9EE1B0EB1A
3,167,085 UART: Caliptra RT
3,167,338 UART: [state] CFI Enabled
3,274,718 UART: [rt] RT listening for mailbox commands...
3,275,388 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,256 UART: [rt]cmd =0x44504543, len=20
3,325,882 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,189 ready_for_fw is high
1,060,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,956 >>> mbox cmd response: success
2,686,756 UART:
2,686,772 UART: Running Caliptra FMC ...
2,687,180 UART:
2,687,234 UART: [state] CFI Enabled
2,697,649 UART: [fht] FMC Alias Private Key: 7
2,805,756 UART: [art] Extend RT PCRs Done
2,806,184 UART: [art] Lock RT PCRs Done
2,807,800 UART: [art] Populate DV Done
2,815,829 UART: [fht] FMC Alias Private Key: 7
2,816,855 UART: [art] Derive CDI
2,817,135 UART: [art] Store in in slot 0x4
2,903,212 UART: [art] Derive Key Pair
2,903,572 UART: [art] Store priv key in slot 0x5
2,916,918 UART: [art] Derive Key Pair - Done
2,931,728 UART: [art] Signing Cert with AUTHO
2,932,208 UART: RITY.KEYID = 7
2,946,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,755 UART: [art] PUB.X = 362218950E142E8D80F12DE6F94E6AFE6F5DE5B6CAD469853229BA8762EE9C59F69DDD4C73DEEA47E56421236E0DB983
2,954,529 UART: [art] PUB.Y = B9662EDBD508FB5745C38E89E8290BD8452084B7C73B1C8B1B120A81D91B46C71105F644F05DFEFC8A1D1A39DB473B9B
2,961,477 UART: [art] SIG.R = 079F8C708DA0EFCDAF7025612F7B2B71081B1CC59EDA5651FE6AF70FEBE84063023762BA20328A7D86340A0092F8341A
2,968,216 UART: [art] SIG.S = 21634DD61A0EB64E2E5BFADA9394F5D0F8CA3312D3EB6001AB899AC838FF6D5A654E10F5A993E0DC66CA5AC5D58C48FC
2,992,143 UART: Caliptra RT
2,992,396 UART: [state] CFI Enabled
3,100,839 UART: [rt] RT listening for mailbox commands...
3,101,509 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,397 UART: [rt]cmd =0x44504543, len=20
3,152,371 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
907,041 UART: [kat] SHA2-512-ACC
908,942 UART: [kat] ECC-384
918,669 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,556 UART: [cold-reset] ++
1,172,888 UART: [fht] FHT @ 0x50003400
1,175,503 UART: [idev] ++
1,175,671 UART: [idev] CDI.KEYID = 6
1,176,031 UART: [idev] SUBJECT.KEYID = 7
1,176,455 UART: [idev] UDS.KEYID = 0
1,176,800 ready_for_fw is high
1,176,800 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,751 UART: [idev] Erasing UDS.KEYID = 0
1,202,316 UART: [idev] Sha1 KeyId Algorithm
1,211,010 UART: [idev] --
1,212,086 UART: [ldev] ++
1,212,254 UART: [ldev] CDI.KEYID = 6
1,212,617 UART: [ldev] SUBJECT.KEYID = 5
1,213,043 UART: [ldev] AUTHORITY.KEYID = 7
1,213,506 UART: [ldev] FE.KEYID = 1
1,218,844 UART: [ldev] Erasing FE.KEYID = 1
1,245,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,672 UART: [ldev] --
1,285,175 UART: [fwproc] Wait for Commands...
1,285,841 UART: [fwproc] Recv command 0x46574c44
1,286,569 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,719 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,023 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,674 >>> mbox cmd response: success
2,775,846 UART: [afmc] ++
2,776,014 UART: [afmc] CDI.KEYID = 6
2,776,376 UART: [afmc] SUBJECT.KEYID = 7
2,776,801 UART: [afmc] AUTHORITY.KEYID = 5
2,813,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,427 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,903 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,788 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,507 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,365 UART: [afmc] --
2,856,399 UART: [cold-reset] --
2,857,257 UART: [state] Locking Datavault
2,858,334 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,938 UART: [state] Locking ICCM
2,859,548 UART: [exit] Launching FMC @ 0x40000130
2,864,877 UART:
2,864,893 UART: Running Caliptra FMC ...
2,865,301 UART:
2,865,444 UART: [state] CFI Enabled
2,876,413 UART: [fht] FMC Alias Private Key: 7
2,983,712 UART: [art] Extend RT PCRs Done
2,984,140 UART: [art] Lock RT PCRs Done
2,986,160 UART: [art] Populate DV Done
2,994,447 UART: [fht] FMC Alias Private Key: 7
2,995,405 UART: [art] Derive CDI
2,995,685 UART: [art] Store in in slot 0x4
3,080,940 UART: [art] Derive Key Pair
3,081,300 UART: [art] Store priv key in slot 0x5
3,095,650 UART: [art] Derive Key Pair - Done
3,110,738 UART: [art] Signing Cert with AUTHO
3,111,218 UART: RITY.KEYID = 7
3,126,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,045 UART: [art] PUB.X = 3B58755AA388DE7A9353CF89EA8C41D1BFDE218BE24368DD072B4824B784D03632A9303A029567906387EE716E2DA6DF
3,133,811 UART: [art] PUB.Y = E36F579822067261DE18716A095B15653AD3BFEB8BFA91983ACAE79BAC7BDC4D329BA00447E211416BB32F32978110E9
3,140,756 UART: [art] SIG.R = CBB38EA055DFD61F0FA8AF8AA9ED81B539E4A6C80DBC0566B0B9556832C33EF7F7ACA9309F68E3663FFF8190D817818F
3,147,535 UART: [art] SIG.S = B86DCB7C0ABF30CD1A429CFD5300638E6940D69BFD36EB6CBF160A5F4C21C14DE77D132E7ECB87BC196A424FBC36C953
3,171,974 UART: Caliptra RT
3,172,319 UART: [state] CFI Enabled
3,280,615 UART: [rt] RT listening for mailbox commands...
3,281,285 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,251 UART: [rt]cmd =0x44504543, len=20
3,331,993 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,124 ready_for_fw is high
1,061,124 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,906 >>> mbox cmd response: success
2,687,392 UART:
2,687,408 UART: Running Caliptra FMC ...
2,687,816 UART:
2,687,959 UART: [state] CFI Enabled
2,698,576 UART: [fht] FMC Alias Private Key: 7
2,806,499 UART: [art] Extend RT PCRs Done
2,806,927 UART: [art] Lock RT PCRs Done
2,808,849 UART: [art] Populate DV Done
2,817,072 UART: [fht] FMC Alias Private Key: 7
2,818,026 UART: [art] Derive CDI
2,818,306 UART: [art] Store in in slot 0x4
2,903,965 UART: [art] Derive Key Pair
2,904,325 UART: [art] Store priv key in slot 0x5
2,917,635 UART: [art] Derive Key Pair - Done
2,932,418 UART: [art] Signing Cert with AUTHO
2,932,898 UART: RITY.KEYID = 7
2,948,356 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,121 UART: [art] PUB.X = 754E989A3DF7D4D8C3E7709225D23E8CB4828B0069AD69DCC76E1F3E45F0505387B5DE21DC5CF423B7615D758AECB5FE
2,955,881 UART: [art] PUB.Y = 78C561774CDAA454C510F04CC74E323237025FB3EA7A7C90BFFA46F84466BF7642663F2627E6CB683A4BA78022C2F704
2,962,827 UART: [art] SIG.R = 70FE026F485093379B20B97FCE5B63A450471E78F353E2EB61ECED7DED1D9C665C23EEE3B725515A212107376D6E3EF9
2,969,597 UART: [art] SIG.S = 4A08F417F4069411A74DE2BAC664E8DAC3C29E65FA062FB535AA98BC4FC5268D1547B130109DC00317188004F3F378B1
2,993,175 UART: Caliptra RT
2,993,520 UART: [state] CFI Enabled
3,101,989 UART: [rt] RT listening for mailbox commands...
3,102,659 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,497 UART: [rt]cmd =0x44504543, len=20
3,153,283 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,783 UART: [state] WD Timer not started. Device not locked for debugging
88,014 UART: [kat] SHA2-256
891,564 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,693 UART: [kat] ++
895,845 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,750 UART: [kat] SHA2-512-ACC
906,651 UART: [kat] ECC-384
916,458 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,170,311 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,391 UART: [idev] ++
1,173,559 UART: [idev] CDI.KEYID = 6
1,173,920 UART: [idev] SUBJECT.KEYID = 7
1,174,345 UART: [idev] UDS.KEYID = 0
1,174,691 ready_for_fw is high
1,174,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,609 UART: [idev] Erasing UDS.KEYID = 0
1,199,657 UART: [idev] Sha1 KeyId Algorithm
1,208,673 UART: [idev] --
1,209,622 UART: [ldev] ++
1,209,790 UART: [ldev] CDI.KEYID = 6
1,210,154 UART: [ldev] SUBJECT.KEYID = 5
1,210,581 UART: [ldev] AUTHORITY.KEYID = 7
1,211,044 UART: [ldev] FE.KEYID = 1
1,216,396 UART: [ldev] Erasing FE.KEYID = 1
1,242,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,602 UART: [ldev] --
1,282,032 UART: [fwproc] Wait for Commands...
1,282,831 UART: [fwproc] Recv command 0x46574c44
1,283,564 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,129 >>> mbox cmd response: success
2,772,360 UART: [afmc] ++
2,772,528 UART: [afmc] CDI.KEYID = 6
2,772,891 UART: [afmc] SUBJECT.KEYID = 7
2,773,317 UART: [afmc] AUTHORITY.KEYID = 5
2,809,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,489 UART: [afmc] --
2,852,529 UART: [cold-reset] --
2,853,307 UART: [state] Locking Datavault
2,854,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,908 UART: [state] Locking ICCM
2,855,412 UART: [exit] Launching FMC @ 0x40000130
2,860,741 UART:
2,860,757 UART: Running Caliptra FMC ...
2,861,165 UART:
2,861,219 UART: [state] CFI Enabled
2,872,094 UART: [fht] FMC Alias Private Key: 7
2,980,247 UART: [art] Extend RT PCRs Done
2,980,675 UART: [art] Lock RT PCRs Done
2,982,445 UART: [art] Populate DV Done
2,990,558 UART: [fht] FMC Alias Private Key: 7
2,991,570 UART: [art] Derive CDI
2,991,850 UART: [art] Store in in slot 0x4
3,077,531 UART: [art] Derive Key Pair
3,077,891 UART: [art] Store priv key in slot 0x5
3,091,261 UART: [art] Derive Key Pair - Done
3,105,943 UART: [art] Signing Cert with AUTHO
3,106,423 UART: RITY.KEYID = 7
3,121,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,168 UART: [art] PUB.X = A35D1D85CE8932D032B8933462A06243B8B456F1912E328DEAE4822978B155BD0686A4BD51206101AABDE51E8B032588
3,128,925 UART: [art] PUB.Y = E63E341991324BA99357E50A3633A13B3A587C462604FEE39C97E53AAE598B6FB74720C4C2E210D68D715EF7842DF652
3,135,867 UART: [art] SIG.R = 2B2B7ED47E9A95509F9CCC47F8C28A4D0E5B52787732704880F6B20835CFBAD5749D20839BCE00AB4BAFBBF43B1F32FA
3,142,625 UART: [art] SIG.S = 64AD77D2061AF2A4D132633BB9CB8057F90F6781EBA048A05D189710832979BBC179CBB19EA1EFC1F7C71A2A0F539956
3,166,253 UART: Caliptra RT
3,166,506 UART: [state] CFI Enabled
3,273,719 UART: [rt] RT listening for mailbox commands...
3,274,389 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,303 UART: [rt]cmd =0x44504543, len=20
3,324,997 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,438 ready_for_fw is high
1,056,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,405 >>> mbox cmd response: success
2,681,525 UART:
2,681,541 UART: Running Caliptra FMC ...
2,681,949 UART:
2,682,003 UART: [state] CFI Enabled
2,692,702 UART: [fht] FMC Alias Private Key: 7
2,800,789 UART: [art] Extend RT PCRs Done
2,801,217 UART: [art] Lock RT PCRs Done
2,802,581 UART: [art] Populate DV Done
2,810,568 UART: [fht] FMC Alias Private Key: 7
2,811,638 UART: [art] Derive CDI
2,811,918 UART: [art] Store in in slot 0x4
2,897,481 UART: [art] Derive Key Pair
2,897,841 UART: [art] Store priv key in slot 0x5
2,911,161 UART: [art] Derive Key Pair - Done
2,925,815 UART: [art] Signing Cert with AUTHO
2,926,295 UART: RITY.KEYID = 7
2,940,949 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,714 UART: [art] PUB.X = E5F84DD251100E0FDCEDDD1A89D7877A3F069F9741AC00D210E2753FBD87BEC9564936DB846DBE347BECF7A67DE10BF3
2,948,470 UART: [art] PUB.Y = 07805C309C4572C5666412CDB240B6C391E728DA5700AACD3C93969CA60582FCC2CD474BD6B9E3D42923643E42DC484C
2,955,394 UART: [art] SIG.R = 079DC7F3B7FAD0645F9D4D8716F96BA9ABDA73B991B6C05E6483364145AE1CE0BB81437D606A10DB6C102B270DA47EF3
2,962,170 UART: [art] SIG.S = BD73E57B9FFC1C60D995F6EA7937DB30CC1A0FC421415C451DC4D32BCB633627C605A41B2F86EB2D11FBB2DA7AA8A8C8
2,985,757 UART: Caliptra RT
2,986,010 UART: [state] CFI Enabled
3,092,465 UART: [rt] RT listening for mailbox commands...
3,093,135 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,139 UART: [rt]cmd =0x44504543, len=20
3,143,755 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,931 UART: [state] LifecycleState = Unprovisioned
86,586 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,062 UART: [kat] ++
896,214 UART: [kat] sha1
900,294 UART: [kat] SHA2-256
902,234 UART: [kat] SHA2-384
904,857 UART: [kat] SHA2-512-ACC
906,758 UART: [kat] ECC-384
916,241 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,170,410 UART: [cold-reset] ++
1,170,982 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 ready_for_fw is high
1,175,046 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,948 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,361 UART: [ldev] SUBJECT.KEYID = 5
1,210,788 UART: [ldev] AUTHORITY.KEYID = 7
1,211,251 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,101 UART: [fwproc] Wait for Commands...
1,282,858 UART: [fwproc] Recv command 0x46574c44
1,283,591 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,773 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,656 >>> mbox cmd response: success
2,772,695 UART: [afmc] ++
2,772,863 UART: [afmc] CDI.KEYID = 6
2,773,226 UART: [afmc] SUBJECT.KEYID = 7
2,773,652 UART: [afmc] AUTHORITY.KEYID = 5
2,809,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,933 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,868 UART: [afmc] --
2,852,798 UART: [cold-reset] --
2,853,722 UART: [state] Locking Datavault
2,854,981 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,585 UART: [state] Locking ICCM
2,856,199 UART: [exit] Launching FMC @ 0x40000130
2,861,528 UART:
2,861,544 UART: Running Caliptra FMC ...
2,861,952 UART:
2,862,095 UART: [state] CFI Enabled
2,872,670 UART: [fht] FMC Alias Private Key: 7
2,980,467 UART: [art] Extend RT PCRs Done
2,980,895 UART: [art] Lock RT PCRs Done
2,982,551 UART: [art] Populate DV Done
2,991,114 UART: [fht] FMC Alias Private Key: 7
2,992,188 UART: [art] Derive CDI
2,992,468 UART: [art] Store in in slot 0x4
3,078,181 UART: [art] Derive Key Pair
3,078,541 UART: [art] Store priv key in slot 0x5
3,091,511 UART: [art] Derive Key Pair - Done
3,106,474 UART: [art] Signing Cert with AUTHO
3,106,954 UART: RITY.KEYID = 7
3,122,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,425 UART: [art] PUB.X = 959E7517F8E73E02C37CEE79017D033D48CAA81650215E324B30F8CF108D5C9B18A09E251F20C2F7728BB297C036ED7C
3,130,188 UART: [art] PUB.Y = 5F57931E489F8D603963059335EEFA0532D16AAFE447D9B774C56EFA4EBCCAA125A4CC6F2322B00ED31CF12A85255C35
3,137,139 UART: [art] SIG.R = BE2FA7D85E55A1A933165CFEF65E1B181E314C7C704DA629B1BC89E5960194E0C2DF3CB1983379DFAB725D2F0E7391D6
3,143,915 UART: [art] SIG.S = 28995FC7C2D65FEA61B02743320FCBE1338A52AAF3FD215CC85FEC5F983A66120A95F7EDBBD539127567B4E2C16A219A
3,167,572 UART: Caliptra RT
3,167,917 UART: [state] CFI Enabled
3,275,810 UART: [rt] RT listening for mailbox commands...
3,276,480 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,712 UART: [rt]cmd =0x44504543, len=20
3,327,708 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,693 ready_for_fw is high
1,056,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,450 >>> mbox cmd response: success
2,683,980 UART:
2,683,996 UART: Running Caliptra FMC ...
2,684,404 UART:
2,684,547 UART: [state] CFI Enabled
2,695,444 UART: [fht] FMC Alias Private Key: 7
2,803,529 UART: [art] Extend RT PCRs Done
2,803,957 UART: [art] Lock RT PCRs Done
2,805,605 UART: [art] Populate DV Done
2,813,754 UART: [fht] FMC Alias Private Key: 7
2,814,744 UART: [art] Derive CDI
2,815,024 UART: [art] Store in in slot 0x4
2,900,923 UART: [art] Derive Key Pair
2,901,283 UART: [art] Store priv key in slot 0x5
2,914,269 UART: [art] Derive Key Pair - Done
2,928,773 UART: [art] Signing Cert with AUTHO
2,929,253 UART: RITY.KEYID = 7
2,944,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,100 UART: [art] PUB.X = 9BD2469606DFC5533D0C2879CD588690E88DE37920287C966D60132C67BD0C772EB47663C73BC3E7588F1289DF112B86
2,951,855 UART: [art] PUB.Y = 3492A944F0C3AFA3270D8CF02DFA1BC3385908B9DC1E2151EE3A926812AAD44462CB8361DE78A2A02FB7668C44BE1BD9
2,958,811 UART: [art] SIG.R = E54EB5D382E0EFDA062E4EDDB79F4A425555BE280D0759DA392A20EC4E483DAF358C301997D913A9BE991E8B881524E8
2,965,582 UART: [art] SIG.S = 7C13F747D46E8960942832EABDF09A483294B38537450BB407150A15716D29CCB6BF1AE8A31D05B3DED815058C624625
2,989,470 UART: Caliptra RT
2,989,815 UART: [state] CFI Enabled
3,097,722 UART: [rt] RT listening for mailbox commands...
3,098,392 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,260 UART: [rt]cmd =0x44504543, len=20
3,148,748 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,051 UART:
192,442 UART: Running Caliptra ROM ...
193,633 UART:
193,784 UART: [state] CFI Enabled
264,962 UART: [state] LifecycleState = Unprovisioned
266,951 UART: [state] DebugLocked = No
269,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,671 UART: [kat] SHA2-256
444,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,884 UART: [kat] ++
455,330 UART: [kat] sha1
467,191 UART: [kat] SHA2-256
469,890 UART: [kat] SHA2-384
476,597 UART: [kat] SHA2-512-ACC
478,961 UART: [kat] ECC-384
2,767,933 UART: [kat] HMAC-384Kdf
2,798,730 UART: [kat] LMS
3,989,043 UART: [kat] --
3,991,782 UART: [cold-reset] ++
3,993,221 UART: [fht] Storing FHT @ 0x50003400
4,003,701 UART: [idev] ++
4,004,336 UART: [idev] CDI.KEYID = 6
4,005,261 UART: [idev] SUBJECT.KEYID = 7
4,006,504 UART: [idev] UDS.KEYID = 0
4,007,547 ready_for_fw is high
4,007,746 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,150,928 UART: [idev] Erasing UDS.KEYID = 0
7,347,761 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,982 UART: [idev] --
7,372,576 UART: [ldev] ++
7,373,148 UART: [ldev] CDI.KEYID = 6
7,374,117 UART: [ldev] SUBJECT.KEYID = 5
7,375,267 UART: [ldev] AUTHORITY.KEYID = 7
7,376,618 UART: [ldev] FE.KEYID = 1
7,424,245 UART: [ldev] Erasing FE.KEYID = 1
10,753,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,912 UART: [ldev] --
13,119,702 UART: [fwproc] Waiting for Commands...
13,122,818 UART: [fwproc] Received command 0x46574c44
13,124,992 UART: [fwproc] Received Image of size 113844 bytes
17,167,615 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,124 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,033 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,622,876 >>> mbox cmd response: success
17,626,592 UART: [afmc] ++
17,627,204 UART: [afmc] CDI.KEYID = 6
17,628,111 UART: [afmc] SUBJECT.KEYID = 7
17,629,325 UART: [afmc] AUTHORITY.KEYID = 5
20,986,831 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,290,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,292,331 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,721 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,577 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,336,015 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,128 UART: [afmc] --
23,360,567 UART: [cold-reset] --
23,365,669 UART: [state] Locking Datavault
23,370,476 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,236 UART: [state] Locking ICCM
23,374,898 UART: [exit] Launching FMC @ 0x40000130
23,383,289 UART:
23,383,536 UART: Running Caliptra FMC ...
23,384,558 UART:
23,384,698 UART: [state] CFI Enabled
23,449,700 UART: [fht] FMC Alias Private Key: 7
25,787,629 UART: [art] Extend RT PCRs Done
25,789,214 UART: [art] Lock RT PCRs Done
25,790,502 UART: [art] Populate DV Done
25,795,990 UART: [fht] FMC Alias Private Key: 7
25,797,530 UART: [art] Derive CDI
25,798,262 UART: [art] Store in in slot 0x4
25,859,258 UART: [art] Derive Key Pair
25,860,294 UART: [art] Store priv key in slot 0x5
29,153,890 UART: [art] Derive Key Pair - Done
29,167,079 UART: [art] Signing Cert with AUTHO
29,168,401 UART: RITY.KEYID = 7
31,455,479 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,008 UART: [art] PUB.X = 2F1723FF4E32D69EF6CA471C5279A3E2CCF4F32CDABD1B70B0972C4D72800CAC793AB67B69CA451CDB8FF1E073A8C1C6
31,464,244 UART: [art] PUB.Y = BB7E7046A02D942671F344734B8E5AFB5616B540C7EE175856F84EA17737D842CEEF4BE542806F7D79511CA28540BD87
31,471,495 UART: [art] SIG.R = 4C85A2DE6093A320E13776C3CCAF61940CFF86E651A232672A0671F18AA59C111783756EC6BDBFB598EB44A9A0018841
31,478,853 UART: [art] SIG.S = 0616A39327BBBA22517F5D2D4A6B12DBEAEB1269FA9A85419FEA6341035D5CB473BE79A20E3794588A758860538D6A10
32,784,572 UART: Caliptra RT
32,785,283 UART: [state] CFI Enabled
32,945,601 UART: [rt] RT listening for mailbox commands...
32,947,566 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,978,659 UART: [rt]cmd =0x44504543, len=40
33,020,137 >>> mbox cmd response data (40 bytes)
33,021,667 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,051,799 UART: [rt]cmd =0x44504543, len=40
33,073,838 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,784,242 ready_for_fw is high
3,784,614 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,860,885 >>> mbox cmd response: success
23,544,438 UART:
23,544,821 UART: Running Caliptra FMC ...
23,546,017 UART:
23,546,182 UART: [state] CFI Enabled
23,615,433 UART: [fht] FMC Alias Private Key: 7
25,953,099 UART: [art] Extend RT PCRs Done
25,954,328 UART: [art] Lock RT PCRs Done
25,955,785 UART: [art] Populate DV Done
25,961,352 UART: [fht] FMC Alias Private Key: 7
25,962,884 UART: [art] Derive CDI
25,963,691 UART: [art] Store in in slot 0x4
26,023,873 UART: [art] Derive Key Pair
26,024,913 UART: [art] Store priv key in slot 0x5
29,318,067 UART: [art] Derive Key Pair - Done
29,331,226 UART: [art] Signing Cert with AUTHO
29,332,526 UART: RITY.KEYID = 7
31,619,879 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,382 UART: [art] PUB.X = 982B4615CC4FCEDCC2D3978B02E3EDD195845FCFA2DA1F3A9B355F3AB583823596A1F85B48C51AA71BB3093B0BCA7122
31,628,697 UART: [art] PUB.Y = 0EFA8B1BCE98E7C97AF233160B38B3DA9E448192AAFF8FA717D241CBE6F8CBC84D5A51A54787F5B165AC2A3EC8F5E8F8
31,635,949 UART: [art] SIG.R = 56316BBC1840E5B2C0B67EB62329D5305C2BDA57030B9A3D3B67087CF2B31502AF1F67EC1201C40117C51EE11C5349BF
31,643,364 UART: [art] SIG.S = 64CD9DC5E6000D09C5BBE9D5E9312273B121EAF764050862D8FB029F6CA255660B030C82DAFD84D858EEEE1D6AFEF6BF
32,947,968 UART: Caliptra RT
32,948,662 UART: [state] CFI Enabled
33,110,796 UART: [rt] RT listening for mailbox commands...
33,112,710 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,143,479 UART: [rt]cmd =0x44504543, len=40
33,184,649 >>> mbox cmd response data (40 bytes)
33,185,806 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,215,795 UART: [rt]cmd =0x44504543, len=40
33,237,781 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,471 UART:
192,836 UART: Running Caliptra ROM ...
193,958 UART:
603,860 UART: [state] CFI Enabled
620,806 UART: [state] LifecycleState = Unprovisioned
622,759 UART: [state] DebugLocked = No
624,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,649 UART: [kat] SHA2-256
799,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,907 UART: [kat] ++
810,356 UART: [kat] sha1
820,312 UART: [kat] SHA2-256
823,031 UART: [kat] SHA2-384
828,985 UART: [kat] SHA2-512-ACC
831,326 UART: [kat] ECC-384
3,115,786 UART: [kat] HMAC-384Kdf
3,127,656 UART: [kat] LMS
4,317,771 UART: [kat] --
4,321,078 UART: [cold-reset] ++
4,323,225 UART: [fht] Storing FHT @ 0x50003400
4,334,854 UART: [idev] ++
4,335,425 UART: [idev] CDI.KEYID = 6
4,336,359 UART: [idev] SUBJECT.KEYID = 7
4,337,609 UART: [idev] UDS.KEYID = 0
4,338,658 ready_for_fw is high
4,338,879 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,906 UART: [idev] Erasing UDS.KEYID = 0
7,626,915 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,720 UART: [idev] --
7,652,625 UART: [ldev] ++
7,653,201 UART: [ldev] CDI.KEYID = 6
7,654,138 UART: [ldev] SUBJECT.KEYID = 5
7,655,306 UART: [ldev] AUTHORITY.KEYID = 7
7,656,656 UART: [ldev] FE.KEYID = 1
7,668,874 UART: [ldev] Erasing FE.KEYID = 1
10,957,621 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,878 UART: [ldev] --
13,317,017 UART: [fwproc] Waiting for Commands...
13,319,225 UART: [fwproc] Received command 0x46574c44
13,321,436 UART: [fwproc] Received Image of size 113844 bytes
17,376,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,178 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,076 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,843,438 >>> mbox cmd response: success
17,848,194 UART: [afmc] ++
17,848,797 UART: [afmc] CDI.KEYID = 6
17,849,715 UART: [afmc] SUBJECT.KEYID = 7
17,850,932 UART: [afmc] AUTHORITY.KEYID = 5
21,170,052 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,470 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,891 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,688 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,148 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,442 UART: [afmc] --
23,532,195 UART: [cold-reset] --
23,536,920 UART: [state] Locking Datavault
23,541,429 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,187 UART: [state] Locking ICCM
23,545,608 UART: [exit] Launching FMC @ 0x40000130
23,554,028 UART:
23,554,274 UART: Running Caliptra FMC ...
23,555,395 UART:
23,555,553 UART: [state] CFI Enabled
23,563,761 UART: [fht] FMC Alias Private Key: 7
25,894,515 UART: [art] Extend RT PCRs Done
25,895,734 UART: [art] Lock RT PCRs Done
25,897,089 UART: [art] Populate DV Done
25,902,624 UART: [fht] FMC Alias Private Key: 7
25,904,104 UART: [art] Derive CDI
25,904,860 UART: [art] Store in in slot 0x4
25,947,294 UART: [art] Derive Key Pair
25,948,335 UART: [art] Store priv key in slot 0x5
29,190,335 UART: [art] Derive Key Pair - Done
29,203,266 UART: [art] Signing Cert with AUTHO
29,204,572 UART: RITY.KEYID = 7
31,484,001 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,505 UART: [art] PUB.X = 86897076153B6D3B7FB9D61F1DA2A5F54CB94EB4071CC6D137207320ECBFA88BAA6B011531E8FCA0AAD0293EA0678A78
31,492,714 UART: [art] PUB.Y = 936C65FDC4C1DBA31D673611A76AA8012AE5D7602B8E678B26032364ECC721C15D3978CC30F77E6821AE5BC94456DAD9
31,500,009 UART: [art] SIG.R = BC0692EFB2A3C39188BD876E9CA8813E0B3888E342E4A474B60BAD29DC7DCD5F95C82BB0269E96390CAE8F4178ADBCBD
31,507,363 UART: [art] SIG.S = 3BEA032774751BDD3322015687E1CEA7DD29337CF51D77C9322906DB3E56A37157E9BF9E4FC0F0D08E19584505BCEE9A
32,812,908 UART: Caliptra RT
32,813,612 UART: [state] CFI Enabled
32,930,742 UART: [rt] RT listening for mailbox commands...
32,932,644 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,963,506 UART: [rt]cmd =0x44504543, len=40
32,989,402 >>> mbox cmd response data (40 bytes)
32,990,624 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,020,781 UART: [rt]cmd =0x44504543, len=40
33,043,386 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
4,127,850 ready_for_fw is high
4,128,277 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,062,376 >>> mbox cmd response: success
23,704,620 UART:
23,705,020 UART: Running Caliptra FMC ...
23,706,159 UART:
23,706,324 UART: [state] CFI Enabled
23,714,435 UART: [fht] FMC Alias Private Key: 7
26,045,311 UART: [art] Extend RT PCRs Done
26,046,537 UART: [art] Lock RT PCRs Done
26,048,068 UART: [art] Populate DV Done
26,053,655 UART: [fht] FMC Alias Private Key: 7
26,055,315 UART: [art] Derive CDI
26,056,089 UART: [art] Store in in slot 0x4
26,098,855 UART: [art] Derive Key Pair
26,099,859 UART: [art] Store priv key in slot 0x5
29,341,967 UART: [art] Derive Key Pair - Done
29,354,909 UART: [art] Signing Cert with AUTHO
29,356,211 UART: RITY.KEYID = 7
31,635,265 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,767 UART: [art] PUB.X = D2BC6627C398F252638338B931F9C641C87BF47D07B7697A316ECDA488066E04F1FED705629F13FE40E284E467540D4F
31,644,031 UART: [art] PUB.Y = 50CF48010D4B9F8A0873CDF0B6B4993D0AF05CAF583FDE158D431C3C1DDDD32B576A86F5B4E828E745BDE1A86D4FFEE4
31,651,286 UART: [art] SIG.R = C6F518485F0A73F001DAC18E26A1F6F1ED425C20D40129036B1C30F6C028D7576865A12EF11CEB8AEDA7E421381F30FF
31,658,673 UART: [art] SIG.S = 9E2F65A1B681D519CB4D8E164DE6150DEBE0959DF3FD44C7A3C16CAD6D35FCE0BB9F4DB9764412E8339CF866B4E94587
32,963,858 UART: Caliptra RT
32,964,562 UART: [state] CFI Enabled
33,082,311 UART: [rt] RT listening for mailbox commands...
33,084,213 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,114,931 UART: [rt]cmd =0x44504543, len=40
33,141,533 >>> mbox cmd response data (40 bytes)
33,142,625 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,172,850 UART: [rt]cmd =0x44504543, len=40
33,195,778 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,183 UART:
192,545 UART: Running Caliptra ROM ...
193,659 UART:
193,803 UART: [state] CFI Enabled
261,475 UART: [state] LifecycleState = Unprovisioned
263,402 UART: [state] DebugLocked = No
265,993 UART: [state] WD Timer not started. Device not locked for debugging
270,173 UART: [kat] SHA2-256
449,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,941 UART: [kat] ++
461,394 UART: [kat] sha1
472,292 UART: [kat] SHA2-256
475,275 UART: [kat] SHA2-384
481,274 UART: [kat] SHA2-512-ACC
484,207 UART: [kat] ECC-384
2,949,504 UART: [kat] HMAC-384Kdf
2,972,391 UART: [kat] LMS
3,501,861 UART: [kat] --
3,505,452 UART: [cold-reset] ++
3,507,120 UART: [fht] FHT @ 0x50003400
3,517,996 UART: [idev] ++
3,518,561 UART: [idev] CDI.KEYID = 6
3,519,516 UART: [idev] SUBJECT.KEYID = 7
3,520,686 UART: [idev] UDS.KEYID = 0
3,521,656 ready_for_fw is high
3,521,862 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,288 UART: [idev] Erasing UDS.KEYID = 0
6,023,983 UART: [idev] Sha1 KeyId Algorithm
6,047,911 UART: [idev] --
6,052,288 UART: [ldev] ++
6,052,861 UART: [ldev] CDI.KEYID = 6
6,053,790 UART: [ldev] SUBJECT.KEYID = 5
6,055,010 UART: [ldev] AUTHORITY.KEYID = 7
6,056,248 UART: [ldev] FE.KEYID = 1
6,100,230 UART: [ldev] Erasing FE.KEYID = 1
8,604,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,157 UART: [ldev] --
10,413,420 UART: [fwproc] Wait for Commands...
10,416,484 UART: [fwproc] Recv command 0x46574c44
10,418,572 UART: [fwproc] Recv'd Img size: 114168 bytes
13,821,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,283,648 >>> mbox cmd response: success
14,287,596 UART: [afmc] ++
14,288,190 UART: [afmc] CDI.KEYID = 6
14,289,106 UART: [afmc] SUBJECT.KEYID = 7
14,290,267 UART: [afmc] AUTHORITY.KEYID = 5
16,829,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,900 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,962 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,830 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,620,211 UART: [afmc] --
18,624,130 UART: [cold-reset] --
18,626,813 UART: [state] Locking Datavault
18,632,152 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,814 UART: [state] Locking ICCM
18,634,945 UART: [exit] Launching FMC @ 0x40000130
18,643,345 UART:
18,643,580 UART: Running Caliptra FMC ...
18,644,679 UART:
18,644,840 UART: [state] CFI Enabled
18,709,853 UART: [fht] FMC Alias Private Key: 7
20,474,051 UART: [art] Extend RT PCRs Done
20,475,289 UART: [art] Lock RT PCRs Done
20,477,298 UART: [art] Populate DV Done
20,482,919 UART: [fht] FMC Alias Private Key: 7
20,484,418 UART: [art] Derive CDI
20,485,237 UART: [art] Store in in slot 0x4
20,542,922 UART: [art] Derive Key Pair
20,543,921 UART: [art] Store priv key in slot 0x5
23,006,410 UART: [art] Derive Key Pair - Done
23,019,415 UART: [art] Signing Cert with AUTHO
23,020,727 UART: RITY.KEYID = 7
24,732,361 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,860 UART: [art] PUB.X = 40E80E024192B7E7BFBC8065819BA6343605F098ECEFCCD2900D707CC5B70BAB4DEF6E0E0D64BB1FCED77816F8511C13
24,741,170 UART: [art] PUB.Y = 2E0E208E481084C9D810E24650DD649DAD08A84EC90F249F300C61F1844F45BD5017D00A621E5863B919F214B6406C5C
24,748,407 UART: [art] SIG.R = B32DB40C2821CC3B1974F90F37835EC53DC8DDDA1195A49CB81882A3406B72FCBD5BCC659A282445E8816760347C385C
24,755,788 UART: [art] SIG.S = D18D9592E9F647E1CAD3B9A701DF8C59E80ACFC44B0E52356697101A8AE4E207C4A38C0AAAB6DED174CE60151B555A83
25,735,614 UART: Caliptra RT
25,736,313 UART: [state] CFI Enabled
25,900,243 UART: [rt] RT listening for mailbox commands...
25,902,154 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,932,789 UART: [rt]cmd =0x44504543, len=40
25,974,683 >>> mbox cmd response data (40 bytes)
25,975,740 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,006,013 UART: [rt]cmd =0x44504543, len=40
26,028,477 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,380,737 ready_for_fw is high
3,381,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,039,543 >>> mbox cmd response: success
18,326,039 UART:
18,326,465 UART: Running Caliptra FMC ...
18,327,571 UART:
18,327,724 UART: [state] CFI Enabled
18,390,809 UART: [fht] FMC Alias Private Key: 7
20,155,002 UART: [art] Extend RT PCRs Done
20,156,231 UART: [art] Lock RT PCRs Done
20,157,938 UART: [art] Populate DV Done
20,163,369 UART: [fht] FMC Alias Private Key: 7
20,164,909 UART: [art] Derive CDI
20,165,642 UART: [art] Store in in slot 0x4
20,223,490 UART: [art] Derive Key Pair
20,224,489 UART: [art] Store priv key in slot 0x5
22,687,547 UART: [art] Derive Key Pair - Done
22,700,706 UART: [art] Signing Cert with AUTHO
22,702,015 UART: RITY.KEYID = 7
24,413,252 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,764 UART: [art] PUB.X = C864A98F2ADB43E4555597D4EB50CC466D7BEBB4663154BF95946C539384C082A3252B36A277B5C5CAF8E41FAB65C61B
24,422,002 UART: [art] PUB.Y = DBE2AC7DEE2B7C2CC6F4EAB376F74177D8E82C520DAED76D7AE8C53B5285550B7FFF85C535F09E23B0C84714057F8820
24,429,295 UART: [art] SIG.R = 607F314DA94E9227C8A0F44AD6D527DA6010964ACC0AD0D14F48D9F6440FC60800665FC3E43C32581009E3049FC82BF2
24,436,635 UART: [art] SIG.S = 00C83803D0970A68ED32E95C32EE6FFE9F68F5FE6FFF50BA55AA8F427501617B5ACCAAC4A6E71963D2AD8B65C4174172
25,415,421 UART: Caliptra RT
25,416,137 UART: [state] CFI Enabled
25,580,749 UART: [rt] RT listening for mailbox commands...
25,582,695 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,613,606 UART: [rt]cmd =0x44504543, len=40
25,654,579 >>> mbox cmd response data (40 bytes)
25,655,732 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,685,644 UART: [rt]cmd =0x44504543, len=40
25,708,195 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,729 writing to cptra_bootfsm_go
193,011 UART:
193,386 UART: Running Caliptra ROM ...
194,550 UART:
604,091 UART: [state] CFI Enabled
619,713 UART: [state] LifecycleState = Unprovisioned
621,599 UART: [state] DebugLocked = No
623,755 UART: [state] WD Timer not started. Device not locked for debugging
626,719 UART: [kat] SHA2-256
805,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,434 UART: [kat] ++
817,904 UART: [kat] sha1
829,558 UART: [kat] SHA2-256
832,578 UART: [kat] SHA2-384
838,786 UART: [kat] SHA2-512-ACC
841,798 UART: [kat] ECC-384
3,282,996 UART: [kat] HMAC-384Kdf
3,294,669 UART: [kat] LMS
3,824,201 UART: [kat] --
3,829,819 UART: [cold-reset] ++
3,831,165 UART: [fht] FHT @ 0x50003400
3,842,099 UART: [idev] ++
3,842,676 UART: [idev] CDI.KEYID = 6
3,843,564 UART: [idev] SUBJECT.KEYID = 7
3,844,807 UART: [idev] UDS.KEYID = 0
3,845,745 ready_for_fw is high
3,845,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,436 UART: [idev] Erasing UDS.KEYID = 0
6,316,934 UART: [idev] Sha1 KeyId Algorithm
6,340,490 UART: [idev] --
6,344,500 UART: [ldev] ++
6,345,082 UART: [ldev] CDI.KEYID = 6
6,346,003 UART: [ldev] SUBJECT.KEYID = 5
6,347,169 UART: [ldev] AUTHORITY.KEYID = 7
6,348,404 UART: [ldev] FE.KEYID = 1
6,359,155 UART: [ldev] Erasing FE.KEYID = 1
8,828,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,572 UART: [ldev] --
10,619,814 UART: [fwproc] Wait for Commands...
10,622,884 UART: [fwproc] Recv command 0x46574c44
10,624,979 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,385 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,169 >>> mbox cmd response: success
14,490,635 UART: [afmc] ++
14,491,237 UART: [afmc] CDI.KEYID = 6
14,492,147 UART: [afmc] SUBJECT.KEYID = 7
14,493,306 UART: [afmc] AUTHORITY.KEYID = 5
16,991,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,124 UART: [afmc] --
18,790,283 UART: [cold-reset] --
18,794,144 UART: [state] Locking Datavault
18,797,709 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,360 UART: [state] Locking ICCM
18,801,029 UART: [exit] Launching FMC @ 0x40000130
18,809,484 UART:
18,809,720 UART: Running Caliptra FMC ...
18,810,819 UART:
18,810,982 UART: [state] CFI Enabled
18,818,948 UART: [fht] FMC Alias Private Key: 7
20,575,675 UART: [art] Extend RT PCRs Done
20,576,895 UART: [art] Lock RT PCRs Done
20,578,435 UART: [art] Populate DV Done
20,583,643 UART: [fht] FMC Alias Private Key: 7
20,585,297 UART: [art] Derive CDI
20,586,111 UART: [art] Store in in slot 0x4
20,628,651 UART: [art] Derive Key Pair
20,629,649 UART: [art] Store priv key in slot 0x5
23,056,337 UART: [art] Derive Key Pair - Done
23,069,222 UART: [art] Signing Cert with AUTHO
23,070,534 UART: RITY.KEYID = 7
24,776,275 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,778 UART: [art] PUB.X = BC301A8702E4DC2A4A42AD8716EC18B456CFFC7C2204073C72886086600A8E3F5B05C30AD2A23A609A7463E37028BE8C
24,785,036 UART: [art] PUB.Y = F890DEC99138E81B90BE3ADC9CA16AB360E251632C1E34E061B2EFACC19C5E86F7DC9BE308F70B0B6D820BA583055F1B
24,792,328 UART: [art] SIG.R = 2EC02F89C839E0B563F41AD7CF2CEE047EF2607BF80A802E27A10B0D03FD70A312ADC6F57337D503CC54C2CD85694DC3
24,799,753 UART: [art] SIG.S = 1AAA12854C0B0B309BE0028A16B7A81F9CE1FE1304F20E0A33BD6DD9BAD032FBAE177F660C8E52B49920381D5C7C07A0
25,779,265 UART: Caliptra RT
25,779,977 UART: [state] CFI Enabled
25,897,256 UART: [rt] RT listening for mailbox commands...
25,899,169 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,930,092 UART: [rt]cmd =0x44504543, len=40
25,956,514 >>> mbox cmd response data (40 bytes)
25,957,755 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,988,014 UART: [rt]cmd =0x44504543, len=40
26,010,588 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
3,694,625 ready_for_fw is high
3,695,250 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,279,234 >>> mbox cmd response: success
18,533,868 UART:
18,534,264 UART: Running Caliptra FMC ...
18,535,459 UART:
18,535,632 UART: [state] CFI Enabled
18,543,250 UART: [fht] FMC Alias Private Key: 7
20,300,706 UART: [art] Extend RT PCRs Done
20,301,936 UART: [art] Lock RT PCRs Done
20,303,818 UART: [art] Populate DV Done
20,309,400 UART: [fht] FMC Alias Private Key: 7
20,311,051 UART: [art] Derive CDI
20,311,794 UART: [art] Store in in slot 0x4
20,354,344 UART: [art] Derive Key Pair
20,355,385 UART: [art] Store priv key in slot 0x5
22,782,228 UART: [art] Derive Key Pair - Done
22,795,026 UART: [art] Signing Cert with AUTHO
22,796,335 UART: RITY.KEYID = 7
24,501,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,471 UART: [art] PUB.X = C5DFB13968F2E20EEC9066B23016275F25B6CE86458D8BD03FD4C02ADA9FDE58632FD775952F28AF9C8196DF43F68C7A
24,510,790 UART: [art] PUB.Y = 5102CA34D746221FE40D0EBEB0CC84964469443280057D142328459D551D64E98CEA31A87982870B457C82A244479EFF
24,517,999 UART: [art] SIG.R = B01CF632F9C631D8C8A28D6C5555A3D65FF446D1EDB82EE7BC9C439535E2209BD8891E7733EF9A5AF327C1F35A9C5E55
24,525,403 UART: [art] SIG.S = EFAA5FEEC945986CA02D6C8A290989370B5D8B48A11B33917CFD50BC29DBC359261B8DDB8682B0D4B94C2A67EAC51649
25,504,010 UART: Caliptra RT
25,504,729 UART: [state] CFI Enabled
25,622,563 UART: [rt] RT listening for mailbox commands...
25,624,623 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,655,052 UART: [rt]cmd =0x44504543, len=40
25,681,312 >>> mbox cmd response data (40 bytes)
25,682,457 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,712,528 UART: [rt]cmd =0x44504543, len=40
25,735,412 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,007 UART:
192,396 UART: Running Caliptra ROM ...
193,540 UART:
193,692 UART: [state] CFI Enabled
263,337 UART: [state] LifecycleState = Unprovisioned
265,714 UART: [state] DebugLocked = No
267,825 UART: [state] WD Timer not started. Device not locked for debugging
272,627 UART: [kat] SHA2-256
462,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,281 UART: [kat] ++
473,728 UART: [kat] sha1
485,379 UART: [kat] SHA2-256
488,383 UART: [kat] SHA2-384
494,230 UART: [kat] SHA2-512-ACC
496,822 UART: [kat] ECC-384
2,946,990 UART: [kat] HMAC-384Kdf
2,972,961 UART: [kat] LMS
3,504,689 UART: [kat] --
3,510,909 UART: [cold-reset] ++
3,512,003 UART: [fht] FHT @ 0x50003400
3,524,623 UART: [idev] ++
3,525,329 UART: [idev] CDI.KEYID = 6
3,526,365 UART: [idev] SUBJECT.KEYID = 7
3,527,486 UART: [idev] UDS.KEYID = 0
3,528,426 ready_for_fw is high
3,528,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,332 UART: [idev] Erasing UDS.KEYID = 0
6,051,220 UART: [idev] Sha1 KeyId Algorithm
6,073,156 UART: [idev] --
6,077,908 UART: [ldev] ++
6,078,593 UART: [ldev] CDI.KEYID = 6
6,079,510 UART: [ldev] SUBJECT.KEYID = 5
6,080,728 UART: [ldev] AUTHORITY.KEYID = 7
6,081,913 UART: [ldev] FE.KEYID = 1
6,122,224 UART: [ldev] Erasing FE.KEYID = 1
8,627,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,396,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,432,451 UART: [ldev] --
10,438,625 UART: [fwproc] Wait for Commands...
10,440,896 UART: [fwproc] Recv command 0x46574c44
10,443,155 UART: [fwproc] Recv'd Img size: 114168 bytes
13,889,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,623,732 >>> mbox cmd response: success
14,628,446 UART: [afmc] ++
14,629,213 UART: [afmc] CDI.KEYID = 6
14,630,284 UART: [afmc] SUBJECT.KEYID = 7
14,631,852 UART: [afmc] AUTHORITY.KEYID = 5
17,174,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,993 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,102 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,140 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,902 UART: [afmc] --
18,970,987 UART: [cold-reset] --
18,974,752 UART: [state] Locking Datavault
18,978,936 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,096 UART: [state] Locking ICCM
18,983,850 UART: [exit] Launching FMC @ 0x40000130
18,992,492 UART:
18,992,762 UART: Running Caliptra FMC ...
18,993,797 UART:
18,993,946 UART: [state] CFI Enabled
19,054,209 UART: [fht] FMC Alias Private Key: 7
20,817,925 UART: [art] Extend RT PCRs Done
20,819,149 UART: [art] Lock RT PCRs Done
20,820,503 UART: [art] Populate DV Done
20,826,145 UART: [fht] FMC Alias Private Key: 7
20,827,790 UART: [art] Derive CDI
20,828,563 UART: [art] Store in in slot 0x4
20,886,534 UART: [art] Derive Key Pair
20,887,539 UART: [art] Store priv key in slot 0x5
23,351,050 UART: [art] Derive Key Pair - Done
23,364,267 UART: [art] Signing Cert with AUTHO
23,365,565 UART: RITY.KEYID = 7
25,075,672 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,188 UART: [art] PUB.X = C9BBB86DFF27E92E640F618C7726E47B3EB77887F381C2937CF61B0D3BAE574B30C4AC975E695733DE7B567A706A829C
25,084,459 UART: [art] PUB.Y = 8CE9B0C1EF47254F7F52672261D07E93367963E910EB7F49FA10EB25B1AA12C9D12A78D27E948598D14FE9D98422FAD2
25,091,720 UART: [art] SIG.R = A16E5912EFEFD3306043E87D4DB1D5E66DA5CEB0976598522C9DF6EF70DEB21B9A1A6D6C07D85284444AB9AC534A62F7
25,099,139 UART: [art] SIG.S = 625794AB77152C8B47FE5E97E9501E9602CD8F6129D224566093909C7580B4E795DAC2B6DD271E69642DE4D0B6A7097C
26,078,547 UART: Caliptra RT
26,079,242 UART: [state] CFI Enabled
26,242,639 UART: [rt] RT listening for mailbox commands...
26,244,564 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,275,164 UART: [rt]cmd =0x44504543, len=40
26,317,228 >>> mbox cmd response data (40 bytes)
26,318,461 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,348,477 UART: [rt]cmd =0x44504543, len=40
26,370,609 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,434,506 ready_for_fw is high
3,435,161 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,723,954 >>> mbox cmd response: success
19,024,131 UART:
19,024,523 UART: Running Caliptra FMC ...
19,025,667 UART:
19,025,835 UART: [state] CFI Enabled
19,092,544 UART: [fht] FMC Alias Private Key: 7
20,855,686 UART: [art] Extend RT PCRs Done
20,856,911 UART: [art] Lock RT PCRs Done
20,858,432 UART: [art] Populate DV Done
20,863,953 UART: [fht] FMC Alias Private Key: 7
20,865,661 UART: [art] Derive CDI
20,866,479 UART: [art] Store in in slot 0x4
20,925,956 UART: [art] Derive Key Pair
20,926,998 UART: [art] Store priv key in slot 0x5
23,389,850 UART: [art] Derive Key Pair - Done
23,402,680 UART: [art] Signing Cert with AUTHO
23,404,035 UART: RITY.KEYID = 7
25,115,632 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,140 UART: [art] PUB.X = E8D800EB77C3336731B610DCB67B56CCD931D1B107CDE23455A42A7D11BDAD2F299A4696AEC7E6532AAF4F70D19F9F61
25,124,427 UART: [art] PUB.Y = F13621739641AD5855BF7771D0C954309E9408082F01BF8C7B0FE594E4FF709D342D3877F8364A67B63123758BA2C31D
25,131,651 UART: [art] SIG.R = D3C26A417E85B6FEC942308F1E7A3F61A292B8F0877A7DB33523DB50622151C15E6F055D7844349B9A9949B4F7DDF47F
25,139,032 UART: [art] SIG.S = C1B40850CF966C9BB472EFD6450B67ABB651D3A986E03791C954203F6AF43C9B41E63887573697AD030F7DEA90E680BD
26,118,181 UART: Caliptra RT
26,118,872 UART: [state] CFI Enabled
26,283,768 UART: [rt] RT listening for mailbox commands...
26,285,668 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,316,511 UART: [rt]cmd =0x44504543, len=40
26,358,983 >>> mbox cmd response data (40 bytes)
26,360,184 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,390,009 UART: [rt]cmd =0x44504543, len=40
26,412,549 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
192,806 UART:
193,172 UART: Running Caliptra ROM ...
194,373 UART:
603,965 UART: [state] CFI Enabled
615,730 UART: [state] LifecycleState = Unprovisioned
618,101 UART: [state] DebugLocked = No
620,536 UART: [state] WD Timer not started. Device not locked for debugging
624,922 UART: [kat] SHA2-256
814,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,540 UART: [kat] ++
826,143 UART: [kat] sha1
837,523 UART: [kat] SHA2-256
840,596 UART: [kat] SHA2-384
846,301 UART: [kat] SHA2-512-ACC
848,888 UART: [kat] ECC-384
3,290,713 UART: [kat] HMAC-384Kdf
3,302,713 UART: [kat] LMS
3,834,541 UART: [kat] --
3,838,957 UART: [cold-reset] ++
3,839,894 UART: [fht] FHT @ 0x50003400
3,851,292 UART: [idev] ++
3,852,008 UART: [idev] CDI.KEYID = 6
3,853,047 UART: [idev] SUBJECT.KEYID = 7
3,854,174 UART: [idev] UDS.KEYID = 0
3,855,108 ready_for_fw is high
3,855,330 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,761 UART: [idev] Erasing UDS.KEYID = 0
6,335,043 UART: [idev] Sha1 KeyId Algorithm
6,356,321 UART: [idev] --
6,361,872 UART: [ldev] ++
6,362,609 UART: [ldev] CDI.KEYID = 6
6,363,520 UART: [ldev] SUBJECT.KEYID = 5
6,364,679 UART: [ldev] AUTHORITY.KEYID = 7
6,365,914 UART: [ldev] FE.KEYID = 1
6,377,477 UART: [ldev] Erasing FE.KEYID = 1
8,854,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,001 UART: [ldev] --
10,648,217 UART: [fwproc] Wait for Commands...
10,650,630 UART: [fwproc] Recv command 0x46574c44
10,652,880 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,068 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,220 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,828,360 >>> mbox cmd response: success
14,832,871 UART: [afmc] ++
14,833,587 UART: [afmc] CDI.KEYID = 6
14,834,754 UART: [afmc] SUBJECT.KEYID = 7
14,836,237 UART: [afmc] AUTHORITY.KEYID = 5
17,335,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,058,746 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,060,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,075,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,091,026 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,106,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,129,724 UART: [afmc] --
19,133,103 UART: [cold-reset] --
19,137,451 UART: [state] Locking Datavault
19,140,486 UART: [state] Locking PCR0, PCR1 and PCR31
19,142,676 UART: [state] Locking ICCM
19,145,202 UART: [exit] Launching FMC @ 0x40000130
19,153,878 UART:
19,154,116 UART: Running Caliptra FMC ...
19,155,145 UART:
19,155,299 UART: [state] CFI Enabled
19,163,674 UART: [fht] FMC Alias Private Key: 7
20,920,539 UART: [art] Extend RT PCRs Done
20,921,759 UART: [art] Lock RT PCRs Done
20,923,374 UART: [art] Populate DV Done
20,928,949 UART: [fht] FMC Alias Private Key: 7
20,930,645 UART: [art] Derive CDI
20,931,382 UART: [art] Store in in slot 0x4
20,974,142 UART: [art] Derive Key Pair
20,975,180 UART: [art] Store priv key in slot 0x5
23,402,426 UART: [art] Derive Key Pair - Done
23,415,199 UART: [art] Signing Cert with AUTHO
23,416,505 UART: RITY.KEYID = 7
25,121,628 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,133 UART: [art] PUB.X = 461D4DA59312A7A35F4448605CADEE1657C56A2C3599383555F97A00D111E4F9FDA4C6F9851D43E1ADB0320559B147B6
25,130,386 UART: [art] PUB.Y = F75215AC4DE18188010F76C56C37E89451B4201B9A1EB64210F7C1118F0FE6D0E61EEECA4FBD0BE76EA965F6EE47C826
25,137,669 UART: [art] SIG.R = CD266F227F85D665CF1AB1EDA106C067D85C1B07118754EB2B1E0B434EA0C2C1521D5FE84C023F682A1E1B07539BDA49
25,145,058 UART: [art] SIG.S = AFB997ADF6D682F564823FA482F8E6068037B80249E23775ED93983AB5591F01DC1F44C7C7AB564262FE02BEE22FC236
26,123,887 UART: Caliptra RT
26,124,603 UART: [state] CFI Enabled
26,242,399 UART: [rt] RT listening for mailbox commands...
26,244,316 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,274,789 UART: [rt]cmd =0x44504543, len=40
26,301,167 >>> mbox cmd response data (40 bytes)
26,302,420 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,332,522 UART: [rt]cmd =0x44504543, len=40
26,355,218 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,692 writing to cptra_bootfsm_go
3,758,151 ready_for_fw is high
3,758,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,957,918 >>> mbox cmd response: success
19,210,397 UART:
19,210,811 UART: Running Caliptra FMC ...
19,211,956 UART:
19,212,123 UART: [state] CFI Enabled
19,220,135 UART: [fht] FMC Alias Private Key: 7
20,977,079 UART: [art] Extend RT PCRs Done
20,978,299 UART: [art] Lock RT PCRs Done
20,980,356 UART: [art] Populate DV Done
20,985,885 UART: [fht] FMC Alias Private Key: 7
20,987,478 UART: [art] Derive CDI
20,988,217 UART: [art] Store in in slot 0x4
21,031,080 UART: [art] Derive Key Pair
21,032,154 UART: [art] Store priv key in slot 0x5
23,459,242 UART: [art] Derive Key Pair - Done
23,472,135 UART: [art] Signing Cert with AUTHO
23,473,432 UART: RITY.KEYID = 7
25,179,023 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,541 UART: [art] PUB.X = AB4F7400C78FEB13C37977FF1605E4228ABB38A41EA2DF7DCED4A3A21181BBB4862D6F5CFDC778872A5ABFA5A3B192A1
25,187,786 UART: [art] PUB.Y = F4765351089A88E0A3B44CF36330B4D10A3E2A2FCE4C56032E1308F8547D845106CE8FD9E91EC32E0E46CF8AA51661A4
25,195,077 UART: [art] SIG.R = 8928303EA582BF8C37A64D23E8E872437C8C61A44A506CDD97A7F1015EF1FEA6C3208BA8567B941FB307E3FD6DEEFEA2
25,202,471 UART: [art] SIG.S = 2E88FD38572A857739AC5E5363484514E1EC96F810CD4B5C787AFE36F1E96D55B3588E70C40851312ECCE7AB0D33BA12
26,181,287 UART: Caliptra RT
26,181,999 UART: [state] CFI Enabled
26,300,424 UART: [rt] RT listening for mailbox commands...
26,302,349 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,333,069 UART: [rt]cmd =0x44504543, len=40
26,359,061 >>> mbox cmd response data (40 bytes)
26,360,222 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,390,366 UART: [rt]cmd =0x44504543, len=40
26,412,700 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,115 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,645 UART: [kat] SHA2-256
881,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,691 UART: [kat] ++
885,843 UART: [kat] sha1
890,133 UART: [kat] SHA2-256
892,071 UART: [kat] SHA2-384
894,760 UART: [kat] SHA2-512-ACC
896,661 UART: [kat] ECC-384
902,290 UART: [kat] HMAC-384Kdf
906,880 UART: [kat] LMS
1,475,076 UART: [kat] --
1,476,221 UART: [cold-reset] ++
1,476,751 UART: [fht] Storing FHT @ 0x50003400
1,479,704 UART: [idev] ++
1,479,872 UART: [idev] CDI.KEYID = 6
1,480,232 UART: [idev] SUBJECT.KEYID = 7
1,480,656 UART: [idev] UDS.KEYID = 0
1,481,001 ready_for_fw is high
1,481,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,042 UART: [idev] Erasing UDS.KEYID = 0
1,505,024 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,714 UART: [idev] --
1,514,767 UART: [ldev] ++
1,514,935 UART: [ldev] CDI.KEYID = 6
1,515,298 UART: [ldev] SUBJECT.KEYID = 5
1,515,724 UART: [ldev] AUTHORITY.KEYID = 7
1,516,187 UART: [ldev] FE.KEYID = 1
1,521,259 UART: [ldev] Erasing FE.KEYID = 1
1,545,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,976 UART: [ldev] --
1,585,409 UART: [fwproc] Waiting for Commands...
1,586,156 UART: [fwproc] Received command 0x46574c44
1,586,947 UART: [fwproc] Received Image of size 114168 bytes
2,883,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,801 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,414 >>> mbox cmd response: success
3,076,632 UART: [afmc] ++
3,076,800 UART: [afmc] CDI.KEYID = 6
3,077,162 UART: [afmc] SUBJECT.KEYID = 7
3,077,587 UART: [afmc] AUTHORITY.KEYID = 5
3,112,192 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,700 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,585 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,275 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,046 UART: [afmc] --
3,155,154 UART: [cold-reset] --
3,155,886 UART: [state] Locking Datavault
3,157,041 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,645 UART: [state] Locking ICCM
3,158,183 UART: [exit] Launching FMC @ 0x40000130
3,163,512 UART:
3,163,528 UART: Running Caliptra FMC ...
3,163,936 UART:
3,163,990 UART: [state] CFI Enabled
3,174,393 UART: [fht] FMC Alias Private Key: 7
3,282,060 UART: [art] Extend RT PCRs Done
3,282,488 UART: [art] Lock RT PCRs Done
3,284,168 UART: [art] Populate DV Done
3,292,155 UART: [fht] FMC Alias Private Key: 7
3,293,253 UART: [art] Derive CDI
3,293,533 UART: [art] Store in in slot 0x4
3,378,866 UART: [art] Derive Key Pair
3,379,226 UART: [art] Store priv key in slot 0x5
3,392,750 UART: [art] Derive Key Pair - Done
3,407,853 UART: [art] Signing Cert with AUTHO
3,408,333 UART: RITY.KEYID = 7
3,423,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,188 UART: [art] PUB.X = 33FECF8FACD75564ED09B10097EBA89B189F7F50B16C05129AC1F6784F6446FE80F6665702EFC7CEB9E1CC418497B95A
3,430,939 UART: [art] PUB.Y = DEC012CBFCBAE35BF8A2219A6DDF0923DD0F46786EBBA0FC7EE53683D8C8D689D55AEA596856A71A67C5A309C3A95FEA
3,437,906 UART: [art] SIG.R = 839C350B45939DDF95B874AC44B9F924694A94A119CC5F890EA348C6A398ED1850F3EDDFD6F5FF146BB192C3F41048A7
3,444,678 UART: [art] SIG.S = 84502AB82D3B39C4D7C92288BD0AEDE98DB11B957EC053880B214D6AD151486C4168BB8BE1E7405FD9C9F7C17B7F8D5A
3,468,701 UART: Caliptra RT
3,468,954 UART: [state] CFI Enabled
3,576,840 UART: [rt] RT listening for mailbox commands...
3,577,510 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,428 UART: [rt]cmd =0x44504543, len=40
3,633,191 >>> mbox cmd response data (40 bytes)
3,633,192 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,719 UART: [rt]cmd =0x44504543, len=40
3,685,494 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,643 ready_for_fw is high
1,362,643 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,706 >>> mbox cmd response: success
2,986,354 UART:
2,986,370 UART: Running Caliptra FMC ...
2,986,778 UART:
2,986,832 UART: [state] CFI Enabled
2,997,125 UART: [fht] FMC Alias Private Key: 7
3,104,864 UART: [art] Extend RT PCRs Done
3,105,292 UART: [art] Lock RT PCRs Done
3,106,442 UART: [art] Populate DV Done
3,114,675 UART: [fht] FMC Alias Private Key: 7
3,115,615 UART: [art] Derive CDI
3,115,895 UART: [art] Store in in slot 0x4
3,201,482 UART: [art] Derive Key Pair
3,201,842 UART: [art] Store priv key in slot 0x5
3,214,774 UART: [art] Derive Key Pair - Done
3,229,440 UART: [art] Signing Cert with AUTHO
3,229,920 UART: RITY.KEYID = 7
3,245,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,953 UART: [art] PUB.X = B52A43F6CCEF5CE6E72FD2B7BADB96488AF9B787861D3394CF7DD791D2ABE346B10C7C70B603D114B4029697FC1DF9B3
3,252,732 UART: [art] PUB.Y = 8277EA978BE1FB7CED2E853214C591D1D8F69E6900B69491F8298470BB0F72878179142C9A7CA50B9D08625B203A7BCB
3,259,651 UART: [art] SIG.R = 09AC143D88AE89EA43F83EB799A17632D22998A6C0FF1629F4CB0DF5019568F01FAE8DBBBB8D49BFFC721C0F9686EA97
3,266,425 UART: [art] SIG.S = 818C8BB1D968CD0023CFE7C00C22FC8F9AA0F02A1193E5769CCBD3ECDCEF1F09C74484585B1026E59F1E5EE4F2C8754C
3,290,102 UART: Caliptra RT
3,290,355 UART: [state] CFI Enabled
3,397,890 UART: [rt] RT listening for mailbox commands...
3,398,560 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,270 UART: [rt]cmd =0x44504543, len=40
3,454,253 >>> mbox cmd response data (40 bytes)
3,454,254 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,631 UART: [rt]cmd =0x44504543, len=40
3,506,464 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,792 UART: [kat] SHA2-256
882,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,838 UART: [kat] ++
886,990 UART: [kat] sha1
891,136 UART: [kat] SHA2-256
893,074 UART: [kat] SHA2-384
895,825 UART: [kat] SHA2-512-ACC
897,726 UART: [kat] ECC-384
903,185 UART: [kat] HMAC-384Kdf
907,853 UART: [kat] LMS
1,476,049 UART: [kat] --
1,476,820 UART: [cold-reset] ++
1,477,384 UART: [fht] Storing FHT @ 0x50003400
1,480,107 UART: [idev] ++
1,480,275 UART: [idev] CDI.KEYID = 6
1,480,635 UART: [idev] SUBJECT.KEYID = 7
1,481,059 UART: [idev] UDS.KEYID = 0
1,481,404 ready_for_fw is high
1,481,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,031 UART: [idev] Erasing UDS.KEYID = 0
1,505,501 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,199 UART: [idev] --
1,515,348 UART: [ldev] ++
1,515,516 UART: [ldev] CDI.KEYID = 6
1,515,879 UART: [ldev] SUBJECT.KEYID = 5
1,516,305 UART: [ldev] AUTHORITY.KEYID = 7
1,516,768 UART: [ldev] FE.KEYID = 1
1,521,928 UART: [ldev] Erasing FE.KEYID = 1
1,546,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,997 UART: [ldev] --
1,586,288 UART: [fwproc] Waiting for Commands...
1,587,035 UART: [fwproc] Received command 0x46574c44
1,587,826 UART: [fwproc] Received Image of size 114168 bytes
2,884,234 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,122 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,119 >>> mbox cmd response: success
3,078,231 UART: [afmc] ++
3,078,399 UART: [afmc] CDI.KEYID = 6
3,078,761 UART: [afmc] SUBJECT.KEYID = 7
3,079,186 UART: [afmc] AUTHORITY.KEYID = 5
3,114,005 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,201 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,929 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,814 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,504 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,329 UART: [afmc] --
3,157,423 UART: [cold-reset] --
3,158,167 UART: [state] Locking Datavault
3,159,192 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,796 UART: [state] Locking ICCM
3,160,318 UART: [exit] Launching FMC @ 0x40000130
3,165,647 UART:
3,165,663 UART: Running Caliptra FMC ...
3,166,071 UART:
3,166,214 UART: [state] CFI Enabled
3,177,001 UART: [fht] FMC Alias Private Key: 7
3,284,408 UART: [art] Extend RT PCRs Done
3,284,836 UART: [art] Lock RT PCRs Done
3,286,416 UART: [art] Populate DV Done
3,294,893 UART: [fht] FMC Alias Private Key: 7
3,295,965 UART: [art] Derive CDI
3,296,245 UART: [art] Store in in slot 0x4
3,381,840 UART: [art] Derive Key Pair
3,382,200 UART: [art] Store priv key in slot 0x5
3,395,930 UART: [art] Derive Key Pair - Done
3,410,846 UART: [art] Signing Cert with AUTHO
3,411,326 UART: RITY.KEYID = 7
3,426,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,215 UART: [art] PUB.X = CA492BE3AC81D79D5F8555E6D791DD232EB9CBF9C190DD31B158792AC993967CE54525C40A04775994CC973BD40F6ED9
3,433,984 UART: [art] PUB.Y = 1FB4E1C695EB39E6F393A488780CBFFA73E5D2033E48C1FBBC3423C5A87E9BE94B11FC029B75B467C11D49D465EC163E
3,440,939 UART: [art] SIG.R = 64DB698A74B82A005492A7E4A2ADFDF893FD2EC155A9F364320DC863B7105272B015E45D13ECB1E49A78447CD473BDDE
3,447,694 UART: [art] SIG.S = 7543FF68F55E39F40C88BC040C743319E7D613DADBEE0D124CD76AFBEBE7BC9B3A11FFC966FF5F933471EED803558B1C
3,470,596 UART: Caliptra RT
3,470,941 UART: [state] CFI Enabled
3,579,339 UART: [rt] RT listening for mailbox commands...
3,580,009 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,943 UART: [rt]cmd =0x44504543, len=40
3,636,004 >>> mbox cmd response data (40 bytes)
3,636,005 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,896 UART: [rt]cmd =0x44504543, len=40
3,688,717 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,084 ready_for_fw is high
1,363,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,117 >>> mbox cmd response: success
2,988,113 UART:
2,988,129 UART: Running Caliptra FMC ...
2,988,537 UART:
2,988,680 UART: [state] CFI Enabled
2,999,301 UART: [fht] FMC Alias Private Key: 7
3,106,776 UART: [art] Extend RT PCRs Done
3,107,204 UART: [art] Lock RT PCRs Done
3,108,598 UART: [art] Populate DV Done
3,116,929 UART: [fht] FMC Alias Private Key: 7
3,118,097 UART: [art] Derive CDI
3,118,377 UART: [art] Store in in slot 0x4
3,204,256 UART: [art] Derive Key Pair
3,204,616 UART: [art] Store priv key in slot 0x5
3,217,930 UART: [art] Derive Key Pair - Done
3,232,593 UART: [art] Signing Cert with AUTHO
3,233,073 UART: RITY.KEYID = 7
3,248,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,454 UART: [art] PUB.X = C11991A86C9AFAB1E8B188D75C2DFAC933D0784208D45A30EEC4452D0D1BCE49A6E822BB3DC80F8A240A9195CF7772AC
3,256,228 UART: [art] PUB.Y = 8891879C8892D4054221414D31683CACE6EDF03D4B290A4D5E3A74B7A860E38BC840FA21F5B584DC203AFBCA0665B085
3,263,173 UART: [art] SIG.R = EDE3BB200B3DD76305BD8AEF5927E616E488A9946151B798444EF5434775F6D65AD544BF863521963E6FCDCE79B0383E
3,269,941 UART: [art] SIG.S = CB2DB4E5069110A1EA41CF2C4FAB60884A543F318D0D22DD8484D5690320F896A2E403C582B66F064CEAE970BF5447AE
3,293,727 UART: Caliptra RT
3,294,072 UART: [state] CFI Enabled
3,402,272 UART: [rt] RT listening for mailbox commands...
3,402,942 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,004 UART: [rt]cmd =0x44504543, len=40
3,459,653 >>> mbox cmd response data (40 bytes)
3,459,654 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,035 UART: [rt]cmd =0x44504543, len=40
3,511,580 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,961 UART: [kat] SHA2-256
903,901 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,560 UART: [kat] HMAC-384Kdf
923,004 UART: [kat] LMS
1,171,332 UART: [kat] --
1,172,357 UART: [cold-reset] ++
1,172,721 UART: [fht] FHT @ 0x50003400
1,175,564 UART: [idev] ++
1,175,732 UART: [idev] CDI.KEYID = 6
1,176,092 UART: [idev] SUBJECT.KEYID = 7
1,176,516 UART: [idev] UDS.KEYID = 0
1,176,861 ready_for_fw is high
1,176,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,222 UART: [idev] Erasing UDS.KEYID = 0
1,201,103 UART: [idev] Sha1 KeyId Algorithm
1,209,609 UART: [idev] --
1,210,665 UART: [ldev] ++
1,210,833 UART: [ldev] CDI.KEYID = 6
1,211,196 UART: [ldev] SUBJECT.KEYID = 5
1,211,622 UART: [ldev] AUTHORITY.KEYID = 7
1,212,085 UART: [ldev] FE.KEYID = 1
1,217,505 UART: [ldev] Erasing FE.KEYID = 1
1,243,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,345 UART: [ldev] --
1,282,698 UART: [fwproc] Wait for Commands...
1,283,322 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,890 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,483 >>> mbox cmd response: success
2,773,643 UART: [afmc] ++
2,773,811 UART: [afmc] CDI.KEYID = 6
2,774,173 UART: [afmc] SUBJECT.KEYID = 7
2,774,598 UART: [afmc] AUTHORITY.KEYID = 5
2,810,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,862 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,610 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,223 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,942 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,798 UART: [afmc] --
2,853,724 UART: [cold-reset] --
2,854,486 UART: [state] Locking Datavault
2,855,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,413 UART: [state] Locking ICCM
2,856,903 UART: [exit] Launching FMC @ 0x40000130
2,862,232 UART:
2,862,248 UART: Running Caliptra FMC ...
2,862,656 UART:
2,862,710 UART: [state] CFI Enabled
2,873,167 UART: [fht] FMC Alias Private Key: 7
2,980,876 UART: [art] Extend RT PCRs Done
2,981,304 UART: [art] Lock RT PCRs Done
2,983,056 UART: [art] Populate DV Done
2,991,445 UART: [fht] FMC Alias Private Key: 7
2,992,537 UART: [art] Derive CDI
2,992,817 UART: [art] Store in in slot 0x4
3,078,288 UART: [art] Derive Key Pair
3,078,648 UART: [art] Store priv key in slot 0x5
3,091,818 UART: [art] Derive Key Pair - Done
3,106,640 UART: [art] Signing Cert with AUTHO
3,107,120 UART: RITY.KEYID = 7
3,122,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,549 UART: [art] PUB.X = 5EB4F792999E7732A75C7C4A91BCB0C77241565D7EE29552634A400E67EA84FEC13E80789C516F7A25089E153043931B
3,130,307 UART: [art] PUB.Y = 448C29D6F4100980ABE61921697A9F55DFDC76DBFB4456FDF49FC8060E79689A7A360549379D67E1455B8C1413E81352
3,137,241 UART: [art] SIG.R = DAA947314B2DA9D0F0A1A35DE3744506DD9C860193C0027CBE2EE683EAE71B9FA3EE4A9AACBC0C70239EA91813D4CED0
3,144,021 UART: [art] SIG.S = D441915817E15546404EF6FF9331D550E3D57FBEE6392FB734E31FCE6902C535C267CD391A3D1855B129F593BCD915C5
3,167,527 UART: Caliptra RT
3,167,780 UART: [state] CFI Enabled
3,276,044 UART: [rt] RT listening for mailbox commands...
3,276,714 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,782 UART: [rt]cmd =0x44504543, len=40
3,333,149 >>> mbox cmd response data (40 bytes)
3,333,150 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,865 UART: [rt]cmd =0x44504543, len=40
3,385,544 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,767 ready_for_fw is high
1,059,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,428 >>> mbox cmd response: success
2,686,102 UART:
2,686,118 UART: Running Caliptra FMC ...
2,686,526 UART:
2,686,580 UART: [state] CFI Enabled
2,697,175 UART: [fht] FMC Alias Private Key: 7
2,805,478 UART: [art] Extend RT PCRs Done
2,805,906 UART: [art] Lock RT PCRs Done
2,807,472 UART: [art] Populate DV Done
2,815,695 UART: [fht] FMC Alias Private Key: 7
2,816,831 UART: [art] Derive CDI
2,817,111 UART: [art] Store in in slot 0x4
2,902,772 UART: [art] Derive Key Pair
2,903,132 UART: [art] Store priv key in slot 0x5
2,916,318 UART: [art] Derive Key Pair - Done
2,931,238 UART: [art] Signing Cert with AUTHO
2,931,718 UART: RITY.KEYID = 7
2,946,652 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,417 UART: [art] PUB.X = 88FF17B33FFF2E362C65EA111D73923979B5BB0ECED7B83739E7186612B3A0DFC7B3087EB29EFA1BC904EEEECA8F61EA
2,954,200 UART: [art] PUB.Y = 28EA5A8AE5951D41DD4EBD91A0F20CA3CAABA94D1059E7CA8EB61766EF47C38C80BCFDB859A6C4A92D87521A30C2A7C1
2,961,171 UART: [art] SIG.R = 9154F98F1E4DA98FE3A4FC4CCF5953BB81A4BB2BC834FBF1BCB4E5E17598B1757B6514C46AD48D0153494F636EF64259
2,967,950 UART: [art] SIG.S = 65B30702509A2E36CE99D2B0FAEBA32E08B8A2799FFF2F1B7465AED3B31BA80EE6A7F105F6D03B058BE63B99C274BD99
2,992,341 UART: Caliptra RT
2,992,594 UART: [state] CFI Enabled
3,100,439 UART: [rt] RT listening for mailbox commands...
3,101,109 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,333 UART: [rt]cmd =0x44504543, len=40
3,157,184 >>> mbox cmd response data (40 bytes)
3,157,185 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,952 UART: [rt]cmd =0x44504543, len=40
3,209,355 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
893,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,284 UART: [kat] ++
897,436 UART: [kat] sha1
901,746 UART: [kat] SHA2-256
903,686 UART: [kat] SHA2-384
906,409 UART: [kat] SHA2-512-ACC
908,310 UART: [kat] ECC-384
918,289 UART: [kat] HMAC-384Kdf
922,893 UART: [kat] LMS
1,171,221 UART: [kat] --
1,172,068 UART: [cold-reset] ++
1,172,544 UART: [fht] FHT @ 0x50003400
1,175,211 UART: [idev] ++
1,175,379 UART: [idev] CDI.KEYID = 6
1,175,739 UART: [idev] SUBJECT.KEYID = 7
1,176,163 UART: [idev] UDS.KEYID = 0
1,176,508 ready_for_fw is high
1,176,508 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,313 UART: [idev] Erasing UDS.KEYID = 0
1,201,214 UART: [idev] Sha1 KeyId Algorithm
1,209,904 UART: [idev] --
1,211,124 UART: [ldev] ++
1,211,292 UART: [ldev] CDI.KEYID = 6
1,211,655 UART: [ldev] SUBJECT.KEYID = 5
1,212,081 UART: [ldev] AUTHORITY.KEYID = 7
1,212,544 UART: [ldev] FE.KEYID = 1
1,217,830 UART: [ldev] Erasing FE.KEYID = 1
1,244,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,522 UART: [ldev] --
1,284,031 UART: [fwproc] Wait for Commands...
1,284,745 UART: [fwproc] Recv command 0x46574c44
1,285,473 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,973 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,848 >>> mbox cmd response: success
2,773,934 UART: [afmc] ++
2,774,102 UART: [afmc] CDI.KEYID = 6
2,774,464 UART: [afmc] SUBJECT.KEYID = 7
2,774,889 UART: [afmc] AUTHORITY.KEYID = 5
2,810,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,847 UART: [afmc] --
2,853,807 UART: [cold-reset] --
2,854,611 UART: [state] Locking Datavault
2,855,704 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,308 UART: [state] Locking ICCM
2,856,836 UART: [exit] Launching FMC @ 0x40000130
2,862,165 UART:
2,862,181 UART: Running Caliptra FMC ...
2,862,589 UART:
2,862,732 UART: [state] CFI Enabled
2,873,155 UART: [fht] FMC Alias Private Key: 7
2,980,770 UART: [art] Extend RT PCRs Done
2,981,198 UART: [art] Lock RT PCRs Done
2,982,956 UART: [art] Populate DV Done
2,991,035 UART: [fht] FMC Alias Private Key: 7
2,992,057 UART: [art] Derive CDI
2,992,337 UART: [art] Store in in slot 0x4
3,077,968 UART: [art] Derive Key Pair
3,078,328 UART: [art] Store priv key in slot 0x5
3,091,964 UART: [art] Derive Key Pair - Done
3,106,656 UART: [art] Signing Cert with AUTHO
3,107,136 UART: RITY.KEYID = 7
3,121,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,667 UART: [art] PUB.X = 4DE74DD190F14CA33E64ECB651B405DA0CA0EF99E938A0D1FDF732F7959379418BEB8B9195C34185D67A643B786A56D6
3,129,439 UART: [art] PUB.Y = 776B94EDE533085AFF8D54629F77B55C71E7E61D6DE3128677148C835C69647A837B0C43B04D28E10F409DA9763BC1C3
3,136,378 UART: [art] SIG.R = 6123C5DB18A9E0CF6C9E1B2C84322AE56B408EF96A801916B99AE6E6264ECB7FF58D413C5A29731FD4D6E832ECF123BD
3,143,162 UART: [art] SIG.S = B5252D6C3E8776BC704285666BF88F3285AD04255D7F00B8E5C12EB834DE6352F27EECFCA11FABCCE54D852D9D953FF4
3,167,230 UART: Caliptra RT
3,167,575 UART: [state] CFI Enabled
3,275,722 UART: [rt] RT listening for mailbox commands...
3,276,392 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,562 UART: [rt]cmd =0x44504543, len=40
3,332,489 >>> mbox cmd response data (40 bytes)
3,332,490 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,051 UART: [rt]cmd =0x44504543, len=40
3,385,024 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,570 ready_for_fw is high
1,061,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,529 >>> mbox cmd response: success
2,691,039 UART:
2,691,055 UART: Running Caliptra FMC ...
2,691,463 UART:
2,691,606 UART: [state] CFI Enabled
2,701,995 UART: [fht] FMC Alias Private Key: 7
2,810,342 UART: [art] Extend RT PCRs Done
2,810,770 UART: [art] Lock RT PCRs Done
2,812,152 UART: [art] Populate DV Done
2,820,465 UART: [fht] FMC Alias Private Key: 7
2,821,439 UART: [art] Derive CDI
2,821,719 UART: [art] Store in in slot 0x4
2,907,710 UART: [art] Derive Key Pair
2,908,070 UART: [art] Store priv key in slot 0x5
2,921,676 UART: [art] Derive Key Pair - Done
2,936,516 UART: [art] Signing Cert with AUTHO
2,936,996 UART: RITY.KEYID = 7
2,952,178 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,943 UART: [art] PUB.X = DDCCF900B6A3F9A9A9C12999E7C82DE70EB46E8AAE03C669C951BF88419DA2037CE8E91AA716EF94F47E848E3E9BB671
2,959,700 UART: [art] PUB.Y = E6BD0F1A5451972ACA0B55E5D81EEF5C3AADD367FFC9B1A77ABAF20E5508D35D65476B22E8AD3E9BF61EE9D9B715212D
2,966,662 UART: [art] SIG.R = 6E3FD1AAAD0D4F804795883DD43C300EE4F4651CF6B01EE549D9B372B3AE14EA16C126D736398CC8597E7AC6E92D5B26
2,973,438 UART: [art] SIG.S = 7E195ECBCA4EEBB174B0A8A95531A86D43B03C3091BDA25E0C11B9605C7D371DEDA442BE65AB3F35C3B39338BBAA8A52
2,997,440 UART: Caliptra RT
2,997,785 UART: [state] CFI Enabled
3,105,498 UART: [rt] RT listening for mailbox commands...
3,106,168 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,224 UART: [rt]cmd =0x44504543, len=40
3,162,023 >>> mbox cmd response data (40 bytes)
3,162,024 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,775 UART: [rt]cmd =0x44504543, len=40
3,214,876 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,678 UART: [state] LifecycleState = Unprovisioned
86,333 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
915,730 UART: [kat] HMAC-384Kdf
920,148 UART: [kat] LMS
1,168,460 UART: [kat] --
1,169,341 UART: [cold-reset] ++
1,169,825 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,173,935 ready_for_fw is high
1,173,935 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,527 UART: [idev] Erasing UDS.KEYID = 0
1,198,055 UART: [idev] Sha1 KeyId Algorithm
1,206,845 UART: [idev] --
1,208,076 UART: [ldev] ++
1,208,244 UART: [ldev] CDI.KEYID = 6
1,208,608 UART: [ldev] SUBJECT.KEYID = 5
1,209,035 UART: [ldev] AUTHORITY.KEYID = 7
1,209,498 UART: [ldev] FE.KEYID = 1
1,214,852 UART: [ldev] Erasing FE.KEYID = 1
1,241,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,492 UART: [fwproc] Wait for Commands...
1,281,313 UART: [fwproc] Recv command 0x46574c44
1,282,046 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,653 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,307 >>> mbox cmd response: success
2,772,552 UART: [afmc] ++
2,772,720 UART: [afmc] CDI.KEYID = 6
2,773,083 UART: [afmc] SUBJECT.KEYID = 7
2,773,509 UART: [afmc] AUTHORITY.KEYID = 5
2,808,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,355 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,074 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,719 UART: [afmc] --
2,851,735 UART: [cold-reset] --
2,852,303 UART: [state] Locking Datavault
2,853,550 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,154 UART: [state] Locking ICCM
2,854,808 UART: [exit] Launching FMC @ 0x40000130
2,860,137 UART:
2,860,153 UART: Running Caliptra FMC ...
2,860,561 UART:
2,860,615 UART: [state] CFI Enabled
2,870,832 UART: [fht] FMC Alias Private Key: 7
2,978,815 UART: [art] Extend RT PCRs Done
2,979,243 UART: [art] Lock RT PCRs Done
2,980,691 UART: [art] Populate DV Done
2,988,836 UART: [fht] FMC Alias Private Key: 7
2,989,794 UART: [art] Derive CDI
2,990,074 UART: [art] Store in in slot 0x4
3,075,599 UART: [art] Derive Key Pair
3,075,959 UART: [art] Store priv key in slot 0x5
3,088,821 UART: [art] Derive Key Pair - Done
3,103,608 UART: [art] Signing Cert with AUTHO
3,104,088 UART: RITY.KEYID = 7
3,119,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,005 UART: [art] PUB.X = 2B53F3EDDF7D816CEC25C8D7009CD72EBE12B57E8892BCE22E8BD65469DB471A5075522F4983DE6DC999708A566513C1
3,126,761 UART: [art] PUB.Y = F189037A9ED80EB4D27CC01365D33931E0388F04AFA37905454F0CCBD74C9BB1B1AE3F2DA36D2970007861F35CC63555
3,133,678 UART: [art] SIG.R = A40792DCB7A9F5B4558160FB5A32E7158405290B5C7A024CED936EC0AA378758A908E38794B5E478C58104F0ADE3B51A
3,140,432 UART: [art] SIG.S = 662F5791713F32164690F14CDFAE618B6E4027568BEF3DAC35D02EB85F57182181F34A6840C27BB04D2444D94CBE1540
3,164,293 UART: Caliptra RT
3,164,546 UART: [state] CFI Enabled
3,271,817 UART: [rt] RT listening for mailbox commands...
3,272,487 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,539 UART: [rt]cmd =0x44504543, len=40
3,328,488 >>> mbox cmd response data (40 bytes)
3,328,489 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,906 UART: [rt]cmd =0x44504543, len=40
3,380,673 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,584 ready_for_fw is high
1,056,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,255 >>> mbox cmd response: success
2,683,763 UART:
2,683,779 UART: Running Caliptra FMC ...
2,684,187 UART:
2,684,241 UART: [state] CFI Enabled
2,694,816 UART: [fht] FMC Alias Private Key: 7
2,802,307 UART: [art] Extend RT PCRs Done
2,802,735 UART: [art] Lock RT PCRs Done
2,804,221 UART: [art] Populate DV Done
2,812,376 UART: [fht] FMC Alias Private Key: 7
2,813,338 UART: [art] Derive CDI
2,813,618 UART: [art] Store in in slot 0x4
2,899,365 UART: [art] Derive Key Pair
2,899,725 UART: [art] Store priv key in slot 0x5
2,913,111 UART: [art] Derive Key Pair - Done
2,927,911 UART: [art] Signing Cert with AUTHO
2,928,391 UART: RITY.KEYID = 7
2,943,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,374 UART: [art] PUB.X = C16C0D7B4A8B15AC75F79AEEB34C0284972DF28D2C8221CCA07CD966860AB22D726BDA98EC5C7502236EDA8DD4C39FFE
2,951,152 UART: [art] PUB.Y = 2A489379D9A98EBB77B1CED793295EBEC62068A1D8940B1A7348686D290032D291AB78D2AF085F4C82235C82C674E14E
2,958,074 UART: [art] SIG.R = 5641309D804236BDC084CEF71BF3811C5F03BA26CA5EEAE1009AA1C0B095D6C5C811EE92939CFAB8EE64AAE08DAE6F13
2,964,839 UART: [art] SIG.S = 43871917B124D6BB27A4CC9451D85D0E6782476FA42343D36DB171975C347975E2D507853F3E4359BFEE517822523E34
2,988,496 UART: Caliptra RT
2,988,749 UART: [state] CFI Enabled
3,096,792 UART: [rt] RT listening for mailbox commands...
3,097,462 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,442 UART: [rt]cmd =0x44504543, len=40
3,153,535 >>> mbox cmd response data (40 bytes)
3,153,536 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,197 UART: [rt]cmd =0x44504543, len=40
3,206,362 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
890,969 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,098 UART: [kat] ++
895,250 UART: [kat] sha1
899,318 UART: [kat] SHA2-256
901,258 UART: [kat] SHA2-384
904,087 UART: [kat] SHA2-512-ACC
905,988 UART: [kat] ECC-384
915,623 UART: [kat] HMAC-384Kdf
920,217 UART: [kat] LMS
1,168,529 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,044 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,174,078 ready_for_fw is high
1,174,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,270 UART: [idev] Erasing UDS.KEYID = 0
1,198,648 UART: [idev] Sha1 KeyId Algorithm
1,207,716 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,611 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,991 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,848 >>> mbox cmd response: success
2,772,915 UART: [afmc] ++
2,773,083 UART: [afmc] CDI.KEYID = 6
2,773,446 UART: [afmc] SUBJECT.KEYID = 7
2,773,872 UART: [afmc] AUTHORITY.KEYID = 5
2,809,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,592 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,204 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,923 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,702 UART: [afmc] --
2,852,648 UART: [cold-reset] --
2,853,498 UART: [state] Locking Datavault
2,854,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,941 UART: [state] Locking ICCM
2,855,443 UART: [exit] Launching FMC @ 0x40000130
2,860,772 UART:
2,860,788 UART: Running Caliptra FMC ...
2,861,196 UART:
2,861,339 UART: [state] CFI Enabled
2,872,082 UART: [fht] FMC Alias Private Key: 7
2,980,739 UART: [art] Extend RT PCRs Done
2,981,167 UART: [art] Lock RT PCRs Done
2,982,601 UART: [art] Populate DV Done
2,990,912 UART: [fht] FMC Alias Private Key: 7
2,991,902 UART: [art] Derive CDI
2,992,182 UART: [art] Store in in slot 0x4
3,077,847 UART: [art] Derive Key Pair
3,078,207 UART: [art] Store priv key in slot 0x5
3,091,737 UART: [art] Derive Key Pair - Done
3,106,596 UART: [art] Signing Cert with AUTHO
3,107,076 UART: RITY.KEYID = 7
3,122,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,367 UART: [art] PUB.X = 5421FC34125751B3819E60AB12EE799202A677ED2C6BE62B74D80C321A3FE26F96E508199A078AD2C10960CE432B4165
3,130,118 UART: [art] PUB.Y = 3C9D2C8981DD7212996F7824FA55F14A997535DE4AD753229FF47CAC20D2B402E748938F9F942D25143B3FF2CEA201F6
3,137,064 UART: [art] SIG.R = E101BEAE6E09399B3F72A72313901AA17286121056FC9DFCB5813F30862B3113F12B5B2998CE3BC42BCBCE42243FBC18
3,143,834 UART: [art] SIG.S = B2ABED294DFD6E6735A0A132986AD03141EDE0EF3319D29905834344B0781E694A422C0F1B85740D2CB1967658423E28
3,167,156 UART: Caliptra RT
3,167,501 UART: [state] CFI Enabled
3,274,963 UART: [rt] RT listening for mailbox commands...
3,275,633 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,453 UART: [rt]cmd =0x44504543, len=40
3,331,546 >>> mbox cmd response data (40 bytes)
3,331,547 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,966 UART: [rt]cmd =0x44504543, len=40
3,383,865 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,681 ready_for_fw is high
1,056,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,704 >>> mbox cmd response: success
2,683,234 UART:
2,683,250 UART: Running Caliptra FMC ...
2,683,658 UART:
2,683,801 UART: [state] CFI Enabled
2,694,374 UART: [fht] FMC Alias Private Key: 7
2,802,297 UART: [art] Extend RT PCRs Done
2,802,725 UART: [art] Lock RT PCRs Done
2,804,275 UART: [art] Populate DV Done
2,812,452 UART: [fht] FMC Alias Private Key: 7
2,813,536 UART: [art] Derive CDI
2,813,816 UART: [art] Store in in slot 0x4
2,899,317 UART: [art] Derive Key Pair
2,899,677 UART: [art] Store priv key in slot 0x5
2,912,805 UART: [art] Derive Key Pair - Done
2,927,628 UART: [art] Signing Cert with AUTHO
2,928,108 UART: RITY.KEYID = 7
2,943,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,909 UART: [art] PUB.X = F42353FC94BA36A47EC616DD146F7B576D3CBBB81C5F8A2CE5F356A546370C51FA1E4C7AAE59DD1FB2573D8DB5C085F4
2,950,696 UART: [art] PUB.Y = 9E4D78CA6E4EAF1B79235B7DF32C5D78F6C4156F7D3E779CB8A8556358237AEE40B5C576ACA110F88BE0AFF7BEEF5225
2,957,664 UART: [art] SIG.R = 34601179B08B81122FF4207461F3F81E701AB578AF69FD981AC42725E872C1DC509698FF62893FD41CB0941887DB4845
2,964,426 UART: [art] SIG.S = E0ED773D7B3DF5815ACA625E0EC0BFCC0725EC5967F7DFD42152C73996F9DD9BF96A4750B8DC73691C2E4735D0402338
2,988,015 UART: Caliptra RT
2,988,360 UART: [state] CFI Enabled
3,095,681 UART: [rt] RT listening for mailbox commands...
3,096,351 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,323 UART: [rt]cmd =0x44504543, len=40
3,152,214 >>> mbox cmd response data (40 bytes)
3,152,215 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,780 UART: [rt]cmd =0x44504543, len=40
3,204,597 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,000 UART:
192,373 UART: Running Caliptra ROM ...
193,554 UART:
193,707 UART: [state] CFI Enabled
268,122 UART: [state] LifecycleState = Unprovisioned
270,097 UART: [state] DebugLocked = No
272,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,991 UART: [kat] SHA2-256
446,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,193 UART: [kat] ++
457,810 UART: [kat] sha1
468,831 UART: [kat] SHA2-256
471,543 UART: [kat] SHA2-384
476,810 UART: [kat] SHA2-512-ACC
479,241 UART: [kat] ECC-384
2,768,148 UART: [kat] HMAC-384Kdf
2,800,399 UART: [kat] LMS
3,990,679 UART: [kat] --
3,995,829 UART: [cold-reset] ++
3,996,977 UART: [fht] Storing FHT @ 0x50003400
4,008,876 UART: [idev] ++
4,009,447 UART: [idev] CDI.KEYID = 6
4,010,437 UART: [idev] SUBJECT.KEYID = 7
4,011,606 UART: [idev] UDS.KEYID = 0
4,012,655 ready_for_fw is high
4,012,873 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,125 UART: [idev] Erasing UDS.KEYID = 0
7,346,206 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,526 UART: [idev] --
7,371,893 UART: [ldev] ++
7,372,455 UART: [ldev] CDI.KEYID = 6
7,373,417 UART: [ldev] SUBJECT.KEYID = 5
7,374,674 UART: [ldev] AUTHORITY.KEYID = 7
7,375,895 UART: [ldev] FE.KEYID = 1
7,422,020 UART: [ldev] Erasing FE.KEYID = 1
10,755,496 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,237 UART: [ldev] --
13,134,687 UART: [fwproc] Waiting for Commands...
13,137,820 UART: [fwproc] Received command 0x46574c44
13,139,992 UART: [fwproc] Received Image of size 113844 bytes
17,199,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,902 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,351,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,668,383 >>> mbox cmd response: success
17,668,985 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,671,849 UART: [afmc] ++
17,672,430 UART: [afmc] CDI.KEYID = 6
17,673,391 UART: [afmc] SUBJECT.KEYID = 7
17,674,600 UART: [afmc] AUTHORITY.KEYID = 5
21,032,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,386 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,657 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,052 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,866 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,312 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,927 UART: [afmc] --
23,401,161 UART: [cold-reset] --
23,404,100 UART: [state] Locking Datavault
23,411,732 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,487 UART: [state] Locking ICCM
23,414,662 UART: [exit] Launching FMC @ 0x40000130
23,423,049 UART:
23,423,276 UART: Running Caliptra FMC ...
23,424,367 UART:
23,424,520 UART: [state] CFI Enabled
23,489,426 UART: [fht] FMC Alias Private Key: 7
25,827,524 UART: [art] Extend RT PCRs Done
25,828,741 UART: [art] Lock RT PCRs Done
25,830,444 UART: [art] Populate DV Done
25,835,955 UART: [fht] FMC Alias Private Key: 7
25,837,665 UART: [art] Derive CDI
25,838,474 UART: [art] Store in in slot 0x4
25,898,891 UART: [art] Derive Key Pair
25,899,926 UART: [art] Store priv key in slot 0x5
29,192,592 UART: [art] Derive Key Pair - Done
29,205,528 UART: [art] Signing Cert with AUTHO
29,206,828 UART: RITY.KEYID = 7
31,495,009 UART: [art] Erasing AUTHORITY.KEYID = 7
31,496,542 UART: [art] PUB.X = 3ED5095B5048B34E729B3FF79C9EA7E522721BAA01BA697CE28B3AF998028A1B1A9B419C8F004FAC923BF5945062F957
31,503,777 UART: [art] PUB.Y = 1824E4ED6B2BCD6FB35BB1C045AE3E9927B45103D744F90010374C9E52182603C99C21A826E6134C286F9383FFB0F0A8
31,510,989 UART: [art] SIG.R = D3E4CCA3D1A8B338F91BAE6CE83B2C38F6A41BFABEA6C74D26746D3013EB2236BF39BD3B6E17D326E06CB59219667A83
31,518,410 UART: [art] SIG.S = D6D2474CCAFF38B96042891EF60E0A82D60C44F23A81A95CEAAA17DDD990EAD4D201EFBA698306B8CC8C7D566D70E158
32,823,886 UART: Caliptra RT
32,824,580 UART: [state] CFI Enabled
32,985,447 UART: [rt] RT listening for mailbox commands...
33,017,539 UART: [rt]cmd =0x44504543, len=136
38,641,337 >>> mbox cmd response data (136 bytes)
38,642,744 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,673,030 UART: [rt]cmd =0x44504543, len=92
44,434,789 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,785,654 ready_for_fw is high
3,786,297 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,857,101 >>> mbox cmd response: success
17,857,809 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,549,312 UART:
23,549,698 UART: Running Caliptra FMC ...
23,551,007 UART:
23,551,180 UART: [state] CFI Enabled
23,616,701 UART: [fht] FMC Alias Private Key: 7
25,955,071 UART: [art] Extend RT PCRs Done
25,956,306 UART: [art] Lock RT PCRs Done
25,957,634 UART: [art] Populate DV Done
25,962,943 UART: [fht] FMC Alias Private Key: 7
25,964,540 UART: [art] Derive CDI
25,965,349 UART: [art] Store in in slot 0x4
26,027,232 UART: [art] Derive Key Pair
26,028,273 UART: [art] Store priv key in slot 0x5
29,320,769 UART: [art] Derive Key Pair - Done
29,334,036 UART: [art] Signing Cert with AUTHO
29,335,334 UART: RITY.KEYID = 7
31,621,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,623,194 UART: [art] PUB.X = DE5BBE35232E054FA7962C81BCBFB27C8E1CE417443E765477DB3057DB15AA5261819C23D7F04921F6367E065B260AFF
31,630,458 UART: [art] PUB.Y = F360ECE38BFABB39C2586FB315E1C772A1F9FB360E7EBF7878383D26130E66C47A362DA4FD32190A254CD5B5437C5A6E
31,637,693 UART: [art] SIG.R = C303E64F3FAC7BAD21F387C2988265398B0D4C45E72BC14C7F4A1CA64B547D3BFB4364D46E35E706B1D0E27C4A930BAF
31,645,068 UART: [art] SIG.S = 214318F019A067336DD416248020A4C441A572BA44F1BD055C4BFDFDF30B6BB8E114A0F101A45FFC08C50A3B1E78353E
32,950,126 UART: Caliptra RT
32,950,840 UART: [state] CFI Enabled
33,113,453 UART: [rt] RT listening for mailbox commands...
33,145,613 UART: [rt]cmd =0x44504543, len=136
38,768,726 >>> mbox cmd response data (136 bytes)
38,770,223 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,801,044 UART: [rt]cmd =0x44504543, len=92
44,565,166 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,475 UART:
192,826 UART: Running Caliptra ROM ...
194,017 UART:
603,825 UART: [state] CFI Enabled
620,712 UART: [state] LifecycleState = Unprovisioned
622,861 UART: [state] DebugLocked = No
625,242 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,679 UART: [kat] SHA2-256
799,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,983 UART: [kat] ++
810,425 UART: [kat] sha1
821,373 UART: [kat] SHA2-256
824,103 UART: [kat] SHA2-384
830,383 UART: [kat] SHA2-512-ACC
832,751 UART: [kat] ECC-384
3,117,353 UART: [kat] HMAC-384Kdf
3,128,467 UART: [kat] LMS
4,318,520 UART: [kat] --
4,322,536 UART: [cold-reset] ++
4,324,612 UART: [fht] Storing FHT @ 0x50003400
4,335,388 UART: [idev] ++
4,335,961 UART: [idev] CDI.KEYID = 6
4,336,996 UART: [idev] SUBJECT.KEYID = 7
4,338,124 UART: [idev] UDS.KEYID = 0
4,339,187 ready_for_fw is high
4,339,404 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,833 UART: [idev] Erasing UDS.KEYID = 0
7,627,033 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,438 UART: [idev] --
7,653,326 UART: [ldev] ++
7,653,899 UART: [ldev] CDI.KEYID = 6
7,654,884 UART: [ldev] SUBJECT.KEYID = 5
7,656,038 UART: [ldev] AUTHORITY.KEYID = 7
7,657,454 UART: [ldev] FE.KEYID = 1
7,668,495 UART: [ldev] Erasing FE.KEYID = 1
10,958,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,847 UART: [ldev] --
13,318,511 UART: [fwproc] Waiting for Commands...
13,320,285 UART: [fwproc] Received command 0x46574c44
13,322,524 UART: [fwproc] Received Image of size 113844 bytes
17,368,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,709 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,833,755 >>> mbox cmd response: success
17,834,382 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,837,964 UART: [afmc] ++
17,838,559 UART: [afmc] CDI.KEYID = 6
17,839,474 UART: [afmc] SUBJECT.KEYID = 7
17,840,744 UART: [afmc] AUTHORITY.KEYID = 5
21,153,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,466 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,723 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,104 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,961 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,388 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,475 UART: [afmc] --
23,517,758 UART: [cold-reset] --
23,521,905 UART: [state] Locking Datavault
23,528,123 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,876 UART: [state] Locking ICCM
23,531,884 UART: [exit] Launching FMC @ 0x40000130
23,540,287 UART:
23,540,526 UART: Running Caliptra FMC ...
23,541,579 UART:
23,541,735 UART: [state] CFI Enabled
23,549,832 UART: [fht] FMC Alias Private Key: 7
25,880,405 UART: [art] Extend RT PCRs Done
25,881,621 UART: [art] Lock RT PCRs Done
25,883,204 UART: [art] Populate DV Done
25,888,613 UART: [fht] FMC Alias Private Key: 7
25,890,308 UART: [art] Derive CDI
25,891,123 UART: [art] Store in in slot 0x4
25,933,928 UART: [art] Derive Key Pair
25,934,962 UART: [art] Store priv key in slot 0x5
29,177,594 UART: [art] Derive Key Pair - Done
29,190,475 UART: [art] Signing Cert with AUTHO
29,191,825 UART: RITY.KEYID = 7
31,471,181 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,678 UART: [art] PUB.X = 1F47B6FC12049683F4FE9F94B8266611A17571DFA5EC99EEBE68945C4F17A3DB736AA5BAD94E8CFAA52607B7476B023C
31,479,938 UART: [art] PUB.Y = 498144F6EE11ED72A897F570E72C1F1ABBC527076246CBE46F0B9DB728A305018C88BFB355B970842452BAD01577F1C0
31,487,175 UART: [art] SIG.R = EB10A73853B48223AD3A65D81E3CD11DDCA8763A05B9418834D2D89A50A064D9A2EA02B0E2DF4D02A643B216D7DAB337
31,494,570 UART: [art] SIG.S = DABA7086349C9A38ED9E979BFFBFF44144F77119180B96D65B8350F0720048B4ECEA55F65A89AEEA99D6FADE11114B15
32,800,642 UART: Caliptra RT
32,801,341 UART: [state] CFI Enabled
32,918,288 UART: [rt] RT listening for mailbox commands...
32,950,602 UART: [rt]cmd =0x44504543, len=136
38,510,272 >>> mbox cmd response data (136 bytes)
38,511,598 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,542,196 UART: [rt]cmd =0x44504543, len=92
44,215,638 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,184 writing to cptra_bootfsm_go
4,129,001 ready_for_fw is high
4,129,567 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,736 >>> mbox cmd response: success
18,067,571 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,705,019 UART:
23,705,417 UART: Running Caliptra FMC ...
23,706,531 UART:
23,706,686 UART: [state] CFI Enabled
23,714,596 UART: [fht] FMC Alias Private Key: 7
26,045,993 UART: [art] Extend RT PCRs Done
26,047,687 UART: [art] Lock RT PCRs Done
26,048,828 UART: [art] Populate DV Done
26,054,057 UART: [fht] FMC Alias Private Key: 7
26,055,744 UART: [art] Derive CDI
26,056,497 UART: [art] Store in in slot 0x4
26,099,113 UART: [art] Derive Key Pair
26,100,166 UART: [art] Store priv key in slot 0x5
29,342,398 UART: [art] Derive Key Pair - Done
29,355,616 UART: [art] Signing Cert with AUTHO
29,356,923 UART: RITY.KEYID = 7
31,636,678 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,188 UART: [art] PUB.X = 049C43F456CA14A5C742C4FDDEBBA5DAC2DF75DD7F032D2BE7BC509BA38D2829A7E982496F9B626E5C1DEE20C4067680
31,645,454 UART: [art] PUB.Y = 2428025BEA4C0A385A86672CA81332A3D945B67C89470920D9197D4DC436665D8D277972A0EB8063CF351455594F7CA5
31,652,715 UART: [art] SIG.R = 9B3E428EBCB778721CA26E452C426A2E2A9F9A31068DB3DB047901FEA2DE6B950FE031E3139DDD544210F1D639B3488F
31,660,074 UART: [art] SIG.S = 5D272081ED6C0A30045A7733D8F1D72CC5ACCCCA25D16E802231051CD885947B4E5228C3FB93FC5CB227AFD745A44532
32,965,653 UART: Caliptra RT
32,966,361 UART: [state] CFI Enabled
33,084,030 UART: [rt] RT listening for mailbox commands...
33,116,197 UART: [rt]cmd =0x44504543, len=136
38,674,636 >>> mbox cmd response data (136 bytes)
38,676,056 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,706,724 UART: [rt]cmd =0x44504543, len=92
44,380,288 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,180 UART:
192,541 UART: Running Caliptra ROM ...
193,703 UART:
193,852 UART: [state] CFI Enabled
261,338 UART: [state] LifecycleState = Unprovisioned
263,176 UART: [state] DebugLocked = No
265,349 UART: [state] WD Timer not started. Device not locked for debugging
269,605 UART: [kat] SHA2-256
448,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,296 UART: [kat] ++
460,930 UART: [kat] sha1
471,213 UART: [kat] SHA2-256
474,248 UART: [kat] SHA2-384
480,171 UART: [kat] SHA2-512-ACC
483,109 UART: [kat] ECC-384
2,928,748 UART: [kat] HMAC-384Kdf
2,950,517 UART: [kat] LMS
3,479,977 UART: [kat] --
3,485,557 UART: [cold-reset] ++
3,487,359 UART: [fht] FHT @ 0x50003400
3,498,622 UART: [idev] ++
3,499,186 UART: [idev] CDI.KEYID = 6
3,500,098 UART: [idev] SUBJECT.KEYID = 7
3,501,277 UART: [idev] UDS.KEYID = 0
3,502,331 ready_for_fw is high
3,502,554 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,646,231 UART: [idev] Erasing UDS.KEYID = 0
6,003,677 UART: [idev] Sha1 KeyId Algorithm
6,026,380 UART: [idev] --
6,030,470 UART: [ldev] ++
6,031,054 UART: [ldev] CDI.KEYID = 6
6,031,975 UART: [ldev] SUBJECT.KEYID = 5
6,033,084 UART: [ldev] AUTHORITY.KEYID = 7
6,034,432 UART: [ldev] FE.KEYID = 1
6,079,031 UART: [ldev] Erasing FE.KEYID = 1
8,576,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,506 UART: [ldev] --
10,370,234 UART: [fwproc] Wait for Commands...
10,371,781 UART: [fwproc] Recv command 0x46574c44
10,373,870 UART: [fwproc] Recv'd Img size: 114168 bytes
13,772,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,840,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,909,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,225,883 >>> mbox cmd response: success
14,226,485 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,230,689 UART: [afmc] ++
14,231,286 UART: [afmc] CDI.KEYID = 6
14,232,166 UART: [afmc] SUBJECT.KEYID = 7
14,233,384 UART: [afmc] AUTHORITY.KEYID = 5
16,759,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,486,548 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,488,455 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,504,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,520,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,536,091 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,558,178 UART: [afmc] --
18,561,680 UART: [cold-reset] --
18,567,266 UART: [state] Locking Datavault
18,573,216 UART: [state] Locking PCR0, PCR1 and PCR31
18,575,417 UART: [state] Locking ICCM
18,576,418 UART: [exit] Launching FMC @ 0x40000130
18,584,884 UART:
18,585,132 UART: Running Caliptra FMC ...
18,586,231 UART:
18,586,389 UART: [state] CFI Enabled
18,644,179 UART: [fht] FMC Alias Private Key: 7
20,408,544 UART: [art] Extend RT PCRs Done
20,409,752 UART: [art] Lock RT PCRs Done
20,411,569 UART: [art] Populate DV Done
20,416,820 UART: [fht] FMC Alias Private Key: 7
20,418,451 UART: [art] Derive CDI
20,419,192 UART: [art] Store in in slot 0x4
20,476,439 UART: [art] Derive Key Pair
20,477,445 UART: [art] Store priv key in slot 0x5
22,940,544 UART: [art] Derive Key Pair - Done
22,953,979 UART: [art] Signing Cert with AUTHO
22,955,290 UART: RITY.KEYID = 7
24,665,677 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,181 UART: [art] PUB.X = E9844FFB9082841EBA57FB5A68710338AAF1DB998A27AEC76227E3056E0B7F30D89911E3CCEAD50358EC07D60A312DC1
24,674,444 UART: [art] PUB.Y = FEA9EDAE04C55F2A1C72A57C9E5B97B938060280D9B2E358C65965904B062EBEF7F79B51D346A32975BC106B5B573964
24,681,695 UART: [art] SIG.R = 8A2A39AABC1A778BE90F8ACE08F75FD20D5C1A867A637EE341E5C8965B2657C9CF6929CF24EA25022895CB2580D4066F
24,689,114 UART: [art] SIG.S = 02586559B4597E68414AECE32583F99C00E990211E90E92CBF440D753131B422B8A0FD973435D6EAA9E5AA2C8BC67A12
25,668,168 UART: Caliptra RT
25,668,884 UART: [state] CFI Enabled
25,831,176 UART: [rt] RT listening for mailbox commands...
25,863,557 UART: [rt]cmd =0x44504543, len=136
30,080,694 >>> mbox cmd response data (136 bytes)
30,082,044 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,112,627 UART: [rt]cmd =0x44504543, len=92
34,466,786 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,382,775 ready_for_fw is high
3,383,195 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,100,334 >>> mbox cmd response: success
14,100,995 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,387,839 UART:
18,388,228 UART: Running Caliptra FMC ...
18,389,413 UART:
18,389,585 UART: [state] CFI Enabled
18,455,217 UART: [fht] FMC Alias Private Key: 7
20,219,280 UART: [art] Extend RT PCRs Done
20,220,508 UART: [art] Lock RT PCRs Done
20,222,110 UART: [art] Populate DV Done
20,227,380 UART: [fht] FMC Alias Private Key: 7
20,228,865 UART: [art] Derive CDI
20,229,604 UART: [art] Store in in slot 0x4
20,288,145 UART: [art] Derive Key Pair
20,289,183 UART: [art] Store priv key in slot 0x5
22,752,419 UART: [art] Derive Key Pair - Done
22,765,471 UART: [art] Signing Cert with AUTHO
22,766,777 UART: RITY.KEYID = 7
24,478,557 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,108 UART: [art] PUB.X = A85006824BB19AF77DBEC5F3A04654EB66BF30BB12EF0194399A1CB2ABAD2280395FF1DB8AF7FC1FE5325A10DAB4B27D
24,487,386 UART: [art] PUB.Y = 0E0DB1BEA5F750C4E2C3BC13359FBE424FF4C278E5E37556F314496C9021F5218CB8EC8A3E208B0DFFA0EEDD8B922639
24,494,641 UART: [art] SIG.R = 346ACF57889B9B33CE582C9B03D3762BF592958C8234344D2D04613C263CA3748963BBC05AFDF20F42F86872460999D2
24,502,034 UART: [art] SIG.S = F0CB0B8E624C6B7AE1EE1FB1084910830087345C95B3D949ADD604C40CF2CEA22C99DBAB0DD165B4D188F3BB1C3E42E3
25,480,768 UART: Caliptra RT
25,481,468 UART: [state] CFI Enabled
25,647,039 UART: [rt] RT listening for mailbox commands...
25,679,553 UART: [rt]cmd =0x44504543, len=136
29,897,458 >>> mbox cmd response data (136 bytes)
29,898,762 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,929,355 UART: [rt]cmd =0x44504543, len=92
34,285,526 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
193,049 UART:
193,423 UART: Running Caliptra ROM ...
194,623 UART:
604,096 UART: [state] CFI Enabled
620,885 UART: [state] LifecycleState = Unprovisioned
622,690 UART: [state] DebugLocked = No
625,534 UART: [state] WD Timer not started. Device not locked for debugging
629,659 UART: [kat] SHA2-256
808,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,407 UART: [kat] ++
820,944 UART: [kat] sha1
832,321 UART: [kat] SHA2-256
835,396 UART: [kat] SHA2-384
842,306 UART: [kat] SHA2-512-ACC
845,248 UART: [kat] ECC-384
3,284,424 UART: [kat] HMAC-384Kdf
3,296,451 UART: [kat] LMS
3,825,992 UART: [kat] --
3,828,706 UART: [cold-reset] ++
3,831,077 UART: [fht] FHT @ 0x50003400
3,842,692 UART: [idev] ++
3,843,262 UART: [idev] CDI.KEYID = 6
3,844,176 UART: [idev] SUBJECT.KEYID = 7
3,845,419 UART: [idev] UDS.KEYID = 0
3,846,346 ready_for_fw is high
3,846,546 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,919 UART: [idev] Erasing UDS.KEYID = 0
6,316,718 UART: [idev] Sha1 KeyId Algorithm
6,340,602 UART: [idev] --
6,344,812 UART: [ldev] ++
6,345,378 UART: [ldev] CDI.KEYID = 6
6,346,290 UART: [ldev] SUBJECT.KEYID = 5
6,347,500 UART: [ldev] AUTHORITY.KEYID = 7
6,348,726 UART: [ldev] FE.KEYID = 1
6,359,910 UART: [ldev] Erasing FE.KEYID = 1
8,834,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,489 UART: [ldev] --
10,622,566 UART: [fwproc] Wait for Commands...
10,625,462 UART: [fwproc] Recv command 0x46574c44
10,627,512 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,494,139 >>> mbox cmd response: success
14,494,744 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,499,069 UART: [afmc] ++
14,499,655 UART: [afmc] CDI.KEYID = 6
14,500,588 UART: [afmc] SUBJECT.KEYID = 7
14,501,752 UART: [afmc] AUTHORITY.KEYID = 5
17,004,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,711 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,355 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,262 UART: [afmc] --
18,799,788 UART: [cold-reset] --
18,803,436 UART: [state] Locking Datavault
18,807,760 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,399 UART: [state] Locking ICCM
18,811,981 UART: [exit] Launching FMC @ 0x40000130
18,820,382 UART:
18,820,620 UART: Running Caliptra FMC ...
18,821,739 UART:
18,821,902 UART: [state] CFI Enabled
18,830,167 UART: [fht] FMC Alias Private Key: 7
20,587,201 UART: [art] Extend RT PCRs Done
20,588,428 UART: [art] Lock RT PCRs Done
20,590,436 UART: [art] Populate DV Done
20,595,737 UART: [fht] FMC Alias Private Key: 7
20,597,278 UART: [art] Derive CDI
20,598,094 UART: [art] Store in in slot 0x4
20,640,907 UART: [art] Derive Key Pair
20,641,940 UART: [art] Store priv key in slot 0x5
23,068,279 UART: [art] Derive Key Pair - Done
23,081,165 UART: [art] Signing Cert with AUTHO
23,082,472 UART: RITY.KEYID = 7
24,787,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,509 UART: [art] PUB.X = 4BEEF8A7AB76F902F98376606780D9085E1327054273DB48D5AC83DF3E37A6E0B906480BA281F3F3C337E39F127C4348
24,796,783 UART: [art] PUB.Y = F7DB6B30E39C3F4E27584B502019999236A789B2D02C290C187869798C429DAE2445659AA7130F2E91B913336168DA0D
24,804,022 UART: [art] SIG.R = 2EAF1EB0D64CB7831D399FAC29212F41322FAE063C27A49A60C212EE4B5DB3CC600AE82D16A8A29B7509AEA4865A48C6
24,811,418 UART: [art] SIG.S = 91ADFB666D6AFFC2CC2D52296830D816D87C15E8900DA48D9B5D395B9BB022DA25090C1D6EC1FD4622BEFB7EC1123086
25,790,147 UART: Caliptra RT
25,790,850 UART: [state] CFI Enabled
25,908,093 UART: [rt] RT listening for mailbox commands...
25,940,338 UART: [rt]cmd =0x44504543, len=136
30,110,327 >>> mbox cmd response data (136 bytes)
30,111,675 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,142,216 UART: [rt]cmd =0x44504543, len=92
34,426,758 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,791 writing to cptra_bootfsm_go
3,698,187 ready_for_fw is high
3,698,803 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,235 >>> mbox cmd response: success
14,267,040 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,519,429 UART:
18,519,831 UART: Running Caliptra FMC ...
18,520,942 UART:
18,521,097 UART: [state] CFI Enabled
18,528,790 UART: [fht] FMC Alias Private Key: 7
20,284,874 UART: [art] Extend RT PCRs Done
20,286,102 UART: [art] Lock RT PCRs Done
20,287,811 UART: [art] Populate DV Done
20,293,272 UART: [fht] FMC Alias Private Key: 7
20,294,862 UART: [art] Derive CDI
20,295,603 UART: [art] Store in in slot 0x4
20,338,356 UART: [art] Derive Key Pair
20,339,381 UART: [art] Store priv key in slot 0x5
22,766,652 UART: [art] Derive Key Pair - Done
22,779,378 UART: [art] Signing Cert with AUTHO
22,780,680 UART: RITY.KEYID = 7
24,486,368 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,871 UART: [art] PUB.X = 7C9E3F4895B6609248128FCA74B6928E023F8940431CD5DB0478D3C2E4218E5C7A8647EEE9DB276CC9AB1FF2BFFCB391
24,495,120 UART: [art] PUB.Y = 67E38EEC23258D3B0BCAE5CA4276101B87870041F68090E62ACC66C1146C7C4ABDB9FAEBCFFA4803C02D576C630F032D
24,502,435 UART: [art] SIG.R = D08D6558ABA520C82A2220BD270E404DF7D22E3E070477A7C73EFF76CFC1DA8548FD927BE05DCFDC695EB8DEDB760D94
24,509,827 UART: [art] SIG.S = 3AB1B90CE00CE27F9FE9322D8E95745054037EDFDEB68AFECE976E39E9099427D7F55E0C38E3090D948DCF21D3138A84
25,488,637 UART: Caliptra RT
25,489,339 UART: [state] CFI Enabled
25,606,392 UART: [rt] RT listening for mailbox commands...
25,638,728 UART: [rt]cmd =0x44504543, len=136
29,809,041 >>> mbox cmd response data (136 bytes)
29,810,368 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
29,840,969 UART: [rt]cmd =0x44504543, len=92
34,125,961 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,191 UART:
192,558 UART: Running Caliptra ROM ...
193,663 UART:
193,809 UART: [state] CFI Enabled
260,436 UART: [state] LifecycleState = Unprovisioned
262,844 UART: [state] DebugLocked = No
265,161 UART: [state] WD Timer not started. Device not locked for debugging
269,214 UART: [kat] SHA2-256
459,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,845 UART: [kat] ++
470,294 UART: [kat] sha1
483,246 UART: [kat] SHA2-256
486,239 UART: [kat] SHA2-384
492,459 UART: [kat] SHA2-512-ACC
495,048 UART: [kat] ECC-384
2,948,002 UART: [kat] HMAC-384Kdf
2,970,201 UART: [kat] LMS
3,501,982 UART: [kat] --
3,508,413 UART: [cold-reset] ++
3,509,777 UART: [fht] FHT @ 0x50003400
3,521,415 UART: [idev] ++
3,522,169 UART: [idev] CDI.KEYID = 6
3,523,063 UART: [idev] SUBJECT.KEYID = 7
3,524,188 UART: [idev] UDS.KEYID = 0
3,525,239 ready_for_fw is high
3,525,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,977 UART: [idev] Erasing UDS.KEYID = 0
6,025,955 UART: [idev] Sha1 KeyId Algorithm
6,048,057 UART: [idev] --
6,053,851 UART: [ldev] ++
6,054,537 UART: [ldev] CDI.KEYID = 6
6,055,454 UART: [ldev] SUBJECT.KEYID = 5
6,056,620 UART: [ldev] AUTHORITY.KEYID = 7
6,057,855 UART: [ldev] FE.KEYID = 1
6,098,109 UART: [ldev] Erasing FE.KEYID = 1
8,606,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,128 UART: [ldev] --
10,411,212 UART: [fwproc] Wait for Commands...
10,412,717 UART: [fwproc] Recv command 0x46574c44
10,415,027 UART: [fwproc] Recv'd Img size: 114168 bytes
13,857,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,579 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,592,929 >>> mbox cmd response: success
14,593,507 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,597,385 UART: [afmc] ++
14,598,089 UART: [afmc] CDI.KEYID = 6
14,599,339 UART: [afmc] SUBJECT.KEYID = 7
14,600,780 UART: [afmc] AUTHORITY.KEYID = 5
17,126,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,849,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,866,472 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,881,614 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,896,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,919,703 UART: [afmc] --
18,923,409 UART: [cold-reset] --
18,926,787 UART: [state] Locking Datavault
18,933,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,482 UART: [state] Locking ICCM
18,938,482 UART: [exit] Launching FMC @ 0x40000130
18,947,150 UART:
18,947,381 UART: Running Caliptra FMC ...
18,948,416 UART:
18,948,561 UART: [state] CFI Enabled
19,006,790 UART: [fht] FMC Alias Private Key: 7
20,770,598 UART: [art] Extend RT PCRs Done
20,771,818 UART: [art] Lock RT PCRs Done
20,773,200 UART: [art] Populate DV Done
20,778,411 UART: [fht] FMC Alias Private Key: 7
20,780,111 UART: [art] Derive CDI
20,780,925 UART: [art] Store in in slot 0x4
20,839,006 UART: [art] Derive Key Pair
20,840,050 UART: [art] Store priv key in slot 0x5
23,302,776 UART: [art] Derive Key Pair - Done
23,315,692 UART: [art] Signing Cert with AUTHO
23,317,000 UART: RITY.KEYID = 7
25,027,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,029,333 UART: [art] PUB.X = C9A8AC418C0E1988EC2D8FE85538BFC6D392A5E6705A70507001DE08D431FB4E21FE7D9060D8DC5C67CBA789488C60BE
25,036,660 UART: [art] PUB.Y = C3E1597C0B9727B82F5A3807D4FFE64ED5DF7BAB8ABBA2F429D90D493CFE0E34B10A4274B7F3D568B0BB939F7A62C2B8
25,043,919 UART: [art] SIG.R = 47D39FB85F2618F319F7407BEBC0AAC7C9F969A7C80F7C78231D2BABEAEE77A3B1BC91DB3F5CC84B1A286B27DC30D784
25,051,324 UART: [art] SIG.S = 1310037DDC7359FCC08CFD090D0C5A5C99BAC0C9166E863D196213D44924BBD8A1301C9095A703B803149035CEBEE8AF
26,029,930 UART: Caliptra RT
26,030,646 UART: [state] CFI Enabled
26,197,483 UART: [rt] RT listening for mailbox commands...
26,229,886 UART: [rt]cmd =0x44504543, len=136
30,447,191 >>> mbox cmd response data (136 bytes)
30,448,674 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,479,324 UART: [rt]cmd =0x44504543, len=92
34,835,048 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,441,389 ready_for_fw is high
3,441,791 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,711,737 >>> mbox cmd response: success
14,712,650 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,004,764 UART:
19,005,166 UART: Running Caliptra FMC ...
19,006,368 UART:
19,006,541 UART: [state] CFI Enabled
19,073,950 UART: [fht] FMC Alias Private Key: 7
20,837,839 UART: [art] Extend RT PCRs Done
20,839,075 UART: [art] Lock RT PCRs Done
20,841,034 UART: [art] Populate DV Done
20,846,298 UART: [fht] FMC Alias Private Key: 7
20,847,896 UART: [art] Derive CDI
20,848,712 UART: [art] Store in in slot 0x4
20,906,209 UART: [art] Derive Key Pair
20,907,210 UART: [art] Store priv key in slot 0x5
23,370,118 UART: [art] Derive Key Pair - Done
23,382,854 UART: [art] Signing Cert with AUTHO
23,384,162 UART: RITY.KEYID = 7
25,095,338 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,851 UART: [art] PUB.X = 2266E01325C405B059DB62567E69E4D69CFDBA78B9E4F3B64539CF476FF0F4145F893C18BC423EB7AF4C744C1E6F5702
25,104,112 UART: [art] PUB.Y = CD42F2B47F5C94B7B9EAFAE1662040842131A6D65BD398C815EEE1F45C306137DB610E64BB4CE5CD8DAAFE76DB343EF9
25,111,337 UART: [art] SIG.R = D26486D50C606DF7782DE3C24284CF5FE957B1E5BE966CC1103D7817691FF746AE4050B72C5315909250945E8338E615
25,118,724 UART: [art] SIG.S = 649AB0CAE56AF201F3E7A0E41D773AE46DD3DAE6F5D63B8BFE1DA6B17A198F7F89DE1DDB8ABB547BCA2FE80059136C46
26,097,458 UART: Caliptra RT
26,098,201 UART: [state] CFI Enabled
26,264,549 UART: [rt] RT listening for mailbox commands...
26,297,099 UART: [rt]cmd =0x44504543, len=136
30,513,482 >>> mbox cmd response data (136 bytes)
30,514,782 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,545,416 UART: [rt]cmd =0x44504543, len=92
34,899,448 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,931 writing to cptra_bootfsm_go
193,023 UART:
193,395 UART: Running Caliptra ROM ...
194,547 UART:
604,088 UART: [state] CFI Enabled
617,051 UART: [state] LifecycleState = Unprovisioned
619,390 UART: [state] DebugLocked = No
620,643 UART: [state] WD Timer not started. Device not locked for debugging
625,270 UART: [kat] SHA2-256
815,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,942 UART: [kat] ++
826,543 UART: [kat] sha1
838,918 UART: [kat] SHA2-256
841,927 UART: [kat] SHA2-384
848,413 UART: [kat] SHA2-512-ACC
850,992 UART: [kat] ECC-384
3,290,519 UART: [kat] HMAC-384Kdf
3,302,105 UART: [kat] LMS
3,833,955 UART: [kat] --
3,838,543 UART: [cold-reset] ++
3,840,131 UART: [fht] FHT @ 0x50003400
3,851,756 UART: [idev] ++
3,852,464 UART: [idev] CDI.KEYID = 6
3,853,499 UART: [idev] SUBJECT.KEYID = 7
3,854,624 UART: [idev] UDS.KEYID = 0
3,855,554 ready_for_fw is high
3,855,766 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,999,221 UART: [idev] Erasing UDS.KEYID = 0
6,328,201 UART: [idev] Sha1 KeyId Algorithm
6,350,399 UART: [idev] --
6,355,693 UART: [ldev] ++
6,356,378 UART: [ldev] CDI.KEYID = 6
6,357,290 UART: [ldev] SUBJECT.KEYID = 5
6,358,449 UART: [ldev] AUTHORITY.KEYID = 7
6,359,674 UART: [ldev] FE.KEYID = 1
6,370,914 UART: [ldev] Erasing FE.KEYID = 1
8,850,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,097 UART: [ldev] --
10,641,747 UART: [fwproc] Wait for Commands...
10,644,165 UART: [fwproc] Recv command 0x46574c44
10,646,472 UART: [fwproc] Recv'd Img size: 114168 bytes
14,093,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,834,161 >>> mbox cmd response: success
14,834,744 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,838,886 UART: [afmc] ++
14,839,578 UART: [afmc] CDI.KEYID = 6
14,840,819 UART: [afmc] SUBJECT.KEYID = 7
14,842,250 UART: [afmc] AUTHORITY.KEYID = 5
17,348,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,564 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,884 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,449 UART: [afmc] --
19,145,449 UART: [cold-reset] --
19,148,404 UART: [state] Locking Datavault
19,152,899 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,092 UART: [state] Locking ICCM
19,157,999 UART: [exit] Launching FMC @ 0x40000130
19,166,669 UART:
19,166,911 UART: Running Caliptra FMC ...
19,168,013 UART:
19,168,173 UART: [state] CFI Enabled
19,176,387 UART: [fht] FMC Alias Private Key: 7
20,933,364 UART: [art] Extend RT PCRs Done
20,934,600 UART: [art] Lock RT PCRs Done
20,936,250 UART: [art] Populate DV Done
20,941,819 UART: [fht] FMC Alias Private Key: 7
20,943,408 UART: [art] Derive CDI
20,944,222 UART: [art] Store in in slot 0x4
20,986,594 UART: [art] Derive Key Pair
20,987,590 UART: [art] Store priv key in slot 0x5
23,414,267 UART: [art] Derive Key Pair - Done
23,427,265 UART: [art] Signing Cert with AUTHO
23,428,569 UART: RITY.KEYID = 7
25,133,992 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,493 UART: [art] PUB.X = D2103886CEE68192B116808E2BA74FAD19D69C3EFB8FE6236181B801E217F13B6179008E0C111F10A774A08529C6FC00
25,142,734 UART: [art] PUB.Y = 9A18DA971F724781F09B598F7DC1211E5FC09725408200EB28CBC303592A20DFEBDCA5F7CDEB214C7FF984C3A39867DD
25,149,972 UART: [art] SIG.R = 1B2F5D2D676ED5ED6146875978BC7D78AAF293C7316AA92C9D76535E5A0B9EBFA5870F999DEAE8D3A656CCD25F137037
25,157,366 UART: [art] SIG.S = 130F80F3D22B541ECD7CF5BB76D7FB7643E49383F02BEB730128AA53CE343CAA101E055335E57689FAF388F348E7AE57
26,135,715 UART: Caliptra RT
26,136,422 UART: [state] CFI Enabled
26,253,963 UART: [rt] RT listening for mailbox commands...
26,286,553 UART: [rt]cmd =0x44504543, len=136
30,456,323 >>> mbox cmd response data (136 bytes)
30,457,674 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,488,229 UART: [rt]cmd =0x44504543, len=92
34,773,465 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
3,756,884 ready_for_fw is high
3,757,470 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,938,536 >>> mbox cmd response: success
14,939,308 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,192,652 UART:
19,193,062 UART: Running Caliptra FMC ...
19,194,164 UART:
19,194,317 UART: [state] CFI Enabled
19,202,335 UART: [fht] FMC Alias Private Key: 7
20,958,370 UART: [art] Extend RT PCRs Done
20,959,607 UART: [art] Lock RT PCRs Done
20,961,427 UART: [art] Populate DV Done
20,967,061 UART: [fht] FMC Alias Private Key: 7
20,968,765 UART: [art] Derive CDI
20,969,524 UART: [art] Store in in slot 0x4
21,012,418 UART: [art] Derive Key Pair
21,013,464 UART: [art] Store priv key in slot 0x5
23,439,934 UART: [art] Derive Key Pair - Done
23,453,145 UART: [art] Signing Cert with AUTHO
23,454,450 UART: RITY.KEYID = 7
25,159,525 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,033 UART: [art] PUB.X = 3D7AF0895564A294A19C61C19841745D0BF6FFFDB9C9927D85E33C8841E093A0B6EE49E39557A580CF470D6D7D6033A7
25,168,355 UART: [art] PUB.Y = 8790F749D07B923806D1BD4E0B3D5D8F2C360D6EDBA16E15E500D9AE8F7E08847F02AB71DBE2523F0410F10AF82D469E
25,175,545 UART: [art] SIG.R = BD3081CECA19E2C165D8177DD0BF0599548C25AD20B4EBE815BF6B8FD11C5414B119A6FB65092F5F2945CF029C127520
25,182,936 UART: [art] SIG.S = 9EFD9E0342D3BD31F193BA9D8C0A16E1242FEAC9A18E8985ED648D05FE827BAB5885202FBED1DEF3C158DF14477A8992
26,162,139 UART: Caliptra RT
26,162,845 UART: [state] CFI Enabled
26,280,665 UART: [rt] RT listening for mailbox commands...
26,313,043 UART: [rt]cmd =0x44504543, len=136
30,482,987 >>> mbox cmd response data (136 bytes)
30,484,317 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,515,124 UART: [rt]cmd =0x44504543, len=92
34,800,425 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,203 UART: [kat] SHA2-256
882,134 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,249 UART: [kat] ++
886,401 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,240 UART: [kat] SHA2-512-ACC
897,141 UART: [kat] ECC-384
902,626 UART: [kat] HMAC-384Kdf
907,278 UART: [kat] LMS
1,475,474 UART: [kat] --
1,476,221 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,478 UART: [idev] ++
1,479,646 UART: [idev] CDI.KEYID = 6
1,480,006 UART: [idev] SUBJECT.KEYID = 7
1,480,430 UART: [idev] UDS.KEYID = 0
1,480,775 ready_for_fw is high
1,480,775 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,480 UART: [idev] Erasing UDS.KEYID = 0
1,505,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,026 UART: [idev] --
1,515,093 UART: [ldev] ++
1,515,261 UART: [ldev] CDI.KEYID = 6
1,515,624 UART: [ldev] SUBJECT.KEYID = 5
1,516,050 UART: [ldev] AUTHORITY.KEYID = 7
1,516,513 UART: [ldev] FE.KEYID = 1
1,521,919 UART: [ldev] Erasing FE.KEYID = 1
1,546,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,804 UART: [ldev] --
1,586,161 UART: [fwproc] Waiting for Commands...
1,586,862 UART: [fwproc] Received command 0x46574c44
1,587,653 UART: [fwproc] Received Image of size 114168 bytes
2,884,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,879 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,820 >>> mbox cmd response: success
3,076,820 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,078,004 UART: [afmc] ++
3,078,172 UART: [afmc] CDI.KEYID = 6
3,078,534 UART: [afmc] SUBJECT.KEYID = 7
3,078,959 UART: [afmc] AUTHORITY.KEYID = 5
3,113,712 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,814 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,594 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,207 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,897 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,690 UART: [afmc] --
3,156,686 UART: [cold-reset] --
3,157,672 UART: [state] Locking Datavault
3,158,773 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,377 UART: [state] Locking ICCM
3,159,959 UART: [exit] Launching FMC @ 0x40000130
3,165,288 UART:
3,165,304 UART: Running Caliptra FMC ...
3,165,712 UART:
3,165,766 UART: [state] CFI Enabled
3,176,399 UART: [fht] FMC Alias Private Key: 7
3,284,920 UART: [art] Extend RT PCRs Done
3,285,348 UART: [art] Lock RT PCRs Done
3,287,208 UART: [art] Populate DV Done
3,295,265 UART: [fht] FMC Alias Private Key: 7
3,296,237 UART: [art] Derive CDI
3,296,517 UART: [art] Store in in slot 0x4
3,382,180 UART: [art] Derive Key Pair
3,382,540 UART: [art] Store priv key in slot 0x5
3,395,496 UART: [art] Derive Key Pair - Done
3,410,051 UART: [art] Signing Cert with AUTHO
3,410,531 UART: RITY.KEYID = 7
3,425,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,372 UART: [art] PUB.X = B88A2EA9AB99A441741C25A9EC1C897E8FC9D4554E2E7DF0DD13B22F0328B75778102940487B6A40789FC1F30A719494
3,433,136 UART: [art] PUB.Y = FB5D59178899B05C2B08F56DE97DA89A6F3463AB580882845CAE9C78D945EF522489CF445B3D52B60692F4FB0C2F887A
3,440,078 UART: [art] SIG.R = 3154A7DDE5DE6F005D079F4D0C258958EBA6385345839330C71CF35E135D4C40AA3105621D76A9FE3BB0DB1E1B18B6E9
3,446,823 UART: [art] SIG.S = 31210360E47B8B0B8B5A94E4702CA47BD9DDB5AF8B88E48FF0112400061C59464590C6ED6AD7DEB41738BBFD97ABFB72
3,470,767 UART: Caliptra RT
3,471,020 UART: [state] CFI Enabled
3,579,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,812 UART: [rt]cmd =0x44504543, len=136
3,674,430 >>> mbox cmd response data (136 bytes)
3,674,431 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,206 UART: [rt]cmd =0x44504543, len=92
3,887,077 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,773 ready_for_fw is high
1,362,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,776 >>> mbox cmd response: success
2,925,776 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,987,250 UART:
2,987,266 UART: Running Caliptra FMC ...
2,987,674 UART:
2,987,728 UART: [state] CFI Enabled
2,998,141 UART: [fht] FMC Alias Private Key: 7
3,106,038 UART: [art] Extend RT PCRs Done
3,106,466 UART: [art] Lock RT PCRs Done
3,108,120 UART: [art] Populate DV Done
3,116,467 UART: [fht] FMC Alias Private Key: 7
3,117,637 UART: [art] Derive CDI
3,117,917 UART: [art] Store in in slot 0x4
3,203,760 UART: [art] Derive Key Pair
3,204,120 UART: [art] Store priv key in slot 0x5
3,217,164 UART: [art] Derive Key Pair - Done
3,232,163 UART: [art] Signing Cert with AUTHO
3,232,643 UART: RITY.KEYID = 7
3,247,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,530 UART: [art] PUB.X = C68DE8502781ADDA132C95562343828CF2A7AA0FEABE36DA169CD24A57F11B53692CAFDDF12F479E7BD1FE7275CEE756
3,255,315 UART: [art] PUB.Y = C9B799C386AC7A8442B017D2D160E858183E10BC3268CD5B0C703419F7EF0D9C850A8D4CDCAFC087D56EF18A8FCC9146
3,262,268 UART: [art] SIG.R = 02471934FACDF71AD406BBDC7FDE124F1E19CDC0CCE0BDFBE963C88345C7F9792BC0183D0D89B3335883D4C124BC4DAF
3,269,051 UART: [art] SIG.S = BECB7263167A73597833DE5CA2A9AB2F6F56587246572B86169C5EA67B69BEFC9E4860DF75A184D9D5042E873BA2704E
3,292,589 UART: Caliptra RT
3,292,842 UART: [state] CFI Enabled
3,400,363 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,489 UART: [rt]cmd =0x44504543, len=136
3,494,949 >>> mbox cmd response data (136 bytes)
3,494,950 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,843 UART: [rt]cmd =0x44504543, len=92
3,707,293 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,716 UART: [kat] SHA2-256
892,654 UART: [kat] SHA2-384
895,339 UART: [kat] SHA2-512-ACC
897,240 UART: [kat] ECC-384
902,821 UART: [kat] HMAC-384Kdf
907,481 UART: [kat] LMS
1,475,677 UART: [kat] --
1,476,232 UART: [cold-reset] ++
1,476,612 UART: [fht] Storing FHT @ 0x50003400
1,479,527 UART: [idev] ++
1,479,695 UART: [idev] CDI.KEYID = 6
1,480,055 UART: [idev] SUBJECT.KEYID = 7
1,480,479 UART: [idev] UDS.KEYID = 0
1,480,824 ready_for_fw is high
1,480,824 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,741 UART: [idev] Erasing UDS.KEYID = 0
1,505,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,097 UART: [idev] --
1,514,980 UART: [ldev] ++
1,515,148 UART: [ldev] CDI.KEYID = 6
1,515,511 UART: [ldev] SUBJECT.KEYID = 5
1,515,937 UART: [ldev] AUTHORITY.KEYID = 7
1,516,400 UART: [ldev] FE.KEYID = 1
1,521,724 UART: [ldev] Erasing FE.KEYID = 1
1,547,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,025 UART: [ldev] --
1,586,408 UART: [fwproc] Waiting for Commands...
1,587,069 UART: [fwproc] Received command 0x46574c44
1,587,860 UART: [fwproc] Received Image of size 114168 bytes
2,884,654 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,417 >>> mbox cmd response: success
3,077,417 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,078,669 UART: [afmc] ++
3,078,837 UART: [afmc] CDI.KEYID = 6
3,079,199 UART: [afmc] SUBJECT.KEYID = 7
3,079,624 UART: [afmc] AUTHORITY.KEYID = 5
3,114,811 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,317 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,202 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,892 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,935 UART: [afmc] --
3,158,059 UART: [cold-reset] --
3,158,951 UART: [state] Locking Datavault
3,160,230 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,834 UART: [state] Locking ICCM
3,161,302 UART: [exit] Launching FMC @ 0x40000130
3,166,631 UART:
3,166,647 UART: Running Caliptra FMC ...
3,167,055 UART:
3,167,198 UART: [state] CFI Enabled
3,177,869 UART: [fht] FMC Alias Private Key: 7
3,285,674 UART: [art] Extend RT PCRs Done
3,286,102 UART: [art] Lock RT PCRs Done
3,287,836 UART: [art] Populate DV Done
3,296,157 UART: [fht] FMC Alias Private Key: 7
3,297,205 UART: [art] Derive CDI
3,297,485 UART: [art] Store in in slot 0x4
3,383,356 UART: [art] Derive Key Pair
3,383,716 UART: [art] Store priv key in slot 0x5
3,396,644 UART: [art] Derive Key Pair - Done
3,411,279 UART: [art] Signing Cert with AUTHO
3,411,759 UART: RITY.KEYID = 7
3,427,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,008 UART: [art] PUB.X = 9FE59BF33E6462A33AA02600A466C67407D7CF1E401844B38CD5CA985D676AB8C489DC5EB5E25D7E40CF35C2525585B6
3,434,759 UART: [art] PUB.Y = 774195BE8F9373F347C7127EFFCA4DD0229E11EFD09747B2FAAD695BEB4E7B1E70B460A28BD19E5A08182B67D98EF0C5
3,441,720 UART: [art] SIG.R = 2F0A2B1FDCC7F2DC2DEC67CCAD11B07699862A7E78C2CD1287C114938E511BEFB3F94D77AAF690333D43065639309308
3,448,489 UART: [art] SIG.S = 98AFD5004AAE74471AC0CCA79B26D2738BAC627C858F9D663868B1650147BBC2E6FA24E28F5E7AF537BBA30BC6C35E32
3,472,576 UART: Caliptra RT
3,472,921 UART: [state] CFI Enabled
3,581,494 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,234 UART: [rt]cmd =0x44504543, len=136
3,675,824 >>> mbox cmd response data (136 bytes)
3,675,825 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,552 UART: [rt]cmd =0x44504543, len=92
3,889,407 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,020 ready_for_fw is high
1,362,020 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,491 >>> mbox cmd response: success
2,926,491 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,988,211 UART:
2,988,227 UART: Running Caliptra FMC ...
2,988,635 UART:
2,988,778 UART: [state] CFI Enabled
2,999,709 UART: [fht] FMC Alias Private Key: 7
3,107,948 UART: [art] Extend RT PCRs Done
3,108,376 UART: [art] Lock RT PCRs Done
3,109,994 UART: [art] Populate DV Done
3,117,879 UART: [fht] FMC Alias Private Key: 7
3,118,887 UART: [art] Derive CDI
3,119,167 UART: [art] Store in in slot 0x4
3,204,772 UART: [art] Derive Key Pair
3,205,132 UART: [art] Store priv key in slot 0x5
3,218,782 UART: [art] Derive Key Pair - Done
3,233,609 UART: [art] Signing Cert with AUTHO
3,234,089 UART: RITY.KEYID = 7
3,249,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,986 UART: [art] PUB.X = AB330EDFA768E5156E66E2DC6DBD858354A45D3BCA414E1B916831847E11989006663F582D355BB2545A742663A64F5A
3,256,748 UART: [art] PUB.Y = 3625237FB30EE0207BC93F2575873AD1ED12E8C5B52554A0E76904D4AC2FC533F6F1E7F36F2DF2B8BB0FD11926626E93
3,263,695 UART: [art] SIG.R = 0C2E2ACD4D6288036E7BA1DACA8128FB9B2ED64E458FE67AA96CD46DCDFC7A73CC088BB86B647D1E821BCD90A669A330
3,270,480 UART: [art] SIG.S = 3C73E6DCAC2EE841430C5E923B99B37F7ACC0B95FFA2CDF855EA9FB0C080B7A0FC61C0EEE2C3D999D8945E3F32CB8382
3,294,317 UART: Caliptra RT
3,294,662 UART: [state] CFI Enabled
3,402,950 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,480 UART: [rt]cmd =0x44504543, len=136
3,497,660 >>> mbox cmd response data (136 bytes)
3,497,661 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,426 UART: [rt]cmd =0x44504543, len=92
3,711,031 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
901,997 UART: [kat] SHA2-256
903,937 UART: [kat] SHA2-384
906,812 UART: [kat] SHA2-512-ACC
908,713 UART: [kat] ECC-384
918,342 UART: [kat] HMAC-384Kdf
922,888 UART: [kat] LMS
1,171,216 UART: [kat] --
1,171,879 UART: [cold-reset] ++
1,172,391 UART: [fht] FHT @ 0x50003400
1,175,148 UART: [idev] ++
1,175,316 UART: [idev] CDI.KEYID = 6
1,175,676 UART: [idev] SUBJECT.KEYID = 7
1,176,100 UART: [idev] UDS.KEYID = 0
1,176,445 ready_for_fw is high
1,176,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,918 UART: [idev] Erasing UDS.KEYID = 0
1,200,811 UART: [idev] Sha1 KeyId Algorithm
1,209,235 UART: [idev] --
1,210,233 UART: [ldev] ++
1,210,401 UART: [ldev] CDI.KEYID = 6
1,210,764 UART: [ldev] SUBJECT.KEYID = 5
1,211,190 UART: [ldev] AUTHORITY.KEYID = 7
1,211,653 UART: [ldev] FE.KEYID = 1
1,216,785 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,161 UART: [ldev] --
1,282,550 UART: [fwproc] Wait for Commands...
1,283,202 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,185 >>> mbox cmd response: success
2,774,185 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,775,219 UART: [afmc] ++
2,775,387 UART: [afmc] CDI.KEYID = 6
2,775,749 UART: [afmc] SUBJECT.KEYID = 7
2,776,174 UART: [afmc] AUTHORITY.KEYID = 5
2,811,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,285 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,004 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,760 UART: [afmc] --
2,854,780 UART: [cold-reset] --
2,855,564 UART: [state] Locking Datavault
2,856,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,121 UART: [state] Locking ICCM
2,857,727 UART: [exit] Launching FMC @ 0x40000130
2,863,056 UART:
2,863,072 UART: Running Caliptra FMC ...
2,863,480 UART:
2,863,534 UART: [state] CFI Enabled
2,873,607 UART: [fht] FMC Alias Private Key: 7
2,981,430 UART: [art] Extend RT PCRs Done
2,981,858 UART: [art] Lock RT PCRs Done
2,983,750 UART: [art] Populate DV Done
2,992,171 UART: [fht] FMC Alias Private Key: 7
2,993,111 UART: [art] Derive CDI
2,993,391 UART: [art] Store in in slot 0x4
3,079,220 UART: [art] Derive Key Pair
3,079,580 UART: [art] Store priv key in slot 0x5
3,092,690 UART: [art] Derive Key Pair - Done
3,107,647 UART: [art] Signing Cert with AUTHO
3,108,127 UART: RITY.KEYID = 7
3,122,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,628 UART: [art] PUB.X = 1E5C91F951A7EF220B39025A640E57BC5CAEFCBECB2801CB48ACDAB46EE3A38FC5F38BD802D1A8C1774996DFC989618C
3,130,405 UART: [art] PUB.Y = 256A149E930A926CB684CBA7CD8B620A8AE1961D9713B4FE7B74344495398ED63C5A2690B528BA892DC74047F9165240
3,137,345 UART: [art] SIG.R = A8599B849626D4C6CD55CDCF7289D7178A5FD846DD29E459C57B83D289E88DA5235A3C67E0EFD4A00168A28A146C0368
3,144,113 UART: [art] SIG.S = A8E182F02CA931E5E4CF6168665DB6CE4618D563A814D94D2FD33A32B3C03C4D18B7508E10207059DE95CECC44A4943C
3,167,760 UART: Caliptra RT
3,168,013 UART: [state] CFI Enabled
3,275,995 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,323 UART: [rt]cmd =0x44504543, len=136
3,371,849 >>> mbox cmd response data (136 bytes)
3,371,850 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,837 UART: [rt]cmd =0x44504543, len=92
3,584,742 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,155 ready_for_fw is high
1,060,155 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,084 >>> mbox cmd response: success
2,624,084 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,686,668 UART:
2,686,684 UART: Running Caliptra FMC ...
2,687,092 UART:
2,687,146 UART: [state] CFI Enabled
2,697,359 UART: [fht] FMC Alias Private Key: 7
2,804,882 UART: [art] Extend RT PCRs Done
2,805,310 UART: [art] Lock RT PCRs Done
2,806,672 UART: [art] Populate DV Done
2,814,493 UART: [fht] FMC Alias Private Key: 7
2,815,485 UART: [art] Derive CDI
2,815,765 UART: [art] Store in in slot 0x4
2,901,540 UART: [art] Derive Key Pair
2,901,900 UART: [art] Store priv key in slot 0x5
2,915,426 UART: [art] Derive Key Pair - Done
2,930,085 UART: [art] Signing Cert with AUTHO
2,930,565 UART: RITY.KEYID = 7
2,945,959 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,724 UART: [art] PUB.X = 3232574FAAD036C235E0A253F3295FC9892D0FF9825A44C6664C3F82595CEF26E87BC3292336ED852829D7FD21C0A112
2,953,489 UART: [art] PUB.Y = 61ED78FFB4DDF971362BD3AC7BEE828A4BE394F0F2E05959FDEA8DD4C69CBAD6B5227404C55CC4073F7DC7A2B4695CB0
2,960,457 UART: [art] SIG.R = 9511115ABEE3350F12FDABB4128454FF0C64BDC22FAA517357D811612DF358FBECC0B4A42DD771F339FF896EC495E95D
2,967,235 UART: [art] SIG.S = 649638428ADBA39743303448390A12FACA1AE0E9E527FEABB5A9EA1222F30FB6A634D1BC9DE5990C4FE6BBCDFB80D8C8
2,991,445 UART: Caliptra RT
2,991,698 UART: [state] CFI Enabled
3,098,751 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,103 UART: [rt]cmd =0x44504543, len=136
3,193,505 >>> mbox cmd response data (136 bytes)
3,193,506 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,377 UART: [rt]cmd =0x44504543, len=92
3,406,796 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
918,307 UART: [kat] HMAC-384Kdf
923,001 UART: [kat] LMS
1,171,329 UART: [kat] --
1,172,288 UART: [cold-reset] ++
1,172,742 UART: [fht] FHT @ 0x50003400
1,175,457 UART: [idev] ++
1,175,625 UART: [idev] CDI.KEYID = 6
1,175,985 UART: [idev] SUBJECT.KEYID = 7
1,176,409 UART: [idev] UDS.KEYID = 0
1,176,754 ready_for_fw is high
1,176,754 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,549 UART: [idev] Erasing UDS.KEYID = 0
1,201,514 UART: [idev] Sha1 KeyId Algorithm
1,209,992 UART: [idev] --
1,211,012 UART: [ldev] ++
1,211,180 UART: [ldev] CDI.KEYID = 6
1,211,543 UART: [ldev] SUBJECT.KEYID = 5
1,211,969 UART: [ldev] AUTHORITY.KEYID = 7
1,212,432 UART: [ldev] FE.KEYID = 1
1,217,712 UART: [ldev] Erasing FE.KEYID = 1
1,243,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,980 UART: [ldev] --
1,283,319 UART: [fwproc] Wait for Commands...
1,283,943 UART: [fwproc] Recv command 0x46574c44
1,284,671 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,523 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,324 >>> mbox cmd response: success
2,771,324 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,402 UART: [afmc] ++
2,772,570 UART: [afmc] CDI.KEYID = 6
2,772,932 UART: [afmc] SUBJECT.KEYID = 7
2,773,357 UART: [afmc] AUTHORITY.KEYID = 5
2,808,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,127 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,740 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,459 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,215 UART: [afmc] --
2,852,323 UART: [cold-reset] --
2,853,213 UART: [state] Locking Datavault
2,854,348 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,952 UART: [state] Locking ICCM
2,855,582 UART: [exit] Launching FMC @ 0x40000130
2,860,911 UART:
2,860,927 UART: Running Caliptra FMC ...
2,861,335 UART:
2,861,478 UART: [state] CFI Enabled
2,872,131 UART: [fht] FMC Alias Private Key: 7
2,980,218 UART: [art] Extend RT PCRs Done
2,980,646 UART: [art] Lock RT PCRs Done
2,982,182 UART: [art] Populate DV Done
2,990,593 UART: [fht] FMC Alias Private Key: 7
2,991,775 UART: [art] Derive CDI
2,992,055 UART: [art] Store in in slot 0x4
3,077,820 UART: [art] Derive Key Pair
3,078,180 UART: [art] Store priv key in slot 0x5
3,091,286 UART: [art] Derive Key Pair - Done
3,105,972 UART: [art] Signing Cert with AUTHO
3,106,452 UART: RITY.KEYID = 7
3,121,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,307 UART: [art] PUB.X = DC928E0BF4F7A684E3591C5D04DE014178B661496878242BFE9C6866FC2742A702F1CABEF509BB8ACB80CDBB961D3408
3,129,069 UART: [art] PUB.Y = BF82C6B9EDC9EBFA30B8A417521EF01557BAF17E7926B1517A20E0F11583BC261102058C7DC1586FEB83963A1D947F0D
3,136,018 UART: [art] SIG.R = DB2BDD324F81539575B50646EDCCBE4BD458B06D74AC23AF83D9E275F9FCFD50F658E726A5AC5A33BF936A4C19125D86
3,142,801 UART: [art] SIG.S = 84088D0AF1A5C673A699A655D384500355734A79C22FCBDB0FF181E543F0ECDD1DD6F3C705DB4449F09423CDF6E5025C
3,166,302 UART: Caliptra RT
3,166,647 UART: [state] CFI Enabled
3,273,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,423 UART: [rt]cmd =0x44504543, len=136
3,368,821 >>> mbox cmd response data (136 bytes)
3,368,822 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,735 UART: [rt]cmd =0x44504543, len=92
3,582,198 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,146 ready_for_fw is high
1,060,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,551 >>> mbox cmd response: success
2,624,551 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,687,527 UART:
2,687,543 UART: Running Caliptra FMC ...
2,687,951 UART:
2,688,094 UART: [state] CFI Enabled
2,698,477 UART: [fht] FMC Alias Private Key: 7
2,806,712 UART: [art] Extend RT PCRs Done
2,807,140 UART: [art] Lock RT PCRs Done
2,808,828 UART: [art] Populate DV Done
2,817,191 UART: [fht] FMC Alias Private Key: 7
2,818,151 UART: [art] Derive CDI
2,818,431 UART: [art] Store in in slot 0x4
2,904,324 UART: [art] Derive Key Pair
2,904,684 UART: [art] Store priv key in slot 0x5
2,917,504 UART: [art] Derive Key Pair - Done
2,932,332 UART: [art] Signing Cert with AUTHO
2,932,812 UART: RITY.KEYID = 7
2,947,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,577 UART: [art] PUB.X = 949E319D8955694A5ED8F973B2649BF07AA4C3C571D6073BF4B019DD6ACBE93A0E515DD48C1C34C66AA3B59FFD2722CA
2,955,355 UART: [art] PUB.Y = B9B64636E3A27CD85E190B285AFA319E4F888608000E90FD1F59E0C9DC6971A3F02F325C77056A62A182554F5F74A738
2,962,269 UART: [art] SIG.R = ACF205C3BBE4841973A0438A97E70EE10470A53C0917DE26019792DCF0089D65F993A986322CB71C4BDE9CC4D48141B8
2,969,023 UART: [art] SIG.S = 36B18EA70245FF070CDD186D86C71E93A9588BE18FE4B0C775CE6465748F4342A6566F0CE5C498B43D697EE4E2EE981F
2,992,702 UART: Caliptra RT
2,993,047 UART: [state] CFI Enabled
3,101,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,188 UART: [rt]cmd =0x44504543, len=136
3,197,336 >>> mbox cmd response data (136 bytes)
3,197,337 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,374 UART: [rt]cmd =0x44504543, len=92
3,411,587 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,549 UART: [cold-reset] ++
1,170,111 UART: [fht] FHT @ 0x50003400
1,172,877 UART: [idev] ++
1,173,045 UART: [idev] CDI.KEYID = 6
1,173,406 UART: [idev] SUBJECT.KEYID = 7
1,173,831 UART: [idev] UDS.KEYID = 0
1,174,177 ready_for_fw is high
1,174,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,133 UART: [idev] Erasing UDS.KEYID = 0
1,199,669 UART: [idev] Sha1 KeyId Algorithm
1,208,365 UART: [idev] --
1,209,414 UART: [ldev] ++
1,209,582 UART: [ldev] CDI.KEYID = 6
1,209,946 UART: [ldev] SUBJECT.KEYID = 5
1,210,373 UART: [ldev] AUTHORITY.KEYID = 7
1,210,836 UART: [ldev] FE.KEYID = 1
1,216,062 UART: [ldev] Erasing FE.KEYID = 1
1,242,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,220 UART: [ldev] --
1,281,628 UART: [fwproc] Wait for Commands...
1,282,395 UART: [fwproc] Recv command 0x46574c44
1,283,128 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,614 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,443 >>> mbox cmd response: success
2,771,443 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,772,616 UART: [afmc] ++
2,772,784 UART: [afmc] CDI.KEYID = 6
2,773,147 UART: [afmc] SUBJECT.KEYID = 7
2,773,573 UART: [afmc] AUTHORITY.KEYID = 5
2,808,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,843 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,455 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,201 UART: [afmc] --
2,852,231 UART: [cold-reset] --
2,853,009 UART: [state] Locking Datavault
2,854,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,648 UART: [state] Locking ICCM
2,855,280 UART: [exit] Launching FMC @ 0x40000130
2,860,609 UART:
2,860,625 UART: Running Caliptra FMC ...
2,861,033 UART:
2,861,087 UART: [state] CFI Enabled
2,871,612 UART: [fht] FMC Alias Private Key: 7
2,979,337 UART: [art] Extend RT PCRs Done
2,979,765 UART: [art] Lock RT PCRs Done
2,981,575 UART: [art] Populate DV Done
2,989,710 UART: [fht] FMC Alias Private Key: 7
2,990,790 UART: [art] Derive CDI
2,991,070 UART: [art] Store in in slot 0x4
3,076,371 UART: [art] Derive Key Pair
3,076,731 UART: [art] Store priv key in slot 0x5
3,090,427 UART: [art] Derive Key Pair - Done
3,105,467 UART: [art] Signing Cert with AUTHO
3,105,947 UART: RITY.KEYID = 7
3,121,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,008 UART: [art] PUB.X = 2F9F8F3FD6B8B930ADF1D9504280DA3DFC2E31A9904AC7CBF5FD3E5C4FB0484080682D1AABEF8877A4B03DE44EE7A90F
3,128,799 UART: [art] PUB.Y = 0F3686E12DEBD684B509DC83D733571E12DE469AABAC1DE4F331F8D9F3E8C24C430A4FEBB16534362A485D5864167833
3,135,746 UART: [art] SIG.R = A8E1EA3697B52FF8454BEC11AE2AF92F42F87A8168D55DCCB48A3EAB3202DC02AFCFECB1F317ABFC3BCCC48D3CC525E1
3,142,544 UART: [art] SIG.S = 5D00D467424AF0F3FE6E4BCDEBCB84A2CEF0CB03A7C65C16957ACAA1077D921F9D397FA7869038347DBA52F2A757FFED
3,166,395 UART: Caliptra RT
3,166,648 UART: [state] CFI Enabled
3,273,825 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,197 UART: [rt]cmd =0x44504543, len=136
3,368,657 >>> mbox cmd response data (136 bytes)
3,368,658 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,615 UART: [rt]cmd =0x44504543, len=92
3,581,698 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,528 ready_for_fw is high
1,055,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,405 >>> mbox cmd response: success
2,619,405 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,681,227 UART:
2,681,243 UART: Running Caliptra FMC ...
2,681,651 UART:
2,681,705 UART: [state] CFI Enabled
2,692,564 UART: [fht] FMC Alias Private Key: 7
2,800,703 UART: [art] Extend RT PCRs Done
2,801,131 UART: [art] Lock RT PCRs Done
2,802,753 UART: [art] Populate DV Done
2,810,848 UART: [fht] FMC Alias Private Key: 7
2,811,824 UART: [art] Derive CDI
2,812,104 UART: [art] Store in in slot 0x4
2,897,991 UART: [art] Derive Key Pair
2,898,351 UART: [art] Store priv key in slot 0x5
2,911,549 UART: [art] Derive Key Pair - Done
2,925,965 UART: [art] Signing Cert with AUTHO
2,926,445 UART: RITY.KEYID = 7
2,941,961 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,726 UART: [art] PUB.X = 8A757249663D6B713F732A54E289EBA751EAEBE41FE836F447DE9DA21CB0D490C3290CC180DB1846459D32693AC7D2C1
2,949,499 UART: [art] PUB.Y = 5A4C32DB7B3099BF7CD5F7C2BE532B3325CC2414ECFC078B71AFF70EA6F3C4E2B1465E0AAAB8E0FE825A6596A2649132
2,956,458 UART: [art] SIG.R = C11A373DF416FBE202061802A7AE3592C3DE01832C4C05A21A3FC1E2814D03BBDBC66F318DECE10D7ED0D117D7315386
2,963,217 UART: [art] SIG.S = 72451D664A9023D855CAACBE80E8F118AFBAD019F6BDF4CCB297D9C2B1315F38D2EABA6EA0A29F3893659885B1F326B6
2,987,302 UART: Caliptra RT
2,987,555 UART: [state] CFI Enabled
3,095,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,454 UART: [rt]cmd =0x44504543, len=136
3,190,700 >>> mbox cmd response data (136 bytes)
3,190,701 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,436 UART: [rt]cmd =0x44504543, len=92
3,404,056 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,171,060 UART: [fht] FHT @ 0x50003400
1,173,806 UART: [idev] ++
1,173,974 UART: [idev] CDI.KEYID = 6
1,174,335 UART: [idev] SUBJECT.KEYID = 7
1,174,760 UART: [idev] UDS.KEYID = 0
1,175,106 ready_for_fw is high
1,175,106 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,098 UART: [idev] Erasing UDS.KEYID = 0
1,199,966 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,479 UART: [ldev] SUBJECT.KEYID = 5
1,210,906 UART: [ldev] AUTHORITY.KEYID = 7
1,211,369 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,243,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,439 UART: [fwproc] Wait for Commands...
1,283,072 UART: [fwproc] Recv command 0x46574c44
1,283,805 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,646 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,160 >>> mbox cmd response: success
2,772,160 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,773,349 UART: [afmc] ++
2,773,517 UART: [afmc] CDI.KEYID = 6
2,773,880 UART: [afmc] SUBJECT.KEYID = 7
2,774,306 UART: [afmc] AUTHORITY.KEYID = 5
2,810,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,313 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,196 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,915 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,856 UART: [afmc] --
2,853,918 UART: [cold-reset] --
2,854,662 UART: [state] Locking Datavault
2,855,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,511 UART: [state] Locking ICCM
2,857,063 UART: [exit] Launching FMC @ 0x40000130
2,862,392 UART:
2,862,408 UART: Running Caliptra FMC ...
2,862,816 UART:
2,862,959 UART: [state] CFI Enabled
2,873,492 UART: [fht] FMC Alias Private Key: 7
2,980,977 UART: [art] Extend RT PCRs Done
2,981,405 UART: [art] Lock RT PCRs Done
2,983,135 UART: [art] Populate DV Done
2,991,288 UART: [fht] FMC Alias Private Key: 7
2,992,318 UART: [art] Derive CDI
2,992,598 UART: [art] Store in in slot 0x4
3,078,393 UART: [art] Derive Key Pair
3,078,753 UART: [art] Store priv key in slot 0x5
3,092,047 UART: [art] Derive Key Pair - Done
3,106,846 UART: [art] Signing Cert with AUTHO
3,107,326 UART: RITY.KEYID = 7
3,122,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,161 UART: [art] PUB.X = 30990318FA8473BB69D25FECA7E75DF66DB5907F14B3A5E9E111308DFBA3249C99FEA95BCA937D6D192DEA27047E6AD0
3,129,939 UART: [art] PUB.Y = 16A6AA1320FBE2D67BC9AB24104B4C7F9E2BC63C441DC0C5196CB5FB2731B460C635CF80C68ACAD41309FD75BBDB4470
3,136,904 UART: [art] SIG.R = BA2358C7384666622DE8BF917E65F5FBD20E6167EC2D14A34BA68227D41628D29A12343C9A9672AEDCC77A1E12A758B9
3,143,675 UART: [art] SIG.S = 805F5A5D64AEE7B5E274BBE42A8745F11A4475FBB75EECF6695AEE860EB0A82D5481099D820E535C9D579440D7CAB13F
3,167,045 UART: Caliptra RT
3,167,390 UART: [state] CFI Enabled
3,275,352 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,682 UART: [rt]cmd =0x44504543, len=136
3,369,898 >>> mbox cmd response data (136 bytes)
3,369,899 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,828 UART: [rt]cmd =0x44504543, len=92
3,583,081 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,107 ready_for_fw is high
1,056,107 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,850 >>> mbox cmd response: success
2,621,850 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,684,004 UART:
2,684,020 UART: Running Caliptra FMC ...
2,684,428 UART:
2,684,571 UART: [state] CFI Enabled
2,695,378 UART: [fht] FMC Alias Private Key: 7
2,803,347 UART: [art] Extend RT PCRs Done
2,803,775 UART: [art] Lock RT PCRs Done
2,805,439 UART: [art] Populate DV Done
2,813,998 UART: [fht] FMC Alias Private Key: 7
2,814,978 UART: [art] Derive CDI
2,815,258 UART: [art] Store in in slot 0x4
2,900,431 UART: [art] Derive Key Pair
2,900,791 UART: [art] Store priv key in slot 0x5
2,913,835 UART: [art] Derive Key Pair - Done
2,928,410 UART: [art] Signing Cert with AUTHO
2,928,890 UART: RITY.KEYID = 7
2,944,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,081 UART: [art] PUB.X = A8D0609F74CED9FD46849331342812C8B04E466ED1FBAB986E5DA8143B3C0E0AAD896840ECEF5CEBFE5D25098304F7E9
2,951,853 UART: [art] PUB.Y = 806100A10D4447DA9D6E2FFBD29002FAE5EFBB2859BFAC612AFDB6917C53FB9DF06AAF12BA716C02D5CF5B4CE37D9F92
2,958,798 UART: [art] SIG.R = FD4277B28B53458CF2AF480BE913F8F72574583D6B66433C40C437AC406BA6BD236BAA5B9AD03FC9673E8730EAE0FF05
2,965,572 UART: [art] SIG.S = 9D62B3F05B97103BAB5E4C0C2F1B44426106D60D91C346B4597E64709D15F30EBB5F7649911A10D84ABEFABA89AC3B51
2,989,103 UART: Caliptra RT
2,989,448 UART: [state] CFI Enabled
3,096,774 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,042 UART: [rt]cmd =0x44504543, len=136
3,192,064 >>> mbox cmd response data (136 bytes)
3,192,065 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,940 UART: [rt]cmd =0x44504543, len=92
3,405,733 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,302 UART:
192,662 UART: Running Caliptra ROM ...
193,760 UART:
193,898 UART: [state] CFI Enabled
265,330 UART: [state] LifecycleState = Unprovisioned
267,357 UART: [state] DebugLocked = No
268,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,233 UART: [kat] SHA2-256
442,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,466 UART: [kat] ++
453,912 UART: [kat] sha1
464,729 UART: [kat] SHA2-256
467,445 UART: [kat] SHA2-384
473,996 UART: [kat] SHA2-512-ACC
476,366 UART: [kat] ECC-384
2,768,730 UART: [kat] HMAC-384Kdf
2,800,428 UART: [kat] LMS
3,990,763 UART: [kat] --
3,995,947 UART: [cold-reset] ++
3,997,106 UART: [fht] Storing FHT @ 0x50003400
4,008,156 UART: [idev] ++
4,008,718 UART: [idev] CDI.KEYID = 6
4,009,605 UART: [idev] SUBJECT.KEYID = 7
4,010,920 UART: [idev] UDS.KEYID = 0
4,011,904 ready_for_fw is high
4,012,113 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,795 UART: [idev] Erasing UDS.KEYID = 0
7,345,556 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,223 UART: [idev] --
7,370,483 UART: [ldev] ++
7,371,102 UART: [ldev] CDI.KEYID = 6
7,372,106 UART: [ldev] SUBJECT.KEYID = 5
7,373,251 UART: [ldev] AUTHORITY.KEYID = 7
7,374,526 UART: [ldev] FE.KEYID = 1
7,422,495 UART: [ldev] Erasing FE.KEYID = 1
10,754,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,450 UART: [ldev] --
13,113,728 UART: [fwproc] Waiting for Commands...
13,115,596 UART: [fwproc] Received command 0x46574c44
13,117,851 UART: [fwproc] Received Image of size 113844 bytes
17,177,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,930 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,638,728 >>> mbox cmd response: success
17,643,198 UART: [afmc] ++
17,643,794 UART: [afmc] CDI.KEYID = 6
17,644,758 UART: [afmc] SUBJECT.KEYID = 7
17,645,969 UART: [afmc] AUTHORITY.KEYID = 5
21,007,307 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,436 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,704 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,109 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,972 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,393 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,034 UART: [afmc] --
23,377,701 UART: [cold-reset] --
23,381,396 UART: [state] Locking Datavault
23,385,020 UART: [state] Locking PCR0, PCR1 and PCR31
23,386,813 UART: [state] Locking ICCM
23,388,287 UART: [exit] Launching FMC @ 0x40000130
23,396,683 UART:
23,396,922 UART: Running Caliptra FMC ...
23,398,018 UART:
23,398,175 UART: [state] CFI Enabled
23,467,839 UART: [fht] FMC Alias Private Key: 7
25,805,632 UART: [art] Extend RT PCRs Done
25,806,850 UART: [art] Lock RT PCRs Done
25,808,222 UART: [art] Populate DV Done
25,813,680 UART: [fht] FMC Alias Private Key: 7
25,815,266 UART: [art] Derive CDI
25,816,076 UART: [art] Store in in slot 0x4
25,876,644 UART: [art] Derive Key Pair
25,877,679 UART: [art] Store priv key in slot 0x5
29,170,142 UART: [art] Derive Key Pair - Done
29,183,510 UART: [art] Signing Cert with AUTHO
29,184,815 UART: RITY.KEYID = 7
31,471,763 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,263 UART: [art] PUB.X = 0D31A46D65C985A3994BEC76DD252DEBB4196B5A53A9BF541D2DBC0478EB814F786FC1FBF3652CEE6A1C053386B9A077
31,480,524 UART: [art] PUB.Y = F5D94A75F2D7D879821AC55F4C0DC99565AF6C6F972551591E4199B230EE21C0758AB37844A5295B483FFDFC5C9C0922
31,487,769 UART: [art] SIG.R = 59D5D5016ADE8DEC53ECE80A5C15100DF8BCFC961ED72EB8C419B42356A15AFB954E96B0A996B1EA3524AC2B5B10141C
31,495,179 UART: [art] SIG.S = DD708526D107CCB9BD97B7785EF7A43C6EC61E97C32052B9BA68419D8FC480AEB001B207CC9865F8C0D6E13CEA65E6EE
32,800,090 UART: Caliptra RT
32,800,792 UART: [state] CFI Enabled
32,961,355 UART: [rt] RT listening for mailbox commands...
32,965,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,010,231 UART: [rt]cmd =0x4c4d5356, len=1672
34,210,173 >>> mbox cmd response data (8 bytes)
34,212,704 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,256,881 UART: [rt]cmd =0x4c4d5356, len=1672
35,021,682 >>> mbox cmd response data (8 bytes)
35,024,094 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,068,537 UART: [rt]cmd =0x4c4d5356, len=1672
35,807,452 >>> mbox cmd response data (8 bytes)
35,809,877 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,854,194 UART: [rt]cmd =0x4c4d5356, len=1672
36,618,864 >>> mbox cmd response data (8 bytes)
36,620,128 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,664,662 UART: [rt]cmd =0x4c4d5356, len=1672
37,507,231 >>> mbox cmd response data (8 bytes)
37,508,521 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,552,744 UART: [rt]cmd =0x4c4d5356, len=1672
38,291,367 >>> mbox cmd response data (8 bytes)
38,292,619 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,336,900 UART: [rt]cmd =0x4c4d5356, len=1672
39,127,593 >>> mbox cmd response data (8 bytes)
39,128,857 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,173,295 UART: [rt]cmd =0x4c4d5356, len=1672
39,989,813 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,784,329 ready_for_fw is high
3,784,743 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,875,392 >>> mbox cmd response: success
23,569,410 UART:
23,569,781 UART: Running Caliptra FMC ...
23,570,908 UART:
23,571,064 UART: [state] CFI Enabled
23,639,864 UART: [fht] FMC Alias Private Key: 7
25,977,394 UART: [art] Extend RT PCRs Done
25,978,617 UART: [art] Lock RT PCRs Done
25,980,022 UART: [art] Populate DV Done
25,985,599 UART: [fht] FMC Alias Private Key: 7
25,987,242 UART: [art] Derive CDI
25,988,049 UART: [art] Store in in slot 0x4
26,048,951 UART: [art] Derive Key Pair
26,049,990 UART: [art] Store priv key in slot 0x5
29,342,781 UART: [art] Derive Key Pair - Done
29,355,774 UART: [art] Signing Cert with AUTHO
29,357,081 UART: RITY.KEYID = 7
31,644,842 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,351 UART: [art] PUB.X = 01E6D74C03C05336F2BF152716B76D335F2DF0BE47A55191FC466A105EB34F9F40222090D4CD063CDF79A50C1D3AB673
31,653,608 UART: [art] PUB.Y = 84F575ACBDAF9567F2CFC3DD4003AEF895269BCFE9F75D6E898103F0A2AA4D4DB92B8F2EB4585E3BF057EF6654BACC6A
31,660,871 UART: [art] SIG.R = 0F981C09EAA65C1D95C02414A24290C5148F77AFB2DD5A2F4E26152A081A795DC36C6ACD87D04634EA592EEA047F10D6
31,668,224 UART: [art] SIG.S = F4C2E80FA583F63BEDF2283B9D4074C07C9AE2F8209FDBC2EE003F072140F24B5531B9185D3D7D516A9D35FEE7BDFF0C
32,973,129 UART: Caliptra RT
32,973,831 UART: [state] CFI Enabled
33,135,166 UART: [rt] RT listening for mailbox commands...
33,139,140 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,184,277 UART: [rt]cmd =0x4c4d5356, len=1672
34,384,202 >>> mbox cmd response data (8 bytes)
34,386,720 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,431,043 UART: [rt]cmd =0x4c4d5356, len=1672
35,195,781 >>> mbox cmd response data (8 bytes)
35,198,194 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,242,477 UART: [rt]cmd =0x4c4d5356, len=1672
35,981,383 >>> mbox cmd response data (8 bytes)
35,983,790 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,027,904 UART: [rt]cmd =0x4c4d5356, len=1672
36,792,546 >>> mbox cmd response data (8 bytes)
36,793,856 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,838,030 UART: [rt]cmd =0x4c4d5356, len=1672
37,680,528 >>> mbox cmd response data (8 bytes)
37,681,812 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,726,040 UART: [rt]cmd =0x4c4d5356, len=1672
38,464,925 >>> mbox cmd response data (8 bytes)
38,466,206 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,510,453 UART: [rt]cmd =0x4c4d5356, len=1672
39,301,090 >>> mbox cmd response data (8 bytes)
39,302,364 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,346,592 UART: [rt]cmd =0x4c4d5356, len=1672
40,162,963 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,520 UART:
192,904 UART: Running Caliptra ROM ...
194,048 UART:
603,905 UART: [state] CFI Enabled
619,085 UART: [state] LifecycleState = Unprovisioned
621,061 UART: [state] DebugLocked = No
622,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,834 UART: [kat] SHA2-256
796,576 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,089 UART: [kat] ++
807,568 UART: [kat] sha1
818,541 UART: [kat] SHA2-256
821,265 UART: [kat] SHA2-384
826,969 UART: [kat] SHA2-512-ACC
829,343 UART: [kat] ECC-384
3,113,662 UART: [kat] HMAC-384Kdf
3,125,392 UART: [kat] LMS
4,315,491 UART: [kat] --
4,319,350 UART: [cold-reset] ++
4,320,996 UART: [fht] Storing FHT @ 0x50003400
4,331,486 UART: [idev] ++
4,332,079 UART: [idev] CDI.KEYID = 6
4,333,050 UART: [idev] SUBJECT.KEYID = 7
4,334,231 UART: [idev] UDS.KEYID = 0
4,335,272 ready_for_fw is high
4,335,475 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,456 UART: [idev] Erasing UDS.KEYID = 0
7,622,126 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,023 UART: [idev] --
7,645,808 UART: [ldev] ++
7,646,389 UART: [ldev] CDI.KEYID = 6
7,647,325 UART: [ldev] SUBJECT.KEYID = 5
7,648,537 UART: [ldev] AUTHORITY.KEYID = 7
7,649,823 UART: [ldev] FE.KEYID = 1
7,660,223 UART: [ldev] Erasing FE.KEYID = 1
10,947,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,228 UART: [ldev] --
13,306,354 UART: [fwproc] Waiting for Commands...
13,308,073 UART: [fwproc] Received command 0x46574c44
13,310,797 UART: [fwproc] Received Image of size 113844 bytes
17,360,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,434,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,503,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,820,251 >>> mbox cmd response: success
17,824,166 UART: [afmc] ++
17,824,766 UART: [afmc] CDI.KEYID = 6
17,825,696 UART: [afmc] SUBJECT.KEYID = 7
17,826,914 UART: [afmc] AUTHORITY.KEYID = 5
21,138,051 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,430,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,432,305 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,446,676 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,461,541 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,475,984 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,497,047 UART: [afmc] --
23,500,276 UART: [cold-reset] --
23,504,567 UART: [state] Locking Datavault
23,507,542 UART: [state] Locking PCR0, PCR1 and PCR31
23,509,237 UART: [state] Locking ICCM
23,511,279 UART: [exit] Launching FMC @ 0x40000130
23,519,619 UART:
23,519,859 UART: Running Caliptra FMC ...
23,520,962 UART:
23,521,124 UART: [state] CFI Enabled
23,529,019 UART: [fht] FMC Alias Private Key: 7
25,859,555 UART: [art] Extend RT PCRs Done
25,860,776 UART: [art] Lock RT PCRs Done
25,862,589 UART: [art] Populate DV Done
25,867,998 UART: [fht] FMC Alias Private Key: 7
25,869,487 UART: [art] Derive CDI
25,870,441 UART: [art] Store in in slot 0x4
25,913,111 UART: [art] Derive Key Pair
25,914,109 UART: [art] Store priv key in slot 0x5
29,155,818 UART: [art] Derive Key Pair - Done
29,168,702 UART: [art] Signing Cert with AUTHO
29,170,010 UART: RITY.KEYID = 7
31,449,515 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,042 UART: [art] PUB.X = 9F11BA4300E464461539A23D6A57674B16443FC7A5A4E48341B193E4A2A0059CBBA3C318EEE83D62B8BE5BEC49EB4F45
31,458,256 UART: [art] PUB.Y = 8EEB635BB37BFC9C8B50B66B020E4488779D8A2D9AA7066CB3137036A602B2A29010CB53D67C004E8EDEDD87E043142D
31,465,517 UART: [art] SIG.R = ACA17A09AFD0A89F42FDA073B54BA8D3D0B6E9BA26DE9A52F432BD8D516D2966105BB4816B1AB33A23F8F1C1D3B69036
31,472,907 UART: [art] SIG.S = B10DA712C86E9F8E3F769836ABF229894A4E419481088CFAAC5A6CCAC1C5893B04C0FE747623CCC9CF245CB8B5131819
32,777,993 UART: Caliptra RT
32,778,709 UART: [state] CFI Enabled
32,896,535 UART: [rt] RT listening for mailbox commands...
32,900,538 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,945,563 UART: [rt]cmd =0x4c4d5356, len=1672
34,145,791 >>> mbox cmd response data (8 bytes)
34,148,298 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,192,505 UART: [rt]cmd =0x4c4d5356, len=1672
34,957,152 >>> mbox cmd response data (8 bytes)
34,959,556 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,003,959 UART: [rt]cmd =0x4c4d5356, len=1672
35,742,681 >>> mbox cmd response data (8 bytes)
35,745,058 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,789,483 UART: [rt]cmd =0x4c4d5356, len=1672
36,554,006 >>> mbox cmd response data (8 bytes)
36,555,288 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,599,740 UART: [rt]cmd =0x4c4d5356, len=1672
37,442,259 >>> mbox cmd response data (8 bytes)
37,443,530 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,487,977 UART: [rt]cmd =0x4c4d5356, len=1672
38,226,485 >>> mbox cmd response data (8 bytes)
38,227,746 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,271,845 UART: [rt]cmd =0x4c4d5356, len=1672
39,062,528 >>> mbox cmd response data (8 bytes)
39,063,798 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,108,087 UART: [rt]cmd =0x4c4d5356, len=1672
39,924,550 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
4,126,877 ready_for_fw is high
4,127,281 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,057,126 >>> mbox cmd response: success
23,693,229 UART:
23,693,648 UART: Running Caliptra FMC ...
23,694,794 UART:
23,694,980 UART: [state] CFI Enabled
23,702,577 UART: [fht] FMC Alias Private Key: 7
26,034,011 UART: [art] Extend RT PCRs Done
26,035,249 UART: [art] Lock RT PCRs Done
26,036,771 UART: [art] Populate DV Done
26,041,946 UART: [fht] FMC Alias Private Key: 7
26,043,590 UART: [art] Derive CDI
26,044,377 UART: [art] Store in in slot 0x4
26,086,974 UART: [art] Derive Key Pair
26,087,979 UART: [art] Store priv key in slot 0x5
29,330,070 UART: [art] Derive Key Pair - Done
29,343,288 UART: [art] Signing Cert with AUTHO
29,344,605 UART: RITY.KEYID = 7
31,623,699 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,208 UART: [art] PUB.X = 2FD73CE0653CFB505A5FC0E9CFE1F66358B0B7344E600944BFF467113EECF78CD171698DC3BE0DAB448B900CB7A8FCC3
31,632,465 UART: [art] PUB.Y = 1F6A3B986353F00F13A57CD4A8FA0E3B9D5B14B0D973D702B5D27F2D2D88F1B6469605921E22D28006DEAA6219C5F161
31,639,735 UART: [art] SIG.R = D1AC7594BEB989034A4CFC78FEA660266861DCBEE9E767F6ADA5D02556071E61902526D89618542B96BB1501C15971E6
31,647,129 UART: [art] SIG.S = 0098887648A06C43AC44F5B24EE7386F27C04B1BA0A14B507DBF6AE9E53D376E67BFEFD8AD62F362407105C66E5CA22F
32,952,651 UART: Caliptra RT
32,953,353 UART: [state] CFI Enabled
33,071,013 UART: [rt] RT listening for mailbox commands...
33,074,984 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,120,220 UART: [rt]cmd =0x4c4d5356, len=1672
34,320,287 >>> mbox cmd response data (8 bytes)
34,322,763 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,367,207 UART: [rt]cmd =0x4c4d5356, len=1672
35,131,941 >>> mbox cmd response data (8 bytes)
35,134,410 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,178,722 UART: [rt]cmd =0x4c4d5356, len=1672
35,917,615 >>> mbox cmd response data (8 bytes)
35,919,998 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,964,185 UART: [rt]cmd =0x4c4d5356, len=1672
36,728,795 >>> mbox cmd response data (8 bytes)
36,730,112 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,774,607 UART: [rt]cmd =0x4c4d5356, len=1672
37,616,929 >>> mbox cmd response data (8 bytes)
37,618,217 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,662,713 UART: [rt]cmd =0x4c4d5356, len=1672
38,401,506 >>> mbox cmd response data (8 bytes)
38,402,762 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,447,122 UART: [rt]cmd =0x4c4d5356, len=1672
39,237,591 >>> mbox cmd response data (8 bytes)
39,238,842 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,283,439 UART: [rt]cmd =0x4c4d5356, len=1672
40,099,854 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,179 UART:
192,567 UART: Running Caliptra ROM ...
193,762 UART:
193,917 UART: [state] CFI Enabled
262,600 UART: [state] LifecycleState = Unprovisioned
264,500 UART: [state] DebugLocked = No
266,669 UART: [state] WD Timer not started. Device not locked for debugging
270,275 UART: [kat] SHA2-256
449,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,958 UART: [kat] ++
461,489 UART: [kat] sha1
473,932 UART: [kat] SHA2-256
476,994 UART: [kat] SHA2-384
483,067 UART: [kat] SHA2-512-ACC
486,003 UART: [kat] ECC-384
2,949,163 UART: [kat] HMAC-384Kdf
2,971,497 UART: [kat] LMS
3,500,888 UART: [kat] --
3,506,305 UART: [cold-reset] ++
3,508,521 UART: [fht] FHT @ 0x50003400
3,520,092 UART: [idev] ++
3,520,705 UART: [idev] CDI.KEYID = 6
3,521,637 UART: [idev] SUBJECT.KEYID = 7
3,522,814 UART: [idev] UDS.KEYID = 0
3,523,717 ready_for_fw is high
3,523,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,421 UART: [idev] Erasing UDS.KEYID = 0
6,023,029 UART: [idev] Sha1 KeyId Algorithm
6,046,124 UART: [idev] --
6,050,391 UART: [ldev] ++
6,050,975 UART: [ldev] CDI.KEYID = 6
6,051,900 UART: [ldev] SUBJECT.KEYID = 5
6,053,062 UART: [ldev] AUTHORITY.KEYID = 7
6,054,319 UART: [ldev] FE.KEYID = 1
6,101,252 UART: [ldev] Erasing FE.KEYID = 1
8,602,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,937 UART: [ldev] --
10,414,258 UART: [fwproc] Wait for Commands...
10,416,520 UART: [fwproc] Recv command 0x46574c44
10,418,614 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,273,035 >>> mbox cmd response: success
14,276,821 UART: [afmc] ++
14,277,437 UART: [afmc] CDI.KEYID = 6
14,278,355 UART: [afmc] SUBJECT.KEYID = 7
14,279,458 UART: [afmc] AUTHORITY.KEYID = 5
16,819,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,544,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,546,157 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,561,943 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,577,975 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,593,821 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,616,622 UART: [afmc] --
18,620,652 UART: [cold-reset] --
18,625,546 UART: [state] Locking Datavault
18,630,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,444 UART: [state] Locking ICCM
18,634,879 UART: [exit] Launching FMC @ 0x40000130
18,643,274 UART:
18,643,539 UART: Running Caliptra FMC ...
18,644,648 UART:
18,644,814 UART: [state] CFI Enabled
18,701,179 UART: [fht] FMC Alias Private Key: 7
20,464,820 UART: [art] Extend RT PCRs Done
20,466,025 UART: [art] Lock RT PCRs Done
20,467,649 UART: [art] Populate DV Done
20,473,007 UART: [fht] FMC Alias Private Key: 7
20,475,165 UART: [art] Derive CDI
20,476,054 UART: [art] Store in in slot 0x4
20,533,825 UART: [art] Derive Key Pair
20,534,833 UART: [art] Store priv key in slot 0x5
22,997,961 UART: [art] Derive Key Pair - Done
23,011,235 UART: [art] Signing Cert with AUTHO
23,012,542 UART: RITY.KEYID = 7
24,724,230 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,760 UART: [art] PUB.X = 019BD3476A6831FAF968E9AB822D0A8BC4CB2DC63C2CBDF6BDB743E4C2D2F8EBA26DD495CD8DCC716B0C677EF36F05B0
24,733,020 UART: [art] PUB.Y = FDE7E0F3BDF3B143BEB8FC01EEEFB5F43815C63AEDF27FA692D5FDC82CD79613862D8A838571D61C0BD5FD94182E13D1
24,740,270 UART: [art] SIG.R = DFCCFAB51BD08A5672A360BBA86DA12A004F002A2298933FDB1496A0D60186334054ABBC11866B79692C2781CB7649E2
24,747,621 UART: [art] SIG.S = 4583B7E5E46EFBAE1DC583E2AA49510EB253E18FB3A8BBC1AF0BB770CB5C68D602CEA2828CCC50016323F691CB2D4F5C
25,726,216 UART: Caliptra RT
25,726,922 UART: [state] CFI Enabled
25,892,742 UART: [rt] RT listening for mailbox commands...
25,896,743 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,941,835 UART: [rt]cmd =0x4c4d5356, len=1672
26,354,988 >>> mbox cmd response data (8 bytes)
26,357,493 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,401,946 UART: [rt]cmd =0x4c4d5356, len=1672
26,619,950 >>> mbox cmd response data (8 bytes)
26,622,333 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,666,843 UART: [rt]cmd =0x4c4d5356, len=1672
26,883,971 >>> mbox cmd response data (8 bytes)
26,886,390 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,930,563 UART: [rt]cmd =0x4c4d5356, len=1672
27,145,776 >>> mbox cmd response data (8 bytes)
27,147,025 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,191,399 UART: [rt]cmd =0x4c4d5356, len=1672
27,409,753 >>> mbox cmd response data (8 bytes)
27,411,031 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,455,521 UART: [rt]cmd =0x4c4d5356, len=1672
27,671,277 >>> mbox cmd response data (8 bytes)
27,672,532 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,717,165 UART: [rt]cmd =0x4c4d5356, len=1672
27,933,169 >>> mbox cmd response data (8 bytes)
27,934,419 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,978,790 UART: [rt]cmd =0x4c4d5356, len=1672
28,197,483 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,386,944 ready_for_fw is high
3,387,564 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,090,715 >>> mbox cmd response: success
18,388,023 UART:
18,388,430 UART: Running Caliptra FMC ...
18,389,544 UART:
18,389,698 UART: [state] CFI Enabled
18,454,314 UART: [fht] FMC Alias Private Key: 7
20,218,108 UART: [art] Extend RT PCRs Done
20,219,319 UART: [art] Lock RT PCRs Done
20,220,977 UART: [art] Populate DV Done
20,226,549 UART: [fht] FMC Alias Private Key: 7
20,228,035 UART: [art] Derive CDI
20,228,810 UART: [art] Store in in slot 0x4
20,287,284 UART: [art] Derive Key Pair
20,288,332 UART: [art] Store priv key in slot 0x5
22,751,043 UART: [art] Derive Key Pair - Done
22,763,663 UART: [art] Signing Cert with AUTHO
22,765,009 UART: RITY.KEYID = 7
24,477,227 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,711 UART: [art] PUB.X = E30434B7676BDA26E7C30C8F07CB6E4D371E81477B9E2AB350F3FCCB5ED05DDF208234A1E212A505272687E470C743EC
24,485,991 UART: [art] PUB.Y = 4D0013D17FE27A6ECED5596B13AABD7E3C62EF2B8378AA7121ADDA7BE6E455D989CAFDA2F0B3D4B8AEB6F81CF0EC2E86
24,493,282 UART: [art] SIG.R = 819A125ECC5378753ED2CFF864551F5AB42633E4A3B7B12A056EA5DDBE4BFC535BDD97751A46801EA46E950795ACE29F
24,500,720 UART: [art] SIG.S = D4E993C8D473901E51570CBF2E773D8BA48A972EC929513FE4CE49F225E4258FFAA6BBD325F9579528BD41D65612F02E
25,480,101 UART: Caliptra RT
25,480,817 UART: [state] CFI Enabled
25,645,619 UART: [rt] RT listening for mailbox commands...
25,649,574 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,694,541 UART: [rt]cmd =0x4c4d5356, len=1672
26,107,782 >>> mbox cmd response data (8 bytes)
26,110,278 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,154,742 UART: [rt]cmd =0x4c4d5356, len=1672
26,373,099 >>> mbox cmd response data (8 bytes)
26,375,490 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,419,808 UART: [rt]cmd =0x4c4d5356, len=1672
26,636,852 >>> mbox cmd response data (8 bytes)
26,639,251 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,683,860 UART: [rt]cmd =0x4c4d5356, len=1672
26,898,930 >>> mbox cmd response data (8 bytes)
26,900,200 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,944,309 UART: [rt]cmd =0x4c4d5356, len=1672
27,162,440 >>> mbox cmd response data (8 bytes)
27,163,699 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,208,116 UART: [rt]cmd =0x4c4d5356, len=1672
27,423,359 >>> mbox cmd response data (8 bytes)
27,424,628 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,469,063 UART: [rt]cmd =0x4c4d5356, len=1672
27,685,013 >>> mbox cmd response data (8 bytes)
27,686,278 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,730,645 UART: [rt]cmd =0x4c4d5356, len=1672
27,949,415 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
193,006 UART:
193,384 UART: Running Caliptra ROM ...
194,540 UART:
603,898 UART: [state] CFI Enabled
616,138 UART: [state] LifecycleState = Unprovisioned
618,003 UART: [state] DebugLocked = No
619,738 UART: [state] WD Timer not started. Device not locked for debugging
623,356 UART: [kat] SHA2-256
802,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,046 UART: [kat] ++
814,502 UART: [kat] sha1
824,734 UART: [kat] SHA2-256
827,741 UART: [kat] SHA2-384
835,574 UART: [kat] SHA2-512-ACC
838,537 UART: [kat] ECC-384
3,279,748 UART: [kat] HMAC-384Kdf
3,291,788 UART: [kat] LMS
3,821,302 UART: [kat] --
3,827,313 UART: [cold-reset] ++
3,828,966 UART: [fht] FHT @ 0x50003400
3,839,517 UART: [idev] ++
3,840,083 UART: [idev] CDI.KEYID = 6
3,841,119 UART: [idev] SUBJECT.KEYID = 7
3,842,224 UART: [idev] UDS.KEYID = 0
3,843,147 ready_for_fw is high
3,843,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,739 UART: [idev] Erasing UDS.KEYID = 0
6,318,360 UART: [idev] Sha1 KeyId Algorithm
6,342,008 UART: [idev] --
6,346,303 UART: [ldev] ++
6,346,887 UART: [ldev] CDI.KEYID = 6
6,347,772 UART: [ldev] SUBJECT.KEYID = 5
6,348,985 UART: [ldev] AUTHORITY.KEYID = 7
6,350,215 UART: [ldev] FE.KEYID = 1
6,360,290 UART: [ldev] Erasing FE.KEYID = 1
8,830,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,827 UART: [ldev] --
10,620,898 UART: [fwproc] Wait for Commands...
10,623,147 UART: [fwproc] Recv command 0x46574c44
10,625,235 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,039 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,496,916 >>> mbox cmd response: success
14,500,954 UART: [afmc] ++
14,501,553 UART: [afmc] CDI.KEYID = 6
14,502,465 UART: [afmc] SUBJECT.KEYID = 7
14,503,626 UART: [afmc] AUTHORITY.KEYID = 5
17,001,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,230 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,002 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,060 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,885 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,286 UART: [afmc] --
18,795,337 UART: [cold-reset] --
18,799,519 UART: [state] Locking Datavault
18,804,763 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,433 UART: [state] Locking ICCM
18,808,098 UART: [exit] Launching FMC @ 0x40000130
18,816,534 UART:
18,816,776 UART: Running Caliptra FMC ...
18,817,879 UART:
18,818,034 UART: [state] CFI Enabled
18,826,462 UART: [fht] FMC Alias Private Key: 7
20,583,144 UART: [art] Extend RT PCRs Done
20,584,356 UART: [art] Lock RT PCRs Done
20,586,141 UART: [art] Populate DV Done
20,591,503 UART: [fht] FMC Alias Private Key: 7
20,593,149 UART: [art] Derive CDI
20,593,958 UART: [art] Store in in slot 0x4
20,636,655 UART: [art] Derive Key Pair
20,637,649 UART: [art] Store priv key in slot 0x5
23,064,478 UART: [art] Derive Key Pair - Done
23,077,490 UART: [art] Signing Cert with AUTHO
23,078,792 UART: RITY.KEYID = 7
24,784,000 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,513 UART: [art] PUB.X = 6094118298DADD045FE71A596ABD4AAC80D8AC9DB0EA6DE6C41DCCC44F7B02C55358167A5BD269B139CEEDD04B8024E5
24,792,820 UART: [art] PUB.Y = 1B36536A7B8AD33AE47352ED07C5E7B6BA66435E35BE9E21728EA93B03CE43EBE31C045F45959206097776962B099F10
24,800,057 UART: [art] SIG.R = D810D5592BAC7689F4567E654011A0875DB8B4F0D055273BABD7DD7C44CC9C3777BC6BA464B8A451772D87BDDAD28B07
24,807,462 UART: [art] SIG.S = 0C4CB69EB2BF7317277690155660A0BC7627289B762B5FA9783E7C754A9519A58B71A95A2D00C496D2D25C511126BC08
25,786,466 UART: Caliptra RT
25,787,184 UART: [state] CFI Enabled
25,903,973 UART: [rt] RT listening for mailbox commands...
25,907,862 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,952,538 UART: [rt]cmd =0x4c4d5356, len=1672
26,365,626 >>> mbox cmd response data (8 bytes)
26,368,086 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,412,636 UART: [rt]cmd =0x4c4d5356, len=1672
26,630,546 >>> mbox cmd response data (8 bytes)
26,632,966 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,677,301 UART: [rt]cmd =0x4c4d5356, len=1672
26,894,835 >>> mbox cmd response data (8 bytes)
26,897,209 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,941,743 UART: [rt]cmd =0x4c4d5356, len=1672
27,156,772 >>> mbox cmd response data (8 bytes)
27,158,020 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,202,555 UART: [rt]cmd =0x4c4d5356, len=1672
27,420,767 >>> mbox cmd response data (8 bytes)
27,422,022 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,466,480 UART: [rt]cmd =0x4c4d5356, len=1672
27,682,207 >>> mbox cmd response data (8 bytes)
27,683,469 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,727,842 UART: [rt]cmd =0x4c4d5356, len=1672
27,943,839 >>> mbox cmd response data (8 bytes)
27,945,114 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,989,447 UART: [rt]cmd =0x4c4d5356, len=1672
28,208,205 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,783 writing to cptra_bootfsm_go
3,694,454 ready_for_fw is high
3,695,311 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,258,594 >>> mbox cmd response: success
18,510,468 UART:
18,510,883 UART: Running Caliptra FMC ...
18,512,030 UART:
18,512,198 UART: [state] CFI Enabled
18,519,993 UART: [fht] FMC Alias Private Key: 7
20,276,419 UART: [art] Extend RT PCRs Done
20,277,660 UART: [art] Lock RT PCRs Done
20,279,455 UART: [art] Populate DV Done
20,284,943 UART: [fht] FMC Alias Private Key: 7
20,286,534 UART: [art] Derive CDI
20,287,277 UART: [art] Store in in slot 0x4
20,329,924 UART: [art] Derive Key Pair
20,330,925 UART: [art] Store priv key in slot 0x5
22,758,396 UART: [art] Derive Key Pair - Done
22,771,363 UART: [art] Signing Cert with AUTHO
22,772,699 UART: RITY.KEYID = 7
24,477,577 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,085 UART: [art] PUB.X = 3F71B0975EA14BAC60D29969B9AF7FE503ABE3516FDABF1F21FF1BA82069B817F129C766D28FE50F49B89B4225BACC82
24,486,400 UART: [art] PUB.Y = 8B5A13C03CA799A02DC1877E2568DE066116B044729DB07526E0CE29A80FA8A69BCC7A77F76FE8611E17F136FED0BB7A
24,493,658 UART: [art] SIG.R = 010390091463D8C0D791077FC780265C57F0FDF2FDF09FB94571BA858B65AE076861ACEA56F1D1F22707190888E3CC39
24,501,062 UART: [art] SIG.S = A3DB1C7E477280DDBB8F2889BC12163C58CE7B28A40DC7C7287A84B5C355C37C0697B3FF9572FE3BFA7CC0A59980C566
25,479,403 UART: Caliptra RT
25,480,110 UART: [state] CFI Enabled
25,597,935 UART: [rt] RT listening for mailbox commands...
25,601,941 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,646,998 UART: [rt]cmd =0x4c4d5356, len=1672
26,060,117 >>> mbox cmd response data (8 bytes)
26,062,586 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,106,923 UART: [rt]cmd =0x4c4d5356, len=1672
26,325,155 >>> mbox cmd response data (8 bytes)
26,327,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,371,896 UART: [rt]cmd =0x4c4d5356, len=1672
26,589,312 >>> mbox cmd response data (8 bytes)
26,591,683 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,635,962 UART: [rt]cmd =0x4c4d5356, len=1672
26,850,920 >>> mbox cmd response data (8 bytes)
26,852,191 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,896,775 UART: [rt]cmd =0x4c4d5356, len=1672
27,114,975 >>> mbox cmd response data (8 bytes)
27,116,235 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,160,606 UART: [rt]cmd =0x4c4d5356, len=1672
27,376,223 >>> mbox cmd response data (8 bytes)
27,377,487 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,421,856 UART: [rt]cmd =0x4c4d5356, len=1672
27,638,231 >>> mbox cmd response data (8 bytes)
27,639,484 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,683,717 UART: [rt]cmd =0x4c4d5356, len=1672
27,902,472 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
191,971 UART:
192,342 UART: Running Caliptra ROM ...
193,445 UART:
193,585 UART: [state] CFI Enabled
267,135 UART: [state] LifecycleState = Unprovisioned
269,475 UART: [state] DebugLocked = No
271,082 UART: [state] WD Timer not started. Device not locked for debugging
276,420 UART: [kat] SHA2-256
466,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,038 UART: [kat] ++
477,540 UART: [kat] sha1
490,123 UART: [kat] SHA2-256
493,139 UART: [kat] SHA2-384
499,912 UART: [kat] SHA2-512-ACC
502,496 UART: [kat] ECC-384
2,949,611 UART: [kat] HMAC-384Kdf
2,973,213 UART: [kat] LMS
3,505,023 UART: [kat] --
3,509,974 UART: [cold-reset] ++
3,511,777 UART: [fht] FHT @ 0x50003400
3,523,895 UART: [idev] ++
3,524,601 UART: [idev] CDI.KEYID = 6
3,525,583 UART: [idev] SUBJECT.KEYID = 7
3,526,697 UART: [idev] UDS.KEYID = 0
3,527,704 ready_for_fw is high
3,527,896 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,470 UART: [idev] Erasing UDS.KEYID = 0
6,029,064 UART: [idev] Sha1 KeyId Algorithm
6,051,983 UART: [idev] --
6,055,317 UART: [ldev] ++
6,056,015 UART: [ldev] CDI.KEYID = 6
6,056,942 UART: [ldev] SUBJECT.KEYID = 5
6,058,110 UART: [ldev] AUTHORITY.KEYID = 7
6,059,348 UART: [ldev] FE.KEYID = 1
6,100,615 UART: [ldev] Erasing FE.KEYID = 1
8,609,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,837 UART: [ldev] --
10,415,595 UART: [fwproc] Wait for Commands...
10,417,201 UART: [fwproc] Recv command 0x46574c44
10,419,516 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,598,966 >>> mbox cmd response: success
14,603,780 UART: [afmc] ++
14,604,585 UART: [afmc] CDI.KEYID = 6
14,605,673 UART: [afmc] SUBJECT.KEYID = 7
14,607,119 UART: [afmc] AUTHORITY.KEYID = 5
17,152,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,292 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,458 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,599 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,648 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,904 UART: [afmc] --
18,970,802 UART: [cold-reset] --
18,973,921 UART: [state] Locking Datavault
18,978,438 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,601 UART: [state] Locking ICCM
18,982,061 UART: [exit] Launching FMC @ 0x40000130
18,990,756 UART:
18,991,000 UART: Running Caliptra FMC ...
18,992,107 UART:
18,992,268 UART: [state] CFI Enabled
19,054,640 UART: [fht] FMC Alias Private Key: 7
20,818,814 UART: [art] Extend RT PCRs Done
20,820,037 UART: [art] Lock RT PCRs Done
20,821,584 UART: [art] Populate DV Done
20,827,011 UART: [fht] FMC Alias Private Key: 7
20,828,497 UART: [art] Derive CDI
20,829,235 UART: [art] Store in in slot 0x4
20,886,928 UART: [art] Derive Key Pair
20,887,968 UART: [art] Store priv key in slot 0x5
23,351,362 UART: [art] Derive Key Pair - Done
23,364,194 UART: [art] Signing Cert with AUTHO
23,365,493 UART: RITY.KEYID = 7
25,077,410 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,928 UART: [art] PUB.X = 0F46783AB749B97BA1B7ECE076A2063D713A136D700B5E2596D970B5E6A1D076869503D018C91528F53258E97F3BA0F8
25,086,160 UART: [art] PUB.Y = 3BD61D75357536A5F9B1C100020416C3E849E6C8BFFFB085B5C16C54F3C0199B81AF0587D9148A018B56531C3A2F9CD6
25,093,380 UART: [art] SIG.R = DD0A92E8C27FF799C1AC0E5800CC1135A0F10454E9103C570FECC42AB391237FC915810572FE57A24FFD173686536EDB
25,100,751 UART: [art] SIG.S = 3D4FBBA981568DB1380CC9AD62E2CB06AC9226EA512AB4C802363B672A89E80479AD73E18BCC20D7E6D6257B5E1E44C1
26,080,038 UART: Caliptra RT
26,080,729 UART: [state] CFI Enabled
26,245,256 UART: [rt] RT listening for mailbox commands...
26,249,253 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,294,252 UART: [rt]cmd =0x4c4d5356, len=1672
26,707,360 >>> mbox cmd response data (8 bytes)
26,709,868 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,754,263 UART: [rt]cmd =0x4c4d5356, len=1672
26,972,986 >>> mbox cmd response data (8 bytes)
26,975,392 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,019,991 UART: [rt]cmd =0x4c4d5356, len=1672
27,237,138 >>> mbox cmd response data (8 bytes)
27,239,514 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,284,019 UART: [rt]cmd =0x4c4d5356, len=1672
27,499,035 >>> mbox cmd response data (8 bytes)
27,500,323 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,544,702 UART: [rt]cmd =0x4c4d5356, len=1672
27,762,800 >>> mbox cmd response data (8 bytes)
27,764,073 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,808,715 UART: [rt]cmd =0x4c4d5356, len=1672
28,024,327 >>> mbox cmd response data (8 bytes)
28,025,577 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,069,798 UART: [rt]cmd =0x4c4d5356, len=1672
28,285,919 >>> mbox cmd response data (8 bytes)
28,287,171 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,331,530 UART: [rt]cmd =0x4c4d5356, len=1672
28,550,389 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,441,055 ready_for_fw is high
3,441,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,732,395 >>> mbox cmd response: success
19,030,563 UART:
19,031,005 UART: Running Caliptra FMC ...
19,032,183 UART:
19,032,358 UART: [state] CFI Enabled
19,098,968 UART: [fht] FMC Alias Private Key: 7
20,862,697 UART: [art] Extend RT PCRs Done
20,863,920 UART: [art] Lock RT PCRs Done
20,865,815 UART: [art] Populate DV Done
20,871,183 UART: [fht] FMC Alias Private Key: 7
20,872,778 UART: [art] Derive CDI
20,873,596 UART: [art] Store in in slot 0x4
20,931,456 UART: [art] Derive Key Pair
20,932,496 UART: [art] Store priv key in slot 0x5
23,395,511 UART: [art] Derive Key Pair - Done
23,408,309 UART: [art] Signing Cert with AUTHO
23,409,616 UART: RITY.KEYID = 7
25,121,555 UART: [art] Erasing AUTHORITY.KEYID = 7
25,123,064 UART: [art] PUB.X = 957AFD258C8860722818B908AB600BA4B4B579FEAD7F237E5293453CDE592E340B3061CAACE3B0CFABAD681A91AE4641
25,130,321 UART: [art] PUB.Y = 9518CA79113C6FF3D785575A4325A674C21019EE1CD0A1525608D528C4081CAB21D43DCF13FDFF0E4E3D4466D3D99364
25,137,574 UART: [art] SIG.R = FBA865C2FE193735DD14A86F6F9E032ED7EA50F4E80C0D3DD0286FF6DB4BC11371207758D2CD449107733B29EC384A08
25,144,962 UART: [art] SIG.S = AE7B0DEB25687B509DBF8A25BC58CA146AF232BFBA2B66C323964991844E9A1FD8F654EF53FDBD4EF22E07D0F60D0DBA
26,123,719 UART: Caliptra RT
26,124,432 UART: [state] CFI Enabled
26,289,597 UART: [rt] RT listening for mailbox commands...
26,293,607 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,338,668 UART: [rt]cmd =0x4c4d5356, len=1672
26,751,692 >>> mbox cmd response data (8 bytes)
26,754,145 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,798,463 UART: [rt]cmd =0x4c4d5356, len=1672
27,016,630 >>> mbox cmd response data (8 bytes)
27,019,024 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,063,311 UART: [rt]cmd =0x4c4d5356, len=1672
27,280,558 >>> mbox cmd response data (8 bytes)
27,282,932 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,327,269 UART: [rt]cmd =0x4c4d5356, len=1672
27,542,583 >>> mbox cmd response data (8 bytes)
27,543,865 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,588,294 UART: [rt]cmd =0x4c4d5356, len=1672
27,806,592 >>> mbox cmd response data (8 bytes)
27,807,868 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,852,187 UART: [rt]cmd =0x4c4d5356, len=1672
28,067,899 >>> mbox cmd response data (8 bytes)
28,069,200 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,113,374 UART: [rt]cmd =0x4c4d5356, len=1672
28,329,550 >>> mbox cmd response data (8 bytes)
28,330,816 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,375,318 UART: [rt]cmd =0x4c4d5356, len=1672
28,594,028 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,593 writing to cptra_bootfsm_go
192,831 UART:
193,189 UART: Running Caliptra ROM ...
194,384 UART:
603,950 UART: [state] CFI Enabled
620,167 UART: [state] LifecycleState = Unprovisioned
622,547 UART: [state] DebugLocked = No
623,871 UART: [state] WD Timer not started. Device not locked for debugging
628,542 UART: [kat] SHA2-256
818,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,177 UART: [kat] ++
829,784 UART: [kat] sha1
841,608 UART: [kat] SHA2-256
844,617 UART: [kat] SHA2-384
850,323 UART: [kat] SHA2-512-ACC
852,909 UART: [kat] ECC-384
3,293,415 UART: [kat] HMAC-384Kdf
3,306,867 UART: [kat] LMS
3,838,703 UART: [kat] --
3,843,077 UART: [cold-reset] ++
3,845,372 UART: [fht] FHT @ 0x50003400
3,857,135 UART: [idev] ++
3,857,841 UART: [idev] CDI.KEYID = 6
3,858,869 UART: [idev] SUBJECT.KEYID = 7
3,859,970 UART: [idev] UDS.KEYID = 0
3,860,903 ready_for_fw is high
3,861,099 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,494 UART: [idev] Erasing UDS.KEYID = 0
6,336,050 UART: [idev] Sha1 KeyId Algorithm
6,358,035 UART: [idev] --
6,363,300 UART: [ldev] ++
6,363,985 UART: [ldev] CDI.KEYID = 6
6,364,870 UART: [ldev] SUBJECT.KEYID = 5
6,366,082 UART: [ldev] AUTHORITY.KEYID = 7
6,367,320 UART: [ldev] FE.KEYID = 1
6,375,833 UART: [ldev] Erasing FE.KEYID = 1
8,854,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,386 UART: [ldev] --
10,646,326 UART: [fwproc] Wait for Commands...
10,647,769 UART: [fwproc] Recv command 0x46574c44
10,649,734 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,953 >>> mbox cmd response: success
14,834,656 UART: [afmc] ++
14,835,362 UART: [afmc] CDI.KEYID = 6
14,836,531 UART: [afmc] SUBJECT.KEYID = 7
14,838,075 UART: [afmc] AUTHORITY.KEYID = 5
17,340,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,062,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,064,115 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,079,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,094,470 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,109,469 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,669 UART: [afmc] --
19,135,639 UART: [cold-reset] --
19,138,377 UART: [state] Locking Datavault
19,142,013 UART: [state] Locking PCR0, PCR1 and PCR31
19,144,208 UART: [state] Locking ICCM
19,145,974 UART: [exit] Launching FMC @ 0x40000130
19,154,605 UART:
19,154,837 UART: Running Caliptra FMC ...
19,155,949 UART:
19,156,114 UART: [state] CFI Enabled
19,164,494 UART: [fht] FMC Alias Private Key: 7
20,921,693 UART: [art] Extend RT PCRs Done
20,922,927 UART: [art] Lock RT PCRs Done
20,924,823 UART: [art] Populate DV Done
20,930,072 UART: [fht] FMC Alias Private Key: 7
20,931,666 UART: [art] Derive CDI
20,932,482 UART: [art] Store in in slot 0x4
20,974,770 UART: [art] Derive Key Pair
20,975,775 UART: [art] Store priv key in slot 0x5
23,403,363 UART: [art] Derive Key Pair - Done
23,416,691 UART: [art] Signing Cert with AUTHO
23,418,002 UART: RITY.KEYID = 7
25,123,527 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,040 UART: [art] PUB.X = ABCE58A411E88BAD9B3C16E441C8F3A71E7BAF581B6D1F14215AB4996F932EBA43FE5E8E3509523A6AA3577BCB463B49
25,132,290 UART: [art] PUB.Y = 9B6ED48F768AA4C57CDEEABEE2B43CDB1B73A76555052513462F8FBE8EF0EFE53F7662ED45810F18F5D602EEB574F83D
25,139,581 UART: [art] SIG.R = 23929422714C723572E98F346D4991E27860B46D26D3FB9CED78F10B9B5B5BFA3DAB93919AD255DD6A7FEEA0609A9787
25,146,984 UART: [art] SIG.S = E85D1592218B062B7E05885FBD7A4DAD74E4DB1F63A19B7E5C1FD1530E4DF0727593A2D366E1DB756C88BF3FF9AE9F4E
26,126,299 UART: Caliptra RT
26,126,988 UART: [state] CFI Enabled
26,244,584 UART: [rt] RT listening for mailbox commands...
26,248,602 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,293,781 UART: [rt]cmd =0x4c4d5356, len=1672
26,706,948 >>> mbox cmd response data (8 bytes)
26,709,485 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,753,937 UART: [rt]cmd =0x4c4d5356, len=1672
26,972,107 >>> mbox cmd response data (8 bytes)
26,974,489 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,018,869 UART: [rt]cmd =0x4c4d5356, len=1672
27,236,099 >>> mbox cmd response data (8 bytes)
27,238,467 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,282,836 UART: [rt]cmd =0x4c4d5356, len=1672
27,498,003 >>> mbox cmd response data (8 bytes)
27,499,281 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,543,496 UART: [rt]cmd =0x4c4d5356, len=1672
27,761,729 >>> mbox cmd response data (8 bytes)
27,762,989 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,807,365 UART: [rt]cmd =0x4c4d5356, len=1672
28,022,885 >>> mbox cmd response data (8 bytes)
28,024,133 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,068,737 UART: [rt]cmd =0x4c4d5356, len=1672
28,284,883 >>> mbox cmd response data (8 bytes)
28,286,132 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,330,353 UART: [rt]cmd =0x4c4d5356, len=1672
28,549,098 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
3,760,645 ready_for_fw is high
3,761,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,964,627 >>> mbox cmd response: success
19,213,169 UART:
19,213,588 UART: Running Caliptra FMC ...
19,214,730 UART:
19,214,894 UART: [state] CFI Enabled
19,223,129 UART: [fht] FMC Alias Private Key: 7
20,980,201 UART: [art] Extend RT PCRs Done
20,981,426 UART: [art] Lock RT PCRs Done
20,982,905 UART: [art] Populate DV Done
20,988,599 UART: [fht] FMC Alias Private Key: 7
20,990,200 UART: [art] Derive CDI
20,991,020 UART: [art] Store in in slot 0x4
21,033,298 UART: [art] Derive Key Pair
21,034,343 UART: [art] Store priv key in slot 0x5
23,460,993 UART: [art] Derive Key Pair - Done
23,474,162 UART: [art] Signing Cert with AUTHO
23,475,467 UART: RITY.KEYID = 7
25,181,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,745 UART: [art] PUB.X = 132257FF60685A337387232532496ECE32B502B293D0F1FA5E2D6BE0C40D6919D417ADA366411DF19F0E9C4A66FDD197
25,190,006 UART: [art] PUB.Y = D570929105805442DB0C2356C5B54F3D469B09B84890B916B5F1E55255E5D8CE973FAC602F851046D8919CA2E07CE1BF
25,197,244 UART: [art] SIG.R = 1914FEA30A2A814E32DB00E08D3D22B77B45AD96DEEC0B4FD577358A33114A02D00B55282D588A7DBEFC55126016E016
25,204,643 UART: [art] SIG.S = A97C189BCC9B1A6B91109589A5206A19F47738F9DCB49ECD4FFC182BAA6697AE65FEFEF0775E5DB6097773A6BD966AF6
26,183,178 UART: Caliptra RT
26,183,866 UART: [state] CFI Enabled
26,301,358 UART: [rt] RT listening for mailbox commands...
26,305,385 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,350,238 UART: [rt]cmd =0x4c4d5356, len=1672
26,763,796 >>> mbox cmd response data (8 bytes)
26,766,248 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,810,683 UART: [rt]cmd =0x4c4d5356, len=1672
27,029,126 >>> mbox cmd response data (8 bytes)
27,031,520 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,076,021 UART: [rt]cmd =0x4c4d5356, len=1672
27,293,321 >>> mbox cmd response data (8 bytes)
27,295,702 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,340,220 UART: [rt]cmd =0x4c4d5356, len=1672
27,555,024 >>> mbox cmd response data (8 bytes)
27,556,286 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,600,560 UART: [rt]cmd =0x4c4d5356, len=1672
27,818,716 >>> mbox cmd response data (8 bytes)
27,819,974 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,864,237 UART: [rt]cmd =0x4c4d5356, len=1672
28,079,899 >>> mbox cmd response data (8 bytes)
28,081,154 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,125,801 UART: [rt]cmd =0x4c4d5356, len=1672
28,342,050 >>> mbox cmd response data (8 bytes)
28,343,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,387,522 UART: [rt]cmd =0x4c4d5356, len=1672
28,606,126 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,285 UART: [kat] SHA2-256
892,223 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,558 UART: [kat] HMAC-384Kdf
907,020 UART: [kat] LMS
1,475,216 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,575 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 ready_for_fw is high
1,480,857 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,268 UART: [idev] Erasing UDS.KEYID = 0
1,505,142 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,794 UART: [idev] --
1,514,675 UART: [ldev] ++
1,514,843 UART: [ldev] CDI.KEYID = 6
1,515,206 UART: [ldev] SUBJECT.KEYID = 5
1,515,632 UART: [ldev] AUTHORITY.KEYID = 7
1,516,095 UART: [ldev] FE.KEYID = 1
1,520,979 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,608 UART: [ldev] --
1,586,045 UART: [fwproc] Waiting for Commands...
1,586,888 UART: [fwproc] Received command 0x46574c44
1,587,679 UART: [fwproc] Received Image of size 114168 bytes
2,883,825 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,897 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,249 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,882 >>> mbox cmd response: success
3,077,934 UART: [afmc] ++
3,078,102 UART: [afmc] CDI.KEYID = 6
3,078,464 UART: [afmc] SUBJECT.KEYID = 7
3,078,889 UART: [afmc] AUTHORITY.KEYID = 5
3,114,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,732 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,240 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,125 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,815 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,758 UART: [afmc] --
3,157,872 UART: [cold-reset] --
3,158,710 UART: [state] Locking Datavault
3,160,081 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,685 UART: [state] Locking ICCM
3,161,263 UART: [exit] Launching FMC @ 0x40000130
3,166,592 UART:
3,166,608 UART: Running Caliptra FMC ...
3,167,016 UART:
3,167,070 UART: [state] CFI Enabled
3,177,289 UART: [fht] FMC Alias Private Key: 7
3,284,550 UART: [art] Extend RT PCRs Done
3,284,978 UART: [art] Lock RT PCRs Done
3,286,696 UART: [art] Populate DV Done
3,295,121 UART: [fht] FMC Alias Private Key: 7
3,296,293 UART: [art] Derive CDI
3,296,573 UART: [art] Store in in slot 0x4
3,382,200 UART: [art] Derive Key Pair
3,382,560 UART: [art] Store priv key in slot 0x5
3,395,726 UART: [art] Derive Key Pair - Done
3,409,984 UART: [art] Signing Cert with AUTHO
3,410,464 UART: RITY.KEYID = 7
3,425,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,031 UART: [art] PUB.X = 83A4303825AF74C8168FDF6B49A5D80DA886F18AE7BE15997E0424D45D6934193C8127BBC0C12A8556F0CEFAB8B140D5
3,432,801 UART: [art] PUB.Y = 13DF81E50539BB77BAE8CEBCC62C5D8D3F82C9F0D4CFEE964D2BCF906F1EC1D9FAF26C8D7572B828D02D9B3C119C4E9F
3,439,776 UART: [art] SIG.R = D6B5C764BD738F8E8E009684A0BA2D1DBAC0318671EC8936BAC8094F1D2F17848A6D20D690F893E196CB1363A850ABFB
3,446,531 UART: [art] SIG.S = 30AD0F9475AD19849AC74ADCB3B35168825942642C4B68AE89547E1EFEC7C4CBC5D1E1FDFA9A1F212E678280D3EC1FEC
3,470,805 UART: Caliptra RT
3,471,058 UART: [state] CFI Enabled
3,579,545 UART: [rt] RT listening for mailbox commands...
3,580,215 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,061 UART: [rt]cmd =0x4c4d5356, len=1672
4,141,438 >>> mbox cmd response data (8 bytes)
4,141,439 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,181,456 UART: [rt]cmd =0x4c4d5356, len=1672
4,457,791 >>> mbox cmd response data (8 bytes)
4,457,792 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,497,811 UART: [rt]cmd =0x4c4d5356, len=1672
4,774,394 >>> mbox cmd response data (8 bytes)
4,774,395 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,814,462 UART: [rt]cmd =0x4c4d5356, len=1672
5,085,827 >>> mbox cmd response data (8 bytes)
5,085,828 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,126,025 UART: [rt]cmd =0x4c4d5356, len=1672
5,397,816 >>> mbox cmd response data (8 bytes)
5,397,817 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,438,296 UART: [rt]cmd =0x4c4d5356, len=1672
5,712,222 >>> mbox cmd response data (8 bytes)
5,712,223 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,752,588 UART: [rt]cmd =0x4c4d5356, len=1672
6,024,083 >>> mbox cmd response data (8 bytes)
6,024,084 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,064,339 UART: [rt]cmd =0x4c4d5356, len=1672
6,338,435 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 ready_for_fw is high
1,362,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,364 >>> mbox cmd response: success
2,987,130 UART:
2,987,146 UART: Running Caliptra FMC ...
2,987,554 UART:
2,987,608 UART: [state] CFI Enabled
2,998,055 UART: [fht] FMC Alias Private Key: 7
3,106,516 UART: [art] Extend RT PCRs Done
3,106,944 UART: [art] Lock RT PCRs Done
3,108,586 UART: [art] Populate DV Done
3,116,921 UART: [fht] FMC Alias Private Key: 7
3,117,983 UART: [art] Derive CDI
3,118,263 UART: [art] Store in in slot 0x4
3,204,178 UART: [art] Derive Key Pair
3,204,538 UART: [art] Store priv key in slot 0x5
3,217,976 UART: [art] Derive Key Pair - Done
3,232,651 UART: [art] Signing Cert with AUTHO
3,233,131 UART: RITY.KEYID = 7
3,248,281 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,046 UART: [art] PUB.X = BF84661FEBF7CA11297AD302552E1C39B5F2A4B6F8E82C4CDC1865D822E72A3BA66BB27E5DEC72CFDB88596521CCC087
3,255,831 UART: [art] PUB.Y = A540A414367A7398D1CFC556CC84D0A4C2C739F3A8263053FF68A021B0BD3CEB297C860988847AD897320F2175453DB1
3,262,773 UART: [art] SIG.R = D3C668B0705609A29D76C3B0E21421B3E431F0E6BADB0B776B4F0F1FEC5801136A0258FFC344959C9ACFFBE19DE3E86E
3,269,542 UART: [art] SIG.S = B3D085E41EAA9DB6CD7A6F2499B3C71EA4625DA90B9CA37EB04EFAC893E212B313AE4F0C213A7F41A4778D6F416AD56A
3,293,551 UART: Caliptra RT
3,293,804 UART: [state] CFI Enabled
3,402,000 UART: [rt] RT listening for mailbox commands...
3,402,670 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,424 UART: [rt]cmd =0x4c4d5356, len=1672
3,963,861 >>> mbox cmd response data (8 bytes)
3,963,862 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,881 UART: [rt]cmd =0x4c4d5356, len=1672
4,280,210 >>> mbox cmd response data (8 bytes)
4,280,211 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,276 UART: [rt]cmd =0x4c4d5356, len=1672
4,596,833 >>> mbox cmd response data (8 bytes)
4,596,834 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,637,009 UART: [rt]cmd =0x4c4d5356, len=1672
4,908,594 >>> mbox cmd response data (8 bytes)
4,908,595 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,948,882 UART: [rt]cmd =0x4c4d5356, len=1672
5,220,497 >>> mbox cmd response data (8 bytes)
5,220,498 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,260,861 UART: [rt]cmd =0x4c4d5356, len=1672
5,534,823 >>> mbox cmd response data (8 bytes)
5,534,824 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,574,847 UART: [rt]cmd =0x4c4d5356, len=1672
5,846,558 >>> mbox cmd response data (8 bytes)
5,846,559 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,886,756 UART: [rt]cmd =0x4c4d5356, len=1672
6,160,980 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,764 UART: [kat] SHA2-256
892,702 UART: [kat] SHA2-384
895,407 UART: [kat] SHA2-512-ACC
897,308 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,321 UART: [kat] LMS
1,475,517 UART: [kat] --
1,476,032 UART: [cold-reset] ++
1,476,528 UART: [fht] Storing FHT @ 0x50003400
1,479,349 UART: [idev] ++
1,479,517 UART: [idev] CDI.KEYID = 6
1,479,877 UART: [idev] SUBJECT.KEYID = 7
1,480,301 UART: [idev] UDS.KEYID = 0
1,480,646 ready_for_fw is high
1,480,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,273 UART: [idev] Erasing UDS.KEYID = 0
1,505,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,585 UART: [idev] --
1,514,576 UART: [ldev] ++
1,514,744 UART: [ldev] CDI.KEYID = 6
1,515,107 UART: [ldev] SUBJECT.KEYID = 5
1,515,533 UART: [ldev] AUTHORITY.KEYID = 7
1,515,996 UART: [ldev] FE.KEYID = 1
1,521,412 UART: [ldev] Erasing FE.KEYID = 1
1,547,363 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,047 UART: [ldev] --
1,586,474 UART: [fwproc] Waiting for Commands...
1,587,267 UART: [fwproc] Received command 0x46574c44
1,588,058 UART: [fwproc] Received Image of size 114168 bytes
2,883,526 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,922 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,274 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,903 >>> mbox cmd response: success
3,076,059 UART: [afmc] ++
3,076,227 UART: [afmc] CDI.KEYID = 6
3,076,589 UART: [afmc] SUBJECT.KEYID = 7
3,077,014 UART: [afmc] AUTHORITY.KEYID = 5
3,112,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,362 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,052 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,953 UART: [afmc] --
3,156,029 UART: [cold-reset] --
3,156,899 UART: [state] Locking Datavault
3,158,076 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,680 UART: [state] Locking ICCM
3,159,316 UART: [exit] Launching FMC @ 0x40000130
3,164,645 UART:
3,164,661 UART: Running Caliptra FMC ...
3,165,069 UART:
3,165,212 UART: [state] CFI Enabled
3,175,855 UART: [fht] FMC Alias Private Key: 7
3,284,092 UART: [art] Extend RT PCRs Done
3,284,520 UART: [art] Lock RT PCRs Done
3,286,222 UART: [art] Populate DV Done
3,294,329 UART: [fht] FMC Alias Private Key: 7
3,295,259 UART: [art] Derive CDI
3,295,539 UART: [art] Store in in slot 0x4
3,381,374 UART: [art] Derive Key Pair
3,381,734 UART: [art] Store priv key in slot 0x5
3,394,998 UART: [art] Derive Key Pair - Done
3,409,630 UART: [art] Signing Cert with AUTHO
3,410,110 UART: RITY.KEYID = 7
3,425,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,533 UART: [art] PUB.X = 11B19DA8D2B0BE93E2B7460801029C500A3BF93B6230834A403F5B585D736A6DD215C0BD702E3C86E95535082E145500
3,433,260 UART: [art] PUB.Y = 6F8A21E6DD9F4E578E6D82FF1A9269DC7D0598568E5B791ACECA82BD1E1A8A3AE528A330D8A35EE52AD4BF783E202ACD
3,440,229 UART: [art] SIG.R = 634EC01CDF8AF330207DDB35048B7050B5981D5C91E27073FC6B67E2E46EDD4F9D17BBA7B49CF19F3388761E2E2E3690
3,447,004 UART: [art] SIG.S = 50925A933958F2E99433F89DB6DD45A872CCD3CFB061BA40C1187869D7C6DD0D16CB051FEB4CE5230C9FA8A8FDF68921
3,470,642 UART: Caliptra RT
3,470,987 UART: [state] CFI Enabled
3,579,651 UART: [rt] RT listening for mailbox commands...
3,580,321 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,125 UART: [rt]cmd =0x4c4d5356, len=1672
4,141,386 >>> mbox cmd response data (8 bytes)
4,141,387 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,181,774 UART: [rt]cmd =0x4c4d5356, len=1672
4,458,241 >>> mbox cmd response data (8 bytes)
4,458,242 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,498,405 UART: [rt]cmd =0x4c4d5356, len=1672
4,775,000 >>> mbox cmd response data (8 bytes)
4,775,001 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,815,140 UART: [rt]cmd =0x4c4d5356, len=1672
5,086,815 >>> mbox cmd response data (8 bytes)
5,086,816 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,126,871 UART: [rt]cmd =0x4c4d5356, len=1672
5,398,306 >>> mbox cmd response data (8 bytes)
5,398,307 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,438,482 UART: [rt]cmd =0x4c4d5356, len=1672
5,712,676 >>> mbox cmd response data (8 bytes)
5,712,677 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,752,730 UART: [rt]cmd =0x4c4d5356, len=1672
6,024,603 >>> mbox cmd response data (8 bytes)
6,024,604 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,064,785 UART: [rt]cmd =0x4c4d5356, len=1672
6,338,601 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,098 ready_for_fw is high
1,363,098 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,265 >>> mbox cmd response: success
2,987,247 UART:
2,987,263 UART: Running Caliptra FMC ...
2,987,671 UART:
2,987,814 UART: [state] CFI Enabled
2,998,535 UART: [fht] FMC Alias Private Key: 7
3,106,460 UART: [art] Extend RT PCRs Done
3,106,888 UART: [art] Lock RT PCRs Done
3,108,170 UART: [art] Populate DV Done
3,116,211 UART: [fht] FMC Alias Private Key: 7
3,117,357 UART: [art] Derive CDI
3,117,637 UART: [art] Store in in slot 0x4
3,203,284 UART: [art] Derive Key Pair
3,203,644 UART: [art] Store priv key in slot 0x5
3,216,606 UART: [art] Derive Key Pair - Done
3,231,309 UART: [art] Signing Cert with AUTHO
3,231,789 UART: RITY.KEYID = 7
3,246,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,396 UART: [art] PUB.X = DEF892BD13AB8217DEE79281FE1EB74F236210E6B934D837DCDFDCB217AC353709105D85250A87B4CF90A60D6749B72B
3,254,167 UART: [art] PUB.Y = F2248F823C9A39A61C049D6DE80F34EA9E9BC90CB9BE1EE18306E43157DA73BB86CB619CBC5AB7B76940C821D63C2E47
3,261,119 UART: [art] SIG.R = 154907E501B59469BB90EFECE8927223AEBDEC26562915EDC3714332DA798BE6B15F762119CD81054FD255059D059DED
3,267,876 UART: [art] SIG.S = 7C9B95CCC3E420F61A6C998BB1DC5C010199C14E87CC6E91A59B495CB2EC79254A736330C350CB2AD82807E57485BC16
3,292,462 UART: Caliptra RT
3,292,807 UART: [state] CFI Enabled
3,401,733 UART: [rt] RT listening for mailbox commands...
3,402,403 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,017 UART: [rt]cmd =0x4c4d5356, len=1672
3,963,306 >>> mbox cmd response data (8 bytes)
3,963,307 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,774 UART: [rt]cmd =0x4c4d5356, len=1672
4,280,423 >>> mbox cmd response data (8 bytes)
4,280,424 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,661 UART: [rt]cmd =0x4c4d5356, len=1672
4,597,074 >>> mbox cmd response data (8 bytes)
4,597,075 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,637,406 UART: [rt]cmd =0x4c4d5356, len=1672
4,909,053 >>> mbox cmd response data (8 bytes)
4,909,054 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,301 UART: [rt]cmd =0x4c4d5356, len=1672
5,220,810 >>> mbox cmd response data (8 bytes)
5,220,811 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,261,100 UART: [rt]cmd =0x4c4d5356, len=1672
5,535,144 >>> mbox cmd response data (8 bytes)
5,535,145 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,575,336 UART: [rt]cmd =0x4c4d5356, len=1672
5,846,889 >>> mbox cmd response data (8 bytes)
5,846,890 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,887,293 UART: [rt]cmd =0x4c4d5356, len=1672
6,161,447 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,514 UART: [kat] SHA2-256
893,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,289 UART: [kat] ++
897,441 UART: [kat] sha1
901,653 UART: [kat] SHA2-256
903,593 UART: [kat] SHA2-384
906,102 UART: [kat] SHA2-512-ACC
908,003 UART: [kat] ECC-384
918,066 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,172,013 UART: [cold-reset] ++
1,172,431 UART: [fht] FHT @ 0x50003400
1,175,038 UART: [idev] ++
1,175,206 UART: [idev] CDI.KEYID = 6
1,175,566 UART: [idev] SUBJECT.KEYID = 7
1,175,990 UART: [idev] UDS.KEYID = 0
1,176,335 ready_for_fw is high
1,176,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,308 UART: [idev] Erasing UDS.KEYID = 0
1,201,561 UART: [idev] Sha1 KeyId Algorithm
1,210,109 UART: [idev] --
1,210,961 UART: [ldev] ++
1,211,129 UART: [ldev] CDI.KEYID = 6
1,211,492 UART: [ldev] SUBJECT.KEYID = 5
1,211,918 UART: [ldev] AUTHORITY.KEYID = 7
1,212,381 UART: [ldev] FE.KEYID = 1
1,217,635 UART: [ldev] Erasing FE.KEYID = 1
1,244,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,927 UART: [ldev] --
1,283,428 UART: [fwproc] Wait for Commands...
1,284,036 UART: [fwproc] Recv command 0x46574c44
1,284,764 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,243 >>> mbox cmd response: success
2,774,407 UART: [afmc] ++
2,774,575 UART: [afmc] CDI.KEYID = 6
2,774,937 UART: [afmc] SUBJECT.KEYID = 7
2,775,362 UART: [afmc] AUTHORITY.KEYID = 5
2,810,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,442 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,327 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,046 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,884 UART: [afmc] --
2,854,014 UART: [cold-reset] --
2,854,860 UART: [state] Locking Datavault
2,855,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,511 UART: [state] Locking ICCM
2,857,117 UART: [exit] Launching FMC @ 0x40000130
2,862,446 UART:
2,862,462 UART: Running Caliptra FMC ...
2,862,870 UART:
2,862,924 UART: [state] CFI Enabled
2,873,473 UART: [fht] FMC Alias Private Key: 7
2,981,258 UART: [art] Extend RT PCRs Done
2,981,686 UART: [art] Lock RT PCRs Done
2,982,806 UART: [art] Populate DV Done
2,991,071 UART: [fht] FMC Alias Private Key: 7
2,992,133 UART: [art] Derive CDI
2,992,413 UART: [art] Store in in slot 0x4
3,078,346 UART: [art] Derive Key Pair
3,078,706 UART: [art] Store priv key in slot 0x5
3,091,496 UART: [art] Derive Key Pair - Done
3,106,295 UART: [art] Signing Cert with AUTHO
3,106,775 UART: RITY.KEYID = 7
3,121,637 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,402 UART: [art] PUB.X = FED6A43781F9E9F025A00ECFA279F210916A3D766E76D80C8BBCF621A15ED583342765A4D404A233FD4EAF009E576DB0
3,129,151 UART: [art] PUB.Y = FBD2ED03C6BBE3DF15A64C475911CBF2058230679153EB803BD12663FC24BD9DA84E8B01B6CFCE37FF3076A27EADBB89
3,136,112 UART: [art] SIG.R = 420AB8ECE99478D6DB54A71F2B016037F691D828D2B739369F4E5B4191B5D3D6EDAEB66247D65E8C7407688F0327375C
3,142,870 UART: [art] SIG.S = 088CE86E7EB50EC74AB9EEAD682B753B21AA01CF113B4A8F437D5FC765597BC642C4D2E049CB362FDFD0520375E9BB12
3,166,641 UART: Caliptra RT
3,166,894 UART: [state] CFI Enabled
3,274,253 UART: [rt] RT listening for mailbox commands...
3,274,923 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,357 UART: [rt]cmd =0x4c4d5356, len=1672
3,835,986 >>> mbox cmd response data (8 bytes)
3,835,987 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,336 UART: [rt]cmd =0x4c4d5356, len=1672
4,152,681 >>> mbox cmd response data (8 bytes)
4,152,682 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,931 UART: [rt]cmd =0x4c4d5356, len=1672
4,469,598 >>> mbox cmd response data (8 bytes)
4,469,599 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,509,740 UART: [rt]cmd =0x4c4d5356, len=1672
4,781,135 >>> mbox cmd response data (8 bytes)
4,781,136 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,821,381 UART: [rt]cmd =0x4c4d5356, len=1672
5,093,216 >>> mbox cmd response data (8 bytes)
5,093,217 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,133,314 UART: [rt]cmd =0x4c4d5356, len=1672
5,407,170 >>> mbox cmd response data (8 bytes)
5,407,171 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,447,424 UART: [rt]cmd =0x4c4d5356, len=1672
5,719,221 >>> mbox cmd response data (8 bytes)
5,719,222 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,759,301 UART: [rt]cmd =0x4c4d5356, len=1672
6,033,253 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,689 ready_for_fw is high
1,059,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,824 >>> mbox cmd response: success
2,685,096 UART:
2,685,112 UART: Running Caliptra FMC ...
2,685,520 UART:
2,685,574 UART: [state] CFI Enabled
2,696,459 UART: [fht] FMC Alias Private Key: 7
2,804,356 UART: [art] Extend RT PCRs Done
2,804,784 UART: [art] Lock RT PCRs Done
2,806,602 UART: [art] Populate DV Done
2,814,703 UART: [fht] FMC Alias Private Key: 7
2,815,847 UART: [art] Derive CDI
2,816,127 UART: [art] Store in in slot 0x4
2,901,382 UART: [art] Derive Key Pair
2,901,742 UART: [art] Store priv key in slot 0x5
2,914,884 UART: [art] Derive Key Pair - Done
2,929,603 UART: [art] Signing Cert with AUTHO
2,930,083 UART: RITY.KEYID = 7
2,944,865 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,630 UART: [art] PUB.X = 6AAA62BF9AB3E9685A58E20693FB958D904F4CD775A7532379A1B3981338837D0609AAB057C7C2279866B8D7C237F894
2,952,387 UART: [art] PUB.Y = ACA5EE7B3995EA3C400EDEF2A2C82567094EC1725D05A65B389ED02AE6A9961AB09F9390696DF83154B21DD42B264E14
2,959,336 UART: [art] SIG.R = A465C9829EFA721BD9C9A9809BAE2328533871250A47744BB500CA19F68F4D5ED904547B081DE0EB48992CA398D11FE4
2,966,077 UART: [art] SIG.S = 4C82DE110B4C5549A4CF975108D6F87D64A4A1ECC1D2A2FD2A76026912BBEE92C8C163CEAC8F12CFCCB57A280DD8CD5C
2,990,058 UART: Caliptra RT
2,990,311 UART: [state] CFI Enabled
3,097,578 UART: [rt] RT listening for mailbox commands...
3,098,248 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,840 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,877 >>> mbox cmd response data (8 bytes)
3,658,878 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,753 UART: [rt]cmd =0x4c4d5356, len=1672
3,975,142 >>> mbox cmd response data (8 bytes)
3,975,143 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,546 UART: [rt]cmd =0x4c4d5356, len=1672
4,292,151 >>> mbox cmd response data (8 bytes)
4,292,152 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,332,377 UART: [rt]cmd =0x4c4d5356, len=1672
4,604,194 >>> mbox cmd response data (8 bytes)
4,604,195 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,644,494 UART: [rt]cmd =0x4c4d5356, len=1672
4,916,029 >>> mbox cmd response data (8 bytes)
4,916,030 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,956,239 UART: [rt]cmd =0x4c4d5356, len=1672
5,230,189 >>> mbox cmd response data (8 bytes)
5,230,190 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,270,167 UART: [rt]cmd =0x4c4d5356, len=1672
5,541,720 >>> mbox cmd response data (8 bytes)
5,541,721 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,582,072 UART: [rt]cmd =0x4c4d5356, len=1672
5,856,334 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
906,747 UART: [kat] SHA2-512-ACC
908,648 UART: [kat] ECC-384
918,267 UART: [kat] HMAC-384Kdf
922,859 UART: [kat] LMS
1,171,187 UART: [kat] --
1,172,230 UART: [cold-reset] ++
1,172,632 UART: [fht] FHT @ 0x50003400
1,175,245 UART: [idev] ++
1,175,413 UART: [idev] CDI.KEYID = 6
1,175,773 UART: [idev] SUBJECT.KEYID = 7
1,176,197 UART: [idev] UDS.KEYID = 0
1,176,542 ready_for_fw is high
1,176,542 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,055 UART: [idev] Erasing UDS.KEYID = 0
1,201,626 UART: [idev] Sha1 KeyId Algorithm
1,210,134 UART: [idev] --
1,211,128 UART: [ldev] ++
1,211,296 UART: [ldev] CDI.KEYID = 6
1,211,659 UART: [ldev] SUBJECT.KEYID = 5
1,212,085 UART: [ldev] AUTHORITY.KEYID = 7
1,212,548 UART: [ldev] FE.KEYID = 1
1,217,884 UART: [ldev] Erasing FE.KEYID = 1
1,244,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,614 UART: [ldev] --
1,283,959 UART: [fwproc] Wait for Commands...
1,284,701 UART: [fwproc] Recv command 0x46574c44
1,285,429 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,706 >>> mbox cmd response: success
2,775,820 UART: [afmc] ++
2,775,988 UART: [afmc] CDI.KEYID = 6
2,776,350 UART: [afmc] SUBJECT.KEYID = 7
2,776,775 UART: [afmc] AUTHORITY.KEYID = 5
2,812,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,531 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,557 UART: [afmc] --
2,856,611 UART: [cold-reset] --
2,857,489 UART: [state] Locking Datavault
2,858,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,512 UART: [state] Locking ICCM
2,860,110 UART: [exit] Launching FMC @ 0x40000130
2,865,439 UART:
2,865,455 UART: Running Caliptra FMC ...
2,865,863 UART:
2,866,006 UART: [state] CFI Enabled
2,876,663 UART: [fht] FMC Alias Private Key: 7
2,984,742 UART: [art] Extend RT PCRs Done
2,985,170 UART: [art] Lock RT PCRs Done
2,986,918 UART: [art] Populate DV Done
2,995,001 UART: [fht] FMC Alias Private Key: 7
2,996,025 UART: [art] Derive CDI
2,996,305 UART: [art] Store in in slot 0x4
3,082,124 UART: [art] Derive Key Pair
3,082,484 UART: [art] Store priv key in slot 0x5
3,095,894 UART: [art] Derive Key Pair - Done
3,110,637 UART: [art] Signing Cert with AUTHO
3,111,117 UART: RITY.KEYID = 7
3,126,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,328 UART: [art] PUB.X = 49CCAB3F910E97FCA62C57BBA8870BC7E913E68EDD922AFD4B5F3F00F70CF64ABC18E1BE7D11761E38A5B81175D024CA
3,134,089 UART: [art] PUB.Y = CE780502A5CF2321F30ED2DCBD6C9AF3C55F86AFE8030EB01535E39F2CEB56BCBA2FBF01F442E80F6A439EA422B85E7F
3,141,042 UART: [art] SIG.R = 4A89AB0C027F815C533DE39950721673C95441DAEEA9EE8F32973648B98A4700A9202B7F0CB42AA0EC8D87B74E54345A
3,147,783 UART: [art] SIG.S = C78B689DA7579E350D9B6D48ABFA5E387209010144ECC3EB5FC8D85EABF21B31801712DD697354F418DF7B1354F70713
3,172,319 UART: Caliptra RT
3,172,664 UART: [state] CFI Enabled
3,281,071 UART: [rt] RT listening for mailbox commands...
3,281,741 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,322,163 UART: [rt]cmd =0x4c4d5356, len=1672
3,842,764 >>> mbox cmd response data (8 bytes)
3,842,765 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,882 UART: [rt]cmd =0x4c4d5356, len=1672
4,159,477 >>> mbox cmd response data (8 bytes)
4,159,478 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,667 UART: [rt]cmd =0x4c4d5356, len=1672
4,476,158 >>> mbox cmd response data (8 bytes)
4,476,159 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,516,400 UART: [rt]cmd =0x4c4d5356, len=1672
4,788,097 >>> mbox cmd response data (8 bytes)
4,788,098 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,828,235 UART: [rt]cmd =0x4c4d5356, len=1672
5,100,070 >>> mbox cmd response data (8 bytes)
5,100,071 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,140,446 UART: [rt]cmd =0x4c4d5356, len=1672
5,414,572 >>> mbox cmd response data (8 bytes)
5,414,573 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,454,802 UART: [rt]cmd =0x4c4d5356, len=1672
5,726,299 >>> mbox cmd response data (8 bytes)
5,726,300 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,766,665 UART: [rt]cmd =0x4c4d5356, len=1672
6,040,579 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,402 ready_for_fw is high
1,060,402 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,321 >>> mbox cmd response: success
2,686,761 UART:
2,686,777 UART: Running Caliptra FMC ...
2,687,185 UART:
2,687,328 UART: [state] CFI Enabled
2,698,133 UART: [fht] FMC Alias Private Key: 7
2,806,272 UART: [art] Extend RT PCRs Done
2,806,700 UART: [art] Lock RT PCRs Done
2,808,144 UART: [art] Populate DV Done
2,816,381 UART: [fht] FMC Alias Private Key: 7
2,817,463 UART: [art] Derive CDI
2,817,743 UART: [art] Store in in slot 0x4
2,903,220 UART: [art] Derive Key Pair
2,903,580 UART: [art] Store priv key in slot 0x5
2,917,168 UART: [art] Derive Key Pair - Done
2,931,995 UART: [art] Signing Cert with AUTHO
2,932,475 UART: RITY.KEYID = 7
2,947,687 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,452 UART: [art] PUB.X = 58FF4AFF6E5139709FAB0B823963A428147BB25080F2DC2FD607A17230A4A8E223E83E38B6DE4F5F02470E0CBD8B2434
2,955,213 UART: [art] PUB.Y = 51851903C2B00F69C5F9BF7869736EEF154C15FFA9FB6AB9694C169DE235D3F542F23D81A49A4FE8B850A72C754F6CA0
2,962,165 UART: [art] SIG.R = ED0E1519BF10BA06428CC3C0E026D021440CE9F98AB1373E96D81B5003476491C5F5AD4145C025E195DA28D3EAA9CA47
2,968,929 UART: [art] SIG.S = F9CE525B383003D5A8FF6C915A9068289F99B5E024B455DCFD158249046EC644BB130BD2BCC7087539953F40A5A96869
2,993,218 UART: Caliptra RT
2,993,563 UART: [state] CFI Enabled
3,101,505 UART: [rt] RT listening for mailbox commands...
3,102,175 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,035 UART: [rt]cmd =0x4c4d5356, len=1672
3,663,256 >>> mbox cmd response data (8 bytes)
3,663,257 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,302 UART: [rt]cmd =0x4c4d5356, len=1672
3,979,871 >>> mbox cmd response data (8 bytes)
3,979,872 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,119 UART: [rt]cmd =0x4c4d5356, len=1672
4,296,542 >>> mbox cmd response data (8 bytes)
4,296,543 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,336,882 UART: [rt]cmd =0x4c4d5356, len=1672
4,608,545 >>> mbox cmd response data (8 bytes)
4,608,546 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,648,469 UART: [rt]cmd =0x4c4d5356, len=1672
4,920,070 >>> mbox cmd response data (8 bytes)
4,920,071 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,960,132 UART: [rt]cmd =0x4c4d5356, len=1672
5,234,318 >>> mbox cmd response data (8 bytes)
5,234,319 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,274,508 UART: [rt]cmd =0x4c4d5356, len=1672
5,546,227 >>> mbox cmd response data (8 bytes)
5,546,228 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,586,555 UART: [rt]cmd =0x4c4d5356, len=1672
5,860,649 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,710 UART: [kat] SHA2-512-ACC
906,611 UART: [kat] ECC-384
916,486 UART: [kat] HMAC-384Kdf
920,970 UART: [kat] LMS
1,169,282 UART: [kat] --
1,170,117 UART: [cold-reset] ++
1,170,469 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 ready_for_fw is high
1,174,253 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,199,455 UART: [idev] Sha1 KeyId Algorithm
1,208,461 UART: [idev] --
1,209,502 UART: [ldev] ++
1,209,670 UART: [ldev] CDI.KEYID = 6
1,210,034 UART: [ldev] SUBJECT.KEYID = 5
1,210,461 UART: [ldev] AUTHORITY.KEYID = 7
1,210,924 UART: [ldev] FE.KEYID = 1
1,216,072 UART: [ldev] Erasing FE.KEYID = 1
1,241,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,324 UART: [ldev] --
1,280,620 UART: [fwproc] Wait for Commands...
1,281,345 UART: [fwproc] Recv command 0x46574c44
1,282,078 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,534 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,843 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,453 >>> mbox cmd response: success
2,771,702 UART: [afmc] ++
2,771,870 UART: [afmc] CDI.KEYID = 6
2,772,233 UART: [afmc] SUBJECT.KEYID = 7
2,772,659 UART: [afmc] AUTHORITY.KEYID = 5
2,808,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,453 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,172 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,031 UART: [afmc] --
2,851,043 UART: [cold-reset] --
2,852,113 UART: [state] Locking Datavault
2,853,066 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,670 UART: [state] Locking ICCM
2,854,240 UART: [exit] Launching FMC @ 0x40000130
2,859,569 UART:
2,859,585 UART: Running Caliptra FMC ...
2,859,993 UART:
2,860,047 UART: [state] CFI Enabled
2,870,276 UART: [fht] FMC Alias Private Key: 7
2,978,775 UART: [art] Extend RT PCRs Done
2,979,203 UART: [art] Lock RT PCRs Done
2,980,669 UART: [art] Populate DV Done
2,988,782 UART: [fht] FMC Alias Private Key: 7
2,989,824 UART: [art] Derive CDI
2,990,104 UART: [art] Store in in slot 0x4
3,075,937 UART: [art] Derive Key Pair
3,076,297 UART: [art] Store priv key in slot 0x5
3,088,951 UART: [art] Derive Key Pair - Done
3,103,611 UART: [art] Signing Cert with AUTHO
3,104,091 UART: RITY.KEYID = 7
3,119,225 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,990 UART: [art] PUB.X = FB32BBE5068BE5617A7966BAB7B4F414F6BF7271027517BC3BDC5888B3418FB443237D097BD361FF0AB706803428CB89
3,126,749 UART: [art] PUB.Y = DC9C9CB6F241043C4D43C9DF8C6D2C9350B2DBCD572B86E60F2C1E2B4D2F01238C0FCFE351A2886CDDB6EF28258A3E03
3,133,704 UART: [art] SIG.R = BE7621F4B0C9CC1E5B110F34AFED1EB0B5EC5E5C2F609F6AFC8786933B0E0CA7B8E916B7229B673A1816585A72469B8F
3,140,479 UART: [art] SIG.S = DFD5416F73FAF40076A6B56DB5258415DCBC4495E9CB683EE1DD27A467DEDEAABEB6E22726A92A66C7E818C4342CD265
3,164,180 UART: Caliptra RT
3,164,433 UART: [state] CFI Enabled
3,272,849 UART: [rt] RT listening for mailbox commands...
3,273,519 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,069 UART: [rt]cmd =0x4c4d5356, len=1672
3,834,582 >>> mbox cmd response data (8 bytes)
3,834,583 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,976 UART: [rt]cmd =0x4c4d5356, len=1672
4,151,401 >>> mbox cmd response data (8 bytes)
4,151,402 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,191,665 UART: [rt]cmd =0x4c4d5356, len=1672
4,468,062 >>> mbox cmd response data (8 bytes)
4,468,063 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,508,318 UART: [rt]cmd =0x4c4d5356, len=1672
4,779,919 >>> mbox cmd response data (8 bytes)
4,779,920 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,820,309 UART: [rt]cmd =0x4c4d5356, len=1672
5,092,042 >>> mbox cmd response data (8 bytes)
5,092,043 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,132,180 UART: [rt]cmd =0x4c4d5356, len=1672
5,406,176 >>> mbox cmd response data (8 bytes)
5,406,177 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,446,104 UART: [rt]cmd =0x4c4d5356, len=1672
5,717,637 >>> mbox cmd response data (8 bytes)
5,717,638 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,757,737 UART: [rt]cmd =0x4c4d5356, len=1672
6,031,699 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,854 ready_for_fw is high
1,055,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,267 >>> mbox cmd response: success
2,682,711 UART:
2,682,727 UART: Running Caliptra FMC ...
2,683,135 UART:
2,683,189 UART: [state] CFI Enabled
2,693,306 UART: [fht] FMC Alias Private Key: 7
2,800,769 UART: [art] Extend RT PCRs Done
2,801,197 UART: [art] Lock RT PCRs Done
2,802,275 UART: [art] Populate DV Done
2,810,526 UART: [fht] FMC Alias Private Key: 7
2,811,662 UART: [art] Derive CDI
2,811,942 UART: [art] Store in in slot 0x4
2,897,747 UART: [art] Derive Key Pair
2,898,107 UART: [art] Store priv key in slot 0x5
2,911,321 UART: [art] Derive Key Pair - Done
2,925,957 UART: [art] Signing Cert with AUTHO
2,926,437 UART: RITY.KEYID = 7
2,941,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,000 UART: [art] PUB.X = 37146D49BF08D9CD2621861E4CFCF87033EBFF7CD0599A7B57C2EBADF8AB98D3FC3C5F61155FD77F45AAC0954692F262
2,948,783 UART: [art] PUB.Y = A89711F22523DC6D2F0F603561B6D79416ED7F652137DCEBBDC9296C6FCB0301E747987B88778B0E9CEC6B48FCD585BD
2,955,731 UART: [art] SIG.R = 9CEEFE7D0ADEE055E7B78BD15B75512B103FB6E22B0893F86EDEDE2B4EB25AC1C110332BB53A041A418A7B310713794A
2,962,505 UART: [art] SIG.S = 24CE460F265CBD21B02666C93B049EC177C58E0057205CFBEE5C4D0AC67BD36A32FAB427D5CCB13297B87113150967EB
2,986,612 UART: Caliptra RT
2,986,865 UART: [state] CFI Enabled
3,094,042 UART: [rt] RT listening for mailbox commands...
3,094,712 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,520 UART: [rt]cmd =0x4c4d5356, len=1672
3,656,063 >>> mbox cmd response data (8 bytes)
3,656,064 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,213 UART: [rt]cmd =0x4c4d5356, len=1672
3,972,850 >>> mbox cmd response data (8 bytes)
3,972,851 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,012,886 UART: [rt]cmd =0x4c4d5356, len=1672
4,289,307 >>> mbox cmd response data (8 bytes)
4,289,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,329,509 UART: [rt]cmd =0x4c4d5356, len=1672
4,601,272 >>> mbox cmd response data (8 bytes)
4,601,273 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,641,350 UART: [rt]cmd =0x4c4d5356, len=1672
4,913,303 >>> mbox cmd response data (8 bytes)
4,913,304 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,565 UART: [rt]cmd =0x4c4d5356, len=1672
5,227,785 >>> mbox cmd response data (8 bytes)
5,227,786 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,268,065 UART: [rt]cmd =0x4c4d5356, len=1672
5,539,518 >>> mbox cmd response data (8 bytes)
5,539,519 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,579,720 UART: [rt]cmd =0x4c4d5356, len=1672
5,853,828 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,285 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,169,932 UART: [cold-reset] ++
1,170,424 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,174,240 ready_for_fw is high
1,174,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,704 UART: [idev] Erasing UDS.KEYID = 0
1,199,088 UART: [idev] Sha1 KeyId Algorithm
1,207,766 UART: [idev] --
1,208,651 UART: [ldev] ++
1,208,819 UART: [ldev] CDI.KEYID = 6
1,209,183 UART: [ldev] SUBJECT.KEYID = 5
1,209,610 UART: [ldev] AUTHORITY.KEYID = 7
1,210,073 UART: [ldev] FE.KEYID = 1
1,215,433 UART: [ldev] Erasing FE.KEYID = 1
1,241,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,165 UART: [ldev] --
1,280,451 UART: [fwproc] Wait for Commands...
1,281,060 UART: [fwproc] Recv command 0x46574c44
1,281,793 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,098 >>> mbox cmd response: success
2,771,153 UART: [afmc] ++
2,771,321 UART: [afmc] CDI.KEYID = 6
2,771,684 UART: [afmc] SUBJECT.KEYID = 7
2,772,110 UART: [afmc] AUTHORITY.KEYID = 5
2,807,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,664 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,393 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,276 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,618 UART: [afmc] --
2,850,716 UART: [cold-reset] --
2,851,628 UART: [state] Locking Datavault
2,853,067 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,671 UART: [state] Locking ICCM
2,854,271 UART: [exit] Launching FMC @ 0x40000130
2,859,600 UART:
2,859,616 UART: Running Caliptra FMC ...
2,860,024 UART:
2,860,167 UART: [state] CFI Enabled
2,870,968 UART: [fht] FMC Alias Private Key: 7
2,979,131 UART: [art] Extend RT PCRs Done
2,979,559 UART: [art] Lock RT PCRs Done
2,981,217 UART: [art] Populate DV Done
2,989,764 UART: [fht] FMC Alias Private Key: 7
2,990,716 UART: [art] Derive CDI
2,990,996 UART: [art] Store in in slot 0x4
3,076,331 UART: [art] Derive Key Pair
3,076,691 UART: [art] Store priv key in slot 0x5
3,090,109 UART: [art] Derive Key Pair - Done
3,104,896 UART: [art] Signing Cert with AUTHO
3,105,376 UART: RITY.KEYID = 7
3,120,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,141 UART: [art] PUB.X = 55B27BC947B33753FE329233EB8FAC4499F81B937275411AC4C28CF0ED7B3766A2B7B675210B8978B8AAB5D9963FD0E6
3,127,912 UART: [art] PUB.Y = 83FCFA27D5865E235DFCF3AB801908247BDEA72AEFB06FD19A2F8CF3FF9D669697E7528DC848384E08C77910A90F9C79
3,134,865 UART: [art] SIG.R = 57E6CB601047D5ABF9C781CB3879DD51E0796354E805E71CFBF0CF42DFCCDB75AF377F19E1A6E27F9C2DACA2CBF349D4
3,141,656 UART: [art] SIG.S = 0AB1838B9B09E2F23CE757BDD4E2401E55FC06D2281088C742E44533514483247561833E7A70CAB6CDF6BC5A74AF1CEE
3,165,638 UART: Caliptra RT
3,165,983 UART: [state] CFI Enabled
3,274,150 UART: [rt] RT listening for mailbox commands...
3,274,820 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,192 UART: [rt]cmd =0x4c4d5356, len=1672
3,835,631 >>> mbox cmd response data (8 bytes)
3,835,632 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,875,941 UART: [rt]cmd =0x4c4d5356, len=1672
4,152,478 >>> mbox cmd response data (8 bytes)
4,152,479 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,192,736 UART: [rt]cmd =0x4c4d5356, len=1672
4,469,279 >>> mbox cmd response data (8 bytes)
4,469,280 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,509,431 UART: [rt]cmd =0x4c4d5356, len=1672
4,781,072 >>> mbox cmd response data (8 bytes)
4,781,073 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,821,364 UART: [rt]cmd =0x4c4d5356, len=1672
5,092,903 >>> mbox cmd response data (8 bytes)
5,092,904 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,133,143 UART: [rt]cmd =0x4c4d5356, len=1672
5,407,321 >>> mbox cmd response data (8 bytes)
5,407,322 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,447,549 UART: [rt]cmd =0x4c4d5356, len=1672
5,719,396 >>> mbox cmd response data (8 bytes)
5,719,397 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,759,574 UART: [rt]cmd =0x4c4d5356, len=1672
6,033,748 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,757 ready_for_fw is high
1,056,757 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,550 >>> mbox cmd response: success
2,682,842 UART:
2,682,858 UART: Running Caliptra FMC ...
2,683,266 UART:
2,683,409 UART: [state] CFI Enabled
2,694,288 UART: [fht] FMC Alias Private Key: 7
2,802,299 UART: [art] Extend RT PCRs Done
2,802,727 UART: [art] Lock RT PCRs Done
2,804,105 UART: [art] Populate DV Done
2,812,428 UART: [fht] FMC Alias Private Key: 7
2,813,456 UART: [art] Derive CDI
2,813,736 UART: [art] Store in in slot 0x4
2,899,479 UART: [art] Derive Key Pair
2,899,839 UART: [art] Store priv key in slot 0x5
2,912,653 UART: [art] Derive Key Pair - Done
2,927,290 UART: [art] Signing Cert with AUTHO
2,927,770 UART: RITY.KEYID = 7
2,943,218 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,983 UART: [art] PUB.X = E8E4F1C7D220972D643FFDBC4F4B79AA0BF9A584ED8964B154E2C65C5BFC4222DCDD8CCB28CD6DA9877F470541A42B1E
2,950,769 UART: [art] PUB.Y = 75E76C8E491FD9860C9B2E799372584036A9E09D5DAD98088895E5119CE3EE9D0C291E906FBAFF9C80E15031F4C864A9
2,957,712 UART: [art] SIG.R = 15F109B272A7C096C8B0E6DA38F5223577F1D51C6E90737C1F33D3EFB8FBDB48275001F9942711E4F014F8F5037DB6DE
2,964,477 UART: [art] SIG.S = C9BEA7D6A114DFDC70494B4BA204B045D34A38B8472B1AA4F2D59146A2AF4E563969947CE7A05697B6ABFD4A02CD16E4
2,987,946 UART: Caliptra RT
2,988,291 UART: [state] CFI Enabled
3,096,218 UART: [rt] RT listening for mailbox commands...
3,096,888 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,534 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,909 >>> mbox cmd response data (8 bytes)
3,657,910 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,111 UART: [rt]cmd =0x4c4d5356, len=1672
3,974,648 >>> mbox cmd response data (8 bytes)
3,974,649 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,014,726 UART: [rt]cmd =0x4c4d5356, len=1672
4,291,447 >>> mbox cmd response data (8 bytes)
4,291,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,331,711 UART: [rt]cmd =0x4c4d5356, len=1672
4,603,298 >>> mbox cmd response data (8 bytes)
4,603,299 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,643,508 UART: [rt]cmd =0x4c4d5356, len=1672
4,915,025 >>> mbox cmd response data (8 bytes)
4,915,026 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,955,089 UART: [rt]cmd =0x4c4d5356, len=1672
5,229,165 >>> mbox cmd response data (8 bytes)
5,229,166 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,269,301 UART: [rt]cmd =0x4c4d5356, len=1672
5,541,174 >>> mbox cmd response data (8 bytes)
5,541,175 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,581,400 UART: [rt]cmd =0x4c4d5356, len=1672
5,855,350 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
192,007 UART:
192,406 UART: Running Caliptra ROM ...
193,508 UART:
193,646 UART: [state] CFI Enabled
263,275 UART: [state] LifecycleState = Unprovisioned
265,245 UART: [state] DebugLocked = No
267,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,678 UART: [kat] SHA2-256
442,334 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,875 UART: [kat] ++
453,338 UART: [kat] sha1
463,779 UART: [kat] SHA2-256
466,422 UART: [kat] SHA2-384
473,043 UART: [kat] SHA2-512-ACC
475,405 UART: [kat] ECC-384
2,766,286 UART: [kat] HMAC-384Kdf
2,779,214 UART: [kat] LMS
3,969,504 UART: [kat] --
3,974,351 UART: [cold-reset] ++
3,975,785 UART: [fht] Storing FHT @ 0x50003400
3,987,116 UART: [idev] ++
3,987,745 UART: [idev] CDI.KEYID = 6
3,988,664 UART: [idev] SUBJECT.KEYID = 7
3,989,903 UART: [idev] UDS.KEYID = 0
3,990,991 ready_for_fw is high
3,991,214 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,891 UART: [idev] Erasing UDS.KEYID = 0
7,321,886 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,973 UART: [idev] --
7,348,218 UART: [ldev] ++
7,348,790 UART: [ldev] CDI.KEYID = 6
7,349,825 UART: [ldev] SUBJECT.KEYID = 5
7,350,977 UART: [ldev] AUTHORITY.KEYID = 7
7,352,251 UART: [ldev] FE.KEYID = 1
7,380,935 UART: [ldev] Erasing FE.KEYID = 1
10,717,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,628 UART: [ldev] --
13,095,795 UART: [fwproc] Waiting for Commands...
13,099,133 UART: [fwproc] Received command 0x46574c44
13,101,307 UART: [fwproc] Received Image of size 113844 bytes
17,145,748 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,224,021 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,292,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,608,435 >>> mbox cmd response: success
17,612,382 UART: [afmc] ++
17,612,966 UART: [afmc] CDI.KEYID = 6
17,613,871 UART: [afmc] SUBJECT.KEYID = 7
17,615,133 UART: [afmc] AUTHORITY.KEYID = 5
20,983,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,766 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,152 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,011 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,478 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,699 UART: [afmc] --
23,356,855 UART: [cold-reset] --
23,360,922 UART: [state] Locking Datavault
23,364,983 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,729 UART: [state] Locking ICCM
23,368,299 UART: [exit] Launching FMC @ 0x40000130
23,376,691 UART:
23,376,916 UART: Running Caliptra FMC ...
23,378,007 UART:
23,378,163 UART: [state] CFI Enabled
23,445,797 UART: [fht] FMC Alias Private Key: 7
25,783,756 UART: [art] Extend RT PCRs Done
25,784,974 UART: [art] Lock RT PCRs Done
25,786,317 UART: [art] Populate DV Done
25,791,668 UART: [fht] FMC Alias Private Key: 7
25,793,198 UART: [art] Derive CDI
25,793,953 UART: [art] Store in in slot 0x4
25,853,578 UART: [art] Derive Key Pair
25,854,615 UART: [art] Store priv key in slot 0x5
29,147,171 UART: [art] Derive Key Pair - Done
29,160,333 UART: [art] Signing Cert with AUTHO
29,161,657 UART: RITY.KEYID = 7
31,448,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,035 UART: [art] PUB.X = C87BC7AB241FFA2FA165B51D711434A238614A5E5371FC806D6608A6CFB82D3BD7AACDCF49C07738C1E7D2E4D41B6DEE
31,457,255 UART: [art] PUB.Y = 06702AC2BA35093A6819348E3CF27B6220A87156E91F0B837326B060D7C314D79557E8EBAB665B3960610EB05C1163FE
31,464,520 UART: [art] SIG.R = 1C706750E902BBFB1C90D0898FB470C75BC4E4C868898B869B75FF513D996E5D82E1462D1748B7B7D1A9BAA481D3913D
31,471,875 UART: [art] SIG.S = B09067024FFC57F30375747A3B8A85D1369DAEFADC82B7F4FCD77D65294C3E45A1B934BB287B074D0058C977145A28A9
32,777,123 UART: Caliptra RT
32,777,822 UART: [state] CFI Enabled
32,958,284 UART: [rt] RT listening for mailbox commands...
32,962,262 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,007,414 UART: [rt]cmd =0x4c4d5356, len=1672
34,259,049 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,796,120 ready_for_fw is high
3,796,738 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,860,938 >>> mbox cmd response: success
23,553,993 UART:
23,554,381 UART: Running Caliptra FMC ...
23,555,485 UART:
23,555,634 UART: [state] CFI Enabled
23,625,653 UART: [fht] FMC Alias Private Key: 7
25,963,648 UART: [art] Extend RT PCRs Done
25,964,868 UART: [art] Lock RT PCRs Done
25,966,142 UART: [art] Populate DV Done
25,971,559 UART: [fht] FMC Alias Private Key: 7
25,973,184 UART: [art] Derive CDI
25,974,005 UART: [art] Store in in slot 0x4
26,034,588 UART: [art] Derive Key Pair
26,035,590 UART: [art] Store priv key in slot 0x5
29,328,342 UART: [art] Derive Key Pair - Done
29,341,468 UART: [art] Signing Cert with AUTHO
29,342,803 UART: RITY.KEYID = 7
31,630,862 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,395 UART: [art] PUB.X = BDF76D2E58A7692F59C9E19A75417F3177CAB17C48EBE3FA6339756E583C4A90DE9C4005EFA746EEBD7A5C36362F3FC2
31,639,647 UART: [art] PUB.Y = 88314361DE95173E66DF6738F5B37157F235848B270F339EEBD454DA1882AE18E693ACEC65AEE9C5577FDDE7D380F48F
31,646,861 UART: [art] SIG.R = 6A4A03DCFDBE3794EDBBC59CBF82FA354E2CFCF85B4C5B4418960F68BCC7D017CAC61F532284677484E534079EE5F099
31,654,308 UART: [art] SIG.S = 8C7F6371AC8222156449C0D9BA8A58D77E975C8925346E53C064D14257D50C4C2D7E3E547C921F1D0C898635AC66F8E4
32,959,128 UART: Caliptra RT
32,959,843 UART: [state] CFI Enabled
33,122,145 UART: [rt] RT listening for mailbox commands...
33,126,136 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,170,974 UART: [rt]cmd =0x4c4d5356, len=1672
34,422,254 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,373 UART:
192,749 UART: Running Caliptra ROM ...
193,943 UART:
603,791 UART: [state] CFI Enabled
619,749 UART: [state] LifecycleState = Unprovisioned
621,733 UART: [state] DebugLocked = No
623,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,910 UART: [kat] SHA2-256
798,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,150 UART: [kat] ++
809,749 UART: [kat] sha1
820,632 UART: [kat] SHA2-256
823,353 UART: [kat] SHA2-384
829,220 UART: [kat] SHA2-512-ACC
831,589 UART: [kat] ECC-384
3,116,811 UART: [kat] HMAC-384Kdf
3,128,914 UART: [kat] LMS
4,319,056 UART: [kat] --
4,323,456 UART: [cold-reset] ++
4,325,037 UART: [fht] Storing FHT @ 0x50003400
4,336,380 UART: [idev] ++
4,336,943 UART: [idev] CDI.KEYID = 6
4,337,898 UART: [idev] SUBJECT.KEYID = 7
4,339,141 UART: [idev] UDS.KEYID = 0
4,340,149 ready_for_fw is high
4,340,351 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,403 UART: [idev] Erasing UDS.KEYID = 0
7,627,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,796 UART: [idev] --
7,652,205 UART: [ldev] ++
7,652,836 UART: [ldev] CDI.KEYID = 6
7,653,752 UART: [ldev] SUBJECT.KEYID = 5
7,654,963 UART: [ldev] AUTHORITY.KEYID = 7
7,656,248 UART: [ldev] FE.KEYID = 1
7,667,648 UART: [ldev] Erasing FE.KEYID = 1
10,961,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,770 UART: [ldev] --
13,318,220 UART: [fwproc] Waiting for Commands...
13,320,067 UART: [fwproc] Received command 0x46574c44
13,322,257 UART: [fwproc] Received Image of size 113844 bytes
17,370,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,071 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,943 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,833,972 >>> mbox cmd response: success
17,837,732 UART: [afmc] ++
17,838,326 UART: [afmc] CDI.KEYID = 6
17,839,214 UART: [afmc] SUBJECT.KEYID = 7
17,840,482 UART: [afmc] AUTHORITY.KEYID = 5
21,153,642 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,810 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,115 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,474 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,309 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,803 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,816 UART: [afmc] --
23,520,140 UART: [cold-reset] --
23,522,756 UART: [state] Locking Datavault
23,528,087 UART: [state] Locking PCR0, PCR1 and PCR31
23,529,794 UART: [state] Locking ICCM
23,531,672 UART: [exit] Launching FMC @ 0x40000130
23,540,067 UART:
23,540,304 UART: Running Caliptra FMC ...
23,541,406 UART:
23,541,565 UART: [state] CFI Enabled
23,549,828 UART: [fht] FMC Alias Private Key: 7
25,880,301 UART: [art] Extend RT PCRs Done
25,881,521 UART: [art] Lock RT PCRs Done
25,883,445 UART: [art] Populate DV Done
25,888,968 UART: [fht] FMC Alias Private Key: 7
25,890,594 UART: [art] Derive CDI
25,891,335 UART: [art] Store in in slot 0x4
25,933,843 UART: [art] Derive Key Pair
25,934,843 UART: [art] Store priv key in slot 0x5
29,176,032 UART: [art] Derive Key Pair - Done
29,188,597 UART: [art] Signing Cert with AUTHO
29,189,891 UART: RITY.KEYID = 7
31,469,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,781 UART: [art] PUB.X = B27BAD45A1D2857460ACB1AF04424206ED3998DA85508B8F5BB8E4F853FB18DFC84F7B7A3DD3196DAF8309E8BE0EC719
31,478,044 UART: [art] PUB.Y = 56F8324881C1F18F512BF237B8EE48471ED039E6C2127150105A72D97F8686AF1D32BA2AA5238DFDBC149AADB84D9DAD
31,485,285 UART: [art] SIG.R = F3F345C6114D8BE0D170D02B384F0912FB7B5C0577C5E605EF60D6E37742921C7E3334D76199A17DCF1B0BB622EFCAB8
31,492,661 UART: [art] SIG.S = CB52772B94EF03F383FB6BEC82F9DD8409202F3585A8A32C7D848A013819E0D49C522802098D7A890227DC3C2AA48EB9
32,797,965 UART: Caliptra RT
32,798,667 UART: [state] CFI Enabled
32,916,591 UART: [rt] RT listening for mailbox commands...
32,920,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,965,479 UART: [rt]cmd =0x4c4d5356, len=1672
34,216,974 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,127,745 ready_for_fw is high
4,128,362 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,069,364 >>> mbox cmd response: success
23,709,171 UART:
23,709,584 UART: Running Caliptra FMC ...
23,710,726 UART:
23,710,890 UART: [state] CFI Enabled
23,718,460 UART: [fht] FMC Alias Private Key: 7
26,049,964 UART: [art] Extend RT PCRs Done
26,051,195 UART: [art] Lock RT PCRs Done
26,053,092 UART: [art] Populate DV Done
26,058,516 UART: [fht] FMC Alias Private Key: 7
26,060,012 UART: [art] Derive CDI
26,060,779 UART: [art] Store in in slot 0x4
26,103,610 UART: [art] Derive Key Pair
26,104,615 UART: [art] Store priv key in slot 0x5
29,346,729 UART: [art] Derive Key Pair - Done
29,359,728 UART: [art] Signing Cert with AUTHO
29,361,040 UART: RITY.KEYID = 7
31,639,804 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,310 UART: [art] PUB.X = EAC31202FC7C726D4F386881011F7F2EB310A0DE30550F70BC2CB324E35070F619510B6710D4BA308C49A7D40273E620
31,648,515 UART: [art] PUB.Y = 1C59A756EF3B459E78D8C4C7D06A3E66BCEF41110B1DD3DEC4DE9E9A1538458333850D5E3A21F7EB787F688E47A85FEA
31,655,761 UART: [art] SIG.R = 025D357B7AC89C75C7F1A161DC69B6F6F07DDDCB52DD837E451517D005242147F132BF8ECEEE3ABCD8C6020E0242A6B6
31,663,172 UART: [art] SIG.S = 6F23F64F39C6B248497CD15F86DD9580AB40D86F647F149F968C854D69FB2380BD8282FBF665C1B5247BC7D8E9A8543C
32,969,175 UART: Caliptra RT
32,969,886 UART: [state] CFI Enabled
33,088,294 UART: [rt] RT listening for mailbox commands...
33,092,308 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,137,520 UART: [rt]cmd =0x4c4d5356, len=1672
34,388,915 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,012 UART:
192,393 UART: Running Caliptra ROM ...
193,492 UART:
193,638 UART: [state] CFI Enabled
266,730 UART: [state] LifecycleState = Unprovisioned
268,574 UART: [state] DebugLocked = No
270,949 UART: [state] WD Timer not started. Device not locked for debugging
275,011 UART: [kat] SHA2-256
454,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,723 UART: [kat] ++
466,253 UART: [kat] sha1
477,102 UART: [kat] SHA2-256
480,105 UART: [kat] SHA2-384
484,682 UART: [kat] SHA2-512-ACC
487,619 UART: [kat] ECC-384
2,948,009 UART: [kat] HMAC-384Kdf
2,971,495 UART: [kat] LMS
3,500,971 UART: [kat] --
3,507,027 UART: [cold-reset] ++
3,509,531 UART: [fht] FHT @ 0x50003400
3,519,939 UART: [idev] ++
3,520,500 UART: [idev] CDI.KEYID = 6
3,521,452 UART: [idev] SUBJECT.KEYID = 7
3,522,644 UART: [idev] UDS.KEYID = 0
3,523,553 ready_for_fw is high
3,523,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,418 UART: [idev] Erasing UDS.KEYID = 0
6,025,865 UART: [idev] Sha1 KeyId Algorithm
6,048,889 UART: [idev] --
6,054,235 UART: [ldev] ++
6,054,814 UART: [ldev] CDI.KEYID = 6
6,055,754 UART: [ldev] SUBJECT.KEYID = 5
6,056,914 UART: [ldev] AUTHORITY.KEYID = 7
6,058,155 UART: [ldev] FE.KEYID = 1
6,098,737 UART: [ldev] Erasing FE.KEYID = 1
8,604,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,455 UART: [ldev] --
10,413,534 UART: [fwproc] Wait for Commands...
10,416,263 UART: [fwproc] Recv command 0x46574c44
10,418,311 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,624 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,280,309 >>> mbox cmd response: success
14,284,182 UART: [afmc] ++
14,284,781 UART: [afmc] CDI.KEYID = 6
14,285,666 UART: [afmc] SUBJECT.KEYID = 7
14,286,770 UART: [afmc] AUTHORITY.KEYID = 5
16,823,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,400 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,263 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,329 UART: [afmc] --
18,626,038 UART: [cold-reset] --
18,630,334 UART: [state] Locking Datavault
18,635,207 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,855 UART: [state] Locking ICCM
18,638,470 UART: [exit] Launching FMC @ 0x40000130
18,646,870 UART:
18,647,107 UART: Running Caliptra FMC ...
18,648,206 UART:
18,648,365 UART: [state] CFI Enabled
18,708,402 UART: [fht] FMC Alias Private Key: 7
20,472,287 UART: [art] Extend RT PCRs Done
20,473,513 UART: [art] Lock RT PCRs Done
20,475,246 UART: [art] Populate DV Done
20,480,819 UART: [fht] FMC Alias Private Key: 7
20,482,517 UART: [art] Derive CDI
20,483,253 UART: [art] Store in in slot 0x4
20,540,559 UART: [art] Derive Key Pair
20,541,596 UART: [art] Store priv key in slot 0x5
23,004,524 UART: [art] Derive Key Pair - Done
23,017,528 UART: [art] Signing Cert with AUTHO
23,018,834 UART: RITY.KEYID = 7
24,744,939 UART: [art] Erasing AUTHORITY.KEYID = 7
24,746,442 UART: [art] PUB.X = 38368435CFFB10E943A2B9FAD0CA05F34B2C3D2274F6F2C73D84CD42F165DAFC24E2A34B12B103D30A9A4C7EE403A0F7
24,753,750 UART: [art] PUB.Y = C1A114219B202F2E12A8818E1A2C4ADBDD7F8AAB921362F79BABE65D591C4CBE4BDDEF3C19F3EA45D0DC73095AB15AF1
24,761,043 UART: [art] SIG.R = 4CA68A19BE4B9726BE1B46FB9D571D13151760A1490ABF66032EA90DE694141FF4BCC2E2FB8F1E121968C5AD7ECE68FA
24,768,457 UART: [art] SIG.S = 5360158FFE64A061B7974F457A527F1B8698FDA7CA93761E2D01ECAAF977E858858AA3315D5C7806102884FD295B133E
25,747,480 UART: Caliptra RT
25,748,191 UART: [state] CFI Enabled
25,912,145 UART: [rt] RT listening for mailbox commands...
25,916,093 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,961,089 UART: [rt]cmd =0x4c4d5356, len=1672
26,382,086 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,356,712 ready_for_fw is high
3,357,518 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,044,773 >>> mbox cmd response: success
18,321,931 UART:
18,322,324 UART: Running Caliptra FMC ...
18,323,524 UART:
18,323,694 UART: [state] CFI Enabled
18,390,716 UART: [fht] FMC Alias Private Key: 7
20,154,784 UART: [art] Extend RT PCRs Done
20,156,014 UART: [art] Lock RT PCRs Done
20,157,710 UART: [art] Populate DV Done
20,163,120 UART: [fht] FMC Alias Private Key: 7
20,164,604 UART: [art] Derive CDI
20,165,371 UART: [art] Store in in slot 0x4
20,223,715 UART: [art] Derive Key Pair
20,224,715 UART: [art] Store priv key in slot 0x5
22,687,804 UART: [art] Derive Key Pair - Done
22,700,596 UART: [art] Signing Cert with AUTHO
22,701,899 UART: RITY.KEYID = 7
24,413,675 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,161 UART: [art] PUB.X = 568D2F548671AFFE8E710B97E17E120CA0F61C6BA527B9B98C48A96DA2053DFEE654342422BE4325FC9FDAB1CF42E44D
24,422,444 UART: [art] PUB.Y = EAC90A1C651F4967514AA936A1A4BE0DDD01D2B78D4DD270706984AB80E20D1A7EFF2D62C05A51EE75A2A222933B1931
24,429,694 UART: [art] SIG.R = F628257D52829A79848F4317045CAA816D7E45AA3B86E40CBB7481BDA2E3561A2CA9AF6885C2E444C060B620943AFE3B
24,437,127 UART: [art] SIG.S = B9881DB45577EAD01119C0EF322F9EA1C93A5E80176682739061D552F2DCFAB4BDD81F9B24AA4E601C09A2FC6E84A1FE
25,416,382 UART: Caliptra RT
25,417,106 UART: [state] CFI Enabled
25,581,527 UART: [rt] RT listening for mailbox commands...
25,585,503 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,630,547 UART: [rt]cmd =0x4c4d5356, len=1672
26,051,486 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,861 writing to cptra_bootfsm_go
193,023 UART:
193,406 UART: Running Caliptra ROM ...
194,526 UART:
604,031 UART: [state] CFI Enabled
617,770 UART: [state] LifecycleState = Unprovisioned
619,640 UART: [state] DebugLocked = No
622,082 UART: [state] WD Timer not started. Device not locked for debugging
625,614 UART: [kat] SHA2-256
804,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,331 UART: [kat] ++
816,779 UART: [kat] sha1
827,007 UART: [kat] SHA2-256
830,006 UART: [kat] SHA2-384
836,940 UART: [kat] SHA2-512-ACC
839,875 UART: [kat] ECC-384
3,280,222 UART: [kat] HMAC-384Kdf
3,292,384 UART: [kat] LMS
3,821,894 UART: [kat] --
3,826,143 UART: [cold-reset] ++
3,828,361 UART: [fht] FHT @ 0x50003400
3,838,769 UART: [idev] ++
3,839,335 UART: [idev] CDI.KEYID = 6
3,840,217 UART: [idev] SUBJECT.KEYID = 7
3,841,461 UART: [idev] UDS.KEYID = 0
3,842,360 ready_for_fw is high
3,842,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,963 UART: [idev] Erasing UDS.KEYID = 0
6,311,641 UART: [idev] Sha1 KeyId Algorithm
6,334,860 UART: [idev] --
6,337,443 UART: [ldev] ++
6,338,007 UART: [ldev] CDI.KEYID = 6
6,338,920 UART: [ldev] SUBJECT.KEYID = 5
6,340,133 UART: [ldev] AUTHORITY.KEYID = 7
6,341,366 UART: [ldev] FE.KEYID = 1
6,352,734 UART: [ldev] Erasing FE.KEYID = 1
8,825,330 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,686 UART: [ldev] --
10,614,410 UART: [fwproc] Wait for Commands...
10,617,424 UART: [fwproc] Recv command 0x46574c44
10,619,516 UART: [fwproc] Recv'd Img size: 114168 bytes
14,017,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,477,830 >>> mbox cmd response: success
14,482,989 UART: [afmc] ++
14,483,585 UART: [afmc] CDI.KEYID = 6
14,484,516 UART: [afmc] SUBJECT.KEYID = 7
14,485,681 UART: [afmc] AUTHORITY.KEYID = 5
16,985,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,288 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,149 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,916 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,238 UART: [afmc] --
18,781,779 UART: [cold-reset] --
18,785,095 UART: [state] Locking Datavault
18,791,799 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,451 UART: [state] Locking ICCM
18,795,172 UART: [exit] Launching FMC @ 0x40000130
18,803,568 UART:
18,803,806 UART: Running Caliptra FMC ...
18,804,929 UART:
18,805,097 UART: [state] CFI Enabled
18,813,310 UART: [fht] FMC Alias Private Key: 7
20,570,226 UART: [art] Extend RT PCRs Done
20,571,454 UART: [art] Lock RT PCRs Done
20,573,243 UART: [art] Populate DV Done
20,578,929 UART: [fht] FMC Alias Private Key: 7
20,580,575 UART: [art] Derive CDI
20,581,392 UART: [art] Store in in slot 0x4
20,623,800 UART: [art] Derive Key Pair
20,624,841 UART: [art] Store priv key in slot 0x5
23,051,972 UART: [art] Derive Key Pair - Done
23,064,595 UART: [art] Signing Cert with AUTHO
23,065,898 UART: RITY.KEYID = 7
24,771,562 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,067 UART: [art] PUB.X = B457E2B7E1339EA42435D30BF283F8D710D200BEF608658F0022F62B546C3513AA7B9F6E0136CABC526BCF1B2214C003
24,780,294 UART: [art] PUB.Y = 7E0F68A178ACD2BF468D8B0984396938B8F833E6A75AC7DCE5A586FB639E70B3E6D2EACB9446A0A774B200C603400A67
24,787,482 UART: [art] SIG.R = E9034CE022B75F07060B3AF36A5647D7DC0254D6DF75521817FA967A22CC44DAFBF35E502C801F945D13538485758DD0
24,794,880 UART: [art] SIG.S = 5DB33F1088F9E4708FD183BE3F316DAEC445D6224A1F1F11CBA0C038BC3307B00503B77FD0BBED33D190DB0774DC2C05
25,773,758 UART: Caliptra RT
25,774,454 UART: [state] CFI Enabled
25,892,234 UART: [rt] RT listening for mailbox commands...
25,896,153 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,940,952 UART: [rt]cmd =0x4c4d5356, len=1672
26,362,110 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,958 writing to cptra_bootfsm_go
3,694,456 ready_for_fw is high
3,694,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,264,357 >>> mbox cmd response: success
18,516,930 UART:
18,517,350 UART: Running Caliptra FMC ...
18,518,547 UART:
18,518,717 UART: [state] CFI Enabled
18,526,932 UART: [fht] FMC Alias Private Key: 7
20,283,909 UART: [art] Extend RT PCRs Done
20,285,132 UART: [art] Lock RT PCRs Done
20,287,327 UART: [art] Populate DV Done
20,292,634 UART: [fht] FMC Alias Private Key: 7
20,294,118 UART: [art] Derive CDI
20,294,855 UART: [art] Store in in slot 0x4
20,337,418 UART: [art] Derive Key Pair
20,338,459 UART: [art] Store priv key in slot 0x5
22,765,098 UART: [art] Derive Key Pair - Done
22,778,264 UART: [art] Signing Cert with AUTHO
22,779,573 UART: RITY.KEYID = 7
24,484,949 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,457 UART: [art] PUB.X = B4C2202D6956D8A0F96682829D3BA64DB2216B009677B23AC7452BA44D21F2A272BC6259AA47E3F29665D5EB00FF5D1E
24,493,711 UART: [art] PUB.Y = BABC6D404C7C08EABDE2B03219DD3DAE99A0AB58024EB490476A3A38ECD3C6F86E5F3923FBE5E8EEB3D061D6AA07897E
24,500,975 UART: [art] SIG.R = 49DA02D3AEA879A2D340EA8CA42B7C828C7263617C73EB5AD43765F19303D02FFA29E7D4B480EEBBA11991B2558A67BB
24,508,369 UART: [art] SIG.S = 0672BB87B90A54F892ABD100FCAA0E247248F125E7C7841B461B8D740FB2A42C0017BD63510F71F522A1270D58B51CAA
25,486,691 UART: Caliptra RT
25,487,411 UART: [state] CFI Enabled
25,604,344 UART: [rt] RT listening for mailbox commands...
25,608,367 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,653,460 UART: [rt]cmd =0x4c4d5356, len=1672
26,074,390 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,217 UART:
192,581 UART: Running Caliptra ROM ...
193,781 UART:
193,938 UART: [state] CFI Enabled
259,708 UART: [state] LifecycleState = Unprovisioned
262,127 UART: [state] DebugLocked = No
264,873 UART: [state] WD Timer not started. Device not locked for debugging
268,644 UART: [kat] SHA2-256
458,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,303 UART: [kat] ++
469,793 UART: [kat] sha1
482,013 UART: [kat] SHA2-256
485,031 UART: [kat] SHA2-384
490,538 UART: [kat] SHA2-512-ACC
493,084 UART: [kat] ECC-384
2,948,214 UART: [kat] HMAC-384Kdf
2,971,652 UART: [kat] LMS
3,503,456 UART: [kat] --
3,509,369 UART: [cold-reset] ++
3,511,378 UART: [fht] FHT @ 0x50003400
3,524,487 UART: [idev] ++
3,525,199 UART: [idev] CDI.KEYID = 6
3,526,110 UART: [idev] SUBJECT.KEYID = 7
3,527,357 UART: [idev] UDS.KEYID = 0
3,528,287 ready_for_fw is high
3,528,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,130 UART: [idev] Erasing UDS.KEYID = 0
6,028,934 UART: [idev] Sha1 KeyId Algorithm
6,052,273 UART: [idev] --
6,056,380 UART: [ldev] ++
6,057,082 UART: [ldev] CDI.KEYID = 6
6,057,973 UART: [ldev] SUBJECT.KEYID = 5
6,059,132 UART: [ldev] AUTHORITY.KEYID = 7
6,060,523 UART: [ldev] FE.KEYID = 1
6,099,108 UART: [ldev] Erasing FE.KEYID = 1
8,604,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,567 UART: [ldev] --
10,414,841 UART: [fwproc] Wait for Commands...
10,417,694 UART: [fwproc] Recv command 0x46574c44
10,419,950 UART: [fwproc] Recv'd Img size: 114168 bytes
13,864,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,398 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,602,817 >>> mbox cmd response: success
14,606,939 UART: [afmc] ++
14,607,649 UART: [afmc] CDI.KEYID = 6
14,608,847 UART: [afmc] SUBJECT.KEYID = 7
14,610,288 UART: [afmc] AUTHORITY.KEYID = 5
17,149,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,820 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,041 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,152 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,180 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,196 UART: [afmc] --
18,945,206 UART: [cold-reset] --
18,949,742 UART: [state] Locking Datavault
18,954,795 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,975 UART: [state] Locking ICCM
18,959,569 UART: [exit] Launching FMC @ 0x40000130
18,968,222 UART:
18,968,467 UART: Running Caliptra FMC ...
18,969,574 UART:
18,969,733 UART: [state] CFI Enabled
19,029,287 UART: [fht] FMC Alias Private Key: 7
20,793,714 UART: [art] Extend RT PCRs Done
20,794,945 UART: [art] Lock RT PCRs Done
20,796,519 UART: [art] Populate DV Done
20,802,094 UART: [fht] FMC Alias Private Key: 7
20,803,688 UART: [art] Derive CDI
20,804,426 UART: [art] Store in in slot 0x4
20,861,932 UART: [art] Derive Key Pair
20,862,966 UART: [art] Store priv key in slot 0x5
23,325,778 UART: [art] Derive Key Pair - Done
23,339,009 UART: [art] Signing Cert with AUTHO
23,340,508 UART: RITY.KEYID = 7
25,051,802 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,315 UART: [art] PUB.X = 5855BA6C3BBB6D4145D9C5AB63CD0C4E772685CF882FAB14E3FD32613DEA98AC29CC240712CFB737C81059A8B8B3F677
25,060,585 UART: [art] PUB.Y = 606B9012642FA2FC12BB88FA2A758379466D8F16D35A97CB18B700DA1CDC5F12A0578A35310DD37252E931AD1DB5F168
25,067,795 UART: [art] SIG.R = 701630E5F8715B9EAC208BD6A975708071E5B5C65692CC69DE48AD35E9BBA22BB790D521665E535487C617E88D13E877
25,075,168 UART: [art] SIG.S = 38FD33378CB3775ACA7EC188CDB3D8D35B3D5FDA12B70E0C6120F67A2C107920D8674703263E9D151C2460DDE56CB837
26,054,232 UART: Caliptra RT
26,054,948 UART: [state] CFI Enabled
26,219,378 UART: [rt] RT listening for mailbox commands...
26,223,496 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,268,634 UART: [rt]cmd =0x4c4d5356, len=1672
26,689,570 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,437,823 ready_for_fw is high
3,438,220 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,728,489 >>> mbox cmd response: success
19,045,501 UART:
19,045,921 UART: Running Caliptra FMC ...
19,047,069 UART:
19,047,246 UART: [state] CFI Enabled
19,112,980 UART: [fht] FMC Alias Private Key: 7
20,877,069 UART: [art] Extend RT PCRs Done
20,878,294 UART: [art] Lock RT PCRs Done
20,879,866 UART: [art] Populate DV Done
20,885,495 UART: [fht] FMC Alias Private Key: 7
20,887,102 UART: [art] Derive CDI
20,887,922 UART: [art] Store in in slot 0x4
20,946,154 UART: [art] Derive Key Pair
20,947,155 UART: [art] Store priv key in slot 0x5
23,410,051 UART: [art] Derive Key Pair - Done
23,422,860 UART: [art] Signing Cert with AUTHO
23,424,173 UART: RITY.KEYID = 7
25,135,718 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,224 UART: [art] PUB.X = D471BFEC01577A2BECABBE358C4B73DF3241CC52E425B32ABC0F735FCD0EC41B0BA4FA4EA52510752E93EC369A999CF1
25,144,523 UART: [art] PUB.Y = D8FF54A2A4E2467DDFAB1833073B6DB680BBB3B729CB4F144B47F34F3FA4138A42787C7172ACB54941A2FD5CB7FE72D5
25,151,796 UART: [art] SIG.R = EF468FD91BE8C71A75B2A37E9638AB2ED98DDB30820D2F448F5702A9833E7D6BA0D52D0EF3411DA5307BA0D3C9988E3F
25,159,222 UART: [art] SIG.S = A81B913972D350ECFD30BEF02442C470E38A146AD1132AEAED939895D767BA6A2B610747A0735DEE7347B9C40BF34FD8
26,138,314 UART: Caliptra RT
26,139,025 UART: [state] CFI Enabled
26,302,959 UART: [rt] RT listening for mailbox commands...
26,306,976 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,352,143 UART: [rt]cmd =0x4c4d5356, len=1672
26,773,369 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
192,896 UART:
193,278 UART: Running Caliptra ROM ...
194,465 UART:
604,121 UART: [state] CFI Enabled
617,818 UART: [state] LifecycleState = Unprovisioned
620,227 UART: [state] DebugLocked = No
621,469 UART: [state] WD Timer not started. Device not locked for debugging
626,496 UART: [kat] SHA2-256
816,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,186 UART: [kat] ++
827,630 UART: [kat] sha1
838,948 UART: [kat] SHA2-256
842,037 UART: [kat] SHA2-384
849,377 UART: [kat] SHA2-512-ACC
851,991 UART: [kat] ECC-384
3,293,659 UART: [kat] HMAC-384Kdf
3,307,894 UART: [kat] LMS
3,839,700 UART: [kat] --
3,843,269 UART: [cold-reset] ++
3,844,777 UART: [fht] FHT @ 0x50003400
3,857,251 UART: [idev] ++
3,857,955 UART: [idev] CDI.KEYID = 6
3,858,950 UART: [idev] SUBJECT.KEYID = 7
3,860,127 UART: [idev] UDS.KEYID = 0
3,861,056 ready_for_fw is high
3,861,272 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,703 UART: [idev] Erasing UDS.KEYID = 0
6,336,457 UART: [idev] Sha1 KeyId Algorithm
6,359,810 UART: [idev] --
6,364,292 UART: [ldev] ++
6,364,974 UART: [ldev] CDI.KEYID = 6
6,365,889 UART: [ldev] SUBJECT.KEYID = 5
6,367,046 UART: [ldev] AUTHORITY.KEYID = 7
6,368,281 UART: [ldev] FE.KEYID = 1
6,379,534 UART: [ldev] Erasing FE.KEYID = 1
8,853,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,746 UART: [ldev] --
10,642,561 UART: [fwproc] Wait for Commands...
10,644,272 UART: [fwproc] Recv command 0x46574c44
10,646,545 UART: [fwproc] Recv'd Img size: 114168 bytes
14,094,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,042 >>> mbox cmd response: success
14,836,236 UART: [afmc] ++
14,836,949 UART: [afmc] CDI.KEYID = 6
14,838,139 UART: [afmc] SUBJECT.KEYID = 7
14,839,495 UART: [afmc] AUTHORITY.KEYID = 5
17,343,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,225 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,157 UART: [afmc] --
19,140,017 UART: [cold-reset] --
19,143,730 UART: [state] Locking Datavault
19,149,791 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,934 UART: [state] Locking ICCM
19,154,740 UART: [exit] Launching FMC @ 0x40000130
19,163,360 UART:
19,163,594 UART: Running Caliptra FMC ...
19,164,625 UART:
19,164,774 UART: [state] CFI Enabled
19,172,880 UART: [fht] FMC Alias Private Key: 7
20,929,594 UART: [art] Extend RT PCRs Done
20,930,822 UART: [art] Lock RT PCRs Done
20,932,114 UART: [art] Populate DV Done
20,937,615 UART: [fht] FMC Alias Private Key: 7
20,939,321 UART: [art] Derive CDI
20,940,058 UART: [art] Store in in slot 0x4
20,982,411 UART: [art] Derive Key Pair
20,983,414 UART: [art] Store priv key in slot 0x5
23,410,061 UART: [art] Derive Key Pair - Done
23,423,596 UART: [art] Signing Cert with AUTHO
23,424,925 UART: RITY.KEYID = 7
25,130,364 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,857 UART: [art] PUB.X = 10E81AF6AE01E760BB48B5CFAF129FB9E5F647548E44768474FC05F9D90E3602249F73CA5948819B611AAF1F0B184D7A
25,139,153 UART: [art] PUB.Y = 065DFDCCAECFFCEAC9C7057FBD78248DAB38583AC493E97FF1C75F12A775DB7B2DAB7B27AE5E73A16F560173B0BB7C81
25,146,442 UART: [art] SIG.R = 6BAAEC1AAB5D4AE68FAB4D5A07FA104F22A14A4A71B6234D210A3015E5001918BB86594B2BAA9C6054D82EE584EFFE77
25,153,779 UART: [art] SIG.S = B0E1A7CEB4E39BB69A9286E38C55C93A874FE9A67D64FA468C624A27CE29CDA2BC0F32425E0DD850A94E92BC4C94C60E
26,132,681 UART: Caliptra RT
26,133,388 UART: [state] CFI Enabled
26,251,422 UART: [rt] RT listening for mailbox commands...
26,255,381 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,300,483 UART: [rt]cmd =0x4c4d5356, len=1672
26,721,807 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,697 writing to cptra_bootfsm_go
3,754,573 ready_for_fw is high
3,755,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,935,221 >>> mbox cmd response: success
19,189,457 UART:
19,189,859 UART: Running Caliptra FMC ...
19,190,963 UART:
19,191,137 UART: [state] CFI Enabled
19,198,937 UART: [fht] FMC Alias Private Key: 7
20,956,513 UART: [art] Extend RT PCRs Done
20,957,748 UART: [art] Lock RT PCRs Done
20,959,617 UART: [art] Populate DV Done
20,964,820 UART: [fht] FMC Alias Private Key: 7
20,966,466 UART: [art] Derive CDI
20,967,204 UART: [art] Store in in slot 0x4
21,010,186 UART: [art] Derive Key Pair
21,011,231 UART: [art] Store priv key in slot 0x5
23,438,236 UART: [art] Derive Key Pair - Done
23,451,612 UART: [art] Signing Cert with AUTHO
23,452,913 UART: RITY.KEYID = 7
25,158,424 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,921 UART: [art] PUB.X = 419748B2260279933CA365083CDE46A15EC6F0F774D73EC02769DD743CF71C99818B8C295ADB0A84C377CD2538C82051
25,167,198 UART: [art] PUB.Y = 00D5F4325415271E504BAB23AD0F1E69868C5E62DA38DF7002E29E9D0401D3BD502A5A328852F2E8ABFFE6652BB0CF4D
25,174,460 UART: [art] SIG.R = B163D75B64CCBDE5472BCAFC7BCEC394FA2CFCA035FC7DE6EE1617981A12C0B386EF3387D030652D49C68FA7C3D07819
25,181,854 UART: [art] SIG.S = 1EE7B8162F47B5996F929629469C13B4652666DAF94F6EBD8EF4716EC97694B95923CB369572CB9A5EE4935A084058DD
26,161,043 UART: Caliptra RT
26,161,761 UART: [state] CFI Enabled
26,280,435 UART: [rt] RT listening for mailbox commands...
26,284,358 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,329,227 UART: [rt]cmd =0x4c4d5356, len=1672
26,750,343 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,981 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,661 UART: [kat] SHA2-256
881,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,707 UART: [kat] ++
885,859 UART: [kat] sha1
890,035 UART: [kat] SHA2-256
891,973 UART: [kat] SHA2-384
894,786 UART: [kat] SHA2-512-ACC
896,687 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,476,295 UART: [cold-reset] ++
1,476,667 UART: [fht] Storing FHT @ 0x50003400
1,479,258 UART: [idev] ++
1,479,426 UART: [idev] CDI.KEYID = 6
1,479,786 UART: [idev] SUBJECT.KEYID = 7
1,480,210 UART: [idev] UDS.KEYID = 0
1,480,555 ready_for_fw is high
1,480,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,114 UART: [idev] Erasing UDS.KEYID = 0
1,504,602 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,470 UART: [idev] --
1,514,375 UART: [ldev] ++
1,514,543 UART: [ldev] CDI.KEYID = 6
1,514,906 UART: [ldev] SUBJECT.KEYID = 5
1,515,332 UART: [ldev] AUTHORITY.KEYID = 7
1,515,795 UART: [ldev] FE.KEYID = 1
1,520,775 UART: [ldev] Erasing FE.KEYID = 1
1,546,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,722 UART: [ldev] --
1,585,009 UART: [fwproc] Waiting for Commands...
1,585,682 UART: [fwproc] Received command 0x46574c44
1,586,473 UART: [fwproc] Received Image of size 114168 bytes
2,881,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,517 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,937,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,073,548 >>> mbox cmd response: success
3,074,736 UART: [afmc] ++
3,074,904 UART: [afmc] CDI.KEYID = 6
3,075,266 UART: [afmc] SUBJECT.KEYID = 7
3,075,691 UART: [afmc] AUTHORITY.KEYID = 5
3,110,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,126,654 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,127,434 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,047 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,144,737 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,152,660 UART: [afmc] --
3,153,746 UART: [cold-reset] --
3,154,522 UART: [state] Locking Datavault
3,155,901 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,505 UART: [state] Locking ICCM
3,157,133 UART: [exit] Launching FMC @ 0x40000130
3,162,462 UART:
3,162,478 UART: Running Caliptra FMC ...
3,162,886 UART:
3,162,940 UART: [state] CFI Enabled
3,173,257 UART: [fht] FMC Alias Private Key: 7
3,281,290 UART: [art] Extend RT PCRs Done
3,281,718 UART: [art] Lock RT PCRs Done
3,283,328 UART: [art] Populate DV Done
3,291,645 UART: [fht] FMC Alias Private Key: 7
3,292,573 UART: [art] Derive CDI
3,292,853 UART: [art] Store in in slot 0x4
3,378,686 UART: [art] Derive Key Pair
3,379,046 UART: [art] Store priv key in slot 0x5
3,392,580 UART: [art] Derive Key Pair - Done
3,407,590 UART: [art] Signing Cert with AUTHO
3,408,070 UART: RITY.KEYID = 7
3,423,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,169 UART: [art] PUB.X = 355E7D4D6EAFE97B59D79D0A72675F5A904A558E84864347FA3D8F43BBA3BAD051AEEAFEFF29108F6FC73DE3D95BCFBF
3,430,962 UART: [art] PUB.Y = D57962F1AC19B7132B0B847505B01AF4978A2865EBEF0D33CFFE49F31122B20184B46FAD104C71182921309FC82118B8
3,437,898 UART: [art] SIG.R = FB260CDC9621B16D9A16036580B567E1044C42AD516697B1B2BEFE64276DA3D82A7D16599F18FE4BAB49777ED3C1DAA7
3,444,669 UART: [art] SIG.S = 3843D04E350CA3B4016DC4424A59AC8A9D13E3D72DB7A70A99B9744B23F404B1942074E92D26BB644E51D4E6A4792965
3,468,692 UART: Caliptra RT
3,468,945 UART: [state] CFI Enabled
3,577,416 UART: [rt] RT listening for mailbox commands...
3,578,086 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,072 UART: [rt]cmd =0x4c4d5356, len=1672
4,149,068 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,325 ready_for_fw is high
1,362,325 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,878 >>> mbox cmd response: success
2,985,212 UART:
2,985,228 UART: Running Caliptra FMC ...
2,985,636 UART:
2,985,690 UART: [state] CFI Enabled
2,996,037 UART: [fht] FMC Alias Private Key: 7
3,103,858 UART: [art] Extend RT PCRs Done
3,104,286 UART: [art] Lock RT PCRs Done
3,106,300 UART: [art] Populate DV Done
3,114,799 UART: [fht] FMC Alias Private Key: 7
3,115,799 UART: [art] Derive CDI
3,116,079 UART: [art] Store in in slot 0x4
3,201,948 UART: [art] Derive Key Pair
3,202,308 UART: [art] Store priv key in slot 0x5
3,215,428 UART: [art] Derive Key Pair - Done
3,230,414 UART: [art] Signing Cert with AUTHO
3,230,894 UART: RITY.KEYID = 7
3,245,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,295 UART: [art] PUB.X = 3ECAC7AD1A3FEF473B1152E8BBBD874EB677D1FA4134A335C58FF5495D0118CFFFA84EA1D0748C81BAD6A3F0B589E0C6
3,253,086 UART: [art] PUB.Y = F72E84E8B0F324ECAA7FD4BEBADDA5B081366D3FDA43A861DDF122DAF7325EAE969D5B8FEEDA5AAB9129BE49CA4455B6
3,260,070 UART: [art] SIG.R = 2BEFA277DB1943BF37A4115088D1465D0FF6A4ADB37435E78FDAB85F4162F4633759F0B37D0B67792819A71F98DE10F9
3,266,838 UART: [art] SIG.S = 5CD356CD60BA1423B57E6C2DA197512FAFA2BFFB64205A475D83AA163060F5AE4C1FD2F006BB1FD42DCC00A16F5FF612
3,290,494 UART: Caliptra RT
3,290,747 UART: [state] CFI Enabled
3,399,359 UART: [rt] RT listening for mailbox commands...
3,400,029 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,827 UART: [rt]cmd =0x4c4d5356, len=1672
3,970,691 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,564 UART: [kat] SHA2-256
882,495 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,610 UART: [kat] ++
886,762 UART: [kat] sha1
890,918 UART: [kat] SHA2-256
892,856 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,723 UART: [kat] LMS
1,475,919 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,394 UART: [fht] Storing FHT @ 0x50003400
1,480,135 UART: [idev] ++
1,480,303 UART: [idev] CDI.KEYID = 6
1,480,663 UART: [idev] SUBJECT.KEYID = 7
1,481,087 UART: [idev] UDS.KEYID = 0
1,481,432 ready_for_fw is high
1,481,432 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,087 UART: [idev] Erasing UDS.KEYID = 0
1,505,625 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,273 UART: [idev] --
1,515,296 UART: [ldev] ++
1,515,464 UART: [ldev] CDI.KEYID = 6
1,515,827 UART: [ldev] SUBJECT.KEYID = 5
1,516,253 UART: [ldev] AUTHORITY.KEYID = 7
1,516,716 UART: [ldev] FE.KEYID = 1
1,521,824 UART: [ldev] Erasing FE.KEYID = 1
1,547,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,247 UART: [ldev] --
1,586,634 UART: [fwproc] Waiting for Commands...
1,587,343 UART: [fwproc] Received command 0x46574c44
1,588,134 UART: [fwproc] Received Image of size 114168 bytes
2,884,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,484 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,836 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,549 >>> mbox cmd response: success
3,076,581 UART: [afmc] ++
3,076,749 UART: [afmc] CDI.KEYID = 6
3,077,111 UART: [afmc] SUBJECT.KEYID = 7
3,077,536 UART: [afmc] AUTHORITY.KEYID = 5
3,112,935 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,133 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,913 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,641 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,526 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,216 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,095 UART: [afmc] --
3,156,063 UART: [cold-reset] --
3,156,769 UART: [state] Locking Datavault
3,157,966 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,570 UART: [state] Locking ICCM
3,159,238 UART: [exit] Launching FMC @ 0x40000130
3,164,567 UART:
3,164,583 UART: Running Caliptra FMC ...
3,164,991 UART:
3,165,134 UART: [state] CFI Enabled
3,175,775 UART: [fht] FMC Alias Private Key: 7
3,283,140 UART: [art] Extend RT PCRs Done
3,283,568 UART: [art] Lock RT PCRs Done
3,285,330 UART: [art] Populate DV Done
3,293,333 UART: [fht] FMC Alias Private Key: 7
3,294,457 UART: [art] Derive CDI
3,294,737 UART: [art] Store in in slot 0x4
3,379,966 UART: [art] Derive Key Pair
3,380,326 UART: [art] Store priv key in slot 0x5
3,393,476 UART: [art] Derive Key Pair - Done
3,408,304 UART: [art] Signing Cert with AUTHO
3,408,784 UART: RITY.KEYID = 7
3,423,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,711 UART: [art] PUB.X = 6732CF072EA496B1D2377723856F726806ECF4F9B973544F1AC6FD6E2105F9899CC7EDE03869D7C1FF118AE6075833F8
3,431,469 UART: [art] PUB.Y = 836728AD40533FB5D851D55292B477A39358EF81E2C23C5F8BE0E5BC319DF15A6A0FE94BEC2CE5082E1670B74F010CBB
3,438,417 UART: [art] SIG.R = 1ED01AA437DA3B34E09D5A1612D0114DE5314CD47A5C20FDE84CA7ABC8F003CA5AFB06A9D5BFBF1B7AF3EC636AC2672A
3,445,209 UART: [art] SIG.S = 27C7400F2E807790D49EEEFC268CF0EAFCB27F63D2B3D47C367EECD50433EEBF0E8BCE0AF23DF6FB6CFECC626D70D397
3,468,946 UART: Caliptra RT
3,469,291 UART: [state] CFI Enabled
3,577,715 UART: [rt] RT listening for mailbox commands...
3,578,385 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,919 UART: [rt]cmd =0x4c4d5356, len=1672
4,148,871 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,942 ready_for_fw is high
1,362,942 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,539 >>> mbox cmd response: success
2,988,583 UART:
2,988,599 UART: Running Caliptra FMC ...
2,989,007 UART:
2,989,150 UART: [state] CFI Enabled
2,999,681 UART: [fht] FMC Alias Private Key: 7
3,107,590 UART: [art] Extend RT PCRs Done
3,108,018 UART: [art] Lock RT PCRs Done
3,109,616 UART: [art] Populate DV Done
3,117,895 UART: [fht] FMC Alias Private Key: 7
3,118,997 UART: [art] Derive CDI
3,119,277 UART: [art] Store in in slot 0x4
3,204,410 UART: [art] Derive Key Pair
3,204,770 UART: [art] Store priv key in slot 0x5
3,218,640 UART: [art] Derive Key Pair - Done
3,233,432 UART: [art] Signing Cert with AUTHO
3,233,912 UART: RITY.KEYID = 7
3,248,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,725 UART: [art] PUB.X = 3284CD0B118CA3E953B0B64C6E668B51CE409400F54958BB292E3FE186A7F29B5E8E12E6BB350A24ACF74944A6A79828
3,256,471 UART: [art] PUB.Y = 853B05BFF118B58B4F9AA7A54E93E135E0DD7AD5BADA3632961E73A6DAD30327CD8B9C3C394D3063A41F4138F950821A
3,263,425 UART: [art] SIG.R = 45745511C0A42980F975BCF628F06EA55C9289CB5B50CDFE3F309E24A96B45B007B9738F092DA28BC117F8540606A34C
3,270,183 UART: [art] SIG.S = 6C1689A6A8609115A3BFE4248E53A78B81FA29D296694BD453B282F8BCFED479858E2AA9BF7317C1470C07068F67D6E2
3,293,939 UART: Caliptra RT
3,294,284 UART: [state] CFI Enabled
3,402,448 UART: [rt] RT listening for mailbox commands...
3,403,118 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,566 UART: [rt]cmd =0x4c4d5356, len=1672
3,973,496 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,621 UART: [kat] SHA2-256
903,561 UART: [kat] SHA2-384
906,478 UART: [kat] SHA2-512-ACC
908,379 UART: [kat] ECC-384
917,634 UART: [kat] HMAC-384Kdf
922,332 UART: [kat] LMS
1,170,660 UART: [kat] --
1,171,485 UART: [cold-reset] ++
1,172,001 UART: [fht] FHT @ 0x50003400
1,174,714 UART: [idev] ++
1,174,882 UART: [idev] CDI.KEYID = 6
1,175,242 UART: [idev] SUBJECT.KEYID = 7
1,175,666 UART: [idev] UDS.KEYID = 0
1,176,011 ready_for_fw is high
1,176,011 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,467 UART: [idev] Sha1 KeyId Algorithm
1,209,019 UART: [idev] --
1,210,147 UART: [ldev] ++
1,210,315 UART: [ldev] CDI.KEYID = 6
1,210,678 UART: [ldev] SUBJECT.KEYID = 5
1,211,104 UART: [ldev] AUTHORITY.KEYID = 7
1,211,567 UART: [ldev] FE.KEYID = 1
1,216,799 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,791 UART: [ldev] --
1,282,260 UART: [fwproc] Wait for Commands...
1,282,844 UART: [fwproc] Recv command 0x46574c44
1,283,572 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,251 >>> mbox cmd response: success
2,773,321 UART: [afmc] ++
2,773,489 UART: [afmc] CDI.KEYID = 6
2,773,851 UART: [afmc] SUBJECT.KEYID = 7
2,774,276 UART: [afmc] AUTHORITY.KEYID = 5
2,810,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,991 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,710 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,386 UART: [afmc] --
2,853,500 UART: [cold-reset] --
2,854,396 UART: [state] Locking Datavault
2,855,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,165 UART: [state] Locking ICCM
2,856,691 UART: [exit] Launching FMC @ 0x40000130
2,862,020 UART:
2,862,036 UART: Running Caliptra FMC ...
2,862,444 UART:
2,862,498 UART: [state] CFI Enabled
2,872,871 UART: [fht] FMC Alias Private Key: 7
2,980,870 UART: [art] Extend RT PCRs Done
2,981,298 UART: [art] Lock RT PCRs Done
2,982,830 UART: [art] Populate DV Done
2,991,159 UART: [fht] FMC Alias Private Key: 7
2,992,227 UART: [art] Derive CDI
2,992,507 UART: [art] Store in in slot 0x4
3,077,988 UART: [art] Derive Key Pair
3,078,348 UART: [art] Store priv key in slot 0x5
3,090,936 UART: [art] Derive Key Pair - Done
3,105,949 UART: [art] Signing Cert with AUTHO
3,106,429 UART: RITY.KEYID = 7
3,121,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,252 UART: [art] PUB.X = 588C6A1158398ADF4DDD56E8D60FD594F9A5A3483BA41222E73066AEA75FBA2708DABD12A89A5998EA7B8EAFC8EA1262
3,129,032 UART: [art] PUB.Y = C499E379264F04DD3C3CF40AD0805918845685E9F6D0957C97C4C7E2783E9DD3E62AD954826C0DDDE2EBF186D8C38F75
3,135,979 UART: [art] SIG.R = 47C68912D2D4A13527EDA3683428316D5F3E000ED00925D904FDFD16483317F9A4BDFA8C19601511C9F063A190F9BEDC
3,142,720 UART: [art] SIG.S = 77D7C4C052C5F24C3DB15DC30A7E288A754CD43A5941C47DF8C9FA1935D94F87BC961E643AB2E88B53042BB2098FFE20
3,166,322 UART: Caliptra RT
3,166,575 UART: [state] CFI Enabled
3,274,724 UART: [rt] RT listening for mailbox commands...
3,275,394 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,862 UART: [rt]cmd =0x4c4d5356, len=1672
3,845,678 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,989 ready_for_fw is high
1,059,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,144 >>> mbox cmd response: success
2,684,150 UART:
2,684,166 UART: Running Caliptra FMC ...
2,684,574 UART:
2,684,628 UART: [state] CFI Enabled
2,695,283 UART: [fht] FMC Alias Private Key: 7
2,803,010 UART: [art] Extend RT PCRs Done
2,803,438 UART: [art] Lock RT PCRs Done
2,804,988 UART: [art] Populate DV Done
2,813,051 UART: [fht] FMC Alias Private Key: 7
2,814,207 UART: [art] Derive CDI
2,814,487 UART: [art] Store in in slot 0x4
2,899,724 UART: [art] Derive Key Pair
2,900,084 UART: [art] Store priv key in slot 0x5
2,912,822 UART: [art] Derive Key Pair - Done
2,927,816 UART: [art] Signing Cert with AUTHO
2,928,296 UART: RITY.KEYID = 7
2,943,660 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,425 UART: [art] PUB.X = E9B32079B8FD01FE14AB65639C7CA51C3BC64A3974D75ECE29EED931B4F61EFC90BA5AF23032C792C923299FDF760A29
2,951,203 UART: [art] PUB.Y = CAA5E3C212F2494E553FD76B8AE5A0E5A2DD0E7CE9BEF55F00463A2BEF023FE2AD7A65DCB5EA2DF619F4D41A32D14CC9
2,958,155 UART: [art] SIG.R = 5ABF55D7D9FE78D691304F41F014E86F211B712256A2B41A923DEBCB3241EA3ADB0D45072513A38BC07A5B6184EDDFC2
2,964,931 UART: [art] SIG.S = 2121C51B1CF7FF582A1995A9098276371909C5914558AA3BC14A947209032D1C03BFEE977F4C13D1F0230022A73598A3
2,988,603 UART: Caliptra RT
2,988,856 UART: [state] CFI Enabled
3,096,695 UART: [rt] RT listening for mailbox commands...
3,097,365 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,389 UART: [rt]cmd =0x4c4d5356, len=1672
3,668,371 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
893,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,428 UART: [kat] ++
897,580 UART: [kat] sha1
901,700 UART: [kat] SHA2-256
903,640 UART: [kat] SHA2-384
906,291 UART: [kat] SHA2-512-ACC
908,192 UART: [kat] ECC-384
918,099 UART: [kat] HMAC-384Kdf
922,675 UART: [kat] LMS
1,171,003 UART: [kat] --
1,171,908 UART: [cold-reset] ++
1,172,448 UART: [fht] FHT @ 0x50003400
1,175,009 UART: [idev] ++
1,175,177 UART: [idev] CDI.KEYID = 6
1,175,537 UART: [idev] SUBJECT.KEYID = 7
1,175,961 UART: [idev] UDS.KEYID = 0
1,176,306 ready_for_fw is high
1,176,306 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,639 UART: [idev] Erasing UDS.KEYID = 0
1,200,962 UART: [idev] Sha1 KeyId Algorithm
1,209,544 UART: [idev] --
1,210,484 UART: [ldev] ++
1,210,652 UART: [ldev] CDI.KEYID = 6
1,211,015 UART: [ldev] SUBJECT.KEYID = 5
1,211,441 UART: [ldev] AUTHORITY.KEYID = 7
1,211,904 UART: [ldev] FE.KEYID = 1
1,216,870 UART: [ldev] Erasing FE.KEYID = 1
1,243,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,398 UART: [ldev] --
1,282,697 UART: [fwproc] Wait for Commands...
1,283,449 UART: [fwproc] Recv command 0x46574c44
1,284,177 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,215 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,519 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,046 >>> mbox cmd response: success
2,773,242 UART: [afmc] ++
2,773,410 UART: [afmc] CDI.KEYID = 6
2,773,772 UART: [afmc] SUBJECT.KEYID = 7
2,774,197 UART: [afmc] AUTHORITY.KEYID = 5
2,810,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,932 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,651 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,407 UART: [afmc] --
2,853,343 UART: [cold-reset] --
2,854,027 UART: [state] Locking Datavault
2,855,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,892 UART: [state] Locking ICCM
2,856,514 UART: [exit] Launching FMC @ 0x40000130
2,861,843 UART:
2,861,859 UART: Running Caliptra FMC ...
2,862,267 UART:
2,862,410 UART: [state] CFI Enabled
2,872,641 UART: [fht] FMC Alias Private Key: 7
2,980,408 UART: [art] Extend RT PCRs Done
2,980,836 UART: [art] Lock RT PCRs Done
2,982,798 UART: [art] Populate DV Done
2,990,983 UART: [fht] FMC Alias Private Key: 7
2,991,987 UART: [art] Derive CDI
2,992,267 UART: [art] Store in in slot 0x4
3,077,974 UART: [art] Derive Key Pair
3,078,334 UART: [art] Store priv key in slot 0x5
3,091,418 UART: [art] Derive Key Pair - Done
3,106,367 UART: [art] Signing Cert with AUTHO
3,106,847 UART: RITY.KEYID = 7
3,121,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,668 UART: [art] PUB.X = C212070B8609C0061A498F462E1BE37B79CFF552BBCBF4902456309B99C0A72BD0A2C8285597B9E7B7E177E1B463BEC7
3,129,430 UART: [art] PUB.Y = E09638171051FF1F2657B4C3578B3C46558A016BF485EDE3F9B8F22E0398AD842066460289CF8F718DD2C4C4D8AEC30E
3,136,370 UART: [art] SIG.R = 8F0DDB70565D5A095CA7A00128DA83D4B8C98075DE0C070BF1A91F5D7DE111068B9A9C9548AF585E0B9354DA22BDFC1E
3,143,130 UART: [art] SIG.S = 2EE320F31923DAC79F09BB14B6F746975FDC30203749C1D458917579FEE3B7F972EA55613B96D8F9076AA60062025134
3,166,610 UART: Caliptra RT
3,166,955 UART: [state] CFI Enabled
3,274,106 UART: [rt] RT listening for mailbox commands...
3,274,776 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,514 UART: [rt]cmd =0x4c4d5356, len=1672
3,845,122 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,912 ready_for_fw is high
1,060,912 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,813 >>> mbox cmd response: success
2,688,291 UART:
2,688,307 UART: Running Caliptra FMC ...
2,688,715 UART:
2,688,858 UART: [state] CFI Enabled
2,699,745 UART: [fht] FMC Alias Private Key: 7
2,807,856 UART: [art] Extend RT PCRs Done
2,808,284 UART: [art] Lock RT PCRs Done
2,809,978 UART: [art] Populate DV Done
2,818,325 UART: [fht] FMC Alias Private Key: 7
2,819,277 UART: [art] Derive CDI
2,819,557 UART: [art] Store in in slot 0x4
2,905,564 UART: [art] Derive Key Pair
2,905,924 UART: [art] Store priv key in slot 0x5
2,919,250 UART: [art] Derive Key Pair - Done
2,934,028 UART: [art] Signing Cert with AUTHO
2,934,508 UART: RITY.KEYID = 7
2,949,510 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,275 UART: [art] PUB.X = 2D9E3CA6988A54E214A324D1E3546DDFECD8FC354F1F49A78A3A4541918ABA315B3F57129FB3B23DF0A0055779448E02
2,957,045 UART: [art] PUB.Y = F8C8A7EC7D18B1ABFE0C797980E832B376DD43BB59506E99FEDE56124833096D294B566FA9AB74419E6763914E9434B5
2,963,991 UART: [art] SIG.R = 45FCDA682A7D00A4659A56058C77E1C77423E626EA4397727DF8D107046D0A16B02BC16A526C5B21843D0922127ADE01
2,970,717 UART: [art] SIG.S = 9BF996CE1966285352AFE8CB468E9416A70536CD4FE1C11C4511672F9BABA293346C06A57440800A82F98B91DB483B15
2,994,439 UART: Caliptra RT
2,994,784 UART: [state] CFI Enabled
3,103,203 UART: [rt] RT listening for mailbox commands...
3,103,873 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,569 UART: [rt]cmd =0x4c4d5356, len=1672
3,674,383 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,234 UART: [kat] SHA2-256
891,784 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,913 UART: [kat] ++
896,065 UART: [kat] sha1
900,333 UART: [kat] SHA2-256
902,273 UART: [kat] SHA2-384
904,888 UART: [kat] SHA2-512-ACC
906,789 UART: [kat] ECC-384
916,544 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,365 UART: [cold-reset] ++
1,170,877 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,174,733 ready_for_fw is high
1,174,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,325 UART: [idev] Erasing UDS.KEYID = 0
1,199,807 UART: [idev] Sha1 KeyId Algorithm
1,208,695 UART: [idev] --
1,209,710 UART: [ldev] ++
1,209,878 UART: [ldev] CDI.KEYID = 6
1,210,242 UART: [ldev] SUBJECT.KEYID = 5
1,210,669 UART: [ldev] AUTHORITY.KEYID = 7
1,211,132 UART: [ldev] FE.KEYID = 1
1,215,982 UART: [ldev] Erasing FE.KEYID = 1
1,242,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,474 UART: [ldev] --
1,281,930 UART: [fwproc] Wait for Commands...
1,282,607 UART: [fwproc] Recv command 0x46574c44
1,283,340 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,987 >>> mbox cmd response: success
2,772,226 UART: [afmc] ++
2,772,394 UART: [afmc] CDI.KEYID = 6
2,772,757 UART: [afmc] SUBJECT.KEYID = 7
2,773,183 UART: [afmc] AUTHORITY.KEYID = 5
2,808,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,032 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,915 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,634 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,539 UART: [afmc] --
2,851,471 UART: [cold-reset] --
2,852,289 UART: [state] Locking Datavault
2,853,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,798 UART: [state] Locking ICCM
2,854,434 UART: [exit] Launching FMC @ 0x40000130
2,859,763 UART:
2,859,779 UART: Running Caliptra FMC ...
2,860,187 UART:
2,860,241 UART: [state] CFI Enabled
2,870,728 UART: [fht] FMC Alias Private Key: 7
2,978,315 UART: [art] Extend RT PCRs Done
2,978,743 UART: [art] Lock RT PCRs Done
2,980,269 UART: [art] Populate DV Done
2,988,414 UART: [fht] FMC Alias Private Key: 7
2,989,474 UART: [art] Derive CDI
2,989,754 UART: [art] Store in in slot 0x4
3,075,317 UART: [art] Derive Key Pair
3,075,677 UART: [art] Store priv key in slot 0x5
3,088,695 UART: [art] Derive Key Pair - Done
3,103,365 UART: [art] Signing Cert with AUTHO
3,103,845 UART: RITY.KEYID = 7
3,119,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,004 UART: [art] PUB.X = E45F6F1542994AC74266C65071C558BCF53AA520641A2A0A4722779B61AE96B8DB003484417CCCA2E9449AD33D8723BB
3,126,749 UART: [art] PUB.Y = 7C77BD766FB6488ED215B8EB7250C25C18AB3B657E4B0ACF65DB4BE96C18D97B60DB583D7C13CE8A73B2BCC15FA9CC94
3,133,718 UART: [art] SIG.R = 4A1E65566B0601D1C57EB12D8A2E7457C6CB1F2946351B9E784BBE80F035550566D42204F310FC1846411EF0D0E58217
3,140,470 UART: [art] SIG.S = BD0B98FACF361474BCCA4E24D63BE11F292EF371A3DD575930C62FAAFE7CA9DEE045EAAD5AA9D0D1BC625693E702BCCC
3,163,843 UART: Caliptra RT
3,164,096 UART: [state] CFI Enabled
3,272,441 UART: [rt] RT listening for mailbox commands...
3,273,111 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,777 UART: [rt]cmd =0x4c4d5356, len=1672
3,843,679 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,368 ready_for_fw is high
1,056,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,591 >>> mbox cmd response: success
2,682,683 UART:
2,682,699 UART: Running Caliptra FMC ...
2,683,107 UART:
2,683,161 UART: [state] CFI Enabled
2,693,266 UART: [fht] FMC Alias Private Key: 7
2,802,155 UART: [art] Extend RT PCRs Done
2,802,583 UART: [art] Lock RT PCRs Done
2,804,077 UART: [art] Populate DV Done
2,812,466 UART: [fht] FMC Alias Private Key: 7
2,813,622 UART: [art] Derive CDI
2,813,902 UART: [art] Store in in slot 0x4
2,899,637 UART: [art] Derive Key Pair
2,899,997 UART: [art] Store priv key in slot 0x5
2,913,025 UART: [art] Derive Key Pair - Done
2,927,806 UART: [art] Signing Cert with AUTHO
2,928,286 UART: RITY.KEYID = 7
2,943,384 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,149 UART: [art] PUB.X = 97A4ACAA80465AB35301A2A804E008D0DDCBCC79D88F050FB9E42794FF27B991E9B292A6048457C669BCA0CAE0403788
2,950,909 UART: [art] PUB.Y = D69831679696CD73D49E1D3718112D0F6B1B742C78E758B0C11BF6767344C7021916EC647B26BE828FA18E67A8F8D170
2,957,847 UART: [art] SIG.R = 3EEC5159860C2EB566E3B31A7F6B7AD9D93866E439F63DCF733904CD4BD1842930AEB9AEF07CDD81BFACEC45BB125CF8
2,964,633 UART: [art] SIG.S = 12D19763955FBD3DDEB924010A9F00DB352C2B1BC1CFDFC1144786F630483CAF8202EED89DF677FEB4919075C09B0698
2,988,496 UART: Caliptra RT
2,988,749 UART: [state] CFI Enabled
3,096,930 UART: [rt] RT listening for mailbox commands...
3,097,600 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,378 UART: [rt]cmd =0x4c4d5356, len=1672
3,668,408 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,025 UART: [state] LifecycleState = Unprovisioned
85,680 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,411 UART: [kat] SHA2-512-ACC
906,312 UART: [kat] ECC-384
915,983 UART: [kat] HMAC-384Kdf
920,725 UART: [kat] LMS
1,169,037 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,418 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 ready_for_fw is high
1,174,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,241,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,619 UART: [ldev] --
1,281,095 UART: [fwproc] Wait for Commands...
1,281,822 UART: [fwproc] Recv command 0x46574c44
1,282,555 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,903 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,212 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,750 >>> mbox cmd response: success
2,771,005 UART: [afmc] ++
2,771,173 UART: [afmc] CDI.KEYID = 6
2,771,536 UART: [afmc] SUBJECT.KEYID = 7
2,771,962 UART: [afmc] AUTHORITY.KEYID = 5
2,807,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,160 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,889 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,772 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,491 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,232 UART: [afmc] --
2,851,252 UART: [cold-reset] --
2,852,258 UART: [state] Locking Datavault
2,853,215 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,819 UART: [state] Locking ICCM
2,854,447 UART: [exit] Launching FMC @ 0x40000130
2,859,776 UART:
2,859,792 UART: Running Caliptra FMC ...
2,860,200 UART:
2,860,343 UART: [state] CFI Enabled
2,871,196 UART: [fht] FMC Alias Private Key: 7
2,978,881 UART: [art] Extend RT PCRs Done
2,979,309 UART: [art] Lock RT PCRs Done
2,980,733 UART: [art] Populate DV Done
2,988,890 UART: [fht] FMC Alias Private Key: 7
2,989,988 UART: [art] Derive CDI
2,990,268 UART: [art] Store in in slot 0x4
3,076,179 UART: [art] Derive Key Pair
3,076,539 UART: [art] Store priv key in slot 0x5
3,089,641 UART: [art] Derive Key Pair - Done
3,104,456 UART: [art] Signing Cert with AUTHO
3,104,936 UART: RITY.KEYID = 7
3,120,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,983 UART: [art] PUB.X = 81533BCDE1E7FD1A4ADD6F9D9888B1A53819A58E16F8E9823F37F20F0E759418E2C18F8CB22A6C4EC1C5535BAB30311A
3,127,759 UART: [art] PUB.Y = FAA019B7786BCE6506D0915F8EE950C9D93D5C04AED5A498025E38ACD19EC6503D576303CDAB8651FF77A6BD2FBA85CF
3,134,715 UART: [art] SIG.R = 7A346C9D988758C2439D411EEA7702E8D6C19E509AF1A4E1791D4FBF4B3EC94140C89C7EE14B24084309C665DD43C3F6
3,141,480 UART: [art] SIG.S = 3E82D320E660AF4519E0AD684E2A123CF14975037DC6F56A7701E3BCBF9FF8F755E01C9216676B08B4ED6CA707599D0F
3,165,246 UART: Caliptra RT
3,165,591 UART: [state] CFI Enabled
3,273,730 UART: [rt] RT listening for mailbox commands...
3,274,400 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,774 UART: [rt]cmd =0x4c4d5356, len=1672
3,844,562 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,879 ready_for_fw is high
1,055,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,342 >>> mbox cmd response: success
2,682,158 UART:
2,682,174 UART: Running Caliptra FMC ...
2,682,582 UART:
2,682,725 UART: [state] CFI Enabled
2,693,402 UART: [fht] FMC Alias Private Key: 7
2,801,383 UART: [art] Extend RT PCRs Done
2,801,811 UART: [art] Lock RT PCRs Done
2,803,359 UART: [art] Populate DV Done
2,811,634 UART: [fht] FMC Alias Private Key: 7
2,812,596 UART: [art] Derive CDI
2,812,876 UART: [art] Store in in slot 0x4
2,898,597 UART: [art] Derive Key Pair
2,898,957 UART: [art] Store priv key in slot 0x5
2,912,253 UART: [art] Derive Key Pair - Done
2,927,103 UART: [art] Signing Cert with AUTHO
2,927,583 UART: RITY.KEYID = 7
2,942,637 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,402 UART: [art] PUB.X = 3B88221CE41E1B1C4E31D7D7F5F4E0DD1EAFB61B2A3E5391F30CB6A2AB270413CCEA94B4D6B1EDA81F4773AD0C730ED8
2,950,184 UART: [art] PUB.Y = 1511F88931FB02ACF114767613010A68DE440C0576EC8100C7243BB277475B839068F5C20974824AAD8AE7A85FE1CE89
2,957,088 UART: [art] SIG.R = 924745CF45367A17421B2E0B780724BEBAC455D488FF67A7C7F9F974D0DD804972FF1CCBB0B822E53C4FD9747D1E982C
2,963,860 UART: [art] SIG.S = 2081A6122DE728F92A7ABDB5E1B68BE7F4164992385D8C297CFA87DF60E24E79FBAB0689CD9078B69CA1DE6FAE109A8B
2,987,614 UART: Caliptra RT
2,987,959 UART: [state] CFI Enabled
3,096,448 UART: [rt] RT listening for mailbox commands...
3,097,118 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,882 UART: [rt]cmd =0x4c4d5356, len=1672
3,667,930 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,034 UART:
192,399 UART: Running Caliptra ROM ...
193,612 UART:
193,763 UART: [state] CFI Enabled
264,367 UART: [state] LifecycleState = Unprovisioned
266,348 UART: [state] DebugLocked = No
269,364 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,218 UART: [kat] SHA2-256
443,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,447 UART: [kat] ++
454,923 UART: [kat] sha1
464,654 UART: [kat] SHA2-256
467,376 UART: [kat] SHA2-384
471,651 UART: [kat] SHA2-512-ACC
474,005 UART: [kat] ECC-384
2,767,177 UART: [kat] HMAC-384Kdf
2,778,997 UART: [kat] LMS
3,969,245 UART: [kat] --
3,973,598 UART: [cold-reset] ++
3,975,033 UART: [fht] Storing FHT @ 0x50003400
3,986,938 UART: [idev] ++
3,987,559 UART: [idev] CDI.KEYID = 6
3,988,440 UART: [idev] SUBJECT.KEYID = 7
3,989,743 UART: [idev] UDS.KEYID = 0
3,990,814 ready_for_fw is high
3,991,022 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,295 UART: [idev] Erasing UDS.KEYID = 0
7,324,512 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,535 UART: [idev] --
7,351,042 UART: [ldev] ++
7,351,669 UART: [ldev] CDI.KEYID = 6
7,352,674 UART: [ldev] SUBJECT.KEYID = 5
7,353,821 UART: [ldev] AUTHORITY.KEYID = 7
7,355,092 UART: [ldev] FE.KEYID = 1
7,401,377 UART: [ldev] Erasing FE.KEYID = 1
10,733,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,162 UART: [ldev] --
13,093,919 UART: [fwproc] Waiting for Commands...
13,097,204 UART: [fwproc] Received command 0x46574c44
13,099,376 UART: [fwproc] Received Image of size 113844 bytes
17,158,734 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,907 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,623,839 >>> mbox cmd response: success
17,627,615 UART: [afmc] ++
17,628,204 UART: [afmc] CDI.KEYID = 6
17,629,165 UART: [afmc] SUBJECT.KEYID = 7
17,630,382 UART: [afmc] AUTHORITY.KEYID = 5
20,986,046 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,813 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,204 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,057 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,535 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,663 UART: [afmc] --
23,355,031 UART: [cold-reset] --
23,359,694 UART: [state] Locking Datavault
23,365,691 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,381 UART: [state] Locking ICCM
23,370,017 UART: [exit] Launching FMC @ 0x40000130
23,378,405 UART:
23,378,637 UART: Running Caliptra FMC ...
23,379,774 UART:
23,379,928 UART: [state] CFI Enabled
23,445,152 UART: [fht] FMC Alias Private Key: 7
25,783,527 UART: [art] Extend RT PCRs Done
25,784,747 UART: [art] Lock RT PCRs Done
25,786,610 UART: [art] Populate DV Done
25,791,913 UART: [fht] FMC Alias Private Key: 7
25,793,564 UART: [art] Derive CDI
25,794,375 UART: [art] Store in in slot 0x4
25,854,123 UART: [art] Derive Key Pair
25,855,156 UART: [art] Store priv key in slot 0x5
29,147,856 UART: [art] Derive Key Pair - Done
29,161,227 UART: [art] Signing Cert with AUTHO
29,162,516 UART: RITY.KEYID = 7
31,448,787 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,285 UART: [art] PUB.X = FD3B58C559F6A26EA5ECA5F5F0C57DA39D0D789A3DD9C14CFCC576EBC5FB2A9418A08F8E2AAAD9F0F5747CB8AB9EB7CC
31,457,566 UART: [art] PUB.Y = A39F746E1A9BB1AF13246BF2287EF84314C2ACE5B2AE7D526CFB4F6502DEFAF29340081682E019D0D90D64093AACA46F
31,464,813 UART: [art] SIG.R = 0AC24A835F70DEAE103DBB060D4000BBF2E3366BA6CAC573E90242D2FE8B4C181E7763CE952C000AF5CFB53FDFE9CA7F
31,472,218 UART: [art] SIG.S = F470D20F5048BCF9CBDDEF6E7134BA507C0CB7D6C78A8DEE7536B987E40ECBCF1784DEBEDD8168428CF8BF22547BF9CD
32,777,852 UART: Caliptra RT
32,778,564 UART: [state] CFI Enabled
32,938,712 UART: [rt] RT listening for mailbox commands...
32,942,712 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,987,907 UART: [rt]cmd =0x4c4d5356, len=1672
33,401,937 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,783,171 ready_for_fw is high
3,783,581 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,872,219 >>> mbox cmd response: success
23,564,614 UART:
23,565,029 UART: Running Caliptra FMC ...
23,566,139 UART:
23,566,298 UART: [state] CFI Enabled
23,634,093 UART: [fht] FMC Alias Private Key: 7
25,971,778 UART: [art] Extend RT PCRs Done
25,973,008 UART: [art] Lock RT PCRs Done
25,974,502 UART: [art] Populate DV Done
25,979,805 UART: [fht] FMC Alias Private Key: 7
25,981,354 UART: [art] Derive CDI
25,982,087 UART: [art] Store in in slot 0x4
26,042,146 UART: [art] Derive Key Pair
26,043,143 UART: [art] Store priv key in slot 0x5
29,336,475 UART: [art] Derive Key Pair - Done
29,349,850 UART: [art] Signing Cert with AUTHO
29,351,151 UART: RITY.KEYID = 7
31,637,240 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,747 UART: [art] PUB.X = 69CFAC1020BEBB26405D9770C656EDF77017079E50CB94D9A148974061B089E47B12DA78512374D8092083103DF34059
31,645,947 UART: [art] PUB.Y = B20205FEBE39E4C7388B51D1F146CC59A7E4218C54A5158BA4C6FABDC722B28DC287AA04E04918E9FDEDD04800F62248
31,653,195 UART: [art] SIG.R = 4478373AEABDF42B553C6B89648217463ABA7C5FA5984FE7A08A66B55FE9E4EB9E1CA0F65BF171DD148535D2F3FE4AD2
31,660,609 UART: [art] SIG.S = 8AE1F5A81CE1FDC152646840EBA0384629BBFE917BAE4E119FDD30D962DFC569F45C76C22AE44A3BCDACEFE683D01E4E
32,965,751 UART: Caliptra RT
32,966,453 UART: [state] CFI Enabled
33,126,266 UART: [rt] RT listening for mailbox commands...
33,130,241 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,175,452 UART: [rt]cmd =0x4c4d5356, len=1672
33,589,159 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,525 UART:
192,880 UART: Running Caliptra ROM ...
194,074 UART:
603,740 UART: [state] CFI Enabled
618,496 UART: [state] LifecycleState = Unprovisioned
620,451 UART: [state] DebugLocked = No
622,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,108 UART: [kat] SHA2-256
797,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,371 UART: [kat] ++
808,819 UART: [kat] sha1
818,564 UART: [kat] SHA2-256
821,286 UART: [kat] SHA2-384
826,950 UART: [kat] SHA2-512-ACC
829,172 UART: [kat] ECC-384
3,111,678 UART: [kat] HMAC-384Kdf
3,122,996 UART: [kat] LMS
4,313,119 UART: [kat] --
4,317,042 UART: [cold-reset] ++
4,318,124 UART: [fht] Storing FHT @ 0x50003400
4,330,313 UART: [idev] ++
4,330,885 UART: [idev] CDI.KEYID = 6
4,331,920 UART: [idev] SUBJECT.KEYID = 7
4,333,051 UART: [idev] UDS.KEYID = 0
4,334,039 ready_for_fw is high
4,334,242 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,222 UART: [idev] Erasing UDS.KEYID = 0
7,619,532 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,570 UART: [idev] --
7,645,750 UART: [ldev] ++
7,646,349 UART: [ldev] CDI.KEYID = 6
7,647,270 UART: [ldev] SUBJECT.KEYID = 5
7,648,485 UART: [ldev] AUTHORITY.KEYID = 7
7,649,769 UART: [ldev] FE.KEYID = 1
7,659,635 UART: [ldev] Erasing FE.KEYID = 1
10,948,045 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,243 UART: [ldev] --
13,305,531 UART: [fwproc] Waiting for Commands...
13,307,711 UART: [fwproc] Received command 0x46574c44
13,309,914 UART: [fwproc] Received Image of size 113844 bytes
17,361,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,177 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,824,164 >>> mbox cmd response: success
17,828,392 UART: [afmc] ++
17,828,997 UART: [afmc] CDI.KEYID = 6
17,829,941 UART: [afmc] SUBJECT.KEYID = 7
17,831,157 UART: [afmc] AUTHORITY.KEYID = 5
21,145,778 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,531 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,780 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,170 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,009 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,444 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,494 UART: [afmc] --
23,513,544 UART: [cold-reset] --
23,518,318 UART: [state] Locking Datavault
23,523,565 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,294 UART: [state] Locking ICCM
23,527,906 UART: [exit] Launching FMC @ 0x40000130
23,536,296 UART:
23,536,526 UART: Running Caliptra FMC ...
23,537,551 UART:
23,537,699 UART: [state] CFI Enabled
23,545,422 UART: [fht] FMC Alias Private Key: 7
25,876,034 UART: [art] Extend RT PCRs Done
25,877,256 UART: [art] Lock RT PCRs Done
25,878,752 UART: [art] Populate DV Done
25,883,950 UART: [fht] FMC Alias Private Key: 7
25,885,651 UART: [art] Derive CDI
25,886,391 UART: [art] Store in in slot 0x4
25,929,316 UART: [art] Derive Key Pair
25,930,316 UART: [art] Store priv key in slot 0x5
29,172,178 UART: [art] Derive Key Pair - Done
29,185,236 UART: [art] Signing Cert with AUTHO
29,186,545 UART: RITY.KEYID = 7
31,465,790 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,539 UART: [art] PUB.X = 5D5C289F313EE7E19D91E5B337F2BF3F13E1C450B2FD5AA5A4FDF2CA3AD8A1FDC0A55CD58C3537EED05B629FCFE88449
31,474,603 UART: [art] PUB.Y = 28FD31AF315FEF44790F9194EDB28FD35D769E1C58982AC7E67C6387BDD339F4753B7001B65AD4868B0632098B7F2C70
31,481,849 UART: [art] SIG.R = ADA006604FCBEC1350EA449077DC4414A253BBEC3A9B90B33DF92D38133385B3067F5277B0169FEDD1E9DA5A5243AB4A
31,489,190 UART: [art] SIG.S = CB8F8BDF9F1DC3C7443F8F0590C520F51F90E811D803B9B37311E0D15B5797793C039332AD1E9A733AA51308A722B13E
32,794,537 UART: Caliptra RT
32,795,251 UART: [state] CFI Enabled
32,913,037 UART: [rt] RT listening for mailbox commands...
32,917,076 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,962,373 UART: [rt]cmd =0x4c4d5356, len=1672
33,375,862 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
4,129,367 ready_for_fw is high
4,129,749 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,303 >>> mbox cmd response: success
23,713,113 UART:
23,713,507 UART: Running Caliptra FMC ...
23,714,617 UART:
23,714,774 UART: [state] CFI Enabled
23,722,783 UART: [fht] FMC Alias Private Key: 7
26,053,462 UART: [art] Extend RT PCRs Done
26,054,688 UART: [art] Lock RT PCRs Done
26,056,567 UART: [art] Populate DV Done
26,062,036 UART: [fht] FMC Alias Private Key: 7
26,063,606 UART: [art] Derive CDI
26,064,345 UART: [art] Store in in slot 0x4
26,106,944 UART: [art] Derive Key Pair
26,107,986 UART: [art] Store priv key in slot 0x5
29,350,060 UART: [art] Derive Key Pair - Done
29,363,178 UART: [art] Signing Cert with AUTHO
29,364,486 UART: RITY.KEYID = 7
31,644,128 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,635 UART: [art] PUB.X = F21F3ECFA60FC2EC3F9A6020CFB9BC66F830C3B935F0408C705192BDBF0383E5DB7708CDC8E7C36B21C0B775B94A0E09
31,652,894 UART: [art] PUB.Y = 6943AC1958B43790381BAC608445CB9ACA51445DE726B61F0AD2B258ED3DEA55FC4F81E548DF38B014653658B0C3B940
31,660,142 UART: [art] SIG.R = D314ED5E1D3F12A4090892CF0DCF2E2465678644479D1A04DC61FF588BDE2BEA5482C58EA0D90BFBDC5F5506AF53A91D
31,667,553 UART: [art] SIG.S = C5DA1BC1620E48F8A123814FFDE44957AD8A110007FE7E1B140E3684881235BF95DF10269DBBECFB25FBAA02502808AE
32,972,804 UART: Caliptra RT
32,973,519 UART: [state] CFI Enabled
33,091,067 UART: [rt] RT listening for mailbox commands...
33,095,058 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,140,042 UART: [rt]cmd =0x4c4d5356, len=1672
33,553,606 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,044 UART:
192,415 UART: Running Caliptra ROM ...
193,526 UART:
193,670 UART: [state] CFI Enabled
266,842 UART: [state] LifecycleState = Unprovisioned
268,746 UART: [state] DebugLocked = No
271,272 UART: [state] WD Timer not started. Device not locked for debugging
274,323 UART: [kat] SHA2-256
453,442 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,042 UART: [kat] ++
465,583 UART: [kat] sha1
476,251 UART: [kat] SHA2-256
479,321 UART: [kat] SHA2-384
484,810 UART: [kat] SHA2-512-ACC
487,751 UART: [kat] ECC-384
2,948,157 UART: [kat] HMAC-384Kdf
2,972,215 UART: [kat] LMS
3,501,640 UART: [kat] --
3,504,500 UART: [cold-reset] ++
3,506,362 UART: [fht] FHT @ 0x50003400
3,517,979 UART: [idev] ++
3,518,545 UART: [idev] CDI.KEYID = 6
3,519,496 UART: [idev] SUBJECT.KEYID = 7
3,520,669 UART: [idev] UDS.KEYID = 0
3,521,638 ready_for_fw is high
3,521,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,508 UART: [idev] Erasing UDS.KEYID = 0
6,026,108 UART: [idev] Sha1 KeyId Algorithm
6,050,589 UART: [idev] --
6,055,181 UART: [ldev] ++
6,055,758 UART: [ldev] CDI.KEYID = 6
6,056,685 UART: [ldev] SUBJECT.KEYID = 5
6,057,867 UART: [ldev] AUTHORITY.KEYID = 7
6,059,052 UART: [ldev] FE.KEYID = 1
6,101,255 UART: [ldev] Erasing FE.KEYID = 1
8,601,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,714 UART: [ldev] --
10,391,656 UART: [fwproc] Wait for Commands...
10,393,428 UART: [fwproc] Recv command 0x46574c44
10,395,521 UART: [fwproc] Recv'd Img size: 114168 bytes
13,804,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,266,328 >>> mbox cmd response: success
14,270,397 UART: [afmc] ++
14,271,009 UART: [afmc] CDI.KEYID = 6
14,271,905 UART: [afmc] SUBJECT.KEYID = 7
14,273,005 UART: [afmc] AUTHORITY.KEYID = 5
16,803,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,458 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,181 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,054 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,154 UART: [afmc] --
18,605,771 UART: [cold-reset] --
18,609,908 UART: [state] Locking Datavault
18,614,511 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,158 UART: [state] Locking ICCM
18,617,986 UART: [exit] Launching FMC @ 0x40000130
18,626,407 UART:
18,626,656 UART: Running Caliptra FMC ...
18,627,757 UART:
18,627,914 UART: [state] CFI Enabled
18,688,335 UART: [fht] FMC Alias Private Key: 7
20,452,234 UART: [art] Extend RT PCRs Done
20,453,461 UART: [art] Lock RT PCRs Done
20,454,676 UART: [art] Populate DV Done
20,460,083 UART: [fht] FMC Alias Private Key: 7
20,461,671 UART: [art] Derive CDI
20,462,411 UART: [art] Store in in slot 0x4
20,520,916 UART: [art] Derive Key Pair
20,521,980 UART: [art] Store priv key in slot 0x5
22,984,778 UART: [art] Derive Key Pair - Done
22,997,615 UART: [art] Signing Cert with AUTHO
22,998,911 UART: RITY.KEYID = 7
24,710,762 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,261 UART: [art] PUB.X = A168FBA7E86390662B87EB0B33DBF3D6118DD115022097CB079A322477E72A65E3B0C48EF5CFF12309C7C3EDBDDBF1AA
24,719,572 UART: [art] PUB.Y = 096056F60F692719EABAAA3451C061576D6219CFFB6812CCBE2754E5C0BEFAC4F5D972777FB016A50AC4B02AF95796A0
24,726,806 UART: [art] SIG.R = BCF98F8FD24E49BABBBD2A56DDDC5404CD46B66FCFBD69C275D22ABC7259A562D8F7DC8963F99521F9B996BA2AF6B98A
24,734,386 UART: [art] SIG.S = 1B0D1A35611E18AAF134486F5508B965E89C64F538D3CA213F99B1A052B998392DB521635C87C8990918E8D28AEAD4EA
25,713,064 UART: Caliptra RT
25,713,759 UART: [state] CFI Enabled
25,879,840 UART: [rt] RT listening for mailbox commands...
25,883,811 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,928,897 UART: [rt]cmd =0x4c4d5356, len=1672
26,130,194 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,362,947 ready_for_fw is high
3,363,561 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,066,360 >>> mbox cmd response: success
18,362,144 UART:
18,362,538 UART: Running Caliptra FMC ...
18,363,680 UART:
18,363,850 UART: [state] CFI Enabled
18,425,879 UART: [fht] FMC Alias Private Key: 7
20,190,038 UART: [art] Extend RT PCRs Done
20,191,289 UART: [art] Lock RT PCRs Done
20,192,917 UART: [art] Populate DV Done
20,198,110 UART: [fht] FMC Alias Private Key: 7
20,199,815 UART: [art] Derive CDI
20,200,636 UART: [art] Store in in slot 0x4
20,250,243 UART: [art] Derive Key Pair
20,251,239 UART: [art] Store priv key in slot 0x5
22,714,446 UART: [art] Derive Key Pair - Done
22,727,232 UART: [art] Signing Cert with AUTHO
22,728,537 UART: RITY.KEYID = 7
24,440,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,441,531 UART: [art] PUB.X = 672AC61C95753DDE96EE242060A0406E9277D95DBA530227603CAA9E54A18D509DB4D7D4638DB276708D26397A5B4E17
24,448,823 UART: [art] PUB.Y = 357C402CCAD301446B7C9A8EF47521A0E1864DF214B886C9FC3AB90F3A080CDE3A3F5E36B277FF50766DFE7F92037697
24,456,065 UART: [art] SIG.R = DE6647AD83A520952F15497DB63CAAEEB9A8420E7DB43B540C9503A581E9CE7AB9B44E5DC12311376BEDB15B13827D55
24,463,456 UART: [art] SIG.S = E772B846FA7975B3CEA5F3EC902FE2E782777D20366CF9DA275BFC02E0F39FD2952FBA27C912442C91BF9A793CDA0D33
25,442,535 UART: Caliptra RT
25,443,273 UART: [state] CFI Enabled
25,607,470 UART: [rt] RT listening for mailbox commands...
25,611,421 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,656,198 UART: [rt]cmd =0x4c4d5356, len=1672
25,857,515 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,912 writing to cptra_bootfsm_go
192,999 UART:
193,369 UART: Running Caliptra ROM ...
194,477 UART:
604,318 UART: [state] CFI Enabled
617,009 UART: [state] LifecycleState = Unprovisioned
618,916 UART: [state] DebugLocked = No
620,721 UART: [state] WD Timer not started. Device not locked for debugging
624,916 UART: [kat] SHA2-256
804,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,668 UART: [kat] ++
816,207 UART: [kat] sha1
827,231 UART: [kat] SHA2-256
830,303 UART: [kat] SHA2-384
836,369 UART: [kat] SHA2-512-ACC
839,305 UART: [kat] ECC-384
3,279,125 UART: [kat] HMAC-384Kdf
3,290,936 UART: [kat] LMS
3,820,427 UART: [kat] --
3,824,722 UART: [cold-reset] ++
3,825,751 UART: [fht] FHT @ 0x50003400
3,837,509 UART: [idev] ++
3,838,076 UART: [idev] CDI.KEYID = 6
3,838,993 UART: [idev] SUBJECT.KEYID = 7
3,840,165 UART: [idev] UDS.KEYID = 0
3,841,090 ready_for_fw is high
3,841,279 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,656 UART: [idev] Erasing UDS.KEYID = 0
6,310,700 UART: [idev] Sha1 KeyId Algorithm
6,334,255 UART: [idev] --
6,337,813 UART: [ldev] ++
6,338,379 UART: [ldev] CDI.KEYID = 6
6,339,342 UART: [ldev] SUBJECT.KEYID = 5
6,340,497 UART: [ldev] AUTHORITY.KEYID = 7
6,341,726 UART: [ldev] FE.KEYID = 1
6,350,319 UART: [ldev] Erasing FE.KEYID = 1
8,824,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,642 UART: [ldev] --
10,614,501 UART: [fwproc] Wait for Commands...
10,616,905 UART: [fwproc] Recv command 0x46574c44
10,619,005 UART: [fwproc] Recv'd Img size: 114168 bytes
14,010,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,080,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,149,547 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,466,462 >>> mbox cmd response: success
14,469,834 UART: [afmc] ++
14,470,429 UART: [afmc] CDI.KEYID = 6
14,471,318 UART: [afmc] SUBJECT.KEYID = 7
14,472,557 UART: [afmc] AUTHORITY.KEYID = 5
16,970,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,690,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,692,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,707,907 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,723,890 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,739,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,761,117 UART: [afmc] --
18,764,335 UART: [cold-reset] --
18,768,678 UART: [state] Locking Datavault
18,774,190 UART: [state] Locking PCR0, PCR1 and PCR31
18,775,920 UART: [state] Locking ICCM
18,778,133 UART: [exit] Launching FMC @ 0x40000130
18,786,529 UART:
18,786,763 UART: Running Caliptra FMC ...
18,787,862 UART:
18,788,042 UART: [state] CFI Enabled
18,795,822 UART: [fht] FMC Alias Private Key: 7
20,553,301 UART: [art] Extend RT PCRs Done
20,554,521 UART: [art] Lock RT PCRs Done
20,556,304 UART: [art] Populate DV Done
20,561,823 UART: [fht] FMC Alias Private Key: 7
20,563,522 UART: [art] Derive CDI
20,564,339 UART: [art] Store in in slot 0x4
20,606,723 UART: [art] Derive Key Pair
20,607,721 UART: [art] Store priv key in slot 0x5
23,033,722 UART: [art] Derive Key Pair - Done
23,046,989 UART: [art] Signing Cert with AUTHO
23,048,291 UART: RITY.KEYID = 7
24,753,509 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,012 UART: [art] PUB.X = AC537C1B680E9BC6039E070AF3FCA67E670B3BE6BA4C45075677A33AA832B418E0C3D42425D61A9EFEE4583A9A1B6B69
24,762,324 UART: [art] PUB.Y = F0D67BBD7236AD91D50B07A25AB92D0987D8E266CFB404064A4E5C0E63C05A050A15A6FEF6DB53A8C8294BFCC1F6A485
24,769,577 UART: [art] SIG.R = 27E204EACA7E131BDA5A0F5EAA48B21E39F1AB0629A93952A6B3805BB92D2420833CB67453911BDD9AD8D8A4CF5B8AB4
24,777,015 UART: [art] SIG.S = E490D9684D7205FD66BA4BA94CF2EF05FEC12DE0656D076A81871398C4EFCF78A6698C2582D9538FB674E230F56033FC
25,755,688 UART: Caliptra RT
25,756,391 UART: [state] CFI Enabled
25,872,966 UART: [rt] RT listening for mailbox commands...
25,876,934 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,921,823 UART: [rt]cmd =0x4c4d5356, len=1672
26,123,125 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,847 writing to cptra_bootfsm_go
3,696,072 ready_for_fw is high
3,696,450 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,272,719 >>> mbox cmd response: success
18,520,094 UART:
18,520,502 UART: Running Caliptra FMC ...
18,521,643 UART:
18,521,807 UART: [state] CFI Enabled
18,529,921 UART: [fht] FMC Alias Private Key: 7
20,286,960 UART: [art] Extend RT PCRs Done
20,288,216 UART: [art] Lock RT PCRs Done
20,290,033 UART: [art] Populate DV Done
20,295,456 UART: [fht] FMC Alias Private Key: 7
20,297,160 UART: [art] Derive CDI
20,297,978 UART: [art] Store in in slot 0x4
20,340,794 UART: [art] Derive Key Pair
20,341,838 UART: [art] Store priv key in slot 0x5
22,768,700 UART: [art] Derive Key Pair - Done
22,781,651 UART: [art] Signing Cert with AUTHO
22,782,998 UART: RITY.KEYID = 7
24,488,930 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,435 UART: [art] PUB.X = 81BEED46C55DBEA36F872CCC5DFF1B4F9C57F47777CB978EFF4B2C7C6779B0B4CA7E1D3D878536C17CDA76CC0E28E274
24,497,749 UART: [art] PUB.Y = E4DB6B3ABBEF424DF926C6FC507F369A710ED3F4048F9284F138E45E8F638E4D047E73B10F6A5549CD4B16ADC365554D
24,505,025 UART: [art] SIG.R = C1D6389845A6FD745D82E0FBCC502B2E127C1698D046624559E3352F203C4CF5F42C76E6EBB077F4AF20DDC4EFEA4298
24,512,370 UART: [art] SIG.S = 5E4661410ECE7C027CC188B0B38DD95425851012A4F2A1ED0B23E3807468C61C321C4B373D0560C2EF491DA9543899D2
25,490,938 UART: Caliptra RT
25,491,883 UART: [state] CFI Enabled
25,609,021 UART: [rt] RT listening for mailbox commands...
25,613,132 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,658,243 UART: [rt]cmd =0x4c4d5356, len=1672
25,859,720 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,034 UART:
192,412 UART: Running Caliptra ROM ...
193,540 UART:
193,710 UART: [state] CFI Enabled
263,790 UART: [state] LifecycleState = Unprovisioned
266,166 UART: [state] DebugLocked = No
267,837 UART: [state] WD Timer not started. Device not locked for debugging
272,475 UART: [kat] SHA2-256
462,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,063 UART: [kat] ++
473,714 UART: [kat] sha1
486,517 UART: [kat] SHA2-256
489,529 UART: [kat] SHA2-384
496,230 UART: [kat] SHA2-512-ACC
498,818 UART: [kat] ECC-384
2,945,832 UART: [kat] HMAC-384Kdf
2,971,077 UART: [kat] LMS
3,502,850 UART: [kat] --
3,507,300 UART: [cold-reset] ++
3,508,970 UART: [fht] FHT @ 0x50003400
3,520,875 UART: [idev] ++
3,521,589 UART: [idev] CDI.KEYID = 6
3,522,499 UART: [idev] SUBJECT.KEYID = 7
3,523,746 UART: [idev] UDS.KEYID = 0
3,524,688 ready_for_fw is high
3,524,912 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,561 UART: [idev] Erasing UDS.KEYID = 0
6,029,035 UART: [idev] Sha1 KeyId Algorithm
6,051,166 UART: [idev] --
6,056,632 UART: [ldev] ++
6,057,323 UART: [ldev] CDI.KEYID = 6
6,058,218 UART: [ldev] SUBJECT.KEYID = 5
6,059,439 UART: [ldev] AUTHORITY.KEYID = 7
6,060,664 UART: [ldev] FE.KEYID = 1
6,101,030 UART: [ldev] Erasing FE.KEYID = 1
8,607,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,026 UART: [ldev] --
10,414,914 UART: [fwproc] Wait for Commands...
10,418,037 UART: [fwproc] Recv command 0x46574c44
10,420,298 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,810 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,598,767 >>> mbox cmd response: success
14,602,353 UART: [afmc] ++
14,603,066 UART: [afmc] CDI.KEYID = 6
14,604,266 UART: [afmc] SUBJECT.KEYID = 7
14,605,735 UART: [afmc] AUTHORITY.KEYID = 5
17,149,198 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,195 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,105 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,422 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,879 UART: [afmc] --
18,949,749 UART: [cold-reset] --
18,953,300 UART: [state] Locking Datavault
18,959,603 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,767 UART: [state] Locking ICCM
18,964,679 UART: [exit] Launching FMC @ 0x40000130
18,973,318 UART:
18,973,560 UART: Running Caliptra FMC ...
18,974,660 UART:
18,974,838 UART: [state] CFI Enabled
19,030,061 UART: [fht] FMC Alias Private Key: 7
20,794,629 UART: [art] Extend RT PCRs Done
20,795,854 UART: [art] Lock RT PCRs Done
20,797,642 UART: [art] Populate DV Done
20,803,271 UART: [fht] FMC Alias Private Key: 7
20,804,810 UART: [art] Derive CDI
20,805,571 UART: [art] Store in in slot 0x4
20,863,098 UART: [art] Derive Key Pair
20,864,145 UART: [art] Store priv key in slot 0x5
23,327,132 UART: [art] Derive Key Pair - Done
23,340,186 UART: [art] Signing Cert with AUTHO
23,341,492 UART: RITY.KEYID = 7
25,053,124 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,637 UART: [art] PUB.X = 55E063597F9646C698021103351661CABDD301A37893258AD591B1ACFAF4439531C80D15387AD87B89778423A5105EC0
25,061,857 UART: [art] PUB.Y = 344DE0D30D21F55B02004257041D8E4B3977FF3EE48CB17A5D3DC1C7AA7B1CF1A702CB8382C36544C0F50B6DEE141F8C
25,069,146 UART: [art] SIG.R = 2E424C41643C2635642C3388F985398AF8ABDE721E42D928A8D45B9F3B8DB008B2B5B9772C9F902F17020A4B132CA2DE
25,076,557 UART: [art] SIG.S = 533A955AB69D32AB8CECA2EB1EAA480FAE21A5C4CBFBE5036534A3FEB11147983DB5E885C90264CF20002280F9F5C132
26,055,038 UART: Caliptra RT
26,055,792 UART: [state] CFI Enabled
26,220,554 UART: [rt] RT listening for mailbox commands...
26,224,514 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,269,504 UART: [rt]cmd =0x4c4d5356, len=1672
26,470,720 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,438,788 ready_for_fw is high
3,439,199 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,734,811 >>> mbox cmd response: success
19,047,829 UART:
19,048,240 UART: Running Caliptra FMC ...
19,049,356 UART:
19,049,511 UART: [state] CFI Enabled
19,113,640 UART: [fht] FMC Alias Private Key: 7
20,878,396 UART: [art] Extend RT PCRs Done
20,879,624 UART: [art] Lock RT PCRs Done
20,881,332 UART: [art] Populate DV Done
20,886,696 UART: [fht] FMC Alias Private Key: 7
20,888,236 UART: [art] Derive CDI
20,889,001 UART: [art] Store in in slot 0x4
20,945,993 UART: [art] Derive Key Pair
20,947,036 UART: [art] Store priv key in slot 0x5
23,409,909 UART: [art] Derive Key Pair - Done
23,423,085 UART: [art] Signing Cert with AUTHO
23,424,397 UART: RITY.KEYID = 7
25,135,680 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,199 UART: [art] PUB.X = AFEAC55D2874A298BA624B5254379AD44531F8CA1A2910C44D99F67FA1F435FCB51A7C1A7D8E96173EB914F66B85149C
25,144,439 UART: [art] PUB.Y = 8C466D16237546EDBF6D90D680BAEAA01A28477915EDBACF0BF13B4115C6AC44B27C10058F2DAC4A19CC690436AA6A0B
25,151,710 UART: [art] SIG.R = 942870996F673857F99504C2140736FBDDE99E10BB8DA27555521DCE9D0BEFFB3F083C50FB41E0EB17F966FDE9FAA186
25,159,094 UART: [art] SIG.S = CCBCE297D78C6737E0C44D4BFBA9CF149C81612929C2CA54BE2572CA212F2BD055198390BB7AEAA3641DECFDF3E868D2
26,138,799 UART: Caliptra RT
26,139,512 UART: [state] CFI Enabled
26,303,349 UART: [rt] RT listening for mailbox commands...
26,307,327 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,352,129 UART: [rt]cmd =0x4c4d5356, len=1672
26,553,331 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,662 writing to cptra_bootfsm_go
192,988 UART:
193,359 UART: Running Caliptra ROM ...
194,566 UART:
604,362 UART: [state] CFI Enabled
616,669 UART: [state] LifecycleState = Unprovisioned
619,046 UART: [state] DebugLocked = No
621,571 UART: [state] WD Timer not started. Device not locked for debugging
625,742 UART: [kat] SHA2-256
815,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,407 UART: [kat] ++
827,004 UART: [kat] sha1
838,743 UART: [kat] SHA2-256
841,746 UART: [kat] SHA2-384
847,966 UART: [kat] SHA2-512-ACC
850,556 UART: [kat] ECC-384
3,291,267 UART: [kat] HMAC-384Kdf
3,305,065 UART: [kat] LMS
3,836,913 UART: [kat] --
3,839,523 UART: [cold-reset] ++
3,841,417 UART: [fht] FHT @ 0x50003400
3,853,973 UART: [idev] ++
3,854,613 UART: [idev] CDI.KEYID = 6
3,855,650 UART: [idev] SUBJECT.KEYID = 7
3,856,753 UART: [idev] UDS.KEYID = 0
3,857,688 ready_for_fw is high
3,857,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,289 UART: [idev] Erasing UDS.KEYID = 0
6,334,576 UART: [idev] Sha1 KeyId Algorithm
6,356,083 UART: [idev] --
6,360,905 UART: [ldev] ++
6,361,589 UART: [ldev] CDI.KEYID = 6
6,362,504 UART: [ldev] SUBJECT.KEYID = 5
6,363,662 UART: [ldev] AUTHORITY.KEYID = 7
6,364,896 UART: [ldev] FE.KEYID = 1
6,377,267 UART: [ldev] Erasing FE.KEYID = 1
8,852,579 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,469 UART: [ldev] --
10,644,316 UART: [fwproc] Wait for Commands...
10,646,091 UART: [fwproc] Recv command 0x46574c44
10,648,403 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,736 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,085 >>> mbox cmd response: success
14,836,916 UART: [afmc] ++
14,837,624 UART: [afmc] CDI.KEYID = 6
14,838,868 UART: [afmc] SUBJECT.KEYID = 7
14,840,301 UART: [afmc] AUTHORITY.KEYID = 5
17,347,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,755 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,964 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,062 UART: [afmc] --
19,144,397 UART: [cold-reset] --
19,149,615 UART: [state] Locking Datavault
19,154,839 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,037 UART: [state] Locking ICCM
19,158,386 UART: [exit] Launching FMC @ 0x40000130
19,167,063 UART:
19,167,303 UART: Running Caliptra FMC ...
19,168,404 UART:
19,168,569 UART: [state] CFI Enabled
19,176,294 UART: [fht] FMC Alias Private Key: 7
20,933,336 UART: [art] Extend RT PCRs Done
20,934,569 UART: [art] Lock RT PCRs Done
20,935,842 UART: [art] Populate DV Done
20,941,157 UART: [fht] FMC Alias Private Key: 7
20,942,859 UART: [art] Derive CDI
20,943,680 UART: [art] Store in in slot 0x4
20,985,972 UART: [art] Derive Key Pair
20,987,013 UART: [art] Store priv key in slot 0x5
23,413,974 UART: [art] Derive Key Pair - Done
23,426,753 UART: [art] Signing Cert with AUTHO
23,428,052 UART: RITY.KEYID = 7
25,133,826 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,336 UART: [art] PUB.X = 2DA2D672A69C61B24AC8256A50B7790D4A5A5D24F13F430978B4571E23D9ECE5624E6863B37A2F5BFE87138CF2267382
25,142,581 UART: [art] PUB.Y = 10AC17D8ED6C78095D94D13F19E64D5EF88C36970978F85EA95E0547BDA24A4BB899F5289BAEF4BBF37AB39F77C4327C
25,149,872 UART: [art] SIG.R = AC33DD0B93C70D0CFFCD480EAD2192AFB4B913BA512DECF6FD453594B2662F45319D58281EDB6891CF8D6CDFDE25E06E
25,157,266 UART: [art] SIG.S = F3CB5A7E2DA19F22A6E56F9497A2EB0B14299374FE24E90245314606B92982E0DC109B73B8051F4BA6E5954678CB6380
26,135,784 UART: Caliptra RT
26,136,486 UART: [state] CFI Enabled
26,254,586 UART: [rt] RT listening for mailbox commands...
26,258,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,303,535 UART: [rt]cmd =0x4c4d5356, len=1672
26,504,824 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,571 writing to cptra_bootfsm_go
3,754,022 ready_for_fw is high
3,754,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,947 >>> mbox cmd response: success
19,212,249 UART:
19,212,662 UART: Running Caliptra FMC ...
19,213,795 UART:
19,213,960 UART: [state] CFI Enabled
19,221,973 UART: [fht] FMC Alias Private Key: 7
20,979,319 UART: [art] Extend RT PCRs Done
20,980,554 UART: [art] Lock RT PCRs Done
20,982,127 UART: [art] Populate DV Done
20,987,328 UART: [fht] FMC Alias Private Key: 7
20,988,865 UART: [art] Derive CDI
20,989,681 UART: [art] Store in in slot 0x4
21,032,297 UART: [art] Derive Key Pair
21,033,343 UART: [art] Store priv key in slot 0x5
23,459,805 UART: [art] Derive Key Pair - Done
23,472,427 UART: [art] Signing Cert with AUTHO
23,473,726 UART: RITY.KEYID = 7
25,179,174 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,684 UART: [art] PUB.X = 4F43BC11C7DAA02E322568279927FE43F44B6440BE74DE4D25D6D41E9667382E51D37131D411F68E7935C01D219C3BE3
25,187,930 UART: [art] PUB.Y = 2B73CEF4C22A46A4B5B89077B2248A36022C50AEF9EAE9F7884AC6949F1F911D11740A6E9822B23D07F9131C3673C70C
25,195,164 UART: [art] SIG.R = 637E306194B6F271795C699BF00FDBCECC8A4CC55E5F5D682DABE1217F04F1CC5518710319B3E11D90B43203BEE6FF79
25,202,566 UART: [art] SIG.S = 0A666C5973F56A354218E98B8E09ABE360431F50DD3B127E7A17F133624EA303821A2FD68128312E78FEAF515B625C59
26,181,650 UART: Caliptra RT
26,182,366 UART: [state] CFI Enabled
26,299,601 UART: [rt] RT listening for mailbox commands...
26,303,589 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,348,638 UART: [rt]cmd =0x4c4d5356, len=1672
26,549,556 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,901 UART: [kat] SHA2-256
881,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,947 UART: [kat] ++
886,099 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
895,116 UART: [kat] SHA2-512-ACC
897,017 UART: [kat] ECC-384
902,692 UART: [kat] HMAC-384Kdf
907,238 UART: [kat] LMS
1,475,434 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,737 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 ready_for_fw is high
1,480,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,126 UART: [idev] Erasing UDS.KEYID = 0
1,504,720 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,268 UART: [idev] --
1,514,291 UART: [ldev] ++
1,514,459 UART: [ldev] CDI.KEYID = 6
1,514,822 UART: [ldev] SUBJECT.KEYID = 5
1,515,248 UART: [ldev] AUTHORITY.KEYID = 7
1,515,711 UART: [ldev] FE.KEYID = 1
1,520,839 UART: [ldev] Erasing FE.KEYID = 1
1,545,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,840 UART: [ldev] --
1,585,299 UART: [fwproc] Waiting for Commands...
1,585,984 UART: [fwproc] Received command 0x46574c44
1,586,775 UART: [fwproc] Received Image of size 114168 bytes
2,883,263 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,281 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,322 >>> mbox cmd response: success
3,076,372 UART: [afmc] ++
3,076,540 UART: [afmc] CDI.KEYID = 6
3,076,902 UART: [afmc] SUBJECT.KEYID = 7
3,077,327 UART: [afmc] AUTHORITY.KEYID = 5
3,112,374 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,638 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,418 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,146 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,031 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,721 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,598 UART: [afmc] --
3,155,640 UART: [cold-reset] --
3,156,628 UART: [state] Locking Datavault
3,158,095 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,699 UART: [state] Locking ICCM
3,159,355 UART: [exit] Launching FMC @ 0x40000130
3,164,684 UART:
3,164,700 UART: Running Caliptra FMC ...
3,165,108 UART:
3,165,162 UART: [state] CFI Enabled
3,175,707 UART: [fht] FMC Alias Private Key: 7
3,284,090 UART: [art] Extend RT PCRs Done
3,284,518 UART: [art] Lock RT PCRs Done
3,286,208 UART: [art] Populate DV Done
3,294,637 UART: [fht] FMC Alias Private Key: 7
3,295,749 UART: [art] Derive CDI
3,296,029 UART: [art] Store in in slot 0x4
3,381,670 UART: [art] Derive Key Pair
3,382,030 UART: [art] Store priv key in slot 0x5
3,394,882 UART: [art] Derive Key Pair - Done
3,409,732 UART: [art] Signing Cert with AUTHO
3,410,212 UART: RITY.KEYID = 7
3,425,344 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,109 UART: [art] PUB.X = 9B3948BE5A642CACB943AD0AEEEDDB3C4325F2AD8DBC37ED3DD5470E016AB5521C0C607D7B2D089C19A3C1D7A8E6C77B
3,432,890 UART: [art] PUB.Y = A3203212BDD33DFC5EB0CEADCD84FE4AFF3E9F7E548A09220527A66F984A97045D42DD9A40733C3057A2903F748B1EC9
3,439,843 UART: [art] SIG.R = 2E668E459A9F9DF58AE0931D46B9D6DF749480E3DF2D3DE536241FAB3AC0AC8874CC91A70ABCAF2E09385AF638E90E79
3,446,620 UART: [art] SIG.S = 0BAC72A9F274F88036773797E4FEB1EF4454CAC97574DE3CA5FE48F64E13EEC51728B032577D81CC0DDD168533954C93
3,470,585 UART: Caliptra RT
3,470,838 UART: [state] CFI Enabled
3,579,140 UART: [rt] RT listening for mailbox commands...
3,579,810 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,366 UART: [rt]cmd =0x4c4d5356, len=1672
3,872,670 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,675 ready_for_fw is high
1,362,675 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,304 >>> mbox cmd response: success
2,989,114 UART:
2,989,130 UART: Running Caliptra FMC ...
2,989,538 UART:
2,989,592 UART: [state] CFI Enabled
3,000,187 UART: [fht] FMC Alias Private Key: 7
3,108,590 UART: [art] Extend RT PCRs Done
3,109,018 UART: [art] Lock RT PCRs Done
3,110,168 UART: [art] Populate DV Done
3,118,281 UART: [fht] FMC Alias Private Key: 7
3,119,209 UART: [art] Derive CDI
3,119,489 UART: [art] Store in in slot 0x4
3,205,508 UART: [art] Derive Key Pair
3,205,868 UART: [art] Store priv key in slot 0x5
3,218,876 UART: [art] Derive Key Pair - Done
3,233,838 UART: [art] Signing Cert with AUTHO
3,234,318 UART: RITY.KEYID = 7
3,249,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,009 UART: [art] PUB.X = 208E0776BB7BF03D9A701A0D36DA5A2EA48F009C35E88C8D1B25A54DA5390CF4BB61D31D167EC5A616453109621EDA63
3,256,753 UART: [art] PUB.Y = CC7F48AB49F033378D00E99EF719DA8ACAB4CC0BCAEF0A2E64A806D4DEDC9A6E67272B2B7581689EF60F8F5B2C9320AD
3,263,693 UART: [art] SIG.R = 90D24862DAE666801D69B94775431405958F97AB059675DAA3F00740B13F98E38D7F8926F1F75469A03F6A0618CD8F90
3,270,441 UART: [art] SIG.S = 8BCBA44D26EA9A91DD331B3FB1E9E17C434E4BFA54D82E2E133798C08C6768204C05C25BEF89C11A8842EFFFE44BBA19
3,294,645 UART: Caliptra RT
3,294,898 UART: [state] CFI Enabled
3,402,854 UART: [rt] RT listening for mailbox commands...
3,403,524 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,474 UART: [rt]cmd =0x4c4d5356, len=1672
3,696,724 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,445 UART: [kat] SHA2-512-ACC
897,346 UART: [kat] ECC-384
902,903 UART: [kat] HMAC-384Kdf
907,429 UART: [kat] LMS
1,475,625 UART: [kat] --
1,476,618 UART: [cold-reset] ++
1,476,990 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 ready_for_fw is high
1,480,938 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,785 UART: [idev] Erasing UDS.KEYID = 0
1,505,447 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,023 UART: [idev] --
1,515,026 UART: [ldev] ++
1,515,194 UART: [ldev] CDI.KEYID = 6
1,515,557 UART: [ldev] SUBJECT.KEYID = 5
1,515,983 UART: [ldev] AUTHORITY.KEYID = 7
1,516,446 UART: [ldev] FE.KEYID = 1
1,521,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,143 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,263 UART: [ldev] --
1,586,646 UART: [fwproc] Waiting for Commands...
1,587,371 UART: [fwproc] Received command 0x46574c44
1,588,162 UART: [fwproc] Received Image of size 114168 bytes
2,885,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,188 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,540 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,065 >>> mbox cmd response: success
3,079,091 UART: [afmc] ++
3,079,259 UART: [afmc] CDI.KEYID = 6
3,079,621 UART: [afmc] SUBJECT.KEYID = 7
3,080,046 UART: [afmc] AUTHORITY.KEYID = 5
3,115,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,597 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,990 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,680 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,627 UART: [afmc] --
3,158,629 UART: [cold-reset] --
3,159,471 UART: [state] Locking Datavault
3,160,724 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,328 UART: [state] Locking ICCM
3,161,794 UART: [exit] Launching FMC @ 0x40000130
3,167,123 UART:
3,167,139 UART: Running Caliptra FMC ...
3,167,547 UART:
3,167,690 UART: [state] CFI Enabled
3,178,031 UART: [fht] FMC Alias Private Key: 7
3,286,792 UART: [art] Extend RT PCRs Done
3,287,220 UART: [art] Lock RT PCRs Done
3,288,666 UART: [art] Populate DV Done
3,296,983 UART: [fht] FMC Alias Private Key: 7
3,297,933 UART: [art] Derive CDI
3,298,213 UART: [art] Store in in slot 0x4
3,384,054 UART: [art] Derive Key Pair
3,384,414 UART: [art] Store priv key in slot 0x5
3,397,754 UART: [art] Derive Key Pair - Done
3,413,068 UART: [art] Signing Cert with AUTHO
3,413,548 UART: RITY.KEYID = 7
3,429,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,823 UART: [art] PUB.X = 94B5880EF0B7ED73E236F2F6768578A463CC4EB0E2D1BB4F4E13D762FE459F5E335BD6199D244CC2C6DD5DDBBE684766
3,436,604 UART: [art] PUB.Y = 8A0E3FF1ACE6D795D6469F1FAB21ADCA5ABD3563636A1EB02EAD1DE72726F3768F8CE3E15DBCF881DE7D42F893ABC43F
3,443,579 UART: [art] SIG.R = 7E8F7E02C4E21838977289EF1808C67540535EBC25AA437C649240E6996E3D5229F2D5D753998B0FCFA30D069DD934BE
3,450,332 UART: [art] SIG.S = 36212BFA2A7616D8962ACD7C475F666F676E3CF4D2732367F2B573078A698EDAFF4243EB135D28F43A99AFF18AF6B80E
3,473,897 UART: Caliptra RT
3,474,242 UART: [state] CFI Enabled
3,582,560 UART: [rt] RT listening for mailbox commands...
3,583,230 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,840 UART: [rt]cmd =0x4c4d5356, len=1672
3,876,206 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,468 ready_for_fw is high
1,362,468 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,401 >>> mbox cmd response: success
2,987,919 UART:
2,987,935 UART: Running Caliptra FMC ...
2,988,343 UART:
2,988,486 UART: [state] CFI Enabled
2,998,839 UART: [fht] FMC Alias Private Key: 7
3,106,274 UART: [art] Extend RT PCRs Done
3,106,702 UART: [art] Lock RT PCRs Done
3,108,252 UART: [art] Populate DV Done
3,116,425 UART: [fht] FMC Alias Private Key: 7
3,117,547 UART: [art] Derive CDI
3,117,827 UART: [art] Store in in slot 0x4
3,203,688 UART: [art] Derive Key Pair
3,204,048 UART: [art] Store priv key in slot 0x5
3,217,216 UART: [art] Derive Key Pair - Done
3,232,182 UART: [art] Signing Cert with AUTHO
3,232,662 UART: RITY.KEYID = 7
3,247,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,381 UART: [art] PUB.X = DA903CA9E7AF44C6B21BA4555970D6ECB7531A4D6B21CBD72AF8115A613B5B68F3E8407FBD9E5646B171234B0CAFD8D6
3,255,164 UART: [art] PUB.Y = FDED27C5934480A47E4CA446F1B611777A471C72CE54A65ED57A857B05BF0A2DA563D62E9D0091282FC8F93DD1EB8F3E
3,262,098 UART: [art] SIG.R = 334651E1B85D49CC3B25D40D5125A0C6902F34269415E7ADE587F85292D016771E9683F2EE50376AB39BEF06A0FB9B21
3,268,860 UART: [art] SIG.S = 44D0CB7202E413100D25F919A146050BEE34CB7C243A7D1C8E3BDB116BDC513B7F2536B70278B38F23DBB38DD2FCE247
3,292,312 UART: Caliptra RT
3,292,657 UART: [state] CFI Enabled
3,401,311 UART: [rt] RT listening for mailbox commands...
3,401,981 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,677 UART: [rt]cmd =0x4c4d5356, len=1672
3,695,135 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,449 UART: [kat] SHA2-256
903,389 UART: [kat] SHA2-384
906,170 UART: [kat] SHA2-512-ACC
908,071 UART: [kat] ECC-384
917,872 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,171,495 UART: [cold-reset] ++
1,171,981 UART: [fht] FHT @ 0x50003400
1,174,758 UART: [idev] ++
1,174,926 UART: [idev] CDI.KEYID = 6
1,175,286 UART: [idev] SUBJECT.KEYID = 7
1,175,710 UART: [idev] UDS.KEYID = 0
1,176,055 ready_for_fw is high
1,176,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,842 UART: [idev] Erasing UDS.KEYID = 0
1,201,425 UART: [idev] Sha1 KeyId Algorithm
1,209,763 UART: [idev] --
1,210,861 UART: [ldev] ++
1,211,029 UART: [ldev] CDI.KEYID = 6
1,211,392 UART: [ldev] SUBJECT.KEYID = 5
1,211,818 UART: [ldev] AUTHORITY.KEYID = 7
1,212,281 UART: [ldev] FE.KEYID = 1
1,217,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,105 UART: [ldev] --
1,283,428 UART: [fwproc] Wait for Commands...
1,284,130 UART: [fwproc] Recv command 0x46574c44
1,284,858 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,933 >>> mbox cmd response: success
2,773,187 UART: [afmc] ++
2,773,355 UART: [afmc] CDI.KEYID = 6
2,773,717 UART: [afmc] SUBJECT.KEYID = 7
2,774,142 UART: [afmc] AUTHORITY.KEYID = 5
2,809,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,006 UART: [afmc] --
2,853,056 UART: [cold-reset] --
2,854,120 UART: [state] Locking Datavault
2,855,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,053 UART: [state] Locking ICCM
2,856,709 UART: [exit] Launching FMC @ 0x40000130
2,862,038 UART:
2,862,054 UART: Running Caliptra FMC ...
2,862,462 UART:
2,862,516 UART: [state] CFI Enabled
2,872,961 UART: [fht] FMC Alias Private Key: 7
2,981,630 UART: [art] Extend RT PCRs Done
2,982,058 UART: [art] Lock RT PCRs Done
2,983,612 UART: [art] Populate DV Done
2,991,659 UART: [fht] FMC Alias Private Key: 7
2,992,797 UART: [art] Derive CDI
2,993,077 UART: [art] Store in in slot 0x4
3,078,876 UART: [art] Derive Key Pair
3,079,236 UART: [art] Store priv key in slot 0x5
3,092,100 UART: [art] Derive Key Pair - Done
3,106,751 UART: [art] Signing Cert with AUTHO
3,107,231 UART: RITY.KEYID = 7
3,122,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,032 UART: [art] PUB.X = 948E1C12E9118E566B0AA690BB3AD1109A1234048AED9E3B71A9CA7F94826E75FB0A9F8CAA430050056304AD425D548E
3,129,769 UART: [art] PUB.Y = B74674897AB042AC9321542AFB5C54C0428566184DACCB10DB999F37A3A005DF763CF56386A83364C3805BAA3C6BE668
3,136,718 UART: [art] SIG.R = E2096D29C5798331EDFBB1BCA280B418E3F3C1092C7A297EF30AF0E622EAA75A5AF6CA11A22DACF58E1E28738257FB87
3,143,495 UART: [art] SIG.S = 089147DC45EA73BEEE0D801118A264E0477B3546845F5DCCE43A243A803F05ADB795951F6411C427AB8B226574397411
3,167,815 UART: Caliptra RT
3,168,068 UART: [state] CFI Enabled
3,276,101 UART: [rt] RT listening for mailbox commands...
3,276,771 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,379 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,657 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,407 ready_for_fw is high
1,060,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,414 >>> mbox cmd response: success
2,684,332 UART:
2,684,348 UART: Running Caliptra FMC ...
2,684,756 UART:
2,684,810 UART: [state] CFI Enabled
2,695,137 UART: [fht] FMC Alias Private Key: 7
2,803,058 UART: [art] Extend RT PCRs Done
2,803,486 UART: [art] Lock RT PCRs Done
2,804,904 UART: [art] Populate DV Done
2,813,137 UART: [fht] FMC Alias Private Key: 7
2,814,065 UART: [art] Derive CDI
2,814,345 UART: [art] Store in in slot 0x4
2,900,304 UART: [art] Derive Key Pair
2,900,664 UART: [art] Store priv key in slot 0x5
2,913,808 UART: [art] Derive Key Pair - Done
2,928,574 UART: [art] Signing Cert with AUTHO
2,929,054 UART: RITY.KEYID = 7
2,944,542 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,307 UART: [art] PUB.X = 698487560CACD735FC66CEFBEE08D90555A31B569BFBC38E73418899C3AE0EF2EEB4609AEBF2D36A328451429B93E283
2,952,075 UART: [art] PUB.Y = 4AFC59C0D58717D821D963D5068FB1E5B7D51E4AC55E2AADFABD8B56D5A11FC552FE29BFF0935E541BC2F2087F9D58A4
2,959,039 UART: [art] SIG.R = 6FB15CB5AC3775311198C823B113E6C0ACCC7CEF4BA3FDB503E7B64D10BD90AC175092040334798FB6E957010D84BBA3
2,965,804 UART: [art] SIG.S = 32D6BC1C7D0EF9528F1E3EE18D4D3E6383E245B399B96AB971D28E7CDFD25EF215608519D760D62E156E0520A9857DC8
2,989,759 UART: Caliptra RT
2,990,012 UART: [state] CFI Enabled
3,097,519 UART: [rt] RT listening for mailbox commands...
3,098,189 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,681 UART: [rt]cmd =0x4c4d5356, len=1672
3,391,151 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,209 UART: [kat] SHA2-256
893,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,984 UART: [kat] ++
898,136 UART: [kat] sha1
902,462 UART: [kat] SHA2-256
904,402 UART: [kat] SHA2-384
907,283 UART: [kat] SHA2-512-ACC
909,184 UART: [kat] ECC-384
919,179 UART: [kat] HMAC-384Kdf
923,661 UART: [kat] LMS
1,171,989 UART: [kat] --
1,173,010 UART: [cold-reset] ++
1,173,470 UART: [fht] FHT @ 0x50003400
1,176,285 UART: [idev] ++
1,176,453 UART: [idev] CDI.KEYID = 6
1,176,813 UART: [idev] SUBJECT.KEYID = 7
1,177,237 UART: [idev] UDS.KEYID = 0
1,177,582 ready_for_fw is high
1,177,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,381 UART: [idev] Erasing UDS.KEYID = 0
1,202,630 UART: [idev] Sha1 KeyId Algorithm
1,210,940 UART: [idev] --
1,212,042 UART: [ldev] ++
1,212,210 UART: [ldev] CDI.KEYID = 6
1,212,573 UART: [ldev] SUBJECT.KEYID = 5
1,212,999 UART: [ldev] AUTHORITY.KEYID = 7
1,213,462 UART: [ldev] FE.KEYID = 1
1,218,432 UART: [ldev] Erasing FE.KEYID = 1
1,244,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,730 UART: [ldev] --
1,284,237 UART: [fwproc] Wait for Commands...
1,285,015 UART: [fwproc] Recv command 0x46574c44
1,285,743 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,357 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,010 >>> mbox cmd response: success
2,776,062 UART: [afmc] ++
2,776,230 UART: [afmc] CDI.KEYID = 6
2,776,592 UART: [afmc] SUBJECT.KEYID = 7
2,777,017 UART: [afmc] AUTHORITY.KEYID = 5
2,812,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,855 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,468 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,187 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,965 UART: [afmc] --
2,855,895 UART: [cold-reset] --
2,856,891 UART: [state] Locking Datavault
2,858,118 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,722 UART: [state] Locking ICCM
2,859,352 UART: [exit] Launching FMC @ 0x40000130
2,864,681 UART:
2,864,697 UART: Running Caliptra FMC ...
2,865,105 UART:
2,865,248 UART: [state] CFI Enabled
2,875,649 UART: [fht] FMC Alias Private Key: 7
2,983,740 UART: [art] Extend RT PCRs Done
2,984,168 UART: [art] Lock RT PCRs Done
2,985,630 UART: [art] Populate DV Done
2,993,979 UART: [fht] FMC Alias Private Key: 7
2,995,045 UART: [art] Derive CDI
2,995,325 UART: [art] Store in in slot 0x4
3,081,316 UART: [art] Derive Key Pair
3,081,676 UART: [art] Store priv key in slot 0x5
3,094,442 UART: [art] Derive Key Pair - Done
3,109,252 UART: [art] Signing Cert with AUTHO
3,109,732 UART: RITY.KEYID = 7
3,124,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,695 UART: [art] PUB.X = 6753F72E883BAFCE5E81B25BB254D75CF32C011483B263F46F263B87E31FB44457A7D41357BD0AEBAE8FB83E9AF0337E
3,132,471 UART: [art] PUB.Y = 81EE8D7DF72FDC1ADDFCD00E7AD773153F9753194F322173D00129500C6E7C5E75E8FA60D201429B46D530909EEDCB92
3,139,417 UART: [art] SIG.R = DDD64137772A5396752370A1337938EBCBEBC0C922C2C64193F3302518356ACDFC828CC0C44418738DAC6E91A31BF3D2
3,146,189 UART: [art] SIG.S = 6360925254042694006AFBD2A757C0D71537AD418C0FE2909165F946BF41CE763D91DAC0D4E730A6AB5FE4E724D8003F
3,169,378 UART: Caliptra RT
3,169,723 UART: [state] CFI Enabled
3,277,448 UART: [rt] RT listening for mailbox commands...
3,278,118 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,548 UART: [rt]cmd =0x4c4d5356, len=1672
3,570,784 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,948 ready_for_fw is high
1,060,948 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,619 >>> mbox cmd response: success
2,686,047 UART:
2,686,063 UART: Running Caliptra FMC ...
2,686,471 UART:
2,686,614 UART: [state] CFI Enabled
2,697,323 UART: [fht] FMC Alias Private Key: 7
2,805,278 UART: [art] Extend RT PCRs Done
2,805,706 UART: [art] Lock RT PCRs Done
2,807,296 UART: [art] Populate DV Done
2,815,511 UART: [fht] FMC Alias Private Key: 7
2,816,561 UART: [art] Derive CDI
2,816,841 UART: [art] Store in in slot 0x4
2,902,252 UART: [art] Derive Key Pair
2,902,612 UART: [art] Store priv key in slot 0x5
2,916,072 UART: [art] Derive Key Pair - Done
2,931,347 UART: [art] Signing Cert with AUTHO
2,931,827 UART: RITY.KEYID = 7
2,947,239 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,004 UART: [art] PUB.X = 233E47A70C75539282F3A3FDE0B621DC0BC35681B1C4E54A87EF13399C9CF81F959030DA171FDBA056F99E18D97394D2
2,954,772 UART: [art] PUB.Y = C6448D90A79B0362557D8BE98B50F06AFA0C4B749DA260B119A0051C049F7B978C1875DC333BBF2AA45239D87A482CB6
2,961,714 UART: [art] SIG.R = 657B4528C5B66D5E625664DC5B2AB94A3E64250137E499B405B44CDCDB2B33446BA068A955038B933753D038828FCC22
2,968,471 UART: [art] SIG.S = 94AA46DE5F9E76F012CE37632D4221CBF12D74667E944F8C15811381922FE973883F6BDAEACEC4DB028A1E5EE9D97A5D
2,992,347 UART: Caliptra RT
2,992,692 UART: [state] CFI Enabled
3,101,415 UART: [rt] RT listening for mailbox commands...
3,102,085 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,619 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,407 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,170,021 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,167 UART: [idev] ++
1,173,335 UART: [idev] CDI.KEYID = 6
1,173,696 UART: [idev] SUBJECT.KEYID = 7
1,174,121 UART: [idev] UDS.KEYID = 0
1,174,467 ready_for_fw is high
1,174,467 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,207,495 UART: [idev] --
1,208,424 UART: [ldev] ++
1,208,592 UART: [ldev] CDI.KEYID = 6
1,208,956 UART: [ldev] SUBJECT.KEYID = 5
1,209,383 UART: [ldev] AUTHORITY.KEYID = 7
1,209,846 UART: [ldev] FE.KEYID = 1
1,215,118 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,552 UART: [fwproc] Wait for Commands...
1,281,353 UART: [fwproc] Recv command 0x46574c44
1,282,086 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,921 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,429 >>> mbox cmd response: success
2,770,484 UART: [afmc] ++
2,770,652 UART: [afmc] CDI.KEYID = 6
2,771,015 UART: [afmc] SUBJECT.KEYID = 7
2,771,441 UART: [afmc] AUTHORITY.KEYID = 5
2,806,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,831 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,550 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,261 UART: [afmc] --
2,849,261 UART: [cold-reset] --
2,850,251 UART: [state] Locking Datavault
2,851,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,768 UART: [state] Locking ICCM
2,852,404 UART: [exit] Launching FMC @ 0x40000130
2,857,733 UART:
2,857,749 UART: Running Caliptra FMC ...
2,858,157 UART:
2,858,211 UART: [state] CFI Enabled
2,868,602 UART: [fht] FMC Alias Private Key: 7
2,976,717 UART: [art] Extend RT PCRs Done
2,977,145 UART: [art] Lock RT PCRs Done
2,978,691 UART: [art] Populate DV Done
2,986,986 UART: [fht] FMC Alias Private Key: 7
2,988,140 UART: [art] Derive CDI
2,988,420 UART: [art] Store in in slot 0x4
3,073,711 UART: [art] Derive Key Pair
3,074,071 UART: [art] Store priv key in slot 0x5
3,087,057 UART: [art] Derive Key Pair - Done
3,101,756 UART: [art] Signing Cert with AUTHO
3,102,236 UART: RITY.KEYID = 7
3,117,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,317 UART: [art] PUB.X = 8AD7A8C49EFE343C1EF14E0BB9D85743B7BF60643AABEFD75738C812B549DE5C7A7C7E03AC980E42E5F8BF0D023A67D2
3,125,092 UART: [art] PUB.Y = 5E96087E80DFFE9709664910BD07880C4CC51CFC416BA99B1B74173BF6205A5E72CD38EFFDB7E9599D4AACCF16B9FEF9
3,132,048 UART: [art] SIG.R = 4EA170409364B5876196018A9039A7EA4BF6C41B15D28DADC594D7A1FBA0DD34A3880859ED7EC375C15AEBA3D72E66E0
3,138,822 UART: [art] SIG.S = 570531843EA020B5615093E04B35D9CE2A1D6EBE43A9E07CAEE7A6E53859AA623808986801ECBCCCAA464BEA5326FBE3
3,162,430 UART: Caliptra RT
3,162,683 UART: [state] CFI Enabled
3,268,978 UART: [rt] RT listening for mailbox commands...
3,269,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,960 UART: [rt]cmd =0x4c4d5356, len=1672
3,562,334 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,280 ready_for_fw is high
1,056,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,359 >>> mbox cmd response: success
2,683,693 UART:
2,683,709 UART: Running Caliptra FMC ...
2,684,117 UART:
2,684,171 UART: [state] CFI Enabled
2,694,530 UART: [fht] FMC Alias Private Key: 7
2,802,455 UART: [art] Extend RT PCRs Done
2,802,883 UART: [art] Lock RT PCRs Done
2,804,425 UART: [art] Populate DV Done
2,812,432 UART: [fht] FMC Alias Private Key: 7
2,813,606 UART: [art] Derive CDI
2,813,886 UART: [art] Store in in slot 0x4
2,899,893 UART: [art] Derive Key Pair
2,900,253 UART: [art] Store priv key in slot 0x5
2,913,299 UART: [art] Derive Key Pair - Done
2,927,770 UART: [art] Signing Cert with AUTHO
2,928,250 UART: RITY.KEYID = 7
2,943,178 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,943 UART: [art] PUB.X = 1663825267C3767D94DFBBD82D2BADC355172241820F462AF54217F2A9E6BD116861010CA0AB559A8A81B52F09CED686
2,950,701 UART: [art] PUB.Y = 91F2314F3A31487E5F8A4DDABA9E97FCE9C64E43BC74C5E99FC5562C01B7312F845D12716A56018BF9BD996A5B8E4F22
2,957,655 UART: [art] SIG.R = 37AFE33E1ED1AA33FBEB4EE2A220E912E7D5541D9C8CE42C6344AE74A9F5640944BBF3AF9D6510D41382F0F698F261A2
2,964,436 UART: [art] SIG.S = 565BDE80DCCF4348EB53C48155632D6B0C8ED49A419285403D9E7EADF0DB8A08090B8D45EA9F285EA704C3B0F9D38E2F
2,988,374 UART: Caliptra RT
2,988,627 UART: [state] CFI Enabled
3,096,070 UART: [rt] RT listening for mailbox commands...
3,096,740 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,584 UART: [rt]cmd =0x4c4d5356, len=1672
3,390,104 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,389 UART: [kat] SHA2-256
890,939 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,068 UART: [kat] ++
895,220 UART: [kat] sha1
899,254 UART: [kat] SHA2-256
901,194 UART: [kat] SHA2-384
904,103 UART: [kat] SHA2-512-ACC
906,004 UART: [kat] ECC-384
915,897 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,170,002 UART: [fht] FHT @ 0x50003400
1,172,786 UART: [idev] ++
1,172,954 UART: [idev] CDI.KEYID = 6
1,173,315 UART: [idev] SUBJECT.KEYID = 7
1,173,740 UART: [idev] UDS.KEYID = 0
1,174,086 ready_for_fw is high
1,174,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,410 UART: [idev] Erasing UDS.KEYID = 0
1,198,012 UART: [idev] Sha1 KeyId Algorithm
1,206,650 UART: [idev] --
1,207,849 UART: [ldev] ++
1,208,017 UART: [ldev] CDI.KEYID = 6
1,208,381 UART: [ldev] SUBJECT.KEYID = 5
1,208,808 UART: [ldev] AUTHORITY.KEYID = 7
1,209,271 UART: [ldev] FE.KEYID = 1
1,214,297 UART: [ldev] Erasing FE.KEYID = 1
1,240,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,283 UART: [ldev] --
1,279,755 UART: [fwproc] Wait for Commands...
1,280,454 UART: [fwproc] Recv command 0x46574c44
1,281,187 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,004 >>> mbox cmd response: success
2,771,219 UART: [afmc] ++
2,771,387 UART: [afmc] CDI.KEYID = 6
2,771,750 UART: [afmc] SUBJECT.KEYID = 7
2,772,176 UART: [afmc] AUTHORITY.KEYID = 5
2,807,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,898 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,617 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,268 UART: [afmc] --
2,851,228 UART: [cold-reset] --
2,852,236 UART: [state] Locking Datavault
2,853,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,101 UART: [state] Locking ICCM
2,854,703 UART: [exit] Launching FMC @ 0x40000130
2,860,032 UART:
2,860,048 UART: Running Caliptra FMC ...
2,860,456 UART:
2,860,599 UART: [state] CFI Enabled
2,871,196 UART: [fht] FMC Alias Private Key: 7
2,979,889 UART: [art] Extend RT PCRs Done
2,980,317 UART: [art] Lock RT PCRs Done
2,981,881 UART: [art] Populate DV Done
2,990,168 UART: [fht] FMC Alias Private Key: 7
2,991,098 UART: [art] Derive CDI
2,991,378 UART: [art] Store in in slot 0x4
3,077,205 UART: [art] Derive Key Pair
3,077,565 UART: [art] Store priv key in slot 0x5
3,091,235 UART: [art] Derive Key Pair - Done
3,105,739 UART: [art] Signing Cert with AUTHO
3,106,219 UART: RITY.KEYID = 7
3,121,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,012 UART: [art] PUB.X = BAB2A7A698F9C5EE50EEB44CBEDC9ED7ACA0D4690474298CC8B1C25100C81624259002D0A6E1E2829FBCFB713EB8F41C
3,128,774 UART: [art] PUB.Y = A95A1B82266F3B6DDC385538A5DD95F7444A00E59438F19DD88F0D0C7F1BD1B5D7607D62795C6B8CA4555575358C2D04
3,135,695 UART: [art] SIG.R = B9BF8D6118F5B2BB4CE904F62484E7EA0088347BC46DCD94F5EBE7C70F081CEDD94BBAA0C8DB39256F26BFF2FC1836E4
3,142,458 UART: [art] SIG.S = F9692379E7E66E6E3A91F4D1EC74DFD81CEB457B1B8E2F79C377687537459D9A7EFC6DBA46F2DCB6F11A340860E0E5DC
3,166,380 UART: Caliptra RT
3,166,725 UART: [state] CFI Enabled
3,274,327 UART: [rt] RT listening for mailbox commands...
3,274,997 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,565 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,041 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,673 ready_for_fw is high
1,056,673 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,790 >>> mbox cmd response: success
2,684,962 UART:
2,684,978 UART: Running Caliptra FMC ...
2,685,386 UART:
2,685,529 UART: [state] CFI Enabled
2,695,908 UART: [fht] FMC Alias Private Key: 7
2,803,837 UART: [art] Extend RT PCRs Done
2,804,265 UART: [art] Lock RT PCRs Done
2,805,701 UART: [art] Populate DV Done
2,814,042 UART: [fht] FMC Alias Private Key: 7
2,815,068 UART: [art] Derive CDI
2,815,348 UART: [art] Store in in slot 0x4
2,900,861 UART: [art] Derive Key Pair
2,901,221 UART: [art] Store priv key in slot 0x5
2,914,347 UART: [art] Derive Key Pair - Done
2,929,015 UART: [art] Signing Cert with AUTHO
2,929,495 UART: RITY.KEYID = 7
2,944,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,170 UART: [art] PUB.X = B82D4BB8A852108656DF62A2D99888D4E6FA6DA2B28E17FF97DF064E6DFE5BF2863FDBA4F4B467D435227B7D099AB4AF
2,951,952 UART: [art] PUB.Y = E79AACD99F3A654A89681DA1846B649F69A4307FBCDF820430F7774E2DB32670DB793684143BECECEC7AB4160840C106
2,958,899 UART: [art] SIG.R = 68788A9A9B5B22A43E217CE3A8C47CE3EB50A5B0EBDB83176AB872E0B856C39235713C7C865E416C96EB4976CF9DBBC7
2,965,681 UART: [art] SIG.S = 4EA626B8BD5CF157F8E44BD6DB26E77B2672F5A18DD528CB65B52EA5C9BF73336B56E6772B54F5721F029415A8152C24
2,989,585 UART: Caliptra RT
2,989,930 UART: [state] CFI Enabled
3,097,819 UART: [rt] RT listening for mailbox commands...
3,098,489 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,889 UART: [rt]cmd =0x4c4d5356, len=1672
3,391,775 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,071 UART:
192,446 UART: Running Caliptra ROM ...
193,582 UART:
193,723 UART: [state] CFI Enabled
263,307 UART: [state] LifecycleState = Unprovisioned
265,485 UART: [state] DebugLocked = No
268,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,743 UART: [kat] SHA2-256
442,405 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,939 UART: [kat] ++
453,379 UART: [kat] sha1
465,313 UART: [kat] SHA2-256
468,035 UART: [kat] SHA2-384
475,295 UART: [kat] SHA2-512-ACC
477,649 UART: [kat] ECC-384
2,765,481 UART: [kat] HMAC-384Kdf
2,776,653 UART: [kat] LMS
3,966,937 UART: [kat] --
3,972,022 UART: [cold-reset] ++
3,973,881 UART: [fht] Storing FHT @ 0x50003400
3,986,345 UART: [idev] ++
3,986,905 UART: [idev] CDI.KEYID = 6
3,987,927 UART: [idev] SUBJECT.KEYID = 7
3,989,095 UART: [idev] UDS.KEYID = 0
3,990,133 ready_for_fw is high
3,990,354 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,133,541 UART: [idev] Erasing UDS.KEYID = 0
7,323,716 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,248 UART: [idev] --
7,349,071 UART: [ldev] ++
7,349,635 UART: [ldev] CDI.KEYID = 6
7,350,595 UART: [ldev] SUBJECT.KEYID = 5
7,351,796 UART: [ldev] AUTHORITY.KEYID = 7
7,353,073 UART: [ldev] FE.KEYID = 1
7,398,609 UART: [ldev] Erasing FE.KEYID = 1
10,732,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,637 UART: [ldev] --
13,113,834 UART: [fwproc] Waiting for Commands...
13,116,676 UART: [fwproc] Received command 0x46574c44
13,118,846 UART: [fwproc] Received Image of size 113844 bytes
17,167,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,775 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,634,621 >>> mbox cmd response: success
17,638,344 UART: [afmc] ++
17,638,944 UART: [afmc] CDI.KEYID = 6
17,639,853 UART: [afmc] SUBJECT.KEYID = 7
17,641,121 UART: [afmc] AUTHORITY.KEYID = 5
21,007,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,165 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,566 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,420 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,873 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,773 UART: [afmc] --
23,377,329 UART: [cold-reset] --
23,380,965 UART: [state] Locking Datavault
23,385,303 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,097 UART: [state] Locking ICCM
23,389,657 UART: [exit] Launching FMC @ 0x40000130
23,398,044 UART:
23,398,275 UART: Running Caliptra FMC ...
23,399,387 UART:
23,399,540 UART: [state] CFI Enabled
23,467,372 UART: [fht] FMC Alias Private Key: 7
25,805,143 UART: [art] Extend RT PCRs Done
25,806,364 UART: [art] Lock RT PCRs Done
25,808,051 UART: [art] Populate DV Done
25,813,405 UART: [fht] FMC Alias Private Key: 7
25,814,959 UART: [art] Derive CDI
25,815,717 UART: [art] Store in in slot 0x4
25,876,212 UART: [art] Derive Key Pair
25,877,271 UART: [art] Store priv key in slot 0x5
29,169,973 UART: [art] Derive Key Pair - Done
29,182,971 UART: [art] Signing Cert with AUTHO
29,184,270 UART: RITY.KEYID = 7
31,471,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,376 UART: [art] PUB.X = B936CD45494DE9ABA941F6A173E122A27AAD9B3BEFD08467A7F79367CD5FCA75E980966CEC22B8F62FD99B6D085DE210
31,480,652 UART: [art] PUB.Y = 8C3DEFB7343BDCBCE741467DC381A1901D04BC4A3B80EECB8CBD52EF1526FEF75263DE3DAC7BB8941ECFC960114BA203
31,487,902 UART: [art] SIG.R = 24234D0E5D3D63B1A45BEC5A45BAD5A64F73BAC9A3812CE18C27A9AAA6B314DD1D3CCB161028F0A68F24A9CAEC688267
31,495,309 UART: [art] SIG.S = 1ABDF208F7B54DB29572B52418A5F193463874AD72C1D0B19DF09F7F6B5CFC3B8B2316022CCE134E5DBC192823BDE3D2
32,800,243 UART: Caliptra RT
32,800,956 UART: [state] CFI Enabled
32,962,521 UART: [rt] RT listening for mailbox commands...
32,966,498 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,011,523 UART: [rt]cmd =0x4c4d5356, len=1672
33,425,081 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,804,624 ready_for_fw is high
3,805,006 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,889,588 >>> mbox cmd response: success
23,586,100 UART:
23,586,483 UART: Running Caliptra FMC ...
23,587,610 UART:
23,587,764 UART: [state] CFI Enabled
23,653,533 UART: [fht] FMC Alias Private Key: 7
25,991,008 UART: [art] Extend RT PCRs Done
25,992,231 UART: [art] Lock RT PCRs Done
25,993,826 UART: [art] Populate DV Done
25,999,197 UART: [fht] FMC Alias Private Key: 7
26,000,717 UART: [art] Derive CDI
26,001,459 UART: [art] Store in in slot 0x4
26,061,360 UART: [art] Derive Key Pair
26,062,381 UART: [art] Store priv key in slot 0x5
29,354,506 UART: [art] Derive Key Pair - Done
29,367,396 UART: [art] Signing Cert with AUTHO
29,368,706 UART: RITY.KEYID = 7
31,655,920 UART: [art] Erasing AUTHORITY.KEYID = 7
31,657,426 UART: [art] PUB.X = 917270AD2001692BCE2997C991446D4C0F7FFA0152940F330EB314236F4EA49543A1031C5808089AB452D63D0DDDB5CC
31,664,630 UART: [art] PUB.Y = D8341385BE0E0CBC102A6BE5EEA7767929860D9227DEA20BA4ACF34692646A02857E8561BAE9229E6B8D92995926218C
31,671,930 UART: [art] SIG.R = 83825D100E6269884CD7B2CC7A480262B66C2415C3990F3DD3B7CB6A4CEB3944E806B08673A4463A77CA841E0490E774
31,679,322 UART: [art] SIG.S = D5BB6A6D115471054BA8881540EEE6E0A082CAD001E236F6E89262A7A238ABE588CCD0440FC317864454B5B4EE01E292
32,984,917 UART: Caliptra RT
32,985,624 UART: [state] CFI Enabled
33,165,451 UART: [rt] RT listening for mailbox commands...
33,169,376 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,214,336 UART: [rt]cmd =0x4c4d5356, len=1672
33,627,990 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,363 UART:
192,726 UART: Running Caliptra ROM ...
193,853 UART:
603,368 UART: [state] CFI Enabled
619,354 UART: [state] LifecycleState = Unprovisioned
621,268 UART: [state] DebugLocked = No
623,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,174 UART: [kat] SHA2-256
798,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,494 UART: [kat] ++
809,965 UART: [kat] sha1
820,985 UART: [kat] SHA2-256
823,715 UART: [kat] SHA2-384
828,993 UART: [kat] SHA2-512-ACC
831,362 UART: [kat] ECC-384
3,114,004 UART: [kat] HMAC-384Kdf
3,126,231 UART: [kat] LMS
4,316,332 UART: [kat] --
4,321,627 UART: [cold-reset] ++
4,322,501 UART: [fht] Storing FHT @ 0x50003400
4,334,118 UART: [idev] ++
4,334,679 UART: [idev] CDI.KEYID = 6
4,335,633 UART: [idev] SUBJECT.KEYID = 7
4,336,878 UART: [idev] UDS.KEYID = 0
4,337,857 ready_for_fw is high
4,338,069 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,182 UART: [idev] Erasing UDS.KEYID = 0
7,623,536 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,899 UART: [idev] --
7,650,630 UART: [ldev] ++
7,651,214 UART: [ldev] CDI.KEYID = 6
7,652,126 UART: [ldev] SUBJECT.KEYID = 5
7,653,340 UART: [ldev] AUTHORITY.KEYID = 7
7,654,625 UART: [ldev] FE.KEYID = 1
7,666,399 UART: [ldev] Erasing FE.KEYID = 1
10,956,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,170 UART: [ldev] --
13,316,186 UART: [fwproc] Waiting for Commands...
13,318,732 UART: [fwproc] Received command 0x46574c44
13,320,877 UART: [fwproc] Received Image of size 113844 bytes
17,376,996 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,362 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,835,076 >>> mbox cmd response: success
17,839,277 UART: [afmc] ++
17,839,879 UART: [afmc] CDI.KEYID = 6
17,840,810 UART: [afmc] SUBJECT.KEYID = 7
17,842,030 UART: [afmc] AUTHORITY.KEYID = 5
21,153,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,131 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,393 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,768 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,583 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,055 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,138 UART: [afmc] --
23,520,440 UART: [cold-reset] --
23,524,140 UART: [state] Locking Datavault
23,530,626 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,384 UART: [state] Locking ICCM
23,534,424 UART: [exit] Launching FMC @ 0x40000130
23,542,817 UART:
23,543,053 UART: Running Caliptra FMC ...
23,544,158 UART:
23,544,325 UART: [state] CFI Enabled
23,552,590 UART: [fht] FMC Alias Private Key: 7
25,883,242 UART: [art] Extend RT PCRs Done
25,884,475 UART: [art] Lock RT PCRs Done
25,886,086 UART: [art] Populate DV Done
25,891,312 UART: [fht] FMC Alias Private Key: 7
25,892,981 UART: [art] Derive CDI
25,893,769 UART: [art] Store in in slot 0x4
25,936,157 UART: [art] Derive Key Pair
25,937,165 UART: [art] Store priv key in slot 0x5
29,179,710 UART: [art] Derive Key Pair - Done
29,193,033 UART: [art] Signing Cert with AUTHO
29,194,343 UART: RITY.KEYID = 7
31,474,137 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,653 UART: [art] PUB.X = 2FD4A766269A8E98BD67E836D988800B898BA322E7DEAEB9379E22A6FA4AB65272C67EF34E4B1B99176A2959BFE4C90D
31,482,859 UART: [art] PUB.Y = 1ADF905B54461DCC6B1F33C3A2A1C576D3E5719C15EEF6E4EB3D95190DEC8379C49E8613947DC0FF57E566FDFD1C9562
31,490,149 UART: [art] SIG.R = 96A2492ACB6BB712846CF3D66000AEACC995AC2F21F3F68DC27BC65FEDDE165BAA8D85B8DD9C12B9D731359E458B3BCE
31,497,577 UART: [art] SIG.S = 2EFE9E622D3103AAE901D66159F2C71CFB23DA9A638A4E493075287B7AEF0E9CE5F87E4A89730059923EE9C298B28ED0
32,802,973 UART: Caliptra RT
32,803,677 UART: [state] CFI Enabled
32,921,191 UART: [rt] RT listening for mailbox commands...
32,925,247 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,970,846 UART: [rt]cmd =0x4c4d5356, len=1672
33,384,510 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
4,123,919 ready_for_fw is high
4,124,288 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,063,243 >>> mbox cmd response: success
23,703,599 UART:
23,703,993 UART: Running Caliptra FMC ...
23,705,189 UART:
23,705,361 UART: [state] CFI Enabled
23,713,289 UART: [fht] FMC Alias Private Key: 7
26,043,932 UART: [art] Extend RT PCRs Done
26,045,165 UART: [art] Lock RT PCRs Done
26,046,611 UART: [art] Populate DV Done
26,051,812 UART: [fht] FMC Alias Private Key: 7
26,053,487 UART: [art] Derive CDI
26,054,523 UART: [art] Store in in slot 0x4
26,096,913 UART: [art] Derive Key Pair
26,097,921 UART: [art] Store priv key in slot 0x5
29,340,009 UART: [art] Derive Key Pair - Done
29,352,853 UART: [art] Signing Cert with AUTHO
29,354,164 UART: RITY.KEYID = 7
31,633,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,411 UART: [art] PUB.X = 47299C2D1B36A09261C023A2125FCEA9822A5ABE2DC1B76FBE056CF7C23BA38C28861C9BE0306AF2AFE42B6809AE6589
31,642,665 UART: [art] PUB.Y = D97134AAF5B9C5371339395C6B78988F456F7294ACA4E43B74B70433D709AB0F093EAA27CE2B343A957581DE3BFC423D
31,649,912 UART: [art] SIG.R = 8A63C4F0F0FB05B40064BC40C2EE9AFFA0C7D5FC94B210E0266A5021EB37C19A22B72D3119CEEFB9B269BB10466AB5A1
31,657,357 UART: [art] SIG.S = 4A77C656072BED5688D0D0AD5BF721D87C67E986784AB35D26FAC1B392D4E8285CA5C40ED0A63F2890E64AE94C69C17A
32,963,032 UART: Caliptra RT
32,963,732 UART: [state] CFI Enabled
33,082,254 UART: [rt] RT listening for mailbox commands...
33,086,211 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,131,156 UART: [rt]cmd =0x4c4d5356, len=1672
33,544,906 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,090 UART:
192,468 UART: Running Caliptra ROM ...
193,562 UART:
193,704 UART: [state] CFI Enabled
261,703 UART: [state] LifecycleState = Unprovisioned
263,619 UART: [state] DebugLocked = No
266,417 UART: [state] WD Timer not started. Device not locked for debugging
270,169 UART: [kat] SHA2-256
449,298 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,890 UART: [kat] ++
461,339 UART: [kat] sha1
472,069 UART: [kat] SHA2-256
475,081 UART: [kat] SHA2-384
482,353 UART: [kat] SHA2-512-ACC
485,297 UART: [kat] ECC-384
2,946,995 UART: [kat] HMAC-384Kdf
2,971,948 UART: [kat] LMS
3,501,386 UART: [kat] --
3,505,190 UART: [cold-reset] ++
3,507,551 UART: [fht] FHT @ 0x50003400
3,518,312 UART: [idev] ++
3,518,869 UART: [idev] CDI.KEYID = 6
3,519,819 UART: [idev] SUBJECT.KEYID = 7
3,521,056 UART: [idev] UDS.KEYID = 0
3,521,979 ready_for_fw is high
3,522,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,760 UART: [idev] Erasing UDS.KEYID = 0
6,039,974 UART: [idev] Sha1 KeyId Algorithm
6,062,280 UART: [idev] --
6,066,879 UART: [ldev] ++
6,067,449 UART: [ldev] CDI.KEYID = 6
6,068,377 UART: [ldev] SUBJECT.KEYID = 5
6,069,541 UART: [ldev] AUTHORITY.KEYID = 7
6,070,775 UART: [ldev] FE.KEYID = 1
6,114,592 UART: [ldev] Erasing FE.KEYID = 1
8,613,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,940 UART: [ldev] --
10,410,351 UART: [fwproc] Wait for Commands...
10,412,444 UART: [fwproc] Recv command 0x46574c44
10,414,484 UART: [fwproc] Recv'd Img size: 114168 bytes
13,809,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,263,112 >>> mbox cmd response: success
14,267,105 UART: [afmc] ++
14,267,703 UART: [afmc] CDI.KEYID = 6
14,268,615 UART: [afmc] SUBJECT.KEYID = 7
14,269,775 UART: [afmc] AUTHORITY.KEYID = 5
16,798,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,523,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,525,663 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,541,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,557,453 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,573,312 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,596,144 UART: [afmc] --
18,599,371 UART: [cold-reset] --
18,602,263 UART: [state] Locking Datavault
18,607,409 UART: [state] Locking PCR0, PCR1 and PCR31
18,609,113 UART: [state] Locking ICCM
18,610,454 UART: [exit] Launching FMC @ 0x40000130
18,618,857 UART:
18,619,093 UART: Running Caliptra FMC ...
18,620,198 UART:
18,620,356 UART: [state] CFI Enabled
18,682,238 UART: [fht] FMC Alias Private Key: 7
20,445,705 UART: [art] Extend RT PCRs Done
20,446,927 UART: [art] Lock RT PCRs Done
20,448,591 UART: [art] Populate DV Done
20,453,917 UART: [fht] FMC Alias Private Key: 7
20,455,352 UART: [art] Derive CDI
20,456,086 UART: [art] Store in in slot 0x4
20,514,266 UART: [art] Derive Key Pair
20,515,306 UART: [art] Store priv key in slot 0x5
22,978,120 UART: [art] Derive Key Pair - Done
22,990,853 UART: [art] Signing Cert with AUTHO
22,992,160 UART: RITY.KEYID = 7
24,703,170 UART: [art] Erasing AUTHORITY.KEYID = 7
24,704,669 UART: [art] PUB.X = 129A8CD9F44A0FC144ECB908E1DF47121DFABED176295B7868CD638906151891C6DF8B89C44B5B514D991A53D62F544D
24,711,974 UART: [art] PUB.Y = 71FBE11F30BDD82636D705C8E560264435B044E8B72DCC403A44A7037BA3233703839E9965537048C226C180B073C37C
24,719,210 UART: [art] SIG.R = EF9E7BD6FF48A5A7BB9543D00520FDC8EFF68081F7577DF514FFB475E21D40081EC92FF7796CBC8A862AD50CE6F1BB72
24,726,644 UART: [art] SIG.S = C0D11EA3CDD43D26C16B60876C32D63DCD1B87197EB5F0BEE58C6BD88BDB756F2F2D434DA0F87C1620C4B9A56CFE2B2C
25,706,212 UART: Caliptra RT
25,706,906 UART: [state] CFI Enabled
25,870,869 UART: [rt] RT listening for mailbox commands...
25,874,884 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,919,825 UART: [rt]cmd =0x4c4d5356, len=1672
26,120,866 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,377,704 ready_for_fw is high
3,378,079 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,071,442 >>> mbox cmd response: success
18,364,693 UART:
18,365,118 UART: Running Caliptra FMC ...
18,366,255 UART:
18,366,418 UART: [state] CFI Enabled
18,431,950 UART: [fht] FMC Alias Private Key: 7
20,195,854 UART: [art] Extend RT PCRs Done
20,197,078 UART: [art] Lock RT PCRs Done
20,198,933 UART: [art] Populate DV Done
20,204,346 UART: [fht] FMC Alias Private Key: 7
20,206,048 UART: [art] Derive CDI
20,206,866 UART: [art] Store in in slot 0x4
20,264,288 UART: [art] Derive Key Pair
20,265,352 UART: [art] Store priv key in slot 0x5
22,728,792 UART: [art] Derive Key Pair - Done
22,741,736 UART: [art] Signing Cert with AUTHO
22,743,038 UART: RITY.KEYID = 7
24,454,100 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,610 UART: [art] PUB.X = 19B0D5F0FBDB37A6ABC3DC046149A3AF02BDDF7A11A6D53908C24BD36EE197C7DFC707AFF202AB83A99517D872E27C47
24,462,920 UART: [art] PUB.Y = 6943C5DDA20EBD17BC81E2612889E53641E76724880C312F0EF0065D22BC7A78C738E843A4E2CB8C4CE4B4FFEC7D27C4
24,470,172 UART: [art] SIG.R = 7B6D2CE870D3507CCAD3603D066186526432B3F5E8F9C146CD969F71E3F80FF5029896311A4E6F1C75955EDD713BEEE0
24,477,557 UART: [art] SIG.S = 32F18C0B92C98D791BD26DA7FDC662AA1D7BA1DD29D003ABF70F414B1621D18BF59455B8292CE90B40D9FBD8A8F97101
25,456,921 UART: Caliptra RT
25,457,621 UART: [state] CFI Enabled
25,621,821 UART: [rt] RT listening for mailbox commands...
25,625,818 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,670,783 UART: [rt]cmd =0x4c4d5356, len=1672
25,871,771 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
193,020 UART:
193,389 UART: Running Caliptra ROM ...
194,588 UART:
604,334 UART: [state] CFI Enabled
618,586 UART: [state] LifecycleState = Unprovisioned
620,465 UART: [state] DebugLocked = No
621,662 UART: [state] WD Timer not started. Device not locked for debugging
624,924 UART: [kat] SHA2-256
804,026 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,614 UART: [kat] ++
816,143 UART: [kat] sha1
826,951 UART: [kat] SHA2-256
830,030 UART: [kat] SHA2-384
835,381 UART: [kat] SHA2-512-ACC
838,316 UART: [kat] ECC-384
3,281,504 UART: [kat] HMAC-384Kdf
3,293,378 UART: [kat] LMS
3,822,839 UART: [kat] --
3,825,130 UART: [cold-reset] ++
3,827,414 UART: [fht] FHT @ 0x50003400
3,837,807 UART: [idev] ++
3,838,405 UART: [idev] CDI.KEYID = 6
3,839,344 UART: [idev] SUBJECT.KEYID = 7
3,840,450 UART: [idev] UDS.KEYID = 0
3,841,446 ready_for_fw is high
3,841,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,914 UART: [idev] Erasing UDS.KEYID = 0
6,320,557 UART: [idev] Sha1 KeyId Algorithm
6,343,836 UART: [idev] --
6,348,957 UART: [ldev] ++
6,349,526 UART: [ldev] CDI.KEYID = 6
6,350,438 UART: [ldev] SUBJECT.KEYID = 5
6,351,596 UART: [ldev] AUTHORITY.KEYID = 7
6,352,874 UART: [ldev] FE.KEYID = 1
6,362,437 UART: [ldev] Erasing FE.KEYID = 1
8,834,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,039 UART: [ldev] --
10,623,847 UART: [fwproc] Wait for Commands...
10,626,910 UART: [fwproc] Recv command 0x46574c44
10,628,999 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,870 >>> mbox cmd response: success
14,492,678 UART: [afmc] ++
14,493,268 UART: [afmc] CDI.KEYID = 6
14,494,178 UART: [afmc] SUBJECT.KEYID = 7
14,495,336 UART: [afmc] AUTHORITY.KEYID = 5
16,992,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,713,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,715,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,731,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,747,216 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,455 UART: [afmc] --
18,789,645 UART: [cold-reset] --
18,794,581 UART: [state] Locking Datavault
18,799,230 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,976 UART: [state] Locking ICCM
18,803,673 UART: [exit] Launching FMC @ 0x40000130
18,812,125 UART:
18,812,362 UART: Running Caliptra FMC ...
18,813,462 UART:
18,813,639 UART: [state] CFI Enabled
18,821,848 UART: [fht] FMC Alias Private Key: 7
20,579,146 UART: [art] Extend RT PCRs Done
20,580,388 UART: [art] Lock RT PCRs Done
20,582,094 UART: [art] Populate DV Done
20,587,346 UART: [fht] FMC Alias Private Key: 7
20,588,988 UART: [art] Derive CDI
20,589,720 UART: [art] Store in in slot 0x4
20,632,423 UART: [art] Derive Key Pair
20,633,422 UART: [art] Store priv key in slot 0x5
23,060,027 UART: [art] Derive Key Pair - Done
23,072,921 UART: [art] Signing Cert with AUTHO
23,074,226 UART: RITY.KEYID = 7
24,780,123 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,632 UART: [art] PUB.X = 793AEA4A455F8EB8F5D15F3FFDC0B5FC0B41C6C05D1E26A6C825801D7DCAAE19D9BBBB729AA178F0FA391DC2CE0990B2
24,788,942 UART: [art] PUB.Y = FCF34FFA2B90B9EE1166164221C3E8CA30DF38B4819A4EAE68EA909B03D5CF7F4A36B3CF8D1D835ECDB6EADCCC960876
24,796,244 UART: [art] SIG.R = 1C11DB7387F37E44A249DA0206F7E5444AD899C19F38E650723022EE8AE7648514BADAE98A28E201B2B13DA4CCC52CB6
24,803,628 UART: [art] SIG.S = 031C93CED7BD3A92A27F6ABCFB8E152278C78E74DF62F223E3495A73767AF9F4CC079D77CE947488D6B8DEFE7113AA59
25,782,456 UART: Caliptra RT
25,783,186 UART: [state] CFI Enabled
25,899,329 UART: [rt] RT listening for mailbox commands...
25,903,288 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,948,243 UART: [rt]cmd =0x4c4d5356, len=1672
26,149,273 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,773 writing to cptra_bootfsm_go
3,694,844 ready_for_fw is high
3,695,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,458 >>> mbox cmd response: success
18,508,390 UART:
18,508,791 UART: Running Caliptra FMC ...
18,509,986 UART:
18,510,156 UART: [state] CFI Enabled
18,518,046 UART: [fht] FMC Alias Private Key: 7
20,275,337 UART: [art] Extend RT PCRs Done
20,276,565 UART: [art] Lock RT PCRs Done
20,278,198 UART: [art] Populate DV Done
20,283,683 UART: [fht] FMC Alias Private Key: 7
20,285,374 UART: [art] Derive CDI
20,286,136 UART: [art] Store in in slot 0x4
20,328,903 UART: [art] Derive Key Pair
20,329,907 UART: [art] Store priv key in slot 0x5
22,756,522 UART: [art] Derive Key Pair - Done
22,769,571 UART: [art] Signing Cert with AUTHO
22,770,905 UART: RITY.KEYID = 7
24,476,435 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,937 UART: [art] PUB.X = 29DB36962F792314F4E312447425A7D083756F04A23808A9CFE090ADC896C6BC30033D3EB20315C71D50E4EB7E1E4C6E
24,485,237 UART: [art] PUB.Y = 92541B6E96BD0A22204C96D54B74316F0EFD30A54E0CE560A5097F9BDA4645FA372CD0101E3620FA44469D20E3D3948E
24,492,452 UART: [art] SIG.R = 56484F5A26AF43FF4BE9790ACDF2AE7A4B9EC03CE3E3EA430014E31E508244E6A77EEA69FB38536457718B8C81CDF853
24,499,842 UART: [art] SIG.S = 339DD0D22DB07D4009F882704EBB5C853DCE5E9B9D85A269595AC17C7305C2335879A992E362BEB6562CEEE1B31447E7
25,479,532 UART: Caliptra RT
25,480,251 UART: [state] CFI Enabled
25,597,761 UART: [rt] RT listening for mailbox commands...
25,601,744 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,646,551 UART: [rt]cmd =0x4c4d5356, len=1672
25,847,567 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,996 UART:
192,379 UART: Running Caliptra ROM ...
193,477 UART:
193,624 UART: [state] CFI Enabled
266,534 UART: [state] LifecycleState = Unprovisioned
268,949 UART: [state] DebugLocked = No
270,473 UART: [state] WD Timer not started. Device not locked for debugging
275,729 UART: [kat] SHA2-256
465,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,398 UART: [kat] ++
476,934 UART: [kat] sha1
488,814 UART: [kat] SHA2-256
491,829 UART: [kat] SHA2-384
496,895 UART: [kat] SHA2-512-ACC
499,478 UART: [kat] ECC-384
2,949,311 UART: [kat] HMAC-384Kdf
2,972,485 UART: [kat] LMS
3,504,220 UART: [kat] --
3,508,140 UART: [cold-reset] ++
3,509,778 UART: [fht] FHT @ 0x50003400
3,521,254 UART: [idev] ++
3,521,895 UART: [idev] CDI.KEYID = 6
3,522,846 UART: [idev] SUBJECT.KEYID = 7
3,524,086 UART: [idev] UDS.KEYID = 0
3,524,990 ready_for_fw is high
3,525,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,160 UART: [idev] Erasing UDS.KEYID = 0
6,032,157 UART: [idev] Sha1 KeyId Algorithm
6,054,089 UART: [idev] --
6,058,240 UART: [ldev] ++
6,058,941 UART: [ldev] CDI.KEYID = 6
6,059,861 UART: [ldev] SUBJECT.KEYID = 5
6,061,030 UART: [ldev] AUTHORITY.KEYID = 7
6,062,269 UART: [ldev] FE.KEYID = 1
6,102,295 UART: [ldev] Erasing FE.KEYID = 1
8,610,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,533 UART: [ldev] --
10,416,871 UART: [fwproc] Wait for Commands...
10,419,128 UART: [fwproc] Recv command 0x46574c44
10,421,390 UART: [fwproc] Recv'd Img size: 114168 bytes
13,862,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,068 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,886 >>> mbox cmd response: success
14,602,185 UART: [afmc] ++
14,602,897 UART: [afmc] CDI.KEYID = 6
14,604,070 UART: [afmc] SUBJECT.KEYID = 7
14,605,570 UART: [afmc] AUTHORITY.KEYID = 5
17,131,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,856,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,858,840 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,874,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,889,153 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,904,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,927,028 UART: [afmc] --
18,929,801 UART: [cold-reset] --
18,933,519 UART: [state] Locking Datavault
18,939,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,172 UART: [state] Locking ICCM
18,942,952 UART: [exit] Launching FMC @ 0x40000130
18,951,647 UART:
18,951,883 UART: Running Caliptra FMC ...
18,952,987 UART:
18,953,144 UART: [state] CFI Enabled
19,014,923 UART: [fht] FMC Alias Private Key: 7
20,779,366 UART: [art] Extend RT PCRs Done
20,780,587 UART: [art] Lock RT PCRs Done
20,782,024 UART: [art] Populate DV Done
20,787,277 UART: [fht] FMC Alias Private Key: 7
20,788,890 UART: [art] Derive CDI
20,789,708 UART: [art] Store in in slot 0x4
20,847,722 UART: [art] Derive Key Pair
20,848,761 UART: [art] Store priv key in slot 0x5
23,311,276 UART: [art] Derive Key Pair - Done
23,324,490 UART: [art] Signing Cert with AUTHO
23,325,799 UART: RITY.KEYID = 7
25,037,127 UART: [art] Erasing AUTHORITY.KEYID = 7
25,038,645 UART: [art] PUB.X = 38DBBB4C7223F917E62D6BD90E68956F06D548F1649031F07CCF6A91174C12B00DE2E7F62F2645989E35A052D1EA09A7
25,045,911 UART: [art] PUB.Y = 5F87653C729BB9530791E5AD97B1E2DE9CFBB0C200AB0CAD26A06FE1DCBC08A4FD6D00B6C543CAC1DFAEDDA03C6CEDF2
25,053,163 UART: [art] SIG.R = 54F131FF156A0879388DB382C3C47CAFEE920D7CD369E90FD440B55197AC90EE8E23ECD867D4AEC5A69580CA4D4E50F4
25,060,595 UART: [art] SIG.S = FF207527109978BBAF63065087E6051622884B25571547405466F2CDEC94F49123942AA088AE6123FF7D6C27EBB000BC
26,038,805 UART: Caliptra RT
26,039,497 UART: [state] CFI Enabled
26,204,884 UART: [rt] RT listening for mailbox commands...
26,209,045 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,254,247 UART: [rt]cmd =0x4c4d5356, len=1672
26,455,608 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,438,263 ready_for_fw is high
3,438,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,012 >>> mbox cmd response: success
19,022,137 UART:
19,022,570 UART: Running Caliptra FMC ...
19,023,685 UART:
19,023,856 UART: [state] CFI Enabled
19,091,508 UART: [fht] FMC Alias Private Key: 7
20,855,605 UART: [art] Extend RT PCRs Done
20,856,832 UART: [art] Lock RT PCRs Done
20,858,521 UART: [art] Populate DV Done
20,863,938 UART: [fht] FMC Alias Private Key: 7
20,865,479 UART: [art] Derive CDI
20,866,293 UART: [art] Store in in slot 0x4
20,923,937 UART: [art] Derive Key Pair
20,924,981 UART: [art] Store priv key in slot 0x5
23,387,887 UART: [art] Derive Key Pair - Done
23,400,456 UART: [art] Signing Cert with AUTHO
23,401,762 UART: RITY.KEYID = 7
25,113,685 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,192 UART: [art] PUB.X = E096C3BF5A6AA7F8772B9FA9DA639EDE817DBAA1253627BB26E6993CF6EE277ECF5E28D051B8B6573C797A8F7D6B7A0E
25,122,426 UART: [art] PUB.Y = 9821C8FFDD4A47FDE8BE6196B3A98365E5205E57D5D93EEC90EA831F171B6200ECF8EF7F202160682A03084041D15C2D
25,129,699 UART: [art] SIG.R = 17D1F0F5E58FAB804F9C6D254BCC71FD2E974F61BE84756F80C7092B5E045E20A916D765A083E74DDF6B88773950549E
25,137,138 UART: [art] SIG.S = 90AD1746A77F482CDE64692C9AE18E1E872E59F9A3212AF741CACC92D0148B15FD0F218B6A0BBB496890FE3017B7D88E
26,115,914 UART: Caliptra RT
26,116,631 UART: [state] CFI Enabled
26,281,225 UART: [rt] RT listening for mailbox commands...
26,285,212 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,330,122 UART: [rt]cmd =0x4c4d5356, len=1672
26,531,480 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,692 writing to cptra_bootfsm_go
193,737 UART:
194,129 UART: Running Caliptra ROM ...
195,323 UART:
604,979 UART: [state] CFI Enabled
617,868 UART: [state] LifecycleState = Unprovisioned
620,223 UART: [state] DebugLocked = No
622,948 UART: [state] WD Timer not started. Device not locked for debugging
627,388 UART: [kat] SHA2-256
817,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,054 UART: [kat] ++
828,577 UART: [kat] sha1
840,085 UART: [kat] SHA2-256
843,097 UART: [kat] SHA2-384
849,162 UART: [kat] SHA2-512-ACC
851,743 UART: [kat] ECC-384
3,292,044 UART: [kat] HMAC-384Kdf
3,304,216 UART: [kat] LMS
3,836,043 UART: [kat] --
3,840,035 UART: [cold-reset] ++
3,842,321 UART: [fht] FHT @ 0x50003400
3,852,974 UART: [idev] ++
3,853,646 UART: [idev] CDI.KEYID = 6
3,854,601 UART: [idev] SUBJECT.KEYID = 7
3,855,851 UART: [idev] UDS.KEYID = 0
3,856,750 ready_for_fw is high
3,856,941 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,187 UART: [idev] Erasing UDS.KEYID = 0
6,333,755 UART: [idev] Sha1 KeyId Algorithm
6,356,091 UART: [idev] --
6,361,504 UART: [ldev] ++
6,362,195 UART: [ldev] CDI.KEYID = 6
6,363,081 UART: [ldev] SUBJECT.KEYID = 5
6,364,299 UART: [ldev] AUTHORITY.KEYID = 7
6,365,535 UART: [ldev] FE.KEYID = 1
6,377,667 UART: [ldev] Erasing FE.KEYID = 1
8,851,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,804 UART: [ldev] --
10,643,740 UART: [fwproc] Wait for Commands...
10,646,855 UART: [fwproc] Recv command 0x46574c44
10,649,122 UART: [fwproc] Recv'd Img size: 114168 bytes
14,091,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,247 >>> mbox cmd response: success
14,835,452 UART: [afmc] ++
14,836,162 UART: [afmc] CDI.KEYID = 6
14,837,354 UART: [afmc] SUBJECT.KEYID = 7
14,838,847 UART: [afmc] AUTHORITY.KEYID = 5
17,345,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,732 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,741 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,991 UART: [afmc] --
19,139,842 UART: [cold-reset] --
19,143,763 UART: [state] Locking Datavault
19,149,442 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,646 UART: [state] Locking ICCM
19,154,067 UART: [exit] Launching FMC @ 0x40000130
19,162,742 UART:
19,162,976 UART: Running Caliptra FMC ...
19,164,075 UART:
19,164,235 UART: [state] CFI Enabled
19,172,190 UART: [fht] FMC Alias Private Key: 7
20,929,189 UART: [art] Extend RT PCRs Done
20,930,400 UART: [art] Lock RT PCRs Done
20,931,973 UART: [art] Populate DV Done
20,937,438 UART: [fht] FMC Alias Private Key: 7
20,938,972 UART: [art] Derive CDI
20,939,710 UART: [art] Store in in slot 0x4
20,982,513 UART: [art] Derive Key Pair
20,983,580 UART: [art] Store priv key in slot 0x5
23,409,476 UART: [art] Derive Key Pair - Done
23,422,365 UART: [art] Signing Cert with AUTHO
23,423,665 UART: RITY.KEYID = 7
25,129,484 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,995 UART: [art] PUB.X = A8FF29757FF439095D70DA66EDA33A9CD4D189716E68561CAE66443E6E0FD15A411DB7AEF4C985580E204F96FB7126A2
25,138,296 UART: [art] PUB.Y = B8399B869381AF8448A5D6BA54EABA8189910492C992B8C2B721328B9A6C781038951952EDF8B7BF47E36275E2918072
25,145,533 UART: [art] SIG.R = 634246D8078ADA5B2B61BCC7AA644A56D734C8DC4B818A16F853B79E0C2029383EDDB1F37075673182FC199BD21260A8
25,152,942 UART: [art] SIG.S = 6A7F43630D0637CD001CB8800CDBA286133BC880786AEF790F1AA3A80C5253D504C62889CF02E2A2BC9112E5F3F5C97A
26,132,236 UART: Caliptra RT
26,132,928 UART: [state] CFI Enabled
26,250,551 UART: [rt] RT listening for mailbox commands...
26,254,555 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,299,387 UART: [rt]cmd =0x4c4d5356, len=1672
26,500,417 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,814 writing to cptra_bootfsm_go
3,753,707 ready_for_fw is high
3,754,097 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,964,759 >>> mbox cmd response: success
19,221,180 UART:
19,221,594 UART: Running Caliptra FMC ...
19,222,730 UART:
19,222,892 UART: [state] CFI Enabled
19,230,631 UART: [fht] FMC Alias Private Key: 7
20,987,887 UART: [art] Extend RT PCRs Done
20,989,115 UART: [art] Lock RT PCRs Done
20,991,032 UART: [art] Populate DV Done
20,996,405 UART: [fht] FMC Alias Private Key: 7
20,998,120 UART: [art] Derive CDI
20,998,947 UART: [art] Store in in slot 0x4
21,041,603 UART: [art] Derive Key Pair
21,042,607 UART: [art] Store priv key in slot 0x5
23,469,304 UART: [art] Derive Key Pair - Done
23,482,250 UART: [art] Signing Cert with AUTHO
23,483,553 UART: RITY.KEYID = 7
25,188,819 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,338 UART: [art] PUB.X = 7A5EB600F48238B8393D4196E162176CD7A5B79BC5E1BE43A6C71BD1E9AC4F8BD58F2BA908FFE378BFD151CAC7B46A99
25,197,579 UART: [art] PUB.Y = 3A53BE7BF3E11245D12BA6BAB572E3B58DFAFEF2F02822C104D1D8EC9AFFAA6D3C7181ABDCA6522CEF00BAB4EC3F9D55
25,204,844 UART: [art] SIG.R = 96B327A32D59A576B1B19C6D0B865ADD09EE5CC073A52CFF1199E7713652964D267EFD228A0205C2C609571DFE9888C6
25,212,259 UART: [art] SIG.S = 28BF5D1E39CC22236B2F8F473FE698DF6BA7613ADBA89585B48296A4D0057BB06A0C3DD060A20C1D7A17FE1F7EB57E4F
26,191,705 UART: Caliptra RT
26,192,412 UART: [state] CFI Enabled
26,310,982 UART: [rt] RT listening for mailbox commands...
26,314,937 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,359,975 UART: [rt]cmd =0x4c4d5356, len=1672
26,561,226 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,543 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
902,746 UART: [kat] HMAC-384Kdf
907,336 UART: [kat] LMS
1,475,532 UART: [kat] --
1,476,393 UART: [cold-reset] ++
1,476,737 UART: [fht] Storing FHT @ 0x50003400
1,479,720 UART: [idev] ++
1,479,888 UART: [idev] CDI.KEYID = 6
1,480,248 UART: [idev] SUBJECT.KEYID = 7
1,480,672 UART: [idev] UDS.KEYID = 0
1,481,017 ready_for_fw is high
1,481,017 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,534 UART: [idev] Erasing UDS.KEYID = 0
1,505,576 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,222 UART: [idev] --
1,515,171 UART: [ldev] ++
1,515,339 UART: [ldev] CDI.KEYID = 6
1,515,702 UART: [ldev] SUBJECT.KEYID = 5
1,516,128 UART: [ldev] AUTHORITY.KEYID = 7
1,516,591 UART: [ldev] FE.KEYID = 1
1,521,917 UART: [ldev] Erasing FE.KEYID = 1
1,547,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,630 UART: [ldev] --
1,587,073 UART: [fwproc] Waiting for Commands...
1,587,940 UART: [fwproc] Received command 0x46574c44
1,588,731 UART: [fwproc] Received Image of size 114168 bytes
2,884,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,967 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,319 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,858 >>> mbox cmd response: success
3,078,998 UART: [afmc] ++
3,079,166 UART: [afmc] CDI.KEYID = 6
3,079,528 UART: [afmc] SUBJECT.KEYID = 7
3,079,953 UART: [afmc] AUTHORITY.KEYID = 5
3,114,988 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,552 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,332 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,060 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,945 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,635 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,650 UART: [afmc] --
3,158,706 UART: [cold-reset] --
3,159,580 UART: [state] Locking Datavault
3,160,527 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,131 UART: [state] Locking ICCM
3,161,779 UART: [exit] Launching FMC @ 0x40000130
3,167,108 UART:
3,167,124 UART: Running Caliptra FMC ...
3,167,532 UART:
3,167,586 UART: [state] CFI Enabled
3,177,877 UART: [fht] FMC Alias Private Key: 7
3,286,456 UART: [art] Extend RT PCRs Done
3,286,884 UART: [art] Lock RT PCRs Done
3,288,454 UART: [art] Populate DV Done
3,297,047 UART: [fht] FMC Alias Private Key: 7
3,298,077 UART: [art] Derive CDI
3,298,357 UART: [art] Store in in slot 0x4
3,383,826 UART: [art] Derive Key Pair
3,384,186 UART: [art] Store priv key in slot 0x5
3,397,738 UART: [art] Derive Key Pair - Done
3,412,952 UART: [art] Signing Cert with AUTHO
3,413,432 UART: RITY.KEYID = 7
3,428,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,691 UART: [art] PUB.X = 9E89DCBC730CC7CCEE90AFE36278128D7522AB0DA40F71B9CB94437D59E0074C1CCA2CC0F421F4794BE68BA0E6FD4260
3,436,467 UART: [art] PUB.Y = C6DB5BF99E2C53354DD65167D10C72433F16D824301DB58953F7ECF075245B1A0DB60ACEB58D0DF0269D4327895AEA55
3,443,411 UART: [art] SIG.R = B9D8E3260C5CF1D53DB91229B0BC785C18DD17B8568DB8DF47B3AC3ABB99DD839E9D076D8B7438BE64F8BEBF48EE2DA2
3,450,199 UART: [art] SIG.S = 54D0BB4D48A674A4024594755F1E5FE728EEAD928DA1DB614005E490696CFDFFB1F01BD79CF5ACBDCEF41DB24361EDBD
3,473,990 UART: Caliptra RT
3,474,243 UART: [state] CFI Enabled
3,583,234 UART: [rt] RT listening for mailbox commands...
3,583,904 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,374 UART: [rt]cmd =0x4c4d5356, len=1672
3,876,957 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,331 ready_for_fw is high
1,362,331 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,990 >>> mbox cmd response: success
2,987,458 UART:
2,987,474 UART: Running Caliptra FMC ...
2,987,882 UART:
2,987,936 UART: [state] CFI Enabled
2,998,735 UART: [fht] FMC Alias Private Key: 7
3,106,298 UART: [art] Extend RT PCRs Done
3,106,726 UART: [art] Lock RT PCRs Done
3,108,212 UART: [art] Populate DV Done
3,116,359 UART: [fht] FMC Alias Private Key: 7
3,117,435 UART: [art] Derive CDI
3,117,715 UART: [art] Store in in slot 0x4
3,203,428 UART: [art] Derive Key Pair
3,203,788 UART: [art] Store priv key in slot 0x5
3,216,544 UART: [art] Derive Key Pair - Done
3,231,273 UART: [art] Signing Cert with AUTHO
3,231,753 UART: RITY.KEYID = 7
3,246,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,726 UART: [art] PUB.X = 0EC5DEAD1ABB3C799684D668E2EB46F2A2EA1DE55969EE585833F77310B8DCB25612DBC1368BCD4CAACB43C154F0EF90
3,254,515 UART: [art] PUB.Y = 7BBC038D0D8993420B2E6014536801D8E39751D80AC9CA7EF68F98A478A9A0202B5891658C3C1E99971AD9C55769EEE2
3,261,448 UART: [art] SIG.R = 59314221F26AEC415BE0C42F401C70C3EF4E7E566AD2456D9BB6891F6E3F6A59230D46BE240E107E68C2898C6304EF5A
3,268,213 UART: [art] SIG.S = F3D02A6CAC7BC4C7254B4AEC2408DB2443E03C489416152242CB392F92117843AEE5ED5C75DC25120C1CE07AE218755F
3,291,866 UART: Caliptra RT
3,292,119 UART: [state] CFI Enabled
3,399,778 UART: [rt] RT listening for mailbox commands...
3,400,448 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,132 UART: [rt]cmd =0x4c4d5356, len=1672
3,693,749 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
903,073 UART: [kat] HMAC-384Kdf
907,715 UART: [kat] LMS
1,475,911 UART: [kat] --
1,476,812 UART: [cold-reset] ++
1,477,344 UART: [fht] Storing FHT @ 0x50003400
1,480,103 UART: [idev] ++
1,480,271 UART: [idev] CDI.KEYID = 6
1,480,631 UART: [idev] SUBJECT.KEYID = 7
1,481,055 UART: [idev] UDS.KEYID = 0
1,481,400 ready_for_fw is high
1,481,400 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,959 UART: [idev] Erasing UDS.KEYID = 0
1,506,195 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,051 UART: [idev] --
1,516,162 UART: [ldev] ++
1,516,330 UART: [ldev] CDI.KEYID = 6
1,516,693 UART: [ldev] SUBJECT.KEYID = 5
1,517,119 UART: [ldev] AUTHORITY.KEYID = 7
1,517,582 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,921 UART: [ldev] --
1,587,406 UART: [fwproc] Waiting for Commands...
1,588,263 UART: [fwproc] Received command 0x46574c44
1,589,054 UART: [fwproc] Received Image of size 114168 bytes
2,885,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,050 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,402 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,985 >>> mbox cmd response: success
3,077,997 UART: [afmc] ++
3,078,165 UART: [afmc] CDI.KEYID = 6
3,078,527 UART: [afmc] SUBJECT.KEYID = 7
3,078,952 UART: [afmc] AUTHORITY.KEYID = 5
3,114,463 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,939 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,719 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,447 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,332 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,022 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,065 UART: [afmc] --
3,158,149 UART: [cold-reset] --
3,158,817 UART: [state] Locking Datavault
3,159,988 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,592 UART: [state] Locking ICCM
3,161,140 UART: [exit] Launching FMC @ 0x40000130
3,166,469 UART:
3,166,485 UART: Running Caliptra FMC ...
3,166,893 UART:
3,167,036 UART: [state] CFI Enabled
3,177,375 UART: [fht] FMC Alias Private Key: 7
3,284,758 UART: [art] Extend RT PCRs Done
3,285,186 UART: [art] Lock RT PCRs Done
3,286,706 UART: [art] Populate DV Done
3,294,973 UART: [fht] FMC Alias Private Key: 7
3,296,097 UART: [art] Derive CDI
3,296,377 UART: [art] Store in in slot 0x4
3,382,358 UART: [art] Derive Key Pair
3,382,718 UART: [art] Store priv key in slot 0x5
3,396,752 UART: [art] Derive Key Pair - Done
3,411,244 UART: [art] Signing Cert with AUTHO
3,411,724 UART: RITY.KEYID = 7
3,426,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,351 UART: [art] PUB.X = 22EB899D8B84ECB5742C28CDC250C07A4897FCA569526601BA30703662D7E52A1E9AA0EB78AF102B5387034D4649C6B8
3,434,117 UART: [art] PUB.Y = A4094B5C72886589978447CA23151FDBD0DF2555FB7E60581066BCDE55DA3861F42321E495C3B47DD711366D54770CD3
3,441,057 UART: [art] SIG.R = 9FA9119B8029F1419910FB1FA4F9337EB0A8325E41776E5A6B550F1143F1D34CE129229A5752A7DBF537F8B1BE12CD3D
3,447,828 UART: [art] SIG.S = 7888AA6B3B513B51DD1D8B033D6D331FA1ECA0F78790269C59E3B53FC7E1EEDD11D0E8232C9F7F178760EBC9920D74F8
3,471,995 UART: Caliptra RT
3,472,340 UART: [state] CFI Enabled
3,579,889 UART: [rt] RT listening for mailbox commands...
3,580,559 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,343 UART: [rt]cmd =0x4c4d5356, len=1672
3,873,696 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,652 ready_for_fw is high
1,362,652 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,621 >>> mbox cmd response: success
2,988,881 UART:
2,988,897 UART: Running Caliptra FMC ...
2,989,305 UART:
2,989,448 UART: [state] CFI Enabled
3,000,183 UART: [fht] FMC Alias Private Key: 7
3,107,912 UART: [art] Extend RT PCRs Done
3,108,340 UART: [art] Lock RT PCRs Done
3,109,950 UART: [art] Populate DV Done
3,118,237 UART: [fht] FMC Alias Private Key: 7
3,119,211 UART: [art] Derive CDI
3,119,491 UART: [art] Store in in slot 0x4
3,205,292 UART: [art] Derive Key Pair
3,205,652 UART: [art] Store priv key in slot 0x5
3,219,084 UART: [art] Derive Key Pair - Done
3,234,117 UART: [art] Signing Cert with AUTHO
3,234,597 UART: RITY.KEYID = 7
3,249,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,494 UART: [art] PUB.X = 0008CFFC83F8704CC77293B7756F17A7DC06D8AB96185073252F0DE1548F06E34CE84CEC5BB6F0A29DC80839AEECBE49
3,257,239 UART: [art] PUB.Y = 93EE94A72C2A7977F848CE89039338DCF5E36E026936BEAC8CC66F8752ED359811F97A13E0F3509E69B844D8D3F0142C
3,264,185 UART: [art] SIG.R = 2B73034D293189F1C93E1A586A8E0576BFCB5C7F15D3274D7B5F0842CF11725F8136ECC7701ABF3F9F50A5D21EDB64EB
3,270,956 UART: [art] SIG.S = 671AEDD0A3827AC10FAE3EA1668BFEAD13DC066BC7893FA2E3B4CC3320826F811D4A167B4D7B37A86793E09DD0FF9CDB
3,295,093 UART: Caliptra RT
3,295,438 UART: [state] CFI Enabled
3,403,482 UART: [rt] RT listening for mailbox commands...
3,404,152 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,754 UART: [rt]cmd =0x4c4d5356, len=1672
3,697,291 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
893,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,689 UART: [kat] ++
897,841 UART: [kat] sha1
902,089 UART: [kat] SHA2-256
904,029 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,176 UART: [kat] HMAC-384Kdf
922,738 UART: [kat] LMS
1,171,066 UART: [kat] --
1,171,911 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,174,892 UART: [idev] ++
1,175,060 UART: [idev] CDI.KEYID = 6
1,175,420 UART: [idev] SUBJECT.KEYID = 7
1,175,844 UART: [idev] UDS.KEYID = 0
1,176,189 ready_for_fw is high
1,176,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,976 UART: [idev] Erasing UDS.KEYID = 0
1,200,691 UART: [idev] Sha1 KeyId Algorithm
1,209,075 UART: [idev] --
1,210,153 UART: [ldev] ++
1,210,321 UART: [ldev] CDI.KEYID = 6
1,210,684 UART: [ldev] SUBJECT.KEYID = 5
1,211,110 UART: [ldev] AUTHORITY.KEYID = 7
1,211,573 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,099 UART: [ldev] --
1,281,370 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,676 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,083 >>> mbox cmd response: success
2,771,269 UART: [afmc] ++
2,771,437 UART: [afmc] CDI.KEYID = 6
2,771,799 UART: [afmc] SUBJECT.KEYID = 7
2,772,224 UART: [afmc] AUTHORITY.KEYID = 5
2,807,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,276 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,608 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,358 UART: [afmc] --
2,851,336 UART: [cold-reset] --
2,852,184 UART: [state] Locking Datavault
2,853,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,299 UART: [state] Locking ICCM
2,854,861 UART: [exit] Launching FMC @ 0x40000130
2,860,190 UART:
2,860,206 UART: Running Caliptra FMC ...
2,860,614 UART:
2,860,668 UART: [state] CFI Enabled
2,871,273 UART: [fht] FMC Alias Private Key: 7
2,979,508 UART: [art] Extend RT PCRs Done
2,979,936 UART: [art] Lock RT PCRs Done
2,981,376 UART: [art] Populate DV Done
2,989,665 UART: [fht] FMC Alias Private Key: 7
2,990,843 UART: [art] Derive CDI
2,991,123 UART: [art] Store in in slot 0x4
3,077,136 UART: [art] Derive Key Pair
3,077,496 UART: [art] Store priv key in slot 0x5
3,091,050 UART: [art] Derive Key Pair - Done
3,105,642 UART: [art] Signing Cert with AUTHO
3,106,122 UART: RITY.KEYID = 7
3,121,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,985 UART: [art] PUB.X = 66FBA12AB9B7E98F8587B4362164181139F52447858B0B06A67B32AF493B5DABED1525AE8F3B26E1FC477E3B8684748C
3,128,751 UART: [art] PUB.Y = C7304A8F9F1C35108F739206DDCC65F85E9C4411FAD88F7E01F6136587F80D36F96705C42EF8451766F8C8A9FD779B2F
3,135,691 UART: [art] SIG.R = 2942E8708744B5132D54EA64BDB984D5CCB1FCB1158FF737CAD59E1DD5D7F47E339F6A14AF475F9553EE22A6B3610E0C
3,142,467 UART: [art] SIG.S = FD4C0671E0A6E9F06449B0EA5EB18DC8F88E422E638A52EE3F1816ABBDAE5E9B2905D0992F50F01F05CFFBD31F21ACF6
3,166,687 UART: Caliptra RT
3,166,940 UART: [state] CFI Enabled
3,274,907 UART: [rt] RT listening for mailbox commands...
3,275,577 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,457 UART: [rt]cmd =0x4c4d5356, len=1672
3,569,032 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,033 ready_for_fw is high
1,061,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,544 >>> mbox cmd response: success
2,688,862 UART:
2,688,878 UART: Running Caliptra FMC ...
2,689,286 UART:
2,689,340 UART: [state] CFI Enabled
2,699,817 UART: [fht] FMC Alias Private Key: 7
2,807,518 UART: [art] Extend RT PCRs Done
2,807,946 UART: [art] Lock RT PCRs Done
2,809,358 UART: [art] Populate DV Done
2,817,461 UART: [fht] FMC Alias Private Key: 7
2,818,549 UART: [art] Derive CDI
2,818,829 UART: [art] Store in in slot 0x4
2,904,300 UART: [art] Derive Key Pair
2,904,660 UART: [art] Store priv key in slot 0x5
2,917,250 UART: [art] Derive Key Pair - Done
2,931,866 UART: [art] Signing Cert with AUTHO
2,932,346 UART: RITY.KEYID = 7
2,947,438 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,203 UART: [art] PUB.X = C936A573ECB5C99EB4E15BC65BC7BEC265069705AA2DC8B8FA29BC52C063200D235DCC394F59FB97C5FFE101C81A196C
2,954,979 UART: [art] PUB.Y = D348C60CFA09230C87788B3C3A031E36FE2F25D16D83AB1FA8EC0E21D229A9439CC4D455EEB57E895918A6E96782388F
2,961,920 UART: [art] SIG.R = 0867F449CEC94BDA992216C4DD63B5106718856188BD3CAD477D139B98105492B7FCF32CC8CABD44C7BF6C8D1FFD1108
2,968,694 UART: [art] SIG.S = 8425EE06546AB7BDD6F2B17DB4E00939E44967BF0156BEFEA597C0CF789620E3D1AE44B31797803EED147788949E5CDA
2,992,506 UART: Caliptra RT
2,992,759 UART: [state] CFI Enabled
3,100,836 UART: [rt] RT listening for mailbox commands...
3,101,506 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,994 UART: [rt]cmd =0x4c4d5356, len=1672
3,394,583 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
893,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,400 UART: [kat] ++
897,552 UART: [kat] sha1
901,658 UART: [kat] SHA2-256
903,598 UART: [kat] SHA2-384
906,367 UART: [kat] SHA2-512-ACC
908,268 UART: [kat] ECC-384
918,025 UART: [kat] HMAC-384Kdf
922,579 UART: [kat] LMS
1,170,907 UART: [kat] --
1,171,740 UART: [cold-reset] ++
1,172,204 UART: [fht] FHT @ 0x50003400
1,174,765 UART: [idev] ++
1,174,933 UART: [idev] CDI.KEYID = 6
1,175,293 UART: [idev] SUBJECT.KEYID = 7
1,175,717 UART: [idev] UDS.KEYID = 0
1,176,062 ready_for_fw is high
1,176,062 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,589 UART: [idev] Erasing UDS.KEYID = 0
1,200,998 UART: [idev] Sha1 KeyId Algorithm
1,209,384 UART: [idev] --
1,210,472 UART: [ldev] ++
1,210,640 UART: [ldev] CDI.KEYID = 6
1,211,003 UART: [ldev] SUBJECT.KEYID = 5
1,211,429 UART: [ldev] AUTHORITY.KEYID = 7
1,211,892 UART: [ldev] FE.KEYID = 1
1,217,308 UART: [ldev] Erasing FE.KEYID = 1
1,243,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,534 UART: [ldev] --
1,283,013 UART: [fwproc] Wait for Commands...
1,283,689 UART: [fwproc] Recv command 0x46574c44
1,284,417 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,748 >>> mbox cmd response: success
2,773,904 UART: [afmc] ++
2,774,072 UART: [afmc] CDI.KEYID = 6
2,774,434 UART: [afmc] SUBJECT.KEYID = 7
2,774,859 UART: [afmc] AUTHORITY.KEYID = 5
2,810,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,521 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,125 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,069 UART: [afmc] --
2,854,171 UART: [cold-reset] --
2,854,841 UART: [state] Locking Datavault
2,855,952 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,556 UART: [state] Locking ICCM
2,857,230 UART: [exit] Launching FMC @ 0x40000130
2,862,559 UART:
2,862,575 UART: Running Caliptra FMC ...
2,862,983 UART:
2,863,126 UART: [state] CFI Enabled
2,873,925 UART: [fht] FMC Alias Private Key: 7
2,982,276 UART: [art] Extend RT PCRs Done
2,982,704 UART: [art] Lock RT PCRs Done
2,984,346 UART: [art] Populate DV Done
2,992,845 UART: [fht] FMC Alias Private Key: 7
2,993,837 UART: [art] Derive CDI
2,994,117 UART: [art] Store in in slot 0x4
3,080,080 UART: [art] Derive Key Pair
3,080,440 UART: [art] Store priv key in slot 0x5
3,094,616 UART: [art] Derive Key Pair - Done
3,109,375 UART: [art] Signing Cert with AUTHO
3,109,855 UART: RITY.KEYID = 7
3,125,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,134 UART: [art] PUB.X = AC20A2A7692B1EF26C0350D4B8640E05C063B9D7EDA9DA0121F6EC14A18866076BBBD6D45E8CB862BAD2D1166663C55C
3,132,901 UART: [art] PUB.Y = D8786CFEA071E293771DBC21DAFF429291C8307E583CDAECC1835A3818DB2CDADA50FEB0DFB956AC822A606078B07626
3,139,867 UART: [art] SIG.R = 9E3AF996864C0BFF932BEF763D36796F4B4A2DA7768C0098571EE1F59F1C32B625481EF087A404F0D9BBE00C10416EDF
3,146,614 UART: [art] SIG.S = B9553AD807C18C23676683CF19D4DB7E2CE5B11CB2542849D411DE5111FDD30CD85D7274BE14B86F42845B1241B1B6FF
3,170,375 UART: Caliptra RT
3,170,720 UART: [state] CFI Enabled
3,278,330 UART: [rt] RT listening for mailbox commands...
3,279,000 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,820 UART: [rt]cmd =0x4c4d5356, len=1672
3,572,139 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,744 ready_for_fw is high
1,060,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,837 >>> mbox cmd response: success
2,688,161 UART:
2,688,177 UART: Running Caliptra FMC ...
2,688,585 UART:
2,688,728 UART: [state] CFI Enabled
2,699,629 UART: [fht] FMC Alias Private Key: 7
2,807,852 UART: [art] Extend RT PCRs Done
2,808,280 UART: [art] Lock RT PCRs Done
2,809,682 UART: [art] Populate DV Done
2,817,637 UART: [fht] FMC Alias Private Key: 7
2,818,765 UART: [art] Derive CDI
2,819,045 UART: [art] Store in in slot 0x4
2,905,122 UART: [art] Derive Key Pair
2,905,482 UART: [art] Store priv key in slot 0x5
2,918,206 UART: [art] Derive Key Pair - Done
2,933,015 UART: [art] Signing Cert with AUTHO
2,933,495 UART: RITY.KEYID = 7
2,948,365 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,130 UART: [art] PUB.X = 9A7E4B14B54E5D9D25F5F47EC907B614589A9043545989881F364428CD7C214FD7E345F8274564D01BCAA462C990D821
2,955,891 UART: [art] PUB.Y = C82F3FAD12FFA35B8AB847FB9182678F926909E26EE5F13BF302E9F80C780CF9FFA308E59CB842936D0F0E0F903FAA1D
2,962,833 UART: [art] SIG.R = 210F49C16AD596C5F655E5B1B1B5BAEA56AAB15977DEB794CABDEC8CCCB355588C1EA12B9C66EDCA4137898D05A1E798
2,969,619 UART: [art] SIG.S = A9A1BBC320CA24F1930435DC42CF06C131231F3E8264BA11E92B6339FD5B46E0217640AEC63D9476312291CBEB49E69E
2,994,328 UART: Caliptra RT
2,994,673 UART: [state] CFI Enabled
3,102,828 UART: [rt] RT listening for mailbox commands...
3,103,498 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,232 UART: [rt]cmd =0x4c4d5356, len=1672
3,396,637 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
85,925 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,849 UART: [kat] ++
895,001 UART: [kat] sha1
899,343 UART: [kat] SHA2-256
901,283 UART: [kat] SHA2-384
903,984 UART: [kat] SHA2-512-ACC
905,885 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,911 UART: [cold-reset] ++
1,170,343 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 ready_for_fw is high
1,174,257 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,199,235 UART: [idev] Sha1 KeyId Algorithm
1,208,123 UART: [idev] --
1,209,140 UART: [ldev] ++
1,209,308 UART: [ldev] CDI.KEYID = 6
1,209,672 UART: [ldev] SUBJECT.KEYID = 5
1,210,099 UART: [ldev] AUTHORITY.KEYID = 7
1,210,562 UART: [ldev] FE.KEYID = 1
1,215,772 UART: [ldev] Erasing FE.KEYID = 1
1,241,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,138 UART: [ldev] --
1,281,514 UART: [fwproc] Wait for Commands...
1,282,117 UART: [fwproc] Recv command 0x46574c44
1,282,850 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,405 >>> mbox cmd response: success
2,772,594 UART: [afmc] ++
2,772,762 UART: [afmc] CDI.KEYID = 6
2,773,125 UART: [afmc] SUBJECT.KEYID = 7
2,773,551 UART: [afmc] AUTHORITY.KEYID = 5
2,808,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,637 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,366 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,001 UART: [afmc] --
2,852,037 UART: [cold-reset] --
2,852,965 UART: [state] Locking Datavault
2,854,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,680 UART: [state] Locking ICCM
2,855,250 UART: [exit] Launching FMC @ 0x40000130
2,860,579 UART:
2,860,595 UART: Running Caliptra FMC ...
2,861,003 UART:
2,861,057 UART: [state] CFI Enabled
2,871,866 UART: [fht] FMC Alias Private Key: 7
2,979,581 UART: [art] Extend RT PCRs Done
2,980,009 UART: [art] Lock RT PCRs Done
2,981,415 UART: [art] Populate DV Done
2,989,672 UART: [fht] FMC Alias Private Key: 7
2,990,770 UART: [art] Derive CDI
2,991,050 UART: [art] Store in in slot 0x4
3,076,591 UART: [art] Derive Key Pair
3,076,951 UART: [art] Store priv key in slot 0x5
3,090,397 UART: [art] Derive Key Pair - Done
3,104,859 UART: [art] Signing Cert with AUTHO
3,105,339 UART: RITY.KEYID = 7
3,120,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,400 UART: [art] PUB.X = 6798E042661F0413A36DE1CCD076269A252CA20EDC40D0A445F6FCBCFA4C00D0111B499B5E44A93282B103AC3DB5E833
3,128,147 UART: [art] PUB.Y = 839D2B761CE6B40B881B63F7438525839D5421FB21EE356A7A21B7D5E034CBEC7E59C33F4AFB7010093BEFCD116CD208
3,135,096 UART: [art] SIG.R = 1C7FF012FB071DFFD783122668C3B29C8097D785C8FED6E4108A0C083DA3A71124D94836FEE3057AB2DDD3E7F354563F
3,141,862 UART: [art] SIG.S = A0209A90EA6B48AB9CCEA33E0C418BAAE18DA5960564A0D1878541F334598671FB361019AC878EFDF3FD7F74B0F5A454
3,165,747 UART: Caliptra RT
3,166,000 UART: [state] CFI Enabled
3,273,203 UART: [rt] RT listening for mailbox commands...
3,273,873 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,361 UART: [rt]cmd =0x4c4d5356, len=1672
3,566,994 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,732 ready_for_fw is high
1,056,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,005 >>> mbox cmd response: success
2,684,785 UART:
2,684,801 UART: Running Caliptra FMC ...
2,685,209 UART:
2,685,263 UART: [state] CFI Enabled
2,695,962 UART: [fht] FMC Alias Private Key: 7
2,804,145 UART: [art] Extend RT PCRs Done
2,804,573 UART: [art] Lock RT PCRs Done
2,806,343 UART: [art] Populate DV Done
2,814,340 UART: [fht] FMC Alias Private Key: 7
2,815,372 UART: [art] Derive CDI
2,815,652 UART: [art] Store in in slot 0x4
2,901,373 UART: [art] Derive Key Pair
2,901,733 UART: [art] Store priv key in slot 0x5
2,914,447 UART: [art] Derive Key Pair - Done
2,929,319 UART: [art] Signing Cert with AUTHO
2,929,799 UART: RITY.KEYID = 7
2,945,029 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,794 UART: [art] PUB.X = D531CEC55E68697D359FBC2581B27F630A62E836E165AC58AB5420C3095440ADACEE0FCC68DD5A553025E1B8AAAC65C1
2,952,569 UART: [art] PUB.Y = 2F197A0249B9C674C753EC0828411357A78F8DF42C53475A5AE90032A420CBB7F27CE70F3F9D059FAEB229B0B382B5C1
2,959,489 UART: [art] SIG.R = 6FCBDBF269DE670D47D3A9AC45568A140A67DD3A2B6C95C7F927C74BCD3DD136C23269DF39B39F7901907B3F3D87E524
2,966,262 UART: [art] SIG.S = 6CF51E3978BBEF836F3C44033323F43DE96DA168F42C5682137E5D99FC95E7E5FDF4E9F82141D8A29E05E44C2E96B3F5
2,989,767 UART: Caliptra RT
2,990,020 UART: [state] CFI Enabled
3,096,907 UART: [rt] RT listening for mailbox commands...
3,097,577 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,495 UART: [rt]cmd =0x4c4d5356, len=1672
3,391,002 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
891,455 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,584 UART: [kat] ++
895,736 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,051 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,644 UART: [idev] ++
1,172,812 UART: [idev] CDI.KEYID = 6
1,173,173 UART: [idev] SUBJECT.KEYID = 7
1,173,598 UART: [idev] UDS.KEYID = 0
1,173,944 ready_for_fw is high
1,173,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,818 UART: [idev] Erasing UDS.KEYID = 0
1,198,918 UART: [idev] Sha1 KeyId Algorithm
1,207,760 UART: [idev] --
1,208,861 UART: [ldev] ++
1,209,029 UART: [ldev] CDI.KEYID = 6
1,209,393 UART: [ldev] SUBJECT.KEYID = 5
1,209,820 UART: [ldev] AUTHORITY.KEYID = 7
1,210,283 UART: [ldev] FE.KEYID = 1
1,215,589 UART: [ldev] Erasing FE.KEYID = 1
1,241,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,259 UART: [fwproc] Wait for Commands...
1,281,946 UART: [fwproc] Recv command 0x46574c44
1,282,679 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,242 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,868 >>> mbox cmd response: success
2,771,905 UART: [afmc] ++
2,772,073 UART: [afmc] CDI.KEYID = 6
2,772,436 UART: [afmc] SUBJECT.KEYID = 7
2,772,862 UART: [afmc] AUTHORITY.KEYID = 5
2,808,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,072 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,801 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,684 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,403 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,064 UART: [afmc] --
2,852,110 UART: [cold-reset] --
2,852,920 UART: [state] Locking Datavault
2,853,893 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,497 UART: [state] Locking ICCM
2,854,929 UART: [exit] Launching FMC @ 0x40000130
2,860,258 UART:
2,860,274 UART: Running Caliptra FMC ...
2,860,682 UART:
2,860,825 UART: [state] CFI Enabled
2,871,354 UART: [fht] FMC Alias Private Key: 7
2,979,203 UART: [art] Extend RT PCRs Done
2,979,631 UART: [art] Lock RT PCRs Done
2,981,067 UART: [art] Populate DV Done
2,989,520 UART: [fht] FMC Alias Private Key: 7
2,990,502 UART: [art] Derive CDI
2,990,782 UART: [art] Store in in slot 0x4
3,076,507 UART: [art] Derive Key Pair
3,076,867 UART: [art] Store priv key in slot 0x5
3,089,529 UART: [art] Derive Key Pair - Done
3,104,357 UART: [art] Signing Cert with AUTHO
3,104,837 UART: RITY.KEYID = 7
3,119,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,408 UART: [art] PUB.X = 66A444094A2B06D97DCC818033D9161ABE2532BD6C40A2D31B92DE2F33FC981C9092899D9348079FDF0D08C582193589
3,127,159 UART: [art] PUB.Y = 80E1C8E8850B67933F4DAE5FC17080DB71EC6B8B529383A4DF57A798FD77BA7453B2E47475D04FABEB6292504528D20A
3,134,109 UART: [art] SIG.R = 9187AFC02CBFC3432916A716CAD67444C988508B39D27FB5C5AB00D74FC16EDBD3089B15218C67FEEBB1E1838AAF6227
3,140,866 UART: [art] SIG.S = C232C04AFBADC9F869D735FC50C342526964400A7B6203C16C7429D02BBC0D703F17AD93E3A2FFA71CDEDF3321B75B5D
3,164,884 UART: Caliptra RT
3,165,229 UART: [state] CFI Enabled
3,272,691 UART: [rt] RT listening for mailbox commands...
3,273,361 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,417 UART: [rt]cmd =0x4c4d5356, len=1672
3,566,794 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,919 ready_for_fw is high
1,055,919 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,618 >>> mbox cmd response: success
2,683,750 UART:
2,683,766 UART: Running Caliptra FMC ...
2,684,174 UART:
2,684,317 UART: [state] CFI Enabled
2,694,976 UART: [fht] FMC Alias Private Key: 7
2,802,883 UART: [art] Extend RT PCRs Done
2,803,311 UART: [art] Lock RT PCRs Done
2,804,871 UART: [art] Populate DV Done
2,813,090 UART: [fht] FMC Alias Private Key: 7
2,814,152 UART: [art] Derive CDI
2,814,432 UART: [art] Store in in slot 0x4
2,900,033 UART: [art] Derive Key Pair
2,900,393 UART: [art] Store priv key in slot 0x5
2,913,557 UART: [art] Derive Key Pair - Done
2,928,099 UART: [art] Signing Cert with AUTHO
2,928,579 UART: RITY.KEYID = 7
2,943,441 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,206 UART: [art] PUB.X = 159AEEF424D764D8FF343642B55BE41358BB9164E0A39D13BEE7984224A14D59187ED062F925DB7037F3B3533D0DDCF8
2,950,977 UART: [art] PUB.Y = 1EEB0E3EAF2AAF0DFA81D9A74D2519521D45B969CDBB8200F855D853435D29A9459793F205DD4A225DB50B4AB6D98F43
2,957,905 UART: [art] SIG.R = 89AEE566A592BE0462DA8C16816DEA6C007675DE3BB60B3A21C3098EC735DEF1C63DAA479E24BC432838A95598194D1B
2,964,652 UART: [art] SIG.S = 1F397FE4F9B7CA91625B0DE6459B316D66687B3108A3206262127EE1ED1C986B035CF6469597265535520D70BF931995
2,988,623 UART: Caliptra RT
2,988,968 UART: [state] CFI Enabled
3,097,753 UART: [rt] RT listening for mailbox commands...
3,098,423 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,287 UART: [rt]cmd =0x4c4d5356, len=1672
3,391,584 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,988 UART:
192,361 UART: Running Caliptra ROM ...
193,456 UART:
193,595 UART: [state] CFI Enabled
264,205 UART: [state] LifecycleState = Unprovisioned
266,204 UART: [state] DebugLocked = No
267,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,235 UART: [kat] SHA2-256
441,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,454 UART: [kat] ++
453,126 UART: [kat] sha1
462,609 UART: [kat] SHA2-256
465,283 UART: [kat] SHA2-384
469,852 UART: [kat] SHA2-512-ACC
472,213 UART: [kat] ECC-384
2,767,527 UART: [kat] HMAC-384Kdf
2,781,019 UART: [kat] LMS
3,971,363 UART: [kat] --
3,976,419 UART: [cold-reset] ++
3,978,864 UART: [fht] Storing FHT @ 0x50003400
3,989,572 UART: [idev] ++
3,990,133 UART: [idev] CDI.KEYID = 6
3,991,007 UART: [idev] SUBJECT.KEYID = 7
3,992,316 UART: [idev] UDS.KEYID = 0
3,993,393 ready_for_fw is high
3,993,618 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,136,895 UART: [idev] Erasing UDS.KEYID = 0
7,329,989 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,087 UART: [idev] --
7,356,520 UART: [ldev] ++
7,357,094 UART: [ldev] CDI.KEYID = 6
7,358,031 UART: [ldev] SUBJECT.KEYID = 5
7,359,293 UART: [ldev] AUTHORITY.KEYID = 7
7,360,516 UART: [ldev] FE.KEYID = 1
7,404,699 UART: [ldev] Erasing FE.KEYID = 1
10,737,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,152 UART: [ldev] --
13,117,273 UART: [fwproc] Waiting for Commands...
13,120,598 UART: [fwproc] Received command 0x46574c44
13,122,771 UART: [fwproc] Received Image of size 113844 bytes
17,169,943 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,528 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,626,096 >>> mbox cmd response: success
17,629,632 UART: [afmc] ++
17,630,279 UART: [afmc] CDI.KEYID = 6
17,631,186 UART: [afmc] SUBJECT.KEYID = 7
17,632,398 UART: [afmc] AUTHORITY.KEYID = 5
20,985,540 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,549 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,994 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,816 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,281 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,877 UART: [afmc] --
23,361,521 UART: [cold-reset] --
23,366,024 UART: [state] Locking Datavault
23,370,901 UART: [state] Locking PCR0, PCR1 and PCR31
23,372,593 UART: [state] Locking ICCM
23,374,741 UART: [exit] Launching FMC @ 0x40000130
23,383,133 UART:
23,383,369 UART: Running Caliptra FMC ...
23,384,465 UART:
23,384,617 UART: [state] CFI Enabled
23,448,432 UART: [fht] FMC Alias Private Key: 7
25,786,901 UART: [art] Extend RT PCRs Done
25,788,117 UART: [art] Lock RT PCRs Done
25,789,622 UART: [art] Populate DV Done
25,795,079 UART: [fht] FMC Alias Private Key: 7
25,796,718 UART: [art] Derive CDI
25,797,450 UART: [art] Store in in slot 0x4
25,857,162 UART: [art] Derive Key Pair
25,858,194 UART: [art] Store priv key in slot 0x5
29,150,554 UART: [art] Derive Key Pair - Done
29,163,386 UART: [art] Signing Cert with AUTHO
29,164,680 UART: RITY.KEYID = 7
31,452,612 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,119 UART: [art] PUB.X = 8B2123270593E72F9ED37EF505937A1DEEDD32BA4DA823F08C9EA1F20D21A1AFC6BF6946DA1163698851119D5787DBE7
31,461,394 UART: [art] PUB.Y = 01E37380C1AF6DF2EB72F2D90140A37A6204D70C0A77D33B0F86D7788A419049493E5953358905965818026F37099EBE
31,468,589 UART: [art] SIG.R = EAC4E8AFC4235225A69B0EF0447090E6C6A832393E467D0D1D8C145B801E1B476460786417A12E194209E7A4FEC0D34D
31,475,973 UART: [art] SIG.S = 8B1E4CA52E23A8BDE2EFBA57B8F7E248AF9A23F3F9FFC41FA244EC4E8DDEB41B583D36C4E2A929C4DA83E8AFFB033604
32,781,497 UART: Caliptra RT
32,782,188 UART: [state] CFI Enabled
32,962,179 UART: [rt] RT listening for mailbox commands...
32,966,164 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,011,011 UART: [rt]cmd =0x4c4d5356, len=1672
33,424,900 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,803,328 ready_for_fw is high
3,803,865 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,890,607 >>> mbox cmd response: success
23,610,112 UART:
23,610,495 UART: Running Caliptra FMC ...
23,611,705 UART:
23,611,873 UART: [state] CFI Enabled
23,681,301 UART: [fht] FMC Alias Private Key: 7
26,019,195 UART: [art] Extend RT PCRs Done
26,020,423 UART: [art] Lock RT PCRs Done
26,022,210 UART: [art] Populate DV Done
26,027,621 UART: [fht] FMC Alias Private Key: 7
26,029,056 UART: [art] Derive CDI
26,029,817 UART: [art] Store in in slot 0x4
26,090,175 UART: [art] Derive Key Pair
26,091,220 UART: [art] Store priv key in slot 0x5
29,384,007 UART: [art] Derive Key Pair - Done
29,397,014 UART: [art] Signing Cert with AUTHO
29,398,342 UART: RITY.KEYID = 7
31,684,802 UART: [art] Erasing AUTHORITY.KEYID = 7
31,686,312 UART: [art] PUB.X = 198CD505808E693B725B86BE6BB144BBCAAC5EAB6901BE684D11C846E541F814EB9FE60477D346BB5974BAF0AA922B55
31,693,567 UART: [art] PUB.Y = DACAC6CF5A6934C7E9B1C30834CD40272F915918ADC458221B9BE1B49FE249D547E1557000FBEF5C751CAC494B577D31
31,700,819 UART: [art] SIG.R = 8EEC88463BEC4B176618A027B6EEA678233EFC628841E080803F0471FCE5E94EF827304B344EC1BE2AC3B6503A44A90A
31,708,166 UART: [art] SIG.S = 920DB47F6819A1B7603F14816C3E39F164A4A8C5DE7668EB1045A7FC78CBB1CB5910CB3981596672AD0B6B20A6837608
33,013,599 UART: Caliptra RT
33,014,334 UART: [state] CFI Enabled
33,194,073 UART: [rt] RT listening for mailbox commands...
33,198,049 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,243,143 UART: [rt]cmd =0x4c4d5356, len=1672
33,656,900 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,383 UART:
192,754 UART: Running Caliptra ROM ...
193,881 UART:
603,484 UART: [state] CFI Enabled
614,266 UART: [state] LifecycleState = Unprovisioned
616,161 UART: [state] DebugLocked = No
617,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,412 UART: [kat] SHA2-256
793,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,721 UART: [kat] ++
804,219 UART: [kat] sha1
816,349 UART: [kat] SHA2-256
819,085 UART: [kat] SHA2-384
824,087 UART: [kat] SHA2-512-ACC
826,462 UART: [kat] ECC-384
3,111,745 UART: [kat] HMAC-384Kdf
3,123,840 UART: [kat] LMS
4,313,938 UART: [kat] --
4,319,075 UART: [cold-reset] ++
4,321,435 UART: [fht] Storing FHT @ 0x50003400
4,332,278 UART: [idev] ++
4,332,906 UART: [idev] CDI.KEYID = 6
4,333,805 UART: [idev] SUBJECT.KEYID = 7
4,335,095 UART: [idev] UDS.KEYID = 0
4,336,084 ready_for_fw is high
4,336,284 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,785 UART: [idev] Erasing UDS.KEYID = 0
7,624,755 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,371 UART: [idev] --
7,651,279 UART: [ldev] ++
7,651,862 UART: [ldev] CDI.KEYID = 6
7,652,945 UART: [ldev] SUBJECT.KEYID = 5
7,654,073 UART: [ldev] AUTHORITY.KEYID = 7
7,655,260 UART: [ldev] FE.KEYID = 1
7,666,874 UART: [ldev] Erasing FE.KEYID = 1
10,955,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,209 UART: [ldev] --
13,316,418 UART: [fwproc] Waiting for Commands...
13,319,286 UART: [fwproc] Received command 0x46574c44
13,321,469 UART: [fwproc] Received Image of size 113844 bytes
17,366,035 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,832,667 >>> mbox cmd response: success
17,836,746 UART: [afmc] ++
17,837,347 UART: [afmc] CDI.KEYID = 6
17,838,258 UART: [afmc] SUBJECT.KEYID = 7
17,839,474 UART: [afmc] AUTHORITY.KEYID = 5
21,157,338 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,559 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,864 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,200 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,484,069 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,558 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,587 UART: [afmc] --
23,525,292 UART: [cold-reset] --
23,529,434 UART: [state] Locking Datavault
23,534,955 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,655 UART: [state] Locking ICCM
23,537,782 UART: [exit] Launching FMC @ 0x40000130
23,546,173 UART:
23,546,417 UART: Running Caliptra FMC ...
23,547,522 UART:
23,547,697 UART: [state] CFI Enabled
23,555,666 UART: [fht] FMC Alias Private Key: 7
25,886,166 UART: [art] Extend RT PCRs Done
25,887,394 UART: [art] Lock RT PCRs Done
25,888,968 UART: [art] Populate DV Done
25,894,463 UART: [fht] FMC Alias Private Key: 7
25,896,038 UART: [art] Derive CDI
25,896,898 UART: [art] Store in in slot 0x4
25,939,657 UART: [art] Derive Key Pair
25,940,659 UART: [art] Store priv key in slot 0x5
29,183,304 UART: [art] Derive Key Pair - Done
29,196,405 UART: [art] Signing Cert with AUTHO
29,197,705 UART: RITY.KEYID = 7
31,476,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,349 UART: [art] PUB.X = 4EF8BE004E2C5E708413F489A23FF1EB59F33E48DB4E252ADC3AFD7A0E9E51CE5E89081D697CA6F58DDBFE7C064EE5B6
31,485,617 UART: [art] PUB.Y = C7E7719A823F0400F1E3BA39C13568C56CC8A2060F30B6EF2248CD9222E768DBD7D79044739D8ED0C27B1F6767D0B1D3
31,492,948 UART: [art] SIG.R = 550261502A685632B33C75A15BA79C3E7437D7607FFC70BD8E38140CEB178758A4751D4ABA7F7F1B1952C8589075573B
31,500,221 UART: [art] SIG.S = CADDE13E11CBA935AFB80F33628200307A2989D9A77BC30BDF974CD3F2C1EFCAF79AEB44B89E8A71D7A860A8F4A388FE
32,805,417 UART: Caliptra RT
32,806,127 UART: [state] CFI Enabled
32,923,462 UART: [rt] RT listening for mailbox commands...
32,927,453 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
32,972,348 UART: [rt]cmd =0x4c4d5356, len=1672
33,385,960 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
4,132,651 ready_for_fw is high
4,133,199 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,067,344 >>> mbox cmd response: success
23,704,844 UART:
23,705,250 UART: Running Caliptra FMC ...
23,706,397 UART:
23,706,560 UART: [state] CFI Enabled
23,714,350 UART: [fht] FMC Alias Private Key: 7
26,044,933 UART: [art] Extend RT PCRs Done
26,046,165 UART: [art] Lock RT PCRs Done
26,048,013 UART: [art] Populate DV Done
26,053,289 UART: [fht] FMC Alias Private Key: 7
26,054,948 UART: [art] Derive CDI
26,055,767 UART: [art] Store in in slot 0x4
26,098,270 UART: [art] Derive Key Pair
26,099,310 UART: [art] Store priv key in slot 0x5
29,341,243 UART: [art] Derive Key Pair - Done
29,354,107 UART: [art] Signing Cert with AUTHO
29,355,453 UART: RITY.KEYID = 7
31,635,080 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,661 UART: [art] PUB.X = E4FB1765D5F030ED42C0D2D3F4378A6D69365FAD4DDE6B1AF32B8247C7CBC852B9916F5353173820DD323A66A7FF1545
31,643,889 UART: [art] PUB.Y = 95AEE1B3E1A8896CF9734231556E90A99C0ACF4043069E59136078F8D91570768A8F3D74B71CE722FAD6AC01401DEA65
31,651,091 UART: [art] SIG.R = 311A6CEBB303B68DF55A74AD5FDAF18B8CEC0B83F6B9993247F58731F8A48D198F0778FF62DD391BD9F16265B5678FBD
31,658,492 UART: [art] SIG.S = AE9E86E8A53A9B3CDBC74B77C572ABDAA6B7E2FBCE8F83530E824F86C0589CE572E91E0375FD1AFA25D0F5C11380C20D
32,963,317 UART: Caliptra RT
32,964,024 UART: [state] CFI Enabled
33,082,172 UART: [rt] RT listening for mailbox commands...
33,086,175 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,131,251 UART: [rt]cmd =0x4c4d5356, len=1672
33,545,024 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,077 UART:
192,447 UART: Running Caliptra ROM ...
193,601 UART:
193,753 UART: [state] CFI Enabled
264,300 UART: [state] LifecycleState = Unprovisioned
266,218 UART: [state] DebugLocked = No
268,964 UART: [state] WD Timer not started. Device not locked for debugging
273,579 UART: [kat] SHA2-256
452,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,266 UART: [kat] ++
464,826 UART: [kat] sha1
476,068 UART: [kat] SHA2-256
479,085 UART: [kat] SHA2-384
486,501 UART: [kat] SHA2-512-ACC
489,446 UART: [kat] ECC-384
2,948,415 UART: [kat] HMAC-384Kdf
2,972,798 UART: [kat] LMS
3,502,299 UART: [kat] --
3,507,005 UART: [cold-reset] ++
3,508,231 UART: [fht] FHT @ 0x50003400
3,519,491 UART: [idev] ++
3,520,056 UART: [idev] CDI.KEYID = 6
3,520,972 UART: [idev] SUBJECT.KEYID = 7
3,522,143 UART: [idev] UDS.KEYID = 0
3,523,068 ready_for_fw is high
3,523,260 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,864 UART: [idev] Erasing UDS.KEYID = 0
6,027,641 UART: [idev] Sha1 KeyId Algorithm
6,050,046 UART: [idev] --
6,052,592 UART: [ldev] ++
6,053,170 UART: [ldev] CDI.KEYID = 6
6,054,080 UART: [ldev] SUBJECT.KEYID = 5
6,055,301 UART: [ldev] AUTHORITY.KEYID = 7
6,056,489 UART: [ldev] FE.KEYID = 1
6,101,596 UART: [ldev] Erasing FE.KEYID = 1
8,609,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,550 UART: [ldev] --
10,415,353 UART: [fwproc] Wait for Commands...
10,418,278 UART: [fwproc] Recv command 0x46574c44
10,420,319 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,116 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,275,910 >>> mbox cmd response: success
14,279,568 UART: [afmc] ++
14,280,160 UART: [afmc] CDI.KEYID = 6
14,281,077 UART: [afmc] SUBJECT.KEYID = 7
14,282,243 UART: [afmc] AUTHORITY.KEYID = 5
16,808,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,863 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,791 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,548 UART: [afmc] --
18,609,700 UART: [cold-reset] --
18,612,970 UART: [state] Locking Datavault
18,618,325 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,973 UART: [state] Locking ICCM
18,621,155 UART: [exit] Launching FMC @ 0x40000130
18,629,566 UART:
18,629,801 UART: Running Caliptra FMC ...
18,630,902 UART:
18,631,065 UART: [state] CFI Enabled
18,692,352 UART: [fht] FMC Alias Private Key: 7
20,456,356 UART: [art] Extend RT PCRs Done
20,457,580 UART: [art] Lock RT PCRs Done
20,458,940 UART: [art] Populate DV Done
20,464,028 UART: [fht] FMC Alias Private Key: 7
20,465,562 UART: [art] Derive CDI
20,466,397 UART: [art] Store in in slot 0x4
20,524,582 UART: [art] Derive Key Pair
20,525,621 UART: [art] Store priv key in slot 0x5
22,988,740 UART: [art] Derive Key Pair - Done
23,001,898 UART: [art] Signing Cert with AUTHO
23,003,208 UART: RITY.KEYID = 7
24,714,928 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,433 UART: [art] PUB.X = 4EF60CF556A242C5CECA97265C5069B5897D0604F72AD145EC42B906DBA00EFC9BA597FB774459FD13AF4FF8DB76C2A5
24,723,689 UART: [art] PUB.Y = 8825B617E6105E23928A3EEBE813A23A1548899F24AF29CF58EEE0848D15F6E39869316049FE410BFC3635D18D1A41C7
24,730,979 UART: [art] SIG.R = 5A47ACFF46B718FE4B789288663A95824C43C81E25ECC5B2081C9C529B1AE9D9A65BF60DA1464919A904A01F60D6DE2D
24,738,349 UART: [art] SIG.S = BF0235F59CCD624EFC3F64AD55374CB287863CA6F1721921B414E5C7DA9DD66C2C474E53A34308A6CF751486E25321A0
25,717,470 UART: Caliptra RT
25,718,181 UART: [state] CFI Enabled
25,882,437 UART: [rt] RT listening for mailbox commands...
25,886,440 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,931,537 UART: [rt]cmd =0x4c4d5356, len=1672
26,132,935 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,357,909 ready_for_fw is high
3,358,352 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,037,569 >>> mbox cmd response: success
18,327,131 UART:
18,327,540 UART: Running Caliptra FMC ...
18,328,676 UART:
18,328,835 UART: [state] CFI Enabled
18,393,374 UART: [fht] FMC Alias Private Key: 7
20,157,714 UART: [art] Extend RT PCRs Done
20,158,928 UART: [art] Lock RT PCRs Done
20,160,474 UART: [art] Populate DV Done
20,165,772 UART: [fht] FMC Alias Private Key: 7
20,167,528 UART: [art] Derive CDI
20,168,341 UART: [art] Store in in slot 0x4
20,226,309 UART: [art] Derive Key Pair
20,227,354 UART: [art] Store priv key in slot 0x5
22,689,956 UART: [art] Derive Key Pair - Done
22,703,174 UART: [art] Signing Cert with AUTHO
22,704,502 UART: RITY.KEYID = 7
24,416,505 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,999 UART: [art] PUB.X = FD24E8186A5C9A5EDA24FEFE1E4D8816204A01E052E5C3B4E39E8FB211969E477AA351F49CE7FDA57022D488EC33B7C7
24,425,291 UART: [art] PUB.Y = B0F681A06D31D81C8D364D8B744D83B286F6804B4C3FEC5373E323B55FFE955CFBE89253E538F461187D90F8AC6BE82C
24,432,530 UART: [art] SIG.R = 2065F6CCA48DB229C8FC4F0F362E797093BBF7BC496CC0AA0D80BF52D025B917B21AFB819A10B66F844499953BF23BA3
24,439,925 UART: [art] SIG.S = A63FF08C651815D0067ACE252E485A85ECD4166174DCB269865926D49261E979F69CC48C9DB98F1E613F00F7CB95A61C
25,419,499 UART: Caliptra RT
25,420,223 UART: [state] CFI Enabled
25,585,240 UART: [rt] RT listening for mailbox commands...
25,589,232 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,634,365 UART: [rt]cmd =0x4c4d5356, len=1672
25,835,626 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,422 writing to cptra_bootfsm_go
194,624 UART:
195,057 UART: Running Caliptra ROM ...
196,208 UART:
605,831 UART: [state] CFI Enabled
616,858 UART: [state] LifecycleState = Unprovisioned
618,739 UART: [state] DebugLocked = No
621,460 UART: [state] WD Timer not started. Device not locked for debugging
624,867 UART: [kat] SHA2-256
803,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,513 UART: [kat] ++
815,963 UART: [kat] sha1
826,642 UART: [kat] SHA2-256
829,657 UART: [kat] SHA2-384
835,438 UART: [kat] SHA2-512-ACC
838,371 UART: [kat] ECC-384
3,278,413 UART: [kat] HMAC-384Kdf
3,290,515 UART: [kat] LMS
3,820,011 UART: [kat] --
3,823,890 UART: [cold-reset] ++
3,826,047 UART: [fht] FHT @ 0x50003400
3,837,029 UART: [idev] ++
3,837,598 UART: [idev] CDI.KEYID = 6
3,838,511 UART: [idev] SUBJECT.KEYID = 7
3,839,686 UART: [idev] UDS.KEYID = 0
3,840,607 ready_for_fw is high
3,840,798 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,309 UART: [idev] Erasing UDS.KEYID = 0
6,311,321 UART: [idev] Sha1 KeyId Algorithm
6,334,755 UART: [idev] --
6,339,911 UART: [ldev] ++
6,340,492 UART: [ldev] CDI.KEYID = 6
6,341,406 UART: [ldev] SUBJECT.KEYID = 5
6,342,568 UART: [ldev] AUTHORITY.KEYID = 7
6,343,793 UART: [ldev] FE.KEYID = 1
6,353,877 UART: [ldev] Erasing FE.KEYID = 1
8,827,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,741 UART: [ldev] --
10,613,732 UART: [fwproc] Wait for Commands...
10,616,849 UART: [fwproc] Recv command 0x46574c44
10,618,913 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,437 >>> mbox cmd response: success
14,488,212 UART: [afmc] ++
14,488,811 UART: [afmc] CDI.KEYID = 6
14,489,726 UART: [afmc] SUBJECT.KEYID = 7
14,490,885 UART: [afmc] AUTHORITY.KEYID = 5
16,987,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,485 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,341 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,245 UART: [afmc] --
18,783,350 UART: [cold-reset] --
18,787,699 UART: [state] Locking Datavault
18,793,267 UART: [state] Locking PCR0, PCR1 and PCR31
18,794,964 UART: [state] Locking ICCM
18,797,115 UART: [exit] Launching FMC @ 0x40000130
18,805,510 UART:
18,805,783 UART: Running Caliptra FMC ...
18,806,892 UART:
18,807,054 UART: [state] CFI Enabled
18,815,429 UART: [fht] FMC Alias Private Key: 7
20,572,692 UART: [art] Extend RT PCRs Done
20,573,906 UART: [art] Lock RT PCRs Done
20,575,476 UART: [art] Populate DV Done
20,580,879 UART: [fht] FMC Alias Private Key: 7
20,582,369 UART: [art] Derive CDI
20,583,130 UART: [art] Store in in slot 0x4
20,625,958 UART: [art] Derive Key Pair
20,626,957 UART: [art] Store priv key in slot 0x5
23,053,533 UART: [art] Derive Key Pair - Done
23,066,588 UART: [art] Signing Cert with AUTHO
23,067,888 UART: RITY.KEYID = 7
24,773,318 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,823 UART: [art] PUB.X = 554CBBED658CB1831167FC23F7FD33400EAB83EF6135EF6D70EF6524817B03C0A41579BD4FB7F201F90F8612D61234FB
24,782,133 UART: [art] PUB.Y = 2DDC217423D7E70BFD5344B2982663454E176E121786E3BD4632FCE22C3556AA33B4D7E9819ACB91D11E363F3EC30F9F
24,789,366 UART: [art] SIG.R = 129F1D01CBB0CA70CC782C24142E82DB26D540BFDB762C6AC4D5CC88ED08523BA99BBEA77B904D678F1F9F9225A39579
24,796,817 UART: [art] SIG.S = F3B3E1947A21D31D66779916961FB6B590102E57BE958C2EE09F270F8C55FB1971459A801484FAE43C2FB0AE346317CC
25,775,967 UART: Caliptra RT
25,776,666 UART: [state] CFI Enabled
25,893,127 UART: [rt] RT listening for mailbox commands...
25,897,052 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,942,026 UART: [rt]cmd =0x4c4d5356, len=1672
26,143,494 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,801 writing to cptra_bootfsm_go
3,689,231 ready_for_fw is high
3,689,615 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,546 >>> mbox cmd response: success
18,509,934 UART:
18,510,338 UART: Running Caliptra FMC ...
18,511,531 UART:
18,511,702 UART: [state] CFI Enabled
18,519,478 UART: [fht] FMC Alias Private Key: 7
20,276,075 UART: [art] Extend RT PCRs Done
20,277,306 UART: [art] Lock RT PCRs Done
20,278,853 UART: [art] Populate DV Done
20,284,221 UART: [fht] FMC Alias Private Key: 7
20,285,771 UART: [art] Derive CDI
20,286,513 UART: [art] Store in in slot 0x4
20,329,271 UART: [art] Derive Key Pair
20,330,268 UART: [art] Store priv key in slot 0x5
22,757,173 UART: [art] Derive Key Pair - Done
22,770,332 UART: [art] Signing Cert with AUTHO
22,771,634 UART: RITY.KEYID = 7
24,477,390 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,901 UART: [art] PUB.X = 3B67076F0928800D61F7D53B34A5FB81042077DD64A02F8A9D95F3C5B6679BB2569A00DD9ED07C099A4892834351760A
24,486,098 UART: [art] PUB.Y = 05A0702BEF4D5E76160DB43BB6526F5B3A8C4603160D89B2288E464C1688AA6EF3EA167BCFA690FC2AA04DCC9F222D0D
24,493,360 UART: [art] SIG.R = 65DB7E8EC7848F25707053EF20447A9CC03521D40C4A0E89E088A9AE7126783AC1FA8F135592687F8229CE1EFBFB08D3
24,500,757 UART: [art] SIG.S = 2AB4F120E36C04D0CABEF0DCCF8BEFA7C39B67AE018756ED002F91850DE079F919F2A6213A1E6590C64D9BDFCE75D192
25,479,271 UART: Caliptra RT
25,479,970 UART: [state] CFI Enabled
25,597,101 UART: [rt] RT listening for mailbox commands...
25,601,032 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,646,133 UART: [rt]cmd =0x4c4d5356, len=1672
25,847,557 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,315 UART:
192,681 UART: Running Caliptra ROM ...
193,876 UART:
194,034 UART: [state] CFI Enabled
264,754 UART: [state] LifecycleState = Unprovisioned
267,179 UART: [state] DebugLocked = No
269,140 UART: [state] WD Timer not started. Device not locked for debugging
273,265 UART: [kat] SHA2-256
463,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,941 UART: [kat] ++
474,749 UART: [kat] sha1
485,852 UART: [kat] SHA2-256
488,859 UART: [kat] SHA2-384
493,643 UART: [kat] SHA2-512-ACC
496,236 UART: [kat] ECC-384
2,945,366 UART: [kat] HMAC-384Kdf
2,970,615 UART: [kat] LMS
3,502,352 UART: [kat] --
3,506,773 UART: [cold-reset] ++
3,508,491 UART: [fht] FHT @ 0x50003400
3,519,577 UART: [idev] ++
3,520,329 UART: [idev] CDI.KEYID = 6
3,521,251 UART: [idev] SUBJECT.KEYID = 7
3,522,426 UART: [idev] UDS.KEYID = 0
3,523,350 ready_for_fw is high
3,523,536 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,971 UART: [idev] Erasing UDS.KEYID = 0
6,026,799 UART: [idev] Sha1 KeyId Algorithm
6,049,969 UART: [idev] --
6,054,776 UART: [ldev] ++
6,055,458 UART: [ldev] CDI.KEYID = 6
6,056,375 UART: [ldev] SUBJECT.KEYID = 5
6,057,538 UART: [ldev] AUTHORITY.KEYID = 7
6,058,771 UART: [ldev] FE.KEYID = 1
6,099,564 UART: [ldev] Erasing FE.KEYID = 1
8,604,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,501 UART: [ldev] --
10,413,317 UART: [fwproc] Wait for Commands...
10,415,418 UART: [fwproc] Recv command 0x46574c44
10,417,670 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,282 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,439 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,594,191 >>> mbox cmd response: success
14,598,940 UART: [afmc] ++
14,599,656 UART: [afmc] CDI.KEYID = 6
14,600,846 UART: [afmc] SUBJECT.KEYID = 7
14,602,294 UART: [afmc] AUTHORITY.KEYID = 5
17,128,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,852,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,944 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,869,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,884,291 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,899,279 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,923,042 UART: [afmc] --
18,926,853 UART: [cold-reset] --
18,929,157 UART: [state] Locking Datavault
18,933,127 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,342 UART: [state] Locking ICCM
18,937,773 UART: [exit] Launching FMC @ 0x40000130
18,946,412 UART:
18,946,644 UART: Running Caliptra FMC ...
18,947,744 UART:
18,947,920 UART: [state] CFI Enabled
19,009,763 UART: [fht] FMC Alias Private Key: 7
20,773,299 UART: [art] Extend RT PCRs Done
20,774,511 UART: [art] Lock RT PCRs Done
20,776,027 UART: [art] Populate DV Done
20,781,816 UART: [fht] FMC Alias Private Key: 7
20,783,410 UART: [art] Derive CDI
20,784,224 UART: [art] Store in in slot 0x4
20,843,371 UART: [art] Derive Key Pair
20,844,406 UART: [art] Store priv key in slot 0x5
23,307,464 UART: [art] Derive Key Pair - Done
23,320,670 UART: [art] Signing Cert with AUTHO
23,321,969 UART: RITY.KEYID = 7
25,033,593 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,262 UART: [art] PUB.X = 877DB7F2CBE8AF81F9E0DE2FC23ECD167DD0BE7E5162BA08B3C19866A6984767400B376BA4D1DAEF04AB7616CF419AEF
25,042,442 UART: [art] PUB.Y = CFE82A29F2B3178B09F563E73EDA27B96A9C3188EE18436DE5D52483425F6E81324EDE051985E5B981DBA4E082D8F2AC
25,049,701 UART: [art] SIG.R = 4964142FC6315CA78A6C36D8E0D03B9E6CD25B1AB62C57073819F0B935F817C16D11E131AD57B086978E30BEF52D26E2
25,057,107 UART: [art] SIG.S = 00520560132E007D094BF02B2061BAA88EECB27141C71047D9B6FEA7B0DF046CF02EAE84503074CA9E6A24A7B08B1399
26,036,047 UART: Caliptra RT
26,036,769 UART: [state] CFI Enabled
26,202,644 UART: [rt] RT listening for mailbox commands...
26,206,644 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,251,531 UART: [rt]cmd =0x4c4d5356, len=1672
26,452,618 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,436,077 ready_for_fw is high
3,436,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,737,098 >>> mbox cmd response: success
19,047,703 UART:
19,048,100 UART: Running Caliptra FMC ...
19,049,306 UART:
19,049,486 UART: [state] CFI Enabled
19,114,601 UART: [fht] FMC Alias Private Key: 7
20,878,053 UART: [art] Extend RT PCRs Done
20,879,267 UART: [art] Lock RT PCRs Done
20,880,733 UART: [art] Populate DV Done
20,886,038 UART: [fht] FMC Alias Private Key: 7
20,887,527 UART: [art] Derive CDI
20,888,264 UART: [art] Store in in slot 0x4
20,947,678 UART: [art] Derive Key Pair
20,948,718 UART: [art] Store priv key in slot 0x5
23,411,476 UART: [art] Derive Key Pair - Done
23,424,531 UART: [art] Signing Cert with AUTHO
23,425,847 UART: RITY.KEYID = 7
25,137,396 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,905 UART: [art] PUB.X = 56BAD6740FBA976BF3BC5BE74DDF50BECFAF70977AC0F920CF649BAB0BF838288EE0C27D68FC73B4B2C45A7609E60451
25,146,189 UART: [art] PUB.Y = 9DE9349996D84F954AA284EE3CDDF5ECFEE9E03A9738DEA91E9D8CCDB87805ED8082911E5874DF5EA9CA1E62103DAC0A
25,153,510 UART: [art] SIG.R = 15A5A3D8C2B7C9367CDEA843B7987C4CFBA18FAF5FC8345E262DE9AF8CA68D1222348177A17BFB11DEA33948248801A5
25,160,939 UART: [art] SIG.S = 9C60F1326E4DB7329485FDDA83F5BAA823A4305544BE58320B6B424A5872A86A56868DB7895ADB41A40AA1A35EB46CC5
26,139,264 UART: Caliptra RT
26,139,957 UART: [state] CFI Enabled
26,306,479 UART: [rt] RT listening for mailbox commands...
26,310,469 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,355,579 UART: [rt]cmd =0x4c4d5356, len=1672
26,556,791 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
193,010 UART:
193,375 UART: Running Caliptra ROM ...
194,564 UART:
604,381 UART: [state] CFI Enabled
617,895 UART: [state] LifecycleState = Unprovisioned
620,269 UART: [state] DebugLocked = No
623,063 UART: [state] WD Timer not started. Device not locked for debugging
627,376 UART: [kat] SHA2-256
817,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,028 UART: [kat] ++
828,552 UART: [kat] sha1
840,775 UART: [kat] SHA2-256
843,781 UART: [kat] SHA2-384
850,409 UART: [kat] SHA2-512-ACC
852,987 UART: [kat] ECC-384
3,292,486 UART: [kat] HMAC-384Kdf
3,306,680 UART: [kat] LMS
3,838,564 UART: [kat] --
3,842,154 UART: [cold-reset] ++
3,843,451 UART: [fht] FHT @ 0x50003400
3,853,502 UART: [idev] ++
3,854,136 UART: [idev] CDI.KEYID = 6
3,855,167 UART: [idev] SUBJECT.KEYID = 7
3,856,341 UART: [idev] UDS.KEYID = 0
3,857,268 ready_for_fw is high
3,857,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,847 UART: [idev] Erasing UDS.KEYID = 0
6,336,697 UART: [idev] Sha1 KeyId Algorithm
6,359,737 UART: [idev] --
6,364,273 UART: [ldev] ++
6,364,956 UART: [ldev] CDI.KEYID = 6
6,365,925 UART: [ldev] SUBJECT.KEYID = 5
6,367,103 UART: [ldev] AUTHORITY.KEYID = 7
6,368,285 UART: [ldev] FE.KEYID = 1
6,378,715 UART: [ldev] Erasing FE.KEYID = 1
8,857,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,504 UART: [ldev] --
10,649,412 UART: [fwproc] Wait for Commands...
10,651,455 UART: [fwproc] Recv command 0x46574c44
10,653,710 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,978 >>> mbox cmd response: success
14,845,818 UART: [afmc] ++
14,846,531 UART: [afmc] CDI.KEYID = 6
14,847,777 UART: [afmc] SUBJECT.KEYID = 7
14,849,219 UART: [afmc] AUTHORITY.KEYID = 5
17,357,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,205 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,479 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,153,438 UART: [afmc] --
19,157,795 UART: [cold-reset] --
19,162,469 UART: [state] Locking Datavault
19,168,205 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,342 UART: [state] Locking ICCM
19,172,263 UART: [exit] Launching FMC @ 0x40000130
19,180,950 UART:
19,181,186 UART: Running Caliptra FMC ...
19,182,215 UART:
19,182,361 UART: [state] CFI Enabled
19,190,570 UART: [fht] FMC Alias Private Key: 7
20,947,591 UART: [art] Extend RT PCRs Done
20,948,811 UART: [art] Lock RT PCRs Done
20,950,620 UART: [art] Populate DV Done
20,956,088 UART: [fht] FMC Alias Private Key: 7
20,957,731 UART: [art] Derive CDI
20,958,674 UART: [art] Store in in slot 0x4
21,001,120 UART: [art] Derive Key Pair
21,002,130 UART: [art] Store priv key in slot 0x5
23,428,844 UART: [art] Derive Key Pair - Done
23,441,724 UART: [art] Signing Cert with AUTHO
23,443,048 UART: RITY.KEYID = 7
25,148,704 UART: [art] Erasing AUTHORITY.KEYID = 7
25,150,214 UART: [art] PUB.X = 656D857B3B93C3ADE795EA18D151AE324CE43483802C71E127900A2F276FC19673EE1CB159B6B3D7FC3409368E5B0EA7
25,157,456 UART: [art] PUB.Y = 9B11A296D9CD6CACEE9E9DD831FAD094A8E13928D9708BB92893E130523C2E18B971028004479734151563074B075B7F
25,164,684 UART: [art] SIG.R = 6A317BC61C6CE3B70E0ADDE5D51A8A3A81D9B3515E5644822DA26BE33FC1F15331BCDECB9CF171085B2A7ABD122A8090
25,172,136 UART: [art] SIG.S = BB6E246D6D48EE453D9B17F05E9028B83E75366514FF25581BCD4744182FA7DBD1BA19051869ED8E146C87A22B091B74
26,150,709 UART: Caliptra RT
26,151,400 UART: [state] CFI Enabled
26,268,957 UART: [rt] RT listening for mailbox commands...
26,272,977 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,317,927 UART: [rt]cmd =0x4c4d5356, len=1672
26,519,312 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,612 writing to cptra_bootfsm_go
3,752,685 ready_for_fw is high
3,753,140 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,410 >>> mbox cmd response: success
19,212,565 UART:
19,212,982 UART: Running Caliptra FMC ...
19,214,201 UART:
19,214,371 UART: [state] CFI Enabled
19,222,432 UART: [fht] FMC Alias Private Key: 7
20,979,224 UART: [art] Extend RT PCRs Done
20,980,466 UART: [art] Lock RT PCRs Done
20,982,319 UART: [art] Populate DV Done
20,987,425 UART: [fht] FMC Alias Private Key: 7
20,989,077 UART: [art] Derive CDI
20,989,899 UART: [art] Store in in slot 0x4
21,032,122 UART: [art] Derive Key Pair
21,033,168 UART: [art] Store priv key in slot 0x5
23,460,093 UART: [art] Derive Key Pair - Done
23,473,263 UART: [art] Signing Cert with AUTHO
23,474,585 UART: RITY.KEYID = 7
25,179,709 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,227 UART: [art] PUB.X = EDF1E26A460A41516C0A8C50C57E4D4EFDAD60846FAFA4B3248F3D431BCC7CC8A82369E937951B93044D1C229097413B
25,188,495 UART: [art] PUB.Y = 3A89DF37748FCB102AC844D84F98279636308AE9EFE8A50B2F1D69C7C90C13F76AE653DBD6F449C94E936400C74D9E2B
25,195,707 UART: [art] SIG.R = 9A39D04081DAAA2798758AC895EF1027545B44F90EE942895E4551E6E7E7D60A8F3D925CFB81C3E000CBBED1F62DF19C
25,203,103 UART: [art] SIG.S = 786133036EE81F37D932436176A87578D8D5D1737542FF22CB3DBF7A25171951378F2D0353DCA571FE7E826CAC2D16DB
26,182,203 UART: Caliptra RT
26,182,894 UART: [state] CFI Enabled
26,300,370 UART: [rt] RT listening for mailbox commands...
26,304,433 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,349,293 UART: [rt]cmd =0x4c4d5356, len=1672
26,550,494 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,307 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,017 UART: [kat] SHA2-256
881,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,063 UART: [kat] ++
886,215 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
895,172 UART: [kat] SHA2-512-ACC
897,073 UART: [kat] ECC-384
902,884 UART: [kat] HMAC-384Kdf
907,554 UART: [kat] LMS
1,475,750 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 ready_for_fw is high
1,481,031 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,618 UART: [idev] Erasing UDS.KEYID = 0
1,505,398 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,124 UART: [idev] --
1,515,253 UART: [ldev] ++
1,515,421 UART: [ldev] CDI.KEYID = 6
1,515,784 UART: [ldev] SUBJECT.KEYID = 5
1,516,210 UART: [ldev] AUTHORITY.KEYID = 7
1,516,673 UART: [ldev] FE.KEYID = 1
1,521,633 UART: [ldev] Erasing FE.KEYID = 1
1,546,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,382 UART: [ldev] --
1,585,819 UART: [fwproc] Waiting for Commands...
1,586,518 UART: [fwproc] Received command 0x46574c44
1,587,309 UART: [fwproc] Received Image of size 114168 bytes
2,883,515 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,325 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,334 >>> mbox cmd response: success
3,076,470 UART: [afmc] ++
3,076,638 UART: [afmc] CDI.KEYID = 6
3,077,000 UART: [afmc] SUBJECT.KEYID = 7
3,077,425 UART: [afmc] AUTHORITY.KEYID = 5
3,112,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,216 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,996 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,724 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,609 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,299 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,300 UART: [afmc] --
3,155,370 UART: [cold-reset] --
3,156,088 UART: [state] Locking Datavault
3,157,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,121 UART: [state] Locking ICCM
3,158,701 UART: [exit] Launching FMC @ 0x40000130
3,164,030 UART:
3,164,046 UART: Running Caliptra FMC ...
3,164,454 UART:
3,164,508 UART: [state] CFI Enabled
3,175,085 UART: [fht] FMC Alias Private Key: 7
3,282,262 UART: [art] Extend RT PCRs Done
3,282,690 UART: [art] Lock RT PCRs Done
3,284,274 UART: [art] Populate DV Done
3,292,465 UART: [fht] FMC Alias Private Key: 7
3,293,515 UART: [art] Derive CDI
3,293,795 UART: [art] Store in in slot 0x4
3,379,232 UART: [art] Derive Key Pair
3,379,592 UART: [art] Store priv key in slot 0x5
3,392,668 UART: [art] Derive Key Pair - Done
3,407,380 UART: [art] Signing Cert with AUTHO
3,407,860 UART: RITY.KEYID = 7
3,423,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,169 UART: [art] PUB.X = B840E8F2EBFFAA352AFE6FFE1DC02D30A38972997E0322370ACB00E3F951B2022478B344BA441534B73E6749D20CF3B3
3,430,913 UART: [art] PUB.Y = 8E2CCEB81F9EA121788A0E44AA0CFDCD52099CCA577D4747C08784729D3D7B7B641B78FCF9891DF014ECBC1CBA10600D
3,437,869 UART: [art] SIG.R = 0A5D600A929009EEB6EFFE0CB0BCE219E36DFA5585724E410823CF580DF0DF0D84B71C01F4AB1B274A9B85473AB88E4A
3,444,631 UART: [art] SIG.S = 2403C8B1623EE5EDDA8E84C4717B9ACB171EBDEF08A5F4A603A2528DE380CAD355984C4F4670E5CE926DE4608377B395
3,468,399 UART: Caliptra RT
3,468,652 UART: [state] CFI Enabled
3,577,238 UART: [rt] RT listening for mailbox commands...
3,577,908 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,536 UART: [rt]cmd =0x4c4d5356, len=1672
3,871,073 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,819 ready_for_fw is high
1,362,819 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,188 >>> mbox cmd response: success
2,988,162 UART:
2,988,178 UART: Running Caliptra FMC ...
2,988,586 UART:
2,988,640 UART: [state] CFI Enabled
2,999,143 UART: [fht] FMC Alias Private Key: 7
3,106,046 UART: [art] Extend RT PCRs Done
3,106,474 UART: [art] Lock RT PCRs Done
3,107,994 UART: [art] Populate DV Done
3,116,531 UART: [fht] FMC Alias Private Key: 7
3,117,461 UART: [art] Derive CDI
3,117,741 UART: [art] Store in in slot 0x4
3,203,250 UART: [art] Derive Key Pair
3,203,610 UART: [art] Store priv key in slot 0x5
3,216,384 UART: [art] Derive Key Pair - Done
3,230,919 UART: [art] Signing Cert with AUTHO
3,231,399 UART: RITY.KEYID = 7
3,246,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,476 UART: [art] PUB.X = 966519EC661FB199B241C004496E88631B3E88867B01D0459327AFA193AB846B2D40EFC1879711D83977E5E3D1EE33CA
3,254,236 UART: [art] PUB.Y = A5E182AAC182AB252F5CCDA24687E99E852EA462DE7561038D9F28B854F55FE059EC248A8E6BF44C870CB0EAB8A77DCA
3,261,198 UART: [art] SIG.R = 476DC796FA6E830D08C0B69989858414B8E4B5B284E0ECBA97CDC0A0C9D53944C2C553705F0507C67AE99FE153417C25
3,267,958 UART: [art] SIG.S = BAF1F17D83A6D3C2BB2295B69DBCD3281A84390CF50648EC17A587E2A6AD36E7CE2EBAB8C6ADBE621719FEAD29ADD307
3,291,972 UART: Caliptra RT
3,292,225 UART: [state] CFI Enabled
3,400,420 UART: [rt] RT listening for mailbox commands...
3,401,090 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,430 UART: [rt]cmd =0x4c4d5356, len=1672
3,693,473 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,270 UART: [kat] SHA2-256
882,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,316 UART: [kat] ++
886,468 UART: [kat] sha1
890,790 UART: [kat] SHA2-256
892,728 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,807 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,348 UART: [cold-reset] ++
1,476,840 UART: [fht] Storing FHT @ 0x50003400
1,479,531 UART: [idev] ++
1,479,699 UART: [idev] CDI.KEYID = 6
1,480,059 UART: [idev] SUBJECT.KEYID = 7
1,480,483 UART: [idev] UDS.KEYID = 0
1,480,828 ready_for_fw is high
1,480,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,571 UART: [idev] Erasing UDS.KEYID = 0
1,505,371 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,961 UART: [idev] --
1,515,112 UART: [ldev] ++
1,515,280 UART: [ldev] CDI.KEYID = 6
1,515,643 UART: [ldev] SUBJECT.KEYID = 5
1,516,069 UART: [ldev] AUTHORITY.KEYID = 7
1,516,532 UART: [ldev] FE.KEYID = 1
1,521,406 UART: [ldev] Erasing FE.KEYID = 1
1,547,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,179 UART: [ldev] --
1,586,470 UART: [fwproc] Waiting for Commands...
1,587,329 UART: [fwproc] Received command 0x46574c44
1,588,120 UART: [fwproc] Received Image of size 114168 bytes
2,885,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,741 >>> mbox cmd response: success
3,077,969 UART: [afmc] ++
3,078,137 UART: [afmc] CDI.KEYID = 6
3,078,499 UART: [afmc] SUBJECT.KEYID = 7
3,078,924 UART: [afmc] AUTHORITY.KEYID = 5
3,113,907 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,069 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,797 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,682 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,372 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,233 UART: [afmc] --
3,157,209 UART: [cold-reset] --
3,158,195 UART: [state] Locking Datavault
3,159,346 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,950 UART: [state] Locking ICCM
3,160,592 UART: [exit] Launching FMC @ 0x40000130
3,165,921 UART:
3,165,937 UART: Running Caliptra FMC ...
3,166,345 UART:
3,166,488 UART: [state] CFI Enabled
3,177,027 UART: [fht] FMC Alias Private Key: 7
3,285,882 UART: [art] Extend RT PCRs Done
3,286,310 UART: [art] Lock RT PCRs Done
3,287,640 UART: [art] Populate DV Done
3,295,795 UART: [fht] FMC Alias Private Key: 7
3,296,915 UART: [art] Derive CDI
3,297,195 UART: [art] Store in in slot 0x4
3,382,782 UART: [art] Derive Key Pair
3,383,142 UART: [art] Store priv key in slot 0x5
3,396,434 UART: [art] Derive Key Pair - Done
3,410,988 UART: [art] Signing Cert with AUTHO
3,411,468 UART: RITY.KEYID = 7
3,426,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,149 UART: [art] PUB.X = 5F87191539C4804DA26C67F337435719F477DF37D6E1100B05798C11A723CB642A90491A7B17E843B50796C2156E27B2
3,433,896 UART: [art] PUB.Y = D09699C76817D9D68E5B4CEA185B3B4BB55C3D62D353D3E4B7A4A20EBC2C3E1B166D304C7EBBC6E0630AEF37061F1F85
3,440,853 UART: [art] SIG.R = 36008B5070717E7A53C5EA9BA08B2522021F4CF99B48B032F60A33C6B1036C05F6E0CBEC726F098C0C192F1F6FD190D1
3,447,587 UART: [art] SIG.S = 0BD007F98AE2D2B7D3F721E7A24753551B2BA9C37A2B74F8F5370C99D9094E6F55F144F8FB54644F589BDDFE23151F21
3,471,228 UART: Caliptra RT
3,471,573 UART: [state] CFI Enabled
3,580,619 UART: [rt] RT listening for mailbox commands...
3,581,289 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,705 UART: [rt]cmd =0x4c4d5356, len=1672
3,874,086 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,560 ready_for_fw is high
1,362,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,813 >>> mbox cmd response: success
2,986,881 UART:
2,986,897 UART: Running Caliptra FMC ...
2,987,305 UART:
2,987,448 UART: [state] CFI Enabled
2,997,625 UART: [fht] FMC Alias Private Key: 7
3,105,924 UART: [art] Extend RT PCRs Done
3,106,352 UART: [art] Lock RT PCRs Done
3,107,894 UART: [art] Populate DV Done
3,116,021 UART: [fht] FMC Alias Private Key: 7
3,117,041 UART: [art] Derive CDI
3,117,321 UART: [art] Store in in slot 0x4
3,203,078 UART: [art] Derive Key Pair
3,203,438 UART: [art] Store priv key in slot 0x5
3,216,554 UART: [art] Derive Key Pair - Done
3,231,388 UART: [art] Signing Cert with AUTHO
3,231,868 UART: RITY.KEYID = 7
3,247,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,069 UART: [art] PUB.X = FC071698C5CFEAE2057F7FE18650424AA40A7CE1E9708A806AE823389CBD5FEB4247C996CA417FFD3419E18A35F4C1C3
3,254,842 UART: [art] PUB.Y = 28323C5DB0AB84C721D3F017FDC70495C4A65FB5DFE1ACEEC362DB242E0B3454B27E990303E51D503FE4758E748003D5
3,261,785 UART: [art] SIG.R = 7A02305F3CEBF58C9118A7EC437C13D20A04B0C29A4BFCEB454098955070B0708BC11FAD41957138319E22560F40475C
3,268,541 UART: [art] SIG.S = AE64898D1473295118EB258793B38691F299C3AE258856ECD3726CECBB6CC8C56EBB5BD9D94E32186E12E6E13B9BBBFE
3,292,208 UART: Caliptra RT
3,292,553 UART: [state] CFI Enabled
3,401,416 UART: [rt] RT listening for mailbox commands...
3,402,086 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,684 UART: [rt]cmd =0x4c4d5356, len=1672
3,695,217 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,001 UART: [kat] SHA2-256
903,941 UART: [kat] SHA2-384
906,756 UART: [kat] SHA2-512-ACC
908,657 UART: [kat] ECC-384
917,972 UART: [kat] HMAC-384Kdf
922,336 UART: [kat] LMS
1,170,664 UART: [kat] --
1,171,519 UART: [cold-reset] ++
1,172,075 UART: [fht] FHT @ 0x50003400
1,174,534 UART: [idev] ++
1,174,702 UART: [idev] CDI.KEYID = 6
1,175,062 UART: [idev] SUBJECT.KEYID = 7
1,175,486 UART: [idev] UDS.KEYID = 0
1,175,831 ready_for_fw is high
1,175,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,644 UART: [idev] Erasing UDS.KEYID = 0
1,200,837 UART: [idev] Sha1 KeyId Algorithm
1,209,479 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,017 UART: [ldev] Erasing FE.KEYID = 1
1,243,474 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,413 UART: [ldev] --
1,282,678 UART: [fwproc] Wait for Commands...
1,283,454 UART: [fwproc] Recv command 0x46574c44
1,284,182 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,824 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,779 >>> mbox cmd response: success
2,774,017 UART: [afmc] ++
2,774,185 UART: [afmc] CDI.KEYID = 6
2,774,547 UART: [afmc] SUBJECT.KEYID = 7
2,774,972 UART: [afmc] AUTHORITY.KEYID = 5
2,810,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,661 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,380 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,398 UART: [afmc] --
2,854,388 UART: [cold-reset] --
2,855,378 UART: [state] Locking Datavault
2,856,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,325 UART: [state] Locking ICCM
2,857,765 UART: [exit] Launching FMC @ 0x40000130
2,863,094 UART:
2,863,110 UART: Running Caliptra FMC ...
2,863,518 UART:
2,863,572 UART: [state] CFI Enabled
2,874,463 UART: [fht] FMC Alias Private Key: 7
2,981,936 UART: [art] Extend RT PCRs Done
2,982,364 UART: [art] Lock RT PCRs Done
2,983,990 UART: [art] Populate DV Done
2,992,215 UART: [fht] FMC Alias Private Key: 7
2,993,199 UART: [art] Derive CDI
2,993,479 UART: [art] Store in in slot 0x4
3,078,922 UART: [art] Derive Key Pair
3,079,282 UART: [art] Store priv key in slot 0x5
3,092,204 UART: [art] Derive Key Pair - Done
3,106,816 UART: [art] Signing Cert with AUTHO
3,107,296 UART: RITY.KEYID = 7
3,122,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,789 UART: [art] PUB.X = A12F228EC81EA34269B726282267DFE6DA7CC59ECD945D7D5BCDD9FEF1B1F3B4B1637110EF6FA7BD10A065E9023E7B81
3,129,574 UART: [art] PUB.Y = 788122F0088D016907E8C0AEC271FEA293859AA93C970F6AF31D8BCF81B97F136614B1167DEFC5EB1C00F9E59EBB9EC0
3,136,502 UART: [art] SIG.R = F74E174D313342125D0337FB7B8B4962555C165AB2C532CCF7448D8009D428F1C04864E818E5CA1D521CED98BD49B0AB
3,143,268 UART: [art] SIG.S = DD24DE70E89FF3B0198CC610D93E80B46135F6DFDC9CF4F6DF648085C17BA8034E257711797F0FCC4985AB61EC8F662D
3,166,429 UART: Caliptra RT
3,166,682 UART: [state] CFI Enabled
3,274,952 UART: [rt] RT listening for mailbox commands...
3,275,622 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,426 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,763 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,019 ready_for_fw is high
1,060,019 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,716 >>> mbox cmd response: success
2,686,332 UART:
2,686,348 UART: Running Caliptra FMC ...
2,686,756 UART:
2,686,810 UART: [state] CFI Enabled
2,697,183 UART: [fht] FMC Alias Private Key: 7
2,805,438 UART: [art] Extend RT PCRs Done
2,805,866 UART: [art] Lock RT PCRs Done
2,807,626 UART: [art] Populate DV Done
2,815,871 UART: [fht] FMC Alias Private Key: 7
2,816,973 UART: [art] Derive CDI
2,817,253 UART: [art] Store in in slot 0x4
2,902,848 UART: [art] Derive Key Pair
2,903,208 UART: [art] Store priv key in slot 0x5
2,915,776 UART: [art] Derive Key Pair - Done
2,930,420 UART: [art] Signing Cert with AUTHO
2,930,900 UART: RITY.KEYID = 7
2,945,740 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,505 UART: [art] PUB.X = 98C61697E39660B830F8EB44CB73034AA4080C9F9066EEE73D0F24680CD02C62315814F0720EC3DB39B5CC6E84911A8A
2,953,257 UART: [art] PUB.Y = C9A778D8F17ECAD1D6F795DD5B682D0C995BD92F8E0E3209FBDFA7714857F09B4D60A7DA1178CAE2EEA00026BB2B039B
2,960,193 UART: [art] SIG.R = 97D3601919E9488AD1C3EE542C26475AAC85A8D047D445EFC99FB30AD14B6E9238B76259A3E448ACAFB744FF87A5EF92
2,966,970 UART: [art] SIG.S = F5244C9E84E00AB3920F10C3EF9B686BBC22C1D8AEB27824F8585B0FD7E79C8CCE71DD2DE40A713A5503337CABF59BEB
2,991,004 UART: Caliptra RT
2,991,257 UART: [state] CFI Enabled
3,099,507 UART: [rt] RT listening for mailbox commands...
3,100,177 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,817 UART: [rt]cmd =0x4c4d5356, len=1672
3,393,438 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Unprovisioned
85,814 UART: [state] DebugLocked = No
86,522 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,513 UART: [kat] HMAC-384Kdf
923,049 UART: [kat] LMS
1,171,377 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,622 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 ready_for_fw is high
1,176,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,273 UART: [idev] Erasing UDS.KEYID = 0
1,201,744 UART: [idev] Sha1 KeyId Algorithm
1,210,276 UART: [idev] --
1,211,438 UART: [ldev] ++
1,211,606 UART: [ldev] CDI.KEYID = 6
1,211,969 UART: [ldev] SUBJECT.KEYID = 5
1,212,395 UART: [ldev] AUTHORITY.KEYID = 7
1,212,858 UART: [ldev] FE.KEYID = 1
1,218,136 UART: [ldev] Erasing FE.KEYID = 1
1,245,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,924 UART: [ldev] --
1,284,325 UART: [fwproc] Wait for Commands...
1,284,905 UART: [fwproc] Recv command 0x46574c44
1,285,633 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,382 >>> mbox cmd response: success
2,775,398 UART: [afmc] ++
2,775,566 UART: [afmc] CDI.KEYID = 6
2,775,928 UART: [afmc] SUBJECT.KEYID = 7
2,776,353 UART: [afmc] AUTHORITY.KEYID = 5
2,811,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,451 UART: [afmc] --
2,854,477 UART: [cold-reset] --
2,855,383 UART: [state] Locking Datavault
2,856,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,360 UART: [state] Locking ICCM
2,857,874 UART: [exit] Launching FMC @ 0x40000130
2,863,203 UART:
2,863,219 UART: Running Caliptra FMC ...
2,863,627 UART:
2,863,770 UART: [state] CFI Enabled
2,874,209 UART: [fht] FMC Alias Private Key: 7
2,981,494 UART: [art] Extend RT PCRs Done
2,981,922 UART: [art] Lock RT PCRs Done
2,983,406 UART: [art] Populate DV Done
2,991,503 UART: [fht] FMC Alias Private Key: 7
2,992,633 UART: [art] Derive CDI
2,992,913 UART: [art] Store in in slot 0x4
3,078,812 UART: [art] Derive Key Pair
3,079,172 UART: [art] Store priv key in slot 0x5
3,092,728 UART: [art] Derive Key Pair - Done
3,107,265 UART: [art] Signing Cert with AUTHO
3,107,745 UART: RITY.KEYID = 7
3,123,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,968 UART: [art] PUB.X = DAF536E80AA934CA35551E3FA6EAF7E0013518C2AACF32187C66ADA10EB3D730AB6B3194B149531F099EC7B099D6327E
3,130,738 UART: [art] PUB.Y = 423781709815F3C960084CFEAF364989E1062FC89DC09E5B04FC5733BA7EC414DCDF2E34B2169884CD8654BA27F9C5DD
3,137,685 UART: [art] SIG.R = 890C9B88C74DCCADD24ED38A86A53B227E3FF3B4F757650B79BDE92C5BD4C3102527C346494656ECA65558E9188EEFE3
3,144,459 UART: [art] SIG.S = 6D6105D029D579DA25409D1C0E9EA2DD04BF78B681652F2166678781727B627043FC1F9B5B3E5C99E1267400851A5266
3,167,761 UART: Caliptra RT
3,168,106 UART: [state] CFI Enabled
3,274,353 UART: [rt] RT listening for mailbox commands...
3,275,023 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,593 UART: [rt]cmd =0x4c4d5356, len=1672
3,568,154 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,434 ready_for_fw is high
1,060,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,445 >>> mbox cmd response: success
2,688,917 UART:
2,688,933 UART: Running Caliptra FMC ...
2,689,341 UART:
2,689,484 UART: [state] CFI Enabled
2,700,315 UART: [fht] FMC Alias Private Key: 7
2,808,708 UART: [art] Extend RT PCRs Done
2,809,136 UART: [art] Lock RT PCRs Done
2,810,702 UART: [art] Populate DV Done
2,818,913 UART: [fht] FMC Alias Private Key: 7
2,819,889 UART: [art] Derive CDI
2,820,169 UART: [art] Store in in slot 0x4
2,906,238 UART: [art] Derive Key Pair
2,906,598 UART: [art] Store priv key in slot 0x5
2,920,200 UART: [art] Derive Key Pair - Done
2,934,740 UART: [art] Signing Cert with AUTHO
2,935,220 UART: RITY.KEYID = 7
2,950,194 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,959 UART: [art] PUB.X = 588B34B6460BA3D54ED2B7A5B70A2A75301276716FE6070B67CE5B29AC2ADBEB4270A80351829CD0352A8BAD29388D46
2,957,718 UART: [art] PUB.Y = D9DB53BFBA0B896A8813D73499C55F3BE093F9B262C04E15B5FC6FE95037C62C33B6FD6B150271440CC585997989C7B7
2,964,663 UART: [art] SIG.R = 9400449D1A524033FD0700774D88DD360212A16700425F9AA690F6D4644DB570C93438610920EE338851DBAE1D569B64
2,971,344 UART: [art] SIG.S = 2F19809B605B8B710EA49382ECD2A5E8E30E5EA9BC7A4DC709305DE88CAA0FF72A4F381DF74D3CFA0D9CFF6C26ED4D4B
2,995,264 UART: Caliptra RT
2,995,609 UART: [state] CFI Enabled
3,102,230 UART: [rt] RT listening for mailbox commands...
3,102,900 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,602 UART: [rt]cmd =0x4c4d5356, len=1672
3,395,943 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,497 UART: [kat] ++
895,649 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,218 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,133 UART: [cold-reset] ++
1,170,467 UART: [fht] FHT @ 0x50003400
1,173,101 UART: [idev] ++
1,173,269 UART: [idev] CDI.KEYID = 6
1,173,630 UART: [idev] SUBJECT.KEYID = 7
1,174,055 UART: [idev] UDS.KEYID = 0
1,174,401 ready_for_fw is high
1,174,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,653 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,130 UART: [ldev] Erasing FE.KEYID = 1
1,241,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,134 UART: [ldev] --
1,280,480 UART: [fwproc] Wait for Commands...
1,281,103 UART: [fwproc] Recv command 0x46574c44
1,281,836 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,290 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,205 >>> mbox cmd response: success
2,770,418 UART: [afmc] ++
2,770,586 UART: [afmc] CDI.KEYID = 6
2,770,949 UART: [afmc] SUBJECT.KEYID = 7
2,771,375 UART: [afmc] AUTHORITY.KEYID = 5
2,807,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,297 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,016 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,665 UART: [afmc] --
2,850,605 UART: [cold-reset] --
2,851,583 UART: [state] Locking Datavault
2,852,964 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,568 UART: [state] Locking ICCM
2,854,172 UART: [exit] Launching FMC @ 0x40000130
2,859,501 UART:
2,859,517 UART: Running Caliptra FMC ...
2,859,925 UART:
2,859,979 UART: [state] CFI Enabled
2,870,754 UART: [fht] FMC Alias Private Key: 7
2,978,339 UART: [art] Extend RT PCRs Done
2,978,767 UART: [art] Lock RT PCRs Done
2,980,523 UART: [art] Populate DV Done
2,988,704 UART: [fht] FMC Alias Private Key: 7
2,989,832 UART: [art] Derive CDI
2,990,112 UART: [art] Store in in slot 0x4
3,075,847 UART: [art] Derive Key Pair
3,076,207 UART: [art] Store priv key in slot 0x5
3,089,093 UART: [art] Derive Key Pair - Done
3,103,683 UART: [art] Signing Cert with AUTHO
3,104,163 UART: RITY.KEYID = 7
3,119,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,988 UART: [art] PUB.X = 87B95636052685C64402B5FC30E4EFACCF09EF3BE345454999F5D7F429CBD37F6464F920D6F9C124EE28A4E6890D2DF6
3,126,752 UART: [art] PUB.Y = 69A031E86DAF808074877CFB973C977779805DA09A72F88276E72944F3B18C56A39951FC1335D35D15ED1907DD2B3CF1
3,133,695 UART: [art] SIG.R = 3EE6184F2A22589196FE55FA7C8CFF86F3211BF9991E38436E818956131B181E4191C8B17D66C570EA12C0DD6C660DE9
3,140,462 UART: [art] SIG.S = EDD2EC5ED57D8245FC8A6B1891F11EA92F4A6B3C3AF4DA3975826A02AB6E2B83FD691A6948AEFE8A4E1F96A36CB9B57C
3,164,096 UART: Caliptra RT
3,164,349 UART: [state] CFI Enabled
3,272,448 UART: [rt] RT listening for mailbox commands...
3,273,118 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,744 UART: [rt]cmd =0x4c4d5356, len=1672
3,566,305 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,162 ready_for_fw is high
1,055,162 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,925 >>> mbox cmd response: success
2,683,643 UART:
2,683,659 UART: Running Caliptra FMC ...
2,684,067 UART:
2,684,121 UART: [state] CFI Enabled
2,694,632 UART: [fht] FMC Alias Private Key: 7
2,802,677 UART: [art] Extend RT PCRs Done
2,803,105 UART: [art] Lock RT PCRs Done
2,804,585 UART: [art] Populate DV Done
2,812,652 UART: [fht] FMC Alias Private Key: 7
2,813,630 UART: [art] Derive CDI
2,813,910 UART: [art] Store in in slot 0x4
2,899,711 UART: [art] Derive Key Pair
2,900,071 UART: [art] Store priv key in slot 0x5
2,913,413 UART: [art] Derive Key Pair - Done
2,928,382 UART: [art] Signing Cert with AUTHO
2,928,862 UART: RITY.KEYID = 7
2,943,882 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,647 UART: [art] PUB.X = F087A56F0F3E75752C926AF3C80006C3307B989D02AF5D6432C618F81D0701B447E7644952C6001165201B4E69ECAA17
2,951,350 UART: [art] PUB.Y = 75F0520B5285EEE807FA5D43828FB63FEE5BEDABB92D9D9B835360A06D8B502C8E26F2EB0FE782E3CF1E9405A0761865
2,958,300 UART: [art] SIG.R = C2ECE3A058CFFB7F449C6F733CC085963F89162551D28538F982AB8DB582A7132166CCD2DEEBAB5EBF7EE2205741FAE4
2,965,086 UART: [art] SIG.S = CF7ECA48648BC00EC67304D2F3E2D14EAF59203177A572B5A017C24246F0A341EEDC8154276E498D78AA8EDDA35D8C64
2,989,281 UART: Caliptra RT
2,989,534 UART: [state] CFI Enabled
3,097,976 UART: [rt] RT listening for mailbox commands...
3,098,646 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,406 UART: [rt]cmd =0x4c4d5356, len=1672
3,391,935 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,630 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,930 UART: [idev] ++
1,173,098 UART: [idev] CDI.KEYID = 6
1,173,459 UART: [idev] SUBJECT.KEYID = 7
1,173,884 UART: [idev] UDS.KEYID = 0
1,174,230 ready_for_fw is high
1,174,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,548 UART: [idev] Erasing UDS.KEYID = 0
1,198,696 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,889 UART: [ldev] ++
1,209,057 UART: [ldev] CDI.KEYID = 6
1,209,421 UART: [ldev] SUBJECT.KEYID = 5
1,209,848 UART: [ldev] AUTHORITY.KEYID = 7
1,210,311 UART: [ldev] FE.KEYID = 1
1,215,425 UART: [ldev] Erasing FE.KEYID = 1
1,241,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,059 UART: [ldev] --
1,280,409 UART: [fwproc] Wait for Commands...
1,281,008 UART: [fwproc] Recv command 0x46574c44
1,281,741 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,162 >>> mbox cmd response: success
2,771,219 UART: [afmc] ++
2,771,387 UART: [afmc] CDI.KEYID = 6
2,771,750 UART: [afmc] SUBJECT.KEYID = 7
2,772,176 UART: [afmc] AUTHORITY.KEYID = 5
2,808,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,065 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,726 UART: [afmc] --
2,851,728 UART: [cold-reset] --
2,852,602 UART: [state] Locking Datavault
2,853,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,115 UART: [state] Locking ICCM
2,854,771 UART: [exit] Launching FMC @ 0x40000130
2,860,100 UART:
2,860,116 UART: Running Caliptra FMC ...
2,860,524 UART:
2,860,667 UART: [state] CFI Enabled
2,871,130 UART: [fht] FMC Alias Private Key: 7
2,979,337 UART: [art] Extend RT PCRs Done
2,979,765 UART: [art] Lock RT PCRs Done
2,981,005 UART: [art] Populate DV Done
2,989,216 UART: [fht] FMC Alias Private Key: 7
2,990,366 UART: [art] Derive CDI
2,990,646 UART: [art] Store in in slot 0x4
3,076,019 UART: [art] Derive Key Pair
3,076,379 UART: [art] Store priv key in slot 0x5
3,089,459 UART: [art] Derive Key Pair - Done
3,104,263 UART: [art] Signing Cert with AUTHO
3,104,743 UART: RITY.KEYID = 7
3,119,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,542 UART: [art] PUB.X = F85CA0195B987F73FC2A66B392C86254497A9F004CCF5580B4025738246F92C885A72CE4FE21E7C8FA44A58352B3A656
3,127,285 UART: [art] PUB.Y = 815EE802173622488E7E0589BA242BE968042DD65D7B395ABF3A4B934A8FC55AC32121614829BF06F3749506ED8BD5EB
3,134,220 UART: [art] SIG.R = 250BE060C1336354D11F10533A9C93246EA3333EBE1E434AEF7530327282BD3FA81D34104D5F918AA2652E0FCF4A7F38
3,140,984 UART: [art] SIG.S = 70F0C5AF98320BC824FC8F174FA4BBF94667254BB3B97069ADF76E1B6D1F43D854E675078B4AA4251D9FC97168A2B800
3,164,439 UART: Caliptra RT
3,164,784 UART: [state] CFI Enabled
3,272,669 UART: [rt] RT listening for mailbox commands...
3,273,339 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,323 UART: [rt]cmd =0x4c4d5356, len=1672
3,566,702 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,081 ready_for_fw is high
1,057,081 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,283 >>> mbox cmd response: success
2,682,441 UART:
2,682,457 UART: Running Caliptra FMC ...
2,682,865 UART:
2,683,008 UART: [state] CFI Enabled
2,693,593 UART: [fht] FMC Alias Private Key: 7
2,802,292 UART: [art] Extend RT PCRs Done
2,802,720 UART: [art] Lock RT PCRs Done
2,804,630 UART: [art] Populate DV Done
2,813,199 UART: [fht] FMC Alias Private Key: 7
2,814,177 UART: [art] Derive CDI
2,814,457 UART: [art] Store in in slot 0x4
2,900,384 UART: [art] Derive Key Pair
2,900,744 UART: [art] Store priv key in slot 0x5
2,913,816 UART: [art] Derive Key Pair - Done
2,928,650 UART: [art] Signing Cert with AUTHO
2,929,130 UART: RITY.KEYID = 7
2,944,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,311 UART: [art] PUB.X = 8A88F8D8FCCA42721DAD7A25F7DB4CD38CE19B902C2AC0D8FF91DB33A01A80E3A6198BDE322B70C1A6DDB19585F22ADD
2,952,107 UART: [art] PUB.Y = BAF0C0FBC610E98A4AA1A06724AC67923419C4CD43D05DA398064924DD1F331A3D1FAA426F7F34E9A0EF34331BCB3332
2,959,066 UART: [art] SIG.R = 4C16F8DE92A5D63F4BD4B91442C897536D1FCDCCD8120F5349CAFD94374ACAF76FF9DE8AF2D644D9F6F32FDD432B5F17
2,965,855 UART: [art] SIG.S = 316C41CEAC5BBF3C8A2413C95A794E085A47D1B0F9A41114FDD3383B1E2796164C1136BE711782DACC36F2FE32B28C0F
2,990,010 UART: Caliptra RT
2,990,355 UART: [state] CFI Enabled
3,098,518 UART: [rt] RT listening for mailbox commands...
3,099,188 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,854 UART: [rt]cmd =0x4c4d5356, len=1672
3,392,373 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
191,971 UART:
192,356 UART: Running Caliptra ROM ...
193,545 UART:
193,697 UART: [state] CFI Enabled
266,160 UART: [state] LifecycleState = Unprovisioned
268,122 UART: [state] DebugLocked = No
270,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,715 UART: [kat] SHA2-256
444,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,919 UART: [kat] ++
455,436 UART: [kat] sha1
468,005 UART: [kat] SHA2-256
470,682 UART: [kat] SHA2-384
476,311 UART: [kat] SHA2-512-ACC
478,669 UART: [kat] ECC-384
2,766,965 UART: [kat] HMAC-384Kdf
2,778,767 UART: [kat] LMS
3,969,106 UART: [kat] --
3,975,086 UART: [cold-reset] ++
3,976,302 UART: [fht] Storing FHT @ 0x50003400
3,987,414 UART: [idev] ++
3,988,044 UART: [idev] CDI.KEYID = 6
3,988,951 UART: [idev] SUBJECT.KEYID = 7
3,990,187 UART: [idev] UDS.KEYID = 0
3,991,172 ready_for_fw is high
3,991,362 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,546 UART: [idev] Erasing UDS.KEYID = 0
7,324,666 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,803 UART: [idev] --
7,349,473 UART: [ldev] ++
7,350,089 UART: [ldev] CDI.KEYID = 6
7,351,048 UART: [ldev] SUBJECT.KEYID = 5
7,352,252 UART: [ldev] AUTHORITY.KEYID = 7
7,353,470 UART: [ldev] FE.KEYID = 1
7,400,624 UART: [ldev] Erasing FE.KEYID = 1
10,731,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,283 UART: [ldev] --
13,093,111 UART: [fwproc] Waiting for Commands...
13,094,769 UART: [fwproc] Received command 0x46574c44
13,096,945 UART: [fwproc] Received Image of size 113844 bytes
17,148,215 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,224,420 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,293,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,609,626 >>> mbox cmd response: success
17,610,181 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,614,044 UART: [afmc] ++
17,614,629 UART: [afmc] CDI.KEYID = 6
17,615,701 UART: [afmc] SUBJECT.KEYID = 7
17,616,801 UART: [afmc] AUTHORITY.KEYID = 5
20,981,940 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,976 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,226 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,690 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,490 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,901 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,013 UART: [afmc] --
23,353,484 UART: [cold-reset] --
23,358,479 UART: [state] Locking Datavault
23,364,527 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,383 UART: [state] Locking ICCM
23,368,388 UART: [exit] Launching FMC @ 0x40000130
23,376,778 UART:
23,377,001 UART: Running Caliptra FMC ...
23,378,099 UART:
23,378,258 UART: [state] CFI Enabled
23,444,466 UART: [fht] FMC Alias Private Key: 7
25,782,408 UART: [art] Extend RT PCRs Done
25,783,631 UART: [art] Lock RT PCRs Done
25,785,390 UART: [art] Populate DV Done
25,790,633 UART: [fht] FMC Alias Private Key: 7
25,792,271 UART: [art] Derive CDI
25,793,000 UART: [art] Store in in slot 0x4
25,851,978 UART: [art] Derive Key Pair
25,853,014 UART: [art] Store priv key in slot 0x5
29,146,488 UART: [art] Derive Key Pair - Done
29,159,322 UART: [art] Signing Cert with AUTHO
29,160,622 UART: RITY.KEYID = 7
31,448,070 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,581 UART: [art] PUB.X = D8E9FC1193088DE93B601C9746157E03F874FB0B08286A78DFBA8C2BA74BA9D38A369797013B2C731A831CF8B958475D
31,456,774 UART: [art] PUB.Y = 6F2E770189571A21FDE8765DF636857DF450B7D7D08EDF3AF6DBB6BAAF5DF2079C424BEB426C5565842B5AF18CD1E3A6
31,464,065 UART: [art] SIG.R = D18BA6A4AEA16785EF7AF300805264F9083BDF489A9E783CE46BD2E2F5F6104FE98733922B07DDC288AE0F03D10025D0
31,471,390 UART: [art] SIG.S = B00626BC16F02F751BAED0D97D1913B95AC0B8E6B19228B9B800AFF5705664EF2A6021F7B1B2844321589C5ACEEC7AA7
32,776,496 UART: Caliptra RT
32,777,196 UART: [state] CFI Enabled
32,939,851 UART: [rt] RT listening for mailbox commands...
32,953,482 >>> mbox cmd response: failed
32,953,871 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,983,579 UART: [rt]cmd =0x46505652, len=4
32,984,926 UART: [rt] FIPS Version
32,986,034 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,800,080 ready_for_fw is high
3,800,465 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,863,049 >>> mbox cmd response: success
17,863,876 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,568,416 UART:
23,568,794 UART: Running Caliptra FMC ...
23,569,938 UART:
23,570,090 UART: [state] CFI Enabled
23,635,989 UART: [fht] FMC Alias Private Key: 7
25,974,240 UART: [art] Extend RT PCRs Done
25,975,467 UART: [art] Lock RT PCRs Done
25,977,254 UART: [art] Populate DV Done
25,982,610 UART: [fht] FMC Alias Private Key: 7
25,984,360 UART: [art] Derive CDI
25,985,178 UART: [art] Store in in slot 0x4
26,044,659 UART: [art] Derive Key Pair
26,045,706 UART: [art] Store priv key in slot 0x5
29,338,946 UART: [art] Derive Key Pair - Done
29,352,055 UART: [art] Signing Cert with AUTHO
29,353,361 UART: RITY.KEYID = 7
31,641,091 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,599 UART: [art] PUB.X = BAF0D24395264E351D5BBF67E3C3E57DBB308850C522C8F83311CADD7C781256F4D20AF5F3E18FC203CB5557E482ED98
31,649,886 UART: [art] PUB.Y = 9679044E6DBC742E3C02FA6A381327E5B3F79C60BBF6276FF3D421D330D4F3F1FD10C0E372C03D7F8614AC15BDE63F5F
31,657,157 UART: [art] SIG.R = 079B2E40E3829B27B98CFCD794DC34673CA07448FE3C823893668A8EF917734295B05C00D81F34806572A26A04B20815
31,664,471 UART: [art] SIG.S = 81804BD3201C192B5F32A8345D4FD240042504D7BC9AB71A7E3647D59D2B8533C875C96C13553FAB98B58F689BE78A38
32,969,016 UART: Caliptra RT
32,969,722 UART: [state] CFI Enabled
33,132,217 UART: [rt] RT listening for mailbox commands...
33,145,756 >>> mbox cmd response: failed
33,146,162 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,175,868 UART: [rt]cmd =0x46505652, len=4
33,177,111 UART: [rt] FIPS Version
33,178,279 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,481 UART:
192,840 UART: Running Caliptra ROM ...
193,981 UART:
603,711 UART: [state] CFI Enabled
616,336 UART: [state] LifecycleState = Unprovisioned
618,239 UART: [state] DebugLocked = No
619,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,993 UART: [kat] SHA2-256
794,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,310 UART: [kat] ++
805,755 UART: [kat] sha1
817,555 UART: [kat] SHA2-256
820,202 UART: [kat] SHA2-384
826,117 UART: [kat] SHA2-512-ACC
828,490 UART: [kat] ECC-384
3,111,971 UART: [kat] HMAC-384Kdf
3,124,862 UART: [kat] LMS
4,314,978 UART: [kat] --
4,320,257 UART: [cold-reset] ++
4,322,683 UART: [fht] Storing FHT @ 0x50003400
4,334,939 UART: [idev] ++
4,335,502 UART: [idev] CDI.KEYID = 6
4,336,386 UART: [idev] SUBJECT.KEYID = 7
4,337,699 UART: [idev] UDS.KEYID = 0
4,338,692 ready_for_fw is high
4,338,895 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,906 UART: [idev] Erasing UDS.KEYID = 0
7,625,693 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,492 UART: [idev] --
7,651,673 UART: [ldev] ++
7,652,278 UART: [ldev] CDI.KEYID = 6
7,653,223 UART: [ldev] SUBJECT.KEYID = 5
7,654,401 UART: [ldev] AUTHORITY.KEYID = 7
7,655,687 UART: [ldev] FE.KEYID = 1
7,665,716 UART: [ldev] Erasing FE.KEYID = 1
10,954,520 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,179 UART: [ldev] --
13,315,141 UART: [fwproc] Waiting for Commands...
13,318,256 UART: [fwproc] Received command 0x46574c44
13,320,437 UART: [fwproc] Received Image of size 113844 bytes
17,373,457 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,972 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,831,341 >>> mbox cmd response: success
17,831,877 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,835,210 UART: [afmc] ++
17,835,793 UART: [afmc] CDI.KEYID = 6
17,836,680 UART: [afmc] SUBJECT.KEYID = 7
17,837,951 UART: [afmc] AUTHORITY.KEYID = 5
21,151,743 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,550 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,926 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,790 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,201 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,057 UART: [afmc] --
23,515,339 UART: [cold-reset] --
23,520,721 UART: [state] Locking Datavault
23,525,857 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,613 UART: [state] Locking ICCM
23,528,917 UART: [exit] Launching FMC @ 0x40000130
23,537,315 UART:
23,537,554 UART: Running Caliptra FMC ...
23,538,655 UART:
23,538,817 UART: [state] CFI Enabled
23,547,241 UART: [fht] FMC Alias Private Key: 7
25,878,476 UART: [art] Extend RT PCRs Done
25,879,695 UART: [art] Lock RT PCRs Done
25,881,271 UART: [art] Populate DV Done
25,886,518 UART: [fht] FMC Alias Private Key: 7
25,888,012 UART: [art] Derive CDI
25,888,780 UART: [art] Store in in slot 0x4
25,931,425 UART: [art] Derive Key Pair
25,932,459 UART: [art] Store priv key in slot 0x5
29,174,602 UART: [art] Derive Key Pair - Done
29,187,741 UART: [art] Signing Cert with AUTHO
29,189,074 UART: RITY.KEYID = 7
31,468,580 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,083 UART: [art] PUB.X = DCCB859EFAAAF13F720DA185FD12C45DB43B03E43D42196A2B002B67A521F04D838ED075F6293F6C8279EC7BEF9F4D86
31,477,291 UART: [art] PUB.Y = A2799498ECC4DA3FCC97D56C6513320D2825841B4202B368A6300A881A3A1042D905917F809A0097A0DCD81B1273EFFA
31,484,539 UART: [art] SIG.R = 6C82E995CEC5BDD26C0596C5110BBE97B85EA25D0B6973482AFA4CD4EB2B4696F4BEF5FB95BACFFD53F8108384C77C65
31,491,957 UART: [art] SIG.S = DEC3AD72C2B194978E00DA8FFA7659B5103400B817EFC304EE66D12E2A4DD64018B148567472A05499F6819C37EAE393
32,797,331 UART: Caliptra RT
32,798,046 UART: [state] CFI Enabled
32,916,471 UART: [rt] RT listening for mailbox commands...
32,929,653 >>> mbox cmd response: failed
32,930,054 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
32,959,615 UART: [rt]cmd =0x46505652, len=4
32,960,895 UART: [rt] FIPS Version
32,961,895 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
4,127,101 ready_for_fw is high
4,127,468 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,832 >>> mbox cmd response: success
18,062,660 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,704,407 UART:
23,704,799 UART: Running Caliptra FMC ...
23,705,911 UART:
23,706,090 UART: [state] CFI Enabled
23,714,109 UART: [fht] FMC Alias Private Key: 7
26,045,099 UART: [art] Extend RT PCRs Done
26,046,338 UART: [art] Lock RT PCRs Done
26,047,784 UART: [art] Populate DV Done
26,053,259 UART: [fht] FMC Alias Private Key: 7
26,054,862 UART: [art] Derive CDI
26,055,683 UART: [art] Store in in slot 0x4
26,098,451 UART: [art] Derive Key Pair
26,099,495 UART: [art] Store priv key in slot 0x5
29,341,025 UART: [art] Derive Key Pair - Done
29,353,860 UART: [art] Signing Cert with AUTHO
29,355,200 UART: RITY.KEYID = 7
31,634,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,978 UART: [art] PUB.X = A21C911F3D7E60DDE02A7A6B50270791FC1F6D15C3FE2568B5E87264EA10B19FBAEED4D8FCA0E9A6B7C6C837BDA2420C
31,643,232 UART: [art] PUB.Y = D86E28CD86C50B81CA3AB22946544526D2F6D4AC261D80D0AA61B48543D9C78AE98A530657997CD742298F8C116E8A07
31,650,450 UART: [art] SIG.R = ADF64E212E0C04DBA9E48D2DE49EA9A8D426D24A35708527614611DA099111ECD4B998F7F635A5E2225CFC8C1E1DD782
31,657,862 UART: [art] SIG.S = 5360DCA9DE65C9EEAC9D7F450C72BBBCEA85E0947C044ABD60E03F982A7C26FF94999361B302BCCF4BF17E14E8D15891
32,963,275 UART: Caliptra RT
32,963,980 UART: [state] CFI Enabled
33,081,252 UART: [rt] RT listening for mailbox commands...
33,094,568 >>> mbox cmd response: failed
33,094,963 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,124,906 UART: [rt]cmd =0x46505652, len=4
33,126,184 UART: [rt] FIPS Version
33,127,243 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,034 UART:
192,409 UART: Running Caliptra ROM ...
193,582 UART:
193,730 UART: [state] CFI Enabled
267,843 UART: [state] LifecycleState = Unprovisioned
269,879 UART: [state] DebugLocked = No
271,019 UART: [state] WD Timer not started. Device not locked for debugging
275,431 UART: [kat] SHA2-256
454,551 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,074 UART: [kat] ++
466,611 UART: [kat] sha1
477,139 UART: [kat] SHA2-256
480,140 UART: [kat] SHA2-384
486,346 UART: [kat] SHA2-512-ACC
489,357 UART: [kat] ECC-384
2,949,144 UART: [kat] HMAC-384Kdf
2,973,052 UART: [kat] LMS
3,502,528 UART: [kat] --
3,506,598 UART: [cold-reset] ++
3,508,957 UART: [fht] FHT @ 0x50003400
3,519,371 UART: [idev] ++
3,519,939 UART: [idev] CDI.KEYID = 6
3,520,867 UART: [idev] SUBJECT.KEYID = 7
3,522,044 UART: [idev] UDS.KEYID = 0
3,522,970 ready_for_fw is high
3,523,154 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,705 UART: [idev] Erasing UDS.KEYID = 0
6,027,040 UART: [idev] Sha1 KeyId Algorithm
6,050,639 UART: [idev] --
6,054,708 UART: [ldev] ++
6,055,288 UART: [ldev] CDI.KEYID = 6
6,056,205 UART: [ldev] SUBJECT.KEYID = 5
6,057,368 UART: [ldev] AUTHORITY.KEYID = 7
6,058,604 UART: [ldev] FE.KEYID = 1
6,100,313 UART: [ldev] Erasing FE.KEYID = 1
8,603,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,689 UART: [ldev] --
10,414,170 UART: [fwproc] Wait for Commands...
10,416,804 UART: [fwproc] Recv command 0x46574c44
10,418,841 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,011 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,276,073 >>> mbox cmd response: success
14,276,641 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,279,945 UART: [afmc] ++
14,280,542 UART: [afmc] CDI.KEYID = 6
14,281,458 UART: [afmc] SUBJECT.KEYID = 7
14,282,621 UART: [afmc] AUTHORITY.KEYID = 5
16,806,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,183 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,982 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,302 UART: [afmc] --
18,608,668 UART: [cold-reset] --
18,612,745 UART: [state] Locking Datavault
18,618,695 UART: [state] Locking PCR0, PCR1 and PCR31
18,620,392 UART: [state] Locking ICCM
18,622,304 UART: [exit] Launching FMC @ 0x40000130
18,630,705 UART:
18,630,943 UART: Running Caliptra FMC ...
18,632,044 UART:
18,632,209 UART: [state] CFI Enabled
18,691,705 UART: [fht] FMC Alias Private Key: 7
20,455,896 UART: [art] Extend RT PCRs Done
20,457,113 UART: [art] Lock RT PCRs Done
20,458,848 UART: [art] Populate DV Done
20,464,375 UART: [fht] FMC Alias Private Key: 7
20,466,021 UART: [art] Derive CDI
20,466,855 UART: [art] Store in in slot 0x4
20,524,986 UART: [art] Derive Key Pair
20,526,020 UART: [art] Store priv key in slot 0x5
22,989,614 UART: [art] Derive Key Pair - Done
23,002,717 UART: [art] Signing Cert with AUTHO
23,004,024 UART: RITY.KEYID = 7
24,714,972 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,482 UART: [art] PUB.X = F54B32C50DA3DBD34FB836C281C23266F987DD24A6EACB48C4F4A8C4676F8632D8098B876E91AFEDF12142E3F235EC73
24,723,743 UART: [art] PUB.Y = 24AF04E890151A3F33960613E40FF6339F750F6C717EFE9055F3D2639FDE2029DE718924F5F28A3E502621F671693A96
24,730,994 UART: [art] SIG.R = 0035ED740102936F863D80166D918BC3756F2FBFCD432FE23826DEF9DDCE895C6BEE1028A49FB6EB72E2A5B7D239F7E1
24,738,349 UART: [art] SIG.S = 06DF0B100C69D4F8C34C910490B5616BCD7B16D706783CC95DACB0149B8C2F00B655ADF98FB08F2FF7591CFE04790D3A
25,717,833 UART: Caliptra RT
25,718,538 UART: [state] CFI Enabled
25,883,017 UART: [rt] RT listening for mailbox commands...
25,896,438 >>> mbox cmd response: failed
25,896,833 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,926,597 UART: [rt]cmd =0x46505652, len=4
25,927,846 UART: [rt] FIPS Version
25,929,121 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
3,360,839 ready_for_fw is high
3,361,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,064,587 >>> mbox cmd response: success
14,065,435 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,365,170 UART:
18,365,585 UART: Running Caliptra FMC ...
18,366,691 UART:
18,366,847 UART: [state] CFI Enabled
18,432,476 UART: [fht] FMC Alias Private Key: 7
20,196,307 UART: [art] Extend RT PCRs Done
20,197,532 UART: [art] Lock RT PCRs Done
20,199,245 UART: [art] Populate DV Done
20,204,603 UART: [fht] FMC Alias Private Key: 7
20,206,143 UART: [art] Derive CDI
20,206,880 UART: [art] Store in in slot 0x4
20,265,356 UART: [art] Derive Key Pair
20,266,397 UART: [art] Store priv key in slot 0x5
22,729,680 UART: [art] Derive Key Pair - Done
22,742,961 UART: [art] Signing Cert with AUTHO
22,744,290 UART: RITY.KEYID = 7
24,455,888 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,397 UART: [art] PUB.X = FE2678D9149472FF355F92E544A3BDF7F645463065BE43FA11E886CC1D4E16746DBFC8B3C9A20A56C41DAF1D851F8240
24,464,645 UART: [art] PUB.Y = E161FFF9B84F405150B141175664FA46EC66AF124C37D0D19E38336062695AF2BF6BADFB69222219060FB86FA248A929
24,471,904 UART: [art] SIG.R = F8B32F52820A567855567FDAF1395536DBCCEA6AAF0F00372972FFBB0CDC61DCF2582965761DFCC245F8049766E28D34
24,479,294 UART: [art] SIG.S = DAC78DFF284927FED7E1211C9083289A0267D84519DC6390A20279FFC60EA8A664367378857C9F12EFCEB4122AA8F85A
25,458,574 UART: Caliptra RT
25,459,286 UART: [state] CFI Enabled
25,624,173 UART: [rt] RT listening for mailbox commands...
25,637,866 >>> mbox cmd response: failed
25,638,265 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,667,971 UART: [rt]cmd =0x46505652, len=4
25,669,216 UART: [rt] FIPS Version
25,670,386 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
193,153 UART:
193,526 UART: Running Caliptra ROM ...
194,707 UART:
604,207 UART: [state] CFI Enabled
616,445 UART: [state] LifecycleState = Unprovisioned
618,306 UART: [state] DebugLocked = No
619,896 UART: [state] WD Timer not started. Device not locked for debugging
624,136 UART: [kat] SHA2-256
803,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,860 UART: [kat] ++
815,305 UART: [kat] sha1
826,957 UART: [kat] SHA2-256
830,028 UART: [kat] SHA2-384
836,253 UART: [kat] SHA2-512-ACC
839,259 UART: [kat] ECC-384
3,282,257 UART: [kat] HMAC-384Kdf
3,294,767 UART: [kat] LMS
3,824,219 UART: [kat] --
3,826,246 UART: [cold-reset] ++
3,827,835 UART: [fht] FHT @ 0x50003400
3,839,178 UART: [idev] ++
3,839,780 UART: [idev] CDI.KEYID = 6
3,840,666 UART: [idev] SUBJECT.KEYID = 7
3,841,913 UART: [idev] UDS.KEYID = 0
3,842,819 ready_for_fw is high
3,843,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,313 UART: [idev] Erasing UDS.KEYID = 0
6,309,759 UART: [idev] Sha1 KeyId Algorithm
6,332,925 UART: [idev] --
6,338,048 UART: [ldev] ++
6,338,634 UART: [ldev] CDI.KEYID = 6
6,339,550 UART: [ldev] SUBJECT.KEYID = 5
6,340,765 UART: [ldev] AUTHORITY.KEYID = 7
6,341,996 UART: [ldev] FE.KEYID = 1
6,351,726 UART: [ldev] Erasing FE.KEYID = 1
8,824,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,004 UART: [ldev] --
10,614,055 UART: [fwproc] Wait for Commands...
10,615,556 UART: [fwproc] Recv command 0x46574c44
10,617,643 UART: [fwproc] Recv'd Img size: 114168 bytes
14,012,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,474,613 >>> mbox cmd response: success
14,475,117 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,479,247 UART: [afmc] ++
14,479,833 UART: [afmc] CDI.KEYID = 6
14,480,742 UART: [afmc] SUBJECT.KEYID = 7
14,481,906 UART: [afmc] AUTHORITY.KEYID = 5
16,979,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,700,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,672 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,718,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,734,469 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,750,341 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,772,720 UART: [afmc] --
18,777,010 UART: [cold-reset] --
18,779,215 UART: [state] Locking Datavault
18,784,899 UART: [state] Locking PCR0, PCR1 and PCR31
18,786,546 UART: [state] Locking ICCM
18,787,827 UART: [exit] Launching FMC @ 0x40000130
18,796,221 UART:
18,796,495 UART: Running Caliptra FMC ...
18,797,607 UART:
18,797,766 UART: [state] CFI Enabled
18,805,812 UART: [fht] FMC Alias Private Key: 7
20,562,911 UART: [art] Extend RT PCRs Done
20,564,127 UART: [art] Lock RT PCRs Done
20,566,291 UART: [art] Populate DV Done
20,571,647 UART: [fht] FMC Alias Private Key: 7
20,573,286 UART: [art] Derive CDI
20,574,100 UART: [art] Store in in slot 0x4
20,616,752 UART: [art] Derive Key Pair
20,617,770 UART: [art] Store priv key in slot 0x5
23,044,848 UART: [art] Derive Key Pair - Done
23,058,186 UART: [art] Signing Cert with AUTHO
23,059,496 UART: RITY.KEYID = 7
24,765,219 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,730 UART: [art] PUB.X = 0D13B6E5E5FAB5C4A4D07B12AAAB02AC9A08DFD11BFA433DD8CF9FEEAE6740BD08A69E67B751958D50A6C1DB5E420FEB
24,774,033 UART: [art] PUB.Y = 828B805BA3637B3D0166AB3866ECC6D77B3A542932EA7A95DACC916A31FEC967B4B063F26FD1B131E2D091D9345B0A2D
24,781,337 UART: [art] SIG.R = A97B792F3E3D2918EF780400CC19E473936A0DC69105335906959B40C3878530F875B210DF88E9FD5357E1C2C5CA5C76
24,788,679 UART: [art] SIG.S = 1B979A9CC659D8051FA081137CD1E0F60A6D72821A22C934935367100527DB7DD4BC71289D6D4133C8A0CCA65E5A315C
25,767,255 UART: Caliptra RT
25,767,957 UART: [state] CFI Enabled
25,885,284 UART: [rt] RT listening for mailbox commands...
25,898,864 >>> mbox cmd response: failed
25,899,246 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,929,121 UART: [rt]cmd =0x46505652, len=4
25,930,400 UART: [rt] FIPS Version
25,931,743 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,751 writing to cptra_bootfsm_go
3,696,255 ready_for_fw is high
3,696,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,893 >>> mbox cmd response: success
14,270,571 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,521,928 UART:
18,522,321 UART: Running Caliptra FMC ...
18,523,510 UART:
18,523,675 UART: [state] CFI Enabled
18,531,622 UART: [fht] FMC Alias Private Key: 7
20,288,492 UART: [art] Extend RT PCRs Done
20,289,697 UART: [art] Lock RT PCRs Done
20,291,184 UART: [art] Populate DV Done
20,296,608 UART: [fht] FMC Alias Private Key: 7
20,298,212 UART: [art] Derive CDI
20,299,032 UART: [art] Store in in slot 0x4
20,341,784 UART: [art] Derive Key Pair
20,342,790 UART: [art] Store priv key in slot 0x5
22,769,255 UART: [art] Derive Key Pair - Done
22,782,143 UART: [art] Signing Cert with AUTHO
22,783,444 UART: RITY.KEYID = 7
24,488,749 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,226 UART: [art] PUB.X = 809A3DA68783ED34629F4C76BB558410ED81BED1DA828D6ED3F8BE5F007FDEEE9F5B874F6A5C373A7A30348080E66B52
24,497,462 UART: [art] PUB.Y = FDBEA20A8E8B5D16E67F8A65680AABAC093B8CF6FAD075FE7B18697E7377EF06DD5AAA8D2A6BB3E0A77B7A0B753C4732
24,504,768 UART: [art] SIG.R = 73DE9358CEF91965DC7F02A71855EAEC2DD53E7F2FB786067B70CEB3C83BB912DBCA6755736145C4C83F3F66EB1C88CE
24,512,205 UART: [art] SIG.S = 7BA86A62EA1B4AB7A5D97AD7F999655C4C55324C6A8AB9A7D8FD4BE40246ECD72559D0E510F58042D419F9242F1C0E4C
25,491,030 UART: Caliptra RT
25,491,745 UART: [state] CFI Enabled
25,609,023 UART: [rt] RT listening for mailbox commands...
25,622,382 >>> mbox cmd response: failed
25,622,766 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,652,420 UART: [rt]cmd =0x46505652, len=4
25,653,697 UART: [rt] FIPS Version
25,654,968 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
192,126 UART:
192,503 UART: Running Caliptra ROM ...
193,608 UART:
193,751 UART: [state] CFI Enabled
264,097 UART: [state] LifecycleState = Unprovisioned
266,518 UART: [state] DebugLocked = No
267,757 UART: [state] WD Timer not started. Device not locked for debugging
272,247 UART: [kat] SHA2-256
462,187 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,923 UART: [kat] ++
473,458 UART: [kat] sha1
484,981 UART: [kat] SHA2-256
487,992 UART: [kat] SHA2-384
493,080 UART: [kat] SHA2-512-ACC
495,637 UART: [kat] ECC-384
2,952,513 UART: [kat] HMAC-384Kdf
2,972,647 UART: [kat] LMS
3,504,226 UART: [kat] --
3,508,288 UART: [cold-reset] ++
3,510,790 UART: [fht] FHT @ 0x50003400
3,521,636 UART: [idev] ++
3,522,285 UART: [idev] CDI.KEYID = 6
3,523,321 UART: [idev] SUBJECT.KEYID = 7
3,524,430 UART: [idev] UDS.KEYID = 0
3,525,383 ready_for_fw is high
3,525,604 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,266 UART: [idev] Erasing UDS.KEYID = 0
6,032,163 UART: [idev] Sha1 KeyId Algorithm
6,054,364 UART: [idev] --
6,058,901 UART: [ldev] ++
6,059,591 UART: [ldev] CDI.KEYID = 6
6,060,481 UART: [ldev] SUBJECT.KEYID = 5
6,061,583 UART: [ldev] AUTHORITY.KEYID = 7
6,062,879 UART: [ldev] FE.KEYID = 1
6,101,128 UART: [ldev] Erasing FE.KEYID = 1
8,606,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,651 UART: [ldev] --
10,416,259 UART: [fwproc] Wait for Commands...
10,418,718 UART: [fwproc] Recv command 0x46574c44
10,421,038 UART: [fwproc] Recv'd Img size: 114168 bytes
13,862,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,162 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,865 >>> mbox cmd response: success
14,602,412 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,605,199 UART: [afmc] ++
14,605,893 UART: [afmc] CDI.KEYID = 6
14,607,057 UART: [afmc] SUBJECT.KEYID = 7
14,608,606 UART: [afmc] AUTHORITY.KEYID = 5
17,149,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,084 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,263 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,642 UART: [afmc] --
18,947,941 UART: [cold-reset] --
18,951,861 UART: [state] Locking Datavault
18,957,548 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,755 UART: [state] Locking ICCM
18,962,614 UART: [exit] Launching FMC @ 0x40000130
18,971,293 UART:
18,971,528 UART: Running Caliptra FMC ...
18,972,627 UART:
18,972,784 UART: [state] CFI Enabled
19,030,856 UART: [fht] FMC Alias Private Key: 7
20,794,719 UART: [art] Extend RT PCRs Done
20,795,953 UART: [art] Lock RT PCRs Done
20,797,684 UART: [art] Populate DV Done
20,803,214 UART: [fht] FMC Alias Private Key: 7
20,804,914 UART: [art] Derive CDI
20,805,651 UART: [art] Store in in slot 0x4
20,863,153 UART: [art] Derive Key Pair
20,864,194 UART: [art] Store priv key in slot 0x5
23,326,835 UART: [art] Derive Key Pair - Done
23,339,987 UART: [art] Signing Cert with AUTHO
23,341,298 UART: RITY.KEYID = 7
25,052,847 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,506 UART: [art] PUB.X = C72DA0743AB6A3102C1F66333E8BD8209DC111EE73D2F464E840A3D96FDC5E7B21FF785530031DBD420F78F1DA39CBCA
25,061,617 UART: [art] PUB.Y = 55720BB4285043DF810AD1945B5EB718A8FC648CBFED864DBDF434F6987F139629681FEFB5F2EF6850B26AFD1DA11725
25,068,868 UART: [art] SIG.R = 167BE92000DFB247FBFAF9C9764756E415EFD1ED3FEDCC58D11E8A8CE2E16A6379C34CD3DB2F11C32854BC7D51C3BF94
25,076,276 UART: [art] SIG.S = CBA252F838DEED5CC31C53B9D0ECC6EC96E2459E155C390655250DB378035C61755EB7BE825A24189BFAFDA1EAF657B6
26,054,478 UART: Caliptra RT
26,055,195 UART: [state] CFI Enabled
26,220,256 UART: [rt] RT listening for mailbox commands...
26,234,048 >>> mbox cmd response: failed
26,234,466 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,264,069 UART: [rt]cmd =0x46505652, len=4
26,265,349 UART: [rt] FIPS Version
26,266,673 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,440,901 ready_for_fw is high
3,441,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,717,610 >>> mbox cmd response: success
14,718,281 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,006,198 UART:
19,006,589 UART: Running Caliptra FMC ...
19,007,697 UART:
19,007,858 UART: [state] CFI Enabled
19,073,131 UART: [fht] FMC Alias Private Key: 7
20,837,151 UART: [art] Extend RT PCRs Done
20,838,355 UART: [art] Lock RT PCRs Done
20,840,360 UART: [art] Populate DV Done
20,845,939 UART: [fht] FMC Alias Private Key: 7
20,847,474 UART: [art] Derive CDI
20,848,241 UART: [art] Store in in slot 0x4
20,905,586 UART: [art] Derive Key Pair
20,906,585 UART: [art] Store priv key in slot 0x5
23,369,334 UART: [art] Derive Key Pair - Done
23,382,552 UART: [art] Signing Cert with AUTHO
23,383,860 UART: RITY.KEYID = 7
25,095,591 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,096 UART: [art] PUB.X = 444AA57171CCBE184A4AC35AECC1E44B8B3C84C45E3BA4112E4F951DC85F159058BEDC48638F34DE03E769344075EB8C
25,104,340 UART: [art] PUB.Y = 73ACBE6D6E04AF6FA2BCBB4D7AC73859C3EB2F512C8B74B41291893D39AB48724F2A24666E11F040BD96A7A64006F748
25,111,625 UART: [art] SIG.R = 905C174A7738DF315EA3C540237875FFFD8E8BF5AAC88EEE1CF97344DDB224D601C1692B803E23D39805C2393FB4B0B2
25,119,008 UART: [art] SIG.S = 2E968E7E9889D2C95FFD16A847A6FE2D9E78F65D311ABFDD07B6C4069E7A6C7DC6FFC9A526FCE696F48B4B387684C9FF
26,098,657 UART: Caliptra RT
26,099,350 UART: [state] CFI Enabled
26,263,727 UART: [rt] RT listening for mailbox commands...
26,277,470 >>> mbox cmd response: failed
26,277,870 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,307,546 UART: [rt]cmd =0x46505652, len=4
26,308,833 UART: [rt] FIPS Version
26,310,223 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,819 writing to cptra_bootfsm_go
192,932 UART:
193,316 UART: Running Caliptra ROM ...
194,515 UART:
603,925 UART: [state] CFI Enabled
616,801 UART: [state] LifecycleState = Unprovisioned
619,159 UART: [state] DebugLocked = No
620,751 UART: [state] WD Timer not started. Device not locked for debugging
625,843 UART: [kat] SHA2-256
815,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,541 UART: [kat] ++
827,087 UART: [kat] sha1
839,325 UART: [kat] SHA2-256
842,338 UART: [kat] SHA2-384
848,972 UART: [kat] SHA2-512-ACC
851,551 UART: [kat] ECC-384
3,293,726 UART: [kat] HMAC-384Kdf
3,307,872 UART: [kat] LMS
3,839,728 UART: [kat] --
3,843,574 UART: [cold-reset] ++
3,844,717 UART: [fht] FHT @ 0x50003400
3,856,114 UART: [idev] ++
3,856,759 UART: [idev] CDI.KEYID = 6
3,857,790 UART: [idev] SUBJECT.KEYID = 7
3,858,899 UART: [idev] UDS.KEYID = 0
3,859,831 ready_for_fw is high
3,860,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,422 UART: [idev] Erasing UDS.KEYID = 0
6,336,939 UART: [idev] Sha1 KeyId Algorithm
6,358,398 UART: [idev] --
6,362,230 UART: [ldev] ++
6,362,902 UART: [ldev] CDI.KEYID = 6
6,363,917 UART: [ldev] SUBJECT.KEYID = 5
6,365,017 UART: [ldev] AUTHORITY.KEYID = 7
6,366,254 UART: [ldev] FE.KEYID = 1
6,377,279 UART: [ldev] Erasing FE.KEYID = 1
8,851,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,737 UART: [ldev] --
10,643,307 UART: [fwproc] Wait for Commands...
10,645,686 UART: [fwproc] Recv command 0x46574c44
10,647,945 UART: [fwproc] Recv'd Img size: 114168 bytes
14,086,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,282,216 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,824,560 >>> mbox cmd response: success
14,825,109 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,827,902 UART: [afmc] ++
14,828,600 UART: [afmc] CDI.KEYID = 6
14,829,766 UART: [afmc] SUBJECT.KEYID = 7
14,831,308 UART: [afmc] AUTHORITY.KEYID = 5
17,331,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,052,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,054,359 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,069,530 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,084,643 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,099,662 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,122,087 UART: [afmc] --
19,125,813 UART: [cold-reset] --
19,130,329 UART: [state] Locking Datavault
19,136,120 UART: [state] Locking PCR0, PCR1 and PCR31
19,138,309 UART: [state] Locking ICCM
19,140,458 UART: [exit] Launching FMC @ 0x40000130
19,149,129 UART:
19,149,362 UART: Running Caliptra FMC ...
19,150,460 UART:
19,150,622 UART: [state] CFI Enabled
19,158,625 UART: [fht] FMC Alias Private Key: 7
20,915,272 UART: [art] Extend RT PCRs Done
20,916,483 UART: [art] Lock RT PCRs Done
20,918,130 UART: [art] Populate DV Done
20,923,548 UART: [fht] FMC Alias Private Key: 7
20,925,102 UART: [art] Derive CDI
20,925,839 UART: [art] Store in in slot 0x4
20,968,164 UART: [art] Derive Key Pair
20,969,229 UART: [art] Store priv key in slot 0x5
23,395,633 UART: [art] Derive Key Pair - Done
23,408,735 UART: [art] Signing Cert with AUTHO
23,410,041 UART: RITY.KEYID = 7
25,116,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,719 UART: [art] PUB.X = 6E461ACED22D638E8E803A882CECE93BE43C138C5938A54550ACCDD5555660442803F8327B3A5397D92FC3D919E9D29A
25,124,974 UART: [art] PUB.Y = EF6EF9E3F9F76A587444420CD7DA3201A13FFA9E4D4C438D1F4FFFBD8358172FCBBA5DEFA17F7325E9104B36046511FC
25,132,209 UART: [art] SIG.R = 04B1E7F5B189ACF8E2158124EF88044D9AFE5E215FCDEE4DFAC1AF3693767C1C5F661AE0B023EF0666B1906B856CD184
25,139,602 UART: [art] SIG.S = 15FFA081F61B8E06D2DF4F09EED49ACA3DCCE0C4F28ED29F46B8D2B3D2E8DC2221153B7CDE57E958917D44DAF899BF33
26,118,874 UART: Caliptra RT
26,119,566 UART: [state] CFI Enabled
26,236,257 UART: [rt] RT listening for mailbox commands...
26,249,996 >>> mbox cmd response: failed
26,250,431 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,280,208 UART: [rt]cmd =0x46505652, len=4
26,281,451 UART: [rt] FIPS Version
26,282,805 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,720 writing to cptra_bootfsm_go
3,763,135 ready_for_fw is high
3,763,540 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,961,005 >>> mbox cmd response: success
14,961,782 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,216,538 UART:
19,216,931 UART: Running Caliptra FMC ...
19,218,069 UART:
19,218,232 UART: [state] CFI Enabled
19,226,515 UART: [fht] FMC Alias Private Key: 7
20,984,475 UART: [art] Extend RT PCRs Done
20,985,704 UART: [art] Lock RT PCRs Done
20,987,462 UART: [art] Populate DV Done
20,992,886 UART: [fht] FMC Alias Private Key: 7
20,994,596 UART: [art] Derive CDI
20,995,414 UART: [art] Store in in slot 0x4
21,038,010 UART: [art] Derive Key Pair
21,039,020 UART: [art] Store priv key in slot 0x5
23,466,139 UART: [art] Derive Key Pair - Done
23,479,091 UART: [art] Signing Cert with AUTHO
23,480,404 UART: RITY.KEYID = 7
25,185,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,187,212 UART: [art] PUB.X = 9A510E4FBC4A6ADB13A1B0049B7D5844DD5191698FB014EDAD88F66EE87D532465743A7B311C73CA5FFA233C4DCC0A86
25,194,513 UART: [art] PUB.Y = BC702D62B637C3447B1436270361021DF8BEF671E0814A32453D9EF08A9D79EC512A66C9B9215CF64BA468873F96B679
25,201,749 UART: [art] SIG.R = 588D1241ED8ED4F8EF7B31A727AA1AB73003EEFF95D30E0F6FAF801600A2B7D86C572C93BB323D3B786F737795E66C0D
25,209,158 UART: [art] SIG.S = 49222579B6AA1522D4B0F08215E22D730729B73D96891D660555393986F1574DE40068193357B960FC43E638C2141669
26,187,796 UART: Caliptra RT
26,188,508 UART: [state] CFI Enabled
26,306,639 UART: [rt] RT listening for mailbox commands...
26,320,215 >>> mbox cmd response: failed
26,320,615 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,350,277 UART: [rt]cmd =0x46505652, len=4
26,351,551 UART: [rt] FIPS Version
26,352,765 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,060 UART: [kat] SHA2-512-ACC
896,961 UART: [kat] ECC-384
902,520 UART: [kat] HMAC-384Kdf
906,994 UART: [kat] LMS
1,475,190 UART: [kat] --
1,475,637 UART: [cold-reset] ++
1,476,035 UART: [fht] Storing FHT @ 0x50003400
1,478,894 UART: [idev] ++
1,479,062 UART: [idev] CDI.KEYID = 6
1,479,422 UART: [idev] SUBJECT.KEYID = 7
1,479,846 UART: [idev] UDS.KEYID = 0
1,480,191 ready_for_fw is high
1,480,191 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,694 UART: [idev] Erasing UDS.KEYID = 0
1,504,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,092 UART: [idev] --
1,514,173 UART: [ldev] ++
1,514,341 UART: [ldev] CDI.KEYID = 6
1,514,704 UART: [ldev] SUBJECT.KEYID = 5
1,515,130 UART: [ldev] AUTHORITY.KEYID = 7
1,515,593 UART: [ldev] FE.KEYID = 1
1,520,607 UART: [ldev] Erasing FE.KEYID = 1
1,546,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,950 UART: [ldev] --
1,585,249 UART: [fwproc] Waiting for Commands...
1,585,890 UART: [fwproc] Received command 0x46574c44
1,586,681 UART: [fwproc] Received Image of size 114168 bytes
2,883,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,996 >>> mbox cmd response: success
3,075,996 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,077,046 UART: [afmc] ++
3,077,214 UART: [afmc] CDI.KEYID = 6
3,077,576 UART: [afmc] SUBJECT.KEYID = 7
3,078,001 UART: [afmc] AUTHORITY.KEYID = 5
3,113,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,080 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,860 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,588 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,473 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,163 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,072 UART: [afmc] --
3,157,024 UART: [cold-reset] --
3,157,994 UART: [state] Locking Datavault
3,159,083 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,687 UART: [state] Locking ICCM
3,160,193 UART: [exit] Launching FMC @ 0x40000130
3,165,522 UART:
3,165,538 UART: Running Caliptra FMC ...
3,165,946 UART:
3,166,000 UART: [state] CFI Enabled
3,176,641 UART: [fht] FMC Alias Private Key: 7
3,284,980 UART: [art] Extend RT PCRs Done
3,285,408 UART: [art] Lock RT PCRs Done
3,287,046 UART: [art] Populate DV Done
3,295,269 UART: [fht] FMC Alias Private Key: 7
3,296,441 UART: [art] Derive CDI
3,296,721 UART: [art] Store in in slot 0x4
3,381,952 UART: [art] Derive Key Pair
3,382,312 UART: [art] Store priv key in slot 0x5
3,395,554 UART: [art] Derive Key Pair - Done
3,410,613 UART: [art] Signing Cert with AUTHO
3,411,093 UART: RITY.KEYID = 7
3,426,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,414 UART: [art] PUB.X = 0F4D0640343C6C55AC6A39BDD040670EFF11AD54AB8466D2330182D866EFBCB11E4A31F4A79A18A5616A733E5E20830C
3,434,175 UART: [art] PUB.Y = 92C18E7DE681B7DE6953B8C5F424ED52378EC5965BE39AA74C53E735138971E7F14B1B3A47E54103D4B47497E33191AC
3,441,122 UART: [art] SIG.R = FDF5567290EE40AA34F763443DEE36E00C11AC28AAC8BF9E0C64C03154D73D17C4FA22F64128BAE1F0FFCE4E04ECEACA
3,447,909 UART: [art] SIG.S = F4DE3FD0B332893C657DAB488E8D246AF215D3BD0961D29843D8031BB80A12A18E42E86BAB25C68694E6AE3CFC79D84E
3,471,399 UART: Caliptra RT
3,471,652 UART: [state] CFI Enabled
3,579,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,069 >>> mbox cmd response: failed
3,593,069 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,581 UART: [rt]cmd =0x46505652, len=4
3,623,241 UART: [rt] FIPS Version
3,624,278 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,317 ready_for_fw is high
1,362,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,708 >>> mbox cmd response: success
2,925,708 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,987,136 UART:
2,987,152 UART: Running Caliptra FMC ...
2,987,560 UART:
2,987,614 UART: [state] CFI Enabled
2,997,815 UART: [fht] FMC Alias Private Key: 7
3,105,256 UART: [art] Extend RT PCRs Done
3,105,684 UART: [art] Lock RT PCRs Done
3,107,028 UART: [art] Populate DV Done
3,115,235 UART: [fht] FMC Alias Private Key: 7
3,116,197 UART: [art] Derive CDI
3,116,477 UART: [art] Store in in slot 0x4
3,201,922 UART: [art] Derive Key Pair
3,202,282 UART: [art] Store priv key in slot 0x5
3,215,160 UART: [art] Derive Key Pair - Done
3,230,345 UART: [art] Signing Cert with AUTHO
3,230,825 UART: RITY.KEYID = 7
3,246,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,986 UART: [art] PUB.X = ADAB7CAAA3C9C12305CF8F0C941A8BAE112F34275299046DEF439DDCFDF21B93199D3D8133B194A1842360105FD24D19
3,253,757 UART: [art] PUB.Y = 5E00B7A06E84B888AB5B6B1A3E1097769BFAC4E804C36C0CD433D693BA15958624623E38E444E83BF48219E43BCDC3DC
3,260,687 UART: [art] SIG.R = 3B525D805180BF76028006B0A88ED4632DC0B03DDAB5D8E2546579C14557F1D36FB40D34816090B559B8CF0794D8BDC5
3,267,445 UART: [art] SIG.S = 549D58F79673BA3C2B183DB26E7F3803FAA2C0FD001DE6DEA9D5F22772BD8EA2D24763F654F34AC13C43292271CCE086
3,290,987 UART: Caliptra RT
3,291,240 UART: [state] CFI Enabled
3,398,884 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,411,545 >>> mbox cmd response: failed
3,411,545 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,841 UART: [rt]cmd =0x46505652, len=4
3,441,501 UART: [rt] FIPS Version
3,442,444 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
890,810 UART: [kat] SHA2-256
892,748 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
903,141 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,477,102 UART: [cold-reset] ++
1,477,628 UART: [fht] Storing FHT @ 0x50003400
1,480,393 UART: [idev] ++
1,480,561 UART: [idev] CDI.KEYID = 6
1,480,921 UART: [idev] SUBJECT.KEYID = 7
1,481,345 UART: [idev] UDS.KEYID = 0
1,481,690 ready_for_fw is high
1,481,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,399 UART: [idev] Erasing UDS.KEYID = 0
1,505,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,089 UART: [idev] --
1,515,212 UART: [ldev] ++
1,515,380 UART: [ldev] CDI.KEYID = 6
1,515,743 UART: [ldev] SUBJECT.KEYID = 5
1,516,169 UART: [ldev] AUTHORITY.KEYID = 7
1,516,632 UART: [ldev] FE.KEYID = 1
1,522,142 UART: [ldev] Erasing FE.KEYID = 1
1,547,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,511 UART: [ldev] --
1,586,884 UART: [fwproc] Waiting for Commands...
1,587,583 UART: [fwproc] Received command 0x46574c44
1,588,374 UART: [fwproc] Received Image of size 114168 bytes
2,884,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,593 >>> mbox cmd response: success
3,076,593 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,077,765 UART: [afmc] ++
3,077,933 UART: [afmc] CDI.KEYID = 6
3,078,295 UART: [afmc] SUBJECT.KEYID = 7
3,078,720 UART: [afmc] AUTHORITY.KEYID = 5
3,114,055 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,938 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,628 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,613 UART: [afmc] --
3,157,721 UART: [cold-reset] --
3,158,493 UART: [state] Locking Datavault
3,159,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,382 UART: [state] Locking ICCM
3,160,802 UART: [exit] Launching FMC @ 0x40000130
3,166,131 UART:
3,166,147 UART: Running Caliptra FMC ...
3,166,555 UART:
3,166,698 UART: [state] CFI Enabled
3,177,805 UART: [fht] FMC Alias Private Key: 7
3,285,648 UART: [art] Extend RT PCRs Done
3,286,076 UART: [art] Lock RT PCRs Done
3,287,734 UART: [art] Populate DV Done
3,296,079 UART: [fht] FMC Alias Private Key: 7
3,297,167 UART: [art] Derive CDI
3,297,447 UART: [art] Store in in slot 0x4
3,383,042 UART: [art] Derive Key Pair
3,383,402 UART: [art] Store priv key in slot 0x5
3,396,788 UART: [art] Derive Key Pair - Done
3,411,643 UART: [art] Signing Cert with AUTHO
3,412,123 UART: RITY.KEYID = 7
3,427,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,952 UART: [art] PUB.X = 920425A9A32B7714108B9E94985E6B7FCFC37FCB6528111E4FE26061FCE586B4A811148EB175969542AC63B7C4DFA4B3
3,434,721 UART: [art] PUB.Y = F74868FF37980801E8424BE8801CF6717C43722A7CE3D50B3C3511B3628782CD63B1F3B8D8FA759B03F6F00B98602BCC
3,441,656 UART: [art] SIG.R = 60186426C02BCD0B8063E362F83D7AC8B7FE3C694A2E40678F950B2119C683A4157A34C19EBB5CCECAD2513FA0D8A7CE
3,448,432 UART: [art] SIG.S = 51439C1B9C01714756D8824A2F42FE1DABCD5F0DC05ADD12378A4428F5BFBF7D01155CDF67A7F05D6BE5718B3B9ECDA2
3,472,786 UART: Caliptra RT
3,473,131 UART: [state] CFI Enabled
3,581,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,594,008 >>> mbox cmd response: failed
3,594,008 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,400 UART: [rt]cmd =0x46505652, len=4
3,624,060 UART: [rt] FIPS Version
3,625,169 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,848 ready_for_fw is high
1,362,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,499 >>> mbox cmd response: success
2,925,499 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,987,007 UART:
2,987,023 UART: Running Caliptra FMC ...
2,987,431 UART:
2,987,574 UART: [state] CFI Enabled
2,998,419 UART: [fht] FMC Alias Private Key: 7
3,106,272 UART: [art] Extend RT PCRs Done
3,106,700 UART: [art] Lock RT PCRs Done
3,108,186 UART: [art] Populate DV Done
3,116,247 UART: [fht] FMC Alias Private Key: 7
3,117,389 UART: [art] Derive CDI
3,117,669 UART: [art] Store in in slot 0x4
3,203,414 UART: [art] Derive Key Pair
3,203,774 UART: [art] Store priv key in slot 0x5
3,217,230 UART: [art] Derive Key Pair - Done
3,232,399 UART: [art] Signing Cert with AUTHO
3,232,879 UART: RITY.KEYID = 7
3,247,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,730 UART: [art] PUB.X = 18F6CFCE1D5FCEF32965D920E1D17D902E8007C2BE72CB4B88CED381A686A17D9D79C0ABC617ACCD2435C81605BE2843
3,255,510 UART: [art] PUB.Y = 33E129DD3531B33675DFE483CDAE6443A664A457B390BAC4D72BF1AA7BBB1928F5C5C45D671D45A9A4BD339C500E36BD
3,262,471 UART: [art] SIG.R = E573C69DA1B43E5E8B9114C3C3615EAD308AD5AB569DE424049121A8BAEA3D7EB0A414689C13B0A66AF2843A765983E1
3,269,246 UART: [art] SIG.S = D035027684EA38D463209370B881D5789CD00335CFAF410651A2792AAD0C1CC48570404BE6B3649CCE59C1498E51BC68
3,292,919 UART: Caliptra RT
3,293,264 UART: [state] CFI Enabled
3,402,016 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,415,097 >>> mbox cmd response: failed
3,415,097 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,123 UART: [rt]cmd =0x46505652, len=4
3,444,783 UART: [rt] FIPS Version
3,445,950 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
893,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,247 UART: [kat] ++
897,399 UART: [kat] sha1
901,451 UART: [kat] SHA2-256
903,391 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
917,752 UART: [kat] HMAC-384Kdf
922,310 UART: [kat] LMS
1,170,638 UART: [kat] --
1,171,639 UART: [cold-reset] ++
1,171,979 UART: [fht] FHT @ 0x50003400
1,174,804 UART: [idev] ++
1,174,972 UART: [idev] CDI.KEYID = 6
1,175,332 UART: [idev] SUBJECT.KEYID = 7
1,175,756 UART: [idev] UDS.KEYID = 0
1,176,101 ready_for_fw is high
1,176,101 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,696 UART: [idev] Erasing UDS.KEYID = 0
1,200,813 UART: [idev] Sha1 KeyId Algorithm
1,209,091 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,669 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,558 UART: [fwproc] Recv command 0x46574c44
1,283,286 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,560 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,864 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,493 >>> mbox cmd response: success
2,770,493 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,771,749 UART: [afmc] ++
2,771,917 UART: [afmc] CDI.KEYID = 6
2,772,279 UART: [afmc] SUBJECT.KEYID = 7
2,772,704 UART: [afmc] AUTHORITY.KEYID = 5
2,807,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,828 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,556 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,160 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,126 UART: [afmc] --
2,851,240 UART: [cold-reset] --
2,852,072 UART: [state] Locking Datavault
2,853,281 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,885 UART: [state] Locking ICCM
2,854,435 UART: [exit] Launching FMC @ 0x40000130
2,859,764 UART:
2,859,780 UART: Running Caliptra FMC ...
2,860,188 UART:
2,860,242 UART: [state] CFI Enabled
2,870,691 UART: [fht] FMC Alias Private Key: 7
2,979,012 UART: [art] Extend RT PCRs Done
2,979,440 UART: [art] Lock RT PCRs Done
2,981,242 UART: [art] Populate DV Done
2,989,549 UART: [fht] FMC Alias Private Key: 7
2,990,483 UART: [art] Derive CDI
2,990,763 UART: [art] Store in in slot 0x4
3,076,704 UART: [art] Derive Key Pair
3,077,064 UART: [art] Store priv key in slot 0x5
3,089,878 UART: [art] Derive Key Pair - Done
3,104,823 UART: [art] Signing Cert with AUTHO
3,105,303 UART: RITY.KEYID = 7
3,120,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,434 UART: [art] PUB.X = 0341088E75BE4C2C4032EAD7E6C186E33004F2E43CE80647733F8AE6C5273E9095E041989770F3C202B635829F5591DF
3,128,181 UART: [art] PUB.Y = 1B5EE323376D1944DC81E53386D23ED46AC96A91794D2FF18669DD3458FB2001455A356B2C4A2FD6B26E8D80787F136A
3,135,128 UART: [art] SIG.R = 73077C1E9A6556500AA2EBA9F4625E6CC17A524281B5B0B1FBD69B2F862E0DFFA1E0EE7F549D5313C66F3CACC502149A
3,141,900 UART: [art] SIG.S = 294FEEBD5828A69C773033B1D0170FE730EBF3A97988BE93A6125003A91C9BD64D07520B52A8E24B2327A35C1B2506C6
3,165,782 UART: Caliptra RT
3,166,035 UART: [state] CFI Enabled
3,274,258 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,286,829 >>> mbox cmd response: failed
3,286,829 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,289 UART: [rt]cmd =0x46505652, len=4
3,316,949 UART: [rt] FIPS Version
3,317,850 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,491 ready_for_fw is high
1,060,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,760 >>> mbox cmd response: success
2,623,760 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,685,848 UART:
2,685,864 UART: Running Caliptra FMC ...
2,686,272 UART:
2,686,326 UART: [state] CFI Enabled
2,696,875 UART: [fht] FMC Alias Private Key: 7
2,804,942 UART: [art] Extend RT PCRs Done
2,805,370 UART: [art] Lock RT PCRs Done
2,806,918 UART: [art] Populate DV Done
2,815,343 UART: [fht] FMC Alias Private Key: 7
2,816,283 UART: [art] Derive CDI
2,816,563 UART: [art] Store in in slot 0x4
2,902,166 UART: [art] Derive Key Pair
2,902,526 UART: [art] Store priv key in slot 0x5
2,916,278 UART: [art] Derive Key Pair - Done
2,930,975 UART: [art] Signing Cert with AUTHO
2,931,455 UART: RITY.KEYID = 7
2,946,697 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,462 UART: [art] PUB.X = 8FA14487843325417DBC1D99EAD982950B0EF874633A395535765D62E2B21FD65706747DA5B54F56A8CA5655E1DF3D3C
2,954,221 UART: [art] PUB.Y = DBE3A5637907D75515C97AFFFA7EAE010B4EBD4B1F103A0B38C2DD4AFD19AC986645414A264D3BE418D4FD8C2C537B17
2,961,177 UART: [art] SIG.R = B403962CE486EC38765F46BD4F2A00A1FED4015D679A73B006D51C9AF3AC816A8AFF56A859D18FE5897FA20A1651F042
2,967,921 UART: [art] SIG.S = A950D006CA37004B06E4F01419A18E558F631B16AE6EC692F2BEDB78B90F3B49C527D947B4399E3393899EB31BF6516A
2,991,993 UART: Caliptra RT
2,992,246 UART: [state] CFI Enabled
3,100,410 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,113,261 >>> mbox cmd response: failed
3,113,261 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,551 UART: [rt]cmd =0x46505652, len=4
3,143,211 UART: [rt] FIPS Version
3,144,256 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,366 UART: [state] WD Timer not started. Device not locked for debugging
87,493 UART: [kat] SHA2-256
893,143 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,268 UART: [kat] ++
897,420 UART: [kat] sha1
901,672 UART: [kat] SHA2-256
903,612 UART: [kat] SHA2-384
906,317 UART: [kat] SHA2-512-ACC
908,218 UART: [kat] ECC-384
917,965 UART: [kat] HMAC-384Kdf
922,567 UART: [kat] LMS
1,170,895 UART: [kat] --
1,171,804 UART: [cold-reset] ++
1,172,152 UART: [fht] FHT @ 0x50003400
1,174,777 UART: [idev] ++
1,174,945 UART: [idev] CDI.KEYID = 6
1,175,305 UART: [idev] SUBJECT.KEYID = 7
1,175,729 UART: [idev] UDS.KEYID = 0
1,176,074 ready_for_fw is high
1,176,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,753 UART: [idev] Erasing UDS.KEYID = 0
1,201,328 UART: [idev] Sha1 KeyId Algorithm
1,209,862 UART: [idev] --
1,211,032 UART: [ldev] ++
1,211,200 UART: [ldev] CDI.KEYID = 6
1,211,563 UART: [ldev] SUBJECT.KEYID = 5
1,211,989 UART: [ldev] AUTHORITY.KEYID = 7
1,212,452 UART: [ldev] FE.KEYID = 1
1,217,778 UART: [ldev] Erasing FE.KEYID = 1
1,243,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,214 UART: [ldev] --
1,282,589 UART: [fwproc] Wait for Commands...
1,283,363 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,481 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,442 >>> mbox cmd response: success
2,772,442 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,773,620 UART: [afmc] ++
2,773,788 UART: [afmc] CDI.KEYID = 6
2,774,150 UART: [afmc] SUBJECT.KEYID = 7
2,774,575 UART: [afmc] AUTHORITY.KEYID = 5
2,810,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,557 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,285 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,889 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,659 UART: [afmc] --
2,853,727 UART: [cold-reset] --
2,854,647 UART: [state] Locking Datavault
2,855,936 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,540 UART: [state] Locking ICCM
2,856,990 UART: [exit] Launching FMC @ 0x40000130
2,862,319 UART:
2,862,335 UART: Running Caliptra FMC ...
2,862,743 UART:
2,862,886 UART: [state] CFI Enabled
2,873,775 UART: [fht] FMC Alias Private Key: 7
2,981,682 UART: [art] Extend RT PCRs Done
2,982,110 UART: [art] Lock RT PCRs Done
2,983,230 UART: [art] Populate DV Done
2,991,493 UART: [fht] FMC Alias Private Key: 7
2,992,665 UART: [art] Derive CDI
2,992,945 UART: [art] Store in in slot 0x4
3,078,774 UART: [art] Derive Key Pair
3,079,134 UART: [art] Store priv key in slot 0x5
3,092,280 UART: [art] Derive Key Pair - Done
3,107,176 UART: [art] Signing Cert with AUTHO
3,107,656 UART: RITY.KEYID = 7
3,122,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,297 UART: [art] PUB.X = 0B16D0FB4C7E9561ED5A0B73F0B7BD86317E79702FBC84FF04BBC65D71E8E6E71911C3AE0F88D32AD89077B10C9D4C88
3,130,066 UART: [art] PUB.Y = 0A97F1A449C58BEDDF1054D69ADEAD4BEBA9FC8754F0018159E944CD9E2DC3BB0CD386E9987BAFFDDCCD09F0F55CFD93
3,137,036 UART: [art] SIG.R = E9B53628CB538366F0B274355C29E8A4E0D1879914293FCAE7C8E6CD3B886FDEBE39F7C04C71E33620BD06AE9FDA5898
3,143,813 UART: [art] SIG.S = 67A685ADCD9BA414A585CC7DCDB686772166C2A9A11FB6A48495840784BB0122B13E1790826AEDF26DEF5AFA99E848F5
3,167,172 UART: Caliptra RT
3,167,517 UART: [state] CFI Enabled
3,275,290 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,288,101 >>> mbox cmd response: failed
3,288,101 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,343 UART: [rt]cmd =0x46505652, len=4
3,318,003 UART: [rt] FIPS Version
3,318,844 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,650 ready_for_fw is high
1,060,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,997 >>> mbox cmd response: success
2,624,997 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,687,579 UART:
2,687,595 UART: Running Caliptra FMC ...
2,688,003 UART:
2,688,146 UART: [state] CFI Enabled
2,698,753 UART: [fht] FMC Alias Private Key: 7
2,806,694 UART: [art] Extend RT PCRs Done
2,807,122 UART: [art] Lock RT PCRs Done
2,808,826 UART: [art] Populate DV Done
2,816,853 UART: [fht] FMC Alias Private Key: 7
2,817,955 UART: [art] Derive CDI
2,818,235 UART: [art] Store in in slot 0x4
2,903,978 UART: [art] Derive Key Pair
2,904,338 UART: [art] Store priv key in slot 0x5
2,917,796 UART: [art] Derive Key Pair - Done
2,932,409 UART: [art] Signing Cert with AUTHO
2,932,889 UART: RITY.KEYID = 7
2,948,109 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,874 UART: [art] PUB.X = 4C4083E2091D240CA22880650BBAC26DB4618714C2B327FFC42C0F05B2940A9096416740B545ACF580615729459DE5CC
2,955,620 UART: [art] PUB.Y = F3A7E727B877D17CB09BF39C99962E30FE974226339753B265C6F36959A9A96E9BE2C424993B22D49FA682E26D93AEE9
2,962,570 UART: [art] SIG.R = 4EEAE9BBFD1079F39B78EFAE0F1D0D5D4912B7AB685B8D04CE188B4527C3CEFDC52D6942FA1B531875D87280B00D0874
2,969,341 UART: [art] SIG.S = 1799BC5393227AA2C70C11E35EA3E662A51CC635694F579500708D4556B4EA91CC35CAAC30B41917C6D8B58F5CEABFCB
2,992,725 UART: Caliptra RT
2,993,070 UART: [state] CFI Enabled
3,100,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,113,056 >>> mbox cmd response: failed
3,113,056 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,482 UART: [rt]cmd =0x46505652, len=4
3,143,142 UART: [rt] FIPS Version
3,144,127 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,592 UART: [state] LifecycleState = Unprovisioned
86,247 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
891,624 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
915,972 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,637 UART: [cold-reset] ++
1,170,079 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 ready_for_fw is high
1,174,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,199,559 UART: [idev] Sha1 KeyId Algorithm
1,208,529 UART: [idev] --
1,209,626 UART: [ldev] ++
1,209,794 UART: [ldev] CDI.KEYID = 6
1,210,158 UART: [ldev] SUBJECT.KEYID = 5
1,210,585 UART: [ldev] AUTHORITY.KEYID = 7
1,211,048 UART: [ldev] FE.KEYID = 1
1,216,248 UART: [ldev] Erasing FE.KEYID = 1
1,241,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,520 UART: [ldev] --
1,280,848 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,369 >>> mbox cmd response: success
2,770,369 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,771,634 UART: [afmc] ++
2,771,802 UART: [afmc] CDI.KEYID = 6
2,772,165 UART: [afmc] SUBJECT.KEYID = 7
2,772,591 UART: [afmc] AUTHORITY.KEYID = 5
2,808,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,131 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,860 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,743 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,462 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,425 UART: [afmc] --
2,851,539 UART: [cold-reset] --
2,852,433 UART: [state] Locking Datavault
2,853,544 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,148 UART: [state] Locking ICCM
2,854,624 UART: [exit] Launching FMC @ 0x40000130
2,859,953 UART:
2,859,969 UART: Running Caliptra FMC ...
2,860,377 UART:
2,860,431 UART: [state] CFI Enabled
2,871,064 UART: [fht] FMC Alias Private Key: 7
2,979,143 UART: [art] Extend RT PCRs Done
2,979,571 UART: [art] Lock RT PCRs Done
2,981,263 UART: [art] Populate DV Done
2,989,584 UART: [fht] FMC Alias Private Key: 7
2,990,734 UART: [art] Derive CDI
2,991,014 UART: [art] Store in in slot 0x4
3,076,313 UART: [art] Derive Key Pair
3,076,673 UART: [art] Store priv key in slot 0x5
3,089,825 UART: [art] Derive Key Pair - Done
3,104,646 UART: [art] Signing Cert with AUTHO
3,105,126 UART: RITY.KEYID = 7
3,120,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,125 UART: [art] PUB.X = 2D95DF0FAE305C5AF0D079FCC70FE27B16CFC32D4D9F12A153895C78F96FD500B026DEF6A7D762B7CFD9E7B38A8F3F58
3,127,889 UART: [art] PUB.Y = 55BF04C528B2C238A9737D8D03A18216AF3ED50A0065D5DE6089552A4C7403F2AD3E37994EFCB5F995776008513BC045
3,134,800 UART: [art] SIG.R = 2D5FFA5AE755AA71CA1D3925B55574DC9798BB2D40259776AC861233E461DA41A0482F7BFE5F054798C561B12980B7F1
3,141,569 UART: [art] SIG.S = 49B2DAB61E03EC689CC930E80D77A78A845C91212F9B880A852514FF8D80B4ED7AEA7B27E327BE512711FA8BEAC36C32
3,164,735 UART: Caliptra RT
3,164,988 UART: [state] CFI Enabled
3,272,467 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,192 >>> mbox cmd response: failed
3,285,192 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,474 UART: [rt]cmd =0x46505652, len=4
3,315,134 UART: [rt] FIPS Version
3,316,029 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,902 ready_for_fw is high
1,055,902 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,527 >>> mbox cmd response: success
2,618,527 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,680,897 UART:
2,680,913 UART: Running Caliptra FMC ...
2,681,321 UART:
2,681,375 UART: [state] CFI Enabled
2,692,056 UART: [fht] FMC Alias Private Key: 7
2,799,977 UART: [art] Extend RT PCRs Done
2,800,405 UART: [art] Lock RT PCRs Done
2,802,161 UART: [art] Populate DV Done
2,810,556 UART: [fht] FMC Alias Private Key: 7
2,811,548 UART: [art] Derive CDI
2,811,828 UART: [art] Store in in slot 0x4
2,897,393 UART: [art] Derive Key Pair
2,897,753 UART: [art] Store priv key in slot 0x5
2,910,541 UART: [art] Derive Key Pair - Done
2,924,995 UART: [art] Signing Cert with AUTHO
2,925,475 UART: RITY.KEYID = 7
2,940,465 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,230 UART: [art] PUB.X = 338A860C8D270D5BDFE532130ECE274DF95765BCF68CC3285EC3226E3B0ECA199F8E19D58371CE325FBC195724A4F56E
2,947,998 UART: [art] PUB.Y = 94141E484679AA40BE9442EA29C7116C9857D913ABF62EF73F33AED84E47F9D2DEB6A0F7C571873D1FFDD8DAF5278446
2,954,958 UART: [art] SIG.R = A315038F416B112BB33B0A74A7F9B65FA31F27115E3FDC2B194A84911BDBFDCD475869C5ADF7A012AB8F42919DC11C1E
2,961,736 UART: [art] SIG.S = A024165702AC86CF8AFD542956449E619184F7B87A6082134D471E015FD11C3563739DE7986990E72254B6DDC43EBDFA
2,985,599 UART: Caliptra RT
2,985,852 UART: [state] CFI Enabled
3,093,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,105,947 >>> mbox cmd response: failed
3,105,947 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,281 UART: [rt]cmd =0x46505652, len=4
3,135,941 UART: [rt] FIPS Version
3,137,026 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,959 UART: [kat] SHA2-512-ACC
906,860 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,368 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,174,644 ready_for_fw is high
1,174,644 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,351 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,845 UART: [ldev] --
1,283,303 UART: [fwproc] Wait for Commands...
1,283,904 UART: [fwproc] Recv command 0x46574c44
1,284,637 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,860 >>> mbox cmd response: success
2,771,860 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,773,117 UART: [afmc] ++
2,773,285 UART: [afmc] CDI.KEYID = 6
2,773,648 UART: [afmc] SUBJECT.KEYID = 7
2,774,074 UART: [afmc] AUTHORITY.KEYID = 5
2,809,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,475 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,358 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,077 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,856 UART: [afmc] --
2,852,898 UART: [cold-reset] --
2,853,868 UART: [state] Locking Datavault
2,854,921 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,525 UART: [state] Locking ICCM
2,856,111 UART: [exit] Launching FMC @ 0x40000130
2,861,440 UART:
2,861,456 UART: Running Caliptra FMC ...
2,861,864 UART:
2,862,007 UART: [state] CFI Enabled
2,872,718 UART: [fht] FMC Alias Private Key: 7
2,980,343 UART: [art] Extend RT PCRs Done
2,980,771 UART: [art] Lock RT PCRs Done
2,982,671 UART: [art] Populate DV Done
2,990,996 UART: [fht] FMC Alias Private Key: 7
2,992,158 UART: [art] Derive CDI
2,992,438 UART: [art] Store in in slot 0x4
3,078,159 UART: [art] Derive Key Pair
3,078,519 UART: [art] Store priv key in slot 0x5
3,091,775 UART: [art] Derive Key Pair - Done
3,106,379 UART: [art] Signing Cert with AUTHO
3,106,859 UART: RITY.KEYID = 7
3,122,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,410 UART: [art] PUB.X = 8EB61E52803DB6FFE1A55363FB937EE6647BD9F4D68B7FD3C3486480E8DFEA5AB7D0FEF17175C931DEE3C21D2AEADF96
3,130,204 UART: [art] PUB.Y = 01AA19D1BA7F1E9787B4CDB78096DD790BD7E1860F86D898573357D01D567BD63A9388C767332BF21496F9AB9CB1ABA4
3,137,151 UART: [art] SIG.R = 818364BA1FFF268FC2FDE8413D3580815FBC86C2835D4A9C7BAF4BF570A78F677F9A81BA64D158D24205B606389DDBB6
3,143,925 UART: [art] SIG.S = A3E25F9061E05D2BDF0ADEEAE15F7D82A4041429B068F909F9BB9C3640223B2B995F04E544A1B318D79658813D870C94
3,167,707 UART: Caliptra RT
3,168,052 UART: [state] CFI Enabled
3,276,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,288,823 >>> mbox cmd response: failed
3,288,823 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,005 UART: [rt]cmd =0x46505652, len=4
3,318,665 UART: [rt] FIPS Version
3,319,678 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,605 ready_for_fw is high
1,056,605 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,148 >>> mbox cmd response: success
2,622,148 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,684,210 UART:
2,684,226 UART: Running Caliptra FMC ...
2,684,634 UART:
2,684,777 UART: [state] CFI Enabled
2,695,566 UART: [fht] FMC Alias Private Key: 7
2,803,185 UART: [art] Extend RT PCRs Done
2,803,613 UART: [art] Lock RT PCRs Done
2,804,985 UART: [art] Populate DV Done
2,813,248 UART: [fht] FMC Alias Private Key: 7
2,814,196 UART: [art] Derive CDI
2,814,476 UART: [art] Store in in slot 0x4
2,899,891 UART: [art] Derive Key Pair
2,900,251 UART: [art] Store priv key in slot 0x5
2,913,551 UART: [art] Derive Key Pair - Done
2,927,992 UART: [art] Signing Cert with AUTHO
2,928,472 UART: RITY.KEYID = 7
2,943,906 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,671 UART: [art] PUB.X = 58B66DC081B6216447BA645B8838694FC2FBB6387DBA4AFBC02814EBCF9CE35712845720A33F5500658525AB17C0506D
2,951,419 UART: [art] PUB.Y = 3D749247CF4492D81DD0B27B78347186952E29EBF4CC1CD1361525940EA909B815FFF9E5EFEA3780C0C376D136884EAA
2,958,367 UART: [art] SIG.R = 2E4092C612C335B93F7745081C57A27043919B47D428CE0CEEA0F98AC3E9D4BF4FC881C1446CE6A31465DBAF00BBC1C6
2,965,119 UART: [art] SIG.S = 84F16E2A8E1E38EA806BD8B84CCDFD5673133E9E4DCB2AD8F3637770106F7C351B1CE51638956F898CF6236D7FC42E5C
2,989,480 UART: Caliptra RT
2,989,825 UART: [state] CFI Enabled
3,096,650 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,109,581 >>> mbox cmd response: failed
3,109,581 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,839 UART: [rt]cmd =0x46505652, len=4
3,139,499 UART: [rt] FIPS Version
3,140,692 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,147 UART:
192,540 UART: Running Caliptra ROM ...
193,748 UART:
193,900 UART: [state] CFI Enabled
264,735 UART: [state] LifecycleState = Unprovisioned
266,724 UART: [state] DebugLocked = No
269,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,023 UART: [kat] SHA2-256
443,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,220 UART: [kat] ++
454,700 UART: [kat] sha1
465,822 UART: [kat] SHA2-256
468,541 UART: [kat] SHA2-384
473,315 UART: [kat] SHA2-512-ACC
475,681 UART: [kat] ECC-384
2,766,603 UART: [kat] HMAC-384Kdf
2,778,294 UART: [kat] LMS
3,968,541 UART: [kat] --
3,973,250 UART: [cold-reset] ++
3,974,962 UART: [fht] Storing FHT @ 0x50003400
3,986,428 UART: [idev] ++
3,986,976 UART: [idev] CDI.KEYID = 6
3,987,997 UART: [idev] SUBJECT.KEYID = 7
3,989,165 UART: [idev] UDS.KEYID = 0
3,990,152 ready_for_fw is high
3,990,344 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,133,536 UART: [idev] Erasing UDS.KEYID = 0
7,327,273 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,539 UART: [idev] --
7,352,794 UART: [ldev] ++
7,353,366 UART: [ldev] CDI.KEYID = 6
7,354,322 UART: [ldev] SUBJECT.KEYID = 5
7,355,530 UART: [ldev] AUTHORITY.KEYID = 7
7,356,828 UART: [ldev] FE.KEYID = 1
7,400,797 UART: [ldev] Erasing FE.KEYID = 1
10,734,922 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,569 UART: [ldev] --
13,113,798 UART: [fwproc] Waiting for Commands...
13,117,014 UART: [fwproc] Received command 0x46574c44
13,119,250 UART: [fwproc] Received Image of size 113844 bytes
17,174,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,249,229 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,318,132 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,594 >>> mbox cmd response: success
17,634,124 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,637,734 UART: [afmc] ++
17,638,318 UART: [afmc] CDI.KEYID = 6
17,639,239 UART: [afmc] SUBJECT.KEYID = 7
17,640,503 UART: [afmc] AUTHORITY.KEYID = 5
21,005,999 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,037 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,292 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,687 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,508 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,931 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,371,885 UART: [afmc] --
23,375,696 UART: [cold-reset] --
23,379,669 UART: [state] Locking Datavault
23,386,374 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,115 UART: [state] Locking ICCM
23,390,772 UART: [exit] Launching FMC @ 0x40000130
23,399,176 UART:
23,399,415 UART: Running Caliptra FMC ...
23,400,511 UART:
23,400,658 UART: [state] CFI Enabled
23,466,604 UART: [fht] FMC Alias Private Key: 7
25,804,296 UART: [art] Extend RT PCRs Done
25,805,519 UART: [art] Lock RT PCRs Done
25,807,354 UART: [art] Populate DV Done
25,812,710 UART: [fht] FMC Alias Private Key: 7
25,814,350 UART: [art] Derive CDI
25,815,158 UART: [art] Store in in slot 0x4
25,875,405 UART: [art] Derive Key Pair
25,876,438 UART: [art] Store priv key in slot 0x5
29,169,317 UART: [art] Derive Key Pair - Done
29,182,632 UART: [art] Signing Cert with AUTHO
29,183,935 UART: RITY.KEYID = 7
31,472,369 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,876 UART: [art] PUB.X = E8140D3B9B9A9C21E196AC3BF6D8F081B1545EF2B3C6C46FA5061D2A587205EFD8D31A517497375C32FDFD3A7EA82DF3
31,481,116 UART: [art] PUB.Y = 29EBBE404991B7D47BFD1B98CAE1FF908E22445E09C9C6D67CA8E5F52ED648F6F7BBC3286B8CD5DF35A5F5AB8C2E8461
31,488,388 UART: [art] SIG.R = C355A647B32B101B09E48EC800071D893DC6BE6515C028ACF422CAB033D8290E536E329A44A2574E089FD04D75EAC4AB
31,495,778 UART: [art] SIG.S = 69FB234B18FCB2E081A20A4BD75B0D9E5752A5F30D2F89CACDEAE982F0131EA3EA2F2F3B2347E78AAA3FB4679F73680B
32,801,347 UART: Caliptra RT
32,802,058 UART: [state] CFI Enabled
32,962,231 UART: [rt] RT listening for mailbox commands...
32,964,687 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,806,700 ready_for_fw is high
3,807,085 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,867,280 >>> mbox cmd response: success
17,867,869 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,564,481 UART:
23,564,865 UART: Running Caliptra FMC ...
23,565,982 UART:
23,566,134 UART: [state] CFI Enabled
23,633,310 UART: [fht] FMC Alias Private Key: 7
25,971,044 UART: [art] Extend RT PCRs Done
25,972,292 UART: [art] Lock RT PCRs Done
25,974,079 UART: [art] Populate DV Done
25,979,464 UART: [fht] FMC Alias Private Key: 7
25,980,988 UART: [art] Derive CDI
25,981,754 UART: [art] Store in in slot 0x4
26,041,951 UART: [art] Derive Key Pair
26,042,953 UART: [art] Store priv key in slot 0x5
29,336,219 UART: [art] Derive Key Pair - Done
29,349,270 UART: [art] Signing Cert with AUTHO
29,350,596 UART: RITY.KEYID = 7
31,637,496 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,998 UART: [art] PUB.X = 3712AA980CE4D336B1B6D1209801B15F9CA12DBE617431AF7F185582BC5869AE05AB8E9C7B50637E21B8AE16BE20BEEF
31,646,294 UART: [art] PUB.Y = EE1CA3DE578461C0D0653F53ADD9F7B0FF9AB81BE1F5945B3361BD17F8F2705914F4DF1A08A43E7211AD10146CE7D0A3
31,653,521 UART: [art] SIG.R = 16A3E18F7E0A5C0FCC3BABAA8752552261D5B801B8686A3955D3EC3384B6F7BF54A762B6880DED1B081B0A7CFE02877A
31,660,958 UART: [art] SIG.S = 5BA8CE021E3B3FC8D0EBED8F382884FB8CBEA2F073485572F1052696813479668ECC5AA3535DF049EB8993A2555528FE
32,966,203 UART: Caliptra RT
32,966,918 UART: [state] CFI Enabled
33,126,129 UART: [rt] RT listening for mailbox commands...
33,128,541 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,513 UART:
192,893 UART: Running Caliptra ROM ...
194,036 UART:
603,704 UART: [state] CFI Enabled
620,918 UART: [state] LifecycleState = Unprovisioned
622,788 UART: [state] DebugLocked = No
624,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,017 UART: [kat] SHA2-256
798,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,270 UART: [kat] ++
809,715 UART: [kat] sha1
820,041 UART: [kat] SHA2-256
822,760 UART: [kat] SHA2-384
827,984 UART: [kat] SHA2-512-ACC
830,355 UART: [kat] ECC-384
3,113,844 UART: [kat] HMAC-384Kdf
3,126,423 UART: [kat] LMS
4,316,514 UART: [kat] --
4,320,744 UART: [cold-reset] ++
4,323,172 UART: [fht] Storing FHT @ 0x50003400
4,334,751 UART: [idev] ++
4,335,359 UART: [idev] CDI.KEYID = 6
4,336,285 UART: [idev] SUBJECT.KEYID = 7
4,337,536 UART: [idev] UDS.KEYID = 0
4,338,637 ready_for_fw is high
4,338,860 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,803 UART: [idev] Erasing UDS.KEYID = 0
7,626,033 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,840 UART: [idev] --
7,654,019 UART: [ldev] ++
7,654,647 UART: [ldev] CDI.KEYID = 6
7,655,558 UART: [ldev] SUBJECT.KEYID = 5
7,656,714 UART: [ldev] AUTHORITY.KEYID = 7
7,658,060 UART: [ldev] FE.KEYID = 1
7,670,466 UART: [ldev] Erasing FE.KEYID = 1
10,961,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,731 UART: [ldev] --
13,321,593 UART: [fwproc] Waiting for Commands...
13,324,009 UART: [fwproc] Received command 0x46574c44
13,326,195 UART: [fwproc] Received Image of size 113844 bytes
17,371,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,440 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,833,468 >>> mbox cmd response: success
17,834,003 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,838,255 UART: [afmc] ++
17,838,900 UART: [afmc] CDI.KEYID = 6
17,839,789 UART: [afmc] SUBJECT.KEYID = 7
17,841,059 UART: [afmc] AUTHORITY.KEYID = 5
21,154,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,378 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,632 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,462,036 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,843 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,276 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,846 UART: [afmc] --
23,514,866 UART: [cold-reset] --
23,517,648 UART: [state] Locking Datavault
23,522,461 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,213 UART: [state] Locking ICCM
23,525,606 UART: [exit] Launching FMC @ 0x40000130
23,534,004 UART:
23,534,282 UART: Running Caliptra FMC ...
23,535,392 UART:
23,535,555 UART: [state] CFI Enabled
23,543,063 UART: [fht] FMC Alias Private Key: 7
25,874,024 UART: [art] Extend RT PCRs Done
25,875,244 UART: [art] Lock RT PCRs Done
25,876,921 UART: [art] Populate DV Done
25,882,387 UART: [fht] FMC Alias Private Key: 7
25,883,872 UART: [art] Derive CDI
25,884,637 UART: [art] Store in in slot 0x4
25,926,707 UART: [art] Derive Key Pair
25,927,729 UART: [art] Store priv key in slot 0x5
29,169,514 UART: [art] Derive Key Pair - Done
29,182,559 UART: [art] Signing Cert with AUTHO
29,183,862 UART: RITY.KEYID = 7
31,463,216 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,718 UART: [art] PUB.X = 8E6C8B87363C47B343382FADF263B3B055536A333004B4EE6B3BBBB6D8801739AEB6632E32C0F8651DEE895AE8C82C18
31,471,921 UART: [art] PUB.Y = 0D0D08DAFF59BE1F82675F0626392D89628280D3663CE7418EA8B83068E9F7AEE883607D97FC382CA9852FC252CD5017
31,479,179 UART: [art] SIG.R = 7F400D73B58A1A912BB93BA4313E543F3EA02ECA1569CDB55CA8D90C842BDFAAE8E4D55DDE6DD3AB8076CABA435780D2
31,486,578 UART: [art] SIG.S = 596F4792778C269B09A044621A345EB4D5E45B70E6A1067B714EFEF6A1F1C1C4A0C401722FEBB75DFCFDA2B91BD4758A
32,791,500 UART: Caliptra RT
32,792,201 UART: [state] CFI Enabled
32,909,339 UART: [rt] RT listening for mailbox commands...
32,911,952 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,125,203 ready_for_fw is high
4,125,789 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,064,744 >>> mbox cmd response: success
18,065,381 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,701,679 UART:
23,702,069 UART: Running Caliptra FMC ...
23,703,205 UART:
23,703,366 UART: [state] CFI Enabled
23,711,271 UART: [fht] FMC Alias Private Key: 7
26,042,221 UART: [art] Extend RT PCRs Done
26,043,444 UART: [art] Lock RT PCRs Done
26,044,915 UART: [art] Populate DV Done
26,050,336 UART: [fht] FMC Alias Private Key: 7
26,051,821 UART: [art] Derive CDI
26,052,586 UART: [art] Store in in slot 0x4
26,095,289 UART: [art] Derive Key Pair
26,096,293 UART: [art] Store priv key in slot 0x5
29,338,019 UART: [art] Derive Key Pair - Done
29,350,935 UART: [art] Signing Cert with AUTHO
29,352,248 UART: RITY.KEYID = 7
31,631,910 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,417 UART: [art] PUB.X = F7FF0AC6E7F977A0EB82C6D237167626D204019F4BB7003BA883C156ED4BB2C47705BD3D6503138367A9144E8B9944E6
31,640,617 UART: [art] PUB.Y = 320C1091A46BA25AC8808E90F7798F7C88D9DA8A7EAE2FBDBC1FC871C0FE5E49CF680BDFF9518588BF4B30DF3F22DA61
31,647,927 UART: [art] SIG.R = 30DFC81DCE006A08C96CAA39F764F07C78F82C572B9575A3A6828207E980ABEA56664B5C8A51405FF49C1C47BBB10B0A
31,655,336 UART: [art] SIG.S = E6D75298BB8CD64ACC060CEB3DCE14D0869960DD62387ED6B507B73B9BF09257BF91F80C0501DEB5A4AEA86168A7E339
32,960,006 UART: Caliptra RT
32,960,733 UART: [state] CFI Enabled
33,078,741 UART: [rt] RT listening for mailbox commands...
33,081,307 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,927 writing to cptra_bootfsm_go
193,148 UART:
193,513 UART: Running Caliptra ROM ...
194,700 UART:
194,853 UART: [state] CFI Enabled
264,667 UART: [state] LifecycleState = Unprovisioned
266,572 UART: [state] DebugLocked = No
269,242 UART: [state] WD Timer not started. Device not locked for debugging
272,310 UART: [kat] SHA2-256
451,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,048 UART: [kat] ++
463,506 UART: [kat] sha1
474,237 UART: [kat] SHA2-256
477,248 UART: [kat] SHA2-384
482,775 UART: [kat] SHA2-512-ACC
485,749 UART: [kat] ECC-384
2,948,733 UART: [kat] HMAC-384Kdf
2,972,849 UART: [kat] LMS
3,502,266 UART: [kat] --
3,505,364 UART: [cold-reset] ++
3,507,300 UART: [fht] FHT @ 0x50003400
3,518,212 UART: [idev] ++
3,518,776 UART: [idev] CDI.KEYID = 6
3,519,845 UART: [idev] SUBJECT.KEYID = 7
3,520,967 UART: [idev] UDS.KEYID = 0
3,521,898 ready_for_fw is high
3,522,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,675 UART: [idev] Erasing UDS.KEYID = 0
6,026,376 UART: [idev] Sha1 KeyId Algorithm
6,048,901 UART: [idev] --
6,052,036 UART: [ldev] ++
6,052,611 UART: [ldev] CDI.KEYID = 6
6,053,526 UART: [ldev] SUBJECT.KEYID = 5
6,054,688 UART: [ldev] AUTHORITY.KEYID = 7
6,055,929 UART: [ldev] FE.KEYID = 1
6,100,236 UART: [ldev] Erasing FE.KEYID = 1
8,603,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,454 UART: [ldev] --
10,412,426 UART: [fwproc] Wait for Commands...
10,415,655 UART: [fwproc] Recv command 0x46574c44
10,417,749 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,072 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,820 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,277,768 >>> mbox cmd response: success
14,278,292 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,282,315 UART: [afmc] ++
14,282,895 UART: [afmc] CDI.KEYID = 6
14,283,781 UART: [afmc] SUBJECT.KEYID = 7
14,284,994 UART: [afmc] AUTHORITY.KEYID = 5
16,826,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,854 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,525 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,514 UART: [afmc] --
18,627,087 UART: [cold-reset] --
18,630,142 UART: [state] Locking Datavault
18,635,602 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,300 UART: [state] Locking ICCM
18,639,129 UART: [exit] Launching FMC @ 0x40000130
18,647,539 UART:
18,647,813 UART: Running Caliptra FMC ...
18,648,926 UART:
18,649,083 UART: [state] CFI Enabled
18,708,550 UART: [fht] FMC Alias Private Key: 7
20,472,265 UART: [art] Extend RT PCRs Done
20,473,511 UART: [art] Lock RT PCRs Done
20,475,222 UART: [art] Populate DV Done
20,480,688 UART: [fht] FMC Alias Private Key: 7
20,482,277 UART: [art] Derive CDI
20,483,207 UART: [art] Store in in slot 0x4
20,541,755 UART: [art] Derive Key Pair
20,542,762 UART: [art] Store priv key in slot 0x5
23,005,998 UART: [art] Derive Key Pair - Done
23,019,054 UART: [art] Signing Cert with AUTHO
23,020,359 UART: RITY.KEYID = 7
24,731,711 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,218 UART: [art] PUB.X = 03A1DD33630B7F3D57A6032CD4EF5D127E272B1ECCA3EFAFE77FA2E64DE46493FCFC20A569AD1086DDD8D2119D97E75E
24,740,532 UART: [art] PUB.Y = A07C6F35BA348D392802132F176EC6FDBC4A7036700030071F88E5B8E82DB5BB7AFF8BFF866537EEA5230F7B4CE34E51
24,747,781 UART: [art] SIG.R = E67253E228DFE80C46DAECC1F7ADDA64BD83475AA279808CC6B3CE2A201BF637AB108168FF04BD38C468B41929FEF5EC
24,755,131 UART: [art] SIG.S = 442BDB7C9B05AEC17D6E6B9C0704FBF92F4923FF05AD35260D77CBB18AC4BE0DF74388C13D31E77302E029D5289FC198
25,733,455 UART: Caliptra RT
25,734,176 UART: [state] CFI Enabled
25,899,691 UART: [rt] RT listening for mailbox commands...
25,902,095 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,381,080 ready_for_fw is high
3,381,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,081,698 >>> mbox cmd response: success
14,082,316 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,367,847 UART:
18,368,250 UART: Running Caliptra FMC ...
18,369,342 UART:
18,369,501 UART: [state] CFI Enabled
18,433,297 UART: [fht] FMC Alias Private Key: 7
20,196,981 UART: [art] Extend RT PCRs Done
20,198,238 UART: [art] Lock RT PCRs Done
20,200,217 UART: [art] Populate DV Done
20,205,517 UART: [fht] FMC Alias Private Key: 7
20,207,066 UART: [art] Derive CDI
20,207,804 UART: [art] Store in in slot 0x4
20,266,980 UART: [art] Derive Key Pair
20,268,016 UART: [art] Store priv key in slot 0x5
22,730,894 UART: [art] Derive Key Pair - Done
22,743,673 UART: [art] Signing Cert with AUTHO
22,744,981 UART: RITY.KEYID = 7
24,457,399 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,905 UART: [art] PUB.X = E7FD166DD99D1215C15A19116932C30EBA5D9640D571701E0617098D68FD68BDA77F498438C7273CFDD3FD7A5F31170E
24,466,148 UART: [art] PUB.Y = 43469D66C60723CE8C44775238E4D8DBA8D50A68C30376B4B888116B2FB3E1F2419165635D06E1232A2855EFCBF8BF75
24,473,391 UART: [art] SIG.R = DF94330FA083F606D515EEF49587B4293BCD1BEE3DC3BB2389D25736F62126A5E27E5F856F48CCCA6F119E543291E3AC
24,480,772 UART: [art] SIG.S = ED083E709FEB26A57D7361146C6AD9A9FC8BFC3C1D4689A7ABA09F01D93812969AE1F5D648924D419ADB41DDFAF51A69
25,459,021 UART: Caliptra RT
25,459,724 UART: [state] CFI Enabled
25,623,732 UART: [rt] RT listening for mailbox commands...
25,626,344 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,783 writing to cptra_bootfsm_go
192,879 UART:
193,238 UART: Running Caliptra ROM ...
194,333 UART:
603,949 UART: [state] CFI Enabled
616,043 UART: [state] LifecycleState = Unprovisioned
617,852 UART: [state] DebugLocked = No
619,095 UART: [state] WD Timer not started. Device not locked for debugging
622,280 UART: [kat] SHA2-256
801,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,984 UART: [kat] ++
813,515 UART: [kat] sha1
823,046 UART: [kat] SHA2-256
826,128 UART: [kat] SHA2-384
831,333 UART: [kat] SHA2-512-ACC
834,336 UART: [kat] ECC-384
3,275,287 UART: [kat] HMAC-384Kdf
3,288,455 UART: [kat] LMS
3,818,008 UART: [kat] --
3,823,565 UART: [cold-reset] ++
3,825,846 UART: [fht] FHT @ 0x50003400
3,835,687 UART: [idev] ++
3,836,259 UART: [idev] CDI.KEYID = 6
3,837,172 UART: [idev] SUBJECT.KEYID = 7
3,838,418 UART: [idev] UDS.KEYID = 0
3,839,365 ready_for_fw is high
3,839,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,983,050 UART: [idev] Erasing UDS.KEYID = 0
6,312,456 UART: [idev] Sha1 KeyId Algorithm
6,335,112 UART: [idev] --
6,338,130 UART: [ldev] ++
6,338,701 UART: [ldev] CDI.KEYID = 6
6,339,612 UART: [ldev] SUBJECT.KEYID = 5
6,340,829 UART: [ldev] AUTHORITY.KEYID = 7
6,342,059 UART: [ldev] FE.KEYID = 1
6,351,952 UART: [ldev] Erasing FE.KEYID = 1
8,821,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,571,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,607,878 UART: [ldev] --
10,613,265 UART: [fwproc] Wait for Commands...
10,616,388 UART: [fwproc] Recv command 0x46574c44
10,618,484 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,477,973 >>> mbox cmd response: success
14,478,505 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,481,935 UART: [afmc] ++
14,482,519 UART: [afmc] CDI.KEYID = 6
14,483,430 UART: [afmc] SUBJECT.KEYID = 7
14,484,651 UART: [afmc] AUTHORITY.KEYID = 5
16,983,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,904 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,701 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,351 UART: [afmc] --
18,779,686 UART: [cold-reset] --
18,782,305 UART: [state] Locking Datavault
18,786,741 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,446 UART: [state] Locking ICCM
18,789,627 UART: [exit] Launching FMC @ 0x40000130
18,798,022 UART:
18,798,258 UART: Running Caliptra FMC ...
18,799,360 UART:
18,799,520 UART: [state] CFI Enabled
18,807,835 UART: [fht] FMC Alias Private Key: 7
20,564,253 UART: [art] Extend RT PCRs Done
20,565,475 UART: [art] Lock RT PCRs Done
20,567,117 UART: [art] Populate DV Done
20,572,424 UART: [fht] FMC Alias Private Key: 7
20,573,911 UART: [art] Derive CDI
20,574,674 UART: [art] Store in in slot 0x4
20,617,104 UART: [art] Derive Key Pair
20,618,136 UART: [art] Store priv key in slot 0x5
23,045,052 UART: [art] Derive Key Pair - Done
23,058,272 UART: [art] Signing Cert with AUTHO
23,059,574 UART: RITY.KEYID = 7
24,764,730 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,229 UART: [art] PUB.X = ACC256B9E619F8298D55BF5EA024275FBAEA1A07895F5C9BF3128656755B042EC00EC74DBF55B72D3D0A43F58B2732AA
24,773,479 UART: [art] PUB.Y = 0214F6B00C7468F1F5BF277DFF18F5D0BFE6CFF78AF6BF68608BC6E8CB09AE8DDFE7B01507444DA54A4C361AE3FD8473
24,780,764 UART: [art] SIG.R = AAB72649EE5FF9F6554778059AE5C8EBC275787D01436A37C0750D05585F5FAA97C49D5249E10E2BC87CA648B53A479A
24,788,162 UART: [art] SIG.S = 028369C30DB079FC6FD7C507C7B5392FBFE0545C7321E5744A064EB67CC5C83E65DBB00CCA09C966E5E6882F88CF158D
25,767,020 UART: Caliptra RT
25,767,720 UART: [state] CFI Enabled
25,885,620 UART: [rt] RT listening for mailbox commands...
25,888,453 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
3,697,373 ready_for_fw is high
3,698,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,258,794 >>> mbox cmd response: success
14,259,459 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,507,317 UART:
18,507,716 UART: Running Caliptra FMC ...
18,508,832 UART:
18,508,989 UART: [state] CFI Enabled
18,516,629 UART: [fht] FMC Alias Private Key: 7
20,273,713 UART: [art] Extend RT PCRs Done
20,274,935 UART: [art] Lock RT PCRs Done
20,276,645 UART: [art] Populate DV Done
20,282,008 UART: [fht] FMC Alias Private Key: 7
20,283,595 UART: [art] Derive CDI
20,284,336 UART: [art] Store in in slot 0x4
20,327,206 UART: [art] Derive Key Pair
20,328,204 UART: [art] Store priv key in slot 0x5
22,754,471 UART: [art] Derive Key Pair - Done
22,767,514 UART: [art] Signing Cert with AUTHO
22,768,845 UART: RITY.KEYID = 7
24,474,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,649 UART: [art] PUB.X = 5FC0DC913F24937736AB2C5897AF52A5B60E12FEC0C93D2DDE755ACEBA2BF7DF4699F9239530D6872BCF38B8C47CFCB5
24,482,969 UART: [art] PUB.Y = 7A3250022C068CECA3AE58FD20EF6AE64BFA548905971E5E4F553FAD87E3182A47B6640FCB278A81C5A7563E116FF564
24,490,220 UART: [art] SIG.R = C2822DE295B643B8F5609CC1124FEF8AE8E0AFFA38CAD80EF03D33EB580765E82B41F21CFB42495F508A9E8C48968C4E
24,497,679 UART: [art] SIG.S = 628E967533E016F566647DD7999B0DA26663AB39521F57C6EF84D9BB006196E2F483A867EAF40949AAD1F329201B2575
25,477,032 UART: Caliptra RT
25,477,744 UART: [state] CFI Enabled
25,595,449 UART: [rt] RT listening for mailbox commands...
25,598,012 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,994 UART:
192,348 UART: Running Caliptra ROM ...
193,468 UART:
193,618 UART: [state] CFI Enabled
267,437 UART: [state] LifecycleState = Unprovisioned
269,869 UART: [state] DebugLocked = No
272,189 UART: [state] WD Timer not started. Device not locked for debugging
276,167 UART: [kat] SHA2-256
466,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,822 UART: [kat] ++
477,266 UART: [kat] sha1
489,418 UART: [kat] SHA2-256
492,446 UART: [kat] SHA2-384
499,823 UART: [kat] SHA2-512-ACC
502,419 UART: [kat] ECC-384
2,950,042 UART: [kat] HMAC-384Kdf
2,972,740 UART: [kat] LMS
3,504,518 UART: [kat] --
3,509,533 UART: [cold-reset] ++
3,510,542 UART: [fht] FHT @ 0x50003400
3,522,170 UART: [idev] ++
3,522,880 UART: [idev] CDI.KEYID = 6
3,523,838 UART: [idev] SUBJECT.KEYID = 7
3,525,014 UART: [idev] UDS.KEYID = 0
3,525,944 ready_for_fw is high
3,526,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,730 UART: [idev] Erasing UDS.KEYID = 0
6,039,369 UART: [idev] Sha1 KeyId Algorithm
6,061,904 UART: [idev] --
6,066,127 UART: [ldev] ++
6,066,816 UART: [ldev] CDI.KEYID = 6
6,067,706 UART: [ldev] SUBJECT.KEYID = 5
6,068,814 UART: [ldev] AUTHORITY.KEYID = 7
6,070,104 UART: [ldev] FE.KEYID = 1
6,112,326 UART: [ldev] Erasing FE.KEYID = 1
8,618,392 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,226 UART: [ldev] --
10,427,470 UART: [fwproc] Wait for Commands...
10,430,593 UART: [fwproc] Recv command 0x46574c44
10,432,906 UART: [fwproc] Recv'd Img size: 114168 bytes
13,884,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,077,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,618,498 >>> mbox cmd response: success
14,619,045 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,623,331 UART: [afmc] ++
14,624,030 UART: [afmc] CDI.KEYID = 6
14,625,272 UART: [afmc] SUBJECT.KEYID = 7
14,626,730 UART: [afmc] AUTHORITY.KEYID = 5
17,160,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,886,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,888,674 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,903,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,918,979 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,933,995 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,957,633 UART: [afmc] --
18,960,526 UART: [cold-reset] --
18,964,713 UART: [state] Locking Datavault
18,970,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,973,075 UART: [state] Locking ICCM
18,975,221 UART: [exit] Launching FMC @ 0x40000130
18,983,846 UART:
18,984,082 UART: Running Caliptra FMC ...
18,985,112 UART:
18,985,277 UART: [state] CFI Enabled
19,044,498 UART: [fht] FMC Alias Private Key: 7
20,807,969 UART: [art] Extend RT PCRs Done
20,809,199 UART: [art] Lock RT PCRs Done
20,810,993 UART: [art] Populate DV Done
20,816,252 UART: [fht] FMC Alias Private Key: 7
20,817,948 UART: [art] Derive CDI
20,818,691 UART: [art] Store in in slot 0x4
20,877,113 UART: [art] Derive Key Pair
20,878,115 UART: [art] Store priv key in slot 0x5
23,341,585 UART: [art] Derive Key Pair - Done
23,354,421 UART: [art] Signing Cert with AUTHO
23,355,725 UART: RITY.KEYID = 7
25,067,032 UART: [art] Erasing AUTHORITY.KEYID = 7
25,068,553 UART: [art] PUB.X = 60888A740204C36887F500BD7A2C840641EB6DA8E8E55275C138F34C319EF39BD79EBAC65703789052C179FF80D1DFD5
25,075,775 UART: [art] PUB.Y = 9C2E40A0F849B91920EE5EA751A1CDCD153BCC9B09A125BD56D11605755AAEA5C242C152233F7A1B76EE6488302994A4
25,083,046 UART: [art] SIG.R = 2445D77AA1515D8A212982231AAACB4A3D32D6457F052D57F46394B6E9A77ADF2EDB3E71CCC7FA1F03A95B433396E5FF
25,090,461 UART: [art] SIG.S = 0F18C14E7EE9D21BFC4D0E5F5131D68335F572A305D6B11F51E2C54EF0DADCCCAE886B69BD752EBA45029B028B5480F6
26,069,642 UART: Caliptra RT
26,070,358 UART: [state] CFI Enabled
26,235,260 UART: [rt] RT listening for mailbox commands...
26,237,508 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,037 writing to cptra_bootfsm_go
3,441,507 ready_for_fw is high
3,441,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,710,389 >>> mbox cmd response: success
14,711,015 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,001,956 UART:
19,002,350 UART: Running Caliptra FMC ...
19,003,493 UART:
19,003,655 UART: [state] CFI Enabled
19,070,376 UART: [fht] FMC Alias Private Key: 7
20,834,211 UART: [art] Extend RT PCRs Done
20,835,434 UART: [art] Lock RT PCRs Done
20,837,109 UART: [art] Populate DV Done
20,842,408 UART: [fht] FMC Alias Private Key: 7
20,844,088 UART: [art] Derive CDI
20,844,912 UART: [art] Store in in slot 0x4
20,902,912 UART: [art] Derive Key Pair
20,903,949 UART: [art] Store priv key in slot 0x5
23,366,694 UART: [art] Derive Key Pair - Done
23,379,210 UART: [art] Signing Cert with AUTHO
23,380,518 UART: RITY.KEYID = 7
25,092,405 UART: [art] Erasing AUTHORITY.KEYID = 7
25,093,931 UART: [art] PUB.X = 73A0CBB67FAD10134CB9E142E15883A1AABBFE90DCF05045016E5385B6583E8899BC1205D751F743D9C6DB7DAADEEB87
25,101,188 UART: [art] PUB.Y = F2D1A5C42B41527E8F178FCD90D48D43B8EF854DBC07947090EC98FFE4B5C0229FFAB67DED640D95B2ECD66C7313F95C
25,108,481 UART: [art] SIG.R = 250E59E13E1AB888B05DCEAED414E156A69F7057300BD3EBB5A22A5FCE1DD5D480A7794EDF95ADB18510A874C7142154
25,115,867 UART: [art] SIG.S = 34DED8F9FC78C102D7D24689A0410C6B8E668E2F16B8B728EEFB9AF67D2999CFEC6D29515E1D54E9F639C8304C0A7037
26,095,280 UART: Caliptra RT
26,095,995 UART: [state] CFI Enabled
26,259,523 UART: [rt] RT listening for mailbox commands...
26,262,250 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,736 writing to cptra_bootfsm_go
192,822 UART:
193,197 UART: Running Caliptra ROM ...
194,319 UART:
603,879 UART: [state] CFI Enabled
615,506 UART: [state] LifecycleState = Unprovisioned
617,919 UART: [state] DebugLocked = No
619,089 UART: [state] WD Timer not started. Device not locked for debugging
623,147 UART: [kat] SHA2-256
812,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,728 UART: [kat] ++
824,334 UART: [kat] sha1
834,437 UART: [kat] SHA2-256
837,444 UART: [kat] SHA2-384
844,777 UART: [kat] SHA2-512-ACC
847,366 UART: [kat] ECC-384
3,290,867 UART: [kat] HMAC-384Kdf
3,304,594 UART: [kat] LMS
3,836,408 UART: [kat] --
3,841,352 UART: [cold-reset] ++
3,842,941 UART: [fht] FHT @ 0x50003400
3,854,699 UART: [idev] ++
3,855,335 UART: [idev] CDI.KEYID = 6
3,856,366 UART: [idev] SUBJECT.KEYID = 7
3,857,539 UART: [idev] UDS.KEYID = 0
3,858,479 ready_for_fw is high
3,858,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,096 UART: [idev] Erasing UDS.KEYID = 0
6,333,021 UART: [idev] Sha1 KeyId Algorithm
6,354,841 UART: [idev] --
6,359,948 UART: [ldev] ++
6,360,643 UART: [ldev] CDI.KEYID = 6
6,361,558 UART: [ldev] SUBJECT.KEYID = 5
6,362,717 UART: [ldev] AUTHORITY.KEYID = 7
6,363,948 UART: [ldev] FE.KEYID = 1
6,372,976 UART: [ldev] Erasing FE.KEYID = 1
8,854,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,074 UART: [ldev] --
10,642,203 UART: [fwproc] Wait for Commands...
10,644,244 UART: [fwproc] Recv command 0x46574c44
10,646,498 UART: [fwproc] Recv'd Img size: 114168 bytes
14,093,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,262 >>> mbox cmd response: success
14,830,768 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,834,312 UART: [afmc] ++
14,835,010 UART: [afmc] CDI.KEYID = 6
14,836,261 UART: [afmc] SUBJECT.KEYID = 7
14,837,698 UART: [afmc] AUTHORITY.KEYID = 5
17,342,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,928 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,075 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,222 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,146 UART: [afmc] --
19,142,578 UART: [cold-reset] --
19,147,841 UART: [state] Locking Datavault
19,154,767 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,958 UART: [state] Locking ICCM
19,159,758 UART: [exit] Launching FMC @ 0x40000130
19,168,437 UART:
19,168,670 UART: Running Caliptra FMC ...
19,169,771 UART:
19,170,111 UART: [state] CFI Enabled
19,178,144 UART: [fht] FMC Alias Private Key: 7
20,935,442 UART: [art] Extend RT PCRs Done
20,936,666 UART: [art] Lock RT PCRs Done
20,938,316 UART: [art] Populate DV Done
20,943,744 UART: [fht] FMC Alias Private Key: 7
20,945,387 UART: [art] Derive CDI
20,946,123 UART: [art] Store in in slot 0x4
20,988,717 UART: [art] Derive Key Pair
20,989,714 UART: [art] Store priv key in slot 0x5
23,416,373 UART: [art] Derive Key Pair - Done
23,429,256 UART: [art] Signing Cert with AUTHO
23,430,561 UART: RITY.KEYID = 7
25,136,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,732 UART: [art] PUB.X = EBA44D17F1F8CE4D2D3504ADAA64A2C9BFC467B9DB415E3253DDFEFCE687E8A518433A6B3DBB9E5A6E1097F1E56AE0FA
25,145,037 UART: [art] PUB.Y = 822F2E6FEBFA0AA59852880C93B387F15A61232AD597B620D5A697638F2F473C3AEA1EFEBCF0528D4E4CF00E70C40D65
25,152,277 UART: [art] SIG.R = FD19755A80AD9CD6955124C2A88B20A2C5832E82EF5EC66D06615715C943F7F9846127632AA15DEF24270DDB3CD8A1FA
25,159,668 UART: [art] SIG.S = 3F765A04233F59837EBF8F6A3D315977E719428C103A60E8FBC0A050B88B89FB3FA6A3D7000BA1A31ED228EA696C1EFF
26,139,078 UART: Caliptra RT
26,139,772 UART: [state] CFI Enabled
26,257,093 UART: [rt] RT listening for mailbox commands...
26,259,451 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
3,758,446 ready_for_fw is high
3,758,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,964,490 >>> mbox cmd response: success
14,965,108 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,220,850 UART:
19,221,245 UART: Running Caliptra FMC ...
19,222,375 UART:
19,222,539 UART: [state] CFI Enabled
19,230,367 UART: [fht] FMC Alias Private Key: 7
20,987,382 UART: [art] Extend RT PCRs Done
20,988,603 UART: [art] Lock RT PCRs Done
20,990,170 UART: [art] Populate DV Done
20,995,585 UART: [fht] FMC Alias Private Key: 7
20,997,233 UART: [art] Derive CDI
20,998,044 UART: [art] Store in in slot 0x4
21,040,878 UART: [art] Derive Key Pair
21,041,922 UART: [art] Store priv key in slot 0x5
23,468,539 UART: [art] Derive Key Pair - Done
23,482,048 UART: [art] Signing Cert with AUTHO
23,483,357 UART: RITY.KEYID = 7
25,188,721 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,230 UART: [art] PUB.X = AC56B03C5749716042BB9994B2937920329AD04188D037CD254F63C70A48A67098B11E20AF37F81D327675421396CE4F
25,197,500 UART: [art] PUB.Y = 3293D71C067CB3F3E453BC2627A53B3936D85B1BD8BDC7D7349A5A0AE44EC04391D1E5E8A62818D096BF993F2AE12AFB
25,204,695 UART: [art] SIG.R = F7BFC62892FCE28E2C9BA46DAB13DFCEE077EEE61E3E55D297A1F838FA40FE3416969555F2EE2BBA9B5C43163F2F23DC
25,212,145 UART: [art] SIG.S = F984DA1BCB6CC896D4AB6FB4F7427F092A341FE64C2B6E9260D3DF2C13FA5061ED0545E4A3602874B2C8DF92C6AEDF20
26,191,098 UART: Caliptra RT
26,191,810 UART: [state] CFI Enabled
26,309,623 UART: [rt] RT listening for mailbox commands...
26,311,860 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,100 UART:
192,452 UART: Running Caliptra ROM ...
193,555 UART:
193,697 UART: [state] CFI Enabled
262,424 UART: [state] LifecycleState = Unprovisioned
264,361 UART: [state] DebugLocked = No
267,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,705 UART: [kat] SHA2-256
442,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,837 UART: [kat] ++
453,355 UART: [kat] sha1
464,719 UART: [kat] SHA2-256
467,371 UART: [kat] SHA2-384
473,567 UART: [kat] SHA2-512-ACC
475,927 UART: [kat] ECC-384
2,766,104 UART: [kat] HMAC-384Kdf
2,799,220 UART: [kat] LMS
3,989,500 UART: [kat] --
3,992,636 UART: [cold-reset] ++
3,995,197 UART: [fht] Storing FHT @ 0x50003400
4,008,015 UART: [idev] ++
4,008,584 UART: [idev] CDI.KEYID = 6
4,009,466 UART: [idev] SUBJECT.KEYID = 7
4,010,797 UART: [idev] UDS.KEYID = 0
4,011,762 ready_for_fw is high
4,011,957 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,145 UART: [idev] Erasing UDS.KEYID = 0
7,342,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,658 UART: [idev] --
7,368,330 UART: [ldev] ++
7,368,952 UART: [ldev] CDI.KEYID = 6
7,369,887 UART: [ldev] SUBJECT.KEYID = 5
7,371,090 UART: [ldev] AUTHORITY.KEYID = 7
7,372,370 UART: [ldev] FE.KEYID = 1
7,400,924 UART: [ldev] Erasing FE.KEYID = 1
10,733,408 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,308 UART: [ldev] --
13,113,831 UART: [fwproc] Waiting for Commands...
13,117,208 UART: [fwproc] Received command 0x46574c44
13,119,379 UART: [fwproc] Received Image of size 113844 bytes
17,171,263 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,750 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,019 >>> mbox cmd response: success
17,633,555 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,637,635 UART: [afmc] ++
17,638,217 UART: [afmc] CDI.KEYID = 6
17,639,181 UART: [afmc] SUBJECT.KEYID = 7
17,640,392 UART: [afmc] AUTHORITY.KEYID = 5
21,005,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,190 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,482 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,870 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,719 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,130 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,337 UART: [afmc] --
23,376,975 UART: [cold-reset] --
23,380,504 UART: [state] Locking Datavault
23,385,263 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,053 UART: [state] Locking ICCM
23,389,643 UART: [exit] Launching FMC @ 0x40000130
23,398,032 UART:
23,398,266 UART: Running Caliptra FMC ...
23,399,285 UART:
23,399,428 UART: [state] CFI Enabled
23,467,361 UART: [fht] FMC Alias Private Key: 7
25,805,589 UART: [art] Extend RT PCRs Done
25,806,833 UART: [art] Lock RT PCRs Done
25,808,321 UART: [art] Populate DV Done
25,813,562 UART: [fht] FMC Alias Private Key: 7
25,815,038 UART: [art] Derive CDI
25,815,767 UART: [art] Store in in slot 0x4
25,876,226 UART: [art] Derive Key Pair
25,877,283 UART: [art] Store priv key in slot 0x5
29,169,922 UART: [art] Derive Key Pair - Done
29,182,856 UART: [art] Signing Cert with AUTHO
29,184,148 UART: RITY.KEYID = 7
31,470,888 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,389 UART: [art] PUB.X = 2C1E1B74609B5277B2F7422BDD4ADED1C2C41E2E818EFED4C7521EF2B059848EE4A18B542EE02DDDD7A0AD52631A4A64
31,479,632 UART: [art] PUB.Y = 631D8FB1370558FB38AA34D4551EDBE6F68DFB6A608781EF351AA9F8A6C762C1546303E7C711C580C0A602284E7659E1
31,486,910 UART: [art] SIG.R = 1A603B5594877F087B97DD97A43F8003A4B7DE89966BAD56E25BE359569DE75E79295EEAF76516F50A0340186442786F
31,494,249 UART: [art] SIG.S = F724308C84D65FDE78A47116B60B063B5485B59FF6F80B4637AF031F9A79108539F33AFB3BA65B5D185A5C733BDE47A1
32,799,569 UART: Caliptra RT
32,800,302 UART: [state] CFI Enabled
32,981,757 UART: [rt] RT listening for mailbox commands...
33,012,885 UART: [rt]cmd =0xaabbccdd, len=4
33,014,367 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,783,785 ready_for_fw is high
3,784,177 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,864,866 >>> mbox cmd response: success
17,865,750 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,565,806 UART:
23,566,208 UART: Running Caliptra FMC ...
23,567,331 UART:
23,567,485 UART: [state] CFI Enabled
23,636,533 UART: [fht] FMC Alias Private Key: 7
25,974,743 UART: [art] Extend RT PCRs Done
25,975,974 UART: [art] Lock RT PCRs Done
25,977,674 UART: [art] Populate DV Done
25,983,299 UART: [fht] FMC Alias Private Key: 7
25,984,889 UART: [art] Derive CDI
25,985,618 UART: [art] Store in in slot 0x4
26,044,462 UART: [art] Derive Key Pair
26,045,505 UART: [art] Store priv key in slot 0x5
29,337,965 UART: [art] Derive Key Pair - Done
29,351,174 UART: [art] Signing Cert with AUTHO
29,352,508 UART: RITY.KEYID = 7
31,639,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,582 UART: [art] PUB.X = 3B5CD25A9CBD15EB356A2DBA9638FA748C8974457DF9CBBD727F222306CFFAE5ABB56FF1B7E14474BCA03DD42E524E27
31,647,824 UART: [art] PUB.Y = 98AE6CFA6408716F7952BD8787BC1EF850CAF092294C739C1B63606403DC5682AF154D6A0993FAD42D79432D6787B5EC
31,655,065 UART: [art] SIG.R = FF509D4FD1C799799FFE57D8B4F7F24BE179B8E2608B784ABB065E59022C58BC2158059E71F835EA1EE66B2DA3FE9D9D
31,662,439 UART: [art] SIG.S = D57B40E94B945752752B17252D88EC8F106905F18D8369C8148071EAFFD132100F605C3A4FCC66824FADFB97F148AEF7
32,967,048 UART: Caliptra RT
32,967,769 UART: [state] CFI Enabled
33,129,810 UART: [rt] RT listening for mailbox commands...
33,160,845 UART: [rt]cmd =0xaabbccdd, len=4
33,162,346 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,376 UART:
192,745 UART: Running Caliptra ROM ...
193,879 UART:
603,390 UART: [state] CFI Enabled
619,115 UART: [state] LifecycleState = Unprovisioned
620,989 UART: [state] DebugLocked = No
622,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,236 UART: [kat] SHA2-256
797,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,478 UART: [kat] ++
808,952 UART: [kat] sha1
820,363 UART: [kat] SHA2-256
823,057 UART: [kat] SHA2-384
829,067 UART: [kat] SHA2-512-ACC
831,442 UART: [kat] ECC-384
3,115,474 UART: [kat] HMAC-384Kdf
3,128,021 UART: [kat] LMS
4,318,067 UART: [kat] --
4,322,521 UART: [cold-reset] ++
4,324,032 UART: [fht] Storing FHT @ 0x50003400
4,336,819 UART: [idev] ++
4,337,487 UART: [idev] CDI.KEYID = 6
4,338,379 UART: [idev] SUBJECT.KEYID = 7
4,339,630 UART: [idev] UDS.KEYID = 0
4,340,703 ready_for_fw is high
4,340,937 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,877 UART: [idev] Erasing UDS.KEYID = 0
7,627,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,139 UART: [idev] --
7,654,010 UART: [ldev] ++
7,654,587 UART: [ldev] CDI.KEYID = 6
7,655,560 UART: [ldev] SUBJECT.KEYID = 5
7,656,854 UART: [ldev] AUTHORITY.KEYID = 7
7,657,964 UART: [ldev] FE.KEYID = 1
7,668,720 UART: [ldev] Erasing FE.KEYID = 1
10,959,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,293 UART: [ldev] --
13,319,774 UART: [fwproc] Waiting for Commands...
13,322,733 UART: [fwproc] Received command 0x46574c44
13,324,939 UART: [fwproc] Received Image of size 113844 bytes
17,371,505 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,119 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,983 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,830,057 >>> mbox cmd response: success
17,830,595 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,834,686 UART: [afmc] ++
17,835,273 UART: [afmc] CDI.KEYID = 6
17,836,243 UART: [afmc] SUBJECT.KEYID = 7
17,837,462 UART: [afmc] AUTHORITY.KEYID = 5
21,154,034 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,484 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,746 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,105 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,942 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,371 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,903 UART: [afmc] --
23,520,618 UART: [cold-reset] --
23,524,052 UART: [state] Locking Datavault
23,529,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,214 UART: [state] Locking ICCM
23,533,611 UART: [exit] Launching FMC @ 0x40000130
23,541,970 UART:
23,542,211 UART: Running Caliptra FMC ...
23,543,312 UART:
23,543,471 UART: [state] CFI Enabled
23,551,628 UART: [fht] FMC Alias Private Key: 7
25,882,206 UART: [art] Extend RT PCRs Done
25,883,433 UART: [art] Lock RT PCRs Done
25,885,167 UART: [art] Populate DV Done
25,890,854 UART: [fht] FMC Alias Private Key: 7
25,892,501 UART: [art] Derive CDI
25,893,338 UART: [art] Store in in slot 0x4
25,935,395 UART: [art] Derive Key Pair
25,936,433 UART: [art] Store priv key in slot 0x5
29,178,310 UART: [art] Derive Key Pair - Done
29,191,307 UART: [art] Signing Cert with AUTHO
29,192,608 UART: RITY.KEYID = 7
31,472,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,592 UART: [art] PUB.X = 90C046DACCBB41AB07E768B39CD91B626BEFCA93F396E35BFE876276093FBF9447A33F84D173BF6A7F205319BF6FE934
31,480,847 UART: [art] PUB.Y = 6E3319487AEEC4B8DA3CB4D9911E0AE2E6B2026F0E057AA38F4B5FD7E4E273A4B2F206F2F382CB474E05CA9BEC020017
31,488,092 UART: [art] SIG.R = A2677E7B5DEDABEDB7E914571A15BAF23519B443024AC7E380C98C2EA6C51FDCB22E2AABD6D7BEB6A31577B874050415
31,495,500 UART: [art] SIG.S = DDD54804289CAEE0D200934E614B6C50DF3C1B86A68BE21CE7146AC60CAA586562B27B5A68789642B598454B0064F7DA
32,800,368 UART: Caliptra RT
32,801,063 UART: [state] CFI Enabled
32,918,496 UART: [rt] RT listening for mailbox commands...
32,949,577 UART: [rt]cmd =0xaabbccdd, len=4
32,950,967 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,128,810 ready_for_fw is high
4,129,237 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,542 >>> mbox cmd response: success
18,071,585 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,713,965 UART:
23,714,362 UART: Running Caliptra FMC ...
23,715,475 UART:
23,715,642 UART: [state] CFI Enabled
23,723,659 UART: [fht] FMC Alias Private Key: 7
26,055,036 UART: [art] Extend RT PCRs Done
26,056,293 UART: [art] Lock RT PCRs Done
26,057,846 UART: [art] Populate DV Done
26,063,176 UART: [fht] FMC Alias Private Key: 7
26,064,724 UART: [art] Derive CDI
26,065,463 UART: [art] Store in in slot 0x4
26,108,159 UART: [art] Derive Key Pair
26,109,191 UART: [art] Store priv key in slot 0x5
29,351,460 UART: [art] Derive Key Pair - Done
29,364,620 UART: [art] Signing Cert with AUTHO
29,365,927 UART: RITY.KEYID = 7
31,645,529 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,033 UART: [art] PUB.X = 9ABDEBE610BFFC8482B4B25D013B6B1ACE45AC64E2FAE188A52F59197AE250EE22B84A5C77EFC83010DE6A692B7517C6
31,654,283 UART: [art] PUB.Y = EB85D8A5260EEE370A1776837F4C8AB6DAF6E186864E52FD039AF2864905CBA00923AB2FE85E252806F55B22F440E00B
31,661,523 UART: [art] SIG.R = 0362D8281D36F70BC2F2FB776BFCE1269E78863C6207D9ACB601AD39C70027CD7782119FAE86A6D09213B864E80BCBB1
31,668,919 UART: [art] SIG.S = D7F6A16066925C30934551904851B6124A648D9781ACC8A07978436EE25247EBD9572ED8CA6E672F3B72563FE75E444F
32,973,798 UART: Caliptra RT
32,974,512 UART: [state] CFI Enabled
33,092,922 UART: [rt] RT listening for mailbox commands...
33,124,136 UART: [rt]cmd =0xaabbccdd, len=4
33,125,483 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,290 UART:
192,645 UART: Running Caliptra ROM ...
193,837 UART:
193,989 UART: [state] CFI Enabled
260,531 UART: [state] LifecycleState = Unprovisioned
262,366 UART: [state] DebugLocked = No
265,243 UART: [state] WD Timer not started. Device not locked for debugging
269,156 UART: [kat] SHA2-256
448,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,797 UART: [kat] ++
460,334 UART: [kat] sha1
471,785 UART: [kat] SHA2-256
474,858 UART: [kat] SHA2-384
480,542 UART: [kat] SHA2-512-ACC
483,449 UART: [kat] ECC-384
2,927,179 UART: [kat] HMAC-384Kdf
2,951,364 UART: [kat] LMS
3,480,765 UART: [kat] --
3,486,175 UART: [cold-reset] ++
3,488,674 UART: [fht] FHT @ 0x50003400
3,500,357 UART: [idev] ++
3,500,929 UART: [idev] CDI.KEYID = 6
3,501,811 UART: [idev] SUBJECT.KEYID = 7
3,503,055 UART: [idev] UDS.KEYID = 0
3,503,966 ready_for_fw is high
3,504,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,647,744 UART: [idev] Erasing UDS.KEYID = 0
6,005,029 UART: [idev] Sha1 KeyId Algorithm
6,028,633 UART: [idev] --
6,034,084 UART: [ldev] ++
6,034,658 UART: [ldev] CDI.KEYID = 6
6,035,576 UART: [ldev] SUBJECT.KEYID = 5
6,036,736 UART: [ldev] AUTHORITY.KEYID = 7
6,037,968 UART: [ldev] FE.KEYID = 1
6,079,045 UART: [ldev] Erasing FE.KEYID = 1
8,584,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,979 UART: [ldev] --
10,391,829 UART: [fwproc] Wait for Commands...
10,393,385 UART: [fwproc] Recv command 0x46574c44
10,395,420 UART: [fwproc] Recv'd Img size: 114168 bytes
13,794,848 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,872,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,940,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,257,442 >>> mbox cmd response: success
14,257,956 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,262,027 UART: [afmc] ++
14,262,615 UART: [afmc] CDI.KEYID = 6
14,263,527 UART: [afmc] SUBJECT.KEYID = 7
14,264,744 UART: [afmc] AUTHORITY.KEYID = 5
16,806,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,569 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,581 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,451 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,505 UART: [afmc] --
18,603,611 UART: [cold-reset] --
18,608,334 UART: [state] Locking Datavault
18,614,280 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,931 UART: [state] Locking ICCM
18,617,031 UART: [exit] Launching FMC @ 0x40000130
18,625,424 UART:
18,625,654 UART: Running Caliptra FMC ...
18,626,678 UART:
18,626,825 UART: [state] CFI Enabled
18,687,862 UART: [fht] FMC Alias Private Key: 7
20,452,125 UART: [art] Extend RT PCRs Done
20,453,345 UART: [art] Lock RT PCRs Done
20,454,892 UART: [art] Populate DV Done
20,460,106 UART: [fht] FMC Alias Private Key: 7
20,461,762 UART: [art] Derive CDI
20,462,578 UART: [art] Store in in slot 0x4
20,520,512 UART: [art] Derive Key Pair
20,521,552 UART: [art] Store priv key in slot 0x5
22,984,627 UART: [art] Derive Key Pair - Done
22,997,686 UART: [art] Signing Cert with AUTHO
22,998,995 UART: RITY.KEYID = 7
24,709,334 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,835 UART: [art] PUB.X = C48FED307CFE8EC39B2307854819C8818EF1BB49E75178A23905C9AEE8C6721BD7721B0F7593281B474D100ECF3BA4C7
24,718,100 UART: [art] PUB.Y = CEEC2D9E3C506E4EED25913D3827C4DBD614BD539204D3713007E46B84BFC3F6EBA8D8177894DDF903718F630EA2B8F7
24,725,358 UART: [art] SIG.R = 617DE3F1E8D70F2E16339B729047090493D2C420D35CE58084CCA024A621CCD1D248EA7D85009E59A38DB1407566CC09
24,732,713 UART: [art] SIG.S = 2C6C2BA5150B8871B7C6C68546CA19511C71E11E5E688D3B5A38E0AE0C45613DCE528735753DE6194127291AA6D3FD72
25,711,471 UART: Caliptra RT
25,712,177 UART: [state] CFI Enabled
25,877,359 UART: [rt] RT listening for mailbox commands...
25,908,581 UART: [rt]cmd =0xaabbccdd, len=4
25,909,976 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,382,524 ready_for_fw is high
3,382,969 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,084,085 >>> mbox cmd response: success
14,085,205 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,366,260 UART:
18,366,818 UART: Running Caliptra FMC ...
18,367,948 UART:
18,368,111 UART: [state] CFI Enabled
18,431,774 UART: [fht] FMC Alias Private Key: 7
20,195,509 UART: [art] Extend RT PCRs Done
20,196,735 UART: [art] Lock RT PCRs Done
20,198,498 UART: [art] Populate DV Done
20,203,853 UART: [fht] FMC Alias Private Key: 7
20,205,503 UART: [art] Derive CDI
20,206,319 UART: [art] Store in in slot 0x4
20,264,243 UART: [art] Derive Key Pair
20,265,274 UART: [art] Store priv key in slot 0x5
22,728,057 UART: [art] Derive Key Pair - Done
22,741,005 UART: [art] Signing Cert with AUTHO
22,742,323 UART: RITY.KEYID = 7
24,453,622 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,130 UART: [art] PUB.X = 3B446243000BD3F88637681F127177C179D7F3E5D58363FE1C61BDC53ED78685316F7C0DBE1E97B0E4B5EBAFA0339A49
24,462,370 UART: [art] PUB.Y = D3399D8158CB7412E0F60E2BF8CCC2CBA81CC3D5B284186F38172A68CC1C65AE78C3A3EF0353775F892C045CFA9C9840
24,469,669 UART: [art] SIG.R = 04A54F69E0CA1B1F5D67D8884867816293F07E7BF1D6A93A5941A65704D6887B90FA0777A353A589CB12BFBA3CDA75AC
24,477,009 UART: [art] SIG.S = C6322C61B12F003361A81CA46BFBE2EDC5029B7B2625B71B13DCF2D117714F5F99A9B192D3F70CC030DE0EC2C3D1E643
25,456,130 UART: Caliptra RT
25,456,851 UART: [state] CFI Enabled
25,620,492 UART: [rt] RT listening for mailbox commands...
25,651,573 UART: [rt]cmd =0xaabbccdd, len=4
25,652,939 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,798 writing to cptra_bootfsm_go
192,912 UART:
193,296 UART: Running Caliptra ROM ...
194,393 UART:
603,847 UART: [state] CFI Enabled
616,446 UART: [state] LifecycleState = Unprovisioned
618,253 UART: [state] DebugLocked = No
619,507 UART: [state] WD Timer not started. Device not locked for debugging
623,628 UART: [kat] SHA2-256
802,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,375 UART: [kat] ++
814,924 UART: [kat] sha1
825,452 UART: [kat] SHA2-256
828,459 UART: [kat] SHA2-384
833,592 UART: [kat] SHA2-512-ACC
836,525 UART: [kat] ECC-384
3,279,837 UART: [kat] HMAC-384Kdf
3,291,369 UART: [kat] LMS
3,820,837 UART: [kat] --
3,824,360 UART: [cold-reset] ++
3,826,648 UART: [fht] FHT @ 0x50003400
3,837,623 UART: [idev] ++
3,838,182 UART: [idev] CDI.KEYID = 6
3,839,098 UART: [idev] SUBJECT.KEYID = 7
3,840,275 UART: [idev] UDS.KEYID = 0
3,841,202 ready_for_fw is high
3,841,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,816 UART: [idev] Erasing UDS.KEYID = 0
6,313,027 UART: [idev] Sha1 KeyId Algorithm
6,334,930 UART: [idev] --
6,338,918 UART: [ldev] ++
6,339,489 UART: [ldev] CDI.KEYID = 6
6,340,404 UART: [ldev] SUBJECT.KEYID = 5
6,341,562 UART: [ldev] AUTHORITY.KEYID = 7
6,342,790 UART: [ldev] FE.KEYID = 1
6,353,380 UART: [ldev] Erasing FE.KEYID = 1
8,823,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,800 UART: [ldev] --
10,616,154 UART: [fwproc] Wait for Commands...
10,617,735 UART: [fwproc] Recv command 0x46574c44
10,619,839 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,897 >>> mbox cmd response: success
14,485,437 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,488,655 UART: [afmc] ++
14,489,239 UART: [afmc] CDI.KEYID = 6
14,490,153 UART: [afmc] SUBJECT.KEYID = 7
14,491,319 UART: [afmc] AUTHORITY.KEYID = 5
16,989,208 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,878 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,656 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,650 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,544 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,252 UART: [afmc] --
18,785,369 UART: [cold-reset] --
18,788,956 UART: [state] Locking Datavault
18,794,955 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,657 UART: [state] Locking ICCM
18,798,376 UART: [exit] Launching FMC @ 0x40000130
18,806,772 UART:
18,807,005 UART: Running Caliptra FMC ...
18,808,112 UART:
18,808,276 UART: [state] CFI Enabled
18,816,498 UART: [fht] FMC Alias Private Key: 7
20,573,145 UART: [art] Extend RT PCRs Done
20,574,368 UART: [art] Lock RT PCRs Done
20,576,068 UART: [art] Populate DV Done
20,581,483 UART: [fht] FMC Alias Private Key: 7
20,583,094 UART: [art] Derive CDI
20,583,916 UART: [art] Store in in slot 0x4
20,626,783 UART: [art] Derive Key Pair
20,627,822 UART: [art] Store priv key in slot 0x5
23,054,408 UART: [art] Derive Key Pair - Done
23,067,728 UART: [art] Signing Cert with AUTHO
23,069,030 UART: RITY.KEYID = 7
24,774,724 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,242 UART: [art] PUB.X = D612BFC55132FDAB10912E2D09A8957218B3F263902E9A78B7FACCDEBAE8C19EE068E432B1DA897FBAEEF0ED279EA416
24,783,548 UART: [art] PUB.Y = 99AE21236F0D0A40144FE9F757B0921F022202B5477E5237611E346445EB90CAB0C651D4F3439C9358BF2DE62748613A
24,790,780 UART: [art] SIG.R = 958D39C4C9377854AB930420DA35AE19E9F57F1BCB3D2313086226070B3F637DFDC0241367A3667C02EEFAA3A5B7577B
24,798,177 UART: [art] SIG.S = 04EA9CD22C422B85D9EE99011D3DE8E50E8A63EA7F58FED99A54F6CE493935555B56EE417CB3ED68BF8CBD1CF11B547D
25,777,678 UART: Caliptra RT
25,778,368 UART: [state] CFI Enabled
25,895,785 UART: [rt] RT listening for mailbox commands...
25,927,113 UART: [rt]cmd =0xaabbccdd, len=4
25,928,474 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,682 writing to cptra_bootfsm_go
3,692,336 ready_for_fw is high
3,692,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,250,657 >>> mbox cmd response: success
14,251,309 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,500,456 UART:
18,500,870 UART: Running Caliptra FMC ...
18,502,009 UART:
18,502,173 UART: [state] CFI Enabled
18,509,801 UART: [fht] FMC Alias Private Key: 7
20,266,822 UART: [art] Extend RT PCRs Done
20,268,066 UART: [art] Lock RT PCRs Done
20,269,509 UART: [art] Populate DV Done
20,274,656 UART: [fht] FMC Alias Private Key: 7
20,276,397 UART: [art] Derive CDI
20,277,200 UART: [art] Store in in slot 0x4
20,319,376 UART: [art] Derive Key Pair
20,320,383 UART: [art] Store priv key in slot 0x5
22,746,953 UART: [art] Derive Key Pair - Done
22,760,110 UART: [art] Signing Cert with AUTHO
22,761,446 UART: RITY.KEYID = 7
24,466,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,080 UART: [art] PUB.X = 6F57788730496F2C9FECB9E5DA5596D4728224C15A4D0FB74D345CBADCBC85647927C473286F74CA74A30EA4176F3CF0
24,475,332 UART: [art] PUB.Y = B303CFAF85D00AE9D9B532A517887A86C8C76CFF1FE6F946BFD790529C3880E378900833F29C36EDC0E2207235E0A9F1
24,482,588 UART: [art] SIG.R = 1D222FE33A86FDF65C89093FA179D820C9B9427631915CFF5AEA19CED9DB42F55A92608B6C758BA1314D806D950A415C
24,489,982 UART: [art] SIG.S = D5F6E9B35834A8D4694FF3AAFD0F8439285A1783198095A9CD3F3CBC74652B1917D8671059E9F2325B0DEEE8C67DB086
25,469,664 UART: Caliptra RT
25,470,365 UART: [state] CFI Enabled
25,587,813 UART: [rt] RT listening for mailbox commands...
25,619,174 UART: [rt]cmd =0xaabbccdd, len=4
25,620,515 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,046 UART:
192,417 UART: Running Caliptra ROM ...
193,610 UART:
193,767 UART: [state] CFI Enabled
265,101 UART: [state] LifecycleState = Unprovisioned
267,447 UART: [state] DebugLocked = No
269,190 UART: [state] WD Timer not started. Device not locked for debugging
273,730 UART: [kat] SHA2-256
463,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,420 UART: [kat] ++
474,896 UART: [kat] sha1
485,630 UART: [kat] SHA2-256
488,648 UART: [kat] SHA2-384
494,073 UART: [kat] SHA2-512-ACC
496,659 UART: [kat] ECC-384
2,949,316 UART: [kat] HMAC-384Kdf
2,972,504 UART: [kat] LMS
3,504,283 UART: [kat] --
3,509,721 UART: [cold-reset] ++
3,510,948 UART: [fht] FHT @ 0x50003400
3,522,591 UART: [idev] ++
3,523,309 UART: [idev] CDI.KEYID = 6
3,524,224 UART: [idev] SUBJECT.KEYID = 7
3,525,401 UART: [idev] UDS.KEYID = 0
3,526,324 ready_for_fw is high
3,526,529 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,122 UART: [idev] Erasing UDS.KEYID = 0
6,032,969 UART: [idev] Sha1 KeyId Algorithm
6,054,948 UART: [idev] --
6,059,404 UART: [ldev] ++
6,060,096 UART: [ldev] CDI.KEYID = 6
6,061,012 UART: [ldev] SUBJECT.KEYID = 5
6,062,175 UART: [ldev] AUTHORITY.KEYID = 7
6,063,352 UART: [ldev] FE.KEYID = 1
6,101,871 UART: [ldev] Erasing FE.KEYID = 1
8,603,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,067 UART: [ldev] --
10,417,033 UART: [fwproc] Wait for Commands...
10,419,785 UART: [fwproc] Recv command 0x46574c44
10,422,092 UART: [fwproc] Recv'd Img size: 114168 bytes
13,873,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,157 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,606,887 >>> mbox cmd response: success
14,607,390 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,610,603 UART: [afmc] ++
14,611,300 UART: [afmc] CDI.KEYID = 6
14,612,462 UART: [afmc] SUBJECT.KEYID = 7
14,613,967 UART: [afmc] AUTHORITY.KEYID = 5
17,149,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,895,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,897,356 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,912,562 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,927,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,942,699 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,103 UART: [afmc] --
18,969,022 UART: [cold-reset] --
18,971,978 UART: [state] Locking Datavault
18,978,428 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,580 UART: [state] Locking ICCM
18,983,605 UART: [exit] Launching FMC @ 0x40000130
18,992,283 UART:
18,992,521 UART: Running Caliptra FMC ...
18,993,622 UART:
18,993,798 UART: [state] CFI Enabled
19,052,357 UART: [fht] FMC Alias Private Key: 7
20,815,954 UART: [art] Extend RT PCRs Done
20,817,178 UART: [art] Lock RT PCRs Done
20,819,026 UART: [art] Populate DV Done
20,824,335 UART: [fht] FMC Alias Private Key: 7
20,825,978 UART: [art] Derive CDI
20,826,788 UART: [art] Store in in slot 0x4
20,884,238 UART: [art] Derive Key Pair
20,885,273 UART: [art] Store priv key in slot 0x5
23,348,101 UART: [art] Derive Key Pair - Done
23,361,322 UART: [art] Signing Cert with AUTHO
23,362,633 UART: RITY.KEYID = 7
25,073,337 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,852 UART: [art] PUB.X = B967F72032ADE345369ABB7635DF5F339046AE9CE70CE56C572FE5DA4653A0273BECEFCD3D79E262E7778756DE68D572
25,082,098 UART: [art] PUB.Y = 754E379A7DF1FA72049A39BDC371AF372DCF31491327021F61C1EBC62D57B2557EB106C681F18942E5FFA6A124020C48
25,089,332 UART: [art] SIG.R = 32F668D7209A95D89E1E0DE3C6F39C01824371860C303D171DBB0B428E51D6EF3553E90EBCC1230A548717F0E4EB23BD
25,096,748 UART: [art] SIG.S = 7127140B17B11D3D4AECEAE34006A13904E72CB45FB29C512C468A244EBAD82CBBCB401B72043A16C5330DDE5AF366C4
26,075,423 UART: Caliptra RT
26,076,112 UART: [state] CFI Enabled
26,241,128 UART: [rt] RT listening for mailbox commands...
26,272,382 UART: [rt]cmd =0xaabbccdd, len=4
26,273,831 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,426,148 ready_for_fw is high
3,426,542 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,725,984 >>> mbox cmd response: success
14,726,712 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,035,915 UART:
19,036,311 UART: Running Caliptra FMC ...
19,037,425 UART:
19,037,583 UART: [state] CFI Enabled
19,100,526 UART: [fht] FMC Alias Private Key: 7
20,864,374 UART: [art] Extend RT PCRs Done
20,865,599 UART: [art] Lock RT PCRs Done
20,867,140 UART: [art] Populate DV Done
20,872,514 UART: [fht] FMC Alias Private Key: 7
20,874,231 UART: [art] Derive CDI
20,875,015 UART: [art] Store in in slot 0x4
20,932,689 UART: [art] Derive Key Pair
20,933,685 UART: [art] Store priv key in slot 0x5
23,397,843 UART: [art] Derive Key Pair - Done
23,410,962 UART: [art] Signing Cert with AUTHO
23,412,280 UART: RITY.KEYID = 7
25,122,808 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,316 UART: [art] PUB.X = D0603F3E96E314F1A17E3E9B3B28A53E9CDFB53B983FBA115BC21F6A6945F166C914413F637E62D56F67E14B7F7F09EE
25,131,574 UART: [art] PUB.Y = AFAC348CBE1F8031650D05243BAB542091E66C70F8BE7EEED07A3A276B7FA441CE5E266D25A758F425B92B4194E36B1F
25,138,816 UART: [art] SIG.R = 84902753CA738A86736B6A01728DEBE41AA1AE1F8825FFF4E4A59548DC0EE17284C49FB7028989C5E89FB3A4B7D9808C
25,146,215 UART: [art] SIG.S = 030F1FEFE4F2FDC31E2CD8F4DC48D7DE13790C24E137D1136148D587C62ED51E5D60A7C3E0607C7D3E7D615B9871CDC3
26,124,562 UART: Caliptra RT
26,125,272 UART: [state] CFI Enabled
26,291,257 UART: [rt] RT listening for mailbox commands...
26,322,390 UART: [rt]cmd =0xaabbccdd, len=4
26,323,726 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,942 writing to cptra_bootfsm_go
193,060 UART:
193,425 UART: Running Caliptra ROM ...
194,519 UART:
604,342 UART: [state] CFI Enabled
615,966 UART: [state] LifecycleState = Unprovisioned
618,387 UART: [state] DebugLocked = No
620,263 UART: [state] WD Timer not started. Device not locked for debugging
625,087 UART: [kat] SHA2-256
815,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,750 UART: [kat] ++
826,271 UART: [kat] sha1
838,417 UART: [kat] SHA2-256
841,429 UART: [kat] SHA2-384
848,269 UART: [kat] SHA2-512-ACC
850,857 UART: [kat] ECC-384
3,291,437 UART: [kat] HMAC-384Kdf
3,304,231 UART: [kat] LMS
3,836,056 UART: [kat] --
3,839,055 UART: [cold-reset] ++
3,841,221 UART: [fht] FHT @ 0x50003400
3,853,121 UART: [idev] ++
3,853,827 UART: [idev] CDI.KEYID = 6
3,854,859 UART: [idev] SUBJECT.KEYID = 7
3,855,963 UART: [idev] UDS.KEYID = 0
3,856,890 ready_for_fw is high
3,857,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,440 UART: [idev] Erasing UDS.KEYID = 0
6,335,123 UART: [idev] Sha1 KeyId Algorithm
6,358,674 UART: [idev] --
6,365,098 UART: [ldev] ++
6,365,780 UART: [ldev] CDI.KEYID = 6
6,366,796 UART: [ldev] SUBJECT.KEYID = 5
6,367,898 UART: [ldev] AUTHORITY.KEYID = 7
6,369,130 UART: [ldev] FE.KEYID = 1
6,379,302 UART: [ldev] Erasing FE.KEYID = 1
8,857,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,623 UART: [ldev] --
10,651,641 UART: [fwproc] Wait for Commands...
10,654,379 UART: [fwproc] Recv command 0x46574c44
10,656,633 UART: [fwproc] Recv'd Img size: 114168 bytes
14,103,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,447 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,730 >>> mbox cmd response: success
14,839,238 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,843,105 UART: [afmc] ++
14,843,800 UART: [afmc] CDI.KEYID = 6
14,844,927 UART: [afmc] SUBJECT.KEYID = 7
14,846,472 UART: [afmc] AUTHORITY.KEYID = 5
17,347,139 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,504 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,681 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,828 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,740 UART: [afmc] --
19,143,550 UART: [cold-reset] --
19,145,745 UART: [state] Locking Datavault
19,150,732 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,932 UART: [state] Locking ICCM
19,154,490 UART: [exit] Launching FMC @ 0x40000130
19,163,162 UART:
19,163,400 UART: Running Caliptra FMC ...
19,164,527 UART:
19,164,688 UART: [state] CFI Enabled
19,173,064 UART: [fht] FMC Alias Private Key: 7
20,929,966 UART: [art] Extend RT PCRs Done
20,931,194 UART: [art] Lock RT PCRs Done
20,932,793 UART: [art] Populate DV Done
20,938,210 UART: [fht] FMC Alias Private Key: 7
20,939,946 UART: [art] Derive CDI
20,940,688 UART: [art] Store in in slot 0x4
20,983,346 UART: [art] Derive Key Pair
20,984,344 UART: [art] Store priv key in slot 0x5
23,411,355 UART: [art] Derive Key Pair - Done
23,424,567 UART: [art] Signing Cert with AUTHO
23,425,891 UART: RITY.KEYID = 7
25,131,345 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,852 UART: [art] PUB.X = F3A0EC3E424CDF6FF86C2D8B74AF432BB9D3BBFFB0463F0DCA201352A37F778FB5E048E91A0B0F0466DB3D863586FEB0
25,140,168 UART: [art] PUB.Y = 5B5D47DFDBF8F644EB67C99C88520E4A1457A5C19E212FDE970AAD35BFCF3BC971FD9DBF5139E15DBEF76631D576A239
25,147,454 UART: [art] SIG.R = 14DCAEBEDEDEAD91E01A493470A91EE755E45464C38B9E3A21F889EDDCE992D3F694FC620C9257D0110BBB47E5BE65F1
25,154,852 UART: [art] SIG.S = 6913C1DB29DA2352F934BBB4BB383BF99D44422FD9F5AA4774655AEDC89C333B6067D4BFAFD40F34CDE36D975F618B6A
26,133,391 UART: Caliptra RT
26,134,095 UART: [state] CFI Enabled
26,250,471 UART: [rt] RT listening for mailbox commands...
26,281,898 UART: [rt]cmd =0xaabbccdd, len=4
26,283,188 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
3,761,304 ready_for_fw is high
3,761,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,944,517 >>> mbox cmd response: success
14,945,174 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,200,496 UART:
19,200,894 UART: Running Caliptra FMC ...
19,202,019 UART:
19,202,185 UART: [state] CFI Enabled
19,210,356 UART: [fht] FMC Alias Private Key: 7
20,966,808 UART: [art] Extend RT PCRs Done
20,968,033 UART: [art] Lock RT PCRs Done
20,969,671 UART: [art] Populate DV Done
20,975,196 UART: [fht] FMC Alias Private Key: 7
20,976,689 UART: [art] Derive CDI
20,977,454 UART: [art] Store in in slot 0x4
21,020,324 UART: [art] Derive Key Pair
21,021,369 UART: [art] Store priv key in slot 0x5
23,447,945 UART: [art] Derive Key Pair - Done
23,460,943 UART: [art] Signing Cert with AUTHO
23,462,259 UART: RITY.KEYID = 7
25,168,186 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,691 UART: [art] PUB.X = EEF7552847862F580775C8C249C8F3ADE762936684AC3089ECC4B81534233A265F380168D8CF6CC75BF9D12A3A7057D3
25,176,937 UART: [art] PUB.Y = 99A02445AA98B0059D23048BBADA482B35CCAC6ABD1F8680A19F8E87386553748B4F865EC305363DF636B4EDBDE48575
25,184,169 UART: [art] SIG.R = D25C0588A0760E105822BB5EE7D1FD441E72C43D4BB1D8E8BFFAB615CE34BA36F030EF5CE218F178179F732C2C727E00
25,191,567 UART: [art] SIG.S = BF0D46955FF74F2F6BA564F0E9FF74A964F488D5EEA04EE8CA4E8A4643732767D1435EB0AE32BB2EF95D3C5F734F8744
26,170,587 UART: Caliptra RT
26,171,299 UART: [state] CFI Enabled
26,289,019 UART: [rt] RT listening for mailbox commands...
26,320,281 UART: [rt]cmd =0xaabbccdd, len=4
26,321,839 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Unprovisioned
86,091 UART: [state] DebugLocked = No
86,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,421 UART: [kat] SHA2-256
882,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,467 UART: [kat] ++
886,619 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,316 UART: [kat] SHA2-512-ACC
897,217 UART: [kat] ECC-384
902,992 UART: [kat] HMAC-384Kdf
907,628 UART: [kat] LMS
1,475,824 UART: [kat] --
1,476,643 UART: [cold-reset] ++
1,477,119 UART: [fht] Storing FHT @ 0x50003400
1,480,038 UART: [idev] ++
1,480,206 UART: [idev] CDI.KEYID = 6
1,480,566 UART: [idev] SUBJECT.KEYID = 7
1,480,990 UART: [idev] UDS.KEYID = 0
1,481,335 ready_for_fw is high
1,481,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,968 UART: [idev] Erasing UDS.KEYID = 0
1,505,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,082 UART: [idev] --
1,514,987 UART: [ldev] ++
1,515,155 UART: [ldev] CDI.KEYID = 6
1,515,518 UART: [ldev] SUBJECT.KEYID = 5
1,515,944 UART: [ldev] AUTHORITY.KEYID = 7
1,516,407 UART: [ldev] FE.KEYID = 1
1,521,409 UART: [ldev] Erasing FE.KEYID = 1
1,547,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,304 UART: [ldev] --
1,586,629 UART: [fwproc] Waiting for Commands...
1,587,446 UART: [fwproc] Received command 0x46574c44
1,588,237 UART: [fwproc] Received Image of size 114168 bytes
2,885,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,009 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,098 >>> mbox cmd response: success
3,078,098 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,079,340 UART: [afmc] ++
3,079,508 UART: [afmc] CDI.KEYID = 6
3,079,870 UART: [afmc] SUBJECT.KEYID = 7
3,080,295 UART: [afmc] AUTHORITY.KEYID = 5
3,115,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,184 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,964 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,692 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,577 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,267 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,104 UART: [afmc] --
3,158,164 UART: [cold-reset] --
3,158,884 UART: [state] Locking Datavault
3,160,009 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,613 UART: [state] Locking ICCM
3,161,177 UART: [exit] Launching FMC @ 0x40000130
3,166,506 UART:
3,166,522 UART: Running Caliptra FMC ...
3,166,930 UART:
3,166,984 UART: [state] CFI Enabled
3,177,313 UART: [fht] FMC Alias Private Key: 7
3,285,236 UART: [art] Extend RT PCRs Done
3,285,664 UART: [art] Lock RT PCRs Done
3,287,072 UART: [art] Populate DV Done
3,295,299 UART: [fht] FMC Alias Private Key: 7
3,296,389 UART: [art] Derive CDI
3,296,669 UART: [art] Store in in slot 0x4
3,382,028 UART: [art] Derive Key Pair
3,382,388 UART: [art] Store priv key in slot 0x5
3,395,322 UART: [art] Derive Key Pair - Done
3,410,139 UART: [art] Signing Cert with AUTHO
3,410,619 UART: RITY.KEYID = 7
3,426,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,886 UART: [art] PUB.X = C746A8997F6CD711F9EAF0A051B1A785BE2F29048426A6AD01D788BB296234AF754BBA89482A7B6C57ECDFBF7125CAB0
3,433,664 UART: [art] PUB.Y = CF07FDC21FA3E34AF6BCBF6D233FE7EE3086DE2615D0794A53C95632E43BD02DC1936E99A46511C36B46065696803686
3,440,612 UART: [art] SIG.R = 19E1B8869C26FE7223F8CF7EABFA80993A527E883C13117983F58247DEA18DE514757897FA8C9C77D568E75DED033A82
3,447,381 UART: [art] SIG.S = BCFF75C2158869130E4ED958E72B93D928DEBDD708AFA033DDBA075C9A31DC73E7054341BE5A74A79C4E4523575B7787
3,471,472 UART: Caliptra RT
3,471,725 UART: [state] CFI Enabled
3,580,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,392 UART: [rt]cmd =0xaabbccdd, len=4
3,612,432 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,057 ready_for_fw is high
1,362,057 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,572 >>> mbox cmd response: success
2,925,572 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,987,598 UART:
2,987,614 UART: Running Caliptra FMC ...
2,988,022 UART:
2,988,076 UART: [state] CFI Enabled
2,998,837 UART: [fht] FMC Alias Private Key: 7
3,106,652 UART: [art] Extend RT PCRs Done
3,107,080 UART: [art] Lock RT PCRs Done
3,108,810 UART: [art] Populate DV Done
3,116,991 UART: [fht] FMC Alias Private Key: 7
3,117,965 UART: [art] Derive CDI
3,118,245 UART: [art] Store in in slot 0x4
3,203,952 UART: [art] Derive Key Pair
3,204,312 UART: [art] Store priv key in slot 0x5
3,217,876 UART: [art] Derive Key Pair - Done
3,232,655 UART: [art] Signing Cert with AUTHO
3,233,135 UART: RITY.KEYID = 7
3,248,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,912 UART: [art] PUB.X = 127C22663C25E7C02858971D836AE82065D428F541014648232F8C333D5E95E0937428E4DDF89DF27552A06A3FD9CB7A
3,255,671 UART: [art] PUB.Y = 4F5234D1A0948C8082A8C54B752936721AE73DDF539918632AC0BA8B6372E79622F720173817D67587BF52FBD45B7892
3,262,611 UART: [art] SIG.R = 8298B475B4A5D4652A8D77923395D6EE1A330EFB16BA640F09D12FB92A2CEC3C5241AA7E92165519792A147F3E3DECBE
3,269,380 UART: [art] SIG.S = 0B3384CC191A3592E80C869EB91F2556A052623471C40880672859096575CBE4EE3EEABE5D845D7C920DE47990D1449D
3,292,960 UART: Caliptra RT
3,293,213 UART: [state] CFI Enabled
3,401,406 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,770 UART: [rt]cmd =0xaabbccdd, len=4
3,432,730 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,402 UART: [kat] SHA2-256
882,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,448 UART: [kat] ++
886,600 UART: [kat] sha1
890,774 UART: [kat] SHA2-256
892,712 UART: [kat] SHA2-384
895,439 UART: [kat] SHA2-512-ACC
897,340 UART: [kat] ECC-384
902,403 UART: [kat] HMAC-384Kdf
906,985 UART: [kat] LMS
1,475,181 UART: [kat] --
1,475,914 UART: [cold-reset] ++
1,476,404 UART: [fht] Storing FHT @ 0x50003400
1,479,203 UART: [idev] ++
1,479,371 UART: [idev] CDI.KEYID = 6
1,479,731 UART: [idev] SUBJECT.KEYID = 7
1,480,155 UART: [idev] UDS.KEYID = 0
1,480,500 ready_for_fw is high
1,480,500 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,583 UART: [idev] Erasing UDS.KEYID = 0
1,505,169 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,514,934 UART: [ldev] ++
1,515,102 UART: [ldev] CDI.KEYID = 6
1,515,465 UART: [ldev] SUBJECT.KEYID = 5
1,515,891 UART: [ldev] AUTHORITY.KEYID = 7
1,516,354 UART: [ldev] FE.KEYID = 1
1,521,580 UART: [ldev] Erasing FE.KEYID = 1
1,547,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,403 UART: [ldev] --
1,586,744 UART: [fwproc] Waiting for Commands...
1,587,503 UART: [fwproc] Received command 0x46574c44
1,588,294 UART: [fwproc] Received Image of size 114168 bytes
2,884,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,383 >>> mbox cmd response: success
3,076,383 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,077,479 UART: [afmc] ++
3,077,647 UART: [afmc] CDI.KEYID = 6
3,078,009 UART: [afmc] SUBJECT.KEYID = 7
3,078,434 UART: [afmc] AUTHORITY.KEYID = 5
3,113,505 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,623 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,403 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,016 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,706 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,591 UART: [afmc] --
3,156,541 UART: [cold-reset] --
3,157,195 UART: [state] Locking Datavault
3,158,372 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,976 UART: [state] Locking ICCM
3,159,514 UART: [exit] Launching FMC @ 0x40000130
3,164,843 UART:
3,164,859 UART: Running Caliptra FMC ...
3,165,267 UART:
3,165,410 UART: [state] CFI Enabled
3,176,283 UART: [fht] FMC Alias Private Key: 7
3,283,792 UART: [art] Extend RT PCRs Done
3,284,220 UART: [art] Lock RT PCRs Done
3,285,942 UART: [art] Populate DV Done
3,294,019 UART: [fht] FMC Alias Private Key: 7
3,295,163 UART: [art] Derive CDI
3,295,443 UART: [art] Store in in slot 0x4
3,381,338 UART: [art] Derive Key Pair
3,381,698 UART: [art] Store priv key in slot 0x5
3,395,200 UART: [art] Derive Key Pair - Done
3,410,078 UART: [art] Signing Cert with AUTHO
3,410,558 UART: RITY.KEYID = 7
3,426,164 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,929 UART: [art] PUB.X = AFC4D139C31FC70777F7A3D9C831EC4B1F4326FBE726F6C4449A46B795222DF9C2143D63D9AD9F744E6B44698461A974
3,433,700 UART: [art] PUB.Y = 8587DC5C88CE4A27E9F4A4F4622F15DA3A7142759199F96055796F0D20A4B0970F5061E7DDDA51F28D22722DE521B3E3
3,440,644 UART: [art] SIG.R = C3F00B53F355E2BBF33162191C1412BE072DEF08058E3F5FE43A5B0BC51CB01333A26F0D2D66F41E654C35DE14E88D45
3,447,404 UART: [art] SIG.S = 5BE1858A1CAAA91451D9AF344C37634FD886902A2503856E42859D3007E036B1900044D9ED6471694A4651F33B993ABF
3,471,415 UART: Caliptra RT
3,471,760 UART: [state] CFI Enabled
3,578,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,067 UART: [rt]cmd =0xaabbccdd, len=4
3,609,903 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,152 ready_for_fw is high
1,363,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,767 >>> mbox cmd response: success
2,927,767 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,989,123 UART:
2,989,139 UART: Running Caliptra FMC ...
2,989,547 UART:
2,989,690 UART: [state] CFI Enabled
3,000,491 UART: [fht] FMC Alias Private Key: 7
3,108,358 UART: [art] Extend RT PCRs Done
3,108,786 UART: [art] Lock RT PCRs Done
3,110,212 UART: [art] Populate DV Done
3,118,597 UART: [fht] FMC Alias Private Key: 7
3,119,611 UART: [art] Derive CDI
3,119,891 UART: [art] Store in in slot 0x4
3,205,674 UART: [art] Derive Key Pair
3,206,034 UART: [art] Store priv key in slot 0x5
3,218,996 UART: [art] Derive Key Pair - Done
3,233,710 UART: [art] Signing Cert with AUTHO
3,234,190 UART: RITY.KEYID = 7
3,249,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,599 UART: [art] PUB.X = 6C52B5A2BFF3324DE481EA8A60F639AEF07268AD8E1B8554E424D9BE0188A3683C7D002DA7718BB87416ABD16131F280
3,257,350 UART: [art] PUB.Y = 565174625AB62EA96274D19236192B284A1414F01107F89AA8A17022A082A55EB77C10CE528FF768F6C34CAE13DEFD21
3,264,295 UART: [art] SIG.R = 1E165072FD3E62AA36A449D190C319D99B4BD7CD3663C3ED91DD843A263EA8D185382988436EFAF63DB46E51CCE5E1F2
3,271,075 UART: [art] SIG.S = 8D23232C9E5843732A9033ABE3BD27AA4918DA25553C031EE97C0A4FB99D04F0CBCF5420C5D9A8A3330D5C0714169367
3,294,815 UART: Caliptra RT
3,295,160 UART: [state] CFI Enabled
3,404,131 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,765 UART: [rt]cmd =0xaabbccdd, len=4
3,435,689 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,642 UART: [state] LifecycleState = Unprovisioned
86,297 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,222 UART: [kat] SHA2-256
893,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,997 UART: [kat] ++
898,149 UART: [kat] sha1
902,453 UART: [kat] SHA2-256
904,393 UART: [kat] SHA2-384
907,034 UART: [kat] SHA2-512-ACC
908,935 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
922,826 UART: [kat] LMS
1,171,154 UART: [kat] --
1,171,975 UART: [cold-reset] ++
1,172,485 UART: [fht] FHT @ 0x50003400
1,175,212 UART: [idev] ++
1,175,380 UART: [idev] CDI.KEYID = 6
1,175,740 UART: [idev] SUBJECT.KEYID = 7
1,176,164 UART: [idev] UDS.KEYID = 0
1,176,509 ready_for_fw is high
1,176,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,780 UART: [idev] Erasing UDS.KEYID = 0
1,201,405 UART: [idev] Sha1 KeyId Algorithm
1,209,743 UART: [idev] --
1,210,669 UART: [ldev] ++
1,210,837 UART: [ldev] CDI.KEYID = 6
1,211,200 UART: [ldev] SUBJECT.KEYID = 5
1,211,626 UART: [ldev] AUTHORITY.KEYID = 7
1,212,089 UART: [ldev] FE.KEYID = 1
1,217,247 UART: [ldev] Erasing FE.KEYID = 1
1,243,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,697 UART: [ldev] --
1,283,162 UART: [fwproc] Wait for Commands...
1,283,852 UART: [fwproc] Recv command 0x46574c44
1,284,580 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,546 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,509 >>> mbox cmd response: success
2,773,509 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,774,617 UART: [afmc] ++
2,774,785 UART: [afmc] CDI.KEYID = 6
2,775,147 UART: [afmc] SUBJECT.KEYID = 7
2,775,572 UART: [afmc] AUTHORITY.KEYID = 5
2,811,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,290 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,018 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,903 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,622 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,370 UART: [afmc] --
2,854,348 UART: [cold-reset] --
2,855,126 UART: [state] Locking Datavault
2,856,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,023 UART: [state] Locking ICCM
2,857,497 UART: [exit] Launching FMC @ 0x40000130
2,862,826 UART:
2,862,842 UART: Running Caliptra FMC ...
2,863,250 UART:
2,863,304 UART: [state] CFI Enabled
2,873,807 UART: [fht] FMC Alias Private Key: 7
2,981,896 UART: [art] Extend RT PCRs Done
2,982,324 UART: [art] Lock RT PCRs Done
2,983,882 UART: [art] Populate DV Done
2,992,073 UART: [fht] FMC Alias Private Key: 7
2,993,107 UART: [art] Derive CDI
2,993,387 UART: [art] Store in in slot 0x4
3,078,874 UART: [art] Derive Key Pair
3,079,234 UART: [art] Store priv key in slot 0x5
3,092,086 UART: [art] Derive Key Pair - Done
3,106,637 UART: [art] Signing Cert with AUTHO
3,107,117 UART: RITY.KEYID = 7
3,122,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,136 UART: [art] PUB.X = 35C18E3FBA104FA4460BF9D7A125A5A5BB064B6DB10F96690D08B4F38D3259E7D767E7A5A3E809967EC6560E9EDA0D90
3,129,892 UART: [art] PUB.Y = 6D01C19DA8A0F247B510E0A127DBE334094BC9868E035A4676FAC9D6B1093CE437B8A3BA04F8F51C69C2FCF5C2506C17
3,136,837 UART: [art] SIG.R = 703F937FA0B840E72C6F549376AC3C30C6C09FC05A51F8407D59D9C91406C320C968BC34DAA80D4BAF012B73A8E360EC
3,143,606 UART: [art] SIG.S = 13A012E12A119A77E568A83A14DB73C4CB744C3FBAE698E45BE0D28E2BE6CA016AD85D3372803212ABFB6BB6E45F2B84
3,167,580 UART: Caliptra RT
3,167,833 UART: [state] CFI Enabled
3,275,280 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,616 UART: [rt]cmd =0xaabbccdd, len=4
3,306,480 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,071 ready_for_fw is high
1,061,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,682 >>> mbox cmd response: success
2,623,682 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,685,584 UART:
2,685,600 UART: Running Caliptra FMC ...
2,686,008 UART:
2,686,062 UART: [state] CFI Enabled
2,696,649 UART: [fht] FMC Alias Private Key: 7
2,804,136 UART: [art] Extend RT PCRs Done
2,804,564 UART: [art] Lock RT PCRs Done
2,806,226 UART: [art] Populate DV Done
2,814,495 UART: [fht] FMC Alias Private Key: 7
2,815,637 UART: [art] Derive CDI
2,815,917 UART: [art] Store in in slot 0x4
2,901,464 UART: [art] Derive Key Pair
2,901,824 UART: [art] Store priv key in slot 0x5
2,914,658 UART: [art] Derive Key Pair - Done
2,929,366 UART: [art] Signing Cert with AUTHO
2,929,846 UART: RITY.KEYID = 7
2,945,064 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,829 UART: [art] PUB.X = 2651EA4C4901CF11934A799B3B04DBE184F22A5080C1D925FA71DADAC8AE5FC4779BAA27AF75114D10E869A3CCF12BDC
2,952,611 UART: [art] PUB.Y = 556ADCE3D5685F198762C8657AFE9EBE38B505A1B96EFFCBA1198BB69C254F80FB8DAF7E994B1824E0515ED36FF6A007
2,959,571 UART: [art] SIG.R = C61C67E88EBE179DB7B656B2226D98D23C3F51DA6E6A675887B572BFBF4BA44EA0A17F7E490E39B788564287FE1D6EEE
2,966,352 UART: [art] SIG.S = 55B84D0BB1DF1AB45CD77980D6B4AE432A026FB0412619993A2AA3169A7DDB51C84BDF6E77AED9460038511B82C587BD
2,990,417 UART: Caliptra RT
2,990,670 UART: [state] CFI Enabled
3,099,455 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,173 UART: [rt]cmd =0xaabbccdd, len=4
3,131,127 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,896 UART: [kat] SHA2-256
903,836 UART: [kat] SHA2-384
906,693 UART: [kat] SHA2-512-ACC
908,594 UART: [kat] ECC-384
918,373 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,108 UART: [cold-reset] ++
1,172,624 UART: [fht] FHT @ 0x50003400
1,175,247 UART: [idev] ++
1,175,415 UART: [idev] CDI.KEYID = 6
1,175,775 UART: [idev] SUBJECT.KEYID = 7
1,176,199 UART: [idev] UDS.KEYID = 0
1,176,544 ready_for_fw is high
1,176,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,439 UART: [idev] Erasing UDS.KEYID = 0
1,201,084 UART: [idev] Sha1 KeyId Algorithm
1,209,394 UART: [idev] --
1,210,282 UART: [ldev] ++
1,210,450 UART: [ldev] CDI.KEYID = 6
1,210,813 UART: [ldev] SUBJECT.KEYID = 5
1,211,239 UART: [ldev] AUTHORITY.KEYID = 7
1,211,702 UART: [ldev] FE.KEYID = 1
1,216,856 UART: [ldev] Erasing FE.KEYID = 1
1,242,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,526 UART: [ldev] --
1,282,001 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,401 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,282 >>> mbox cmd response: success
2,772,282 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,773,452 UART: [afmc] ++
2,773,620 UART: [afmc] CDI.KEYID = 6
2,773,982 UART: [afmc] SUBJECT.KEYID = 7
2,774,407 UART: [afmc] AUTHORITY.KEYID = 5
2,810,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,977 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,705 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,590 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,099 UART: [afmc] --
2,854,119 UART: [cold-reset] --
2,855,095 UART: [state] Locking Datavault
2,856,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,000 UART: [state] Locking ICCM
2,857,662 UART: [exit] Launching FMC @ 0x40000130
2,862,991 UART:
2,863,007 UART: Running Caliptra FMC ...
2,863,415 UART:
2,863,558 UART: [state] CFI Enabled
2,873,793 UART: [fht] FMC Alias Private Key: 7
2,981,788 UART: [art] Extend RT PCRs Done
2,982,216 UART: [art] Lock RT PCRs Done
2,983,892 UART: [art] Populate DV Done
2,992,055 UART: [fht] FMC Alias Private Key: 7
2,993,167 UART: [art] Derive CDI
2,993,447 UART: [art] Store in in slot 0x4
3,078,946 UART: [art] Derive Key Pair
3,079,306 UART: [art] Store priv key in slot 0x5
3,092,330 UART: [art] Derive Key Pair - Done
3,107,347 UART: [art] Signing Cert with AUTHO
3,107,827 UART: RITY.KEYID = 7
3,122,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,718 UART: [art] PUB.X = 0E563F4CB2A6A91101FF3C27791AA3AE968BBF587E90CFE647963800BC27780F5B5226BE206C133832EE9C0F78AA103A
3,130,460 UART: [art] PUB.Y = 58CB7BD616B63833E44CC20F83A58C2E472659FEBCC0B334E832C599E943877801EC108387BB01A2CC98506BC051BA12
3,137,403 UART: [art] SIG.R = A0A5ACD22A5A6D7B4DFEB62349DA244D60D5F111DF412246925CD2F18FB99A1D0483D4D01BB68DBAE0217AF834BB3548
3,144,186 UART: [art] SIG.S = 0F9B394928B42E5BB727A594503911176A01C9B3476DCEDBB47C60381E814BA9E1264ACB30CC03C3A933DDE5C637986B
3,167,796 UART: Caliptra RT
3,168,141 UART: [state] CFI Enabled
3,276,686 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,214 UART: [rt]cmd =0xaabbccdd, len=4
3,308,134 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,464 ready_for_fw is high
1,060,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,213 >>> mbox cmd response: success
2,626,213 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,688,803 UART:
2,688,819 UART: Running Caliptra FMC ...
2,689,227 UART:
2,689,370 UART: [state] CFI Enabled
2,699,797 UART: [fht] FMC Alias Private Key: 7
2,807,806 UART: [art] Extend RT PCRs Done
2,808,234 UART: [art] Lock RT PCRs Done
2,809,944 UART: [art] Populate DV Done
2,818,183 UART: [fht] FMC Alias Private Key: 7
2,819,271 UART: [art] Derive CDI
2,819,551 UART: [art] Store in in slot 0x4
2,905,514 UART: [art] Derive Key Pair
2,905,874 UART: [art] Store priv key in slot 0x5
2,919,148 UART: [art] Derive Key Pair - Done
2,934,129 UART: [art] Signing Cert with AUTHO
2,934,609 UART: RITY.KEYID = 7
2,949,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,428 UART: [art] PUB.X = 0D1F04EF9835168C987B50AE62D6D09202315C15DD06E60B4477AAA1845C27A46FC173C0EB193F8C9E936BA5AD001F69
2,957,165 UART: [art] PUB.Y = 0E8C817CB4F6A85E65202A83BD45A74C1068387BE972278F4C928D57F4110D0F2377D5AC90E2F245B9D5D194B485FB9F
2,964,108 UART: [art] SIG.R = 3A54A71DA07D640355B307648A062029FBC6855EB949970D6470D8DCFB45BC367C76B74F55AF95685AA19BF2A4ED6FE6
2,970,872 UART: [art] SIG.S = 6D0428DC626350619F4CEE5784076F9CFD27E7615F8FCAC2720A6937CAAA92EC8DB658EA2A805C8A68F02E46F2707E2A
2,994,716 UART: Caliptra RT
2,995,061 UART: [state] CFI Enabled
3,103,194 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,706 UART: [rt]cmd =0xaabbccdd, len=4
3,134,712 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
891,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,687 UART: [kat] ++
895,839 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,770 UART: [kat] HMAC-384Kdf
921,258 UART: [kat] LMS
1,169,570 UART: [kat] --
1,170,519 UART: [cold-reset] ++
1,171,009 UART: [fht] FHT @ 0x50003400
1,173,783 UART: [idev] ++
1,173,951 UART: [idev] CDI.KEYID = 6
1,174,312 UART: [idev] SUBJECT.KEYID = 7
1,174,737 UART: [idev] UDS.KEYID = 0
1,175,083 ready_for_fw is high
1,175,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,793 UART: [idev] Erasing UDS.KEYID = 0
1,199,599 UART: [idev] Sha1 KeyId Algorithm
1,208,631 UART: [idev] --
1,209,790 UART: [ldev] ++
1,209,958 UART: [ldev] CDI.KEYID = 6
1,210,322 UART: [ldev] SUBJECT.KEYID = 5
1,210,749 UART: [ldev] AUTHORITY.KEYID = 7
1,211,212 UART: [ldev] FE.KEYID = 1
1,216,642 UART: [ldev] Erasing FE.KEYID = 1
1,242,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,634 UART: [ldev] --
1,281,996 UART: [fwproc] Wait for Commands...
1,282,765 UART: [fwproc] Recv command 0x46574c44
1,283,498 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,904 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,213 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,753 >>> mbox cmd response: success
2,770,753 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,771,774 UART: [afmc] ++
2,771,942 UART: [afmc] CDI.KEYID = 6
2,772,305 UART: [afmc] SUBJECT.KEYID = 7
2,772,731 UART: [afmc] AUTHORITY.KEYID = 5
2,808,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,591 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,203 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,922 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,677 UART: [afmc] --
2,851,563 UART: [cold-reset] --
2,852,367 UART: [state] Locking Datavault
2,853,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,920 UART: [state] Locking ICCM
2,854,344 UART: [exit] Launching FMC @ 0x40000130
2,859,673 UART:
2,859,689 UART: Running Caliptra FMC ...
2,860,097 UART:
2,860,151 UART: [state] CFI Enabled
2,870,556 UART: [fht] FMC Alias Private Key: 7
2,978,427 UART: [art] Extend RT PCRs Done
2,978,855 UART: [art] Lock RT PCRs Done
2,980,207 UART: [art] Populate DV Done
2,988,356 UART: [fht] FMC Alias Private Key: 7
2,989,450 UART: [art] Derive CDI
2,989,730 UART: [art] Store in in slot 0x4
3,075,227 UART: [art] Derive Key Pair
3,075,587 UART: [art] Store priv key in slot 0x5
3,089,147 UART: [art] Derive Key Pair - Done
3,103,886 UART: [art] Signing Cert with AUTHO
3,104,366 UART: RITY.KEYID = 7
3,119,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,419 UART: [art] PUB.X = 95F512126C4892E120EABFB6A3999A5E2C12C4133EA569F1E9C78C56339547759EA78F5A833CEF4954A3627009641CD1
3,127,182 UART: [art] PUB.Y = AD73507AE0FB48D36B97464ED92056EF34E646F3283CEBB2E6A73BE696559E71074817B8073F94C1C642D12D294651ED
3,134,126 UART: [art] SIG.R = 1E5ED9A85D3DEA820D88A339D7C2C3CCD9F70BF768159DB1304D53BDE864E111EBB4FD18CDE524E39DDDFE8B586C0376
3,140,909 UART: [art] SIG.S = D894A5CE213565BB2660DA4269B5A6E23DCE81BED7C6C4FC70C8386FA59329C5E7CA9F43AE8A8DF3BBDEC6544E6C3FBD
3,164,692 UART: Caliptra RT
3,164,945 UART: [state] CFI Enabled
3,273,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,598 UART: [rt]cmd =0xaabbccdd, len=4
3,304,540 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,488 ready_for_fw is high
1,055,488 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,891 >>> mbox cmd response: success
2,619,891 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,682,205 UART:
2,682,221 UART: Running Caliptra FMC ...
2,682,629 UART:
2,682,683 UART: [state] CFI Enabled
2,693,076 UART: [fht] FMC Alias Private Key: 7
2,800,947 UART: [art] Extend RT PCRs Done
2,801,375 UART: [art] Lock RT PCRs Done
2,802,761 UART: [art] Populate DV Done
2,810,948 UART: [fht] FMC Alias Private Key: 7
2,811,940 UART: [art] Derive CDI
2,812,220 UART: [art] Store in in slot 0x4
2,897,659 UART: [art] Derive Key Pair
2,898,019 UART: [art] Store priv key in slot 0x5
2,911,259 UART: [art] Derive Key Pair - Done
2,926,088 UART: [art] Signing Cert with AUTHO
2,926,568 UART: RITY.KEYID = 7
2,941,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,567 UART: [art] PUB.X = 428AC36B77BD6F210A71A80293C261A501A71E4E9E106FB1DEE888EA47206CEB1207576630A31902F21A79C5977B4827
2,949,318 UART: [art] PUB.Y = 0A1C2F9B604875D05359167F36293E60910F6CB2EE500FF93E49736C6566909DF1E63B66D4A403DCE6B70EFA505D1C3D
2,956,255 UART: [art] SIG.R = 18246D21470AE3257646D239C51873E2E73EA6F2DF11D83606137774B3A01C89BB59E0FBCD9E1568AE9DE676EE23209E
2,963,019 UART: [art] SIG.S = 9306E8F57C1FA203885930021C0AE473295754E8352036F140144721539FFBB23984FC0FD3C2CE58DF84AC96B891483E
2,987,273 UART: Caliptra RT
2,987,526 UART: [state] CFI Enabled
3,094,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,145 UART: [rt]cmd =0xaabbccdd, len=4
3,126,043 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,807 UART: [state] LifecycleState = Unprovisioned
85,462 UART: [state] DebugLocked = No
86,174 UART: [state] WD Timer not started. Device not locked for debugging
87,411 UART: [kat] SHA2-256
890,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,090 UART: [kat] ++
895,242 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,621 UART: [kat] HMAC-384Kdf
920,247 UART: [kat] LMS
1,168,559 UART: [kat] --
1,169,260 UART: [cold-reset] ++
1,169,786 UART: [fht] FHT @ 0x50003400
1,172,620 UART: [idev] ++
1,172,788 UART: [idev] CDI.KEYID = 6
1,173,149 UART: [idev] SUBJECT.KEYID = 7
1,173,574 UART: [idev] UDS.KEYID = 0
1,173,920 ready_for_fw is high
1,173,920 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,215,699 UART: [ldev] Erasing FE.KEYID = 1
1,242,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,057 UART: [fwproc] Wait for Commands...
1,282,832 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,856 >>> mbox cmd response: success
2,771,856 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,773,043 UART: [afmc] ++
2,773,211 UART: [afmc] CDI.KEYID = 6
2,773,574 UART: [afmc] SUBJECT.KEYID = 7
2,774,000 UART: [afmc] AUTHORITY.KEYID = 5
2,809,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,634 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,238 UART: [afmc] --
2,853,260 UART: [cold-reset] --
2,854,086 UART: [state] Locking Datavault
2,855,221 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,825 UART: [state] Locking ICCM
2,856,259 UART: [exit] Launching FMC @ 0x40000130
2,861,588 UART:
2,861,604 UART: Running Caliptra FMC ...
2,862,012 UART:
2,862,155 UART: [state] CFI Enabled
2,872,652 UART: [fht] FMC Alias Private Key: 7
2,980,593 UART: [art] Extend RT PCRs Done
2,981,021 UART: [art] Lock RT PCRs Done
2,982,347 UART: [art] Populate DV Done
2,990,688 UART: [fht] FMC Alias Private Key: 7
2,991,788 UART: [art] Derive CDI
2,992,068 UART: [art] Store in in slot 0x4
3,077,867 UART: [art] Derive Key Pair
3,078,227 UART: [art] Store priv key in slot 0x5
3,091,723 UART: [art] Derive Key Pair - Done
3,106,601 UART: [art] Signing Cert with AUTHO
3,107,081 UART: RITY.KEYID = 7
3,122,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,924 UART: [art] PUB.X = E3BC8FF7E2A6B95CFECBE42DCAC0B968880EFFBDBCDA413582A09B90526ED8A682AD6FA42936A9C98F009B20442105B3
3,129,688 UART: [art] PUB.Y = 1ECA794005ABD16D8BE768349C4BAE22E59CA1C8BBA144FC1323A9F595C86EC2B43D7AD57554777075B60B5D4EE959C9
3,136,644 UART: [art] SIG.R = 8E6CC125EBF8B99640CD1C8CA9C4F3C4997290C77E673074DFDF13CC3AFB698A50BA39BA666CA28B8031F9F0F4812C2C
3,143,430 UART: [art] SIG.S = 95B6F7A54CE5A2A5A63FCB0B458A250E33F49356472BEFF68D9C63BB68F603A5DD73DB9F8BCBC5735A11B8D459CB4D74
3,166,810 UART: Caliptra RT
3,167,155 UART: [state] CFI Enabled
3,274,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,013 UART: [rt]cmd =0xaabbccdd, len=4
3,305,985 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,063 ready_for_fw is high
1,056,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,186 >>> mbox cmd response: success
2,621,186 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,683,440 UART:
2,683,456 UART: Running Caliptra FMC ...
2,683,864 UART:
2,684,007 UART: [state] CFI Enabled
2,694,452 UART: [fht] FMC Alias Private Key: 7
2,802,243 UART: [art] Extend RT PCRs Done
2,802,671 UART: [art] Lock RT PCRs Done
2,804,103 UART: [art] Populate DV Done
2,812,358 UART: [fht] FMC Alias Private Key: 7
2,813,348 UART: [art] Derive CDI
2,813,628 UART: [art] Store in in slot 0x4
2,899,447 UART: [art] Derive Key Pair
2,899,807 UART: [art] Store priv key in slot 0x5
2,912,709 UART: [art] Derive Key Pair - Done
2,927,279 UART: [art] Signing Cert with AUTHO
2,927,759 UART: RITY.KEYID = 7
2,943,075 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,840 UART: [art] PUB.X = 7640A76258D12B530B793CB5B68718A6982F4A6186C535AC13182AB2AEDAAF64BC880565C8D7B425B837D41AF06C73F5
2,950,606 UART: [art] PUB.Y = 8C2B6D8B89C2DC7123682F82C313A3DBB294630E7EC03A0AF0C309B46D78C3D31977383A2CA2E0D241961E8665C206F5
2,957,546 UART: [art] SIG.R = 2C5255739E08D71D5B04BB4ABC8EA0FFCE719F1C5DB961B4DD3A23C39362B418855E7B0BDB4CD649013F3B5F4963C476
2,964,316 UART: [art] SIG.S = 4216032A2BA4B8D1D00CFEA5F818A022A2571CB47427C2E11993B2859B258779E625AC4F8284FFAFC13B8D681945CD7F
2,988,319 UART: Caliptra RT
2,988,664 UART: [state] CFI Enabled
3,096,723 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,451 UART: [rt]cmd =0xaabbccdd, len=4
3,128,425 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,042 UART:
192,401 UART: Running Caliptra ROM ...
193,586 UART:
193,755 UART: [state] CFI Enabled
259,522 UART: [state] LifecycleState = Unprovisioned
261,497 UART: [state] DebugLocked = No
264,306 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,019 UART: [kat] SHA2-256
438,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,190 UART: [kat] ++
449,668 UART: [kat] sha1
459,496 UART: [kat] SHA2-256
462,215 UART: [kat] SHA2-384
467,837 UART: [kat] SHA2-512-ACC
470,196 UART: [kat] ECC-384
2,764,972 UART: [kat] HMAC-384Kdf
2,777,557 UART: [kat] LMS
3,967,849 UART: [kat] --
3,973,206 UART: [cold-reset] ++
3,974,936 UART: [fht] Storing FHT @ 0x50003400
3,985,343 UART: [idev] ++
3,985,896 UART: [idev] CDI.KEYID = 6
3,986,865 UART: [idev] SUBJECT.KEYID = 7
3,988,104 UART: [idev] UDS.KEYID = 0
3,989,077 ready_for_fw is high
3,989,275 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,132,459 UART: [idev] Erasing UDS.KEYID = 0
7,321,934 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,790 UART: [idev] --
7,347,993 UART: [ldev] ++
7,348,554 UART: [ldev] CDI.KEYID = 6
7,349,511 UART: [ldev] SUBJECT.KEYID = 5
7,350,709 UART: [ldev] AUTHORITY.KEYID = 7
7,351,983 UART: [ldev] FE.KEYID = 1
7,399,351 UART: [ldev] Erasing FE.KEYID = 1
10,730,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,058 UART: [ldev] --
13,090,324 UART: [fwproc] Waiting for Commands...
13,091,929 UART: [fwproc] Received command 0x46574c44
13,094,165 UART: [fwproc] Received Image of size 113844 bytes
17,147,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,224,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,292,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,609,236 >>> mbox cmd response: success
17,613,215 UART: [afmc] ++
17,613,832 UART: [afmc] CDI.KEYID = 6
17,614,741 UART: [afmc] SUBJECT.KEYID = 7
17,616,045 UART: [afmc] AUTHORITY.KEYID = 5
20,984,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,283,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,136 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,300,567 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,391 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,329,818 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,468 UART: [afmc] --
23,354,460 UART: [cold-reset] --
23,359,122 UART: [state] Locking Datavault
23,364,480 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,227 UART: [state] Locking ICCM
23,367,307 UART: [exit] Launching FMC @ 0x40000130
23,375,652 UART:
23,375,932 UART: Running Caliptra FMC ...
23,377,035 UART:
23,377,219 UART: [state] CFI Enabled
23,440,337 UART: [fht] FMC Alias Private Key: 7
25,778,766 UART: [art] Extend RT PCRs Done
25,779,986 UART: [art] Lock RT PCRs Done
25,781,923 UART: [art] Populate DV Done
25,787,276 UART: [fht] FMC Alias Private Key: 7
25,788,870 UART: [art] Derive CDI
25,789,680 UART: [art] Store in in slot 0x4
25,848,657 UART: [art] Derive Key Pair
25,849,649 UART: [art] Store priv key in slot 0x5
29,141,950 UART: [art] Derive Key Pair - Done
29,154,952 UART: [art] Signing Cert with AUTHO
29,156,253 UART: RITY.KEYID = 7
31,443,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,444,875 UART: [art] PUB.X = A4A13D623A3F3D127E97A451B6031B361ED2775409A4B9E5EA8523FE18BF78EC3EB45244C205F4BA9F2B401C7DCA751E
31,452,144 UART: [art] PUB.Y = 2E56A84A118CB8E57F9CB03DB9744CD19EC6AE602B32D4C3242FB4038B969D41C78527161C6548943823C329F8C53D7A
31,459,384 UART: [art] SIG.R = A49224FFD8192EC83CD979DDF8AE0B89F813F180D59EDDF90EF6839E00734EE833C528B4335F26A12D7D8A22F8C7E94C
31,466,759 UART: [art] SIG.S = 4DD07A29F9B17ED0D5BB2105A5CCD646A5F9DF15E515CA8CE6A1C7DFD71568BC3BA8F35D1066A0633D9B7BFC736A6B9C
32,771,969 UART: Caliptra RT
32,772,682 UART: [state] CFI Enabled
32,932,342 UART: [rt] RT listening for mailbox commands...
32,934,219 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,965,216 UART: [rt]cmd =0x434b4558, len=80
32,966,774 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,804,884 ready_for_fw is high
3,805,259 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,883,193 >>> mbox cmd response: success
23,586,894 UART:
23,587,267 UART: Running Caliptra FMC ...
23,588,458 UART:
23,588,629 UART: [state] CFI Enabled
23,654,068 UART: [fht] FMC Alias Private Key: 7
25,991,292 UART: [art] Extend RT PCRs Done
25,992,520 UART: [art] Lock RT PCRs Done
25,994,013 UART: [art] Populate DV Done
25,999,375 UART: [fht] FMC Alias Private Key: 7
26,000,871 UART: [art] Derive CDI
26,001,638 UART: [art] Store in in slot 0x4
26,062,930 UART: [art] Derive Key Pair
26,063,973 UART: [art] Store priv key in slot 0x5
29,356,905 UART: [art] Derive Key Pair - Done
29,369,902 UART: [art] Signing Cert with AUTHO
29,371,237 UART: RITY.KEYID = 7
31,659,014 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,520 UART: [art] PUB.X = E11A993A37F4B00D44258E9AA89AFA60E9775E709D2929082B01BC6B5DE763EE93A63F2F7206C3E6A8CFE9E2706464C7
31,667,740 UART: [art] PUB.Y = F22FEDDDF3B578DF0CD2B31258584729D3DC18F37782A9528DA1E6FEC0FBB5931C46E536F40DB1A4CB43D6BC21891687
31,674,990 UART: [art] SIG.R = B5889E691C209D9D10BCC66191DA58B468C27410C917F69182284755C39CBD407A8777C5B862F162A3D3B6B9809D6F60
31,682,382 UART: [art] SIG.S = A6E63D2120F8C1F1A3FE16BCD91157B1C44F7931D5D7A7B9FCAF62949AC01FE0E2539658B8E9C0E928BB8E3F237D2B81
32,987,364 UART: Caliptra RT
32,988,070 UART: [state] CFI Enabled
33,149,734 UART: [rt] RT listening for mailbox commands...
33,151,622 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,182,624 UART: [rt]cmd =0x434b4558, len=80
33,184,072 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,315 UART:
192,696 UART: Running Caliptra ROM ...
193,902 UART:
603,612 UART: [state] CFI Enabled
619,697 UART: [state] LifecycleState = Unprovisioned
621,579 UART: [state] DebugLocked = No
624,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,540 UART: [kat] SHA2-256
799,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,852 UART: [kat] ++
810,305 UART: [kat] sha1
822,387 UART: [kat] SHA2-256
825,110 UART: [kat] SHA2-384
829,677 UART: [kat] SHA2-512-ACC
831,981 UART: [kat] ECC-384
3,114,957 UART: [kat] HMAC-384Kdf
3,125,132 UART: [kat] LMS
4,315,324 UART: [kat] --
4,320,001 UART: [cold-reset] ++
4,322,655 UART: [fht] Storing FHT @ 0x50003400
4,334,576 UART: [idev] ++
4,335,185 UART: [idev] CDI.KEYID = 6
4,336,071 UART: [idev] SUBJECT.KEYID = 7
4,337,321 UART: [idev] UDS.KEYID = 0
4,338,324 ready_for_fw is high
4,338,572 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,594 UART: [idev] Erasing UDS.KEYID = 0
7,622,913 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,191 UART: [idev] --
7,647,487 UART: [ldev] ++
7,648,051 UART: [ldev] CDI.KEYID = 6
7,649,023 UART: [ldev] SUBJECT.KEYID = 5
7,650,248 UART: [ldev] AUTHORITY.KEYID = 7
7,651,536 UART: [ldev] FE.KEYID = 1
7,662,311 UART: [ldev] Erasing FE.KEYID = 1
10,947,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,636 UART: [ldev] --
13,307,591 UART: [fwproc] Waiting for Commands...
13,310,718 UART: [fwproc] Received command 0x46574c44
13,312,916 UART: [fwproc] Received Image of size 113844 bytes
17,366,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,825,046 >>> mbox cmd response: success
17,829,673 UART: [afmc] ++
17,830,276 UART: [afmc] CDI.KEYID = 6
17,831,208 UART: [afmc] SUBJECT.KEYID = 7
17,832,429 UART: [afmc] AUTHORITY.KEYID = 5
21,143,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,784 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,168 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,982 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,414 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,325 UART: [afmc] --
23,509,028 UART: [cold-reset] --
23,513,919 UART: [state] Locking Datavault
23,519,220 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,929 UART: [state] Locking ICCM
23,522,434 UART: [exit] Launching FMC @ 0x40000130
23,530,786 UART:
23,531,062 UART: Running Caliptra FMC ...
23,532,122 UART:
23,532,276 UART: [state] CFI Enabled
23,540,484 UART: [fht] FMC Alias Private Key: 7
25,870,828 UART: [art] Extend RT PCRs Done
25,872,049 UART: [art] Lock RT PCRs Done
25,873,595 UART: [art] Populate DV Done
25,879,120 UART: [fht] FMC Alias Private Key: 7
25,880,821 UART: [art] Derive CDI
25,881,634 UART: [art] Store in in slot 0x4
25,924,173 UART: [art] Derive Key Pair
25,925,179 UART: [art] Store priv key in slot 0x5
29,167,305 UART: [art] Derive Key Pair - Done
29,180,195 UART: [art] Signing Cert with AUTHO
29,181,504 UART: RITY.KEYID = 7
31,461,361 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,863 UART: [art] PUB.X = 6A9E752F90D0A42F7AA4A5D1E93435C50E425B83439FFB0F25C86994896C6A8C8D424AF20D781AA6C16121352F7893E1
31,470,091 UART: [art] PUB.Y = 8289D8641AFD0DB1DDC1982F203D6B0D12F072C5A1D7E83DB312593D9BE4A69305398AA229F7D986CE7E14091F494BB3
31,477,344 UART: [art] SIG.R = A72483DA74E1B488CCAD3CA3A54EF7A2D3DABC2B4B4ABAD019A38DD95500086B08B80EC880266D142CD94B7D11018569
31,484,723 UART: [art] SIG.S = 7835DDD621E06C76AB32651F4F8AD936B4170FFA29FCBC8FB76D0A780011DB226F720C423CFB0315F96664D351ABB131
32,789,777 UART: Caliptra RT
32,790,491 UART: [state] CFI Enabled
32,908,541 UART: [rt] RT listening for mailbox commands...
32,910,422 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
32,941,463 UART: [rt]cmd =0x434b4558, len=80
32,943,071 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
4,123,555 ready_for_fw is high
4,123,935 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,058,438 >>> mbox cmd response: success
23,697,928 UART:
23,698,322 UART: Running Caliptra FMC ...
23,699,438 UART:
23,699,594 UART: [state] CFI Enabled
23,707,503 UART: [fht] FMC Alias Private Key: 7
26,038,266 UART: [art] Extend RT PCRs Done
26,039,503 UART: [art] Lock RT PCRs Done
26,041,426 UART: [art] Populate DV Done
26,046,740 UART: [fht] FMC Alias Private Key: 7
26,048,401 UART: [art] Derive CDI
26,049,222 UART: [art] Store in in slot 0x4
26,091,994 UART: [art] Derive Key Pair
26,093,059 UART: [art] Store priv key in slot 0x5
29,334,398 UART: [art] Derive Key Pair - Done
29,347,116 UART: [art] Signing Cert with AUTHO
29,348,453 UART: RITY.KEYID = 7
31,628,191 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,698 UART: [art] PUB.X = 452EC926FF36F58C4898956ED879CF27AD0A77015F25459FB14A32C09388319A4350DCB6F7CB7DDE013CDF29120931D4
31,636,951 UART: [art] PUB.Y = 7420FC69234DD14B343A16AF1B5AD8EEEB2C1A0D3311C99AFD07F5775F4DBF287D9261F18B77C5D6CC2BE72BDB70A7CA
31,644,195 UART: [art] SIG.R = BA17CAE80B90F427D17A77D7CA2E573F7547BE982085A45BAA59CD7F25F96D3E7658B0ACF5E40B1E743C625F1C7EAAC9
31,651,598 UART: [art] SIG.S = 5DB7CF238F50AD7B9DB19800BA072B7A5A5C7B7EFB05892ED4AA2A338CF173503794302F4AA5F35FEA0E3E595D483470
32,957,005 UART: Caliptra RT
32,957,725 UART: [state] CFI Enabled
33,075,614 UART: [rt] RT listening for mailbox commands...
33,077,505 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,108,698 UART: [rt]cmd =0x434b4558, len=80
33,110,213 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
191,974 UART:
192,362 UART: Running Caliptra ROM ...
193,517 UART:
193,666 UART: [state] CFI Enabled
261,546 UART: [state] LifecycleState = Unprovisioned
263,426 UART: [state] DebugLocked = No
265,729 UART: [state] WD Timer not started. Device not locked for debugging
270,046 UART: [kat] SHA2-256
449,126 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,700 UART: [kat] ++
461,159 UART: [kat] sha1
473,168 UART: [kat] SHA2-256
476,185 UART: [kat] SHA2-384
481,964 UART: [kat] SHA2-512-ACC
484,973 UART: [kat] ECC-384
2,946,390 UART: [kat] HMAC-384Kdf
2,971,134 UART: [kat] LMS
3,500,611 UART: [kat] --
3,504,037 UART: [cold-reset] ++
3,505,052 UART: [fht] FHT @ 0x50003400
3,515,248 UART: [idev] ++
3,515,830 UART: [idev] CDI.KEYID = 6
3,516,786 UART: [idev] SUBJECT.KEYID = 7
3,517,959 UART: [idev] UDS.KEYID = 0
3,518,865 ready_for_fw is high
3,519,081 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,662,736 UART: [idev] Erasing UDS.KEYID = 0
6,025,280 UART: [idev] Sha1 KeyId Algorithm
6,048,049 UART: [idev] --
6,052,290 UART: [ldev] ++
6,052,872 UART: [ldev] CDI.KEYID = 6
6,053,799 UART: [ldev] SUBJECT.KEYID = 5
6,054,910 UART: [ldev] AUTHORITY.KEYID = 7
6,056,201 UART: [ldev] FE.KEYID = 1
6,097,834 UART: [ldev] Erasing FE.KEYID = 1
8,603,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,485 UART: [ldev] --
10,409,238 UART: [fwproc] Wait for Commands...
10,411,172 UART: [fwproc] Recv command 0x46574c44
10,413,262 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,033 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,781 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,271,638 >>> mbox cmd response: success
14,276,149 UART: [afmc] ++
14,276,746 UART: [afmc] CDI.KEYID = 6
14,277,658 UART: [afmc] SUBJECT.KEYID = 7
14,278,816 UART: [afmc] AUTHORITY.KEYID = 5
16,802,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,526,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,527,985 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,543,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,559,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,575,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,597,370 UART: [afmc] --
18,600,390 UART: [cold-reset] --
18,605,442 UART: [state] Locking Datavault
18,611,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,613,584 UART: [state] Locking ICCM
18,615,088 UART: [exit] Launching FMC @ 0x40000130
18,623,489 UART:
18,623,726 UART: Running Caliptra FMC ...
18,624,829 UART:
18,624,988 UART: [state] CFI Enabled
18,684,899 UART: [fht] FMC Alias Private Key: 7
20,448,870 UART: [art] Extend RT PCRs Done
20,450,087 UART: [art] Lock RT PCRs Done
20,451,666 UART: [art] Populate DV Done
20,456,805 UART: [fht] FMC Alias Private Key: 7
20,458,462 UART: [art] Derive CDI
20,459,275 UART: [art] Store in in slot 0x4
20,517,501 UART: [art] Derive Key Pair
20,518,537 UART: [art] Store priv key in slot 0x5
22,981,855 UART: [art] Derive Key Pair - Done
22,994,686 UART: [art] Signing Cert with AUTHO
22,996,027 UART: RITY.KEYID = 7
24,707,139 UART: [art] Erasing AUTHORITY.KEYID = 7
24,708,638 UART: [art] PUB.X = C2B16DCBD605905D29E8E9EB361C20CF31265B3F8DD8C343842F513FB256BCFA6BB22D16FC6B0D5D83013B23BFF31CBB
24,715,957 UART: [art] PUB.Y = 5CD4D68EB109FDB0A5BC44B17ED259F0B6B05483643EFE36246DF83903D50CE26FACB9B6A474FE84B7F165D6E35B314D
24,723,251 UART: [art] SIG.R = 9EA7610377262089BE6B1D84691748FB19AC6219DB2018B68AB47C1777B1E025085605102FE302A22E6ED44AD8FD2D17
24,730,604 UART: [art] SIG.S = 7D32087630FCAB87F76DED412000F590876E3A1251019E896026DB21554E4BBA39EE77ACDAFA34B464FBCB4E45BE2766
25,709,334 UART: Caliptra RT
25,710,048 UART: [state] CFI Enabled
25,875,794 UART: [rt] RT listening for mailbox commands...
25,877,683 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,908,749 UART: [rt]cmd =0x434b4558, len=80
25,910,142 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,362,773 ready_for_fw is high
3,363,389 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,047,545 >>> mbox cmd response: success
18,341,362 UART:
18,341,771 UART: Running Caliptra FMC ...
18,342,879 UART:
18,343,036 UART: [state] CFI Enabled
18,411,857 UART: [fht] FMC Alias Private Key: 7
20,176,204 UART: [art] Extend RT PCRs Done
20,177,431 UART: [art] Lock RT PCRs Done
20,179,279 UART: [art] Populate DV Done
20,184,691 UART: [fht] FMC Alias Private Key: 7
20,186,287 UART: [art] Derive CDI
20,187,070 UART: [art] Store in in slot 0x4
20,246,151 UART: [art] Derive Key Pair
20,247,164 UART: [art] Store priv key in slot 0x5
22,709,622 UART: [art] Derive Key Pair - Done
22,722,465 UART: [art] Signing Cert with AUTHO
22,723,775 UART: RITY.KEYID = 7
24,435,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,313 UART: [art] PUB.X = 85CB3E6B01B691273381DAD95F7499DDA5E436B7B2D0687B0E4C1A1E8C4B774C323276EB107BE485A9C275606AE4B0CF
24,444,603 UART: [art] PUB.Y = FD744542AAF5C748119061A2F42094E6ECBBF62EA721DB473226C040A3285C7179DFC79865553AABC747DCA7F3EB7B53
24,451,841 UART: [art] SIG.R = 103C36E023F2EA6712103A72EA55849C727C7014C32EB2F69166EBF01F36B0520B1D026FE6C14CA6EFA660CFA01A0E14
24,459,219 UART: [art] SIG.S = 1B61A67525AA769D59F0966CED16B2BC3E474AE0A590B6BB4F6A4FC75079B50ADF95372C9BA20BEF58BC957B0661B0F5
25,438,577 UART: Caliptra RT
25,439,290 UART: [state] CFI Enabled
25,604,080 UART: [rt] RT listening for mailbox commands...
25,605,969 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,637,072 UART: [rt]cmd =0x434b4558, len=80
25,638,661 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,804 writing to cptra_bootfsm_go
193,063 UART:
193,440 UART: Running Caliptra ROM ...
194,647 UART:
604,296 UART: [state] CFI Enabled
617,265 UART: [state] LifecycleState = Unprovisioned
619,097 UART: [state] DebugLocked = No
620,636 UART: [state] WD Timer not started. Device not locked for debugging
625,179 UART: [kat] SHA2-256
804,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,897 UART: [kat] ++
816,347 UART: [kat] sha1
827,219 UART: [kat] SHA2-256
830,298 UART: [kat] SHA2-384
835,646 UART: [kat] SHA2-512-ACC
838,578 UART: [kat] ECC-384
3,279,686 UART: [kat] HMAC-384Kdf
3,291,712 UART: [kat] LMS
3,821,246 UART: [kat] --
3,826,816 UART: [cold-reset] ++
3,828,320 UART: [fht] FHT @ 0x50003400
3,838,801 UART: [idev] ++
3,839,370 UART: [idev] CDI.KEYID = 6
3,840,255 UART: [idev] SUBJECT.KEYID = 7
3,841,500 UART: [idev] UDS.KEYID = 0
3,842,434 ready_for_fw is high
3,842,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,006 UART: [idev] Erasing UDS.KEYID = 0
6,316,650 UART: [idev] Sha1 KeyId Algorithm
6,340,874 UART: [idev] --
6,344,439 UART: [ldev] ++
6,345,008 UART: [ldev] CDI.KEYID = 6
6,345,928 UART: [ldev] SUBJECT.KEYID = 5
6,347,086 UART: [ldev] AUTHORITY.KEYID = 7
6,348,373 UART: [ldev] FE.KEYID = 1
6,359,416 UART: [ldev] Erasing FE.KEYID = 1
8,835,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,454 UART: [ldev] --
10,623,891 UART: [fwproc] Wait for Commands...
10,625,935 UART: [fwproc] Recv command 0x46574c44
10,628,024 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,326 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,659 >>> mbox cmd response: success
14,484,742 UART: [afmc] ++
14,485,335 UART: [afmc] CDI.KEYID = 6
14,486,265 UART: [afmc] SUBJECT.KEYID = 7
14,487,427 UART: [afmc] AUTHORITY.KEYID = 5
16,990,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,714,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,716,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,732,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,748,046 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,763,904 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,282 UART: [afmc] --
18,790,349 UART: [cold-reset] --
18,792,644 UART: [state] Locking Datavault
18,799,238 UART: [state] Locking PCR0, PCR1 and PCR31
18,800,880 UART: [state] Locking ICCM
18,803,084 UART: [exit] Launching FMC @ 0x40000130
18,811,535 UART:
18,811,769 UART: Running Caliptra FMC ...
18,812,818 UART:
18,812,970 UART: [state] CFI Enabled
18,821,071 UART: [fht] FMC Alias Private Key: 7
20,577,923 UART: [art] Extend RT PCRs Done
20,579,136 UART: [art] Lock RT PCRs Done
20,580,325 UART: [art] Populate DV Done
20,585,682 UART: [fht] FMC Alias Private Key: 7
20,587,375 UART: [art] Derive CDI
20,588,192 UART: [art] Store in in slot 0x4
20,630,837 UART: [art] Derive Key Pair
20,631,873 UART: [art] Store priv key in slot 0x5
23,058,519 UART: [art] Derive Key Pair - Done
23,071,512 UART: [art] Signing Cert with AUTHO
23,072,821 UART: RITY.KEYID = 7
24,778,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,723 UART: [art] PUB.X = 847127FB85E090CA7B32F1E4EB00EB77E37E994AD071D116EDC0B7B0CEA232C1EBC47442547739656D1BEE171B6ACE04
24,786,989 UART: [art] PUB.Y = DCDBC242BAC4F6F886AFD55CCCAABA1A1296873F52EFF3CCFAD7FED69B91353733D428C25F9BBB111E2148648D2A0A1C
24,794,249 UART: [art] SIG.R = 3C873C85AE8175543CCDCFC3733C2BF918D4103F5B7B22AC602B84CC4162127CF110E6046036FE709C2627CC3F9D1E5E
24,801,651 UART: [art] SIG.S = 0132CEE5BE3E5070977151BF3E5DDEB3DDF102E825C20B16F2168E78B54D48862B81AC5F7C3A5813EA78187AA2EB3C6C
25,780,125 UART: Caliptra RT
25,780,816 UART: [state] CFI Enabled
25,897,888 UART: [rt] RT listening for mailbox commands...
25,899,771 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,930,758 UART: [rt]cmd =0x434b4558, len=80
25,932,151 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,734 writing to cptra_bootfsm_go
3,700,985 ready_for_fw is high
3,701,363 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,677 >>> mbox cmd response: success
18,524,772 UART:
18,525,198 UART: Running Caliptra FMC ...
18,526,338 UART:
18,526,505 UART: [state] CFI Enabled
18,534,188 UART: [fht] FMC Alias Private Key: 7
20,291,316 UART: [art] Extend RT PCRs Done
20,292,542 UART: [art] Lock RT PCRs Done
20,294,249 UART: [art] Populate DV Done
20,299,442 UART: [fht] FMC Alias Private Key: 7
20,301,090 UART: [art] Derive CDI
20,301,912 UART: [art] Store in in slot 0x4
20,344,776 UART: [art] Derive Key Pair
20,345,775 UART: [art] Store priv key in slot 0x5
22,772,521 UART: [art] Derive Key Pair - Done
22,785,473 UART: [art] Signing Cert with AUTHO
22,786,799 UART: RITY.KEYID = 7
24,492,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,792 UART: [art] PUB.X = 4C3602861EA9B800CAC82C7B19497C0660330B1E08A23107B8ABBBA00A9EE4A56E92598962A2A64965B1D10454CFB3DC
24,501,043 UART: [art] PUB.Y = 5018A8A072E74C4B1F0C9E76C6A3874DB3ECB2297E35B6E098D2D1D670B5522E61D815DAB6D0AB55F254AB62598A09AF
24,508,301 UART: [art] SIG.R = B815127EAEFCB585275C170C40E7D5D331DF78160CB2AEE3B241DB2F556B02252102396051C07615EAE781F1DD2B0331
24,515,698 UART: [art] SIG.S = F1A00650D88D705B48642D3717CB5EECAA0ACB96EDD209A96F4DE1C746D0FB1E3668DC1CCDA6644B3EE7BB260095969B
25,495,484 UART: Caliptra RT
25,496,190 UART: [state] CFI Enabled
25,613,308 UART: [rt] RT listening for mailbox commands...
25,615,188 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,646,507 UART: [rt]cmd =0x434b4558, len=80
25,648,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,121 UART:
192,487 UART: Running Caliptra ROM ...
193,679 UART:
193,832 UART: [state] CFI Enabled
264,734 UART: [state] LifecycleState = Unprovisioned
267,178 UART: [state] DebugLocked = No
269,862 UART: [state] WD Timer not started. Device not locked for debugging
273,845 UART: [kat] SHA2-256
463,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,486 UART: [kat] ++
474,980 UART: [kat] sha1
486,426 UART: [kat] SHA2-256
489,458 UART: [kat] SHA2-384
495,525 UART: [kat] SHA2-512-ACC
498,116 UART: [kat] ECC-384
2,946,074 UART: [kat] HMAC-384Kdf
2,969,896 UART: [kat] LMS
3,501,676 UART: [kat] --
3,505,322 UART: [cold-reset] ++
3,507,566 UART: [fht] FHT @ 0x50003400
3,519,401 UART: [idev] ++
3,520,043 UART: [idev] CDI.KEYID = 6
3,521,004 UART: [idev] SUBJECT.KEYID = 7
3,522,253 UART: [idev] UDS.KEYID = 0
3,523,152 ready_for_fw is high
3,523,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,941 UART: [idev] Erasing UDS.KEYID = 0
6,030,051 UART: [idev] Sha1 KeyId Algorithm
6,052,925 UART: [idev] --
6,058,383 UART: [ldev] ++
6,059,071 UART: [ldev] CDI.KEYID = 6
6,059,984 UART: [ldev] SUBJECT.KEYID = 5
6,061,149 UART: [ldev] AUTHORITY.KEYID = 7
6,062,379 UART: [ldev] FE.KEYID = 1
6,098,421 UART: [ldev] Erasing FE.KEYID = 1
8,603,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,277 UART: [ldev] --
10,411,406 UART: [fwproc] Wait for Commands...
10,413,501 UART: [fwproc] Recv command 0x46574c44
10,415,810 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,329 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,590,037 >>> mbox cmd response: success
14,593,420 UART: [afmc] ++
14,594,133 UART: [afmc] CDI.KEYID = 6
14,595,302 UART: [afmc] SUBJECT.KEYID = 7
14,596,797 UART: [afmc] AUTHORITY.KEYID = 5
17,124,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,849,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,866,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,881,938 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,896,978 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,920,378 UART: [afmc] --
18,924,019 UART: [cold-reset] --
18,930,179 UART: [state] Locking Datavault
18,934,751 UART: [state] Locking PCR0, PCR1 and PCR31
18,936,971 UART: [state] Locking ICCM
18,939,561 UART: [exit] Launching FMC @ 0x40000130
18,948,209 UART:
18,948,511 UART: Running Caliptra FMC ...
18,949,628 UART:
18,949,787 UART: [state] CFI Enabled
19,006,581 UART: [fht] FMC Alias Private Key: 7
20,770,827 UART: [art] Extend RT PCRs Done
20,772,035 UART: [art] Lock RT PCRs Done
20,773,666 UART: [art] Populate DV Done
20,779,342 UART: [fht] FMC Alias Private Key: 7
20,780,888 UART: [art] Derive CDI
20,781,700 UART: [art] Store in in slot 0x4
20,839,223 UART: [art] Derive Key Pair
20,840,282 UART: [art] Store priv key in slot 0x5
23,303,269 UART: [art] Derive Key Pair - Done
23,316,595 UART: [art] Signing Cert with AUTHO
23,317,903 UART: RITY.KEYID = 7
25,029,100 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,600 UART: [art] PUB.X = C55DDA12C5F8E8748FAA55377A5507B98B8865E02382FAA7567559A574356226372BAF15B95152FE07D7E368675E9A12
25,037,820 UART: [art] PUB.Y = 823AC7854603F0BAF642C984808C9F07A450DD446D3EEC84D6DB090A0EE701530C7A667886274030C7F06D1196498495
25,045,076 UART: [art] SIG.R = 1AF5B8E0ACF03D372B811B1E2DAA85DFE34F14CD4493170D9E8C5FDB973AD6F103A2689E81D862FD57EDDDDBFAF489FE
25,052,501 UART: [art] SIG.S = 2A067D0F8260724B53183FB0B0A235883A7C89893A8FCC595B12547401482E60AC24CB92FE7C6B246CCC1E4D8B7F32AF
26,031,517 UART: Caliptra RT
26,032,228 UART: [state] CFI Enabled
26,196,449 UART: [rt] RT listening for mailbox commands...
26,198,328 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,229,548 UART: [rt]cmd =0x434b4558, len=80
26,231,133 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,439,122 ready_for_fw is high
3,439,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,572 >>> mbox cmd response: success
19,028,425 UART:
19,028,825 UART: Running Caliptra FMC ...
19,030,026 UART:
19,030,201 UART: [state] CFI Enabled
19,094,373 UART: [fht] FMC Alias Private Key: 7
20,858,120 UART: [art] Extend RT PCRs Done
20,859,373 UART: [art] Lock RT PCRs Done
20,861,020 UART: [art] Populate DV Done
20,866,063 UART: [fht] FMC Alias Private Key: 7
20,867,723 UART: [art] Derive CDI
20,868,541 UART: [art] Store in in slot 0x4
20,926,390 UART: [art] Derive Key Pair
20,927,388 UART: [art] Store priv key in slot 0x5
23,389,843 UART: [art] Derive Key Pair - Done
23,402,905 UART: [art] Signing Cert with AUTHO
23,404,214 UART: RITY.KEYID = 7
25,115,746 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,257 UART: [art] PUB.X = D86071FE48F33A9F9E8B120B940E9B9C5D6C556D1017EFEF28D44625804E980DADD5AEC275EABD750857AAAF5A7C60B2
25,124,557 UART: [art] PUB.Y = 48E8FE1C7FADC0515525BE1EDF2B86C801845254E360049DF2050C853DA5E77958BD5C5C62AAE3E24B58F3AF2DB8E063
25,131,777 UART: [art] SIG.R = CF2C711E208E746F1E66F62DA86E50880D9A6439D70678953E4AB5C715F0C208262C936593EDB815780DDD195362E1C4
25,139,158 UART: [art] SIG.S = D8D0A1DFD25D9689C7FF20503B8C6519F0415787C6D1889FDDDB015A3E307812D4AA6BF18578072A5A0751ED1917B020
26,118,539 UART: Caliptra RT
26,119,259 UART: [state] CFI Enabled
26,284,281 UART: [rt] RT listening for mailbox commands...
26,286,160 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,317,030 UART: [rt]cmd =0x434b4558, len=80
26,318,507 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,927 writing to cptra_bootfsm_go
193,077 UART:
193,449 UART: Running Caliptra ROM ...
194,571 UART:
604,234 UART: [state] CFI Enabled
619,543 UART: [state] LifecycleState = Unprovisioned
621,919 UART: [state] DebugLocked = No
624,797 UART: [state] WD Timer not started. Device not locked for debugging
629,902 UART: [kat] SHA2-256
819,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,532 UART: [kat] ++
831,157 UART: [kat] sha1
843,037 UART: [kat] SHA2-256
846,046 UART: [kat] SHA2-384
852,676 UART: [kat] SHA2-512-ACC
855,267 UART: [kat] ECC-384
3,297,938 UART: [kat] HMAC-384Kdf
3,310,525 UART: [kat] LMS
3,842,382 UART: [kat] --
3,846,800 UART: [cold-reset] ++
3,849,158 UART: [fht] FHT @ 0x50003400
3,862,265 UART: [idev] ++
3,862,907 UART: [idev] CDI.KEYID = 6
3,863,938 UART: [idev] SUBJECT.KEYID = 7
3,865,116 UART: [idev] UDS.KEYID = 0
3,866,039 ready_for_fw is high
3,866,229 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,009,622 UART: [idev] Erasing UDS.KEYID = 0
6,339,107 UART: [idev] Sha1 KeyId Algorithm
6,362,892 UART: [idev] --
6,368,459 UART: [ldev] ++
6,369,146 UART: [ldev] CDI.KEYID = 6
6,370,058 UART: [ldev] SUBJECT.KEYID = 5
6,371,278 UART: [ldev] AUTHORITY.KEYID = 7
6,372,453 UART: [ldev] FE.KEYID = 1
6,383,586 UART: [ldev] Erasing FE.KEYID = 1
8,863,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,237 UART: [ldev] --
10,655,669 UART: [fwproc] Wait for Commands...
10,658,706 UART: [fwproc] Recv command 0x46574c44
10,661,014 UART: [fwproc] Recv'd Img size: 114168 bytes
14,106,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,843,966 >>> mbox cmd response: success
14,847,375 UART: [afmc] ++
14,848,084 UART: [afmc] CDI.KEYID = 6
14,849,336 UART: [afmc] SUBJECT.KEYID = 7
14,850,720 UART: [afmc] AUTHORITY.KEYID = 5
17,355,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,431 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,162 UART: [afmc] --
19,153,002 UART: [cold-reset] --
19,156,227 UART: [state] Locking Datavault
19,162,342 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,540 UART: [state] Locking ICCM
19,166,947 UART: [exit] Launching FMC @ 0x40000130
19,175,621 UART:
19,175,859 UART: Running Caliptra FMC ...
19,176,962 UART:
19,177,121 UART: [state] CFI Enabled
19,184,953 UART: [fht] FMC Alias Private Key: 7
20,941,554 UART: [art] Extend RT PCRs Done
20,942,783 UART: [art] Lock RT PCRs Done
20,944,764 UART: [art] Populate DV Done
20,950,094 UART: [fht] FMC Alias Private Key: 7
20,951,779 UART: [art] Derive CDI
20,952,543 UART: [art] Store in in slot 0x4
20,995,307 UART: [art] Derive Key Pair
20,996,304 UART: [art] Store priv key in slot 0x5
23,423,006 UART: [art] Derive Key Pair - Done
23,435,908 UART: [art] Signing Cert with AUTHO
23,437,244 UART: RITY.KEYID = 7
25,142,473 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,961 UART: [art] PUB.X = 167CFD46DA1E6DD1744235FC6D06F928C5FDFBC22ADA4C4F3FC7D611F605DE058760C7A214FF63969B70E18FBF0E8EA6
25,151,257 UART: [art] PUB.Y = F9EBCCD78F82AAFC7F7DCFA7C387A43F0DFAB2A3FEAFFC2F57D0568FC6A79C5EC17817B8C4EB37A8F0EDB063E2DAE9AC
25,158,597 UART: [art] SIG.R = 384EAF80B4E3F2782D69A3C9C61A58C0EBC7BA642453A3E8633D4711CF7B23963E35A7848B8A66D92F31F92591A4D7ED
25,165,994 UART: [art] SIG.S = 7AB74554E5333BE8D155937D7873F3CBD70A392B232CD172B1FBE5B2458DB350A69BAF858396B74E1AB566DCA65AAEAE
26,144,973 UART: Caliptra RT
26,145,686 UART: [state] CFI Enabled
26,263,472 UART: [rt] RT listening for mailbox commands...
26,265,351 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,296,068 UART: [rt]cmd =0x434b4558, len=80
26,297,538 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,675 writing to cptra_bootfsm_go
3,756,044 ready_for_fw is high
3,756,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,959,316 >>> mbox cmd response: success
19,211,092 UART:
19,211,502 UART: Running Caliptra FMC ...
19,212,689 UART:
19,212,860 UART: [state] CFI Enabled
19,220,641 UART: [fht] FMC Alias Private Key: 7
20,977,369 UART: [art] Extend RT PCRs Done
20,978,604 UART: [art] Lock RT PCRs Done
20,980,237 UART: [art] Populate DV Done
20,985,648 UART: [fht] FMC Alias Private Key: 7
20,987,135 UART: [art] Derive CDI
20,987,896 UART: [art] Store in in slot 0x4
21,030,808 UART: [art] Derive Key Pair
21,031,817 UART: [art] Store priv key in slot 0x5
23,458,612 UART: [art] Derive Key Pair - Done
23,471,404 UART: [art] Signing Cert with AUTHO
23,472,715 UART: RITY.KEYID = 7
25,178,364 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,856 UART: [art] PUB.X = 5C172B14F784D27FE6E145ABB05CFCF9FBB17B512CAF064836951FF651041A4715DE1FADA7743687F3BF7DBDF0C0B8A4
25,187,158 UART: [art] PUB.Y = 9C2B94A13C9C05B21A02C14D143AB73848CDC449E560ECB6BD7E27708831401950843B1717C3987DF943FBA11FBFAC9C
25,194,443 UART: [art] SIG.R = 0092F1936939557329CB878540007DD1C32F6D78F93CAFC7F6B74DE3BFF6C0C39693F16DD1B80DDEF30578BE1A714E18
25,201,779 UART: [art] SIG.S = 28663166DE02A8C2881E6A878E94CC71D3E72933CD294BC81BFA985F34EB4D3945AA9F80EAE2360DA1A55085C6EBD8BE
26,181,063 UART: Caliptra RT
26,181,793 UART: [state] CFI Enabled
26,299,177 UART: [rt] RT listening for mailbox commands...
26,301,058 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,332,105 UART: [rt]cmd =0x434b4558, len=80
26,333,474 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,314 UART: [kat] SHA2-512-ACC
897,215 UART: [kat] ECC-384
902,580 UART: [kat] HMAC-384Kdf
907,290 UART: [kat] LMS
1,475,486 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,637 UART: [fht] Storing FHT @ 0x50003400
1,479,224 UART: [idev] ++
1,479,392 UART: [idev] CDI.KEYID = 6
1,479,752 UART: [idev] SUBJECT.KEYID = 7
1,480,176 UART: [idev] UDS.KEYID = 0
1,480,521 ready_for_fw is high
1,480,521 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,182 UART: [idev] Erasing UDS.KEYID = 0
1,504,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,808 UART: [idev] --
1,513,959 UART: [ldev] ++
1,514,127 UART: [ldev] CDI.KEYID = 6
1,514,490 UART: [ldev] SUBJECT.KEYID = 5
1,514,916 UART: [ldev] AUTHORITY.KEYID = 7
1,515,379 UART: [ldev] FE.KEYID = 1
1,520,233 UART: [ldev] Erasing FE.KEYID = 1
1,545,848 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,972 UART: [ldev] --
1,585,257 UART: [fwproc] Waiting for Commands...
1,586,104 UART: [fwproc] Received command 0x46574c44
1,586,895 UART: [fwproc] Received Image of size 114168 bytes
2,884,145 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,291 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,643 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,262 >>> mbox cmd response: success
3,077,372 UART: [afmc] ++
3,077,540 UART: [afmc] CDI.KEYID = 6
3,077,902 UART: [afmc] SUBJECT.KEYID = 7
3,078,327 UART: [afmc] AUTHORITY.KEYID = 5
3,113,346 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,680 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,293 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,983 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,728 UART: [afmc] --
3,156,770 UART: [cold-reset] --
3,157,762 UART: [state] Locking Datavault
3,158,971 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,575 UART: [state] Locking ICCM
3,160,043 UART: [exit] Launching FMC @ 0x40000130
3,165,372 UART:
3,165,388 UART: Running Caliptra FMC ...
3,165,796 UART:
3,165,850 UART: [state] CFI Enabled
3,176,077 UART: [fht] FMC Alias Private Key: 7
3,284,230 UART: [art] Extend RT PCRs Done
3,284,658 UART: [art] Lock RT PCRs Done
3,286,208 UART: [art] Populate DV Done
3,294,451 UART: [fht] FMC Alias Private Key: 7
3,295,569 UART: [art] Derive CDI
3,295,849 UART: [art] Store in in slot 0x4
3,381,898 UART: [art] Derive Key Pair
3,382,258 UART: [art] Store priv key in slot 0x5
3,395,440 UART: [art] Derive Key Pair - Done
3,410,088 UART: [art] Signing Cert with AUTHO
3,410,568 UART: RITY.KEYID = 7
3,425,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,661 UART: [art] PUB.X = D6A473D1E36466318CFC334F60BB7B2374B9AC72B5C0C6E8EDACFB9F4C02174EC3E3D7FBBA3BD4C4426059E6260ACA39
3,433,445 UART: [art] PUB.Y = 04EF0648A26A3C058D336D80FFA7E962E4FA30306B40E92366B9E4F9BCBE6E69324AB8021BDEE01C63F7F1D2B49007DF
3,440,392 UART: [art] SIG.R = F4B82E1675586F439F4650BA446403746B41C1293D221ADC5AE13029B954C042BC8D8D516EE4443538369B767DC5515E
3,447,151 UART: [art] SIG.S = 1190BAF5F23FCEA62622AEA36A5D870CCA813A039A9EA863AB1C6C55B56D142C9C2A12B1E3D987FCCFF93AE70F39767E
3,471,225 UART: Caliptra RT
3,471,478 UART: [state] CFI Enabled
3,580,767 UART: [rt] RT listening for mailbox commands...
3,581,437 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,589 UART: [rt]cmd =0x434b4558, len=80
3,612,554 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,985 ready_for_fw is high
1,362,985 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,390 >>> mbox cmd response: success
2,986,704 UART:
2,986,720 UART: Running Caliptra FMC ...
2,987,128 UART:
2,987,182 UART: [state] CFI Enabled
2,997,907 UART: [fht] FMC Alias Private Key: 7
3,105,906 UART: [art] Extend RT PCRs Done
3,106,334 UART: [art] Lock RT PCRs Done
3,107,928 UART: [art] Populate DV Done
3,116,301 UART: [fht] FMC Alias Private Key: 7
3,117,347 UART: [art] Derive CDI
3,117,627 UART: [art] Store in in slot 0x4
3,203,256 UART: [art] Derive Key Pair
3,203,616 UART: [art] Store priv key in slot 0x5
3,216,468 UART: [art] Derive Key Pair - Done
3,231,072 UART: [art] Signing Cert with AUTHO
3,231,552 UART: RITY.KEYID = 7
3,246,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,647 UART: [art] PUB.X = C360893DF450A06240FA97F4C8E827BD65DFE8220BEBAC2CB648FEE0D9836E83307C2125B670E53BF109DD2AF45AC6EB
3,254,427 UART: [art] PUB.Y = DDEDE8283A5DD7E6ABFAACBF19EBBE4C863F5B4B8FDC07FB8D00A760D6B4F579F73005FBF330184DFC90FCAE1A3B2213
3,261,383 UART: [art] SIG.R = FCDC30AAFF1AD015C081394E91B326F8FFF676891ECB71676EC1B060277E932915F49BB6F3755998ABC37F9A2A9FE129
3,268,163 UART: [art] SIG.S = AD801AFD3ED6ED82EAC6FF1D15BCDEF6617D2AAB6C7844266372A086334A36C567655D94D934DD111BBF967035503B32
3,291,690 UART: Caliptra RT
3,291,943 UART: [state] CFI Enabled
3,399,929 UART: [rt] RT listening for mailbox commands...
3,400,599 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,009 UART: [rt]cmd =0x434b4558, len=80
3,432,022 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,544 UART: [kat] SHA2-256
882,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,590 UART: [kat] ++
886,742 UART: [kat] sha1
890,888 UART: [kat] SHA2-256
892,826 UART: [kat] SHA2-384
895,489 UART: [kat] SHA2-512-ACC
897,390 UART: [kat] ECC-384
902,865 UART: [kat] HMAC-384Kdf
907,515 UART: [kat] LMS
1,475,711 UART: [kat] --
1,476,508 UART: [cold-reset] ++
1,476,934 UART: [fht] Storing FHT @ 0x50003400
1,479,869 UART: [idev] ++
1,480,037 UART: [idev] CDI.KEYID = 6
1,480,397 UART: [idev] SUBJECT.KEYID = 7
1,480,821 UART: [idev] UDS.KEYID = 0
1,481,166 ready_for_fw is high
1,481,166 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,001 UART: [idev] Erasing UDS.KEYID = 0
1,505,663 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,217 UART: [idev] --
1,515,150 UART: [ldev] ++
1,515,318 UART: [ldev] CDI.KEYID = 6
1,515,681 UART: [ldev] SUBJECT.KEYID = 5
1,516,107 UART: [ldev] AUTHORITY.KEYID = 7
1,516,570 UART: [ldev] FE.KEYID = 1
1,521,634 UART: [ldev] Erasing FE.KEYID = 1
1,547,431 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,239 UART: [ldev] --
1,586,728 UART: [fwproc] Waiting for Commands...
1,587,399 UART: [fwproc] Received command 0x46574c44
1,588,190 UART: [fwproc] Received Image of size 114168 bytes
2,884,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,122 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,171 >>> mbox cmd response: success
3,077,315 UART: [afmc] ++
3,077,483 UART: [afmc] CDI.KEYID = 6
3,077,845 UART: [afmc] SUBJECT.KEYID = 7
3,078,270 UART: [afmc] AUTHORITY.KEYID = 5
3,113,309 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,399 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,907 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,792 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,482 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,401 UART: [afmc] --
3,156,465 UART: [cold-reset] --
3,157,505 UART: [state] Locking Datavault
3,158,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,410 UART: [state] Locking ICCM
3,160,012 UART: [exit] Launching FMC @ 0x40000130
3,165,341 UART:
3,165,357 UART: Running Caliptra FMC ...
3,165,765 UART:
3,165,908 UART: [state] CFI Enabled
3,176,603 UART: [fht] FMC Alias Private Key: 7
3,284,636 UART: [art] Extend RT PCRs Done
3,285,064 UART: [art] Lock RT PCRs Done
3,286,434 UART: [art] Populate DV Done
3,294,619 UART: [fht] FMC Alias Private Key: 7
3,295,743 UART: [art] Derive CDI
3,296,023 UART: [art] Store in in slot 0x4
3,381,304 UART: [art] Derive Key Pair
3,381,664 UART: [art] Store priv key in slot 0x5
3,394,118 UART: [art] Derive Key Pair - Done
3,408,989 UART: [art] Signing Cert with AUTHO
3,409,469 UART: RITY.KEYID = 7
3,424,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,710 UART: [art] PUB.X = FC7957E19D5F75EF8DBDFA1C69992E6A06D6C1B3ECD4F83E423FA804A27ABA78C7DD4EF4ACDD8153ADB2199A5EE2BC41
3,432,504 UART: [art] PUB.Y = 9AB3F000C6C94D2C50EB90486138881D307409A3DCE52ACE74848ED40018B60F428476BC547E4694F3AE8B276D4DB7CE
3,439,408 UART: [art] SIG.R = D6916505E21CB2796775349BF51B4D01629051B2D5C78E9432DB971A6B60D161E4A22CC9234F7A5921DDCB79B0B1B1B9
3,446,172 UART: [art] SIG.S = EF1C3C976C484D0222A43166A50162BCD052C9B1EC85F573725D70FB202F959D72F5BBA2A1231B5D4230A774B92B8D13
3,470,213 UART: Caliptra RT
3,470,558 UART: [state] CFI Enabled
3,578,304 UART: [rt] RT listening for mailbox commands...
3,578,974 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,176 UART: [rt]cmd =0x434b4558, len=80
3,610,303 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,590 ready_for_fw is high
1,362,590 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,705 >>> mbox cmd response: success
2,990,617 UART:
2,990,633 UART: Running Caliptra FMC ...
2,991,041 UART:
2,991,184 UART: [state] CFI Enabled
3,001,477 UART: [fht] FMC Alias Private Key: 7
3,109,802 UART: [art] Extend RT PCRs Done
3,110,230 UART: [art] Lock RT PCRs Done
3,111,824 UART: [art] Populate DV Done
3,119,673 UART: [fht] FMC Alias Private Key: 7
3,120,811 UART: [art] Derive CDI
3,121,091 UART: [art] Store in in slot 0x4
3,206,914 UART: [art] Derive Key Pair
3,207,274 UART: [art] Store priv key in slot 0x5
3,220,148 UART: [art] Derive Key Pair - Done
3,235,088 UART: [art] Signing Cert with AUTHO
3,235,568 UART: RITY.KEYID = 7
3,250,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,349 UART: [art] PUB.X = D56AA2924464FF0402D40C12B350D56850A774C619F4EAD3BFDA788BEFD4F76D505C6E3A359B13F5068DFF34BDF5B159
3,258,119 UART: [art] PUB.Y = 7E925123118C8D987FD2EB484E511A2E1F977BAAE4255F4F3115F0D25BA567F37F893216B30F3FB6DC8BFEB767E48C58
3,265,074 UART: [art] SIG.R = 35679CD90F5F0B20B9BC1D332E2EDC08CE89527B702D991154AAED35A64A2B6B6F301B9DD4BB6B69E6611A312A83B719
3,271,845 UART: [art] SIG.S = 29C09BA6655E486E4CEDFF2B8F2B4A6A3F5B0DED17262018D0C6A4497B7A7003CEFB67F7D57C76B85F7D871F1964285C
3,295,778 UART: Caliptra RT
3,296,123 UART: [state] CFI Enabled
3,404,127 UART: [rt] RT listening for mailbox commands...
3,404,797 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,089 UART: [rt]cmd =0x434b4558, len=80
3,436,144 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,296 UART: [kat] SHA2-256
892,946 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,071 UART: [kat] ++
897,223 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,070 UART: [kat] SHA2-512-ACC
907,971 UART: [kat] ECC-384
917,264 UART: [kat] HMAC-384Kdf
921,778 UART: [kat] LMS
1,170,106 UART: [kat] --
1,171,029 UART: [cold-reset] ++
1,171,535 UART: [fht] FHT @ 0x50003400
1,174,034 UART: [idev] ++
1,174,202 UART: [idev] CDI.KEYID = 6
1,174,562 UART: [idev] SUBJECT.KEYID = 7
1,174,986 UART: [idev] UDS.KEYID = 0
1,175,331 ready_for_fw is high
1,175,331 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,816 UART: [idev] Erasing UDS.KEYID = 0
1,199,809 UART: [idev] Sha1 KeyId Algorithm
1,208,293 UART: [idev] --
1,209,227 UART: [ldev] ++
1,209,395 UART: [ldev] CDI.KEYID = 6
1,209,758 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,242,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,178 UART: [fwproc] Wait for Commands...
1,281,924 UART: [fwproc] Recv command 0x46574c44
1,282,652 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,487 >>> mbox cmd response: success
2,772,637 UART: [afmc] ++
2,772,805 UART: [afmc] CDI.KEYID = 6
2,773,167 UART: [afmc] SUBJECT.KEYID = 7
2,773,592 UART: [afmc] AUTHORITY.KEYID = 5
2,809,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,932 UART: [afmc] --
2,852,992 UART: [cold-reset] --
2,853,894 UART: [state] Locking Datavault
2,855,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,747 UART: [state] Locking ICCM
2,856,385 UART: [exit] Launching FMC @ 0x40000130
2,861,714 UART:
2,861,730 UART: Running Caliptra FMC ...
2,862,138 UART:
2,862,192 UART: [state] CFI Enabled
2,872,803 UART: [fht] FMC Alias Private Key: 7
2,981,188 UART: [art] Extend RT PCRs Done
2,981,616 UART: [art] Lock RT PCRs Done
2,983,066 UART: [art] Populate DV Done
2,991,501 UART: [fht] FMC Alias Private Key: 7
2,992,643 UART: [art] Derive CDI
2,992,923 UART: [art] Store in in slot 0x4
3,078,466 UART: [art] Derive Key Pair
3,078,826 UART: [art] Store priv key in slot 0x5
3,091,622 UART: [art] Derive Key Pair - Done
3,106,351 UART: [art] Signing Cert with AUTHO
3,106,831 UART: RITY.KEYID = 7
3,121,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,488 UART: [art] PUB.X = 0298660C99BA53042ED13E8F8586758FE9C2BE9EE39AC958BD1AE88F947E4C65D74E957F127BCAEA8707A3FBC6439943
3,129,254 UART: [art] PUB.Y = B0E5B1F50E6DFDF6C09AA67C7D771CD5D3860D07771B076559CEECF8868D53AF3C1E3B4E6279C064BBC63977FA8E6AE5
3,136,210 UART: [art] SIG.R = 129F44FCACAD6E91D0A27BD96C1CC8F24A0B19E71ACA15C5ED1C2709171EE28D9A3D3B40FEBC477616CDF58E9755F102
3,142,991 UART: [art] SIG.S = D92BDB8E2E6D233D573027FF372B78571F9DEFFE9F327D91790FCC0B9BC6E53B43566E649CE529F47EC77B229BFA5C64
3,166,908 UART: Caliptra RT
3,167,161 UART: [state] CFI Enabled
3,274,920 UART: [rt] RT listening for mailbox commands...
3,275,590 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,706 UART: [rt]cmd =0x434b4558, len=80
3,306,787 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,567 ready_for_fw is high
1,059,567 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,048 >>> mbox cmd response: success
2,688,386 UART:
2,688,402 UART: Running Caliptra FMC ...
2,688,810 UART:
2,688,864 UART: [state] CFI Enabled
2,699,541 UART: [fht] FMC Alias Private Key: 7
2,807,126 UART: [art] Extend RT PCRs Done
2,807,554 UART: [art] Lock RT PCRs Done
2,809,344 UART: [art] Populate DV Done
2,817,471 UART: [fht] FMC Alias Private Key: 7
2,818,565 UART: [art] Derive CDI
2,818,845 UART: [art] Store in in slot 0x4
2,904,114 UART: [art] Derive Key Pair
2,904,474 UART: [art] Store priv key in slot 0x5
2,918,272 UART: [art] Derive Key Pair - Done
2,932,865 UART: [art] Signing Cert with AUTHO
2,933,345 UART: RITY.KEYID = 7
2,948,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,000 UART: [art] PUB.X = 2F32787D7CEE4B127DD103A0CAAFC3EFE0B2381CDE1235E4F62988C987640B3F22C865EC2BB50952AC86DEBD2DBE24A0
2,955,781 UART: [art] PUB.Y = 4DCA8F7C5F685C15E15A062233431E559EA229AC73A1E4584C972EFECE0635E7716580A66D89B24A1B2F5404CB0C5426
2,962,721 UART: [art] SIG.R = AAAC2C1F65601B352B37304CE6C8EFCF9909DD3C3FBF018F7C1E78D5CB2BC716C92524D4EBE1359F888C7AB9995DBD6C
2,969,507 UART: [art] SIG.S = 4D109F5306025426613BAE4F68743A5609AC69EC723818F5E142A2C6912AC03046E0A93933D8F87AF17E0CE309ED7FFF
2,993,293 UART: Caliptra RT
2,993,546 UART: [state] CFI Enabled
3,101,033 UART: [rt] RT listening for mailbox commands...
3,101,703 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,747 UART: [rt]cmd =0x434b4558, len=80
3,132,778 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,291 UART: [kat] SHA2-256
893,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,066 UART: [kat] ++
898,218 UART: [kat] sha1
902,682 UART: [kat] SHA2-256
904,622 UART: [kat] SHA2-384
907,219 UART: [kat] SHA2-512-ACC
909,120 UART: [kat] ECC-384
919,059 UART: [kat] HMAC-384Kdf
923,605 UART: [kat] LMS
1,171,933 UART: [kat] --
1,172,954 UART: [cold-reset] ++
1,173,398 UART: [fht] FHT @ 0x50003400
1,176,181 UART: [idev] ++
1,176,349 UART: [idev] CDI.KEYID = 6
1,176,709 UART: [idev] SUBJECT.KEYID = 7
1,177,133 UART: [idev] UDS.KEYID = 0
1,177,478 ready_for_fw is high
1,177,478 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,871 UART: [idev] Erasing UDS.KEYID = 0
1,202,164 UART: [idev] Sha1 KeyId Algorithm
1,210,460 UART: [idev] --
1,211,646 UART: [ldev] ++
1,211,814 UART: [ldev] CDI.KEYID = 6
1,212,177 UART: [ldev] SUBJECT.KEYID = 5
1,212,603 UART: [ldev] AUTHORITY.KEYID = 7
1,213,066 UART: [ldev] FE.KEYID = 1
1,218,356 UART: [ldev] Erasing FE.KEYID = 1
1,244,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,140 UART: [ldev] --
1,283,511 UART: [fwproc] Wait for Commands...
1,284,137 UART: [fwproc] Recv command 0x46574c44
1,284,865 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,177 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,652 >>> mbox cmd response: success
2,773,662 UART: [afmc] ++
2,773,830 UART: [afmc] CDI.KEYID = 6
2,774,192 UART: [afmc] SUBJECT.KEYID = 7
2,774,617 UART: [afmc] AUTHORITY.KEYID = 5
2,809,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,189 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,917 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,802 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,521 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,275 UART: [afmc] --
2,853,161 UART: [cold-reset] --
2,854,135 UART: [state] Locking Datavault
2,855,218 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,822 UART: [state] Locking ICCM
2,856,244 UART: [exit] Launching FMC @ 0x40000130
2,861,573 UART:
2,861,589 UART: Running Caliptra FMC ...
2,861,997 UART:
2,862,140 UART: [state] CFI Enabled
2,872,891 UART: [fht] FMC Alias Private Key: 7
2,981,474 UART: [art] Extend RT PCRs Done
2,981,902 UART: [art] Lock RT PCRs Done
2,983,530 UART: [art] Populate DV Done
2,992,021 UART: [fht] FMC Alias Private Key: 7
2,993,151 UART: [art] Derive CDI
2,993,431 UART: [art] Store in in slot 0x4
3,079,304 UART: [art] Derive Key Pair
3,079,664 UART: [art] Store priv key in slot 0x5
3,092,476 UART: [art] Derive Key Pair - Done
3,107,027 UART: [art] Signing Cert with AUTHO
3,107,507 UART: RITY.KEYID = 7
3,123,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,944 UART: [art] PUB.X = F4208B97662EAFB125D964F5B3D9F5ECF49D024B4CAE7FB40A254853BF5F92469AABFB2C14A61CC481087C4F1CB94ADA
3,130,725 UART: [art] PUB.Y = ADCF6F71E50F1B197BC210E34E7EF38BC4DCB43E30AFB5604DA0490282EF349797424D275D0C7ECC7DDF4C395AFF12B6
3,137,686 UART: [art] SIG.R = E3A4888A38E9AB7EDBDE58993F51F5427D66CEB00E6A42CE922F2B68C2DDF187D7C06D799133AF875C24F75455C2B9A0
3,144,465 UART: [art] SIG.S = C152E15785B4EB06B226357EB8604E88FA9675BE6180EBAC216379749E3DEFFB855C548FEE05409AD87DEB340556815E
3,168,269 UART: Caliptra RT
3,168,614 UART: [state] CFI Enabled
3,276,590 UART: [rt] RT listening for mailbox commands...
3,277,260 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,294 UART: [rt]cmd =0x434b4558, len=80
3,308,441 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,232 ready_for_fw is high
1,060,232 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,221 >>> mbox cmd response: success
2,687,497 UART:
2,687,513 UART: Running Caliptra FMC ...
2,687,921 UART:
2,688,064 UART: [state] CFI Enabled
2,698,807 UART: [fht] FMC Alias Private Key: 7
2,806,554 UART: [art] Extend RT PCRs Done
2,806,982 UART: [art] Lock RT PCRs Done
2,808,336 UART: [art] Populate DV Done
2,816,591 UART: [fht] FMC Alias Private Key: 7
2,817,577 UART: [art] Derive CDI
2,817,857 UART: [art] Store in in slot 0x4
2,903,824 UART: [art] Derive Key Pair
2,904,184 UART: [art] Store priv key in slot 0x5
2,917,508 UART: [art] Derive Key Pair - Done
2,932,068 UART: [art] Signing Cert with AUTHO
2,932,548 UART: RITY.KEYID = 7
2,947,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,749 UART: [art] PUB.X = 80BEB4FEFAAF866BCE8636754E9D48180B7DCE0A6F9B46E1085F69E2732BB8125BE1E7728DE59D0DD85C24A64BF4F964
2,955,523 UART: [art] PUB.Y = D520199DB6CE9710A985BF94B6C7AE4367406ED13ACB8EE3BD63C1DF3ED8CC364FFDD1C1BDFF016D63C092C2530785C8
2,962,487 UART: [art] SIG.R = F0B8BC28B42CC06924F5708EED1A78D1DE63DAA690222CA87722DC9514668124A557EF6BEDAE82AC46E5CD17C44635F5
2,969,269 UART: [art] SIG.S = 93F60D95C6FE12EBEC9B5D3F56DEE78798D853835A0C320214578CFBCDD77B7C4645D6662AD7547683AEB4E148C3F6A1
2,993,113 UART: Caliptra RT
2,993,458 UART: [state] CFI Enabled
3,100,740 UART: [rt] RT listening for mailbox commands...
3,101,410 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,838 UART: [rt]cmd =0x434b4558, len=80
3,132,975 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,119 UART: [kat] ++
895,271 UART: [kat] sha1
899,477 UART: [kat] SHA2-256
901,417 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,170,125 UART: [fht] FHT @ 0x50003400
1,172,845 UART: [idev] ++
1,173,013 UART: [idev] CDI.KEYID = 6
1,173,374 UART: [idev] SUBJECT.KEYID = 7
1,173,799 UART: [idev] UDS.KEYID = 0
1,174,145 ready_for_fw is high
1,174,145 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,209,222 UART: [ldev] ++
1,209,390 UART: [ldev] CDI.KEYID = 6
1,209,754 UART: [ldev] SUBJECT.KEYID = 5
1,210,181 UART: [ldev] AUTHORITY.KEYID = 7
1,210,644 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,241,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,593 UART: [fwproc] Recv command 0x46574c44
1,282,326 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,710 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,236 >>> mbox cmd response: success
2,772,293 UART: [afmc] ++
2,772,461 UART: [afmc] CDI.KEYID = 6
2,772,824 UART: [afmc] SUBJECT.KEYID = 7
2,773,250 UART: [afmc] AUTHORITY.KEYID = 5
2,809,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,737 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,140 UART: [afmc] --
2,853,224 UART: [cold-reset] --
2,853,820 UART: [state] Locking Datavault
2,855,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,847 UART: [state] Locking ICCM
2,856,477 UART: [exit] Launching FMC @ 0x40000130
2,861,806 UART:
2,861,822 UART: Running Caliptra FMC ...
2,862,230 UART:
2,862,284 UART: [state] CFI Enabled
2,872,859 UART: [fht] FMC Alias Private Key: 7
2,979,992 UART: [art] Extend RT PCRs Done
2,980,420 UART: [art] Lock RT PCRs Done
2,982,236 UART: [art] Populate DV Done
2,990,551 UART: [fht] FMC Alias Private Key: 7
2,991,665 UART: [art] Derive CDI
2,991,945 UART: [art] Store in in slot 0x4
3,077,556 UART: [art] Derive Key Pair
3,077,916 UART: [art] Store priv key in slot 0x5
3,091,084 UART: [art] Derive Key Pair - Done
3,105,556 UART: [art] Signing Cert with AUTHO
3,106,036 UART: RITY.KEYID = 7
3,121,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,235 UART: [art] PUB.X = 267067ED5FF0930055BFD1639BFFF561FCC1E8B123EC957876D8D63FA90E282D891146297F57A25D807845DC6636C491
3,128,978 UART: [art] PUB.Y = CA169635EE508885A00FD504F84514633FEA017178CCF17A13136553C0B73C0AD38B7C71A54483807FE7F07F4A02DB64
3,135,911 UART: [art] SIG.R = C378D0885566DDFE111FF2A918B7817B531131A0C5C7991954A73990C30C880D48DBE806F138485D569604FAD8A5D81D
3,142,665 UART: [art] SIG.S = 09893DDD63C1821EA4C94F8F631372945A8249478B6DA2D1243CC82DD520A4548497825CB3099D9E7EC836F138713995
3,166,720 UART: Caliptra RT
3,166,973 UART: [state] CFI Enabled
3,274,612 UART: [rt] RT listening for mailbox commands...
3,275,282 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,338 UART: [rt]cmd =0x434b4558, len=80
3,306,311 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,548 ready_for_fw is high
1,056,548 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,333 >>> mbox cmd response: success
2,683,215 UART:
2,683,231 UART: Running Caliptra FMC ...
2,683,639 UART:
2,683,693 UART: [state] CFI Enabled
2,693,996 UART: [fht] FMC Alias Private Key: 7
2,802,179 UART: [art] Extend RT PCRs Done
2,802,607 UART: [art] Lock RT PCRs Done
2,804,149 UART: [art] Populate DV Done
2,812,426 UART: [fht] FMC Alias Private Key: 7
2,813,498 UART: [art] Derive CDI
2,813,778 UART: [art] Store in in slot 0x4
2,899,493 UART: [art] Derive Key Pair
2,899,853 UART: [art] Store priv key in slot 0x5
2,912,353 UART: [art] Derive Key Pair - Done
2,926,929 UART: [art] Signing Cert with AUTHO
2,927,409 UART: RITY.KEYID = 7
2,942,723 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,488 UART: [art] PUB.X = F5B9CFC1670ACE43200C560786DC3EBB387B5E0385AEB38A62E2E2807070D639A67A3DBD9EDB5D9061AC314DF14880BF
2,950,260 UART: [art] PUB.Y = 44D3A45FA920C0A3CFAA4A4D95D907A5FE379829C4C38212C2463B0EB346E9302BE09145D0706FBF0F790DB4EA154526
2,957,204 UART: [art] SIG.R = 6BA577963D0AFA3FF6B43AF22547EB3CB0751360B0BC20A8829F2F25D976D13575DD6D650FD7507AA0D3B5437D9C3766
2,963,974 UART: [art] SIG.S = 2C672075408EC6D59189B636894CB6B869BA25AE5BE1A02A737CC014D090FC5759FC10BFF46AB081ADD5CC70C30F8663
2,988,000 UART: Caliptra RT
2,988,253 UART: [state] CFI Enabled
3,095,566 UART: [rt] RT listening for mailbox commands...
3,096,236 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,266 UART: [rt]cmd =0x434b4558, len=80
3,127,483 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,152 UART: [kat] SHA2-256
902,092 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,193 UART: [kat] HMAC-384Kdf
920,835 UART: [kat] LMS
1,169,147 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,174,372 ready_for_fw is high
1,174,372 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,574 UART: [idev] Erasing UDS.KEYID = 0
1,198,398 UART: [idev] Sha1 KeyId Algorithm
1,207,372 UART: [idev] --
1,208,351 UART: [ldev] ++
1,208,519 UART: [ldev] CDI.KEYID = 6
1,208,883 UART: [ldev] SUBJECT.KEYID = 5
1,209,310 UART: [ldev] AUTHORITY.KEYID = 7
1,209,773 UART: [ldev] FE.KEYID = 1
1,214,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,871 UART: [ldev] --
1,281,313 UART: [fwproc] Wait for Commands...
1,281,996 UART: [fwproc] Recv command 0x46574c44
1,282,729 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,772 >>> mbox cmd response: success
2,771,837 UART: [afmc] ++
2,772,005 UART: [afmc] CDI.KEYID = 6
2,772,368 UART: [afmc] SUBJECT.KEYID = 7
2,772,794 UART: [afmc] AUTHORITY.KEYID = 5
2,808,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,171 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,773 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,582 UART: [afmc] --
2,851,664 UART: [cold-reset] --
2,852,484 UART: [state] Locking Datavault
2,853,793 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,397 UART: [state] Locking ICCM
2,855,067 UART: [exit] Launching FMC @ 0x40000130
2,860,396 UART:
2,860,412 UART: Running Caliptra FMC ...
2,860,820 UART:
2,860,963 UART: [state] CFI Enabled
2,871,800 UART: [fht] FMC Alias Private Key: 7
2,979,779 UART: [art] Extend RT PCRs Done
2,980,207 UART: [art] Lock RT PCRs Done
2,981,401 UART: [art] Populate DV Done
2,989,578 UART: [fht] FMC Alias Private Key: 7
2,990,690 UART: [art] Derive CDI
2,990,970 UART: [art] Store in in slot 0x4
3,076,887 UART: [art] Derive Key Pair
3,077,247 UART: [art] Store priv key in slot 0x5
3,090,007 UART: [art] Derive Key Pair - Done
3,105,042 UART: [art] Signing Cert with AUTHO
3,105,522 UART: RITY.KEYID = 7
3,120,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,373 UART: [art] PUB.X = 3289128F4AFA641F8426945678A6F21387832580FEB984464F6DAC665847669B069CD87AC9E970DD61115775BAE9EBD0
3,128,134 UART: [art] PUB.Y = B7DA1ADB9B25E6ED918674B9E51EDD2A34C5BF90FE28672DDF4A321AB49CF2AF5F4AEB278A684F2EB35F48DAA5A25D11
3,135,112 UART: [art] SIG.R = 9B9F9144179B3F876CDA57E8E377A79A571EF60E6021A47E7C4F56268F8E45322E0ABBF4247E158D98A8D19629CC909A
3,141,878 UART: [art] SIG.S = 2D75D0548B641C79F521DFB8CEC3E02CB7570EFC41D8057074956F9F989A8BC8D87F1FDE67912E7FFC911144B2D91931
3,165,981 UART: Caliptra RT
3,166,326 UART: [state] CFI Enabled
3,274,153 UART: [rt] RT listening for mailbox commands...
3,274,823 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,393 UART: [rt]cmd =0x434b4558, len=80
3,306,556 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 ready_for_fw is high
1,056,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,708 >>> mbox cmd response: success
2,681,872 UART:
2,681,888 UART: Running Caliptra FMC ...
2,682,296 UART:
2,682,439 UART: [state] CFI Enabled
2,692,884 UART: [fht] FMC Alias Private Key: 7
2,800,649 UART: [art] Extend RT PCRs Done
2,801,077 UART: [art] Lock RT PCRs Done
2,802,463 UART: [art] Populate DV Done
2,810,456 UART: [fht] FMC Alias Private Key: 7
2,811,510 UART: [art] Derive CDI
2,811,790 UART: [art] Store in in slot 0x4
2,897,815 UART: [art] Derive Key Pair
2,898,175 UART: [art] Store priv key in slot 0x5
2,911,307 UART: [art] Derive Key Pair - Done
2,925,952 UART: [art] Signing Cert with AUTHO
2,926,432 UART: RITY.KEYID = 7
2,941,494 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,259 UART: [art] PUB.X = 086615CF7E5BD3C06F25CE3842FBDEF5317732ADF7027454DF6E8E95F51C9CE293FAFDF9F10907E0845D85707D57BF07
2,949,024 UART: [art] PUB.Y = 929A250FE091CCD67DEC6CBE9949BCD3C8E378E5A6D9DAE6028ABD3AECA421DBC0229445D54117944588FA6FC95DE484
2,955,986 UART: [art] SIG.R = 70776D43ED0EE830DBD92C460B531206550F4AC2EEF7061DAF6CBBDC8B1A9D26259A12DD5C5F584D9E07173F41A28586
2,962,748 UART: [art] SIG.S = 46D6231A0F70D76FA04E9013E17E2CC95E3A62BE8662A52A3CEAB5B17AE8B21B5702A2C29372E9437CD2522936FC30E5
2,986,587 UART: Caliptra RT
2,986,932 UART: [state] CFI Enabled
3,093,625 UART: [rt] RT listening for mailbox commands...
3,094,295 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,609 UART: [rt]cmd =0x434b4558, len=80
3,125,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,097 UART:
192,491 UART: Running Caliptra ROM ...
193,702 UART:
193,857 UART: [state] CFI Enabled
263,968 UART: [state] LifecycleState = Unprovisioned
265,899 UART: [state] DebugLocked = No
267,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,005 UART: [kat] SHA2-256
441,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,210 UART: [kat] ++
452,727 UART: [kat] sha1
463,664 UART: [kat] SHA2-256
466,385 UART: [kat] SHA2-384
472,176 UART: [kat] SHA2-512-ACC
474,536 UART: [kat] ECC-384
2,766,621 UART: [kat] HMAC-384Kdf
2,799,379 UART: [kat] LMS
3,989,723 UART: [kat] --
3,993,287 UART: [cold-reset] ++
3,994,572 UART: [fht] Storing FHT @ 0x50003400
4,007,318 UART: [idev] ++
4,007,879 UART: [idev] CDI.KEYID = 6
4,008,867 UART: [idev] SUBJECT.KEYID = 7
4,010,109 UART: [idev] UDS.KEYID = 0
4,011,161 ready_for_fw is high
4,011,387 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,626 UART: [idev] Erasing UDS.KEYID = 0
7,349,421 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,305 UART: [idev] --
7,377,663 UART: [ldev] ++
7,378,265 UART: [ldev] CDI.KEYID = 6
7,379,205 UART: [ldev] SUBJECT.KEYID = 5
7,380,414 UART: [ldev] AUTHORITY.KEYID = 7
7,381,615 UART: [ldev] FE.KEYID = 1
7,425,444 UART: [ldev] Erasing FE.KEYID = 1
10,755,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,426 UART: [ldev] --
13,118,919 UART: [fwproc] Waiting for Commands...
13,121,921 UART: [fwproc] Received command 0x46574c44
13,124,142 UART: [fwproc] Received Image of size 113844 bytes
17,173,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,939 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,596 >>> mbox cmd response: success
17,638,043 UART: [afmc] ++
17,638,648 UART: [afmc] CDI.KEYID = 6
17,639,581 UART: [afmc] SUBJECT.KEYID = 7
17,640,795 UART: [afmc] AUTHORITY.KEYID = 5
21,010,795 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,312,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,314,532 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,328,938 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,343,802 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,358,234 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,379,178 UART: [afmc] --
23,382,204 UART: [cold-reset] --
23,386,818 UART: [state] Locking Datavault
23,391,813 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,512 UART: [state] Locking ICCM
23,394,957 UART: [exit] Launching FMC @ 0x40000130
23,403,296 UART:
23,403,525 UART: Running Caliptra FMC ...
23,404,620 UART:
23,404,773 UART: [state] CFI Enabled
23,463,760 UART: [fht] FMC Alias Private Key: 7
25,801,274 UART: [art] Extend RT PCRs Done
25,802,487 UART: [art] Lock RT PCRs Done
25,804,272 UART: [art] Populate DV Done
25,809,680 UART: [fht] FMC Alias Private Key: 7
25,811,264 UART: [art] Derive CDI
25,812,088 UART: [art] Store in in slot 0x4
25,872,108 UART: [art] Derive Key Pair
25,873,135 UART: [art] Store priv key in slot 0x5
29,165,776 UART: [art] Derive Key Pair - Done
29,178,435 UART: [art] Signing Cert with AUTHO
29,179,728 UART: RITY.KEYID = 7
31,467,831 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,334 UART: [art] PUB.X = 8E16FCC88EF4E61E4CE640C83ED0B8A9FB9BDE40B10477719BCC087E1E543ADE9C136945414C2E04D340197F27ED3A2C
31,476,588 UART: [art] PUB.Y = D5FFE8D131ABFD0800BD618A4E07D379DE95FD0859BE4E517F5C2327C023442C1771EA287986FC16BD728A030C9461F0
31,483,792 UART: [art] SIG.R = 0F3BFAC62492F7BA5E136345323DC375AA470925B01357CE566B4D8D37BE952949468FF7E550ED90EAE022B660B9724C
31,491,203 UART: [art] SIG.S = 4B0CD61B1594031271B3A02300579481719F3CA49FB3EFC22C30ED0F7C01350C2187C38991B34030D0A8A82BCF028A6B
32,795,510 UART: Caliptra RT
32,796,209 UART: [state] CFI Enabled
32,957,010 UART: [rt] RT listening for mailbox commands...
32,958,968 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,990,161 UART: [rt]cmd =0x44504543, len=92
32,996,507 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,786,214 ready_for_fw is high
3,786,840 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,869,583 >>> mbox cmd response: success
23,550,349 UART:
23,550,773 UART: Running Caliptra FMC ...
23,551,877 UART:
23,552,023 UART: [state] CFI Enabled
23,621,001 UART: [fht] FMC Alias Private Key: 7
25,958,890 UART: [art] Extend RT PCRs Done
25,960,118 UART: [art] Lock RT PCRs Done
25,961,770 UART: [art] Populate DV Done
25,967,233 UART: [fht] FMC Alias Private Key: 7
25,968,765 UART: [art] Derive CDI
25,969,491 UART: [art] Store in in slot 0x4
26,029,665 UART: [art] Derive Key Pair
26,030,703 UART: [art] Store priv key in slot 0x5
29,323,273 UART: [art] Derive Key Pair - Done
29,336,117 UART: [art] Signing Cert with AUTHO
29,337,414 UART: RITY.KEYID = 7
31,625,863 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,368 UART: [art] PUB.X = 3F30CBBC275141E2A88F621CE45E5F6611ADF760E0809328A63E2EB68D45B3D1F0369D760CD94DF5124B04609AE5A431
31,634,657 UART: [art] PUB.Y = C2FF643FCF1D00B668A7C866CA31A2567DD87BDFACD378FF83B6CC388BF2BC730A36E1750072D558F886D3D5AFFE4784
31,641,864 UART: [art] SIG.R = 52E3A3447421B962149E2B08FC8DDE724A6D056C0D33666531293E9B57BA03A9532EC24AC4951F717BF6CE2958685875
31,649,225 UART: [art] SIG.S = 36CDC56E2865166804295571B420B31D82E2ECC1212F336D5FF29AF48272598DD85C72C9FCEA46DCF25337CFA0370BA8
32,954,089 UART: Caliptra RT
32,954,805 UART: [state] CFI Enabled
33,117,595 UART: [rt] RT listening for mailbox commands...
33,119,516 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,150,717 UART: [rt]cmd =0x44504543, len=92
33,157,473 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,512 UART:
192,865 UART: Running Caliptra ROM ...
194,066 UART:
603,880 UART: [state] CFI Enabled
619,885 UART: [state] LifecycleState = Unprovisioned
621,827 UART: [state] DebugLocked = No
624,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,633 UART: [kat] SHA2-256
799,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,945 UART: [kat] ++
810,499 UART: [kat] sha1
821,955 UART: [kat] SHA2-256
824,608 UART: [kat] SHA2-384
830,456 UART: [kat] SHA2-512-ACC
832,827 UART: [kat] ECC-384
3,116,149 UART: [kat] HMAC-384Kdf
3,127,171 UART: [kat] LMS
4,317,335 UART: [kat] --
4,320,336 UART: [cold-reset] ++
4,322,767 UART: [fht] Storing FHT @ 0x50003400
4,334,542 UART: [idev] ++
4,335,107 UART: [idev] CDI.KEYID = 6
4,336,140 UART: [idev] SUBJECT.KEYID = 7
4,337,321 UART: [idev] UDS.KEYID = 0
4,338,312 ready_for_fw is high
4,338,512 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,749 UART: [idev] Erasing UDS.KEYID = 0
7,626,382 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,607 UART: [idev] --
7,652,864 UART: [ldev] ++
7,653,435 UART: [ldev] CDI.KEYID = 6
7,654,403 UART: [ldev] SUBJECT.KEYID = 5
7,655,625 UART: [ldev] AUTHORITY.KEYID = 7
7,656,862 UART: [ldev] FE.KEYID = 1
7,669,077 UART: [ldev] Erasing FE.KEYID = 1
10,953,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,620 UART: [ldev] --
13,314,178 UART: [fwproc] Waiting for Commands...
13,316,733 UART: [fwproc] Received command 0x46574c44
13,318,922 UART: [fwproc] Received Image of size 113844 bytes
17,364,747 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,005 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,508,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,825,195 >>> mbox cmd response: success
17,829,553 UART: [afmc] ++
17,830,151 UART: [afmc] CDI.KEYID = 6
17,831,037 UART: [afmc] SUBJECT.KEYID = 7
17,832,315 UART: [afmc] AUTHORITY.KEYID = 5
21,147,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,441 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,695 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,081 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,896 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,354 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,878 UART: [afmc] --
23,513,327 UART: [cold-reset] --
23,517,145 UART: [state] Locking Datavault
23,524,190 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,951 UART: [state] Locking ICCM
23,528,482 UART: [exit] Launching FMC @ 0x40000130
23,536,884 UART:
23,537,122 UART: Running Caliptra FMC ...
23,538,226 UART:
23,538,384 UART: [state] CFI Enabled
23,546,568 UART: [fht] FMC Alias Private Key: 7
25,877,423 UART: [art] Extend RT PCRs Done
25,878,645 UART: [art] Lock RT PCRs Done
25,880,758 UART: [art] Populate DV Done
25,886,338 UART: [fht] FMC Alias Private Key: 7
25,887,931 UART: [art] Derive CDI
25,888,774 UART: [art] Store in in slot 0x4
25,931,499 UART: [art] Derive Key Pair
25,932,542 UART: [art] Store priv key in slot 0x5
29,174,578 UART: [art] Derive Key Pair - Done
29,187,508 UART: [art] Signing Cert with AUTHO
29,188,848 UART: RITY.KEYID = 7
31,468,042 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,551 UART: [art] PUB.X = 6DB9D4815A5A71C8011874B014ADA02895347C117BDE0CBA9BE18944AC605E3EC09F292D719571211E0B5A6CA6006F97
31,476,819 UART: [art] PUB.Y = C66C419271BE9741112FFE2CFB22F8367672487F40E8F8FD2CF84224F29060883708C54CCF43C50C3DE3B89564BA4415
31,484,070 UART: [art] SIG.R = 6BBBF9C9298C8EF8262909D6F281C1C9A88C242BA662E4278FB9701D61E3F6CE2C68488FB45D18371DBC41F8E2325B81
31,491,423 UART: [art] SIG.S = ACDF10D3142FF06BE18A38C560EBFB5EB619C2C675F8F6B839430F94790E14FB1B0C40331D6E923D308A214DD8B3F055
32,797,052 UART: Caliptra RT
32,797,771 UART: [state] CFI Enabled
32,915,320 UART: [rt] RT listening for mailbox commands...
32,917,230 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,948,439 UART: [rt]cmd =0x44504543, len=92
32,954,470 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,125,262 ready_for_fw is high
4,125,867 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,057,566 >>> mbox cmd response: success
23,701,732 UART:
23,702,135 UART: Running Caliptra FMC ...
23,703,278 UART:
23,703,445 UART: [state] CFI Enabled
23,711,399 UART: [fht] FMC Alias Private Key: 7
26,042,090 UART: [art] Extend RT PCRs Done
26,043,327 UART: [art] Lock RT PCRs Done
26,044,768 UART: [art] Populate DV Done
26,050,245 UART: [fht] FMC Alias Private Key: 7
26,051,846 UART: [art] Derive CDI
26,052,666 UART: [art] Store in in slot 0x4
26,095,280 UART: [art] Derive Key Pair
26,096,330 UART: [art] Store priv key in slot 0x5
29,338,187 UART: [art] Derive Key Pair - Done
29,351,176 UART: [art] Signing Cert with AUTHO
29,352,487 UART: RITY.KEYID = 7
31,631,907 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,416 UART: [art] PUB.X = 83EEA5E7FDE869A984A7D14A4A6D76F5123BC5E028696099CA71C8DEB3CFB413DCEDBD938B7F2CA21996F940C0E57795
31,640,677 UART: [art] PUB.Y = 68E1EE6F38ED042ECF744A6242CA1D7428D96CAD79FA59C7D23CA9CC06B79DD729F8DD997E8E33725E48AF2AEF5470EE
31,647,976 UART: [art] SIG.R = 6136AE2E34965CA24CD6E5A3F03921B093C183030E7236BC804F4FEF9532A688B27386153643E7BC1A4BFBC7BC829A35
31,655,328 UART: [art] SIG.S = 64A862B2AB71CE0FBB236DDA63E0BA8A156712D1F50240EF031D55B85588DF730B6F171C4DD1ADCFB5D4DD6B0FB5DED1
32,960,253 UART: Caliptra RT
32,960,967 UART: [state] CFI Enabled
33,078,801 UART: [rt] RT listening for mailbox commands...
33,080,729 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,112,107 UART: [rt]cmd =0x44504543, len=92
33,118,682 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
192,081 UART:
192,459 UART: Running Caliptra ROM ...
193,665 UART:
193,823 UART: [state] CFI Enabled
261,892 UART: [state] LifecycleState = Unprovisioned
263,729 UART: [state] DebugLocked = No
266,191 UART: [state] WD Timer not started. Device not locked for debugging
269,652 UART: [kat] SHA2-256
448,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,368 UART: [kat] ++
460,907 UART: [kat] sha1
471,933 UART: [kat] SHA2-256
474,944 UART: [kat] SHA2-384
482,633 UART: [kat] SHA2-512-ACC
485,567 UART: [kat] ECC-384
2,948,636 UART: [kat] HMAC-384Kdf
2,974,116 UART: [kat] LMS
3,503,513 UART: [kat] --
3,508,576 UART: [cold-reset] ++
3,509,729 UART: [fht] FHT @ 0x50003400
3,521,018 UART: [idev] ++
3,521,594 UART: [idev] CDI.KEYID = 6
3,522,513 UART: [idev] SUBJECT.KEYID = 7
3,523,687 UART: [idev] UDS.KEYID = 0
3,524,615 ready_for_fw is high
3,524,829 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,500 UART: [idev] Erasing UDS.KEYID = 0
6,028,493 UART: [idev] Sha1 KeyId Algorithm
6,050,870 UART: [idev] --
6,056,170 UART: [ldev] ++
6,056,746 UART: [ldev] CDI.KEYID = 6
6,057,663 UART: [ldev] SUBJECT.KEYID = 5
6,058,832 UART: [ldev] AUTHORITY.KEYID = 7
6,060,071 UART: [ldev] FE.KEYID = 1
6,102,325 UART: [ldev] Erasing FE.KEYID = 1
8,606,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,182 UART: [ldev] --
10,416,948 UART: [fwproc] Wait for Commands...
10,418,457 UART: [fwproc] Recv command 0x46574c44
10,420,554 UART: [fwproc] Recv'd Img size: 114168 bytes
13,820,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,865 >>> mbox cmd response: success
14,286,230 UART: [afmc] ++
14,286,830 UART: [afmc] CDI.KEYID = 6
14,287,751 UART: [afmc] SUBJECT.KEYID = 7
14,288,914 UART: [afmc] AUTHORITY.KEYID = 5
16,836,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,578,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,579,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,595,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,611,818 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,627,665 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,650,137 UART: [afmc] --
18,653,880 UART: [cold-reset] --
18,657,157 UART: [state] Locking Datavault
18,661,222 UART: [state] Locking PCR0, PCR1 and PCR31
18,662,871 UART: [state] Locking ICCM
18,664,997 UART: [exit] Launching FMC @ 0x40000130
18,673,401 UART:
18,673,643 UART: Running Caliptra FMC ...
18,674,668 UART:
18,674,816 UART: [state] CFI Enabled
18,736,004 UART: [fht] FMC Alias Private Key: 7
20,499,694 UART: [art] Extend RT PCRs Done
20,500,934 UART: [art] Lock RT PCRs Done
20,502,428 UART: [art] Populate DV Done
20,508,116 UART: [fht] FMC Alias Private Key: 7
20,509,655 UART: [art] Derive CDI
20,510,418 UART: [art] Store in in slot 0x4
20,568,489 UART: [art] Derive Key Pair
20,569,522 UART: [art] Store priv key in slot 0x5
23,033,434 UART: [art] Derive Key Pair - Done
23,046,547 UART: [art] Signing Cert with AUTHO
23,047,856 UART: RITY.KEYID = 7
24,758,806 UART: [art] Erasing AUTHORITY.KEYID = 7
24,760,307 UART: [art] PUB.X = 00907C306B90205DBD2D154B159299B3C7B4CA7DED2AFDB3B6C4986FDCCD23310AB884539AB3D66FE9137708AE335204
24,767,563 UART: [art] PUB.Y = F2BF4CF5022A0795231DE3D29BDC11EDD05C99F375545DE9329913641CEED338F3FD216C5DE136E90C40A580D2FB61FF
24,774,856 UART: [art] SIG.R = FB9799EA8D280186A74702DE3084E09AFACC25029230C2DC740181F6DD8210CF65CD0C60D92F3B9C1BD90A488B1554B9
24,782,225 UART: [art] SIG.S = 9616AF8305D40BD7760EA97FED1540ADD0AEAFD4BA1CF6D3ECE1B9EC664A4B6953DE3F87B5420A2BC74006E5F91FA003
25,761,418 UART: Caliptra RT
25,762,146 UART: [state] CFI Enabled
25,927,599 UART: [rt] RT listening for mailbox commands...
25,929,664 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,961,011 UART: [rt]cmd =0x44504543, len=92
25,967,111 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,361,271 ready_for_fw is high
3,361,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,062,539 >>> mbox cmd response: success
18,346,036 UART:
18,346,429 UART: Running Caliptra FMC ...
18,347,621 UART:
18,347,788 UART: [state] CFI Enabled
18,410,666 UART: [fht] FMC Alias Private Key: 7
20,175,001 UART: [art] Extend RT PCRs Done
20,176,231 UART: [art] Lock RT PCRs Done
20,177,867 UART: [art] Populate DV Done
20,183,196 UART: [fht] FMC Alias Private Key: 7
20,184,689 UART: [art] Derive CDI
20,185,426 UART: [art] Store in in slot 0x4
20,243,601 UART: [art] Derive Key Pair
20,244,641 UART: [art] Store priv key in slot 0x5
22,707,652 UART: [art] Derive Key Pair - Done
22,720,431 UART: [art] Signing Cert with AUTHO
22,721,739 UART: RITY.KEYID = 7
24,433,721 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,228 UART: [art] PUB.X = 0FAA40D68DC54668CFAFF612E880657695A875B57F387035CED1F832FD51B7DBB8551BE5C8B50D5285719B3B22888D59
24,442,513 UART: [art] PUB.Y = 2C8B1072F0954F3FD789F9DAF09DE0DA7C50F26A578F6F9114DA73054B50D62B45666DE44BD73A0FF1825EFD19BF1191
24,449,771 UART: [art] SIG.R = 7126FAA6A8233620C5DFBCC785F41A0414B1A26C2F80EF49B0E3D948E129DA5E975343BD0B43DBE30B8A002E62F8D646
24,457,167 UART: [art] SIG.S = 2BE2A990BA6E249C0A774368E959BE75D4EC92BCCB67183BC459240292F4F49F1A8C9BABA6F775CF47814A5FA5AFB15E
25,435,329 UART: Caliptra RT
25,436,027 UART: [state] CFI Enabled
25,600,481 UART: [rt] RT listening for mailbox commands...
25,602,425 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,633,646 UART: [rt]cmd =0x44504543, len=92
25,640,112 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,791 writing to cptra_bootfsm_go
193,084 UART:
193,448 UART: Running Caliptra ROM ...
194,583 UART:
604,145 UART: [state] CFI Enabled
617,827 UART: [state] LifecycleState = Unprovisioned
619,637 UART: [state] DebugLocked = No
622,447 UART: [state] WD Timer not started. Device not locked for debugging
625,557 UART: [kat] SHA2-256
804,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,233 UART: [kat] ++
816,679 UART: [kat] sha1
828,011 UART: [kat] SHA2-256
830,990 UART: [kat] SHA2-384
837,340 UART: [kat] SHA2-512-ACC
840,345 UART: [kat] ECC-384
3,281,819 UART: [kat] HMAC-384Kdf
3,294,638 UART: [kat] LMS
3,824,139 UART: [kat] --
3,829,758 UART: [cold-reset] ++
3,831,755 UART: [fht] FHT @ 0x50003400
3,843,295 UART: [idev] ++
3,843,858 UART: [idev] CDI.KEYID = 6
3,844,769 UART: [idev] SUBJECT.KEYID = 7
3,845,939 UART: [idev] UDS.KEYID = 0
3,846,983 ready_for_fw is high
3,847,200 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,664 UART: [idev] Erasing UDS.KEYID = 0
6,315,027 UART: [idev] Sha1 KeyId Algorithm
6,337,546 UART: [idev] --
6,340,076 UART: [ldev] ++
6,340,834 UART: [ldev] CDI.KEYID = 6
6,341,752 UART: [ldev] SUBJECT.KEYID = 5
6,342,859 UART: [ldev] AUTHORITY.KEYID = 7
6,344,032 UART: [ldev] FE.KEYID = 1
6,356,031 UART: [ldev] Erasing FE.KEYID = 1
8,830,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,822 UART: [ldev] --
10,618,495 UART: [fwproc] Wait for Commands...
10,621,513 UART: [fwproc] Recv command 0x46574c44
10,623,640 UART: [fwproc] Recv'd Img size: 114168 bytes
14,016,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,090,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,158,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,476,469 >>> mbox cmd response: success
14,479,881 UART: [afmc] ++
14,480,480 UART: [afmc] CDI.KEYID = 6
14,481,395 UART: [afmc] SUBJECT.KEYID = 7
14,482,560 UART: [afmc] AUTHORITY.KEYID = 5
16,980,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,699,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,701,135 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,716,864 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,732,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,748,823 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,771,266 UART: [afmc] --
18,775,900 UART: [cold-reset] --
18,778,411 UART: [state] Locking Datavault
18,783,005 UART: [state] Locking PCR0, PCR1 and PCR31
18,784,654 UART: [state] Locking ICCM
18,786,043 UART: [exit] Launching FMC @ 0x40000130
18,794,437 UART:
18,794,671 UART: Running Caliptra FMC ...
18,795,768 UART:
18,795,934 UART: [state] CFI Enabled
18,804,032 UART: [fht] FMC Alias Private Key: 7
20,560,771 UART: [art] Extend RT PCRs Done
20,561,996 UART: [art] Lock RT PCRs Done
20,563,457 UART: [art] Populate DV Done
20,568,817 UART: [fht] FMC Alias Private Key: 7
20,570,408 UART: [art] Derive CDI
20,571,222 UART: [art] Store in in slot 0x4
20,614,052 UART: [art] Derive Key Pair
20,615,096 UART: [art] Store priv key in slot 0x5
23,042,092 UART: [art] Derive Key Pair - Done
23,054,988 UART: [art] Signing Cert with AUTHO
23,056,287 UART: RITY.KEYID = 7
24,761,228 UART: [art] Erasing AUTHORITY.KEYID = 7
24,762,732 UART: [art] PUB.X = 7DBFCDCE684AD753783511F7251F4416EECCDE83EF226FE709422AAFDDACD52F376CF470FE9EACB9C8841D888FD544D7
24,770,030 UART: [art] PUB.Y = 99EC85D545CC14D462F84AE5853C6501B9FE2D759C16A0864D35CA9E5F1B4216AEE04B7CA0CA463266B709B17AB2F554
24,777,328 UART: [art] SIG.R = BB86ECD98D79C63BD97594D219BEEF1A7853873E3C81181A96C5C41A016A0A28F6E52C87202E0AE9A9133CF6014A701C
24,784,722 UART: [art] SIG.S = 672C920FB4ED98FB6DD93180614388B108EB4B234C6463A7ABBAE46062D1B2B2F36ABB88FA4149A36CF3867513AF2BCC
25,764,242 UART: Caliptra RT
25,764,956 UART: [state] CFI Enabled
25,882,570 UART: [rt] RT listening for mailbox commands...
25,884,500 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,915,665 UART: [rt]cmd =0x44504543, len=92
25,922,238 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,777 writing to cptra_bootfsm_go
3,696,518 ready_for_fw is high
3,696,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,170 >>> mbox cmd response: success
18,518,834 UART:
18,519,236 UART: Running Caliptra FMC ...
18,520,547 UART:
18,520,715 UART: [state] CFI Enabled
18,528,414 UART: [fht] FMC Alias Private Key: 7
20,285,011 UART: [art] Extend RT PCRs Done
20,286,241 UART: [art] Lock RT PCRs Done
20,288,057 UART: [art] Populate DV Done
20,293,687 UART: [fht] FMC Alias Private Key: 7
20,295,389 UART: [art] Derive CDI
20,296,127 UART: [art] Store in in slot 0x4
20,338,679 UART: [art] Derive Key Pair
20,339,722 UART: [art] Store priv key in slot 0x5
22,766,644 UART: [art] Derive Key Pair - Done
22,779,219 UART: [art] Signing Cert with AUTHO
22,780,529 UART: RITY.KEYID = 7
24,486,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,602 UART: [art] PUB.X = 501237CC45FAB8F7CD1F702FC5558FC5EEDB0DC8BB7F82166D085E21CD44C3B726C398E20E7839B54708440B9CD9EB3A
24,494,844 UART: [art] PUB.Y = 7479BDE46AF7C8A8DEFF6064C1CC8398F7D7914FE88F6EF5F752AEE0E32630EB05E66A15B0DC9E3900610E0D4C036165
24,502,163 UART: [art] SIG.R = 536A754FF3FDC73B5A8DF7F41F2BE0D21F22559FC3731FE3B43336C2B272327D2009E7C95F022141444A62DE64E0984E
24,509,524 UART: [art] SIG.S = 334F8A36E33E353B3C6710E45E9F1A65D641AB45685F4188C28F35919ACBB379C856A90AD578379788E1894D8B326D02
25,488,839 UART: Caliptra RT
25,489,542 UART: [state] CFI Enabled
25,606,213 UART: [rt] RT listening for mailbox commands...
25,608,138 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,639,449 UART: [rt]cmd =0x44504543, len=92
25,646,135 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,098 UART:
192,469 UART: Running Caliptra ROM ...
193,667 UART:
193,834 UART: [state] CFI Enabled
263,069 UART: [state] LifecycleState = Unprovisioned
265,450 UART: [state] DebugLocked = No
266,759 UART: [state] WD Timer not started. Device not locked for debugging
270,458 UART: [kat] SHA2-256
460,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,931 UART: [kat] ++
471,407 UART: [kat] sha1
483,926 UART: [kat] SHA2-256
486,968 UART: [kat] SHA2-384
492,750 UART: [kat] SHA2-512-ACC
495,360 UART: [kat] ECC-384
2,947,692 UART: [kat] HMAC-384Kdf
2,971,664 UART: [kat] LMS
3,503,377 UART: [kat] --
3,509,228 UART: [cold-reset] ++
3,511,317 UART: [fht] FHT @ 0x50003400
3,522,326 UART: [idev] ++
3,523,007 UART: [idev] CDI.KEYID = 6
3,523,947 UART: [idev] SUBJECT.KEYID = 7
3,525,119 UART: [idev] UDS.KEYID = 0
3,526,047 ready_for_fw is high
3,526,273 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,778 UART: [idev] Erasing UDS.KEYID = 0
6,030,309 UART: [idev] Sha1 KeyId Algorithm
6,052,580 UART: [idev] --
6,056,146 UART: [ldev] ++
6,056,852 UART: [ldev] CDI.KEYID = 6
6,057,769 UART: [ldev] SUBJECT.KEYID = 5
6,058,932 UART: [ldev] AUTHORITY.KEYID = 7
6,060,166 UART: [ldev] FE.KEYID = 1
6,101,116 UART: [ldev] Erasing FE.KEYID = 1
8,607,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,694 UART: [ldev] --
10,412,700 UART: [fwproc] Wait for Commands...
10,414,849 UART: [fwproc] Recv command 0x46574c44
10,417,105 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,592,076 >>> mbox cmd response: success
14,596,420 UART: [afmc] ++
14,597,134 UART: [afmc] CDI.KEYID = 6
14,598,325 UART: [afmc] SUBJECT.KEYID = 7
14,599,768 UART: [afmc] AUTHORITY.KEYID = 5
17,123,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,297 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,515 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,639 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,676 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,158 UART: [afmc] --
18,925,866 UART: [cold-reset] --
18,931,194 UART: [state] Locking Datavault
18,936,782 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,961 UART: [state] Locking ICCM
18,941,549 UART: [exit] Launching FMC @ 0x40000130
18,950,251 UART:
18,950,488 UART: Running Caliptra FMC ...
18,951,589 UART:
18,951,748 UART: [state] CFI Enabled
19,008,064 UART: [fht] FMC Alias Private Key: 7
20,772,422 UART: [art] Extend RT PCRs Done
20,773,639 UART: [art] Lock RT PCRs Done
20,775,186 UART: [art] Populate DV Done
20,780,390 UART: [fht] FMC Alias Private Key: 7
20,781,979 UART: [art] Derive CDI
20,782,720 UART: [art] Store in in slot 0x4
20,841,103 UART: [art] Derive Key Pair
20,842,139 UART: [art] Store priv key in slot 0x5
23,304,713 UART: [art] Derive Key Pair - Done
23,317,719 UART: [art] Signing Cert with AUTHO
23,319,022 UART: RITY.KEYID = 7
25,032,197 UART: [art] Erasing AUTHORITY.KEYID = 7
25,033,715 UART: [art] PUB.X = 1A4AE94732EA4CDC33CE8EE53037B9A6CDDA79452BC925BA7F483503242927AE67DCEF66FC3BCA2F961C686F773FA6D4
25,040,988 UART: [art] PUB.Y = 0794BDAD19888D4FF289A15D8E28E05B55357DFB6CB61E9F40825FB3DA40F0B1B3731639A22FCAFBF60B0C9BD5C39AAE
25,048,264 UART: [art] SIG.R = 05141A140DD5E7642E940569DB6BDEF9A437A93975725464EB593FD1A0B4BC0A153F020121C84033231D1C6273E3C66F
25,055,634 UART: [art] SIG.S = CE30A3793BAF5974CAD3E6F92C57A2BEA8A6E8DB48C081FD505A0DEEC92907AD325A75E0BFD2984319BFA9131A9A6407
26,034,731 UART: Caliptra RT
26,035,418 UART: [state] CFI Enabled
26,200,297 UART: [rt] RT listening for mailbox commands...
26,202,221 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,233,688 UART: [rt]cmd =0x44504543, len=92
26,240,166 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,438,334 ready_for_fw is high
3,438,891 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,704 >>> mbox cmd response: success
19,048,078 UART:
19,048,471 UART: Running Caliptra FMC ...
19,049,669 UART:
19,049,844 UART: [state] CFI Enabled
19,116,282 UART: [fht] FMC Alias Private Key: 7
20,879,886 UART: [art] Extend RT PCRs Done
20,881,138 UART: [art] Lock RT PCRs Done
20,883,260 UART: [art] Populate DV Done
20,888,810 UART: [fht] FMC Alias Private Key: 7
20,890,526 UART: [art] Derive CDI
20,891,350 UART: [art] Store in in slot 0x4
20,949,311 UART: [art] Derive Key Pair
20,950,350 UART: [art] Store priv key in slot 0x5
23,413,820 UART: [art] Derive Key Pair - Done
23,426,877 UART: [art] Signing Cert with AUTHO
23,428,185 UART: RITY.KEYID = 7
25,139,457 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,967 UART: [art] PUB.X = EA4CAB568FE07DB28C1B3BFE749CFC030B1E7DF467A428F5B98917B10038326E2F4333D0C3D13D3A489206529C69B558
25,148,210 UART: [art] PUB.Y = DA9BFC003A81ED62C7AA6D8E264E49151FA1153E9FF9F3438BA1A47278022F6CCCAA98F8A16D98E736B041C6DF48C055
25,155,430 UART: [art] SIG.R = B5C6361C5434A29C6D0139B00F6231EC2739C8E705E6A2B97A9817198DFEE2D1EA1268A33F0C915D952B8EC01437094F
25,162,822 UART: [art] SIG.S = F42E2B97202231A33CC38FF99B60C17C784DBA1186FDBA128E0BBC760831F017FBB7BC3582D6E12F6B177EA4ECFBFF44
26,142,328 UART: Caliptra RT
26,143,031 UART: [state] CFI Enabled
26,307,672 UART: [rt] RT listening for mailbox commands...
26,309,607 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,340,708 UART: [rt]cmd =0x44504543, len=92
26,347,221 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,780 writing to cptra_bootfsm_go
192,880 UART:
193,250 UART: Running Caliptra ROM ...
194,397 UART:
604,169 UART: [state] CFI Enabled
615,475 UART: [state] LifecycleState = Unprovisioned
617,856 UART: [state] DebugLocked = No
619,024 UART: [state] WD Timer not started. Device not locked for debugging
623,079 UART: [kat] SHA2-256
812,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,728 UART: [kat] ++
824,328 UART: [kat] sha1
835,945 UART: [kat] SHA2-256
838,998 UART: [kat] SHA2-384
845,208 UART: [kat] SHA2-512-ACC
847,786 UART: [kat] ECC-384
3,292,653 UART: [kat] HMAC-384Kdf
3,304,827 UART: [kat] LMS
3,836,620 UART: [kat] --
3,841,817 UART: [cold-reset] ++
3,844,120 UART: [fht] FHT @ 0x50003400
3,855,737 UART: [idev] ++
3,856,447 UART: [idev] CDI.KEYID = 6
3,857,336 UART: [idev] SUBJECT.KEYID = 7
3,858,579 UART: [idev] UDS.KEYID = 0
3,859,482 ready_for_fw is high
3,859,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,156 UART: [idev] Erasing UDS.KEYID = 0
6,334,679 UART: [idev] Sha1 KeyId Algorithm
6,357,580 UART: [idev] --
6,362,141 UART: [ldev] ++
6,362,827 UART: [ldev] CDI.KEYID = 6
6,363,715 UART: [ldev] SUBJECT.KEYID = 5
6,364,928 UART: [ldev] AUTHORITY.KEYID = 7
6,366,158 UART: [ldev] FE.KEYID = 1
6,378,692 UART: [ldev] Erasing FE.KEYID = 1
8,859,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,302 UART: [ldev] --
10,653,302 UART: [fwproc] Wait for Commands...
10,656,094 UART: [fwproc] Recv command 0x46574c44
10,658,406 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,188,213 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,304,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,846,365 >>> mbox cmd response: success
14,850,894 UART: [afmc] ++
14,851,606 UART: [afmc] CDI.KEYID = 6
14,852,845 UART: [afmc] SUBJECT.KEYID = 7
14,854,292 UART: [afmc] AUTHORITY.KEYID = 5
17,352,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,697 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,843 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,012 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,946 UART: [afmc] --
19,147,859 UART: [cold-reset] --
19,152,300 UART: [state] Locking Datavault
19,157,664 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,854 UART: [state] Locking ICCM
19,161,662 UART: [exit] Launching FMC @ 0x40000130
19,170,334 UART:
19,170,572 UART: Running Caliptra FMC ...
19,171,668 UART:
19,171,847 UART: [state] CFI Enabled
19,179,844 UART: [fht] FMC Alias Private Key: 7
20,936,223 UART: [art] Extend RT PCRs Done
20,937,444 UART: [art] Lock RT PCRs Done
20,939,048 UART: [art] Populate DV Done
20,944,354 UART: [fht] FMC Alias Private Key: 7
20,946,006 UART: [art] Derive CDI
20,946,751 UART: [art] Store in in slot 0x4
20,989,340 UART: [art] Derive Key Pair
20,990,373 UART: [art] Store priv key in slot 0x5
23,417,318 UART: [art] Derive Key Pair - Done
23,430,200 UART: [art] Signing Cert with AUTHO
23,431,501 UART: RITY.KEYID = 7
25,136,704 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,217 UART: [art] PUB.X = 961F29A3E5F61496F448E4CD0FADA87232377C7E611C7D78E90E737E71389C7CC5D12E5FCCA949462CB24B070B2B2C60
25,145,463 UART: [art] PUB.Y = B991C14685F90B51CF8F6E6BAB5A279F76A8AAEEDD11C8EE251E0455561D5D341EDEA2EF63309568E5D48A0127BD18C7
25,152,746 UART: [art] SIG.R = 8C35251625CF32FF14BF08E1E710480AFA1D20783EC9E141D8348953864966099573AC078DE6614216F335CB316FE7CE
25,160,111 UART: [art] SIG.S = 24E3A777996C2EECC95DF8176F8DB7A09FA3988209AD482D9F69CFCD2C2BD80E7CA62A21F323B759CCB921F25C815E20
26,138,975 UART: Caliptra RT
26,139,674 UART: [state] CFI Enabled
26,256,620 UART: [rt] RT listening for mailbox commands...
26,258,530 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,289,647 UART: [rt]cmd =0x44504543, len=92
26,296,092 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
3,754,399 ready_for_fw is high
3,754,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,945,123 >>> mbox cmd response: success
19,197,496 UART:
19,197,899 UART: Running Caliptra FMC ...
19,199,035 UART:
19,199,201 UART: [state] CFI Enabled
19,207,026 UART: [fht] FMC Alias Private Key: 7
20,964,078 UART: [art] Extend RT PCRs Done
20,965,309 UART: [art] Lock RT PCRs Done
20,966,932 UART: [art] Populate DV Done
20,972,507 UART: [fht] FMC Alias Private Key: 7
20,973,996 UART: [art] Derive CDI
20,974,758 UART: [art] Store in in slot 0x4
21,017,300 UART: [art] Derive Key Pair
21,018,346 UART: [art] Store priv key in slot 0x5
23,444,756 UART: [art] Derive Key Pair - Done
23,457,370 UART: [art] Signing Cert with AUTHO
23,458,702 UART: RITY.KEYID = 7
25,164,086 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,596 UART: [art] PUB.X = FBFF4746C0BD178CAD34CD00EC9BBC79EC8B6CF8406DF48BA3A9A0EF481B3B664A8064DE3657227778B5927E35F51182
25,172,837 UART: [art] PUB.Y = 072619D0FE6F53136B5176939859AEA11C1E90AD7CFA596FD10AC705664172479DDB353982E729DED2839719E1A222F7
25,180,077 UART: [art] SIG.R = 5FC97293033ED6BA8554DE4FA99361C39D7C109A741ED5E5CD4355848F1509A70F724521FAA548DB5E5632ABADA4E076
25,187,490 UART: [art] SIG.S = F33E9588586290AA7CD9BBCF4028FD27724923335BF9A9B458CCA79B91512259595CC976200DEFE7E592092982FF96B6
26,166,419 UART: Caliptra RT
26,167,135 UART: [state] CFI Enabled
26,283,781 UART: [rt] RT listening for mailbox commands...
26,285,708 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,316,947 UART: [rt]cmd =0x44504543, len=92
26,323,253 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,338 UART: [kat] HMAC-384Kdf
907,038 UART: [kat] LMS
1,475,234 UART: [kat] --
1,475,943 UART: [cold-reset] ++
1,476,413 UART: [fht] Storing FHT @ 0x50003400
1,479,222 UART: [idev] ++
1,479,390 UART: [idev] CDI.KEYID = 6
1,479,750 UART: [idev] SUBJECT.KEYID = 7
1,480,174 UART: [idev] UDS.KEYID = 0
1,480,519 ready_for_fw is high
1,480,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,212 UART: [idev] Erasing UDS.KEYID = 0
1,504,716 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,368 UART: [idev] --
1,514,317 UART: [ldev] ++
1,514,485 UART: [ldev] CDI.KEYID = 6
1,514,848 UART: [ldev] SUBJECT.KEYID = 5
1,515,274 UART: [ldev] AUTHORITY.KEYID = 7
1,515,737 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,546,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,070 UART: [ldev] --
1,585,531 UART: [fwproc] Waiting for Commands...
1,586,220 UART: [fwproc] Received command 0x46574c44
1,587,011 UART: [fwproc] Received Image of size 114168 bytes
2,883,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,691 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,754 >>> mbox cmd response: success
3,077,912 UART: [afmc] ++
3,078,080 UART: [afmc] CDI.KEYID = 6
3,078,442 UART: [afmc] SUBJECT.KEYID = 7
3,078,867 UART: [afmc] AUTHORITY.KEYID = 5
3,113,752 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,538 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,423 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,113 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,000 UART: [afmc] --
3,156,882 UART: [cold-reset] --
3,157,546 UART: [state] Locking Datavault
3,158,439 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,043 UART: [state] Locking ICCM
3,159,597 UART: [exit] Launching FMC @ 0x40000130
3,164,926 UART:
3,164,942 UART: Running Caliptra FMC ...
3,165,350 UART:
3,165,404 UART: [state] CFI Enabled
3,175,561 UART: [fht] FMC Alias Private Key: 7
3,283,272 UART: [art] Extend RT PCRs Done
3,283,700 UART: [art] Lock RT PCRs Done
3,285,346 UART: [art] Populate DV Done
3,293,623 UART: [fht] FMC Alias Private Key: 7
3,294,655 UART: [art] Derive CDI
3,294,935 UART: [art] Store in in slot 0x4
3,380,472 UART: [art] Derive Key Pair
3,380,832 UART: [art] Store priv key in slot 0x5
3,393,986 UART: [art] Derive Key Pair - Done
3,408,600 UART: [art] Signing Cert with AUTHO
3,409,080 UART: RITY.KEYID = 7
3,424,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,111 UART: [art] PUB.X = E33DD10FD4FA872260EDFE108ACB31F7D1C289DDAFD4792C160766485A1736D90804B8CC75808510E7C95B3917B4C70C
3,431,872 UART: [art] PUB.Y = C2582AF905A2722A49125C6CB019B03523F0A36AF26D71D7BDDFB566E0349B2C20557611244ED2BFC50165BF14800A8F
3,438,815 UART: [art] SIG.R = DB93C70624E60C217C9942C8F39E0CDA123BBCAAFC5A8D7E88C7584B5074A25426E4A212B36C6C21CCBAA25455DAA442
3,445,590 UART: [art] SIG.S = 23ABE7DF6F591B049CF0BD2DBFDFAAF100256D61073349CF760835671EEFAE3B26960E33DE710F050BC4361A86BB2396
3,468,870 UART: Caliptra RT
3,469,123 UART: [state] CFI Enabled
3,577,446 UART: [rt] RT listening for mailbox commands...
3,578,116 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,184 UART: [rt]cmd =0x44504543, len=92
3,615,476 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 ready_for_fw is high
1,362,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,322 >>> mbox cmd response: success
2,987,158 UART:
2,987,174 UART: Running Caliptra FMC ...
2,987,582 UART:
2,987,636 UART: [state] CFI Enabled
2,997,911 UART: [fht] FMC Alias Private Key: 7
3,105,546 UART: [art] Extend RT PCRs Done
3,105,974 UART: [art] Lock RT PCRs Done
3,107,210 UART: [art] Populate DV Done
3,115,415 UART: [fht] FMC Alias Private Key: 7
3,116,549 UART: [art] Derive CDI
3,116,829 UART: [art] Store in in slot 0x4
3,202,668 UART: [art] Derive Key Pair
3,203,028 UART: [art] Store priv key in slot 0x5
3,216,040 UART: [art] Derive Key Pair - Done
3,230,890 UART: [art] Signing Cert with AUTHO
3,231,370 UART: RITY.KEYID = 7
3,246,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,705 UART: [art] PUB.X = 8FF3044D7848948EC068C1F48A6FD93CD4C6DF9249BE49EB6A480866EEA9EF17AC4F6346DC82675559254EA581637A96
3,254,473 UART: [art] PUB.Y = 6A15AC8721248AB8075CB032915885D0142101F316B9DFC1BBBF1D9E8817271EE7EFEE79230C9B19EB042D996228D24C
3,261,413 UART: [art] SIG.R = 62E4E419E06078F0EE5E7931988FF18D8A1554AB37DF277FEAA531CC1D44252B323B14F3F3E2F6951346585616EBFCA3
3,268,187 UART: [art] SIG.S = D404F148E8E114627F514E394D1BF967A2644404554F68A0A7515124EA0ED0FB04DFE9DAABBB08AE9186929AAB55F54E
3,291,899 UART: Caliptra RT
3,292,152 UART: [state] CFI Enabled
3,401,167 UART: [rt] RT listening for mailbox commands...
3,401,837 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,931 UART: [rt]cmd =0x44504543, len=92
3,439,023 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,992 UART: [kat] SHA2-256
881,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,038 UART: [kat] ++
886,190 UART: [kat] sha1
890,286 UART: [kat] SHA2-256
892,224 UART: [kat] SHA2-384
895,167 UART: [kat] SHA2-512-ACC
897,068 UART: [kat] ECC-384
902,603 UART: [kat] HMAC-384Kdf
907,175 UART: [kat] LMS
1,475,371 UART: [kat] --
1,476,360 UART: [cold-reset] ++
1,476,910 UART: [fht] Storing FHT @ 0x50003400
1,479,693 UART: [idev] ++
1,479,861 UART: [idev] CDI.KEYID = 6
1,480,221 UART: [idev] SUBJECT.KEYID = 7
1,480,645 UART: [idev] UDS.KEYID = 0
1,480,990 ready_for_fw is high
1,480,990 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,573 UART: [idev] Erasing UDS.KEYID = 0
1,505,505 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,369 UART: [idev] --
1,515,484 UART: [ldev] ++
1,515,652 UART: [ldev] CDI.KEYID = 6
1,516,015 UART: [ldev] SUBJECT.KEYID = 5
1,516,441 UART: [ldev] AUTHORITY.KEYID = 7
1,516,904 UART: [ldev] FE.KEYID = 1
1,522,290 UART: [ldev] Erasing FE.KEYID = 1
1,547,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,409 UART: [ldev] --
1,586,708 UART: [fwproc] Waiting for Commands...
1,587,461 UART: [fwproc] Received command 0x46574c44
1,588,252 UART: [fwproc] Received Image of size 114168 bytes
2,883,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,146 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,498 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,193 >>> mbox cmd response: success
3,077,385 UART: [afmc] ++
3,077,553 UART: [afmc] CDI.KEYID = 6
3,077,915 UART: [afmc] SUBJECT.KEYID = 7
3,078,340 UART: [afmc] AUTHORITY.KEYID = 5
3,113,681 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,865 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,478 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,168 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,045 UART: [afmc] --
3,157,147 UART: [cold-reset] --
3,157,821 UART: [state] Locking Datavault
3,158,926 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,530 UART: [state] Locking ICCM
3,160,084 UART: [exit] Launching FMC @ 0x40000130
3,165,413 UART:
3,165,429 UART: Running Caliptra FMC ...
3,165,837 UART:
3,165,980 UART: [state] CFI Enabled
3,176,603 UART: [fht] FMC Alias Private Key: 7
3,284,132 UART: [art] Extend RT PCRs Done
3,284,560 UART: [art] Lock RT PCRs Done
3,286,284 UART: [art] Populate DV Done
3,294,695 UART: [fht] FMC Alias Private Key: 7
3,295,857 UART: [art] Derive CDI
3,296,137 UART: [art] Store in in slot 0x4
3,382,114 UART: [art] Derive Key Pair
3,382,474 UART: [art] Store priv key in slot 0x5
3,396,248 UART: [art] Derive Key Pair - Done
3,411,445 UART: [art] Signing Cert with AUTHO
3,411,925 UART: RITY.KEYID = 7
3,427,443 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,208 UART: [art] PUB.X = 57535FE68ECB071004E0C7729DF6557604E8AC349F004391912F3AED760B48CEA3164AD8328802119BA4F4CA8349A5FB
3,434,941 UART: [art] PUB.Y = 67F98E2723BE60963A6B4AB322F8595C8951AE2F4FC5926AB6A474812D6414D1FC716E133FF7FD1B2E05645C2E76AB43
3,441,892 UART: [art] SIG.R = 1707B2BD77206CE0E753F02D267E7ED04F1B4DC3A277D81DC420D35E1F155A64ACD5BD06BF9A69BCDA952927DB4CAC81
3,448,674 UART: [art] SIG.S = C4FD7A28E08BADA8D9744CDBB31B02E560A1565F4B17DFCF702295534CC297F5080662645549C9DD85A8DE3FDC5A56F2
3,472,676 UART: Caliptra RT
3,473,021 UART: [state] CFI Enabled
3,581,556 UART: [rt] RT listening for mailbox commands...
3,582,226 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,352 UART: [rt]cmd =0x44504543, len=92
3,619,634 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,514 ready_for_fw is high
1,362,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,271 >>> mbox cmd response: success
2,988,499 UART:
2,988,515 UART: Running Caliptra FMC ...
2,988,923 UART:
2,989,066 UART: [state] CFI Enabled
3,000,121 UART: [fht] FMC Alias Private Key: 7
3,108,690 UART: [art] Extend RT PCRs Done
3,109,118 UART: [art] Lock RT PCRs Done
3,110,526 UART: [art] Populate DV Done
3,118,741 UART: [fht] FMC Alias Private Key: 7
3,119,913 UART: [art] Derive CDI
3,120,193 UART: [art] Store in in slot 0x4
3,205,784 UART: [art] Derive Key Pair
3,206,144 UART: [art] Store priv key in slot 0x5
3,219,438 UART: [art] Derive Key Pair - Done
3,234,078 UART: [art] Signing Cert with AUTHO
3,234,558 UART: RITY.KEYID = 7
3,250,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,945 UART: [art] PUB.X = 2204D4F3F270BF98A64054D5AA3B8F2CDA1F959B9595D343D2AA57E5BCAF506FE26804EBFC62355546BED2EFD86C245C
3,257,725 UART: [art] PUB.Y = 0AA427B2247F8585B1645A0C008FA14014DA13B1EDFAC630FC583AC8B15396621C8565E3C8BDA9CED8582A59C08DC138
3,264,655 UART: [art] SIG.R = 7253E44C73D933BB000FD62A571A1D9ECAEBE55552CE4D418045AB43439209EA21C1837D4A13646F57CD842022EE88F3
3,271,399 UART: [art] SIG.S = 6BB4C2EDF34D08EF89F1DDD0E49893E4F271654CDE9ACD15C50E69BBA1E3C32C45711735D39990A654D5774D3D789ED2
3,295,550 UART: Caliptra RT
3,295,895 UART: [state] CFI Enabled
3,404,817 UART: [rt] RT listening for mailbox commands...
3,405,487 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,023 UART: [rt]cmd =0x44504543, len=92
3,443,159 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,512 UART: [kat] SHA2-512-ACC
908,413 UART: [kat] ECC-384
918,328 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,172,111 UART: [cold-reset] ++
1,172,511 UART: [fht] FHT @ 0x50003400
1,175,348 UART: [idev] ++
1,175,516 UART: [idev] CDI.KEYID = 6
1,175,876 UART: [idev] SUBJECT.KEYID = 7
1,176,300 UART: [idev] UDS.KEYID = 0
1,176,645 ready_for_fw is high
1,176,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,742 UART: [idev] Erasing UDS.KEYID = 0
1,201,661 UART: [idev] Sha1 KeyId Algorithm
1,209,977 UART: [idev] --
1,211,247 UART: [ldev] ++
1,211,415 UART: [ldev] CDI.KEYID = 6
1,211,778 UART: [ldev] SUBJECT.KEYID = 5
1,212,204 UART: [ldev] AUTHORITY.KEYID = 7
1,212,667 UART: [ldev] FE.KEYID = 1
1,217,947 UART: [ldev] Erasing FE.KEYID = 1
1,244,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,533 UART: [ldev] --
1,283,972 UART: [fwproc] Wait for Commands...
1,284,722 UART: [fwproc] Recv command 0x46574c44
1,285,450 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,261 >>> mbox cmd response: success
2,775,303 UART: [afmc] ++
2,775,471 UART: [afmc] CDI.KEYID = 6
2,775,833 UART: [afmc] SUBJECT.KEYID = 7
2,776,258 UART: [afmc] AUTHORITY.KEYID = 5
2,811,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,800 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,528 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,413 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,968 UART: [afmc] --
2,854,888 UART: [cold-reset] --
2,855,838 UART: [state] Locking Datavault
2,856,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,471 UART: [state] Locking ICCM
2,858,123 UART: [exit] Launching FMC @ 0x40000130
2,863,452 UART:
2,863,468 UART: Running Caliptra FMC ...
2,863,876 UART:
2,863,930 UART: [state] CFI Enabled
2,874,887 UART: [fht] FMC Alias Private Key: 7
2,982,692 UART: [art] Extend RT PCRs Done
2,983,120 UART: [art] Lock RT PCRs Done
2,984,344 UART: [art] Populate DV Done
2,992,607 UART: [fht] FMC Alias Private Key: 7
2,993,647 UART: [art] Derive CDI
2,993,927 UART: [art] Store in in slot 0x4
3,079,592 UART: [art] Derive Key Pair
3,079,952 UART: [art] Store priv key in slot 0x5
3,093,486 UART: [art] Derive Key Pair - Done
3,107,970 UART: [art] Signing Cert with AUTHO
3,108,450 UART: RITY.KEYID = 7
3,123,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,295 UART: [art] PUB.X = 4242EC02F448C4A2DBE05D3B57B298969AFC9261BE92E444845DEC8B370F951F30785BDF3A603D6B97FE9BDDF761443E
3,131,069 UART: [art] PUB.Y = 3C58B2A92A7AA3E50E279BB66F3A7E9B6D155582C338FD76B986BDFF975E53B2CBC948D3A0DC8E80126217F43CA5F715
3,138,028 UART: [art] SIG.R = FDF623F84C0B9FA8AE9C0EF4D23BB8A2CB768918F5CC0F0C2D15630291ECF15F36AD40C322989BDDD8C9838BF830BC8C
3,144,805 UART: [art] SIG.S = 689661D60D564301719B06EC8BFD12FED5A8E68A93C076FCFCCBD7872A0A5A316CAAD29B9132089E215049300A48B37F
3,168,544 UART: Caliptra RT
3,168,797 UART: [state] CFI Enabled
3,276,820 UART: [rt] RT listening for mailbox commands...
3,277,490 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,944 UART: [rt]cmd =0x44504543, len=92
3,314,990 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,965 ready_for_fw is high
1,059,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,236 >>> mbox cmd response: success
2,687,286 UART:
2,687,302 UART: Running Caliptra FMC ...
2,687,710 UART:
2,687,764 UART: [state] CFI Enabled
2,698,203 UART: [fht] FMC Alias Private Key: 7
2,805,642 UART: [art] Extend RT PCRs Done
2,806,070 UART: [art] Lock RT PCRs Done
2,807,658 UART: [art] Populate DV Done
2,816,059 UART: [fht] FMC Alias Private Key: 7
2,817,195 UART: [art] Derive CDI
2,817,475 UART: [art] Store in in slot 0x4
2,902,692 UART: [art] Derive Key Pair
2,903,052 UART: [art] Store priv key in slot 0x5
2,915,692 UART: [art] Derive Key Pair - Done
2,930,553 UART: [art] Signing Cert with AUTHO
2,931,033 UART: RITY.KEYID = 7
2,946,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,086 UART: [art] PUB.X = 0ABF0AB0548AD5126B086BA6623D80A7D18FFDE6003180BE45D3719233CBE7FE43BD693DF145F410A4F4EC75B57309E9
2,953,832 UART: [art] PUB.Y = E61187F35B924AA8A2B3AE9795D984970CE9A2D451E6722EDFA3D78188A89A71D7BE8A4CF6939316B75B8DD43E0D2FFF
2,960,788 UART: [art] SIG.R = 8F6F018AF0AAE7ECED74314E10AC39B0764278003073978ADD4982350D17EDA8F5AFD3FB5680BAFDE29F1A6D3B6F79C6
2,967,546 UART: [art] SIG.S = C75764B94588591A63199F97E7BBC182C01F43EE519DCE7EAD46B1046877C80CBF83AC76ED8F121BA9D078C16EC0F2C1
2,991,123 UART: Caliptra RT
2,991,376 UART: [state] CFI Enabled
3,099,458 UART: [rt] RT listening for mailbox commands...
3,100,128 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,474 UART: [rt]cmd =0x44504543, len=92
3,137,524 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,376 UART: [kat] SHA2-256
904,316 UART: [kat] SHA2-384
907,207 UART: [kat] SHA2-512-ACC
909,108 UART: [kat] ECC-384
918,991 UART: [kat] HMAC-384Kdf
923,615 UART: [kat] LMS
1,171,943 UART: [kat] --
1,173,082 UART: [cold-reset] ++
1,173,622 UART: [fht] FHT @ 0x50003400
1,176,121 UART: [idev] ++
1,176,289 UART: [idev] CDI.KEYID = 6
1,176,649 UART: [idev] SUBJECT.KEYID = 7
1,177,073 UART: [idev] UDS.KEYID = 0
1,177,418 ready_for_fw is high
1,177,418 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,385 UART: [idev] Erasing UDS.KEYID = 0
1,201,880 UART: [idev] Sha1 KeyId Algorithm
1,210,280 UART: [idev] --
1,211,338 UART: [ldev] ++
1,211,506 UART: [ldev] CDI.KEYID = 6
1,211,869 UART: [ldev] SUBJECT.KEYID = 5
1,212,295 UART: [ldev] AUTHORITY.KEYID = 7
1,212,758 UART: [ldev] FE.KEYID = 1
1,217,894 UART: [ldev] Erasing FE.KEYID = 1
1,244,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,830 UART: [ldev] --
1,284,293 UART: [fwproc] Wait for Commands...
1,284,895 UART: [fwproc] Recv command 0x46574c44
1,285,623 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,659 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,963 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,636 >>> mbox cmd response: success
2,774,786 UART: [afmc] ++
2,774,954 UART: [afmc] CDI.KEYID = 6
2,775,316 UART: [afmc] SUBJECT.KEYID = 7
2,775,741 UART: [afmc] AUTHORITY.KEYID = 5
2,811,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,807 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,692 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,411 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,087 UART: [afmc] --
2,853,969 UART: [cold-reset] --
2,854,703 UART: [state] Locking Datavault
2,855,644 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,248 UART: [state] Locking ICCM
2,856,714 UART: [exit] Launching FMC @ 0x40000130
2,862,043 UART:
2,862,059 UART: Running Caliptra FMC ...
2,862,467 UART:
2,862,610 UART: [state] CFI Enabled
2,873,311 UART: [fht] FMC Alias Private Key: 7
2,981,402 UART: [art] Extend RT PCRs Done
2,981,830 UART: [art] Lock RT PCRs Done
2,983,272 UART: [art] Populate DV Done
2,991,613 UART: [fht] FMC Alias Private Key: 7
2,992,589 UART: [art] Derive CDI
2,992,869 UART: [art] Store in in slot 0x4
3,078,466 UART: [art] Derive Key Pair
3,078,826 UART: [art] Store priv key in slot 0x5
3,092,874 UART: [art] Derive Key Pair - Done
3,107,855 UART: [art] Signing Cert with AUTHO
3,108,335 UART: RITY.KEYID = 7
3,123,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,608 UART: [art] PUB.X = 138EC4481A95FEEAC1857619835C971DE396365DFC8BE6D0AC9924BE38278D423FACFB27E6D482693EA6C80D595F1E4C
3,131,385 UART: [art] PUB.Y = D355FF048BBDD331724C169E3BB44B0A6930A6848AA96976319B4CCB688F4FD4D9B7BC622160AE22BA20C839F7CBA8EC
3,138,343 UART: [art] SIG.R = 588EF87F42C8CF3E072B573E408BD5252799C751D1A99DE0EA1E9B00ABCA3F0F1E573F56A5E223163E01C632BD120F92
3,145,087 UART: [art] SIG.S = 55810AE5A17E3252F005EBA8470DCB813CE72EFDD044DB4F8722932A7FBCC28954EF919254605BB20981208585C75B78
3,168,440 UART: Caliptra RT
3,168,785 UART: [state] CFI Enabled
3,276,454 UART: [rt] RT listening for mailbox commands...
3,277,124 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,434 UART: [rt]cmd =0x44504543, len=92
3,314,478 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,050 ready_for_fw is high
1,061,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,793 >>> mbox cmd response: success
2,685,861 UART:
2,685,877 UART: Running Caliptra FMC ...
2,686,285 UART:
2,686,428 UART: [state] CFI Enabled
2,696,817 UART: [fht] FMC Alias Private Key: 7
2,804,672 UART: [art] Extend RT PCRs Done
2,805,100 UART: [art] Lock RT PCRs Done
2,806,630 UART: [art] Populate DV Done
2,814,943 UART: [fht] FMC Alias Private Key: 7
2,816,111 UART: [art] Derive CDI
2,816,391 UART: [art] Store in in slot 0x4
2,901,778 UART: [art] Derive Key Pair
2,902,138 UART: [art] Store priv key in slot 0x5
2,915,174 UART: [art] Derive Key Pair - Done
2,929,784 UART: [art] Signing Cert with AUTHO
2,930,264 UART: RITY.KEYID = 7
2,945,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,207 UART: [art] PUB.X = B07994CBF3B4898DE334A6B97BF5FB3E8BB2AF75041E15CFECA0EF31479600985714AB85DCA641FE130208FD09DC225E
2,952,957 UART: [art] PUB.Y = 590D6060AABDA19DD9D19B0C3BFCCA6D875E11A2C6F31CC71B2D4D3534288771A1EA1155E9BFDD227B03958518144CAA
2,959,912 UART: [art] SIG.R = 145D4AC71A51A91E8C112C8E4CFED74EFB626A024EB3FA54C218E2C68D1F20D7CA1C90C0C965DBCE1FEFAC4AFEA70FE4
2,966,708 UART: [art] SIG.S = 4CBA3C632E18958149E95C044E9FDDEEDBE0EF0FCEF35AA3857155AB6226A1F9D726D3AD5F2CFAA3A505ABF6A7ACFFC3
2,990,696 UART: Caliptra RT
2,991,041 UART: [state] CFI Enabled
3,099,102 UART: [rt] RT listening for mailbox commands...
3,099,772 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,276 UART: [rt]cmd =0x44504543, len=92
3,137,514 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,682 UART: [state] LifecycleState = Unprovisioned
86,337 UART: [state] DebugLocked = No
86,915 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,153 UART: [kat] SHA2-256
902,093 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,537 UART: [fht] FHT @ 0x50003400
1,173,177 UART: [idev] ++
1,173,345 UART: [idev] CDI.KEYID = 6
1,173,706 UART: [idev] SUBJECT.KEYID = 7
1,174,131 UART: [idev] UDS.KEYID = 0
1,174,477 ready_for_fw is high
1,174,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,199,351 UART: [idev] Sha1 KeyId Algorithm
1,208,155 UART: [idev] --
1,209,312 UART: [ldev] ++
1,209,480 UART: [ldev] CDI.KEYID = 6
1,209,844 UART: [ldev] SUBJECT.KEYID = 5
1,210,271 UART: [ldev] AUTHORITY.KEYID = 7
1,210,734 UART: [ldev] FE.KEYID = 1
1,215,920 UART: [ldev] Erasing FE.KEYID = 1
1,241,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,840 UART: [ldev] --
1,281,252 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,127 >>> mbox cmd response: success
2,771,266 UART: [afmc] ++
2,771,434 UART: [afmc] CDI.KEYID = 6
2,771,797 UART: [afmc] SUBJECT.KEYID = 7
2,772,223 UART: [afmc] AUTHORITY.KEYID = 5
2,807,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,917 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,646 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,529 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,248 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,083 UART: [afmc] --
2,851,099 UART: [cold-reset] --
2,852,089 UART: [state] Locking Datavault
2,853,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,836 UART: [state] Locking ICCM
2,854,366 UART: [exit] Launching FMC @ 0x40000130
2,859,695 UART:
2,859,711 UART: Running Caliptra FMC ...
2,860,119 UART:
2,860,173 UART: [state] CFI Enabled
2,870,636 UART: [fht] FMC Alias Private Key: 7
2,978,051 UART: [art] Extend RT PCRs Done
2,978,479 UART: [art] Lock RT PCRs Done
2,979,787 UART: [art] Populate DV Done
2,988,004 UART: [fht] FMC Alias Private Key: 7
2,989,126 UART: [art] Derive CDI
2,989,406 UART: [art] Store in in slot 0x4
3,075,573 UART: [art] Derive Key Pair
3,075,933 UART: [art] Store priv key in slot 0x5
3,089,073 UART: [art] Derive Key Pair - Done
3,103,913 UART: [art] Signing Cert with AUTHO
3,104,393 UART: RITY.KEYID = 7
3,119,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,330 UART: [art] PUB.X = AC51A9ABC6B63F64F19AAC53F604F90187254EAEC901BBE2F5D027F1A52853B2E38FF7BE2E4ED466537CF80BC4A0E39E
3,127,108 UART: [art] PUB.Y = 5D4DA033FA5FE4BC550244D6548DFC6AEC1313EC478FB105F562B51078BC102A3FB0D22AA1D9265D3C578C1E31A3AAF8
3,134,068 UART: [art] SIG.R = A02261D4530238656B7BF04A629F0414E532BDBA0CDEC18EE3800CC73E9CE42FF525A058FA52C8EA7BAF5357953630A1
3,140,834 UART: [art] SIG.S = E13DA3239F031F94897FF9937878A7A58F1932D10A9D8015CA7B248A9FF7FB1FCFBB9496DBA5A7F442DA6ECB188C15AE
3,165,209 UART: Caliptra RT
3,165,462 UART: [state] CFI Enabled
3,273,354 UART: [rt] RT listening for mailbox commands...
3,274,024 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,662 UART: [rt]cmd =0x44504543, len=92
3,311,948 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,460 ready_for_fw is high
1,055,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,785 >>> mbox cmd response: success
2,681,407 UART:
2,681,423 UART: Running Caliptra FMC ...
2,681,831 UART:
2,681,885 UART: [state] CFI Enabled
2,692,370 UART: [fht] FMC Alias Private Key: 7
2,800,411 UART: [art] Extend RT PCRs Done
2,800,839 UART: [art] Lock RT PCRs Done
2,802,235 UART: [art] Populate DV Done
2,810,528 UART: [fht] FMC Alias Private Key: 7
2,811,684 UART: [art] Derive CDI
2,811,964 UART: [art] Store in in slot 0x4
2,897,539 UART: [art] Derive Key Pair
2,897,899 UART: [art] Store priv key in slot 0x5
2,910,997 UART: [art] Derive Key Pair - Done
2,925,938 UART: [art] Signing Cert with AUTHO
2,926,418 UART: RITY.KEYID = 7
2,941,374 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,139 UART: [art] PUB.X = E5FDD0216F27EA311C9AF1C901B3689532CAA1300AEF6F3BBABEEF95000BE45362F6CEA2C8E3D37719BE7C3D81901C03
2,948,893 UART: [art] PUB.Y = A13903020289E2BB1338D6548C1945348E311D2B3D87159A4F29A92F6977BDF3401415AD1845459E854DCC408D8A4CB8
2,955,826 UART: [art] SIG.R = 7CA104788CC276FDA8DCF127E107B5C5EA61C930C36EAD82B8F245DD232A9936C26BF4833787886229A4C67E6F86E213
2,962,594 UART: [art] SIG.S = 5FC266E44ECCC56783450642294530CC36998E7DAAB8E0D36B015FCEE00EF123F0E3DA6CAE0F1A646DCABDAEE28155EB
2,986,359 UART: Caliptra RT
2,986,612 UART: [state] CFI Enabled
3,093,543 UART: [rt] RT listening for mailbox commands...
3,094,213 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,567 UART: [rt]cmd =0x44504543, len=92
3,131,799 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,653 UART: [kat] LMS
1,168,965 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,290 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 ready_for_fw is high
1,174,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,198,780 UART: [idev] Sha1 KeyId Algorithm
1,207,832 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,639 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,151 UART: [ldev] --
1,281,483 UART: [fwproc] Wait for Commands...
1,282,186 UART: [fwproc] Recv command 0x46574c44
1,282,919 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,930 >>> mbox cmd response: success
2,771,991 UART: [afmc] ++
2,772,159 UART: [afmc] CDI.KEYID = 6
2,772,522 UART: [afmc] SUBJECT.KEYID = 7
2,772,948 UART: [afmc] AUTHORITY.KEYID = 5
2,808,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,466 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,195 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,078 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,484 UART: [afmc] --
2,851,594 UART: [cold-reset] --
2,852,322 UART: [state] Locking Datavault
2,853,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,965 UART: [state] Locking ICCM
2,854,531 UART: [exit] Launching FMC @ 0x40000130
2,859,860 UART:
2,859,876 UART: Running Caliptra FMC ...
2,860,284 UART:
2,860,427 UART: [state] CFI Enabled
2,870,758 UART: [fht] FMC Alias Private Key: 7
2,978,167 UART: [art] Extend RT PCRs Done
2,978,595 UART: [art] Lock RT PCRs Done
2,980,199 UART: [art] Populate DV Done
2,988,468 UART: [fht] FMC Alias Private Key: 7
2,989,640 UART: [art] Derive CDI
2,989,920 UART: [art] Store in in slot 0x4
3,075,591 UART: [art] Derive Key Pair
3,075,951 UART: [art] Store priv key in slot 0x5
3,089,851 UART: [art] Derive Key Pair - Done
3,104,849 UART: [art] Signing Cert with AUTHO
3,105,329 UART: RITY.KEYID = 7
3,120,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,436 UART: [art] PUB.X = 54C323374027C417B79B1DF244BE2981EE91C00C520BF88FD29F6E7D34D69D21FAD70F05CEDAE5A3D2D1C535A1EDF30C
3,128,207 UART: [art] PUB.Y = 0C59A562DBE13E5F799576A3648D23FBDDC1E1C397AB686C71B76B1F540A4F3E14B1ECAF272BF9F2DAD0A7E44FFA465D
3,135,173 UART: [art] SIG.R = 2CEFB8BC5BF05A5027D5844116227B709A5A84AA69BA26E937094C6FB5FA3558E077A012272E77EA9AF35106FCA77B6D
3,141,945 UART: [art] SIG.S = 0E504056B1572B82B1093CAAD33ADD80028541C994A10DED87611A0D68669B8CE787C4623EA1660AA9814395B01104DF
3,165,397 UART: Caliptra RT
3,165,742 UART: [state] CFI Enabled
3,273,257 UART: [rt] RT listening for mailbox commands...
3,273,927 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,435 UART: [rt]cmd =0x44504543, len=92
3,311,773 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,025 ready_for_fw is high
1,056,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,628 >>> mbox cmd response: success
2,682,382 UART:
2,682,398 UART: Running Caliptra FMC ...
2,682,806 UART:
2,682,949 UART: [state] CFI Enabled
2,693,824 UART: [fht] FMC Alias Private Key: 7
2,801,803 UART: [art] Extend RT PCRs Done
2,802,231 UART: [art] Lock RT PCRs Done
2,803,717 UART: [art] Populate DV Done
2,811,840 UART: [fht] FMC Alias Private Key: 7
2,812,898 UART: [art] Derive CDI
2,813,178 UART: [art] Store in in slot 0x4
2,898,527 UART: [art] Derive Key Pair
2,898,887 UART: [art] Store priv key in slot 0x5
2,911,847 UART: [art] Derive Key Pair - Done
2,926,763 UART: [art] Signing Cert with AUTHO
2,927,243 UART: RITY.KEYID = 7
2,942,611 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,376 UART: [art] PUB.X = 49D92BD8E802517DECD9D560C671360368239586F264297C845A3CA088C54A72EC8A4A90A3C95295E593E606D0286F60
2,950,129 UART: [art] PUB.Y = DF19377A697407A0642C6FE038E0F675A56AF043259F2AB5EA6A3A8E818058FF244A6586B8F6B856A34EC950EDB24DAE
2,957,084 UART: [art] SIG.R = 28F6C70DC8AF4444A6651DC3AD4C6BF588AE11EE06967B26C5EB8129E66165C74B927324F89E5303096A97A7B645CBDB
2,963,848 UART: [art] SIG.S = 803D9FCD423BC3BAA021ECC462376BE384791A6075636FC7B99AE63A900E9BF0FB64D81C5486A539B8A847DB7842BBB1
2,987,682 UART: Caliptra RT
2,988,027 UART: [state] CFI Enabled
3,095,232 UART: [rt] RT listening for mailbox commands...
3,095,902 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,134 UART: [rt]cmd =0x44504543, len=92
3,133,372 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,418 UART:
192,774 UART: Running Caliptra ROM ...
193,968 UART:
194,117 UART: [state] CFI Enabled
262,315 UART: [state] LifecycleState = Unprovisioned
264,306 UART: [state] DebugLocked = No
265,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,256 UART: [kat] SHA2-256
440,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,483 UART: [kat] ++
451,929 UART: [kat] sha1
463,293 UART: [kat] SHA2-256
465,952 UART: [kat] SHA2-384
472,322 UART: [kat] SHA2-512-ACC
474,733 UART: [kat] ECC-384
2,766,877 UART: [kat] HMAC-384Kdf
2,797,803 UART: [kat] LMS
3,988,133 UART: [kat] --
3,990,647 UART: [cold-reset] ++
3,992,311 UART: [fht] Storing FHT @ 0x50003400
4,003,049 UART: [idev] ++
4,003,624 UART: [idev] CDI.KEYID = 6
4,004,534 UART: [idev] SUBJECT.KEYID = 7
4,005,778 UART: [idev] UDS.KEYID = 0
4,006,811 ready_for_fw is high
4,007,003 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,150,012 UART: [idev] Erasing UDS.KEYID = 0
7,350,691 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,093 UART: [idev] --
7,375,016 UART: [ldev] ++
7,375,584 UART: [ldev] CDI.KEYID = 6
7,376,762 UART: [ldev] SUBJECT.KEYID = 5
7,377,823 UART: [ldev] AUTHORITY.KEYID = 7
7,378,935 UART: [ldev] FE.KEYID = 1
7,421,533 UART: [ldev] Erasing FE.KEYID = 1
10,756,776 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,956 UART: [ldev] --
13,135,318 UART: [fwproc] Waiting for Commands...
13,138,481 UART: [fwproc] Received command 0x46574c44
13,140,706 UART: [fwproc] Received Image of size 113844 bytes
17,192,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,889 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,762 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,647,341 >>> mbox cmd response: success
17,651,809 UART: [afmc] ++
17,652,394 UART: [afmc] CDI.KEYID = 6
17,653,308 UART: [afmc] SUBJECT.KEYID = 7
17,654,517 UART: [afmc] AUTHORITY.KEYID = 5
21,030,355 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,623 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,877 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,327 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,185 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,612 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,547 UART: [afmc] --
23,399,085 UART: [cold-reset] --
23,404,473 UART: [state] Locking Datavault
23,411,173 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,921 UART: [state] Locking ICCM
23,414,929 UART: [exit] Launching FMC @ 0x40000130
23,423,317 UART:
23,423,544 UART: Running Caliptra FMC ...
23,424,637 UART:
23,424,787 UART: [state] CFI Enabled
23,487,315 UART: [fht] FMC Alias Private Key: 7
25,825,317 UART: [art] Extend RT PCRs Done
25,826,562 UART: [art] Lock RT PCRs Done
25,828,046 UART: [art] Populate DV Done
25,833,642 UART: [fht] FMC Alias Private Key: 7
25,835,207 UART: [art] Derive CDI
25,835,944 UART: [art] Store in in slot 0x4
25,896,596 UART: [art] Derive Key Pair
25,897,628 UART: [art] Store priv key in slot 0x5
29,190,328 UART: [art] Derive Key Pair - Done
29,203,105 UART: [art] Signing Cert with AUTHO
29,204,437 UART: RITY.KEYID = 7
31,492,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,824 UART: [art] PUB.X = 3EA6FC47A7E79788162424D1FCB8F0F1CD87030854926B911E42EF54C07FBA494BB39E8A888D9388F6A308026180E77A
31,501,036 UART: [art] PUB.Y = BAD432ADA9EDF97DCBCFDC6B17CE21C54D1E0D6D7D98489E17DC48D8C404466140AE6795FC818E19F83C2824FF86EE7D
31,508,286 UART: [art] SIG.R = E639B5B3A23B03BC3AE6A1000992EB3B3F418824BEA9FC1DFBB5BAD7B837C6DAFB9AF63720BB77AA6D81F357229F129E
31,515,735 UART: [art] SIG.S = 985333D2A2A9187B24AB4D760BC8A8CFB86FAB37A7E9B751DCDAFCED0EC4DC916CEB6F695E0BD89E7E0B517E8F3A3AD8
32,821,004 UART: Caliptra RT
32,821,733 UART: [state] CFI Enabled
32,984,804 UART: [rt] RT listening for mailbox commands...
32,986,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,017,694 UART: [rt]cmd =0x44504543, len=96
33,048,566 >>> mbox cmd response data (56 bytes)
33,049,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,080,117 UART: [rt]cmd =0x44504543, len=96
33,112,036 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,785,470 ready_for_fw is high
3,785,894 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,863,003 >>> mbox cmd response: success
23,566,825 UART:
23,567,245 UART: Running Caliptra FMC ...
23,568,357 UART:
23,568,512 UART: [state] CFI Enabled
23,638,035 UART: [fht] FMC Alias Private Key: 7
25,975,726 UART: [art] Extend RT PCRs Done
25,976,944 UART: [art] Lock RT PCRs Done
25,978,840 UART: [art] Populate DV Done
25,984,252 UART: [fht] FMC Alias Private Key: 7
25,985,949 UART: [art] Derive CDI
25,986,764 UART: [art] Store in in slot 0x4
26,046,042 UART: [art] Derive Key Pair
26,047,087 UART: [art] Store priv key in slot 0x5
29,339,921 UART: [art] Derive Key Pair - Done
29,352,948 UART: [art] Signing Cert with AUTHO
29,354,271 UART: RITY.KEYID = 7
31,641,875 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,367 UART: [art] PUB.X = 1874064B8512C7DFF01D97E4B973C6D36B2D2018318C928358569F239FB88E987F213613A850F906248EC516E675AE75
31,650,596 UART: [art] PUB.Y = D039974203A2C26BFCA7A052D6327435C302B8EF1FA21CEFFFAA32F26EFA6273047DF75DBFDBAF20A232D5DF4FDD7A0F
31,657,849 UART: [art] SIG.R = 8C9C6A8F2226946773F42885C369A76AA0021AA5C7E5495D9ACD26EADC361ACA21453B485EC6A3EF65F33988573751F6
31,665,197 UART: [art] SIG.S = 0A1A3204D847BB01E7E845181CF49146CB07DBA9D1ACAE7DE74638E388F7E290871C2963F5142B0345011B5458FB5BF7
32,970,293 UART: Caliptra RT
32,971,012 UART: [state] CFI Enabled
33,134,129 UART: [rt] RT listening for mailbox commands...
33,136,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,167,116 UART: [rt]cmd =0x44504543, len=96
33,197,583 >>> mbox cmd response data (56 bytes)
33,198,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,229,060 UART: [rt]cmd =0x44504543, len=96
33,260,848 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,355 UART:
192,743 UART: Running Caliptra ROM ...
193,937 UART:
603,682 UART: [state] CFI Enabled
619,113 UART: [state] LifecycleState = Unprovisioned
621,053 UART: [state] DebugLocked = No
622,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,810 UART: [kat] SHA2-256
797,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,132 UART: [kat] ++
808,663 UART: [kat] sha1
819,403 UART: [kat] SHA2-256
822,065 UART: [kat] SHA2-384
828,203 UART: [kat] SHA2-512-ACC
830,567 UART: [kat] ECC-384
3,114,400 UART: [kat] HMAC-384Kdf
3,124,917 UART: [kat] LMS
4,315,015 UART: [kat] --
4,317,875 UART: [cold-reset] ++
4,319,879 UART: [fht] Storing FHT @ 0x50003400
4,331,005 UART: [idev] ++
4,331,572 UART: [idev] CDI.KEYID = 6
4,332,533 UART: [idev] SUBJECT.KEYID = 7
4,333,773 UART: [idev] UDS.KEYID = 0
4,334,767 ready_for_fw is high
4,334,965 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,963 UART: [idev] Erasing UDS.KEYID = 0
7,620,360 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,568 UART: [idev] --
7,646,825 UART: [ldev] ++
7,647,400 UART: [ldev] CDI.KEYID = 6
7,648,315 UART: [ldev] SUBJECT.KEYID = 5
7,649,526 UART: [ldev] AUTHORITY.KEYID = 7
7,650,831 UART: [ldev] FE.KEYID = 1
7,662,288 UART: [ldev] Erasing FE.KEYID = 1
10,952,426 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,042 UART: [ldev] --
13,313,527 UART: [fwproc] Waiting for Commands...
13,315,663 UART: [fwproc] Received command 0x46574c44
13,317,871 UART: [fwproc] Received Image of size 113844 bytes
17,362,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,680 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,823,666 >>> mbox cmd response: success
17,827,229 UART: [afmc] ++
17,827,847 UART: [afmc] CDI.KEYID = 6
17,828,737 UART: [afmc] SUBJECT.KEYID = 7
17,830,007 UART: [afmc] AUTHORITY.KEYID = 5
21,140,663 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,559 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,863 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,200 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,060 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,514 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,864 UART: [afmc] --
23,509,057 UART: [cold-reset] --
23,513,353 UART: [state] Locking Datavault
23,519,139 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,892 UART: [state] Locking ICCM
23,522,232 UART: [exit] Launching FMC @ 0x40000130
23,530,633 UART:
23,530,887 UART: Running Caliptra FMC ...
23,531,987 UART:
23,532,150 UART: [state] CFI Enabled
23,539,978 UART: [fht] FMC Alias Private Key: 7
25,871,564 UART: [art] Extend RT PCRs Done
25,872,785 UART: [art] Lock RT PCRs Done
25,874,302 UART: [art] Populate DV Done
25,879,607 UART: [fht] FMC Alias Private Key: 7
25,881,144 UART: [art] Derive CDI
25,881,958 UART: [art] Store in in slot 0x4
25,924,396 UART: [art] Derive Key Pair
25,925,393 UART: [art] Store priv key in slot 0x5
29,167,275 UART: [art] Derive Key Pair - Done
29,180,339 UART: [art] Signing Cert with AUTHO
29,181,637 UART: RITY.KEYID = 7
31,461,045 UART: [art] Erasing AUTHORITY.KEYID = 7
31,462,569 UART: [art] PUB.X = 0E23674ABBD542E684A6FA310E64FBF7BEACF81D15CE977CF5B097AB502B959E32FB63C67F78E8E733C51E56483E0C1C
31,469,823 UART: [art] PUB.Y = 663E8E65AF38C242D9C869F2BEA962C9E45F03D69C6E778677EFE8E35E67A2E78DBE15E8212049BDFB21992E5A8625BC
31,477,115 UART: [art] SIG.R = 0CD4BC12894F8D68E4347DD51A96B737E2BFBAC23A7851F7E0D326A86206DA6A53314220CF533FDD244834592BB2DD83
31,484,484 UART: [art] SIG.S = 5A1CBFE41D36D8EEB5D0EF1529FC2756588EE4C72A90EADE665974A3A536F723A5F5A2D1100C41DA7359EBC341144A0E
32,789,641 UART: Caliptra RT
32,790,347 UART: [state] CFI Enabled
32,908,441 UART: [rt] RT listening for mailbox commands...
32,910,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,941,682 UART: [rt]cmd =0x44504543, len=96
32,972,832 >>> mbox cmd response data (56 bytes)
32,973,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,004,171 UART: [rt]cmd =0x44504543, len=96
33,035,691 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,128,955 ready_for_fw is high
4,129,361 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,256 >>> mbox cmd response: success
23,711,539 UART:
23,711,941 UART: Running Caliptra FMC ...
23,713,085 UART:
23,713,253 UART: [state] CFI Enabled
23,721,171 UART: [fht] FMC Alias Private Key: 7
26,052,159 UART: [art] Extend RT PCRs Done
26,053,380 UART: [art] Lock RT PCRs Done
26,055,032 UART: [art] Populate DV Done
26,060,666 UART: [fht] FMC Alias Private Key: 7
26,062,260 UART: [art] Derive CDI
26,063,006 UART: [art] Store in in slot 0x4
26,105,712 UART: [art] Derive Key Pair
26,106,716 UART: [art] Store priv key in slot 0x5
29,349,078 UART: [art] Derive Key Pair - Done
29,361,976 UART: [art] Signing Cert with AUTHO
29,363,290 UART: RITY.KEYID = 7
31,642,748 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,256 UART: [art] PUB.X = A86010CF67B4D4463E96B2942024B5270EE86B9C600E14CCC7DD0B538DF98B8A6E17C7980F7FA706774D0DD9F53CB088
31,651,409 UART: [art] PUB.Y = 5AB6DA57836CB6F8E9D4EB44EAFE0A0D559FEA29C10C9F5DE9B4C8750D6CB8B7D062810D8AA1C3F2D81DC0B2706A16E8
31,658,716 UART: [art] SIG.R = 11FCC400197BFF75C56434EE9E68455F7C1C7D5C5120A14C98A41446A44DA70AEB29BE1062F7E5C812AC3932EA4DEAFE
31,666,059 UART: [art] SIG.S = D518AFE645A5EE568213CAE78AAC94D18A0C6D6A527CB61944D70DFE9C4A6BD44DA275E9632027B6D29BB6939D5EF535
32,971,460 UART: Caliptra RT
32,972,178 UART: [state] CFI Enabled
33,089,742 UART: [rt] RT listening for mailbox commands...
33,091,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,123,048 UART: [rt]cmd =0x44504543, len=96
33,154,818 >>> mbox cmd response data (56 bytes)
33,155,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,186,230 UART: [rt]cmd =0x44504543, len=96
33,218,072 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,005 UART:
192,404 UART: Running Caliptra ROM ...
193,580 UART:
193,735 UART: [state] CFI Enabled
267,118 UART: [state] LifecycleState = Unprovisioned
269,046 UART: [state] DebugLocked = No
271,667 UART: [state] WD Timer not started. Device not locked for debugging
274,730 UART: [kat] SHA2-256
453,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,398 UART: [kat] ++
465,947 UART: [kat] sha1
476,616 UART: [kat] SHA2-256
479,622 UART: [kat] SHA2-384
486,606 UART: [kat] SHA2-512-ACC
489,548 UART: [kat] ECC-384
2,949,111 UART: [kat] HMAC-384Kdf
2,973,269 UART: [kat] LMS
3,502,722 UART: [kat] --
3,507,398 UART: [cold-reset] ++
3,508,911 UART: [fht] FHT @ 0x50003400
3,518,122 UART: [idev] ++
3,518,686 UART: [idev] CDI.KEYID = 6
3,519,670 UART: [idev] SUBJECT.KEYID = 7
3,520,783 UART: [idev] UDS.KEYID = 0
3,521,768 ready_for_fw is high
3,521,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,651 UART: [idev] Erasing UDS.KEYID = 0
6,030,377 UART: [idev] Sha1 KeyId Algorithm
6,053,925 UART: [idev] --
6,059,006 UART: [ldev] ++
6,059,585 UART: [ldev] CDI.KEYID = 6
6,060,505 UART: [ldev] SUBJECT.KEYID = 5
6,061,668 UART: [ldev] AUTHORITY.KEYID = 7
6,062,960 UART: [ldev] FE.KEYID = 1
6,103,386 UART: [ldev] Erasing FE.KEYID = 1
8,604,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,770 UART: [ldev] --
10,419,908 UART: [fwproc] Wait for Commands...
10,421,635 UART: [fwproc] Recv command 0x46574c44
10,423,692 UART: [fwproc] Recv'd Img size: 114168 bytes
13,827,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,285,881 >>> mbox cmd response: success
14,289,482 UART: [afmc] ++
14,290,084 UART: [afmc] CDI.KEYID = 6
14,291,022 UART: [afmc] SUBJECT.KEYID = 7
14,292,197 UART: [afmc] AUTHORITY.KEYID = 5
16,832,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,558,841 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,784 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,654 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,501 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,628,843 UART: [afmc] --
18,632,879 UART: [cold-reset] --
18,636,796 UART: [state] Locking Datavault
18,641,398 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,044 UART: [state] Locking ICCM
18,645,362 UART: [exit] Launching FMC @ 0x40000130
18,653,766 UART:
18,654,001 UART: Running Caliptra FMC ...
18,655,332 UART:
18,655,500 UART: [state] CFI Enabled
18,716,348 UART: [fht] FMC Alias Private Key: 7
20,479,070 UART: [art] Extend RT PCRs Done
20,480,296 UART: [art] Lock RT PCRs Done
20,482,024 UART: [art] Populate DV Done
20,487,494 UART: [fht] FMC Alias Private Key: 7
20,488,978 UART: [art] Derive CDI
20,489,742 UART: [art] Store in in slot 0x4
20,548,077 UART: [art] Derive Key Pair
20,549,122 UART: [art] Store priv key in slot 0x5
23,012,115 UART: [art] Derive Key Pair - Done
23,025,063 UART: [art] Signing Cert with AUTHO
23,026,368 UART: RITY.KEYID = 7
24,738,548 UART: [art] Erasing AUTHORITY.KEYID = 7
24,740,032 UART: [art] PUB.X = 540150E2E0EEF634B5CF0AF5810EDD0DE511C296161C1B34549EF50AB7784FF2877DF55B805BC5397686505F09EAF715
24,747,362 UART: [art] PUB.Y = D4463484B2CB1084B5BE1A7382F79DABBEAD8D4BC57EDD5EF5E538C3333C523E86A79B1CCD93FA0C9C6944A1552081CF
24,754,602 UART: [art] SIG.R = 5AC083D8B4BA4CA41990E4A22107E2F9AC999AF6ABA2BC52F535F6E702E11DA1DDC0FB2C5233F0DE46E6755DE8C177A1
24,762,008 UART: [art] SIG.S = 0A47AC72A563C432EFB66BE238228A7913C2D4BA6282BFEEE58DE0C906BD0955CCFA230AF1253E7EE8E4D8CB8067D6D0
25,740,549 UART: Caliptra RT
25,741,265 UART: [state] CFI Enabled
25,905,081 UART: [rt] RT listening for mailbox commands...
25,907,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,938,402 UART: [rt]cmd =0x44504543, len=96
25,969,390 >>> mbox cmd response data (56 bytes)
25,970,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,000,759 UART: [rt]cmd =0x44504543, len=96
26,031,516 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,359,211 ready_for_fw is high
3,359,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,017,159 >>> mbox cmd response: success
18,303,840 UART:
18,304,227 UART: Running Caliptra FMC ...
18,305,365 UART:
18,305,526 UART: [state] CFI Enabled
18,372,172 UART: [fht] FMC Alias Private Key: 7
20,135,806 UART: [art] Extend RT PCRs Done
20,137,034 UART: [art] Lock RT PCRs Done
20,138,780 UART: [art] Populate DV Done
20,143,982 UART: [fht] FMC Alias Private Key: 7
20,145,572 UART: [art] Derive CDI
20,146,406 UART: [art] Store in in slot 0x4
20,204,520 UART: [art] Derive Key Pair
20,205,554 UART: [art] Store priv key in slot 0x5
22,668,630 UART: [art] Derive Key Pair - Done
22,681,469 UART: [art] Signing Cert with AUTHO
22,682,773 UART: RITY.KEYID = 7
24,394,560 UART: [art] Erasing AUTHORITY.KEYID = 7
24,396,042 UART: [art] PUB.X = 4FD9950FBAE18E91BF6A3307546AFBBA8942110196E5FB104FEB6A79A03604AA333A84234C3F63C8451E32FF7C309D7E
24,403,395 UART: [art] PUB.Y = 0D5E5E0BFE4DA8E7A16D55FF0F6C7868F4FA40C36B71D558B7F3BA67979E612A5D77FEC0188CA7742D7C18CDC44E9D13
24,410,649 UART: [art] SIG.R = AE3A9B42CE33352B7A4BC3D03C0733BF63C40C96A868055A7FB4438FC0CE4A0C2A08E5FB08DBA0995EAE092DE77F5EB8
24,418,037 UART: [art] SIG.S = D37D30E69E0BC7591389437AEE3065CCA3F77F5D4AAC09D1D168CCD3E5C3CE1547017F1904384EA9C2AA11DE2A7AA475
25,398,192 UART: Caliptra RT
25,398,909 UART: [state] CFI Enabled
25,563,589 UART: [rt] RT listening for mailbox commands...
25,565,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,596,728 UART: [rt]cmd =0x44504543, len=96
25,627,778 >>> mbox cmd response data (56 bytes)
25,628,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,659,344 UART: [rt]cmd =0x44504543, len=96
25,691,165 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,764 writing to cptra_bootfsm_go
192,865 UART:
193,230 UART: Running Caliptra ROM ...
194,349 UART:
603,908 UART: [state] CFI Enabled
619,341 UART: [state] LifecycleState = Unprovisioned
621,213 UART: [state] DebugLocked = No
623,946 UART: [state] WD Timer not started. Device not locked for debugging
626,987 UART: [kat] SHA2-256
806,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,681 UART: [kat] ++
818,220 UART: [kat] sha1
828,890 UART: [kat] SHA2-256
831,898 UART: [kat] SHA2-384
838,382 UART: [kat] SHA2-512-ACC
841,313 UART: [kat] ECC-384
3,283,985 UART: [kat] HMAC-384Kdf
3,297,316 UART: [kat] LMS
3,826,780 UART: [kat] --
3,830,860 UART: [cold-reset] ++
3,832,437 UART: [fht] FHT @ 0x50003400
3,843,340 UART: [idev] ++
3,843,907 UART: [idev] CDI.KEYID = 6
3,844,820 UART: [idev] SUBJECT.KEYID = 7
3,845,993 UART: [idev] UDS.KEYID = 0
3,846,916 ready_for_fw is high
3,847,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,485 UART: [idev] Erasing UDS.KEYID = 0
6,315,360 UART: [idev] Sha1 KeyId Algorithm
6,338,611 UART: [idev] --
6,343,222 UART: [ldev] ++
6,343,793 UART: [ldev] CDI.KEYID = 6
6,344,678 UART: [ldev] SUBJECT.KEYID = 5
6,345,894 UART: [ldev] AUTHORITY.KEYID = 7
6,347,128 UART: [ldev] FE.KEYID = 1
6,359,332 UART: [ldev] Erasing FE.KEYID = 1
8,836,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,856 UART: [ldev] --
10,624,573 UART: [fwproc] Wait for Commands...
10,626,983 UART: [fwproc] Recv command 0x46574c44
10,629,069 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,420 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,547 >>> mbox cmd response: success
14,491,372 UART: [afmc] ++
14,491,991 UART: [afmc] CDI.KEYID = 6
14,493,097 UART: [afmc] SUBJECT.KEYID = 7
14,494,209 UART: [afmc] AUTHORITY.KEYID = 5
16,995,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,234 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,028 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,040 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,868 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,397 UART: [afmc] --
18,792,553 UART: [cold-reset] --
18,796,684 UART: [state] Locking Datavault
18,801,065 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,763 UART: [state] Locking ICCM
18,805,506 UART: [exit] Launching FMC @ 0x40000130
18,813,932 UART:
18,814,204 UART: Running Caliptra FMC ...
18,815,259 UART:
18,815,410 UART: [state] CFI Enabled
18,823,462 UART: [fht] FMC Alias Private Key: 7
20,580,457 UART: [art] Extend RT PCRs Done
20,581,683 UART: [art] Lock RT PCRs Done
20,583,663 UART: [art] Populate DV Done
20,589,501 UART: [fht] FMC Alias Private Key: 7
20,590,983 UART: [art] Derive CDI
20,591,743 UART: [art] Store in in slot 0x4
20,634,545 UART: [art] Derive Key Pair
20,635,545 UART: [art] Store priv key in slot 0x5
23,063,075 UART: [art] Derive Key Pair - Done
23,075,915 UART: [art] Signing Cert with AUTHO
23,077,219 UART: RITY.KEYID = 7
24,782,760 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,590 UART: [art] PUB.X = 2875729B09DD68C3C0F7FC4DA62024C390BBC6F3EC3628C7790BEE7AC568285BDFF27A46EEA969E24A74B3B5D3217B8D
24,791,603 UART: [art] PUB.Y = 03F350B6339582E4D1C93D577D4BB4A2C358F6ADAD3CCFE5AB12336EB5DBF691DCC0D93EDDB2FE38B49E9D14D4C5C231
24,798,896 UART: [art] SIG.R = 485DD537C6D6BE86886FB667ABB6FBBAA997ECDC2B7A82D7E18AE858C36BADFF81D50B8DDE61C53CF01A6F1D0A9D2BCC
24,806,296 UART: [art] SIG.S = B07A7894230C5C4034E460E4B39033DFD5F74E2EF772C23208EEA9C37A1ED01782BB820D44146FA92F06CEA880596A2C
25,785,509 UART: Caliptra RT
25,786,211 UART: [state] CFI Enabled
25,902,424 UART: [rt] RT listening for mailbox commands...
25,904,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,935,753 UART: [rt]cmd =0x44504543, len=96
25,967,600 >>> mbox cmd response data (56 bytes)
25,968,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,999,106 UART: [rt]cmd =0x44504543, len=96
26,030,608 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,792 writing to cptra_bootfsm_go
3,701,731 ready_for_fw is high
3,702,130 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,277,021 >>> mbox cmd response: success
18,527,213 UART:
18,527,608 UART: Running Caliptra FMC ...
18,528,738 UART:
18,528,902 UART: [state] CFI Enabled
18,536,958 UART: [fht] FMC Alias Private Key: 7
20,294,244 UART: [art] Extend RT PCRs Done
20,295,475 UART: [art] Lock RT PCRs Done
20,297,208 UART: [art] Populate DV Done
20,302,676 UART: [fht] FMC Alias Private Key: 7
20,304,273 UART: [art] Derive CDI
20,305,087 UART: [art] Store in in slot 0x4
20,347,996 UART: [art] Derive Key Pair
20,349,040 UART: [art] Store priv key in slot 0x5
22,776,011 UART: [art] Derive Key Pair - Done
22,789,174 UART: [art] Signing Cert with AUTHO
22,790,481 UART: RITY.KEYID = 7
24,495,560 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,062 UART: [art] PUB.X = B8E3006F47B686A58E82A2A3CA5BC2BE96BC34566827C02D1EDBE471FAAF8CA2C9A3BBDF5E4574C7241169B23B896F9B
24,504,363 UART: [art] PUB.Y = DBCAE735F9B5EA269D9AFCE169564E4294087695BAD9337B755257F89CF467B865E14EC65C4AEB48B428C69AFEDC1798
24,511,622 UART: [art] SIG.R = ACE43A58D2A800B87944D0BA0D986E0C53941E95C71B197D602B5986F4721DAF21563D4FED4831DAE76923B07F7272EB
24,519,018 UART: [art] SIG.S = 38A55E240C35CAB674BED7E48EE9123BE5BC370B59093C703DD6A9D70D06ABB518436B28A1D5D588C2856D896A0BC91E
25,498,213 UART: Caliptra RT
25,498,920 UART: [state] CFI Enabled
25,615,447 UART: [rt] RT listening for mailbox commands...
25,617,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,648,270 UART: [rt]cmd =0x44504543, len=96
25,679,494 >>> mbox cmd response data (56 bytes)
25,680,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,710,861 UART: [rt]cmd =0x44504543, len=96
25,742,599 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,028 UART:
192,406 UART: Running Caliptra ROM ...
193,608 UART:
193,772 UART: [state] CFI Enabled
267,440 UART: [state] LifecycleState = Unprovisioned
269,865 UART: [state] DebugLocked = No
271,404 UART: [state] WD Timer not started. Device not locked for debugging
275,453 UART: [kat] SHA2-256
465,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,088 UART: [kat] ++
476,590 UART: [kat] sha1
487,604 UART: [kat] SHA2-256
490,611 UART: [kat] SHA2-384
495,980 UART: [kat] SHA2-512-ACC
498,534 UART: [kat] ECC-384
2,949,353 UART: [kat] HMAC-384Kdf
2,973,861 UART: [kat] LMS
3,505,607 UART: [kat] --
3,510,737 UART: [cold-reset] ++
3,512,673 UART: [fht] FHT @ 0x50003400
3,523,295 UART: [idev] ++
3,524,008 UART: [idev] CDI.KEYID = 6
3,525,048 UART: [idev] SUBJECT.KEYID = 7
3,526,117 UART: [idev] UDS.KEYID = 0
3,527,106 ready_for_fw is high
3,527,336 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,992 UART: [idev] Erasing UDS.KEYID = 0
6,030,602 UART: [idev] Sha1 KeyId Algorithm
6,053,405 UART: [idev] --
6,058,545 UART: [ldev] ++
6,059,237 UART: [ldev] CDI.KEYID = 6
6,060,173 UART: [ldev] SUBJECT.KEYID = 5
6,061,339 UART: [ldev] AUTHORITY.KEYID = 7
6,062,519 UART: [ldev] FE.KEYID = 1
6,100,714 UART: [ldev] Erasing FE.KEYID = 1
8,607,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,069 UART: [ldev] --
10,414,176 UART: [fwproc] Wait for Commands...
10,416,749 UART: [fwproc] Recv command 0x46574c44
10,419,018 UART: [fwproc] Recv'd Img size: 114168 bytes
13,871,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,774 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,613,295 >>> mbox cmd response: success
14,618,192 UART: [afmc] ++
14,618,909 UART: [afmc] CDI.KEYID = 6
14,620,078 UART: [afmc] SUBJECT.KEYID = 7
14,621,577 UART: [afmc] AUTHORITY.KEYID = 5
17,154,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,716 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,897 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,235 UART: [afmc] --
18,968,822 UART: [cold-reset] --
18,971,666 UART: [state] Locking Datavault
18,977,558 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,758 UART: [state] Locking ICCM
18,981,813 UART: [exit] Launching FMC @ 0x40000130
18,990,511 UART:
18,990,745 UART: Running Caliptra FMC ...
18,991,847 UART:
18,992,005 UART: [state] CFI Enabled
19,051,828 UART: [fht] FMC Alias Private Key: 7
20,816,097 UART: [art] Extend RT PCRs Done
20,817,323 UART: [art] Lock RT PCRs Done
20,819,244 UART: [art] Populate DV Done
20,824,598 UART: [fht] FMC Alias Private Key: 7
20,826,243 UART: [art] Derive CDI
20,827,005 UART: [art] Store in in slot 0x4
20,884,912 UART: [art] Derive Key Pair
20,885,907 UART: [art] Store priv key in slot 0x5
23,348,728 UART: [art] Derive Key Pair - Done
23,361,448 UART: [art] Signing Cert with AUTHO
23,362,770 UART: RITY.KEYID = 7
25,074,887 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,400 UART: [art] PUB.X = E2451985798A048F3865950BBFB5D1323DAC946D6E63EDC836FEF1FE9A58EA50C71F114A417F2C832BCE494736298B04
25,083,665 UART: [art] PUB.Y = B0C6B92D3371CE677A0AD7DF62B446B20C2BF945BFE32DF97BBE6566321312464EA8194AFA13800E60196AC1DCF25EA5
25,090,918 UART: [art] SIG.R = A68DE0298B1E3FB4FB1BD67E27B757779804369AAF805A4A31D09F2EA2AA06CA7A950D9D22AA80A6973A2D2C8C63659A
25,098,330 UART: [art] SIG.S = 840359706FCA7FDEFE2657417CD70881BE9D42B90914FAFBDB5EFB3B8904B58300AF887D85EBEBCDE529B945A3BE5DCE
26,077,202 UART: Caliptra RT
26,077,895 UART: [state] CFI Enabled
26,244,304 UART: [rt] RT listening for mailbox commands...
26,246,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,277,361 UART: [rt]cmd =0x44504543, len=96
26,308,016 >>> mbox cmd response data (56 bytes)
26,308,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,316 UART: [rt]cmd =0x44504543, len=96
26,371,376 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,442,314 ready_for_fw is high
3,442,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,726,330 >>> mbox cmd response: success
19,007,675 UART:
19,008,063 UART: Running Caliptra FMC ...
19,009,181 UART:
19,009,341 UART: [state] CFI Enabled
19,073,398 UART: [fht] FMC Alias Private Key: 7
20,837,387 UART: [art] Extend RT PCRs Done
20,838,613 UART: [art] Lock RT PCRs Done
20,840,300 UART: [art] Populate DV Done
20,845,753 UART: [fht] FMC Alias Private Key: 7
20,847,248 UART: [art] Derive CDI
20,848,085 UART: [art] Store in in slot 0x4
20,906,272 UART: [art] Derive Key Pair
20,907,278 UART: [art] Store priv key in slot 0x5
23,370,304 UART: [art] Derive Key Pair - Done
23,383,526 UART: [art] Signing Cert with AUTHO
23,384,833 UART: RITY.KEYID = 7
25,096,396 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,920 UART: [art] PUB.X = 36650D5F803C3FA142A8D1E7F0938CF07B225A3B27A5A1D09EBCBCF4EDBC3A1500817895970E8013DF03E94D9048868A
25,105,165 UART: [art] PUB.Y = D76964D08FC165AB8DCD8E4E6B9C293817716942A136D46D7DD18EE0E92A56693D3E8563A2CC0B989230A0A4361CA7C2
25,112,433 UART: [art] SIG.R = 047D95EECB898C65443C0CC0F0CD21DF08B34CF86B106F2F6272D523D44DDBD22A6EB42AB29644EE069ECF65BC5E4598
25,119,818 UART: [art] SIG.S = D6A305E39C61A0361D09C53BF57581497D45F3A6F6096E7B183B2E6888561DAFA2C46B8310F2D567694AFEFD5A67B38F
26,099,219 UART: Caliptra RT
26,099,936 UART: [state] CFI Enabled
26,263,820 UART: [rt] RT listening for mailbox commands...
26,265,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,297,068 UART: [rt]cmd =0x44504543, len=96
26,328,001 >>> mbox cmd response data (56 bytes)
26,328,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,359,455 UART: [rt]cmd =0x44504543, len=96
26,390,820 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,848 writing to cptra_bootfsm_go
192,944 UART:
193,309 UART: Running Caliptra ROM ...
194,409 UART:
604,189 UART: [state] CFI Enabled
617,933 UART: [state] LifecycleState = Unprovisioned
620,360 UART: [state] DebugLocked = No
622,539 UART: [state] WD Timer not started. Device not locked for debugging
627,783 UART: [kat] SHA2-256
817,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,406 UART: [kat] ++
829,006 UART: [kat] sha1
840,954 UART: [kat] SHA2-256
843,963 UART: [kat] SHA2-384
848,815 UART: [kat] SHA2-512-ACC
851,395 UART: [kat] ECC-384
3,293,477 UART: [kat] HMAC-384Kdf
3,306,373 UART: [kat] LMS
3,838,183 UART: [kat] --
3,843,457 UART: [cold-reset] ++
3,845,454 UART: [fht] FHT @ 0x50003400
3,857,139 UART: [idev] ++
3,857,862 UART: [idev] CDI.KEYID = 6
3,858,748 UART: [idev] SUBJECT.KEYID = 7
3,859,992 UART: [idev] UDS.KEYID = 0
3,860,899 ready_for_fw is high
3,861,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,747 UART: [idev] Erasing UDS.KEYID = 0
6,339,014 UART: [idev] Sha1 KeyId Algorithm
6,361,972 UART: [idev] --
6,367,105 UART: [ldev] ++
6,367,782 UART: [ldev] CDI.KEYID = 6
6,368,697 UART: [ldev] SUBJECT.KEYID = 5
6,369,860 UART: [ldev] AUTHORITY.KEYID = 7
6,371,093 UART: [ldev] FE.KEYID = 1
6,382,337 UART: [ldev] Erasing FE.KEYID = 1
8,859,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,677 UART: [ldev] --
10,650,777 UART: [fwproc] Wait for Commands...
10,652,276 UART: [fwproc] Recv command 0x46574c44
10,654,580 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,840,326 >>> mbox cmd response: success
14,844,123 UART: [afmc] ++
14,844,841 UART: [afmc] CDI.KEYID = 6
14,846,085 UART: [afmc] SUBJECT.KEYID = 7
14,847,524 UART: [afmc] AUTHORITY.KEYID = 5
17,348,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,073,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,075,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,090,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,105,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,120,745 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,142 UART: [afmc] --
19,149,171 UART: [cold-reset] --
19,152,342 UART: [state] Locking Datavault
19,158,034 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,231 UART: [state] Locking ICCM
19,162,980 UART: [exit] Launching FMC @ 0x40000130
19,171,664 UART:
19,171,907 UART: Running Caliptra FMC ...
19,172,968 UART:
19,173,125 UART: [state] CFI Enabled
19,181,183 UART: [fht] FMC Alias Private Key: 7
20,938,564 UART: [art] Extend RT PCRs Done
20,939,781 UART: [art] Lock RT PCRs Done
20,941,384 UART: [art] Populate DV Done
20,946,854 UART: [fht] FMC Alias Private Key: 7
20,948,389 UART: [art] Derive CDI
20,949,127 UART: [art] Store in in slot 0x4
20,991,338 UART: [art] Derive Key Pair
20,992,335 UART: [art] Store priv key in slot 0x5
23,418,682 UART: [art] Derive Key Pair - Done
23,431,611 UART: [art] Signing Cert with AUTHO
23,432,913 UART: RITY.KEYID = 7
25,138,227 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,732 UART: [art] PUB.X = 043F7805701942658835E1A9DB55E3F9CE6DE5D4E4F38EA3178422A9DF0D20993D90B7FCC7B287C1410D66F79E2FA159
25,146,988 UART: [art] PUB.Y = E0B61235A9F4DC5D939A125A319AFD93790EC5D2EA9B5F330CEABE3FCD69D7312FB36A73AA0E65DF627C3495CE5DAD92
25,154,326 UART: [art] SIG.R = CD7C76DA07BA9D59C7FAB7D7440B69E14792D6C65FF524F9397C56889995A8F13C0AC50065178655CF090DCD2CF06F1E
25,161,662 UART: [art] SIG.S = C4B1394AD00E3414145ED28F23D2C3D1334796C9CCA2E37111E20B65AF156BADED015FCCA05B7E804DC0E5B581DCFF2F
26,140,368 UART: Caliptra RT
26,141,051 UART: [state] CFI Enabled
26,259,029 UART: [rt] RT listening for mailbox commands...
26,260,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,292,357 UART: [rt]cmd =0x44504543, len=96
26,323,903 >>> mbox cmd response data (56 bytes)
26,324,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,355,235 UART: [rt]cmd =0x44504543, len=96
26,386,520 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,727 writing to cptra_bootfsm_go
3,758,307 ready_for_fw is high
3,758,935 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,963,164 >>> mbox cmd response: success
19,218,695 UART:
19,219,077 UART: Running Caliptra FMC ...
19,220,269 UART:
19,220,445 UART: [state] CFI Enabled
19,228,508 UART: [fht] FMC Alias Private Key: 7
20,984,868 UART: [art] Extend RT PCRs Done
20,986,087 UART: [art] Lock RT PCRs Done
20,987,771 UART: [art] Populate DV Done
20,992,917 UART: [fht] FMC Alias Private Key: 7
20,994,563 UART: [art] Derive CDI
20,995,379 UART: [art] Store in in slot 0x4
21,037,921 UART: [art] Derive Key Pair
21,038,965 UART: [art] Store priv key in slot 0x5
23,465,880 UART: [art] Derive Key Pair - Done
23,478,775 UART: [art] Signing Cert with AUTHO
23,480,075 UART: RITY.KEYID = 7
25,185,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,620 UART: [art] PUB.X = EDAB71697671153610CB7F2CCAE29E0FEDF740FA45CAD3B5366A02A7E6ACAE8D7268DBCBA779D0867186262E3CAF2A28
25,193,926 UART: [art] PUB.Y = A19E88298F74942B4A56B1A7457A0E7A4BA43942A08F9D0101460C0D0A6A61594813D10B9C9AD5B5D11B3C4865184956
25,201,164 UART: [art] SIG.R = AA5D0A0481942F39E980F110D7A6E4034B8A8E364249CD33A822AB1F483654B4480307EBB811E6B372CEEBD7F3D20A02
25,208,564 UART: [art] SIG.S = DA42DC9CF06CF15E00752F558559C4702E7254C57C9D2ED92E3047CA05A99548CA09BD0C4EFD4DD1D757791E464030A5
26,187,656 UART: Caliptra RT
26,188,350 UART: [state] CFI Enabled
26,304,937 UART: [rt] RT listening for mailbox commands...
26,306,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,338,023 UART: [rt]cmd =0x44504543, len=96
26,369,482 >>> mbox cmd response data (56 bytes)
26,370,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,400,853 UART: [rt]cmd =0x44504543, len=96
26,431,479 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,723 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,227 UART: [kat] SHA2-256
882,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,273 UART: [kat] ++
886,425 UART: [kat] sha1
890,749 UART: [kat] SHA2-256
892,687 UART: [kat] SHA2-384
895,624 UART: [kat] SHA2-512-ACC
897,525 UART: [kat] ECC-384
902,872 UART: [kat] HMAC-384Kdf
907,534 UART: [kat] LMS
1,475,730 UART: [kat] --
1,476,817 UART: [cold-reset] ++
1,477,335 UART: [fht] Storing FHT @ 0x50003400
1,480,036 UART: [idev] ++
1,480,204 UART: [idev] CDI.KEYID = 6
1,480,564 UART: [idev] SUBJECT.KEYID = 7
1,480,988 UART: [idev] UDS.KEYID = 0
1,481,333 ready_for_fw is high
1,481,333 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,714 UART: [idev] Erasing UDS.KEYID = 0
1,505,272 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,976 UART: [idev] --
1,515,069 UART: [ldev] ++
1,515,237 UART: [ldev] CDI.KEYID = 6
1,515,600 UART: [ldev] SUBJECT.KEYID = 5
1,516,026 UART: [ldev] AUTHORITY.KEYID = 7
1,516,489 UART: [ldev] FE.KEYID = 1
1,521,611 UART: [ldev] Erasing FE.KEYID = 1
1,546,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,814 UART: [ldev] --
1,586,099 UART: [fwproc] Waiting for Commands...
1,586,742 UART: [fwproc] Received command 0x46574c44
1,587,533 UART: [fwproc] Received Image of size 114168 bytes
2,883,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,217 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,569 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,222 >>> mbox cmd response: success
3,076,408 UART: [afmc] ++
3,076,576 UART: [afmc] CDI.KEYID = 6
3,076,938 UART: [afmc] SUBJECT.KEYID = 7
3,077,363 UART: [afmc] AUTHORITY.KEYID = 5
3,111,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,632 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,412 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,140 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,025 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,715 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,542 UART: [afmc] --
3,155,442 UART: [cold-reset] --
3,156,116 UART: [state] Locking Datavault
3,157,313 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,917 UART: [state] Locking ICCM
3,158,447 UART: [exit] Launching FMC @ 0x40000130
3,163,776 UART:
3,163,792 UART: Running Caliptra FMC ...
3,164,200 UART:
3,164,254 UART: [state] CFI Enabled
3,174,817 UART: [fht] FMC Alias Private Key: 7
3,282,766 UART: [art] Extend RT PCRs Done
3,283,194 UART: [art] Lock RT PCRs Done
3,284,526 UART: [art] Populate DV Done
3,292,599 UART: [fht] FMC Alias Private Key: 7
3,293,659 UART: [art] Derive CDI
3,293,939 UART: [art] Store in in slot 0x4
3,379,702 UART: [art] Derive Key Pair
3,380,062 UART: [art] Store priv key in slot 0x5
3,392,986 UART: [art] Derive Key Pair - Done
3,407,908 UART: [art] Signing Cert with AUTHO
3,408,388 UART: RITY.KEYID = 7
3,424,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,875 UART: [art] PUB.X = 4BC0E06DF64CDA57BF9D4DD6A44D26D976F82BE283F5279DFFCBE73887A5DD115BF666DCD4E9B341AA96AA3ADE832DED
3,431,675 UART: [art] PUB.Y = 5CE8D47AA63EE3240684650F7368DF2B04C84D6FFF0337889DEF98DB67A8F9FF45347B4EBB8704372E6A20E03A0B1E98
3,438,615 UART: [art] SIG.R = 5398CF9F7FE47A9987336C618867C8B3ED2E5E7392C12EC80D88191BCA27D5B95BDFF7207ACC4545A1821991AF748C55
3,445,386 UART: [art] SIG.S = 7542B84D67EF4CAA715551223E33F70F5FBB234E571D83FF9CAC40680CF62BAA057A1BF0161D1E91EB0E9B0D53E48F0F
3,469,739 UART: Caliptra RT
3,469,992 UART: [state] CFI Enabled
3,578,404 UART: [rt] RT listening for mailbox commands...
3,579,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,228 UART: [rt]cmd =0x44504543, len=96
3,641,319 >>> mbox cmd response data (56 bytes)
3,641,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,671,193 UART: [rt]cmd =0x44504543, len=96
3,705,327 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,003 ready_for_fw is high
1,362,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,192 >>> mbox cmd response: success
2,987,608 UART:
2,987,624 UART: Running Caliptra FMC ...
2,988,032 UART:
2,988,086 UART: [state] CFI Enabled
2,998,801 UART: [fht] FMC Alias Private Key: 7
3,106,902 UART: [art] Extend RT PCRs Done
3,107,330 UART: [art] Lock RT PCRs Done
3,108,782 UART: [art] Populate DV Done
3,117,171 UART: [fht] FMC Alias Private Key: 7
3,118,149 UART: [art] Derive CDI
3,118,429 UART: [art] Store in in slot 0x4
3,204,324 UART: [art] Derive Key Pair
3,204,684 UART: [art] Store priv key in slot 0x5
3,218,454 UART: [art] Derive Key Pair - Done
3,233,036 UART: [art] Signing Cert with AUTHO
3,233,516 UART: RITY.KEYID = 7
3,248,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,681 UART: [art] PUB.X = 4AE1EE84BE7B98E3B5223318DAF0A197A186605941EFE5B6DBB869D5F046503D60D3B3360592A0E3438B1C4F3C275EC6
3,256,454 UART: [art] PUB.Y = 68A7095406C1303C97F1F9C30F8683EA4138AEF9535946467A55D7A50A680E4CAD836D1B585984D96113B52CF675E5C4
3,263,383 UART: [art] SIG.R = 5500343696BDA33946C47BF0F4E00CED6FCB171EFA88B760B6287B1FBC510F41F7463BCDD4EB44D91ADCFF8A6A1D75A6
3,270,145 UART: [art] SIG.S = 74D04B12144D87C133DFC731873C34512458188D026FF38EEAFBF37455BE3278D1089E4D65B29925655F082DAA13EB17
3,294,309 UART: Caliptra RT
3,294,562 UART: [state] CFI Enabled
3,401,508 UART: [rt] RT listening for mailbox commands...
3,402,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,040 UART: [rt]cmd =0x44504543, len=96
3,465,603 >>> mbox cmd response data (56 bytes)
3,465,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,465 UART: [rt]cmd =0x44504543, len=96
3,527,689 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,564 UART: [kat] SHA2-256
882,495 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,610 UART: [kat] ++
886,762 UART: [kat] sha1
891,116 UART: [kat] SHA2-256
893,054 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,681 UART: [kat] LMS
1,475,877 UART: [kat] --
1,476,686 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,479,733 UART: [idev] ++
1,479,901 UART: [idev] CDI.KEYID = 6
1,480,261 UART: [idev] SUBJECT.KEYID = 7
1,480,685 UART: [idev] UDS.KEYID = 0
1,481,030 ready_for_fw is high
1,481,030 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,695 UART: [idev] Erasing UDS.KEYID = 0
1,505,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,679 UART: [idev] --
1,514,594 UART: [ldev] ++
1,514,762 UART: [ldev] CDI.KEYID = 6
1,515,125 UART: [ldev] SUBJECT.KEYID = 5
1,515,551 UART: [ldev] AUTHORITY.KEYID = 7
1,516,014 UART: [ldev] FE.KEYID = 1
1,520,928 UART: [ldev] Erasing FE.KEYID = 1
1,545,999 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,031 UART: [ldev] --
1,585,356 UART: [fwproc] Waiting for Commands...
1,586,143 UART: [fwproc] Received command 0x46574c44
1,586,934 UART: [fwproc] Received Image of size 114168 bytes
2,882,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,718 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,687 >>> mbox cmd response: success
3,075,705 UART: [afmc] ++
3,075,873 UART: [afmc] CDI.KEYID = 6
3,076,235 UART: [afmc] SUBJECT.KEYID = 7
3,076,660 UART: [afmc] AUTHORITY.KEYID = 5
3,112,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,983 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,763 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,491 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,376 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,066 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,805 UART: [afmc] --
3,155,911 UART: [cold-reset] --
3,156,845 UART: [state] Locking Datavault
3,157,908 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,512 UART: [state] Locking ICCM
3,159,016 UART: [exit] Launching FMC @ 0x40000130
3,164,345 UART:
3,164,361 UART: Running Caliptra FMC ...
3,164,769 UART:
3,164,912 UART: [state] CFI Enabled
3,175,469 UART: [fht] FMC Alias Private Key: 7
3,283,814 UART: [art] Extend RT PCRs Done
3,284,242 UART: [art] Lock RT PCRs Done
3,285,608 UART: [art] Populate DV Done
3,293,951 UART: [fht] FMC Alias Private Key: 7
3,294,933 UART: [art] Derive CDI
3,295,213 UART: [art] Store in in slot 0x4
3,380,678 UART: [art] Derive Key Pair
3,381,038 UART: [art] Store priv key in slot 0x5
3,394,408 UART: [art] Derive Key Pair - Done
3,409,744 UART: [art] Signing Cert with AUTHO
3,410,224 UART: RITY.KEYID = 7
3,425,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,425 UART: [art] PUB.X = 9D2C20D0DFE1FF4D1B3F7B2AACFCE35BE8FB41844BB4A574C1AE48CE940AB3BB59F49F9D108E1679246FEB960696E22D
3,433,213 UART: [art] PUB.Y = 7BB3F5754ED3CF726D9F53D43B6E6D7886CCE56BF6A0D2ED861C217CA86B57EF547F2A20013553246F65FB39D8ADD66E
3,440,174 UART: [art] SIG.R = DCBB9E504FF9FDA02C4579B793BA3517B0E4D198E12F2732CF51BC2CF410DA981B4961A4661073E5E2CE4BD8C167599B
3,446,956 UART: [art] SIG.S = DB8F5186FA75BA4518A6F56F5EA91288B02D46CF2DB317E7B108D967800E1177C94B0DC288EAF9396243EC365CCF0558
3,470,433 UART: Caliptra RT
3,470,778 UART: [state] CFI Enabled
3,578,802 UART: [rt] RT listening for mailbox commands...
3,579,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,916 UART: [rt]cmd =0x44504543, len=96
3,643,069 >>> mbox cmd response data (56 bytes)
3,643,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,673,037 UART: [rt]cmd =0x44504543, len=96
3,705,917 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 ready_for_fw is high
1,362,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,501 >>> mbox cmd response: success
2,988,111 UART:
2,988,127 UART: Running Caliptra FMC ...
2,988,535 UART:
2,988,678 UART: [state] CFI Enabled
2,999,469 UART: [fht] FMC Alias Private Key: 7
3,106,640 UART: [art] Extend RT PCRs Done
3,107,068 UART: [art] Lock RT PCRs Done
3,108,840 UART: [art] Populate DV Done
3,117,075 UART: [fht] FMC Alias Private Key: 7
3,118,203 UART: [art] Derive CDI
3,118,483 UART: [art] Store in in slot 0x4
3,204,010 UART: [art] Derive Key Pair
3,204,370 UART: [art] Store priv key in slot 0x5
3,217,386 UART: [art] Derive Key Pair - Done
3,232,520 UART: [art] Signing Cert with AUTHO
3,233,000 UART: RITY.KEYID = 7
3,248,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,175 UART: [art] PUB.X = 0B6DCD113788CC93E4C3456910FFBBAE72E8DBD22AAD5BDE21245F1E0250030482E73F18117D93C3248A500428FB2928
3,255,934 UART: [art] PUB.Y = 00C628A7DBA9F98C15FC9249D77F988C0E93847FD28F9E56A1F764D3424D93ACDEB0E0A437E9D005D805F1B30A2572FF
3,262,860 UART: [art] SIG.R = 1BBD86CEE0D76C1300D5ECBE5B6D7B0BF3A47C2983A53BB2FF67948DE38152189E25A4FE241C8343851EA5F886470419
3,269,610 UART: [art] SIG.S = 788E615B4554D17183951ACC471F478AD446573AE09D7EB82C04D5C0D116E2DC49BB4075A5FC4551CCD638B1185EEA61
3,292,972 UART: Caliptra RT
3,293,317 UART: [state] CFI Enabled
3,401,589 UART: [rt] RT listening for mailbox commands...
3,402,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,655 UART: [rt]cmd =0x44504543, len=96
3,465,176 >>> mbox cmd response data (56 bytes)
3,465,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,290 UART: [rt]cmd =0x44504543, len=96
3,528,008 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,311 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,332 UART: [kat] SHA2-512-ACC
908,233 UART: [kat] ECC-384
917,696 UART: [kat] HMAC-384Kdf
922,268 UART: [kat] LMS
1,170,596 UART: [kat] --
1,171,541 UART: [cold-reset] ++
1,172,097 UART: [fht] FHT @ 0x50003400
1,174,868 UART: [idev] ++
1,175,036 UART: [idev] CDI.KEYID = 6
1,175,396 UART: [idev] SUBJECT.KEYID = 7
1,175,820 UART: [idev] UDS.KEYID = 0
1,176,165 ready_for_fw is high
1,176,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,337 UART: [idev] --
1,210,279 UART: [ldev] ++
1,210,447 UART: [ldev] CDI.KEYID = 6
1,210,810 UART: [ldev] SUBJECT.KEYID = 5
1,211,236 UART: [ldev] AUTHORITY.KEYID = 7
1,211,699 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,585 UART: [ldev] --
1,281,880 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x46574c44
1,283,364 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,045 >>> mbox cmd response: success
2,774,265 UART: [afmc] ++
2,774,433 UART: [afmc] CDI.KEYID = 6
2,774,795 UART: [afmc] SUBJECT.KEYID = 7
2,775,220 UART: [afmc] AUTHORITY.KEYID = 5
2,810,153 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,562 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,290 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,175 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,894 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,670 UART: [afmc] --
2,853,684 UART: [cold-reset] --
2,854,478 UART: [state] Locking Datavault
2,855,719 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,323 UART: [state] Locking ICCM
2,856,837 UART: [exit] Launching FMC @ 0x40000130
2,862,166 UART:
2,862,182 UART: Running Caliptra FMC ...
2,862,590 UART:
2,862,644 UART: [state] CFI Enabled
2,873,099 UART: [fht] FMC Alias Private Key: 7
2,981,652 UART: [art] Extend RT PCRs Done
2,982,080 UART: [art] Lock RT PCRs Done
2,983,538 UART: [art] Populate DV Done
2,991,555 UART: [fht] FMC Alias Private Key: 7
2,992,541 UART: [art] Derive CDI
2,992,821 UART: [art] Store in in slot 0x4
3,078,256 UART: [art] Derive Key Pair
3,078,616 UART: [art] Store priv key in slot 0x5
3,092,446 UART: [art] Derive Key Pair - Done
3,107,535 UART: [art] Signing Cert with AUTHO
3,108,015 UART: RITY.KEYID = 7
3,123,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,966 UART: [art] PUB.X = 86978D522B92FE974F0D599892BC1DD9D66EC9249352818EB95037704198E3B1F4F02AFFB62377CBEDED074471A5EBED
3,130,736 UART: [art] PUB.Y = 4E10321C7EE17457916AF7FDC06536D8E8ADFDF1CCAD1E408ED784A82FFDB01EDE534665726D8256CB804598731F102C
3,137,696 UART: [art] SIG.R = 40B80D87077C508EA244AC8D7A24E0B5D0670A661188DC6DCE355EF0DA4E473E86B7BB22B2763C18B7AAF14D74A1AFCA
3,144,473 UART: [art] SIG.S = 08819507CD769797C072E41638FB18706B5E0C438C247C8C61BBE216C5360C305BA8EEC62DD0611482AF995541C36F93
3,168,494 UART: Caliptra RT
3,168,747 UART: [state] CFI Enabled
3,276,428 UART: [rt] RT listening for mailbox commands...
3,277,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,708 UART: [rt]cmd =0x44504543, len=96
3,339,789 >>> mbox cmd response data (56 bytes)
3,339,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,633 UART: [rt]cmd =0x44504543, len=96
3,402,751 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,947 ready_for_fw is high
1,060,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,790 >>> mbox cmd response: success
2,687,128 UART:
2,687,144 UART: Running Caliptra FMC ...
2,687,552 UART:
2,687,606 UART: [state] CFI Enabled
2,698,303 UART: [fht] FMC Alias Private Key: 7
2,806,430 UART: [art] Extend RT PCRs Done
2,806,858 UART: [art] Lock RT PCRs Done
2,808,388 UART: [art] Populate DV Done
2,816,525 UART: [fht] FMC Alias Private Key: 7
2,817,567 UART: [art] Derive CDI
2,817,847 UART: [art] Store in in slot 0x4
2,903,264 UART: [art] Derive Key Pair
2,903,624 UART: [art] Store priv key in slot 0x5
2,916,876 UART: [art] Derive Key Pair - Done
2,931,486 UART: [art] Signing Cert with AUTHO
2,931,966 UART: RITY.KEYID = 7
2,947,430 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,195 UART: [art] PUB.X = 380B5453A231237935DA03CC3297767D330815A7CC46B282FFE3D9D931B7E658A04F2F7DE158CE3FDF0455E4220C401F
2,954,950 UART: [art] PUB.Y = 35D8121E078EA9E78A3C99167F5578E8812BC3520FE9D847D37F7DB835C2C9CFA88C6E223C9BA3595C6EE3F0553C07E2
2,961,897 UART: [art] SIG.R = 2903E6D824CED9E2480F1D0595A9EA7137E2DA3E2A130726A1D668717BD7DDB3CF29CC760EF45E9A84F1DC6F33484F2B
2,968,664 UART: [art] SIG.S = 39ABA67DA099BA942B3CCED4574297F1BFDC5A905B956D5B212B584D360C52EA51EF8836D2C9C0C4C33F5DD03A35A450
2,992,376 UART: Caliptra RT
2,992,629 UART: [state] CFI Enabled
3,099,750 UART: [rt] RT listening for mailbox commands...
3,100,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,638 UART: [rt]cmd =0x44504543, len=96
3,163,657 >>> mbox cmd response data (56 bytes)
3,163,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,193,477 UART: [rt]cmd =0x44504543, len=96
3,226,505 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,299 UART: [state] LifecycleState = Unprovisioned
86,954 UART: [state] DebugLocked = No
87,592 UART: [state] WD Timer not started. Device not locked for debugging
88,831 UART: [kat] SHA2-256
894,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,606 UART: [kat] ++
898,758 UART: [kat] sha1
903,120 UART: [kat] SHA2-256
905,060 UART: [kat] SHA2-384
907,623 UART: [kat] SHA2-512-ACC
909,524 UART: [kat] ECC-384
919,289 UART: [kat] HMAC-384Kdf
923,921 UART: [kat] LMS
1,172,249 UART: [kat] --
1,173,020 UART: [cold-reset] ++
1,173,362 UART: [fht] FHT @ 0x50003400
1,175,983 UART: [idev] ++
1,176,151 UART: [idev] CDI.KEYID = 6
1,176,511 UART: [idev] SUBJECT.KEYID = 7
1,176,935 UART: [idev] UDS.KEYID = 0
1,177,280 ready_for_fw is high
1,177,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,981 UART: [idev] Erasing UDS.KEYID = 0
1,201,884 UART: [idev] Sha1 KeyId Algorithm
1,210,184 UART: [idev] --
1,211,260 UART: [ldev] ++
1,211,428 UART: [ldev] CDI.KEYID = 6
1,211,791 UART: [ldev] SUBJECT.KEYID = 5
1,212,217 UART: [ldev] AUTHORITY.KEYID = 7
1,212,680 UART: [ldev] FE.KEYID = 1
1,217,980 UART: [ldev] Erasing FE.KEYID = 1
1,244,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,074 UART: [ldev] --
1,283,509 UART: [fwproc] Wait for Commands...
1,284,201 UART: [fwproc] Recv command 0x46574c44
1,284,929 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,792 >>> mbox cmd response: success
2,774,872 UART: [afmc] ++
2,775,040 UART: [afmc] CDI.KEYID = 6
2,775,402 UART: [afmc] SUBJECT.KEYID = 7
2,775,827 UART: [afmc] AUTHORITY.KEYID = 5
2,811,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,469 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,197 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,082 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,801 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,661 UART: [afmc] --
2,854,681 UART: [cold-reset] --
2,855,549 UART: [state] Locking Datavault
2,856,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,170 UART: [state] Locking ICCM
2,857,710 UART: [exit] Launching FMC @ 0x40000130
2,863,039 UART:
2,863,055 UART: Running Caliptra FMC ...
2,863,463 UART:
2,863,606 UART: [state] CFI Enabled
2,874,557 UART: [fht] FMC Alias Private Key: 7
2,982,478 UART: [art] Extend RT PCRs Done
2,982,906 UART: [art] Lock RT PCRs Done
2,984,130 UART: [art] Populate DV Done
2,992,261 UART: [fht] FMC Alias Private Key: 7
2,993,391 UART: [art] Derive CDI
2,993,671 UART: [art] Store in in slot 0x4
3,079,494 UART: [art] Derive Key Pair
3,079,854 UART: [art] Store priv key in slot 0x5
3,093,282 UART: [art] Derive Key Pair - Done
3,107,951 UART: [art] Signing Cert with AUTHO
3,108,431 UART: RITY.KEYID = 7
3,123,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,996 UART: [art] PUB.X = 2073A24B2F8583D58FDCFC07F2677B21C8E0C42385D7CC7DFAC233428006024AD1AFCC1809F6A3DADD66ADEF9E96E1CE
3,130,774 UART: [art] PUB.Y = FDBE502A285FA250DB53EBEA386815900923BA90CED95D96B60EAE6C1A0B64D01F1A03130B4380879A02F815A38256D6
3,137,712 UART: [art] SIG.R = 7B09169EA71C95A7A760ECAF6FD3523B090491BD0C697E8B99CBE5BD55845B9F5E3B87DAAC7B4B23110CDC2F183EA00B
3,144,482 UART: [art] SIG.S = A66F0CDCC9E7C1B29D0CBE526FEEC5E3CA4E6050E2703DFBBF79080F04001867F0DEEA6C7B40EB7204F032C8470B9703
3,168,213 UART: Caliptra RT
3,168,558 UART: [state] CFI Enabled
3,275,707 UART: [rt] RT listening for mailbox commands...
3,276,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,729 UART: [rt]cmd =0x44504543, len=96
3,339,124 >>> mbox cmd response data (56 bytes)
3,339,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,369,246 UART: [rt]cmd =0x44504543, len=96
3,402,354 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 ready_for_fw is high
1,060,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,369 >>> mbox cmd response: success
2,688,751 UART:
2,688,767 UART: Running Caliptra FMC ...
2,689,175 UART:
2,689,318 UART: [state] CFI Enabled
2,699,867 UART: [fht] FMC Alias Private Key: 7
2,808,480 UART: [art] Extend RT PCRs Done
2,808,908 UART: [art] Lock RT PCRs Done
2,810,548 UART: [art] Populate DV Done
2,818,805 UART: [fht] FMC Alias Private Key: 7
2,819,973 UART: [art] Derive CDI
2,820,253 UART: [art] Store in in slot 0x4
2,906,580 UART: [art] Derive Key Pair
2,906,940 UART: [art] Store priv key in slot 0x5
2,920,290 UART: [art] Derive Key Pair - Done
2,934,996 UART: [art] Signing Cert with AUTHO
2,935,476 UART: RITY.KEYID = 7
2,950,998 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,763 UART: [art] PUB.X = BD0DA0983B77F046742733A978FB29F15B0113957FD31EF78F8D9CB0047BDC1F4BD9C2B9FB59C9CED7DE006EA00E4AFF
2,958,519 UART: [art] PUB.Y = 8BA68FE2287FA41F9A4259868614B818E11D3CE31172AC8E91170B18E5D60056A98B934728677C76E9FA76577250A8FB
2,965,438 UART: [art] SIG.R = 760B5B111290C172F703FBBF235A3BD4F63D910C519255BBD007257D88AC49710F886F0C757A877C818C2F57104774D7
2,972,184 UART: [art] SIG.S = 3807943B6A50C1EF8BACB7F1D43F24524D26B6A995DFA392F46C738EDB3C1DCDCCB27A4EEC825471D40F15A956D5081E
2,996,498 UART: Caliptra RT
2,996,843 UART: [state] CFI Enabled
3,105,270 UART: [rt] RT listening for mailbox commands...
3,105,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,136,476 UART: [rt]cmd =0x44504543, len=96
3,168,889 >>> mbox cmd response data (56 bytes)
3,168,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,199,139 UART: [rt]cmd =0x44504543, len=96
3,231,497 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,696 UART: [state] LifecycleState = Unprovisioned
86,351 UART: [state] DebugLocked = No
86,837 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,805 UART: [kat] ++
895,957 UART: [kat] sha1
900,221 UART: [kat] SHA2-256
902,161 UART: [kat] SHA2-384
904,926 UART: [kat] SHA2-512-ACC
906,827 UART: [kat] ECC-384
917,002 UART: [kat] HMAC-384Kdf
921,662 UART: [kat] LMS
1,169,974 UART: [kat] --
1,170,969 UART: [cold-reset] ++
1,171,547 UART: [fht] FHT @ 0x50003400
1,174,073 UART: [idev] ++
1,174,241 UART: [idev] CDI.KEYID = 6
1,174,602 UART: [idev] SUBJECT.KEYID = 7
1,175,027 UART: [idev] UDS.KEYID = 0
1,175,373 ready_for_fw is high
1,175,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,103 UART: [idev] Erasing UDS.KEYID = 0
1,199,937 UART: [idev] Sha1 KeyId Algorithm
1,208,965 UART: [idev] --
1,209,990 UART: [ldev] ++
1,210,158 UART: [ldev] CDI.KEYID = 6
1,210,522 UART: [ldev] SUBJECT.KEYID = 5
1,210,949 UART: [ldev] AUTHORITY.KEYID = 7
1,211,412 UART: [ldev] FE.KEYID = 1
1,216,628 UART: [ldev] Erasing FE.KEYID = 1
1,243,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,004 UART: [ldev] --
1,282,426 UART: [fwproc] Wait for Commands...
1,283,017 UART: [fwproc] Recv command 0x46574c44
1,283,750 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,911 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,459 >>> mbox cmd response: success
2,773,588 UART: [afmc] ++
2,773,756 UART: [afmc] CDI.KEYID = 6
2,774,119 UART: [afmc] SUBJECT.KEYID = 7
2,774,545 UART: [afmc] AUTHORITY.KEYID = 5
2,810,614 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,412 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,295 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,014 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,791 UART: [afmc] --
2,853,881 UART: [cold-reset] --
2,854,761 UART: [state] Locking Datavault
2,855,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,512 UART: [state] Locking ICCM
2,857,032 UART: [exit] Launching FMC @ 0x40000130
2,862,361 UART:
2,862,377 UART: Running Caliptra FMC ...
2,862,785 UART:
2,862,839 UART: [state] CFI Enabled
2,873,432 UART: [fht] FMC Alias Private Key: 7
2,981,273 UART: [art] Extend RT PCRs Done
2,981,701 UART: [art] Lock RT PCRs Done
2,983,097 UART: [art] Populate DV Done
2,991,300 UART: [fht] FMC Alias Private Key: 7
2,992,336 UART: [art] Derive CDI
2,992,616 UART: [art] Store in in slot 0x4
3,078,291 UART: [art] Derive Key Pair
3,078,651 UART: [art] Store priv key in slot 0x5
3,091,809 UART: [art] Derive Key Pair - Done
3,106,449 UART: [art] Signing Cert with AUTHO
3,106,929 UART: RITY.KEYID = 7
3,121,763 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,528 UART: [art] PUB.X = 17DDCD3BD1C24ECD84E12321A8F2D1CF6CEA15BD5D242B508BE3B953A89BD6075ED3F61476AF9621931FE2053C24DEFE
3,129,312 UART: [art] PUB.Y = 3AC8075AFA84A914AF5CCC189EF6C3D9CF2547F6B282AC169F764B9448F1B08332BAB1F2B848BBC0A1DF37DC8A4072EC
3,136,279 UART: [art] SIG.R = BCEF62EF6BDE93343DFCACF52342ACA70593E8B20936912CAA7DE77D6683F680E1C9750D1F589056DB07D291EDB85E80
3,143,051 UART: [art] SIG.S = 57C30EF3508794215D9D855EAB22F26E11200183E317E81FC74175BEA95B948913630A0004CB898915D6DC4C2E3A16CD
3,166,774 UART: Caliptra RT
3,167,027 UART: [state] CFI Enabled
3,274,798 UART: [rt] RT listening for mailbox commands...
3,275,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,874 UART: [rt]cmd =0x44504543, len=96
3,338,183 >>> mbox cmd response data (56 bytes)
3,338,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,229 UART: [rt]cmd =0x44504543, len=96
3,400,521 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,802 ready_for_fw is high
1,055,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,861 >>> mbox cmd response: success
2,682,921 UART:
2,682,937 UART: Running Caliptra FMC ...
2,683,345 UART:
2,683,399 UART: [state] CFI Enabled
2,693,692 UART: [fht] FMC Alias Private Key: 7
2,801,517 UART: [art] Extend RT PCRs Done
2,801,945 UART: [art] Lock RT PCRs Done
2,803,629 UART: [art] Populate DV Done
2,811,844 UART: [fht] FMC Alias Private Key: 7
2,812,918 UART: [art] Derive CDI
2,813,198 UART: [art] Store in in slot 0x4
2,898,927 UART: [art] Derive Key Pair
2,899,287 UART: [art] Store priv key in slot 0x5
2,912,385 UART: [art] Derive Key Pair - Done
2,926,670 UART: [art] Signing Cert with AUTHO
2,927,150 UART: RITY.KEYID = 7
2,942,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,711 UART: [art] PUB.X = 1910880A41C7DF7C07F4F2504EED0BB2075E0F50CA4EFCCDED79E32E85B17A1B09CAF652403A51EE2E7299E71554AE61
2,950,477 UART: [art] PUB.Y = E827D12F596A1369B4D6EBFE9F7BDF61093274FF6C6DEAB785FF142849CC9D09F1FC979B7FA92896679849C32277944F
2,957,427 UART: [art] SIG.R = 18CCC6BED9B574792ED8734817461538ED0269EFE3D4DFA957690F8743E2DFCEFB1EA5DEC5895EDACD4312B50675BA1A
2,964,206 UART: [art] SIG.S = A1175624A3DB159D4AD5E6719A28CAEDC78696AB459C3FFAD72B539AE3177BCB52E93EF513A2754CC117F5C7B83997FA
2,988,179 UART: Caliptra RT
2,988,432 UART: [state] CFI Enabled
3,096,649 UART: [rt] RT listening for mailbox commands...
3,097,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,945 UART: [rt]cmd =0x44504543, len=96
3,161,368 >>> mbox cmd response data (56 bytes)
3,161,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,191,440 UART: [rt]cmd =0x44504543, len=96
3,224,214 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,472 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,882 UART: [kat] SHA2-256
901,822 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,146 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,173,172 UART: [idev] ++
1,173,340 UART: [idev] CDI.KEYID = 6
1,173,701 UART: [idev] SUBJECT.KEYID = 7
1,174,126 UART: [idev] UDS.KEYID = 0
1,174,472 ready_for_fw is high
1,174,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,314 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,103 UART: [ldev] ++
1,209,271 UART: [ldev] CDI.KEYID = 6
1,209,635 UART: [ldev] SUBJECT.KEYID = 5
1,210,062 UART: [ldev] AUTHORITY.KEYID = 7
1,210,525 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,241,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,563 UART: [ldev] --
1,280,831 UART: [fwproc] Wait for Commands...
1,281,506 UART: [fwproc] Recv command 0x46574c44
1,282,239 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,328 >>> mbox cmd response: success
2,772,589 UART: [afmc] ++
2,772,757 UART: [afmc] CDI.KEYID = 6
2,773,120 UART: [afmc] SUBJECT.KEYID = 7
2,773,546 UART: [afmc] AUTHORITY.KEYID = 5
2,809,095 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,630 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,349 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,238 UART: [afmc] --
2,852,358 UART: [cold-reset] --
2,853,134 UART: [state] Locking Datavault
2,854,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,931 UART: [state] Locking ICCM
2,855,387 UART: [exit] Launching FMC @ 0x40000130
2,860,716 UART:
2,860,732 UART: Running Caliptra FMC ...
2,861,140 UART:
2,861,283 UART: [state] CFI Enabled
2,872,014 UART: [fht] FMC Alias Private Key: 7
2,980,431 UART: [art] Extend RT PCRs Done
2,980,859 UART: [art] Lock RT PCRs Done
2,982,393 UART: [art] Populate DV Done
2,990,656 UART: [fht] FMC Alias Private Key: 7
2,991,764 UART: [art] Derive CDI
2,992,044 UART: [art] Store in in slot 0x4
3,078,053 UART: [art] Derive Key Pair
3,078,413 UART: [art] Store priv key in slot 0x5
3,091,151 UART: [art] Derive Key Pair - Done
3,106,119 UART: [art] Signing Cert with AUTHO
3,106,599 UART: RITY.KEYID = 7
3,121,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,682 UART: [art] PUB.X = 518A21A86D8CD6056EE2D678F19C313B395D2AFAAEE7ACC19CC6FDC2875CC72801F46414795C9252045BD1D20F80320D
3,129,445 UART: [art] PUB.Y = 319B71A6F7748F07A4712CF99ACF4EB0F3DE2CE0C33ABD49164A7BB18C34E7EDF3F7C62A0200C7A0DEC399B5AAFC2D82
3,136,391 UART: [art] SIG.R = B582AAD927F75BA84C4F143BD9BB0138EF56532D4DB8CD758A6D8B561F044E02CEB272D75741A4ACDFE8BADC0844FEA4
3,143,171 UART: [art] SIG.S = 0B246D14C955F39D4C0A6EB835E5648693415752021AF7349373400AF0405D2144C4D4CD0E580DAE4369E1286EBE0937
3,166,857 UART: Caliptra RT
3,167,202 UART: [state] CFI Enabled
3,275,487 UART: [rt] RT listening for mailbox commands...
3,276,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,663 UART: [rt]cmd =0x44504543, len=96
3,338,402 >>> mbox cmd response data (56 bytes)
3,338,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,368,584 UART: [rt]cmd =0x44504543, len=96
3,401,228 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,147 ready_for_fw is high
1,056,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,648 >>> mbox cmd response: success
2,682,682 UART:
2,682,698 UART: Running Caliptra FMC ...
2,683,106 UART:
2,683,249 UART: [state] CFI Enabled
2,693,894 UART: [fht] FMC Alias Private Key: 7
2,801,745 UART: [art] Extend RT PCRs Done
2,802,173 UART: [art] Lock RT PCRs Done
2,803,805 UART: [art] Populate DV Done
2,811,892 UART: [fht] FMC Alias Private Key: 7
2,813,074 UART: [art] Derive CDI
2,813,354 UART: [art] Store in in slot 0x4
2,898,869 UART: [art] Derive Key Pair
2,899,229 UART: [art] Store priv key in slot 0x5
2,913,239 UART: [art] Derive Key Pair - Done
2,928,237 UART: [art] Signing Cert with AUTHO
2,928,717 UART: RITY.KEYID = 7
2,944,187 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,952 UART: [art] PUB.X = E8680A90B99FF52B738C37B31ECF21E12DDA8674E3A06B67A91DF57C249B10967A255705049D3AA8406A599EDE60D6DB
2,951,719 UART: [art] PUB.Y = EC592019A2728896B962C5FE1DE329EF4E4E77578E321ACECAB9155A1185125DDF584878C2219524B8D980450C8E2CF6
2,958,666 UART: [art] SIG.R = 3F47B6BAD200518EB5DD56438372FAA932E6197358D7E09CE5E87B0D741E4712E25ECEDCAB3A658F19FE4FF4CB97270B
2,965,422 UART: [art] SIG.S = 44E96AFD502C54F911708FA69D273DD0F6FC4671F879FF76081CDA1E9F248CB1BDF494EDAC58AEF4366881A20A57E574
2,988,653 UART: Caliptra RT
2,988,998 UART: [state] CFI Enabled
3,096,489 UART: [rt] RT listening for mailbox commands...
3,097,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,617 UART: [rt]cmd =0x44504543, len=96
3,159,942 >>> mbox cmd response data (56 bytes)
3,159,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,874 UART: [rt]cmd =0x44504543, len=96
3,222,756 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
191,928 UART:
192,315 UART: Running Caliptra ROM ...
193,499 UART:
193,652 UART: [state] CFI Enabled
264,044 UART: [state] LifecycleState = Unprovisioned
265,961 UART: [state] DebugLocked = No
268,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,775 UART: [kat] SHA2-256
442,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,982 UART: [kat] ++
453,451 UART: [kat] sha1
463,536 UART: [kat] SHA2-256
466,249 UART: [kat] SHA2-384
472,296 UART: [kat] SHA2-512-ACC
474,664 UART: [kat] ECC-384
2,768,756 UART: [kat] HMAC-384Kdf
2,801,097 UART: [kat] LMS
3,991,411 UART: [kat] --
3,995,987 UART: [cold-reset] ++
3,998,482 UART: [fht] Storing FHT @ 0x50003400
4,010,589 UART: [idev] ++
4,011,146 UART: [idev] CDI.KEYID = 6
4,012,029 UART: [idev] SUBJECT.KEYID = 7
4,013,341 UART: [idev] UDS.KEYID = 0
4,014,330 ready_for_fw is high
4,014,537 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,806 UART: [idev] Erasing UDS.KEYID = 0
7,344,142 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,781 UART: [idev] --
7,370,686 UART: [ldev] ++
7,371,249 UART: [ldev] CDI.KEYID = 6
7,372,178 UART: [ldev] SUBJECT.KEYID = 5
7,373,431 UART: [ldev] AUTHORITY.KEYID = 7
7,374,723 UART: [ldev] FE.KEYID = 1
7,400,825 UART: [ldev] Erasing FE.KEYID = 1
10,730,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,703 UART: [ldev] --
13,093,748 UART: [fwproc] Waiting for Commands...
13,095,458 UART: [fwproc] Received command 0x46574c44
13,097,640 UART: [fwproc] Received Image of size 113844 bytes
17,148,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,217,757 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,286,675 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,603,548 >>> mbox cmd response: success
17,608,385 UART: [afmc] ++
17,608,990 UART: [afmc] CDI.KEYID = 6
17,609,871 UART: [afmc] SUBJECT.KEYID = 7
17,611,137 UART: [afmc] AUTHORITY.KEYID = 5
20,965,887 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,265,572 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,267,838 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,282,239 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,297,096 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,311,551 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,331,951 UART: [afmc] --
23,335,593 UART: [cold-reset] --
23,339,556 UART: [state] Locking Datavault
23,345,602 UART: [state] Locking PCR0, PCR1 and PCR31
23,347,349 UART: [state] Locking ICCM
23,348,817 UART: [exit] Launching FMC @ 0x40000130
23,357,216 UART:
23,357,465 UART: Running Caliptra FMC ...
23,358,563 UART:
23,358,718 UART: [state] CFI Enabled
23,424,575 UART: [fht] FMC Alias Private Key: 7
25,762,550 UART: [art] Extend RT PCRs Done
25,763,769 UART: [art] Lock RT PCRs Done
25,765,410 UART: [art] Populate DV Done
25,770,596 UART: [fht] FMC Alias Private Key: 7
25,772,180 UART: [art] Derive CDI
25,772,920 UART: [art] Store in in slot 0x4
25,832,121 UART: [art] Derive Key Pair
25,833,160 UART: [art] Store priv key in slot 0x5
29,126,352 UART: [art] Derive Key Pair - Done
29,139,285 UART: [art] Signing Cert with AUTHO
29,140,624 UART: RITY.KEYID = 7
31,427,158 UART: [art] Erasing AUTHORITY.KEYID = 7
31,428,679 UART: [art] PUB.X = FB7FB2E459B74E3394C8502BA677DA69E9DDEAEA583EDEE64E5258D570BD13BDEFE38C24081E96865C3189365E460A1F
31,435,892 UART: [art] PUB.Y = 1AFC67D4507E26E292CE49D323D1AE2A70E4CB8327829D9652C45B64B6A08CB0DA4C174428E14CE944D5182CCE9631CB
31,443,143 UART: [art] SIG.R = B26321EA44374EAA4903C8C4DD30081187908A74CA299B3B3B5E15780C81595A52DD013B2CF0F492C51C7A55B3286A3A
31,450,496 UART: [art] SIG.S = 0F03298515240863E4B8FD02216F614A842D7F7E59FE40A0E6871597C62C353821FDB8A9CA85E3DCB150831C88C14E06
32,755,619 UART: Caliptra RT
32,756,331 UART: [state] CFI Enabled
32,937,019 UART: [rt] RT listening for mailbox commands...
32,938,967 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,969,424 UART: [rt]cmd =0x44504543, len=24
33,010,696 >>> mbox cmd response data (40 bytes)
33,011,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,042,467 UART: [rt]cmd =0x44504543, len=96
33,049,104 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,790,629 ready_for_fw is high
3,791,524 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,857,292 >>> mbox cmd response: success
23,559,766 UART:
23,560,172 UART: Running Caliptra FMC ...
23,561,280 UART:
23,561,429 UART: [state] CFI Enabled
23,627,696 UART: [fht] FMC Alias Private Key: 7
25,965,122 UART: [art] Extend RT PCRs Done
25,966,370 UART: [art] Lock RT PCRs Done
25,968,161 UART: [art] Populate DV Done
25,973,884 UART: [fht] FMC Alias Private Key: 7
25,975,594 UART: [art] Derive CDI
25,976,410 UART: [art] Store in in slot 0x4
26,037,185 UART: [art] Derive Key Pair
26,038,186 UART: [art] Store priv key in slot 0x5
29,331,139 UART: [art] Derive Key Pair - Done
29,344,030 UART: [art] Signing Cert with AUTHO
29,345,344 UART: RITY.KEYID = 7
31,632,011 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,520 UART: [art] PUB.X = 184B4A4C9E70712BCFC2DC7230CE8972FE0C07E46D801CA283AADC1C71DCBC48BEC105D3857706935AE9BB1C0C6ED9EF
31,640,779 UART: [art] PUB.Y = 0F99C824920A585E3FF13562487B43A243448C1E45402DACE48B219B64BB833039D152DFE9F1A78CDF3C3B3EEC7CC1C7
31,648,032 UART: [art] SIG.R = FE9037459FDE5F31061DC163DB66A593124AF7CDC84B11B0F392331368875928AB4E4F3138E411A086AA7C6370F74205
31,655,403 UART: [art] SIG.S = 0FD78B9EFBDA11D3800EBB88893D68E2FDC1C73C6FD59EF97DC4F9BFC52DE45016E3F64E31D2FD7299C26DE94DBB793B
32,960,293 UART: Caliptra RT
32,961,028 UART: [state] CFI Enabled
33,121,809 UART: [rt] RT listening for mailbox commands...
33,123,757 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,154,222 UART: [rt]cmd =0x44504543, len=24
33,195,452 >>> mbox cmd response data (40 bytes)
33,196,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,227,122 UART: [rt]cmd =0x44504543, len=96
33,233,855 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,569 UART:
192,938 UART: Running Caliptra ROM ...
194,126 UART:
603,960 UART: [state] CFI Enabled
618,726 UART: [state] LifecycleState = Unprovisioned
620,682 UART: [state] DebugLocked = No
623,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,213 UART: [kat] SHA2-256
797,966 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,480 UART: [kat] ++
808,957 UART: [kat] sha1
821,535 UART: [kat] SHA2-256
824,267 UART: [kat] SHA2-384
831,041 UART: [kat] SHA2-512-ACC
833,380 UART: [kat] ECC-384
3,117,363 UART: [kat] HMAC-384Kdf
3,130,011 UART: [kat] LMS
4,320,125 UART: [kat] --
4,325,643 UART: [cold-reset] ++
4,328,071 UART: [fht] Storing FHT @ 0x50003400
4,339,410 UART: [idev] ++
4,339,984 UART: [idev] CDI.KEYID = 6
4,341,016 UART: [idev] SUBJECT.KEYID = 7
4,342,192 UART: [idev] UDS.KEYID = 0
4,343,262 ready_for_fw is high
4,343,479 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,952 UART: [idev] Erasing UDS.KEYID = 0
7,632,553 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,984 UART: [idev] --
7,657,652 UART: [ldev] ++
7,658,242 UART: [ldev] CDI.KEYID = 6
7,659,259 UART: [ldev] SUBJECT.KEYID = 5
7,660,417 UART: [ldev] AUTHORITY.KEYID = 7
7,661,646 UART: [ldev] FE.KEYID = 1
7,673,125 UART: [ldev] Erasing FE.KEYID = 1
10,961,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,734 UART: [ldev] --
13,323,324 UART: [fwproc] Waiting for Commands...
13,324,984 UART: [fwproc] Received command 0x46574c44
13,327,167 UART: [fwproc] Received Image of size 113844 bytes
17,379,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,162 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,027 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,841,721 >>> mbox cmd response: success
17,845,794 UART: [afmc] ++
17,846,389 UART: [afmc] CDI.KEYID = 6
17,847,306 UART: [afmc] SUBJECT.KEYID = 7
17,848,576 UART: [afmc] AUTHORITY.KEYID = 5
21,162,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,541 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,849 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,473,215 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,488,060 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,489 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,807 UART: [afmc] --
23,528,379 UART: [cold-reset] --
23,533,482 UART: [state] Locking Datavault
23,538,886 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,659 UART: [state] Locking ICCM
23,541,918 UART: [exit] Launching FMC @ 0x40000130
23,550,310 UART:
23,550,544 UART: Running Caliptra FMC ...
23,551,649 UART:
23,551,811 UART: [state] CFI Enabled
23,559,618 UART: [fht] FMC Alias Private Key: 7
25,890,990 UART: [art] Extend RT PCRs Done
25,892,209 UART: [art] Lock RT PCRs Done
25,893,658 UART: [art] Populate DV Done
25,898,910 UART: [fht] FMC Alias Private Key: 7
25,900,607 UART: [art] Derive CDI
25,901,349 UART: [art] Store in in slot 0x4
25,943,835 UART: [art] Derive Key Pair
25,944,872 UART: [art] Store priv key in slot 0x5
29,187,123 UART: [art] Derive Key Pair - Done
29,200,294 UART: [art] Signing Cert with AUTHO
29,201,600 UART: RITY.KEYID = 7
31,481,379 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,885 UART: [art] PUB.X = 95453BA4FAF8C2F6F9C22EB23B57177514BF86FCA201D14D738FF52F850585FA6825844A2214C1B2E79F65C8D29B0BC6
31,490,090 UART: [art] PUB.Y = 9DC041AAED994FF0FDE75C6325A2B29B423C4DB77C4DEB54FA450F026158ED0AF6D794FD6A13CFB835D45A4AB9C95AD3
31,497,392 UART: [art] SIG.R = 8F8D2C2997E771F5EDC4D47FD330B29CCD2F3A790DE9AF0AAE691FC6F274CA40648AE0E07CB44A0A9A254BEF72C5DB69
31,505,108 UART: [art] SIG.S = BD99F3F8E5074E15AF0CD4D6E578A7385A58EA621B9C1D9B0178D7BA3F3EF25389445F6E58E22662AC2295C0855359A7
32,809,837 UART: Caliptra RT
32,810,542 UART: [state] CFI Enabled
32,927,931 UART: [rt] RT listening for mailbox commands...
32,929,838 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,960,374 UART: [rt]cmd =0x44504543, len=24
32,986,767 >>> mbox cmd response data (40 bytes)
32,987,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,018,242 UART: [rt]cmd =0x44504543, len=96
33,024,827 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
17,850 writing to cptra_bootfsm_go
4,144,662 ready_for_fw is high
4,145,241 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,082,391 >>> mbox cmd response: success
23,722,772 UART:
23,723,205 UART: Running Caliptra FMC ...
23,724,323 UART:
23,724,493 UART: [state] CFI Enabled
23,732,467 UART: [fht] FMC Alias Private Key: 7
26,063,378 UART: [art] Extend RT PCRs Done
26,064,610 UART: [art] Lock RT PCRs Done
26,066,514 UART: [art] Populate DV Done
26,072,001 UART: [fht] FMC Alias Private Key: 7
26,073,661 UART: [art] Derive CDI
26,074,483 UART: [art] Store in in slot 0x4
26,117,078 UART: [art] Derive Key Pair
26,118,085 UART: [art] Store priv key in slot 0x5
29,360,280 UART: [art] Derive Key Pair - Done
29,373,329 UART: [art] Signing Cert with AUTHO
29,374,637 UART: RITY.KEYID = 7
31,654,028 UART: [art] Erasing AUTHORITY.KEYID = 7
31,655,546 UART: [art] PUB.X = 5DDE55F6813B600300F5448AF33937AF1421EA2007E0D98E00324B442257A3449B79C11B1E225A5B2C65807F9D239BCA
31,662,697 UART: [art] PUB.Y = 0C4C70A17E74984F150AC7700583E794B69D1A67ED15AFD06B50D9CBF64224690FACBCE7BC3A2EA1937ADC5619FFE953
31,670,000 UART: [art] SIG.R = 37CEE1115EBC1728FE1B12F04221E0093D2A3ECAE072DF6AF637074058B405D87B521498178E989AAA50564B586D5DCB
31,677,354 UART: [art] SIG.S = 1CFE990DD6087DEEE1E703D60E652E44A26205C05AEF308A86BF557DEC2143FEA267136AFD0D779E818DA49FEEB4224C
32,982,321 UART: Caliptra RT
32,983,042 UART: [state] CFI Enabled
33,100,180 UART: [rt] RT listening for mailbox commands...
33,102,100 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,132,429 UART: [rt]cmd =0x44504543, len=24
33,158,732 >>> mbox cmd response data (40 bytes)
33,159,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,190,225 UART: [rt]cmd =0x44504543, len=96
33,196,725 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
191,992 UART:
192,360 UART: Running Caliptra ROM ...
193,474 UART:
193,615 UART: [state] CFI Enabled
264,897 UART: [state] LifecycleState = Unprovisioned
266,813 UART: [state] DebugLocked = No
268,141 UART: [state] WD Timer not started. Device not locked for debugging
271,048 UART: [kat] SHA2-256
450,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,731 UART: [kat] ++
462,267 UART: [kat] sha1
473,712 UART: [kat] SHA2-256
476,718 UART: [kat] SHA2-384
482,489 UART: [kat] SHA2-512-ACC
485,419 UART: [kat] ECC-384
2,947,434 UART: [kat] HMAC-384Kdf
2,970,635 UART: [kat] LMS
3,500,033 UART: [kat] --
3,505,377 UART: [cold-reset] ++
3,506,948 UART: [fht] FHT @ 0x50003400
3,518,570 UART: [idev] ++
3,519,137 UART: [idev] CDI.KEYID = 6
3,520,018 UART: [idev] SUBJECT.KEYID = 7
3,521,135 UART: [idev] UDS.KEYID = 0
3,522,252 ready_for_fw is high
3,522,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,028 UART: [idev] Erasing UDS.KEYID = 0
6,025,859 UART: [idev] Sha1 KeyId Algorithm
6,047,566 UART: [idev] --
6,050,559 UART: [ldev] ++
6,051,141 UART: [ldev] CDI.KEYID = 6
6,052,066 UART: [ldev] SUBJECT.KEYID = 5
6,053,258 UART: [ldev] AUTHORITY.KEYID = 7
6,054,502 UART: [ldev] FE.KEYID = 1
6,100,584 UART: [ldev] Erasing FE.KEYID = 1
8,603,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,837 UART: [ldev] --
10,413,722 UART: [fwproc] Wait for Commands...
10,415,228 UART: [fwproc] Recv command 0x46574c44
10,417,264 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,273,882 >>> mbox cmd response: success
14,277,632 UART: [afmc] ++
14,278,270 UART: [afmc] CDI.KEYID = 6
14,279,193 UART: [afmc] SUBJECT.KEYID = 7
14,280,302 UART: [afmc] AUTHORITY.KEYID = 5
16,805,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,091 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,847 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,740 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,278 UART: [afmc] --
18,608,496 UART: [cold-reset] --
18,611,707 UART: [state] Locking Datavault
18,617,118 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,791 UART: [state] Locking ICCM
18,621,427 UART: [exit] Launching FMC @ 0x40000130
18,629,828 UART:
18,630,065 UART: Running Caliptra FMC ...
18,631,170 UART:
18,631,334 UART: [state] CFI Enabled
18,689,954 UART: [fht] FMC Alias Private Key: 7
20,453,557 UART: [art] Extend RT PCRs Done
20,454,772 UART: [art] Lock RT PCRs Done
20,456,342 UART: [art] Populate DV Done
20,461,802 UART: [fht] FMC Alias Private Key: 7
20,463,459 UART: [art] Derive CDI
20,464,276 UART: [art] Store in in slot 0x4
20,522,615 UART: [art] Derive Key Pair
20,523,658 UART: [art] Store priv key in slot 0x5
22,986,911 UART: [art] Derive Key Pair - Done
23,000,129 UART: [art] Signing Cert with AUTHO
23,001,478 UART: RITY.KEYID = 7
24,712,533 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,029 UART: [art] PUB.X = 288A4CA1AAA2A662C2957AF612F9C5F20F4ABDCC701145D761449C7A10ACDD5EF34C7007B73B9262260036884FEC3915
24,721,285 UART: [art] PUB.Y = D801B3C6485ACFF91A7ACE1BAD7D914E0EF2F33D583C0F5DD2BFC02D25462BC0DC8B23F8AB00AC65336F16D0A17E3B97
24,728,580 UART: [art] SIG.R = 52C67AE6689B9E25A32087BAD9C5C2AA3B4DC3A815062AAD2896EDA09936AF31EF369C40481EAEE3CD428C7D2DDAB1F9
24,735,953 UART: [art] SIG.S = 7C0751F032F6EE7FFE6F5EADCB87F29A0FB82C2C59F262FA50013748C9B3DC82C62E8FCE12D1927BDE0EA6C4620CA904
25,715,046 UART: Caliptra RT
25,715,759 UART: [state] CFI Enabled
25,880,734 UART: [rt] RT listening for mailbox commands...
25,882,652 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,913,313 UART: [rt]cmd =0x44504543, len=24
25,955,642 >>> mbox cmd response data (40 bytes)
25,956,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,987,644 UART: [rt]cmd =0x44504543, len=96
25,994,496 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,384,665 ready_for_fw is high
3,385,072 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,073,263 >>> mbox cmd response: success
18,365,230 UART:
18,365,633 UART: Running Caliptra FMC ...
18,366,756 UART:
18,366,917 UART: [state] CFI Enabled
18,431,374 UART: [fht] FMC Alias Private Key: 7
20,195,786 UART: [art] Extend RT PCRs Done
20,197,002 UART: [art] Lock RT PCRs Done
20,198,798 UART: [art] Populate DV Done
20,204,215 UART: [fht] FMC Alias Private Key: 7
20,205,902 UART: [art] Derive CDI
20,206,727 UART: [art] Store in in slot 0x4
20,263,665 UART: [art] Derive Key Pair
20,264,654 UART: [art] Store priv key in slot 0x5
22,727,682 UART: [art] Derive Key Pair - Done
22,740,359 UART: [art] Signing Cert with AUTHO
22,741,664 UART: RITY.KEYID = 7
24,452,809 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,314 UART: [art] PUB.X = 7FE0D7A9EC83FF3AD3BCF57816B131F1170F2B9F4ECC43A3E568F6C171AD8A6B67E219A92AA233FA637F60EDE4B2079B
24,461,593 UART: [art] PUB.Y = 990FC127B8803FD3429DF12517BC260F7CBF97408FB6777600A7A573448781B08DE96C9D54C1C980DE874177B55380B7
24,468,830 UART: [art] SIG.R = 4E9F67CE91A96FDABA665C37BD6474112B29153F0E130C8B65DF538D6C8E71C535BD2B2B17D4DBF9D1245B96DF457D66
24,476,226 UART: [art] SIG.S = 66F0B6FB76BCF69CA92A0E88CAE24475C5640FBD5070CE7775A968D926EF3525345AC391EE94262D5BF18AA6E6EC21B3
25,454,632 UART: Caliptra RT
25,455,331 UART: [state] CFI Enabled
25,618,952 UART: [rt] RT listening for mailbox commands...
25,620,868 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,651,696 UART: [rt]cmd =0x44504543, len=24
25,693,616 >>> mbox cmd response data (40 bytes)
25,694,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,725,269 UART: [rt]cmd =0x44504543, len=96
25,731,988 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,835 writing to cptra_bootfsm_go
192,953 UART:
193,330 UART: Running Caliptra ROM ...
194,433 UART:
604,152 UART: [state] CFI Enabled
619,946 UART: [state] LifecycleState = Unprovisioned
621,819 UART: [state] DebugLocked = No
624,483 UART: [state] WD Timer not started. Device not locked for debugging
628,176 UART: [kat] SHA2-256
807,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,872 UART: [kat] ++
819,412 UART: [kat] sha1
830,719 UART: [kat] SHA2-256
833,801 UART: [kat] SHA2-384
839,756 UART: [kat] SHA2-512-ACC
842,674 UART: [kat] ECC-384
3,283,057 UART: [kat] HMAC-384Kdf
3,295,465 UART: [kat] LMS
3,824,975 UART: [kat] --
3,831,544 UART: [cold-reset] ++
3,833,621 UART: [fht] FHT @ 0x50003400
3,843,747 UART: [idev] ++
3,844,315 UART: [idev] CDI.KEYID = 6
3,845,230 UART: [idev] SUBJECT.KEYID = 7
3,846,405 UART: [idev] UDS.KEYID = 0
3,847,452 ready_for_fw is high
3,847,674 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,164 UART: [idev] Erasing UDS.KEYID = 0
6,318,745 UART: [idev] Sha1 KeyId Algorithm
6,341,214 UART: [idev] --
6,345,531 UART: [ldev] ++
6,346,103 UART: [ldev] CDI.KEYID = 6
6,347,015 UART: [ldev] SUBJECT.KEYID = 5
6,348,227 UART: [ldev] AUTHORITY.KEYID = 7
6,349,458 UART: [ldev] FE.KEYID = 1
6,360,052 UART: [ldev] Erasing FE.KEYID = 1
8,834,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,002 UART: [ldev] --
10,625,480 UART: [fwproc] Wait for Commands...
10,628,117 UART: [fwproc] Recv command 0x46574c44
10,630,212 UART: [fwproc] Recv'd Img size: 114168 bytes
14,035,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,729 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,494,824 >>> mbox cmd response: success
14,498,236 UART: [afmc] ++
14,498,825 UART: [afmc] CDI.KEYID = 6
14,499,735 UART: [afmc] SUBJECT.KEYID = 7
14,500,898 UART: [afmc] AUTHORITY.KEYID = 5
17,000,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,839 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,625 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,665 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,536 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,482 UART: [afmc] --
18,794,570 UART: [cold-reset] --
18,800,262 UART: [state] Locking Datavault
18,806,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,331 UART: [state] Locking ICCM
18,810,801 UART: [exit] Launching FMC @ 0x40000130
18,819,195 UART:
18,819,429 UART: Running Caliptra FMC ...
18,820,531 UART:
18,820,690 UART: [state] CFI Enabled
18,829,168 UART: [fht] FMC Alias Private Key: 7
20,585,490 UART: [art] Extend RT PCRs Done
20,586,707 UART: [art] Lock RT PCRs Done
20,588,328 UART: [art] Populate DV Done
20,593,845 UART: [fht] FMC Alias Private Key: 7
20,595,618 UART: [art] Derive CDI
20,596,382 UART: [art] Store in in slot 0x4
20,639,097 UART: [art] Derive Key Pair
20,640,104 UART: [art] Store priv key in slot 0x5
23,066,128 UART: [art] Derive Key Pair - Done
23,079,280 UART: [art] Signing Cert with AUTHO
23,080,614 UART: RITY.KEYID = 7
24,786,227 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,727 UART: [art] PUB.X = 735436608304335FD814B7CD3D4ADAF52A843A012F687BD796FE18B5E0F34358232870DACF29D14C336C5E9CA8B17AB5
24,794,980 UART: [art] PUB.Y = 533853E70F279A963DBA344E561DDE89F0B1CC74EBF603E4182F56F8FD5437650886EC3A1CCA84C50A76DD82E8AA75FF
24,802,276 UART: [art] SIG.R = 6227CF2D097601E257709E0C3A1388EF03E488EF2B49584F00A91D3C3147F9013CF6C1BC1658F786600674B9951FC239
24,809,633 UART: [art] SIG.S = 8875EC0FBC48EF347B2DF4B017EFF4C03C03C3E4BF1C52DE8458CD51D2C99C015CAE59DDBBB2C97EE4ADEBD777EC2631
25,789,339 UART: Caliptra RT
25,790,043 UART: [state] CFI Enabled
25,907,545 UART: [rt] RT listening for mailbox commands...
25,909,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,939,691 UART: [rt]cmd =0x44504543, len=24
25,966,115 >>> mbox cmd response data (40 bytes)
25,967,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,997,598 UART: [rt]cmd =0x44504543, len=96
26,004,284 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
3,693,133 ready_for_fw is high
3,693,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,274,936 >>> mbox cmd response: success
18,527,758 UART:
18,528,154 UART: Running Caliptra FMC ...
18,529,341 UART:
18,529,514 UART: [state] CFI Enabled
18,537,518 UART: [fht] FMC Alias Private Key: 7
20,294,216 UART: [art] Extend RT PCRs Done
20,295,439 UART: [art] Lock RT PCRs Done
20,297,253 UART: [art] Populate DV Done
20,302,556 UART: [fht] FMC Alias Private Key: 7
20,304,096 UART: [art] Derive CDI
20,304,834 UART: [art] Store in in slot 0x4
20,347,489 UART: [art] Derive Key Pair
20,348,529 UART: [art] Store priv key in slot 0x5
22,775,179 UART: [art] Derive Key Pair - Done
22,788,013 UART: [art] Signing Cert with AUTHO
22,789,322 UART: RITY.KEYID = 7
24,495,217 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,730 UART: [art] PUB.X = 856AB2832F170F006CE22009F5855C340C4046B4EFCB52F6AAA4640F565586E226775B8217BCA6F70574CF84CC5422B4
24,503,995 UART: [art] PUB.Y = 0AEADDD19CC8F9A5712814DB01B9AA3DF3CDAB5C822D02817AD8818B08BC57F300A90405C3FD390007BA2C80A02368FB
24,511,192 UART: [art] SIG.R = 4814F14E010215E224956BE8686CD558D7DEFF30F3F76040ACD947C134C08073F0FE5CBBACCC9E9EC4EDD3AB1DDB35DB
24,518,586 UART: [art] SIG.S = 005B147AD2DF62848FF788DB2628459CB61FC192E0D62FF3ED125A326143C4FB594E3ADF2F219C2D4D4B4D65175D8F31
25,497,429 UART: Caliptra RT
25,498,143 UART: [state] CFI Enabled
25,614,997 UART: [rt] RT listening for mailbox commands...
25,616,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,647,689 UART: [rt]cmd =0x44504543, len=24
25,673,458 >>> mbox cmd response data (40 bytes)
25,674,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,705,424 UART: [rt]cmd =0x44504543, len=96
25,712,090 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,185 UART:
192,567 UART: Running Caliptra ROM ...
193,763 UART:
193,918 UART: [state] CFI Enabled
268,214 UART: [state] LifecycleState = Unprovisioned
270,635 UART: [state] DebugLocked = No
273,239 UART: [state] WD Timer not started. Device not locked for debugging
278,504 UART: [kat] SHA2-256
468,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,182 UART: [kat] ++
479,672 UART: [kat] sha1
490,546 UART: [kat] SHA2-256
493,557 UART: [kat] SHA2-384
498,696 UART: [kat] SHA2-512-ACC
501,279 UART: [kat] ECC-384
2,945,605 UART: [kat] HMAC-384Kdf
2,972,426 UART: [kat] LMS
3,504,161 UART: [kat] --
3,509,154 UART: [cold-reset] ++
3,510,233 UART: [fht] FHT @ 0x50003400
3,522,417 UART: [idev] ++
3,523,125 UART: [idev] CDI.KEYID = 6
3,524,194 UART: [idev] SUBJECT.KEYID = 7
3,525,302 UART: [idev] UDS.KEYID = 0
3,526,227 ready_for_fw is high
3,526,447 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,122 UART: [idev] Erasing UDS.KEYID = 0
6,028,996 UART: [idev] Sha1 KeyId Algorithm
6,051,764 UART: [idev] --
6,057,119 UART: [ldev] ++
6,057,811 UART: [ldev] CDI.KEYID = 6
6,058,728 UART: [ldev] SUBJECT.KEYID = 5
6,060,072 UART: [ldev] AUTHORITY.KEYID = 7
6,061,238 UART: [ldev] FE.KEYID = 1
6,100,330 UART: [ldev] Erasing FE.KEYID = 1
8,604,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,110 UART: [ldev] --
10,414,426 UART: [fwproc] Wait for Commands...
10,415,868 UART: [fwproc] Recv command 0x46574c44
10,417,805 UART: [fwproc] Recv'd Img size: 114168 bytes
13,870,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,605,770 >>> mbox cmd response: success
14,609,360 UART: [afmc] ++
14,610,095 UART: [afmc] CDI.KEYID = 6
14,611,216 UART: [afmc] SUBJECT.KEYID = 7
14,612,714 UART: [afmc] AUTHORITY.KEYID = 5
17,150,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,993 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,036 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,977 UART: [afmc] --
18,949,184 UART: [cold-reset] --
18,954,684 UART: [state] Locking Datavault
18,960,929 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,097 UART: [state] Locking ICCM
18,965,941 UART: [exit] Launching FMC @ 0x40000130
18,974,623 UART:
18,974,874 UART: Running Caliptra FMC ...
18,975,903 UART:
18,976,052 UART: [state] CFI Enabled
19,031,541 UART: [fht] FMC Alias Private Key: 7
20,795,882 UART: [art] Extend RT PCRs Done
20,797,101 UART: [art] Lock RT PCRs Done
20,798,784 UART: [art] Populate DV Done
20,804,091 UART: [fht] FMC Alias Private Key: 7
20,805,581 UART: [art] Derive CDI
20,806,341 UART: [art] Store in in slot 0x4
20,863,325 UART: [art] Derive Key Pair
20,864,363 UART: [art] Store priv key in slot 0x5
23,327,061 UART: [art] Derive Key Pair - Done
23,340,341 UART: [art] Signing Cert with AUTHO
23,341,830 UART: RITY.KEYID = 7
25,052,890 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,427 UART: [art] PUB.X = 09DB78B2195836BD2CE90BEEEF05C73BCCB479D4AC3528C5F5387F6CFD7AA91A44F899888695E9D52453D317C5599D88
25,061,649 UART: [art] PUB.Y = 307E70109D4E5C3C7AA7E02C7C5B35F772A2147455FB5684B1BAC64D927DF7F24BCD1D3AC4AE0E436548F68191FCA904
25,068,912 UART: [art] SIG.R = FBBE237AABC60E3BE7E0ED7706DAFD772AB22472EF8F43DC97B204B28CB7C1900C92158901C3114F13B38E84DF98A542
25,076,336 UART: [art] SIG.S = 6F9FDCF3DA5FD083F3A0DB7EC448AE1A944AC00F0CE109B2098336E6EF65AC4104114612E3622C3CD510A4CE220FAB06
26,055,745 UART: Caliptra RT
26,056,457 UART: [state] CFI Enabled
26,219,264 UART: [rt] RT listening for mailbox commands...
26,221,314 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,251,621 UART: [rt]cmd =0x44504543, len=24
26,293,926 >>> mbox cmd response data (40 bytes)
26,295,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,325,863 UART: [rt]cmd =0x44504543, len=96
26,332,036 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,434,526 ready_for_fw is high
3,434,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,727,047 >>> mbox cmd response: success
19,025,777 UART:
19,026,174 UART: Running Caliptra FMC ...
19,027,378 UART:
19,027,578 UART: [state] CFI Enabled
19,091,467 UART: [fht] FMC Alias Private Key: 7
20,855,031 UART: [art] Extend RT PCRs Done
20,856,256 UART: [art] Lock RT PCRs Done
20,858,005 UART: [art] Populate DV Done
20,863,644 UART: [fht] FMC Alias Private Key: 7
20,865,347 UART: [art] Derive CDI
20,866,092 UART: [art] Store in in slot 0x4
20,923,465 UART: [art] Derive Key Pair
20,924,468 UART: [art] Store priv key in slot 0x5
23,387,290 UART: [art] Derive Key Pair - Done
23,400,408 UART: [art] Signing Cert with AUTHO
23,401,720 UART: RITY.KEYID = 7
25,112,373 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,884 UART: [art] PUB.X = B4E4231DA06CD371864239D192D15432E0107C21F3C49A795EBE870FD2B26418109139027EBF509E8EBF7B2880D20EA8
25,121,133 UART: [art] PUB.Y = 2EB661A825A8045168179E12131BC3E0BD801C93283F4C96CAEFA79716B0016F6A7CB5C4220A1BBEABA7CDE694E1CE98
25,128,373 UART: [art] SIG.R = 8303B000F08CED36825DE9EBF6F94C38C46BED2848E9476EF085A166B7CADDAB2B12AE9B97444D444B318F9AB7FF259A
25,135,755 UART: [art] SIG.S = 49CF419D93375CCB911EA3603EE6387C6893D52CD197E4B0E332252E746FA585060BCE9A7757D1F6CEA939F6F33671D7
26,114,063 UART: Caliptra RT
26,114,778 UART: [state] CFI Enabled
26,278,237 UART: [rt] RT listening for mailbox commands...
26,280,143 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,310,587 UART: [rt]cmd =0x44504543, len=24
26,353,071 >>> mbox cmd response data (40 bytes)
26,354,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,384,834 UART: [rt]cmd =0x44504543, len=96
26,391,606 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,662 writing to cptra_bootfsm_go
192,906 UART:
193,286 UART: Running Caliptra ROM ...
194,390 UART:
604,217 UART: [state] CFI Enabled
617,596 UART: [state] LifecycleState = Unprovisioned
619,967 UART: [state] DebugLocked = No
622,054 UART: [state] WD Timer not started. Device not locked for debugging
626,386 UART: [kat] SHA2-256
816,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,037 UART: [kat] ++
827,559 UART: [kat] sha1
839,351 UART: [kat] SHA2-256
842,363 UART: [kat] SHA2-384
848,851 UART: [kat] SHA2-512-ACC
851,435 UART: [kat] ECC-384
3,293,704 UART: [kat] HMAC-384Kdf
3,307,978 UART: [kat] LMS
3,839,841 UART: [kat] --
3,845,287 UART: [cold-reset] ++
3,847,139 UART: [fht] FHT @ 0x50003400
3,859,261 UART: [idev] ++
3,859,976 UART: [idev] CDI.KEYID = 6
3,860,898 UART: [idev] SUBJECT.KEYID = 7
3,862,140 UART: [idev] UDS.KEYID = 0
3,863,068 ready_for_fw is high
3,863,279 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,692 UART: [idev] Erasing UDS.KEYID = 0
6,338,595 UART: [idev] Sha1 KeyId Algorithm
6,360,049 UART: [idev] --
6,364,371 UART: [ldev] ++
6,365,050 UART: [ldev] CDI.KEYID = 6
6,365,936 UART: [ldev] SUBJECT.KEYID = 5
6,367,145 UART: [ldev] AUTHORITY.KEYID = 7
6,368,320 UART: [ldev] FE.KEYID = 1
6,379,046 UART: [ldev] Erasing FE.KEYID = 1
8,856,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,928 UART: [ldev] --
10,645,739 UART: [fwproc] Wait for Commands...
10,648,519 UART: [fwproc] Recv command 0x46574c44
10,650,779 UART: [fwproc] Recv'd Img size: 114168 bytes
14,102,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,837,404 >>> mbox cmd response: success
14,841,698 UART: [afmc] ++
14,842,411 UART: [afmc] CDI.KEYID = 6
14,843,597 UART: [afmc] SUBJECT.KEYID = 7
14,845,052 UART: [afmc] AUTHORITY.KEYID = 5
17,347,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,460 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,625 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,612 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,868 UART: [afmc] --
19,145,226 UART: [cold-reset] --
19,149,148 UART: [state] Locking Datavault
19,154,725 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,919 UART: [state] Locking ICCM
19,159,822 UART: [exit] Launching FMC @ 0x40000130
19,168,499 UART:
19,168,736 UART: Running Caliptra FMC ...
19,169,839 UART:
19,170,015 UART: [state] CFI Enabled
19,177,856 UART: [fht] FMC Alias Private Key: 7
20,935,062 UART: [art] Extend RT PCRs Done
20,936,292 UART: [art] Lock RT PCRs Done
20,938,082 UART: [art] Populate DV Done
20,943,553 UART: [fht] FMC Alias Private Key: 7
20,945,198 UART: [art] Derive CDI
20,946,015 UART: [art] Store in in slot 0x4
20,988,455 UART: [art] Derive Key Pair
20,989,493 UART: [art] Store priv key in slot 0x5
23,416,642 UART: [art] Derive Key Pair - Done
23,429,632 UART: [art] Signing Cert with AUTHO
23,430,930 UART: RITY.KEYID = 7
25,136,225 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,730 UART: [art] PUB.X = E61EE8863E7189006C7882163A21838065BD4E03248BF1D595BC27EF4B458C9C37812C936488DA051768C326C906CA91
25,144,977 UART: [art] PUB.Y = D0C68E0F7644028B8B0CDAD32C3DA435D08F4BFBF81D4871424A4DD0AD2D90FA217E5D76598029F81008CD9BDC951FDC
25,152,283 UART: [art] SIG.R = B1B21238C4068677EAC210125E6F221737407BD7BBA3ED7B902BC8C9B7F0282F88774EAB99AB41CC620FE9FD918FA4ED
25,159,677 UART: [art] SIG.S = 45E6E484E50F997F43265C0E9628BA7F32F4F95FBB21FD9FE738D6C85CBBD8360E797F06961C90D020ED7D37F7642A2B
26,138,801 UART: Caliptra RT
26,139,486 UART: [state] CFI Enabled
26,257,419 UART: [rt] RT listening for mailbox commands...
26,259,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,289,914 UART: [rt]cmd =0x44504543, len=24
26,315,740 >>> mbox cmd response data (40 bytes)
26,316,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,347,400 UART: [rt]cmd =0x44504543, len=96
26,353,919 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
3,753,494 ready_for_fw is high
3,754,043 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,349 >>> mbox cmd response: success
19,208,652 UART:
19,209,135 UART: Running Caliptra FMC ...
19,210,245 UART:
19,210,404 UART: [state] CFI Enabled
19,218,597 UART: [fht] FMC Alias Private Key: 7
20,974,707 UART: [art] Extend RT PCRs Done
20,975,940 UART: [art] Lock RT PCRs Done
20,977,536 UART: [art] Populate DV Done
20,983,014 UART: [fht] FMC Alias Private Key: 7
20,984,511 UART: [art] Derive CDI
20,985,268 UART: [art] Store in in slot 0x4
21,027,870 UART: [art] Derive Key Pair
21,028,915 UART: [art] Store priv key in slot 0x5
23,455,397 UART: [art] Derive Key Pair - Done
23,468,234 UART: [art] Signing Cert with AUTHO
23,469,546 UART: RITY.KEYID = 7
25,175,058 UART: [art] Erasing AUTHORITY.KEYID = 7
25,176,567 UART: [art] PUB.X = 9E0C8DD00E78A2CFD5210ACD892DD2F1EA79FF66E18B336607238232E0742B74277E88F44E8118B61745B3C112F2E75A
25,183,823 UART: [art] PUB.Y = FAF95595EBAA76108DFB880E02E68666C8DBD2A3737AA2230834CF3F9AC197A208EA65833DE0E59021928636295BA327
25,191,110 UART: [art] SIG.R = 7E0C6C079384F6583887F8CBCA2EFCB4623DA1037E3F3167D93EFEC389E110C32C73D9D03F22121A1A4BEF7AECBB2AFB
25,198,501 UART: [art] SIG.S = DE9A3EED9C28648F01169F70B279504C62EEA86990605B1B368D4AA6EFE4DE41D65E090AA05EA4A9E989594F8B1240F2
26,177,433 UART: Caliptra RT
26,178,154 UART: [state] CFI Enabled
26,295,604 UART: [rt] RT listening for mailbox commands...
26,297,543 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,328,079 UART: [rt]cmd =0x44504543, len=24
26,354,456 >>> mbox cmd response data (40 bytes)
26,355,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,386,244 UART: [rt]cmd =0x44504543, len=96
26,392,632 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,015 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,531 UART: [kat] SHA2-256
881,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,577 UART: [kat] ++
885,729 UART: [kat] sha1
889,861 UART: [kat] SHA2-256
891,799 UART: [kat] SHA2-384
894,456 UART: [kat] SHA2-512-ACC
896,357 UART: [kat] ECC-384
902,148 UART: [kat] HMAC-384Kdf
906,922 UART: [kat] LMS
1,475,118 UART: [kat] --
1,476,157 UART: [cold-reset] ++
1,476,653 UART: [fht] Storing FHT @ 0x50003400
1,479,444 UART: [idev] ++
1,479,612 UART: [idev] CDI.KEYID = 6
1,479,972 UART: [idev] SUBJECT.KEYID = 7
1,480,396 UART: [idev] UDS.KEYID = 0
1,480,741 ready_for_fw is high
1,480,741 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,846 UART: [idev] Erasing UDS.KEYID = 0
1,505,138 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,580 UART: [idev] --
1,514,847 UART: [ldev] ++
1,515,015 UART: [ldev] CDI.KEYID = 6
1,515,378 UART: [ldev] SUBJECT.KEYID = 5
1,515,804 UART: [ldev] AUTHORITY.KEYID = 7
1,516,267 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,546,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,402 UART: [ldev] --
1,585,893 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 114168 bytes
2,883,545 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,413 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,420 >>> mbox cmd response: success
3,077,546 UART: [afmc] ++
3,077,714 UART: [afmc] CDI.KEYID = 6
3,078,076 UART: [afmc] SUBJECT.KEYID = 7
3,078,501 UART: [afmc] AUTHORITY.KEYID = 5
3,113,568 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,936 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,329 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,019 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,000 UART: [afmc] --
3,156,970 UART: [cold-reset] --
3,157,692 UART: [state] Locking Datavault
3,158,653 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,257 UART: [state] Locking ICCM
3,159,735 UART: [exit] Launching FMC @ 0x40000130
3,165,064 UART:
3,165,080 UART: Running Caliptra FMC ...
3,165,488 UART:
3,165,542 UART: [state] CFI Enabled
3,175,901 UART: [fht] FMC Alias Private Key: 7
3,284,380 UART: [art] Extend RT PCRs Done
3,284,808 UART: [art] Lock RT PCRs Done
3,286,192 UART: [art] Populate DV Done
3,294,439 UART: [fht] FMC Alias Private Key: 7
3,295,437 UART: [art] Derive CDI
3,295,717 UART: [art] Store in in slot 0x4
3,381,290 UART: [art] Derive Key Pair
3,381,650 UART: [art] Store priv key in slot 0x5
3,395,002 UART: [art] Derive Key Pair - Done
3,409,897 UART: [art] Signing Cert with AUTHO
3,410,377 UART: RITY.KEYID = 7
3,425,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,630 UART: [art] PUB.X = 924C2EFDCE98A193A022E563056EA8A62D237B79862A2A048FC2B53A852D980F0AAB9B808AEA38DE955C059D4AFF0BA5
3,433,396 UART: [art] PUB.Y = 2F5C1C6A265790555F8A014142B8F4816630FF19ABF8CA1DE9A4CADE2BDE4C34019FF224A4DBB207DDFC7E7DBD9B6FCB
3,440,363 UART: [art] SIG.R = E8E8E4244949C1D12404F0EE26B6CA04B056338C72BBCD83F625983FBABD21C55BD96AF4798C532BBD7C969236976EC7
3,447,135 UART: [art] SIG.S = A53EF25C668F35AD7266C00A0F6F73B3413B07E8D51A7788478A960CD37A15BC318EAC065E14C54B0BDBF0272816F034
3,471,276 UART: Caliptra RT
3,471,529 UART: [state] CFI Enabled
3,580,079 UART: [rt] RT listening for mailbox commands...
3,580,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,845 UART: [rt]cmd =0x44504543, len=24
3,636,834 >>> mbox cmd response data (40 bytes)
3,636,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,660 UART: [rt]cmd =0x44504543, len=96
3,674,059 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,683 ready_for_fw is high
1,362,683 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,256 >>> mbox cmd response: success
2,985,876 UART:
2,985,892 UART: Running Caliptra FMC ...
2,986,300 UART:
2,986,354 UART: [state] CFI Enabled
2,996,869 UART: [fht] FMC Alias Private Key: 7
3,104,466 UART: [art] Extend RT PCRs Done
3,104,894 UART: [art] Lock RT PCRs Done
3,106,078 UART: [art] Populate DV Done
3,114,329 UART: [fht] FMC Alias Private Key: 7
3,115,387 UART: [art] Derive CDI
3,115,667 UART: [art] Store in in slot 0x4
3,201,486 UART: [art] Derive Key Pair
3,201,846 UART: [art] Store priv key in slot 0x5
3,215,220 UART: [art] Derive Key Pair - Done
3,230,093 UART: [art] Signing Cert with AUTHO
3,230,573 UART: RITY.KEYID = 7
3,245,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,686 UART: [art] PUB.X = 9D217C0B370FB11A7182BA5E42C9152B32D69305A4D726A42D239F7E2A116CB072EF15557D078FF6D30D7A0CB056B509
3,253,437 UART: [art] PUB.Y = 9DCEA9A9F3CE7FA5ED175E53C5FC62C97CF621E585C61CE204C55AA7B8735A41F067E186B4551A9C214A365162B20ED0
3,260,393 UART: [art] SIG.R = 630A8816F1F5D5A9172B499EAAD53C88D9282DEEB02F4E170D438C9B809B33860DA1E1333DA91EB7C5FDD13EF1DCC14E
3,267,170 UART: [art] SIG.S = 99B4288A365DD39CA3473CCD3963296961A5BBA8301E52CBCA3991FA599990EA901FEE1A54A23E87E16931CBF509710B
3,290,945 UART: Caliptra RT
3,291,198 UART: [state] CFI Enabled
3,398,265 UART: [rt] RT listening for mailbox commands...
3,398,935 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,727 UART: [rt]cmd =0x44504543, len=24
3,455,248 >>> mbox cmd response data (40 bytes)
3,455,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,398 UART: [rt]cmd =0x44504543, len=96
3,492,535 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,256 UART: [kat] SHA2-256
882,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,302 UART: [kat] ++
886,454 UART: [kat] sha1
890,724 UART: [kat] SHA2-256
892,662 UART: [kat] SHA2-384
895,401 UART: [kat] SHA2-512-ACC
897,302 UART: [kat] ECC-384
902,663 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,420 UART: [cold-reset] ++
1,476,838 UART: [fht] Storing FHT @ 0x50003400
1,479,421 UART: [idev] ++
1,479,589 UART: [idev] CDI.KEYID = 6
1,479,949 UART: [idev] SUBJECT.KEYID = 7
1,480,373 UART: [idev] UDS.KEYID = 0
1,480,718 ready_for_fw is high
1,480,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,519 UART: [idev] Erasing UDS.KEYID = 0
1,505,171 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,837 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,618 UART: [ldev] Erasing FE.KEYID = 1
1,547,039 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,241 UART: [ldev] --
1,586,578 UART: [fwproc] Waiting for Commands...
1,587,355 UART: [fwproc] Received command 0x46574c44
1,588,146 UART: [fwproc] Received Image of size 114168 bytes
2,885,252 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,156 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,173 >>> mbox cmd response: success
3,078,375 UART: [afmc] ++
3,078,543 UART: [afmc] CDI.KEYID = 6
3,078,905 UART: [afmc] SUBJECT.KEYID = 7
3,079,330 UART: [afmc] AUTHORITY.KEYID = 5
3,114,137 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,747 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,255 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,140 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,830 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,809 UART: [afmc] --
3,157,913 UART: [cold-reset] --
3,158,833 UART: [state] Locking Datavault
3,159,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,516 UART: [state] Locking ICCM
3,161,134 UART: [exit] Launching FMC @ 0x40000130
3,166,463 UART:
3,166,479 UART: Running Caliptra FMC ...
3,166,887 UART:
3,167,030 UART: [state] CFI Enabled
3,177,777 UART: [fht] FMC Alias Private Key: 7
3,285,540 UART: [art] Extend RT PCRs Done
3,285,968 UART: [art] Lock RT PCRs Done
3,287,458 UART: [art] Populate DV Done
3,295,675 UART: [fht] FMC Alias Private Key: 7
3,296,653 UART: [art] Derive CDI
3,296,933 UART: [art] Store in in slot 0x4
3,382,030 UART: [art] Derive Key Pair
3,382,390 UART: [art] Store priv key in slot 0x5
3,395,716 UART: [art] Derive Key Pair - Done
3,410,436 UART: [art] Signing Cert with AUTHO
3,410,916 UART: RITY.KEYID = 7
3,425,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,411 UART: [art] PUB.X = 5DADE8C2AAF4210CFAF164A312EC87A0DF5E2501C5F3F1D01A9D1195226760DA2505BF45D6ABCC7FC9EE91545A0329C3
3,433,187 UART: [art] PUB.Y = AD9C52C6BD58367FF5DF5E1D0AE69C647220642D11C5963448C16C75F57609FF2F9590C1621418DCD1C32F446199B526
3,440,129 UART: [art] SIG.R = 277A213F3E4050F82DD2774E25CE4DE3E998BD7A4363081E2DBBC77840B7B6E1E20A973D9EC56496CBB34B1E6ADF4A3E
3,446,907 UART: [art] SIG.S = 557E034C8D2662B2D7BDCD327047CE532C5A51785DCEC04DBC9DF7668F39E0E3295557E22D944FE9309C2737235BA906
3,470,434 UART: Caliptra RT
3,470,779 UART: [state] CFI Enabled
3,578,253 UART: [rt] RT listening for mailbox commands...
3,578,923 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,801 UART: [rt]cmd =0x44504543, len=24
3,635,578 >>> mbox cmd response data (40 bytes)
3,635,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,660 UART: [rt]cmd =0x44504543, len=96
3,672,631 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,228 ready_for_fw is high
1,363,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,525 >>> mbox cmd response: success
2,988,713 UART:
2,988,729 UART: Running Caliptra FMC ...
2,989,137 UART:
2,989,280 UART: [state] CFI Enabled
2,999,911 UART: [fht] FMC Alias Private Key: 7
3,108,354 UART: [art] Extend RT PCRs Done
3,108,782 UART: [art] Lock RT PCRs Done
3,110,236 UART: [art] Populate DV Done
3,118,599 UART: [fht] FMC Alias Private Key: 7
3,119,677 UART: [art] Derive CDI
3,119,957 UART: [art] Store in in slot 0x4
3,205,730 UART: [art] Derive Key Pair
3,206,090 UART: [art] Store priv key in slot 0x5
3,219,828 UART: [art] Derive Key Pair - Done
3,234,729 UART: [art] Signing Cert with AUTHO
3,235,209 UART: RITY.KEYID = 7
3,250,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,852 UART: [art] PUB.X = BDF84EE781481723D8A29B05B30DEED5C389AA42773AD761D5DDF32BC61D9246412588C10601B0AB697432CD573A6B55
3,257,614 UART: [art] PUB.Y = 01B366AC1A009C278E0796CA0D8C70BDC86223B1092CE2278AEC41BE032DFF8F22BB578E4E4E580F23AC08101338D76C
3,264,529 UART: [art] SIG.R = 85C01258248865FFD595CC14E81790F2EB981C79E0B981973781C4DE31067E478445CAE618B1D81C49F3F6DDA1E38A67
3,271,294 UART: [art] SIG.S = A7752BADF5BE427F4E17C81D4D3760F1E12B16B38564956307AF92846A318E487BEA43A37EDEDBBFA0FF9199F781A09D
3,295,590 UART: Caliptra RT
3,295,935 UART: [state] CFI Enabled
3,404,463 UART: [rt] RT listening for mailbox commands...
3,405,133 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,957 UART: [rt]cmd =0x44504543, len=24
3,461,138 >>> mbox cmd response data (40 bytes)
3,461,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,834 UART: [rt]cmd =0x44504543, len=96
3,497,733 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
893,584 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,709 UART: [kat] ++
897,861 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,734 UART: [kat] SHA2-512-ACC
908,635 UART: [kat] ECC-384
918,182 UART: [kat] HMAC-384Kdf
922,752 UART: [kat] LMS
1,171,080 UART: [kat] --
1,171,925 UART: [cold-reset] ++
1,172,439 UART: [fht] FHT @ 0x50003400
1,175,270 UART: [idev] ++
1,175,438 UART: [idev] CDI.KEYID = 6
1,175,798 UART: [idev] SUBJECT.KEYID = 7
1,176,222 UART: [idev] UDS.KEYID = 0
1,176,567 ready_for_fw is high
1,176,567 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,514 UART: [idev] Erasing UDS.KEYID = 0
1,201,525 UART: [idev] Sha1 KeyId Algorithm
1,209,985 UART: [idev] --
1,210,989 UART: [ldev] ++
1,211,157 UART: [ldev] CDI.KEYID = 6
1,211,520 UART: [ldev] SUBJECT.KEYID = 5
1,211,946 UART: [ldev] AUTHORITY.KEYID = 7
1,212,409 UART: [ldev] FE.KEYID = 1
1,217,413 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,821 UART: [ldev] --
1,282,214 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,650 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,250 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,554 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,033 >>> mbox cmd response: success
2,774,163 UART: [afmc] ++
2,774,331 UART: [afmc] CDI.KEYID = 6
2,774,693 UART: [afmc] SUBJECT.KEYID = 7
2,775,118 UART: [afmc] AUTHORITY.KEYID = 5
2,810,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,526 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,254 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,858 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,842 UART: [afmc] --
2,853,946 UART: [cold-reset] --
2,854,848 UART: [state] Locking Datavault
2,855,913 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,517 UART: [state] Locking ICCM
2,856,991 UART: [exit] Launching FMC @ 0x40000130
2,862,320 UART:
2,862,336 UART: Running Caliptra FMC ...
2,862,744 UART:
2,862,798 UART: [state] CFI Enabled
2,873,575 UART: [fht] FMC Alias Private Key: 7
2,982,268 UART: [art] Extend RT PCRs Done
2,982,696 UART: [art] Lock RT PCRs Done
2,984,232 UART: [art] Populate DV Done
2,992,379 UART: [fht] FMC Alias Private Key: 7
2,993,529 UART: [art] Derive CDI
2,993,809 UART: [art] Store in in slot 0x4
3,079,304 UART: [art] Derive Key Pair
3,079,664 UART: [art] Store priv key in slot 0x5
3,092,564 UART: [art] Derive Key Pair - Done
3,107,197 UART: [art] Signing Cert with AUTHO
3,107,677 UART: RITY.KEYID = 7
3,123,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,130 UART: [art] PUB.X = EC56176C17648ACE49630AED58CA3DC8D0088D17B0EF2140DF9584C5017C9E8AAEAD308F1CA2EE5694CC19A000B0487B
3,130,883 UART: [art] PUB.Y = 47D1D36552099090CB2E03987171FF32493FF9EA1C09839D9B8780824EA1A8AEB39F242E2DFB15692D4C916857CCB5D9
3,137,824 UART: [art] SIG.R = C93E8EFCAF700DD5C13C748FDFBA937D4DB83AA5C71CE5DCEE0DC17BFC706096F11E296DCBC0BBB5A384D9F7F1AB544B
3,144,624 UART: [art] SIG.S = 5B9E5A7FA11972C5BC5AC901071C4465A9C92357FB77C732C17A1C0AA1A826F30219E2B834035B383FA55F2F7FFDC869
3,168,746 UART: Caliptra RT
3,168,999 UART: [state] CFI Enabled
3,276,656 UART: [rt] RT listening for mailbox commands...
3,277,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,260 UART: [rt]cmd =0x44504543, len=24
3,333,633 >>> mbox cmd response data (40 bytes)
3,333,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,507 UART: [rt]cmd =0x44504543, len=96
3,370,854 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 ready_for_fw is high
1,060,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,724 >>> mbox cmd response: success
2,687,278 UART:
2,687,294 UART: Running Caliptra FMC ...
2,687,702 UART:
2,687,756 UART: [state] CFI Enabled
2,698,333 UART: [fht] FMC Alias Private Key: 7
2,805,764 UART: [art] Extend RT PCRs Done
2,806,192 UART: [art] Lock RT PCRs Done
2,807,800 UART: [art] Populate DV Done
2,815,863 UART: [fht] FMC Alias Private Key: 7
2,816,799 UART: [art] Derive CDI
2,817,079 UART: [art] Store in in slot 0x4
2,902,936 UART: [art] Derive Key Pair
2,903,296 UART: [art] Store priv key in slot 0x5
2,916,364 UART: [art] Derive Key Pair - Done
2,931,174 UART: [art] Signing Cert with AUTHO
2,931,654 UART: RITY.KEYID = 7
2,946,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,567 UART: [art] PUB.X = FDE16943BB5B8FCF93DF6C50176027C4A207E49A30B3FEC0C0FBA6E74380E1101D3674D1F5C07C44A43536E85A4A5683
2,954,342 UART: [art] PUB.Y = D03672C1C44E804AD418B8D530346046176CBAB561D72BF68F57C3E3215864EA5952689CC343636C697302CD89F07AE9
2,961,283 UART: [art] SIG.R = B1D375F42C73F60087BC78E136153A5837BFBFF149D9CDC77F2ED1D71491706BAA2D777F79A92403F6509FDC09C55AC6
2,968,033 UART: [art] SIG.S = 9922552ACADD204F5B6E5B10C6904CD985D482398D5BD0E2164A0AB32691D2466D17B707B9BECDCCE5B524FCDEF5E8D0
2,991,616 UART: Caliptra RT
2,991,869 UART: [state] CFI Enabled
3,099,663 UART: [rt] RT listening for mailbox commands...
3,100,333 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,305 UART: [rt]cmd =0x44504543, len=24
3,156,566 >>> mbox cmd response data (40 bytes)
3,156,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,594 UART: [rt]cmd =0x44504543, len=96
3,193,605 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,615 UART: [kat] SHA2-256
893,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,390 UART: [kat] ++
897,542 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,453 UART: [kat] SHA2-512-ACC
908,354 UART: [kat] ECC-384
917,525 UART: [kat] HMAC-384Kdf
922,199 UART: [kat] LMS
1,170,527 UART: [kat] --
1,171,424 UART: [cold-reset] ++
1,171,774 UART: [fht] FHT @ 0x50003400
1,174,323 UART: [idev] ++
1,174,491 UART: [idev] CDI.KEYID = 6
1,174,851 UART: [idev] SUBJECT.KEYID = 7
1,175,275 UART: [idev] UDS.KEYID = 0
1,175,620 ready_for_fw is high
1,175,620 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,157 UART: [idev] Erasing UDS.KEYID = 0
1,200,682 UART: [idev] Sha1 KeyId Algorithm
1,209,118 UART: [idev] --
1,210,132 UART: [ldev] ++
1,210,300 UART: [ldev] CDI.KEYID = 6
1,210,663 UART: [ldev] SUBJECT.KEYID = 5
1,211,089 UART: [ldev] AUTHORITY.KEYID = 7
1,211,552 UART: [ldev] FE.KEYID = 1
1,216,952 UART: [ldev] Erasing FE.KEYID = 1
1,243,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,236 UART: [ldev] --
1,283,525 UART: [fwproc] Wait for Commands...
1,284,289 UART: [fwproc] Recv command 0x46574c44
1,285,017 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,687 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,598 >>> mbox cmd response: success
2,774,846 UART: [afmc] ++
2,775,014 UART: [afmc] CDI.KEYID = 6
2,775,376 UART: [afmc] SUBJECT.KEYID = 7
2,775,801 UART: [afmc] AUTHORITY.KEYID = 5
2,811,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,579 UART: [afmc] --
2,854,483 UART: [cold-reset] --
2,855,455 UART: [state] Locking Datavault
2,856,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,422 UART: [state] Locking ICCM
2,858,026 UART: [exit] Launching FMC @ 0x40000130
2,863,355 UART:
2,863,371 UART: Running Caliptra FMC ...
2,863,779 UART:
2,863,922 UART: [state] CFI Enabled
2,874,569 UART: [fht] FMC Alias Private Key: 7
2,982,544 UART: [art] Extend RT PCRs Done
2,982,972 UART: [art] Lock RT PCRs Done
2,984,356 UART: [art] Populate DV Done
2,992,543 UART: [fht] FMC Alias Private Key: 7
2,993,577 UART: [art] Derive CDI
2,993,857 UART: [art] Store in in slot 0x4
3,079,614 UART: [art] Derive Key Pair
3,079,974 UART: [art] Store priv key in slot 0x5
3,093,560 UART: [art] Derive Key Pair - Done
3,108,400 UART: [art] Signing Cert with AUTHO
3,108,880 UART: RITY.KEYID = 7
3,124,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,351 UART: [art] PUB.X = B89E231F9DA23DCCDC86640A880620F251BC205A5CF9DAC9D70B63B5BF6C56BD182AEBAF33A5D2A0D4A24DE688C56209
3,132,129 UART: [art] PUB.Y = B08631BAFA418CE5E8EDE736F0A72BEB9FEE308F8CA3B7D8D3C9CC1F4E190FCDFD6682355895CCE65DF3D2209046E029
3,139,098 UART: [art] SIG.R = 17CB810D787240027BAC4882DEB4F7FBBE292407E1356DD6EC029DD1E684A75EE5BADA3BEDA61A04356749DD49A4F760
3,145,867 UART: [art] SIG.S = 5D027CC7B7DCE72DBBAB1DF55E32661A7450451CC1F4E8DD1443984CB55D62D6BF0D1AF2640B595E067E62E377E3A472
3,169,230 UART: Caliptra RT
3,169,575 UART: [state] CFI Enabled
3,277,032 UART: [rt] RT listening for mailbox commands...
3,277,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,494 UART: [rt]cmd =0x44504543, len=24
3,333,997 >>> mbox cmd response data (40 bytes)
3,333,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,364,051 UART: [rt]cmd =0x44504543, len=96
3,371,030 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,216 ready_for_fw is high
1,061,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,829 >>> mbox cmd response: success
2,687,547 UART:
2,687,563 UART: Running Caliptra FMC ...
2,687,971 UART:
2,688,114 UART: [state] CFI Enabled
2,699,111 UART: [fht] FMC Alias Private Key: 7
2,806,732 UART: [art] Extend RT PCRs Done
2,807,160 UART: [art] Lock RT PCRs Done
2,808,686 UART: [art] Populate DV Done
2,816,957 UART: [fht] FMC Alias Private Key: 7
2,818,053 UART: [art] Derive CDI
2,818,333 UART: [art] Store in in slot 0x4
2,904,206 UART: [art] Derive Key Pair
2,904,566 UART: [art] Store priv key in slot 0x5
2,917,594 UART: [art] Derive Key Pair - Done
2,932,627 UART: [art] Signing Cert with AUTHO
2,933,107 UART: RITY.KEYID = 7
2,948,173 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,938 UART: [art] PUB.X = 8E421FCF9FC9C1CE5C509267ABCFBD00A857CFF28A303036C88C4D84A38A86AA4C5CC0EC8271F437BB3EC27F68AFB7FB
2,955,712 UART: [art] PUB.Y = 2A5BF5C8D1D8DF9EF2FF199C379D5DC9B985A7B67DF2B9ED76FFA48A420516D208107B52E226C9CE56325C99FB51C176
2,962,670 UART: [art] SIG.R = 3124A0094D6822C67E3890F54A0239038CE8675C8BA7BD8BCB4845B1FE6FCBF6DAA0B58F30E6EDA1C22DAD3532FB2A24
2,969,447 UART: [art] SIG.S = 0028ADC9D6DD985A94AA114E08F6EEE03C516B1803208742786ED5431CD200435C3DC9463535F84D2CDBF2ADBB157A73
2,993,434 UART: Caliptra RT
2,993,779 UART: [state] CFI Enabled
3,102,431 UART: [rt] RT listening for mailbox commands...
3,103,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,731 UART: [rt]cmd =0x44504543, len=24
3,159,304 >>> mbox cmd response data (40 bytes)
3,159,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,398 UART: [rt]cmd =0x44504543, len=96
3,196,569 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,214 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,174,557 ready_for_fw is high
1,174,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,086 UART: [ldev] Erasing FE.KEYID = 1
1,241,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,000 UART: [ldev] --
1,281,392 UART: [fwproc] Wait for Commands...
1,282,159 UART: [fwproc] Recv command 0x46574c44
1,282,892 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,037 >>> mbox cmd response: success
2,772,208 UART: [afmc] ++
2,772,376 UART: [afmc] CDI.KEYID = 6
2,772,739 UART: [afmc] SUBJECT.KEYID = 7
2,773,165 UART: [afmc] AUTHORITY.KEYID = 5
2,807,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,833 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,552 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,333 UART: [afmc] --
2,851,333 UART: [cold-reset] --
2,852,101 UART: [state] Locking Datavault
2,853,306 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,910 UART: [state] Locking ICCM
2,854,464 UART: [exit] Launching FMC @ 0x40000130
2,859,793 UART:
2,859,809 UART: Running Caliptra FMC ...
2,860,217 UART:
2,860,271 UART: [state] CFI Enabled
2,870,792 UART: [fht] FMC Alias Private Key: 7
2,978,541 UART: [art] Extend RT PCRs Done
2,978,969 UART: [art] Lock RT PCRs Done
2,980,583 UART: [art] Populate DV Done
2,988,980 UART: [fht] FMC Alias Private Key: 7
2,990,152 UART: [art] Derive CDI
2,990,432 UART: [art] Store in in slot 0x4
3,076,123 UART: [art] Derive Key Pair
3,076,483 UART: [art] Store priv key in slot 0x5
3,090,197 UART: [art] Derive Key Pair - Done
3,105,062 UART: [art] Signing Cert with AUTHO
3,105,542 UART: RITY.KEYID = 7
3,120,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,707 UART: [art] PUB.X = FF0555634BC7DA86BC7CFE4C892C764237138132E28CC9AED09A789BA1C37450A52A06F71885159C217BB7AC24DD1F4C
3,128,479 UART: [art] PUB.Y = CDC1562DCE7844BC5565CBA48D15C7F74D1E48F3DFFDB2A7F59CC5F6B311C14E5ED3E0BF5FC2D47DAAEA0ACB61D3451D
3,135,460 UART: [art] SIG.R = 7AA26530D4635269FC5EE629C88EC2B89A2A469693F6877A8DA26CC98635B0B907F2891A527CBF76927409EEE02EBA74
3,142,226 UART: [art] SIG.S = DE5F4658E80163EA61433C952962B6AD493FA844D0AD8806DD53A25BC7269AFBF33278C8A6BC2E93239A0309BD94BD64
3,165,845 UART: Caliptra RT
3,166,098 UART: [state] CFI Enabled
3,274,815 UART: [rt] RT listening for mailbox commands...
3,275,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,477 UART: [rt]cmd =0x44504543, len=24
3,331,440 >>> mbox cmd response data (40 bytes)
3,331,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,390 UART: [rt]cmd =0x44504543, len=96
3,368,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,126 ready_for_fw is high
1,056,126 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,235 >>> mbox cmd response: success
2,683,345 UART:
2,683,361 UART: Running Caliptra FMC ...
2,683,769 UART:
2,683,823 UART: [state] CFI Enabled
2,694,246 UART: [fht] FMC Alias Private Key: 7
2,801,991 UART: [art] Extend RT PCRs Done
2,802,419 UART: [art] Lock RT PCRs Done
2,804,219 UART: [art] Populate DV Done
2,812,350 UART: [fht] FMC Alias Private Key: 7
2,813,278 UART: [art] Derive CDI
2,813,558 UART: [art] Store in in slot 0x4
2,899,149 UART: [art] Derive Key Pair
2,899,509 UART: [art] Store priv key in slot 0x5
2,913,057 UART: [art] Derive Key Pair - Done
2,927,585 UART: [art] Signing Cert with AUTHO
2,928,065 UART: RITY.KEYID = 7
2,943,565 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,330 UART: [art] PUB.X = FBD36A3F91064018740E24D3B9A15C5565C98487474CDE480B6F94F576D832A6976E3DEFD8AACFDA246B4C8E98F9FE98
2,951,101 UART: [art] PUB.Y = FD55202FE14BF55C9811B9FA91A1CA689F2B5CE8D4DF91E16DB665D67DE9BC70B1B250E7AB9501033BF903BBCB45A1F7
2,958,062 UART: [art] SIG.R = 100AC8E92AF29002522820E7F7CD9617563D026533DBB67774FC7E49E2C306366FC1F7657D480C93A00036EDCC67C333
2,964,791 UART: [art] SIG.S = 1620649056A4A695431BF9C4CC9C69793F826784E45D28CD2BB2AFEF4DBF7223B8D3C5E369A544A411072A45DC3A4C71
2,988,959 UART: Caliptra RT
2,989,212 UART: [state] CFI Enabled
3,097,347 UART: [rt] RT listening for mailbox commands...
3,098,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,023 UART: [rt]cmd =0x44504543, len=24
3,154,410 >>> mbox cmd response data (40 bytes)
3,154,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,554 UART: [rt]cmd =0x44504543, len=96
3,191,791 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,883 UART: [kat] SHA2-512-ACC
906,784 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,265 UART: [kat] LMS
1,169,577 UART: [kat] --
1,170,458 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,340 UART: [idev] ++
1,173,508 UART: [idev] CDI.KEYID = 6
1,173,869 UART: [idev] SUBJECT.KEYID = 7
1,174,294 UART: [idev] UDS.KEYID = 0
1,174,640 ready_for_fw is high
1,174,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,199,756 UART: [idev] Sha1 KeyId Algorithm
1,208,594 UART: [idev] --
1,209,681 UART: [ldev] ++
1,209,849 UART: [ldev] CDI.KEYID = 6
1,210,213 UART: [ldev] SUBJECT.KEYID = 5
1,210,640 UART: [ldev] AUTHORITY.KEYID = 7
1,211,103 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,141 UART: [fwproc] Wait for Commands...
1,282,812 UART: [fwproc] Recv command 0x46574c44
1,283,545 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,676 >>> mbox cmd response: success
2,771,925 UART: [afmc] ++
2,772,093 UART: [afmc] CDI.KEYID = 6
2,772,456 UART: [afmc] SUBJECT.KEYID = 7
2,772,882 UART: [afmc] AUTHORITY.KEYID = 5
2,808,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,872 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,601 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,484 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,998 UART: [afmc] --
2,852,060 UART: [cold-reset] --
2,852,932 UART: [state] Locking Datavault
2,854,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,715 UART: [state] Locking ICCM
2,855,239 UART: [exit] Launching FMC @ 0x40000130
2,860,568 UART:
2,860,584 UART: Running Caliptra FMC ...
2,860,992 UART:
2,861,135 UART: [state] CFI Enabled
2,871,970 UART: [fht] FMC Alias Private Key: 7
2,979,451 UART: [art] Extend RT PCRs Done
2,979,879 UART: [art] Lock RT PCRs Done
2,981,665 UART: [art] Populate DV Done
2,989,694 UART: [fht] FMC Alias Private Key: 7
2,990,638 UART: [art] Derive CDI
2,990,918 UART: [art] Store in in slot 0x4
3,077,025 UART: [art] Derive Key Pair
3,077,385 UART: [art] Store priv key in slot 0x5
3,090,465 UART: [art] Derive Key Pair - Done
3,105,694 UART: [art] Signing Cert with AUTHO
3,106,174 UART: RITY.KEYID = 7
3,121,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,265 UART: [art] PUB.X = 07860D68D7760C1E3565532BF7047AD4DAFC43E126B0764470B92DA90C4016D84DDAF897533ED034B10B8EF98C02CDD4
3,129,018 UART: [art] PUB.Y = 765D65BFD68DBCCAB557F074111E5AB6757A9E7E00ECD788710E7582BE708FE9F002C42633F15D1A5A26FE6272F15E39
3,135,948 UART: [art] SIG.R = A1C4C0083D8BAFE0D40A14B24BDADD1114BD292F82FC2C4E073DD5A28DAB1AEDEDB9C1D131142422B4F06566A4D210D6
3,142,731 UART: [art] SIG.S = 986689A516435474ECD10B5434DD32E40D104BF948CB777DD02E4A7F6F1CD8CAD91E4EC3F279F1854FFD34DB9A376978
3,166,938 UART: Caliptra RT
3,167,283 UART: [state] CFI Enabled
3,274,947 UART: [rt] RT listening for mailbox commands...
3,275,617 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,743 UART: [rt]cmd =0x44504543, len=24
3,331,872 >>> mbox cmd response data (40 bytes)
3,331,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,820 UART: [rt]cmd =0x44504543, len=96
3,369,141 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,811 ready_for_fw is high
1,055,811 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,838 >>> mbox cmd response: success
2,682,362 UART:
2,682,378 UART: Running Caliptra FMC ...
2,682,786 UART:
2,682,929 UART: [state] CFI Enabled
2,692,978 UART: [fht] FMC Alias Private Key: 7
2,801,219 UART: [art] Extend RT PCRs Done
2,801,647 UART: [art] Lock RT PCRs Done
2,802,945 UART: [art] Populate DV Done
2,811,164 UART: [fht] FMC Alias Private Key: 7
2,812,104 UART: [art] Derive CDI
2,812,384 UART: [art] Store in in slot 0x4
2,897,995 UART: [art] Derive Key Pair
2,898,355 UART: [art] Store priv key in slot 0x5
2,911,793 UART: [art] Derive Key Pair - Done
2,926,329 UART: [art] Signing Cert with AUTHO
2,926,809 UART: RITY.KEYID = 7
2,942,403 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,168 UART: [art] PUB.X = 99600812078B7F99694E60E2078B2F579A9D43502C2F34E51BE2FBB51A2B26DA8F4F19424E9CE40AC8D2834730365CA0
2,949,924 UART: [art] PUB.Y = 8D3C15B2329DBBB75A3EF7BD34C8C6BF27C9997E2715066AAE62D0F133916B5B7E6D443F3229AE1285E76F6ED6D3612C
2,956,881 UART: [art] SIG.R = 184D4D616BFB3F6DE3735D3A1DF14E722005256428E7FD6BED691B428773826B4FA1978E8110503365BA34F4E9C28979
2,963,644 UART: [art] SIG.S = E83E2F03F532637320DB21B660E72397BB56E2BBEB8C0D7818503DE133CC79BFD376AF290357235F2B225721DD968E0A
2,987,195 UART: Caliptra RT
2,987,540 UART: [state] CFI Enabled
3,095,479 UART: [rt] RT listening for mailbox commands...
3,096,149 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,207 UART: [rt]cmd =0x44504543, len=24
3,152,714 >>> mbox cmd response data (40 bytes)
3,152,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,660 UART: [rt]cmd =0x44504543, len=96
3,189,769 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,022 UART:
192,395 UART: Running Caliptra ROM ...
193,869 UART:
194,023 UART: [state] CFI Enabled
264,927 UART: [state] LifecycleState = Unprovisioned
266,881 UART: [state] DebugLocked = No
269,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,619 UART: [kat] SHA2-256
443,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,839 UART: [kat] ++
454,284 UART: [kat] sha1
463,902 UART: [kat] SHA2-256
466,630 UART: [kat] SHA2-384
473,604 UART: [kat] SHA2-512-ACC
475,959 UART: [kat] ECC-384
2,767,294 UART: [kat] HMAC-384Kdf
2,801,054 UART: [kat] LMS
3,991,346 UART: [kat] --
3,997,332 UART: [cold-reset] ++
3,999,822 UART: [fht] Storing FHT @ 0x50003400
4,011,714 UART: [idev] ++
4,012,289 UART: [idev] CDI.KEYID = 6
4,013,236 UART: [idev] SUBJECT.KEYID = 7
4,014,477 UART: [idev] UDS.KEYID = 0
4,015,435 ready_for_fw is high
4,015,619 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,158,803 UART: [idev] Erasing UDS.KEYID = 0
7,344,984 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,930 UART: [idev] --
7,371,789 UART: [ldev] ++
7,372,357 UART: [ldev] CDI.KEYID = 6
7,373,324 UART: [ldev] SUBJECT.KEYID = 5
7,374,527 UART: [ldev] AUTHORITY.KEYID = 7
7,375,747 UART: [ldev] FE.KEYID = 1
7,422,637 UART: [ldev] Erasing FE.KEYID = 1
10,755,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,617 UART: [ldev] --
13,115,924 UART: [fwproc] Waiting for Commands...
13,118,546 UART: [fwproc] Received command 0x46574c44
13,120,716 UART: [fwproc] Received Image of size 113844 bytes
17,169,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,665 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,630,644 >>> mbox cmd response: success
17,635,378 UART: [afmc] ++
17,636,032 UART: [afmc] CDI.KEYID = 6
17,636,926 UART: [afmc] SUBJECT.KEYID = 7
17,638,142 UART: [afmc] AUTHORITY.KEYID = 5
21,008,134 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,130 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,389 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,810 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,642 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,074 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,920 UART: [afmc] --
23,378,426 UART: [cold-reset] --
23,381,038 UART: [state] Locking Datavault
23,387,200 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,950 UART: [state] Locking ICCM
23,390,881 UART: [exit] Launching FMC @ 0x40000130
23,399,278 UART:
23,399,546 UART: Running Caliptra FMC ...
23,400,654 UART:
23,400,810 UART: [state] CFI Enabled
23,465,436 UART: [fht] FMC Alias Private Key: 7
25,802,845 UART: [art] Extend RT PCRs Done
25,804,066 UART: [art] Lock RT PCRs Done
25,805,656 UART: [art] Populate DV Done
25,811,225 UART: [fht] FMC Alias Private Key: 7
25,812,847 UART: [art] Derive CDI
25,813,617 UART: [art] Store in in slot 0x4
25,873,743 UART: [art] Derive Key Pair
25,874,792 UART: [art] Store priv key in slot 0x5
29,167,953 UART: [art] Derive Key Pair - Done
29,181,058 UART: [art] Signing Cert with AUTHO
29,182,363 UART: RITY.KEYID = 7
31,469,392 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,899 UART: [art] PUB.X = 4A48FC0C9021A873D21AE130BD0DBA074EFBD2EF32D157B770FE66A9EA4DF9783B693F4CE65DA935F3335AD691C83C3D
31,478,155 UART: [art] PUB.Y = 6B33C7E41B64F4AC832538BB5628E0501A45B03ACD282723236EFA260E910A08F6DB4383006BB8F82F9D7B048F021B9C
31,485,369 UART: [art] SIG.R = 9B431C1226F8DA54C767EA3F07E8306AEFFDECA072965CC684C54DD430F281C2C31931F8F7CA7B1A393C946ACE7AF652
31,492,785 UART: [art] SIG.S = 711458EE752B484DA0D8DDF9953A8B2AB9430995796A3D9524F74FA0881DAE487B0FE02170D1BB46DB127AD7A8E744A0
32,797,671 UART: Caliptra RT
32,798,384 UART: [state] CFI Enabled
32,960,640 UART: [rt] RT listening for mailbox commands...
32,962,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,993,720 UART: [rt]cmd =0x44504543, len=96
33,000,160 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,783,904 ready_for_fw is high
3,784,326 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,819,510 >>> mbox cmd response: success
23,502,554 UART:
23,502,925 UART: Running Caliptra FMC ...
23,504,127 UART:
23,504,316 UART: [state] CFI Enabled
23,574,124 UART: [fht] FMC Alias Private Key: 7
25,911,537 UART: [art] Extend RT PCRs Done
25,912,761 UART: [art] Lock RT PCRs Done
25,914,571 UART: [art] Populate DV Done
25,920,041 UART: [fht] FMC Alias Private Key: 7
25,921,746 UART: [art] Derive CDI
25,922,482 UART: [art] Store in in slot 0x4
25,983,305 UART: [art] Derive Key Pair
25,984,345 UART: [art] Store priv key in slot 0x5
29,276,952 UART: [art] Derive Key Pair - Done
29,290,111 UART: [art] Signing Cert with AUTHO
29,291,426 UART: RITY.KEYID = 7
31,579,124 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,630 UART: [art] PUB.X = EC51CF45760B79A4C19E5377DE1990CC5DEAA62750868A5E1C8AB837A722ADBD60B800EE26AF68E9702394D7A41489B0
31,587,841 UART: [art] PUB.Y = 23DBD9B5DD330C1D074EC9B7466EDE57094236CECCCD02A1C93AAC09814BD5F2EECF9E93C660FEEE9A1C038682736FE4
31,595,133 UART: [art] SIG.R = 60FDCD3B07C2ACEDCF204F5313C0518F91E454A3DD820CF3F59C96AABA209EA54B6FE4BA8D34A1AD34216DA61CCE927A
31,602,606 UART: [art] SIG.S = ACE455BB8A54CE89FC5E5E6DBBB7F9E3406C7DB68C5722AC7BD04A930AF505B88AF89917C47BD6C6968DD409156EED81
32,908,111 UART: Caliptra RT
32,908,830 UART: [state] CFI Enabled
33,068,875 UART: [rt] RT listening for mailbox commands...
33,070,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,102,087 UART: [rt]cmd =0x44504543, len=96
33,108,528 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,483 UART:
192,838 UART: Running Caliptra ROM ...
193,974 UART:
603,654 UART: [state] CFI Enabled
615,760 UART: [state] LifecycleState = Unprovisioned
617,702 UART: [state] DebugLocked = No
620,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,020 UART: [kat] SHA2-256
794,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,330 UART: [kat] ++
805,778 UART: [kat] sha1
817,073 UART: [kat] SHA2-256
819,800 UART: [kat] SHA2-384
826,873 UART: [kat] SHA2-512-ACC
829,281 UART: [kat] ECC-384
3,112,982 UART: [kat] HMAC-384Kdf
3,126,213 UART: [kat] LMS
4,316,345 UART: [kat] --
4,320,143 UART: [cold-reset] ++
4,321,150 UART: [fht] Storing FHT @ 0x50003400
4,332,848 UART: [idev] ++
4,333,414 UART: [idev] CDI.KEYID = 6
4,334,417 UART: [idev] SUBJECT.KEYID = 7
4,335,595 UART: [idev] UDS.KEYID = 0
4,336,584 ready_for_fw is high
4,336,781 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,772 UART: [idev] Erasing UDS.KEYID = 0
7,624,342 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,691 UART: [idev] --
7,647,758 UART: [ldev] ++
7,648,326 UART: [ldev] CDI.KEYID = 6
7,649,291 UART: [ldev] SUBJECT.KEYID = 5
7,650,500 UART: [ldev] AUTHORITY.KEYID = 7
7,651,784 UART: [ldev] FE.KEYID = 1
7,664,265 UART: [ldev] Erasing FE.KEYID = 1
10,955,819 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,515 UART: [ldev] --
13,317,762 UART: [fwproc] Waiting for Commands...
13,321,098 UART: [fwproc] Received command 0x46574c44
13,323,282 UART: [fwproc] Received Image of size 113844 bytes
17,363,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,829,885 >>> mbox cmd response: success
17,833,731 UART: [afmc] ++
17,834,322 UART: [afmc] CDI.KEYID = 6
17,835,231 UART: [afmc] SUBJECT.KEYID = 7
17,836,506 UART: [afmc] AUTHORITY.KEYID = 5
21,152,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,113 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,391 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,814 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,611 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,076 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,164 UART: [afmc] --
23,520,705 UART: [cold-reset] --
23,525,427 UART: [state] Locking Datavault
23,530,081 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,781 UART: [state] Locking ICCM
23,533,799 UART: [exit] Launching FMC @ 0x40000130
23,542,143 UART:
23,542,374 UART: Running Caliptra FMC ...
23,543,399 UART:
23,543,547 UART: [state] CFI Enabled
23,551,712 UART: [fht] FMC Alias Private Key: 7
25,882,729 UART: [art] Extend RT PCRs Done
25,883,965 UART: [art] Lock RT PCRs Done
25,885,510 UART: [art] Populate DV Done
25,890,616 UART: [fht] FMC Alias Private Key: 7
25,892,313 UART: [art] Derive CDI
25,893,051 UART: [art] Store in in slot 0x4
25,935,370 UART: [art] Derive Key Pair
25,936,372 UART: [art] Store priv key in slot 0x5
29,178,606 UART: [art] Derive Key Pair - Done
29,191,765 UART: [art] Signing Cert with AUTHO
29,193,070 UART: RITY.KEYID = 7
31,472,872 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,371 UART: [art] PUB.X = 66FB370BD613AC9BAF175427A168363FB67ADF879F239C36A870D0F8B0EE4AB0D9D93C9AC1F09344226DB49BF1AF6E57
31,481,622 UART: [art] PUB.Y = B6071E4289A7533F1C513EC48CFC51B1DCF0B9B3B999CC6FD3348BD0AAD25BA987B0A39BBB34257AAEA588D63B1004EA
31,488,867 UART: [art] SIG.R = 6E2E5EFDDA3B0E71B3AAF3ADD1D16936CA53B4AFA2F81C5250E36574311C001862B5F17C9F3C64B372BEAFA593078124
31,496,280 UART: [art] SIG.S = 291155A6EA84E9A84E0BD2B65A1D95A6C370F205C5241BEB7E1D7087A1F882803D2E405D27587F5DC0D75585C3EEFEAB
32,801,593 UART: Caliptra RT
32,802,315 UART: [state] CFI Enabled
32,919,507 UART: [rt] RT listening for mailbox commands...
32,921,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,952,720 UART: [rt]cmd =0x44504543, len=96
32,959,608 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,126,056 ready_for_fw is high
4,126,437 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,054,049 >>> mbox cmd response: success
23,693,810 UART:
23,694,216 UART: Running Caliptra FMC ...
23,695,413 UART:
23,695,592 UART: [state] CFI Enabled
23,703,650 UART: [fht] FMC Alias Private Key: 7
26,034,108 UART: [art] Extend RT PCRs Done
26,035,337 UART: [art] Lock RT PCRs Done
26,036,719 UART: [art] Populate DV Done
26,042,084 UART: [fht] FMC Alias Private Key: 7
26,043,760 UART: [art] Derive CDI
26,044,582 UART: [art] Store in in slot 0x4
26,087,567 UART: [art] Derive Key Pair
26,088,607 UART: [art] Store priv key in slot 0x5
29,330,626 UART: [art] Derive Key Pair - Done
29,343,574 UART: [art] Signing Cert with AUTHO
29,344,874 UART: RITY.KEYID = 7
31,624,277 UART: [art] Erasing AUTHORITY.KEYID = 7
31,625,783 UART: [art] PUB.X = 8B150D9F2801B11C107C90E01EB7B5D745D476715053B197A5D22642D7E8A838830C3A62B954DE0616CD4FFECD631C84
31,633,043 UART: [art] PUB.Y = 269ED5304C0F973C890927A386010C5299AFBB8ED25E604F163B6A0BA553EC1F055B337FC0EDCF1A3B1A33844FB3123A
31,640,298 UART: [art] SIG.R = 4332CE00A642635954434D21CA4D98A29C9459B49694C30468EF43149265DC0F6438C9F249D82A68E2108380FB3FC793
31,647,652 UART: [art] SIG.S = E9E083CE286D104072AA64A6E7B05CCF6C94A94CAA3951813BD1BE3FBF8BAB349CD90E2AE52CD580655FABDCFDD5A577
32,952,638 UART: Caliptra RT
32,953,343 UART: [state] CFI Enabled
33,070,939 UART: [rt] RT listening for mailbox commands...
33,072,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,103,919 UART: [rt]cmd =0x44504543, len=96
33,110,547 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,210 UART:
192,585 UART: Running Caliptra ROM ...
193,773 UART:
193,933 UART: [state] CFI Enabled
261,162 UART: [state] LifecycleState = Unprovisioned
263,008 UART: [state] DebugLocked = No
265,103 UART: [state] WD Timer not started. Device not locked for debugging
268,422 UART: [kat] SHA2-256
447,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,138 UART: [kat] ++
459,673 UART: [kat] sha1
469,919 UART: [kat] SHA2-256
472,939 UART: [kat] SHA2-384
479,072 UART: [kat] SHA2-512-ACC
482,011 UART: [kat] ECC-384
2,926,975 UART: [kat] HMAC-384Kdf
2,950,500 UART: [kat] LMS
3,479,921 UART: [kat] --
3,483,505 UART: [cold-reset] ++
3,485,579 UART: [fht] FHT @ 0x50003400
3,497,052 UART: [idev] ++
3,497,626 UART: [idev] CDI.KEYID = 6
3,498,541 UART: [idev] SUBJECT.KEYID = 7
3,499,714 UART: [idev] UDS.KEYID = 0
3,500,639 ready_for_fw is high
3,500,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,644,425 UART: [idev] Erasing UDS.KEYID = 0
6,003,684 UART: [idev] Sha1 KeyId Algorithm
6,026,195 UART: [idev] --
6,030,623 UART: [ldev] ++
6,031,231 UART: [ldev] CDI.KEYID = 6
6,032,154 UART: [ldev] SUBJECT.KEYID = 5
6,033,206 UART: [ldev] AUTHORITY.KEYID = 7
6,034,319 UART: [ldev] FE.KEYID = 1
6,079,682 UART: [ldev] Erasing FE.KEYID = 1
8,580,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,765 UART: [ldev] --
10,369,446 UART: [fwproc] Wait for Commands...
10,371,222 UART: [fwproc] Recv command 0x46574c44
10,373,328 UART: [fwproc] Recv'd Img size: 114168 bytes
13,770,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,842,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,911,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,228,424 >>> mbox cmd response: success
14,232,237 UART: [afmc] ++
14,232,838 UART: [afmc] CDI.KEYID = 6
14,233,757 UART: [afmc] SUBJECT.KEYID = 7
14,234,919 UART: [afmc] AUTHORITY.KEYID = 5
16,763,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,487,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,489,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,505,331 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,521,383 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,537,239 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,560,578 UART: [afmc] --
18,565,152 UART: [cold-reset] --
18,570,002 UART: [state] Locking Datavault
18,575,149 UART: [state] Locking PCR0, PCR1 and PCR31
18,576,803 UART: [state] Locking ICCM
18,579,439 UART: [exit] Launching FMC @ 0x40000130
18,587,895 UART:
18,588,129 UART: Running Caliptra FMC ...
18,589,228 UART:
18,589,387 UART: [state] CFI Enabled
18,645,472 UART: [fht] FMC Alias Private Key: 7
20,409,474 UART: [art] Extend RT PCRs Done
20,410,707 UART: [art] Lock RT PCRs Done
20,412,257 UART: [art] Populate DV Done
20,417,347 UART: [fht] FMC Alias Private Key: 7
20,418,950 UART: [art] Derive CDI
20,419,765 UART: [art] Store in in slot 0x4
20,479,127 UART: [art] Derive Key Pair
20,480,187 UART: [art] Store priv key in slot 0x5
22,943,065 UART: [art] Derive Key Pair - Done
22,955,903 UART: [art] Signing Cert with AUTHO
22,957,205 UART: RITY.KEYID = 7
24,669,049 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,553 UART: [art] PUB.X = 702477A5E4DABF1C67632DC5CD55E1FD1CA38E232C365C1B9B90B8DC28F6E6A4EDFC28A7249A270ADD86E55DA4941EB7
24,677,881 UART: [art] PUB.Y = 603E7962F7EA61BD0C76AB8E09EE340C97AED1509F5AA5D940818AC54C903AD710C7D8EB31A83A89768B4A03B80D31C4
24,685,134 UART: [art] SIG.R = 53FEAFDAF9F1CDDA382947AD1239049FFF6313A817B73E8BE47E28B5974B44F053931E19F77246DEFE8B1444ADC9658F
24,692,537 UART: [art] SIG.S = FF9CC965607202E97C6921299CBB903E29359D26348822CE41D9C441474FE4698B1DD5CB30EF565C9872868B468FA5A6
25,671,451 UART: Caliptra RT
25,672,164 UART: [state] CFI Enabled
25,838,909 UART: [rt] RT listening for mailbox commands...
25,840,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,872,280 UART: [rt]cmd =0x44504543, len=96
25,878,885 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,360,257 ready_for_fw is high
3,360,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,074,239 >>> mbox cmd response: success
18,366,547 UART:
18,366,946 UART: Running Caliptra FMC ...
18,368,051 UART:
18,368,211 UART: [state] CFI Enabled
18,435,302 UART: [fht] FMC Alias Private Key: 7
20,199,770 UART: [art] Extend RT PCRs Done
20,200,998 UART: [art] Lock RT PCRs Done
20,202,583 UART: [art] Populate DV Done
20,207,795 UART: [fht] FMC Alias Private Key: 7
20,209,391 UART: [art] Derive CDI
20,210,209 UART: [art] Store in in slot 0x4
20,267,738 UART: [art] Derive Key Pair
20,268,779 UART: [art] Store priv key in slot 0x5
22,731,554 UART: [art] Derive Key Pair - Done
22,744,073 UART: [art] Signing Cert with AUTHO
22,745,382 UART: RITY.KEYID = 7
24,458,384 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,887 UART: [art] PUB.X = 1C7FA4C61F3A53C88CAA7C494553063D288E3FE1B163F620C436253087E50DF01A57CC0BC15169C805DAAB53E5509F65
24,467,146 UART: [art] PUB.Y = 65B8D8B53FE851FA6ED50BEC298DCBC287FA66E720C2877E71DA5C9BE0D1F92D137A2BBFE6F45BCD70FE70BFDD308AD5
24,474,459 UART: [art] SIG.R = C31820FAE6FB5C0F8C4C169CC98F80A04D4A0B7712FA010CD597E3695310757435C1EA1CD7EC7B0C78DBFC1F33E777F3
24,481,843 UART: [art] SIG.S = A5609DD84D135C63D580CC177E62A97C987204A11FA1D7D9C07CFE7A660BEABD6C1259CDE8CF247D006BED5259CE27C5
25,460,236 UART: Caliptra RT
25,460,931 UART: [state] CFI Enabled
25,626,534 UART: [rt] RT listening for mailbox commands...
25,628,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,659,604 UART: [rt]cmd =0x44504543, len=96
25,666,094 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,649 writing to cptra_bootfsm_go
192,926 UART:
193,298 UART: Running Caliptra ROM ...
194,511 UART:
604,001 UART: [state] CFI Enabled
616,219 UART: [state] LifecycleState = Unprovisioned
618,102 UART: [state] DebugLocked = No
620,842 UART: [state] WD Timer not started. Device not locked for debugging
624,587 UART: [kat] SHA2-256
803,701 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,285 UART: [kat] ++
815,820 UART: [kat] sha1
826,760 UART: [kat] SHA2-256
829,793 UART: [kat] SHA2-384
835,008 UART: [kat] SHA2-512-ACC
837,951 UART: [kat] ECC-384
3,275,919 UART: [kat] HMAC-384Kdf
3,288,603 UART: [kat] LMS
3,818,146 UART: [kat] --
3,822,600 UART: [cold-reset] ++
3,823,758 UART: [fht] FHT @ 0x50003400
3,835,021 UART: [idev] ++
3,835,588 UART: [idev] CDI.KEYID = 6
3,836,619 UART: [idev] SUBJECT.KEYID = 7
3,837,724 UART: [idev] UDS.KEYID = 0
3,838,650 ready_for_fw is high
3,838,855 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,982,789 UART: [idev] Erasing UDS.KEYID = 0
6,312,207 UART: [idev] Sha1 KeyId Algorithm
6,334,082 UART: [idev] --
6,338,350 UART: [ldev] ++
6,338,959 UART: [ldev] CDI.KEYID = 6
6,339,877 UART: [ldev] SUBJECT.KEYID = 5
6,341,040 UART: [ldev] AUTHORITY.KEYID = 7
6,342,271 UART: [ldev] FE.KEYID = 1
6,353,312 UART: [ldev] Erasing FE.KEYID = 1
8,823,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,808 UART: [ldev] --
10,613,829 UART: [fwproc] Wait for Commands...
10,616,733 UART: [fwproc] Recv command 0x46574c44
10,618,835 UART: [fwproc] Recv'd Img size: 114168 bytes
14,023,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,090,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,159,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,476,691 >>> mbox cmd response: success
14,480,668 UART: [afmc] ++
14,481,263 UART: [afmc] CDI.KEYID = 6
14,482,194 UART: [afmc] SUBJECT.KEYID = 7
14,483,352 UART: [afmc] AUTHORITY.KEYID = 5
16,984,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,704,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,706,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,722,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,738,552 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,754,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,778,398 UART: [afmc] --
18,782,270 UART: [cold-reset] --
18,787,154 UART: [state] Locking Datavault
18,791,914 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,552 UART: [state] Locking ICCM
18,794,679 UART: [exit] Launching FMC @ 0x40000130
18,803,083 UART:
18,803,321 UART: Running Caliptra FMC ...
18,804,442 UART:
18,804,608 UART: [state] CFI Enabled
18,812,547 UART: [fht] FMC Alias Private Key: 7
20,568,615 UART: [art] Extend RT PCRs Done
20,569,840 UART: [art] Lock RT PCRs Done
20,571,057 UART: [art] Populate DV Done
20,576,899 UART: [fht] FMC Alias Private Key: 7
20,578,282 UART: [art] Derive CDI
20,579,029 UART: [art] Store in in slot 0x4
20,621,305 UART: [art] Derive Key Pair
20,622,329 UART: [art] Store priv key in slot 0x5
23,049,804 UART: [art] Derive Key Pair - Done
23,062,472 UART: [art] Signing Cert with AUTHO
23,063,810 UART: RITY.KEYID = 7
24,768,836 UART: [art] Erasing AUTHORITY.KEYID = 7
24,770,354 UART: [art] PUB.X = 56097310AE5569FF5F854F25FE4D1CA11B0AA56A25D68B4998BC05A6BEC69E780517BBA9894F0C0BF92923BEF499392F
24,777,690 UART: [art] PUB.Y = 088DE8FC895A2C0300080AB1E0D9F87D1BA2EF9F498A7AF4110B2BFA2F06CF929C0897004253C73E2C6336644713E17C
24,784,828 UART: [art] SIG.R = 5BDC88D94A76FACB9856B7B8ED037636DB2B0A6648217DD4265F0CD5CBB4ED0A9F2C5A74831AC4AABE04F7B52719407F
24,792,278 UART: [art] SIG.S = 95F2972358C21832B49D5409C763F544B955EDE3E0B96EC32A8880C43417A41B1F319AD008FF1EE3B822C34529CA35F6
25,771,241 UART: Caliptra RT
25,771,933 UART: [state] CFI Enabled
25,889,439 UART: [rt] RT listening for mailbox commands...
25,891,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,922,363 UART: [rt]cmd =0x44504543, len=96
25,928,884 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
3,695,848 ready_for_fw is high
3,696,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,277,779 >>> mbox cmd response: success
18,533,120 UART:
18,533,508 UART: Running Caliptra FMC ...
18,534,653 UART:
18,534,816 UART: [state] CFI Enabled
18,542,785 UART: [fht] FMC Alias Private Key: 7
20,299,464 UART: [art] Extend RT PCRs Done
20,300,692 UART: [art] Lock RT PCRs Done
20,302,506 UART: [art] Populate DV Done
20,307,979 UART: [fht] FMC Alias Private Key: 7
20,309,684 UART: [art] Derive CDI
20,310,424 UART: [art] Store in in slot 0x4
20,352,860 UART: [art] Derive Key Pair
20,353,860 UART: [art] Store priv key in slot 0x5
22,780,290 UART: [art] Derive Key Pair - Done
22,793,029 UART: [art] Signing Cert with AUTHO
22,794,335 UART: RITY.KEYID = 7
24,499,897 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,398 UART: [art] PUB.X = EF1F3E02D588B508D14B32B7DCDAB0CAD953759DF756D0B3FBF9206162B5BA3BA0BD14D521788C7A68FCB697F29A690E
24,508,713 UART: [art] PUB.Y = 59855090A16EE5D1971AE9D6F2B7BC29525DC49C1466D396CA18D3AA73CCCD824A4D7D795DF287E45F2CEC0826FD6607
24,515,980 UART: [art] SIG.R = 12964857984839C2430E71FFF1C772947824DBAC84E1F61A2D7E1A3829438DB0B02D64A61925CEAE10F4834DF113C270
24,523,325 UART: [art] SIG.S = 2B7601D27A76047EDB7CC89333C5570C0A87D00D8C75DDA0E5A56724623B50FEA9D44960A1396EBFDC1FBCEB0FA13EAA
25,502,192 UART: Caliptra RT
25,502,895 UART: [state] CFI Enabled
25,619,903 UART: [rt] RT listening for mailbox commands...
25,621,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,652,942 UART: [rt]cmd =0x44504543, len=96
25,659,168 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,094 UART:
192,470 UART: Running Caliptra ROM ...
193,620 UART:
193,768 UART: [state] CFI Enabled
261,231 UART: [state] LifecycleState = Unprovisioned
263,290 UART: [state] DebugLocked = No
264,971 UART: [state] WD Timer not started. Device not locked for debugging
269,744 UART: [kat] SHA2-256
459,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,336 UART: [kat] ++
471,198 UART: [kat] sha1
481,072 UART: [kat] SHA2-256
484,102 UART: [kat] SHA2-384
489,404 UART: [kat] SHA2-512-ACC
491,994 UART: [kat] ECC-384
2,947,329 UART: [kat] HMAC-384Kdf
2,970,445 UART: [kat] LMS
3,502,231 UART: [kat] --
3,506,860 UART: [cold-reset] ++
3,508,362 UART: [fht] FHT @ 0x50003400
3,520,995 UART: [idev] ++
3,521,743 UART: [idev] CDI.KEYID = 6
3,522,635 UART: [idev] SUBJECT.KEYID = 7
3,523,883 UART: [idev] UDS.KEYID = 0
3,524,965 ready_for_fw is high
3,525,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,627 UART: [idev] Erasing UDS.KEYID = 0
6,029,880 UART: [idev] Sha1 KeyId Algorithm
6,052,530 UART: [idev] --
6,058,001 UART: [ldev] ++
6,058,698 UART: [ldev] CDI.KEYID = 6
6,059,764 UART: [ldev] SUBJECT.KEYID = 5
6,060,872 UART: [ldev] AUTHORITY.KEYID = 7
6,062,050 UART: [ldev] FE.KEYID = 1
6,098,726 UART: [ldev] Erasing FE.KEYID = 1
8,607,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,876 UART: [ldev] --
10,410,998 UART: [fwproc] Wait for Commands...
10,413,954 UART: [fwproc] Recv command 0x46574c44
10,416,261 UART: [fwproc] Recv'd Img size: 114168 bytes
13,859,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,936 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,678 >>> mbox cmd response: success
14,601,141 UART: [afmc] ++
14,601,851 UART: [afmc] CDI.KEYID = 6
14,602,971 UART: [afmc] SUBJECT.KEYID = 7
14,604,521 UART: [afmc] AUTHORITY.KEYID = 5
17,148,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,443 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,605 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,962,710 UART: [afmc] --
18,966,637 UART: [cold-reset] --
18,971,049 UART: [state] Locking Datavault
18,976,768 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,932 UART: [state] Locking ICCM
18,980,423 UART: [exit] Launching FMC @ 0x40000130
18,989,107 UART:
18,989,340 UART: Running Caliptra FMC ...
18,990,367 UART:
18,990,514 UART: [state] CFI Enabled
19,049,857 UART: [fht] FMC Alias Private Key: 7
20,813,645 UART: [art] Extend RT PCRs Done
20,814,861 UART: [art] Lock RT PCRs Done
20,816,780 UART: [art] Populate DV Done
20,822,298 UART: [fht] FMC Alias Private Key: 7
20,823,952 UART: [art] Derive CDI
20,824,767 UART: [art] Store in in slot 0x4
20,882,797 UART: [art] Derive Key Pair
20,883,841 UART: [art] Store priv key in slot 0x5
23,346,698 UART: [art] Derive Key Pair - Done
23,359,364 UART: [art] Signing Cert with AUTHO
23,360,703 UART: RITY.KEYID = 7
25,071,635 UART: [art] Erasing AUTHORITY.KEYID = 7
25,073,139 UART: [art] PUB.X = E7B92F8FEC068E4826210CA8EC90DBEFB4465EF696668AAE4920DEBB8F01310DBBD7B1F8AB8D3E1A02D3F50F30ACDA73
25,080,468 UART: [art] PUB.Y = 9A2275C013F6CA08B8D5825FEFC4C46B5E852D1B6B5B3ED8048859DDE21818BCDC4198B04B85D7FF6B251BF51D9A46CA
25,087,720 UART: [art] SIG.R = 33DEB4F7E3AD27407B88A3533D011779AFC7F09AB4D55F12661B74DE0DCA578B64C447404C102979F2505F228FA1AFF2
25,095,138 UART: [art] SIG.S = BC7D9CE7CEE84D1E8F0A07DE386B3BC28B51F6F2F6A227222F48C19E7A9FFCA39F111EF6A13BB6C7F58847BA75C3EC0C
26,073,749 UART: Caliptra RT
26,074,435 UART: [state] CFI Enabled
26,239,327 UART: [rt] RT listening for mailbox commands...
26,241,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,272,474 UART: [rt]cmd =0x44504543, len=96
26,278,954 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,437,464 ready_for_fw is high
3,437,862 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,729,359 >>> mbox cmd response: success
19,026,655 UART:
19,027,048 UART: Running Caliptra FMC ...
19,028,167 UART:
19,028,322 UART: [state] CFI Enabled
19,092,032 UART: [fht] FMC Alias Private Key: 7
20,856,225 UART: [art] Extend RT PCRs Done
20,857,454 UART: [art] Lock RT PCRs Done
20,859,126 UART: [art] Populate DV Done
20,864,817 UART: [fht] FMC Alias Private Key: 7
20,866,306 UART: [art] Derive CDI
20,867,042 UART: [art] Store in in slot 0x4
20,924,417 UART: [art] Derive Key Pair
20,925,459 UART: [art] Store priv key in slot 0x5
23,388,564 UART: [art] Derive Key Pair - Done
23,401,569 UART: [art] Signing Cert with AUTHO
23,402,882 UART: RITY.KEYID = 7
25,113,389 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,900 UART: [art] PUB.X = 0024206C15AB38A305DC7A5BC38C1C865E6A9745986CD09DE44954806237E661306CE13E3A17079D8D2E655F8BE5B0AD
25,122,081 UART: [art] PUB.Y = 05AE17C52F75D6378018DFAB7DFC9EFEADAC755AD2D5CC9E270C9CF7CDCEBC9F9BF2C6ED00E97ED35557AB807335BAEE
25,129,413 UART: [art] SIG.R = 417DFF0A0D05D41D20F1449A93BE71720CCA102CB84CDDF0D7D922D6C77C47B1A9260F93563A21A92BCA82722D3D5794
25,136,819 UART: [art] SIG.S = 862384FEBE0CE75D8E43B536FD476BEE7BF909F542B6FE0C8EAD86A2DA6E81EBC826D1B317C84C407BB5BC6B1B397C36
26,115,802 UART: Caliptra RT
26,116,515 UART: [state] CFI Enabled
26,279,746 UART: [rt] RT listening for mailbox commands...
26,281,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,313,008 UART: [rt]cmd =0x44504543, len=96
26,319,816 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,960 writing to cptra_bootfsm_go
193,144 UART:
193,504 UART: Running Caliptra ROM ...
194,605 UART:
604,192 UART: [state] CFI Enabled
615,950 UART: [state] LifecycleState = Unprovisioned
618,320 UART: [state] DebugLocked = No
620,073 UART: [state] WD Timer not started. Device not locked for debugging
624,758 UART: [kat] SHA2-256
814,646 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,446 UART: [kat] ++
825,967 UART: [kat] sha1
837,550 UART: [kat] SHA2-256
840,556 UART: [kat] SHA2-384
846,897 UART: [kat] SHA2-512-ACC
849,475 UART: [kat] ECC-384
3,288,511 UART: [kat] HMAC-384Kdf
3,300,529 UART: [kat] LMS
3,832,339 UART: [kat] --
3,835,577 UART: [cold-reset] ++
3,836,439 UART: [fht] FHT @ 0x50003400
3,848,334 UART: [idev] ++
3,849,035 UART: [idev] CDI.KEYID = 6
3,849,938 UART: [idev] SUBJECT.KEYID = 7
3,851,188 UART: [idev] UDS.KEYID = 0
3,852,091 ready_for_fw is high
3,852,293 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,995,751 UART: [idev] Erasing UDS.KEYID = 0
6,331,133 UART: [idev] Sha1 KeyId Algorithm
6,354,142 UART: [idev] --
6,358,297 UART: [ldev] ++
6,358,973 UART: [ldev] CDI.KEYID = 6
6,359,955 UART: [ldev] SUBJECT.KEYID = 5
6,361,066 UART: [ldev] AUTHORITY.KEYID = 7
6,362,298 UART: [ldev] FE.KEYID = 1
6,372,782 UART: [ldev] Erasing FE.KEYID = 1
8,851,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,286 UART: [ldev] --
10,640,981 UART: [fwproc] Wait for Commands...
10,643,559 UART: [fwproc] Recv command 0x46574c44
10,645,867 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,491 >>> mbox cmd response: success
14,836,892 UART: [afmc] ++
14,837,600 UART: [afmc] CDI.KEYID = 6
14,838,839 UART: [afmc] SUBJECT.KEYID = 7
14,840,273 UART: [afmc] AUTHORITY.KEYID = 5
17,345,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,909 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,086 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,252 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,290 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,516 UART: [afmc] --
19,143,326 UART: [cold-reset] --
19,147,955 UART: [state] Locking Datavault
19,154,989 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,123 UART: [state] Locking ICCM
19,159,474 UART: [exit] Launching FMC @ 0x40000130
19,168,147 UART:
19,168,389 UART: Running Caliptra FMC ...
19,169,440 UART:
19,169,592 UART: [state] CFI Enabled
19,177,910 UART: [fht] FMC Alias Private Key: 7
20,934,984 UART: [art] Extend RT PCRs Done
20,936,206 UART: [art] Lock RT PCRs Done
20,937,748 UART: [art] Populate DV Done
20,943,321 UART: [fht] FMC Alias Private Key: 7
20,944,797 UART: [art] Derive CDI
20,945,530 UART: [art] Store in in slot 0x4
20,988,546 UART: [art] Derive Key Pair
20,989,550 UART: [art] Store priv key in slot 0x5
23,417,001 UART: [art] Derive Key Pair - Done
23,430,111 UART: [art] Signing Cert with AUTHO
23,431,448 UART: RITY.KEYID = 7
25,136,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,408 UART: [art] PUB.X = 158AEE5BE1C6B36DEFA30F31FE0EE6AB9F2A7DEC2FC95ED59934778E28CECF6AB9ED0AC9C5F7899B11DB58963AC676E0
25,145,713 UART: [art] PUB.Y = B75CC20A4F4873A5A546BAB1CA32B625495479EEEE7064812639A768976719456D2E004F36B64DA83097593BA7AFC5B3
25,152,943 UART: [art] SIG.R = C4C730587A6E8B07D30A2E8837ED00C04AD1BC3CA19F3DD04DEEF13C22ED0D2788E0687FCD80A1101AC6146F2EEE70B5
25,160,336 UART: [art] SIG.S = B51073EC4DE74579CC797B269E9263E9BB4933FFE8786296AA8A13DF13C1A079F651BB0F54DA74CCFF5A03D6B7A19158
26,139,050 UART: Caliptra RT
26,139,780 UART: [state] CFI Enabled
26,257,487 UART: [rt] RT listening for mailbox commands...
26,259,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,290,644 UART: [rt]cmd =0x44504543, len=96
26,297,385 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,556 writing to cptra_bootfsm_go
3,755,543 ready_for_fw is high
3,756,140 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,614 >>> mbox cmd response: success
19,198,657 UART:
19,199,049 UART: Running Caliptra FMC ...
19,200,161 UART:
19,200,317 UART: [state] CFI Enabled
19,207,902 UART: [fht] FMC Alias Private Key: 7
20,964,963 UART: [art] Extend RT PCRs Done
20,966,182 UART: [art] Lock RT PCRs Done
20,967,755 UART: [art] Populate DV Done
20,973,333 UART: [fht] FMC Alias Private Key: 7
20,974,880 UART: [art] Derive CDI
20,975,697 UART: [art] Store in in slot 0x4
21,018,518 UART: [art] Derive Key Pair
21,019,525 UART: [art] Store priv key in slot 0x5
23,446,735 UART: [art] Derive Key Pair - Done
23,459,648 UART: [art] Signing Cert with AUTHO
23,460,952 UART: RITY.KEYID = 7
25,166,493 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,016 UART: [art] PUB.X = 1A5B3F3A2117CDCD0BAF0F31C06021BB704945C820E0A248D483929092FB113C053389DBC7E5FD65514A98C17742E996
25,175,213 UART: [art] PUB.Y = E8E03D5A69BD8A9C758A575BAFCF7C770228588154900420CA84CC45DD08C3AD6464903F94DFB0077222F73C70405BCC
25,182,502 UART: [art] SIG.R = 498E799447E934B8DB391C1CAA8F4EB3C30DFE8E96D02E9D750405495E7DF6A94D2FBEF1664C110028CBBBB283628E4A
25,189,903 UART: [art] SIG.S = AF04EB1B4BB0F588AA1D84F4B9D0AE0961D7150DB1E8797B561E8CE8019FDF1BD9D856EC49B177905C4A2A665613BF29
26,168,924 UART: Caliptra RT
26,169,615 UART: [state] CFI Enabled
26,286,770 UART: [rt] RT listening for mailbox commands...
26,288,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,319,792 UART: [rt]cmd =0x44504543, len=96
26,326,341 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,281 UART: [kat] SHA2-256
882,212 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,327 UART: [kat] ++
886,479 UART: [kat] sha1
890,761 UART: [kat] SHA2-256
892,699 UART: [kat] SHA2-384
895,514 UART: [kat] SHA2-512-ACC
897,415 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,476,819 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 ready_for_fw is high
1,480,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,270 UART: [idev] Erasing UDS.KEYID = 0
1,504,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,918 UART: [idev] --
1,513,919 UART: [ldev] ++
1,514,087 UART: [ldev] CDI.KEYID = 6
1,514,450 UART: [ldev] SUBJECT.KEYID = 5
1,514,876 UART: [ldev] AUTHORITY.KEYID = 7
1,515,339 UART: [ldev] FE.KEYID = 1
1,520,345 UART: [ldev] Erasing FE.KEYID = 1
1,545,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,872 UART: [ldev] --
1,585,261 UART: [fwproc] Waiting for Commands...
1,585,994 UART: [fwproc] Received command 0x46574c44
1,586,785 UART: [fwproc] Received Image of size 114168 bytes
2,883,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,669 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,021 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,684 >>> mbox cmd response: success
3,076,758 UART: [afmc] ++
3,076,926 UART: [afmc] CDI.KEYID = 6
3,077,288 UART: [afmc] SUBJECT.KEYID = 7
3,077,713 UART: [afmc] AUTHORITY.KEYID = 5
3,113,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,752 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,532 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,260 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,145 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,835 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,798 UART: [afmc] --
3,156,772 UART: [cold-reset] --
3,157,402 UART: [state] Locking Datavault
3,158,725 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,329 UART: [state] Locking ICCM
3,159,901 UART: [exit] Launching FMC @ 0x40000130
3,165,230 UART:
3,165,246 UART: Running Caliptra FMC ...
3,165,654 UART:
3,165,708 UART: [state] CFI Enabled
3,176,059 UART: [fht] FMC Alias Private Key: 7
3,284,002 UART: [art] Extend RT PCRs Done
3,284,430 UART: [art] Lock RT PCRs Done
3,285,912 UART: [art] Populate DV Done
3,294,401 UART: [fht] FMC Alias Private Key: 7
3,295,509 UART: [art] Derive CDI
3,295,789 UART: [art] Store in in slot 0x4
3,381,830 UART: [art] Derive Key Pair
3,382,190 UART: [art] Store priv key in slot 0x5
3,395,176 UART: [art] Derive Key Pair - Done
3,409,745 UART: [art] Signing Cert with AUTHO
3,410,225 UART: RITY.KEYID = 7
3,425,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,994 UART: [art] PUB.X = 4B35F86B3C050D499E3D1D4202263A69F982919EB15C5DFBDEC761D883B93AFD27CD99F8D22820B82A4354378262A0B7
3,432,757 UART: [art] PUB.Y = CB5313C2B71D4534860A3E8E73EEBB7AA500F414250DFDF9CD764F0ECF362D4C488620FE490140B117CC3B0C740D506D
3,439,677 UART: [art] SIG.R = 1587B4AF79FD834BBA8C003102A1B26C107CD52EA0AADE051AA81D9FAF7DF61954133B1BA4A4CA61A61CC10EB496E123
3,446,434 UART: [art] SIG.S = 78B08C37CB52AE8701607A71881930515BE7AF000A2807B965AC01DC5EA8F3FBEA690C10121B95B4C400921DAB3B8D67
3,469,934 UART: Caliptra RT
3,470,187 UART: [state] CFI Enabled
3,578,647 UART: [rt] RT listening for mailbox commands...
3,579,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,507 UART: [rt]cmd =0x44504543, len=96
3,616,649 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,235 ready_for_fw is high
1,363,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,600 >>> mbox cmd response: success
2,985,470 UART:
2,985,486 UART: Running Caliptra FMC ...
2,985,894 UART:
2,985,948 UART: [state] CFI Enabled
2,996,467 UART: [fht] FMC Alias Private Key: 7
3,105,806 UART: [art] Extend RT PCRs Done
3,106,234 UART: [art] Lock RT PCRs Done
3,107,750 UART: [art] Populate DV Done
3,115,823 UART: [fht] FMC Alias Private Key: 7
3,116,985 UART: [art] Derive CDI
3,117,265 UART: [art] Store in in slot 0x4
3,202,840 UART: [art] Derive Key Pair
3,203,200 UART: [art] Store priv key in slot 0x5
3,216,644 UART: [art] Derive Key Pair - Done
3,231,280 UART: [art] Signing Cert with AUTHO
3,231,760 UART: RITY.KEYID = 7
3,246,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,289 UART: [art] PUB.X = E47D184D49DD6064F843DCDE89052D78E44C41A022A73B84864DE0F37748D0B757A5E6AE1551123CAF47BE59EC1DE581
3,254,062 UART: [art] PUB.Y = 4E340EDDA6422C03C5A3E471B1C9E2E5A7D5FA418DFB6A33D6BFE8D3E2A379CEBCC4F7BF1423F3198616F580D521D7F7
3,261,026 UART: [art] SIG.R = 886123873CC85830C41156ECF76E42DCC6EAF0DDF9E6BA00B9EE1F9D11609DEA9DE5C831997825B11B7314096D6295ED
3,267,779 UART: [art] SIG.S = FF734E83ADF61289B5F7D7DFA0FE894ECCA7D03B380DB69490BA76AA3F50F3619C4D50A8FC33E29A1D4786377B61B6B4
3,291,331 UART: Caliptra RT
3,291,584 UART: [state] CFI Enabled
3,400,302 UART: [rt] RT listening for mailbox commands...
3,400,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,290 UART: [rt]cmd =0x44504543, len=96
3,438,440 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,836 UART: [kat] SHA2-256
892,774 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,119 UART: [kat] HMAC-384Kdf
907,871 UART: [kat] LMS
1,476,067 UART: [kat] --
1,477,102 UART: [cold-reset] ++
1,477,610 UART: [fht] Storing FHT @ 0x50003400
1,480,367 UART: [idev] ++
1,480,535 UART: [idev] CDI.KEYID = 6
1,480,895 UART: [idev] SUBJECT.KEYID = 7
1,481,319 UART: [idev] UDS.KEYID = 0
1,481,664 ready_for_fw is high
1,481,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,651 UART: [idev] Erasing UDS.KEYID = 0
1,505,977 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,728 UART: [ldev] ++
1,515,896 UART: [ldev] CDI.KEYID = 6
1,516,259 UART: [ldev] SUBJECT.KEYID = 5
1,516,685 UART: [ldev] AUTHORITY.KEYID = 7
1,517,148 UART: [ldev] FE.KEYID = 1
1,522,536 UART: [ldev] Erasing FE.KEYID = 1
1,547,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,586,952 UART: [fwproc] Waiting for Commands...
1,587,575 UART: [fwproc] Received command 0x46574c44
1,588,366 UART: [fwproc] Received Image of size 114168 bytes
2,885,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,892 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,969 >>> mbox cmd response: success
3,079,175 UART: [afmc] ++
3,079,343 UART: [afmc] CDI.KEYID = 6
3,079,705 UART: [afmc] SUBJECT.KEYID = 7
3,080,130 UART: [afmc] AUTHORITY.KEYID = 5
3,115,011 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,287 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,795 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,680 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,370 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,337 UART: [afmc] --
3,158,219 UART: [cold-reset] --
3,159,203 UART: [state] Locking Datavault
3,160,412 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,016 UART: [state] Locking ICCM
3,161,676 UART: [exit] Launching FMC @ 0x40000130
3,167,005 UART:
3,167,021 UART: Running Caliptra FMC ...
3,167,429 UART:
3,167,572 UART: [state] CFI Enabled
3,178,139 UART: [fht] FMC Alias Private Key: 7
3,286,926 UART: [art] Extend RT PCRs Done
3,287,354 UART: [art] Lock RT PCRs Done
3,289,146 UART: [art] Populate DV Done
3,297,177 UART: [fht] FMC Alias Private Key: 7
3,298,329 UART: [art] Derive CDI
3,298,609 UART: [art] Store in in slot 0x4
3,384,188 UART: [art] Derive Key Pair
3,384,548 UART: [art] Store priv key in slot 0x5
3,397,950 UART: [art] Derive Key Pair - Done
3,412,680 UART: [art] Signing Cert with AUTHO
3,413,160 UART: RITY.KEYID = 7
3,428,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,549 UART: [art] PUB.X = B018458F3C4F01EE93E0F3BA95554636D533C3C55CD25F51702A357B9CE452C0020A3C75ACFA7D1C10C2DE740573E29F
3,436,313 UART: [art] PUB.Y = D1C7B8ADEB9544466D90E778AB851B007A45155F4D50AE32F3A5E1286CAD8CDBB20AB6532BA6211ABC66E84FDE76C66F
3,443,256 UART: [art] SIG.R = 04A4FC32DDC50B3CED8C3083EA18A71AF4A1451DAF9D4CAC27E5B1969D6853A9266653C930D37C07E9A3332924BA3366
3,450,025 UART: [art] SIG.S = 5552F040056B06BCD1D510ADA8AA42167132ECFC7CDCF91E229F3A35FF4989B8685171A2CDC44C27D8A07F39ACBEFB49
3,474,086 UART: Caliptra RT
3,474,431 UART: [state] CFI Enabled
3,583,221 UART: [rt] RT listening for mailbox commands...
3,583,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,481 UART: [rt]cmd =0x44504543, len=96
3,621,919 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,146 ready_for_fw is high
1,363,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,099 >>> mbox cmd response: success
2,986,925 UART:
2,986,941 UART: Running Caliptra FMC ...
2,987,349 UART:
2,987,492 UART: [state] CFI Enabled
2,997,833 UART: [fht] FMC Alias Private Key: 7
3,105,950 UART: [art] Extend RT PCRs Done
3,106,378 UART: [art] Lock RT PCRs Done
3,107,968 UART: [art] Populate DV Done
3,116,325 UART: [fht] FMC Alias Private Key: 7
3,117,463 UART: [art] Derive CDI
3,117,743 UART: [art] Store in in slot 0x4
3,203,742 UART: [art] Derive Key Pair
3,204,102 UART: [art] Store priv key in slot 0x5
3,217,720 UART: [art] Derive Key Pair - Done
3,232,506 UART: [art] Signing Cert with AUTHO
3,232,986 UART: RITY.KEYID = 7
3,247,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,715 UART: [art] PUB.X = DA61938ACF6F2872C56ACE732162F9CE6C427DE792506557C70F1C94B2F712F52D4DD9AAB999EFF04C94F4CBF082847A
3,255,494 UART: [art] PUB.Y = 888A9D510108B48320E680C05E7D9D1724374AC2B17BCE7B20476BF44A2EBD18F12DA59E5E4B98995BA034836641FDD3
3,262,440 UART: [art] SIG.R = F57E018ADC33986B2BDFC60392A110B0B22A542AE2CDDC9906CAE98DB6D9996F06D71C6F7A12FEA0B27F0DCF9900DB3C
3,269,195 UART: [art] SIG.S = 5C11B39D4F9D944790A9FDC5E33377FE587E6383EC91F9ADEEF63BE6AC168BA240812C75560B537A6C256F8AB93A7845
3,292,927 UART: Caliptra RT
3,293,272 UART: [state] CFI Enabled
3,401,915 UART: [rt] RT listening for mailbox commands...
3,402,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,673 UART: [rt]cmd =0x44504543, len=96
3,439,887 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
893,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,699 UART: [kat] ++
897,851 UART: [kat] sha1
902,123 UART: [kat] SHA2-256
904,063 UART: [kat] SHA2-384
906,784 UART: [kat] SHA2-512-ACC
908,685 UART: [kat] ECC-384
918,378 UART: [kat] HMAC-384Kdf
922,882 UART: [kat] LMS
1,171,210 UART: [kat] --
1,172,185 UART: [cold-reset] ++
1,172,653 UART: [fht] FHT @ 0x50003400
1,175,352 UART: [idev] ++
1,175,520 UART: [idev] CDI.KEYID = 6
1,175,880 UART: [idev] SUBJECT.KEYID = 7
1,176,304 UART: [idev] UDS.KEYID = 0
1,176,649 ready_for_fw is high
1,176,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,600 UART: [idev] Erasing UDS.KEYID = 0
1,201,117 UART: [idev] Sha1 KeyId Algorithm
1,209,655 UART: [idev] --
1,210,607 UART: [ldev] ++
1,210,775 UART: [ldev] CDI.KEYID = 6
1,211,138 UART: [ldev] SUBJECT.KEYID = 5
1,211,564 UART: [ldev] AUTHORITY.KEYID = 7
1,212,027 UART: [ldev] FE.KEYID = 1
1,217,347 UART: [ldev] Erasing FE.KEYID = 1
1,243,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,320 UART: [fwproc] Recv command 0x46574c44
1,284,048 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,418 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,722 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,313 >>> mbox cmd response: success
2,773,425 UART: [afmc] ++
2,773,593 UART: [afmc] CDI.KEYID = 6
2,773,955 UART: [afmc] SUBJECT.KEYID = 7
2,774,380 UART: [afmc] AUTHORITY.KEYID = 5
2,810,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,490 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,103 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,822 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,714 UART: [afmc] --
2,853,828 UART: [cold-reset] --
2,854,650 UART: [state] Locking Datavault
2,855,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,379 UART: [state] Locking ICCM
2,856,807 UART: [exit] Launching FMC @ 0x40000130
2,862,136 UART:
2,862,152 UART: Running Caliptra FMC ...
2,862,560 UART:
2,862,614 UART: [state] CFI Enabled
2,872,733 UART: [fht] FMC Alias Private Key: 7
2,980,286 UART: [art] Extend RT PCRs Done
2,980,714 UART: [art] Lock RT PCRs Done
2,982,426 UART: [art] Populate DV Done
2,990,377 UART: [fht] FMC Alias Private Key: 7
2,991,519 UART: [art] Derive CDI
2,991,799 UART: [art] Store in in slot 0x4
3,077,100 UART: [art] Derive Key Pair
3,077,460 UART: [art] Store priv key in slot 0x5
3,090,186 UART: [art] Derive Key Pair - Done
3,104,859 UART: [art] Signing Cert with AUTHO
3,105,339 UART: RITY.KEYID = 7
3,119,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,732 UART: [art] PUB.X = 1166E5DE6ABF9C78A3F95B16C7F31C53B0FFBAA426B65285028B85618DCBAB2B4A5D7699F99BD7767430DDFA4803110A
3,127,505 UART: [art] PUB.Y = B1E95AC858BCC366C499F8EA8DAA70FACB25153C660440FDD9361AF95C9B288E74D003EBEA42A9646C427C6A430D8A05
3,134,457 UART: [art] SIG.R = A59FF294418090B285AF81669C6B704DE5D90E6EC6BD40407EE17BF79F5ABE686B7896F8751FD372992CFEE03BE515FB
3,141,234 UART: [art] SIG.S = 872D8899CF4391AA3D6E15F3B3D86006C3F915AF3199BAA88D7E536DD513238174F979031451A0D6CC19A8DC966C5B61
3,164,939 UART: Caliptra RT
3,165,192 UART: [state] CFI Enabled
3,272,634 UART: [rt] RT listening for mailbox commands...
3,273,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,900 UART: [rt]cmd =0x44504543, len=96
3,310,978 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,597 ready_for_fw is high
1,060,597 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,396 >>> mbox cmd response: success
2,687,512 UART:
2,687,528 UART: Running Caliptra FMC ...
2,687,936 UART:
2,687,990 UART: [state] CFI Enabled
2,698,549 UART: [fht] FMC Alias Private Key: 7
2,806,350 UART: [art] Extend RT PCRs Done
2,806,778 UART: [art] Lock RT PCRs Done
2,808,374 UART: [art] Populate DV Done
2,816,577 UART: [fht] FMC Alias Private Key: 7
2,817,751 UART: [art] Derive CDI
2,818,031 UART: [art] Store in in slot 0x4
2,903,374 UART: [art] Derive Key Pair
2,903,734 UART: [art] Store priv key in slot 0x5
2,917,082 UART: [art] Derive Key Pair - Done
2,931,426 UART: [art] Signing Cert with AUTHO
2,931,906 UART: RITY.KEYID = 7
2,946,892 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,657 UART: [art] PUB.X = 96C5B807361640A7FA23236C7FF723890257DEF1B73175B0D8811E05645F9FA35653333331D1D8ED2C5FC0BAB03498C0
2,954,414 UART: [art] PUB.Y = F68951437D89AB1C088E29308ADA431E1C4F4582DDE85A59100071375767E3AE4530AC4D96E64B4A0FD8324497FD06AE
2,961,333 UART: [art] SIG.R = 2BADD37418B926A2B76422B900B1BE04FF1332A6BE7B082449621635372BAC39E2DD900F8989C138A1DF739C4DCA9A7E
2,968,078 UART: [art] SIG.S = F09595442F915C6D9F316490881B7BAB2DFD704750774D210840E2EA8B615CFEAAFC7F6436364E24178AF5E0F6EC5D15
2,992,286 UART: Caliptra RT
2,992,539 UART: [state] CFI Enabled
3,101,014 UART: [rt] RT listening for mailbox commands...
3,101,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,424 UART: [rt]cmd =0x44504543, len=96
3,139,140 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,877 UART: [state] LifecycleState = Unprovisioned
86,532 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,477 UART: [kat] SHA2-256
894,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,252 UART: [kat] ++
898,404 UART: [kat] sha1
902,566 UART: [kat] SHA2-256
904,506 UART: [kat] SHA2-384
907,063 UART: [kat] SHA2-512-ACC
908,964 UART: [kat] ECC-384
918,373 UART: [kat] HMAC-384Kdf
923,103 UART: [kat] LMS
1,171,431 UART: [kat] --
1,172,294 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,331 UART: [idev] ++
1,175,499 UART: [idev] CDI.KEYID = 6
1,175,859 UART: [idev] SUBJECT.KEYID = 7
1,176,283 UART: [idev] UDS.KEYID = 0
1,176,628 ready_for_fw is high
1,176,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,818 UART: [idev] Sha1 KeyId Algorithm
1,210,228 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,218,008 UART: [ldev] Erasing FE.KEYID = 1
1,244,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,732 UART: [ldev] --
1,284,187 UART: [fwproc] Wait for Commands...
1,284,765 UART: [fwproc] Recv command 0x46574c44
1,285,493 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,482 >>> mbox cmd response: success
2,775,698 UART: [afmc] ++
2,775,866 UART: [afmc] CDI.KEYID = 6
2,776,228 UART: [afmc] SUBJECT.KEYID = 7
2,776,653 UART: [afmc] AUTHORITY.KEYID = 5
2,812,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,402 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,121 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,023 UART: [afmc] --
2,856,105 UART: [cold-reset] --
2,856,901 UART: [state] Locking Datavault
2,858,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,844 UART: [state] Locking ICCM
2,859,366 UART: [exit] Launching FMC @ 0x40000130
2,864,695 UART:
2,864,711 UART: Running Caliptra FMC ...
2,865,119 UART:
2,865,262 UART: [state] CFI Enabled
2,875,825 UART: [fht] FMC Alias Private Key: 7
2,983,716 UART: [art] Extend RT PCRs Done
2,984,144 UART: [art] Lock RT PCRs Done
2,985,620 UART: [art] Populate DV Done
2,994,019 UART: [fht] FMC Alias Private Key: 7
2,995,069 UART: [art] Derive CDI
2,995,349 UART: [art] Store in in slot 0x4
3,080,976 UART: [art] Derive Key Pair
3,081,336 UART: [art] Store priv key in slot 0x5
3,094,832 UART: [art] Derive Key Pair - Done
3,109,822 UART: [art] Signing Cert with AUTHO
3,110,302 UART: RITY.KEYID = 7
3,125,618 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,383 UART: [art] PUB.X = 26EE73548A0769F74AF4D896E843A761EAD95FC9072A7CE468D80A0094BDDAD10D61FF000CD57F0DC735CED1D5D8B191
3,133,105 UART: [art] PUB.Y = 62FCEA5E1643FA4E862ECC480CE045376AEE982BF62ED6BACF0F307980CE57C349C962DAD904A40566B212E210E2D7C3
3,140,057 UART: [art] SIG.R = F3FA798540967453385CC40BCCCAE81E8EDAF8138ABE69D115C6B288C35B81FD984D9E7B91C35472B43BCC2857633539
3,146,830 UART: [art] SIG.S = 3DCD79677B90008BB0509254338D6966194C756C0A9721A0BBEEF1E20E94FCDE42FE8FDF60986BD3DCD86D7AB6B1E752
3,170,609 UART: Caliptra RT
3,170,954 UART: [state] CFI Enabled
3,279,181 UART: [rt] RT listening for mailbox commands...
3,279,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,367 UART: [rt]cmd =0x44504543, len=96
3,317,753 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,596 ready_for_fw is high
1,060,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,997 >>> mbox cmd response: success
2,687,513 UART:
2,687,529 UART: Running Caliptra FMC ...
2,687,937 UART:
2,688,080 UART: [state] CFI Enabled
2,698,565 UART: [fht] FMC Alias Private Key: 7
2,805,490 UART: [art] Extend RT PCRs Done
2,805,918 UART: [art] Lock RT PCRs Done
2,807,510 UART: [art] Populate DV Done
2,815,601 UART: [fht] FMC Alias Private Key: 7
2,816,601 UART: [art] Derive CDI
2,816,881 UART: [art] Store in in slot 0x4
2,902,546 UART: [art] Derive Key Pair
2,902,906 UART: [art] Store priv key in slot 0x5
2,916,524 UART: [art] Derive Key Pair - Done
2,931,304 UART: [art] Signing Cert with AUTHO
2,931,784 UART: RITY.KEYID = 7
2,946,828 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,593 UART: [art] PUB.X = 65AB1EC24E456C47572EE71BD465C04EB14EBED94142C34D13110411477A312D5AACB8D1E9FEB3B4E91C7BE2F007BCFB
2,954,375 UART: [art] PUB.Y = EA5BCDF9C5CD6F952530FD3D6C2D6F5AB041766CD5D848DF9F118F6D6C743F622CFB73C147882C40F299A799BE55C1F9
2,961,341 UART: [art] SIG.R = 2026FEB4FE8E6D2A5A3D13084AE40C42E7A26ABE6627A2D514DD890F6699CB758EE6688DD4528A0FE9154E06911AE68F
2,968,106 UART: [art] SIG.S = 52CF1AE6D9385D4ABE59157D400967D4F8276760806C8441C668D1FDE5B318B05C1B1D78CF6E3D5499BC8DB111B06284
2,992,064 UART: Caliptra RT
2,992,409 UART: [state] CFI Enabled
3,099,678 UART: [rt] RT listening for mailbox commands...
3,100,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,738 UART: [rt]cmd =0x44504543, len=96
3,137,732 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,214 UART: [kat] SHA2-512-ACC
906,115 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,620 UART: [kat] LMS
1,168,932 UART: [kat] --
1,169,967 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 ready_for_fw is high
1,174,419 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,145 UART: [idev] Erasing UDS.KEYID = 0
1,199,307 UART: [idev] Sha1 KeyId Algorithm
1,208,229 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,215,608 UART: [ldev] Erasing FE.KEYID = 1
1,241,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,598 UART: [ldev] --
1,281,020 UART: [fwproc] Wait for Commands...
1,281,775 UART: [fwproc] Recv command 0x46574c44
1,282,508 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,399 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,099 >>> mbox cmd response: success
2,772,366 UART: [afmc] ++
2,772,534 UART: [afmc] CDI.KEYID = 6
2,772,897 UART: [afmc] SUBJECT.KEYID = 7
2,773,323 UART: [afmc] AUTHORITY.KEYID = 5
2,809,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,127 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,846 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,685 UART: [afmc] --
2,852,593 UART: [cold-reset] --
2,853,479 UART: [state] Locking Datavault
2,854,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,152 UART: [state] Locking ICCM
2,855,688 UART: [exit] Launching FMC @ 0x40000130
2,861,017 UART:
2,861,033 UART: Running Caliptra FMC ...
2,861,441 UART:
2,861,495 UART: [state] CFI Enabled
2,872,138 UART: [fht] FMC Alias Private Key: 7
2,980,553 UART: [art] Extend RT PCRs Done
2,980,981 UART: [art] Lock RT PCRs Done
2,982,863 UART: [art] Populate DV Done
2,991,226 UART: [fht] FMC Alias Private Key: 7
2,992,260 UART: [art] Derive CDI
2,992,540 UART: [art] Store in in slot 0x4
3,078,245 UART: [art] Derive Key Pair
3,078,605 UART: [art] Store priv key in slot 0x5
3,091,957 UART: [art] Derive Key Pair - Done
3,106,623 UART: [art] Signing Cert with AUTHO
3,107,103 UART: RITY.KEYID = 7
3,121,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,720 UART: [art] PUB.X = 6E7A99C7CC84DEB83C84012945B5C9A4CB306C39CAFD564B1C76BA3A71EE5C81052D20FA9E91B8BAB292903C4B3D4E45
3,129,500 UART: [art] PUB.Y = 4B0582B2FCFDD33F2B1C3E707008A50E033D0523EDE2E18C6D87C1CE287797086DD35BB7F64DC86E8E32A1A4E943DB02
3,136,441 UART: [art] SIG.R = 86DCF186D233D465D184B36EF238DB8009471EE1C8CF3768FBA344931C02C4CD1338C8AAAE972BD75D0069FF5D2D4B50
3,143,193 UART: [art] SIG.S = 570A70B805375F84F85FF1320E9A32C28FBBC47C13D93C14E1BC13531DBDE2618423D2DBC595D515698589EFD2EB3142
3,167,351 UART: Caliptra RT
3,167,604 UART: [state] CFI Enabled
3,275,077 UART: [rt] RT listening for mailbox commands...
3,275,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,981 UART: [rt]cmd =0x44504543, len=96
3,313,253 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,832 ready_for_fw is high
1,055,832 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,109 >>> mbox cmd response: success
2,683,471 UART:
2,683,487 UART: Running Caliptra FMC ...
2,683,895 UART:
2,683,949 UART: [state] CFI Enabled
2,694,464 UART: [fht] FMC Alias Private Key: 7
2,803,011 UART: [art] Extend RT PCRs Done
2,803,439 UART: [art] Lock RT PCRs Done
2,804,973 UART: [art] Populate DV Done
2,813,388 UART: [fht] FMC Alias Private Key: 7
2,814,346 UART: [art] Derive CDI
2,814,626 UART: [art] Store in in slot 0x4
2,900,305 UART: [art] Derive Key Pair
2,900,665 UART: [art] Store priv key in slot 0x5
2,913,667 UART: [art] Derive Key Pair - Done
2,928,424 UART: [art] Signing Cert with AUTHO
2,928,904 UART: RITY.KEYID = 7
2,943,624 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,389 UART: [art] PUB.X = A6BBA88C67AD0D83EE66AFAB66AEFA195BD6015F1DEFD40693F2991052547D3933CFFA1292A55F4BFC2B4D1C0248698C
2,951,165 UART: [art] PUB.Y = 2A3FEB67DB0668771CF2AF6718EC463A2F8333F7FD6AE8F84874629F56318B93CA9DCF63BEB1E33EC3A297674D4F90C2
2,958,124 UART: [art] SIG.R = 03A28480D0B7EDC2D86536EB7D769212C035B275779D49ECF78BECD0150C9CA6E77F230E5673F8027132621BAC3AD21A
2,964,886 UART: [art] SIG.S = 98A11BCB84EE804F57AF0FFE075BF10B2245662695E9188644456A7C018BD93FEE435758DC8E3E1F02ACC19CB6BF08E0
2,988,429 UART: Caliptra RT
2,988,682 UART: [state] CFI Enabled
3,096,449 UART: [rt] RT listening for mailbox commands...
3,097,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,303 UART: [rt]cmd =0x44504543, len=96
3,134,419 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,449 UART: [kat] SHA2-256
890,999 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,406 UART: [kat] SHA2-256
901,346 UART: [kat] SHA2-384
904,151 UART: [kat] SHA2-512-ACC
906,052 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,399 UART: [kat] LMS
1,168,711 UART: [kat] --
1,169,472 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,564 UART: [idev] ++
1,172,732 UART: [idev] CDI.KEYID = 6
1,173,093 UART: [idev] SUBJECT.KEYID = 7
1,173,518 UART: [idev] UDS.KEYID = 0
1,173,864 ready_for_fw is high
1,173,864 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,118 UART: [idev] Erasing UDS.KEYID = 0
1,198,292 UART: [idev] Sha1 KeyId Algorithm
1,206,978 UART: [idev] --
1,207,963 UART: [ldev] ++
1,208,131 UART: [ldev] CDI.KEYID = 6
1,208,495 UART: [ldev] SUBJECT.KEYID = 5
1,208,922 UART: [ldev] AUTHORITY.KEYID = 7
1,209,385 UART: [ldev] FE.KEYID = 1
1,214,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,561 UART: [ldev] --
1,280,959 UART: [fwproc] Wait for Commands...
1,281,646 UART: [fwproc] Recv command 0x46574c44
1,282,379 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,156 >>> mbox cmd response: success
2,772,399 UART: [afmc] ++
2,772,567 UART: [afmc] CDI.KEYID = 6
2,772,930 UART: [afmc] SUBJECT.KEYID = 7
2,773,356 UART: [afmc] AUTHORITY.KEYID = 5
2,808,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,440 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,052 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,771 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,700 UART: [afmc] --
2,851,776 UART: [cold-reset] --
2,852,652 UART: [state] Locking Datavault
2,854,043 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,647 UART: [state] Locking ICCM
2,855,133 UART: [exit] Launching FMC @ 0x40000130
2,860,462 UART:
2,860,478 UART: Running Caliptra FMC ...
2,860,886 UART:
2,861,029 UART: [state] CFI Enabled
2,871,876 UART: [fht] FMC Alias Private Key: 7
2,980,079 UART: [art] Extend RT PCRs Done
2,980,507 UART: [art] Lock RT PCRs Done
2,982,091 UART: [art] Populate DV Done
2,990,322 UART: [fht] FMC Alias Private Key: 7
2,991,356 UART: [art] Derive CDI
2,991,636 UART: [art] Store in in slot 0x4
3,077,479 UART: [art] Derive Key Pair
3,077,839 UART: [art] Store priv key in slot 0x5
3,090,791 UART: [art] Derive Key Pair - Done
3,105,849 UART: [art] Signing Cert with AUTHO
3,106,329 UART: RITY.KEYID = 7
3,121,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,690 UART: [art] PUB.X = 4DD8981D602BA9661DC98A73EC2825C54E8C3DD8031E51ADDFB4F6C2953DD7C8ECD6D14DC6D4729E8980FC6BDDADB5BA
3,129,483 UART: [art] PUB.Y = 2EA321A09A32BA0ECDE54C7B1A84065352962D0B2994207C9EA4CBB8EE25CBBD640569AA9940F71E6A421205CE13478F
3,136,426 UART: [art] SIG.R = 36E6E7A283E6727A3D77D0BCABC364C4E15CA1266DBAAC809ADA881ECF6362E84FA90A659112FCB94036016C32F1F739
3,143,202 UART: [art] SIG.S = 1EBE6656AC2D8DD2BA5150AB88C7A88EE23CEDD84E08701E1DC7899BFA4DB9210FE92FE86756B209911B282D3A4A290A
3,167,315 UART: Caliptra RT
3,167,660 UART: [state] CFI Enabled
3,275,935 UART: [rt] RT listening for mailbox commands...
3,276,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,077 UART: [rt]cmd =0x44504543, len=96
3,314,465 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,527 ready_for_fw is high
1,056,527 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,396 >>> mbox cmd response: success
2,681,736 UART:
2,681,752 UART: Running Caliptra FMC ...
2,682,160 UART:
2,682,303 UART: [state] CFI Enabled
2,692,800 UART: [fht] FMC Alias Private Key: 7
2,800,527 UART: [art] Extend RT PCRs Done
2,800,955 UART: [art] Lock RT PCRs Done
2,802,887 UART: [art] Populate DV Done
2,810,964 UART: [fht] FMC Alias Private Key: 7
2,812,018 UART: [art] Derive CDI
2,812,298 UART: [art] Store in in slot 0x4
2,897,805 UART: [art] Derive Key Pair
2,898,165 UART: [art] Store priv key in slot 0x5
2,911,895 UART: [art] Derive Key Pair - Done
2,926,606 UART: [art] Signing Cert with AUTHO
2,927,086 UART: RITY.KEYID = 7
2,942,248 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,013 UART: [art] PUB.X = 3283F16B024AD56E7550DD734F06110C3EE93DA74E7B07E85158D0F49E3C94B10FC8A14BCF04DC9C76BBDA2CC1ADB84B
2,949,783 UART: [art] PUB.Y = AE000A9DD804F8B23CF40B0D2F82E19A308B8E07433722049C8FC9ED90323C60B77905F439F1398E3AFAEA346B92F8E2
2,956,696 UART: [art] SIG.R = 2A5FEE2926FF74CD3F34EA81A9D1DB7D29B4DEB5689579A1B90FE6676856386A14D414CC0400348E19DD356013DC6342
2,963,442 UART: [art] SIG.S = B94D642135465C6755181C48B1E34CE6D25D06A24C549D0E57BFFB6E87D7A60040FB740C6E3ADD7C197BA5DB3C3C4D27
2,987,418 UART: Caliptra RT
2,987,763 UART: [state] CFI Enabled
3,095,596 UART: [rt] RT listening for mailbox commands...
3,096,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,546 UART: [rt]cmd =0x44504543, len=96
3,133,502 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,012 UART:
192,371 UART: Running Caliptra ROM ...
193,547 UART:
193,695 UART: [state] CFI Enabled
264,966 UART: [state] LifecycleState = Unprovisioned
266,931 UART: [state] DebugLocked = No
268,165 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,241 UART: [kat] SHA2-256
442,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,495 UART: [kat] ++
453,983 UART: [kat] sha1
465,705 UART: [kat] SHA2-256
468,425 UART: [kat] SHA2-384
473,767 UART: [kat] SHA2-512-ACC
476,130 UART: [kat] ECC-384
2,770,791 UART: [kat] HMAC-384Kdf
2,801,937 UART: [kat] LMS
3,992,278 UART: [kat] --
3,997,971 UART: [cold-reset] ++
3,999,469 UART: [fht] Storing FHT @ 0x50003400
4,010,890 UART: [idev] ++
4,011,450 UART: [idev] CDI.KEYID = 6
4,012,481 UART: [idev] SUBJECT.KEYID = 7
4,013,649 UART: [idev] UDS.KEYID = 0
4,014,633 ready_for_fw is high
4,014,844 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,158,059 UART: [idev] Erasing UDS.KEYID = 0
7,350,994 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,773 UART: [idev] --
7,377,163 UART: [ldev] ++
7,377,764 UART: [ldev] CDI.KEYID = 6
7,378,644 UART: [ldev] SUBJECT.KEYID = 5
7,379,908 UART: [ldev] AUTHORITY.KEYID = 7
7,381,053 UART: [ldev] FE.KEYID = 1
7,423,849 UART: [ldev] Erasing FE.KEYID = 1
10,757,989 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,715 UART: [ldev] --
13,138,187 UART: [fwproc] Waiting for Commands...
13,141,132 UART: [fwproc] Received command 0x46574c44
13,143,316 UART: [fwproc] Received Image of size 113844 bytes
17,184,568 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,261,822 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,647,275 >>> mbox cmd response: success
17,650,872 UART: [afmc] ++
17,651,467 UART: [afmc] CDI.KEYID = 6
17,652,369 UART: [afmc] SUBJECT.KEYID = 7
17,653,638 UART: [afmc] AUTHORITY.KEYID = 5
21,012,119 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,664 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,051 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,337,903 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,341 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,786 UART: [afmc] --
23,375,785 UART: [cold-reset] --
23,380,460 UART: [state] Locking Datavault
23,387,019 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,776 UART: [state] Locking ICCM
23,389,838 UART: [exit] Launching FMC @ 0x40000130
23,398,231 UART:
23,398,471 UART: Running Caliptra FMC ...
23,399,564 UART:
23,399,716 UART: [state] CFI Enabled
23,468,778 UART: [fht] FMC Alias Private Key: 7
25,806,838 UART: [art] Extend RT PCRs Done
25,808,053 UART: [art] Lock RT PCRs Done
25,809,675 UART: [art] Populate DV Done
25,815,126 UART: [fht] FMC Alias Private Key: 7
25,816,601 UART: [art] Derive CDI
25,817,345 UART: [art] Store in in slot 0x4
25,878,322 UART: [art] Derive Key Pair
25,879,358 UART: [art] Store priv key in slot 0x5
29,171,843 UART: [art] Derive Key Pair - Done
29,184,615 UART: [art] Signing Cert with AUTHO
29,185,918 UART: RITY.KEYID = 7
31,474,181 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,694 UART: [art] PUB.X = F90B9E16268EE0CC1510B33C99C260A16B74D862E53F11E92F78B82118FD1F93A0CD82D3EAAA05891EE2C34ECB3F7EE2
31,482,968 UART: [art] PUB.Y = 8C672B3BB715FAB803944D592AB8B5C780CAF6224FA062FD524EEEDB0C7A02EA3D7F9E103B91C1F4E578995922B32C72
31,490,181 UART: [art] SIG.R = AD3217E32E3D1E404E23819160828E6DC9533AF7D748338923C1127D842D666FF9CB626D82A6F74963D5814CC38C0D64
31,497,566 UART: [art] SIG.S = 4946A9C8605E49B75879E3F2690CF6B2177C9B3FACC370B3E00194870CC5C162E8621ECF26E37E525A53755D3A4D2618
32,802,741 UART: Caliptra RT
32,803,457 UART: [state] CFI Enabled
32,965,051 UART: [rt] RT listening for mailbox commands...
32,966,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,998,274 UART: [rt]cmd =0x4d454153, len=108
33,016,495 >>> mbox cmd response data (12 bytes)
33,017,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,047,608 UART: [rt]cmd =0x4d454153, len=108
33,066,282 >>> mbox cmd response data (12 bytes)
33,066,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,097,524 UART: [rt]cmd =0x4d454153, len=108
33,116,290 >>> mbox cmd response data (12 bytes)
33,116,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,147,417 UART: [rt]cmd =0x4d454153, len=108
33,165,842 >>> mbox cmd response data (12 bytes)
33,166,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,196,986 UART: [rt]cmd =0x4d454153, len=108
33,215,590 >>> mbox cmd response data (12 bytes)
33,216,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,246,806 UART: [rt]cmd =0x4d454153, len=108
33,265,929 >>> mbox cmd response data (12 bytes)
33,266,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,296,845 UART: [rt]cmd =0x4d454153, len=108
33,315,098 >>> mbox cmd response data (12 bytes)
33,315,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,346,012 UART: [rt]cmd =0x4d454153, len=108
33,364,294 >>> mbox cmd response data (12 bytes)
33,364,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,395,484 UART: [rt]cmd =0x4d454153, len=108
33,413,686 >>> mbox cmd response data (12 bytes)
33,414,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,444,659 UART: [rt]cmd =0x4d454153, len=108
33,463,475 >>> mbox cmd response data (12 bytes)
33,463,935 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,494,472 UART: [rt]cmd =0x4d454153, len=108
33,513,344 >>> mbox cmd response data (12 bytes)
33,513,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,544,323 UART: [rt]cmd =0x4d454153, len=108
33,563,398 >>> mbox cmd response data (12 bytes)
33,563,817 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,594,672 UART: [rt]cmd =0x4d454153, len=108
33,613,437 >>> mbox cmd response data (12 bytes)
33,613,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,644,528 UART: [rt]cmd =0x4d454153, len=108
33,663,517 >>> mbox cmd response data (12 bytes)
33,663,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,694,699 UART: [rt]cmd =0x4d454153, len=108
33,713,333 >>> mbox cmd response data (12 bytes)
33,713,802 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,744,551 UART: [rt]cmd =0x4d454153, len=108
33,747,098 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,785,543 ready_for_fw is high
3,785,925 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,853,185 >>> mbox cmd response: success
23,536,224 UART:
23,536,614 UART: Running Caliptra FMC ...
23,537,751 UART:
23,537,906 UART: [state] CFI Enabled
23,605,640 UART: [fht] FMC Alias Private Key: 7
25,942,809 UART: [art] Extend RT PCRs Done
25,944,063 UART: [art] Lock RT PCRs Done
25,945,632 UART: [art] Populate DV Done
25,951,203 UART: [fht] FMC Alias Private Key: 7
25,952,906 UART: [art] Derive CDI
25,953,715 UART: [art] Store in in slot 0x4
26,013,403 UART: [art] Derive Key Pair
26,014,433 UART: [art] Store priv key in slot 0x5
29,307,012 UART: [art] Derive Key Pair - Done
29,320,014 UART: [art] Signing Cert with AUTHO
29,321,321 UART: RITY.KEYID = 7
31,607,729 UART: [art] Erasing AUTHORITY.KEYID = 7
31,609,240 UART: [art] PUB.X = 664BEA8112384A932AA47216DF1167E6D254A3E943A2450F5C83E56AF476142CD74D8512FB96F4E66E97F1858648D09B
31,616,500 UART: [art] PUB.Y = 16C3D154D30AC9D183528E888C4655E770932FF305E26A6709D0040D6BC3BD713E59F7D872B421D1D830A873203421DA
31,623,708 UART: [art] SIG.R = 0C6F81E7E752A30E2C15DD95508E0950DCA34ED331409C574C148C1382E6F4EF17052A1682EBB809298C4043DFE3B39E
31,631,052 UART: [art] SIG.S = A8EEE6AC977A1627B83B3B73E0607ED84E2490626EC4B8D475DE2B73391C256CEE67880597C2BDAF66B37180D772D637
32,935,894 UART: Caliptra RT
32,936,606 UART: [state] CFI Enabled
33,096,626 UART: [rt] RT listening for mailbox commands...
33,098,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,129,811 UART: [rt]cmd =0x4d454153, len=108
33,148,191 >>> mbox cmd response data (12 bytes)
33,148,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,179,426 UART: [rt]cmd =0x4d454153, len=108
33,198,420 >>> mbox cmd response data (12 bytes)
33,198,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,229,707 UART: [rt]cmd =0x4d454153, len=108
33,248,418 >>> mbox cmd response data (12 bytes)
33,248,841 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,279,547 UART: [rt]cmd =0x4d454153, len=108
33,297,992 >>> mbox cmd response data (12 bytes)
33,298,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,328,988 UART: [rt]cmd =0x4d454153, len=108
33,347,714 >>> mbox cmd response data (12 bytes)
33,348,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,378,718 UART: [rt]cmd =0x4d454153, len=108
33,397,592 >>> mbox cmd response data (12 bytes)
33,398,002 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,428,607 UART: [rt]cmd =0x4d454153, len=108
33,447,402 >>> mbox cmd response data (12 bytes)
33,447,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,478,204 UART: [rt]cmd =0x4d454153, len=108
33,497,281 >>> mbox cmd response data (12 bytes)
33,497,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,528,244 UART: [rt]cmd =0x4d454153, len=108
33,547,147 >>> mbox cmd response data (12 bytes)
33,547,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,578,159 UART: [rt]cmd =0x4d454153, len=108
33,596,914 >>> mbox cmd response data (12 bytes)
33,597,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,628,040 UART: [rt]cmd =0x4d454153, len=108
33,647,464 >>> mbox cmd response data (12 bytes)
33,647,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,678,217 UART: [rt]cmd =0x4d454153, len=108
33,695,935 >>> mbox cmd response data (12 bytes)
33,696,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,727,064 UART: [rt]cmd =0x4d454153, len=108
33,746,528 >>> mbox cmd response data (12 bytes)
33,746,952 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,777,711 UART: [rt]cmd =0x4d454153, len=108
33,796,023 >>> mbox cmd response data (12 bytes)
33,796,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,827,147 UART: [rt]cmd =0x4d454153, len=108
33,845,538 >>> mbox cmd response data (12 bytes)
33,845,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,876,547 UART: [rt]cmd =0x4d454153, len=108
33,879,039 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,505 UART:
192,866 UART: Running Caliptra ROM ...
194,046 UART:
603,545 UART: [state] CFI Enabled
618,774 UART: [state] LifecycleState = Unprovisioned
620,651 UART: [state] DebugLocked = No
623,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,332 UART: [kat] SHA2-256
797,061 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,652 UART: [kat] ++
808,100 UART: [kat] sha1
818,973 UART: [kat] SHA2-256
821,689 UART: [kat] SHA2-384
827,319 UART: [kat] SHA2-512-ACC
829,680 UART: [kat] ECC-384
3,114,044 UART: [kat] HMAC-384Kdf
3,125,146 UART: [kat] LMS
4,315,250 UART: [kat] --
4,320,496 UART: [cold-reset] ++
4,322,372 UART: [fht] Storing FHT @ 0x50003400
4,334,423 UART: [idev] ++
4,334,995 UART: [idev] CDI.KEYID = 6
4,336,027 UART: [idev] SUBJECT.KEYID = 7
4,337,207 UART: [idev] UDS.KEYID = 0
4,338,309 ready_for_fw is high
4,338,524 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,592 UART: [idev] Erasing UDS.KEYID = 0
7,621,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,645 UART: [idev] --
7,647,863 UART: [ldev] ++
7,648,486 UART: [ldev] CDI.KEYID = 6
7,649,399 UART: [ldev] SUBJECT.KEYID = 5
7,650,614 UART: [ldev] AUTHORITY.KEYID = 7
7,651,898 UART: [ldev] FE.KEYID = 1
7,662,005 UART: [ldev] Erasing FE.KEYID = 1
10,950,100 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,416 UART: [ldev] --
13,307,959 UART: [fwproc] Waiting for Commands...
13,310,921 UART: [fwproc] Received command 0x46574c44
13,313,159 UART: [fwproc] Received Image of size 113844 bytes
17,365,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,034 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,821,575 >>> mbox cmd response: success
17,824,979 UART: [afmc] ++
17,825,602 UART: [afmc] CDI.KEYID = 6
17,826,518 UART: [afmc] SUBJECT.KEYID = 7
17,827,738 UART: [afmc] AUTHORITY.KEYID = 5
21,143,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,294 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,453,667 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,468,499 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,927 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,641 UART: [afmc] --
23,509,305 UART: [cold-reset] --
23,512,796 UART: [state] Locking Datavault
23,519,239 UART: [state] Locking PCR0, PCR1 and PCR31
23,520,992 UART: [state] Locking ICCM
23,523,469 UART: [exit] Launching FMC @ 0x40000130
23,531,864 UART:
23,532,102 UART: Running Caliptra FMC ...
23,533,205 UART:
23,533,369 UART: [state] CFI Enabled
23,541,338 UART: [fht] FMC Alias Private Key: 7
25,872,509 UART: [art] Extend RT PCRs Done
25,873,733 UART: [art] Lock RT PCRs Done
25,875,627 UART: [art] Populate DV Done
25,881,113 UART: [fht] FMC Alias Private Key: 7
25,882,604 UART: [art] Derive CDI
25,883,372 UART: [art] Store in in slot 0x4
25,925,910 UART: [art] Derive Key Pair
25,926,951 UART: [art] Store priv key in slot 0x5
29,168,329 UART: [art] Derive Key Pair - Done
29,181,166 UART: [art] Signing Cert with AUTHO
29,182,646 UART: RITY.KEYID = 7
31,461,624 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,155 UART: [art] PUB.X = BF32C8B82C0648F7C43CA3A9FB0A9ECC81E87461CCFC39DA1547132FD175F639EB540AC45944CB1FBEE189E0CA96F174
31,470,353 UART: [art] PUB.Y = 3070A32B2E00036327DC88A5684D0B75F985FEB23977A50867210FFEE8B4782A6DB49491C808E727519969C40DC131C1
31,477,595 UART: [art] SIG.R = 0A52A0701EFB96FBF5D85CD8A278B081F603C1962F36C6DBF88339B4D054A74F13C20029393B10573F9087F1D30BDD2A
31,484,947 UART: [art] SIG.S = 4B10E2BA7044E6A64EC2DF8915051AE0F7F75053C6F44955CC0A24E7A563FA3910C604CEF692BC84E3647B30FAD84B45
32,790,902 UART: Caliptra RT
32,791,602 UART: [state] CFI Enabled
32,909,633 UART: [rt] RT listening for mailbox commands...
32,911,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,942,815 UART: [rt]cmd =0x4d454153, len=108
32,961,625 >>> mbox cmd response data (12 bytes)
32,962,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,992,931 UART: [rt]cmd =0x4d454153, len=108
33,010,789 >>> mbox cmd response data (12 bytes)
33,011,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,041,558 UART: [rt]cmd =0x4d454153, len=108
33,059,823 >>> mbox cmd response data (12 bytes)
33,060,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,090,800 UART: [rt]cmd =0x4d454153, len=108
33,109,734 >>> mbox cmd response data (12 bytes)
33,110,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,140,625 UART: [rt]cmd =0x4d454153, len=108
33,158,741 >>> mbox cmd response data (12 bytes)
33,159,157 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,189,988 UART: [rt]cmd =0x4d454153, len=108
33,208,954 >>> mbox cmd response data (12 bytes)
33,209,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,239,770 UART: [rt]cmd =0x4d454153, len=108
33,258,052 >>> mbox cmd response data (12 bytes)
33,258,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,289,078 UART: [rt]cmd =0x4d454153, len=108
33,307,202 >>> mbox cmd response data (12 bytes)
33,307,639 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,338,335 UART: [rt]cmd =0x4d454153, len=108
33,356,959 >>> mbox cmd response data (12 bytes)
33,357,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,388,157 UART: [rt]cmd =0x4d454153, len=108
33,406,435 >>> mbox cmd response data (12 bytes)
33,406,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,437,535 UART: [rt]cmd =0x4d454153, len=108
33,456,464 >>> mbox cmd response data (12 bytes)
33,456,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,487,600 UART: [rt]cmd =0x4d454153, len=108
33,506,320 >>> mbox cmd response data (12 bytes)
33,506,781 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,537,212 UART: [rt]cmd =0x4d454153, len=108
33,556,413 >>> mbox cmd response data (12 bytes)
33,556,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,587,320 UART: [rt]cmd =0x4d454153, len=108
33,606,223 >>> mbox cmd response data (12 bytes)
33,606,656 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,637,302 UART: [rt]cmd =0x4d454153, len=108
33,656,443 >>> mbox cmd response data (12 bytes)
33,656,869 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,687,633 UART: [rt]cmd =0x4d454153, len=108
33,689,725 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,126,430 ready_for_fw is high
4,126,851 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,056,086 >>> mbox cmd response: success
23,697,210 UART:
23,697,606 UART: Running Caliptra FMC ...
23,698,802 UART:
23,698,973 UART: [state] CFI Enabled
23,706,754 UART: [fht] FMC Alias Private Key: 7
26,037,404 UART: [art] Extend RT PCRs Done
26,038,641 UART: [art] Lock RT PCRs Done
26,040,120 UART: [art] Populate DV Done
26,045,538 UART: [fht] FMC Alias Private Key: 7
26,047,082 UART: [art] Derive CDI
26,047,903 UART: [art] Store in in slot 0x4
26,090,181 UART: [art] Derive Key Pair
26,091,186 UART: [art] Store priv key in slot 0x5
29,332,674 UART: [art] Derive Key Pair - Done
29,345,564 UART: [art] Signing Cert with AUTHO
29,346,871 UART: RITY.KEYID = 7
31,626,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,627,669 UART: [art] PUB.X = 5817676AC2533D2806229ED0249DF942C1E104ED680E097BF4A0CA25951C1DE5055AACA37D8DC1B3E6A8F5E59071828D
31,634,951 UART: [art] PUB.Y = 6F5E0524C78F36571C43B30703C1D38105A8C9AB22D6CDF3D30576F11E8DAE36D1B6896F7CD7A4D486252C1E9638AC61
31,642,160 UART: [art] SIG.R = 9700219CEFACBCC0662BA69320E82D48D56D20EEEE8F46F78C648D68BAAAB2706C07810D24744348EA5085C4D1B089E7
31,649,512 UART: [art] SIG.S = 21D9263862E411A3F4ECD249FFF48EDA285722A6F119EA2B69EA4D923A6CF2DA34AF5A5D65116E82134105B0D5C8C74F
32,955,312 UART: Caliptra RT
32,956,029 UART: [state] CFI Enabled
33,073,385 UART: [rt] RT listening for mailbox commands...
33,075,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,106,622 UART: [rt]cmd =0x4d454153, len=108
33,125,628 >>> mbox cmd response data (12 bytes)
33,126,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,156,926 UART: [rt]cmd =0x4d454153, len=108
33,176,016 >>> mbox cmd response data (12 bytes)
33,176,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,207,131 UART: [rt]cmd =0x4d454153, len=108
33,225,035 >>> mbox cmd response data (12 bytes)
33,225,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,256,287 UART: [rt]cmd =0x4d454153, len=108
33,275,168 >>> mbox cmd response data (12 bytes)
33,275,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,306,529 UART: [rt]cmd =0x4d454153, len=108
33,325,579 >>> mbox cmd response data (12 bytes)
33,326,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,356,694 UART: [rt]cmd =0x4d454153, len=108
33,375,304 >>> mbox cmd response data (12 bytes)
33,375,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,406,538 UART: [rt]cmd =0x4d454153, len=108
33,425,498 >>> mbox cmd response data (12 bytes)
33,425,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,456,450 UART: [rt]cmd =0x4d454153, len=108
33,474,924 >>> mbox cmd response data (12 bytes)
33,475,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,506,052 UART: [rt]cmd =0x4d454153, len=108
33,525,050 >>> mbox cmd response data (12 bytes)
33,525,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,556,132 UART: [rt]cmd =0x4d454153, len=108
33,574,388 >>> mbox cmd response data (12 bytes)
33,574,821 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,605,569 UART: [rt]cmd =0x4d454153, len=108
33,624,011 >>> mbox cmd response data (12 bytes)
33,624,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,654,883 UART: [rt]cmd =0x4d454153, len=108
33,673,953 >>> mbox cmd response data (12 bytes)
33,674,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,704,830 UART: [rt]cmd =0x4d454153, len=108
33,722,958 >>> mbox cmd response data (12 bytes)
33,723,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,754,127 UART: [rt]cmd =0x4d454153, len=108
33,772,622 >>> mbox cmd response data (12 bytes)
33,773,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,803,816 UART: [rt]cmd =0x4d454153, len=108
33,822,234 >>> mbox cmd response data (12 bytes)
33,822,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,853,362 UART: [rt]cmd =0x4d454153, len=108
33,855,529 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,085 UART:
192,459 UART: Running Caliptra ROM ...
193,560 UART:
193,704 UART: [state] CFI Enabled
261,658 UART: [state] LifecycleState = Unprovisioned
263,571 UART: [state] DebugLocked = No
265,235 UART: [state] WD Timer not started. Device not locked for debugging
268,698 UART: [kat] SHA2-256
447,771 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,377 UART: [kat] ++
459,830 UART: [kat] sha1
469,776 UART: [kat] SHA2-256
472,794 UART: [kat] SHA2-384
480,210 UART: [kat] SHA2-512-ACC
483,144 UART: [kat] ECC-384
2,947,848 UART: [kat] HMAC-384Kdf
2,969,753 UART: [kat] LMS
3,499,206 UART: [kat] --
3,503,157 UART: [cold-reset] ++
3,505,734 UART: [fht] FHT @ 0x50003400
3,517,217 UART: [idev] ++
3,517,785 UART: [idev] CDI.KEYID = 6
3,518,714 UART: [idev] SUBJECT.KEYID = 7
3,519,890 UART: [idev] UDS.KEYID = 0
3,520,817 ready_for_fw is high
3,521,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,619 UART: [idev] Erasing UDS.KEYID = 0
6,025,787 UART: [idev] Sha1 KeyId Algorithm
6,049,606 UART: [idev] --
6,054,175 UART: [ldev] ++
6,054,758 UART: [ldev] CDI.KEYID = 6
6,055,694 UART: [ldev] SUBJECT.KEYID = 5
6,056,806 UART: [ldev] AUTHORITY.KEYID = 7
6,058,106 UART: [ldev] FE.KEYID = 1
6,098,410 UART: [ldev] Erasing FE.KEYID = 1
8,598,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,923 UART: [ldev] --
10,389,005 UART: [fwproc] Wait for Commands...
10,391,648 UART: [fwproc] Recv command 0x46574c44
10,393,690 UART: [fwproc] Recv'd Img size: 114168 bytes
13,790,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,932,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,250,426 >>> mbox cmd response: success
14,254,748 UART: [afmc] ++
14,255,346 UART: [afmc] CDI.KEYID = 6
14,256,258 UART: [afmc] SUBJECT.KEYID = 7
14,257,419 UART: [afmc] AUTHORITY.KEYID = 5
16,784,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,507,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,508,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,524,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,540,760 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,556,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,578,491 UART: [afmc] --
18,582,137 UART: [cold-reset] --
18,586,854 UART: [state] Locking Datavault
18,591,827 UART: [state] Locking PCR0, PCR1 and PCR31
18,593,474 UART: [state] Locking ICCM
18,594,645 UART: [exit] Launching FMC @ 0x40000130
18,603,056 UART:
18,603,334 UART: Running Caliptra FMC ...
18,604,365 UART:
18,604,514 UART: [state] CFI Enabled
18,666,011 UART: [fht] FMC Alias Private Key: 7
20,429,980 UART: [art] Extend RT PCRs Done
20,431,200 UART: [art] Lock RT PCRs Done
20,432,961 UART: [art] Populate DV Done
20,438,371 UART: [fht] FMC Alias Private Key: 7
20,439,911 UART: [art] Derive CDI
20,440,678 UART: [art] Store in in slot 0x4
20,497,572 UART: [art] Derive Key Pair
20,498,576 UART: [art] Store priv key in slot 0x5
22,961,532 UART: [art] Derive Key Pair - Done
22,974,473 UART: [art] Signing Cert with AUTHO
22,975,798 UART: RITY.KEYID = 7
24,686,749 UART: [art] Erasing AUTHORITY.KEYID = 7
24,688,250 UART: [art] PUB.X = C6B318C68E75EC0A6CA7242F50F370D21319701712024983A8117DBB06A07D5C80A6833F9259B2AF00E1E908C2319980
24,695,496 UART: [art] PUB.Y = 4639E886F5A3A2D00CA4070B2AB8F87901C5316D767A0022D0BF37041F3D59E19C1FD47097EB1BBADE8836E5C931599E
24,702,728 UART: [art] SIG.R = FB355F5799AB149807FA8F68C9B183CB4DF79B584071F27517260FF8935F3A4BD2A3581B0C6FA60B6D8DD27571EB8C6F
24,710,110 UART: [art] SIG.S = 8D7AB8DF2F6CE283A162423A10986AC48FE2281F971F63D9131BB457842E3E7A8FBE2A051D1BFE9A0923AE7438501EBC
25,689,096 UART: Caliptra RT
25,689,801 UART: [state] CFI Enabled
25,854,439 UART: [rt] RT listening for mailbox commands...
25,856,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,887,922 UART: [rt]cmd =0x4d454153, len=108
25,906,518 >>> mbox cmd response data (12 bytes)
25,907,079 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,937,557 UART: [rt]cmd =0x4d454153, len=108
25,955,842 >>> mbox cmd response data (12 bytes)
25,956,278 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,986,920 UART: [rt]cmd =0x4d454153, len=108
26,005,236 >>> mbox cmd response data (12 bytes)
26,005,673 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,036,320 UART: [rt]cmd =0x4d454153, len=108
26,054,793 >>> mbox cmd response data (12 bytes)
26,055,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,086,057 UART: [rt]cmd =0x4d454153, len=108
26,103,965 >>> mbox cmd response data (12 bytes)
26,104,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,134,994 UART: [rt]cmd =0x4d454153, len=108
26,153,418 >>> mbox cmd response data (12 bytes)
26,153,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,184,210 UART: [rt]cmd =0x4d454153, len=108
26,203,250 >>> mbox cmd response data (12 bytes)
26,203,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,234,304 UART: [rt]cmd =0x4d454153, len=108
26,253,733 >>> mbox cmd response data (12 bytes)
26,254,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,284,802 UART: [rt]cmd =0x4d454153, len=108
26,303,008 >>> mbox cmd response data (12 bytes)
26,303,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,334,090 UART: [rt]cmd =0x4d454153, len=108
26,352,257 >>> mbox cmd response data (12 bytes)
26,352,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,383,324 UART: [rt]cmd =0x4d454153, len=108
26,401,690 >>> mbox cmd response data (12 bytes)
26,402,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,432,594 UART: [rt]cmd =0x4d454153, len=108
26,450,449 >>> mbox cmd response data (12 bytes)
26,450,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,481,606 UART: [rt]cmd =0x4d454153, len=108
26,500,915 >>> mbox cmd response data (12 bytes)
26,501,352 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,532,030 UART: [rt]cmd =0x4d454153, len=108
26,551,106 >>> mbox cmd response data (12 bytes)
26,551,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,582,006 UART: [rt]cmd =0x4d454153, len=108
26,600,468 >>> mbox cmd response data (12 bytes)
26,600,927 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,631,625 UART: [rt]cmd =0x4d454153, len=108
26,634,011 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,382,661 ready_for_fw is high
3,383,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,082,929 >>> mbox cmd response: success
18,358,880 UART:
18,359,267 UART: Running Caliptra FMC ...
18,360,382 UART:
18,360,536 UART: [state] CFI Enabled
18,430,596 UART: [fht] FMC Alias Private Key: 7
20,195,239 UART: [art] Extend RT PCRs Done
20,196,466 UART: [art] Lock RT PCRs Done
20,198,280 UART: [art] Populate DV Done
20,203,748 UART: [fht] FMC Alias Private Key: 7
20,205,239 UART: [art] Derive CDI
20,205,973 UART: [art] Store in in slot 0x4
20,263,285 UART: [art] Derive Key Pair
20,264,327 UART: [art] Store priv key in slot 0x5
22,727,196 UART: [art] Derive Key Pair - Done
22,740,355 UART: [art] Signing Cert with AUTHO
22,741,660 UART: RITY.KEYID = 7
24,451,953 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,453 UART: [art] PUB.X = 22921509BD990CF667A04A7A485D92335BEAEE09EF34B70D04B17A24CCC505B8CCDEF2B3CF37A39996C3D0A2FBD418CB
24,460,766 UART: [art] PUB.Y = 8302DFE0D5AD64D50D00364D60495925B31AF805710037F7C8736EAD87A1E75824559B743A1A87DF2A2CE8D605FF7C7B
24,467,930 UART: [art] SIG.R = 0B7F40D0304A0E2CE4123B85192288A9E1E13A589C3E79B75BC33FAB32AD3AC5D24976473327A4E0459AF0AFE1B2671F
24,475,322 UART: [art] SIG.S = 1FA8A02303E9473FBACC60BF1BAF51BF960B2DB435CFFEE646FF7B11420A7562D578E34C6EB73D183F1CF49CAE5CE4B5
25,454,115 UART: Caliptra RT
25,454,829 UART: [state] CFI Enabled
25,619,627 UART: [rt] RT listening for mailbox commands...
25,621,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,652,805 UART: [rt]cmd =0x4d454153, len=108
25,671,542 >>> mbox cmd response data (12 bytes)
25,672,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,702,740 UART: [rt]cmd =0x4d454153, len=108
25,721,242 >>> mbox cmd response data (12 bytes)
25,721,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,752,240 UART: [rt]cmd =0x4d454153, len=108
25,771,588 >>> mbox cmd response data (12 bytes)
25,772,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,802,753 UART: [rt]cmd =0x4d454153, len=108
25,820,798 >>> mbox cmd response data (12 bytes)
25,821,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,851,787 UART: [rt]cmd =0x4d454153, len=108
25,870,647 >>> mbox cmd response data (12 bytes)
25,871,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,901,845 UART: [rt]cmd =0x4d454153, len=108
25,920,492 >>> mbox cmd response data (12 bytes)
25,920,927 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,951,789 UART: [rt]cmd =0x4d454153, len=108
25,970,170 >>> mbox cmd response data (12 bytes)
25,970,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,000,870 UART: [rt]cmd =0x4d454153, len=108
26,019,019 >>> mbox cmd response data (12 bytes)
26,019,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,050,164 UART: [rt]cmd =0x4d454153, len=108
26,068,905 >>> mbox cmd response data (12 bytes)
26,069,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,100,071 UART: [rt]cmd =0x4d454153, len=108
26,118,840 >>> mbox cmd response data (12 bytes)
26,119,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,149,811 UART: [rt]cmd =0x4d454153, len=108
26,168,393 >>> mbox cmd response data (12 bytes)
26,168,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,199,526 UART: [rt]cmd =0x4d454153, len=108
26,217,695 >>> mbox cmd response data (12 bytes)
26,218,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,248,597 UART: [rt]cmd =0x4d454153, len=108
26,268,095 >>> mbox cmd response data (12 bytes)
26,268,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,298,961 UART: [rt]cmd =0x4d454153, len=108
26,317,248 >>> mbox cmd response data (12 bytes)
26,317,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,348,216 UART: [rt]cmd =0x4d454153, len=108
26,367,141 >>> mbox cmd response data (12 bytes)
26,367,562 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,398,488 UART: [rt]cmd =0x4d454153, len=108
26,400,799 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
192,891 UART:
193,259 UART: Running Caliptra ROM ...
194,370 UART:
603,969 UART: [state] CFI Enabled
619,422 UART: [state] LifecycleState = Unprovisioned
621,306 UART: [state] DebugLocked = No
622,681 UART: [state] WD Timer not started. Device not locked for debugging
627,286 UART: [kat] SHA2-256
806,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,952 UART: [kat] ++
818,396 UART: [kat] sha1
828,412 UART: [kat] SHA2-256
831,443 UART: [kat] SHA2-384
836,656 UART: [kat] SHA2-512-ACC
839,663 UART: [kat] ECC-384
3,278,161 UART: [kat] HMAC-384Kdf
3,291,801 UART: [kat] LMS
3,821,275 UART: [kat] --
3,826,368 UART: [cold-reset] ++
3,827,600 UART: [fht] FHT @ 0x50003400
3,839,167 UART: [idev] ++
3,839,768 UART: [idev] CDI.KEYID = 6
3,840,704 UART: [idev] SUBJECT.KEYID = 7
3,841,881 UART: [idev] UDS.KEYID = 0
3,842,805 ready_for_fw is high
3,843,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,311 UART: [idev] Erasing UDS.KEYID = 0
6,312,384 UART: [idev] Sha1 KeyId Algorithm
6,335,488 UART: [idev] --
6,339,537 UART: [ldev] ++
6,340,115 UART: [ldev] CDI.KEYID = 6
6,341,030 UART: [ldev] SUBJECT.KEYID = 5
6,342,196 UART: [ldev] AUTHORITY.KEYID = 7
6,343,479 UART: [ldev] FE.KEYID = 1
6,355,582 UART: [ldev] Erasing FE.KEYID = 1
8,825,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,587,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,273 UART: [ldev] --
10,613,021 UART: [fwproc] Wait for Commands...
10,615,764 UART: [fwproc] Recv command 0x46574c44
10,617,861 UART: [fwproc] Recv'd Img size: 114168 bytes
14,024,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,096,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,165,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,481,734 >>> mbox cmd response: success
14,485,547 UART: [afmc] ++
14,486,138 UART: [afmc] CDI.KEYID = 6
14,487,051 UART: [afmc] SUBJECT.KEYID = 7
14,488,214 UART: [afmc] AUTHORITY.KEYID = 5
16,987,780 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,707,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,811 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,626 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,484 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,848 UART: [afmc] --
18,783,907 UART: [cold-reset] --
18,786,707 UART: [state] Locking Datavault
18,791,141 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,782 UART: [state] Locking ICCM
18,794,854 UART: [exit] Launching FMC @ 0x40000130
18,803,275 UART:
18,803,516 UART: Running Caliptra FMC ...
18,804,618 UART:
18,804,784 UART: [state] CFI Enabled
18,812,884 UART: [fht] FMC Alias Private Key: 7
20,570,018 UART: [art] Extend RT PCRs Done
20,571,239 UART: [art] Lock RT PCRs Done
20,572,906 UART: [art] Populate DV Done
20,578,212 UART: [fht] FMC Alias Private Key: 7
20,579,808 UART: [art] Derive CDI
20,580,629 UART: [art] Store in in slot 0x4
20,623,335 UART: [art] Derive Key Pair
20,624,352 UART: [art] Store priv key in slot 0x5
23,051,506 UART: [art] Derive Key Pair - Done
23,064,454 UART: [art] Signing Cert with AUTHO
23,065,748 UART: RITY.KEYID = 7
24,771,551 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,048 UART: [art] PUB.X = 903D2C1FD61227BE63C602ECB9AE946D3B3954D9A1618E9BC8C296F7B75E7FE57882AD32E2C42C5ACA68B76D6610593C
24,780,354 UART: [art] PUB.Y = A12430B3B4EB2E62569080D01947DEA710451A0628DE76CFB9AAC8E692C90B46243BF4B52056B5752F1C60EDF5343F3E
24,787,594 UART: [art] SIG.R = E0BA864F5EA7DBEFF36191E981BD11A76692E970826873B6F3B7643E4AC0D0ADA4F5BB5241AAAEEA976ECA06CD32BF2C
24,795,029 UART: [art] SIG.S = E9268ABDA04325FA2C529CF6C295D9319E88B69CA96C4D2D6B5AB46C8136630FBD3481D04DB7FAEFE2D83EF45DF6E327
25,773,639 UART: Caliptra RT
25,774,351 UART: [state] CFI Enabled
25,891,573 UART: [rt] RT listening for mailbox commands...
25,893,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,924,799 UART: [rt]cmd =0x4d454153, len=108
25,943,286 >>> mbox cmd response data (12 bytes)
25,943,850 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,974,742 UART: [rt]cmd =0x4d454153, len=108
25,992,976 >>> mbox cmd response data (12 bytes)
25,993,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,024,051 UART: [rt]cmd =0x4d454153, len=108
26,042,611 >>> mbox cmd response data (12 bytes)
26,043,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,073,910 UART: [rt]cmd =0x4d454153, len=108
26,092,226 >>> mbox cmd response data (12 bytes)
26,092,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,123,249 UART: [rt]cmd =0x4d454153, len=108
26,142,018 >>> mbox cmd response data (12 bytes)
26,142,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,173,021 UART: [rt]cmd =0x4d454153, len=108
26,191,597 >>> mbox cmd response data (12 bytes)
26,192,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,222,571 UART: [rt]cmd =0x4d454153, len=108
26,240,927 >>> mbox cmd response data (12 bytes)
26,241,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,272,022 UART: [rt]cmd =0x4d454153, len=108
26,290,733 >>> mbox cmd response data (12 bytes)
26,291,154 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,321,965 UART: [rt]cmd =0x4d454153, len=108
26,340,545 >>> mbox cmd response data (12 bytes)
26,340,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,371,567 UART: [rt]cmd =0x4d454153, len=108
26,390,279 >>> mbox cmd response data (12 bytes)
26,390,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,421,346 UART: [rt]cmd =0x4d454153, len=108
26,440,360 >>> mbox cmd response data (12 bytes)
26,440,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,471,491 UART: [rt]cmd =0x4d454153, len=108
26,490,047 >>> mbox cmd response data (12 bytes)
26,490,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,521,170 UART: [rt]cmd =0x4d454153, len=108
26,539,665 >>> mbox cmd response data (12 bytes)
26,540,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,570,899 UART: [rt]cmd =0x4d454153, len=108
26,590,715 >>> mbox cmd response data (12 bytes)
26,591,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,621,685 UART: [rt]cmd =0x4d454153, len=108
26,640,236 >>> mbox cmd response data (12 bytes)
26,640,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,671,183 UART: [rt]cmd =0x4d454153, len=108
26,673,628 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,091 writing to cptra_bootfsm_go
3,700,019 ready_for_fw is high
3,700,523 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,287,952 >>> mbox cmd response: success
18,537,980 UART:
18,538,377 UART: Running Caliptra FMC ...
18,539,511 UART:
18,539,675 UART: [state] CFI Enabled
18,547,359 UART: [fht] FMC Alias Private Key: 7
20,303,860 UART: [art] Extend RT PCRs Done
20,305,072 UART: [art] Lock RT PCRs Done
20,306,600 UART: [art] Populate DV Done
20,312,008 UART: [fht] FMC Alias Private Key: 7
20,313,704 UART: [art] Derive CDI
20,314,533 UART: [art] Store in in slot 0x4
20,357,401 UART: [art] Derive Key Pair
20,358,419 UART: [art] Store priv key in slot 0x5
22,785,396 UART: [art] Derive Key Pair - Done
22,798,233 UART: [art] Signing Cert with AUTHO
22,799,566 UART: RITY.KEYID = 7
24,505,179 UART: [art] Erasing AUTHORITY.KEYID = 7
24,506,664 UART: [art] PUB.X = E8654993662433A415E7D56C4D33A239C15CC11286147DBE6F8600662D5BF2EA4222489EFD5043B95476D18327ED6763
24,513,900 UART: [art] PUB.Y = 191C5660DCC47287EC229B649F8B7E4946F4388400921BCDBBA249973EBAEB30900F74F74FCCAE2144F0A3E27191D459
24,521,149 UART: [art] SIG.R = B571CB65782D61136F61274DCAE667902F48974E34C75FFCBD8781E9D0B70A99EB86865E53584BAB8FBE80A93679FDDD
24,528,553 UART: [art] SIG.S = A534489007B555FF097A23DF82725FF35AB5330EBB2CD986DF59B9A7C4DD2BB92D218EAEF8F03E753E6F59EEFBEC5E02
25,507,839 UART: Caliptra RT
25,508,556 UART: [state] CFI Enabled
25,625,791 UART: [rt] RT listening for mailbox commands...
25,627,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,658,883 UART: [rt]cmd =0x4d454153, len=108
25,677,627 >>> mbox cmd response data (12 bytes)
25,678,180 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,708,803 UART: [rt]cmd =0x4d454153, len=108
25,727,368 >>> mbox cmd response data (12 bytes)
25,727,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,758,251 UART: [rt]cmd =0x4d454153, len=108
25,777,054 >>> mbox cmd response data (12 bytes)
25,777,496 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,808,200 UART: [rt]cmd =0x4d454153, len=108
25,827,530 >>> mbox cmd response data (12 bytes)
25,827,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,858,513 UART: [rt]cmd =0x4d454153, len=108
25,877,420 >>> mbox cmd response data (12 bytes)
25,877,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,908,559 UART: [rt]cmd =0x4d454153, len=108
25,926,692 >>> mbox cmd response data (12 bytes)
25,927,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,957,899 UART: [rt]cmd =0x4d454153, len=108
25,976,958 >>> mbox cmd response data (12 bytes)
25,977,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,008,204 UART: [rt]cmd =0x4d454153, len=108
26,026,471 >>> mbox cmd response data (12 bytes)
26,026,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,057,759 UART: [rt]cmd =0x4d454153, len=108
26,076,216 >>> mbox cmd response data (12 bytes)
26,076,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,107,274 UART: [rt]cmd =0x4d454153, len=108
26,126,044 >>> mbox cmd response data (12 bytes)
26,126,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,157,015 UART: [rt]cmd =0x4d454153, len=108
26,175,708 >>> mbox cmd response data (12 bytes)
26,176,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,206,725 UART: [rt]cmd =0x4d454153, len=108
26,226,027 >>> mbox cmd response data (12 bytes)
26,226,463 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,257,334 UART: [rt]cmd =0x4d454153, len=108
26,276,669 >>> mbox cmd response data (12 bytes)
26,277,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,307,903 UART: [rt]cmd =0x4d454153, len=108
26,325,541 >>> mbox cmd response data (12 bytes)
26,326,001 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,356,655 UART: [rt]cmd =0x4d454153, len=108
26,375,797 >>> mbox cmd response data (12 bytes)
26,376,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,406,918 UART: [rt]cmd =0x4d454153, len=108
26,409,283 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,997 UART:
192,365 UART: Running Caliptra ROM ...
193,584 UART:
193,763 UART: [state] CFI Enabled
262,303 UART: [state] LifecycleState = Unprovisioned
264,656 UART: [state] DebugLocked = No
267,467 UART: [state] WD Timer not started. Device not locked for debugging
272,928 UART: [kat] SHA2-256
462,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,579 UART: [kat] ++
474,066 UART: [kat] sha1
485,444 UART: [kat] SHA2-256
488,453 UART: [kat] SHA2-384
494,797 UART: [kat] SHA2-512-ACC
497,433 UART: [kat] ECC-384
2,949,699 UART: [kat] HMAC-384Kdf
2,972,458 UART: [kat] LMS
3,504,236 UART: [kat] --
3,509,055 UART: [cold-reset] ++
3,511,707 UART: [fht] FHT @ 0x50003400
3,523,896 UART: [idev] ++
3,524,606 UART: [idev] CDI.KEYID = 6
3,525,643 UART: [idev] SUBJECT.KEYID = 7
3,526,747 UART: [idev] UDS.KEYID = 0
3,527,677 ready_for_fw is high
3,527,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,482 UART: [idev] Erasing UDS.KEYID = 0
6,029,865 UART: [idev] Sha1 KeyId Algorithm
6,053,432 UART: [idev] --
6,056,705 UART: [ldev] ++
6,057,395 UART: [ldev] CDI.KEYID = 6
6,058,286 UART: [ldev] SUBJECT.KEYID = 5
6,059,501 UART: [ldev] AUTHORITY.KEYID = 7
6,060,737 UART: [ldev] FE.KEYID = 1
6,100,765 UART: [ldev] Erasing FE.KEYID = 1
8,607,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,804 UART: [ldev] --
10,412,905 UART: [fwproc] Wait for Commands...
10,415,436 UART: [fwproc] Recv command 0x46574c44
10,417,693 UART: [fwproc] Recv'd Img size: 114168 bytes
13,866,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,609,588 >>> mbox cmd response: success
14,614,430 UART: [afmc] ++
14,615,143 UART: [afmc] CDI.KEYID = 6
14,616,358 UART: [afmc] SUBJECT.KEYID = 7
14,617,805 UART: [afmc] AUTHORITY.KEYID = 5
17,150,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,236 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,461 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,610 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,743 UART: [afmc] --
18,950,051 UART: [cold-reset] --
18,953,554 UART: [state] Locking Datavault
18,957,152 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,311 UART: [state] Locking ICCM
18,961,776 UART: [exit] Launching FMC @ 0x40000130
18,970,460 UART:
18,970,708 UART: Running Caliptra FMC ...
18,971,830 UART:
18,971,989 UART: [state] CFI Enabled
19,031,060 UART: [fht] FMC Alias Private Key: 7
20,795,390 UART: [art] Extend RT PCRs Done
20,796,615 UART: [art] Lock RT PCRs Done
20,798,488 UART: [art] Populate DV Done
20,803,900 UART: [fht] FMC Alias Private Key: 7
20,805,604 UART: [art] Derive CDI
20,806,419 UART: [art] Store in in slot 0x4
20,864,381 UART: [art] Derive Key Pair
20,865,437 UART: [art] Store priv key in slot 0x5
23,328,345 UART: [art] Derive Key Pair - Done
23,341,711 UART: [art] Signing Cert with AUTHO
23,343,012 UART: RITY.KEYID = 7
25,054,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,023 UART: [art] PUB.X = 95DFCF15027B89F1D44860A8B4A026F3A1EB5FC8CB78F7D22C11FAAEC07DAAE8D0D5B138D5853D7D7BCCF3343DFDA021
25,063,311 UART: [art] PUB.Y = 2B928977E7AD692DD626AF6605716C2D5241D8A41CB2EDB3C6076B008991BB50D05651C27FBF4D4B8467DA11414FB770
25,070,511 UART: [art] SIG.R = 80B3ADCF82379A6FEAA2EB9D0AA30551AD5AC7D8A8688B32017F1E78449F4BB76475E39E8B4D5205E379AF56FD4669C2
25,077,933 UART: [art] SIG.S = 6C38CD991E53EEAF26A2B9EC6D53E72159DE4A3FED7EC1377519C162AA62CE672743C82BFA76EC62AC0B3A38298799EB
26,056,965 UART: Caliptra RT
26,057,660 UART: [state] CFI Enabled
26,222,459 UART: [rt] RT listening for mailbox commands...
26,224,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,255,473 UART: [rt]cmd =0x4d454153, len=108
26,273,676 >>> mbox cmd response data (12 bytes)
26,274,243 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,304,862 UART: [rt]cmd =0x4d454153, len=108
26,322,376 >>> mbox cmd response data (12 bytes)
26,322,807 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,353,560 UART: [rt]cmd =0x4d454153, len=108
26,371,578 >>> mbox cmd response data (12 bytes)
26,372,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,402,494 UART: [rt]cmd =0x4d454153, len=108
26,421,264 >>> mbox cmd response data (12 bytes)
26,421,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,452,126 UART: [rt]cmd =0x4d454153, len=108
26,470,708 >>> mbox cmd response data (12 bytes)
26,471,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,501,604 UART: [rt]cmd =0x4d454153, len=108
26,519,834 >>> mbox cmd response data (12 bytes)
26,520,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,550,750 UART: [rt]cmd =0x4d454153, len=108
26,569,271 >>> mbox cmd response data (12 bytes)
26,569,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,600,345 UART: [rt]cmd =0x4d454153, len=108
26,618,846 >>> mbox cmd response data (12 bytes)
26,619,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,649,842 UART: [rt]cmd =0x4d454153, len=108
26,667,924 >>> mbox cmd response data (12 bytes)
26,668,342 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,698,832 UART: [rt]cmd =0x4d454153, len=108
26,717,356 >>> mbox cmd response data (12 bytes)
26,717,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,748,538 UART: [rt]cmd =0x4d454153, len=108
26,767,730 >>> mbox cmd response data (12 bytes)
26,768,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,798,954 UART: [rt]cmd =0x4d454153, len=108
26,817,705 >>> mbox cmd response data (12 bytes)
26,818,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,848,788 UART: [rt]cmd =0x4d454153, len=108
26,867,475 >>> mbox cmd response data (12 bytes)
26,867,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,898,498 UART: [rt]cmd =0x4d454153, len=108
26,917,642 >>> mbox cmd response data (12 bytes)
26,918,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,948,667 UART: [rt]cmd =0x4d454153, len=108
26,967,367 >>> mbox cmd response data (12 bytes)
26,967,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,998,177 UART: [rt]cmd =0x4d454153, len=108
27,000,344 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,440,519 ready_for_fw is high
3,440,907 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,734,994 >>> mbox cmd response: success
19,050,353 UART:
19,050,753 UART: Running Caliptra FMC ...
19,051,894 UART:
19,052,063 UART: [state] CFI Enabled
19,116,839 UART: [fht] FMC Alias Private Key: 7
20,880,653 UART: [art] Extend RT PCRs Done
20,881,881 UART: [art] Lock RT PCRs Done
20,883,782 UART: [art] Populate DV Done
20,889,359 UART: [fht] FMC Alias Private Key: 7
20,891,008 UART: [art] Derive CDI
20,891,834 UART: [art] Store in in slot 0x4
20,949,647 UART: [art] Derive Key Pair
20,950,712 UART: [art] Store priv key in slot 0x5
23,413,703 UART: [art] Derive Key Pair - Done
23,426,610 UART: [art] Signing Cert with AUTHO
23,427,916 UART: RITY.KEYID = 7
25,139,506 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,029 UART: [art] PUB.X = 8F96F7F21DC527EAE88BD53B969AC9FD5A2F2EE7874D2DE86D2DF89DD2C91A00C8FE7B944351B25012D29082A4F4BD86
25,148,302 UART: [art] PUB.Y = 1944A7E701563B2999D24E074D1BD178D1676F1D48FCCC1AAFE7553B2CF5EDF2FDD7B81B3D9C77BF7E9E9E69809CD2B7
25,155,548 UART: [art] SIG.R = 1E6899B9026C419CABEFE2F001064E4818204D166194287C3EC9A5B133FFE252510DA72E85B93DA7387BC064D38B9CBA
25,162,938 UART: [art] SIG.S = 070B1B1FEDD451C3FEB14935DC153C40BCE15DEBA4902A4A2F838C7733B61F5D4ECABEB59BDA46BEC7414CEAEA4E28E4
26,142,025 UART: Caliptra RT
26,142,722 UART: [state] CFI Enabled
26,308,571 UART: [rt] RT listening for mailbox commands...
26,310,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,341,719 UART: [rt]cmd =0x4d454153, len=108
26,360,591 >>> mbox cmd response data (12 bytes)
26,361,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,392,069 UART: [rt]cmd =0x4d454153, len=108
26,410,853 >>> mbox cmd response data (12 bytes)
26,411,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,441,911 UART: [rt]cmd =0x4d454153, len=108
26,460,284 >>> mbox cmd response data (12 bytes)
26,460,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,491,266 UART: [rt]cmd =0x4d454153, len=108
26,509,801 >>> mbox cmd response data (12 bytes)
26,510,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,540,815 UART: [rt]cmd =0x4d454153, len=108
26,560,179 >>> mbox cmd response data (12 bytes)
26,560,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,591,485 UART: [rt]cmd =0x4d454153, len=108
26,610,390 >>> mbox cmd response data (12 bytes)
26,610,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,641,414 UART: [rt]cmd =0x4d454153, len=108
26,660,084 >>> mbox cmd response data (12 bytes)
26,660,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,691,432 UART: [rt]cmd =0x4d454153, len=108
26,710,231 >>> mbox cmd response data (12 bytes)
26,710,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,741,146 UART: [rt]cmd =0x4d454153, len=108
26,759,839 >>> mbox cmd response data (12 bytes)
26,760,295 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,790,883 UART: [rt]cmd =0x4d454153, len=108
26,809,163 >>> mbox cmd response data (12 bytes)
26,809,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,840,076 UART: [rt]cmd =0x4d454153, len=108
26,858,821 >>> mbox cmd response data (12 bytes)
26,859,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,890,060 UART: [rt]cmd =0x4d454153, len=108
26,908,214 >>> mbox cmd response data (12 bytes)
26,908,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,939,264 UART: [rt]cmd =0x4d454153, len=108
26,958,635 >>> mbox cmd response data (12 bytes)
26,959,063 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,989,676 UART: [rt]cmd =0x4d454153, len=108
27,008,694 >>> mbox cmd response data (12 bytes)
27,009,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,039,900 UART: [rt]cmd =0x4d454153, len=108
27,058,994 >>> mbox cmd response data (12 bytes)
27,059,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,089,917 UART: [rt]cmd =0x4d454153, len=108
27,092,177 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,750 writing to cptra_bootfsm_go
193,024 UART:
193,386 UART: Running Caliptra ROM ...
194,523 UART:
604,219 UART: [state] CFI Enabled
616,267 UART: [state] LifecycleState = Unprovisioned
618,638 UART: [state] DebugLocked = No
620,329 UART: [state] WD Timer not started. Device not locked for debugging
625,791 UART: [kat] SHA2-256
815,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,499 UART: [kat] ++
826,977 UART: [kat] sha1
837,426 UART: [kat] SHA2-256
840,442 UART: [kat] SHA2-384
846,079 UART: [kat] SHA2-512-ACC
848,665 UART: [kat] ECC-384
3,292,330 UART: [kat] HMAC-384Kdf
3,306,268 UART: [kat] LMS
3,838,102 UART: [kat] --
3,841,593 UART: [cold-reset] ++
3,843,879 UART: [fht] FHT @ 0x50003400
3,856,350 UART: [idev] ++
3,856,992 UART: [idev] CDI.KEYID = 6
3,858,041 UART: [idev] SUBJECT.KEYID = 7
3,859,148 UART: [idev] UDS.KEYID = 0
3,860,071 ready_for_fw is high
3,860,273 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,662 UART: [idev] Erasing UDS.KEYID = 0
6,333,792 UART: [idev] Sha1 KeyId Algorithm
6,355,358 UART: [idev] --
6,359,488 UART: [ldev] ++
6,360,169 UART: [ldev] CDI.KEYID = 6
6,361,107 UART: [ldev] SUBJECT.KEYID = 5
6,362,263 UART: [ldev] AUTHORITY.KEYID = 7
6,363,498 UART: [ldev] FE.KEYID = 1
6,375,143 UART: [ldev] Erasing FE.KEYID = 1
8,849,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,509 UART: [ldev] --
10,642,420 UART: [fwproc] Wait for Commands...
10,645,210 UART: [fwproc] Recv command 0x46574c44
10,647,460 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,110 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,833,602 >>> mbox cmd response: success
14,837,202 UART: [afmc] ++
14,837,913 UART: [afmc] CDI.KEYID = 6
14,839,108 UART: [afmc] SUBJECT.KEYID = 7
14,840,545 UART: [afmc] AUTHORITY.KEYID = 5
17,344,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,327 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,448 UART: [afmc] --
19,141,525 UART: [cold-reset] --
19,144,092 UART: [state] Locking Datavault
19,149,549 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,698 UART: [state] Locking ICCM
19,153,618 UART: [exit] Launching FMC @ 0x40000130
19,162,288 UART:
19,162,522 UART: Running Caliptra FMC ...
19,163,622 UART:
19,163,780 UART: [state] CFI Enabled
19,171,990 UART: [fht] FMC Alias Private Key: 7
20,928,247 UART: [art] Extend RT PCRs Done
20,929,485 UART: [art] Lock RT PCRs Done
20,930,974 UART: [art] Populate DV Done
20,936,600 UART: [fht] FMC Alias Private Key: 7
20,938,243 UART: [art] Derive CDI
20,938,980 UART: [art] Store in in slot 0x4
20,981,459 UART: [art] Derive Key Pair
20,982,460 UART: [art] Store priv key in slot 0x5
23,409,761 UART: [art] Derive Key Pair - Done
23,422,322 UART: [art] Signing Cert with AUTHO
23,423,625 UART: RITY.KEYID = 7
25,129,157 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,649 UART: [art] PUB.X = FEBD561E0C6FB7916E6F11478BA723EDD55E4827D24E07CE036FF0F77DC270C3D8D015DAEDFBD15C3C809678F2A334BD
25,137,946 UART: [art] PUB.Y = C6CE5C7117581BDEB74F7132539A1739855E818CE5AD9A8C810224EC8417C6AA967EE337D15E7A88E91DED48EC6490A9
25,145,371 UART: [art] SIG.R = FD68B5EDF53E82BF9CB1745FF915E22E0A3E64421144644318379B556605924105077559F3E01628B2A0924961EF8725
25,152,611 UART: [art] SIG.S = D4006CC8E5320ADD78B19A0CFB03ADA9ED3E57E1AB17EDC0004E86BBB0F2FAA4ADC1E4B6A4FD1F59B366A5E28F165855
26,132,014 UART: Caliptra RT
26,132,744 UART: [state] CFI Enabled
26,250,181 UART: [rt] RT listening for mailbox commands...
26,252,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,283,291 UART: [rt]cmd =0x4d454153, len=108
26,301,399 >>> mbox cmd response data (12 bytes)
26,301,952 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,332,503 UART: [rt]cmd =0x4d454153, len=108
26,350,418 >>> mbox cmd response data (12 bytes)
26,350,886 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,381,526 UART: [rt]cmd =0x4d454153, len=108
26,400,405 >>> mbox cmd response data (12 bytes)
26,400,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,431,352 UART: [rt]cmd =0x4d454153, len=108
26,449,185 >>> mbox cmd response data (12 bytes)
26,449,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,480,382 UART: [rt]cmd =0x4d454153, len=108
26,499,053 >>> mbox cmd response data (12 bytes)
26,499,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,530,403 UART: [rt]cmd =0x4d454153, len=108
26,549,416 >>> mbox cmd response data (12 bytes)
26,549,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,580,496 UART: [rt]cmd =0x4d454153, len=108
26,599,751 >>> mbox cmd response data (12 bytes)
26,600,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,630,806 UART: [rt]cmd =0x4d454153, len=108
26,649,735 >>> mbox cmd response data (12 bytes)
26,650,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,680,802 UART: [rt]cmd =0x4d454153, len=108
26,699,489 >>> mbox cmd response data (12 bytes)
26,699,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,730,514 UART: [rt]cmd =0x4d454153, len=108
26,749,717 >>> mbox cmd response data (12 bytes)
26,750,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,781,010 UART: [rt]cmd =0x4d454153, len=108
26,799,077 >>> mbox cmd response data (12 bytes)
26,799,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,830,219 UART: [rt]cmd =0x4d454153, len=108
26,849,016 >>> mbox cmd response data (12 bytes)
26,849,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,879,951 UART: [rt]cmd =0x4d454153, len=108
26,898,071 >>> mbox cmd response data (12 bytes)
26,898,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,928,987 UART: [rt]cmd =0x4d454153, len=108
26,946,919 >>> mbox cmd response data (12 bytes)
26,947,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,977,889 UART: [rt]cmd =0x4d454153, len=108
26,996,016 >>> mbox cmd response data (12 bytes)
26,996,480 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,027,098 UART: [rt]cmd =0x4d454153, len=108
27,029,603 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,685 writing to cptra_bootfsm_go
3,756,433 ready_for_fw is high
3,756,844 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,778 >>> mbox cmd response: success
19,195,786 UART:
19,196,201 UART: Running Caliptra FMC ...
19,197,309 UART:
19,197,468 UART: [state] CFI Enabled
19,205,428 UART: [fht] FMC Alias Private Key: 7
20,962,007 UART: [art] Extend RT PCRs Done
20,963,232 UART: [art] Lock RT PCRs Done
20,964,828 UART: [art] Populate DV Done
20,970,136 UART: [fht] FMC Alias Private Key: 7
20,971,731 UART: [art] Derive CDI
20,972,543 UART: [art] Store in in slot 0x4
21,015,006 UART: [art] Derive Key Pair
21,016,050 UART: [art] Store priv key in slot 0x5
23,442,796 UART: [art] Derive Key Pair - Done
23,455,684 UART: [art] Signing Cert with AUTHO
23,457,007 UART: RITY.KEYID = 7
25,162,057 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,563 UART: [art] PUB.X = 94AC07E2F6683638F108DF26EC79B0963233511D7CCE56286B0D40A5001E13C664A7A7F483C6D3BB36594A110737EBB3
25,170,815 UART: [art] PUB.Y = DDFB6B36E4B8113BEF5DA9AEF951F4F1E30D0C794E4F5D2352691A539F3BEDDA6FB402465EDB603B29B40A2BEF63AB66
25,178,056 UART: [art] SIG.R = 91CF871E94285274A4ABFE919F106D51A3889F463EC701A578424E850C32DA1850E86FA6F4C98323BC23DE9D566AA822
25,185,448 UART: [art] SIG.S = D4C0C6A0CB3600F5188BD0FD35BCDBA4D023FF3367DD6926E8C9882E2F868091CBCFC75F26D6C9024C034E1A0D6A4C5C
26,163,944 UART: Caliptra RT
26,164,629 UART: [state] CFI Enabled
26,281,703 UART: [rt] RT listening for mailbox commands...
26,283,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,315,017 UART: [rt]cmd =0x4d454153, len=108
26,333,645 >>> mbox cmd response data (12 bytes)
26,334,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,364,988 UART: [rt]cmd =0x4d454153, len=108
26,383,366 >>> mbox cmd response data (12 bytes)
26,383,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,414,484 UART: [rt]cmd =0x4d454153, len=108
26,433,225 >>> mbox cmd response data (12 bytes)
26,433,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,464,524 UART: [rt]cmd =0x4d454153, len=108
26,483,215 >>> mbox cmd response data (12 bytes)
26,483,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,514,427 UART: [rt]cmd =0x4d454153, len=108
26,532,952 >>> mbox cmd response data (12 bytes)
26,533,388 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,564,035 UART: [rt]cmd =0x4d454153, len=108
26,582,268 >>> mbox cmd response data (12 bytes)
26,582,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,613,287 UART: [rt]cmd =0x4d454153, len=108
26,632,243 >>> mbox cmd response data (12 bytes)
26,632,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,663,375 UART: [rt]cmd =0x4d454153, len=108
26,682,116 >>> mbox cmd response data (12 bytes)
26,682,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,713,169 UART: [rt]cmd =0x4d454153, len=108
26,731,180 >>> mbox cmd response data (12 bytes)
26,731,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,762,176 UART: [rt]cmd =0x4d454153, len=108
26,781,083 >>> mbox cmd response data (12 bytes)
26,781,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,812,171 UART: [rt]cmd =0x4d454153, len=108
26,830,348 >>> mbox cmd response data (12 bytes)
26,830,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,861,534 UART: [rt]cmd =0x4d454153, len=108
26,880,736 >>> mbox cmd response data (12 bytes)
26,881,164 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,911,822 UART: [rt]cmd =0x4d454153, len=108
26,930,027 >>> mbox cmd response data (12 bytes)
26,930,480 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,961,126 UART: [rt]cmd =0x4d454153, len=108
26,979,349 >>> mbox cmd response data (12 bytes)
26,979,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,010,204 UART: [rt]cmd =0x4d454153, len=108
27,028,136 >>> mbox cmd response data (12 bytes)
27,028,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,059,220 UART: [rt]cmd =0x4d454153, len=108
27,061,554 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
894,984 UART: [kat] SHA2-512-ACC
896,885 UART: [kat] ECC-384
902,622 UART: [kat] HMAC-384Kdf
907,004 UART: [kat] LMS
1,475,200 UART: [kat] --
1,476,095 UART: [cold-reset] ++
1,476,643 UART: [fht] Storing FHT @ 0x50003400
1,479,408 UART: [idev] ++
1,479,576 UART: [idev] CDI.KEYID = 6
1,479,936 UART: [idev] SUBJECT.KEYID = 7
1,480,360 UART: [idev] UDS.KEYID = 0
1,480,705 ready_for_fw is high
1,480,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,294 UART: [idev] Erasing UDS.KEYID = 0
1,505,032 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,650 UART: [idev] --
1,514,565 UART: [ldev] ++
1,514,733 UART: [ldev] CDI.KEYID = 6
1,515,096 UART: [ldev] SUBJECT.KEYID = 5
1,515,522 UART: [ldev] AUTHORITY.KEYID = 7
1,515,985 UART: [ldev] FE.KEYID = 1
1,521,111 UART: [ldev] Erasing FE.KEYID = 1
1,546,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,660 UART: [ldev] --
1,586,085 UART: [fwproc] Waiting for Commands...
1,586,928 UART: [fwproc] Received command 0x46574c44
1,587,719 UART: [fwproc] Received Image of size 114168 bytes
2,884,695 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,495 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,847 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,502 >>> mbox cmd response: success
3,078,718 UART: [afmc] ++
3,078,886 UART: [afmc] CDI.KEYID = 6
3,079,248 UART: [afmc] SUBJECT.KEYID = 7
3,079,673 UART: [afmc] AUTHORITY.KEYID = 5
3,115,276 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,722 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,502 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,115 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,805 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,728 UART: [afmc] --
3,158,606 UART: [cold-reset] --
3,159,356 UART: [state] Locking Datavault
3,160,775 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,379 UART: [state] Locking ICCM
3,161,901 UART: [exit] Launching FMC @ 0x40000130
3,167,230 UART:
3,167,246 UART: Running Caliptra FMC ...
3,167,654 UART:
3,167,708 UART: [state] CFI Enabled
3,178,411 UART: [fht] FMC Alias Private Key: 7
3,286,034 UART: [art] Extend RT PCRs Done
3,286,462 UART: [art] Lock RT PCRs Done
3,287,900 UART: [art] Populate DV Done
3,296,361 UART: [fht] FMC Alias Private Key: 7
3,297,541 UART: [art] Derive CDI
3,297,821 UART: [art] Store in in slot 0x4
3,383,382 UART: [art] Derive Key Pair
3,383,742 UART: [art] Store priv key in slot 0x5
3,396,684 UART: [art] Derive Key Pair - Done
3,411,306 UART: [art] Signing Cert with AUTHO
3,411,786 UART: RITY.KEYID = 7
3,427,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,841 UART: [art] PUB.X = 7D68C34013E65832FDB6B367CA67746FC6C554475C6B7F024B63CF99CA7753CF454A90B146BAD518C7781FD2199F8BD2
3,434,612 UART: [art] PUB.Y = 008A00C14D37F8FCB2966026C3B7A9839CF28D788436828ED3EEA4D22065315F46A17A8146AE9CA43F90EEE7313F712D
3,441,520 UART: [art] SIG.R = 47BEB9E2C6B3E38DC37A270AC3F4C9A1192B3BDB86D040B0DAF353DE71A80135012BD5DB4573A317395E958085AD5A23
3,448,291 UART: [art] SIG.S = AE07938E9420D07A0FA110F56DCDBAC50EE37A9CE0BEF26C1E9DBED1F3125022BF755B3BA883BDD6F6774BA85E385353
3,472,271 UART: Caliptra RT
3,472,524 UART: [state] CFI Enabled
3,581,157 UART: [rt] RT listening for mailbox commands...
3,581,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,133 UART: [rt]cmd =0x4d454153, len=108
3,632,770 >>> mbox cmd response data (12 bytes)
3,632,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,832 UART: [rt]cmd =0x4d454153, len=108
3,683,327 >>> mbox cmd response data (12 bytes)
3,683,328 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,147 UART: [rt]cmd =0x4d454153, len=108
3,733,824 >>> mbox cmd response data (12 bytes)
3,733,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,906 UART: [rt]cmd =0x4d454153, len=108
3,784,749 >>> mbox cmd response data (12 bytes)
3,784,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,603 UART: [rt]cmd =0x4d454153, len=108
3,834,914 >>> mbox cmd response data (12 bytes)
3,834,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,032 UART: [rt]cmd =0x4d454153, len=108
3,886,189 >>> mbox cmd response data (12 bytes)
3,886,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,285 UART: [rt]cmd =0x4d454153, len=108
3,937,050 >>> mbox cmd response data (12 bytes)
3,937,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,967,040 UART: [rt]cmd =0x4d454153, len=108
3,988,333 >>> mbox cmd response data (12 bytes)
3,988,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,559 UART: [rt]cmd =0x4d454153, len=108
4,039,340 >>> mbox cmd response data (12 bytes)
4,039,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,069,104 UART: [rt]cmd =0x4d454153, len=108
4,089,335 >>> mbox cmd response data (12 bytes)
4,089,336 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,119,387 UART: [rt]cmd =0x4d454153, len=108
4,139,610 >>> mbox cmd response data (12 bytes)
4,139,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,676 UART: [rt]cmd =0x4d454153, len=108
4,190,057 >>> mbox cmd response data (12 bytes)
4,190,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,220,051 UART: [rt]cmd =0x4d454153, len=108
4,240,538 >>> mbox cmd response data (12 bytes)
4,240,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,662 UART: [rt]cmd =0x4d454153, len=108
4,291,601 >>> mbox cmd response data (12 bytes)
4,291,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,321,659 UART: [rt]cmd =0x4d454153, len=108
4,342,318 >>> mbox cmd response data (12 bytes)
4,342,319 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,210 UART: [rt]cmd =0x4d454153, len=108
4,374,294 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,321 ready_for_fw is high
1,363,321 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,432 >>> mbox cmd response: success
2,988,950 UART:
2,988,966 UART: Running Caliptra FMC ...
2,989,374 UART:
2,989,428 UART: [state] CFI Enabled
2,999,815 UART: [fht] FMC Alias Private Key: 7
3,107,848 UART: [art] Extend RT PCRs Done
3,108,276 UART: [art] Lock RT PCRs Done
3,109,772 UART: [art] Populate DV Done
3,117,925 UART: [fht] FMC Alias Private Key: 7
3,118,985 UART: [art] Derive CDI
3,119,265 UART: [art] Store in in slot 0x4
3,205,144 UART: [art] Derive Key Pair
3,205,504 UART: [art] Store priv key in slot 0x5
3,218,652 UART: [art] Derive Key Pair - Done
3,233,305 UART: [art] Signing Cert with AUTHO
3,233,785 UART: RITY.KEYID = 7
3,248,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,448 UART: [art] PUB.X = 578C1389062219E4CC47CAE72F4E92726BB5E5897DDA6F3C9F226FC43D08F3C3AB8DC5327648244580ACB56741318754
3,256,210 UART: [art] PUB.Y = B06657EF6B7E0C6531587FF1A48BD6D573574C38FD641BA61439E4486CB4C519AAF1A2E521AFAC0E0E8BFF9DB22AF3DF
3,263,171 UART: [art] SIG.R = 4A62D250CD73043A2F79063905D23FAF6FC78AD2BCB62D53432B6A3B04780568929FA1CE50D51237EFFDE43AC9F84F7F
3,269,936 UART: [art] SIG.S = 41576EAB25F321A414318E1155F508B587CC35E38635D3CA0CBC13AAE17931F64A46B9FB41594904080290D5B4E3843B
3,294,430 UART: Caliptra RT
3,294,683 UART: [state] CFI Enabled
3,401,995 UART: [rt] RT listening for mailbox commands...
3,402,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,037 UART: [rt]cmd =0x4d454153, len=108
3,453,752 >>> mbox cmd response data (12 bytes)
3,453,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,728 UART: [rt]cmd =0x4d454153, len=108
3,504,665 >>> mbox cmd response data (12 bytes)
3,504,666 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,534,739 UART: [rt]cmd =0x4d454153, len=108
3,555,398 >>> mbox cmd response data (12 bytes)
3,555,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,184 UART: [rt]cmd =0x4d454153, len=108
3,604,919 >>> mbox cmd response data (12 bytes)
3,604,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,911 UART: [rt]cmd =0x4d454153, len=108
3,654,326 >>> mbox cmd response data (12 bytes)
3,654,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,482 UART: [rt]cmd =0x4d454153, len=108
3,705,309 >>> mbox cmd response data (12 bytes)
3,705,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,349 UART: [rt]cmd =0x4d454153, len=108
3,756,650 >>> mbox cmd response data (12 bytes)
3,756,651 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,748 UART: [rt]cmd =0x4d454153, len=108
3,807,793 >>> mbox cmd response data (12 bytes)
3,807,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,831 UART: [rt]cmd =0x4d454153, len=108
3,858,924 >>> mbox cmd response data (12 bytes)
3,858,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,824 UART: [rt]cmd =0x4d454153, len=108
3,909,649 >>> mbox cmd response data (12 bytes)
3,909,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,633 UART: [rt]cmd =0x4d454153, len=108
3,960,652 >>> mbox cmd response data (12 bytes)
3,960,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,772 UART: [rt]cmd =0x4d454153, len=108
4,011,945 >>> mbox cmd response data (12 bytes)
4,011,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,041,879 UART: [rt]cmd =0x4d454153, len=108
4,062,984 >>> mbox cmd response data (12 bytes)
4,062,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,093,220 UART: [rt]cmd =0x4d454153, len=108
4,113,467 >>> mbox cmd response data (12 bytes)
4,113,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,605 UART: [rt]cmd =0x4d454153, len=108
4,163,936 >>> mbox cmd response data (12 bytes)
4,163,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,234 UART: [rt]cmd =0x4d454153, len=108
4,195,916 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,860 UART: [kat] SHA2-256
882,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,906 UART: [kat] ++
887,058 UART: [kat] sha1
891,200 UART: [kat] SHA2-256
893,138 UART: [kat] SHA2-384
895,969 UART: [kat] SHA2-512-ACC
897,870 UART: [kat] ECC-384
903,431 UART: [kat] HMAC-384Kdf
908,159 UART: [kat] LMS
1,476,355 UART: [kat] --
1,476,976 UART: [cold-reset] ++
1,477,332 UART: [fht] Storing FHT @ 0x50003400
1,480,089 UART: [idev] ++
1,480,257 UART: [idev] CDI.KEYID = 6
1,480,617 UART: [idev] SUBJECT.KEYID = 7
1,481,041 UART: [idev] UDS.KEYID = 0
1,481,386 ready_for_fw is high
1,481,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,149 UART: [idev] Erasing UDS.KEYID = 0
1,505,811 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,421 UART: [idev] --
1,515,420 UART: [ldev] ++
1,515,588 UART: [ldev] CDI.KEYID = 6
1,515,951 UART: [ldev] SUBJECT.KEYID = 5
1,516,377 UART: [ldev] AUTHORITY.KEYID = 7
1,516,840 UART: [ldev] FE.KEYID = 1
1,522,350 UART: [ldev] Erasing FE.KEYID = 1
1,548,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,249 UART: [ldev] --
1,587,744 UART: [fwproc] Waiting for Commands...
1,588,599 UART: [fwproc] Received command 0x46574c44
1,589,390 UART: [fwproc] Received Image of size 114168 bytes
2,886,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,914,948 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,944,300 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,079,897 >>> mbox cmd response: success
3,080,957 UART: [afmc] ++
3,081,125 UART: [afmc] CDI.KEYID = 6
3,081,487 UART: [afmc] SUBJECT.KEYID = 7
3,081,912 UART: [afmc] AUTHORITY.KEYID = 5
3,116,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,629 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,409 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,137 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,022 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,712 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,753 UART: [afmc] --
3,159,693 UART: [cold-reset] --
3,160,689 UART: [state] Locking Datavault
3,161,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,316 UART: [state] Locking ICCM
3,162,738 UART: [exit] Launching FMC @ 0x40000130
3,168,067 UART:
3,168,083 UART: Running Caliptra FMC ...
3,168,491 UART:
3,168,634 UART: [state] CFI Enabled
3,179,623 UART: [fht] FMC Alias Private Key: 7
3,287,734 UART: [art] Extend RT PCRs Done
3,288,162 UART: [art] Lock RT PCRs Done
3,289,562 UART: [art] Populate DV Done
3,297,789 UART: [fht] FMC Alias Private Key: 7
3,298,927 UART: [art] Derive CDI
3,299,207 UART: [art] Store in in slot 0x4
3,384,652 UART: [art] Derive Key Pair
3,385,012 UART: [art] Store priv key in slot 0x5
3,398,482 UART: [art] Derive Key Pair - Done
3,413,040 UART: [art] Signing Cert with AUTHO
3,413,520 UART: RITY.KEYID = 7
3,428,468 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,233 UART: [art] PUB.X = 58259989BEE38D402C11F95D6A5DEEB177301D0979F7A9235D164A4C47761475E9AD5F089F97F2828518570ACCC4E0FB
3,435,994 UART: [art] PUB.Y = 4023D45051FF0B78FE8214A4B56248F8F3C58D71F18DEF4213FD73AF0F5A7D30CDC770E92C2FBE6BD6DAC2DF59BD6C4F
3,442,960 UART: [art] SIG.R = 03984B2CA11E25F50B194C319B6FFB3809810FC412344C134A04D4BD94FFF6D5A2D4CB37DD1A54BD57A76F9D4AE266FB
3,449,729 UART: [art] SIG.S = 3787D8C12B830C7A5A7B5270F777DFA2BB1BFE8A33CAE38A00025D5C1BC091B087BFBB46FCA2F65205C1ECC040AEA20D
3,473,014 UART: Caliptra RT
3,473,359 UART: [state] CFI Enabled
3,582,635 UART: [rt] RT listening for mailbox commands...
3,583,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,717 UART: [rt]cmd =0x4d454153, len=108
3,634,834 >>> mbox cmd response data (12 bytes)
3,634,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,872 UART: [rt]cmd =0x4d454153, len=108
3,686,081 >>> mbox cmd response data (12 bytes)
3,686,082 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,047 UART: [rt]cmd =0x4d454153, len=108
3,736,464 >>> mbox cmd response data (12 bytes)
3,736,465 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,670 UART: [rt]cmd =0x4d454153, len=108
3,787,489 >>> mbox cmd response data (12 bytes)
3,787,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,549 UART: [rt]cmd =0x4d454153, len=108
3,838,360 >>> mbox cmd response data (12 bytes)
3,838,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,294 UART: [rt]cmd =0x4d454153, len=108
3,887,901 >>> mbox cmd response data (12 bytes)
3,887,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,937 UART: [rt]cmd =0x4d454153, len=108
3,938,146 >>> mbox cmd response data (12 bytes)
3,938,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,306 UART: [rt]cmd =0x4d454153, len=108
3,989,667 >>> mbox cmd response data (12 bytes)
3,989,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,587 UART: [rt]cmd =0x4d454153, len=108
4,038,988 >>> mbox cmd response data (12 bytes)
4,038,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,968 UART: [rt]cmd =0x4d454153, len=108
4,090,011 >>> mbox cmd response data (12 bytes)
4,090,012 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,135 UART: [rt]cmd =0x4d454153, len=108
4,141,296 >>> mbox cmd response data (12 bytes)
4,141,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,171,280 UART: [rt]cmd =0x4d454153, len=108
4,191,819 >>> mbox cmd response data (12 bytes)
4,191,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,955 UART: [rt]cmd =0x4d454153, len=108
4,243,172 >>> mbox cmd response data (12 bytes)
4,243,173 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,273,432 UART: [rt]cmd =0x4d454153, len=108
4,294,943 >>> mbox cmd response data (12 bytes)
4,294,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,324,723 UART: [rt]cmd =0x4d454153, len=108
4,346,228 >>> mbox cmd response data (12 bytes)
4,346,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,376,568 UART: [rt]cmd =0x4d454153, len=108
4,378,566 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,032 ready_for_fw is high
1,363,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,819 >>> mbox cmd response: success
2,989,641 UART:
2,989,657 UART: Running Caliptra FMC ...
2,990,065 UART:
2,990,208 UART: [state] CFI Enabled
3,000,643 UART: [fht] FMC Alias Private Key: 7
3,108,400 UART: [art] Extend RT PCRs Done
3,108,828 UART: [art] Lock RT PCRs Done
3,110,444 UART: [art] Populate DV Done
3,118,775 UART: [fht] FMC Alias Private Key: 7
3,119,815 UART: [art] Derive CDI
3,120,095 UART: [art] Store in in slot 0x4
3,205,478 UART: [art] Derive Key Pair
3,205,838 UART: [art] Store priv key in slot 0x5
3,219,370 UART: [art] Derive Key Pair - Done
3,234,272 UART: [art] Signing Cert with AUTHO
3,234,752 UART: RITY.KEYID = 7
3,250,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,859 UART: [art] PUB.X = 602A465BB0811EE971E876EBB53689ED528E29AFAF262E3EC99D3E906DCB0F9E3F139B73C0159BEF9ECC8538880E7392
3,257,633 UART: [art] PUB.Y = 948E22372EFF9E136424CDF2FB51CE44D27B8EAC09EEE7A3A25F598AA71AE12548483C8AB44EACC04BA7B68A77CC3EC0
3,264,602 UART: [art] SIG.R = 969721ED47DEF89D586DDE90B6A0FF1B1FA4111C5B326857742041092B74832B59C00C5D5416C4259624BE08603663A0
3,271,355 UART: [art] SIG.S = 465C68F52EB0CC2502C68CD6E2DA6249F2166F813194294ECFE6DFB92829CDAD82A64EEBC578EE7AF5708613C49307D2
3,295,224 UART: Caliptra RT
3,295,569 UART: [state] CFI Enabled
3,402,594 UART: [rt] RT listening for mailbox commands...
3,403,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,694 UART: [rt]cmd =0x4d454153, len=108
3,455,031 >>> mbox cmd response data (12 bytes)
3,455,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,273 UART: [rt]cmd =0x4d454153, len=108
3,505,234 >>> mbox cmd response data (12 bytes)
3,505,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,450 UART: [rt]cmd =0x4d454153, len=108
3,555,027 >>> mbox cmd response data (12 bytes)
3,555,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,065 UART: [rt]cmd =0x4d454153, len=108
3,605,862 >>> mbox cmd response data (12 bytes)
3,605,863 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,840 UART: [rt]cmd =0x4d454153, len=108
3,656,891 >>> mbox cmd response data (12 bytes)
3,656,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,965 UART: [rt]cmd =0x4d454153, len=108
3,708,234 >>> mbox cmd response data (12 bytes)
3,708,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,234 UART: [rt]cmd =0x4d454153, len=108
3,759,407 >>> mbox cmd response data (12 bytes)
3,759,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,509 UART: [rt]cmd =0x4d454153, len=108
3,810,270 >>> mbox cmd response data (12 bytes)
3,810,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,152 UART: [rt]cmd =0x4d454153, len=108
3,860,549 >>> mbox cmd response data (12 bytes)
3,860,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,547 UART: [rt]cmd =0x4d454153, len=108
3,911,490 >>> mbox cmd response data (12 bytes)
3,911,491 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,272 UART: [rt]cmd =0x4d454153, len=108
3,961,681 >>> mbox cmd response data (12 bytes)
3,961,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,759 UART: [rt]cmd =0x4d454153, len=108
4,012,896 >>> mbox cmd response data (12 bytes)
4,012,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,890 UART: [rt]cmd =0x4d454153, len=108
4,064,135 >>> mbox cmd response data (12 bytes)
4,064,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,133 UART: [rt]cmd =0x4d454153, len=108
4,115,426 >>> mbox cmd response data (12 bytes)
4,115,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,646 UART: [rt]cmd =0x4d454153, len=108
4,167,151 >>> mbox cmd response data (12 bytes)
4,167,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,267 UART: [rt]cmd =0x4d454153, len=108
4,199,125 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,417 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,819 UART: [kat] SHA2-256
903,759 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,328 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,172,309 UART: [cold-reset] ++
1,172,819 UART: [fht] FHT @ 0x50003400
1,175,460 UART: [idev] ++
1,175,628 UART: [idev] CDI.KEYID = 6
1,175,988 UART: [idev] SUBJECT.KEYID = 7
1,176,412 UART: [idev] UDS.KEYID = 0
1,176,757 ready_for_fw is high
1,176,757 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,720 UART: [idev] Erasing UDS.KEYID = 0
1,201,953 UART: [idev] Sha1 KeyId Algorithm
1,210,377 UART: [idev] --
1,211,443 UART: [ldev] ++
1,211,611 UART: [ldev] CDI.KEYID = 6
1,211,974 UART: [ldev] SUBJECT.KEYID = 5
1,212,400 UART: [ldev] AUTHORITY.KEYID = 7
1,212,863 UART: [ldev] FE.KEYID = 1
1,218,041 UART: [ldev] Erasing FE.KEYID = 1
1,243,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,949 UART: [ldev] --
1,283,460 UART: [fwproc] Wait for Commands...
1,284,224 UART: [fwproc] Recv command 0x46574c44
1,284,952 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,622 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,447 >>> mbox cmd response: success
2,774,583 UART: [afmc] ++
2,774,751 UART: [afmc] CDI.KEYID = 6
2,775,113 UART: [afmc] SUBJECT.KEYID = 7
2,775,538 UART: [afmc] AUTHORITY.KEYID = 5
2,811,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,430 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,034 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,982 UART: [afmc] --
2,854,994 UART: [cold-reset] --
2,855,744 UART: [state] Locking Datavault
2,856,697 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,301 UART: [state] Locking ICCM
2,857,851 UART: [exit] Launching FMC @ 0x40000130
2,863,180 UART:
2,863,196 UART: Running Caliptra FMC ...
2,863,604 UART:
2,863,658 UART: [state] CFI Enabled
2,873,893 UART: [fht] FMC Alias Private Key: 7
2,982,160 UART: [art] Extend RT PCRs Done
2,982,588 UART: [art] Lock RT PCRs Done
2,984,182 UART: [art] Populate DV Done
2,992,681 UART: [fht] FMC Alias Private Key: 7
2,993,809 UART: [art] Derive CDI
2,994,089 UART: [art] Store in in slot 0x4
3,079,706 UART: [art] Derive Key Pair
3,080,066 UART: [art] Store priv key in slot 0x5
3,093,396 UART: [art] Derive Key Pair - Done
3,107,600 UART: [art] Signing Cert with AUTHO
3,108,080 UART: RITY.KEYID = 7
3,122,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,627 UART: [art] PUB.X = 0B5202B2EA87863221CBBA81AE3BA2A0D1FB00604CD426DF41B6154B6E2B2F189A93019463BDAA116A32A168F4A25EF3
3,130,376 UART: [art] PUB.Y = DAC21DEE773B2271DEC17A4E0A89FA29AA757555F2CF256C608B2E90B98CA2930E1A15E3DA5AD535B570242AFD13E692
3,137,334 UART: [art] SIG.R = 1D5A1C7368AA7F5F2CFDBCC3D158886A9FCC41BC2019169D23E8266C1D09E5E911C6D64EC070E41E56EC1878857595FD
3,144,111 UART: [art] SIG.S = 47285156269116D000618D0C4539CF4C3C8C26767D52B85CAD2945C19695ED57E97D172C27747DEB2884E70C77E92C7F
3,168,266 UART: Caliptra RT
3,168,519 UART: [state] CFI Enabled
3,276,388 UART: [rt] RT listening for mailbox commands...
3,277,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,432 UART: [rt]cmd =0x4d454153, len=108
3,327,699 >>> mbox cmd response data (12 bytes)
3,327,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,749 UART: [rt]cmd =0x4d454153, len=108
3,378,808 >>> mbox cmd response data (12 bytes)
3,378,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,076 UART: [rt]cmd =0x4d454153, len=108
3,430,057 >>> mbox cmd response data (12 bytes)
3,430,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,235 UART: [rt]cmd =0x4d454153, len=108
3,479,822 >>> mbox cmd response data (12 bytes)
3,479,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,509,898 UART: [rt]cmd =0x4d454153, len=108
3,530,989 >>> mbox cmd response data (12 bytes)
3,530,990 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,797 UART: [rt]cmd =0x4d454153, len=108
3,581,012 >>> mbox cmd response data (12 bytes)
3,581,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,900 UART: [rt]cmd =0x4d454153, len=108
3,631,349 >>> mbox cmd response data (12 bytes)
3,631,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,487 UART: [rt]cmd =0x4d454153, len=108
3,681,346 >>> mbox cmd response data (12 bytes)
3,681,347 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,390 UART: [rt]cmd =0x4d454153, len=108
3,731,771 >>> mbox cmd response data (12 bytes)
3,731,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,797 UART: [rt]cmd =0x4d454153, len=108
3,781,728 >>> mbox cmd response data (12 bytes)
3,781,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,672 UART: [rt]cmd =0x4d454153, len=108
3,832,839 >>> mbox cmd response data (12 bytes)
3,832,840 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,901 UART: [rt]cmd =0x4d454153, len=108
3,882,906 >>> mbox cmd response data (12 bytes)
3,882,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,922 UART: [rt]cmd =0x4d454153, len=108
3,933,827 >>> mbox cmd response data (12 bytes)
3,933,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,987 UART: [rt]cmd =0x4d454153, len=108
3,985,488 >>> mbox cmd response data (12 bytes)
3,985,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,756 UART: [rt]cmd =0x4d454153, len=108
4,036,295 >>> mbox cmd response data (12 bytes)
4,036,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,275 UART: [rt]cmd =0x4d454153, len=108
4,067,997 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,625 ready_for_fw is high
1,059,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,500 >>> mbox cmd response: success
2,684,268 UART:
2,684,284 UART: Running Caliptra FMC ...
2,684,692 UART:
2,684,746 UART: [state] CFI Enabled
2,695,531 UART: [fht] FMC Alias Private Key: 7
2,803,142 UART: [art] Extend RT PCRs Done
2,803,570 UART: [art] Lock RT PCRs Done
2,805,216 UART: [art] Populate DV Done
2,813,293 UART: [fht] FMC Alias Private Key: 7
2,814,401 UART: [art] Derive CDI
2,814,681 UART: [art] Store in in slot 0x4
2,900,266 UART: [art] Derive Key Pair
2,900,626 UART: [art] Store priv key in slot 0x5
2,914,294 UART: [art] Derive Key Pair - Done
2,929,000 UART: [art] Signing Cert with AUTHO
2,929,480 UART: RITY.KEYID = 7
2,944,868 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,633 UART: [art] PUB.X = 4A5FC5BC4BA898DA126A2AFABD5E44FBE5ED2A5EF7D1EB5487E6E3342EEEA637684F925E31D0C7C6668A0782AE233AE3
2,952,424 UART: [art] PUB.Y = 2B439939FF5545893BD7109CACC163014E2A9678AD83E36843403E21FA6F5235BC236AFF67085DC8D5351BBCA25CE74A
2,959,372 UART: [art] SIG.R = 15191E20F9FDC514B865771A1EFEF6C694A5981DE4D381F4663793878764CFF175A7F37E7ACBD525E15C9CF381886BA9
2,966,146 UART: [art] SIG.S = 0CA891B2E7373723B50B99CB3566BF1A76B8E9D95E9578A37B93E292123626A1459F2F3F516DB024179F94E503166E18
2,990,706 UART: Caliptra RT
2,990,959 UART: [state] CFI Enabled
3,099,100 UART: [rt] RT listening for mailbox commands...
3,099,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,192 UART: [rt]cmd =0x4d454153, len=108
3,150,203 >>> mbox cmd response data (12 bytes)
3,150,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,315 UART: [rt]cmd =0x4d454153, len=108
3,200,866 >>> mbox cmd response data (12 bytes)
3,200,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,870 UART: [rt]cmd =0x4d454153, len=108
3,251,047 >>> mbox cmd response data (12 bytes)
3,251,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,281,049 UART: [rt]cmd =0x4d454153, len=108
3,301,670 >>> mbox cmd response data (12 bytes)
3,301,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,782 UART: [rt]cmd =0x4d454153, len=108
3,352,233 >>> mbox cmd response data (12 bytes)
3,352,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,382,079 UART: [rt]cmd =0x4d454153, len=108
3,401,916 >>> mbox cmd response data (12 bytes)
3,401,917 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,840 UART: [rt]cmd =0x4d454153, len=108
3,452,551 >>> mbox cmd response data (12 bytes)
3,452,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,482,569 UART: [rt]cmd =0x4d454153, len=108
3,503,430 >>> mbox cmd response data (12 bytes)
3,503,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,496 UART: [rt]cmd =0x4d454153, len=108
3,553,773 >>> mbox cmd response data (12 bytes)
3,553,774 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,047 UART: [rt]cmd =0x4d454153, len=108
3,605,320 >>> mbox cmd response data (12 bytes)
3,605,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,240 UART: [rt]cmd =0x4d454153, len=108
3,655,617 >>> mbox cmd response data (12 bytes)
3,655,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,733 UART: [rt]cmd =0x4d454153, len=108
3,705,810 >>> mbox cmd response data (12 bytes)
3,705,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,892 UART: [rt]cmd =0x4d454153, len=108
3,757,227 >>> mbox cmd response data (12 bytes)
3,757,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,101 UART: [rt]cmd =0x4d454153, len=108
3,807,970 >>> mbox cmd response data (12 bytes)
3,807,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,004 UART: [rt]cmd =0x4d454153, len=108
3,858,089 >>> mbox cmd response data (12 bytes)
3,858,090 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,945 UART: [rt]cmd =0x4d454153, len=108
3,889,859 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,621 UART: [kat] SHA2-256
893,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,396 UART: [kat] ++
897,548 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,613 UART: [kat] SHA2-512-ACC
908,514 UART: [kat] ECC-384
918,161 UART: [kat] HMAC-384Kdf
922,937 UART: [kat] LMS
1,171,265 UART: [kat] --
1,171,966 UART: [cold-reset] ++
1,172,504 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 ready_for_fw is high
1,176,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,909 UART: [idev] Erasing UDS.KEYID = 0
1,201,388 UART: [idev] Sha1 KeyId Algorithm
1,210,022 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,218,166 UART: [ldev] Erasing FE.KEYID = 1
1,245,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,138 UART: [ldev] --
1,284,561 UART: [fwproc] Wait for Commands...
1,285,249 UART: [fwproc] Recv command 0x46574c44
1,285,977 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,393 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,938 >>> mbox cmd response: success
2,774,948 UART: [afmc] ++
2,775,116 UART: [afmc] CDI.KEYID = 6
2,775,478 UART: [afmc] SUBJECT.KEYID = 7
2,775,903 UART: [afmc] AUTHORITY.KEYID = 5
2,812,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,614 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,333 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,205 UART: [afmc] --
2,855,301 UART: [cold-reset] --
2,856,209 UART: [state] Locking Datavault
2,857,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,828 UART: [state] Locking ICCM
2,858,430 UART: [exit] Launching FMC @ 0x40000130
2,863,759 UART:
2,863,775 UART: Running Caliptra FMC ...
2,864,183 UART:
2,864,326 UART: [state] CFI Enabled
2,874,661 UART: [fht] FMC Alias Private Key: 7
2,983,058 UART: [art] Extend RT PCRs Done
2,983,486 UART: [art] Lock RT PCRs Done
2,985,238 UART: [art] Populate DV Done
2,993,227 UART: [fht] FMC Alias Private Key: 7
2,994,387 UART: [art] Derive CDI
2,994,667 UART: [art] Store in in slot 0x4
3,080,494 UART: [art] Derive Key Pair
3,080,854 UART: [art] Store priv key in slot 0x5
3,094,484 UART: [art] Derive Key Pair - Done
3,109,248 UART: [art] Signing Cert with AUTHO
3,109,728 UART: RITY.KEYID = 7
3,125,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,285 UART: [art] PUB.X = E5C3BF164E62D0D863A805646C165551A1F38412E0DCBB290EA60970DBB04C3A355D7E54B62C6747E2AA979ACB541AD4
3,133,054 UART: [art] PUB.Y = CC0D9ECBF4DA28BCFBA3D2068480CDBC609E53B89609BB38DCF7C8D0508B9228C3A2046AFD3C0B751AADB124FDA041D1
3,140,015 UART: [art] SIG.R = 4DE5ED39BC071E8C17E005AB2BCBCD43E0CF5C85FF297CAB2EA4A8795DBC1429290E72A077B6B761C493A52D1B00CEF7
3,146,776 UART: [art] SIG.S = 287EA74483EE2539120183D467A5CC4A92026A08F860AFAD1E463ED6273DC7B19AA337FFE4F5B4616EA133B308C9952F
3,170,495 UART: Caliptra RT
3,170,840 UART: [state] CFI Enabled
3,278,453 UART: [rt] RT listening for mailbox commands...
3,279,123 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,765 UART: [rt]cmd =0x4d454153, len=108
3,330,498 >>> mbox cmd response data (12 bytes)
3,330,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,524 UART: [rt]cmd =0x4d454153, len=108
3,380,903 >>> mbox cmd response data (12 bytes)
3,380,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,811 UART: [rt]cmd =0x4d454153, len=108
3,431,454 >>> mbox cmd response data (12 bytes)
3,431,455 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,604 UART: [rt]cmd =0x4d454153, len=108
3,483,039 >>> mbox cmd response data (12 bytes)
3,483,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,177 UART: [rt]cmd =0x4d454153, len=108
3,534,180 >>> mbox cmd response data (12 bytes)
3,534,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,078 UART: [rt]cmd =0x4d454153, len=108
3,584,545 >>> mbox cmd response data (12 bytes)
3,584,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,739 UART: [rt]cmd =0x4d454153, len=108
3,635,330 >>> mbox cmd response data (12 bytes)
3,635,331 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,665,566 UART: [rt]cmd =0x4d454153, len=108
3,686,143 >>> mbox cmd response data (12 bytes)
3,686,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,181 UART: [rt]cmd =0x4d454153, len=108
3,736,466 >>> mbox cmd response data (12 bytes)
3,736,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,810 UART: [rt]cmd =0x4d454153, len=108
3,787,565 >>> mbox cmd response data (12 bytes)
3,787,566 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,497 UART: [rt]cmd =0x4d454153, len=108
3,838,624 >>> mbox cmd response data (12 bytes)
3,838,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,668 UART: [rt]cmd =0x4d454153, len=108
3,889,259 >>> mbox cmd response data (12 bytes)
3,889,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,919,271 UART: [rt]cmd =0x4d454153, len=108
3,940,810 >>> mbox cmd response data (12 bytes)
3,940,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,668 UART: [rt]cmd =0x4d454153, len=108
3,991,063 >>> mbox cmd response data (12 bytes)
3,991,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,021,307 UART: [rt]cmd =0x4d454153, len=108
4,041,574 >>> mbox cmd response data (12 bytes)
4,041,575 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,428 UART: [rt]cmd =0x4d454153, len=108
4,073,058 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,098 ready_for_fw is high
1,061,098 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,237 >>> mbox cmd response: success
2,690,069 UART:
2,690,085 UART: Running Caliptra FMC ...
2,690,493 UART:
2,690,636 UART: [state] CFI Enabled
2,701,033 UART: [fht] FMC Alias Private Key: 7
2,808,624 UART: [art] Extend RT PCRs Done
2,809,052 UART: [art] Lock RT PCRs Done
2,810,378 UART: [art] Populate DV Done
2,818,567 UART: [fht] FMC Alias Private Key: 7
2,819,593 UART: [art] Derive CDI
2,819,873 UART: [art] Store in in slot 0x4
2,905,284 UART: [art] Derive Key Pair
2,905,644 UART: [art] Store priv key in slot 0x5
2,919,074 UART: [art] Derive Key Pair - Done
2,933,991 UART: [art] Signing Cert with AUTHO
2,934,471 UART: RITY.KEYID = 7
2,950,039 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,804 UART: [art] PUB.X = 26740DB8F215B5DE91EF1238E22AF3F7AE85C9B3E5228332BFAF06B2CA27CA7EFF3AF675F30636BCA2F459DFFCB6C554
2,957,587 UART: [art] PUB.Y = 7DBB4F3F4A114E301A929A135BEC0B19AE62BA406443E82BD4F3A274A9177E6B35DFAA401AB8BDCA8DE9DC9E8EA931AE
2,964,560 UART: [art] SIG.R = EBCC655022C875B3585291821F5D641E99683A103444FB6E6BB9385FEA0B10D6A7E41303D56814358ADD5F7648AA2CFE
2,971,326 UART: [art] SIG.S = D6795A31E8FBB3E92CF5A6C2B395AEB479009F22FB8EE113EAB82809C8755E54D24F7746F14D5F63B65B1B67D503D3F0
2,994,821 UART: Caliptra RT
2,995,166 UART: [state] CFI Enabled
3,102,922 UART: [rt] RT listening for mailbox commands...
3,103,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,206 UART: [rt]cmd =0x4d454153, len=108
3,154,593 >>> mbox cmd response data (12 bytes)
3,154,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,805 UART: [rt]cmd =0x4d454153, len=108
3,205,600 >>> mbox cmd response data (12 bytes)
3,205,601 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,235,764 UART: [rt]cmd =0x4d454153, len=108
3,257,427 >>> mbox cmd response data (12 bytes)
3,257,428 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,287,493 UART: [rt]cmd =0x4d454153, len=108
3,308,710 >>> mbox cmd response data (12 bytes)
3,308,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,908 UART: [rt]cmd =0x4d454153, len=108
3,359,829 >>> mbox cmd response data (12 bytes)
3,359,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,745 UART: [rt]cmd =0x4d454153, len=108
3,410,556 >>> mbox cmd response data (12 bytes)
3,410,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,536 UART: [rt]cmd =0x4d454153, len=108
3,461,381 >>> mbox cmd response data (12 bytes)
3,461,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,349 UART: [rt]cmd =0x4d454153, len=108
3,511,960 >>> mbox cmd response data (12 bytes)
3,511,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,134 UART: [rt]cmd =0x4d454153, len=108
3,563,329 >>> mbox cmd response data (12 bytes)
3,563,330 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,593,661 UART: [rt]cmd =0x4d454153, len=108
3,614,854 >>> mbox cmd response data (12 bytes)
3,614,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,768 UART: [rt]cmd =0x4d454153, len=108
3,664,635 >>> mbox cmd response data (12 bytes)
3,664,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,619 UART: [rt]cmd =0x4d454153, len=108
3,715,436 >>> mbox cmd response data (12 bytes)
3,715,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,554 UART: [rt]cmd =0x4d454153, len=108
3,765,915 >>> mbox cmd response data (12 bytes)
3,765,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,057 UART: [rt]cmd =0x4d454153, len=108
3,816,804 >>> mbox cmd response data (12 bytes)
3,816,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,720 UART: [rt]cmd =0x4d454153, len=108
3,866,917 >>> mbox cmd response data (12 bytes)
3,866,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,819 UART: [rt]cmd =0x4d454153, len=108
3,898,517 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,281 UART: [kat] ++
895,433 UART: [kat] sha1
899,773 UART: [kat] SHA2-256
901,713 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
916,002 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,795 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,174,369 ready_for_fw is high
1,174,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,399 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] --
1,208,356 UART: [ldev] ++
1,208,524 UART: [ldev] CDI.KEYID = 6
1,208,888 UART: [ldev] SUBJECT.KEYID = 5
1,209,315 UART: [ldev] AUTHORITY.KEYID = 7
1,209,778 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,421 UART: [fwproc] Recv command 0x46574c44
1,282,154 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,189 >>> mbox cmd response: success
2,773,290 UART: [afmc] ++
2,773,458 UART: [afmc] CDI.KEYID = 6
2,773,821 UART: [afmc] SUBJECT.KEYID = 7
2,774,247 UART: [afmc] AUTHORITY.KEYID = 5
2,809,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,913 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,642 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,525 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,244 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,037 UART: [afmc] --
2,852,991 UART: [cold-reset] --
2,853,995 UART: [state] Locking Datavault
2,855,102 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,706 UART: [state] Locking ICCM
2,856,132 UART: [exit] Launching FMC @ 0x40000130
2,861,461 UART:
2,861,477 UART: Running Caliptra FMC ...
2,861,885 UART:
2,861,939 UART: [state] CFI Enabled
2,872,326 UART: [fht] FMC Alias Private Key: 7
2,980,655 UART: [art] Extend RT PCRs Done
2,981,083 UART: [art] Lock RT PCRs Done
2,982,495 UART: [art] Populate DV Done
2,990,902 UART: [fht] FMC Alias Private Key: 7
2,992,002 UART: [art] Derive CDI
2,992,282 UART: [art] Store in in slot 0x4
3,077,837 UART: [art] Derive Key Pair
3,078,197 UART: [art] Store priv key in slot 0x5
3,091,151 UART: [art] Derive Key Pair - Done
3,105,568 UART: [art] Signing Cert with AUTHO
3,106,048 UART: RITY.KEYID = 7
3,121,050 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,815 UART: [art] PUB.X = 4AE4CEC7ABF621B956F3BC7C9367258D699C2D1E92903F1ABEC2BE858DDF45374B6E67CB80661A7AE48000417A4EBB18
3,128,577 UART: [art] PUB.Y = 0C771E32453A328B16A3EDD8FF2F487C9391ABF03824A23E1DCDE98EC91BB7246A5516E02F750AFCF2FD027A47A053F1
3,135,530 UART: [art] SIG.R = 19CE9A3C36FA7854F3B7A59E6EF4C07305D77DD05B86C06B4B9C3D1992F4391F3657492A4FC33C3586A0BAC0A758C16C
3,142,305 UART: [art] SIG.S = 169AA7F76235504234F8C50BF793424BAB029BB9BC5A2572A005A4BE1FC10A16D661394176359B6BCE8D718145F461C3
3,166,150 UART: Caliptra RT
3,166,403 UART: [state] CFI Enabled
3,273,546 UART: [rt] RT listening for mailbox commands...
3,274,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,918 UART: [rt]cmd =0x4d454153, len=108
3,325,739 >>> mbox cmd response data (12 bytes)
3,325,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,513 UART: [rt]cmd =0x4d454153, len=108
3,375,676 >>> mbox cmd response data (12 bytes)
3,375,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,796 UART: [rt]cmd =0x4d454153, len=108
3,426,475 >>> mbox cmd response data (12 bytes)
3,426,476 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,489 UART: [rt]cmd =0x4d454153, len=108
3,477,460 >>> mbox cmd response data (12 bytes)
3,477,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,484 UART: [rt]cmd =0x4d454153, len=108
3,528,465 >>> mbox cmd response data (12 bytes)
3,528,466 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,353 UART: [rt]cmd =0x4d454153, len=108
3,578,758 >>> mbox cmd response data (12 bytes)
3,578,759 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,878 UART: [rt]cmd =0x4d454153, len=108
3,629,611 >>> mbox cmd response data (12 bytes)
3,629,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,793 UART: [rt]cmd =0x4d454153, len=108
3,680,746 >>> mbox cmd response data (12 bytes)
3,680,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,734 UART: [rt]cmd =0x4d454153, len=108
3,731,397 >>> mbox cmd response data (12 bytes)
3,731,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,399 UART: [rt]cmd =0x4d454153, len=108
3,782,380 >>> mbox cmd response data (12 bytes)
3,782,381 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,812,508 UART: [rt]cmd =0x4d454153, len=108
3,833,929 >>> mbox cmd response data (12 bytes)
3,833,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,017 UART: [rt]cmd =0x4d454153, len=108
3,884,340 >>> mbox cmd response data (12 bytes)
3,884,341 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,914,366 UART: [rt]cmd =0x4d454153, len=108
3,935,121 >>> mbox cmd response data (12 bytes)
3,935,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,965,147 UART: [rt]cmd =0x4d454153, len=108
3,986,460 >>> mbox cmd response data (12 bytes)
3,986,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,016,396 UART: [rt]cmd =0x4d454153, len=108
4,037,861 >>> mbox cmd response data (12 bytes)
4,037,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,193 UART: [rt]cmd =0x4d454153, len=108
4,069,983 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,828 ready_for_fw is high
1,055,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,207 >>> mbox cmd response: success
2,682,585 UART:
2,682,601 UART: Running Caliptra FMC ...
2,683,009 UART:
2,683,063 UART: [state] CFI Enabled
2,693,710 UART: [fht] FMC Alias Private Key: 7
2,801,743 UART: [art] Extend RT PCRs Done
2,802,171 UART: [art] Lock RT PCRs Done
2,803,993 UART: [art] Populate DV Done
2,812,572 UART: [fht] FMC Alias Private Key: 7
2,813,754 UART: [art] Derive CDI
2,814,034 UART: [art] Store in in slot 0x4
2,899,681 UART: [art] Derive Key Pair
2,900,041 UART: [art] Store priv key in slot 0x5
2,912,603 UART: [art] Derive Key Pair - Done
2,927,303 UART: [art] Signing Cert with AUTHO
2,927,783 UART: RITY.KEYID = 7
2,942,753 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,518 UART: [art] PUB.X = 06B034C8144E9E3F50816622F66A0F4B1E8B1B3E76789A6495B8A070AA2101D8B7291566428DC4564276BAC27ED19786
2,950,271 UART: [art] PUB.Y = C6AB7DAA6DCF4C2DC9726B75F4DC018C4835C1C603F3C49D49F6C973E52418574BF661A97EA9F087F48479865AF03F3C
2,957,225 UART: [art] SIG.R = 2EB711B2EDDE0C17B4408431F0676CFC9466F819CBB236EBC06F48FA94447973ECE5553ED3634783A4D5CA90B9F39AFE
2,964,004 UART: [art] SIG.S = 265220DE7A77F55843B6FFB0D0FDD8D8317C469B912A23238E3ECF210354B3712B2D56D4DFF5F34AA32F62F09D24B51B
2,988,012 UART: Caliptra RT
2,988,265 UART: [state] CFI Enabled
3,095,786 UART: [rt] RT listening for mailbox commands...
3,096,456 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,942 UART: [rt]cmd =0x4d454153, len=108
3,147,343 >>> mbox cmd response data (12 bytes)
3,147,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,177,475 UART: [rt]cmd =0x4d454153, len=108
3,198,366 >>> mbox cmd response data (12 bytes)
3,198,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,356 UART: [rt]cmd =0x4d454153, len=108
3,249,793 >>> mbox cmd response data (12 bytes)
3,249,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,757 UART: [rt]cmd =0x4d454153, len=108
3,301,138 >>> mbox cmd response data (12 bytes)
3,301,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,160 UART: [rt]cmd =0x4d454153, len=108
3,352,025 >>> mbox cmd response data (12 bytes)
3,352,026 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,381,709 UART: [rt]cmd =0x4d454153, len=108
3,402,798 >>> mbox cmd response data (12 bytes)
3,402,799 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,716 UART: [rt]cmd =0x4d454153, len=108
3,453,381 >>> mbox cmd response data (12 bytes)
3,453,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,483,421 UART: [rt]cmd =0x4d454153, len=108
3,503,540 >>> mbox cmd response data (12 bytes)
3,503,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,588 UART: [rt]cmd =0x4d454153, len=108
3,554,549 >>> mbox cmd response data (12 bytes)
3,554,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,525 UART: [rt]cmd =0x4d454153, len=108
3,605,448 >>> mbox cmd response data (12 bytes)
3,605,449 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,352 UART: [rt]cmd =0x4d454153, len=108
3,656,019 >>> mbox cmd response data (12 bytes)
3,656,020 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,686,041 UART: [rt]cmd =0x4d454153, len=108
3,707,002 >>> mbox cmd response data (12 bytes)
3,707,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,030 UART: [rt]cmd =0x4d454153, len=108
3,757,431 >>> mbox cmd response data (12 bytes)
3,757,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,571 UART: [rt]cmd =0x4d454153, len=108
3,808,754 >>> mbox cmd response data (12 bytes)
3,808,755 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,856 UART: [rt]cmd =0x4d454153, len=108
3,859,295 >>> mbox cmd response data (12 bytes)
3,859,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,551 UART: [rt]cmd =0x4d454153, len=108
3,891,437 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,557 UART: [kat] LMS
1,169,869 UART: [kat] --
1,170,898 UART: [cold-reset] ++
1,171,340 UART: [fht] FHT @ 0x50003400
1,174,040 UART: [idev] ++
1,174,208 UART: [idev] CDI.KEYID = 6
1,174,569 UART: [idev] SUBJECT.KEYID = 7
1,174,994 UART: [idev] UDS.KEYID = 0
1,175,340 ready_for_fw is high
1,175,340 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,094 UART: [idev] Erasing UDS.KEYID = 0
1,200,736 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,203 UART: [ldev] SUBJECT.KEYID = 5
1,211,630 UART: [ldev] AUTHORITY.KEYID = 7
1,212,093 UART: [ldev] FE.KEYID = 1
1,217,411 UART: [ldev] Erasing FE.KEYID = 1
1,244,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,983 UART: [ldev] --
1,283,265 UART: [fwproc] Wait for Commands...
1,283,992 UART: [fwproc] Recv command 0x46574c44
1,284,725 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,669 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,600 >>> mbox cmd response: success
2,772,711 UART: [afmc] ++
2,772,879 UART: [afmc] CDI.KEYID = 6
2,773,242 UART: [afmc] SUBJECT.KEYID = 7
2,773,668 UART: [afmc] AUTHORITY.KEYID = 5
2,809,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,652 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,381 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,264 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,983 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,964 UART: [afmc] --
2,852,896 UART: [cold-reset] --
2,853,734 UART: [state] Locking Datavault
2,855,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,833 UART: [state] Locking ICCM
2,856,347 UART: [exit] Launching FMC @ 0x40000130
2,861,676 UART:
2,861,692 UART: Running Caliptra FMC ...
2,862,100 UART:
2,862,243 UART: [state] CFI Enabled
2,872,612 UART: [fht] FMC Alias Private Key: 7
2,980,999 UART: [art] Extend RT PCRs Done
2,981,427 UART: [art] Lock RT PCRs Done
2,983,199 UART: [art] Populate DV Done
2,991,520 UART: [fht] FMC Alias Private Key: 7
2,992,526 UART: [art] Derive CDI
2,992,806 UART: [art] Store in in slot 0x4
3,078,119 UART: [art] Derive Key Pair
3,078,479 UART: [art] Store priv key in slot 0x5
3,091,537 UART: [art] Derive Key Pair - Done
3,106,432 UART: [art] Signing Cert with AUTHO
3,106,912 UART: RITY.KEYID = 7
3,121,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,211 UART: [art] PUB.X = F12CF29230368EF3F0662346C5FD5E936E9DC099A6E02E142A00954A542047898F5F69C4D3F8D53729972708D47DA79F
3,128,950 UART: [art] PUB.Y = E8AF2AACBA23BBD03F3B647CFAAE7B1115ACFB17E9035ECF0C68664A4B78D6A75D1DC92CA4D912B4B97E62331639A245
3,135,916 UART: [art] SIG.R = EE1590DAA2573DCF4BDFA73076DB966E75A6A955805F609091622F37AC5BCD38C50FC686AC5C4E4FDE1817E4A2AEF160
3,142,699 UART: [art] SIG.S = FCF96DA3BAB4F23B7204039A05BA69FD1D52E77BAD13B67B35706EA1987361C9DE9015027006478117DFFCB6FEDD41DD
3,165,785 UART: Caliptra RT
3,166,130 UART: [state] CFI Enabled
3,273,180 UART: [rt] RT listening for mailbox commands...
3,273,850 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,312 UART: [rt]cmd =0x4d454153, len=108
3,324,803 >>> mbox cmd response data (12 bytes)
3,324,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,763 UART: [rt]cmd =0x4d454153, len=108
3,375,562 >>> mbox cmd response data (12 bytes)
3,375,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,588 UART: [rt]cmd =0x4d454153, len=108
3,426,735 >>> mbox cmd response data (12 bytes)
3,426,736 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,751 UART: [rt]cmd =0x4d454153, len=108
3,477,168 >>> mbox cmd response data (12 bytes)
3,477,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,296 UART: [rt]cmd =0x4d454153, len=108
3,527,591 >>> mbox cmd response data (12 bytes)
3,527,592 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,493 UART: [rt]cmd =0x4d454153, len=108
3,578,132 >>> mbox cmd response data (12 bytes)
3,578,133 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,246 UART: [rt]cmd =0x4d454153, len=108
3,628,987 >>> mbox cmd response data (12 bytes)
3,628,988 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,167 UART: [rt]cmd =0x4d454153, len=108
3,679,704 >>> mbox cmd response data (12 bytes)
3,679,705 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,806 UART: [rt]cmd =0x4d454153, len=108
3,731,209 >>> mbox cmd response data (12 bytes)
3,731,210 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,283 UART: [rt]cmd =0x4d454153, len=108
3,781,712 >>> mbox cmd response data (12 bytes)
3,781,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,670 UART: [rt]cmd =0x4d454153, len=108
3,832,883 >>> mbox cmd response data (12 bytes)
3,832,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,767 UART: [rt]cmd =0x4d454153, len=108
3,883,488 >>> mbox cmd response data (12 bytes)
3,883,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,550 UART: [rt]cmd =0x4d454153, len=108
3,934,703 >>> mbox cmd response data (12 bytes)
3,934,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,787 UART: [rt]cmd =0x4d454153, len=108
3,985,088 >>> mbox cmd response data (12 bytes)
3,985,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,218 UART: [rt]cmd =0x4d454153, len=108
4,036,547 >>> mbox cmd response data (12 bytes)
4,036,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,497 UART: [rt]cmd =0x4d454153, len=108
4,068,307 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,023 ready_for_fw is high
1,056,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,482 >>> mbox cmd response: success
2,684,328 UART:
2,684,344 UART: Running Caliptra FMC ...
2,684,752 UART:
2,684,895 UART: [state] CFI Enabled
2,695,518 UART: [fht] FMC Alias Private Key: 7
2,803,573 UART: [art] Extend RT PCRs Done
2,804,001 UART: [art] Lock RT PCRs Done
2,805,477 UART: [art] Populate DV Done
2,813,632 UART: [fht] FMC Alias Private Key: 7
2,814,684 UART: [art] Derive CDI
2,814,964 UART: [art] Store in in slot 0x4
2,900,197 UART: [art] Derive Key Pair
2,900,557 UART: [art] Store priv key in slot 0x5
2,914,039 UART: [art] Derive Key Pair - Done
2,928,484 UART: [art] Signing Cert with AUTHO
2,928,964 UART: RITY.KEYID = 7
2,944,614 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,379 UART: [art] PUB.X = ED9DEF44D50CDB6A1BD87336FC8EC6B1E5AA99B8562F5209702ED45F301A0167FD863245CD08C253075DF4CD124C134E
2,952,146 UART: [art] PUB.Y = 53470A3766CD7EBB025400883655B54A96AB3F113ECDE3E4F89BCC30E3E061BE628219BE1A4E9AF1C47F47C6F7AA2C7E
2,959,082 UART: [art] SIG.R = 1000B2E1B4CBBD6C7120A0BA8E1851BD60CAB012570898ED6C65686DDF4E85CB089E1EA4D4AD72E8EF4D1EE0BCEBD598
2,965,848 UART: [art] SIG.S = 0DD63A852C6DE4A612BA7AA0122B918DBAC284D43CC554FE468453B47079FC240495A0278599117F6C2757CF7ACECABA
2,989,247 UART: Caliptra RT
2,989,592 UART: [state] CFI Enabled
3,097,637 UART: [rt] RT listening for mailbox commands...
3,098,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,475 UART: [rt]cmd =0x4d454153, len=108
3,148,834 >>> mbox cmd response data (12 bytes)
3,148,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,178,816 UART: [rt]cmd =0x4d454153, len=108
3,199,047 >>> mbox cmd response data (12 bytes)
3,199,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,957 UART: [rt]cmd =0x4d454153, len=108
3,249,860 >>> mbox cmd response data (12 bytes)
3,249,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,826 UART: [rt]cmd =0x4d454153, len=108
3,300,367 >>> mbox cmd response data (12 bytes)
3,300,368 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,207 UART: [rt]cmd =0x4d454153, len=108
3,350,596 >>> mbox cmd response data (12 bytes)
3,350,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,918 UART: [rt]cmd =0x4d454153, len=108
3,401,521 >>> mbox cmd response data (12 bytes)
3,401,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,637 UART: [rt]cmd =0x4d454153, len=108
3,451,722 >>> mbox cmd response data (12 bytes)
3,451,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,481,612 UART: [rt]cmd =0x4d454153, len=108
3,502,069 >>> mbox cmd response data (12 bytes)
3,502,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,101 UART: [rt]cmd =0x4d454153, len=108
3,552,898 >>> mbox cmd response data (12 bytes)
3,552,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,860 UART: [rt]cmd =0x4d454153, len=108
3,603,823 >>> mbox cmd response data (12 bytes)
3,603,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,633,827 UART: [rt]cmd =0x4d454153, len=108
3,653,960 >>> mbox cmd response data (12 bytes)
3,653,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,904 UART: [rt]cmd =0x4d454153, len=108
3,705,101 >>> mbox cmd response data (12 bytes)
3,705,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,101 UART: [rt]cmd =0x4d454153, len=108
3,756,120 >>> mbox cmd response data (12 bytes)
3,756,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,160 UART: [rt]cmd =0x4d454153, len=108
3,807,077 >>> mbox cmd response data (12 bytes)
3,807,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,837,281 UART: [rt]cmd =0x4d454153, len=108
3,857,606 >>> mbox cmd response data (12 bytes)
3,857,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,504 UART: [rt]cmd =0x4d454153, len=108
3,889,410 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,201 UART:
192,557 UART: Running Caliptra ROM ...
193,674 UART:
193,815 UART: [state] CFI Enabled
264,243 UART: [state] LifecycleState = Unprovisioned
266,214 UART: [state] DebugLocked = No
268,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,962 UART: [kat] SHA2-256
443,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,200 UART: [kat] ++
454,698 UART: [kat] sha1
465,428 UART: [kat] SHA2-256
468,154 UART: [kat] SHA2-384
474,420 UART: [kat] SHA2-512-ACC
476,778 UART: [kat] ECC-384
2,767,597 UART: [kat] HMAC-384Kdf
2,799,411 UART: [kat] LMS
3,989,704 UART: [kat] --
3,994,296 UART: [cold-reset] ++
3,996,578 UART: [fht] Storing FHT @ 0x50003400
4,008,685 UART: [idev] ++
4,009,247 UART: [idev] CDI.KEYID = 6
4,010,235 UART: [idev] SUBJECT.KEYID = 7
4,011,473 UART: [idev] UDS.KEYID = 0
4,012,540 ready_for_fw is high
4,012,767 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,080 UART: [idev] Erasing UDS.KEYID = 0
7,346,901 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,341 UART: [idev] --
7,371,520 UART: [ldev] ++
7,372,081 UART: [ldev] CDI.KEYID = 6
7,373,044 UART: [ldev] SUBJECT.KEYID = 5
7,374,254 UART: [ldev] AUTHORITY.KEYID = 7
7,375,478 UART: [ldev] FE.KEYID = 1
7,421,611 UART: [ldev] Erasing FE.KEYID = 1
10,753,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,931 UART: [ldev] --
13,114,981 UART: [fwproc] Waiting for Commands...
13,116,871 UART: [fwproc] Received command 0x46574c44
13,119,048 UART: [fwproc] Received Image of size 113844 bytes
17,171,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,715 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,624,784 >>> mbox cmd response: success
17,629,674 UART: [afmc] ++
17,630,269 UART: [afmc] CDI.KEYID = 6
17,631,151 UART: [afmc] SUBJECT.KEYID = 7
17,632,432 UART: [afmc] AUTHORITY.KEYID = 5
21,007,317 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,110 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,537 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,355 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,785 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,616 UART: [afmc] --
23,379,178 UART: [cold-reset] --
23,382,977 UART: [state] Locking Datavault
23,389,087 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,837 UART: [state] Locking ICCM
23,392,171 UART: [exit] Launching FMC @ 0x40000130
23,400,559 UART:
23,400,786 UART: Running Caliptra FMC ...
23,402,041 UART:
23,402,215 UART: [state] CFI Enabled
23,464,582 UART: [fht] FMC Alias Private Key: 7
25,802,173 UART: [art] Extend RT PCRs Done
25,803,442 UART: [art] Lock RT PCRs Done
25,804,877 UART: [art] Populate DV Done
25,810,351 UART: [fht] FMC Alias Private Key: 7
25,811,988 UART: [art] Derive CDI
25,812,738 UART: [art] Store in in slot 0x4
25,872,849 UART: [art] Derive Key Pair
25,873,846 UART: [art] Store priv key in slot 0x5
29,166,312 UART: [art] Derive Key Pair - Done
29,179,150 UART: [art] Signing Cert with AUTHO
29,180,450 UART: RITY.KEYID = 7
31,468,001 UART: [art] Erasing AUTHORITY.KEYID = 7
31,469,507 UART: [art] PUB.X = 910FA3102B663A113C8D6FCF932CE195EA11DE6C30F71AC419BEA9692414CFFB796D03ED54313A225FF4667B67BF6B21
31,476,765 UART: [art] PUB.Y = DE6647209782CE23933938E0BBFC4C95D3354A72F4AF45217643E27E3DCFB6E8CD4B362DB3902BE4420ECEBDE4528240
31,484,004 UART: [art] SIG.R = 5B2A881CFB482B45974486F1535217A6F90CB0B29B7DEFEA476CCEE9AF6A918788E55DF28F9CDFB283DF7B74C604E68A
31,491,378 UART: [art] SIG.S = F93E419E0ED46AFAD79CB7DAE13E216ECCA7D9E94EF08F0230252A4B4F41E57A796CE9D8BC4FABF09160111CA86472D9
32,796,920 UART: Caliptra RT
32,797,607 UART: [state] CFI Enabled
32,957,794 UART: [rt] RT listening for mailbox commands...
32,959,755 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,990,343 UART: [rt]cmd =0x44504543, len=40
33,032,075 >>> mbox cmd response data (40 bytes)
33,033,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,064,189 UART: [rt]cmd =0x44504543, len=96
33,123,870 >>> mbox cmd response data (56 bytes)
33,124,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,155,242 UART: [rt]cmd =0x44504543, len=96
33,230,924 >>> mbox cmd response data (56 bytes)
33,231,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,262,064 UART: [rt]cmd =0x44504543, len=96
33,337,105 >>> mbox cmd response data (56 bytes)
33,337,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,368,311 UART: [rt]cmd =0x44504543, len=96
33,444,302 >>> mbox cmd response data (56 bytes)
33,445,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,475,622 UART: [rt]cmd =0x44504543, len=96
33,550,160 >>> mbox cmd response data (56 bytes)
33,550,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,581,604 UART: [rt]cmd =0x44504543, len=96
33,657,416 >>> mbox cmd response data (56 bytes)
33,658,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,688,769 UART: [rt]cmd =0x44504543, len=96
33,764,025 >>> mbox cmd response data (56 bytes)
33,764,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,795,191 UART: [rt]cmd =0x44504543, len=96
33,870,695 >>> mbox cmd response data (56 bytes)
33,871,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,901,858 UART: [rt]cmd =0x44504543, len=96
33,977,595 >>> mbox cmd response data (56 bytes)
33,978,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,008,746 UART: [rt]cmd =0x44504543, len=96
34,084,369 >>> mbox cmd response data (56 bytes)
34,085,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,115,873 UART: [rt]cmd =0x44504543, len=96
34,191,173 >>> mbox cmd response data (56 bytes)
34,191,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,222,646 UART: [rt]cmd =0x44504543, len=96
34,297,952 >>> mbox cmd response data (56 bytes)
34,298,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,329,040 UART: [rt]cmd =0x44504543, len=96
34,404,707 >>> mbox cmd response data (56 bytes)
34,405,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,436,049 UART: [rt]cmd =0x44504543, len=96
34,512,150 >>> mbox cmd response data (56 bytes)
34,512,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,543,562 UART: [rt]cmd =0x44504543, len=96
34,619,128 >>> mbox cmd response data (56 bytes)
34,619,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,650,429 UART: [rt]cmd =0x44504543, len=96
34,657,060 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,786,420 ready_for_fw is high
3,787,050 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,866,064 >>> mbox cmd response: success
23,566,401 UART:
23,566,781 UART: Running Caliptra FMC ...
23,567,909 UART:
23,568,064 UART: [state] CFI Enabled
23,638,919 UART: [fht] FMC Alias Private Key: 7
25,976,857 UART: [art] Extend RT PCRs Done
25,978,087 UART: [art] Lock RT PCRs Done
25,979,443 UART: [art] Populate DV Done
25,985,074 UART: [fht] FMC Alias Private Key: 7
25,986,785 UART: [art] Derive CDI
25,987,610 UART: [art] Store in in slot 0x4
26,047,478 UART: [art] Derive Key Pair
26,048,515 UART: [art] Store priv key in slot 0x5
29,322,434 UART: [art] Derive Key Pair - Done
29,335,229 UART: [art] Signing Cert with AUTHO
29,336,533 UART: RITY.KEYID = 7
31,627,623 UART: [art] Erasing AUTHORITY.KEYID = 7
31,629,132 UART: [art] PUB.X = 27C3EEFA1DECA67566F8B98777E8C8966032C1AD3A276EC1DCB83D4C38FEFE22A3E2E98882BF6DF17947B5A3087A5B98
31,636,405 UART: [art] PUB.Y = 26DFB240CA13B40A8436E939FAADBBB0AC946FBF64E54AF31E17F4AABE0B2CA040CA80835417E7256EF396F74EE6DF4D
31,643,662 UART: [art] SIG.R = 6627C4CA5EEAEBD366464BBBF7D84C723246DC3ED840B7FA4C32E4AB9FE3AF151FB3C3F584855D8BF304A1BADE2C724D
31,651,109 UART: [art] SIG.S = 38C8E951AD881E42FA37B942059FE1C5B5E2910A624C66ED91123BE11ABDB259D6016FC66DE253253609223F0C60EE7A
32,955,962 UART: Caliptra RT
32,956,661 UART: [state] CFI Enabled
33,118,647 UART: [rt] RT listening for mailbox commands...
33,120,604 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,151,602 UART: [rt]cmd =0x44504543, len=40
33,192,233 >>> mbox cmd response data (40 bytes)
33,193,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,223,983 UART: [rt]cmd =0x44504543, len=96
33,283,903 >>> mbox cmd response data (56 bytes)
33,284,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,315,165 UART: [rt]cmd =0x44504543, len=96
33,390,243 >>> mbox cmd response data (56 bytes)
33,390,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,421,528 UART: [rt]cmd =0x44504543, len=96
33,497,056 >>> mbox cmd response data (56 bytes)
33,497,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,528,384 UART: [rt]cmd =0x44504543, len=96
33,604,330 >>> mbox cmd response data (56 bytes)
33,605,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,635,749 UART: [rt]cmd =0x44504543, len=96
33,710,986 >>> mbox cmd response data (56 bytes)
33,711,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,742,149 UART: [rt]cmd =0x44504543, len=96
33,818,054 >>> mbox cmd response data (56 bytes)
33,818,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,849,395 UART: [rt]cmd =0x44504543, len=96
33,924,257 >>> mbox cmd response data (56 bytes)
33,924,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,955,515 UART: [rt]cmd =0x44504543, len=96
34,030,758 >>> mbox cmd response data (56 bytes)
34,031,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,061,979 UART: [rt]cmd =0x44504543, len=96
34,137,992 >>> mbox cmd response data (56 bytes)
34,138,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,169,186 UART: [rt]cmd =0x44504543, len=96
34,244,417 >>> mbox cmd response data (56 bytes)
34,245,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,275,843 UART: [rt]cmd =0x44504543, len=96
34,351,236 >>> mbox cmd response data (56 bytes)
34,351,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,382,494 UART: [rt]cmd =0x44504543, len=96
34,458,415 >>> mbox cmd response data (56 bytes)
34,459,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,489,721 UART: [rt]cmd =0x44504543, len=96
34,564,684 >>> mbox cmd response data (56 bytes)
34,565,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,596,042 UART: [rt]cmd =0x44504543, len=96
34,671,416 >>> mbox cmd response data (56 bytes)
34,672,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,702,802 UART: [rt]cmd =0x44504543, len=96
34,778,340 >>> mbox cmd response data (56 bytes)
34,779,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,809,558 UART: [rt]cmd =0x44504543, len=96
34,815,956 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,648 UART:
193,030 UART: Running Caliptra ROM ...
194,236 UART:
603,862 UART: [state] CFI Enabled
617,022 UART: [state] LifecycleState = Unprovisioned
618,975 UART: [state] DebugLocked = No
621,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,915 UART: [kat] SHA2-256
796,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,154 UART: [kat] ++
807,636 UART: [kat] sha1
818,583 UART: [kat] SHA2-256
821,300 UART: [kat] SHA2-384
826,229 UART: [kat] SHA2-512-ACC
828,596 UART: [kat] ECC-384
3,111,388 UART: [kat] HMAC-384Kdf
3,123,974 UART: [kat] LMS
4,314,069 UART: [kat] --
4,318,281 UART: [cold-reset] ++
4,319,457 UART: [fht] Storing FHT @ 0x50003400
4,331,652 UART: [idev] ++
4,332,218 UART: [idev] CDI.KEYID = 6
4,333,144 UART: [idev] SUBJECT.KEYID = 7
4,334,390 UART: [idev] UDS.KEYID = 0
4,335,371 ready_for_fw is high
4,335,573 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,442 UART: [idev] Erasing UDS.KEYID = 0
7,620,373 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,871 UART: [idev] --
7,645,489 UART: [ldev] ++
7,646,065 UART: [ldev] CDI.KEYID = 6
7,646,990 UART: [ldev] SUBJECT.KEYID = 5
7,648,209 UART: [ldev] AUTHORITY.KEYID = 7
7,649,518 UART: [ldev] FE.KEYID = 1
7,661,248 UART: [ldev] Erasing FE.KEYID = 1
10,954,058 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,295 UART: [ldev] --
13,316,237 UART: [fwproc] Waiting for Commands...
13,319,249 UART: [fwproc] Received command 0x46574c44
13,321,442 UART: [fwproc] Received Image of size 113844 bytes
17,372,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,453,510 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,522,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,839,100 >>> mbox cmd response: success
17,842,448 UART: [afmc] ++
17,843,065 UART: [afmc] CDI.KEYID = 6
17,843,968 UART: [afmc] SUBJECT.KEYID = 7
17,845,239 UART: [afmc] AUTHORITY.KEYID = 5
21,161,440 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,456,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,441 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,847 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,655 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,502,079 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,926 UART: [afmc] --
23,527,444 UART: [cold-reset] --
23,530,606 UART: [state] Locking Datavault
23,534,568 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,326 UART: [state] Locking ICCM
23,537,508 UART: [exit] Launching FMC @ 0x40000130
23,545,908 UART:
23,546,161 UART: Running Caliptra FMC ...
23,547,265 UART:
23,547,429 UART: [state] CFI Enabled
23,555,838 UART: [fht] FMC Alias Private Key: 7
25,887,093 UART: [art] Extend RT PCRs Done
25,888,316 UART: [art] Lock RT PCRs Done
25,890,149 UART: [art] Populate DV Done
25,895,394 UART: [fht] FMC Alias Private Key: 7
25,896,930 UART: [art] Derive CDI
25,897,669 UART: [art] Store in in slot 0x4
25,940,585 UART: [art] Derive Key Pair
25,941,621 UART: [art] Store priv key in slot 0x5
29,183,150 UART: [art] Derive Key Pair - Done
29,196,130 UART: [art] Signing Cert with AUTHO
29,197,458 UART: RITY.KEYID = 7
31,477,042 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,571 UART: [art] PUB.X = E1D4D707FB7589BB795B3865AA8D5F25073B55C8090BD969466B61253BFECAD9BA5398706878F1656E94BD0442F012A7
31,485,790 UART: [art] PUB.Y = 904FE23C2FC452976FF2B68017DC02A0CE3F33FDC66FC64AE876BE64A34F7D71CF6325FAA705B25923E54FEA5A144F34
31,493,033 UART: [art] SIG.R = 4A6A1B6DE77C2C8F2879792E419137A99C40BAB5B77621D18E1DD710091123C72B654D11E08ED3A53715AF40ECB5417C
31,500,437 UART: [art] SIG.S = 378499119AC4E8B15C5982755B940C52D6C03ECF5EC2D1FE4868CB80C1DD4CF502AA7B9EA98FFBE3CCAAE54FD6058C0C
32,805,660 UART: Caliptra RT
32,806,374 UART: [state] CFI Enabled
32,925,219 UART: [rt] RT listening for mailbox commands...
32,927,126 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
32,957,893 UART: [rt]cmd =0x44504543, len=40
32,983,590 >>> mbox cmd response data (40 bytes)
32,984,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,015,559 UART: [rt]cmd =0x44504543, len=96
33,055,764 >>> mbox cmd response data (56 bytes)
33,056,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,087,135 UART: [rt]cmd =0x44504543, len=96
33,128,298 >>> mbox cmd response data (56 bytes)
33,129,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,159,641 UART: [rt]cmd =0x44504543, len=96
33,200,371 >>> mbox cmd response data (56 bytes)
33,201,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,231,795 UART: [rt]cmd =0x44504543, len=96
33,273,530 >>> mbox cmd response data (56 bytes)
33,274,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,304,752 UART: [rt]cmd =0x44504543, len=96
33,345,766 >>> mbox cmd response data (56 bytes)
33,346,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,377,010 UART: [rt]cmd =0x44504543, len=96
33,418,512 >>> mbox cmd response data (56 bytes)
33,419,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,449,745 UART: [rt]cmd =0x44504543, len=96
33,491,727 >>> mbox cmd response data (56 bytes)
33,492,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,523,096 UART: [rt]cmd =0x44504543, len=96
33,566,433 >>> mbox cmd response data (56 bytes)
33,567,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,597,773 UART: [rt]cmd =0x44504543, len=96
33,640,019 >>> mbox cmd response data (56 bytes)
33,640,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,671,030 UART: [rt]cmd =0x44504543, len=96
33,714,450 >>> mbox cmd response data (56 bytes)
33,715,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,745,755 UART: [rt]cmd =0x44504543, len=96
33,788,425 >>> mbox cmd response data (56 bytes)
33,789,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,819,681 UART: [rt]cmd =0x44504543, len=96
33,862,581 >>> mbox cmd response data (56 bytes)
33,863,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,893,672 UART: [rt]cmd =0x44504543, len=96
33,937,427 >>> mbox cmd response data (56 bytes)
33,938,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,968,632 UART: [rt]cmd =0x44504543, len=96
34,012,872 >>> mbox cmd response data (56 bytes)
34,013,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,044,189 UART: [rt]cmd =0x44504543, len=96
34,088,901 >>> mbox cmd response data (56 bytes)
34,089,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,119,925 UART: [rt]cmd =0x44504543, len=96
34,126,122 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,134,829 ready_for_fw is high
4,135,376 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,400 >>> mbox cmd response: success
23,710,922 UART:
23,711,318 UART: Running Caliptra FMC ...
23,712,464 UART:
23,712,628 UART: [state] CFI Enabled
23,720,573 UART: [fht] FMC Alias Private Key: 7
26,051,264 UART: [art] Extend RT PCRs Done
26,052,492 UART: [art] Lock RT PCRs Done
26,054,129 UART: [art] Populate DV Done
26,059,283 UART: [fht] FMC Alias Private Key: 7
26,060,885 UART: [art] Derive CDI
26,061,721 UART: [art] Store in in slot 0x4
26,104,382 UART: [art] Derive Key Pair
26,105,383 UART: [art] Store priv key in slot 0x5
29,347,689 UART: [art] Derive Key Pair - Done
29,360,634 UART: [art] Signing Cert with AUTHO
29,361,946 UART: RITY.KEYID = 7
31,641,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,918 UART: [art] PUB.X = 7D1CF4053419AF82E895D613AC1753BF8A68C4DEABDEAA3F5AD3D2889A78995CD70E18A8794F598D3FDABB1E3998C64B
31,650,027 UART: [art] PUB.Y = F1EE213B083B0AA2F9B65ACE71EC2D702D005615DD64FB21259948132CCDCC622BB2614601C3FBBFEE8D188041B6F3EA
31,657,277 UART: [art] SIG.R = F9DCE331DE28CF0786503C4BA25CAC2DCD7805A1BE61DE3C80C6B8949BD58138A61F4C8E2C36D15512CAF78500E74D58
31,664,674 UART: [art] SIG.S = AD3B0936A063BDEDFBF4D02EC9C8AABA82E9A2CCCE24E12D9CF8F566001D20B65E49F69DE79BDF2D91C575852FEB1748
32,971,057 UART: Caliptra RT
32,971,769 UART: [state] CFI Enabled
33,088,801 UART: [rt] RT listening for mailbox commands...
33,090,727 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,121,367 UART: [rt]cmd =0x44504543, len=40
33,147,150 >>> mbox cmd response data (40 bytes)
33,148,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,178,907 UART: [rt]cmd =0x44504543, len=96
33,219,874 >>> mbox cmd response data (56 bytes)
33,220,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,251,033 UART: [rt]cmd =0x44504543, len=96
33,291,836 >>> mbox cmd response data (56 bytes)
33,292,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,323,042 UART: [rt]cmd =0x44504543, len=96
33,363,923 >>> mbox cmd response data (56 bytes)
33,364,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,395,176 UART: [rt]cmd =0x44504543, len=96
33,436,285 >>> mbox cmd response data (56 bytes)
33,437,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,467,449 UART: [rt]cmd =0x44504543, len=96
33,509,469 >>> mbox cmd response data (56 bytes)
33,510,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,540,758 UART: [rt]cmd =0x44504543, len=96
33,582,734 >>> mbox cmd response data (56 bytes)
33,583,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,614,058 UART: [rt]cmd =0x44504543, len=96
33,656,133 >>> mbox cmd response data (56 bytes)
33,656,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,687,493 UART: [rt]cmd =0x44504543, len=96
33,729,784 >>> mbox cmd response data (56 bytes)
33,730,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,761,031 UART: [rt]cmd =0x44504543, len=96
33,803,371 >>> mbox cmd response data (56 bytes)
33,804,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,834,792 UART: [rt]cmd =0x44504543, len=96
33,878,048 >>> mbox cmd response data (56 bytes)
33,878,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,909,237 UART: [rt]cmd =0x44504543, len=96
33,952,310 >>> mbox cmd response data (56 bytes)
33,953,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,983,556 UART: [rt]cmd =0x44504543, len=96
34,027,814 >>> mbox cmd response data (56 bytes)
34,028,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,059,159 UART: [rt]cmd =0x44504543, len=96
34,103,038 >>> mbox cmd response data (56 bytes)
34,103,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,134,445 UART: [rt]cmd =0x44504543, len=96
34,178,000 >>> mbox cmd response data (56 bytes)
34,178,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,209,293 UART: [rt]cmd =0x44504543, len=96
34,253,810 >>> mbox cmd response data (56 bytes)
34,254,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,284,829 UART: [rt]cmd =0x44504543, len=96
34,291,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
192,114 UART:
192,490 UART: Running Caliptra ROM ...
193,686 UART:
193,841 UART: [state] CFI Enabled
265,869 UART: [state] LifecycleState = Unprovisioned
267,567 UART: [state] DebugLocked = No
270,242 UART: [state] WD Timer not started. Device not locked for debugging
274,277 UART: [kat] SHA2-256
453,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,978 UART: [kat] ++
465,514 UART: [kat] sha1
476,464 UART: [kat] SHA2-256
479,536 UART: [kat] SHA2-384
485,809 UART: [kat] SHA2-512-ACC
488,815 UART: [kat] ECC-384
2,951,000 UART: [kat] HMAC-384Kdf
2,972,069 UART: [kat] LMS
3,501,491 UART: [kat] --
3,505,415 UART: [cold-reset] ++
3,506,352 UART: [fht] FHT @ 0x50003400
3,517,541 UART: [idev] ++
3,518,111 UART: [idev] CDI.KEYID = 6
3,519,036 UART: [idev] SUBJECT.KEYID = 7
3,520,216 UART: [idev] UDS.KEYID = 0
3,521,141 ready_for_fw is high
3,521,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,314 UART: [idev] Erasing UDS.KEYID = 0
6,028,151 UART: [idev] Sha1 KeyId Algorithm
6,050,036 UART: [idev] --
6,053,557 UART: [ldev] ++
6,054,133 UART: [ldev] CDI.KEYID = 6
6,055,049 UART: [ldev] SUBJECT.KEYID = 5
6,056,214 UART: [ldev] AUTHORITY.KEYID = 7
6,057,465 UART: [ldev] FE.KEYID = 1
6,100,304 UART: [ldev] Erasing FE.KEYID = 1
8,602,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,185 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,061 UART: [ldev] --
10,415,274 UART: [fwproc] Wait for Commands...
10,418,018 UART: [fwproc] Recv command 0x46574c44
10,420,058 UART: [fwproc] Recv'd Img size: 114168 bytes
13,823,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,061 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,279,781 >>> mbox cmd response: success
14,283,267 UART: [afmc] ++
14,283,886 UART: [afmc] CDI.KEYID = 6
14,284,773 UART: [afmc] SUBJECT.KEYID = 7
14,285,875 UART: [afmc] AUTHORITY.KEYID = 5
16,826,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,617 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,565,368 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,581,419 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,597,295 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,889 UART: [afmc] --
18,623,268 UART: [cold-reset] --
18,626,961 UART: [state] Locking Datavault
18,631,127 UART: [state] Locking PCR0, PCR1 and PCR31
18,632,837 UART: [state] Locking ICCM
18,635,369 UART: [exit] Launching FMC @ 0x40000130
18,643,832 UART:
18,644,084 UART: Running Caliptra FMC ...
18,645,195 UART:
18,645,353 UART: [state] CFI Enabled
18,706,203 UART: [fht] FMC Alias Private Key: 7
20,470,297 UART: [art] Extend RT PCRs Done
20,471,516 UART: [art] Lock RT PCRs Done
20,472,898 UART: [art] Populate DV Done
20,478,251 UART: [fht] FMC Alias Private Key: 7
20,479,840 UART: [art] Derive CDI
20,480,579 UART: [art] Store in in slot 0x4
20,538,253 UART: [art] Derive Key Pair
20,539,290 UART: [art] Store priv key in slot 0x5
23,002,517 UART: [art] Derive Key Pair - Done
23,015,905 UART: [art] Signing Cert with AUTHO
23,017,221 UART: RITY.KEYID = 7
24,728,401 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,921 UART: [art] PUB.X = A4C0ABF3B2450946E4191F51B3494580AF21DE2FF09952CA7758B0691C2D6B406817064467685051BACEE9A47A2A35AC
24,737,127 UART: [art] PUB.Y = C2F3FBEA62F97898ACC2CC612DCD4F6B4414C9EA7AD47BE7E7B441A593D81BC318BB989E42253323DBA97BB28DF675E3
24,744,426 UART: [art] SIG.R = 4ECE72814F97BC388E43AF08011CCCAB8F41B67BEBBA07F3523D27CAD3449465BF9FDAD9546B67D00835B812B3917155
24,751,863 UART: [art] SIG.S = 8E8A80174201B719D7E2EFCD2F551116AA611756D3E84E4F240143ACB284597ACFFDE73E08FAFA921AD040DAA8C36F70
25,730,962 UART: Caliptra RT
25,731,668 UART: [state] CFI Enabled
25,896,337 UART: [rt] RT listening for mailbox commands...
25,898,252 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,929,033 UART: [rt]cmd =0x44504543, len=40
25,970,919 >>> mbox cmd response data (40 bytes)
25,972,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,002,880 UART: [rt]cmd =0x44504543, len=96
26,062,361 >>> mbox cmd response data (56 bytes)
26,063,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,093,712 UART: [rt]cmd =0x44504543, len=96
26,169,765 >>> mbox cmd response data (56 bytes)
26,170,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,201,175 UART: [rt]cmd =0x44504543, len=96
26,276,111 >>> mbox cmd response data (56 bytes)
26,276,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,307,522 UART: [rt]cmd =0x44504543, len=96
26,383,401 >>> mbox cmd response data (56 bytes)
26,384,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,414,824 UART: [rt]cmd =0x44504543, len=96
26,489,719 >>> mbox cmd response data (56 bytes)
26,490,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,520,915 UART: [rt]cmd =0x44504543, len=96
26,596,069 >>> mbox cmd response data (56 bytes)
26,596,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,627,603 UART: [rt]cmd =0x44504543, len=96
26,702,736 >>> mbox cmd response data (56 bytes)
26,703,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,734,277 UART: [rt]cmd =0x44504543, len=96
26,809,726 >>> mbox cmd response data (56 bytes)
26,810,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,841,136 UART: [rt]cmd =0x44504543, len=96
26,916,066 >>> mbox cmd response data (56 bytes)
26,916,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,947,308 UART: [rt]cmd =0x44504543, len=96
27,023,134 >>> mbox cmd response data (56 bytes)
27,023,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,054,337 UART: [rt]cmd =0x44504543, len=96
27,129,629 >>> mbox cmd response data (56 bytes)
27,130,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,161,043 UART: [rt]cmd =0x44504543, len=96
27,236,902 >>> mbox cmd response data (56 bytes)
27,237,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,268,147 UART: [rt]cmd =0x44504543, len=96
27,343,296 >>> mbox cmd response data (56 bytes)
27,344,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,374,608 UART: [rt]cmd =0x44504543, len=96
27,449,891 >>> mbox cmd response data (56 bytes)
27,450,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,481,224 UART: [rt]cmd =0x44504543, len=96
27,556,771 >>> mbox cmd response data (56 bytes)
27,557,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,588,078 UART: [rt]cmd =0x44504543, len=96
27,594,376 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,383,117 ready_for_fw is high
3,383,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,053,433 >>> mbox cmd response: success
18,343,921 UART:
18,344,334 UART: Running Caliptra FMC ...
18,345,429 UART:
18,345,582 UART: [state] CFI Enabled
18,408,868 UART: [fht] FMC Alias Private Key: 7
20,172,495 UART: [art] Extend RT PCRs Done
20,173,721 UART: [art] Lock RT PCRs Done
20,175,646 UART: [art] Populate DV Done
20,181,058 UART: [fht] FMC Alias Private Key: 7
20,182,603 UART: [art] Derive CDI
20,183,338 UART: [art] Store in in slot 0x4
20,241,509 UART: [art] Derive Key Pair
20,242,550 UART: [art] Store priv key in slot 0x5
22,705,376 UART: [art] Derive Key Pair - Done
22,718,273 UART: [art] Signing Cert with AUTHO
22,719,574 UART: RITY.KEYID = 7
24,430,772 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,293 UART: [art] PUB.X = 7C9A6E4E5CBB6A3F7CD93E9441B209D019B280635C17186ACCB5975AD18AD46A6CEC86A50C495FD9A2B10E54B95B96C2
24,439,580 UART: [art] PUB.Y = A31FFC498F74851757F20746E6453897DF1715144D6100CD7B9B11D40AA5A18BABAB549A3735563338696FB2FF2ABF7D
24,446,803 UART: [art] SIG.R = 81B744DD4569B7A1D125BB5E730B4AD0A605215248CC5AA370575B5318D4379BE625FFF0554C52CA9BDE0A37B36A8843
24,454,195 UART: [art] SIG.S = F2013F24EC72E0EE844A3E7C7E57590FB3F46A7CFFC71E56F13A6DCCF3E72338421CC4C5AB4A94495619AD29AC444CD0
25,432,887 UART: Caliptra RT
25,433,603 UART: [state] CFI Enabled
25,597,329 UART: [rt] RT listening for mailbox commands...
25,599,246 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,630,135 UART: [rt]cmd =0x44504543, len=40
25,672,566 >>> mbox cmd response data (40 bytes)
25,673,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,704,250 UART: [rt]cmd =0x44504543, len=96
25,763,894 >>> mbox cmd response data (56 bytes)
25,764,636 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,795,277 UART: [rt]cmd =0x44504543, len=96
25,871,065 >>> mbox cmd response data (56 bytes)
25,871,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,902,298 UART: [rt]cmd =0x44504543, len=96
25,977,649 >>> mbox cmd response data (56 bytes)
25,978,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,009,177 UART: [rt]cmd =0x44504543, len=96
26,084,257 >>> mbox cmd response data (56 bytes)
26,084,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,115,409 UART: [rt]cmd =0x44504543, len=96
26,192,100 >>> mbox cmd response data (56 bytes)
26,192,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,223,309 UART: [rt]cmd =0x44504543, len=96
26,298,840 >>> mbox cmd response data (56 bytes)
26,299,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,448 UART: [rt]cmd =0x44504543, len=96
26,405,976 >>> mbox cmd response data (56 bytes)
26,406,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,437,366 UART: [rt]cmd =0x44504543, len=96
26,513,038 >>> mbox cmd response data (56 bytes)
26,513,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,544,153 UART: [rt]cmd =0x44504543, len=96
26,619,343 >>> mbox cmd response data (56 bytes)
26,620,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,650,761 UART: [rt]cmd =0x44504543, len=96
26,726,691 >>> mbox cmd response data (56 bytes)
26,727,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,758,002 UART: [rt]cmd =0x44504543, len=96
26,833,243 >>> mbox cmd response data (56 bytes)
26,833,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,864,557 UART: [rt]cmd =0x44504543, len=96
26,940,132 >>> mbox cmd response data (56 bytes)
26,940,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,971,381 UART: [rt]cmd =0x44504543, len=96
27,046,961 >>> mbox cmd response data (56 bytes)
27,047,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,078,391 UART: [rt]cmd =0x44504543, len=96
27,153,711 >>> mbox cmd response data (56 bytes)
27,154,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,184,926 UART: [rt]cmd =0x44504543, len=96
27,260,166 >>> mbox cmd response data (56 bytes)
27,260,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,291,415 UART: [rt]cmd =0x44504543, len=96
27,298,084 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,783 writing to cptra_bootfsm_go
193,064 UART:
193,428 UART: Running Caliptra ROM ...
194,578 UART:
604,356 UART: [state] CFI Enabled
619,226 UART: [state] LifecycleState = Unprovisioned
621,094 UART: [state] DebugLocked = No
623,685 UART: [state] WD Timer not started. Device not locked for debugging
626,864 UART: [kat] SHA2-256
805,967 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,568 UART: [kat] ++
818,096 UART: [kat] sha1
828,218 UART: [kat] SHA2-256
831,191 UART: [kat] SHA2-384
837,480 UART: [kat] SHA2-512-ACC
840,491 UART: [kat] ECC-384
3,284,159 UART: [kat] HMAC-384Kdf
3,297,700 UART: [kat] LMS
3,827,160 UART: [kat] --
3,831,472 UART: [cold-reset] ++
3,832,984 UART: [fht] FHT @ 0x50003400
3,844,753 UART: [idev] ++
3,845,312 UART: [idev] CDI.KEYID = 6
3,846,197 UART: [idev] SUBJECT.KEYID = 7
3,847,435 UART: [idev] UDS.KEYID = 0
3,848,335 ready_for_fw is high
3,848,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,018 UART: [idev] Erasing UDS.KEYID = 0
6,320,559 UART: [idev] Sha1 KeyId Algorithm
6,342,816 UART: [idev] --
6,347,051 UART: [ldev] ++
6,347,638 UART: [ldev] CDI.KEYID = 6
6,348,522 UART: [ldev] SUBJECT.KEYID = 5
6,349,635 UART: [ldev] AUTHORITY.KEYID = 7
6,350,974 UART: [ldev] FE.KEYID = 1
6,363,808 UART: [ldev] Erasing FE.KEYID = 1
8,836,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,077 UART: [ldev] --
10,627,709 UART: [fwproc] Wait for Commands...
10,630,880 UART: [fwproc] Recv command 0x46574c44
10,632,969 UART: [fwproc] Recv'd Img size: 114168 bytes
14,042,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,506,665 >>> mbox cmd response: success
14,511,698 UART: [afmc] ++
14,512,294 UART: [afmc] CDI.KEYID = 6
14,513,209 UART: [afmc] SUBJECT.KEYID = 7
14,514,373 UART: [afmc] AUTHORITY.KEYID = 5
17,016,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,738,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,740,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,755,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,772,015 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,787,915 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,811,064 UART: [afmc] --
18,814,118 UART: [cold-reset] --
18,816,949 UART: [state] Locking Datavault
18,822,840 UART: [state] Locking PCR0, PCR1 and PCR31
18,824,534 UART: [state] Locking ICCM
18,826,856 UART: [exit] Launching FMC @ 0x40000130
18,835,309 UART:
18,835,544 UART: Running Caliptra FMC ...
18,836,645 UART:
18,836,803 UART: [state] CFI Enabled
18,845,067 UART: [fht] FMC Alias Private Key: 7
20,602,395 UART: [art] Extend RT PCRs Done
20,603,615 UART: [art] Lock RT PCRs Done
20,605,565 UART: [art] Populate DV Done
20,610,810 UART: [fht] FMC Alias Private Key: 7
20,612,524 UART: [art] Derive CDI
20,613,261 UART: [art] Store in in slot 0x4
20,655,852 UART: [art] Derive Key Pair
20,656,852 UART: [art] Store priv key in slot 0x5
23,083,563 UART: [art] Derive Key Pair - Done
23,096,252 UART: [art] Signing Cert with AUTHO
23,097,561 UART: RITY.KEYID = 7
24,803,423 UART: [art] Erasing AUTHORITY.KEYID = 7
24,804,938 UART: [art] PUB.X = 73156FAAC3D2B8593BFEF2B3A01B5AB1D597F141494373FE3A1B26AB482533CEA0748102A2FAD538FBF8427223B95937
24,812,196 UART: [art] PUB.Y = 8EBB18721B395D6F09C0903FA184C447C51A6172B36B4EB37EDBA05824FE0B4AF061CA5ADB71B05AB31CEFB78D44F85C
24,819,491 UART: [art] SIG.R = 02E811E96B768416D264033F2AD419B86C50360B41CBABE3109EA4DA894AAF2C2380BBE4E3AE85C358CC0D342FBFB0A2
24,826,944 UART: [art] SIG.S = 7195247004C072F140F637ECDAD8814A7BE19F9072B87B3EB7C571D88AA3B188E8B78AC464995830F3FA51AC0B031368
25,805,506 UART: Caliptra RT
25,806,194 UART: [state] CFI Enabled
25,922,710 UART: [rt] RT listening for mailbox commands...
25,924,618 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,955,450 UART: [rt]cmd =0x44504543, len=40
25,981,619 >>> mbox cmd response data (40 bytes)
25,982,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,013,504 UART: [rt]cmd =0x44504543, len=96
26,053,151 >>> mbox cmd response data (56 bytes)
26,053,904 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,084,222 UART: [rt]cmd =0x44504543, len=96
26,124,892 >>> mbox cmd response data (56 bytes)
26,125,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,156,206 UART: [rt]cmd =0x44504543, len=96
26,197,089 >>> mbox cmd response data (56 bytes)
26,197,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,228,175 UART: [rt]cmd =0x44504543, len=96
26,268,953 >>> mbox cmd response data (56 bytes)
26,269,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,300,352 UART: [rt]cmd =0x44504543, len=96
26,341,975 >>> mbox cmd response data (56 bytes)
26,342,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,373,118 UART: [rt]cmd =0x44504543, len=96
26,415,129 >>> mbox cmd response data (56 bytes)
26,415,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,446,244 UART: [rt]cmd =0x44504543, len=96
26,488,818 >>> mbox cmd response data (56 bytes)
26,489,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,520,107 UART: [rt]cmd =0x44504543, len=96
26,562,630 >>> mbox cmd response data (56 bytes)
26,563,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,593,921 UART: [rt]cmd =0x44504543, len=96
26,636,391 >>> mbox cmd response data (56 bytes)
26,637,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,667,637 UART: [rt]cmd =0x44504543, len=96
26,710,704 >>> mbox cmd response data (56 bytes)
26,711,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,741,899 UART: [rt]cmd =0x44504543, len=96
26,785,072 >>> mbox cmd response data (56 bytes)
26,785,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,816,183 UART: [rt]cmd =0x44504543, len=96
26,859,385 >>> mbox cmd response data (56 bytes)
26,860,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,890,527 UART: [rt]cmd =0x44504543, len=96
26,934,486 >>> mbox cmd response data (56 bytes)
26,935,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,965,623 UART: [rt]cmd =0x44504543, len=96
27,009,634 >>> mbox cmd response data (56 bytes)
27,010,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,040,896 UART: [rt]cmd =0x44504543, len=96
27,085,080 >>> mbox cmd response data (56 bytes)
27,085,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,116,523 UART: [rt]cmd =0x44504543, len=96
27,123,206 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
3,695,714 ready_for_fw is high
3,696,094 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,262,588 >>> mbox cmd response: success
18,510,607 UART:
18,511,002 UART: Running Caliptra FMC ...
18,512,217 UART:
18,512,392 UART: [state] CFI Enabled
18,520,180 UART: [fht] FMC Alias Private Key: 7
20,276,775 UART: [art] Extend RT PCRs Done
20,278,012 UART: [art] Lock RT PCRs Done
20,279,704 UART: [art] Populate DV Done
20,284,954 UART: [fht] FMC Alias Private Key: 7
20,286,604 UART: [art] Derive CDI
20,287,421 UART: [art] Store in in slot 0x4
20,330,240 UART: [art] Derive Key Pair
20,331,282 UART: [art] Store priv key in slot 0x5
22,758,139 UART: [art] Derive Key Pair - Done
22,771,085 UART: [art] Signing Cert with AUTHO
22,772,415 UART: RITY.KEYID = 7
24,478,066 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,552 UART: [art] PUB.X = 5C0EB92B9D63C521D2EC3B8460A4E498B8CEBE302F10A64FB0150A61F182F109123405D95AF167CA9F3F6435027A647D
24,486,855 UART: [art] PUB.Y = 67BEB9D61B86971D4FD2A31D05F001E45B58F1AD61FD180DC17331B1652C532AAD5287B66D8DEA94B6CDA22EE9342B81
24,494,117 UART: [art] SIG.R = EA7B58110667FA2031C779D69BBCE6152DD89E912C55B4EDC828C585473EA5ADFAB4DF6282C4FCC19695D76A3564DF76
24,501,511 UART: [art] SIG.S = 912E72C2CA7C4C264FB4405EF7748FC68CC6D220821F90CD9C269A8EFAE906F4544C9A3A4D76EDAA58AC60158A7E45A0
25,479,697 UART: Caliptra RT
25,480,422 UART: [state] CFI Enabled
25,596,743 UART: [rt] RT listening for mailbox commands...
25,598,665 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,629,355 UART: [rt]cmd =0x44504543, len=40
25,655,123 >>> mbox cmd response data (40 bytes)
25,656,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,686,805 UART: [rt]cmd =0x44504543, len=96
25,726,698 >>> mbox cmd response data (56 bytes)
25,727,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,757,826 UART: [rt]cmd =0x44504543, len=96
25,798,147 >>> mbox cmd response data (56 bytes)
25,798,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,829,710 UART: [rt]cmd =0x44504543, len=96
25,870,491 >>> mbox cmd response data (56 bytes)
25,871,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,901,392 UART: [rt]cmd =0x44504543, len=96
25,942,983 >>> mbox cmd response data (56 bytes)
25,943,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,974,239 UART: [rt]cmd =0x44504543, len=96
26,015,993 >>> mbox cmd response data (56 bytes)
26,016,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,047,088 UART: [rt]cmd =0x44504543, len=96
26,088,578 >>> mbox cmd response data (56 bytes)
26,089,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,119,787 UART: [rt]cmd =0x44504543, len=96
26,161,929 >>> mbox cmd response data (56 bytes)
26,162,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,193,253 UART: [rt]cmd =0x44504543, len=96
26,235,387 >>> mbox cmd response data (56 bytes)
26,236,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,266,530 UART: [rt]cmd =0x44504543, len=96
26,309,568 >>> mbox cmd response data (56 bytes)
26,310,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,340,983 UART: [rt]cmd =0x44504543, len=96
26,384,235 >>> mbox cmd response data (56 bytes)
26,385,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,415,478 UART: [rt]cmd =0x44504543, len=96
26,458,356 >>> mbox cmd response data (56 bytes)
26,459,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,489,632 UART: [rt]cmd =0x44504543, len=96
26,532,272 >>> mbox cmd response data (56 bytes)
26,532,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,563,476 UART: [rt]cmd =0x44504543, len=96
26,607,086 >>> mbox cmd response data (56 bytes)
26,607,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,638,370 UART: [rt]cmd =0x44504543, len=96
26,682,523 >>> mbox cmd response data (56 bytes)
26,683,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,713,975 UART: [rt]cmd =0x44504543, len=96
26,758,663 >>> mbox cmd response data (56 bytes)
26,759,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,789,681 UART: [rt]cmd =0x44504543, len=96
26,796,286 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,984 UART:
192,363 UART: Running Caliptra ROM ...
193,471 UART:
193,615 UART: [state] CFI Enabled
265,047 UART: [state] LifecycleState = Unprovisioned
267,419 UART: [state] DebugLocked = No
269,744 UART: [state] WD Timer not started. Device not locked for debugging
274,152 UART: [kat] SHA2-256
464,021 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,775 UART: [kat] ++
475,267 UART: [kat] sha1
487,777 UART: [kat] SHA2-256
490,782 UART: [kat] SHA2-384
496,206 UART: [kat] SHA2-512-ACC
498,790 UART: [kat] ECC-384
2,947,441 UART: [kat] HMAC-384Kdf
2,971,973 UART: [kat] LMS
3,503,740 UART: [kat] --
3,509,009 UART: [cold-reset] ++
3,511,086 UART: [fht] FHT @ 0x50003400
3,522,781 UART: [idev] ++
3,523,484 UART: [idev] CDI.KEYID = 6
3,524,516 UART: [idev] SUBJECT.KEYID = 7
3,525,617 UART: [idev] UDS.KEYID = 0
3,526,543 ready_for_fw is high
3,526,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,357 UART: [idev] Erasing UDS.KEYID = 0
6,028,386 UART: [idev] Sha1 KeyId Algorithm
6,051,343 UART: [idev] --
6,056,897 UART: [ldev] ++
6,057,595 UART: [ldev] CDI.KEYID = 6
6,058,519 UART: [ldev] SUBJECT.KEYID = 5
6,059,681 UART: [ldev] AUTHORITY.KEYID = 7
6,060,884 UART: [ldev] FE.KEYID = 1
6,100,652 UART: [ldev] Erasing FE.KEYID = 1
8,606,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,139 UART: [ldev] --
10,412,187 UART: [fwproc] Wait for Commands...
10,414,284 UART: [fwproc] Recv command 0x46574c44
10,416,536 UART: [fwproc] Recv'd Img size: 114168 bytes
13,855,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,772 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,592,732 >>> mbox cmd response: success
14,596,146 UART: [afmc] ++
14,596,832 UART: [afmc] CDI.KEYID = 6
14,598,012 UART: [afmc] SUBJECT.KEYID = 7
14,599,541 UART: [afmc] AUTHORITY.KEYID = 5
17,133,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,854,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,856,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,871,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,886,745 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,901,768 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,924,994 UART: [afmc] --
18,927,978 UART: [cold-reset] --
18,932,720 UART: [state] Locking Datavault
18,938,094 UART: [state] Locking PCR0, PCR1 and PCR31
18,940,255 UART: [state] Locking ICCM
18,942,235 UART: [exit] Launching FMC @ 0x40000130
18,950,870 UART:
18,951,129 UART: Running Caliptra FMC ...
18,952,155 UART:
18,952,302 UART: [state] CFI Enabled
19,011,046 UART: [fht] FMC Alias Private Key: 7
20,775,323 UART: [art] Extend RT PCRs Done
20,776,553 UART: [art] Lock RT PCRs Done
20,778,052 UART: [art] Populate DV Done
20,783,358 UART: [fht] FMC Alias Private Key: 7
20,785,000 UART: [art] Derive CDI
20,785,742 UART: [art] Store in in slot 0x4
20,843,250 UART: [art] Derive Key Pair
20,844,275 UART: [art] Store priv key in slot 0x5
23,307,472 UART: [art] Derive Key Pair - Done
23,320,518 UART: [art] Signing Cert with AUTHO
23,321,845 UART: RITY.KEYID = 7
25,033,689 UART: [art] Erasing AUTHORITY.KEYID = 7
25,035,216 UART: [art] PUB.X = 6082E4E109C188632FCE7E861AA9B92469B153C537A3C4165C473AAB1AB17F7115D94C1A512927654267FE9DAAEBC6E8
25,042,483 UART: [art] PUB.Y = DE4CEA356273F2E5AF0E6A0FEB3E6ED7372981CFA46833A975D5B70D0C025FDFCAC15D2D614AD2CBCB1E299F233BAB80
25,049,802 UART: [art] SIG.R = D3BA1A429EBDA2C3E629AEDBD8D1AD6612E7314ACB473C0281DED5F13D3355D0EC902BA0BB3A1BD17F15A1A5206517E8
25,057,229 UART: [art] SIG.S = FDF6DCFFB2CBA04C56E46F3C20155A2164C4C026AE5A327B62566070BBAB1F4B229977D024A496D734C0D9F1CE7A5DF2
26,036,480 UART: Caliptra RT
26,037,173 UART: [state] CFI Enabled
26,201,038 UART: [rt] RT listening for mailbox commands...
26,202,951 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,233,580 UART: [rt]cmd =0x44504543, len=40
26,274,627 >>> mbox cmd response data (40 bytes)
26,275,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,306,422 UART: [rt]cmd =0x44504543, len=96
26,366,576 >>> mbox cmd response data (56 bytes)
26,367,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,909 UART: [rt]cmd =0x44504543, len=96
26,473,384 >>> mbox cmd response data (56 bytes)
26,474,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,504,570 UART: [rt]cmd =0x44504543, len=96
26,580,191 >>> mbox cmd response data (56 bytes)
26,580,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,611,402 UART: [rt]cmd =0x44504543, len=96
26,686,645 >>> mbox cmd response data (56 bytes)
26,687,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,717,896 UART: [rt]cmd =0x44504543, len=96
26,793,567 >>> mbox cmd response data (56 bytes)
26,794,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,824,826 UART: [rt]cmd =0x44504543, len=96
26,900,457 >>> mbox cmd response data (56 bytes)
26,901,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,931,667 UART: [rt]cmd =0x44504543, len=96
27,006,765 >>> mbox cmd response data (56 bytes)
27,007,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,038,056 UART: [rt]cmd =0x44504543, len=96
27,114,375 >>> mbox cmd response data (56 bytes)
27,115,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,145,531 UART: [rt]cmd =0x44504543, len=96
27,220,717 >>> mbox cmd response data (56 bytes)
27,221,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,252,102 UART: [rt]cmd =0x44504543, len=96
27,327,790 >>> mbox cmd response data (56 bytes)
27,328,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,358,937 UART: [rt]cmd =0x44504543, len=96
27,434,657 >>> mbox cmd response data (56 bytes)
27,435,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,465,911 UART: [rt]cmd =0x44504543, len=96
27,541,470 >>> mbox cmd response data (56 bytes)
27,542,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,572,763 UART: [rt]cmd =0x44504543, len=96
27,647,835 >>> mbox cmd response data (56 bytes)
27,648,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,678,876 UART: [rt]cmd =0x44504543, len=96
27,754,439 >>> mbox cmd response data (56 bytes)
27,755,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,785,479 UART: [rt]cmd =0x44504543, len=96
27,861,417 >>> mbox cmd response data (56 bytes)
27,862,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,892,696 UART: [rt]cmd =0x44504543, len=96
27,899,187 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,439,000 ready_for_fw is high
3,439,377 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,726,259 >>> mbox cmd response: success
19,008,815 UART:
19,009,254 UART: Running Caliptra FMC ...
19,010,363 UART:
19,010,535 UART: [state] CFI Enabled
19,075,775 UART: [fht] FMC Alias Private Key: 7
20,839,204 UART: [art] Extend RT PCRs Done
20,840,429 UART: [art] Lock RT PCRs Done
20,842,103 UART: [art] Populate DV Done
20,847,472 UART: [fht] FMC Alias Private Key: 7
20,849,067 UART: [art] Derive CDI
20,849,810 UART: [art] Store in in slot 0x4
20,907,666 UART: [art] Derive Key Pair
20,908,708 UART: [art] Store priv key in slot 0x5
23,371,682 UART: [art] Derive Key Pair - Done
23,384,571 UART: [art] Signing Cert with AUTHO
23,385,875 UART: RITY.KEYID = 7
25,097,675 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,189 UART: [art] PUB.X = 0B61A3712C45E7CDEB0B65C1AB92E95BE274C93C11D430646C79B4ED8677C953721FBE90775EB1087D5630752EBF9A3B
25,106,425 UART: [art] PUB.Y = 94DC4CBA4BBFDA9059CF641CA68213DB61E72FF691035FC58DF3FA004CC215413F957A50B99CEAD95C55CC89470126A1
25,113,680 UART: [art] SIG.R = 6AC47E1839F2FB03F8D785B8B05992CC39A139103E3135367FD47A2EEF9AF7E20D35A0F5125633CDAB97A472B9D0CF0F
25,121,070 UART: [art] SIG.S = 0631B6B19AACFA510EBFC36D4198305C37AE79337212A34418FC9503D2BDCB090A12ED6D1425FD886757E3C5DE7BA67C
26,100,715 UART: Caliptra RT
26,101,433 UART: [state] CFI Enabled
26,265,697 UART: [rt] RT listening for mailbox commands...
26,267,675 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,298,379 UART: [rt]cmd =0x44504543, len=40
26,339,664 >>> mbox cmd response data (40 bytes)
26,340,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,371,384 UART: [rt]cmd =0x44504543, len=96
26,431,300 >>> mbox cmd response data (56 bytes)
26,432,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,462,647 UART: [rt]cmd =0x44504543, len=96
26,538,004 >>> mbox cmd response data (56 bytes)
26,538,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,569,065 UART: [rt]cmd =0x44504543, len=96
26,644,745 >>> mbox cmd response data (56 bytes)
26,645,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,675,898 UART: [rt]cmd =0x44504543, len=96
26,751,616 >>> mbox cmd response data (56 bytes)
26,752,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,783,157 UART: [rt]cmd =0x44504543, len=96
26,858,985 >>> mbox cmd response data (56 bytes)
26,859,710 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,890,085 UART: [rt]cmd =0x44504543, len=96
26,965,336 >>> mbox cmd response data (56 bytes)
26,966,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,996,313 UART: [rt]cmd =0x44504543, len=96
27,072,836 >>> mbox cmd response data (56 bytes)
27,073,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,104,035 UART: [rt]cmd =0x44504543, len=96
27,179,052 >>> mbox cmd response data (56 bytes)
27,179,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,210,305 UART: [rt]cmd =0x44504543, len=96
27,286,665 >>> mbox cmd response data (56 bytes)
27,287,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,317,921 UART: [rt]cmd =0x44504543, len=96
27,393,396 >>> mbox cmd response data (56 bytes)
27,394,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,424,599 UART: [rt]cmd =0x44504543, len=96
27,500,335 >>> mbox cmd response data (56 bytes)
27,501,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,531,550 UART: [rt]cmd =0x44504543, len=96
27,607,178 >>> mbox cmd response data (56 bytes)
27,607,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,638,629 UART: [rt]cmd =0x44504543, len=96
27,714,251 >>> mbox cmd response data (56 bytes)
27,714,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,745,613 UART: [rt]cmd =0x44504543, len=96
27,821,546 >>> mbox cmd response data (56 bytes)
27,822,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,852,745 UART: [rt]cmd =0x44504543, len=96
27,927,908 >>> mbox cmd response data (56 bytes)
27,928,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,959,169 UART: [rt]cmd =0x44504543, len=96
27,965,630 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,901 writing to cptra_bootfsm_go
193,125 UART:
193,488 UART: Running Caliptra ROM ...
194,584 UART:
604,067 UART: [state] CFI Enabled
617,808 UART: [state] LifecycleState = Unprovisioned
620,177 UART: [state] DebugLocked = No
622,158 UART: [state] WD Timer not started. Device not locked for debugging
626,900 UART: [kat] SHA2-256
816,794 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,551 UART: [kat] ++
828,101 UART: [kat] sha1
839,473 UART: [kat] SHA2-256
842,487 UART: [kat] SHA2-384
849,754 UART: [kat] SHA2-512-ACC
852,343 UART: [kat] ECC-384
3,296,167 UART: [kat] HMAC-384Kdf
3,307,554 UART: [kat] LMS
3,839,375 UART: [kat] --
3,843,940 UART: [cold-reset] ++
3,845,799 UART: [fht] FHT @ 0x50003400
3,857,071 UART: [idev] ++
3,857,783 UART: [idev] CDI.KEYID = 6
3,858,839 UART: [idev] SUBJECT.KEYID = 7
3,859,947 UART: [idev] UDS.KEYID = 0
3,860,878 ready_for_fw is high
3,861,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,472 UART: [idev] Erasing UDS.KEYID = 0
6,338,729 UART: [idev] Sha1 KeyId Algorithm
6,360,693 UART: [idev] --
6,364,736 UART: [ldev] ++
6,365,473 UART: [ldev] CDI.KEYID = 6
6,366,394 UART: [ldev] SUBJECT.KEYID = 5
6,367,557 UART: [ldev] AUTHORITY.KEYID = 7
6,368,733 UART: [ldev] FE.KEYID = 1
6,381,056 UART: [ldev] Erasing FE.KEYID = 1
8,856,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,785 UART: [ldev] --
10,646,004 UART: [fwproc] Wait for Commands...
10,648,154 UART: [fwproc] Recv command 0x46574c44
10,650,459 UART: [fwproc] Recv'd Img size: 114168 bytes
14,099,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,645 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,834,413 >>> mbox cmd response: success
14,837,593 UART: [afmc] ++
14,838,298 UART: [afmc] CDI.KEYID = 6
14,839,541 UART: [afmc] SUBJECT.KEYID = 7
14,840,976 UART: [afmc] AUTHORITY.KEYID = 5
17,350,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,018 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,277 UART: [afmc] --
19,149,578 UART: [cold-reset] --
19,155,281 UART: [state] Locking Datavault
19,160,596 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,795 UART: [state] Locking ICCM
19,164,141 UART: [exit] Launching FMC @ 0x40000130
19,172,818 UART:
19,173,054 UART: Running Caliptra FMC ...
19,174,157 UART:
19,174,319 UART: [state] CFI Enabled
19,182,205 UART: [fht] FMC Alias Private Key: 7
20,939,611 UART: [art] Extend RT PCRs Done
20,940,848 UART: [art] Lock RT PCRs Done
20,942,590 UART: [art] Populate DV Done
20,948,167 UART: [fht] FMC Alias Private Key: 7
20,949,800 UART: [art] Derive CDI
20,950,628 UART: [art] Store in in slot 0x4
20,993,386 UART: [art] Derive Key Pair
20,994,389 UART: [art] Store priv key in slot 0x5
23,420,997 UART: [art] Derive Key Pair - Done
23,433,897 UART: [art] Signing Cert with AUTHO
23,435,234 UART: RITY.KEYID = 7
25,140,954 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,461 UART: [art] PUB.X = 2DE28457CD98B4A5EC0060691F4EEA84964B5E0970F9DDD6D7719093943010ED4263498B86D7E81E751D1213E857433C
25,149,706 UART: [art] PUB.Y = A5EDA46AD65C8D75118DB07ED796C82F4A1FACDD0F5935360B253F3BC40BB31C2FD460A2F805D5390B93A118FC1AC814
25,157,002 UART: [art] SIG.R = 16E045B224ECBC4A0BB284D96FD37E2A79C19F6BE204952A1A21A866B8B2E0C9CF633D817C3D758BD54704D8E01085C7
25,164,403 UART: [art] SIG.S = 6168AC0C8C87F47E894A43279B16C2EA4B8E1DF2DF15DF1006B06FD46C91BA09EEEC1378D2FC6195D11028E71A409A53
26,143,205 UART: Caliptra RT
26,143,934 UART: [state] CFI Enabled
26,262,025 UART: [rt] RT listening for mailbox commands...
26,263,938 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,294,861 UART: [rt]cmd =0x44504543, len=40
26,321,400 >>> mbox cmd response data (40 bytes)
26,322,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,353,610 UART: [rt]cmd =0x44504543, len=96
26,393,859 >>> mbox cmd response data (56 bytes)
26,394,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,425,109 UART: [rt]cmd =0x44504543, len=96
26,465,457 >>> mbox cmd response data (56 bytes)
26,466,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,496,838 UART: [rt]cmd =0x44504543, len=96
26,537,286 >>> mbox cmd response data (56 bytes)
26,537,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,568,532 UART: [rt]cmd =0x44504543, len=96
26,609,507 >>> mbox cmd response data (56 bytes)
26,610,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,640,749 UART: [rt]cmd =0x44504543, len=96
26,682,032 >>> mbox cmd response data (56 bytes)
26,682,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,713,266 UART: [rt]cmd =0x44504543, len=96
26,755,033 >>> mbox cmd response data (56 bytes)
26,755,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,785,995 UART: [rt]cmd =0x44504543, len=96
26,828,788 >>> mbox cmd response data (56 bytes)
26,829,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,860,172 UART: [rt]cmd =0x44504543, len=96
26,903,006 >>> mbox cmd response data (56 bytes)
26,903,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,934,441 UART: [rt]cmd =0x44504543, len=96
26,977,386 >>> mbox cmd response data (56 bytes)
26,978,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,008,560 UART: [rt]cmd =0x44504543, len=96
27,052,052 >>> mbox cmd response data (56 bytes)
27,052,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,083,158 UART: [rt]cmd =0x44504543, len=96
27,126,697 >>> mbox cmd response data (56 bytes)
27,127,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,158,119 UART: [rt]cmd =0x44504543, len=96
27,202,033 >>> mbox cmd response data (56 bytes)
27,202,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,233,184 UART: [rt]cmd =0x44504543, len=96
27,277,206 >>> mbox cmd response data (56 bytes)
27,277,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,308,628 UART: [rt]cmd =0x44504543, len=96
27,352,491 >>> mbox cmd response data (56 bytes)
27,353,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,383,931 UART: [rt]cmd =0x44504543, len=96
27,428,319 >>> mbox cmd response data (56 bytes)
27,429,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,459,439 UART: [rt]cmd =0x44504543, len=96
27,466,181 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,518 writing to cptra_bootfsm_go
3,758,190 ready_for_fw is high
3,758,599 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,308 >>> mbox cmd response: success
19,212,746 UART:
19,213,144 UART: Running Caliptra FMC ...
19,214,277 UART:
19,214,437 UART: [state] CFI Enabled
19,222,315 UART: [fht] FMC Alias Private Key: 7
20,979,120 UART: [art] Extend RT PCRs Done
20,980,359 UART: [art] Lock RT PCRs Done
20,982,446 UART: [art] Populate DV Done
20,988,202 UART: [fht] FMC Alias Private Key: 7
20,989,890 UART: [art] Derive CDI
20,990,659 UART: [art] Store in in slot 0x4
21,033,149 UART: [art] Derive Key Pair
21,034,158 UART: [art] Store priv key in slot 0x5
23,460,857 UART: [art] Derive Key Pair - Done
23,474,029 UART: [art] Signing Cert with AUTHO
23,475,391 UART: RITY.KEYID = 7
25,181,015 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,519 UART: [art] PUB.X = 2FC850AC684C5437CCF8F37F9E765C0200BBB94653940865BB2801E9126E1F1C6A05FF8AFE91C94A3EC88CFC31DF0F66
25,189,829 UART: [art] PUB.Y = CC5761654E1DC8D48619F00872C3AE1956624879A2317C1D78176483050832E7D74F98923FC5F240FF9BF9306FFADF94
25,197,020 UART: [art] SIG.R = AA291ECA4428339901BA44D7EF301BD08B24ACEFD27ACC835618889EFAAF722D30FD2AFBE6E89D900F1B63A32C4AB47C
25,204,467 UART: [art] SIG.S = 6521B95CD2FCD75A13E53DBEDD89B5190FD2B70C4FEC9D362810406B43FE37B601DFCB9E5ADD38A0B4CB6FB8C806FA72
26,183,216 UART: Caliptra RT
26,183,931 UART: [state] CFI Enabled
26,301,090 UART: [rt] RT listening for mailbox commands...
26,303,013 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,333,810 UART: [rt]cmd =0x44504543, len=40
26,360,291 >>> mbox cmd response data (40 bytes)
26,361,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,392,291 UART: [rt]cmd =0x44504543, len=96
26,432,108 >>> mbox cmd response data (56 bytes)
26,432,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,463,279 UART: [rt]cmd =0x44504543, len=96
26,504,500 >>> mbox cmd response data (56 bytes)
26,505,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,535,849 UART: [rt]cmd =0x44504543, len=96
26,576,945 >>> mbox cmd response data (56 bytes)
26,577,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,608,401 UART: [rt]cmd =0x44504543, len=96
26,649,526 >>> mbox cmd response data (56 bytes)
26,650,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,680,715 UART: [rt]cmd =0x44504543, len=96
26,722,920 >>> mbox cmd response data (56 bytes)
26,723,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,754,266 UART: [rt]cmd =0x44504543, len=96
26,796,248 >>> mbox cmd response data (56 bytes)
26,796,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,827,478 UART: [rt]cmd =0x44504543, len=96
26,870,652 >>> mbox cmd response data (56 bytes)
26,871,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,901,947 UART: [rt]cmd =0x44504543, len=96
26,944,456 >>> mbox cmd response data (56 bytes)
26,945,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,975,725 UART: [rt]cmd =0x44504543, len=96
27,018,124 >>> mbox cmd response data (56 bytes)
27,018,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,049,488 UART: [rt]cmd =0x44504543, len=96
27,092,699 >>> mbox cmd response data (56 bytes)
27,093,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,123,796 UART: [rt]cmd =0x44504543, len=96
27,166,636 >>> mbox cmd response data (56 bytes)
27,167,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,197,954 UART: [rt]cmd =0x44504543, len=96
27,241,593 >>> mbox cmd response data (56 bytes)
27,242,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,273,133 UART: [rt]cmd =0x44504543, len=96
27,317,048 >>> mbox cmd response data (56 bytes)
27,317,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,348,342 UART: [rt]cmd =0x44504543, len=96
27,392,431 >>> mbox cmd response data (56 bytes)
27,393,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,423,409 UART: [rt]cmd =0x44504543, len=96
27,467,914 >>> mbox cmd response data (56 bytes)
27,468,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,499,234 UART: [rt]cmd =0x44504543, len=96
27,505,532 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,878 UART: [kat] SHA2-512-ACC
896,779 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,476,387 UART: [cold-reset] ++
1,476,791 UART: [fht] Storing FHT @ 0x50003400
1,479,560 UART: [idev] ++
1,479,728 UART: [idev] CDI.KEYID = 6
1,480,088 UART: [idev] SUBJECT.KEYID = 7
1,480,512 UART: [idev] UDS.KEYID = 0
1,480,857 ready_for_fw is high
1,480,857 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,505,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,070 UART: [idev] --
1,515,055 UART: [ldev] ++
1,515,223 UART: [ldev] CDI.KEYID = 6
1,515,586 UART: [ldev] SUBJECT.KEYID = 5
1,516,012 UART: [ldev] AUTHORITY.KEYID = 7
1,516,475 UART: [ldev] FE.KEYID = 1
1,521,799 UART: [ldev] Erasing FE.KEYID = 1
1,546,878 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,724 UART: [ldev] --
1,585,989 UART: [fwproc] Waiting for Commands...
1,586,608 UART: [fwproc] Received command 0x46574c44
1,587,399 UART: [fwproc] Received Image of size 114168 bytes
2,883,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,646 >>> mbox cmd response: success
3,077,832 UART: [afmc] ++
3,078,000 UART: [afmc] CDI.KEYID = 6
3,078,362 UART: [afmc] SUBJECT.KEYID = 7
3,078,787 UART: [afmc] AUTHORITY.KEYID = 5
3,113,626 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,896 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,404 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,289 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,979 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,696 UART: [afmc] --
3,156,724 UART: [cold-reset] --
3,157,488 UART: [state] Locking Datavault
3,158,891 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,495 UART: [state] Locking ICCM
3,159,945 UART: [exit] Launching FMC @ 0x40000130
3,165,274 UART:
3,165,290 UART: Running Caliptra FMC ...
3,165,698 UART:
3,165,752 UART: [state] CFI Enabled
3,176,107 UART: [fht] FMC Alias Private Key: 7
3,284,588 UART: [art] Extend RT PCRs Done
3,285,016 UART: [art] Lock RT PCRs Done
3,286,916 UART: [art] Populate DV Done
3,295,279 UART: [fht] FMC Alias Private Key: 7
3,296,289 UART: [art] Derive CDI
3,296,569 UART: [art] Store in in slot 0x4
3,382,212 UART: [art] Derive Key Pair
3,382,572 UART: [art] Store priv key in slot 0x5
3,396,132 UART: [art] Derive Key Pair - Done
3,410,938 UART: [art] Signing Cert with AUTHO
3,411,418 UART: RITY.KEYID = 7
3,426,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,269 UART: [art] PUB.X = C2C20A1CD6CDFB0DAB36C5EDE174E24E93D659F90BC951769A3AF66A219F3D293B36A5EB4210559FEA505CBAAF0A63E3
3,434,049 UART: [art] PUB.Y = 573750486E96BCAFC0DFAA268BF70333F81B8792F67C3D584C32D7D03B3A7A1700DFAE4363C4B7CAC18C625EC347C532
3,440,984 UART: [art] SIG.R = EE842E2C9615BF8BDC95FC8A24C2DF2D49C63C28AF98FEADBE9A62FA087231819366E89C689CD63EACEF8E591D20D944
3,447,771 UART: [art] SIG.S = 1486518C6366D378A902E203B1B469D58B317D003F0CD319C0E2D5E0BFB56B595436E89DC5AEC5D02A4D44C6251A2E4B
3,471,817 UART: Caliptra RT
3,472,070 UART: [state] CFI Enabled
3,580,623 UART: [rt] RT listening for mailbox commands...
3,581,293 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,197 UART: [rt]cmd =0x44504543, len=40
3,637,042 >>> mbox cmd response data (40 bytes)
3,637,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,812 UART: [rt]cmd =0x44504543, len=96
3,707,331 >>> mbox cmd response data (56 bytes)
3,707,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,413 UART: [rt]cmd =0x44504543, len=96
3,778,557 >>> mbox cmd response data (56 bytes)
3,778,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,613 UART: [rt]cmd =0x44504543, len=96
3,849,749 >>> mbox cmd response data (56 bytes)
3,849,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,701 UART: [rt]cmd =0x44504543, len=96
3,920,761 >>> mbox cmd response data (56 bytes)
3,920,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,871 UART: [rt]cmd =0x44504543, len=96
3,992,525 >>> mbox cmd response data (56 bytes)
3,992,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,022,499 UART: [rt]cmd =0x44504543, len=96
4,065,067 >>> mbox cmd response data (56 bytes)
4,065,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,094,911 UART: [rt]cmd =0x44504543, len=96
4,136,075 >>> mbox cmd response data (56 bytes)
4,136,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,165,957 UART: [rt]cmd =0x44504543, len=96
4,208,037 >>> mbox cmd response data (56 bytes)
4,208,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,238,059 UART: [rt]cmd =0x44504543, len=96
4,281,507 >>> mbox cmd response data (56 bytes)
4,281,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,311,415 UART: [rt]cmd =0x44504543, len=96
4,353,973 >>> mbox cmd response data (56 bytes)
4,353,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,383,925 UART: [rt]cmd =0x44504543, len=96
4,426,219 >>> mbox cmd response data (56 bytes)
4,426,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,456,109 UART: [rt]cmd =0x44504543, len=96
4,498,907 >>> mbox cmd response data (56 bytes)
4,498,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,528,741 UART: [rt]cmd =0x44504543, len=96
4,572,951 >>> mbox cmd response data (56 bytes)
4,572,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,603,047 UART: [rt]cmd =0x44504543, len=96
4,646,477 >>> mbox cmd response data (56 bytes)
4,646,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,676,669 UART: [rt]cmd =0x44504543, len=96
4,721,259 >>> mbox cmd response data (56 bytes)
4,721,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,751,321 UART: [rt]cmd =0x44504543, len=96
4,758,492 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,703 ready_for_fw is high
1,361,703 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,866 >>> mbox cmd response: success
2,986,800 UART:
2,986,816 UART: Running Caliptra FMC ...
2,987,224 UART:
2,987,278 UART: [state] CFI Enabled
2,997,493 UART: [fht] FMC Alias Private Key: 7
3,105,776 UART: [art] Extend RT PCRs Done
3,106,204 UART: [art] Lock RT PCRs Done
3,107,480 UART: [art] Populate DV Done
3,115,757 UART: [fht] FMC Alias Private Key: 7
3,116,771 UART: [art] Derive CDI
3,117,051 UART: [art] Store in in slot 0x4
3,202,900 UART: [art] Derive Key Pair
3,203,260 UART: [art] Store priv key in slot 0x5
3,216,248 UART: [art] Derive Key Pair - Done
3,230,966 UART: [art] Signing Cert with AUTHO
3,231,446 UART: RITY.KEYID = 7
3,246,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,377 UART: [art] PUB.X = CDEA826C9BA60FC8F8446E7B5F4C38F55603AA17AB21AD3663399486FB610322DFE98282D6245D08F0ABEFD611324D93
3,254,143 UART: [art] PUB.Y = 2167AB8431A086EC5EC1258233FABAC9417BC15E30CB8D5DA21E89E71817083822E3539E3ACF1B253E654A9CE3B9BFFA
3,261,102 UART: [art] SIG.R = 020B378C32EA36374344F94880E66B6A4FE2ACB3E40310C4648A66D6FF4F1036E35F8AB419FB01594F3DCAE7B8467F50
3,267,864 UART: [art] SIG.S = B32669B688391C6BBA8B8025B933A6935A021BC7E92D8210A4389D249C16EB15CBDA3EA6C7EE840B4525096B74D817A0
3,291,354 UART: Caliptra RT
3,291,607 UART: [state] CFI Enabled
3,399,496 UART: [rt] RT listening for mailbox commands...
3,400,166 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,136 UART: [rt]cmd =0x44504543, len=40
3,456,437 >>> mbox cmd response data (40 bytes)
3,456,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,299 UART: [rt]cmd =0x44504543, len=96
3,526,352 >>> mbox cmd response data (56 bytes)
3,526,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,556,528 UART: [rt]cmd =0x44504543, len=96
3,597,688 >>> mbox cmd response data (56 bytes)
3,597,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,558 UART: [rt]cmd =0x44504543, len=96
3,668,316 >>> mbox cmd response data (56 bytes)
3,668,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,698,258 UART: [rt]cmd =0x44504543, len=96
3,739,488 >>> mbox cmd response data (56 bytes)
3,739,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,526 UART: [rt]cmd =0x44504543, len=96
3,810,538 >>> mbox cmd response data (56 bytes)
3,810,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,840,486 UART: [rt]cmd =0x44504543, len=96
3,882,026 >>> mbox cmd response data (56 bytes)
3,882,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,052 UART: [rt]cmd =0x44504543, len=96
3,955,284 >>> mbox cmd response data (56 bytes)
3,955,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,985,332 UART: [rt]cmd =0x44504543, len=96
4,027,228 >>> mbox cmd response data (56 bytes)
4,027,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,057,060 UART: [rt]cmd =0x44504543, len=96
4,099,702 >>> mbox cmd response data (56 bytes)
4,099,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,129,486 UART: [rt]cmd =0x44504543, len=96
4,172,510 >>> mbox cmd response data (56 bytes)
4,172,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,202,440 UART: [rt]cmd =0x44504543, len=96
4,245,810 >>> mbox cmd response data (56 bytes)
4,245,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,275,920 UART: [rt]cmd =0x44504543, len=96
4,319,336 >>> mbox cmd response data (56 bytes)
4,319,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,349,304 UART: [rt]cmd =0x44504543, len=96
4,393,662 >>> mbox cmd response data (56 bytes)
4,393,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,423,932 UART: [rt]cmd =0x44504543, len=96
4,468,244 >>> mbox cmd response data (56 bytes)
4,468,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,498,242 UART: [rt]cmd =0x44504543, len=96
4,542,512 >>> mbox cmd response data (56 bytes)
4,542,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,572,518 UART: [rt]cmd =0x44504543, len=96
4,579,495 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,548 UART: [kat] SHA2-256
892,486 UART: [kat] SHA2-384
895,211 UART: [kat] SHA2-512-ACC
897,112 UART: [kat] ECC-384
902,903 UART: [kat] HMAC-384Kdf
907,655 UART: [kat] LMS
1,475,851 UART: [kat] --
1,476,536 UART: [cold-reset] ++
1,477,048 UART: [fht] Storing FHT @ 0x50003400
1,479,769 UART: [idev] ++
1,479,937 UART: [idev] CDI.KEYID = 6
1,480,297 UART: [idev] SUBJECT.KEYID = 7
1,480,721 UART: [idev] UDS.KEYID = 0
1,481,066 ready_for_fw is high
1,481,066 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,413 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,185 UART: [idev] --
1,515,252 UART: [ldev] ++
1,515,420 UART: [ldev] CDI.KEYID = 6
1,515,783 UART: [ldev] SUBJECT.KEYID = 5
1,516,209 UART: [ldev] AUTHORITY.KEYID = 7
1,516,672 UART: [ldev] FE.KEYID = 1
1,522,132 UART: [ldev] Erasing FE.KEYID = 1
1,547,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,629 UART: [ldev] --
1,587,048 UART: [fwproc] Waiting for Commands...
1,587,667 UART: [fwproc] Received command 0x46574c44
1,588,458 UART: [fwproc] Received Image of size 114168 bytes
2,884,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,692 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,673 >>> mbox cmd response: success
3,077,837 UART: [afmc] ++
3,078,005 UART: [afmc] CDI.KEYID = 6
3,078,367 UART: [afmc] SUBJECT.KEYID = 7
3,078,792 UART: [afmc] AUTHORITY.KEYID = 5
3,113,985 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,145 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,758 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,448 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,339 UART: [afmc] --
3,157,229 UART: [cold-reset] --
3,157,875 UART: [state] Locking Datavault
3,158,964 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,568 UART: [state] Locking ICCM
3,160,142 UART: [exit] Launching FMC @ 0x40000130
3,165,471 UART:
3,165,487 UART: Running Caliptra FMC ...
3,165,895 UART:
3,166,038 UART: [state] CFI Enabled
3,176,701 UART: [fht] FMC Alias Private Key: 7
3,284,762 UART: [art] Extend RT PCRs Done
3,285,190 UART: [art] Lock RT PCRs Done
3,286,708 UART: [art] Populate DV Done
3,294,867 UART: [fht] FMC Alias Private Key: 7
3,295,843 UART: [art] Derive CDI
3,296,123 UART: [art] Store in in slot 0x4
3,381,848 UART: [art] Derive Key Pair
3,382,208 UART: [art] Store priv key in slot 0x5
3,395,506 UART: [art] Derive Key Pair - Done
3,410,470 UART: [art] Signing Cert with AUTHO
3,410,950 UART: RITY.KEYID = 7
3,426,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,043 UART: [art] PUB.X = 1DBA48400D40DD76FEEEEF0C92BAA14DB20E40E50F0C3821DCEFDC128431853132915946699A4DBB27D3F29BA0C0ACBD
3,433,818 UART: [art] PUB.Y = 894C3BAF189E87ECCE28EC9F7221AECF2B96D0138CBBF9E500F60BA5412660464930AD0616899CE7EA3AD4B287D8CA80
3,440,754 UART: [art] SIG.R = 04B43074802EE8A365C85E3433C9121304CA97FA474CA2B8A86969B428491878331E097CED24D63E327CD2AD05002892
3,447,480 UART: [art] SIG.S = BC5B5011281B3709EE5F5447352B67CC0A86A163B2881F1BB8D03F8589BB60FE8563A4367E68A993D099C0D78A176707
3,470,662 UART: Caliptra RT
3,471,007 UART: [state] CFI Enabled
3,579,246 UART: [rt] RT listening for mailbox commands...
3,579,916 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,140 UART: [rt]cmd =0x44504543, len=40
3,636,179 >>> mbox cmd response data (40 bytes)
3,636,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,309 UART: [rt]cmd =0x44504543, len=96
3,706,796 >>> mbox cmd response data (56 bytes)
3,706,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,836 UART: [rt]cmd =0x44504543, len=96
3,777,170 >>> mbox cmd response data (56 bytes)
3,777,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,866 UART: [rt]cmd =0x44504543, len=96
3,847,648 >>> mbox cmd response data (56 bytes)
3,847,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,920 UART: [rt]cmd =0x44504543, len=96
3,919,412 >>> mbox cmd response data (56 bytes)
3,919,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,298 UART: [rt]cmd =0x44504543, len=96
3,990,722 >>> mbox cmd response data (56 bytes)
3,990,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,818 UART: [rt]cmd =0x44504543, len=96
4,062,486 >>> mbox cmd response data (56 bytes)
4,062,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,194 UART: [rt]cmd =0x44504543, len=96
4,133,846 >>> mbox cmd response data (56 bytes)
4,133,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,163,706 UART: [rt]cmd =0x44504543, len=96
4,205,622 >>> mbox cmd response data (56 bytes)
4,205,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,235,664 UART: [rt]cmd =0x44504543, len=96
4,278,308 >>> mbox cmd response data (56 bytes)
4,278,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,308,398 UART: [rt]cmd =0x44504543, len=96
4,351,608 >>> mbox cmd response data (56 bytes)
4,351,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,381,360 UART: [rt]cmd =0x44504543, len=96
4,424,842 >>> mbox cmd response data (56 bytes)
4,424,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,454,778 UART: [rt]cmd =0x44504543, len=96
4,498,216 >>> mbox cmd response data (56 bytes)
4,498,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,528,356 UART: [rt]cmd =0x44504543, len=96
4,572,770 >>> mbox cmd response data (56 bytes)
4,572,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,602,734 UART: [rt]cmd =0x44504543, len=96
4,647,032 >>> mbox cmd response data (56 bytes)
4,647,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,677,182 UART: [rt]cmd =0x44504543, len=96
4,721,364 >>> mbox cmd response data (56 bytes)
4,721,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,751,416 UART: [rt]cmd =0x44504543, len=96
4,758,333 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,344 ready_for_fw is high
1,363,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,791 >>> mbox cmd response: success
2,985,471 UART:
2,985,487 UART: Running Caliptra FMC ...
2,985,895 UART:
2,986,038 UART: [state] CFI Enabled
2,996,255 UART: [fht] FMC Alias Private Key: 7
3,103,924 UART: [art] Extend RT PCRs Done
3,104,352 UART: [art] Lock RT PCRs Done
3,105,840 UART: [art] Populate DV Done
3,113,821 UART: [fht] FMC Alias Private Key: 7
3,114,759 UART: [art] Derive CDI
3,115,039 UART: [art] Store in in slot 0x4
3,200,760 UART: [art] Derive Key Pair
3,201,120 UART: [art] Store priv key in slot 0x5
3,214,740 UART: [art] Derive Key Pair - Done
3,229,460 UART: [art] Signing Cert with AUTHO
3,229,940 UART: RITY.KEYID = 7
3,245,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,111 UART: [art] PUB.X = A51009720646C6020CE78A02CFC8382400F8D8CE35104380200F999430645E1AE9B686A9DD97370C10BDC0A351372AD9
3,252,830 UART: [art] PUB.Y = 5B6D6656D74871E9DE6E39E5EA1B62CC9274F32A8A13F3EB9C69599ECA432D8420E09D277A7571049AC4E239683ECFE8
3,259,783 UART: [art] SIG.R = CF3A21A07967FA420F1612DF352A497791DA4EADBF43B410C021E15EA380676D5A33B394F5B64E1A84215139CC6A53F1
3,266,554 UART: [art] SIG.S = 3AC4E61CD212041417B504DC037F19E266D751E32DCB4A148DAF80D072FEAFB7BD64623A9357C6B8BF8A8808586DAF17
3,290,133 UART: Caliptra RT
3,290,478 UART: [state] CFI Enabled
3,398,269 UART: [rt] RT listening for mailbox commands...
3,398,939 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,971 UART: [rt]cmd =0x44504543, len=40
3,455,190 >>> mbox cmd response data (40 bytes)
3,455,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,485,132 UART: [rt]cmd =0x44504543, len=96
3,525,965 >>> mbox cmd response data (56 bytes)
3,525,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,919 UART: [rt]cmd =0x44504543, len=96
3,595,557 >>> mbox cmd response data (56 bytes)
3,595,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,679 UART: [rt]cmd =0x44504543, len=96
3,666,611 >>> mbox cmd response data (56 bytes)
3,666,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,547 UART: [rt]cmd =0x44504543, len=96
3,737,777 >>> mbox cmd response data (56 bytes)
3,737,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,767 UART: [rt]cmd =0x44504543, len=96
3,809,183 >>> mbox cmd response data (56 bytes)
3,809,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,261 UART: [rt]cmd =0x44504543, len=96
3,881,187 >>> mbox cmd response data (56 bytes)
3,881,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,157 UART: [rt]cmd =0x44504543, len=96
3,953,307 >>> mbox cmd response data (56 bytes)
3,953,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,983,183 UART: [rt]cmd =0x44504543, len=96
4,025,203 >>> mbox cmd response data (56 bytes)
4,025,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,055,253 UART: [rt]cmd =0x44504543, len=96
4,097,007 >>> mbox cmd response data (56 bytes)
4,097,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,126,749 UART: [rt]cmd =0x44504543, len=96
4,169,157 >>> mbox cmd response data (56 bytes)
4,169,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,198,983 UART: [rt]cmd =0x44504543, len=96
4,243,353 >>> mbox cmd response data (56 bytes)
4,243,354 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,273,245 UART: [rt]cmd =0x44504543, len=96
4,316,153 >>> mbox cmd response data (56 bytes)
4,316,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,346,145 UART: [rt]cmd =0x44504543, len=96
4,389,317 >>> mbox cmd response data (56 bytes)
4,389,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,419,257 UART: [rt]cmd =0x44504543, len=96
4,462,995 >>> mbox cmd response data (56 bytes)
4,462,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,493,045 UART: [rt]cmd =0x44504543, len=96
4,537,441 >>> mbox cmd response data (56 bytes)
4,537,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,567,443 UART: [rt]cmd =0x44504543, len=96
4,574,296 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
85,803 UART: [state] WD Timer not started. Device not locked for debugging
87,022 UART: [kat] SHA2-256
892,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,797 UART: [kat] ++
896,949 UART: [kat] sha1
901,309 UART: [kat] SHA2-256
903,249 UART: [kat] SHA2-384
906,026 UART: [kat] SHA2-512-ACC
907,927 UART: [kat] ECC-384
917,326 UART: [kat] HMAC-384Kdf
921,996 UART: [kat] LMS
1,170,324 UART: [kat] --
1,171,569 UART: [cold-reset] ++
1,171,963 UART: [fht] FHT @ 0x50003400
1,174,666 UART: [idev] ++
1,174,834 UART: [idev] CDI.KEYID = 6
1,175,194 UART: [idev] SUBJECT.KEYID = 7
1,175,618 UART: [idev] UDS.KEYID = 0
1,175,963 ready_for_fw is high
1,175,963 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,683 UART: [idev] Sha1 KeyId Algorithm
1,209,199 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,555 UART: [ldev] Erasing FE.KEYID = 1
1,242,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,270 UART: [fwproc] Recv command 0x46574c44
1,282,998 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,317 >>> mbox cmd response: success
2,772,473 UART: [afmc] ++
2,772,641 UART: [afmc] CDI.KEYID = 6
2,773,003 UART: [afmc] SUBJECT.KEYID = 7
2,773,428 UART: [afmc] AUTHORITY.KEYID = 5
2,808,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,874 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,602 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,206 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,092 UART: [afmc] --
2,852,088 UART: [cold-reset] --
2,852,818 UART: [state] Locking Datavault
2,853,861 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,465 UART: [state] Locking ICCM
2,855,097 UART: [exit] Launching FMC @ 0x40000130
2,860,426 UART:
2,860,442 UART: Running Caliptra FMC ...
2,860,850 UART:
2,860,904 UART: [state] CFI Enabled
2,871,593 UART: [fht] FMC Alias Private Key: 7
2,979,500 UART: [art] Extend RT PCRs Done
2,979,928 UART: [art] Lock RT PCRs Done
2,981,570 UART: [art] Populate DV Done
2,989,635 UART: [fht] FMC Alias Private Key: 7
2,990,565 UART: [art] Derive CDI
2,990,845 UART: [art] Store in in slot 0x4
3,076,772 UART: [art] Derive Key Pair
3,077,132 UART: [art] Store priv key in slot 0x5
3,089,954 UART: [art] Derive Key Pair - Done
3,104,680 UART: [art] Signing Cert with AUTHO
3,105,160 UART: RITY.KEYID = 7
3,120,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,213 UART: [art] PUB.X = 0B1A2ED921A2F74754476BDAE5BC66F462D1D3A0625288D16B221211D46DD4B2AF888F048725AF5FC63AA43365FACE46
3,127,985 UART: [art] PUB.Y = 627CD83F84DDB148B208227AED49F287CD442AD3BF4E1DDC3326681514FE11AB0319B37214C5CFBE3D628CA2B0355758
3,134,937 UART: [art] SIG.R = FD3F0B4A01483FAD34B0D56E8B23B069B9C970F1EF597450E4AA797EAD5ABDD1D403E7D745E357C765BD63DEBFF08483
3,141,716 UART: [art] SIG.S = 2AC7341D07DE3A8E66E8BA9B4666BA48568FE9B499C4F786F115DB0916525A83C5B8B2CE27CA734EC175D63C6C6910FE
3,165,047 UART: Caliptra RT
3,165,300 UART: [state] CFI Enabled
3,273,623 UART: [rt] RT listening for mailbox commands...
3,274,293 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,341 UART: [rt]cmd =0x44504543, len=40
3,330,408 >>> mbox cmd response data (40 bytes)
3,330,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,386 UART: [rt]cmd =0x44504543, len=96
3,400,307 >>> mbox cmd response data (56 bytes)
3,400,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,197 UART: [rt]cmd =0x44504543, len=96
3,470,351 >>> mbox cmd response data (56 bytes)
3,470,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,333 UART: [rt]cmd =0x44504543, len=96
3,540,661 >>> mbox cmd response data (56 bytes)
3,540,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,637 UART: [rt]cmd =0x44504543, len=96
3,611,991 >>> mbox cmd response data (56 bytes)
3,611,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,865 UART: [rt]cmd =0x44504543, len=96
3,683,621 >>> mbox cmd response data (56 bytes)
3,683,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,713,487 UART: [rt]cmd =0x44504543, len=96
3,755,145 >>> mbox cmd response data (56 bytes)
3,755,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,093 UART: [rt]cmd =0x44504543, len=96
3,826,877 >>> mbox cmd response data (56 bytes)
3,826,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,949 UART: [rt]cmd =0x44504543, len=96
3,899,855 >>> mbox cmd response data (56 bytes)
3,899,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,929,895 UART: [rt]cmd =0x44504543, len=96
3,972,987 >>> mbox cmd response data (56 bytes)
3,972,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,002,755 UART: [rt]cmd =0x44504543, len=96
4,045,373 >>> mbox cmd response data (56 bytes)
4,045,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,075,149 UART: [rt]cmd =0x44504543, len=96
4,118,211 >>> mbox cmd response data (56 bytes)
4,118,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,161 UART: [rt]cmd =0x44504543, len=96
4,192,023 >>> mbox cmd response data (56 bytes)
4,192,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,751 UART: [rt]cmd =0x44504543, len=96
4,265,199 >>> mbox cmd response data (56 bytes)
4,265,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,295,201 UART: [rt]cmd =0x44504543, len=96
4,338,901 >>> mbox cmd response data (56 bytes)
4,338,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,368,685 UART: [rt]cmd =0x44504543, len=96
4,413,453 >>> mbox cmd response data (56 bytes)
4,413,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,443,549 UART: [rt]cmd =0x44504543, len=96
4,450,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 ready_for_fw is high
1,060,185 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,628 >>> mbox cmd response: success
2,687,674 UART:
2,687,690 UART: Running Caliptra FMC ...
2,688,098 UART:
2,688,152 UART: [state] CFI Enabled
2,698,565 UART: [fht] FMC Alias Private Key: 7
2,806,428 UART: [art] Extend RT PCRs Done
2,806,856 UART: [art] Lock RT PCRs Done
2,807,994 UART: [art] Populate DV Done
2,816,243 UART: [fht] FMC Alias Private Key: 7
2,817,381 UART: [art] Derive CDI
2,817,661 UART: [art] Store in in slot 0x4
2,903,368 UART: [art] Derive Key Pair
2,903,728 UART: [art] Store priv key in slot 0x5
2,916,774 UART: [art] Derive Key Pair - Done
2,931,648 UART: [art] Signing Cert with AUTHO
2,932,128 UART: RITY.KEYID = 7
2,947,410 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,175 UART: [art] PUB.X = F989D67C7D15FEC0E37906A439F621B303EC9248A23FA11D573E575C46CA7999A31FBF1EAF0C75F8AE7716460E61137B
2,954,939 UART: [art] PUB.Y = 065D701D40BBBD878C38FF5BE1E63967A84389BEB9E956A5E9CDF17211673B9159D8A34109CE5888BEEE1377DEBE3AC4
2,961,895 UART: [art] SIG.R = F848CD915AF3137888F3164A8EC5B02CE0FD027A743187F3050905F69797608F5447CE3E1BC08C8BBB73101D31DFDF4F
2,968,657 UART: [art] SIG.S = 4D9FB0A741A174020A490439E59C7964EE2E4FCB62E8E0C9D74F42070AA5A388B58336BF18D461AAB8895B0BF8B8EFF6
2,992,108 UART: Caliptra RT
2,992,361 UART: [state] CFI Enabled
3,099,680 UART: [rt] RT listening for mailbox commands...
3,100,350 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,566 UART: [rt]cmd =0x44504543, len=40
3,156,663 >>> mbox cmd response data (40 bytes)
3,156,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,633 UART: [rt]cmd =0x44504543, len=96
3,225,966 >>> mbox cmd response data (56 bytes)
3,225,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,255,924 UART: [rt]cmd =0x44504543, len=96
3,296,074 >>> mbox cmd response data (56 bytes)
3,296,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,040 UART: [rt]cmd =0x44504543, len=96
3,366,838 >>> mbox cmd response data (56 bytes)
3,366,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,880 UART: [rt]cmd =0x44504543, len=96
3,437,402 >>> mbox cmd response data (56 bytes)
3,437,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,268 UART: [rt]cmd =0x44504543, len=96
3,508,288 >>> mbox cmd response data (56 bytes)
3,508,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,316 UART: [rt]cmd =0x44504543, len=96
3,579,698 >>> mbox cmd response data (56 bytes)
3,579,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,466 UART: [rt]cmd =0x44504543, len=96
3,652,060 >>> mbox cmd response data (56 bytes)
3,652,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,956 UART: [rt]cmd =0x44504543, len=96
3,723,986 >>> mbox cmd response data (56 bytes)
3,723,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,896 UART: [rt]cmd =0x44504543, len=96
3,796,696 >>> mbox cmd response data (56 bytes)
3,796,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,758 UART: [rt]cmd =0x44504543, len=96
3,869,076 >>> mbox cmd response data (56 bytes)
3,869,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,968 UART: [rt]cmd =0x44504543, len=96
3,941,868 >>> mbox cmd response data (56 bytes)
3,941,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,852 UART: [rt]cmd =0x44504543, len=96
4,014,362 >>> mbox cmd response data (56 bytes)
4,014,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,432 UART: [rt]cmd =0x44504543, len=96
4,087,906 >>> mbox cmd response data (56 bytes)
4,087,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,118,040 UART: [rt]cmd =0x44504543, len=96
4,161,860 >>> mbox cmd response data (56 bytes)
4,161,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,191,676 UART: [rt]cmd =0x44504543, len=96
4,236,050 >>> mbox cmd response data (56 bytes)
4,236,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,265,822 UART: [rt]cmd =0x44504543, len=96
4,273,225 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
893,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,916 UART: [kat] ++
898,068 UART: [kat] sha1
902,254 UART: [kat] SHA2-256
904,194 UART: [kat] SHA2-384
906,875 UART: [kat] SHA2-512-ACC
908,776 UART: [kat] ECC-384
918,135 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,172,288 UART: [cold-reset] ++
1,172,640 UART: [fht] FHT @ 0x50003400
1,175,163 UART: [idev] ++
1,175,331 UART: [idev] CDI.KEYID = 6
1,175,691 UART: [idev] SUBJECT.KEYID = 7
1,176,115 UART: [idev] UDS.KEYID = 0
1,176,460 ready_for_fw is high
1,176,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,169 UART: [idev] Erasing UDS.KEYID = 0
1,201,610 UART: [idev] Sha1 KeyId Algorithm
1,209,956 UART: [idev] --
1,210,846 UART: [ldev] ++
1,211,014 UART: [ldev] CDI.KEYID = 6
1,211,377 UART: [ldev] SUBJECT.KEYID = 5
1,211,803 UART: [ldev] AUTHORITY.KEYID = 7
1,212,266 UART: [ldev] FE.KEYID = 1
1,217,718 UART: [ldev] Erasing FE.KEYID = 1
1,244,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,130 UART: [ldev] --
1,283,483 UART: [fwproc] Wait for Commands...
1,284,253 UART: [fwproc] Recv command 0x46574c44
1,284,981 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,995 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,582 >>> mbox cmd response: success
2,774,784 UART: [afmc] ++
2,774,952 UART: [afmc] CDI.KEYID = 6
2,775,314 UART: [afmc] SUBJECT.KEYID = 7
2,775,739 UART: [afmc] AUTHORITY.KEYID = 5
2,811,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,387 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,000 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,719 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,401 UART: [afmc] --
2,854,419 UART: [cold-reset] --
2,855,251 UART: [state] Locking Datavault
2,856,250 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,854 UART: [state] Locking ICCM
2,857,504 UART: [exit] Launching FMC @ 0x40000130
2,862,833 UART:
2,862,849 UART: Running Caliptra FMC ...
2,863,257 UART:
2,863,400 UART: [state] CFI Enabled
2,873,841 UART: [fht] FMC Alias Private Key: 7
2,981,430 UART: [art] Extend RT PCRs Done
2,981,858 UART: [art] Lock RT PCRs Done
2,983,530 UART: [art] Populate DV Done
2,991,805 UART: [fht] FMC Alias Private Key: 7
2,992,847 UART: [art] Derive CDI
2,993,127 UART: [art] Store in in slot 0x4
3,078,908 UART: [art] Derive Key Pair
3,079,268 UART: [art] Store priv key in slot 0x5
3,092,406 UART: [art] Derive Key Pair - Done
3,107,495 UART: [art] Signing Cert with AUTHO
3,107,975 UART: RITY.KEYID = 7
3,123,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,848 UART: [art] PUB.X = 0E28E08FAF6F65DA5F8097DD09E29108125E8E1C0300D9A4CB3D5616CA95E6C672E8EDAAC1A61F647B4458D9AD01C6A8
3,130,595 UART: [art] PUB.Y = 54D193BB2391D2DF0BF86C242B54ACA267F0E66316AB82CF9F059E1CD4AF3FB6F99A4F5C3BB2C697ECC2183C7E330C84
3,137,554 UART: [art] SIG.R = 5442B34623D7EFC042B84EB3396859571928B470B18B9E39ADBF0D3C84FE1DE4290BA047575FB82C491BE24B626A9E16
3,144,320 UART: [art] SIG.S = 44E55B425B4E3A4C82D39210F11288B44192C4D112E515E99A289FE801E656D9D319BB9898578B1B4CBBBAD0577F1CDF
3,168,030 UART: Caliptra RT
3,168,375 UART: [state] CFI Enabled
3,276,106 UART: [rt] RT listening for mailbox commands...
3,276,776 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,908 UART: [rt]cmd =0x44504543, len=40
3,332,733 >>> mbox cmd response data (40 bytes)
3,332,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,825 UART: [rt]cmd =0x44504543, len=96
3,402,354 >>> mbox cmd response data (56 bytes)
3,402,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,268 UART: [rt]cmd =0x44504543, len=96
3,473,354 >>> mbox cmd response data (56 bytes)
3,473,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,220 UART: [rt]cmd =0x44504543, len=96
3,543,978 >>> mbox cmd response data (56 bytes)
3,543,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,190 UART: [rt]cmd =0x44504543, len=96
3,614,978 >>> mbox cmd response data (56 bytes)
3,614,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,916 UART: [rt]cmd =0x44504543, len=96
3,686,538 >>> mbox cmd response data (56 bytes)
3,686,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,392 UART: [rt]cmd =0x44504543, len=96
3,757,718 >>> mbox cmd response data (56 bytes)
3,757,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,604 UART: [rt]cmd =0x44504543, len=96
3,829,910 >>> mbox cmd response data (56 bytes)
3,829,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,044 UART: [rt]cmd =0x44504543, len=96
3,902,234 >>> mbox cmd response data (56 bytes)
3,902,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,932,042 UART: [rt]cmd =0x44504543, len=96
3,974,998 >>> mbox cmd response data (56 bytes)
3,974,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,005,212 UART: [rt]cmd =0x44504543, len=96
4,047,880 >>> mbox cmd response data (56 bytes)
4,047,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,077,782 UART: [rt]cmd =0x44504543, len=96
4,121,488 >>> mbox cmd response data (56 bytes)
4,121,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,151,524 UART: [rt]cmd =0x44504543, len=96
4,195,630 >>> mbox cmd response data (56 bytes)
4,195,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,225,708 UART: [rt]cmd =0x44504543, len=96
4,269,592 >>> mbox cmd response data (56 bytes)
4,269,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,299,450 UART: [rt]cmd =0x44504543, len=96
4,344,174 >>> mbox cmd response data (56 bytes)
4,344,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,374,414 UART: [rt]cmd =0x44504543, len=96
4,419,978 >>> mbox cmd response data (56 bytes)
4,419,979 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,888 UART: [rt]cmd =0x44504543, len=96
4,456,989 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,300 ready_for_fw is high
1,060,300 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,453 >>> mbox cmd response: success
2,685,205 UART:
2,685,221 UART: Running Caliptra FMC ...
2,685,629 UART:
2,685,772 UART: [state] CFI Enabled
2,696,379 UART: [fht] FMC Alias Private Key: 7
2,804,466 UART: [art] Extend RT PCRs Done
2,804,894 UART: [art] Lock RT PCRs Done
2,806,238 UART: [art] Populate DV Done
2,814,559 UART: [fht] FMC Alias Private Key: 7
2,815,571 UART: [art] Derive CDI
2,815,851 UART: [art] Store in in slot 0x4
2,901,950 UART: [art] Derive Key Pair
2,902,310 UART: [art] Store priv key in slot 0x5
2,915,928 UART: [art] Derive Key Pair - Done
2,930,529 UART: [art] Signing Cert with AUTHO
2,931,009 UART: RITY.KEYID = 7
2,946,229 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,994 UART: [art] PUB.X = B0C27EC0C3AF79FC475A5EA5E3FBB5DDE11F739CF000BB78B0297F22B15B74F035DBCA8CF0479D2757C356D201176F1E
2,953,757 UART: [art] PUB.Y = 3F1E8E381106F550D4B081139E95AD566CE994C35F152B1D90E09DB6B05D520BEE3EA08601C8EBD9D6FC0D09BB4E2787
2,960,702 UART: [art] SIG.R = 7121FEF8B2CBC8E7C06333D05E5037AF09E6EFAB6F6C4DB9DD6FC52F41CEC7F0D77B37E5BE4F445D7FE8171B526FA6DE
2,967,497 UART: [art] SIG.S = DC7298BD158F391CE1E27B097C60A8397C07D7BA8489BEEAF79FD761595BCEC82EBCCCC4E371C7A914553C716C79007A
2,991,168 UART: Caliptra RT
2,991,513 UART: [state] CFI Enabled
3,099,228 UART: [rt] RT listening for mailbox commands...
3,099,898 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,994 UART: [rt]cmd =0x44504543, len=40
3,155,929 >>> mbox cmd response data (40 bytes)
3,155,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,985 UART: [rt]cmd =0x44504543, len=96
3,225,706 >>> mbox cmd response data (56 bytes)
3,225,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,255,776 UART: [rt]cmd =0x44504543, len=96
3,296,056 >>> mbox cmd response data (56 bytes)
3,296,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,986 UART: [rt]cmd =0x44504543, len=96
3,366,638 >>> mbox cmd response data (56 bytes)
3,366,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,574 UART: [rt]cmd =0x44504543, len=96
3,437,140 >>> mbox cmd response data (56 bytes)
3,437,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,467,282 UART: [rt]cmd =0x44504543, len=96
3,509,338 >>> mbox cmd response data (56 bytes)
3,509,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,539,316 UART: [rt]cmd =0x44504543, len=96
3,581,302 >>> mbox cmd response data (56 bytes)
3,581,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,028 UART: [rt]cmd =0x44504543, len=96
3,652,486 >>> mbox cmd response data (56 bytes)
3,652,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,340 UART: [rt]cmd =0x44504543, len=96
3,725,024 >>> mbox cmd response data (56 bytes)
3,725,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,058 UART: [rt]cmd =0x44504543, len=96
3,797,650 >>> mbox cmd response data (56 bytes)
3,797,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,702 UART: [rt]cmd =0x44504543, len=96
3,870,286 >>> mbox cmd response data (56 bytes)
3,870,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,206 UART: [rt]cmd =0x44504543, len=96
3,943,526 >>> mbox cmd response data (56 bytes)
3,943,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,438 UART: [rt]cmd =0x44504543, len=96
4,017,078 >>> mbox cmd response data (56 bytes)
4,017,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,934 UART: [rt]cmd =0x44504543, len=96
4,090,990 >>> mbox cmd response data (56 bytes)
4,090,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,030 UART: [rt]cmd =0x44504543, len=96
4,164,578 >>> mbox cmd response data (56 bytes)
4,164,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,438 UART: [rt]cmd =0x44504543, len=96
4,239,042 >>> mbox cmd response data (56 bytes)
4,239,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,088 UART: [rt]cmd =0x44504543, len=96
4,276,305 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
891,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,739 UART: [kat] SHA2-256
901,679 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,174,293 ready_for_fw is high
1,174,293 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,811 UART: [idev] Erasing UDS.KEYID = 0
1,198,485 UART: [idev] Sha1 KeyId Algorithm
1,207,411 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,240,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,156 UART: [ldev] --
1,280,638 UART: [fwproc] Wait for Commands...
1,281,343 UART: [fwproc] Recv command 0x46574c44
1,282,076 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,277 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,869 >>> mbox cmd response: success
2,771,092 UART: [afmc] ++
2,771,260 UART: [afmc] CDI.KEYID = 6
2,771,623 UART: [afmc] SUBJECT.KEYID = 7
2,772,049 UART: [afmc] AUTHORITY.KEYID = 5
2,807,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,870 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,621 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,879 UART: [afmc] --
2,850,811 UART: [cold-reset] --
2,851,787 UART: [state] Locking Datavault
2,852,994 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,598 UART: [state] Locking ICCM
2,854,034 UART: [exit] Launching FMC @ 0x40000130
2,859,363 UART:
2,859,379 UART: Running Caliptra FMC ...
2,859,787 UART:
2,859,841 UART: [state] CFI Enabled
2,870,518 UART: [fht] FMC Alias Private Key: 7
2,978,087 UART: [art] Extend RT PCRs Done
2,978,515 UART: [art] Lock RT PCRs Done
2,980,305 UART: [art] Populate DV Done
2,988,656 UART: [fht] FMC Alias Private Key: 7
2,989,720 UART: [art] Derive CDI
2,990,000 UART: [art] Store in in slot 0x4
3,075,385 UART: [art] Derive Key Pair
3,075,745 UART: [art] Store priv key in slot 0x5
3,088,833 UART: [art] Derive Key Pair - Done
3,103,297 UART: [art] Signing Cert with AUTHO
3,103,777 UART: RITY.KEYID = 7
3,119,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,062 UART: [art] PUB.X = 608DC08369D664B2F8CEEEC4065761F13E871D2FD5251B5F33238DCD764743FCAEAC6B9265D67E7D0A6D5E840E293789
3,126,829 UART: [art] PUB.Y = E1E6A60CF289B3D1AA5D744E754264C075D96B44411CB526FA0B95E97B3E7EAADE10D5CD388D547CEE9C7842DF28E4DD
3,133,791 UART: [art] SIG.R = 59D0D15F2884E5E29B4B54071404C00CB3121DD65C54D9AC92CEAF7BA7A6C8C0F3CB453EA59CFE757165A76CE3E3D8F5
3,140,568 UART: [art] SIG.S = A0F4C95215C428DFA1321E15F5A93D14ABA575AD96741BAEBAE28963DE6E8E80A6642F96C8FD65B0E9AA707265B9A4CC
3,164,365 UART: Caliptra RT
3,164,618 UART: [state] CFI Enabled
3,271,603 UART: [rt] RT listening for mailbox commands...
3,272,273 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,193 UART: [rt]cmd =0x44504543, len=40
3,328,216 >>> mbox cmd response data (40 bytes)
3,328,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,976 UART: [rt]cmd =0x44504543, len=96
3,398,443 >>> mbox cmd response data (56 bytes)
3,398,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,313 UART: [rt]cmd =0x44504543, len=96
3,468,673 >>> mbox cmd response data (56 bytes)
3,468,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,498,619 UART: [rt]cmd =0x44504543, len=96
3,539,361 >>> mbox cmd response data (56 bytes)
3,539,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,445 UART: [rt]cmd =0x44504543, len=96
3,610,569 >>> mbox cmd response data (56 bytes)
3,610,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,653 UART: [rt]cmd =0x44504543, len=96
3,681,811 >>> mbox cmd response data (56 bytes)
3,681,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,803 UART: [rt]cmd =0x44504543, len=96
3,753,345 >>> mbox cmd response data (56 bytes)
3,753,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,355 UART: [rt]cmd =0x44504543, len=96
3,825,531 >>> mbox cmd response data (56 bytes)
3,825,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,855,425 UART: [rt]cmd =0x44504543, len=96
3,897,413 >>> mbox cmd response data (56 bytes)
3,897,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,927,123 UART: [rt]cmd =0x44504543, len=96
3,968,741 >>> mbox cmd response data (56 bytes)
3,968,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,998,627 UART: [rt]cmd =0x44504543, len=96
4,041,749 >>> mbox cmd response data (56 bytes)
4,041,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,071,499 UART: [rt]cmd =0x44504543, len=96
4,115,473 >>> mbox cmd response data (56 bytes)
4,115,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,517 UART: [rt]cmd =0x44504543, len=96
4,189,731 >>> mbox cmd response data (56 bytes)
4,189,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,219,625 UART: [rt]cmd =0x44504543, len=96
4,262,945 >>> mbox cmd response data (56 bytes)
4,262,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,292,853 UART: [rt]cmd =0x44504543, len=96
4,337,315 >>> mbox cmd response data (56 bytes)
4,337,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,367,573 UART: [rt]cmd =0x44504543, len=96
4,412,555 >>> mbox cmd response data (56 bytes)
4,412,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,442,627 UART: [rt]cmd =0x44504543, len=96
4,449,626 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,794 ready_for_fw is high
1,056,794 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,909 >>> mbox cmd response: success
2,684,315 UART:
2,684,331 UART: Running Caliptra FMC ...
2,684,739 UART:
2,684,793 UART: [state] CFI Enabled
2,695,610 UART: [fht] FMC Alias Private Key: 7
2,803,279 UART: [art] Extend RT PCRs Done
2,803,707 UART: [art] Lock RT PCRs Done
2,805,133 UART: [art] Populate DV Done
2,813,400 UART: [fht] FMC Alias Private Key: 7
2,814,556 UART: [art] Derive CDI
2,814,836 UART: [art] Store in in slot 0x4
2,900,379 UART: [art] Derive Key Pair
2,900,739 UART: [art] Store priv key in slot 0x5
2,913,953 UART: [art] Derive Key Pair - Done
2,928,825 UART: [art] Signing Cert with AUTHO
2,929,305 UART: RITY.KEYID = 7
2,944,483 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,248 UART: [art] PUB.X = B96B567C160A642FD32CBA24508206117854F09B9475142146E88DB7B58248CA09DCC59D4DD09FA2AB1B892DF95090E5
2,952,009 UART: [art] PUB.Y = C3C73516CA8891C59E53FAF38CE802E202130E80C402C253F834168F8A31DB455629F239D2A82450C7C8F983254B35A8
2,958,941 UART: [art] SIG.R = 8BA463A6EEE6EB8DA9F75A13DD49352314CE46F9BB589B555BB04989CA61FA13F8FB84F485D2F169854A94D4457E161E
2,965,721 UART: [art] SIG.S = ED5258B4602AD8B1167EEE43E16000D2A5702C7D6068A65AA964BDD84B3C03E9665174717DDAD2C11173FACBC592036A
2,989,016 UART: Caliptra RT
2,989,269 UART: [state] CFI Enabled
3,097,469 UART: [rt] RT listening for mailbox commands...
3,098,139 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,413 UART: [rt]cmd =0x44504543, len=40
3,154,336 >>> mbox cmd response data (40 bytes)
3,154,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,184,324 UART: [rt]cmd =0x44504543, len=96
3,224,583 >>> mbox cmd response data (56 bytes)
3,224,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,254,605 UART: [rt]cmd =0x44504543, len=96
3,295,571 >>> mbox cmd response data (56 bytes)
3,295,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,555 UART: [rt]cmd =0x44504543, len=96
3,365,707 >>> mbox cmd response data (56 bytes)
3,365,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,819 UART: [rt]cmd =0x44504543, len=96
3,436,323 >>> mbox cmd response data (56 bytes)
3,436,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,491 UART: [rt]cmd =0x44504543, len=96
3,508,033 >>> mbox cmd response data (56 bytes)
3,508,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,023 UART: [rt]cmd =0x44504543, len=96
3,579,901 >>> mbox cmd response data (56 bytes)
3,579,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,985 UART: [rt]cmd =0x44504543, len=96
3,652,445 >>> mbox cmd response data (56 bytes)
3,652,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,281 UART: [rt]cmd =0x44504543, len=96
3,724,779 >>> mbox cmd response data (56 bytes)
3,724,780 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,913 UART: [rt]cmd =0x44504543, len=96
3,796,869 >>> mbox cmd response data (56 bytes)
3,796,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,831 UART: [rt]cmd =0x44504543, len=96
3,870,109 >>> mbox cmd response data (56 bytes)
3,870,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,900,351 UART: [rt]cmd =0x44504543, len=96
3,943,981 >>> mbox cmd response data (56 bytes)
3,943,982 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,149 UART: [rt]cmd =0x44504543, len=96
4,017,729 >>> mbox cmd response data (56 bytes)
4,017,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,047,677 UART: [rt]cmd =0x44504543, len=96
4,090,291 >>> mbox cmd response data (56 bytes)
4,090,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,283 UART: [rt]cmd =0x44504543, len=96
4,163,997 >>> mbox cmd response data (56 bytes)
4,163,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,871 UART: [rt]cmd =0x44504543, len=96
4,238,735 >>> mbox cmd response data (56 bytes)
4,238,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,268,963 UART: [rt]cmd =0x44504543, len=96
4,275,918 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,093 UART: [kat] LMS
1,169,405 UART: [kat] --
1,170,060 UART: [cold-reset] ++
1,170,554 UART: [fht] FHT @ 0x50003400
1,173,274 UART: [idev] ++
1,173,442 UART: [idev] CDI.KEYID = 6
1,173,803 UART: [idev] SUBJECT.KEYID = 7
1,174,228 UART: [idev] UDS.KEYID = 0
1,174,574 ready_for_fw is high
1,174,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,518 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,909 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0x46574c44
1,284,431 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,360 >>> mbox cmd response: success
2,773,499 UART: [afmc] ++
2,773,667 UART: [afmc] CDI.KEYID = 6
2,774,030 UART: [afmc] SUBJECT.KEYID = 7
2,774,456 UART: [afmc] AUTHORITY.KEYID = 5
2,810,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,267 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,869 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,910 UART: [afmc] --
2,853,982 UART: [cold-reset] --
2,854,838 UART: [state] Locking Datavault
2,855,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,373 UART: [state] Locking ICCM
2,856,907 UART: [exit] Launching FMC @ 0x40000130
2,862,236 UART:
2,862,252 UART: Running Caliptra FMC ...
2,862,660 UART:
2,862,803 UART: [state] CFI Enabled
2,873,522 UART: [fht] FMC Alias Private Key: 7
2,981,237 UART: [art] Extend RT PCRs Done
2,981,665 UART: [art] Lock RT PCRs Done
2,982,857 UART: [art] Populate DV Done
2,990,878 UART: [fht] FMC Alias Private Key: 7
2,991,932 UART: [art] Derive CDI
2,992,212 UART: [art] Store in in slot 0x4
3,077,619 UART: [art] Derive Key Pair
3,077,979 UART: [art] Store priv key in slot 0x5
3,091,035 UART: [art] Derive Key Pair - Done
3,105,877 UART: [art] Signing Cert with AUTHO
3,106,357 UART: RITY.KEYID = 7
3,121,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,380 UART: [art] PUB.X = F04E41228CDE48FA2A6EA4E9640E2B842AC8760AF663D89F74E00AC8A40FE3C30C963327C907C636C92C246203933888
3,129,129 UART: [art] PUB.Y = 1C8446A449B01A300CCC90E9589AA9DA459562797838AAAD7266B3A851013BB4F4253CEA23CF5468827D183670806241
3,136,065 UART: [art] SIG.R = 6A95B199E60E1F5781049E275D4BDB4F2C69B24BF28F18864024AC73BE9C1769559D1CA422056F3F1C50668165C0FF2E
3,142,826 UART: [art] SIG.S = 2B879143F0C3C381AE1081BE801283C9E6F714C19B0264CA405479ED7291415369EC9242C8894FE6C3A29F12CC94A254
3,166,934 UART: Caliptra RT
3,167,279 UART: [state] CFI Enabled
3,275,326 UART: [rt] RT listening for mailbox commands...
3,275,996 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,164 UART: [rt]cmd =0x44504543, len=40
3,332,119 >>> mbox cmd response data (40 bytes)
3,332,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,055 UART: [rt]cmd =0x44504543, len=96
3,402,572 >>> mbox cmd response data (56 bytes)
3,402,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,380 UART: [rt]cmd =0x44504543, len=96
3,472,682 >>> mbox cmd response data (56 bytes)
3,472,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,834 UART: [rt]cmd =0x44504543, len=96
3,543,540 >>> mbox cmd response data (56 bytes)
3,543,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,734 UART: [rt]cmd =0x44504543, len=96
3,615,226 >>> mbox cmd response data (56 bytes)
3,615,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,056 UART: [rt]cmd =0x44504543, len=96
3,685,520 >>> mbox cmd response data (56 bytes)
3,685,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,260 UART: [rt]cmd =0x44504543, len=96
3,756,618 >>> mbox cmd response data (56 bytes)
3,756,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,554 UART: [rt]cmd =0x44504543, len=96
3,828,354 >>> mbox cmd response data (56 bytes)
3,828,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,176 UART: [rt]cmd =0x44504543, len=96
3,900,578 >>> mbox cmd response data (56 bytes)
3,900,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,430 UART: [rt]cmd =0x44504543, len=96
3,973,408 >>> mbox cmd response data (56 bytes)
3,973,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,520 UART: [rt]cmd =0x44504543, len=96
4,046,066 >>> mbox cmd response data (56 bytes)
4,046,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,075,954 UART: [rt]cmd =0x44504543, len=96
4,120,112 >>> mbox cmd response data (56 bytes)
4,120,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,149,992 UART: [rt]cmd =0x44504543, len=96
4,193,806 >>> mbox cmd response data (56 bytes)
4,193,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,736 UART: [rt]cmd =0x44504543, len=96
4,268,338 >>> mbox cmd response data (56 bytes)
4,268,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,298,460 UART: [rt]cmd =0x44504543, len=96
4,342,148 >>> mbox cmd response data (56 bytes)
4,342,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,372,068 UART: [rt]cmd =0x44504543, len=96
4,415,844 >>> mbox cmd response data (56 bytes)
4,415,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,445,760 UART: [rt]cmd =0x44504543, len=96
4,452,995 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,291 ready_for_fw is high
1,056,291 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,990 >>> mbox cmd response: success
2,682,080 UART:
2,682,096 UART: Running Caliptra FMC ...
2,682,504 UART:
2,682,647 UART: [state] CFI Enabled
2,692,996 UART: [fht] FMC Alias Private Key: 7
2,800,203 UART: [art] Extend RT PCRs Done
2,800,631 UART: [art] Lock RT PCRs Done
2,802,559 UART: [art] Populate DV Done
2,810,790 UART: [fht] FMC Alias Private Key: 7
2,811,862 UART: [art] Derive CDI
2,812,142 UART: [art] Store in in slot 0x4
2,897,439 UART: [art] Derive Key Pair
2,897,799 UART: [art] Store priv key in slot 0x5
2,911,165 UART: [art] Derive Key Pair - Done
2,926,057 UART: [art] Signing Cert with AUTHO
2,926,537 UART: RITY.KEYID = 7
2,941,619 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,384 UART: [art] PUB.X = 9B94312A5B5D22E89111D29C22DE228E9086607A896AEFDED6A0CFE174DE7E3FA90C7A66E76BC67815721567ABE82215
2,949,157 UART: [art] PUB.Y = C984834D3668E7E734CF5FAAC437E34092E804FB7FF51C9FB5B52391F1E4DCB57DF586F275B12896351EBDB0B8029A42
2,956,109 UART: [art] SIG.R = 88B976AF3B8A52CBD8DE81729993017B9D481652B36BD48CABA7D9FCAE6AE383F282CF5A5B98E1D26C4C129FFC3C6F85
2,962,894 UART: [art] SIG.S = 4472DDCA235DE81A150B42356ED4192CF690B70E9CDD7F7C616C2500865C904481A06BE7EADAB051E04DF7D2C42CF330
2,986,759 UART: Caliptra RT
2,987,104 UART: [state] CFI Enabled
3,095,595 UART: [rt] RT listening for mailbox commands...
3,096,265 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,305 UART: [rt]cmd =0x44504543, len=40
3,152,364 >>> mbox cmd response data (40 bytes)
3,152,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,628 UART: [rt]cmd =0x44504543, len=96
3,222,771 >>> mbox cmd response data (56 bytes)
3,222,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,252,687 UART: [rt]cmd =0x44504543, len=96
3,293,723 >>> mbox cmd response data (56 bytes)
3,293,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,633 UART: [rt]cmd =0x44504543, len=96
3,364,579 >>> mbox cmd response data (56 bytes)
3,364,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,445 UART: [rt]cmd =0x44504543, len=96
3,435,573 >>> mbox cmd response data (56 bytes)
3,435,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,323 UART: [rt]cmd =0x44504543, len=96
3,506,537 >>> mbox cmd response data (56 bytes)
3,506,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,421 UART: [rt]cmd =0x44504543, len=96
3,578,075 >>> mbox cmd response data (56 bytes)
3,578,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,977 UART: [rt]cmd =0x44504543, len=96
3,649,577 >>> mbox cmd response data (56 bytes)
3,649,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,679,599 UART: [rt]cmd =0x44504543, len=96
3,721,745 >>> mbox cmd response data (56 bytes)
3,721,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,861 UART: [rt]cmd =0x44504543, len=96
3,794,061 >>> mbox cmd response data (56 bytes)
3,794,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,949 UART: [rt]cmd =0x44504543, len=96
3,866,415 >>> mbox cmd response data (56 bytes)
3,866,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,896,657 UART: [rt]cmd =0x44504543, len=96
3,940,089 >>> mbox cmd response data (56 bytes)
3,940,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,970,111 UART: [rt]cmd =0x44504543, len=96
4,014,245 >>> mbox cmd response data (56 bytes)
4,014,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,957 UART: [rt]cmd =0x44504543, len=96
4,087,559 >>> mbox cmd response data (56 bytes)
4,087,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,117,371 UART: [rt]cmd =0x44504543, len=96
4,161,251 >>> mbox cmd response data (56 bytes)
4,161,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,191,079 UART: [rt]cmd =0x44504543, len=96
4,235,221 >>> mbox cmd response data (56 bytes)
4,235,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,265,097 UART: [rt]cmd =0x44504543, len=96
4,272,486 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,971 UART:
192,341 UART: Running Caliptra ROM ...
193,469 UART:
193,609 UART: [state] CFI Enabled
264,021 UART: [state] LifecycleState = Unprovisioned
266,022 UART: [state] DebugLocked = No
268,198 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,231 UART: [kat] SHA2-256
442,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,699 UART: [kat] ++
454,154 UART: [kat] sha1
465,019 UART: [kat] SHA2-256
467,677 UART: [kat] SHA2-384
474,729 UART: [kat] SHA2-512-ACC
477,091 UART: [kat] ECC-384
2,767,571 UART: [kat] HMAC-384Kdf
2,799,147 UART: [kat] LMS
3,989,442 UART: [kat] --
3,993,081 UART: [cold-reset] ++
3,994,156 UART: [fht] Storing FHT @ 0x50003400
4,006,480 UART: [idev] ++
4,007,113 UART: [idev] CDI.KEYID = 6
4,008,016 UART: [idev] SUBJECT.KEYID = 7
4,009,279 UART: [idev] UDS.KEYID = 0
4,010,323 ready_for_fw is high
4,010,523 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,746 UART: [idev] Erasing UDS.KEYID = 0
7,343,682 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,977 UART: [idev] --
7,369,504 UART: [ldev] ++
7,370,065 UART: [ldev] CDI.KEYID = 6
7,371,001 UART: [ldev] SUBJECT.KEYID = 5
7,372,152 UART: [ldev] AUTHORITY.KEYID = 7
7,373,477 UART: [ldev] FE.KEYID = 1
7,399,345 UART: [ldev] Erasing FE.KEYID = 1
10,735,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,655 UART: [ldev] --
13,115,811 UART: [fwproc] Waiting for Commands...
13,117,517 UART: [fwproc] Received command 0x46574c44
13,119,691 UART: [fwproc] Received Image of size 113844 bytes
17,167,485 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,245,937 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,314,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,631,777 >>> mbox cmd response: success
17,635,271 UART: [afmc] ++
17,635,867 UART: [afmc] CDI.KEYID = 6
17,636,775 UART: [afmc] SUBJECT.KEYID = 7
17,638,041 UART: [afmc] AUTHORITY.KEYID = 5
21,004,957 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,667 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,925 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,348 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,152 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,608 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,181 UART: [afmc] --
23,380,199 UART: [cold-reset] --
23,384,118 UART: [state] Locking Datavault
23,390,060 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,808 UART: [state] Locking ICCM
23,393,114 UART: [exit] Launching FMC @ 0x40000130
23,401,501 UART:
23,401,736 UART: Running Caliptra FMC ...
23,402,832 UART:
23,402,985 UART: [state] CFI Enabled
23,466,549 UART: [fht] FMC Alias Private Key: 7
25,803,998 UART: [art] Extend RT PCRs Done
25,805,218 UART: [art] Lock RT PCRs Done
25,806,888 UART: [art] Populate DV Done
25,812,293 UART: [fht] FMC Alias Private Key: 7
25,813,982 UART: [art] Derive CDI
25,814,721 UART: [art] Store in in slot 0x4
25,874,886 UART: [art] Derive Key Pair
25,875,882 UART: [art] Store priv key in slot 0x5
29,168,347 UART: [art] Derive Key Pair - Done
29,181,274 UART: [art] Signing Cert with AUTHO
29,182,597 UART: RITY.KEYID = 7
31,469,594 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,125 UART: [art] PUB.X = 2A2C31C580DBD03F1A5D7F00CD2CCBA90856BC3937161E97D4F46F21E3D1636835DD08BECD3F0F5FEB506CC1961A67BE
31,478,345 UART: [art] PUB.Y = A25B11F0396CA69720BF94076E6451F4993DA4EEC061C3715B8261332421B873E424598F48FB3C78315430E3ADC8698B
31,485,592 UART: [art] SIG.R = 70518DD7DF805495B013B43AB50A417BEED8297C140A22810362A316FC0CC8CBD5B7D14C1DA544E71D39D6381E8D6AA7
31,492,950 UART: [art] SIG.S = 686E9950F1177A11DD0232DC568DDD10D53FD48A80473E70B3CD907C5C140912C7FC3CA3B50CE8FB61ED3812D628C0F3
32,797,879 UART: Caliptra RT
32,798,586 UART: [state] CFI Enabled
32,959,113 UART: [rt] RT listening for mailbox commands...
32,961,062 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,991,766 UART: [rt]cmd =0x44504543, len=24
33,033,163 >>> mbox cmd response data (40 bytes)
33,034,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,063,849 UART: [rt]cmd =0x44504543, len=24
33,097,346 >>> mbox cmd response data (40 bytes)
33,098,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,127,870 UART: [rt]cmd =0x44504543, len=24
33,161,299 >>> mbox cmd response data (40 bytes)
33,161,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,191,635 UART: [rt]cmd =0x44504543, len=24
33,225,579 >>> mbox cmd response data (40 bytes)
33,226,203 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,256,015 UART: [rt]cmd =0x44504543, len=24
33,289,477 >>> mbox cmd response data (40 bytes)
33,290,127 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,320,025 UART: [rt]cmd =0x44504543, len=24
33,353,570 >>> mbox cmd response data (40 bytes)
33,354,233 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,384,353 UART: [rt]cmd =0x44504543, len=24
33,417,623 >>> mbox cmd response data (40 bytes)
33,418,279 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,447,916 UART: [rt]cmd =0x44504543, len=24
33,482,045 >>> mbox cmd response data (40 bytes)
33,482,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,512,366 UART: [rt]cmd =0x44504543, len=24
33,545,623 >>> mbox cmd response data (40 bytes)
33,546,241 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,576,043 UART: [rt]cmd =0x44504543, len=24
33,609,767 >>> mbox cmd response data (40 bytes)
33,610,380 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,640,244 UART: [rt]cmd =0x44504543, len=24
33,673,851 >>> mbox cmd response data (40 bytes)
33,674,507 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,704,515 UART: [rt]cmd =0x44504543, len=24
33,737,855 >>> mbox cmd response data (40 bytes)
33,738,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,768,367 UART: [rt]cmd =0x44504543, len=24
33,802,339 >>> mbox cmd response data (40 bytes)
33,802,951 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,832,916 UART: [rt]cmd =0x44504543, len=24
33,866,805 >>> mbox cmd response data (40 bytes)
33,867,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,897,433 UART: [rt]cmd =0x44504543, len=24
33,930,836 >>> mbox cmd response data (40 bytes)
33,931,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,961,399 UART: [rt]cmd =0x44504543, len=24
33,967,546 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,785,189 ready_for_fw is high
3,785,589 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,847,108 >>> mbox cmd response: success
23,548,155 UART:
23,548,536 UART: Running Caliptra FMC ...
23,549,644 UART:
23,549,791 UART: [state] CFI Enabled
23,619,266 UART: [fht] FMC Alias Private Key: 7
25,956,971 UART: [art] Extend RT PCRs Done
25,958,646 UART: [art] Lock RT PCRs Done
25,959,932 UART: [art] Populate DV Done
25,965,276 UART: [fht] FMC Alias Private Key: 7
25,967,000 UART: [art] Derive CDI
25,967,822 UART: [art] Store in in slot 0x4
26,029,372 UART: [art] Derive Key Pair
26,030,414 UART: [art] Store priv key in slot 0x5
29,323,410 UART: [art] Derive Key Pair - Done
29,336,405 UART: [art] Signing Cert with AUTHO
29,337,739 UART: RITY.KEYID = 7
31,624,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,035 UART: [art] PUB.X = 175D77100CCF1EC4B25CFE8B75F5B33256E5ECD7B2151BBE09484310A7AF364E5718171E750B9D49DF9B92DBAF279601
31,633,374 UART: [art] PUB.Y = 36DAD07DE53213B207DD00EFD08CBC17F82D7DBA5267BDDEB00EC985D1CDFB19996D7549BA0B75006C9FF6CFA4F55932
31,640,575 UART: [art] SIG.R = 516919FE7BFA5BD75C448A943F9A758FDAF4905B3D16144B78887C1BEBE1B4D1AB55F53DAEB41FE6482CB72D0D874F8E
31,647,944 UART: [art] SIG.S = B18FE46F714BAE9A9A28047E74D70D5988E73DB4C8480D1C8FFF30A74D6A457785DDDA97A01FD934F164E9E133408757
32,953,583 UART: Caliptra RT
32,954,294 UART: [state] CFI Enabled
33,115,090 UART: [rt] RT listening for mailbox commands...
33,117,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,147,875 UART: [rt]cmd =0x44504543, len=24
33,188,721 >>> mbox cmd response data (40 bytes)
33,189,540 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,219,509 UART: [rt]cmd =0x44504543, len=24
33,252,935 >>> mbox cmd response data (40 bytes)
33,253,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,283,388 UART: [rt]cmd =0x44504543, len=24
33,317,059 >>> mbox cmd response data (40 bytes)
33,317,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,347,683 UART: [rt]cmd =0x44504543, len=24
33,381,126 >>> mbox cmd response data (40 bytes)
33,381,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,411,825 UART: [rt]cmd =0x44504543, len=24
33,445,049 >>> mbox cmd response data (40 bytes)
33,445,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,475,508 UART: [rt]cmd =0x44504543, len=24
33,509,235 >>> mbox cmd response data (40 bytes)
33,509,895 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,539,847 UART: [rt]cmd =0x44504543, len=24
33,573,162 >>> mbox cmd response data (40 bytes)
33,573,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,603,685 UART: [rt]cmd =0x44504543, len=24
33,636,980 >>> mbox cmd response data (40 bytes)
33,637,594 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,667,508 UART: [rt]cmd =0x44504543, len=24
33,700,862 >>> mbox cmd response data (40 bytes)
33,701,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,731,593 UART: [rt]cmd =0x44504543, len=24
33,764,925 >>> mbox cmd response data (40 bytes)
33,765,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,795,640 UART: [rt]cmd =0x44504543, len=24
33,829,353 >>> mbox cmd response data (40 bytes)
33,830,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,859,934 UART: [rt]cmd =0x44504543, len=24
33,893,355 >>> mbox cmd response data (40 bytes)
33,893,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,923,778 UART: [rt]cmd =0x44504543, len=24
33,957,238 >>> mbox cmd response data (40 bytes)
33,957,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,987,803 UART: [rt]cmd =0x44504543, len=24
34,021,493 >>> mbox cmd response data (40 bytes)
34,022,115 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,052,014 UART: [rt]cmd =0x44504543, len=24
34,085,534 >>> mbox cmd response data (40 bytes)
34,086,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,116,095 UART: [rt]cmd =0x44504543, len=24
34,122,552 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
192,540 UART:
192,907 UART: Running Caliptra ROM ...
194,090 UART:
603,646 UART: [state] CFI Enabled
616,459 UART: [state] LifecycleState = Unprovisioned
618,406 UART: [state] DebugLocked = No
620,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,141 UART: [kat] SHA2-256
795,909 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,424 UART: [kat] ++
806,911 UART: [kat] sha1
818,641 UART: [kat] SHA2-256
821,308 UART: [kat] SHA2-384
827,033 UART: [kat] SHA2-512-ACC
829,408 UART: [kat] ECC-384
3,111,417 UART: [kat] HMAC-384Kdf
3,122,597 UART: [kat] LMS
4,312,705 UART: [kat] --
4,315,878 UART: [cold-reset] ++
4,316,961 UART: [fht] Storing FHT @ 0x50003400
4,327,898 UART: [idev] ++
4,328,469 UART: [idev] CDI.KEYID = 6
4,329,352 UART: [idev] SUBJECT.KEYID = 7
4,330,665 UART: [idev] UDS.KEYID = 0
4,331,642 ready_for_fw is high
4,331,844 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,474,809 UART: [idev] Erasing UDS.KEYID = 0
7,616,596 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,395 UART: [idev] --
7,641,916 UART: [ldev] ++
7,642,487 UART: [ldev] CDI.KEYID = 6
7,643,503 UART: [ldev] SUBJECT.KEYID = 5
7,644,660 UART: [ldev] AUTHORITY.KEYID = 7
7,645,886 UART: [ldev] FE.KEYID = 1
7,654,688 UART: [ldev] Erasing FE.KEYID = 1
10,942,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,008 UART: [ldev] --
13,301,091 UART: [fwproc] Waiting for Commands...
13,303,945 UART: [fwproc] Received command 0x46574c44
13,306,123 UART: [fwproc] Received Image of size 113844 bytes
17,357,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,430,544 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,499,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,816,536 >>> mbox cmd response: success
17,819,987 UART: [afmc] ++
17,820,582 UART: [afmc] CDI.KEYID = 6
17,821,496 UART: [afmc] SUBJECT.KEYID = 7
17,822,713 UART: [afmc] AUTHORITY.KEYID = 5
21,137,025 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,432,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,434,421 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,787 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,646 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,478,068 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,405 UART: [afmc] --
23,502,459 UART: [cold-reset] --
23,507,616 UART: [state] Locking Datavault
23,511,840 UART: [state] Locking PCR0, PCR1 and PCR31
23,513,617 UART: [state] Locking ICCM
23,515,068 UART: [exit] Launching FMC @ 0x40000130
23,523,455 UART:
23,523,697 UART: Running Caliptra FMC ...
23,524,747 UART:
23,524,897 UART: [state] CFI Enabled
23,533,104 UART: [fht] FMC Alias Private Key: 7
25,864,166 UART: [art] Extend RT PCRs Done
25,865,383 UART: [art] Lock RT PCRs Done
25,867,090 UART: [art] Populate DV Done
25,872,499 UART: [fht] FMC Alias Private Key: 7
25,874,197 UART: [art] Derive CDI
25,874,931 UART: [art] Store in in slot 0x4
25,917,689 UART: [art] Derive Key Pair
25,918,727 UART: [art] Store priv key in slot 0x5
29,160,920 UART: [art] Derive Key Pair - Done
29,174,024 UART: [art] Signing Cert with AUTHO
29,175,333 UART: RITY.KEYID = 7
31,454,811 UART: [art] Erasing AUTHORITY.KEYID = 7
31,456,321 UART: [art] PUB.X = 927930B8FF8B905692018C5D5FDCC97C9D25D280C4C4759C91719C64B0646E5ADC05F0882C435737075F8E238C3C80E8
31,463,523 UART: [art] PUB.Y = FE78C6B6D3420FD0FDA227547F6DF3EE4C61BB1143ABD60EEAF46FA3CFFA6ADE62E23AA142C0E6E754685845289D90D7
31,470,818 UART: [art] SIG.R = 9971CA18583D3E5F1E3DD51F71953DDD4C889FE3C772C42263B9D9999CCBF1AB52E761FE46562857DF81B73FF0BBEE12
31,478,164 UART: [art] SIG.S = 9E2F6A4402F303EEC69C63C8C3472FF425DDBE50D05563E680CE3128015352A8D792C81CDE0DB50225E7E13C185519FA
32,783,297 UART: Caliptra RT
32,783,999 UART: [state] CFI Enabled
32,901,402 UART: [rt] RT listening for mailbox commands...
32,903,337 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,933,701 UART: [rt]cmd =0x44504543, len=24
32,960,032 >>> mbox cmd response data (40 bytes)
32,960,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,991,005 UART: [rt]cmd =0x44504543, len=24
33,017,116 >>> mbox cmd response data (40 bytes)
33,017,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,047,734 UART: [rt]cmd =0x44504543, len=24
33,073,529 >>> mbox cmd response data (40 bytes)
33,074,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,104,013 UART: [rt]cmd =0x44504543, len=24
33,129,946 >>> mbox cmd response data (40 bytes)
33,130,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,160,500 UART: [rt]cmd =0x44504543, len=24
33,186,094 >>> mbox cmd response data (40 bytes)
33,186,713 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,216,354 UART: [rt]cmd =0x44504543, len=24
33,242,685 >>> mbox cmd response data (40 bytes)
33,243,315 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,272,960 UART: [rt]cmd =0x44504543, len=24
33,298,803 >>> mbox cmd response data (40 bytes)
33,299,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,329,129 UART: [rt]cmd =0x44504543, len=24
33,355,381 >>> mbox cmd response data (40 bytes)
33,356,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,385,998 UART: [rt]cmd =0x44504543, len=24
33,411,971 >>> mbox cmd response data (40 bytes)
33,412,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,442,384 UART: [rt]cmd =0x44504543, len=24
33,468,546 >>> mbox cmd response data (40 bytes)
33,469,164 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,499,007 UART: [rt]cmd =0x44504543, len=24
33,524,883 >>> mbox cmd response data (40 bytes)
33,525,531 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,555,539 UART: [rt]cmd =0x44504543, len=24
33,582,266 >>> mbox cmd response data (40 bytes)
33,582,875 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,612,755 UART: [rt]cmd =0x44504543, len=24
33,638,960 >>> mbox cmd response data (40 bytes)
33,639,596 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,669,560 UART: [rt]cmd =0x44504543, len=24
33,695,997 >>> mbox cmd response data (40 bytes)
33,696,614 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,726,723 UART: [rt]cmd =0x44504543, len=24
33,753,080 >>> mbox cmd response data (40 bytes)
33,753,726 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,783,731 UART: [rt]cmd =0x44504543, len=24
33,790,186 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,128,530 ready_for_fw is high
4,128,921 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,056 >>> mbox cmd response: success
23,708,516 UART:
23,708,983 UART: Running Caliptra FMC ...
23,710,103 UART:
23,710,274 UART: [state] CFI Enabled
23,718,258 UART: [fht] FMC Alias Private Key: 7
26,049,270 UART: [art] Extend RT PCRs Done
26,050,491 UART: [art] Lock RT PCRs Done
26,052,417 UART: [art] Populate DV Done
26,057,618 UART: [fht] FMC Alias Private Key: 7
26,059,110 UART: [art] Derive CDI
26,059,901 UART: [art] Store in in slot 0x4
26,102,554 UART: [art] Derive Key Pair
26,103,582 UART: [art] Store priv key in slot 0x5
29,345,834 UART: [art] Derive Key Pair - Done
29,358,901 UART: [art] Signing Cert with AUTHO
29,360,208 UART: RITY.KEYID = 7
31,639,599 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,141 UART: [art] PUB.X = 2D39AFF756CDF19C49B726D4615A06A27C6C4403B5BE083F35AB46B6A96DA183D2C0B844C4A6D9819928AD63ADBEC5CE
31,648,347 UART: [art] PUB.Y = 38CE35FEF3801F51C8D7BCB4B2372826053F7BA53DB811FD2090145D6021EB2EA72CCB0FEA628C531D4D88ADBC7C3D38
31,655,660 UART: [art] SIG.R = 20AECFEB0E4DF215275BD9EECDBDBA0FCE7C27AAA9BDC95C7D55B77CBEC3247C82C2C71336634227858AF5BD18336DF0
31,663,064 UART: [art] SIG.S = 6FC60FDBF7658B745DD6F6247CC091FA33D344E9199EDF4292ADD4A0E1AE8108F6BFEBEF8D3B5A1249262AB3BB2C256B
32,968,631 UART: Caliptra RT
32,969,333 UART: [state] CFI Enabled
33,087,061 UART: [rt] RT listening for mailbox commands...
33,088,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,119,590 UART: [rt]cmd =0x44504543, len=24
33,146,201 >>> mbox cmd response data (40 bytes)
33,147,031 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,176,671 UART: [rt]cmd =0x44504543, len=24
33,202,053 >>> mbox cmd response data (40 bytes)
33,202,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,232,550 UART: [rt]cmd =0x44504543, len=24
33,259,096 >>> mbox cmd response data (40 bytes)
33,259,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,289,427 UART: [rt]cmd =0x44504543, len=24
33,315,554 >>> mbox cmd response data (40 bytes)
33,316,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,346,079 UART: [rt]cmd =0x44504543, len=24
33,372,324 >>> mbox cmd response data (40 bytes)
33,372,945 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,402,843 UART: [rt]cmd =0x44504543, len=24
33,429,594 >>> mbox cmd response data (40 bytes)
33,430,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,460,149 UART: [rt]cmd =0x44504543, len=24
33,486,527 >>> mbox cmd response data (40 bytes)
33,487,156 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,516,998 UART: [rt]cmd =0x44504543, len=24
33,542,874 >>> mbox cmd response data (40 bytes)
33,543,530 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,573,370 UART: [rt]cmd =0x44504543, len=24
33,599,776 >>> mbox cmd response data (40 bytes)
33,600,381 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,630,173 UART: [rt]cmd =0x44504543, len=24
33,656,199 >>> mbox cmd response data (40 bytes)
33,656,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,686,846 UART: [rt]cmd =0x44504543, len=24
33,713,271 >>> mbox cmd response data (40 bytes)
33,713,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,743,857 UART: [rt]cmd =0x44504543, len=24
33,770,158 >>> mbox cmd response data (40 bytes)
33,770,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,800,466 UART: [rt]cmd =0x44504543, len=24
33,827,184 >>> mbox cmd response data (40 bytes)
33,827,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,857,715 UART: [rt]cmd =0x44504543, len=24
33,884,153 >>> mbox cmd response data (40 bytes)
33,884,770 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,914,558 UART: [rt]cmd =0x44504543, len=24
33,940,384 >>> mbox cmd response data (40 bytes)
33,941,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,970,995 UART: [rt]cmd =0x44504543, len=24
33,977,772 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
191,970 UART:
192,350 UART: Running Caliptra ROM ...
193,548 UART:
193,710 UART: [state] CFI Enabled
265,458 UART: [state] LifecycleState = Unprovisioned
267,369 UART: [state] DebugLocked = No
270,041 UART: [state] WD Timer not started. Device not locked for debugging
274,385 UART: [kat] SHA2-256
453,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,061 UART: [kat] ++
465,613 UART: [kat] sha1
475,930 UART: [kat] SHA2-256
478,932 UART: [kat] SHA2-384
486,130 UART: [kat] SHA2-512-ACC
489,070 UART: [kat] ECC-384
2,951,315 UART: [kat] HMAC-384Kdf
2,972,860 UART: [kat] LMS
3,502,290 UART: [kat] --
3,506,421 UART: [cold-reset] ++
3,508,780 UART: [fht] FHT @ 0x50003400
3,518,693 UART: [idev] ++
3,519,258 UART: [idev] CDI.KEYID = 6
3,520,294 UART: [idev] SUBJECT.KEYID = 7
3,521,397 UART: [idev] UDS.KEYID = 0
3,522,324 ready_for_fw is high
3,522,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,085 UART: [idev] Erasing UDS.KEYID = 0
6,025,060 UART: [idev] Sha1 KeyId Algorithm
6,049,430 UART: [idev] --
6,053,434 UART: [ldev] ++
6,054,004 UART: [ldev] CDI.KEYID = 6
6,054,896 UART: [ldev] SUBJECT.KEYID = 5
6,056,115 UART: [ldev] AUTHORITY.KEYID = 7
6,057,384 UART: [ldev] FE.KEYID = 1
6,101,284 UART: [ldev] Erasing FE.KEYID = 1
8,603,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,270 UART: [ldev] --
10,411,727 UART: [fwproc] Wait for Commands...
10,413,769 UART: [fwproc] Recv command 0x46574c44
10,415,814 UART: [fwproc] Recv'd Img size: 114168 bytes
13,820,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,665 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,282,862 >>> mbox cmd response: success
14,287,788 UART: [afmc] ++
14,288,403 UART: [afmc] CDI.KEYID = 6
14,289,326 UART: [afmc] SUBJECT.KEYID = 7
14,290,491 UART: [afmc] AUTHORITY.KEYID = 5
16,824,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,438 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,240 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,098 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,116 UART: [afmc] --
18,627,042 UART: [cold-reset] --
18,630,367 UART: [state] Locking Datavault
18,634,809 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,477 UART: [state] Locking ICCM
18,639,093 UART: [exit] Launching FMC @ 0x40000130
18,647,498 UART:
18,647,756 UART: Running Caliptra FMC ...
18,648,870 UART:
18,649,030 UART: [state] CFI Enabled
18,707,777 UART: [fht] FMC Alias Private Key: 7
20,471,736 UART: [art] Extend RT PCRs Done
20,472,952 UART: [art] Lock RT PCRs Done
20,474,303 UART: [art] Populate DV Done
20,479,665 UART: [fht] FMC Alias Private Key: 7
20,481,200 UART: [art] Derive CDI
20,482,014 UART: [art] Store in in slot 0x4
20,540,200 UART: [art] Derive Key Pair
20,541,234 UART: [art] Store priv key in slot 0x5
23,003,965 UART: [art] Derive Key Pair - Done
23,016,608 UART: [art] Signing Cert with AUTHO
23,017,918 UART: RITY.KEYID = 7
24,730,327 UART: [art] Erasing AUTHORITY.KEYID = 7
24,731,854 UART: [art] PUB.X = DE6279098641B28536A9DEDC1F59EDF716916A17205D447216FBC901409C362D8734EA4D31E059DC45091C67A4D7CF5D
24,739,131 UART: [art] PUB.Y = EB13AE1907F6DAD33AD23819759E95E3B73AD1643048114820DC875B0FB42ED77F03868325031F3DCB16296DE0054CD4
24,746,339 UART: [art] SIG.R = BFAD90C14B3272B84FF86E6A21F065EF79322AE339082E94B1D5DA7C57FDD634E05EAC5A79DD84C7D4955EBDB08E4489
24,753,799 UART: [art] SIG.S = 307AC3218C839D2608BBB150DD952FB22B4EBFF9AC8B8B61FC2D55AE024DC49BA8EE15F9D2F10269AD2033306699B408
25,732,111 UART: Caliptra RT
25,732,829 UART: [state] CFI Enabled
25,899,947 UART: [rt] RT listening for mailbox commands...
25,901,875 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,932,313 UART: [rt]cmd =0x44504543, len=24
25,973,818 >>> mbox cmd response data (40 bytes)
25,974,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,004,568 UART: [rt]cmd =0x44504543, len=24
26,037,975 >>> mbox cmd response data (40 bytes)
26,038,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,068,499 UART: [rt]cmd =0x44504543, len=24
26,101,686 >>> mbox cmd response data (40 bytes)
26,102,367 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,132,164 UART: [rt]cmd =0x44504543, len=24
26,165,921 >>> mbox cmd response data (40 bytes)
26,166,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,196,568 UART: [rt]cmd =0x44504543, len=24
26,230,035 >>> mbox cmd response data (40 bytes)
26,230,674 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,260,534 UART: [rt]cmd =0x44504543, len=24
26,293,839 >>> mbox cmd response data (40 bytes)
26,294,463 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,324,368 UART: [rt]cmd =0x44504543, len=24
26,357,808 >>> mbox cmd response data (40 bytes)
26,358,462 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,388,414 UART: [rt]cmd =0x44504543, len=24
26,421,996 >>> mbox cmd response data (40 bytes)
26,422,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,452,779 UART: [rt]cmd =0x44504543, len=24
26,486,369 >>> mbox cmd response data (40 bytes)
26,486,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,517,001 UART: [rt]cmd =0x44504543, len=24
26,550,474 >>> mbox cmd response data (40 bytes)
26,551,096 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,581,018 UART: [rt]cmd =0x44504543, len=24
26,614,543 >>> mbox cmd response data (40 bytes)
26,615,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,644,966 UART: [rt]cmd =0x44504543, len=24
26,678,622 >>> mbox cmd response data (40 bytes)
26,679,272 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,709,119 UART: [rt]cmd =0x44504543, len=24
26,742,772 >>> mbox cmd response data (40 bytes)
26,743,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,773,480 UART: [rt]cmd =0x44504543, len=24
26,806,440 >>> mbox cmd response data (40 bytes)
26,807,046 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,836,851 UART: [rt]cmd =0x44504543, len=24
26,870,579 >>> mbox cmd response data (40 bytes)
26,871,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,901,174 UART: [rt]cmd =0x44504543, len=24
26,907,774 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,381,848 ready_for_fw is high
3,382,543 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,092,151 >>> mbox cmd response: success
18,387,943 UART:
18,388,345 UART: Running Caliptra FMC ...
18,389,545 UART:
18,389,720 UART: [state] CFI Enabled
18,453,369 UART: [fht] FMC Alias Private Key: 7
20,217,613 UART: [art] Extend RT PCRs Done
20,218,836 UART: [art] Lock RT PCRs Done
20,220,520 UART: [art] Populate DV Done
20,225,871 UART: [fht] FMC Alias Private Key: 7
20,227,467 UART: [art] Derive CDI
20,228,228 UART: [art] Store in in slot 0x4
20,285,977 UART: [art] Derive Key Pair
20,287,014 UART: [art] Store priv key in slot 0x5
22,750,064 UART: [art] Derive Key Pair - Done
22,762,864 UART: [art] Signing Cert with AUTHO
22,764,165 UART: RITY.KEYID = 7
24,475,693 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,171 UART: [art] PUB.X = ABDAD8BC2275F1BCF5BA4C0F3F872C5E837F909396C6B06EFA376EE040CC70D02E5A2FB748BEFAD7D0EBA620A6EF9488
24,484,509 UART: [art] PUB.Y = D6CA84CC4AEF17074EC8F2BA1E60BEC8BD9F49E967AEB4A5B499225EE79CE306419D7BA8754EE2E4F5E61000A9D631A1
24,491,802 UART: [art] SIG.R = 5EBC9D4F5EC8556468C7703901FAC3576611EF9B98404A0B9509B49D3AB960B4A459143100329A2E6292ED772D665EED
24,499,212 UART: [art] SIG.S = 7AF22BF230EE91E24DC343CF073667B77BA6F100307DF814E9646038BF51036D70CF7845A4FF51B344AE89182F84471D
25,478,010 UART: Caliptra RT
25,478,731 UART: [state] CFI Enabled
25,644,450 UART: [rt] RT listening for mailbox commands...
25,646,367 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,676,978 UART: [rt]cmd =0x44504543, len=24
25,718,531 >>> mbox cmd response data (40 bytes)
25,719,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,749,577 UART: [rt]cmd =0x44504543, len=24
25,782,546 >>> mbox cmd response data (40 bytes)
25,783,212 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,813,276 UART: [rt]cmd =0x44504543, len=24
25,846,928 >>> mbox cmd response data (40 bytes)
25,847,543 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,877,623 UART: [rt]cmd =0x44504543, len=24
25,911,218 >>> mbox cmd response data (40 bytes)
25,911,848 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,941,730 UART: [rt]cmd =0x44504543, len=24
25,975,306 >>> mbox cmd response data (40 bytes)
25,975,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,005,825 UART: [rt]cmd =0x44504543, len=24
26,039,432 >>> mbox cmd response data (40 bytes)
26,040,092 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,070,212 UART: [rt]cmd =0x44504543, len=24
26,103,387 >>> mbox cmd response data (40 bytes)
26,104,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,133,938 UART: [rt]cmd =0x44504543, len=24
26,167,420 >>> mbox cmd response data (40 bytes)
26,168,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,197,999 UART: [rt]cmd =0x44504543, len=24
26,231,300 >>> mbox cmd response data (40 bytes)
26,231,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,261,899 UART: [rt]cmd =0x44504543, len=24
26,295,433 >>> mbox cmd response data (40 bytes)
26,296,056 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,325,906 UART: [rt]cmd =0x44504543, len=24
26,359,627 >>> mbox cmd response data (40 bytes)
26,360,284 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,390,190 UART: [rt]cmd =0x44504543, len=24
26,423,792 >>> mbox cmd response data (40 bytes)
26,424,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,454,082 UART: [rt]cmd =0x44504543, len=24
26,487,670 >>> mbox cmd response data (40 bytes)
26,488,278 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,517,984 UART: [rt]cmd =0x44504543, len=24
26,551,550 >>> mbox cmd response data (40 bytes)
26,552,163 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,582,018 UART: [rt]cmd =0x44504543, len=24
26,615,540 >>> mbox cmd response data (40 bytes)
26,616,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,646,024 UART: [rt]cmd =0x44504543, len=24
26,652,539 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,679 writing to cptra_bootfsm_go
192,976 UART:
193,337 UART: Running Caliptra ROM ...
194,435 UART:
604,224 UART: [state] CFI Enabled
618,240 UART: [state] LifecycleState = Unprovisioned
620,110 UART: [state] DebugLocked = No
621,982 UART: [state] WD Timer not started. Device not locked for debugging
625,579 UART: [kat] SHA2-256
804,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,213 UART: [kat] ++
816,659 UART: [kat] sha1
828,948 UART: [kat] SHA2-256
832,035 UART: [kat] SHA2-384
838,247 UART: [kat] SHA2-512-ACC
841,203 UART: [kat] ECC-384
3,285,486 UART: [kat] HMAC-384Kdf
3,297,394 UART: [kat] LMS
3,826,843 UART: [kat] --
3,833,503 UART: [cold-reset] ++
3,835,967 UART: [fht] FHT @ 0x50003400
3,847,453 UART: [idev] ++
3,848,017 UART: [idev] CDI.KEYID = 6
3,849,014 UART: [idev] SUBJECT.KEYID = 7
3,850,125 UART: [idev] UDS.KEYID = 0
3,851,173 ready_for_fw is high
3,851,388 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,994,842 UART: [idev] Erasing UDS.KEYID = 0
6,324,921 UART: [idev] Sha1 KeyId Algorithm
6,347,666 UART: [idev] --
6,352,633 UART: [ldev] ++
6,353,227 UART: [ldev] CDI.KEYID = 6
6,354,194 UART: [ldev] SUBJECT.KEYID = 5
6,355,297 UART: [ldev] AUTHORITY.KEYID = 7
6,356,577 UART: [ldev] FE.KEYID = 1
6,366,521 UART: [ldev] Erasing FE.KEYID = 1
8,843,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,627,587 UART: [ldev] --
10,631,986 UART: [fwproc] Wait for Commands...
10,635,140 UART: [fwproc] Recv command 0x46574c44
10,637,249 UART: [fwproc] Recv'd Img size: 114168 bytes
14,040,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,182,865 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,499,340 >>> mbox cmd response: success
14,502,726 UART: [afmc] ++
14,503,320 UART: [afmc] CDI.KEYID = 6
14,504,231 UART: [afmc] SUBJECT.KEYID = 7
14,505,384 UART: [afmc] AUTHORITY.KEYID = 5
17,007,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,544 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,624 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,799,697 UART: [afmc] --
18,802,590 UART: [cold-reset] --
18,806,455 UART: [state] Locking Datavault
18,810,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,958 UART: [state] Locking ICCM
18,813,402 UART: [exit] Launching FMC @ 0x40000130
18,821,865 UART:
18,822,103 UART: Running Caliptra FMC ...
18,823,207 UART:
18,823,372 UART: [state] CFI Enabled
18,831,690 UART: [fht] FMC Alias Private Key: 7
20,588,464 UART: [art] Extend RT PCRs Done
20,589,675 UART: [art] Lock RT PCRs Done
20,591,348 UART: [art] Populate DV Done
20,596,535 UART: [fht] FMC Alias Private Key: 7
20,598,135 UART: [art] Derive CDI
20,598,954 UART: [art] Store in in slot 0x4
20,641,712 UART: [art] Derive Key Pair
20,642,762 UART: [art] Store priv key in slot 0x5
23,070,191 UART: [art] Derive Key Pair - Done
23,083,153 UART: [art] Signing Cert with AUTHO
23,084,455 UART: RITY.KEYID = 7
24,789,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,077 UART: [art] PUB.X = B50922D3919E29382E3C864950C031B7D86B1BC6FCEDE475C3AE8AE498E82D08F5FB1F23B921D58BE306396F6F7291D7
24,798,356 UART: [art] PUB.Y = 9299B49855B23AF174E9DEF9F40A02B86F8A77F57D718DD02D5AF82631644F669E79E7BC67C83D7335ADCE56EBEB990D
24,805,604 UART: [art] SIG.R = 433423E28FEDB876DB7BDBEAD0B8111580AB08C573570B19102CDD0E62DCC1A5F9E8DE8AA05F5F8C6DAAA11E09E4DDF3
24,813,007 UART: [art] SIG.S = E9B20A5D945745AD3683045682EDAEE93F9B1F74E4850E331CB9E6D5036B54C061CC104CDDC2E6634C942BF27A34D06B
25,792,078 UART: Caliptra RT
25,792,778 UART: [state] CFI Enabled
25,909,512 UART: [rt] RT listening for mailbox commands...
25,911,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,941,866 UART: [rt]cmd =0x44504543, len=24
25,968,720 >>> mbox cmd response data (40 bytes)
25,969,537 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,999,464 UART: [rt]cmd =0x44504543, len=24
26,025,847 >>> mbox cmd response data (40 bytes)
26,026,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,056,413 UART: [rt]cmd =0x44504543, len=24
26,082,718 >>> mbox cmd response data (40 bytes)
26,083,369 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,113,217 UART: [rt]cmd =0x44504543, len=24
26,139,448 >>> mbox cmd response data (40 bytes)
26,140,058 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,170,027 UART: [rt]cmd =0x44504543, len=24
26,196,290 >>> mbox cmd response data (40 bytes)
26,196,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,226,809 UART: [rt]cmd =0x44504543, len=24
26,252,881 >>> mbox cmd response data (40 bytes)
26,253,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,283,366 UART: [rt]cmd =0x44504543, len=24
26,309,334 >>> mbox cmd response data (40 bytes)
26,309,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,339,702 UART: [rt]cmd =0x44504543, len=24
26,366,186 >>> mbox cmd response data (40 bytes)
26,366,801 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,396,819 UART: [rt]cmd =0x44504543, len=24
26,423,336 >>> mbox cmd response data (40 bytes)
26,423,971 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,453,656 UART: [rt]cmd =0x44504543, len=24
26,480,198 >>> mbox cmd response data (40 bytes)
26,480,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,510,834 UART: [rt]cmd =0x44504543, len=24
26,536,916 >>> mbox cmd response data (40 bytes)
26,537,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,567,262 UART: [rt]cmd =0x44504543, len=24
26,593,637 >>> mbox cmd response data (40 bytes)
26,594,258 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,624,263 UART: [rt]cmd =0x44504543, len=24
26,650,634 >>> mbox cmd response data (40 bytes)
26,651,284 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,681,291 UART: [rt]cmd =0x44504543, len=24
26,707,746 >>> mbox cmd response data (40 bytes)
26,708,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,738,102 UART: [rt]cmd =0x44504543, len=24
26,764,374 >>> mbox cmd response data (40 bytes)
26,764,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,794,965 UART: [rt]cmd =0x44504543, len=24
26,801,506 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
3,700,859 ready_for_fw is high
3,701,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,895 >>> mbox cmd response: success
18,522,000 UART:
18,522,418 UART: Running Caliptra FMC ...
18,523,521 UART:
18,523,677 UART: [state] CFI Enabled
18,531,956 UART: [fht] FMC Alias Private Key: 7
20,288,625 UART: [art] Extend RT PCRs Done
20,289,854 UART: [art] Lock RT PCRs Done
20,291,679 UART: [art] Populate DV Done
20,297,143 UART: [fht] FMC Alias Private Key: 7
20,298,683 UART: [art] Derive CDI
20,299,417 UART: [art] Store in in slot 0x4
20,342,284 UART: [art] Derive Key Pair
20,343,328 UART: [art] Store priv key in slot 0x5
22,769,852 UART: [art] Derive Key Pair - Done
22,782,628 UART: [art] Signing Cert with AUTHO
22,783,932 UART: RITY.KEYID = 7
24,488,929 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,432 UART: [art] PUB.X = AEC8964D6ADBB739EE3E6631676B6DFEE568A07B57E467FD9D288D37EF3A844E938072B8DFE7A32676C9D13E18D7EB7C
24,497,738 UART: [art] PUB.Y = 3E405E017A818090E4DDEFD0C8415DAA444008C8677A48DEBD0C14953ABDCBBA8C4B27CDB3299A61721C4BB8650214CD
24,504,993 UART: [art] SIG.R = 11191F644F7B4AC11FB0EAD529ACEEB47A52CAD492C75012A96816B85C374DE02CA7819942AB4F698A8CE9D80EFF295F
24,512,449 UART: [art] SIG.S = 228D4019F4D218AF292A1D4299F63366AFF31C91B6F47AA1BEBA43F906EE01A273F94B1FCA3ABD22815EF20669EC2618
25,491,817 UART: Caliptra RT
25,492,535 UART: [state] CFI Enabled
25,610,040 UART: [rt] RT listening for mailbox commands...
25,611,955 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,642,625 UART: [rt]cmd =0x44504543, len=24
25,668,839 >>> mbox cmd response data (40 bytes)
25,669,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,699,664 UART: [rt]cmd =0x44504543, len=24
25,725,861 >>> mbox cmd response data (40 bytes)
25,726,483 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,756,352 UART: [rt]cmd =0x44504543, len=24
25,782,538 >>> mbox cmd response data (40 bytes)
25,783,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,813,133 UART: [rt]cmd =0x44504543, len=24
25,839,744 >>> mbox cmd response data (40 bytes)
25,840,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,870,420 UART: [rt]cmd =0x44504543, len=24
25,896,510 >>> mbox cmd response data (40 bytes)
25,897,126 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,927,156 UART: [rt]cmd =0x44504543, len=24
25,953,586 >>> mbox cmd response data (40 bytes)
25,954,210 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,984,115 UART: [rt]cmd =0x44504543, len=24
26,010,155 >>> mbox cmd response data (40 bytes)
26,010,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,040,721 UART: [rt]cmd =0x44504543, len=24
26,066,710 >>> mbox cmd response data (40 bytes)
26,067,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,097,508 UART: [rt]cmd =0x44504543, len=24
26,123,968 >>> mbox cmd response data (40 bytes)
26,124,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,154,443 UART: [rt]cmd =0x44504543, len=24
26,180,887 >>> mbox cmd response data (40 bytes)
26,181,509 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,211,304 UART: [rt]cmd =0x44504543, len=24
26,237,664 >>> mbox cmd response data (40 bytes)
26,238,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,268,327 UART: [rt]cmd =0x44504543, len=24
26,294,505 >>> mbox cmd response data (40 bytes)
26,295,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,325,081 UART: [rt]cmd =0x44504543, len=24
26,351,245 >>> mbox cmd response data (40 bytes)
26,351,857 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,381,772 UART: [rt]cmd =0x44504543, len=24
26,408,178 >>> mbox cmd response data (40 bytes)
26,408,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,438,829 UART: [rt]cmd =0x44504543, len=24
26,465,120 >>> mbox cmd response data (40 bytes)
26,465,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,496,078 UART: [rt]cmd =0x44504543, len=24
26,502,462 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,031 UART:
192,406 UART: Running Caliptra ROM ...
193,613 UART:
193,773 UART: [state] CFI Enabled
264,217 UART: [state] LifecycleState = Unprovisioned
266,643 UART: [state] DebugLocked = No
268,179 UART: [state] WD Timer not started. Device not locked for debugging
272,021 UART: [kat] SHA2-256
461,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,643 UART: [kat] ++
473,089 UART: [kat] sha1
484,645 UART: [kat] SHA2-256
487,699 UART: [kat] SHA2-384
493,162 UART: [kat] SHA2-512-ACC
495,767 UART: [kat] ECC-384
2,948,574 UART: [kat] HMAC-384Kdf
2,972,752 UART: [kat] LMS
3,504,567 UART: [kat] --
3,509,007 UART: [cold-reset] ++
3,510,733 UART: [fht] FHT @ 0x50003400
3,522,635 UART: [idev] ++
3,523,339 UART: [idev] CDI.KEYID = 6
3,524,294 UART: [idev] SUBJECT.KEYID = 7
3,525,535 UART: [idev] UDS.KEYID = 0
3,527,096 ready_for_fw is high
3,527,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,791 UART: [idev] Erasing UDS.KEYID = 0
6,027,835 UART: [idev] Sha1 KeyId Algorithm
6,050,921 UART: [idev] --
6,056,383 UART: [ldev] ++
6,057,071 UART: [ldev] CDI.KEYID = 6
6,057,994 UART: [ldev] SUBJECT.KEYID = 5
6,059,153 UART: [ldev] AUTHORITY.KEYID = 7
6,060,334 UART: [ldev] FE.KEYID = 1
6,100,083 UART: [ldev] Erasing FE.KEYID = 1
8,603,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,739 UART: [ldev] --
10,415,576 UART: [fwproc] Wait for Commands...
10,417,199 UART: [fwproc] Recv command 0x46574c44
10,419,517 UART: [fwproc] Recv'd Img size: 114168 bytes
13,866,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,602,917 >>> mbox cmd response: success
14,606,467 UART: [afmc] ++
14,607,174 UART: [afmc] CDI.KEYID = 6
14,608,390 UART: [afmc] SUBJECT.KEYID = 7
14,609,848 UART: [afmc] AUTHORITY.KEYID = 5
17,152,884 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,171 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,517 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,523 UART: [afmc] --
18,949,904 UART: [cold-reset] --
18,955,999 UART: [state] Locking Datavault
18,961,591 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,754 UART: [state] Locking ICCM
18,966,074 UART: [exit] Launching FMC @ 0x40000130
18,974,741 UART:
18,974,995 UART: Running Caliptra FMC ...
18,976,119 UART:
18,976,281 UART: [state] CFI Enabled
19,033,771 UART: [fht] FMC Alias Private Key: 7
20,797,599 UART: [art] Extend RT PCRs Done
20,798,816 UART: [art] Lock RT PCRs Done
20,800,384 UART: [art] Populate DV Done
20,805,689 UART: [fht] FMC Alias Private Key: 7
20,807,212 UART: [art] Derive CDI
20,807,961 UART: [art] Store in in slot 0x4
20,858,022 UART: [art] Derive Key Pair
20,859,021 UART: [art] Store priv key in slot 0x5
23,321,639 UART: [art] Derive Key Pair - Done
23,334,741 UART: [art] Signing Cert with AUTHO
23,336,053 UART: RITY.KEYID = 7
25,047,245 UART: [art] Erasing AUTHORITY.KEYID = 7
25,048,759 UART: [art] PUB.X = 41D5B7CF5A990DEED43353F34AE1092D56C11D7390AA71061D070E81694286443862D22A4C2A13EDA989C7ACDA3AFFB6
25,056,057 UART: [art] PUB.Y = DFB30A2C0F9BAB3B0E86E0DA04D6C4A7C8477E03A03D1D867CB20DB4FDA506EE715C1602B509F8A6061034E036E76805
25,063,317 UART: [art] SIG.R = 8DC64C9584412F8535E27B141F77DC6A02AF04618726AE0E84CD7C3121BB660760023B1EC3CA854BF393BDB0521FAB97
25,070,696 UART: [art] SIG.S = C9F934A202CFDB131132E89693DD9C1C9A7DFCB8A1870028F99A6F23710D05FA251CC75B47A40408896CB7C77FDDF06A
26,050,052 UART: Caliptra RT
26,050,773 UART: [state] CFI Enabled
26,215,158 UART: [rt] RT listening for mailbox commands...
26,217,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,247,450 UART: [rt]cmd =0x44504543, len=24
26,288,765 >>> mbox cmd response data (40 bytes)
26,289,594 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,319,339 UART: [rt]cmd =0x44504543, len=24
26,353,054 >>> mbox cmd response data (40 bytes)
26,353,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,383,522 UART: [rt]cmd =0x44504543, len=24
26,416,659 >>> mbox cmd response data (40 bytes)
26,417,345 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,447,429 UART: [rt]cmd =0x44504543, len=24
26,481,089 >>> mbox cmd response data (40 bytes)
26,481,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,511,524 UART: [rt]cmd =0x44504543, len=24
26,544,997 >>> mbox cmd response data (40 bytes)
26,545,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,575,699 UART: [rt]cmd =0x44504543, len=24
26,609,160 >>> mbox cmd response data (40 bytes)
26,609,783 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,639,737 UART: [rt]cmd =0x44504543, len=24
26,672,792 >>> mbox cmd response data (40 bytes)
26,673,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,703,513 UART: [rt]cmd =0x44504543, len=24
26,737,054 >>> mbox cmd response data (40 bytes)
26,737,699 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,767,759 UART: [rt]cmd =0x44504543, len=24
26,800,932 >>> mbox cmd response data (40 bytes)
26,801,541 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,831,406 UART: [rt]cmd =0x44504543, len=24
26,865,457 >>> mbox cmd response data (40 bytes)
26,866,079 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,896,156 UART: [rt]cmd =0x44504543, len=24
26,929,073 >>> mbox cmd response data (40 bytes)
26,929,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,959,530 UART: [rt]cmd =0x44504543, len=24
26,993,184 >>> mbox cmd response data (40 bytes)
26,993,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,023,888 UART: [rt]cmd =0x44504543, len=24
27,057,223 >>> mbox cmd response data (40 bytes)
27,057,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,087,869 UART: [rt]cmd =0x44504543, len=24
27,121,793 >>> mbox cmd response data (40 bytes)
27,122,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,152,218 UART: [rt]cmd =0x44504543, len=24
27,186,167 >>> mbox cmd response data (40 bytes)
27,186,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,216,693 UART: [rt]cmd =0x44504543, len=24
27,223,025 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,434,779 ready_for_fw is high
3,435,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,725,649 >>> mbox cmd response: success
19,024,160 UART:
19,024,575 UART: Running Caliptra FMC ...
19,025,686 UART:
19,025,845 UART: [state] CFI Enabled
19,091,417 UART: [fht] FMC Alias Private Key: 7
20,855,831 UART: [art] Extend RT PCRs Done
20,857,045 UART: [art] Lock RT PCRs Done
20,858,645 UART: [art] Populate DV Done
20,864,220 UART: [fht] FMC Alias Private Key: 7
20,865,869 UART: [art] Derive CDI
20,866,610 UART: [art] Store in in slot 0x4
20,924,622 UART: [art] Derive Key Pair
20,925,625 UART: [art] Store priv key in slot 0x5
23,388,034 UART: [art] Derive Key Pair - Done
23,401,249 UART: [art] Signing Cert with AUTHO
23,402,547 UART: RITY.KEYID = 7
25,113,836 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,370 UART: [art] PUB.X = 3B4794151060E330A7C7FBFA27B45CC8C62B316CB2B3E6825D12928FAB7BD09EDD4C5AF7B9DE30FFD6546B24C038512D
25,122,613 UART: [art] PUB.Y = 48ABABC9FB0D3582863BFF09C4D2CA5424052E0D95C2BF0ADF3822EC878EFDE52D4D7DBD44E013FD431DCDF9FAE36DF9
25,129,961 UART: [art] SIG.R = 38F744E332C6B93C2987E04F60F953BBC52BE90EFDD7E5A7148CEB5F2C59E8B643DA04257754D292B855AD7789E8C20C
25,137,344 UART: [art] SIG.S = 2F428132EEB6E702E5CC649934B22E80D8CB6431D6CF4B0AD4BCE56B8EF87DAC5B5127BCD912E4D064AB4EB4460988FB
26,116,707 UART: Caliptra RT
26,117,401 UART: [state] CFI Enabled
26,293,994 UART: [rt] RT listening for mailbox commands...
26,296,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,326,620 UART: [rt]cmd =0x44504543, len=24
26,367,953 >>> mbox cmd response data (40 bytes)
26,368,724 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,398,440 UART: [rt]cmd =0x44504543, len=24
26,432,285 >>> mbox cmd response data (40 bytes)
26,432,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,462,678 UART: [rt]cmd =0x44504543, len=24
26,496,253 >>> mbox cmd response data (40 bytes)
26,496,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,526,695 UART: [rt]cmd =0x44504543, len=24
26,560,266 >>> mbox cmd response data (40 bytes)
26,560,941 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,590,898 UART: [rt]cmd =0x44504543, len=24
26,624,404 >>> mbox cmd response data (40 bytes)
26,625,071 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,654,923 UART: [rt]cmd =0x44504543, len=24
26,688,720 >>> mbox cmd response data (40 bytes)
26,689,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,719,127 UART: [rt]cmd =0x44504543, len=24
26,752,673 >>> mbox cmd response data (40 bytes)
26,753,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,783,108 UART: [rt]cmd =0x44504543, len=24
26,816,674 >>> mbox cmd response data (40 bytes)
26,817,291 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,847,367 UART: [rt]cmd =0x44504543, len=24
26,880,811 >>> mbox cmd response data (40 bytes)
26,881,471 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,911,104 UART: [rt]cmd =0x44504543, len=24
26,944,703 >>> mbox cmd response data (40 bytes)
26,945,362 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,975,150 UART: [rt]cmd =0x44504543, len=24
27,008,844 >>> mbox cmd response data (40 bytes)
27,009,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,039,269 UART: [rt]cmd =0x44504543, len=24
27,072,947 >>> mbox cmd response data (40 bytes)
27,073,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,103,399 UART: [rt]cmd =0x44504543, len=24
27,137,149 >>> mbox cmd response data (40 bytes)
27,137,779 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,167,624 UART: [rt]cmd =0x44504543, len=24
27,200,977 >>> mbox cmd response data (40 bytes)
27,201,631 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,231,697 UART: [rt]cmd =0x44504543, len=24
27,265,234 >>> mbox cmd response data (40 bytes)
27,265,878 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,295,726 UART: [rt]cmd =0x44504543, len=24
27,302,030 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,697 writing to cptra_bootfsm_go
192,789 UART:
193,160 UART: Running Caliptra ROM ...
194,383 UART:
603,858 UART: [state] CFI Enabled
617,537 UART: [state] LifecycleState = Unprovisioned
619,932 UART: [state] DebugLocked = No
621,751 UART: [state] WD Timer not started. Device not locked for debugging
626,157 UART: [kat] SHA2-256
816,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,859 UART: [kat] ++
827,413 UART: [kat] sha1
837,295 UART: [kat] SHA2-256
840,320 UART: [kat] SHA2-384
845,248 UART: [kat] SHA2-512-ACC
847,830 UART: [kat] ECC-384
3,293,109 UART: [kat] HMAC-384Kdf
3,306,063 UART: [kat] LMS
3,837,885 UART: [kat] --
3,843,209 UART: [cold-reset] ++
3,845,218 UART: [fht] FHT @ 0x50003400
3,856,058 UART: [idev] ++
3,856,780 UART: [idev] CDI.KEYID = 6
3,857,692 UART: [idev] SUBJECT.KEYID = 7
3,858,869 UART: [idev] UDS.KEYID = 0
3,859,798 ready_for_fw is high
3,859,987 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,377 UART: [idev] Erasing UDS.KEYID = 0
6,335,959 UART: [idev] Sha1 KeyId Algorithm
6,358,300 UART: [idev] --
6,362,347 UART: [ldev] ++
6,363,079 UART: [ldev] CDI.KEYID = 6
6,363,999 UART: [ldev] SUBJECT.KEYID = 5
6,365,156 UART: [ldev] AUTHORITY.KEYID = 7
6,366,389 UART: [ldev] FE.KEYID = 1
6,379,813 UART: [ldev] Erasing FE.KEYID = 1
8,856,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,049 UART: [ldev] --
10,649,424 UART: [fwproc] Wait for Commands...
10,652,387 UART: [fwproc] Recv command 0x46574c44
10,654,696 UART: [fwproc] Recv'd Img size: 114168 bytes
14,103,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,556 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,842,677 >>> mbox cmd response: success
14,847,581 UART: [afmc] ++
14,848,293 UART: [afmc] CDI.KEYID = 6
14,849,502 UART: [afmc] SUBJECT.KEYID = 7
14,850,941 UART: [afmc] AUTHORITY.KEYID = 5
17,352,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,416 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,431 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,144,843 UART: [afmc] --
19,148,180 UART: [cold-reset] --
19,152,532 UART: [state] Locking Datavault
19,158,918 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,110 UART: [state] Locking ICCM
19,163,479 UART: [exit] Launching FMC @ 0x40000130
19,172,154 UART:
19,172,388 UART: Running Caliptra FMC ...
19,173,505 UART:
19,173,670 UART: [state] CFI Enabled
19,181,892 UART: [fht] FMC Alias Private Key: 7
20,938,293 UART: [art] Extend RT PCRs Done
20,939,510 UART: [art] Lock RT PCRs Done
20,941,403 UART: [art] Populate DV Done
20,946,652 UART: [fht] FMC Alias Private Key: 7
20,948,305 UART: [art] Derive CDI
20,949,124 UART: [art] Store in in slot 0x4
20,991,453 UART: [art] Derive Key Pair
20,992,452 UART: [art] Store priv key in slot 0x5
23,419,619 UART: [art] Derive Key Pair - Done
23,432,734 UART: [art] Signing Cert with AUTHO
23,434,035 UART: RITY.KEYID = 7
25,139,649 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,165 UART: [art] PUB.X = 2265B03ADE2A8BF3799CD876ABFA1815ADAB9EB694A93F105F2436B8C1BA31932AA1E3EC18ABF6AD33C96833276599F6
25,148,428 UART: [art] PUB.Y = E5B9CA74041D446E685D875C2E32099501E43CA2A6EF94F6370FD3EA5EDAF86DF12391B2B5B434297CE0E0ED9FAEAC38
25,155,719 UART: [art] SIG.R = 90F74B9C9939F6874493A9470AA806B0A523089DDE180AB50DDA211752F83E1BD174BF4F50D0E94F1FDD3EAB8BB7E50C
25,163,115 UART: [art] SIG.S = 9D387934D623ED78C39AC5D631C04C4044F0E8A8CC42079BAB462CAFD9729DA07F4DE88F669A43A5837BFF28F5C73398
26,141,932 UART: Caliptra RT
26,142,610 UART: [state] CFI Enabled
26,260,040 UART: [rt] RT listening for mailbox commands...
26,261,939 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,292,413 UART: [rt]cmd =0x44504543, len=24
26,318,792 >>> mbox cmd response data (40 bytes)
26,319,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,349,521 UART: [rt]cmd =0x44504543, len=24
26,375,897 >>> mbox cmd response data (40 bytes)
26,376,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,406,477 UART: [rt]cmd =0x44504543, len=24
26,432,833 >>> mbox cmd response data (40 bytes)
26,433,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,463,339 UART: [rt]cmd =0x44504543, len=24
26,489,079 >>> mbox cmd response data (40 bytes)
26,489,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,519,771 UART: [rt]cmd =0x44504543, len=24
26,545,933 >>> mbox cmd response data (40 bytes)
26,546,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,576,586 UART: [rt]cmd =0x44504543, len=24
26,603,161 >>> mbox cmd response data (40 bytes)
26,603,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,633,991 UART: [rt]cmd =0x44504543, len=24
26,660,108 >>> mbox cmd response data (40 bytes)
26,660,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,690,740 UART: [rt]cmd =0x44504543, len=24
26,717,052 >>> mbox cmd response data (40 bytes)
26,717,707 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,747,554 UART: [rt]cmd =0x44504543, len=24
26,773,328 >>> mbox cmd response data (40 bytes)
26,773,937 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,803,800 UART: [rt]cmd =0x44504543, len=24
26,829,802 >>> mbox cmd response data (40 bytes)
26,830,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,860,327 UART: [rt]cmd =0x44504543, len=24
26,886,384 >>> mbox cmd response data (40 bytes)
26,886,995 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,917,053 UART: [rt]cmd =0x44504543, len=24
26,943,313 >>> mbox cmd response data (40 bytes)
26,943,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,973,912 UART: [rt]cmd =0x44504543, len=24
27,000,149 >>> mbox cmd response data (40 bytes)
27,000,757 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,030,462 UART: [rt]cmd =0x44504543, len=24
27,056,841 >>> mbox cmd response data (40 bytes)
27,057,481 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,087,438 UART: [rt]cmd =0x44504543, len=24
27,113,373 >>> mbox cmd response data (40 bytes)
27,114,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,144,095 UART: [rt]cmd =0x44504543, len=24
27,150,351 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,661 writing to cptra_bootfsm_go
3,753,731 ready_for_fw is high
3,754,138 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,936,792 >>> mbox cmd response: success
19,192,290 UART:
19,192,707 UART: Running Caliptra FMC ...
19,193,843 UART:
19,194,003 UART: [state] CFI Enabled
19,202,005 UART: [fht] FMC Alias Private Key: 7
20,959,285 UART: [art] Extend RT PCRs Done
20,960,513 UART: [art] Lock RT PCRs Done
20,962,028 UART: [art] Populate DV Done
20,967,285 UART: [fht] FMC Alias Private Key: 7
20,968,985 UART: [art] Derive CDI
20,969,795 UART: [art] Store in in slot 0x4
21,012,551 UART: [art] Derive Key Pair
21,013,596 UART: [art] Store priv key in slot 0x5
23,440,469 UART: [art] Derive Key Pair - Done
23,453,311 UART: [art] Signing Cert with AUTHO
23,454,618 UART: RITY.KEYID = 7
25,160,339 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,848 UART: [art] PUB.X = 7F3640A98F7D9D611CA44A204B33CF9FB1B5CA1D0F3F5BC7852F0D36A5431402D306DE4112F220BE502257C4403A8FC5
25,169,093 UART: [art] PUB.Y = D64CDCD1A0CE39174864C77984332AF0E6296F2F573275889FF554EB65356AC04C24B3250E907BF572529A3A38C28D3B
25,176,367 UART: [art] SIG.R = 69F2A99637C8002BF4849731F618A9CB0C06F22746EB0E11F253FD46B39E89B007AD19982623BCF2DD9ED5F1BF63E6A4
25,183,719 UART: [art] SIG.S = 277FFCA13178B7B8E2D581EEBE87E5567E4F994553AE1DE3EC0840C57B2BBDBC6B5B646276DD5CC22EBF254245C02898
26,162,846 UART: Caliptra RT
26,163,536 UART: [state] CFI Enabled
26,281,989 UART: [rt] RT listening for mailbox commands...
26,283,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,314,285 UART: [rt]cmd =0x44504543, len=24
26,340,841 >>> mbox cmd response data (40 bytes)
26,341,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,371,395 UART: [rt]cmd =0x44504543, len=24
26,397,315 >>> mbox cmd response data (40 bytes)
26,397,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,427,807 UART: [rt]cmd =0x44504543, len=24
26,454,004 >>> mbox cmd response data (40 bytes)
26,454,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,484,461 UART: [rt]cmd =0x44504543, len=24
26,510,618 >>> mbox cmd response data (40 bytes)
26,511,240 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,541,051 UART: [rt]cmd =0x44504543, len=24
26,567,112 >>> mbox cmd response data (40 bytes)
26,567,745 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,597,593 UART: [rt]cmd =0x44504543, len=24
26,624,251 >>> mbox cmd response data (40 bytes)
26,624,895 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,654,795 UART: [rt]cmd =0x44504543, len=24
26,681,090 >>> mbox cmd response data (40 bytes)
26,681,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,711,528 UART: [rt]cmd =0x44504543, len=24
26,737,639 >>> mbox cmd response data (40 bytes)
26,738,257 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,768,049 UART: [rt]cmd =0x44504543, len=24
26,794,408 >>> mbox cmd response data (40 bytes)
26,795,062 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,824,859 UART: [rt]cmd =0x44504543, len=24
26,850,934 >>> mbox cmd response data (40 bytes)
26,851,757 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,881,443 UART: [rt]cmd =0x44504543, len=24
26,907,469 >>> mbox cmd response data (40 bytes)
26,908,072 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,938,081 UART: [rt]cmd =0x44504543, len=24
26,964,272 >>> mbox cmd response data (40 bytes)
26,964,898 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,995,030 UART: [rt]cmd =0x44504543, len=24
27,021,350 >>> mbox cmd response data (40 bytes)
27,022,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,051,861 UART: [rt]cmd =0x44504543, len=24
27,077,728 >>> mbox cmd response data (40 bytes)
27,078,332 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,108,192 UART: [rt]cmd =0x44504543, len=24
27,134,302 >>> mbox cmd response data (40 bytes)
27,134,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,164,653 UART: [rt]cmd =0x44504543, len=24
27,171,225 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,748 UART: [state] LifecycleState = Unprovisioned
85,403 UART: [state] DebugLocked = No
86,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
890,239 UART: [kat] SHA2-256
892,177 UART: [kat] SHA2-384
894,798 UART: [kat] SHA2-512-ACC
896,699 UART: [kat] ECC-384
902,118 UART: [kat] HMAC-384Kdf
906,698 UART: [kat] LMS
1,474,894 UART: [kat] --
1,475,845 UART: [cold-reset] ++
1,476,339 UART: [fht] Storing FHT @ 0x50003400
1,479,208 UART: [idev] ++
1,479,376 UART: [idev] CDI.KEYID = 6
1,479,736 UART: [idev] SUBJECT.KEYID = 7
1,480,160 UART: [idev] UDS.KEYID = 0
1,480,505 ready_for_fw is high
1,480,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,482 UART: [idev] Erasing UDS.KEYID = 0
1,504,916 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,561 UART: [ldev] ++
1,514,729 UART: [ldev] CDI.KEYID = 6
1,515,092 UART: [ldev] SUBJECT.KEYID = 5
1,515,518 UART: [ldev] AUTHORITY.KEYID = 7
1,515,981 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,545,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,108 UART: [ldev] --
1,585,489 UART: [fwproc] Waiting for Commands...
1,586,112 UART: [fwproc] Received command 0x46574c44
1,586,903 UART: [fwproc] Received Image of size 114168 bytes
2,882,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,089 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,441 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,988 >>> mbox cmd response: success
3,076,234 UART: [afmc] ++
3,076,402 UART: [afmc] CDI.KEYID = 6
3,076,764 UART: [afmc] SUBJECT.KEYID = 7
3,077,189 UART: [afmc] AUTHORITY.KEYID = 5
3,112,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,522 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,302 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,030 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,915 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,605 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,522 UART: [afmc] --
3,156,526 UART: [cold-reset] --
3,157,314 UART: [state] Locking Datavault
3,158,519 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,123 UART: [state] Locking ICCM
3,159,745 UART: [exit] Launching FMC @ 0x40000130
3,165,074 UART:
3,165,090 UART: Running Caliptra FMC ...
3,165,498 UART:
3,165,552 UART: [state] CFI Enabled
3,176,393 UART: [fht] FMC Alias Private Key: 7
3,284,054 UART: [art] Extend RT PCRs Done
3,284,482 UART: [art] Lock RT PCRs Done
3,286,082 UART: [art] Populate DV Done
3,294,179 UART: [fht] FMC Alias Private Key: 7
3,295,343 UART: [art] Derive CDI
3,295,623 UART: [art] Store in in slot 0x4
3,381,574 UART: [art] Derive Key Pair
3,381,934 UART: [art] Store priv key in slot 0x5
3,395,214 UART: [art] Derive Key Pair - Done
3,409,934 UART: [art] Signing Cert with AUTHO
3,410,414 UART: RITY.KEYID = 7
3,425,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,405 UART: [art] PUB.X = 29A5A4AD2F8E39B812D3A17AE6D485ADE77DB9312ACB669B0A80F2BF68933FB224D862B9B41590FE9FB38287E8DD99BD
3,433,188 UART: [art] PUB.Y = 31CA8F0362F293EECD5E9EB00E4A741199ED1C533314AB4E593003F0AE388F6322E91A15430A9056C23DD0943718D7F2
3,440,126 UART: [art] SIG.R = 178616542D3486433D971ED745C2512D84193D68E7E5D8B3B0CE16E9D0931D7E2A012143C89438A0B2B03D3F2EC85C46
3,446,887 UART: [art] SIG.S = C39D3C7E34DD619E1E09ABEF2F1032692A9C68818771DE03BF7FB407D637F8D21504047AEA28AF49617E966029B90BBE
3,470,826 UART: Caliptra RT
3,471,079 UART: [state] CFI Enabled
3,579,882 UART: [rt] RT listening for mailbox commands...
3,580,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,664 UART: [rt]cmd =0x44504543, len=24
3,636,658 >>> mbox cmd response data (40 bytes)
3,636,659 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,142 UART: [rt]cmd =0x44504543, len=24
3,692,362 >>> mbox cmd response data (40 bytes)
3,692,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,721,928 UART: [rt]cmd =0x44504543, len=24
3,748,578 >>> mbox cmd response data (40 bytes)
3,748,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,072 UART: [rt]cmd =0x44504543, len=24
3,804,578 >>> mbox cmd response data (40 bytes)
3,804,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,102 UART: [rt]cmd =0x44504543, len=24
3,860,544 >>> mbox cmd response data (40 bytes)
3,860,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,098 UART: [rt]cmd =0x44504543, len=24
3,916,102 >>> mbox cmd response data (40 bytes)
3,916,103 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,626 UART: [rt]cmd =0x44504543, len=24
3,972,070 >>> mbox cmd response data (40 bytes)
3,972,071 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,728 UART: [rt]cmd =0x44504543, len=24
4,028,362 >>> mbox cmd response data (40 bytes)
4,028,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,057,864 UART: [rt]cmd =0x44504543, len=24
4,084,624 >>> mbox cmd response data (40 bytes)
4,084,625 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,114,082 UART: [rt]cmd =0x44504543, len=24
4,140,346 >>> mbox cmd response data (40 bytes)
4,140,347 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,996 UART: [rt]cmd =0x44504543, len=24
4,196,920 >>> mbox cmd response data (40 bytes)
4,196,921 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,226,596 UART: [rt]cmd =0x44504543, len=24
4,253,342 >>> mbox cmd response data (40 bytes)
4,253,343 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,282,834 UART: [rt]cmd =0x44504543, len=24
4,309,244 >>> mbox cmd response data (40 bytes)
4,309,245 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,338,884 UART: [rt]cmd =0x44504543, len=24
4,365,026 >>> mbox cmd response data (40 bytes)
4,365,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,394,632 UART: [rt]cmd =0x44504543, len=24
4,421,242 >>> mbox cmd response data (40 bytes)
4,421,243 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,450,498 UART: [rt]cmd =0x44504543, len=24
4,457,532 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,885 ready_for_fw is high
1,361,885 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,798 >>> mbox cmd response: success
2,988,448 UART:
2,988,464 UART: Running Caliptra FMC ...
2,988,872 UART:
2,988,926 UART: [state] CFI Enabled
2,999,535 UART: [fht] FMC Alias Private Key: 7
3,107,884 UART: [art] Extend RT PCRs Done
3,108,312 UART: [art] Lock RT PCRs Done
3,109,600 UART: [art] Populate DV Done
3,117,881 UART: [fht] FMC Alias Private Key: 7
3,119,013 UART: [art] Derive CDI
3,119,293 UART: [art] Store in in slot 0x4
3,204,826 UART: [art] Derive Key Pair
3,205,186 UART: [art] Store priv key in slot 0x5
3,218,934 UART: [art] Derive Key Pair - Done
3,233,774 UART: [art] Signing Cert with AUTHO
3,234,254 UART: RITY.KEYID = 7
3,249,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,059 UART: [art] PUB.X = 031F5529CBC19E7CD71DD754A77DC03523D267DA9E97E769BF362C3F92ED35A2DE0F38DBDC141EB0F975F7FCCF97991A
3,256,841 UART: [art] PUB.Y = 0B843387D6CCE31F6F0375B03286CC06DD2F1344EFDCD62C76FD52AF92944E84C8C6750CC72AEE26C16A4160FE2E46F7
3,263,791 UART: [art] SIG.R = 67A28EE79E3F9595ADFF86ED15E254D12D9D6600849911E24E97816312888B304ACD28F56C7A0A62557DCD685078FBA7
3,270,536 UART: [art] SIG.S = 819371B981CDB211893C7C4D2A75C8C5405D9E8816A797585A38C12781F019B4F3CC13F908AD90C70F8FA506DE3CA802
3,294,061 UART: Caliptra RT
3,294,314 UART: [state] CFI Enabled
3,403,039 UART: [rt] RT listening for mailbox commands...
3,403,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,627 UART: [rt]cmd =0x44504543, len=24
3,459,701 >>> mbox cmd response data (40 bytes)
3,459,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,489,377 UART: [rt]cmd =0x44504543, len=24
3,515,571 >>> mbox cmd response data (40 bytes)
3,515,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,167 UART: [rt]cmd =0x44504543, len=24
3,571,125 >>> mbox cmd response data (40 bytes)
3,571,126 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,663 UART: [rt]cmd =0x44504543, len=24
3,627,001 >>> mbox cmd response data (40 bytes)
3,627,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,656,499 UART: [rt]cmd =0x44504543, len=24
3,683,003 >>> mbox cmd response data (40 bytes)
3,683,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,333 UART: [rt]cmd =0x44504543, len=24
3,738,707 >>> mbox cmd response data (40 bytes)
3,738,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,061 UART: [rt]cmd =0x44504543, len=24
3,794,601 >>> mbox cmd response data (40 bytes)
3,794,602 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,824,111 UART: [rt]cmd =0x44504543, len=24
3,850,081 >>> mbox cmd response data (40 bytes)
3,850,082 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,481 UART: [rt]cmd =0x44504543, len=24
3,906,083 >>> mbox cmd response data (40 bytes)
3,906,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,665 UART: [rt]cmd =0x44504543, len=24
3,961,517 >>> mbox cmd response data (40 bytes)
3,961,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,015 UART: [rt]cmd =0x44504543, len=24
4,017,177 >>> mbox cmd response data (40 bytes)
4,017,178 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,645 UART: [rt]cmd =0x44504543, len=24
4,072,813 >>> mbox cmd response data (40 bytes)
4,072,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,102,339 UART: [rt]cmd =0x44504543, len=24
4,128,853 >>> mbox cmd response data (40 bytes)
4,128,854 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,158,349 UART: [rt]cmd =0x44504543, len=24
4,184,553 >>> mbox cmd response data (40 bytes)
4,184,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,213,931 UART: [rt]cmd =0x44504543, len=24
4,240,323 >>> mbox cmd response data (40 bytes)
4,240,324 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,955 UART: [rt]cmd =0x44504543, len=24
4,277,307 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,084 UART: [state] DebugLocked = No
86,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
903,409 UART: [kat] HMAC-384Kdf
907,907 UART: [kat] LMS
1,476,103 UART: [kat] --
1,477,248 UART: [cold-reset] ++
1,477,684 UART: [fht] Storing FHT @ 0x50003400
1,480,443 UART: [idev] ++
1,480,611 UART: [idev] CDI.KEYID = 6
1,480,971 UART: [idev] SUBJECT.KEYID = 7
1,481,395 UART: [idev] UDS.KEYID = 0
1,481,740 ready_for_fw is high
1,481,740 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,601 UART: [idev] Erasing UDS.KEYID = 0
1,506,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,995 UART: [idev] --
1,516,186 UART: [ldev] ++
1,516,354 UART: [ldev] CDI.KEYID = 6
1,516,717 UART: [ldev] SUBJECT.KEYID = 5
1,517,143 UART: [ldev] AUTHORITY.KEYID = 7
1,517,606 UART: [ldev] FE.KEYID = 1
1,522,658 UART: [ldev] Erasing FE.KEYID = 1
1,548,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,927 UART: [ldev] --
1,588,300 UART: [fwproc] Waiting for Commands...
1,588,971 UART: [fwproc] Received command 0x46574c44
1,589,762 UART: [fwproc] Received Image of size 114168 bytes
2,887,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,756 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,625 >>> mbox cmd response: success
3,079,867 UART: [afmc] ++
3,080,035 UART: [afmc] CDI.KEYID = 6
3,080,397 UART: [afmc] SUBJECT.KEYID = 7
3,080,822 UART: [afmc] AUTHORITY.KEYID = 5
3,116,045 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,877 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,605 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,490 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,180 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,863 UART: [afmc] --
3,158,889 UART: [cold-reset] --
3,159,707 UART: [state] Locking Datavault
3,160,604 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,208 UART: [state] Locking ICCM
3,161,674 UART: [exit] Launching FMC @ 0x40000130
3,167,003 UART:
3,167,019 UART: Running Caliptra FMC ...
3,167,427 UART:
3,167,570 UART: [state] CFI Enabled
3,177,989 UART: [fht] FMC Alias Private Key: 7
3,285,950 UART: [art] Extend RT PCRs Done
3,286,378 UART: [art] Lock RT PCRs Done
3,287,938 UART: [art] Populate DV Done
3,296,137 UART: [fht] FMC Alias Private Key: 7
3,297,279 UART: [art] Derive CDI
3,297,559 UART: [art] Store in in slot 0x4
3,383,312 UART: [art] Derive Key Pair
3,383,672 UART: [art] Store priv key in slot 0x5
3,397,108 UART: [art] Derive Key Pair - Done
3,411,648 UART: [art] Signing Cert with AUTHO
3,412,128 UART: RITY.KEYID = 7
3,427,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,151 UART: [art] PUB.X = 151D1B477039199CA784344D2F66FF7D73599FF714EBB3DA9F0AD97C264DE9A805A1701556C114AAD6170024E916208A
3,434,891 UART: [art] PUB.Y = 67FA1B674C59EC7D3C2908EAC817CF88F460033BA1D05064A0A5CD337959EF58BD383F71B5C825CA05D833F6D81A2E3E
3,441,842 UART: [art] SIG.R = 44553FF3C72A9220709D5DC8E3BB47D2B400F9287762B2538A9709D9E0D0BD4757E6E91F858DC0996B6A61323676D3D7
3,448,583 UART: [art] SIG.S = A4A704635D281150665FDC1B93A9D2A65166E2EDE94E79ABCEAB59D5A84D24DA54B325818BDEEF57676AFC2061BE43AA
3,471,863 UART: Caliptra RT
3,472,208 UART: [state] CFI Enabled
3,580,351 UART: [rt] RT listening for mailbox commands...
3,581,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,777 UART: [rt]cmd =0x44504543, len=24
3,637,001 >>> mbox cmd response data (40 bytes)
3,637,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,575 UART: [rt]cmd =0x44504543, len=24
3,693,007 >>> mbox cmd response data (40 bytes)
3,693,008 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,722,637 UART: [rt]cmd =0x44504543, len=24
3,749,175 >>> mbox cmd response data (40 bytes)
3,749,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,729 UART: [rt]cmd =0x44504543, len=24
3,804,971 >>> mbox cmd response data (40 bytes)
3,804,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,834,307 UART: [rt]cmd =0x44504543, len=24
3,860,615 >>> mbox cmd response data (40 bytes)
3,860,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,179 UART: [rt]cmd =0x44504543, len=24
3,916,889 >>> mbox cmd response data (40 bytes)
3,916,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,247 UART: [rt]cmd =0x44504543, len=24
3,972,411 >>> mbox cmd response data (40 bytes)
3,972,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,851 UART: [rt]cmd =0x44504543, len=24
4,028,157 >>> mbox cmd response data (40 bytes)
4,028,158 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,057,523 UART: [rt]cmd =0x44504543, len=24
4,083,909 >>> mbox cmd response data (40 bytes)
4,083,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,113,435 UART: [rt]cmd =0x44504543, len=24
4,139,525 >>> mbox cmd response data (40 bytes)
4,139,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,065 UART: [rt]cmd =0x44504543, len=24
4,195,493 >>> mbox cmd response data (40 bytes)
4,195,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,791 UART: [rt]cmd =0x44504543, len=24
4,251,571 >>> mbox cmd response data (40 bytes)
4,251,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,281,081 UART: [rt]cmd =0x44504543, len=24
4,307,631 >>> mbox cmd response data (40 bytes)
4,307,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,337,159 UART: [rt]cmd =0x44504543, len=24
4,363,375 >>> mbox cmd response data (40 bytes)
4,363,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,392,879 UART: [rt]cmd =0x44504543, len=24
4,419,375 >>> mbox cmd response data (40 bytes)
4,419,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,448,723 UART: [rt]cmd =0x44504543, len=24
4,455,775 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,830 ready_for_fw is high
1,362,830 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,929,403 >>> mbox cmd response: success
2,991,003 UART:
2,991,019 UART: Running Caliptra FMC ...
2,991,427 UART:
2,991,570 UART: [state] CFI Enabled
3,002,639 UART: [fht] FMC Alias Private Key: 7
3,110,438 UART: [art] Extend RT PCRs Done
3,110,866 UART: [art] Lock RT PCRs Done
3,112,584 UART: [art] Populate DV Done
3,120,987 UART: [fht] FMC Alias Private Key: 7
3,122,095 UART: [art] Derive CDI
3,122,375 UART: [art] Store in in slot 0x4
3,207,882 UART: [art] Derive Key Pair
3,208,242 UART: [art] Store priv key in slot 0x5
3,221,460 UART: [art] Derive Key Pair - Done
3,236,534 UART: [art] Signing Cert with AUTHO
3,237,014 UART: RITY.KEYID = 7
3,252,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,147 UART: [art] PUB.X = 28C23C75B04EE20F5D56AAF9E2AF04D742DD80EE373160AC5750B7E17A2C6C4E3C09D1227C6EFBD70BA28195CC7C8DBE
3,259,925 UART: [art] PUB.Y = 1C9C8ABF1DC46717B8775F3E8BCE00232E884F716283917BE73036A8F75454E6C0FE55A9D3BA386875C7A5EB077BDC15
3,266,856 UART: [art] SIG.R = 9686EB467F3B53F7A6C4F7C6148119107D94605596484780F39AF085567A6E2B3415CDF4B0AC453F96FA68927E8AABD8
3,273,624 UART: [art] SIG.S = F11E00838387C7E994E192B9632019C5FB0D6BCE26DE9D0ACA7FB336E0DABB74006FF39F600406EE85B4BA0537007F8D
3,297,454 UART: Caliptra RT
3,297,799 UART: [state] CFI Enabled
3,406,547 UART: [rt] RT listening for mailbox commands...
3,407,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,313 UART: [rt]cmd =0x44504543, len=24
3,463,537 >>> mbox cmd response data (40 bytes)
3,463,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,931 UART: [rt]cmd =0x44504543, len=24
3,519,165 >>> mbox cmd response data (40 bytes)
3,519,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,548,761 UART: [rt]cmd =0x44504543, len=24
3,574,797 >>> mbox cmd response data (40 bytes)
3,574,798 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,604,177 UART: [rt]cmd =0x44504543, len=24
3,630,967 >>> mbox cmd response data (40 bytes)
3,630,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,631 UART: [rt]cmd =0x44504543, len=24
3,686,701 >>> mbox cmd response data (40 bytes)
3,686,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,716,149 UART: [rt]cmd =0x44504543, len=24
3,742,869 >>> mbox cmd response data (40 bytes)
3,742,870 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,303 UART: [rt]cmd =0x44504543, len=24
3,798,621 >>> mbox cmd response data (40 bytes)
3,798,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,828,117 UART: [rt]cmd =0x44504543, len=24
3,854,421 >>> mbox cmd response data (40 bytes)
3,854,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,883,863 UART: [rt]cmd =0x44504543, len=24
3,910,183 >>> mbox cmd response data (40 bytes)
3,910,184 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,865 UART: [rt]cmd =0x44504543, len=24
3,966,167 >>> mbox cmd response data (40 bytes)
3,966,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,995,783 UART: [rt]cmd =0x44504543, len=24
4,022,461 >>> mbox cmd response data (40 bytes)
4,022,462 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,051,853 UART: [rt]cmd =0x44504543, len=24
4,078,393 >>> mbox cmd response data (40 bytes)
4,078,394 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,107,775 UART: [rt]cmd =0x44504543, len=24
4,134,695 >>> mbox cmd response data (40 bytes)
4,134,696 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,233 UART: [rt]cmd =0x44504543, len=24
4,190,497 >>> mbox cmd response data (40 bytes)
4,190,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,220,137 UART: [rt]cmd =0x44504543, len=24
4,246,565 >>> mbox cmd response data (40 bytes)
4,246,566 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,275,947 UART: [rt]cmd =0x44504543, len=24
4,283,011 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,830 UART: [kat] SHA2-256
893,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,605 UART: [kat] ++
897,757 UART: [kat] sha1
901,991 UART: [kat] SHA2-256
903,931 UART: [kat] SHA2-384
906,774 UART: [kat] SHA2-512-ACC
908,675 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,718 UART: [kat] LMS
1,171,046 UART: [kat] --
1,171,737 UART: [cold-reset] ++
1,172,201 UART: [fht] FHT @ 0x50003400
1,174,818 UART: [idev] ++
1,174,986 UART: [idev] CDI.KEYID = 6
1,175,346 UART: [idev] SUBJECT.KEYID = 7
1,175,770 UART: [idev] UDS.KEYID = 0
1,176,115 ready_for_fw is high
1,176,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,737 UART: [idev] Sha1 KeyId Algorithm
1,209,187 UART: [idev] --
1,210,399 UART: [ldev] ++
1,210,567 UART: [ldev] CDI.KEYID = 6
1,210,930 UART: [ldev] SUBJECT.KEYID = 5
1,211,356 UART: [ldev] AUTHORITY.KEYID = 7
1,211,819 UART: [ldev] FE.KEYID = 1
1,217,263 UART: [ldev] Erasing FE.KEYID = 1
1,243,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,493 UART: [ldev] --
1,282,860 UART: [fwproc] Wait for Commands...
1,283,578 UART: [fwproc] Recv command 0x46574c44
1,284,306 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,106 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,057 >>> mbox cmd response: success
2,773,249 UART: [afmc] ++
2,773,417 UART: [afmc] CDI.KEYID = 6
2,773,779 UART: [afmc] SUBJECT.KEYID = 7
2,774,204 UART: [afmc] AUTHORITY.KEYID = 5
2,809,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,369 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,088 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,846 UART: [afmc] --
2,852,920 UART: [cold-reset] --
2,853,738 UART: [state] Locking Datavault
2,854,855 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,459 UART: [state] Locking ICCM
2,856,117 UART: [exit] Launching FMC @ 0x40000130
2,861,446 UART:
2,861,462 UART: Running Caliptra FMC ...
2,861,870 UART:
2,861,924 UART: [state] CFI Enabled
2,872,083 UART: [fht] FMC Alias Private Key: 7
2,980,456 UART: [art] Extend RT PCRs Done
2,980,884 UART: [art] Lock RT PCRs Done
2,982,726 UART: [art] Populate DV Done
2,991,011 UART: [fht] FMC Alias Private Key: 7
2,992,071 UART: [art] Derive CDI
2,992,351 UART: [art] Store in in slot 0x4
3,077,978 UART: [art] Derive Key Pair
3,078,338 UART: [art] Store priv key in slot 0x5
3,091,644 UART: [art] Derive Key Pair - Done
3,106,982 UART: [art] Signing Cert with AUTHO
3,107,462 UART: RITY.KEYID = 7
3,122,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,615 UART: [art] PUB.X = 627A0A42F0BEC8FB6F368933296852962F51A6A1EAB7CBFE25C58A015C7399A5194731CDCA370D2445BFB223627CE5A7
3,130,382 UART: [art] PUB.Y = 08973722CFB91DBFC45569F4DBBCC248896E8AC31824FA40921DA218A6985051689CD6919F0003E273C29BE5E9BDC773
3,137,306 UART: [art] SIG.R = 6D65A0E7DDD37E6784A1EF4A3760425CB137FC5FA55BADF5EC91C80FD954284543A5E27449FAD546D64FF64C5ABEB8A5
3,144,091 UART: [art] SIG.S = 1C93B38EE6041FE26FE882240E3DE3211FF5431EF2A1E2F873F71A6661F3DF48E782A907E572E70C4BA9094E5601012A
3,167,985 UART: Caliptra RT
3,168,238 UART: [state] CFI Enabled
3,276,539 UART: [rt] RT listening for mailbox commands...
3,277,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,289 UART: [rt]cmd =0x44504543, len=24
3,333,193 >>> mbox cmd response data (40 bytes)
3,333,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,362,625 UART: [rt]cmd =0x44504543, len=24
3,389,407 >>> mbox cmd response data (40 bytes)
3,389,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,881 UART: [rt]cmd =0x44504543, len=24
3,445,669 >>> mbox cmd response data (40 bytes)
3,445,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,975 UART: [rt]cmd =0x44504543, len=24
3,501,043 >>> mbox cmd response data (40 bytes)
3,501,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,575 UART: [rt]cmd =0x44504543, len=24
3,556,909 >>> mbox cmd response data (40 bytes)
3,556,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,121 UART: [rt]cmd =0x44504543, len=24
3,612,525 >>> mbox cmd response data (40 bytes)
3,612,526 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,115 UART: [rt]cmd =0x44504543, len=24
3,668,477 >>> mbox cmd response data (40 bytes)
3,668,478 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,877 UART: [rt]cmd =0x44504543, len=24
3,724,431 >>> mbox cmd response data (40 bytes)
3,724,432 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,925 UART: [rt]cmd =0x44504543, len=24
3,780,617 >>> mbox cmd response data (40 bytes)
3,780,618 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,879 UART: [rt]cmd =0x44504543, len=24
3,836,457 >>> mbox cmd response data (40 bytes)
3,836,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,097 UART: [rt]cmd =0x44504543, len=24
3,892,271 >>> mbox cmd response data (40 bytes)
3,892,272 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,801 UART: [rt]cmd =0x44504543, len=24
3,948,441 >>> mbox cmd response data (40 bytes)
3,948,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,099 UART: [rt]cmd =0x44504543, len=24
4,004,747 >>> mbox cmd response data (40 bytes)
4,004,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,034,025 UART: [rt]cmd =0x44504543, len=24
4,060,643 >>> mbox cmd response data (40 bytes)
4,060,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,089,987 UART: [rt]cmd =0x44504543, len=24
4,116,467 >>> mbox cmd response data (40 bytes)
4,116,468 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,955 UART: [rt]cmd =0x44504543, len=24
4,153,063 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,630 >>> mbox cmd response: success
2,684,736 UART:
2,684,752 UART: Running Caliptra FMC ...
2,685,160 UART:
2,685,214 UART: [state] CFI Enabled
2,695,853 UART: [fht] FMC Alias Private Key: 7
2,803,748 UART: [art] Extend RT PCRs Done
2,804,176 UART: [art] Lock RT PCRs Done
2,805,594 UART: [art] Populate DV Done
2,813,617 UART: [fht] FMC Alias Private Key: 7
2,814,727 UART: [art] Derive CDI
2,815,007 UART: [art] Store in in slot 0x4
2,900,920 UART: [art] Derive Key Pair
2,901,280 UART: [art] Store priv key in slot 0x5
2,914,460 UART: [art] Derive Key Pair - Done
2,929,303 UART: [art] Signing Cert with AUTHO
2,929,783 UART: RITY.KEYID = 7
2,945,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,832 UART: [art] PUB.X = 8A7F3562D6FE1DDFD42C93B4FF150B1798789E76FEED1EF556D9D1E935B593D47F63D9B0F4E73F047544B80EA3452986
2,952,601 UART: [art] PUB.Y = C744422A94185CF20C99ED8B4E7CC798C8B490D1653C12685AB6E435271AF660FC2D14CE217A163DFE679260CBF80FE5
2,959,551 UART: [art] SIG.R = 8549F6E91A649EF57B10FE0EE6625E3A62DFBC9BC676AFA5E4FBD5D1F9ECA2C899920D91E9D245D2B6A19771375B79BC
2,966,333 UART: [art] SIG.S = DB06F0B0627D2B763FBF681F70061BD4BDBDBD104613FC5C88905139EF30BE57901C9A479DB5DB756D83E1E54D517CF6
2,989,840 UART: Caliptra RT
2,990,093 UART: [state] CFI Enabled
3,096,817 UART: [rt] RT listening for mailbox commands...
3,097,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,709 UART: [rt]cmd =0x44504543, len=24
3,153,979 >>> mbox cmd response data (40 bytes)
3,153,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,401 UART: [rt]cmd =0x44504543, len=24
3,208,901 >>> mbox cmd response data (40 bytes)
3,208,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,238,427 UART: [rt]cmd =0x44504543, len=24
3,264,633 >>> mbox cmd response data (40 bytes)
3,264,634 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,294,023 UART: [rt]cmd =0x44504543, len=24
3,320,709 >>> mbox cmd response data (40 bytes)
3,320,710 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,163 UART: [rt]cmd =0x44504543, len=24
3,376,361 >>> mbox cmd response data (40 bytes)
3,376,362 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,929 UART: [rt]cmd =0x44504543, len=24
3,431,815 >>> mbox cmd response data (40 bytes)
3,431,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,297 UART: [rt]cmd =0x44504543, len=24
3,487,459 >>> mbox cmd response data (40 bytes)
3,487,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,241 UART: [rt]cmd =0x44504543, len=24
3,543,355 >>> mbox cmd response data (40 bytes)
3,543,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,689 UART: [rt]cmd =0x44504543, len=24
3,599,153 >>> mbox cmd response data (40 bytes)
3,599,154 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,435 UART: [rt]cmd =0x44504543, len=24
3,654,571 >>> mbox cmd response data (40 bytes)
3,654,572 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,967 UART: [rt]cmd =0x44504543, len=24
3,710,147 >>> mbox cmd response data (40 bytes)
3,710,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,679 UART: [rt]cmd =0x44504543, len=24
3,766,101 >>> mbox cmd response data (40 bytes)
3,766,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,647 UART: [rt]cmd =0x44504543, len=24
3,821,801 >>> mbox cmd response data (40 bytes)
3,821,802 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,851,443 UART: [rt]cmd =0x44504543, len=24
3,877,821 >>> mbox cmd response data (40 bytes)
3,877,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,907,057 UART: [rt]cmd =0x44504543, len=24
3,933,513 >>> mbox cmd response data (40 bytes)
3,933,514 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,893 UART: [rt]cmd =0x44504543, len=24
3,970,065 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,933 UART: [state] LifecycleState = Unprovisioned
85,588 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,417 UART: [kat] SHA2-256
893,067 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,192 UART: [kat] ++
897,344 UART: [kat] sha1
901,692 UART: [kat] SHA2-256
903,632 UART: [kat] SHA2-384
906,415 UART: [kat] SHA2-512-ACC
908,316 UART: [kat] ECC-384
917,937 UART: [kat] HMAC-384Kdf
922,531 UART: [kat] LMS
1,170,859 UART: [kat] --
1,171,838 UART: [cold-reset] ++
1,172,196 UART: [fht] FHT @ 0x50003400
1,174,955 UART: [idev] ++
1,175,123 UART: [idev] CDI.KEYID = 6
1,175,483 UART: [idev] SUBJECT.KEYID = 7
1,175,907 UART: [idev] UDS.KEYID = 0
1,176,252 ready_for_fw is high
1,176,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,947 UART: [idev] Erasing UDS.KEYID = 0
1,200,580 UART: [idev] Sha1 KeyId Algorithm
1,208,918 UART: [idev] --
1,210,008 UART: [ldev] ++
1,210,176 UART: [ldev] CDI.KEYID = 6
1,210,539 UART: [ldev] SUBJECT.KEYID = 5
1,210,965 UART: [ldev] AUTHORITY.KEYID = 7
1,211,428 UART: [ldev] FE.KEYID = 1
1,216,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,108 UART: [ldev] --
1,281,535 UART: [fwproc] Wait for Commands...
1,282,279 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,714 >>> mbox cmd response: success
2,771,942 UART: [afmc] ++
2,772,110 UART: [afmc] CDI.KEYID = 6
2,772,472 UART: [afmc] SUBJECT.KEYID = 7
2,772,897 UART: [afmc] AUTHORITY.KEYID = 5
2,808,340 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,613 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,663 UART: [afmc] --
2,851,789 UART: [cold-reset] --
2,852,577 UART: [state] Locking Datavault
2,853,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,504 UART: [state] Locking ICCM
2,854,944 UART: [exit] Launching FMC @ 0x40000130
2,860,273 UART:
2,860,289 UART: Running Caliptra FMC ...
2,860,697 UART:
2,860,840 UART: [state] CFI Enabled
2,871,431 UART: [fht] FMC Alias Private Key: 7
2,979,372 UART: [art] Extend RT PCRs Done
2,979,800 UART: [art] Lock RT PCRs Done
2,981,204 UART: [art] Populate DV Done
2,989,513 UART: [fht] FMC Alias Private Key: 7
2,990,693 UART: [art] Derive CDI
2,990,973 UART: [art] Store in in slot 0x4
3,076,912 UART: [art] Derive Key Pair
3,077,272 UART: [art] Store priv key in slot 0x5
3,090,642 UART: [art] Derive Key Pair - Done
3,105,210 UART: [art] Signing Cert with AUTHO
3,105,690 UART: RITY.KEYID = 7
3,121,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,777 UART: [art] PUB.X = 87EEAF87997A6443D9B0BEFAFF626352CE0E1EAABCC882B7A670DACC67153E3D668FD2ABB8935B9201B26027AB345E5A
3,128,561 UART: [art] PUB.Y = 38A6FDF534B9634C84A40EE00307F5CE0A2294C503ABA8AC505DE88AE9AC609FB3084A742DC9DB0AB5D4BBA7F8AEF2C5
3,135,514 UART: [art] SIG.R = 04F97C1EC1E95A616EB44D580377950A286E87C783FD98B54EF4319F7CF0B588DA5D307136537F4A0A9E01159B857B87
3,142,267 UART: [art] SIG.S = 33B8253A28C96A68A08164B46EFBB148575C988BDAC892B4586E1260D4F1E16878D764C2EC7980BFA9DC550987FB1150
3,166,421 UART: Caliptra RT
3,166,766 UART: [state] CFI Enabled
3,274,329 UART: [rt] RT listening for mailbox commands...
3,274,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,045 UART: [rt]cmd =0x44504543, len=24
3,331,343 >>> mbox cmd response data (40 bytes)
3,331,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,360,863 UART: [rt]cmd =0x44504543, len=24
3,387,471 >>> mbox cmd response data (40 bytes)
3,387,472 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,007 UART: [rt]cmd =0x44504543, len=24
3,442,951 >>> mbox cmd response data (40 bytes)
3,442,952 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,733 UART: [rt]cmd =0x44504543, len=24
3,498,811 >>> mbox cmd response data (40 bytes)
3,498,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,133 UART: [rt]cmd =0x44504543, len=24
3,554,435 >>> mbox cmd response data (40 bytes)
3,554,436 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,131 UART: [rt]cmd =0x44504543, len=24
3,610,873 >>> mbox cmd response data (40 bytes)
3,610,874 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,493 UART: [rt]cmd =0x44504543, len=24
3,666,709 >>> mbox cmd response data (40 bytes)
3,666,710 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,099 UART: [rt]cmd =0x44504543, len=24
3,722,519 >>> mbox cmd response data (40 bytes)
3,722,520 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,751,919 UART: [rt]cmd =0x44504543, len=24
3,778,175 >>> mbox cmd response data (40 bytes)
3,778,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,731 UART: [rt]cmd =0x44504543, len=24
3,833,723 >>> mbox cmd response data (40 bytes)
3,833,724 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,151 UART: [rt]cmd =0x44504543, len=24
3,889,133 >>> mbox cmd response data (40 bytes)
3,889,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,803 UART: [rt]cmd =0x44504543, len=24
3,944,991 >>> mbox cmd response data (40 bytes)
3,944,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,974,553 UART: [rt]cmd =0x44504543, len=24
4,000,677 >>> mbox cmd response data (40 bytes)
4,000,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,029,927 UART: [rt]cmd =0x44504543, len=24
4,056,487 >>> mbox cmd response data (40 bytes)
4,056,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,055 UART: [rt]cmd =0x44504543, len=24
4,112,737 >>> mbox cmd response data (40 bytes)
4,112,738 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,142,083 UART: [rt]cmd =0x44504543, len=24
4,148,859 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,490 ready_for_fw is high
1,060,490 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,415 >>> mbox cmd response: success
2,688,179 UART:
2,688,195 UART: Running Caliptra FMC ...
2,688,603 UART:
2,688,746 UART: [state] CFI Enabled
2,699,311 UART: [fht] FMC Alias Private Key: 7
2,807,608 UART: [art] Extend RT PCRs Done
2,808,036 UART: [art] Lock RT PCRs Done
2,809,558 UART: [art] Populate DV Done
2,817,697 UART: [fht] FMC Alias Private Key: 7
2,818,655 UART: [art] Derive CDI
2,818,935 UART: [art] Store in in slot 0x4
2,904,982 UART: [art] Derive Key Pair
2,905,342 UART: [art] Store priv key in slot 0x5
2,919,026 UART: [art] Derive Key Pair - Done
2,933,817 UART: [art] Signing Cert with AUTHO
2,934,297 UART: RITY.KEYID = 7
2,949,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,336 UART: [art] PUB.X = 2239A2697B4F60539FECF5CF3085D889AE7ED3AA435841CE986F56AE100000668C2915E9ABD1C45D5F51261CD896B117
2,957,064 UART: [art] PUB.Y = CB739F66940EFD23A0DBB9AB0766D826764DEF6E693B2764FE0C09DFA6067DD3D4C5718B3C353CDCAE217C968E90308D
2,964,013 UART: [art] SIG.R = 7668E37D2F385244D13F1656677DBF6CA85AEBCD9EFA9751ADCF6B67852205ED3EAA5E8810474A7AD8C12ACA478A8B01
2,970,791 UART: [art] SIG.S = AF25E5AD8AA2376C6E819A68EAAADAC4108AC9E74665A9D6A15E6215C515457B6A0780C7C363AD3C36E9D899BD527619
2,994,371 UART: Caliptra RT
2,994,716 UART: [state] CFI Enabled
3,102,177 UART: [rt] RT listening for mailbox commands...
3,102,847 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,813 UART: [rt]cmd =0x44504543, len=24
3,159,289 >>> mbox cmd response data (40 bytes)
3,159,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,188,809 UART: [rt]cmd =0x44504543, len=24
3,214,955 >>> mbox cmd response data (40 bytes)
3,214,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,575 UART: [rt]cmd =0x44504543, len=24
3,271,051 >>> mbox cmd response data (40 bytes)
3,271,052 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,475 UART: [rt]cmd =0x44504543, len=24
3,327,307 >>> mbox cmd response data (40 bytes)
3,327,308 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,601 UART: [rt]cmd =0x44504543, len=24
3,383,097 >>> mbox cmd response data (40 bytes)
3,383,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,412,579 UART: [rt]cmd =0x44504543, len=24
3,439,017 >>> mbox cmd response data (40 bytes)
3,439,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,721 UART: [rt]cmd =0x44504543, len=24
3,495,201 >>> mbox cmd response data (40 bytes)
3,495,202 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,709 UART: [rt]cmd =0x44504543, len=24
3,550,931 >>> mbox cmd response data (40 bytes)
3,550,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,580,313 UART: [rt]cmd =0x44504543, len=24
3,606,557 >>> mbox cmd response data (40 bytes)
3,606,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,927 UART: [rt]cmd =0x44504543, len=24
3,662,623 >>> mbox cmd response data (40 bytes)
3,662,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,692,217 UART: [rt]cmd =0x44504543, len=24
3,718,583 >>> mbox cmd response data (40 bytes)
3,718,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,007 UART: [rt]cmd =0x44504543, len=24
3,774,545 >>> mbox cmd response data (40 bytes)
3,774,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,803,973 UART: [rt]cmd =0x44504543, len=24
3,830,145 >>> mbox cmd response data (40 bytes)
3,830,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,859,759 UART: [rt]cmd =0x44504543, len=24
3,886,727 >>> mbox cmd response data (40 bytes)
3,886,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,089 UART: [rt]cmd =0x44504543, len=24
3,942,657 >>> mbox cmd response data (40 bytes)
3,942,658 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,279 UART: [rt]cmd =0x44504543, len=24
3,979,719 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,188 UART: [kat] SHA2-512-ACC
906,089 UART: [kat] ECC-384
915,720 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,555 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,595 UART: [idev] ++
1,172,763 UART: [idev] CDI.KEYID = 6
1,173,124 UART: [idev] SUBJECT.KEYID = 7
1,173,549 UART: [idev] UDS.KEYID = 0
1,173,895 ready_for_fw is high
1,173,895 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,357 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,615 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,654 UART: [ldev] --
1,280,996 UART: [fwproc] Wait for Commands...
1,281,669 UART: [fwproc] Recv command 0x46574c44
1,282,402 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,333 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,977 >>> mbox cmd response: success
2,772,228 UART: [afmc] ++
2,772,396 UART: [afmc] CDI.KEYID = 6
2,772,759 UART: [afmc] SUBJECT.KEYID = 7
2,773,185 UART: [afmc] AUTHORITY.KEYID = 5
2,808,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,223 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,952 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,835 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,554 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,323 UART: [afmc] --
2,852,395 UART: [cold-reset] --
2,853,343 UART: [state] Locking Datavault
2,854,326 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,930 UART: [state] Locking ICCM
2,855,504 UART: [exit] Launching FMC @ 0x40000130
2,860,833 UART:
2,860,849 UART: Running Caliptra FMC ...
2,861,257 UART:
2,861,311 UART: [state] CFI Enabled
2,871,686 UART: [fht] FMC Alias Private Key: 7
2,979,277 UART: [art] Extend RT PCRs Done
2,979,705 UART: [art] Lock RT PCRs Done
2,981,177 UART: [art] Populate DV Done
2,989,482 UART: [fht] FMC Alias Private Key: 7
2,990,458 UART: [art] Derive CDI
2,990,738 UART: [art] Store in in slot 0x4
3,076,689 UART: [art] Derive Key Pair
3,077,049 UART: [art] Store priv key in slot 0x5
3,090,423 UART: [art] Derive Key Pair - Done
3,105,289 UART: [art] Signing Cert with AUTHO
3,105,769 UART: RITY.KEYID = 7
3,120,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,232 UART: [art] PUB.X = 22F07E121D322F947D8760F693FA865A00B2061635C4B479CA09D8D4C0BC3E214AD855421C5FF5FE1235EA7F8F1DE244
3,127,978 UART: [art] PUB.Y = 9A2CC3DF0E713EA4B63959819DBEDE60FB668688D8A1FDB8D3B100B0B2821FFD07E16223F031EEF77FC54B6F0AA88993
3,134,913 UART: [art] SIG.R = C2AC586BFEA571B4183540D606CA182424CC846DD0640C0F718267C665CDB61F6798102880BE2BF0E93DE192F441FD0C
3,141,675 UART: [art] SIG.S = 7908C8F0C8EE1BA1537EAE864120EC748C860F98D36CC38E7C062E30B28F8FCF45F60BB63351F63639C4092F6A6BC0A4
3,165,431 UART: Caliptra RT
3,165,684 UART: [state] CFI Enabled
3,272,911 UART: [rt] RT listening for mailbox commands...
3,273,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,379 UART: [rt]cmd =0x44504543, len=24
3,329,647 >>> mbox cmd response data (40 bytes)
3,329,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,157 UART: [rt]cmd =0x44504543, len=24
3,385,479 >>> mbox cmd response data (40 bytes)
3,385,480 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,865 UART: [rt]cmd =0x44504543, len=24
3,441,083 >>> mbox cmd response data (40 bytes)
3,441,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,763 UART: [rt]cmd =0x44504543, len=24
3,496,725 >>> mbox cmd response data (40 bytes)
3,496,726 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,185 UART: [rt]cmd =0x44504543, len=24
3,552,439 >>> mbox cmd response data (40 bytes)
3,552,440 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,695 UART: [rt]cmd =0x44504543, len=24
3,607,923 >>> mbox cmd response data (40 bytes)
3,607,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,271 UART: [rt]cmd =0x44504543, len=24
3,663,625 >>> mbox cmd response data (40 bytes)
3,663,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,027 UART: [rt]cmd =0x44504543, len=24
3,719,569 >>> mbox cmd response data (40 bytes)
3,719,570 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,915 UART: [rt]cmd =0x44504543, len=24
3,775,995 >>> mbox cmd response data (40 bytes)
3,775,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,383 UART: [rt]cmd =0x44504543, len=24
3,832,095 >>> mbox cmd response data (40 bytes)
3,832,096 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,491 UART: [rt]cmd =0x44504543, len=24
3,887,813 >>> mbox cmd response data (40 bytes)
3,887,814 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,441 UART: [rt]cmd =0x44504543, len=24
3,943,533 >>> mbox cmd response data (40 bytes)
3,943,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,207 UART: [rt]cmd =0x44504543, len=24
3,999,195 >>> mbox cmd response data (40 bytes)
3,999,196 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,028,727 UART: [rt]cmd =0x44504543, len=24
4,055,041 >>> mbox cmd response data (40 bytes)
4,055,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,527 UART: [rt]cmd =0x44504543, len=24
4,110,357 >>> mbox cmd response data (40 bytes)
4,110,358 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,139,993 UART: [rt]cmd =0x44504543, len=24
4,147,449 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,806 ready_for_fw is high
1,055,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,403 >>> mbox cmd response: success
2,682,109 UART:
2,682,125 UART: Running Caliptra FMC ...
2,682,533 UART:
2,682,587 UART: [state] CFI Enabled
2,692,992 UART: [fht] FMC Alias Private Key: 7
2,800,627 UART: [art] Extend RT PCRs Done
2,801,055 UART: [art] Lock RT PCRs Done
2,802,817 UART: [art] Populate DV Done
2,811,102 UART: [fht] FMC Alias Private Key: 7
2,812,228 UART: [art] Derive CDI
2,812,508 UART: [art] Store in in slot 0x4
2,898,127 UART: [art] Derive Key Pair
2,898,487 UART: [art] Store priv key in slot 0x5
2,911,019 UART: [art] Derive Key Pair - Done
2,925,479 UART: [art] Signing Cert with AUTHO
2,925,959 UART: RITY.KEYID = 7
2,940,565 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,330 UART: [art] PUB.X = 147BB9A4AAFF40FAF23F3FD495B048B172A090C98D939B49A3C620D883F1FD97A7BACB5E713F0B7125AFFDD9799BEA47
2,948,117 UART: [art] PUB.Y = 7CBA4D808A5F4FA09BABB0E03F40EF1EF7AFB2864E5DF03A349D74F756BF67B405F0D3529B1C065BF784B0BB55B2F450
2,955,081 UART: [art] SIG.R = C64FEF534D52A5470A5E7B810F2821A2506797B2C970D49FA76D049D4E1E35AAC581556FE1A2495682893B8D7A564DDE
2,961,844 UART: [art] SIG.S = CFD4EF6CD3097A3AE104960F0C42421CDF4E2F04668EA7FEA0E9B05D9CEB6906D1554F7989277F399D4A637CA6554BB2
2,985,361 UART: Caliptra RT
2,985,614 UART: [state] CFI Enabled
3,093,104 UART: [rt] RT listening for mailbox commands...
3,093,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,802 UART: [rt]cmd =0x44504543, len=24
3,150,076 >>> mbox cmd response data (40 bytes)
3,150,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,179,270 UART: [rt]cmd =0x44504543, len=24
3,205,050 >>> mbox cmd response data (40 bytes)
3,205,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,470 UART: [rt]cmd =0x44504543, len=24
3,260,464 >>> mbox cmd response data (40 bytes)
3,260,465 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,290,072 UART: [rt]cmd =0x44504543, len=24
3,315,804 >>> mbox cmd response data (40 bytes)
3,315,805 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,345,148 UART: [rt]cmd =0x44504543, len=24
3,371,716 >>> mbox cmd response data (40 bytes)
3,371,717 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,226 UART: [rt]cmd =0x44504543, len=24
3,428,002 >>> mbox cmd response data (40 bytes)
3,428,003 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,420 UART: [rt]cmd =0x44504543, len=24
3,483,708 >>> mbox cmd response data (40 bytes)
3,483,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,350 UART: [rt]cmd =0x44504543, len=24
3,539,606 >>> mbox cmd response data (40 bytes)
3,539,607 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,032 UART: [rt]cmd =0x44504543, len=24
3,595,708 >>> mbox cmd response data (40 bytes)
3,595,709 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,625,204 UART: [rt]cmd =0x44504543, len=24
3,651,234 >>> mbox cmd response data (40 bytes)
3,651,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,496 UART: [rt]cmd =0x44504543, len=24
3,706,642 >>> mbox cmd response data (40 bytes)
3,706,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,736,276 UART: [rt]cmd =0x44504543, len=24
3,762,958 >>> mbox cmd response data (40 bytes)
3,762,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,466 UART: [rt]cmd =0x44504543, len=24
3,818,642 >>> mbox cmd response data (40 bytes)
3,818,643 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,848,132 UART: [rt]cmd =0x44504543, len=24
3,874,192 >>> mbox cmd response data (40 bytes)
3,874,193 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,903,654 UART: [rt]cmd =0x44504543, len=24
3,930,096 >>> mbox cmd response data (40 bytes)
3,930,097 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,660 UART: [rt]cmd =0x44504543, len=24
3,966,958 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,280 UART: [kat] SHA2-256
902,220 UART: [kat] SHA2-384
904,889 UART: [kat] SHA2-512-ACC
906,790 UART: [kat] ECC-384
916,729 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,488 UART: [cold-reset] ++
1,171,012 UART: [fht] FHT @ 0x50003400
1,173,880 UART: [idev] ++
1,174,048 UART: [idev] CDI.KEYID = 6
1,174,409 UART: [idev] SUBJECT.KEYID = 7
1,174,834 UART: [idev] UDS.KEYID = 0
1,175,180 ready_for_fw is high
1,175,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,818 UART: [idev] Erasing UDS.KEYID = 0
1,200,134 UART: [idev] Sha1 KeyId Algorithm
1,209,002 UART: [idev] --
1,210,053 UART: [ldev] ++
1,210,221 UART: [ldev] CDI.KEYID = 6
1,210,585 UART: [ldev] SUBJECT.KEYID = 5
1,211,012 UART: [ldev] AUTHORITY.KEYID = 7
1,211,475 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,101 UART: [ldev] --
1,282,477 UART: [fwproc] Wait for Commands...
1,283,196 UART: [fwproc] Recv command 0x46574c44
1,283,929 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,778 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,326 >>> mbox cmd response: success
2,773,549 UART: [afmc] ++
2,773,717 UART: [afmc] CDI.KEYID = 6
2,774,080 UART: [afmc] SUBJECT.KEYID = 7
2,774,506 UART: [afmc] AUTHORITY.KEYID = 5
2,810,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,792 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,511 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,356 UART: [afmc] --
2,853,476 UART: [cold-reset] --
2,854,342 UART: [state] Locking Datavault
2,855,507 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,111 UART: [state] Locking ICCM
2,856,577 UART: [exit] Launching FMC @ 0x40000130
2,861,906 UART:
2,861,922 UART: Running Caliptra FMC ...
2,862,330 UART:
2,862,473 UART: [state] CFI Enabled
2,873,262 UART: [fht] FMC Alias Private Key: 7
2,981,335 UART: [art] Extend RT PCRs Done
2,981,763 UART: [art] Lock RT PCRs Done
2,983,085 UART: [art] Populate DV Done
2,991,026 UART: [fht] FMC Alias Private Key: 7
2,992,202 UART: [art] Derive CDI
2,992,482 UART: [art] Store in in slot 0x4
3,077,865 UART: [art] Derive Key Pair
3,078,225 UART: [art] Store priv key in slot 0x5
3,091,675 UART: [art] Derive Key Pair - Done
3,106,563 UART: [art] Signing Cert with AUTHO
3,107,043 UART: RITY.KEYID = 7
3,122,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,138 UART: [art] PUB.X = A5529A957ADDE63A9F3BA5307846A0141BAF28AB99658F2CA09FCE42A97C6CD5B45E8D4037B7E32F4D9F0E7C2AA61498
3,129,919 UART: [art] PUB.Y = 2CEC95BA7285F374AAF76E8754EB6BC3A2D71A7F7944AED594343A392038A4682B82C695B08981F6BCB2C150BBA4B108
3,136,874 UART: [art] SIG.R = E76BA2A34E4071F523D79EF246E337222783EA7939A32171F3C5C8B0F426D1096A83219D54CE26FE2CB367B5454980BF
3,143,639 UART: [art] SIG.S = E21EDA0F141B4F7BB27FFC5AB86896DAB9AB216B344257B8A44A902B20454525A93749889D1C28C25EAA4DD27FB738E7
3,167,269 UART: Caliptra RT
3,167,614 UART: [state] CFI Enabled
3,275,360 UART: [rt] RT listening for mailbox commands...
3,276,030 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,802 UART: [rt]cmd =0x44504543, len=24
3,332,268 >>> mbox cmd response data (40 bytes)
3,332,269 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,850 UART: [rt]cmd =0x44504543, len=24
3,388,128 >>> mbox cmd response data (40 bytes)
3,388,129 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,626 UART: [rt]cmd =0x44504543, len=24
3,443,648 >>> mbox cmd response data (40 bytes)
3,443,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,076 UART: [rt]cmd =0x44504543, len=24
3,500,054 >>> mbox cmd response data (40 bytes)
3,500,055 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,744 UART: [rt]cmd =0x44504543, len=24
3,556,560 >>> mbox cmd response data (40 bytes)
3,556,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,182 UART: [rt]cmd =0x44504543, len=24
3,612,296 >>> mbox cmd response data (40 bytes)
3,612,297 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,786 UART: [rt]cmd =0x44504543, len=24
3,667,944 >>> mbox cmd response data (40 bytes)
3,667,945 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,378 UART: [rt]cmd =0x44504543, len=24
3,723,910 >>> mbox cmd response data (40 bytes)
3,723,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,646 UART: [rt]cmd =0x44504543, len=24
3,780,076 >>> mbox cmd response data (40 bytes)
3,780,077 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,446 UART: [rt]cmd =0x44504543, len=24
3,835,560 >>> mbox cmd response data (40 bytes)
3,835,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,832 UART: [rt]cmd =0x44504543, len=24
3,891,564 >>> mbox cmd response data (40 bytes)
3,891,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,310 UART: [rt]cmd =0x44504543, len=24
3,947,384 >>> mbox cmd response data (40 bytes)
3,947,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,768 UART: [rt]cmd =0x44504543, len=24
4,003,066 >>> mbox cmd response data (40 bytes)
4,003,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,726 UART: [rt]cmd =0x44504543, len=24
4,059,066 >>> mbox cmd response data (40 bytes)
4,059,067 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,622 UART: [rt]cmd =0x44504543, len=24
4,115,476 >>> mbox cmd response data (40 bytes)
4,115,477 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,144,770 UART: [rt]cmd =0x44504543, len=24
4,151,926 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,171 ready_for_fw is high
1,056,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,330 >>> mbox cmd response: success
2,685,154 UART:
2,685,170 UART: Running Caliptra FMC ...
2,685,578 UART:
2,685,721 UART: [state] CFI Enabled
2,696,646 UART: [fht] FMC Alias Private Key: 7
2,804,863 UART: [art] Extend RT PCRs Done
2,805,291 UART: [art] Lock RT PCRs Done
2,807,011 UART: [art] Populate DV Done
2,815,118 UART: [fht] FMC Alias Private Key: 7
2,816,154 UART: [art] Derive CDI
2,816,434 UART: [art] Store in in slot 0x4
2,902,009 UART: [art] Derive Key Pair
2,902,369 UART: [art] Store priv key in slot 0x5
2,916,131 UART: [art] Derive Key Pair - Done
2,930,810 UART: [art] Signing Cert with AUTHO
2,931,290 UART: RITY.KEYID = 7
2,946,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,125 UART: [art] PUB.X = DE8B88873E66B98CAEEE3F0AEC026265D0FC26FA60A3C6ABDCAAA965C3F3D280E718796FD5D1205416698D45EFE83BAA
2,953,911 UART: [art] PUB.Y = FF5F4429EBB1897BF0377A4F512CBE758789C233F0731D119941AA0EDB051EBB110B32E926805EF48A763CE655F9BADC
2,960,862 UART: [art] SIG.R = 53CDF36A9052817954E1C01B2AF5D4DB3BE5AF9043B199F502CA5A3551D5698F0A9A27661FB9D70F527C9D5EA31BE30A
2,967,630 UART: [art] SIG.S = 146E9650840C65B65AE78DC4E7DA5EDB8333A678EEF51230B424A021FF3CEB3F0C2FC5BE1C57EE460E0F926D2E54341D
2,991,439 UART: Caliptra RT
2,991,784 UART: [state] CFI Enabled
3,099,029 UART: [rt] RT listening for mailbox commands...
3,099,699 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,537 UART: [rt]cmd =0x44504543, len=24
3,155,973 >>> mbox cmd response data (40 bytes)
3,155,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,185,593 UART: [rt]cmd =0x44504543, len=24
3,211,775 >>> mbox cmd response data (40 bytes)
3,211,776 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,241,179 UART: [rt]cmd =0x44504543, len=24
3,266,913 >>> mbox cmd response data (40 bytes)
3,266,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,296,487 UART: [rt]cmd =0x44504543, len=24
3,322,305 >>> mbox cmd response data (40 bytes)
3,322,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,351,813 UART: [rt]cmd =0x44504543, len=24
3,378,411 >>> mbox cmd response data (40 bytes)
3,378,412 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,408,001 UART: [rt]cmd =0x44504543, len=24
3,434,127 >>> mbox cmd response data (40 bytes)
3,434,128 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,535 UART: [rt]cmd =0x44504543, len=24
3,489,923 >>> mbox cmd response data (40 bytes)
3,489,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,631 UART: [rt]cmd =0x44504543, len=24
3,545,557 >>> mbox cmd response data (40 bytes)
3,545,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,869 UART: [rt]cmd =0x44504543, len=24
3,600,733 >>> mbox cmd response data (40 bytes)
3,600,734 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,285 UART: [rt]cmd =0x44504543, len=24
3,656,457 >>> mbox cmd response data (40 bytes)
3,656,458 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,877 UART: [rt]cmd =0x44504543, len=24
3,712,053 >>> mbox cmd response data (40 bytes)
3,712,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,581 UART: [rt]cmd =0x44504543, len=24
3,767,719 >>> mbox cmd response data (40 bytes)
3,767,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,797,021 UART: [rt]cmd =0x44504543, len=24
3,823,381 >>> mbox cmd response data (40 bytes)
3,823,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,895 UART: [rt]cmd =0x44504543, len=24
3,878,989 >>> mbox cmd response data (40 bytes)
3,878,990 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,509 UART: [rt]cmd =0x44504543, len=24
3,934,849 >>> mbox cmd response data (40 bytes)
3,934,850 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,201 UART: [rt]cmd =0x44504543, len=24
3,971,195 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,202 UART:
192,559 UART: Running Caliptra ROM ...
193,741 UART:
193,904 UART: [state] CFI Enabled
262,963 UART: [state] LifecycleState = Unprovisioned
264,873 UART: [state] DebugLocked = No
267,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,572 UART: [kat] SHA2-256
442,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,807 UART: [kat] ++
453,283 UART: [kat] sha1
464,577 UART: [kat] SHA2-256
467,233 UART: [kat] SHA2-384
474,323 UART: [kat] SHA2-512-ACC
476,661 UART: [kat] ECC-384
2,769,384 UART: [kat] HMAC-384Kdf
2,792,973 UART: [kat] LMS
3,983,248 UART: [kat] --
3,985,323 UART: [cold-reset] ++
3,987,817 UART: [fht] Storing FHT @ 0x50003400
3,999,088 UART: [idev] ++
3,999,688 UART: [idev] CDI.KEYID = 6
4,000,595 UART: [idev] SUBJECT.KEYID = 7
4,001,864 UART: [idev] UDS.KEYID = 0
4,002,904 ready_for_fw is high
4,003,105 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,146,142 UART: [idev] Erasing UDS.KEYID = 0
7,341,332 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,918 UART: [idev] --
7,367,429 UART: [ldev] ++
7,367,995 UART: [ldev] CDI.KEYID = 6
7,368,961 UART: [ldev] SUBJECT.KEYID = 5
7,370,167 UART: [ldev] AUTHORITY.KEYID = 7
7,371,388 UART: [ldev] FE.KEYID = 1
7,415,782 UART: [ldev] Erasing FE.KEYID = 1
10,747,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,809 UART: [ldev] --
13,107,574 UART: [fwproc] Waiting for Commands...
13,109,872 UART: [fwproc] Received command 0x46574c44
13,112,092 UART: [fwproc] Received Image of size 113844 bytes
17,155,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,056 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,616,428 >>> mbox cmd response: success
17,619,977 UART: [afmc] ++
17,620,626 UART: [afmc] CDI.KEYID = 6
17,621,511 UART: [afmc] SUBJECT.KEYID = 7
17,622,775 UART: [afmc] AUTHORITY.KEYID = 5
20,980,093 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,276,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,278,456 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,292,878 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,307,695 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,322,169 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,345,050 UART: [afmc] --
23,348,211 UART: [cold-reset] --
23,350,066 UART: [state] Locking Datavault
23,356,770 UART: [state] Locking PCR0, PCR1 and PCR31
23,358,483 UART: [state] Locking ICCM
23,360,467 UART: [exit] Launching FMC @ 0x40000130
23,368,859 UART:
23,369,087 UART: Running Caliptra FMC ...
23,370,182 UART:
23,370,334 UART: [state] CFI Enabled
23,439,109 UART: [fht] FMC Alias Private Key: 7
25,776,493 UART: [art] Extend RT PCRs Done
25,777,705 UART: [art] Lock RT PCRs Done
25,779,556 UART: [art] Populate DV Done
25,785,013 UART: [fht] FMC Alias Private Key: 7
25,786,710 UART: [art] Derive CDI
25,787,515 UART: [art] Store in in slot 0x4
25,846,925 UART: [art] Derive Key Pair
25,847,957 UART: [art] Store priv key in slot 0x5
29,140,968 UART: [art] Derive Key Pair - Done
29,154,181 UART: [art] Signing Cert with AUTHO
29,155,480 UART: RITY.KEYID = 7
31,441,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,443,316 UART: [art] PUB.X = 2E20D5AAFF33F9EBA2E0F93FB974E5A6350200E9F409B30128D2953772F7097CB30F3C5541EDA4DD8B720DECE0CDFEFA
31,450,582 UART: [art] PUB.Y = 7E700BB05FF7FED5C07301412B6C89666F15DEB5B05099C3E28AD16340A5FD350D4877A923039A653B3002C199CEA033
31,457,838 UART: [art] SIG.R = 9D29226D3C03C151208663D319B7979DC665245E68C8981060CE1ACE8F0EE317238B3905B52C8D564844347E31EADFC4
31,465,148 UART: [art] SIG.S = D8FAE73BF45B7E2EEC46B7B71E0D889E098E91BE87A9BF51C9666A5EFDE3F70EF04FAA96D6B9D9A4689719267DD557C7
32,770,327 UART: Caliptra RT
32,771,045 UART: [state] CFI Enabled
32,932,412 UART: [rt] RT listening for mailbox commands...
32,934,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,965,000 UART: [rt]cmd =0x44504543, len=24
33,005,279 >>> mbox cmd response data (40 bytes)
33,006,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,037,100 UART: [rt]cmd =0x44504543, len=96
33,096,927 >>> mbox cmd response data (56 bytes)
33,097,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,128,357 UART: [rt]cmd =0x44504543, len=96
33,203,395 >>> mbox cmd response data (56 bytes)
33,204,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,234,655 UART: [rt]cmd =0x44504543, len=96
33,309,835 >>> mbox cmd response data (56 bytes)
33,310,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,341,040 UART: [rt]cmd =0x44504543, len=96
33,416,975 >>> mbox cmd response data (56 bytes)
33,417,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,448,220 UART: [rt]cmd =0x44504543, len=96
33,524,065 >>> mbox cmd response data (56 bytes)
33,524,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,555,536 UART: [rt]cmd =0x44504543, len=96
33,630,810 >>> mbox cmd response data (56 bytes)
33,631,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,661,950 UART: [rt]cmd =0x44504543, len=96
33,738,304 >>> mbox cmd response data (56 bytes)
33,739,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,769,727 UART: [rt]cmd =0x44504543, len=96
33,845,922 >>> mbox cmd response data (56 bytes)
33,846,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,877,348 UART: [rt]cmd =0x44504543, len=96
33,952,042 >>> mbox cmd response data (56 bytes)
33,952,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,983,532 UART: [rt]cmd =0x44504543, len=96
34,059,344 >>> mbox cmd response data (56 bytes)
34,060,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,090,515 UART: [rt]cmd =0x44504543, len=96
34,166,307 >>> mbox cmd response data (56 bytes)
34,167,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,197,560 UART: [rt]cmd =0x44504543, len=96
34,272,842 >>> mbox cmd response data (56 bytes)
34,273,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,304,093 UART: [rt]cmd =0x44504543, len=96
34,379,923 >>> mbox cmd response data (56 bytes)
34,380,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,411,232 UART: [rt]cmd =0x44504543, len=96
34,487,391 >>> mbox cmd response data (56 bytes)
34,488,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,518,522 UART: [rt]cmd =0x44504543, len=96
34,524,892 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,804,864 ready_for_fw is high
3,805,310 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,889,398 >>> mbox cmd response: success
23,592,047 UART:
23,592,474 UART: Running Caliptra FMC ...
23,593,615 UART:
23,593,794 UART: [state] CFI Enabled
23,661,084 UART: [fht] FMC Alias Private Key: 7
25,998,633 UART: [art] Extend RT PCRs Done
25,999,861 UART: [art] Lock RT PCRs Done
26,001,671 UART: [art] Populate DV Done
26,007,137 UART: [fht] FMC Alias Private Key: 7
26,008,623 UART: [art] Derive CDI
26,009,386 UART: [art] Store in in slot 0x4
26,070,060 UART: [art] Derive Key Pair
26,071,127 UART: [art] Store priv key in slot 0x5
29,364,228 UART: [art] Derive Key Pair - Done
29,377,174 UART: [art] Signing Cert with AUTHO
29,378,529 UART: RITY.KEYID = 7
31,666,474 UART: [art] Erasing AUTHORITY.KEYID = 7
31,667,983 UART: [art] PUB.X = F2A75C99607BB2D3BE2DF605E8BDD8FB6B9A96ACF889790680EA542B53976BF1338406044E7780458F563BEAF707DDA6
31,675,250 UART: [art] PUB.Y = FDD1A89297AEAE047E3EE898A4B285D67A1BF4A4AA9C9C0C09AC1C92EC99759C9ADBDEA8E9ECC45E68296457C332FEF7
31,682,522 UART: [art] SIG.R = 97133D0D6941245BD909F3EBEA3612BDF29281DBD1C0D293DF6F8022CE9BE824D05FB88D81E718FAE393A23EBD6AFBAE
31,689,884 UART: [art] SIG.S = F2CCFC05E012035C8A1176CB59140454D77F4EAA62E75F8DD20489091AAE79874B76DA8690C3075A293306994C0302A5
32,994,648 UART: Caliptra RT
32,995,353 UART: [state] CFI Enabled
33,156,693 UART: [rt] RT listening for mailbox commands...
33,158,619 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,189,216 UART: [rt]cmd =0x44504543, len=24
33,230,881 >>> mbox cmd response data (40 bytes)
33,232,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,262,851 UART: [rt]cmd =0x44504543, len=96
33,322,435 >>> mbox cmd response data (56 bytes)
33,323,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,353,728 UART: [rt]cmd =0x44504543, len=96
33,429,244 >>> mbox cmd response data (56 bytes)
33,429,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,460,789 UART: [rt]cmd =0x44504543, len=96
33,536,095 >>> mbox cmd response data (56 bytes)
33,536,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,567,302 UART: [rt]cmd =0x44504543, len=96
33,643,332 >>> mbox cmd response data (56 bytes)
33,644,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,674,694 UART: [rt]cmd =0x44504543, len=96
33,749,919 >>> mbox cmd response data (56 bytes)
33,750,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,781,396 UART: [rt]cmd =0x44504543, len=96
33,856,866 >>> mbox cmd response data (56 bytes)
33,857,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,887,896 UART: [rt]cmd =0x44504543, len=96
33,963,608 >>> mbox cmd response data (56 bytes)
33,964,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,994,956 UART: [rt]cmd =0x44504543, len=96
34,070,238 >>> mbox cmd response data (56 bytes)
34,070,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,101,428 UART: [rt]cmd =0x44504543, len=96
34,177,650 >>> mbox cmd response data (56 bytes)
34,178,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,208,752 UART: [rt]cmd =0x44504543, len=96
34,283,771 >>> mbox cmd response data (56 bytes)
34,284,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,314,919 UART: [rt]cmd =0x44504543, len=96
34,390,550 >>> mbox cmd response data (56 bytes)
34,391,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,421,755 UART: [rt]cmd =0x44504543, len=96
34,497,779 >>> mbox cmd response data (56 bytes)
34,498,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,529,131 UART: [rt]cmd =0x44504543, len=96
34,604,141 >>> mbox cmd response data (56 bytes)
34,604,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,635,146 UART: [rt]cmd =0x44504543, len=96
34,711,327 >>> mbox cmd response data (56 bytes)
34,712,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,742,551 UART: [rt]cmd =0x44504543, len=96
34,749,037 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,248 UART:
192,613 UART: Running Caliptra ROM ...
193,724 UART:
603,584 UART: [state] CFI Enabled
617,502 UART: [state] LifecycleState = Unprovisioned
619,513 UART: [state] DebugLocked = No
620,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,852 UART: [kat] SHA2-256
795,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,165 UART: [kat] ++
806,653 UART: [kat] sha1
817,744 UART: [kat] SHA2-256
820,471 UART: [kat] SHA2-384
827,097 UART: [kat] SHA2-512-ACC
829,466 UART: [kat] ECC-384
3,111,973 UART: [kat] HMAC-384Kdf
3,122,281 UART: [kat] LMS
4,312,431 UART: [kat] --
4,317,933 UART: [cold-reset] ++
4,318,951 UART: [fht] Storing FHT @ 0x50003400
4,330,075 UART: [idev] ++
4,330,665 UART: [idev] CDI.KEYID = 6
4,331,581 UART: [idev] SUBJECT.KEYID = 7
4,332,825 UART: [idev] UDS.KEYID = 0
4,333,815 ready_for_fw is high
4,334,021 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,403 UART: [idev] Erasing UDS.KEYID = 0
7,617,400 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,828 UART: [idev] --
7,642,654 UART: [ldev] ++
7,643,274 UART: [ldev] CDI.KEYID = 6
7,644,234 UART: [ldev] SUBJECT.KEYID = 5
7,645,447 UART: [ldev] AUTHORITY.KEYID = 7
7,646,679 UART: [ldev] FE.KEYID = 1
7,658,571 UART: [ldev] Erasing FE.KEYID = 1
10,942,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,895 UART: [ldev] --
13,304,238 UART: [fwproc] Waiting for Commands...
13,307,193 UART: [fwproc] Received command 0x46574c44
13,309,371 UART: [fwproc] Received Image of size 113844 bytes
17,361,975 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,038 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,915 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,421 >>> mbox cmd response: success
17,831,159 UART: [afmc] ++
17,831,759 UART: [afmc] CDI.KEYID = 6
17,832,674 UART: [afmc] SUBJECT.KEYID = 7
17,833,892 UART: [afmc] AUTHORITY.KEYID = 5
21,149,658 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,069 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,332 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,701 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,556 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,020 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,283 UART: [afmc] --
23,512,622 UART: [cold-reset] --
23,515,403 UART: [state] Locking Datavault
23,520,917 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,612 UART: [state] Locking ICCM
23,524,361 UART: [exit] Launching FMC @ 0x40000130
23,532,749 UART:
23,532,980 UART: Running Caliptra FMC ...
23,534,008 UART:
23,534,161 UART: [state] CFI Enabled
23,542,184 UART: [fht] FMC Alias Private Key: 7
25,873,216 UART: [art] Extend RT PCRs Done
25,874,458 UART: [art] Lock RT PCRs Done
25,876,000 UART: [art] Populate DV Done
25,881,495 UART: [fht] FMC Alias Private Key: 7
25,883,140 UART: [art] Derive CDI
25,883,878 UART: [art] Store in in slot 0x4
25,926,854 UART: [art] Derive Key Pair
25,927,888 UART: [art] Store priv key in slot 0x5
29,169,692 UART: [art] Derive Key Pair - Done
29,182,630 UART: [art] Signing Cert with AUTHO
29,183,929 UART: RITY.KEYID = 7
31,463,446 UART: [art] Erasing AUTHORITY.KEYID = 7
31,464,952 UART: [art] PUB.X = DB8AC8C86BD8DC35B7058264AABE1FE2FF492B5D96CF3F978A684CEB5CC2904FB890FB5929EA101B51BA5193BA9EE7E3
31,472,216 UART: [art] PUB.Y = F61E2C99B1DF4EEDA9A618C083E2D44494560488C764BCC97A91ABE5759E7C74794F451CDCF5B3496C1E19550710D21A
31,479,468 UART: [art] SIG.R = 89F9CCBDEF2CFB4C439C13BEE2037F91AC6A7869576BDA9494D11E84D3BC24AED291EB4FC1921C717CDEAF90C2F11EE8
31,486,871 UART: [art] SIG.S = EF2C3AFD5302990693CFCDAD03176D8B83E028E1CD1DCBA0F03EA06E4C5DC9AD86AC71453F8B0B95CF8A5665DB7F5853
32,791,946 UART: Caliptra RT
32,792,647 UART: [state] CFI Enabled
32,910,070 UART: [rt] RT listening for mailbox commands...
32,911,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,942,443 UART: [rt]cmd =0x44504543, len=24
32,968,674 >>> mbox cmd response data (40 bytes)
32,969,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,000,535 UART: [rt]cmd =0x44504543, len=96
33,040,628 >>> mbox cmd response data (56 bytes)
33,041,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,072,046 UART: [rt]cmd =0x44504543, len=96
33,112,515 >>> mbox cmd response data (56 bytes)
33,113,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,143,829 UART: [rt]cmd =0x44504543, len=96
33,184,773 >>> mbox cmd response data (56 bytes)
33,185,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,215,998 UART: [rt]cmd =0x44504543, len=96
33,257,483 >>> mbox cmd response data (56 bytes)
33,258,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,288,643 UART: [rt]cmd =0x44504543, len=96
33,330,182 >>> mbox cmd response data (56 bytes)
33,330,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,361,329 UART: [rt]cmd =0x44504543, len=96
33,404,260 >>> mbox cmd response data (56 bytes)
33,404,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,435,489 UART: [rt]cmd =0x44504543, len=96
33,476,725 >>> mbox cmd response data (56 bytes)
33,477,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,508,006 UART: [rt]cmd =0x44504543, len=96
33,550,291 >>> mbox cmd response data (56 bytes)
33,550,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,581,494 UART: [rt]cmd =0x44504543, len=96
33,624,476 >>> mbox cmd response data (56 bytes)
33,625,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,655,502 UART: [rt]cmd =0x44504543, len=96
33,698,139 >>> mbox cmd response data (56 bytes)
33,698,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,729,570 UART: [rt]cmd =0x44504543, len=96
33,773,121 >>> mbox cmd response data (56 bytes)
33,773,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,804,340 UART: [rt]cmd =0x44504543, len=96
33,848,513 >>> mbox cmd response data (56 bytes)
33,849,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,879,879 UART: [rt]cmd =0x44504543, len=96
33,924,059 >>> mbox cmd response data (56 bytes)
33,924,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,955,460 UART: [rt]cmd =0x44504543, len=96
33,999,316 >>> mbox cmd response data (56 bytes)
34,000,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,030,709 UART: [rt]cmd =0x44504543, len=96
34,037,279 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
4,121,861 ready_for_fw is high
4,122,278 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,052,179 >>> mbox cmd response: success
23,693,875 UART:
23,694,284 UART: Running Caliptra FMC ...
23,695,399 UART:
23,695,555 UART: [state] CFI Enabled
23,703,783 UART: [fht] FMC Alias Private Key: 7
26,033,654 UART: [art] Extend RT PCRs Done
26,034,886 UART: [art] Lock RT PCRs Done
26,036,297 UART: [art] Populate DV Done
26,041,841 UART: [fht] FMC Alias Private Key: 7
26,043,546 UART: [art] Derive CDI
26,044,286 UART: [art] Store in in slot 0x4
26,086,881 UART: [art] Derive Key Pair
26,087,886 UART: [art] Store priv key in slot 0x5
29,329,622 UART: [art] Derive Key Pair - Done
29,342,628 UART: [art] Signing Cert with AUTHO
29,343,934 UART: RITY.KEYID = 7
31,623,186 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,697 UART: [art] PUB.X = 21C1F66708EF1D179AE6AB30257A4C74BBF7626C199626AEC3F3515FAF29F02BCB391D1889B8F362443315FE335B0A52
31,631,899 UART: [art] PUB.Y = ED8E054F5BFF244BA1571EE678B3EA8111A0E414F653822E57DE8FB506A61CF34BED1910717E749400301D353C1AC318
31,639,152 UART: [art] SIG.R = 527FC1EE86E5D39F9AD84399569F3105204B8BB8E5962BD1652D44396C6C8E9958877AAE57CB02B62EEA26C0E916092A
31,646,496 UART: [art] SIG.S = 67B4C9ADE872FA4AA5C76194BB58D07FC8373F75C28357341BEF54AD6C55B744934656FFEB9A46B82A7D2BE7E25E6699
32,951,664 UART: Caliptra RT
32,952,378 UART: [state] CFI Enabled
33,071,090 UART: [rt] RT listening for mailbox commands...
33,073,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,103,581 UART: [rt]cmd =0x44504543, len=24
33,130,228 >>> mbox cmd response data (40 bytes)
33,131,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,162,086 UART: [rt]cmd =0x44504543, len=96
33,202,221 >>> mbox cmd response data (56 bytes)
33,202,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,233,658 UART: [rt]cmd =0x44504543, len=96
33,274,466 >>> mbox cmd response data (56 bytes)
33,275,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,305,670 UART: [rt]cmd =0x44504543, len=96
33,346,285 >>> mbox cmd response data (56 bytes)
33,346,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,377,377 UART: [rt]cmd =0x44504543, len=96
33,418,662 >>> mbox cmd response data (56 bytes)
33,419,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,449,924 UART: [rt]cmd =0x44504543, len=96
33,491,103 >>> mbox cmd response data (56 bytes)
33,491,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,522,343 UART: [rt]cmd =0x44504543, len=96
33,563,018 >>> mbox cmd response data (56 bytes)
33,563,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,594,397 UART: [rt]cmd =0x44504543, len=96
33,636,367 >>> mbox cmd response data (56 bytes)
33,637,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,667,581 UART: [rt]cmd =0x44504543, len=96
33,710,575 >>> mbox cmd response data (56 bytes)
33,711,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,741,843 UART: [rt]cmd =0x44504543, len=96
33,785,272 >>> mbox cmd response data (56 bytes)
33,786,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,816,671 UART: [rt]cmd =0x44504543, len=96
33,859,833 >>> mbox cmd response data (56 bytes)
33,860,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,890,986 UART: [rt]cmd =0x44504543, len=96
33,933,923 >>> mbox cmd response data (56 bytes)
33,934,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,964,901 UART: [rt]cmd =0x44504543, len=96
34,008,642 >>> mbox cmd response data (56 bytes)
34,009,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,039,971 UART: [rt]cmd =0x44504543, len=96
34,083,890 >>> mbox cmd response data (56 bytes)
34,084,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,115,132 UART: [rt]cmd =0x44504543, len=96
34,159,170 >>> mbox cmd response data (56 bytes)
34,159,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,190,412 UART: [rt]cmd =0x44504543, len=96
34,197,039 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
191,977 UART:
192,348 UART: Running Caliptra ROM ...
193,439 UART:
193,582 UART: [state] CFI Enabled
265,317 UART: [state] LifecycleState = Unprovisioned
267,219 UART: [state] DebugLocked = No
268,965 UART: [state] WD Timer not started. Device not locked for debugging
272,589 UART: [kat] SHA2-256
451,754 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,341 UART: [kat] ++
463,869 UART: [kat] sha1
475,456 UART: [kat] SHA2-256
478,461 UART: [kat] SHA2-384
485,087 UART: [kat] SHA2-512-ACC
488,099 UART: [kat] ECC-384
2,950,138 UART: [kat] HMAC-384Kdf
2,971,579 UART: [kat] LMS
3,501,046 UART: [kat] --
3,505,545 UART: [cold-reset] ++
3,506,701 UART: [fht] FHT @ 0x50003400
3,517,321 UART: [idev] ++
3,517,889 UART: [idev] CDI.KEYID = 6
3,518,887 UART: [idev] SUBJECT.KEYID = 7
3,520,084 UART: [idev] UDS.KEYID = 0
3,521,012 ready_for_fw is high
3,521,243 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,918 UART: [idev] Erasing UDS.KEYID = 0
6,029,561 UART: [idev] Sha1 KeyId Algorithm
6,053,775 UART: [idev] --
6,057,294 UART: [ldev] ++
6,057,871 UART: [ldev] CDI.KEYID = 6
6,058,755 UART: [ldev] SUBJECT.KEYID = 5
6,059,974 UART: [ldev] AUTHORITY.KEYID = 7
6,061,213 UART: [ldev] FE.KEYID = 1
6,100,407 UART: [ldev] Erasing FE.KEYID = 1
8,607,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,254 UART: [ldev] --
10,412,716 UART: [fwproc] Wait for Commands...
10,414,793 UART: [fwproc] Recv command 0x46574c44
10,416,838 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,750 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,282,860 >>> mbox cmd response: success
14,286,493 UART: [afmc] ++
14,287,096 UART: [afmc] CDI.KEYID = 6
14,288,013 UART: [afmc] SUBJECT.KEYID = 7
14,289,180 UART: [afmc] AUTHORITY.KEYID = 5
16,825,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,550,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,372 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,194 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,052 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,623,450 UART: [afmc] --
18,627,854 UART: [cold-reset] --
18,630,808 UART: [state] Locking Datavault
18,636,595 UART: [state] Locking PCR0, PCR1 and PCR31
18,638,238 UART: [state] Locking ICCM
18,639,744 UART: [exit] Launching FMC @ 0x40000130
18,648,144 UART:
18,648,385 UART: Running Caliptra FMC ...
18,649,488 UART:
18,649,644 UART: [state] CFI Enabled
18,710,177 UART: [fht] FMC Alias Private Key: 7
20,473,301 UART: [art] Extend RT PCRs Done
20,474,526 UART: [art] Lock RT PCRs Done
20,476,114 UART: [art] Populate DV Done
20,481,590 UART: [fht] FMC Alias Private Key: 7
20,483,134 UART: [art] Derive CDI
20,483,873 UART: [art] Store in in slot 0x4
20,542,367 UART: [art] Derive Key Pair
20,543,430 UART: [art] Store priv key in slot 0x5
23,005,705 UART: [art] Derive Key Pair - Done
23,019,293 UART: [art] Signing Cert with AUTHO
23,020,603 UART: RITY.KEYID = 7
24,731,735 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,513 UART: [art] PUB.X = 03DBF3745571AF427ACA5FBAD506762221532A0D8417BDF0CDC6FAA1B74731CE1460843B45D3F2FE65798A85364C90EB
24,740,496 UART: [art] PUB.Y = 8B9816818FC0D3D58D4A2B048C284D3551BDF483A5DBAAEA8157B1F6065D16274E025BD620CE7869A31CD053E6CB69A2
24,747,734 UART: [art] SIG.R = C47FCB76246A3D39861B19F32F67506B61A68C53184FE2D597A79380A1E3B8B82F3EDBB6077EB0DA34114CBDA3878DE9
24,755,143 UART: [art] SIG.S = 3B5D3ED6AC9618B32F920DC26BD45446CB1AF3D8C30F5530BE22EE7517DEE88A927117FA5CDBAAED1BB302D95C96D8DA
25,733,637 UART: Caliptra RT
25,734,329 UART: [state] CFI Enabled
25,899,465 UART: [rt] RT listening for mailbox commands...
25,901,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,931,870 UART: [rt]cmd =0x44504543, len=24
25,973,552 >>> mbox cmd response data (40 bytes)
25,974,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,005,244 UART: [rt]cmd =0x44504543, len=96
26,064,916 >>> mbox cmd response data (56 bytes)
26,065,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,096,389 UART: [rt]cmd =0x44504543, len=96
26,171,719 >>> mbox cmd response data (56 bytes)
26,172,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,203,096 UART: [rt]cmd =0x44504543, len=96
26,278,770 >>> mbox cmd response data (56 bytes)
26,279,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,309,663 UART: [rt]cmd =0x44504543, len=96
26,385,070 >>> mbox cmd response data (56 bytes)
26,385,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,353 UART: [rt]cmd =0x44504543, len=96
26,492,420 >>> mbox cmd response data (56 bytes)
26,493,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,523,676 UART: [rt]cmd =0x44504543, len=96
26,599,289 >>> mbox cmd response data (56 bytes)
26,600,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,630,819 UART: [rt]cmd =0x44504543, len=96
26,705,615 >>> mbox cmd response data (56 bytes)
26,706,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,736,872 UART: [rt]cmd =0x44504543, len=96
26,812,969 >>> mbox cmd response data (56 bytes)
26,813,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,844,466 UART: [rt]cmd =0x44504543, len=96
26,919,441 >>> mbox cmd response data (56 bytes)
26,920,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,950,779 UART: [rt]cmd =0x44504543, len=96
27,026,566 >>> mbox cmd response data (56 bytes)
27,027,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,057,791 UART: [rt]cmd =0x44504543, len=96
27,132,676 >>> mbox cmd response data (56 bytes)
27,133,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,164,084 UART: [rt]cmd =0x44504543, len=96
27,239,969 >>> mbox cmd response data (56 bytes)
27,240,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,271,013 UART: [rt]cmd =0x44504543, len=96
27,346,526 >>> mbox cmd response data (56 bytes)
27,347,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,377,630 UART: [rt]cmd =0x44504543, len=96
27,453,418 >>> mbox cmd response data (56 bytes)
27,454,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,484,627 UART: [rt]cmd =0x44504543, len=96
27,490,894 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,358,895 ready_for_fw is high
3,359,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,066,436 >>> mbox cmd response: success
18,367,718 UART:
18,368,125 UART: Running Caliptra FMC ...
18,369,310 UART:
18,369,492 UART: [state] CFI Enabled
18,432,951 UART: [fht] FMC Alias Private Key: 7
20,196,975 UART: [art] Extend RT PCRs Done
20,198,209 UART: [art] Lock RT PCRs Done
20,199,922 UART: [art] Populate DV Done
20,205,076 UART: [fht] FMC Alias Private Key: 7
20,206,535 UART: [art] Derive CDI
20,207,304 UART: [art] Store in in slot 0x4
20,266,349 UART: [art] Derive Key Pair
20,267,389 UART: [art] Store priv key in slot 0x5
22,730,739 UART: [art] Derive Key Pair - Done
22,743,302 UART: [art] Signing Cert with AUTHO
22,744,641 UART: RITY.KEYID = 7
24,456,117 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,621 UART: [art] PUB.X = 0BB6DC471E095425D5DD0AA13C7DCC053752D22780B0C46DDAEF95733B2B66A04813858CAEDBE55D4D15DFEDFBBD5004
24,464,908 UART: [art] PUB.Y = 9F87F4A0A80D30B659289BF35E7BEF354BA5A68638667EFFDC9C7ACFAC30D2BB3E50AC62EE9D4F5F9ACA12C66CABEBE5
24,472,251 UART: [art] SIG.R = 41168DA1A8D6D99107578594E547149CC21E454490567FEE15880489694826B5AD10401A1600CB7526C7E126776CBA25
24,479,575 UART: [art] SIG.S = 70A0A3D8F7821FB20D4F4C5D7195C25061F1F66752A189035717786FB3B7F89BC11DC8A3587363CA431C181ABDB94F47
25,458,788 UART: Caliptra RT
25,459,513 UART: [state] CFI Enabled
25,624,732 UART: [rt] RT listening for mailbox commands...
25,626,649 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,657,207 UART: [rt]cmd =0x44504543, len=24
25,698,538 >>> mbox cmd response data (40 bytes)
25,699,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,730,115 UART: [rt]cmd =0x44504543, len=96
25,789,782 >>> mbox cmd response data (56 bytes)
25,790,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,821,230 UART: [rt]cmd =0x44504543, len=96
25,896,856 >>> mbox cmd response data (56 bytes)
25,897,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,928,130 UART: [rt]cmd =0x44504543, len=96
26,003,770 >>> mbox cmd response data (56 bytes)
26,004,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,035,176 UART: [rt]cmd =0x44504543, len=96
26,110,603 >>> mbox cmd response data (56 bytes)
26,111,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,141,966 UART: [rt]cmd =0x44504543, len=96
26,216,743 >>> mbox cmd response data (56 bytes)
26,217,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,247,893 UART: [rt]cmd =0x44504543, len=96
26,324,210 >>> mbox cmd response data (56 bytes)
26,324,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,355,197 UART: [rt]cmd =0x44504543, len=96
26,430,716 >>> mbox cmd response data (56 bytes)
26,431,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,461,967 UART: [rt]cmd =0x44504543, len=96
26,537,583 >>> mbox cmd response data (56 bytes)
26,538,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,568,783 UART: [rt]cmd =0x44504543, len=96
26,644,276 >>> mbox cmd response data (56 bytes)
26,644,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,675,695 UART: [rt]cmd =0x44504543, len=96
26,751,163 >>> mbox cmd response data (56 bytes)
26,751,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,782,228 UART: [rt]cmd =0x44504543, len=96
26,857,780 >>> mbox cmd response data (56 bytes)
26,858,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,889,136 UART: [rt]cmd =0x44504543, len=96
26,964,418 >>> mbox cmd response data (56 bytes)
26,965,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,995,601 UART: [rt]cmd =0x44504543, len=96
27,071,117 >>> mbox cmd response data (56 bytes)
27,071,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,102,430 UART: [rt]cmd =0x44504543, len=96
27,177,769 >>> mbox cmd response data (56 bytes)
27,178,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,208,852 UART: [rt]cmd =0x44504543, len=96
27,215,471 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
192,885 UART:
193,250 UART: Running Caliptra ROM ...
194,380 UART:
604,222 UART: [state] CFI Enabled
618,466 UART: [state] LifecycleState = Unprovisioned
620,340 UART: [state] DebugLocked = No
621,585 UART: [state] WD Timer not started. Device not locked for debugging
624,698 UART: [kat] SHA2-256
803,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,389 UART: [kat] ++
815,920 UART: [kat] sha1
828,461 UART: [kat] SHA2-256
831,459 UART: [kat] SHA2-384
837,886 UART: [kat] SHA2-512-ACC
840,833 UART: [kat] ECC-384
3,284,278 UART: [kat] HMAC-384Kdf
3,297,221 UART: [kat] LMS
3,826,691 UART: [kat] --
3,831,817 UART: [cold-reset] ++
3,834,381 UART: [fht] FHT @ 0x50003400
3,845,741 UART: [idev] ++
3,846,309 UART: [idev] CDI.KEYID = 6
3,847,215 UART: [idev] SUBJECT.KEYID = 7
3,848,459 UART: [idev] UDS.KEYID = 0
3,849,384 ready_for_fw is high
3,849,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,936 UART: [idev] Erasing UDS.KEYID = 0
6,322,980 UART: [idev] Sha1 KeyId Algorithm
6,345,503 UART: [idev] --
6,350,285 UART: [ldev] ++
6,350,862 UART: [ldev] CDI.KEYID = 6
6,351,746 UART: [ldev] SUBJECT.KEYID = 5
6,352,953 UART: [ldev] AUTHORITY.KEYID = 7
6,354,185 UART: [ldev] FE.KEYID = 1
6,365,939 UART: [ldev] Erasing FE.KEYID = 1
8,843,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,402 UART: [ldev] --
10,634,156 UART: [fwproc] Wait for Commands...
10,637,109 UART: [fwproc] Recv command 0x46574c44
10,639,197 UART: [fwproc] Recv'd Img size: 114168 bytes
14,040,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,119,027 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,187,767 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,505,805 >>> mbox cmd response: success
14,509,415 UART: [afmc] ++
14,510,019 UART: [afmc] CDI.KEYID = 6
14,510,936 UART: [afmc] SUBJECT.KEYID = 7
14,512,043 UART: [afmc] AUTHORITY.KEYID = 5
17,012,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,733,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,735,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,751,448 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,767,491 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,783,312 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,805,713 UART: [afmc] --
18,810,273 UART: [cold-reset] --
18,814,412 UART: [state] Locking Datavault
18,819,058 UART: [state] Locking PCR0, PCR1 and PCR31
18,820,753 UART: [state] Locking ICCM
18,822,836 UART: [exit] Launching FMC @ 0x40000130
18,831,244 UART:
18,831,490 UART: Running Caliptra FMC ...
18,832,589 UART:
18,832,758 UART: [state] CFI Enabled
18,840,873 UART: [fht] FMC Alias Private Key: 7
20,598,000 UART: [art] Extend RT PCRs Done
20,599,228 UART: [art] Lock RT PCRs Done
20,601,337 UART: [art] Populate DV Done
20,606,428 UART: [fht] FMC Alias Private Key: 7
20,607,968 UART: [art] Derive CDI
20,608,780 UART: [art] Store in in slot 0x4
20,651,321 UART: [art] Derive Key Pair
20,652,317 UART: [art] Store priv key in slot 0x5
23,079,143 UART: [art] Derive Key Pair - Done
23,091,824 UART: [art] Signing Cert with AUTHO
23,093,136 UART: RITY.KEYID = 7
24,798,252 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,756 UART: [art] PUB.X = 64687D0A920916E259E4A74C1F13549E8143F49A00DA111994F27AEFC028B7133B81562C8975C66FD671DBBB6F9DB331
24,807,016 UART: [art] PUB.Y = 7C0D66392689FB2644C5539955EC3668473789D12A1CB54FEEA9F419CA4C5D5E0AD8C00FBE36DC8B21AC3DEAA7EF436E
24,814,264 UART: [art] SIG.R = 6D4B63B1465000A0ED6AB0283D416FF8E7BA1BAC2B59E2A280333628231C7087B0C6E92183D292CDCE96CF47FC594FAC
24,821,686 UART: [art] SIG.S = F47578D5BB332172F3F234BE63752E05B5A688B438C89E2EB4F418D235DDD712C2F318DEF8B9B4E9E10920644ADE023B
25,799,943 UART: Caliptra RT
25,800,645 UART: [state] CFI Enabled
25,918,324 UART: [rt] RT listening for mailbox commands...
25,920,238 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,950,683 UART: [rt]cmd =0x44504543, len=24
25,977,021 >>> mbox cmd response data (40 bytes)
25,978,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,008,920 UART: [rt]cmd =0x44504543, len=96
26,049,341 >>> mbox cmd response data (56 bytes)
26,050,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,080,366 UART: [rt]cmd =0x44504543, len=96
26,120,499 >>> mbox cmd response data (56 bytes)
26,121,233 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,151,709 UART: [rt]cmd =0x44504543, len=96
26,192,599 >>> mbox cmd response data (56 bytes)
26,193,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,223,612 UART: [rt]cmd =0x44504543, len=96
26,264,713 >>> mbox cmd response data (56 bytes)
26,265,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,296,180 UART: [rt]cmd =0x44504543, len=96
26,337,490 >>> mbox cmd response data (56 bytes)
26,338,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,368,822 UART: [rt]cmd =0x44504543, len=96
26,411,348 >>> mbox cmd response data (56 bytes)
26,412,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,487 UART: [rt]cmd =0x44504543, len=96
26,484,795 >>> mbox cmd response data (56 bytes)
26,485,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,516,025 UART: [rt]cmd =0x44504543, len=96
26,558,451 >>> mbox cmd response data (56 bytes)
26,559,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,589,805 UART: [rt]cmd =0x44504543, len=96
26,632,384 >>> mbox cmd response data (56 bytes)
26,633,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,663,565 UART: [rt]cmd =0x44504543, len=96
26,706,468 >>> mbox cmd response data (56 bytes)
26,707,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,737,475 UART: [rt]cmd =0x44504543, len=96
26,780,954 >>> mbox cmd response data (56 bytes)
26,781,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,812,262 UART: [rt]cmd =0x44504543, len=96
26,855,635 >>> mbox cmd response data (56 bytes)
26,856,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,886,686 UART: [rt]cmd =0x44504543, len=96
26,929,954 >>> mbox cmd response data (56 bytes)
26,930,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,961,098 UART: [rt]cmd =0x44504543, len=96
27,005,514 >>> mbox cmd response data (56 bytes)
27,006,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,036,670 UART: [rt]cmd =0x44504543, len=96
27,043,195 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
3,697,571 ready_for_fw is high
3,698,022 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,843 >>> mbox cmd response: success
18,515,607 UART:
18,516,015 UART: Running Caliptra FMC ...
18,517,207 UART:
18,517,377 UART: [state] CFI Enabled
18,524,835 UART: [fht] FMC Alias Private Key: 7
20,281,734 UART: [art] Extend RT PCRs Done
20,282,963 UART: [art] Lock RT PCRs Done
20,284,531 UART: [art] Populate DV Done
20,289,800 UART: [fht] FMC Alias Private Key: 7
20,291,292 UART: [art] Derive CDI
20,292,060 UART: [art] Store in in slot 0x4
20,334,988 UART: [art] Derive Key Pair
20,335,990 UART: [art] Store priv key in slot 0x5
22,763,170 UART: [art] Derive Key Pair - Done
22,776,463 UART: [art] Signing Cert with AUTHO
22,777,778 UART: RITY.KEYID = 7
24,483,729 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,235 UART: [art] PUB.X = 8CC3171EDE99201C8DAA4EB9847CD5E5C511BF7728EC2C70AA11FB38BE62966A044C8AF3D5F142FFBF9AB6E9FAF1B40B
24,492,536 UART: [art] PUB.Y = AC70692D6517C74DA3667D23B7AE1AF60C250D47064534FAF00AE116646C431D171F06D7F77CE7F4BFC2A7DF945EB733
24,499,793 UART: [art] SIG.R = A3EF357B81458656A9455176F3A0F4CB2587D3BE758BDCE6D615037802B7C2B995C37E69609966160F06AD956D5D66AC
24,507,206 UART: [art] SIG.S = 171E99979D232F592E94BA5E82E0B213824D194C46A784B01AA427461C34F0F9D9266683896D08A3275ECDC567B33408
25,485,942 UART: Caliptra RT
25,486,644 UART: [state] CFI Enabled
25,603,540 UART: [rt] RT listening for mailbox commands...
25,605,447 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,636,057 UART: [rt]cmd =0x44504543, len=24
25,662,329 >>> mbox cmd response data (40 bytes)
25,663,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,694,055 UART: [rt]cmd =0x44504543, len=96
25,734,811 >>> mbox cmd response data (56 bytes)
25,735,559 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,766,257 UART: [rt]cmd =0x44504543, len=96
25,806,033 >>> mbox cmd response data (56 bytes)
25,806,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,837,486 UART: [rt]cmd =0x44504543, len=96
25,878,453 >>> mbox cmd response data (56 bytes)
25,879,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,909,726 UART: [rt]cmd =0x44504543, len=96
25,950,415 >>> mbox cmd response data (56 bytes)
25,951,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,981,764 UART: [rt]cmd =0x44504543, len=96
26,023,646 >>> mbox cmd response data (56 bytes)
26,024,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,054,950 UART: [rt]cmd =0x44504543, len=96
26,096,290 >>> mbox cmd response data (56 bytes)
26,096,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,127,486 UART: [rt]cmd =0x44504543, len=96
26,169,369 >>> mbox cmd response data (56 bytes)
26,170,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,200,537 UART: [rt]cmd =0x44504543, len=96
26,242,616 >>> mbox cmd response data (56 bytes)
26,243,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,273,830 UART: [rt]cmd =0x44504543, len=96
26,316,986 >>> mbox cmd response data (56 bytes)
26,317,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,348,290 UART: [rt]cmd =0x44504543, len=96
26,392,198 >>> mbox cmd response data (56 bytes)
26,392,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,423,446 UART: [rt]cmd =0x44504543, len=96
26,466,979 >>> mbox cmd response data (56 bytes)
26,467,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,498,071 UART: [rt]cmd =0x44504543, len=96
26,541,715 >>> mbox cmd response data (56 bytes)
26,542,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,572,962 UART: [rt]cmd =0x44504543, len=96
26,616,502 >>> mbox cmd response data (56 bytes)
26,617,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,647,487 UART: [rt]cmd =0x44504543, len=96
26,692,227 >>> mbox cmd response data (56 bytes)
26,692,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,723,530 UART: [rt]cmd =0x44504543, len=96
26,729,936 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,087 UART:
192,459 UART: Running Caliptra ROM ...
193,678 UART:
193,853 UART: [state] CFI Enabled
263,295 UART: [state] LifecycleState = Unprovisioned
265,373 UART: [state] DebugLocked = No
266,489 UART: [state] WD Timer not started. Device not locked for debugging
270,670 UART: [kat] SHA2-256
460,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,332 UART: [kat] ++
471,830 UART: [kat] sha1
482,636 UART: [kat] SHA2-256
485,713 UART: [kat] SHA2-384
491,917 UART: [kat] SHA2-512-ACC
494,507 UART: [kat] ECC-384
2,947,629 UART: [kat] HMAC-384Kdf
2,971,376 UART: [kat] LMS
3,503,146 UART: [kat] --
3,507,444 UART: [cold-reset] ++
3,508,833 UART: [fht] FHT @ 0x50003400
3,520,107 UART: [idev] ++
3,520,813 UART: [idev] CDI.KEYID = 6
3,521,770 UART: [idev] SUBJECT.KEYID = 7
3,522,941 UART: [idev] UDS.KEYID = 0
3,523,867 ready_for_fw is high
3,524,054 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,626 UART: [idev] Erasing UDS.KEYID = 0
6,027,007 UART: [idev] Sha1 KeyId Algorithm
6,049,110 UART: [idev] --
6,054,132 UART: [ldev] ++
6,054,817 UART: [ldev] CDI.KEYID = 6
6,055,733 UART: [ldev] SUBJECT.KEYID = 5
6,056,896 UART: [ldev] AUTHORITY.KEYID = 7
6,058,132 UART: [ldev] FE.KEYID = 1
6,099,409 UART: [ldev] Erasing FE.KEYID = 1
8,604,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,083 UART: [ldev] --
10,413,418 UART: [fwproc] Wait for Commands...
10,415,514 UART: [fwproc] Recv command 0x46574c44
10,417,822 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,230 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,382 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,604,171 >>> mbox cmd response: success
14,608,821 UART: [afmc] ++
14,609,527 UART: [afmc] CDI.KEYID = 6
14,610,745 UART: [afmc] SUBJECT.KEYID = 7
14,612,189 UART: [afmc] AUTHORITY.KEYID = 5
17,149,246 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,736 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,889 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,931 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,913 UART: [afmc] --
18,945,586 UART: [cold-reset] --
18,950,217 UART: [state] Locking Datavault
18,956,732 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,902 UART: [state] Locking ICCM
18,961,229 UART: [exit] Launching FMC @ 0x40000130
18,969,870 UART:
18,970,115 UART: Running Caliptra FMC ...
18,971,242 UART:
18,971,402 UART: [state] CFI Enabled
19,029,660 UART: [fht] FMC Alias Private Key: 7
20,793,693 UART: [art] Extend RT PCRs Done
20,794,892 UART: [art] Lock RT PCRs Done
20,796,564 UART: [art] Populate DV Done
20,802,081 UART: [fht] FMC Alias Private Key: 7
20,803,676 UART: [art] Derive CDI
20,804,493 UART: [art] Store in in slot 0x4
20,862,073 UART: [art] Derive Key Pair
20,863,067 UART: [art] Store priv key in slot 0x5
23,325,972 UART: [art] Derive Key Pair - Done
23,339,023 UART: [art] Signing Cert with AUTHO
23,340,325 UART: RITY.KEYID = 7
25,051,638 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,140 UART: [art] PUB.X = B043EED1B8F79FAABA86CA1647FF5A1E33D6F00341495E0F152B2238CC1958675252626283757DB0187D933F9DDB6664
25,060,424 UART: [art] PUB.Y = 81796F1786B8B84A9B79F8C23F1B4728A314BA700BBE68177A1B7BA38C22E334559F7EA00AB718872F642003D692002A
25,067,629 UART: [art] SIG.R = 240AADF51FA9BF5AA9134A50E2DFA6546B171CFFEC81F66B1B8FD45F1B1FAC47CB9F28FBEB194409A0A593B061B8BFE6
25,075,057 UART: [art] SIG.S = CF31A06A9A6FB27A673A54C90DC3BA03BE860E0721D02EBD9C21C346BADB08D021BD37AF1BCA3507550D69783FF04119
26,053,973 UART: Caliptra RT
26,054,690 UART: [state] CFI Enabled
26,218,755 UART: [rt] RT listening for mailbox commands...
26,220,665 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,251,425 UART: [rt]cmd =0x44504543, len=24
26,294,776 >>> mbox cmd response data (40 bytes)
26,295,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,326,653 UART: [rt]cmd =0x44504543, len=96
26,386,477 >>> mbox cmd response data (56 bytes)
26,387,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,417,881 UART: [rt]cmd =0x44504543, len=96
26,493,357 >>> mbox cmd response data (56 bytes)
26,494,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,524,698 UART: [rt]cmd =0x44504543, len=96
26,600,098 >>> mbox cmd response data (56 bytes)
26,600,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,631,366 UART: [rt]cmd =0x44504543, len=96
26,706,745 >>> mbox cmd response data (56 bytes)
26,707,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,738,272 UART: [rt]cmd =0x44504543, len=96
26,813,850 >>> mbox cmd response data (56 bytes)
26,814,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,844,998 UART: [rt]cmd =0x44504543, len=96
26,920,344 >>> mbox cmd response data (56 bytes)
26,921,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,951,605 UART: [rt]cmd =0x44504543, len=96
27,027,463 >>> mbox cmd response data (56 bytes)
27,028,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,058,839 UART: [rt]cmd =0x44504543, len=96
27,133,887 >>> mbox cmd response data (56 bytes)
27,134,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,165,034 UART: [rt]cmd =0x44504543, len=96
27,240,720 >>> mbox cmd response data (56 bytes)
27,241,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,272,065 UART: [rt]cmd =0x44504543, len=96
27,347,459 >>> mbox cmd response data (56 bytes)
27,348,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,379,068 UART: [rt]cmd =0x44504543, len=96
27,454,307 >>> mbox cmd response data (56 bytes)
27,455,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,485,532 UART: [rt]cmd =0x44504543, len=96
27,561,053 >>> mbox cmd response data (56 bytes)
27,561,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,592,217 UART: [rt]cmd =0x44504543, len=96
27,668,065 >>> mbox cmd response data (56 bytes)
27,668,812 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,699,514 UART: [rt]cmd =0x44504543, len=96
27,775,030 >>> mbox cmd response data (56 bytes)
27,775,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,806,546 UART: [rt]cmd =0x44504543, len=96
27,812,899 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
3,437,498 ready_for_fw is high
3,437,898 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,730,870 >>> mbox cmd response: success
19,025,357 UART:
19,025,756 UART: Running Caliptra FMC ...
19,026,862 UART:
19,027,023 UART: [state] CFI Enabled
19,091,469 UART: [fht] FMC Alias Private Key: 7
20,855,174 UART: [art] Extend RT PCRs Done
20,856,419 UART: [art] Lock RT PCRs Done
20,858,002 UART: [art] Populate DV Done
20,863,428 UART: [fht] FMC Alias Private Key: 7
20,865,073 UART: [art] Derive CDI
20,865,893 UART: [art] Store in in slot 0x4
20,923,600 UART: [art] Derive Key Pair
20,924,644 UART: [art] Store priv key in slot 0x5
23,387,506 UART: [art] Derive Key Pair - Done
23,400,131 UART: [art] Signing Cert with AUTHO
23,401,430 UART: RITY.KEYID = 7
25,112,797 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,303 UART: [art] PUB.X = 1BCE44539B4399D6F222342F470453D64E0C1B993BF0AC1CB2FAA3D18A37B7991963A6D50E7A2DDBAF71C51C07EA804A
25,121,592 UART: [art] PUB.Y = B359F625EB8BEC85772234A231003B7A79E619E236708756D2AE0A2FE960E6BBAD5F12CAEAFAE490527B505C5EBD9630
25,128,813 UART: [art] SIG.R = 67FBD4D99C5306D5CA8C7FF69483126246DA642297E97AB33136C5F95B00F58A4AA725572C1BE130A9F85E7EB48B3093
25,136,197 UART: [art] SIG.S = C95D7DC6B3C49F784EFE98E53F995C3A699447F11DD42623F2CCF1F754CA96A276CF8F35B7695C7213107ECBC1B1ABC3
26,114,987 UART: Caliptra RT
26,115,693 UART: [state] CFI Enabled
26,280,589 UART: [rt] RT listening for mailbox commands...
26,282,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,312,929 UART: [rt]cmd =0x44504543, len=24
26,354,662 >>> mbox cmd response data (40 bytes)
26,355,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,386,391 UART: [rt]cmd =0x44504543, len=96
26,446,102 >>> mbox cmd response data (56 bytes)
26,446,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,477,289 UART: [rt]cmd =0x44504543, len=96
26,552,541 >>> mbox cmd response data (56 bytes)
26,553,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,583,819 UART: [rt]cmd =0x44504543, len=96
26,659,288 >>> mbox cmd response data (56 bytes)
26,660,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,690,619 UART: [rt]cmd =0x44504543, len=96
26,765,913 >>> mbox cmd response data (56 bytes)
26,766,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,797,055 UART: [rt]cmd =0x44504543, len=96
26,873,347 >>> mbox cmd response data (56 bytes)
26,874,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,904,557 UART: [rt]cmd =0x44504543, len=96
26,979,590 >>> mbox cmd response data (56 bytes)
26,980,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,010,956 UART: [rt]cmd =0x44504543, len=96
27,086,108 >>> mbox cmd response data (56 bytes)
27,086,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,117,524 UART: [rt]cmd =0x44504543, len=96
27,192,822 >>> mbox cmd response data (56 bytes)
27,193,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,224,040 UART: [rt]cmd =0x44504543, len=96
27,299,891 >>> mbox cmd response data (56 bytes)
27,300,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,331,063 UART: [rt]cmd =0x44504543, len=96
27,406,629 >>> mbox cmd response data (56 bytes)
27,407,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,437,989 UART: [rt]cmd =0x44504543, len=96
27,513,531 >>> mbox cmd response data (56 bytes)
27,514,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,544,896 UART: [rt]cmd =0x44504543, len=96
27,620,502 >>> mbox cmd response data (56 bytes)
27,621,225 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,651,860 UART: [rt]cmd =0x44504543, len=96
27,726,815 >>> mbox cmd response data (56 bytes)
27,727,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,758,288 UART: [rt]cmd =0x44504543, len=96
27,833,841 >>> mbox cmd response data (56 bytes)
27,834,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,865,278 UART: [rt]cmd =0x44504543, len=96
27,871,737 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,748 writing to cptra_bootfsm_go
193,034 UART:
193,424 UART: Running Caliptra ROM ...
194,624 UART:
604,154 UART: [state] CFI Enabled
619,232 UART: [state] LifecycleState = Unprovisioned
621,598 UART: [state] DebugLocked = No
624,163 UART: [state] WD Timer not started. Device not locked for debugging
629,503 UART: [kat] SHA2-256
819,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,124 UART: [kat] ++
830,641 UART: [kat] sha1
841,588 UART: [kat] SHA2-256
844,671 UART: [kat] SHA2-384
851,015 UART: [kat] SHA2-512-ACC
853,604 UART: [kat] ECC-384
3,295,968 UART: [kat] HMAC-384Kdf
3,309,836 UART: [kat] LMS
3,841,636 UART: [kat] --
3,846,928 UART: [cold-reset] ++
3,848,720 UART: [fht] FHT @ 0x50003400
3,860,831 UART: [idev] ++
3,861,473 UART: [idev] CDI.KEYID = 6
3,862,507 UART: [idev] SUBJECT.KEYID = 7
3,863,613 UART: [idev] UDS.KEYID = 0
3,864,552 ready_for_fw is high
3,864,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,008,122 UART: [idev] Erasing UDS.KEYID = 0
6,339,284 UART: [idev] Sha1 KeyId Algorithm
6,362,891 UART: [idev] --
6,367,802 UART: [ldev] ++
6,368,480 UART: [ldev] CDI.KEYID = 6
6,369,390 UART: [ldev] SUBJECT.KEYID = 5
6,370,602 UART: [ldev] AUTHORITY.KEYID = 7
6,371,793 UART: [ldev] FE.KEYID = 1
6,383,750 UART: [ldev] Erasing FE.KEYID = 1
8,864,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,980 UART: [ldev] --
10,653,780 UART: [fwproc] Wait for Commands...
10,656,355 UART: [fwproc] Recv command 0x46574c44
10,658,606 UART: [fwproc] Recv'd Img size: 114168 bytes
14,105,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,740 >>> mbox cmd response: success
14,843,677 UART: [afmc] ++
14,844,411 UART: [afmc] CDI.KEYID = 6
14,845,602 UART: [afmc] SUBJECT.KEYID = 7
14,847,037 UART: [afmc] AUTHORITY.KEYID = 5
17,348,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,198 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,313 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,766 UART: [afmc] --
19,143,763 UART: [cold-reset] --
19,148,444 UART: [state] Locking Datavault
19,154,397 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,589 UART: [state] Locking ICCM
19,158,953 UART: [exit] Launching FMC @ 0x40000130
19,167,569 UART:
19,167,826 UART: Running Caliptra FMC ...
19,168,934 UART:
19,169,097 UART: [state] CFI Enabled
19,177,148 UART: [fht] FMC Alias Private Key: 7
20,933,857 UART: [art] Extend RT PCRs Done
20,935,076 UART: [art] Lock RT PCRs Done
20,936,919 UART: [art] Populate DV Done
20,942,706 UART: [fht] FMC Alias Private Key: 7
20,944,334 UART: [art] Derive CDI
20,945,154 UART: [art] Store in in slot 0x4
20,987,641 UART: [art] Derive Key Pair
20,988,637 UART: [art] Store priv key in slot 0x5
23,415,218 UART: [art] Derive Key Pair - Done
23,428,259 UART: [art] Signing Cert with AUTHO
23,429,590 UART: RITY.KEYID = 7
25,134,786 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,308 UART: [art] PUB.X = 7E3AD6C919A6C355B282A8EA7BA359C5ACC7EF176D3C2497D1CEF7C159F67B47C66F41A085DA2B0762DB39D68E2F93A8
25,143,559 UART: [art] PUB.Y = D8F55686E0ACE20E51CCC5C308EDE813E6D6859CE2243E0E1E2E109B0F8A57C13155C1EB2EFFEEBB087BCC28D11AE3B7
25,150,842 UART: [art] SIG.R = 0BC038D7E5AF2B60E2280662FDCB01AA2A54A23AD4DAB95713B8A664FBE4498DBF19F8004715E3220C5D6415E4D21B0C
25,158,231 UART: [art] SIG.S = 6F3F9AE5B6B4E43E945C6287790F91BD6B8B59E4D4693DA330F85D05D59DAFE4AD95372E6A8E8A9FA002FD59127F9595
26,137,770 UART: Caliptra RT
26,138,481 UART: [state] CFI Enabled
26,255,491 UART: [rt] RT listening for mailbox commands...
26,257,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,288,092 UART: [rt]cmd =0x44504543, len=24
26,314,747 >>> mbox cmd response data (40 bytes)
26,315,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,346,505 UART: [rt]cmd =0x44504543, len=96
26,385,747 >>> mbox cmd response data (56 bytes)
26,386,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,982 UART: [rt]cmd =0x44504543, len=96
26,457,484 >>> mbox cmd response data (56 bytes)
26,458,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,488,583 UART: [rt]cmd =0x44504543, len=96
26,529,710 >>> mbox cmd response data (56 bytes)
26,530,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,560,684 UART: [rt]cmd =0x44504543, len=96
26,602,352 >>> mbox cmd response data (56 bytes)
26,603,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,633,448 UART: [rt]cmd =0x44504543, len=96
26,675,333 >>> mbox cmd response data (56 bytes)
26,676,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,706,420 UART: [rt]cmd =0x44504543, len=96
26,748,298 >>> mbox cmd response data (56 bytes)
26,748,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,779,571 UART: [rt]cmd =0x44504543, len=96
26,821,973 >>> mbox cmd response data (56 bytes)
26,822,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,853,194 UART: [rt]cmd =0x44504543, len=96
26,895,648 >>> mbox cmd response data (56 bytes)
26,896,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,926,692 UART: [rt]cmd =0x44504543, len=96
26,968,828 >>> mbox cmd response data (56 bytes)
26,969,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,999,980 UART: [rt]cmd =0x44504543, len=96
27,042,970 >>> mbox cmd response data (56 bytes)
27,043,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,074,226 UART: [rt]cmd =0x44504543, len=96
27,117,608 >>> mbox cmd response data (56 bytes)
27,118,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,148,968 UART: [rt]cmd =0x44504543, len=96
27,192,605 >>> mbox cmd response data (56 bytes)
27,193,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,223,802 UART: [rt]cmd =0x44504543, len=96
27,267,844 >>> mbox cmd response data (56 bytes)
27,268,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,299,094 UART: [rt]cmd =0x44504543, len=96
27,342,738 >>> mbox cmd response data (56 bytes)
27,343,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,373,937 UART: [rt]cmd =0x44504543, len=96
27,380,340 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,691 writing to cptra_bootfsm_go
3,757,613 ready_for_fw is high
3,758,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,410 >>> mbox cmd response: success
19,210,215 UART:
19,210,614 UART: Running Caliptra FMC ...
19,211,721 UART:
19,211,877 UART: [state] CFI Enabled
19,220,158 UART: [fht] FMC Alias Private Key: 7
20,977,297 UART: [art] Extend RT PCRs Done
20,978,528 UART: [art] Lock RT PCRs Done
20,980,507 UART: [art] Populate DV Done
20,986,088 UART: [fht] FMC Alias Private Key: 7
20,987,784 UART: [art] Derive CDI
20,988,629 UART: [art] Store in in slot 0x4
21,031,121 UART: [art] Derive Key Pair
21,032,132 UART: [art] Store priv key in slot 0x5
23,458,963 UART: [art] Derive Key Pair - Done
23,472,053 UART: [art] Signing Cert with AUTHO
23,473,381 UART: RITY.KEYID = 7
25,178,244 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,750 UART: [art] PUB.X = 395CE8E820F60FD39FE520CF8CCB63D9281AFD6E87B0A4ABBF703C1507D260A555B7B599979C0060E0222045481280EF
25,186,994 UART: [art] PUB.Y = 018511294B2B0AC55E2B05641C48A657DD63EBA5B99B0471ABB6B8027F608D33A087C16EAE674502B346158E421F8D14
25,194,284 UART: [art] SIG.R = FF2A677AD145AD1A6CDAEA4B5D2A8DBDAC2F5D23A165CC9721B02C00B812FE1AEDFEA8F9F610090BAC3F90ABFC9CD259
25,201,671 UART: [art] SIG.S = 0AE2822C1C2130334ACC5238AED6AF47970BE4B804E898ACC92A2CB0AEF69095F25B3FBCC0FE9D73654275A9AC713F29
26,180,201 UART: Caliptra RT
26,180,891 UART: [state] CFI Enabled
26,299,422 UART: [rt] RT listening for mailbox commands...
26,301,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,331,725 UART: [rt]cmd =0x44504543, len=24
26,358,016 >>> mbox cmd response data (40 bytes)
26,359,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,615 UART: [rt]cmd =0x44504543, len=96
26,429,988 >>> mbox cmd response data (56 bytes)
26,430,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,461,232 UART: [rt]cmd =0x44504543, len=96
26,502,974 >>> mbox cmd response data (56 bytes)
26,503,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,118 UART: [rt]cmd =0x44504543, len=96
26,574,299 >>> mbox cmd response data (56 bytes)
26,575,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,605,672 UART: [rt]cmd =0x44504543, len=96
26,647,711 >>> mbox cmd response data (56 bytes)
26,648,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,678,961 UART: [rt]cmd =0x44504543, len=96
26,720,948 >>> mbox cmd response data (56 bytes)
26,721,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,752,203 UART: [rt]cmd =0x44504543, len=96
26,793,916 >>> mbox cmd response data (56 bytes)
26,794,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,825,249 UART: [rt]cmd =0x44504543, len=96
26,867,296 >>> mbox cmd response data (56 bytes)
26,867,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,898,625 UART: [rt]cmd =0x44504543, len=96
26,940,159 >>> mbox cmd response data (56 bytes)
26,940,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,971,528 UART: [rt]cmd =0x44504543, len=96
27,014,900 >>> mbox cmd response data (56 bytes)
27,015,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,045,999 UART: [rt]cmd =0x44504543, len=96
27,088,942 >>> mbox cmd response data (56 bytes)
27,089,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,120,229 UART: [rt]cmd =0x44504543, len=96
27,164,146 >>> mbox cmd response data (56 bytes)
27,164,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,195,182 UART: [rt]cmd =0x44504543, len=96
27,238,712 >>> mbox cmd response data (56 bytes)
27,239,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,270,073 UART: [rt]cmd =0x44504543, len=96
27,314,038 >>> mbox cmd response data (56 bytes)
27,314,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,345,244 UART: [rt]cmd =0x44504543, len=96
27,388,616 >>> mbox cmd response data (56 bytes)
27,389,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,419,971 UART: [rt]cmd =0x44504543, len=96
27,426,701 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,257 UART: [kat] SHA2-256
882,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,303 UART: [kat] ++
886,455 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,762 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,163 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,202 UART: [idev] ++
1,479,370 UART: [idev] CDI.KEYID = 6
1,479,730 UART: [idev] SUBJECT.KEYID = 7
1,480,154 UART: [idev] UDS.KEYID = 0
1,480,499 ready_for_fw is high
1,480,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,576 UART: [idev] Erasing UDS.KEYID = 0
1,505,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,014 UART: [idev] --
1,515,159 UART: [ldev] ++
1,515,327 UART: [ldev] CDI.KEYID = 6
1,515,690 UART: [ldev] SUBJECT.KEYID = 5
1,516,116 UART: [ldev] AUTHORITY.KEYID = 7
1,516,579 UART: [ldev] FE.KEYID = 1
1,521,455 UART: [ldev] Erasing FE.KEYID = 1
1,547,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,476 UART: [ldev] --
1,585,747 UART: [fwproc] Waiting for Commands...
1,586,438 UART: [fwproc] Received command 0x46574c44
1,587,229 UART: [fwproc] Received Image of size 114168 bytes
2,884,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,731 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,714 >>> mbox cmd response: success
3,077,824 UART: [afmc] ++
3,077,992 UART: [afmc] CDI.KEYID = 6
3,078,354 UART: [afmc] SUBJECT.KEYID = 7
3,078,779 UART: [afmc] AUTHORITY.KEYID = 5
3,113,948 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,414 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,194 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,922 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,807 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,497 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,384 UART: [afmc] --
3,157,286 UART: [cold-reset] --
3,158,038 UART: [state] Locking Datavault
3,159,257 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,861 UART: [state] Locking ICCM
3,160,365 UART: [exit] Launching FMC @ 0x40000130
3,165,694 UART:
3,165,710 UART: Running Caliptra FMC ...
3,166,118 UART:
3,166,172 UART: [state] CFI Enabled
3,176,437 UART: [fht] FMC Alias Private Key: 7
3,284,994 UART: [art] Extend RT PCRs Done
3,285,422 UART: [art] Lock RT PCRs Done
3,286,896 UART: [art] Populate DV Done
3,295,099 UART: [fht] FMC Alias Private Key: 7
3,296,189 UART: [art] Derive CDI
3,296,469 UART: [art] Store in in slot 0x4
3,381,790 UART: [art] Derive Key Pair
3,382,150 UART: [art] Store priv key in slot 0x5
3,395,808 UART: [art] Derive Key Pair - Done
3,410,589 UART: [art] Signing Cert with AUTHO
3,411,069 UART: RITY.KEYID = 7
3,426,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,812 UART: [art] PUB.X = 55B51A0E1A1F67FDCA9525935CDBC8D93AD12E77A8159A10E1E5BB13EC4AA5A079508572EBB4F8AC5253FCAADA166D41
3,433,599 UART: [art] PUB.Y = 8F414997E5ED466B40E11DAD66D3F9E3F84F50D928441FFF7381942BD46D11106AD6D617F15252E2C2EAD2B0E5E1FC7E
3,440,559 UART: [art] SIG.R = 5B03D955CA76AEF9C14D8358518F66B34E9887A4AC100EE2845657645C9B496DF7630764D167D585E750C6743F25FA90
3,447,314 UART: [art] SIG.S = C0227A5159CDC6AB49329431889CA845198A504B66F04F4744CD423F7F9E1B55277745A13663262CC73C0FA8088215E1
3,471,105 UART: Caliptra RT
3,471,358 UART: [state] CFI Enabled
3,579,941 UART: [rt] RT listening for mailbox commands...
3,580,611 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,671 UART: [rt]cmd =0x44504543, len=24
3,636,930 >>> mbox cmd response data (40 bytes)
3,636,931 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,968 UART: [rt]cmd =0x44504543, len=96
3,706,984 >>> mbox cmd response data (56 bytes)
3,706,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,102 UART: [rt]cmd =0x44504543, len=96
3,776,851 >>> mbox cmd response data (56 bytes)
3,776,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,857 UART: [rt]cmd =0x44504543, len=96
3,847,642 >>> mbox cmd response data (56 bytes)
3,847,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,374 UART: [rt]cmd =0x44504543, len=96
3,918,807 >>> mbox cmd response data (56 bytes)
3,918,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,841 UART: [rt]cmd =0x44504543, len=96
3,989,492 >>> mbox cmd response data (56 bytes)
3,989,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,019,602 UART: [rt]cmd =0x44504543, len=96
4,061,821 >>> mbox cmd response data (56 bytes)
4,061,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,825 UART: [rt]cmd =0x44504543, len=96
4,134,008 >>> mbox cmd response data (56 bytes)
4,134,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,163,894 UART: [rt]cmd =0x44504543, len=96
4,206,589 >>> mbox cmd response data (56 bytes)
4,206,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,236,203 UART: [rt]cmd =0x44504543, len=96
4,279,212 >>> mbox cmd response data (56 bytes)
4,279,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,309,280 UART: [rt]cmd =0x44504543, len=96
4,352,169 >>> mbox cmd response data (56 bytes)
4,352,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,382,093 UART: [rt]cmd =0x44504543, len=96
4,424,640 >>> mbox cmd response data (56 bytes)
4,424,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,454,670 UART: [rt]cmd =0x44504543, len=96
4,498,307 >>> mbox cmd response data (56 bytes)
4,498,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,528,433 UART: [rt]cmd =0x44504543, len=96
4,572,100 >>> mbox cmd response data (56 bytes)
4,572,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,602,038 UART: [rt]cmd =0x44504543, len=96
4,645,861 >>> mbox cmd response data (56 bytes)
4,645,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,675,855 UART: [rt]cmd =0x44504543, len=96
4,683,179 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,507 ready_for_fw is high
1,362,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,576 >>> mbox cmd response: success
2,988,654 UART:
2,988,670 UART: Running Caliptra FMC ...
2,989,078 UART:
2,989,132 UART: [state] CFI Enabled
2,999,735 UART: [fht] FMC Alias Private Key: 7
3,108,196 UART: [art] Extend RT PCRs Done
3,108,624 UART: [art] Lock RT PCRs Done
3,110,286 UART: [art] Populate DV Done
3,118,847 UART: [fht] FMC Alias Private Key: 7
3,119,817 UART: [art] Derive CDI
3,120,097 UART: [art] Store in in slot 0x4
3,205,814 UART: [art] Derive Key Pair
3,206,174 UART: [art] Store priv key in slot 0x5
3,219,794 UART: [art] Derive Key Pair - Done
3,234,569 UART: [art] Signing Cert with AUTHO
3,235,049 UART: RITY.KEYID = 7
3,250,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,980 UART: [art] PUB.X = DBBD6AB60E8837DB351CB8170F7A1A48691F9AEF3E2F8ACEF31E0AF61B935F7A24D1ABAA004BA14ED73B0122E2870D34
3,257,735 UART: [art] PUB.Y = 2BB5B6C4BBB97814A8C63DB4A66B65BDBB25E1C3D613187BF0E9D155AF052512EDBFE90E951E63B395142DBC4BCBCA5A
3,264,703 UART: [art] SIG.R = AD132C2F46D1A2F0BECFB3211F15438F4823654E4A31E209BA1CFA63B2543E5C52DD15BE917333ADE03FDB5126E12D4E
3,271,484 UART: [art] SIG.S = F9C40F9F2E0A268922BF798F5015CCAACE8AAFEF2CFA4B735AA13BA00F36C7B5261C5D95259269CA0A8AD21B298ED54F
3,295,719 UART: Caliptra RT
3,295,972 UART: [state] CFI Enabled
3,405,328 UART: [rt] RT listening for mailbox commands...
3,405,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,682 UART: [rt]cmd =0x44504543, len=24
3,462,059 >>> mbox cmd response data (40 bytes)
3,462,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,097 UART: [rt]cmd =0x44504543, len=96
3,532,037 >>> mbox cmd response data (56 bytes)
3,532,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,562,301 UART: [rt]cmd =0x44504543, len=96
3,602,186 >>> mbox cmd response data (56 bytes)
3,602,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,196 UART: [rt]cmd =0x44504543, len=96
3,673,583 >>> mbox cmd response data (56 bytes)
3,673,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,659 UART: [rt]cmd =0x44504543, len=96
3,744,644 >>> mbox cmd response data (56 bytes)
3,744,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,702 UART: [rt]cmd =0x44504543, len=96
3,816,269 >>> mbox cmd response data (56 bytes)
3,816,270 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,846,181 UART: [rt]cmd =0x44504543, len=96
3,888,110 >>> mbox cmd response data (56 bytes)
3,888,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,010 UART: [rt]cmd =0x44504543, len=96
3,959,701 >>> mbox cmd response data (56 bytes)
3,959,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,539 UART: [rt]cmd =0x44504543, len=96
4,031,268 >>> mbox cmd response data (56 bytes)
4,031,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,061,112 UART: [rt]cmd =0x44504543, len=96
4,103,845 >>> mbox cmd response data (56 bytes)
4,103,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,133,669 UART: [rt]cmd =0x44504543, len=96
4,176,604 >>> mbox cmd response data (56 bytes)
4,176,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,206,508 UART: [rt]cmd =0x44504543, len=96
4,249,119 >>> mbox cmd response data (56 bytes)
4,249,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,278,907 UART: [rt]cmd =0x44504543, len=96
4,322,702 >>> mbox cmd response data (56 bytes)
4,322,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,352,560 UART: [rt]cmd =0x44504543, len=96
4,396,471 >>> mbox cmd response data (56 bytes)
4,396,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,426,403 UART: [rt]cmd =0x44504543, len=96
4,470,622 >>> mbox cmd response data (56 bytes)
4,470,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,500,702 UART: [rt]cmd =0x44504543, len=96
4,508,014 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
890,900 UART: [kat] SHA2-256
892,838 UART: [kat] SHA2-384
895,551 UART: [kat] SHA2-512-ACC
897,452 UART: [kat] ECC-384
902,729 UART: [kat] HMAC-384Kdf
907,289 UART: [kat] LMS
1,475,485 UART: [kat] --
1,476,112 UART: [cold-reset] ++
1,476,688 UART: [fht] Storing FHT @ 0x50003400
1,479,371 UART: [idev] ++
1,479,539 UART: [idev] CDI.KEYID = 6
1,479,899 UART: [idev] SUBJECT.KEYID = 7
1,480,323 UART: [idev] UDS.KEYID = 0
1,480,668 ready_for_fw is high
1,480,668 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,259 UART: [idev] Erasing UDS.KEYID = 0
1,505,033 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,735 UART: [idev] --
1,514,866 UART: [ldev] ++
1,515,034 UART: [ldev] CDI.KEYID = 6
1,515,397 UART: [ldev] SUBJECT.KEYID = 5
1,515,823 UART: [ldev] AUTHORITY.KEYID = 7
1,516,286 UART: [ldev] FE.KEYID = 1
1,521,348 UART: [ldev] Erasing FE.KEYID = 1
1,546,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,111 UART: [ldev] --
1,585,542 UART: [fwproc] Waiting for Commands...
1,586,405 UART: [fwproc] Received command 0x46574c44
1,587,196 UART: [fwproc] Received Image of size 114168 bytes
2,883,600 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,358 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,710 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,219 >>> mbox cmd response: success
3,076,473 UART: [afmc] ++
3,076,641 UART: [afmc] CDI.KEYID = 6
3,077,003 UART: [afmc] SUBJECT.KEYID = 7
3,077,428 UART: [afmc] AUTHORITY.KEYID = 5
3,112,563 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,707 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,435 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,320 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,010 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,735 UART: [afmc] --
3,155,819 UART: [cold-reset] --
3,156,617 UART: [state] Locking Datavault
3,157,740 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,344 UART: [state] Locking ICCM
3,158,778 UART: [exit] Launching FMC @ 0x40000130
3,164,107 UART:
3,164,123 UART: Running Caliptra FMC ...
3,164,531 UART:
3,164,674 UART: [state] CFI Enabled
3,175,287 UART: [fht] FMC Alias Private Key: 7
3,283,080 UART: [art] Extend RT PCRs Done
3,283,508 UART: [art] Lock RT PCRs Done
3,285,172 UART: [art] Populate DV Done
3,293,601 UART: [fht] FMC Alias Private Key: 7
3,294,543 UART: [art] Derive CDI
3,294,823 UART: [art] Store in in slot 0x4
3,380,458 UART: [art] Derive Key Pair
3,380,818 UART: [art] Store priv key in slot 0x5
3,394,080 UART: [art] Derive Key Pair - Done
3,409,065 UART: [art] Signing Cert with AUTHO
3,409,545 UART: RITY.KEYID = 7
3,425,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,816 UART: [art] PUB.X = F5041232B0AF61A00883E017A0D143C49BAC0680556B31C8AEF921FA2BEA9DDF78780847D032919AB99F9A2A96E08AB5
3,432,580 UART: [art] PUB.Y = BD56E2CA5A5DF0BA8724839A7DDFA348FBC5C5A3BF38E1D064892498034C3C373547100C735DE1459B856E8747A02D2C
3,439,530 UART: [art] SIG.R = F72066F20F9493E1E6D99C8B91E998CEA47F055CFE2FE38881447B35E337A5F2C00B3348B9CDC9AEA195C862C16AD1AD
3,446,303 UART: [art] SIG.S = 15223F6756485E6095C750B85DB04D875E985581F8E0C6D3F9FC8590935D2666FC06694E4A1B8420D4B8B5749594ED12
3,469,857 UART: Caliptra RT
3,470,202 UART: [state] CFI Enabled
3,579,351 UART: [rt] RT listening for mailbox commands...
3,580,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,847 UART: [rt]cmd =0x44504543, len=24
3,636,276 >>> mbox cmd response data (40 bytes)
3,636,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,170 UART: [rt]cmd =0x44504543, len=96
3,705,632 >>> mbox cmd response data (56 bytes)
3,705,633 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,735,478 UART: [rt]cmd =0x44504543, len=96
3,776,253 >>> mbox cmd response data (56 bytes)
3,776,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,157 UART: [rt]cmd =0x44504543, len=96
3,847,646 >>> mbox cmd response data (56 bytes)
3,847,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,538 UART: [rt]cmd =0x44504543, len=96
3,918,597 >>> mbox cmd response data (56 bytes)
3,918,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,381 UART: [rt]cmd =0x44504543, len=96
3,990,146 >>> mbox cmd response data (56 bytes)
3,990,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,346 UART: [rt]cmd =0x44504543, len=96
4,061,765 >>> mbox cmd response data (56 bytes)
4,061,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,785 UART: [rt]cmd =0x44504543, len=96
4,134,152 >>> mbox cmd response data (56 bytes)
4,134,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,084 UART: [rt]cmd =0x44504543, len=96
4,206,561 >>> mbox cmd response data (56 bytes)
4,206,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,236,611 UART: [rt]cmd =0x44504543, len=96
4,279,440 >>> mbox cmd response data (56 bytes)
4,279,441 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,309,192 UART: [rt]cmd =0x44504543, len=96
4,352,253 >>> mbox cmd response data (56 bytes)
4,352,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,382,235 UART: [rt]cmd =0x44504543, len=96
4,424,610 >>> mbox cmd response data (56 bytes)
4,424,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,454,416 UART: [rt]cmd =0x44504543, len=96
4,498,787 >>> mbox cmd response data (56 bytes)
4,498,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,528,785 UART: [rt]cmd =0x44504543, len=96
4,572,340 >>> mbox cmd response data (56 bytes)
4,572,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,602,298 UART: [rt]cmd =0x44504543, len=96
4,646,131 >>> mbox cmd response data (56 bytes)
4,646,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,676,049 UART: [rt]cmd =0x44504543, len=96
4,683,207 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,006 ready_for_fw is high
1,363,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,735 >>> mbox cmd response: success
2,989,449 UART:
2,989,465 UART: Running Caliptra FMC ...
2,989,873 UART:
2,990,016 UART: [state] CFI Enabled
3,000,667 UART: [fht] FMC Alias Private Key: 7
3,109,206 UART: [art] Extend RT PCRs Done
3,109,634 UART: [art] Lock RT PCRs Done
3,111,042 UART: [art] Populate DV Done
3,119,435 UART: [fht] FMC Alias Private Key: 7
3,120,525 UART: [art] Derive CDI
3,120,805 UART: [art] Store in in slot 0x4
3,206,548 UART: [art] Derive Key Pair
3,206,908 UART: [art] Store priv key in slot 0x5
3,220,124 UART: [art] Derive Key Pair - Done
3,235,153 UART: [art] Signing Cert with AUTHO
3,235,633 UART: RITY.KEYID = 7
3,250,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,508 UART: [art] PUB.X = 1CF94C3AC96D04E18DB8418C112BDBA0F9F072298B03BEE549BED9AA4D33F4F70ED53F4AD167938C35E0854A8D51CC6E
3,258,287 UART: [art] PUB.Y = FA6FDF7985B5DA97FBAC1ED0B35BD4EED93DBF6E133A90CF6D5DA79F8FAF1CFB5F5E6CA2899D6ACF5BD7CFD33C020F02
3,265,270 UART: [art] SIG.R = 500CE8FBF8AEB4265571FED8A0E9B66695B4A3F314F0073C3647ECD07F856A4F1046E121D064B9F1BB008B0A0B3EE580
3,272,016 UART: [art] SIG.S = DFAD02C212D128A35648C11DE4101FFF9DF479BF52DBEEE280C4B63F6A447EC2470E9E1ACE1D7D04A14E9DAAE46FAFB6
3,295,492 UART: Caliptra RT
3,295,837 UART: [state] CFI Enabled
3,403,704 UART: [rt] RT listening for mailbox commands...
3,404,374 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,284 UART: [rt]cmd =0x44504543, len=24
3,460,507 >>> mbox cmd response data (40 bytes)
3,460,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,527 UART: [rt]cmd =0x44504543, len=96
3,531,473 >>> mbox cmd response data (56 bytes)
3,531,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,393 UART: [rt]cmd =0x44504543, len=96
3,601,880 >>> mbox cmd response data (56 bytes)
3,601,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,712 UART: [rt]cmd =0x44504543, len=96
3,672,049 >>> mbox cmd response data (56 bytes)
3,672,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,863 UART: [rt]cmd =0x44504543, len=96
3,743,222 >>> mbox cmd response data (56 bytes)
3,743,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,178 UART: [rt]cmd =0x44504543, len=96
3,815,083 >>> mbox cmd response data (56 bytes)
3,815,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,845,001 UART: [rt]cmd =0x44504543, len=96
3,886,574 >>> mbox cmd response data (56 bytes)
3,886,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,666 UART: [rt]cmd =0x44504543, len=96
3,959,365 >>> mbox cmd response data (56 bytes)
3,959,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,989,081 UART: [rt]cmd =0x44504543, len=96
4,031,432 >>> mbox cmd response data (56 bytes)
4,031,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,061,302 UART: [rt]cmd =0x44504543, len=96
4,103,747 >>> mbox cmd response data (56 bytes)
4,103,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,133,819 UART: [rt]cmd =0x44504543, len=96
4,176,872 >>> mbox cmd response data (56 bytes)
4,176,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,206,740 UART: [rt]cmd =0x44504543, len=96
4,250,355 >>> mbox cmd response data (56 bytes)
4,250,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,280,285 UART: [rt]cmd =0x44504543, len=96
4,324,450 >>> mbox cmd response data (56 bytes)
4,324,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,354,156 UART: [rt]cmd =0x44504543, len=96
4,397,727 >>> mbox cmd response data (56 bytes)
4,397,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,427,697 UART: [rt]cmd =0x44504543, len=96
4,471,482 >>> mbox cmd response data (56 bytes)
4,471,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,501,278 UART: [rt]cmd =0x44504543, len=96
4,508,634 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,240 UART: [kat] SHA2-256
892,890 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,015 UART: [kat] ++
897,167 UART: [kat] sha1
901,527 UART: [kat] SHA2-256
903,467 UART: [kat] SHA2-384
906,204 UART: [kat] SHA2-512-ACC
908,105 UART: [kat] ECC-384
917,568 UART: [kat] HMAC-384Kdf
922,146 UART: [kat] LMS
1,170,474 UART: [kat] --
1,171,517 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,530 UART: [idev] ++
1,174,698 UART: [idev] CDI.KEYID = 6
1,175,058 UART: [idev] SUBJECT.KEYID = 7
1,175,482 UART: [idev] UDS.KEYID = 0
1,175,827 ready_for_fw is high
1,175,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,764 UART: [idev] Erasing UDS.KEYID = 0
1,201,045 UART: [idev] Sha1 KeyId Algorithm
1,209,461 UART: [idev] --
1,210,373 UART: [ldev] ++
1,210,541 UART: [ldev] CDI.KEYID = 6
1,210,904 UART: [ldev] SUBJECT.KEYID = 5
1,211,330 UART: [ldev] AUTHORITY.KEYID = 7
1,211,793 UART: [ldev] FE.KEYID = 1
1,217,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,575 UART: [ldev] --
1,283,014 UART: [fwproc] Wait for Commands...
1,283,600 UART: [fwproc] Recv command 0x46574c44
1,284,328 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,187 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,292 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,281 >>> mbox cmd response: success
2,774,453 UART: [afmc] ++
2,774,621 UART: [afmc] CDI.KEYID = 6
2,774,983 UART: [afmc] SUBJECT.KEYID = 7
2,775,408 UART: [afmc] AUTHORITY.KEYID = 5
2,810,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,924 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,652 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,537 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,256 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,092 UART: [afmc] --
2,854,006 UART: [cold-reset] --
2,854,884 UART: [state] Locking Datavault
2,856,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,835 UART: [state] Locking ICCM
2,857,257 UART: [exit] Launching FMC @ 0x40000130
2,862,586 UART:
2,862,602 UART: Running Caliptra FMC ...
2,863,010 UART:
2,863,064 UART: [state] CFI Enabled
2,873,471 UART: [fht] FMC Alias Private Key: 7
2,981,838 UART: [art] Extend RT PCRs Done
2,982,266 UART: [art] Lock RT PCRs Done
2,983,830 UART: [art] Populate DV Done
2,992,101 UART: [fht] FMC Alias Private Key: 7
2,993,239 UART: [art] Derive CDI
2,993,519 UART: [art] Store in in slot 0x4
3,078,956 UART: [art] Derive Key Pair
3,079,316 UART: [art] Store priv key in slot 0x5
3,092,144 UART: [art] Derive Key Pair - Done
3,106,960 UART: [art] Signing Cert with AUTHO
3,107,440 UART: RITY.KEYID = 7
3,123,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,905 UART: [art] PUB.X = 582BDE805FB80E912699D061658D6E51FAF6787BDD7875D68A1948666F9BE968B28769F4D53C58595F490295FE844983
3,130,661 UART: [art] PUB.Y = 6182469F0A605FC9DCDF8CEBD061F6B339C5EB3704F0049FEB6ED70BCE0DB4EFE5A468CE0A549978E772A35531586FDF
3,137,611 UART: [art] SIG.R = 10400C88C1B989F6745DBD54458235794B12CBD36A1BC250F1456DF2C45FE6D11E73982665055416FD36F8CF690B3391
3,144,366 UART: [art] SIG.S = D3DDC07A8C2BA16F309DCFAA79AAA8354D2A3630F21E9A449DFD7D7B85D050695D8DCDB61B16EE995503CB39A33BF2DA
3,167,394 UART: Caliptra RT
3,167,647 UART: [state] CFI Enabled
3,275,044 UART: [rt] RT listening for mailbox commands...
3,275,714 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,538 UART: [rt]cmd =0x44504543, len=24
3,331,567 >>> mbox cmd response data (40 bytes)
3,331,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,443 UART: [rt]cmd =0x44504543, len=96
3,401,515 >>> mbox cmd response data (56 bytes)
3,401,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,193 UART: [rt]cmd =0x44504543, len=96
3,472,838 >>> mbox cmd response data (56 bytes)
3,472,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,850 UART: [rt]cmd =0x44504543, len=96
3,543,879 >>> mbox cmd response data (56 bytes)
3,543,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,574,077 UART: [rt]cmd =0x44504543, len=96
3,614,488 >>> mbox cmd response data (56 bytes)
3,614,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,688 UART: [rt]cmd =0x44504543, len=96
3,685,483 >>> mbox cmd response data (56 bytes)
3,685,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,715,411 UART: [rt]cmd =0x44504543, len=96
3,756,608 >>> mbox cmd response data (56 bytes)
3,756,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,728 UART: [rt]cmd =0x44504543, len=96
3,828,149 >>> mbox cmd response data (56 bytes)
3,828,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,101 UART: [rt]cmd =0x44504543, len=96
3,900,286 >>> mbox cmd response data (56 bytes)
3,900,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,930,368 UART: [rt]cmd =0x44504543, len=96
3,973,165 >>> mbox cmd response data (56 bytes)
3,973,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,003,123 UART: [rt]cmd =0x44504543, len=96
4,045,602 >>> mbox cmd response data (56 bytes)
4,045,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,075,724 UART: [rt]cmd =0x44504543, len=96
4,118,985 >>> mbox cmd response data (56 bytes)
4,118,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,729 UART: [rt]cmd =0x44504543, len=96
4,192,106 >>> mbox cmd response data (56 bytes)
4,192,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,876 UART: [rt]cmd =0x44504543, len=96
4,265,629 >>> mbox cmd response data (56 bytes)
4,265,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,295,617 UART: [rt]cmd =0x44504543, len=96
4,338,936 >>> mbox cmd response data (56 bytes)
4,338,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,368,996 UART: [rt]cmd =0x44504543, len=96
4,376,466 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,751 ready_for_fw is high
1,059,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,640 >>> mbox cmd response: success
2,686,290 UART:
2,686,306 UART: Running Caliptra FMC ...
2,686,714 UART:
2,686,768 UART: [state] CFI Enabled
2,697,187 UART: [fht] FMC Alias Private Key: 7
2,804,806 UART: [art] Extend RT PCRs Done
2,805,234 UART: [art] Lock RT PCRs Done
2,806,662 UART: [art] Populate DV Done
2,814,811 UART: [fht] FMC Alias Private Key: 7
2,815,869 UART: [art] Derive CDI
2,816,149 UART: [art] Store in in slot 0x4
2,901,820 UART: [art] Derive Key Pair
2,902,180 UART: [art] Store priv key in slot 0x5
2,915,496 UART: [art] Derive Key Pair - Done
2,930,295 UART: [art] Signing Cert with AUTHO
2,930,775 UART: RITY.KEYID = 7
2,946,027 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,792 UART: [art] PUB.X = CF88095B7DD8EABA73268A1C373A0751AB6461A1076AB448EF449D0ED8828D57D7FC66473EE8BCE80CB751AA6612E35B
2,953,559 UART: [art] PUB.Y = D29F813E78E5244DA7197CC381EF0AC1E3A9CBDD37831B9050D25BA833481EE63E8593DC22D65724E7C8A5C1DE16ED9C
2,960,518 UART: [art] SIG.R = 2CEA58324B74731375B38FC76D09161B7CDB316ECEBC40E3509942A3773023AA2AF976F1D2AC072A8000640C849B26CD
2,967,259 UART: [art] SIG.S = 4285154FAF7F3CD727302DFB4C46A250CBD18C32D01CF9CAD849C250AB0C112AAD3EE8F906119103FC20F2514E716438
2,990,891 UART: Caliptra RT
2,991,144 UART: [state] CFI Enabled
3,099,435 UART: [rt] RT listening for mailbox commands...
3,100,105 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,051 UART: [rt]cmd =0x44504543, len=24
3,156,118 >>> mbox cmd response data (40 bytes)
3,156,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,186,188 UART: [rt]cmd =0x44504543, len=96
3,227,138 >>> mbox cmd response data (56 bytes)
3,227,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,174 UART: [rt]cmd =0x44504543, len=96
3,298,029 >>> mbox cmd response data (56 bytes)
3,298,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,961 UART: [rt]cmd =0x44504543, len=96
3,369,242 >>> mbox cmd response data (56 bytes)
3,369,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,182 UART: [rt]cmd =0x44504543, len=96
3,440,569 >>> mbox cmd response data (56 bytes)
3,440,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,603 UART: [rt]cmd =0x44504543, len=96
3,512,112 >>> mbox cmd response data (56 bytes)
3,512,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,542,234 UART: [rt]cmd =0x44504543, len=96
3,583,159 >>> mbox cmd response data (56 bytes)
3,583,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,049 UART: [rt]cmd =0x44504543, len=96
3,655,574 >>> mbox cmd response data (56 bytes)
3,655,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,685,710 UART: [rt]cmd =0x44504543, len=96
3,727,697 >>> mbox cmd response data (56 bytes)
3,727,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,617 UART: [rt]cmd =0x44504543, len=96
3,799,900 >>> mbox cmd response data (56 bytes)
3,799,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,829,870 UART: [rt]cmd =0x44504543, len=96
3,872,579 >>> mbox cmd response data (56 bytes)
3,872,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,902,297 UART: [rt]cmd =0x44504543, len=96
3,945,624 >>> mbox cmd response data (56 bytes)
3,945,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,975,650 UART: [rt]cmd =0x44504543, len=96
4,018,837 >>> mbox cmd response data (56 bytes)
4,018,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,048,757 UART: [rt]cmd =0x44504543, len=96
4,091,824 >>> mbox cmd response data (56 bytes)
4,091,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,121,940 UART: [rt]cmd =0x44504543, len=96
4,165,701 >>> mbox cmd response data (56 bytes)
4,165,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,195,701 UART: [rt]cmd =0x44504543, len=96
4,203,221 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,419 UART: [kat] HMAC-384Kdf
923,009 UART: [kat] LMS
1,171,337 UART: [kat] --
1,172,128 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,491 UART: [idev] ++
1,175,659 UART: [idev] CDI.KEYID = 6
1,176,019 UART: [idev] SUBJECT.KEYID = 7
1,176,443 UART: [idev] UDS.KEYID = 0
1,176,788 ready_for_fw is high
1,176,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,271 UART: [idev] Erasing UDS.KEYID = 0
1,201,634 UART: [idev] Sha1 KeyId Algorithm
1,210,312 UART: [idev] --
1,211,392 UART: [ldev] ++
1,211,560 UART: [ldev] CDI.KEYID = 6
1,211,923 UART: [ldev] SUBJECT.KEYID = 5
1,212,349 UART: [ldev] AUTHORITY.KEYID = 7
1,212,812 UART: [ldev] FE.KEYID = 1
1,218,196 UART: [ldev] Erasing FE.KEYID = 1
1,244,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,402 UART: [ldev] --
1,283,901 UART: [fwproc] Wait for Commands...
1,284,509 UART: [fwproc] Recv command 0x46574c44
1,285,237 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,945 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,748 >>> mbox cmd response: success
2,774,812 UART: [afmc] ++
2,774,980 UART: [afmc] CDI.KEYID = 6
2,775,342 UART: [afmc] SUBJECT.KEYID = 7
2,775,767 UART: [afmc] AUTHORITY.KEYID = 5
2,811,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,726 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,445 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,221 UART: [afmc] --
2,855,201 UART: [cold-reset] --
2,856,103 UART: [state] Locking Datavault
2,857,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,802 UART: [state] Locking ICCM
2,858,340 UART: [exit] Launching FMC @ 0x40000130
2,863,669 UART:
2,863,685 UART: Running Caliptra FMC ...
2,864,093 UART:
2,864,236 UART: [state] CFI Enabled
2,874,837 UART: [fht] FMC Alias Private Key: 7
2,982,410 UART: [art] Extend RT PCRs Done
2,982,838 UART: [art] Lock RT PCRs Done
2,984,118 UART: [art] Populate DV Done
2,992,257 UART: [fht] FMC Alias Private Key: 7
2,993,229 UART: [art] Derive CDI
2,993,509 UART: [art] Store in in slot 0x4
3,078,760 UART: [art] Derive Key Pair
3,079,120 UART: [art] Store priv key in slot 0x5
3,092,500 UART: [art] Derive Key Pair - Done
3,107,449 UART: [art] Signing Cert with AUTHO
3,107,929 UART: RITY.KEYID = 7
3,123,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,014 UART: [art] PUB.X = 69DC1A85D0C7861FEA3356DF90D191D5B32BE0DE59592C20AB8774D4978777BB798CD96C79102CB3CA6D5E3A7340A74F
3,130,792 UART: [art] PUB.Y = 8DBF4FAFBF036B4E6BE90289B1421874EF2A1C37F91E8DE1283C8753F80F64D23A88C9BA2A50DC280F8D91DABCBAC48C
3,137,752 UART: [art] SIG.R = F6D9A0ED6721D307797B1167BFF64DEFE57CD98CEEB6D1467418BFDD15D391DCF04A61EB9295DCA9C2D5561A7E0F58A9
3,144,536 UART: [art] SIG.S = BCF3665EF5F8207C49BDCC5B4400C42A2D43BBAA5EE9980C102CAAF63117C1D66C67E7EB57E2CABDD5A7277B1A36216A
3,168,394 UART: Caliptra RT
3,168,739 UART: [state] CFI Enabled
3,276,441 UART: [rt] RT listening for mailbox commands...
3,277,111 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,183 UART: [rt]cmd =0x44504543, len=24
3,333,570 >>> mbox cmd response data (40 bytes)
3,333,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,500 UART: [rt]cmd =0x44504543, len=96
3,404,552 >>> mbox cmd response data (56 bytes)
3,404,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,404 UART: [rt]cmd =0x44504543, len=96
3,474,831 >>> mbox cmd response data (56 bytes)
3,474,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,847 UART: [rt]cmd =0x44504543, len=96
3,546,008 >>> mbox cmd response data (56 bytes)
3,546,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,910 UART: [rt]cmd =0x44504543, len=96
3,617,065 >>> mbox cmd response data (56 bytes)
3,617,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,647,073 UART: [rt]cmd =0x44504543, len=96
3,688,138 >>> mbox cmd response data (56 bytes)
3,688,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,718,228 UART: [rt]cmd =0x44504543, len=96
3,760,091 >>> mbox cmd response data (56 bytes)
3,760,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,790,145 UART: [rt]cmd =0x44504543, len=96
3,832,944 >>> mbox cmd response data (56 bytes)
3,832,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,862,850 UART: [rt]cmd =0x44504543, len=96
3,905,787 >>> mbox cmd response data (56 bytes)
3,905,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,785 UART: [rt]cmd =0x44504543, len=96
3,979,290 >>> mbox cmd response data (56 bytes)
3,979,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,009,266 UART: [rt]cmd =0x44504543, len=96
4,052,311 >>> mbox cmd response data (56 bytes)
4,052,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,295 UART: [rt]cmd =0x44504543, len=96
4,126,166 >>> mbox cmd response data (56 bytes)
4,126,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,156,232 UART: [rt]cmd =0x44504543, len=96
4,200,317 >>> mbox cmd response data (56 bytes)
4,200,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,230,413 UART: [rt]cmd =0x44504543, len=96
4,273,810 >>> mbox cmd response data (56 bytes)
4,273,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,303,902 UART: [rt]cmd =0x44504543, len=96
4,347,637 >>> mbox cmd response data (56 bytes)
4,347,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,377,545 UART: [rt]cmd =0x44504543, len=96
4,384,301 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,792 ready_for_fw is high
1,060,792 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,207 >>> mbox cmd response: success
2,688,575 UART:
2,688,591 UART: Running Caliptra FMC ...
2,688,999 UART:
2,689,142 UART: [state] CFI Enabled
2,699,871 UART: [fht] FMC Alias Private Key: 7
2,807,722 UART: [art] Extend RT PCRs Done
2,808,150 UART: [art] Lock RT PCRs Done
2,809,426 UART: [art] Populate DV Done
2,817,395 UART: [fht] FMC Alias Private Key: 7
2,818,555 UART: [art] Derive CDI
2,818,835 UART: [art] Store in in slot 0x4
2,904,528 UART: [art] Derive Key Pair
2,904,888 UART: [art] Store priv key in slot 0x5
2,918,372 UART: [art] Derive Key Pair - Done
2,933,159 UART: [art] Signing Cert with AUTHO
2,933,639 UART: RITY.KEYID = 7
2,948,951 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,716 UART: [art] PUB.X = 45E52110E7FB40A0281055D7A0CF761E32C070003E63852FB8983245E56444A2FA2E7EC9B0701D0502A56FD545AD3ADC
2,956,458 UART: [art] PUB.Y = C8917CBB5043838CBE92B13B49E35EC05216D3A43E91386DFCFB1D20A0D54F78D49C8934E0995D94BC6B7AE86324A4B5
2,963,416 UART: [art] SIG.R = 0F29F91E59C0F7ED0D900D85A75F35C1547B30A97EF2FBF6E39CE58E6AE6F7CB1F89E83B3A7553A64FDE443A94039673
2,970,186 UART: [art] SIG.S = 583B5477C6F197CC5E0F320FA49D279DFE7A5A89755286E5F68F7312D599348198892B4499F0D42728C234780EDED408
2,994,093 UART: Caliptra RT
2,994,438 UART: [state] CFI Enabled
3,102,355 UART: [rt] RT listening for mailbox commands...
3,103,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,919 UART: [rt]cmd =0x44504543, len=24
3,159,600 >>> mbox cmd response data (40 bytes)
3,159,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,544 UART: [rt]cmd =0x44504543, len=96
3,229,994 >>> mbox cmd response data (56 bytes)
3,229,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,054 UART: [rt]cmd =0x44504543, len=96
3,301,061 >>> mbox cmd response data (56 bytes)
3,301,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,330,823 UART: [rt]cmd =0x44504543, len=96
3,372,010 >>> mbox cmd response data (56 bytes)
3,372,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,936 UART: [rt]cmd =0x44504543, len=96
3,443,021 >>> mbox cmd response data (56 bytes)
3,443,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,651 UART: [rt]cmd =0x44504543, len=96
3,513,760 >>> mbox cmd response data (56 bytes)
3,513,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,543,790 UART: [rt]cmd =0x44504543, len=96
3,586,589 >>> mbox cmd response data (56 bytes)
3,586,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,293 UART: [rt]cmd =0x44504543, len=96
3,658,428 >>> mbox cmd response data (56 bytes)
3,658,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,656 UART: [rt]cmd =0x44504543, len=96
3,730,557 >>> mbox cmd response data (56 bytes)
3,730,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,445 UART: [rt]cmd =0x44504543, len=96
3,803,344 >>> mbox cmd response data (56 bytes)
3,803,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,182 UART: [rt]cmd =0x44504543, len=96
3,875,585 >>> mbox cmd response data (56 bytes)
3,875,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,727 UART: [rt]cmd =0x44504543, len=96
3,948,650 >>> mbox cmd response data (56 bytes)
3,948,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,978,546 UART: [rt]cmd =0x44504543, len=96
4,021,481 >>> mbox cmd response data (56 bytes)
4,021,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,051,525 UART: [rt]cmd =0x44504543, len=96
4,095,394 >>> mbox cmd response data (56 bytes)
4,095,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,125,290 UART: [rt]cmd =0x44504543, len=96
4,169,865 >>> mbox cmd response data (56 bytes)
4,169,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,199,775 UART: [rt]cmd =0x44504543, len=96
4,206,819 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,083 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,067 UART: [kat] ++
895,219 UART: [kat] sha1
899,545 UART: [kat] SHA2-256
901,485 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,832 UART: [kat] HMAC-384Kdf
920,498 UART: [kat] LMS
1,168,810 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,709 UART: [idev] ++
1,172,877 UART: [idev] CDI.KEYID = 6
1,173,238 UART: [idev] SUBJECT.KEYID = 7
1,173,663 UART: [idev] UDS.KEYID = 0
1,174,009 ready_for_fw is high
1,174,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,198,857 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,208,892 UART: [ldev] ++
1,209,060 UART: [ldev] CDI.KEYID = 6
1,209,424 UART: [ldev] SUBJECT.KEYID = 5
1,209,851 UART: [ldev] AUTHORITY.KEYID = 7
1,210,314 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,241,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,096 UART: [ldev] --
1,281,474 UART: [fwproc] Wait for Commands...
1,282,165 UART: [fwproc] Recv command 0x46574c44
1,282,898 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,753 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,365 >>> mbox cmd response: success
2,771,506 UART: [afmc] ++
2,771,674 UART: [afmc] CDI.KEYID = 6
2,772,037 UART: [afmc] SUBJECT.KEYID = 7
2,772,463 UART: [afmc] AUTHORITY.KEYID = 5
2,808,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,320 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,071 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,800 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,683 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,402 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,091 UART: [afmc] --
2,851,199 UART: [cold-reset] --
2,851,829 UART: [state] Locking Datavault
2,852,950 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,554 UART: [state] Locking ICCM
2,854,190 UART: [exit] Launching FMC @ 0x40000130
2,859,519 UART:
2,859,535 UART: Running Caliptra FMC ...
2,859,943 UART:
2,859,997 UART: [state] CFI Enabled
2,870,568 UART: [fht] FMC Alias Private Key: 7
2,978,571 UART: [art] Extend RT PCRs Done
2,978,999 UART: [art] Lock RT PCRs Done
2,980,601 UART: [art] Populate DV Done
2,988,870 UART: [fht] FMC Alias Private Key: 7
2,989,838 UART: [art] Derive CDI
2,990,118 UART: [art] Store in in slot 0x4
3,075,933 UART: [art] Derive Key Pair
3,076,293 UART: [art] Store priv key in slot 0x5
3,089,465 UART: [art] Derive Key Pair - Done
3,104,216 UART: [art] Signing Cert with AUTHO
3,104,696 UART: RITY.KEYID = 7
3,119,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,223 UART: [art] PUB.X = EA9AA8940B99CFA7EF9A4E568503E19FD299D9CD0888C72948D9B896438AF53614C6AE12C5A435D96BFB45ABAB05A4C1
3,126,995 UART: [art] PUB.Y = 976BC6938D0F4FA2A5A127B26A14F3D3AB2FAA5D89ADD17FCAAC9B073726A04D09E147660BC8EBB5CE162213FE23633A
3,133,951 UART: [art] SIG.R = 3F5FA8C82815C3D1A37463411C3E04837B8FF23617FBDBAC0AD20CECB6029C605E1E0B360D0A61F8D24A9C509E1664A2
3,140,710 UART: [art] SIG.S = EA5EB0CCE0079595195DF0165DECD86AD6F7CD9F867F077F913CC688BD61CF8A7580BA1F024F794C974B97100A833923
3,164,877 UART: Caliptra RT
3,165,130 UART: [state] CFI Enabled
3,272,647 UART: [rt] RT listening for mailbox commands...
3,273,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,487 UART: [rt]cmd =0x44504543, len=24
3,329,298 >>> mbox cmd response data (40 bytes)
3,329,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,120 UART: [rt]cmd =0x44504543, len=96
3,399,564 >>> mbox cmd response data (56 bytes)
3,399,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,584 UART: [rt]cmd =0x44504543, len=96
3,469,867 >>> mbox cmd response data (56 bytes)
3,469,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,889 UART: [rt]cmd =0x44504543, len=96
3,541,030 >>> mbox cmd response data (56 bytes)
3,541,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,722 UART: [rt]cmd =0x44504543, len=96
3,611,817 >>> mbox cmd response data (56 bytes)
3,611,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,631 UART: [rt]cmd =0x44504543, len=96
3,682,286 >>> mbox cmd response data (56 bytes)
3,682,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,102 UART: [rt]cmd =0x44504543, len=96
3,753,749 >>> mbox cmd response data (56 bytes)
3,753,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,783,803 UART: [rt]cmd =0x44504543, len=96
3,826,142 >>> mbox cmd response data (56 bytes)
3,826,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,014 UART: [rt]cmd =0x44504543, len=96
3,898,889 >>> mbox cmd response data (56 bytes)
3,898,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,928,917 UART: [rt]cmd =0x44504543, len=96
3,971,004 >>> mbox cmd response data (56 bytes)
3,971,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,000,928 UART: [rt]cmd =0x44504543, len=96
4,043,299 >>> mbox cmd response data (56 bytes)
4,043,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,321 UART: [rt]cmd =0x44504543, len=96
4,116,890 >>> mbox cmd response data (56 bytes)
4,116,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,852 UART: [rt]cmd =0x44504543, len=96
4,189,871 >>> mbox cmd response data (56 bytes)
4,189,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,219,873 UART: [rt]cmd =0x44504543, len=96
4,264,014 >>> mbox cmd response data (56 bytes)
4,264,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,294,084 UART: [rt]cmd =0x44504543, len=96
4,338,453 >>> mbox cmd response data (56 bytes)
4,338,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,368,507 UART: [rt]cmd =0x44504543, len=96
4,375,667 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,852 ready_for_fw is high
1,055,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,429 >>> mbox cmd response: success
2,682,569 UART:
2,682,585 UART: Running Caliptra FMC ...
2,682,993 UART:
2,683,047 UART: [state] CFI Enabled
2,693,342 UART: [fht] FMC Alias Private Key: 7
2,801,443 UART: [art] Extend RT PCRs Done
2,801,871 UART: [art] Lock RT PCRs Done
2,803,479 UART: [art] Populate DV Done
2,811,736 UART: [fht] FMC Alias Private Key: 7
2,812,706 UART: [art] Derive CDI
2,812,986 UART: [art] Store in in slot 0x4
2,899,181 UART: [art] Derive Key Pair
2,899,541 UART: [art] Store priv key in slot 0x5
2,912,665 UART: [art] Derive Key Pair - Done
2,927,898 UART: [art] Signing Cert with AUTHO
2,928,378 UART: RITY.KEYID = 7
2,943,288 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,053 UART: [art] PUB.X = 25FBD3C155EE3012A0FF8FF5C842318EA3B8B864690F122C140136422C8569994ACC49954505B0A80AE309111FFCBBCE
2,950,812 UART: [art] PUB.Y = D568035BDE5699C907740A210A1DCA9F42DDC373E0E3EFD847BF42F06A69D41FB79D301662274273F95DAEB2C541D567
2,957,756 UART: [art] SIG.R = 8CEF9B98704EF2AEA8FD2C514E49DEB8195B339920968F96259990F08D6C8AFF8D08BF8DB0FCB7CDDE89E024ADE11ACE
2,964,547 UART: [art] SIG.S = 6E22C37FF7C6F4F77170C2E93EB93E5274D86DA1B64880B1E1D2E2CECD9EF9FB6354708A7949D62BE863A9B0E3EADAB0
2,988,564 UART: Caliptra RT
2,988,817 UART: [state] CFI Enabled
3,097,126 UART: [rt] RT listening for mailbox commands...
3,097,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,798 UART: [rt]cmd =0x44504543, len=24
3,153,623 >>> mbox cmd response data (40 bytes)
3,153,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,799 UART: [rt]cmd =0x44504543, len=96
3,223,855 >>> mbox cmd response data (56 bytes)
3,223,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,253,761 UART: [rt]cmd =0x44504543, len=96
3,294,030 >>> mbox cmd response data (56 bytes)
3,294,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,752 UART: [rt]cmd =0x44504543, len=96
3,365,227 >>> mbox cmd response data (56 bytes)
3,365,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,157 UART: [rt]cmd =0x44504543, len=96
3,435,592 >>> mbox cmd response data (56 bytes)
3,435,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,306 UART: [rt]cmd =0x44504543, len=96
3,506,287 >>> mbox cmd response data (56 bytes)
3,506,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,181 UART: [rt]cmd =0x44504543, len=96
3,578,680 >>> mbox cmd response data (56 bytes)
3,578,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,624 UART: [rt]cmd =0x44504543, len=96
3,651,395 >>> mbox cmd response data (56 bytes)
3,651,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,681,289 UART: [rt]cmd =0x44504543, len=96
3,723,818 >>> mbox cmd response data (56 bytes)
3,723,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,724 UART: [rt]cmd =0x44504543, len=96
3,796,019 >>> mbox cmd response data (56 bytes)
3,796,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,039 UART: [rt]cmd =0x44504543, len=96
3,869,010 >>> mbox cmd response data (56 bytes)
3,869,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,898,850 UART: [rt]cmd =0x44504543, len=96
3,941,237 >>> mbox cmd response data (56 bytes)
3,941,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,083 UART: [rt]cmd =0x44504543, len=96
4,014,338 >>> mbox cmd response data (56 bytes)
4,014,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,044,136 UART: [rt]cmd =0x44504543, len=96
4,087,213 >>> mbox cmd response data (56 bytes)
4,087,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,117,155 UART: [rt]cmd =0x44504543, len=96
4,160,936 >>> mbox cmd response data (56 bytes)
4,160,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,190,736 UART: [rt]cmd =0x44504543, len=96
4,197,524 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,468 UART: [cold-reset] ++
1,170,958 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 ready_for_fw is high
1,174,916 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,822 UART: [idev] Erasing UDS.KEYID = 0
1,200,100 UART: [idev] Sha1 KeyId Algorithm
1,209,098 UART: [idev] --
1,210,111 UART: [ldev] ++
1,210,279 UART: [ldev] CDI.KEYID = 6
1,210,643 UART: [ldev] SUBJECT.KEYID = 5
1,211,070 UART: [ldev] AUTHORITY.KEYID = 7
1,211,533 UART: [ldev] FE.KEYID = 1
1,216,733 UART: [ldev] Erasing FE.KEYID = 1
1,243,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,103 UART: [fwproc] Wait for Commands...
1,282,724 UART: [fwproc] Recv command 0x46574c44
1,283,457 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,594 >>> mbox cmd response: success
2,771,665 UART: [afmc] ++
2,771,833 UART: [afmc] CDI.KEYID = 6
2,772,196 UART: [afmc] SUBJECT.KEYID = 7
2,772,622 UART: [afmc] AUTHORITY.KEYID = 5
2,808,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,928 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,657 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,540 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,259 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,054 UART: [afmc] --
2,851,996 UART: [cold-reset] --
2,852,836 UART: [state] Locking Datavault
2,853,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,551 UART: [state] Locking ICCM
2,854,975 UART: [exit] Launching FMC @ 0x40000130
2,860,304 UART:
2,860,320 UART: Running Caliptra FMC ...
2,860,728 UART:
2,860,871 UART: [state] CFI Enabled
2,871,664 UART: [fht] FMC Alias Private Key: 7
2,980,453 UART: [art] Extend RT PCRs Done
2,980,881 UART: [art] Lock RT PCRs Done
2,982,521 UART: [art] Populate DV Done
2,990,334 UART: [fht] FMC Alias Private Key: 7
2,991,286 UART: [art] Derive CDI
2,991,566 UART: [art] Store in in slot 0x4
3,077,623 UART: [art] Derive Key Pair
3,077,983 UART: [art] Store priv key in slot 0x5
3,091,191 UART: [art] Derive Key Pair - Done
3,105,547 UART: [art] Signing Cert with AUTHO
3,106,027 UART: RITY.KEYID = 7
3,120,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,756 UART: [art] PUB.X = 5961C9CB3D8D3057D46BAFBDFF7B95FD4271B74E19E1C6C6BF6F65E4B126EA8EC7F97942D8924420E2DCAEF5805161BE
3,128,544 UART: [art] PUB.Y = DE7409B2AE7CEF06E7985761C554A18E7EC1D210DECB1A8B97238C55888D09522CC81DA6D8599DB7917CB8FE0A87B48C
3,135,494 UART: [art] SIG.R = 3D195EF0F3237A005D2B4101C528969FE113FA4AA47A74F9CE6B64ABA928389CB8B498C15650225F4AFAF8816E9DAA5C
3,142,249 UART: [art] SIG.S = 8C2F10E2DED2A7F963BC56B095110AB70570BE11B38AE2B3CBDDACE2833B48314F3F8DDBBD00EE6580023D40F6777985
3,166,537 UART: Caliptra RT
3,166,882 UART: [state] CFI Enabled
3,274,761 UART: [rt] RT listening for mailbox commands...
3,275,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,483 UART: [rt]cmd =0x44504543, len=24
3,331,852 >>> mbox cmd response data (40 bytes)
3,331,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,672 UART: [rt]cmd =0x44504543, len=96
3,401,900 >>> mbox cmd response data (56 bytes)
3,401,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,890 UART: [rt]cmd =0x44504543, len=96
3,472,397 >>> mbox cmd response data (56 bytes)
3,472,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,329 UART: [rt]cmd =0x44504543, len=96
3,542,608 >>> mbox cmd response data (56 bytes)
3,542,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,654 UART: [rt]cmd =0x44504543, len=96
3,613,459 >>> mbox cmd response data (56 bytes)
3,613,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,327 UART: [rt]cmd =0x44504543, len=96
3,684,676 >>> mbox cmd response data (56 bytes)
3,684,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,834 UART: [rt]cmd =0x44504543, len=96
3,756,509 >>> mbox cmd response data (56 bytes)
3,756,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,703 UART: [rt]cmd =0x44504543, len=96
3,828,302 >>> mbox cmd response data (56 bytes)
3,828,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,858,308 UART: [rt]cmd =0x44504543, len=96
3,899,879 >>> mbox cmd response data (56 bytes)
3,899,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,929,639 UART: [rt]cmd =0x44504543, len=96
3,972,386 >>> mbox cmd response data (56 bytes)
3,972,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,002,222 UART: [rt]cmd =0x44504543, len=96
4,045,339 >>> mbox cmd response data (56 bytes)
4,045,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,075,471 UART: [rt]cmd =0x44504543, len=96
4,118,616 >>> mbox cmd response data (56 bytes)
4,118,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,148,662 UART: [rt]cmd =0x44504543, len=96
4,192,773 >>> mbox cmd response data (56 bytes)
4,192,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,222,639 UART: [rt]cmd =0x44504543, len=96
4,266,886 >>> mbox cmd response data (56 bytes)
4,266,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,296,934 UART: [rt]cmd =0x44504543, len=96
4,341,021 >>> mbox cmd response data (56 bytes)
4,341,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,370,781 UART: [rt]cmd =0x44504543, len=96
4,378,295 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,971 ready_for_fw is high
1,056,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,088 >>> mbox cmd response: success
2,684,516 UART:
2,684,532 UART: Running Caliptra FMC ...
2,684,940 UART:
2,685,083 UART: [state] CFI Enabled
2,695,718 UART: [fht] FMC Alias Private Key: 7
2,803,111 UART: [art] Extend RT PCRs Done
2,803,539 UART: [art] Lock RT PCRs Done
2,805,431 UART: [art] Populate DV Done
2,813,630 UART: [fht] FMC Alias Private Key: 7
2,814,776 UART: [art] Derive CDI
2,815,056 UART: [art] Store in in slot 0x4
2,900,629 UART: [art] Derive Key Pair
2,900,989 UART: [art] Store priv key in slot 0x5
2,913,551 UART: [art] Derive Key Pair - Done
2,928,232 UART: [art] Signing Cert with AUTHO
2,928,712 UART: RITY.KEYID = 7
2,943,964 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,729 UART: [art] PUB.X = A45BCC3B76B34AFC5D3EC7643232957741F4491D88C77CFB1E79B5956279C080529394AD804C0F965BC307F82506132F
2,951,486 UART: [art] PUB.Y = D87A1649DAE90F9721CA1BB3FC56ECE379FE541CEF6A0682042A18109A741E52B9AB799A370CDCC55657C5312D4A392A
2,958,434 UART: [art] SIG.R = D737661F59E2CBFF7013EF7661E85767DC9E2C6AF37A89269CB4C1E5D278BA6C890FD037F5E53ABD5916EB79CE830A37
2,965,210 UART: [art] SIG.S = 5C8BEF44C8921AB6C895DC6EE92E567FC286A59F4D9BBDB6DA5781D8247EC0C869790852998498BCCB5FA8796B5975E4
2,988,932 UART: Caliptra RT
2,989,277 UART: [state] CFI Enabled
3,096,470 UART: [rt] RT listening for mailbox commands...
3,097,140 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,928 UART: [rt]cmd =0x44504543, len=24
3,152,977 >>> mbox cmd response data (40 bytes)
3,152,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,933 UART: [rt]cmd =0x44504543, len=96
3,222,645 >>> mbox cmd response data (56 bytes)
3,222,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,252,623 UART: [rt]cmd =0x44504543, len=96
3,293,406 >>> mbox cmd response data (56 bytes)
3,293,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,323,394 UART: [rt]cmd =0x44504543, len=96
3,364,611 >>> mbox cmd response data (56 bytes)
3,364,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,394,653 UART: [rt]cmd =0x44504543, len=96
3,435,126 >>> mbox cmd response data (56 bytes)
3,435,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,264 UART: [rt]cmd =0x44504543, len=96
3,507,159 >>> mbox cmd response data (56 bytes)
3,507,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,097 UART: [rt]cmd =0x44504543, len=96
3,579,328 >>> mbox cmd response data (56 bytes)
3,579,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,376 UART: [rt]cmd =0x44504543, len=96
3,652,069 >>> mbox cmd response data (56 bytes)
3,652,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,147 UART: [rt]cmd =0x44504543, len=96
3,724,654 >>> mbox cmd response data (56 bytes)
3,724,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,570 UART: [rt]cmd =0x44504543, len=96
3,797,605 >>> mbox cmd response data (56 bytes)
3,797,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,263 UART: [rt]cmd =0x44504543, len=96
3,869,984 >>> mbox cmd response data (56 bytes)
3,869,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,899,824 UART: [rt]cmd =0x44504543, len=96
3,942,639 >>> mbox cmd response data (56 bytes)
3,942,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,972,655 UART: [rt]cmd =0x44504543, len=96
4,016,296 >>> mbox cmd response data (56 bytes)
4,016,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,318 UART: [rt]cmd =0x44504543, len=96
4,090,273 >>> mbox cmd response data (56 bytes)
4,090,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,120,481 UART: [rt]cmd =0x44504543, len=96
4,164,638 >>> mbox cmd response data (56 bytes)
4,164,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,194,744 UART: [rt]cmd =0x44504543, len=96
4,201,832 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,212 UART:
192,566 UART: Running Caliptra ROM ...
193,649 UART:
193,788 UART: [state] CFI Enabled
260,670 UART: [state] LifecycleState = Unprovisioned
262,613 UART: [state] DebugLocked = No
265,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,269 UART: [kat] SHA2-256
439,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,444 UART: [kat] ++
450,881 UART: [kat] sha1
461,850 UART: [kat] SHA2-256
464,546 UART: [kat] SHA2-384
470,041 UART: [kat] SHA2-512-ACC
472,409 UART: [kat] ECC-384
2,766,574 UART: [kat] HMAC-384Kdf
2,798,478 UART: [kat] LMS
3,988,769 UART: [kat] --
3,991,787 UART: [cold-reset] ++
3,993,578 UART: [fht] Storing FHT @ 0x50003400
4,004,624 UART: [idev] ++
4,005,201 UART: [idev] CDI.KEYID = 6
4,006,085 UART: [idev] SUBJECT.KEYID = 7
4,007,333 UART: [idev] UDS.KEYID = 0
4,008,362 ready_for_fw is high
4,008,556 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,151,746 UART: [idev] Erasing UDS.KEYID = 0
7,345,112 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,804 UART: [idev] --
7,369,497 UART: [ldev] ++
7,370,115 UART: [ldev] CDI.KEYID = 6
7,371,073 UART: [ldev] SUBJECT.KEYID = 5
7,372,279 UART: [ldev] AUTHORITY.KEYID = 7
7,373,506 UART: [ldev] FE.KEYID = 1
7,418,338 UART: [ldev] Erasing FE.KEYID = 1
10,752,747 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,113 UART: [ldev] --
13,132,183 UART: [fwproc] Waiting for Commands...
13,133,891 UART: [fwproc] Received command 0x46574c44
13,136,119 UART: [fwproc] Received Image of size 113844 bytes
17,184,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,259,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,328,619 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,644,650 >>> mbox cmd response: success
17,648,725 UART: [afmc] ++
17,649,317 UART: [afmc] CDI.KEYID = 6
17,650,227 UART: [afmc] SUBJECT.KEYID = 7
17,651,438 UART: [afmc] AUTHORITY.KEYID = 5
21,022,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,320,096 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,322,363 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,336,770 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,351,605 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,366,026 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,388,320 UART: [afmc] --
23,392,129 UART: [cold-reset] --
23,396,252 UART: [state] Locking Datavault
23,401,058 UART: [state] Locking PCR0, PCR1 and PCR31
23,402,811 UART: [state] Locking ICCM
23,404,358 UART: [exit] Launching FMC @ 0x40000130
23,412,753 UART:
23,412,980 UART: Running Caliptra FMC ...
23,414,075 UART:
23,414,232 UART: [state] CFI Enabled
23,481,572 UART: [fht] FMC Alias Private Key: 7
25,819,967 UART: [art] Extend RT PCRs Done
25,821,198 UART: [art] Lock RT PCRs Done
25,822,925 UART: [art] Populate DV Done
25,828,331 UART: [fht] FMC Alias Private Key: 7
25,830,022 UART: [art] Derive CDI
25,830,831 UART: [art] Store in in slot 0x4
25,890,187 UART: [art] Derive Key Pair
25,891,180 UART: [art] Store priv key in slot 0x5
29,184,255 UART: [art] Derive Key Pair - Done
29,197,415 UART: [art] Signing Cert with AUTHO
29,198,720 UART: RITY.KEYID = 7
31,486,325 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,845 UART: [art] PUB.X = 66204627A2068BE53597D1B992F0232ED99C32A0398E1CD797C99189C89737AE26FD1D480656D746181B08E38C3019F8
31,495,050 UART: [art] PUB.Y = 6059FA6417AAC9EE71C553D1F9C7C01F2B58B7D129CE3D925E31916E2C76DF55C239CACED939F28745EBFEBE49816951
31,502,324 UART: [art] SIG.R = 9F93B35F3DE52C418254D13BDB2890962C4C04509D2A47F85C748963A4FAE4209C75A54B1C6D8B76B030ECDA0FCD9E43
31,509,684 UART: [art] SIG.S = 3874EFE82BA507D504640110864F13DD8BAFC7A2BDCC28EDF2F2FB07DEF40D0104D3213E3121BFADBE4BDA623456059E
32,815,376 UART: Caliptra RT
32,816,089 UART: [state] CFI Enabled
32,976,404 UART: [rt] RT listening for mailbox commands...
32,978,323 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,008,807 UART: [rt]cmd =0x44504543, len=24
33,051,118 >>> mbox cmd response data (40 bytes)
33,051,961 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,081,982 UART: [rt]cmd =0x44504543, len=24
33,114,998 >>> mbox cmd response data (40 bytes)
33,115,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,145,522 UART: [rt]cmd =0x44504543, len=24
33,179,124 >>> mbox cmd response data (40 bytes)
33,179,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,209,687 UART: [rt]cmd =0x44504543, len=24
33,243,119 >>> mbox cmd response data (40 bytes)
33,243,730 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,273,832 UART: [rt]cmd =0x44504543, len=24
33,307,141 >>> mbox cmd response data (40 bytes)
33,307,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,337,784 UART: [rt]cmd =0x44504543, len=24
33,371,132 >>> mbox cmd response data (40 bytes)
33,371,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,401,646 UART: [rt]cmd =0x44504543, len=24
33,435,352 >>> mbox cmd response data (40 bytes)
33,436,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,465,968 UART: [rt]cmd =0x44504543, len=24
33,499,288 >>> mbox cmd response data (40 bytes)
33,499,943 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,529,684 UART: [rt]cmd =0x44504543, len=24
33,563,593 >>> mbox cmd response data (40 bytes)
33,564,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,594,169 UART: [rt]cmd =0x44504543, len=24
33,627,492 >>> mbox cmd response data (40 bytes)
33,628,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,658,277 UART: [rt]cmd =0x44504543, len=24
33,691,736 >>> mbox cmd response data (40 bytes)
33,692,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,722,357 UART: [rt]cmd =0x44504543, len=24
33,755,576 >>> mbox cmd response data (40 bytes)
33,756,216 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,785,899 UART: [rt]cmd =0x44504543, len=24
33,819,442 >>> mbox cmd response data (40 bytes)
33,820,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,850,051 UART: [rt]cmd =0x44504543, len=24
33,883,258 >>> mbox cmd response data (40 bytes)
33,883,863 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,913,771 UART: [rt]cmd =0x44504543, len=24
33,947,504 >>> mbox cmd response data (40 bytes)
33,948,130 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,978,099 UART: [rt]cmd =0x44504543, len=24
33,984,966 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,806,794 ready_for_fw is high
3,807,182 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,884,419 >>> mbox cmd response: success
23,567,445 UART:
23,567,923 UART: Running Caliptra FMC ...
23,569,026 UART:
23,569,181 UART: [state] CFI Enabled
23,638,805 UART: [fht] FMC Alias Private Key: 7
25,976,487 UART: [art] Extend RT PCRs Done
25,977,715 UART: [art] Lock RT PCRs Done
25,979,262 UART: [art] Populate DV Done
25,984,725 UART: [fht] FMC Alias Private Key: 7
25,986,421 UART: [art] Derive CDI
25,987,155 UART: [art] Store in in slot 0x4
26,047,839 UART: [art] Derive Key Pair
26,048,885 UART: [art] Store priv key in slot 0x5
29,341,860 UART: [art] Derive Key Pair - Done
29,354,644 UART: [art] Signing Cert with AUTHO
29,355,947 UART: RITY.KEYID = 7
31,643,124 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,628 UART: [art] PUB.X = 43334E5E5CBCD9D65DB9E58F3B35CD78BB6966E3FFCDF2AD718DAB0ED9E2643D43B83FD58FD520AEBF38968A2A200E97
31,651,887 UART: [art] PUB.Y = C92C6A257BBFE6D21FDFB86A93FB9E3ABA70A7953E211A7DA3C2BCF87480ABA8D392190EFC086411E1F5D2178FD0D2A4
31,659,153 UART: [art] SIG.R = BDC28209E9B2C213FACADDDDD4BA0D734C01E95E64B2A1CB19D46A533AD571252C3168D3781D6A16889176D9F8F5EAF2
31,666,556 UART: [art] SIG.S = ADB3AA7EF734CA6E4B78323BA647E2CD9A87D56285607AE01E866BEBF176203C0E67E6D48F79E684F7F4649EE91E6159
32,972,685 UART: Caliptra RT
32,973,380 UART: [state] CFI Enabled
33,133,558 UART: [rt] RT listening for mailbox commands...
33,135,990 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,166,461 UART: [rt]cmd =0x44504543, len=24
33,207,250 >>> mbox cmd response data (40 bytes)
33,208,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,238,125 UART: [rt]cmd =0x44504543, len=24
33,271,266 >>> mbox cmd response data (40 bytes)
33,271,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,301,603 UART: [rt]cmd =0x44504543, len=24
33,335,559 >>> mbox cmd response data (40 bytes)
33,336,189 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,366,090 UART: [rt]cmd =0x44504543, len=24
33,399,726 >>> mbox cmd response data (40 bytes)
33,400,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,430,347 UART: [rt]cmd =0x44504543, len=24
33,463,508 >>> mbox cmd response data (40 bytes)
33,464,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,494,175 UART: [rt]cmd =0x44504543, len=24
33,527,485 >>> mbox cmd response data (40 bytes)
33,528,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,558,077 UART: [rt]cmd =0x44504543, len=24
33,591,539 >>> mbox cmd response data (40 bytes)
33,592,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,622,074 UART: [rt]cmd =0x44504543, len=24
33,655,694 >>> mbox cmd response data (40 bytes)
33,656,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,686,210 UART: [rt]cmd =0x44504543, len=24
33,719,700 >>> mbox cmd response data (40 bytes)
33,720,346 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,750,196 UART: [rt]cmd =0x44504543, len=24
33,783,629 >>> mbox cmd response data (40 bytes)
33,784,280 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,814,077 UART: [rt]cmd =0x44504543, len=24
33,847,879 >>> mbox cmd response data (40 bytes)
33,848,492 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,878,349 UART: [rt]cmd =0x44504543, len=24
33,911,715 >>> mbox cmd response data (40 bytes)
33,912,335 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,942,353 UART: [rt]cmd =0x44504543, len=24
33,975,872 >>> mbox cmd response data (40 bytes)
33,976,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,006,490 UART: [rt]cmd =0x44504543, len=24
34,039,769 >>> mbox cmd response data (40 bytes)
34,040,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,070,322 UART: [rt]cmd =0x44504543, len=24
34,103,933 >>> mbox cmd response data (40 bytes)
34,104,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,134,647 UART: [rt]cmd =0x44504543, len=24
34,141,103 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,332 UART:
192,700 UART: Running Caliptra ROM ...
193,796 UART:
603,508 UART: [state] CFI Enabled
619,889 UART: [state] LifecycleState = Unprovisioned
621,857 UART: [state] DebugLocked = No
624,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,972 UART: [kat] SHA2-256
798,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,279 UART: [kat] ++
809,727 UART: [kat] sha1
821,449 UART: [kat] SHA2-256
824,178 UART: [kat] SHA2-384
830,808 UART: [kat] SHA2-512-ACC
833,173 UART: [kat] ECC-384
3,115,651 UART: [kat] HMAC-384Kdf
3,125,878 UART: [kat] LMS
4,316,036 UART: [kat] --
4,318,690 UART: [cold-reset] ++
4,320,624 UART: [fht] Storing FHT @ 0x50003400
4,332,315 UART: [idev] ++
4,332,873 UART: [idev] CDI.KEYID = 6
4,333,756 UART: [idev] SUBJECT.KEYID = 7
4,335,092 UART: [idev] UDS.KEYID = 0
4,336,089 ready_for_fw is high
4,336,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,340 UART: [idev] Erasing UDS.KEYID = 0
7,623,901 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,633 UART: [idev] --
7,649,975 UART: [ldev] ++
7,650,582 UART: [ldev] CDI.KEYID = 6
7,651,470 UART: [ldev] SUBJECT.KEYID = 5
7,652,686 UART: [ldev] AUTHORITY.KEYID = 7
7,653,972 UART: [ldev] FE.KEYID = 1
7,665,618 UART: [ldev] Erasing FE.KEYID = 1
10,956,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,101 UART: [ldev] --
13,319,208 UART: [fwproc] Waiting for Commands...
13,320,979 UART: [fwproc] Received command 0x46574c44
13,323,211 UART: [fwproc] Received Image of size 113844 bytes
17,372,764 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,444 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,834,390 >>> mbox cmd response: success
17,838,974 UART: [afmc] ++
17,839,570 UART: [afmc] CDI.KEYID = 6
17,840,593 UART: [afmc] SUBJECT.KEYID = 7
17,841,754 UART: [afmc] AUTHORITY.KEYID = 5
21,155,202 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,451,580 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,885 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,468,290 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,099 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,497,575 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,591 UART: [afmc] --
23,522,241 UART: [cold-reset] --
23,525,509 UART: [state] Locking Datavault
23,529,582 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,338 UART: [state] Locking ICCM
23,532,897 UART: [exit] Launching FMC @ 0x40000130
23,541,290 UART:
23,541,525 UART: Running Caliptra FMC ...
23,542,627 UART:
23,542,789 UART: [state] CFI Enabled
23,550,776 UART: [fht] FMC Alias Private Key: 7
25,881,533 UART: [art] Extend RT PCRs Done
25,882,754 UART: [art] Lock RT PCRs Done
25,884,242 UART: [art] Populate DV Done
25,889,820 UART: [fht] FMC Alias Private Key: 7
25,891,372 UART: [art] Derive CDI
25,892,143 UART: [art] Store in in slot 0x4
25,934,683 UART: [art] Derive Key Pair
25,935,693 UART: [art] Store priv key in slot 0x5
29,178,127 UART: [art] Derive Key Pair - Done
29,191,451 UART: [art] Signing Cert with AUTHO
29,192,759 UART: RITY.KEYID = 7
31,472,019 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,533 UART: [art] PUB.X = C4F8F003F348122E571DA31B05E7D9368E0FCC955A7921012152300994AE2D1DC27E67ABAC995F72C7B63975F55A4565
31,480,793 UART: [art] PUB.Y = F7CA618E1159A5D0C3D91D1073883D1F11274E43923E9EFDBABCBE80762624109F7DA54AC5DCB81E59501E4929F1A8F0
31,488,022 UART: [art] SIG.R = DC974759F6E1FD18386DFB7041D9CE374AF2E55A3C00BFC9ED433E89581E0AA4592ED0434B1A2C90E63BB2E01A22719F
31,495,393 UART: [art] SIG.S = 71D7DA522D1F5407597CC1160DE112C67C0E84B666195088AFAAE8221100A3BCF8DDB42EB5F25E1A541ECE28739472AF
32,800,965 UART: Caliptra RT
32,801,678 UART: [state] CFI Enabled
32,917,786 UART: [rt] RT listening for mailbox commands...
32,919,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
32,950,119 UART: [rt]cmd =0x44504543, len=24
32,976,669 >>> mbox cmd response data (40 bytes)
32,977,520 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,007,325 UART: [rt]cmd =0x44504543, len=24
33,033,389 >>> mbox cmd response data (40 bytes)
33,034,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,064,158 UART: [rt]cmd =0x44504543, len=24
33,090,086 >>> mbox cmd response data (40 bytes)
33,090,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,120,824 UART: [rt]cmd =0x44504543, len=24
33,146,594 >>> mbox cmd response data (40 bytes)
33,147,211 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,177,178 UART: [rt]cmd =0x44504543, len=24
33,203,774 >>> mbox cmd response data (40 bytes)
33,204,420 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,234,481 UART: [rt]cmd =0x44504543, len=24
33,260,362 >>> mbox cmd response data (40 bytes)
33,261,019 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,290,861 UART: [rt]cmd =0x44504543, len=24
33,316,886 >>> mbox cmd response data (40 bytes)
33,317,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,347,140 UART: [rt]cmd =0x44504543, len=24
33,373,737 >>> mbox cmd response data (40 bytes)
33,374,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,404,322 UART: [rt]cmd =0x44504543, len=24
33,430,631 >>> mbox cmd response data (40 bytes)
33,431,284 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,461,179 UART: [rt]cmd =0x44504543, len=24
33,487,379 >>> mbox cmd response data (40 bytes)
33,488,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,517,792 UART: [rt]cmd =0x44504543, len=24
33,544,362 >>> mbox cmd response data (40 bytes)
33,544,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,574,881 UART: [rt]cmd =0x44504543, len=24
33,600,888 >>> mbox cmd response data (40 bytes)
33,601,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,631,514 UART: [rt]cmd =0x44504543, len=24
33,658,042 >>> mbox cmd response data (40 bytes)
33,658,691 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,688,803 UART: [rt]cmd =0x44504543, len=24
33,715,042 >>> mbox cmd response data (40 bytes)
33,715,653 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,745,672 UART: [rt]cmd =0x44504543, len=24
33,772,104 >>> mbox cmd response data (40 bytes)
33,772,723 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,802,561 UART: [rt]cmd =0x44504543, len=24
33,809,209 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,125,875 ready_for_fw is high
4,126,274 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,050,592 >>> mbox cmd response: success
23,689,589 UART:
23,689,970 UART: Running Caliptra FMC ...
23,691,115 UART:
23,691,276 UART: [state] CFI Enabled
23,699,282 UART: [fht] FMC Alias Private Key: 7
26,029,668 UART: [art] Extend RT PCRs Done
26,030,900 UART: [art] Lock RT PCRs Done
26,032,910 UART: [art] Populate DV Done
26,038,322 UART: [fht] FMC Alias Private Key: 7
26,040,025 UART: [art] Derive CDI
26,040,847 UART: [art] Store in in slot 0x4
26,083,237 UART: [art] Derive Key Pair
26,084,275 UART: [art] Store priv key in slot 0x5
29,326,158 UART: [art] Derive Key Pair - Done
29,339,065 UART: [art] Signing Cert with AUTHO
29,340,375 UART: RITY.KEYID = 7
31,619,690 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,189 UART: [art] PUB.X = B8381A64445B1D4F783AFF6E006AC66B09DB78A2121DD08B99ABB8BFAEB4A10247DBB1215E0AD79C390AB338373B45BF
31,628,438 UART: [art] PUB.Y = 03D2B1C3C23856FADA900267EA413DC8B79F99D6285796F903E3F0F2F65919135C8928F82D7952D6A8ADE43DFE9660C4
31,635,691 UART: [art] SIG.R = D702B0664A07CDDDE7AFE9723B89500EE4438DC36AD858641F599DC49982827E2E0B5FC7265491780DAE7B52D32285B8
31,643,106 UART: [art] SIG.S = 1F652E5D3389E112FC2AB6CAE07E3B9A75098321F61EC9A4A04FAB62A2F6D3FC99F06FB59D3EDA60913610E1D1F79967
32,948,580 UART: Caliptra RT
32,949,296 UART: [state] CFI Enabled
33,067,452 UART: [rt] RT listening for mailbox commands...
33,069,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,099,893 UART: [rt]cmd =0x44504543, len=24
33,126,388 >>> mbox cmd response data (40 bytes)
33,127,174 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,157,248 UART: [rt]cmd =0x44504543, len=24
33,183,670 >>> mbox cmd response data (40 bytes)
33,184,319 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,214,127 UART: [rt]cmd =0x44504543, len=24
33,240,404 >>> mbox cmd response data (40 bytes)
33,241,037 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,270,882 UART: [rt]cmd =0x44504543, len=24
33,297,504 >>> mbox cmd response data (40 bytes)
33,298,175 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,328,077 UART: [rt]cmd =0x44504543, len=24
33,354,268 >>> mbox cmd response data (40 bytes)
33,354,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,384,747 UART: [rt]cmd =0x44504543, len=24
33,411,130 >>> mbox cmd response data (40 bytes)
33,411,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,441,458 UART: [rt]cmd =0x44504543, len=24
33,467,465 >>> mbox cmd response data (40 bytes)
33,468,088 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,498,006 UART: [rt]cmd =0x44504543, len=24
33,524,207 >>> mbox cmd response data (40 bytes)
33,524,854 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,554,818 UART: [rt]cmd =0x44504543, len=24
33,581,163 >>> mbox cmd response data (40 bytes)
33,581,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,611,632 UART: [rt]cmd =0x44504543, len=24
33,637,631 >>> mbox cmd response data (40 bytes)
33,638,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,668,217 UART: [rt]cmd =0x44504543, len=24
33,694,626 >>> mbox cmd response data (40 bytes)
33,695,296 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,725,142 UART: [rt]cmd =0x44504543, len=24
33,751,106 >>> mbox cmd response data (40 bytes)
33,751,714 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,781,573 UART: [rt]cmd =0x44504543, len=24
33,807,754 >>> mbox cmd response data (40 bytes)
33,808,378 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,838,180 UART: [rt]cmd =0x44504543, len=24
33,864,612 >>> mbox cmd response data (40 bytes)
33,865,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,895,024 UART: [rt]cmd =0x44504543, len=24
33,920,737 >>> mbox cmd response data (40 bytes)
33,921,380 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,951,388 UART: [rt]cmd =0x44504543, len=24
33,957,899 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,032 UART:
192,405 UART: Running Caliptra ROM ...
193,547 UART:
193,712 UART: [state] CFI Enabled
263,296 UART: [state] LifecycleState = Unprovisioned
265,208 UART: [state] DebugLocked = No
267,736 UART: [state] WD Timer not started. Device not locked for debugging
270,781 UART: [kat] SHA2-256
449,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,500 UART: [kat] ++
461,953 UART: [kat] sha1
472,325 UART: [kat] SHA2-256
475,338 UART: [kat] SHA2-384
480,843 UART: [kat] SHA2-512-ACC
483,856 UART: [kat] ECC-384
2,947,680 UART: [kat] HMAC-384Kdf
2,972,995 UART: [kat] LMS
3,502,485 UART: [kat] --
3,507,265 UART: [cold-reset] ++
3,509,788 UART: [fht] FHT @ 0x50003400
3,520,211 UART: [idev] ++
3,520,775 UART: [idev] CDI.KEYID = 6
3,521,703 UART: [idev] SUBJECT.KEYID = 7
3,522,877 UART: [idev] UDS.KEYID = 0
3,523,801 ready_for_fw is high
3,524,020 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,715 UART: [idev] Erasing UDS.KEYID = 0
6,027,538 UART: [idev] Sha1 KeyId Algorithm
6,051,226 UART: [idev] --
6,054,885 UART: [ldev] ++
6,055,470 UART: [ldev] CDI.KEYID = 6
6,056,359 UART: [ldev] SUBJECT.KEYID = 5
6,057,462 UART: [ldev] AUTHORITY.KEYID = 7
6,058,809 UART: [ldev] FE.KEYID = 1
6,100,217 UART: [ldev] Erasing FE.KEYID = 1
8,603,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,700 UART: [ldev] --
10,414,500 UART: [fwproc] Wait for Commands...
10,416,699 UART: [fwproc] Recv command 0x46574c44
10,418,794 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,262 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,063 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,277,714 >>> mbox cmd response: success
14,282,367 UART: [afmc] ++
14,282,969 UART: [afmc] CDI.KEYID = 6
14,283,848 UART: [afmc] SUBJECT.KEYID = 7
14,284,969 UART: [afmc] AUTHORITY.KEYID = 5
16,829,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,598 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,797 UART: [afmc] --
18,627,956 UART: [cold-reset] --
18,631,921 UART: [state] Locking Datavault
18,638,680 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,327 UART: [state] Locking ICCM
18,642,723 UART: [exit] Launching FMC @ 0x40000130
18,651,117 UART:
18,651,356 UART: Running Caliptra FMC ...
18,652,382 UART:
18,652,549 UART: [state] CFI Enabled
18,710,366 UART: [fht] FMC Alias Private Key: 7
20,474,369 UART: [art] Extend RT PCRs Done
20,475,590 UART: [art] Lock RT PCRs Done
20,477,084 UART: [art] Populate DV Done
20,482,715 UART: [fht] FMC Alias Private Key: 7
20,484,360 UART: [art] Derive CDI
20,485,093 UART: [art] Store in in slot 0x4
20,543,047 UART: [art] Derive Key Pair
20,544,090 UART: [art] Store priv key in slot 0x5
23,007,136 UART: [art] Derive Key Pair - Done
23,020,244 UART: [art] Signing Cert with AUTHO
23,021,545 UART: RITY.KEYID = 7
24,733,223 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,005 UART: [art] PUB.X = E0F6D111C107352241810098C5CEA86C1E122B3A605EFD6FFA786B9C436924ABC12AC627FAE6BC4EC2F51585647ADBBE
24,741,932 UART: [art] PUB.Y = DE0353B500BBB4A476166E9FBB5009F34136E272A42B883842B60DBD0FC949A5CC126EECE99125AA6D1A0BF0D1B07597
24,749,245 UART: [art] SIG.R = 8DA72F7A7ECE866D34DBDDE88B85E071E12AF3B7BD3772A5117B9EA9416FAAC75B437702BFBDE690AFF255FF09A01D9C
24,756,658 UART: [art] SIG.S = 093058E6AA877C44B3BF2DC5E26E6FC6D7475F06E51B78A63F329BE1D7164116018635B36581EB9CFB631C0C175FBF8C
25,734,992 UART: Caliptra RT
25,735,714 UART: [state] CFI Enabled
25,901,955 UART: [rt] RT listening for mailbox commands...
25,903,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,934,775 UART: [rt]cmd =0x44504543, len=24
25,975,629 >>> mbox cmd response data (40 bytes)
25,976,529 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,006,387 UART: [rt]cmd =0x44504543, len=24
26,040,217 >>> mbox cmd response data (40 bytes)
26,040,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,070,861 UART: [rt]cmd =0x44504543, len=24
26,103,925 >>> mbox cmd response data (40 bytes)
26,104,544 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,134,254 UART: [rt]cmd =0x44504543, len=24
26,167,809 >>> mbox cmd response data (40 bytes)
26,168,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,198,373 UART: [rt]cmd =0x44504543, len=24
26,232,164 >>> mbox cmd response data (40 bytes)
26,232,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,262,693 UART: [rt]cmd =0x44504543, len=24
26,296,247 >>> mbox cmd response data (40 bytes)
26,296,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,326,597 UART: [rt]cmd =0x44504543, len=24
26,360,254 >>> mbox cmd response data (40 bytes)
26,360,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,390,744 UART: [rt]cmd =0x44504543, len=24
26,424,547 >>> mbox cmd response data (40 bytes)
26,425,155 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,455,017 UART: [rt]cmd =0x44504543, len=24
26,488,377 >>> mbox cmd response data (40 bytes)
26,489,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,518,935 UART: [rt]cmd =0x44504543, len=24
26,552,541 >>> mbox cmd response data (40 bytes)
26,553,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,583,384 UART: [rt]cmd =0x44504543, len=24
26,617,711 >>> mbox cmd response data (40 bytes)
26,618,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,648,419 UART: [rt]cmd =0x44504543, len=24
26,682,031 >>> mbox cmd response data (40 bytes)
26,682,705 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,712,549 UART: [rt]cmd =0x44504543, len=24
26,746,406 >>> mbox cmd response data (40 bytes)
26,747,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,776,980 UART: [rt]cmd =0x44504543, len=24
26,810,338 >>> mbox cmd response data (40 bytes)
26,810,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,841,102 UART: [rt]cmd =0x44504543, len=24
26,874,445 >>> mbox cmd response data (40 bytes)
26,875,065 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,905,070 UART: [rt]cmd =0x44504543, len=24
26,911,158 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,382,602 ready_for_fw is high
3,383,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,071,029 >>> mbox cmd response: success
18,364,824 UART:
18,365,251 UART: Running Caliptra FMC ...
18,366,448 UART:
18,366,624 UART: [state] CFI Enabled
18,431,976 UART: [fht] FMC Alias Private Key: 7
20,195,748 UART: [art] Extend RT PCRs Done
20,196,948 UART: [art] Lock RT PCRs Done
20,198,572 UART: [art] Populate DV Done
20,203,977 UART: [fht] FMC Alias Private Key: 7
20,205,516 UART: [art] Derive CDI
20,206,333 UART: [art] Store in in slot 0x4
20,264,737 UART: [art] Derive Key Pair
20,265,767 UART: [art] Store priv key in slot 0x5
22,728,394 UART: [art] Derive Key Pair - Done
22,741,290 UART: [art] Signing Cert with AUTHO
22,742,593 UART: RITY.KEYID = 7
24,454,906 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,411 UART: [art] PUB.X = 858D6D89BC9F9EB59DB4C05C2359DC5E2388EF40C81F1D1B5BD649ACDA48EB574CB291B395D050B5209FD15B92F1BD26
24,463,647 UART: [art] PUB.Y = 7E590648700898ADB405636EC7360F96E3070F40BC7431B90330569C7E509DCD04A533B47D6E7286162F2E86C9B2C757
24,470,892 UART: [art] SIG.R = 2FFBE88E2DD39C14129379918F7CD1B9A93E7F127E4B4AB7C06D7263611B8687AB0757986EB16525F4245082E0CA3F46
24,478,278 UART: [art] SIG.S = 8A345DF1A3DEF80545FBB0FE80BF3DF8186D8D10646B022599BAF761B3B6ED8D301E31ED6522E6F497EED8FDBC6F0848
25,456,946 UART: Caliptra RT
25,457,668 UART: [state] CFI Enabled
25,622,897 UART: [rt] RT listening for mailbox commands...
25,624,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,655,421 UART: [rt]cmd =0x44504543, len=24
25,698,550 >>> mbox cmd response data (40 bytes)
25,699,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,729,594 UART: [rt]cmd =0x44504543, len=24
25,762,757 >>> mbox cmd response data (40 bytes)
25,763,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,793,417 UART: [rt]cmd =0x44504543, len=24
25,827,207 >>> mbox cmd response data (40 bytes)
25,827,863 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,858,000 UART: [rt]cmd =0x44504543, len=24
25,891,111 >>> mbox cmd response data (40 bytes)
25,891,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,921,648 UART: [rt]cmd =0x44504543, len=24
25,955,412 >>> mbox cmd response data (40 bytes)
25,956,071 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,986,196 UART: [rt]cmd =0x44504543, len=24
26,019,312 >>> mbox cmd response data (40 bytes)
26,019,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,049,606 UART: [rt]cmd =0x44504543, len=24
26,082,823 >>> mbox cmd response data (40 bytes)
26,083,435 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,113,295 UART: [rt]cmd =0x44504543, len=24
26,147,191 >>> mbox cmd response data (40 bytes)
26,147,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,177,641 UART: [rt]cmd =0x44504543, len=24
26,211,320 >>> mbox cmd response data (40 bytes)
26,211,953 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,241,956 UART: [rt]cmd =0x44504543, len=24
26,275,336 >>> mbox cmd response data (40 bytes)
26,275,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,305,844 UART: [rt]cmd =0x44504543, len=24
26,339,125 >>> mbox cmd response data (40 bytes)
26,339,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,369,851 UART: [rt]cmd =0x44504543, len=24
26,403,596 >>> mbox cmd response data (40 bytes)
26,404,205 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,433,842 UART: [rt]cmd =0x44504543, len=24
26,467,465 >>> mbox cmd response data (40 bytes)
26,468,082 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,497,946 UART: [rt]cmd =0x44504543, len=24
26,531,689 >>> mbox cmd response data (40 bytes)
26,532,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,562,202 UART: [rt]cmd =0x44504543, len=24
26,595,696 >>> mbox cmd response data (40 bytes)
26,596,347 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,626,027 UART: [rt]cmd =0x44504543, len=24
26,632,708 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,885 writing to cptra_bootfsm_go
194,139 UART:
194,493 UART: Running Caliptra ROM ...
195,675 UART:
605,393 UART: [state] CFI Enabled
618,130 UART: [state] LifecycleState = Unprovisioned
619,989 UART: [state] DebugLocked = No
622,155 UART: [state] WD Timer not started. Device not locked for debugging
625,696 UART: [kat] SHA2-256
804,765 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,373 UART: [kat] ++
816,930 UART: [kat] sha1
829,017 UART: [kat] SHA2-256
832,029 UART: [kat] SHA2-384
838,090 UART: [kat] SHA2-512-ACC
841,100 UART: [kat] ECC-384
3,284,760 UART: [kat] HMAC-384Kdf
3,298,554 UART: [kat] LMS
3,827,980 UART: [kat] --
3,831,406 UART: [cold-reset] ++
3,833,410 UART: [fht] FHT @ 0x50003400
3,843,486 UART: [idev] ++
3,844,086 UART: [idev] CDI.KEYID = 6
3,845,009 UART: [idev] SUBJECT.KEYID = 7
3,846,192 UART: [idev] UDS.KEYID = 0
3,847,112 ready_for_fw is high
3,847,308 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,593 UART: [idev] Erasing UDS.KEYID = 0
6,316,864 UART: [idev] Sha1 KeyId Algorithm
6,340,347 UART: [idev] --
6,344,092 UART: [ldev] ++
6,344,668 UART: [ldev] CDI.KEYID = 6
6,345,579 UART: [ldev] SUBJECT.KEYID = 5
6,346,736 UART: [ldev] AUTHORITY.KEYID = 7
6,348,020 UART: [ldev] FE.KEYID = 1
6,358,345 UART: [ldev] Erasing FE.KEYID = 1
8,833,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,417 UART: [ldev] --
10,620,491 UART: [fwproc] Wait for Commands...
10,623,249 UART: [fwproc] Recv command 0x46574c44
10,625,344 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,488,299 >>> mbox cmd response: success
14,492,554 UART: [afmc] ++
14,493,147 UART: [afmc] CDI.KEYID = 6
14,494,059 UART: [afmc] SUBJECT.KEYID = 7
14,495,221 UART: [afmc] AUTHORITY.KEYID = 5
16,997,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,136 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,797 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,124 UART: [afmc] --
18,796,985 UART: [cold-reset] --
18,800,250 UART: [state] Locking Datavault
18,803,277 UART: [state] Locking PCR0, PCR1 and PCR31
18,804,968 UART: [state] Locking ICCM
18,806,456 UART: [exit] Launching FMC @ 0x40000130
18,814,847 UART:
18,815,081 UART: Running Caliptra FMC ...
18,816,108 UART:
18,816,255 UART: [state] CFI Enabled
18,824,138 UART: [fht] FMC Alias Private Key: 7
20,581,360 UART: [art] Extend RT PCRs Done
20,582,580 UART: [art] Lock RT PCRs Done
20,584,282 UART: [art] Populate DV Done
20,589,536 UART: [fht] FMC Alias Private Key: 7
20,591,184 UART: [art] Derive CDI
20,592,020 UART: [art] Store in in slot 0x4
20,634,523 UART: [art] Derive Key Pair
20,635,522 UART: [art] Store priv key in slot 0x5
23,062,546 UART: [art] Derive Key Pair - Done
23,075,267 UART: [art] Signing Cert with AUTHO
23,076,562 UART: RITY.KEYID = 7
24,782,255 UART: [art] Erasing AUTHORITY.KEYID = 7
24,783,755 UART: [art] PUB.X = B2234CD57AA715C19776F93FEC262B242A57F0B1FA46A33820DCB8E20AF0A51F96F589BF8939498BABDC1C83CD6852BC
24,791,010 UART: [art] PUB.Y = 798D1066713F0DA6D4B925ECDB98C06D70E359BBE5900DE108F78A9969AF7343CBBEBF55ECD7F93F41099A6AC7BAB0DE
24,798,357 UART: [art] SIG.R = 6BA95BC20FB81D18457816368A90417BE12A261BD773A28486BA01F8E35B3667B5E5C2CA8E3E9F912AB077CED7E9ED45
24,805,751 UART: [art] SIG.S = 7022999D0F99A889C9A10E37A633309982A36A2C297F44C8ABF5EEE0585B7B12F851B34889EC9C1B985E5B6D9974F536
25,784,687 UART: Caliptra RT
25,785,396 UART: [state] CFI Enabled
25,902,672 UART: [rt] RT listening for mailbox commands...
25,904,584 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,935,063 UART: [rt]cmd =0x44504543, len=24
25,962,052 >>> mbox cmd response data (40 bytes)
25,962,884 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,992,792 UART: [rt]cmd =0x44504543, len=24
26,018,674 >>> mbox cmd response data (40 bytes)
26,019,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,049,365 UART: [rt]cmd =0x44504543, len=24
26,075,831 >>> mbox cmd response data (40 bytes)
26,076,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,106,314 UART: [rt]cmd =0x44504543, len=24
26,132,646 >>> mbox cmd response data (40 bytes)
26,133,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,163,130 UART: [rt]cmd =0x44504543, len=24
26,189,297 >>> mbox cmd response data (40 bytes)
26,189,919 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,219,659 UART: [rt]cmd =0x44504543, len=24
26,245,183 >>> mbox cmd response data (40 bytes)
26,245,856 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,275,762 UART: [rt]cmd =0x44504543, len=24
26,302,160 >>> mbox cmd response data (40 bytes)
26,302,762 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,332,565 UART: [rt]cmd =0x44504543, len=24
26,358,572 >>> mbox cmd response data (40 bytes)
26,359,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,389,250 UART: [rt]cmd =0x44504543, len=24
26,415,441 >>> mbox cmd response data (40 bytes)
26,416,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,446,205 UART: [rt]cmd =0x44504543, len=24
26,472,280 >>> mbox cmd response data (40 bytes)
26,472,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,502,901 UART: [rt]cmd =0x44504543, len=24
26,529,171 >>> mbox cmd response data (40 bytes)
26,529,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,559,928 UART: [rt]cmd =0x44504543, len=24
26,585,868 >>> mbox cmd response data (40 bytes)
26,586,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,616,521 UART: [rt]cmd =0x44504543, len=24
26,642,738 >>> mbox cmd response data (40 bytes)
26,643,389 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,673,237 UART: [rt]cmd =0x44504543, len=24
26,699,320 >>> mbox cmd response data (40 bytes)
26,699,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,729,799 UART: [rt]cmd =0x44504543, len=24
26,756,109 >>> mbox cmd response data (40 bytes)
26,756,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,786,485 UART: [rt]cmd =0x44504543, len=24
26,792,951 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
3,696,725 ready_for_fw is high
3,697,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,265,802 >>> mbox cmd response: success
18,512,477 UART:
18,512,862 UART: Running Caliptra FMC ...
18,514,068 UART:
18,514,249 UART: [state] CFI Enabled
18,522,094 UART: [fht] FMC Alias Private Key: 7
20,279,214 UART: [art] Extend RT PCRs Done
20,280,439 UART: [art] Lock RT PCRs Done
20,281,972 UART: [art] Populate DV Done
20,287,266 UART: [fht] FMC Alias Private Key: 7
20,288,812 UART: [art] Derive CDI
20,289,629 UART: [art] Store in in slot 0x4
20,332,609 UART: [art] Derive Key Pair
20,333,615 UART: [art] Store priv key in slot 0x5
22,760,230 UART: [art] Derive Key Pair - Done
22,773,331 UART: [art] Signing Cert with AUTHO
22,774,676 UART: RITY.KEYID = 7
24,480,025 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,528 UART: [art] PUB.X = 8CD8F4834B775E82B8CE865677F6C5D32963F014093A8563C98D95CC3DA352AD36EF4A91A6CABB6FB0EEC133839611E1
24,488,844 UART: [art] PUB.Y = EFEA8F9D8D89C7B98887A3788748DE281F1A8897BDF98910EE27CE2EE5D8972E4E96E254C72CCFCABF656BF9D3752DF7
24,496,113 UART: [art] SIG.R = B04ED43BF93EE6E1BAB8AE8EB4ADA929C89FF5E01B4CADB323C9D00AF755DDAA41A545166234AEA7B17DB41E1D440BB6
24,503,508 UART: [art] SIG.S = 8AD121F77724ABC47D77F70BDB8A07A8A996B98E192D3E712D710E42A2778C9D15BBCF3A533C4EE3505840B05C15BA48
25,482,327 UART: Caliptra RT
25,483,025 UART: [state] CFI Enabled
25,600,308 UART: [rt] RT listening for mailbox commands...
25,602,212 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,632,817 UART: [rt]cmd =0x44504543, len=24
25,659,195 >>> mbox cmd response data (40 bytes)
25,660,009 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,689,921 UART: [rt]cmd =0x44504543, len=24
25,716,332 >>> mbox cmd response data (40 bytes)
25,716,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,746,877 UART: [rt]cmd =0x44504543, len=24
25,773,157 >>> mbox cmd response data (40 bytes)
25,773,782 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,803,542 UART: [rt]cmd =0x44504543, len=24
25,829,867 >>> mbox cmd response data (40 bytes)
25,830,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,860,578 UART: [rt]cmd =0x44504543, len=24
25,886,635 >>> mbox cmd response data (40 bytes)
25,887,304 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,917,479 UART: [rt]cmd =0x44504543, len=24
25,943,942 >>> mbox cmd response data (40 bytes)
25,944,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,974,423 UART: [rt]cmd =0x44504543, len=24
26,000,212 >>> mbox cmd response data (40 bytes)
26,000,841 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,030,693 UART: [rt]cmd =0x44504543, len=24
26,056,557 >>> mbox cmd response data (40 bytes)
26,057,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,087,153 UART: [rt]cmd =0x44504543, len=24
26,113,691 >>> mbox cmd response data (40 bytes)
26,114,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,143,980 UART: [rt]cmd =0x44504543, len=24
26,170,149 >>> mbox cmd response data (40 bytes)
26,170,778 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,200,516 UART: [rt]cmd =0x44504543, len=24
26,226,613 >>> mbox cmd response data (40 bytes)
26,227,269 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,257,012 UART: [rt]cmd =0x44504543, len=24
26,283,401 >>> mbox cmd response data (40 bytes)
26,284,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,313,737 UART: [rt]cmd =0x44504543, len=24
26,339,810 >>> mbox cmd response data (40 bytes)
26,340,415 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,370,329 UART: [rt]cmd =0x44504543, len=24
26,396,983 >>> mbox cmd response data (40 bytes)
26,397,621 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,427,790 UART: [rt]cmd =0x44504543, len=24
26,453,558 >>> mbox cmd response data (40 bytes)
26,454,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,484,159 UART: [rt]cmd =0x44504543, len=24
26,490,732 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,037 UART:
192,436 UART: Running Caliptra ROM ...
193,639 UART:
193,806 UART: [state] CFI Enabled
263,694 UART: [state] LifecycleState = Unprovisioned
266,125 UART: [state] DebugLocked = No
268,519 UART: [state] WD Timer not started. Device not locked for debugging
272,860 UART: [kat] SHA2-256
462,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,520 UART: [kat] ++
474,008 UART: [kat] sha1
485,457 UART: [kat] SHA2-256
488,535 UART: [kat] SHA2-384
494,524 UART: [kat] SHA2-512-ACC
497,115 UART: [kat] ECC-384
2,950,656 UART: [kat] HMAC-384Kdf
2,972,144 UART: [kat] LMS
3,503,972 UART: [kat] --
3,509,820 UART: [cold-reset] ++
3,512,394 UART: [fht] FHT @ 0x50003400
3,523,236 UART: [idev] ++
3,523,944 UART: [idev] CDI.KEYID = 6
3,524,975 UART: [idev] SUBJECT.KEYID = 7
3,526,082 UART: [idev] UDS.KEYID = 0
3,526,987 ready_for_fw is high
3,527,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,806 UART: [idev] Erasing UDS.KEYID = 0
6,049,214 UART: [idev] Sha1 KeyId Algorithm
6,072,395 UART: [idev] --
6,076,727 UART: [ldev] ++
6,077,414 UART: [ldev] CDI.KEYID = 6
6,078,333 UART: [ldev] SUBJECT.KEYID = 5
6,079,497 UART: [ldev] AUTHORITY.KEYID = 7
6,080,754 UART: [ldev] FE.KEYID = 1
6,121,998 UART: [ldev] Erasing FE.KEYID = 1
8,632,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,429,865 UART: [ldev] --
10,435,518 UART: [fwproc] Wait for Commands...
10,437,139 UART: [fwproc] Recv command 0x46574c44
10,439,391 UART: [fwproc] Recv'd Img size: 114168 bytes
13,877,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,961,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,077,446 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,618,585 >>> mbox cmd response: success
14,623,088 UART: [afmc] ++
14,623,827 UART: [afmc] CDI.KEYID = 6
14,624,969 UART: [afmc] SUBJECT.KEYID = 7
14,626,417 UART: [afmc] AUTHORITY.KEYID = 5
17,170,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,892,707 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,894,630 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,909,821 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,924,935 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,939,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,963,642 UART: [afmc] --
18,966,368 UART: [cold-reset] --
18,969,972 UART: [state] Locking Datavault
18,976,379 UART: [state] Locking PCR0, PCR1 and PCR31
18,978,596 UART: [state] Locking ICCM
18,980,326 UART: [exit] Launching FMC @ 0x40000130
18,988,970 UART:
18,989,264 UART: Running Caliptra FMC ...
18,990,380 UART:
18,990,542 UART: [state] CFI Enabled
19,050,199 UART: [fht] FMC Alias Private Key: 7
20,813,912 UART: [art] Extend RT PCRs Done
20,815,127 UART: [art] Lock RT PCRs Done
20,816,855 UART: [art] Populate DV Done
20,822,107 UART: [fht] FMC Alias Private Key: 7
20,823,818 UART: [art] Derive CDI
20,824,617 UART: [art] Store in in slot 0x4
20,882,211 UART: [art] Derive Key Pair
20,883,215 UART: [art] Store priv key in slot 0x5
23,346,580 UART: [art] Derive Key Pair - Done
23,359,349 UART: [art] Signing Cert with AUTHO
23,360,655 UART: RITY.KEYID = 7
25,072,676 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,208 UART: [art] PUB.X = 1C6FAD2C1BE6F3335276FC1ED2CB74D846D5914C3172E68D83CC3B0C6EA1F52F8C306CA3EBDB0A1AAADC89D57A3822F7
25,081,476 UART: [art] PUB.Y = 3F23F2CCF760B66EC87D068050E4CA21F122F1BE73684B1B1A7B8A4BA826E348DB39059B699555C02086399074D300C1
25,088,734 UART: [art] SIG.R = F6F7898B539CFBB8109EC617BB81010C9A01A45430E523602B45E00601FA251A4791CFB4987A7CE3F711B0AB7CBB5824
25,096,105 UART: [art] SIG.S = F54353EE7C31B31E9D53895D8FF89D58B6E94B99DF6C1124D4FAC2A388AF46F3872D30411D0EB9836B37028A43E1394B
26,075,226 UART: Caliptra RT
26,075,927 UART: [state] CFI Enabled
26,241,184 UART: [rt] RT listening for mailbox commands...
26,243,099 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,273,732 UART: [rt]cmd =0x44504543, len=24
26,315,630 >>> mbox cmd response data (40 bytes)
26,316,456 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,346,433 UART: [rt]cmd =0x44504543, len=24
26,379,461 >>> mbox cmd response data (40 bytes)
26,380,106 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,410,006 UART: [rt]cmd =0x44504543, len=24
26,443,610 >>> mbox cmd response data (40 bytes)
26,444,297 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,474,149 UART: [rt]cmd =0x44504543, len=24
26,507,425 >>> mbox cmd response data (40 bytes)
26,508,081 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,537,931 UART: [rt]cmd =0x44504543, len=24
26,571,686 >>> mbox cmd response data (40 bytes)
26,572,295 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,602,366 UART: [rt]cmd =0x44504543, len=24
26,635,442 >>> mbox cmd response data (40 bytes)
26,636,066 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,665,986 UART: [rt]cmd =0x44504543, len=24
26,699,662 >>> mbox cmd response data (40 bytes)
26,700,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,730,237 UART: [rt]cmd =0x44504543, len=24
26,763,666 >>> mbox cmd response data (40 bytes)
26,764,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,794,237 UART: [rt]cmd =0x44504543, len=24
26,827,838 >>> mbox cmd response data (40 bytes)
26,828,476 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,858,322 UART: [rt]cmd =0x44504543, len=24
26,891,861 >>> mbox cmd response data (40 bytes)
26,892,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,922,524 UART: [rt]cmd =0x44504543, len=24
26,955,947 >>> mbox cmd response data (40 bytes)
26,956,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,986,460 UART: [rt]cmd =0x44504543, len=24
27,019,978 >>> mbox cmd response data (40 bytes)
27,020,610 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,050,570 UART: [rt]cmd =0x44504543, len=24
27,084,176 >>> mbox cmd response data (40 bytes)
27,084,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,114,949 UART: [rt]cmd =0x44504543, len=24
27,148,087 >>> mbox cmd response data (40 bytes)
27,148,736 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,178,746 UART: [rt]cmd =0x44504543, len=24
27,212,070 >>> mbox cmd response data (40 bytes)
27,212,677 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,242,320 UART: [rt]cmd =0x44504543, len=24
27,248,921 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
3,439,154 ready_for_fw is high
3,439,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,748,720 >>> mbox cmd response: success
19,046,031 UART:
19,046,420 UART: Running Caliptra FMC ...
19,047,612 UART:
19,047,784 UART: [state] CFI Enabled
19,114,765 UART: [fht] FMC Alias Private Key: 7
20,878,355 UART: [art] Extend RT PCRs Done
20,879,575 UART: [art] Lock RT PCRs Done
20,881,100 UART: [art] Populate DV Done
20,886,512 UART: [fht] FMC Alias Private Key: 7
20,888,227 UART: [art] Derive CDI
20,889,047 UART: [art] Store in in slot 0x4
20,947,550 UART: [art] Derive Key Pair
20,948,551 UART: [art] Store priv key in slot 0x5
23,411,660 UART: [art] Derive Key Pair - Done
23,424,398 UART: [art] Signing Cert with AUTHO
23,425,710 UART: RITY.KEYID = 7
25,137,895 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,405 UART: [art] PUB.X = 78C19CDAE0EE53BF136722CD7B12E628738F91AC3F4EE145242B559161A27757A09902EC18806AC8EC228C6DF525FDDF
25,146,699 UART: [art] PUB.Y = 96F351637304207AD6E652259942B11126380143B6C10AD71C04DA8D2A514389544D223841CA33C3F9C27DC0B542E504
25,153,912 UART: [art] SIG.R = BE028D44A2564098A2EE84C6390B581D4D575579DC21E2D82B719643B53890892E8ADD293CCFD3971AC01F3FE4A4F751
25,161,294 UART: [art] SIG.S = DB3065995A9E6A0225739FCBAD289B94315459806E5F22D93908BD58F0C2892CB820890E2BFC56E586937A0CD98078C4
26,140,062 UART: Caliptra RT
26,140,763 UART: [state] CFI Enabled
26,306,053 UART: [rt] RT listening for mailbox commands...
26,307,971 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,338,461 UART: [rt]cmd =0x44504543, len=24
26,380,512 >>> mbox cmd response data (40 bytes)
26,381,301 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,411,165 UART: [rt]cmd =0x44504543, len=24
26,444,257 >>> mbox cmd response data (40 bytes)
26,444,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,474,847 UART: [rt]cmd =0x44504543, len=24
26,508,570 >>> mbox cmd response data (40 bytes)
26,509,198 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,539,201 UART: [rt]cmd =0x44504543, len=24
26,572,554 >>> mbox cmd response data (40 bytes)
26,573,222 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,602,922 UART: [rt]cmd =0x44504543, len=24
26,636,626 >>> mbox cmd response data (40 bytes)
26,637,286 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,667,188 UART: [rt]cmd =0x44504543, len=24
26,700,884 >>> mbox cmd response data (40 bytes)
26,701,493 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,731,239 UART: [rt]cmd =0x44504543, len=24
26,764,699 >>> mbox cmd response data (40 bytes)
26,765,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,795,153 UART: [rt]cmd =0x44504543, len=24
26,828,738 >>> mbox cmd response data (40 bytes)
26,829,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,859,428 UART: [rt]cmd =0x44504543, len=24
26,892,662 >>> mbox cmd response data (40 bytes)
26,893,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,923,014 UART: [rt]cmd =0x44504543, len=24
26,957,237 >>> mbox cmd response data (40 bytes)
26,957,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,987,896 UART: [rt]cmd =0x44504543, len=24
27,020,893 >>> mbox cmd response data (40 bytes)
27,021,503 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,051,471 UART: [rt]cmd =0x44504543, len=24
27,085,205 >>> mbox cmd response data (40 bytes)
27,085,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,115,683 UART: [rt]cmd =0x44504543, len=24
27,149,087 >>> mbox cmd response data (40 bytes)
27,149,714 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,179,504 UART: [rt]cmd =0x44504543, len=24
27,213,266 >>> mbox cmd response data (40 bytes)
27,213,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,243,866 UART: [rt]cmd =0x44504543, len=24
27,277,242 >>> mbox cmd response data (40 bytes)
27,277,914 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,307,596 UART: [rt]cmd =0x44504543, len=24
27,314,059 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
192,996 UART:
193,382 UART: Running Caliptra ROM ...
194,487 UART:
604,303 UART: [state] CFI Enabled
616,769 UART: [state] LifecycleState = Unprovisioned
619,131 UART: [state] DebugLocked = No
621,933 UART: [state] WD Timer not started. Device not locked for debugging
626,766 UART: [kat] SHA2-256
816,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,460 UART: [kat] ++
827,980 UART: [kat] sha1
838,286 UART: [kat] SHA2-256
841,359 UART: [kat] SHA2-384
846,433 UART: [kat] SHA2-512-ACC
849,016 UART: [kat] ECC-384
3,292,361 UART: [kat] HMAC-384Kdf
3,304,528 UART: [kat] LMS
3,836,407 UART: [kat] --
3,841,389 UART: [cold-reset] ++
3,843,252 UART: [fht] FHT @ 0x50003400
3,855,433 UART: [idev] ++
3,856,065 UART: [idev] CDI.KEYID = 6
3,857,098 UART: [idev] SUBJECT.KEYID = 7
3,858,290 UART: [idev] UDS.KEYID = 0
3,859,270 ready_for_fw is high
3,859,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,839 UART: [idev] Erasing UDS.KEYID = 0
6,340,421 UART: [idev] Sha1 KeyId Algorithm
6,363,660 UART: [idev] --
6,369,597 UART: [ldev] ++
6,370,271 UART: [ldev] CDI.KEYID = 6
6,371,152 UART: [ldev] SUBJECT.KEYID = 5
6,372,365 UART: [ldev] AUTHORITY.KEYID = 7
6,373,597 UART: [ldev] FE.KEYID = 1
6,385,729 UART: [ldev] Erasing FE.KEYID = 1
8,868,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,618,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,633,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,441 UART: [ldev] --
10,658,486 UART: [fwproc] Wait for Commands...
10,661,175 UART: [fwproc] Recv command 0x46574c44
10,663,427 UART: [fwproc] Recv'd Img size: 114168 bytes
14,107,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,654 >>> mbox cmd response: success
14,846,358 UART: [afmc] ++
14,847,061 UART: [afmc] CDI.KEYID = 6
14,848,228 UART: [afmc] SUBJECT.KEYID = 7
14,849,714 UART: [afmc] AUTHORITY.KEYID = 5
17,357,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,472 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,835 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,833 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,831 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,963 UART: [afmc] --
19,155,831 UART: [cold-reset] --
19,161,208 UART: [state] Locking Datavault
19,167,807 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,000 UART: [state] Locking ICCM
19,171,995 UART: [exit] Launching FMC @ 0x40000130
19,180,670 UART:
19,180,943 UART: Running Caliptra FMC ...
19,182,053 UART:
19,182,218 UART: [state] CFI Enabled
19,190,213 UART: [fht] FMC Alias Private Key: 7
20,946,617 UART: [art] Extend RT PCRs Done
20,947,842 UART: [art] Lock RT PCRs Done
20,949,533 UART: [art] Populate DV Done
20,954,891 UART: [fht] FMC Alias Private Key: 7
20,956,381 UART: [art] Derive CDI
20,957,120 UART: [art] Store in in slot 0x4
20,999,606 UART: [art] Derive Key Pair
21,000,601 UART: [art] Store priv key in slot 0x5
23,427,174 UART: [art] Derive Key Pair - Done
23,440,223 UART: [art] Signing Cert with AUTHO
23,441,525 UART: RITY.KEYID = 7
25,147,003 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,515 UART: [art] PUB.X = 85AFBF6FD8C2897317994F874140104A8E29118CD6FF3A052FE2D3D6A50BD748986890D2D2321AC90A6721377DA82B25
25,155,755 UART: [art] PUB.Y = 6C2E388166C5420C927FAB41317D9654144C49963B5F5AC9C2CCAAF49FFC8929ABD4664A2CB8FF558E664319555D4755
25,163,047 UART: [art] SIG.R = 8E412ACF770904C364407B1FA240B06EC146FDEAE700DE9913A7B3D010687A9764BA8E604718219E246640F40C0D4BBF
25,170,390 UART: [art] SIG.S = C596977B913DD05FC7AD980CF6E08976EBCF33EFC8895E4272CC303FE0286849F63DE8E1D14A247B79197BF305C1DA9D
26,149,245 UART: Caliptra RT
26,149,957 UART: [state] CFI Enabled
26,266,286 UART: [rt] RT listening for mailbox commands...
26,268,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,298,383 UART: [rt]cmd =0x44504543, len=24
26,324,570 >>> mbox cmd response data (40 bytes)
26,325,373 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,355,501 UART: [rt]cmd =0x44504543, len=24
26,381,753 >>> mbox cmd response data (40 bytes)
26,382,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,412,481 UART: [rt]cmd =0x44504543, len=24
26,438,995 >>> mbox cmd response data (40 bytes)
26,439,610 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,469,531 UART: [rt]cmd =0x44504543, len=24
26,495,909 >>> mbox cmd response data (40 bytes)
26,496,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,526,436 UART: [rt]cmd =0x44504543, len=24
26,552,269 >>> mbox cmd response data (40 bytes)
26,552,979 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,582,834 UART: [rt]cmd =0x44504543, len=24
26,608,437 >>> mbox cmd response data (40 bytes)
26,609,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,638,872 UART: [rt]cmd =0x44504543, len=24
26,665,209 >>> mbox cmd response data (40 bytes)
26,665,830 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,695,513 UART: [rt]cmd =0x44504543, len=24
26,722,038 >>> mbox cmd response data (40 bytes)
26,722,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,752,476 UART: [rt]cmd =0x44504543, len=24
26,778,672 >>> mbox cmd response data (40 bytes)
26,779,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,809,219 UART: [rt]cmd =0x44504543, len=24
26,835,351 >>> mbox cmd response data (40 bytes)
26,835,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,865,931 UART: [rt]cmd =0x44504543, len=24
26,892,097 >>> mbox cmd response data (40 bytes)
26,892,715 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,922,343 UART: [rt]cmd =0x44504543, len=24
26,949,085 >>> mbox cmd response data (40 bytes)
26,949,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,979,628 UART: [rt]cmd =0x44504543, len=24
27,006,029 >>> mbox cmd response data (40 bytes)
27,006,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,036,492 UART: [rt]cmd =0x44504543, len=24
27,062,772 >>> mbox cmd response data (40 bytes)
27,063,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,093,226 UART: [rt]cmd =0x44504543, len=24
27,119,265 >>> mbox cmd response data (40 bytes)
27,119,909 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,149,646 UART: [rt]cmd =0x44504543, len=24
27,156,019 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
3,759,093 ready_for_fw is high
3,759,473 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,297 >>> mbox cmd response: success
19,203,987 UART:
19,204,376 UART: Running Caliptra FMC ...
19,205,581 UART:
19,205,754 UART: [state] CFI Enabled
19,213,440 UART: [fht] FMC Alias Private Key: 7
20,970,351 UART: [art] Extend RT PCRs Done
20,971,588 UART: [art] Lock RT PCRs Done
20,973,161 UART: [art] Populate DV Done
20,978,742 UART: [fht] FMC Alias Private Key: 7
20,980,284 UART: [art] Derive CDI
20,981,102 UART: [art] Store in in slot 0x4
21,023,432 UART: [art] Derive Key Pair
21,024,498 UART: [art] Store priv key in slot 0x5
23,452,074 UART: [art] Derive Key Pair - Done
23,464,650 UART: [art] Signing Cert with AUTHO
23,466,011 UART: RITY.KEYID = 7
25,171,715 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,225 UART: [art] PUB.X = 0DABF21BD0CDB604FC3BFE4B5233210189D981DAF8D5E2121E8BAB51850A25441909A8C17877AD70FAA56032B42D6FF1
25,180,549 UART: [art] PUB.Y = E7170E51D7287E9E900C1C8EAF1E0436EEA39ADD8938B50F8183D89700D0B080DE202492D68BE72F15EE86CD26825782
25,187,756 UART: [art] SIG.R = 9D95999F7D640E59AA80BB5F7B27D60BA75C60408A4BD3D852A5A4A13B5530F50F9EDA1BE3B2CA173D97C812414FF4D7
25,195,149 UART: [art] SIG.S = 3EDD467E2EAF3DAFD1F42BF18D4623C53B8DE08D443BE4E0D5B70A493511222A77FCE376F240D52238B25DC2ABC0ADA8
26,174,161 UART: Caliptra RT
26,174,874 UART: [state] CFI Enabled
26,292,084 UART: [rt] RT listening for mailbox commands...
26,293,998 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,324,408 UART: [rt]cmd =0x44504543, len=24
26,350,310 >>> mbox cmd response data (40 bytes)
26,351,123 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,381,012 UART: [rt]cmd =0x44504543, len=24
26,406,970 >>> mbox cmd response data (40 bytes)
26,407,612 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,437,464 UART: [rt]cmd =0x44504543, len=24
26,463,883 >>> mbox cmd response data (40 bytes)
26,464,548 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,494,561 UART: [rt]cmd =0x44504543, len=24
26,520,452 >>> mbox cmd response data (40 bytes)
26,521,068 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,550,780 UART: [rt]cmd =0x44504543, len=24
26,576,731 >>> mbox cmd response data (40 bytes)
26,577,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,607,045 UART: [rt]cmd =0x44504543, len=24
26,633,564 >>> mbox cmd response data (40 bytes)
26,634,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,664,439 UART: [rt]cmd =0x44504543, len=24
26,690,053 >>> mbox cmd response data (40 bytes)
26,690,671 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,720,479 UART: [rt]cmd =0x44504543, len=24
26,746,478 >>> mbox cmd response data (40 bytes)
26,747,098 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,777,062 UART: [rt]cmd =0x44504543, len=24
26,803,124 >>> mbox cmd response data (40 bytes)
26,803,756 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,833,712 UART: [rt]cmd =0x44504543, len=24
26,860,077 >>> mbox cmd response data (40 bytes)
26,860,732 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,890,582 UART: [rt]cmd =0x44504543, len=24
26,916,608 >>> mbox cmd response data (40 bytes)
26,917,210 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,946,967 UART: [rt]cmd =0x44504543, len=24
26,973,290 >>> mbox cmd response data (40 bytes)
26,973,927 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,003,878 UART: [rt]cmd =0x44504543, len=24
27,030,024 >>> mbox cmd response data (40 bytes)
27,030,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,060,529 UART: [rt]cmd =0x44504543, len=24
27,087,256 >>> mbox cmd response data (40 bytes)
27,087,866 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,117,940 UART: [rt]cmd =0x44504543, len=24
27,144,698 >>> mbox cmd response data (40 bytes)
27,145,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,175,201 UART: [rt]cmd =0x44504543, len=24
27,181,558 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,175 UART: [kat] SHA2-256
882,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,221 UART: [kat] ++
886,373 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,150 UART: [kat] SHA2-512-ACC
897,051 UART: [kat] ECC-384
902,508 UART: [kat] HMAC-384Kdf
907,088 UART: [kat] LMS
1,475,284 UART: [kat] --
1,476,495 UART: [cold-reset] ++
1,476,967 UART: [fht] Storing FHT @ 0x50003400
1,479,626 UART: [idev] ++
1,479,794 UART: [idev] CDI.KEYID = 6
1,480,154 UART: [idev] SUBJECT.KEYID = 7
1,480,578 UART: [idev] UDS.KEYID = 0
1,480,923 ready_for_fw is high
1,480,923 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,426 UART: [idev] Erasing UDS.KEYID = 0
1,504,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,182 UART: [idev] --
1,514,425 UART: [ldev] ++
1,514,593 UART: [ldev] CDI.KEYID = 6
1,514,956 UART: [ldev] SUBJECT.KEYID = 5
1,515,382 UART: [ldev] AUTHORITY.KEYID = 7
1,515,845 UART: [ldev] FE.KEYID = 1
1,521,201 UART: [ldev] Erasing FE.KEYID = 1
1,546,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,198 UART: [ldev] --
1,585,643 UART: [fwproc] Waiting for Commands...
1,586,332 UART: [fwproc] Received command 0x46574c44
1,587,123 UART: [fwproc] Received Image of size 114168 bytes
2,884,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,519 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,462 >>> mbox cmd response: success
3,077,536 UART: [afmc] ++
3,077,704 UART: [afmc] CDI.KEYID = 6
3,078,066 UART: [afmc] SUBJECT.KEYID = 7
3,078,491 UART: [afmc] AUTHORITY.KEYID = 5
3,114,100 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,822 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,550 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,435 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,125 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,984 UART: [afmc] --
3,157,050 UART: [cold-reset] --
3,157,948 UART: [state] Locking Datavault
3,159,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,847 UART: [state] Locking ICCM
3,160,461 UART: [exit] Launching FMC @ 0x40000130
3,165,790 UART:
3,165,806 UART: Running Caliptra FMC ...
3,166,214 UART:
3,166,268 UART: [state] CFI Enabled
3,176,339 UART: [fht] FMC Alias Private Key: 7
3,283,824 UART: [art] Extend RT PCRs Done
3,284,252 UART: [art] Lock RT PCRs Done
3,285,806 UART: [art] Populate DV Done
3,294,105 UART: [fht] FMC Alias Private Key: 7
3,295,155 UART: [art] Derive CDI
3,295,435 UART: [art] Store in in slot 0x4
3,381,078 UART: [art] Derive Key Pair
3,381,438 UART: [art] Store priv key in slot 0x5
3,394,482 UART: [art] Derive Key Pair - Done
3,409,209 UART: [art] Signing Cert with AUTHO
3,409,689 UART: RITY.KEYID = 7
3,424,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,708 UART: [art] PUB.X = CA9919C942A1881BDE4646833EAE208C80594F2E32355792C8CB5A14E74B5206A75FAB658380649DEA267D68B516D90B
3,432,470 UART: [art] PUB.Y = D8B1B26A3CC64C5D65B2D1DA707F23104AC10C0B33245538134F92457F32EA87D94486EC5708B387AA93F5ED606899A4
3,439,411 UART: [art] SIG.R = 6F4D967DF8BD2752751F5B79D171E2B2E4253F791C5646AB710FDF9E1AB3CF9F9A2ABCF87D771512E6984951439B6E0E
3,446,183 UART: [art] SIG.S = 88D0E4841F8CCA55820856F3F6451AD9A9AB2A6B2F725C22A6F6C34849B0EBA2D6193D583A6D7454A145B5E9768D1CAF
3,470,335 UART: Caliptra RT
3,470,588 UART: [state] CFI Enabled
3,578,657 UART: [rt] RT listening for mailbox commands...
3,579,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,277 UART: [rt]cmd =0x44504543, len=24
3,635,526 >>> mbox cmd response data (40 bytes)
3,635,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,998 UART: [rt]cmd =0x44504543, len=24
3,691,551 >>> mbox cmd response data (40 bytes)
3,691,552 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,720,821 UART: [rt]cmd =0x44504543, len=24
3,746,680 >>> mbox cmd response data (40 bytes)
3,746,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,190 UART: [rt]cmd =0x44504543, len=24
3,802,625 >>> mbox cmd response data (40 bytes)
3,802,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,191 UART: [rt]cmd =0x44504543, len=24
3,858,186 >>> mbox cmd response data (40 bytes)
3,858,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,887,746 UART: [rt]cmd =0x44504543, len=24
3,914,057 >>> mbox cmd response data (40 bytes)
3,914,058 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,509 UART: [rt]cmd =0x44504543, len=24
3,969,786 >>> mbox cmd response data (40 bytes)
3,969,787 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,999,288 UART: [rt]cmd =0x44504543, len=24
4,025,367 >>> mbox cmd response data (40 bytes)
4,025,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,054,761 UART: [rt]cmd =0x44504543, len=24
4,080,842 >>> mbox cmd response data (40 bytes)
4,080,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,110,344 UART: [rt]cmd =0x44504543, len=24
4,136,635 >>> mbox cmd response data (40 bytes)
4,136,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,166,041 UART: [rt]cmd =0x44504543, len=24
4,192,252 >>> mbox cmd response data (40 bytes)
4,192,253 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,221,740 UART: [rt]cmd =0x44504543, len=24
4,247,831 >>> mbox cmd response data (40 bytes)
4,247,832 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,277,257 UART: [rt]cmd =0x44504543, len=24
4,303,564 >>> mbox cmd response data (40 bytes)
4,303,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,333,098 UART: [rt]cmd =0x44504543, len=24
4,359,363 >>> mbox cmd response data (40 bytes)
4,359,364 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,388,879 UART: [rt]cmd =0x44504543, len=24
4,415,128 >>> mbox cmd response data (40 bytes)
4,415,129 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,444,610 UART: [rt]cmd =0x44504543, len=24
4,451,913 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,483 ready_for_fw is high
1,362,483 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,976 >>> mbox cmd response: success
2,986,902 UART:
2,986,918 UART: Running Caliptra FMC ...
2,987,326 UART:
2,987,380 UART: [state] CFI Enabled
2,997,701 UART: [fht] FMC Alias Private Key: 7
3,106,046 UART: [art] Extend RT PCRs Done
3,106,474 UART: [art] Lock RT PCRs Done
3,108,136 UART: [art] Populate DV Done
3,116,349 UART: [fht] FMC Alias Private Key: 7
3,117,481 UART: [art] Derive CDI
3,117,761 UART: [art] Store in in slot 0x4
3,203,354 UART: [art] Derive Key Pair
3,203,714 UART: [art] Store priv key in slot 0x5
3,216,786 UART: [art] Derive Key Pair - Done
3,231,885 UART: [art] Signing Cert with AUTHO
3,232,365 UART: RITY.KEYID = 7
3,247,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,566 UART: [art] PUB.X = B5ADA9A08A3981C696117710F8509772B9F99B1BF9CDB0FB875B37013F0A880CA22CA51F4300638D8D3849676D13E837
3,255,303 UART: [art] PUB.Y = 5FB8D2468A0B7172A6F1B953291025EEBA31E96BD3465EC808AC1981A4C2BDBFA4654CBBCD1132504054B4E9CCC73CFF
3,262,263 UART: [art] SIG.R = 2D885DD0C371A94781E71FEAE1473B93FCB91ECD8E18B04AB5D9811906907628F4E15FCDC67B453FEDD41C02345BE620
3,269,037 UART: [art] SIG.S = 8BB5FFB571EBA0D5A3E7D9CEE966193A35084B9048CAC37764A8DB4AD78258056E7147912FD64FC41FFD84BC6D20755A
3,292,676 UART: Caliptra RT
3,292,929 UART: [state] CFI Enabled
3,401,410 UART: [rt] RT listening for mailbox commands...
3,402,080 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,058 UART: [rt]cmd =0x44504543, len=24
3,458,771 >>> mbox cmd response data (40 bytes)
3,458,772 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,159 UART: [rt]cmd =0x44504543, len=24
3,514,740 >>> mbox cmd response data (40 bytes)
3,514,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,544,288 UART: [rt]cmd =0x44504543, len=24
3,570,821 >>> mbox cmd response data (40 bytes)
3,570,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,600,267 UART: [rt]cmd =0x44504543, len=24
3,626,524 >>> mbox cmd response data (40 bytes)
3,626,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,656,180 UART: [rt]cmd =0x44504543, len=24
3,682,545 >>> mbox cmd response data (40 bytes)
3,682,546 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,091 UART: [rt]cmd =0x44504543, len=24
3,738,406 >>> mbox cmd response data (40 bytes)
3,738,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,998 UART: [rt]cmd =0x44504543, len=24
3,794,309 >>> mbox cmd response data (40 bytes)
3,794,310 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,707 UART: [rt]cmd =0x44504543, len=24
3,849,748 >>> mbox cmd response data (40 bytes)
3,849,749 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,879,194 UART: [rt]cmd =0x44504543, len=24
3,905,269 >>> mbox cmd response data (40 bytes)
3,905,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,765 UART: [rt]cmd =0x44504543, len=24
3,960,668 >>> mbox cmd response data (40 bytes)
3,960,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,990,086 UART: [rt]cmd =0x44504543, len=24
4,016,555 >>> mbox cmd response data (40 bytes)
4,016,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,046,043 UART: [rt]cmd =0x44504543, len=24
4,072,570 >>> mbox cmd response data (40 bytes)
4,072,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,101,938 UART: [rt]cmd =0x44504543, len=24
4,128,531 >>> mbox cmd response data (40 bytes)
4,128,532 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,158,063 UART: [rt]cmd =0x44504543, len=24
4,184,468 >>> mbox cmd response data (40 bytes)
4,184,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,213,820 UART: [rt]cmd =0x44504543, len=24
4,240,115 >>> mbox cmd response data (40 bytes)
4,240,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,269,561 UART: [rt]cmd =0x44504543, len=24
4,276,456 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,578 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,654 UART: [kat] SHA2-256
892,592 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
903,107 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,476,924 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,480,029 UART: [idev] ++
1,480,197 UART: [idev] CDI.KEYID = 6
1,480,557 UART: [idev] SUBJECT.KEYID = 7
1,480,981 UART: [idev] UDS.KEYID = 0
1,481,326 ready_for_fw is high
1,481,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,085 UART: [idev] Erasing UDS.KEYID = 0
1,505,869 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,497 UART: [idev] --
1,515,696 UART: [ldev] ++
1,515,864 UART: [ldev] CDI.KEYID = 6
1,516,227 UART: [ldev] SUBJECT.KEYID = 5
1,516,653 UART: [ldev] AUTHORITY.KEYID = 7
1,517,116 UART: [ldev] FE.KEYID = 1
1,522,304 UART: [ldev] Erasing FE.KEYID = 1
1,547,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,921 UART: [ldev] --
1,586,212 UART: [fwproc] Waiting for Commands...
1,587,059 UART: [fwproc] Received command 0x46574c44
1,587,850 UART: [fwproc] Received Image of size 114168 bytes
2,884,150 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,840 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,192 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,759 >>> mbox cmd response: success
3,077,843 UART: [afmc] ++
3,078,011 UART: [afmc] CDI.KEYID = 6
3,078,373 UART: [afmc] SUBJECT.KEYID = 7
3,078,798 UART: [afmc] AUTHORITY.KEYID = 5
3,114,039 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,365 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,093 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,978 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,668 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,651 UART: [afmc] --
3,157,737 UART: [cold-reset] --
3,158,555 UART: [state] Locking Datavault
3,160,034 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,638 UART: [state] Locking ICCM
3,161,180 UART: [exit] Launching FMC @ 0x40000130
3,166,509 UART:
3,166,525 UART: Running Caliptra FMC ...
3,166,933 UART:
3,167,076 UART: [state] CFI Enabled
3,177,441 UART: [fht] FMC Alias Private Key: 7
3,285,146 UART: [art] Extend RT PCRs Done
3,285,574 UART: [art] Lock RT PCRs Done
3,286,874 UART: [art] Populate DV Done
3,295,237 UART: [fht] FMC Alias Private Key: 7
3,296,209 UART: [art] Derive CDI
3,296,489 UART: [art] Store in in slot 0x4
3,381,938 UART: [art] Derive Key Pair
3,382,298 UART: [art] Store priv key in slot 0x5
3,395,496 UART: [art] Derive Key Pair - Done
3,410,036 UART: [art] Signing Cert with AUTHO
3,410,516 UART: RITY.KEYID = 7
3,425,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,609 UART: [art] PUB.X = 68C9D8F72D4BE36EA0820AB740935E98D5453A577A541F5DAC011B853DCAD5D006541BAFEA623252C364D818B008BFAD
3,433,377 UART: [art] PUB.Y = 4F78D51E563EA2050ED8D4690DA6BD92301793560C2583D1303B33D0B528538156913D58360AF9544388A0F63E4BFBB1
3,440,304 UART: [art] SIG.R = A81B45783331870790D750FB8F7D471321EC55480B85569F6D165D0B045A935FD9C8ED80A5B86C312939B7E0A04EE906
3,447,053 UART: [art] SIG.S = 8972D6789C3BAC32B2871E4177C9547090DFA20554F95F786C5D63F8B95C844DEC736FCAFBF3C21942479E3A49FCF1B1
3,471,345 UART: Caliptra RT
3,471,690 UART: [state] CFI Enabled
3,580,500 UART: [rt] RT listening for mailbox commands...
3,581,170 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,142 UART: [rt]cmd =0x44504543, len=24
3,637,531 >>> mbox cmd response data (40 bytes)
3,637,532 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,666,971 UART: [rt]cmd =0x44504543, len=24
3,693,756 >>> mbox cmd response data (40 bytes)
3,693,757 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,723,286 UART: [rt]cmd =0x44504543, len=24
3,749,341 >>> mbox cmd response data (40 bytes)
3,749,342 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,589 UART: [rt]cmd =0x44504543, len=24
3,804,406 >>> mbox cmd response data (40 bytes)
3,804,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,833,700 UART: [rt]cmd =0x44504543, len=24
3,859,933 >>> mbox cmd response data (40 bytes)
3,859,934 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,501 UART: [rt]cmd =0x44504543, len=24
3,915,666 >>> mbox cmd response data (40 bytes)
3,915,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,246 UART: [rt]cmd =0x44504543, len=24
3,971,743 >>> mbox cmd response data (40 bytes)
3,971,744 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,001,103 UART: [rt]cmd =0x44504543, len=24
4,027,578 >>> mbox cmd response data (40 bytes)
4,027,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,056,952 UART: [rt]cmd =0x44504543, len=24
4,083,141 >>> mbox cmd response data (40 bytes)
4,083,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,112,651 UART: [rt]cmd =0x44504543, len=24
4,139,292 >>> mbox cmd response data (40 bytes)
4,139,293 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,976 UART: [rt]cmd =0x44504543, len=24
4,195,587 >>> mbox cmd response data (40 bytes)
4,195,588 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,224,969 UART: [rt]cmd =0x44504543, len=24
4,251,956 >>> mbox cmd response data (40 bytes)
4,251,957 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,281,160 UART: [rt]cmd =0x44504543, len=24
4,307,697 >>> mbox cmd response data (40 bytes)
4,307,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,337,205 UART: [rt]cmd =0x44504543, len=24
4,363,910 >>> mbox cmd response data (40 bytes)
4,363,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,393,304 UART: [rt]cmd =0x44504543, len=24
4,419,555 >>> mbox cmd response data (40 bytes)
4,419,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,449,049 UART: [rt]cmd =0x44504543, len=24
4,456,370 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,930 ready_for_fw is high
1,362,930 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,103 >>> mbox cmd response: success
2,989,809 UART:
2,989,825 UART: Running Caliptra FMC ...
2,990,233 UART:
2,990,376 UART: [state] CFI Enabled
3,000,849 UART: [fht] FMC Alias Private Key: 7
3,109,670 UART: [art] Extend RT PCRs Done
3,110,098 UART: [art] Lock RT PCRs Done
3,111,654 UART: [art] Populate DV Done
3,119,815 UART: [fht] FMC Alias Private Key: 7
3,120,821 UART: [art] Derive CDI
3,121,101 UART: [art] Store in in slot 0x4
3,206,878 UART: [art] Derive Key Pair
3,207,238 UART: [art] Store priv key in slot 0x5
3,220,774 UART: [art] Derive Key Pair - Done
3,235,930 UART: [art] Signing Cert with AUTHO
3,236,410 UART: RITY.KEYID = 7
3,251,404 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,169 UART: [art] PUB.X = BE99A16EBAB2BB599E81D22D772383FA8A72F2B499C744A232A19B13C6EC0D5C15DED6A3E1C741AD962EBC867B05D70C
3,258,948 UART: [art] PUB.Y = 4945DC099214B9F4838B3CBD09460CD6E5069277ABBA40C32D551C1B18803E2335E69536648A473AF287AEEBD1E10602
3,265,878 UART: [art] SIG.R = 931553C1377E9868367225BA5E637EE7D8CDCBE034D54BC394C5A2A325164FEB180E84FFBD9599BEE7C137634E0C526F
3,272,648 UART: [art] SIG.S = 9D7DD11A38FC1452B7512BD5597503D9971C03733324F258A201133EC6D8E31F502A5D7A437D61BF32B4957B83766C99
3,296,410 UART: Caliptra RT
3,296,755 UART: [state] CFI Enabled
3,404,715 UART: [rt] RT listening for mailbox commands...
3,405,385 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,197 UART: [rt]cmd =0x44504543, len=24
3,461,376 >>> mbox cmd response data (40 bytes)
3,461,377 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,996 UART: [rt]cmd =0x44504543, len=24
3,517,367 >>> mbox cmd response data (40 bytes)
3,517,368 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,863 UART: [rt]cmd =0x44504543, len=24
3,573,138 >>> mbox cmd response data (40 bytes)
3,573,139 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,762 UART: [rt]cmd =0x44504543, len=24
3,628,611 >>> mbox cmd response data (40 bytes)
3,628,612 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,337 UART: [rt]cmd =0x44504543, len=24
3,684,844 >>> mbox cmd response data (40 bytes)
3,684,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,344 UART: [rt]cmd =0x44504543, len=24
3,740,549 >>> mbox cmd response data (40 bytes)
3,740,550 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,829 UART: [rt]cmd =0x44504543, len=24
3,796,294 >>> mbox cmd response data (40 bytes)
3,796,295 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,826,006 UART: [rt]cmd =0x44504543, len=24
3,852,443 >>> mbox cmd response data (40 bytes)
3,852,444 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,882,207 UART: [rt]cmd =0x44504543, len=24
3,908,562 >>> mbox cmd response data (40 bytes)
3,908,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,896 UART: [rt]cmd =0x44504543, len=24
3,963,841 >>> mbox cmd response data (40 bytes)
3,963,842 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,993,227 UART: [rt]cmd =0x44504543, len=24
4,019,914 >>> mbox cmd response data (40 bytes)
4,019,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,049,558 UART: [rt]cmd =0x44504543, len=24
4,075,669 >>> mbox cmd response data (40 bytes)
4,075,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,105,117 UART: [rt]cmd =0x44504543, len=24
4,131,356 >>> mbox cmd response data (40 bytes)
4,131,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,160,604 UART: [rt]cmd =0x44504543, len=24
4,186,575 >>> mbox cmd response data (40 bytes)
4,186,576 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,216,129 UART: [rt]cmd =0x44504543, len=24
4,242,398 >>> mbox cmd response data (40 bytes)
4,242,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,271,964 UART: [rt]cmd =0x44504543, len=24
4,279,289 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
893,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,773 UART: [kat] ++
897,925 UART: [kat] sha1
902,243 UART: [kat] SHA2-256
904,183 UART: [kat] SHA2-384
906,866 UART: [kat] SHA2-512-ACC
908,767 UART: [kat] ECC-384
919,150 UART: [kat] HMAC-384Kdf
923,836 UART: [kat] LMS
1,172,164 UART: [kat] --
1,173,211 UART: [cold-reset] ++
1,173,687 UART: [fht] FHT @ 0x50003400
1,176,126 UART: [idev] ++
1,176,294 UART: [idev] CDI.KEYID = 6
1,176,654 UART: [idev] SUBJECT.KEYID = 7
1,177,078 UART: [idev] UDS.KEYID = 0
1,177,423 ready_for_fw is high
1,177,423 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,536 UART: [idev] Erasing UDS.KEYID = 0
1,201,497 UART: [idev] Sha1 KeyId Algorithm
1,210,183 UART: [idev] --
1,211,221 UART: [ldev] ++
1,211,389 UART: [ldev] CDI.KEYID = 6
1,211,752 UART: [ldev] SUBJECT.KEYID = 5
1,212,178 UART: [ldev] AUTHORITY.KEYID = 7
1,212,641 UART: [ldev] FE.KEYID = 1
1,217,739 UART: [ldev] Erasing FE.KEYID = 1
1,243,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,999 UART: [ldev] --
1,283,376 UART: [fwproc] Wait for Commands...
1,284,184 UART: [fwproc] Recv command 0x46574c44
1,284,912 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,031 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,934 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,729 >>> mbox cmd response: success
2,774,795 UART: [afmc] ++
2,774,963 UART: [afmc] CDI.KEYID = 6
2,775,325 UART: [afmc] SUBJECT.KEYID = 7
2,775,750 UART: [afmc] AUTHORITY.KEYID = 5
2,811,529 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,966 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,694 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,282 UART: [afmc] --
2,855,256 UART: [cold-reset] --
2,856,132 UART: [state] Locking Datavault
2,856,983 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,587 UART: [state] Locking ICCM
2,858,045 UART: [exit] Launching FMC @ 0x40000130
2,863,374 UART:
2,863,390 UART: Running Caliptra FMC ...
2,863,798 UART:
2,863,852 UART: [state] CFI Enabled
2,874,589 UART: [fht] FMC Alias Private Key: 7
2,982,208 UART: [art] Extend RT PCRs Done
2,982,636 UART: [art] Lock RT PCRs Done
2,983,910 UART: [art] Populate DV Done
2,992,091 UART: [fht] FMC Alias Private Key: 7
2,993,083 UART: [art] Derive CDI
2,993,363 UART: [art] Store in in slot 0x4
3,079,082 UART: [art] Derive Key Pair
3,079,442 UART: [art] Store priv key in slot 0x5
3,092,310 UART: [art] Derive Key Pair - Done
3,106,723 UART: [art] Signing Cert with AUTHO
3,107,203 UART: RITY.KEYID = 7
3,122,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,292 UART: [art] PUB.X = B43938449C7E05AEA1EBC8C921E46733A0BBEF1F92C8B0B7FA35EDFACBCB567FA3106A159DB4BFE350B7CF92085A88CC
3,130,082 UART: [art] PUB.Y = 82F6221CB2D2643A797F36C57C48B01835CF9D29C3BDCA097B550C735112213C69499614FBE3D92B9D4ADECF5E038362
3,137,025 UART: [art] SIG.R = 3CDED83D6AA2A4B46F9613D1438B1463BC5BBDB18C5391E57BC344548513E97BBDCE06355ECEEE22E83089B1EC443469
3,143,804 UART: [art] SIG.S = 634EC702034A69245D353A56EACC5D354E9BAD695F5D7196F48C4697F0E83637A1E1FEE9B85A5B1C43D089C8274304CB
3,167,030 UART: Caliptra RT
3,167,283 UART: [state] CFI Enabled
3,275,284 UART: [rt] RT listening for mailbox commands...
3,275,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,782 UART: [rt]cmd =0x44504543, len=24
3,331,873 >>> mbox cmd response data (40 bytes)
3,331,874 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,361 UART: [rt]cmd =0x44504543, len=24
3,387,946 >>> mbox cmd response data (40 bytes)
3,387,947 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,417,470 UART: [rt]cmd =0x44504543, len=24
3,443,553 >>> mbox cmd response data (40 bytes)
3,443,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,473,043 UART: [rt]cmd =0x44504543, len=24
3,499,494 >>> mbox cmd response data (40 bytes)
3,499,495 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,818 UART: [rt]cmd =0x44504543, len=24
3,555,349 >>> mbox cmd response data (40 bytes)
3,555,350 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,857 UART: [rt]cmd =0x44504543, len=24
3,610,870 >>> mbox cmd response data (40 bytes)
3,610,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,578 UART: [rt]cmd =0x44504543, len=24
3,666,887 >>> mbox cmd response data (40 bytes)
3,666,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,415 UART: [rt]cmd =0x44504543, len=24
3,723,034 >>> mbox cmd response data (40 bytes)
3,723,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,590 UART: [rt]cmd =0x44504543, len=24
3,778,923 >>> mbox cmd response data (40 bytes)
3,778,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,808,233 UART: [rt]cmd =0x44504543, len=24
3,835,112 >>> mbox cmd response data (40 bytes)
3,835,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,762 UART: [rt]cmd =0x44504543, len=24
3,890,905 >>> mbox cmd response data (40 bytes)
3,890,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,920,529 UART: [rt]cmd =0x44504543, len=24
3,947,094 >>> mbox cmd response data (40 bytes)
3,947,095 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,976,644 UART: [rt]cmd =0x44504543, len=24
4,002,897 >>> mbox cmd response data (40 bytes)
4,002,898 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,032,455 UART: [rt]cmd =0x44504543, len=24
4,058,502 >>> mbox cmd response data (40 bytes)
4,058,503 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,044 UART: [rt]cmd =0x44504543, len=24
4,113,879 >>> mbox cmd response data (40 bytes)
4,113,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,439 UART: [rt]cmd =0x44504543, len=24
4,150,844 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,465 ready_for_fw is high
1,060,465 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,874 >>> mbox cmd response: success
2,687,890 UART:
2,687,906 UART: Running Caliptra FMC ...
2,688,314 UART:
2,688,368 UART: [state] CFI Enabled
2,698,777 UART: [fht] FMC Alias Private Key: 7
2,806,232 UART: [art] Extend RT PCRs Done
2,806,660 UART: [art] Lock RT PCRs Done
2,808,066 UART: [art] Populate DV Done
2,816,469 UART: [fht] FMC Alias Private Key: 7
2,817,643 UART: [art] Derive CDI
2,817,923 UART: [art] Store in in slot 0x4
2,903,830 UART: [art] Derive Key Pair
2,904,190 UART: [art] Store priv key in slot 0x5
2,918,092 UART: [art] Derive Key Pair - Done
2,932,783 UART: [art] Signing Cert with AUTHO
2,933,263 UART: RITY.KEYID = 7
2,947,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,764 UART: [art] PUB.X = B1B86EA2852DCE3835B2BC413093AA87BB254F3C9A1C8D806DB2AA813AB9D022DCCF62F5F387A2246CEDB064C636F395
2,955,550 UART: [art] PUB.Y = 8F359FCB462971140BF92B97E19FE358E6CAB748464EB642C40960F9B2EB9C0C6834154EDA6EA748731774CE617CCA0F
2,962,494 UART: [art] SIG.R = 688CD1B8E5229A83010CA55DAF588E7D2C0FD7F2AE8BBDBDBA2DD2C34594B791390FE174509EB992A324329FF39F50E2
2,969,266 UART: [art] SIG.S = 0AAFD3D88B4494F8F2B9189C92811D6A9354B5ABEB33AF4029773F0760846E2E45B62223A70350028C6B92E168593391
2,993,357 UART: Caliptra RT
2,993,610 UART: [state] CFI Enabled
3,100,613 UART: [rt] RT listening for mailbox commands...
3,101,283 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,163 UART: [rt]cmd =0x44504543, len=24
3,157,382 >>> mbox cmd response data (40 bytes)
3,157,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,187,008 UART: [rt]cmd =0x44504543, len=24
3,213,191 >>> mbox cmd response data (40 bytes)
3,213,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,242,763 UART: [rt]cmd =0x44504543, len=24
3,269,132 >>> mbox cmd response data (40 bytes)
3,269,133 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,298,462 UART: [rt]cmd =0x44504543, len=24
3,324,679 >>> mbox cmd response data (40 bytes)
3,324,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,413 UART: [rt]cmd =0x44504543, len=24
3,380,430 >>> mbox cmd response data (40 bytes)
3,380,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,410,058 UART: [rt]cmd =0x44504543, len=24
3,435,871 >>> mbox cmd response data (40 bytes)
3,435,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,465,315 UART: [rt]cmd =0x44504543, len=24
3,491,466 >>> mbox cmd response data (40 bytes)
3,491,467 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,940 UART: [rt]cmd =0x44504543, len=24
3,547,071 >>> mbox cmd response data (40 bytes)
3,547,072 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,639 UART: [rt]cmd =0x44504543, len=24
3,603,326 >>> mbox cmd response data (40 bytes)
3,603,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,814 UART: [rt]cmd =0x44504543, len=24
3,658,827 >>> mbox cmd response data (40 bytes)
3,658,828 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,688,411 UART: [rt]cmd =0x44504543, len=24
3,715,126 >>> mbox cmd response data (40 bytes)
3,715,127 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,514 UART: [rt]cmd =0x44504543, len=24
3,770,893 >>> mbox cmd response data (40 bytes)
3,770,894 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,800,383 UART: [rt]cmd =0x44504543, len=24
3,826,726 >>> mbox cmd response data (40 bytes)
3,826,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,356 UART: [rt]cmd =0x44504543, len=24
3,883,019 >>> mbox cmd response data (40 bytes)
3,883,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,395 UART: [rt]cmd =0x44504543, len=24
3,938,740 >>> mbox cmd response data (40 bytes)
3,938,741 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,264 UART: [rt]cmd =0x44504543, len=24
3,975,157 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
893,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,776 UART: [kat] ++
897,928 UART: [kat] sha1
902,326 UART: [kat] SHA2-256
904,266 UART: [kat] SHA2-384
907,151 UART: [kat] SHA2-512-ACC
909,052 UART: [kat] ECC-384
918,971 UART: [kat] HMAC-384Kdf
923,519 UART: [kat] LMS
1,171,847 UART: [kat] --
1,172,796 UART: [cold-reset] ++
1,173,358 UART: [fht] FHT @ 0x50003400
1,176,091 UART: [idev] ++
1,176,259 UART: [idev] CDI.KEYID = 6
1,176,619 UART: [idev] SUBJECT.KEYID = 7
1,177,043 UART: [idev] UDS.KEYID = 0
1,177,388 ready_for_fw is high
1,177,388 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,763 UART: [idev] Erasing UDS.KEYID = 0
1,201,830 UART: [idev] Sha1 KeyId Algorithm
1,210,300 UART: [idev] --
1,211,308 UART: [ldev] ++
1,211,476 UART: [ldev] CDI.KEYID = 6
1,211,839 UART: [ldev] SUBJECT.KEYID = 5
1,212,265 UART: [ldev] AUTHORITY.KEYID = 7
1,212,728 UART: [ldev] FE.KEYID = 1
1,217,772 UART: [ldev] Erasing FE.KEYID = 1
1,243,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,356 UART: [ldev] --
1,283,697 UART: [fwproc] Wait for Commands...
1,284,419 UART: [fwproc] Recv command 0x46574c44
1,285,147 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,303 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,194 >>> mbox cmd response: success
2,773,438 UART: [afmc] ++
2,773,606 UART: [afmc] CDI.KEYID = 6
2,773,968 UART: [afmc] SUBJECT.KEYID = 7
2,774,393 UART: [afmc] AUTHORITY.KEYID = 5
2,810,144 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,968 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,687 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,321 UART: [afmc] --
2,853,233 UART: [cold-reset] --
2,853,971 UART: [state] Locking Datavault
2,855,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,790 UART: [state] Locking ICCM
2,856,324 UART: [exit] Launching FMC @ 0x40000130
2,861,653 UART:
2,861,669 UART: Running Caliptra FMC ...
2,862,077 UART:
2,862,220 UART: [state] CFI Enabled
2,872,981 UART: [fht] FMC Alias Private Key: 7
2,981,136 UART: [art] Extend RT PCRs Done
2,981,564 UART: [art] Lock RT PCRs Done
2,983,472 UART: [art] Populate DV Done
2,991,935 UART: [fht] FMC Alias Private Key: 7
2,993,025 UART: [art] Derive CDI
2,993,305 UART: [art] Store in in slot 0x4
3,078,580 UART: [art] Derive Key Pair
3,078,940 UART: [art] Store priv key in slot 0x5
3,092,552 UART: [art] Derive Key Pair - Done
3,107,019 UART: [art] Signing Cert with AUTHO
3,107,499 UART: RITY.KEYID = 7
3,123,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,176 UART: [art] PUB.X = 3FE5590BD40BE531D0855B7BAC5B54A1BE182E7EE75CB1A4661966701538BBB98BB2F13AAAD2230FDED2B87DE21472E3
3,130,953 UART: [art] PUB.Y = 2C480D0E9209824F1D4A795B741713F04875AE65AF7DC48E2254C5A8C40D4FAB1F3D348FA273D11257561EED6BDC1B53
3,137,897 UART: [art] SIG.R = 61115564239BC7B680FDB88F83B95D9E82E5D371433AC892DCF5A94EE21CDAAF59488CE45BB442342617EB48A7413FE2
3,144,673 UART: [art] SIG.S = CE28682962A09010B918B737C157436DAFC7478E730CFCB4F0D2B4CA2D844C8E66BD9DF4E8F992930B6735B0D1DAEBAE
3,168,604 UART: Caliptra RT
3,168,949 UART: [state] CFI Enabled
3,276,926 UART: [rt] RT listening for mailbox commands...
3,277,596 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,610 UART: [rt]cmd =0x44504543, len=24
3,333,915 >>> mbox cmd response data (40 bytes)
3,333,916 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,363,443 UART: [rt]cmd =0x44504543, len=24
3,389,284 >>> mbox cmd response data (40 bytes)
3,389,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,418,908 UART: [rt]cmd =0x44504543, len=24
3,444,995 >>> mbox cmd response data (40 bytes)
3,444,996 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,474,545 UART: [rt]cmd =0x44504543, len=24
3,500,780 >>> mbox cmd response data (40 bytes)
3,500,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,158 UART: [rt]cmd =0x44504543, len=24
3,556,323 >>> mbox cmd response data (40 bytes)
3,556,324 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,781 UART: [rt]cmd =0x44504543, len=24
3,612,522 >>> mbox cmd response data (40 bytes)
3,612,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,936 UART: [rt]cmd =0x44504543, len=24
3,668,195 >>> mbox cmd response data (40 bytes)
3,668,196 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,639 UART: [rt]cmd =0x44504543, len=24
3,724,354 >>> mbox cmd response data (40 bytes)
3,724,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,753,768 UART: [rt]cmd =0x44504543, len=24
3,780,093 >>> mbox cmd response data (40 bytes)
3,780,094 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,567 UART: [rt]cmd =0x44504543, len=24
3,836,006 >>> mbox cmd response data (40 bytes)
3,836,007 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,865,644 UART: [rt]cmd =0x44504543, len=24
3,892,065 >>> mbox cmd response data (40 bytes)
3,892,066 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,625 UART: [rt]cmd =0x44504543, len=24
3,948,262 >>> mbox cmd response data (40 bytes)
3,948,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,977,762 UART: [rt]cmd =0x44504543, len=24
4,004,389 >>> mbox cmd response data (40 bytes)
4,004,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,033,697 UART: [rt]cmd =0x44504543, len=24
4,060,392 >>> mbox cmd response data (40 bytes)
4,060,393 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,040 UART: [rt]cmd =0x44504543, len=24
4,116,461 >>> mbox cmd response data (40 bytes)
4,116,462 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,145,759 UART: [rt]cmd =0x44504543, len=24
4,152,986 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,976 ready_for_fw is high
1,060,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,247 >>> mbox cmd response: success
2,687,941 UART:
2,687,957 UART: Running Caliptra FMC ...
2,688,365 UART:
2,688,508 UART: [state] CFI Enabled
2,699,097 UART: [fht] FMC Alias Private Key: 7
2,807,262 UART: [art] Extend RT PCRs Done
2,807,690 UART: [art] Lock RT PCRs Done
2,808,910 UART: [art] Populate DV Done
2,817,231 UART: [fht] FMC Alias Private Key: 7
2,818,407 UART: [art] Derive CDI
2,818,687 UART: [art] Store in in slot 0x4
2,904,564 UART: [art] Derive Key Pair
2,904,924 UART: [art] Store priv key in slot 0x5
2,918,858 UART: [art] Derive Key Pair - Done
2,933,624 UART: [art] Signing Cert with AUTHO
2,934,104 UART: RITY.KEYID = 7
2,949,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,241 UART: [art] PUB.X = 1C9C594F43FB69303E59B468621C2F7345D525D1C89DC7A15233DB611399943A2527128CF4313ED6523B5C1E2B2C0B55
2,957,002 UART: [art] PUB.Y = 361559E109555FB5CDEFED4F3E4DAF690F271E676D43B4268BF91AD4C2E17ED9AD1C99051D690E98214839D40F636FF7
2,963,945 UART: [art] SIG.R = 75F181228B9BDA31102C38483E7F71E535126FB244A9125289B52A06F58C57336CDD64555C5582B586029188FD76C7C3
2,970,697 UART: [art] SIG.S = E7792B1FAE06C78E880BB5FEBAB0D29B11B78E55318A77DA3F40DDB776A6FC9532817A221D212960E2DF21F47784E5A0
2,994,440 UART: Caliptra RT
2,994,785 UART: [state] CFI Enabled
3,102,748 UART: [rt] RT listening for mailbox commands...
3,103,418 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,172 UART: [rt]cmd =0x44504543, len=24
3,160,145 >>> mbox cmd response data (40 bytes)
3,160,146 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,725 UART: [rt]cmd =0x44504543, len=24
3,215,448 >>> mbox cmd response data (40 bytes)
3,215,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,244,824 UART: [rt]cmd =0x44504543, len=24
3,271,555 >>> mbox cmd response data (40 bytes)
3,271,556 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,237 UART: [rt]cmd =0x44504543, len=24
3,327,770 >>> mbox cmd response data (40 bytes)
3,327,771 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,266 UART: [rt]cmd =0x44504543, len=24
3,383,591 >>> mbox cmd response data (40 bytes)
3,383,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,412,935 UART: [rt]cmd =0x44504543, len=24
3,439,510 >>> mbox cmd response data (40 bytes)
3,439,511 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,468,784 UART: [rt]cmd =0x44504543, len=24
3,494,567 >>> mbox cmd response data (40 bytes)
3,494,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,071 UART: [rt]cmd =0x44504543, len=24
3,550,196 >>> mbox cmd response data (40 bytes)
3,550,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,516 UART: [rt]cmd =0x44504543, len=24
3,605,277 >>> mbox cmd response data (40 bytes)
3,605,278 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,723 UART: [rt]cmd =0x44504543, len=24
3,660,728 >>> mbox cmd response data (40 bytes)
3,660,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,334 UART: [rt]cmd =0x44504543, len=24
3,716,243 >>> mbox cmd response data (40 bytes)
3,716,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,745,667 UART: [rt]cmd =0x44504543, len=24
3,772,188 >>> mbox cmd response data (40 bytes)
3,772,189 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,801,688 UART: [rt]cmd =0x44504543, len=24
3,827,819 >>> mbox cmd response data (40 bytes)
3,827,820 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,857,593 UART: [rt]cmd =0x44504543, len=24
3,883,422 >>> mbox cmd response data (40 bytes)
3,883,423 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,898 UART: [rt]cmd =0x44504543, len=24
3,939,147 >>> mbox cmd response data (40 bytes)
3,939,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,637 UART: [rt]cmd =0x44504543, len=24
3,975,812 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Unprovisioned
85,533 UART: [state] DebugLocked = No
86,135 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,412 UART: [kat] LMS
1,168,724 UART: [kat] --
1,169,507 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,174,053 ready_for_fw is high
1,174,053 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,198,937 UART: [idev] Sha1 KeyId Algorithm
1,207,871 UART: [idev] --
1,208,848 UART: [ldev] ++
1,209,016 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,807 UART: [ldev] AUTHORITY.KEYID = 7
1,210,270 UART: [ldev] FE.KEYID = 1
1,215,586 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,890 UART: [ldev] --
1,281,254 UART: [fwproc] Wait for Commands...
1,281,907 UART: [fwproc] Recv command 0x46574c44
1,282,640 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,007 >>> mbox cmd response: success
2,771,114 UART: [afmc] ++
2,771,282 UART: [afmc] CDI.KEYID = 6
2,771,645 UART: [afmc] SUBJECT.KEYID = 7
2,772,071 UART: [afmc] AUTHORITY.KEYID = 5
2,808,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,678 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,441 UART: [afmc] --
2,851,399 UART: [cold-reset] --
2,852,371 UART: [state] Locking Datavault
2,853,368 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,972 UART: [state] Locking ICCM
2,854,646 UART: [exit] Launching FMC @ 0x40000130
2,859,975 UART:
2,859,991 UART: Running Caliptra FMC ...
2,860,399 UART:
2,860,453 UART: [state] CFI Enabled
2,870,918 UART: [fht] FMC Alias Private Key: 7
2,979,075 UART: [art] Extend RT PCRs Done
2,979,503 UART: [art] Lock RT PCRs Done
2,981,067 UART: [art] Populate DV Done
2,989,180 UART: [fht] FMC Alias Private Key: 7
2,990,236 UART: [art] Derive CDI
2,990,516 UART: [art] Store in in slot 0x4
3,076,277 UART: [art] Derive Key Pair
3,076,637 UART: [art] Store priv key in slot 0x5
3,089,525 UART: [art] Derive Key Pair - Done
3,103,920 UART: [art] Signing Cert with AUTHO
3,104,400 UART: RITY.KEYID = 7
3,119,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,655 UART: [art] PUB.X = E5486049FCA3CDE1FFEF2FF123A6FD1758501229FD6EEAB951DC3DAC93282527AD9FA637012A72083C84D0FD3328689B
3,127,431 UART: [art] PUB.Y = 14D33CE3DCA47DBC96888F7ACB8EB19BF4109313564065F49247EF6924102DEF4CF6B371D1EB3261954345FF289E1779
3,134,383 UART: [art] SIG.R = E2A8EC3C2B27947461062639A3307E475AB0F980CBD373F9E7A1F32549D22D0DD98DD0FF9F018201DE874B3ECEFA90B1
3,141,151 UART: [art] SIG.S = A681300005010560A0EB6171D90E0111C16DA4C03A90466D4196686BD03126FF52D4575D5AA2FDD341EBBC80938E9C4B
3,164,663 UART: Caliptra RT
3,164,916 UART: [state] CFI Enabled
3,272,872 UART: [rt] RT listening for mailbox commands...
3,273,542 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,618 UART: [rt]cmd =0x44504543, len=24
3,330,059 >>> mbox cmd response data (40 bytes)
3,330,060 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,515 UART: [rt]cmd =0x44504543, len=24
3,385,026 >>> mbox cmd response data (40 bytes)
3,385,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,414,470 UART: [rt]cmd =0x44504543, len=24
3,440,989 >>> mbox cmd response data (40 bytes)
3,440,990 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,470,473 UART: [rt]cmd =0x44504543, len=24
3,496,884 >>> mbox cmd response data (40 bytes)
3,496,885 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,262 UART: [rt]cmd =0x44504543, len=24
3,552,463 >>> mbox cmd response data (40 bytes)
3,552,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,691 UART: [rt]cmd =0x44504543, len=24
3,608,100 >>> mbox cmd response data (40 bytes)
3,608,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,746 UART: [rt]cmd =0x44504543, len=24
3,663,643 >>> mbox cmd response data (40 bytes)
3,663,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,693,129 UART: [rt]cmd =0x44504543, len=24
3,719,130 >>> mbox cmd response data (40 bytes)
3,719,131 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,504 UART: [rt]cmd =0x44504543, len=24
3,775,163 >>> mbox cmd response data (40 bytes)
3,775,164 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,804,587 UART: [rt]cmd =0x44504543, len=24
3,830,998 >>> mbox cmd response data (40 bytes)
3,830,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,612 UART: [rt]cmd =0x44504543, len=24
3,886,785 >>> mbox cmd response data (40 bytes)
3,886,786 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,916,249 UART: [rt]cmd =0x44504543, len=24
3,942,016 >>> mbox cmd response data (40 bytes)
3,942,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,432 UART: [rt]cmd =0x44504543, len=24
3,998,019 >>> mbox cmd response data (40 bytes)
3,998,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,027,435 UART: [rt]cmd =0x44504543, len=24
4,053,818 >>> mbox cmd response data (40 bytes)
4,053,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,182 UART: [rt]cmd =0x44504543, len=24
4,109,339 >>> mbox cmd response data (40 bytes)
4,109,340 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,138,715 UART: [rt]cmd =0x44504543, len=24
4,145,712 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,530 ready_for_fw is high
1,056,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,243 >>> mbox cmd response: success
2,683,281 UART:
2,683,297 UART: Running Caliptra FMC ...
2,683,705 UART:
2,683,759 UART: [state] CFI Enabled
2,694,246 UART: [fht] FMC Alias Private Key: 7
2,802,167 UART: [art] Extend RT PCRs Done
2,802,595 UART: [art] Lock RT PCRs Done
2,804,161 UART: [art] Populate DV Done
2,812,280 UART: [fht] FMC Alias Private Key: 7
2,813,352 UART: [art] Derive CDI
2,813,632 UART: [art] Store in in slot 0x4
2,899,351 UART: [art] Derive Key Pair
2,899,711 UART: [art] Store priv key in slot 0x5
2,913,241 UART: [art] Derive Key Pair - Done
2,927,727 UART: [art] Signing Cert with AUTHO
2,928,207 UART: RITY.KEYID = 7
2,943,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,086 UART: [art] PUB.X = D344BE558F7E8F079CB9E817F59EB2802F2D2DA82DADF03E605810EB340569F3667DFCEA57BF95E70FC8F94B064FD86C
2,950,860 UART: [art] PUB.Y = 7C6232B926DFCB8EECD614A2D2BCEACD5727754AC61C227B6CA6C6D77A109B2891B393DE930D83DD3BD87FD2AD188470
2,957,825 UART: [art] SIG.R = DA26EE17D4C8BDC3AEE9622C75E73AB2926911FB088A7115E30C6A8CC4D9E87D7137C9711C1240306F8DE9E1ACB6DF7B
2,964,605 UART: [art] SIG.S = DD8D2B6C9845E62AAE4F389ECC86BBA42C5BFB3DFC4760A3D81F25E70C620908EAE46A866D816EC62401BAB6B287422C
2,988,692 UART: Caliptra RT
2,988,945 UART: [state] CFI Enabled
3,096,935 UART: [rt] RT listening for mailbox commands...
3,097,605 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,245 UART: [rt]cmd =0x44504543, len=24
3,153,348 >>> mbox cmd response data (40 bytes)
3,153,349 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,784 UART: [rt]cmd =0x44504543, len=24
3,209,269 >>> mbox cmd response data (40 bytes)
3,209,270 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,238,737 UART: [rt]cmd =0x44504543, len=24
3,264,830 >>> mbox cmd response data (40 bytes)
3,264,831 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,294,510 UART: [rt]cmd =0x44504543, len=24
3,320,729 >>> mbox cmd response data (40 bytes)
3,320,730 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,350,297 UART: [rt]cmd =0x44504543, len=24
3,376,444 >>> mbox cmd response data (40 bytes)
3,376,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,870 UART: [rt]cmd =0x44504543, len=24
3,432,591 >>> mbox cmd response data (40 bytes)
3,432,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,219 UART: [rt]cmd =0x44504543, len=24
3,488,594 >>> mbox cmd response data (40 bytes)
3,488,595 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,042 UART: [rt]cmd =0x44504543, len=24
3,544,241 >>> mbox cmd response data (40 bytes)
3,544,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,783 UART: [rt]cmd =0x44504543, len=24
3,599,372 >>> mbox cmd response data (40 bytes)
3,599,373 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,628,902 UART: [rt]cmd =0x44504543, len=24
3,654,999 >>> mbox cmd response data (40 bytes)
3,655,000 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,684,665 UART: [rt]cmd =0x44504543, len=24
3,711,046 >>> mbox cmd response data (40 bytes)
3,711,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,400 UART: [rt]cmd =0x44504543, len=24
3,766,721 >>> mbox cmd response data (40 bytes)
3,766,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,796,017 UART: [rt]cmd =0x44504543, len=24
3,822,688 >>> mbox cmd response data (40 bytes)
3,822,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,852,096 UART: [rt]cmd =0x44504543, len=24
3,878,773 >>> mbox cmd response data (40 bytes)
3,878,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,211 UART: [rt]cmd =0x44504543, len=24
3,934,650 >>> mbox cmd response data (40 bytes)
3,934,651 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,176 UART: [rt]cmd =0x44504543, len=24
3,971,327 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
87,002 UART: [state] WD Timer not started. Device not locked for debugging
88,317 UART: [kat] SHA2-256
891,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,996 UART: [kat] ++
896,148 UART: [kat] sha1
900,374 UART: [kat] SHA2-256
902,314 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,534 UART: [cold-reset] ++
1,171,082 UART: [fht] FHT @ 0x50003400
1,173,710 UART: [idev] ++
1,173,878 UART: [idev] CDI.KEYID = 6
1,174,239 UART: [idev] SUBJECT.KEYID = 7
1,174,664 UART: [idev] UDS.KEYID = 0
1,175,010 ready_for_fw is high
1,175,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,356 UART: [idev] Sha1 KeyId Algorithm
1,208,242 UART: [idev] --
1,209,191 UART: [ldev] ++
1,209,359 UART: [ldev] CDI.KEYID = 6
1,209,723 UART: [ldev] SUBJECT.KEYID = 5
1,210,150 UART: [ldev] AUTHORITY.KEYID = 7
1,210,613 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,242,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,923 UART: [ldev] --
1,281,359 UART: [fwproc] Wait for Commands...
1,282,138 UART: [fwproc] Recv command 0x46574c44
1,282,871 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,023 >>> mbox cmd response: success
2,772,258 UART: [afmc] ++
2,772,426 UART: [afmc] CDI.KEYID = 6
2,772,789 UART: [afmc] SUBJECT.KEYID = 7
2,773,215 UART: [afmc] AUTHORITY.KEYID = 5
2,808,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,123 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,852 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,735 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,454 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,345 UART: [afmc] --
2,852,321 UART: [cold-reset] --
2,853,125 UART: [state] Locking Datavault
2,854,438 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,042 UART: [state] Locking ICCM
2,855,586 UART: [exit] Launching FMC @ 0x40000130
2,860,915 UART:
2,860,931 UART: Running Caliptra FMC ...
2,861,339 UART:
2,861,482 UART: [state] CFI Enabled
2,871,999 UART: [fht] FMC Alias Private Key: 7
2,979,682 UART: [art] Extend RT PCRs Done
2,980,110 UART: [art] Lock RT PCRs Done
2,981,570 UART: [art] Populate DV Done
2,990,069 UART: [fht] FMC Alias Private Key: 7
2,991,103 UART: [art] Derive CDI
2,991,383 UART: [art] Store in in slot 0x4
3,076,906 UART: [art] Derive Key Pair
3,077,266 UART: [art] Store priv key in slot 0x5
3,090,150 UART: [art] Derive Key Pair - Done
3,105,130 UART: [art] Signing Cert with AUTHO
3,105,610 UART: RITY.KEYID = 7
3,120,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,205 UART: [art] PUB.X = F92C03739C93B36CF18CB9C17B13C81F531BC8195AAC0943ABCC86E05E2BBCA66683C608365E5E4DF0EDC5AAB2D247BB
3,127,986 UART: [art] PUB.Y = 5C23757A65C860C2529D5D95521258BFAF9EAA2A4021C8D3905984B75475D248B72DB31764290316029B7E3DB4B59926
3,134,920 UART: [art] SIG.R = 616483275C346AC1040F9E6E8AC400F0EDD121C701D577AC4EC0DEF5A0F4DC466A16BED9969E98F7D133B9C65ED5F806
3,141,668 UART: [art] SIG.S = 2C34FB237CE8781EEAAAF08845C1E7F5B79052D60FC96B74E3452ABC971A177C496AC25C75730676C7519F14853DB755
3,165,197 UART: Caliptra RT
3,165,542 UART: [state] CFI Enabled
3,274,751 UART: [rt] RT listening for mailbox commands...
3,275,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,453 UART: [rt]cmd =0x44504543, len=24
3,332,012 >>> mbox cmd response data (40 bytes)
3,332,013 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,504 UART: [rt]cmd =0x44504543, len=24
3,387,327 >>> mbox cmd response data (40 bytes)
3,387,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,416,889 UART: [rt]cmd =0x44504543, len=24
3,442,960 >>> mbox cmd response data (40 bytes)
3,442,961 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,472,314 UART: [rt]cmd =0x44504543, len=24
3,498,705 >>> mbox cmd response data (40 bytes)
3,498,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,275 UART: [rt]cmd =0x44504543, len=24
3,554,420 >>> mbox cmd response data (40 bytes)
3,554,421 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,008 UART: [rt]cmd =0x44504543, len=24
3,610,177 >>> mbox cmd response data (40 bytes)
3,610,178 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,717 UART: [rt]cmd =0x44504543, len=24
3,665,406 >>> mbox cmd response data (40 bytes)
3,665,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,622 UART: [rt]cmd =0x44504543, len=24
3,720,701 >>> mbox cmd response data (40 bytes)
3,720,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,219 UART: [rt]cmd =0x44504543, len=24
3,776,516 >>> mbox cmd response data (40 bytes)
3,776,517 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,806,088 UART: [rt]cmd =0x44504543, len=24
3,832,089 >>> mbox cmd response data (40 bytes)
3,832,090 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,313 UART: [rt]cmd =0x44504543, len=24
3,887,736 >>> mbox cmd response data (40 bytes)
3,887,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,176 UART: [rt]cmd =0x44504543, len=24
3,943,381 >>> mbox cmd response data (40 bytes)
3,943,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,973,073 UART: [rt]cmd =0x44504543, len=24
3,999,370 >>> mbox cmd response data (40 bytes)
3,999,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,028,918 UART: [rt]cmd =0x44504543, len=24
4,054,523 >>> mbox cmd response data (40 bytes)
4,054,524 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,083,851 UART: [rt]cmd =0x44504543, len=24
4,110,158 >>> mbox cmd response data (40 bytes)
4,110,159 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,139,684 UART: [rt]cmd =0x44504543, len=24
4,146,731 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,497 ready_for_fw is high
1,055,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,148 >>> mbox cmd response: success
2,681,798 UART:
2,681,814 UART: Running Caliptra FMC ...
2,682,222 UART:
2,682,365 UART: [state] CFI Enabled
2,692,640 UART: [fht] FMC Alias Private Key: 7
2,800,929 UART: [art] Extend RT PCRs Done
2,801,357 UART: [art] Lock RT PCRs Done
2,802,777 UART: [art] Populate DV Done
2,811,268 UART: [fht] FMC Alias Private Key: 7
2,812,214 UART: [art] Derive CDI
2,812,494 UART: [art] Store in in slot 0x4
2,897,809 UART: [art] Derive Key Pair
2,898,169 UART: [art] Store priv key in slot 0x5
2,911,189 UART: [art] Derive Key Pair - Done
2,925,973 UART: [art] Signing Cert with AUTHO
2,926,453 UART: RITY.KEYID = 7
2,941,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,172 UART: [art] PUB.X = C1C05E23920532A17388759D595DE32A5BFA5DAF5C8BA7AFEA6F0605DBB34E77AD1D909532D11C7579F9C1BD94025D0B
2,948,939 UART: [art] PUB.Y = 5D4601045062C5538E65D14CB610F1F533B0A1FA22D7EF6BFE12F8876398CAE2D77EEC927ABF97DC8248F64D78AEFCE9
2,955,897 UART: [art] SIG.R = EBBD00A0B75B936C56F037BBFC95E0D82C1C6F1360B2D01BDCC72E35003E559E26959F75E9D5EDA33225E2B7F953425E
2,962,635 UART: [art] SIG.S = 2C2D1F425DD611CADC1980C166BFAA420D07E48A22DCBBDA427A55E57A9553ED35E4D2A872F66A68FCAFC5E8D9D37F23
2,987,142 UART: Caliptra RT
2,987,487 UART: [state] CFI Enabled
3,094,706 UART: [rt] RT listening for mailbox commands...
3,095,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,436 UART: [rt]cmd =0x44504543, len=24
3,152,017 >>> mbox cmd response data (40 bytes)
3,152,018 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,181,449 UART: [rt]cmd =0x44504543, len=24
3,207,554 >>> mbox cmd response data (40 bytes)
3,207,555 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,236,964 UART: [rt]cmd =0x44504543, len=24
3,263,267 >>> mbox cmd response data (40 bytes)
3,263,268 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,292,697 UART: [rt]cmd =0x44504543, len=24
3,319,108 >>> mbox cmd response data (40 bytes)
3,319,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,348,582 UART: [rt]cmd =0x44504543, len=24
3,374,921 >>> mbox cmd response data (40 bytes)
3,374,922 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,411 UART: [rt]cmd =0x44504543, len=24
3,430,442 >>> mbox cmd response data (40 bytes)
3,430,443 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,036 UART: [rt]cmd =0x44504543, len=24
3,486,015 >>> mbox cmd response data (40 bytes)
3,486,016 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,387 UART: [rt]cmd =0x44504543, len=24
3,542,160 >>> mbox cmd response data (40 bytes)
3,542,161 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,624 UART: [rt]cmd =0x44504543, len=24
3,597,991 >>> mbox cmd response data (40 bytes)
3,597,992 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,627,575 UART: [rt]cmd =0x44504543, len=24
3,653,706 >>> mbox cmd response data (40 bytes)
3,653,707 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,908 UART: [rt]cmd =0x44504543, len=24
3,708,563 >>> mbox cmd response data (40 bytes)
3,708,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,079 UART: [rt]cmd =0x44504543, len=24
3,764,610 >>> mbox cmd response data (40 bytes)
3,764,611 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,794,410 UART: [rt]cmd =0x44504543, len=24
3,820,381 >>> mbox cmd response data (40 bytes)
3,820,382 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,849,937 UART: [rt]cmd =0x44504543, len=24
3,876,098 >>> mbox cmd response data (40 bytes)
3,876,099 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,905,680 UART: [rt]cmd =0x44504543, len=24
3,931,747 >>> mbox cmd response data (40 bytes)
3,931,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,961,241 UART: [rt]cmd =0x44504543, len=24
3,968,540 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
192,242 UART:
192,615 UART: Running Caliptra ROM ...
193,801 UART:
193,957 UART: [state] CFI Enabled
264,707 UART: [state] LifecycleState = Unprovisioned
266,610 UART: [state] DebugLocked = No
268,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,279 UART: [kat] SHA2-256
442,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,501 UART: [kat] ++
454,022 UART: [kat] sha1
464,758 UART: [kat] SHA2-256
467,482 UART: [kat] SHA2-384
474,529 UART: [kat] SHA2-512-ACC
476,885 UART: [kat] ECC-384
2,768,776 UART: [kat] HMAC-384Kdf
2,801,632 UART: [kat] LMS
3,991,942 UART: [kat] --
3,995,790 UART: [cold-reset] ++
3,996,971 UART: [fht] Storing FHT @ 0x50003400
4,007,801 UART: [idev] ++
4,008,369 UART: [idev] CDI.KEYID = 6
4,009,332 UART: [idev] SUBJECT.KEYID = 7
4,010,572 UART: [idev] UDS.KEYID = 0
4,011,611 ready_for_fw is high
4,011,824 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,137 UART: [idev] Erasing UDS.KEYID = 0
7,350,524 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,673 UART: [idev] --
7,377,472 UART: [ldev] ++
7,378,084 UART: [ldev] CDI.KEYID = 6
7,379,168 UART: [ldev] SUBJECT.KEYID = 5
7,380,322 UART: [ldev] AUTHORITY.KEYID = 7
7,381,502 UART: [ldev] FE.KEYID = 1
7,425,088 UART: [ldev] Erasing FE.KEYID = 1
10,757,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,102,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,136,856 UART: [ldev] --
13,140,773 UART: [fwproc] Waiting for Commands...
13,143,171 UART: [fwproc] Received command 0x46574c44
13,145,352 UART: [fwproc] Received Image of size 113844 bytes
17,198,040 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,544 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,655,729 >>> mbox cmd response: success
17,660,363 UART: [afmc] ++
17,660,966 UART: [afmc] CDI.KEYID = 6
17,661,984 UART: [afmc] SUBJECT.KEYID = 7
17,663,138 UART: [afmc] AUTHORITY.KEYID = 5
21,030,006 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,334,285 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,336,543 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,350,986 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,365,796 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,380,237 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,401,241 UART: [afmc] --
23,404,772 UART: [cold-reset] --
23,408,308 UART: [state] Locking Datavault
23,413,981 UART: [state] Locking PCR0, PCR1 and PCR31
23,415,729 UART: [state] Locking ICCM
23,418,301 UART: [exit] Launching FMC @ 0x40000130
23,426,670 UART:
23,426,914 UART: Running Caliptra FMC ...
23,428,004 UART:
23,428,163 UART: [state] CFI Enabled
23,493,368 UART: [fht] FMC Alias Private Key: 7
25,831,738 UART: [art] Extend RT PCRs Done
25,832,979 UART: [art] Lock RT PCRs Done
25,834,866 UART: [art] Populate DV Done
25,840,651 UART: [fht] FMC Alias Private Key: 7
25,842,125 UART: [art] Derive CDI
25,842,894 UART: [art] Store in in slot 0x4
25,902,202 UART: [art] Derive Key Pair
25,903,237 UART: [art] Store priv key in slot 0x5
29,196,264 UART: [art] Derive Key Pair - Done
29,209,319 UART: [art] Signing Cert with AUTHO
29,210,619 UART: RITY.KEYID = 7
31,498,357 UART: [art] Erasing AUTHORITY.KEYID = 7
31,499,861 UART: [art] PUB.X = 449D8218D54C82DD69B580A7FDD18AA21421A725A72532724944DBE0353A79D7FAD2AC888EC1B7CC0C3660BCFFDAAE97
31,507,074 UART: [art] PUB.Y = 210CB17D9E1DF4CDAEAAF6B8712B0F60C1CDD6A43B0FE97F83C1A422A14415A0932DC311EF61ED20A019B9EC8A4FCBD8
31,514,387 UART: [art] SIG.R = 665BD6221FFDD7020870DF49E97EAB0C6E10631591E7566A3F17E954441A97622B77B2F672947E399CC731A9FCEA76CE
31,521,745 UART: [art] SIG.S = 098EEDB9FCBAA51CD5C16FB27A27CC1FB0C2767E4A96CA5FFA014A071C6FD749083EC72736050BC1E3CF636537A99FE5
32,827,389 UART: Caliptra RT
32,828,099 UART: [state] CFI Enabled
32,989,438 UART: [rt] RT listening for mailbox commands...
32,991,557 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,022,109 UART: [rt]cmd =0x49444550, len=8
33,024,538 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,784,816 ready_for_fw is high
3,785,377 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,872,432 >>> mbox cmd response: success
23,569,343 UART:
23,569,743 UART: Running Caliptra FMC ...
23,570,879 UART:
23,571,035 UART: [state] CFI Enabled
23,637,742 UART: [fht] FMC Alias Private Key: 7
25,975,287 UART: [art] Extend RT PCRs Done
25,976,512 UART: [art] Lock RT PCRs Done
25,978,322 UART: [art] Populate DV Done
25,983,679 UART: [fht] FMC Alias Private Key: 7
25,985,269 UART: [art] Derive CDI
25,986,000 UART: [art] Store in in slot 0x4
26,045,469 UART: [art] Derive Key Pair
26,046,479 UART: [art] Store priv key in slot 0x5
29,339,075 UART: [art] Derive Key Pair - Done
29,352,148 UART: [art] Signing Cert with AUTHO
29,353,451 UART: RITY.KEYID = 7
31,640,581 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,090 UART: [art] PUB.X = C05EA33CE1D9E559CD5F494335C8708D10499C97BED286E2E7C5253347EC1BB9E266BA6511C0BF5FD1A47738A4F12A65
31,649,358 UART: [art] PUB.Y = 30DD3BB43EF70E360F1FD47DF7404A15476DFCB19C13E38B4BDBD36CCB4112133A0351E2CF2D2779B730A17D31CF5C91
31,656,596 UART: [art] SIG.R = B7CB35784048AC8392DEE1D97ED07FF603FDB63B69A7856369C837120B9AE80F27CBF0F8385F38271587049C77DD615B
31,663,952 UART: [art] SIG.S = 2977CF89B406E2F38B39495022FCA639FC36040C32B6A5435664942083A386ECE56145F661CE9EED44296745FC13FA6E
32,968,773 UART: Caliptra RT
32,969,474 UART: [state] CFI Enabled
33,127,989 UART: [rt] RT listening for mailbox commands...
33,130,347 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,160,483 UART: [rt]cmd =0x49444550, len=8
33,162,922 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,570 UART:
192,930 UART: Running Caliptra ROM ...
194,134 UART:
603,842 UART: [state] CFI Enabled
619,211 UART: [state] LifecycleState = Unprovisioned
621,171 UART: [state] DebugLocked = No
624,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,558 UART: [kat] SHA2-256
798,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,821 UART: [kat] ++
809,274 UART: [kat] sha1
820,578 UART: [kat] SHA2-256
823,304 UART: [kat] SHA2-384
829,901 UART: [kat] SHA2-512-ACC
832,236 UART: [kat] ECC-384
3,117,054 UART: [kat] HMAC-384Kdf
3,129,018 UART: [kat] LMS
4,319,088 UART: [kat] --
4,323,032 UART: [cold-reset] ++
4,323,905 UART: [fht] Storing FHT @ 0x50003400
4,336,376 UART: [idev] ++
4,336,950 UART: [idev] CDI.KEYID = 6
4,337,869 UART: [idev] SUBJECT.KEYID = 7
4,339,118 UART: [idev] UDS.KEYID = 0
4,340,165 ready_for_fw is high
4,340,402 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,380 UART: [idev] Erasing UDS.KEYID = 0
7,623,745 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,582 UART: [idev] --
7,651,520 UART: [ldev] ++
7,652,095 UART: [ldev] CDI.KEYID = 6
7,653,120 UART: [ldev] SUBJECT.KEYID = 5
7,654,279 UART: [ldev] AUTHORITY.KEYID = 7
7,655,511 UART: [ldev] FE.KEYID = 1
7,665,850 UART: [ldev] Erasing FE.KEYID = 1
10,953,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,562 UART: [ldev] --
13,313,422 UART: [fwproc] Waiting for Commands...
13,316,065 UART: [fwproc] Received command 0x46574c44
13,318,250 UART: [fwproc] Received Image of size 113844 bytes
17,366,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,707 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,831,513 >>> mbox cmd response: success
17,835,111 UART: [afmc] ++
17,835,716 UART: [afmc] CDI.KEYID = 6
17,836,629 UART: [afmc] SUBJECT.KEYID = 7
17,837,905 UART: [afmc] AUTHORITY.KEYID = 5
21,152,238 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,855 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,451,105 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,500 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,302 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,805 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,699 UART: [afmc] --
23,520,046 UART: [cold-reset] --
23,525,635 UART: [state] Locking Datavault
23,529,962 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,711 UART: [state] Locking ICCM
23,533,809 UART: [exit] Launching FMC @ 0x40000130
23,542,205 UART:
23,542,450 UART: Running Caliptra FMC ...
23,543,554 UART:
23,543,715 UART: [state] CFI Enabled
23,552,034 UART: [fht] FMC Alias Private Key: 7
25,882,778 UART: [art] Extend RT PCRs Done
25,883,997 UART: [art] Lock RT PCRs Done
25,885,731 UART: [art] Populate DV Done
25,890,826 UART: [fht] FMC Alias Private Key: 7
25,892,361 UART: [art] Derive CDI
25,893,129 UART: [art] Store in in slot 0x4
25,935,830 UART: [art] Derive Key Pair
25,936,831 UART: [art] Store priv key in slot 0x5
29,179,000 UART: [art] Derive Key Pair - Done
29,191,939 UART: [art] Signing Cert with AUTHO
29,193,239 UART: RITY.KEYID = 7
31,472,226 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,739 UART: [art] PUB.X = 0B91756CC4730839883C409BC5BA65F4B158452678BC24631536ECBB394E45FDF5D0D85A10ED8C4C51262705FA08A138
31,480,952 UART: [art] PUB.Y = 2C55DF486F353885347D3FEA781B60F788F63E7721C636C14EFD9202A3827CC1FA14A2AB002BAD53DBCC528491022FC9
31,488,209 UART: [art] SIG.R = 0C0824959EA20D6353151D25D7D9D051D6AC468FE85D2D31BCA4D756D0279BA48325467C3B17BE522D63F4104349828E
31,495,547 UART: [art] SIG.S = C5DD11001ACED00ACBA213664615CF30A9C4B24197EF6D5313F4586515F7D2412EA029B770FF02B27F54C231EC081FE0
32,800,472 UART: Caliptra RT
32,801,174 UART: [state] CFI Enabled
32,918,447 UART: [rt] RT listening for mailbox commands...
32,920,890 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
32,951,197 UART: [rt]cmd =0x49444550, len=8
32,953,270 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,801 writing to cptra_bootfsm_go
4,130,214 ready_for_fw is high
4,130,791 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,538 >>> mbox cmd response: success
23,704,895 UART:
23,705,294 UART: Running Caliptra FMC ...
23,706,435 UART:
23,706,595 UART: [state] CFI Enabled
23,714,441 UART: [fht] FMC Alias Private Key: 7
26,045,293 UART: [art] Extend RT PCRs Done
26,046,518 UART: [art] Lock RT PCRs Done
26,048,095 UART: [art] Populate DV Done
26,053,405 UART: [fht] FMC Alias Private Key: 7
26,055,040 UART: [art] Derive CDI
26,055,863 UART: [art] Store in in slot 0x4
26,098,384 UART: [art] Derive Key Pair
26,099,425 UART: [art] Store priv key in slot 0x5
29,341,552 UART: [art] Derive Key Pair - Done
29,354,501 UART: [art] Signing Cert with AUTHO
29,355,810 UART: RITY.KEYID = 7
31,635,568 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,078 UART: [art] PUB.X = 97811434F5493D6BB0D8146BB5FF0CCB33FF786B62086FEB9A19B2AE8871712188901057EBE7C31C3B46788CEBD16A6A
31,644,337 UART: [art] PUB.Y = 719A68E5EB7667A6F5BD70D16E75EB14F50F4A2BB2369CE79BD8117CD454FA7B114057EA85028FC98A8ABFC4FAC75C0A
31,651,576 UART: [art] SIG.R = 23924CDAED4C41FFCE627B2B99C13848BCBD174134A135EB0BD141032E58B6B0086B45AD2C5B3825ACE2374944D69036
31,658,980 UART: [art] SIG.S = C1B98B0FB2D5DBE98D4BC630C4D2B5EDD2D21D4B5CACE15CED01AA00EFDB4AFF1D40AF9B6AB8F8E94DA724ED1E640551
32,964,302 UART: Caliptra RT
32,965,010 UART: [state] CFI Enabled
33,083,153 UART: [rt] RT listening for mailbox commands...
33,085,499 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,115,705 UART: [rt]cmd =0x49444550, len=8
33,117,808 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
192,163 UART:
192,531 UART: Running Caliptra ROM ...
193,719 UART:
193,871 UART: [state] CFI Enabled
266,158 UART: [state] LifecycleState = Unprovisioned
268,080 UART: [state] DebugLocked = No
270,968 UART: [state] WD Timer not started. Device not locked for debugging
274,509 UART: [kat] SHA2-256
453,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,251 UART: [kat] ++
465,987 UART: [kat] sha1
475,901 UART: [kat] SHA2-256
478,906 UART: [kat] SHA2-384
484,607 UART: [kat] SHA2-512-ACC
487,549 UART: [kat] ECC-384
2,949,113 UART: [kat] HMAC-384Kdf
2,965,173 UART: [kat] LMS
3,494,592 UART: [kat] --
3,497,052 UART: [cold-reset] ++
3,499,276 UART: [fht] FHT @ 0x50003400
3,510,059 UART: [idev] ++
3,510,670 UART: [idev] CDI.KEYID = 6
3,511,560 UART: [idev] SUBJECT.KEYID = 7
3,512,683 UART: [idev] UDS.KEYID = 0
3,513,675 ready_for_fw is high
3,513,895 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,657,398 UART: [idev] Erasing UDS.KEYID = 0
6,020,399 UART: [idev] Sha1 KeyId Algorithm
6,043,901 UART: [idev] --
6,047,741 UART: [ldev] ++
6,048,315 UART: [ldev] CDI.KEYID = 6
6,049,386 UART: [ldev] SUBJECT.KEYID = 5
6,050,501 UART: [ldev] AUTHORITY.KEYID = 7
6,051,680 UART: [ldev] FE.KEYID = 1
6,096,086 UART: [ldev] Erasing FE.KEYID = 1
8,600,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,909 UART: [ldev] --
10,410,454 UART: [fwproc] Wait for Commands...
10,412,825 UART: [fwproc] Recv command 0x46574c44
10,414,940 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,279,191 >>> mbox cmd response: success
14,283,426 UART: [afmc] ++
14,284,027 UART: [afmc] CDI.KEYID = 6
14,284,916 UART: [afmc] SUBJECT.KEYID = 7
14,286,019 UART: [afmc] AUTHORITY.KEYID = 5
16,822,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,433 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,277 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,970 UART: [afmc] --
18,624,931 UART: [cold-reset] --
18,628,222 UART: [state] Locking Datavault
18,634,364 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,075 UART: [state] Locking ICCM
18,638,638 UART: [exit] Launching FMC @ 0x40000130
18,647,036 UART:
18,647,283 UART: Running Caliptra FMC ...
18,648,312 UART:
18,648,456 UART: [state] CFI Enabled
18,708,388 UART: [fht] FMC Alias Private Key: 7
20,472,620 UART: [art] Extend RT PCRs Done
20,473,840 UART: [art] Lock RT PCRs Done
20,475,223 UART: [art] Populate DV Done
20,480,528 UART: [fht] FMC Alias Private Key: 7
20,482,224 UART: [art] Derive CDI
20,482,960 UART: [art] Store in in slot 0x4
20,540,981 UART: [art] Derive Key Pair
20,541,981 UART: [art] Store priv key in slot 0x5
23,004,857 UART: [art] Derive Key Pair - Done
23,018,131 UART: [art] Signing Cert with AUTHO
23,019,443 UART: RITY.KEYID = 7
24,730,674 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,172 UART: [art] PUB.X = B7478CCB687AE8E9DF78791D1AF192ED4B7C745DBF44A428D17BC21B7E98D9CA7B47FE5934DA271C8DC1AA30CC7E2650
24,739,478 UART: [art] PUB.Y = 7B6B46A5284C04546C62A0179318D2C778EEEF5DE6CA53BB3504EDF069844FF81FEDE69820F031EE98D753FDBF2F29A0
24,746,763 UART: [art] SIG.R = 6F6F2AD071C68F79B121F8DD08ABE7A32D90F274108B2612FCAAB9E21906C2D423FA948BAF8129C1EE906E53539AB84C
24,754,199 UART: [art] SIG.S = CCC428F4A1FDD0576B7A9BB519B74D21A053E98B47B3836874A9CC57E98F7D5ABFA317F741E9AEF2F009372F52935246
25,733,076 UART: Caliptra RT
25,733,781 UART: [state] CFI Enabled
25,899,753 UART: [rt] RT listening for mailbox commands...
25,902,110 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,932,433 UART: [rt]cmd =0x49444550, len=8
25,934,855 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,385,310 ready_for_fw is high
3,385,729 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,064,061 >>> mbox cmd response: success
18,339,355 UART:
18,339,770 UART: Running Caliptra FMC ...
18,340,877 UART:
18,341,031 UART: [state] CFI Enabled
18,409,038 UART: [fht] FMC Alias Private Key: 7
20,173,174 UART: [art] Extend RT PCRs Done
20,174,538 UART: [art] Lock RT PCRs Done
20,176,088 UART: [art] Populate DV Done
20,181,393 UART: [fht] FMC Alias Private Key: 7
20,183,094 UART: [art] Derive CDI
20,183,857 UART: [art] Store in in slot 0x4
20,241,336 UART: [art] Derive Key Pair
20,242,338 UART: [art] Store priv key in slot 0x5
22,705,247 UART: [art] Derive Key Pair - Done
22,718,195 UART: [art] Signing Cert with AUTHO
22,719,502 UART: RITY.KEYID = 7
24,430,871 UART: [art] Erasing AUTHORITY.KEYID = 7
24,432,356 UART: [art] PUB.X = 588A48748B76348BBC7A8CB7DC218B3C125D341C0A50684E593B8A99E6601815EB03288959097050938999C2268C7C8D
24,439,586 UART: [art] PUB.Y = D21B3AFF231027C0514350FB54CA7F2C2107383C278B03AEA732E05BC2A272B9C4B98B86EA3A881DED90BA9824A80A92
24,446,886 UART: [art] SIG.R = EC135CE34D54C9E3D0AF262122225E814882CE90A81A5F191150EE891A759528468D91146157544EE8B5EE29A68EC008
24,454,213 UART: [art] SIG.S = 2523474CA021336791CE5A327D813DF3E42D19D9BECD0FF2BFD0FB91842CF93BA7E5907DE613319185F7F3966402BF64
25,432,564 UART: Caliptra RT
25,433,280 UART: [state] CFI Enabled
25,598,979 UART: [rt] RT listening for mailbox commands...
25,601,367 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,631,697 UART: [rt]cmd =0x49444550, len=8
25,633,807 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
192,949 UART:
193,312 UART: Running Caliptra ROM ...
194,412 UART:
604,255 UART: [state] CFI Enabled
617,567 UART: [state] LifecycleState = Unprovisioned
619,389 UART: [state] DebugLocked = No
621,830 UART: [state] WD Timer not started. Device not locked for debugging
625,287 UART: [kat] SHA2-256
804,431 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,006 UART: [kat] ++
816,461 UART: [kat] sha1
827,191 UART: [kat] SHA2-256
830,209 UART: [kat] SHA2-384
837,620 UART: [kat] SHA2-512-ACC
840,558 UART: [kat] ECC-384
3,285,544 UART: [kat] HMAC-384Kdf
3,297,424 UART: [kat] LMS
3,826,898 UART: [kat] --
3,831,752 UART: [cold-reset] ++
3,833,997 UART: [fht] FHT @ 0x50003400
3,845,901 UART: [idev] ++
3,846,493 UART: [idev] CDI.KEYID = 6
3,847,457 UART: [idev] SUBJECT.KEYID = 7
3,848,635 UART: [idev] UDS.KEYID = 0
3,849,564 ready_for_fw is high
3,849,771 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,993,142 UART: [idev] Erasing UDS.KEYID = 0
6,318,494 UART: [idev] Sha1 KeyId Algorithm
6,341,894 UART: [idev] --
6,344,433 UART: [ldev] ++
6,345,001 UART: [ldev] CDI.KEYID = 6
6,345,920 UART: [ldev] SUBJECT.KEYID = 5
6,347,130 UART: [ldev] AUTHORITY.KEYID = 7
6,348,368 UART: [ldev] FE.KEYID = 1
6,359,325 UART: [ldev] Erasing FE.KEYID = 1
8,830,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,542 UART: [ldev] --
10,619,857 UART: [fwproc] Wait for Commands...
10,621,413 UART: [fwproc] Recv command 0x46574c44
10,623,499 UART: [fwproc] Recv'd Img size: 114168 bytes
14,031,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,349 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,489,705 >>> mbox cmd response: success
14,494,269 UART: [afmc] ++
14,494,868 UART: [afmc] CDI.KEYID = 6
14,495,779 UART: [afmc] SUBJECT.KEYID = 7
14,496,995 UART: [afmc] AUTHORITY.KEYID = 5
16,996,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,968 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,798 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,648 UART: [afmc] --
18,794,849 UART: [cold-reset] --
18,798,933 UART: [state] Locking Datavault
18,803,913 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,612 UART: [state] Locking ICCM
18,808,032 UART: [exit] Launching FMC @ 0x40000130
18,816,429 UART:
18,816,661 UART: Running Caliptra FMC ...
18,817,761 UART:
18,817,924 UART: [state] CFI Enabled
18,826,240 UART: [fht] FMC Alias Private Key: 7
20,583,968 UART: [art] Extend RT PCRs Done
20,585,180 UART: [art] Lock RT PCRs Done
20,586,747 UART: [art] Populate DV Done
20,592,162 UART: [fht] FMC Alias Private Key: 7
20,593,809 UART: [art] Derive CDI
20,594,625 UART: [art] Store in in slot 0x4
20,637,222 UART: [art] Derive Key Pair
20,638,259 UART: [art] Store priv key in slot 0x5
23,064,968 UART: [art] Derive Key Pair - Done
23,077,860 UART: [art] Signing Cert with AUTHO
23,079,166 UART: RITY.KEYID = 7
24,784,819 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,299 UART: [art] PUB.X = 889A6DA702AA87D12E394F1B95FB973D741C196A05360574EE7A4870E81E3E2E61585AB4D06DFDCEE59E8AD2135CEC29
24,793,569 UART: [art] PUB.Y = DA3DDBE0D47AA45A96E328A0FBA3C82F56CA7CF0E5DB2C6030C4CE7622A462AFA342652C0C976D1477F3759C7A92CC90
24,800,871 UART: [art] SIG.R = 8B989811D0216E74C623A4AF1E0A60608B1CC5F0F8891B947C6E309F1FF8D09A529016BF40D5C5001414CD394E7BED59
24,808,220 UART: [art] SIG.S = 45EC9E9DA095D4DEFF0D62D79D590869B1E6D98C8681F3292B7BAA10520F083AA2D22E7C669AEFB2405101A3A8CDEDFC
25,787,214 UART: Caliptra RT
25,787,934 UART: [state] CFI Enabled
25,904,623 UART: [rt] RT listening for mailbox commands...
25,906,886 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,937,272 UART: [rt]cmd =0x49444550, len=8
25,939,626 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,722 writing to cptra_bootfsm_go
3,694,507 ready_for_fw is high
3,695,129 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,841 >>> mbox cmd response: success
18,522,320 UART:
18,522,729 UART: Running Caliptra FMC ...
18,523,868 UART:
18,524,031 UART: [state] CFI Enabled
18,531,876 UART: [fht] FMC Alias Private Key: 7
20,288,608 UART: [art] Extend RT PCRs Done
20,289,839 UART: [art] Lock RT PCRs Done
20,291,203 UART: [art] Populate DV Done
20,296,774 UART: [fht] FMC Alias Private Key: 7
20,298,366 UART: [art] Derive CDI
20,299,188 UART: [art] Store in in slot 0x4
20,341,457 UART: [art] Derive Key Pair
20,342,453 UART: [art] Store priv key in slot 0x5
22,769,680 UART: [art] Derive Key Pair - Done
22,782,239 UART: [art] Signing Cert with AUTHO
22,783,547 UART: RITY.KEYID = 7
24,489,093 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,599 UART: [art] PUB.X = 81DA5102FBA99B61BDC0C81859401C90F96455483221292477569DBBAB702463B5EC2C90B28C377297CC54C82FE8B38E
24,497,844 UART: [art] PUB.Y = 9E05281167A758C09F6DB743392875EFA8FE45BF63F946D38CA40F7F868E05D3E40E1C14796A2AD3EC3FB27CEFB7E11B
24,505,145 UART: [art] SIG.R = E1B580BF7AEC20ECB9D236FEEB0FB382D802DF1B9A98C6D098BBB75D005818F8286CC9942C11486D7682AC01823F83B6
24,512,499 UART: [art] SIG.S = 4CABCD11B2B2FC5A07246FE91F2E57726655EEBAE647C718DE52490F8CBC01FF23EABC88F777DE33DCBFAC491BFA50D7
25,491,574 UART: Caliptra RT
25,492,286 UART: [state] CFI Enabled
25,610,198 UART: [rt] RT listening for mailbox commands...
25,612,504 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,642,737 UART: [rt]cmd =0x49444550, len=8
25,644,873 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
192,322 UART:
192,690 UART: Running Caliptra ROM ...
193,875 UART:
194,027 UART: [state] CFI Enabled
264,396 UART: [state] LifecycleState = Unprovisioned
266,834 UART: [state] DebugLocked = No
269,726 UART: [state] WD Timer not started. Device not locked for debugging
274,065 UART: [kat] SHA2-256
463,961 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,779 UART: [kat] ++
475,266 UART: [kat] sha1
487,306 UART: [kat] SHA2-256
490,363 UART: [kat] SHA2-384
496,879 UART: [kat] SHA2-512-ACC
499,477 UART: [kat] ECC-384
2,948,463 UART: [kat] HMAC-384Kdf
2,971,859 UART: [kat] LMS
3,503,603 UART: [kat] --
3,508,873 UART: [cold-reset] ++
3,509,950 UART: [fht] FHT @ 0x50003400
3,521,519 UART: [idev] ++
3,522,259 UART: [idev] CDI.KEYID = 6
3,523,176 UART: [idev] SUBJECT.KEYID = 7
3,524,351 UART: [idev] UDS.KEYID = 0
3,525,278 ready_for_fw is high
3,525,470 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,905 UART: [idev] Erasing UDS.KEYID = 0
6,028,828 UART: [idev] Sha1 KeyId Algorithm
6,050,655 UART: [idev] --
6,055,864 UART: [ldev] ++
6,056,552 UART: [ldev] CDI.KEYID = 6
6,057,465 UART: [ldev] SUBJECT.KEYID = 5
6,058,628 UART: [ldev] AUTHORITY.KEYID = 7
6,059,861 UART: [ldev] FE.KEYID = 1
6,099,847 UART: [ldev] Erasing FE.KEYID = 1
8,605,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,586 UART: [ldev] --
10,412,967 UART: [fwproc] Wait for Commands...
10,414,532 UART: [fwproc] Recv command 0x46574c44
10,416,837 UART: [fwproc] Recv'd Img size: 114168 bytes
13,864,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,281 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,337 >>> mbox cmd response: success
14,604,961 UART: [afmc] ++
14,605,674 UART: [afmc] CDI.KEYID = 6
14,606,923 UART: [afmc] SUBJECT.KEYID = 7
14,608,362 UART: [afmc] AUTHORITY.KEYID = 5
17,148,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,281 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,459 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,619 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,594 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,687 UART: [afmc] --
18,947,633 UART: [cold-reset] --
18,950,159 UART: [state] Locking Datavault
18,956,522 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,683 UART: [state] Locking ICCM
18,961,045 UART: [exit] Launching FMC @ 0x40000130
18,969,705 UART:
18,969,954 UART: Running Caliptra FMC ...
18,971,054 UART:
18,971,220 UART: [state] CFI Enabled
19,028,555 UART: [fht] FMC Alias Private Key: 7
20,791,875 UART: [art] Extend RT PCRs Done
20,793,084 UART: [art] Lock RT PCRs Done
20,794,926 UART: [art] Populate DV Done
20,800,498 UART: [fht] FMC Alias Private Key: 7
20,802,021 UART: [art] Derive CDI
20,802,795 UART: [art] Store in in slot 0x4
20,861,071 UART: [art] Derive Key Pair
20,862,074 UART: [art] Store priv key in slot 0x5
23,324,828 UART: [art] Derive Key Pair - Done
23,337,934 UART: [art] Signing Cert with AUTHO
23,339,242 UART: RITY.KEYID = 7
25,049,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,354 UART: [art] PUB.X = 2A91DB8BC7E005DC881168AA980274B85145F841F10E33B50A97FF861637FD9B6B32A8B1957B8BFFAF8DF7DCAC62352D
25,058,667 UART: [art] PUB.Y = EE1E334751F5DCE96801856DA03BAE7AED12FD9958D3D1EEC7967756FF59A5A9E9C98D9C0849EE4AF3A707FE542AC117
25,065,973 UART: [art] SIG.R = 1F3D3D19C19CAFA8BE0270C2562DFA7053C501A6418E0A94BDE9EF7A5712AF8D48D52EFBB1CE5D8412A526357C21551A
25,073,358 UART: [art] SIG.S = 8E9C5FBCE5895D2B0FAD34B0E7C036398EABB004B38A5B168001D8EA631AE244A358B7CC189315A0BF9E2A8C6EC38984
26,051,814 UART: Caliptra RT
26,052,527 UART: [state] CFI Enabled
26,216,090 UART: [rt] RT listening for mailbox commands...
26,218,352 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,248,822 UART: [rt]cmd =0x49444550, len=8
26,250,915 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,448,900 ready_for_fw is high
3,449,275 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,886 >>> mbox cmd response: success
19,012,465 UART:
19,012,862 UART: Running Caliptra FMC ...
19,014,059 UART:
19,014,237 UART: [state] CFI Enabled
19,082,732 UART: [fht] FMC Alias Private Key: 7
20,846,354 UART: [art] Extend RT PCRs Done
20,847,567 UART: [art] Lock RT PCRs Done
20,849,356 UART: [art] Populate DV Done
20,854,712 UART: [fht] FMC Alias Private Key: 7
20,856,371 UART: [art] Derive CDI
20,857,404 UART: [art] Store in in slot 0x4
20,915,511 UART: [art] Derive Key Pair
20,916,534 UART: [art] Store priv key in slot 0x5
23,379,438 UART: [art] Derive Key Pair - Done
23,392,110 UART: [art] Signing Cert with AUTHO
23,393,414 UART: RITY.KEYID = 7
25,104,469 UART: [art] Erasing AUTHORITY.KEYID = 7
25,105,974 UART: [art] PUB.X = 7818F71019F5D7C38D98F424B8F0375D98E05B8685ECEA2236EA9CE822B4E683DD93BB55D47F2597C869C74AFC04C3F3
25,113,265 UART: [art] PUB.Y = AFF107D0BE623EA0C2702B1E58B51A04ADEE5714A32D29A7BB1F9363EA82E44E9C06F519D5C1416D5A730F25ACEDA036
25,120,536 UART: [art] SIG.R = 0B45E634DEBBC630DA222C7A59A813A420B9B83FCBFD76FEC2BA291B3EAF7B3AA1C4CC7762BFAABFB94DC6C4E68D3CCF
25,127,967 UART: [art] SIG.S = 74843A8C2CB82AFE8C02B10D75A467ECF29BD0A408C420F9853F4DB358A14128673061E31938D4361D8EE92254D858C6
26,106,367 UART: Caliptra RT
26,107,056 UART: [state] CFI Enabled
26,271,360 UART: [rt] RT listening for mailbox commands...
26,273,570 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,303,814 UART: [rt]cmd =0x49444550, len=8
26,306,015 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
192,833 UART:
193,237 UART: Running Caliptra ROM ...
194,377 UART:
604,170 UART: [state] CFI Enabled
616,735 UART: [state] LifecycleState = Unprovisioned
619,132 UART: [state] DebugLocked = No
621,505 UART: [state] WD Timer not started. Device not locked for debugging
625,476 UART: [kat] SHA2-256
815,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,159 UART: [kat] ++
826,606 UART: [kat] sha1
838,407 UART: [kat] SHA2-256
841,493 UART: [kat] SHA2-384
847,835 UART: [kat] SHA2-512-ACC
850,414 UART: [kat] ECC-384
3,290,294 UART: [kat] HMAC-384Kdf
3,303,941 UART: [kat] LMS
3,835,762 UART: [kat] --
3,841,330 UART: [cold-reset] ++
3,843,477 UART: [fht] FHT @ 0x50003400
3,855,731 UART: [idev] ++
3,856,447 UART: [idev] CDI.KEYID = 6
3,857,361 UART: [idev] SUBJECT.KEYID = 7
3,858,606 UART: [idev] UDS.KEYID = 0
3,859,532 ready_for_fw is high
3,859,722 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,115 UART: [idev] Erasing UDS.KEYID = 0
6,339,338 UART: [idev] Sha1 KeyId Algorithm
6,361,436 UART: [idev] --
6,365,967 UART: [ldev] ++
6,366,646 UART: [ldev] CDI.KEYID = 6
6,367,557 UART: [ldev] SUBJECT.KEYID = 5
6,368,712 UART: [ldev] AUTHORITY.KEYID = 7
6,369,961 UART: [ldev] FE.KEYID = 1
6,379,595 UART: [ldev] Erasing FE.KEYID = 1
8,858,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,505 UART: [ldev] --
10,650,636 UART: [fwproc] Wait for Commands...
10,652,303 UART: [fwproc] Recv command 0x46574c44
10,654,609 UART: [fwproc] Recv'd Img size: 114168 bytes
14,109,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,083 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,723 >>> mbox cmd response: success
14,845,302 UART: [afmc] ++
14,846,031 UART: [afmc] CDI.KEYID = 6
14,847,226 UART: [afmc] SUBJECT.KEYID = 7
14,848,715 UART: [afmc] AUTHORITY.KEYID = 5
17,346,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,846 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,193 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,207 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,304 UART: [afmc] --
19,143,734 UART: [cold-reset] --
19,148,632 UART: [state] Locking Datavault
19,152,966 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,156 UART: [state] Locking ICCM
19,157,362 UART: [exit] Launching FMC @ 0x40000130
19,166,035 UART:
19,166,300 UART: Running Caliptra FMC ...
19,167,403 UART:
19,167,565 UART: [state] CFI Enabled
19,175,790 UART: [fht] FMC Alias Private Key: 7
20,932,636 UART: [art] Extend RT PCRs Done
20,933,984 UART: [art] Lock RT PCRs Done
20,935,586 UART: [art] Populate DV Done
20,941,048 UART: [fht] FMC Alias Private Key: 7
20,942,747 UART: [art] Derive CDI
20,943,485 UART: [art] Store in in slot 0x4
20,985,858 UART: [art] Derive Key Pair
20,986,859 UART: [art] Store priv key in slot 0x5
23,413,533 UART: [art] Derive Key Pair - Done
23,426,528 UART: [art] Signing Cert with AUTHO
23,427,833 UART: RITY.KEYID = 7
25,133,467 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,973 UART: [art] PUB.X = 1C6470416399D7B8088E69AC4CD260E991FEAFED361F157AE48C6DE63EEAE780437643D4ABD3D1A56B1A9C747E694FB3
25,142,276 UART: [art] PUB.Y = C2D7E3433EB2B31179AC74BA31CA18E0009D6ED97FCF61C2720E8FE27F9BB6F6944FC10B06566B0D6F98EF332A14C65A
25,149,507 UART: [art] SIG.R = E5552387BAE0C5DD5190DA4D51A6C19684530B3B481D208C3A31966E53E9C34DAE19AD8A9A0F4BB79C71D19EFA7798AC
25,156,949 UART: [art] SIG.S = 73B078672422F9E8F74DD757A452F1D9DBC18660EAACFE38D09E7321DF77617C38C072E29F197EBE6BA0DFF5895505E9
26,135,814 UART: Caliptra RT
26,136,518 UART: [state] CFI Enabled
26,254,008 UART: [rt] RT listening for mailbox commands...
26,256,267 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,286,573 UART: [rt]cmd =0x49444550, len=8
26,288,699 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,589 writing to cptra_bootfsm_go
3,758,581 ready_for_fw is high
3,759,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,965,478 >>> mbox cmd response: success
19,229,144 UART:
19,229,542 UART: Running Caliptra FMC ...
19,230,640 UART:
19,230,795 UART: [state] CFI Enabled
19,238,659 UART: [fht] FMC Alias Private Key: 7
20,995,626 UART: [art] Extend RT PCRs Done
20,996,859 UART: [art] Lock RT PCRs Done
20,998,302 UART: [art] Populate DV Done
21,003,508 UART: [fht] FMC Alias Private Key: 7
21,005,054 UART: [art] Derive CDI
21,005,880 UART: [art] Store in in slot 0x4
21,048,640 UART: [art] Derive Key Pair
21,049,643 UART: [art] Store priv key in slot 0x5
23,476,481 UART: [art] Derive Key Pair - Done
23,489,537 UART: [art] Signing Cert with AUTHO
23,490,852 UART: RITY.KEYID = 7
25,196,155 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,668 UART: [art] PUB.X = D5FBE71FDFBBC1AB7E12347C8B7965868597632E377D079C81987D7BF11A5AE7E37BF2A6A44EBB75FFBEC8492EF2A8E7
25,204,980 UART: [art] PUB.Y = 0D4378371CE1A432457A0154C238E02D240D99E65E1882E3C80B1A7F73E696B3C26E97F9D68C5840DFAEE4DB57A6CCB5
25,212,365 UART: [art] SIG.R = AC100792513D2CA9D1C5B1350A12B18C065101D0F7CB322F95DE62EC87ECA6690EB111D46C3F1605386427E16449C13A
25,219,604 UART: [art] SIG.S = 36B20A1044DA873938D1AB6CD04C9AC0EC53F7EBEC8D0A1284A4B5250BA243996F5A3D86C2B8AD6BE38EB86AB8BFB046
26,198,602 UART: Caliptra RT
26,199,293 UART: [state] CFI Enabled
26,316,240 UART: [rt] RT listening for mailbox commands...
26,318,499 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,349,159 UART: [rt]cmd =0x49444550, len=8
26,351,304 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,937 UART: [kat] SHA2-256
881,868 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,983 UART: [kat] ++
886,135 UART: [kat] sha1
890,461 UART: [kat] SHA2-256
892,399 UART: [kat] SHA2-384
895,134 UART: [kat] SHA2-512-ACC
897,035 UART: [kat] ECC-384
902,386 UART: [kat] HMAC-384Kdf
906,850 UART: [kat] LMS
1,475,046 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,379 UART: [fht] Storing FHT @ 0x50003400
1,479,242 UART: [idev] ++
1,479,410 UART: [idev] CDI.KEYID = 6
1,479,770 UART: [idev] SUBJECT.KEYID = 7
1,480,194 UART: [idev] UDS.KEYID = 0
1,480,539 ready_for_fw is high
1,480,539 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,876 UART: [idev] Erasing UDS.KEYID = 0
1,504,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,390 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,520,945 UART: [ldev] Erasing FE.KEYID = 1
1,545,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,710 UART: [ldev] --
1,585,063 UART: [fwproc] Waiting for Commands...
1,585,832 UART: [fwproc] Received command 0x46574c44
1,586,623 UART: [fwproc] Received Image of size 114168 bytes
2,882,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,572 >>> mbox cmd response: success
3,075,732 UART: [afmc] ++
3,075,900 UART: [afmc] CDI.KEYID = 6
3,076,262 UART: [afmc] SUBJECT.KEYID = 7
3,076,687 UART: [afmc] AUTHORITY.KEYID = 5
3,111,506 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,500 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,280 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,008 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,893 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,583 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,646 UART: [afmc] --
3,154,586 UART: [cold-reset] --
3,155,564 UART: [state] Locking Datavault
3,156,601 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,205 UART: [state] Locking ICCM
3,157,799 UART: [exit] Launching FMC @ 0x40000130
3,163,128 UART:
3,163,144 UART: Running Caliptra FMC ...
3,163,552 UART:
3,163,606 UART: [state] CFI Enabled
3,174,477 UART: [fht] FMC Alias Private Key: 7
3,281,934 UART: [art] Extend RT PCRs Done
3,282,362 UART: [art] Lock RT PCRs Done
3,283,722 UART: [art] Populate DV Done
3,292,059 UART: [fht] FMC Alias Private Key: 7
3,293,057 UART: [art] Derive CDI
3,293,337 UART: [art] Store in in slot 0x4
3,378,960 UART: [art] Derive Key Pair
3,379,320 UART: [art] Store priv key in slot 0x5
3,392,342 UART: [art] Derive Key Pair - Done
3,407,639 UART: [art] Signing Cert with AUTHO
3,408,119 UART: RITY.KEYID = 7
3,422,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,696 UART: [art] PUB.X = 9DC0E4A29AF38DF03488D241F8B10FCF95BC29796313D60CC3CB569FF4BA557679D74CAD6D8A53658D1421E9D59C86D8
3,430,470 UART: [art] PUB.Y = A0DC870B961CF6EF5CA11CE50F2D32A46D0021DBD891331B0E1BF5D8D7C58058F74BE24F1216726082EA5191F2D6D754
3,437,397 UART: [art] SIG.R = 20E8AD5EF7B66C488644BA25A0FFCF00AFCD6337067D64A3BCC553B9546F42DA15897F3F24E9E887492340649F83CA7C
3,444,150 UART: [art] SIG.S = 95E88CCC907601ED60F7DB8023546289F9EE49A15F860D1EBA113FC15E14A3DF5C6EDFAF98FC8243542576A4DB5F4B13
3,468,089 UART: Caliptra RT
3,468,342 UART: [state] CFI Enabled
3,576,591 UART: [rt] RT listening for mailbox commands...
3,577,261 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,167 UART: [rt]cmd =0x49444550, len=8
3,608,996 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,883 ready_for_fw is high
1,361,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,894 >>> mbox cmd response: success
2,986,806 UART:
2,986,822 UART: Running Caliptra FMC ...
2,987,230 UART:
2,987,284 UART: [state] CFI Enabled
2,998,093 UART: [fht] FMC Alias Private Key: 7
3,105,766 UART: [art] Extend RT PCRs Done
3,106,194 UART: [art] Lock RT PCRs Done
3,107,922 UART: [art] Populate DV Done
3,116,103 UART: [fht] FMC Alias Private Key: 7
3,117,155 UART: [art] Derive CDI
3,117,435 UART: [art] Store in in slot 0x4
3,203,202 UART: [art] Derive Key Pair
3,203,562 UART: [art] Store priv key in slot 0x5
3,216,872 UART: [art] Derive Key Pair - Done
3,231,574 UART: [art] Signing Cert with AUTHO
3,232,054 UART: RITY.KEYID = 7
3,247,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,949 UART: [art] PUB.X = 4B000FE570ECF98310C9B52F51AEA37271BAB79915BCF8961739974B23FCAE390398EEE05E47C99D55B12152E77E3FCA
3,254,699 UART: [art] PUB.Y = 61BF78E945A5213AD25881EA58E001D3E2A404B42135A90AD52E6355BC0AE41380B8E7BF561A1FF13111DF17DD5D9907
3,261,638 UART: [art] SIG.R = 046F0D5A307EB3CD13B89D360F9553E00FB82DEEEAFB30D061E3A8487FFE8F5791B74CB9C4F5378010624380265D1459
3,268,400 UART: [art] SIG.S = BE45BED0A084E7412695FDEE6AAC0BDFE263E3CC0A01F234481E097218425E5D308BCCCEF833AC36699E648113DC91EF
3,291,879 UART: Caliptra RT
3,292,132 UART: [state] CFI Enabled
3,399,969 UART: [rt] RT listening for mailbox commands...
3,400,639 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,307 UART: [rt]cmd =0x49444550, len=8
3,432,078 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,118 UART: [kat] SHA2-256
882,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,164 UART: [kat] ++
886,316 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,769 UART: [kat] HMAC-384Kdf
907,507 UART: [kat] LMS
1,475,703 UART: [kat] --
1,476,800 UART: [cold-reset] ++
1,477,136 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 ready_for_fw is high
1,481,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,821 UART: [idev] Erasing UDS.KEYID = 0
1,505,555 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,299 UART: [idev] --
1,515,384 UART: [ldev] ++
1,515,552 UART: [ldev] CDI.KEYID = 6
1,515,915 UART: [ldev] SUBJECT.KEYID = 5
1,516,341 UART: [ldev] AUTHORITY.KEYID = 7
1,516,804 UART: [ldev] FE.KEYID = 1
1,521,926 UART: [ldev] Erasing FE.KEYID = 1
1,547,415 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,349 UART: [ldev] --
1,586,750 UART: [fwproc] Waiting for Commands...
1,587,501 UART: [fwproc] Received command 0x46574c44
1,588,292 UART: [fwproc] Received Image of size 114168 bytes
2,884,052 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,431 >>> mbox cmd response: success
3,077,587 UART: [afmc] ++
3,077,755 UART: [afmc] CDI.KEYID = 6
3,078,117 UART: [afmc] SUBJECT.KEYID = 7
3,078,542 UART: [afmc] AUTHORITY.KEYID = 5
3,114,335 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,687 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,300 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,990 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,643 UART: [afmc] --
3,157,733 UART: [cold-reset] --
3,158,661 UART: [state] Locking Datavault
3,159,902 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,506 UART: [state] Locking ICCM
3,161,020 UART: [exit] Launching FMC @ 0x40000130
3,166,349 UART:
3,166,365 UART: Running Caliptra FMC ...
3,166,773 UART:
3,166,916 UART: [state] CFI Enabled
3,177,621 UART: [fht] FMC Alias Private Key: 7
3,285,768 UART: [art] Extend RT PCRs Done
3,286,196 UART: [art] Lock RT PCRs Done
3,287,838 UART: [art] Populate DV Done
3,296,241 UART: [fht] FMC Alias Private Key: 7
3,297,243 UART: [art] Derive CDI
3,297,523 UART: [art] Store in in slot 0x4
3,382,798 UART: [art] Derive Key Pair
3,383,158 UART: [art] Store priv key in slot 0x5
3,396,514 UART: [art] Derive Key Pair - Done
3,411,548 UART: [art] Signing Cert with AUTHO
3,412,028 UART: RITY.KEYID = 7
3,427,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,889 UART: [art] PUB.X = C4647F09936885A1603C7709E9BFCDE7BD127C7766389DD92975D6D50EA53D1A57C10D20482044981E3283AFA93A00AF
3,434,623 UART: [art] PUB.Y = 47C502439759DBB64F27CA2152E60A58871FE84AD51B69D4E93FCE8F0F6F806EEBB8AEEA23B3ACAB751C2965F570E2CD
3,441,582 UART: [art] SIG.R = 72E97583D9C24551D78E084D4839D6D7C80BD5137752BF30FF95FB50A86707175BDFD705CE3FE3F695E34025C5091C78
3,448,335 UART: [art] SIG.S = 1C4EB0E991ADD69D13EF4F0084E1DDF73CA972D885133351FDFED01E27001B546B7F3265B6270AF919FACEC84EF5B12C
3,472,603 UART: Caliptra RT
3,472,948 UART: [state] CFI Enabled
3,582,320 UART: [rt] RT listening for mailbox commands...
3,582,990 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,820 UART: [rt]cmd =0x49444550, len=8
3,614,795 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,326 ready_for_fw is high
1,363,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,119 >>> mbox cmd response: success
2,988,157 UART:
2,988,173 UART: Running Caliptra FMC ...
2,988,581 UART:
2,988,724 UART: [state] CFI Enabled
2,999,273 UART: [fht] FMC Alias Private Key: 7
3,107,356 UART: [art] Extend RT PCRs Done
3,107,784 UART: [art] Lock RT PCRs Done
3,109,190 UART: [art] Populate DV Done
3,117,467 UART: [fht] FMC Alias Private Key: 7
3,118,455 UART: [art] Derive CDI
3,118,735 UART: [art] Store in in slot 0x4
3,204,532 UART: [art] Derive Key Pair
3,204,892 UART: [art] Store priv key in slot 0x5
3,218,582 UART: [art] Derive Key Pair - Done
3,233,215 UART: [art] Signing Cert with AUTHO
3,233,695 UART: RITY.KEYID = 7
3,249,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,992 UART: [art] PUB.X = 546B32E4E2D244F241CB010B9AE87630B9EF5750ED1103A812C8D07CFE11D81E41E4602BCDB9986082FD2D9BB5438B05
3,256,756 UART: [art] PUB.Y = DFF2D0E0AA5A1F317698787A245EF77363DF9B45B62C2B70EA103E3470F0FFB63914981B618836808A89B0A583E4F4B6
3,263,708 UART: [art] SIG.R = 7C0D862E125A79FDF021C3B626F6296EBA526822B2A255E4DB164F13DAFD11EEF22BD9F17E0A1FD201E9487A6D233151
3,270,479 UART: [art] SIG.S = F8BF1C4FD150FF12F95CEFF874CF9343531E802DDA5A68B180745C8C5E77BA97D73C08B1882DEB862A1BF16A9760F71B
3,294,347 UART: Caliptra RT
3,294,692 UART: [state] CFI Enabled
3,403,503 UART: [rt] RT listening for mailbox commands...
3,404,173 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,749 UART: [rt]cmd =0x49444550, len=8
3,435,690 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
892,982 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,107 UART: [kat] ++
897,259 UART: [kat] sha1
901,353 UART: [kat] SHA2-256
903,293 UART: [kat] SHA2-384
906,126 UART: [kat] SHA2-512-ACC
908,027 UART: [kat] ECC-384
917,622 UART: [kat] HMAC-384Kdf
922,078 UART: [kat] LMS
1,170,406 UART: [kat] --
1,171,371 UART: [cold-reset] ++
1,171,741 UART: [fht] FHT @ 0x50003400
1,174,452 UART: [idev] ++
1,174,620 UART: [idev] CDI.KEYID = 6
1,174,980 UART: [idev] SUBJECT.KEYID = 7
1,175,404 UART: [idev] UDS.KEYID = 0
1,175,749 ready_for_fw is high
1,175,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,586 UART: [idev] Erasing UDS.KEYID = 0
1,200,747 UART: [idev] Sha1 KeyId Algorithm
1,209,199 UART: [idev] --
1,210,365 UART: [ldev] ++
1,210,533 UART: [ldev] CDI.KEYID = 6
1,210,896 UART: [ldev] SUBJECT.KEYID = 5
1,211,322 UART: [ldev] AUTHORITY.KEYID = 7
1,211,785 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,325 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,344 UART: [fwproc] Recv command 0x46574c44
1,284,072 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,326 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,630 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,155 >>> mbox cmd response: success
2,774,237 UART: [afmc] ++
2,774,405 UART: [afmc] CDI.KEYID = 6
2,774,767 UART: [afmc] SUBJECT.KEYID = 7
2,775,192 UART: [afmc] AUTHORITY.KEYID = 5
2,810,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,542 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,270 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,155 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,874 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,800 UART: [afmc] --
2,853,782 UART: [cold-reset] --
2,854,512 UART: [state] Locking Datavault
2,855,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,391 UART: [state] Locking ICCM
2,856,979 UART: [exit] Launching FMC @ 0x40000130
2,862,308 UART:
2,862,324 UART: Running Caliptra FMC ...
2,862,732 UART:
2,862,786 UART: [state] CFI Enabled
2,873,101 UART: [fht] FMC Alias Private Key: 7
2,981,430 UART: [art] Extend RT PCRs Done
2,981,858 UART: [art] Lock RT PCRs Done
2,983,524 UART: [art] Populate DV Done
2,991,669 UART: [fht] FMC Alias Private Key: 7
2,992,825 UART: [art] Derive CDI
2,993,105 UART: [art] Store in in slot 0x4
3,078,446 UART: [art] Derive Key Pair
3,078,806 UART: [art] Store priv key in slot 0x5
3,091,958 UART: [art] Derive Key Pair - Done
3,106,708 UART: [art] Signing Cert with AUTHO
3,107,188 UART: RITY.KEYID = 7
3,122,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,277 UART: [art] PUB.X = E764DB7F1758BD1311294C8703BB7B400D37C20A28639B5D0C84CF4A3442C5B00613265F34692FF3B363E51B50E6BDF2
3,130,032 UART: [art] PUB.Y = F2C12656DF2622B70D2EBC537340188F1204ADEE67206B1E8A7D88A60771759916FB0DE88C70AE714E96393620AA68BE
3,136,970 UART: [art] SIG.R = E3729A2609CA67C89A357454511331F2F277FC7BB11E71131B0823C64FB444BD4721D663B0FDE9087B0132434D475C1D
3,143,722 UART: [art] SIG.S = E349E538A1C73CD0B0184B761CDD5CB0DC0BEAC851652E832B2E065F729C6EB2D18B248C7FA442239B6710EC88A6A8D0
3,167,391 UART: Caliptra RT
3,167,644 UART: [state] CFI Enabled
3,276,260 UART: [rt] RT listening for mailbox commands...
3,276,930 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,740 UART: [rt]cmd =0x49444550, len=8
3,308,631 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,571 ready_for_fw is high
1,060,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,320 >>> mbox cmd response: success
2,686,210 UART:
2,686,226 UART: Running Caliptra FMC ...
2,686,634 UART:
2,686,688 UART: [state] CFI Enabled
2,697,169 UART: [fht] FMC Alias Private Key: 7
2,805,416 UART: [art] Extend RT PCRs Done
2,805,844 UART: [art] Lock RT PCRs Done
2,807,412 UART: [art] Populate DV Done
2,815,513 UART: [fht] FMC Alias Private Key: 7
2,816,681 UART: [art] Derive CDI
2,816,961 UART: [art] Store in in slot 0x4
2,902,970 UART: [art] Derive Key Pair
2,903,330 UART: [art] Store priv key in slot 0x5
2,916,456 UART: [art] Derive Key Pair - Done
2,931,197 UART: [art] Signing Cert with AUTHO
2,931,677 UART: RITY.KEYID = 7
2,946,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,694 UART: [art] PUB.X = 224E78F7352430428DD83361FF0948F0E28844ACAE111C40FE1D757DDF53DCD123D98035E189579322833FCDAF104D52
2,954,459 UART: [art] PUB.Y = 03A948783D65A76F65BBF5585FC98A16C6AB5998B7BD5FA13A7A515CE5F7623AB457533F753CF42CC2C93576539C90C8
2,961,410 UART: [art] SIG.R = 5C800AED81ED7146CCAB89ED9E2F55AC003EE506CEFDAC296FE088DD6D4340D793EC69C6A38B0F94A91CA3355CA513C8
2,968,171 UART: [art] SIG.S = F91EAAC5EA21702F1B0E3176EE66BC6FAB1A29E5949F53E8AC91A79012F1CD925FA614E60D7E7384AC1152D5E488E2F3
2,992,296 UART: Caliptra RT
2,992,549 UART: [state] CFI Enabled
3,100,768 UART: [rt] RT listening for mailbox commands...
3,101,438 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,368 UART: [rt]cmd =0x49444550, len=8
3,133,087 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
893,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,782 UART: [kat] ++
897,934 UART: [kat] sha1
902,168 UART: [kat] SHA2-256
904,108 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,213 UART: [kat] HMAC-384Kdf
922,861 UART: [kat] LMS
1,171,189 UART: [kat] --
1,172,142 UART: [cold-reset] ++
1,172,476 UART: [fht] FHT @ 0x50003400
1,175,145 UART: [idev] ++
1,175,313 UART: [idev] CDI.KEYID = 6
1,175,673 UART: [idev] SUBJECT.KEYID = 7
1,176,097 UART: [idev] UDS.KEYID = 0
1,176,442 ready_for_fw is high
1,176,442 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,191 UART: [idev] Erasing UDS.KEYID = 0
1,201,336 UART: [idev] Sha1 KeyId Algorithm
1,209,874 UART: [idev] --
1,211,004 UART: [ldev] ++
1,211,172 UART: [ldev] CDI.KEYID = 6
1,211,535 UART: [ldev] SUBJECT.KEYID = 5
1,211,961 UART: [ldev] AUTHORITY.KEYID = 7
1,212,424 UART: [ldev] FE.KEYID = 1
1,217,746 UART: [ldev] Erasing FE.KEYID = 1
1,243,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,210 UART: [ldev] --
1,283,607 UART: [fwproc] Wait for Commands...
1,284,323 UART: [fwproc] Recv command 0x46574c44
1,285,051 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,883 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,187 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,868 >>> mbox cmd response: success
2,775,000 UART: [afmc] ++
2,775,168 UART: [afmc] CDI.KEYID = 6
2,775,530 UART: [afmc] SUBJECT.KEYID = 7
2,775,955 UART: [afmc] AUTHORITY.KEYID = 5
2,811,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,753 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,085 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,941 UART: [afmc] --
2,854,951 UART: [cold-reset] --
2,855,831 UART: [state] Locking Datavault
2,856,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,430 UART: [state] Locking ICCM
2,857,932 UART: [exit] Launching FMC @ 0x40000130
2,863,261 UART:
2,863,277 UART: Running Caliptra FMC ...
2,863,685 UART:
2,863,828 UART: [state] CFI Enabled
2,874,877 UART: [fht] FMC Alias Private Key: 7
2,982,192 UART: [art] Extend RT PCRs Done
2,982,620 UART: [art] Lock RT PCRs Done
2,984,408 UART: [art] Populate DV Done
2,992,361 UART: [fht] FMC Alias Private Key: 7
2,993,423 UART: [art] Derive CDI
2,993,703 UART: [art] Store in in slot 0x4
3,079,106 UART: [art] Derive Key Pair
3,079,466 UART: [art] Store priv key in slot 0x5
3,092,788 UART: [art] Derive Key Pair - Done
3,107,990 UART: [art] Signing Cert with AUTHO
3,108,470 UART: RITY.KEYID = 7
3,123,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,115 UART: [art] PUB.X = 3EF26E9A0DAD63F5D006C60BF7EA535D97E7EB9A09FA026418842097EA3A5E7D785FDD26AA02DA850B55F4324B81C2B0
3,130,878 UART: [art] PUB.Y = D9960E17D5EC04665DE7FA734894913999B5FC64A3233DCDBA082DF6DE33B2C4C7B5C9DE459A668C7E8E400613BF7EAC
3,137,830 UART: [art] SIG.R = 5833DDE3D30950B9FE19AC501D9ACDA7EB2D9C00C88279234EF0CF96AF09A3854068317B3FB0072F2FC54880B4DFA8D1
3,144,581 UART: [art] SIG.S = 2511DA3BCCE3A8E968F219F6327EAAF4B927CABDB93157C524CE550EDD13D40756AB4D66AEB705B4B0583B410E900E80
3,168,391 UART: Caliptra RT
3,168,736 UART: [state] CFI Enabled
3,276,493 UART: [rt] RT listening for mailbox commands...
3,277,163 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,817 UART: [rt]cmd =0x49444550, len=8
3,308,694 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,946 ready_for_fw is high
1,059,946 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,147 >>> mbox cmd response: success
2,686,105 UART:
2,686,121 UART: Running Caliptra FMC ...
2,686,529 UART:
2,686,672 UART: [state] CFI Enabled
2,697,439 UART: [fht] FMC Alias Private Key: 7
2,805,316 UART: [art] Extend RT PCRs Done
2,805,744 UART: [art] Lock RT PCRs Done
2,806,994 UART: [art] Populate DV Done
2,815,159 UART: [fht] FMC Alias Private Key: 7
2,816,125 UART: [art] Derive CDI
2,816,405 UART: [art] Store in in slot 0x4
2,902,066 UART: [art] Derive Key Pair
2,902,426 UART: [art] Store priv key in slot 0x5
2,915,958 UART: [art] Derive Key Pair - Done
2,930,834 UART: [art] Signing Cert with AUTHO
2,931,314 UART: RITY.KEYID = 7
2,946,442 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,207 UART: [art] PUB.X = 77AC68BD961DB33880EB924066B9AD0E8C13EDA7B5FF9FE4FF7F74E7F3945D2AF5D9D40866C0650825BBAD49542B5879
2,953,980 UART: [art] PUB.Y = 119578DD9EE4018ED4EE2416FD8AD584E8816D8FB9DB32615A7C41A886A919CFFAC6B742661920C835CB386E4F459427
2,960,931 UART: [art] SIG.R = A198B1270262FB3617186A77A5E581BA41B0AC7ECEAD30D59ABD93AAC4CC62AE2D9E892036917FB6A2CF2CF55B34ACB6
2,967,718 UART: [art] SIG.S = 08B82F6624A32A54A100F6E7238AA2B335A819E43104514E7BE6E921A6C0BE03577535DA9FD4D8E25A8680B16F03B686
2,991,581 UART: Caliptra RT
2,991,926 UART: [state] CFI Enabled
3,099,201 UART: [rt] RT listening for mailbox commands...
3,099,871 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,651 UART: [rt]cmd =0x49444550, len=8
3,131,740 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,749 UART: [fht] FHT @ 0x50003400
1,173,433 UART: [idev] ++
1,173,601 UART: [idev] CDI.KEYID = 6
1,173,962 UART: [idev] SUBJECT.KEYID = 7
1,174,387 UART: [idev] UDS.KEYID = 0
1,174,733 ready_for_fw is high
1,174,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,443 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,770 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,058 UART: [ldev] --
1,281,466 UART: [fwproc] Wait for Commands...
1,282,049 UART: [fwproc] Recv command 0x46574c44
1,282,782 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,128 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,209 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,879 >>> mbox cmd response: success
2,772,042 UART: [afmc] ++
2,772,210 UART: [afmc] CDI.KEYID = 6
2,772,573 UART: [afmc] SUBJECT.KEYID = 7
2,772,999 UART: [afmc] AUTHORITY.KEYID = 5
2,808,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,693 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,422 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,305 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,759 UART: [afmc] --
2,851,733 UART: [cold-reset] --
2,852,527 UART: [state] Locking Datavault
2,853,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,396 UART: [state] Locking ICCM
2,854,978 UART: [exit] Launching FMC @ 0x40000130
2,860,307 UART:
2,860,323 UART: Running Caliptra FMC ...
2,860,731 UART:
2,860,785 UART: [state] CFI Enabled
2,871,252 UART: [fht] FMC Alias Private Key: 7
2,979,251 UART: [art] Extend RT PCRs Done
2,979,679 UART: [art] Lock RT PCRs Done
2,981,311 UART: [art] Populate DV Done
2,989,604 UART: [fht] FMC Alias Private Key: 7
2,990,730 UART: [art] Derive CDI
2,991,010 UART: [art] Store in in slot 0x4
3,076,935 UART: [art] Derive Key Pair
3,077,295 UART: [art] Store priv key in slot 0x5
3,090,355 UART: [art] Derive Key Pair - Done
3,105,168 UART: [art] Signing Cert with AUTHO
3,105,648 UART: RITY.KEYID = 7
3,120,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,655 UART: [art] PUB.X = 8A8CD6AD91F8BD6A77A94ABD47CE4D09672BA0CAEDAEE31EB2CF65BB68E0563AFD572AB11AA98D55BA2584E33FE88662
3,128,450 UART: [art] PUB.Y = A4E54D07FB6412E6674F8EB888AC109A2F5EC7DD766E5339324386D9794D396E9E57A67839B7AA26F6A3BE1C29C30797
3,135,396 UART: [art] SIG.R = 92D2DC57D5A41537DF294D81F644D446DA2279BF49D6871519B5CDCC2A49F2C505053F151F0DFABE637D38D3BA77C3FC
3,142,169 UART: [art] SIG.S = C904E38CB0BE19A5D90113E60A571CC1CBE0595B1361D775381C4581E210254B51475CB604AE2AFCAA79C481F39D26F8
3,166,260 UART: Caliptra RT
3,166,513 UART: [state] CFI Enabled
3,274,639 UART: [rt] RT listening for mailbox commands...
3,275,309 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,191 UART: [rt]cmd =0x49444550, len=8
3,307,092 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,632 ready_for_fw is high
1,055,632 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,163 >>> mbox cmd response: success
2,682,651 UART:
2,682,667 UART: Running Caliptra FMC ...
2,683,075 UART:
2,683,129 UART: [state] CFI Enabled
2,693,396 UART: [fht] FMC Alias Private Key: 7
2,801,745 UART: [art] Extend RT PCRs Done
2,802,173 UART: [art] Lock RT PCRs Done
2,803,693 UART: [art] Populate DV Done
2,811,936 UART: [fht] FMC Alias Private Key: 7
2,812,996 UART: [art] Derive CDI
2,813,276 UART: [art] Store in in slot 0x4
2,898,975 UART: [art] Derive Key Pair
2,899,335 UART: [art] Store priv key in slot 0x5
2,912,915 UART: [art] Derive Key Pair - Done
2,927,680 UART: [art] Signing Cert with AUTHO
2,928,160 UART: RITY.KEYID = 7
2,943,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,181 UART: [art] PUB.X = 58FD5022FEA392164F586CAD4294221CE6A4E9934E01E20D17F3394D7C84F77273BD06DDBBF123242B02884A290920D5
2,950,934 UART: [art] PUB.Y = 0AD56B28537CB06A527A3C40B853B90A4CAEB66F6FEA21D58C3D92FB955BD46A591E44CF5A8BEF683F76CDF406455492
2,957,889 UART: [art] SIG.R = 29F64DA73064962C0F3B3F8297FAEE52464698E525E7ACF818601AE9BD376E62C5ED2D587A791ED6F9156C18DC3981FF
2,964,662 UART: [art] SIG.S = F958979E3939A96C75E634CEF7ED17C2C18F382622FF7F736D5F056944FDC31A44A4A66DE858A3E3E75AF55645252004
2,988,487 UART: Caliptra RT
2,988,740 UART: [state] CFI Enabled
3,096,771 UART: [rt] RT listening for mailbox commands...
3,097,441 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,429 UART: [rt]cmd =0x49444550, len=8
3,129,090 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,728 UART: [kat] ++
895,880 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,929 UART: [kat] HMAC-384Kdf
921,647 UART: [kat] LMS
1,169,959 UART: [kat] --
1,171,014 UART: [cold-reset] ++
1,171,568 UART: [fht] FHT @ 0x50003400
1,174,296 UART: [idev] ++
1,174,464 UART: [idev] CDI.KEYID = 6
1,174,825 UART: [idev] SUBJECT.KEYID = 7
1,175,250 UART: [idev] UDS.KEYID = 0
1,175,596 ready_for_fw is high
1,175,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,380 UART: [idev] Erasing UDS.KEYID = 0
1,200,698 UART: [idev] Sha1 KeyId Algorithm
1,209,562 UART: [idev] --
1,210,673 UART: [ldev] ++
1,210,841 UART: [ldev] CDI.KEYID = 6
1,211,205 UART: [ldev] SUBJECT.KEYID = 5
1,211,632 UART: [ldev] AUTHORITY.KEYID = 7
1,212,095 UART: [ldev] FE.KEYID = 1
1,217,253 UART: [ldev] Erasing FE.KEYID = 1
1,243,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,931 UART: [ldev] --
1,282,419 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,381 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,270 >>> mbox cmd response: success
2,772,389 UART: [afmc] ++
2,772,557 UART: [afmc] CDI.KEYID = 6
2,772,920 UART: [afmc] SUBJECT.KEYID = 7
2,773,346 UART: [afmc] AUTHORITY.KEYID = 5
2,809,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,703 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,004 UART: [afmc] --
2,851,930 UART: [cold-reset] --
2,853,020 UART: [state] Locking Datavault
2,854,085 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,689 UART: [state] Locking ICCM
2,855,359 UART: [exit] Launching FMC @ 0x40000130
2,860,688 UART:
2,860,704 UART: Running Caliptra FMC ...
2,861,112 UART:
2,861,255 UART: [state] CFI Enabled
2,871,884 UART: [fht] FMC Alias Private Key: 7
2,980,297 UART: [art] Extend RT PCRs Done
2,980,725 UART: [art] Lock RT PCRs Done
2,982,027 UART: [art] Populate DV Done
2,990,028 UART: [fht] FMC Alias Private Key: 7
2,991,092 UART: [art] Derive CDI
2,991,372 UART: [art] Store in in slot 0x4
3,077,419 UART: [art] Derive Key Pair
3,077,779 UART: [art] Store priv key in slot 0x5
3,090,613 UART: [art] Derive Key Pair - Done
3,105,367 UART: [art] Signing Cert with AUTHO
3,105,847 UART: RITY.KEYID = 7
3,120,775 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,540 UART: [art] PUB.X = 327B5DD0F68C13FC46A7C1132CC446DE2953B091B1512C63651A80D0A6552865A680A2337AF30B0CF34B8BB6091C4C37
3,128,301 UART: [art] PUB.Y = 5144BD22CF608ECDF914F4452D86946B8CD2231E94F251352BE622089A7C9A668C56CDF75439E973B701248A94D32767
3,135,239 UART: [art] SIG.R = BF3F8A8B83A1951599E213A64D5B33D1F23E4694930BA06B556B668C52AF8E3559BA0A350F702FC848F7013A4D3A8433
3,141,997 UART: [art] SIG.S = 13A6A30D0B8F89C6AEA731FDB5A851635623C2C0ACAAB8D030D1CC18C70BDACA68467CA77BF2CCB1E05AA20F7B5CA736
3,166,074 UART: Caliptra RT
3,166,419 UART: [state] CFI Enabled
3,274,058 UART: [rt] RT listening for mailbox commands...
3,274,728 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,578 UART: [rt]cmd =0x49444550, len=8
3,306,615 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,947 ready_for_fw is high
1,056,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,058 >>> mbox cmd response: success
2,686,958 UART:
2,686,974 UART: Running Caliptra FMC ...
2,687,382 UART:
2,687,525 UART: [state] CFI Enabled
2,698,310 UART: [fht] FMC Alias Private Key: 7
2,806,197 UART: [art] Extend RT PCRs Done
2,806,625 UART: [art] Lock RT PCRs Done
2,807,839 UART: [art] Populate DV Done
2,816,016 UART: [fht] FMC Alias Private Key: 7
2,817,048 UART: [art] Derive CDI
2,817,328 UART: [art] Store in in slot 0x4
2,903,259 UART: [art] Derive Key Pair
2,903,619 UART: [art] Store priv key in slot 0x5
2,916,929 UART: [art] Derive Key Pair - Done
2,932,024 UART: [art] Signing Cert with AUTHO
2,932,504 UART: RITY.KEYID = 7
2,947,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,597 UART: [art] PUB.X = E4773556F9680CB510E4A45031E88EE6FE5BFB2A36315835C2915EBA4D7F656B37E28DF4A9E6976867614351F49B0637
2,955,357 UART: [art] PUB.Y = 6133292E07D21B661E6BC475BDCFACC545528EBCC0B31F0143B7DC8CF2E98E48862765BE1B030173645055AEE99F8E02
2,962,298 UART: [art] SIG.R = 1D7FCAC1EDEA0FAB5105D06BB84F1C026EE26010B55374C6C6559A2D37B3BF28398E9C91D0B96D7561FD3559CD9BB2BD
2,969,077 UART: [art] SIG.S = 11BC5356C8259525B7ED882B3A1D17343B08E5699754FB4ACCDDE0305FEE10027BEDF02E9EA9FB393FAA0FF33E652641
2,992,399 UART: Caliptra RT
2,992,744 UART: [state] CFI Enabled
3,100,473 UART: [rt] RT listening for mailbox commands...
3,101,143 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,949 UART: [rt]cmd =0x49444550, len=8
3,132,834 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,975 UART:
192,339 UART: Running Caliptra ROM ...
193,432 UART:
193,574 UART: [state] CFI Enabled
268,713 UART: [state] LifecycleState = Unprovisioned
270,620 UART: [state] DebugLocked = No
272,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,918 UART: [kat] SHA2-256
446,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,117 UART: [kat] ++
457,560 UART: [kat] sha1
468,377 UART: [kat] SHA2-256
471,099 UART: [kat] SHA2-384
476,094 UART: [kat] SHA2-512-ACC
478,458 UART: [kat] ECC-384
2,769,120 UART: [kat] HMAC-384Kdf
2,800,689 UART: [kat] LMS
3,990,990 UART: [kat] --
3,995,828 UART: [cold-reset] ++
3,997,328 UART: [fht] Storing FHT @ 0x50003400
4,008,940 UART: [idev] ++
4,009,509 UART: [idev] CDI.KEYID = 6
4,010,535 UART: [idev] SUBJECT.KEYID = 7
4,011,705 UART: [idev] UDS.KEYID = 0
4,012,738 ready_for_fw is high
4,012,932 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,112 UART: [idev] Erasing UDS.KEYID = 0
7,343,728 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,178 UART: [idev] --
7,371,140 UART: [ldev] ++
7,371,756 UART: [ldev] CDI.KEYID = 6
7,372,726 UART: [ldev] SUBJECT.KEYID = 5
7,373,933 UART: [ldev] AUTHORITY.KEYID = 7
7,375,153 UART: [ldev] FE.KEYID = 1
7,422,118 UART: [ldev] Erasing FE.KEYID = 1
10,755,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,768 UART: [ldev] --
13,115,188 UART: [fwproc] Waiting for Commands...
13,117,219 UART: [fwproc] Received command 0x46574c44
13,119,423 UART: [fwproc] Received Image of size 113844 bytes
17,171,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,247,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,206 >>> mbox cmd response: success
17,636,936 UART: [afmc] ++
17,637,531 UART: [afmc] CDI.KEYID = 6
17,638,495 UART: [afmc] SUBJECT.KEYID = 7
17,639,705 UART: [afmc] AUTHORITY.KEYID = 5
21,009,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,865 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,310,112 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,522 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,339,340 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,827 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,375,860 UART: [afmc] --
23,378,818 UART: [cold-reset] --
23,384,026 UART: [state] Locking Datavault
23,389,495 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,205 UART: [state] Locking ICCM
23,393,486 UART: [exit] Launching FMC @ 0x40000130
23,401,871 UART:
23,402,106 UART: Running Caliptra FMC ...
23,403,196 UART:
23,403,355 UART: [state] CFI Enabled
23,467,295 UART: [fht] FMC Alias Private Key: 7
25,805,760 UART: [art] Extend RT PCRs Done
25,807,111 UART: [art] Lock RT PCRs Done
25,808,571 UART: [art] Populate DV Done
25,813,869 UART: [fht] FMC Alias Private Key: 7
25,815,410 UART: [art] Derive CDI
25,816,220 UART: [art] Store in in slot 0x4
25,875,109 UART: [art] Derive Key Pair
25,876,104 UART: [art] Store priv key in slot 0x5
29,169,201 UART: [art] Derive Key Pair - Done
29,182,035 UART: [art] Signing Cert with AUTHO
29,183,332 UART: RITY.KEYID = 7
31,470,293 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,794 UART: [art] PUB.X = EA71AF5D6D0645D7E7CD67BC53E37767A0034438E94C4642E5C5E5D82EEF5046BDDE50D46D38E50D4EEA036C8BAD1E7C
31,479,069 UART: [art] PUB.Y = E71CBBFB42FDD6E6C3DE816CAA6D4E72BED8086DD1830AC4DD6F512156C2013E6ABDB7DEC09669D1B6CA4C985F61342C
31,486,455 UART: [art] SIG.R = A0B315904D61562CE45674CC92D25E97DE45E512E8659EED816FF3AC037EA21AFAD558F3563B12CF2EFB577ADB080649
31,493,739 UART: [art] SIG.S = 99F3DC63625B0C98FACFEE0B1F2A20F5F14B8C80A1177D4F0787C4E7E9963527D3971BBC200FA5DE72399DFDDC01F882
32,798,827 UART: Caliptra RT
32,799,528 UART: [state] CFI Enabled
32,958,799 UART: [rt] RT listening for mailbox commands...
32,960,723 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,991,258 UART: [rt]cmd =0x52564348, len=36
32,992,967 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,805,296 ready_for_fw is high
3,805,716 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,864,624 >>> mbox cmd response: success
23,549,204 UART:
23,549,610 UART: Running Caliptra FMC ...
23,550,714 UART:
23,550,864 UART: [state] CFI Enabled
23,616,263 UART: [fht] FMC Alias Private Key: 7
25,954,346 UART: [art] Extend RT PCRs Done
25,955,574 UART: [art] Lock RT PCRs Done
25,957,243 UART: [art] Populate DV Done
25,962,758 UART: [fht] FMC Alias Private Key: 7
25,964,455 UART: [art] Derive CDI
25,965,186 UART: [art] Store in in slot 0x4
26,024,284 UART: [art] Derive Key Pair
26,025,324 UART: [art] Store priv key in slot 0x5
29,318,342 UART: [art] Derive Key Pair - Done
29,331,503 UART: [art] Signing Cert with AUTHO
29,332,800 UART: RITY.KEYID = 7
31,619,242 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,745 UART: [art] PUB.X = A9D76FCA652D438748A8F83F42241EF7C872CBC40E55131C23C813CB5F99670B3E52C3F28646DB2D3D64E73A5F137AD3
31,628,004 UART: [art] PUB.Y = AF8AE85DF4FB8D3C98499FFB241993931C551E75AD2005AEC49D59EE82077447D026F73D8A0FB67F4E0BC6B5AB27EB93
31,635,255 UART: [art] SIG.R = B97D25307F12C7910CFABDF11C27CE325D562F6931267B4B72125065F540ECCCEA432D742DA70A15F8A418CC03ADA1AB
31,642,672 UART: [art] SIG.S = 9DE8037100D607A27ED729F629C6782875682061C96F9A9EDE172EA5346379A5B943C936F36026D14B1396AF4C3D0B3B
32,948,182 UART: Caliptra RT
32,948,898 UART: [state] CFI Enabled
33,109,979 UART: [rt] RT listening for mailbox commands...
33,111,858 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,142,452 UART: [rt]cmd =0x52564348, len=36
33,144,194 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,469 UART:
192,823 UART: Running Caliptra ROM ...
194,000 UART:
603,761 UART: [state] CFI Enabled
620,618 UART: [state] LifecycleState = Unprovisioned
622,569 UART: [state] DebugLocked = No
624,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,164 UART: [kat] SHA2-256
798,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,467 UART: [kat] ++
809,919 UART: [kat] sha1
822,072 UART: [kat] SHA2-256
824,811 UART: [kat] SHA2-384
830,518 UART: [kat] SHA2-512-ACC
832,881 UART: [kat] ECC-384
3,118,221 UART: [kat] HMAC-384Kdf
3,129,693 UART: [kat] LMS
4,319,796 UART: [kat] --
4,323,104 UART: [cold-reset] ++
4,324,971 UART: [fht] Storing FHT @ 0x50003400
4,336,663 UART: [idev] ++
4,337,297 UART: [idev] CDI.KEYID = 6
4,338,209 UART: [idev] SUBJECT.KEYID = 7
4,339,458 UART: [idev] UDS.KEYID = 0
4,340,514 ready_for_fw is high
4,340,722 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,765 UART: [idev] Erasing UDS.KEYID = 0
7,623,972 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,883 UART: [idev] --
7,649,768 UART: [ldev] ++
7,650,338 UART: [ldev] CDI.KEYID = 6
7,651,324 UART: [ldev] SUBJECT.KEYID = 5
7,652,485 UART: [ldev] AUTHORITY.KEYID = 7
7,653,766 UART: [ldev] FE.KEYID = 1
7,664,226 UART: [ldev] Erasing FE.KEYID = 1
10,954,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,905 UART: [ldev] --
13,318,058 UART: [fwproc] Waiting for Commands...
13,319,893 UART: [fwproc] Received command 0x46574c44
13,322,076 UART: [fwproc] Received Image of size 113844 bytes
17,358,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,997 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,912 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,819,090 >>> mbox cmd response: success
17,823,207 UART: [afmc] ++
17,823,807 UART: [afmc] CDI.KEYID = 6
17,824,720 UART: [afmc] SUBJECT.KEYID = 7
17,825,937 UART: [afmc] AUTHORITY.KEYID = 5
21,138,457 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,431,962 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,434,260 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,650 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,455 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,477,882 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,103 UART: [afmc] --
23,503,449 UART: [cold-reset] --
23,507,094 UART: [state] Locking Datavault
23,514,236 UART: [state] Locking PCR0, PCR1 and PCR31
23,515,971 UART: [state] Locking ICCM
23,517,387 UART: [exit] Launching FMC @ 0x40000130
23,525,736 UART:
23,525,973 UART: Running Caliptra FMC ...
23,527,079 UART:
23,527,240 UART: [state] CFI Enabled
23,535,392 UART: [fht] FMC Alias Private Key: 7
25,865,996 UART: [art] Extend RT PCRs Done
25,867,217 UART: [art] Lock RT PCRs Done
25,868,840 UART: [art] Populate DV Done
25,874,219 UART: [fht] FMC Alias Private Key: 7
25,875,807 UART: [art] Derive CDI
25,876,622 UART: [art] Store in in slot 0x4
25,919,380 UART: [art] Derive Key Pair
25,920,415 UART: [art] Store priv key in slot 0x5
29,161,955 UART: [art] Derive Key Pair - Done
29,175,273 UART: [art] Signing Cert with AUTHO
29,176,601 UART: RITY.KEYID = 7
31,455,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,493 UART: [art] PUB.X = 57721029A0E84395F2DA99C3B91B8ACDD984B9C6248A960FC0036E3446A0ED72EF59BE06B0AF5457010489E56E1D9911
31,464,690 UART: [art] PUB.Y = 4A4F0B2FAC90F9EBC45B2F201BC275D7E772AC87A9C1B01E8FAFF9E4C6101D9A28DD3E214AAD5591CE6F81331246F1B3
31,471,988 UART: [art] SIG.R = FBC55BE2D96276CFBA6694AC4B913F254A1232F1A9D63695E4AAAE41B3C6168717A73E14FF51235B187AC3E34BC553D8
31,479,387 UART: [art] SIG.S = E882E404200F90365709B5E78A3A57FCE09FD91B64D2808584F8F5BB6188176C7B97CC813C364533AA321FD71D5EE3C9
32,784,824 UART: Caliptra RT
32,785,527 UART: [state] CFI Enabled
32,902,676 UART: [rt] RT listening for mailbox commands...
32,904,563 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,935,041 UART: [rt]cmd =0x52564348, len=36
32,936,976 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,129,297 ready_for_fw is high
4,129,703 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,056,349 >>> mbox cmd response: success
23,701,552 UART:
23,701,952 UART: Running Caliptra FMC ...
23,703,098 UART:
23,703,270 UART: [state] CFI Enabled
23,711,392 UART: [fht] FMC Alias Private Key: 7
26,042,744 UART: [art] Extend RT PCRs Done
26,043,973 UART: [art] Lock RT PCRs Done
26,045,873 UART: [art] Populate DV Done
26,051,241 UART: [fht] FMC Alias Private Key: 7
26,052,790 UART: [art] Derive CDI
26,053,577 UART: [art] Store in in slot 0x4
26,095,908 UART: [art] Derive Key Pair
26,096,920 UART: [art] Store priv key in slot 0x5
29,339,105 UART: [art] Derive Key Pair - Done
29,352,011 UART: [art] Signing Cert with AUTHO
29,353,319 UART: RITY.KEYID = 7
31,632,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,030 UART: [art] PUB.X = 3C43384A71F3320369E44A9E38475A212844DC74259F0D72EF31DB77E00C579994E0ED2A8D52894E7EA9584FE254557C
31,641,274 UART: [art] PUB.Y = F65352110E76337A4C9856BB03FFD39165CB395629979C6999C8A0F5B79B97C8DF561EE8604442BAC18EA9EFBA069907
31,648,478 UART: [art] SIG.R = 7541D6D682B153F55748B1DC6101ACE539F1A35FC4EEC003DDEF3E9FE926878E9936B142A61B218E2AB1ADF4BA983A9C
31,655,880 UART: [art] SIG.S = 10C050E33A886F9AC527CFD06888A9F3FBBFE1068044B71B29BBC977CB1E106BD55F6C77D2907AC7D4D76BBBF5E318BC
32,961,133 UART: Caliptra RT
32,961,848 UART: [state] CFI Enabled
33,078,711 UART: [rt] RT listening for mailbox commands...
33,080,595 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,111,235 UART: [rt]cmd =0x52564348, len=36
33,113,027 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,027 UART:
192,394 UART: Running Caliptra ROM ...
193,594 UART:
193,753 UART: [state] CFI Enabled
261,841 UART: [state] LifecycleState = Unprovisioned
263,702 UART: [state] DebugLocked = No
266,521 UART: [state] WD Timer not started. Device not locked for debugging
270,362 UART: [kat] SHA2-256
449,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,031 UART: [kat] ++
461,483 UART: [kat] sha1
472,853 UART: [kat] SHA2-256
475,859 UART: [kat] SHA2-384
482,203 UART: [kat] SHA2-512-ACC
485,133 UART: [kat] ECC-384
2,948,444 UART: [kat] HMAC-384Kdf
2,971,552 UART: [kat] LMS
3,501,004 UART: [kat] --
3,505,070 UART: [cold-reset] ++
3,506,519 UART: [fht] FHT @ 0x50003400
3,517,144 UART: [idev] ++
3,517,706 UART: [idev] CDI.KEYID = 6
3,518,699 UART: [idev] SUBJECT.KEYID = 7
3,519,871 UART: [idev] UDS.KEYID = 0
3,520,796 ready_for_fw is high
3,521,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,717 UART: [idev] Erasing UDS.KEYID = 0
6,025,862 UART: [idev] Sha1 KeyId Algorithm
6,048,656 UART: [idev] --
6,051,835 UART: [ldev] ++
6,052,406 UART: [ldev] CDI.KEYID = 6
6,053,293 UART: [ldev] SUBJECT.KEYID = 5
6,054,451 UART: [ldev] AUTHORITY.KEYID = 7
6,055,743 UART: [ldev] FE.KEYID = 1
6,100,121 UART: [ldev] Erasing FE.KEYID = 1
8,603,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,465 UART: [ldev] --
10,413,726 UART: [fwproc] Wait for Commands...
10,416,148 UART: [fwproc] Recv command 0x46574c44
10,418,185 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,891,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,749 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,277,402 >>> mbox cmd response: success
14,282,560 UART: [afmc] ++
14,283,149 UART: [afmc] CDI.KEYID = 6
14,284,062 UART: [afmc] SUBJECT.KEYID = 7
14,285,228 UART: [afmc] AUTHORITY.KEYID = 5
16,825,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,314 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,004 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,849 UART: [afmc] --
18,626,608 UART: [cold-reset] --
18,629,769 UART: [state] Locking Datavault
18,637,349 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,001 UART: [state] Locking ICCM
18,641,265 UART: [exit] Launching FMC @ 0x40000130
18,649,665 UART:
18,649,910 UART: Running Caliptra FMC ...
18,651,014 UART:
18,651,178 UART: [state] CFI Enabled
18,708,940 UART: [fht] FMC Alias Private Key: 7
20,473,419 UART: [art] Extend RT PCRs Done
20,474,638 UART: [art] Lock RT PCRs Done
20,476,262 UART: [art] Populate DV Done
20,481,512 UART: [fht] FMC Alias Private Key: 7
20,483,067 UART: [art] Derive CDI
20,483,887 UART: [art] Store in in slot 0x4
20,542,121 UART: [art] Derive Key Pair
20,543,158 UART: [art] Store priv key in slot 0x5
23,005,640 UART: [art] Derive Key Pair - Done
23,018,585 UART: [art] Signing Cert with AUTHO
23,019,899 UART: RITY.KEYID = 7
24,732,459 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,040 UART: [art] PUB.X = 57180F7607C6112E507D7B4205154C3AE439496245C58DAF8FB8EB572DA304B3902F9473E521D93D940E53D5A741BCE2
24,741,198 UART: [art] PUB.Y = 7821D746869E6B07822B1DC8ABB769093625BE590ECEF849176C37F7361C1B0F53E004E85F7B0CDF3251A2AFB51719BB
24,748,473 UART: [art] SIG.R = C79D475318CD4E15C7A1BC1D9D4007B3695CE1C336C0A9436CF3DDA2FFC28FE6FF3C11A6C40A03DBF3E33EE857DE3551
24,755,885 UART: [art] SIG.S = EF28F0733715D05C847E54378C12A79C23B1711ADC3F10C062D6FB4478069604EC59737FAD831D72D99045A3BDE1FC8E
25,734,428 UART: Caliptra RT
25,735,128 UART: [state] CFI Enabled
25,901,814 UART: [rt] RT listening for mailbox commands...
25,903,700 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,934,537 UART: [rt]cmd =0x52564348, len=36
25,936,357 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,362,775 ready_for_fw is high
3,363,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,065,438 >>> mbox cmd response: success
18,343,072 UART:
18,343,462 UART: Running Caliptra FMC ...
18,344,579 UART:
18,344,747 UART: [state] CFI Enabled
18,413,183 UART: [fht] FMC Alias Private Key: 7
20,177,274 UART: [art] Extend RT PCRs Done
20,178,505 UART: [art] Lock RT PCRs Done
20,180,084 UART: [art] Populate DV Done
20,185,715 UART: [fht] FMC Alias Private Key: 7
20,187,258 UART: [art] Derive CDI
20,188,077 UART: [art] Store in in slot 0x4
20,245,892 UART: [art] Derive Key Pair
20,246,938 UART: [art] Store priv key in slot 0x5
22,710,069 UART: [art] Derive Key Pair - Done
22,723,237 UART: [art] Signing Cert with AUTHO
22,724,550 UART: RITY.KEYID = 7
24,436,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,892 UART: [art] PUB.X = C09259170DC87B638020A8AA76A650416BF1FB5D5F9F948BCDB145F40CFCFC7AC03372E3E17B9715DBAC932DC21ED4B8
24,445,070 UART: [art] PUB.Y = 5647DBB34F19BAA012AEAF0CD3933F51700A1EF6E3510FDC56337F3F11C35CFA0EDF6961973AF3EC66CC99253B7AD741
24,452,366 UART: [art] SIG.R = DA2ED3FEE94623A765D7AFB6163F6BB92FD88108B603C0FA503555B3E9409F5175A0F909107DCE9311AF1B0AADB10B23
24,459,748 UART: [art] SIG.S = A4CC4CB7B6CCE516EA522F171660E34044AF3B431C3D4E17A0D5A55824FEF0ED903C71C7D6CDCF8F47820C74FAEA3F58
25,439,237 UART: Caliptra RT
25,439,963 UART: [state] CFI Enabled
25,604,553 UART: [rt] RT listening for mailbox commands...
25,606,431 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,637,047 UART: [rt]cmd =0x52564348, len=36
25,638,949 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
192,964 UART:
193,327 UART: Running Caliptra ROM ...
194,517 UART:
603,993 UART: [state] CFI Enabled
619,557 UART: [state] LifecycleState = Unprovisioned
621,430 UART: [state] DebugLocked = No
623,176 UART: [state] WD Timer not started. Device not locked for debugging
626,568 UART: [kat] SHA2-256
805,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,256 UART: [kat] ++
817,706 UART: [kat] sha1
827,158 UART: [kat] SHA2-256
830,251 UART: [kat] SHA2-384
835,603 UART: [kat] SHA2-512-ACC
838,608 UART: [kat] ECC-384
3,280,753 UART: [kat] HMAC-384Kdf
3,294,413 UART: [kat] LMS
3,823,953 UART: [kat] --
3,827,160 UART: [cold-reset] ++
3,829,086 UART: [fht] FHT @ 0x50003400
3,840,278 UART: [idev] ++
3,840,847 UART: [idev] CDI.KEYID = 6
3,841,758 UART: [idev] SUBJECT.KEYID = 7
3,842,928 UART: [idev] UDS.KEYID = 0
3,843,971 ready_for_fw is high
3,844,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,965 UART: [idev] Erasing UDS.KEYID = 0
6,312,636 UART: [idev] Sha1 KeyId Algorithm
6,336,802 UART: [idev] --
6,341,932 UART: [ldev] ++
6,342,502 UART: [ldev] CDI.KEYID = 6
6,343,413 UART: [ldev] SUBJECT.KEYID = 5
6,344,626 UART: [ldev] AUTHORITY.KEYID = 7
6,345,858 UART: [ldev] FE.KEYID = 1
6,357,037 UART: [ldev] Erasing FE.KEYID = 1
8,829,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,095 UART: [ldev] --
10,619,782 UART: [fwproc] Wait for Commands...
10,623,012 UART: [fwproc] Recv command 0x46574c44
10,625,105 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,214 >>> mbox cmd response: success
14,485,248 UART: [afmc] ++
14,485,847 UART: [afmc] CDI.KEYID = 6
14,486,740 UART: [afmc] SUBJECT.KEYID = 7
14,487,954 UART: [afmc] AUTHORITY.KEYID = 5
16,989,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,706,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,708,519 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,724,280 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,740,331 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,756,209 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,136 UART: [afmc] --
18,783,603 UART: [cold-reset] --
18,786,027 UART: [state] Locking Datavault
18,791,277 UART: [state] Locking PCR0, PCR1 and PCR31
18,792,928 UART: [state] Locking ICCM
18,794,163 UART: [exit] Launching FMC @ 0x40000130
18,802,611 UART:
18,802,851 UART: Running Caliptra FMC ...
18,803,952 UART:
18,804,114 UART: [state] CFI Enabled
18,812,109 UART: [fht] FMC Alias Private Key: 7
20,569,406 UART: [art] Extend RT PCRs Done
20,570,626 UART: [art] Lock RT PCRs Done
20,572,328 UART: [art] Populate DV Done
20,577,464 UART: [fht] FMC Alias Private Key: 7
20,579,106 UART: [art] Derive CDI
20,579,842 UART: [art] Store in in slot 0x4
20,622,332 UART: [art] Derive Key Pair
20,623,391 UART: [art] Store priv key in slot 0x5
23,049,924 UART: [art] Derive Key Pair - Done
23,063,082 UART: [art] Signing Cert with AUTHO
23,064,385 UART: RITY.KEYID = 7
24,769,955 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,453 UART: [art] PUB.X = 6FD78F2DD6563807479A0C31E4FC07170C90292813030858E4D4C20AA4381816FD6DFA357BBA98C005BD3A359E2251F0
24,778,701 UART: [art] PUB.Y = 1BD0DCE1034BD75AE9B4BFB8387FCE71374C46439253DD3E59F7D3092F9A1BD3F9367E7C596668129A7452D63100B852
24,785,938 UART: [art] SIG.R = F93CC36FC9E8FD6852BB1E0B6C8C8AAF8F4120563C463753A84B5E31E148F8E2F15E70B0A68FE3F0B3C8D838B80EECE2
24,793,334 UART: [art] SIG.S = E5F84F14E4770BA4B7FCF81D65975400B089518BB449F50FBDCDEFB233DE3B19910BF89BE7272C3B6AC346DDC9F51A5E
25,772,668 UART: Caliptra RT
25,773,366 UART: [state] CFI Enabled
25,889,519 UART: [rt] RT listening for mailbox commands...
25,891,393 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,921,891 UART: [rt]cmd =0x52564348, len=36
25,923,716 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,952 writing to cptra_bootfsm_go
3,696,557 ready_for_fw is high
3,697,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,295 >>> mbox cmd response: success
18,518,207 UART:
18,518,605 UART: Running Caliptra FMC ...
18,519,803 UART:
18,519,977 UART: [state] CFI Enabled
18,527,442 UART: [fht] FMC Alias Private Key: 7
20,284,636 UART: [art] Extend RT PCRs Done
20,285,854 UART: [art] Lock RT PCRs Done
20,287,483 UART: [art] Populate DV Done
20,292,997 UART: [fht] FMC Alias Private Key: 7
20,294,710 UART: [art] Derive CDI
20,295,535 UART: [art] Store in in slot 0x4
20,338,155 UART: [art] Derive Key Pair
20,339,199 UART: [art] Store priv key in slot 0x5
22,765,616 UART: [art] Derive Key Pair - Done
22,778,411 UART: [art] Signing Cert with AUTHO
22,779,714 UART: RITY.KEYID = 7
24,485,116 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,620 UART: [art] PUB.X = 54FC054B33E4256679A0019B768197A3D126E214FEAFE5A1282999077203859693AB70DF54A74C20774E2ED0B992F15A
24,493,867 UART: [art] PUB.Y = 0634453EEB1611719F4AA0F9306ACAC4FD25A0557DE0B154F3360ABCC312C58E4E2C733DD6AD412DDE38B20B668C611F
24,501,177 UART: [art] SIG.R = EE3B3BB3B71411A3EC759FE119D8CAB06ADCB4786EBE6C7F184FBD62284129B16657C65E9FCF0CFA9DE8140263803076
24,508,580 UART: [art] SIG.S = 502B2B9B233935A59057F5AD2F87CC2091D270CE4B50AB378BF066004EEF8037471203531DC2E02C6C1DEEEBF987A6CE
25,486,880 UART: Caliptra RT
25,487,577 UART: [state] CFI Enabled
25,604,870 UART: [rt] RT listening for mailbox commands...
25,606,755 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,637,319 UART: [rt]cmd =0x52564348, len=36
25,639,044 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,126 UART:
192,490 UART: Running Caliptra ROM ...
193,700 UART:
193,860 UART: [state] CFI Enabled
260,317 UART: [state] LifecycleState = Unprovisioned
262,746 UART: [state] DebugLocked = No
264,781 UART: [state] WD Timer not started. Device not locked for debugging
268,626 UART: [kat] SHA2-256
458,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,247 UART: [kat] ++
469,696 UART: [kat] sha1
481,183 UART: [kat] SHA2-256
484,268 UART: [kat] SHA2-384
490,061 UART: [kat] SHA2-512-ACC
492,660 UART: [kat] ECC-384
2,947,124 UART: [kat] HMAC-384Kdf
2,970,190 UART: [kat] LMS
3,502,007 UART: [kat] --
3,507,141 UART: [cold-reset] ++
3,509,006 UART: [fht] FHT @ 0x50003400
3,520,224 UART: [idev] ++
3,520,903 UART: [idev] CDI.KEYID = 6
3,521,825 UART: [idev] SUBJECT.KEYID = 7
3,523,078 UART: [idev] UDS.KEYID = 0
3,524,007 ready_for_fw is high
3,524,219 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,712 UART: [idev] Erasing UDS.KEYID = 0
6,027,661 UART: [idev] Sha1 KeyId Algorithm
6,049,867 UART: [idev] --
6,053,652 UART: [ldev] ++
6,054,338 UART: [ldev] CDI.KEYID = 6
6,055,249 UART: [ldev] SUBJECT.KEYID = 5
6,056,409 UART: [ldev] AUTHORITY.KEYID = 7
6,057,643 UART: [ldev] FE.KEYID = 1
6,098,748 UART: [ldev] Erasing FE.KEYID = 1
8,605,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,473 UART: [ldev] --
10,415,729 UART: [fwproc] Wait for Commands...
10,418,206 UART: [fwproc] Recv command 0x46574c44
10,420,536 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,275 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,604,548 >>> mbox cmd response: success
14,609,357 UART: [afmc] ++
14,610,070 UART: [afmc] CDI.KEYID = 6
14,611,264 UART: [afmc] SUBJECT.KEYID = 7
14,612,703 UART: [afmc] AUTHORITY.KEYID = 5
17,146,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,952 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,184 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,300 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,289 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,979 UART: [afmc] --
18,947,237 UART: [cold-reset] --
18,950,458 UART: [state] Locking Datavault
18,956,588 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,917 UART: [state] Locking ICCM
18,960,011 UART: [exit] Launching FMC @ 0x40000130
18,968,369 UART:
18,968,611 UART: Running Caliptra FMC ...
18,969,715 UART:
18,969,876 UART: [state] CFI Enabled
19,027,537 UART: [fht] FMC Alias Private Key: 7
20,792,264 UART: [art] Extend RT PCRs Done
20,793,478 UART: [art] Lock RT PCRs Done
20,794,997 UART: [art] Populate DV Done
20,800,246 UART: [fht] FMC Alias Private Key: 7
20,801,823 UART: [art] Derive CDI
20,802,651 UART: [art] Store in in slot 0x4
20,860,316 UART: [art] Derive Key Pair
20,861,310 UART: [art] Store priv key in slot 0x5
23,324,090 UART: [art] Derive Key Pair - Done
23,337,099 UART: [art] Signing Cert with AUTHO
23,338,411 UART: RITY.KEYID = 7
25,049,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,173 UART: [art] PUB.X = 76E7A35A39BB186E55FF875A635D00B44BF008F1176ED48CC1C838431FA6D5A3ECAD33ACBF38B244537BDD5399BF7DFC
25,058,438 UART: [art] PUB.Y = FEC10E332660173CE1792230C37707370A7AC0375620B3FD37FFD60B116C4A06746C3589F3EDD7ED4826A56FEE60CFE9
25,065,697 UART: [art] SIG.R = 4CBB69E7D3F1C98E9DC2582CA3E117633FA9D1D8AB9A02D2237F6F2E5F864EAA1E0AB27899559434EF314FE9D2A33D51
25,073,088 UART: [art] SIG.S = 8FD8977DDB9A28043D9971024D5ABBA864B200622342603FF50A362BB3B0169D62962761D51894E99FD2E5FC39E74A5A
26,051,755 UART: Caliptra RT
26,052,473 UART: [state] CFI Enabled
26,218,029 UART: [rt] RT listening for mailbox commands...
26,219,922 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,250,571 UART: [rt]cmd =0x52564348, len=36
26,252,422 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,442,642 ready_for_fw is high
3,443,097 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,725,884 >>> mbox cmd response: success
19,010,367 UART:
19,011,099 UART: Running Caliptra FMC ...
19,012,221 UART:
19,012,400 UART: [state] CFI Enabled
19,075,895 UART: [fht] FMC Alias Private Key: 7
20,839,842 UART: [art] Extend RT PCRs Done
20,841,074 UART: [art] Lock RT PCRs Done
20,842,604 UART: [art] Populate DV Done
20,848,238 UART: [fht] FMC Alias Private Key: 7
20,849,786 UART: [art] Derive CDI
20,850,602 UART: [art] Store in in slot 0x4
20,907,915 UART: [art] Derive Key Pair
20,908,953 UART: [art] Store priv key in slot 0x5
23,371,337 UART: [art] Derive Key Pair - Done
23,383,949 UART: [art] Signing Cert with AUTHO
23,385,261 UART: RITY.KEYID = 7
25,097,877 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,391 UART: [art] PUB.X = 6D202D8CE6452FF7F67BAF2E6492543AE80DCF0AB8532A9535F976E90E6B790238DE8013BCF55574EA35CFBFB9872F51
25,106,640 UART: [art] PUB.Y = 43235B39EEFA86806BA3E41AF19858A22828B96A82AABBC832274F204A110F0E806ADD176DA64F1499ADF05EE7761A28
25,113,943 UART: [art] SIG.R = E79ADF62D739FD12B042942E7C2B0F6DF783A760C836800B36A0A7B887BAB3968B1E280FA33E70F45A2EC9761A3C50FC
25,121,336 UART: [art] SIG.S = 83CCD3BBF033F50D370A49C3F5FF6E8B3A8C54A846DB8C9C46AC950F453ED224FC7226D6EB7EB7B2140F4C02A8CD8BF8
26,099,934 UART: Caliptra RT
26,100,648 UART: [state] CFI Enabled
26,264,501 UART: [rt] RT listening for mailbox commands...
26,266,393 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,296,976 UART: [rt]cmd =0x52564348, len=36
26,298,808 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,627 writing to cptra_bootfsm_go
192,917 UART:
193,301 UART: Running Caliptra ROM ...
194,501 UART:
604,102 UART: [state] CFI Enabled
615,913 UART: [state] LifecycleState = Unprovisioned
618,207 UART: [state] DebugLocked = No
620,514 UART: [state] WD Timer not started. Device not locked for debugging
624,692 UART: [kat] SHA2-256
814,556 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,356 UART: [kat] ++
825,960 UART: [kat] sha1
836,493 UART: [kat] SHA2-256
839,536 UART: [kat] SHA2-384
846,108 UART: [kat] SHA2-512-ACC
848,690 UART: [kat] ECC-384
3,291,061 UART: [kat] HMAC-384Kdf
3,303,884 UART: [kat] LMS
3,835,697 UART: [kat] --
3,840,756 UART: [cold-reset] ++
3,842,755 UART: [fht] FHT @ 0x50003400
3,854,153 UART: [idev] ++
3,854,866 UART: [idev] CDI.KEYID = 6
3,855,821 UART: [idev] SUBJECT.KEYID = 7
3,856,993 UART: [idev] UDS.KEYID = 0
3,857,902 ready_for_fw is high
3,858,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,558 UART: [idev] Erasing UDS.KEYID = 0
6,334,026 UART: [idev] Sha1 KeyId Algorithm
6,356,425 UART: [idev] --
6,361,897 UART: [ldev] ++
6,362,580 UART: [ldev] CDI.KEYID = 6
6,363,500 UART: [ldev] SUBJECT.KEYID = 5
6,364,659 UART: [ldev] AUTHORITY.KEYID = 7
6,365,882 UART: [ldev] FE.KEYID = 1
6,377,001 UART: [ldev] Erasing FE.KEYID = 1
8,856,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,925 UART: [ldev] --
10,648,354 UART: [fwproc] Wait for Commands...
10,650,826 UART: [fwproc] Recv command 0x46574c44
10,653,081 UART: [fwproc] Recv'd Img size: 114168 bytes
14,100,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,834,005 >>> mbox cmd response: success
14,837,318 UART: [afmc] ++
14,838,036 UART: [afmc] CDI.KEYID = 6
14,839,231 UART: [afmc] SUBJECT.KEYID = 7
14,840,664 UART: [afmc] AUTHORITY.KEYID = 5
17,343,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,842 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,032 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,211 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,840 UART: [afmc] --
19,143,194 UART: [cold-reset] --
19,145,995 UART: [state] Locking Datavault
19,151,518 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,692 UART: [state] Locking ICCM
19,155,179 UART: [exit] Launching FMC @ 0x40000130
19,163,852 UART:
19,164,090 UART: Running Caliptra FMC ...
19,165,191 UART:
19,165,347 UART: [state] CFI Enabled
19,173,607 UART: [fht] FMC Alias Private Key: 7
20,929,826 UART: [art] Extend RT PCRs Done
20,931,040 UART: [art] Lock RT PCRs Done
20,932,771 UART: [art] Populate DV Done
20,937,967 UART: [fht] FMC Alias Private Key: 7
20,939,556 UART: [art] Derive CDI
20,940,376 UART: [art] Store in in slot 0x4
20,982,596 UART: [art] Derive Key Pair
20,983,611 UART: [art] Store priv key in slot 0x5
23,410,320 UART: [art] Derive Key Pair - Done
23,423,252 UART: [art] Signing Cert with AUTHO
23,424,553 UART: RITY.KEYID = 7
25,130,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,695 UART: [art] PUB.X = 770803D89BD7D9B59D2642D7F4AC501D0E62875668B46CAD184D59A9286A564AD3E8A51733BE1474C7BA52CC49752495
25,138,939 UART: [art] PUB.Y = 5AF9067CE206608D65481D2B712BAFEE95600933530E2A7D670A33C918263F242F2796FC4FDF9A94A45CC8CB99E08AEA
25,146,221 UART: [art] SIG.R = 0CC9C17A34DC22560801D8D6E15DF919623112FABF5389636CD20F243DE1E3FD675615B14EB6C25540077AB9B3A47AAD
25,153,642 UART: [art] SIG.S = B86841D6AEA5FBC948FB835062A31CCF601530B50D0D26E9A02DB8531F647F506A5EA24BF56FAEA4CBFE102B1DCA0B90
26,132,697 UART: Caliptra RT
26,133,407 UART: [state] CFI Enabled
26,249,766 UART: [rt] RT listening for mailbox commands...
26,251,637 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,282,121 UART: [rt]cmd =0x52564348, len=36
26,283,701 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,749,749 ready_for_fw is high
3,750,161 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,942,749 >>> mbox cmd response: success
19,198,966 UART:
19,199,359 UART: Running Caliptra FMC ...
19,200,467 UART:
19,200,622 UART: [state] CFI Enabled
19,209,065 UART: [fht] FMC Alias Private Key: 7
20,966,544 UART: [art] Extend RT PCRs Done
20,967,769 UART: [art] Lock RT PCRs Done
20,969,262 UART: [art] Populate DV Done
20,974,406 UART: [fht] FMC Alias Private Key: 7
20,976,108 UART: [art] Derive CDI
20,976,844 UART: [art] Store in in slot 0x4
21,019,278 UART: [art] Derive Key Pair
21,020,280 UART: [art] Store priv key in slot 0x5
23,447,458 UART: [art] Derive Key Pair - Done
23,460,210 UART: [art] Signing Cert with AUTHO
23,461,519 UART: RITY.KEYID = 7
25,166,983 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,496 UART: [art] PUB.X = 0EA24894E6F705CD61F56537CEC1857C9D467C0126E2C015273FC3253AA23FEDF3132255C5A03E928808A1CAD17752BE
25,175,746 UART: [art] PUB.Y = 5690CE4676F2EA3E9A9557D307F6B691E1DD2E260C6959B48DD8511C5BE2F85A6D7AB04A9BFBAF04EE8264A114F48B22
25,183,043 UART: [art] SIG.R = 59DD87802F9DA92090C5C10874E2961A4A0A87221428380768A0BB0555F24922E07BF099789EA5BE755B00F0A11C6833
25,190,385 UART: [art] SIG.S = 44B5E19D9DA97DE6D4E706ACF011AF4CD88DD29A66C3216B8ACFC96963D7314E8B27F4219EE8CB6316323512B98D5E1D
26,169,024 UART: Caliptra RT
26,169,741 UART: [state] CFI Enabled
26,286,912 UART: [rt] RT listening for mailbox commands...
26,288,795 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,319,330 UART: [rt]cmd =0x52564348, len=36
26,321,188 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = No
86,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,341 UART: [kat] SHA2-256
882,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,387 UART: [kat] ++
886,539 UART: [kat] sha1
890,929 UART: [kat] SHA2-256
892,867 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
903,048 UART: [kat] HMAC-384Kdf
907,672 UART: [kat] LMS
1,475,868 UART: [kat] --
1,476,917 UART: [cold-reset] ++
1,477,415 UART: [fht] Storing FHT @ 0x50003400
1,480,294 UART: [idev] ++
1,480,462 UART: [idev] CDI.KEYID = 6
1,480,822 UART: [idev] SUBJECT.KEYID = 7
1,481,246 UART: [idev] UDS.KEYID = 0
1,481,591 ready_for_fw is high
1,481,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,428 UART: [idev] Erasing UDS.KEYID = 0
1,506,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,666 UART: [idev] --
1,515,853 UART: [ldev] ++
1,516,021 UART: [ldev] CDI.KEYID = 6
1,516,384 UART: [ldev] SUBJECT.KEYID = 5
1,516,810 UART: [ldev] AUTHORITY.KEYID = 7
1,517,273 UART: [ldev] FE.KEYID = 1
1,522,541 UART: [ldev] Erasing FE.KEYID = 1
1,547,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,746 UART: [ldev] --
1,587,013 UART: [fwproc] Waiting for Commands...
1,587,712 UART: [fwproc] Received command 0x46574c44
1,588,503 UART: [fwproc] Received Image of size 114168 bytes
2,884,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,187 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,120 >>> mbox cmd response: success
3,077,276 UART: [afmc] ++
3,077,444 UART: [afmc] CDI.KEYID = 6
3,077,806 UART: [afmc] SUBJECT.KEYID = 7
3,078,231 UART: [afmc] AUTHORITY.KEYID = 5
3,113,178 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,402 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,182 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,910 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,795 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,485 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,364 UART: [afmc] --
3,156,244 UART: [cold-reset] --
3,157,336 UART: [state] Locking Datavault
3,158,369 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,973 UART: [state] Locking ICCM
3,159,625 UART: [exit] Launching FMC @ 0x40000130
3,164,954 UART:
3,164,970 UART: Running Caliptra FMC ...
3,165,378 UART:
3,165,432 UART: [state] CFI Enabled
3,175,517 UART: [fht] FMC Alias Private Key: 7
3,283,146 UART: [art] Extend RT PCRs Done
3,283,574 UART: [art] Lock RT PCRs Done
3,284,952 UART: [art] Populate DV Done
3,292,919 UART: [fht] FMC Alias Private Key: 7
3,293,917 UART: [art] Derive CDI
3,294,197 UART: [art] Store in in slot 0x4
3,380,024 UART: [art] Derive Key Pair
3,380,384 UART: [art] Store priv key in slot 0x5
3,393,778 UART: [art] Derive Key Pair - Done
3,408,905 UART: [art] Signing Cert with AUTHO
3,409,385 UART: RITY.KEYID = 7
3,424,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,894 UART: [art] PUB.X = EC1530E6398D7B9B81B6D9A2853FDEE77846C2E1A854D10BB8C58A205257A9A2CB3E2C986BBEC783A4174B1F27BB1BCE
3,431,677 UART: [art] PUB.Y = B342462DDDB329F338682A53407BA12C4D4A2CB4C372D9C0F1BD82AB561CB24DA077213A7978808F52530E1F082989F7
3,438,621 UART: [art] SIG.R = 6E63F1841366223740A1DD5F27B2CE2668E795C8F8A7360F3886EEDD949EEB32F46C410EE5B636E7E6FF862A68F2CB67
3,445,391 UART: [art] SIG.S = 799DFC84C6763B685521C78E6A8D85AD6E4EB23A9CC2C9C8CAF29434E9227EC3FED451E051F3D9FEF6DE3A048C08D55C
3,469,606 UART: Caliptra RT
3,469,859 UART: [state] CFI Enabled
3,578,265 UART: [rt] RT listening for mailbox commands...
3,578,935 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,757 UART: [rt]cmd =0x52564348, len=36
3,610,390 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,605 ready_for_fw is high
1,362,605 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,578 >>> mbox cmd response: success
2,988,606 UART:
2,988,622 UART: Running Caliptra FMC ...
2,989,030 UART:
2,989,084 UART: [state] CFI Enabled
2,999,281 UART: [fht] FMC Alias Private Key: 7
3,107,436 UART: [art] Extend RT PCRs Done
3,107,864 UART: [art] Lock RT PCRs Done
3,109,480 UART: [art] Populate DV Done
3,117,797 UART: [fht] FMC Alias Private Key: 7
3,118,765 UART: [art] Derive CDI
3,119,045 UART: [art] Store in in slot 0x4
3,204,954 UART: [art] Derive Key Pair
3,205,314 UART: [art] Store priv key in slot 0x5
3,218,658 UART: [art] Derive Key Pair - Done
3,233,459 UART: [art] Signing Cert with AUTHO
3,233,939 UART: RITY.KEYID = 7
3,249,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,856 UART: [art] PUB.X = DB790CE4C2A5612E23EC7B5093789E2C5CD98C7195170A1881649B41B5F6C06BED0ECB91DA4D15E32AB0406E22379436
3,256,621 UART: [art] PUB.Y = 18CB89D18BF33D63481BCF412590610BFA0D5655BA31D5CD73403CB1931ED439EF1B5BCE2E378180BA5BE270FCEE094F
3,263,576 UART: [art] SIG.R = 043C3E57337B258427C8FA80ECD8066972704CBBCF194CCDCF3B0C1B03BA7390ADDD98A8910C924F4E57DC57CEB319EB
3,270,347 UART: [art] SIG.S = 528486D535E640BBAD1977E9DEB78CD624D8ECA467C5BC8E6DC3BCE4004BF3D97D8C9C1FE1F87C0213480008FC1348C0
3,293,986 UART: Caliptra RT
3,294,239 UART: [state] CFI Enabled
3,402,715 UART: [rt] RT listening for mailbox commands...
3,403,385 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,291 UART: [rt]cmd =0x52564348, len=36
3,434,708 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,303 UART: [kat] SHA2-512-ACC
897,204 UART: [kat] ECC-384
902,655 UART: [kat] HMAC-384Kdf
907,417 UART: [kat] LMS
1,475,613 UART: [kat] --
1,476,600 UART: [cold-reset] ++
1,477,060 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 ready_for_fw is high
1,481,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,887 UART: [idev] Erasing UDS.KEYID = 0
1,505,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,311 UART: [idev] --
1,515,298 UART: [ldev] ++
1,515,466 UART: [ldev] CDI.KEYID = 6
1,515,829 UART: [ldev] SUBJECT.KEYID = 5
1,516,255 UART: [ldev] AUTHORITY.KEYID = 7
1,516,718 UART: [ldev] FE.KEYID = 1
1,521,874 UART: [ldev] Erasing FE.KEYID = 1
1,547,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,371 UART: [ldev] --
1,586,828 UART: [fwproc] Waiting for Commands...
1,587,547 UART: [fwproc] Received command 0x46574c44
1,588,338 UART: [fwproc] Received Image of size 114168 bytes
2,884,806 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,148 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,001 >>> mbox cmd response: success
3,078,197 UART: [afmc] ++
3,078,365 UART: [afmc] CDI.KEYID = 6
3,078,727 UART: [afmc] SUBJECT.KEYID = 7
3,079,152 UART: [afmc] AUTHORITY.KEYID = 5
3,114,377 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,055 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,940 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,630 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,593 UART: [afmc] --
3,157,493 UART: [cold-reset] --
3,158,097 UART: [state] Locking Datavault
3,159,306 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,910 UART: [state] Locking ICCM
3,160,450 UART: [exit] Launching FMC @ 0x40000130
3,165,779 UART:
3,165,795 UART: Running Caliptra FMC ...
3,166,203 UART:
3,166,346 UART: [state] CFI Enabled
3,176,901 UART: [fht] FMC Alias Private Key: 7
3,284,830 UART: [art] Extend RT PCRs Done
3,285,258 UART: [art] Lock RT PCRs Done
3,286,810 UART: [art] Populate DV Done
3,294,973 UART: [fht] FMC Alias Private Key: 7
3,296,141 UART: [art] Derive CDI
3,296,421 UART: [art] Store in in slot 0x4
3,381,988 UART: [art] Derive Key Pair
3,382,348 UART: [art] Store priv key in slot 0x5
3,395,342 UART: [art] Derive Key Pair - Done
3,410,233 UART: [art] Signing Cert with AUTHO
3,410,713 UART: RITY.KEYID = 7
3,426,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,948 UART: [art] PUB.X = 433CE7A61B0B2705D0BEAA057C8E6D52AA196A7006AEEA31DCC95CA00BD2018E7BAF25C2E686C0330857C7AAF2EC33F2
3,433,717 UART: [art] PUB.Y = FEAC6912FC6F75531C30F0F975771E68C81535D2F6A998DCA5E2A6E20F0D9610A2947C51F4D479D0CC1D6F14445C5471
3,440,665 UART: [art] SIG.R = CFF6EC6BCDBE90D9320118F4B3CEE3F2E9F3C28179743B3F1910E767D95E2AC0B80A03DE7D2104C5F676668424A3AF23
3,447,435 UART: [art] SIG.S = 2C8C05E0171F6D5166EF9BC9D80EF411DB9B3C83477CFCCD4219D6E52F62E8DDDE4830310E5F0E47FC038DBDE07373B5
3,470,703 UART: Caliptra RT
3,471,048 UART: [state] CFI Enabled
3,579,193 UART: [rt] RT listening for mailbox commands...
3,579,863 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,885 UART: [rt]cmd =0x52564348, len=36
3,611,538 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,296 ready_for_fw is high
1,363,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,037 >>> mbox cmd response: success
2,988,781 UART:
2,988,797 UART: Running Caliptra FMC ...
2,989,205 UART:
2,989,348 UART: [state] CFI Enabled
3,000,075 UART: [fht] FMC Alias Private Key: 7
3,108,468 UART: [art] Extend RT PCRs Done
3,108,896 UART: [art] Lock RT PCRs Done
3,110,202 UART: [art] Populate DV Done
3,118,611 UART: [fht] FMC Alias Private Key: 7
3,119,783 UART: [art] Derive CDI
3,120,063 UART: [art] Store in in slot 0x4
3,205,558 UART: [art] Derive Key Pair
3,205,918 UART: [art] Store priv key in slot 0x5
3,219,040 UART: [art] Derive Key Pair - Done
3,233,604 UART: [art] Signing Cert with AUTHO
3,234,084 UART: RITY.KEYID = 7
3,249,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,279 UART: [art] PUB.X = 8F989C7D53BB5374D93976AB693D9A75481B4055411E06EE8E11251F3F586279FEE0BA88D7763A852D10FB0BDB4F61B8
3,257,045 UART: [art] PUB.Y = FCABFB41573CF7A4EC6E01E2AF91BF4A9C4047AC6B05CFF497255F2FB432AA4BDFB3503B63CEA95E23137D22E9C8BE9B
3,264,017 UART: [art] SIG.R = D754E1965CB43525AED0E3ECD71F92389951F6BE8C5C798E181DB78C83B5520D0BB352B60DCD156F2CBF7668C667EF1E
3,270,790 UART: [art] SIG.S = AD38AA4EB63A303F7E27D2E5196F149325232E7F5CF755EB61ED9A709E37F1F529B945136C9D369A9CF53D1ADBB1DA35
3,295,029 UART: Caliptra RT
3,295,374 UART: [state] CFI Enabled
3,405,032 UART: [rt] RT listening for mailbox commands...
3,405,702 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,810 UART: [rt]cmd =0x52564348, len=36
3,437,009 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
893,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,279 UART: [kat] ++
897,431 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,414 UART: [kat] SHA2-512-ACC
908,315 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,244 UART: [kat] LMS
1,170,572 UART: [kat] --
1,171,657 UART: [cold-reset] ++
1,172,099 UART: [fht] FHT @ 0x50003400
1,174,880 UART: [idev] ++
1,175,048 UART: [idev] CDI.KEYID = 6
1,175,408 UART: [idev] SUBJECT.KEYID = 7
1,175,832 UART: [idev] UDS.KEYID = 0
1,176,177 ready_for_fw is high
1,176,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,065 UART: [idev] Sha1 KeyId Algorithm
1,208,517 UART: [idev] --
1,209,539 UART: [ldev] ++
1,209,707 UART: [ldev] CDI.KEYID = 6
1,210,070 UART: [ldev] SUBJECT.KEYID = 5
1,210,496 UART: [ldev] AUTHORITY.KEYID = 7
1,210,959 UART: [ldev] FE.KEYID = 1
1,215,857 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,287 UART: [ldev] --
1,280,580 UART: [fwproc] Wait for Commands...
1,281,390 UART: [fwproc] Recv command 0x46574c44
1,282,118 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,815 >>> mbox cmd response: success
2,771,849 UART: [afmc] ++
2,772,017 UART: [afmc] CDI.KEYID = 6
2,772,379 UART: [afmc] SUBJECT.KEYID = 7
2,772,804 UART: [afmc] AUTHORITY.KEYID = 5
2,808,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,691 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,104 UART: [afmc] --
2,851,034 UART: [cold-reset] --
2,852,028 UART: [state] Locking Datavault
2,853,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,787 UART: [state] Locking ICCM
2,854,287 UART: [exit] Launching FMC @ 0x40000130
2,859,616 UART:
2,859,632 UART: Running Caliptra FMC ...
2,860,040 UART:
2,860,094 UART: [state] CFI Enabled
2,870,271 UART: [fht] FMC Alias Private Key: 7
2,977,634 UART: [art] Extend RT PCRs Done
2,978,062 UART: [art] Lock RT PCRs Done
2,979,818 UART: [art] Populate DV Done
2,988,125 UART: [fht] FMC Alias Private Key: 7
2,989,117 UART: [art] Derive CDI
2,989,397 UART: [art] Store in in slot 0x4
3,075,026 UART: [art] Derive Key Pair
3,075,386 UART: [art] Store priv key in slot 0x5
3,088,628 UART: [art] Derive Key Pair - Done
3,103,265 UART: [art] Signing Cert with AUTHO
3,103,745 UART: RITY.KEYID = 7
3,118,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,258 UART: [art] PUB.X = 01A2E6706EB10DB2664F472E4DC17D3B3026A3D632A126ED72E6A6EA668ADCF0086D16695D8D1ED9F9CBB43F7717BC19
3,126,031 UART: [art] PUB.Y = 9987899564E9C365112E7BC7BBB26F8E0B2CBE046D16F5C2AF4A69F5B857E48393FC6EB5955FF3DD414D7E8CE5018674
3,132,980 UART: [art] SIG.R = 30E839BF1BBE27E3158DD9F3ACC2F3EFA1529390111CB19DB45884157C0E50C8FEEED5D0EA3B5CB8D28586CFB9D04B70
3,139,767 UART: [art] SIG.S = 782EA01DE0B4C3189275ED89454848495D4E7A8CC8729D56566C16E5F124CC8EA328133877D5587AEF28142733956E04
3,162,941 UART: Caliptra RT
3,163,194 UART: [state] CFI Enabled
3,271,091 UART: [rt] RT listening for mailbox commands...
3,271,761 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,763 UART: [rt]cmd =0x52564348, len=36
3,303,304 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,905 ready_for_fw is high
1,059,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,160 >>> mbox cmd response: success
2,686,544 UART:
2,686,560 UART: Running Caliptra FMC ...
2,686,968 UART:
2,687,022 UART: [state] CFI Enabled
2,697,259 UART: [fht] FMC Alias Private Key: 7
2,805,030 UART: [art] Extend RT PCRs Done
2,805,458 UART: [art] Lock RT PCRs Done
2,807,346 UART: [art] Populate DV Done
2,815,431 UART: [fht] FMC Alias Private Key: 7
2,816,411 UART: [art] Derive CDI
2,816,691 UART: [art] Store in in slot 0x4
2,902,374 UART: [art] Derive Key Pair
2,902,734 UART: [art] Store priv key in slot 0x5
2,916,446 UART: [art] Derive Key Pair - Done
2,931,278 UART: [art] Signing Cert with AUTHO
2,931,758 UART: RITY.KEYID = 7
2,946,972 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,737 UART: [art] PUB.X = 3E2A010253E3FEA153AD969686ECE35B5DD5124AA07DA8568C920AE274AF979C5112F047ADA4138FA6CD23984FE395E2
2,954,506 UART: [art] PUB.Y = B9DF0BEFA4F406770186F90A42BF9C3934F24F10714B08FC42E8257349F5ACD75688CDB9A4028F74A84935DB11AE160B
2,961,441 UART: [art] SIG.R = CDD6C1681B8174B6951E6C21F46459E7B30CBAADA39248FE6D9BA8847141983679CB50E66460CB81A9F6661E4F52D6D4
2,968,212 UART: [art] SIG.S = 4AEE065CD82D8724CBB48E781BC975EBF366D9C435F1C003E028FDCF276F391D5CA428E88A921CDF326E8F5D04E69617
2,992,070 UART: Caliptra RT
2,992,323 UART: [state] CFI Enabled
3,100,334 UART: [rt] RT listening for mailbox commands...
3,101,004 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,854 UART: [rt]cmd =0x52564348, len=36
3,132,023 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
893,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,506 UART: [kat] ++
897,658 UART: [kat] sha1
901,758 UART: [kat] SHA2-256
903,698 UART: [kat] SHA2-384
906,385 UART: [kat] SHA2-512-ACC
908,286 UART: [kat] ECC-384
917,953 UART: [kat] HMAC-384Kdf
922,657 UART: [kat] LMS
1,170,985 UART: [kat] --
1,171,894 UART: [cold-reset] ++
1,172,292 UART: [fht] FHT @ 0x50003400
1,174,881 UART: [idev] ++
1,175,049 UART: [idev] CDI.KEYID = 6
1,175,409 UART: [idev] SUBJECT.KEYID = 7
1,175,833 UART: [idev] UDS.KEYID = 0
1,176,178 ready_for_fw is high
1,176,178 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,979 UART: [idev] Erasing UDS.KEYID = 0
1,201,246 UART: [idev] Sha1 KeyId Algorithm
1,209,704 UART: [idev] --
1,210,698 UART: [ldev] ++
1,210,866 UART: [ldev] CDI.KEYID = 6
1,211,229 UART: [ldev] SUBJECT.KEYID = 5
1,211,655 UART: [ldev] AUTHORITY.KEYID = 7
1,212,118 UART: [ldev] FE.KEYID = 1
1,217,546 UART: [ldev] Erasing FE.KEYID = 1
1,244,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,252 UART: [ldev] --
1,283,581 UART: [fwproc] Wait for Commands...
1,284,165 UART: [fwproc] Recv command 0x46574c44
1,284,893 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,503 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,340 >>> mbox cmd response: success
2,773,490 UART: [afmc] ++
2,773,658 UART: [afmc] CDI.KEYID = 6
2,774,020 UART: [afmc] SUBJECT.KEYID = 7
2,774,445 UART: [afmc] AUTHORITY.KEYID = 5
2,810,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,665 UART: [afmc] --
2,853,769 UART: [cold-reset] --
2,854,705 UART: [state] Locking Datavault
2,856,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,610 UART: [state] Locking ICCM
2,857,146 UART: [exit] Launching FMC @ 0x40000130
2,862,475 UART:
2,862,491 UART: Running Caliptra FMC ...
2,862,899 UART:
2,863,042 UART: [state] CFI Enabled
2,873,503 UART: [fht] FMC Alias Private Key: 7
2,981,590 UART: [art] Extend RT PCRs Done
2,982,018 UART: [art] Lock RT PCRs Done
2,983,464 UART: [art] Populate DV Done
2,991,599 UART: [fht] FMC Alias Private Key: 7
2,992,637 UART: [art] Derive CDI
2,992,917 UART: [art] Store in in slot 0x4
3,078,652 UART: [art] Derive Key Pair
3,079,012 UART: [art] Store priv key in slot 0x5
3,092,456 UART: [art] Derive Key Pair - Done
3,107,260 UART: [art] Signing Cert with AUTHO
3,107,740 UART: RITY.KEYID = 7
3,122,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,647 UART: [art] PUB.X = 9C7C3A1339D87434EF86322F61849F3B198A01FD36C1F940737FC6275064EBDD8FE42956BACB7BDB72F1330468483DCD
3,130,415 UART: [art] PUB.Y = 1AFD433BE91B7B55377DC2E8AC767B79188E7C562B014BAD9739232BA33724A79DE10DC6D51BDBB626272FA7D687D718
3,137,367 UART: [art] SIG.R = BC28F24F484BFB0E87CD4F0770857CE650DBC77B61143F395B74B9034EB61A43BD7D51E66C1C1A78270741E0B38B28F5
3,144,131 UART: [art] SIG.S = 455F4E52BA39C71BC4D2F914B88F9DB729EA2958582FE8046E8352128950A4FC40073542C3BF663B48731C88C2300980
3,167,685 UART: Caliptra RT
3,168,030 UART: [state] CFI Enabled
3,276,029 UART: [rt] RT listening for mailbox commands...
3,276,699 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,773 UART: [rt]cmd =0x52564348, len=36
3,308,166 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 ready_for_fw is high
1,060,020 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,607 >>> mbox cmd response: success
2,687,705 UART:
2,687,721 UART: Running Caliptra FMC ...
2,688,129 UART:
2,688,272 UART: [state] CFI Enabled
2,699,361 UART: [fht] FMC Alias Private Key: 7
2,807,652 UART: [art] Extend RT PCRs Done
2,808,080 UART: [art] Lock RT PCRs Done
2,809,380 UART: [art] Populate DV Done
2,817,589 UART: [fht] FMC Alias Private Key: 7
2,818,603 UART: [art] Derive CDI
2,818,883 UART: [art] Store in in slot 0x4
2,904,552 UART: [art] Derive Key Pair
2,904,912 UART: [art] Store priv key in slot 0x5
2,918,240 UART: [art] Derive Key Pair - Done
2,932,860 UART: [art] Signing Cert with AUTHO
2,933,340 UART: RITY.KEYID = 7
2,948,272 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,037 UART: [art] PUB.X = FC73F5B882907871902BAFF261F55303242B37B1BFD8FCB16D531C9EE244C7D49E0C7DE08B00A867B941B65ED87AC147
2,955,787 UART: [art] PUB.Y = BBDF0DB2FAEBC3B11F97586F5EC192E1737BF5577871284B91F04BE4B5166B995A10D7F7A51E97CE097A4BFFCC22E03B
2,962,749 UART: [art] SIG.R = 207F598E3FCABEE0C5E2148A1E7A84B6C98EB54FF448EFC38B26891DC758B3DA8FFDA03328F6F96E32E799D2CC7E639B
2,969,539 UART: [art] SIG.S = D07D763C44B96CE7F01D6CB829968F4D78FCB264C37E642D2466BB4979D384E1C1FE519B3C3A648C565CC17B38D26A2A
2,993,216 UART: Caliptra RT
2,993,561 UART: [state] CFI Enabled
3,100,726 UART: [rt] RT listening for mailbox commands...
3,101,396 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,428 UART: [rt]cmd =0x52564348, len=36
3,132,953 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,601 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,173,777 ready_for_fw is high
1,173,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,393 UART: [idev] Erasing UDS.KEYID = 0
1,198,507 UART: [idev] Sha1 KeyId Algorithm
1,207,373 UART: [idev] --
1,208,470 UART: [ldev] ++
1,208,638 UART: [ldev] CDI.KEYID = 6
1,209,002 UART: [ldev] SUBJECT.KEYID = 5
1,209,429 UART: [ldev] AUTHORITY.KEYID = 7
1,209,892 UART: [ldev] FE.KEYID = 1
1,215,068 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,340 UART: [ldev] --
1,280,688 UART: [fwproc] Wait for Commands...
1,281,335 UART: [fwproc] Recv command 0x46574c44
1,282,068 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,521 >>> mbox cmd response: success
2,770,598 UART: [afmc] ++
2,770,766 UART: [afmc] CDI.KEYID = 6
2,771,129 UART: [afmc] SUBJECT.KEYID = 7
2,771,555 UART: [afmc] AUTHORITY.KEYID = 5
2,807,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,095 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,824 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,707 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,426 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,215 UART: [afmc] --
2,850,219 UART: [cold-reset] --
2,851,075 UART: [state] Locking Datavault
2,852,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,944 UART: [state] Locking ICCM
2,853,616 UART: [exit] Launching FMC @ 0x40000130
2,858,945 UART:
2,858,961 UART: Running Caliptra FMC ...
2,859,369 UART:
2,859,423 UART: [state] CFI Enabled
2,869,910 UART: [fht] FMC Alias Private Key: 7
2,977,957 UART: [art] Extend RT PCRs Done
2,978,385 UART: [art] Lock RT PCRs Done
2,980,035 UART: [art] Populate DV Done
2,988,242 UART: [fht] FMC Alias Private Key: 7
2,989,340 UART: [art] Derive CDI
2,989,620 UART: [art] Store in in slot 0x4
3,075,347 UART: [art] Derive Key Pair
3,075,707 UART: [art] Store priv key in slot 0x5
3,088,639 UART: [art] Derive Key Pair - Done
3,103,440 UART: [art] Signing Cert with AUTHO
3,103,920 UART: RITY.KEYID = 7
3,119,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,965 UART: [art] PUB.X = DF7849DC3EFED3433BC682E6618954A4AF3B2927094F5FE9149070506872C5215869965F098007DDF4A55A7286DFB68C
3,126,722 UART: [art] PUB.Y = DB172E9C0EB5BB0DCA5D7A98E772A6339C85D939B942F6E6B0921532EE7584B6B0B4E19DA156A833D7F3F3B10FA23EB1
3,133,677 UART: [art] SIG.R = 8BC52D797EBCD34D02AEAEB253AA1562CBC7EA9A6022724C736A870F3F872F8D97A654ACC44A55B28A317DE794BE917B
3,140,457 UART: [art] SIG.S = FF0D482746F3C1254C88D5C10059A2197A0674D20F8F16E899FC63C1223DD037B153EFD43D12FDBFE13B69B7FA3CE1EB
3,163,861 UART: Caliptra RT
3,164,114 UART: [state] CFI Enabled
3,272,186 UART: [rt] RT listening for mailbox commands...
3,272,856 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,070 UART: [rt]cmd =0x52564348, len=36
3,304,711 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,802 ready_for_fw is high
1,055,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,487 >>> mbox cmd response: success
2,682,067 UART:
2,682,083 UART: Running Caliptra FMC ...
2,682,491 UART:
2,682,545 UART: [state] CFI Enabled
2,693,086 UART: [fht] FMC Alias Private Key: 7
2,800,781 UART: [art] Extend RT PCRs Done
2,801,209 UART: [art] Lock RT PCRs Done
2,802,911 UART: [art] Populate DV Done
2,810,894 UART: [fht] FMC Alias Private Key: 7
2,812,012 UART: [art] Derive CDI
2,812,292 UART: [art] Store in in slot 0x4
2,897,805 UART: [art] Derive Key Pair
2,898,165 UART: [art] Store priv key in slot 0x5
2,911,221 UART: [art] Derive Key Pair - Done
2,926,406 UART: [art] Signing Cert with AUTHO
2,926,886 UART: RITY.KEYID = 7
2,942,358 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,123 UART: [art] PUB.X = EBE63C4743561E1930256DAF99B99A1F3FF1247011D8EB7FDFF8EB94C74C1A6727F4264A1EE4A274686660F00BC6BE0E
2,949,897 UART: [art] PUB.Y = 5B5FF0E19472B55B4CE990D666D8B920B3AA727DD896CEDA369ABF4E129742B1F92BD674CC431D2491B0597EA082DE3D
2,956,859 UART: [art] SIG.R = 66C19AB1A8F4177B3D424FACC9692FFED4FBFD6E9CC41220BDDFCBDCB8FAB63D3FB13AAE68B5797317E99830F0A9134E
2,963,657 UART: [art] SIG.S = 73CD354DFD138CF04633BA9B268D51D717FB705E1DC7068AE2E311563836A4048BDEBB85B0E85A172D6ADACFAD10BB04
2,987,841 UART: Caliptra RT
2,988,094 UART: [state] CFI Enabled
3,095,155 UART: [rt] RT listening for mailbox commands...
3,095,825 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,989 UART: [rt]cmd =0x52564348, len=36
3,127,590 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,842 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,173,120 UART: [idev] ++
1,173,288 UART: [idev] CDI.KEYID = 6
1,173,649 UART: [idev] SUBJECT.KEYID = 7
1,174,074 UART: [idev] UDS.KEYID = 0
1,174,420 ready_for_fw is high
1,174,420 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,502 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,746 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,441 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,483 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,796 >>> mbox cmd response: success
2,771,833 UART: [afmc] ++
2,772,001 UART: [afmc] CDI.KEYID = 6
2,772,364 UART: [afmc] SUBJECT.KEYID = 7
2,772,790 UART: [afmc] AUTHORITY.KEYID = 5
2,808,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,563 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,446 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,165 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,960 UART: [afmc] --
2,852,090 UART: [cold-reset] --
2,852,704 UART: [state] Locking Datavault
2,853,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,443 UART: [state] Locking ICCM
2,854,877 UART: [exit] Launching FMC @ 0x40000130
2,860,206 UART:
2,860,222 UART: Running Caliptra FMC ...
2,860,630 UART:
2,860,773 UART: [state] CFI Enabled
2,871,524 UART: [fht] FMC Alias Private Key: 7
2,979,863 UART: [art] Extend RT PCRs Done
2,980,291 UART: [art] Lock RT PCRs Done
2,981,849 UART: [art] Populate DV Done
2,989,964 UART: [fht] FMC Alias Private Key: 7
2,990,922 UART: [art] Derive CDI
2,991,202 UART: [art] Store in in slot 0x4
3,076,701 UART: [art] Derive Key Pair
3,077,061 UART: [art] Store priv key in slot 0x5
3,090,711 UART: [art] Derive Key Pair - Done
3,105,429 UART: [art] Signing Cert with AUTHO
3,105,909 UART: RITY.KEYID = 7
3,121,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,146 UART: [art] PUB.X = F748D7AD99AE6641DD32B50C541221A2FF025A4FA6ACFEE1F5A1D79EC7348D3500EBDC16098F07C29196EFD4E6AAE397
3,128,900 UART: [art] PUB.Y = 3DDBEC3AAEC9C13ADBF537EDCCCA27D32AFFEB214BFB663A95AC5751C08CF0C0EBB0E09F83E65D17BEDEC5CA53F97614
3,135,890 UART: [art] SIG.R = D3ECE766D8BA3AFA5B5D3167164A97DECB810276A4D8E3CB6B52E7BA9ADFF5ABFA6D75F1AEE8E9FAA3642A66262D7183
3,142,685 UART: [art] SIG.S = 0903030A94D7FE66FF67B84966E3ADF0A1F107C76BD64F15B920D8EE21E9A62CA496FD70E4F2778EAA107521CB7DB3A6
3,166,145 UART: Caliptra RT
3,166,490 UART: [state] CFI Enabled
3,273,017 UART: [rt] RT listening for mailbox commands...
3,273,687 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,837 UART: [rt]cmd =0x52564348, len=36
3,305,356 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,169 ready_for_fw is high
1,057,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,946 >>> mbox cmd response: success
2,686,384 UART:
2,686,400 UART: Running Caliptra FMC ...
2,686,808 UART:
2,686,951 UART: [state] CFI Enabled
2,697,584 UART: [fht] FMC Alias Private Key: 7
2,805,885 UART: [art] Extend RT PCRs Done
2,806,313 UART: [art] Lock RT PCRs Done
2,807,883 UART: [art] Populate DV Done
2,816,272 UART: [fht] FMC Alias Private Key: 7
2,817,416 UART: [art] Derive CDI
2,817,696 UART: [art] Store in in slot 0x4
2,903,543 UART: [art] Derive Key Pair
2,903,903 UART: [art] Store priv key in slot 0x5
2,917,791 UART: [art] Derive Key Pair - Done
2,932,569 UART: [art] Signing Cert with AUTHO
2,933,049 UART: RITY.KEYID = 7
2,948,517 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,282 UART: [art] PUB.X = 640F0815A36D055E0CF56759CD8934B03B6888005B33F8A799FCA07101B58CDA5D52C296D10672546FDDB6D269B89FFD
2,956,014 UART: [art] PUB.Y = F4A5E325852E4A95D15F9E922F8667693DDBCD6F637980F45F77AB25606F2F202021C75A108BD7EBF0902790700BB6DB
2,962,963 UART: [art] SIG.R = 7656ED8568CDD0EEF2B13790D7C20BB44AE59924320BA5FAA4B0A4844A271E8ECEE912183C85250FD349C69AD573CEA4
2,969,736 UART: [art] SIG.S = F04F91D0EFA3E606691721F8DEB3B825B9FCA3F199AC4BE796BB542F5603B3CEF67835F7AF22661C050571AF4281B305
2,993,170 UART: Caliptra RT
2,993,515 UART: [state] CFI Enabled
3,100,934 UART: [rt] RT listening for mailbox commands...
3,101,604 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,452 UART: [rt]cmd =0x52564348, len=36
3,132,659 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,148 UART:
192,504 UART: Running Caliptra ROM ...
193,685 UART:
193,836 UART: [state] CFI Enabled
265,009 UART: [state] LifecycleState = Unprovisioned
266,928 UART: [state] DebugLocked = No
269,163 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,740 UART: [kat] SHA2-256
443,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,873 UART: [kat] ++
454,348 UART: [kat] sha1
465,715 UART: [kat] SHA2-256
468,425 UART: [kat] SHA2-384
473,620 UART: [kat] SHA2-512-ACC
475,981 UART: [kat] ECC-384
2,767,599 UART: [kat] HMAC-384Kdf
2,781,340 UART: [kat] LMS
3,971,686 UART: [kat] --
3,976,626 UART: [cold-reset] ++
3,977,562 UART: [fht] Storing FHT @ 0x50003400
3,989,666 UART: [idev] ++
3,990,225 UART: [idev] CDI.KEYID = 6
3,991,178 UART: [idev] SUBJECT.KEYID = 7
3,992,416 UART: [idev] UDS.KEYID = 0
3,993,400 ready_for_fw is high
3,993,628 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,136,886 UART: [idev] Erasing UDS.KEYID = 0
7,329,531 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,845 UART: [idev] --
7,355,700 UART: [ldev] ++
7,356,263 UART: [ldev] CDI.KEYID = 6
7,357,221 UART: [ldev] SUBJECT.KEYID = 5
7,358,429 UART: [ldev] AUTHORITY.KEYID = 7
7,359,708 UART: [ldev] FE.KEYID = 1
7,403,917 UART: [ldev] Erasing FE.KEYID = 1
10,737,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,608 UART: [ldev] --
13,118,773 UART: [fwproc] Waiting for Commands...
13,122,001 UART: [fwproc] Received command 0x46574c44
13,124,185 UART: [fwproc] Received Image of size 113844 bytes
17,164,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,012 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,626,614 >>> mbox cmd response: success
17,630,514 UART: [afmc] ++
17,631,162 UART: [afmc] CDI.KEYID = 6
17,632,041 UART: [afmc] SUBJECT.KEYID = 7
17,633,305 UART: [afmc] AUTHORITY.KEYID = 5
20,990,587 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,850 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,113 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,577 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,397 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,853 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,047 UART: [afmc] --
23,360,316 UART: [cold-reset] --
23,364,277 UART: [state] Locking Datavault
23,367,735 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,494 UART: [state] Locking ICCM
23,371,907 UART: [exit] Launching FMC @ 0x40000130
23,380,300 UART:
23,380,526 UART: Running Caliptra FMC ...
23,381,621 UART:
23,381,773 UART: [state] CFI Enabled
23,450,441 UART: [fht] FMC Alias Private Key: 7
25,787,827 UART: [art] Extend RT PCRs Done
25,789,045 UART: [art] Lock RT PCRs Done
25,790,964 UART: [art] Populate DV Done
25,796,634 UART: [fht] FMC Alias Private Key: 7
25,798,181 UART: [art] Derive CDI
25,798,992 UART: [art] Store in in slot 0x4
25,858,621 UART: [art] Derive Key Pair
25,859,614 UART: [art] Store priv key in slot 0x5
29,152,875 UART: [art] Derive Key Pair - Done
29,165,982 UART: [art] Signing Cert with AUTHO
29,167,273 UART: RITY.KEYID = 7
31,454,448 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,950 UART: [art] PUB.X = 8D3E2A9E4690EDC4E92B4202AAF8532AE1B907A44969726E73735CAA9D8359A91C593551EF41DC8DDF61B1513A3EB45C
31,463,170 UART: [art] PUB.Y = 67CE6BB12C30656A223E9032839062D5B08AE5E358DBC898C905936F60A153B35FB14076EFBE786007802F0EA14CE4BE
31,470,400 UART: [art] SIG.R = B357363181A8F0984F672A3D1A96280EE31D0592BF3D4BA6221E23FDD77CBF3A3F6685B01FB4CB1EA9BAE1C064E076C5
31,477,820 UART: [art] SIG.S = 7053EC01822ED34ECD08830B6A506F00D1F38AB23466E76CA7F1A5416CE8D3DA1910E1BA6ED96DE2A0F0C09428F36CDC
32,782,726 UART: Caliptra RT
32,783,428 UART: [state] CFI Enabled
32,944,295 UART: [rt] RT listening for mailbox commands...
32,946,174 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,977,412 UART: [rt]cmd =0x53574545, len=84
32,979,174 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,786,859 ready_for_fw is high
3,787,262 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,841,651 >>> mbox cmd response: success
23,542,764 UART:
23,543,165 UART: Running Caliptra FMC ...
23,544,271 UART:
23,544,425 UART: [state] CFI Enabled
23,611,447 UART: [fht] FMC Alias Private Key: 7
25,949,626 UART: [art] Extend RT PCRs Done
25,950,855 UART: [art] Lock RT PCRs Done
25,953,020 UART: [art] Populate DV Done
25,958,384 UART: [fht] FMC Alias Private Key: 7
25,959,953 UART: [art] Derive CDI
25,960,710 UART: [art] Store in in slot 0x4
26,020,294 UART: [art] Derive Key Pair
26,021,352 UART: [art] Store priv key in slot 0x5
29,314,099 UART: [art] Derive Key Pair - Done
29,327,267 UART: [art] Signing Cert with AUTHO
29,328,591 UART: RITY.KEYID = 7
31,616,377 UART: [art] Erasing AUTHORITY.KEYID = 7
31,617,888 UART: [art] PUB.X = B3668F4CE466D1ADB2185C31185D414BA4C64BE8BC17F52F4834876FE053E61340DEAED199412405814D0E135DC38E62
31,625,157 UART: [art] PUB.Y = 91D40533FE8626D10FC586B06AB1209348951AE59E33B7B16BDB5C6574E412DC397ACF9EA18919C6E02580974546CA72
31,632,359 UART: [art] SIG.R = 050F76999808D1C4E4A234801227E2FA8E7193F63FF44161CDE5FE9F1E935FE6560EBA126CE9DC99A43498244D4EE770
31,639,720 UART: [art] SIG.S = E6185657E8BCA14A5E44ECD5D64A7C3FCCE6F65E22FC77EA5B715A9C3AABEC26B6CA12F17032378070460306E5E432D0
32,945,231 UART: Caliptra RT
32,945,934 UART: [state] CFI Enabled
33,127,545 UART: [rt] RT listening for mailbox commands...
33,129,450 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,160,513 UART: [rt]cmd =0x53574545, len=84
33,162,444 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,614 UART:
192,977 UART: Running Caliptra ROM ...
194,176 UART:
603,845 UART: [state] CFI Enabled
618,155 UART: [state] LifecycleState = Unprovisioned
620,098 UART: [state] DebugLocked = No
622,907 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,258 UART: [kat] SHA2-256
797,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,500 UART: [kat] ++
809,101 UART: [kat] sha1
820,337 UART: [kat] SHA2-256
823,053 UART: [kat] SHA2-384
829,976 UART: [kat] SHA2-512-ACC
832,342 UART: [kat] ECC-384
3,114,147 UART: [kat] HMAC-384Kdf
3,124,978 UART: [kat] LMS
4,315,135 UART: [kat] --
4,319,589 UART: [cold-reset] ++
4,320,818 UART: [fht] Storing FHT @ 0x50003400
4,332,299 UART: [idev] ++
4,332,870 UART: [idev] CDI.KEYID = 6
4,333,782 UART: [idev] SUBJECT.KEYID = 7
4,335,030 UART: [idev] UDS.KEYID = 0
4,336,027 ready_for_fw is high
4,336,226 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,200 UART: [idev] Erasing UDS.KEYID = 0
7,623,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,501 UART: [idev] --
7,647,453 UART: [ldev] ++
7,648,032 UART: [ldev] CDI.KEYID = 6
7,648,951 UART: [ldev] SUBJECT.KEYID = 5
7,650,180 UART: [ldev] AUTHORITY.KEYID = 7
7,651,413 UART: [ldev] FE.KEYID = 1
7,660,978 UART: [ldev] Erasing FE.KEYID = 1
10,950,066 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,257 UART: [ldev] --
13,310,870 UART: [fwproc] Waiting for Commands...
13,312,746 UART: [fwproc] Received command 0x46574c44
13,314,928 UART: [fwproc] Received Image of size 113844 bytes
17,367,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,440,150 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,509,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,825,307 >>> mbox cmd response: success
17,829,137 UART: [afmc] ++
17,829,739 UART: [afmc] CDI.KEYID = 6
17,830,768 UART: [afmc] SUBJECT.KEYID = 7
17,831,925 UART: [afmc] AUTHORITY.KEYID = 5
21,145,066 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,439,572 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,822 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,456,203 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,471,066 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,485,529 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,157 UART: [afmc] --
23,512,457 UART: [cold-reset] --
23,516,747 UART: [state] Locking Datavault
23,520,534 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,284 UART: [state] Locking ICCM
23,524,379 UART: [exit] Launching FMC @ 0x40000130
23,532,795 UART:
23,533,034 UART: Running Caliptra FMC ...
23,534,139 UART:
23,534,301 UART: [state] CFI Enabled
23,542,241 UART: [fht] FMC Alias Private Key: 7
25,873,087 UART: [art] Extend RT PCRs Done
25,874,310 UART: [art] Lock RT PCRs Done
25,875,965 UART: [art] Populate DV Done
25,881,323 UART: [fht] FMC Alias Private Key: 7
25,882,969 UART: [art] Derive CDI
25,883,705 UART: [art] Store in in slot 0x4
25,926,848 UART: [art] Derive Key Pair
25,927,855 UART: [art] Store priv key in slot 0x5
29,170,290 UART: [art] Derive Key Pair - Done
29,183,116 UART: [art] Signing Cert with AUTHO
29,184,423 UART: RITY.KEYID = 7
31,464,324 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,828 UART: [art] PUB.X = B358D9AB44C7110EDCCE6EAF6C99F73D0E362CEAAAD1C231F08045BDDA4469DB75459D40820B7E17D3403D76ECB7F5FD
31,473,087 UART: [art] PUB.Y = 9BCC7C82B93834DEFC160D77C2698FA98BD877910801FE5CFE42927ABEA6C7272C0ACCA7A8A3AB19E7A633BB7DB02EE3
31,480,388 UART: [art] SIG.R = 9BA36BF4D2656A108B9EE2A6AEAB607B1E7581041A70CB7B9C3A15CE3039B596CAA639939C22DF8280DF9789BB656DBC
31,487,821 UART: [art] SIG.S = FEC8DA9D01421E6833B3FFAEB1E0E4D862A92C85B30DD7B7031866843B3330CA141DD18029C9A38A7C38E98FD2E91CC7
32,793,492 UART: Caliptra RT
32,794,210 UART: [state] CFI Enabled
32,912,196 UART: [rt] RT listening for mailbox commands...
32,914,075 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,945,475 UART: [rt]cmd =0x53574545, len=84
32,947,542 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
4,130,254 ready_for_fw is high
4,130,830 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,075,294 >>> mbox cmd response: success
23,717,368 UART:
23,717,766 UART: Running Caliptra FMC ...
23,718,918 UART:
23,719,084 UART: [state] CFI Enabled
23,727,363 UART: [fht] FMC Alias Private Key: 7
26,058,478 UART: [art] Extend RT PCRs Done
26,059,710 UART: [art] Lock RT PCRs Done
26,061,123 UART: [art] Populate DV Done
26,066,270 UART: [fht] FMC Alias Private Key: 7
26,067,950 UART: [art] Derive CDI
26,068,778 UART: [art] Store in in slot 0x4
26,111,105 UART: [art] Derive Key Pair
26,112,107 UART: [art] Store priv key in slot 0x5
29,354,174 UART: [art] Derive Key Pair - Done
29,367,009 UART: [art] Signing Cert with AUTHO
29,368,322 UART: RITY.KEYID = 7
31,647,613 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,126 UART: [art] PUB.X = 162A82939A813821FBB8E4AB790244FFA7159B009F233518D4E0926FA19B54E21E36DA7EC4C2549148F6858322668D3A
31,656,422 UART: [art] PUB.Y = 81A364C6A2CC54E458D2EB86F82BAF3D090B0035094DC5A740F362E06BFF143CE854BD523CCE5B1E826997E6DAD4F6CA
31,663,632 UART: [art] SIG.R = A074F3FA8F53F1AE5932C835F47191B03FAF4EEDDEA1F2647EC40312288E10A0B4BBD9F51A0E9C745617A417E1589D03
31,671,036 UART: [art] SIG.S = FCAB4C9F2A3C027033F66117A15EBAFB5FAC90706FC4A1C6D177B8387547DE0CE3BDDC9A67673926512E4007E05B2495
32,976,518 UART: Caliptra RT
32,977,237 UART: [state] CFI Enabled
33,095,399 UART: [rt] RT listening for mailbox commands...
33,097,290 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,128,351 UART: [rt]cmd =0x53574545, len=84
33,130,340 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
191,962 UART:
192,359 UART: Running Caliptra ROM ...
193,550 UART:
193,705 UART: [state] CFI Enabled
263,271 UART: [state] LifecycleState = Unprovisioned
265,190 UART: [state] DebugLocked = No
267,009 UART: [state] WD Timer not started. Device not locked for debugging
270,063 UART: [kat] SHA2-256
449,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,754 UART: [kat] ++
461,289 UART: [kat] sha1
471,391 UART: [kat] SHA2-256
474,390 UART: [kat] SHA2-384
479,246 UART: [kat] SHA2-512-ACC
482,252 UART: [kat] ECC-384
2,926,571 UART: [kat] HMAC-384Kdf
2,951,803 UART: [kat] LMS
3,481,271 UART: [kat] --
3,486,328 UART: [cold-reset] ++
3,488,793 UART: [fht] FHT @ 0x50003400
3,499,001 UART: [idev] ++
3,499,576 UART: [idev] CDI.KEYID = 6
3,500,640 UART: [idev] SUBJECT.KEYID = 7
3,501,748 UART: [idev] UDS.KEYID = 0
3,502,697 ready_for_fw is high
3,502,889 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,646,886 UART: [idev] Erasing UDS.KEYID = 0
6,008,174 UART: [idev] Sha1 KeyId Algorithm
6,030,333 UART: [idev] --
6,033,902 UART: [ldev] ++
6,034,487 UART: [ldev] CDI.KEYID = 6
6,035,562 UART: [ldev] SUBJECT.KEYID = 5
6,036,675 UART: [ldev] AUTHORITY.KEYID = 7
6,037,877 UART: [ldev] FE.KEYID = 1
6,082,098 UART: [ldev] Erasing FE.KEYID = 1
8,585,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,230 UART: [ldev] --
10,395,741 UART: [fwproc] Wait for Commands...
10,398,222 UART: [fwproc] Recv command 0x46574c44
10,400,318 UART: [fwproc] Recv'd Img size: 114168 bytes
13,799,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,875,704 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,944,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,261,030 >>> mbox cmd response: success
14,265,072 UART: [afmc] ++
14,265,692 UART: [afmc] CDI.KEYID = 6
14,266,588 UART: [afmc] SUBJECT.KEYID = 7
14,267,747 UART: [afmc] AUTHORITY.KEYID = 5
16,811,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,094 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,552,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,568,927 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,584,768 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,607,781 UART: [afmc] --
18,611,898 UART: [cold-reset] --
18,615,985 UART: [state] Locking Datavault
18,621,030 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,680 UART: [state] Locking ICCM
18,623,779 UART: [exit] Launching FMC @ 0x40000130
18,632,181 UART:
18,632,433 UART: Running Caliptra FMC ...
18,633,460 UART:
18,633,607 UART: [state] CFI Enabled
18,696,238 UART: [fht] FMC Alias Private Key: 7
20,459,921 UART: [art] Extend RT PCRs Done
20,461,139 UART: [art] Lock RT PCRs Done
20,462,844 UART: [art] Populate DV Done
20,468,147 UART: [fht] FMC Alias Private Key: 7
20,469,737 UART: [art] Derive CDI
20,470,476 UART: [art] Store in in slot 0x4
20,528,597 UART: [art] Derive Key Pair
20,529,632 UART: [art] Store priv key in slot 0x5
22,992,260 UART: [art] Derive Key Pair - Done
23,005,686 UART: [art] Signing Cert with AUTHO
23,007,182 UART: RITY.KEYID = 7
24,717,827 UART: [art] Erasing AUTHORITY.KEYID = 7
24,719,347 UART: [art] PUB.X = FF91C5106BEF09A035D83D504609CD533A8FC59AFEBBD3A672C72745E346A435FF92327BA86B551129928A30B96B0A91
24,726,599 UART: [art] PUB.Y = 6AE82C798B1508D86B9E714D647D022942BF3B97455D231E5C7B03BF536EB6A5A74AFB379ECEECA8607E00928EF70214
24,733,838 UART: [art] SIG.R = 9E90D8DD96BBD76D2B822EA5E6430862F1F10B423E8BA9A83BC37CE41AE6749952BF090792533A3777173175094EC07A
24,741,246 UART: [art] SIG.S = F7235802D5D44DDE96AEE6A8CCC9FB6059DDD93FE803707CC43ACBCBDEBC03758CEB930BA2B6FE66E07F9D0F8E644907
25,720,092 UART: Caliptra RT
25,720,784 UART: [state] CFI Enabled
25,886,446 UART: [rt] RT listening for mailbox commands...
25,888,470 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,919,256 UART: [rt]cmd =0x53574545, len=84
25,921,135 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,380,576 ready_for_fw is high
3,380,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,056,668 >>> mbox cmd response: success
18,344,424 UART:
18,344,855 UART: Running Caliptra FMC ...
18,345,963 UART:
18,346,117 UART: [state] CFI Enabled
18,412,071 UART: [fht] FMC Alias Private Key: 7
20,175,951 UART: [art] Extend RT PCRs Done
20,177,176 UART: [art] Lock RT PCRs Done
20,178,883 UART: [art] Populate DV Done
20,184,189 UART: [fht] FMC Alias Private Key: 7
20,185,731 UART: [art] Derive CDI
20,186,548 UART: [art] Store in in slot 0x4
20,245,221 UART: [art] Derive Key Pair
20,246,263 UART: [art] Store priv key in slot 0x5
22,709,938 UART: [art] Derive Key Pair - Done
22,723,204 UART: [art] Signing Cert with AUTHO
22,724,509 UART: RITY.KEYID = 7
24,435,515 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,049 UART: [art] PUB.X = 5AC2B7D2E05A8163CF8F63B91326CFC4AB9F9B020BC28A6D8A72CECB64ACD0EE2C9E1721D879E1B7D1A4D8284AD8A1C3
24,444,357 UART: [art] PUB.Y = D0BCB5BFBB4A3FBEF82440D64A4A00677F8A7AFB1E6A543CC3B64BC0C7B33B287CFF5BE7F8F8F41CE7FE29FD21F8899E
24,451,591 UART: [art] SIG.R = 4AE996D958EEA20576F730A91CECE81FE2E52708E2A30E1B83F1CDC530771DF0A633FE88F34501A06046643340DDF859
24,459,008 UART: [art] SIG.S = 7173353337DB3587DCA4C9D7A877023A72E64551500623C1364DE5597D4CBD0D89F21BD7E3C2CDF1CA7C7E3F4B837977
25,437,901 UART: Caliptra RT
25,438,600 UART: [state] CFI Enabled
25,603,484 UART: [rt] RT listening for mailbox commands...
25,605,369 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,636,581 UART: [rt]cmd =0x53574545, len=84
25,638,297 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,779 writing to cptra_bootfsm_go
193,043 UART:
193,403 UART: Running Caliptra ROM ...
194,585 UART:
604,020 UART: [state] CFI Enabled
617,464 UART: [state] LifecycleState = Unprovisioned
619,323 UART: [state] DebugLocked = No
621,145 UART: [state] WD Timer not started. Device not locked for debugging
624,818 UART: [kat] SHA2-256
803,914 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,509 UART: [kat] ++
815,968 UART: [kat] sha1
827,082 UART: [kat] SHA2-256
830,118 UART: [kat] SHA2-384
837,745 UART: [kat] SHA2-512-ACC
840,680 UART: [kat] ECC-384
3,282,007 UART: [kat] HMAC-384Kdf
3,294,706 UART: [kat] LMS
3,824,164 UART: [kat] --
3,828,232 UART: [cold-reset] ++
3,830,311 UART: [fht] FHT @ 0x50003400
3,841,789 UART: [idev] ++
3,842,357 UART: [idev] CDI.KEYID = 6
3,843,307 UART: [idev] SUBJECT.KEYID = 7
3,844,354 UART: [idev] UDS.KEYID = 0
3,845,471 ready_for_fw is high
3,845,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,143 UART: [idev] Erasing UDS.KEYID = 0
6,319,961 UART: [idev] Sha1 KeyId Algorithm
6,342,108 UART: [idev] --
6,345,454 UART: [ldev] ++
6,346,029 UART: [ldev] CDI.KEYID = 6
6,346,921 UART: [ldev] SUBJECT.KEYID = 5
6,348,230 UART: [ldev] AUTHORITY.KEYID = 7
6,349,419 UART: [ldev] FE.KEYID = 1
6,360,987 UART: [ldev] Erasing FE.KEYID = 1
8,834,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,958 UART: [ldev] --
10,623,788 UART: [fwproc] Wait for Commands...
10,626,531 UART: [fwproc] Recv command 0x46574c44
10,628,624 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,992 >>> mbox cmd response: success
14,492,879 UART: [afmc] ++
14,493,481 UART: [afmc] CDI.KEYID = 6
14,494,394 UART: [afmc] SUBJECT.KEYID = 7
14,495,553 UART: [afmc] AUTHORITY.KEYID = 5
16,998,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,187 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,736,941 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,752,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,768,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,807 UART: [afmc] --
18,796,211 UART: [cold-reset] --
18,800,656 UART: [state] Locking Datavault
18,805,642 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,342 UART: [state] Locking ICCM
18,810,032 UART: [exit] Launching FMC @ 0x40000130
18,818,429 UART:
18,818,667 UART: Running Caliptra FMC ...
18,819,771 UART:
18,819,931 UART: [state] CFI Enabled
18,828,361 UART: [fht] FMC Alias Private Key: 7
20,585,789 UART: [art] Extend RT PCRs Done
20,587,025 UART: [art] Lock RT PCRs Done
20,588,807 UART: [art] Populate DV Done
20,594,293 UART: [fht] FMC Alias Private Key: 7
20,595,995 UART: [art] Derive CDI
20,596,811 UART: [art] Store in in slot 0x4
20,639,509 UART: [art] Derive Key Pair
20,640,512 UART: [art] Store priv key in slot 0x5
23,067,069 UART: [art] Derive Key Pair - Done
23,080,363 UART: [art] Signing Cert with AUTHO
23,081,677 UART: RITY.KEYID = 7
24,787,180 UART: [art] Erasing AUTHORITY.KEYID = 7
24,788,683 UART: [art] PUB.X = 20652F6B4FFEA28BFC8A6E398C9F16A695ACBA4F6F0E670037819CDA1A739FBD68BBFC6D3B94B953E794B4CEF43FFE29
24,795,989 UART: [art] PUB.Y = 034FBC089785DB49B6DCAA779AFD59D9906A2F2EAB3A1D9D63E4CF4971E3540D58CFA3A793F2D3B919131A4835FA379B
24,803,230 UART: [art] SIG.R = F2A82A219FD004B9F200127BC662535095A13938FE1DDBA3C9411B8DBD5D1B800870E7D772152407E512A4B27E5AC13A
24,810,624 UART: [art] SIG.S = 5C9D6D8A1F77790F452FDC02D6ACC9516215FB75CB3321FC360CAACCAAB7C1EE58EF72E69B232E1033DAEA2257425073
25,789,236 UART: Caliptra RT
25,789,953 UART: [state] CFI Enabled
25,908,306 UART: [rt] RT listening for mailbox commands...
25,910,190 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,941,147 UART: [rt]cmd =0x53574545, len=84
25,942,696 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,912 writing to cptra_bootfsm_go
3,701,250 ready_for_fw is high
3,701,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,820 >>> mbox cmd response: success
18,521,476 UART:
18,521,865 UART: Running Caliptra FMC ...
18,522,975 UART:
18,523,129 UART: [state] CFI Enabled
18,530,810 UART: [fht] FMC Alias Private Key: 7
20,287,535 UART: [art] Extend RT PCRs Done
20,288,764 UART: [art] Lock RT PCRs Done
20,290,634 UART: [art] Populate DV Done
20,295,993 UART: [fht] FMC Alias Private Key: 7
20,297,652 UART: [art] Derive CDI
20,298,388 UART: [art] Store in in slot 0x4
20,340,991 UART: [art] Derive Key Pair
20,342,032 UART: [art] Store priv key in slot 0x5
22,768,606 UART: [art] Derive Key Pair - Done
22,781,657 UART: [art] Signing Cert with AUTHO
22,782,960 UART: RITY.KEYID = 7
24,488,720 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,222 UART: [art] PUB.X = BDE5ECC3F996461857974E0C40AEF303B881FC448D07F06D253F88573B8066835959CBBE5B96AF7DB5DA7F6656E9A693
24,497,467 UART: [art] PUB.Y = 3C91C8B5DC25D825CAB6120AA93006E662A5CBF08B4E1034AF01AD42E651C8ADF53C0D00C51542C2DDA0D9B3E8BD73C0
24,504,762 UART: [art] SIG.R = 200F3DF245580E9BC9B6E250620AFB22D383A1CE54A44ACCAC8839F872011B82A40E20E34FE5969B02AB3DCD689B4811
24,512,177 UART: [art] SIG.S = F78C5CCBD903E7BFF084BFBCD888271D5ECB942A87D30AA5092717624D119B42F34D2BAC11B4A27B3F374B487EB158CB
25,491,161 UART: Caliptra RT
25,491,862 UART: [state] CFI Enabled
25,608,597 UART: [rt] RT listening for mailbox commands...
25,610,480 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,641,495 UART: [rt]cmd =0x53574545, len=84
25,643,474 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
192,534 UART:
192,919 UART: Running Caliptra ROM ...
194,069 UART:
194,222 UART: [state] CFI Enabled
251,855 UART: [state] LifecycleState = Unprovisioned
254,297 UART: [state] DebugLocked = No
256,988 UART: [state] WD Timer not started. Device not locked for debugging
260,858 UART: [kat] SHA2-256
450,742 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,485 UART: [kat] ++
461,931 UART: [kat] sha1
473,470 UART: [kat] SHA2-256
476,530 UART: [kat] SHA2-384
481,822 UART: [kat] SHA2-512-ACC
484,414 UART: [kat] ECC-384
2,937,227 UART: [kat] HMAC-384Kdf
2,961,572 UART: [kat] LMS
3,493,354 UART: [kat] --
3,498,764 UART: [cold-reset] ++
3,500,276 UART: [fht] FHT @ 0x50003400
3,511,966 UART: [idev] ++
3,512,719 UART: [idev] CDI.KEYID = 6
3,513,639 UART: [idev] SUBJECT.KEYID = 7
3,514,834 UART: [idev] UDS.KEYID = 0
3,515,757 ready_for_fw is high
3,515,974 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,659,533 UART: [idev] Erasing UDS.KEYID = 0
6,019,173 UART: [idev] Sha1 KeyId Algorithm
6,041,972 UART: [idev] --
6,046,191 UART: [ldev] ++
6,046,930 UART: [ldev] CDI.KEYID = 6
6,047,848 UART: [ldev] SUBJECT.KEYID = 5
6,049,012 UART: [ldev] AUTHORITY.KEYID = 7
6,050,199 UART: [ldev] FE.KEYID = 1
6,088,997 UART: [ldev] Erasing FE.KEYID = 1
8,594,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,119 UART: [ldev] --
10,402,748 UART: [fwproc] Wait for Commands...
10,405,613 UART: [fwproc] Recv command 0x46574c44
10,407,926 UART: [fwproc] Recv'd Img size: 114168 bytes
13,853,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,792 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,594,146 >>> mbox cmd response: success
14,598,388 UART: [afmc] ++
14,599,100 UART: [afmc] CDI.KEYID = 6
14,600,298 UART: [afmc] SUBJECT.KEYID = 7
14,601,741 UART: [afmc] AUTHORITY.KEYID = 5
17,140,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,863,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,865,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,880,731 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,895,842 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,910,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,933,405 UART: [afmc] --
18,937,537 UART: [cold-reset] --
18,941,948 UART: [state] Locking Datavault
18,947,863 UART: [state] Locking PCR0, PCR1 and PCR31
18,950,023 UART: [state] Locking ICCM
18,952,296 UART: [exit] Launching FMC @ 0x40000130
18,960,961 UART:
18,961,204 UART: Running Caliptra FMC ...
18,962,308 UART:
18,962,470 UART: [state] CFI Enabled
19,021,154 UART: [fht] FMC Alias Private Key: 7
20,785,080 UART: [art] Extend RT PCRs Done
20,786,297 UART: [art] Lock RT PCRs Done
20,788,107 UART: [art] Populate DV Done
20,793,738 UART: [fht] FMC Alias Private Key: 7
20,795,262 UART: [art] Derive CDI
20,796,034 UART: [art] Store in in slot 0x4
20,854,210 UART: [art] Derive Key Pair
20,855,204 UART: [art] Store priv key in slot 0x5
23,318,090 UART: [art] Derive Key Pair - Done
23,330,977 UART: [art] Signing Cert with AUTHO
23,332,279 UART: RITY.KEYID = 7
25,044,074 UART: [art] Erasing AUTHORITY.KEYID = 7
25,045,580 UART: [art] PUB.X = 5505EE18C2346B4A335ECC2E9641F6797827C835ECD65FFF801A0906009C8F6989CCE61751BCFF620887604ADF6AC7B0
25,052,800 UART: [art] PUB.Y = 0EE6654E259CF86ACD3126C6EB650FC72799ACB2DC84B9C604C3FD2E8B25F4E59C0A7C834D26DF6DF41E2978550F0907
25,060,069 UART: [art] SIG.R = DB207DA43C871D9748471DD5F17441DF4B25F68895630E4AC94B70A4B2AB39A89F9461E98E084FDDBD9D04D42AC7794F
25,067,494 UART: [art] SIG.S = 8E075A0261B71D3C4012DFC19D504051E02F268D0FC7CA0A767E251790C270044044B1C0052C9A9B52D35F4CBBDCEC78
26,046,390 UART: Caliptra RT
26,047,099 UART: [state] CFI Enabled
26,212,784 UART: [rt] RT listening for mailbox commands...
26,214,666 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,245,917 UART: [rt]cmd =0x53574545, len=84
26,247,506 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,436,870 ready_for_fw is high
3,437,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,731,632 >>> mbox cmd response: success
19,047,284 UART:
19,047,700 UART: Running Caliptra FMC ...
19,048,898 UART:
19,049,076 UART: [state] CFI Enabled
19,114,603 UART: [fht] FMC Alias Private Key: 7
20,878,425 UART: [art] Extend RT PCRs Done
20,879,666 UART: [art] Lock RT PCRs Done
20,881,051 UART: [art] Populate DV Done
20,886,420 UART: [fht] FMC Alias Private Key: 7
20,888,120 UART: [art] Derive CDI
20,888,856 UART: [art] Store in in slot 0x4
20,947,463 UART: [art] Derive Key Pair
20,948,503 UART: [art] Store priv key in slot 0x5
23,410,859 UART: [art] Derive Key Pair - Done
23,423,422 UART: [art] Signing Cert with AUTHO
23,424,722 UART: RITY.KEYID = 7
25,137,730 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,234 UART: [art] PUB.X = 076B866E5F4C114689F54CF3756F848BF6344F079C7CDB4CCA00CCAF679D3D14E191BC82369AAD005547FC00640ABD69
25,146,416 UART: [art] PUB.Y = 6C14A0CCBB98AF95B906FCFA8673609E34AD04968DDE1ECD37AD970F23C466C3900DB74695FF636F2BC04CF07702602D
25,153,713 UART: [art] SIG.R = 678817622ACC90E81D80D0C87F5162AB737E1A2015F0A282EA00D62E8F77FB2329722E36DF714DC0AAD8CCFC95A5262E
25,161,053 UART: [art] SIG.S = 8B0657DBEFD39B016059916DBB12C58535AC8A78ADAAFE007D1C79E0117446F472AB8490D78D096E27A33ECF899E4B0A
26,140,136 UART: Caliptra RT
26,140,852 UART: [state] CFI Enabled
26,305,841 UART: [rt] RT listening for mailbox commands...
26,307,721 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,338,939 UART: [rt]cmd =0x53574545, len=84
26,340,866 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
192,777 UART:
193,158 UART: Running Caliptra ROM ...
194,358 UART:
603,800 UART: [state] CFI Enabled
620,224 UART: [state] LifecycleState = Unprovisioned
622,591 UART: [state] DebugLocked = No
624,192 UART: [state] WD Timer not started. Device not locked for debugging
628,012 UART: [kat] SHA2-256
817,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,700 UART: [kat] ++
829,310 UART: [kat] sha1
841,972 UART: [kat] SHA2-256
844,986 UART: [kat] SHA2-384
851,401 UART: [kat] SHA2-512-ACC
853,990 UART: [kat] ECC-384
3,296,567 UART: [kat] HMAC-384Kdf
3,309,450 UART: [kat] LMS
3,841,283 UART: [kat] --
3,846,693 UART: [cold-reset] ++
3,848,907 UART: [fht] FHT @ 0x50003400
3,860,400 UART: [idev] ++
3,861,147 UART: [idev] CDI.KEYID = 6
3,862,040 UART: [idev] SUBJECT.KEYID = 7
3,863,225 UART: [idev] UDS.KEYID = 0
3,864,159 ready_for_fw is high
3,864,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,714 UART: [idev] Erasing UDS.KEYID = 0
6,335,608 UART: [idev] Sha1 KeyId Algorithm
6,359,099 UART: [idev] --
6,364,390 UART: [ldev] ++
6,365,066 UART: [ldev] CDI.KEYID = 6
6,365,981 UART: [ldev] SUBJECT.KEYID = 5
6,367,197 UART: [ldev] AUTHORITY.KEYID = 7
6,368,373 UART: [ldev] FE.KEYID = 1
6,380,154 UART: [ldev] Erasing FE.KEYID = 1
8,858,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,573 UART: [ldev] --
10,648,911 UART: [fwproc] Wait for Commands...
10,651,551 UART: [fwproc] Recv command 0x46574c44
10,653,846 UART: [fwproc] Recv'd Img size: 114168 bytes
14,102,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,237 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,083 >>> mbox cmd response: success
14,842,383 UART: [afmc] ++
14,843,097 UART: [afmc] CDI.KEYID = 6
14,844,287 UART: [afmc] SUBJECT.KEYID = 7
14,845,722 UART: [afmc] AUTHORITY.KEYID = 5
17,348,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,826 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,010 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,642 UART: [afmc] --
19,145,039 UART: [cold-reset] --
19,147,830 UART: [state] Locking Datavault
19,153,833 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,027 UART: [state] Locking ICCM
19,157,639 UART: [exit] Launching FMC @ 0x40000130
19,166,313 UART:
19,166,547 UART: Running Caliptra FMC ...
19,167,649 UART:
19,167,811 UART: [state] CFI Enabled
19,176,129 UART: [fht] FMC Alias Private Key: 7
20,933,267 UART: [art] Extend RT PCRs Done
20,934,485 UART: [art] Lock RT PCRs Done
20,936,190 UART: [art] Populate DV Done
20,941,764 UART: [fht] FMC Alias Private Key: 7
20,943,388 UART: [art] Derive CDI
20,944,159 UART: [art] Store in in slot 0x4
20,986,861 UART: [art] Derive Key Pair
20,987,903 UART: [art] Store priv key in slot 0x5
23,414,960 UART: [art] Derive Key Pair - Done
23,428,108 UART: [art] Signing Cert with AUTHO
23,429,404 UART: RITY.KEYID = 7
25,135,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,521 UART: [art] PUB.X = D812E453507A54D5AF30DFEC60C664728687F33A7CC1E93E9DCB39224555E57916FE4D02AC5CDDE37E8B72E8CD525BC8
25,143,823 UART: [art] PUB.Y = D4553496006461D94EA003DBFE8181307546368FC913E53F870C67762C4C4A031C4C59E8B516508B108ADF488C861EF6
25,151,052 UART: [art] SIG.R = 1576BD11A183EF939D2F425CFA160F8E726D14603B075977FA62B56BB15A60477DA5C8C3EE3A27BEBF089E3431259895
25,158,452 UART: [art] SIG.S = 4EEA7CE652D3A26A9712C978C82A24B5B93466A9AAEF753A322CC36FEC3CB425D6006C36380B8D989400A8E718586A80
26,136,988 UART: Caliptra RT
26,137,695 UART: [state] CFI Enabled
26,254,851 UART: [rt] RT listening for mailbox commands...
26,256,732 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,287,778 UART: [rt]cmd =0x53574545, len=84
26,289,440 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,684 writing to cptra_bootfsm_go
3,760,343 ready_for_fw is high
3,760,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,672 >>> mbox cmd response: success
19,205,916 UART:
19,206,316 UART: Running Caliptra FMC ...
19,207,440 UART:
19,207,607 UART: [state] CFI Enabled
19,215,254 UART: [fht] FMC Alias Private Key: 7
20,971,594 UART: [art] Extend RT PCRs Done
20,972,829 UART: [art] Lock RT PCRs Done
20,974,401 UART: [art] Populate DV Done
20,979,914 UART: [fht] FMC Alias Private Key: 7
20,981,571 UART: [art] Derive CDI
20,982,408 UART: [art] Store in in slot 0x4
21,024,850 UART: [art] Derive Key Pair
21,025,858 UART: [art] Store priv key in slot 0x5
23,452,926 UART: [art] Derive Key Pair - Done
23,465,652 UART: [art] Signing Cert with AUTHO
23,466,987 UART: RITY.KEYID = 7
25,172,352 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,879 UART: [art] PUB.X = 982CAB0F753622B5415364C34EFBA65968B270A0455DECEFCE6FBAE50E5EA3008B4D90775AC9A4AAB390FA457A1BCF23
25,181,130 UART: [art] PUB.Y = 965238C36090DFF8108FF4913FA8143B7F0E1FF3AAE6248CBE832AEFB0239A9AE8595C5A3C1B48B6C6ED5185008EF729
25,188,373 UART: [art] SIG.R = 99DF09EC40800CBE645F867B2224BC4C12E5A904758D8A9FA7E416A154DD5A7D7F697405B21F6D2FCE4399AF193D1348
25,195,764 UART: [art] SIG.S = 1082DCD82BAE1E912BC316F21B461AE1FD6B3B7ED1FAD1D26BC9228650DA5887AF8BA983EB0B259F896A68B1D6A4C20E
26,174,113 UART: Caliptra RT
26,174,934 UART: [state] CFI Enabled
26,291,941 UART: [rt] RT listening for mailbox commands...
26,293,835 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,324,973 UART: [rt]cmd =0x53574545, len=84
26,326,711 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,648 UART: [state] LifecycleState = Unprovisioned
86,303 UART: [state] DebugLocked = No
86,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,621 UART: [kat] SHA2-256
882,552 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,667 UART: [kat] ++
886,819 UART: [kat] sha1
891,087 UART: [kat] SHA2-256
893,025 UART: [kat] SHA2-384
895,690 UART: [kat] SHA2-512-ACC
897,591 UART: [kat] ECC-384
903,452 UART: [kat] HMAC-384Kdf
908,048 UART: [kat] LMS
1,476,244 UART: [kat] --
1,477,261 UART: [cold-reset] ++
1,477,661 UART: [fht] Storing FHT @ 0x50003400
1,480,346 UART: [idev] ++
1,480,514 UART: [idev] CDI.KEYID = 6
1,480,874 UART: [idev] SUBJECT.KEYID = 7
1,481,298 UART: [idev] UDS.KEYID = 0
1,481,643 ready_for_fw is high
1,481,643 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,294 UART: [idev] Erasing UDS.KEYID = 0
1,505,708 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,334 UART: [idev] --
1,515,559 UART: [ldev] ++
1,515,727 UART: [ldev] CDI.KEYID = 6
1,516,090 UART: [ldev] SUBJECT.KEYID = 5
1,516,516 UART: [ldev] AUTHORITY.KEYID = 7
1,516,979 UART: [ldev] FE.KEYID = 1
1,522,071 UART: [ldev] Erasing FE.KEYID = 1
1,547,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,396 UART: [ldev] --
1,586,797 UART: [fwproc] Waiting for Commands...
1,587,638 UART: [fwproc] Received command 0x46574c44
1,588,429 UART: [fwproc] Received Image of size 114168 bytes
2,884,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,943 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,032 >>> mbox cmd response: success
3,078,120 UART: [afmc] ++
3,078,288 UART: [afmc] CDI.KEYID = 6
3,078,650 UART: [afmc] SUBJECT.KEYID = 7
3,079,075 UART: [afmc] AUTHORITY.KEYID = 5
3,113,764 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,820 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,600 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,328 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,213 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,903 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,794 UART: [afmc] --
3,156,734 UART: [cold-reset] --
3,157,536 UART: [state] Locking Datavault
3,158,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,381 UART: [state] Locking ICCM
3,159,801 UART: [exit] Launching FMC @ 0x40000130
3,165,130 UART:
3,165,146 UART: Running Caliptra FMC ...
3,165,554 UART:
3,165,608 UART: [state] CFI Enabled
3,175,997 UART: [fht] FMC Alias Private Key: 7
3,284,566 UART: [art] Extend RT PCRs Done
3,284,994 UART: [art] Lock RT PCRs Done
3,286,724 UART: [art] Populate DV Done
3,295,163 UART: [fht] FMC Alias Private Key: 7
3,296,333 UART: [art] Derive CDI
3,296,613 UART: [art] Store in in slot 0x4
3,382,240 UART: [art] Derive Key Pair
3,382,600 UART: [art] Store priv key in slot 0x5
3,395,774 UART: [art] Derive Key Pair - Done
3,410,198 UART: [art] Signing Cert with AUTHO
3,410,678 UART: RITY.KEYID = 7
3,425,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,893 UART: [art] PUB.X = 3AAC1DF7E26BCE3A973C15BCF5251E7CB1CFB1BC500BF847A1700C6759D32D9AD5109EBBF3663697FFFA0AD476CBC905
3,432,675 UART: [art] PUB.Y = 3FD5353BF8EBA162641B1AF78D6F71343D2F4E348DCBA0ED5AAE98E6713E7F32FB022C28AFBD7823E4080904BD276B1A
3,439,629 UART: [art] SIG.R = FF97D54AF130EE0CD17481289C1B9D8CFB3D61D4B23794600AA6CA09B7826C7A88C0C4119C67C0844AFFDCDC658686FA
3,446,404 UART: [art] SIG.S = F35F2D688AFC8ED9AE545726DC7DBD8C5FAB66611DFACC1F73F6D5E0CCE3B1AAEFBE3908F8A9F7CE31FF0387FBC68033
3,469,907 UART: Caliptra RT
3,470,160 UART: [state] CFI Enabled
3,577,846 UART: [rt] RT listening for mailbox commands...
3,578,516 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,862 UART: [rt]cmd =0x53574545, len=84
3,610,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,639 ready_for_fw is high
1,362,639 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,122 >>> mbox cmd response: success
2,987,704 UART:
2,987,720 UART: Running Caliptra FMC ...
2,988,128 UART:
2,988,182 UART: [state] CFI Enabled
2,998,637 UART: [fht] FMC Alias Private Key: 7
3,107,058 UART: [art] Extend RT PCRs Done
3,107,486 UART: [art] Lock RT PCRs Done
3,109,422 UART: [art] Populate DV Done
3,117,935 UART: [fht] FMC Alias Private Key: 7
3,118,949 UART: [art] Derive CDI
3,119,229 UART: [art] Store in in slot 0x4
3,204,828 UART: [art] Derive Key Pair
3,205,188 UART: [art] Store priv key in slot 0x5
3,218,638 UART: [art] Derive Key Pair - Done
3,233,668 UART: [art] Signing Cert with AUTHO
3,234,148 UART: RITY.KEYID = 7
3,249,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,189 UART: [art] PUB.X = F7C07092C88E5C3FE9A39D89426229487E05DEA1CE66D8911F88EC6E0A07D1276439CB31880B890C53D5FDC8087074E3
3,256,941 UART: [art] PUB.Y = 58828919A6EA8D63751A3DEBB4018A84322D2FC9B4AA245A62D9372629FB6BA7E08A085E72D9C5936043B65C43D460A8
3,263,885 UART: [art] SIG.R = 5D952D99D6DA4CC3CDD05D5EF7F7E339BB48574286CBEE3D6AC26EADD5BCA1317F9719F8B809D8F3A494BBB5582C3F82
3,270,674 UART: [art] SIG.S = 9A0A7A4D6418B126B1E939482C30D1624FC89637C14DB937E65BE89E1B9A6DC87A450DEFA469EB1E9CF2C4CFDF66FC37
3,294,107 UART: Caliptra RT
3,294,360 UART: [state] CFI Enabled
3,402,771 UART: [rt] RT listening for mailbox commands...
3,403,441 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,755 UART: [rt]cmd =0x53574545, len=84
3,435,017 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,464 UART: [kat] SHA2-256
882,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,510 UART: [kat] ++
886,662 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,603 UART: [kat] SHA2-512-ACC
897,504 UART: [kat] ECC-384
903,133 UART: [kat] HMAC-384Kdf
907,801 UART: [kat] LMS
1,475,997 UART: [kat] --
1,476,802 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,480,107 UART: [idev] ++
1,480,275 UART: [idev] CDI.KEYID = 6
1,480,635 UART: [idev] SUBJECT.KEYID = 7
1,481,059 UART: [idev] UDS.KEYID = 0
1,481,404 ready_for_fw is high
1,481,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,895 UART: [idev] Erasing UDS.KEYID = 0
1,505,263 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,971 UART: [idev] --
1,515,034 UART: [ldev] ++
1,515,202 UART: [ldev] CDI.KEYID = 6
1,515,565 UART: [ldev] SUBJECT.KEYID = 5
1,515,991 UART: [ldev] AUTHORITY.KEYID = 7
1,516,454 UART: [ldev] FE.KEYID = 1
1,522,054 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,571 UART: [ldev] --
1,586,954 UART: [fwproc] Waiting for Commands...
1,587,585 UART: [fwproc] Received command 0x46574c44
1,588,376 UART: [fwproc] Received Image of size 114168 bytes
2,885,048 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,697 >>> mbox cmd response: success
3,077,807 UART: [afmc] ++
3,077,975 UART: [afmc] CDI.KEYID = 6
3,078,337 UART: [afmc] SUBJECT.KEYID = 7
3,078,762 UART: [afmc] AUTHORITY.KEYID = 5
3,113,805 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,343 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,228 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,918 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,749 UART: [afmc] --
3,156,637 UART: [cold-reset] --
3,157,321 UART: [state] Locking Datavault
3,158,340 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,944 UART: [state] Locking ICCM
3,159,412 UART: [exit] Launching FMC @ 0x40000130
3,164,741 UART:
3,164,757 UART: Running Caliptra FMC ...
3,165,165 UART:
3,165,308 UART: [state] CFI Enabled
3,176,129 UART: [fht] FMC Alias Private Key: 7
3,283,954 UART: [art] Extend RT PCRs Done
3,284,382 UART: [art] Lock RT PCRs Done
3,285,740 UART: [art] Populate DV Done
3,294,187 UART: [fht] FMC Alias Private Key: 7
3,295,195 UART: [art] Derive CDI
3,295,475 UART: [art] Store in in slot 0x4
3,381,298 UART: [art] Derive Key Pair
3,381,658 UART: [art] Store priv key in slot 0x5
3,395,392 UART: [art] Derive Key Pair - Done
3,410,094 UART: [art] Signing Cert with AUTHO
3,410,574 UART: RITY.KEYID = 7
3,425,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,261 UART: [art] PUB.X = 58D29AD2CBFA423BE244E33903D2F8EEDF2108B7F8868F2602D1FE34C30C3CFCCB361D047169B75A920DF93B67698817
3,433,021 UART: [art] PUB.Y = F5CDC52D4BA1E95E6E9AE83C88C7B83E83AECD278E1C54952BC9F75A83AED556796649B81D8036935F91ACE7F8397C8B
3,439,985 UART: [art] SIG.R = 1EA79B93F31A1EEE92234F3A7E6DD15FC025F43FA6E0233ECF83D4B557781218D3CC8307A3895755D9462DAABAA53169
3,446,760 UART: [art] SIG.S = 1E7F6375F77F582D5747C6C450E7369B8978A73C7CDAA0C30C7A58AA62D1457BE2394F8629C7C80E29D7698DAACF2594
3,470,249 UART: Caliptra RT
3,470,594 UART: [state] CFI Enabled
3,578,402 UART: [rt] RT listening for mailbox commands...
3,579,072 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,584 UART: [rt]cmd =0x53574545, len=84
3,611,150 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,336 ready_for_fw is high
1,362,336 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,681 >>> mbox cmd response: success
2,987,161 UART:
2,987,177 UART: Running Caliptra FMC ...
2,987,585 UART:
2,987,728 UART: [state] CFI Enabled
2,998,495 UART: [fht] FMC Alias Private Key: 7
3,106,728 UART: [art] Extend RT PCRs Done
3,107,156 UART: [art] Lock RT PCRs Done
3,108,650 UART: [art] Populate DV Done
3,116,955 UART: [fht] FMC Alias Private Key: 7
3,118,045 UART: [art] Derive CDI
3,118,325 UART: [art] Store in in slot 0x4
3,204,192 UART: [art] Derive Key Pair
3,204,552 UART: [art] Store priv key in slot 0x5
3,218,022 UART: [art] Derive Key Pair - Done
3,233,035 UART: [art] Signing Cert with AUTHO
3,233,515 UART: RITY.KEYID = 7
3,249,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,890 UART: [art] PUB.X = 6121B97FA1DC428D9505D572BD320C2FB17B9D2ADEB21C9526417081A1520DF3DD3016B4EFF292FCFD4BCC219731093D
3,256,658 UART: [art] PUB.Y = 9C1BE8C4DDF48E6D76A2C4C6BB19A9F183CDB5CCBCFE241422AD61AC1E1C75C215C7C61DD90A6661ECC29C05FBAF621E
3,263,632 UART: [art] SIG.R = 7EEECAC2A5EB6D8F73AB138A9C9E46BEFA999E2E3DCE3AB12BD1641F7B33812C2881F8B731FC3D0A8EE1965B2A8CC1D2
3,270,427 UART: [art] SIG.S = C1CE5A622A5BBBFF22A4AFE564655A72500B95D685C48EDF2855B0FD96B3B3D028BDBAD0ED5D535554E9D4FF202241F5
3,293,927 UART: Caliptra RT
3,294,272 UART: [state] CFI Enabled
3,402,359 UART: [rt] RT listening for mailbox commands...
3,403,029 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,251 UART: [rt]cmd =0x53574545, len=84
3,434,629 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
893,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,667 UART: [kat] ++
897,819 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,816 UART: [kat] SHA2-512-ACC
908,717 UART: [kat] ECC-384
918,326 UART: [kat] HMAC-384Kdf
922,948 UART: [kat] LMS
1,171,276 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,282 UART: [idev] ++
1,175,450 UART: [idev] CDI.KEYID = 6
1,175,810 UART: [idev] SUBJECT.KEYID = 7
1,176,234 UART: [idev] UDS.KEYID = 0
1,176,579 ready_for_fw is high
1,176,579 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,030 UART: [idev] Erasing UDS.KEYID = 0
1,201,241 UART: [idev] Sha1 KeyId Algorithm
1,209,855 UART: [idev] --
1,211,059 UART: [ldev] ++
1,211,227 UART: [ldev] CDI.KEYID = 6
1,211,590 UART: [ldev] SUBJECT.KEYID = 5
1,212,016 UART: [ldev] AUTHORITY.KEYID = 7
1,212,479 UART: [ldev] FE.KEYID = 1
1,217,567 UART: [ldev] Erasing FE.KEYID = 1
1,243,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,602 UART: [fwproc] Recv command 0x46574c44
1,284,330 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,306 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,610 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,215 >>> mbox cmd response: success
2,773,283 UART: [afmc] ++
2,773,451 UART: [afmc] CDI.KEYID = 6
2,773,813 UART: [afmc] SUBJECT.KEYID = 7
2,774,238 UART: [afmc] AUTHORITY.KEYID = 5
2,809,625 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,938 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,686 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,414 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,299 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,018 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,800 UART: [afmc] --
2,852,756 UART: [cold-reset] --
2,853,666 UART: [state] Locking Datavault
2,854,671 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,275 UART: [state] Locking ICCM
2,855,733 UART: [exit] Launching FMC @ 0x40000130
2,861,062 UART:
2,861,078 UART: Running Caliptra FMC ...
2,861,486 UART:
2,861,540 UART: [state] CFI Enabled
2,871,907 UART: [fht] FMC Alias Private Key: 7
2,979,184 UART: [art] Extend RT PCRs Done
2,979,612 UART: [art] Lock RT PCRs Done
2,981,002 UART: [art] Populate DV Done
2,989,101 UART: [fht] FMC Alias Private Key: 7
2,990,213 UART: [art] Derive CDI
2,990,493 UART: [art] Store in in slot 0x4
3,076,462 UART: [art] Derive Key Pair
3,076,822 UART: [art] Store priv key in slot 0x5
3,089,760 UART: [art] Derive Key Pair - Done
3,104,284 UART: [art] Signing Cert with AUTHO
3,104,764 UART: RITY.KEYID = 7
3,120,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,893 UART: [art] PUB.X = C1861B43C993A579C5B4B34249D5A26D2A2EDBAD0BB14E011FF37EF93DDEC88A00184E7E7A90DDE16F77B021E264D84D
3,127,651 UART: [art] PUB.Y = 2F4C79AF88F80A2A1C8A00E8C13D32AC3F1F29407940F1E7E57D19628ABEF53A4D75989097FD71DD4F5CF54A56D0EEE0
3,134,590 UART: [art] SIG.R = E24FC2F9182ECCD1CA2AA30F4F0343B30E982FA4B725D84A44216807F55E1E4B200786F1B9E9691E3941B01D27DB20AB
3,141,353 UART: [art] SIG.S = 007F8A2297722455A65452FDCBC2CF5E0324423188950F076470FE99F683B72540D5C2447B5FF3A48ECA2C8488DAF334
3,164,959 UART: Caliptra RT
3,165,212 UART: [state] CFI Enabled
3,272,466 UART: [rt] RT listening for mailbox commands...
3,273,136 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,276 UART: [rt]cmd =0x53574545, len=84
3,304,588 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,731 ready_for_fw is high
1,060,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,380 >>> mbox cmd response: success
2,686,494 UART:
2,686,510 UART: Running Caliptra FMC ...
2,686,918 UART:
2,686,972 UART: [state] CFI Enabled
2,697,527 UART: [fht] FMC Alias Private Key: 7
2,805,750 UART: [art] Extend RT PCRs Done
2,806,178 UART: [art] Lock RT PCRs Done
2,807,426 UART: [art] Populate DV Done
2,815,869 UART: [fht] FMC Alias Private Key: 7
2,816,839 UART: [art] Derive CDI
2,817,119 UART: [art] Store in in slot 0x4
2,902,702 UART: [art] Derive Key Pair
2,903,062 UART: [art] Store priv key in slot 0x5
2,916,372 UART: [art] Derive Key Pair - Done
2,931,281 UART: [art] Signing Cert with AUTHO
2,931,761 UART: RITY.KEYID = 7
2,946,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,458 UART: [art] PUB.X = 869E9922DE56DC2B65FD4A4F6A16B773C9F25A607C274FFC419674362DCF1495CD3F656106AD12CA7EDD58B79BD4C5C2
2,954,237 UART: [art] PUB.Y = 313FF2D2A906D003044CA5D98054947CA10478AE8D572DC40101CB22FFC45B188C096A6070D210EDB44F6DCD82031D75
2,961,165 UART: [art] SIG.R = DF6D219D634AB899B695D371A1E23EDA0CB65592140FC38DA9F14233776BC69D3C6BF7CD7DB39F7BF21D140E8CFE8928
2,967,940 UART: [art] SIG.S = C6CDFEA6AAF25C843FC01E42AAA8939EE33E635542C14A887165CAE4BA75FDD6731198016DDDAE5791D0CF270C333EC5
2,992,075 UART: Caliptra RT
2,992,328 UART: [state] CFI Enabled
3,100,712 UART: [rt] RT listening for mailbox commands...
3,101,382 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,952 UART: [rt]cmd =0x53574545, len=84
3,133,564 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,142 UART: [state] WD Timer not started. Device not locked for debugging
88,399 UART: [kat] SHA2-256
894,049 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,174 UART: [kat] ++
898,326 UART: [kat] sha1
902,628 UART: [kat] SHA2-256
904,568 UART: [kat] SHA2-384
907,179 UART: [kat] SHA2-512-ACC
909,080 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,314 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,477 UART: [idev] ++
1,175,645 UART: [idev] CDI.KEYID = 6
1,176,005 UART: [idev] SUBJECT.KEYID = 7
1,176,429 UART: [idev] UDS.KEYID = 0
1,176,774 ready_for_fw is high
1,176,774 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,461 UART: [idev] Erasing UDS.KEYID = 0
1,201,252 UART: [idev] Sha1 KeyId Algorithm
1,209,540 UART: [idev] --
1,210,666 UART: [ldev] ++
1,210,834 UART: [ldev] CDI.KEYID = 6
1,211,197 UART: [ldev] SUBJECT.KEYID = 5
1,211,623 UART: [ldev] AUTHORITY.KEYID = 7
1,212,086 UART: [ldev] FE.KEYID = 1
1,217,034 UART: [ldev] Erasing FE.KEYID = 1
1,243,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,360 UART: [ldev] --
1,282,685 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,027 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,721 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,260 >>> mbox cmd response: success
2,773,308 UART: [afmc] ++
2,773,476 UART: [afmc] CDI.KEYID = 6
2,773,838 UART: [afmc] SUBJECT.KEYID = 7
2,774,263 UART: [afmc] AUTHORITY.KEYID = 5
2,810,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,574 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,293 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,231 UART: [afmc] --
2,854,145 UART: [cold-reset] --
2,855,225 UART: [state] Locking Datavault
2,856,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,282 UART: [state] Locking ICCM
2,857,788 UART: [exit] Launching FMC @ 0x40000130
2,863,117 UART:
2,863,133 UART: Running Caliptra FMC ...
2,863,541 UART:
2,863,684 UART: [state] CFI Enabled
2,873,927 UART: [fht] FMC Alias Private Key: 7
2,982,224 UART: [art] Extend RT PCRs Done
2,982,652 UART: [art] Lock RT PCRs Done
2,984,036 UART: [art] Populate DV Done
2,992,197 UART: [fht] FMC Alias Private Key: 7
2,993,233 UART: [art] Derive CDI
2,993,513 UART: [art] Store in in slot 0x4
3,079,308 UART: [art] Derive Key Pair
3,079,668 UART: [art] Store priv key in slot 0x5
3,092,970 UART: [art] Derive Key Pair - Done
3,107,568 UART: [art] Signing Cert with AUTHO
3,108,048 UART: RITY.KEYID = 7
3,123,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,367 UART: [art] PUB.X = 3E9FD45AF2AE750AC47DC3973F5EF892AE707AB39D06EFA151F7F5EAEDC5B061C892932DE50C1238B9C51C9DEF0BD9F6
3,131,149 UART: [art] PUB.Y = D1121006A2723BA61B158C5560E3EFF3094774A7336BDFD259F94EA12D728874946DAD878991FA561C230B4A723B8C98
3,138,086 UART: [art] SIG.R = 4A34B52B8B6CB7FDF374FE37D7FA375D4D281E00FBAF75C4AA03CD0F5CBECD105BC633A9B87DB1B8796A3C2088C3A526
3,144,852 UART: [art] SIG.S = D8A0A27CF890CDB6133112D01DBAF8A6DF6ED1F1B70C3D1477646D767FEE781B82422100D5BC8ACC5629B2C94AEC9DF5
3,169,528 UART: Caliptra RT
3,169,873 UART: [state] CFI Enabled
3,277,706 UART: [rt] RT listening for mailbox commands...
3,278,376 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,744 UART: [rt]cmd =0x53574545, len=84
3,309,918 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 ready_for_fw is high
1,060,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,493 >>> mbox cmd response: success
2,687,751 UART:
2,687,767 UART: Running Caliptra FMC ...
2,688,175 UART:
2,688,318 UART: [state] CFI Enabled
2,698,877 UART: [fht] FMC Alias Private Key: 7
2,807,080 UART: [art] Extend RT PCRs Done
2,807,508 UART: [art] Lock RT PCRs Done
2,808,854 UART: [art] Populate DV Done
2,817,411 UART: [fht] FMC Alias Private Key: 7
2,818,401 UART: [art] Derive CDI
2,818,681 UART: [art] Store in in slot 0x4
2,904,070 UART: [art] Derive Key Pair
2,904,430 UART: [art] Store priv key in slot 0x5
2,917,540 UART: [art] Derive Key Pair - Done
2,932,305 UART: [art] Signing Cert with AUTHO
2,932,785 UART: RITY.KEYID = 7
2,947,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,310 UART: [art] PUB.X = 710F1D94A498BE0B5A10098D1FA198920378ED9854847A9DF5153F507EC97D875F41ACEDF4B0C7492CCF61DCE27EB2DF
2,955,080 UART: [art] PUB.Y = FA2ACFEA9E076A71DA9E1B8C4F4C19621C3A2AD14DDD30451DB348D522802C2B776C2D0073320903C67CADAEDB97130B
2,962,012 UART: [art] SIG.R = 5CCAA966D32CD0B2EC24E4516C463F92C1448E3A78A9F5E5B72203A6423001AFBB5A3FB6A6B5EF844FCB900307768C26
2,968,780 UART: [art] SIG.S = 0A451C1104FE5135876BD9A50B54773F8B6FBDC94EF3BAAC3CB85573D4FC1D72D992B2993110C3CB2FE474BFCAD05D67
2,992,338 UART: Caliptra RT
2,992,683 UART: [state] CFI Enabled
3,100,872 UART: [rt] RT listening for mailbox commands...
3,101,542 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,568 UART: [rt]cmd =0x53574545, len=84
3,132,992 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,646 UART: [kat] LMS
1,168,958 UART: [kat] --
1,169,769 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,174,239 ready_for_fw is high
1,174,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,629 UART: [idev] Erasing UDS.KEYID = 0
1,198,993 UART: [idev] Sha1 KeyId Algorithm
1,207,995 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,726 UART: [ldev] Erasing FE.KEYID = 1
1,242,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,078 UART: [ldev] --
1,281,556 UART: [fwproc] Wait for Commands...
1,282,235 UART: [fwproc] Recv command 0x46574c44
1,282,968 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,728 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,581 >>> mbox cmd response: success
2,772,618 UART: [afmc] ++
2,772,786 UART: [afmc] CDI.KEYID = 6
2,773,149 UART: [afmc] SUBJECT.KEYID = 7
2,773,575 UART: [afmc] AUTHORITY.KEYID = 5
2,808,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,404 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,155 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,767 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,486 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,279 UART: [afmc] --
2,852,265 UART: [cold-reset] --
2,853,233 UART: [state] Locking Datavault
2,854,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,920 UART: [state] Locking ICCM
2,855,580 UART: [exit] Launching FMC @ 0x40000130
2,860,909 UART:
2,860,925 UART: Running Caliptra FMC ...
2,861,333 UART:
2,861,387 UART: [state] CFI Enabled
2,871,960 UART: [fht] FMC Alias Private Key: 7
2,979,801 UART: [art] Extend RT PCRs Done
2,980,229 UART: [art] Lock RT PCRs Done
2,981,331 UART: [art] Populate DV Done
2,989,552 UART: [fht] FMC Alias Private Key: 7
2,990,564 UART: [art] Derive CDI
2,990,844 UART: [art] Store in in slot 0x4
3,076,585 UART: [art] Derive Key Pair
3,076,945 UART: [art] Store priv key in slot 0x5
3,090,413 UART: [art] Derive Key Pair - Done
3,105,209 UART: [art] Signing Cert with AUTHO
3,105,689 UART: RITY.KEYID = 7
3,120,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,168 UART: [art] PUB.X = C8C947ECE90F7F6874CEE7627FECBE599336D306BE9022CF450714E5E049FCAAB621E8CB4D294333235084776300B721
3,127,909 UART: [art] PUB.Y = EB82FF7E58E99D8A9350E766966B0514A001E9B5E07959F5716C52435FCF7429135A992E288E9C4137E281290A67F378
3,134,840 UART: [art] SIG.R = 602B05BA7BDCABE31F725A6D0027BA5ECFCD7B393F93AC154543F1308FAEB6066E4E972DD24FB6E77F6E600EF6AA366B
3,141,601 UART: [art] SIG.S = 2F5CE46B179CFA3B1C05450DD330B43D809A0F7D08CDB33415E8515DA9306F358B891CD6CB6B76E759EA68E6BC19A78E
3,165,282 UART: Caliptra RT
3,165,535 UART: [state] CFI Enabled
3,273,082 UART: [rt] RT listening for mailbox commands...
3,273,752 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,118 UART: [rt]cmd =0x53574545, len=84
3,305,462 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,914 ready_for_fw is high
1,055,914 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,109 >>> mbox cmd response: success
2,683,437 UART:
2,683,453 UART: Running Caliptra FMC ...
2,683,861 UART:
2,683,915 UART: [state] CFI Enabled
2,693,930 UART: [fht] FMC Alias Private Key: 7
2,801,999 UART: [art] Extend RT PCRs Done
2,802,427 UART: [art] Lock RT PCRs Done
2,803,975 UART: [art] Populate DV Done
2,812,324 UART: [fht] FMC Alias Private Key: 7
2,813,392 UART: [art] Derive CDI
2,813,672 UART: [art] Store in in slot 0x4
2,899,555 UART: [art] Derive Key Pair
2,899,915 UART: [art] Store priv key in slot 0x5
2,912,933 UART: [art] Derive Key Pair - Done
2,927,784 UART: [art] Signing Cert with AUTHO
2,928,264 UART: RITY.KEYID = 7
2,943,718 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,483 UART: [art] PUB.X = A1246C08920D689F58AF347A42B9B15CDF4D83EEE315912059BC178FCF0D91CC10C9EBAE014571AEB0C3916E1401EB4D
2,951,250 UART: [art] PUB.Y = 717AA89604F293C42D16FF79A11444F75231EBEE0A0AB8CD56095CBAF42AEEA69BF4F1B97AD274D0D3DA383B03EE7015
2,958,201 UART: [art] SIG.R = 8937BC404BE3F6B0919A609CBA9D9D7DE162CAE379CF1C9BD46E835102B9B82C047C1089CA5E758A9D387D62D89ECD7C
2,964,979 UART: [art] SIG.S = FD7014D0D662563E9BB205972E1331E5DB80B767CB30ABC0D71396D340D69CA5BA87E6240AB3E3A63109280892BE93EC
2,988,378 UART: Caliptra RT
2,988,631 UART: [state] CFI Enabled
3,096,353 UART: [rt] RT listening for mailbox commands...
3,097,023 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,409 UART: [rt]cmd =0x53574545, len=84
3,128,779 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,233 UART: [kat] SHA2-256
891,783 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,912 UART: [kat] ++
896,064 UART: [kat] sha1
900,364 UART: [kat] SHA2-256
902,304 UART: [kat] SHA2-384
904,987 UART: [kat] SHA2-512-ACC
906,888 UART: [kat] ECC-384
916,845 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,446 UART: [cold-reset] ++
1,170,918 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,174,774 ready_for_fw is high
1,174,774 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,282 UART: [idev] Erasing UDS.KEYID = 0
1,198,942 UART: [idev] Sha1 KeyId Algorithm
1,207,760 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,637 UART: [ldev] Erasing FE.KEYID = 1
1,242,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,501 UART: [ldev] --
1,281,797 UART: [fwproc] Wait for Commands...
1,282,568 UART: [fwproc] Recv command 0x46574c44
1,283,301 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,354 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,924 >>> mbox cmd response: success
2,772,089 UART: [afmc] ++
2,772,257 UART: [afmc] CDI.KEYID = 6
2,772,620 UART: [afmc] SUBJECT.KEYID = 7
2,773,046 UART: [afmc] AUTHORITY.KEYID = 5
2,809,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,632 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,244 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,963 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,690 UART: [afmc] --
2,852,770 UART: [cold-reset] --
2,853,584 UART: [state] Locking Datavault
2,854,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,201 UART: [state] Locking ICCM
2,855,813 UART: [exit] Launching FMC @ 0x40000130
2,861,142 UART:
2,861,158 UART: Running Caliptra FMC ...
2,861,566 UART:
2,861,709 UART: [state] CFI Enabled
2,872,206 UART: [fht] FMC Alias Private Key: 7
2,980,239 UART: [art] Extend RT PCRs Done
2,980,667 UART: [art] Lock RT PCRs Done
2,982,269 UART: [art] Populate DV Done
2,990,536 UART: [fht] FMC Alias Private Key: 7
2,991,468 UART: [art] Derive CDI
2,991,748 UART: [art] Store in in slot 0x4
3,077,097 UART: [art] Derive Key Pair
3,077,457 UART: [art] Store priv key in slot 0x5
3,090,641 UART: [art] Derive Key Pair - Done
3,105,580 UART: [art] Signing Cert with AUTHO
3,106,060 UART: RITY.KEYID = 7
3,121,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,273 UART: [art] PUB.X = 59A3E2195082C2FEA6E68E7A28F2E1BBB1F06BE9FAD14353F11E538C141438301B249B409AFADD3E585BE91DBDB21A37
3,129,057 UART: [art] PUB.Y = 5FB6AE1A9D504C3CDC6C745272279BD4C4EE0E1653280D59452D90D4BFEEA90612DFB62C3D56CA4FA62A372C45F95337
3,136,010 UART: [art] SIG.R = 69D33EC823E0D9A1937A4B3D6A01BD288A878A50D7131932E7A80BDD3DCD405BAD77772D08A615FA5E85F172E4B2EF7F
3,142,783 UART: [art] SIG.S = 4DA95995C285FAAC0F3173391102A199590BB98AA5A47296DCD2C5BC409937F08C1DFA218A4E9D04913BDDC1D8E12D72
3,166,930 UART: Caliptra RT
3,167,275 UART: [state] CFI Enabled
3,274,234 UART: [rt] RT listening for mailbox commands...
3,274,904 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,202 UART: [rt]cmd =0x53574545, len=84
3,306,394 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,179 ready_for_fw is high
1,056,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,796 >>> mbox cmd response: success
2,682,418 UART:
2,682,434 UART: Running Caliptra FMC ...
2,682,842 UART:
2,682,985 UART: [state] CFI Enabled
2,693,928 UART: [fht] FMC Alias Private Key: 7
2,802,041 UART: [art] Extend RT PCRs Done
2,802,469 UART: [art] Lock RT PCRs Done
2,803,915 UART: [art] Populate DV Done
2,811,980 UART: [fht] FMC Alias Private Key: 7
2,813,088 UART: [art] Derive CDI
2,813,368 UART: [art] Store in in slot 0x4
2,899,139 UART: [art] Derive Key Pair
2,899,499 UART: [art] Store priv key in slot 0x5
2,912,763 UART: [art] Derive Key Pair - Done
2,927,375 UART: [art] Signing Cert with AUTHO
2,927,855 UART: RITY.KEYID = 7
2,943,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,172 UART: [art] PUB.X = EBEA1F382F75FC70B932680CE6F14DC3B1B7124F8FC55D74ECA6A4E9F12B684F65EEB8D025C62FEA95F6A2738979BFD9
2,950,959 UART: [art] PUB.Y = 10E047551E9E1598FE462A657B50189C43D8B88A385BFA3E4AEA3789F5BCC71E9B5C38DBC97977087FFBFE445C064C94
2,957,911 UART: [art] SIG.R = FCAA9A59249FC974CD1EA9FCFBAB5D45551E577E74877904D94A62495236E6E723B6F72BAE5FBF8516FCF698908AB967
2,964,690 UART: [art] SIG.S = CA4DB3A7DA66837567704A0762314C28C498FF2B177C39101DFE824367A7FE3E4250F1E6D07ED9E7FEBAB63829B34040
2,988,198 UART: Caliptra RT
2,988,543 UART: [state] CFI Enabled
3,096,039 UART: [rt] RT listening for mailbox commands...
3,096,709 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,143 UART: [rt]cmd =0x53574545, len=84
3,128,707 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,110 UART:
192,469 UART: Running Caliptra ROM ...
193,653 UART:
193,809 UART: [state] CFI Enabled
262,540 UART: [state] LifecycleState = Unprovisioned
264,458 UART: [state] DebugLocked = No
265,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,582 UART: [kat] SHA2-256
441,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,775 UART: [kat] ++
452,291 UART: [kat] sha1
463,508 UART: [kat] SHA2-256
466,219 UART: [kat] SHA2-384
471,489 UART: [kat] SHA2-512-ACC
473,855 UART: [kat] ECC-384
2,765,837 UART: [kat] HMAC-384Kdf
2,778,575 UART: [kat] LMS
3,968,838 UART: [kat] --
3,970,790 UART: [cold-reset] ++
3,971,938 UART: [fht] Storing FHT @ 0x50003400
3,982,990 UART: [idev] ++
3,983,542 UART: [idev] CDI.KEYID = 6
3,984,488 UART: [idev] SUBJECT.KEYID = 7
3,985,743 UART: [idev] UDS.KEYID = 0
3,986,693 ready_for_fw is high
3,986,883 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,130,053 UART: [idev] Erasing UDS.KEYID = 0
7,328,433 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,922 UART: [idev] --
7,355,456 UART: [ldev] ++
7,356,017 UART: [ldev] CDI.KEYID = 6
7,356,977 UART: [ldev] SUBJECT.KEYID = 5
7,358,179 UART: [ldev] AUTHORITY.KEYID = 7
7,359,454 UART: [ldev] FE.KEYID = 1
7,402,241 UART: [ldev] Erasing FE.KEYID = 1
10,732,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,476 UART: [ldev] --
13,096,120 UART: [fwproc] Waiting for Commands...
13,099,353 UART: [fwproc] Received command 0x46574c44
13,101,531 UART: [fwproc] Received Image of size 113844 bytes
17,154,501 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,108 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,999 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,616,115 >>> mbox cmd response: success
17,620,333 UART: [afmc] ++
17,620,951 UART: [afmc] CDI.KEYID = 6
17,621,873 UART: [afmc] SUBJECT.KEYID = 7
17,623,057 UART: [afmc] AUTHORITY.KEYID = 5
20,986,128 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,286,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,035 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,473 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,296 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,332,736 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,793 UART: [afmc] --
23,357,925 UART: [cold-reset] --
23,361,834 UART: [state] Locking Datavault
23,367,396 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,146 UART: [state] Locking ICCM
23,371,883 UART: [exit] Launching FMC @ 0x40000130
23,380,285 UART:
23,380,558 UART: Running Caliptra FMC ...
23,381,661 UART:
23,381,818 UART: [state] CFI Enabled
23,446,717 UART: [fht] FMC Alias Private Key: 7
25,784,686 UART: [art] Extend RT PCRs Done
25,785,911 UART: [art] Lock RT PCRs Done
25,787,414 UART: [art] Populate DV Done
25,792,662 UART: [fht] FMC Alias Private Key: 7
25,794,300 UART: [art] Derive CDI
25,795,108 UART: [art] Store in in slot 0x4
25,855,408 UART: [art] Derive Key Pair
25,856,418 UART: [art] Store priv key in slot 0x5
29,149,294 UART: [art] Derive Key Pair - Done
29,162,288 UART: [art] Signing Cert with AUTHO
29,163,591 UART: RITY.KEYID = 7
31,450,513 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,049 UART: [art] PUB.X = 8F444756123B9821237B8DF35104349541EE78A699278E550E7054F5BBF4BA689E3265C6532EDCE9F93B9D6E9EFEFC20
31,459,258 UART: [art] PUB.Y = AC01A0A6AAFB100568FB72202A2B2817AB2737ABBCF9520D0F36AD97E7769245A22E2B941E8E09F31725DF5A00E224FB
31,466,461 UART: [art] SIG.R = D915276D4A6A815ED7C08DD35B57C1FF7B2D82E78FDE6E63E4385F4757A2E9A235F64E5A23C00F6D59E995FDC944A811
31,473,873 UART: [art] SIG.S = 9C4D0953120B8F0C5A4DC6AD7619DC858A27834EEC440E6C89C2A9911D79D064129A1FDD63DAFB7577DD43A656A93A1B
32,779,418 UART: Caliptra RT
32,780,132 UART: [state] CFI Enabled
32,940,975 UART: [rt] RT listening for mailbox commands...
32,942,856 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,974,158 UART: [rt]cmd =0x4d454153, len=108
32,976,009 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,804,005 ready_for_fw is high
3,804,615 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,876,062 >>> mbox cmd response: success
23,563,703 UART:
23,564,093 UART: Running Caliptra FMC ...
23,565,235 UART:
23,565,397 UART: [state] CFI Enabled
23,616,473 UART: [fht] FMC Alias Private Key: 7
25,955,191 UART: [art] Extend RT PCRs Done
25,956,418 UART: [art] Lock RT PCRs Done
25,958,010 UART: [art] Populate DV Done
25,963,370 UART: [fht] FMC Alias Private Key: 7
25,964,878 UART: [art] Derive CDI
25,965,825 UART: [art] Store in in slot 0x4
26,024,400 UART: [art] Derive Key Pair
26,025,401 UART: [art] Store priv key in slot 0x5
29,318,105 UART: [art] Derive Key Pair - Done
29,330,970 UART: [art] Signing Cert with AUTHO
29,332,288 UART: RITY.KEYID = 7
31,619,478 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,981 UART: [art] PUB.X = 78655E2FBDA60C95288D220949D30C419A51E0911F899247DBC968EAF67FA2A10BB144DF3C586455DED5FC21C6D403C8
31,628,223 UART: [art] PUB.Y = 246E75E654B7AEC4B4204685C43F64E103C10EE23D50A3D393EA208F963878E819A4943ABA54B5132CF0A6391533A7E1
31,635,465 UART: [art] SIG.R = 36FD6F8E1D9713C77A8CC1D649ED8705240B050578CB841A0708665E06B3AE55188090BDFF99F74E8FB585691EB0DD53
31,642,820 UART: [art] SIG.S = BA72C680E831D7F25D77D1DC073CC5C681E7FF07096CD30AD02D3D689F7D2E18CF3D59C12A11860DAE41BA8057436C6D
32,948,939 UART: Caliptra RT
32,949,655 UART: [state] CFI Enabled
33,130,767 UART: [rt] RT listening for mailbox commands...
33,132,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,163,686 UART: [rt]cmd =0x4d454153, len=108
33,165,879 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,349 UART:
192,723 UART: Running Caliptra ROM ...
193,829 UART:
603,391 UART: [state] CFI Enabled
617,129 UART: [state] LifecycleState = Unprovisioned
619,000 UART: [state] DebugLocked = No
620,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,180 UART: [kat] SHA2-256
794,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,496 UART: [kat] ++
805,964 UART: [kat] sha1
816,094 UART: [kat] SHA2-256
818,792 UART: [kat] SHA2-384
823,515 UART: [kat] SHA2-512-ACC
825,886 UART: [kat] ECC-384
3,110,209 UART: [kat] HMAC-384Kdf
3,121,534 UART: [kat] LMS
4,311,609 UART: [kat] --
4,316,205 UART: [cold-reset] ++
4,318,712 UART: [fht] Storing FHT @ 0x50003400
4,329,465 UART: [idev] ++
4,330,074 UART: [idev] CDI.KEYID = 6
4,330,965 UART: [idev] SUBJECT.KEYID = 7
4,332,215 UART: [idev] UDS.KEYID = 0
4,333,192 ready_for_fw is high
4,333,394 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,476,251 UART: [idev] Erasing UDS.KEYID = 0
7,622,839 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,754 UART: [idev] --
7,648,638 UART: [ldev] ++
7,649,209 UART: [ldev] CDI.KEYID = 6
7,650,225 UART: [ldev] SUBJECT.KEYID = 5
7,651,379 UART: [ldev] AUTHORITY.KEYID = 7
7,652,609 UART: [ldev] FE.KEYID = 1
7,665,033 UART: [ldev] Erasing FE.KEYID = 1
10,956,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,025 UART: [ldev] --
13,316,158 UART: [fwproc] Waiting for Commands...
13,317,825 UART: [fwproc] Received command 0x46574c44
13,320,028 UART: [fwproc] Received Image of size 113844 bytes
17,369,989 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,829,100 >>> mbox cmd response: success
17,833,047 UART: [afmc] ++
17,833,643 UART: [afmc] CDI.KEYID = 6
17,834,613 UART: [afmc] SUBJECT.KEYID = 7
17,835,832 UART: [afmc] AUTHORITY.KEYID = 5
21,147,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,139 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,459,548 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,474,364 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,773 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,083 UART: [afmc] --
23,514,082 UART: [cold-reset] --
23,518,374 UART: [state] Locking Datavault
23,522,537 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,248 UART: [state] Locking ICCM
23,525,637 UART: [exit] Launching FMC @ 0x40000130
23,534,039 UART:
23,534,326 UART: Running Caliptra FMC ...
23,535,440 UART:
23,535,602 UART: [state] CFI Enabled
23,543,756 UART: [fht] FMC Alias Private Key: 7
25,875,149 UART: [art] Extend RT PCRs Done
25,876,371 UART: [art] Lock RT PCRs Done
25,878,236 UART: [art] Populate DV Done
25,883,445 UART: [fht] FMC Alias Private Key: 7
25,885,093 UART: [art] Derive CDI
25,885,846 UART: [art] Store in in slot 0x4
25,928,614 UART: [art] Derive Key Pair
25,929,829 UART: [art] Store priv key in slot 0x5
29,171,360 UART: [art] Derive Key Pair - Done
29,184,137 UART: [art] Signing Cert with AUTHO
29,185,432 UART: RITY.KEYID = 7
31,464,805 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,311 UART: [art] PUB.X = B77B9771D76599DC61586AD85B9C0D19E623D60990DC4B7DD7C3807410EA752A0B9A802C61E8AEEC776CA6AAF020A41E
31,473,568 UART: [art] PUB.Y = F52B276FACF087485E05B07531ACA7E9EAFB026CEDC366981B7AAAE253107323383A5070DD72744A99C6AFE70639721B
31,480,824 UART: [art] SIG.R = 889DF0C09E2E3E1BBBC9AA5CA55952AE9011171A536CDC94FA5565A5D78A489D59564F2B40F357D5A185C9E17B591870
31,488,221 UART: [art] SIG.S = 46D6B3A8544A587CE018920922E0F4DF5B972B4B07B332DFA2A3C1F78FD13CD4BD0CD9364D13923714AFB2607DA4CC62
32,793,418 UART: Caliptra RT
32,794,128 UART: [state] CFI Enabled
32,912,407 UART: [rt] RT listening for mailbox commands...
32,914,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,945,525 UART: [rt]cmd =0x4d454153, len=108
32,947,545 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,124,630 ready_for_fw is high
4,125,017 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,051,004 >>> mbox cmd response: success
23,698,209 UART:
23,698,605 UART: Running Caliptra FMC ...
23,699,752 UART:
23,699,920 UART: [state] CFI Enabled
23,707,981 UART: [fht] FMC Alias Private Key: 7
26,038,650 UART: [art] Extend RT PCRs Done
26,039,878 UART: [art] Lock RT PCRs Done
26,041,611 UART: [art] Populate DV Done
26,046,972 UART: [fht] FMC Alias Private Key: 7
26,048,520 UART: [art] Derive CDI
26,049,356 UART: [art] Store in in slot 0x4
26,091,751 UART: [art] Derive Key Pair
26,092,795 UART: [art] Store priv key in slot 0x5
29,335,010 UART: [art] Derive Key Pair - Done
29,348,065 UART: [art] Signing Cert with AUTHO
29,349,406 UART: RITY.KEYID = 7
31,628,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,108 UART: [art] PUB.X = E7FDC97EA8242654A19B6B53A7843177DE34FAB08C222864B4ADC73249E384080FC83751885134801032000C623F7078
31,637,314 UART: [art] PUB.Y = 74866BAF64DB37B52432D620F0AD37DF4318779C9BB7C15F084A98A7D93CAFE8E8701B8AD18602164E74E01BDD95FACD
31,644,568 UART: [art] SIG.R = 18B590014B8019F731078762F14390144CB2EB33DFC668A9460DD193BCF68C4DF9C324A90AD6EB72F8E355D8DB39EA71
31,651,922 UART: [art] SIG.S = 364239D89077F97C4F1F70A9B18D786BF762945ADB32DCF9CEFE5BECF32F77D0B1DF0D92659BB17D8CD0A18FA41D66A7
32,957,196 UART: Caliptra RT
32,957,898 UART: [state] CFI Enabled
33,075,176 UART: [rt] RT listening for mailbox commands...
33,077,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,108,553 UART: [rt]cmd =0x4d454153, len=108
33,110,367 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,006 UART:
192,371 UART: Running Caliptra ROM ...
193,560 UART:
193,720 UART: [state] CFI Enabled
264,815 UART: [state] LifecycleState = Unprovisioned
266,655 UART: [state] DebugLocked = No
268,690 UART: [state] WD Timer not started. Device not locked for debugging
271,733 UART: [kat] SHA2-256
450,790 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,379 UART: [kat] ++
462,830 UART: [kat] sha1
473,841 UART: [kat] SHA2-256
476,855 UART: [kat] SHA2-384
481,989 UART: [kat] SHA2-512-ACC
484,942 UART: [kat] ECC-384
2,947,015 UART: [kat] HMAC-384Kdf
2,972,820 UART: [kat] LMS
3,502,312 UART: [kat] --
3,507,732 UART: [cold-reset] ++
3,508,812 UART: [fht] FHT @ 0x50003400
3,519,358 UART: [idev] ++
3,519,916 UART: [idev] CDI.KEYID = 6
3,520,868 UART: [idev] SUBJECT.KEYID = 7
3,522,041 UART: [idev] UDS.KEYID = 0
3,522,947 ready_for_fw is high
3,523,130 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,718 UART: [idev] Erasing UDS.KEYID = 0
6,026,534 UART: [idev] Sha1 KeyId Algorithm
6,049,712 UART: [idev] --
6,054,250 UART: [ldev] ++
6,054,840 UART: [ldev] CDI.KEYID = 6
6,055,769 UART: [ldev] SUBJECT.KEYID = 5
6,056,931 UART: [ldev] AUTHORITY.KEYID = 7
6,058,168 UART: [ldev] FE.KEYID = 1
6,099,115 UART: [ldev] Erasing FE.KEYID = 1
8,602,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,711 UART: [ldev] --
10,413,491 UART: [fwproc] Wait for Commands...
10,416,504 UART: [fwproc] Recv command 0x46574c44
10,418,640 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,280,796 >>> mbox cmd response: success
14,285,489 UART: [afmc] ++
14,286,085 UART: [afmc] CDI.KEYID = 6
14,287,007 UART: [afmc] SUBJECT.KEYID = 7
14,288,183 UART: [afmc] AUTHORITY.KEYID = 5
16,828,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,916 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,727 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,619 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,776 UART: [afmc] --
18,628,693 UART: [cold-reset] --
18,632,235 UART: [state] Locking Datavault
18,638,888 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,556 UART: [state] Locking ICCM
18,643,082 UART: [exit] Launching FMC @ 0x40000130
18,651,484 UART:
18,651,727 UART: Running Caliptra FMC ...
18,652,827 UART:
18,652,987 UART: [state] CFI Enabled
18,710,632 UART: [fht] FMC Alias Private Key: 7
20,474,942 UART: [art] Extend RT PCRs Done
20,476,157 UART: [art] Lock RT PCRs Done
20,477,707 UART: [art] Populate DV Done
20,483,227 UART: [fht] FMC Alias Private Key: 7
20,484,709 UART: [art] Derive CDI
20,485,475 UART: [art] Store in in slot 0x4
20,543,816 UART: [art] Derive Key Pair
20,544,853 UART: [art] Store priv key in slot 0x5
23,007,172 UART: [art] Derive Key Pair - Done
23,020,083 UART: [art] Signing Cert with AUTHO
23,021,398 UART: RITY.KEYID = 7
24,734,216 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,957 UART: [art] PUB.X = 8C62C5E553D4CE4DE3504012DFB27D65A2895DB65C3439BF06474DDBF0FF467B9A2005D886C780EEF34BC26FF5593F1A
24,742,989 UART: [art] PUB.Y = 90D6807E254710FB6ACC92DBDFE467CFAF66E164E898616F3C0EDEA1B54046437FDB4B2FC63986797F34FCC289B4F254
24,750,288 UART: [art] SIG.R = ADEC98602FF7BC612B978AA362DDCE6DD99F3300F6B7D9BC8E28FA1D4C7D1D44F43D67DF150F0989EDD09768B4C44D62
24,757,669 UART: [art] SIG.S = 409ED8F42A562FC9F4472816F13F1C4A2BB1ED9D693FADDEE778F9362CEE6661082DF1F6B67E7A578D7BE60775B392E4
25,736,804 UART: Caliptra RT
25,737,507 UART: [state] CFI Enabled
25,902,306 UART: [rt] RT listening for mailbox commands...
25,904,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,935,536 UART: [rt]cmd =0x4d454153, len=108
25,937,162 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,359,828 ready_for_fw is high
3,360,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,042,976 >>> mbox cmd response: success
18,321,949 UART:
18,322,356 UART: Running Caliptra FMC ...
18,323,556 UART:
18,323,726 UART: [state] CFI Enabled
18,388,486 UART: [fht] FMC Alias Private Key: 7
20,152,349 UART: [art] Extend RT PCRs Done
20,153,576 UART: [art] Lock RT PCRs Done
20,155,154 UART: [art] Populate DV Done
20,160,565 UART: [fht] FMC Alias Private Key: 7
20,162,177 UART: [art] Derive CDI
20,162,996 UART: [art] Store in in slot 0x4
20,220,647 UART: [art] Derive Key Pair
20,221,647 UART: [art] Store priv key in slot 0x5
22,684,405 UART: [art] Derive Key Pair - Done
22,697,404 UART: [art] Signing Cert with AUTHO
22,698,715 UART: RITY.KEYID = 7
24,409,047 UART: [art] Erasing AUTHORITY.KEYID = 7
24,410,555 UART: [art] PUB.X = 051B2E82948FBA4A07950170F48461E9A81509B8A4204A752DA5ED4B7371F46DF66F4A7FED281ED36DAC8CFA895CA0FA
24,417,847 UART: [art] PUB.Y = BDB39D8BC7B8378AD07724793BF1F2C40725322C10AC181B2AC50C65D9A64AAC01F25F069030F03DFD052B720265DF61
24,425,085 UART: [art] SIG.R = D7CC2FA93C97F0C161FB1B9D35BB738C45E665C8EFE3E577756F26B9F7276A9D907DDD3A1519B53E83DC654AB3A6DFD2
24,432,526 UART: [art] SIG.S = AB1065401F1EC2BF8FEA49BCC2F84A14788F55BEC5D76ACE1742CA6BAACC997E20F363E8C88734C36AC24B86E2AE85EE
25,411,707 UART: Caliptra RT
25,412,422 UART: [state] CFI Enabled
25,576,231 UART: [rt] RT listening for mailbox commands...
25,578,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,609,593 UART: [rt]cmd =0x4d454153, len=108
25,611,593 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,825 writing to cptra_bootfsm_go
193,169 UART:
193,531 UART: Running Caliptra ROM ...
194,721 UART:
604,256 UART: [state] CFI Enabled
617,495 UART: [state] LifecycleState = Unprovisioned
619,358 UART: [state] DebugLocked = No
620,956 UART: [state] WD Timer not started. Device not locked for debugging
625,062 UART: [kat] SHA2-256
804,142 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,742 UART: [kat] ++
816,191 UART: [kat] sha1
827,983 UART: [kat] SHA2-256
830,989 UART: [kat] SHA2-384
838,046 UART: [kat] SHA2-512-ACC
840,995 UART: [kat] ECC-384
3,280,607 UART: [kat] HMAC-384Kdf
3,293,413 UART: [kat] LMS
3,822,898 UART: [kat] --
3,827,600 UART: [cold-reset] ++
3,829,832 UART: [fht] FHT @ 0x50003400
3,841,895 UART: [idev] ++
3,842,504 UART: [idev] CDI.KEYID = 6
3,843,395 UART: [idev] SUBJECT.KEYID = 7
3,844,520 UART: [idev] UDS.KEYID = 0
3,845,485 ready_for_fw is high
3,845,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,979 UART: [idev] Erasing UDS.KEYID = 0
6,319,582 UART: [idev] Sha1 KeyId Algorithm
6,343,672 UART: [idev] --
6,346,529 UART: [ldev] ++
6,347,093 UART: [ldev] CDI.KEYID = 6
6,348,060 UART: [ldev] SUBJECT.KEYID = 5
6,349,221 UART: [ldev] AUTHORITY.KEYID = 7
6,350,447 UART: [ldev] FE.KEYID = 1
6,361,359 UART: [ldev] Erasing FE.KEYID = 1
8,833,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,899 UART: [ldev] --
10,623,105 UART: [fwproc] Wait for Commands...
10,625,469 UART: [fwproc] Recv command 0x46574c44
10,627,561 UART: [fwproc] Recv'd Img size: 114168 bytes
14,020,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,932 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,477,873 >>> mbox cmd response: success
14,482,310 UART: [afmc] ++
14,482,907 UART: [afmc] CDI.KEYID = 6
14,483,821 UART: [afmc] SUBJECT.KEYID = 7
14,485,005 UART: [afmc] AUTHORITY.KEYID = 5
16,983,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,900 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,697 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,752,555 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,774,467 UART: [afmc] --
18,778,165 UART: [cold-reset] --
18,780,992 UART: [state] Locking Datavault
18,785,213 UART: [state] Locking PCR0, PCR1 and PCR31
18,786,854 UART: [state] Locking ICCM
18,789,378 UART: [exit] Launching FMC @ 0x40000130
18,797,790 UART:
18,798,068 UART: Running Caliptra FMC ...
18,799,181 UART:
18,799,361 UART: [state] CFI Enabled
18,807,786 UART: [fht] FMC Alias Private Key: 7
20,564,693 UART: [art] Extend RT PCRs Done
20,565,900 UART: [art] Lock RT PCRs Done
20,567,551 UART: [art] Populate DV Done
20,572,955 UART: [fht] FMC Alias Private Key: 7
20,574,608 UART: [art] Derive CDI
20,575,349 UART: [art] Store in in slot 0x4
20,618,371 UART: [art] Derive Key Pair
20,619,369 UART: [art] Store priv key in slot 0x5
23,046,300 UART: [art] Derive Key Pair - Done
23,059,416 UART: [art] Signing Cert with AUTHO
23,060,720 UART: RITY.KEYID = 7
24,766,316 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,802 UART: [art] PUB.X = DA66F05C032239B30E384DAB3AAD8A71CD84BDEB69AB5EEA358B72B9CD327752E1A51AFCECDE5D9C12585AEE63E35D2E
24,775,100 UART: [art] PUB.Y = 3542486DFC647B13B1D954FD276BC5FD29D7E89A93DA0B896C39A57BF88287656F8D66BEE0BE03582903E545CEE6F38E
24,782,409 UART: [art] SIG.R = C3DE5F74E52CA99D05CE7B5C5092407E4CBFAF0F7DF2CE167B1E510FC23A4F483E009AA6C93609F1C9113AFC1FD1E82E
24,789,818 UART: [art] SIG.S = 0ABD6114DBAA3C222A3361807AABD0FFCF427FF69B55AA4B05B43BB063D42446B4598249C5BE47E54D3EB17573F70A20
25,768,782 UART: Caliptra RT
25,769,478 UART: [state] CFI Enabled
25,886,642 UART: [rt] RT listening for mailbox commands...
25,888,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,919,796 UART: [rt]cmd =0x4d454153, len=108
25,921,523 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,936 writing to cptra_bootfsm_go
3,698,879 ready_for_fw is high
3,699,255 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,029 >>> mbox cmd response: success
18,517,991 UART:
18,518,401 UART: Running Caliptra FMC ...
18,519,717 UART:
18,519,888 UART: [state] CFI Enabled
18,527,731 UART: [fht] FMC Alias Private Key: 7
20,283,936 UART: [art] Extend RT PCRs Done
20,285,169 UART: [art] Lock RT PCRs Done
20,286,641 UART: [art] Populate DV Done
20,292,157 UART: [fht] FMC Alias Private Key: 7
20,293,801 UART: [art] Derive CDI
20,294,617 UART: [art] Store in in slot 0x4
20,337,136 UART: [art] Derive Key Pair
20,338,190 UART: [art] Store priv key in slot 0x5
22,764,915 UART: [art] Derive Key Pair - Done
22,777,797 UART: [art] Signing Cert with AUTHO
22,779,135 UART: RITY.KEYID = 7
24,484,126 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,628 UART: [art] PUB.X = BC30B0F81335AD43147819F6EDE3FD0A855562ABC60C0E3993AA030CF461E8E29E2C4C26539EB7BDF6E22E7FB07853B7
24,492,873 UART: [art] PUB.Y = AAF63AA34D62965127FF3CF13024FA054A3A3860636DD88A05EFE757D21E61329F42A523C60328693E23B85DABF64482
24,500,137 UART: [art] SIG.R = 413FDD2A79F727ACCBE961721C4D615D5F6CD80356CFB1FE3FBBB41D193CAD892FE7156CFEE8BF179C3ECA4E370B4EF5
24,507,535 UART: [art] SIG.S = 8B682D6911EED02E67865F124C0FAECE4874E37752558B06CF8CB794390E4C1C5BDCD700B75DFF844EDC7EC820248930
25,486,362 UART: Caliptra RT
25,487,067 UART: [state] CFI Enabled
25,604,044 UART: [rt] RT listening for mailbox commands...
25,605,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,637,360 UART: [rt]cmd =0x4d454153, len=108
25,639,221 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,186 UART:
192,577 UART: Running Caliptra ROM ...
193,778 UART:
193,933 UART: [state] CFI Enabled
262,728 UART: [state] LifecycleState = Unprovisioned
265,149 UART: [state] DebugLocked = No
266,761 UART: [state] WD Timer not started. Device not locked for debugging
270,464 UART: [kat] SHA2-256
460,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,896 UART: [kat] ++
471,348 UART: [kat] sha1
482,671 UART: [kat] SHA2-256
485,730 UART: [kat] SHA2-384
492,584 UART: [kat] SHA2-512-ACC
495,169 UART: [kat] ECC-384
2,948,933 UART: [kat] HMAC-384Kdf
2,973,221 UART: [kat] LMS
3,504,993 UART: [kat] --
3,509,878 UART: [cold-reset] ++
3,511,962 UART: [fht] FHT @ 0x50003400
3,523,965 UART: [idev] ++
3,524,724 UART: [idev] CDI.KEYID = 6
3,525,646 UART: [idev] SUBJECT.KEYID = 7
3,526,825 UART: [idev] UDS.KEYID = 0
3,527,752 ready_for_fw is high
3,527,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,458 UART: [idev] Erasing UDS.KEYID = 0
6,047,823 UART: [idev] Sha1 KeyId Algorithm
6,071,501 UART: [idev] --
6,076,207 UART: [ldev] ++
6,076,862 UART: [ldev] CDI.KEYID = 6
6,077,760 UART: [ldev] SUBJECT.KEYID = 5
6,078,841 UART: [ldev] AUTHORITY.KEYID = 7
6,080,158 UART: [ldev] FE.KEYID = 1
6,121,002 UART: [ldev] Erasing FE.KEYID = 1
8,628,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,810 UART: [ldev] --
10,433,482 UART: [fwproc] Wait for Commands...
10,435,196 UART: [fwproc] Recv command 0x46574c44
10,437,454 UART: [fwproc] Recv'd Img size: 114168 bytes
13,877,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,064,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,605,481 >>> mbox cmd response: success
14,608,975 UART: [afmc] ++
14,609,710 UART: [afmc] CDI.KEYID = 6
14,610,901 UART: [afmc] SUBJECT.KEYID = 7
14,612,347 UART: [afmc] AUTHORITY.KEYID = 5
17,147,071 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,909 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,022 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,009 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,260 UART: [afmc] --
18,946,510 UART: [cold-reset] --
18,951,082 UART: [state] Locking Datavault
18,955,971 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,162 UART: [state] Locking ICCM
18,960,714 UART: [exit] Launching FMC @ 0x40000130
18,969,360 UART:
18,969,613 UART: Running Caliptra FMC ...
18,970,719 UART:
18,970,883 UART: [state] CFI Enabled
19,028,328 UART: [fht] FMC Alias Private Key: 7
20,792,089 UART: [art] Extend RT PCRs Done
20,793,313 UART: [art] Lock RT PCRs Done
20,794,717 UART: [art] Populate DV Done
20,799,867 UART: [fht] FMC Alias Private Key: 7
20,801,397 UART: [art] Derive CDI
20,802,168 UART: [art] Store in in slot 0x4
20,860,343 UART: [art] Derive Key Pair
20,861,343 UART: [art] Store priv key in slot 0x5
23,324,130 UART: [art] Derive Key Pair - Done
23,337,182 UART: [art] Signing Cert with AUTHO
23,338,482 UART: RITY.KEYID = 7
25,049,002 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,543 UART: [art] PUB.X = 96816B68112012B5F1D4AE4F96FA878EE3023F0C64378B63438D6FC18C30DEEF8F986D5750F484ECA2CBF3A637C3C805
25,057,761 UART: [art] PUB.Y = 8CD63781EF0989C4F465B9EC749E2FBA8D95749023B6B06F26BDB10DBC7F2BC1528C11902B47704A2D74E7D783F0CF26
25,065,021 UART: [art] SIG.R = 73ABE8C92623B4215116510EF5098B4FFE412BD0A0AD44B7FD7A76BE611576CA65B5B1234F8B50B1C03C6ECE19D86C83
25,072,442 UART: [art] SIG.S = 971D642A345BF53B04AA69EDB1C6F30CAF01E186ECADF89BE900020A02500C899A2912AE9AB60C10E3379C5CCFA04A8E
26,051,312 UART: Caliptra RT
26,052,010 UART: [state] CFI Enabled
26,217,005 UART: [rt] RT listening for mailbox commands...
26,218,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,250,011 UART: [rt]cmd =0x4d454153, len=108
26,252,139 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,441,355 ready_for_fw is high
3,441,973 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,745,733 >>> mbox cmd response: success
19,050,372 UART:
19,050,775 UART: Running Caliptra FMC ...
19,051,899 UART:
19,052,063 UART: [state] CFI Enabled
19,119,318 UART: [fht] FMC Alias Private Key: 7
20,882,436 UART: [art] Extend RT PCRs Done
20,883,668 UART: [art] Lock RT PCRs Done
20,885,178 UART: [art] Populate DV Done
20,890,705 UART: [fht] FMC Alias Private Key: 7
20,892,192 UART: [art] Derive CDI
20,892,956 UART: [art] Store in in slot 0x4
20,951,907 UART: [art] Derive Key Pair
20,952,916 UART: [art] Store priv key in slot 0x5
23,416,278 UART: [art] Derive Key Pair - Done
23,429,389 UART: [art] Signing Cert with AUTHO
23,430,694 UART: RITY.KEYID = 7
25,141,955 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,472 UART: [art] PUB.X = 03B803E4FB8783A49B07D80BC9072C05C6BFBDC477F31D0DD46536BBEDB9A969825E59074046C55847CA35925A90B822
25,150,707 UART: [art] PUB.Y = 45C485B01B3267E2C6E534B4C345C2687E2E2815DE44B75D5DB64671FFB46FDD2F1C882FEA1F75E29D4208803F9154CD
25,157,932 UART: [art] SIG.R = DBB6338544920BD4DABB57F450B603C2B5A89AD5E30D39532D2F3A771EFF3A6CC0A2832C32E2F3E268CA17B39EFF8BA3
25,165,327 UART: [art] SIG.S = 67AB5C33D215EC22B16F15263F9BE0AD12B9D72A6D4A8FCAE0536FA18318378BB113251730A27957B7B48C5698DC5213
26,143,947 UART: Caliptra RT
26,144,647 UART: [state] CFI Enabled
26,309,523 UART: [rt] RT listening for mailbox commands...
26,311,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,342,968 UART: [rt]cmd =0x4d454153, len=108
26,344,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,895 writing to cptra_bootfsm_go
193,054 UART:
193,427 UART: Running Caliptra ROM ...
194,536 UART:
604,267 UART: [state] CFI Enabled
617,592 UART: [state] LifecycleState = Unprovisioned
619,965 UART: [state] DebugLocked = No
622,340 UART: [state] WD Timer not started. Device not locked for debugging
627,718 UART: [kat] SHA2-256
817,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,417 UART: [kat] ++
828,936 UART: [kat] sha1
840,730 UART: [kat] SHA2-256
843,742 UART: [kat] SHA2-384
849,596 UART: [kat] SHA2-512-ACC
852,198 UART: [kat] ECC-384
3,295,023 UART: [kat] HMAC-384Kdf
3,308,456 UART: [kat] LMS
3,840,242 UART: [kat] --
3,845,369 UART: [cold-reset] ++
3,847,795 UART: [fht] FHT @ 0x50003400
3,859,906 UART: [idev] ++
3,860,540 UART: [idev] CDI.KEYID = 6
3,861,495 UART: [idev] SUBJECT.KEYID = 7
3,862,740 UART: [idev] UDS.KEYID = 0
3,863,640 ready_for_fw is high
3,863,842 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,281 UART: [idev] Erasing UDS.KEYID = 0
6,339,771 UART: [idev] Sha1 KeyId Algorithm
6,361,963 UART: [idev] --
6,368,113 UART: [ldev] ++
6,368,866 UART: [ldev] CDI.KEYID = 6
6,369,791 UART: [ldev] SUBJECT.KEYID = 5
6,370,897 UART: [ldev] AUTHORITY.KEYID = 7
6,372,129 UART: [ldev] FE.KEYID = 1
6,384,121 UART: [ldev] Erasing FE.KEYID = 1
8,860,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,320 UART: [ldev] --
10,653,532 UART: [fwproc] Wait for Commands...
10,656,328 UART: [fwproc] Recv command 0x46574c44
10,658,589 UART: [fwproc] Recv'd Img size: 114168 bytes
14,103,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,791 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,151 >>> mbox cmd response: success
14,845,122 UART: [afmc] ++
14,845,824 UART: [afmc] CDI.KEYID = 6
14,847,011 UART: [afmc] SUBJECT.KEYID = 7
14,848,509 UART: [afmc] AUTHORITY.KEYID = 5
17,355,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,608 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,748 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,904 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,906 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,034 UART: [afmc] --
19,152,009 UART: [cold-reset] --
19,156,693 UART: [state] Locking Datavault
19,161,623 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,779 UART: [state] Locking ICCM
19,165,554 UART: [exit] Launching FMC @ 0x40000130
19,174,229 UART:
19,174,472 UART: Running Caliptra FMC ...
19,175,571 UART:
19,175,733 UART: [state] CFI Enabled
19,183,783 UART: [fht] FMC Alias Private Key: 7
20,940,892 UART: [art] Extend RT PCRs Done
20,942,097 UART: [art] Lock RT PCRs Done
20,943,885 UART: [art] Populate DV Done
20,949,331 UART: [fht] FMC Alias Private Key: 7
20,950,984 UART: [art] Derive CDI
20,951,724 UART: [art] Store in in slot 0x4
20,994,214 UART: [art] Derive Key Pair
20,995,208 UART: [art] Store priv key in slot 0x5
23,422,311 UART: [art] Derive Key Pair - Done
23,435,548 UART: [art] Signing Cert with AUTHO
23,436,858 UART: RITY.KEYID = 7
25,142,706 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,190 UART: [art] PUB.X = B0BBE4D05990F0329888256332EA27E9E6BE3A6275D80E1DD4925409A66B39BE0384DD68275911401FE21CB642D4B5FB
25,151,488 UART: [art] PUB.Y = 86FBE219A994A87BBCDA3A73D5E519C4BCC42BC08E3B7D26B9461BEBA7A63D2159A5D88EF41F015F2CCF55DC61EA7BB6
25,158,772 UART: [art] SIG.R = E3FF645C1CECEAF5B72656B9C6339C1392B8C6F8648AD55201B83FC320750DC66278CDBA54D65999D4BB3E2D898EA07C
25,166,158 UART: [art] SIG.S = 07FE7CF1044C61485518A98617F2471EB7DA83B510C1BE6E29034E9BBAD412437A30E20D177A2B94154B3312A71BBC45
26,145,236 UART: Caliptra RT
26,145,946 UART: [state] CFI Enabled
26,262,291 UART: [rt] RT listening for mailbox commands...
26,264,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,295,524 UART: [rt]cmd =0x4d454153, len=108
26,297,549 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,711 writing to cptra_bootfsm_go
3,760,754 ready_for_fw is high
3,761,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,959,718 >>> mbox cmd response: success
19,216,098 UART:
19,216,507 UART: Running Caliptra FMC ...
19,217,710 UART:
19,217,887 UART: [state] CFI Enabled
19,225,408 UART: [fht] FMC Alias Private Key: 7
20,981,928 UART: [art] Extend RT PCRs Done
20,983,159 UART: [art] Lock RT PCRs Done
20,984,861 UART: [art] Populate DV Done
20,990,386 UART: [fht] FMC Alias Private Key: 7
20,991,936 UART: [art] Derive CDI
20,992,756 UART: [art] Store in in slot 0x4
21,035,408 UART: [art] Derive Key Pair
21,036,456 UART: [art] Store priv key in slot 0x5
23,463,051 UART: [art] Derive Key Pair - Done
23,476,004 UART: [art] Signing Cert with AUTHO
23,477,345 UART: RITY.KEYID = 7
25,182,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,898 UART: [art] PUB.X = 3DC4F51EE757ADE94B6109D48198653B5998CE04F442E3625D1EFEC2DACE812665ABBD0713FF71EC50444D990A4D7C61
25,191,152 UART: [art] PUB.Y = 19B309DC99F85C6866F24AD89FA77FEE1D94C6F806E29862CD9D4181CFA63F90E08B18FA29D0AA36B825807C8AF20B4D
25,198,443 UART: [art] SIG.R = A3E41A3A29C305DD3843DD44EF7474B65C661548AA708EC7E9FFA558380C20A5259F6F78F906367F5715F935EFBFD2EC
25,205,790 UART: [art] SIG.S = 1203527B88A04CC057689D37CD8DD5BF8D250AF9CFD6AAD0B74DC60132CCBEEDA28B2DD01E5AB28BF7648FC01F0F2859
26,184,801 UART: Caliptra RT
26,185,487 UART: [state] CFI Enabled
26,303,321 UART: [rt] RT listening for mailbox commands...
26,305,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,336,500 UART: [rt]cmd =0x4d454153, len=108
26,338,369 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
85,883 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,583 UART: [kat] SHA2-256
881,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,629 UART: [kat] ++
885,781 UART: [kat] sha1
889,837 UART: [kat] SHA2-256
891,775 UART: [kat] SHA2-384
894,616 UART: [kat] SHA2-512-ACC
896,517 UART: [kat] ECC-384
901,990 UART: [kat] HMAC-384Kdf
906,682 UART: [kat] LMS
1,474,878 UART: [kat] --
1,475,561 UART: [cold-reset] ++
1,475,957 UART: [fht] Storing FHT @ 0x50003400
1,478,806 UART: [idev] ++
1,478,974 UART: [idev] CDI.KEYID = 6
1,479,334 UART: [idev] SUBJECT.KEYID = 7
1,479,758 UART: [idev] UDS.KEYID = 0
1,480,103 ready_for_fw is high
1,480,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,588 UART: [idev] Erasing UDS.KEYID = 0
1,503,628 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,376 UART: [idev] --
1,513,543 UART: [ldev] ++
1,513,711 UART: [ldev] CDI.KEYID = 6
1,514,074 UART: [ldev] SUBJECT.KEYID = 5
1,514,500 UART: [ldev] AUTHORITY.KEYID = 7
1,514,963 UART: [ldev] FE.KEYID = 1
1,519,919 UART: [ldev] Erasing FE.KEYID = 1
1,545,228 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,346 UART: [ldev] --
1,584,639 UART: [fwproc] Waiting for Commands...
1,585,354 UART: [fwproc] Received command 0x46574c44
1,586,145 UART: [fwproc] Received Image of size 114168 bytes
2,883,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,009 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,906 >>> mbox cmd response: success
3,076,970 UART: [afmc] ++
3,077,138 UART: [afmc] CDI.KEYID = 6
3,077,500 UART: [afmc] SUBJECT.KEYID = 7
3,077,925 UART: [afmc] AUTHORITY.KEYID = 5
3,113,118 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,384 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,164 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,892 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,777 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,467 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,280 UART: [afmc] --
3,156,254 UART: [cold-reset] --
3,157,196 UART: [state] Locking Datavault
3,158,431 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,035 UART: [state] Locking ICCM
3,159,625 UART: [exit] Launching FMC @ 0x40000130
3,164,954 UART:
3,164,970 UART: Running Caliptra FMC ...
3,165,378 UART:
3,165,432 UART: [state] CFI Enabled
3,176,167 UART: [fht] FMC Alias Private Key: 7
3,284,468 UART: [art] Extend RT PCRs Done
3,284,896 UART: [art] Lock RT PCRs Done
3,286,192 UART: [art] Populate DV Done
3,294,267 UART: [fht] FMC Alias Private Key: 7
3,295,261 UART: [art] Derive CDI
3,295,541 UART: [art] Store in in slot 0x4
3,380,772 UART: [art] Derive Key Pair
3,381,132 UART: [art] Store priv key in slot 0x5
3,394,700 UART: [art] Derive Key Pair - Done
3,409,529 UART: [art] Signing Cert with AUTHO
3,410,009 UART: RITY.KEYID = 7
3,424,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,576 UART: [art] PUB.X = 36BEDD3F9842CEDB4B63B40F4536B85DDBC7686CA354F801D75286618EB1EF466CB79CDCAB3324DFF8A8CEAC9A827EEE
3,432,366 UART: [art] PUB.Y = CEFD86D90010D62C1C31C1DE68115ED0A3BA5852D220153D63D7312B8223547A6AEE55EE6EB7512112A215E72D871B3B
3,439,298 UART: [art] SIG.R = 29B09646395BA8004975FCBA063ED1CA75BBDD5858444AF03392CF9DB0829CEA2C6954F66AEC65B4BD4A9AE7BE48C543
3,446,057 UART: [art] SIG.S = E5EA1F986CAAF04D33792D568D401BF5F6ACE552C976D1E9F060AB5D0E5DAAA69041CCDFEEF248938CEE4FAC065A8ACC
3,469,304 UART: Caliptra RT
3,469,557 UART: [state] CFI Enabled
3,577,486 UART: [rt] RT listening for mailbox commands...
3,578,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,696 UART: [rt]cmd =0x4d454153, len=108
3,610,051 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,471 ready_for_fw is high
1,362,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,646 >>> mbox cmd response: success
2,988,370 UART:
2,988,386 UART: Running Caliptra FMC ...
2,988,794 UART:
2,988,848 UART: [state] CFI Enabled
2,998,871 UART: [fht] FMC Alias Private Key: 7
3,106,580 UART: [art] Extend RT PCRs Done
3,107,008 UART: [art] Lock RT PCRs Done
3,108,526 UART: [art] Populate DV Done
3,116,791 UART: [fht] FMC Alias Private Key: 7
3,117,763 UART: [art] Derive CDI
3,118,043 UART: [art] Store in in slot 0x4
3,203,794 UART: [art] Derive Key Pair
3,204,154 UART: [art] Store priv key in slot 0x5
3,217,678 UART: [art] Derive Key Pair - Done
3,232,679 UART: [art] Signing Cert with AUTHO
3,233,159 UART: RITY.KEYID = 7
3,248,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,182 UART: [art] PUB.X = 3369B2363978CC1D32112690708D3FAD5F84F0579F53C52F94E3178BD09AB01F2DC24287FF729259838F996E168F8EA0
3,255,946 UART: [art] PUB.Y = F127E89AB4378BB755AD9F036679682C7289B7B5885268F3B6142A30326BD2E78AE3B2EC180EEB530DE9C838FE9C4166
3,262,889 UART: [art] SIG.R = 15B1EEC31F3DD73C8E7F2FA6407D45AA8636EF3291399995793377153C4E05F7C7004F3D02BC0CE2E50113013B673AFF
3,269,624 UART: [art] SIG.S = 5931BCF17F57A6121AC7F35ED32C2DDA7E6B3B6918041377C565D27A0E6C5797217A72172CA8917D17863860F5201FD7
3,293,399 UART: Caliptra RT
3,293,652 UART: [state] CFI Enabled
3,401,836 UART: [rt] RT listening for mailbox commands...
3,402,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,118 UART: [rt]cmd =0x4d454153, len=108
3,434,579 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,748 UART: [kat] SHA2-256
892,686 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
903,289 UART: [kat] HMAC-384Kdf
907,983 UART: [kat] LMS
1,476,179 UART: [kat] --
1,476,996 UART: [cold-reset] ++
1,477,546 UART: [fht] Storing FHT @ 0x50003400
1,480,501 UART: [idev] ++
1,480,669 UART: [idev] CDI.KEYID = 6
1,481,029 UART: [idev] SUBJECT.KEYID = 7
1,481,453 UART: [idev] UDS.KEYID = 0
1,481,798 ready_for_fw is high
1,481,798 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,967 UART: [idev] Erasing UDS.KEYID = 0
1,506,449 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,133 UART: [idev] --
1,516,150 UART: [ldev] ++
1,516,318 UART: [ldev] CDI.KEYID = 6
1,516,681 UART: [ldev] SUBJECT.KEYID = 5
1,517,107 UART: [ldev] AUTHORITY.KEYID = 7
1,517,570 UART: [ldev] FE.KEYID = 1
1,522,994 UART: [ldev] Erasing FE.KEYID = 1
1,548,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,163 UART: [ldev] --
1,587,546 UART: [fwproc] Waiting for Commands...
1,588,379 UART: [fwproc] Received command 0x46574c44
1,589,170 UART: [fwproc] Received Image of size 114168 bytes
2,885,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,610 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,615 >>> mbox cmd response: success
3,079,731 UART: [afmc] ++
3,079,899 UART: [afmc] CDI.KEYID = 6
3,080,261 UART: [afmc] SUBJECT.KEYID = 7
3,080,686 UART: [afmc] AUTHORITY.KEYID = 5
3,115,543 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,907 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,687 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,415 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,300 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,990 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,075 UART: [afmc] --
3,158,961 UART: [cold-reset] --
3,159,899 UART: [state] Locking Datavault
3,161,194 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,798 UART: [state] Locking ICCM
3,162,458 UART: [exit] Launching FMC @ 0x40000130
3,167,787 UART:
3,167,803 UART: Running Caliptra FMC ...
3,168,211 UART:
3,168,354 UART: [state] CFI Enabled
3,179,083 UART: [fht] FMC Alias Private Key: 7
3,286,586 UART: [art] Extend RT PCRs Done
3,287,014 UART: [art] Lock RT PCRs Done
3,288,182 UART: [art] Populate DV Done
3,296,381 UART: [fht] FMC Alias Private Key: 7
3,297,547 UART: [art] Derive CDI
3,297,827 UART: [art] Store in in slot 0x4
3,383,978 UART: [art] Derive Key Pair
3,384,338 UART: [art] Store priv key in slot 0x5
3,396,988 UART: [art] Derive Key Pair - Done
3,411,845 UART: [art] Signing Cert with AUTHO
3,412,325 UART: RITY.KEYID = 7
3,427,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,082 UART: [art] PUB.X = 01CE97ECC4B860A7E578CB21EB40F290CA7573DF84105D6586F4CEE939063E3AA47751E2123CDE2D8E8167524B7FBCF7
3,434,856 UART: [art] PUB.Y = 8A5B486F30483DE53638C37AD260BC18A1A65A14B3D2627B53DA83F0401E8EF18A925F74A5E8DAA56F1FA4E5F036B0D8
3,441,816 UART: [art] SIG.R = 560807DE1AE8B428E6B4424A5372C1AB112BF62CC68E54BE2BAFF1718AB20D1C3211ABA9842E97B9B75C81A0EAAA927A
3,448,593 UART: [art] SIG.S = 404D1FF401AA2767E4A84D9416B8844F153D7025F4B4A49BDF7487CD522D135E5DB50951BED0062DFA7C26D9F297B49C
3,471,997 UART: Caliptra RT
3,472,342 UART: [state] CFI Enabled
3,580,884 UART: [rt] RT listening for mailbox commands...
3,581,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,234 UART: [rt]cmd =0x4d454153, len=108
3,613,851 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 ready_for_fw is high
1,363,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,629 >>> mbox cmd response: success
2,989,353 UART:
2,989,369 UART: Running Caliptra FMC ...
2,989,777 UART:
2,989,920 UART: [state] CFI Enabled
3,000,685 UART: [fht] FMC Alias Private Key: 7
3,107,810 UART: [art] Extend RT PCRs Done
3,108,238 UART: [art] Lock RT PCRs Done
3,109,712 UART: [art] Populate DV Done
3,117,921 UART: [fht] FMC Alias Private Key: 7
3,118,911 UART: [art] Derive CDI
3,119,191 UART: [art] Store in in slot 0x4
3,204,614 UART: [art] Derive Key Pair
3,204,974 UART: [art] Store priv key in slot 0x5
3,218,254 UART: [art] Derive Key Pair - Done
3,232,911 UART: [art] Signing Cert with AUTHO
3,233,391 UART: RITY.KEYID = 7
3,248,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,658 UART: [art] PUB.X = 2613712270F887CCFC79387977190268F8F78F0EA6936815960DDF97907CAF3789B01FEBE8F7DDC24863E97DBF59CBFD
3,256,423 UART: [art] PUB.Y = 7F10E9E6D226F13E43E31EC4A2FE8F2E34A52F77D95A5CBD5E0F7B5C052F273BAC4A997E51FAACE470B1C282D7C59375
3,263,385 UART: [art] SIG.R = 70DA680BD32E2053D742AF4C14758CE27F69E8D4EAE1A9BB819EE2871689EAAC2B958CD2F398941E668D20BD7B5F87F6
3,270,164 UART: [art] SIG.S = 4AA42335CE76489DBCA5AD406549549E83F386089BD9CE9EC1E66092E53404DB13A43155A317B9931FD5FCA0199A70A2
3,293,255 UART: Caliptra RT
3,293,600 UART: [state] CFI Enabled
3,401,766 UART: [rt] RT listening for mailbox commands...
3,402,436 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,226 UART: [rt]cmd =0x4d454153, len=108
3,434,663 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,275 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
893,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,201 UART: [kat] ++
897,353 UART: [kat] sha1
901,445 UART: [kat] SHA2-256
903,385 UART: [kat] SHA2-384
906,114 UART: [kat] SHA2-512-ACC
908,015 UART: [kat] ECC-384
917,704 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,333 UART: [cold-reset] ++
1,171,753 UART: [fht] FHT @ 0x50003400
1,174,484 UART: [idev] ++
1,174,652 UART: [idev] CDI.KEYID = 6
1,175,012 UART: [idev] SUBJECT.KEYID = 7
1,175,436 UART: [idev] UDS.KEYID = 0
1,175,781 ready_for_fw is high
1,175,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha1 KeyId Algorithm
1,207,759 UART: [idev] --
1,208,795 UART: [ldev] ++
1,208,963 UART: [ldev] CDI.KEYID = 6
1,209,326 UART: [ldev] SUBJECT.KEYID = 5
1,209,752 UART: [ldev] AUTHORITY.KEYID = 7
1,210,215 UART: [ldev] FE.KEYID = 1
1,215,591 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,245 UART: [ldev] --
1,281,642 UART: [fwproc] Wait for Commands...
1,282,394 UART: [fwproc] Recv command 0x46574c44
1,283,122 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,090 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,697 >>> mbox cmd response: success
2,772,889 UART: [afmc] ++
2,773,057 UART: [afmc] CDI.KEYID = 6
2,773,419 UART: [afmc] SUBJECT.KEYID = 7
2,773,844 UART: [afmc] AUTHORITY.KEYID = 5
2,809,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,622 UART: [afmc] --
2,852,578 UART: [cold-reset] --
2,853,648 UART: [state] Locking Datavault
2,854,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,487 UART: [state] Locking ICCM
2,856,063 UART: [exit] Launching FMC @ 0x40000130
2,861,392 UART:
2,861,408 UART: Running Caliptra FMC ...
2,861,816 UART:
2,861,870 UART: [state] CFI Enabled
2,872,197 UART: [fht] FMC Alias Private Key: 7
2,980,180 UART: [art] Extend RT PCRs Done
2,980,608 UART: [art] Lock RT PCRs Done
2,981,954 UART: [art] Populate DV Done
2,990,427 UART: [fht] FMC Alias Private Key: 7
2,991,389 UART: [art] Derive CDI
2,991,669 UART: [art] Store in in slot 0x4
3,077,464 UART: [art] Derive Key Pair
3,077,824 UART: [art] Store priv key in slot 0x5
3,090,662 UART: [art] Derive Key Pair - Done
3,105,683 UART: [art] Signing Cert with AUTHO
3,106,163 UART: RITY.KEYID = 7
3,121,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,034 UART: [art] PUB.X = 0F3CD31601815E8294A247FBB198633014ED193F098BCF6C2B662C28BB47928E00DFD4F10C6E89C38F654E3BCF6F9812
3,128,774 UART: [art] PUB.Y = 38FCC0044464F0A3C63E98BADC0505633D1C796D458C67F23AA6F8D6881CFA7A163A723EF2618C541BD6E293D79A9D8C
3,135,723 UART: [art] SIG.R = 75BA700BD480D97687241F0BAAC9436F6131FE6EBB76404A1DF4838A04A68EE28B6B7D58592358D79CD02569EDDEEA9D
3,142,494 UART: [art] SIG.S = AB330325BF204BE69FCDB1BCFFC4CCB93935A9DA0F60B8A1E1DA60261112FFB2588338747C299C50AF87526E7EEAF090
3,166,485 UART: Caliptra RT
3,166,738 UART: [state] CFI Enabled
3,274,201 UART: [rt] RT listening for mailbox commands...
3,274,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,405 UART: [rt]cmd =0x4d454153, len=108
3,306,942 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,211 ready_for_fw is high
1,060,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,918 >>> mbox cmd response: success
2,687,658 UART:
2,687,674 UART: Running Caliptra FMC ...
2,688,082 UART:
2,688,136 UART: [state] CFI Enabled
2,698,675 UART: [fht] FMC Alias Private Key: 7
2,806,278 UART: [art] Extend RT PCRs Done
2,806,706 UART: [art] Lock RT PCRs Done
2,807,868 UART: [art] Populate DV Done
2,816,359 UART: [fht] FMC Alias Private Key: 7
2,817,451 UART: [art] Derive CDI
2,817,731 UART: [art] Store in in slot 0x4
2,903,234 UART: [art] Derive Key Pair
2,903,594 UART: [art] Store priv key in slot 0x5
2,916,344 UART: [art] Derive Key Pair - Done
2,931,012 UART: [art] Signing Cert with AUTHO
2,931,492 UART: RITY.KEYID = 7
2,947,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,837 UART: [art] PUB.X = 8ABBF4265CA11051180451EB11B3493D5ACE0F83CFB65FE8E6A51AC9444C6547B478531B5C683E1A014078FDC6FEA3D2
2,954,608 UART: [art] PUB.Y = 7FC14945BE28D9A82F1A96A94139D56ECEAA31A0E63B0227B8F1EDF33DC3CF8A4913928A384ED9F6FED2791A888D0E98
2,961,566 UART: [art] SIG.R = 59650F71C6025908060F59D56EFE1BFFF047B562F96B21C51A7410C5EA4F692CB41E954D33490C6F621ED6C138DA8A74
2,968,320 UART: [art] SIG.S = 88AFBAC319AC43BD75E9ED5C270F7B84579C24298A8E8F2950F8F5CEE1BD5BAACD5B460CE6F46B1D189B1BDFEC4EBCD5
2,991,647 UART: Caliptra RT
2,991,900 UART: [state] CFI Enabled
3,099,497 UART: [rt] RT listening for mailbox commands...
3,100,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,527 UART: [rt]cmd =0x4d454153, len=108
3,131,974 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,587 UART: [kat] SHA2-512-ACC
908,488 UART: [kat] ECC-384
917,995 UART: [kat] HMAC-384Kdf
922,677 UART: [kat] LMS
1,171,005 UART: [kat] --
1,171,906 UART: [cold-reset] ++
1,172,300 UART: [fht] FHT @ 0x50003400
1,174,907 UART: [idev] ++
1,175,075 UART: [idev] CDI.KEYID = 6
1,175,435 UART: [idev] SUBJECT.KEYID = 7
1,175,859 UART: [idev] UDS.KEYID = 0
1,176,204 ready_for_fw is high
1,176,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,785 UART: [idev] Erasing UDS.KEYID = 0
1,200,714 UART: [idev] Sha1 KeyId Algorithm
1,209,094 UART: [idev] --
1,210,096 UART: [ldev] ++
1,210,264 UART: [ldev] CDI.KEYID = 6
1,210,627 UART: [ldev] SUBJECT.KEYID = 5
1,211,053 UART: [ldev] AUTHORITY.KEYID = 7
1,211,516 UART: [ldev] FE.KEYID = 1
1,216,772 UART: [ldev] Erasing FE.KEYID = 1
1,243,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,950 UART: [ldev] --
1,282,391 UART: [fwproc] Wait for Commands...
1,283,047 UART: [fwproc] Recv command 0x46574c44
1,283,775 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,618 >>> mbox cmd response: success
2,772,860 UART: [afmc] ++
2,773,028 UART: [afmc] CDI.KEYID = 6
2,773,390 UART: [afmc] SUBJECT.KEYID = 7
2,773,815 UART: [afmc] AUTHORITY.KEYID = 5
2,809,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,249 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,997 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,725 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,610 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,329 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,359 UART: [afmc] --
2,853,491 UART: [cold-reset] --
2,854,303 UART: [state] Locking Datavault
2,855,330 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,934 UART: [state] Locking ICCM
2,856,422 UART: [exit] Launching FMC @ 0x40000130
2,861,751 UART:
2,861,767 UART: Running Caliptra FMC ...
2,862,175 UART:
2,862,318 UART: [state] CFI Enabled
2,872,671 UART: [fht] FMC Alias Private Key: 7
2,980,660 UART: [art] Extend RT PCRs Done
2,981,088 UART: [art] Lock RT PCRs Done
2,982,494 UART: [art] Populate DV Done
2,990,421 UART: [fht] FMC Alias Private Key: 7
2,991,469 UART: [art] Derive CDI
2,991,749 UART: [art] Store in in slot 0x4
3,077,618 UART: [art] Derive Key Pair
3,077,978 UART: [art] Store priv key in slot 0x5
3,091,588 UART: [art] Derive Key Pair - Done
3,106,265 UART: [art] Signing Cert with AUTHO
3,106,745 UART: RITY.KEYID = 7
3,122,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,872 UART: [art] PUB.X = E8F08359FCDEB1741DC53328847BE0337252C0143DD1202B911A8FCB29930B6286B921C4EFB9C4F60B7E2122C2ECF3D6
3,129,642 UART: [art] PUB.Y = 3215C72923AB6889ABECA1141AEBF24FD26D965B5929113515665A491EBDA8AE5E929E398E110EF17C1E30D5FC345D27
3,136,595 UART: [art] SIG.R = EB043ECD2C543CC883A29C9251C52DA49BCFB144BE703D0E00E96BFFF88E18CACDD6F65453234095311F30AB49A65116
3,143,349 UART: [art] SIG.S = 63D4F415CE17A6B2FF2BF28D6248810D3B7EBF42F1214F9DACAC46C52A9453DBE217E1DEB0336B4ED3D9B787BDFC3E32
3,166,969 UART: Caliptra RT
3,167,314 UART: [state] CFI Enabled
3,275,005 UART: [rt] RT listening for mailbox commands...
3,275,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,061 UART: [rt]cmd =0x4d454153, len=108
3,307,438 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,733 >>> mbox cmd response: success
2,687,285 UART:
2,687,301 UART: Running Caliptra FMC ...
2,687,709 UART:
2,687,852 UART: [state] CFI Enabled
2,698,291 UART: [fht] FMC Alias Private Key: 7
2,806,352 UART: [art] Extend RT PCRs Done
2,806,780 UART: [art] Lock RT PCRs Done
2,808,578 UART: [art] Populate DV Done
2,816,681 UART: [fht] FMC Alias Private Key: 7
2,817,821 UART: [art] Derive CDI
2,818,101 UART: [art] Store in in slot 0x4
2,904,040 UART: [art] Derive Key Pair
2,904,400 UART: [art] Store priv key in slot 0x5
2,918,130 UART: [art] Derive Key Pair - Done
2,933,076 UART: [art] Signing Cert with AUTHO
2,933,556 UART: RITY.KEYID = 7
2,949,476 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,241 UART: [art] PUB.X = 0F97EF903A2FB929041C4ABA6EAB71096CA493F1B4D53AF62B06D38918A2048C1DE6954550198791C75C5DBBEAF0699D
2,957,004 UART: [art] PUB.Y = A56B3424E895DDF3D6D1EAEA4DCBF955AE2FBB6098BEEAD224A8ABC7BC3D5F91032507C5EA49163A75D00C436075E208
2,963,962 UART: [art] SIG.R = 46981845AEAB56A486331ABC6D64EAB2F437073132203D1AF83813E2E9985061BB4E0456BBC7BC9446AA17E7A2FCE145
2,970,730 UART: [art] SIG.S = 521F49B0C7C3250782EF3979A7310D99F0DE0283CA364493941AE155AFF19D17B54B1C832076FE1F8A1DFABFA847B39C
2,994,710 UART: Caliptra RT
2,995,055 UART: [state] CFI Enabled
3,103,366 UART: [rt] RT listening for mailbox commands...
3,104,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,418 UART: [rt]cmd =0x4d454153, len=108
3,136,131 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,085 UART: [kat] ++
895,237 UART: [kat] sha1
899,457 UART: [kat] SHA2-256
901,397 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,170,155 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,337 UART: [idev] ++
1,173,505 UART: [idev] CDI.KEYID = 6
1,173,866 UART: [idev] SUBJECT.KEYID = 7
1,174,291 UART: [idev] UDS.KEYID = 0
1,174,637 ready_for_fw is high
1,174,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,533 UART: [idev] Erasing UDS.KEYID = 0
1,199,561 UART: [idev] Sha1 KeyId Algorithm
1,208,327 UART: [idev] --
1,209,394 UART: [ldev] ++
1,209,562 UART: [ldev] CDI.KEYID = 6
1,209,926 UART: [ldev] SUBJECT.KEYID = 5
1,210,353 UART: [ldev] AUTHORITY.KEYID = 7
1,210,816 UART: [ldev] FE.KEYID = 1
1,215,826 UART: [ldev] Erasing FE.KEYID = 1
1,241,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,074 UART: [ldev] --
1,281,382 UART: [fwproc] Wait for Commands...
1,282,103 UART: [fwproc] Recv command 0x46574c44
1,282,836 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,267 >>> mbox cmd response: success
2,773,452 UART: [afmc] ++
2,773,620 UART: [afmc] CDI.KEYID = 6
2,773,983 UART: [afmc] SUBJECT.KEYID = 7
2,774,409 UART: [afmc] AUTHORITY.KEYID = 5
2,810,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,797 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,128 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,947 UART: [afmc] --
2,853,883 UART: [cold-reset] --
2,854,765 UART: [state] Locking Datavault
2,856,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,638 UART: [state] Locking ICCM
2,857,300 UART: [exit] Launching FMC @ 0x40000130
2,862,629 UART:
2,862,645 UART: Running Caliptra FMC ...
2,863,053 UART:
2,863,107 UART: [state] CFI Enabled
2,873,894 UART: [fht] FMC Alias Private Key: 7
2,981,971 UART: [art] Extend RT PCRs Done
2,982,399 UART: [art] Lock RT PCRs Done
2,983,951 UART: [art] Populate DV Done
2,992,222 UART: [fht] FMC Alias Private Key: 7
2,993,328 UART: [art] Derive CDI
2,993,608 UART: [art] Store in in slot 0x4
3,079,073 UART: [art] Derive Key Pair
3,079,433 UART: [art] Store priv key in slot 0x5
3,092,261 UART: [art] Derive Key Pair - Done
3,107,064 UART: [art] Signing Cert with AUTHO
3,107,544 UART: RITY.KEYID = 7
3,122,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,753 UART: [art] PUB.X = EEBBC6B4052D90D3C1996CC0C7E4342ECE401F577A893E4B3CE5F669141D006E0B8EC6831991BF353A1986326448FDF0
3,130,501 UART: [art] PUB.Y = F04B6FD2924528060F1A79A876DC52D989540E7ACFAEB5511FDB56F45F1BFC4FC7D1EED7DB6EE01712B5FF464E47255F
3,137,460 UART: [art] SIG.R = AFA089FF75CFC8D3DDCB9B42766AF84503311EC25C34D37947F827A77D9DF86965CF6D5B9D0D20DEC508EC28A55ADDAD
3,144,243 UART: [art] SIG.S = C704F57AC35CA26B3D7FEFF7EAE28DEB4A4A6BED0E3C94F5F8EAAB24B00B7BEE585F61B30E1A62D293D9BD7125DA377C
3,168,134 UART: Caliptra RT
3,168,387 UART: [state] CFI Enabled
3,276,803 UART: [rt] RT listening for mailbox commands...
3,277,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,281 UART: [rt]cmd =0x4d454153, len=108
3,310,066 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,940 ready_for_fw is high
1,055,940 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,751 >>> mbox cmd response: success
2,684,493 UART:
2,684,509 UART: Running Caliptra FMC ...
2,684,917 UART:
2,684,971 UART: [state] CFI Enabled
2,695,324 UART: [fht] FMC Alias Private Key: 7
2,803,659 UART: [art] Extend RT PCRs Done
2,804,087 UART: [art] Lock RT PCRs Done
2,805,291 UART: [art] Populate DV Done
2,813,512 UART: [fht] FMC Alias Private Key: 7
2,814,626 UART: [art] Derive CDI
2,814,906 UART: [art] Store in in slot 0x4
2,900,585 UART: [art] Derive Key Pair
2,900,945 UART: [art] Store priv key in slot 0x5
2,914,377 UART: [art] Derive Key Pair - Done
2,929,068 UART: [art] Signing Cert with AUTHO
2,929,548 UART: RITY.KEYID = 7
2,944,862 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,627 UART: [art] PUB.X = DDB38B986C94093B6247FB776A21CDC177610CB7ACF313240503641469B27812D38DFFA3BC327E0256ABBF3869172F14
2,952,382 UART: [art] PUB.Y = B030C4135B753C0DCB0F4101C18E69B58EC69B340BC2F0656A3FC56A07AD03486744FB3521356309555DDAD49F63AB9E
2,959,315 UART: [art] SIG.R = 2C56A4723FE459B8256DC729BCD9CCC39C739DDEF550BE3017FC9B16CACA690359A2084C535DEEC7E5634E3F8733056A
2,966,088 UART: [art] SIG.S = E9D8E2B6ADF9C575E98211DAA209BE51DD189A96C8AD5FB257BA6D750ADA14F159EFBD0755C5373678E6F6EE19133BA7
2,989,336 UART: Caliptra RT
2,989,589 UART: [state] CFI Enabled
3,097,322 UART: [rt] RT listening for mailbox commands...
3,097,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,746 UART: [rt]cmd =0x4d454153, len=108
3,130,271 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,964 UART: [kat] SHA2-256
901,904 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,928 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,174,730 ready_for_fw is high
1,174,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,388 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,215,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,336 UART: [fwproc] Recv command 0x46574c44
1,283,069 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,813 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,716 >>> mbox cmd response: success
2,772,751 UART: [afmc] ++
2,772,919 UART: [afmc] CDI.KEYID = 6
2,773,282 UART: [afmc] SUBJECT.KEYID = 7
2,773,708 UART: [afmc] AUTHORITY.KEYID = 5
2,809,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,305 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,188 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,907 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,788 UART: [afmc] --
2,852,670 UART: [cold-reset] --
2,853,618 UART: [state] Locking Datavault
2,854,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,303 UART: [state] Locking ICCM
2,855,755 UART: [exit] Launching FMC @ 0x40000130
2,861,084 UART:
2,861,100 UART: Running Caliptra FMC ...
2,861,508 UART:
2,861,651 UART: [state] CFI Enabled
2,872,384 UART: [fht] FMC Alias Private Key: 7
2,980,171 UART: [art] Extend RT PCRs Done
2,980,599 UART: [art] Lock RT PCRs Done
2,981,953 UART: [art] Populate DV Done
2,990,148 UART: [fht] FMC Alias Private Key: 7
2,991,086 UART: [art] Derive CDI
2,991,366 UART: [art] Store in in slot 0x4
3,077,311 UART: [art] Derive Key Pair
3,077,671 UART: [art] Store priv key in slot 0x5
3,090,251 UART: [art] Derive Key Pair - Done
3,105,159 UART: [art] Signing Cert with AUTHO
3,105,639 UART: RITY.KEYID = 7
3,121,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,996 UART: [art] PUB.X = A2FE52773EC340B98401D3BF5993B27B0E1E18D05D62B56BBA5CC00BA6C65B646CD3EC9BED2976D87985B266A38E113D
3,128,769 UART: [art] PUB.Y = 1E69051216901F0BB087B8BCDC4F86B2AD16AEDA6F2A73629009B2F3D6D6B22F5A5B7F436A6EC175179A51FAEF99BEED
3,135,728 UART: [art] SIG.R = 188203E570E1682FA5585C332C231FD13D661D15196F3A60D30E7317C6DB1FF856D338A941E82C48006FFCC975C6DF01
3,142,465 UART: [art] SIG.S = 4E0D077975DA55F8A81D3D8FEE91C168CFF14489249551A2FBBD25D54E0550B13B089B2FC3CCD1ABABAC3491384501F3
3,165,955 UART: Caliptra RT
3,166,300 UART: [state] CFI Enabled
3,274,259 UART: [rt] RT listening for mailbox commands...
3,274,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,187 UART: [rt]cmd =0x4d454153, len=108
3,306,498 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,509 ready_for_fw is high
1,056,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,976 >>> mbox cmd response: success
2,681,392 UART:
2,681,408 UART: Running Caliptra FMC ...
2,681,816 UART:
2,681,959 UART: [state] CFI Enabled
2,692,452 UART: [fht] FMC Alias Private Key: 7
2,800,537 UART: [art] Extend RT PCRs Done
2,800,965 UART: [art] Lock RT PCRs Done
2,802,609 UART: [art] Populate DV Done
2,811,158 UART: [fht] FMC Alias Private Key: 7
2,812,086 UART: [art] Derive CDI
2,812,366 UART: [art] Store in in slot 0x4
2,898,159 UART: [art] Derive Key Pair
2,898,519 UART: [art] Store priv key in slot 0x5
2,911,513 UART: [art] Derive Key Pair - Done
2,926,260 UART: [art] Signing Cert with AUTHO
2,926,740 UART: RITY.KEYID = 7
2,941,856 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,621 UART: [art] PUB.X = 1FB41B6FB36D2A1F3B746B4C1E93FD60ED265F158C197C750614B05EE86A76829E58D35AB6D2A5558A12232B0A5FEE4E
2,949,395 UART: [art] PUB.Y = 8C161A6EFA92F1F3C1B93157F299DE4E42037172F4E24B605C8B79D267F90FF5263F7900DE4AFE51F807697E390AE011
2,956,313 UART: [art] SIG.R = 770BB0C853D7660291A8A755AE89586388745D8CE05F3EE8FE387ACBA1E2CF55E90FA1CF6292E84B1FD0B74DA5FC124A
2,963,088 UART: [art] SIG.S = F11370465771CB910B11A3C0F289014E763BCA5BEF77EF8E478F9BD056685281E0794B713FDE7262D68941B2D349C886
2,987,209 UART: Caliptra RT
2,987,554 UART: [state] CFI Enabled
3,095,857 UART: [rt] RT listening for mailbox commands...
3,096,527 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,949 UART: [rt]cmd =0x4d454153, len=108
3,128,536 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,990 UART:
192,354 UART: Running Caliptra ROM ...
193,492 UART:
193,637 UART: [state] CFI Enabled
265,382 UART: [state] LifecycleState = Unprovisioned
267,306 UART: [state] DebugLocked = No
269,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,898 UART: [kat] SHA2-256
443,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,119 UART: [kat] ++
454,566 UART: [kat] sha1
466,937 UART: [kat] SHA2-256
469,658 UART: [kat] SHA2-384
475,214 UART: [kat] SHA2-512-ACC
477,583 UART: [kat] ECC-384
2,768,833 UART: [kat] HMAC-384Kdf
2,801,251 UART: [kat] LMS
3,991,521 UART: [kat] --
3,996,159 UART: [cold-reset] ++
3,998,163 UART: [fht] Storing FHT @ 0x50003400
4,009,773 UART: [idev] ++
4,010,335 UART: [idev] CDI.KEYID = 6
4,011,422 UART: [idev] SUBJECT.KEYID = 7
4,012,538 UART: [idev] UDS.KEYID = 0
4,013,713 ready_for_fw is high
4,013,935 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,063 UART: [idev] Erasing UDS.KEYID = 0
7,350,171 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,897 UART: [idev] --
7,377,458 UART: [ldev] ++
7,378,089 UART: [ldev] CDI.KEYID = 6
7,379,002 UART: [ldev] SUBJECT.KEYID = 5
7,380,233 UART: [ldev] AUTHORITY.KEYID = 7
7,381,516 UART: [ldev] FE.KEYID = 1
7,422,662 UART: [ldev] Erasing FE.KEYID = 1
10,755,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,707 UART: [ldev] --
13,135,628 UART: [fwproc] Waiting for Commands...
13,137,939 UART: [fwproc] Received command 0x46574c44
13,140,128 UART: [fwproc] Received Image of size 113844 bytes
17,189,337 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,161 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,331,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,647,695 >>> mbox cmd response: success
17,652,389 UART: [afmc] ++
17,652,985 UART: [afmc] CDI.KEYID = 6
17,653,954 UART: [afmc] SUBJECT.KEYID = 7
17,655,163 UART: [afmc] AUTHORITY.KEYID = 5
21,029,556 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,774 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,033 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,443 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,309 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,721 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,394,374 UART: [afmc] --
23,398,678 UART: [cold-reset] --
23,402,319 UART: [state] Locking Datavault
23,408,475 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,219 UART: [state] Locking ICCM
23,412,572 UART: [exit] Launching FMC @ 0x40000130
23,420,980 UART:
23,421,209 UART: Running Caliptra FMC ...
23,422,300 UART:
23,422,451 UART: [state] CFI Enabled
23,487,312 UART: [fht] FMC Alias Private Key: 7
25,825,607 UART: [art] Extend RT PCRs Done
25,826,821 UART: [art] Lock RT PCRs Done
25,828,223 UART: [art] Populate DV Done
25,833,416 UART: [fht] FMC Alias Private Key: 7
25,834,889 UART: [art] Derive CDI
25,835,644 UART: [art] Store in in slot 0x4
25,895,653 UART: [art] Derive Key Pair
25,896,683 UART: [art] Store priv key in slot 0x5
29,189,534 UART: [art] Derive Key Pair - Done
29,202,960 UART: [art] Signing Cert with AUTHO
29,204,262 UART: RITY.KEYID = 7
31,491,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,065 UART: [art] PUB.X = B3FCCF3C7231ADC733256B8BA5863A2DFE1EDB47143E98170885D59D3F2722ED5CAF43446E8E2EAA7CD9A27D506CAC2E
31,500,282 UART: [art] PUB.Y = 930E153B6BD87E31BF68FC79D84A6D2A5C21575513738CE660930895A0AE90F9F7EF1E9F41138965D6BC8CBBFAB0AACE
31,507,533 UART: [art] SIG.R = 827454740A05AC3C01736165708E7DC66E1554D2FB214314558827688995E4029EECFE3CC0B4AFBFA372E361D0961632
31,514,893 UART: [art] SIG.S = BBC90B432488A40881B351ED71EA3DBE11A0611A752FD283313CBF5DB7EF2D90339B52C7A424E5A4F0D79836CC175A7B
32,819,806 UART: Caliptra RT
32,820,521 UART: [state] CFI Enabled
32,981,690 UART: [rt] RT listening for mailbox commands...
32,983,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,014,889 UART: [rt]cmd =0x4d454153, len=108
33,033,451 >>> mbox cmd response data (12 bytes)
33,033,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,064,856 UART: [rt]cmd =0x4d454153, len=108
33,083,496 >>> mbox cmd response data (12 bytes)
33,083,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,114,591 UART: [rt]cmd =0x4d454153, len=108
33,132,941 >>> mbox cmd response data (12 bytes)
33,133,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,164,101 UART: [rt]cmd =0x4d454153, len=108
33,182,167 >>> mbox cmd response data (12 bytes)
33,182,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,213,344 UART: [rt]cmd =0x4d454153, len=108
33,232,197 >>> mbox cmd response data (12 bytes)
33,232,624 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,263,266 UART: [rt]cmd =0x4d454153, len=108
33,281,100 >>> mbox cmd response data (12 bytes)
33,281,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,312,062 UART: [rt]cmd =0x4d454153, len=108
33,329,895 >>> mbox cmd response data (12 bytes)
33,330,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,361,072 UART: [rt]cmd =0x4d454153, len=108
33,379,570 >>> mbox cmd response data (12 bytes)
33,380,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,410,911 UART: [rt]cmd =0x4d454153, len=108
33,429,722 >>> mbox cmd response data (12 bytes)
33,430,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,460,845 UART: [rt]cmd =0x4d454153, len=108
33,479,694 >>> mbox cmd response data (12 bytes)
33,480,119 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,510,865 UART: [rt]cmd =0x4d454153, len=108
33,529,082 >>> mbox cmd response data (12 bytes)
33,529,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,560,268 UART: [rt]cmd =0x4d454153, len=108
33,579,507 >>> mbox cmd response data (12 bytes)
33,579,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,610,251 UART: [rt]cmd =0x4d454153, len=108
33,628,519 >>> mbox cmd response data (12 bytes)
33,628,949 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,659,824 UART: [rt]cmd =0x4d454153, len=108
33,678,798 >>> mbox cmd response data (12 bytes)
33,679,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,710,027 UART: [rt]cmd =0x4d454153, len=108
33,729,122 >>> mbox cmd response data (12 bytes)
33,729,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,760,250 UART: [rt]cmd =0x4d454153, len=108
33,762,641 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,782,871 ready_for_fw is high
3,783,269 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,845,244 >>> mbox cmd response: success
23,545,069 UART:
23,545,467 UART: Running Caliptra FMC ...
23,546,621 UART:
23,546,781 UART: [state] CFI Enabled
23,611,162 UART: [fht] FMC Alias Private Key: 7
25,948,794 UART: [art] Extend RT PCRs Done
25,950,023 UART: [art] Lock RT PCRs Done
25,951,838 UART: [art] Populate DV Done
25,957,190 UART: [fht] FMC Alias Private Key: 7
25,958,778 UART: [art] Derive CDI
25,959,510 UART: [art] Store in in slot 0x4
26,019,237 UART: [art] Derive Key Pair
26,020,266 UART: [art] Store priv key in slot 0x5
29,313,256 UART: [art] Derive Key Pair - Done
29,326,146 UART: [art] Signing Cert with AUTHO
29,327,452 UART: RITY.KEYID = 7
31,614,709 UART: [art] Erasing AUTHORITY.KEYID = 7
31,616,214 UART: [art] PUB.X = 397135886B7321A04E0507C0821BFEB296B0A9E5FF4C546D413240D672E46A0982587AF7EE7818B41B0883A165317BE7
31,623,473 UART: [art] PUB.Y = 836C9F2CFC5E75ADA8AD5D15AF1FF857DDE8BDACADF2CC39FFD32B4439A98080639952373B0BDA0727555021FAC9ED82
31,630,728 UART: [art] SIG.R = 679B9B18C292D99A6F47D88AFB78A1CFA9C4A663763997711F9AECD83DCE0097ADB68F7E8A5FF924A95192E615C2ADA7
31,638,078 UART: [art] SIG.S = 609CEFAB355311F3AA7B410516A4D8F5E667DC88BF202BB4C8225BEC38C410425157F981678C77BBAFAFD504F5991D74
32,943,429 UART: Caliptra RT
32,944,125 UART: [state] CFI Enabled
33,106,151 UART: [rt] RT listening for mailbox commands...
33,108,049 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,139,594 UART: [rt]cmd =0x4d454153, len=108
33,158,242 >>> mbox cmd response data (12 bytes)
33,158,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,189,399 UART: [rt]cmd =0x4d454153, len=108
33,207,698 >>> mbox cmd response data (12 bytes)
33,208,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,238,782 UART: [rt]cmd =0x4d454153, len=108
33,257,870 >>> mbox cmd response data (12 bytes)
33,258,294 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,288,755 UART: [rt]cmd =0x4d454153, len=108
33,307,300 >>> mbox cmd response data (12 bytes)
33,307,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,338,389 UART: [rt]cmd =0x4d454153, len=108
33,357,315 >>> mbox cmd response data (12 bytes)
33,357,733 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,388,222 UART: [rt]cmd =0x4d454153, len=108
33,406,975 >>> mbox cmd response data (12 bytes)
33,407,401 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,437,885 UART: [rt]cmd =0x4d454153, len=108
33,457,026 >>> mbox cmd response data (12 bytes)
33,457,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,488,132 UART: [rt]cmd =0x4d454153, len=108
33,506,745 >>> mbox cmd response data (12 bytes)
33,507,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,537,818 UART: [rt]cmd =0x4d454153, len=108
33,555,878 >>> mbox cmd response data (12 bytes)
33,556,306 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,586,952 UART: [rt]cmd =0x4d454153, len=108
33,605,595 >>> mbox cmd response data (12 bytes)
33,606,012 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,636,693 UART: [rt]cmd =0x4d454153, len=108
33,655,108 >>> mbox cmd response data (12 bytes)
33,655,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,686,059 UART: [rt]cmd =0x4d454153, len=108
33,704,237 >>> mbox cmd response data (12 bytes)
33,704,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,735,349 UART: [rt]cmd =0x4d454153, len=108
33,754,326 >>> mbox cmd response data (12 bytes)
33,754,741 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,785,225 UART: [rt]cmd =0x4d454153, len=108
33,803,538 >>> mbox cmd response data (12 bytes)
33,803,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,834,408 UART: [rt]cmd =0x4d454153, len=108
33,853,384 >>> mbox cmd response data (12 bytes)
33,853,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,884,540 UART: [rt]cmd =0x4d454153, len=108
33,886,761 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,564 UART:
192,935 UART: Running Caliptra ROM ...
194,134 UART:
603,769 UART: [state] CFI Enabled
618,569 UART: [state] LifecycleState = Unprovisioned
620,506 UART: [state] DebugLocked = No
621,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,358 UART: [kat] SHA2-256
796,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,682 UART: [kat] ++
807,159 UART: [kat] sha1
818,317 UART: [kat] SHA2-256
821,044 UART: [kat] SHA2-384
827,969 UART: [kat] SHA2-512-ACC
830,338 UART: [kat] ECC-384
3,117,664 UART: [kat] HMAC-384Kdf
3,128,902 UART: [kat] LMS
4,319,007 UART: [kat] --
4,322,774 UART: [cold-reset] ++
4,324,002 UART: [fht] Storing FHT @ 0x50003400
4,335,627 UART: [idev] ++
4,336,195 UART: [idev] CDI.KEYID = 6
4,337,111 UART: [idev] SUBJECT.KEYID = 7
4,338,377 UART: [idev] UDS.KEYID = 0
4,339,452 ready_for_fw is high
4,339,668 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,748 UART: [idev] Erasing UDS.KEYID = 0
7,625,646 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,030 UART: [idev] --
7,651,975 UART: [ldev] ++
7,652,553 UART: [ldev] CDI.KEYID = 6
7,653,488 UART: [ldev] SUBJECT.KEYID = 5
7,654,755 UART: [ldev] AUTHORITY.KEYID = 7
7,655,907 UART: [ldev] FE.KEYID = 1
7,668,416 UART: [ldev] Erasing FE.KEYID = 1
10,953,034 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,949 UART: [ldev] --
13,312,402 UART: [fwproc] Waiting for Commands...
13,315,251 UART: [fwproc] Received command 0x46574c44
13,317,486 UART: [fwproc] Received Image of size 113844 bytes
17,363,815 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,724 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,822,179 >>> mbox cmd response: success
17,825,681 UART: [afmc] ++
17,826,274 UART: [afmc] CDI.KEYID = 6
17,827,218 UART: [afmc] SUBJECT.KEYID = 7
17,828,435 UART: [afmc] AUTHORITY.KEYID = 5
21,144,475 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,436,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,438,597 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,452,989 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,467,822 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,482,270 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,503,147 UART: [afmc] --
23,507,291 UART: [cold-reset] --
23,512,335 UART: [state] Locking Datavault
23,515,860 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,614 UART: [state] Locking ICCM
23,518,954 UART: [exit] Launching FMC @ 0x40000130
23,527,310 UART:
23,527,545 UART: Running Caliptra FMC ...
23,528,648 UART:
23,528,810 UART: [state] CFI Enabled
23,537,014 UART: [fht] FMC Alias Private Key: 7
25,868,050 UART: [art] Extend RT PCRs Done
25,869,273 UART: [art] Lock RT PCRs Done
25,870,913 UART: [art] Populate DV Done
25,876,273 UART: [fht] FMC Alias Private Key: 7
25,877,758 UART: [art] Derive CDI
25,878,522 UART: [art] Store in in slot 0x4
25,921,283 UART: [art] Derive Key Pair
25,922,323 UART: [art] Store priv key in slot 0x5
29,164,212 UART: [art] Derive Key Pair - Done
29,177,188 UART: [art] Signing Cert with AUTHO
29,178,492 UART: RITY.KEYID = 7
31,457,967 UART: [art] Erasing AUTHORITY.KEYID = 7
31,459,501 UART: [art] PUB.X = 3F642A7FF4395C3238DE6A6B0600756E4FB457DFD81D4B429D01744B96F8874532C94359FDD0A30E75D699866BED58D9
31,466,715 UART: [art] PUB.Y = 129339F2164F77A5E7E1D2EB84821618E2687C53C9657678B1E914DAEBD018F755CED479A80B4E432FF11A781D56CEE6
31,473,966 UART: [art] SIG.R = D8DA4BC696EAB4E49B86650C8CA2A87F539DBA7E514F032F244ED71D078C251F794F0C9828951324E67582944CD09306
31,481,402 UART: [art] SIG.S = 635CEA413C4FAD0F1BAE490902A1D552035D5FA3DE7DB57ADF5329BD46B90D9ECDD1C6F1F398F3BB1D0DC0CF5455CA1E
32,786,576 UART: Caliptra RT
32,787,292 UART: [state] CFI Enabled
32,904,218 UART: [rt] RT listening for mailbox commands...
32,906,100 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,937,365 UART: [rt]cmd =0x4d454153, len=108
32,956,078 >>> mbox cmd response data (12 bytes)
32,956,625 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,987,326 UART: [rt]cmd =0x4d454153, len=108
33,006,481 >>> mbox cmd response data (12 bytes)
33,006,952 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,037,551 UART: [rt]cmd =0x4d454153, len=108
33,056,810 >>> mbox cmd response data (12 bytes)
33,057,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,088,002 UART: [rt]cmd =0x4d454153, len=108
33,106,814 >>> mbox cmd response data (12 bytes)
33,107,248 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,137,945 UART: [rt]cmd =0x4d454153, len=108
33,156,174 >>> mbox cmd response data (12 bytes)
33,156,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,187,201 UART: [rt]cmd =0x4d454153, len=108
33,205,141 >>> mbox cmd response data (12 bytes)
33,205,576 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,236,214 UART: [rt]cmd =0x4d454153, len=108
33,253,739 >>> mbox cmd response data (12 bytes)
33,254,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,285,116 UART: [rt]cmd =0x4d454153, len=108
33,304,421 >>> mbox cmd response data (12 bytes)
33,304,841 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,335,435 UART: [rt]cmd =0x4d454153, len=108
33,354,133 >>> mbox cmd response data (12 bytes)
33,354,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,385,093 UART: [rt]cmd =0x4d454153, len=108
33,403,598 >>> mbox cmd response data (12 bytes)
33,404,046 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,434,871 UART: [rt]cmd =0x4d454153, len=108
33,454,019 >>> mbox cmd response data (12 bytes)
33,454,440 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,484,981 UART: [rt]cmd =0x4d454153, len=108
33,503,450 >>> mbox cmd response data (12 bytes)
33,503,880 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,534,408 UART: [rt]cmd =0x4d454153, len=108
33,553,436 >>> mbox cmd response data (12 bytes)
33,553,857 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,584,349 UART: [rt]cmd =0x4d454153, len=108
33,602,984 >>> mbox cmd response data (12 bytes)
33,603,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,634,109 UART: [rt]cmd =0x4d454153, len=108
33,653,146 >>> mbox cmd response data (12 bytes)
33,653,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,684,191 UART: [rt]cmd =0x4d454153, len=108
33,686,377 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
4,125,694 ready_for_fw is high
4,126,095 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,605 >>> mbox cmd response: success
23,699,053 UART:
23,699,450 UART: Running Caliptra FMC ...
23,700,654 UART:
23,700,826 UART: [state] CFI Enabled
23,708,816 UART: [fht] FMC Alias Private Key: 7
26,040,167 UART: [art] Extend RT PCRs Done
26,041,397 UART: [art] Lock RT PCRs Done
26,043,211 UART: [art] Populate DV Done
26,048,742 UART: [fht] FMC Alias Private Key: 7
26,050,393 UART: [art] Derive CDI
26,051,211 UART: [art] Store in in slot 0x4
26,093,915 UART: [art] Derive Key Pair
26,094,919 UART: [art] Store priv key in slot 0x5
29,337,093 UART: [art] Derive Key Pair - Done
29,350,094 UART: [art] Signing Cert with AUTHO
29,351,423 UART: RITY.KEYID = 7
31,630,778 UART: [art] Erasing AUTHORITY.KEYID = 7
31,632,287 UART: [art] PUB.X = A47FD08B35490D8BCA3F5C0773362DCFD8C2ECE1192D8BF12953C54264FD36A0C1F5415A7BBFC89F05D0542B642F76E6
31,639,552 UART: [art] PUB.Y = C31653549595B46E7407AC82D2B22B29FB24D2A03FD2249154990257320ED88C94BA9182EDB0D836A1B60CADCC049709
31,646,806 UART: [art] SIG.R = 4A9C29A309CCD7C636E4C5701E59C9B0C85597625BDC8F9416371C381E7DE5A76DF077303EE2249F5A6A139C10D5032E
31,654,149 UART: [art] SIG.S = DFA38BBA75E17CD92E06DD89B00AC42EAECC65AC391299206F1B7D05A16F8DADA65A051E3A523C10B12DAADEBCEBBC94
32,959,083 UART: Caliptra RT
32,959,793 UART: [state] CFI Enabled
33,077,757 UART: [rt] RT listening for mailbox commands...
33,079,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,110,843 UART: [rt]cmd =0x4d454153, len=108
33,129,520 >>> mbox cmd response data (12 bytes)
33,130,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,160,691 UART: [rt]cmd =0x4d454153, len=108
33,179,167 >>> mbox cmd response data (12 bytes)
33,179,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,210,208 UART: [rt]cmd =0x4d454153, len=108
33,228,819 >>> mbox cmd response data (12 bytes)
33,229,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,259,932 UART: [rt]cmd =0x4d454153, len=108
33,278,670 >>> mbox cmd response data (12 bytes)
33,279,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,309,892 UART: [rt]cmd =0x4d454153, len=108
33,328,494 >>> mbox cmd response data (12 bytes)
33,328,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,359,545 UART: [rt]cmd =0x4d454153, len=108
33,377,960 >>> mbox cmd response data (12 bytes)
33,378,425 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,408,905 UART: [rt]cmd =0x4d454153, len=108
33,427,932 >>> mbox cmd response data (12 bytes)
33,428,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,458,897 UART: [rt]cmd =0x4d454153, len=108
33,477,095 >>> mbox cmd response data (12 bytes)
33,477,529 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,508,059 UART: [rt]cmd =0x4d454153, len=108
33,527,041 >>> mbox cmd response data (12 bytes)
33,527,459 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,557,999 UART: [rt]cmd =0x4d454153, len=108
33,576,578 >>> mbox cmd response data (12 bytes)
33,577,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,607,674 UART: [rt]cmd =0x4d454153, len=108
33,625,370 >>> mbox cmd response data (12 bytes)
33,625,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,656,472 UART: [rt]cmd =0x4d454153, len=108
33,675,077 >>> mbox cmd response data (12 bytes)
33,675,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,706,191 UART: [rt]cmd =0x4d454153, len=108
33,725,552 >>> mbox cmd response data (12 bytes)
33,725,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,756,742 UART: [rt]cmd =0x4d454153, len=108
33,775,185 >>> mbox cmd response data (12 bytes)
33,775,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,806,510 UART: [rt]cmd =0x4d454153, len=108
33,825,231 >>> mbox cmd response data (12 bytes)
33,825,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,856,249 UART: [rt]cmd =0x4d454153, len=108
33,858,787 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,979 UART:
192,353 UART: Running Caliptra ROM ...
193,502 UART:
193,653 UART: [state] CFI Enabled
265,152 UART: [state] LifecycleState = Unprovisioned
267,070 UART: [state] DebugLocked = No
268,703 UART: [state] WD Timer not started. Device not locked for debugging
271,598 UART: [kat] SHA2-256
450,728 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,335 UART: [kat] ++
462,874 UART: [kat] sha1
473,970 UART: [kat] SHA2-256
476,976 UART: [kat] SHA2-384
483,151 UART: [kat] SHA2-512-ACC
486,059 UART: [kat] ECC-384
2,950,385 UART: [kat] HMAC-384Kdf
2,973,213 UART: [kat] LMS
3,502,611 UART: [kat] --
3,507,388 UART: [cold-reset] ++
3,509,820 UART: [fht] FHT @ 0x50003400
3,520,733 UART: [idev] ++
3,521,295 UART: [idev] CDI.KEYID = 6
3,522,279 UART: [idev] SUBJECT.KEYID = 7
3,523,457 UART: [idev] UDS.KEYID = 0
3,524,383 ready_for_fw is high
3,524,575 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,546 UART: [idev] Erasing UDS.KEYID = 0
6,029,007 UART: [idev] Sha1 KeyId Algorithm
6,052,236 UART: [idev] --
6,055,782 UART: [ldev] ++
6,056,384 UART: [ldev] CDI.KEYID = 6
6,057,301 UART: [ldev] SUBJECT.KEYID = 5
6,058,465 UART: [ldev] AUTHORITY.KEYID = 7
6,059,699 UART: [ldev] FE.KEYID = 1
6,100,754 UART: [ldev] Erasing FE.KEYID = 1
8,605,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,336 UART: [ldev] --
10,416,143 UART: [fwproc] Wait for Commands...
10,419,049 UART: [fwproc] Recv command 0x46574c44
10,421,143 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,625 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,286,135 >>> mbox cmd response: success
14,289,707 UART: [afmc] ++
14,290,298 UART: [afmc] CDI.KEYID = 6
14,291,367 UART: [afmc] SUBJECT.KEYID = 7
14,292,474 UART: [afmc] AUTHORITY.KEYID = 5
16,828,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,222 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,981 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,997 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,900 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,581 UART: [afmc] --
18,628,630 UART: [cold-reset] --
18,633,631 UART: [state] Locking Datavault
18,639,797 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,467 UART: [state] Locking ICCM
18,643,672 UART: [exit] Launching FMC @ 0x40000130
18,652,074 UART:
18,652,311 UART: Running Caliptra FMC ...
18,653,414 UART:
18,653,577 UART: [state] CFI Enabled
18,712,099 UART: [fht] FMC Alias Private Key: 7
20,475,680 UART: [art] Extend RT PCRs Done
20,476,894 UART: [art] Lock RT PCRs Done
20,478,796 UART: [art] Populate DV Done
20,484,372 UART: [fht] FMC Alias Private Key: 7
20,485,868 UART: [art] Derive CDI
20,486,616 UART: [art] Store in in slot 0x4
20,545,047 UART: [art] Derive Key Pair
20,546,111 UART: [art] Store priv key in slot 0x5
23,009,107 UART: [art] Derive Key Pair - Done
23,022,074 UART: [art] Signing Cert with AUTHO
23,023,386 UART: RITY.KEYID = 7
24,735,344 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,844 UART: [art] PUB.X = B4CD6B623E03FB40143D5DD3C84890F0517114C8A9A1053D9A128234874228FB6D4DA4D71D22BC21AC07C18700B8186F
24,744,101 UART: [art] PUB.Y = E1374770F2CF9915147891A26B27D842ECCE1A6A274646389CC830E8D17CF2BDBA51819B0B878B46332E21BAF7E079DE
24,751,353 UART: [art] SIG.R = 2C3E1938CFCF9518B3A6D1AFB80755AA07350443F001FE2E7855951736C046B2441C0CED3D1D6DBE0EAD1BDAB7FBDDD0
24,758,729 UART: [art] SIG.S = 9EA410F1CBAAC97433DF5940E125BC96D0BA193991D80F8D93759E1597B7FBFA3CFCFD3E20A2BEB8FFEA7068E41E53FC
25,737,925 UART: Caliptra RT
25,738,626 UART: [state] CFI Enabled
25,904,094 UART: [rt] RT listening for mailbox commands...
25,905,993 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,937,393 UART: [rt]cmd =0x4d454153, len=108
25,956,550 >>> mbox cmd response data (12 bytes)
25,957,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,987,773 UART: [rt]cmd =0x4d454153, len=108
26,007,174 >>> mbox cmd response data (12 bytes)
26,007,650 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,038,350 UART: [rt]cmd =0x4d454153, len=108
26,056,487 >>> mbox cmd response data (12 bytes)
26,056,957 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,087,873 UART: [rt]cmd =0x4d454153, len=108
26,106,212 >>> mbox cmd response data (12 bytes)
26,106,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,137,280 UART: [rt]cmd =0x4d454153, len=108
26,155,424 >>> mbox cmd response data (12 bytes)
26,155,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,186,762 UART: [rt]cmd =0x4d454153, len=108
26,205,686 >>> mbox cmd response data (12 bytes)
26,206,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,236,730 UART: [rt]cmd =0x4d454153, len=108
26,255,705 >>> mbox cmd response data (12 bytes)
26,256,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,286,967 UART: [rt]cmd =0x4d454153, len=108
26,306,301 >>> mbox cmd response data (12 bytes)
26,306,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,337,255 UART: [rt]cmd =0x4d454153, len=108
26,356,279 >>> mbox cmd response data (12 bytes)
26,356,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,387,229 UART: [rt]cmd =0x4d454153, len=108
26,406,347 >>> mbox cmd response data (12 bytes)
26,406,778 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,437,577 UART: [rt]cmd =0x4d454153, len=108
26,456,152 >>> mbox cmd response data (12 bytes)
26,456,645 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,487,293 UART: [rt]cmd =0x4d454153, len=108
26,505,312 >>> mbox cmd response data (12 bytes)
26,505,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,438 UART: [rt]cmd =0x4d454153, len=108
26,554,936 >>> mbox cmd response data (12 bytes)
26,555,373 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,586,122 UART: [rt]cmd =0x4d454153, len=108
26,604,845 >>> mbox cmd response data (12 bytes)
26,605,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,636,021 UART: [rt]cmd =0x4d454153, len=108
26,654,796 >>> mbox cmd response data (12 bytes)
26,655,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,685,598 UART: [rt]cmd =0x4d454153, len=108
26,687,751 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,363,780 ready_for_fw is high
3,364,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,043,247 >>> mbox cmd response: success
18,324,138 UART:
18,324,531 UART: Running Caliptra FMC ...
18,325,730 UART:
18,325,906 UART: [state] CFI Enabled
18,393,048 UART: [fht] FMC Alias Private Key: 7
20,157,117 UART: [art] Extend RT PCRs Done
20,158,382 UART: [art] Lock RT PCRs Done
20,159,991 UART: [art] Populate DV Done
20,165,567 UART: [fht] FMC Alias Private Key: 7
20,167,280 UART: [art] Derive CDI
20,168,100 UART: [art] Store in in slot 0x4
20,226,404 UART: [art] Derive Key Pair
20,227,474 UART: [art] Store priv key in slot 0x5
22,690,499 UART: [art] Derive Key Pair - Done
22,703,132 UART: [art] Signing Cert with AUTHO
22,704,444 UART: RITY.KEYID = 7
24,415,966 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,480 UART: [art] PUB.X = C42730FE819FA4FCD09AAEC1C36B8FEFB8DBE5B1935CD77914028D72A35A1143FE5B534471870ECDB35D0A3AB0E0A8B9
24,424,722 UART: [art] PUB.Y = 1D7C719E0D2FABFB81D20FC8049B755E791DED86B635F38FA9AD7BB391798A231667F28945240F56F9AA93CF7CE625EC
24,431,991 UART: [art] SIG.R = 98444DADBAC0652DB60D6B0B09CCD4C98CEDBD722B7898486ACF00B40E30AFA01CC42E1DD8A9469C6E197B0A784EB0CD
24,439,432 UART: [art] SIG.S = A641CC0B7299F3799AAF42388F25ABAC543F6EAA54D35C0C9896ED1F0F42BF1485671E9F74491933BE44761DEAACE5EB
25,418,499 UART: Caliptra RT
25,419,200 UART: [state] CFI Enabled
25,584,816 UART: [rt] RT listening for mailbox commands...
25,586,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,618,158 UART: [rt]cmd =0x4d454153, len=108
25,636,848 >>> mbox cmd response data (12 bytes)
25,637,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,668,104 UART: [rt]cmd =0x4d454153, len=108
25,686,665 >>> mbox cmd response data (12 bytes)
25,687,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,717,771 UART: [rt]cmd =0x4d454153, len=108
25,736,350 >>> mbox cmd response data (12 bytes)
25,736,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,767,590 UART: [rt]cmd =0x4d454153, len=108
25,786,059 >>> mbox cmd response data (12 bytes)
25,786,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,817,426 UART: [rt]cmd =0x4d454153, len=108
25,836,610 >>> mbox cmd response data (12 bytes)
25,837,050 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,867,854 UART: [rt]cmd =0x4d454153, len=108
25,886,982 >>> mbox cmd response data (12 bytes)
25,887,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,917,967 UART: [rt]cmd =0x4d454153, len=108
25,937,183 >>> mbox cmd response data (12 bytes)
25,937,607 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,968,163 UART: [rt]cmd =0x4d454153, len=108
25,987,717 >>> mbox cmd response data (12 bytes)
25,988,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,018,789 UART: [rt]cmd =0x4d454153, len=108
26,037,679 >>> mbox cmd response data (12 bytes)
26,038,145 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,068,787 UART: [rt]cmd =0x4d454153, len=108
26,087,662 >>> mbox cmd response data (12 bytes)
26,088,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,118,631 UART: [rt]cmd =0x4d454153, len=108
26,136,892 >>> mbox cmd response data (12 bytes)
26,137,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,167,686 UART: [rt]cmd =0x4d454153, len=108
26,186,503 >>> mbox cmd response data (12 bytes)
26,186,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,217,487 UART: [rt]cmd =0x4d454153, len=108
26,235,852 >>> mbox cmd response data (12 bytes)
26,236,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,266,980 UART: [rt]cmd =0x4d454153, len=108
26,285,589 >>> mbox cmd response data (12 bytes)
26,286,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,316,781 UART: [rt]cmd =0x4d454153, len=108
26,335,549 >>> mbox cmd response data (12 bytes)
26,335,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,366,242 UART: [rt]cmd =0x4d454153, len=108
26,368,451 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
193,009 UART:
193,401 UART: Running Caliptra ROM ...
194,562 UART:
604,202 UART: [state] CFI Enabled
616,801 UART: [state] LifecycleState = Unprovisioned
618,801 UART: [state] DebugLocked = No
620,391 UART: [state] WD Timer not started. Device not locked for debugging
624,370 UART: [kat] SHA2-256
803,489 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,057 UART: [kat] ++
815,525 UART: [kat] sha1
825,548 UART: [kat] SHA2-256
828,624 UART: [kat] SHA2-384
833,901 UART: [kat] SHA2-512-ACC
836,904 UART: [kat] ECC-384
3,280,096 UART: [kat] HMAC-384Kdf
3,293,741 UART: [kat] LMS
3,823,198 UART: [kat] --
3,828,616 UART: [cold-reset] ++
3,829,919 UART: [fht] FHT @ 0x50003400
3,840,780 UART: [idev] ++
3,841,343 UART: [idev] CDI.KEYID = 6
3,842,378 UART: [idev] SUBJECT.KEYID = 7
3,843,480 UART: [idev] UDS.KEYID = 0
3,844,378 ready_for_fw is high
3,844,604 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,839 UART: [idev] Erasing UDS.KEYID = 0
6,317,604 UART: [idev] Sha1 KeyId Algorithm
6,341,916 UART: [idev] --
6,345,963 UART: [ldev] ++
6,346,540 UART: [ldev] CDI.KEYID = 6
6,347,449 UART: [ldev] SUBJECT.KEYID = 5
6,348,607 UART: [ldev] AUTHORITY.KEYID = 7
6,349,839 UART: [ldev] FE.KEYID = 1
6,359,295 UART: [ldev] Erasing FE.KEYID = 1
8,833,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,552 UART: [ldev] --
10,625,791 UART: [fwproc] Wait for Commands...
10,628,016 UART: [fwproc] Recv command 0x46574c44
10,630,110 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,173,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,491,620 >>> mbox cmd response: success
14,495,397 UART: [afmc] ++
14,495,998 UART: [afmc] CDI.KEYID = 6
14,496,913 UART: [afmc] SUBJECT.KEYID = 7
14,498,072 UART: [afmc] AUTHORITY.KEYID = 5
16,999,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,282 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,079 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,995 UART: [afmc] --
18,796,707 UART: [cold-reset] --
18,800,786 UART: [state] Locking Datavault
18,804,527 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,172 UART: [state] Locking ICCM
18,808,539 UART: [exit] Launching FMC @ 0x40000130
18,816,930 UART:
18,817,169 UART: Running Caliptra FMC ...
18,818,268 UART:
18,818,431 UART: [state] CFI Enabled
18,826,857 UART: [fht] FMC Alias Private Key: 7
20,584,428 UART: [art] Extend RT PCRs Done
20,585,652 UART: [art] Lock RT PCRs Done
20,587,110 UART: [art] Populate DV Done
20,592,525 UART: [fht] FMC Alias Private Key: 7
20,594,007 UART: [art] Derive CDI
20,594,849 UART: [art] Store in in slot 0x4
20,637,231 UART: [art] Derive Key Pair
20,638,275 UART: [art] Store priv key in slot 0x5
23,065,427 UART: [art] Derive Key Pair - Done
23,078,274 UART: [art] Signing Cert with AUTHO
23,079,579 UART: RITY.KEYID = 7
24,784,698 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,220 UART: [art] PUB.X = FCF8FA688965C78CC0F084B2E1A24B3F06111A2E79E984A6D0D299D22A222449BA9B50FD6924A2C8EEEF8E7A3BC645AD
24,793,480 UART: [art] PUB.Y = 530CE6A3CEAADA898CB378EE99C38742F4A446AB730AE510E7207ADB1819B4D1B1BD73F7554A2B3954476E64736D7B14
24,800,782 UART: [art] SIG.R = 67A91DE31F1E43D57F510509EE1F4972A1FE49151864270A2C63698845E5E335FCDFC03E193B27CDFBA35F16B1BEE48A
24,808,189 UART: [art] SIG.S = B0B424A1DB1AE27D8F2E88D5E140248965C57725AE998A4DB1EDC55651CC669399C1A2AECD8C3503F7CE102485713002
25,787,280 UART: Caliptra RT
25,787,984 UART: [state] CFI Enabled
25,904,087 UART: [rt] RT listening for mailbox commands...
25,905,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,937,217 UART: [rt]cmd =0x4d454153, len=108
25,956,291 >>> mbox cmd response data (12 bytes)
25,956,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,987,666 UART: [rt]cmd =0x4d454153, len=108
26,005,488 >>> mbox cmd response data (12 bytes)
26,005,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,036,646 UART: [rt]cmd =0x4d454153, len=108
26,053,959 >>> mbox cmd response data (12 bytes)
26,054,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,084,876 UART: [rt]cmd =0x4d454153, len=108
26,104,111 >>> mbox cmd response data (12 bytes)
26,104,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,135,192 UART: [rt]cmd =0x4d454153, len=108
26,153,258 >>> mbox cmd response data (12 bytes)
26,153,718 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,184,150 UART: [rt]cmd =0x4d454153, len=108
26,202,702 >>> mbox cmd response data (12 bytes)
26,203,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,233,733 UART: [rt]cmd =0x4d454153, len=108
26,252,689 >>> mbox cmd response data (12 bytes)
26,253,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,283,713 UART: [rt]cmd =0x4d454153, len=108
26,302,623 >>> mbox cmd response data (12 bytes)
26,303,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,333,651 UART: [rt]cmd =0x4d454153, len=108
26,351,719 >>> mbox cmd response data (12 bytes)
26,352,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,382,742 UART: [rt]cmd =0x4d454153, len=108
26,401,544 >>> mbox cmd response data (12 bytes)
26,401,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,432,564 UART: [rt]cmd =0x4d454153, len=108
26,452,186 >>> mbox cmd response data (12 bytes)
26,452,596 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,483,156 UART: [rt]cmd =0x4d454153, len=108
26,501,199 >>> mbox cmd response data (12 bytes)
26,501,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,532,432 UART: [rt]cmd =0x4d454153, len=108
26,550,936 >>> mbox cmd response data (12 bytes)
26,551,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,582,089 UART: [rt]cmd =0x4d454153, len=108
26,601,455 >>> mbox cmd response data (12 bytes)
26,601,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,632,461 UART: [rt]cmd =0x4d454153, len=108
26,651,100 >>> mbox cmd response data (12 bytes)
26,651,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,682,069 UART: [rt]cmd =0x4d454153, len=108
26,684,503 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,839 writing to cptra_bootfsm_go
3,696,141 ready_for_fw is high
3,696,543 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,264,205 >>> mbox cmd response: success
18,515,213 UART:
18,515,604 UART: Running Caliptra FMC ...
18,516,782 UART:
18,516,953 UART: [state] CFI Enabled
18,524,846 UART: [fht] FMC Alias Private Key: 7
20,281,432 UART: [art] Extend RT PCRs Done
20,282,646 UART: [art] Lock RT PCRs Done
20,284,278 UART: [art] Populate DV Done
20,289,251 UART: [fht] FMC Alias Private Key: 7
20,290,737 UART: [art] Derive CDI
20,291,501 UART: [art] Store in in slot 0x4
20,334,208 UART: [art] Derive Key Pair
20,335,252 UART: [art] Store priv key in slot 0x5
22,762,223 UART: [art] Derive Key Pair - Done
22,775,243 UART: [art] Signing Cert with AUTHO
22,776,547 UART: RITY.KEYID = 7
24,481,878 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,386 UART: [art] PUB.X = 8B60630F37BDB87464621BE1993ECAE9270C84701CE1C1017E3B9B808A6ABAFDA35FB42857D1F6B357155F810B33B733
24,490,685 UART: [art] PUB.Y = 8959581388EE9E11676109DD351D6A6D45D76310777D2CDE10ABFC895B504DE508A85C24DF6490A81CF22CCE8B9568AF
24,497,919 UART: [art] SIG.R = BA07CE879407E850A3EC8E2A0D7BDEE1F98E338A18F7B09913667824D4D5F06BA8F87D7944B0DD09AC5F6D43020B2F20
24,505,332 UART: [art] SIG.S = 4A69136EC85A152BA047B35950F9B237AA44646F6B98990311EA71A12319A5090CCF2FD5B1AC3506AC4541817AB490A9
25,484,306 UART: Caliptra RT
25,485,021 UART: [state] CFI Enabled
25,603,165 UART: [rt] RT listening for mailbox commands...
25,605,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,636,390 UART: [rt]cmd =0x4d454153, len=108
25,654,880 >>> mbox cmd response data (12 bytes)
25,655,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,685,752 UART: [rt]cmd =0x4d454153, len=108
25,704,637 >>> mbox cmd response data (12 bytes)
25,705,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,735,884 UART: [rt]cmd =0x4d454153, len=108
25,754,441 >>> mbox cmd response data (12 bytes)
25,754,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,785,312 UART: [rt]cmd =0x4d454153, len=108
25,803,809 >>> mbox cmd response data (12 bytes)
25,804,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,835,011 UART: [rt]cmd =0x4d454153, len=108
25,853,361 >>> mbox cmd response data (12 bytes)
25,853,825 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,884,470 UART: [rt]cmd =0x4d454153, len=108
25,903,078 >>> mbox cmd response data (12 bytes)
25,903,500 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,934,049 UART: [rt]cmd =0x4d454153, len=108
25,952,845 >>> mbox cmd response data (12 bytes)
25,953,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,984,207 UART: [rt]cmd =0x4d454153, len=108
26,002,647 >>> mbox cmd response data (12 bytes)
26,003,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,033,843 UART: [rt]cmd =0x4d454153, len=108
26,052,214 >>> mbox cmd response data (12 bytes)
26,052,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,083,124 UART: [rt]cmd =0x4d454153, len=108
26,101,847 >>> mbox cmd response data (12 bytes)
26,102,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,132,848 UART: [rt]cmd =0x4d454153, len=108
26,152,262 >>> mbox cmd response data (12 bytes)
26,152,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,183,116 UART: [rt]cmd =0x4d454153, len=108
26,201,695 >>> mbox cmd response data (12 bytes)
26,202,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,232,899 UART: [rt]cmd =0x4d454153, len=108
26,252,180 >>> mbox cmd response data (12 bytes)
26,252,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,283,125 UART: [rt]cmd =0x4d454153, len=108
26,301,621 >>> mbox cmd response data (12 bytes)
26,302,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,332,606 UART: [rt]cmd =0x4d454153, len=108
26,351,841 >>> mbox cmd response data (12 bytes)
26,352,271 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,382,965 UART: [rt]cmd =0x4d454153, len=108
26,385,405 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,239 UART:
192,615 UART: Running Caliptra ROM ...
193,801 UART:
193,958 UART: [state] CFI Enabled
261,501 UART: [state] LifecycleState = Unprovisioned
263,861 UART: [state] DebugLocked = No
265,825 UART: [state] WD Timer not started. Device not locked for debugging
269,794 UART: [kat] SHA2-256
459,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,469 UART: [kat] ++
470,914 UART: [kat] sha1
482,516 UART: [kat] SHA2-256
485,508 UART: [kat] SHA2-384
492,002 UART: [kat] SHA2-512-ACC
494,617 UART: [kat] ECC-384
2,947,667 UART: [kat] HMAC-384Kdf
2,970,617 UART: [kat] LMS
3,502,383 UART: [kat] --
3,507,750 UART: [cold-reset] ++
3,510,372 UART: [fht] FHT @ 0x50003400
3,521,741 UART: [idev] ++
3,522,424 UART: [idev] CDI.KEYID = 6
3,523,345 UART: [idev] SUBJECT.KEYID = 7
3,524,523 UART: [idev] UDS.KEYID = 0
3,525,448 ready_for_fw is high
3,525,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,175 UART: [idev] Erasing UDS.KEYID = 0
6,026,580 UART: [idev] Sha1 KeyId Algorithm
6,047,980 UART: [idev] --
6,051,382 UART: [ldev] ++
6,052,093 UART: [ldev] CDI.KEYID = 6
6,052,987 UART: [ldev] SUBJECT.KEYID = 5
6,054,151 UART: [ldev] AUTHORITY.KEYID = 7
6,055,333 UART: [ldev] FE.KEYID = 1
6,099,120 UART: [ldev] Erasing FE.KEYID = 1
8,606,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,203 UART: [ldev] --
10,412,639 UART: [fwproc] Wait for Commands...
10,414,359 UART: [fwproc] Recv command 0x46574c44
10,416,617 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,078 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,589,960 >>> mbox cmd response: success
14,594,229 UART: [afmc] ++
14,594,936 UART: [afmc] CDI.KEYID = 6
14,596,108 UART: [afmc] SUBJECT.KEYID = 7
14,597,604 UART: [afmc] AUTHORITY.KEYID = 5
17,127,786 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,768 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,870 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,912 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,431 UART: [afmc] --
18,946,399 UART: [cold-reset] --
18,951,079 UART: [state] Locking Datavault
18,957,592 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,809 UART: [state] Locking ICCM
18,962,141 UART: [exit] Launching FMC @ 0x40000130
18,970,839 UART:
18,971,083 UART: Running Caliptra FMC ...
18,972,190 UART:
18,972,350 UART: [state] CFI Enabled
19,025,354 UART: [fht] FMC Alias Private Key: 7
20,788,732 UART: [art] Extend RT PCRs Done
20,789,964 UART: [art] Lock RT PCRs Done
20,791,998 UART: [art] Populate DV Done
20,797,414 UART: [fht] FMC Alias Private Key: 7
20,799,155 UART: [art] Derive CDI
20,799,899 UART: [art] Store in in slot 0x4
20,857,861 UART: [art] Derive Key Pair
20,858,859 UART: [art] Store priv key in slot 0x5
23,321,627 UART: [art] Derive Key Pair - Done
23,334,208 UART: [art] Signing Cert with AUTHO
23,335,520 UART: RITY.KEYID = 7
25,048,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,050,122 UART: [art] PUB.X = 6D3C60B82D1FEAB35C63DE8A225B2C5950A3D4963DAD12ED209F393AE57EAE06AE844CC3C21DD486DFB3764569294DF4
25,057,389 UART: [art] PUB.Y = 3645C7F1CCB555AF2F49D3FD07B4F4526301F27EEF7D17C6BCB4A7C939E8479583C8A435EB5D4B6741CD41D797F8FB5F
25,064,698 UART: [art] SIG.R = EF51F9EE603FEA22B17F4786ACDA59365582A8700A66B48AD9E9786CC3D5B33FDFD4BAD3E99798FB5F06B2C361DDD4F2
25,072,131 UART: [art] SIG.S = 36F066AF105327425DE55C54C3AC066A1234FC91F7303BD96CF80F6F70D417404FB5E90D51AB9D05EA154157E1103AEF
26,050,881 UART: Caliptra RT
26,051,577 UART: [state] CFI Enabled
26,216,318 UART: [rt] RT listening for mailbox commands...
26,218,204 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,249,245 UART: [rt]cmd =0x4d454153, len=108
26,267,382 >>> mbox cmd response data (12 bytes)
26,267,923 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,298,791 UART: [rt]cmd =0x4d454153, len=108
26,317,737 >>> mbox cmd response data (12 bytes)
26,318,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,348,826 UART: [rt]cmd =0x4d454153, len=108
26,367,218 >>> mbox cmd response data (12 bytes)
26,367,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,398,134 UART: [rt]cmd =0x4d454153, len=108
26,417,267 >>> mbox cmd response data (12 bytes)
26,417,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,448,397 UART: [rt]cmd =0x4d454153, len=108
26,466,833 >>> mbox cmd response data (12 bytes)
26,467,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,498,044 UART: [rt]cmd =0x4d454153, len=108
26,515,977 >>> mbox cmd response data (12 bytes)
26,516,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,547,038 UART: [rt]cmd =0x4d454153, len=108
26,565,003 >>> mbox cmd response data (12 bytes)
26,565,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,596,296 UART: [rt]cmd =0x4d454153, len=108
26,614,477 >>> mbox cmd response data (12 bytes)
26,614,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,645,706 UART: [rt]cmd =0x4d454153, len=108
26,663,637 >>> mbox cmd response data (12 bytes)
26,664,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,694,700 UART: [rt]cmd =0x4d454153, len=108
26,712,812 >>> mbox cmd response data (12 bytes)
26,713,223 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,743,925 UART: [rt]cmd =0x4d454153, len=108
26,762,184 >>> mbox cmd response data (12 bytes)
26,762,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,793,255 UART: [rt]cmd =0x4d454153, len=108
26,812,104 >>> mbox cmd response data (12 bytes)
26,812,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,843,165 UART: [rt]cmd =0x4d454153, len=108
26,862,110 >>> mbox cmd response data (12 bytes)
26,862,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,892,956 UART: [rt]cmd =0x4d454153, len=108
26,911,321 >>> mbox cmd response data (12 bytes)
26,911,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,942,277 UART: [rt]cmd =0x4d454153, len=108
26,961,213 >>> mbox cmd response data (12 bytes)
26,961,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,992,151 UART: [rt]cmd =0x4d454153, len=108
26,994,482 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,437,039 ready_for_fw is high
3,437,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,741,774 >>> mbox cmd response: success
19,023,023 UART:
19,023,423 UART: Running Caliptra FMC ...
19,024,619 UART:
19,024,789 UART: [state] CFI Enabled
19,093,455 UART: [fht] FMC Alias Private Key: 7
20,857,627 UART: [art] Extend RT PCRs Done
20,858,840 UART: [art] Lock RT PCRs Done
20,860,489 UART: [art] Populate DV Done
20,865,630 UART: [fht] FMC Alias Private Key: 7
20,867,277 UART: [art] Derive CDI
20,868,013 UART: [art] Store in in slot 0x4
20,917,544 UART: [art] Derive Key Pair
20,918,587 UART: [art] Store priv key in slot 0x5
23,381,274 UART: [art] Derive Key Pair - Done
23,394,118 UART: [art] Signing Cert with AUTHO
23,395,430 UART: RITY.KEYID = 7
25,107,520 UART: [art] Erasing AUTHORITY.KEYID = 7
25,109,014 UART: [art] PUB.X = AAAF377251BA4B6CE803E89F4893CCF9D07673526990546DC6095C193A6782EDF3E5B7ADC7AC0AAE8E546E0FAAE9FAF6
25,116,252 UART: [art] PUB.Y = C6A48DB8EDE125285C25215965ED408C8F18CCC1F7152D024EA456303C74729D3AB06EA689FA3D5F0215AF179CC6C881
25,123,579 UART: [art] SIG.R = F434FC77C3515FBA03A45505F808AB5EAD9121C49FE2A59E24C0A245C0FD5F3219AF4DF004CE6F16D85D646B49701290
25,130,995 UART: [art] SIG.S = 60038CB7D86BA7AE90108C3DD52E45B8AF659F4EC5973C9ACAF48D4446D7EC73036AA9CC7C6E441D2CFBF69D1221D0C3
26,109,842 UART: Caliptra RT
26,110,532 UART: [state] CFI Enabled
26,274,568 UART: [rt] RT listening for mailbox commands...
26,276,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,307,882 UART: [rt]cmd =0x4d454153, len=108
26,326,067 >>> mbox cmd response data (12 bytes)
26,326,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,357,306 UART: [rt]cmd =0x4d454153, len=108
26,375,538 >>> mbox cmd response data (12 bytes)
26,375,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,406,523 UART: [rt]cmd =0x4d454153, len=108
26,425,217 >>> mbox cmd response data (12 bytes)
26,425,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,456,514 UART: [rt]cmd =0x4d454153, len=108
26,475,127 >>> mbox cmd response data (12 bytes)
26,475,578 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,506,185 UART: [rt]cmd =0x4d454153, len=108
26,525,044 >>> mbox cmd response data (12 bytes)
26,525,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,556,225 UART: [rt]cmd =0x4d454153, len=108
26,575,324 >>> mbox cmd response data (12 bytes)
26,575,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,606,371 UART: [rt]cmd =0x4d454153, len=108
26,624,809 >>> mbox cmd response data (12 bytes)
26,625,215 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,655,854 UART: [rt]cmd =0x4d454153, len=108
26,674,163 >>> mbox cmd response data (12 bytes)
26,674,590 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,705,119 UART: [rt]cmd =0x4d454153, len=108
26,723,507 >>> mbox cmd response data (12 bytes)
26,723,963 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,754,515 UART: [rt]cmd =0x4d454153, len=108
26,773,018 >>> mbox cmd response data (12 bytes)
26,773,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,804,031 UART: [rt]cmd =0x4d454153, len=108
26,822,823 >>> mbox cmd response data (12 bytes)
26,823,255 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,853,889 UART: [rt]cmd =0x4d454153, len=108
26,872,593 >>> mbox cmd response data (12 bytes)
26,873,008 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,903,525 UART: [rt]cmd =0x4d454153, len=108
26,922,267 >>> mbox cmd response data (12 bytes)
26,922,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,953,339 UART: [rt]cmd =0x4d454153, len=108
26,971,670 >>> mbox cmd response data (12 bytes)
26,972,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,002,767 UART: [rt]cmd =0x4d454153, len=108
27,021,666 >>> mbox cmd response data (12 bytes)
27,022,083 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,052,792 UART: [rt]cmd =0x4d454153, len=108
27,054,998 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,721 writing to cptra_bootfsm_go
192,865 UART:
193,240 UART: Running Caliptra ROM ...
194,337 UART:
603,865 UART: [state] CFI Enabled
617,897 UART: [state] LifecycleState = Unprovisioned
620,297 UART: [state] DebugLocked = No
621,685 UART: [state] WD Timer not started. Device not locked for debugging
626,009 UART: [kat] SHA2-256
815,907 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,637 UART: [kat] ++
827,186 UART: [kat] sha1
839,482 UART: [kat] SHA2-256
842,570 UART: [kat] SHA2-384
848,279 UART: [kat] SHA2-512-ACC
850,858 UART: [kat] ECC-384
3,295,670 UART: [kat] HMAC-384Kdf
3,308,280 UART: [kat] LMS
3,840,089 UART: [kat] --
3,845,389 UART: [cold-reset] ++
3,846,472 UART: [fht] FHT @ 0x50003400
3,857,883 UART: [idev] ++
3,858,585 UART: [idev] CDI.KEYID = 6
3,859,614 UART: [idev] SUBJECT.KEYID = 7
3,860,716 UART: [idev] UDS.KEYID = 0
3,861,659 ready_for_fw is high
3,862,094 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,471 UART: [idev] Erasing UDS.KEYID = 0
6,340,654 UART: [idev] Sha1 KeyId Algorithm
6,362,990 UART: [idev] --
6,367,629 UART: [ldev] ++
6,368,303 UART: [ldev] CDI.KEYID = 6
6,369,214 UART: [ldev] SUBJECT.KEYID = 5
6,370,374 UART: [ldev] AUTHORITY.KEYID = 7
6,371,603 UART: [ldev] FE.KEYID = 1
6,383,921 UART: [ldev] Erasing FE.KEYID = 1
8,864,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,044 UART: [ldev] --
10,652,292 UART: [fwproc] Wait for Commands...
10,655,431 UART: [fwproc] Recv command 0x46574c44
10,657,685 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,052 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,326 >>> mbox cmd response: success
14,846,096 UART: [afmc] ++
14,846,801 UART: [afmc] CDI.KEYID = 6
14,847,985 UART: [afmc] SUBJECT.KEYID = 7
14,849,470 UART: [afmc] AUTHORITY.KEYID = 5
17,351,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,918 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,313 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,553 UART: [afmc] --
19,151,244 UART: [cold-reset] --
19,154,850 UART: [state] Locking Datavault
19,162,104 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,297 UART: [state] Locking ICCM
19,167,096 UART: [exit] Launching FMC @ 0x40000130
19,175,725 UART:
19,175,958 UART: Running Caliptra FMC ...
19,177,058 UART:
19,177,221 UART: [state] CFI Enabled
19,185,538 UART: [fht] FMC Alias Private Key: 7
20,942,262 UART: [art] Extend RT PCRs Done
20,943,482 UART: [art] Lock RT PCRs Done
20,945,324 UART: [art] Populate DV Done
20,951,056 UART: [fht] FMC Alias Private Key: 7
20,952,816 UART: [art] Derive CDI
20,953,652 UART: [art] Store in in slot 0x4
20,995,864 UART: [art] Derive Key Pair
20,996,904 UART: [art] Store priv key in slot 0x5
23,423,749 UART: [art] Derive Key Pair - Done
23,436,844 UART: [art] Signing Cert with AUTHO
23,438,142 UART: RITY.KEYID = 7
25,143,376 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,877 UART: [art] PUB.X = 4B9943147AA3BE8296C491A1309AE5FAF86D628723E8C8BA727BAA146EF7C296EF8B23CDB9CD15A2F9A3D29369733619
25,152,130 UART: [art] PUB.Y = 91A283618CEE3305F352A2F852943884FDD17EEF3CEB11F4217C3F25727C8A29C4BF8C5DB87955F9BD02079E9EBFCD7B
25,159,418 UART: [art] SIG.R = 99746468925E7CB461502CD02D7E6E764E32CD693411F3E44CA9D9F2B3C03B9DD476F170BFE092C63CE869DDDC7278A6
25,166,816 UART: [art] SIG.S = 0A097F45C47CEAA21646F282FDEAB214E37D47149AFE5963DB0E0A9D8985283A4633CE3D6EA87678E6B9396C835BB8F0
26,145,932 UART: Caliptra RT
26,146,616 UART: [state] CFI Enabled
26,264,766 UART: [rt] RT listening for mailbox commands...
26,266,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,297,818 UART: [rt]cmd =0x4d454153, len=108
26,316,458 >>> mbox cmd response data (12 bytes)
26,316,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,347,682 UART: [rt]cmd =0x4d454153, len=108
26,366,273 >>> mbox cmd response data (12 bytes)
26,366,719 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,397,254 UART: [rt]cmd =0x4d454153, len=108
26,415,854 >>> mbox cmd response data (12 bytes)
26,416,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,446,881 UART: [rt]cmd =0x4d454153, len=108
26,465,383 >>> mbox cmd response data (12 bytes)
26,465,817 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,496,298 UART: [rt]cmd =0x4d454153, len=108
26,515,186 >>> mbox cmd response data (12 bytes)
26,515,647 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,546,510 UART: [rt]cmd =0x4d454153, len=108
26,565,005 >>> mbox cmd response data (12 bytes)
26,565,450 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,595,780 UART: [rt]cmd =0x4d454153, len=108
26,613,660 >>> mbox cmd response data (12 bytes)
26,614,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,644,736 UART: [rt]cmd =0x4d454153, len=108
26,663,289 >>> mbox cmd response data (12 bytes)
26,663,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,694,121 UART: [rt]cmd =0x4d454153, len=108
26,712,402 >>> mbox cmd response data (12 bytes)
26,712,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,743,312 UART: [rt]cmd =0x4d454153, len=108
26,762,057 >>> mbox cmd response data (12 bytes)
26,762,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,793,081 UART: [rt]cmd =0x4d454153, len=108
26,811,796 >>> mbox cmd response data (12 bytes)
26,812,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,842,728 UART: [rt]cmd =0x4d454153, len=108
26,861,363 >>> mbox cmd response data (12 bytes)
26,861,791 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,892,272 UART: [rt]cmd =0x4d454153, len=108
26,910,504 >>> mbox cmd response data (12 bytes)
26,910,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,941,570 UART: [rt]cmd =0x4d454153, len=108
26,959,854 >>> mbox cmd response data (12 bytes)
26,960,279 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,990,981 UART: [rt]cmd =0x4d454153, len=108
27,009,827 >>> mbox cmd response data (12 bytes)
27,010,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,040,742 UART: [rt]cmd =0x4d454153, len=108
27,043,019 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,662 writing to cptra_bootfsm_go
3,755,338 ready_for_fw is high
3,755,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,957,129 >>> mbox cmd response: success
19,212,690 UART:
19,213,078 UART: Running Caliptra FMC ...
19,214,281 UART:
19,214,449 UART: [state] CFI Enabled
19,221,930 UART: [fht] FMC Alias Private Key: 7
20,979,138 UART: [art] Extend RT PCRs Done
20,980,363 UART: [art] Lock RT PCRs Done
20,982,040 UART: [art] Populate DV Done
20,987,515 UART: [fht] FMC Alias Private Key: 7
20,989,114 UART: [art] Derive CDI
20,989,936 UART: [art] Store in in slot 0x4
21,032,819 UART: [art] Derive Key Pair
21,033,869 UART: [art] Store priv key in slot 0x5
23,460,838 UART: [art] Derive Key Pair - Done
23,473,720 UART: [art] Signing Cert with AUTHO
23,475,050 UART: RITY.KEYID = 7
25,180,535 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,035 UART: [art] PUB.X = 88C813C17355761EB6F21AADA13B0861826502433E57EC8F871FB82324FA708EF0DE185430241F0B42B9CE758F5C52AC
25,189,283 UART: [art] PUB.Y = 4ABFCD819185303531CA92B4F18A4D6B23480EB11CE1482944A781BF902EF01A03B08FCBF33D26B6578E0D31A1EB7FF4
25,196,573 UART: [art] SIG.R = 002475B4E8C8AD5D8816210E24921BC43396EB43A19F516A9E876DA9C6BFD16F927CD9387F44311C41D61AB0BE770FF5
25,203,935 UART: [art] SIG.S = 17EE86033D1D7F39A2568BF5F590E61E5C35BC79494B064C80EBE89AFF1C89BABE7CDF7E8E1AA7FE7340992CC9534668
26,182,774 UART: Caliptra RT
26,183,487 UART: [state] CFI Enabled
26,301,223 UART: [rt] RT listening for mailbox commands...
26,303,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,334,272 UART: [rt]cmd =0x4d454153, len=108
26,351,987 >>> mbox cmd response data (12 bytes)
26,352,525 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,383,124 UART: [rt]cmd =0x4d454153, len=108
26,401,574 >>> mbox cmd response data (12 bytes)
26,402,004 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,432,708 UART: [rt]cmd =0x4d454153, len=108
26,451,804 >>> mbox cmd response data (12 bytes)
26,452,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,482,943 UART: [rt]cmd =0x4d454153, len=108
26,501,751 >>> mbox cmd response data (12 bytes)
26,502,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,532,643 UART: [rt]cmd =0x4d454153, len=108
26,551,227 >>> mbox cmd response data (12 bytes)
26,551,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,582,377 UART: [rt]cmd =0x4d454153, len=108
26,601,168 >>> mbox cmd response data (12 bytes)
26,601,631 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,632,171 UART: [rt]cmd =0x4d454153, len=108
26,650,665 >>> mbox cmd response data (12 bytes)
26,651,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,681,580 UART: [rt]cmd =0x4d454153, len=108
26,699,458 >>> mbox cmd response data (12 bytes)
26,699,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,730,473 UART: [rt]cmd =0x4d454153, len=108
26,748,690 >>> mbox cmd response data (12 bytes)
26,749,100 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,779,561 UART: [rt]cmd =0x4d454153, len=108
26,797,761 >>> mbox cmd response data (12 bytes)
26,798,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,828,730 UART: [rt]cmd =0x4d454153, len=108
26,847,127 >>> mbox cmd response data (12 bytes)
26,847,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,878,125 UART: [rt]cmd =0x4d454153, len=108
26,896,463 >>> mbox cmd response data (12 bytes)
26,896,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,927,416 UART: [rt]cmd =0x4d454153, len=108
26,946,321 >>> mbox cmd response data (12 bytes)
26,946,748 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,977,224 UART: [rt]cmd =0x4d454153, len=108
26,996,262 >>> mbox cmd response data (12 bytes)
26,996,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,027,475 UART: [rt]cmd =0x4d454153, len=108
27,045,617 >>> mbox cmd response data (12 bytes)
27,046,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,076,647 UART: [rt]cmd =0x4d454153, len=108
27,078,794 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,598 UART: [state] LifecycleState = Unprovisioned
85,253 UART: [state] DebugLocked = No
85,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,467 UART: [kat] SHA2-256
881,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,513 UART: [kat] ++
885,665 UART: [kat] sha1
889,831 UART: [kat] SHA2-256
891,769 UART: [kat] SHA2-384
894,676 UART: [kat] SHA2-512-ACC
896,577 UART: [kat] ECC-384
902,420 UART: [kat] HMAC-384Kdf
907,116 UART: [kat] LMS
1,475,312 UART: [kat] --
1,476,301 UART: [cold-reset] ++
1,476,657 UART: [fht] Storing FHT @ 0x50003400
1,479,350 UART: [idev] ++
1,479,518 UART: [idev] CDI.KEYID = 6
1,479,878 UART: [idev] SUBJECT.KEYID = 7
1,480,302 UART: [idev] UDS.KEYID = 0
1,480,647 ready_for_fw is high
1,480,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,346 UART: [idev] Erasing UDS.KEYID = 0
1,505,060 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,716 UART: [idev] --
1,514,723 UART: [ldev] ++
1,514,891 UART: [ldev] CDI.KEYID = 6
1,515,254 UART: [ldev] SUBJECT.KEYID = 5
1,515,680 UART: [ldev] AUTHORITY.KEYID = 7
1,516,143 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,546,380 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,200 UART: [ldev] --
1,585,695 UART: [fwproc] Waiting for Commands...
1,586,316 UART: [fwproc] Received command 0x46574c44
1,587,107 UART: [fwproc] Received Image of size 114168 bytes
2,883,479 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,605 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,638 >>> mbox cmd response: success
3,076,834 UART: [afmc] ++
3,077,002 UART: [afmc] CDI.KEYID = 6
3,077,364 UART: [afmc] SUBJECT.KEYID = 7
3,077,789 UART: [afmc] AUTHORITY.KEYID = 5
3,112,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,346 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,739 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,429 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,262 UART: [afmc] --
3,155,296 UART: [cold-reset] --
3,156,274 UART: [state] Locking Datavault
3,157,493 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,097 UART: [state] Locking ICCM
3,158,749 UART: [exit] Launching FMC @ 0x40000130
3,164,078 UART:
3,164,094 UART: Running Caliptra FMC ...
3,164,502 UART:
3,164,556 UART: [state] CFI Enabled
3,174,707 UART: [fht] FMC Alias Private Key: 7
3,282,264 UART: [art] Extend RT PCRs Done
3,282,692 UART: [art] Lock RT PCRs Done
3,284,122 UART: [art] Populate DV Done
3,292,543 UART: [fht] FMC Alias Private Key: 7
3,293,483 UART: [art] Derive CDI
3,293,763 UART: [art] Store in in slot 0x4
3,379,618 UART: [art] Derive Key Pair
3,379,978 UART: [art] Store priv key in slot 0x5
3,393,634 UART: [art] Derive Key Pair - Done
3,408,609 UART: [art] Signing Cert with AUTHO
3,409,089 UART: RITY.KEYID = 7
3,424,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,144 UART: [art] PUB.X = F5E77619723FACCD6417AB271256B274DFF6FE84D41CBA04F0591B1C36F6C67D38C6F1E017E4450AE2A53A53A656757F
3,431,916 UART: [art] PUB.Y = 10376E891BE59DA5115DEC59C8401B47D8AD62FAC5AB34F51F4965544ECBB186D8C8C0BC4D0044FA033673A00E6F90A9
3,438,848 UART: [art] SIG.R = 0DDCB8BC2EBFA6B9834CCF1C0D5F8059DDF9E5F0361816B60B2039E36B25A91075A25883AFDC14096FB6CC7A97148458
3,445,618 UART: [art] SIG.S = 3A66E4C884C4785FD0E00D5A56F4470356942E781442A6DB77FBA1827B304B3612BCC1327EA6DB09C2B1FC5F110D5D97
3,469,547 UART: Caliptra RT
3,469,800 UART: [state] CFI Enabled
3,578,514 UART: [rt] RT listening for mailbox commands...
3,579,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,528 UART: [rt]cmd =0x4d454153, len=108
3,630,479 >>> mbox cmd response data (12 bytes)
3,630,480 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,660,547 UART: [rt]cmd =0x4d454153, len=108
3,681,276 >>> mbox cmd response data (12 bytes)
3,681,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,711,372 UART: [rt]cmd =0x4d454153, len=108
3,732,043 >>> mbox cmd response data (12 bytes)
3,732,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,249 UART: [rt]cmd =0x4d454153, len=108
3,782,834 >>> mbox cmd response data (12 bytes)
3,782,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,174 UART: [rt]cmd =0x4d454153, len=108
3,833,537 >>> mbox cmd response data (12 bytes)
3,833,538 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,863,443 UART: [rt]cmd =0x4d454153, len=108
3,883,322 >>> mbox cmd response data (12 bytes)
3,883,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,913,170 UART: [rt]cmd =0x4d454153, len=108
3,933,959 >>> mbox cmd response data (12 bytes)
3,933,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,981 UART: [rt]cmd =0x4d454153, len=108
3,985,028 >>> mbox cmd response data (12 bytes)
3,985,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,015,182 UART: [rt]cmd =0x4d454153, len=108
4,036,125 >>> mbox cmd response data (12 bytes)
4,036,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,066,117 UART: [rt]cmd =0x4d454153, len=108
4,086,894 >>> mbox cmd response data (12 bytes)
4,086,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,116,776 UART: [rt]cmd =0x4d454153, len=108
4,138,361 >>> mbox cmd response data (12 bytes)
4,138,362 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,168,321 UART: [rt]cmd =0x4d454153, len=108
4,188,970 >>> mbox cmd response data (12 bytes)
4,188,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,218,916 UART: [rt]cmd =0x4d454153, len=108
4,240,047 >>> mbox cmd response data (12 bytes)
4,240,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,049 UART: [rt]cmd =0x4d454153, len=108
4,290,324 >>> mbox cmd response data (12 bytes)
4,290,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,320,582 UART: [rt]cmd =0x4d454153, len=108
4,341,397 >>> mbox cmd response data (12 bytes)
4,341,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,371,723 UART: [rt]cmd =0x4d454153, len=108
4,373,651 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 ready_for_fw is high
1,362,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,172 >>> mbox cmd response: success
2,987,290 UART:
2,987,306 UART: Running Caliptra FMC ...
2,987,714 UART:
2,987,768 UART: [state] CFI Enabled
2,998,343 UART: [fht] FMC Alias Private Key: 7
3,105,924 UART: [art] Extend RT PCRs Done
3,106,352 UART: [art] Lock RT PCRs Done
3,108,212 UART: [art] Populate DV Done
3,116,447 UART: [fht] FMC Alias Private Key: 7
3,117,613 UART: [art] Derive CDI
3,117,893 UART: [art] Store in in slot 0x4
3,203,464 UART: [art] Derive Key Pair
3,203,824 UART: [art] Store priv key in slot 0x5
3,217,342 UART: [art] Derive Key Pair - Done
3,232,195 UART: [art] Signing Cert with AUTHO
3,232,675 UART: RITY.KEYID = 7
3,247,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,546 UART: [art] PUB.X = 9CEA346AF8328E809E34F148E4631FF41AFCB63E330F1B977B93341A7971C0F02814DE91B1A9B6A0B24AB5ABC458D1B4
3,255,323 UART: [art] PUB.Y = 46B48938B1B22C11CB964A2FE778FDEDCC66C75CA3C66B86EF64DCCE6B6A56250B9104F9CD377FE73E3C4363E0AAA5E7
3,262,287 UART: [art] SIG.R = 5C9D68EC2F6DD3367C63DDA0929076C21B23B83D37A8E6694863DA5EE74BF4A4C653D3F492F9CA8EAEF9FEED108E0F10
3,269,072 UART: [art] SIG.S = 8C5D2C811FCD63F62A3D1CA76338F7FF686B892BC3A116A4997BFB3E9406939DF00449F7C930B9F052484CFFA41D55D0
3,292,943 UART: Caliptra RT
3,293,196 UART: [state] CFI Enabled
3,402,225 UART: [rt] RT listening for mailbox commands...
3,402,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,229 UART: [rt]cmd =0x4d454153, len=108
3,454,306 >>> mbox cmd response data (12 bytes)
3,454,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,280 UART: [rt]cmd =0x4d454153, len=108
3,505,307 >>> mbox cmd response data (12 bytes)
3,505,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,409 UART: [rt]cmd =0x4d454153, len=108
3,556,410 >>> mbox cmd response data (12 bytes)
3,556,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,586,424 UART: [rt]cmd =0x4d454153, len=108
3,607,309 >>> mbox cmd response data (12 bytes)
3,607,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,637,275 UART: [rt]cmd =0x4d454153, len=108
3,657,850 >>> mbox cmd response data (12 bytes)
3,657,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,846 UART: [rt]cmd =0x4d454153, len=108
3,708,489 >>> mbox cmd response data (12 bytes)
3,708,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,445 UART: [rt]cmd =0x4d454153, len=108
3,758,812 >>> mbox cmd response data (12 bytes)
3,758,813 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,788,932 UART: [rt]cmd =0x4d454153, len=108
3,809,035 >>> mbox cmd response data (12 bytes)
3,809,036 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,839,271 UART: [rt]cmd =0x4d454153, len=108
3,860,016 >>> mbox cmd response data (12 bytes)
3,860,017 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,890,108 UART: [rt]cmd =0x4d454153, len=108
3,911,829 >>> mbox cmd response data (12 bytes)
3,911,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,873 UART: [rt]cmd =0x4d454153, len=108
3,962,940 >>> mbox cmd response data (12 bytes)
3,962,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,992,760 UART: [rt]cmd =0x4d454153, len=108
4,013,671 >>> mbox cmd response data (12 bytes)
4,013,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,043,867 UART: [rt]cmd =0x4d454153, len=108
4,065,030 >>> mbox cmd response data (12 bytes)
4,065,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,296 UART: [rt]cmd =0x4d454153, len=108
4,115,959 >>> mbox cmd response data (12 bytes)
4,115,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,146,139 UART: [rt]cmd =0x4d454153, len=108
4,167,368 >>> mbox cmd response data (12 bytes)
4,167,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,197,468 UART: [rt]cmd =0x4d454153, len=108
4,199,330 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,270 UART: [kat] SHA2-256
882,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,316 UART: [kat] ++
886,468 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,171 UART: [kat] SHA2-512-ACC
897,072 UART: [kat] ECC-384
902,301 UART: [kat] HMAC-384Kdf
906,873 UART: [kat] LMS
1,475,069 UART: [kat] --
1,475,780 UART: [cold-reset] ++
1,476,122 UART: [fht] Storing FHT @ 0x50003400
1,479,009 UART: [idev] ++
1,479,177 UART: [idev] CDI.KEYID = 6
1,479,537 UART: [idev] SUBJECT.KEYID = 7
1,479,961 UART: [idev] UDS.KEYID = 0
1,480,306 ready_for_fw is high
1,480,306 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,167 UART: [idev] Erasing UDS.KEYID = 0
1,504,607 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,347 UART: [idev] --
1,514,552 UART: [ldev] ++
1,514,720 UART: [ldev] CDI.KEYID = 6
1,515,083 UART: [ldev] SUBJECT.KEYID = 5
1,515,509 UART: [ldev] AUTHORITY.KEYID = 7
1,515,972 UART: [ldev] FE.KEYID = 1
1,521,730 UART: [ldev] Erasing FE.KEYID = 1
1,547,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,675 UART: [ldev] --
1,587,074 UART: [fwproc] Waiting for Commands...
1,587,753 UART: [fwproc] Received command 0x46574c44
1,588,544 UART: [fwproc] Received Image of size 114168 bytes
2,885,430 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,963 >>> mbox cmd response: success
3,079,129 UART: [afmc] ++
3,079,297 UART: [afmc] CDI.KEYID = 6
3,079,659 UART: [afmc] SUBJECT.KEYID = 7
3,080,084 UART: [afmc] AUTHORITY.KEYID = 5
3,115,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,386 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,076 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,895 UART: [afmc] --
3,158,853 UART: [cold-reset] --
3,159,937 UART: [state] Locking Datavault
3,161,166 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,770 UART: [state] Locking ICCM
3,162,350 UART: [exit] Launching FMC @ 0x40000130
3,167,679 UART:
3,167,695 UART: Running Caliptra FMC ...
3,168,103 UART:
3,168,246 UART: [state] CFI Enabled
3,179,213 UART: [fht] FMC Alias Private Key: 7
3,287,134 UART: [art] Extend RT PCRs Done
3,287,562 UART: [art] Lock RT PCRs Done
3,288,930 UART: [art] Populate DV Done
3,297,105 UART: [fht] FMC Alias Private Key: 7
3,298,181 UART: [art] Derive CDI
3,298,461 UART: [art] Store in in slot 0x4
3,384,406 UART: [art] Derive Key Pair
3,384,766 UART: [art] Store priv key in slot 0x5
3,398,050 UART: [art] Derive Key Pair - Done
3,413,161 UART: [art] Signing Cert with AUTHO
3,413,641 UART: RITY.KEYID = 7
3,428,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,376 UART: [art] PUB.X = 848D19E8AA30275B3CBE16ED6B783DCC748CFB4A9D2E2BC79B2A1786D54CEA53E0BAAEAD63FA617104C4C6BAAA007AFB
3,436,151 UART: [art] PUB.Y = D7A0CDD9A23E328D8778D46730FA22472F4B20149F748A0F3B10B7A7EEEB6A5979B88461E8627503FA9945FAA0237B3B
3,443,099 UART: [art] SIG.R = 74034383DA9BBE1295D6EF5C0081A665E8205F7AA1B22FB3F0B4B0224296521553A1E60FAC3B569BA11E8665FF710CDD
3,449,844 UART: [art] SIG.S = 382CE5F4EEC623794AF6EAAC62C507AF922A170202DE0FDA837ADDCF05D1C17F23410521B07DD7533686237DD915C302
3,473,834 UART: Caliptra RT
3,474,179 UART: [state] CFI Enabled
3,582,903 UART: [rt] RT listening for mailbox commands...
3,583,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,614,021 UART: [rt]cmd =0x4d454153, len=108
3,634,292 >>> mbox cmd response data (12 bytes)
3,634,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,664,276 UART: [rt]cmd =0x4d454153, len=108
3,684,833 >>> mbox cmd response data (12 bytes)
3,684,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,714,703 UART: [rt]cmd =0x4d454153, len=108
3,735,076 >>> mbox cmd response data (12 bytes)
3,735,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,010 UART: [rt]cmd =0x4d454153, len=108
3,785,841 >>> mbox cmd response data (12 bytes)
3,785,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,815,999 UART: [rt]cmd =0x4d454153, len=108
3,836,552 >>> mbox cmd response data (12 bytes)
3,836,553 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,866,706 UART: [rt]cmd =0x4d454153, len=108
3,888,047 >>> mbox cmd response data (12 bytes)
3,888,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,037 UART: [rt]cmd =0x4d454153, len=108
3,938,934 >>> mbox cmd response data (12 bytes)
3,938,935 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,969,076 UART: [rt]cmd =0x4d454153, len=108
3,990,213 >>> mbox cmd response data (12 bytes)
3,990,214 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,020,281 UART: [rt]cmd =0x4d454153, len=108
4,040,674 >>> mbox cmd response data (12 bytes)
4,040,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,070,716 UART: [rt]cmd =0x4d454153, len=108
4,092,279 >>> mbox cmd response data (12 bytes)
4,092,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,122,013 UART: [rt]cmd =0x4d454153, len=108
4,142,848 >>> mbox cmd response data (12 bytes)
4,142,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,172,924 UART: [rt]cmd =0x4d454153, len=108
4,193,803 >>> mbox cmd response data (12 bytes)
4,193,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,223,831 UART: [rt]cmd =0x4d454153, len=108
4,244,890 >>> mbox cmd response data (12 bytes)
4,244,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,274,656 UART: [rt]cmd =0x4d454153, len=108
4,295,567 >>> mbox cmd response data (12 bytes)
4,295,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,325,423 UART: [rt]cmd =0x4d454153, len=108
4,346,454 >>> mbox cmd response data (12 bytes)
4,346,455 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,376,352 UART: [rt]cmd =0x4d454153, len=108
4,378,096 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 ready_for_fw is high
1,363,030 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,043 >>> mbox cmd response: success
2,989,155 UART:
2,989,171 UART: Running Caliptra FMC ...
2,989,579 UART:
2,989,722 UART: [state] CFI Enabled
2,999,983 UART: [fht] FMC Alias Private Key: 7
3,107,840 UART: [art] Extend RT PCRs Done
3,108,268 UART: [art] Lock RT PCRs Done
3,109,848 UART: [art] Populate DV Done
3,118,165 UART: [fht] FMC Alias Private Key: 7
3,119,283 UART: [art] Derive CDI
3,119,563 UART: [art] Store in in slot 0x4
3,205,094 UART: [art] Derive Key Pair
3,205,454 UART: [art] Store priv key in slot 0x5
3,218,698 UART: [art] Derive Key Pair - Done
3,233,599 UART: [art] Signing Cert with AUTHO
3,234,079 UART: RITY.KEYID = 7
3,249,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,038 UART: [art] PUB.X = E4488EF63DC9C9D9E4C8CA3528FA00FA6F51C744FD76A5ECDAFE78B577F7190F0E6BEA1E67668FDF99E47E82BF0B1197
3,256,799 UART: [art] PUB.Y = 9AF5C45972D02E60F5F8A2FFCDA0A24E73A34A11106DA16CCA66D17CAAE2D7D858D8424D2D6C35486AB07FCBA1B2B1A4
3,263,771 UART: [art] SIG.R = C44B6867982A5A6FFFE21C208C1546D735FDBF8A274831D97BA2933A3969EE1456630F7D8CB2318E755672DE412B20B9
3,270,538 UART: [art] SIG.S = 12D58C291478BB7EA7A1CB3526E0E94B7E83D45D2340A3EE8B87DD7DB1D6B4C1675264B4EE8200662AE421FA4181CAF0
3,294,799 UART: Caliptra RT
3,295,144 UART: [state] CFI Enabled
3,403,461 UART: [rt] RT listening for mailbox commands...
3,404,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,409 UART: [rt]cmd =0x4d454153, len=108
3,454,626 >>> mbox cmd response data (12 bytes)
3,454,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,484,646 UART: [rt]cmd =0x4d454153, len=108
3,505,279 >>> mbox cmd response data (12 bytes)
3,505,280 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,337 UART: [rt]cmd =0x4d454153, len=108
3,555,498 >>> mbox cmd response data (12 bytes)
3,555,499 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,585,694 UART: [rt]cmd =0x4d454153, len=108
3,606,809 >>> mbox cmd response data (12 bytes)
3,606,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,636,651 UART: [rt]cmd =0x4d454153, len=108
3,656,864 >>> mbox cmd response data (12 bytes)
3,656,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,687,000 UART: [rt]cmd =0x4d454153, len=108
3,707,251 >>> mbox cmd response data (12 bytes)
3,707,252 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,211 UART: [rt]cmd =0x4d454153, len=108
3,757,286 >>> mbox cmd response data (12 bytes)
3,757,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,566 UART: [rt]cmd =0x4d454153, len=108
3,808,865 >>> mbox cmd response data (12 bytes)
3,808,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,953 UART: [rt]cmd =0x4d454153, len=108
3,859,038 >>> mbox cmd response data (12 bytes)
3,859,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,154 UART: [rt]cmd =0x4d454153, len=108
3,910,171 >>> mbox cmd response data (12 bytes)
3,910,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,203 UART: [rt]cmd =0x4d454153, len=108
3,960,996 >>> mbox cmd response data (12 bytes)
3,960,997 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,991,162 UART: [rt]cmd =0x4d454153, len=108
4,012,219 >>> mbox cmd response data (12 bytes)
4,012,220 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,042,293 UART: [rt]cmd =0x4d454153, len=108
4,062,306 >>> mbox cmd response data (12 bytes)
4,062,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,222 UART: [rt]cmd =0x4d454153, len=108
4,112,889 >>> mbox cmd response data (12 bytes)
4,112,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,143,061 UART: [rt]cmd =0x4d454153, len=108
4,163,970 >>> mbox cmd response data (12 bytes)
4,163,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,193,912 UART: [rt]cmd =0x4d454153, len=108
4,195,812 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
893,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,501 UART: [kat] ++
897,653 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
918,518 UART: [kat] HMAC-384Kdf
923,060 UART: [kat] LMS
1,171,388 UART: [kat] --
1,172,273 UART: [cold-reset] ++
1,172,809 UART: [fht] FHT @ 0x50003400
1,175,638 UART: [idev] ++
1,175,806 UART: [idev] CDI.KEYID = 6
1,176,166 UART: [idev] SUBJECT.KEYID = 7
1,176,590 UART: [idev] UDS.KEYID = 0
1,176,935 ready_for_fw is high
1,176,935 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,988 UART: [idev] Erasing UDS.KEYID = 0
1,201,273 UART: [idev] Sha1 KeyId Algorithm
1,209,775 UART: [idev] --
1,210,659 UART: [ldev] ++
1,210,827 UART: [ldev] CDI.KEYID = 6
1,211,190 UART: [ldev] SUBJECT.KEYID = 5
1,211,616 UART: [ldev] AUTHORITY.KEYID = 7
1,212,079 UART: [ldev] FE.KEYID = 1
1,217,471 UART: [ldev] Erasing FE.KEYID = 1
1,243,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,422 UART: [fwproc] Wait for Commands...
1,283,128 UART: [fwproc] Recv command 0x46574c44
1,283,856 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,150 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,723 >>> mbox cmd response: success
2,773,889 UART: [afmc] ++
2,774,057 UART: [afmc] CDI.KEYID = 6
2,774,419 UART: [afmc] SUBJECT.KEYID = 7
2,774,844 UART: [afmc] AUTHORITY.KEYID = 5
2,809,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,836 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,564 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,960 UART: [afmc] --
2,852,962 UART: [cold-reset] --
2,853,750 UART: [state] Locking Datavault
2,854,667 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,271 UART: [state] Locking ICCM
2,855,781 UART: [exit] Launching FMC @ 0x40000130
2,861,110 UART:
2,861,126 UART: Running Caliptra FMC ...
2,861,534 UART:
2,861,588 UART: [state] CFI Enabled
2,872,217 UART: [fht] FMC Alias Private Key: 7
2,979,664 UART: [art] Extend RT PCRs Done
2,980,092 UART: [art] Lock RT PCRs Done
2,981,712 UART: [art] Populate DV Done
2,989,923 UART: [fht] FMC Alias Private Key: 7
2,990,955 UART: [art] Derive CDI
2,991,235 UART: [art] Store in in slot 0x4
3,077,000 UART: [art] Derive Key Pair
3,077,360 UART: [art] Store priv key in slot 0x5
3,089,850 UART: [art] Derive Key Pair - Done
3,104,841 UART: [art] Signing Cert with AUTHO
3,105,321 UART: RITY.KEYID = 7
3,120,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,072 UART: [art] PUB.X = F5FB1BF2695913432CA6BF4613B81D22908362CD13F103355EDB3385D81BD2711429F195458E0B95A0046755D48D1343
3,127,823 UART: [art] PUB.Y = 893EDEF5CC16C96E41601DA3381A88F687339630451E39BE8474B79E0B1E2EBEE3E41EE3545F557094B4D5F16D2922FC
3,134,774 UART: [art] SIG.R = DBB684B26B642366868CE234D2C99EE022EE6F5CF1BBBECACAA50E27E1A9762DB7EC43C5652EB949BA405EF44E9737BA
3,141,563 UART: [art] SIG.S = DAACFF815B04D8ED9C359602AFF9D238A68890F03CA50462BF543B663AFC69DF9E58514166D124222A7587160881B0FF
3,165,716 UART: Caliptra RT
3,165,969 UART: [state] CFI Enabled
3,272,997 UART: [rt] RT listening for mailbox commands...
3,273,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,029 UART: [rt]cmd =0x4d454153, len=108
3,325,418 >>> mbox cmd response data (12 bytes)
3,325,419 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,382 UART: [rt]cmd =0x4d454153, len=108
3,375,685 >>> mbox cmd response data (12 bytes)
3,375,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,643 UART: [rt]cmd =0x4d454153, len=108
3,426,218 >>> mbox cmd response data (12 bytes)
3,426,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,208 UART: [rt]cmd =0x4d454153, len=108
3,476,781 >>> mbox cmd response data (12 bytes)
3,476,782 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,797 UART: [rt]cmd =0x4d454153, len=108
3,527,778 >>> mbox cmd response data (12 bytes)
3,527,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,557,790 UART: [rt]cmd =0x4d454153, len=108
3,578,541 >>> mbox cmd response data (12 bytes)
3,578,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,695 UART: [rt]cmd =0x4d454153, len=108
3,629,944 >>> mbox cmd response data (12 bytes)
3,629,945 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,968 UART: [rt]cmd =0x4d454153, len=108
3,681,215 >>> mbox cmd response data (12 bytes)
3,681,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,710,929 UART: [rt]cmd =0x4d454153, len=108
3,730,692 >>> mbox cmd response data (12 bytes)
3,730,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,644 UART: [rt]cmd =0x4d454153, len=108
3,781,227 >>> mbox cmd response data (12 bytes)
3,781,228 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,029 UART: [rt]cmd =0x4d454153, len=108
3,831,946 >>> mbox cmd response data (12 bytes)
3,831,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,788 UART: [rt]cmd =0x4d454153, len=108
3,881,891 >>> mbox cmd response data (12 bytes)
3,881,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,911,821 UART: [rt]cmd =0x4d454153, len=108
3,932,402 >>> mbox cmd response data (12 bytes)
3,932,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,962,538 UART: [rt]cmd =0x4d454153, len=108
3,983,533 >>> mbox cmd response data (12 bytes)
3,983,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,629 UART: [rt]cmd =0x4d454153, len=108
4,034,168 >>> mbox cmd response data (12 bytes)
4,034,169 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,226 UART: [rt]cmd =0x4d454153, len=108
4,066,202 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,069 ready_for_fw is high
1,060,069 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,858 >>> mbox cmd response: success
2,685,544 UART:
2,685,560 UART: Running Caliptra FMC ...
2,685,968 UART:
2,686,022 UART: [state] CFI Enabled
2,696,357 UART: [fht] FMC Alias Private Key: 7
2,804,876 UART: [art] Extend RT PCRs Done
2,805,304 UART: [art] Lock RT PCRs Done
2,806,986 UART: [art] Populate DV Done
2,815,017 UART: [fht] FMC Alias Private Key: 7
2,816,101 UART: [art] Derive CDI
2,816,381 UART: [art] Store in in slot 0x4
2,902,226 UART: [art] Derive Key Pair
2,902,586 UART: [art] Store priv key in slot 0x5
2,915,700 UART: [art] Derive Key Pair - Done
2,930,445 UART: [art] Signing Cert with AUTHO
2,930,925 UART: RITY.KEYID = 7
2,946,257 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,022 UART: [art] PUB.X = BF33DE8E67B0B0A80ACCAF75C31FB7EC73BFFFF1A7C0DF3CCE48B7E2490F4A8B95AF4E4C181B8DB7589FC55DDE1D2D6E
2,953,824 UART: [art] PUB.Y = 33BEC91F6F8EAFC99E1EAB62010F4ED2F3B58643B5495044BEDD1827AFBE5EF0F970211528713C204628479DE22645E5
2,960,774 UART: [art] SIG.R = 293813CC33F16D44E018B2CEBC1D82D6A4B4A870D70F7693E2B90E40825B7E6BD9377C809D5755857D326168AB402D3E
2,967,538 UART: [art] SIG.S = B41B48AF477BBB9A7F38A2B4A961E3FE9F69A6490F020966A457908984D4A75E1707C84B5C5DD7C435B2AE02104266F5
2,990,522 UART: Caliptra RT
2,990,775 UART: [state] CFI Enabled
3,099,238 UART: [rt] RT listening for mailbox commands...
3,099,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,326 UART: [rt]cmd =0x4d454153, len=108
3,150,639 >>> mbox cmd response data (12 bytes)
3,150,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,180,649 UART: [rt]cmd =0x4d454153, len=108
3,201,564 >>> mbox cmd response data (12 bytes)
3,201,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,231,410 UART: [rt]cmd =0x4d454153, len=108
3,252,299 >>> mbox cmd response data (12 bytes)
3,252,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,282,601 UART: [rt]cmd =0x4d454153, len=108
3,304,040 >>> mbox cmd response data (12 bytes)
3,304,041 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,086 UART: [rt]cmd =0x4d454153, len=108
3,354,683 >>> mbox cmd response data (12 bytes)
3,354,684 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,727 UART: [rt]cmd =0x4d454153, len=108
3,405,128 >>> mbox cmd response data (12 bytes)
3,405,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,376 UART: [rt]cmd =0x4d454153, len=108
3,456,437 >>> mbox cmd response data (12 bytes)
3,456,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,523 UART: [rt]cmd =0x4d454153, len=108
3,507,310 >>> mbox cmd response data (12 bytes)
3,507,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,280 UART: [rt]cmd =0x4d454153, len=108
3,557,929 >>> mbox cmd response data (12 bytes)
3,557,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,035 UART: [rt]cmd =0x4d454153, len=108
3,609,502 >>> mbox cmd response data (12 bytes)
3,609,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,768 UART: [rt]cmd =0x4d454153, len=108
3,660,263 >>> mbox cmd response data (12 bytes)
3,660,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,269 UART: [rt]cmd =0x4d454153, len=108
3,711,386 >>> mbox cmd response data (12 bytes)
3,711,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,640 UART: [rt]cmd =0x4d454153, len=108
3,762,119 >>> mbox cmd response data (12 bytes)
3,762,120 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,011 UART: [rt]cmd =0x4d454153, len=108
3,813,310 >>> mbox cmd response data (12 bytes)
3,813,311 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,422 UART: [rt]cmd =0x4d454153, len=108
3,864,467 >>> mbox cmd response data (12 bytes)
3,864,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,613 UART: [rt]cmd =0x4d454153, len=108
3,896,483 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
893,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,758 UART: [kat] ++
897,910 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
919,023 UART: [kat] HMAC-384Kdf
923,713 UART: [kat] LMS
1,172,041 UART: [kat] --
1,173,044 UART: [cold-reset] ++
1,173,480 UART: [fht] FHT @ 0x50003400
1,176,081 UART: [idev] ++
1,176,249 UART: [idev] CDI.KEYID = 6
1,176,609 UART: [idev] SUBJECT.KEYID = 7
1,177,033 UART: [idev] UDS.KEYID = 0
1,177,378 ready_for_fw is high
1,177,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,923 UART: [idev] Erasing UDS.KEYID = 0
1,201,958 UART: [idev] Sha1 KeyId Algorithm
1,210,592 UART: [idev] --
1,211,682 UART: [ldev] ++
1,211,850 UART: [ldev] CDI.KEYID = 6
1,212,213 UART: [ldev] SUBJECT.KEYID = 5
1,212,639 UART: [ldev] AUTHORITY.KEYID = 7
1,213,102 UART: [ldev] FE.KEYID = 1
1,218,594 UART: [ldev] Erasing FE.KEYID = 1
1,244,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,400 UART: [ldev] --
1,283,705 UART: [fwproc] Wait for Commands...
1,284,369 UART: [fwproc] Recv command 0x46574c44
1,285,097 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,869 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,320 >>> mbox cmd response: success
2,774,412 UART: [afmc] ++
2,774,580 UART: [afmc] CDI.KEYID = 6
2,774,942 UART: [afmc] SUBJECT.KEYID = 7
2,775,367 UART: [afmc] AUTHORITY.KEYID = 5
2,811,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,423 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,151 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,036 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,603 UART: [afmc] --
2,854,543 UART: [cold-reset] --
2,855,487 UART: [state] Locking Datavault
2,856,636 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,240 UART: [state] Locking ICCM
2,857,904 UART: [exit] Launching FMC @ 0x40000130
2,863,233 UART:
2,863,249 UART: Running Caliptra FMC ...
2,863,657 UART:
2,863,800 UART: [state] CFI Enabled
2,874,473 UART: [fht] FMC Alias Private Key: 7
2,983,082 UART: [art] Extend RT PCRs Done
2,983,510 UART: [art] Lock RT PCRs Done
2,984,924 UART: [art] Populate DV Done
2,993,251 UART: [fht] FMC Alias Private Key: 7
2,994,185 UART: [art] Derive CDI
2,994,465 UART: [art] Store in in slot 0x4
3,080,260 UART: [art] Derive Key Pair
3,080,620 UART: [art] Store priv key in slot 0x5
3,093,834 UART: [art] Derive Key Pair - Done
3,108,479 UART: [art] Signing Cert with AUTHO
3,108,959 UART: RITY.KEYID = 7
3,124,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,136 UART: [art] PUB.X = 2CCC94307A76F3271D21B77F65BA93455B4F673DBF0E2614C86D6D4EA1C5DF86B61BFE12524C071C2F0BEAF7247514ED
3,131,909 UART: [art] PUB.Y = 795FA7534221A755AF31275C0A64B6B27E1E70066BD0CEDBF6A089ED257D9E5A822F0B920DBEDD99CCDF312815AE1DB6
3,138,863 UART: [art] SIG.R = 26FFC94EEA7D7782F2991709C424FA249507274D6AB6BC6D7AFC1B743F613E8AFFE4B10EDE1AEBE4A11A6069B10B3B8A
3,145,641 UART: [art] SIG.S = A5B4A627287C3BA2267E1142964065FE0ABED747666E9ECD0970E2D6491F0C7D86FDE1D79C15928386192B988D9A52E0
3,168,883 UART: Caliptra RT
3,169,228 UART: [state] CFI Enabled
3,276,761 UART: [rt] RT listening for mailbox commands...
3,277,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,057 UART: [rt]cmd =0x4d454153, len=108
3,328,860 >>> mbox cmd response data (12 bytes)
3,328,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,358,822 UART: [rt]cmd =0x4d454153, len=108
3,379,217 >>> mbox cmd response data (12 bytes)
3,379,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,409,193 UART: [rt]cmd =0x4d454153, len=108
3,429,582 >>> mbox cmd response data (12 bytes)
3,429,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,459,488 UART: [rt]cmd =0x4d454153, len=108
3,480,621 >>> mbox cmd response data (12 bytes)
3,480,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,510,837 UART: [rt]cmd =0x4d454153, len=108
3,531,850 >>> mbox cmd response data (12 bytes)
3,531,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,561,956 UART: [rt]cmd =0x4d454153, len=108
3,581,491 >>> mbox cmd response data (12 bytes)
3,581,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,485 UART: [rt]cmd =0x4d454153, len=108
3,632,378 >>> mbox cmd response data (12 bytes)
3,632,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,662,584 UART: [rt]cmd =0x4d454153, len=108
3,682,689 >>> mbox cmd response data (12 bytes)
3,682,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,865 UART: [rt]cmd =0x4d454153, len=108
3,733,088 >>> mbox cmd response data (12 bytes)
3,733,089 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,940 UART: [rt]cmd =0x4d454153, len=108
3,783,687 >>> mbox cmd response data (12 bytes)
3,783,688 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,813,597 UART: [rt]cmd =0x4d454153, len=108
3,834,864 >>> mbox cmd response data (12 bytes)
3,834,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,836 UART: [rt]cmd =0x4d454153, len=108
3,885,787 >>> mbox cmd response data (12 bytes)
3,885,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,847 UART: [rt]cmd =0x4d454153, len=108
3,936,652 >>> mbox cmd response data (12 bytes)
3,936,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,814 UART: [rt]cmd =0x4d454153, len=108
3,987,703 >>> mbox cmd response data (12 bytes)
3,987,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,017,795 UART: [rt]cmd =0x4d454153, len=108
4,038,550 >>> mbox cmd response data (12 bytes)
4,038,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,664 UART: [rt]cmd =0x4d454153, len=108
4,070,822 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,610 ready_for_fw is high
1,060,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,257 >>> mbox cmd response: success
2,687,897 UART:
2,687,913 UART: Running Caliptra FMC ...
2,688,321 UART:
2,688,464 UART: [state] CFI Enabled
2,699,007 UART: [fht] FMC Alias Private Key: 7
2,806,196 UART: [art] Extend RT PCRs Done
2,806,624 UART: [art] Lock RT PCRs Done
2,808,390 UART: [art] Populate DV Done
2,816,319 UART: [fht] FMC Alias Private Key: 7
2,817,313 UART: [art] Derive CDI
2,817,593 UART: [art] Store in in slot 0x4
2,903,746 UART: [art] Derive Key Pair
2,904,106 UART: [art] Store priv key in slot 0x5
2,917,520 UART: [art] Derive Key Pair - Done
2,932,127 UART: [art] Signing Cert with AUTHO
2,932,607 UART: RITY.KEYID = 7
2,948,087 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,852 UART: [art] PUB.X = 820B90F08B6BE9BE83B4B87EFC8F1BE69CF4575D2C5B3F861E9C7F8DD41685F1B9443C2CFC2909CDE6F7D1CEB5534C7C
2,955,638 UART: [art] PUB.Y = 196159429FF66CEB94BCBF6109FE6BFECCF83ACEDBDA4AE1C731D6599356369783B652BB174173E68B223E98010863DC
2,962,589 UART: [art] SIG.R = AED395DC8E380043181F966CE868847CF74022DFEE113955004C1D0DF4E285081AFA1BBF84377C9B87130E1D5EBA1962
2,969,310 UART: [art] SIG.S = 1431290E1A36D7405B0CEDBAFEBA5FCD0DFFA68E64161237D65996219A81F088D3E6780DFC77B5F08812263CFC7F3001
2,993,610 UART: Caliptra RT
2,993,955 UART: [state] CFI Enabled
3,101,436 UART: [rt] RT listening for mailbox commands...
3,102,106 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,668 UART: [rt]cmd =0x4d454153, len=108
3,153,145 >>> mbox cmd response data (12 bytes)
3,153,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,183,159 UART: [rt]cmd =0x4d454153, len=108
3,204,138 >>> mbox cmd response data (12 bytes)
3,204,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,234,058 UART: [rt]cmd =0x4d454153, len=108
3,254,871 >>> mbox cmd response data (12 bytes)
3,254,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,285,039 UART: [rt]cmd =0x4d454153, len=108
3,305,352 >>> mbox cmd response data (12 bytes)
3,305,353 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,280 UART: [rt]cmd =0x4d454153, len=108
3,355,225 >>> mbox cmd response data (12 bytes)
3,355,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,225 UART: [rt]cmd =0x4d454153, len=108
3,405,850 >>> mbox cmd response data (12 bytes)
3,405,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,882 UART: [rt]cmd =0x4d454153, len=108
3,457,463 >>> mbox cmd response data (12 bytes)
3,457,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,487,671 UART: [rt]cmd =0x4d454153, len=108
3,508,108 >>> mbox cmd response data (12 bytes)
3,508,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,538,094 UART: [rt]cmd =0x4d454153, len=108
3,559,651 >>> mbox cmd response data (12 bytes)
3,559,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,689 UART: [rt]cmd =0x4d454153, len=108
3,610,658 >>> mbox cmd response data (12 bytes)
3,610,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,914 UART: [rt]cmd =0x4d454153, len=108
3,660,675 >>> mbox cmd response data (12 bytes)
3,660,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,690,705 UART: [rt]cmd =0x4d454153, len=108
3,711,584 >>> mbox cmd response data (12 bytes)
3,711,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,594 UART: [rt]cmd =0x4d454153, len=108
3,762,217 >>> mbox cmd response data (12 bytes)
3,762,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,792,397 UART: [rt]cmd =0x4d454153, len=108
3,813,390 >>> mbox cmd response data (12 bytes)
3,813,391 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,444 UART: [rt]cmd =0x4d454153, len=108
3,865,027 >>> mbox cmd response data (12 bytes)
3,865,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,907 UART: [rt]cmd =0x4d454153, len=108
3,897,027 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
890,866 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,995 UART: [kat] ++
895,147 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
904,150 UART: [kat] SHA2-512-ACC
906,051 UART: [kat] ECC-384
915,766 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,813 UART: [cold-reset] ++
1,170,243 UART: [fht] FHT @ 0x50003400
1,172,861 UART: [idev] ++
1,173,029 UART: [idev] CDI.KEYID = 6
1,173,390 UART: [idev] SUBJECT.KEYID = 7
1,173,815 UART: [idev] UDS.KEYID = 0
1,174,161 ready_for_fw is high
1,174,161 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,199,037 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,228 UART: [ldev] --
1,280,746 UART: [fwproc] Wait for Commands...
1,281,445 UART: [fwproc] Recv command 0x46574c44
1,282,178 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,969 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,433 >>> mbox cmd response: success
2,770,448 UART: [afmc] ++
2,770,616 UART: [afmc] CDI.KEYID = 6
2,770,979 UART: [afmc] SUBJECT.KEYID = 7
2,771,405 UART: [afmc] AUTHORITY.KEYID = 5
2,807,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,166 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,049 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,768 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,681 UART: [afmc] --
2,850,633 UART: [cold-reset] --
2,851,351 UART: [state] Locking Datavault
2,852,474 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,078 UART: [state] Locking ICCM
2,853,566 UART: [exit] Launching FMC @ 0x40000130
2,858,895 UART:
2,858,911 UART: Running Caliptra FMC ...
2,859,319 UART:
2,859,373 UART: [state] CFI Enabled
2,870,362 UART: [fht] FMC Alias Private Key: 7
2,978,125 UART: [art] Extend RT PCRs Done
2,978,553 UART: [art] Lock RT PCRs Done
2,980,087 UART: [art] Populate DV Done
2,988,332 UART: [fht] FMC Alias Private Key: 7
2,989,306 UART: [art] Derive CDI
2,989,586 UART: [art] Store in in slot 0x4
3,075,317 UART: [art] Derive Key Pair
3,075,677 UART: [art] Store priv key in slot 0x5
3,089,041 UART: [art] Derive Key Pair - Done
3,103,846 UART: [art] Signing Cert with AUTHO
3,104,326 UART: RITY.KEYID = 7
3,119,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,085 UART: [art] PUB.X = 13095AE300092777F74F78C7AB2283C4EF818C85A154FF32294B8492D127B4D2EBA0906798FF2CEC1A99D55FE09DDE68
3,126,831 UART: [art] PUB.Y = ED9F753EC5451A214644B04A9D3B2992E78D9222AD7C52014CE54C832615895E8FC9E2747D97038F3728403BC6EAA8B6
3,133,773 UART: [art] SIG.R = 85847F31E47A765F10C59024359C89761D992A92E89D33D0FD18A1AE1D5C9149694426E9EA428EE9BC704588223B413F
3,140,535 UART: [art] SIG.S = 92B5A3F17A507D5F0BB2CA298C4A4FE55DEAAEF29307E497763D2C5181F9AA1C38ACF6D5432FF8BF541FFFAA10677F33
3,164,256 UART: Caliptra RT
3,164,509 UART: [state] CFI Enabled
3,271,841 UART: [rt] RT listening for mailbox commands...
3,272,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,881 UART: [rt]cmd =0x4d454153, len=108
3,324,050 >>> mbox cmd response data (12 bytes)
3,324,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,354,218 UART: [rt]cmd =0x4d454153, len=108
3,374,975 >>> mbox cmd response data (12 bytes)
3,374,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,107 UART: [rt]cmd =0x4d454153, len=108
3,426,478 >>> mbox cmd response data (12 bytes)
3,426,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,456,480 UART: [rt]cmd =0x4d454153, len=108
3,477,315 >>> mbox cmd response data (12 bytes)
3,477,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,507,431 UART: [rt]cmd =0x4d454153, len=108
3,527,988 >>> mbox cmd response data (12 bytes)
3,527,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,184 UART: [rt]cmd =0x4d454153, len=108
3,578,713 >>> mbox cmd response data (12 bytes)
3,578,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,655 UART: [rt]cmd =0x4d454153, len=108
3,628,818 >>> mbox cmd response data (12 bytes)
3,628,819 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,658,972 UART: [rt]cmd =0x4d454153, len=108
3,679,683 >>> mbox cmd response data (12 bytes)
3,679,684 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,665 UART: [rt]cmd =0x4d454153, len=108
3,730,128 >>> mbox cmd response data (12 bytes)
3,730,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,344 UART: [rt]cmd =0x4d454153, len=108
3,781,053 >>> mbox cmd response data (12 bytes)
3,781,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,811,071 UART: [rt]cmd =0x4d454153, len=108
3,831,222 >>> mbox cmd response data (12 bytes)
3,831,223 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,861,206 UART: [rt]cmd =0x4d454153, len=108
3,882,173 >>> mbox cmd response data (12 bytes)
3,882,174 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,443 UART: [rt]cmd =0x4d454153, len=108
3,933,680 >>> mbox cmd response data (12 bytes)
3,933,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,464 UART: [rt]cmd =0x4d454153, len=108
3,983,819 >>> mbox cmd response data (12 bytes)
3,983,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,013,787 UART: [rt]cmd =0x4d454153, len=108
4,034,902 >>> mbox cmd response data (12 bytes)
4,034,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,064,658 UART: [rt]cmd =0x4d454153, len=108
4,066,710 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,048 ready_for_fw is high
1,056,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,369 >>> mbox cmd response: success
2,681,035 UART:
2,681,051 UART: Running Caliptra FMC ...
2,681,459 UART:
2,681,513 UART: [state] CFI Enabled
2,691,864 UART: [fht] FMC Alias Private Key: 7
2,799,957 UART: [art] Extend RT PCRs Done
2,800,385 UART: [art] Lock RT PCRs Done
2,802,129 UART: [art] Populate DV Done
2,810,274 UART: [fht] FMC Alias Private Key: 7
2,811,216 UART: [art] Derive CDI
2,811,496 UART: [art] Store in in slot 0x4
2,896,993 UART: [art] Derive Key Pair
2,897,353 UART: [art] Store priv key in slot 0x5
2,910,243 UART: [art] Derive Key Pair - Done
2,924,925 UART: [art] Signing Cert with AUTHO
2,925,405 UART: RITY.KEYID = 7
2,940,629 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,394 UART: [art] PUB.X = 77BDD690836862E0D908DE158767EB7E7D0D8733C40CF3D652FAD401B6F7113E97D3F2BFFD5BB46B4EEC9636C067D522
2,948,162 UART: [art] PUB.Y = 2CA0D65A62639A4E8879FAC48039D1E9D25AC384080638997B9D67D3B1EB4A56B7DAD8724D815A7C9E09991E49FA5CD9
2,955,109 UART: [art] SIG.R = 30BA8267BDBD871F4D6BDC7985CF7F792C27AB5424CA350D1E0794D456DB88C5AE4008CE8C19DF8FA3321E21898183C5
2,961,880 UART: [art] SIG.S = EA17AF73A4C3EF278B17C09B6FD8023EB6DE34C00EF76EE86C9AC6902D40FEB245378CFA788A48E0888FDF227C4898E1
2,985,199 UART: Caliptra RT
2,985,452 UART: [state] CFI Enabled
3,092,693 UART: [rt] RT listening for mailbox commands...
3,093,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,693 UART: [rt]cmd =0x4d454153, len=108
3,143,998 >>> mbox cmd response data (12 bytes)
3,143,999 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,174,008 UART: [rt]cmd =0x4d454153, len=108
3,194,043 >>> mbox cmd response data (12 bytes)
3,194,044 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,209 UART: [rt]cmd =0x4d454153, len=108
3,245,532 >>> mbox cmd response data (12 bytes)
3,245,533 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,708 UART: [rt]cmd =0x4d454153, len=108
3,295,975 >>> mbox cmd response data (12 bytes)
3,295,976 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,043 UART: [rt]cmd =0x4d454153, len=108
3,347,406 >>> mbox cmd response data (12 bytes)
3,347,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,206 UART: [rt]cmd =0x4d454153, len=108
3,397,725 >>> mbox cmd response data (12 bytes)
3,397,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,427,607 UART: [rt]cmd =0x4d454153, len=108
3,448,960 >>> mbox cmd response data (12 bytes)
3,448,961 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,478,984 UART: [rt]cmd =0x4d454153, len=108
3,500,725 >>> mbox cmd response data (12 bytes)
3,500,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,913 UART: [rt]cmd =0x4d454153, len=108
3,551,842 >>> mbox cmd response data (12 bytes)
3,551,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,581,936 UART: [rt]cmd =0x4d454153, len=108
3,602,371 >>> mbox cmd response data (12 bytes)
3,602,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,632,341 UART: [rt]cmd =0x4d454153, len=108
3,653,590 >>> mbox cmd response data (12 bytes)
3,653,591 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,683,740 UART: [rt]cmd =0x4d454153, len=108
3,703,919 >>> mbox cmd response data (12 bytes)
3,703,920 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,815 UART: [rt]cmd =0x4d454153, len=108
3,754,966 >>> mbox cmd response data (12 bytes)
3,754,967 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,150 UART: [rt]cmd =0x4d454153, len=108
3,806,785 >>> mbox cmd response data (12 bytes)
3,806,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,836,817 UART: [rt]cmd =0x4d454153, len=108
3,857,830 >>> mbox cmd response data (12 bytes)
3,857,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,888,018 UART: [rt]cmd =0x4d454153, len=108
3,889,844 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,501 UART: [kat] SHA2-256
891,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,180 UART: [kat] ++
895,332 UART: [kat] sha1
899,506 UART: [kat] SHA2-256
901,446 UART: [kat] SHA2-384
904,195 UART: [kat] SHA2-512-ACC
906,096 UART: [kat] ECC-384
915,727 UART: [kat] HMAC-384Kdf
920,381 UART: [kat] LMS
1,168,693 UART: [kat] --
1,169,634 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,732 UART: [idev] ++
1,172,900 UART: [idev] CDI.KEYID = 6
1,173,261 UART: [idev] SUBJECT.KEYID = 7
1,173,686 UART: [idev] UDS.KEYID = 0
1,174,032 ready_for_fw is high
1,174,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,052 UART: [idev] Sha1 KeyId Algorithm
1,208,112 UART: [idev] --
1,209,035 UART: [ldev] ++
1,209,203 UART: [ldev] CDI.KEYID = 6
1,209,567 UART: [ldev] SUBJECT.KEYID = 5
1,209,994 UART: [ldev] AUTHORITY.KEYID = 7
1,210,457 UART: [ldev] FE.KEYID = 1
1,215,449 UART: [ldev] Erasing FE.KEYID = 1
1,241,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,585 UART: [ldev] --
1,280,937 UART: [fwproc] Wait for Commands...
1,281,584 UART: [fwproc] Recv command 0x46574c44
1,282,317 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,274 >>> mbox cmd response: success
2,773,467 UART: [afmc] ++
2,773,635 UART: [afmc] CDI.KEYID = 6
2,773,998 UART: [afmc] SUBJECT.KEYID = 7
2,774,424 UART: [afmc] AUTHORITY.KEYID = 5
2,809,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,920 UART: [afmc] --
2,852,926 UART: [cold-reset] --
2,853,882 UART: [state] Locking Datavault
2,854,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,341 UART: [state] Locking ICCM
2,855,999 UART: [exit] Launching FMC @ 0x40000130
2,861,328 UART:
2,861,344 UART: Running Caliptra FMC ...
2,861,752 UART:
2,861,895 UART: [state] CFI Enabled
2,872,612 UART: [fht] FMC Alias Private Key: 7
2,980,583 UART: [art] Extend RT PCRs Done
2,981,011 UART: [art] Lock RT PCRs Done
2,982,585 UART: [art] Populate DV Done
2,990,556 UART: [fht] FMC Alias Private Key: 7
2,991,504 UART: [art] Derive CDI
2,991,784 UART: [art] Store in in slot 0x4
3,077,527 UART: [art] Derive Key Pair
3,077,887 UART: [art] Store priv key in slot 0x5
3,091,485 UART: [art] Derive Key Pair - Done
3,106,568 UART: [art] Signing Cert with AUTHO
3,107,048 UART: RITY.KEYID = 7
3,122,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,073 UART: [art] PUB.X = 815B4C0D2B5BDA25597BD044ACC957B8FFAA4CF140F3B005471CE6F6184D181E993B7D45BDE65F8EA2E5164701B2DE3E
3,129,850 UART: [art] PUB.Y = 0C9EA39CB634EEECC280E5E4B4B0190ADB8B404605C9D51F9D01C2F26EABC612E8DE22B6C7AC893A4B093229D2B60FED
3,136,804 UART: [art] SIG.R = 078387BF9B9125CB6764AE236D4C7A065F9B232589600E0EAF88D90EEDE13CF15B27D57A84B8F4F2D078B36CE7FFCC9A
3,143,573 UART: [art] SIG.S = 589F7C0C05C0E9A806E46F20711534E928EF46C4B746F271FFBC1C4189FE2C6D18546E459C249B8209EC31EFCA9EFA3E
3,167,068 UART: Caliptra RT
3,167,413 UART: [state] CFI Enabled
3,274,744 UART: [rt] RT listening for mailbox commands...
3,275,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,688 UART: [rt]cmd =0x4d454153, len=108
3,326,115 >>> mbox cmd response data (12 bytes)
3,326,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,333 UART: [rt]cmd =0x4d454153, len=108
3,376,588 >>> mbox cmd response data (12 bytes)
3,376,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,552 UART: [rt]cmd =0x4d454153, len=108
3,427,547 >>> mbox cmd response data (12 bytes)
3,427,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,583 UART: [rt]cmd =0x4d454153, len=108
3,478,556 >>> mbox cmd response data (12 bytes)
3,478,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,508,762 UART: [rt]cmd =0x4d454153, len=108
3,529,779 >>> mbox cmd response data (12 bytes)
3,529,780 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,559,731 UART: [rt]cmd =0x4d454153, len=108
3,581,112 >>> mbox cmd response data (12 bytes)
3,581,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,134 UART: [rt]cmd =0x4d454153, len=108
3,631,611 >>> mbox cmd response data (12 bytes)
3,631,612 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,503 UART: [rt]cmd =0x4d454153, len=108
3,682,240 >>> mbox cmd response data (12 bytes)
3,682,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,712,312 UART: [rt]cmd =0x4d454153, len=108
3,733,901 >>> mbox cmd response data (12 bytes)
3,733,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,037 UART: [rt]cmd =0x4d454153, len=108
3,784,538 >>> mbox cmd response data (12 bytes)
3,784,539 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,814,606 UART: [rt]cmd =0x4d454153, len=108
3,834,643 >>> mbox cmd response data (12 bytes)
3,834,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,864,707 UART: [rt]cmd =0x4d454153, len=108
3,885,374 >>> mbox cmd response data (12 bytes)
3,885,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,698 UART: [rt]cmd =0x4d454153, len=108
3,936,633 >>> mbox cmd response data (12 bytes)
3,936,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,966,635 UART: [rt]cmd =0x4d454153, len=108
3,988,300 >>> mbox cmd response data (12 bytes)
3,988,301 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,018,288 UART: [rt]cmd =0x4d454153, len=108
4,038,893 >>> mbox cmd response data (12 bytes)
4,038,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,899 UART: [rt]cmd =0x4d454153, len=108
4,070,807 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,201 ready_for_fw is high
1,056,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,088 >>> mbox cmd response: success
2,685,072 UART:
2,685,088 UART: Running Caliptra FMC ...
2,685,496 UART:
2,685,639 UART: [state] CFI Enabled
2,696,072 UART: [fht] FMC Alias Private Key: 7
2,804,867 UART: [art] Extend RT PCRs Done
2,805,295 UART: [art] Lock RT PCRs Done
2,806,759 UART: [art] Populate DV Done
2,815,094 UART: [fht] FMC Alias Private Key: 7
2,816,262 UART: [art] Derive CDI
2,816,542 UART: [art] Store in in slot 0x4
2,902,391 UART: [art] Derive Key Pair
2,902,751 UART: [art] Store priv key in slot 0x5
2,916,435 UART: [art] Derive Key Pair - Done
2,931,556 UART: [art] Signing Cert with AUTHO
2,932,036 UART: RITY.KEYID = 7
2,947,128 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,893 UART: [art] PUB.X = 58E9FCCA40A6A0BF86220042E791CB415DFC9435F1D00947821B5AC32928899C47ECDFC6E27118807FB2137768F32C05
2,954,635 UART: [art] PUB.Y = 56D78FC0F07CBC38A14488C6706302A3DF5FF8E7B922196331401D093E618CA0D99B728AA6D8073F7801B48647766397
2,961,565 UART: [art] SIG.R = 49B4AD50ABCED5D9CFEF059637733712792697314F7FBB69F278BA6CEF1AE7B95CC650F810C2BCB82B68E2A7927BFA85
2,968,348 UART: [art] SIG.S = 494C112F0EB546EC5CC94F25873E7018A29E5E825512F8F176EFF6709CCDE2D486A063D1B9AF6DBD8BD6CC312871E39C
2,992,108 UART: Caliptra RT
2,992,453 UART: [state] CFI Enabled
3,100,486 UART: [rt] RT listening for mailbox commands...
3,101,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,660 UART: [rt]cmd =0x4d454153, len=108
3,152,285 >>> mbox cmd response data (12 bytes)
3,152,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,182,195 UART: [rt]cmd =0x4d454153, len=108
3,202,258 >>> mbox cmd response data (12 bytes)
3,202,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,232,430 UART: [rt]cmd =0x4d454153, len=108
3,253,505 >>> mbox cmd response data (12 bytes)
3,253,506 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,283,425 UART: [rt]cmd =0x4d454153, len=108
3,304,326 >>> mbox cmd response data (12 bytes)
3,304,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,370 UART: [rt]cmd =0x4d454153, len=108
3,354,507 >>> mbox cmd response data (12 bytes)
3,354,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,384,483 UART: [rt]cmd =0x4d454153, len=108
3,405,584 >>> mbox cmd response data (12 bytes)
3,405,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,736 UART: [rt]cmd =0x4d454153, len=108
3,456,841 >>> mbox cmd response data (12 bytes)
3,456,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,486,819 UART: [rt]cmd =0x4d454153, len=108
3,507,634 >>> mbox cmd response data (12 bytes)
3,507,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,784 UART: [rt]cmd =0x4d454153, len=108
3,559,519 >>> mbox cmd response data (12 bytes)
3,559,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,529 UART: [rt]cmd =0x4d454153, len=108
3,610,034 >>> mbox cmd response data (12 bytes)
3,610,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,960 UART: [rt]cmd =0x4d454153, len=108
3,661,841 >>> mbox cmd response data (12 bytes)
3,661,842 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,985 UART: [rt]cmd =0x4d454153, len=108
3,712,924 >>> mbox cmd response data (12 bytes)
3,712,925 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,742,914 UART: [rt]cmd =0x4d454153, len=108
3,763,507 >>> mbox cmd response data (12 bytes)
3,763,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,793,413 UART: [rt]cmd =0x4d454153, len=108
3,813,746 >>> mbox cmd response data (12 bytes)
3,813,747 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,843,866 UART: [rt]cmd =0x4d454153, len=108
3,864,309 >>> mbox cmd response data (12 bytes)
3,864,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,357 UART: [rt]cmd =0x4d454153, len=108
3,896,215 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,703 writing to cptra_bootfsm_go
2,219,175 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,363,570 UART:
2,364,002 UART: Running Caliptra ROM ...
2,365,173 UART:
2,365,350 UART: [state] CFI Enabled
2,366,306 UART: [state] LifecycleState = Unprovisioned
2,367,958 UART: [state] DebugLocked = No
2,369,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,372,364 UART: [kat] SHA2-256
2,373,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,376,039 UART: [kat] ++
2,376,490 UART: [kat] sha1
2,377,085 UART: [kat] SHA2-256
2,377,752 UART: [kat] SHA2-384
2,378,405 UART: [kat] SHA2-512-ACC
2,379,202 UART: [kat] ECC-384
2,766,422 UART: [kat] HMAC-384Kdf
2,777,119 UART: [kat] LMS
3,967,415 UART: [kat] --
3,971,923 UART: [cold-reset] ++
3,974,342 UART: [fht] Storing FHT @ 0x50003400
3,985,815 UART: [idev] ++
3,986,429 UART: [idev] CDI.KEYID = 6
3,987,304 UART: [idev] SUBJECT.KEYID = 7
3,988,565 UART: [idev] UDS.KEYID = 0
4,012,533 UART: [idev] Erasing UDS.KEYID = 0
7,324,270 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,875 UART: [idev] --
7,350,516 UART: [ldev] ++
7,351,133 UART: [ldev] CDI.KEYID = 6
7,352,103 UART: [ldev] SUBJECT.KEYID = 5
7,353,259 UART: [ldev] AUTHORITY.KEYID = 7
7,354,545 UART: [ldev] FE.KEYID = 1
7,398,736 UART: [ldev] Erasing FE.KEYID = 1
10,731,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,857 UART: [ldev] --
13,091,796 UART: [fwproc] Waiting for Commands...
13,094,352 UART: [fwproc] Received command 0x46574c44
13,096,532 UART: [fwproc] Received Image of size 113844 bytes
17,143,722 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,216,632 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,285,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,602,361 >>> mbox cmd response: success
17,606,468 UART: [afmc] ++
17,607,047 UART: [afmc] CDI.KEYID = 6
17,607,930 UART: [afmc] SUBJECT.KEYID = 7
17,609,215 UART: [afmc] AUTHORITY.KEYID = 5
20,977,041 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,170 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,556 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,413 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,849 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,350,385 UART: [afmc] --
23,354,246 UART: [cold-reset] --
23,358,693 UART: [state] Locking Datavault
23,365,601 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,345 UART: [state] Locking ICCM
23,368,394 UART: [exit] Launching FMC @ 0x40000130
23,376,788 UART:
23,377,016 UART: Running Caliptra FMC ...
23,378,113 UART:
23,378,287 UART: [state] CFI Enabled
23,439,880 UART: [fht] FMC Alias Private Key: 7
25,777,954 UART: [art] Extend RT PCRs Done
25,779,171 UART: [art] Lock RT PCRs Done
25,780,677 UART: [art] Populate DV Done
25,785,921 UART: [fht] FMC Alias Private Key: 7
25,787,505 UART: [art] Derive CDI
25,788,313 UART: [art] Store in in slot 0x4
25,848,384 UART: [art] Derive Key Pair
25,849,412 UART: [art] Store priv key in slot 0x5
29,143,641 UART: [art] Derive Key Pair - Done
29,156,743 UART: [art] Signing Cert with AUTHO
29,158,046 UART: RITY.KEYID = 7
31,444,575 UART: [art] Erasing AUTHORITY.KEYID = 7
31,446,081 UART: [art] PUB.X = 0754350663B1197D6F4930A95727388C8AEB49A696B23F6F4AAFF638243C0DEFF960BCAB3331D8913BD2515EB805ABD9
31,453,338 UART: [art] PUB.Y = 52FD9CD8B132DD69FC9D05B8244C6FC67025704F87B10E1F9E21DBE0F77B775356329BB5ED166E39467AC5F46AB2A0C5
31,460,611 UART: [art] SIG.R = DD9AA91CE234146824C2F938A22F260E453E5F11D2EE0EAF7101C49165E7E6E3D40813E9D01A8BA374238A9A08C226E7
31,467,965 UART: [art] SIG.S = 7A99158032232EE75F765C7A0E5130FA75CB469466E2C5C4DA5F31EABAEE85B4095C0B026324C4FF58A5916A7E3D80EB
32,772,678 UART: Caliptra RT
32,773,379 UART: [state] CFI Enabled
32,934,485 UART: [rt] RT listening for mailbox commands...
32,936,410 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,967,031 UART: [rt]cmd =0x44504543, len=92
32,973,469 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
2,219,931 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,872,055 >>> mbox cmd response: success
23,569,707 UART:
23,570,117 UART: Running Caliptra FMC ...
23,571,242 UART:
23,571,395 UART: [state] CFI Enabled
23,636,811 UART: [fht] FMC Alias Private Key: 7
25,975,521 UART: [art] Extend RT PCRs Done
25,976,746 UART: [art] Lock RT PCRs Done
25,978,319 UART: [art] Populate DV Done
25,984,015 UART: [fht] FMC Alias Private Key: 7
25,985,606 UART: [art] Derive CDI
25,986,416 UART: [art] Store in in slot 0x4
26,044,869 UART: [art] Derive Key Pair
26,045,913 UART: [art] Store priv key in slot 0x5
29,338,627 UART: [art] Derive Key Pair - Done
29,351,412 UART: [art] Signing Cert with AUTHO
29,352,713 UART: RITY.KEYID = 7
31,638,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,501 UART: [art] PUB.X = 8011DD9EC45BC5DC7E78C502BFADF1F612E7E15672387266B6CB75D14647B332F1CB4A5B0F3C6FEBE4BCE2642B42883F
31,647,776 UART: [art] PUB.Y = 6B03AAD9E93D7C9309818ACE9253D651F07677C7FC2EF450A814263F91CE9E549F5EC73043776EBC61EF5139C1943CE5
31,655,015 UART: [art] SIG.R = FC98C3A976932037ABE4B7EB623449799BF3839FA7F3EF26277E743877F46F219D6E63861135C441E5B23BE8DF09ECC3
31,662,395 UART: [art] SIG.S = 7C900385DBBD4B58071BA02188C2B31A07167C2FBF214D4CB1123A59F8407BB2DAEAB06A803B919E8A72F612CCDACB4B
32,967,544 UART: Caliptra RT
32,968,267 UART: [state] CFI Enabled
33,149,295 UART: [rt] RT listening for mailbox commands...
33,151,240 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,181,998 UART: [rt]cmd =0x44504543, len=92
33,188,160 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
2,299,056 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,443,462 UART:
2,443,856 UART: Running Caliptra ROM ...
2,444,940 UART:
2,445,098 UART: [state] CFI Enabled
2,446,077 UART: [state] LifecycleState = Unprovisioned
2,447,764 UART: [state] DebugLocked = No
2,448,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,452,097 UART: [kat] SHA2-256
2,452,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,455,765 UART: [kat] ++
2,456,217 UART: [kat] sha1
2,456,729 UART: [kat] SHA2-256
2,457,388 UART: [kat] SHA2-384
2,458,049 UART: [kat] SHA2-512-ACC
2,458,855 UART: [kat] ECC-384
3,115,627 UART: [kat] HMAC-384Kdf
3,128,152 UART: [kat] LMS
4,318,270 UART: [kat] --
4,321,897 UART: [cold-reset] ++
4,324,424 UART: [fht] Storing FHT @ 0x50003400
4,336,065 UART: [idev] ++
4,336,652 UART: [idev] CDI.KEYID = 6
4,337,567 UART: [idev] SUBJECT.KEYID = 7
4,338,836 UART: [idev] UDS.KEYID = 0
4,355,298 UART: [idev] Erasing UDS.KEYID = 0
7,623,152 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,910 UART: [idev] --
7,648,237 UART: [ldev] ++
7,648,822 UART: [ldev] CDI.KEYID = 6
7,649,790 UART: [ldev] SUBJECT.KEYID = 5
7,651,012 UART: [ldev] AUTHORITY.KEYID = 7
7,652,247 UART: [ldev] FE.KEYID = 1
7,662,948 UART: [ldev] Erasing FE.KEYID = 1
10,951,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,680 UART: [ldev] --
13,311,833 UART: [fwproc] Waiting for Commands...
13,314,154 UART: [fwproc] Received command 0x46574c44
13,316,345 UART: [fwproc] Received Image of size 113844 bytes
17,366,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,074 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,832,081 >>> mbox cmd response: success
17,835,507 UART: [afmc] ++
17,836,100 UART: [afmc] CDI.KEYID = 6
17,837,068 UART: [afmc] SUBJECT.KEYID = 7
17,838,288 UART: [afmc] AUTHORITY.KEYID = 5
21,151,790 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,045 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,461 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,304 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,728 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,688 UART: [afmc] --
23,517,146 UART: [cold-reset] --
23,520,357 UART: [state] Locking Datavault
23,526,901 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,653 UART: [state] Locking ICCM
23,531,211 UART: [exit] Launching FMC @ 0x40000130
23,539,603 UART:
23,539,844 UART: Running Caliptra FMC ...
23,540,873 UART:
23,541,023 UART: [state] CFI Enabled
23,549,213 UART: [fht] FMC Alias Private Key: 7
25,880,190 UART: [art] Extend RT PCRs Done
25,881,404 UART: [art] Lock RT PCRs Done
25,882,969 UART: [art] Populate DV Done
25,888,166 UART: [fht] FMC Alias Private Key: 7
25,889,609 UART: [art] Derive CDI
25,890,346 UART: [art] Store in in slot 0x4
25,933,101 UART: [art] Derive Key Pair
25,934,098 UART: [art] Store priv key in slot 0x5
29,176,072 UART: [art] Derive Key Pair - Done
29,189,227 UART: [art] Signing Cert with AUTHO
29,190,533 UART: RITY.KEYID = 7
31,470,246 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,754 UART: [art] PUB.X = C541BE70845C62D84FC347B5B5795FFA99AEA8AD9AAA64510EB8A98301C191816F1B1F9F7A7F2AC3488370E75B3574D1
31,478,959 UART: [art] PUB.Y = 5173675911E0B9554E2F30C3FE4DAD2E37515F89E7411DBF2AE5A5FD992646A2BFE71DA4ECFDB91EB11EDB7BEA2F13B2
31,486,252 UART: [art] SIG.R = 901AD6324AD98E110B602755259B8C0D2ACC522AE1ADF0808DB3FE1D9851CC2454C84BE83F800179D1E2E67CF5902200
31,493,606 UART: [art] SIG.S = 379A32720FA61D5613F9580D26C5CF3805AF23363047E8D9E08FA0A35D1FA1C7436BA6CCD57B7631047F322865104BEC
32,798,355 UART: Caliptra RT
32,799,058 UART: [state] CFI Enabled
32,916,852 UART: [rt] RT listening for mailbox commands...
32,918,767 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,949,324 UART: [rt]cmd =0x44504543, len=92
32,955,782 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,300,482 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,188 >>> mbox cmd response: success
23,716,426 UART:
23,716,825 UART: Running Caliptra FMC ...
23,718,025 UART:
23,718,203 UART: [state] CFI Enabled
23,725,559 UART: [fht] FMC Alias Private Key: 7
26,055,905 UART: [art] Extend RT PCRs Done
26,057,138 UART: [art] Lock RT PCRs Done
26,058,828 UART: [art] Populate DV Done
26,064,034 UART: [fht] FMC Alias Private Key: 7
26,065,580 UART: [art] Derive CDI
26,066,401 UART: [art] Store in in slot 0x4
26,109,818 UART: [art] Derive Key Pair
26,110,857 UART: [art] Store priv key in slot 0x5
29,352,178 UART: [art] Derive Key Pair - Done
29,365,439 UART: [art] Signing Cert with AUTHO
29,366,779 UART: RITY.KEYID = 7
31,646,337 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,836 UART: [art] PUB.X = 508D76CDC4D47991574705FEFCC38350C331055134D1A7F5FF4404EE65A677C3433FE82884CBCB6C81DDD13C421F8870
31,655,039 UART: [art] PUB.Y = 8EEA4C11105D94175AAE420B0958BFDD0856FB5695D295C88E301E306B94A2271EF0D0DEE315D1971B9ED5CB04E43B76
31,662,322 UART: [art] SIG.R = 97B2B53F6EA340DB5864EEF41376121B99B46FDCF775DEF9A740E86F534AA66A15B4033C38200931A7308E406B22370F
31,669,673 UART: [art] SIG.S = DFB1873ED2A283DBA202AE1F606E4134B86EDA9EEF152847183DE2B303422246E871303B2255E5BFDE34114D98D433FD
32,974,783 UART: Caliptra RT
32,975,497 UART: [state] CFI Enabled
33,092,753 UART: [rt] RT listening for mailbox commands...
33,094,667 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,125,502 UART: [rt]cmd =0x44504543, len=92
33,132,163 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,222,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,367,350 UART:
2,367,764 UART: Running Caliptra ROM ...
2,368,942 UART:
2,369,115 UART: [state] CFI Enabled
2,370,071 UART: [state] LifecycleState = Unprovisioned
2,371,733 UART: [state] DebugLocked = No
2,372,863 UART: [state] WD Timer not started. Device not locked for debugging
2,375,338 UART: [kat] SHA2-256
2,376,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,379,021 UART: [kat] ++
2,379,522 UART: [kat] sha1
2,380,041 UART: [kat] SHA2-256
2,380,702 UART: [kat] SHA2-384
2,381,357 UART: [kat] SHA2-512-ACC
2,382,186 UART: [kat] ECC-384
2,946,932 UART: [kat] HMAC-384Kdf
2,970,759 UART: [kat] LMS
3,500,229 UART: [kat] --
3,504,197 UART: [cold-reset] ++
3,505,275 UART: [fht] FHT @ 0x50003400
3,517,616 UART: [idev] ++
3,518,178 UART: [idev] CDI.KEYID = 6
3,519,161 UART: [idev] SUBJECT.KEYID = 7
3,520,325 UART: [idev] UDS.KEYID = 0
3,542,840 UART: [idev] Erasing UDS.KEYID = 0
6,024,469 UART: [idev] Sha1 KeyId Algorithm
6,048,345 UART: [idev] --
6,053,189 UART: [ldev] ++
6,053,773 UART: [ldev] CDI.KEYID = 6
6,054,691 UART: [ldev] SUBJECT.KEYID = 5
6,055,857 UART: [ldev] AUTHORITY.KEYID = 7
6,057,149 UART: [ldev] FE.KEYID = 1
6,098,799 UART: [ldev] Erasing FE.KEYID = 1
8,602,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,793 UART: [ldev] --
10,412,633 UART: [fwproc] Wait for Commands...
10,414,570 UART: [fwproc] Recv command 0x46574c44
10,416,616 UART: [fwproc] Recv'd Img size: 114168 bytes
13,812,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,274,203 >>> mbox cmd response: success
14,277,717 UART: [afmc] ++
14,278,313 UART: [afmc] CDI.KEYID = 6
14,279,227 UART: [afmc] SUBJECT.KEYID = 7
14,280,442 UART: [afmc] AUTHORITY.KEYID = 5
16,810,110 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,436 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,192 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,126 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,978 UART: [afmc] --
18,629,259 UART: [cold-reset] --
18,633,500 UART: [state] Locking Datavault
18,638,800 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,505 UART: [state] Locking ICCM
18,642,658 UART: [exit] Launching FMC @ 0x40000130
18,651,069 UART:
18,651,312 UART: Running Caliptra FMC ...
18,652,411 UART:
18,652,570 UART: [state] CFI Enabled
18,709,587 UART: [fht] FMC Alias Private Key: 7
20,473,768 UART: [art] Extend RT PCRs Done
20,474,991 UART: [art] Lock RT PCRs Done
20,476,667 UART: [art] Populate DV Done
20,482,261 UART: [fht] FMC Alias Private Key: 7
20,483,963 UART: [art] Derive CDI
20,484,777 UART: [art] Store in in slot 0x4
20,541,860 UART: [art] Derive Key Pair
20,542,901 UART: [art] Store priv key in slot 0x5
23,005,621 UART: [art] Derive Key Pair - Done
23,018,623 UART: [art] Signing Cert with AUTHO
23,019,929 UART: RITY.KEYID = 7
24,731,133 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,642 UART: [art] PUB.X = 6D8DD7778495E8DEC8D886F88FBBD90854381986BAE76D326195743A8579A496658FC6CD016024D5D0D86FC847AAEBCF
24,739,894 UART: [art] PUB.Y = 0DA38620A6F9C700FD6EC0F3A39D460F625FB9D0094BF3B179434138D0CF7352376986B7666CBFE30E0F0FF0B90E1A67
24,747,133 UART: [art] SIG.R = 93124504FEBEC9245D4C2EE1AC0D6670DBC7E5E68DDC694EEE32F705231CB77ACB6252031E7C96437DDC05CD711CA7A6
24,754,584 UART: [art] SIG.S = 072C2421A57AC08114A19A9F4AF8012B00709E3D35F5A7281E5CEA13D8926A29C4629207FC3676EA20F80D3B1EE7A535
25,733,041 UART: Caliptra RT
25,733,731 UART: [state] CFI Enabled
25,897,889 UART: [rt] RT listening for mailbox commands...
25,899,820 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,930,424 UART: [rt]cmd =0x44504543, len=92
25,936,994 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,858 writing to cptra_bootfsm_go
2,217,743 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,381 >>> mbox cmd response: success
18,365,394 UART:
18,365,824 UART: Running Caliptra FMC ...
18,366,941 UART:
18,367,100 UART: [state] CFI Enabled
18,431,071 UART: [fht] FMC Alias Private Key: 7
20,195,674 UART: [art] Extend RT PCRs Done
20,196,894 UART: [art] Lock RT PCRs Done
20,198,494 UART: [art] Populate DV Done
20,203,681 UART: [fht] FMC Alias Private Key: 7
20,205,221 UART: [art] Derive CDI
20,205,959 UART: [art] Store in in slot 0x4
20,263,540 UART: [art] Derive Key Pair
20,264,603 UART: [art] Store priv key in slot 0x5
22,727,519 UART: [art] Derive Key Pair - Done
22,740,692 UART: [art] Signing Cert with AUTHO
22,742,031 UART: RITY.KEYID = 7
24,452,970 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,481 UART: [art] PUB.X = 563282FEE5813B591EB27C1807A5618EAAA6E918B3DE113B19ACEA5DAA7D8728FC7468059154A9B96BCC6CAA6713FC5C
24,461,711 UART: [art] PUB.Y = F1F0930C35BD38A9AD8DB10433C6B8738706CF4956A5B419F7E473D0BEC4E69FDC664914EE62A5026F77EB6217BFCB5C
24,469,006 UART: [art] SIG.R = 95C60CB4365186FA6BF5F1B2E2B74A101E186714376EDACE10D53517CC716FBE61A57E30239A926DFA58219E7C62299A
24,476,393 UART: [art] SIG.S = 429A3C0A575C202A93431A992608919C925BD7C23ACD86A1320718B0B94DD8A7E76E0C81F94F522967FF8CB947F74BA1
25,455,513 UART: Caliptra RT
25,456,214 UART: [state] CFI Enabled
25,619,832 UART: [rt] RT listening for mailbox commands...
25,621,755 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,652,093 UART: [rt]cmd =0x44504543, len=92
25,658,125 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,593 writing to cptra_bootfsm_go
2,221,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,366,606 UART:
2,367,002 UART: Running Caliptra ROM ...
2,368,183 UART:
2,368,385 UART: [state] CFI Enabled
2,369,347 UART: [state] LifecycleState = Unprovisioned
2,370,995 UART: [state] DebugLocked = No
2,372,105 UART: [state] WD Timer not started. Device not locked for debugging
2,374,570 UART: [kat] SHA2-256
2,375,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,378,245 UART: [kat] ++
2,378,744 UART: [kat] sha1
2,379,261 UART: [kat] SHA2-256
2,379,919 UART: [kat] SHA2-384
2,380,577 UART: [kat] SHA2-512-ACC
2,381,408 UART: [kat] ECC-384
3,280,834 UART: [kat] HMAC-384Kdf
3,293,904 UART: [kat] LMS
3,823,412 UART: [kat] --
3,829,184 UART: [cold-reset] ++
3,831,562 UART: [fht] FHT @ 0x50003400
3,842,481 UART: [idev] ++
3,843,047 UART: [idev] CDI.KEYID = 6
3,843,959 UART: [idev] SUBJECT.KEYID = 7
3,845,174 UART: [idev] UDS.KEYID = 0
3,862,174 UART: [idev] Erasing UDS.KEYID = 0
6,317,342 UART: [idev] Sha1 KeyId Algorithm
6,340,751 UART: [idev] --
6,344,799 UART: [ldev] ++
6,345,367 UART: [ldev] CDI.KEYID = 6
6,346,246 UART: [ldev] SUBJECT.KEYID = 5
6,347,466 UART: [ldev] AUTHORITY.KEYID = 7
6,348,704 UART: [ldev] FE.KEYID = 1
6,360,731 UART: [ldev] Erasing FE.KEYID = 1
8,831,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,903 UART: [ldev] --
10,620,745 UART: [fwproc] Wait for Commands...
10,622,245 UART: [fwproc] Recv command 0x46574c44
10,624,245 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,494,223 >>> mbox cmd response: success
14,499,129 UART: [afmc] ++
14,499,717 UART: [afmc] CDI.KEYID = 6
14,500,627 UART: [afmc] SUBJECT.KEYID = 7
14,501,843 UART: [afmc] AUTHORITY.KEYID = 5
17,005,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,724,791 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,726,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,742,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,758,433 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,774,336 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,796,448 UART: [afmc] --
18,800,260 UART: [cold-reset] --
18,803,420 UART: [state] Locking Datavault
18,808,131 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,828 UART: [state] Locking ICCM
18,811,632 UART: [exit] Launching FMC @ 0x40000130
18,820,078 UART:
18,820,315 UART: Running Caliptra FMC ...
18,821,338 UART:
18,821,487 UART: [state] CFI Enabled
18,829,423 UART: [fht] FMC Alias Private Key: 7
20,586,135 UART: [art] Extend RT PCRs Done
20,587,611 UART: [art] Lock RT PCRs Done
20,588,945 UART: [art] Populate DV Done
20,594,268 UART: [fht] FMC Alias Private Key: 7
20,595,913 UART: [art] Derive CDI
20,596,649 UART: [art] Store in in slot 0x4
20,639,270 UART: [art] Derive Key Pair
20,640,311 UART: [art] Store priv key in slot 0x5
23,066,773 UART: [art] Derive Key Pair - Done
23,080,001 UART: [art] Signing Cert with AUTHO
23,081,317 UART: RITY.KEYID = 7
24,786,305 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,807 UART: [art] PUB.X = 5C39A6F2F7E917C69A84A7A1D2D0C95CF8A10C7BD5764CEF636BAEC08E397524EC6233611DC762619F239E1E6532A0E4
24,795,112 UART: [art] PUB.Y = B82446CD53020F1F5364A34B8463218330482B2ADCAD57D927EECDDF987E79DA2324AB488AD3EDF04EAEB546E2F204C0
24,802,355 UART: [art] SIG.R = 54BABA5D7F09AED2703A072FF6C5F525D31E4DDEB04822D6D903383E429BB72B69A7EFFF31345A60A45AD9224D62DA30
24,809,757 UART: [art] SIG.S = C709B86E5D677CB0624C517F5926EBF02FC4F160634B6B92500AA1CC4A999D6FC2B97C1187B00C4327A8A5A207EBB68D
25,788,724 UART: Caliptra RT
25,789,436 UART: [state] CFI Enabled
25,907,538 UART: [rt] RT listening for mailbox commands...
25,909,489 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,940,079 UART: [rt]cmd =0x44504543, len=92
25,946,485 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,342 writing to cptra_bootfsm_go
2,220,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,288,709 >>> mbox cmd response: success
18,541,121 UART:
18,541,517 UART: Running Caliptra FMC ...
18,542,654 UART:
18,542,825 UART: [state] CFI Enabled
18,551,102 UART: [fht] FMC Alias Private Key: 7
20,307,613 UART: [art] Extend RT PCRs Done
20,308,837 UART: [art] Lock RT PCRs Done
20,310,685 UART: [art] Populate DV Done
20,315,904 UART: [fht] FMC Alias Private Key: 7
20,317,343 UART: [art] Derive CDI
20,318,268 UART: [art] Store in in slot 0x4
20,360,499 UART: [art] Derive Key Pair
20,361,547 UART: [art] Store priv key in slot 0x5
22,788,243 UART: [art] Derive Key Pair - Done
22,801,200 UART: [art] Signing Cert with AUTHO
22,802,703 UART: RITY.KEYID = 7
24,508,428 UART: [art] Erasing AUTHORITY.KEYID = 7
24,509,922 UART: [art] PUB.X = F16365B98B8FBCA5A8B96636BF4BDF2616A7C7D38FABEFE26BCBCF89ABF5104878C9E8B2A9A61233202B72461C128CF0
24,517,234 UART: [art] PUB.Y = BF53EFB17BA1A3BA5D4989E52E7FE7286FDC66E132F6EBE422CC6B03CAD00A66EF511AA9CDB187F7660714C75F313276
24,524,505 UART: [art] SIG.R = 049D640E93E501D9F62AAE862D9E70328BEC16D1C4F957BBAC5BF8C7B1BF2BE47ECD140CA2AA385B947C426A1ECA73CF
24,531,959 UART: [art] SIG.S = 6FF98B41BC9724F2D0611A722FBED1880F4E6A54F2F2FD436AA1120F6B674C70781F1859EAAAC6E829F8786C07518852
25,510,920 UART: Caliptra RT
25,511,638 UART: [state] CFI Enabled
25,628,804 UART: [rt] RT listening for mailbox commands...
25,630,754 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,661,268 UART: [rt]cmd =0x44504543, len=92
25,667,408 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
2,217,311 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,361,947 UART:
2,362,359 UART: Running Caliptra ROM ...
2,363,532 UART:
2,363,707 UART: [state] CFI Enabled
2,364,681 UART: [state] LifecycleState = Unprovisioned
2,366,350 UART: [state] DebugLocked = No
2,367,457 UART: [state] WD Timer not started. Device not locked for debugging
2,370,272 UART: [kat] SHA2-256
2,370,956 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,373,979 UART: [kat] ++
2,374,431 UART: [kat] sha1
2,374,944 UART: [kat] SHA2-256
2,375,689 UART: [kat] SHA2-384
2,376,378 UART: [kat] SHA2-512-ACC
2,377,261 UART: [kat] ECC-384
2,947,477 UART: [kat] HMAC-384Kdf
2,971,458 UART: [kat] LMS
3,503,190 UART: [kat] --
3,509,579 UART: [cold-reset] ++
3,510,924 UART: [fht] FHT @ 0x50003400
3,522,291 UART: [idev] ++
3,522,977 UART: [idev] CDI.KEYID = 6
3,523,996 UART: [idev] SUBJECT.KEYID = 7
3,525,099 UART: [idev] UDS.KEYID = 0
3,542,988 UART: [idev] Erasing UDS.KEYID = 0
6,027,515 UART: [idev] Sha1 KeyId Algorithm
6,048,274 UART: [idev] --
6,053,477 UART: [ldev] ++
6,054,203 UART: [ldev] CDI.KEYID = 6
6,055,146 UART: [ldev] SUBJECT.KEYID = 5
6,056,260 UART: [ldev] AUTHORITY.KEYID = 7
6,057,438 UART: [ldev] FE.KEYID = 1
6,098,710 UART: [ldev] Erasing FE.KEYID = 1
8,606,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,946 UART: [ldev] --
10,411,426 UART: [fwproc] Wait for Commands...
10,414,009 UART: [fwproc] Recv command 0x46574c44
10,416,338 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,786 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,591,368 >>> mbox cmd response: success
14,596,008 UART: [afmc] ++
14,596,720 UART: [afmc] CDI.KEYID = 6
14,597,916 UART: [afmc] SUBJECT.KEYID = 7
14,599,362 UART: [afmc] AUTHORITY.KEYID = 5
17,128,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,848,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,850,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,866,012 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,881,158 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,896,139 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,919,089 UART: [afmc] --
18,922,148 UART: [cold-reset] --
18,927,424 UART: [state] Locking Datavault
18,933,559 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,761 UART: [state] Locking ICCM
18,938,604 UART: [exit] Launching FMC @ 0x40000130
18,947,297 UART:
18,947,534 UART: Running Caliptra FMC ...
18,948,639 UART:
18,948,800 UART: [state] CFI Enabled
19,006,241 UART: [fht] FMC Alias Private Key: 7
20,770,807 UART: [art] Extend RT PCRs Done
20,772,022 UART: [art] Lock RT PCRs Done
20,773,703 UART: [art] Populate DV Done
20,778,795 UART: [fht] FMC Alias Private Key: 7
20,780,502 UART: [art] Derive CDI
20,781,319 UART: [art] Store in in slot 0x4
20,839,467 UART: [art] Derive Key Pair
20,840,463 UART: [art] Store priv key in slot 0x5
23,303,812 UART: [art] Derive Key Pair - Done
23,316,867 UART: [art] Signing Cert with AUTHO
23,318,196 UART: RITY.KEYID = 7
25,029,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,031,128 UART: [art] PUB.X = FEEA5296822657853D671BD1C978427BBD52A39CD44A9D184F71A3A1B816DB0877C028C373828A1E32295C168C945757
25,038,350 UART: [art] PUB.Y = 7417588403206FC9F2207B070B6766D4EEA7E787289E30B7FFE8B3AB0FCE85DFF728EBD1B4CCA195952F2C9D9B948C57
25,045,611 UART: [art] SIG.R = 4282E7BA836AB90F7D3ACCA9117E941F88FB2769B271586520C924C3FDABF3138FA29F61BE9D39A4228C8111DFD5C4E8
25,053,031 UART: [art] SIG.S = 5536BB0D776B03BC626214A90EA8CD05390DDE2E8D21838BEC54D93215C00109F7F8CE326C6E8B196A1570478078A44E
26,031,786 UART: Caliptra RT
26,032,484 UART: [state] CFI Enabled
26,198,778 UART: [rt] RT listening for mailbox commands...
26,200,716 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,231,503 UART: [rt]cmd =0x44504543, len=92
26,237,954 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
2,218,605 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,746,419 >>> mbox cmd response: success
19,055,947 UART:
19,056,358 UART: Running Caliptra FMC ...
19,057,515 UART:
19,057,705 UART: [state] CFI Enabled
19,124,159 UART: [fht] FMC Alias Private Key: 7
20,888,268 UART: [art] Extend RT PCRs Done
20,889,485 UART: [art] Lock RT PCRs Done
20,890,736 UART: [art] Populate DV Done
20,896,148 UART: [fht] FMC Alias Private Key: 7
20,897,849 UART: [art] Derive CDI
20,898,663 UART: [art] Store in in slot 0x4
20,956,679 UART: [art] Derive Key Pair
20,957,727 UART: [art] Store priv key in slot 0x5
23,419,625 UART: [art] Derive Key Pair - Done
23,432,456 UART: [art] Signing Cert with AUTHO
23,433,770 UART: RITY.KEYID = 7
25,146,149 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,669 UART: [art] PUB.X = 67C2D0EE6FE61FAAC711AC153EE0E61A0FB43F69B6DDCE0760ABB902CEF48C00198EEEBAA500A68B9BB6301CB69003E4
25,154,956 UART: [art] PUB.Y = 22EE533BA3236682DDF1973BBDE4E95B665108DF3D8DD2B203B3C1F024223A67385DF4EBA72C4C3CA1C978900BA6EDC7
25,162,236 UART: [art] SIG.R = 570295BAFE456A97127ACCA6BF490D5D6023D07E3AD1BD2F74894928B0665BCAC07F93DEBC609460297E5B88F1831EF3
25,169,623 UART: [art] SIG.S = 95D9DC4134C72F1E6830E28B04E2225E58BF776F96B4F719752068C229ED269D716F58F8593F7E66726A5704A89C28F2
26,148,130 UART: Caliptra RT
26,148,819 UART: [state] CFI Enabled
26,313,353 UART: [rt] RT listening for mailbox commands...
26,315,280 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,345,834 UART: [rt]cmd =0x44504543, len=92
26,352,232 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,560 writing to cptra_bootfsm_go
2,222,872 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,367,728 UART:
2,368,133 UART: Running Caliptra ROM ...
2,369,254 UART:
2,369,423 UART: [state] CFI Enabled
2,370,396 UART: [state] LifecycleState = Unprovisioned
2,372,073 UART: [state] DebugLocked = No
2,373,118 UART: [state] WD Timer not started. Device not locked for debugging
2,375,610 UART: [kat] SHA2-256
2,376,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,379,299 UART: [kat] ++
2,379,772 UART: [kat] sha1
2,380,293 UART: [kat] SHA2-256
2,380,955 UART: [kat] SHA2-384
2,381,616 UART: [kat] SHA2-512-ACC
2,382,448 UART: [kat] ECC-384
3,294,206 UART: [kat] HMAC-384Kdf
3,306,585 UART: [kat] LMS
3,838,366 UART: [kat] --
3,843,108 UART: [cold-reset] ++
3,844,934 UART: [fht] FHT @ 0x50003400
3,856,566 UART: [idev] ++
3,857,277 UART: [idev] CDI.KEYID = 6
3,858,301 UART: [idev] SUBJECT.KEYID = 7
3,859,407 UART: [idev] UDS.KEYID = 0
3,877,118 UART: [idev] Erasing UDS.KEYID = 0
6,338,748 UART: [idev] Sha1 KeyId Algorithm
6,360,423 UART: [idev] --
6,365,503 UART: [ldev] ++
6,366,241 UART: [ldev] CDI.KEYID = 6
6,367,159 UART: [ldev] SUBJECT.KEYID = 5
6,368,322 UART: [ldev] AUTHORITY.KEYID = 7
6,369,499 UART: [ldev] FE.KEYID = 1
6,380,799 UART: [ldev] Erasing FE.KEYID = 1
8,857,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,651 UART: [ldev] --
10,648,914 UART: [fwproc] Wait for Commands...
10,650,582 UART: [fwproc] Recv command 0x46574c44
10,652,847 UART: [fwproc] Recv'd Img size: 114168 bytes
14,099,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,411 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,833,649 >>> mbox cmd response: success
14,838,263 UART: [afmc] ++
14,838,968 UART: [afmc] CDI.KEYID = 6
14,840,130 UART: [afmc] SUBJECT.KEYID = 7
14,841,670 UART: [afmc] AUTHORITY.KEYID = 5
17,343,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,358 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,521 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,532 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,321 UART: [afmc] --
19,140,231 UART: [cold-reset] --
19,145,904 UART: [state] Locking Datavault
19,151,972 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,174 UART: [state] Locking ICCM
19,156,219 UART: [exit] Launching FMC @ 0x40000130
19,164,893 UART:
19,165,131 UART: Running Caliptra FMC ...
19,166,231 UART:
19,166,386 UART: [state] CFI Enabled
19,174,649 UART: [fht] FMC Alias Private Key: 7
20,931,872 UART: [art] Extend RT PCRs Done
20,933,092 UART: [art] Lock RT PCRs Done
20,934,694 UART: [art] Populate DV Done
20,940,216 UART: [fht] FMC Alias Private Key: 7
20,941,858 UART: [art] Derive CDI
20,942,599 UART: [art] Store in in slot 0x4
20,985,299 UART: [art] Derive Key Pair
20,986,355 UART: [art] Store priv key in slot 0x5
23,412,817 UART: [art] Derive Key Pair - Done
23,425,761 UART: [art] Signing Cert with AUTHO
23,427,067 UART: RITY.KEYID = 7
25,132,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,658 UART: [art] PUB.X = 9B49E785B353C208C4B40E7F4772D24075C9EDC1FFE0035B17E6CB2E350778CA391AC75A464561DDB9229E116462D0F3
25,140,935 UART: [art] PUB.Y = ED0547937AE973BAD2D16EC0DD024CB2DC4B3BAD40AFC5D99BC13DA83C1581AAEC57A06A9300B54B98A387207762C25D
25,148,177 UART: [art] SIG.R = 255A0C7D5A3926F1C6417AA3B245E858CAB5BF084D68985A07ED6EE69FB01148AAF18A5C023C02F3E0E7444ABC4064D9
25,155,578 UART: [art] SIG.S = E949630AC1C5344D1FEEEDEB5B3A1DBC02620C9AD16C57251B1AAA9032777FEB5D26435AC6B1ADDD9F4DE58D825B68E2
26,134,635 UART: Caliptra RT
26,135,348 UART: [state] CFI Enabled
26,253,113 UART: [rt] RT listening for mailbox commands...
26,255,181 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,285,744 UART: [rt]cmd =0x44504543, len=92
26,292,255 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,591 writing to cptra_bootfsm_go
2,223,923 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,960,910 >>> mbox cmd response: success
19,218,285 UART:
19,218,701 UART: Running Caliptra FMC ...
19,219,852 UART:
19,220,015 UART: [state] CFI Enabled
19,227,633 UART: [fht] FMC Alias Private Key: 7
20,984,289 UART: [art] Extend RT PCRs Done
20,985,517 UART: [art] Lock RT PCRs Done
20,987,124 UART: [art] Populate DV Done
20,992,593 UART: [fht] FMC Alias Private Key: 7
20,994,192 UART: [art] Derive CDI
20,995,008 UART: [art] Store in in slot 0x4
21,037,589 UART: [art] Derive Key Pair
21,038,676 UART: [art] Store priv key in slot 0x5
23,465,708 UART: [art] Derive Key Pair - Done
23,478,648 UART: [art] Signing Cert with AUTHO
23,479,952 UART: RITY.KEYID = 7
25,185,073 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,573 UART: [art] PUB.X = 0DE66C136BE931177A2CE228DA47B21152ACD55CC8A8979908273933A33975F55A18929E38A0C4549381C5DB83839516
25,193,801 UART: [art] PUB.Y = 52C4FD7C8BBE1D85652BCAE29C786F47E5C363B5298F93780CA324EA312D016975288B9CA8896F70D411870A8311F501
25,201,025 UART: [art] SIG.R = BA88F367A1F2B9F10B7417F4DE5010572F36AA1889A2B5B352519DB0EF574FC6DBB07F85D89EF22FE1978FB51A1480C6
25,208,428 UART: [art] SIG.S = 32BCC320B2C8B5B1964C2419AE41A391BBD0CD3E6F61391018607EC45337240A14C4C7707F28A3DED85864F1F87936B8
26,187,312 UART: Caliptra RT
26,187,999 UART: [state] CFI Enabled
26,305,323 UART: [rt] RT listening for mailbox commands...
26,307,248 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,337,958 UART: [rt]cmd =0x44504543, len=92
26,344,335 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,555 UART: [kat] SHA2-256
892,493 UART: [kat] SHA2-384
895,204 UART: [kat] SHA2-512-ACC
897,105 UART: [kat] ECC-384
902,860 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,477,063 UART: [fht] Storing FHT @ 0x50003400
1,479,772 UART: [idev] ++
1,479,940 UART: [idev] CDI.KEYID = 6
1,480,300 UART: [idev] SUBJECT.KEYID = 7
1,480,724 UART: [idev] UDS.KEYID = 0
1,488,760 UART: [idev] Erasing UDS.KEYID = 0
1,505,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,428 UART: [idev] --
1,515,387 UART: [ldev] ++
1,515,555 UART: [ldev] CDI.KEYID = 6
1,515,918 UART: [ldev] SUBJECT.KEYID = 5
1,516,344 UART: [ldev] AUTHORITY.KEYID = 7
1,516,807 UART: [ldev] FE.KEYID = 1
1,521,943 UART: [ldev] Erasing FE.KEYID = 1
1,546,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,586,071 UART: [fwproc] Waiting for Commands...
1,586,764 UART: [fwproc] Received command 0x46574c44
1,587,555 UART: [fwproc] Received Image of size 114168 bytes
2,884,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,485 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,837 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,380 >>> mbox cmd response: success
3,078,616 UART: [afmc] ++
3,078,784 UART: [afmc] CDI.KEYID = 6
3,079,146 UART: [afmc] SUBJECT.KEYID = 7
3,079,571 UART: [afmc] AUTHORITY.KEYID = 5
3,114,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,996 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,881 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,571 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,480 UART: [afmc] --
3,157,568 UART: [cold-reset] --
3,158,498 UART: [state] Locking Datavault
3,159,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,191 UART: [state] Locking ICCM
3,160,847 UART: [exit] Launching FMC @ 0x40000130
3,166,176 UART:
3,166,192 UART: Running Caliptra FMC ...
3,166,600 UART:
3,166,654 UART: [state] CFI Enabled
3,176,883 UART: [fht] FMC Alias Private Key: 7
3,284,866 UART: [art] Extend RT PCRs Done
3,285,294 UART: [art] Lock RT PCRs Done
3,287,050 UART: [art] Populate DV Done
3,295,195 UART: [fht] FMC Alias Private Key: 7
3,296,267 UART: [art] Derive CDI
3,296,547 UART: [art] Store in in slot 0x4
3,382,394 UART: [art] Derive Key Pair
3,382,754 UART: [art] Store priv key in slot 0x5
3,395,578 UART: [art] Derive Key Pair - Done
3,410,193 UART: [art] Signing Cert with AUTHO
3,410,673 UART: RITY.KEYID = 7
3,425,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,698 UART: [art] PUB.X = F7F2C6D2E62FAD01F8A4668EE3C4530CE3089D08549DB2F5D5601778EF21EBEAAA6F784E4C4AE42A564145686ADEDA15
3,433,472 UART: [art] PUB.Y = 941C588A530F371CD062DCA3F05E9A3ED2DE58684FAFA8B5806AE6FE1329EF72FB20B86CB8EBDAFD3FD67459DAD293FF
3,440,445 UART: [art] SIG.R = 18D31EF391F7E80E3F6B5C15C42ACE52178B22C23A79D805C09E307691EF6E8E1FA6862DC7FFD02C32A7978D6A397106
3,447,212 UART: [art] SIG.S = 6D8FD8BC3A222467294BEB7E36F989706BC934A7358A6538D451E6E9EB2161F10D28508F17E9A72CDBCAC52E01064439
3,470,960 UART: Caliptra RT
3,471,213 UART: [state] CFI Enabled
3,579,377 UART: [rt] RT listening for mailbox commands...
3,580,047 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,573 UART: [rt]cmd =0x44504543, len=92
3,617,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,838 >>> mbox cmd response: success
2,986,122 UART:
2,986,138 UART: Running Caliptra FMC ...
2,986,546 UART:
2,986,600 UART: [state] CFI Enabled
2,997,425 UART: [fht] FMC Alias Private Key: 7
3,105,070 UART: [art] Extend RT PCRs Done
3,105,498 UART: [art] Lock RT PCRs Done
3,107,146 UART: [art] Populate DV Done
3,115,371 UART: [fht] FMC Alias Private Key: 7
3,116,399 UART: [art] Derive CDI
3,116,679 UART: [art] Store in in slot 0x4
3,202,626 UART: [art] Derive Key Pair
3,202,986 UART: [art] Store priv key in slot 0x5
3,216,794 UART: [art] Derive Key Pair - Done
3,231,360 UART: [art] Signing Cert with AUTHO
3,231,840 UART: RITY.KEYID = 7
3,246,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,655 UART: [art] PUB.X = BE3300C474D872A80996C164AA0E21A2DED9EA8993374763C494DD377BDF605E56774314BD88635B3A04108B246E6A40
3,254,390 UART: [art] PUB.Y = 42185F6C319F0F176E9DF54135F4B7DAE4FAB92FFA42FC04BC87C6838DB8BE9BDAD8A706CE1E7C0AE561B47B13205A20
3,261,348 UART: [art] SIG.R = 718D754A84B0089DB1416FFDE94B1AD49414F5997E81D55DEFBFD6781E3F756BD3744F4AE433C5A1F2E07E7EA2965542
3,268,123 UART: [art] SIG.S = 43FC738DCCF86FBEC0C3BC03AAE957F80D51E6989F61163DA4782CA1DC2EE847D903FF427422BAB5694FC4E523E8D836
3,291,973 UART: Caliptra RT
3,292,226 UART: [state] CFI Enabled
3,400,338 UART: [rt] RT listening for mailbox commands...
3,401,008 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,204 UART: [rt]cmd =0x44504543, len=92
3,438,382 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
891,140 UART: [kat] SHA2-256
893,078 UART: [kat] SHA2-384
895,925 UART: [kat] SHA2-512-ACC
897,826 UART: [kat] ECC-384
903,457 UART: [kat] HMAC-384Kdf
908,203 UART: [kat] LMS
1,476,399 UART: [kat] --
1,477,228 UART: [cold-reset] ++
1,477,608 UART: [fht] Storing FHT @ 0x50003400
1,480,435 UART: [idev] ++
1,480,603 UART: [idev] CDI.KEYID = 6
1,480,963 UART: [idev] SUBJECT.KEYID = 7
1,481,387 UART: [idev] UDS.KEYID = 0
1,489,141 UART: [idev] Erasing UDS.KEYID = 0
1,505,833 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,481 UART: [idev] --
1,515,704 UART: [ldev] ++
1,515,872 UART: [ldev] CDI.KEYID = 6
1,516,235 UART: [ldev] SUBJECT.KEYID = 5
1,516,661 UART: [ldev] AUTHORITY.KEYID = 7
1,517,124 UART: [ldev] FE.KEYID = 1
1,522,510 UART: [ldev] Erasing FE.KEYID = 1
1,547,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,274 UART: [fwproc] Waiting for Commands...
1,587,909 UART: [fwproc] Received command 0x46574c44
1,588,700 UART: [fwproc] Received Image of size 114168 bytes
2,884,698 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,156 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,037 >>> mbox cmd response: success
3,078,167 UART: [afmc] ++
3,078,335 UART: [afmc] CDI.KEYID = 6
3,078,697 UART: [afmc] SUBJECT.KEYID = 7
3,079,122 UART: [afmc] AUTHORITY.KEYID = 5
3,114,167 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,411 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,191 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,919 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,804 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,494 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,561 UART: [afmc] --
3,157,499 UART: [cold-reset] --
3,158,291 UART: [state] Locking Datavault
3,159,410 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,014 UART: [state] Locking ICCM
3,160,666 UART: [exit] Launching FMC @ 0x40000130
3,165,995 UART:
3,166,011 UART: Running Caliptra FMC ...
3,166,419 UART:
3,166,562 UART: [state] CFI Enabled
3,177,189 UART: [fht] FMC Alias Private Key: 7
3,285,088 UART: [art] Extend RT PCRs Done
3,285,516 UART: [art] Lock RT PCRs Done
3,287,294 UART: [art] Populate DV Done
3,295,813 UART: [fht] FMC Alias Private Key: 7
3,296,979 UART: [art] Derive CDI
3,297,259 UART: [art] Store in in slot 0x4
3,382,996 UART: [art] Derive Key Pair
3,383,356 UART: [art] Store priv key in slot 0x5
3,395,926 UART: [art] Derive Key Pair - Done
3,410,298 UART: [art] Signing Cert with AUTHO
3,410,778 UART: RITY.KEYID = 7
3,426,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,157 UART: [art] PUB.X = D006244B247F3189D67EC3ADCF734688C9714EA35318F027F742E91BDD9A62C1FC9CBACEF0A1A32E437424D6A5361EF6
3,433,934 UART: [art] PUB.Y = AE7B0AA667890FF570BFCCDF8D0A4F13780159878F629C55972E2BB4A7711AFAB759BF65B99A15BDD9C6BEE074CDB56A
3,440,892 UART: [art] SIG.R = B4E8B2C5BE2217111E12C083A3196BD4A7C2AD93E1BF8D7BA2FDB0EB5F2004E764CC5DB44A9880B3901984577F36AD30
3,447,671 UART: [art] SIG.S = 6929F8051D6D10A14B854B795AE38FEF46132621377AE4FD5D57393F3DBB671CA842AEA1382C6690B8D3DF162FFFE089
3,471,445 UART: Caliptra RT
3,471,790 UART: [state] CFI Enabled
3,580,085 UART: [rt] RT listening for mailbox commands...
3,580,755 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,191 UART: [rt]cmd =0x44504543, len=92
3,618,337 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,847 >>> mbox cmd response: success
2,987,875 UART:
2,987,891 UART: Running Caliptra FMC ...
2,988,299 UART:
2,988,442 UART: [state] CFI Enabled
2,999,147 UART: [fht] FMC Alias Private Key: 7
3,107,500 UART: [art] Extend RT PCRs Done
3,107,928 UART: [art] Lock RT PCRs Done
3,109,602 UART: [art] Populate DV Done
3,118,045 UART: [fht] FMC Alias Private Key: 7
3,119,181 UART: [art] Derive CDI
3,119,461 UART: [art] Store in in slot 0x4
3,205,224 UART: [art] Derive Key Pair
3,205,584 UART: [art] Store priv key in slot 0x5
3,218,954 UART: [art] Derive Key Pair - Done
3,233,984 UART: [art] Signing Cert with AUTHO
3,234,464 UART: RITY.KEYID = 7
3,250,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,977 UART: [art] PUB.X = AB14BC6C6C69DF4840B2940C9F75D75AED01D17B927FE051D4060DB4FE0B6007C70B344DAEEBEA10A6D132548C88B299
3,257,740 UART: [art] PUB.Y = C3042473AA5F5E3DE0E6BB4195C2275AD88E5DB57216C9D2221612766C5718D3AB15CFCBF09963E607DE62777EAE927E
3,264,690 UART: [art] SIG.R = 49E6A54D2DC580C3215EE464D55373CDBC08CE56FBDF8FB882544005A8243FFBEF8510175FF3C7EE6028025DB0D3F554
3,271,461 UART: [art] SIG.S = DD89CF4872D91A2B272DA43CC94FAF69FED15316303CFA990D9AC1970973304F8A8CD8EF8FC33AC4C331397DA71AAABC
3,294,586 UART: Caliptra RT
3,294,931 UART: [state] CFI Enabled
3,402,952 UART: [rt] RT listening for mailbox commands...
3,403,622 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,418 UART: [rt]cmd =0x44504543, len=92
3,441,296 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
893,596 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,721 UART: [kat] ++
897,873 UART: [kat] sha1
902,141 UART: [kat] SHA2-256
904,081 UART: [kat] SHA2-384
906,846 UART: [kat] SHA2-512-ACC
908,747 UART: [kat] ECC-384
918,400 UART: [kat] HMAC-384Kdf
922,834 UART: [kat] LMS
1,171,162 UART: [kat] --
1,171,933 UART: [cold-reset] ++
1,172,405 UART: [fht] FHT @ 0x50003400
1,175,116 UART: [idev] ++
1,175,284 UART: [idev] CDI.KEYID = 6
1,175,644 UART: [idev] SUBJECT.KEYID = 7
1,176,068 UART: [idev] UDS.KEYID = 0
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,917 UART: [idev] Sha1 KeyId Algorithm
1,209,321 UART: [idev] --
1,210,249 UART: [ldev] ++
1,210,417 UART: [ldev] CDI.KEYID = 6
1,210,780 UART: [ldev] SUBJECT.KEYID = 5
1,211,206 UART: [ldev] AUTHORITY.KEYID = 7
1,211,669 UART: [ldev] FE.KEYID = 1
1,216,545 UART: [ldev] Erasing FE.KEYID = 1
1,243,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,565 UART: [ldev] --
1,282,946 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,394 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,912 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,517 >>> mbox cmd response: success
2,773,733 UART: [afmc] ++
2,773,901 UART: [afmc] CDI.KEYID = 6
2,774,263 UART: [afmc] SUBJECT.KEYID = 7
2,774,688 UART: [afmc] AUTHORITY.KEYID = 5
2,810,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,255 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,974 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,762 UART: [afmc] --
2,853,706 UART: [cold-reset] --
2,854,718 UART: [state] Locking Datavault
2,855,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,407 UART: [state] Locking ICCM
2,857,047 UART: [exit] Launching FMC @ 0x40000130
2,862,376 UART:
2,862,392 UART: Running Caliptra FMC ...
2,862,800 UART:
2,862,854 UART: [state] CFI Enabled
2,873,759 UART: [fht] FMC Alias Private Key: 7
2,981,392 UART: [art] Extend RT PCRs Done
2,981,820 UART: [art] Lock RT PCRs Done
2,983,372 UART: [art] Populate DV Done
2,991,559 UART: [fht] FMC Alias Private Key: 7
2,992,491 UART: [art] Derive CDI
2,992,771 UART: [art] Store in in slot 0x4
3,078,362 UART: [art] Derive Key Pair
3,078,722 UART: [art] Store priv key in slot 0x5
3,092,056 UART: [art] Derive Key Pair - Done
3,106,711 UART: [art] Signing Cert with AUTHO
3,107,191 UART: RITY.KEYID = 7
3,122,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,332 UART: [art] PUB.X = 803E019BAB393C6DEE5477CC05EAC791CBE1B9E6B2F2D61117505C57BA2A0B14F60E758987E2670F614AA45E935E16FF
3,130,097 UART: [art] PUB.Y = CB86085003CB05D8BDC7EE32C0D85C9BEC7980CCB33CA51821A81A73D5452576FC119704BC93DC27921617B9A5F7F5AE
3,137,045 UART: [art] SIG.R = 9167F490C018DF3B6A510BE9FDBD2F4A1A9BF604045DCF76EDE5839E3F15724BFDFA901FF5B291E93D2B09C257D9F5AC
3,143,823 UART: [art] SIG.S = 8395C358406F832F1145E34D6C1EDF41D61C594FBD74042EAF71401DD89EC339C71DAB94806EB2A1FD98591AE5FD8C91
3,167,911 UART: Caliptra RT
3,168,164 UART: [state] CFI Enabled
3,276,262 UART: [rt] RT listening for mailbox commands...
3,276,932 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,342 UART: [rt]cmd =0x44504543, len=92
3,314,544 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,496 >>> mbox cmd response: success
2,686,534 UART:
2,686,550 UART: Running Caliptra FMC ...
2,686,958 UART:
2,687,012 UART: [state] CFI Enabled
2,697,605 UART: [fht] FMC Alias Private Key: 7
2,805,382 UART: [art] Extend RT PCRs Done
2,805,810 UART: [art] Lock RT PCRs Done
2,806,948 UART: [art] Populate DV Done
2,815,225 UART: [fht] FMC Alias Private Key: 7
2,816,243 UART: [art] Derive CDI
2,816,523 UART: [art] Store in in slot 0x4
2,901,946 UART: [art] Derive Key Pair
2,902,306 UART: [art] Store priv key in slot 0x5
2,915,228 UART: [art] Derive Key Pair - Done
2,929,898 UART: [art] Signing Cert with AUTHO
2,930,378 UART: RITY.KEYID = 7
2,945,448 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,213 UART: [art] PUB.X = FDB9F5C0B3777946E2456264ED9C5971B61141C61EACB288303205951491198FC4168422C278DD26938B8C2A1486F1BE
2,952,972 UART: [art] PUB.Y = E62649A6DBB55AC83D81DAFDB50896954D9073B36C93B35D0D55BA92AE57B15953F2947F2D286590F343BA7292A74AAE
2,959,922 UART: [art] SIG.R = 8DA40217708A2BE3D8C64EED24D5DF2695A35D835EC1F80658A3964C97814D3C08204C88909C66A84B357D7D90135F97
2,966,679 UART: [art] SIG.S = C3D6807B861EC1ACB9B98DFFC525CAF1E71759276802E79DCBF5C11E9141E55C0B1F4438A02FAD0A73996B7D714C25F4
2,990,145 UART: Caliptra RT
2,990,398 UART: [state] CFI Enabled
3,098,982 UART: [rt] RT listening for mailbox commands...
3,099,652 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,760 UART: [rt]cmd =0x44504543, len=92
3,136,690 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,186 UART: [kat] SHA2-256
904,126 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,291 UART: [kat] HMAC-384Kdf
922,713 UART: [kat] LMS
1,171,041 UART: [kat] --
1,172,026 UART: [cold-reset] ++
1,172,506 UART: [fht] FHT @ 0x50003400
1,174,991 UART: [idev] ++
1,175,159 UART: [idev] CDI.KEYID = 6
1,175,519 UART: [idev] SUBJECT.KEYID = 7
1,175,943 UART: [idev] UDS.KEYID = 0
1,183,947 UART: [idev] Erasing UDS.KEYID = 0
1,200,670 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,238 UART: [ldev] ++
1,210,406 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,195 UART: [ldev] AUTHORITY.KEYID = 7
1,211,658 UART: [ldev] FE.KEYID = 1
1,216,768 UART: [ldev] Erasing FE.KEYID = 1
1,243,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,612 UART: [ldev] --
1,282,895 UART: [fwproc] Wait for Commands...
1,283,551 UART: [fwproc] Recv command 0x46574c44
1,284,279 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,853 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,157 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,710 >>> mbox cmd response: success
2,771,742 UART: [afmc] ++
2,771,910 UART: [afmc] CDI.KEYID = 6
2,772,272 UART: [afmc] SUBJECT.KEYID = 7
2,772,697 UART: [afmc] AUTHORITY.KEYID = 5
2,808,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,431 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,044 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,763 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,423 UART: [afmc] --
2,851,487 UART: [cold-reset] --
2,852,635 UART: [state] Locking Datavault
2,854,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,652 UART: [state] Locking ICCM
2,855,266 UART: [exit] Launching FMC @ 0x40000130
2,860,595 UART:
2,860,611 UART: Running Caliptra FMC ...
2,861,019 UART:
2,861,162 UART: [state] CFI Enabled
2,871,705 UART: [fht] FMC Alias Private Key: 7
2,979,722 UART: [art] Extend RT PCRs Done
2,980,150 UART: [art] Lock RT PCRs Done
2,981,640 UART: [art] Populate DV Done
2,989,957 UART: [fht] FMC Alias Private Key: 7
2,990,927 UART: [art] Derive CDI
2,991,207 UART: [art] Store in in slot 0x4
3,076,902 UART: [art] Derive Key Pair
3,077,262 UART: [art] Store priv key in slot 0x5
3,090,934 UART: [art] Derive Key Pair - Done
3,105,629 UART: [art] Signing Cert with AUTHO
3,106,109 UART: RITY.KEYID = 7
3,121,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,906 UART: [art] PUB.X = C8752754220AD061B9D4E937DE447E077085D079DBF0F7CE92447015369A2E3932F30136FAC60ED2FEAA7AB272A1029F
3,128,663 UART: [art] PUB.Y = AE1105D33CC8F8B6A18567CF267389F68BE9BAD6B4BC670BD3E8BB8AB4134403E78A0EC9052F8355AF0927480C696E7B
3,135,602 UART: [art] SIG.R = ADDE718F5692D3CF0AF7A5966CBD5929C6836119513F0C964C4BB28B9A05BDF9A9762846FEE0BF8D51CD492945CBBEE2
3,142,379 UART: [art] SIG.S = B483E7C76F6992C9E5C79D75C020CCE553101883F6332537E5B285E9A63F13B5A60B774E875E09B3909C2F1B986B5C65
3,166,166 UART: Caliptra RT
3,166,511 UART: [state] CFI Enabled
3,274,959 UART: [rt] RT listening for mailbox commands...
3,275,629 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,881 UART: [rt]cmd =0x44504543, len=92
3,313,299 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,117 >>> mbox cmd response: success
2,686,857 UART:
2,686,873 UART: Running Caliptra FMC ...
2,687,281 UART:
2,687,424 UART: [state] CFI Enabled
2,698,135 UART: [fht] FMC Alias Private Key: 7
2,805,506 UART: [art] Extend RT PCRs Done
2,805,934 UART: [art] Lock RT PCRs Done
2,807,326 UART: [art] Populate DV Done
2,815,405 UART: [fht] FMC Alias Private Key: 7
2,816,409 UART: [art] Derive CDI
2,816,689 UART: [art] Store in in slot 0x4
2,901,770 UART: [art] Derive Key Pair
2,902,130 UART: [art] Store priv key in slot 0x5
2,915,538 UART: [art] Derive Key Pair - Done
2,930,436 UART: [art] Signing Cert with AUTHO
2,930,916 UART: RITY.KEYID = 7
2,946,728 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,493 UART: [art] PUB.X = 9C5978F72DCBEE6EFBAE2BE7495CF0C5076D946D1E21950CDED387A82F1329B1468BCC692E986993152F1FCA4BC5867A
2,954,271 UART: [art] PUB.Y = 299914E4A82DE86F22E01A93EDF836888AB5E5723495756F9690FAB877BC8740522A4D4A66294A4CCB77DDCF0898AD14
2,961,220 UART: [art] SIG.R = 13300F48A305E4FD271BC75457E59EFB252A1F35B9B4E1630D9E7717E44C71815628B0D4E9BDE733A6A4B53CC8AB2FB7
2,967,989 UART: [art] SIG.S = 2B9DF4584BD8C795C653655F36DF23EBFC4181911B7ECA6D8434C7E8C5B4542645DB0B1BBE9D634BA1C7967A30983C29
2,991,845 UART: Caliptra RT
2,992,190 UART: [state] CFI Enabled
3,100,337 UART: [rt] RT listening for mailbox commands...
3,101,007 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,237 UART: [rt]cmd =0x44504543, len=92
3,138,169 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,590 UART: [state] LifecycleState = Unprovisioned
85,245 UART: [state] DebugLocked = No
85,909 UART: [state] WD Timer not started. Device not locked for debugging
87,030 UART: [kat] SHA2-256
890,580 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,709 UART: [kat] ++
894,861 UART: [kat] sha1
899,079 UART: [kat] SHA2-256
901,019 UART: [kat] SHA2-384
903,816 UART: [kat] SHA2-512-ACC
905,717 UART: [kat] ECC-384
915,572 UART: [kat] HMAC-384Kdf
920,098 UART: [kat] LMS
1,168,410 UART: [kat] --
1,169,181 UART: [cold-reset] ++
1,169,621 UART: [fht] FHT @ 0x50003400
1,172,135 UART: [idev] ++
1,172,303 UART: [idev] CDI.KEYID = 6
1,172,664 UART: [idev] SUBJECT.KEYID = 7
1,173,089 UART: [idev] UDS.KEYID = 0
1,180,905 UART: [idev] Erasing UDS.KEYID = 0
1,198,165 UART: [idev] Sha1 KeyId Algorithm
1,207,095 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,241,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,084 UART: [ldev] --
1,280,588 UART: [fwproc] Wait for Commands...
1,281,197 UART: [fwproc] Recv command 0x46574c44
1,281,930 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,755 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,217 >>> mbox cmd response: success
2,770,316 UART: [afmc] ++
2,770,484 UART: [afmc] CDI.KEYID = 6
2,770,847 UART: [afmc] SUBJECT.KEYID = 7
2,771,273 UART: [afmc] AUTHORITY.KEYID = 5
2,806,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,106 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,989 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,549 UART: [afmc] --
2,850,477 UART: [cold-reset] --
2,851,465 UART: [state] Locking Datavault
2,852,808 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,412 UART: [state] Locking ICCM
2,853,872 UART: [exit] Launching FMC @ 0x40000130
2,859,201 UART:
2,859,217 UART: Running Caliptra FMC ...
2,859,625 UART:
2,859,679 UART: [state] CFI Enabled
2,870,422 UART: [fht] FMC Alias Private Key: 7
2,978,469 UART: [art] Extend RT PCRs Done
2,978,897 UART: [art] Lock RT PCRs Done
2,980,735 UART: [art] Populate DV Done
2,989,038 UART: [fht] FMC Alias Private Key: 7
2,990,062 UART: [art] Derive CDI
2,990,342 UART: [art] Store in in slot 0x4
3,076,355 UART: [art] Derive Key Pair
3,076,715 UART: [art] Store priv key in slot 0x5
3,090,315 UART: [art] Derive Key Pair - Done
3,105,090 UART: [art] Signing Cert with AUTHO
3,105,570 UART: RITY.KEYID = 7
3,120,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,689 UART: [art] PUB.X = 31C43C5ABE9C6E2F46E520E1F4727B1B59C013C9A4A19AAF583071F5E9553C7C4EA6F48ED512848CCA03EEE29E676525
3,128,466 UART: [art] PUB.Y = 5C3CA25C545B627683F3EA271DB7F12979CFE1B4BE75AFD8C1642065AA0958A360007E69B092E463B3AD294E9AE01599
3,135,395 UART: [art] SIG.R = 8E8FDDBD4C999885321D374EC20A8F1385EA2D2270D828B37F01B2FE99D30910E3A3CDBC528A406E765465EE03E32835
3,142,157 UART: [art] SIG.S = F5816F1E6967CDADD349677E73BCFE620D710A3CC1AEBB5E3E786859950BCC08F512E629290F28BDBCCF011BA320DCB3
3,165,780 UART: Caliptra RT
3,166,033 UART: [state] CFI Enabled
3,272,493 UART: [rt] RT listening for mailbox commands...
3,273,163 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,393 UART: [rt]cmd =0x44504543, len=92
3,310,789 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,921 >>> mbox cmd response: success
2,680,165 UART:
2,680,181 UART: Running Caliptra FMC ...
2,680,589 UART:
2,680,643 UART: [state] CFI Enabled
2,691,582 UART: [fht] FMC Alias Private Key: 7
2,800,029 UART: [art] Extend RT PCRs Done
2,800,457 UART: [art] Lock RT PCRs Done
2,801,995 UART: [art] Populate DV Done
2,810,404 UART: [fht] FMC Alias Private Key: 7
2,811,414 UART: [art] Derive CDI
2,811,694 UART: [art] Store in in slot 0x4
2,897,219 UART: [art] Derive Key Pair
2,897,579 UART: [art] Store priv key in slot 0x5
2,910,735 UART: [art] Derive Key Pair - Done
2,925,830 UART: [art] Signing Cert with AUTHO
2,926,310 UART: RITY.KEYID = 7
2,941,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,235 UART: [art] PUB.X = A23BA9144BC7F6371FBA26F86D7117EA8D01A44CC424AEC87A7D3684E53BA9A552AAEACA994791821E1651054524780B
2,949,002 UART: [art] PUB.Y = 95D8272D69652ED31DABB1B0663267C68C42A3DC9DF3B83AAC45A7C94C3B449D43497EEA1E036A35326AF4888857931C
2,955,953 UART: [art] SIG.R = 36D0113B05B62DDF9E2DD9B954C2758C4C8767DBA09C74E2391FF5E47424EE37EE0F386788FA704C3300CD865F815C62
2,962,699 UART: [art] SIG.S = FA916F9E4F1EF81A3854256DC33DE70DA2D9CDD3F22FE314CA6DE4BD68958981F829EEC8647D3AE5EC2C0508CAFC29D7
2,985,775 UART: Caliptra RT
2,986,028 UART: [state] CFI Enabled
3,093,309 UART: [rt] RT listening for mailbox commands...
3,093,979 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,589 UART: [rt]cmd =0x44504543, len=92
3,131,841 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,850 UART: [kat] ++
896,002 UART: [kat] sha1
900,422 UART: [kat] SHA2-256
902,362 UART: [kat] SHA2-384
905,043 UART: [kat] SHA2-512-ACC
906,944 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,675 UART: [kat] LMS
1,168,987 UART: [kat] --
1,169,848 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,172,782 UART: [idev] ++
1,172,950 UART: [idev] CDI.KEYID = 6
1,173,311 UART: [idev] SUBJECT.KEYID = 7
1,173,736 UART: [idev] UDS.KEYID = 0
1,181,890 UART: [idev] Erasing UDS.KEYID = 0
1,199,032 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,208,965 UART: [ldev] ++
1,209,133 UART: [ldev] CDI.KEYID = 6
1,209,497 UART: [ldev] SUBJECT.KEYID = 5
1,209,924 UART: [ldev] AUTHORITY.KEYID = 7
1,210,387 UART: [ldev] FE.KEYID = 1
1,215,569 UART: [ldev] Erasing FE.KEYID = 1
1,241,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,525 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,242 >>> mbox cmd response: success
2,771,477 UART: [afmc] ++
2,771,645 UART: [afmc] CDI.KEYID = 6
2,772,008 UART: [afmc] SUBJECT.KEYID = 7
2,772,434 UART: [afmc] AUTHORITY.KEYID = 5
2,808,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,944 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,275 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,066 UART: [afmc] --
2,852,154 UART: [cold-reset] --
2,852,976 UART: [state] Locking Datavault
2,854,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,611 UART: [state] Locking ICCM
2,855,119 UART: [exit] Launching FMC @ 0x40000130
2,860,448 UART:
2,860,464 UART: Running Caliptra FMC ...
2,860,872 UART:
2,861,015 UART: [state] CFI Enabled
2,871,570 UART: [fht] FMC Alias Private Key: 7
2,980,051 UART: [art] Extend RT PCRs Done
2,980,479 UART: [art] Lock RT PCRs Done
2,982,435 UART: [art] Populate DV Done
2,990,610 UART: [fht] FMC Alias Private Key: 7
2,991,648 UART: [art] Derive CDI
2,991,928 UART: [art] Store in in slot 0x4
3,077,691 UART: [art] Derive Key Pair
3,078,051 UART: [art] Store priv key in slot 0x5
3,091,309 UART: [art] Derive Key Pair - Done
3,106,239 UART: [art] Signing Cert with AUTHO
3,106,719 UART: RITY.KEYID = 7
3,121,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,762 UART: [art] PUB.X = 049B72B669B2920B5D068A4643EDAB90619BFC41EADA3B566F39380FD7AFF9FE6CD74671FAE3CF322BECDE03917335A9
3,129,533 UART: [art] PUB.Y = A7C3AAE24F29EF2CFD2F0AAC3C87BE88A666884723338A766F1958099B1CC7B9DA0318230EF556656659CEB027E34768
3,136,475 UART: [art] SIG.R = 67C31D14DE1EE5BE54A82940545FD9A630A3B211EFD6EBC2D1D9A861D894D88795A568B35A2BB43251E83EAECDF26907
3,143,254 UART: [art] SIG.S = E2C3C63670ECF019CDB33ECE0C3E32B307B21E8DD64F57BD02BBC09F983565A7C1BBED49C22351B562410410BFF4EF2F
3,167,201 UART: Caliptra RT
3,167,546 UART: [state] CFI Enabled
3,275,921 UART: [rt] RT listening for mailbox commands...
3,276,591 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,857 UART: [rt]cmd =0x44504543, len=92
3,313,849 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,990 >>> mbox cmd response: success
2,681,372 UART:
2,681,388 UART: Running Caliptra FMC ...
2,681,796 UART:
2,681,939 UART: [state] CFI Enabled
2,692,792 UART: [fht] FMC Alias Private Key: 7
2,799,897 UART: [art] Extend RT PCRs Done
2,800,325 UART: [art] Lock RT PCRs Done
2,801,597 UART: [art] Populate DV Done
2,809,654 UART: [fht] FMC Alias Private Key: 7
2,810,778 UART: [art] Derive CDI
2,811,058 UART: [art] Store in in slot 0x4
2,896,645 UART: [art] Derive Key Pair
2,897,005 UART: [art] Store priv key in slot 0x5
2,910,275 UART: [art] Derive Key Pair - Done
2,924,931 UART: [art] Signing Cert with AUTHO
2,925,411 UART: RITY.KEYID = 7
2,940,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,640 UART: [art] PUB.X = CB719E29D990B9B5D984FFF0F498A1F8685B6BF75EADF223BF8833E5F10D276ED99CB18ED1CC1AC42A7B2D576887BF31
2,948,425 UART: [art] PUB.Y = 961B6D2FD342C0FDC9BE84E71A79CCD0F9C499BDC9C5346B19D397722570E76F43CE4ABCAD0A82F10450F52C16540510
2,955,376 UART: [art] SIG.R = 4322FC9D49A7EC6DFAE6B80B27346A86F127F51C1E4D2275A04B2CDE2B5C654275CB883B4E9294C7F583BF964950BBEA
2,962,155 UART: [art] SIG.S = 3D82F82F565F9A6D02F90703E3B3FAA3806773BB8CB2C3B725750959DAB80347309D9BF49DB51C539B2645DDEA40A93C
2,985,885 UART: Caliptra RT
2,986,230 UART: [state] CFI Enabled
3,094,633 UART: [rt] RT listening for mailbox commands...
3,095,303 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,835 UART: [rt]cmd =0x44504543, len=92
3,133,149 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,022 UART:
192,403 UART: Running Caliptra ROM ...
193,502 UART:
193,639 UART: [state] CFI Enabled
263,468 UART: [state] LifecycleState = Unprovisioned
265,392 UART: [state] DebugLocked = No
268,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,048 UART: [kat] SHA2-256
442,741 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,224 UART: [kat] ++
453,739 UART: [kat] sha1
466,241 UART: [kat] SHA2-256
468,961 UART: [kat] SHA2-384
475,227 UART: [kat] SHA2-512-ACC
477,585 UART: [kat] ECC-384
2,765,853 UART: [kat] HMAC-384Kdf
2,779,923 UART: [kat] LMS
3,970,208 UART: [kat] --
3,974,690 UART: [cold-reset] ++
3,977,039 UART: [fht] Storing FHT @ 0x50003400
3,988,652 UART: [idev] ++
3,989,206 UART: [idev] CDI.KEYID = 6
3,990,201 UART: [idev] SUBJECT.KEYID = 7
3,991,440 UART: [idev] UDS.KEYID = 0
3,992,484 ready_for_fw is high
3,992,705 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,968 UART: [idev] Erasing UDS.KEYID = 0
7,326,711 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,080 UART: [idev] --
7,352,280 UART: [ldev] ++
7,352,839 UART: [ldev] CDI.KEYID = 6
7,353,814 UART: [ldev] SUBJECT.KEYID = 5
7,355,018 UART: [ldev] AUTHORITY.KEYID = 7
7,356,241 UART: [ldev] FE.KEYID = 1
7,404,092 UART: [ldev] Erasing FE.KEYID = 1
10,732,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,586 UART: [ldev] --
13,097,566 UART: [fwproc] Waiting for Commands...
13,100,082 UART: [fwproc] Received command 0x46574c44
13,102,319 UART: [fwproc] Received Image of size 113844 bytes
17,147,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,603,408 >>> mbox cmd response: success
17,604,098 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,608,188 UART: [afmc] ++
17,608,775 UART: [afmc] CDI.KEYID = 6
17,609,658 UART: [afmc] SUBJECT.KEYID = 7
17,610,919 UART: [afmc] AUTHORITY.KEYID = 5
20,970,065 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,270,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,272,982 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,287,421 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,302,240 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,316,630 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,338,166 UART: [afmc] --
23,341,757 UART: [cold-reset] --
23,345,712 UART: [state] Locking Datavault
23,350,572 UART: [state] Locking PCR0, PCR1 and PCR31
23,352,335 UART: [state] Locking ICCM
23,353,831 UART: [exit] Launching FMC @ 0x40000130
23,362,219 UART:
23,362,447 UART: Running Caliptra FMC ...
23,363,539 UART:
23,363,893 UART: [state] CFI Enabled
23,430,176 UART: [fht] FMC Alias Private Key: 7
25,767,905 UART: [art] Extend RT PCRs Done
25,769,125 UART: [art] Lock RT PCRs Done
25,770,876 UART: [art] Populate DV Done
25,776,331 UART: [fht] FMC Alias Private Key: 7
25,777,967 UART: [art] Derive CDI
25,778,699 UART: [art] Store in in slot 0x4
25,837,430 UART: [art] Derive Key Pair
25,838,421 UART: [art] Store priv key in slot 0x5
29,131,044 UART: [art] Derive Key Pair - Done
29,143,903 UART: [art] Signing Cert with AUTHO
29,145,207 UART: RITY.KEYID = 7
31,433,010 UART: [art] Erasing AUTHORITY.KEYID = 7
31,434,516 UART: [art] PUB.X = 01CA8D439C91CDBE212D66AC697FE0CE7F2A11C26AEDB8B5AA7D6E4D422C321C85B0BDDB9CE6D1958AD0FBCA4CE24356
31,441,819 UART: [art] PUB.Y = 04A5BF05EE390038BCB377B68E6FBFA34240C68E6C956F41B3881F8FA2210597DA903E3407DC51AB13D459063B021B62
31,449,050 UART: [art] SIG.R = 979DE87C9779A943762FE30625EB480BD1630E2EC49B1152744BA0B32667009562B3A0AD8CCA1CA402F060713CA2E78F
31,456,410 UART: [art] SIG.S = ED6019A925B99876B3ECA140944D364CDD8673D33C99AE6A14E4CFA0ED8DDBACA1AECA285EA015550F11B81C49E31FA7
32,761,981 UART: Caliptra RT
32,762,692 UART: [state] CFI Enabled
32,922,431 UART: [rt] RT listening for mailbox commands...
32,953,897 UART: [rt]cmd =0x50435245, len=56
32,955,805 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,802,307 ready_for_fw is high
3,802,681 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,854,284 >>> mbox cmd response: success
17,855,105 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,541,013 UART:
23,541,393 UART: Running Caliptra FMC ...
23,542,545 UART:
23,542,718 UART: [state] CFI Enabled
23,608,015 UART: [fht] FMC Alias Private Key: 7
25,946,396 UART: [art] Extend RT PCRs Done
25,947,631 UART: [art] Lock RT PCRs Done
25,949,441 UART: [art] Populate DV Done
25,954,948 UART: [fht] FMC Alias Private Key: 7
25,956,590 UART: [art] Derive CDI
25,957,395 UART: [art] Store in in slot 0x4
26,015,938 UART: [art] Derive Key Pair
26,016,989 UART: [art] Store priv key in slot 0x5
29,309,465 UART: [art] Derive Key Pair - Done
29,322,141 UART: [art] Signing Cert with AUTHO
29,323,444 UART: RITY.KEYID = 7
31,611,578 UART: [art] Erasing AUTHORITY.KEYID = 7
31,613,086 UART: [art] PUB.X = 56875A778A8C50065E53CD137C0CBE26C1AF23D8F4EDBAC51BE5ACC4A7619BD88A8C8B71D9E4446664F657F26E655C11
31,620,328 UART: [art] PUB.Y = CDBB08A3882CCEE32AA25F6C346AB770717B5592FFA51B473C819C2455430345836EB89AF15608069837045253D31C16
31,627,568 UART: [art] SIG.R = 49C9A6EAB67931BB1A1371278B5C03C2A44F6DCF72DF270A38A8A0D7DB4DEF4971B90562B78D6CCB5A4F4A812E61551C
31,634,948 UART: [art] SIG.S = 7575AD6693328BD4D5138AA6E6FB0E54B0FB158B9A1A45B2BBE491EF3CF68EFBBC5B5C931140999843E1068791B91F9A
32,939,822 UART: Caliptra RT
32,940,534 UART: [state] CFI Enabled
33,100,559 UART: [rt] RT listening for mailbox commands...
33,131,810 UART: [rt]cmd =0x50435245, len=56
33,133,246 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,418 UART:
192,787 UART: Running Caliptra ROM ...
193,966 UART:
603,632 UART: [state] CFI Enabled
617,331 UART: [state] LifecycleState = Unprovisioned
619,310 UART: [state] DebugLocked = No
621,558 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,076 UART: [kat] SHA2-256
795,809 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,321 UART: [kat] ++
806,959 UART: [kat] sha1
817,777 UART: [kat] SHA2-256
820,492 UART: [kat] SHA2-384
826,976 UART: [kat] SHA2-512-ACC
829,355 UART: [kat] ECC-384
3,113,808 UART: [kat] HMAC-384Kdf
3,125,355 UART: [kat] LMS
4,315,443 UART: [kat] --
4,319,335 UART: [cold-reset] ++
4,320,768 UART: [fht] Storing FHT @ 0x50003400
4,333,105 UART: [idev] ++
4,333,668 UART: [idev] CDI.KEYID = 6
4,334,657 UART: [idev] SUBJECT.KEYID = 7
4,335,830 UART: [idev] UDS.KEYID = 0
4,336,925 ready_for_fw is high
4,337,143 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,606 UART: [idev] Erasing UDS.KEYID = 0
7,619,828 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,530 UART: [idev] --
7,645,827 UART: [ldev] ++
7,646,403 UART: [ldev] CDI.KEYID = 6
7,647,443 UART: [ldev] SUBJECT.KEYID = 5
7,648,552 UART: [ldev] AUTHORITY.KEYID = 7
7,649,838 UART: [ldev] FE.KEYID = 1
7,662,177 UART: [ldev] Erasing FE.KEYID = 1
10,949,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,757 UART: [ldev] --
13,310,643 UART: [fwproc] Waiting for Commands...
13,313,599 UART: [fwproc] Received command 0x46574c44
13,315,779 UART: [fwproc] Received Image of size 113844 bytes
17,365,440 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,824,862 >>> mbox cmd response: success
17,825,422 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,828,744 UART: [afmc] ++
17,829,326 UART: [afmc] CDI.KEYID = 6
17,830,240 UART: [afmc] SUBJECT.KEYID = 7
17,831,458 UART: [afmc] AUTHORITY.KEYID = 5
21,149,176 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,442,317 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,444,576 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,956 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,768 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,488,190 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,926 UART: [afmc] --
23,512,939 UART: [cold-reset] --
23,516,537 UART: [state] Locking Datavault
23,520,120 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,898 UART: [state] Locking ICCM
23,523,569 UART: [exit] Launching FMC @ 0x40000130
23,531,964 UART:
23,532,199 UART: Running Caliptra FMC ...
23,533,299 UART:
23,533,478 UART: [state] CFI Enabled
23,541,528 UART: [fht] FMC Alias Private Key: 7
25,872,741 UART: [art] Extend RT PCRs Done
25,873,966 UART: [art] Lock RT PCRs Done
25,875,805 UART: [art] Populate DV Done
25,881,276 UART: [fht] FMC Alias Private Key: 7
25,882,973 UART: [art] Derive CDI
25,883,787 UART: [art] Store in in slot 0x4
25,926,218 UART: [art] Derive Key Pair
25,927,255 UART: [art] Store priv key in slot 0x5
29,169,653 UART: [art] Derive Key Pair - Done
29,182,955 UART: [art] Signing Cert with AUTHO
29,184,279 UART: RITY.KEYID = 7
31,463,529 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,032 UART: [art] PUB.X = 74A546E191A0DDD3BAD556D7ADEDA79BB0FF92D9A316399F1EE7E6319D45E6D9CE43346490E80132EEE402748D3CB5D0
31,472,286 UART: [art] PUB.Y = DEF679D3F286719FECBADBE09C3BDEA0EDC4D1B3199965E46DB536E0EDD88F8EBB61802F1AC0240002A8296275473C97
31,479,522 UART: [art] SIG.R = 96D65776265084C6D615EE0C0A8003023FB51EC67649A84E0721F55F4C0042C9D62A1FF3C58ECB2827B567C9B8EDDD34
31,486,921 UART: [art] SIG.S = 201C8AF8BC634F90B41D89F44DFAF04BE51373A3B79297C31F520BEBBBE255B854AA4651F0D3A2D5A3181100C6961F85
32,792,083 UART: Caliptra RT
32,792,777 UART: [state] CFI Enabled
32,909,809 UART: [rt] RT listening for mailbox commands...
32,941,800 UART: [rt]cmd =0x50435245, len=56
32,943,847 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,125,506 ready_for_fw is high
4,125,877 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,059,728 >>> mbox cmd response: success
18,060,391 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,691,687 UART:
23,692,067 UART: Running Caliptra FMC ...
23,693,280 UART:
23,693,455 UART: [state] CFI Enabled
23,701,277 UART: [fht] FMC Alias Private Key: 7
26,031,982 UART: [art] Extend RT PCRs Done
26,033,200 UART: [art] Lock RT PCRs Done
26,034,833 UART: [art] Populate DV Done
26,040,241 UART: [fht] FMC Alias Private Key: 7
26,041,779 UART: [art] Derive CDI
26,042,568 UART: [art] Store in in slot 0x4
26,085,343 UART: [art] Derive Key Pair
26,086,384 UART: [art] Store priv key in slot 0x5
29,328,187 UART: [art] Derive Key Pair - Done
29,340,972 UART: [art] Signing Cert with AUTHO
29,342,277 UART: RITY.KEYID = 7
31,621,307 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,819 UART: [art] PUB.X = 3F61342536A1B4718361B8CAA69B40A76599572F6EE8999BFF5F88BB0C3BC1EC20F20D620FA86B3F11D9458F68C1BD27
31,630,027 UART: [art] PUB.Y = 5C0EC16B6A5B2C3F3FA2B5B778DF22BA41B8F98F6CC80EA9F3D8891047650F654DF852DCCA2216DE6E3C8D05F5CC360D
31,637,329 UART: [art] SIG.R = 47A082A35693C49A07A857F0DF2742933A4C1CA65F9E257B4AC575747783027B37C57E13CF7530184B870EEDF04DA81D
31,644,670 UART: [art] SIG.S = CFDB3E4E5D757C89174DBCB3B945FF82434AC60E2810F3CEC51633A9691F1C2173FB3FD64D24796AFA81F71B05777242
32,949,327 UART: Caliptra RT
32,950,030 UART: [state] CFI Enabled
33,068,084 UART: [rt] RT listening for mailbox commands...
33,100,097 UART: [rt]cmd =0x50435245, len=56
33,101,694 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,076 UART:
192,449 UART: Running Caliptra ROM ...
193,643 UART:
193,796 UART: [state] CFI Enabled
263,664 UART: [state] LifecycleState = Unprovisioned
265,582 UART: [state] DebugLocked = No
267,400 UART: [state] WD Timer not started. Device not locked for debugging
270,380 UART: [kat] SHA2-256
449,461 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,066 UART: [kat] ++
461,605 UART: [kat] sha1
472,375 UART: [kat] SHA2-256
475,343 UART: [kat] SHA2-384
481,922 UART: [kat] SHA2-512-ACC
484,862 UART: [kat] ECC-384
2,949,848 UART: [kat] HMAC-384Kdf
2,969,872 UART: [kat] LMS
3,499,316 UART: [kat] --
3,504,668 UART: [cold-reset] ++
3,507,072 UART: [fht] FHT @ 0x50003400
3,519,407 UART: [idev] ++
3,519,973 UART: [idev] CDI.KEYID = 6
3,520,857 UART: [idev] SUBJECT.KEYID = 7
3,522,103 UART: [idev] UDS.KEYID = 0
3,523,003 ready_for_fw is high
3,523,209 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,914 UART: [idev] Erasing UDS.KEYID = 0
6,024,442 UART: [idev] Sha1 KeyId Algorithm
6,046,770 UART: [idev] --
6,050,527 UART: [ldev] ++
6,051,108 UART: [ldev] CDI.KEYID = 6
6,052,025 UART: [ldev] SUBJECT.KEYID = 5
6,053,198 UART: [ldev] AUTHORITY.KEYID = 7
6,054,488 UART: [ldev] FE.KEYID = 1
6,098,958 UART: [ldev] Erasing FE.KEYID = 1
8,606,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,113 UART: [ldev] --
10,412,627 UART: [fwproc] Wait for Commands...
10,415,479 UART: [fwproc] Recv command 0x46574c44
10,417,572 UART: [fwproc] Recv'd Img size: 114168 bytes
13,821,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,454 >>> mbox cmd response: success
14,282,022 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,285,118 UART: [afmc] ++
14,285,705 UART: [afmc] CDI.KEYID = 6
14,286,614 UART: [afmc] SUBJECT.KEYID = 7
14,287,831 UART: [afmc] AUTHORITY.KEYID = 5
16,827,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,914 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,925 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,775 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,803 UART: [afmc] --
18,623,074 UART: [cold-reset] --
18,626,477 UART: [state] Locking Datavault
18,633,724 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,384 UART: [state] Locking ICCM
18,637,646 UART: [exit] Launching FMC @ 0x40000130
18,646,045 UART:
18,646,292 UART: Running Caliptra FMC ...
18,647,391 UART:
18,647,543 UART: [state] CFI Enabled
18,707,573 UART: [fht] FMC Alias Private Key: 7
20,471,035 UART: [art] Extend RT PCRs Done
20,472,255 UART: [art] Lock RT PCRs Done
20,473,906 UART: [art] Populate DV Done
20,479,426 UART: [fht] FMC Alias Private Key: 7
20,481,020 UART: [art] Derive CDI
20,481,834 UART: [art] Store in in slot 0x4
20,539,875 UART: [art] Derive Key Pair
20,540,893 UART: [art] Store priv key in slot 0x5
23,003,666 UART: [art] Derive Key Pair - Done
23,016,451 UART: [art] Signing Cert with AUTHO
23,017,764 UART: RITY.KEYID = 7
24,730,657 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,160 UART: [art] PUB.X = 9F06049DA4CC72AB5E3E60940FAFF9CACC17718145BEA03DA3D09AD0782D0F46028FD19EF2CF2F3475CAC4CC7DF7E578
24,739,480 UART: [art] PUB.Y = 1131BDDB3D437ABE7B0D491634FBA875E887F1167BD7C16FE90931E92E4F53DDDD3D8EF6AA5EC0A6C94F1B7EA53ACCD5
24,746,732 UART: [art] SIG.R = 693A0B6334DD67266F98D5F8B4E721CEB1DD7DCA92ABDAE5E389DED395845368A76824E17BA512CA1FAB7FB728C84117
24,754,145 UART: [art] SIG.S = F74F30A3C279B4E4BD237A92A6AA32FF79462AAB5A49AD9E275D1D7C9EF7C3325842EF3658523E7CC6727CB636E8378D
25,733,330 UART: Caliptra RT
25,734,047 UART: [state] CFI Enabled
25,897,721 UART: [rt] RT listening for mailbox commands...
25,929,726 UART: [rt]cmd =0x50435245, len=56
25,931,619 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,380,944 ready_for_fw is high
3,381,323 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,046,946 >>> mbox cmd response: success
14,047,583 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,346,651 UART:
18,347,025 UART: Running Caliptra FMC ...
18,348,208 UART:
18,348,385 UART: [state] CFI Enabled
18,411,822 UART: [fht] FMC Alias Private Key: 7
20,176,002 UART: [art] Extend RT PCRs Done
20,177,227 UART: [art] Lock RT PCRs Done
20,178,566 UART: [art] Populate DV Done
20,184,210 UART: [fht] FMC Alias Private Key: 7
20,185,806 UART: [art] Derive CDI
20,186,546 UART: [art] Store in in slot 0x4
20,244,854 UART: [art] Derive Key Pair
20,245,854 UART: [art] Store priv key in slot 0x5
22,708,601 UART: [art] Derive Key Pair - Done
22,721,383 UART: [art] Signing Cert with AUTHO
22,722,686 UART: RITY.KEYID = 7
24,434,562 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,066 UART: [art] PUB.X = 72B8565818F8FA4753BF91089E4A76DBDC186E22F28567EE3A580CC745AB34C3F93BCFCB57BFF4A9079103A9F0BAE5CA
24,443,363 UART: [art] PUB.Y = CD184DF344DB135DDD042BB8A462ED49EC14217E9B0989CC84AEE4F2FDB3185BA8381ADB86A031B3382848B567742249
24,450,621 UART: [art] SIG.R = D17248AA559715ED815EFC2FFA8D775FD4CE2799ACB24EFD67D425A3F66965CD967F43A3417F1E0F2AB5B41DECC56871
24,458,034 UART: [art] SIG.S = A1DC07D3C55804B825FBE11D6C6791271C2BA5FBAC202425BF392AB8291F2D0DBC22536D80E0632BAB99BC81A1584F6D
25,436,931 UART: Caliptra RT
25,437,648 UART: [state] CFI Enabled
25,601,120 UART: [rt] RT listening for mailbox commands...
25,632,795 UART: [rt]cmd =0x50435245, len=56
25,634,580 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
193,007 UART:
193,414 UART: Running Caliptra ROM ...
194,601 UART:
604,019 UART: [state] CFI Enabled
617,387 UART: [state] LifecycleState = Unprovisioned
619,252 UART: [state] DebugLocked = No
621,986 UART: [state] WD Timer not started. Device not locked for debugging
625,587 UART: [kat] SHA2-256
804,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,322 UART: [kat] ++
816,861 UART: [kat] sha1
828,236 UART: [kat] SHA2-256
831,313 UART: [kat] SHA2-384
838,723 UART: [kat] SHA2-512-ACC
841,734 UART: [kat] ECC-384
3,285,131 UART: [kat] HMAC-384Kdf
3,297,018 UART: [kat] LMS
3,826,476 UART: [kat] --
3,829,056 UART: [cold-reset] ++
3,830,068 UART: [fht] FHT @ 0x50003400
3,841,396 UART: [idev] ++
3,841,961 UART: [idev] CDI.KEYID = 6
3,842,912 UART: [idev] SUBJECT.KEYID = 7
3,844,087 UART: [idev] UDS.KEYID = 0
3,845,061 ready_for_fw is high
3,845,262 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,991 UART: [idev] Erasing UDS.KEYID = 0
6,309,490 UART: [idev] Sha1 KeyId Algorithm
6,333,084 UART: [idev] --
6,336,245 UART: [ldev] ++
6,336,820 UART: [ldev] CDI.KEYID = 6
6,337,733 UART: [ldev] SUBJECT.KEYID = 5
6,338,942 UART: [ldev] AUTHORITY.KEYID = 7
6,340,189 UART: [ldev] FE.KEYID = 1
6,350,299 UART: [ldev] Erasing FE.KEYID = 1
8,827,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,262 UART: [ldev] --
10,617,447 UART: [fwproc] Wait for Commands...
10,619,969 UART: [fwproc] Recv command 0x46574c44
10,622,061 UART: [fwproc] Recv'd Img size: 114168 bytes
14,021,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,900 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,481,305 >>> mbox cmd response: success
14,481,841 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,486,426 UART: [afmc] ++
14,487,053 UART: [afmc] CDI.KEYID = 6
14,487,972 UART: [afmc] SUBJECT.KEYID = 7
14,489,141 UART: [afmc] AUTHORITY.KEYID = 5
16,990,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,399 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,292 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,755 UART: [afmc] --
18,784,049 UART: [cold-reset] --
18,786,286 UART: [state] Locking Datavault
18,793,470 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,120 UART: [state] Locking ICCM
18,796,300 UART: [exit] Launching FMC @ 0x40000130
18,804,712 UART:
18,804,948 UART: Running Caliptra FMC ...
18,806,052 UART:
18,806,410 UART: [state] CFI Enabled
18,814,261 UART: [fht] FMC Alias Private Key: 7
20,571,289 UART: [art] Extend RT PCRs Done
20,572,508 UART: [art] Lock RT PCRs Done
20,574,264 UART: [art] Populate DV Done
20,579,778 UART: [fht] FMC Alias Private Key: 7
20,581,369 UART: [art] Derive CDI
20,582,184 UART: [art] Store in in slot 0x4
20,624,559 UART: [art] Derive Key Pair
20,625,560 UART: [art] Store priv key in slot 0x5
23,051,682 UART: [art] Derive Key Pair - Done
23,064,625 UART: [art] Signing Cert with AUTHO
23,065,924 UART: RITY.KEYID = 7
24,771,283 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,784 UART: [art] PUB.X = A730C497CCC6EB010C7D136B2436A944D6CA011E47FED0FF29FC611CF9E926823F690186B590938CF5FA179402CC98A6
24,780,091 UART: [art] PUB.Y = 35491F6D6D320F9CCACA3C2419CE9803118BA52CB4AE823B61055FC96AED7DA39139F3F380C5EF3F210D8D66E2EFC688
24,787,340 UART: [art] SIG.R = 46AAE13E6C09B3E787304146B3AC5F9CCB6FC1BEA4D625DF2137FFD5B638F2DC138F17999A8FC10DC725D65666BBD60B
24,794,739 UART: [art] SIG.S = F79F19A6734F0F406A928CC08B08E769FB679913DA7FE32E62DBBDE2705EDD83277D3D464EF44934A07BBA67F08C6788
25,773,921 UART: Caliptra RT
25,774,628 UART: [state] CFI Enabled
25,891,958 UART: [rt] RT listening for mailbox commands...
25,923,906 UART: [rt]cmd =0x50435245, len=56
25,925,655 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,752 writing to cptra_bootfsm_go
3,697,479 ready_for_fw is high
3,698,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,286,633 >>> mbox cmd response: success
14,287,319 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,538,731 UART:
18,539,133 UART: Running Caliptra FMC ...
18,540,267 UART:
18,540,428 UART: [state] CFI Enabled
18,548,376 UART: [fht] FMC Alias Private Key: 7
20,305,175 UART: [art] Extend RT PCRs Done
20,306,402 UART: [art] Lock RT PCRs Done
20,308,218 UART: [art] Populate DV Done
20,313,631 UART: [fht] FMC Alias Private Key: 7
20,315,222 UART: [art] Derive CDI
20,315,963 UART: [art] Store in in slot 0x4
20,358,613 UART: [art] Derive Key Pair
20,359,658 UART: [art] Store priv key in slot 0x5
22,786,342 UART: [art] Derive Key Pair - Done
22,799,400 UART: [art] Signing Cert with AUTHO
22,800,701 UART: RITY.KEYID = 7
24,506,341 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,865 UART: [art] PUB.X = 46FEB369C418998CDAEBD672612D64A0C08EFBDE6DF081B629711316603387D11540E2A0DA3F18ED534E8EF41CFB6228
24,515,112 UART: [art] PUB.Y = 748BCF0B572F169133727CC1C9D58F659F601E03B5068094BE1F900318A19B1A7DEF2E1D33446C7297128E33A83B88A3
24,522,362 UART: [art] SIG.R = 5FAB4F36C2187E143149B3D129E20D2E75C663B6362295641BC5A9FFD362CB0E32362AE7ECD39656558F88EFC87C7C15
24,529,767 UART: [art] SIG.S = 10F5902DCFA36238F51026A45CB1C1BE18FD7308957442A183D51F42790B79C6A38821157EA0C7D83A02BD9C0C104BB2
25,508,324 UART: Caliptra RT
25,509,023 UART: [state] CFI Enabled
25,626,156 UART: [rt] RT listening for mailbox commands...
25,657,796 UART: [rt]cmd =0x50435245, len=56
25,659,660 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,205 UART:
192,584 UART: Running Caliptra ROM ...
193,795 UART:
193,953 UART: [state] CFI Enabled
265,557 UART: [state] LifecycleState = Unprovisioned
267,977 UART: [state] DebugLocked = No
270,649 UART: [state] WD Timer not started. Device not locked for debugging
274,847 UART: [kat] SHA2-256
464,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,477 UART: [kat] ++
475,988 UART: [kat] sha1
486,730 UART: [kat] SHA2-256
489,743 UART: [kat] SHA2-384
497,013 UART: [kat] SHA2-512-ACC
499,611 UART: [kat] ECC-384
2,944,870 UART: [kat] HMAC-384Kdf
2,971,341 UART: [kat] LMS
3,503,121 UART: [kat] --
3,509,431 UART: [cold-reset] ++
3,510,970 UART: [fht] FHT @ 0x50003400
3,523,312 UART: [idev] ++
3,523,951 UART: [idev] CDI.KEYID = 6
3,524,978 UART: [idev] SUBJECT.KEYID = 7
3,526,159 UART: [idev] UDS.KEYID = 0
3,527,081 ready_for_fw is high
3,527,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,890 UART: [idev] Erasing UDS.KEYID = 0
6,032,013 UART: [idev] Sha1 KeyId Algorithm
6,054,726 UART: [idev] --
6,059,700 UART: [ldev] ++
6,060,382 UART: [ldev] CDI.KEYID = 6
6,061,305 UART: [ldev] SUBJECT.KEYID = 5
6,062,520 UART: [ldev] AUTHORITY.KEYID = 7
6,063,695 UART: [ldev] FE.KEYID = 1
6,100,066 UART: [ldev] Erasing FE.KEYID = 1
8,605,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,412 UART: [ldev] --
10,415,546 UART: [fwproc] Wait for Commands...
10,418,527 UART: [fwproc] Recv command 0x46574c44
10,420,841 UART: [fwproc] Recv'd Img size: 114168 bytes
13,869,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,598,801 >>> mbox cmd response: success
14,599,370 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,603,141 UART: [afmc] ++
14,603,840 UART: [afmc] CDI.KEYID = 6
14,605,081 UART: [afmc] SUBJECT.KEYID = 7
14,606,520 UART: [afmc] AUTHORITY.KEYID = 5
17,151,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,525 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,729 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,879 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,576 UART: [afmc] --
18,968,478 UART: [cold-reset] --
18,972,783 UART: [state] Locking Datavault
18,979,013 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,269 UART: [state] Locking ICCM
18,982,896 UART: [exit] Launching FMC @ 0x40000130
18,991,531 UART:
18,991,772 UART: Running Caliptra FMC ...
18,992,874 UART:
18,993,032 UART: [state] CFI Enabled
19,052,875 UART: [fht] FMC Alias Private Key: 7
20,815,919 UART: [art] Extend RT PCRs Done
20,817,185 UART: [art] Lock RT PCRs Done
20,818,843 UART: [art] Populate DV Done
20,824,368 UART: [fht] FMC Alias Private Key: 7
20,825,980 UART: [art] Derive CDI
20,826,801 UART: [art] Store in in slot 0x4
20,882,099 UART: [art] Derive Key Pair
20,883,142 UART: [art] Store priv key in slot 0x5
23,346,181 UART: [art] Derive Key Pair - Done
23,359,121 UART: [art] Signing Cert with AUTHO
23,360,460 UART: RITY.KEYID = 7
25,072,701 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,215 UART: [art] PUB.X = 3D01153F533F0F9EA581DF707961C0BC2F7D8043A1CBA2807287276585E1CF22517EAAA14FAFD8A63BDE8B395FAC2357
25,081,479 UART: [art] PUB.Y = 71DFE6385734099CCC8AD3CD202983341F52EA964C700551CF65CF247F1751B6CABE2F20CA4549EE3EAC2A99C0FFDE36
25,088,788 UART: [art] SIG.R = C25B14CDDAFC6B3337C935DF559CB818B06DE53825A7B5C4917048764ECEC4B6D6D27D155B4FFD54B8C8599FA47283E3
25,096,153 UART: [art] SIG.S = 299A6A8694BE10D0C68F36BD46210EDA5F45694652FE7A5F5A0AFBA1EB4355C307DA6B14CDE77FE8BF3BE99276FE6D34
26,075,436 UART: Caliptra RT
26,076,122 UART: [state] CFI Enabled
26,240,766 UART: [rt] RT listening for mailbox commands...
26,272,667 UART: [rt]cmd =0x50435245, len=56
26,274,498 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,419,585 ready_for_fw is high
3,419,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,699,645 >>> mbox cmd response: success
14,700,517 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,985,381 UART:
18,985,800 UART: Running Caliptra FMC ...
18,986,910 UART:
18,987,069 UART: [state] CFI Enabled
19,053,809 UART: [fht] FMC Alias Private Key: 7
20,818,130 UART: [art] Extend RT PCRs Done
20,819,344 UART: [art] Lock RT PCRs Done
20,820,701 UART: [art] Populate DV Done
20,826,277 UART: [fht] FMC Alias Private Key: 7
20,827,826 UART: [art] Derive CDI
20,828,594 UART: [art] Store in in slot 0x4
20,887,020 UART: [art] Derive Key Pair
20,888,063 UART: [art] Store priv key in slot 0x5
23,350,681 UART: [art] Derive Key Pair - Done
23,363,571 UART: [art] Signing Cert with AUTHO
23,364,887 UART: RITY.KEYID = 7
25,076,996 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,514 UART: [art] PUB.X = BA10D44F11BACBA74EA7CEA7E7D13D3AC084F48B7570AD609768B863404F0BDF7DAAD2937DA8D57825478DB4B026BC1C
25,085,819 UART: [art] PUB.Y = 0B48E25631D6ABBD77FCC409B4E036D8B6D9C29098F00AD52D0F1531E1F3A06240032C691A5C5F56371302941DC6F4D6
25,093,060 UART: [art] SIG.R = 16541C84D88C0ED98917C7E92C9B6EA13DEF9DE1664BB617100D939D059FE26B6547DB1AC0DFEFB43DADA7682106FEFF
25,100,451 UART: [art] SIG.S = C43DE2B7A17C9FA8307EF1B8E4D9E47577C2ABABFF72F213BCA50E64FC47C0258D79B7CD6EA4987E47D4F9084FCFB662
26,079,254 UART: Caliptra RT
26,079,973 UART: [state] CFI Enabled
26,245,395 UART: [rt] RT listening for mailbox commands...
26,277,554 UART: [rt]cmd =0x50435245, len=56
26,279,501 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,639 writing to cptra_bootfsm_go
192,969 UART:
193,343 UART: Running Caliptra ROM ...
194,487 UART:
603,985 UART: [state] CFI Enabled
620,049 UART: [state] LifecycleState = Unprovisioned
622,433 UART: [state] DebugLocked = No
625,381 UART: [state] WD Timer not started. Device not locked for debugging
629,699 UART: [kat] SHA2-256
819,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,325 UART: [kat] ++
830,933 UART: [kat] sha1
841,338 UART: [kat] SHA2-256
844,353 UART: [kat] SHA2-384
850,058 UART: [kat] SHA2-512-ACC
852,643 UART: [kat] ECC-384
3,292,884 UART: [kat] HMAC-384Kdf
3,305,755 UART: [kat] LMS
3,837,587 UART: [kat] --
3,843,947 UART: [cold-reset] ++
3,845,531 UART: [fht] FHT @ 0x50003400
3,858,077 UART: [idev] ++
3,858,715 UART: [idev] CDI.KEYID = 6
3,859,741 UART: [idev] SUBJECT.KEYID = 7
3,860,927 UART: [idev] UDS.KEYID = 0
3,861,856 ready_for_fw is high
3,862,054 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,432 UART: [idev] Erasing UDS.KEYID = 0
6,339,700 UART: [idev] Sha1 KeyId Algorithm
6,360,447 UART: [idev] --
6,364,601 UART: [ldev] ++
6,365,331 UART: [ldev] CDI.KEYID = 6
6,366,244 UART: [ldev] SUBJECT.KEYID = 5
6,367,406 UART: [ldev] AUTHORITY.KEYID = 7
6,368,636 UART: [ldev] FE.KEYID = 1
6,379,928 UART: [ldev] Erasing FE.KEYID = 1
8,855,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,764 UART: [ldev] --
10,644,963 UART: [fwproc] Wait for Commands...
10,647,757 UART: [fwproc] Recv command 0x46574c44
10,650,085 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,294,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,834,779 >>> mbox cmd response: success
14,835,342 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,838,463 UART: [afmc] ++
14,839,173 UART: [afmc] CDI.KEYID = 6
14,840,338 UART: [afmc] SUBJECT.KEYID = 7
14,841,826 UART: [afmc] AUTHORITY.KEYID = 5
17,344,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,146 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,082,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,097,488 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,112,669 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,136,448 UART: [afmc] --
19,139,241 UART: [cold-reset] --
19,142,727 UART: [state] Locking Datavault
19,147,381 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,529 UART: [state] Locking ICCM
19,152,120 UART: [exit] Launching FMC @ 0x40000130
19,160,788 UART:
19,161,035 UART: Running Caliptra FMC ...
19,162,143 UART:
19,162,304 UART: [state] CFI Enabled
19,170,257 UART: [fht] FMC Alias Private Key: 7
20,927,335 UART: [art] Extend RT PCRs Done
20,928,550 UART: [art] Lock RT PCRs Done
20,930,044 UART: [art] Populate DV Done
20,935,513 UART: [fht] FMC Alias Private Key: 7
20,937,155 UART: [art] Derive CDI
20,937,987 UART: [art] Store in in slot 0x4
20,980,636 UART: [art] Derive Key Pair
20,981,674 UART: [art] Store priv key in slot 0x5
23,408,200 UART: [art] Derive Key Pair - Done
23,421,034 UART: [art] Signing Cert with AUTHO
23,422,334 UART: RITY.KEYID = 7
25,127,850 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,369 UART: [art] PUB.X = 3B4FE9EEB11C62540F706F8A2C3AD3D182613377BDBB445FBA4A22D76ECB443E8D58ADE05A1093187ACEA3D2FD6B2A3A
25,136,613 UART: [art] PUB.Y = 6217C2E643D06D873D2A0324976C46A4C2F9CEC706A39F48116BF0041916C074261FD4D7EFF7230D52C8F768D6CBE422
25,143,896 UART: [art] SIG.R = 7E0A96C8091A5AC080AEE2F85E24618063DB327E042F7F10E4EE5D76D091E82EB8452EC2B3C3B4FBCD7BAFCF73CDD368
25,151,293 UART: [art] SIG.S = A792EAFC436CAF5D28F1B03DD7245FE4618B79EC3B7F511DC778B33E09F88B4468F43E745361E8C90869513EADFE56FF
26,129,911 UART: Caliptra RT
26,130,600 UART: [state] CFI Enabled
26,247,937 UART: [rt] RT listening for mailbox commands...
26,279,588 UART: [rt]cmd =0x50435245, len=56
26,281,676 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,567 writing to cptra_bootfsm_go
3,755,884 ready_for_fw is high
3,756,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,955,798 >>> mbox cmd response: success
14,956,638 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,206,810 UART:
19,207,232 UART: Running Caliptra FMC ...
19,208,378 UART:
19,208,545 UART: [state] CFI Enabled
19,216,544 UART: [fht] FMC Alias Private Key: 7
20,973,249 UART: [art] Extend RT PCRs Done
20,974,501 UART: [art] Lock RT PCRs Done
20,975,810 UART: [art] Populate DV Done
20,981,229 UART: [fht] FMC Alias Private Key: 7
20,982,878 UART: [art] Derive CDI
20,983,697 UART: [art] Store in in slot 0x4
21,025,914 UART: [art] Derive Key Pair
21,026,920 UART: [art] Store priv key in slot 0x5
23,453,666 UART: [art] Derive Key Pair - Done
23,466,492 UART: [art] Signing Cert with AUTHO
23,467,800 UART: RITY.KEYID = 7
25,173,702 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,205 UART: [art] PUB.X = D5BD79E5AF6F7FEE54F9145C47A01C73DF293F0FFB5200E10DCBD4B94FFFB96F35DC36F058A4B0351EB0088E03A25E30
25,182,503 UART: [art] PUB.Y = 79FE056F08D68AF8DB17604C68BDF958037F5D806B888F7227467BCFD984BBCB2EB50345EA373C70AC1C9A720CE11186
25,189,795 UART: [art] SIG.R = C659B25E3CEF9C5672BF12F0275958CB07C65B291AEE9080CA2EBB61B2BE45DD127DA8E4A015B736659EEC42F9B77448
25,197,223 UART: [art] SIG.S = DE962B0262CC46C9BA5607E8AA24318ED84C3D11E379A7F77AC255E7CF30DC79D0B8973EBBF58919AD56F42B58D00971
26,176,175 UART: Caliptra RT
26,176,911 UART: [state] CFI Enabled
26,294,440 UART: [rt] RT listening for mailbox commands...
26,326,379 UART: [rt]cmd =0x50435245, len=56
26,328,331 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,673 UART: [kat] SHA2-256
881,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,719 UART: [kat] ++
885,871 UART: [kat] sha1
890,057 UART: [kat] SHA2-256
891,995 UART: [kat] SHA2-384
894,870 UART: [kat] SHA2-512-ACC
896,771 UART: [kat] ECC-384
902,464 UART: [kat] HMAC-384Kdf
907,128 UART: [kat] LMS
1,475,324 UART: [kat] --
1,476,265 UART: [cold-reset] ++
1,476,683 UART: [fht] Storing FHT @ 0x50003400
1,479,564 UART: [idev] ++
1,479,732 UART: [idev] CDI.KEYID = 6
1,480,092 UART: [idev] SUBJECT.KEYID = 7
1,480,516 UART: [idev] UDS.KEYID = 0
1,480,861 ready_for_fw is high
1,480,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,502 UART: [idev] Erasing UDS.KEYID = 0
1,505,410 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,020 UART: [idev] --
1,515,145 UART: [ldev] ++
1,515,313 UART: [ldev] CDI.KEYID = 6
1,515,676 UART: [ldev] SUBJECT.KEYID = 5
1,516,102 UART: [ldev] AUTHORITY.KEYID = 7
1,516,565 UART: [ldev] FE.KEYID = 1
1,521,763 UART: [ldev] Erasing FE.KEYID = 1
1,547,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,690 UART: [ldev] --
1,587,169 UART: [fwproc] Waiting for Commands...
1,587,796 UART: [fwproc] Received command 0x46574c44
1,588,587 UART: [fwproc] Received Image of size 114168 bytes
2,885,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,523 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,606 >>> mbox cmd response: success
3,077,606 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,078,636 UART: [afmc] ++
3,078,804 UART: [afmc] CDI.KEYID = 6
3,079,166 UART: [afmc] SUBJECT.KEYID = 7
3,079,591 UART: [afmc] AUTHORITY.KEYID = 5
3,114,374 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,694 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,474 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,202 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,087 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,777 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,622 UART: [afmc] --
3,157,560 UART: [cold-reset] --
3,158,446 UART: [state] Locking Datavault
3,159,645 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,249 UART: [state] Locking ICCM
3,160,923 UART: [exit] Launching FMC @ 0x40000130
3,166,252 UART:
3,166,268 UART: Running Caliptra FMC ...
3,166,676 UART:
3,166,730 UART: [state] CFI Enabled
3,177,295 UART: [fht] FMC Alias Private Key: 7
3,285,012 UART: [art] Extend RT PCRs Done
3,285,440 UART: [art] Lock RT PCRs Done
3,286,930 UART: [art] Populate DV Done
3,295,255 UART: [fht] FMC Alias Private Key: 7
3,296,371 UART: [art] Derive CDI
3,296,651 UART: [art] Store in in slot 0x4
3,382,292 UART: [art] Derive Key Pair
3,382,652 UART: [art] Store priv key in slot 0x5
3,395,590 UART: [art] Derive Key Pair - Done
3,410,329 UART: [art] Signing Cert with AUTHO
3,410,809 UART: RITY.KEYID = 7
3,425,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,410 UART: [art] PUB.X = D112820E05D3DB0832D9F2C19D17DB0743BA05041F5D2D5FF97BC4A75B1A2F1A8E39CAA8F22F5316B634BECB389A5F78
3,433,176 UART: [art] PUB.Y = C167EFB413A23EFB621D473E38DDEEDF887B31DC454CEECDD2B99CD9E5F5B1DFA4433F7A7E0E3D1164C4406DEDBB596B
3,440,153 UART: [art] SIG.R = 61F0E87E593388A35FA53D597400A155172FB21B265BD246B123489E8EC32F5D3862F960476377D8B6FF57BC4E0BAF40
3,446,896 UART: [art] SIG.S = F1DE8035DC1EB2917F2381CACD7D6F8A55035ECB8B82E95B7D437EFA947D2BF13582B52598E63EFCAC854E67E0515904
3,470,977 UART: Caliptra RT
3,471,230 UART: [state] CFI Enabled
3,579,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,661 UART: [rt]cmd =0x50435245, len=56
3,612,068 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,745 ready_for_fw is high
1,362,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,238 >>> mbox cmd response: success
2,928,238 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,584 UART:
2,989,600 UART: Running Caliptra FMC ...
2,990,008 UART:
2,990,062 UART: [state] CFI Enabled
3,000,383 UART: [fht] FMC Alias Private Key: 7
3,107,864 UART: [art] Extend RT PCRs Done
3,108,292 UART: [art] Lock RT PCRs Done
3,109,782 UART: [art] Populate DV Done
3,118,103 UART: [fht] FMC Alias Private Key: 7
3,119,193 UART: [art] Derive CDI
3,119,473 UART: [art] Store in in slot 0x4
3,205,006 UART: [art] Derive Key Pair
3,205,366 UART: [art] Store priv key in slot 0x5
3,218,500 UART: [art] Derive Key Pair - Done
3,233,209 UART: [art] Signing Cert with AUTHO
3,233,689 UART: RITY.KEYID = 7
3,248,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,750 UART: [art] PUB.X = 1019940EC66A479F78C4E73A8542D6118183CB83684A1EB9628FF663303855442B1E9C5867C28AAA15F082BCCA4E2C69
3,256,513 UART: [art] PUB.Y = FCC84A8B49F33ED22D6F91F9488CCD913F0DB5FC667B80529D2CBCEC276FD8C7F3B425C1FBA408D58574C74DD2E8755D
3,263,477 UART: [art] SIG.R = F80FD555915318CF50F3E08C6C73609B4CA26CC0A48F34777993647ABD7305099B869B6207B3FC70E04C4F671D6268AB
3,270,233 UART: [art] SIG.S = 8EEA89071924C8DE3B0E8B6FD3DF5C9E1D386F75FD68A3F4AF6535FCCB1915A530F32B85DA627B30FEDCD23A1428D52C
3,294,522 UART: Caliptra RT
3,294,775 UART: [state] CFI Enabled
3,402,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,247 UART: [rt]cmd =0x50435245, len=56
3,434,742 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,162 UART: [kat] SHA2-256
882,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,208 UART: [kat] ++
886,360 UART: [kat] sha1
890,526 UART: [kat] SHA2-256
892,464 UART: [kat] SHA2-384
895,049 UART: [kat] SHA2-512-ACC
896,950 UART: [kat] ECC-384
902,485 UART: [kat] HMAC-384Kdf
906,951 UART: [kat] LMS
1,475,147 UART: [kat] --
1,476,198 UART: [cold-reset] ++
1,476,718 UART: [fht] Storing FHT @ 0x50003400
1,479,465 UART: [idev] ++
1,479,633 UART: [idev] CDI.KEYID = 6
1,479,993 UART: [idev] SUBJECT.KEYID = 7
1,480,417 UART: [idev] UDS.KEYID = 0
1,480,762 ready_for_fw is high
1,480,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,375 UART: [idev] Erasing UDS.KEYID = 0
1,505,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,867 UART: [idev] --
1,514,964 UART: [ldev] ++
1,515,132 UART: [ldev] CDI.KEYID = 6
1,515,495 UART: [ldev] SUBJECT.KEYID = 5
1,515,921 UART: [ldev] AUTHORITY.KEYID = 7
1,516,384 UART: [ldev] FE.KEYID = 1
1,521,750 UART: [ldev] Erasing FE.KEYID = 1
1,547,615 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,795 UART: [ldev] --
1,587,206 UART: [fwproc] Waiting for Commands...
1,587,953 UART: [fwproc] Received command 0x46574c44
1,588,744 UART: [fwproc] Received Image of size 114168 bytes
2,884,618 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,434 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,786 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,389 >>> mbox cmd response: success
3,076,389 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,077,415 UART: [afmc] ++
3,077,583 UART: [afmc] CDI.KEYID = 6
3,077,945 UART: [afmc] SUBJECT.KEYID = 7
3,078,370 UART: [afmc] AUTHORITY.KEYID = 5
3,113,839 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,551 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,279 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,164 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,854 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,609 UART: [afmc] --
3,156,549 UART: [cold-reset] --
3,157,309 UART: [state] Locking Datavault
3,158,440 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,044 UART: [state] Locking ICCM
3,159,546 UART: [exit] Launching FMC @ 0x40000130
3,164,875 UART:
3,164,891 UART: Running Caliptra FMC ...
3,165,299 UART:
3,165,442 UART: [state] CFI Enabled
3,176,449 UART: [fht] FMC Alias Private Key: 7
3,284,688 UART: [art] Extend RT PCRs Done
3,285,116 UART: [art] Lock RT PCRs Done
3,286,728 UART: [art] Populate DV Done
3,295,091 UART: [fht] FMC Alias Private Key: 7
3,296,171 UART: [art] Derive CDI
3,296,451 UART: [art] Store in in slot 0x4
3,382,022 UART: [art] Derive Key Pair
3,382,382 UART: [art] Store priv key in slot 0x5
3,395,664 UART: [art] Derive Key Pair - Done
3,410,992 UART: [art] Signing Cert with AUTHO
3,411,472 UART: RITY.KEYID = 7
3,426,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,569 UART: [art] PUB.X = F6B690D7BAE69617C4761691DBCCF02A13CCBCC36D5B6C5E90EB752EE73CC3123ABB375722527469DC64CBB7DB26FF17
3,434,357 UART: [art] PUB.Y = C94A05AA5B2D9A067AFFE3666E9D52AAC4D2F5A05BB0356A94C92058C9AF2B1CE4868DCDAE71CF59EF28A0E3B3A843CE
3,441,327 UART: [art] SIG.R = 243EFD649C71D2DE5C3733C541F8375285672C7FEB21EEC9F9BD04BEFC2A08DBFD82C70BE5B52048DC77FC34E57F6356
3,448,104 UART: [art] SIG.S = 76BBB304B3C5440C63838B59E231B504736076033B3C9CA45252947756869766CBA46C39BC4E1C334DE6E37D2614D62C
3,471,853 UART: Caliptra RT
3,472,198 UART: [state] CFI Enabled
3,580,266 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,882 UART: [rt]cmd =0x50435245, len=56
3,612,347 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,258 ready_for_fw is high
1,362,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,093 >>> mbox cmd response: success
2,926,093 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,987,933 UART:
2,987,949 UART: Running Caliptra FMC ...
2,988,357 UART:
2,988,500 UART: [state] CFI Enabled
2,998,961 UART: [fht] FMC Alias Private Key: 7
3,105,626 UART: [art] Extend RT PCRs Done
3,106,054 UART: [art] Lock RT PCRs Done
3,107,888 UART: [art] Populate DV Done
3,116,087 UART: [fht] FMC Alias Private Key: 7
3,117,163 UART: [art] Derive CDI
3,117,443 UART: [art] Store in in slot 0x4
3,203,300 UART: [art] Derive Key Pair
3,203,660 UART: [art] Store priv key in slot 0x5
3,217,610 UART: [art] Derive Key Pair - Done
3,232,820 UART: [art] Signing Cert with AUTHO
3,233,300 UART: RITY.KEYID = 7
3,249,032 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,797 UART: [art] PUB.X = F33AE4F5AA5D9343D2BF5E5CB93F0626DAE69EC0E04C18360A35D4E988ED0570D50D2AE62BA6B91F605D051C256B8574
3,256,564 UART: [art] PUB.Y = BBA81BF656DEF8BD8A9A5467F7F9EA3A5348D80B73DBCD9A80B6EA3C87099FC72B0CEE73EC85D1A78C4A239ED7C53A68
3,263,531 UART: [art] SIG.R = FF1F30B6935C277ABDF92C61FFBA7F93DC8AADE223AB81B5735C0206F939FE65FBC9D1E6F6A9D9A1EB4E7AA4FCB3592E
3,270,325 UART: [art] SIG.S = 21158137BEC377D98FF0167F5D628AD6429BBA763AF6015BC31364FE772EC1DABB5453BE8B5DA147FC4FA99E6A422CE7
3,294,049 UART: Caliptra RT
3,294,394 UART: [state] CFI Enabled
3,402,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,743 UART: [rt]cmd =0x50435245, len=56
3,434,136 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,411 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,228 UART: [kat] SHA2-512-ACC
908,129 UART: [kat] ECC-384
917,154 UART: [kat] HMAC-384Kdf
921,814 UART: [kat] LMS
1,170,142 UART: [kat] --
1,171,221 UART: [cold-reset] ++
1,171,663 UART: [fht] FHT @ 0x50003400
1,174,340 UART: [idev] ++
1,174,508 UART: [idev] CDI.KEYID = 6
1,174,868 UART: [idev] SUBJECT.KEYID = 7
1,175,292 UART: [idev] UDS.KEYID = 0
1,175,637 ready_for_fw is high
1,175,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,166 UART: [idev] Erasing UDS.KEYID = 0
1,200,411 UART: [idev] Sha1 KeyId Algorithm
1,208,877 UART: [idev] --
1,210,019 UART: [ldev] ++
1,210,187 UART: [ldev] CDI.KEYID = 6
1,210,550 UART: [ldev] SUBJECT.KEYID = 5
1,210,976 UART: [ldev] AUTHORITY.KEYID = 7
1,211,439 UART: [ldev] FE.KEYID = 1
1,216,895 UART: [ldev] Erasing FE.KEYID = 1
1,243,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,201 UART: [ldev] --
1,282,576 UART: [fwproc] Wait for Commands...
1,283,322 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,694 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,998 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,615 >>> mbox cmd response: success
2,773,615 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,837 UART: [afmc] ++
2,775,005 UART: [afmc] CDI.KEYID = 6
2,775,367 UART: [afmc] SUBJECT.KEYID = 7
2,775,792 UART: [afmc] AUTHORITY.KEYID = 5
2,811,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,870 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,598 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,483 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,202 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,102 UART: [afmc] --
2,855,048 UART: [cold-reset] --
2,855,928 UART: [state] Locking Datavault
2,857,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,891 UART: [state] Locking ICCM
2,858,343 UART: [exit] Launching FMC @ 0x40000130
2,863,672 UART:
2,863,688 UART: Running Caliptra FMC ...
2,864,096 UART:
2,864,150 UART: [state] CFI Enabled
2,874,661 UART: [fht] FMC Alias Private Key: 7
2,982,622 UART: [art] Extend RT PCRs Done
2,983,050 UART: [art] Lock RT PCRs Done
2,984,502 UART: [art] Populate DV Done
2,992,759 UART: [fht] FMC Alias Private Key: 7
2,993,755 UART: [art] Derive CDI
2,994,035 UART: [art] Store in in slot 0x4
3,079,570 UART: [art] Derive Key Pair
3,079,930 UART: [art] Store priv key in slot 0x5
3,092,750 UART: [art] Derive Key Pair - Done
3,107,528 UART: [art] Signing Cert with AUTHO
3,108,008 UART: RITY.KEYID = 7
3,122,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,757 UART: [art] PUB.X = 90D171AED55688B4BD5CE4622499F1351951483570CD2DC94805C5E534864E62183A7CBA5CDA987A83651C820020EEEA
3,130,500 UART: [art] PUB.Y = 75FC64341A14188C92B3B7330C6EB0F03423D16C9F4E1A8553BC1CF50C901B65E86D99CF3D1D6B006AB39FD1CB8AD8A3
3,137,434 UART: [art] SIG.R = DDC9D183029B69F29408875F2A5FC2FA61CE017B057C9DDC428D3F9D41831969F0DB1AB14EEC65A6C95C050EAA44E611
3,144,198 UART: [art] SIG.S = 93D4FA8FF309CEA909AAE9D0BD2AF742A245AB7D4FC98AC7E8035F2C862D690838A34692A1312584AF5E5E8F37086703
3,168,469 UART: Caliptra RT
3,168,722 UART: [state] CFI Enabled
3,276,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,882 UART: [rt]cmd =0x50435245, len=56
3,308,379 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,153 ready_for_fw is high
1,060,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,038 >>> mbox cmd response: success
2,624,038 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,152 UART:
2,686,168 UART: Running Caliptra FMC ...
2,686,576 UART:
2,686,630 UART: [state] CFI Enabled
2,696,881 UART: [fht] FMC Alias Private Key: 7
2,804,114 UART: [art] Extend RT PCRs Done
2,804,542 UART: [art] Lock RT PCRs Done
2,806,110 UART: [art] Populate DV Done
2,814,227 UART: [fht] FMC Alias Private Key: 7
2,815,295 UART: [art] Derive CDI
2,815,575 UART: [art] Store in in slot 0x4
2,900,770 UART: [art] Derive Key Pair
2,901,130 UART: [art] Store priv key in slot 0x5
2,914,288 UART: [art] Derive Key Pair - Done
2,929,011 UART: [art] Signing Cert with AUTHO
2,929,491 UART: RITY.KEYID = 7
2,944,383 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,148 UART: [art] PUB.X = BAE286442234D4EEC7AD1448F76EDB3C3C2DE2EEDC43FB8CE3813C8B85CB44D00FAED32EC5808E0D0B0FEA0053098315
2,951,903 UART: [art] PUB.Y = 3D99C97E7B1FAD0A2228F68816D14D051A25D85976E9101E58C38275B239F3B0B68E12D1204AF65F49418AC3EA1DA9CD
2,958,851 UART: [art] SIG.R = 528C21D3B5C977264EA1E2532534387E0964EF805FFD879DCFBDD766DB0A16748D841796D06269D23A13CAFEA2DB790D
2,965,618 UART: [art] SIG.S = 5CCF00DDF139F8DEE0BCF42E5DA63702672A35DCAB92F7E13FB77C0D9F4D6AE9A98E749C0BFE7F414BF617B6EB2A5707
2,989,235 UART: Caliptra RT
2,989,488 UART: [state] CFI Enabled
3,097,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,209 UART: [rt]cmd =0x50435245, len=56
3,129,552 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,413 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,354 UART: [cold-reset] ++
1,172,732 UART: [fht] FHT @ 0x50003400
1,175,555 UART: [idev] ++
1,175,723 UART: [idev] CDI.KEYID = 6
1,176,083 UART: [idev] SUBJECT.KEYID = 7
1,176,507 UART: [idev] UDS.KEYID = 0
1,176,852 ready_for_fw is high
1,176,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,531 UART: [idev] Erasing UDS.KEYID = 0
1,201,856 UART: [idev] Sha1 KeyId Algorithm
1,210,316 UART: [idev] --
1,211,342 UART: [ldev] ++
1,211,510 UART: [ldev] CDI.KEYID = 6
1,211,873 UART: [ldev] SUBJECT.KEYID = 5
1,212,299 UART: [ldev] AUTHORITY.KEYID = 7
1,212,762 UART: [ldev] FE.KEYID = 1
1,217,852 UART: [ldev] Erasing FE.KEYID = 1
1,245,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,806 UART: [ldev] --
1,284,085 UART: [fwproc] Wait for Commands...
1,284,795 UART: [fwproc] Recv command 0x46574c44
1,285,523 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,744 >>> mbox cmd response: success
2,773,744 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,762 UART: [afmc] ++
2,774,930 UART: [afmc] CDI.KEYID = 6
2,775,292 UART: [afmc] SUBJECT.KEYID = 7
2,775,717 UART: [afmc] AUTHORITY.KEYID = 5
2,811,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,025 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,773 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,501 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,386 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,105 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,871 UART: [afmc] --
2,854,983 UART: [cold-reset] --
2,855,699 UART: [state] Locking Datavault
2,856,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,278 UART: [state] Locking ICCM
2,857,772 UART: [exit] Launching FMC @ 0x40000130
2,863,101 UART:
2,863,117 UART: Running Caliptra FMC ...
2,863,525 UART:
2,863,668 UART: [state] CFI Enabled
2,874,227 UART: [fht] FMC Alias Private Key: 7
2,982,980 UART: [art] Extend RT PCRs Done
2,983,408 UART: [art] Lock RT PCRs Done
2,984,920 UART: [art] Populate DV Done
2,993,293 UART: [fht] FMC Alias Private Key: 7
2,994,341 UART: [art] Derive CDI
2,994,621 UART: [art] Store in in slot 0x4
3,080,320 UART: [art] Derive Key Pair
3,080,680 UART: [art] Store priv key in slot 0x5
3,094,636 UART: [art] Derive Key Pair - Done
3,109,924 UART: [art] Signing Cert with AUTHO
3,110,404 UART: RITY.KEYID = 7
3,125,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,069 UART: [art] PUB.X = 0C6545A15E2B8450356361FC160AB7F9F8FC42EB7EA67A0AB11FF4E1090ECF06ACBBD2BA3FD335ADF34DDE4EE248CE51
3,132,847 UART: [art] PUB.Y = 3166FAA71DE1833F5898564D3CC5D4145B78183439F8A32F3B066A700B9B280431876A55D6F59437F57AD4922D516852
3,139,776 UART: [art] SIG.R = 480A511041DD30A48D60127DE34F5CC54649DFEEB2DC1D6941AD3E1C74B4691E1956754FB3A4713BDD9785899AA934F2
3,146,547 UART: [art] SIG.S = 6CFD9A21D29DE1701BD9779B65250442F3C14CEFF3C6F38FACDE145735210C6D480628F57B6B154331BADABAB25334EF
3,169,387 UART: Caliptra RT
3,169,732 UART: [state] CFI Enabled
3,277,189 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,935 UART: [rt]cmd =0x50435245, len=56
3,309,276 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,048 ready_for_fw is high
1,061,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,139 >>> mbox cmd response: success
2,626,139 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,689,599 UART:
2,689,615 UART: Running Caliptra FMC ...
2,690,023 UART:
2,690,166 UART: [state] CFI Enabled
2,700,731 UART: [fht] FMC Alias Private Key: 7
2,809,132 UART: [art] Extend RT PCRs Done
2,809,560 UART: [art] Lock RT PCRs Done
2,811,158 UART: [art] Populate DV Done
2,819,189 UART: [fht] FMC Alias Private Key: 7
2,820,211 UART: [art] Derive CDI
2,820,491 UART: [art] Store in in slot 0x4
2,906,380 UART: [art] Derive Key Pair
2,906,740 UART: [art] Store priv key in slot 0x5
2,919,776 UART: [art] Derive Key Pair - Done
2,934,525 UART: [art] Signing Cert with AUTHO
2,935,005 UART: RITY.KEYID = 7
2,950,473 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,238 UART: [art] PUB.X = 4078E2AD511AF646B5DFA70872FB8C612267E429CD1401D0F62D92A338A626C9B2778E0DFD3FDDB89FD49E2CEC90EF8E
2,958,015 UART: [art] PUB.Y = B1E009B101A4BFE9A2A03747C8FB17166633853FC366FD3C49768B4A193E26979401B09C77D12EE2D21C9F6F7D698C8A
2,964,958 UART: [art] SIG.R = 52DC437385F1420CAD871D61D45409734280F2408CCBA2CAA718B4F81377639F29BF78B4524E355D82EA45C5343F6A0E
2,971,717 UART: [art] SIG.S = 9BD482D4DAED6493696E7DDBC3B8B8E3D0894C47E97F1D63E99ED7427FBCBDE3035BA1133A70EE36B32EF5EECA90E284
2,996,013 UART: Caliptra RT
2,996,358 UART: [state] CFI Enabled
3,104,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,119 UART: [rt]cmd =0x50435245, len=56
3,136,252 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,183 UART: [kat] ++
895,335 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
916,188 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,775 UART: [cold-reset] ++
1,170,273 UART: [fht] FHT @ 0x50003400
1,172,805 UART: [idev] ++
1,172,973 UART: [idev] CDI.KEYID = 6
1,173,334 UART: [idev] SUBJECT.KEYID = 7
1,173,759 UART: [idev] UDS.KEYID = 0
1,174,105 ready_for_fw is high
1,174,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,199,259 UART: [idev] Sha1 KeyId Algorithm
1,208,229 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,216,078 UART: [ldev] Erasing FE.KEYID = 1
1,242,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,448 UART: [ldev] --
1,281,712 UART: [fwproc] Wait for Commands...
1,282,407 UART: [fwproc] Recv command 0x46574c44
1,283,140 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,797 >>> mbox cmd response: success
2,770,797 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,771,838 UART: [afmc] ++
2,772,006 UART: [afmc] CDI.KEYID = 6
2,772,369 UART: [afmc] SUBJECT.KEYID = 7
2,772,795 UART: [afmc] AUTHORITY.KEYID = 5
2,808,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,282 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,165 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,884 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,743 UART: [afmc] --
2,851,875 UART: [cold-reset] --
2,852,547 UART: [state] Locking Datavault
2,853,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,218 UART: [state] Locking ICCM
2,854,712 UART: [exit] Launching FMC @ 0x40000130
2,860,041 UART:
2,860,057 UART: Running Caliptra FMC ...
2,860,465 UART:
2,860,519 UART: [state] CFI Enabled
2,871,052 UART: [fht] FMC Alias Private Key: 7
2,978,801 UART: [art] Extend RT PCRs Done
2,979,229 UART: [art] Lock RT PCRs Done
2,980,815 UART: [art] Populate DV Done
2,988,990 UART: [fht] FMC Alias Private Key: 7
2,990,104 UART: [art] Derive CDI
2,990,384 UART: [art] Store in in slot 0x4
3,075,959 UART: [art] Derive Key Pair
3,076,319 UART: [art] Store priv key in slot 0x5
3,089,917 UART: [art] Derive Key Pair - Done
3,104,957 UART: [art] Signing Cert with AUTHO
3,105,437 UART: RITY.KEYID = 7
3,120,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,270 UART: [art] PUB.X = B07EB0859BC1676E589903A5C9F47C91913489895FFC7C82F4D02BC2957B2D0359FCFF56BBEAAB829E712FAE898EEDE9
3,128,048 UART: [art] PUB.Y = E946DFBE34522E57CC918E408752CC3B20F1C978BCEFC78F1AA7B0B28FB23ECC55B4044AF100E5298D5747A652C8E312
3,134,985 UART: [art] SIG.R = 51570BD17CD0E81F47BA9BC2874C4DDE20779C66A91F443C806404E3AB991AF5D0B3725B8B0C032E2CC056B8C2CB4AE9
3,141,755 UART: [art] SIG.S = F86E64DFCD15335EFDEB0BD33C80F7E6828170B0A58E5513FB45DFAA088FC45298C006277D2D616DE2A488C3CEE37774
3,165,783 UART: Caliptra RT
3,166,036 UART: [state] CFI Enabled
3,274,143 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,727 UART: [rt]cmd =0x50435245, len=56
3,306,112 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,608 ready_for_fw is high
1,055,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,925 >>> mbox cmd response: success
2,619,925 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,681,817 UART:
2,681,833 UART: Running Caliptra FMC ...
2,682,241 UART:
2,682,295 UART: [state] CFI Enabled
2,693,030 UART: [fht] FMC Alias Private Key: 7
2,801,059 UART: [art] Extend RT PCRs Done
2,801,487 UART: [art] Lock RT PCRs Done
2,802,881 UART: [art] Populate DV Done
2,811,166 UART: [fht] FMC Alias Private Key: 7
2,812,180 UART: [art] Derive CDI
2,812,460 UART: [art] Store in in slot 0x4
2,897,909 UART: [art] Derive Key Pair
2,898,269 UART: [art] Store priv key in slot 0x5
2,911,511 UART: [art] Derive Key Pair - Done
2,926,503 UART: [art] Signing Cert with AUTHO
2,926,983 UART: RITY.KEYID = 7
2,942,237 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,002 UART: [art] PUB.X = D728557D4490ABFED8BC8CBBEE5FF1ABE3A51B615A81273164E43C781C01C352CBAA1375A4A73C9FE887DCFEF7807172
2,949,787 UART: [art] PUB.Y = 392CE0ABDE070976EA26063B0394E99E348F0AB1099EB8755B2416C4F9D1EA66CB7046186D7B982415D05FB31A1637A4
2,956,719 UART: [art] SIG.R = F848F0035088BB64FD2331E1D8D3746ACB33E8FA91185FAE1F20841DC7E70AC6DF76F34606A783D7E4EABA6746DB9AC3
2,963,494 UART: [art] SIG.S = AA20CB14ED397717992A6E629498C6A6D68CD7E98CF586756FE9D1EB2ED6AC0CC30B19246718CEEF435011E117608A54
2,987,353 UART: Caliptra RT
2,987,606 UART: [state] CFI Enabled
3,094,886 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,928 UART: [rt]cmd =0x50435245, len=56
3,127,371 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
915,657 UART: [kat] HMAC-384Kdf
920,175 UART: [kat] LMS
1,168,487 UART: [kat] --
1,169,340 UART: [cold-reset] ++
1,169,800 UART: [fht] FHT @ 0x50003400
1,172,492 UART: [idev] ++
1,172,660 UART: [idev] CDI.KEYID = 6
1,173,021 UART: [idev] SUBJECT.KEYID = 7
1,173,446 UART: [idev] UDS.KEYID = 0
1,173,792 ready_for_fw is high
1,173,792 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,718 UART: [idev] Erasing UDS.KEYID = 0
1,198,986 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,209,023 UART: [ldev] ++
1,209,191 UART: [ldev] CDI.KEYID = 6
1,209,555 UART: [ldev] SUBJECT.KEYID = 5
1,209,982 UART: [ldev] AUTHORITY.KEYID = 7
1,210,445 UART: [ldev] FE.KEYID = 1
1,215,829 UART: [ldev] Erasing FE.KEYID = 1
1,242,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,887 UART: [ldev] --
1,281,201 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,741 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,670 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,290 >>> mbox cmd response: success
2,771,290 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,772,365 UART: [afmc] ++
2,772,533 UART: [afmc] CDI.KEYID = 6
2,772,896 UART: [afmc] SUBJECT.KEYID = 7
2,773,322 UART: [afmc] AUTHORITY.KEYID = 5
2,808,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,013 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,764 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,493 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,376 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,095 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,912 UART: [afmc] --
2,851,998 UART: [cold-reset] --
2,852,864 UART: [state] Locking Datavault
2,854,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,693 UART: [state] Locking ICCM
2,855,253 UART: [exit] Launching FMC @ 0x40000130
2,860,582 UART:
2,860,598 UART: Running Caliptra FMC ...
2,861,006 UART:
2,861,149 UART: [state] CFI Enabled
2,871,752 UART: [fht] FMC Alias Private Key: 7
2,979,933 UART: [art] Extend RT PCRs Done
2,980,361 UART: [art] Lock RT PCRs Done
2,981,887 UART: [art] Populate DV Done
2,990,006 UART: [fht] FMC Alias Private Key: 7
2,991,178 UART: [art] Derive CDI
2,991,458 UART: [art] Store in in slot 0x4
3,076,627 UART: [art] Derive Key Pair
3,076,987 UART: [art] Store priv key in slot 0x5
3,090,413 UART: [art] Derive Key Pair - Done
3,105,201 UART: [art] Signing Cert with AUTHO
3,105,681 UART: RITY.KEYID = 7
3,120,853 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,618 UART: [art] PUB.X = 2160965584B87EDB3F1EB8D968934BBFE71276283EED77BEE6331B439C3C609C521B9E8C3AB826E55FDC70D0002D220B
3,128,369 UART: [art] PUB.Y = 801DD5F5EB8FFE24FFD7C2D549C4EE84E8E6DAB9FDFD4D4C47C8A6DDBB77A2BD18A7D327D31860ED03D3D3F32BA646F8
3,135,348 UART: [art] SIG.R = 6F1E5C01524177A281E05F7621A7C26D4422488E41B8F62EC5AD6373991B8E9671566081A1618D9373E5D8FA9BFFBD92
3,142,111 UART: [art] SIG.S = 8F4648FBAC4C162E301E49C7944D97A0CF49F19CE02C8D2485E75D62EDF40020660FC4E9AF9F4656FF293797EE317C62
3,166,203 UART: Caliptra RT
3,166,548 UART: [state] CFI Enabled
3,275,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,693 UART: [rt]cmd =0x50435245, len=56
3,308,076 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,389 ready_for_fw is high
1,056,389 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,536 >>> mbox cmd response: success
2,622,536 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,684,346 UART:
2,684,362 UART: Running Caliptra FMC ...
2,684,770 UART:
2,684,913 UART: [state] CFI Enabled
2,695,636 UART: [fht] FMC Alias Private Key: 7
2,803,427 UART: [art] Extend RT PCRs Done
2,803,855 UART: [art] Lock RT PCRs Done
2,805,639 UART: [art] Populate DV Done
2,813,912 UART: [fht] FMC Alias Private Key: 7
2,815,020 UART: [art] Derive CDI
2,815,300 UART: [art] Store in in slot 0x4
2,900,795 UART: [art] Derive Key Pair
2,901,155 UART: [art] Store priv key in slot 0x5
2,915,269 UART: [art] Derive Key Pair - Done
2,929,884 UART: [art] Signing Cert with AUTHO
2,930,364 UART: RITY.KEYID = 7
2,945,612 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,377 UART: [art] PUB.X = 00C0C4BD0AB6F267B5BA7112D12F1F0241E801BAC639A8EAA36EC37755A8F8EB2004BD2EEE9E611F94FF4262139D1705
2,953,122 UART: [art] PUB.Y = 5F8FA59485B396236916A228AA8B1105BFB97EF045ED643973F4B5AAA9D03550991186B840F47D638ABC3EB2746B5F8E
2,960,071 UART: [art] SIG.R = D64FC87E9581F2CDB82EC88C2B176648FABC60C4FFD0AE4970827303A3B3961B219458B54855681F7642594426697F04
2,966,829 UART: [art] SIG.S = 2D02D3E274A1716466D11683838B04B0B390F8F221219D85D1187377A7DB6F8237AE1D2D3FF7D5D3593B020D143B129C
2,990,728 UART: Caliptra RT
2,991,073 UART: [state] CFI Enabled
3,098,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,704 UART: [rt]cmd =0x50435245, len=56
3,131,333 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
191,990 UART:
192,369 UART: Running Caliptra ROM ...
193,462 UART:
193,598 UART: [state] CFI Enabled
265,563 UART: [state] LifecycleState = Unprovisioned
267,543 UART: [state] DebugLocked = No
269,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,339 UART: [kat] SHA2-256
443,995 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,507 UART: [kat] ++
454,948 UART: [kat] sha1
465,199 UART: [kat] SHA2-256
467,918 UART: [kat] SHA2-384
473,830 UART: [kat] SHA2-512-ACC
476,189 UART: [kat] ECC-384
2,767,718 UART: [kat] HMAC-384Kdf
2,791,538 UART: [kat] LMS
3,981,853 UART: [kat] --
3,986,510 UART: [cold-reset] ++
3,988,720 UART: [fht] Storing FHT @ 0x50003400
4,001,540 UART: [idev] ++
4,002,100 UART: [idev] CDI.KEYID = 6
4,003,052 UART: [idev] SUBJECT.KEYID = 7
4,004,307 UART: [idev] UDS.KEYID = 0
4,005,259 ready_for_fw is high
4,005,452 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,148,879 UART: [idev] Erasing UDS.KEYID = 0
7,337,703 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,356 UART: [idev] --
7,364,836 UART: [ldev] ++
7,365,405 UART: [ldev] CDI.KEYID = 6
7,366,412 UART: [ldev] SUBJECT.KEYID = 5
7,367,564 UART: [ldev] AUTHORITY.KEYID = 7
7,368,839 UART: [ldev] FE.KEYID = 1
7,415,960 UART: [ldev] Erasing FE.KEYID = 1
10,748,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,104,812 UART: [ldev] --
13,109,901 UART: [fwproc] Waiting for Commands...
13,111,874 UART: [fwproc] Received command 0x46574c44
13,114,067 UART: [fwproc] Received Image of size 113844 bytes
17,160,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,235,893 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,304,746 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,620,897 >>> mbox cmd response: success
17,621,492 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,624,434 UART: [afmc] ++
17,625,014 UART: [afmc] CDI.KEYID = 6
17,625,963 UART: [afmc] SUBJECT.KEYID = 7
17,627,167 UART: [afmc] AUTHORITY.KEYID = 5
21,001,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,300,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,302,449 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,316,854 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,331,716 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,346,145 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,784 UART: [afmc] --
23,371,724 UART: [cold-reset] --
23,376,925 UART: [state] Locking Datavault
23,381,736 UART: [state] Locking PCR0, PCR1 and PCR31
23,383,532 UART: [state] Locking ICCM
23,385,717 UART: [exit] Launching FMC @ 0x40000130
23,394,110 UART:
23,394,341 UART: Running Caliptra FMC ...
23,395,381 UART:
23,395,523 UART: [state] CFI Enabled
23,461,896 UART: [fht] FMC Alias Private Key: 7
25,799,436 UART: [art] Extend RT PCRs Done
25,800,662 UART: [art] Lock RT PCRs Done
25,802,097 UART: [art] Populate DV Done
25,807,677 UART: [fht] FMC Alias Private Key: 7
25,809,368 UART: [art] Derive CDI
25,810,116 UART: [art] Store in in slot 0x4
25,871,118 UART: [art] Derive Key Pair
25,872,155 UART: [art] Store priv key in slot 0x5
29,164,488 UART: [art] Derive Key Pair - Done
29,177,655 UART: [art] Signing Cert with AUTHO
29,178,959 UART: RITY.KEYID = 7
31,466,150 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,658 UART: [art] PUB.X = 7A524F6F19083797E08431C6C0A8BFD940A69572EBD8A75D3AB404CCBDEC745B576B1432716279222050C142B2ABDBA1
31,474,912 UART: [art] PUB.Y = 5A647014227326BA292A497ABB173B5AECE2425C70EDF28A5674EC9B564BB65CB57CE07F5D3A4927F057DAC699B77852
31,482,153 UART: [art] SIG.R = 78981CDC92116890C9BC37B68F0FAE94339E8F7360C1949EDE10DA42A71F6D5EC2B88505FE3F08BD05DB3585552EF7B6
31,489,537 UART: [art] SIG.S = 2F8AF0A8DB1B94983BCF0D5A7BC302083E8206136F3DDC2DA4E3F7E48B8B6482BD9DA805A49735E8491BD0EE7E2DCDAF
32,794,530 UART: Caliptra RT
32,795,247 UART: [state] CFI Enabled
32,956,663 UART: [rt] RT listening for mailbox commands...
32,987,963 UART: [rt]cmd =0x50435251, len=36
34,163,100 >>> mbox cmd response data (1848 bytes)
34,172,040 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,202,420 UART: [rt]cmd =0x50435245, len=56
34,205,416 >>> mbox cmd response data (8 bytes)
34,206,287 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,236,381 UART: [rt]cmd =0x50435251, len=36
35,399,897 >>> mbox cmd response data (1848 bytes)
35,410,038 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,440,612 UART: [rt]cmd =0x50435245, len=56
35,443,755 >>> mbox cmd response data (8 bytes)
35,444,460 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,474,490 UART: [rt]cmd =0x50435251, len=36
36,636,580 >>> mbox cmd response data (1848 bytes)
36,645,492 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,675,897 UART: [rt]cmd =0x50435245, len=56
36,679,227 >>> mbox cmd response data (8 bytes)
36,679,810 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,709,869 UART: [rt]cmd =0x50435251, len=36
37,873,306 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,783,972 ready_for_fw is high
3,784,524 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,844,281 >>> mbox cmd response: success
17,844,967 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,536,821 UART:
23,537,196 UART: Running Caliptra FMC ...
23,538,297 UART:
23,538,444 UART: [state] CFI Enabled
23,588,955 UART: [fht] FMC Alias Private Key: 7
25,926,880 UART: [art] Extend RT PCRs Done
25,928,109 UART: [art] Lock RT PCRs Done
25,929,597 UART: [art] Populate DV Done
25,935,168 UART: [fht] FMC Alias Private Key: 7
25,936,862 UART: [art] Derive CDI
25,937,593 UART: [art] Store in in slot 0x4
25,997,256 UART: [art] Derive Key Pair
25,998,293 UART: [art] Store priv key in slot 0x5
29,290,960 UART: [art] Derive Key Pair - Done
29,304,005 UART: [art] Signing Cert with AUTHO
29,305,326 UART: RITY.KEYID = 7
31,591,748 UART: [art] Erasing AUTHORITY.KEYID = 7
31,593,392 UART: [art] PUB.X = 4AB50CCA29D78733804B2BCD85F7DF8F30B6C6D8566CFFEDA37945DC7F501E79EE0E28A203C05CA49C242367C2DFB28A
31,600,537 UART: [art] PUB.Y = DC8EDFD6698DC5A8750F38B4C8013600A3E04DE1D63EAE5F9A18DECBF511964C1EC240E940DDC07554B2B84BBD38BBCB
31,607,810 UART: [art] SIG.R = 154A5B84C74B43560372B6C59E2FC012B8FA769BBCE3950A8E2084D0DF42B43364C95BAEA22CE023F7A1B451013EF3EB
31,615,232 UART: [art] SIG.S = A45FA3A890949395C3DA5F25FC1D984101548BC1BB4174178B80692556D16C25B938D56BEE35A8ED5BA115262986D75D
32,920,605 UART: Caliptra RT
32,921,320 UART: [state] CFI Enabled
33,082,087 UART: [rt] RT listening for mailbox commands...
33,113,828 UART: [rt]cmd =0x50435251, len=36
34,288,049 >>> mbox cmd response data (1848 bytes)
34,296,968 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,327,203 UART: [rt]cmd =0x50435245, len=56
34,330,145 >>> mbox cmd response data (8 bytes)
34,330,869 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,360,885 UART: [rt]cmd =0x50435251, len=36
35,525,205 >>> mbox cmd response data (1848 bytes)
35,535,154 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,565,507 UART: [rt]cmd =0x50435245, len=56
35,568,592 >>> mbox cmd response data (8 bytes)
35,569,246 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,599,109 UART: [rt]cmd =0x50435251, len=36
36,762,218 >>> mbox cmd response data (1848 bytes)
36,771,180 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,801,310 UART: [rt]cmd =0x50435245, len=56
36,804,475 >>> mbox cmd response data (8 bytes)
36,805,034 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,835,076 UART: [rt]cmd =0x50435251, len=36
37,998,857 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,562 UART:
192,971 UART: Running Caliptra ROM ...
194,116 UART:
603,559 UART: [state] CFI Enabled
617,511 UART: [state] LifecycleState = Unprovisioned
619,451 UART: [state] DebugLocked = No
622,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,562 UART: [kat] SHA2-256
797,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,871 UART: [kat] ++
808,345 UART: [kat] sha1
820,477 UART: [kat] SHA2-256
823,178 UART: [kat] SHA2-384
829,745 UART: [kat] SHA2-512-ACC
832,116 UART: [kat] ECC-384
3,117,858 UART: [kat] HMAC-384Kdf
3,130,667 UART: [kat] LMS
4,320,777 UART: [kat] --
4,326,791 UART: [cold-reset] ++
4,328,301 UART: [fht] Storing FHT @ 0x50003400
4,339,621 UART: [idev] ++
4,340,205 UART: [idev] CDI.KEYID = 6
4,341,117 UART: [idev] SUBJECT.KEYID = 7
4,342,363 UART: [idev] UDS.KEYID = 0
4,343,351 ready_for_fw is high
4,343,554 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,437 UART: [idev] Erasing UDS.KEYID = 0
7,632,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,497 UART: [idev] --
7,657,330 UART: [ldev] ++
7,657,899 UART: [ldev] CDI.KEYID = 6
7,658,914 UART: [ldev] SUBJECT.KEYID = 5
7,660,072 UART: [ldev] AUTHORITY.KEYID = 7
7,661,324 UART: [ldev] FE.KEYID = 1
7,672,351 UART: [ldev] Erasing FE.KEYID = 1
10,963,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,285,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,577 UART: [ldev] --
13,322,655 UART: [fwproc] Waiting for Commands...
13,325,831 UART: [fwproc] Received command 0x46574c44
13,328,031 UART: [fwproc] Received Image of size 113844 bytes
17,381,136 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,462,970 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,531,837 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,848,909 >>> mbox cmd response: success
17,850,118 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,852,562 UART: [afmc] ++
17,853,166 UART: [afmc] CDI.KEYID = 6
17,854,082 UART: [afmc] SUBJECT.KEYID = 7
17,855,305 UART: [afmc] AUTHORITY.KEYID = 5
21,166,481 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,530 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,791 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,181 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,989 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,465 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,089 UART: [afmc] --
23,532,621 UART: [cold-reset] --
23,536,738 UART: [state] Locking Datavault
23,543,660 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,371 UART: [state] Locking ICCM
23,547,739 UART: [exit] Launching FMC @ 0x40000130
23,556,133 UART:
23,556,373 UART: Running Caliptra FMC ...
23,557,475 UART:
23,557,638 UART: [state] CFI Enabled
23,565,757 UART: [fht] FMC Alias Private Key: 7
25,897,297 UART: [art] Extend RT PCRs Done
25,898,518 UART: [art] Lock RT PCRs Done
25,900,144 UART: [art] Populate DV Done
25,905,776 UART: [fht] FMC Alias Private Key: 7
25,907,423 UART: [art] Derive CDI
25,908,258 UART: [art] Store in in slot 0x4
25,950,913 UART: [art] Derive Key Pair
25,951,954 UART: [art] Store priv key in slot 0x5
29,193,475 UART: [art] Derive Key Pair - Done
29,206,686 UART: [art] Signing Cert with AUTHO
29,207,991 UART: RITY.KEYID = 7
31,487,394 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,899 UART: [art] PUB.X = 6FC474B18D0A2B8A03D625337898E7BD2CC035DCD5815593338B39C847AA82C43A2272A3A3E5C684A80813B798B4C5A3
31,496,159 UART: [art] PUB.Y = ABB0CEFABAE46064F9C13455EABFAC4C5D87EA71ADEDD68FA6712025211606F536F96A9E2B2E46EBB58519B5A9B37B6B
31,503,407 UART: [art] SIG.R = 3C6BA4BED8C23F88C3E24D8175E8FB5F78BFBA12D084E2074415F4EFA65398A5A942F8C8976F0BA3CDE4ED69390FAFFE
31,510,815 UART: [art] SIG.S = EA36BFA9EFC7EBA2C43A6F783655CE7C0E8C292DA29A696CDF88BA5A6471F1ACC21C0850185C3041E86C70A0909FA31A
32,816,369 UART: Caliptra RT
32,817,077 UART: [state] CFI Enabled
32,935,069 UART: [rt] RT listening for mailbox commands...
32,966,861 UART: [rt]cmd =0x50435251, len=36
34,122,180 >>> mbox cmd response data (1848 bytes)
34,131,072 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,161,336 UART: [rt]cmd =0x50435245, len=56
34,164,404 >>> mbox cmd response data (8 bytes)
34,165,119 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,195,007 UART: [rt]cmd =0x50435251, len=36
35,350,167 >>> mbox cmd response data (1848 bytes)
35,360,163 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,390,541 UART: [rt]cmd =0x50435245, len=56
35,393,441 >>> mbox cmd response data (8 bytes)
35,394,092 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,424,197 UART: [rt]cmd =0x50435251, len=36
36,579,320 >>> mbox cmd response data (1848 bytes)
36,588,242 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,618,409 UART: [rt]cmd =0x50435245, len=56
36,621,428 >>> mbox cmd response data (8 bytes)
36,622,006 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,652,157 UART: [rt]cmd =0x50435251, len=36
37,807,411 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,127,234 ready_for_fw is high
4,127,785 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,146 >>> mbox cmd response: success
18,071,369 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,710,532 UART:
23,710,945 UART: Running Caliptra FMC ...
23,712,085 UART:
23,712,255 UART: [state] CFI Enabled
23,719,906 UART: [fht] FMC Alias Private Key: 7
26,050,179 UART: [art] Extend RT PCRs Done
26,051,414 UART: [art] Lock RT PCRs Done
26,052,948 UART: [art] Populate DV Done
26,058,137 UART: [fht] FMC Alias Private Key: 7
26,059,737 UART: [art] Derive CDI
26,060,565 UART: [art] Store in in slot 0x4
26,102,842 UART: [art] Derive Key Pair
26,103,849 UART: [art] Store priv key in slot 0x5
29,345,854 UART: [art] Derive Key Pair - Done
29,358,794 UART: [art] Signing Cert with AUTHO
29,360,102 UART: RITY.KEYID = 7
31,639,506 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,017 UART: [art] PUB.X = 7D07205F3434645334FEDB7DBD485F3A9EAEFD568F99457F9945629096B492EFE913B9490A9B22AD3980870C9098EE3B
31,648,285 UART: [art] PUB.Y = 6F10D4645FB1DB56AC30BDA25BAFA98DB1A7D6147A32C32214DB8F47F49EEB4AE984F6B481A928C35064E7C9DBF33E4A
31,655,516 UART: [art] SIG.R = 6C36CDB56964C3EEF755DC14D34B2FE0F52F2162B9A542BAF07AEF2BC14EC63E60CA872FC046043AB0500C04E9186DF6
31,662,925 UART: [art] SIG.S = AA30705C67540BC3998442E2AC1C19D886B28F252F1856D8721C91FB79E88F1AC3B5FF419B5AD095D922D12366F232BF
32,968,124 UART: Caliptra RT
32,968,837 UART: [state] CFI Enabled
33,087,533 UART: [rt] RT listening for mailbox commands...
33,118,996 UART: [rt]cmd =0x50435251, len=36
34,274,579 >>> mbox cmd response data (1848 bytes)
34,283,508 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,313,692 UART: [rt]cmd =0x50435245, len=56
34,316,744 >>> mbox cmd response data (8 bytes)
34,317,420 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,347,458 UART: [rt]cmd =0x50435251, len=36
35,502,799 >>> mbox cmd response data (1848 bytes)
35,512,753 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,543,052 UART: [rt]cmd =0x50435245, len=56
35,546,088 >>> mbox cmd response data (8 bytes)
35,546,814 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,576,899 UART: [rt]cmd =0x50435251, len=36
36,732,202 >>> mbox cmd response data (1848 bytes)
36,741,087 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,771,589 UART: [rt]cmd =0x50435245, len=56
36,774,737 >>> mbox cmd response data (8 bytes)
36,775,329 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,805,314 UART: [rt]cmd =0x50435251, len=36
37,960,641 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
191,955 UART:
192,319 UART: Running Caliptra ROM ...
193,521 UART:
193,682 UART: [state] CFI Enabled
265,527 UART: [state] LifecycleState = Unprovisioned
267,627 UART: [state] DebugLocked = No
269,525 UART: [state] WD Timer not started. Device not locked for debugging
273,214 UART: [kat] SHA2-256
452,326 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,923 UART: [kat] ++
464,457 UART: [kat] sha1
474,203 UART: [kat] SHA2-256
477,212 UART: [kat] SHA2-384
483,415 UART: [kat] SHA2-512-ACC
486,350 UART: [kat] ECC-384
2,949,442 UART: [kat] HMAC-384Kdf
2,972,274 UART: [kat] LMS
3,501,744 UART: [kat] --
3,504,863 UART: [cold-reset] ++
3,506,661 UART: [fht] FHT @ 0x50003400
3,518,636 UART: [idev] ++
3,519,206 UART: [idev] CDI.KEYID = 6
3,520,241 UART: [idev] SUBJECT.KEYID = 7
3,521,342 UART: [idev] UDS.KEYID = 0
3,522,290 ready_for_fw is high
3,522,511 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,199 UART: [idev] Erasing UDS.KEYID = 0
6,025,997 UART: [idev] Sha1 KeyId Algorithm
6,049,352 UART: [idev] --
6,054,485 UART: [ldev] ++
6,055,062 UART: [ldev] CDI.KEYID = 6
6,055,970 UART: [ldev] SUBJECT.KEYID = 5
6,057,079 UART: [ldev] AUTHORITY.KEYID = 7
6,058,372 UART: [ldev] FE.KEYID = 1
6,100,789 UART: [ldev] Erasing FE.KEYID = 1
8,607,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,334 UART: [ldev] --
10,415,391 UART: [fwproc] Wait for Commands...
10,417,057 UART: [fwproc] Recv command 0x46574c44
10,419,154 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,822 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,108 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,275,859 >>> mbox cmd response: success
14,277,036 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,280,490 UART: [afmc] ++
14,281,086 UART: [afmc] CDI.KEYID = 6
14,281,976 UART: [afmc] SUBJECT.KEYID = 7
14,283,114 UART: [afmc] AUTHORITY.KEYID = 5
16,818,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,547,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,549,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,564,837 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,580,898 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,596,784 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,619,804 UART: [afmc] --
18,622,970 UART: [cold-reset] --
18,626,996 UART: [state] Locking Datavault
18,631,917 UART: [state] Locking PCR0, PCR1 and PCR31
18,633,593 UART: [state] Locking ICCM
18,635,150 UART: [exit] Launching FMC @ 0x40000130
18,643,547 UART:
18,643,783 UART: Running Caliptra FMC ...
18,644,886 UART:
18,645,058 UART: [state] CFI Enabled
18,705,723 UART: [fht] FMC Alias Private Key: 7
20,470,354 UART: [art] Extend RT PCRs Done
20,471,572 UART: [art] Lock RT PCRs Done
20,473,525 UART: [art] Populate DV Done
20,479,048 UART: [fht] FMC Alias Private Key: 7
20,480,541 UART: [art] Derive CDI
20,481,302 UART: [art] Store in in slot 0x4
20,538,859 UART: [art] Derive Key Pair
20,539,896 UART: [art] Store priv key in slot 0x5
23,002,853 UART: [art] Derive Key Pair - Done
23,016,045 UART: [art] Signing Cert with AUTHO
23,017,362 UART: RITY.KEYID = 7
24,728,272 UART: [art] Erasing AUTHORITY.KEYID = 7
24,729,775 UART: [art] PUB.X = 8DB17E4A71CD3D8AF5A859994AD61BC40D5AA0D2CA15E4DA7AAFC8D83485E1C0C4398B221E0DC264EBD0D845A68F5D8F
24,737,049 UART: [art] PUB.Y = 138A83F3177D64AA3EE045BEB932903173472497F1158CF6709AD8BDB73F4836BB18E8EFC18A7871CEF18EF13ED04E7A
24,744,302 UART: [art] SIG.R = 8D9B71F0D6A6EEA6F98FA2CFC32E6E50818521DB622E02D67E7FB2ADEE0432E6F6F16A5BD5878C4B3D017D3D28D57BFC
24,751,741 UART: [art] SIG.S = 8550D4D9075F9B716B8D5083435DD9D805EF45B878BBB2867EF518060AABD6113021960A96B9E5DD20ADAD0CA1B51340
25,730,728 UART: Caliptra RT
25,731,421 UART: [state] CFI Enabled
25,908,445 UART: [rt] RT listening for mailbox commands...
25,939,862 UART: [rt]cmd =0x50435251, len=36
26,847,440 >>> mbox cmd response data (1848 bytes)
26,856,369 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,886,858 UART: [rt]cmd =0x50435245, len=56
26,890,101 >>> mbox cmd response data (8 bytes)
26,890,919 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,921,251 UART: [rt]cmd =0x50435251, len=36
27,850,097 >>> mbox cmd response data (1848 bytes)
27,860,066 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,890,456 UART: [rt]cmd =0x50435245, len=56
27,893,652 >>> mbox cmd response data (8 bytes)
27,894,404 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,924,612 UART: [rt]cmd =0x50435251, len=36
28,852,554 >>> mbox cmd response data (1848 bytes)
28,861,456 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,891,883 UART: [rt]cmd =0x50435245, len=56
28,895,119 >>> mbox cmd response data (8 bytes)
28,895,671 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,925,621 UART: [rt]cmd =0x50435251, len=36
29,833,341 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,382,275 ready_for_fw is high
3,382,843 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,032,084 >>> mbox cmd response: success
14,033,393 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,322,077 UART:
18,322,462 UART: Running Caliptra FMC ...
18,323,566 UART:
18,323,720 UART: [state] CFI Enabled
18,389,647 UART: [fht] FMC Alias Private Key: 7
20,152,762 UART: [art] Extend RT PCRs Done
20,153,997 UART: [art] Lock RT PCRs Done
20,155,558 UART: [art] Populate DV Done
20,160,967 UART: [fht] FMC Alias Private Key: 7
20,162,609 UART: [art] Derive CDI
20,163,348 UART: [art] Store in in slot 0x4
20,222,262 UART: [art] Derive Key Pair
20,223,304 UART: [art] Store priv key in slot 0x5
22,686,738 UART: [art] Derive Key Pair - Done
22,699,785 UART: [art] Signing Cert with AUTHO
22,701,108 UART: RITY.KEYID = 7
24,412,068 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,575 UART: [art] PUB.X = B44BAEF4E85EBC87AF18724EF3BF5F05CDCA840ECC25FCDA9CAF0BED62F4566B64FBF1640C0EC5B00EA2218A1BB17436
24,420,875 UART: [art] PUB.Y = 6AA4B70516C39CA13BABB18F296F256B327800DDC1E4947E65F760CF783D743C384031A52917C4B90C65E73BE3605BE6
24,428,134 UART: [art] SIG.R = 6E7CF7E3E2ABAFFB1AD7CC309E084B60638EFFC2E9B2E502296DA1666834E682B5FA075054CF834FA5AD226D4B47AB11
24,435,521 UART: [art] SIG.S = 3211EA20210D0D1605EA82327444F5138397130DEFC7EABFFE53D4CB422636C2B9285CA475A56679BAA42D032BD8B6CE
25,414,118 UART: Caliptra RT
25,414,844 UART: [state] CFI Enabled
25,580,517 UART: [rt] RT listening for mailbox commands...
25,612,102 UART: [rt]cmd =0x50435251, len=36
26,539,916 >>> mbox cmd response data (1848 bytes)
26,548,789 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,579,110 UART: [rt]cmd =0x50435245, len=56
26,582,129 >>> mbox cmd response data (8 bytes)
26,582,919 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,612,862 UART: [rt]cmd =0x50435251, len=36
27,541,613 >>> mbox cmd response data (1848 bytes)
27,551,798 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,582,248 UART: [rt]cmd =0x50435245, len=56
27,585,453 >>> mbox cmd response data (8 bytes)
27,586,195 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,616,451 UART: [rt]cmd =0x50435251, len=36
28,544,203 >>> mbox cmd response data (1848 bytes)
28,553,122 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,583,235 UART: [rt]cmd =0x50435245, len=56
28,586,202 >>> mbox cmd response data (8 bytes)
28,586,756 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,616,653 UART: [rt]cmd =0x50435251, len=36
29,524,659 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,877 writing to cptra_bootfsm_go
193,123 UART:
193,476 UART: Running Caliptra ROM ...
194,657 UART:
604,413 UART: [state] CFI Enabled
617,731 UART: [state] LifecycleState = Unprovisioned
619,583 UART: [state] DebugLocked = No
622,101 UART: [state] WD Timer not started. Device not locked for debugging
625,428 UART: [kat] SHA2-256
804,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,118 UART: [kat] ++
816,567 UART: [kat] sha1
828,786 UART: [kat] SHA2-256
831,790 UART: [kat] SHA2-384
837,139 UART: [kat] SHA2-512-ACC
840,145 UART: [kat] ECC-384
3,279,263 UART: [kat] HMAC-384Kdf
3,292,064 UART: [kat] LMS
3,821,542 UART: [kat] --
3,826,242 UART: [cold-reset] ++
3,827,528 UART: [fht] FHT @ 0x50003400
3,838,962 UART: [idev] ++
3,839,530 UART: [idev] CDI.KEYID = 6
3,840,413 UART: [idev] SUBJECT.KEYID = 7
3,841,652 UART: [idev] UDS.KEYID = 0
3,842,555 ready_for_fw is high
3,842,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,187 UART: [idev] Erasing UDS.KEYID = 0
6,310,277 UART: [idev] Sha1 KeyId Algorithm
6,333,401 UART: [idev] --
6,336,697 UART: [ldev] ++
6,337,265 UART: [ldev] CDI.KEYID = 6
6,338,174 UART: [ldev] SUBJECT.KEYID = 5
6,339,334 UART: [ldev] AUTHORITY.KEYID = 7
6,340,618 UART: [ldev] FE.KEYID = 1
6,349,914 UART: [ldev] Erasing FE.KEYID = 1
8,821,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,601 UART: [ldev] --
10,613,020 UART: [fwproc] Wait for Commands...
10,614,683 UART: [fwproc] Recv command 0x46574c44
10,616,775 UART: [fwproc] Recv'd Img size: 114168 bytes
14,019,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,602 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,404 >>> mbox cmd response: success
14,481,401 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,484,991 UART: [afmc] ++
14,485,574 UART: [afmc] CDI.KEYID = 6
14,486,483 UART: [afmc] SUBJECT.KEYID = 7
14,487,699 UART: [afmc] AUTHORITY.KEYID = 5
16,984,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,705,750 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,707,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,723,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,739,444 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,755,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,777,398 UART: [afmc] --
18,780,504 UART: [cold-reset] --
18,783,897 UART: [state] Locking Datavault
18,786,842 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,486 UART: [state] Locking ICCM
18,790,636 UART: [exit] Launching FMC @ 0x40000130
18,799,087 UART:
18,799,326 UART: Running Caliptra FMC ...
18,800,425 UART:
18,800,588 UART: [state] CFI Enabled
18,808,686 UART: [fht] FMC Alias Private Key: 7
20,566,102 UART: [art] Extend RT PCRs Done
20,567,332 UART: [art] Lock RT PCRs Done
20,568,821 UART: [art] Populate DV Done
20,574,523 UART: [fht] FMC Alias Private Key: 7
20,576,277 UART: [art] Derive CDI
20,577,016 UART: [art] Store in in slot 0x4
20,619,720 UART: [art] Derive Key Pair
20,620,755 UART: [art] Store priv key in slot 0x5
23,047,317 UART: [art] Derive Key Pair - Done
23,060,258 UART: [art] Signing Cert with AUTHO
23,061,557 UART: RITY.KEYID = 7
24,767,169 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,673 UART: [art] PUB.X = F36D82852CCFCA4CF6C8363BE08D653B78D8A926A8B8810E52213C564E4C4C0843594C34B287010FFC2376497E5BD93C
24,775,922 UART: [art] PUB.Y = E39DAC3943CF775FC99D768BDE418AD47B09A095D0BF78A026D5D365924084A69F5D935BD65FF68E28CF08C8C6E73A78
24,783,202 UART: [art] SIG.R = 4E1D590F6F72DB06F0AF5FE62A4D1A427F3CEAB4FB28616BEFA1E03F8E3CAFE44A5FDA7BF8AC0773F65A0625C77610A7
24,790,665 UART: [art] SIG.S = 83054BBB723F6F570F4E471BA99DFF7301B41EA43923A882DD0C0C56A81B89C389D657B6FCFC6358ECE777BA6D106316
25,768,778 UART: Caliptra RT
25,769,474 UART: [state] CFI Enabled
25,886,691 UART: [rt] RT listening for mailbox commands...
25,918,315 UART: [rt]cmd =0x50435251, len=36
26,826,268 >>> mbox cmd response data (1848 bytes)
26,835,167 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,865,495 UART: [rt]cmd =0x50435245, len=56
26,868,601 >>> mbox cmd response data (8 bytes)
26,869,310 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,899,453 UART: [rt]cmd =0x50435251, len=36
27,807,048 >>> mbox cmd response data (1848 bytes)
27,816,972 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,847,517 UART: [rt]cmd =0x50435245, len=56
27,850,473 >>> mbox cmd response data (8 bytes)
27,851,111 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,881,245 UART: [rt]cmd =0x50435251, len=36
28,788,956 >>> mbox cmd response data (1848 bytes)
28,797,871 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,827,930 UART: [rt]cmd =0x50435245, len=56
28,830,919 >>> mbox cmd response data (8 bytes)
28,831,593 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,861,493 UART: [rt]cmd =0x50435251, len=36
29,768,893 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
3,694,384 ready_for_fw is high
3,694,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,846 >>> mbox cmd response: success
14,263,572 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,509,493 UART:
18,509,890 UART: Running Caliptra FMC ...
18,511,024 UART:
18,511,192 UART: [state] CFI Enabled
18,519,467 UART: [fht] FMC Alias Private Key: 7
20,275,753 UART: [art] Extend RT PCRs Done
20,276,991 UART: [art] Lock RT PCRs Done
20,278,571 UART: [art] Populate DV Done
20,283,878 UART: [fht] FMC Alias Private Key: 7
20,285,473 UART: [art] Derive CDI
20,286,288 UART: [art] Store in in slot 0x4
20,328,879 UART: [art] Derive Key Pair
20,329,892 UART: [art] Store priv key in slot 0x5
22,756,272 UART: [art] Derive Key Pair - Done
22,769,317 UART: [art] Signing Cert with AUTHO
22,770,628 UART: RITY.KEYID = 7
24,476,017 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,532 UART: [art] PUB.X = BEE76B2AF129A39CF2ED106ABEC9BDE7D0022E0E6BB5C5DC4C2F0CC138C58202D6BCBAE76D2E9557F22F6CA273F03203
24,484,831 UART: [art] PUB.Y = 23076E958D43A2A8EB87EBE7DCF500CFD1CDB4FAB6FA4DC16213B238D0135677B44D2FC5D490F6717D1ED5BCC4680C6C
24,492,100 UART: [art] SIG.R = AD69722AF0ABDDF97A0131B204B6A0D91FF1B018229528EA64CBB1F738B7D28F76083E47AE67C9D02C50B4C6538368D0
24,499,498 UART: [art] SIG.S = F60A9B81D07D28F42B7C31EE2293411D9191DBB98CD77945C556ED36724434B3CA9B7E4D9720E1F5ADC30B18EF0C9878
25,478,459 UART: Caliptra RT
25,479,163 UART: [state] CFI Enabled
25,596,171 UART: [rt] RT listening for mailbox commands...
25,627,946 UART: [rt]cmd =0x50435251, len=36
26,535,394 >>> mbox cmd response data (1848 bytes)
26,544,296 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,574,526 UART: [rt]cmd =0x50435245, len=56
26,577,779 >>> mbox cmd response data (8 bytes)
26,578,608 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,608,638 UART: [rt]cmd =0x50435251, len=36
27,516,061 >>> mbox cmd response data (1848 bytes)
27,526,205 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,556,651 UART: [rt]cmd =0x50435245, len=56
27,559,800 >>> mbox cmd response data (8 bytes)
27,560,461 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,590,448 UART: [rt]cmd =0x50435251, len=36
28,498,268 >>> mbox cmd response data (1848 bytes)
28,507,347 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,537,852 UART: [rt]cmd =0x50435245, len=56
28,541,155 >>> mbox cmd response data (8 bytes)
28,541,705 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,571,746 UART: [rt]cmd =0x50435251, len=36
29,479,309 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,002 UART:
192,372 UART: Running Caliptra ROM ...
193,565 UART:
193,719 UART: [state] CFI Enabled
262,827 UART: [state] LifecycleState = Unprovisioned
265,164 UART: [state] DebugLocked = No
267,264 UART: [state] WD Timer not started. Device not locked for debugging
272,518 UART: [kat] SHA2-256
462,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,146 UART: [kat] ++
473,627 UART: [kat] sha1
484,574 UART: [kat] SHA2-256
487,585 UART: [kat] SHA2-384
493,244 UART: [kat] SHA2-512-ACC
495,839 UART: [kat] ECC-384
2,947,350 UART: [kat] HMAC-384Kdf
2,971,310 UART: [kat] LMS
3,503,066 UART: [kat] --
3,508,334 UART: [cold-reset] ++
3,510,117 UART: [fht] FHT @ 0x50003400
3,520,380 UART: [idev] ++
3,521,083 UART: [idev] CDI.KEYID = 6
3,522,067 UART: [idev] SUBJECT.KEYID = 7
3,523,238 UART: [idev] UDS.KEYID = 0
3,524,161 ready_for_fw is high
3,524,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,318 UART: [idev] Erasing UDS.KEYID = 0
6,033,017 UART: [idev] Sha1 KeyId Algorithm
6,055,903 UART: [idev] --
6,060,698 UART: [ldev] ++
6,061,392 UART: [ldev] CDI.KEYID = 6
6,062,311 UART: [ldev] SUBJECT.KEYID = 5
6,063,476 UART: [ldev] AUTHORITY.KEYID = 7
6,064,712 UART: [ldev] FE.KEYID = 1
6,099,877 UART: [ldev] Erasing FE.KEYID = 1
8,603,408 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,881 UART: [ldev] --
10,410,794 UART: [fwproc] Wait for Commands...
10,413,376 UART: [fwproc] Recv command 0x46574c44
10,415,686 UART: [fwproc] Recv'd Img size: 114168 bytes
13,856,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,024 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,047,185 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,589,301 >>> mbox cmd response: success
14,590,475 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,593,254 UART: [afmc] ++
14,593,953 UART: [afmc] CDI.KEYID = 6
14,595,193 UART: [afmc] SUBJECT.KEYID = 7
14,596,628 UART: [afmc] AUTHORITY.KEYID = 5
17,134,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,518 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,626 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,657 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,993 UART: [afmc] --
18,948,874 UART: [cold-reset] --
18,951,955 UART: [state] Locking Datavault
18,956,184 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,329 UART: [state] Locking ICCM
18,959,671 UART: [exit] Launching FMC @ 0x40000130
18,968,342 UART:
18,968,581 UART: Running Caliptra FMC ...
18,969,681 UART:
18,969,843 UART: [state] CFI Enabled
19,032,631 UART: [fht] FMC Alias Private Key: 7
20,796,215 UART: [art] Extend RT PCRs Done
20,797,426 UART: [art] Lock RT PCRs Done
20,799,064 UART: [art] Populate DV Done
20,804,366 UART: [fht] FMC Alias Private Key: 7
20,805,954 UART: [art] Derive CDI
20,806,763 UART: [art] Store in in slot 0x4
20,865,294 UART: [art] Derive Key Pair
20,866,344 UART: [art] Store priv key in slot 0x5
23,329,444 UART: [art] Derive Key Pair - Done
23,342,492 UART: [art] Signing Cert with AUTHO
23,343,787 UART: RITY.KEYID = 7
25,054,864 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,375 UART: [art] PUB.X = 507988823AEAADDAC40AE47CCFE052F9CFD7C5673E5F388B072D7D6C3AA6A74837B9F5CC04C4D41A8CF33B546ED5775B
25,063,659 UART: [art] PUB.Y = 5FA4A1BFB826CE404E2CDF0D9E4781251E0E4DEC4323EA311DEFDBD2A8624577889A99ADB6F38C945272BD2BED707E5A
25,070,982 UART: [art] SIG.R = CC2653F0B25CC8031704C6B3C804B8274F0125DB1ABFA4B7D15352BD84A714C0FEF6701EA9A6A6A746B18432CEC7009B
25,078,325 UART: [art] SIG.S = 47CC91DDB731141C2036E83E7BCE380A37C5D0356246AABD98393CDCC4B7100D313AAED8E7374EC84AA21A4E25090DB0
26,057,673 UART: Caliptra RT
26,058,360 UART: [state] CFI Enabled
26,224,797 UART: [rt] RT listening for mailbox commands...
26,256,429 UART: [rt]cmd =0x50435251, len=36
27,182,969 >>> mbox cmd response data (1848 bytes)
27,191,904 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,222,127 UART: [rt]cmd =0x50435245, len=56
27,225,263 >>> mbox cmd response data (8 bytes)
27,225,908 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,255,847 UART: [rt]cmd =0x50435251, len=36
28,163,728 >>> mbox cmd response data (1848 bytes)
28,173,693 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,203,727 UART: [rt]cmd =0x50435245, len=56
28,206,810 >>> mbox cmd response data (8 bytes)
28,207,528 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,237,605 UART: [rt]cmd =0x50435251, len=36
29,145,286 >>> mbox cmd response data (1848 bytes)
29,154,188 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,184,315 UART: [rt]cmd =0x50435245, len=56
29,187,746 >>> mbox cmd response data (8 bytes)
29,188,306 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,218,173 UART: [rt]cmd =0x50435251, len=36
30,126,646 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,438,501 ready_for_fw is high
3,438,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,735,236 >>> mbox cmd response: success
14,736,666 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,042,154 UART:
19,042,557 UART: Running Caliptra FMC ...
19,043,670 UART:
19,043,831 UART: [state] CFI Enabled
19,111,592 UART: [fht] FMC Alias Private Key: 7
20,875,360 UART: [art] Extend RT PCRs Done
20,876,581 UART: [art] Lock RT PCRs Done
20,878,128 UART: [art] Populate DV Done
20,883,381 UART: [fht] FMC Alias Private Key: 7
20,884,873 UART: [art] Derive CDI
20,885,633 UART: [art] Store in in slot 0x4
20,943,802 UART: [art] Derive Key Pair
20,944,822 UART: [art] Store priv key in slot 0x5
23,407,492 UART: [art] Derive Key Pair - Done
23,420,338 UART: [art] Signing Cert with AUTHO
23,421,649 UART: RITY.KEYID = 7
25,132,629 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,136 UART: [art] PUB.X = F6922DCD3D8821E0099C529E986CFD47DF5AE6721A28AC3EE75122A31EE25F7129F31CF55C1BA58A88F92353B9DAE571
25,141,446 UART: [art] PUB.Y = 9E16FEB5F598D127E8A9430792050FA4DA27F37BEEAAD258D7E0BD97C6478DEE1526BD2BD4CFC346FE486ABA8B020475
25,148,687 UART: [art] SIG.R = 9FE2B6AD7039EB239BC73F05C6CAA1D2D97D4B1A050DA65D4324C7A0A1D5A6594E662B853C9D2AB0EA51CA6D3ABBD351
25,156,133 UART: [art] SIG.S = 89151BAF8D57CF5A7DA8B03047A645D8A1A90B968582757F99F42C015FC61E407EF9BE7C5FF221BF846D058B2AD83C9A
26,134,039 UART: Caliptra RT
26,134,760 UART: [state] CFI Enabled
26,299,407 UART: [rt] RT listening for mailbox commands...
26,330,985 UART: [rt]cmd =0x50435251, len=36
27,259,210 >>> mbox cmd response data (1848 bytes)
27,268,132 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,298,245 UART: [rt]cmd =0x50435245, len=56
27,301,465 >>> mbox cmd response data (8 bytes)
27,302,324 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,332,362 UART: [rt]cmd =0x50435251, len=36
28,239,901 >>> mbox cmd response data (1848 bytes)
28,250,016 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,280,440 UART: [rt]cmd =0x50435245, len=56
28,283,413 >>> mbox cmd response data (8 bytes)
28,284,041 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,313,922 UART: [rt]cmd =0x50435251, len=36
29,241,265 >>> mbox cmd response data (1848 bytes)
29,250,162 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,280,441 UART: [rt]cmd =0x50435245, len=56
29,283,413 >>> mbox cmd response data (8 bytes)
29,283,968 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,314,144 UART: [rt]cmd =0x50435251, len=36
30,223,124 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,813 writing to cptra_bootfsm_go
192,925 UART:
193,296 UART: Running Caliptra ROM ...
194,442 UART:
604,104 UART: [state] CFI Enabled
621,251 UART: [state] LifecycleState = Unprovisioned
623,618 UART: [state] DebugLocked = No
626,363 UART: [state] WD Timer not started. Device not locked for debugging
630,815 UART: [kat] SHA2-256
820,736 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,502 UART: [kat] ++
832,116 UART: [kat] sha1
843,399 UART: [kat] SHA2-256
846,448 UART: [kat] SHA2-384
850,959 UART: [kat] SHA2-512-ACC
853,543 UART: [kat] ECC-384
3,294,127 UART: [kat] HMAC-384Kdf
3,306,997 UART: [kat] LMS
3,838,873 UART: [kat] --
3,844,283 UART: [cold-reset] ++
3,846,636 UART: [fht] FHT @ 0x50003400
3,857,397 UART: [idev] ++
3,858,103 UART: [idev] CDI.KEYID = 6
3,859,012 UART: [idev] SUBJECT.KEYID = 7
3,860,261 UART: [idev] UDS.KEYID = 0
3,861,186 ready_for_fw is high
3,861,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,736 UART: [idev] Erasing UDS.KEYID = 0
6,331,606 UART: [idev] Sha1 KeyId Algorithm
6,353,101 UART: [idev] --
6,358,282 UART: [ldev] ++
6,358,961 UART: [ldev] CDI.KEYID = 6
6,360,037 UART: [ldev] SUBJECT.KEYID = 5
6,361,169 UART: [ldev] AUTHORITY.KEYID = 7
6,362,350 UART: [ldev] FE.KEYID = 1
6,372,594 UART: [ldev] Erasing FE.KEYID = 1
8,849,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,966 UART: [ldev] --
10,639,284 UART: [fwproc] Wait for Commands...
10,641,968 UART: [fwproc] Recv command 0x46574c44
10,644,294 UART: [fwproc] Recv'd Img size: 114168 bytes
14,092,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,620 >>> mbox cmd response: success
14,831,559 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,833,845 UART: [afmc] ++
14,834,544 UART: [afmc] CDI.KEYID = 6
14,835,732 UART: [afmc] SUBJECT.KEYID = 7
14,837,221 UART: [afmc] AUTHORITY.KEYID = 5
17,341,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,338 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,077,522 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,092,675 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,107,683 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,130,259 UART: [afmc] --
19,133,157 UART: [cold-reset] --
19,137,727 UART: [state] Locking Datavault
19,142,764 UART: [state] Locking PCR0, PCR1 and PCR31
19,144,896 UART: [state] Locking ICCM
19,146,563 UART: [exit] Launching FMC @ 0x40000130
19,155,238 UART:
19,155,482 UART: Running Caliptra FMC ...
19,156,586 UART:
19,156,744 UART: [state] CFI Enabled
19,165,364 UART: [fht] FMC Alias Private Key: 7
20,923,073 UART: [art] Extend RT PCRs Done
20,924,301 UART: [art] Lock RT PCRs Done
20,925,932 UART: [art] Populate DV Done
20,931,068 UART: [fht] FMC Alias Private Key: 7
20,932,657 UART: [art] Derive CDI
20,933,491 UART: [art] Store in in slot 0x4
20,975,818 UART: [art] Derive Key Pair
20,976,815 UART: [art] Store priv key in slot 0x5
23,403,385 UART: [art] Derive Key Pair - Done
23,416,487 UART: [art] Signing Cert with AUTHO
23,417,796 UART: RITY.KEYID = 7
25,123,120 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,623 UART: [art] PUB.X = 4173A28B64FE214C1939EEC18C6BDE18E64B594C07C776B96D61DA5D03E809E677CBEA5E64BD079DA19E3817B11BFD20
25,131,865 UART: [art] PUB.Y = B1B20A3F1ED8E6E0E79D6829396407FD15886AB854EEE7C12809591D43E649C7E46FDFD88231D1B9D36FF08EF15C65D2
25,139,146 UART: [art] SIG.R = FC6A112553A60C11453D5D7C5889EF328EE6AA1447339561EA6D42D421CA2C92CD5C3B7831F1D8B0060FA491FC0029C0
25,146,537 UART: [art] SIG.S = DF3C5F98F0B320790178724A03ADEE5E3751DD0019C04E19AF3482DF13C55E140FED8FE94461B6232B52E8E14F1EEFD8
26,125,081 UART: Caliptra RT
26,125,789 UART: [state] CFI Enabled
26,242,683 UART: [rt] RT listening for mailbox commands...
26,274,580 UART: [rt]cmd =0x50435251, len=36
27,182,238 >>> mbox cmd response data (1848 bytes)
27,191,140 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,221,521 UART: [rt]cmd =0x50435245, len=56
27,224,596 >>> mbox cmd response data (8 bytes)
27,225,339 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,255,337 UART: [rt]cmd =0x50435251, len=36
28,162,829 >>> mbox cmd response data (1848 bytes)
28,172,820 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,202,938 UART: [rt]cmd =0x50435245, len=56
28,206,053 >>> mbox cmd response data (8 bytes)
28,206,776 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,236,768 UART: [rt]cmd =0x50435251, len=36
29,144,715 >>> mbox cmd response data (1848 bytes)
29,153,603 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,183,770 UART: [rt]cmd =0x50435245, len=56
29,186,878 >>> mbox cmd response data (8 bytes)
29,187,383 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,217,545 UART: [rt]cmd =0x50435251, len=36
30,125,153 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
3,751,232 ready_for_fw is high
3,751,670 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,955,380 >>> mbox cmd response: success
14,956,649 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,206,809 UART:
19,207,199 UART: Running Caliptra FMC ...
19,208,299 UART:
19,208,451 UART: [state] CFI Enabled
19,216,625 UART: [fht] FMC Alias Private Key: 7
20,974,323 UART: [art] Extend RT PCRs Done
20,975,561 UART: [art] Lock RT PCRs Done
20,976,944 UART: [art] Populate DV Done
20,982,393 UART: [fht] FMC Alias Private Key: 7
20,983,977 UART: [art] Derive CDI
20,984,719 UART: [art] Store in in slot 0x4
21,027,207 UART: [art] Derive Key Pair
21,028,215 UART: [art] Store priv key in slot 0x5
23,454,180 UART: [art] Derive Key Pair - Done
23,467,384 UART: [art] Signing Cert with AUTHO
23,468,722 UART: RITY.KEYID = 7
25,174,152 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,661 UART: [art] PUB.X = D5620ACE82BF1DA186A500062A395C7E07AE3519C4707D806ABC64D94DF823E0A638872F29142EC8D57DB885B0666AAD
25,182,904 UART: [art] PUB.Y = 7E5C2E9330B3CCFCF3E8B06C5E3EBD5FEA559F473E21C104D6CE86AA628B4BD9CF6C5BC7A2F7EF0ECC51264E6DB1AD14
25,190,249 UART: [art] SIG.R = 6EE25E613ED106AF014A5F6FB1FD39D62E3461C096899900EAE2EC0B2BB3915D169B65F63B4A9BA3DDA4846F6EE1270B
25,197,636 UART: [art] SIG.S = E091FF63FAA678EBA4B7DA7FC2CCF513B296E167903B9F153CB3D7D1E8350BC56D8D30E1757BE2E78DB70904AFDC76CF
26,177,020 UART: Caliptra RT
26,177,716 UART: [state] CFI Enabled
26,295,005 UART: [rt] RT listening for mailbox commands...
26,326,820 UART: [rt]cmd =0x50435251, len=36
27,234,442 >>> mbox cmd response data (1848 bytes)
27,243,335 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,273,557 UART: [rt]cmd =0x50435245, len=56
27,276,955 >>> mbox cmd response data (8 bytes)
27,277,751 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,307,802 UART: [rt]cmd =0x50435251, len=36
28,215,089 >>> mbox cmd response data (1848 bytes)
28,225,020 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,255,441 UART: [rt]cmd =0x50435245, len=56
28,258,364 >>> mbox cmd response data (8 bytes)
28,258,995 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,288,834 UART: [rt]cmd =0x50435251, len=36
29,196,459 >>> mbox cmd response data (1848 bytes)
29,205,393 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,235,628 UART: [rt]cmd =0x50435245, len=56
29,238,810 >>> mbox cmd response data (8 bytes)
29,239,370 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,269,186 UART: [rt]cmd =0x50435251, len=36
30,176,731 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,949 UART: [kat] SHA2-256
881,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,995 UART: [kat] ++
886,147 UART: [kat] sha1
890,293 UART: [kat] SHA2-256
892,231 UART: [kat] SHA2-384
894,946 UART: [kat] SHA2-512-ACC
896,847 UART: [kat] ECC-384
902,446 UART: [kat] HMAC-384Kdf
907,096 UART: [kat] LMS
1,475,292 UART: [kat] --
1,476,119 UART: [cold-reset] ++
1,476,643 UART: [fht] Storing FHT @ 0x50003400
1,479,218 UART: [idev] ++
1,479,386 UART: [idev] CDI.KEYID = 6
1,479,746 UART: [idev] SUBJECT.KEYID = 7
1,480,170 UART: [idev] UDS.KEYID = 0
1,480,515 ready_for_fw is high
1,480,515 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,062 UART: [idev] Erasing UDS.KEYID = 0
1,504,318 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,868 UART: [idev] --
1,514,101 UART: [ldev] ++
1,514,269 UART: [ldev] CDI.KEYID = 6
1,514,632 UART: [ldev] SUBJECT.KEYID = 5
1,515,058 UART: [ldev] AUTHORITY.KEYID = 7
1,515,521 UART: [ldev] FE.KEYID = 1
1,520,785 UART: [ldev] Erasing FE.KEYID = 1
1,546,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,938 UART: [ldev] --
1,585,355 UART: [fwproc] Waiting for Commands...
1,586,062 UART: [fwproc] Received command 0x46574c44
1,586,853 UART: [fwproc] Received Image of size 114168 bytes
2,882,979 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,787 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,874 >>> mbox cmd response: success
3,074,874 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,075,940 UART: [afmc] ++
3,076,108 UART: [afmc] CDI.KEYID = 6
3,076,470 UART: [afmc] SUBJECT.KEYID = 7
3,076,895 UART: [afmc] AUTHORITY.KEYID = 5
3,111,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,332 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,725 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,415 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,280 UART: [afmc] --
3,155,372 UART: [cold-reset] --
3,156,118 UART: [state] Locking Datavault
3,157,255 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,859 UART: [state] Locking ICCM
3,158,463 UART: [exit] Launching FMC @ 0x40000130
3,163,792 UART:
3,163,808 UART: Running Caliptra FMC ...
3,164,216 UART:
3,164,270 UART: [state] CFI Enabled
3,174,761 UART: [fht] FMC Alias Private Key: 7
3,283,036 UART: [art] Extend RT PCRs Done
3,283,464 UART: [art] Lock RT PCRs Done
3,284,840 UART: [art] Populate DV Done
3,292,893 UART: [fht] FMC Alias Private Key: 7
3,293,993 UART: [art] Derive CDI
3,294,273 UART: [art] Store in in slot 0x4
3,380,236 UART: [art] Derive Key Pair
3,380,596 UART: [art] Store priv key in slot 0x5
3,393,876 UART: [art] Derive Key Pair - Done
3,408,636 UART: [art] Signing Cert with AUTHO
3,409,116 UART: RITY.KEYID = 7
3,424,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,087 UART: [art] PUB.X = 57210AEF8149AA1D6316BEC99928634B517F80C59E1D1467AF5873680CE6D58E3A8F3931D7E67AF4246C2CEA09D434F5
3,431,850 UART: [art] PUB.Y = E2334E058A3FEB2317E2202C62F35BB8CE8EFFEC137166965D8271D7FEDBB67EF6028BC48AC1CE8E40592493CF33616A
3,438,806 UART: [art] SIG.R = 335E5982621AB9B27B621C83A5FACFE24898153191CA06DE614D57CC4BA61CB6471F28519CD328F0B6CC1D5283971089
3,445,573 UART: [art] SIG.S = 2079874791C0360F4A31B58DB8230A4C5FBF121173752FEA3A1EE6D9E2D48DB65275125D1AE255D4EE30185990DC93C6
3,469,344 UART: Caliptra RT
3,469,597 UART: [state] CFI Enabled
3,577,173 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,947 UART: [rt]cmd =0x50435251, len=36
3,775,332 >>> mbox cmd response data (1848 bytes)
3,775,333 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,804,848 UART: [rt]cmd =0x50435245, len=56
3,808,434 >>> mbox cmd response data (8 bytes)
3,808,435 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,084 UART: [rt]cmd =0x50435251, len=36
4,005,463 >>> mbox cmd response data (1848 bytes)
4,005,464 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,035,345 UART: [rt]cmd =0x50435245, len=56
4,038,819 >>> mbox cmd response data (8 bytes)
4,038,820 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,097 UART: [rt]cmd =0x50435251, len=36
4,235,214 >>> mbox cmd response data (1848 bytes)
4,235,215 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,265,246 UART: [rt]cmd =0x50435245, len=56
4,268,908 >>> mbox cmd response data (8 bytes)
4,268,909 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,298,378 UART: [rt]cmd =0x50435251, len=36
4,465,809 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,041 ready_for_fw is high
1,363,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,894 >>> mbox cmd response: success
2,924,894 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,985,832 UART:
2,985,848 UART: Running Caliptra FMC ...
2,986,256 UART:
2,986,310 UART: [state] CFI Enabled
2,996,791 UART: [fht] FMC Alias Private Key: 7
3,104,674 UART: [art] Extend RT PCRs Done
3,105,102 UART: [art] Lock RT PCRs Done
3,106,464 UART: [art] Populate DV Done
3,114,773 UART: [fht] FMC Alias Private Key: 7
3,115,803 UART: [art] Derive CDI
3,116,083 UART: [art] Store in in slot 0x4
3,201,242 UART: [art] Derive Key Pair
3,201,602 UART: [art] Store priv key in slot 0x5
3,214,718 UART: [art] Derive Key Pair - Done
3,229,637 UART: [art] Signing Cert with AUTHO
3,230,117 UART: RITY.KEYID = 7
3,245,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,144 UART: [art] PUB.X = DFE0C1D228239EB5D45E3673FCCF9254B083C4A82683CEFDAC728AEE9C32161D16BEB83A1017A1BD572076B30390F05A
3,252,923 UART: [art] PUB.Y = DDC3781DFE044DFFADBC2BB9EBF2B019283CD26FFF26E6C54B76B47C992E37A994AD217FB75C85737DC508F2805921E4
3,259,885 UART: [art] SIG.R = EF5DCC591CDB222D521A77468C6C709DE81EBE41497D71FB73FB1BBA80C697BCEAC924C5BC779E936BF06F025755CF06
3,266,667 UART: [art] SIG.S = D4D91B28322D361B0193B9161735E662BF642813A5C23F8ECCD47796B59AD1BE2923BF7025F4B2C9940C047A82ECF06E
3,290,663 UART: Caliptra RT
3,290,916 UART: [state] CFI Enabled
3,398,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,494 UART: [rt]cmd =0x50435251, len=36
3,596,879 >>> mbox cmd response data (1848 bytes)
3,596,880 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,626,713 UART: [rt]cmd =0x50435245, len=56
3,630,105 >>> mbox cmd response data (8 bytes)
3,630,106 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,659,613 UART: [rt]cmd =0x50435251, len=36
3,827,154 >>> mbox cmd response data (1848 bytes)
3,827,155 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,856,932 UART: [rt]cmd =0x50435245, len=56
3,860,298 >>> mbox cmd response data (8 bytes)
3,860,299 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,698 UART: [rt]cmd =0x50435251, len=36
4,057,237 >>> mbox cmd response data (1848 bytes)
4,057,238 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,086,969 UART: [rt]cmd =0x50435245, len=56
4,090,437 >>> mbox cmd response data (8 bytes)
4,090,438 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,119,847 UART: [rt]cmd =0x50435251, len=36
4,287,532 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,362 UART: [kat] SHA2-256
892,300 UART: [kat] SHA2-384
895,117 UART: [kat] SHA2-512-ACC
897,018 UART: [kat] ECC-384
902,637 UART: [kat] HMAC-384Kdf
907,111 UART: [kat] LMS
1,475,307 UART: [kat] --
1,476,204 UART: [cold-reset] ++
1,476,560 UART: [fht] Storing FHT @ 0x50003400
1,479,417 UART: [idev] ++
1,479,585 UART: [idev] CDI.KEYID = 6
1,479,945 UART: [idev] SUBJECT.KEYID = 7
1,480,369 UART: [idev] UDS.KEYID = 0
1,480,714 ready_for_fw is high
1,480,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,983 UART: [idev] --
1,514,936 UART: [ldev] ++
1,515,104 UART: [ldev] CDI.KEYID = 6
1,515,467 UART: [ldev] SUBJECT.KEYID = 5
1,515,893 UART: [ldev] AUTHORITY.KEYID = 7
1,516,356 UART: [ldev] FE.KEYID = 1
1,521,774 UART: [ldev] Erasing FE.KEYID = 1
1,547,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,261 UART: [ldev] --
1,586,536 UART: [fwproc] Waiting for Commands...
1,587,343 UART: [fwproc] Received command 0x46574c44
1,588,134 UART: [fwproc] Received Image of size 114168 bytes
2,885,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,270 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,622 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,315 >>> mbox cmd response: success
3,077,315 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,078,445 UART: [afmc] ++
3,078,613 UART: [afmc] CDI.KEYID = 6
3,078,975 UART: [afmc] SUBJECT.KEYID = 7
3,079,400 UART: [afmc] AUTHORITY.KEYID = 5
3,115,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,411 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,139 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,024 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,714 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,551 UART: [afmc] --
3,158,503 UART: [cold-reset] --
3,159,353 UART: [state] Locking Datavault
3,160,348 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,952 UART: [state] Locking ICCM
3,161,470 UART: [exit] Launching FMC @ 0x40000130
3,166,799 UART:
3,166,815 UART: Running Caliptra FMC ...
3,167,223 UART:
3,167,366 UART: [state] CFI Enabled
3,178,203 UART: [fht] FMC Alias Private Key: 7
3,286,312 UART: [art] Extend RT PCRs Done
3,286,740 UART: [art] Lock RT PCRs Done
3,288,540 UART: [art] Populate DV Done
3,296,937 UART: [fht] FMC Alias Private Key: 7
3,298,091 UART: [art] Derive CDI
3,298,371 UART: [art] Store in in slot 0x4
3,383,850 UART: [art] Derive Key Pair
3,384,210 UART: [art] Store priv key in slot 0x5
3,397,446 UART: [art] Derive Key Pair - Done
3,412,365 UART: [art] Signing Cert with AUTHO
3,412,845 UART: RITY.KEYID = 7
3,427,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,504 UART: [art] PUB.X = 74909A3425BBB529FFF6810F485CBADEDE593C516F64A6A560A98448E0FE4DDCDB33749C23FACB5D712A280D20F33D46
3,435,282 UART: [art] PUB.Y = 15F932C8795E03942E57E8978C7C1E02409AB1304C5A9DC07CB6B3D16D2B6B73A5EE8F096204FF71F9036DC000F8A8F8
3,442,199 UART: [art] SIG.R = C90E258D9B87DE468DD99CBC03040E41400C7C4885D795D42A15D7A06619DDAB5F22F854D4ABD9375C0A9295D5B6F963
3,448,957 UART: [art] SIG.S = 02713137877EF7DC8AA35BDD94FB3D5AE0339A50688B4948F0585EE57A2A908603D1D36C26D69064A7AF5CA0D289F0E2
3,472,874 UART: Caliptra RT
3,473,219 UART: [state] CFI Enabled
3,581,788 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,272 UART: [rt]cmd =0x50435251, len=36
3,779,829 >>> mbox cmd response data (1848 bytes)
3,779,830 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,491 UART: [rt]cmd =0x50435245, len=56
3,813,245 >>> mbox cmd response data (8 bytes)
3,813,246 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,842,765 UART: [rt]cmd =0x50435251, len=36
4,010,224 >>> mbox cmd response data (1848 bytes)
4,010,225 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,039,912 UART: [rt]cmd =0x50435245, len=56
4,043,820 >>> mbox cmd response data (8 bytes)
4,043,821 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,073,516 UART: [rt]cmd =0x50435251, len=36
4,241,049 >>> mbox cmd response data (1848 bytes)
4,241,050 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,270,851 UART: [rt]cmd =0x50435245, len=56
4,274,387 >>> mbox cmd response data (8 bytes)
4,274,388 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,304,113 UART: [rt]cmd =0x50435251, len=36
4,471,498 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,112 ready_for_fw is high
1,363,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,733 >>> mbox cmd response: success
2,926,733 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,988,389 UART:
2,988,405 UART: Running Caliptra FMC ...
2,988,813 UART:
2,988,956 UART: [state] CFI Enabled
2,999,619 UART: [fht] FMC Alias Private Key: 7
3,106,978 UART: [art] Extend RT PCRs Done
3,107,406 UART: [art] Lock RT PCRs Done
3,108,714 UART: [art] Populate DV Done
3,117,097 UART: [fht] FMC Alias Private Key: 7
3,118,191 UART: [art] Derive CDI
3,118,471 UART: [art] Store in in slot 0x4
3,203,924 UART: [art] Derive Key Pair
3,204,284 UART: [art] Store priv key in slot 0x5
3,218,014 UART: [art] Derive Key Pair - Done
3,232,652 UART: [art] Signing Cert with AUTHO
3,233,132 UART: RITY.KEYID = 7
3,248,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,291 UART: [art] PUB.X = 9A39C4155F13DF5E959EDA23E3542373AD32B3977E0BB9F01F0556724C86EF3428F768D020F883FF23654F9BFE997BA6
3,256,057 UART: [art] PUB.Y = D27BF6107523A7E21511A636AFE954ACDFFF1DCCAF27764A0D4E238CC7AC20F0D50D5002154E4693F8DB50944B9929E7
3,263,008 UART: [art] SIG.R = F78E14AEEC7966C61C4254E774421562746FEBBE85D91EBDDCD4BD8D9756F3EEA9948516B595EA3700B9D5C1D556013B
3,269,763 UART: [art] SIG.S = 729A99BE8DBCDBEC823739B5326DF79D863F656C657133425B5AC8D004D413D45C68D49DCDFFC86CE35D5EED89FB7934
3,293,915 UART: Caliptra RT
3,294,260 UART: [state] CFI Enabled
3,402,623 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,345 UART: [rt]cmd =0x50435251, len=36
3,600,664 >>> mbox cmd response data (1848 bytes)
3,600,665 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,630,160 UART: [rt]cmd =0x50435245, len=56
3,633,718 >>> mbox cmd response data (8 bytes)
3,633,719 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,663,396 UART: [rt]cmd =0x50435251, len=36
3,831,049 >>> mbox cmd response data (1848 bytes)
3,831,050 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,860,931 UART: [rt]cmd =0x50435245, len=56
3,864,501 >>> mbox cmd response data (8 bytes)
3,864,502 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,894,091 UART: [rt]cmd =0x50435251, len=36
4,061,162 >>> mbox cmd response data (1848 bytes)
4,061,163 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,090,804 UART: [rt]cmd =0x50435245, len=56
4,094,638 >>> mbox cmd response data (8 bytes)
4,094,639 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,124,442 UART: [rt]cmd =0x50435251, len=36
4,291,949 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
88,152 UART: [kat] SHA2-256
893,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,927 UART: [kat] ++
898,079 UART: [kat] sha1
902,275 UART: [kat] SHA2-256
904,215 UART: [kat] SHA2-384
906,992 UART: [kat] SHA2-512-ACC
908,893 UART: [kat] ECC-384
918,816 UART: [kat] HMAC-384Kdf
923,402 UART: [kat] LMS
1,171,730 UART: [kat] --
1,172,707 UART: [cold-reset] ++
1,173,057 UART: [fht] FHT @ 0x50003400
1,175,654 UART: [idev] ++
1,175,822 UART: [idev] CDI.KEYID = 6
1,176,182 UART: [idev] SUBJECT.KEYID = 7
1,176,606 UART: [idev] UDS.KEYID = 0
1,176,951 ready_for_fw is high
1,176,951 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,490 UART: [idev] Erasing UDS.KEYID = 0
1,201,717 UART: [idev] Sha1 KeyId Algorithm
1,210,013 UART: [idev] --
1,210,859 UART: [ldev] ++
1,211,027 UART: [ldev] CDI.KEYID = 6
1,211,390 UART: [ldev] SUBJECT.KEYID = 5
1,211,816 UART: [ldev] AUTHORITY.KEYID = 7
1,212,279 UART: [ldev] FE.KEYID = 1
1,217,375 UART: [ldev] Erasing FE.KEYID = 1
1,243,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,759 UART: [ldev] --
1,283,062 UART: [fwproc] Wait for Commands...
1,283,682 UART: [fwproc] Recv command 0x46574c44
1,284,410 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,041 >>> mbox cmd response: success
2,772,041 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,139 UART: [afmc] ++
2,773,307 UART: [afmc] CDI.KEYID = 6
2,773,669 UART: [afmc] SUBJECT.KEYID = 7
2,774,094 UART: [afmc] AUTHORITY.KEYID = 5
2,809,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,114 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,862 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,475 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,078 UART: [afmc] --
2,852,962 UART: [cold-reset] --
2,853,642 UART: [state] Locking Datavault
2,854,819 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,423 UART: [state] Locking ICCM
2,856,039 UART: [exit] Launching FMC @ 0x40000130
2,861,368 UART:
2,861,384 UART: Running Caliptra FMC ...
2,861,792 UART:
2,861,846 UART: [state] CFI Enabled
2,872,193 UART: [fht] FMC Alias Private Key: 7
2,980,220 UART: [art] Extend RT PCRs Done
2,980,648 UART: [art] Lock RT PCRs Done
2,982,226 UART: [art] Populate DV Done
2,990,475 UART: [fht] FMC Alias Private Key: 7
2,991,511 UART: [art] Derive CDI
2,991,791 UART: [art] Store in in slot 0x4
3,077,048 UART: [art] Derive Key Pair
3,077,408 UART: [art] Store priv key in slot 0x5
3,090,826 UART: [art] Derive Key Pair - Done
3,105,386 UART: [art] Signing Cert with AUTHO
3,105,866 UART: RITY.KEYID = 7
3,121,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,769 UART: [art] PUB.X = 5E32F95F783A2DBAFCAFDF39309CDE58FAA7CA7872FDEBAA6B44FF1F2311A6A66D1E65CBA9D4977AFDE5B285961EF399
3,128,569 UART: [art] PUB.Y = 4E3956835DE0E09209B2A7B9DA36CC77CB7FBB80F197B2A4FA8BEAB55C9571EDFD77B7657D475FA826BDE8AD7C94A486
3,135,536 UART: [art] SIG.R = 851EC43400B49989CBF3D584833FD387671DE63219106200518A27DA8FD64B48D0AE4958CECE9352723CC7629EAA8C4B
3,142,262 UART: [art] SIG.S = 4D85967597961CB203C35CBEF581120DF23548AC4BA6771372CB7DD7DF95CCC82D65BFA143530D20592AAA00BDA331C6
3,165,690 UART: Caliptra RT
3,165,943 UART: [state] CFI Enabled
3,273,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,160 UART: [rt]cmd =0x50435251, len=36
3,471,481 >>> mbox cmd response data (1848 bytes)
3,471,482 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,037 UART: [rt]cmd =0x50435245, len=56
3,504,441 >>> mbox cmd response data (8 bytes)
3,504,442 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,533,955 UART: [rt]cmd =0x50435251, len=36
3,701,166 >>> mbox cmd response data (1848 bytes)
3,701,167 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,730,726 UART: [rt]cmd =0x50435245, len=56
3,734,388 >>> mbox cmd response data (8 bytes)
3,734,389 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,884 UART: [rt]cmd =0x50435251, len=36
3,931,115 >>> mbox cmd response data (1848 bytes)
3,931,116 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,960,867 UART: [rt]cmd =0x50435245, len=56
3,964,611 >>> mbox cmd response data (8 bytes)
3,964,612 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,994,219 UART: [rt]cmd =0x50435251, len=36
4,161,706 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,627 ready_for_fw is high
1,059,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,052 >>> mbox cmd response: success
2,622,052 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,684,064 UART:
2,684,080 UART: Running Caliptra FMC ...
2,684,488 UART:
2,684,542 UART: [state] CFI Enabled
2,695,123 UART: [fht] FMC Alias Private Key: 7
2,803,926 UART: [art] Extend RT PCRs Done
2,804,354 UART: [art] Lock RT PCRs Done
2,805,850 UART: [art] Populate DV Done
2,813,773 UART: [fht] FMC Alias Private Key: 7
2,814,769 UART: [art] Derive CDI
2,815,049 UART: [art] Store in in slot 0x4
2,900,646 UART: [art] Derive Key Pair
2,901,006 UART: [art] Store priv key in slot 0x5
2,913,718 UART: [art] Derive Key Pair - Done
2,928,397 UART: [art] Signing Cert with AUTHO
2,928,877 UART: RITY.KEYID = 7
2,944,119 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,884 UART: [art] PUB.X = 669C0481DAB3D6C9BA96FED9BAD7F32A028BC31431783A845C29E3283F6B0D08198C625C531076118E797E5586C95B59
2,951,640 UART: [art] PUB.Y = C56E24B0E989142F83D89B766A8F1BA0302C4289F1DC221403EB5D8A3DAB67B52871E5DEB1C528A2B5A28D070171AE77
2,958,587 UART: [art] SIG.R = 4B8218127AFF4988AE318B494AB7B8379AF8FF1626D003640A7E5E8A403396A7973BDCB28E11E359224FD49F91EAB96D
2,965,355 UART: [art] SIG.S = 21FEDA947CB7BE83A5E48F48692FD40FA7F15011B33FF2393D9D8C9C92BF06D2A85DE97A56E642DD495F514022110B57
2,989,293 UART: Caliptra RT
2,989,546 UART: [state] CFI Enabled
3,096,531 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,329 UART: [rt]cmd =0x50435251, len=36
3,294,780 >>> mbox cmd response data (1848 bytes)
3,294,781 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,486 UART: [rt]cmd =0x50435245, len=56
3,328,306 >>> mbox cmd response data (8 bytes)
3,328,307 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,842 UART: [rt]cmd =0x50435251, len=36
3,525,305 >>> mbox cmd response data (1848 bytes)
3,525,306 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,061 UART: [rt]cmd =0x50435245, len=56
3,558,643 >>> mbox cmd response data (8 bytes)
3,558,644 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,241 UART: [rt]cmd =0x50435251, len=36
3,755,538 >>> mbox cmd response data (1848 bytes)
3,755,539 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,386 UART: [rt]cmd =0x50435245, len=56
3,789,066 >>> mbox cmd response data (8 bytes)
3,789,067 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,580 UART: [rt]cmd =0x50435251, len=36
3,985,839 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,751 UART: [state] LifecycleState = Unprovisioned
85,406 UART: [state] DebugLocked = No
86,118 UART: [state] WD Timer not started. Device not locked for debugging
87,231 UART: [kat] SHA2-256
892,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,006 UART: [kat] ++
897,158 UART: [kat] sha1
901,454 UART: [kat] SHA2-256
903,394 UART: [kat] SHA2-384
906,097 UART: [kat] SHA2-512-ACC
907,998 UART: [kat] ECC-384
917,793 UART: [kat] HMAC-384Kdf
922,275 UART: [kat] LMS
1,170,603 UART: [kat] --
1,171,544 UART: [cold-reset] ++
1,171,956 UART: [fht] FHT @ 0x50003400
1,174,719 UART: [idev] ++
1,174,887 UART: [idev] CDI.KEYID = 6
1,175,247 UART: [idev] SUBJECT.KEYID = 7
1,175,671 UART: [idev] UDS.KEYID = 0
1,176,016 ready_for_fw is high
1,176,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,795 UART: [idev] Erasing UDS.KEYID = 0
1,200,888 UART: [idev] Sha1 KeyId Algorithm
1,209,398 UART: [idev] --
1,210,508 UART: [ldev] ++
1,210,676 UART: [ldev] CDI.KEYID = 6
1,211,039 UART: [ldev] SUBJECT.KEYID = 5
1,211,465 UART: [ldev] AUTHORITY.KEYID = 7
1,211,928 UART: [ldev] FE.KEYID = 1
1,217,066 UART: [ldev] Erasing FE.KEYID = 1
1,243,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,468 UART: [ldev] --
1,282,927 UART: [fwproc] Wait for Commands...
1,283,685 UART: [fwproc] Recv command 0x46574c44
1,284,413 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,925 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,544 >>> mbox cmd response: success
2,773,544 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,774,726 UART: [afmc] ++
2,774,894 UART: [afmc] CDI.KEYID = 6
2,775,256 UART: [afmc] SUBJECT.KEYID = 7
2,775,681 UART: [afmc] AUTHORITY.KEYID = 5
2,811,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,621 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,369 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,097 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,982 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,701 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,667 UART: [afmc] --
2,854,771 UART: [cold-reset] --
2,855,339 UART: [state] Locking Datavault
2,856,272 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,876 UART: [state] Locking ICCM
2,857,398 UART: [exit] Launching FMC @ 0x40000130
2,862,727 UART:
2,862,743 UART: Running Caliptra FMC ...
2,863,151 UART:
2,863,294 UART: [state] CFI Enabled
2,874,071 UART: [fht] FMC Alias Private Key: 7
2,981,954 UART: [art] Extend RT PCRs Done
2,982,382 UART: [art] Lock RT PCRs Done
2,984,270 UART: [art] Populate DV Done
2,992,399 UART: [fht] FMC Alias Private Key: 7
2,993,413 UART: [art] Derive CDI
2,993,693 UART: [art] Store in in slot 0x4
3,079,128 UART: [art] Derive Key Pair
3,079,488 UART: [art] Store priv key in slot 0x5
3,092,538 UART: [art] Derive Key Pair - Done
3,107,218 UART: [art] Signing Cert with AUTHO
3,107,698 UART: RITY.KEYID = 7
3,122,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,701 UART: [art] PUB.X = B2FA2C355C8D623C11A5977B05D1D1805BC8D84CC0DE5C775C345E934DD91199F8CE496FBE9F1DF8F0E776643ECE68EB
3,130,484 UART: [art] PUB.Y = 02EC6C74FAD6694788B95319A57A93E960D9B4F0B7F5159FAB962BF399A333D53D5952488B0333ACB42ABD7D69C9962F
3,137,432 UART: [art] SIG.R = 12B523C2FC08E9C32557A6F4EC14A3BDBDDCA8D83B0B4E7EE14CFCAD853E684C4EBBEA059DB2DACACFE2D55FEEB371A0
3,144,233 UART: [art] SIG.S = 77028471317FD3F46DB25C0C3344ECF44ECED31776A459D6B4A8CD6371322AF240A38AE8EB636B7CC2700F121B1B13BC
3,168,141 UART: Caliptra RT
3,168,486 UART: [state] CFI Enabled
3,276,073 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,911 UART: [rt]cmd =0x50435251, len=36
3,474,402 >>> mbox cmd response data (1848 bytes)
3,474,403 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,504,156 UART: [rt]cmd =0x50435245, len=56
3,507,662 >>> mbox cmd response data (8 bytes)
3,507,663 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,374 UART: [rt]cmd =0x50435251, len=36
3,704,455 >>> mbox cmd response data (1848 bytes)
3,704,456 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,734,101 UART: [rt]cmd =0x50435245, len=56
3,737,695 >>> mbox cmd response data (8 bytes)
3,737,696 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,345 UART: [rt]cmd =0x50435251, len=36
3,934,592 >>> mbox cmd response data (1848 bytes)
3,934,593 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,964,132 UART: [rt]cmd =0x50435245, len=56
3,967,338 >>> mbox cmd response data (8 bytes)
3,967,339 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,997,182 UART: [rt]cmd =0x50435251, len=36
4,164,759 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,078 ready_for_fw is high
1,060,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,583 >>> mbox cmd response: success
2,623,583 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,685,923 UART:
2,685,939 UART: Running Caliptra FMC ...
2,686,347 UART:
2,686,490 UART: [state] CFI Enabled
2,697,125 UART: [fht] FMC Alias Private Key: 7
2,804,782 UART: [art] Extend RT PCRs Done
2,805,210 UART: [art] Lock RT PCRs Done
2,806,560 UART: [art] Populate DV Done
2,814,895 UART: [fht] FMC Alias Private Key: 7
2,815,899 UART: [art] Derive CDI
2,816,179 UART: [art] Store in in slot 0x4
2,901,920 UART: [art] Derive Key Pair
2,902,280 UART: [art] Store priv key in slot 0x5
2,915,536 UART: [art] Derive Key Pair - Done
2,930,141 UART: [art] Signing Cert with AUTHO
2,930,621 UART: RITY.KEYID = 7
2,946,339 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,104 UART: [art] PUB.X = 8F8331BAE01DE362D6E743345EE8E5D2248297411D2935B74C62ADAD32C0024D204D612028E54D7E69FBC0792AB859C0
2,953,871 UART: [art] PUB.Y = 00FBA0D7DC3930718AA84A4C41794FEBEB8B74245F4F7841515F025B41CE752830EAF41D756C7A69A83351E7791E2EE2
2,960,800 UART: [art] SIG.R = 0B7F06132813582A3533549A93E170F340ADACD06BFE206C3396F661678BA9C7DC2EB7D3BE4502D1FD493888A458D3E0
2,967,563 UART: [art] SIG.S = 2FFD7380FF100FC9E77919920EF0EBC51B05370185966E2340D1D75A74C2E3E70F55B60110E9630C73E0385147BB4A11
2,991,041 UART: Caliptra RT
2,991,386 UART: [state] CFI Enabled
3,099,767 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,745 UART: [rt]cmd =0x50435251, len=36
3,298,418 >>> mbox cmd response data (1848 bytes)
3,298,419 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,104 UART: [rt]cmd =0x50435245, len=56
3,331,712 >>> mbox cmd response data (8 bytes)
3,331,713 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,361,536 UART: [rt]cmd =0x50435251, len=36
3,528,931 >>> mbox cmd response data (1848 bytes)
3,528,932 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,555 UART: [rt]cmd =0x50435245, len=56
3,562,215 >>> mbox cmd response data (8 bytes)
3,562,216 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,591,877 UART: [rt]cmd =0x50435251, len=36
3,759,654 >>> mbox cmd response data (1848 bytes)
3,759,655 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,789,432 UART: [rt]cmd =0x50435245, len=56
3,792,850 >>> mbox cmd response data (8 bytes)
3,792,851 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,598 UART: [rt]cmd =0x50435251, len=36
3,989,805 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,948 UART: [state] LifecycleState = Unprovisioned
86,603 UART: [state] DebugLocked = No
87,223 UART: [state] WD Timer not started. Device not locked for debugging
88,372 UART: [kat] SHA2-256
891,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,051 UART: [kat] ++
896,203 UART: [kat] sha1
900,477 UART: [kat] SHA2-256
902,417 UART: [kat] SHA2-384
905,320 UART: [kat] SHA2-512-ACC
907,221 UART: [kat] ECC-384
916,728 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
1,169,588 UART: [kat] --
1,170,529 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,174,927 ready_for_fw is high
1,174,927 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,743 UART: [idev] Erasing UDS.KEYID = 0
1,199,939 UART: [idev] Sha1 KeyId Algorithm
1,208,919 UART: [idev] --
1,209,916 UART: [ldev] ++
1,210,084 UART: [ldev] CDI.KEYID = 6
1,210,448 UART: [ldev] SUBJECT.KEYID = 5
1,210,875 UART: [ldev] AUTHORITY.KEYID = 7
1,211,338 UART: [ldev] FE.KEYID = 1
1,216,482 UART: [ldev] Erasing FE.KEYID = 1
1,242,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,304 UART: [ldev] --
1,281,604 UART: [fwproc] Wait for Commands...
1,282,409 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,222 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,117 >>> mbox cmd response: success
2,772,117 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,773,320 UART: [afmc] ++
2,773,488 UART: [afmc] CDI.KEYID = 6
2,773,851 UART: [afmc] SUBJECT.KEYID = 7
2,774,277 UART: [afmc] AUTHORITY.KEYID = 5
2,810,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,959 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,678 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,543 UART: [afmc] --
2,853,553 UART: [cold-reset] --
2,854,475 UART: [state] Locking Datavault
2,855,572 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,176 UART: [state] Locking ICCM
2,856,626 UART: [exit] Launching FMC @ 0x40000130
2,861,955 UART:
2,861,971 UART: Running Caliptra FMC ...
2,862,379 UART:
2,862,433 UART: [state] CFI Enabled
2,873,014 UART: [fht] FMC Alias Private Key: 7
2,980,479 UART: [art] Extend RT PCRs Done
2,980,907 UART: [art] Lock RT PCRs Done
2,982,567 UART: [art] Populate DV Done
2,990,794 UART: [fht] FMC Alias Private Key: 7
2,991,852 UART: [art] Derive CDI
2,992,132 UART: [art] Store in in slot 0x4
3,078,023 UART: [art] Derive Key Pair
3,078,383 UART: [art] Store priv key in slot 0x5
3,091,759 UART: [art] Derive Key Pair - Done
3,106,868 UART: [art] Signing Cert with AUTHO
3,107,348 UART: RITY.KEYID = 7
3,122,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,883 UART: [art] PUB.X = 3287DD1CC41EF062BE93B3ABF852D71CA20FE8086690EF6AE3D66281945CF2E4B421E211AA844EF060971966F21A2831
3,129,651 UART: [art] PUB.Y = 4F8F22EFD1DD72FD8A657EDE4E4EC7715E67325BBC1D954B8D4C72EC4009948EA4ADDDD7B1361D667C13E9D60C0B5723
3,136,610 UART: [art] SIG.R = 6AABD794E0E0AF43CE5F3C36D8DA6F7182AFB7BABEA3A2B4D9ADF8589A9299702AE34701A0E1369BF0B203CBC961F274
3,143,396 UART: [art] SIG.S = E18AF943EC504C2F01AF6CAC2BA768534A7C5BCBCB6394FF5AF36D7DD902D434C305F000BBA2EDE7851177513DE0B8F8
3,166,816 UART: Caliptra RT
3,167,069 UART: [state] CFI Enabled
3,275,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,914 UART: [rt]cmd =0x50435251, len=36
3,473,175 >>> mbox cmd response data (1848 bytes)
3,473,176 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,117 UART: [rt]cmd =0x50435245, len=56
3,506,581 >>> mbox cmd response data (8 bytes)
3,506,582 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,536,019 UART: [rt]cmd =0x50435251, len=36
3,703,114 >>> mbox cmd response data (1848 bytes)
3,703,115 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,732,848 UART: [rt]cmd =0x50435245, len=56
3,736,690 >>> mbox cmd response data (8 bytes)
3,736,691 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,244 UART: [rt]cmd =0x50435251, len=36
3,933,705 >>> mbox cmd response data (1848 bytes)
3,933,706 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,471 UART: [rt]cmd =0x50435245, len=56
3,967,161 >>> mbox cmd response data (8 bytes)
3,967,162 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,996,733 UART: [rt]cmd =0x50435251, len=36
4,163,996 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,438 ready_for_fw is high
1,056,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,433 >>> mbox cmd response: success
2,621,433 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,683,345 UART:
2,683,361 UART: Running Caliptra FMC ...
2,683,769 UART:
2,683,823 UART: [state] CFI Enabled
2,694,490 UART: [fht] FMC Alias Private Key: 7
2,802,187 UART: [art] Extend RT PCRs Done
2,802,615 UART: [art] Lock RT PCRs Done
2,804,417 UART: [art] Populate DV Done
2,812,544 UART: [fht] FMC Alias Private Key: 7
2,813,704 UART: [art] Derive CDI
2,813,984 UART: [art] Store in in slot 0x4
2,899,413 UART: [art] Derive Key Pair
2,899,773 UART: [art] Store priv key in slot 0x5
2,913,091 UART: [art] Derive Key Pair - Done
2,927,914 UART: [art] Signing Cert with AUTHO
2,928,394 UART: RITY.KEYID = 7
2,943,884 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,649 UART: [art] PUB.X = AE5226990D7FAB1AE58A906D7525CDE3BF83383C75AC24A4813566A075563C998195E0E2459A87227C30EC6556716655
2,951,408 UART: [art] PUB.Y = CD584417D4E5BF1E2E7BAC3881312D8E7BEF2EA0B7C755F5D1AB8042427BEE13619EBCBFF95B269CACCAF5A6DED86923
2,958,384 UART: [art] SIG.R = 912DF62C08011C872A752560471CDD6433727ED763F72C5CCBFC29AA909248E91CF33100571D782D10802EF84889F019
2,965,118 UART: [art] SIG.S = B0297D1CF29CE40F5357B3D7B24E2040AE0EACD1A8B92336C240529173A6D9115461CBEF78C2EC6700643E00DB55CF3F
2,989,259 UART: Caliptra RT
2,989,512 UART: [state] CFI Enabled
3,096,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,542 UART: [rt]cmd =0x50435251, len=36
3,295,135 >>> mbox cmd response data (1848 bytes)
3,295,136 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,821 UART: [rt]cmd =0x50435245, len=56
3,328,217 >>> mbox cmd response data (8 bytes)
3,328,218 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,357,993 UART: [rt]cmd =0x50435251, len=36
3,525,464 >>> mbox cmd response data (1848 bytes)
3,525,465 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,164 UART: [rt]cmd =0x50435245, len=56
3,558,756 >>> mbox cmd response data (8 bytes)
3,558,757 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,588,454 UART: [rt]cmd =0x50435251, len=36
3,755,569 >>> mbox cmd response data (1848 bytes)
3,755,570 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,403 UART: [rt]cmd =0x50435245, len=56
3,789,037 >>> mbox cmd response data (8 bytes)
3,789,038 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,739 UART: [rt]cmd =0x50435251, len=36
3,986,044 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,137 UART: [state] LifecycleState = Unprovisioned
85,792 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
915,879 UART: [kat] HMAC-384Kdf
920,387 UART: [kat] LMS
1,168,699 UART: [kat] --
1,169,888 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,172,954 UART: [idev] ++
1,173,122 UART: [idev] CDI.KEYID = 6
1,173,483 UART: [idev] SUBJECT.KEYID = 7
1,173,908 UART: [idev] UDS.KEYID = 0
1,174,254 ready_for_fw is high
1,174,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,116 UART: [idev] Sha1 KeyId Algorithm
1,208,062 UART: [idev] --
1,209,051 UART: [ldev] ++
1,209,219 UART: [ldev] CDI.KEYID = 6
1,209,583 UART: [ldev] SUBJECT.KEYID = 5
1,210,010 UART: [ldev] AUTHORITY.KEYID = 7
1,210,473 UART: [ldev] FE.KEYID = 1
1,215,649 UART: [ldev] Erasing FE.KEYID = 1
1,241,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,533 UART: [fwproc] Wait for Commands...
1,282,304 UART: [fwproc] Recv command 0x46574c44
1,283,037 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,678 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,228 >>> mbox cmd response: success
2,771,228 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,772,415 UART: [afmc] ++
2,772,583 UART: [afmc] CDI.KEYID = 6
2,772,946 UART: [afmc] SUBJECT.KEYID = 7
2,773,372 UART: [afmc] AUTHORITY.KEYID = 5
2,809,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,426 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,038 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,652 UART: [afmc] --
2,852,576 UART: [cold-reset] --
2,853,530 UART: [state] Locking Datavault
2,854,607 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,211 UART: [state] Locking ICCM
2,855,677 UART: [exit] Launching FMC @ 0x40000130
2,861,006 UART:
2,861,022 UART: Running Caliptra FMC ...
2,861,430 UART:
2,861,573 UART: [state] CFI Enabled
2,872,426 UART: [fht] FMC Alias Private Key: 7
2,980,455 UART: [art] Extend RT PCRs Done
2,980,883 UART: [art] Lock RT PCRs Done
2,982,511 UART: [art] Populate DV Done
2,990,870 UART: [fht] FMC Alias Private Key: 7
2,992,030 UART: [art] Derive CDI
2,992,310 UART: [art] Store in in slot 0x4
3,077,891 UART: [art] Derive Key Pair
3,078,251 UART: [art] Store priv key in slot 0x5
3,091,509 UART: [art] Derive Key Pair - Done
3,106,523 UART: [art] Signing Cert with AUTHO
3,107,003 UART: RITY.KEYID = 7
3,122,259 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,024 UART: [art] PUB.X = B30C474923C3B46DF7EA19E5A034023DC66E529EBA472539F0723647A4C4211F7D183FA69CD89D8881E210251EDC6EF1
3,129,790 UART: [art] PUB.Y = CF5ACF03F1F6A0E868F4F8D6CAC021A7EDDE19B19757BDE6BFFD97016AD6A6803E9033865CC434F2DFEE265D1C24C0D8
3,136,758 UART: [art] SIG.R = 47B43BB9B9C4151A0F194E9D04A1364451B39DE3DD31BE5D9169286E0CCB3BA208BAAC4A73AB54540268AC169014A36E
3,143,521 UART: [art] SIG.S = 51FC781C36158E32AD9E63004864EBBEDCFE2F48192A07DFD0CE86976C7E5C5FC151D0531FC740B6D5853D5627DE3AFA
3,167,557 UART: Caliptra RT
3,167,902 UART: [state] CFI Enabled
3,274,399 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,305 UART: [rt]cmd =0x50435251, len=36
3,472,994 >>> mbox cmd response data (1848 bytes)
3,472,995 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,502,624 UART: [rt]cmd =0x50435245, len=56
3,506,328 >>> mbox cmd response data (8 bytes)
3,506,329 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,726 UART: [rt]cmd =0x50435251, len=36
3,703,257 >>> mbox cmd response data (1848 bytes)
3,703,258 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,045 UART: [rt]cmd =0x50435245, len=56
3,736,453 >>> mbox cmd response data (8 bytes)
3,736,454 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,766,205 UART: [rt]cmd =0x50435251, len=36
3,933,360 >>> mbox cmd response data (1848 bytes)
3,933,361 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,080 UART: [rt]cmd =0x50435245, len=56
3,966,778 >>> mbox cmd response data (8 bytes)
3,966,779 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,996,470 UART: [rt]cmd =0x50435251, len=36
4,164,465 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,451 ready_for_fw is high
1,056,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,332 >>> mbox cmd response: success
2,622,332 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,684,306 UART:
2,684,322 UART: Running Caliptra FMC ...
2,684,730 UART:
2,684,873 UART: [state] CFI Enabled
2,695,570 UART: [fht] FMC Alias Private Key: 7
2,803,477 UART: [art] Extend RT PCRs Done
2,803,905 UART: [art] Lock RT PCRs Done
2,805,555 UART: [art] Populate DV Done
2,813,834 UART: [fht] FMC Alias Private Key: 7
2,814,762 UART: [art] Derive CDI
2,815,042 UART: [art] Store in in slot 0x4
2,900,453 UART: [art] Derive Key Pair
2,900,813 UART: [art] Store priv key in slot 0x5
2,914,517 UART: [art] Derive Key Pair - Done
2,929,470 UART: [art] Signing Cert with AUTHO
2,929,950 UART: RITY.KEYID = 7
2,944,782 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,547 UART: [art] PUB.X = C537C29936F2244155C36541FAB149C1B25744FC6E25A0926CA03FB9BB1D9B1EBA64D71FFBB20F30BA3F5C7547B38665
2,952,322 UART: [art] PUB.Y = BAC8E78812A4628EE12384E8EE90035137B8114669750A4CD2E37249C037309476C968CE96EBC644C78E9798B493A8FA
2,959,260 UART: [art] SIG.R = B1A71C3628A29BA0EF065EB9B9A511AA0C1F7DD0734B64FBF9D88CF03D5A0738DB17B77D15383A88E81BE0C446B2EAFB
2,966,041 UART: [art] SIG.S = 14F1999CC9F1AB76F0D6645DB15A9C49B5D709153DF546D6943E72B288FF62A93C808E7002BEB5ED1347CDB95C296C47
2,990,104 UART: Caliptra RT
2,990,449 UART: [state] CFI Enabled
3,098,048 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,672 UART: [rt]cmd =0x50435251, len=36
3,295,941 >>> mbox cmd response data (1848 bytes)
3,295,942 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,739 UART: [rt]cmd =0x50435245, len=56
3,329,413 >>> mbox cmd response data (8 bytes)
3,329,414 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,019 UART: [rt]cmd =0x50435251, len=36
3,526,302 >>> mbox cmd response data (1848 bytes)
3,526,303 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,555,912 UART: [rt]cmd =0x50435245, len=56
3,559,468 >>> mbox cmd response data (8 bytes)
3,559,469 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,589,120 UART: [rt]cmd =0x50435251, len=36
3,756,839 >>> mbox cmd response data (1848 bytes)
3,756,840 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,786,563 UART: [rt]cmd =0x50435245, len=56
3,789,991 >>> mbox cmd response data (8 bytes)
3,789,992 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,635 UART: [rt]cmd =0x50435251, len=36
3,986,986 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,175 UART:
192,533 UART: Running Caliptra ROM ...
193,717 UART:
193,867 UART: [state] CFI Enabled
264,471 UART: [state] LifecycleState = Unprovisioned
266,373 UART: [state] DebugLocked = No
267,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,836 UART: [kat] SHA2-256
441,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,007 UART: [kat] ++
452,484 UART: [kat] sha1
463,848 UART: [kat] SHA2-256
466,563 UART: [kat] SHA2-384
473,271 UART: [kat] SHA2-512-ACC
475,635 UART: [kat] ECC-384
2,765,885 UART: [kat] HMAC-384Kdf
2,778,411 UART: [kat] LMS
3,968,715 UART: [kat] --
3,974,437 UART: [cold-reset] ++
3,975,441 UART: [fht] Storing FHT @ 0x50003400
3,988,490 UART: [idev] ++
3,989,112 UART: [idev] CDI.KEYID = 6
3,989,991 UART: [idev] SUBJECT.KEYID = 7
3,991,297 UART: [idev] UDS.KEYID = 0
3,992,251 ready_for_fw is high
3,992,436 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,614 UART: [idev] Erasing UDS.KEYID = 0
7,327,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,142 UART: [idev] --
7,354,662 UART: [ldev] ++
7,355,337 UART: [ldev] CDI.KEYID = 6
7,356,224 UART: [ldev] SUBJECT.KEYID = 5
7,357,606 UART: [ldev] AUTHORITY.KEYID = 7
7,358,805 UART: [ldev] FE.KEYID = 1
7,400,644 UART: [ldev] Erasing FE.KEYID = 1
10,730,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,423 UART: [ldev] --
13,092,705 UART: [fwproc] Waiting for Commands...
13,094,732 UART: [fwproc] Received command 0x46574c44
13,096,904 UART: [fwproc] Received Image of size 113844 bytes
17,142,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,212,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,281,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,598,468 >>> mbox cmd response: success
17,599,053 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,603,130 UART: [afmc] ++
17,603,726 UART: [afmc] CDI.KEYID = 6
17,604,640 UART: [afmc] SUBJECT.KEYID = 7
17,605,872 UART: [afmc] AUTHORITY.KEYID = 5
20,963,450 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,264,061 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,266,315 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,280,736 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,295,567 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,309,982 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,331,315 UART: [afmc] --
23,335,870 UART: [cold-reset] --
23,340,600 UART: [state] Locking Datavault
23,345,191 UART: [state] Locking PCR0, PCR1 and PCR31
23,346,933 UART: [state] Locking ICCM
23,348,914 UART: [exit] Launching FMC @ 0x40000130
23,357,301 UART:
23,357,719 UART: Running Caliptra FMC ...
23,358,847 UART:
23,359,002 UART: [state] CFI Enabled
23,422,999 UART: [fht] FMC Alias Private Key: 7
25,761,528 UART: [art] Extend RT PCRs Done
25,762,758 UART: [art] Lock RT PCRs Done
25,764,463 UART: [art] Populate DV Done
25,769,922 UART: [fht] FMC Alias Private Key: 7
25,771,617 UART: [art] Derive CDI
25,772,421 UART: [art] Store in in slot 0x4
25,832,882 UART: [art] Derive Key Pair
25,833,896 UART: [art] Store priv key in slot 0x5
29,126,800 UART: [art] Derive Key Pair - Done
29,139,630 UART: [art] Signing Cert with AUTHO
29,140,925 UART: RITY.KEYID = 7
31,428,294 UART: [art] Erasing AUTHORITY.KEYID = 7
31,429,793 UART: [art] PUB.X = 0FFB4D918E04B4278DEC2C8480FEBFD83AAE323CC3CC00690D88ACDD04882B16B4506285EF6CE1D45B2D8D5176348B0A
31,437,033 UART: [art] PUB.Y = BCF1EB512CD85D596E0056AF3EBD51652190331A3A65CF7BDB21DBA410D05EC41023E35BED7DBAE42890C8E895C54748
31,444,327 UART: [art] SIG.R = 080A117F6C188A2059EA71D71BDF9CFF325DA99679B43F1110A20FF8C3884D6719F35B057DA49A8885F1A4F54B8FE7CD
31,451,700 UART: [art] SIG.S = 912F8555C15D96F72836C5505BC8DD5DE961AC5D94D9F8DC56F39022A6DC425C426B0738D33C28E4633428109E2253B9
32,757,363 UART: Caliptra RT
32,758,079 UART: [state] CFI Enabled
32,916,906 UART: [rt] RT listening for mailbox commands...
32,948,642 UART: [rt]cmd =0x50435245, len=56
32,950,280 >>> mbox cmd response: failed
32,950,572 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
32,980,670 UART: [rt]cmd =0x50435245, len=56
32,982,693 >>> mbox cmd response: failed
32,982,955 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,013,308 UART: [rt]cmd =0x50435245, len=56
33,015,160 >>> mbox cmd response: failed
33,015,418 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,045,446 UART: [rt]cmd =0x50435245, len=56
33,047,123 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,805,956 ready_for_fw is high
3,806,838 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,882,665 >>> mbox cmd response: success
17,883,348 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,589,315 UART:
23,589,696 UART: Running Caliptra FMC ...
23,591,001 UART:
23,591,170 UART: [state] CFI Enabled
23,654,576 UART: [fht] FMC Alias Private Key: 7
25,991,854 UART: [art] Extend RT PCRs Done
25,993,077 UART: [art] Lock RT PCRs Done
25,994,887 UART: [art] Populate DV Done
26,000,512 UART: [fht] FMC Alias Private Key: 7
26,002,056 UART: [art] Derive CDI
26,002,875 UART: [art] Store in in slot 0x4
26,062,430 UART: [art] Derive Key Pair
26,063,469 UART: [art] Store priv key in slot 0x5
29,356,445 UART: [art] Derive Key Pair - Done
29,369,612 UART: [art] Signing Cert with AUTHO
29,370,949 UART: RITY.KEYID = 7
31,657,028 UART: [art] Erasing AUTHORITY.KEYID = 7
31,658,554 UART: [art] PUB.X = EF7EDC4A9F00F6F613CD4A2151208384A7665D5470EF9B68ECB5410713E3B08D70C77E31C94A2C6CD5828DFE3220A3FF
31,665,748 UART: [art] PUB.Y = E71A15DA11A3F492495156916DF0794633BC3D6D3989DAF600052A90B49207A6611179F74DD89578A52213063D21D626
31,672,973 UART: [art] SIG.R = 149053A7F1680AE71AE64549CC3A220652432E2C6B24F1DBD7E5B94E6FE8E0AA746B217949E89764780F0CC46F15CB01
31,680,356 UART: [art] SIG.S = 9D862C912B298748698F4F62C2B7F1051F6CAA8EFA2F3F839DA4B7A5A64289D367572549AF15E222F855939512B21281
32,985,223 UART: Caliptra RT
32,985,931 UART: [state] CFI Enabled
33,146,717 UART: [rt] RT listening for mailbox commands...
33,178,773 UART: [rt]cmd =0x50435245, len=56
33,180,574 >>> mbox cmd response: failed
33,180,860 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,211,000 UART: [rt]cmd =0x50435245, len=56
33,212,630 >>> mbox cmd response: failed
33,212,893 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,243,080 UART: [rt]cmd =0x50435245, len=56
33,244,668 >>> mbox cmd response: failed
33,244,980 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,275,166 UART: [rt]cmd =0x50435245, len=56
33,276,857 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,626 UART:
193,017 UART: Running Caliptra ROM ...
194,204 UART:
603,776 UART: [state] CFI Enabled
618,435 UART: [state] LifecycleState = Unprovisioned
620,302 UART: [state] DebugLocked = No
623,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,476 UART: [kat] SHA2-256
798,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,804 UART: [kat] ++
809,250 UART: [kat] sha1
820,641 UART: [kat] SHA2-256
823,291 UART: [kat] SHA2-384
829,138 UART: [kat] SHA2-512-ACC
831,509 UART: [kat] ECC-384
3,116,501 UART: [kat] HMAC-384Kdf
3,128,525 UART: [kat] LMS
4,318,698 UART: [kat] --
4,322,768 UART: [cold-reset] ++
4,323,987 UART: [fht] Storing FHT @ 0x50003400
4,336,179 UART: [idev] ++
4,336,754 UART: [idev] CDI.KEYID = 6
4,337,705 UART: [idev] SUBJECT.KEYID = 7
4,338,947 UART: [idev] UDS.KEYID = 0
4,339,941 ready_for_fw is high
4,340,139 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,118 UART: [idev] Erasing UDS.KEYID = 0
7,626,016 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,529 UART: [idev] --
7,649,111 UART: [ldev] ++
7,649,680 UART: [ldev] CDI.KEYID = 6
7,650,618 UART: [ldev] SUBJECT.KEYID = 5
7,651,746 UART: [ldev] AUTHORITY.KEYID = 7
7,653,104 UART: [ldev] FE.KEYID = 1
7,665,038 UART: [ldev] Erasing FE.KEYID = 1
10,955,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,846 UART: [ldev] --
13,312,305 UART: [fwproc] Waiting for Commands...
13,314,454 UART: [fwproc] Received command 0x46574c44
13,316,636 UART: [fwproc] Received Image of size 113844 bytes
17,368,149 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,391 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,247 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,832,005 >>> mbox cmd response: success
17,832,552 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,837,087 UART: [afmc] ++
17,837,685 UART: [afmc] CDI.KEYID = 6
17,838,598 UART: [afmc] SUBJECT.KEYID = 7
17,839,820 UART: [afmc] AUTHORITY.KEYID = 5
21,150,809 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,326 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,706 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,553 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,972 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,282 UART: [afmc] --
23,516,591 UART: [cold-reset] --
23,519,326 UART: [state] Locking Datavault
23,524,194 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,943 UART: [state] Locking ICCM
23,527,717 UART: [exit] Launching FMC @ 0x40000130
23,536,075 UART:
23,536,314 UART: Running Caliptra FMC ...
23,537,415 UART:
23,537,581 UART: [state] CFI Enabled
23,545,573 UART: [fht] FMC Alias Private Key: 7
25,876,197 UART: [art] Extend RT PCRs Done
25,877,416 UART: [art] Lock RT PCRs Done
25,879,038 UART: [art] Populate DV Done
25,884,178 UART: [fht] FMC Alias Private Key: 7
25,885,823 UART: [art] Derive CDI
25,886,638 UART: [art] Store in in slot 0x4
25,929,132 UART: [art] Derive Key Pair
25,930,173 UART: [art] Store priv key in slot 0x5
29,172,023 UART: [art] Derive Key Pair - Done
29,185,236 UART: [art] Signing Cert with AUTHO
29,186,543 UART: RITY.KEYID = 7
31,466,064 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,570 UART: [art] PUB.X = B4ABE36A7E12A352DD5FC18CD885179248ECC9D5388C4A7094ADB0A8090D72A636C249A94DB71DCB4CEB2FA948C42D00
31,474,777 UART: [art] PUB.Y = 645630AE9A8A7EB8C64B5745994495189C80B0DB56A1512776AAF3060A8EA2CE8ED0B52B38601B26DBC8467EE0E2C8E0
31,482,072 UART: [art] SIG.R = 1CAD5D023FEC6EF02A7078091C8E72FC100337E58B84C3FCC2D2B29294C0FD2F1EA79AF8E6FF4579D04A05DE846FA1EA
31,489,508 UART: [art] SIG.S = 7B9D2D32958EF8306AE02051A042A281B37FFD754428EB5E6A5EB25D230DECF7E86A5B7B514BBBE7D64E203C9C0D97AB
32,794,868 UART: Caliptra RT
32,795,582 UART: [state] CFI Enabled
32,911,939 UART: [rt] RT listening for mailbox commands...
32,943,405 UART: [rt]cmd =0x50435245, len=56
32,945,050 >>> mbox cmd response: failed
32,945,714 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
32,975,839 UART: [rt]cmd =0x50435245, len=56
32,977,473 >>> mbox cmd response: failed
32,977,733 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,007,866 UART: [rt]cmd =0x50435245, len=56
33,009,728 >>> mbox cmd response: failed
33,010,006 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,040,207 UART: [rt]cmd =0x50435245, len=56
33,041,884 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,130,032 ready_for_fw is high
4,130,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,765 >>> mbox cmd response: success
18,067,430 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,708,116 UART:
23,708,507 UART: Running Caliptra FMC ...
23,709,654 UART:
23,709,843 UART: [state] CFI Enabled
23,718,289 UART: [fht] FMC Alias Private Key: 7
26,048,966 UART: [art] Extend RT PCRs Done
26,050,195 UART: [art] Lock RT PCRs Done
26,051,686 UART: [art] Populate DV Done
26,057,049 UART: [fht] FMC Alias Private Key: 7
26,058,496 UART: [art] Derive CDI
26,059,239 UART: [art] Store in in slot 0x4
26,102,002 UART: [art] Derive Key Pair
26,103,046 UART: [art] Store priv key in slot 0x5
29,345,271 UART: [art] Derive Key Pair - Done
29,358,531 UART: [art] Signing Cert with AUTHO
29,359,831 UART: RITY.KEYID = 7
31,639,202 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,703 UART: [art] PUB.X = CD79F936E65143632D068F811C184584822E4362C41B8D5C8E48E3148FDD8427B43B997C3649A901B15BF097CDB691F9
31,647,899 UART: [art] PUB.Y = 30CA9F7DB0507A15D0096982B9A5D3E3FFDF998CB84AC80A6ADC170DD45268DE0CF4F7370F90CF099969076755122D40
31,655,161 UART: [art] SIG.R = 5988C299425A2E37C78774FA03BFF4B4FF4F993370AAF50CBA9C786A92D5276A48F6F741E2EC7CFE5EA9A2F867DA0892
31,662,561 UART: [art] SIG.S = C040C5BD7AC82D58B7C40E5CA2160D45D474319E18EB7EB76B2E9BEE674FD527C024F0AD062EA03D04C86234B8766EF5
32,967,861 UART: Caliptra RT
32,968,566 UART: [state] CFI Enabled
33,087,312 UART: [rt] RT listening for mailbox commands...
33,119,000 UART: [rt]cmd =0x50435245, len=56
33,120,540 >>> mbox cmd response: failed
33,121,155 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,151,332 UART: [rt]cmd =0x50435245, len=56
33,153,074 >>> mbox cmd response: failed
33,153,343 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,183,527 UART: [rt]cmd =0x50435245, len=56
33,185,171 >>> mbox cmd response: failed
33,185,430 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,215,558 UART: [rt]cmd =0x50435245, len=56
33,217,419 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,013 UART:
192,395 UART: Running Caliptra ROM ...
193,531 UART:
193,702 UART: [state] CFI Enabled
260,743 UART: [state] LifecycleState = Unprovisioned
262,678 UART: [state] DebugLocked = No
264,783 UART: [state] WD Timer not started. Device not locked for debugging
267,748 UART: [kat] SHA2-256
446,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,473 UART: [kat] ++
458,923 UART: [kat] sha1
469,862 UART: [kat] SHA2-256
472,947 UART: [kat] SHA2-384
479,362 UART: [kat] SHA2-512-ACC
482,297 UART: [kat] ECC-384
2,949,574 UART: [kat] HMAC-384Kdf
2,971,224 UART: [kat] LMS
3,500,672 UART: [kat] --
3,505,166 UART: [cold-reset] ++
3,506,485 UART: [fht] FHT @ 0x50003400
3,517,045 UART: [idev] ++
3,517,613 UART: [idev] CDI.KEYID = 6
3,518,521 UART: [idev] SUBJECT.KEYID = 7
3,519,763 UART: [idev] UDS.KEYID = 0
3,520,688 ready_for_fw is high
3,520,902 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,981 UART: [idev] Erasing UDS.KEYID = 0
6,025,045 UART: [idev] Sha1 KeyId Algorithm
6,048,445 UART: [idev] --
6,052,560 UART: [ldev] ++
6,053,136 UART: [ldev] CDI.KEYID = 6
6,054,053 UART: [ldev] SUBJECT.KEYID = 5
6,055,218 UART: [ldev] AUTHORITY.KEYID = 7
6,056,454 UART: [ldev] FE.KEYID = 1
6,099,625 UART: [ldev] Erasing FE.KEYID = 1
8,603,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,494 UART: [ldev] --
10,410,167 UART: [fwproc] Wait for Commands...
10,412,690 UART: [fwproc] Recv command 0x46574c44
10,414,782 UART: [fwproc] Recv'd Img size: 114168 bytes
13,807,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,269,665 >>> mbox cmd response: success
14,270,222 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,274,693 UART: [afmc] ++
14,275,275 UART: [afmc] CDI.KEYID = 6
14,276,218 UART: [afmc] SUBJECT.KEYID = 7
14,277,380 UART: [afmc] AUTHORITY.KEYID = 5
16,808,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,528,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,530,378 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,546,167 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,562,190 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,578,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,217 UART: [afmc] --
18,605,730 UART: [cold-reset] --
18,608,785 UART: [state] Locking Datavault
18,613,279 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,923 UART: [state] Locking ICCM
18,616,319 UART: [exit] Launching FMC @ 0x40000130
18,624,718 UART:
18,624,963 UART: Running Caliptra FMC ...
18,626,085 UART:
18,626,252 UART: [state] CFI Enabled
18,689,822 UART: [fht] FMC Alias Private Key: 7
20,453,395 UART: [art] Extend RT PCRs Done
20,454,614 UART: [art] Lock RT PCRs Done
20,456,218 UART: [art] Populate DV Done
20,461,632 UART: [fht] FMC Alias Private Key: 7
20,463,334 UART: [art] Derive CDI
20,464,147 UART: [art] Store in in slot 0x4
20,522,238 UART: [art] Derive Key Pair
20,523,278 UART: [art] Store priv key in slot 0x5
22,986,072 UART: [art] Derive Key Pair - Done
22,999,187 UART: [art] Signing Cert with AUTHO
23,000,489 UART: RITY.KEYID = 7
24,712,086 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,598 UART: [art] PUB.X = 5263C625BCA85ECD95D653EE8B168686D40106F2885C3AF9FE5C1382FE8DCBB178BD68FD1673FEF1DF751CF42AB0BBCC
24,720,939 UART: [art] PUB.Y = A892F857609176DAAFC89A15878D3BACDBB59A4D95085D7AB76A6424791046B001670D9872B0FE5138EACC4FF9D9D9E1
24,728,194 UART: [art] SIG.R = D8BF1EEC1F3C08B13C433061384B5A21BA9D01D0CC11B5FD39370E5CEEF638EEF5E4996BB3CF56CA26B926781477648D
24,735,749 UART: [art] SIG.S = BF66921BF0B4A0F4A7C8817FA19BCC0969F762114505E10227B4E8D721C9CC6D77701C7A44F4384A69E78A7D49B39E0C
25,714,625 UART: Caliptra RT
25,715,328 UART: [state] CFI Enabled
25,879,830 UART: [rt] RT listening for mailbox commands...
25,911,569 UART: [rt]cmd =0x50435245, len=56
25,913,323 >>> mbox cmd response: failed
25,913,964 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,944,307 UART: [rt]cmd =0x50435245, len=56
25,946,158 >>> mbox cmd response: failed
25,946,417 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,976,544 UART: [rt]cmd =0x50435245, len=56
25,978,568 >>> mbox cmd response: failed
25,978,819 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,008,891 UART: [rt]cmd =0x50435245, len=56
26,010,449 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,359,410 ready_for_fw is high
3,359,815 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,048,120 >>> mbox cmd response: success
14,048,991 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,341,173 UART:
18,341,579 UART: Running Caliptra FMC ...
18,342,734 UART:
18,342,895 UART: [state] CFI Enabled
18,409,766 UART: [fht] FMC Alias Private Key: 7
20,173,549 UART: [art] Extend RT PCRs Done
20,174,758 UART: [art] Lock RT PCRs Done
20,176,572 UART: [art] Populate DV Done
20,181,870 UART: [fht] FMC Alias Private Key: 7
20,183,410 UART: [art] Derive CDI
20,184,145 UART: [art] Store in in slot 0x4
20,242,684 UART: [art] Derive Key Pair
20,243,747 UART: [art] Store priv key in slot 0x5
22,706,462 UART: [art] Derive Key Pair - Done
22,719,569 UART: [art] Signing Cert with AUTHO
22,720,871 UART: RITY.KEYID = 7
24,431,861 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,532 UART: [art] PUB.X = C98DAE70B7CA0C462A4765F8819C633115E274352458CE3B85FCF03595D3BD39AAA3ACAC43C77EE36E75D3DD36E81A17
24,440,637 UART: [art] PUB.Y = 7F5F632BE30F131B5F088BF75200824274E795D0AE28E9FB6D8492FB4636BB3C07F53E169D9A10B249F505014D709AB3
24,447,835 UART: [art] SIG.R = 80A0C461B34CF1FC28DF38E1B8F9EE491E577BFC3593E503420B047C2E943DBF56D65AD6066C5C3DD2644ADF0A261F0C
24,455,233 UART: [art] SIG.S = 37CA8A244A3F654E94ADCB3199F33E6D665C5A6F722D1FD7C2E4557E5303854DC6FB7AC2866FB6BEDDBFFEB075D73A93
25,433,626 UART: Caliptra RT
25,434,349 UART: [state] CFI Enabled
25,600,736 UART: [rt] RT listening for mailbox commands...
25,632,370 UART: [rt]cmd =0x50435245, len=56
25,634,418 >>> mbox cmd response: failed
25,635,083 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,665,357 UART: [rt]cmd =0x50435245, len=56
25,667,181 >>> mbox cmd response: failed
25,667,437 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,697,623 UART: [rt]cmd =0x50435245, len=56
25,699,483 >>> mbox cmd response: failed
25,699,744 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,729,961 UART: [rt]cmd =0x50435245, len=56
25,731,637 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,843 writing to cptra_bootfsm_go
192,929 UART:
193,339 UART: Running Caliptra ROM ...
194,446 UART:
604,175 UART: [state] CFI Enabled
619,186 UART: [state] LifecycleState = Unprovisioned
621,057 UART: [state] DebugLocked = No
624,011 UART: [state] WD Timer not started. Device not locked for debugging
628,117 UART: [kat] SHA2-256
807,296 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,809 UART: [kat] ++
819,338 UART: [kat] sha1
830,362 UART: [kat] SHA2-256
833,418 UART: [kat] SHA2-384
839,944 UART: [kat] SHA2-512-ACC
842,881 UART: [kat] ECC-384
3,284,713 UART: [kat] HMAC-384Kdf
3,297,088 UART: [kat] LMS
3,826,516 UART: [kat] --
3,830,939 UART: [cold-reset] ++
3,832,939 UART: [fht] FHT @ 0x50003400
3,844,125 UART: [idev] ++
3,844,687 UART: [idev] CDI.KEYID = 6
3,845,596 UART: [idev] SUBJECT.KEYID = 7
3,846,769 UART: [idev] UDS.KEYID = 0
3,847,694 ready_for_fw is high
3,847,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,286 UART: [idev] Erasing UDS.KEYID = 0
6,321,021 UART: [idev] Sha1 KeyId Algorithm
6,343,543 UART: [idev] --
6,347,367 UART: [ldev] ++
6,347,929 UART: [ldev] CDI.KEYID = 6
6,348,891 UART: [ldev] SUBJECT.KEYID = 5
6,350,048 UART: [ldev] AUTHORITY.KEYID = 7
6,351,303 UART: [ldev] FE.KEYID = 1
6,362,492 UART: [ldev] Erasing FE.KEYID = 1
8,839,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,858 UART: [ldev] --
10,630,239 UART: [fwproc] Wait for Commands...
10,632,332 UART: [fwproc] Recv command 0x46574c44
10,634,421 UART: [fwproc] Recv'd Img size: 114168 bytes
14,037,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,110,588 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,375 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,497,170 >>> mbox cmd response: success
14,497,716 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,502,165 UART: [afmc] ++
14,502,759 UART: [afmc] CDI.KEYID = 6
14,503,675 UART: [afmc] SUBJECT.KEYID = 7
14,504,836 UART: [afmc] AUTHORITY.KEYID = 5
17,009,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,873 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,892 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,728 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,802,499 UART: [afmc] --
18,805,773 UART: [cold-reset] --
18,808,500 UART: [state] Locking Datavault
18,812,826 UART: [state] Locking PCR0, PCR1 and PCR31
18,814,467 UART: [state] Locking ICCM
18,816,614 UART: [exit] Launching FMC @ 0x40000130
18,825,027 UART:
18,825,277 UART: Running Caliptra FMC ...
18,826,379 UART:
18,826,542 UART: [state] CFI Enabled
18,834,545 UART: [fht] FMC Alias Private Key: 7
20,591,756 UART: [art] Extend RT PCRs Done
20,593,082 UART: [art] Lock RT PCRs Done
20,594,383 UART: [art] Populate DV Done
20,599,905 UART: [fht] FMC Alias Private Key: 7
20,601,442 UART: [art] Derive CDI
20,602,209 UART: [art] Store in in slot 0x4
20,644,638 UART: [art] Derive Key Pair
20,645,637 UART: [art] Store priv key in slot 0x5
23,071,609 UART: [art] Derive Key Pair - Done
23,084,540 UART: [art] Signing Cert with AUTHO
23,085,859 UART: RITY.KEYID = 7
24,791,265 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,765 UART: [art] PUB.X = EE387420EEEE72E682072C37BC7BD609A2032BCBD0D5AC814536F5C7AE0ADCB6082587E622FEC586BC45CE1EE216FC12
24,800,022 UART: [art] PUB.Y = D6DC6D40A8CFF9611B8E6DB842096DF5ABFB2D4F495C7307B0D391965E0167831A1B9867D8F4EDC0A715349F66979517
24,807,321 UART: [art] SIG.R = 1CC1D8AD4EB2B3EDC6B19DDAC0CB096DC9C112946305E76FDDCDDA4DD3D1D028ED1386B011CDEA738F34E7C4AFB7092F
24,814,714 UART: [art] SIG.S = 59EB03B8D248F59C3AD21EAA1E5B8935A3FF9155F8FD34CAC0F13986859077D505371D0CF413A899BE98355C69DF9474
25,793,383 UART: Caliptra RT
25,794,094 UART: [state] CFI Enabled
25,911,087 UART: [rt] RT listening for mailbox commands...
25,943,198 UART: [rt]cmd =0x50435245, len=56
25,945,224 >>> mbox cmd response: failed
25,945,904 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,975,921 UART: [rt]cmd =0x50435245, len=56
25,977,612 >>> mbox cmd response: failed
25,977,877 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,008,015 UART: [rt]cmd =0x50435245, len=56
26,009,994 >>> mbox cmd response: failed
26,010,307 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,040,729 UART: [rt]cmd =0x50435245, len=56
26,042,569 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,736 writing to cptra_bootfsm_go
3,693,807 ready_for_fw is high
3,694,461 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,258,346 >>> mbox cmd response: success
14,259,054 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,508,010 UART:
18,508,405 UART: Running Caliptra FMC ...
18,509,592 UART:
18,509,765 UART: [state] CFI Enabled
18,517,982 UART: [fht] FMC Alias Private Key: 7
20,275,439 UART: [art] Extend RT PCRs Done
20,276,660 UART: [art] Lock RT PCRs Done
20,278,290 UART: [art] Populate DV Done
20,283,653 UART: [fht] FMC Alias Private Key: 7
20,285,184 UART: [art] Derive CDI
20,285,954 UART: [art] Store in in slot 0x4
20,328,734 UART: [art] Derive Key Pair
20,329,741 UART: [art] Store priv key in slot 0x5
22,756,459 UART: [art] Derive Key Pair - Done
22,769,729 UART: [art] Signing Cert with AUTHO
22,771,060 UART: RITY.KEYID = 7
24,476,461 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,964 UART: [art] PUB.X = 671A599CDE71D44CC693A560E2EEA6100D80FD968EE86D482DFD465A2051A4FC9FCC3609A78BECBCD5D56111CA467AD4
24,485,263 UART: [art] PUB.Y = AE0E2539480326DE9663D4B7CA9EC58E1DB52E47B993DDD05B2966B210E32EAF444388291106005FA6F80E497871E3D5
24,492,470 UART: [art] SIG.R = FA98DB6EFB235E3DCEB941482A870A286E295A2066517E24CAE4A5AA3E2117FB18E8583E72C87470EEAE765C3D14D690
24,499,872 UART: [art] SIG.S = 6299705F6F9624684890436B592B2B1D5F5AAB9FCB0B103FA70FA634D014C23FF3EE034CBE9705DEE4D4687FF439639E
25,478,677 UART: Caliptra RT
25,479,377 UART: [state] CFI Enabled
25,596,443 UART: [rt] RT listening for mailbox commands...
25,628,129 UART: [rt]cmd =0x50435245, len=56
25,629,941 >>> mbox cmd response: failed
25,630,561 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,660,596 UART: [rt]cmd =0x50435245, len=56
25,662,250 >>> mbox cmd response: failed
25,662,517 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,692,656 UART: [rt]cmd =0x50435245, len=56
25,694,476 >>> mbox cmd response: failed
25,694,737 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,724,784 UART: [rt]cmd =0x50435245, len=56
25,726,389 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,036 UART:
192,424 UART: Running Caliptra ROM ...
193,564 UART:
193,719 UART: [state] CFI Enabled
265,843 UART: [state] LifecycleState = Unprovisioned
268,259 UART: [state] DebugLocked = No
270,158 UART: [state] WD Timer not started. Device not locked for debugging
273,869 UART: [kat] SHA2-256
463,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,508 UART: [kat] ++
474,952 UART: [kat] sha1
486,184 UART: [kat] SHA2-256
489,194 UART: [kat] SHA2-384
495,898 UART: [kat] SHA2-512-ACC
498,480 UART: [kat] ECC-384
2,949,480 UART: [kat] HMAC-384Kdf
2,970,898 UART: [kat] LMS
3,502,648 UART: [kat] --
3,509,270 UART: [cold-reset] ++
3,510,558 UART: [fht] FHT @ 0x50003400
3,523,456 UART: [idev] ++
3,524,102 UART: [idev] CDI.KEYID = 6
3,525,084 UART: [idev] SUBJECT.KEYID = 7
3,526,262 UART: [idev] UDS.KEYID = 0
3,527,184 ready_for_fw is high
3,527,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,990 UART: [idev] Erasing UDS.KEYID = 0
6,025,909 UART: [idev] Sha1 KeyId Algorithm
6,047,643 UART: [idev] --
6,052,504 UART: [ldev] ++
6,053,190 UART: [ldev] CDI.KEYID = 6
6,054,111 UART: [ldev] SUBJECT.KEYID = 5
6,055,295 UART: [ldev] AUTHORITY.KEYID = 7
6,056,478 UART: [ldev] FE.KEYID = 1
6,099,321 UART: [ldev] Erasing FE.KEYID = 1
8,604,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,176 UART: [ldev] --
10,413,008 UART: [fwproc] Wait for Commands...
10,415,590 UART: [fwproc] Recv command 0x46574c44
10,417,898 UART: [fwproc] Recv'd Img size: 114168 bytes
13,847,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,039,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,581,709 >>> mbox cmd response: success
14,582,332 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,585,411 UART: [afmc] ++
14,586,161 UART: [afmc] CDI.KEYID = 6
14,587,360 UART: [afmc] SUBJECT.KEYID = 7
14,588,800 UART: [afmc] AUTHORITY.KEYID = 5
17,122,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,198 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,386 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,498 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,530 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,059 UART: [afmc] --
18,926,323 UART: [cold-reset] --
18,931,546 UART: [state] Locking Datavault
18,939,288 UART: [state] Locking PCR0, PCR1 and PCR31
18,941,489 UART: [state] Locking ICCM
18,942,906 UART: [exit] Launching FMC @ 0x40000130
18,951,587 UART:
18,951,817 UART: Running Caliptra FMC ...
18,952,920 UART:
18,953,082 UART: [state] CFI Enabled
19,006,614 UART: [fht] FMC Alias Private Key: 7
20,770,971 UART: [art] Extend RT PCRs Done
20,772,176 UART: [art] Lock RT PCRs Done
20,773,877 UART: [art] Populate DV Done
20,779,338 UART: [fht] FMC Alias Private Key: 7
20,780,983 UART: [art] Derive CDI
20,781,798 UART: [art] Store in in slot 0x4
20,839,784 UART: [art] Derive Key Pair
20,840,839 UART: [art] Store priv key in slot 0x5
23,304,077 UART: [art] Derive Key Pair - Done
23,317,049 UART: [art] Signing Cert with AUTHO
23,318,373 UART: RITY.KEYID = 7
25,029,443 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,948 UART: [art] PUB.X = A1FCAFE30197C93B34FA083C84C6944EB6B14E0EB25CDCD5D4835F107D40E216C79942E7CD134B867DA128C6457A8449
25,038,225 UART: [art] PUB.Y = B3AFEFDBF676EF74B3C08A697D50A262F4B00E58854E18709CFA82BAF5232576AEF201163631839EB5CC430380848C64
25,045,477 UART: [art] SIG.R = 10B931BA053E13E46532DFA43280C8D2CD15AF6DB7E0F1398178B445F14D6F666137D037186F5C3187A90385C23D1E2B
25,052,832 UART: [art] SIG.S = 72D3EF3C32C45DB19065088476C4D82214E7784B1EC52EEA6B7931D8D2B79B6984042B7FB94F736256C85D217F6B8B2B
26,032,260 UART: Caliptra RT
26,032,949 UART: [state] CFI Enabled
26,195,442 UART: [rt] RT listening for mailbox commands...
26,227,067 UART: [rt]cmd =0x50435245, len=56
26,229,148 >>> mbox cmd response: failed
26,229,937 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,259,943 UART: [rt]cmd =0x50435245, len=56
26,261,819 >>> mbox cmd response: failed
26,262,079 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,292,283 UART: [rt]cmd =0x50435245, len=56
26,293,659 >>> mbox cmd response: failed
26,293,927 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,324,116 UART: [rt]cmd =0x50435245, len=56
26,325,600 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,436,311 ready_for_fw is high
3,436,698 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,714,422 >>> mbox cmd response: success
14,715,363 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,006,573 UART:
19,006,995 UART: Running Caliptra FMC ...
19,008,142 UART:
19,008,315 UART: [state] CFI Enabled
19,074,286 UART: [fht] FMC Alias Private Key: 7
20,838,539 UART: [art] Extend RT PCRs Done
20,839,749 UART: [art] Lock RT PCRs Done
20,841,379 UART: [art] Populate DV Done
20,846,626 UART: [fht] FMC Alias Private Key: 7
20,848,203 UART: [art] Derive CDI
20,849,027 UART: [art] Store in in slot 0x4
20,906,772 UART: [art] Derive Key Pair
20,907,776 UART: [art] Store priv key in slot 0x5
23,371,798 UART: [art] Derive Key Pair - Done
23,384,586 UART: [art] Signing Cert with AUTHO
23,385,893 UART: RITY.KEYID = 7
25,097,528 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,029 UART: [art] PUB.X = 0ACD45708DFD9C8824AC5330B338E56E162C96D2FDCF64C91DC7432017FEE255C8162E90FCF0E76D828180F958E27F0D
25,106,330 UART: [art] PUB.Y = 02004841C2EB7287000AE039F28A155A7C0F33AF0F945755E6F07780781A8C126DBF7D9F05E4FBC74DE77FBA920E2C92
25,113,498 UART: [art] SIG.R = 89371F0B9CB4D43A13A30DBA0958BEF4F63A4DAB9C0E798CD22010AB2B8B3F7F149938A1B1F0305A17EF6A220BCECCA6
25,120,948 UART: [art] SIG.S = A54CE43B01729E3D3048449B68DC1EC64C85AC4CFEBF2EEF27B35AC11842AD6D7B706EB6E695959117CE18D34ECB4964
26,099,827 UART: Caliptra RT
26,100,543 UART: [state] CFI Enabled
26,263,700 UART: [rt] RT listening for mailbox commands...
26,295,321 UART: [rt]cmd =0x50435245, len=56
26,296,939 >>> mbox cmd response: failed
26,297,617 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,327,742 UART: [rt]cmd =0x50435245, len=56
26,329,457 >>> mbox cmd response: failed
26,329,719 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,359,903 UART: [rt]cmd =0x50435245, len=56
26,361,874 >>> mbox cmd response: failed
26,362,123 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,392,484 UART: [rt]cmd =0x50435245, len=56
26,393,899 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,599 writing to cptra_bootfsm_go
193,958 UART:
194,344 UART: Running Caliptra ROM ...
195,539 UART:
605,000 UART: [state] CFI Enabled
620,665 UART: [state] LifecycleState = Unprovisioned
623,043 UART: [state] DebugLocked = No
624,789 UART: [state] WD Timer not started. Device not locked for debugging
629,029 UART: [kat] SHA2-256
818,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,706 UART: [kat] ++
830,201 UART: [kat] sha1
842,497 UART: [kat] SHA2-256
845,505 UART: [kat] SHA2-384
850,999 UART: [kat] SHA2-512-ACC
853,580 UART: [kat] ECC-384
3,295,972 UART: [kat] HMAC-384Kdf
3,308,274 UART: [kat] LMS
3,840,042 UART: [kat] --
3,845,327 UART: [cold-reset] ++
3,846,367 UART: [fht] FHT @ 0x50003400
3,856,722 UART: [idev] ++
3,857,363 UART: [idev] CDI.KEYID = 6
3,858,397 UART: [idev] SUBJECT.KEYID = 7
3,859,500 UART: [idev] UDS.KEYID = 0
3,860,431 ready_for_fw is high
3,860,626 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,042 UART: [idev] Erasing UDS.KEYID = 0
6,331,481 UART: [idev] Sha1 KeyId Algorithm
6,353,822 UART: [idev] --
6,359,876 UART: [ldev] ++
6,360,555 UART: [ldev] CDI.KEYID = 6
6,361,469 UART: [ldev] SUBJECT.KEYID = 5
6,362,628 UART: [ldev] AUTHORITY.KEYID = 7
6,363,857 UART: [ldev] FE.KEYID = 1
6,376,446 UART: [ldev] Erasing FE.KEYID = 1
8,851,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,798 UART: [ldev] --
10,638,977 UART: [fwproc] Wait for Commands...
10,640,448 UART: [fwproc] Recv command 0x46574c44
10,642,488 UART: [fwproc] Recv'd Img size: 114168 bytes
14,089,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,448 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,286,602 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,827,877 >>> mbox cmd response: success
14,828,460 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,831,684 UART: [afmc] ++
14,832,376 UART: [afmc] CDI.KEYID = 6
14,833,617 UART: [afmc] SUBJECT.KEYID = 7
14,835,062 UART: [afmc] AUTHORITY.KEYID = 5
17,337,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,605 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,077,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,092,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,107,960 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,131,686 UART: [afmc] --
19,134,589 UART: [cold-reset] --
19,140,022 UART: [state] Locking Datavault
19,145,546 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,684 UART: [state] Locking ICCM
19,149,662 UART: [exit] Launching FMC @ 0x40000130
19,158,331 UART:
19,158,572 UART: Running Caliptra FMC ...
19,159,677 UART:
19,159,834 UART: [state] CFI Enabled
19,168,182 UART: [fht] FMC Alias Private Key: 7
20,924,569 UART: [art] Extend RT PCRs Done
20,925,781 UART: [art] Lock RT PCRs Done
20,927,483 UART: [art] Populate DV Done
20,932,626 UART: [fht] FMC Alias Private Key: 7
20,934,286 UART: [art] Derive CDI
20,935,028 UART: [art] Store in in slot 0x4
20,977,742 UART: [art] Derive Key Pair
20,978,783 UART: [art] Store priv key in slot 0x5
23,405,395 UART: [art] Derive Key Pair - Done
23,418,502 UART: [art] Signing Cert with AUTHO
23,419,810 UART: RITY.KEYID = 7
25,125,315 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,822 UART: [art] PUB.X = 9990257FF3F52376CAC072E716B46E7A0D47FEB693ACCD239CA914B85EC5BBE70019514BDC98EC7C1EA03ADC94F252D9
25,134,133 UART: [art] PUB.Y = 0ECD4C1CCBCE6A2F1C506A9045989446ACF85CAC71866AC2413B3504704B21389D85AE63F34BA70F2B9FBEA580C1D146
25,141,365 UART: [art] SIG.R = 3A8DE8CE9D0523D58E079D58A73DE1B7ED9CED6B6039C2F318C3CEEB52CB7BE185D2855BB24E6F2D6118227730050531
25,148,755 UART: [art] SIG.S = 40E2D4F960BC4AC3E5A554996A11CF81752FAEE0B02C431FA388548EDCFA6F3EA0C5A6C5BCF865CEB198E98E92F25792
26,127,879 UART: Caliptra RT
26,128,574 UART: [state] CFI Enabled
26,245,814 UART: [rt] RT listening for mailbox commands...
26,277,277 UART: [rt]cmd =0x50435245, len=56
26,279,152 >>> mbox cmd response: failed
26,279,782 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,309,953 UART: [rt]cmd =0x50435245, len=56
26,311,826 >>> mbox cmd response: failed
26,312,087 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,342,375 UART: [rt]cmd =0x50435245, len=56
26,344,108 >>> mbox cmd response: failed
26,344,381 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,374,683 UART: [rt]cmd =0x50435245, len=56
26,376,544 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,712 writing to cptra_bootfsm_go
3,756,046 ready_for_fw is high
3,756,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,946,885 >>> mbox cmd response: success
14,947,734 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,200,205 UART:
19,200,604 UART: Running Caliptra FMC ...
19,201,808 UART:
19,201,986 UART: [state] CFI Enabled
19,209,719 UART: [fht] FMC Alias Private Key: 7
20,966,306 UART: [art] Extend RT PCRs Done
20,967,518 UART: [art] Lock RT PCRs Done
20,969,097 UART: [art] Populate DV Done
20,974,190 UART: [fht] FMC Alias Private Key: 7
20,975,783 UART: [art] Derive CDI
20,976,595 UART: [art] Store in in slot 0x4
21,018,987 UART: [art] Derive Key Pair
21,020,031 UART: [art] Store priv key in slot 0x5
23,446,991 UART: [art] Derive Key Pair - Done
23,459,713 UART: [art] Signing Cert with AUTHO
23,461,014 UART: RITY.KEYID = 7
25,166,605 UART: [art] Erasing AUTHORITY.KEYID = 7
25,168,104 UART: [art] PUB.X = 3CDDD27E44F61ECCF50F617E74B6E678AEDBE9177BD5628122DDF7095026C50F959B8360B99382328DBEA79AE8E11ECF
25,175,429 UART: [art] PUB.Y = 7477BB7E456AEDA330DD71A1D8B3154A9283A70F1423F1493D27F926DDF2EB543B508A72EABC65DCBDE5F1565F999400
25,182,667 UART: [art] SIG.R = A92081C62CF891BC513FD725D9F0D461AA8390E538769AD3C1B1512DC0D035BFD3161B37A7779E345DA374D2AFF6C014
25,190,056 UART: [art] SIG.S = 2E11BDF152C0798BC0B047E9D83A3BED0332FA302D40A5963C73B6AF079F5EA745093952438EB7809A88F7E69C962088
26,169,440 UART: Caliptra RT
26,170,123 UART: [state] CFI Enabled
26,288,545 UART: [rt] RT listening for mailbox commands...
26,320,662 UART: [rt]cmd =0x50435245, len=56
26,322,416 >>> mbox cmd response: failed
26,323,052 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,353,208 UART: [rt]cmd =0x50435245, len=56
26,354,733 >>> mbox cmd response: failed
26,354,994 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,385,196 UART: [rt]cmd =0x50435245, len=56
26,386,893 >>> mbox cmd response: failed
26,387,152 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,417,283 UART: [rt]cmd =0x50435245, len=56
26,418,945 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,349 UART: [kat] SHA2-256
882,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,395 UART: [kat] ++
886,547 UART: [kat] sha1
890,753 UART: [kat] SHA2-256
892,691 UART: [kat] SHA2-384
895,366 UART: [kat] SHA2-512-ACC
897,267 UART: [kat] ECC-384
903,124 UART: [kat] HMAC-384Kdf
907,850 UART: [kat] LMS
1,476,046 UART: [kat] --
1,476,901 UART: [cold-reset] ++
1,477,299 UART: [fht] Storing FHT @ 0x50003400
1,480,152 UART: [idev] ++
1,480,320 UART: [idev] CDI.KEYID = 6
1,480,680 UART: [idev] SUBJECT.KEYID = 7
1,481,104 UART: [idev] UDS.KEYID = 0
1,481,449 ready_for_fw is high
1,481,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,270 UART: [idev] Erasing UDS.KEYID = 0
1,505,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,298 UART: [idev] --
1,515,245 UART: [ldev] ++
1,515,413 UART: [ldev] CDI.KEYID = 6
1,515,776 UART: [ldev] SUBJECT.KEYID = 5
1,516,202 UART: [ldev] AUTHORITY.KEYID = 7
1,516,665 UART: [ldev] FE.KEYID = 1
1,521,895 UART: [ldev] Erasing FE.KEYID = 1
1,547,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,960 UART: [ldev] --
1,586,415 UART: [fwproc] Waiting for Commands...
1,587,088 UART: [fwproc] Received command 0x46574c44
1,587,879 UART: [fwproc] Received Image of size 114168 bytes
2,884,181 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,161 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,060 >>> mbox cmd response: success
3,077,060 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,078,168 UART: [afmc] ++
3,078,336 UART: [afmc] CDI.KEYID = 6
3,078,698 UART: [afmc] SUBJECT.KEYID = 7
3,079,123 UART: [afmc] AUTHORITY.KEYID = 5
3,113,590 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,994 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,774 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,387 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,077 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,962 UART: [afmc] --
3,157,080 UART: [cold-reset] --
3,157,920 UART: [state] Locking Datavault
3,158,989 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,593 UART: [state] Locking ICCM
3,160,249 UART: [exit] Launching FMC @ 0x40000130
3,165,578 UART:
3,165,594 UART: Running Caliptra FMC ...
3,166,002 UART:
3,166,056 UART: [state] CFI Enabled
3,176,499 UART: [fht] FMC Alias Private Key: 7
3,284,180 UART: [art] Extend RT PCRs Done
3,284,608 UART: [art] Lock RT PCRs Done
3,286,356 UART: [art] Populate DV Done
3,294,741 UART: [fht] FMC Alias Private Key: 7
3,295,711 UART: [art] Derive CDI
3,295,991 UART: [art] Store in in slot 0x4
3,381,762 UART: [art] Derive Key Pair
3,382,122 UART: [art] Store priv key in slot 0x5
3,396,050 UART: [art] Derive Key Pair - Done
3,410,767 UART: [art] Signing Cert with AUTHO
3,411,247 UART: RITY.KEYID = 7
3,426,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,258 UART: [art] PUB.X = 4F2F78C81E95F3F4F54B349B6254B7E9E2B21403FB68D88C99DC0CD69A9EF9FCD2A9F4386590CB02C9CDC5565E4FF4CA
3,434,037 UART: [art] PUB.Y = C5AEB698885CB71C6023BC148E3AC5747759F70285600F22D79905D1E600E45B4CED45C09AC924027D4FC80056292228
3,440,925 UART: [art] SIG.R = DAAEEE95A47FB78990E7A21DB20B2A3C7CDC57B8647C0C42E2D8B073BCCF774523EF5C6606CEDBCAF5BFED6EC4CEBA9C
3,447,724 UART: [art] SIG.S = 28D85200318241C40930560201833ADC018CEB84EC367B0C41BB7E610F99A814172F9C02BFE4207772AE12FD22939DF3
3,471,256 UART: Caliptra RT
3,471,509 UART: [state] CFI Enabled
3,579,338 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,852 UART: [rt]cmd =0x50435245, len=56
3,611,235 >>> mbox cmd response: failed
3,611,235 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,821 UART: [rt]cmd =0x50435245, len=56
3,642,220 >>> mbox cmd response: failed
3,642,220 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,671,950 UART: [rt]cmd =0x50435245, len=56
3,673,385 >>> mbox cmd response: failed
3,673,385 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,151 UART: [rt]cmd =0x50435245, len=56
3,704,476 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,803 ready_for_fw is high
1,361,803 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,622 >>> mbox cmd response: success
2,925,622 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,987,200 UART:
2,987,216 UART: Running Caliptra FMC ...
2,987,624 UART:
2,987,678 UART: [state] CFI Enabled
2,998,025 UART: [fht] FMC Alias Private Key: 7
3,105,670 UART: [art] Extend RT PCRs Done
3,106,098 UART: [art] Lock RT PCRs Done
3,107,744 UART: [art] Populate DV Done
3,115,875 UART: [fht] FMC Alias Private Key: 7
3,116,987 UART: [art] Derive CDI
3,117,267 UART: [art] Store in in slot 0x4
3,202,990 UART: [art] Derive Key Pair
3,203,350 UART: [art] Store priv key in slot 0x5
3,217,252 UART: [art] Derive Key Pair - Done
3,231,846 UART: [art] Signing Cert with AUTHO
3,232,326 UART: RITY.KEYID = 7
3,247,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,001 UART: [art] PUB.X = EA3415ABB6A90BC8E660F30ED9F93E9F342C463C0740232109BD520729857330FD071B395B87BDE5D7C720D0D3CC00D9
3,254,735 UART: [art] PUB.Y = 9D8EA17EF07DCFB825155EB5C3986D90E9E50F848CE71D6E4673CDFEBA6DEF597B986D0211292861AD3AAC016E01D541
3,261,687 UART: [art] SIG.R = 8139486720B3EF10D3A84A75832ABEDC14D7D8F367F2CC5BDE077BF565B77B74A3D8B2072BE2492840B13C0C548C6908
3,268,449 UART: [art] SIG.S = 299C57CF9B9BDD0388751B13F8BFB66A7528913712949570C28B2153568AD4B7A2A8377F60156AD46095E631425F3062
3,291,937 UART: Caliptra RT
3,292,190 UART: [state] CFI Enabled
3,399,617 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,369 UART: [rt]cmd =0x50435245, len=56
3,432,028 >>> mbox cmd response: failed
3,432,028 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,474 UART: [rt]cmd =0x50435245, len=56
3,462,955 >>> mbox cmd response: failed
3,462,955 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,492,727 UART: [rt]cmd =0x50435245, len=56
3,494,188 >>> mbox cmd response: failed
3,494,188 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,808 UART: [rt]cmd =0x50435245, len=56
3,525,351 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
890,744 UART: [kat] SHA2-256
892,682 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
902,915 UART: [kat] HMAC-384Kdf
907,583 UART: [kat] LMS
1,475,779 UART: [kat] --
1,476,806 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,480,073 UART: [idev] ++
1,480,241 UART: [idev] CDI.KEYID = 6
1,480,601 UART: [idev] SUBJECT.KEYID = 7
1,481,025 UART: [idev] UDS.KEYID = 0
1,481,370 ready_for_fw is high
1,481,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,009 UART: [idev] Erasing UDS.KEYID = 0
1,505,417 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,242 UART: [ldev] ++
1,515,410 UART: [ldev] CDI.KEYID = 6
1,515,773 UART: [ldev] SUBJECT.KEYID = 5
1,516,199 UART: [ldev] AUTHORITY.KEYID = 7
1,516,662 UART: [ldev] FE.KEYID = 1
1,521,934 UART: [ldev] Erasing FE.KEYID = 1
1,547,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,135 UART: [ldev] --
1,586,560 UART: [fwproc] Waiting for Commands...
1,587,249 UART: [fwproc] Received command 0x46574c44
1,588,040 UART: [fwproc] Received Image of size 114168 bytes
2,884,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,704 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,056 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,559 >>> mbox cmd response: success
3,076,559 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,077,715 UART: [afmc] ++
3,077,883 UART: [afmc] CDI.KEYID = 6
3,078,245 UART: [afmc] SUBJECT.KEYID = 7
3,078,670 UART: [afmc] AUTHORITY.KEYID = 5
3,114,107 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,089 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,869 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,597 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,482 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,172 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,999 UART: [afmc] --
3,156,881 UART: [cold-reset] --
3,157,633 UART: [state] Locking Datavault
3,158,932 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,536 UART: [state] Locking ICCM
3,160,052 UART: [exit] Launching FMC @ 0x40000130
3,165,381 UART:
3,165,397 UART: Running Caliptra FMC ...
3,165,805 UART:
3,165,948 UART: [state] CFI Enabled
3,176,399 UART: [fht] FMC Alias Private Key: 7
3,284,870 UART: [art] Extend RT PCRs Done
3,285,298 UART: [art] Lock RT PCRs Done
3,287,048 UART: [art] Populate DV Done
3,295,097 UART: [fht] FMC Alias Private Key: 7
3,296,083 UART: [art] Derive CDI
3,296,363 UART: [art] Store in in slot 0x4
3,382,314 UART: [art] Derive Key Pair
3,382,674 UART: [art] Store priv key in slot 0x5
3,395,472 UART: [art] Derive Key Pair - Done
3,410,440 UART: [art] Signing Cert with AUTHO
3,410,920 UART: RITY.KEYID = 7
3,426,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,551 UART: [art] PUB.X = D25813A4A6782C3F0F0071AC22DAD6977CF02C1F7519C4BA864307CF3AD478F8BBED6E1227D694FA72E2E42E41E89F01
3,434,300 UART: [art] PUB.Y = 9DC8EA68A5984B806F52466A85749A0F57B94DB8EC9DC60F12EBC3BC3C16299CF8D861049F4AACC2695E977DAB28E965
3,441,253 UART: [art] SIG.R = 5F9C11589EA440A7B2FEEFAB44A1542A4EBAB559E35143F3DEA27270CA080FFD984E67C3DCEDC366687DC0C53C8E8608
3,448,032 UART: [art] SIG.S = 15DF7892D160C783FD0FDB9BD0C271689E4F0CE315B21F431E1EB7F4E7BE68E0E3244610842B9C3D71BC6F78D97FA4D4
3,471,951 UART: Caliptra RT
3,472,296 UART: [state] CFI Enabled
3,580,120 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,796 UART: [rt]cmd =0x50435245, len=56
3,611,999 >>> mbox cmd response: failed
3,611,999 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,715 UART: [rt]cmd =0x50435245, len=56
3,643,118 >>> mbox cmd response: failed
3,643,118 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,672,644 UART: [rt]cmd =0x50435245, len=56
3,674,043 >>> mbox cmd response: failed
3,674,043 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,773 UART: [rt]cmd =0x50435245, len=56
3,705,220 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,804 ready_for_fw is high
1,362,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,309 >>> mbox cmd response: success
2,927,309 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,989,423 UART:
2,989,439 UART: Running Caliptra FMC ...
2,989,847 UART:
2,989,990 UART: [state] CFI Enabled
3,000,757 UART: [fht] FMC Alias Private Key: 7
3,109,218 UART: [art] Extend RT PCRs Done
3,109,646 UART: [art] Lock RT PCRs Done
3,111,456 UART: [art] Populate DV Done
3,119,645 UART: [fht] FMC Alias Private Key: 7
3,120,707 UART: [art] Derive CDI
3,120,987 UART: [art] Store in in slot 0x4
3,206,816 UART: [art] Derive Key Pair
3,207,176 UART: [art] Store priv key in slot 0x5
3,220,698 UART: [art] Derive Key Pair - Done
3,235,453 UART: [art] Signing Cert with AUTHO
3,235,933 UART: RITY.KEYID = 7
3,251,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,916 UART: [art] PUB.X = 88FFA118F55FCABEEBA7A57F83BFA50D1EC5C861942333DE7AB3667792B8A758CE74CFD842DA0DA430B3FC8A364668FA
3,258,702 UART: [art] PUB.Y = C0FCAA3F8CD445D94EA090102FE52A30FAE7775EEF3742AF25B415B8242D904826A1AF999BDC176B1723CC72168E6F09
3,265,659 UART: [art] SIG.R = D706F6F56D5146EAAE0B6BDED96E8AEDA79E714B067A6508F79677F430873D312E69757288DBB81D3CD728962B3D4B7E
3,272,425 UART: [art] SIG.S = 9B699F6525EDA9AF2DD2984BD9D2E30A38D9114E4C74E7575F36E4A0FD06EC8EB184DE14F4642C09CD843C6B8EA3B73A
3,296,417 UART: Caliptra RT
3,296,762 UART: [state] CFI Enabled
3,404,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,518 UART: [rt]cmd =0x50435245, len=56
3,436,783 >>> mbox cmd response: failed
3,436,783 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,639 UART: [rt]cmd =0x50435245, len=56
3,468,354 >>> mbox cmd response: failed
3,468,354 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,497,832 UART: [rt]cmd =0x50435245, len=56
3,499,415 >>> mbox cmd response: failed
3,499,415 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,529,095 UART: [rt]cmd =0x50435245, len=56
3,530,218 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,016 UART: [state] LifecycleState = Unprovisioned
85,671 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,775 UART: [kat] SHA2-256
903,715 UART: [kat] SHA2-384
906,612 UART: [kat] SHA2-512-ACC
908,513 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
922,918 UART: [kat] LMS
1,171,246 UART: [kat] --
1,172,125 UART: [cold-reset] ++
1,172,461 UART: [fht] FHT @ 0x50003400
1,175,200 UART: [idev] ++
1,175,368 UART: [idev] CDI.KEYID = 6
1,175,728 UART: [idev] SUBJECT.KEYID = 7
1,176,152 UART: [idev] UDS.KEYID = 0
1,176,497 ready_for_fw is high
1,176,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,973 UART: [idev] Sha1 KeyId Algorithm
1,209,515 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,242,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,318 UART: [fwproc] Wait for Commands...
1,282,918 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,746 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,743 >>> mbox cmd response: success
2,772,743 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,773,907 UART: [afmc] ++
2,774,075 UART: [afmc] CDI.KEYID = 6
2,774,437 UART: [afmc] SUBJECT.KEYID = 7
2,774,862 UART: [afmc] AUTHORITY.KEYID = 5
2,809,885 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,839 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,558 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,472 UART: [afmc] --
2,853,536 UART: [cold-reset] --
2,854,336 UART: [state] Locking Datavault
2,855,517 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,121 UART: [state] Locking ICCM
2,856,651 UART: [exit] Launching FMC @ 0x40000130
2,861,980 UART:
2,861,996 UART: Running Caliptra FMC ...
2,862,404 UART:
2,862,458 UART: [state] CFI Enabled
2,872,873 UART: [fht] FMC Alias Private Key: 7
2,980,634 UART: [art] Extend RT PCRs Done
2,981,062 UART: [art] Lock RT PCRs Done
2,982,522 UART: [art] Populate DV Done
2,990,751 UART: [fht] FMC Alias Private Key: 7
2,991,881 UART: [art] Derive CDI
2,992,161 UART: [art] Store in in slot 0x4
3,078,082 UART: [art] Derive Key Pair
3,078,442 UART: [art] Store priv key in slot 0x5
3,091,958 UART: [art] Derive Key Pair - Done
3,106,643 UART: [art] Signing Cert with AUTHO
3,107,123 UART: RITY.KEYID = 7
3,122,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,886 UART: [art] PUB.X = 45B77AC989F3560FC529829E3B0D7563B42C76492491C2767AA969D1CD36F3399EB5E4208DE57C1048A1AFED3748844E
3,129,648 UART: [art] PUB.Y = 1E66CF6312830FA83CC30305F071DD341A232AA8624057348BF03C2FD11207F93D473FDF63839D1E213D0F4636C69844
3,136,577 UART: [art] SIG.R = 3243AD169D4AA19FCE8D79CC12DCD91C764AA9F44C9ADEEA603D3C664938F55FA4DF4A58C83BEAC13210B4C2130724F2
3,143,362 UART: [art] SIG.S = B1E78856FCD35AE218D57320CC2153D9EFAAEABC402C894A408C4B22EC3B68A5725336B6334D96665AB5EF6DB2CF5CF8
3,166,805 UART: Caliptra RT
3,167,058 UART: [state] CFI Enabled
3,274,825 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,337 UART: [rt]cmd =0x50435245, len=56
3,306,618 >>> mbox cmd response: failed
3,306,618 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,086 UART: [rt]cmd =0x50435245, len=56
3,337,419 >>> mbox cmd response: failed
3,337,419 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,333 UART: [rt]cmd =0x50435245, len=56
3,368,624 >>> mbox cmd response: failed
3,368,624 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,326 UART: [rt]cmd =0x50435245, len=56
3,399,527 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,823 ready_for_fw is high
1,059,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,114 >>> mbox cmd response: success
2,624,114 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,686,540 UART:
2,686,556 UART: Running Caliptra FMC ...
2,686,964 UART:
2,687,018 UART: [state] CFI Enabled
2,697,589 UART: [fht] FMC Alias Private Key: 7
2,805,366 UART: [art] Extend RT PCRs Done
2,805,794 UART: [art] Lock RT PCRs Done
2,807,214 UART: [art] Populate DV Done
2,815,443 UART: [fht] FMC Alias Private Key: 7
2,816,591 UART: [art] Derive CDI
2,816,871 UART: [art] Store in in slot 0x4
2,902,826 UART: [art] Derive Key Pair
2,903,186 UART: [art] Store priv key in slot 0x5
2,916,146 UART: [art] Derive Key Pair - Done
2,930,877 UART: [art] Signing Cert with AUTHO
2,931,357 UART: RITY.KEYID = 7
2,946,603 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,368 UART: [art] PUB.X = 0481E19776E66135DD6A26A2B75AEE47EE380F6DBC71BAE025CCC9D85A882DFA0D3C3E355ACB782D4A016AF2EA219143
2,954,142 UART: [art] PUB.Y = FC66B1A5E25563296240BCDED01E5304D105C391E48D6A14F9B4609F9F4378AEFF95F8380C66D866AB315BF59244B65D
2,961,087 UART: [art] SIG.R = B0825A02EBA680B8396EEB7B8FAE189C06B0B9DA97754220EB623D37384862C23572BD0015B11F48843529FB346F67FD
2,967,829 UART: [art] SIG.S = C5500BF6A0B23AC9C6FE215CB1ECE039E7A8B9C6B29F6106F98221002AAEC9E558183F277ED3314B9E330BB2D3150DEE
2,991,142 UART: Caliptra RT
2,991,395 UART: [state] CFI Enabled
3,099,527 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,297 UART: [rt]cmd =0x50435245, len=56
3,131,674 >>> mbox cmd response: failed
3,131,674 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,374 UART: [rt]cmd =0x50435245, len=56
3,162,701 >>> mbox cmd response: failed
3,162,701 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,192,483 UART: [rt]cmd =0x50435245, len=56
3,193,962 >>> mbox cmd response: failed
3,193,962 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,564 UART: [rt]cmd =0x50435245, len=56
3,224,929 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
893,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,898 UART: [kat] ++
898,050 UART: [kat] sha1
902,440 UART: [kat] SHA2-256
904,380 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,745 UART: [kat] HMAC-384Kdf
923,569 UART: [kat] LMS
1,171,897 UART: [kat] --
1,172,624 UART: [cold-reset] ++
1,173,008 UART: [fht] FHT @ 0x50003400
1,175,711 UART: [idev] ++
1,175,879 UART: [idev] CDI.KEYID = 6
1,176,239 UART: [idev] SUBJECT.KEYID = 7
1,176,663 UART: [idev] UDS.KEYID = 0
1,177,008 ready_for_fw is high
1,177,008 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,731 UART: [idev] Erasing UDS.KEYID = 0
1,201,258 UART: [idev] Sha1 KeyId Algorithm
1,209,708 UART: [idev] --
1,210,710 UART: [ldev] ++
1,210,878 UART: [ldev] CDI.KEYID = 6
1,211,241 UART: [ldev] SUBJECT.KEYID = 5
1,211,667 UART: [ldev] AUTHORITY.KEYID = 7
1,212,130 UART: [ldev] FE.KEYID = 1
1,217,296 UART: [ldev] Erasing FE.KEYID = 1
1,243,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,098 UART: [ldev] --
1,282,513 UART: [fwproc] Wait for Commands...
1,283,179 UART: [fwproc] Recv command 0x46574c44
1,283,907 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,335 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,639 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,146 >>> mbox cmd response: success
2,773,146 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,230 UART: [afmc] ++
2,774,398 UART: [afmc] CDI.KEYID = 6
2,774,760 UART: [afmc] SUBJECT.KEYID = 7
2,775,185 UART: [afmc] AUTHORITY.KEYID = 5
2,810,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,341 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,089 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,817 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,702 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,421 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,025 UART: [afmc] --
2,854,155 UART: [cold-reset] --
2,855,227 UART: [state] Locking Datavault
2,856,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,088 UART: [state] Locking ICCM
2,857,656 UART: [exit] Launching FMC @ 0x40000130
2,862,985 UART:
2,863,001 UART: Running Caliptra FMC ...
2,863,409 UART:
2,863,552 UART: [state] CFI Enabled
2,874,281 UART: [fht] FMC Alias Private Key: 7
2,981,804 UART: [art] Extend RT PCRs Done
2,982,232 UART: [art] Lock RT PCRs Done
2,983,930 UART: [art] Populate DV Done
2,992,009 UART: [fht] FMC Alias Private Key: 7
2,993,177 UART: [art] Derive CDI
2,993,457 UART: [art] Store in in slot 0x4
3,079,376 UART: [art] Derive Key Pair
3,079,736 UART: [art] Store priv key in slot 0x5
3,093,258 UART: [art] Derive Key Pair - Done
3,108,103 UART: [art] Signing Cert with AUTHO
3,108,583 UART: RITY.KEYID = 7
3,123,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,580 UART: [art] PUB.X = C7868047F02E431BDDB38AA454780C2071B95A6190264288BDF95086B2C3A1C4DFCFC51288E5461BF4377839AF0E7720
3,131,342 UART: [art] PUB.Y = 7B84FCF8641666B201C60B7FF1BFAF2EC5EC30615354DEFE590822BFB866D96613FC6A0CB0820BD904F5F9D7AE0082C2
3,138,266 UART: [art] SIG.R = 1B9840370F14AFE6937C952D5D4FC5AD96BA1B279F7626F6C949CB959A31159AA295F474A17881A7BA03E71F1AE01780
3,145,032 UART: [art] SIG.S = A9606875D2FF3040F8BEB4A566B3ED6A25C94E9E2875D7D0CE1A4E9B2102CD576E2A0FE892F7E75CB739FA5180247FBD
3,168,955 UART: Caliptra RT
3,169,300 UART: [state] CFI Enabled
3,277,429 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,305 UART: [rt]cmd =0x50435245, len=56
3,309,766 >>> mbox cmd response: failed
3,309,766 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,334 UART: [rt]cmd =0x50435245, len=56
3,340,839 >>> mbox cmd response: failed
3,340,839 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,691 UART: [rt]cmd =0x50435245, len=56
3,372,038 >>> mbox cmd response: failed
3,372,038 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,688 UART: [rt]cmd =0x50435245, len=56
3,403,013 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,560 ready_for_fw is high
1,061,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,115 >>> mbox cmd response: success
2,626,115 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,687,807 UART:
2,687,823 UART: Running Caliptra FMC ...
2,688,231 UART:
2,688,374 UART: [state] CFI Enabled
2,698,975 UART: [fht] FMC Alias Private Key: 7
2,806,642 UART: [art] Extend RT PCRs Done
2,807,070 UART: [art] Lock RT PCRs Done
2,808,316 UART: [art] Populate DV Done
2,816,449 UART: [fht] FMC Alias Private Key: 7
2,817,439 UART: [art] Derive CDI
2,817,719 UART: [art] Store in in slot 0x4
2,903,694 UART: [art] Derive Key Pair
2,904,054 UART: [art] Store priv key in slot 0x5
2,917,356 UART: [art] Derive Key Pair - Done
2,932,405 UART: [art] Signing Cert with AUTHO
2,932,885 UART: RITY.KEYID = 7
2,947,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,318 UART: [art] PUB.X = A6F984C34CAF086E8E7D6CF077C43FAE205D95524130B4517557484A63C0F485B81011E10F9C08ABECF3BB1C784D2455
2,955,083 UART: [art] PUB.Y = DF79F3BD0679461264363195072043B58234E055B1E9620325CD188D9EF0FB4708C463E1B8C620B73CB270DF540436C4
2,962,008 UART: [art] SIG.R = 82D3BD0F407FCE8F16B00325FDA8565DA7C1CD9F4A4073AF5005BC720BD1BB2E7C0A8EE5F17788F64F2539E746F18E68
2,968,777 UART: [art] SIG.S = 2ECCA9856750ACE2904EF202105308934EEF6739AA4B9DF4C8898DD8AEF2CCD4A5101C8FAD16417A648C0A4FD36D332D
2,992,813 UART: Caliptra RT
2,993,158 UART: [state] CFI Enabled
3,101,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,295 UART: [rt]cmd =0x50435245, len=56
3,133,434 >>> mbox cmd response: failed
3,133,434 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,152 UART: [rt]cmd =0x50435245, len=56
3,164,689 >>> mbox cmd response: failed
3,164,689 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,397 UART: [rt]cmd =0x50435245, len=56
3,195,680 >>> mbox cmd response: failed
3,195,680 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,444 UART: [rt]cmd =0x50435245, len=56
3,226,779 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,105 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
890,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,971 UART: [kat] ++
895,123 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,274 UART: [kat] SHA2-512-ACC
906,175 UART: [kat] ECC-384
915,572 UART: [kat] HMAC-384Kdf
920,310 UART: [kat] LMS
1,168,622 UART: [kat] --
1,169,515 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,547 UART: [idev] ++
1,172,715 UART: [idev] CDI.KEYID = 6
1,173,076 UART: [idev] SUBJECT.KEYID = 7
1,173,501 UART: [idev] UDS.KEYID = 0
1,173,847 ready_for_fw is high
1,173,847 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,197,561 UART: [idev] Sha1 KeyId Algorithm
1,206,561 UART: [idev] --
1,207,598 UART: [ldev] ++
1,207,766 UART: [ldev] CDI.KEYID = 6
1,208,130 UART: [ldev] SUBJECT.KEYID = 5
1,208,557 UART: [ldev] AUTHORITY.KEYID = 7
1,209,020 UART: [ldev] FE.KEYID = 1
1,214,238 UART: [ldev] Erasing FE.KEYID = 1
1,240,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,278 UART: [ldev] --
1,279,764 UART: [fwproc] Wait for Commands...
1,280,551 UART: [fwproc] Recv command 0x46574c44
1,281,284 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,586 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,563 >>> mbox cmd response: success
2,769,563 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,770,646 UART: [afmc] ++
2,770,814 UART: [afmc] CDI.KEYID = 6
2,771,177 UART: [afmc] SUBJECT.KEYID = 7
2,771,603 UART: [afmc] AUTHORITY.KEYID = 5
2,807,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,585 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,314 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,197 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,916 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,715 UART: [afmc] --
2,850,833 UART: [cold-reset] --
2,851,591 UART: [state] Locking Datavault
2,852,954 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,558 UART: [state] Locking ICCM
2,854,088 UART: [exit] Launching FMC @ 0x40000130
2,859,417 UART:
2,859,433 UART: Running Caliptra FMC ...
2,859,841 UART:
2,859,895 UART: [state] CFI Enabled
2,870,002 UART: [fht] FMC Alias Private Key: 7
2,977,571 UART: [art] Extend RT PCRs Done
2,977,999 UART: [art] Lock RT PCRs Done
2,979,395 UART: [art] Populate DV Done
2,987,610 UART: [fht] FMC Alias Private Key: 7
2,988,790 UART: [art] Derive CDI
2,989,070 UART: [art] Store in in slot 0x4
3,074,641 UART: [art] Derive Key Pair
3,075,001 UART: [art] Store priv key in slot 0x5
3,088,329 UART: [art] Derive Key Pair - Done
3,103,022 UART: [art] Signing Cert with AUTHO
3,103,502 UART: RITY.KEYID = 7
3,118,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,409 UART: [art] PUB.X = 4ADD7100C636ADB22D83E471F3E8F35FE0DDFD9900CDAB0ED052D45846361FF4C1214CAFCFF9DD0EE280BA5776C48DF5
3,126,153 UART: [art] PUB.Y = BA2FE850CD3BF88E332041151FDFB85F27A31D4916347723FED4C6EDA5B0D5A3BACC90D0CA9688350B8A421605CF3BAB
3,133,115 UART: [art] SIG.R = 7E1E4590E1B3CEC778E0B172CE8AF117DDADF232FC341C698A28691D60A1D0C54958B6AADD64C75C5906D8C83F5310B0
3,139,894 UART: [art] SIG.S = 25ECDFFAD026D8D6646EFEB99C11C08C47B49A07954DD76C2A2B6209B3AE4CF9AE1BAEA5C208A08CF3081743A770F69C
3,164,035 UART: Caliptra RT
3,164,288 UART: [state] CFI Enabled
3,272,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,205 UART: [rt]cmd =0x50435245, len=56
3,304,552 >>> mbox cmd response: failed
3,304,552 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,104 UART: [rt]cmd =0x50435245, len=56
3,335,465 >>> mbox cmd response: failed
3,335,465 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,365,231 UART: [rt]cmd =0x50435245, len=56
3,366,522 >>> mbox cmd response: failed
3,366,522 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,178 UART: [rt]cmd =0x50435245, len=56
3,397,723 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,618 ready_for_fw is high
1,055,618 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,575 >>> mbox cmd response: success
2,620,575 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,682,143 UART:
2,682,159 UART: Running Caliptra FMC ...
2,682,567 UART:
2,682,621 UART: [state] CFI Enabled
2,693,452 UART: [fht] FMC Alias Private Key: 7
2,802,199 UART: [art] Extend RT PCRs Done
2,802,627 UART: [art] Lock RT PCRs Done
2,804,255 UART: [art] Populate DV Done
2,812,372 UART: [fht] FMC Alias Private Key: 7
2,813,542 UART: [art] Derive CDI
2,813,822 UART: [art] Store in in slot 0x4
2,899,899 UART: [art] Derive Key Pair
2,900,259 UART: [art] Store priv key in slot 0x5
2,912,959 UART: [art] Derive Key Pair - Done
2,927,838 UART: [art] Signing Cert with AUTHO
2,928,318 UART: RITY.KEYID = 7
2,943,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,283 UART: [art] PUB.X = ABBD80009ADE850CD39D4EBA4979493E9CA63AADB9D077AD0EA7117C8BFB9A74805D93309DD2FD98FA3300D099021676
2,951,014 UART: [art] PUB.Y = 2AE1727DBB11DBFF73EFFD169B1B9DE2500ABB0ACF18868AC5D876C969B9E60293F9831ADBEDE91C4D023D9432AAC427
2,957,974 UART: [art] SIG.R = 7ACC53A5E0B5712C57462E773501729C79230C64870203AA7AA5AF8A2B47CC459E27455B881ACA570BBA5D1762C3052F
2,964,726 UART: [art] SIG.S = D41B43F7775D5BA81FF6FC078F167A48DF40CBAB164403BF8808BFA2B679D0E688A2708C702B4C3FEA1E46FDEFB2FF4B
2,988,578 UART: Caliptra RT
2,988,831 UART: [state] CFI Enabled
3,096,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,224 UART: [rt]cmd =0x50435245, len=56
3,128,465 >>> mbox cmd response: failed
3,128,465 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,181 UART: [rt]cmd =0x50435245, len=56
3,159,696 >>> mbox cmd response: failed
3,159,696 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,189,478 UART: [rt]cmd =0x50435245, len=56
3,190,763 >>> mbox cmd response: failed
3,190,763 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,220,579 UART: [rt]cmd =0x50435245, len=56
3,221,778 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,174,782 ready_for_fw is high
1,174,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,754 UART: [idev] Erasing UDS.KEYID = 0
1,200,214 UART: [idev] Sha1 KeyId Algorithm
1,209,204 UART: [idev] --
1,210,203 UART: [ldev] ++
1,210,371 UART: [ldev] CDI.KEYID = 6
1,210,735 UART: [ldev] SUBJECT.KEYID = 5
1,211,162 UART: [ldev] AUTHORITY.KEYID = 7
1,211,625 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,243,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,701 UART: [fwproc] Wait for Commands...
1,283,306 UART: [fwproc] Recv command 0x46574c44
1,284,039 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,212 >>> mbox cmd response: success
2,773,212 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,774,481 UART: [afmc] ++
2,774,649 UART: [afmc] CDI.KEYID = 6
2,775,012 UART: [afmc] SUBJECT.KEYID = 7
2,775,438 UART: [afmc] AUTHORITY.KEYID = 5
2,811,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,728 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,457 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,340 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,792 UART: [afmc] --
2,854,820 UART: [cold-reset] --
2,855,510 UART: [state] Locking Datavault
2,856,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,217 UART: [state] Locking ICCM
2,857,661 UART: [exit] Launching FMC @ 0x40000130
2,862,990 UART:
2,863,006 UART: Running Caliptra FMC ...
2,863,414 UART:
2,863,557 UART: [state] CFI Enabled
2,874,388 UART: [fht] FMC Alias Private Key: 7
2,982,815 UART: [art] Extend RT PCRs Done
2,983,243 UART: [art] Lock RT PCRs Done
2,984,877 UART: [art] Populate DV Done
2,993,378 UART: [fht] FMC Alias Private Key: 7
2,994,506 UART: [art] Derive CDI
2,994,786 UART: [art] Store in in slot 0x4
3,080,609 UART: [art] Derive Key Pair
3,080,969 UART: [art] Store priv key in slot 0x5
3,094,331 UART: [art] Derive Key Pair - Done
3,109,120 UART: [art] Signing Cert with AUTHO
3,109,600 UART: RITY.KEYID = 7
3,124,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,611 UART: [art] PUB.X = CAA4D7DE602AB508E9B11DBC705F686080CEE1FDF049E7716A4A1200D3A86B698148328592CBFADC2F31C0C5BAFC5F28
3,132,374 UART: [art] PUB.Y = 31A757F5F7F0FDC60A437A00E069E79402378216E33D68F0C2C0591B537DE6222EC151216674EBF5CF2B44D7FD596593
3,139,294 UART: [art] SIG.R = D50006BC8619C992987A0784A3BD7A96C749B428FA7A59D4954DE6B547A65A8EC05D44EDB7070CA30404BA9FB681252F
3,146,028 UART: [art] SIG.S = 0EF3FCA703CA5F55A5191F87B4868D672DBD5508B37790F07EC0F7F3D3FD8B671E50194CCDD7784D7CEAD979DB7B6C03
3,169,851 UART: Caliptra RT
3,170,196 UART: [state] CFI Enabled
3,278,267 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,151 UART: [rt]cmd =0x50435245, len=56
3,310,296 >>> mbox cmd response: failed
3,310,296 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,010 UART: [rt]cmd =0x50435245, len=56
3,341,239 >>> mbox cmd response: failed
3,341,239 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,370,833 UART: [rt]cmd =0x50435245, len=56
3,372,182 >>> mbox cmd response: failed
3,372,182 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,108 UART: [rt]cmd =0x50435245, len=56
3,403,475 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,527 ready_for_fw is high
1,056,527 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,842 >>> mbox cmd response: success
2,620,842 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,683,384 UART:
2,683,400 UART: Running Caliptra FMC ...
2,683,808 UART:
2,683,951 UART: [state] CFI Enabled
2,694,678 UART: [fht] FMC Alias Private Key: 7
2,802,323 UART: [art] Extend RT PCRs Done
2,802,751 UART: [art] Lock RT PCRs Done
2,804,393 UART: [art] Populate DV Done
2,812,460 UART: [fht] FMC Alias Private Key: 7
2,813,404 UART: [art] Derive CDI
2,813,684 UART: [art] Store in in slot 0x4
2,899,571 UART: [art] Derive Key Pair
2,899,931 UART: [art] Store priv key in slot 0x5
2,912,911 UART: [art] Derive Key Pair - Done
2,927,952 UART: [art] Signing Cert with AUTHO
2,928,432 UART: RITY.KEYID = 7
2,943,536 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,301 UART: [art] PUB.X = A7CAE7AC742375FD4FCDF6A71086CF278DF52AE6F70126471326D3917545AF28BDFE336D089D100D129E336AB12D5D7D
2,951,072 UART: [art] PUB.Y = 243878804933E5ED76DBE55C3EAECD1E00CB2DEAFADD4A89AD5915D75C1C544F6C8D366E0F2C45895ED8C585A1189C38
2,958,013 UART: [art] SIG.R = 39E800F06A53240BAD60FF3757DC72F38564C18022A149314296FC5F875CDB897BAADC95B229ED08607BE2FB5170AE47
2,964,759 UART: [art] SIG.S = 811EE2103FA2DF86906824159E53F7ADFFAC797CED86683331BE5C4CD6FF75F3A6EB15E161C0EA295C0FEA2A10E6F638
2,988,533 UART: Caliptra RT
2,988,878 UART: [state] CFI Enabled
3,097,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,307 UART: [rt]cmd =0x50435245, len=56
3,129,756 >>> mbox cmd response: failed
3,129,756 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,758 UART: [rt]cmd =0x50435245, len=56
3,161,317 >>> mbox cmd response: failed
3,161,317 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,190,977 UART: [rt]cmd =0x50435245, len=56
3,192,548 >>> mbox cmd response: failed
3,192,548 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,308 UART: [rt]cmd =0x50435245, len=56
3,223,613 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,091 UART:
192,472 UART: Running Caliptra ROM ...
193,644 UART:
193,795 UART: [state] CFI Enabled
265,955 UART: [state] LifecycleState = Unprovisioned
267,876 UART: [state] DebugLocked = No
270,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,398 UART: [kat] SHA2-256
445,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,594 UART: [kat] ++
456,036 UART: [kat] sha1
465,840 UART: [kat] SHA2-256
468,557 UART: [kat] SHA2-384
475,179 UART: [kat] SHA2-512-ACC
477,532 UART: [kat] ECC-384
2,768,112 UART: [kat] HMAC-384Kdf
2,799,963 UART: [kat] LMS
3,990,238 UART: [kat] --
3,993,032 UART: [cold-reset] ++
3,994,672 UART: [fht] Storing FHT @ 0x50003400
4,005,930 UART: [idev] ++
4,006,498 UART: [idev] CDI.KEYID = 6
4,007,387 UART: [idev] SUBJECT.KEYID = 7
4,008,630 UART: [idev] UDS.KEYID = 0
4,009,667 ready_for_fw is high
4,009,869 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,489 UART: [idev] Erasing UDS.KEYID = 0
7,346,283 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,956 UART: [idev] --
7,372,756 UART: [ldev] ++
7,373,363 UART: [ldev] CDI.KEYID = 6
7,374,271 UART: [ldev] SUBJECT.KEYID = 5
7,375,480 UART: [ldev] AUTHORITY.KEYID = 7
7,376,779 UART: [ldev] FE.KEYID = 1
7,423,534 UART: [ldev] Erasing FE.KEYID = 1
10,756,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,237 UART: [ldev] --
13,138,642 UART: [fwproc] Waiting for Commands...
13,140,251 UART: [fwproc] Received command 0x46574c44
13,142,484 UART: [fwproc] Received Image of size 113844 bytes
17,188,120 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,888 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,652,403 >>> mbox cmd response: success
17,652,946 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,657,392 UART: [afmc] ++
17,657,982 UART: [afmc] CDI.KEYID = 6
17,658,865 UART: [afmc] SUBJECT.KEYID = 7
17,660,134 UART: [afmc] AUTHORITY.KEYID = 5
21,031,904 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,798 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,333,049 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,434 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,289 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,694 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,442 UART: [afmc] --
23,400,493 UART: [cold-reset] --
23,403,913 UART: [state] Locking Datavault
23,407,376 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,122 UART: [state] Locking ICCM
23,411,862 UART: [exit] Launching FMC @ 0x40000130
23,420,273 UART:
23,420,503 UART: Running Caliptra FMC ...
23,421,635 UART:
23,421,791 UART: [state] CFI Enabled
23,472,437 UART: [fht] FMC Alias Private Key: 7
25,810,635 UART: [art] Extend RT PCRs Done
25,811,880 UART: [art] Lock RT PCRs Done
25,813,987 UART: [art] Populate DV Done
25,819,236 UART: [fht] FMC Alias Private Key: 7
25,820,824 UART: [art] Derive CDI
25,821,630 UART: [art] Store in in slot 0x4
25,882,208 UART: [art] Derive Key Pair
25,883,242 UART: [art] Store priv key in slot 0x5
29,176,897 UART: [art] Derive Key Pair - Done
29,190,119 UART: [art] Signing Cert with AUTHO
29,191,421 UART: RITY.KEYID = 7
31,477,860 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,371 UART: [art] PUB.X = AEAD5ED902587F07729CCF4FCED0407813D9D7DE5483D5DF6DCC6EC15BAF18A34AADF359BB0137CD809D665434589FD2
31,486,630 UART: [art] PUB.Y = 13B4A14F149F821A48A643DE93C1395C7B6656BC0DC505E000E9AA5111872179F1AA703D75C93C092DC23CD9BBEAA243
31,493,888 UART: [art] SIG.R = E89919E73D52515A2CC59BC24D8E46A5E452DF489251B77F21553B7453A49858841DFB71DA7DFF12898AF7F022BDDA05
31,501,250 UART: [art] SIG.S = C863AE361EFA863BD7C34DA5EBB81D6DADA7AD3D776BA34A2A29A084DC634E803CE2BCE2AAAD826688D647DC08066F4B
32,806,057 UART: Caliptra RT
32,806,789 UART: [state] CFI Enabled
32,965,948 UART: [rt] RT listening for mailbox commands...
32,997,244 UART: [rt]cmd =0x50435252, len=8
32,999,070 >>> mbox cmd response data (8 bytes)
32,999,910 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,029,905 UART: [rt]cmd =0x50435251, len=36
34,194,775 >>> mbox cmd response data (1848 bytes)
34,205,071 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,235,159 UART: [rt]cmd =0x43455246, len=4
34,248,088 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,806,504 ready_for_fw is high
3,806,889 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,877,280 >>> mbox cmd response: success
17,878,143 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,574,526 UART:
23,574,921 UART: Running Caliptra FMC ...
23,576,028 UART:
23,576,183 UART: [state] CFI Enabled
23,640,334 UART: [fht] FMC Alias Private Key: 7
25,978,136 UART: [art] Extend RT PCRs Done
25,979,360 UART: [art] Lock RT PCRs Done
25,980,901 UART: [art] Populate DV Done
25,986,468 UART: [fht] FMC Alias Private Key: 7
25,988,054 UART: [art] Derive CDI
25,988,793 UART: [art] Store in in slot 0x4
26,047,808 UART: [art] Derive Key Pair
26,048,877 UART: [art] Store priv key in slot 0x5
29,341,750 UART: [art] Derive Key Pair - Done
29,354,692 UART: [art] Signing Cert with AUTHO
29,356,006 UART: RITY.KEYID = 7
31,642,976 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,484 UART: [art] PUB.X = 8C18311C17D367D9D142DBF35EF781C80C42FD69D966EC65D157B8CD920F65484CFA8697B75E810A2DC8B4822C3BAF8B
31,651,733 UART: [art] PUB.Y = 88EA13AA14EDCECAC29AD001B1AF6D0239248F61D09D41A82542A39F37C0F212F17A0AEC4788AE8A46D052EEC6FECCC9
31,658,967 UART: [art] SIG.R = 961F6203AA6035FFEB17C86C9FAEA641790CD71DFE9CB2D7933579B5F773EC81D68F4A737E8779FF644949FE36FB6934
31,666,354 UART: [art] SIG.S = 3FDF423A228D887EA765D6E85EE93DC0026E9CE9CF6FF0BE16586B17A8136F7FE94298A29F1B1DE1EC79D1B25296CA94
32,971,717 UART: Caliptra RT
32,972,430 UART: [state] CFI Enabled
33,132,836 UART: [rt] RT listening for mailbox commands...
33,164,074 UART: [rt]cmd =0x50435252, len=8
33,166,329 >>> mbox cmd response data (8 bytes)
33,167,159 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,197,360 UART: [rt]cmd =0x50435251, len=36
34,359,874 >>> mbox cmd response data (1848 bytes)
34,370,065 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,399,872 UART: [rt]cmd =0x43455246, len=4
34,412,988 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,560 UART:
192,931 UART: Running Caliptra ROM ...
194,049 UART:
603,986 UART: [state] CFI Enabled
621,424 UART: [state] LifecycleState = Unprovisioned
623,371 UART: [state] DebugLocked = No
625,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,046 UART: [kat] SHA2-256
799,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,304 UART: [kat] ++
810,902 UART: [kat] sha1
822,214 UART: [kat] SHA2-256
824,956 UART: [kat] SHA2-384
831,392 UART: [kat] SHA2-512-ACC
833,730 UART: [kat] ECC-384
3,116,676 UART: [kat] HMAC-384Kdf
3,129,112 UART: [kat] LMS
4,319,257 UART: [kat] --
4,324,036 UART: [cold-reset] ++
4,325,407 UART: [fht] Storing FHT @ 0x50003400
4,337,244 UART: [idev] ++
4,337,812 UART: [idev] CDI.KEYID = 6
4,338,845 UART: [idev] SUBJECT.KEYID = 7
4,340,020 UART: [idev] UDS.KEYID = 0
4,341,104 ready_for_fw is high
4,341,337 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,794 UART: [idev] Erasing UDS.KEYID = 0
7,628,698 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,240 UART: [idev] --
7,653,894 UART: [ldev] ++
7,654,467 UART: [ldev] CDI.KEYID = 6
7,655,502 UART: [ldev] SUBJECT.KEYID = 5
7,656,661 UART: [ldev] AUTHORITY.KEYID = 7
7,657,889 UART: [ldev] FE.KEYID = 1
7,669,842 UART: [ldev] Erasing FE.KEYID = 1
10,957,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,365 UART: [ldev] --
13,319,427 UART: [fwproc] Waiting for Commands...
13,322,770 UART: [fwproc] Received command 0x46574c44
13,325,008 UART: [fwproc] Received Image of size 113844 bytes
17,373,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,451,609 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,520,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,836,056 >>> mbox cmd response: success
17,836,600 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,839,766 UART: [afmc] ++
17,840,362 UART: [afmc] CDI.KEYID = 6
17,841,246 UART: [afmc] SUBJECT.KEYID = 7
17,842,513 UART: [afmc] AUTHORITY.KEYID = 5
21,153,237 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,495 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,448,753 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,140 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,477,978 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,416 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,898 UART: [afmc] --
23,516,980 UART: [cold-reset] --
23,520,263 UART: [state] Locking Datavault
23,525,297 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,050 UART: [state] Locking ICCM
23,528,554 UART: [exit] Launching FMC @ 0x40000130
23,536,946 UART:
23,537,191 UART: Running Caliptra FMC ...
23,538,296 UART:
23,538,454 UART: [state] CFI Enabled
23,546,449 UART: [fht] FMC Alias Private Key: 7
25,877,337 UART: [art] Extend RT PCRs Done
25,878,556 UART: [art] Lock RT PCRs Done
25,880,397 UART: [art] Populate DV Done
25,885,544 UART: [fht] FMC Alias Private Key: 7
25,887,137 UART: [art] Derive CDI
25,887,953 UART: [art] Store in in slot 0x4
25,930,892 UART: [art] Derive Key Pair
25,931,887 UART: [art] Store priv key in slot 0x5
29,173,615 UART: [art] Derive Key Pair - Done
29,186,878 UART: [art] Signing Cert with AUTHO
29,188,178 UART: RITY.KEYID = 7
31,467,381 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,888 UART: [art] PUB.X = BAC4EE4D758CBCCCB59BE4FFFF3EBA4987D1200095092C6E969ED26DC72BD27E4E7523ADBCF874F29FF361CFF7CD3495
31,476,194 UART: [art] PUB.Y = FC02812CF556F5DD46966C169F347868F7E8E1FD0DA590660F5B504D3603D6A9CA25BF6559B343C02AF65A30A3DCD6C6
31,483,441 UART: [art] SIG.R = E04D4390684972EEEAB01E234E5852AC448080AB9C415CE56EBDC88D64BE5EE5F66613C11A9FCED84E68EE1A8D372757
31,490,852 UART: [art] SIG.S = C89070BE344FF4E129B40888714D4E2861B2914515D21A0BD23AF650388B0499AA28A1D8C89D47063A17FE787A4F3755
32,796,187 UART: Caliptra RT
32,796,882 UART: [state] CFI Enabled
32,913,305 UART: [rt] RT listening for mailbox commands...
32,944,821 UART: [rt]cmd =0x50435252, len=8
32,946,887 >>> mbox cmd response data (8 bytes)
32,947,788 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
32,977,695 UART: [rt]cmd =0x50435251, len=36
34,132,794 >>> mbox cmd response data (1848 bytes)
34,143,065 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,172,981 UART: [rt]cmd =0x43455246, len=4
34,186,079 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
4,125,817 ready_for_fw is high
4,126,212 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,072,683 >>> mbox cmd response: success
18,073,542 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,713,747 UART:
23,714,157 UART: Running Caliptra FMC ...
23,715,526 UART:
23,715,711 UART: [state] CFI Enabled
23,723,193 UART: [fht] FMC Alias Private Key: 7
26,053,380 UART: [art] Extend RT PCRs Done
26,054,606 UART: [art] Lock RT PCRs Done
26,056,285 UART: [art] Populate DV Done
26,061,975 UART: [fht] FMC Alias Private Key: 7
26,063,602 UART: [art] Derive CDI
26,064,422 UART: [art] Store in in slot 0x4
26,107,129 UART: [art] Derive Key Pair
26,108,154 UART: [art] Store priv key in slot 0x5
29,350,542 UART: [art] Derive Key Pair - Done
29,363,436 UART: [art] Signing Cert with AUTHO
29,364,739 UART: RITY.KEYID = 7
31,644,248 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,761 UART: [art] PUB.X = 51D0E8582D4063171799336CF3A52519598978D3846C9F85EDED834F574E853D86A05B0D62E3D27C140C4D0258B20716
31,652,960 UART: [art] PUB.Y = 017586CD1D2D3BC3FCB754E0100AD294F4ADA45CF48954B4272F9739DE867BE633AEAA32FF7D4E0C51FACE7CDB005391
31,660,204 UART: [art] SIG.R = 2FC705FB5445DECA021699A75C85D22A9D8FF9E62DC441BB3FAB067EF023BD043A42B13443A5C4D313C313CC1C7209DE
31,667,604 UART: [art] SIG.S = D1098912643F28BCCAA56938EEB9CE3A5A7113B43A30EAB83B95F5D4ADCB7FA63632BB0A77DBE7C03A21B857BFB63F5A
32,972,886 UART: Caliptra RT
32,973,599 UART: [state] CFI Enabled
33,091,004 UART: [rt] RT listening for mailbox commands...
33,122,533 UART: [rt]cmd =0x50435252, len=8
33,124,332 >>> mbox cmd response data (8 bytes)
33,125,192 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,155,278 UART: [rt]cmd =0x50435251, len=36
34,310,713 >>> mbox cmd response data (1848 bytes)
34,320,904 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,350,709 UART: [rt]cmd =0x43455246, len=4
34,363,619 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,285 UART:
192,656 UART: Running Caliptra ROM ...
193,842 UART:
194,000 UART: [state] CFI Enabled
261,048 UART: [state] LifecycleState = Unprovisioned
262,972 UART: [state] DebugLocked = No
264,297 UART: [state] WD Timer not started. Device not locked for debugging
268,411 UART: [kat] SHA2-256
447,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,097 UART: [kat] ++
459,636 UART: [kat] sha1
470,485 UART: [kat] SHA2-256
473,545 UART: [kat] SHA2-384
480,968 UART: [kat] SHA2-512-ACC
483,918 UART: [kat] ECC-384
2,948,606 UART: [kat] HMAC-384Kdf
2,970,515 UART: [kat] LMS
3,499,930 UART: [kat] --
3,503,924 UART: [cold-reset] ++
3,505,384 UART: [fht] FHT @ 0x50003400
3,517,292 UART: [idev] ++
3,517,859 UART: [idev] CDI.KEYID = 6
3,518,742 UART: [idev] SUBJECT.KEYID = 7
3,519,989 UART: [idev] UDS.KEYID = 0
3,520,926 ready_for_fw is high
3,521,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,805 UART: [idev] Erasing UDS.KEYID = 0
6,026,645 UART: [idev] Sha1 KeyId Algorithm
6,048,655 UART: [idev] --
6,050,989 UART: [ldev] ++
6,051,572 UART: [ldev] CDI.KEYID = 6
6,052,493 UART: [ldev] SUBJECT.KEYID = 5
6,053,658 UART: [ldev] AUTHORITY.KEYID = 7
6,054,905 UART: [ldev] FE.KEYID = 1
6,100,579 UART: [ldev] Erasing FE.KEYID = 1
8,604,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,477 UART: [ldev] --
10,412,339 UART: [fwproc] Wait for Commands...
10,414,493 UART: [fwproc] Recv command 0x46574c44
10,416,551 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,881,287 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,950,080 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,266,555 >>> mbox cmd response: success
14,267,102 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,271,373 UART: [afmc] ++
14,271,956 UART: [afmc] CDI.KEYID = 6
14,272,867 UART: [afmc] SUBJECT.KEYID = 7
14,274,080 UART: [afmc] AUTHORITY.KEYID = 5
16,806,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,228 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,190 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,079 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,510 UART: [afmc] --
18,604,465 UART: [cold-reset] --
18,609,302 UART: [state] Locking Datavault
18,613,146 UART: [state] Locking PCR0, PCR1 and PCR31
18,614,793 UART: [state] Locking ICCM
18,616,684 UART: [exit] Launching FMC @ 0x40000130
18,625,081 UART:
18,625,365 UART: Running Caliptra FMC ...
18,626,406 UART:
18,626,555 UART: [state] CFI Enabled
18,689,834 UART: [fht] FMC Alias Private Key: 7
20,454,108 UART: [art] Extend RT PCRs Done
20,455,324 UART: [art] Lock RT PCRs Done
20,457,434 UART: [art] Populate DV Done
20,462,954 UART: [fht] FMC Alias Private Key: 7
20,464,637 UART: [art] Derive CDI
20,465,431 UART: [art] Store in in slot 0x4
20,523,911 UART: [art] Derive Key Pair
20,524,909 UART: [art] Store priv key in slot 0x5
22,987,442 UART: [art] Derive Key Pair - Done
23,000,552 UART: [art] Signing Cert with AUTHO
23,001,864 UART: RITY.KEYID = 7
24,713,518 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,017 UART: [art] PUB.X = 1042E6168BB95703E7E44FC7EBF79442B639EE0019A2C96593FB05F8E8AB8E25E5AD239B5D66B980308429C0964B8E36
24,722,290 UART: [art] PUB.Y = E14A118351D5CE8AC38D63AF5F267346329BEB9DD391E72833085B17A716B0FED67E1371B2AFDCBDC0BB3516E2E4D9C5
24,729,541 UART: [art] SIG.R = 35DB319A63BBB73B0D81F2A1F0EEAD9375D5405157A5A4DF8601E6F8F6E1B0EA83560626A8014E195E705D6C66532E34
24,736,950 UART: [art] SIG.S = D3BB387BE51C50EC76545A62A40E88601AD2C0710B59024E3F2321B403F79105EC9B6908DADCDED72AA75046B86632E5
25,716,204 UART: Caliptra RT
25,716,911 UART: [state] CFI Enabled
25,881,733 UART: [rt] RT listening for mailbox commands...
25,913,511 UART: [rt]cmd =0x50435252, len=8
25,915,495 >>> mbox cmd response data (8 bytes)
25,916,370 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,946,579 UART: [rt]cmd =0x50435251, len=36
26,861,819 >>> mbox cmd response data (1848 bytes)
26,872,255 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,902,188 UART: [rt]cmd =0x43455246, len=4
26,914,697 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,358,986 ready_for_fw is high
3,359,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,047,875 >>> mbox cmd response: success
14,048,522 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,343,658 UART:
18,344,066 UART: Running Caliptra FMC ...
18,345,168 UART:
18,345,323 UART: [state] CFI Enabled
18,410,909 UART: [fht] FMC Alias Private Key: 7
20,175,087 UART: [art] Extend RT PCRs Done
20,176,364 UART: [art] Lock RT PCRs Done
20,177,862 UART: [art] Populate DV Done
20,182,996 UART: [fht] FMC Alias Private Key: 7
20,184,697 UART: [art] Derive CDI
20,185,512 UART: [art] Store in in slot 0x4
20,244,316 UART: [art] Derive Key Pair
20,245,362 UART: [art] Store priv key in slot 0x5
22,708,147 UART: [art] Derive Key Pair - Done
22,721,035 UART: [art] Signing Cert with AUTHO
22,722,345 UART: RITY.KEYID = 7
24,433,962 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,498 UART: [art] PUB.X = 74F6116D3BEE8995C26515955DA59FD4FEDF538D34378C37F7DE6593CEFD90C25D0DE174AE315DB1C469741E2C18F8C0
24,442,744 UART: [art] PUB.Y = E0168E384EA54CC8F9E2B4E1A4458E06593FA3B860EB12C81E24E8830E6A343CDCAA7F45AFA7374AC9AD6DD92B0C8840
24,450,053 UART: [art] SIG.R = EB8993F04FB1C08CEF08264161B8ADB1D962D63ACF4F4F4EF865731D4C968F83282DA49BFCD39F6850128A7262EEE7FD
24,457,506 UART: [art] SIG.S = D147FFCD7394745E5A072687D2CF2B3DC4FFF2CF33945A0FF0BB90386EC587E3A0F88C506369CA8A14BF2AAE1373C40B
25,435,654 UART: Caliptra RT
25,436,367 UART: [state] CFI Enabled
25,602,637 UART: [rt] RT listening for mailbox commands...
25,634,050 UART: [rt]cmd =0x50435252, len=8
25,636,117 >>> mbox cmd response data (8 bytes)
25,636,856 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,666,961 UART: [rt]cmd =0x50435251, len=36
26,583,197 >>> mbox cmd response data (1848 bytes)
26,593,369 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,623,247 UART: [rt]cmd =0x43455246, len=4
26,635,889 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
192,957 UART:
193,329 UART: Running Caliptra ROM ...
194,515 UART:
603,926 UART: [state] CFI Enabled
617,566 UART: [state] LifecycleState = Unprovisioned
619,474 UART: [state] DebugLocked = No
621,715 UART: [state] WD Timer not started. Device not locked for debugging
626,177 UART: [kat] SHA2-256
805,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,929 UART: [kat] ++
817,468 UART: [kat] sha1
827,500 UART: [kat] SHA2-256
830,514 UART: [kat] SHA2-384
837,499 UART: [kat] SHA2-512-ACC
840,502 UART: [kat] ECC-384
3,284,836 UART: [kat] HMAC-384Kdf
3,297,427 UART: [kat] LMS
3,826,959 UART: [kat] --
3,831,025 UART: [cold-reset] ++
3,833,331 UART: [fht] FHT @ 0x50003400
3,843,526 UART: [idev] ++
3,844,099 UART: [idev] CDI.KEYID = 6
3,845,056 UART: [idev] SUBJECT.KEYID = 7
3,846,176 UART: [idev] UDS.KEYID = 0
3,847,164 ready_for_fw is high
3,847,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,714 UART: [idev] Erasing UDS.KEYID = 0
6,317,421 UART: [idev] Sha1 KeyId Algorithm
6,340,486 UART: [idev] --
6,343,505 UART: [ldev] ++
6,344,071 UART: [ldev] CDI.KEYID = 6
6,344,985 UART: [ldev] SUBJECT.KEYID = 5
6,346,142 UART: [ldev] AUTHORITY.KEYID = 7
6,347,428 UART: [ldev] FE.KEYID = 1
6,360,023 UART: [ldev] Erasing FE.KEYID = 1
8,838,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,519 UART: [ldev] --
10,628,722 UART: [fwproc] Wait for Commands...
10,630,924 UART: [fwproc] Recv command 0x46574c44
10,632,963 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,492,538 >>> mbox cmd response: success
14,493,062 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,497,425 UART: [afmc] ++
14,498,029 UART: [afmc] CDI.KEYID = 6
14,498,936 UART: [afmc] SUBJECT.KEYID = 7
14,500,103 UART: [afmc] AUTHORITY.KEYID = 5
17,001,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,722,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,738,026 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,754,022 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,891 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,465 UART: [afmc] --
18,798,091 UART: [cold-reset] --
18,801,847 UART: [state] Locking Datavault
18,806,872 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,567 UART: [state] Locking ICCM
18,810,095 UART: [exit] Launching FMC @ 0x40000130
18,818,490 UART:
18,818,732 UART: Running Caliptra FMC ...
18,819,856 UART:
18,820,018 UART: [state] CFI Enabled
18,827,965 UART: [fht] FMC Alias Private Key: 7
20,584,708 UART: [art] Extend RT PCRs Done
20,585,934 UART: [art] Lock RT PCRs Done
20,587,722 UART: [art] Populate DV Done
20,593,026 UART: [fht] FMC Alias Private Key: 7
20,594,730 UART: [art] Derive CDI
20,595,544 UART: [art] Store in in slot 0x4
20,638,574 UART: [art] Derive Key Pair
20,639,613 UART: [art] Store priv key in slot 0x5
23,066,950 UART: [art] Derive Key Pair - Done
23,079,524 UART: [art] Signing Cert with AUTHO
23,080,833 UART: RITY.KEYID = 7
24,786,241 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,741 UART: [art] PUB.X = 3FD8042AE9789AB309B15CCCFF9CABBBC47AF22E2BB7950B9033A5244D75C37029EF26D617B8B708AF3448F3950138B9
24,795,067 UART: [art] PUB.Y = E7E564A9CE917460A880F577E40A9C87E4B10F486EA9BF5711F3FC831ED00180C178A865E98A0FDDD614C4B558F95853
24,802,252 UART: [art] SIG.R = 7D5F326AAB7C77FDCB3EC25310A961F1DA77703C0D3575117C22393AC75AE20CA98F68399B118E87513A426759579331
24,809,650 UART: [art] SIG.S = 3C7BCD41474005C525CA8575520E217E090F1608F224EB707217525FB1AD6C07E23A3F64A1FCDA46C540B97F3ACCCF46
25,788,213 UART: Caliptra RT
25,788,925 UART: [state] CFI Enabled
25,906,538 UART: [rt] RT listening for mailbox commands...
25,937,736 UART: [rt]cmd =0x50435252, len=8
25,939,854 >>> mbox cmd response data (8 bytes)
25,940,670 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,970,817 UART: [rt]cmd =0x50435251, len=36
26,878,606 >>> mbox cmd response data (1848 bytes)
26,888,788 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,918,860 UART: [rt]cmd =0x43455246, len=4
26,931,365 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,373 writing to cptra_bootfsm_go
3,699,441 ready_for_fw is high
3,699,867 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,909 >>> mbox cmd response: success
14,268,637 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,522,900 UART:
18,523,295 UART: Running Caliptra FMC ...
18,524,400 UART:
18,524,553 UART: [state] CFI Enabled
18,532,127 UART: [fht] FMC Alias Private Key: 7
20,288,909 UART: [art] Extend RT PCRs Done
20,290,137 UART: [art] Lock RT PCRs Done
20,291,659 UART: [art] Populate DV Done
20,297,074 UART: [fht] FMC Alias Private Key: 7
20,298,735 UART: [art] Derive CDI
20,299,554 UART: [art] Store in in slot 0x4
20,341,886 UART: [art] Derive Key Pair
20,342,927 UART: [art] Store priv key in slot 0x5
22,769,080 UART: [art] Derive Key Pair - Done
22,781,866 UART: [art] Signing Cert with AUTHO
22,783,164 UART: RITY.KEYID = 7
24,488,666 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,172 UART: [art] PUB.X = 906C18FB02F23810873BE9D64884C3F6FA7180CB7AB872AA2247FBE58C5C7807EEDC673B4109BE7F7D3998F431BFE934
24,497,473 UART: [art] PUB.Y = 5D6212402F07E08BFA60008715D643BF3730D85A8F3450E5E1C00622C4351949E3E62F839E17371225C3FA789C553C7E
24,504,671 UART: [art] SIG.R = F9D007CCFB14387C58A7DBD9D8F1C9EC1F3DC155F773D3F3D2E75B39AFF20978379DDC2C3377784C380D168F63F0CCF5
24,512,070 UART: [art] SIG.S = 832323064C7BA8EA1A9E84D3D8D76F1F9E1E1B3B6E7BE0416214AE275C8423F09C92A56C15FB66CF5530A398EFEEC508
25,491,118 UART: Caliptra RT
25,491,826 UART: [state] CFI Enabled
25,609,053 UART: [rt] RT listening for mailbox commands...
25,640,309 UART: [rt]cmd =0x50435252, len=8
25,642,045 >>> mbox cmd response data (8 bytes)
25,642,862 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,672,847 UART: [rt]cmd =0x50435251, len=36
26,580,222 >>> mbox cmd response data (1848 bytes)
26,590,448 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,620,305 UART: [rt]cmd =0x43455246, len=4
26,632,858 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,043 UART:
192,446 UART: Running Caliptra ROM ...
193,599 UART:
193,749 UART: [state] CFI Enabled
266,089 UART: [state] LifecycleState = Unprovisioned
268,668 UART: [state] DebugLocked = No
271,273 UART: [state] WD Timer not started. Device not locked for debugging
275,821 UART: [kat] SHA2-256
465,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,465 UART: [kat] ++
476,942 UART: [kat] sha1
488,665 UART: [kat] SHA2-256
491,676 UART: [kat] SHA2-384
498,800 UART: [kat] SHA2-512-ACC
501,383 UART: [kat] ECC-384
2,949,281 UART: [kat] HMAC-384Kdf
2,972,113 UART: [kat] LMS
3,503,883 UART: [kat] --
3,509,512 UART: [cold-reset] ++
3,512,152 UART: [fht] FHT @ 0x50003400
3,522,630 UART: [idev] ++
3,523,335 UART: [idev] CDI.KEYID = 6
3,524,217 UART: [idev] SUBJECT.KEYID = 7
3,525,408 UART: [idev] UDS.KEYID = 0
3,526,396 ready_for_fw is high
3,526,587 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,178 UART: [idev] Erasing UDS.KEYID = 0
6,028,772 UART: [idev] Sha1 KeyId Algorithm
6,051,822 UART: [idev] --
6,057,117 UART: [ldev] ++
6,057,802 UART: [ldev] CDI.KEYID = 6
6,058,692 UART: [ldev] SUBJECT.KEYID = 5
6,059,906 UART: [ldev] AUTHORITY.KEYID = 7
6,061,107 UART: [ldev] FE.KEYID = 1
6,100,389 UART: [ldev] Erasing FE.KEYID = 1
8,606,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,414 UART: [ldev] --
10,415,783 UART: [fwproc] Wait for Commands...
10,418,415 UART: [fwproc] Recv command 0x46574c44
10,420,724 UART: [fwproc] Recv'd Img size: 114168 bytes
13,870,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,600,993 >>> mbox cmd response: success
14,601,587 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,604,356 UART: [afmc] ++
14,605,070 UART: [afmc] CDI.KEYID = 6
14,606,186 UART: [afmc] SUBJECT.KEYID = 7
14,607,729 UART: [afmc] AUTHORITY.KEYID = 5
17,157,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,914,009 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,968,002 UART: [afmc] --
18,970,688 UART: [cold-reset] --
18,974,125 UART: [state] Locking Datavault
18,979,543 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,688 UART: [state] Locking ICCM
18,984,277 UART: [exit] Launching FMC @ 0x40000130
18,992,923 UART:
18,993,203 UART: Running Caliptra FMC ...
18,994,317 UART:
18,994,480 UART: [state] CFI Enabled
19,053,005 UART: [fht] FMC Alias Private Key: 7
20,816,367 UART: [art] Extend RT PCRs Done
20,817,576 UART: [art] Lock RT PCRs Done
20,819,343 UART: [art] Populate DV Done
20,824,648 UART: [fht] FMC Alias Private Key: 7
20,826,290 UART: [art] Derive CDI
20,827,022 UART: [art] Store in in slot 0x4
20,884,730 UART: [art] Derive Key Pair
20,885,773 UART: [art] Store priv key in slot 0x5
23,348,152 UART: [art] Derive Key Pair - Done
23,361,200 UART: [art] Signing Cert with AUTHO
23,362,503 UART: RITY.KEYID = 7
25,074,032 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,544 UART: [art] PUB.X = D09D164884E8090BAFDF3849351851F87BEEF35AC1DB52FA7C777F99798B48BDED4C8AF91C6F35C884BD3336783439D3
25,082,812 UART: [art] PUB.Y = 98F71C2FEAE65F4F660693187411F36DC00B3C5DED89A2276C5515F38DA21BDF7352AC76AEAC5F9B423C671139510D53
25,090,078 UART: [art] SIG.R = 34E7DC25E6921F11A0273307E9A7520D99537B94149131AA7348864798033AF880660A6D3D940B4B6C37466E218A228A
25,097,401 UART: [art] SIG.S = BEDC77A835F602A143579456FBDFEF2554850E44918E4051F9455FDB357FF75A05E99F90ACFEC2B12336C1D5FE356DAD
26,076,012 UART: Caliptra RT
26,076,712 UART: [state] CFI Enabled
26,240,452 UART: [rt] RT listening for mailbox commands...
26,271,424 UART: [rt]cmd =0x50435252, len=8
26,273,299 >>> mbox cmd response data (8 bytes)
26,273,943 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,304,020 UART: [rt]cmd =0x50435251, len=36
27,221,306 >>> mbox cmd response data (1848 bytes)
27,231,742 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,261,612 UART: [rt]cmd =0x43455246, len=4
27,274,225 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,435,958 ready_for_fw is high
3,436,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,736,370 >>> mbox cmd response: success
14,737,236 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,043,742 UART:
19,044,150 UART: Running Caliptra FMC ...
19,045,286 UART:
19,045,455 UART: [state] CFI Enabled
19,114,979 UART: [fht] FMC Alias Private Key: 7
20,878,695 UART: [art] Extend RT PCRs Done
20,879,912 UART: [art] Lock RT PCRs Done
20,881,275 UART: [art] Populate DV Done
20,886,534 UART: [fht] FMC Alias Private Key: 7
20,888,234 UART: [art] Derive CDI
20,889,052 UART: [art] Store in in slot 0x4
20,947,907 UART: [art] Derive Key Pair
20,948,898 UART: [art] Store priv key in slot 0x5
23,411,571 UART: [art] Derive Key Pair - Done
23,424,457 UART: [art] Signing Cert with AUTHO
23,425,761 UART: RITY.KEYID = 7
25,137,211 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,730 UART: [art] PUB.X = 5F78A4DCB68ED45CE3D87681AE4FBFFDFDBF5B6D50159BD8D42937DB6C52D55F15F5C0CB37F9EB9173F3BB2157FA59C7
25,145,986 UART: [art] PUB.Y = 5280843FB027B1331ED040E14C3B3D78CBDA943E5DD8C25E9B998862915F4902E5C2B28CE1759D662E2F304BA1808E16
25,153,221 UART: [art] SIG.R = 9BFE7D9AF328E5B4ECD9AB677EEB23B3CAD53DEF4C71A23BA0C4FDE9FFF7E933865E6B423FA45007B77E1DC3D713FA22
25,160,665 UART: [art] SIG.S = 2792AB7B8BA8ED4E818B4BC0960C4B34F81253F167D1D46ADFBDB984BB878D965648A6E46A7788434B0AD2526D84212D
26,139,188 UART: Caliptra RT
26,139,899 UART: [state] CFI Enabled
26,305,559 UART: [rt] RT listening for mailbox commands...
26,336,799 UART: [rt]cmd =0x50435252, len=8
26,338,789 >>> mbox cmd response data (8 bytes)
26,339,629 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,369,672 UART: [rt]cmd =0x50435251, len=36
27,286,066 >>> mbox cmd response data (1848 bytes)
27,296,237 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,326,252 UART: [rt]cmd =0x43455246, len=4
27,338,971 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,750 writing to cptra_bootfsm_go
193,319 UART:
193,739 UART: Running Caliptra ROM ...
194,880 UART:
604,171 UART: [state] CFI Enabled
621,453 UART: [state] LifecycleState = Unprovisioned
623,851 UART: [state] DebugLocked = No
626,582 UART: [state] WD Timer not started. Device not locked for debugging
630,337 UART: [kat] SHA2-256
820,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,027 UART: [kat] ++
831,553 UART: [kat] sha1
842,024 UART: [kat] SHA2-256
845,005 UART: [kat] SHA2-384
849,665 UART: [kat] SHA2-512-ACC
852,244 UART: [kat] ECC-384
3,289,775 UART: [kat] HMAC-384Kdf
3,302,797 UART: [kat] LMS
3,834,622 UART: [kat] --
3,840,498 UART: [cold-reset] ++
3,842,231 UART: [fht] FHT @ 0x50003400
3,853,355 UART: [idev] ++
3,854,078 UART: [idev] CDI.KEYID = 6
3,854,963 UART: [idev] SUBJECT.KEYID = 7
3,856,211 UART: [idev] UDS.KEYID = 0
3,857,141 ready_for_fw is high
3,857,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,728 UART: [idev] Erasing UDS.KEYID = 0
6,327,483 UART: [idev] Sha1 KeyId Algorithm
6,350,538 UART: [idev] --
6,355,460 UART: [ldev] ++
6,356,174 UART: [ldev] CDI.KEYID = 6
6,357,092 UART: [ldev] SUBJECT.KEYID = 5
6,358,204 UART: [ldev] AUTHORITY.KEYID = 7
6,359,438 UART: [ldev] FE.KEYID = 1
6,371,221 UART: [ldev] Erasing FE.KEYID = 1
8,849,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,525 UART: [ldev] --
10,640,197 UART: [fwproc] Wait for Commands...
10,642,941 UART: [fwproc] Recv command 0x46574c44
10,645,246 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,478 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,240 >>> mbox cmd response: success
14,831,820 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,834,544 UART: [afmc] ++
14,835,294 UART: [afmc] CDI.KEYID = 6
14,836,490 UART: [afmc] SUBJECT.KEYID = 7
14,837,928 UART: [afmc] AUTHORITY.KEYID = 5
17,346,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,593 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,648 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,377 UART: [afmc] --
19,141,595 UART: [cold-reset] --
19,144,978 UART: [state] Locking Datavault
19,151,687 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,924 UART: [state] Locking ICCM
19,156,582 UART: [exit] Launching FMC @ 0x40000130
19,165,261 UART:
19,165,499 UART: Running Caliptra FMC ...
19,166,601 UART:
19,166,765 UART: [state] CFI Enabled
19,174,952 UART: [fht] FMC Alias Private Key: 7
20,932,139 UART: [art] Extend RT PCRs Done
20,933,360 UART: [art] Lock RT PCRs Done
20,935,071 UART: [art] Populate DV Done
20,940,541 UART: [fht] FMC Alias Private Key: 7
20,942,296 UART: [art] Derive CDI
20,943,111 UART: [art] Store in in slot 0x4
20,985,974 UART: [art] Derive Key Pair
20,986,972 UART: [art] Store priv key in slot 0x5
23,413,272 UART: [art] Derive Key Pair - Done
23,426,272 UART: [art] Signing Cert with AUTHO
23,427,572 UART: RITY.KEYID = 7
25,133,180 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,695 UART: [art] PUB.X = EEB8841FA8B7F8448E2575D65BB6F5C619EFBFD71BF0CA2E0A12A8E21695F737A1DD27F19505A55E16AE9F7B1F719345
25,141,943 UART: [art] PUB.Y = EEF8576631A62A56CD93CC887AE120617A381525BC3529D5F45823DA0D9D27E2E28581CB2DEE9893DEF0C04097FD2468
25,149,184 UART: [art] SIG.R = 9E2378C256E2A08C9999AC732FD8E051D3D255B0CD52815F5F3C6796F64EC95B93CDAA0983E1FB6E6EB4D4DF7CE08663
25,156,662 UART: [art] SIG.S = A8BC1082A8B7CE0A57959247948054A4B68218DD3810F4A3EBC2E8008BD82DAB109082A38048ED564589BAD717379046
26,135,696 UART: Caliptra RT
26,136,384 UART: [state] CFI Enabled
26,252,856 UART: [rt] RT listening for mailbox commands...
26,284,467 UART: [rt]cmd =0x50435252, len=8
26,286,714 >>> mbox cmd response data (8 bytes)
26,287,487 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,317,442 UART: [rt]cmd =0x50435251, len=36
27,225,103 >>> mbox cmd response data (1848 bytes)
27,235,511 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,265,444 UART: [rt]cmd =0x43455246, len=4
27,278,062 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,671 writing to cptra_bootfsm_go
3,755,933 ready_for_fw is high
3,756,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,958,962 >>> mbox cmd response: success
14,959,807 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,216,894 UART:
19,217,307 UART: Running Caliptra FMC ...
19,218,442 UART:
19,218,605 UART: [state] CFI Enabled
19,226,995 UART: [fht] FMC Alias Private Key: 7
20,984,182 UART: [art] Extend RT PCRs Done
20,985,421 UART: [art] Lock RT PCRs Done
20,987,094 UART: [art] Populate DV Done
20,992,524 UART: [fht] FMC Alias Private Key: 7
20,994,066 UART: [art] Derive CDI
20,994,807 UART: [art] Store in in slot 0x4
21,037,129 UART: [art] Derive Key Pair
21,038,133 UART: [art] Store priv key in slot 0x5
23,465,188 UART: [art] Derive Key Pair - Done
23,478,127 UART: [art] Signing Cert with AUTHO
23,479,431 UART: RITY.KEYID = 7
25,184,962 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,860 UART: [art] PUB.X = B987F5522D40DBA4BFA9CE756471F10183C4469508DB923451F9B73708C8D5B33CD3873BD0A736EC7BFA96CED6666B6F
25,193,738 UART: [art] PUB.Y = CAD74EA3409BB0778FF5D9D2A200A1D673FEB3893CA377D5780F11A09005E758C386DBBEFFD3C521CDC3429286028EC7
25,200,973 UART: [art] SIG.R = E020A5795C4BC96EAD493D445F4C585B169421BE2E607B85AB37F551AEA58DE4C3F07674F4F8D72F3F328B4E3035E245
25,208,366 UART: [art] SIG.S = B27BBA5C3A65F4A5BDBA93396E9217BEF22138AD8F775D9BF69CEA8E309ACB6306769FF80869FFA0CCFD0DC688DB512E
26,186,788 UART: Caliptra RT
26,187,521 UART: [state] CFI Enabled
26,305,242 UART: [rt] RT listening for mailbox commands...
26,336,819 UART: [rt]cmd =0x50435252, len=8
26,338,823 >>> mbox cmd response data (8 bytes)
26,340,010 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,370,092 UART: [rt]cmd =0x50435251, len=36
27,277,733 >>> mbox cmd response data (1848 bytes)
27,287,997 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,317,831 UART: [rt]cmd =0x43455246, len=4
27,330,578 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,786 UART: [kat] HMAC-384Kdf
907,406 UART: [kat] LMS
1,475,602 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,476,943 UART: [fht] Storing FHT @ 0x50003400
1,479,524 UART: [idev] ++
1,479,692 UART: [idev] CDI.KEYID = 6
1,480,052 UART: [idev] SUBJECT.KEYID = 7
1,480,476 UART: [idev] UDS.KEYID = 0
1,480,821 ready_for_fw is high
1,480,821 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,418 UART: [idev] Erasing UDS.KEYID = 0
1,504,804 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,434 UART: [idev] --
1,514,353 UART: [ldev] ++
1,514,521 UART: [ldev] CDI.KEYID = 6
1,514,884 UART: [ldev] SUBJECT.KEYID = 5
1,515,310 UART: [ldev] AUTHORITY.KEYID = 7
1,515,773 UART: [ldev] FE.KEYID = 1
1,520,887 UART: [ldev] Erasing FE.KEYID = 1
1,546,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,034 UART: [ldev] --
1,585,543 UART: [fwproc] Waiting for Commands...
1,586,326 UART: [fwproc] Received command 0x46574c44
1,587,117 UART: [fwproc] Received Image of size 114168 bytes
2,883,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,573 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,925 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,666 >>> mbox cmd response: success
3,075,666 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,076,778 UART: [afmc] ++
3,076,946 UART: [afmc] CDI.KEYID = 6
3,077,308 UART: [afmc] SUBJECT.KEYID = 7
3,077,733 UART: [afmc] AUTHORITY.KEYID = 5
3,113,082 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,392 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,172 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,900 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,785 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,475 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,472 UART: [afmc] --
3,156,438 UART: [cold-reset] --
3,157,532 UART: [state] Locking Datavault
3,158,787 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,391 UART: [state] Locking ICCM
3,159,981 UART: [exit] Launching FMC @ 0x40000130
3,165,310 UART:
3,165,326 UART: Running Caliptra FMC ...
3,165,734 UART:
3,165,788 UART: [state] CFI Enabled
3,176,649 UART: [fht] FMC Alias Private Key: 7
3,284,476 UART: [art] Extend RT PCRs Done
3,284,904 UART: [art] Lock RT PCRs Done
3,286,466 UART: [art] Populate DV Done
3,294,727 UART: [fht] FMC Alias Private Key: 7
3,295,715 UART: [art] Derive CDI
3,295,995 UART: [art] Store in in slot 0x4
3,381,112 UART: [art] Derive Key Pair
3,381,472 UART: [art] Store priv key in slot 0x5
3,395,110 UART: [art] Derive Key Pair - Done
3,410,017 UART: [art] Signing Cert with AUTHO
3,410,497 UART: RITY.KEYID = 7
3,426,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,776 UART: [art] PUB.X = 7757F1A74B9C220361B06C2D9687C7473262C981C3580D09AA4C431822DE8E8AE60A484C8809F8634C6BEC38B03DB854
3,433,527 UART: [art] PUB.Y = FCECF1F5BD58B8042BB01221409543E6C4682B3CE30ADF6C225F12E49FB23500F87B3CF8C27EA9A68A9FB6D0DE6725DD
3,440,467 UART: [art] SIG.R = C07E644141CA2C2B7389AB4CD6AF7235C20F5AB1769B48E37F7AA84F838A3CBA97C16C7FBD1EA8B200378AF5CAA3CFC8
3,447,234 UART: [art] SIG.S = AC98856AE23EB62CB4C797472286E09B3E14857E7B91F05AB538C0F2FD5ED671CA9799A209E08E4D27AEC4E29A8E64C0
3,470,764 UART: Caliptra RT
3,471,017 UART: [state] CFI Enabled
3,578,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,587 UART: [rt]cmd =0x50435252, len=8
3,611,291 >>> mbox cmd response data (8 bytes)
3,611,292 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,829 UART: [rt]cmd =0x50435251, len=36
3,808,578 >>> mbox cmd response data (1848 bytes)
3,808,579 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,046 UART: [rt]cmd =0x43455246, len=4
3,850,319 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,287 ready_for_fw is high
1,362,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,298 >>> mbox cmd response: success
2,924,298 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,985,654 UART:
2,985,670 UART: Running Caliptra FMC ...
2,986,078 UART:
2,986,132 UART: [state] CFI Enabled
2,996,931 UART: [fht] FMC Alias Private Key: 7
3,104,622 UART: [art] Extend RT PCRs Done
3,105,050 UART: [art] Lock RT PCRs Done
3,106,720 UART: [art] Populate DV Done
3,114,899 UART: [fht] FMC Alias Private Key: 7
3,116,019 UART: [art] Derive CDI
3,116,299 UART: [art] Store in in slot 0x4
3,201,840 UART: [art] Derive Key Pair
3,202,200 UART: [art] Store priv key in slot 0x5
3,215,020 UART: [art] Derive Key Pair - Done
3,229,815 UART: [art] Signing Cert with AUTHO
3,230,295 UART: RITY.KEYID = 7
3,245,177 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,942 UART: [art] PUB.X = 5E74991A51A98DEA08805DB6D5A8C51DE5BB61D4A4950489A693AC2FDBB2CE5F7DA59C58365EA2A371736554A9C2929A
3,252,716 UART: [art] PUB.Y = 51B6D53D30BF8B1E03E84204B323168A70C437C133AF59439D099A9D17FAE7E3D87ED75F66A3B617EAA984AA219DCC07
3,259,662 UART: [art] SIG.R = A4648F757E45B2A940880BC3D5D507F82F9515F1B8B110DEE372BDD7BE59A65B4F3AEDE5050F4088B8C2052A4F270639
3,266,420 UART: [art] SIG.S = 90F883C5884FBCF789E6F28AA407974ED6BC499EB7618DE480B04B5FD6FBC1F13EE9A66A344898259D751567248459DA
3,290,260 UART: Caliptra RT
3,290,513 UART: [state] CFI Enabled
3,398,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,985 UART: [rt]cmd =0x50435252, len=8
3,430,777 >>> mbox cmd response data (8 bytes)
3,430,778 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,443 UART: [rt]cmd =0x50435251, len=36
3,627,716 >>> mbox cmd response data (1848 bytes)
3,627,717 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,657,094 UART: [rt]cmd =0x43455246, len=4
3,669,375 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,512 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,795 UART: [idev] ++
1,479,963 UART: [idev] CDI.KEYID = 6
1,480,323 UART: [idev] SUBJECT.KEYID = 7
1,480,747 UART: [idev] UDS.KEYID = 0
1,481,092 ready_for_fw is high
1,481,092 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,131 UART: [idev] Erasing UDS.KEYID = 0
1,505,835 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,555 UART: [idev] --
1,515,566 UART: [ldev] ++
1,515,734 UART: [ldev] CDI.KEYID = 6
1,516,097 UART: [ldev] SUBJECT.KEYID = 5
1,516,523 UART: [ldev] AUTHORITY.KEYID = 7
1,516,986 UART: [ldev] FE.KEYID = 1
1,522,540 UART: [ldev] Erasing FE.KEYID = 1
1,547,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,167 UART: [ldev] --
1,586,646 UART: [fwproc] Waiting for Commands...
1,587,499 UART: [fwproc] Received command 0x46574c44
1,588,290 UART: [fwproc] Received Image of size 114168 bytes
2,884,512 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,018 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,985 >>> mbox cmd response: success
3,076,985 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,078,133 UART: [afmc] ++
3,078,301 UART: [afmc] CDI.KEYID = 6
3,078,663 UART: [afmc] SUBJECT.KEYID = 7
3,079,088 UART: [afmc] AUTHORITY.KEYID = 5
3,114,299 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,553 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,333 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,061 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,946 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,636 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,461 UART: [afmc] --
3,157,589 UART: [cold-reset] --
3,158,347 UART: [state] Locking Datavault
3,159,554 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,158 UART: [state] Locking ICCM
3,160,790 UART: [exit] Launching FMC @ 0x40000130
3,166,119 UART:
3,166,135 UART: Running Caliptra FMC ...
3,166,543 UART:
3,166,686 UART: [state] CFI Enabled
3,177,217 UART: [fht] FMC Alias Private Key: 7
3,285,020 UART: [art] Extend RT PCRs Done
3,285,448 UART: [art] Lock RT PCRs Done
3,287,384 UART: [art] Populate DV Done
3,295,705 UART: [fht] FMC Alias Private Key: 7
3,296,811 UART: [art] Derive CDI
3,297,091 UART: [art] Store in in slot 0x4
3,382,982 UART: [art] Derive Key Pair
3,383,342 UART: [art] Store priv key in slot 0x5
3,396,494 UART: [art] Derive Key Pair - Done
3,411,046 UART: [art] Signing Cert with AUTHO
3,411,526 UART: RITY.KEYID = 7
3,426,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,663 UART: [art] PUB.X = DB0AC96032FB41E892F70C8A3B84A373DD35951166CC498AAEAEAD2E67C4F7D98CCB63A31A96E9BEEF881EA569BFA4FE
3,434,453 UART: [art] PUB.Y = 3FDDDD70E562E82F99CE3D013FE2F4BB6CDFA1EB761B77242D0A9AA1EF9A3F2BBE6A42FC233B2B9EB315103872F14529
3,441,419 UART: [art] SIG.R = A9B3882B73DB4B813526FDB249CE8D5DF8D959F6BC71D793595DB755F35A6ED5521F6DD3932FD2164053246743D251A1
3,448,191 UART: [art] SIG.S = FEEC23D60BFD2AFD83D68A14A0D6DB14030DCCBF5A67E86C39981ABAA247221DEDAB3DF6258B8277887B691D8A43D56A
3,472,351 UART: Caliptra RT
3,472,696 UART: [state] CFI Enabled
3,581,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,292 UART: [rt]cmd =0x50435252, len=8
3,612,792 >>> mbox cmd response data (8 bytes)
3,612,793 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,240 UART: [rt]cmd =0x50435251, len=36
3,809,593 >>> mbox cmd response data (1848 bytes)
3,809,594 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,838,983 UART: [rt]cmd =0x43455246, len=4
3,851,432 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,864 ready_for_fw is high
1,362,864 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,071 >>> mbox cmd response: success
2,925,071 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,987,235 UART:
2,987,251 UART: Running Caliptra FMC ...
2,987,659 UART:
2,987,802 UART: [state] CFI Enabled
2,998,395 UART: [fht] FMC Alias Private Key: 7
3,107,270 UART: [art] Extend RT PCRs Done
3,107,698 UART: [art] Lock RT PCRs Done
3,108,936 UART: [art] Populate DV Done
3,117,221 UART: [fht] FMC Alias Private Key: 7
3,118,277 UART: [art] Derive CDI
3,118,557 UART: [art] Store in in slot 0x4
3,204,088 UART: [art] Derive Key Pair
3,204,448 UART: [art] Store priv key in slot 0x5
3,217,976 UART: [art] Derive Key Pair - Done
3,232,878 UART: [art] Signing Cert with AUTHO
3,233,358 UART: RITY.KEYID = 7
3,248,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,467 UART: [art] PUB.X = A31AD82B77A25301916F658E2CD122FADAFAD71D3B7D0B835797A1FD61FD967A94C8D8B999C1E0A8887F1615FD649E8A
3,256,243 UART: [art] PUB.Y = 3308AA5B44BAEFD23376877851C9813E3B53922BEC5224B253AB80C209351D5030D1D066B7D541C7C9F6F271BF659038
3,263,183 UART: [art] SIG.R = 267944157FEFDDB7D19564C48AC04D0361AF2233EE3AC04789D6FED77404B375B135CB46E011E247A977F1317C203C4B
3,269,949 UART: [art] SIG.S = A46A9D325CAB129A0B2B01EDCA3512AE7C5E8A964C0BD7F5B4678AFB1E89FBB28B2146819F534120F4BF29229EC30925
3,293,964 UART: Caliptra RT
3,294,309 UART: [state] CFI Enabled
3,402,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,362 UART: [rt]cmd =0x50435252, len=8
3,434,862 >>> mbox cmd response data (8 bytes)
3,434,863 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,444 UART: [rt]cmd =0x50435251, len=36
3,631,737 >>> mbox cmd response data (1848 bytes)
3,631,738 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,661,285 UART: [rt]cmd =0x43455246, len=4
3,673,852 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
893,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,553 UART: [kat] ++
897,705 UART: [kat] sha1
902,145 UART: [kat] SHA2-256
904,085 UART: [kat] SHA2-384
906,874 UART: [kat] SHA2-512-ACC
908,775 UART: [kat] ECC-384
918,204 UART: [kat] HMAC-384Kdf
922,850 UART: [kat] LMS
1,171,178 UART: [kat] --
1,172,001 UART: [cold-reset] ++
1,172,559 UART: [fht] FHT @ 0x50003400
1,175,364 UART: [idev] ++
1,175,532 UART: [idev] CDI.KEYID = 6
1,175,892 UART: [idev] SUBJECT.KEYID = 7
1,176,316 UART: [idev] UDS.KEYID = 0
1,176,661 ready_for_fw is high
1,176,661 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,186 UART: [idev] Erasing UDS.KEYID = 0
1,201,397 UART: [idev] Sha1 KeyId Algorithm
1,210,005 UART: [idev] --
1,210,961 UART: [ldev] ++
1,211,129 UART: [ldev] CDI.KEYID = 6
1,211,492 UART: [ldev] SUBJECT.KEYID = 5
1,211,918 UART: [ldev] AUTHORITY.KEYID = 7
1,212,381 UART: [ldev] FE.KEYID = 1
1,217,413 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,741 UART: [ldev] --
1,283,218 UART: [fwproc] Wait for Commands...
1,283,850 UART: [fwproc] Recv command 0x46574c44
1,284,578 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,546 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,149 >>> mbox cmd response: success
2,773,149 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,774,291 UART: [afmc] ++
2,774,459 UART: [afmc] CDI.KEYID = 6
2,774,821 UART: [afmc] SUBJECT.KEYID = 7
2,775,246 UART: [afmc] AUTHORITY.KEYID = 5
2,810,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,126 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,854 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,739 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,458 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,324 UART: [afmc] --
2,854,382 UART: [cold-reset] --
2,855,280 UART: [state] Locking Datavault
2,856,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,903 UART: [state] Locking ICCM
2,857,427 UART: [exit] Launching FMC @ 0x40000130
2,862,756 UART:
2,862,772 UART: Running Caliptra FMC ...
2,863,180 UART:
2,863,234 UART: [state] CFI Enabled
2,873,865 UART: [fht] FMC Alias Private Key: 7
2,981,738 UART: [art] Extend RT PCRs Done
2,982,166 UART: [art] Lock RT PCRs Done
2,983,670 UART: [art] Populate DV Done
2,992,071 UART: [fht] FMC Alias Private Key: 7
2,993,187 UART: [art] Derive CDI
2,993,467 UART: [art] Store in in slot 0x4
3,079,338 UART: [art] Derive Key Pair
3,079,698 UART: [art] Store priv key in slot 0x5
3,092,786 UART: [art] Derive Key Pair - Done
3,107,856 UART: [art] Signing Cert with AUTHO
3,108,336 UART: RITY.KEYID = 7
3,123,650 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,415 UART: [art] PUB.X = D0E054D50753ABBA21CB7FA0049DC41F640816090D82B814CAE62A19A4E663FB6B03615A5F41740B7ED7DEE38BA8AB4F
3,131,178 UART: [art] PUB.Y = 94398521A438E6280E02189164EE72B5C8ED1502BCBF8975866132572A5B77237DD9ECBA6926C84F9872F0DA66C76C9A
3,138,115 UART: [art] SIG.R = 7B1F0D3722B9FF540916520ACC1891AD9AA8A3D7D668F40770E973A8E024DD66A800DA7B6E9095C0883BC05CCBAF8377
3,144,859 UART: [art] SIG.S = ABB3D3AF386232A60470619DBDC2A96A01DBB46D1FB1B5870656C89660BC3D14241D0880AAF33D1D5DDA815BB5C2033E
3,168,585 UART: Caliptra RT
3,168,838 UART: [state] CFI Enabled
3,276,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,231 UART: [rt]cmd =0x50435252, len=8
3,308,993 >>> mbox cmd response data (8 bytes)
3,308,994 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,573 UART: [rt]cmd =0x50435251, len=36
3,505,894 >>> mbox cmd response data (1848 bytes)
3,505,895 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,535,168 UART: [rt]cmd =0x43455246, len=4
3,547,183 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,541 ready_for_fw is high
1,059,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,044 >>> mbox cmd response: success
2,624,044 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,685,480 UART:
2,685,496 UART: Running Caliptra FMC ...
2,685,904 UART:
2,685,958 UART: [state] CFI Enabled
2,696,121 UART: [fht] FMC Alias Private Key: 7
2,803,424 UART: [art] Extend RT PCRs Done
2,803,852 UART: [art] Lock RT PCRs Done
2,805,322 UART: [art] Populate DV Done
2,813,593 UART: [fht] FMC Alias Private Key: 7
2,814,595 UART: [art] Derive CDI
2,814,875 UART: [art] Store in in slot 0x4
2,900,984 UART: [art] Derive Key Pair
2,901,344 UART: [art] Store priv key in slot 0x5
2,914,364 UART: [art] Derive Key Pair - Done
2,929,082 UART: [art] Signing Cert with AUTHO
2,929,562 UART: RITY.KEYID = 7
2,944,996 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,761 UART: [art] PUB.X = 41DDAC5145C12A3AB50A547F03CB50006FCE064CF89E7D4B27CC7FE42C6F91F9E7F4C7010625BC962ED9460071F2FAC3
2,952,486 UART: [art] PUB.Y = 8120F95A148560703C7E8CC064C8BE24B2ECBFF3706456D5534FBF038D5400BF0B68A9720E4B98BA5FA42087EAEFCF07
2,959,412 UART: [art] SIG.R = 32B80B3C8D43EF60528D95CE672DA2A8097AED3269F796C76F9D837145873EA7342A9349EDC2C8D9FAAA715C4E6A438E
2,966,184 UART: [art] SIG.S = 5A7B90947B0849490BEBF6DBD353B8EE3384635B606D2FAE0D7E7F91BCA6AA64365054F27E2479A3CFA86A1A4A7E44D4
2,989,814 UART: Caliptra RT
2,990,067 UART: [state] CFI Enabled
3,097,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,336 UART: [rt]cmd =0x50435252, len=8
3,130,040 >>> mbox cmd response data (8 bytes)
3,130,041 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,402 UART: [rt]cmd =0x50435251, len=36
3,326,559 >>> mbox cmd response data (1848 bytes)
3,326,560 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,356,015 UART: [rt]cmd =0x43455246, len=4
3,368,192 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
893,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,578 UART: [kat] ++
897,730 UART: [kat] sha1
902,038 UART: [kat] SHA2-256
903,978 UART: [kat] SHA2-384
906,847 UART: [kat] SHA2-512-ACC
908,748 UART: [kat] ECC-384
918,901 UART: [kat] HMAC-384Kdf
923,431 UART: [kat] LMS
1,171,759 UART: [kat] --
1,172,276 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,273 UART: [idev] ++
1,175,441 UART: [idev] CDI.KEYID = 6
1,175,801 UART: [idev] SUBJECT.KEYID = 7
1,176,225 UART: [idev] UDS.KEYID = 0
1,176,570 ready_for_fw is high
1,176,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,493 UART: [idev] Erasing UDS.KEYID = 0
1,201,390 UART: [idev] Sha1 KeyId Algorithm
1,209,996 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,830 UART: [ldev] Erasing FE.KEYID = 1
1,244,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,872 UART: [ldev] --
1,283,341 UART: [fwproc] Wait for Commands...
1,284,019 UART: [fwproc] Recv command 0x46574c44
1,284,747 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,949 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,930 >>> mbox cmd response: success
2,772,930 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,774,096 UART: [afmc] ++
2,774,264 UART: [afmc] CDI.KEYID = 6
2,774,626 UART: [afmc] SUBJECT.KEYID = 7
2,775,051 UART: [afmc] AUTHORITY.KEYID = 5
2,810,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,649 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,377 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,771 UART: [afmc] --
2,853,719 UART: [cold-reset] --
2,854,585 UART: [state] Locking Datavault
2,855,920 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,524 UART: [state] Locking ICCM
2,857,164 UART: [exit] Launching FMC @ 0x40000130
2,862,493 UART:
2,862,509 UART: Running Caliptra FMC ...
2,862,917 UART:
2,863,060 UART: [state] CFI Enabled
2,873,757 UART: [fht] FMC Alias Private Key: 7
2,982,020 UART: [art] Extend RT PCRs Done
2,982,448 UART: [art] Lock RT PCRs Done
2,983,908 UART: [art] Populate DV Done
2,992,277 UART: [fht] FMC Alias Private Key: 7
2,993,363 UART: [art] Derive CDI
2,993,643 UART: [art] Store in in slot 0x4
3,079,828 UART: [art] Derive Key Pair
3,080,188 UART: [art] Store priv key in slot 0x5
3,093,664 UART: [art] Derive Key Pair - Done
3,108,677 UART: [art] Signing Cert with AUTHO
3,109,157 UART: RITY.KEYID = 7
3,124,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,900 UART: [art] PUB.X = ED5C33AC2BEEA10935418974A29C317A2E4A01810EDC7ACEFE296558E88C267C1F5D268182F1DFC40C10D2D5BC40EF68
3,131,672 UART: [art] PUB.Y = D63FE3AEAB7B2F906BD4128E9CA58BE7F188A76E6D2B96A6DED19882F55341267F7E51D2967DA706DE8F85ADC5BA2822
3,138,635 UART: [art] SIG.R = 31105D0D5D0E863DA8BA48B4DA5F8EAFD87DA69244678225EA9E65E981BCEEFF331F2F784043F1F3D8B7C54C8EE4A4B5
3,145,417 UART: [art] SIG.S = 2E4AD09DEF1A15CE3D0E3E931B4966426D15D0239D9C34B8A2512A7115BA710F9F8BC498867138DD723BCFEC95219359
3,169,106 UART: Caliptra RT
3,169,451 UART: [state] CFI Enabled
3,278,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,474 UART: [rt]cmd =0x50435252, len=8
3,310,160 >>> mbox cmd response data (8 bytes)
3,310,161 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,700 UART: [rt]cmd =0x50435251, len=36
3,507,445 >>> mbox cmd response data (1848 bytes)
3,507,446 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,537,083 UART: [rt]cmd =0x43455246, len=4
3,549,206 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,966 ready_for_fw is high
1,060,966 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,777 >>> mbox cmd response: success
2,624,777 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,686,273 UART:
2,686,289 UART: Running Caliptra FMC ...
2,686,697 UART:
2,686,840 UART: [state] CFI Enabled
2,697,323 UART: [fht] FMC Alias Private Key: 7
2,805,944 UART: [art] Extend RT PCRs Done
2,806,372 UART: [art] Lock RT PCRs Done
2,808,002 UART: [art] Populate DV Done
2,816,289 UART: [fht] FMC Alias Private Key: 7
2,817,415 UART: [art] Derive CDI
2,817,695 UART: [art] Store in in slot 0x4
2,903,328 UART: [art] Derive Key Pair
2,903,688 UART: [art] Store priv key in slot 0x5
2,917,222 UART: [art] Derive Key Pair - Done
2,932,026 UART: [art] Signing Cert with AUTHO
2,932,506 UART: RITY.KEYID = 7
2,947,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,535 UART: [art] PUB.X = 9911545D87D426490ECE187B6FC607CBCC3661088B62DF883175F54925B735137BCDDB42788D9CA7F2A8F5EE1445DA6E
2,955,300 UART: [art] PUB.Y = C9D6DF4D34D1B6F81897FEF18CBA7FD15D0299E72DA39C782C6A6E71C84B483B134D3A3AF964D8D89EEB2B4D8B23056A
2,962,262 UART: [art] SIG.R = A1B799F91977E2EDF42BE9E200F6FFEEFD2F999EF00B64F52665B989A118D9716036998DF8DDBB1D66DEF9680DEEBD8B
2,969,024 UART: [art] SIG.S = 2FD271B6028D243D4A495AF2E17FF4D62ED5D0FE758151F7506229298C2E7BA1CC6DACB7DD868EFA90D9A17CD36D5555
2,992,610 UART: Caliptra RT
2,992,955 UART: [state] CFI Enabled
3,100,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,272 UART: [rt]cmd =0x50435252, len=8
3,132,950 >>> mbox cmd response data (8 bytes)
3,132,951 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,644 UART: [rt]cmd =0x50435251, len=36
3,330,293 >>> mbox cmd response data (1848 bytes)
3,330,294 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,359,719 UART: [rt]cmd =0x43455246, len=4
3,371,756 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,508 UART: [state] LifecycleState = Unprovisioned
85,163 UART: [state] DebugLocked = No
85,753 UART: [state] WD Timer not started. Device not locked for debugging
86,986 UART: [kat] SHA2-256
890,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,665 UART: [kat] ++
894,817 UART: [kat] sha1
899,095 UART: [kat] SHA2-256
901,035 UART: [kat] SHA2-384
903,794 UART: [kat] SHA2-512-ACC
905,695 UART: [kat] ECC-384
915,488 UART: [kat] HMAC-384Kdf
920,034 UART: [kat] LMS
1,168,346 UART: [kat] --
1,169,255 UART: [cold-reset] ++
1,169,817 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 ready_for_fw is high
1,173,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,531 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,535 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,215,018 UART: [ldev] Erasing FE.KEYID = 1
1,240,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,248 UART: [ldev] --
1,279,684 UART: [fwproc] Wait for Commands...
1,280,317 UART: [fwproc] Recv command 0x46574c44
1,281,050 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,129 >>> mbox cmd response: success
2,768,129 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,769,308 UART: [afmc] ++
2,769,476 UART: [afmc] CDI.KEYID = 6
2,769,839 UART: [afmc] SUBJECT.KEYID = 7
2,770,265 UART: [afmc] AUTHORITY.KEYID = 5
2,805,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,777 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,506 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,108 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,901 UART: [afmc] --
2,849,031 UART: [cold-reset] --
2,849,827 UART: [state] Locking Datavault
2,851,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,660 UART: [state] Locking ICCM
2,852,278 UART: [exit] Launching FMC @ 0x40000130
2,857,607 UART:
2,857,623 UART: Running Caliptra FMC ...
2,858,031 UART:
2,858,085 UART: [state] CFI Enabled
2,868,846 UART: [fht] FMC Alias Private Key: 7
2,976,749 UART: [art] Extend RT PCRs Done
2,977,177 UART: [art] Lock RT PCRs Done
2,978,857 UART: [art] Populate DV Done
2,986,808 UART: [fht] FMC Alias Private Key: 7
2,987,760 UART: [art] Derive CDI
2,988,040 UART: [art] Store in in slot 0x4
3,073,601 UART: [art] Derive Key Pair
3,073,961 UART: [art] Store priv key in slot 0x5
3,087,371 UART: [art] Derive Key Pair - Done
3,102,089 UART: [art] Signing Cert with AUTHO
3,102,569 UART: RITY.KEYID = 7
3,117,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,506 UART: [art] PUB.X = 4798C9D27701CD568C8EE4F7C61543DCE15E232D1DB2EDEE7485FC73768793DB9B0FE19E4E781348EBE4BC416130D65D
3,125,280 UART: [art] PUB.Y = 7A4EBBA5B0FAE0A6D9449E4F51D587045DACFA8B694D896A044562D5D4B400FAC4A1E36819662ACB0C11590802DF1BAB
3,132,209 UART: [art] SIG.R = 54C347ABC6A86594760FF111C71943DE63880EFB693D7599589A34FD743ACA215D6AA2F538974A492F596EA54E1E2642
3,138,971 UART: [art] SIG.S = D8EA043F268626226087AB94146976A33EFBBA205D93FFE089C08ABDDD9CC9B68803920218B2FB33023795DFA857B8F1
3,163,286 UART: Caliptra RT
3,163,539 UART: [state] CFI Enabled
3,271,666 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,244 UART: [rt]cmd =0x50435252, len=8
3,303,850 >>> mbox cmd response data (8 bytes)
3,303,851 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,484 UART: [rt]cmd =0x50435251, len=36
3,501,003 >>> mbox cmd response data (1848 bytes)
3,501,004 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,267 UART: [rt]cmd =0x43455246, len=4
3,542,306 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,532 ready_for_fw is high
1,055,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,065 >>> mbox cmd response: success
2,620,065 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,682,269 UART:
2,682,285 UART: Running Caliptra FMC ...
2,682,693 UART:
2,682,747 UART: [state] CFI Enabled
2,693,214 UART: [fht] FMC Alias Private Key: 7
2,801,365 UART: [art] Extend RT PCRs Done
2,801,793 UART: [art] Lock RT PCRs Done
2,803,235 UART: [art] Populate DV Done
2,811,312 UART: [fht] FMC Alias Private Key: 7
2,812,328 UART: [art] Derive CDI
2,812,608 UART: [art] Store in in slot 0x4
2,898,047 UART: [art] Derive Key Pair
2,898,407 UART: [art] Store priv key in slot 0x5
2,911,595 UART: [art] Derive Key Pair - Done
2,926,285 UART: [art] Signing Cert with AUTHO
2,926,765 UART: RITY.KEYID = 7
2,942,209 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,974 UART: [art] PUB.X = 0FF9E41D681768DE88509270DAEB588B9766B10641B1C979EE12D7B35134E4F3E65469B54DB2C94188475C59CBD9D93E
2,949,738 UART: [art] PUB.Y = A48ABE97667AA3AEFB32DD98AE932B5A455372FBA3C961C9F7175F89F0E717E65771B4DF15E9B21D11E10DAC372B57D2
2,956,699 UART: [art] SIG.R = 126B0E63C7D58507CF86E39661F35B50B09B15D5383078E2B25D71A3A70DEA9360DAA6EDB816A1E0C27E81B02B4D8523
2,963,464 UART: [art] SIG.S = 8FD47461B8F246B883E1B78A5238660BA3E8E0D5222E6FD43C90FDF9CEC50E6BD11ED15AB6516B1270ACC08C09F46BBD
2,987,492 UART: Caliptra RT
2,987,745 UART: [state] CFI Enabled
3,094,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,608 UART: [rt]cmd =0x50435252, len=8
3,127,252 >>> mbox cmd response data (8 bytes)
3,127,253 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,808 UART: [rt]cmd =0x50435251, len=36
3,324,047 >>> mbox cmd response data (1848 bytes)
3,324,048 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,353,055 UART: [rt]cmd =0x43455246, len=4
3,364,886 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,165 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,184 UART: [cold-reset] ++
1,170,616 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,174,498 ready_for_fw is high
1,174,498 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,199,018 UART: [idev] Sha1 KeyId Algorithm
1,207,770 UART: [idev] --
1,209,025 UART: [ldev] ++
1,209,193 UART: [ldev] CDI.KEYID = 6
1,209,557 UART: [ldev] SUBJECT.KEYID = 5
1,209,984 UART: [ldev] AUTHORITY.KEYID = 7
1,210,447 UART: [ldev] FE.KEYID = 1
1,215,533 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,781 UART: [fwproc] Wait for Commands...
1,282,398 UART: [fwproc] Recv command 0x46574c44
1,283,131 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,292 >>> mbox cmd response: success
2,771,292 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,772,325 UART: [afmc] ++
2,772,493 UART: [afmc] CDI.KEYID = 6
2,772,856 UART: [afmc] SUBJECT.KEYID = 7
2,773,282 UART: [afmc] AUTHORITY.KEYID = 5
2,809,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,934 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,546 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,160 UART: [afmc] --
2,852,262 UART: [cold-reset] --
2,853,294 UART: [state] Locking Datavault
2,854,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,051 UART: [state] Locking ICCM
2,855,531 UART: [exit] Launching FMC @ 0x40000130
2,860,860 UART:
2,860,876 UART: Running Caliptra FMC ...
2,861,284 UART:
2,861,427 UART: [state] CFI Enabled
2,871,740 UART: [fht] FMC Alias Private Key: 7
2,979,165 UART: [art] Extend RT PCRs Done
2,979,593 UART: [art] Lock RT PCRs Done
2,981,433 UART: [art] Populate DV Done
2,989,636 UART: [fht] FMC Alias Private Key: 7
2,990,818 UART: [art] Derive CDI
2,991,098 UART: [art] Store in in slot 0x4
3,076,751 UART: [art] Derive Key Pair
3,077,111 UART: [art] Store priv key in slot 0x5
3,090,091 UART: [art] Derive Key Pair - Done
3,105,290 UART: [art] Signing Cert with AUTHO
3,105,770 UART: RITY.KEYID = 7
3,121,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,955 UART: [art] PUB.X = 3C24258C0851D60A25BEA46B07126E6E1F420FF9C0B8BC35680A1847FEE9AAEAB99748F77E2591F9D248FFAFF79698C6
3,128,720 UART: [art] PUB.Y = 2053B738DDE824DC3850745BED1CE5ED11B960099292C6DDF37110E6368C081C52AABBB3711E3DEB3E13AD6B9BA332E0
3,135,676 UART: [art] SIG.R = 9D3ECBBF95029AF904E25EC0D6ACAE6CC028D242F0A746D66FB510A946F91B8D60A973373C9B2617EE06A378898550A9
3,142,445 UART: [art] SIG.S = 4DC9DEE4FDFC47B837E0D7253802F250E1FDE2B6AEB5E9C245B941EE7904D2CB26452CC596BA78DD030AC51BD99A5588
3,166,482 UART: Caliptra RT
3,166,827 UART: [state] CFI Enabled
3,274,030 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,564 UART: [rt]cmd =0x50435252, len=8
3,306,326 >>> mbox cmd response data (8 bytes)
3,306,327 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,754 UART: [rt]cmd =0x50435251, len=36
3,503,417 >>> mbox cmd response data (1848 bytes)
3,503,418 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,532,721 UART: [rt]cmd =0x43455246, len=4
3,544,690 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,493 ready_for_fw is high
1,055,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,998 >>> mbox cmd response: success
2,619,998 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,683,068 UART:
2,683,084 UART: Running Caliptra FMC ...
2,683,492 UART:
2,683,635 UART: [state] CFI Enabled
2,694,126 UART: [fht] FMC Alias Private Key: 7
2,802,683 UART: [art] Extend RT PCRs Done
2,803,111 UART: [art] Lock RT PCRs Done
2,804,755 UART: [art] Populate DV Done
2,812,982 UART: [fht] FMC Alias Private Key: 7
2,814,112 UART: [art] Derive CDI
2,814,392 UART: [art] Store in in slot 0x4
2,899,939 UART: [art] Derive Key Pair
2,900,299 UART: [art] Store priv key in slot 0x5
2,913,765 UART: [art] Derive Key Pair - Done
2,928,733 UART: [art] Signing Cert with AUTHO
2,929,213 UART: RITY.KEYID = 7
2,944,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,778 UART: [art] PUB.X = 69E41B6423E4FFD139ABB63EFCD7053851833A7F3392545E933C8252A07698D213E43D347489DF403B5DA0BEF8E68B64
2,951,545 UART: [art] PUB.Y = F034592FD20123CF180FDB2299298D61EEA7D88CEA5AF7C1A85341BE679D683E0A44CD23A5C86B4EB1FDF5F983FFA4E1
2,958,504 UART: [art] SIG.R = 18F628E26CB666B5A1F7D71D708F6AF204DB6FCB114BC89AC5E4FEFD70AEAC0950C526C4909FC381600A662F9332D328
2,965,277 UART: [art] SIG.S = C2EEA20431D020F1041A0A28EF6725665580F0217C0792B0396F5EBC0BB32BED9887BFEDCC3A5F1ED7CDA020FAF1D905
2,989,158 UART: Caliptra RT
2,989,503 UART: [state] CFI Enabled
3,097,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,796 UART: [rt]cmd =0x50435252, len=8
3,129,256 >>> mbox cmd response data (8 bytes)
3,129,257 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,758 UART: [rt]cmd =0x50435251, len=36
3,325,999 >>> mbox cmd response data (1848 bytes)
3,326,000 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,355,433 UART: [rt]cmd =0x43455246, len=4
3,367,432 >>> mbox cmd response data (887 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,122 UART:
192,493 UART: Running Caliptra ROM ...
193,582 UART:
193,722 UART: [state] CFI Enabled
264,790 UART: [state] LifecycleState = Unprovisioned
266,893 UART: [state] DebugLocked = No
269,493 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,083 UART: [kat] SHA2-256
444,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,284 UART: [kat] ++
455,770 UART: [kat] sha1
465,573 UART: [kat] SHA2-256
468,224 UART: [kat] SHA2-384
472,857 UART: [kat] SHA2-512-ACC
475,219 UART: [kat] ECC-384
2,769,981 UART: [kat] HMAC-384Kdf
2,781,829 UART: [kat] LMS
3,972,148 UART: [kat] --
3,975,504 UART: [cold-reset] ++
3,977,859 UART: [fht] Storing FHT @ 0x50003400
3,990,465 UART: [idev] ++
3,991,048 UART: [idev] CDI.KEYID = 6
3,992,006 UART: [idev] SUBJECT.KEYID = 7
3,993,251 UART: [idev] UDS.KEYID = 0
3,994,212 ready_for_fw is high
3,994,419 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,137,674 UART: [idev] Erasing UDS.KEYID = 0
7,325,893 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,544 UART: [idev] --
7,351,433 UART: [ldev] ++
7,352,047 UART: [ldev] CDI.KEYID = 6
7,353,165 UART: [ldev] SUBJECT.KEYID = 5
7,354,266 UART: [ldev] AUTHORITY.KEYID = 7
7,355,432 UART: [ldev] FE.KEYID = 1
7,383,216 UART: [ldev] Erasing FE.KEYID = 1
10,715,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,365 UART: [ldev] --
13,097,679 UART: [fwproc] Waiting for Commands...
13,099,390 UART: [fwproc] Received command 0x46574c44
13,101,566 UART: [fwproc] Received Image of size 113844 bytes
17,150,144 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,447 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,611,223 >>> mbox cmd response: success
17,615,136 UART: [afmc] ++
17,615,729 UART: [afmc] CDI.KEYID = 6
17,616,635 UART: [afmc] SUBJECT.KEYID = 7
17,618,093 UART: [afmc] AUTHORITY.KEYID = 5
20,988,871 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,289,686 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,291,950 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,306,429 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,321,248 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,335,697 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,357,668 UART: [afmc] --
23,360,658 UART: [cold-reset] --
23,363,376 UART: [state] Locking Datavault
23,368,354 UART: [state] Locking PCR0, PCR1 and PCR31
23,370,102 UART: [state] Locking ICCM
23,372,348 UART: [exit] Launching FMC @ 0x40000130
23,380,748 UART:
23,381,018 UART: Running Caliptra FMC ...
23,382,125 UART:
23,382,280 UART: [state] CFI Enabled
23,449,380 UART: [fht] FMC Alias Private Key: 7
25,787,268 UART: [art] Extend RT PCRs Done
25,788,493 UART: [art] Lock RT PCRs Done
25,790,250 UART: [art] Populate DV Done
25,795,496 UART: [fht] FMC Alias Private Key: 7
25,797,197 UART: [art] Derive CDI
25,798,003 UART: [art] Store in in slot 0x4
25,858,779 UART: [art] Derive Key Pair
25,859,812 UART: [art] Store priv key in slot 0x5
29,152,867 UART: [art] Derive Key Pair - Done
29,165,920 UART: [art] Signing Cert with AUTHO
29,167,216 UART: RITY.KEYID = 7
31,454,384 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,897 UART: [art] PUB.X = 2D1250292C56158038578FC9A973B2E88748128AFCEF3FE99AAC6463789059528CA5B1C5CF417822F7A2DBF49C7EDCE6
31,463,195 UART: [art] PUB.Y = 1F2369C98BD1AEEBE6C4147929F5576B89D562AACEBE66CFC7A7182DFA6A119C716C346A3A55A1F81BAEACBAAF3451D0
31,470,411 UART: [art] SIG.R = EFE92CE682EAC31CD41F53643505FB3BAA3E5F9CA3EB10DA5FA14B5AD3BE79220989D81DB35C44256CE238D185E87798
31,477,776 UART: [art] SIG.S = 46EA8914E9A284ECF526CB42B3AF6B14B84F7BDF0FAD3F60ADD284D982C35000E9783FC148255591F31E54A38944FDCE
32,782,469 UART: Caliptra RT
32,783,174 UART: [state] CFI Enabled
32,946,180 UART: [rt] RT listening for mailbox commands...
32,948,119 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,978,739 UART: [rt]cmd =0x44504543, len=28
33,021,780 >>> mbox cmd response data (2076 bytes)
33,031,821 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,061,856 UART: [rt]cmd =0x44504543, len=28
33,102,396 >>> mbox cmd response data (2076 bytes)
33,449,277 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,482,432 UART: [rt]cmd =0x49444550, len=353
33,496,251 >>> mbox cmd response data (8 bytes)
33,496,739 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,526,814 UART: [rt]cmd =0x44504543, len=28
33,569,349 >>> mbox cmd response data (2076 bytes)
33,579,424 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,609,446 UART: [rt]cmd =0x44504543, len=28
33,650,367 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,786,466 ready_for_fw is high
3,786,857 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,859,368 >>> mbox cmd response: success
23,556,651 UART:
23,557,048 UART: Running Caliptra FMC ...
23,558,203 UART:
23,558,364 UART: [state] CFI Enabled
23,627,368 UART: [fht] FMC Alias Private Key: 7
25,965,681 UART: [art] Extend RT PCRs Done
25,966,909 UART: [art] Lock RT PCRs Done
25,968,963 UART: [art] Populate DV Done
25,974,212 UART: [fht] FMC Alias Private Key: 7
25,975,745 UART: [art] Derive CDI
25,976,555 UART: [art] Store in in slot 0x4
26,035,926 UART: [art] Derive Key Pair
26,036,964 UART: [art] Store priv key in slot 0x5
29,329,423 UART: [art] Derive Key Pair - Done
29,342,057 UART: [art] Signing Cert with AUTHO
29,343,362 UART: RITY.KEYID = 7
31,631,718 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,226 UART: [art] PUB.X = 64208A2136CA9FA5FBEEB05B738321861CAFB4F5674B1A67A771BF963B3B652C748B36D531D4D99A5F8F2F8715C44A1C
31,640,469 UART: [art] PUB.Y = 8314AEA9984CA0688A2C7D878692171834A48832B8BA46AB3F522349D3EAF6FBB846DDD840686823871705F13733DE09
31,647,696 UART: [art] SIG.R = 31833B4BC32301FF904653F9C06E9D93E2E94C9AF88858778F7509B544121D1C6C3AC8EF42463703BBBB9D1B4225C451
31,655,053 UART: [art] SIG.S = 261D43E1B3EA000AA7A269196B3C25E90562DBA5C9A5CDF8BBED846AA5155E46397C7FD5E6D1E2A4DEBC1F540ECE3FB1
32,960,005 UART: Caliptra RT
32,960,709 UART: [state] CFI Enabled
33,134,956 UART: [rt] RT listening for mailbox commands...
33,136,902 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,167,565 UART: [rt]cmd =0x44504543, len=28
33,210,335 >>> mbox cmd response data (2076 bytes)
33,220,370 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,250,353 UART: [rt]cmd =0x44504543, len=28
33,291,054 >>> mbox cmd response data (2076 bytes)
33,638,686 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,672,007 UART: [rt]cmd =0x49444550, len=353
33,685,473 >>> mbox cmd response data (8 bytes)
33,685,940 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,715,733 UART: [rt]cmd =0x44504543, len=28
33,758,572 >>> mbox cmd response data (2076 bytes)
33,768,480 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,798,379 UART: [rt]cmd =0x44504543, len=28
33,838,807 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,516 UART:
192,876 UART: Running Caliptra ROM ...
194,075 UART:
603,501 UART: [state] CFI Enabled
619,655 UART: [state] LifecycleState = Unprovisioned
621,594 UART: [state] DebugLocked = No
623,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,684 UART: [kat] SHA2-256
798,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,986 UART: [kat] ++
809,517 UART: [kat] sha1
820,346 UART: [kat] SHA2-256
823,032 UART: [kat] SHA2-384
829,103 UART: [kat] SHA2-512-ACC
831,501 UART: [kat] ECC-384
3,113,752 UART: [kat] HMAC-384Kdf
3,127,196 UART: [kat] LMS
4,317,285 UART: [kat] --
4,322,920 UART: [cold-reset] ++
4,324,494 UART: [fht] Storing FHT @ 0x50003400
4,335,271 UART: [idev] ++
4,335,850 UART: [idev] CDI.KEYID = 6
4,337,040 UART: [idev] SUBJECT.KEYID = 7
4,338,168 UART: [idev] UDS.KEYID = 0
4,339,237 ready_for_fw is high
4,339,446 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,276 UART: [idev] Erasing UDS.KEYID = 0
7,626,818 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,411 UART: [idev] --
7,651,189 UART: [ldev] ++
7,651,834 UART: [ldev] CDI.KEYID = 6
7,652,724 UART: [ldev] SUBJECT.KEYID = 5
7,653,939 UART: [ldev] AUTHORITY.KEYID = 7
7,655,198 UART: [ldev] FE.KEYID = 1
7,667,531 UART: [ldev] Erasing FE.KEYID = 1
10,956,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,088 UART: [ldev] --
13,318,200 UART: [fwproc] Waiting for Commands...
13,320,135 UART: [fwproc] Received command 0x46574c44
13,322,320 UART: [fwproc] Received Image of size 113844 bytes
17,368,756 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,651 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,829,196 >>> mbox cmd response: success
17,834,222 UART: [afmc] ++
17,834,825 UART: [afmc] CDI.KEYID = 6
17,835,769 UART: [afmc] SUBJECT.KEYID = 7
17,836,984 UART: [afmc] AUTHORITY.KEYID = 5
21,148,571 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,485 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,854 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,668 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,126 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,609 UART: [afmc] --
23,516,416 UART: [cold-reset] --
23,520,988 UART: [state] Locking Datavault
23,524,182 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,955 UART: [state] Locking ICCM
23,527,455 UART: [exit] Launching FMC @ 0x40000130
23,535,852 UART:
23,536,084 UART: Running Caliptra FMC ...
23,537,393 UART:
23,537,560 UART: [state] CFI Enabled
23,545,750 UART: [fht] FMC Alias Private Key: 7
25,876,767 UART: [art] Extend RT PCRs Done
25,877,991 UART: [art] Lock RT PCRs Done
25,879,971 UART: [art] Populate DV Done
25,885,328 UART: [fht] FMC Alias Private Key: 7
25,887,028 UART: [art] Derive CDI
25,887,769 UART: [art] Store in in slot 0x4
25,930,306 UART: [art] Derive Key Pair
25,931,303 UART: [art] Store priv key in slot 0x5
29,173,003 UART: [art] Derive Key Pair - Done
29,185,750 UART: [art] Signing Cert with AUTHO
29,187,087 UART: RITY.KEYID = 7
31,466,788 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,295 UART: [art] PUB.X = BE7EA6BD0D07FEF341D8B597731D014EEEC094886358217D5D80994CCF8B390FC3F3EFD0A143D020E2A3DF5AA2834A22
31,475,553 UART: [art] PUB.Y = B84F777AAA5F7603AAAE749EF696E23CBFDAC3D0A4D36BC8BD57A71074C0DDD30DE0EE9CF666210E9E81C127D36EA9E5
31,482,855 UART: [art] SIG.R = 828EE0F068C7CF4B4075B5DEA85CB75488EDF6B6022AB016F060D88455F94EE693615DFB0CD6F99A68971F3609530D3E
31,490,262 UART: [art] SIG.S = 684B4D83691FCA0169172962BF37BEB41138EABDCB78C24B9C7EFD2279DFC5814277FDFA822BF60E02F2DA177100FFD8
32,796,269 UART: Caliptra RT
32,796,979 UART: [state] CFI Enabled
32,913,840 UART: [rt] RT listening for mailbox commands...
32,915,775 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
32,946,454 UART: [rt]cmd =0x44504543, len=28
32,988,982 >>> mbox cmd response data (2076 bytes)
32,999,041 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,029,274 UART: [rt]cmd =0x44504543, len=28
33,070,064 >>> mbox cmd response data (2076 bytes)
33,414,825 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,448,254 UART: [rt]cmd =0x49444550, len=353
33,461,896 >>> mbox cmd response data (8 bytes)
33,462,441 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,492,462 UART: [rt]cmd =0x44504543, len=28
33,534,706 >>> mbox cmd response data (2076 bytes)
33,544,890 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,575,092 UART: [rt]cmd =0x44504543, len=28
33,616,200 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,226 writing to cptra_bootfsm_go
4,125,949 ready_for_fw is high
4,126,353 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,056,352 >>> mbox cmd response: success
23,703,137 UART:
23,703,555 UART: Running Caliptra FMC ...
23,704,716 UART:
23,704,883 UART: [state] CFI Enabled
23,713,049 UART: [fht] FMC Alias Private Key: 7
26,043,735 UART: [art] Extend RT PCRs Done
26,044,964 UART: [art] Lock RT PCRs Done
26,046,795 UART: [art] Populate DV Done
26,052,263 UART: [fht] FMC Alias Private Key: 7
26,053,803 UART: [art] Derive CDI
26,054,539 UART: [art] Store in in slot 0x4
26,097,030 UART: [art] Derive Key Pair
26,098,074 UART: [art] Store priv key in slot 0x5
29,339,664 UART: [art] Derive Key Pair - Done
29,352,771 UART: [art] Signing Cert with AUTHO
29,354,100 UART: RITY.KEYID = 7
31,633,467 UART: [art] Erasing AUTHORITY.KEYID = 7
31,634,990 UART: [art] PUB.X = 54B953387C853B45932F903470D4789A7992ADD4A355414AB52EFC0ECA9431A367EDE4D926241CD024379F8324FEFDCF
31,642,196 UART: [art] PUB.Y = AB4435C1273D010B467956F3BDFFD245AC386BE2C795FAA797B23897B26DD6DDF11A2102B4DA6CAABE3186D9D4626704
31,649,440 UART: [art] SIG.R = B0641898417C146A2E5DE7B6012CFF3D207E18CD7CB168CC904C19309851C904969F4A23B8AB0C9FE96ADD695865E82D
31,656,833 UART: [art] SIG.S = 11FBEDD9F05F8228BBB6C1313A8D9BCE86207FBF24A02DCD2D2B37A3FB6ACA5557B5E2B301A34B43DBBA07D1B19A09FF
32,961,374 UART: Caliptra RT
32,962,090 UART: [state] CFI Enabled
33,080,328 UART: [rt] RT listening for mailbox commands...
33,082,249 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,112,951 UART: [rt]cmd =0x44504543, len=28
33,155,327 >>> mbox cmd response data (2076 bytes)
33,165,365 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,195,210 UART: [rt]cmd =0x44504543, len=28
33,236,162 >>> mbox cmd response data (2076 bytes)
33,581,126 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,614,263 UART: [rt]cmd =0x49444550, len=354
33,627,754 >>> mbox cmd response data (8 bytes)
33,628,227 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,658,073 UART: [rt]cmd =0x44504543, len=28
33,700,830 >>> mbox cmd response data (2076 bytes)
33,710,793 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,741,079 UART: [rt]cmd =0x44504543, len=28
33,781,779 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,174 UART:
192,542 UART: Running Caliptra ROM ...
193,638 UART:
193,784 UART: [state] CFI Enabled
264,601 UART: [state] LifecycleState = Unprovisioned
266,506 UART: [state] DebugLocked = No
268,665 UART: [state] WD Timer not started. Device not locked for debugging
271,491 UART: [kat] SHA2-256
450,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,184 UART: [kat] ++
462,634 UART: [kat] sha1
474,124 UART: [kat] SHA2-256
477,172 UART: [kat] SHA2-384
483,242 UART: [kat] SHA2-512-ACC
486,191 UART: [kat] ECC-384
2,946,726 UART: [kat] HMAC-384Kdf
2,970,449 UART: [kat] LMS
3,499,891 UART: [kat] --
3,506,247 UART: [cold-reset] ++
3,508,764 UART: [fht] FHT @ 0x50003400
3,519,350 UART: [idev] ++
3,519,933 UART: [idev] CDI.KEYID = 6
3,520,847 UART: [idev] SUBJECT.KEYID = 7
3,522,022 UART: [idev] UDS.KEYID = 0
3,522,956 ready_for_fw is high
3,523,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,687 UART: [idev] Erasing UDS.KEYID = 0
6,024,991 UART: [idev] Sha1 KeyId Algorithm
6,048,897 UART: [idev] --
6,053,280 UART: [ldev] ++
6,053,923 UART: [ldev] CDI.KEYID = 6
6,054,843 UART: [ldev] SUBJECT.KEYID = 5
6,055,959 UART: [ldev] AUTHORITY.KEYID = 7
6,057,199 UART: [ldev] FE.KEYID = 1
6,099,438 UART: [ldev] Erasing FE.KEYID = 1
8,604,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,160 UART: [ldev] --
10,412,624 UART: [fwproc] Wait for Commands...
10,415,045 UART: [fwproc] Recv command 0x46574c44
10,417,144 UART: [fwproc] Recv'd Img size: 114168 bytes
13,807,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,789 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,567 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,265,513 >>> mbox cmd response: success
14,269,274 UART: [afmc] ++
14,269,873 UART: [afmc] CDI.KEYID = 6
14,270,789 UART: [afmc] SUBJECT.KEYID = 7
14,271,951 UART: [afmc] AUTHORITY.KEYID = 5
16,800,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,543,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,545,758 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,561,532 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,577,556 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,593,401 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,616,201 UART: [afmc] --
18,619,363 UART: [cold-reset] --
18,624,519 UART: [state] Locking Datavault
18,629,393 UART: [state] Locking PCR0, PCR1 and PCR31
18,631,130 UART: [state] Locking ICCM
18,633,205 UART: [exit] Launching FMC @ 0x40000130
18,641,612 UART:
18,641,851 UART: Running Caliptra FMC ...
18,642,951 UART:
18,643,109 UART: [state] CFI Enabled
18,701,251 UART: [fht] FMC Alias Private Key: 7
20,465,414 UART: [art] Extend RT PCRs Done
20,466,637 UART: [art] Lock RT PCRs Done
20,468,050 UART: [art] Populate DV Done
20,473,415 UART: [fht] FMC Alias Private Key: 7
20,474,884 UART: [art] Derive CDI
20,475,652 UART: [art] Store in in slot 0x4
20,533,827 UART: [art] Derive Key Pair
20,534,828 UART: [art] Store priv key in slot 0x5
22,998,120 UART: [art] Derive Key Pair - Done
23,011,450 UART: [art] Signing Cert with AUTHO
23,012,788 UART: RITY.KEYID = 7
24,723,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,725,477 UART: [art] PUB.X = D1F6BBE350E2137E0CD35AF4D1AB489F5A6311609B56E18DA63A4C68CCAEC3639EC71AB6CE3D74B7BC2F8A3BD94BE698
24,732,791 UART: [art] PUB.Y = 9662DCB70B7E16F88C52B4E3BBAB011B50BCD7CF647E4CB685DC830BEE4C57B93BE907F00069218F75D17D2FF0E30078
24,740,034 UART: [art] SIG.R = 27ADA637BADAB2491303BAA3DC69DED48AC34B2B75530A983CCA4193D235D8990AB46206B6A172B0CA7D3E7D1ED6D2F5
24,747,437 UART: [art] SIG.S = 4EFD6C2048232130BF0A5E7E0F00B3F559B442A390FFD920EA26CDBCC4EACCB54879B9CB2A571AF5E12D5BD6FDC35475
25,726,323 UART: Caliptra RT
25,727,023 UART: [state] CFI Enabled
25,891,376 UART: [rt] RT listening for mailbox commands...
25,893,334 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,924,146 UART: [rt]cmd =0x44504543, len=28
25,966,928 >>> mbox cmd response data (2076 bytes)
25,976,978 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,007,003 UART: [rt]cmd =0x44504543, len=28
26,047,341 >>> mbox cmd response data (2076 bytes)
26,394,074 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,427,228 UART: [rt]cmd =0x49444550, len=352
26,438,601 >>> mbox cmd response data (8 bytes)
26,439,084 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,469,025 UART: [rt]cmd =0x44504543, len=28
26,511,951 >>> mbox cmd response data (2076 bytes)
26,521,939 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,552,146 UART: [rt]cmd =0x44504543, len=28
26,592,851 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,382,331 ready_for_fw is high
3,382,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,066,721 >>> mbox cmd response: success
18,360,975 UART:
18,361,380 UART: Running Caliptra FMC ...
18,362,683 UART:
18,362,855 UART: [state] CFI Enabled
18,430,372 UART: [fht] FMC Alias Private Key: 7
20,195,843 UART: [art] Extend RT PCRs Done
20,197,073 UART: [art] Lock RT PCRs Done
20,198,815 UART: [art] Populate DV Done
20,203,956 UART: [fht] FMC Alias Private Key: 7
20,205,661 UART: [art] Derive CDI
20,206,477 UART: [art] Store in in slot 0x4
20,263,958 UART: [art] Derive Key Pair
20,264,994 UART: [art] Store priv key in slot 0x5
22,727,923 UART: [art] Derive Key Pair - Done
22,740,815 UART: [art] Signing Cert with AUTHO
22,742,129 UART: RITY.KEYID = 7
24,453,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,449 UART: [art] PUB.X = AA8A6DE1ED43D4121111853A3BC532CB18DD57BEDD28A79B16C1134C24C8F3C3C4FDA8758B7C9F1F98D5784AFBC13CEA
24,462,746 UART: [art] PUB.Y = 3887A7A82B647584604D244E5C31734960EFD59ED4932A6ABADFEC3C47CEDBCB8677EF6105D395971C8F242B3B773AEE
24,469,999 UART: [art] SIG.R = 9C4336254FB7E59724F98EB73485A6185D237A7A51036899C9908912C74CE05FD8C78992F2D2A3B434598D698E2401FF
24,477,387 UART: [art] SIG.S = DE58284C290DC27FFFA58825F80C5A8BB93F4166437B8D0DB4308DA138593AEE9E59FCEEDE54B43453871AA6D91D015D
25,456,448 UART: Caliptra RT
25,457,163 UART: [state] CFI Enabled
25,620,071 UART: [rt] RT listening for mailbox commands...
25,622,006 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,652,620 UART: [rt]cmd =0x44504543, len=28
25,695,332 >>> mbox cmd response data (2076 bytes)
25,705,520 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,735,490 UART: [rt]cmd =0x44504543, len=28
25,776,266 >>> mbox cmd response data (2076 bytes)
26,121,833 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,154,896 UART: [rt]cmd =0x49444550, len=353
26,168,524 >>> mbox cmd response data (8 bytes)
26,168,999 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,199,043 UART: [rt]cmd =0x44504543, len=28
26,241,565 >>> mbox cmd response data (2076 bytes)
26,251,467 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,281,457 UART: [rt]cmd =0x44504543, len=28
26,322,283 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,929 writing to cptra_bootfsm_go
193,209 UART:
193,576 UART: Running Caliptra ROM ...
194,779 UART:
604,446 UART: [state] CFI Enabled
617,056 UART: [state] LifecycleState = Unprovisioned
618,867 UART: [state] DebugLocked = No
620,259 UART: [state] WD Timer not started. Device not locked for debugging
623,595 UART: [kat] SHA2-256
802,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,312 UART: [kat] ++
814,763 UART: [kat] sha1
826,270 UART: [kat] SHA2-256
829,275 UART: [kat] SHA2-384
835,971 UART: [kat] SHA2-512-ACC
838,902 UART: [kat] ECC-384
3,281,875 UART: [kat] HMAC-384Kdf
3,294,185 UART: [kat] LMS
3,823,734 UART: [kat] --
3,827,535 UART: [cold-reset] ++
3,828,785 UART: [fht] FHT @ 0x50003400
3,840,575 UART: [idev] ++
3,841,143 UART: [idev] CDI.KEYID = 6
3,842,056 UART: [idev] SUBJECT.KEYID = 7
3,843,233 UART: [idev] UDS.KEYID = 0
3,844,232 ready_for_fw is high
3,844,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,807 UART: [idev] Erasing UDS.KEYID = 0
6,314,924 UART: [idev] Sha1 KeyId Algorithm
6,337,768 UART: [idev] --
6,341,275 UART: [ldev] ++
6,341,841 UART: [ldev] CDI.KEYID = 6
6,342,750 UART: [ldev] SUBJECT.KEYID = 5
6,343,912 UART: [ldev] AUTHORITY.KEYID = 7
6,345,197 UART: [ldev] FE.KEYID = 1
6,354,113 UART: [ldev] Erasing FE.KEYID = 1
8,826,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,671 UART: [ldev] --
10,615,120 UART: [fwproc] Wait for Commands...
10,618,073 UART: [fwproc] Recv command 0x46574c44
10,620,164 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,710 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,477,469 >>> mbox cmd response: success
14,481,747 UART: [afmc] ++
14,482,341 UART: [afmc] CDI.KEYID = 6
14,483,251 UART: [afmc] SUBJECT.KEYID = 7
14,484,472 UART: [afmc] AUTHORITY.KEYID = 5
16,981,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,703,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,180 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,967 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,752,848 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,775,316 UART: [afmc] --
18,778,854 UART: [cold-reset] --
18,781,203 UART: [state] Locking Datavault
18,786,012 UART: [state] Locking PCR0, PCR1 and PCR31
18,787,861 UART: [state] Locking ICCM
18,788,889 UART: [exit] Launching FMC @ 0x40000130
18,797,287 UART:
18,797,523 UART: Running Caliptra FMC ...
18,798,623 UART:
18,798,784 UART: [state] CFI Enabled
18,807,123 UART: [fht] FMC Alias Private Key: 7
20,564,375 UART: [art] Extend RT PCRs Done
20,565,600 UART: [art] Lock RT PCRs Done
20,567,008 UART: [art] Populate DV Done
20,572,645 UART: [fht] FMC Alias Private Key: 7
20,574,183 UART: [art] Derive CDI
20,574,995 UART: [art] Store in in slot 0x4
20,617,483 UART: [art] Derive Key Pair
20,618,483 UART: [art] Store priv key in slot 0x5
23,045,241 UART: [art] Derive Key Pair - Done
23,058,184 UART: [art] Signing Cert with AUTHO
23,059,484 UART: RITY.KEYID = 7
24,764,953 UART: [art] Erasing AUTHORITY.KEYID = 7
24,766,462 UART: [art] PUB.X = CA75FC4FF7D5C4561217E6486342261F83E30815D7CD2BB6FA54D9B149FA1200D6F088F1424A3291EE91BFE5F8379615
24,773,718 UART: [art] PUB.Y = D85F34A664968737AEFD6835D35E21BB08541EDDBFDDD17750927A7082142B2451F10A808466214B6ED5194350866C92
24,780,907 UART: [art] SIG.R = CF21680BEF74AAD03C5DFD376094CE2F1EFB04AEE87E1285DA0B8F49A5620F41238C9A5A8AFCBC75C53975808B8786DA
24,788,360 UART: [art] SIG.S = 6A6F94856260ABFE75BFADC4CF0A1ABC8750162F557FD18BF101A18EC192C5512A6694F7498AE7D86DEF69F258DBE785
25,767,264 UART: Caliptra RT
25,767,984 UART: [state] CFI Enabled
25,884,890 UART: [rt] RT listening for mailbox commands...
25,886,831 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,917,599 UART: [rt]cmd =0x44504543, len=28
25,960,162 >>> mbox cmd response data (2076 bytes)
25,970,205 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,999,919 UART: [rt]cmd =0x44504543, len=28
26,040,246 >>> mbox cmd response data (2076 bytes)
26,384,545 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,417,569 UART: [rt]cmd =0x49444550, len=354
26,431,106 >>> mbox cmd response data (8 bytes)
26,431,576 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,461,578 UART: [rt]cmd =0x44504543, len=28
26,504,164 >>> mbox cmd response data (2076 bytes)
26,514,197 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,544,263 UART: [rt]cmd =0x44504543, len=28
26,585,234 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,775 writing to cptra_bootfsm_go
3,695,797 ready_for_fw is high
3,696,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,272,596 >>> mbox cmd response: success
18,517,398 UART:
18,517,797 UART: Running Caliptra FMC ...
18,518,936 UART:
18,519,100 UART: [state] CFI Enabled
18,527,043 UART: [fht] FMC Alias Private Key: 7
20,284,126 UART: [art] Extend RT PCRs Done
20,285,353 UART: [art] Lock RT PCRs Done
20,287,041 UART: [art] Populate DV Done
20,292,619 UART: [fht] FMC Alias Private Key: 7
20,294,227 UART: [art] Derive CDI
20,295,044 UART: [art] Store in in slot 0x4
20,337,541 UART: [art] Derive Key Pair
20,338,586 UART: [art] Store priv key in slot 0x5
22,765,953 UART: [art] Derive Key Pair - Done
22,779,113 UART: [art] Signing Cert with AUTHO
22,780,413 UART: RITY.KEYID = 7
24,485,893 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,400 UART: [art] PUB.X = 74FA3EDC78DB44984100581B340DECCFF4187001509D110E18BD9E7391A2E9381ADB3987BB4BC0544637A63AE6666A5D
24,494,654 UART: [art] PUB.Y = 333307D572BCB1AAD103E5AD6D8B4628832388EA553B401309CF9774A7A03AA95511CC580C28382F264060F0D88A1155
24,501,905 UART: [art] SIG.R = BA4EAB7792D9238A91F58F614B0544373E96F2C58F383C7AF92EC72312CE1B5BBE9134F2E0DDE2630B0871313F854002
24,509,306 UART: [art] SIG.S = 5F88C36F0D480A99695CD89C069ADF03CC2DF88DFEEECD3B264DB1EBF4F345C938CC919BF2F03C67642EF03378648C8E
25,488,306 UART: Caliptra RT
25,489,006 UART: [state] CFI Enabled
25,606,708 UART: [rt] RT listening for mailbox commands...
25,608,643 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,639,469 UART: [rt]cmd =0x44504543, len=28
25,681,943 >>> mbox cmd response data (2076 bytes)
25,691,988 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,721,945 UART: [rt]cmd =0x44504543, len=28
25,761,918 >>> mbox cmd response data (2076 bytes)
26,106,630 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,139,830 UART: [rt]cmd =0x49444550, len=353
26,153,564 >>> mbox cmd response data (8 bytes)
26,154,039 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,184,082 UART: [rt]cmd =0x44504543, len=28
26,226,472 >>> mbox cmd response data (2076 bytes)
26,236,354 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,266,278 UART: [rt]cmd =0x44504543, len=28
26,307,212 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,301 UART:
192,680 UART: Running Caliptra ROM ...
193,886 UART:
194,052 UART: [state] CFI Enabled
265,433 UART: [state] LifecycleState = Unprovisioned
267,798 UART: [state] DebugLocked = No
269,328 UART: [state] WD Timer not started. Device not locked for debugging
273,270 UART: [kat] SHA2-256
463,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,918 UART: [kat] ++
474,392 UART: [kat] sha1
485,907 UART: [kat] SHA2-256
488,920 UART: [kat] SHA2-384
493,985 UART: [kat] SHA2-512-ACC
496,566 UART: [kat] ECC-384
2,947,206 UART: [kat] HMAC-384Kdf
2,971,526 UART: [kat] LMS
3,503,248 UART: [kat] --
3,508,051 UART: [cold-reset] ++
3,510,351 UART: [fht] FHT @ 0x50003400
3,521,970 UART: [idev] ++
3,522,613 UART: [idev] CDI.KEYID = 6
3,523,567 UART: [idev] SUBJECT.KEYID = 7
3,524,810 UART: [idev] UDS.KEYID = 0
3,525,710 ready_for_fw is high
3,525,915 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,528 UART: [idev] Erasing UDS.KEYID = 0
6,028,924 UART: [idev] Sha1 KeyId Algorithm
6,051,154 UART: [idev] --
6,055,454 UART: [ldev] ++
6,056,146 UART: [ldev] CDI.KEYID = 6
6,057,062 UART: [ldev] SUBJECT.KEYID = 5
6,058,227 UART: [ldev] AUTHORITY.KEYID = 7
6,059,463 UART: [ldev] FE.KEYID = 1
6,099,548 UART: [ldev] Erasing FE.KEYID = 1
8,607,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,013 UART: [ldev] --
10,413,280 UART: [fwproc] Wait for Commands...
10,416,525 UART: [fwproc] Recv command 0x46574c44
10,418,785 UART: [fwproc] Recv'd Img size: 114168 bytes
13,859,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,596,328 >>> mbox cmd response: success
14,601,094 UART: [afmc] ++
14,601,763 UART: [afmc] CDI.KEYID = 6
14,603,016 UART: [afmc] SUBJECT.KEYID = 7
14,604,458 UART: [afmc] AUTHORITY.KEYID = 5
17,146,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,870,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,872,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,887,756 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,902,910 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,917,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,941,196 UART: [afmc] --
18,944,314 UART: [cold-reset] --
18,948,998 UART: [state] Locking Datavault
18,954,374 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,534 UART: [state] Locking ICCM
18,957,885 UART: [exit] Launching FMC @ 0x40000130
18,966,526 UART:
18,966,760 UART: Running Caliptra FMC ...
18,967,792 UART:
18,967,934 UART: [state] CFI Enabled
19,028,462 UART: [fht] FMC Alias Private Key: 7
20,793,420 UART: [art] Extend RT PCRs Done
20,794,639 UART: [art] Lock RT PCRs Done
20,796,240 UART: [art] Populate DV Done
20,801,437 UART: [fht] FMC Alias Private Key: 7
20,803,092 UART: [art] Derive CDI
20,803,931 UART: [art] Store in in slot 0x4
20,860,808 UART: [art] Derive Key Pair
20,861,849 UART: [art] Store priv key in slot 0x5
23,324,581 UART: [art] Derive Key Pair - Done
23,337,821 UART: [art] Signing Cert with AUTHO
23,339,122 UART: RITY.KEYID = 7
25,050,188 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,693 UART: [art] PUB.X = F5C3465251CAACF1D5C2171D519012AB16508101140AD728F9F78B0C48AC386BFCA191EB0C7E3AC8F8E295EEC6953118
25,058,958 UART: [art] PUB.Y = 675712AE8AFBF43B52195E7B70617F6E3174FC5717B35643063C2B30D2BF12E77B39E68CCC7F11ADD90BAC8E72E9F9BF
25,066,278 UART: [art] SIG.R = CDCCD90C8E1DB4DDF44E77279D2C73950EE492B423E2C307CE71550583EBB8D81F49F026273ACB05481E1119ACCACC46
25,073,659 UART: [art] SIG.S = D792E073D308715055BC3ACFA9D638A85965668E08DA3740D17E43FA4E9C753E64D2E94FC25757E6C9A70D9CCB831368
26,052,261 UART: Caliptra RT
26,052,950 UART: [state] CFI Enabled
26,217,208 UART: [rt] RT listening for mailbox commands...
26,219,150 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,249,684 UART: [rt]cmd =0x44504543, len=28
26,292,134 >>> mbox cmd response data (2076 bytes)
26,302,226 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,332,134 UART: [rt]cmd =0x44504543, len=28
26,372,438 >>> mbox cmd response data (2076 bytes)
26,718,992 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,752,081 UART: [rt]cmd =0x49444550, len=352
26,763,332 >>> mbox cmd response data (8 bytes)
26,763,843 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,793,964 UART: [rt]cmd =0x44504543, len=28
26,836,455 >>> mbox cmd response data (2076 bytes)
26,846,520 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,876,648 UART: [rt]cmd =0x44504543, len=28
26,917,673 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,441,130 ready_for_fw is high
3,441,515 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,722,257 >>> mbox cmd response: success
19,008,936 UART:
19,009,458 UART: Running Caliptra FMC ...
19,010,566 UART:
19,010,729 UART: [state] CFI Enabled
19,075,512 UART: [fht] FMC Alias Private Key: 7
20,839,393 UART: [art] Extend RT PCRs Done
20,840,615 UART: [art] Lock RT PCRs Done
20,842,136 UART: [art] Populate DV Done
20,847,603 UART: [fht] FMC Alias Private Key: 7
20,849,310 UART: [art] Derive CDI
20,850,129 UART: [art] Store in in slot 0x4
20,907,827 UART: [art] Derive Key Pair
20,908,872 UART: [art] Store priv key in slot 0x5
23,371,542 UART: [art] Derive Key Pair - Done
23,384,689 UART: [art] Signing Cert with AUTHO
23,386,027 UART: RITY.KEYID = 7
25,096,843 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,379 UART: [art] PUB.X = 565C0F03A4D910CF859EC3C35FB6ED289272CA32E7307145B9601C311A3BBD6D42E121FB055975E3960C733BD7FBA6E1
25,105,628 UART: [art] PUB.Y = 8B07FA7A6152457A7E82232BA98006F838FE02190FAED16CDED39D27948BFB58D0561299D3B5823FC1D9F9944C23337C
25,112,852 UART: [art] SIG.R = EC499181C38F5E2F6EB2624C2768706C06FA04ACA97AA8913299198EBE247F9D8531F59022D9E7D52ADD81A11ECF0D09
25,120,234 UART: [art] SIG.S = 93FC6EFDD2252D9EAA785AEB6042833B52ADB208699AEDA895D8D0FAE63A9489C4E4187AA9A3849C40951C3D3FD922D2
26,099,350 UART: Caliptra RT
26,100,078 UART: [state] CFI Enabled
26,264,178 UART: [rt] RT listening for mailbox commands...
26,266,125 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,296,912 UART: [rt]cmd =0x44504543, len=28
26,339,771 >>> mbox cmd response data (2076 bytes)
26,349,802 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,379,655 UART: [rt]cmd =0x44504543, len=28
26,420,398 >>> mbox cmd response data (2076 bytes)
26,766,191 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,799,258 UART: [rt]cmd =0x49444550, len=354
26,812,987 >>> mbox cmd response data (8 bytes)
26,813,445 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,843,588 UART: [rt]cmd =0x44504543, len=28
26,886,148 >>> mbox cmd response data (2076 bytes)
26,896,262 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,926,568 UART: [rt]cmd =0x44504543, len=28
26,967,347 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,746 writing to cptra_bootfsm_go
193,013 UART:
193,380 UART: Running Caliptra ROM ...
194,578 UART:
604,169 UART: [state] CFI Enabled
616,992 UART: [state] LifecycleState = Unprovisioned
619,368 UART: [state] DebugLocked = No
621,749 UART: [state] WD Timer not started. Device not locked for debugging
626,560 UART: [kat] SHA2-256
816,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,262 UART: [kat] ++
827,866 UART: [kat] sha1
840,048 UART: [kat] SHA2-256
843,101 UART: [kat] SHA2-384
848,599 UART: [kat] SHA2-512-ACC
851,198 UART: [kat] ECC-384
3,293,002 UART: [kat] HMAC-384Kdf
3,305,740 UART: [kat] LMS
3,837,536 UART: [kat] --
3,841,464 UART: [cold-reset] ++
3,843,888 UART: [fht] FHT @ 0x50003400
3,855,073 UART: [idev] ++
3,855,714 UART: [idev] CDI.KEYID = 6
3,856,695 UART: [idev] SUBJECT.KEYID = 7
3,857,870 UART: [idev] UDS.KEYID = 0
3,858,798 ready_for_fw is high
3,858,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,387 UART: [idev] Erasing UDS.KEYID = 0
6,335,625 UART: [idev] Sha1 KeyId Algorithm
6,358,459 UART: [idev] --
6,362,484 UART: [ldev] ++
6,363,189 UART: [ldev] CDI.KEYID = 6
6,364,100 UART: [ldev] SUBJECT.KEYID = 5
6,365,259 UART: [ldev] AUTHORITY.KEYID = 7
6,366,434 UART: [ldev] FE.KEYID = 1
6,379,943 UART: [ldev] Erasing FE.KEYID = 1
8,859,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,319 UART: [ldev] --
10,652,554 UART: [fwproc] Wait for Commands...
10,654,107 UART: [fwproc] Recv command 0x46574c44
10,656,414 UART: [fwproc] Recv'd Img size: 114168 bytes
14,106,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,175 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,293 >>> mbox cmd response: success
14,841,619 UART: [afmc] ++
14,842,328 UART: [afmc] CDI.KEYID = 6
14,843,570 UART: [afmc] SUBJECT.KEYID = 7
14,844,996 UART: [afmc] AUTHORITY.KEYID = 5
17,346,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,876 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,090 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,249 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,138,507 UART: [afmc] --
19,141,834 UART: [cold-reset] --
19,145,430 UART: [state] Locking Datavault
19,150,521 UART: [state] Locking PCR0, PCR1 and PCR31
19,152,676 UART: [state] Locking ICCM
19,155,535 UART: [exit] Launching FMC @ 0x40000130
19,164,160 UART:
19,164,431 UART: Running Caliptra FMC ...
19,165,540 UART:
19,165,710 UART: [state] CFI Enabled
19,173,777 UART: [fht] FMC Alias Private Key: 7
20,930,293 UART: [art] Extend RT PCRs Done
20,931,515 UART: [art] Lock RT PCRs Done
20,932,866 UART: [art] Populate DV Done
20,938,125 UART: [fht] FMC Alias Private Key: 7
20,939,717 UART: [art] Derive CDI
20,940,528 UART: [art] Store in in slot 0x4
20,982,906 UART: [art] Derive Key Pair
20,983,905 UART: [art] Store priv key in slot 0x5
23,410,313 UART: [art] Derive Key Pair - Done
23,423,275 UART: [art] Signing Cert with AUTHO
23,424,582 UART: RITY.KEYID = 7
25,129,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,989 UART: [art] PUB.X = 332D9B73B485B3618EE3A3DA90532176CDF5558410DD96A5056F7D466B6F3977ECC98784B1EE57FE59CBD161E1A97C3A
25,138,236 UART: [art] PUB.Y = 4390C8D9D167C55F574551AAB68A4C173D1DBBB6085CA8CF723D797FA0D858C816FCECFD78A73D9C65D1AA4EE16A429E
25,145,519 UART: [art] SIG.R = AD26CAC26AAA8DACF9D6C025497C3735A66DA4955098869DB14A436B901A756331BE7E0BCD598EC6A0A306BBD841A62B
25,152,959 UART: [art] SIG.S = 5273DF645386AABF11775DAEBBFFB41AAFFFEAB1D3E1ABD59ACAE919103BEFE23F46BBFAC85B7EBBA55602969D3F61C6
26,132,127 UART: Caliptra RT
26,132,834 UART: [state] CFI Enabled
26,250,053 UART: [rt] RT listening for mailbox commands...
26,251,992 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,282,452 UART: [rt]cmd =0x44504543, len=28
26,325,200 >>> mbox cmd response data (2076 bytes)
26,335,238 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,365,112 UART: [rt]cmd =0x44504543, len=28
26,405,867 >>> mbox cmd response data (2076 bytes)
26,750,257 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,783,427 UART: [rt]cmd =0x49444550, len=353
26,797,082 >>> mbox cmd response data (8 bytes)
26,797,602 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,827,610 UART: [rt]cmd =0x44504543, len=28
26,870,299 >>> mbox cmd response data (2076 bytes)
26,880,327 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,910,397 UART: [rt]cmd =0x44504543, len=28
26,950,767 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
3,756,960 ready_for_fw is high
3,757,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,391 >>> mbox cmd response: success
19,207,135 UART:
19,207,551 UART: Running Caliptra FMC ...
19,208,690 UART:
19,208,857 UART: [state] CFI Enabled
19,216,546 UART: [fht] FMC Alias Private Key: 7
20,973,660 UART: [art] Extend RT PCRs Done
20,974,883 UART: [art] Lock RT PCRs Done
20,976,294 UART: [art] Populate DV Done
20,981,772 UART: [fht] FMC Alias Private Key: 7
20,983,310 UART: [art] Derive CDI
20,984,071 UART: [art] Store in in slot 0x4
21,026,605 UART: [art] Derive Key Pair
21,027,639 UART: [art] Store priv key in slot 0x5
23,454,551 UART: [art] Derive Key Pair - Done
23,467,775 UART: [art] Signing Cert with AUTHO
23,469,080 UART: RITY.KEYID = 7
25,174,386 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,892 UART: [art] PUB.X = 76C10EB4ED9DAB60F09BDAF72A15D626D5FA7EF1ACED6F5C48A85F199876A1D983AC99084E57B2A2EB43642BBA552E39
25,183,303 UART: [art] PUB.Y = 85E0538A8B0423B90C2ECEE9FA7B0FE14B78DDCDD52BC1CB4D51DA8B5A30975484B8E703AE3CABB917A8A32549BEEAAB
25,190,428 UART: [art] SIG.R = 16FAF7489D74D7E610B122AAB74399C4484559BEC50E88486B777D26FAC2F3EF83A5A6C9E18296DA8C87DB8C5CCB954F
25,197,880 UART: [art] SIG.S = 9706AC173EA3CEEAF30536283C70476AC6ED8816124892BADCFEFEF812F92C5F9EFAF75C9A7AB6D2EA49BD7F7B7FDB92
26,176,771 UART: Caliptra RT
26,177,486 UART: [state] CFI Enabled
26,294,716 UART: [rt] RT listening for mailbox commands...
26,296,659 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,327,363 UART: [rt]cmd =0x44504543, len=28
26,369,916 >>> mbox cmd response data (2076 bytes)
26,379,948 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,409,865 UART: [rt]cmd =0x44504543, len=28
26,450,259 >>> mbox cmd response data (2076 bytes)
26,795,168 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,828,464 UART: [rt]cmd =0x49444550, len=354
26,841,956 >>> mbox cmd response data (8 bytes)
26,842,441 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,872,684 UART: [rt]cmd =0x44504543, len=28
26,915,311 >>> mbox cmd response data (2076 bytes)
26,925,224 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,955,052 UART: [rt]cmd =0x44504543, len=28
26,995,809 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,459 UART: [kat] SHA2-256
892,397 UART: [kat] SHA2-384
895,164 UART: [kat] SHA2-512-ACC
897,065 UART: [kat] ECC-384
902,458 UART: [kat] HMAC-384Kdf
906,916 UART: [kat] LMS
1,475,112 UART: [kat] --
1,475,847 UART: [cold-reset] ++
1,476,183 UART: [fht] Storing FHT @ 0x50003400
1,479,106 UART: [idev] ++
1,479,274 UART: [idev] CDI.KEYID = 6
1,479,634 UART: [idev] SUBJECT.KEYID = 7
1,480,058 UART: [idev] UDS.KEYID = 0
1,480,403 ready_for_fw is high
1,480,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,352 UART: [idev] Erasing UDS.KEYID = 0
1,504,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,682 UART: [idev] --
1,513,765 UART: [ldev] ++
1,513,933 UART: [ldev] CDI.KEYID = 6
1,514,296 UART: [ldev] SUBJECT.KEYID = 5
1,514,722 UART: [ldev] AUTHORITY.KEYID = 7
1,515,185 UART: [ldev] FE.KEYID = 1
1,520,055 UART: [ldev] Erasing FE.KEYID = 1
1,545,256 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,142 UART: [ldev] --
1,584,447 UART: [fwproc] Waiting for Commands...
1,585,068 UART: [fwproc] Received command 0x46574c44
1,585,859 UART: [fwproc] Received Image of size 114168 bytes
2,882,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,781 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,732 >>> mbox cmd response: success
3,075,834 UART: [afmc] ++
3,076,002 UART: [afmc] CDI.KEYID = 6
3,076,364 UART: [afmc] SUBJECT.KEYID = 7
3,076,789 UART: [afmc] AUTHORITY.KEYID = 5
3,111,634 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,550 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,278 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,163 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,853 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,788 UART: [afmc] --
3,154,846 UART: [cold-reset] --
3,155,866 UART: [state] Locking Datavault
3,157,147 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,751 UART: [state] Locking ICCM
3,158,215 UART: [exit] Launching FMC @ 0x40000130
3,163,544 UART:
3,163,560 UART: Running Caliptra FMC ...
3,163,968 UART:
3,164,022 UART: [state] CFI Enabled
3,174,637 UART: [fht] FMC Alias Private Key: 7
3,282,662 UART: [art] Extend RT PCRs Done
3,283,090 UART: [art] Lock RT PCRs Done
3,284,566 UART: [art] Populate DV Done
3,292,543 UART: [fht] FMC Alias Private Key: 7
3,293,491 UART: [art] Derive CDI
3,293,771 UART: [art] Store in in slot 0x4
3,379,348 UART: [art] Derive Key Pair
3,379,708 UART: [art] Store priv key in slot 0x5
3,392,200 UART: [art] Derive Key Pair - Done
3,406,977 UART: [art] Signing Cert with AUTHO
3,407,457 UART: RITY.KEYID = 7
3,422,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,258 UART: [art] PUB.X = 2B4CCB6DB29D72682B1ED5932BF4EB716230A1FF993F788C5ED9AAFB03273C5AF5A13C86D9809EF0EB997340FD91D747
3,430,039 UART: [art] PUB.Y = 9A21A197C7E1AAF0C2F4C9FB87AFB66B2CBDA4766F909100EB17823C43A141ECF00221B789CCB6ADFFC96EBFDA46DFDA
3,436,994 UART: [art] SIG.R = D46F550A64A6757D71B84DD713FE06E17061A67A5E4E47E75139E5759A2E86C6101722472EB3F370C7F848107562B2F5
3,443,750 UART: [art] SIG.S = C6EB38728CA28FA5B90BA4AD913275328EAFECEB5277F14E4B0C5D0AAB54AF759D3414F20C70E662F90A3A920765D8A9
3,467,487 UART: Caliptra RT
3,467,740 UART: [state] CFI Enabled
3,576,556 UART: [rt] RT listening for mailbox commands...
3,577,226 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,278 UART: [rt]cmd =0x44504543, len=28
3,650,606 >>> mbox cmd response data (2076 bytes)
3,650,607 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,680,124 UART: [rt]cmd =0x44504543, len=28
3,721,098 >>> mbox cmd response data (2076 bytes)
3,721,099 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,752,696 UART: [rt]cmd =0x49444550, len=354
3,765,907 >>> mbox cmd response data (8 bytes)
3,765,908 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,795,543 UART: [rt]cmd =0x44504543, len=28
3,839,007 >>> mbox cmd response data (2076 bytes)
3,839,008 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,868,679 UART: [rt]cmd =0x44504543, len=28
3,910,182 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,567 ready_for_fw is high
1,362,567 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,886 >>> mbox cmd response: success
2,987,904 UART:
2,987,920 UART: Running Caliptra FMC ...
2,988,328 UART:
2,988,382 UART: [state] CFI Enabled
2,998,755 UART: [fht] FMC Alias Private Key: 7
3,105,990 UART: [art] Extend RT PCRs Done
3,106,418 UART: [art] Lock RT PCRs Done
3,107,924 UART: [art] Populate DV Done
3,116,181 UART: [fht] FMC Alias Private Key: 7
3,117,117 UART: [art] Derive CDI
3,117,397 UART: [art] Store in in slot 0x4
3,203,392 UART: [art] Derive Key Pair
3,203,752 UART: [art] Store priv key in slot 0x5
3,216,840 UART: [art] Derive Key Pair - Done
3,231,304 UART: [art] Signing Cert with AUTHO
3,231,784 UART: RITY.KEYID = 7
3,247,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,021 UART: [art] PUB.X = CABA18CD1EF64F1C220AD1905FCCBB85B2827C4FF85DF4509D08C61AC3E51492E0F1D58D9CB0B318C6EECC1A285AD23D
3,254,811 UART: [art] PUB.Y = 5683A9A683FB432967D5B4C2D3A7DFA4895BF177AB54297033696D936F88C6ED60FF24BACF68E489E30B3A9BB9951CAC
3,261,768 UART: [art] SIG.R = 8A2754975A2B573EC39BD32D4FB51542979498FA4999240CE5BB7B5162D8E84EA18253073FE2F1A9E12258DF7AFF66A3
3,268,534 UART: [art] SIG.S = 5DE9C127DF68F85DBD81CB33F707E9B89BB23ECCFB7DBC8C08794EA3F6E74FA1038F50E4C682E847B09577D9387DE174
3,292,290 UART: Caliptra RT
3,292,543 UART: [state] CFI Enabled
3,400,614 UART: [rt] RT listening for mailbox commands...
3,401,284 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,124 UART: [rt]cmd =0x44504543, len=28
3,473,858 >>> mbox cmd response data (2076 bytes)
3,473,859 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,503,318 UART: [rt]cmd =0x44504543, len=28
3,544,605 >>> mbox cmd response data (2076 bytes)
3,544,606 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,428 UART: [rt]cmd =0x49444550, len=353
3,589,660 >>> mbox cmd response data (8 bytes)
3,589,661 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,098 UART: [rt]cmd =0x44504543, len=28
3,662,030 >>> mbox cmd response data (2076 bytes)
3,662,031 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,691,756 UART: [rt]cmd =0x44504543, len=28
3,733,280 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,556 UART: [kat] SHA2-256
882,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,602 UART: [kat] ++
886,754 UART: [kat] sha1
891,102 UART: [kat] SHA2-256
893,040 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
902,957 UART: [kat] HMAC-384Kdf
907,549 UART: [kat] LMS
1,475,745 UART: [kat] --
1,476,610 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 ready_for_fw is high
1,480,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,627 UART: [idev] Erasing UDS.KEYID = 0
1,505,241 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,969 UART: [idev] --
1,515,118 UART: [ldev] ++
1,515,286 UART: [ldev] CDI.KEYID = 6
1,515,649 UART: [ldev] SUBJECT.KEYID = 5
1,516,075 UART: [ldev] AUTHORITY.KEYID = 7
1,516,538 UART: [ldev] FE.KEYID = 1
1,521,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,249 UART: [ldev] --
1,586,648 UART: [fwproc] Waiting for Commands...
1,587,349 UART: [fwproc] Received command 0x46574c44
1,588,140 UART: [fwproc] Received Image of size 114168 bytes
2,884,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,180 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,532 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,211 >>> mbox cmd response: success
3,078,303 UART: [afmc] ++
3,078,471 UART: [afmc] CDI.KEYID = 6
3,078,833 UART: [afmc] SUBJECT.KEYID = 7
3,079,258 UART: [afmc] AUTHORITY.KEYID = 5
3,114,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,787 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,567 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,295 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,180 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,870 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,671 UART: [afmc] --
3,157,705 UART: [cold-reset] --
3,158,833 UART: [state] Locking Datavault
3,160,054 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,658 UART: [state] Locking ICCM
3,161,152 UART: [exit] Launching FMC @ 0x40000130
3,166,481 UART:
3,166,497 UART: Running Caliptra FMC ...
3,166,905 UART:
3,167,048 UART: [state] CFI Enabled
3,177,409 UART: [fht] FMC Alias Private Key: 7
3,285,454 UART: [art] Extend RT PCRs Done
3,285,882 UART: [art] Lock RT PCRs Done
3,287,266 UART: [art] Populate DV Done
3,295,225 UART: [fht] FMC Alias Private Key: 7
3,296,341 UART: [art] Derive CDI
3,296,621 UART: [art] Store in in slot 0x4
3,382,098 UART: [art] Derive Key Pair
3,382,458 UART: [art] Store priv key in slot 0x5
3,395,952 UART: [art] Derive Key Pair - Done
3,410,607 UART: [art] Signing Cert with AUTHO
3,411,087 UART: RITY.KEYID = 7
3,426,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,068 UART: [art] PUB.X = AE37BE965F56DCF99309139DB4147094698AF9CB0EBC52B49A71A3834F2377002C826BA93D55D11738777F6F25293E15
3,433,806 UART: [art] PUB.Y = 53E8E0E64931B7F90FCE2D309BFB9ED9F0B5E8F0B4E26062D27572B3A8AE22C1D9D9DFF3CBE5B55674AE3A4B02878DAB
3,440,772 UART: [art] SIG.R = 13ED039884C630D294B35BC57D3626529CA188BC3635571726614AE0D27E0784D5B51D690A43DF5A0465DFC564667CA0
3,447,524 UART: [art] SIG.S = A9B909EB352BFEE11AB3E342E39416540C02D598510867950A5E43256C1964AF66BAA039277F584AD8DD0C79D923BFC7
3,470,793 UART: Caliptra RT
3,471,138 UART: [state] CFI Enabled
3,578,725 UART: [rt] RT listening for mailbox commands...
3,579,395 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,403 UART: [rt]cmd =0x44504543, len=28
3,652,653 >>> mbox cmd response data (2076 bytes)
3,652,654 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,682,129 UART: [rt]cmd =0x44504543, len=28
3,723,140 >>> mbox cmd response data (2076 bytes)
3,723,141 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,947 UART: [rt]cmd =0x49444550, len=353
3,768,097 >>> mbox cmd response data (8 bytes)
3,768,098 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,797,729 UART: [rt]cmd =0x44504543, len=28
3,840,431 >>> mbox cmd response data (2076 bytes)
3,840,432 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,870,005 UART: [rt]cmd =0x44504543, len=28
3,911,337 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,848 ready_for_fw is high
1,363,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,307 >>> mbox cmd response: success
2,990,337 UART:
2,990,353 UART: Running Caliptra FMC ...
2,990,761 UART:
2,990,904 UART: [state] CFI Enabled
3,001,191 UART: [fht] FMC Alias Private Key: 7
3,109,360 UART: [art] Extend RT PCRs Done
3,109,788 UART: [art] Lock RT PCRs Done
3,111,598 UART: [art] Populate DV Done
3,119,769 UART: [fht] FMC Alias Private Key: 7
3,120,913 UART: [art] Derive CDI
3,121,193 UART: [art] Store in in slot 0x4
3,206,660 UART: [art] Derive Key Pair
3,207,020 UART: [art] Store priv key in slot 0x5
3,219,566 UART: [art] Derive Key Pair - Done
3,234,257 UART: [art] Signing Cert with AUTHO
3,234,737 UART: RITY.KEYID = 7
3,249,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,238 UART: [art] PUB.X = 437F20A51617074E2276589849E12CC8FE80304762BBB7514CFC980AB784EBD0C0FD9632FA166097757546DF7D26106E
3,256,996 UART: [art] PUB.Y = AFECF1F2C910B2E369BF31A23E816977C2B6A313F6FE4F5378CDD5A9BD038E0D18D7A2CC4496718320EA0FC61B023252
3,263,946 UART: [art] SIG.R = 228019E54489B43C03B87A75D5A5A99FA1219535F6A72602EB5BE0027F9A37891482B59FDC6A3DFC2F5E05F2A652B2FD
3,270,708 UART: [art] SIG.S = 142BD30F064A352B79CA3E94227B1614BB907DB3248AC563234408207D718B702CF6A0F184E6B34C5266ECEC22053DDF
3,294,751 UART: Caliptra RT
3,295,096 UART: [state] CFI Enabled
3,403,188 UART: [rt] RT listening for mailbox commands...
3,403,858 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,812 UART: [rt]cmd =0x44504543, len=28
3,477,058 >>> mbox cmd response data (2076 bytes)
3,477,059 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,506,646 UART: [rt]cmd =0x44504543, len=28
3,547,970 >>> mbox cmd response data (2076 bytes)
3,547,971 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,732 UART: [rt]cmd =0x49444550, len=354
3,592,938 >>> mbox cmd response data (8 bytes)
3,592,939 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,226 UART: [rt]cmd =0x44504543, len=28
3,665,606 >>> mbox cmd response data (2076 bytes)
3,665,607 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,695,272 UART: [rt]cmd =0x44504543, len=28
3,736,920 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
905,998 UART: [kat] SHA2-512-ACC
907,899 UART: [kat] ECC-384
917,518 UART: [kat] HMAC-384Kdf
922,020 UART: [kat] LMS
1,170,348 UART: [kat] --
1,171,595 UART: [cold-reset] ++
1,172,153 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 ready_for_fw is high
1,176,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,674 UART: [idev] Erasing UDS.KEYID = 0
1,200,227 UART: [idev] Sha1 KeyId Algorithm
1,208,619 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,258 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,261 UART: [ldev] --
1,281,612 UART: [fwproc] Wait for Commands...
1,282,246 UART: [fwproc] Recv command 0x46574c44
1,282,974 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,400 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,704 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,277 >>> mbox cmd response: success
2,774,287 UART: [afmc] ++
2,774,455 UART: [afmc] CDI.KEYID = 6
2,774,817 UART: [afmc] SUBJECT.KEYID = 7
2,775,242 UART: [afmc] AUTHORITY.KEYID = 5
2,811,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,868 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,481 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,200 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,852 UART: [afmc] --
2,854,968 UART: [cold-reset] --
2,855,970 UART: [state] Locking Datavault
2,857,195 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,799 UART: [state] Locking ICCM
2,858,239 UART: [exit] Launching FMC @ 0x40000130
2,863,568 UART:
2,863,584 UART: Running Caliptra FMC ...
2,863,992 UART:
2,864,046 UART: [state] CFI Enabled
2,874,893 UART: [fht] FMC Alias Private Key: 7
2,983,234 UART: [art] Extend RT PCRs Done
2,983,662 UART: [art] Lock RT PCRs Done
2,985,100 UART: [art] Populate DV Done
2,993,347 UART: [fht] FMC Alias Private Key: 7
2,994,395 UART: [art] Derive CDI
2,994,675 UART: [art] Store in in slot 0x4
3,080,486 UART: [art] Derive Key Pair
3,080,846 UART: [art] Store priv key in slot 0x5
3,093,800 UART: [art] Derive Key Pair - Done
3,108,493 UART: [art] Signing Cert with AUTHO
3,108,973 UART: RITY.KEYID = 7
3,124,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,204 UART: [art] PUB.X = 8779B734DA71499DA6546BE7E3793C97AAA79A787E2E4578700B1F59F8DD90771918D873B13B9C09665A57CFC30AF90D
3,131,962 UART: [art] PUB.Y = F6CE2163C1CC92FE50AF6CED6D38D9DE1F316B967EEF502D848F3333B035B3FD6E287844B9B49CEE91122FFB618A3CF4
3,138,930 UART: [art] SIG.R = F443244429C49B875865C7E972ED14EE9DB3586EADAA28EECDFC1DADBB35F13ED39B6590E65AA08305F2585DB1317B97
3,145,711 UART: [art] SIG.S = C643D208CEB26F3CD97CF64712EC15BE7C646F422BA2F10AD7B29429123A5AC21782C3332DD959D665731F1F82EB7D4F
3,169,832 UART: Caliptra RT
3,170,085 UART: [state] CFI Enabled
3,277,337 UART: [rt] RT listening for mailbox commands...
3,278,007 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,079 UART: [rt]cmd =0x44504543, len=28
3,351,371 >>> mbox cmd response data (2076 bytes)
3,351,372 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,380,897 UART: [rt]cmd =0x44504543, len=28
3,422,224 >>> mbox cmd response data (2076 bytes)
3,422,225 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,454,018 UART: [rt]cmd =0x49444550, len=352
3,464,720 >>> mbox cmd response data (8 bytes)
3,464,721 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,494,348 UART: [rt]cmd =0x44504543, len=28
3,537,340 >>> mbox cmd response data (2076 bytes)
3,537,341 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,566,710 UART: [rt]cmd =0x44504543, len=28
3,608,599 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,627 ready_for_fw is high
1,059,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,022 >>> mbox cmd response: success
2,685,592 UART:
2,685,608 UART: Running Caliptra FMC ...
2,686,016 UART:
2,686,070 UART: [state] CFI Enabled
2,696,715 UART: [fht] FMC Alias Private Key: 7
2,803,944 UART: [art] Extend RT PCRs Done
2,804,372 UART: [art] Lock RT PCRs Done
2,805,992 UART: [art] Populate DV Done
2,814,097 UART: [fht] FMC Alias Private Key: 7
2,815,153 UART: [art] Derive CDI
2,815,433 UART: [art] Store in in slot 0x4
2,900,788 UART: [art] Derive Key Pair
2,901,148 UART: [art] Store priv key in slot 0x5
2,914,636 UART: [art] Derive Key Pair - Done
2,929,769 UART: [art] Signing Cert with AUTHO
2,930,249 UART: RITY.KEYID = 7
2,945,147 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,912 UART: [art] PUB.X = 2EED007A07EC2055DB12FF8F9A7BBECD26EC25E16BA8716B26F76EE7EB259B113155428A7673949F8E2D09FE2AD50177
2,952,663 UART: [art] PUB.Y = 020A5579E3EEA8181FE34570D6F84E650222C1CF8780D49488CA426ECE22AA95A2B175F9BD25C36034F81CEA8D9CC719
2,959,610 UART: [art] SIG.R = 2E7907088E4CFE5A549C64CDA2585ABDFEA5546AC7DA2B88ED7D46CB6D522F391EEA58C5DD3AD6EAAFA2C5EA0A7BC3AF
2,966,407 UART: [art] SIG.S = 0574F193C7E6412B6C09AA2C69F332442A01D7937420F3F25308B868C649F11DDE4D3F8FB2CF36DFC3B09A285F96A12D
2,990,000 UART: Caliptra RT
2,990,253 UART: [state] CFI Enabled
3,098,410 UART: [rt] RT listening for mailbox commands...
3,099,080 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,924 UART: [rt]cmd =0x44504543, len=28
3,172,004 >>> mbox cmd response data (2076 bytes)
3,172,005 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,201,538 UART: [rt]cmd =0x44504543, len=28
3,242,648 >>> mbox cmd response data (2076 bytes)
3,242,649 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,227 UART: [rt]cmd =0x49444550, len=353
3,287,545 >>> mbox cmd response data (8 bytes)
3,287,546 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,137 UART: [rt]cmd =0x44504543, len=28
3,360,207 >>> mbox cmd response data (2076 bytes)
3,360,208 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,389,701 UART: [rt]cmd =0x44504543, len=28
3,431,025 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,891 UART: [state] LifecycleState = Unprovisioned
85,546 UART: [state] DebugLocked = No
86,144 UART: [state] WD Timer not started. Device not locked for debugging
87,297 UART: [kat] SHA2-256
892,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,072 UART: [kat] ++
897,224 UART: [kat] sha1
901,538 UART: [kat] SHA2-256
903,478 UART: [kat] SHA2-384
906,165 UART: [kat] SHA2-512-ACC
908,066 UART: [kat] ECC-384
917,335 UART: [kat] HMAC-384Kdf
921,835 UART: [kat] LMS
1,170,163 UART: [kat] --
1,170,936 UART: [cold-reset] ++
1,171,316 UART: [fht] FHT @ 0x50003400
1,173,867 UART: [idev] ++
1,174,035 UART: [idev] CDI.KEYID = 6
1,174,395 UART: [idev] SUBJECT.KEYID = 7
1,174,819 UART: [idev] UDS.KEYID = 0
1,175,164 ready_for_fw is high
1,175,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,451 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,207,868 UART: [idev] --
1,208,938 UART: [ldev] ++
1,209,106 UART: [ldev] CDI.KEYID = 6
1,209,469 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,316 UART: [ldev] --
1,280,713 UART: [fwproc] Wait for Commands...
1,281,323 UART: [fwproc] Recv command 0x46574c44
1,282,051 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,156 >>> mbox cmd response: success
2,771,376 UART: [afmc] ++
2,771,544 UART: [afmc] CDI.KEYID = 6
2,771,906 UART: [afmc] SUBJECT.KEYID = 7
2,772,331 UART: [afmc] AUTHORITY.KEYID = 5
2,808,148 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,335 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,063 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,948 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,667 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,407 UART: [afmc] --
2,851,327 UART: [cold-reset] --
2,852,393 UART: [state] Locking Datavault
2,853,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,370 UART: [state] Locking ICCM
2,855,022 UART: [exit] Launching FMC @ 0x40000130
2,860,351 UART:
2,860,367 UART: Running Caliptra FMC ...
2,860,775 UART:
2,860,918 UART: [state] CFI Enabled
2,871,613 UART: [fht] FMC Alias Private Key: 7
2,979,310 UART: [art] Extend RT PCRs Done
2,979,738 UART: [art] Lock RT PCRs Done
2,981,188 UART: [art] Populate DV Done
2,989,401 UART: [fht] FMC Alias Private Key: 7
2,990,503 UART: [art] Derive CDI
2,990,783 UART: [art] Store in in slot 0x4
3,076,584 UART: [art] Derive Key Pair
3,076,944 UART: [art] Store priv key in slot 0x5
3,090,166 UART: [art] Derive Key Pair - Done
3,104,736 UART: [art] Signing Cert with AUTHO
3,105,216 UART: RITY.KEYID = 7
3,120,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,271 UART: [art] PUB.X = 11C90C2F46427CBFF2A7C6B44723C48992F51A88C348E686BBB8167FA370BAB8B091FA007CFB19170710605CDF4F4999
3,128,017 UART: [art] PUB.Y = F09B19DDCA5F3E0C941F1967782C40C4141739045D038A9E105C241A525C0976FCB500F70E305D87CC14FF139C331D18
3,134,928 UART: [art] SIG.R = 7D7B94F9B3D8FEC4727DCDB19FC9A933C4F3C1CA250C9EFF3C1FFC342FC363B36F3ABF892527B7F9A5B95FF0909F890E
3,141,716 UART: [art] SIG.S = 5B8A62019F97A62F0F4C7284BB550BBA6EFF4135AEDDAEEDD583C286FB75D78D0C454B3918A1FAA0CF59346748F2C208
3,165,178 UART: Caliptra RT
3,165,523 UART: [state] CFI Enabled
3,274,660 UART: [rt] RT listening for mailbox commands...
3,275,330 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,442 UART: [rt]cmd =0x44504543, len=28
3,348,322 >>> mbox cmd response data (2076 bytes)
3,348,323 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,377,890 UART: [rt]cmd =0x44504543, len=28
3,418,972 >>> mbox cmd response data (2076 bytes)
3,418,973 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,450,544 UART: [rt]cmd =0x49444550, len=352
3,461,285 >>> mbox cmd response data (8 bytes)
3,461,286 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,490,759 UART: [rt]cmd =0x44504543, len=28
3,534,281 >>> mbox cmd response data (2076 bytes)
3,534,282 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,683 UART: [rt]cmd =0x44504543, len=28
3,605,107 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,024 ready_for_fw is high
1,061,024 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,327 >>> mbox cmd response: success
2,688,517 UART:
2,688,533 UART: Running Caliptra FMC ...
2,688,941 UART:
2,689,084 UART: [state] CFI Enabled
2,699,283 UART: [fht] FMC Alias Private Key: 7
2,807,376 UART: [art] Extend RT PCRs Done
2,807,804 UART: [art] Lock RT PCRs Done
2,809,168 UART: [art] Populate DV Done
2,817,575 UART: [fht] FMC Alias Private Key: 7
2,818,591 UART: [art] Derive CDI
2,818,871 UART: [art] Store in in slot 0x4
2,904,696 UART: [art] Derive Key Pair
2,905,056 UART: [art] Store priv key in slot 0x5
2,918,254 UART: [art] Derive Key Pair - Done
2,933,185 UART: [art] Signing Cert with AUTHO
2,933,665 UART: RITY.KEYID = 7
2,948,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,754 UART: [art] PUB.X = 408667EB30D1F25C792B665C9D0AD4EF6683B38E9D3EEC8D3BAF20248F370A7BEEAD709796DDD551F1454A045D432A01
2,956,522 UART: [art] PUB.Y = 397039D49701EEA49429ED9A901787672F816C2C484D18E638EEBE3998557610998C91C4D90157BB653277384BCFE03C
2,963,456 UART: [art] SIG.R = B5462C1088797AEB2F8B98B446529A3AB06C3DAD1DF176D963E1169B3E3A9F4BBE73E4B7BFA642C7D5720E5D3BD1EE3E
2,970,241 UART: [art] SIG.S = 011FF233BC0650EDFA280EC766D4C970D8F726E43477788B82F3FAB6655505BBE5AD3D243AC2D60BAFCFDC5BE193D205
2,994,032 UART: Caliptra RT
2,994,377 UART: [state] CFI Enabled
3,101,044 UART: [rt] RT listening for mailbox commands...
3,101,714 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,572 UART: [rt]cmd =0x44504543, len=28
3,174,916 >>> mbox cmd response data (2076 bytes)
3,174,917 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,204,510 UART: [rt]cmd =0x44504543, len=28
3,245,428 >>> mbox cmd response data (2076 bytes)
3,245,429 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,997 UART: [rt]cmd =0x49444550, len=353
3,290,240 >>> mbox cmd response data (8 bytes)
3,290,241 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,630 UART: [rt]cmd =0x44504543, len=28
3,362,872 >>> mbox cmd response data (2076 bytes)
3,362,873 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,496 UART: [rt]cmd =0x44504543, len=28
3,434,179 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,321 UART: [kat] ++
895,473 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,504 UART: [kat] LMS
1,168,816 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,707 UART: [idev] ++
1,172,875 UART: [idev] CDI.KEYID = 6
1,173,236 UART: [idev] SUBJECT.KEYID = 7
1,173,661 UART: [idev] UDS.KEYID = 0
1,174,007 ready_for_fw is high
1,174,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,993 UART: [idev] Sha1 KeyId Algorithm
1,207,997 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,241,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,280,924 UART: [fwproc] Wait for Commands...
1,281,719 UART: [fwproc] Recv command 0x46574c44
1,282,452 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,818 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,575 >>> mbox cmd response: success
2,771,766 UART: [afmc] ++
2,771,934 UART: [afmc] CDI.KEYID = 6
2,772,297 UART: [afmc] SUBJECT.KEYID = 7
2,772,723 UART: [afmc] AUTHORITY.KEYID = 5
2,807,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,972 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,855 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,485 UART: [afmc] --
2,851,435 UART: [cold-reset] --
2,852,221 UART: [state] Locking Datavault
2,853,352 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,956 UART: [state] Locking ICCM
2,854,534 UART: [exit] Launching FMC @ 0x40000130
2,859,863 UART:
2,859,879 UART: Running Caliptra FMC ...
2,860,287 UART:
2,860,341 UART: [state] CFI Enabled
2,870,888 UART: [fht] FMC Alias Private Key: 7
2,978,829 UART: [art] Extend RT PCRs Done
2,979,257 UART: [art] Lock RT PCRs Done
2,980,615 UART: [art] Populate DV Done
2,988,978 UART: [fht] FMC Alias Private Key: 7
2,990,064 UART: [art] Derive CDI
2,990,344 UART: [art] Store in in slot 0x4
3,076,013 UART: [art] Derive Key Pair
3,076,373 UART: [art] Store priv key in slot 0x5
3,089,159 UART: [art] Derive Key Pair - Done
3,104,042 UART: [art] Signing Cert with AUTHO
3,104,522 UART: RITY.KEYID = 7
3,119,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,729 UART: [art] PUB.X = 5B35C97AB2082486D2AEFE10396167BF4C04674299F69D2CEB1C3CE6F7321716752D20635300B1499B77DF217A8F4A7C
3,127,469 UART: [art] PUB.Y = 540FD88190B8B115C7A8C79D5B9E43E165EDA4106A675CC0CA42B88E045144732E8CB6559E147F18209D4FF298A584FE
3,134,415 UART: [art] SIG.R = 47B214985BCF0D72B52A5A6C4642670D45FB82E1C632A7ED5EB37633D1FBA92A78F9EEB5A681A9911B34886F53D76C30
3,141,185 UART: [art] SIG.S = D55533376C77D5F100A2DD31F2564532790EB492DA8FC0EAD57288E65586579EC6CCC748BCA30AE6BA99221A1AB767B4
3,165,216 UART: Caliptra RT
3,165,469 UART: [state] CFI Enabled
3,272,504 UART: [rt] RT listening for mailbox commands...
3,273,174 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,382 UART: [rt]cmd =0x44504543, len=28
3,346,426 >>> mbox cmd response data (2076 bytes)
3,346,427 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,376,154 UART: [rt]cmd =0x44504543, len=28
3,417,122 >>> mbox cmd response data (2076 bytes)
3,417,123 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,448,895 UART: [rt]cmd =0x49444550, len=353
3,462,142 >>> mbox cmd response data (8 bytes)
3,462,143 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,491,640 UART: [rt]cmd =0x44504543, len=28
3,534,856 >>> mbox cmd response data (2076 bytes)
3,534,857 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,564,352 UART: [rt]cmd =0x44504543, len=28
3,605,615 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,072 ready_for_fw is high
1,056,072 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,769 >>> mbox cmd response: success
2,682,783 UART:
2,682,799 UART: Running Caliptra FMC ...
2,683,207 UART:
2,683,261 UART: [state] CFI Enabled
2,693,982 UART: [fht] FMC Alias Private Key: 7
2,802,509 UART: [art] Extend RT PCRs Done
2,802,937 UART: [art] Lock RT PCRs Done
2,804,417 UART: [art] Populate DV Done
2,812,758 UART: [fht] FMC Alias Private Key: 7
2,813,744 UART: [art] Derive CDI
2,814,024 UART: [art] Store in in slot 0x4
2,899,511 UART: [art] Derive Key Pair
2,899,871 UART: [art] Store priv key in slot 0x5
2,912,609 UART: [art] Derive Key Pair - Done
2,927,307 UART: [art] Signing Cert with AUTHO
2,927,787 UART: RITY.KEYID = 7
2,943,057 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,822 UART: [art] PUB.X = 4E3448D1CE61170AC7B86B57DBE3A4CF6049B4FECB13ACE5771E493BF1038DC2F5A43827F92EF5096B1A1EAB7E6EDD16
2,950,603 UART: [art] PUB.Y = 027594B552C07A6C41402365CBDB0A3A52C064C0359000C1D0A0CC7BA89C6C73F54BF6434BD3EFD4AE5793F3429749B4
2,957,529 UART: [art] SIG.R = FF304588C0A629E84D494FD744E1DA3D28E17B7BD0178AB1EAAA28992A1173D164A45BC8255E115CBAB7D9EF2E815D36
2,964,311 UART: [art] SIG.S = 61F55723A17795BF4994CE63C693690227496A61A432AD4B84434E07C61D980EA9FD5A9DB7D49BAC145C5B0B5FDF289F
2,987,910 UART: Caliptra RT
2,988,163 UART: [state] CFI Enabled
3,095,748 UART: [rt] RT listening for mailbox commands...
3,096,418 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,560 UART: [rt]cmd =0x44504543, len=28
3,169,948 >>> mbox cmd response data (2076 bytes)
3,169,949 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,199,384 UART: [rt]cmd =0x44504543, len=28
3,240,492 >>> mbox cmd response data (2076 bytes)
3,240,493 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,128 UART: [rt]cmd =0x49444550, len=352
3,282,875 >>> mbox cmd response data (8 bytes)
3,282,876 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,329 UART: [rt]cmd =0x44504543, len=28
3,355,563 >>> mbox cmd response data (2076 bytes)
3,355,564 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,385,211 UART: [rt]cmd =0x44504543, len=28
3,426,315 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,991 UART: [state] LifecycleState = Unprovisioned
85,646 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,368 UART: [fht] FHT @ 0x50003400
1,173,062 UART: [idev] ++
1,173,230 UART: [idev] CDI.KEYID = 6
1,173,591 UART: [idev] SUBJECT.KEYID = 7
1,174,016 UART: [idev] UDS.KEYID = 0
1,174,362 ready_for_fw is high
1,174,362 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,636 UART: [idev] Erasing UDS.KEYID = 0
1,198,464 UART: [idev] Sha1 KeyId Algorithm
1,207,438 UART: [idev] --
1,208,631 UART: [ldev] ++
1,208,799 UART: [ldev] CDI.KEYID = 6
1,209,163 UART: [ldev] SUBJECT.KEYID = 5
1,209,590 UART: [ldev] AUTHORITY.KEYID = 7
1,210,053 UART: [ldev] FE.KEYID = 1
1,215,335 UART: [ldev] Erasing FE.KEYID = 1
1,241,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,631 UART: [ldev] --
1,280,027 UART: [fwproc] Wait for Commands...
1,280,744 UART: [fwproc] Recv command 0x46574c44
1,281,477 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,605 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,914 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,488 >>> mbox cmd response: success
2,769,553 UART: [afmc] ++
2,769,721 UART: [afmc] CDI.KEYID = 6
2,770,084 UART: [afmc] SUBJECT.KEYID = 7
2,770,510 UART: [afmc] AUTHORITY.KEYID = 5
2,806,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,096 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,825 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,708 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,427 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,166 UART: [afmc] --
2,850,060 UART: [cold-reset] --
2,850,696 UART: [state] Locking Datavault
2,852,087 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,691 UART: [state] Locking ICCM
2,853,151 UART: [exit] Launching FMC @ 0x40000130
2,858,480 UART:
2,858,496 UART: Running Caliptra FMC ...
2,858,904 UART:
2,859,047 UART: [state] CFI Enabled
2,869,736 UART: [fht] FMC Alias Private Key: 7
2,977,773 UART: [art] Extend RT PCRs Done
2,978,201 UART: [art] Lock RT PCRs Done
2,979,687 UART: [art] Populate DV Done
2,987,972 UART: [fht] FMC Alias Private Key: 7
2,988,912 UART: [art] Derive CDI
2,989,192 UART: [art] Store in in slot 0x4
3,074,725 UART: [art] Derive Key Pair
3,075,085 UART: [art] Store priv key in slot 0x5
3,088,307 UART: [art] Derive Key Pair - Done
3,103,030 UART: [art] Signing Cert with AUTHO
3,103,510 UART: RITY.KEYID = 7
3,118,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,211 UART: [art] PUB.X = CC1A65F3AAED07C4A66436F44E29D31588413601C0232FBF0C5D752BB568A128BD79E8356B1409F4DA022D3C9E20D4B2
3,125,972 UART: [art] PUB.Y = 13F2E2194F0453D7852FD522FCCA59122F4F467F2FD17FAFD9F308094BC4A1BF08CE88C2089810EC1E31A4525B6D79AA
3,132,917 UART: [art] SIG.R = 225B2F81EA0107CEC7E4BBE30684F12684084C2C17963EB696BD27C5148695375EB101DE75EC49DD940F6CBF77CEC783
3,139,675 UART: [art] SIG.S = E6C6ECB9F62B96E1D876AC4E96FC677C7C57BB826A6B5BEE0E5E864B97CB9CC37C56B7C6C69651BC79955C7BE31CE5CD
3,163,289 UART: Caliptra RT
3,163,634 UART: [state] CFI Enabled
3,271,413 UART: [rt] RT listening for mailbox commands...
3,272,083 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,143 UART: [rt]cmd =0x44504543, len=28
3,345,207 >>> mbox cmd response data (2076 bytes)
3,345,208 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,877 UART: [rt]cmd =0x44504543, len=28
3,415,821 >>> mbox cmd response data (2076 bytes)
3,415,822 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,447,505 UART: [rt]cmd =0x49444550, len=352
3,458,398 >>> mbox cmd response data (8 bytes)
3,458,399 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,488,054 UART: [rt]cmd =0x44504543, len=28
3,531,336 >>> mbox cmd response data (2076 bytes)
3,531,337 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,560,972 UART: [rt]cmd =0x44504543, len=28
3,602,698 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,105 ready_for_fw is high
1,057,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,398 >>> mbox cmd response: success
2,683,120 UART:
2,683,136 UART: Running Caliptra FMC ...
2,683,544 UART:
2,683,687 UART: [state] CFI Enabled
2,694,168 UART: [fht] FMC Alias Private Key: 7
2,802,197 UART: [art] Extend RT PCRs Done
2,802,625 UART: [art] Lock RT PCRs Done
2,804,065 UART: [art] Populate DV Done
2,812,240 UART: [fht] FMC Alias Private Key: 7
2,813,174 UART: [art] Derive CDI
2,813,454 UART: [art] Store in in slot 0x4
2,899,519 UART: [art] Derive Key Pair
2,899,879 UART: [art] Store priv key in slot 0x5
2,913,265 UART: [art] Derive Key Pair - Done
2,927,913 UART: [art] Signing Cert with AUTHO
2,928,393 UART: RITY.KEYID = 7
2,943,051 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,816 UART: [art] PUB.X = FA599E2FEFF60AF8BA65CABF23265BDBBC9D18E37EC52223357E6CE1B6FA84E39086B9D6221B1979BF027AFA47F4D15E
2,950,602 UART: [art] PUB.Y = D3494B1A1C701E33454BC4D64A5DAE2DE5D856E3F6B57D49036A386896953E0561CED6ACEB01E4B64F3E8DED40E72B08
2,957,552 UART: [art] SIG.R = BA557EA3B98CC877DF124CB1387EF8830A789D824FD74A79D186D7C6B940FB8F15CA76FBE68E190CE1B688EB318338E1
2,964,328 UART: [art] SIG.S = E8E73B9B659954825CE64086EB7FC6FA5B0B62E5B2C567A586C3DE59A4A7862A25F42DBA11F7FFD8CFDA0BBF56C38837
2,988,275 UART: Caliptra RT
2,988,620 UART: [state] CFI Enabled
3,095,814 UART: [rt] RT listening for mailbox commands...
3,096,484 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,292 UART: [rt]cmd =0x44504543, len=28
3,169,178 >>> mbox cmd response data (2076 bytes)
3,169,179 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,198,754 UART: [rt]cmd =0x44504543, len=28
3,239,843 >>> mbox cmd response data (2076 bytes)
3,239,844 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,271,558 UART: [rt]cmd =0x49444550, len=353
3,284,854 >>> mbox cmd response data (8 bytes)
3,284,855 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,476 UART: [rt]cmd =0x44504543, len=28
3,358,082 >>> mbox cmd response data (2076 bytes)
3,358,083 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,387,664 UART: [rt]cmd =0x44504543, len=28
3,428,978 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,025 UART:
192,392 UART: Running Caliptra ROM ...
193,573 UART:
193,753 UART: [state] CFI Enabled
263,802 UART: [state] LifecycleState = Unprovisioned
265,505 UART: [state] DebugLocked = No
266,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,178 UART: [kat] SHA2-256
440,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,365 UART: [kat] ++
451,808 UART: [kat] sha1
462,676 UART: [kat] SHA2-256
465,391 UART: [kat] SHA2-384
471,444 UART: [kat] SHA2-512-ACC
473,811 UART: [kat] ECC-384
2,767,574 UART: [kat] HMAC-384Kdf
2,798,919 UART: [kat] LMS
3,989,217 UART: [kat] --
3,993,521 UART: [cold-reset] ++
3,995,127 UART: [fht] Storing FHT @ 0x50003400
4,006,535 UART: [idev] ++
4,007,100 UART: [idev] CDI.KEYID = 6
4,008,129 UART: [idev] SUBJECT.KEYID = 7
4,009,298 UART: [idev] UDS.KEYID = 0
4,010,332 ready_for_fw is high
4,010,532 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,725 UART: [idev] Erasing UDS.KEYID = 0
7,342,702 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,827 UART: [idev] --
7,367,973 UART: [ldev] ++
7,368,539 UART: [ldev] CDI.KEYID = 6
7,369,472 UART: [ldev] SUBJECT.KEYID = 5
7,370,732 UART: [ldev] AUTHORITY.KEYID = 7
7,371,954 UART: [ldev] FE.KEYID = 1
7,399,922 UART: [ldev] Erasing FE.KEYID = 1
10,733,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,968 UART: [ldev] --
13,093,202 UART: [fwproc] Waiting for Commands...
13,095,834 UART: [fwproc] Received command 0x46574c44
13,098,009 UART: [fwproc] Received Image of size 113844 bytes
17,144,386 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,810 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,607,440 >>> mbox cmd response: success
17,611,486 UART: [afmc] ++
17,612,080 UART: [afmc] CDI.KEYID = 6
17,613,025 UART: [afmc] SUBJECT.KEYID = 7
17,614,252 UART: [afmc] AUTHORITY.KEYID = 5
20,984,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,284,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,286,754 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,146 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,315,998 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,330,437 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,678 UART: [afmc] --
23,355,785 UART: [cold-reset] --
23,360,171 UART: [state] Locking Datavault
23,365,855 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,602 UART: [state] Locking ICCM
23,369,505 UART: [exit] Launching FMC @ 0x40000130
23,377,891 UART:
23,378,119 UART: Running Caliptra FMC ...
23,379,140 UART:
23,379,300 UART: [state] CFI Enabled
23,445,319 UART: [fht] FMC Alias Private Key: 7
25,783,789 UART: [art] Extend RT PCRs Done
25,785,014 UART: [art] Lock RT PCRs Done
25,786,444 UART: [art] Populate DV Done
25,791,925 UART: [fht] FMC Alias Private Key: 7
25,793,400 UART: [art] Derive CDI
25,794,125 UART: [art] Store in in slot 0x4
25,854,284 UART: [art] Derive Key Pair
25,855,278 UART: [art] Store priv key in slot 0x5
29,147,728 UART: [art] Derive Key Pair - Done
29,160,615 UART: [art] Signing Cert with AUTHO
29,161,921 UART: RITY.KEYID = 7
31,449,692 UART: [art] Erasing AUTHORITY.KEYID = 7
31,451,208 UART: [art] PUB.X = 3BF5ABEF7B9B0D4FFCF4C2432388A7D101975F998343108296BC3AA2BE4F295B9F82EBA4F6C262142599DA6EAB92077F
31,458,428 UART: [art] PUB.Y = D0EC5D81233CE189B4601095219840FFEE1215DBEB51E73E612103DFEE5D931D96B24C8E210C2776226A141F0C9CAAC9
31,465,688 UART: [art] SIG.R = 75575BBC8F4D8EF37FA423A76B23E076EA6830CE8CFD8E4A493F52518E9FF59517605C15AD8453B94608801D2E4052E9
31,473,053 UART: [art] SIG.S = A45E3C09A9F5773E2A9D87541CA56A8E8D816DF82B31CDA49BC0A4A6392C47106A1601F588C00B2568A66BBC3B3DC559
32,778,073 UART: Caliptra RT
32,778,771 UART: [state] CFI Enabled
32,940,757 UART: [rt] RT listening for mailbox commands...
32,943,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,974,129 UART: [rt]cmd =0x44504543, len=96
38,738,500 >>> mbox cmd response data (6236 bytes)
38,767,781 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,798,073 UART: [rt]cmd =0x52564348, len=36
38,800,844 >>> mbox cmd response data (8 bytes)
38,801,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,831,582 UART: [rt]cmd =0x44504543, len=96
44,582,792 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,785,659 ready_for_fw is high
3,786,291 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,870,252 >>> mbox cmd response: success
23,565,399 UART:
23,565,786 UART: Running Caliptra FMC ...
23,566,914 UART:
23,567,066 UART: [state] CFI Enabled
23,618,732 UART: [fht] FMC Alias Private Key: 7
25,956,308 UART: [art] Extend RT PCRs Done
25,957,559 UART: [art] Lock RT PCRs Done
25,959,340 UART: [art] Populate DV Done
25,964,910 UART: [fht] FMC Alias Private Key: 7
25,966,625 UART: [art] Derive CDI
25,967,449 UART: [art] Store in in slot 0x4
26,026,841 UART: [art] Derive Key Pair
26,027,906 UART: [art] Store priv key in slot 0x5
29,320,534 UART: [art] Derive Key Pair - Done
29,333,374 UART: [art] Signing Cert with AUTHO
29,334,669 UART: RITY.KEYID = 7
31,622,716 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,219 UART: [art] PUB.X = A8BF50985A01FA4E8C9B979F1C4B437E94F1775788135D155E48E1E7727318C1338C0753D84E0C4CB41752A5B7CF7E9D
31,631,484 UART: [art] PUB.Y = 118218E55B8920E831D332544F8999D19BA3D96802BEF0884724290E593F0C36A69665887D6A7F002BFA89200D6A4171
31,638,648 UART: [art] SIG.R = 9AEF55632F3D9C78EA5556BDF372DD40D3B378FA5A4BDF9EF9D597E61207D5884BAB7523EEC13BCFD09229E1DA459A43
31,646,046 UART: [art] SIG.S = 1B1FCF268045D116EE8FFF09549F17AE633B0BF732E96EA27B6F8050BAC4E93D88DD68B4E8BAECE1080CDF4D8C61CB9F
32,950,933 UART: Caliptra RT
32,951,653 UART: [state] CFI Enabled
33,114,297 UART: [rt] RT listening for mailbox commands...
33,116,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,148,045 UART: [rt]cmd =0x44504543, len=96
38,910,581 >>> mbox cmd response data (6236 bytes)
38,939,647 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,969,755 UART: [rt]cmd =0x52564348, len=36
38,972,620 >>> mbox cmd response data (8 bytes)
38,973,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,003,698 UART: [rt]cmd =0x44504543, len=96
44,777,327 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,339 writing to cptra_bootfsm_go
194,428 UART:
194,786 UART: Running Caliptra ROM ...
195,891 UART:
605,687 UART: [state] CFI Enabled
620,921 UART: [state] LifecycleState = Unprovisioned
622,868 UART: [state] DebugLocked = No
625,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,804 UART: [kat] SHA2-256
799,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,117 UART: [kat] ++
810,566 UART: [kat] sha1
822,580 UART: [kat] SHA2-256
825,307 UART: [kat] SHA2-384
830,449 UART: [kat] SHA2-512-ACC
832,815 UART: [kat] ECC-384
3,116,544 UART: [kat] HMAC-384Kdf
3,127,923 UART: [kat] LMS
4,318,039 UART: [kat] --
4,322,906 UART: [cold-reset] ++
4,324,066 UART: [fht] Storing FHT @ 0x50003400
4,337,353 UART: [idev] ++
4,337,922 UART: [idev] CDI.KEYID = 6
4,338,806 UART: [idev] SUBJECT.KEYID = 7
4,340,117 UART: [idev] UDS.KEYID = 0
4,341,079 ready_for_fw is high
4,341,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,241 UART: [idev] Erasing UDS.KEYID = 0
7,632,604 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,727 UART: [idev] --
7,658,713 UART: [ldev] ++
7,659,278 UART: [ldev] CDI.KEYID = 6
7,660,245 UART: [ldev] SUBJECT.KEYID = 5
7,661,459 UART: [ldev] AUTHORITY.KEYID = 7
7,662,698 UART: [ldev] FE.KEYID = 1
7,674,210 UART: [ldev] Erasing FE.KEYID = 1
10,962,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,258,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,272,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,287,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,302,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,321,409 UART: [ldev] --
13,327,070 UART: [fwproc] Waiting for Commands...
13,328,682 UART: [fwproc] Received command 0x46574c44
13,330,916 UART: [fwproc] Received Image of size 113844 bytes
17,375,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,536 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,841,480 >>> mbox cmd response: success
17,846,449 UART: [afmc] ++
17,847,051 UART: [afmc] CDI.KEYID = 6
17,847,968 UART: [afmc] SUBJECT.KEYID = 7
17,849,239 UART: [afmc] AUTHORITY.KEYID = 5
21,161,551 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,423 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,838 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,646 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,091 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,415 UART: [afmc] --
23,525,533 UART: [cold-reset] --
23,528,583 UART: [state] Locking Datavault
23,534,752 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,515 UART: [state] Locking ICCM
23,538,238 UART: [exit] Launching FMC @ 0x40000130
23,546,632 UART:
23,546,869 UART: Running Caliptra FMC ...
23,547,970 UART:
23,548,132 UART: [state] CFI Enabled
23,556,436 UART: [fht] FMC Alias Private Key: 7
25,887,004 UART: [art] Extend RT PCRs Done
25,888,227 UART: [art] Lock RT PCRs Done
25,889,527 UART: [art] Populate DV Done
25,895,002 UART: [fht] FMC Alias Private Key: 7
25,896,564 UART: [art] Derive CDI
25,897,382 UART: [art] Store in in slot 0x4
25,939,813 UART: [art] Derive Key Pair
25,940,850 UART: [art] Store priv key in slot 0x5
29,183,034 UART: [art] Derive Key Pair - Done
29,196,353 UART: [art] Signing Cert with AUTHO
29,197,690 UART: RITY.KEYID = 7
31,477,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,667 UART: [art] PUB.X = A8F106A81CB80A92A4C47582248DCF108424137637F32EE2B4656E7D7D4E76F328128B39968E38E1490B2EFF990B29EA
31,485,930 UART: [art] PUB.Y = 216D439CEFB1E2B5202E674422934915A7435EF111B815EC5D0C5F862CEFC7FB6F9369C7C6911DD952E111B6FC758CB8
31,493,185 UART: [art] SIG.R = A5C11F863FBD35D4FAB8EB214AE3A02F8F3935D899A39AA353B60277332BA89C10C22961CA1AD7F8C4F04BB65CDDFCE9
31,500,521 UART: [art] SIG.S = 847EE784E2172EE2242AADC42136FE984834AC9AFB7B160902AE884929591903A36A2BB497DCD4E0F8319838E280BD16
32,806,114 UART: Caliptra RT
32,806,840 UART: [state] CFI Enabled
32,923,854 UART: [rt] RT listening for mailbox commands...
32,926,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,957,304 UART: [rt]cmd =0x44504543, len=96
38,631,061 >>> mbox cmd response data (6236 bytes)
38,660,298 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,690,525 UART: [rt]cmd =0x52564348, len=36
38,692,899 >>> mbox cmd response data (8 bytes)
38,693,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,723,531 UART: [rt]cmd =0x44504543, len=96
44,395,811 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,515 writing to cptra_bootfsm_go
4,127,850 ready_for_fw is high
4,128,430 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,061,818 >>> mbox cmd response: success
23,704,471 UART:
23,704,870 UART: Running Caliptra FMC ...
23,705,985 UART:
23,706,139 UART: [state] CFI Enabled
23,714,227 UART: [fht] FMC Alias Private Key: 7
26,045,477 UART: [art] Extend RT PCRs Done
26,046,710 UART: [art] Lock RT PCRs Done
26,048,369 UART: [art] Populate DV Done
26,053,909 UART: [fht] FMC Alias Private Key: 7
26,055,454 UART: [art] Derive CDI
26,056,220 UART: [art] Store in in slot 0x4
26,098,977 UART: [art] Derive Key Pair
26,099,981 UART: [art] Store priv key in slot 0x5
29,343,346 UART: [art] Derive Key Pair - Done
29,356,131 UART: [art] Signing Cert with AUTHO
29,357,437 UART: RITY.KEYID = 7
31,636,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,989 UART: [art] PUB.X = CE4A4A29A021DDCA12CF68F3A18E32AE1162B9D3472448C0F29FF25B063618AE05FA35AB521F7FEA912E5B18621CA592
31,645,267 UART: [art] PUB.Y = 05553BD68A42538E755B818DBC7ED08979B0AF1C81A2BFEA51ACED7DD144BF01920FCA97174BA754CEDECD24861A47D5
31,652,472 UART: [art] SIG.R = 0F07B32649A2BACF3581661941142A6BCBF205B834441AD096B212A13A1D1F80C0302E4A75540FB0392F5C0795D5E0F7
31,659,844 UART: [art] SIG.S = 6D33D1C6BA5172F7C7BE5E63DE3FEB44C593AD37F86234D0E527516E1EEF87FD0A43711FEFA5170BFD3BFD94430672F5
32,965,447 UART: Caliptra RT
32,966,160 UART: [state] CFI Enabled
33,083,335 UART: [rt] RT listening for mailbox commands...
33,085,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,117,040 UART: [rt]cmd =0x44504543, len=96
38,789,958 >>> mbox cmd response data (6236 bytes)
38,819,022 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,849,255 UART: [rt]cmd =0x52564348, len=36
38,851,779 >>> mbox cmd response data (8 bytes)
38,852,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,882,709 UART: [rt]cmd =0x44504543, len=96
44,556,994 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,185 UART:
192,554 UART: Running Caliptra ROM ...
193,751 UART:
193,909 UART: [state] CFI Enabled
260,646 UART: [state] LifecycleState = Unprovisioned
262,548 UART: [state] DebugLocked = No
264,575 UART: [state] WD Timer not started. Device not locked for debugging
268,566 UART: [kat] SHA2-256
447,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,273 UART: [kat] ++
459,804 UART: [kat] sha1
470,947 UART: [kat] SHA2-256
473,993 UART: [kat] SHA2-384
480,346 UART: [kat] SHA2-512-ACC
483,280 UART: [kat] ECC-384
2,948,436 UART: [kat] HMAC-384Kdf
2,971,396 UART: [kat] LMS
3,500,780 UART: [kat] --
3,504,213 UART: [cold-reset] ++
3,505,467 UART: [fht] FHT @ 0x50003400
3,517,023 UART: [idev] ++
3,517,598 UART: [idev] CDI.KEYID = 6
3,518,482 UART: [idev] SUBJECT.KEYID = 7
3,519,676 UART: [idev] UDS.KEYID = 0
3,520,659 ready_for_fw is high
3,520,885 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,374 UART: [idev] Erasing UDS.KEYID = 0
6,027,335 UART: [idev] Sha1 KeyId Algorithm
6,049,231 UART: [idev] --
6,053,296 UART: [ldev] ++
6,053,885 UART: [ldev] CDI.KEYID = 6
6,054,820 UART: [ldev] SUBJECT.KEYID = 5
6,055,985 UART: [ldev] AUTHORITY.KEYID = 7
6,057,224 UART: [ldev] FE.KEYID = 1
6,099,262 UART: [ldev] Erasing FE.KEYID = 1
8,602,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,805 UART: [ldev] --
10,412,017 UART: [fwproc] Wait for Commands...
10,414,389 UART: [fwproc] Recv command 0x46574c44
10,416,478 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,880,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,949,331 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,267,351 >>> mbox cmd response: success
14,272,308 UART: [afmc] ++
14,272,911 UART: [afmc] CDI.KEYID = 6
14,273,798 UART: [afmc] SUBJECT.KEYID = 7
14,275,019 UART: [afmc] AUTHORITY.KEYID = 5
16,810,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,229 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,249 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,103 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,581 UART: [afmc] --
18,607,795 UART: [cold-reset] --
18,610,896 UART: [state] Locking Datavault
18,616,200 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,845 UART: [state] Locking ICCM
18,620,511 UART: [exit] Launching FMC @ 0x40000130
18,628,922 UART:
18,629,192 UART: Running Caliptra FMC ...
18,630,222 UART:
18,630,369 UART: [state] CFI Enabled
18,690,081 UART: [fht] FMC Alias Private Key: 7
20,454,171 UART: [art] Extend RT PCRs Done
20,455,391 UART: [art] Lock RT PCRs Done
20,456,852 UART: [art] Populate DV Done
20,462,487 UART: [fht] FMC Alias Private Key: 7
20,463,972 UART: [art] Derive CDI
20,464,713 UART: [art] Store in in slot 0x4
20,522,553 UART: [art] Derive Key Pair
20,523,566 UART: [art] Store priv key in slot 0x5
22,986,206 UART: [art] Derive Key Pair - Done
22,999,098 UART: [art] Signing Cert with AUTHO
23,000,406 UART: RITY.KEYID = 7
24,711,930 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,430 UART: [art] PUB.X = 076EBE8A02223E1B78C040D1D200B9B5290BA8EFC7FCBBD82E48D1C6F8868C6AC586B21B2ACE4CEA0211DFF82AE40177
24,720,707 UART: [art] PUB.Y = 04AA271F2697E5375F0D7E1B484C931FAD1E88EEA1AB66384415B23392CAC6C233AB71F0B9BB0E461A7D9D87E32304E9
24,727,947 UART: [art] SIG.R = B7891304BAD6C3099F41E3AEA8493230E2A855DC1162A02688578A09804FF2707BDF94F98C7B5E6AF9A6C87BD96343BA
24,735,317 UART: [art] SIG.S = 91B7818BF35FDC8C471017B470B148A50E6A46EED07070CF6CE0B25209918C0B3C41DC6AD7AFD7A19E19021C23166C6F
25,713,753 UART: Caliptra RT
25,714,462 UART: [state] CFI Enabled
25,879,593 UART: [rt] RT listening for mailbox commands...
25,882,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,913,280 UART: [rt]cmd =0x44504543, len=96
30,291,730 >>> mbox cmd response data (6236 bytes)
30,320,989 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,351,117 UART: [rt]cmd =0x52564348, len=36
30,353,884 >>> mbox cmd response data (8 bytes)
30,354,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,384,924 UART: [rt]cmd =0x44504543, len=96
34,748,828 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,361,519 ready_for_fw is high
3,362,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,077,422 >>> mbox cmd response: success
18,359,955 UART:
18,360,338 UART: Running Caliptra FMC ...
18,361,467 UART:
18,361,627 UART: [state] CFI Enabled
18,430,384 UART: [fht] FMC Alias Private Key: 7
20,194,746 UART: [art] Extend RT PCRs Done
20,195,966 UART: [art] Lock RT PCRs Done
20,197,376 UART: [art] Populate DV Done
20,203,060 UART: [fht] FMC Alias Private Key: 7
20,204,680 UART: [art] Derive CDI
20,205,496 UART: [art] Store in in slot 0x4
20,263,629 UART: [art] Derive Key Pair
20,264,670 UART: [art] Store priv key in slot 0x5
22,727,815 UART: [art] Derive Key Pair - Done
22,740,773 UART: [art] Signing Cert with AUTHO
22,742,087 UART: RITY.KEYID = 7
24,453,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,454,992 UART: [art] PUB.X = DA1FFEECAB2B3EE79E656AF0285A2076689ADCF2C62AE92C5E52B6ABB04C8C8A6D056C7DAA48D861EEE0F7E9A7C14F7A
24,462,279 UART: [art] PUB.Y = EFEC0C2B8F009A9A1AC80EED8C3C39675A4DC7FC8549B4E27221796DFBFD711A48A079D38458FD4905444C3192F166CD
24,469,497 UART: [art] SIG.R = 6E3BEC9A05009D38FDC47705039E28E2D03E0A747BE09A33295CC161B42444405C362F2E2B5BF22D04E234ED4CCCEFA3
24,476,903 UART: [art] SIG.S = 8D62F7ECB6EFD8EF833A3E4B945FE5695B7AD9AE719B7A4A57A0EC303C710080F351C72536CAEF93878ED4F17FA2C270
25,456,558 UART: Caliptra RT
25,457,278 UART: [state] CFI Enabled
25,620,670 UART: [rt] RT listening for mailbox commands...
25,623,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,653,904 UART: [rt]cmd =0x44504543, len=96
30,033,889 >>> mbox cmd response data (6236 bytes)
30,063,191 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,093,324 UART: [rt]cmd =0x52564348, len=36
30,095,589 >>> mbox cmd response data (8 bytes)
30,096,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,126,723 UART: [rt]cmd =0x44504543, len=96
34,491,838 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,890 writing to cptra_bootfsm_go
193,090 UART:
193,456 UART: Running Caliptra ROM ...
194,664 UART:
604,387 UART: [state] CFI Enabled
619,828 UART: [state] LifecycleState = Unprovisioned
621,706 UART: [state] DebugLocked = No
623,082 UART: [state] WD Timer not started. Device not locked for debugging
626,152 UART: [kat] SHA2-256
805,246 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,825 UART: [kat] ++
817,269 UART: [kat] sha1
828,708 UART: [kat] SHA2-256
831,718 UART: [kat] SHA2-384
839,345 UART: [kat] SHA2-512-ACC
842,282 UART: [kat] ECC-384
3,282,670 UART: [kat] HMAC-384Kdf
3,295,968 UART: [kat] LMS
3,825,439 UART: [kat] --
3,830,233 UART: [cold-reset] ++
3,831,682 UART: [fht] FHT @ 0x50003400
3,841,096 UART: [idev] ++
3,841,660 UART: [idev] CDI.KEYID = 6
3,842,688 UART: [idev] SUBJECT.KEYID = 7
3,843,796 UART: [idev] UDS.KEYID = 0
3,844,793 ready_for_fw is high
3,844,984 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,362 UART: [idev] Erasing UDS.KEYID = 0
6,321,535 UART: [idev] Sha1 KeyId Algorithm
6,344,720 UART: [idev] --
6,347,522 UART: [ldev] ++
6,348,091 UART: [ldev] CDI.KEYID = 6
6,349,129 UART: [ldev] SUBJECT.KEYID = 5
6,350,235 UART: [ldev] AUTHORITY.KEYID = 7
6,351,467 UART: [ldev] FE.KEYID = 1
6,361,784 UART: [ldev] Erasing FE.KEYID = 1
8,839,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,135 UART: [ldev] --
10,634,054 UART: [fwproc] Wait for Commands...
10,636,700 UART: [fwproc] Recv command 0x46574c44
10,638,793 UART: [fwproc] Recv'd Img size: 114168 bytes
14,043,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,204 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,507,119 >>> mbox cmd response: success
14,512,095 UART: [afmc] ++
14,512,690 UART: [afmc] CDI.KEYID = 6
14,513,603 UART: [afmc] SUBJECT.KEYID = 7
14,514,758 UART: [afmc] AUTHORITY.KEYID = 5
17,014,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,735,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,737,640 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,753,376 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,769,422 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,785,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,544 UART: [afmc] --
18,812,903 UART: [cold-reset] --
18,816,058 UART: [state] Locking Datavault
18,821,250 UART: [state] Locking PCR0, PCR1 and PCR31
18,822,892 UART: [state] Locking ICCM
18,824,844 UART: [exit] Launching FMC @ 0x40000130
18,833,241 UART:
18,833,537 UART: Running Caliptra FMC ...
18,834,576 UART:
18,834,737 UART: [state] CFI Enabled
18,843,010 UART: [fht] FMC Alias Private Key: 7
20,599,584 UART: [art] Extend RT PCRs Done
20,600,812 UART: [art] Lock RT PCRs Done
20,602,491 UART: [art] Populate DV Done
20,607,476 UART: [fht] FMC Alias Private Key: 7
20,609,016 UART: [art] Derive CDI
20,609,828 UART: [art] Store in in slot 0x4
20,652,369 UART: [art] Derive Key Pair
20,653,412 UART: [art] Store priv key in slot 0x5
23,079,286 UART: [art] Derive Key Pair - Done
23,092,332 UART: [art] Signing Cert with AUTHO
23,093,655 UART: RITY.KEYID = 7
24,798,969 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,466 UART: [art] PUB.X = 280F09756A31D94E56AADF05BF74F7BDF8D4D8DE05D77E526C0A8DF52FB5DAAD163BE44FF456899106A5328B8A8BA525
24,807,772 UART: [art] PUB.Y = 5B05709B1F12CF3DD59F5B624BDDAF45980A2642079869CD602006F431D19774ED7FAD2B21DA3B8E3672C2B78BE256AF
24,815,013 UART: [art] SIG.R = 7AA9000AACBEE41501CB2CC00AF4A7E9FE8AAC72BC0C37FE7F176B033900B955DA69CAEDCCBBD2CA751355F9EA4B4F16
24,822,421 UART: [art] SIG.S = 9C511078B29F2F2BDD59420124C061DEA0ADF0A9B9998C8D440A2EFCD954045BFFA6EA27380F55E432FBA6DCD23203B5
25,801,173 UART: Caliptra RT
25,801,874 UART: [state] CFI Enabled
25,919,870 UART: [rt] RT listening for mailbox commands...
25,922,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,953,112 UART: [rt]cmd =0x44504543, len=96
30,236,848 >>> mbox cmd response data (6236 bytes)
30,265,958 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,296,282 UART: [rt]cmd =0x52564348, len=36
30,299,310 >>> mbox cmd response data (8 bytes)
30,299,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,330,331 UART: [rt]cmd =0x44504543, len=96
34,614,289 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
3,696,556 ready_for_fw is high
3,697,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,506 >>> mbox cmd response: success
18,526,827 UART:
18,527,235 UART: Running Caliptra FMC ...
18,528,379 UART:
18,528,543 UART: [state] CFI Enabled
18,536,456 UART: [fht] FMC Alias Private Key: 7
20,293,164 UART: [art] Extend RT PCRs Done
20,294,388 UART: [art] Lock RT PCRs Done
20,295,855 UART: [art] Populate DV Done
20,301,108 UART: [fht] FMC Alias Private Key: 7
20,302,758 UART: [art] Derive CDI
20,303,576 UART: [art] Store in in slot 0x4
20,345,845 UART: [art] Derive Key Pair
20,346,847 UART: [art] Store priv key in slot 0x5
22,773,287 UART: [art] Derive Key Pair - Done
22,786,084 UART: [art] Signing Cert with AUTHO
22,787,399 UART: RITY.KEYID = 7
24,492,460 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,967 UART: [art] PUB.X = 2E3826CF9A4DB82CA45810BD68BC3B6AD84B03AB0801CABF61A179066751D418563942CB717610AAF597090D5CF65FAA
24,501,223 UART: [art] PUB.Y = 7E46017CC11A0A9C97137D655CB72A35FDF699246720A353DD758330251D9D44843C5A4C35857734EE5F171110BFD44C
24,508,472 UART: [art] SIG.R = 6BE2E35DA3BBF8DA6CBD73F4C8B2780015A8B003DC87FABC2D1F9D9F1DFBE41505423F9D39DD2AB31DDA16AA2FA2E43E
24,515,866 UART: [art] SIG.S = 95EF363AC164E4477EA4BE70D4A8EB794E79CF57627031EA043CE7D7CF709E4D90F141A5A374CCDBADF5788B9919E760
25,494,543 UART: Caliptra RT
25,495,250 UART: [state] CFI Enabled
25,613,348 UART: [rt] RT listening for mailbox commands...
25,615,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,646,811 UART: [rt]cmd =0x44504543, len=96
29,930,624 >>> mbox cmd response data (6236 bytes)
29,959,937 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,990,241 UART: [rt]cmd =0x52564348, len=36
29,993,217 >>> mbox cmd response data (8 bytes)
29,993,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,024,244 UART: [rt]cmd =0x44504543, len=96
34,308,084 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,230 UART:
192,597 UART: Running Caliptra ROM ...
193,791 UART:
193,972 UART: [state] CFI Enabled
261,673 UART: [state] LifecycleState = Unprovisioned
264,095 UART: [state] DebugLocked = No
266,563 UART: [state] WD Timer not started. Device not locked for debugging
271,330 UART: [kat] SHA2-256
461,225 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,969 UART: [kat] ++
472,447 UART: [kat] sha1
483,534 UART: [kat] SHA2-256
486,612 UART: [kat] SHA2-384
491,680 UART: [kat] SHA2-512-ACC
494,263 UART: [kat] ECC-384
2,948,908 UART: [kat] HMAC-384Kdf
2,972,302 UART: [kat] LMS
3,504,047 UART: [kat] --
3,507,622 UART: [cold-reset] ++
3,509,355 UART: [fht] FHT @ 0x50003400
3,522,039 UART: [idev] ++
3,522,754 UART: [idev] CDI.KEYID = 6
3,523,634 UART: [idev] SUBJECT.KEYID = 7
3,524,874 UART: [idev] UDS.KEYID = 0
3,525,778 ready_for_fw is high
3,525,977 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,559 UART: [idev] Erasing UDS.KEYID = 0
6,027,708 UART: [idev] Sha1 KeyId Algorithm
6,050,714 UART: [idev] --
6,055,687 UART: [ldev] ++
6,056,377 UART: [ldev] CDI.KEYID = 6
6,057,296 UART: [ldev] SUBJECT.KEYID = 5
6,058,461 UART: [ldev] AUTHORITY.KEYID = 7
6,059,697 UART: [ldev] FE.KEYID = 1
6,100,360 UART: [ldev] Erasing FE.KEYID = 1
8,605,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,742 UART: [ldev] --
10,412,736 UART: [fwproc] Wait for Commands...
10,414,670 UART: [fwproc] Recv command 0x46574c44
10,416,974 UART: [fwproc] Recv'd Img size: 114168 bytes
13,860,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,185 >>> mbox cmd response: success
14,600,907 UART: [afmc] ++
14,601,628 UART: [afmc] CDI.KEYID = 6
14,602,822 UART: [afmc] SUBJECT.KEYID = 7
14,604,338 UART: [afmc] AUTHORITY.KEYID = 5
17,151,138 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,366 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,580 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,904,678 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,919,716 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,491 UART: [afmc] --
18,946,265 UART: [cold-reset] --
18,952,141 UART: [state] Locking Datavault
18,958,173 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,386 UART: [state] Locking ICCM
18,962,417 UART: [exit] Launching FMC @ 0x40000130
18,971,050 UART:
18,971,291 UART: Running Caliptra FMC ...
18,972,392 UART:
18,972,568 UART: [state] CFI Enabled
19,029,091 UART: [fht] FMC Alias Private Key: 7
20,793,437 UART: [art] Extend RT PCRs Done
20,794,657 UART: [art] Lock RT PCRs Done
20,796,582 UART: [art] Populate DV Done
20,801,944 UART: [fht] FMC Alias Private Key: 7
20,803,695 UART: [art] Derive CDI
20,804,431 UART: [art] Store in in slot 0x4
20,861,309 UART: [art] Derive Key Pair
20,862,347 UART: [art] Store priv key in slot 0x5
23,325,282 UART: [art] Derive Key Pair - Done
23,338,388 UART: [art] Signing Cert with AUTHO
23,339,690 UART: RITY.KEYID = 7
25,051,235 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,749 UART: [art] PUB.X = 91DDE97DB6156E6F09DDB715B6C1F08B40067B7DEE89B18BC43E026AA65282103E222F2C1C680C9D99C40D4BB1B72758
25,060,081 UART: [art] PUB.Y = 76B8FEEF1E75E1B2B844CE64891A798385CA4CCC7E30BAE2B3B2D8408EA120EC6613B8C23497598B0E75D823B528D95C
25,067,299 UART: [art] SIG.R = 2D3017262820425EC8C506AB374A3D0CCBE898A88383E657001D0BAE038A853E21AA49D74EBE8881B1CDC9B75D5CA629
25,074,719 UART: [art] SIG.S = 57804E10CAAC6FE542B347DF96FFA38A4695F5CACB1C649252F3AEF075B6E1A616B752FA47695BE617ECACE1FF4E0EFD
26,053,481 UART: Caliptra RT
26,054,193 UART: [state] CFI Enabled
26,220,086 UART: [rt] RT listening for mailbox commands...
26,222,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,967 UART: [rt]cmd =0x44504543, len=96
30,632,137 >>> mbox cmd response data (6236 bytes)
30,661,266 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,691,328 UART: [rt]cmd =0x52564348, len=36
30,693,875 >>> mbox cmd response data (8 bytes)
30,694,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,724,955 UART: [rt]cmd =0x44504543, len=96
35,088,957 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,440,621 ready_for_fw is high
3,441,017 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,735,544 >>> mbox cmd response: success
19,013,642 UART:
19,014,044 UART: Running Caliptra FMC ...
19,015,266 UART:
19,015,452 UART: [state] CFI Enabled
19,081,578 UART: [fht] FMC Alias Private Key: 7
20,845,921 UART: [art] Extend RT PCRs Done
20,847,141 UART: [art] Lock RT PCRs Done
20,848,768 UART: [art] Populate DV Done
20,854,014 UART: [fht] FMC Alias Private Key: 7
20,855,590 UART: [art] Derive CDI
20,856,410 UART: [art] Store in in slot 0x4
20,914,645 UART: [art] Derive Key Pair
20,915,634 UART: [art] Store priv key in slot 0x5
23,378,526 UART: [art] Derive Key Pair - Done
23,391,374 UART: [art] Signing Cert with AUTHO
23,392,679 UART: RITY.KEYID = 7
25,104,842 UART: [art] Erasing AUTHORITY.KEYID = 7
25,106,348 UART: [art] PUB.X = F35C283B73F7FC2A022EAA88F9D94FCE5ED35B2409597B099B74662E6EC8293A1BD9DD7FBA834DC8F2C2682F2BE16145
25,113,666 UART: [art] PUB.Y = B1D1B7775F4A13EB42A922124AA9D8DDC79F256980614D3AF29B599B8BF3690FE19CBE132C84BCFA5115DC9138500991
25,120,887 UART: [art] SIG.R = EBDEAADBB1BBF68FD61FB39CF1FB357C549E9B1F3A5704E6A55FAE8EB0F48CA9931F3421C8505191551D81BC82870C5C
25,128,300 UART: [art] SIG.S = 6B4D65070A2E49628EE1757B8C58120816DC94F27799265B2177C20B28F8E664C8DE26E5ACB8F98A212EC3B5F20EC1C4
26,106,927 UART: Caliptra RT
26,107,639 UART: [state] CFI Enabled
26,274,322 UART: [rt] RT listening for mailbox commands...
26,276,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,307,895 UART: [rt]cmd =0x44504543, len=96
30,686,259 >>> mbox cmd response data (6236 bytes)
30,715,525 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,745,661 UART: [rt]cmd =0x52564348, len=36
30,748,475 >>> mbox cmd response data (8 bytes)
30,748,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,779,341 UART: [rt]cmd =0x44504543, len=96
35,144,541 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
192,887 UART:
193,258 UART: Running Caliptra ROM ...
194,395 UART:
604,028 UART: [state] CFI Enabled
612,864 UART: [state] LifecycleState = Unprovisioned
615,242 UART: [state] DebugLocked = No
616,706 UART: [state] WD Timer not started. Device not locked for debugging
620,594 UART: [kat] SHA2-256
810,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
821,315 UART: [kat] ++
821,925 UART: [kat] sha1
832,349 UART: [kat] SHA2-256
835,401 UART: [kat] SHA2-384
841,254 UART: [kat] SHA2-512-ACC
843,842 UART: [kat] ECC-384
3,283,659 UART: [kat] HMAC-384Kdf
3,296,737 UART: [kat] LMS
3,828,519 UART: [kat] --
3,832,292 UART: [cold-reset] ++
3,833,223 UART: [fht] FHT @ 0x50003400
3,843,981 UART: [idev] ++
3,844,694 UART: [idev] CDI.KEYID = 6
3,845,650 UART: [idev] SUBJECT.KEYID = 7
3,846,823 UART: [idev] UDS.KEYID = 0
3,847,744 ready_for_fw is high
3,847,936 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,317 UART: [idev] Erasing UDS.KEYID = 0
6,324,198 UART: [idev] Sha1 KeyId Algorithm
6,345,947 UART: [idev] --
6,350,380 UART: [ldev] ++
6,351,097 UART: [ldev] CDI.KEYID = 6
6,352,032 UART: [ldev] SUBJECT.KEYID = 5
6,353,144 UART: [ldev] AUTHORITY.KEYID = 7
6,354,379 UART: [ldev] FE.KEYID = 1
6,365,621 UART: [ldev] Erasing FE.KEYID = 1
8,846,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,919 UART: [ldev] --
10,636,020 UART: [fwproc] Wait for Commands...
10,637,960 UART: [fwproc] Recv command 0x46574c44
10,640,214 UART: [fwproc] Recv'd Img size: 114168 bytes
14,084,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,279,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,820,472 >>> mbox cmd response: success
14,825,366 UART: [afmc] ++
14,826,077 UART: [afmc] CDI.KEYID = 6
14,827,270 UART: [afmc] SUBJECT.KEYID = 7
14,828,760 UART: [afmc] AUTHORITY.KEYID = 5
17,331,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,051,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,053,849 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,069,044 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,084,181 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,099,215 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,122,270 UART: [afmc] --
19,125,437 UART: [cold-reset] --
19,129,948 UART: [state] Locking Datavault
19,137,585 UART: [state] Locking PCR0, PCR1 and PCR31
19,139,785 UART: [state] Locking ICCM
19,141,184 UART: [exit] Launching FMC @ 0x40000130
19,149,834 UART:
19,150,120 UART: Running Caliptra FMC ...
19,151,234 UART:
19,151,398 UART: [state] CFI Enabled
19,159,556 UART: [fht] FMC Alias Private Key: 7
20,916,280 UART: [art] Extend RT PCRs Done
20,917,500 UART: [art] Lock RT PCRs Done
20,919,474 UART: [art] Populate DV Done
20,924,854 UART: [fht] FMC Alias Private Key: 7
20,926,345 UART: [art] Derive CDI
20,927,112 UART: [art] Store in in slot 0x4
20,969,706 UART: [art] Derive Key Pair
20,970,707 UART: [art] Store priv key in slot 0x5
23,396,865 UART: [art] Derive Key Pair - Done
23,409,808 UART: [art] Signing Cert with AUTHO
23,411,112 UART: RITY.KEYID = 7
25,116,964 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,469 UART: [art] PUB.X = 35988929FD99B32E000AC38BEE17DDF55EB0C5D60E54841B9500A5C24AB1B328BE415DFFDE2D8A75F6D75E7ADCB01E40
25,125,715 UART: [art] PUB.Y = 4C6831A40557A1A3201C5DF321AB68C14BE18576A771F8F7B7AFFA6E81E4585945BCA99D123AFE0775FE1C311A81E689
25,133,001 UART: [art] SIG.R = 2623D5FE240BBC8C30E63DB810E1EE29D4FEE6C02C8990AF27D743E192955E2DD9A0F1A51224802C4AA3A9B47D792143
25,140,400 UART: [art] SIG.S = F55EC345C8AD72832AB70E54036D142C02E9EABB3783443A11DBCB9FF14C82D6CE63EE08870652285D3C9274B32BD81A
26,118,977 UART: Caliptra RT
26,119,681 UART: [state] CFI Enabled
26,236,905 UART: [rt] RT listening for mailbox commands...
26,239,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,270,645 UART: [rt]cmd =0x44504543, len=96
30,553,425 >>> mbox cmd response data (6236 bytes)
30,582,544 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,612,521 UART: [rt]cmd =0x52564348, len=36
30,615,313 >>> mbox cmd response data (8 bytes)
30,615,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,646,283 UART: [rt]cmd =0x44504543, len=96
34,929,696 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,579 writing to cptra_bootfsm_go
3,750,424 ready_for_fw is high
3,750,868 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,935,929 >>> mbox cmd response: success
19,187,903 UART:
19,188,315 UART: Running Caliptra FMC ...
19,189,441 UART:
19,189,605 UART: [state] CFI Enabled
19,197,194 UART: [fht] FMC Alias Private Key: 7
20,953,747 UART: [art] Extend RT PCRs Done
20,954,981 UART: [art] Lock RT PCRs Done
20,956,987 UART: [art] Populate DV Done
20,962,412 UART: [fht] FMC Alias Private Key: 7
20,963,956 UART: [art] Derive CDI
20,964,774 UART: [art] Store in in slot 0x4
21,007,628 UART: [art] Derive Key Pair
21,008,670 UART: [art] Store priv key in slot 0x5
23,435,547 UART: [art] Derive Key Pair - Done
23,448,710 UART: [art] Signing Cert with AUTHO
23,450,006 UART: RITY.KEYID = 7
25,155,454 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,962 UART: [art] PUB.X = D9AF53036C117640899D07B9A9F500B82FDCE2E3FF2794D18BCCD1DB613266B77FD5069F13285243258F2E54D16FF951
25,164,207 UART: [art] PUB.Y = D3FCFD27033DFFC7582A9C155F733766968547C133D9BE7F5F6256B117D37ABFB092F297B1DACDD832CB6D7FF75F732A
25,171,494 UART: [art] SIG.R = 22673D07F26883B95ECEB2A72DCAD1AB9FC1D060DAA63170750F020D2B44EC41BBBD76707BDE561774EAD6E789EB39A0
25,178,884 UART: [art] SIG.S = 9B35BD20E8DF7C2C531730F188556BFB492F591A5CB2F18901BB2900ABAD903C9D302269E9726583715FA2B46099847F
26,157,688 UART: Caliptra RT
26,158,373 UART: [state] CFI Enabled
26,275,877 UART: [rt] RT listening for mailbox commands...
26,278,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,309,632 UART: [rt]cmd =0x44504543, len=96
30,592,128 >>> mbox cmd response data (6236 bytes)
30,621,245 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,651,252 UART: [rt]cmd =0x52564348, len=36
30,653,683 >>> mbox cmd response data (8 bytes)
30,654,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,684,641 UART: [rt]cmd =0x44504543, len=96
34,968,301 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,137 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,677 UART: [kat] SHA2-256
881,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,723 UART: [kat] ++
885,875 UART: [kat] sha1
890,099 UART: [kat] SHA2-256
892,037 UART: [kat] SHA2-384
894,700 UART: [kat] SHA2-512-ACC
896,601 UART: [kat] ECC-384
902,148 UART: [kat] HMAC-384Kdf
906,626 UART: [kat] LMS
1,474,822 UART: [kat] --
1,475,917 UART: [cold-reset] ++
1,476,425 UART: [fht] Storing FHT @ 0x50003400
1,479,282 UART: [idev] ++
1,479,450 UART: [idev] CDI.KEYID = 6
1,479,810 UART: [idev] SUBJECT.KEYID = 7
1,480,234 UART: [idev] UDS.KEYID = 0
1,480,579 ready_for_fw is high
1,480,579 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,504,890 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,508 UART: [idev] --
1,514,379 UART: [ldev] ++
1,514,547 UART: [ldev] CDI.KEYID = 6
1,514,910 UART: [ldev] SUBJECT.KEYID = 5
1,515,336 UART: [ldev] AUTHORITY.KEYID = 7
1,515,799 UART: [ldev] FE.KEYID = 1
1,521,049 UART: [ldev] Erasing FE.KEYID = 1
1,546,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,702 UART: [ldev] --
1,585,115 UART: [fwproc] Waiting for Commands...
1,585,820 UART: [fwproc] Received command 0x46574c44
1,586,611 UART: [fwproc] Received Image of size 114168 bytes
2,882,957 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,027 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,964 >>> mbox cmd response: success
3,076,982 UART: [afmc] ++
3,077,150 UART: [afmc] CDI.KEYID = 6
3,077,512 UART: [afmc] SUBJECT.KEYID = 7
3,077,937 UART: [afmc] AUTHORITY.KEYID = 5
3,113,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,304 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,084 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,812 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,697 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,387 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,264 UART: [afmc] --
3,156,344 UART: [cold-reset] --
3,157,240 UART: [state] Locking Datavault
3,158,583 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,187 UART: [state] Locking ICCM
3,159,695 UART: [exit] Launching FMC @ 0x40000130
3,165,024 UART:
3,165,040 UART: Running Caliptra FMC ...
3,165,448 UART:
3,165,502 UART: [state] CFI Enabled
3,175,881 UART: [fht] FMC Alias Private Key: 7
3,283,952 UART: [art] Extend RT PCRs Done
3,284,380 UART: [art] Lock RT PCRs Done
3,286,092 UART: [art] Populate DV Done
3,294,549 UART: [fht] FMC Alias Private Key: 7
3,295,691 UART: [art] Derive CDI
3,295,971 UART: [art] Store in in slot 0x4
3,381,648 UART: [art] Derive Key Pair
3,382,008 UART: [art] Store priv key in slot 0x5
3,395,094 UART: [art] Derive Key Pair - Done
3,409,656 UART: [art] Signing Cert with AUTHO
3,410,136 UART: RITY.KEYID = 7
3,425,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,947 UART: [art] PUB.X = A8139DFBEBB17E3E3AB633AE2C7523B3E31A6806DA88641294EE332050B9E74D807A1ADAC4651E709214274553A7DC19
3,432,718 UART: [art] PUB.Y = FB2B269E192943C738B24423D4EA445D0E01C9298DC5FF59ED0024FB889FBDC2860297F34B1E6A142A5A97C246B25798
3,439,639 UART: [art] SIG.R = A6D86D0743A6F922F7AAEF1F2F5025382A602BEB9208327B00A8583159B1C595E7AE102BB992C3A1ECD706118F0A1B42
3,446,379 UART: [art] SIG.S = D0EE58CEE241C7F157E43E7F02CEBECDA8D9525024A66113893FC95AF2795E187FD8C2AB5BFC96CA10DABBFB54439C36
3,470,843 UART: Caliptra RT
3,471,096 UART: [state] CFI Enabled
3,580,272 UART: [rt] RT listening for mailbox commands...
3,580,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,484 UART: [rt]cmd =0x44504543, len=96
3,791,885 >>> mbox cmd response data (6236 bytes)
3,791,886 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,595 UART: [rt]cmd =0x52564348, len=36
3,823,310 >>> mbox cmd response data (8 bytes)
3,823,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,232 UART: [rt]cmd =0x44504543, len=96
4,034,095 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,245 ready_for_fw is high
1,363,245 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,184 >>> mbox cmd response: success
2,986,024 UART:
2,986,040 UART: Running Caliptra FMC ...
2,986,448 UART:
2,986,502 UART: [state] CFI Enabled
2,996,975 UART: [fht] FMC Alias Private Key: 7
3,104,560 UART: [art] Extend RT PCRs Done
3,104,988 UART: [art] Lock RT PCRs Done
3,106,928 UART: [art] Populate DV Done
3,114,923 UART: [fht] FMC Alias Private Key: 7
3,115,891 UART: [art] Derive CDI
3,116,171 UART: [art] Store in in slot 0x4
3,201,436 UART: [art] Derive Key Pair
3,201,796 UART: [art] Store priv key in slot 0x5
3,214,906 UART: [art] Derive Key Pair - Done
3,229,422 UART: [art] Signing Cert with AUTHO
3,229,902 UART: RITY.KEYID = 7
3,244,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,565 UART: [art] PUB.X = C28E263E7F70DC113A06C64259B1F7A7B16A32437C53FE567AA445C294F3E3EF31A9EBFD5FBC92C606FA270777622537
3,252,332 UART: [art] PUB.Y = 8699CDAF316BFE9C350940905073134514556388848CCBF66A0005AD2C6E1CC8D871104B8FC18BAD53C38ACE03053EA9
3,259,250 UART: [art] SIG.R = 60DA6BB44CBA9C64DD8482F4A72AF064128B7D9CA2FB98A09ECB225DC4F7FB336BA45E12C0764CB65DD6C22B1832D857
3,266,038 UART: [art] SIG.S = 1F42FDD45BB6C1BCB97728A15D368AEE00B6A80AD3B1214508A80A7C98379D6F016A6B460EE036C11F3B36E125E27EF3
3,289,694 UART: Caliptra RT
3,289,947 UART: [state] CFI Enabled
3,397,991 UART: [rt] RT listening for mailbox commands...
3,398,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,337 UART: [rt]cmd =0x44504543, len=96
3,609,961 >>> mbox cmd response data (6236 bytes)
3,609,962 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,597 UART: [rt]cmd =0x52564348, len=36
3,641,580 >>> mbox cmd response data (8 bytes)
3,641,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,671,424 UART: [rt]cmd =0x44504543, len=96
3,852,008 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,054 UART: [kat] SHA2-256
881,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,100 UART: [kat] ++
886,252 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
894,849 UART: [kat] SHA2-512-ACC
896,750 UART: [kat] ECC-384
902,433 UART: [kat] HMAC-384Kdf
906,933 UART: [kat] LMS
1,475,129 UART: [kat] --
1,476,134 UART: [cold-reset] ++
1,476,550 UART: [fht] Storing FHT @ 0x50003400
1,479,303 UART: [idev] ++
1,479,471 UART: [idev] CDI.KEYID = 6
1,479,831 UART: [idev] SUBJECT.KEYID = 7
1,480,255 UART: [idev] UDS.KEYID = 0
1,480,600 ready_for_fw is high
1,480,600 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,589 UART: [idev] Erasing UDS.KEYID = 0
1,505,709 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,351 UART: [idev] --
1,515,512 UART: [ldev] ++
1,515,680 UART: [ldev] CDI.KEYID = 6
1,516,043 UART: [ldev] SUBJECT.KEYID = 5
1,516,469 UART: [ldev] AUTHORITY.KEYID = 7
1,516,932 UART: [ldev] FE.KEYID = 1
1,522,044 UART: [ldev] Erasing FE.KEYID = 1
1,547,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,231 UART: [ldev] --
1,586,592 UART: [fwproc] Waiting for Commands...
1,587,245 UART: [fwproc] Received command 0x46574c44
1,588,036 UART: [fwproc] Received Image of size 114168 bytes
2,883,780 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,176 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,528 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,073 >>> mbox cmd response: success
3,076,233 UART: [afmc] ++
3,076,401 UART: [afmc] CDI.KEYID = 6
3,076,763 UART: [afmc] SUBJECT.KEYID = 7
3,077,188 UART: [afmc] AUTHORITY.KEYID = 5
3,112,415 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,925 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,433 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,318 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,008 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,903 UART: [afmc] --
3,155,829 UART: [cold-reset] --
3,156,701 UART: [state] Locking Datavault
3,158,032 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,636 UART: [state] Locking ICCM
3,159,226 UART: [exit] Launching FMC @ 0x40000130
3,164,555 UART:
3,164,571 UART: Running Caliptra FMC ...
3,164,979 UART:
3,165,122 UART: [state] CFI Enabled
3,176,245 UART: [fht] FMC Alias Private Key: 7
3,284,446 UART: [art] Extend RT PCRs Done
3,284,874 UART: [art] Lock RT PCRs Done
3,286,378 UART: [art] Populate DV Done
3,294,569 UART: [fht] FMC Alias Private Key: 7
3,295,687 UART: [art] Derive CDI
3,295,967 UART: [art] Store in in slot 0x4
3,381,692 UART: [art] Derive Key Pair
3,382,052 UART: [art] Store priv key in slot 0x5
3,395,608 UART: [art] Derive Key Pair - Done
3,410,570 UART: [art] Signing Cert with AUTHO
3,411,050 UART: RITY.KEYID = 7
3,425,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,637 UART: [art] PUB.X = A69C89A56BB21974E5B5E892D3ACA1ECD72ECFBA1922081F2283AD8D9CAAE7EF8DA39B081CA4C646B95F6AF553633C4E
3,433,423 UART: [art] PUB.Y = F2B9158AA13CA41F6AEAFA248AD49AF336172F8491635CC487363A5D04039E5AD776626C72D7CA683D4BDB287B5CA544
3,440,375 UART: [art] SIG.R = 2CF0ABFA3CD678167018F68D0454F69A617A0E7FC233E3ECE8732DF2D48736608B849405F0AF05FE20D4BF860C3197E2
3,447,136 UART: [art] SIG.S = 0AE3A4609DB11B519847AC5682156395D41ACC1B20BD675738E28CE6E1CD078D39BFC5F1F6E0FC7AF1E307FB3D60F99E
3,471,606 UART: Caliptra RT
3,471,951 UART: [state] CFI Enabled
3,580,091 UART: [rt] RT listening for mailbox commands...
3,580,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,223 UART: [rt]cmd =0x44504543, len=96
3,792,161 >>> mbox cmd response data (6236 bytes)
3,792,162 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,681 UART: [rt]cmd =0x52564348, len=36
3,824,006 >>> mbox cmd response data (8 bytes)
3,824,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,854,112 UART: [rt]cmd =0x44504543, len=96
4,034,652 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,534 ready_for_fw is high
1,362,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,301 >>> mbox cmd response: success
2,989,123 UART:
2,989,139 UART: Running Caliptra FMC ...
2,989,547 UART:
2,989,690 UART: [state] CFI Enabled
3,000,087 UART: [fht] FMC Alias Private Key: 7
3,108,414 UART: [art] Extend RT PCRs Done
3,108,842 UART: [art] Lock RT PCRs Done
3,110,226 UART: [art] Populate DV Done
3,118,481 UART: [fht] FMC Alias Private Key: 7
3,119,549 UART: [art] Derive CDI
3,119,829 UART: [art] Store in in slot 0x4
3,205,688 UART: [art] Derive Key Pair
3,206,048 UART: [art] Store priv key in slot 0x5
3,219,314 UART: [art] Derive Key Pair - Done
3,233,944 UART: [art] Signing Cert with AUTHO
3,234,424 UART: RITY.KEYID = 7
3,249,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,253 UART: [art] PUB.X = D4AF822E6C2EF9BF71F40359B530C3FC864B5A99FB82761B0653B6FBAAE02A07EDB65A9090693A2A5213AF10771E9B06
3,257,021 UART: [art] PUB.Y = F4F9EDD0110748BEB3BFB819721F44C28EA9ECE94A37E19152B928D339E86AA8017C6D14C17B30A92B16DC9BF027CE31
3,263,977 UART: [art] SIG.R = D653504A959F115C815E4D6DADA6E3EAEC52B76777AF72BD6D4E4848B26A880217FA53A40FB2658BA199387E30E51EB7
3,270,749 UART: [art] SIG.S = 576025CCAC064F359F69862B56C9129165B96B71CF4B2B427C2E1548F5EDCE8BE4AF9AB9E8D5C0080E147D59BE0396D9
3,294,584 UART: Caliptra RT
3,294,929 UART: [state] CFI Enabled
3,401,630 UART: [rt] RT listening for mailbox commands...
3,402,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,824 UART: [rt]cmd =0x44504543, len=96
3,613,146 >>> mbox cmd response data (6236 bytes)
3,613,147 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,896 UART: [rt]cmd =0x52564348, len=36
3,644,957 >>> mbox cmd response data (8 bytes)
3,644,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,961 UART: [rt]cmd =0x44504543, len=96
3,857,009 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
893,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,571 UART: [kat] ++
897,723 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,568 UART: [kat] SHA2-512-ACC
908,469 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
923,152 UART: [kat] LMS
1,171,480 UART: [kat] --
1,172,433 UART: [cold-reset] ++
1,172,847 UART: [fht] FHT @ 0x50003400
1,175,600 UART: [idev] ++
1,175,768 UART: [idev] CDI.KEYID = 6
1,176,128 UART: [idev] SUBJECT.KEYID = 7
1,176,552 UART: [idev] UDS.KEYID = 0
1,176,897 ready_for_fw is high
1,176,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,330 UART: [idev] Erasing UDS.KEYID = 0
1,201,083 UART: [idev] Sha1 KeyId Algorithm
1,209,419 UART: [idev] --
1,210,437 UART: [ldev] ++
1,210,605 UART: [ldev] CDI.KEYID = 6
1,210,968 UART: [ldev] SUBJECT.KEYID = 5
1,211,394 UART: [ldev] AUTHORITY.KEYID = 7
1,211,857 UART: [ldev] FE.KEYID = 1
1,217,031 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,520 UART: [fwproc] Wait for Commands...
1,283,256 UART: [fwproc] Recv command 0x46574c44
1,283,984 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,283 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,244 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,193 >>> mbox cmd response: success
2,774,419 UART: [afmc] ++
2,774,587 UART: [afmc] CDI.KEYID = 6
2,774,949 UART: [afmc] SUBJECT.KEYID = 7
2,775,374 UART: [afmc] AUTHORITY.KEYID = 5
2,810,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,842 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,570 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,455 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,174 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,060 UART: [afmc] --
2,854,112 UART: [cold-reset] --
2,854,960 UART: [state] Locking Datavault
2,856,109 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,713 UART: [state] Locking ICCM
2,857,273 UART: [exit] Launching FMC @ 0x40000130
2,862,602 UART:
2,862,618 UART: Running Caliptra FMC ...
2,863,026 UART:
2,863,080 UART: [state] CFI Enabled
2,873,863 UART: [fht] FMC Alias Private Key: 7
2,981,970 UART: [art] Extend RT PCRs Done
2,982,398 UART: [art] Lock RT PCRs Done
2,984,136 UART: [art] Populate DV Done
2,992,201 UART: [fht] FMC Alias Private Key: 7
2,993,273 UART: [art] Derive CDI
2,993,553 UART: [art] Store in in slot 0x4
3,079,488 UART: [art] Derive Key Pair
3,079,848 UART: [art] Store priv key in slot 0x5
3,093,000 UART: [art] Derive Key Pair - Done
3,107,959 UART: [art] Signing Cert with AUTHO
3,108,439 UART: RITY.KEYID = 7
3,123,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,458 UART: [art] PUB.X = 42DE94D57E68136C83820169434F852B941FC8E9F0B5F77B0760197CFBB9942E1B0E11B8A2E001032546A07D834DC326
3,131,207 UART: [art] PUB.Y = 5622991BB49CEC8C4C8325C9482758C903AE035FA078F44F8B6BA429D759926EF74BAEC7A05D019AB22939FFAA07E372
3,138,151 UART: [art] SIG.R = 6EB61A9211FBDFE897C1755FDA5B0A2733CCE6DE0787F2E1DA134B1D5DFFE16B16D7ED6718F6F72D09DA4239B0767130
3,144,928 UART: [art] SIG.S = E5526A690846F04C7DE1B26D090526515B4FCFAD4D94EA4D670FAEBDA4EC7B67C7DEA535CD5BD0F6EAF887A874DAD6E3
3,168,499 UART: Caliptra RT
3,168,752 UART: [state] CFI Enabled
3,277,089 UART: [rt] RT listening for mailbox commands...
3,277,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,181 UART: [rt]cmd =0x44504543, len=96
3,488,849 >>> mbox cmd response data (6236 bytes)
3,488,850 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,445 UART: [rt]cmd =0x52564348, len=36
3,520,774 >>> mbox cmd response data (8 bytes)
3,520,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,550,720 UART: [rt]cmd =0x44504543, len=96
3,730,786 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,899 ready_for_fw is high
1,060,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,428 >>> mbox cmd response: success
2,685,948 UART:
2,685,964 UART: Running Caliptra FMC ...
2,686,372 UART:
2,686,426 UART: [state] CFI Enabled
2,696,765 UART: [fht] FMC Alias Private Key: 7
2,804,194 UART: [art] Extend RT PCRs Done
2,804,622 UART: [art] Lock RT PCRs Done
2,806,042 UART: [art] Populate DV Done
2,814,641 UART: [fht] FMC Alias Private Key: 7
2,815,595 UART: [art] Derive CDI
2,815,875 UART: [art] Store in in slot 0x4
2,901,274 UART: [art] Derive Key Pair
2,901,634 UART: [art] Store priv key in slot 0x5
2,914,436 UART: [art] Derive Key Pair - Done
2,929,282 UART: [art] Signing Cert with AUTHO
2,929,762 UART: RITY.KEYID = 7
2,945,298 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,063 UART: [art] PUB.X = 462C47A59DEF6C1A16FC7D329DFC60F12072D806B2C2D04364B1B9A6F5D99E7689AA9DCB463D306EF44790D9061783B3
2,952,833 UART: [art] PUB.Y = 62D612722011F2A914F90A96227A26D200F6D1EE5867FD7491633F7B96E8D376C99C26A5C7B928576FFDF6C3E8C1144B
2,959,756 UART: [art] SIG.R = E660055BDF680A99AD4437CC50526CB3E9545E64E81145D51F47187E9BDB1AF84D4A73D18059BD8594790CADE65C6C9B
2,966,523 UART: [art] SIG.S = A8BA0105FBEA313DB51F1885751FD510694379ED27A22D4D041971EE4C47AE57E3F8B5BC079B298DD363435CC99E1457
2,990,662 UART: Caliptra RT
2,990,915 UART: [state] CFI Enabled
3,098,767 UART: [rt] RT listening for mailbox commands...
3,099,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,777 UART: [rt]cmd =0x44504543, len=96
3,311,529 >>> mbox cmd response data (6236 bytes)
3,311,530 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,195 UART: [rt]cmd =0x52564348, len=36
3,343,418 >>> mbox cmd response data (8 bytes)
3,343,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,373,394 UART: [rt]cmd =0x44504543, len=96
3,554,230 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
893,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,490 UART: [kat] ++
897,642 UART: [kat] sha1
901,832 UART: [kat] SHA2-256
903,772 UART: [kat] SHA2-384
906,527 UART: [kat] SHA2-512-ACC
908,428 UART: [kat] ECC-384
918,103 UART: [kat] HMAC-384Kdf
922,627 UART: [kat] LMS
1,170,955 UART: [kat] --
1,171,788 UART: [cold-reset] ++
1,172,306 UART: [fht] FHT @ 0x50003400
1,174,887 UART: [idev] ++
1,175,055 UART: [idev] CDI.KEYID = 6
1,175,415 UART: [idev] SUBJECT.KEYID = 7
1,175,839 UART: [idev] UDS.KEYID = 0
1,176,184 ready_for_fw is high
1,176,184 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,955 UART: [idev] Erasing UDS.KEYID = 0
1,200,844 UART: [idev] Sha1 KeyId Algorithm
1,209,200 UART: [idev] --
1,210,236 UART: [ldev] ++
1,210,404 UART: [ldev] CDI.KEYID = 6
1,210,767 UART: [ldev] SUBJECT.KEYID = 5
1,211,193 UART: [ldev] AUTHORITY.KEYID = 7
1,211,656 UART: [ldev] FE.KEYID = 1
1,216,948 UART: [ldev] Erasing FE.KEYID = 1
1,243,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,184 UART: [ldev] --
1,282,595 UART: [fwproc] Wait for Commands...
1,283,319 UART: [fwproc] Recv command 0x46574c44
1,284,047 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,327 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,868 >>> mbox cmd response: success
2,774,112 UART: [afmc] ++
2,774,280 UART: [afmc] CDI.KEYID = 6
2,774,642 UART: [afmc] SUBJECT.KEYID = 7
2,775,067 UART: [afmc] AUTHORITY.KEYID = 5
2,810,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,987 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,319 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,185 UART: [afmc] --
2,854,301 UART: [cold-reset] --
2,855,249 UART: [state] Locking Datavault
2,856,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,098 UART: [state] Locking ICCM
2,857,728 UART: [exit] Launching FMC @ 0x40000130
2,863,057 UART:
2,863,073 UART: Running Caliptra FMC ...
2,863,481 UART:
2,863,624 UART: [state] CFI Enabled
2,874,235 UART: [fht] FMC Alias Private Key: 7
2,982,154 UART: [art] Extend RT PCRs Done
2,982,582 UART: [art] Lock RT PCRs Done
2,984,188 UART: [art] Populate DV Done
2,992,641 UART: [fht] FMC Alias Private Key: 7
2,993,671 UART: [art] Derive CDI
2,993,951 UART: [art] Store in in slot 0x4
3,079,488 UART: [art] Derive Key Pair
3,079,848 UART: [art] Store priv key in slot 0x5
3,093,136 UART: [art] Derive Key Pair - Done
3,107,818 UART: [art] Signing Cert with AUTHO
3,108,298 UART: RITY.KEYID = 7
3,123,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,515 UART: [art] PUB.X = 06C5FB6F55AD7605A81893BD77890A7C652C3CDC33D0337A2BB8A733E0243D6809BA405EECBB6D1550D2BE7C28D05E7C
3,131,285 UART: [art] PUB.Y = A45B06DA082320DA9C2AE9F2FB8C219F23DEA91A6F10FA8DC6D165E54BC8D2C897A71BFCE6D98C6859E6C342E48DEABC
3,138,255 UART: [art] SIG.R = 2495657BDEA2CB021F09E3508E03A54C59675D891C4A4236F6F3FBA076C475DF512FEAABDE64FDA572B49D8C45D38256
3,145,026 UART: [art] SIG.S = 8D74E389EE3922A7A088C0E5D464E765467D2A5003A20D22A4E2A197D60FF2DFD20D8A82A801E36348ADEF93CB00552F
3,169,370 UART: Caliptra RT
3,169,715 UART: [state] CFI Enabled
3,276,876 UART: [rt] RT listening for mailbox commands...
3,277,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,886 UART: [rt]cmd =0x44504543, len=96
3,489,158 >>> mbox cmd response data (6236 bytes)
3,489,159 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,790 UART: [rt]cmd =0x52564348, len=36
3,520,777 >>> mbox cmd response data (8 bytes)
3,520,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,550,453 UART: [rt]cmd =0x44504543, len=96
3,732,235 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,784 ready_for_fw is high
1,060,784 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,653 >>> mbox cmd response: success
2,688,731 UART:
2,688,747 UART: Running Caliptra FMC ...
2,689,155 UART:
2,689,298 UART: [state] CFI Enabled
2,699,775 UART: [fht] FMC Alias Private Key: 7
2,807,254 UART: [art] Extend RT PCRs Done
2,807,682 UART: [art] Lock RT PCRs Done
2,809,058 UART: [art] Populate DV Done
2,817,341 UART: [fht] FMC Alias Private Key: 7
2,818,349 UART: [art] Derive CDI
2,818,629 UART: [art] Store in in slot 0x4
2,904,060 UART: [art] Derive Key Pair
2,904,420 UART: [art] Store priv key in slot 0x5
2,917,582 UART: [art] Derive Key Pair - Done
2,932,510 UART: [art] Signing Cert with AUTHO
2,932,990 UART: RITY.KEYID = 7
2,948,270 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,035 UART: [art] PUB.X = BF8145EC38DB0E23AF9981C6AE8DD7C24F64B431AA60005F9165114CCDCD0CE7995BD706B40D6FCDC5737646D070EDBB
2,955,789 UART: [art] PUB.Y = 319826607DA5BB974A574D35659E2ABB5CE7511D32530E9E68CF2500DE0F94815CBC53AE285E7C8F20F7889C8890D29B
2,962,713 UART: [art] SIG.R = 85367892E12E576915273C9CE250F08E5965CD6E9959966A7DA374C48B7F454A336DED6F72989C8907F3FB139413488D
2,969,470 UART: [art] SIG.S = 09E1FDECC3226847F6BE601FDE01EA0FB474AF79907953F1BA7AAE512D292199B75BAAC40DE5BE50E481DD2FB5B93601
2,993,210 UART: Caliptra RT
2,993,555 UART: [state] CFI Enabled
3,101,262 UART: [rt] RT listening for mailbox commands...
3,101,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,178 UART: [rt]cmd =0x44504543, len=96
3,312,488 >>> mbox cmd response data (6236 bytes)
3,312,489 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,054 UART: [rt]cmd =0x52564348, len=36
3,344,413 >>> mbox cmd response data (8 bytes)
3,344,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,374,583 UART: [rt]cmd =0x44504543, len=96
3,555,153 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: [kat] ++
895,185 UART: [kat] sha1
899,503 UART: [kat] SHA2-256
901,443 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,017 UART: [fht] FHT @ 0x50003400
1,172,741 UART: [idev] ++
1,172,909 UART: [idev] CDI.KEYID = 6
1,173,270 UART: [idev] SUBJECT.KEYID = 7
1,173,695 UART: [idev] UDS.KEYID = 0
1,174,041 ready_for_fw is high
1,174,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,573 UART: [idev] Erasing UDS.KEYID = 0
1,198,359 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,056 UART: [ldev] ++
1,208,224 UART: [ldev] CDI.KEYID = 6
1,208,588 UART: [ldev] SUBJECT.KEYID = 5
1,209,015 UART: [ldev] AUTHORITY.KEYID = 7
1,209,478 UART: [ldev] FE.KEYID = 1
1,214,666 UART: [ldev] Erasing FE.KEYID = 1
1,240,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,846 UART: [ldev] --
1,280,170 UART: [fwproc] Wait for Commands...
1,280,937 UART: [fwproc] Recv command 0x46574c44
1,281,670 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,927 >>> mbox cmd response: success
2,770,974 UART: [afmc] ++
2,771,142 UART: [afmc] CDI.KEYID = 6
2,771,505 UART: [afmc] SUBJECT.KEYID = 7
2,771,931 UART: [afmc] AUTHORITY.KEYID = 5
2,807,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,434 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,317 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,036 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,843 UART: [afmc] --
2,850,871 UART: [cold-reset] --
2,851,829 UART: [state] Locking Datavault
2,852,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,498 UART: [state] Locking ICCM
2,854,168 UART: [exit] Launching FMC @ 0x40000130
2,859,497 UART:
2,859,513 UART: Running Caliptra FMC ...
2,859,921 UART:
2,859,975 UART: [state] CFI Enabled
2,870,598 UART: [fht] FMC Alias Private Key: 7
2,978,729 UART: [art] Extend RT PCRs Done
2,979,157 UART: [art] Lock RT PCRs Done
2,980,797 UART: [art] Populate DV Done
2,988,886 UART: [fht] FMC Alias Private Key: 7
2,989,904 UART: [art] Derive CDI
2,990,184 UART: [art] Store in in slot 0x4
3,075,707 UART: [art] Derive Key Pair
3,076,067 UART: [art] Store priv key in slot 0x5
3,088,835 UART: [art] Derive Key Pair - Done
3,103,786 UART: [art] Signing Cert with AUTHO
3,104,266 UART: RITY.KEYID = 7
3,119,284 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,049 UART: [art] PUB.X = B62101524BFB5C69E83665CE42A4185DE985C4DE5B08D8FE9DEFCF7B6510F157F5A2630FE478BF41F3037F7F091BFB12
3,126,816 UART: [art] PUB.Y = 065479C30BB13BB13A0B262AEFDF81246DCCA1EEC86AEB945821B22AB96FC0E17269D8C27C2CF9293F7D946F1B8E3D3A
3,133,775 UART: [art] SIG.R = ECE516E3C344CAB8EDFB218C12BB2C95E9D0E6ACD3A1FD25BB50476E8B742202F2E9842F74FA4CBE93A4273DE0809759
3,140,560 UART: [art] SIG.S = 80C680F1D2EB7A771500B655050C1C547BA21204BB6C83D309C9345C76E5C14F85163C84E05755FA62004F0714A040BA
3,164,062 UART: Caliptra RT
3,164,315 UART: [state] CFI Enabled
3,272,231 UART: [rt] RT listening for mailbox commands...
3,272,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,187 UART: [rt]cmd =0x44504543, len=96
3,483,648 >>> mbox cmd response data (6236 bytes)
3,483,649 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,096 UART: [rt]cmd =0x52564348, len=36
3,515,259 >>> mbox cmd response data (8 bytes)
3,515,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,545,395 UART: [rt]cmd =0x44504543, len=96
3,725,782 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,704 ready_for_fw is high
1,055,704 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,285 >>> mbox cmd response: success
2,680,379 UART:
2,680,395 UART: Running Caliptra FMC ...
2,680,803 UART:
2,680,857 UART: [state] CFI Enabled
2,691,232 UART: [fht] FMC Alias Private Key: 7
2,799,925 UART: [art] Extend RT PCRs Done
2,800,353 UART: [art] Lock RT PCRs Done
2,801,611 UART: [art] Populate DV Done
2,809,702 UART: [fht] FMC Alias Private Key: 7
2,810,742 UART: [art] Derive CDI
2,811,022 UART: [art] Store in in slot 0x4
2,896,681 UART: [art] Derive Key Pair
2,897,041 UART: [art] Store priv key in slot 0x5
2,909,365 UART: [art] Derive Key Pair - Done
2,924,096 UART: [art] Signing Cert with AUTHO
2,924,576 UART: RITY.KEYID = 7
2,939,968 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,733 UART: [art] PUB.X = 6ED43340DE8BB92F1611B5AB535D0451DA793869876FFC4D8379AA1DE0285DC43395B1766FF5A449F6710F9F6D3F1C43
2,947,501 UART: [art] PUB.Y = F9BE43098D46F61209E7A3DD14F85BE818D8C4534EF004F8A935E5377C28CA78F891527D08AE8A82F533C8F81ED16125
2,954,441 UART: [art] SIG.R = 3616D86A2991939779EFCAB75E3B9EBE227138CB1BEDD509883576907EEAC36F1C7C8BA98021523F30AF991AF84D963B
2,961,214 UART: [art] SIG.S = 34D6D5789D0244B337362B9A1A3540EE34B2BAAD900868898863B48A1D5739C5E7EE65D34D1D426454C118DD7C7AFA87
2,984,605 UART: Caliptra RT
2,984,858 UART: [state] CFI Enabled
3,092,691 UART: [rt] RT listening for mailbox commands...
3,093,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,871 UART: [rt]cmd =0x44504543, len=96
3,304,381 >>> mbox cmd response data (6236 bytes)
3,304,382 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,334,019 UART: [rt]cmd =0x52564348, len=36
3,336,456 >>> mbox cmd response data (8 bytes)
3,336,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,366,406 UART: [rt]cmd =0x44504543, len=96
3,545,836 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,354 UART: [cold-reset] ++
1,170,856 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,174,786 ready_for_fw is high
1,174,786 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,065 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,040 UART: [fwproc] Recv command 0x46574c44
1,282,773 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,779 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,088 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,762 >>> mbox cmd response: success
2,770,811 UART: [afmc] ++
2,770,979 UART: [afmc] CDI.KEYID = 6
2,771,342 UART: [afmc] SUBJECT.KEYID = 7
2,771,768 UART: [afmc] AUTHORITY.KEYID = 5
2,807,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,778 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,497 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,180 UART: [afmc] --
2,850,106 UART: [cold-reset] --
2,851,044 UART: [state] Locking Datavault
2,852,515 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,119 UART: [state] Locking ICCM
2,853,711 UART: [exit] Launching FMC @ 0x40000130
2,859,040 UART:
2,859,056 UART: Running Caliptra FMC ...
2,859,464 UART:
2,859,607 UART: [state] CFI Enabled
2,870,332 UART: [fht] FMC Alias Private Key: 7
2,978,103 UART: [art] Extend RT PCRs Done
2,978,531 UART: [art] Lock RT PCRs Done
2,979,955 UART: [art] Populate DV Done
2,988,382 UART: [fht] FMC Alias Private Key: 7
2,989,552 UART: [art] Derive CDI
2,989,832 UART: [art] Store in in slot 0x4
3,074,921 UART: [art] Derive Key Pair
3,075,281 UART: [art] Store priv key in slot 0x5
3,088,217 UART: [art] Derive Key Pair - Done
3,102,679 UART: [art] Signing Cert with AUTHO
3,103,159 UART: RITY.KEYID = 7
3,118,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,432 UART: [art] PUB.X = 7323B44ECBD6DAD29113C386A1BB5AC98B0AC553F0C37AC9E68D63F281017C8934CF13129B6B7D908CB79EC63BC3BD43
3,126,210 UART: [art] PUB.Y = F297F55DC16912F7FAA51F993A0337F43450AA7613B8CF29F7F31CB1BF4473339ED50E83AC1B7E8626416FDEF09A79AD
3,133,164 UART: [art] SIG.R = 8319BCBF38AC605E304E26EC6412E21B5C9155FA23797CF2B809F03F417BEFD04A3E3BCE4F7F330FDBDF6A2391B4CB19
3,139,946 UART: [art] SIG.S = 762D4ECD3245CF6CD4DA2B257B9601C5EA81494D925FA29CB4D39220E435038A2C5E0DD8ADB8E76F030E684B6D309AD6
3,163,608 UART: Caliptra RT
3,163,953 UART: [state] CFI Enabled
3,272,990 UART: [rt] RT listening for mailbox commands...
3,273,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,098 UART: [rt]cmd =0x44504543, len=96
3,484,784 >>> mbox cmd response data (6236 bytes)
3,484,785 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,448 UART: [rt]cmd =0x52564348, len=36
3,516,251 >>> mbox cmd response data (8 bytes)
3,516,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,165 UART: [rt]cmd =0x44504543, len=96
3,728,255 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,905 ready_for_fw is high
1,055,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,374 >>> mbox cmd response: success
2,682,260 UART:
2,682,276 UART: Running Caliptra FMC ...
2,682,684 UART:
2,682,827 UART: [state] CFI Enabled
2,693,708 UART: [fht] FMC Alias Private Key: 7
2,801,659 UART: [art] Extend RT PCRs Done
2,802,087 UART: [art] Lock RT PCRs Done
2,803,767 UART: [art] Populate DV Done
2,811,912 UART: [fht] FMC Alias Private Key: 7
2,813,056 UART: [art] Derive CDI
2,813,336 UART: [art] Store in in slot 0x4
2,899,439 UART: [art] Derive Key Pair
2,899,799 UART: [art] Store priv key in slot 0x5
2,913,295 UART: [art] Derive Key Pair - Done
2,928,039 UART: [art] Signing Cert with AUTHO
2,928,519 UART: RITY.KEYID = 7
2,943,571 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,336 UART: [art] PUB.X = 2D0C87B01D49AA6B0A592DCA0C1EC0968D96EE60594C21ABE2D3F806C9F0B26B0930715EDFCB07554D7A0E6548CED75B
2,951,101 UART: [art] PUB.Y = 2CC5CFAF7F97503A4E06F79DFC0A8388645301522D0B3E3FB4AAA5B9DAE49A6EB3805098D01B21F7A981F53A720BC668
2,958,048 UART: [art] SIG.R = C36D6DCF5714B1B3376808C1366FFCAE56BFDDDC79AA76CA2574E5773AEA597B37363DEEAAC48E2B421D7C57D5FED8C8
2,964,839 UART: [art] SIG.S = FAC6FC4E048A158C1451D2B3F5FBCB9920BEEF4D4052940B4374A30E22B11A9966DA05E1333E9CD1B87276116BCB0565
2,988,675 UART: Caliptra RT
2,989,020 UART: [state] CFI Enabled
3,097,268 UART: [rt] RT listening for mailbox commands...
3,097,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,474 UART: [rt]cmd =0x44504543, len=96
3,309,977 >>> mbox cmd response data (6236 bytes)
3,309,978 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,585 UART: [rt]cmd =0x52564348, len=36
3,341,674 >>> mbox cmd response data (8 bytes)
3,341,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,704 UART: [rt]cmd =0x44504543, len=96
3,553,881 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,355 UART:
192,723 UART: Running Caliptra ROM ...
193,812 UART:
193,949 UART: [state] CFI Enabled
264,040 UART: [state] LifecycleState = Unprovisioned
265,963 UART: [state] DebugLocked = No
268,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,385 UART: [kat] SHA2-256
444,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,610 UART: [kat] ++
455,081 UART: [kat] sha1
466,614 UART: [kat] SHA2-256
469,336 UART: [kat] SHA2-384
476,450 UART: [kat] SHA2-512-ACC
478,822 UART: [kat] ECC-384
2,768,406 UART: [kat] HMAC-384Kdf
2,799,218 UART: [kat] LMS
3,989,496 UART: [kat] --
3,993,842 UART: [cold-reset] ++
3,995,557 UART: [fht] Storing FHT @ 0x50003400
4,007,947 UART: [idev] ++
4,008,513 UART: [idev] CDI.KEYID = 6
4,009,393 UART: [idev] SUBJECT.KEYID = 7
4,010,703 UART: [idev] UDS.KEYID = 0
4,011,656 ready_for_fw is high
4,011,837 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,352 UART: [idev] Erasing UDS.KEYID = 0
7,349,900 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,938 UART: [idev] --
7,374,874 UART: [ldev] ++
7,375,434 UART: [ldev] CDI.KEYID = 6
7,376,394 UART: [ldev] SUBJECT.KEYID = 5
7,377,605 UART: [ldev] AUTHORITY.KEYID = 7
7,378,883 UART: [ldev] FE.KEYID = 1
7,421,702 UART: [ldev] Erasing FE.KEYID = 1
10,754,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,709 UART: [ldev] --
13,115,254 UART: [fwproc] Waiting for Commands...
13,118,159 UART: [fwproc] Received command 0x46574c44
13,120,409 UART: [fwproc] Received Image of size 113844 bytes
17,171,509 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,646 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,634,192 >>> mbox cmd response: success
17,639,201 UART: [afmc] ++
17,639,821 UART: [afmc] CDI.KEYID = 6
17,640,731 UART: [afmc] SUBJECT.KEYID = 7
17,641,946 UART: [afmc] AUTHORITY.KEYID = 5
21,008,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,990 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,313,244 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,645 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,342,507 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,957 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,970 UART: [afmc] --
23,381,637 UART: [cold-reset] --
23,383,819 UART: [state] Locking Datavault
23,390,473 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,223 UART: [state] Locking ICCM
23,393,611 UART: [exit] Launching FMC @ 0x40000130
23,401,949 UART:
23,402,177 UART: Running Caliptra FMC ...
23,403,272 UART:
23,403,424 UART: [state] CFI Enabled
23,469,757 UART: [fht] FMC Alias Private Key: 7
25,807,534 UART: [art] Extend RT PCRs Done
25,808,757 UART: [art] Lock RT PCRs Done
25,810,511 UART: [art] Populate DV Done
25,815,971 UART: [fht] FMC Alias Private Key: 7
25,817,507 UART: [art] Derive CDI
25,818,236 UART: [art] Store in in slot 0x4
25,878,591 UART: [art] Derive Key Pair
25,879,625 UART: [art] Store priv key in slot 0x5
29,172,792 UART: [art] Derive Key Pair - Done
29,186,059 UART: [art] Signing Cert with AUTHO
29,187,358 UART: RITY.KEYID = 7
31,474,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,476,351 UART: [art] PUB.X = B89A9BF2895EB1EF89B452A08FA9B22F6AB8CE75869BA257389D46D722F4718D5E2A045BEC6FC381E3C505714C2C6366
31,483,623 UART: [art] PUB.Y = 4B9FE2A740082B4F93FB2888771ECE8BD03F9672AFB6372DE17F2DBD75A84C44AAB80E3B266514AF0573671B0390BD6B
31,490,870 UART: [art] SIG.R = DED4DE430801323F31EF923E7695945F046CE3E1547CAFFD4059C5D5265FA2010A043D0C22A9BC574E62B4F0B29851D9
31,498,216 UART: [art] SIG.S = B6035A17FAD18CD5130CDA45FBDDC9FB259FB0FEDDBA42562363DC1EACDD7731F5F98A4DD1AEC6FC4540EFB1C646D9CD
32,803,607 UART: Caliptra RT
32,804,302 UART: [state] CFI Enabled
32,965,541 UART: [rt] RT listening for mailbox commands...
32,967,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,998,622 UART: [rt]cmd =0x44504543, len=96
38,762,429 >>> mbox cmd response data (6236 bytes)
38,792,066 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,822,424 UART: [rt]cmd =0x52564348, len=36
38,825,027 >>> mbox cmd response data (8 bytes)
38,825,463 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,855,323 UART: [rt]cmd =0x52564348, len=36
38,857,171 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,784,339 ready_for_fw is high
3,784,935 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,842,826 >>> mbox cmd response: success
23,526,104 UART:
23,526,483 UART: Running Caliptra FMC ...
23,527,615 UART:
23,527,770 UART: [state] CFI Enabled
23,595,168 UART: [fht] FMC Alias Private Key: 7
25,933,252 UART: [art] Extend RT PCRs Done
25,934,526 UART: [art] Lock RT PCRs Done
25,936,070 UART: [art] Populate DV Done
25,941,449 UART: [fht] FMC Alias Private Key: 7
25,943,138 UART: [art] Derive CDI
25,943,916 UART: [art] Store in in slot 0x4
26,003,927 UART: [art] Derive Key Pair
26,004,923 UART: [art] Store priv key in slot 0x5
29,298,051 UART: [art] Derive Key Pair - Done
29,311,421 UART: [art] Signing Cert with AUTHO
29,312,754 UART: RITY.KEYID = 7
31,599,635 UART: [art] Erasing AUTHORITY.KEYID = 7
31,601,141 UART: [art] PUB.X = 5EEBE6ADE86B079C4BBD08F8C54A0445E0B30B0C7367D8D6A53B796BE7E130A910F3B8D650F2FB32C31972F6B04A2266
31,608,435 UART: [art] PUB.Y = 5BB5B1C4E346D3BD6EB76E7916C57B266D147224D6077C1C1DFCDF01EF086B406E278795C89F691E6322C5C3F29E6197
31,615,651 UART: [art] SIG.R = F890024F9543AFB9D0E1C1D32190E1CEE0E9ACC2DF22244C484312CF0A97A361DEBA0CE281EECBCB481483E6AD7046EC
31,623,155 UART: [art] SIG.S = AD862B0AE89D4092435A6C87929D718B22C96552D04CB48E2DAD30EBC65DBD21D71A82BC6BAEE53B3D552A9C4FFE61BB
32,928,458 UART: Caliptra RT
32,929,150 UART: [state] CFI Enabled
33,089,735 UART: [rt] RT listening for mailbox commands...
33,091,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,123,014 UART: [rt]cmd =0x44504543, len=96
38,907,605 >>> mbox cmd response data (6236 bytes)
38,936,679 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,966,844 UART: [rt]cmd =0x52564348, len=36
38,969,544 >>> mbox cmd response data (8 bytes)
38,969,874 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,000,076 UART: [rt]cmd =0x52564348, len=36
39,001,880 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,506 UART:
192,848 UART: Running Caliptra ROM ...
194,021 UART:
603,897 UART: [state] CFI Enabled
618,270 UART: [state] LifecycleState = Unprovisioned
620,220 UART: [state] DebugLocked = No
623,160 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,044 UART: [kat] SHA2-256
797,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,343 UART: [kat] ++
808,810 UART: [kat] sha1
821,034 UART: [kat] SHA2-256
823,768 UART: [kat] SHA2-384
830,823 UART: [kat] SHA2-512-ACC
833,191 UART: [kat] ECC-384
3,119,000 UART: [kat] HMAC-384Kdf
3,130,683 UART: [kat] LMS
4,320,733 UART: [kat] --
4,324,619 UART: [cold-reset] ++
4,326,425 UART: [fht] Storing FHT @ 0x50003400
4,338,048 UART: [idev] ++
4,338,614 UART: [idev] CDI.KEYID = 6
4,339,666 UART: [idev] SUBJECT.KEYID = 7
4,340,839 UART: [idev] UDS.KEYID = 0
4,341,954 ready_for_fw is high
4,342,194 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,343 UART: [idev] Erasing UDS.KEYID = 0
7,628,242 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,571 UART: [idev] --
7,654,805 UART: [ldev] ++
7,655,372 UART: [ldev] CDI.KEYID = 6
7,656,343 UART: [ldev] SUBJECT.KEYID = 5
7,657,556 UART: [ldev] AUTHORITY.KEYID = 7
7,658,844 UART: [ldev] FE.KEYID = 1
7,669,007 UART: [ldev] Erasing FE.KEYID = 1
10,958,854 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,792 UART: [ldev] --
13,320,136 UART: [fwproc] Waiting for Commands...
13,322,308 UART: [fwproc] Received command 0x46574c44
13,324,500 UART: [fwproc] Received Image of size 113844 bytes
17,379,632 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,866 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,841,101 >>> mbox cmd response: success
17,845,703 UART: [afmc] ++
17,846,327 UART: [afmc] CDI.KEYID = 6
17,847,244 UART: [afmc] SUBJECT.KEYID = 7
17,848,458 UART: [afmc] AUTHORITY.KEYID = 5
21,165,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,217 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,470 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,886 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,692 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,106 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,972 UART: [afmc] --
23,531,658 UART: [cold-reset] --
23,537,255 UART: [state] Locking Datavault
23,542,819 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,569 UART: [state] Locking ICCM
23,546,766 UART: [exit] Launching FMC @ 0x40000130
23,555,155 UART:
23,555,398 UART: Running Caliptra FMC ...
23,556,502 UART:
23,556,664 UART: [state] CFI Enabled
23,565,036 UART: [fht] FMC Alias Private Key: 7
25,895,494 UART: [art] Extend RT PCRs Done
25,896,722 UART: [art] Lock RT PCRs Done
25,898,157 UART: [art] Populate DV Done
25,903,622 UART: [fht] FMC Alias Private Key: 7
25,905,169 UART: [art] Derive CDI
25,905,929 UART: [art] Store in in slot 0x4
25,948,560 UART: [art] Derive Key Pair
25,949,597 UART: [art] Store priv key in slot 0x5
29,191,858 UART: [art] Derive Key Pair - Done
29,205,057 UART: [art] Signing Cert with AUTHO
29,206,368 UART: RITY.KEYID = 7
31,485,952 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,466 UART: [art] PUB.X = E3725E247A12FF71ADC2D3FD3E8FF6207F07191C8E9D1A0143239472386787534EEE486AB877D61577EC9EA93B1EA01B
31,494,719 UART: [art] PUB.Y = 7C6E000D13FE630734B1BF94D4669E5212D1A8FF34E017E518535D5C5308EF87BCED378F448FB56620C441F7A6BCB81A
31,501,959 UART: [art] SIG.R = 171D5BE69500E57D45A1E6EE883F6233674B906ED66BFC386FC80776ACC30208599BA703FD6917522B4656B566528B3A
31,509,342 UART: [art] SIG.S = 521594D21A5176FF834EBA29FFA974279050BF0A4BAD1B5E8A75A61E19D685F8FB25C1B6079ACE06380E9AD084C952D1
32,814,439 UART: Caliptra RT
32,815,151 UART: [state] CFI Enabled
32,932,819 UART: [rt] RT listening for mailbox commands...
32,934,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,965,691 UART: [rt]cmd =0x44504543, len=96
38,637,109 >>> mbox cmd response data (6236 bytes)
38,666,244 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,696,404 UART: [rt]cmd =0x52564348, len=36
38,698,897 >>> mbox cmd response data (8 bytes)
38,699,334 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,729,309 UART: [rt]cmd =0x52564348, len=36
38,731,112 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,130,459 ready_for_fw is high
4,130,882 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,500 >>> mbox cmd response: success
23,704,267 UART:
23,704,675 UART: Running Caliptra FMC ...
23,705,802 UART:
23,705,955 UART: [state] CFI Enabled
23,713,965 UART: [fht] FMC Alias Private Key: 7
26,044,939 UART: [art] Extend RT PCRs Done
26,046,178 UART: [art] Lock RT PCRs Done
26,048,105 UART: [art] Populate DV Done
26,053,755 UART: [fht] FMC Alias Private Key: 7
26,055,304 UART: [art] Derive CDI
26,056,126 UART: [art] Store in in slot 0x4
26,098,829 UART: [art] Derive Key Pair
26,099,840 UART: [art] Store priv key in slot 0x5
29,341,583 UART: [art] Derive Key Pair - Done
29,354,586 UART: [art] Signing Cert with AUTHO
29,355,896 UART: RITY.KEYID = 7
31,635,051 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,580 UART: [art] PUB.X = 1C6A086EDAB0EB6F2D24F7A06E8657DCA9F21287923DFC62F8D69E62C2A2D1F6DA8D5A3CB81FAD872DC9A871F8F3C714
31,643,815 UART: [art] PUB.Y = E8F55C327AC166D2939E32D52FE8E8D739DC494F352376C018627D6D4E3589FBA7B2175EDE2A2ED328FE0D1480539BDF
31,651,033 UART: [art] SIG.R = 0F12F252703FCB9D0768ECC42603B28BC36ED00B9678FBB226C717DECEE921ECED2C7ECC28AF377D08C633E2482E5667
31,658,438 UART: [art] SIG.S = 0D8C21F62ED8A4F6A4181597989C78E2EB5F2FEA748C4213B636682C20D446E60E05826D04AE2E1C93A286A7D4E0221E
32,963,496 UART: Caliptra RT
32,964,197 UART: [state] CFI Enabled
33,081,929 UART: [rt] RT listening for mailbox commands...
33,083,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,115,258 UART: [rt]cmd =0x44504543, len=96
38,786,794 >>> mbox cmd response data (6236 bytes)
38,816,028 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,846,276 UART: [rt]cmd =0x52564348, len=36
38,849,071 >>> mbox cmd response data (8 bytes)
38,849,426 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,879,338 UART: [rt]cmd =0x52564348, len=36
38,881,037 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,145 UART:
192,536 UART: Running Caliptra ROM ...
193,745 UART:
193,904 UART: [state] CFI Enabled
259,832 UART: [state] LifecycleState = Unprovisioned
261,747 UART: [state] DebugLocked = No
263,706 UART: [state] WD Timer not started. Device not locked for debugging
267,897 UART: [kat] SHA2-256
447,041 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,593 UART: [kat] ++
459,132 UART: [kat] sha1
469,837 UART: [kat] SHA2-256
472,889 UART: [kat] SHA2-384
479,100 UART: [kat] SHA2-512-ACC
482,036 UART: [kat] ECC-384
2,947,993 UART: [kat] HMAC-384Kdf
2,969,827 UART: [kat] LMS
3,499,282 UART: [kat] --
3,503,271 UART: [cold-reset] ++
3,505,379 UART: [fht] FHT @ 0x50003400
3,515,934 UART: [idev] ++
3,516,499 UART: [idev] CDI.KEYID = 6
3,517,485 UART: [idev] SUBJECT.KEYID = 7
3,518,660 UART: [idev] UDS.KEYID = 0
3,519,588 ready_for_fw is high
3,519,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,374 UART: [idev] Erasing UDS.KEYID = 0
6,026,296 UART: [idev] Sha1 KeyId Algorithm
6,049,944 UART: [idev] --
6,055,296 UART: [ldev] ++
6,055,873 UART: [ldev] CDI.KEYID = 6
6,056,791 UART: [ldev] SUBJECT.KEYID = 5
6,057,951 UART: [ldev] AUTHORITY.KEYID = 7
6,059,206 UART: [ldev] FE.KEYID = 1
6,090,767 UART: [ldev] Erasing FE.KEYID = 1
8,593,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,357,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,377,900 UART: [ldev] --
10,381,877 UART: [fwproc] Wait for Commands...
10,383,744 UART: [fwproc] Recv command 0x46574c44
10,385,850 UART: [fwproc] Recv'd Img size: 114168 bytes
13,784,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,858,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,926,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,243,288 >>> mbox cmd response: success
14,247,791 UART: [afmc] ++
14,248,442 UART: [afmc] CDI.KEYID = 6
14,249,358 UART: [afmc] SUBJECT.KEYID = 7
14,250,516 UART: [afmc] AUTHORITY.KEYID = 5
16,775,506 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,499,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,501,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,517,471 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,533,550 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,549,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,572,784 UART: [afmc] --
18,576,811 UART: [cold-reset] --
18,580,945 UART: [state] Locking Datavault
18,584,421 UART: [state] Locking PCR0, PCR1 and PCR31
18,586,134 UART: [state] Locking ICCM
18,587,722 UART: [exit] Launching FMC @ 0x40000130
18,596,118 UART:
18,596,378 UART: Running Caliptra FMC ...
18,597,479 UART:
18,597,643 UART: [state] CFI Enabled
18,657,415 UART: [fht] FMC Alias Private Key: 7
20,421,709 UART: [art] Extend RT PCRs Done
20,422,929 UART: [art] Lock RT PCRs Done
20,424,831 UART: [art] Populate DV Done
20,430,299 UART: [fht] FMC Alias Private Key: 7
20,431,844 UART: [art] Derive CDI
20,432,611 UART: [art] Store in in slot 0x4
20,489,710 UART: [art] Derive Key Pair
20,490,773 UART: [art] Store priv key in slot 0x5
22,953,624 UART: [art] Derive Key Pair - Done
22,966,724 UART: [art] Signing Cert with AUTHO
22,968,032 UART: RITY.KEYID = 7
24,678,829 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,347 UART: [art] PUB.X = A6D03C3352D60BB4F31834EBE90AA946E6E2373E2FAC4CB511C708875C75E060BCD858F8C43E65E12D44411DF501B2D4
24,687,607 UART: [art] PUB.Y = 595A00DD912BD5A200BF416520448B93CF960EE9B9A3D389015A380D9F5E5CC896EEA31AB2B3AA1B41E37EF06EC631B6
24,694,851 UART: [art] SIG.R = 868AAFE89AA8CF1AC955AF3D82202D994CC2952A45E544D07DF00A6FFD64E3D40EFAD7C881BFCD423555A8C016945224
24,702,420 UART: [art] SIG.S = B788C41B327FBAB36D3D0064304E27192CD7AD0617A5543E82507826875D8FC60D37D44859BBE99010D83AA583D9D35C
25,680,702 UART: Caliptra RT
25,681,652 UART: [state] CFI Enabled
25,847,228 UART: [rt] RT listening for mailbox commands...
25,849,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,880,831 UART: [rt]cmd =0x44504543, len=96
30,258,933 >>> mbox cmd response data (6236 bytes)
30,288,789 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,319,210 UART: [rt]cmd =0x52564348, len=36
30,321,924 >>> mbox cmd response data (8 bytes)
30,322,390 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,352,461 UART: [rt]cmd =0x52564348, len=36
30,354,491 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,358,262 ready_for_fw is high
3,358,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,040,630 >>> mbox cmd response: success
18,320,053 UART:
18,320,458 UART: Running Caliptra FMC ...
18,321,562 UART:
18,321,714 UART: [state] CFI Enabled
18,391,244 UART: [fht] FMC Alias Private Key: 7
20,155,067 UART: [art] Extend RT PCRs Done
20,156,297 UART: [art] Lock RT PCRs Done
20,158,112 UART: [art] Populate DV Done
20,163,849 UART: [fht] FMC Alias Private Key: 7
20,165,336 UART: [art] Derive CDI
20,166,071 UART: [art] Store in in slot 0x4
20,224,149 UART: [art] Derive Key Pair
20,225,189 UART: [art] Store priv key in slot 0x5
22,688,547 UART: [art] Derive Key Pair - Done
22,701,492 UART: [art] Signing Cert with AUTHO
22,702,800 UART: RITY.KEYID = 7
24,414,019 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,530 UART: [art] PUB.X = 9CC8F0D35594D42C76FF269703305017B8005CDF753500064A3DE718D2EB95705D906457BD4CF26857352C44545396B1
24,422,781 UART: [art] PUB.Y = C21660B5BD7C500CD96394CBE5EAC1B5675017567B56FEA7432D6B83CF3AE39B8E416BB3FB4DA4864B3D3EC3712E8F41
24,430,039 UART: [art] SIG.R = BEC35236EBF12CAE92445E8DCE4DFA73C85465499E392FDD492BFCCCD91C28A7EB0AC696E5293BF860BDE055921E0544
24,437,425 UART: [art] SIG.S = 1BEDF12A62A5C60EA3F2AAD3C4E4C987B9F8BB79BEDEB58ABD9E8CF45016C14BE1AEC6AD03576F04CBB9FB1CF31E7514
25,416,198 UART: Caliptra RT
25,416,910 UART: [state] CFI Enabled
25,581,292 UART: [rt] RT listening for mailbox commands...
25,583,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,614,280 UART: [rt]cmd =0x44504543, len=96
29,971,861 >>> mbox cmd response data (6236 bytes)
30,001,205 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,031,352 UART: [rt]cmd =0x52564348, len=36
30,034,286 >>> mbox cmd response data (8 bytes)
30,034,634 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,064,324 UART: [rt]cmd =0x52564348, len=36
30,066,198 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
193,036 UART:
193,412 UART: Running Caliptra ROM ...
194,602 UART:
603,909 UART: [state] CFI Enabled
618,859 UART: [state] LifecycleState = Unprovisioned
620,743 UART: [state] DebugLocked = No
623,341 UART: [state] WD Timer not started. Device not locked for debugging
626,954 UART: [kat] SHA2-256
806,133 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,646 UART: [kat] ++
818,183 UART: [kat] sha1
828,570 UART: [kat] SHA2-256
831,601 UART: [kat] SHA2-384
838,476 UART: [kat] SHA2-512-ACC
841,422 UART: [kat] ECC-384
3,281,692 UART: [kat] HMAC-384Kdf
3,295,254 UART: [kat] LMS
3,824,731 UART: [kat] --
3,828,873 UART: [cold-reset] ++
3,830,097 UART: [fht] FHT @ 0x50003400
3,840,294 UART: [idev] ++
3,840,861 UART: [idev] CDI.KEYID = 6
3,841,817 UART: [idev] SUBJECT.KEYID = 7
3,842,988 UART: [idev] UDS.KEYID = 0
3,844,072 ready_for_fw is high
3,844,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,793 UART: [idev] Erasing UDS.KEYID = 0
6,317,464 UART: [idev] Sha1 KeyId Algorithm
6,338,901 UART: [idev] --
6,341,935 UART: [ldev] ++
6,342,507 UART: [ldev] CDI.KEYID = 6
6,343,421 UART: [ldev] SUBJECT.KEYID = 5
6,344,598 UART: [ldev] AUTHORITY.KEYID = 7
6,345,834 UART: [ldev] FE.KEYID = 1
6,354,653 UART: [ldev] Erasing FE.KEYID = 1
8,828,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,524 UART: [ldev] --
10,615,934 UART: [fwproc] Wait for Commands...
10,618,946 UART: [fwproc] Recv command 0x46574c44
10,620,982 UART: [fwproc] Recv'd Img size: 114168 bytes
14,020,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,156,486 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,474,585 >>> mbox cmd response: success
14,479,163 UART: [afmc] ++
14,479,786 UART: [afmc] CDI.KEYID = 6
14,480,701 UART: [afmc] SUBJECT.KEYID = 7
14,481,805 UART: [afmc] AUTHORITY.KEYID = 5
16,979,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,700,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,702,520 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,718,320 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,734,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,750,199 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,772,370 UART: [afmc] --
18,776,250 UART: [cold-reset] --
18,780,977 UART: [state] Locking Datavault
18,787,191 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,886 UART: [state] Locking ICCM
18,791,446 UART: [exit] Launching FMC @ 0x40000130
18,799,857 UART:
18,800,090 UART: Running Caliptra FMC ...
18,801,116 UART:
18,801,266 UART: [state] CFI Enabled
18,809,477 UART: [fht] FMC Alias Private Key: 7
20,566,320 UART: [art] Extend RT PCRs Done
20,567,539 UART: [art] Lock RT PCRs Done
20,569,352 UART: [art] Populate DV Done
20,574,976 UART: [fht] FMC Alias Private Key: 7
20,576,522 UART: [art] Derive CDI
20,577,257 UART: [art] Store in in slot 0x4
20,619,954 UART: [art] Derive Key Pair
20,620,996 UART: [art] Store priv key in slot 0x5
23,047,942 UART: [art] Derive Key Pair - Done
23,060,624 UART: [art] Signing Cert with AUTHO
23,061,927 UART: RITY.KEYID = 7
24,767,387 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,895 UART: [art] PUB.X = 37D964F932E0845597967DB1C31E945B973656F5DAD3A69450C7902D07A50A77D48424DCD8A6F2715FB7516DD5E14302
24,776,149 UART: [art] PUB.Y = 63440EC2A5B1AE4750A330E50B5B1A0C6F392FABEBA7B6F60D86CF0D662FCBDFF68E4046D57C4B11D33B003952807355
24,783,385 UART: [art] SIG.R = FA65922F6166959F302755F5B4A2BDAC2F170BF7CD18C13736772DF3C047E62F83E93C35DA88C0A9B00CB313AB521F78
24,790,787 UART: [art] SIG.S = 803C63E04CBDF5FD54AA2F614C9210A095222EC691E543C70CD505DBB1B7D99218E4EBEDAB004E46035F6C896D19618E
25,769,841 UART: Caliptra RT
25,770,564 UART: [state] CFI Enabled
25,886,994 UART: [rt] RT listening for mailbox commands...
25,888,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,920,095 UART: [rt]cmd =0x44504543, len=96
30,202,585 >>> mbox cmd response data (6236 bytes)
30,231,654 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,261,815 UART: [rt]cmd =0x52564348, len=36
30,264,627 >>> mbox cmd response data (8 bytes)
30,265,072 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,295,067 UART: [rt]cmd =0x52564348, len=36
30,296,676 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
3,694,965 ready_for_fw is high
3,695,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,255,270 >>> mbox cmd response: success
18,503,397 UART:
18,503,814 UART: Running Caliptra FMC ...
18,504,955 UART:
18,505,121 UART: [state] CFI Enabled
18,512,705 UART: [fht] FMC Alias Private Key: 7
20,269,336 UART: [art] Extend RT PCRs Done
20,270,700 UART: [art] Lock RT PCRs Done
20,271,961 UART: [art] Populate DV Done
20,277,324 UART: [fht] FMC Alias Private Key: 7
20,279,025 UART: [art] Derive CDI
20,279,867 UART: [art] Store in in slot 0x4
20,322,364 UART: [art] Derive Key Pair
20,323,367 UART: [art] Store priv key in slot 0x5
22,750,360 UART: [art] Derive Key Pair - Done
22,763,199 UART: [art] Signing Cert with AUTHO
22,764,503 UART: RITY.KEYID = 7
24,469,850 UART: [art] Erasing AUTHORITY.KEYID = 7
24,471,362 UART: [art] PUB.X = A3B261E749AFFD53E041415EAC244FDA5A6EC5478CA616C8B6E91AF0EEF170172E3B625C090FF967039B65CAE07BC9A8
24,478,610 UART: [art] PUB.Y = F2C78F655F8B749AFCB86856CA5E102F7EE17A4A76AFD067129AFD2C01B4F379BC7EB68E41FAFAB55756221CBB5C3E72
24,485,923 UART: [art] SIG.R = 486F214D071406D9760932E0A1D32151BCDB7CB88E41B1E7C6373E081C6232CAEC218EBD2029BA1246777ACE2316FE9A
24,493,316 UART: [art] SIG.S = 29EBF6C73FC82F763357D8249BC9A36E43CA2026D1BFE5D8F3DE3653678C293DC7D0B7265A32F3A28310920208E675C0
25,472,391 UART: Caliptra RT
25,473,091 UART: [state] CFI Enabled
25,590,424 UART: [rt] RT listening for mailbox commands...
25,592,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,623,559 UART: [rt]cmd =0x44504543, len=96
29,906,145 >>> mbox cmd response data (6236 bytes)
29,935,514 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,965,493 UART: [rt]cmd =0x52564348, len=36
29,967,859 >>> mbox cmd response data (8 bytes)
29,968,300 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,998,324 UART: [rt]cmd =0x52564348, len=36
30,000,034 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,201 UART:
192,562 UART: Running Caliptra ROM ...
193,757 UART:
193,921 UART: [state] CFI Enabled
262,136 UART: [state] LifecycleState = Unprovisioned
264,565 UART: [state] DebugLocked = No
266,315 UART: [state] WD Timer not started. Device not locked for debugging
271,510 UART: [kat] SHA2-256
461,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,160 UART: [kat] ++
472,672 UART: [kat] sha1
483,536 UART: [kat] SHA2-256
486,523 UART: [kat] SHA2-384
492,949 UART: [kat] SHA2-512-ACC
495,531 UART: [kat] ECC-384
2,949,979 UART: [kat] HMAC-384Kdf
2,972,524 UART: [kat] LMS
3,504,290 UART: [kat] --
3,508,419 UART: [cold-reset] ++
3,509,636 UART: [fht] FHT @ 0x50003400
3,520,641 UART: [idev] ++
3,521,397 UART: [idev] CDI.KEYID = 6
3,522,310 UART: [idev] SUBJECT.KEYID = 7
3,523,491 UART: [idev] UDS.KEYID = 0
3,524,415 ready_for_fw is high
3,524,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,061 UART: [idev] Erasing UDS.KEYID = 0
6,028,957 UART: [idev] Sha1 KeyId Algorithm
6,050,621 UART: [idev] --
6,055,541 UART: [ldev] ++
6,056,226 UART: [ldev] CDI.KEYID = 6
6,057,116 UART: [ldev] SUBJECT.KEYID = 5
6,058,331 UART: [ldev] AUTHORITY.KEYID = 7
6,059,512 UART: [ldev] FE.KEYID = 1
6,104,129 UART: [ldev] Erasing FE.KEYID = 1
8,606,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,417 UART: [ldev] --
10,396,246 UART: [fwproc] Wait for Commands...
10,399,130 UART: [fwproc] Recv command 0x46574c44
10,401,399 UART: [fwproc] Recv'd Img size: 114168 bytes
13,838,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,918,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,034,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,576,575 >>> mbox cmd response: success
14,580,437 UART: [afmc] ++
14,581,178 UART: [afmc] CDI.KEYID = 6
14,582,379 UART: [afmc] SUBJECT.KEYID = 7
14,583,823 UART: [afmc] AUTHORITY.KEYID = 5
17,117,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,843,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,845,054 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,860,272 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,875,413 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,890,396 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,914,301 UART: [afmc] --
18,917,101 UART: [cold-reset] --
18,922,271 UART: [state] Locking Datavault
18,928,563 UART: [state] Locking PCR0, PCR1 and PCR31
18,930,776 UART: [state] Locking ICCM
18,932,284 UART: [exit] Launching FMC @ 0x40000130
18,940,983 UART:
18,941,221 UART: Running Caliptra FMC ...
18,942,320 UART:
18,942,480 UART: [state] CFI Enabled
19,001,556 UART: [fht] FMC Alias Private Key: 7
20,765,196 UART: [art] Extend RT PCRs Done
20,766,408 UART: [art] Lock RT PCRs Done
20,768,042 UART: [art] Populate DV Done
20,773,562 UART: [fht] FMC Alias Private Key: 7
20,775,151 UART: [art] Derive CDI
20,775,982 UART: [art] Store in in slot 0x4
20,833,723 UART: [art] Derive Key Pair
20,834,764 UART: [art] Store priv key in slot 0x5
23,297,585 UART: [art] Derive Key Pair - Done
23,310,633 UART: [art] Signing Cert with AUTHO
23,311,931 UART: RITY.KEYID = 7
25,022,575 UART: [art] Erasing AUTHORITY.KEYID = 7
25,024,075 UART: [art] PUB.X = 3EAF4CAD130AC4AE4E4DB7DC25201DA411D040FECD1A995701C562D9AD48F501C3F02DEEFF388FC083399177F8269E0C
25,031,346 UART: [art] PUB.Y = C867317229914C744C76349B1AB66B452AE8F75982B41D1B97BF73607AA63A177605BA9E136FD6954BD6E26A55428F0B
25,038,626 UART: [art] SIG.R = 860E6FC678606DC09E5C2CF3ED15383B7DA3A0CE981A859B81012F405574E7D6675E4B8A2D13E23766FB814EDE3111D0
25,046,002 UART: [art] SIG.S = E528EA50A2BAB9BCEAD5E6BD25EB1DAAE7F559885E6FA8047226AD1B72EC81D24FB2ACCD8EA51AB0F602046C136F9301
26,025,466 UART: Caliptra RT
26,026,178 UART: [state] CFI Enabled
26,190,634 UART: [rt] RT listening for mailbox commands...
26,192,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,223,702 UART: [rt]cmd =0x44504543, len=96
30,582,498 >>> mbox cmd response data (6236 bytes)
30,611,673 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,641,752 UART: [rt]cmd =0x52564348, len=36
30,644,222 >>> mbox cmd response data (8 bytes)
30,644,582 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,674,691 UART: [rt]cmd =0x52564348, len=36
30,676,668 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,436,617 ready_for_fw is high
3,436,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,761,283 >>> mbox cmd response: success
19,046,259 UART:
19,046,669 UART: Running Caliptra FMC ...
19,047,780 UART:
19,047,967 UART: [state] CFI Enabled
19,113,667 UART: [fht] FMC Alias Private Key: 7
20,878,060 UART: [art] Extend RT PCRs Done
20,879,280 UART: [art] Lock RT PCRs Done
20,880,936 UART: [art] Populate DV Done
20,886,358 UART: [fht] FMC Alias Private Key: 7
20,888,065 UART: [art] Derive CDI
20,888,886 UART: [art] Store in in slot 0x4
20,945,473 UART: [art] Derive Key Pair
20,946,504 UART: [art] Store priv key in slot 0x5
23,409,324 UART: [art] Derive Key Pair - Done
23,422,218 UART: [art] Signing Cert with AUTHO
23,423,524 UART: RITY.KEYID = 7
25,135,527 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,034 UART: [art] PUB.X = 0C74CD7456212F9FE6B2418B7C53D7A4B2E79BAA884F0C9CAD38F0C53971DE99DCE090372E4B16D100DC590917D24B80
25,144,271 UART: [art] PUB.Y = 9D0C9255B00D939148EFF5327C782C28C2E5E97C2B466B363C8D842AEE155049405322EA5C18E1A0AF7C635A48757D7B
25,151,521 UART: [art] SIG.R = 97E599817959B62DE8F9FB7B99165C176D05A3EFD9B999F6B5AACBEAA627AEDA6286370314F012DBF6F341DD22BFDECD
25,158,903 UART: [art] SIG.S = 7A8E26F1791F33B93D2CF7FD7D21DE0763204117DD8CA6E739F4D32D0EAE25109F0CA0F762EE31D3A45FB3CD08F10233
26,137,781 UART: Caliptra RT
26,138,494 UART: [state] CFI Enabled
26,303,565 UART: [rt] RT listening for mailbox commands...
26,305,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,336,573 UART: [rt]cmd =0x44504543, len=96
30,695,275 >>> mbox cmd response data (6236 bytes)
30,724,388 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,754,633 UART: [rt]cmd =0x52564348, len=36
30,757,428 >>> mbox cmd response data (8 bytes)
30,757,855 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,787,871 UART: [rt]cmd =0x52564348, len=36
30,789,737 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
192,813 UART:
193,177 UART: Running Caliptra ROM ...
194,379 UART:
604,112 UART: [state] CFI Enabled
616,368 UART: [state] LifecycleState = Unprovisioned
618,769 UART: [state] DebugLocked = No
621,443 UART: [state] WD Timer not started. Device not locked for debugging
626,119 UART: [kat] SHA2-256
815,940 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,735 UART: [kat] ++
827,340 UART: [kat] sha1
840,069 UART: [kat] SHA2-256
843,076 UART: [kat] SHA2-384
848,213 UART: [kat] SHA2-512-ACC
850,800 UART: [kat] ECC-384
3,288,520 UART: [kat] HMAC-384Kdf
3,303,087 UART: [kat] LMS
3,834,898 UART: [kat] --
3,840,050 UART: [cold-reset] ++
3,841,581 UART: [fht] FHT @ 0x50003400
3,852,424 UART: [idev] ++
3,853,136 UART: [idev] CDI.KEYID = 6
3,854,053 UART: [idev] SUBJECT.KEYID = 7
3,855,299 UART: [idev] UDS.KEYID = 0
3,856,229 ready_for_fw is high
3,856,422 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,999,792 UART: [idev] Erasing UDS.KEYID = 0
6,331,342 UART: [idev] Sha1 KeyId Algorithm
6,352,952 UART: [idev] --
6,358,132 UART: [ldev] ++
6,358,812 UART: [ldev] CDI.KEYID = 6
6,359,720 UART: [ldev] SUBJECT.KEYID = 5
6,360,880 UART: [ldev] AUTHORITY.KEYID = 7
6,362,109 UART: [ldev] FE.KEYID = 1
6,371,510 UART: [ldev] Erasing FE.KEYID = 1
8,848,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,181 UART: [ldev] --
10,640,829 UART: [fwproc] Wait for Commands...
10,642,990 UART: [fwproc] Recv command 0x46574c44
10,645,297 UART: [fwproc] Recv'd Img size: 114168 bytes
14,088,250 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,272 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,829,645 >>> mbox cmd response: success
14,834,496 UART: [afmc] ++
14,835,225 UART: [afmc] CDI.KEYID = 6
14,836,413 UART: [afmc] SUBJECT.KEYID = 7
14,837,867 UART: [afmc] AUTHORITY.KEYID = 5
17,341,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,065,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,067,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,011 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,098,186 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,113,199 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,216 UART: [afmc] --
19,141,625 UART: [cold-reset] --
19,145,057 UART: [state] Locking Datavault
19,152,256 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,394 UART: [state] Locking ICCM
19,156,275 UART: [exit] Launching FMC @ 0x40000130
19,164,956 UART:
19,165,196 UART: Running Caliptra FMC ...
19,166,297 UART:
19,166,480 UART: [state] CFI Enabled
19,174,801 UART: [fht] FMC Alias Private Key: 7
20,931,790 UART: [art] Extend RT PCRs Done
20,933,009 UART: [art] Lock RT PCRs Done
20,934,695 UART: [art] Populate DV Done
20,940,111 UART: [fht] FMC Alias Private Key: 7
20,941,745 UART: [art] Derive CDI
20,942,569 UART: [art] Store in in slot 0x4
20,984,945 UART: [art] Derive Key Pair
20,985,948 UART: [art] Store priv key in slot 0x5
23,412,623 UART: [art] Derive Key Pair - Done
23,425,871 UART: [art] Signing Cert with AUTHO
23,427,204 UART: RITY.KEYID = 7
25,132,953 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,457 UART: [art] PUB.X = 8C9E19EBA5D6BB3B77FF4F086E90C3971B4F0F2DDAB52AC4E41F76BBB528EA8644B32490D796102186CBE14B0BC6AF88
25,141,763 UART: [art] PUB.Y = 013A8941331B1B559D8A406FFD64E183A0C02C8F0A048FD07A4D459C9DC7E815AF293C62464DF37C9EF9DE552ED5837A
25,149,018 UART: [art] SIG.R = C5CB22FDF1EC163639E2B33D355B234913BF386414E5B94039C67852DA51637D1349454C908422A96845894DB0A35E24
25,156,368 UART: [art] SIG.S = 972BDF0F1D45D45B7D7CDF5DFC5B1B14124A324F09116E08C86909E26E925BA668A47E8C03156F97488C4AC623DBA51B
26,135,144 UART: Caliptra RT
26,135,831 UART: [state] CFI Enabled
26,252,519 UART: [rt] RT listening for mailbox commands...
26,254,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,285,431 UART: [rt]cmd =0x44504543, len=96
30,567,639 >>> mbox cmd response data (6236 bytes)
30,596,708 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,626,828 UART: [rt]cmd =0x52564348, len=36
30,629,409 >>> mbox cmd response data (8 bytes)
30,629,838 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,659,754 UART: [rt]cmd =0x52564348, len=36
30,661,463 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,726 writing to cptra_bootfsm_go
3,761,223 ready_for_fw is high
3,761,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,964,367 >>> mbox cmd response: success
19,213,538 UART:
19,213,916 UART: Running Caliptra FMC ...
19,215,096 UART:
19,215,270 UART: [state] CFI Enabled
19,223,215 UART: [fht] FMC Alias Private Key: 7
20,980,272 UART: [art] Extend RT PCRs Done
20,981,493 UART: [art] Lock RT PCRs Done
20,982,961 UART: [art] Populate DV Done
20,988,541 UART: [fht] FMC Alias Private Key: 7
20,990,029 UART: [art] Derive CDI
20,990,794 UART: [art] Store in in slot 0x4
21,033,553 UART: [art] Derive Key Pair
21,034,559 UART: [art] Store priv key in slot 0x5
23,460,751 UART: [art] Derive Key Pair - Done
23,473,613 UART: [art] Signing Cert with AUTHO
23,474,916 UART: RITY.KEYID = 7
25,180,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,805 UART: [art] PUB.X = 32C92BCFBB35A5CA38692937EEE1C8A3F0093548A9D664328BC1A53B16E19962D491E102ABCC965928DFB529F3B4E188
25,189,050 UART: [art] PUB.Y = 0B61E0D86B6CB4EE52FE78172ABCA91CC23D60FB8369FC9451F73C9BE0A9BFA142849D4CD8E5AA609177B1B23C672CBB
25,196,345 UART: [art] SIG.R = F8BD88683D2FBFA12FE28B5D4C2A641B53765BC7B20B97EFC814E118C248564F4A688166A3F4876FD3AD0A7E8AAC381A
25,203,743 UART: [art] SIG.S = CB1D154F0AD47EB0EDF76EABEFE8DAE53D500962C4C67C50B76AD29F67C0998A33FFA259897011E54DBFA83F725433F4
26,182,366 UART: Caliptra RT
26,183,053 UART: [state] CFI Enabled
26,300,986 UART: [rt] RT listening for mailbox commands...
26,302,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,099 UART: [rt]cmd =0x44504543, len=96
30,616,927 >>> mbox cmd response data (6236 bytes)
30,646,131 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,676,311 UART: [rt]cmd =0x52564348, len=36
30,678,920 >>> mbox cmd response data (8 bytes)
30,679,381 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,709,250 UART: [rt]cmd =0x52564348, len=36
30,711,225 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,655 UART: [kat] SHA2-256
892,593 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
903,192 UART: [kat] HMAC-384Kdf
907,844 UART: [kat] LMS
1,476,040 UART: [kat] --
1,476,717 UART: [cold-reset] ++
1,477,219 UART: [fht] Storing FHT @ 0x50003400
1,480,200 UART: [idev] ++
1,480,368 UART: [idev] CDI.KEYID = 6
1,480,728 UART: [idev] SUBJECT.KEYID = 7
1,481,152 UART: [idev] UDS.KEYID = 0
1,481,497 ready_for_fw is high
1,481,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,504,950 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,644 UART: [idev] --
1,514,577 UART: [ldev] ++
1,514,745 UART: [ldev] CDI.KEYID = 6
1,515,108 UART: [ldev] SUBJECT.KEYID = 5
1,515,534 UART: [ldev] AUTHORITY.KEYID = 7
1,515,997 UART: [ldev] FE.KEYID = 1
1,521,365 UART: [ldev] Erasing FE.KEYID = 1
1,546,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,682 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,808 UART: [fwproc] Received command 0x46574c44
1,587,599 UART: [fwproc] Received Image of size 114168 bytes
2,883,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,830 >>> mbox cmd response: success
3,076,072 UART: [afmc] ++
3,076,240 UART: [afmc] CDI.KEYID = 6
3,076,602 UART: [afmc] SUBJECT.KEYID = 7
3,077,027 UART: [afmc] AUTHORITY.KEYID = 5
3,111,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,332 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,112 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,840 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,725 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,415 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,148 UART: [afmc] --
3,155,268 UART: [cold-reset] --
3,156,186 UART: [state] Locking Datavault
3,157,161 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,765 UART: [state] Locking ICCM
3,158,369 UART: [exit] Launching FMC @ 0x40000130
3,163,698 UART:
3,163,714 UART: Running Caliptra FMC ...
3,164,122 UART:
3,164,176 UART: [state] CFI Enabled
3,174,477 UART: [fht] FMC Alias Private Key: 7
3,282,492 UART: [art] Extend RT PCRs Done
3,282,920 UART: [art] Lock RT PCRs Done
3,284,188 UART: [art] Populate DV Done
3,292,285 UART: [fht] FMC Alias Private Key: 7
3,293,249 UART: [art] Derive CDI
3,293,529 UART: [art] Store in in slot 0x4
3,379,012 UART: [art] Derive Key Pair
3,379,372 UART: [art] Store priv key in slot 0x5
3,392,730 UART: [art] Derive Key Pair - Done
3,407,558 UART: [art] Signing Cert with AUTHO
3,408,038 UART: RITY.KEYID = 7
3,423,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,853 UART: [art] PUB.X = E45EE11415FB1092A1149E819F544061C0B7EEF8E8255308F635666DF50BEB31F4D99F958C6E6D1FE2951841BBF2A9AC
3,430,623 UART: [art] PUB.Y = 8EF65AB31CBCE48031A212A6AC9A811A2210C19714F1CAB38D175ADD72C880FBAD0A7633EC01FF2B59A72AC7A409D829
3,437,580 UART: [art] SIG.R = 079A67D5A1B299D762A1A44C5DB3BA768868C6B76269004663961933E87E2789758206CD71181023C9ECBF67FD79164A
3,444,312 UART: [art] SIG.S = B94F29EF0B2E9BB480CCED9FEA801D385D885FD3BD9D5E7A775A0254DD763C3469A80EE06231BF3AEC00A53E459886AC
3,467,962 UART: Caliptra RT
3,468,215 UART: [state] CFI Enabled
3,577,006 UART: [rt] RT listening for mailbox commands...
3,577,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,000 UART: [rt]cmd =0x44504543, len=96
3,788,420 >>> mbox cmd response data (6236 bytes)
3,788,421 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,817,894 UART: [rt]cmd =0x52564348, len=36
3,820,205 >>> mbox cmd response data (8 bytes)
3,820,206 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,849,785 UART: [rt]cmd =0x52564348, len=36
3,851,309 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,659 ready_for_fw is high
1,362,659 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,396 >>> mbox cmd response: success
2,988,200 UART:
2,988,216 UART: Running Caliptra FMC ...
2,988,624 UART:
2,988,678 UART: [state] CFI Enabled
2,998,753 UART: [fht] FMC Alias Private Key: 7
3,106,056 UART: [art] Extend RT PCRs Done
3,106,484 UART: [art] Lock RT PCRs Done
3,107,864 UART: [art] Populate DV Done
3,115,963 UART: [fht] FMC Alias Private Key: 7
3,116,905 UART: [art] Derive CDI
3,117,185 UART: [art] Store in in slot 0x4
3,203,174 UART: [art] Derive Key Pair
3,203,534 UART: [art] Store priv key in slot 0x5
3,216,622 UART: [art] Derive Key Pair - Done
3,231,841 UART: [art] Signing Cert with AUTHO
3,232,321 UART: RITY.KEYID = 7
3,247,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,404 UART: [art] PUB.X = 72F6296974A145160FF2E694FFB72B8E6C1DFF41FB4B02AE66132935600C55DB5588FE9BC7E2D6FED5022CC3030C385A
3,255,164 UART: [art] PUB.Y = E4077B08FCA816C31B39C209931E81CB17428014D73F5FBAC9B398B489F404E3A72D485BBA9DD6E11920895ED9C7BA98
3,262,108 UART: [art] SIG.R = 327CFF35126ECDAED65F2E9F828D0F69B3B5B4D6F905C3D7C658848B2FEF983F8F2B1A5DD7F94ECEEFB57A47519C2432
3,268,892 UART: [art] SIG.S = 97AEE631C9EE9F013DCC4A80FB45BD40D65D34A95865D336F75CB7C21905EB62BAB6702FEA795DE012AEEF86ADC9EAD4
3,292,493 UART: Caliptra RT
3,292,746 UART: [state] CFI Enabled
3,400,541 UART: [rt] RT listening for mailbox commands...
3,401,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,609 UART: [rt]cmd =0x44504543, len=96
3,612,900 >>> mbox cmd response data (6236 bytes)
3,612,901 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,434 UART: [rt]cmd =0x52564348, len=36
3,644,707 >>> mbox cmd response data (8 bytes)
3,644,708 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,674,271 UART: [rt]cmd =0x52564348, len=36
3,675,925 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,922 UART: [kat] SHA2-256
892,860 UART: [kat] SHA2-384
895,481 UART: [kat] SHA2-512-ACC
897,382 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,277 UART: [kat] LMS
1,475,473 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,856 UART: [fht] Storing FHT @ 0x50003400
1,479,611 UART: [idev] ++
1,479,779 UART: [idev] CDI.KEYID = 6
1,480,139 UART: [idev] SUBJECT.KEYID = 7
1,480,563 UART: [idev] UDS.KEYID = 0
1,480,908 ready_for_fw is high
1,480,908 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,881 UART: [idev] Erasing UDS.KEYID = 0
1,505,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,819 UART: [idev] --
1,514,694 UART: [ldev] ++
1,514,862 UART: [ldev] CDI.KEYID = 6
1,515,225 UART: [ldev] SUBJECT.KEYID = 5
1,515,651 UART: [ldev] AUTHORITY.KEYID = 7
1,516,114 UART: [ldev] FE.KEYID = 1
1,521,608 UART: [ldev] Erasing FE.KEYID = 1
1,546,543 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,361 UART: [ldev] --
1,585,838 UART: [fwproc] Waiting for Commands...
1,586,585 UART: [fwproc] Received command 0x46574c44
1,587,376 UART: [fwproc] Received Image of size 114168 bytes
2,883,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,289 >>> mbox cmd response: success
3,077,515 UART: [afmc] ++
3,077,683 UART: [afmc] CDI.KEYID = 6
3,078,045 UART: [afmc] SUBJECT.KEYID = 7
3,078,470 UART: [afmc] AUTHORITY.KEYID = 5
3,113,803 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,009 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,402 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,092 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,965 UART: [afmc] --
3,157,085 UART: [cold-reset] --
3,158,051 UART: [state] Locking Datavault
3,159,102 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,706 UART: [state] Locking ICCM
3,160,232 UART: [exit] Launching FMC @ 0x40000130
3,165,561 UART:
3,165,577 UART: Running Caliptra FMC ...
3,165,985 UART:
3,166,128 UART: [state] CFI Enabled
3,176,693 UART: [fht] FMC Alias Private Key: 7
3,284,274 UART: [art] Extend RT PCRs Done
3,284,702 UART: [art] Lock RT PCRs Done
3,286,332 UART: [art] Populate DV Done
3,294,775 UART: [fht] FMC Alias Private Key: 7
3,295,867 UART: [art] Derive CDI
3,296,147 UART: [art] Store in in slot 0x4
3,381,984 UART: [art] Derive Key Pair
3,382,344 UART: [art] Store priv key in slot 0x5
3,395,842 UART: [art] Derive Key Pair - Done
3,410,951 UART: [art] Signing Cert with AUTHO
3,411,431 UART: RITY.KEYID = 7
3,426,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,476 UART: [art] PUB.X = 7056C1768B1E587EDF25421E44E21D66107753D4F3B3332288FE85A8A0D8CB7A499A4C74DC4E4571960D701E9E02ACE1
3,434,240 UART: [art] PUB.Y = CD736FAEF5134C5D60F634549FB654A8955B7131E859E7E0078D0DD6D361CF8A8E66970658B286970D934D41472002FF
3,441,171 UART: [art] SIG.R = DBCE4332F729E469F66AAE3938A73877B792D1BDBED360B78726A9A3871D19E08C18BEAF431721CE18028269076A9D6A
3,447,939 UART: [art] SIG.S = 4AEE95BB896443AC26549DF90800760150E90BDD89CAB537211ABB7F6CEAE4B2ED41384E80A0EE71E3519B87DDD72B11
3,472,155 UART: Caliptra RT
3,472,500 UART: [state] CFI Enabled
3,581,035 UART: [rt] RT listening for mailbox commands...
3,581,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,209 UART: [rt]cmd =0x44504543, len=96
3,792,799 >>> mbox cmd response data (6236 bytes)
3,792,800 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,363 UART: [rt]cmd =0x52564348, len=36
3,824,556 >>> mbox cmd response data (8 bytes)
3,824,557 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,853,954 UART: [rt]cmd =0x52564348, len=36
3,855,378 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,082 ready_for_fw is high
1,363,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,051 >>> mbox cmd response: success
2,990,267 UART:
2,990,283 UART: Running Caliptra FMC ...
2,990,691 UART:
2,990,834 UART: [state] CFI Enabled
3,001,661 UART: [fht] FMC Alias Private Key: 7
3,110,168 UART: [art] Extend RT PCRs Done
3,110,596 UART: [art] Lock RT PCRs Done
3,112,140 UART: [art] Populate DV Done
3,120,309 UART: [fht] FMC Alias Private Key: 7
3,121,331 UART: [art] Derive CDI
3,121,611 UART: [art] Store in in slot 0x4
3,207,614 UART: [art] Derive Key Pair
3,207,974 UART: [art] Store priv key in slot 0x5
3,221,174 UART: [art] Derive Key Pair - Done
3,235,875 UART: [art] Signing Cert with AUTHO
3,236,355 UART: RITY.KEYID = 7
3,251,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,292 UART: [art] PUB.X = 3140C6C5FEB80CAEE98FE6C182058D422EC499B90AD0DF48CB90E92A9B9581D4120419C1C07F1A55E19460943877E2E5
3,259,054 UART: [art] PUB.Y = ED21A43C5A0522CFAD25BBA93FB2FF2C403C978BB0D4663C3F9D4DAA16AE67FB8C36E831551FB24F04D9D5E8F1D951FD
3,266,022 UART: [art] SIG.R = 945955A08044DDCC11617A05B64B25C0A4D8F79AB82D4C4211E43A7F92D23C82C48519AA3AAD56C87D0F89EBA66E2E07
3,272,791 UART: [art] SIG.S = FDE9EF17661F361604BB4E3C65E61776DF2DABF3104DD22CC69AA598A6FFB1FA653A23BB74EBF96D1901BF843751984E
3,296,376 UART: Caliptra RT
3,296,721 UART: [state] CFI Enabled
3,405,543 UART: [rt] RT listening for mailbox commands...
3,406,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,665 UART: [rt]cmd =0x44504543, len=96
3,616,945 >>> mbox cmd response data (6236 bytes)
3,616,946 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,601 UART: [rt]cmd =0x52564348, len=36
3,648,984 >>> mbox cmd response data (8 bytes)
3,648,985 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,678,538 UART: [rt]cmd =0x52564348, len=36
3,680,054 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
893,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,653 UART: [kat] ++
897,805 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,602 UART: [kat] SHA2-512-ACC
908,503 UART: [kat] ECC-384
918,600 UART: [kat] HMAC-384Kdf
923,396 UART: [kat] LMS
1,171,724 UART: [kat] --
1,172,521 UART: [cold-reset] ++
1,173,045 UART: [fht] FHT @ 0x50003400
1,175,556 UART: [idev] ++
1,175,724 UART: [idev] CDI.KEYID = 6
1,176,084 UART: [idev] SUBJECT.KEYID = 7
1,176,508 UART: [idev] UDS.KEYID = 0
1,176,853 ready_for_fw is high
1,176,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,732 UART: [idev] Erasing UDS.KEYID = 0
1,201,765 UART: [idev] Sha1 KeyId Algorithm
1,210,293 UART: [idev] --
1,211,351 UART: [ldev] ++
1,211,519 UART: [ldev] CDI.KEYID = 6
1,211,882 UART: [ldev] SUBJECT.KEYID = 5
1,212,308 UART: [ldev] AUTHORITY.KEYID = 7
1,212,771 UART: [ldev] FE.KEYID = 1
1,218,105 UART: [ldev] Erasing FE.KEYID = 1
1,244,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,753 UART: [ldev] --
1,284,072 UART: [fwproc] Wait for Commands...
1,284,810 UART: [fwproc] Recv command 0x46574c44
1,285,538 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,888 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,491 >>> mbox cmd response: success
2,773,635 UART: [afmc] ++
2,773,803 UART: [afmc] CDI.KEYID = 6
2,774,165 UART: [afmc] SUBJECT.KEYID = 7
2,774,590 UART: [afmc] AUTHORITY.KEYID = 5
2,810,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,002 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,615 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,334 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,186 UART: [afmc] --
2,853,148 UART: [cold-reset] --
2,853,940 UART: [state] Locking Datavault
2,855,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,941 UART: [state] Locking ICCM
2,856,479 UART: [exit] Launching FMC @ 0x40000130
2,861,808 UART:
2,861,824 UART: Running Caliptra FMC ...
2,862,232 UART:
2,862,286 UART: [state] CFI Enabled
2,872,741 UART: [fht] FMC Alias Private Key: 7
2,980,716 UART: [art] Extend RT PCRs Done
2,981,144 UART: [art] Lock RT PCRs Done
2,982,858 UART: [art] Populate DV Done
2,991,139 UART: [fht] FMC Alias Private Key: 7
2,992,245 UART: [art] Derive CDI
2,992,525 UART: [art] Store in in slot 0x4
3,077,858 UART: [art] Derive Key Pair
3,078,218 UART: [art] Store priv key in slot 0x5
3,090,890 UART: [art] Derive Key Pair - Done
3,105,677 UART: [art] Signing Cert with AUTHO
3,106,157 UART: RITY.KEYID = 7
3,120,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,756 UART: [art] PUB.X = AB5D6D780BAE33BEA75F6737DCF6060A503E0EBB22485D04B45811736FD60E7A60BCBB68ABCD70BEDF4C4EBBA303054D
3,128,526 UART: [art] PUB.Y = CCC21F083E3AE9A4ADBC3B1A675FE6E9425327273967A783DD7FDB9245EBC82CF84E3E44A386E156B5B1FA88A7011003
3,135,479 UART: [art] SIG.R = 22EE97464407856D0FF957789187157D378EDDC62CD69D4133B9950F34C7611E1198228B9DCB7645EE50DE04C1C1725F
3,142,231 UART: [art] SIG.S = 0A9C21CAEFE8780CBC33862B919FFB2C5F225EA9FC39A05051091225039422D899F8C07532722562A0A5133DBD654F1F
3,165,858 UART: Caliptra RT
3,166,111 UART: [state] CFI Enabled
3,274,258 UART: [rt] RT listening for mailbox commands...
3,274,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,144 UART: [rt]cmd =0x44504543, len=96
3,484,837 >>> mbox cmd response data (6236 bytes)
3,484,838 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,269 UART: [rt]cmd =0x52564348, len=36
3,516,550 >>> mbox cmd response data (8 bytes)
3,516,551 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,058 UART: [rt]cmd =0x52564348, len=36
3,547,672 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,705 ready_for_fw is high
1,059,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,986 >>> mbox cmd response: success
2,685,912 UART:
2,685,928 UART: Running Caliptra FMC ...
2,686,336 UART:
2,686,390 UART: [state] CFI Enabled
2,696,705 UART: [fht] FMC Alias Private Key: 7
2,804,790 UART: [art] Extend RT PCRs Done
2,805,218 UART: [art] Lock RT PCRs Done
2,806,964 UART: [art] Populate DV Done
2,815,365 UART: [fht] FMC Alias Private Key: 7
2,816,321 UART: [art] Derive CDI
2,816,601 UART: [art] Store in in slot 0x4
2,902,472 UART: [art] Derive Key Pair
2,902,832 UART: [art] Store priv key in slot 0x5
2,916,370 UART: [art] Derive Key Pair - Done
2,931,184 UART: [art] Signing Cert with AUTHO
2,931,664 UART: RITY.KEYID = 7
2,946,744 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,509 UART: [art] PUB.X = 7805200345AAB15CBE3ED13F279479741F66E6A4C8241E7DA9C86063A9E4AF294DA2317393054C19ECE45BAD18860C3D
2,954,269 UART: [art] PUB.Y = DA82E28016D9E1310BEB9F3630140A28415F07F451CA6B612C18005EA68A038F279101B53F958147432E68EC2E1C0D33
2,961,173 UART: [art] SIG.R = 9D218E407EA897A594A442D230649D70C5D30D23470A6DF117F07B7BD64586470512786947F01143686199DFB5C9CECE
2,967,926 UART: [art] SIG.S = E1F949CE5A8FF7AB5CBD72F274D5784E6357AF887DC1AD28469DB0CF5EC40EF2AEDA4A047093532140F6829DE9FB4BD0
2,992,145 UART: Caliptra RT
2,992,398 UART: [state] CFI Enabled
3,100,268 UART: [rt] RT listening for mailbox commands...
3,100,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,378 UART: [rt]cmd =0x44504543, len=96
3,311,420 >>> mbox cmd response data (6236 bytes)
3,311,421 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,984 UART: [rt]cmd =0x52564348, len=36
3,342,947 >>> mbox cmd response data (8 bytes)
3,342,948 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,655 UART: [rt]cmd =0x52564348, len=36
3,373,919 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
893,655 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,780 UART: [kat] ++
897,932 UART: [kat] sha1
902,164 UART: [kat] SHA2-256
904,104 UART: [kat] SHA2-384
907,047 UART: [kat] SHA2-512-ACC
908,948 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,223 UART: [kat] LMS
1,171,551 UART: [kat] --
1,172,256 UART: [cold-reset] ++
1,172,742 UART: [fht] FHT @ 0x50003400
1,175,415 UART: [idev] ++
1,175,583 UART: [idev] CDI.KEYID = 6
1,175,943 UART: [idev] SUBJECT.KEYID = 7
1,176,367 UART: [idev] UDS.KEYID = 0
1,176,712 ready_for_fw is high
1,176,712 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,729 UART: [idev] Erasing UDS.KEYID = 0
1,201,988 UART: [idev] Sha1 KeyId Algorithm
1,210,652 UART: [idev] --
1,211,806 UART: [ldev] ++
1,211,974 UART: [ldev] CDI.KEYID = 6
1,212,337 UART: [ldev] SUBJECT.KEYID = 5
1,212,763 UART: [ldev] AUTHORITY.KEYID = 7
1,213,226 UART: [ldev] FE.KEYID = 1
1,218,278 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,894 UART: [ldev] --
1,283,279 UART: [fwproc] Wait for Commands...
1,283,889 UART: [fwproc] Recv command 0x46574c44
1,284,617 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,613 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,220 >>> mbox cmd response: success
2,775,386 UART: [afmc] ++
2,775,554 UART: [afmc] CDI.KEYID = 6
2,775,916 UART: [afmc] SUBJECT.KEYID = 7
2,776,341 UART: [afmc] AUTHORITY.KEYID = 5
2,812,002 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,113 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,841 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,726 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,445 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,377 UART: [afmc] --
2,855,441 UART: [cold-reset] --
2,856,469 UART: [state] Locking Datavault
2,857,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,166 UART: [state] Locking ICCM
2,858,656 UART: [exit] Launching FMC @ 0x40000130
2,863,985 UART:
2,864,001 UART: Running Caliptra FMC ...
2,864,409 UART:
2,864,552 UART: [state] CFI Enabled
2,875,565 UART: [fht] FMC Alias Private Key: 7
2,983,942 UART: [art] Extend RT PCRs Done
2,984,370 UART: [art] Lock RT PCRs Done
2,985,984 UART: [art] Populate DV Done
2,994,347 UART: [fht] FMC Alias Private Key: 7
2,995,411 UART: [art] Derive CDI
2,995,691 UART: [art] Store in in slot 0x4
3,081,300 UART: [art] Derive Key Pair
3,081,660 UART: [art] Store priv key in slot 0x5
3,094,438 UART: [art] Derive Key Pair - Done
3,109,322 UART: [art] Signing Cert with AUTHO
3,109,802 UART: RITY.KEYID = 7
3,125,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,961 UART: [art] PUB.X = 2A07858B3B654103DAEC80214C2242B01DA62047B9B20A82ED577A2B9C75BA3CA9A0B7FB4DDD669CC911226AC8FC2954
3,132,732 UART: [art] PUB.Y = 9D588155DA0A882B5F57344E441B519E09CDA5696FE04B992F92B964495B70134331D093720A502C52729D65EA5D739E
3,139,663 UART: [art] SIG.R = 28C16EF690738FF0FE6F721D2A1F455472DD4878B211BCAC2E987484E3BA5E2F78D4AEB78E5659D9EA59C7AD18BA2AB4
3,146,449 UART: [art] SIG.S = 0FE6FB711F49AD7D6EE01C73A787E42A0ED4CC00CDF401689CF81643C6E1CECF586FD60FA17F8557F9B1358BDB5B6419
3,169,904 UART: Caliptra RT
3,170,249 UART: [state] CFI Enabled
3,278,474 UART: [rt] RT listening for mailbox commands...
3,279,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,466 UART: [rt]cmd =0x44504543, len=96
3,489,524 >>> mbox cmd response data (6236 bytes)
3,489,525 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,519,160 UART: [rt]cmd =0x52564348, len=36
3,521,655 >>> mbox cmd response data (8 bytes)
3,521,656 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,551,151 UART: [rt]cmd =0x52564348, len=36
3,552,527 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,946 ready_for_fw is high
1,060,946 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,457 >>> mbox cmd response: success
2,687,105 UART:
2,687,121 UART: Running Caliptra FMC ...
2,687,529 UART:
2,687,672 UART: [state] CFI Enabled
2,698,669 UART: [fht] FMC Alias Private Key: 7
2,806,094 UART: [art] Extend RT PCRs Done
2,806,522 UART: [art] Lock RT PCRs Done
2,807,924 UART: [art] Populate DV Done
2,816,159 UART: [fht] FMC Alias Private Key: 7
2,817,293 UART: [art] Derive CDI
2,817,573 UART: [art] Store in in slot 0x4
2,902,906 UART: [art] Derive Key Pair
2,903,266 UART: [art] Store priv key in slot 0x5
2,916,452 UART: [art] Derive Key Pair - Done
2,931,322 UART: [art] Signing Cert with AUTHO
2,931,802 UART: RITY.KEYID = 7
2,947,228 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,993 UART: [art] PUB.X = 8B059396C56636D95EA1E8B4EB2BB6AB589291B3A0FF761E1D68DC459248D1E13E4EA48169CC7DE8A45CE44D7C489F0B
2,954,769 UART: [art] PUB.Y = 1CBB110D5039D15C9CEFB84895994F348BF88A1715D27122BCEB0F8D44771F15F4CFB8034E63FF876B8721EBE7092FC8
2,961,715 UART: [art] SIG.R = 298ABB2D621C0F1E8B78D6EB40256A009F46992E82FD299685DCAA0B751CAA63B3FE4523C4C7A930CE83847231A6AB20
2,968,465 UART: [art] SIG.S = 95D13D7379E073D8E48C4E7C0A44AC8227697026EA8F77F4F2C3E058C1168F41177BFF1AE44C829177B7D31C4F8FD8CE
2,991,907 UART: Caliptra RT
2,992,252 UART: [state] CFI Enabled
3,099,411 UART: [rt] RT listening for mailbox commands...
3,100,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,363 UART: [rt]cmd =0x44504543, len=96
3,310,884 >>> mbox cmd response data (6236 bytes)
3,310,885 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,310 UART: [rt]cmd =0x52564348, len=36
3,342,655 >>> mbox cmd response data (8 bytes)
3,342,656 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,193 UART: [rt]cmd =0x52564348, len=36
3,373,669 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
900,145 UART: [kat] SHA2-256
902,085 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,744 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,575 UART: [cold-reset] ++
1,171,053 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,175,013 ready_for_fw is high
1,175,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,701 UART: [idev] Erasing UDS.KEYID = 0
1,199,317 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,718 UART: [ldev] Erasing FE.KEYID = 1
1,242,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,946 UART: [ldev] --
1,281,312 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,381 >>> mbox cmd response: success
2,772,506 UART: [afmc] ++
2,772,674 UART: [afmc] CDI.KEYID = 6
2,773,037 UART: [afmc] SUBJECT.KEYID = 7
2,773,463 UART: [afmc] AUTHORITY.KEYID = 5
2,808,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,671 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,400 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,283 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,002 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,701 UART: [afmc] --
2,851,647 UART: [cold-reset] --
2,852,495 UART: [state] Locking Datavault
2,853,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,258 UART: [state] Locking ICCM
2,854,846 UART: [exit] Launching FMC @ 0x40000130
2,860,175 UART:
2,860,191 UART: Running Caliptra FMC ...
2,860,599 UART:
2,860,653 UART: [state] CFI Enabled
2,871,586 UART: [fht] FMC Alias Private Key: 7
2,979,379 UART: [art] Extend RT PCRs Done
2,979,807 UART: [art] Lock RT PCRs Done
2,981,369 UART: [art] Populate DV Done
2,989,542 UART: [fht] FMC Alias Private Key: 7
2,990,686 UART: [art] Derive CDI
2,990,966 UART: [art] Store in in slot 0x4
3,076,761 UART: [art] Derive Key Pair
3,077,121 UART: [art] Store priv key in slot 0x5
3,090,421 UART: [art] Derive Key Pair - Done
3,105,288 UART: [art] Signing Cert with AUTHO
3,105,768 UART: RITY.KEYID = 7
3,120,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,609 UART: [art] PUB.X = 5EC431D80E1476282B74FCDB600C69FE62C10478AD306C4C51119C90E6B9FB18F94484322FC81E264DCA7195246E56B4
3,128,370 UART: [art] PUB.Y = BB2CF973470283962708F045C831F7B593D014B55EDC7C3C85DFCF2C36D638A442609DA690445DF3422A7F4E1AF76CCD
3,135,320 UART: [art] SIG.R = 6E5C008C119BBE752A12CC70957EABF61BBDAE03EAC7095B055B79DA41E45AC29BF32071ECEEEC14D4C9F6ABE7639B48
3,142,083 UART: [art] SIG.S = D004878246816B273E71B0AED218C5CDB49F2EEE501D37169DF42AEEC612C86A5D52D16134974B5F6CFEB46D53B208A4
3,165,902 UART: Caliptra RT
3,166,155 UART: [state] CFI Enabled
3,273,414 UART: [rt] RT listening for mailbox commands...
3,274,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,702 UART: [rt]cmd =0x44504543, len=96
3,485,553 >>> mbox cmd response data (6236 bytes)
3,485,554 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,191 UART: [rt]cmd =0x52564348, len=36
3,517,138 >>> mbox cmd response data (8 bytes)
3,517,139 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,546,420 UART: [rt]cmd =0x52564348, len=36
3,547,784 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,668 ready_for_fw is high
1,055,668 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,255 >>> mbox cmd response: success
2,680,981 UART:
2,680,997 UART: Running Caliptra FMC ...
2,681,405 UART:
2,681,459 UART: [state] CFI Enabled
2,692,048 UART: [fht] FMC Alias Private Key: 7
2,800,511 UART: [art] Extend RT PCRs Done
2,800,939 UART: [art] Lock RT PCRs Done
2,802,409 UART: [art] Populate DV Done
2,810,818 UART: [fht] FMC Alias Private Key: 7
2,811,952 UART: [art] Derive CDI
2,812,232 UART: [art] Store in in slot 0x4
2,898,079 UART: [art] Derive Key Pair
2,898,439 UART: [art] Store priv key in slot 0x5
2,911,459 UART: [art] Derive Key Pair - Done
2,926,145 UART: [art] Signing Cert with AUTHO
2,926,625 UART: RITY.KEYID = 7
2,941,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,682 UART: [art] PUB.X = 6D36EFA9F757540713A34877C0489637057E2E5641364954177B8220472CE0574722A6BD734A89A3F57623278E2F35AB
2,949,428 UART: [art] PUB.Y = 7C9342F3D3DE5D4E88EF1145D57F6ECA5060C17385FA1DFB62B7097EE4A67C41278216D22FD119FEE9877A7E52593C18
2,956,381 UART: [art] SIG.R = 355DB45CCA45E49342F4F37CBA42F9284B2EC3BD4068E38C3915AB59E5958C049E4CEAB6E0DBF01C8AEF02457AB2D733
2,963,161 UART: [art] SIG.S = 56EF553195AE60C71AC5E2078BF3AE2D2CB71B490E820E3734A3965908B59A04DA8B30574204D6E1CCC223406F352393
2,987,060 UART: Caliptra RT
2,987,313 UART: [state] CFI Enabled
3,093,990 UART: [rt] RT listening for mailbox commands...
3,094,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,186 UART: [rt]cmd =0x44504543, len=96
3,305,531 >>> mbox cmd response data (6236 bytes)
3,305,532 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,159 UART: [rt]cmd =0x52564348, len=36
3,337,428 >>> mbox cmd response data (8 bytes)
3,337,429 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,367,150 UART: [rt]cmd =0x52564348, len=36
3,368,458 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,317 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,764 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 ready_for_fw is high
1,174,738 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,198,834 UART: [idev] Sha1 KeyId Algorithm
1,207,840 UART: [idev] --
1,208,887 UART: [ldev] ++
1,209,055 UART: [ldev] CDI.KEYID = 6
1,209,419 UART: [ldev] SUBJECT.KEYID = 5
1,209,846 UART: [ldev] AUTHORITY.KEYID = 7
1,210,309 UART: [ldev] FE.KEYID = 1
1,215,661 UART: [ldev] Erasing FE.KEYID = 1
1,241,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,585 UART: [ldev] --
1,281,009 UART: [fwproc] Wait for Commands...
1,281,798 UART: [fwproc] Recv command 0x46574c44
1,282,531 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,208 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,708 >>> mbox cmd response: success
2,772,863 UART: [afmc] ++
2,773,031 UART: [afmc] CDI.KEYID = 6
2,773,394 UART: [afmc] SUBJECT.KEYID = 7
2,773,820 UART: [afmc] AUTHORITY.KEYID = 5
2,809,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,040 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,652 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,371 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,192 UART: [afmc] --
2,853,234 UART: [cold-reset] --
2,854,210 UART: [state] Locking Datavault
2,855,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,957 UART: [state] Locking ICCM
2,856,391 UART: [exit] Launching FMC @ 0x40000130
2,861,720 UART:
2,861,736 UART: Running Caliptra FMC ...
2,862,144 UART:
2,862,287 UART: [state] CFI Enabled
2,872,922 UART: [fht] FMC Alias Private Key: 7
2,981,213 UART: [art] Extend RT PCRs Done
2,981,641 UART: [art] Lock RT PCRs Done
2,983,375 UART: [art] Populate DV Done
2,991,404 UART: [fht] FMC Alias Private Key: 7
2,992,576 UART: [art] Derive CDI
2,992,856 UART: [art] Store in in slot 0x4
3,078,025 UART: [art] Derive Key Pair
3,078,385 UART: [art] Store priv key in slot 0x5
3,091,791 UART: [art] Derive Key Pair - Done
3,106,673 UART: [art] Signing Cert with AUTHO
3,107,153 UART: RITY.KEYID = 7
3,121,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,686 UART: [art] PUB.X = 2B796682F35EF028CDBF205FA092CC7A00DB055B72F7B265BFAD1E77C230E8F9847FD013FB1E3B88DAFEF1DB521FDB4C
3,129,455 UART: [art] PUB.Y = 2F0519F54F139984F4374A454F11EA56C054CE9A8BC8D85ACD1E43A9ED979B5731EBFF940C5348E001BB530910B7F21F
3,136,399 UART: [art] SIG.R = 85FE75B3BB2F390CEEEA30D1F1EAB08EB75F40DA8A435F0748DFD20BE20F279D876928A3683CC04C370527A3434EB4DF
3,143,170 UART: [art] SIG.S = EC9EA6D8F64F1870EEA018F94D45F10C28E8F6ABC4BFA3F02DB6C3B686541B7051B6052156E831657725DAB10CE0413C
3,167,358 UART: Caliptra RT
3,167,703 UART: [state] CFI Enabled
3,276,267 UART: [rt] RT listening for mailbox commands...
3,276,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,393 UART: [rt]cmd =0x44504543, len=96
3,487,997 >>> mbox cmd response data (6236 bytes)
3,487,998 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,517,545 UART: [rt]cmd =0x52564348, len=36
3,519,720 >>> mbox cmd response data (8 bytes)
3,519,721 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,549,146 UART: [rt]cmd =0x52564348, len=36
3,550,602 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,635 ready_for_fw is high
1,057,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,218 >>> mbox cmd response: success
2,684,526 UART:
2,684,542 UART: Running Caliptra FMC ...
2,684,950 UART:
2,685,093 UART: [state] CFI Enabled
2,695,342 UART: [fht] FMC Alias Private Key: 7
2,803,653 UART: [art] Extend RT PCRs Done
2,804,081 UART: [art] Lock RT PCRs Done
2,805,671 UART: [art] Populate DV Done
2,814,166 UART: [fht] FMC Alias Private Key: 7
2,815,162 UART: [art] Derive CDI
2,815,442 UART: [art] Store in in slot 0x4
2,901,261 UART: [art] Derive Key Pair
2,901,621 UART: [art] Store priv key in slot 0x5
2,915,563 UART: [art] Derive Key Pair - Done
2,930,383 UART: [art] Signing Cert with AUTHO
2,930,863 UART: RITY.KEYID = 7
2,945,355 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,120 UART: [art] PUB.X = CFA2F2DEBB732D0635754429CB7828E5CD7624E0ACD4077043E3CD16F7643513A0D67E3F8AC30FBFBA9A3B5EDC076BF7
2,952,896 UART: [art] PUB.Y = E41738F62964816C04C0F782B4E52DB283B1927B39371E559303188C9001D3AA7AF11B60178427C783BE640E53204927
2,959,818 UART: [art] SIG.R = C3CB0727F30C96256F6B2A95D9FE30B379918E78BD45AD7A99060559CEA028D686079222D24545B134D562D02E242B1E
2,966,569 UART: [art] SIG.S = 37713690F400B7165077B3B15A66C75120642BD678876734161BB872622A75F32D346DA1505C2F5E6C85E61578C30841
2,990,079 UART: Caliptra RT
2,990,424 UART: [state] CFI Enabled
3,098,731 UART: [rt] RT listening for mailbox commands...
3,099,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,839 UART: [rt]cmd =0x44504543, len=96
3,310,901 >>> mbox cmd response data (6236 bytes)
3,310,902 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,571 UART: [rt]cmd =0x52564348, len=36
3,342,592 >>> mbox cmd response data (8 bytes)
3,342,593 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,360 UART: [rt]cmd =0x52564348, len=36
3,373,542 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,968 UART:
192,356 UART: Running Caliptra ROM ...
193,454 UART:
193,597 UART: [state] CFI Enabled
264,863 UART: [state] LifecycleState = Unprovisioned
266,820 UART: [state] DebugLocked = No
269,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,379 UART: [kat] SHA2-256
445,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,591 UART: [kat] ++
456,038 UART: [kat] sha1
467,852 UART: [kat] SHA2-256
470,506 UART: [kat] SHA2-384
477,486 UART: [kat] SHA2-512-ACC
479,849 UART: [kat] ECC-384
2,766,741 UART: [kat] HMAC-384Kdf
2,798,009 UART: [kat] LMS
3,988,312 UART: [kat] --
3,993,074 UART: [cold-reset] ++
3,995,503 UART: [fht] Storing FHT @ 0x50003400
4,006,621 UART: [idev] ++
4,007,181 UART: [idev] CDI.KEYID = 6
4,008,156 UART: [idev] SUBJECT.KEYID = 7
4,009,415 UART: [idev] UDS.KEYID = 0
4,010,454 ready_for_fw is high
4,010,667 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,882 UART: [idev] Erasing UDS.KEYID = 0
7,343,277 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,623 UART: [idev] --
7,370,841 UART: [ldev] ++
7,371,399 UART: [ldev] CDI.KEYID = 6
7,372,336 UART: [ldev] SUBJECT.KEYID = 5
7,373,587 UART: [ldev] AUTHORITY.KEYID = 7
7,374,809 UART: [ldev] FE.KEYID = 1
7,420,626 UART: [ldev] Erasing FE.KEYID = 1
10,750,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,369 UART: [ldev] --
13,113,003 UART: [fwproc] Waiting for Commands...
13,115,047 UART: [fwproc] Received command 0x46574c44
13,117,222 UART: [fwproc] Received Image of size 113844 bytes
17,161,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,305,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,621,448 >>> mbox cmd response: success
17,625,396 UART: [afmc] ++
17,626,007 UART: [afmc] CDI.KEYID = 6
17,626,898 UART: [afmc] SUBJECT.KEYID = 7
17,628,164 UART: [afmc] AUTHORITY.KEYID = 5
20,978,786 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,282,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,466 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,875 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,691 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,328,173 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,348,650 UART: [afmc] --
23,352,518 UART: [cold-reset] --
23,355,239 UART: [state] Locking Datavault
23,360,427 UART: [state] Locking PCR0, PCR1 and PCR31
23,362,174 UART: [state] Locking ICCM
23,364,097 UART: [exit] Launching FMC @ 0x40000130
23,372,440 UART:
23,372,680 UART: Running Caliptra FMC ...
23,373,780 UART:
23,373,931 UART: [state] CFI Enabled
23,439,505 UART: [fht] FMC Alias Private Key: 7
25,777,969 UART: [art] Extend RT PCRs Done
25,779,189 UART: [art] Lock RT PCRs Done
25,780,881 UART: [art] Populate DV Done
25,786,183 UART: [fht] FMC Alias Private Key: 7
25,787,771 UART: [art] Derive CDI
25,788,577 UART: [art] Store in in slot 0x4
25,848,050 UART: [art] Derive Key Pair
25,849,087 UART: [art] Store priv key in slot 0x5
29,141,337 UART: [art] Derive Key Pair - Done
29,154,276 UART: [art] Signing Cert with AUTHO
29,155,603 UART: RITY.KEYID = 7
31,443,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,445,287 UART: [art] PUB.X = CF1FB9D86E14A326DB567EA5049E4171F13BCCD5ECA556870D11E84D6CA429B4405E3430F8E7C5D2A889B7CEDAF4D4D5
31,452,558 UART: [art] PUB.Y = 03E85D2D1845BA5ED484031876C5E1179C19FF1496D6C79E22B309D8F495B22A7465039E38BCCED590F13FCB3C7B7194
31,459,807 UART: [art] SIG.R = 59440FC2A03BADD2B9F2A75CDBE4460416CA1259523AC3EF153B789BDEDD3EBC7F8845E08B7D2577954FF4CD8D79A2C9
31,467,170 UART: [art] SIG.S = AAB77612C2F63D5806391F712C03928BE1E2DEA498BB135E7D2A85ADAF8FC71387D04B5054D5E0629834CEC274DA2789
32,772,832 UART: Caliptra RT
32,773,533 UART: [state] CFI Enabled
32,932,974 UART: [rt] RT listening for mailbox commands...
32,934,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,966,173 UART: [rt]cmd =0x44504543, len=96
38,749,830 >>> mbox cmd response data (6236 bytes)
38,779,136 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,809,534 UART: [rt]cmd =0x52564348, len=36
38,812,075 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
3,781,156 ready_for_fw is high
3,781,743 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,871,284 >>> mbox cmd response: success
23,562,164 UART:
23,562,550 UART: Running Caliptra FMC ...
23,563,651 UART:
23,563,797 UART: [state] CFI Enabled
23,614,490 UART: [fht] FMC Alias Private Key: 7
25,952,731 UART: [art] Extend RT PCRs Done
25,953,959 UART: [art] Lock RT PCRs Done
25,955,532 UART: [art] Populate DV Done
25,961,103 UART: [fht] FMC Alias Private Key: 7
25,962,634 UART: [art] Derive CDI
25,963,362 UART: [art] Store in in slot 0x4
26,023,300 UART: [art] Derive Key Pair
26,024,333 UART: [art] Store priv key in slot 0x5
29,317,016 UART: [art] Derive Key Pair - Done
29,329,954 UART: [art] Signing Cert with AUTHO
29,331,251 UART: RITY.KEYID = 7
31,619,469 UART: [art] Erasing AUTHORITY.KEYID = 7
31,620,971 UART: [art] PUB.X = FF13EF62A518FCF2D4985F25CC3B52249D194E23DA089C458BE537D86286EFC9C6E96F09621CFB0532F3B167989775F7
31,628,241 UART: [art] PUB.Y = 67774752D2A06B46BB03E0E521D4EDACF9E0E2A38B6ACD56C0C277D84CCF9A9BA76A9C0DD08597D54EAADCAB593352F8
31,635,516 UART: [art] SIG.R = 90DE26D430C4AE99BD8F961DFF0838CA1BE9507876930934F1868A34877103EEB36AA6D775F125A9955CAF085DE595B3
31,642,880 UART: [art] SIG.S = E8ADE487E8C637B27DF2A09BB87947C5B87876066E8CF7817B0FBCE19E06B0E548AE32597DB357D4DD9B4255D5F784FB
32,947,923 UART: Caliptra RT
32,948,622 UART: [state] CFI Enabled
33,109,982 UART: [rt] RT listening for mailbox commands...
33,111,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,143,234 UART: [rt]cmd =0x44504543, len=96
38,907,460 >>> mbox cmd response data (6236 bytes)
38,936,584 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,966,927 UART: [rt]cmd =0x52564348, len=36
38,969,558 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,979 writing to cptra_bootfsm_go
194,229 UART:
194,575 UART: Running Caliptra ROM ...
195,765 UART:
605,568 UART: [state] CFI Enabled
620,444 UART: [state] LifecycleState = Unprovisioned
622,386 UART: [state] DebugLocked = No
624,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,557 UART: [kat] SHA2-256
799,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,799 UART: [kat] ++
810,285 UART: [kat] sha1
821,447 UART: [kat] SHA2-256
824,181 UART: [kat] SHA2-384
829,883 UART: [kat] SHA2-512-ACC
832,248 UART: [kat] ECC-384
3,116,766 UART: [kat] HMAC-384Kdf
3,128,726 UART: [kat] LMS
4,318,826 UART: [kat] --
4,323,010 UART: [cold-reset] ++
4,325,618 UART: [fht] Storing FHT @ 0x50003400
4,335,680 UART: [idev] ++
4,336,248 UART: [idev] CDI.KEYID = 6
4,337,160 UART: [idev] SUBJECT.KEYID = 7
4,338,405 UART: [idev] UDS.KEYID = 0
4,339,456 ready_for_fw is high
4,339,666 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,673 UART: [idev] Erasing UDS.KEYID = 0
7,627,879 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,305 UART: [idev] --
7,652,370 UART: [ldev] ++
7,652,937 UART: [ldev] CDI.KEYID = 6
7,653,894 UART: [ldev] SUBJECT.KEYID = 5
7,655,106 UART: [ldev] AUTHORITY.KEYID = 7
7,656,392 UART: [ldev] FE.KEYID = 1
7,668,312 UART: [ldev] Erasing FE.KEYID = 1
10,957,925 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,735 UART: [ldev] --
13,315,871 UART: [fwproc] Waiting for Commands...
13,317,906 UART: [fwproc] Received command 0x46574c44
13,320,085 UART: [fwproc] Received Image of size 113844 bytes
17,377,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,360 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,239 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,840,439 >>> mbox cmd response: success
17,844,014 UART: [afmc] ++
17,844,655 UART: [afmc] CDI.KEYID = 6
17,845,546 UART: [afmc] SUBJECT.KEYID = 7
17,846,762 UART: [afmc] AUTHORITY.KEYID = 5
21,160,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,060 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,457,321 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,471,715 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,486,577 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,006 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,728 UART: [afmc] --
23,526,465 UART: [cold-reset] --
23,529,739 UART: [state] Locking Datavault
23,535,254 UART: [state] Locking PCR0, PCR1 and PCR31
23,537,008 UART: [state] Locking ICCM
23,539,725 UART: [exit] Launching FMC @ 0x40000130
23,548,081 UART:
23,548,328 UART: Running Caliptra FMC ...
23,549,435 UART:
23,549,600 UART: [state] CFI Enabled
23,557,512 UART: [fht] FMC Alias Private Key: 7
25,888,855 UART: [art] Extend RT PCRs Done
25,890,071 UART: [art] Lock RT PCRs Done
25,891,723 UART: [art] Populate DV Done
25,897,131 UART: [fht] FMC Alias Private Key: 7
25,898,620 UART: [art] Derive CDI
25,899,356 UART: [art] Store in in slot 0x4
25,942,103 UART: [art] Derive Key Pair
25,943,136 UART: [art] Store priv key in slot 0x5
29,185,201 UART: [art] Derive Key Pair - Done
29,198,411 UART: [art] Signing Cert with AUTHO
29,199,739 UART: RITY.KEYID = 7
31,479,332 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,839 UART: [art] PUB.X = 9D8A2A8EFEBE1AAEF2C8F6F3CB91090CD7A24967ED3EB53F594FC7B3C9D65BDA5F5C067A3E1DAB03DD99A355570F0A2E
31,488,152 UART: [art] PUB.Y = 9C4568A1D3BE4FAA241F2FBF1E8FF8B57DF436CEDFB52817FA30CADC56FCA6CC9BA18C1883D4925D1BADE133DFD6E59D
31,495,406 UART: [art] SIG.R = CCEF70F5A06B8422808B21F541DEF0335A668D97F96793C4B8FE3CD2F4D62589A372EE3712952CB604660E8C341B83D8
31,502,813 UART: [art] SIG.S = 659BFE32E869BC7EB470738EB698F99A0B709995F27CABEDDDEB8E2174361FB0337A19A400B0216D002A1E20ED664BDC
32,808,483 UART: Caliptra RT
32,809,178 UART: [state] CFI Enabled
32,927,099 UART: [rt] RT listening for mailbox commands...
32,929,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,960,357 UART: [rt]cmd =0x44504543, len=96
38,632,206 >>> mbox cmd response data (6236 bytes)
38,661,498 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,691,722 UART: [rt]cmd =0x52564348, len=36
38,694,427 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,130,680 ready_for_fw is high
4,131,208 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,067,378 >>> mbox cmd response: success
23,706,854 UART:
23,707,262 UART: Running Caliptra FMC ...
23,708,404 UART:
23,708,566 UART: [state] CFI Enabled
23,716,577 UART: [fht] FMC Alias Private Key: 7
26,047,289 UART: [art] Extend RT PCRs Done
26,048,579 UART: [art] Lock RT PCRs Done
26,050,127 UART: [art] Populate DV Done
26,055,489 UART: [fht] FMC Alias Private Key: 7
26,057,195 UART: [art] Derive CDI
26,058,014 UART: [art] Store in in slot 0x4
26,100,247 UART: [art] Derive Key Pair
26,101,298 UART: [art] Store priv key in slot 0x5
29,343,878 UART: [art] Derive Key Pair - Done
29,357,165 UART: [art] Signing Cert with AUTHO
29,358,488 UART: RITY.KEYID = 7
31,637,475 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,976 UART: [art] PUB.X = 4B6BD5FDC50596DD52101EADD4FBA3AE706C6BB75A86181DE13895E5FDCDA92662810DC2B77C576A3657FDF1544DB884
31,646,242 UART: [art] PUB.Y = CBBC3D7381AACE29EDF138F7B856AA6733033F479C27F5581BD8145E8CC7E99EA4E6198380747FA8D50E98131A4DABBA
31,653,494 UART: [art] SIG.R = 80C32E9B1F5F96460CEE6B98C238CBD70A0C9C8A8205BA504AFBAFC7164808DADB12009EA9AC7DBDB764ECCD3A3EF734
31,660,892 UART: [art] SIG.S = 8FDB2F96CB95D003AFBC50354A32BF743E717A5EB6C16328CF2F9CE9B61402718235A7DCD203D4E1CF66BE335EB75CFB
32,966,083 UART: Caliptra RT
32,966,824 UART: [state] CFI Enabled
33,083,792 UART: [rt] RT listening for mailbox commands...
33,085,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,898 UART: [rt]cmd =0x44504543, len=96
38,789,015 >>> mbox cmd response data (6236 bytes)
38,818,272 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,848,395 UART: [rt]cmd =0x52564348, len=36
38,850,943 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,063 UART:
192,462 UART: Running Caliptra ROM ...
193,673 UART:
193,830 UART: [state] CFI Enabled
264,856 UART: [state] LifecycleState = Unprovisioned
266,772 UART: [state] DebugLocked = No
269,159 UART: [state] WD Timer not started. Device not locked for debugging
273,055 UART: [kat] SHA2-256
452,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,780 UART: [kat] ++
464,313 UART: [kat] sha1
474,980 UART: [kat] SHA2-256
477,976 UART: [kat] SHA2-384
485,167 UART: [kat] SHA2-512-ACC
488,108 UART: [kat] ECC-384
2,952,347 UART: [kat] HMAC-384Kdf
2,972,235 UART: [kat] LMS
3,501,250 UART: [kat] --
3,505,957 UART: [cold-reset] ++
3,507,403 UART: [fht] FHT @ 0x50003400
3,518,237 UART: [idev] ++
3,518,800 UART: [idev] CDI.KEYID = 6
3,519,789 UART: [idev] SUBJECT.KEYID = 7
3,520,961 UART: [idev] UDS.KEYID = 0
3,521,889 ready_for_fw is high
3,522,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,774 UART: [idev] Erasing UDS.KEYID = 0
6,025,655 UART: [idev] Sha1 KeyId Algorithm
6,048,155 UART: [idev] --
6,052,543 UART: [ldev] ++
6,053,122 UART: [ldev] CDI.KEYID = 6
6,054,039 UART: [ldev] SUBJECT.KEYID = 5
6,055,129 UART: [ldev] AUTHORITY.KEYID = 7
6,056,490 UART: [ldev] FE.KEYID = 1
6,100,551 UART: [ldev] Erasing FE.KEYID = 1
8,606,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,798 UART: [ldev] --
10,414,334 UART: [fwproc] Wait for Commands...
10,417,334 UART: [fwproc] Recv command 0x46574c44
10,419,434 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,959,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,275,982 >>> mbox cmd response: success
14,280,902 UART: [afmc] ++
14,281,539 UART: [afmc] CDI.KEYID = 6
14,282,457 UART: [afmc] SUBJECT.KEYID = 7
14,283,561 UART: [afmc] AUTHORITY.KEYID = 5
16,809,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,069 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,085 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,058 UART: [afmc] --
18,608,311 UART: [cold-reset] --
18,613,734 UART: [state] Locking Datavault
18,620,059 UART: [state] Locking PCR0, PCR1 and PCR31
18,621,710 UART: [state] Locking ICCM
18,623,861 UART: [exit] Launching FMC @ 0x40000130
18,632,266 UART:
18,632,521 UART: Running Caliptra FMC ...
18,633,622 UART:
18,633,776 UART: [state] CFI Enabled
18,692,394 UART: [fht] FMC Alias Private Key: 7
20,456,265 UART: [art] Extend RT PCRs Done
20,457,482 UART: [art] Lock RT PCRs Done
20,459,272 UART: [art] Populate DV Done
20,464,576 UART: [fht] FMC Alias Private Key: 7
20,466,223 UART: [art] Derive CDI
20,467,037 UART: [art] Store in in slot 0x4
20,524,896 UART: [art] Derive Key Pair
20,525,936 UART: [art] Store priv key in slot 0x5
22,989,525 UART: [art] Derive Key Pair - Done
23,002,689 UART: [art] Signing Cert with AUTHO
23,004,001 UART: RITY.KEYID = 7
24,714,541 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,066 UART: [art] PUB.X = 97517AD743BE8936BEC91949078CE8BCCD6FE49794B3C3B51FBC5E2D0C7CB733FD073BAE4C28F2186D98299BAEE7D014
24,723,348 UART: [art] PUB.Y = 43EFD79DB07E942C4368026DFB17F97BA647BE3C23AF94A0CA4113BA6E0428F4562968AE18D63B3726E58221A929B54A
24,730,596 UART: [art] SIG.R = 681E98D544A9E9FDCA782BE5901F062C10B038FAAFBD9DF3251CBFE79EA9458AFF4E995181C93C9A49502FEC616BA6C9
24,738,027 UART: [art] SIG.S = 8D90CBBC8A88B0DEBE95F2BB32D2682798A5B8493F35A1E5DF06A4104D988958E98B429F56E3702BE4A9F1D2B7DEACD4
25,717,012 UART: Caliptra RT
25,717,711 UART: [state] CFI Enabled
25,884,189 UART: [rt] RT listening for mailbox commands...
25,886,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,917,254 UART: [rt]cmd =0x44504543, len=96
30,295,304 >>> mbox cmd response data (6236 bytes)
30,324,405 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,354,761 UART: [rt]cmd =0x52564348, len=36
30,357,555 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,381,530 ready_for_fw is high
3,382,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,092,124 >>> mbox cmd response: success
18,386,485 UART:
18,386,919 UART: Running Caliptra FMC ...
18,388,058 UART:
18,388,226 UART: [state] CFI Enabled
18,453,647 UART: [fht] FMC Alias Private Key: 7
20,217,381 UART: [art] Extend RT PCRs Done
20,218,655 UART: [art] Lock RT PCRs Done
20,220,269 UART: [art] Populate DV Done
20,225,739 UART: [fht] FMC Alias Private Key: 7
20,227,390 UART: [art] Derive CDI
20,228,209 UART: [art] Store in in slot 0x4
20,286,388 UART: [art] Derive Key Pair
20,287,422 UART: [art] Store priv key in slot 0x5
22,751,019 UART: [art] Derive Key Pair - Done
22,763,533 UART: [art] Signing Cert with AUTHO
22,764,834 UART: RITY.KEYID = 7
24,476,626 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,131 UART: [art] PUB.X = 47D16762D77428A1461965B6817594938DC0AA08984329D4C0D74750B5C0F381E862A47AED148516CA338329C10CF4A4
24,485,369 UART: [art] PUB.Y = 3B50430B24159F2541D461D8F18239AE26EBAC89971EFA3E14D2768E5DEF868E8AC78C519ED0A39AAF10CD7730D8349F
24,492,603 UART: [art] SIG.R = 421C475E99EC2295DBD414F5D10784D0A77A54285234215788066D5D79A5BCB88F2B5765E489EAE5B38073195F888058
24,500,013 UART: [art] SIG.S = D852724CC0AE0684EEF6DECF0238A4E87A7E7C58E902D92F89C7166C1DF1005DA7FA57B7D26BA04AA629F5160DC59CD6
25,479,415 UART: Caliptra RT
25,480,113 UART: [state] CFI Enabled
25,645,071 UART: [rt] RT listening for mailbox commands...
25,646,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,678,371 UART: [rt]cmd =0x44504543, len=96
30,036,226 >>> mbox cmd response data (6236 bytes)
30,065,682 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,095,756 UART: [rt]cmd =0x52564348, len=36
30,098,474 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
193,076 UART:
193,451 UART: Running Caliptra ROM ...
194,588 UART:
604,077 UART: [state] CFI Enabled
616,745 UART: [state] LifecycleState = Unprovisioned
618,625 UART: [state] DebugLocked = No
621,003 UART: [state] WD Timer not started. Device not locked for debugging
625,121 UART: [kat] SHA2-256
804,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,809 UART: [kat] ++
816,335 UART: [kat] sha1
827,595 UART: [kat] SHA2-256
830,643 UART: [kat] SHA2-384
836,427 UART: [kat] SHA2-512-ACC
839,363 UART: [kat] ECC-384
3,280,680 UART: [kat] HMAC-384Kdf
3,294,262 UART: [kat] LMS
3,823,758 UART: [kat] --
3,825,982 UART: [cold-reset] ++
3,826,849 UART: [fht] FHT @ 0x50003400
3,837,969 UART: [idev] ++
3,838,547 UART: [idev] CDI.KEYID = 6
3,839,430 UART: [idev] SUBJECT.KEYID = 7
3,840,679 UART: [idev] UDS.KEYID = 0
3,841,629 ready_for_fw is high
3,841,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,242 UART: [idev] Erasing UDS.KEYID = 0
6,315,679 UART: [idev] Sha1 KeyId Algorithm
6,339,722 UART: [idev] --
6,343,281 UART: [ldev] ++
6,343,846 UART: [ldev] CDI.KEYID = 6
6,344,728 UART: [ldev] SUBJECT.KEYID = 5
6,345,963 UART: [ldev] AUTHORITY.KEYID = 7
6,347,210 UART: [ldev] FE.KEYID = 1
6,354,808 UART: [ldev] Erasing FE.KEYID = 1
8,831,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,426 UART: [ldev] --
10,624,912 UART: [fwproc] Wait for Commands...
10,627,987 UART: [fwproc] Recv command 0x46574c44
10,630,078 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,892 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,697 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,494,686 >>> mbox cmd response: success
14,499,441 UART: [afmc] ++
14,500,059 UART: [afmc] CDI.KEYID = 6
14,500,982 UART: [afmc] SUBJECT.KEYID = 7
14,502,145 UART: [afmc] AUTHORITY.KEYID = 5
17,003,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,120 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,860 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,906 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,746 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,979 UART: [afmc] --
18,798,119 UART: [cold-reset] --
18,802,520 UART: [state] Locking Datavault
18,807,278 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,976 UART: [state] Locking ICCM
18,811,611 UART: [exit] Launching FMC @ 0x40000130
18,820,065 UART:
18,820,306 UART: Running Caliptra FMC ...
18,821,406 UART:
18,821,566 UART: [state] CFI Enabled
18,829,727 UART: [fht] FMC Alias Private Key: 7
20,587,003 UART: [art] Extend RT PCRs Done
20,588,228 UART: [art] Lock RT PCRs Done
20,589,691 UART: [art] Populate DV Done
20,594,961 UART: [fht] FMC Alias Private Key: 7
20,596,619 UART: [art] Derive CDI
20,597,438 UART: [art] Store in in slot 0x4
20,640,087 UART: [art] Derive Key Pair
20,641,088 UART: [art] Store priv key in slot 0x5
23,068,046 UART: [art] Derive Key Pair - Done
23,081,211 UART: [art] Signing Cert with AUTHO
23,082,513 UART: RITY.KEYID = 7
24,787,868 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,349 UART: [art] PUB.X = 7318A6D50C43BF596665198333730F72E43FA902C007F9841807D9346584B9ED0D3FA4624370F0404C63C038225F0699
24,796,605 UART: [art] PUB.Y = 6F0A43F8740D1062C79DA651D2D319ADFFB69C30033040FD2B3433DC47B740F2553C36C07D79B0DBFF1F6729AEA04118
24,803,896 UART: [art] SIG.R = 4417FB699BB16D9B3389B5463973D2B1541E95D048FCA09E358961F9E1B6EC49BCED1693C476435887423F06C5264CB6
24,811,244 UART: [art] SIG.S = E080902C651F95D2CCB48E3D17170887ACAFB9948F14AB4EE1197CDA5A17459C1D8AAB8D9B3FE894A125D47F12CE37FA
25,789,889 UART: Caliptra RT
25,790,607 UART: [state] CFI Enabled
25,907,865 UART: [rt] RT listening for mailbox commands...
25,909,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,940,834 UART: [rt]cmd =0x44504543, len=96
30,223,530 >>> mbox cmd response data (6236 bytes)
30,252,631 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,282,756 UART: [rt]cmd =0x52564348, len=36
30,285,496 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
3,700,490 ready_for_fw is high
3,700,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,262,181 >>> mbox cmd response: success
18,511,636 UART:
18,512,044 UART: Running Caliptra FMC ...
18,513,185 UART:
18,513,349 UART: [state] CFI Enabled
18,521,342 UART: [fht] FMC Alias Private Key: 7
20,278,249 UART: [art] Extend RT PCRs Done
20,279,466 UART: [art] Lock RT PCRs Done
20,281,172 UART: [art] Populate DV Done
20,286,311 UART: [fht] FMC Alias Private Key: 7
20,287,849 UART: [art] Derive CDI
20,288,613 UART: [art] Store in in slot 0x4
20,331,423 UART: [art] Derive Key Pair
20,332,428 UART: [art] Store priv key in slot 0x5
22,759,531 UART: [art] Derive Key Pair - Done
22,772,422 UART: [art] Signing Cert with AUTHO
22,773,733 UART: RITY.KEYID = 7
24,478,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,348 UART: [art] PUB.X = A6F97B186A0C742AB7897A17C7351EC1C151327F76A21D26312608460170AD6E2A2D4DD8E28E0B1EA68FC0AF3A238AFB
24,487,645 UART: [art] PUB.Y = 7D94F14F04113E77B397879B700F5FCBB2F3585DBC7AEF1EDF4835FADB2E8FDFD7E0A7A0EB7648B516146050FBCE0CBC
24,494,957 UART: [art] SIG.R = 0A3ACE7CC470EE31C6AB01E62FC9D6DFC1514364F29ECE201D3D6FAB13B3EF34D29A4D0BB8D2318D7979E600EFAE15C1
24,502,382 UART: [art] SIG.S = E070A2605D7F22F5ACF2A62F77544F91C60DCAF19DD26AC7EDCCF7A4B08F1B6382CD26570E9797B4648178A6A24CBEE4
25,481,529 UART: Caliptra RT
25,482,243 UART: [state] CFI Enabled
25,599,470 UART: [rt] RT listening for mailbox commands...
25,601,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,632,584 UART: [rt]cmd =0x44504543, len=96
29,914,246 >>> mbox cmd response data (6236 bytes)
29,943,757 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
29,974,103 UART: [rt]cmd =0x52564348, len=36
29,976,887 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,343 UART:
192,707 UART: Running Caliptra ROM ...
193,813 UART:
193,980 UART: [state] CFI Enabled
264,308 UART: [state] LifecycleState = Unprovisioned
266,710 UART: [state] DebugLocked = No
268,303 UART: [state] WD Timer not started. Device not locked for debugging
272,439 UART: [kat] SHA2-256
462,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,097 UART: [kat] ++
473,549 UART: [kat] sha1
484,921 UART: [kat] SHA2-256
487,928 UART: [kat] SHA2-384
494,344 UART: [kat] SHA2-512-ACC
496,924 UART: [kat] ECC-384
2,949,135 UART: [kat] HMAC-384Kdf
2,972,532 UART: [kat] LMS
3,504,331 UART: [kat] --
3,508,754 UART: [cold-reset] ++
3,509,781 UART: [fht] FHT @ 0x50003400
3,521,893 UART: [idev] ++
3,522,533 UART: [idev] CDI.KEYID = 6
3,523,490 UART: [idev] SUBJECT.KEYID = 7
3,524,734 UART: [idev] UDS.KEYID = 0
3,525,632 ready_for_fw is high
3,525,818 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,383 UART: [idev] Erasing UDS.KEYID = 0
6,028,624 UART: [idev] Sha1 KeyId Algorithm
6,052,363 UART: [idev] --
6,056,954 UART: [ldev] ++
6,057,675 UART: [ldev] CDI.KEYID = 6
6,058,573 UART: [ldev] SUBJECT.KEYID = 5
6,059,692 UART: [ldev] AUTHORITY.KEYID = 7
6,060,981 UART: [ldev] FE.KEYID = 1
6,099,856 UART: [ldev] Erasing FE.KEYID = 1
8,605,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,848 UART: [ldev] --
10,414,870 UART: [fwproc] Wait for Commands...
10,417,071 UART: [fwproc] Recv command 0x46574c44
10,419,381 UART: [fwproc] Recv'd Img size: 114168 bytes
13,866,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,602,637 >>> mbox cmd response: success
14,606,259 UART: [afmc] ++
14,606,994 UART: [afmc] CDI.KEYID = 6
14,608,107 UART: [afmc] SUBJECT.KEYID = 7
14,609,627 UART: [afmc] AUTHORITY.KEYID = 5
17,149,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,997 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,159 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,319 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,362 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,498 UART: [afmc] --
18,946,759 UART: [cold-reset] --
18,949,728 UART: [state] Locking Datavault
18,955,485 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,711 UART: [state] Locking ICCM
18,959,439 UART: [exit] Launching FMC @ 0x40000130
18,968,131 UART:
18,968,365 UART: Running Caliptra FMC ...
18,969,466 UART:
18,969,648 UART: [state] CFI Enabled
19,032,767 UART: [fht] FMC Alias Private Key: 7
20,796,807 UART: [art] Extend RT PCRs Done
20,798,030 UART: [art] Lock RT PCRs Done
20,799,850 UART: [art] Populate DV Done
20,805,474 UART: [fht] FMC Alias Private Key: 7
20,807,226 UART: [art] Derive CDI
20,807,968 UART: [art] Store in in slot 0x4
20,864,697 UART: [art] Derive Key Pair
20,865,739 UART: [art] Store priv key in slot 0x5
23,328,710 UART: [art] Derive Key Pair - Done
23,341,856 UART: [art] Signing Cert with AUTHO
23,343,197 UART: RITY.KEYID = 7
25,053,721 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,226 UART: [art] PUB.X = A010C3064E0F8C161B620F759E6580B4E615290B1F45AA054AADE7FA947E6ACA0CB9C415BB7859BA55381C21EC11161A
25,062,491 UART: [art] PUB.Y = 598BCC9BD0E8EB0F76DD5AAB2DB5FCB719EE145B186FC604B70F09F6CECEDC495E2640F14348A9E29325E68DE0B3E28E
25,069,826 UART: [art] SIG.R = 8883EB09CBD2EA0B9EFAD333CAECAF98D2DBEE3280024CA36F0D2E69FE1DC97F63E3675B0343A4FDF83D47BB2CC70304
25,077,204 UART: [art] SIG.S = 3356342AB9025D082D7BB985D7480AD4039C131885F2A4FB73DE655BCE122EA2D137230ADFE2312D6DFDE5045FB937DB
26,055,672 UART: Caliptra RT
26,056,381 UART: [state] CFI Enabled
26,221,492 UART: [rt] RT listening for mailbox commands...
26,223,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,254,664 UART: [rt]cmd =0x44504543, len=96
30,613,276 >>> mbox cmd response data (6236 bytes)
30,642,566 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,672,800 UART: [rt]cmd =0x52564348, len=36
30,675,620 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,438,012 ready_for_fw is high
3,438,396 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,732,074 >>> mbox cmd response: success
19,023,786 UART:
19,024,195 UART: Running Caliptra FMC ...
19,025,403 UART:
19,025,581 UART: [state] CFI Enabled
19,092,565 UART: [fht] FMC Alias Private Key: 7
20,856,274 UART: [art] Extend RT PCRs Done
20,857,489 UART: [art] Lock RT PCRs Done
20,858,906 UART: [art] Populate DV Done
20,864,320 UART: [fht] FMC Alias Private Key: 7
20,865,968 UART: [art] Derive CDI
20,866,783 UART: [art] Store in in slot 0x4
20,925,152 UART: [art] Derive Key Pair
20,926,192 UART: [art] Store priv key in slot 0x5
23,389,052 UART: [art] Derive Key Pair - Done
23,401,842 UART: [art] Signing Cert with AUTHO
23,403,141 UART: RITY.KEYID = 7
25,115,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,795 UART: [art] PUB.X = 0847BACE74D9C5FDF60C5E52B4E7DE8702332EEF5698B167B7CA5A9D1D7473D2E8BCE5307A40645FBAA401041A2B0411
25,124,088 UART: [art] PUB.Y = 1BBE7957B7EAE5D26555BDC7D600631FCF67E271DB676D29CC24A800BAFDAA7FD86AEDC534E36BC127F4375C43A2805E
25,131,311 UART: [art] SIG.R = 80D7C00107C01FC98B433BC1D362B66289B683DD0D3CFE0E37F08A81BDC60ABDE175852B329EBB88788DF6A2131A773A
25,138,744 UART: [art] SIG.S = 28AD7020C007DAF90CB8FAD4F1434D680520A4C10F4B53951F19FB21BA031F7874D93C3C9898E228762750CB7A3AE256
26,117,935 UART: Caliptra RT
26,118,626 UART: [state] CFI Enabled
26,284,170 UART: [rt] RT listening for mailbox commands...
26,286,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,317,269 UART: [rt]cmd =0x44504543, len=96
30,675,122 >>> mbox cmd response data (6236 bytes)
30,704,349 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,734,639 UART: [rt]cmd =0x52564348, len=36
30,737,181 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,697 writing to cptra_bootfsm_go
192,969 UART:
193,335 UART: Running Caliptra ROM ...
194,474 UART:
604,194 UART: [state] CFI Enabled
620,603 UART: [state] LifecycleState = Unprovisioned
623,011 UART: [state] DebugLocked = No
625,261 UART: [state] WD Timer not started. Device not locked for debugging
629,223 UART: [kat] SHA2-256
819,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,915 UART: [kat] ++
830,513 UART: [kat] sha1
843,026 UART: [kat] SHA2-256
846,040 UART: [kat] SHA2-384
852,230 UART: [kat] SHA2-512-ACC
854,817 UART: [kat] ECC-384
3,297,923 UART: [kat] HMAC-384Kdf
3,310,662 UART: [kat] LMS
3,842,461 UART: [kat] --
3,846,803 UART: [cold-reset] ++
3,849,084 UART: [fht] FHT @ 0x50003400
3,860,275 UART: [idev] ++
3,860,909 UART: [idev] CDI.KEYID = 6
3,861,892 UART: [idev] SUBJECT.KEYID = 7
3,863,062 UART: [idev] UDS.KEYID = 0
3,863,994 ready_for_fw is high
3,864,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,619 UART: [idev] Erasing UDS.KEYID = 0
6,338,715 UART: [idev] Sha1 KeyId Algorithm
6,362,843 UART: [idev] --
6,367,050 UART: [ldev] ++
6,367,764 UART: [ldev] CDI.KEYID = 6
6,368,702 UART: [ldev] SUBJECT.KEYID = 5
6,369,867 UART: [ldev] AUTHORITY.KEYID = 7
6,371,045 UART: [ldev] FE.KEYID = 1
6,383,259 UART: [ldev] Erasing FE.KEYID = 1
8,863,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,402 UART: [ldev] --
10,653,120 UART: [fwproc] Wait for Commands...
10,654,944 UART: [fwproc] Recv command 0x46574c44
10,657,203 UART: [fwproc] Recv'd Img size: 114168 bytes
14,106,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,339 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,763 >>> mbox cmd response: success
14,843,461 UART: [afmc] ++
14,844,188 UART: [afmc] CDI.KEYID = 6
14,845,305 UART: [afmc] SUBJECT.KEYID = 7
14,847,129 UART: [afmc] AUTHORITY.KEYID = 5
17,348,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,438 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,563 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,142,692 UART: [afmc] --
19,145,479 UART: [cold-reset] --
19,149,290 UART: [state] Locking Datavault
19,152,874 UART: [state] Locking PCR0, PCR1 and PCR31
19,155,016 UART: [state] Locking ICCM
19,157,674 UART: [exit] Launching FMC @ 0x40000130
19,166,353 UART:
19,166,588 UART: Running Caliptra FMC ...
19,167,846 UART:
19,168,009 UART: [state] CFI Enabled
19,176,125 UART: [fht] FMC Alias Private Key: 7
20,932,994 UART: [art] Extend RT PCRs Done
20,934,209 UART: [art] Lock RT PCRs Done
20,935,779 UART: [art] Populate DV Done
20,941,241 UART: [fht] FMC Alias Private Key: 7
20,942,829 UART: [art] Derive CDI
20,943,569 UART: [art] Store in in slot 0x4
20,986,482 UART: [art] Derive Key Pair
20,987,478 UART: [art] Store priv key in slot 0x5
23,414,275 UART: [art] Derive Key Pair - Done
23,427,384 UART: [art] Signing Cert with AUTHO
23,428,712 UART: RITY.KEYID = 7
25,134,017 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,523 UART: [art] PUB.X = B50B0087421E9BC993EC5AF90F779B36062C163C9895A44FF5E4AC4D971D2D00C06D3F1C4341BE63A4F03815B6DB8797
25,142,770 UART: [art] PUB.Y = AFC5DFBB219FE28672187DF559B3BAA10BA57E1B32C852542581752BCA545381DABB030F0A836F0E43A7372672823734
25,150,005 UART: [art] SIG.R = E1617C973A70A4744A1F6987F4CD74434E79A74CB667F382175991D30B8CDD059F05C41E8D7286866B19EB1301B5FD59
25,157,348 UART: [art] SIG.S = 7194A9CFF0906E332F1B786E7AFCE1238C58F3C3F44EFB3117D5346CC38FBAB1F268ECB8FB3A0E71E23812AB2678320B
26,135,661 UART: Caliptra RT
26,136,344 UART: [state] CFI Enabled
26,253,951 UART: [rt] RT listening for mailbox commands...
26,255,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,287,105 UART: [rt]cmd =0x44504543, len=96
30,569,873 >>> mbox cmd response data (6236 bytes)
30,598,971 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,629,003 UART: [rt]cmd =0x52564348, len=36
30,631,797 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,642 writing to cptra_bootfsm_go
3,754,540 ready_for_fw is high
3,754,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,959,488 >>> mbox cmd response: success
19,214,008 UART:
19,214,417 UART: Running Caliptra FMC ...
19,215,556 UART:
19,215,741 UART: [state] CFI Enabled
19,223,599 UART: [fht] FMC Alias Private Key: 7
20,980,715 UART: [art] Extend RT PCRs Done
20,981,943 UART: [art] Lock RT PCRs Done
20,983,540 UART: [art] Populate DV Done
20,988,960 UART: [fht] FMC Alias Private Key: 7
20,990,611 UART: [art] Derive CDI
20,991,414 UART: [art] Store in in slot 0x4
21,034,070 UART: [art] Derive Key Pair
21,035,086 UART: [art] Store priv key in slot 0x5
23,461,862 UART: [art] Derive Key Pair - Done
23,474,844 UART: [art] Signing Cert with AUTHO
23,476,176 UART: RITY.KEYID = 7
25,181,378 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,888 UART: [art] PUB.X = CDA42F55E8A469B94A283ABF056DA3D39EBFE993DD2DFD887F7A6C88F7A24288FF4D50EF65AE62D9370F2F92346F9533
25,190,144 UART: [art] PUB.Y = 7C3C85A17EA800BEC318707F418DB21205DBB2535CE3D6E005DE4229C71D36C44B37A0C18B42FFEC88C3792AEE83D5FC
25,197,397 UART: [art] SIG.R = E6361F8C41E88C297A8737E0E90CA0A8A4B6FBDCC68C46B02BA304B9DFDA248487B225609CB485176D8810EA63E5A09F
25,204,790 UART: [art] SIG.S = BB4B2970F02C06EE2BA1F36F9595125172A93FF4225C68FD306A0FAF4F962CAFB6A42B7511BD4AC757EF69FCEF45D406
26,183,919 UART: Caliptra RT
26,184,629 UART: [state] CFI Enabled
26,302,771 UART: [rt] RT listening for mailbox commands...
26,304,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,335,709 UART: [rt]cmd =0x44504543, len=96
30,617,901 >>> mbox cmd response data (6236 bytes)
30,647,051 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,677,247 UART: [rt]cmd =0x52564348, len=36
30,679,771 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,925 UART: [kat] SHA2-256
881,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,971 UART: [kat] ++
886,123 UART: [kat] sha1
890,391 UART: [kat] SHA2-256
892,329 UART: [kat] SHA2-384
895,080 UART: [kat] SHA2-512-ACC
896,981 UART: [kat] ECC-384
902,710 UART: [kat] HMAC-384Kdf
907,168 UART: [kat] LMS
1,475,364 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,575 UART: [fht] Storing FHT @ 0x50003400
1,479,358 UART: [idev] ++
1,479,526 UART: [idev] CDI.KEYID = 6
1,479,886 UART: [idev] SUBJECT.KEYID = 7
1,480,310 UART: [idev] UDS.KEYID = 0
1,480,655 ready_for_fw is high
1,480,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,058 UART: [idev] Erasing UDS.KEYID = 0
1,504,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,192 UART: [idev] --
1,514,265 UART: [ldev] ++
1,514,433 UART: [ldev] CDI.KEYID = 6
1,514,796 UART: [ldev] SUBJECT.KEYID = 5
1,515,222 UART: [ldev] AUTHORITY.KEYID = 7
1,515,685 UART: [ldev] FE.KEYID = 1
1,520,821 UART: [ldev] Erasing FE.KEYID = 1
1,546,282 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,468 UART: [ldev] --
1,585,859 UART: [fwproc] Waiting for Commands...
1,586,718 UART: [fwproc] Received command 0x46574c44
1,587,509 UART: [fwproc] Received Image of size 114168 bytes
2,883,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,917 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,269 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,944 >>> mbox cmd response: success
3,077,194 UART: [afmc] ++
3,077,362 UART: [afmc] CDI.KEYID = 6
3,077,724 UART: [afmc] SUBJECT.KEYID = 7
3,078,149 UART: [afmc] AUTHORITY.KEYID = 5
3,113,244 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,688 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,468 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,196 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,081 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,771 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,546 UART: [afmc] --
3,156,438 UART: [cold-reset] --
3,157,226 UART: [state] Locking Datavault
3,158,467 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,071 UART: [state] Locking ICCM
3,159,533 UART: [exit] Launching FMC @ 0x40000130
3,164,862 UART:
3,164,878 UART: Running Caliptra FMC ...
3,165,286 UART:
3,165,340 UART: [state] CFI Enabled
3,176,125 UART: [fht] FMC Alias Private Key: 7
3,283,866 UART: [art] Extend RT PCRs Done
3,284,294 UART: [art] Lock RT PCRs Done
3,285,752 UART: [art] Populate DV Done
3,293,737 UART: [fht] FMC Alias Private Key: 7
3,294,757 UART: [art] Derive CDI
3,295,037 UART: [art] Store in in slot 0x4
3,381,152 UART: [art] Derive Key Pair
3,381,512 UART: [art] Store priv key in slot 0x5
3,394,664 UART: [art] Derive Key Pair - Done
3,409,626 UART: [art] Signing Cert with AUTHO
3,410,106 UART: RITY.KEYID = 7
3,425,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,811 UART: [art] PUB.X = 89939DE5A98A6EA12E397746E1BDB049A798F4ECF32940BE5DB275974C1A2851D5C7C37F618F7C5B169BEBDF97DA947E
3,432,593 UART: [art] PUB.Y = 624B108DA0BC95E15C43A7844DD754A6381BAF57D110DCB37E893E944652F33E6B521EE950EF7C953F69E8ADF31B1764
3,439,549 UART: [art] SIG.R = 4C681E414FE33907EA33804A58B0E511C88B40902699CADE968C1049B0AF35D0B0C311D185CE18C64DC74E6B02A8C995
3,446,315 UART: [art] SIG.S = 231DE9FA4E387EC3B67B29B31E62D362AC572BE4F9168304E6C098D976B5A30660C14C5E9D5BF437579822BB608C87B9
3,470,978 UART: Caliptra RT
3,471,231 UART: [state] CFI Enabled
3,578,983 UART: [rt] RT listening for mailbox commands...
3,579,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,013 UART: [rt]cmd =0x44504543, len=96
3,790,130 >>> mbox cmd response data (6236 bytes)
3,790,131 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,354 UART: [rt]cmd =0x52564348, len=36
3,821,495 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,197 ready_for_fw is high
1,363,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,074 >>> mbox cmd response: success
2,987,520 UART:
2,987,536 UART: Running Caliptra FMC ...
2,987,944 UART:
2,987,998 UART: [state] CFI Enabled
2,998,601 UART: [fht] FMC Alias Private Key: 7
3,106,720 UART: [art] Extend RT PCRs Done
3,107,148 UART: [art] Lock RT PCRs Done
3,108,706 UART: [art] Populate DV Done
3,116,619 UART: [fht] FMC Alias Private Key: 7
3,117,763 UART: [art] Derive CDI
3,118,043 UART: [art] Store in in slot 0x4
3,203,730 UART: [art] Derive Key Pair
3,204,090 UART: [art] Store priv key in slot 0x5
3,217,294 UART: [art] Derive Key Pair - Done
3,231,984 UART: [art] Signing Cert with AUTHO
3,232,464 UART: RITY.KEYID = 7
3,247,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,691 UART: [art] PUB.X = C6E71DFD327789C449AA6C56856AA561E9E20BA0B0E7862F55051A179551248BE739D024A4571A86FA3361F8516B2D7F
3,255,453 UART: [art] PUB.Y = 4FC4F61F160AAAF671D79FA5C2D3F95DF45B00A5D55A81571EC8E15EC68E1D26FFBE9784A5D9B614FA9649C6299A9F90
3,262,394 UART: [art] SIG.R = B0BC78EDCA6D95425BDB949CBA3B2A7043453731F1828EA5E5F3D68D9BAA3D727F7F4FAA41BF8F88A2D95915AE57072A
3,269,179 UART: [art] SIG.S = E4A54C90F50A7770045EFA0FAEAECFD0222982F5749971960B6E70B1F61536A3BC189B451CE1920FA01DF52D22A51E96
3,292,813 UART: Caliptra RT
3,293,066 UART: [state] CFI Enabled
3,400,804 UART: [rt] RT listening for mailbox commands...
3,401,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,646 UART: [rt]cmd =0x44504543, len=96
3,612,046 >>> mbox cmd response data (6236 bytes)
3,612,047 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,718 UART: [rt]cmd =0x52564348, len=36
3,643,787 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
86,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
891,142 UART: [kat] SHA2-256
893,080 UART: [kat] SHA2-384
895,839 UART: [kat] SHA2-512-ACC
897,740 UART: [kat] ECC-384
903,733 UART: [kat] HMAC-384Kdf
908,213 UART: [kat] LMS
1,476,409 UART: [kat] --
1,477,410 UART: [cold-reset] ++
1,477,742 UART: [fht] Storing FHT @ 0x50003400
1,480,499 UART: [idev] ++
1,480,667 UART: [idev] CDI.KEYID = 6
1,481,027 UART: [idev] SUBJECT.KEYID = 7
1,481,451 UART: [idev] UDS.KEYID = 0
1,481,796 ready_for_fw is high
1,481,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,259 UART: [idev] Erasing UDS.KEYID = 0
1,505,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,565 UART: [idev] --
1,515,674 UART: [ldev] ++
1,515,842 UART: [ldev] CDI.KEYID = 6
1,516,205 UART: [ldev] SUBJECT.KEYID = 5
1,516,631 UART: [ldev] AUTHORITY.KEYID = 7
1,517,094 UART: [ldev] FE.KEYID = 1
1,522,498 UART: [ldev] Erasing FE.KEYID = 1
1,548,443 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,469 UART: [ldev] --
1,587,886 UART: [fwproc] Waiting for Commands...
1,588,711 UART: [fwproc] Received command 0x46574c44
1,589,502 UART: [fwproc] Received Image of size 114168 bytes
2,886,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,244 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,596 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,239 >>> mbox cmd response: success
3,079,451 UART: [afmc] ++
3,079,619 UART: [afmc] CDI.KEYID = 6
3,079,981 UART: [afmc] SUBJECT.KEYID = 7
3,080,406 UART: [afmc] AUTHORITY.KEYID = 5
3,116,035 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,419 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,147 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,032 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,722 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,445 UART: [afmc] --
3,159,493 UART: [cold-reset] --
3,160,151 UART: [state] Locking Datavault
3,161,070 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,674 UART: [state] Locking ICCM
3,162,188 UART: [exit] Launching FMC @ 0x40000130
3,167,517 UART:
3,167,533 UART: Running Caliptra FMC ...
3,167,941 UART:
3,168,084 UART: [state] CFI Enabled
3,178,841 UART: [fht] FMC Alias Private Key: 7
3,286,926 UART: [art] Extend RT PCRs Done
3,287,354 UART: [art] Lock RT PCRs Done
3,288,926 UART: [art] Populate DV Done
3,297,225 UART: [fht] FMC Alias Private Key: 7
3,298,213 UART: [art] Derive CDI
3,298,493 UART: [art] Store in in slot 0x4
3,384,064 UART: [art] Derive Key Pair
3,384,424 UART: [art] Store priv key in slot 0x5
3,398,556 UART: [art] Derive Key Pair - Done
3,413,549 UART: [art] Signing Cert with AUTHO
3,414,029 UART: RITY.KEYID = 7
3,429,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,430,480 UART: [art] PUB.X = C725306BC7E2BAF23C96AE7E88935E2925F10E005D63641580931AB90DE3D69C82A33CECE2301271CBF6DC8969713B10
3,437,224 UART: [art] PUB.Y = CD86067063F2D33669401198B482AE35FFCD06F0EECC442DCB8BB6C913384FC6BD7F91242B962AB31BEE53468901568A
3,444,171 UART: [art] SIG.R = 6864E4F6DEBFCE89FE3FA655CC33458356DDE3255A888733EFEF4EC296B28E4DBCFAF309E24DE2984DA51EFE6EE46F9A
3,450,964 UART: [art] SIG.S = 28BB689EE70374A200486D98E3B1298FE29DF151893483B2763CB1AF7BBD5A3822D176642F97EDD480BA55FC2E6DF4AB
3,474,294 UART: Caliptra RT
3,474,639 UART: [state] CFI Enabled
3,582,841 UART: [rt] RT listening for mailbox commands...
3,583,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,939 UART: [rt]cmd =0x44504543, len=96
3,793,932 >>> mbox cmd response data (6236 bytes)
3,793,933 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,492 UART: [rt]cmd =0x52564348, len=36
3,825,591 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,368 ready_for_fw is high
1,362,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,199 >>> mbox cmd response: success
2,989,037 UART:
2,989,053 UART: Running Caliptra FMC ...
2,989,461 UART:
2,989,604 UART: [state] CFI Enabled
3,000,105 UART: [fht] FMC Alias Private Key: 7
3,107,888 UART: [art] Extend RT PCRs Done
3,108,316 UART: [art] Lock RT PCRs Done
3,109,866 UART: [art] Populate DV Done
3,118,025 UART: [fht] FMC Alias Private Key: 7
3,119,125 UART: [art] Derive CDI
3,119,405 UART: [art] Store in in slot 0x4
3,204,824 UART: [art] Derive Key Pair
3,205,184 UART: [art] Store priv key in slot 0x5
3,218,456 UART: [art] Derive Key Pair - Done
3,232,942 UART: [art] Signing Cert with AUTHO
3,233,422 UART: RITY.KEYID = 7
3,248,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,341 UART: [art] PUB.X = C8375551BAE415BD35003CFEF15578AD212766931732777605144A92E802EAB3545B093AB766E0D12C6BA7EA1B228872
3,256,074 UART: [art] PUB.Y = 58A9FB28E53959ECCE65BB9BD265136ECDFD90A411AD8346BFA7C3888AE3AA984BB644B7A5277AF4D071B7CE085A5561
3,263,037 UART: [art] SIG.R = 28C9BC75CE151988847F55D43D851353EC23A96967F24D77D8F507F6FA99780992488B8305CBFBEBFC3B9E0A703B8EFB
3,269,801 UART: [art] SIG.S = C410E39638D1917EAB749957DE3050AF9BC7110B3B503F2C0A5B50267396A39B062061A4E11875FF180865EF46B20473
3,293,439 UART: Caliptra RT
3,293,784 UART: [state] CFI Enabled
3,401,753 UART: [rt] RT listening for mailbox commands...
3,402,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,811 UART: [rt]cmd =0x44504543, len=96
3,613,723 >>> mbox cmd response data (6236 bytes)
3,613,724 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,335 UART: [rt]cmd =0x52564348, len=36
3,645,566 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
917,778 UART: [kat] HMAC-384Kdf
922,324 UART: [kat] LMS
1,170,652 UART: [kat] --
1,171,335 UART: [cold-reset] ++
1,171,867 UART: [fht] FHT @ 0x50003400
1,174,392 UART: [idev] ++
1,174,560 UART: [idev] CDI.KEYID = 6
1,174,920 UART: [idev] SUBJECT.KEYID = 7
1,175,344 UART: [idev] UDS.KEYID = 0
1,175,689 ready_for_fw is high
1,175,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,191 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,209,929 UART: [ldev] ++
1,210,097 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,232 UART: [fwproc] Wait for Commands...
1,282,950 UART: [fwproc] Recv command 0x46574c44
1,283,678 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,872 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,176 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,809 >>> mbox cmd response: success
2,772,951 UART: [afmc] ++
2,773,119 UART: [afmc] CDI.KEYID = 6
2,773,481 UART: [afmc] SUBJECT.KEYID = 7
2,773,906 UART: [afmc] AUTHORITY.KEYID = 5
2,809,577 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,848 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,576 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,180 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,980 UART: [afmc] --
2,853,096 UART: [cold-reset] --
2,853,694 UART: [state] Locking Datavault
2,854,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,531 UART: [state] Locking ICCM
2,856,003 UART: [exit] Launching FMC @ 0x40000130
2,861,332 UART:
2,861,348 UART: Running Caliptra FMC ...
2,861,756 UART:
2,861,810 UART: [state] CFI Enabled
2,872,311 UART: [fht] FMC Alias Private Key: 7
2,979,798 UART: [art] Extend RT PCRs Done
2,980,226 UART: [art] Lock RT PCRs Done
2,981,722 UART: [art] Populate DV Done
2,989,997 UART: [fht] FMC Alias Private Key: 7
2,991,119 UART: [art] Derive CDI
2,991,399 UART: [art] Store in in slot 0x4
3,076,830 UART: [art] Derive Key Pair
3,077,190 UART: [art] Store priv key in slot 0x5
3,090,476 UART: [art] Derive Key Pair - Done
3,105,054 UART: [art] Signing Cert with AUTHO
3,105,534 UART: RITY.KEYID = 7
3,120,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,557 UART: [art] PUB.X = CF85EE41E2DD69828C93DC49F9560B2BEFC6E405ECEDB8BEBBDB3142841BBE6F478FA328C884F4E3145EBC9112706944
3,128,339 UART: [art] PUB.Y = CA52ADFECA58EBED1CA60F98DCCF0FFF7B072592E70D6576D5889C9EBD26C15FB2E34E3B58556CDB5CC9194181FBE317
3,135,303 UART: [art] SIG.R = 9C534775BD97ED62B94D4F6B800BDC95C3C0E189812EC1A63F71DB4AE1453BB5968907626289EFFFE101BD10800D0F4E
3,142,066 UART: [art] SIG.S = 95EFC025D7F095E06E59385171C7B10E29A59FE5FC90455B97A0C4FA4E2369A442DF4BB6192B248B2CCC59828A0B0172
3,165,528 UART: Caliptra RT
3,165,781 UART: [state] CFI Enabled
3,273,465 UART: [rt] RT listening for mailbox commands...
3,274,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,559 UART: [rt]cmd =0x44504543, len=96
3,484,510 >>> mbox cmd response data (6236 bytes)
3,484,511 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,010 UART: [rt]cmd =0x52564348, len=36
3,516,541 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 ready_for_fw is high
1,060,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,626 >>> mbox cmd response: success
2,688,134 UART:
2,688,150 UART: Running Caliptra FMC ...
2,688,558 UART:
2,688,612 UART: [state] CFI Enabled
2,699,281 UART: [fht] FMC Alias Private Key: 7
2,807,568 UART: [art] Extend RT PCRs Done
2,807,996 UART: [art] Lock RT PCRs Done
2,809,612 UART: [art] Populate DV Done
2,817,877 UART: [fht] FMC Alias Private Key: 7
2,818,921 UART: [art] Derive CDI
2,819,201 UART: [art] Store in in slot 0x4
2,904,878 UART: [art] Derive Key Pair
2,905,238 UART: [art] Store priv key in slot 0x5
2,918,424 UART: [art] Derive Key Pair - Done
2,933,209 UART: [art] Signing Cert with AUTHO
2,933,689 UART: RITY.KEYID = 7
2,948,963 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,728 UART: [art] PUB.X = 65BBFB37060A43F64D376379080A0A18EA5984FBB3822B60C1D1AF11BBA6B659A17239DF5C671085DA10AC4825E08157
2,956,485 UART: [art] PUB.Y = A34B360A4A5DD7F20300DEAF712F1041CA5E8197017AFBC343B53563B85D7D594A2D7769B80C35B2C6063D986DC90E8A
2,963,401 UART: [art] SIG.R = 512572D9B59DF98D41804E34A4EA1DCFD75CE9CE639D10B91E463EDE1A5F9A52286A45EE2289D5A3D3FBC0CE661CEDC4
2,970,191 UART: [art] SIG.S = 36659398A4A46BAC2A91F2ED63C453574D0ED83B43A96457396940C205EF7BE5EDF05B2ADBAC70EA2872A5DAFEBE1A5A
2,994,602 UART: Caliptra RT
2,994,855 UART: [state] CFI Enabled
3,102,452 UART: [rt] RT listening for mailbox commands...
3,103,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,376 UART: [rt]cmd =0x44504543, len=96
3,313,660 >>> mbox cmd response data (6236 bytes)
3,313,661 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,370 UART: [rt]cmd =0x52564348, len=36
3,345,577 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
893,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,516 UART: [kat] ++
897,668 UART: [kat] sha1
901,848 UART: [kat] SHA2-256
903,788 UART: [kat] SHA2-384
906,413 UART: [kat] SHA2-512-ACC
908,314 UART: [kat] ECC-384
917,891 UART: [kat] HMAC-384Kdf
922,727 UART: [kat] LMS
1,171,055 UART: [kat] --
1,171,718 UART: [cold-reset] ++
1,172,262 UART: [fht] FHT @ 0x50003400
1,174,993 UART: [idev] ++
1,175,161 UART: [idev] CDI.KEYID = 6
1,175,521 UART: [idev] SUBJECT.KEYID = 7
1,175,945 UART: [idev] UDS.KEYID = 0
1,176,290 ready_for_fw is high
1,176,290 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,901 UART: [idev] Erasing UDS.KEYID = 0
1,201,628 UART: [idev] Sha1 KeyId Algorithm
1,210,072 UART: [idev] --
1,211,198 UART: [ldev] ++
1,211,366 UART: [ldev] CDI.KEYID = 6
1,211,729 UART: [ldev] SUBJECT.KEYID = 5
1,212,155 UART: [ldev] AUTHORITY.KEYID = 7
1,212,618 UART: [ldev] FE.KEYID = 1
1,217,902 UART: [ldev] Erasing FE.KEYID = 1
1,244,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,480 UART: [ldev] --
1,283,957 UART: [fwproc] Wait for Commands...
1,284,705 UART: [fwproc] Recv command 0x46574c44
1,285,433 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,387 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,326 >>> mbox cmd response: success
2,774,400 UART: [afmc] ++
2,774,568 UART: [afmc] CDI.KEYID = 6
2,774,930 UART: [afmc] SUBJECT.KEYID = 7
2,775,355 UART: [afmc] AUTHORITY.KEYID = 5
2,809,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,523 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,251 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,136 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,855 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,603 UART: [afmc] --
2,853,559 UART: [cold-reset] --
2,854,455 UART: [state] Locking Datavault
2,855,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,402 UART: [state] Locking ICCM
2,857,066 UART: [exit] Launching FMC @ 0x40000130
2,862,395 UART:
2,862,411 UART: Running Caliptra FMC ...
2,862,819 UART:
2,862,962 UART: [state] CFI Enabled
2,873,653 UART: [fht] FMC Alias Private Key: 7
2,981,882 UART: [art] Extend RT PCRs Done
2,982,310 UART: [art] Lock RT PCRs Done
2,983,748 UART: [art] Populate DV Done
2,991,885 UART: [fht] FMC Alias Private Key: 7
2,992,845 UART: [art] Derive CDI
2,993,125 UART: [art] Store in in slot 0x4
3,078,596 UART: [art] Derive Key Pair
3,078,956 UART: [art] Store priv key in slot 0x5
3,091,742 UART: [art] Derive Key Pair - Done
3,106,192 UART: [art] Signing Cert with AUTHO
3,106,672 UART: RITY.KEYID = 7
3,121,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,701 UART: [art] PUB.X = C769F9345F9A43C6DA7287FEBE6AF0F30BE553786FB4E251781597E22451F8C32078EC2DA40D64FEECCAE820B9602DDC
3,129,479 UART: [art] PUB.Y = AD2DDC80CDA82EAAD4F787EDDC15645C09BD411C46A71E89821CE2D06CE1D9DCF8E8DA0992013CDCAEAD6D68AF985CC2
3,136,452 UART: [art] SIG.R = 902619661332AFC0D0A40CEFEF615C269A92A97D8176097ACE0DCFD3650DFCBD65B26D94A20BB88516B7410ACA14A6E2
3,143,216 UART: [art] SIG.S = 9658C4FD13BC99568245FA9F686DEFDD764A6C7E76D6A03D5A915C2B7B8AF1CCF31C0EA9EFDE3FEE06AD16007BE6F425
3,166,775 UART: Caliptra RT
3,167,120 UART: [state] CFI Enabled
3,273,608 UART: [rt] RT listening for mailbox commands...
3,274,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,876 UART: [rt]cmd =0x44504543, len=96
3,485,597 >>> mbox cmd response data (6236 bytes)
3,485,598 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,275 UART: [rt]cmd =0x52564348, len=36
3,517,476 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,402 ready_for_fw is high
1,060,402 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,131 >>> mbox cmd response: success
2,686,333 UART:
2,686,349 UART: Running Caliptra FMC ...
2,686,757 UART:
2,686,900 UART: [state] CFI Enabled
2,697,415 UART: [fht] FMC Alias Private Key: 7
2,806,282 UART: [art] Extend RT PCRs Done
2,806,710 UART: [art] Lock RT PCRs Done
2,808,218 UART: [art] Populate DV Done
2,816,557 UART: [fht] FMC Alias Private Key: 7
2,817,627 UART: [art] Derive CDI
2,817,907 UART: [art] Store in in slot 0x4
2,903,536 UART: [art] Derive Key Pair
2,903,896 UART: [art] Store priv key in slot 0x5
2,917,358 UART: [art] Derive Key Pair - Done
2,932,201 UART: [art] Signing Cert with AUTHO
2,932,681 UART: RITY.KEYID = 7
2,947,657 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,422 UART: [art] PUB.X = 2DB03185F485BD21CFFE6BC436B5874D1E1BFC96B652B9F92E792E5EF5511F8FFEF51DAE5F54B82D468415D05786EF64
2,955,206 UART: [art] PUB.Y = FDD2D3D8A4F8086C073147B47CA55625BE0098838E6C0D1054E4163923569CEFB2BC0D42582757AAA3AD9BAC4D436938
2,962,126 UART: [art] SIG.R = 284A91AC9E195B8E44CE94625CB29441F14BE0CEC769B0502497F83ECD0CC4AB3D7CA8ABD70B83574D90F88712E6B92A
2,968,902 UART: [art] SIG.S = EE1D07B720DEA02145B343D5CED90CFAD72A81769C06BBAFBD9C7A7A557C90B399DA5362BFDC8AE14AF0B2E9023724B5
2,993,201 UART: Caliptra RT
2,993,546 UART: [state] CFI Enabled
3,100,699 UART: [rt] RT listening for mailbox commands...
3,101,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,427 UART: [rt]cmd =0x44504543, len=96
3,312,484 >>> mbox cmd response data (6236 bytes)
3,312,485 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,978 UART: [rt]cmd =0x52564348, len=36
3,344,229 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,997 UART: [kat] ++
895,149 UART: [kat] sha1
899,347 UART: [kat] SHA2-256
901,287 UART: [kat] SHA2-384
903,918 UART: [kat] SHA2-512-ACC
905,819 UART: [kat] ECC-384
914,852 UART: [kat] HMAC-384Kdf
919,492 UART: [kat] LMS
1,167,804 UART: [kat] --
1,169,011 UART: [cold-reset] ++
1,169,477 UART: [fht] FHT @ 0x50003400
1,172,153 UART: [idev] ++
1,172,321 UART: [idev] CDI.KEYID = 6
1,172,682 UART: [idev] SUBJECT.KEYID = 7
1,173,107 UART: [idev] UDS.KEYID = 0
1,173,453 ready_for_fw is high
1,173,453 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,203 UART: [idev] --
1,208,242 UART: [ldev] ++
1,208,410 UART: [ldev] CDI.KEYID = 6
1,208,774 UART: [ldev] SUBJECT.KEYID = 5
1,209,201 UART: [ldev] AUTHORITY.KEYID = 7
1,209,664 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,240,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,224 UART: [ldev] --
1,279,694 UART: [fwproc] Wait for Commands...
1,280,419 UART: [fwproc] Recv command 0x46574c44
1,281,152 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,659 >>> mbox cmd response: success
2,770,766 UART: [afmc] ++
2,770,934 UART: [afmc] CDI.KEYID = 6
2,771,297 UART: [afmc] SUBJECT.KEYID = 7
2,771,723 UART: [afmc] AUTHORITY.KEYID = 5
2,807,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,730 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,613 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,057 UART: [afmc] --
2,851,005 UART: [cold-reset] --
2,851,767 UART: [state] Locking Datavault
2,852,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,326 UART: [state] Locking ICCM
2,853,880 UART: [exit] Launching FMC @ 0x40000130
2,859,209 UART:
2,859,225 UART: Running Caliptra FMC ...
2,859,633 UART:
2,859,687 UART: [state] CFI Enabled
2,870,108 UART: [fht] FMC Alias Private Key: 7
2,978,861 UART: [art] Extend RT PCRs Done
2,979,289 UART: [art] Lock RT PCRs Done
2,980,961 UART: [art] Populate DV Done
2,989,292 UART: [fht] FMC Alias Private Key: 7
2,990,462 UART: [art] Derive CDI
2,990,742 UART: [art] Store in in slot 0x4
3,076,433 UART: [art] Derive Key Pair
3,076,793 UART: [art] Store priv key in slot 0x5
3,089,667 UART: [art] Derive Key Pair - Done
3,104,400 UART: [art] Signing Cert with AUTHO
3,104,880 UART: RITY.KEYID = 7
3,119,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,407 UART: [art] PUB.X = 1939BB5F1FD0062F3F2DCA5277205193AF42450C661B6657D4FABC5F86A9FE17F693006E518855572ED07DD548B97B77
3,127,149 UART: [art] PUB.Y = 9D0D1B31D30203A5D97AF5D56E23C6FEE4A47444D81F30E126B53B348857B5F461BE171C0425F1AC8D549FACC28C6653
3,134,093 UART: [art] SIG.R = A60B9D229AA6DC1B257E19DB9EFA5800113F6D5E51B3347E0FEFBC01A2E399DEFD6C6EB9CD1C8A920E03A0136B8D6065
3,140,846 UART: [art] SIG.S = F9257B2635C9DB32B7D6CD5929C43575CDA06F448565BC8A9532D944984F9D0CE0C2DABE5D01754465FE75E33B5A0200
3,165,004 UART: Caliptra RT
3,165,257 UART: [state] CFI Enabled
3,273,851 UART: [rt] RT listening for mailbox commands...
3,274,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,849 UART: [rt]cmd =0x44504543, len=96
3,484,538 >>> mbox cmd response data (6236 bytes)
3,484,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,114 UART: [rt]cmd =0x52564348, len=36
3,516,093 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,894 ready_for_fw is high
1,055,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,545 >>> mbox cmd response: success
2,682,855 UART:
2,682,871 UART: Running Caliptra FMC ...
2,683,279 UART:
2,683,333 UART: [state] CFI Enabled
2,693,638 UART: [fht] FMC Alias Private Key: 7
2,801,925 UART: [art] Extend RT PCRs Done
2,802,353 UART: [art] Lock RT PCRs Done
2,804,065 UART: [art] Populate DV Done
2,812,272 UART: [fht] FMC Alias Private Key: 7
2,813,326 UART: [art] Derive CDI
2,813,606 UART: [art] Store in in slot 0x4
2,899,505 UART: [art] Derive Key Pair
2,899,865 UART: [art] Store priv key in slot 0x5
2,913,099 UART: [art] Derive Key Pair - Done
2,927,734 UART: [art] Signing Cert with AUTHO
2,928,214 UART: RITY.KEYID = 7
2,943,220 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,985 UART: [art] PUB.X = 1A266727D2E74366C2FFAB5899870E774AFAB7831474D52D94E56E85D6B7DD1553D6CC2177EEF92E655891AD41C30D60
2,950,751 UART: [art] PUB.Y = C9851D831BC2D0A504D66071EF14689834735D295747D76F1E5F25F6DFF74D33710CA60BE033A6B32114381797785B0C
2,957,681 UART: [art] SIG.R = 78E0C31FA68658F8133885D653B3CC1DFB999ECB03FFD30A0C671E679C0FEF3F8E2E9CC92248B34D56523AE4E8DEA26B
2,964,455 UART: [art] SIG.S = 52E01494FE4CAA9F353D896BBBBD652D3D458BF0B675FD45770F4E46EC8CBA0412C61E5071B2BB101DA7345B519E6451
2,987,944 UART: Caliptra RT
2,988,197 UART: [state] CFI Enabled
3,096,098 UART: [rt] RT listening for mailbox commands...
3,096,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,216 UART: [rt]cmd =0x44504543, len=96
3,306,959 >>> mbox cmd response data (6236 bytes)
3,306,960 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,625 UART: [rt]cmd =0x52564348, len=36
3,338,952 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,648 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,174,696 ready_for_fw is high
1,174,696 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,922 UART: [idev] Erasing UDS.KEYID = 0
1,199,312 UART: [idev] Sha1 KeyId Algorithm
1,208,180 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,216,209 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,535 UART: [ldev] --
1,282,003 UART: [fwproc] Wait for Commands...
1,282,642 UART: [fwproc] Recv command 0x46574c44
1,283,375 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,656 >>> mbox cmd response: success
2,771,879 UART: [afmc] ++
2,772,047 UART: [afmc] CDI.KEYID = 6
2,772,410 UART: [afmc] SUBJECT.KEYID = 7
2,772,836 UART: [afmc] AUTHORITY.KEYID = 5
2,808,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,301 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,184 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,903 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,632 UART: [afmc] --
2,851,650 UART: [cold-reset] --
2,852,388 UART: [state] Locking Datavault
2,853,657 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,261 UART: [state] Locking ICCM
2,854,911 UART: [exit] Launching FMC @ 0x40000130
2,860,240 UART:
2,860,256 UART: Running Caliptra FMC ...
2,860,664 UART:
2,860,807 UART: [state] CFI Enabled
2,871,300 UART: [fht] FMC Alias Private Key: 7
2,979,357 UART: [art] Extend RT PCRs Done
2,979,785 UART: [art] Lock RT PCRs Done
2,981,539 UART: [art] Populate DV Done
2,990,018 UART: [fht] FMC Alias Private Key: 7
2,991,140 UART: [art] Derive CDI
2,991,420 UART: [art] Store in in slot 0x4
3,076,927 UART: [art] Derive Key Pair
3,077,287 UART: [art] Store priv key in slot 0x5
3,090,929 UART: [art] Derive Key Pair - Done
3,106,021 UART: [art] Signing Cert with AUTHO
3,106,501 UART: RITY.KEYID = 7
3,121,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,584 UART: [art] PUB.X = 153782EFB8080658F02EB966BFEFCFAD7369DD4D9E7D2A3D7DA0341FFAB17386C249A33FDB29AE6F792A4C4DAEBE89B5
3,129,372 UART: [art] PUB.Y = BF0F91EFF0AB9A30EC285250CF27A7B3DBD6C226C246278CB970DD11DAE4F86214895FC415F92E17E816191C626EB958
3,136,329 UART: [art] SIG.R = E8E3EA6D7FC702CEC9864E7F9474E399F3A1496E679D136A547176FDECDBF5D9BE46188291201537518E7A118F38E655
3,143,098 UART: [art] SIG.S = 1587239DBB3B9F1FAF1BD808818C04D13123ADE947A311EC4B04E78F9B2080538E6C3FDD51C3DC95B7BD54869E9C9EEE
3,166,720 UART: Caliptra RT
3,167,065 UART: [state] CFI Enabled
3,274,232 UART: [rt] RT listening for mailbox commands...
3,274,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,210 UART: [rt]cmd =0x44504543, len=96
3,486,067 >>> mbox cmd response data (6236 bytes)
3,486,068 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,535 UART: [rt]cmd =0x52564348, len=36
3,517,688 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,177 ready_for_fw is high
1,056,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,884 >>> mbox cmd response: success
2,682,244 UART:
2,682,260 UART: Running Caliptra FMC ...
2,682,668 UART:
2,682,811 UART: [state] CFI Enabled
2,693,668 UART: [fht] FMC Alias Private Key: 7
2,802,081 UART: [art] Extend RT PCRs Done
2,802,509 UART: [art] Lock RT PCRs Done
2,804,065 UART: [art] Populate DV Done
2,812,122 UART: [fht] FMC Alias Private Key: 7
2,813,196 UART: [art] Derive CDI
2,813,476 UART: [art] Store in in slot 0x4
2,899,223 UART: [art] Derive Key Pair
2,899,583 UART: [art] Store priv key in slot 0x5
2,913,009 UART: [art] Derive Key Pair - Done
2,927,861 UART: [art] Signing Cert with AUTHO
2,928,341 UART: RITY.KEYID = 7
2,943,351 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,116 UART: [art] PUB.X = 550F4DC188ED794B0BC1BFF28922294DE76EBDD1D50010139A2CB12DB645457956AE9F3F6C4C82D08FDE6FD5A3AB9CD7
2,950,876 UART: [art] PUB.Y = 1804F79C3D51FB8D5B9731A0C58DADA9CDEACA873F39D2E7998CC684238AD4E9B1FEE77260DFB72060778BD3B43CC5DA
2,957,843 UART: [art] SIG.R = 4C83EA8461B1CDB4EAC51502224C20668A84C1F69A80040B93266684DEF77B110EB26C645B44262480C5FC198C17AC93
2,964,599 UART: [art] SIG.S = 8FAE25930C3492A1071FB0E96940AD4F1D657AD89FDA2F970A5868E732E444F6B8FBD1858A09AAA161893804122E1E46
2,988,861 UART: Caliptra RT
2,989,206 UART: [state] CFI Enabled
3,096,803 UART: [rt] RT listening for mailbox commands...
3,097,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,161 UART: [rt]cmd =0x44504543, len=96
3,309,264 >>> mbox cmd response data (6236 bytes)
3,309,265 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,578 UART: [rt]cmd =0x52564348, len=36
3,341,075 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,140 UART:
192,524 UART: Running Caliptra ROM ...
193,726 UART:
193,881 UART: [state] CFI Enabled
264,310 UART: [state] LifecycleState = Unprovisioned
266,170 UART: [state] DebugLocked = No
268,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,167 UART: [kat] SHA2-256
443,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,403 UART: [kat] ++
454,878 UART: [kat] sha1
465,747 UART: [kat] SHA2-256
468,476 UART: [kat] SHA2-384
473,538 UART: [kat] SHA2-512-ACC
475,893 UART: [kat] ECC-384
2,768,424 UART: [kat] HMAC-384Kdf
2,799,781 UART: [kat] LMS
3,990,077 UART: [kat] --
3,993,532 UART: [cold-reset] ++
3,995,675 UART: [fht] Storing FHT @ 0x50003400
4,007,711 UART: [idev] ++
4,008,280 UART: [idev] CDI.KEYID = 6
4,009,234 UART: [idev] SUBJECT.KEYID = 7
4,010,477 UART: [idev] UDS.KEYID = 0
4,011,439 ready_for_fw is high
4,011,629 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,801 UART: [idev] Erasing UDS.KEYID = 0
7,347,246 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,105 UART: [idev] --
7,372,400 UART: [ldev] ++
7,372,964 UART: [ldev] CDI.KEYID = 6
7,373,922 UART: [ldev] SUBJECT.KEYID = 5
7,375,128 UART: [ldev] AUTHORITY.KEYID = 7
7,376,424 UART: [ldev] FE.KEYID = 1
7,423,375 UART: [ldev] Erasing FE.KEYID = 1
10,755,441 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,891 UART: [ldev] --
13,117,062 UART: [fwproc] Waiting for Commands...
13,120,393 UART: [fwproc] Received command 0x46574c44
13,122,622 UART: [fwproc] Received Image of size 113844 bytes
17,169,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,243,044 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,628,487 >>> mbox cmd response: success
17,632,793 UART: [afmc] ++
17,633,401 UART: [afmc] CDI.KEYID = 6
17,634,307 UART: [afmc] SUBJECT.KEYID = 7
17,635,576 UART: [afmc] AUTHORITY.KEYID = 5
21,009,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,189 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,504 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,903 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,715 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,141 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,745 UART: [afmc] --
23,381,330 UART: [cold-reset] --
23,385,945 UART: [state] Locking Datavault
23,391,678 UART: [state] Locking PCR0, PCR1 and PCR31
23,393,476 UART: [state] Locking ICCM
23,395,740 UART: [exit] Launching FMC @ 0x40000130
23,404,133 UART:
23,404,392 UART: Running Caliptra FMC ...
23,405,489 UART:
23,405,648 UART: [state] CFI Enabled
23,468,535 UART: [fht] FMC Alias Private Key: 7
25,806,898 UART: [art] Extend RT PCRs Done
25,808,354 UART: [art] Lock RT PCRs Done
25,809,603 UART: [art] Populate DV Done
25,814,925 UART: [fht] FMC Alias Private Key: 7
25,816,516 UART: [art] Derive CDI
25,817,254 UART: [art] Store in in slot 0x4
25,876,991 UART: [art] Derive Key Pair
25,878,028 UART: [art] Store priv key in slot 0x5
29,171,728 UART: [art] Derive Key Pair - Done
29,184,727 UART: [art] Signing Cert with AUTHO
29,186,022 UART: RITY.KEYID = 7
31,472,886 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,411 UART: [art] PUB.X = 971F6E7987BA8F3AD270D9F66D80EB1F8B82E80FD0A7FB20BE238464A5B5E93CBBA5207EE7E07F7C7B6677761BF37ED0
31,481,634 UART: [art] PUB.Y = 8F13AD23FA8C176EB794CEFC64F708986902FE96BB1C803FF8AD0D0FE4BB44897FB36787D4A66B2710C74611D55E6914
31,488,882 UART: [art] SIG.R = 4BB6943A0D90433E912813FC8FDCB984473E896B413A66A2DA85623FFF30B5BB5CAF934F888DFEA6C870C2BB1565766C
31,496,297 UART: [art] SIG.S = E42E1E39D16F034E48F06F0503766D2A412BF8BCD74AF5E02BC76A2C7EF04F582EC9D6636E9EF64CA587596F1805BEA6
32,801,331 UART: Caliptra RT
32,802,049 UART: [state] CFI Enabled
32,962,031 UART: [rt] RT listening for mailbox commands...
32,963,917 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,994,890 UART: [rt]cmd =0x52564348, len=36
32,996,907 >>> mbox cmd response: failed
32,997,206 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,027,104 UART: [rt]cmd =0x52564348, len=36
33,028,699 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,895 writing to cptra_bootfsm_go
3,785,792 ready_for_fw is high
3,786,395 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,854,184 >>> mbox cmd response: success
23,542,909 UART:
23,543,314 UART: Running Caliptra FMC ...
23,544,417 UART:
23,544,599 UART: [state] CFI Enabled
23,615,804 UART: [fht] FMC Alias Private Key: 7
25,953,620 UART: [art] Extend RT PCRs Done
25,954,843 UART: [art] Lock RT PCRs Done
25,956,365 UART: [art] Populate DV Done
25,961,828 UART: [fht] FMC Alias Private Key: 7
25,963,364 UART: [art] Derive CDI
25,964,118 UART: [art] Store in in slot 0x4
26,023,864 UART: [art] Derive Key Pair
26,024,909 UART: [art] Store priv key in slot 0x5
29,317,938 UART: [art] Derive Key Pair - Done
29,331,041 UART: [art] Signing Cert with AUTHO
29,332,344 UART: RITY.KEYID = 7
31,618,411 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,921 UART: [art] PUB.X = 80FD4A755CD1280F7F14782C979EA91AF9352471BC5581A72CAB84CA4E14BDF28B31184402FB764F392F6A8CDE666193
31,627,221 UART: [art] PUB.Y = 35DFA65B5CC79EF014B3A663D708244E6A21C7549D8BE67BE0D51B13D102393F2C53E66C3D078778AA9F9A2F8EFB26B0
31,634,387 UART: [art] SIG.R = 1C44B23C93DA901A978C47DA2F461F29FF5E4092AA4A50992BB3D4753109B057023FD29E95F2513ED0E49A8B6092BCA2
31,641,798 UART: [art] SIG.S = 73BB9BDE00D488290FD566C8A61448FAF486F4804CB535DEB2D19415381634419B6B04682FB6E001FF314E5E47256838
32,946,475 UART: Caliptra RT
32,947,192 UART: [state] CFI Enabled
33,109,059 UART: [rt] RT listening for mailbox commands...
33,110,936 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,141,781 UART: [rt]cmd =0x52564348, len=36
33,143,362 >>> mbox cmd response: failed
33,143,661 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,173,450 UART: [rt]cmd =0x52564348, len=36
33,175,255 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,642 UART:
192,995 UART: Running Caliptra ROM ...
194,182 UART:
603,857 UART: [state] CFI Enabled
611,844 UART: [state] LifecycleState = Unprovisioned
613,711 UART: [state] DebugLocked = No
616,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
621,398 UART: [kat] SHA2-256
791,179 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
801,689 UART: [kat] ++
802,137 UART: [kat] sha1
812,372 UART: [kat] SHA2-256
815,100 UART: [kat] SHA2-384
820,093 UART: [kat] SHA2-512-ACC
822,395 UART: [kat] ECC-384
3,105,423 UART: [kat] HMAC-384Kdf
3,117,370 UART: [kat] LMS
4,307,486 UART: [kat] --
4,312,853 UART: [cold-reset] ++
4,314,434 UART: [fht] Storing FHT @ 0x50003400
4,325,556 UART: [idev] ++
4,326,119 UART: [idev] CDI.KEYID = 6
4,327,037 UART: [idev] SUBJECT.KEYID = 7
4,328,305 UART: [idev] UDS.KEYID = 0
4,329,293 ready_for_fw is high
4,329,493 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,472,438 UART: [idev] Erasing UDS.KEYID = 0
7,613,337 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,852 UART: [idev] --
7,638,661 UART: [ldev] ++
7,639,232 UART: [ldev] CDI.KEYID = 6
7,640,197 UART: [ldev] SUBJECT.KEYID = 5
7,641,410 UART: [ldev] AUTHORITY.KEYID = 7
7,642,641 UART: [ldev] FE.KEYID = 1
7,652,282 UART: [ldev] Erasing FE.KEYID = 1
10,937,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,232,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,246,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,261,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,276,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,294,380 UART: [ldev] --
13,298,289 UART: [fwproc] Waiting for Commands...
13,299,943 UART: [fwproc] Received command 0x46574c44
13,302,128 UART: [fwproc] Received Image of size 113844 bytes
17,350,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,425,155 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,494,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,810,343 >>> mbox cmd response: success
17,813,966 UART: [afmc] ++
17,814,573 UART: [afmc] CDI.KEYID = 6
17,815,852 UART: [afmc] SUBJECT.KEYID = 7
17,816,988 UART: [afmc] AUTHORITY.KEYID = 5
21,133,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,427,880 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,430,134 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,444,546 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,459,366 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,473,789 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,495,480 UART: [afmc] --
23,498,790 UART: [cold-reset] --
23,503,846 UART: [state] Locking Datavault
23,509,468 UART: [state] Locking PCR0, PCR1 and PCR31
23,511,226 UART: [state] Locking ICCM
23,513,838 UART: [exit] Launching FMC @ 0x40000130
23,522,234 UART:
23,522,462 UART: Running Caliptra FMC ...
23,523,490 UART:
23,523,641 UART: [state] CFI Enabled
23,531,955 UART: [fht] FMC Alias Private Key: 7
25,862,435 UART: [art] Extend RT PCRs Done
25,863,650 UART: [art] Lock RT PCRs Done
25,865,427 UART: [art] Populate DV Done
25,870,789 UART: [fht] FMC Alias Private Key: 7
25,872,269 UART: [art] Derive CDI
25,873,032 UART: [art] Store in in slot 0x4
25,915,520 UART: [art] Derive Key Pair
25,916,583 UART: [art] Store priv key in slot 0x5
29,158,833 UART: [art] Derive Key Pair - Done
29,171,774 UART: [art] Signing Cert with AUTHO
29,173,073 UART: RITY.KEYID = 7
31,452,311 UART: [art] Erasing AUTHORITY.KEYID = 7
31,453,819 UART: [art] PUB.X = FE411EAFA82368684AB50C5968F1FACDD6F428A703315D321165AA4EC357054DE1493B463EFE0BFC8E0ED33A459E824A
31,461,092 UART: [art] PUB.Y = 267820215DB67D3AC9A5A01B77FD584425370794E9D84FC6F20D3C898C7984B57712615CE561A00558692B368D18B243
31,468,290 UART: [art] SIG.R = F2D2254D5FEEAE135D1AE68E876FBB545FAD9BEB5E33E78A4AEC27D7959B65D46CE85AE1D3D29A3FE6209C740B4B5AB0
31,475,706 UART: [art] SIG.S = AB87D53FF524D7782D09714777D9122D0E929F928A21710B3E981678EF5993A87577A3E47AF8E2BD5EE0512F25066349
32,781,397 UART: Caliptra RT
32,782,111 UART: [state] CFI Enabled
32,899,623 UART: [rt] RT listening for mailbox commands...
32,901,492 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,932,161 UART: [rt]cmd =0x52564348, len=36
32,933,987 >>> mbox cmd response: failed
32,934,283 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
32,963,926 UART: [rt]cmd =0x52564348, len=36
32,965,722 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,126,683 ready_for_fw is high
4,127,193 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,072,112 >>> mbox cmd response: success
23,713,665 UART:
23,714,054 UART: Running Caliptra FMC ...
23,715,248 UART:
23,715,449 UART: [state] CFI Enabled
23,723,082 UART: [fht] FMC Alias Private Key: 7
26,053,265 UART: [art] Extend RT PCRs Done
26,054,619 UART: [art] Lock RT PCRs Done
26,056,251 UART: [art] Populate DV Done
26,061,835 UART: [fht] FMC Alias Private Key: 7
26,063,486 UART: [art] Derive CDI
26,064,305 UART: [art] Store in in slot 0x4
26,106,845 UART: [art] Derive Key Pair
26,107,842 UART: [art] Store priv key in slot 0x5
29,350,652 UART: [art] Derive Key Pair - Done
29,363,327 UART: [art] Signing Cert with AUTHO
29,364,635 UART: RITY.KEYID = 7
31,644,154 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,667 UART: [art] PUB.X = 051B995FFDD87154EADA630F5DDE6875EDB41406EC23F53D630E44940E5D0E6B3E21F6F21BC98872027154AF1F1EA410
31,652,922 UART: [art] PUB.Y = 81EB78486699A789607DC8579F7C25B81D2AE0953C15D974B08BF4AFE2B7B95D8F40D146BA73C1D89F3C375D93938547
31,660,169 UART: [art] SIG.R = 7C07F02A3B8F9C6A7A52501E91884FBD70022142DAF15A014E492492172950506C324BFA60062992BB54A3F871496B9B
31,667,532 UART: [art] SIG.S = 2192F1C2A2C868119548D0D16AAAA4C21809567021ADE38A56E00B03D51BA29D8C4F314CD1575314F77EDA736B2ED60A
32,972,153 UART: Caliptra RT
32,972,881 UART: [state] CFI Enabled
33,090,593 UART: [rt] RT listening for mailbox commands...
33,092,474 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,123,182 UART: [rt]cmd =0x52564348, len=36
33,124,984 >>> mbox cmd response: failed
33,125,293 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,155,138 UART: [rt]cmd =0x52564348, len=36
33,156,893 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
191,963 UART:
192,348 UART: Running Caliptra ROM ...
193,506 UART:
193,658 UART: [state] CFI Enabled
266,104 UART: [state] LifecycleState = Unprovisioned
267,959 UART: [state] DebugLocked = No
269,709 UART: [state] WD Timer not started. Device not locked for debugging
273,052 UART: [kat] SHA2-256
452,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,732 UART: [kat] ++
464,268 UART: [kat] sha1
476,217 UART: [kat] SHA2-256
479,219 UART: [kat] SHA2-384
485,990 UART: [kat] SHA2-512-ACC
488,933 UART: [kat] ECC-384
2,950,067 UART: [kat] HMAC-384Kdf
2,972,179 UART: [kat] LMS
3,501,595 UART: [kat] --
3,505,873 UART: [cold-reset] ++
3,507,529 UART: [fht] FHT @ 0x50003400
3,518,579 UART: [idev] ++
3,519,146 UART: [idev] CDI.KEYID = 6
3,520,058 UART: [idev] SUBJECT.KEYID = 7
3,521,307 UART: [idev] UDS.KEYID = 0
3,522,253 ready_for_fw is high
3,522,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,045 UART: [idev] Erasing UDS.KEYID = 0
6,027,763 UART: [idev] Sha1 KeyId Algorithm
6,050,341 UART: [idev] --
6,053,744 UART: [ldev] ++
6,054,314 UART: [ldev] CDI.KEYID = 6
6,055,199 UART: [ldev] SUBJECT.KEYID = 5
6,056,414 UART: [ldev] AUTHORITY.KEYID = 7
6,057,648 UART: [ldev] FE.KEYID = 1
6,099,657 UART: [ldev] Erasing FE.KEYID = 1
8,604,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,855 UART: [ldev] --
10,409,252 UART: [fwproc] Wait for Commands...
10,410,965 UART: [fwproc] Recv command 0x46574c44
10,413,059 UART: [fwproc] Recv'd Img size: 114168 bytes
13,811,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,878,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,947,785 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,264,923 >>> mbox cmd response: success
14,268,880 UART: [afmc] ++
14,269,473 UART: [afmc] CDI.KEYID = 6
14,270,359 UART: [afmc] SUBJECT.KEYID = 7
14,271,573 UART: [afmc] AUTHORITY.KEYID = 5
16,804,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,138 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,974 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,602,396 UART: [afmc] --
18,605,944 UART: [cold-reset] --
18,610,031 UART: [state] Locking Datavault
18,617,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,978 UART: [state] Locking ICCM
18,621,105 UART: [exit] Launching FMC @ 0x40000130
18,629,555 UART:
18,629,795 UART: Running Caliptra FMC ...
18,630,898 UART:
18,631,058 UART: [state] CFI Enabled
18,688,288 UART: [fht] FMC Alias Private Key: 7
20,452,249 UART: [art] Extend RT PCRs Done
20,453,467 UART: [art] Lock RT PCRs Done
20,455,275 UART: [art] Populate DV Done
20,460,432 UART: [fht] FMC Alias Private Key: 7
20,462,134 UART: [art] Derive CDI
20,462,870 UART: [art] Store in in slot 0x4
20,520,940 UART: [art] Derive Key Pair
20,521,980 UART: [art] Store priv key in slot 0x5
22,985,217 UART: [art] Derive Key Pair - Done
22,998,161 UART: [art] Signing Cert with AUTHO
22,999,470 UART: RITY.KEYID = 7
24,711,142 UART: [art] Erasing AUTHORITY.KEYID = 7
24,712,645 UART: [art] PUB.X = 2C4E25868067EB632CBA561CC1E571F393D253C7C0BC939872522326078CA9379959569BC5211A1FD3F200C740D0A92C
24,719,903 UART: [art] PUB.Y = 8ED2C4D4823AFB60878F107BD5A08F1BDC6F678ED08C6FCD5C75CF3434E2974114D729DE7D291172C81DB5671C29F76C
24,727,136 UART: [art] SIG.R = 466F9C2527E5FA3B962004915FAA2253DB92DEFA3933E0980FD8859B273673009EE5F41BA176CFF7FA98E96B39657FAC
24,734,515 UART: [art] SIG.S = C08476DD3CB47574B3AC82FFEE3DBFB9D1AA62136C64B8C124AC0DA88FA64C823645ECCE598696D96C36BF687C9336B9
25,713,299 UART: Caliptra RT
25,714,011 UART: [state] CFI Enabled
25,879,301 UART: [rt] RT listening for mailbox commands...
25,881,211 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,912,000 UART: [rt]cmd =0x52564348, len=36
25,913,891 >>> mbox cmd response: failed
25,914,194 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,944,350 UART: [rt]cmd =0x52564348, len=36
25,945,945 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,379,053 ready_for_fw is high
3,379,447 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,090,636 >>> mbox cmd response: success
18,387,315 UART:
18,387,723 UART: Running Caliptra FMC ...
18,388,868 UART:
18,389,035 UART: [state] CFI Enabled
18,452,229 UART: [fht] FMC Alias Private Key: 7
20,216,289 UART: [art] Extend RT PCRs Done
20,217,515 UART: [art] Lock RT PCRs Done
20,219,225 UART: [art] Populate DV Done
20,224,775 UART: [fht] FMC Alias Private Key: 7
20,226,317 UART: [art] Derive CDI
20,227,088 UART: [art] Store in in slot 0x4
20,284,999 UART: [art] Derive Key Pair
20,285,994 UART: [art] Store priv key in slot 0x5
22,749,092 UART: [art] Derive Key Pair - Done
22,762,152 UART: [art] Signing Cert with AUTHO
22,763,458 UART: RITY.KEYID = 7
24,473,968 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,480 UART: [art] PUB.X = 6BD331954DDDE6D3989A72881F0C573F1A107C10AB4AC8E18FEDA80DB058DCC87E532EE1D90A1C2862A2F58F0A2C2990
24,482,773 UART: [art] PUB.Y = 13F958A20F05B3693A41E4957F2C75005ED733FE6A4C7D72371344471383E51AF21C8D0AECD013C33264329B53F20C56
24,489,965 UART: [art] SIG.R = 146D4891E4AE9DB480FD1B2F9A9DE496AAF9A85B88009D8303BFEE83596215B3C73A1E1A66CECF062C99204BAAC40C3F
24,497,346 UART: [art] SIG.S = BB696E7126D25F61FD8673CF71C2F2DBB6333821956C2B5B6975EAA87575E2BCF0B11D12FA7543CCA6FB635C916B35D8
25,475,963 UART: Caliptra RT
25,476,663 UART: [state] CFI Enabled
25,642,091 UART: [rt] RT listening for mailbox commands...
25,643,974 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,674,670 UART: [rt]cmd =0x52564348, len=36
25,676,531 >>> mbox cmd response: failed
25,676,839 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,706,738 UART: [rt]cmd =0x52564348, len=36
25,708,493 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
192,853 UART:
193,223 UART: Running Caliptra ROM ...
194,357 UART:
603,816 UART: [state] CFI Enabled
618,122 UART: [state] LifecycleState = Unprovisioned
620,003 UART: [state] DebugLocked = No
621,967 UART: [state] WD Timer not started. Device not locked for debugging
626,169 UART: [kat] SHA2-256
805,285 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,867 UART: [kat] ++
817,402 UART: [kat] sha1
828,351 UART: [kat] SHA2-256
831,434 UART: [kat] SHA2-384
838,343 UART: [kat] SHA2-512-ACC
841,304 UART: [kat] ECC-384
3,285,702 UART: [kat] HMAC-384Kdf
3,299,850 UART: [kat] LMS
3,829,356 UART: [kat] --
3,833,233 UART: [cold-reset] ++
3,835,308 UART: [fht] FHT @ 0x50003400
3,847,493 UART: [idev] ++
3,848,060 UART: [idev] CDI.KEYID = 6
3,848,945 UART: [idev] SUBJECT.KEYID = 7
3,850,212 UART: [idev] UDS.KEYID = 0
3,851,119 ready_for_fw is high
3,851,312 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,994,712 UART: [idev] Erasing UDS.KEYID = 0
6,317,491 UART: [idev] Sha1 KeyId Algorithm
6,340,566 UART: [idev] --
6,345,103 UART: [ldev] ++
6,345,672 UART: [ldev] CDI.KEYID = 6
6,346,560 UART: [ldev] SUBJECT.KEYID = 5
6,347,772 UART: [ldev] AUTHORITY.KEYID = 7
6,349,006 UART: [ldev] FE.KEYID = 1
6,360,736 UART: [ldev] Erasing FE.KEYID = 1
8,837,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,559 UART: [ldev] --
10,631,663 UART: [fwproc] Wait for Commands...
10,634,237 UART: [fwproc] Recv command 0x46574c44
10,636,325 UART: [fwproc] Recv'd Img size: 114168 bytes
14,038,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,348 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,497,053 >>> mbox cmd response: success
14,501,743 UART: [afmc] ++
14,502,341 UART: [afmc] CDI.KEYID = 6
14,503,226 UART: [afmc] SUBJECT.KEYID = 7
14,504,387 UART: [afmc] AUTHORITY.KEYID = 5
17,001,975 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,706 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,506 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,404 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,632 UART: [afmc] --
18,795,583 UART: [cold-reset] --
18,800,418 UART: [state] Locking Datavault
18,804,044 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,689 UART: [state] Locking ICCM
18,807,435 UART: [exit] Launching FMC @ 0x40000130
18,815,880 UART:
18,816,121 UART: Running Caliptra FMC ...
18,817,153 UART:
18,817,303 UART: [state] CFI Enabled
18,825,568 UART: [fht] FMC Alias Private Key: 7
20,582,301 UART: [art] Extend RT PCRs Done
20,583,527 UART: [art] Lock RT PCRs Done
20,585,364 UART: [art] Populate DV Done
20,590,779 UART: [fht] FMC Alias Private Key: 7
20,592,420 UART: [art] Derive CDI
20,593,156 UART: [art] Store in in slot 0x4
20,635,806 UART: [art] Derive Key Pair
20,636,845 UART: [art] Store priv key in slot 0x5
23,063,638 UART: [art] Derive Key Pair - Done
23,076,698 UART: [art] Signing Cert with AUTHO
23,078,006 UART: RITY.KEYID = 7
24,783,694 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,201 UART: [art] PUB.X = EA22FF39DD9C6D665F249744D3B3C38F6E6E8D2F3A40E6608B264450FD38465CB583218B1A80B4731F6F7C30498DF488
24,792,471 UART: [art] PUB.Y = A7601D6FC9DA6CE75065B74E7A01A4D655BFBE6C6116391F463D4E6E2474771028DC2BF46140CDE80156E01626EF51EB
24,799,720 UART: [art] SIG.R = 38ED3885CAA499D0B112221B55A8760D209606478E8A26364CEAAE86D1A678F208A681AD43F8A51CC078B6FA45453A0C
24,807,123 UART: [art] SIG.S = 0E3515B205528D8FABF9A425A9A706B8EDB07DB66CA1D5744DF72DC6B173DBC24D24054EF6E59D76DF7017D7A040FD2D
25,785,732 UART: Caliptra RT
25,786,435 UART: [state] CFI Enabled
25,902,987 UART: [rt] RT listening for mailbox commands...
25,904,874 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,935,646 UART: [rt]cmd =0x52564348, len=36
25,937,515 >>> mbox cmd response: failed
25,937,809 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,967,665 UART: [rt]cmd =0x52564348, len=36
25,969,618 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,747 writing to cptra_bootfsm_go
3,694,055 ready_for_fw is high
3,694,661 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,256 >>> mbox cmd response: success
18,519,849 UART:
18,520,247 UART: Running Caliptra FMC ...
18,521,445 UART:
18,521,617 UART: [state] CFI Enabled
18,529,402 UART: [fht] FMC Alias Private Key: 7
20,285,931 UART: [art] Extend RT PCRs Done
20,287,152 UART: [art] Lock RT PCRs Done
20,289,110 UART: [art] Populate DV Done
20,294,422 UART: [fht] FMC Alias Private Key: 7
20,296,070 UART: [art] Derive CDI
20,296,895 UART: [art] Store in in slot 0x4
20,339,226 UART: [art] Derive Key Pair
20,340,236 UART: [art] Store priv key in slot 0x5
22,766,857 UART: [art] Derive Key Pair - Done
22,779,697 UART: [art] Signing Cert with AUTHO
22,781,029 UART: RITY.KEYID = 7
24,486,786 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,290 UART: [art] PUB.X = 2CA306D90436D1D8A08B0B0E62694261560B7D4F86C5C1C9BF6A983BBEC93256897CD53D2AC6B80EDD8C755E42EE3615
24,495,596 UART: [art] PUB.Y = 820AD55302A59EE1B1BCB87EAC28A76E1F656261B184245C025CA0633EA95509E9F49393C7E94D1DD5577490170BDF8E
24,502,852 UART: [art] SIG.R = FDCE8AAD3790799C8247C7E81D1AC2EF4D689447A1B28B12B13DCF36DB838D9D5A54CB777EDD06376660A844AC0107E4
24,510,251 UART: [art] SIG.S = 37BBBDC713E2E6DA214AF6E24E8FB08FBB72E90B9F3C32D4BCD5D78628FC042C5A9EFA41A11E03B444344DB24D266DAF
25,488,813 UART: Caliptra RT
25,489,529 UART: [state] CFI Enabled
25,606,064 UART: [rt] RT listening for mailbox commands...
25,607,947 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,638,780 UART: [rt]cmd =0x52564348, len=36
25,640,740 >>> mbox cmd response: failed
25,641,037 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,670,778 UART: [rt]cmd =0x52564348, len=36
25,672,694 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
191,993 UART:
192,360 UART: Running Caliptra ROM ...
193,561 UART:
193,723 UART: [state] CFI Enabled
261,300 UART: [state] LifecycleState = Unprovisioned
263,672 UART: [state] DebugLocked = No
265,713 UART: [state] WD Timer not started. Device not locked for debugging
270,899 UART: [kat] SHA2-256
460,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,540 UART: [kat] ++
471,991 UART: [kat] sha1
483,717 UART: [kat] SHA2-256
486,720 UART: [kat] SHA2-384
492,639 UART: [kat] SHA2-512-ACC
495,228 UART: [kat] ECC-384
2,950,500 UART: [kat] HMAC-384Kdf
2,972,923 UART: [kat] LMS
3,504,700 UART: [kat] --
3,508,361 UART: [cold-reset] ++
3,510,581 UART: [fht] FHT @ 0x50003400
3,522,414 UART: [idev] ++
3,523,120 UART: [idev] CDI.KEYID = 6
3,524,051 UART: [idev] SUBJECT.KEYID = 7
3,525,230 UART: [idev] UDS.KEYID = 0
3,526,156 ready_for_fw is high
3,526,375 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,082 UART: [idev] Erasing UDS.KEYID = 0
6,031,735 UART: [idev] Sha1 KeyId Algorithm
6,053,514 UART: [idev] --
6,057,463 UART: [ldev] ++
6,058,151 UART: [ldev] CDI.KEYID = 6
6,059,084 UART: [ldev] SUBJECT.KEYID = 5
6,060,248 UART: [ldev] AUTHORITY.KEYID = 7
6,061,485 UART: [ldev] FE.KEYID = 1
6,102,491 UART: [ldev] Erasing FE.KEYID = 1
8,605,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,998 UART: [ldev] --
10,416,752 UART: [fwproc] Wait for Commands...
10,418,198 UART: [fwproc] Recv command 0x46574c44
10,420,452 UART: [fwproc] Recv'd Img size: 114168 bytes
13,868,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,602,044 >>> mbox cmd response: success
14,605,358 UART: [afmc] ++
14,606,077 UART: [afmc] CDI.KEYID = 6
14,607,282 UART: [afmc] SUBJECT.KEYID = 7
14,608,725 UART: [afmc] AUTHORITY.KEYID = 5
17,144,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,888,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,890,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,905,407 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,920,565 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,935,596 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,958,923 UART: [afmc] --
18,962,093 UART: [cold-reset] --
18,966,621 UART: [state] Locking Datavault
18,972,331 UART: [state] Locking PCR0, PCR1 and PCR31
18,974,495 UART: [state] Locking ICCM
18,976,194 UART: [exit] Launching FMC @ 0x40000130
18,984,842 UART:
18,985,116 UART: Running Caliptra FMC ...
18,986,150 UART:
18,986,298 UART: [state] CFI Enabled
19,044,493 UART: [fht] FMC Alias Private Key: 7
20,808,082 UART: [art] Extend RT PCRs Done
20,809,307 UART: [art] Lock RT PCRs Done
20,811,015 UART: [art] Populate DV Done
20,816,332 UART: [fht] FMC Alias Private Key: 7
20,817,929 UART: [art] Derive CDI
20,818,746 UART: [art] Store in in slot 0x4
20,876,756 UART: [art] Derive Key Pair
20,877,791 UART: [art] Store priv key in slot 0x5
23,340,171 UART: [art] Derive Key Pair - Done
23,353,063 UART: [art] Signing Cert with AUTHO
23,354,388 UART: RITY.KEYID = 7
25,066,161 UART: [art] Erasing AUTHORITY.KEYID = 7
25,067,703 UART: [art] PUB.X = D7F52A0F8205473F4185E1E166E055C07C716A6BE174FDF56F6810FFCE2ADB7AC54D55326E96A6A70410D7F7AA9F144D
25,074,970 UART: [art] PUB.Y = A027826A3252096E8EC56292E37A869D5F2AF5E5776C59CB5523D4F75EC51A2A7585709AAD6F1F455ED768E6F025DA5B
25,082,238 UART: [art] SIG.R = 96DFCAED23774E7892CDA6FA8F60EEED5EC1D44C7533D4E56051E4CBB7EF894587F70A310FB6FDDC0B4D6DFF1CA24753
25,089,625 UART: [art] SIG.S = ACB3E35E9695A30151900311A8ECDF19980A19DB78E926CB996EDBD8651D65D966E1FBB36EFDC9D3A812FD3EEA9A301C
26,068,403 UART: Caliptra RT
26,069,124 UART: [state] CFI Enabled
26,233,121 UART: [rt] RT listening for mailbox commands...
26,235,012 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,265,713 UART: [rt]cmd =0x52564348, len=36
26,267,451 >>> mbox cmd response: failed
26,267,754 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,297,925 UART: [rt]cmd =0x52564348, len=36
26,299,678 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,441,725 ready_for_fw is high
3,442,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,705,543 >>> mbox cmd response: success
19,028,708 UART:
19,029,143 UART: Running Caliptra FMC ...
19,030,259 UART:
19,030,416 UART: [state] CFI Enabled
19,092,406 UART: [fht] FMC Alias Private Key: 7
20,856,300 UART: [art] Extend RT PCRs Done
20,857,525 UART: [art] Lock RT PCRs Done
20,859,140 UART: [art] Populate DV Done
20,864,773 UART: [fht] FMC Alias Private Key: 7
20,866,269 UART: [art] Derive CDI
20,867,036 UART: [art] Store in in slot 0x4
20,924,835 UART: [art] Derive Key Pair
20,925,876 UART: [art] Store priv key in slot 0x5
23,388,682 UART: [art] Derive Key Pair - Done
23,401,994 UART: [art] Signing Cert with AUTHO
23,403,332 UART: RITY.KEYID = 7
25,114,903 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,420 UART: [art] PUB.X = CF90565D2CE38C0C48E7B0FB89B615A8D0174F95FE91D5726DBB1075607440784E76203F86FE1DA53027E9E5B78762C7
25,123,658 UART: [art] PUB.Y = DE45F68A706D4C4FCF4A7D847ABF9C3D8D3A86AC38F4885373546EDBA03A9939296C58C769770EC6FD3A4F0A3458F565
25,130,914 UART: [art] SIG.R = 259322C8851745FC4B98FB65D6EB1F04BB2C41AA31B87ACEC1C3EFF5B9BBC76916BDC8EEC6635245A7D3315BD15C4D17
25,138,295 UART: [art] SIG.S = 02A5D25B14D22B2DCFD2C0D21592FF94DD2371DE21B518E0C6069353AA8F4EA5EC2A0AD93973941120ED277C1BB2F3A3
26,116,791 UART: Caliptra RT
26,117,480 UART: [state] CFI Enabled
26,281,418 UART: [rt] RT listening for mailbox commands...
26,283,313 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,314,068 UART: [rt]cmd =0x52564348, len=36
26,316,136 >>> mbox cmd response: failed
26,316,479 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,346,600 UART: [rt]cmd =0x52564348, len=36
26,348,136 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,397 writing to cptra_bootfsm_go
194,695 UART:
195,063 UART: Running Caliptra ROM ...
196,263 UART:
605,926 UART: [state] CFI Enabled
616,539 UART: [state] LifecycleState = Unprovisioned
618,549 UART: [state] DebugLocked = No
620,073 UART: [state] WD Timer not started. Device not locked for debugging
623,403 UART: [kat] SHA2-256
813,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,001 UART: [kat] ++
824,622 UART: [kat] sha1
836,568 UART: [kat] SHA2-256
839,653 UART: [kat] SHA2-384
846,066 UART: [kat] SHA2-512-ACC
848,648 UART: [kat] ECC-384
3,292,283 UART: [kat] HMAC-384Kdf
3,305,697 UART: [kat] LMS
3,837,510 UART: [kat] --
3,840,615 UART: [cold-reset] ++
3,842,291 UART: [fht] FHT @ 0x50003400
3,854,804 UART: [idev] ++
3,855,525 UART: [idev] CDI.KEYID = 6
3,856,412 UART: [idev] SUBJECT.KEYID = 7
3,857,655 UART: [idev] UDS.KEYID = 0
3,858,923 ready_for_fw is high
3,859,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,609 UART: [idev] Erasing UDS.KEYID = 0
6,335,099 UART: [idev] Sha1 KeyId Algorithm
6,357,080 UART: [idev] --
6,361,392 UART: [ldev] ++
6,362,125 UART: [ldev] CDI.KEYID = 6
6,363,011 UART: [ldev] SUBJECT.KEYID = 5
6,364,221 UART: [ldev] AUTHORITY.KEYID = 7
6,365,395 UART: [ldev] FE.KEYID = 1
6,375,859 UART: [ldev] Erasing FE.KEYID = 1
8,854,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,841 UART: [ldev] --
10,646,836 UART: [fwproc] Wait for Commands...
10,648,561 UART: [fwproc] Recv command 0x46574c44
10,650,877 UART: [fwproc] Recv'd Img size: 114168 bytes
14,093,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,735 >>> mbox cmd response: success
14,836,505 UART: [afmc] ++
14,837,209 UART: [afmc] CDI.KEYID = 6
14,838,371 UART: [afmc] SUBJECT.KEYID = 7
14,839,914 UART: [afmc] AUTHORITY.KEYID = 5
17,341,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,064,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,066,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,081,628 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,096,793 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,111,812 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,792 UART: [afmc] --
19,138,561 UART: [cold-reset] --
19,143,563 UART: [state] Locking Datavault
19,149,202 UART: [state] Locking PCR0, PCR1 and PCR31
19,151,396 UART: [state] Locking ICCM
19,154,253 UART: [exit] Launching FMC @ 0x40000130
19,162,929 UART:
19,163,163 UART: Running Caliptra FMC ...
19,164,267 UART:
19,164,426 UART: [state] CFI Enabled
19,172,470 UART: [fht] FMC Alias Private Key: 7
20,929,774 UART: [art] Extend RT PCRs Done
20,930,996 UART: [art] Lock RT PCRs Done
20,932,814 UART: [art] Populate DV Done
20,938,280 UART: [fht] FMC Alias Private Key: 7
20,939,783 UART: [art] Derive CDI
20,940,523 UART: [art] Store in in slot 0x4
20,983,444 UART: [art] Derive Key Pair
20,984,484 UART: [art] Store priv key in slot 0x5
23,411,315 UART: [art] Derive Key Pair - Done
23,424,255 UART: [art] Signing Cert with AUTHO
23,425,562 UART: RITY.KEYID = 7
25,131,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,832 UART: [art] PUB.X = B039FF4A004C6F5C53F07D121B5700FF8480BFB84735D1AEC9A953E187CF3DDD22C01CF726CECA3FF1FA9F77603BB328
25,140,134 UART: [art] PUB.Y = CFE45254F0D1E4179A4EDEE85DB231ED396357786DB9C26642846C46A15F8AFE47921C1F9587EA82D5A5E511680FC4E0
25,147,373 UART: [art] SIG.R = 76319E81564B451DD54313A2225E38F4F9CB8FC5950F91C151B59EC740711CBD6D6644C44E7E8181CF6E8D49606FF78C
25,154,767 UART: [art] SIG.S = 4322054E004DF47EC203ECA27F4D8912F525378270346EFBD88BD438393F4AE75C63C4F3B828FF2ED1FC2F6D2F1C87A7
26,133,984 UART: Caliptra RT
26,134,694 UART: [state] CFI Enabled
26,252,958 UART: [rt] RT listening for mailbox commands...
26,254,834 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,285,765 UART: [rt]cmd =0x52564348, len=36
26,287,591 >>> mbox cmd response: failed
26,287,890 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,317,901 UART: [rt]cmd =0x52564348, len=36
26,319,605 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
3,755,403 ready_for_fw is high
3,755,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,955,720 >>> mbox cmd response: success
19,210,506 UART:
19,210,913 UART: Running Caliptra FMC ...
19,212,049 UART:
19,212,216 UART: [state] CFI Enabled
19,220,060 UART: [fht] FMC Alias Private Key: 7
20,977,614 UART: [art] Extend RT PCRs Done
20,978,832 UART: [art] Lock RT PCRs Done
20,980,674 UART: [art] Populate DV Done
20,986,307 UART: [fht] FMC Alias Private Key: 7
20,988,011 UART: [art] Derive CDI
20,988,784 UART: [art] Store in in slot 0x4
21,031,489 UART: [art] Derive Key Pair
21,032,495 UART: [art] Store priv key in slot 0x5
23,458,840 UART: [art] Derive Key Pair - Done
23,471,835 UART: [art] Signing Cert with AUTHO
23,473,141 UART: RITY.KEYID = 7
25,178,568 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,080 UART: [art] PUB.X = B30FF2C409A810C261F147A1C6BEE0A7D4C4F470952E0629FB54AA000015C5BA37E91803A67F0F289BE18C44B215BCF5
25,187,274 UART: [art] PUB.Y = 4AEC96DC7C80EE3EE846DDFC7722FA6E5D81BC3D0443AE93BB44488B02B15C7B1A4A4CFEB7F56457001FEB92788C5D73
25,194,571 UART: [art] SIG.R = 3CF2E8EA14769E9490946833DC4564448E6D604FF3F3A1D6161BB7E0B12FCCB73C672ADFE1D8C0711F45D810676D0EEF
25,201,963 UART: [art] SIG.S = 7D8102066300AE0585AFF1C3B77069EC70C6D24EBD26C9F12349187D19690791385A4207BA7B2BB970375C5CC1C95A5C
26,180,921 UART: Caliptra RT
26,181,609 UART: [state] CFI Enabled
26,298,769 UART: [rt] RT listening for mailbox commands...
26,300,642 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,331,413 UART: [rt]cmd =0x52564348, len=36
26,333,445 >>> mbox cmd response: failed
26,333,774 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,363,676 UART: [rt]cmd =0x52564348, len=36
26,365,440 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,343 UART: [kat] SHA2-256
882,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,389 UART: [kat] ++
886,541 UART: [kat] sha1
890,829 UART: [kat] SHA2-256
892,767 UART: [kat] SHA2-384
895,590 UART: [kat] SHA2-512-ACC
897,491 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,622 UART: [kat] LMS
1,475,818 UART: [kat] --
1,476,389 UART: [cold-reset] ++
1,476,733 UART: [fht] Storing FHT @ 0x50003400
1,479,658 UART: [idev] ++
1,479,826 UART: [idev] CDI.KEYID = 6
1,480,186 UART: [idev] SUBJECT.KEYID = 7
1,480,610 UART: [idev] UDS.KEYID = 0
1,480,955 ready_for_fw is high
1,480,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,802 UART: [idev] Erasing UDS.KEYID = 0
1,505,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,024 UART: [idev] --
1,515,049 UART: [ldev] ++
1,515,217 UART: [ldev] CDI.KEYID = 6
1,515,580 UART: [ldev] SUBJECT.KEYID = 5
1,516,006 UART: [ldev] AUTHORITY.KEYID = 7
1,516,469 UART: [ldev] FE.KEYID = 1
1,521,239 UART: [ldev] Erasing FE.KEYID = 1
1,546,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,408 UART: [ldev] --
1,585,759 UART: [fwproc] Waiting for Commands...
1,586,516 UART: [fwproc] Received command 0x46574c44
1,587,307 UART: [fwproc] Received Image of size 114168 bytes
2,884,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,615 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,462 >>> mbox cmd response: success
3,078,662 UART: [afmc] ++
3,078,830 UART: [afmc] CDI.KEYID = 6
3,079,192 UART: [afmc] SUBJECT.KEYID = 7
3,079,617 UART: [afmc] AUTHORITY.KEYID = 5
3,114,580 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,710 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,438 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,323 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,013 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,954 UART: [afmc] --
3,157,882 UART: [cold-reset] --
3,158,808 UART: [state] Locking Datavault
3,160,041 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,645 UART: [state] Locking ICCM
3,161,121 UART: [exit] Launching FMC @ 0x40000130
3,166,450 UART:
3,166,466 UART: Running Caliptra FMC ...
3,166,874 UART:
3,166,928 UART: [state] CFI Enabled
3,177,297 UART: [fht] FMC Alias Private Key: 7
3,285,682 UART: [art] Extend RT PCRs Done
3,286,110 UART: [art] Lock RT PCRs Done
3,287,686 UART: [art] Populate DV Done
3,295,839 UART: [fht] FMC Alias Private Key: 7
3,296,971 UART: [art] Derive CDI
3,297,251 UART: [art] Store in in slot 0x4
3,382,708 UART: [art] Derive Key Pair
3,383,068 UART: [art] Store priv key in slot 0x5
3,396,172 UART: [art] Derive Key Pair - Done
3,411,227 UART: [art] Signing Cert with AUTHO
3,411,707 UART: RITY.KEYID = 7
3,427,221 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,986 UART: [art] PUB.X = 1620C5E1D7CFCCD4B74A90D1CE8128ECE0220E1EA73EAD18A4419426D9753F47798EDACE0563E5248954706D56546535
3,434,752 UART: [art] PUB.Y = C02673E408B7D1A351DF451C8801C5BCADB3636FCA5824EA6A4155158B2AB56F1F9B66336CCEEB1B176ACAD71F545D92
3,441,710 UART: [art] SIG.R = 6AC19108CE025ECE83B8BF35713BD6A53F13303AE5D49967741FDC7DF24AF2C2248605B60D9C197C1BA817DE8D0F91E1
3,448,475 UART: [art] SIG.S = 7BD972E9D2A92AAFB35A99DD500980FBD868B9F492BFE3F290AB834A4F967434BB52F554FFB7AC3067FA12B76BC36DD5
3,472,267 UART: Caliptra RT
3,472,520 UART: [state] CFI Enabled
3,580,846 UART: [rt] RT listening for mailbox commands...
3,581,516 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,610 UART: [rt]cmd =0x52564348, len=36
3,613,200 >>> mbox cmd response: failed
3,613,200 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,708 UART: [rt]cmd =0x52564348, len=36
3,644,124 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,119 ready_for_fw is high
1,363,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,316 >>> mbox cmd response: success
2,987,564 UART:
2,987,580 UART: Running Caliptra FMC ...
2,987,988 UART:
2,988,042 UART: [state] CFI Enabled
2,999,131 UART: [fht] FMC Alias Private Key: 7
3,107,478 UART: [art] Extend RT PCRs Done
3,107,906 UART: [art] Lock RT PCRs Done
3,109,596 UART: [art] Populate DV Done
3,117,889 UART: [fht] FMC Alias Private Key: 7
3,119,043 UART: [art] Derive CDI
3,119,323 UART: [art] Store in in slot 0x4
3,204,778 UART: [art] Derive Key Pair
3,205,138 UART: [art] Store priv key in slot 0x5
3,218,494 UART: [art] Derive Key Pair - Done
3,233,448 UART: [art] Signing Cert with AUTHO
3,233,928 UART: RITY.KEYID = 7
3,249,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,073 UART: [art] PUB.X = A6E7EF548296D9FACCE886CED48B07A663DD89F89E83A66F63752831FE796E6F22D3765A527D032F3A41DCA2A193F4AD
3,256,849 UART: [art] PUB.Y = 793E3E7AAE0F0D20A9AA8C51EE93E919646A129FBD394AD55BFE902D55683B436722217E8AA8F1872CD56228F3ACDB67
3,263,803 UART: [art] SIG.R = FF5DEF45DD5FAA39FC20F5FB1967E5F9F787BD8B7CF5BDEEF80D6E610AB1BE97F8EC2CDE77F76A4DEDA6BCC628A3125B
3,270,607 UART: [art] SIG.S = DC92B328C826F90672C0A87628E60FD7AB1069857AC2B6D31F658D42719D37AF451650F94C5E0396FE31E8FB30F8A123
3,294,373 UART: Caliptra RT
3,294,626 UART: [state] CFI Enabled
3,403,098 UART: [rt] RT listening for mailbox commands...
3,403,768 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,706 UART: [rt]cmd =0x52564348, len=36
3,435,300 >>> mbox cmd response: failed
3,435,300 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,752 UART: [rt]cmd =0x52564348, len=36
3,466,024 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,895 UART: [state] LifecycleState = Unprovisioned
85,550 UART: [state] DebugLocked = No
86,138 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,828 UART: [kat] SHA2-256
881,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,874 UART: [kat] ++
886,026 UART: [kat] sha1
890,212 UART: [kat] SHA2-256
892,150 UART: [kat] SHA2-384
895,017 UART: [kat] SHA2-512-ACC
896,918 UART: [kat] ECC-384
902,639 UART: [kat] HMAC-384Kdf
907,347 UART: [kat] LMS
1,475,543 UART: [kat] --
1,476,510 UART: [cold-reset] ++
1,476,974 UART: [fht] Storing FHT @ 0x50003400
1,479,811 UART: [idev] ++
1,479,979 UART: [idev] CDI.KEYID = 6
1,480,339 UART: [idev] SUBJECT.KEYID = 7
1,480,763 UART: [idev] UDS.KEYID = 0
1,481,108 ready_for_fw is high
1,481,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,711 UART: [idev] Erasing UDS.KEYID = 0
1,505,755 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,161 UART: [idev] --
1,515,374 UART: [ldev] ++
1,515,542 UART: [ldev] CDI.KEYID = 6
1,515,905 UART: [ldev] SUBJECT.KEYID = 5
1,516,331 UART: [ldev] AUTHORITY.KEYID = 7
1,516,794 UART: [ldev] FE.KEYID = 1
1,521,902 UART: [ldev] Erasing FE.KEYID = 1
1,547,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,163 UART: [ldev] --
1,586,496 UART: [fwproc] Waiting for Commands...
1,587,121 UART: [fwproc] Received command 0x46574c44
1,587,912 UART: [fwproc] Received Image of size 114168 bytes
2,883,700 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,676 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,621 >>> mbox cmd response: success
3,076,803 UART: [afmc] ++
3,076,971 UART: [afmc] CDI.KEYID = 6
3,077,333 UART: [afmc] SUBJECT.KEYID = 7
3,077,758 UART: [afmc] AUTHORITY.KEYID = 5
3,113,135 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,683 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,463 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,191 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,076 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,766 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,509 UART: [afmc] --
3,156,513 UART: [cold-reset] --
3,157,239 UART: [state] Locking Datavault
3,158,248 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,852 UART: [state] Locking ICCM
3,159,492 UART: [exit] Launching FMC @ 0x40000130
3,164,821 UART:
3,164,837 UART: Running Caliptra FMC ...
3,165,245 UART:
3,165,388 UART: [state] CFI Enabled
3,175,785 UART: [fht] FMC Alias Private Key: 7
3,283,814 UART: [art] Extend RT PCRs Done
3,284,242 UART: [art] Lock RT PCRs Done
3,286,020 UART: [art] Populate DV Done
3,294,277 UART: [fht] FMC Alias Private Key: 7
3,295,427 UART: [art] Derive CDI
3,295,707 UART: [art] Store in in slot 0x4
3,381,408 UART: [art] Derive Key Pair
3,381,768 UART: [art] Store priv key in slot 0x5
3,395,154 UART: [art] Derive Key Pair - Done
3,409,796 UART: [art] Signing Cert with AUTHO
3,410,276 UART: RITY.KEYID = 7
3,425,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,329 UART: [art] PUB.X = B07422EDC6E919F8C457EDBF9F9E16DFC80476100F20E976B826C4C7BFDEC280EF89AB4B383C16019F116979F9455C34
3,433,098 UART: [art] PUB.Y = 7B3BA0080F32DEA7404F53C20EC48BD67B1D6DC496DF78291DC1E71AAF33828871513C999A07C8B70AF2266887B8320E
3,440,034 UART: [art] SIG.R = E9A33B24EC3435341AC18B33D54FD30908D58274D552A02B0E4DDA18655D6C7DCFA1B60A4578FECBCFAB896FCAD7B7A5
3,446,812 UART: [art] SIG.S = 5010AE07F9C972FA642901D4574A6DE9419A32CA568504F9F1FA6CB8342CE2C56D31CB240070BE1F45333BA525279125
3,470,266 UART: Caliptra RT
3,470,611 UART: [state] CFI Enabled
3,578,872 UART: [rt] RT listening for mailbox commands...
3,579,542 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,562 UART: [rt]cmd =0x52564348, len=36
3,611,056 >>> mbox cmd response: failed
3,611,056 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,566 UART: [rt]cmd =0x52564348, len=36
3,641,850 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,610 ready_for_fw is high
1,363,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,035 >>> mbox cmd response: success
2,988,897 UART:
2,988,913 UART: Running Caliptra FMC ...
2,989,321 UART:
2,989,464 UART: [state] CFI Enabled
3,000,103 UART: [fht] FMC Alias Private Key: 7
3,107,770 UART: [art] Extend RT PCRs Done
3,108,198 UART: [art] Lock RT PCRs Done
3,109,708 UART: [art] Populate DV Done
3,117,711 UART: [fht] FMC Alias Private Key: 7
3,118,881 UART: [art] Derive CDI
3,119,161 UART: [art] Store in in slot 0x4
3,205,056 UART: [art] Derive Key Pair
3,205,416 UART: [art] Store priv key in slot 0x5
3,218,212 UART: [art] Derive Key Pair - Done
3,232,778 UART: [art] Signing Cert with AUTHO
3,233,258 UART: RITY.KEYID = 7
3,248,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,309 UART: [art] PUB.X = 1175992440F03855CD70826C2CD29C4FD9856810EA03F791B8DF48021A608C20FFA4CD11CF47AF2497F00D5699A1B0F7
3,256,070 UART: [art] PUB.Y = 04AE4CB06AEBF40EB1FC710312ECBDAE2AD4B624E4EA11E5B1F12815BDE5EEEB14AD0201F2D8281BE31BB50D2E590A9C
3,263,029 UART: [art] SIG.R = 0D0A4A8812A0AB63100112E609897C4DB01A703C15029BBBDD0AEB28E46E2BE3569BBE6DC50CE1FA80BBA5ACB8877B80
3,269,796 UART: [art] SIG.S = 426F48772DD5486726C5DBFAB8F9BF8E2ED39B99BDC642FFCDDE3E42388B5D59AE879ABE75A463A7BDBEA6E52751FDD6
3,293,451 UART: Caliptra RT
3,293,796 UART: [state] CFI Enabled
3,401,008 UART: [rt] RT listening for mailbox commands...
3,401,678 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,750 UART: [rt]cmd =0x52564348, len=36
3,433,170 >>> mbox cmd response: failed
3,433,170 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,462,904 UART: [rt]cmd =0x52564348, len=36
3,464,338 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
893,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,195 UART: [kat] ++
897,347 UART: [kat] sha1
901,651 UART: [kat] SHA2-256
903,591 UART: [kat] SHA2-384
906,400 UART: [kat] SHA2-512-ACC
908,301 UART: [kat] ECC-384
917,836 UART: [kat] HMAC-384Kdf
922,508 UART: [kat] LMS
1,170,836 UART: [kat] --
1,171,619 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,910 UART: [idev] ++
1,175,078 UART: [idev] CDI.KEYID = 6
1,175,438 UART: [idev] SUBJECT.KEYID = 7
1,175,862 UART: [idev] UDS.KEYID = 0
1,176,207 ready_for_fw is high
1,176,207 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,016 UART: [idev] Erasing UDS.KEYID = 0
1,200,683 UART: [idev] Sha1 KeyId Algorithm
1,209,277 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,808 UART: [ldev] SUBJECT.KEYID = 5
1,211,234 UART: [ldev] AUTHORITY.KEYID = 7
1,211,697 UART: [ldev] FE.KEYID = 1
1,216,955 UART: [ldev] Erasing FE.KEYID = 1
1,243,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,337 UART: [ldev] --
1,282,786 UART: [fwproc] Wait for Commands...
1,283,540 UART: [fwproc] Recv command 0x46574c44
1,284,268 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,139 >>> mbox cmd response: success
2,774,221 UART: [afmc] ++
2,774,389 UART: [afmc] CDI.KEYID = 6
2,774,751 UART: [afmc] SUBJECT.KEYID = 7
2,775,176 UART: [afmc] AUTHORITY.KEYID = 5
2,810,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,874 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,235 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,954 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,752 UART: [afmc] --
2,853,816 UART: [cold-reset] --
2,854,720 UART: [state] Locking Datavault
2,856,013 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,617 UART: [state] Locking ICCM
2,857,147 UART: [exit] Launching FMC @ 0x40000130
2,862,476 UART:
2,862,492 UART: Running Caliptra FMC ...
2,862,900 UART:
2,862,954 UART: [state] CFI Enabled
2,873,511 UART: [fht] FMC Alias Private Key: 7
2,981,316 UART: [art] Extend RT PCRs Done
2,981,744 UART: [art] Lock RT PCRs Done
2,983,576 UART: [art] Populate DV Done
2,991,703 UART: [fht] FMC Alias Private Key: 7
2,992,681 UART: [art] Derive CDI
2,992,961 UART: [art] Store in in slot 0x4
3,078,730 UART: [art] Derive Key Pair
3,079,090 UART: [art] Store priv key in slot 0x5
3,092,662 UART: [art] Derive Key Pair - Done
3,107,685 UART: [art] Signing Cert with AUTHO
3,108,165 UART: RITY.KEYID = 7
3,123,653 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,418 UART: [art] PUB.X = 907213D11FED1E2B7D9382615CE77B9ED050CA47C69D863CC25B48A7E8DE5A6C76F4C7972F23EC204CD7022C81427F8C
3,131,193 UART: [art] PUB.Y = 6F9F14C5C99EF3A426E211DE4F8DD043EA6782486A24BF1556D07B7184C14379E94B47041D13E7F37F562E5784B0F22B
3,138,140 UART: [art] SIG.R = DE96E41D93715B6D1948AA474D408BD4421695F08A4B4EB217500966F2E7D009AB2FCCAD4C1C0AB13C8F86810A383E0D
3,144,903 UART: [art] SIG.S = 7B9258E6053D372B213BBD0C35F137E421F455036917765208BF107002EAEAA0D9F19707592B1565EC86637C04117A96
3,168,651 UART: Caliptra RT
3,168,904 UART: [state] CFI Enabled
3,276,551 UART: [rt] RT listening for mailbox commands...
3,277,221 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,077 UART: [rt]cmd =0x52564348, len=36
3,308,371 >>> mbox cmd response: failed
3,308,371 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,945 UART: [rt]cmd =0x52564348, len=36
3,339,375 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,069 ready_for_fw is high
1,060,069 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,172 >>> mbox cmd response: success
2,687,788 UART:
2,687,804 UART: Running Caliptra FMC ...
2,688,212 UART:
2,688,266 UART: [state] CFI Enabled
2,699,075 UART: [fht] FMC Alias Private Key: 7
2,806,470 UART: [art] Extend RT PCRs Done
2,806,898 UART: [art] Lock RT PCRs Done
2,808,224 UART: [art] Populate DV Done
2,816,489 UART: [fht] FMC Alias Private Key: 7
2,817,471 UART: [art] Derive CDI
2,817,751 UART: [art] Store in in slot 0x4
2,903,054 UART: [art] Derive Key Pair
2,903,414 UART: [art] Store priv key in slot 0x5
2,916,858 UART: [art] Derive Key Pair - Done
2,931,716 UART: [art] Signing Cert with AUTHO
2,932,196 UART: RITY.KEYID = 7
2,947,732 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,497 UART: [art] PUB.X = E5322D50A0F4E7A53DAB91EF4E706737FDA490BAF249C692C0754FF6FA0EC91148837B42EC27F4EAB15B0DA0288FC450
2,955,275 UART: [art] PUB.Y = E3A2FE4E29A0840951607F72EFBC4102BB47DFE597836F807467CAC64AB73846307A698404E11DC1ABFEB3C62B1FBEE7
2,962,228 UART: [art] SIG.R = 57A09462584A7A7D0A6A8F48F344CD77968079116E38A64ECC71EC3BA188D80CA48B55F66AF023B0718DAC92DA7730B6
2,968,996 UART: [art] SIG.S = B6F53FFEC33658E90453B8B43FAF6E4EE6BD1E0394E725FCB492642D134E56A84E0AEAFD3AC54889FD81A2DD56A7F0A3
2,992,930 UART: Caliptra RT
2,993,183 UART: [state] CFI Enabled
3,100,354 UART: [rt] RT listening for mailbox commands...
3,101,024 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,152 UART: [rt]cmd =0x52564348, len=36
3,132,472 >>> mbox cmd response: failed
3,132,472 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,150 UART: [rt]cmd =0x52564348, len=36
3,163,630 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,613 UART: [kat] SHA2-512-ACC
908,514 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,289 UART: [kat] LMS
1,171,617 UART: [kat] --
1,172,394 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,509 UART: [idev] ++
1,175,677 UART: [idev] CDI.KEYID = 6
1,176,037 UART: [idev] SUBJECT.KEYID = 7
1,176,461 UART: [idev] UDS.KEYID = 0
1,176,806 ready_for_fw is high
1,176,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,413 UART: [idev] Erasing UDS.KEYID = 0
1,201,508 UART: [idev] Sha1 KeyId Algorithm
1,210,116 UART: [idev] --
1,211,268 UART: [ldev] ++
1,211,436 UART: [ldev] CDI.KEYID = 6
1,211,799 UART: [ldev] SUBJECT.KEYID = 5
1,212,225 UART: [ldev] AUTHORITY.KEYID = 7
1,212,688 UART: [ldev] FE.KEYID = 1
1,218,082 UART: [ldev] Erasing FE.KEYID = 1
1,245,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,744 UART: [ldev] --
1,284,099 UART: [fwproc] Wait for Commands...
1,284,823 UART: [fwproc] Recv command 0x46574c44
1,285,551 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,372 >>> mbox cmd response: success
2,775,538 UART: [afmc] ++
2,775,706 UART: [afmc] CDI.KEYID = 6
2,776,068 UART: [afmc] SUBJECT.KEYID = 7
2,776,493 UART: [afmc] AUTHORITY.KEYID = 5
2,812,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,721 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,606 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,325 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,947 UART: [afmc] --
2,855,959 UART: [cold-reset] --
2,856,729 UART: [state] Locking Datavault
2,857,956 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,560 UART: [state] Locking ICCM
2,859,234 UART: [exit] Launching FMC @ 0x40000130
2,864,563 UART:
2,864,579 UART: Running Caliptra FMC ...
2,864,987 UART:
2,865,130 UART: [state] CFI Enabled
2,875,637 UART: [fht] FMC Alias Private Key: 7
2,983,810 UART: [art] Extend RT PCRs Done
2,984,238 UART: [art] Lock RT PCRs Done
2,985,382 UART: [art] Populate DV Done
2,993,595 UART: [fht] FMC Alias Private Key: 7
2,994,649 UART: [art] Derive CDI
2,994,929 UART: [art] Store in in slot 0x4
3,080,878 UART: [art] Derive Key Pair
3,081,238 UART: [art] Store priv key in slot 0x5
3,094,958 UART: [art] Derive Key Pair - Done
3,109,917 UART: [art] Signing Cert with AUTHO
3,110,397 UART: RITY.KEYID = 7
3,126,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,768 UART: [art] PUB.X = 653D3FB08646C2F7C82B8DB7C5ED9F8723187D6C32B5C2BAF86485FF37A5F2ACD085321426FFB241989E833EA83D4E95
3,133,546 UART: [art] PUB.Y = 947BE511477297D05523A6D57AE063AFCD6F69B1F1A8387EF5B2557859105554ED83FAB0E8D1B6F2E479A124C91C44C1
3,140,498 UART: [art] SIG.R = 7241EC9C793ED1DDC4E720807D97ED17FE78646A8CA3C6A81573FA91FB8DEAA5099F6DB868DC97B1B1DE0146CB13DFAC
3,147,284 UART: [art] SIG.S = 1B2D1FCDFF4B0EE1B31E13D14F41F76D8E8349468E3C3889DD678145685EFAC283623C3299FCD52703E4241744E9B4A5
3,171,439 UART: Caliptra RT
3,171,784 UART: [state] CFI Enabled
3,280,053 UART: [rt] RT listening for mailbox commands...
3,280,723 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,835 UART: [rt]cmd =0x52564348, len=36
3,311,999 >>> mbox cmd response: failed
3,311,999 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,573 UART: [rt]cmd =0x52564348, len=36
3,342,829 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,746 ready_for_fw is high
1,060,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,981 >>> mbox cmd response: success
2,688,379 UART:
2,688,395 UART: Running Caliptra FMC ...
2,688,803 UART:
2,688,946 UART: [state] CFI Enabled
2,699,731 UART: [fht] FMC Alias Private Key: 7
2,807,272 UART: [art] Extend RT PCRs Done
2,807,700 UART: [art] Lock RT PCRs Done
2,808,696 UART: [art] Populate DV Done
2,816,819 UART: [fht] FMC Alias Private Key: 7
2,817,943 UART: [art] Derive CDI
2,818,223 UART: [art] Store in in slot 0x4
2,904,030 UART: [art] Derive Key Pair
2,904,390 UART: [art] Store priv key in slot 0x5
2,917,194 UART: [art] Derive Key Pair - Done
2,931,953 UART: [art] Signing Cert with AUTHO
2,932,433 UART: RITY.KEYID = 7
2,947,681 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,446 UART: [art] PUB.X = EDED4FE1B95B889ADE6ABB8E039431EF50589F902276A8CED11EA294604394EA5705D295B912883F21166F8B3FFE1640
2,955,216 UART: [art] PUB.Y = 2BE60496B61CC6837198766B5B4359A54D49CE66453A14028F3837CEF04397C09C59E955383067974FC00D940F5BE769
2,962,142 UART: [art] SIG.R = 562288E916B2851FADD40840DDD0DC702D3BA5BB866655B50D42D16C363B5C620922F4BE7AAAC2FB20E15B73DB1A7693
2,968,913 UART: [art] SIG.S = 2D8DBFF7A22A59DF66497EAE3B8A38F0920005BAB9B33DEB22F83B6C37A0455993518B50EA583AD7F562F02BFD730CCD
2,992,308 UART: Caliptra RT
2,992,653 UART: [state] CFI Enabled
3,100,122 UART: [rt] RT listening for mailbox commands...
3,100,792 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,852 UART: [rt]cmd =0x52564348, len=36
3,132,446 >>> mbox cmd response: failed
3,132,446 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,161,966 UART: [rt]cmd =0x52564348, len=36
3,163,248 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,793 UART: [kat] SHA2-256
901,733 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,593 UART: [idev] ++
1,172,761 UART: [idev] CDI.KEYID = 6
1,173,122 UART: [idev] SUBJECT.KEYID = 7
1,173,547 UART: [idev] UDS.KEYID = 0
1,173,893 ready_for_fw is high
1,173,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,413 UART: [idev] Erasing UDS.KEYID = 0
1,198,251 UART: [idev] Sha1 KeyId Algorithm
1,207,235 UART: [idev] --
1,208,322 UART: [ldev] ++
1,208,490 UART: [ldev] CDI.KEYID = 6
1,208,854 UART: [ldev] SUBJECT.KEYID = 5
1,209,281 UART: [ldev] AUTHORITY.KEYID = 7
1,209,744 UART: [ldev] FE.KEYID = 1
1,214,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,094 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,075 UART: [fwproc] Recv command 0x46574c44
1,281,808 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,941 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,477 >>> mbox cmd response: success
2,769,550 UART: [afmc] ++
2,769,718 UART: [afmc] CDI.KEYID = 6
2,770,081 UART: [afmc] SUBJECT.KEYID = 7
2,770,507 UART: [afmc] AUTHORITY.KEYID = 5
2,805,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,585 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,304 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,847,901 UART: [afmc] --
2,848,801 UART: [cold-reset] --
2,849,731 UART: [state] Locking Datavault
2,850,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,596 UART: [state] Locking ICCM
2,852,076 UART: [exit] Launching FMC @ 0x40000130
2,857,405 UART:
2,857,421 UART: Running Caliptra FMC ...
2,857,829 UART:
2,857,883 UART: [state] CFI Enabled
2,868,272 UART: [fht] FMC Alias Private Key: 7
2,976,277 UART: [art] Extend RT PCRs Done
2,976,705 UART: [art] Lock RT PCRs Done
2,978,301 UART: [art] Populate DV Done
2,986,486 UART: [fht] FMC Alias Private Key: 7
2,987,608 UART: [art] Derive CDI
2,987,888 UART: [art] Store in in slot 0x4
3,073,719 UART: [art] Derive Key Pair
3,074,079 UART: [art] Store priv key in slot 0x5
3,086,917 UART: [art] Derive Key Pair - Done
3,101,525 UART: [art] Signing Cert with AUTHO
3,102,005 UART: RITY.KEYID = 7
3,117,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,830 UART: [art] PUB.X = 5EC0E1F0ABA5BB8C2A37359F60AE21A3F7AC6DCCA743FAE86D63000DE0989DFE9B900767C2740C874303FC640F395A87
3,124,577 UART: [art] PUB.Y = 1128821504DA3C23D3CA2342D0DBC80176314C9A282C3A9E2320A405C1A614E2A5AA354823701E0AFC09D35ACD1502B8
3,131,509 UART: [art] SIG.R = 614741E819517A4879EFDD464682540B9A63340226966DC6413B8925263FDB3E662F912DA6615C68DD057455765DF0FF
3,138,258 UART: [art] SIG.S = F9826070507812A73765648750A76E582AE36511E76A5486A9CF4C5D59050ED8A197FF7BA7B1D10D05F86C41D3009EFD
3,161,597 UART: Caliptra RT
3,161,850 UART: [state] CFI Enabled
3,270,533 UART: [rt] RT listening for mailbox commands...
3,271,203 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,300,899 UART: [rt]cmd =0x52564348, len=36
3,302,349 >>> mbox cmd response: failed
3,302,349 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,331,937 UART: [rt]cmd =0x52564348, len=36
3,333,319 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,160 ready_for_fw is high
1,056,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,878 >>> mbox cmd response: success
2,683,130 UART:
2,683,146 UART: Running Caliptra FMC ...
2,683,554 UART:
2,683,608 UART: [state] CFI Enabled
2,694,279 UART: [fht] FMC Alias Private Key: 7
2,802,872 UART: [art] Extend RT PCRs Done
2,803,300 UART: [art] Lock RT PCRs Done
2,804,780 UART: [art] Populate DV Done
2,812,981 UART: [fht] FMC Alias Private Key: 7
2,814,097 UART: [art] Derive CDI
2,814,377 UART: [art] Store in in slot 0x4
2,899,804 UART: [art] Derive Key Pair
2,900,164 UART: [art] Store priv key in slot 0x5
2,913,432 UART: [art] Derive Key Pair - Done
2,928,559 UART: [art] Signing Cert with AUTHO
2,929,039 UART: RITY.KEYID = 7
2,943,681 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,446 UART: [art] PUB.X = 6A11CF567ABF945AAF83D48514B25DBF21679E1481BE6AA1EB5A2CDF0BAA539872F7F44E9801A0D231711A762D8D4874
2,951,220 UART: [art] PUB.Y = D26791A3168AADC39FD61E341FFF17B073822CCD322434847E79BE915D568EA6120C6C0726F974821FA4839E476BEF2F
2,958,166 UART: [art] SIG.R = B45F575A808DD42680B270563CDBF95B955F2422952F56D0C6EB29A847F757D5514F580B04C537903CF40C5FBB8941D4
2,964,925 UART: [art] SIG.S = B4EE269AF612C02AA77438DA9E65E2862BA9D7FE7E1114D78DCBB4FD4F421B9F2C9FCF4C75433A62280FF55E072B271F
2,988,908 UART: Caliptra RT
2,989,161 UART: [state] CFI Enabled
3,096,913 UART: [rt] RT listening for mailbox commands...
3,097,583 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,835 UART: [rt]cmd =0x52564348, len=36
3,129,065 >>> mbox cmd response: failed
3,129,065 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,757 UART: [rt]cmd =0x52564348, len=36
3,160,273 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,630 UART: [kat] ++
895,782 UART: [kat] sha1
900,066 UART: [kat] SHA2-256
902,006 UART: [kat] SHA2-384
904,867 UART: [kat] SHA2-512-ACC
906,768 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,319 UART: [kat] LMS
1,169,631 UART: [kat] --
1,170,506 UART: [cold-reset] ++
1,170,970 UART: [fht] FHT @ 0x50003400
1,173,640 UART: [idev] ++
1,173,808 UART: [idev] CDI.KEYID = 6
1,174,169 UART: [idev] SUBJECT.KEYID = 7
1,174,594 UART: [idev] UDS.KEYID = 0
1,174,940 ready_for_fw is high
1,174,940 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,200,028 UART: [idev] Sha1 KeyId Algorithm
1,208,704 UART: [idev] --
1,209,659 UART: [ldev] ++
1,209,827 UART: [ldev] CDI.KEYID = 6
1,210,191 UART: [ldev] SUBJECT.KEYID = 5
1,210,618 UART: [ldev] AUTHORITY.KEYID = 7
1,211,081 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,227 UART: [ldev] --
1,281,741 UART: [fwproc] Wait for Commands...
1,282,498 UART: [fwproc] Recv command 0x46574c44
1,283,231 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,396 >>> mbox cmd response: success
2,772,477 UART: [afmc] ++
2,772,645 UART: [afmc] CDI.KEYID = 6
2,773,008 UART: [afmc] SUBJECT.KEYID = 7
2,773,434 UART: [afmc] AUTHORITY.KEYID = 5
2,808,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,534 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,263 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,146 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,865 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,634 UART: [afmc] --
2,852,718 UART: [cold-reset] --
2,853,366 UART: [state] Locking Datavault
2,854,615 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,219 UART: [state] Locking ICCM
2,855,639 UART: [exit] Launching FMC @ 0x40000130
2,860,968 UART:
2,860,984 UART: Running Caliptra FMC ...
2,861,392 UART:
2,861,535 UART: [state] CFI Enabled
2,872,230 UART: [fht] FMC Alias Private Key: 7
2,979,911 UART: [art] Extend RT PCRs Done
2,980,339 UART: [art] Lock RT PCRs Done
2,981,735 UART: [art] Populate DV Done
2,990,072 UART: [fht] FMC Alias Private Key: 7
2,991,048 UART: [art] Derive CDI
2,991,328 UART: [art] Store in in slot 0x4
3,076,603 UART: [art] Derive Key Pair
3,076,963 UART: [art] Store priv key in slot 0x5
3,089,941 UART: [art] Derive Key Pair - Done
3,105,044 UART: [art] Signing Cert with AUTHO
3,105,524 UART: RITY.KEYID = 7
3,120,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,101 UART: [art] PUB.X = FD37D7D05E2E44C3C4512D9C1222021DEF8C6B4E34D5DDD382934D631AE68EB8B052FC0C20060157DCFFF07BD8C9250E
3,127,870 UART: [art] PUB.Y = F225DFB88DF4E253E28AECFC316A52830446751320A14039A9541E1D6C80EF91FB64ADBF93AC54B1A0B889C967792F84
3,134,823 UART: [art] SIG.R = 629C70B64B068D95428E453A0CA396FC885EF5D9BF7F5F8A6993559893808CECAEC2CDAAC5191B4313A223CFDBFF8C10
3,141,601 UART: [art] SIG.S = 8963F38300BF0B80692420E0631543D3492AE89F8797663CE1B4FD7A0CFF9B08ACBFE18D04BA4B05483E366809151186
3,165,336 UART: Caliptra RT
3,165,681 UART: [state] CFI Enabled
3,273,448 UART: [rt] RT listening for mailbox commands...
3,274,118 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,230 UART: [rt]cmd =0x52564348, len=36
3,305,740 >>> mbox cmd response: failed
3,305,740 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,366 UART: [rt]cmd =0x52564348, len=36
3,336,978 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,933 ready_for_fw is high
1,055,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,168 >>> mbox cmd response: success
2,681,924 UART:
2,681,940 UART: Running Caliptra FMC ...
2,682,348 UART:
2,682,491 UART: [state] CFI Enabled
2,692,972 UART: [fht] FMC Alias Private Key: 7
2,801,307 UART: [art] Extend RT PCRs Done
2,801,735 UART: [art] Lock RT PCRs Done
2,803,213 UART: [art] Populate DV Done
2,811,664 UART: [fht] FMC Alias Private Key: 7
2,812,700 UART: [art] Derive CDI
2,812,980 UART: [art] Store in in slot 0x4
2,898,491 UART: [art] Derive Key Pair
2,898,851 UART: [art] Store priv key in slot 0x5
2,912,091 UART: [art] Derive Key Pair - Done
2,927,125 UART: [art] Signing Cert with AUTHO
2,927,605 UART: RITY.KEYID = 7
2,942,525 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,290 UART: [art] PUB.X = 15DDB1D6DBFA98B6F9048153B41755F4ECCCFC907B76F42C6559E14709BEABC7254D02F5E7B4DBC5F33E6C8EB5DC30AC
2,950,075 UART: [art] PUB.Y = 394F7E47CC98F5E8FE8FB78FD88D947E70B262B3C16161E6C19E9419F4644CC1E538F59508F4A647FAAD792B388C1B65
2,957,028 UART: [art] SIG.R = 87437A53ABFDCB2758CA342BAB24B95DF704A1F33140C1D97460DD7CBE3714DC7F56E7A90B143FFB0A443A45B9BFD5E1
2,963,807 UART: [art] SIG.S = 9EB1004E21A38AA5E34DA81B0B7722E8BECF5B140E8C346D03B080426E249BB38D40C4C4B68F7B4BA966D9EB867525CC
2,987,183 UART: Caliptra RT
2,987,528 UART: [state] CFI Enabled
3,095,800 UART: [rt] RT listening for mailbox commands...
3,096,470 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,378 UART: [rt]cmd =0x52564348, len=36
3,127,830 >>> mbox cmd response: failed
3,127,830 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,348 UART: [rt]cmd =0x52564348, len=36
3,158,880 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,058 UART:
192,433 UART: Running Caliptra ROM ...
193,618 UART:
193,764 UART: [state] CFI Enabled
265,949 UART: [state] LifecycleState = Unprovisioned
267,865 UART: [state] DebugLocked = No
269,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,974 UART: [kat] SHA2-256
443,667 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,202 UART: [kat] ++
454,651 UART: [kat] sha1
464,880 UART: [kat] SHA2-256
467,593 UART: [kat] SHA2-384
473,020 UART: [kat] SHA2-512-ACC
475,384 UART: [kat] ECC-384
2,769,447 UART: [kat] HMAC-384Kdf
2,801,255 UART: [kat] LMS
3,991,519 UART: [kat] --
3,994,319 UART: [cold-reset] ++
3,996,745 UART: [fht] Storing FHT @ 0x50003400
4,007,868 UART: [idev] ++
4,008,430 UART: [idev] CDI.KEYID = 6
4,009,458 UART: [idev] SUBJECT.KEYID = 7
4,010,626 UART: [idev] UDS.KEYID = 0
4,011,663 ready_for_fw is high
4,011,855 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,047 UART: [idev] Erasing UDS.KEYID = 0
7,347,980 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,918 UART: [idev] --
7,374,329 UART: [ldev] ++
7,374,897 UART: [ldev] CDI.KEYID = 6
7,375,850 UART: [ldev] SUBJECT.KEYID = 5
7,377,055 UART: [ldev] AUTHORITY.KEYID = 7
7,378,284 UART: [ldev] FE.KEYID = 1
7,422,618 UART: [ldev] Erasing FE.KEYID = 1
10,758,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,924 UART: [ldev] --
13,136,528 UART: [fwproc] Waiting for Commands...
13,139,040 UART: [fwproc] Received command 0x46574c44
13,141,217 UART: [fwproc] Received Image of size 113844 bytes
22,333,005 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,414,212 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,483,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,798,682 >>> mbox cmd response: success
22,802,219 UART: [afmc] ++
22,802,816 UART: [afmc] CDI.KEYID = 6
22,803,780 UART: [afmc] SUBJECT.KEYID = 7
22,804,988 UART: [afmc] AUTHORITY.KEYID = 5
26,167,512 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,467,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,469,512 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,484,071 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,498,816 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,513,028 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,535,065 UART: [afmc] --
28,538,221 UART: [cold-reset] --
28,542,999 UART: [state] Locking Datavault
28,547,667 UART: [state] Locking PCR0, PCR1 and PCR31
28,549,364 UART: [state] Locking ICCM
28,551,506 UART: [exit] Launching FMC @ 0x40000130
28,559,896 UART:
28,560,133 UART: Running Caliptra FMC ...
28,561,225 UART:
28,561,382 UART: [state] CFI Enabled
28,628,351 UART: [fht] FMC Alias Private Key: 7
30,966,396 UART: [art] Extend RT PCRs Done
30,967,623 UART: [art] Lock RT PCRs Done
30,969,219 UART: [art] Populate DV Done
30,974,569 UART: [fht] FMC Alias Private Key: 7
30,976,100 UART: [art] Derive CDI
30,976,905 UART: [art] Store in in slot 0x4
31,037,238 UART: [art] Derive Key Pair
31,038,271 UART: [art] Store priv key in slot 0x5
34,311,763 UART: [art] Derive Key Pair - Done
34,324,535 UART: [art] Signing Cert with AUTHO
34,325,849 UART: RITY.KEYID = 7
36,612,836 UART: [art] Erasing AUTHORITY.KEYID = 7
36,614,379 UART: [art] PUB.X = 4FD867245DC9FC9DE4DBC190594E6609FE6B27222954B619F914D15583EDCD9BA2A86C50702CEC5315EB69943B5BAE9E
36,621,601 UART: [art] PUB.Y = DC7B7CECDBA8730792C17288AE904187836AA4D1A47F10E328856A76FDF3BB16D1966933CC4190EE8480A0A92BEA6176
36,628,847 UART: [art] SIG.R = EC9E2FF32F7E564B92585C3A1B3FE5E2564418BEB5FF831DEE06EB1D6B1E3888386460C3AEEA56E050845039F7B85EA5
36,636,207 UART: [art] SIG.S = EDCA5AF0A3E47428060063CFA5AC5A995632096ADE6B0A2993C23AB368629423EEB8891ACE5C0C2FFFE220CFA393AFF8
37,941,670 UART: Caliptra RT
37,942,375 UART: [state] CFI Enabled
38,103,608 UART: [rt] RT listening for mailbox commands...
42,136,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,292,618 UART: [rt]cmd =0x41544d4e, len=14344
50,767,038 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,806,725 ready_for_fw is high
3,807,110 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,998,321 >>> mbox cmd response: success
27,683,460 UART:
27,683,906 UART: Running Caliptra FMC ...
27,685,015 UART:
27,685,171 UART: [state] CFI Enabled
27,754,957 UART: [fht] FMC Alias Private Key: 7
30,092,622 UART: [art] Extend RT PCRs Done
30,093,845 UART: [art] Lock RT PCRs Done
30,095,495 UART: [art] Populate DV Done
30,100,751 UART: [fht] FMC Alias Private Key: 7
30,102,506 UART: [art] Derive CDI
30,103,317 UART: [art] Store in in slot 0x4
30,163,823 UART: [art] Derive Key Pair
30,164,862 UART: [art] Store priv key in slot 0x5
33,457,680 UART: [art] Derive Key Pair - Done
33,470,730 UART: [art] Signing Cert with AUTHO
33,472,030 UART: RITY.KEYID = 7
35,760,112 UART: [art] Erasing AUTHORITY.KEYID = 7
35,761,624 UART: [art] PUB.X = 28AECED2535124547FE49797E08A21FD94332823B38F16313616182A2DECD0B707577E14EC317CAB471EE327094ED4EB
35,768,909 UART: [art] PUB.Y = F9B17D71EC438E38223F115FE664E61254978458EB8B01D3196AEC6F5388D7EA957686F88A34F071B76A71B9B988769F
35,776,086 UART: [art] SIG.R = 286FFB8966F8BB13C77CDF2754717DFC10BF2B07FA1FE2F79BE41C84D767B87D32F7214B01FB6FADB759E11E2B59AB33
35,783,501 UART: [art] SIG.S = 497608D492607BA824ABBA148BB937B79F711B38032771040AE8AF324DA9BB162DC7CEECEE8DA6DE869D62B6BD98865D
37,088,608 UART: Caliptra RT
37,089,323 UART: [state] CFI Enabled
37,250,989 UART: [rt] RT listening for mailbox commands...
41,280,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,435,930 UART: [rt]cmd =0x41544d4e, len=14344
49,961,860 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,775 writing to cptra_bootfsm_go
194,124 UART:
194,498 UART: Running Caliptra ROM ...
195,690 UART:
605,516 UART: [state] CFI Enabled
616,921 UART: [state] LifecycleState = Unprovisioned
618,795 UART: [state] DebugLocked = No
620,328 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,980 UART: [kat] SHA2-256
795,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,332 UART: [kat] ++
806,869 UART: [kat] sha1
818,462 UART: [kat] SHA2-256
821,183 UART: [kat] SHA2-384
825,391 UART: [kat] SHA2-512-ACC
827,766 UART: [kat] ECC-384
3,112,611 UART: [kat] HMAC-384Kdf
3,122,843 UART: [kat] LMS
4,313,023 UART: [kat] --
4,318,657 UART: [cold-reset] ++
4,320,444 UART: [fht] Storing FHT @ 0x50003400
4,332,150 UART: [idev] ++
4,332,757 UART: [idev] CDI.KEYID = 6
4,333,650 UART: [idev] SUBJECT.KEYID = 7
4,334,899 UART: [idev] UDS.KEYID = 0
4,335,929 ready_for_fw is high
4,336,141 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,066 UART: [idev] Erasing UDS.KEYID = 0
7,622,910 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,989 UART: [idev] --
7,648,094 UART: [ldev] ++
7,648,667 UART: [ldev] CDI.KEYID = 6
7,649,605 UART: [ldev] SUBJECT.KEYID = 5
7,650,873 UART: [ldev] AUTHORITY.KEYID = 7
7,652,053 UART: [ldev] FE.KEYID = 1
7,664,619 UART: [ldev] Erasing FE.KEYID = 1
10,957,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,071 UART: [ldev] --
13,319,392 UART: [fwproc] Waiting for Commands...
13,322,620 UART: [fwproc] Received command 0x46574c44
13,324,809 UART: [fwproc] Received Image of size 113844 bytes
22,269,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,348,893 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,417,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,734,651 >>> mbox cmd response: success
22,738,260 UART: [afmc] ++
22,738,877 UART: [afmc] CDI.KEYID = 6
22,739,765 UART: [afmc] SUBJECT.KEYID = 7
22,741,039 UART: [afmc] AUTHORITY.KEYID = 5
26,053,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,348,343 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,350,597 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,365,162 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,379,915 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,394,127 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,415,663 UART: [afmc] --
28,419,314 UART: [cold-reset] --
28,424,525 UART: [state] Locking Datavault
28,428,215 UART: [state] Locking PCR0, PCR1 and PCR31
28,429,970 UART: [state] Locking ICCM
28,432,180 UART: [exit] Launching FMC @ 0x40000130
28,440,575 UART:
28,440,830 UART: Running Caliptra FMC ...
28,441,935 UART:
28,442,097 UART: [state] CFI Enabled
28,450,532 UART: [fht] FMC Alias Private Key: 7
30,781,639 UART: [art] Extend RT PCRs Done
30,782,866 UART: [art] Lock RT PCRs Done
30,784,625 UART: [art] Populate DV Done
30,790,036 UART: [fht] FMC Alias Private Key: 7
30,791,711 UART: [art] Derive CDI
30,792,451 UART: [art] Store in in slot 0x4
30,834,929 UART: [art] Derive Key Pair
30,835,966 UART: [art] Store priv key in slot 0x5
34,078,144 UART: [art] Derive Key Pair - Done
34,091,192 UART: [art] Signing Cert with AUTHO
34,092,531 UART: RITY.KEYID = 7
36,371,915 UART: [art] Erasing AUTHORITY.KEYID = 7
36,373,440 UART: [art] PUB.X = F392DF993F0A0FFC708C0B201ABAFFE11A5AC6C0FF45BA579D9E707D2ED86C5A0266595871D6E89EB3DA9B7291F413D9
36,380,694 UART: [art] PUB.Y = 5B10F651D8E2EE0DBED903D111D00D1C88361532A1BDAC95BB594B8DB0A7E5D6A8C8B6B2C72FE220CCA2CF971B598B28
36,387,955 UART: [art] SIG.R = A3EC43BBEA37CDF643E31877DE4AE078ACD3876B46A93771E7E79ED55B0B082BC0E32B3A448B0785835ADEB50ABBA49E
36,395,357 UART: [art] SIG.S = 50C7B75341CD5EF0ECCFC72D926CB086AED9617A9B2E4F184F744005FB16E2D400611F9385F36A46862DD97975D4962E
37,700,218 UART: Caliptra RT
37,700,919 UART: [state] CFI Enabled
37,819,215 UART: [rt] RT listening for mailbox commands...
41,994,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,149,600 UART: [rt]cmd =0x41544d4e, len=14344
50,545,832 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
4,126,870 ready_for_fw is high
4,127,255 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,443,330 >>> mbox cmd response: success
28,082,674 UART:
28,083,103 UART: Running Caliptra FMC ...
28,084,243 UART:
28,084,414 UART: [state] CFI Enabled
28,092,377 UART: [fht] FMC Alias Private Key: 7
30,423,110 UART: [art] Extend RT PCRs Done
30,424,336 UART: [art] Lock RT PCRs Done
30,426,036 UART: [art] Populate DV Done
30,431,408 UART: [fht] FMC Alias Private Key: 7
30,433,005 UART: [art] Derive CDI
30,433,831 UART: [art] Store in in slot 0x4
30,476,433 UART: [art] Derive Key Pair
30,477,466 UART: [art] Store priv key in slot 0x5
33,720,565 UART: [art] Derive Key Pair - Done
33,733,713 UART: [art] Signing Cert with AUTHO
33,735,053 UART: RITY.KEYID = 7
36,014,431 UART: [art] Erasing AUTHORITY.KEYID = 7
36,015,936 UART: [art] PUB.X = 13B46380817BBF17895401194045E335B859E3623B447461CE1867904318F1E50EC58991EF445A859331D38546AE4B5F
36,023,153 UART: [art] PUB.Y = AC90EFDB34241AAA866F65247664146594B956BFB753D4AFB7929EAD2D885DD377591A77FCA5BFB630425A47963CD31E
36,030,403 UART: [art] SIG.R = BEA07CD18DCA720DF7C9D55427F172DF71F78ABBB5B945774299EB5A25AB015755B811B4A17618985BCAB90744FB7EC2
36,037,750 UART: [art] SIG.S = 342504EFDDA8FF658B273166A8EA3A7CE10C9429F710A621D4144A582739684C56376B7CCF14E0293E2A1B08AC6508A8
37,342,965 UART: Caliptra RT
37,343,687 UART: [state] CFI Enabled
37,460,653 UART: [rt] RT listening for mailbox commands...
41,635,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,791,514 UART: [rt]cmd =0x41544d4e, len=14344
50,161,030 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,098 UART:
192,469 UART: Running Caliptra ROM ...
193,688 UART:
193,863 UART: [state] CFI Enabled
264,320 UART: [state] LifecycleState = Unprovisioned
266,151 UART: [state] DebugLocked = No
268,105 UART: [state] WD Timer not started. Device not locked for debugging
271,647 UART: [kat] SHA2-256
450,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,347 UART: [kat] ++
462,892 UART: [kat] sha1
474,622 UART: [kat] SHA2-256
477,634 UART: [kat] SHA2-384
482,911 UART: [kat] SHA2-512-ACC
485,843 UART: [kat] ECC-384
2,940,929 UART: [kat] HMAC-384Kdf
2,963,074 UART: [kat] LMS
3,492,535 UART: [kat] --
3,497,680 UART: [cold-reset] ++
3,498,710 UART: [fht] FHT @ 0x50003400
3,509,817 UART: [idev] ++
3,510,392 UART: [idev] CDI.KEYID = 6
3,511,386 UART: [idev] SUBJECT.KEYID = 7
3,512,559 UART: [idev] UDS.KEYID = 0
3,513,485 ready_for_fw is high
3,513,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,657,409 UART: [idev] Erasing UDS.KEYID = 0
6,017,834 UART: [idev] Sha1 KeyId Algorithm
6,040,482 UART: [idev] --
6,044,861 UART: [ldev] ++
6,045,444 UART: [ldev] CDI.KEYID = 6
6,046,358 UART: [ldev] SUBJECT.KEYID = 5
6,047,520 UART: [ldev] AUTHORITY.KEYID = 7
6,048,809 UART: [ldev] FE.KEYID = 1
6,092,626 UART: [ldev] Erasing FE.KEYID = 1
8,596,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,973 UART: [ldev] --
10,406,590 UART: [fwproc] Wait for Commands...
10,408,201 UART: [fwproc] Recv command 0x46574c44
10,410,301 UART: [fwproc] Recv'd Img size: 114168 bytes
14,991,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,068,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,136,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,454,753 >>> mbox cmd response: success
15,458,946 UART: [afmc] ++
15,459,540 UART: [afmc] CDI.KEYID = 6
15,460,421 UART: [afmc] SUBJECT.KEYID = 7
15,461,654 UART: [afmc] AUTHORITY.KEYID = 5
17,993,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,716,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,718,575 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,734,543 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,750,529 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,766,283 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,789,236 UART: [afmc] --
19,793,153 UART: [cold-reset] --
19,797,715 UART: [state] Locking Datavault
19,804,478 UART: [state] Locking PCR0, PCR1 and PCR31
19,806,136 UART: [state] Locking ICCM
19,807,859 UART: [exit] Launching FMC @ 0x40000130
19,816,321 UART:
19,816,556 UART: Running Caliptra FMC ...
19,817,653 UART:
19,817,829 UART: [state] CFI Enabled
19,875,867 UART: [fht] FMC Alias Private Key: 7
21,639,720 UART: [art] Extend RT PCRs Done
21,640,936 UART: [art] Lock RT PCRs Done
21,642,701 UART: [art] Populate DV Done
21,647,954 UART: [fht] FMC Alias Private Key: 7
21,649,602 UART: [art] Derive CDI
21,650,342 UART: [art] Store in in slot 0x4
21,708,725 UART: [art] Derive Key Pair
21,709,759 UART: [art] Store priv key in slot 0x5
24,171,914 UART: [art] Derive Key Pair - Done
24,184,866 UART: [art] Signing Cert with AUTHO
24,186,178 UART: RITY.KEYID = 7
25,897,467 UART: [art] Erasing AUTHORITY.KEYID = 7
25,898,960 UART: [art] PUB.X = C75683A3CD0BB095D57C5D67D196AFECD898133BB60F542AC34ED897CD030A1363A95605D9656AFBC5E93C55CE1A54B2
25,906,293 UART: [art] PUB.Y = 09068619EF2522DAC2D7284C516C57FDA8354B0A79770F05645702452BB34BFE1250EED616B282536C711590D80FC31A
25,913,503 UART: [art] SIG.R = 928E78193A62289A177905E12A94A3A8BF68C6D349B75AC2D6A70D82332A14EB9D111205030D788AF56A60B2A29D5C4C
25,920,854 UART: [art] SIG.S = 10CA2A34745D43A8CBD00832E62C0B87BDAFF8331D6A20E77D310079DFE029A7AFCB9B80C6FB7F193AF6A8324780E7E5
26,900,328 UART: Caliptra RT
26,901,039 UART: [state] CFI Enabled
27,064,495 UART: [rt] RT listening for mailbox commands...
31,090,530 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,246,528 UART: [rt]cmd =0x41544d4e, len=14344
36,113,316 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,380,805 ready_for_fw is high
3,381,256 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,021,085 >>> mbox cmd response: success
19,300,084 UART:
19,300,481 UART: Running Caliptra FMC ...
19,301,598 UART:
19,301,765 UART: [state] CFI Enabled
19,370,394 UART: [fht] FMC Alias Private Key: 7
21,134,479 UART: [art] Extend RT PCRs Done
21,135,696 UART: [art] Lock RT PCRs Done
21,137,488 UART: [art] Populate DV Done
21,142,895 UART: [fht] FMC Alias Private Key: 7
21,144,603 UART: [art] Derive CDI
21,145,404 UART: [art] Store in in slot 0x4
21,203,754 UART: [art] Derive Key Pair
21,204,750 UART: [art] Store priv key in slot 0x5
23,667,827 UART: [art] Derive Key Pair - Done
23,680,613 UART: [art] Signing Cert with AUTHO
23,681,920 UART: RITY.KEYID = 7
25,393,838 UART: [art] Erasing AUTHORITY.KEYID = 7
25,395,345 UART: [art] PUB.X = 3B3B29DFF74E46B5BBC27AF992986ACD97A7E4F0A5ADD4E3128A92B2710E61AD5670C77CFB8A2F32A9041BD913291E9B
25,402,583 UART: [art] PUB.Y = DC6A018E09C8E0693FB7A1C8BF095068F6F29E71C167287E9DA200ACADE96AA20470D96BA12D8ED61EACD5CC3FA2D2E7
25,409,883 UART: [art] SIG.R = DDF23D444FD6DC983C554BD6D1634EEFE41C4564F7BE313B2A3BCE5D68B8B5FDC96DCFD152BE90845E902DB15A310783
25,417,262 UART: [art] SIG.S = AF3E317B95806A1AD5ABECD81AC9B0CB46D67793AF352CDB1A78B6CCEFA4C5ECB915DC1BD0B226FAB836103F4984053B
26,396,802 UART: Caliptra RT
26,397,494 UART: [state] CFI Enabled
26,561,629 UART: [rt] RT listening for mailbox commands...
30,586,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,742,111 UART: [rt]cmd =0x41544d4e, len=14344
35,597,214 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,770 writing to cptra_bootfsm_go
192,995 UART:
193,394 UART: Running Caliptra ROM ...
194,694 UART:
604,018 UART: [state] CFI Enabled
614,646 UART: [state] LifecycleState = Unprovisioned
616,554 UART: [state] DebugLocked = No
619,508 UART: [state] WD Timer not started. Device not locked for debugging
623,902 UART: [kat] SHA2-256
803,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,601 UART: [kat] ++
815,130 UART: [kat] sha1
825,866 UART: [kat] SHA2-256
828,871 UART: [kat] SHA2-384
834,715 UART: [kat] SHA2-512-ACC
837,658 UART: [kat] ECC-384
3,281,435 UART: [kat] HMAC-384Kdf
3,295,085 UART: [kat] LMS
3,824,567 UART: [kat] --
3,830,429 UART: [cold-reset] ++
3,831,794 UART: [fht] FHT @ 0x50003400
3,842,275 UART: [idev] ++
3,842,837 UART: [idev] CDI.KEYID = 6
3,843,863 UART: [idev] SUBJECT.KEYID = 7
3,844,968 UART: [idev] UDS.KEYID = 0
3,846,016 ready_for_fw is high
3,846,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,641 UART: [idev] Erasing UDS.KEYID = 0
6,316,732 UART: [idev] Sha1 KeyId Algorithm
6,340,331 UART: [idev] --
6,343,831 UART: [ldev] ++
6,344,397 UART: [ldev] CDI.KEYID = 6
6,345,330 UART: [ldev] SUBJECT.KEYID = 5
6,346,542 UART: [ldev] AUTHORITY.KEYID = 7
6,347,789 UART: [ldev] FE.KEYID = 1
6,356,387 UART: [ldev] Erasing FE.KEYID = 1
8,831,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,616 UART: [ldev] --
10,622,615 UART: [fwproc] Wait for Commands...
10,624,166 UART: [fwproc] Recv command 0x46574c44
10,626,257 UART: [fwproc] Recv'd Img size: 114168 bytes
15,215,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,296,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,364,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,682,145 >>> mbox cmd response: success
15,686,839 UART: [afmc] ++
15,687,454 UART: [afmc] CDI.KEYID = 6
15,688,371 UART: [afmc] SUBJECT.KEYID = 7
15,689,534 UART: [afmc] AUTHORITY.KEYID = 5
18,191,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,914,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,916,587 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,932,535 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,948,519 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,964,294 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,986,702 UART: [afmc] --
19,989,988 UART: [cold-reset] --
19,993,684 UART: [state] Locking Datavault
19,999,040 UART: [state] Locking PCR0, PCR1 and PCR31
20,000,685 UART: [state] Locking ICCM
20,003,410 UART: [exit] Launching FMC @ 0x40000130
20,011,867 UART:
20,012,124 UART: Running Caliptra FMC ...
20,013,151 UART:
20,013,302 UART: [state] CFI Enabled
20,021,515 UART: [fht] FMC Alias Private Key: 7
21,778,690 UART: [art] Extend RT PCRs Done
21,779,907 UART: [art] Lock RT PCRs Done
21,781,606 UART: [art] Populate DV Done
21,786,856 UART: [fht] FMC Alias Private Key: 7
21,788,400 UART: [art] Derive CDI
21,789,216 UART: [art] Store in in slot 0x4
21,831,322 UART: [art] Derive Key Pair
21,832,355 UART: [art] Store priv key in slot 0x5
24,258,917 UART: [art] Derive Key Pair - Done
24,271,686 UART: [art] Signing Cert with AUTHO
24,272,986 UART: RITY.KEYID = 7
25,978,537 UART: [art] Erasing AUTHORITY.KEYID = 7
25,980,060 UART: [art] PUB.X = 027DE032CCC1232ACA1F392709F628651F6C05E6C67F5B1269F35755D066907906788249B7583E3CA7A70D058EB929C7
25,987,271 UART: [art] PUB.Y = 633EFE1E4E67ABE83614363D2144EEDCA4141E4E7D63C8BEBC4A3C8281B1315BA9D1C1CBFECE7E9EC0FF5D531468686C
25,994,571 UART: [art] SIG.R = B8FED2C4C36EE1245CDA81A1311D6BE79BB88DC28F3BFA75684AB8548F65762867C545C780D9C186EEFFFF21A22E3779
26,001,975 UART: [art] SIG.S = 89D2C62A9CC9456A04DA6BB8CAFF6065D14DEA0D908F8646608E0D813A55A78C92FA11B6683A388D731697916EAB590C
26,980,983 UART: Caliptra RT
26,981,698 UART: [state] CFI Enabled
27,098,616 UART: [rt] RT listening for mailbox commands...
31,121,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,277,487 UART: [rt]cmd =0x41544d4e, len=14344
36,132,893 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,808 writing to cptra_bootfsm_go
3,687,340 ready_for_fw is high
3,687,726 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,224,581 >>> mbox cmd response: success
19,476,841 UART:
19,477,237 UART: Running Caliptra FMC ...
19,478,449 UART:
19,478,629 UART: [state] CFI Enabled
19,486,353 UART: [fht] FMC Alias Private Key: 7
21,243,712 UART: [art] Extend RT PCRs Done
21,244,940 UART: [art] Lock RT PCRs Done
21,246,736 UART: [art] Populate DV Done
21,251,932 UART: [fht] FMC Alias Private Key: 7
21,253,524 UART: [art] Derive CDI
21,254,338 UART: [art] Store in in slot 0x4
21,296,727 UART: [art] Derive Key Pair
21,297,727 UART: [art] Store priv key in slot 0x5
23,724,687 UART: [art] Derive Key Pair - Done
23,737,421 UART: [art] Signing Cert with AUTHO
23,738,729 UART: RITY.KEYID = 7
25,444,516 UART: [art] Erasing AUTHORITY.KEYID = 7
25,446,016 UART: [art] PUB.X = BDE0E04E6389E418320C2015F459B35F35765B48325BB6B01056B7686F84CFAC99E4B8FB00BF22B10616841B9B981CC7
25,453,283 UART: [art] PUB.Y = 7AD6055A02DE37EE0DBFBD041500A3E182796662BE590568FE04C2CB92FDDA095634E9B1FE513D72267F7A2EBBE18D4E
25,460,495 UART: [art] SIG.R = E683E4F7BC9713E374734067F0EDE129E12BC4753648EEC30406D3B9C3B37162C479236079E7D3D0628FB3484978EB80
25,467,840 UART: [art] SIG.S = 2078989CE45DE558E900811CCB85517F61B8F8A16198A2A38689726503254BA81013297B58DEC7269D0568AEF6985046
26,446,252 UART: Caliptra RT
26,446,935 UART: [state] CFI Enabled
26,564,529 UART: [rt] RT listening for mailbox commands...
30,589,394 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,745,002 UART: [rt]cmd =0x41544d4e, len=14344
35,584,440 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,234 UART:
192,598 UART: Running Caliptra ROM ...
193,796 UART:
193,951 UART: [state] CFI Enabled
263,843 UART: [state] LifecycleState = Unprovisioned
266,196 UART: [state] DebugLocked = No
268,326 UART: [state] WD Timer not started. Device not locked for debugging
272,309 UART: [kat] SHA2-256
462,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,968 UART: [kat] ++
473,447 UART: [kat] sha1
484,602 UART: [kat] SHA2-256
487,612 UART: [kat] SHA2-384
493,043 UART: [kat] SHA2-512-ACC
495,632 UART: [kat] ECC-384
2,946,282 UART: [kat] HMAC-384Kdf
2,971,189 UART: [kat] LMS
3,503,004 UART: [kat] --
3,506,857 UART: [cold-reset] ++
3,509,367 UART: [fht] FHT @ 0x50003400
3,521,488 UART: [idev] ++
3,522,191 UART: [idev] CDI.KEYID = 6
3,523,191 UART: [idev] SUBJECT.KEYID = 7
3,524,367 UART: [idev] UDS.KEYID = 0
3,525,294 ready_for_fw is high
3,525,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,160 UART: [idev] Erasing UDS.KEYID = 0
6,024,729 UART: [idev] Sha1 KeyId Algorithm
6,047,634 UART: [idev] --
6,051,796 UART: [ldev] ++
6,052,484 UART: [ldev] CDI.KEYID = 6
6,053,398 UART: [ldev] SUBJECT.KEYID = 5
6,054,616 UART: [ldev] AUTHORITY.KEYID = 7
6,055,789 UART: [ldev] FE.KEYID = 1
6,098,037 UART: [ldev] Erasing FE.KEYID = 1
8,606,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,699 UART: [ldev] --
10,411,772 UART: [fwproc] Wait for Commands...
10,413,435 UART: [fwproc] Recv command 0x46574c44
10,415,741 UART: [fwproc] Recv'd Img size: 114168 bytes
15,039,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,125,543 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,241,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,783,581 >>> mbox cmd response: success
15,787,129 UART: [afmc] ++
15,787,835 UART: [afmc] CDI.KEYID = 6
15,788,951 UART: [afmc] SUBJECT.KEYID = 7
15,790,502 UART: [afmc] AUTHORITY.KEYID = 5
18,318,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,042,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,044,322 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,059,389 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,074,629 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,089,453 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,113,659 UART: [afmc] --
20,117,363 UART: [cold-reset] --
20,119,782 UART: [state] Locking Datavault
20,126,886 UART: [state] Locking PCR0, PCR1 and PCR31
20,129,047 UART: [state] Locking ICCM
20,130,664 UART: [exit] Launching FMC @ 0x40000130
20,139,355 UART:
20,139,596 UART: Running Caliptra FMC ...
20,140,699 UART:
20,140,858 UART: [state] CFI Enabled
20,198,792 UART: [fht] FMC Alias Private Key: 7
21,962,757 UART: [art] Extend RT PCRs Done
21,963,990 UART: [art] Lock RT PCRs Done
21,965,894 UART: [art] Populate DV Done
21,971,302 UART: [fht] FMC Alias Private Key: 7
21,972,943 UART: [art] Derive CDI
21,973,758 UART: [art] Store in in slot 0x4
22,031,616 UART: [art] Derive Key Pair
22,032,661 UART: [art] Store priv key in slot 0x5
24,495,496 UART: [art] Derive Key Pair - Done
24,508,601 UART: [art] Signing Cert with AUTHO
24,509,908 UART: RITY.KEYID = 7
26,221,192 UART: [art] Erasing AUTHORITY.KEYID = 7
26,222,828 UART: [art] PUB.X = 9B90EF1B5AD41BAFC03C34366833B7B89F7873E6389935AF9E03C38519730ABB20FD7AB2F8E4563ADE3527C07E7A9EE3
26,229,975 UART: [art] PUB.Y = 93953B6C76A3A4D1CD59C2631FEEAFB2E3FF6729811EB2234ECFC5BF349DC2D38F2611266F912422AAD0F8E6D018BD6E
26,237,279 UART: [art] SIG.R = F0AA04ADF64861F01EA77D7A85CB659C34AAFDD3B72164103332565465EC30CD8211539442939D0D4804FD4652EECB5D
26,244,663 UART: [art] SIG.S = BF3D6DEF49FF7E3DD7CF0F14F4CBE5AE3D7FD7F802E4C192FEDE46EBDBFA59181BC2CF4A971205D4208D1CA4FFC80467
27,223,729 UART: Caliptra RT
27,224,434 UART: [state] CFI Enabled
27,387,387 UART: [rt] RT listening for mailbox commands...
31,414,487 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,570,271 UART: [rt]cmd =0x41544d4e, len=14344
36,433,319 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,438,612 ready_for_fw is high
3,439,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,813,300 >>> mbox cmd response: success
20,112,702 UART:
20,113,082 UART: Running Caliptra FMC ...
20,114,282 UART:
20,114,450 UART: [state] CFI Enabled
20,178,753 UART: [fht] FMC Alias Private Key: 7
21,943,192 UART: [art] Extend RT PCRs Done
21,944,415 UART: [art] Lock RT PCRs Done
21,946,261 UART: [art] Populate DV Done
21,951,711 UART: [fht] FMC Alias Private Key: 7
21,953,277 UART: [art] Derive CDI
21,954,052 UART: [art] Store in in slot 0x4
22,011,269 UART: [art] Derive Key Pair
22,012,277 UART: [art] Store priv key in slot 0x5
24,475,470 UART: [art] Derive Key Pair - Done
24,488,061 UART: [art] Signing Cert with AUTHO
24,489,377 UART: RITY.KEYID = 7
26,200,048 UART: [art] Erasing AUTHORITY.KEYID = 7
26,201,564 UART: [art] PUB.X = AFC1F1241AB559D5FBEAFFC6917985122F165F8D008026B6E45DE86717E7693B40BCE0402E8C0C99EC6E6330EA1EECAC
26,208,807 UART: [art] PUB.Y = 5430BA15F1C374AB4C28465D9C2B0D3C0723C85EAB5F52D3B510535684CFA21B0CD2C7ACA1B1B69B84927E988940D407
26,216,089 UART: [art] SIG.R = E109AF1939EA3C032F61CC59621046558524CF2B4F244CE2351421DBBAC3940A8B49752BB116D9DBBEAB786959C5E3D9
26,223,493 UART: [art] SIG.S = B3877BD08734ADE8DBDA10B49FDCD4CE2B0B72B56C510AD02040D71A3F205BA56128FBDAB6A946BC79F09C24BB837476
27,202,087 UART: Caliptra RT
27,202,799 UART: [state] CFI Enabled
27,366,159 UART: [rt] RT listening for mailbox commands...
31,392,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,548,316 UART: [rt]cmd =0x41544d4e, len=14344
36,405,660 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
192,953 UART:
193,338 UART: Running Caliptra ROM ...
194,528 UART:
604,104 UART: [state] CFI Enabled
616,766 UART: [state] LifecycleState = Unprovisioned
619,140 UART: [state] DebugLocked = No
622,012 UART: [state] WD Timer not started. Device not locked for debugging
625,918 UART: [kat] SHA2-256
815,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,598 UART: [kat] ++
827,199 UART: [kat] sha1
837,815 UART: [kat] SHA2-256
840,899 UART: [kat] SHA2-384
846,964 UART: [kat] SHA2-512-ACC
849,546 UART: [kat] ECC-384
3,291,747 UART: [kat] HMAC-384Kdf
3,305,341 UART: [kat] LMS
3,837,196 UART: [kat] --
3,840,618 UART: [cold-reset] ++
3,841,550 UART: [fht] FHT @ 0x50003400
3,854,368 UART: [idev] ++
3,855,078 UART: [idev] CDI.KEYID = 6
3,855,962 UART: [idev] SUBJECT.KEYID = 7
3,857,925 UART: [idev] UDS.KEYID = 0
3,858,843 ready_for_fw is high
3,859,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,392 UART: [idev] Erasing UDS.KEYID = 0
6,336,072 UART: [idev] Sha1 KeyId Algorithm
6,358,079 UART: [idev] --
6,363,915 UART: [ldev] ++
6,364,597 UART: [ldev] CDI.KEYID = 6
6,365,479 UART: [ldev] SUBJECT.KEYID = 5
6,366,690 UART: [ldev] AUTHORITY.KEYID = 7
6,367,919 UART: [ldev] FE.KEYID = 1
6,379,405 UART: [ldev] Erasing FE.KEYID = 1
8,856,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,549 UART: [ldev] --
10,645,509 UART: [fwproc] Wait for Commands...
10,648,520 UART: [fwproc] Recv command 0x46574c44
10,650,791 UART: [fwproc] Recv'd Img size: 114168 bytes
15,279,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,357,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,473,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,015,705 >>> mbox cmd response: success
16,019,916 UART: [afmc] ++
16,020,652 UART: [afmc] CDI.KEYID = 6
16,021,768 UART: [afmc] SUBJECT.KEYID = 7
16,023,313 UART: [afmc] AUTHORITY.KEYID = 5
18,522,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,248,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,250,393 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,265,486 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,280,665 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,295,503 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,320,321 UART: [afmc] --
20,324,536 UART: [cold-reset] --
20,328,832 UART: [state] Locking Datavault
20,335,704 UART: [state] Locking PCR0, PCR1 and PCR31
20,337,939 UART: [state] Locking ICCM
20,340,666 UART: [exit] Launching FMC @ 0x40000130
20,349,341 UART:
20,349,574 UART: Running Caliptra FMC ...
20,350,611 UART:
20,350,760 UART: [state] CFI Enabled
20,358,865 UART: [fht] FMC Alias Private Key: 7
22,115,643 UART: [art] Extend RT PCRs Done
22,116,853 UART: [art] Lock RT PCRs Done
22,118,340 UART: [art] Populate DV Done
22,123,968 UART: [fht] FMC Alias Private Key: 7
22,125,499 UART: [art] Derive CDI
22,126,238 UART: [art] Store in in slot 0x4
22,168,842 UART: [art] Derive Key Pair
22,169,843 UART: [art] Store priv key in slot 0x5
24,596,468 UART: [art] Derive Key Pair - Done
24,609,675 UART: [art] Signing Cert with AUTHO
24,610,969 UART: RITY.KEYID = 7
26,316,844 UART: [art] Erasing AUTHORITY.KEYID = 7
26,318,353 UART: [art] PUB.X = C32C70B97F71EF3A10025D4D1136D16A6BA4BE77801C6E1C375E8D0B249132CEDB9BCA048C6108060BE729B7DBA841C5
26,325,594 UART: [art] PUB.Y = 447DC7226C7569A31D301F3CB2708F603A7E135110191131514A10AB41A8AF76D5D113B6334A352EEFC309943075B519
26,332,822 UART: [art] SIG.R = BC3BBB11EA036252CA0DCA8F61387A91065F4319A0B5BF9605B77462CAD51034EB44B68934D860030D377DC8F1DF9B38
26,340,236 UART: [art] SIG.S = B1F989DA2AAE3B57E637EA070E14DB08DF0B38095D0AB73A346F23B47CE51DC9AF967A16CF76944573841D1C9F9E257D
27,319,287 UART: Caliptra RT
27,319,995 UART: [state] CFI Enabled
27,437,041 UART: [rt] RT listening for mailbox commands...
31,459,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,614,820 UART: [rt]cmd =0x41544d4e, len=14344
36,470,386 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,650 writing to cptra_bootfsm_go
3,758,359 ready_for_fw is high
3,758,891 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,054,376 >>> mbox cmd response: success
20,305,919 UART:
20,306,332 UART: Running Caliptra FMC ...
20,307,445 UART:
20,307,600 UART: [state] CFI Enabled
20,315,579 UART: [fht] FMC Alias Private Key: 7
22,072,503 UART: [art] Extend RT PCRs Done
22,073,716 UART: [art] Lock RT PCRs Done
22,075,367 UART: [art] Populate DV Done
22,080,944 UART: [fht] FMC Alias Private Key: 7
22,082,647 UART: [art] Derive CDI
22,083,387 UART: [art] Store in in slot 0x4
22,125,821 UART: [art] Derive Key Pair
22,126,819 UART: [art] Store priv key in slot 0x5
24,553,513 UART: [art] Derive Key Pair - Done
24,565,982 UART: [art] Signing Cert with AUTHO
24,567,311 UART: RITY.KEYID = 7
26,272,550 UART: [art] Erasing AUTHORITY.KEYID = 7
26,274,065 UART: [art] PUB.X = 22C23F8FA3D3ECE2E0F0004F8099E69F4A1DBD9BD8F1E8BDED5A2847753B26F59BCC898BADCDF41C8700868B22090539
26,281,320 UART: [art] PUB.Y = 53DF297D0C8E99CCB40F6342FCFF6E0FBB9787A44216304EC58E2FCFC733E9CE289C6536B0A38EC6CBF1243EABD12554
26,288,607 UART: [art] SIG.R = A28433FAFCBEE64CA6CCE6D16CB20C7F1C5221EB83943EA20D1D41A4470A4F121E9BD2E82B03DEAB73B30DCB2C368A4E
26,295,997 UART: [art] SIG.S = 79BBC95E466C66E48F32E0574431B0204B13E441852B9C3E72B740C8514BD43A979FEDFC0DC19BB5ADEFAFCFDF74C7A5
27,274,825 UART: Caliptra RT
27,275,545 UART: [state] CFI Enabled
27,392,749 UART: [rt] RT listening for mailbox commands...
31,419,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,575,002 UART: [rt]cmd =0x41544d4e, len=14344
36,426,929 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,387 UART: [kat] SHA2-256
882,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,433 UART: [kat] ++
886,585 UART: [kat] sha1
890,797 UART: [kat] SHA2-256
892,735 UART: [kat] SHA2-384
895,416 UART: [kat] SHA2-512-ACC
897,317 UART: [kat] ECC-384
902,892 UART: [kat] HMAC-384Kdf
907,526 UART: [kat] LMS
1,475,722 UART: [kat] --
1,476,563 UART: [cold-reset] ++
1,477,007 UART: [fht] Storing FHT @ 0x50003400
1,479,814 UART: [idev] ++
1,479,982 UART: [idev] CDI.KEYID = 6
1,480,342 UART: [idev] SUBJECT.KEYID = 7
1,480,766 UART: [idev] UDS.KEYID = 0
1,481,111 ready_for_fw is high
1,481,111 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,018 UART: [idev] Erasing UDS.KEYID = 0
1,505,434 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,200 UART: [idev] --
1,515,433 UART: [ldev] ++
1,515,601 UART: [ldev] CDI.KEYID = 6
1,515,964 UART: [ldev] SUBJECT.KEYID = 5
1,516,390 UART: [ldev] AUTHORITY.KEYID = 7
1,516,853 UART: [ldev] FE.KEYID = 1
1,521,897 UART: [ldev] Erasing FE.KEYID = 1
1,547,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,096 UART: [ldev] --
1,586,465 UART: [fwproc] Waiting for Commands...
1,587,228 UART: [fwproc] Received command 0x46574c44
1,588,019 UART: [fwproc] Received Image of size 114168 bytes
5,044,326 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,072,592 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,101,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,237,521 >>> mbox cmd response: success
5,238,663 UART: [afmc] ++
5,238,831 UART: [afmc] CDI.KEYID = 6
5,239,193 UART: [afmc] SUBJECT.KEYID = 7
5,239,618 UART: [afmc] AUTHORITY.KEYID = 5
5,274,650 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,290,578 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,291,358 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,297,067 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,302,959 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,308,660 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,316,536 UART: [afmc] --
5,317,624 UART: [cold-reset] --
5,318,484 UART: [state] Locking Datavault
5,319,577 UART: [state] Locking PCR0, PCR1 and PCR31
5,320,181 UART: [state] Locking ICCM
5,320,823 UART: [exit] Launching FMC @ 0x40000130
5,326,152 UART:
5,326,168 UART: Running Caliptra FMC ...
5,326,576 UART:
5,326,630 UART: [state] CFI Enabled
5,336,792 UART: [fht] FMC Alias Private Key: 7
5,444,064 UART: [art] Extend RT PCRs Done
5,444,492 UART: [art] Lock RT PCRs Done
5,446,134 UART: [art] Populate DV Done
5,454,134 UART: [fht] FMC Alias Private Key: 7
5,455,270 UART: [art] Derive CDI
5,455,550 UART: [art] Store in in slot 0x4
5,541,403 UART: [art] Derive Key Pair
5,541,763 UART: [art] Store priv key in slot 0x5
5,554,991 UART: [art] Derive Key Pair - Done
5,569,811 UART: [art] Signing Cert with AUTHO
5,570,291 UART: RITY.KEYID = 7
5,585,533 UART: [art] Erasing AUTHORITY.KEYID = 7
5,586,298 UART: [art] PUB.X = BCADBC5B91E279278F3D1A02714A50D0BC6008F9634FF9F23E117C6D370668FAAF76CD34B69337EBEE38CF92CB2694E1
5,593,073 UART: [art] PUB.Y = 42FEB65B4BC3AD4839143B1B12544FD3B837093F4EF4AD69FEA0FBB6A0D3E1A87AB5DB9AEAE4DA5F92613629B1E6375F
5,600,042 UART: [art] SIG.R = 4DAF552E8DB91FCDA24D588EE6191D4D61CB2F4C35A1934BAD164AC7B86DC740455A324E63B91566B35E39ED6BAF8CDD
5,606,832 UART: [art] SIG.S = FF5BE83F13D3D413D01647A97256AC36D8014E9268AA99357E1A68FBBF0DBA01943D55962AD4C9F8D76534D9D9A26AAD
5,630,156 UART: Caliptra RT
5,630,409 UART: [state] CFI Enabled
5,738,140 UART: [rt] RT listening for mailbox commands...
5,738,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,862,086 UART: [rt]cmd =0x41544d4e, len=14344
7,265,386 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,297 ready_for_fw is high
1,362,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,238,241 >>> mbox cmd response: success
5,300,288 UART:
5,300,304 UART: Running Caliptra FMC ...
5,300,712 UART:
5,300,766 UART: [state] CFI Enabled
5,311,134 UART: [fht] FMC Alias Private Key: 7
5,418,688 UART: [art] Extend RT PCRs Done
5,419,116 UART: [art] Lock RT PCRs Done
5,420,306 UART: [art] Populate DV Done
5,428,334 UART: [fht] FMC Alias Private Key: 7
5,429,284 UART: [art] Derive CDI
5,429,564 UART: [art] Store in in slot 0x4
5,515,139 UART: [art] Derive Key Pair
5,515,499 UART: [art] Store priv key in slot 0x5
5,529,035 UART: [art] Derive Key Pair - Done
5,543,752 UART: [art] Signing Cert with AUTHO
5,544,232 UART: RITY.KEYID = 7
5,559,538 UART: [art] Erasing AUTHORITY.KEYID = 7
5,560,303 UART: [art] PUB.X = BE6C093D46AE8EE20BC087A74D27CD5ACAA3182DCBD2A3C07EA3BA5AA22F3EE17A170445E1628C9C06F8D9FB0FCB1C70
5,567,086 UART: [art] PUB.Y = 57EDAFE12E1CAB8975BBDA1C5BD2F69AEC1551D2B745631F19FBEF45E9EF91EF6FD78A0969D2D226FEDEF6C81847EA78
5,574,061 UART: [art] SIG.R = C4292714834BF0A7E727229A50A4477393793E773750E30BF88F892FD8C591A7010B2C143ED5FFDEC26FE8B6ADBD02BD
5,580,825 UART: [art] SIG.S = 0696688E41ACEF21E3EF78676FEACFE76CE0E2B41693542C881259E3FB06A14794C4FFCC8AB6E4E3E76B973E5EBF0CE1
5,604,607 UART: Caliptra RT
5,604,860 UART: [state] CFI Enabled
5,713,275 UART: [rt] RT listening for mailbox commands...
5,713,945 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,123 UART: [rt]cmd =0x41544d4e, len=14344
7,232,912 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,888 UART: [kat] SHA2-256
881,819 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,934 UART: [kat] ++
886,086 UART: [kat] sha1
890,274 UART: [kat] SHA2-256
892,212 UART: [kat] SHA2-384
895,083 UART: [kat] SHA2-512-ACC
896,984 UART: [kat] ECC-384
902,517 UART: [kat] HMAC-384Kdf
907,111 UART: [kat] LMS
1,475,307 UART: [kat] --
1,476,262 UART: [cold-reset] ++
1,476,620 UART: [fht] Storing FHT @ 0x50003400
1,479,427 UART: [idev] ++
1,479,595 UART: [idev] CDI.KEYID = 6
1,479,955 UART: [idev] SUBJECT.KEYID = 7
1,480,379 UART: [idev] UDS.KEYID = 0
1,480,724 ready_for_fw is high
1,480,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,943 UART: [idev] Erasing UDS.KEYID = 0
1,504,731 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,213 UART: [idev] --
1,514,166 UART: [ldev] ++
1,514,334 UART: [ldev] CDI.KEYID = 6
1,514,697 UART: [ldev] SUBJECT.KEYID = 5
1,515,123 UART: [ldev] AUTHORITY.KEYID = 7
1,515,586 UART: [ldev] FE.KEYID = 1
1,521,144 UART: [ldev] Erasing FE.KEYID = 1
1,546,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,355 UART: [ldev] --
1,585,842 UART: [fwproc] Waiting for Commands...
1,586,487 UART: [fwproc] Received command 0x46574c44
1,587,278 UART: [fwproc] Received Image of size 114168 bytes
5,232,018 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,260,526 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,289,878 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,425,555 >>> mbox cmd response: success
5,426,659 UART: [afmc] ++
5,426,827 UART: [afmc] CDI.KEYID = 6
5,427,189 UART: [afmc] SUBJECT.KEYID = 7
5,427,614 UART: [afmc] AUTHORITY.KEYID = 5
5,462,774 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,479,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,479,804 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,485,513 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,491,405 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,497,106 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,505,082 UART: [afmc] --
5,506,016 UART: [cold-reset] --
5,506,728 UART: [state] Locking Datavault
5,508,063 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,667 UART: [state] Locking ICCM
5,509,283 UART: [exit] Launching FMC @ 0x40000130
5,514,612 UART:
5,514,628 UART: Running Caliptra FMC ...
5,515,036 UART:
5,515,179 UART: [state] CFI Enabled
5,525,509 UART: [fht] FMC Alias Private Key: 7
5,633,717 UART: [art] Extend RT PCRs Done
5,634,145 UART: [art] Lock RT PCRs Done
5,635,603 UART: [art] Populate DV Done
5,643,631 UART: [fht] FMC Alias Private Key: 7
5,644,583 UART: [art] Derive CDI
5,644,863 UART: [art] Store in in slot 0x4
5,730,714 UART: [art] Derive Key Pair
5,731,074 UART: [art] Store priv key in slot 0x5
5,744,144 UART: [art] Derive Key Pair - Done
5,758,479 UART: [art] Signing Cert with AUTHO
5,758,959 UART: RITY.KEYID = 7
5,774,023 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,788 UART: [art] PUB.X = 88023F92E5A2D7D7CB691124BFF7FDD0D4DBBABE0148EF82463B4C08D7E9FEF45CB8942FDCDE5F4E14EAA655A6FAAC17
5,781,579 UART: [art] PUB.Y = 162DE488D89D13E73AB468C7A30868293A32B679453976BD291A81BD4FD957B28D82CB61F0B7FB48699A6ABB3DFB509D
5,788,532 UART: [art] SIG.R = CCD37AD03E88E572BFAD037AA1FB17772DD7700C51D52BC9E853D7941B362D37A4FBA9C04BC25605C26B82470D042764
5,795,295 UART: [art] SIG.S = 9834CAA3953B8E820394C991E718290FF6D27EEDC7C6B6469A4DE093A6FF4C3542404B6F9B0CCB413980CF5698C30995
5,819,308 UART: Caliptra RT
5,819,653 UART: [state] CFI Enabled
5,927,991 UART: [rt] RT listening for mailbox commands...
5,928,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,051,613 UART: [rt]cmd =0x41544d4e, len=14344
7,442,830 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 ready_for_fw is high
1,363,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,201,417 >>> mbox cmd response: success
5,263,386 UART:
5,263,402 UART: Running Caliptra FMC ...
5,263,810 UART:
5,263,953 UART: [state] CFI Enabled
5,274,407 UART: [fht] FMC Alias Private Key: 7
5,381,581 UART: [art] Extend RT PCRs Done
5,382,009 UART: [art] Lock RT PCRs Done
5,383,953 UART: [art] Populate DV Done
5,392,363 UART: [fht] FMC Alias Private Key: 7
5,393,363 UART: [art] Derive CDI
5,393,643 UART: [art] Store in in slot 0x4
5,479,288 UART: [art] Derive Key Pair
5,479,648 UART: [art] Store priv key in slot 0x5
5,492,836 UART: [art] Derive Key Pair - Done
5,507,572 UART: [art] Signing Cert with AUTHO
5,508,052 UART: RITY.KEYID = 7
5,522,796 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,561 UART: [art] PUB.X = C359DA5BE50F80C6F81F633156817263A5CDCEDD7501188B7DD5F7AF33E982C69C70BDC584EBC3BE9E1A267DA9E36FD6
5,530,343 UART: [art] PUB.Y = C34583D3C793E548EE345D556843C92B9244BBCF97180FD905D8FBE505454D99E75F106BD0EAB3C0B9A1E170B50787BA
5,537,287 UART: [art] SIG.R = 71227134D7C1A3CD5DCD59E8521838B1DC12F362A1CF68B599B74124966DA6CF87471A79CF3880A2F22FB173D9509F35
5,544,057 UART: [art] SIG.S = 9EA1434522ECAAB6032A755E035DD2C75796B54107D850E7A88E872D00BE2A5DA647D73D0494FEBF82C85721409437B4
5,567,640 UART: Caliptra RT
5,567,985 UART: [state] CFI Enabled
5,675,868 UART: [rt] RT listening for mailbox commands...
5,676,538 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,506 UART: [rt]cmd =0x41544d4e, len=14344
7,201,868 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,194 UART: [kat] SHA2-256
893,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,969 UART: [kat] ++
898,121 UART: [kat] sha1
902,343 UART: [kat] SHA2-256
904,283 UART: [kat] SHA2-384
907,082 UART: [kat] SHA2-512-ACC
908,983 UART: [kat] ECC-384
918,664 UART: [kat] HMAC-384Kdf
923,242 UART: [kat] LMS
1,171,570 UART: [kat] --
1,172,185 UART: [cold-reset] ++
1,172,645 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 ready_for_fw is high
1,176,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,324 UART: [idev] Erasing UDS.KEYID = 0
1,201,667 UART: [idev] Sha1 KeyId Algorithm
1,210,135 UART: [idev] --
1,211,123 UART: [ldev] ++
1,211,291 UART: [ldev] CDI.KEYID = 6
1,211,654 UART: [ldev] SUBJECT.KEYID = 5
1,212,080 UART: [ldev] AUTHORITY.KEYID = 7
1,212,543 UART: [ldev] FE.KEYID = 1
1,217,531 UART: [ldev] Erasing FE.KEYID = 1
1,243,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,109 UART: [ldev] --
1,282,424 UART: [fwproc] Wait for Commands...
1,283,000 UART: [fwproc] Recv command 0x46574c44
1,283,728 UART: [fwproc] Recv'd Img size: 114168 bytes
3,116,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,687 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,309,434 >>> mbox cmd response: success
3,310,636 UART: [afmc] ++
3,310,804 UART: [afmc] CDI.KEYID = 6
3,311,166 UART: [afmc] SUBJECT.KEYID = 7
3,311,591 UART: [afmc] AUTHORITY.KEYID = 5
3,346,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,056 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,765 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,657 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,368 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,199 UART: [afmc] --
3,390,131 UART: [cold-reset] --
3,391,157 UART: [state] Locking Datavault
3,392,320 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,924 UART: [state] Locking ICCM
3,393,476 UART: [exit] Launching FMC @ 0x40000130
3,398,805 UART:
3,398,821 UART: Running Caliptra FMC ...
3,399,229 UART:
3,399,283 UART: [state] CFI Enabled
3,410,167 UART: [fht] FMC Alias Private Key: 7
3,518,451 UART: [art] Extend RT PCRs Done
3,518,879 UART: [art] Lock RT PCRs Done
3,520,445 UART: [art] Populate DV Done
3,528,353 UART: [fht] FMC Alias Private Key: 7
3,529,399 UART: [art] Derive CDI
3,529,679 UART: [art] Store in in slot 0x4
3,615,458 UART: [art] Derive Key Pair
3,615,818 UART: [art] Store priv key in slot 0x5
3,628,808 UART: [art] Derive Key Pair - Done
3,643,823 UART: [art] Signing Cert with AUTHO
3,644,303 UART: RITY.KEYID = 7
3,659,397 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,162 UART: [art] PUB.X = 3A06474FE65919852077BC760B9438801F573D0C91CFF1BE405C2C167D0F1F400902165F3F9FBB721FA75D10AF61119E
3,666,912 UART: [art] PUB.Y = 91A96A78A629387EBA19551506BB5C9AC03147195E9E297BD6C5B9AC6988057DC6C9BA0AB36983450E3C54E5426F66F1
3,673,850 UART: [art] SIG.R = AE83FD5679BCE24F4402EA220E8C7C59FD67DB1BC99D621DB685C6B790B4629D650990498F972BA2600C939DD70F569C
3,680,611 UART: [art] SIG.S = 72A05B53FA71D7103BEB1F0623B237F0E62CCD74A6ECC1BC1D5B852872C5955E3665D033BB7847D356B376480AB400BA
3,704,470 UART: Caliptra RT
3,704,723 UART: [state] CFI Enabled
3,811,757 UART: [rt] RT listening for mailbox commands...
3,812,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,935,699 UART: [rt]cmd =0x41544d4e, len=14344
5,334,677 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,911 ready_for_fw is high
1,059,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,176,913 >>> mbox cmd response: success
3,239,260 UART:
3,239,276 UART: Running Caliptra FMC ...
3,239,684 UART:
3,239,738 UART: [state] CFI Enabled
3,250,552 UART: [fht] FMC Alias Private Key: 7
3,358,904 UART: [art] Extend RT PCRs Done
3,359,332 UART: [art] Lock RT PCRs Done
3,361,086 UART: [art] Populate DV Done
3,369,286 UART: [fht] FMC Alias Private Key: 7
3,370,452 UART: [art] Derive CDI
3,370,732 UART: [art] Store in in slot 0x4
3,456,707 UART: [art] Derive Key Pair
3,457,067 UART: [art] Store priv key in slot 0x5
3,470,467 UART: [art] Derive Key Pair - Done
3,485,543 UART: [art] Signing Cert with AUTHO
3,486,023 UART: RITY.KEYID = 7
3,500,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,758 UART: [art] PUB.X = FCF2693F4C18C4353A31CA714CBB9DB4A661ABD22C3FB3D03C7183E474346971808680A3ECA0E38B5AA02A6BAE139468
3,508,538 UART: [art] PUB.Y = 0B722483B933A7E6127AE1E48A3AD72707B432698FCC373FB50609DDAFE2F8BBF5DA2C91E4A78B33F0B315713078FFFB
3,515,488 UART: [art] SIG.R = 9A8433D9035B77EDE12C4B031CADEA6C105A9B118C4748BDE173675BFFFD6AF75BFE748530FA53396B520342442A1286
3,522,255 UART: [art] SIG.S = 0C4D9A4287BA0AA92BA647DF7AF03B44674371B176AB5F997DD64A42669C917F21D953F38EBBB9672F15CE65150C66C8
3,545,879 UART: Caliptra RT
3,546,132 UART: [state] CFI Enabled
3,653,200 UART: [rt] RT listening for mailbox commands...
3,653,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,752 UART: [rt]cmd =0x41544d4e, len=14344
5,175,272 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,828 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
893,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,728 UART: [kat] ++
897,880 UART: [kat] sha1
902,190 UART: [kat] SHA2-256
904,130 UART: [kat] SHA2-384
906,951 UART: [kat] SHA2-512-ACC
908,852 UART: [kat] ECC-384
918,689 UART: [kat] HMAC-384Kdf
923,163 UART: [kat] LMS
1,171,491 UART: [kat] --
1,172,530 UART: [cold-reset] ++
1,173,030 UART: [fht] FHT @ 0x50003400
1,175,763 UART: [idev] ++
1,175,931 UART: [idev] CDI.KEYID = 6
1,176,291 UART: [idev] SUBJECT.KEYID = 7
1,176,715 UART: [idev] UDS.KEYID = 0
1,177,060 ready_for_fw is high
1,177,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,201,896 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,364 UART: [ldev] ++
1,211,532 UART: [ldev] CDI.KEYID = 6
1,211,895 UART: [ldev] SUBJECT.KEYID = 5
1,212,321 UART: [ldev] AUTHORITY.KEYID = 7
1,212,784 UART: [ldev] FE.KEYID = 1
1,217,908 UART: [ldev] Erasing FE.KEYID = 1
1,244,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,984 UART: [ldev] --
1,284,287 UART: [fwproc] Wait for Commands...
1,284,881 UART: [fwproc] Recv command 0x46574c44
1,285,609 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,315,465 >>> mbox cmd response: success
3,316,531 UART: [afmc] ++
3,316,699 UART: [afmc] CDI.KEYID = 6
3,317,061 UART: [afmc] SUBJECT.KEYID = 7
3,317,486 UART: [afmc] AUTHORITY.KEYID = 5
3,353,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,585 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,294 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,186 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,897 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,684 UART: [afmc] --
3,396,812 UART: [cold-reset] --
3,397,652 UART: [state] Locking Datavault
3,398,747 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,351 UART: [state] Locking ICCM
3,399,987 UART: [exit] Launching FMC @ 0x40000130
3,405,316 UART:
3,405,332 UART: Running Caliptra FMC ...
3,405,740 UART:
3,405,883 UART: [state] CFI Enabled
3,416,641 UART: [fht] FMC Alias Private Key: 7
3,525,107 UART: [art] Extend RT PCRs Done
3,525,535 UART: [art] Lock RT PCRs Done
3,526,893 UART: [art] Populate DV Done
3,535,211 UART: [fht] FMC Alias Private Key: 7
3,536,169 UART: [art] Derive CDI
3,536,449 UART: [art] Store in in slot 0x4
3,621,964 UART: [art] Derive Key Pair
3,622,324 UART: [art] Store priv key in slot 0x5
3,635,604 UART: [art] Derive Key Pair - Done
3,650,313 UART: [art] Signing Cert with AUTHO
3,650,793 UART: RITY.KEYID = 7
3,665,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,576 UART: [art] PUB.X = AE9668988DEF964EAC8A079478A252FE23C4E8B976155320CD62F3D10682BFD219CDEE41695A7ABCA5A15F2F20ED38A1
3,673,352 UART: [art] PUB.Y = FF0019842C3ABCC3A1F43BF416409477AF7D0D9E6E424457C83883AD221349FB81FADFE5CFAE3818635E2EA6C5C38E15
3,680,289 UART: [art] SIG.R = 70F33D912884804F69D5B82E622675B45577641CC1A9A707D42D6B58C2519E00020668018735C436CB1EC3C97579DAB5
3,687,013 UART: [art] SIG.S = 4FF7D4E12F7992582230CCFAAED9F8FDB4C2172F06E6897DA261736E4EAECAE7F613F9D72906F42761969C6FFE69A9FC
3,711,042 UART: Caliptra RT
3,711,387 UART: [state] CFI Enabled
3,818,664 UART: [rt] RT listening for mailbox commands...
3,819,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,640 UART: [rt]cmd =0x41544d4e, len=14344
5,340,814 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,392 ready_for_fw is high
1,060,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,167,316 >>> mbox cmd response: success
3,229,077 UART:
3,229,093 UART: Running Caliptra FMC ...
3,229,501 UART:
3,229,644 UART: [state] CFI Enabled
3,240,012 UART: [fht] FMC Alias Private Key: 7
3,347,646 UART: [art] Extend RT PCRs Done
3,348,074 UART: [art] Lock RT PCRs Done
3,349,870 UART: [art] Populate DV Done
3,358,338 UART: [fht] FMC Alias Private Key: 7
3,359,328 UART: [art] Derive CDI
3,359,608 UART: [art] Store in in slot 0x4
3,445,383 UART: [art] Derive Key Pair
3,445,743 UART: [art] Store priv key in slot 0x5
3,458,861 UART: [art] Derive Key Pair - Done
3,473,650 UART: [art] Signing Cert with AUTHO
3,474,130 UART: RITY.KEYID = 7
3,489,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,135 UART: [art] PUB.X = F62475541559D5E5A8EB56519744E125E20B59E26B0A7B403C57DB27EDB9FE79087E23A58C0F7FC28E98E386B56EB957
3,496,895 UART: [art] PUB.Y = 74D904499C6A1424E823049EFB4F28F4E233AFAEDF7D0438B3BF43B2F5F01200DAC576260C9EB69DC1253F1EF067D8ED
3,503,823 UART: [art] SIG.R = 7B5E4A0F72E9303D9C352B18B00D85C4985AAF4BBC520F2F50B858DACC3238A272AD63D7D400CA6CA3E59767CCD3B13C
3,510,578 UART: [art] SIG.S = 25FCB2860DF4604F4D8D21C590A2503535681850CBEE4DFCCA9B62FFB15C0D3230F110C118B2B1A7EEE615823A8ECC17
3,534,033 UART: Caliptra RT
3,534,378 UART: [state] CFI Enabled
3,642,411 UART: [rt] RT listening for mailbox commands...
3,643,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,981 UART: [rt]cmd =0x41544d4e, len=14344
5,179,589 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
85,915 UART: [state] WD Timer not started. Device not locked for debugging
87,094 UART: [kat] SHA2-256
890,644 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,773 UART: [kat] ++
894,925 UART: [kat] sha1
899,103 UART: [kat] SHA2-256
901,043 UART: [kat] SHA2-384
903,662 UART: [kat] SHA2-512-ACC
905,563 UART: [kat] ECC-384
915,238 UART: [kat] HMAC-384Kdf
919,710 UART: [kat] LMS
1,168,022 UART: [kat] --
1,169,117 UART: [cold-reset] ++
1,169,627 UART: [fht] FHT @ 0x50003400
1,172,329 UART: [idev] ++
1,172,497 UART: [idev] CDI.KEYID = 6
1,172,858 UART: [idev] SUBJECT.KEYID = 7
1,173,283 UART: [idev] UDS.KEYID = 0
1,173,629 ready_for_fw is high
1,173,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,137 UART: [idev] Sha1 KeyId Algorithm
1,206,869 UART: [idev] --
1,207,870 UART: [ldev] ++
1,208,038 UART: [ldev] CDI.KEYID = 6
1,208,402 UART: [ldev] SUBJECT.KEYID = 5
1,208,829 UART: [ldev] AUTHORITY.KEYID = 7
1,209,292 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,240,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,582 UART: [ldev] --
1,279,958 UART: [fwproc] Wait for Commands...
1,280,595 UART: [fwproc] Recv command 0x46574c44
1,281,328 UART: [fwproc] Recv'd Img size: 114168 bytes
3,111,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,138,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,168,118 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,303,794 >>> mbox cmd response: success
3,304,931 UART: [afmc] ++
3,305,099 UART: [afmc] CDI.KEYID = 6
3,305,462 UART: [afmc] SUBJECT.KEYID = 7
3,305,888 UART: [afmc] AUTHORITY.KEYID = 5
3,341,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,357,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,358,475 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,364,185 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,370,075 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,375,786 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,383,736 UART: [afmc] --
3,384,844 UART: [cold-reset] --
3,385,614 UART: [state] Locking Datavault
3,386,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,387,457 UART: [state] Locking ICCM
3,387,969 UART: [exit] Launching FMC @ 0x40000130
3,393,298 UART:
3,393,314 UART: Running Caliptra FMC ...
3,393,722 UART:
3,393,776 UART: [state] CFI Enabled
3,404,414 UART: [fht] FMC Alias Private Key: 7
3,512,934 UART: [art] Extend RT PCRs Done
3,513,362 UART: [art] Lock RT PCRs Done
3,514,956 UART: [art] Populate DV Done
3,523,046 UART: [fht] FMC Alias Private Key: 7
3,524,042 UART: [art] Derive CDI
3,524,322 UART: [art] Store in in slot 0x4
3,610,327 UART: [art] Derive Key Pair
3,610,687 UART: [art] Store priv key in slot 0x5
3,623,667 UART: [art] Derive Key Pair - Done
3,638,525 UART: [art] Signing Cert with AUTHO
3,639,005 UART: RITY.KEYID = 7
3,654,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,654,984 UART: [art] PUB.X = A894EF3D91E92D7365325E6D184115EB0219E6C0BE7B6B12D6540C92274A257915222BB04A17AF8A0CFB70EA80F6ACEF
3,661,753 UART: [art] PUB.Y = D86B4A05F9241C07C41C63D4463D0FAB02E417F50810976B8060753DC1D80FA9332CDFE539C98CAA8FDED2A02A2A5D51
3,668,695 UART: [art] SIG.R = 3356169F4346BF5E19C91FA6AE885AF939EA89D46B2EAD90D14B14181F488B096542CF63DBD5D335CEE04E9A8C96C9E9
3,675,472 UART: [art] SIG.S = 5A28A625AE4387EFF6EED89775926CE5D40B8F1BEDB4D13CD83A612BC962B435D19AD38589EC572ECB86A796C56E9A17
3,699,702 UART: Caliptra RT
3,699,955 UART: [state] CFI Enabled
3,807,956 UART: [rt] RT listening for mailbox commands...
3,808,626 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,672 UART: [rt]cmd =0x41544d4e, len=14344
5,333,105 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,290 ready_for_fw is high
1,055,290 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,170,086 >>> mbox cmd response: success
3,231,139 UART:
3,231,155 UART: Running Caliptra FMC ...
3,231,563 UART:
3,231,617 UART: [state] CFI Enabled
3,242,199 UART: [fht] FMC Alias Private Key: 7
3,349,787 UART: [art] Extend RT PCRs Done
3,350,215 UART: [art] Lock RT PCRs Done
3,351,673 UART: [art] Populate DV Done
3,359,937 UART: [fht] FMC Alias Private Key: 7
3,360,885 UART: [art] Derive CDI
3,361,165 UART: [art] Store in in slot 0x4
3,446,762 UART: [art] Derive Key Pair
3,447,122 UART: [art] Store priv key in slot 0x5
3,460,682 UART: [art] Derive Key Pair - Done
3,475,216 UART: [art] Signing Cert with AUTHO
3,475,696 UART: RITY.KEYID = 7
3,490,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,353 UART: [art] PUB.X = 6B4951ACCCA82B9B855ADC087614A65636D586FFEF52D9FEC99AE9299537CBE09368B99B864759B3FEE247EAD17840AD
3,498,132 UART: [art] PUB.Y = 576261BA8E3B56FC57884634D43DCEB027ACDFC309C672450D73CCFB5CC1630EA1C73E183D3393A2FD149B34FBEC466F
3,505,087 UART: [art] SIG.R = 7C4BCFABD6728DDD18D0D0EE34AC04CDDA758B01B39C96BA2D9B9A1C8DF708625BAFC096E3D9E4169EB911C740077863
3,511,865 UART: [art] SIG.S = 94B991B86733959D41D69B2AA391BA71A0A02FB1837FAA56DDE881B4D658FA2B8B25BA59F60DFDBB3A622C7F336F6A09
3,535,558 UART: Caliptra RT
3,535,811 UART: [state] CFI Enabled
3,643,617 UART: [rt] RT listening for mailbox commands...
3,644,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,221 UART: [rt]cmd =0x41544d4e, len=14344
5,163,586 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,489 UART: [kat] SHA2-256
891,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,168 UART: [kat] ++
895,320 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,083 UART: [kat] LMS
1,169,395 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,872 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 ready_for_fw is high
1,174,652 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,488 UART: [idev] Erasing UDS.KEYID = 0
1,199,148 UART: [idev] Sha1 KeyId Algorithm
1,208,250 UART: [idev] --
1,209,371 UART: [ldev] ++
1,209,539 UART: [ldev] CDI.KEYID = 6
1,209,903 UART: [ldev] SUBJECT.KEYID = 5
1,210,330 UART: [ldev] AUTHORITY.KEYID = 7
1,210,793 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,679 UART: [ldev] --
1,282,067 UART: [fwproc] Wait for Commands...
1,282,796 UART: [fwproc] Recv command 0x46574c44
1,283,529 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,150,001 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,310 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,314,852 >>> mbox cmd response: success
3,315,933 UART: [afmc] ++
3,316,101 UART: [afmc] CDI.KEYID = 6
3,316,464 UART: [afmc] SUBJECT.KEYID = 7
3,316,890 UART: [afmc] AUTHORITY.KEYID = 5
3,352,080 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,499 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,209 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,099 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,810 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,804 UART: [afmc] --
3,395,758 UART: [cold-reset] --
3,396,534 UART: [state] Locking Datavault
3,398,013 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,617 UART: [state] Locking ICCM
3,399,203 UART: [exit] Launching FMC @ 0x40000130
3,404,532 UART:
3,404,548 UART: Running Caliptra FMC ...
3,404,956 UART:
3,405,099 UART: [state] CFI Enabled
3,415,333 UART: [fht] FMC Alias Private Key: 7
3,522,825 UART: [art] Extend RT PCRs Done
3,523,253 UART: [art] Lock RT PCRs Done
3,524,759 UART: [art] Populate DV Done
3,532,957 UART: [fht] FMC Alias Private Key: 7
3,533,947 UART: [art] Derive CDI
3,534,227 UART: [art] Store in in slot 0x4
3,620,206 UART: [art] Derive Key Pair
3,620,566 UART: [art] Store priv key in slot 0x5
3,633,688 UART: [art] Derive Key Pair - Done
3,648,641 UART: [art] Signing Cert with AUTHO
3,649,121 UART: RITY.KEYID = 7
3,664,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,446 UART: [art] PUB.X = AA302067238D04A4403C517FAEC35FCB4BBDE437EC7623179162E5A85E7432B1B44870AE66C4F46BBB618435C9BD0319
3,672,214 UART: [art] PUB.Y = E523485516E2DEC2F3A77E1CCEC8F71A385CE4C0282DAB55D20C3A58203737307C05DC8B6684C03221B906BDFD2B4CE9
3,679,165 UART: [art] SIG.R = 754D305533F683A985830C64711B1B524B532A51B83C0A83F3FBC141A0745ABAF8012C9836374B74114008BD661CC5D9
3,685,915 UART: [art] SIG.S = DF02777F8BBE146F48B3BF85079AD1DFA3ED5CB93AFA9A870C193E9B22DC74484DBD96C84FBC15B9179839A3C87113D8
3,709,597 UART: Caliptra RT
3,709,942 UART: [state] CFI Enabled
3,817,412 UART: [rt] RT listening for mailbox commands...
3,818,082 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,254 UART: [rt]cmd =0x41544d4e, len=14344
5,346,949 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,361 ready_for_fw is high
1,056,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,173,860 >>> mbox cmd response: success
3,235,931 UART:
3,235,947 UART: Running Caliptra FMC ...
3,236,355 UART:
3,236,498 UART: [state] CFI Enabled
3,246,770 UART: [fht] FMC Alias Private Key: 7
3,354,700 UART: [art] Extend RT PCRs Done
3,355,128 UART: [art] Lock RT PCRs Done
3,357,016 UART: [art] Populate DV Done
3,365,208 UART: [fht] FMC Alias Private Key: 7
3,366,326 UART: [art] Derive CDI
3,366,606 UART: [art] Store in in slot 0x4
3,451,919 UART: [art] Derive Key Pair
3,452,279 UART: [art] Store priv key in slot 0x5
3,465,635 UART: [art] Derive Key Pair - Done
3,480,180 UART: [art] Signing Cert with AUTHO
3,480,660 UART: RITY.KEYID = 7
3,495,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,447 UART: [art] PUB.X = 6FB285D5134BCEFD95AF1573F8FF001A0D262F42694693F2EB293C332585B9301DB2F8528500C2F005C40D5432C165CA
3,503,164 UART: [art] PUB.Y = A3CE5A6D963213E256C1886487B069350FAEA61CB2377EA280722C4EA4AFF6905CD324405B0D3ACA0D0F1AFDE9C77BD8
3,510,116 UART: [art] SIG.R = B80566EBE37A2B7F6BF8061BFE990EF48F57A1409834C9E2F5CCC303CA61EFEEA47D6AB0C5A737E40E4A798A272A6369
3,516,887 UART: [art] SIG.S = 68AF49C42F2C0964726E7505DFEB6EA2CB420332FFA2205513997E32DD42DD95E3B66B79F3334FD19AE03E256285E2FE
3,541,043 UART: Caliptra RT
3,541,388 UART: [state] CFI Enabled
3,649,308 UART: [rt] RT listening for mailbox commands...
3,649,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,990 UART: [rt]cmd =0x41544d4e, len=14344
5,174,107 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,434 UART:
192,810 UART: Running Caliptra ROM ...
193,899 UART:
194,045 UART: [state] CFI Enabled
263,347 UART: [state] LifecycleState = Unprovisioned
265,300 UART: [state] DebugLocked = No
267,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,299 UART: [kat] SHA2-256
442,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,459 UART: [kat] ++
454,024 UART: [kat] sha1
464,617 UART: [kat] SHA2-256
467,333 UART: [kat] SHA2-384
473,594 UART: [kat] SHA2-512-ACC
475,950 UART: [kat] ECC-384
2,767,269 UART: [kat] HMAC-384Kdf
2,778,579 UART: [kat] LMS
3,968,830 UART: [kat] --
3,972,758 UART: [cold-reset] ++
3,974,617 UART: [fht] Storing FHT @ 0x50003400
3,986,513 UART: [idev] ++
3,987,137 UART: [idev] CDI.KEYID = 6
3,988,046 UART: [idev] SUBJECT.KEYID = 7
3,989,285 UART: [idev] UDS.KEYID = 0
3,990,368 ready_for_fw is high
3,990,592 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,133,839 UART: [idev] Erasing UDS.KEYID = 0
7,331,390 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,963 UART: [idev] --
7,355,902 UART: [ldev] ++
7,356,462 UART: [ldev] CDI.KEYID = 6
7,357,417 UART: [ldev] SUBJECT.KEYID = 5
7,358,561 UART: [ldev] AUTHORITY.KEYID = 7
7,359,895 UART: [ldev] FE.KEYID = 1
7,404,536 UART: [ldev] Erasing FE.KEYID = 1
10,738,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,877 UART: [ldev] --
13,120,975 UART: [fwproc] Waiting for Commands...
13,123,834 UART: [fwproc] Received command 0x46574c44
13,126,011 UART: [fwproc] Received Image of size 113844 bytes
22,156,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,237,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,306,688 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,622,633 >>> mbox cmd response: success
22,625,989 UART: [afmc] ++
22,626,588 UART: [afmc] CDI.KEYID = 6
22,627,550 UART: [afmc] SUBJECT.KEYID = 7
22,628,758 UART: [afmc] AUTHORITY.KEYID = 5
25,998,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,301,086 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,303,350 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,317,912 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,332,677 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,346,896 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,368,055 UART: [afmc] --
28,372,467 UART: [cold-reset] --
28,376,275 UART: [state] Locking Datavault
28,382,922 UART: [state] Locking PCR0, PCR1 and PCR31
28,384,626 UART: [state] Locking ICCM
28,385,962 UART: [exit] Launching FMC @ 0x40000130
28,394,354 UART:
28,394,580 UART: Running Caliptra FMC ...
28,395,676 UART:
28,395,832 UART: [state] CFI Enabled
28,462,516 UART: [fht] FMC Alias Private Key: 7
30,800,659 UART: [art] Extend RT PCRs Done
30,801,871 UART: [art] Lock RT PCRs Done
30,803,431 UART: [art] Populate DV Done
30,809,161 UART: [fht] FMC Alias Private Key: 7
30,810,690 UART: [art] Derive CDI
30,811,519 UART: [art] Store in in slot 0x4
30,870,770 UART: [art] Derive Key Pair
30,871,798 UART: [art] Store priv key in slot 0x5
34,164,342 UART: [art] Derive Key Pair - Done
34,177,344 UART: [art] Signing Cert with AUTHO
34,178,652 UART: RITY.KEYID = 7
36,465,291 UART: [art] Erasing AUTHORITY.KEYID = 7
36,466,795 UART: [art] PUB.X = 94F46D48354EB4503AAB8005FAFDB6E1CAC51BD2B53D5FC05F4700BC3DFE90CA9848E42697BEE817AA82368379F1B502
36,474,059 UART: [art] PUB.Y = FF8894E36914D812DA3C4A1B26E6FFBCC146CD1E24C2BAC2DC64AD75A70A9142EADB245F7FEB32B8CBC64ED270F12EFA
36,481,329 UART: [art] SIG.R = E66C9E5BE934A3A3673503A94B7BF11B88E64A58163FF4C0E7DE26C78A7766C792C83ECCDE034D0EF0CEBACD8232805D
36,488,751 UART: [art] SIG.S = BB611D941B45BA66120E7D021C9FC82B45919A9FE341C2364D7245C8C9EBB9308995DB4333ABFF4ADA24140EBE5D7C32
37,794,216 UART: Caliptra RT
37,794,914 UART: [state] CFI Enabled
37,954,147 UART: [rt] RT listening for mailbox commands...
37,956,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,111,691 UART: [rt]cmd =0x41544d4e, len=14344
44,587,460 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,805,097 ready_for_fw is high
3,805,483 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,889,851 >>> mbox cmd response: success
27,573,129 UART:
27,573,525 UART: Running Caliptra FMC ...
27,574,717 UART:
27,574,879 UART: [state] CFI Enabled
27,644,169 UART: [fht] FMC Alias Private Key: 7
29,981,553 UART: [art] Extend RT PCRs Done
29,982,799 UART: [art] Lock RT PCRs Done
29,984,314 UART: [art] Populate DV Done
29,989,833 UART: [fht] FMC Alias Private Key: 7
29,991,534 UART: [art] Derive CDI
29,992,349 UART: [art] Store in in slot 0x4
30,053,389 UART: [art] Derive Key Pair
30,054,428 UART: [art] Store priv key in slot 0x5
33,347,725 UART: [art] Derive Key Pair - Done
33,361,103 UART: [art] Signing Cert with AUTHO
33,362,410 UART: RITY.KEYID = 7
35,649,055 UART: [art] Erasing AUTHORITY.KEYID = 7
35,650,572 UART: [art] PUB.X = AE204A0507EE1DEE871ED58C536859661BFF71D7B1C536FE36120263C0D7D635540B94FCA8F94E7CE78306D4D43979B3
35,657,834 UART: [art] PUB.Y = 78F81CB2A0CD52D1BBECAC3038CD1E5EE2E0FF6BD223A19F80A123342B947D6DE0E1B4D86E6654B93184EE0C7EE5A0E2
35,665,112 UART: [art] SIG.R = 512D71CE68CB6967FA8C2F3D2C823D22EC8CAC0D03D7848685ECCF4242A13DA5501EC1A15BA335C350576FE29FA20355
35,672,495 UART: [art] SIG.S = 406849A9D7BA461E29BD9531DF3AE8E6F1B0C5402FE721F97A53511EA1CA31F5D8DB10037945900FE06B3FC49A7E278C
36,978,007 UART: Caliptra RT
36,978,732 UART: [state] CFI Enabled
37,159,271 UART: [rt] RT listening for mailbox commands...
37,161,569 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,316,809 UART: [rt]cmd =0x41544d4e, len=14344
43,818,452 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,538 UART:
192,908 UART: Running Caliptra ROM ...
193,995 UART:
603,894 UART: [state] CFI Enabled
623,099 UART: [state] LifecycleState = Unprovisioned
624,994 UART: [state] DebugLocked = No
626,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,792 UART: [kat] SHA2-256
801,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,047 UART: [kat] ++
812,510 UART: [kat] sha1
824,369 UART: [kat] SHA2-256
827,134 UART: [kat] SHA2-384
832,596 UART: [kat] SHA2-512-ACC
834,992 UART: [kat] ECC-384
3,118,598 UART: [kat] HMAC-384Kdf
3,131,383 UART: [kat] LMS
4,321,463 UART: [kat] --
4,323,690 UART: [cold-reset] ++
4,325,622 UART: [fht] Storing FHT @ 0x50003400
4,337,596 UART: [idev] ++
4,338,158 UART: [idev] CDI.KEYID = 6
4,339,089 UART: [idev] SUBJECT.KEYID = 7
4,340,338 UART: [idev] UDS.KEYID = 0
4,341,415 ready_for_fw is high
4,341,625 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,722 UART: [idev] Erasing UDS.KEYID = 0
7,629,564 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,283 UART: [idev] --
7,654,330 UART: [ldev] ++
7,654,917 UART: [ldev] CDI.KEYID = 6
7,655,855 UART: [ldev] SUBJECT.KEYID = 5
7,657,066 UART: [ldev] AUTHORITY.KEYID = 7
7,658,360 UART: [ldev] FE.KEYID = 1
7,670,562 UART: [ldev] Erasing FE.KEYID = 1
10,956,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,036 UART: [ldev] --
13,315,056 UART: [fwproc] Waiting for Commands...
13,317,693 UART: [fwproc] Received command 0x46574c44
13,319,936 UART: [fwproc] Received Image of size 113844 bytes
22,033,199 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,113,583 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,182,455 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,499,295 >>> mbox cmd response: success
22,502,899 UART: [afmc] ++
22,503,495 UART: [afmc] CDI.KEYID = 6
22,504,464 UART: [afmc] SUBJECT.KEYID = 7
22,505,677 UART: [afmc] AUTHORITY.KEYID = 5
25,821,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,117,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,120,132 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,134,691 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,149,457 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,163,663 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,184,991 UART: [afmc] --
28,189,131 UART: [cold-reset] --
28,193,357 UART: [state] Locking Datavault
28,197,699 UART: [state] Locking PCR0, PCR1 and PCR31
28,199,472 UART: [state] Locking ICCM
28,200,599 UART: [exit] Launching FMC @ 0x40000130
28,208,957 UART:
28,209,204 UART: Running Caliptra FMC ...
28,210,331 UART:
28,210,492 UART: [state] CFI Enabled
28,218,488 UART: [fht] FMC Alias Private Key: 7
30,548,959 UART: [art] Extend RT PCRs Done
30,550,178 UART: [art] Lock RT PCRs Done
30,551,741 UART: [art] Populate DV Done
30,557,152 UART: [fht] FMC Alias Private Key: 7
30,558,757 UART: [art] Derive CDI
30,559,589 UART: [art] Store in in slot 0x4
30,602,461 UART: [art] Derive Key Pair
30,603,536 UART: [art] Store priv key in slot 0x5
33,846,149 UART: [art] Derive Key Pair - Done
33,859,217 UART: [art] Signing Cert with AUTHO
33,860,522 UART: RITY.KEYID = 7
36,139,937 UART: [art] Erasing AUTHORITY.KEYID = 7
36,141,446 UART: [art] PUB.X = 85B344FBF0B2A462C5BA798A108FF9012248A97CABCC426C92B26257B1798E8EBED9D97A237F060F83747EF6896A28BC
36,148,717 UART: [art] PUB.Y = 50E4FF940AC08517D6BD53BA211C5C88858F05A93B290F9A55D373986E7C162E68D0FC16E59E9A54F52299FDDA5BED93
36,155,971 UART: [art] SIG.R = 9D3B38BF48ED52DBE6963E565B245D468B886BED3350987CEB524DA9573291270C2DDC54B5F5B183A2D76C06D950FD2B
36,163,320 UART: [art] SIG.S = FB5016FE532556DE15D482D74A111E7324ACFA152F1101371F041864733F16FDFA3F3C296E2E51F8F1AFD99815801C9E
37,469,198 UART: Caliptra RT
37,469,900 UART: [state] CFI Enabled
37,587,614 UART: [rt] RT listening for mailbox commands...
37,589,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,745,153 UART: [rt]cmd =0x41544d4e, len=14344
44,039,408 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
4,127,091 ready_for_fw is high
4,127,514 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,186,635 >>> mbox cmd response: success
27,824,894 UART:
27,825,276 UART: Running Caliptra FMC ...
27,826,406 UART:
27,826,571 UART: [state] CFI Enabled
27,834,856 UART: [fht] FMC Alias Private Key: 7
30,165,279 UART: [art] Extend RT PCRs Done
30,166,506 UART: [art] Lock RT PCRs Done
30,168,070 UART: [art] Populate DV Done
30,173,485 UART: [fht] FMC Alias Private Key: 7
30,175,024 UART: [art] Derive CDI
30,175,845 UART: [art] Store in in slot 0x4
30,218,654 UART: [art] Derive Key Pair
30,219,675 UART: [art] Store priv key in slot 0x5
33,462,232 UART: [art] Derive Key Pair - Done
33,474,960 UART: [art] Signing Cert with AUTHO
33,476,257 UART: RITY.KEYID = 7
35,755,435 UART: [art] Erasing AUTHORITY.KEYID = 7
35,756,949 UART: [art] PUB.X = C9679E2C015F10E7D2F8D40ABB0A0AE57DFE31E509F9EDD77B7E9A8040C1E84F958B79AA275C47D99396EA2553951F78
35,764,206 UART: [art] PUB.Y = 0679B08ACBF0A68A8B5541191DF6D41A63BDF59B252A3165FF95A5A15FFEA98FCB311FF080DCD99774C0DA8198DD1019
35,771,484 UART: [art] SIG.R = 98573C38BD9CA3BFA77A3D68B56278F5B0C4BF67FBC86E4D635E539BA85C938F5E5F767E00D4B018E0C0BA3206AC20CE
35,778,880 UART: [art] SIG.S = 374EBBAD3497E6493E1ADE3ED587FA2EA5A0F4487D03E8C76AFB24E6124E47CF5DD15D607E0CE27CA4A42B743E7A0166
37,084,490 UART: Caliptra RT
37,085,211 UART: [state] CFI Enabled
37,203,405 UART: [rt] RT listening for mailbox commands...
37,205,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,360,953 UART: [rt]cmd =0x41544d4e, len=14344
43,681,887 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,300 UART:
192,673 UART: Running Caliptra ROM ...
193,851 UART:
194,004 UART: [state] CFI Enabled
265,595 UART: [state] LifecycleState = Unprovisioned
267,452 UART: [state] DebugLocked = No
269,105 UART: [state] WD Timer not started. Device not locked for debugging
272,650 UART: [kat] SHA2-256
451,760 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,353 UART: [kat] ++
463,885 UART: [kat] sha1
476,542 UART: [kat] SHA2-256
479,620 UART: [kat] SHA2-384
485,038 UART: [kat] SHA2-512-ACC
488,045 UART: [kat] ECC-384
2,950,143 UART: [kat] HMAC-384Kdf
2,971,771 UART: [kat] LMS
3,501,230 UART: [kat] --
3,506,146 UART: [cold-reset] ++
3,507,150 UART: [fht] FHT @ 0x50003400
3,517,268 UART: [idev] ++
3,517,834 UART: [idev] CDI.KEYID = 6
3,518,717 UART: [idev] SUBJECT.KEYID = 7
3,519,960 UART: [idev] UDS.KEYID = 0
3,520,864 ready_for_fw is high
3,521,053 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,059 UART: [idev] Erasing UDS.KEYID = 0
6,028,675 UART: [idev] Sha1 KeyId Algorithm
6,052,601 UART: [idev] --
6,057,222 UART: [ldev] ++
6,057,804 UART: [ldev] CDI.KEYID = 6
6,058,758 UART: [ldev] SUBJECT.KEYID = 5
6,059,847 UART: [ldev] AUTHORITY.KEYID = 7
6,061,149 UART: [ldev] FE.KEYID = 1
6,102,791 UART: [ldev] Erasing FE.KEYID = 1
8,611,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,946 UART: [ldev] --
10,416,969 UART: [fwproc] Wait for Commands...
10,418,902 UART: [fwproc] Recv command 0x46574c44
10,420,995 UART: [fwproc] Recv'd Img size: 114168 bytes
14,968,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,045,563 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,114,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,432,284 >>> mbox cmd response: success
15,436,981 UART: [afmc] ++
15,437,585 UART: [afmc] CDI.KEYID = 6
15,438,495 UART: [afmc] SUBJECT.KEYID = 7
15,439,659 UART: [afmc] AUTHORITY.KEYID = 5
17,965,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,685,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,687,703 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,703,622 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,719,611 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,735,359 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,757,034 UART: [afmc] --
19,760,683 UART: [cold-reset] --
19,764,759 UART: [state] Locking Datavault
19,771,205 UART: [state] Locking PCR0, PCR1 and PCR31
19,772,856 UART: [state] Locking ICCM
19,774,542 UART: [exit] Launching FMC @ 0x40000130
19,782,959 UART:
19,783,200 UART: Running Caliptra FMC ...
19,784,301 UART:
19,784,464 UART: [state] CFI Enabled
19,845,963 UART: [fht] FMC Alias Private Key: 7
21,609,550 UART: [art] Extend RT PCRs Done
21,610,765 UART: [art] Lock RT PCRs Done
21,612,418 UART: [art] Populate DV Done
21,617,943 UART: [fht] FMC Alias Private Key: 7
21,619,537 UART: [art] Derive CDI
21,620,355 UART: [art] Store in in slot 0x4
21,678,161 UART: [art] Derive Key Pair
21,679,208 UART: [art] Store priv key in slot 0x5
24,141,733 UART: [art] Derive Key Pair - Done
24,154,635 UART: [art] Signing Cert with AUTHO
24,155,968 UART: RITY.KEYID = 7
25,867,482 UART: [art] Erasing AUTHORITY.KEYID = 7
25,869,127 UART: [art] PUB.X = E0717386001A4B05F5F7BECD7E75D390F2A3518BB3E5C27258CE06BBB5821E85789924CDABC7CE94528627087D471DE3
25,876,277 UART: [art] PUB.Y = 5262066BC29ECCF3B9EC8A1CF36404E1449AA49F52D8C5C1A09CF00D801E47837416968AD8084A89BC6ED6B69E277581
25,883,510 UART: [art] SIG.R = 91380B57222731E4B9A5D6C332F217347273D487257D0F2E31E1C7DFA1221239404DC823856E558A45424F9399E75C49
25,890,837 UART: [art] SIG.S = 51CC2D974D6431E708521A3F87741A42D6D128B1B9078D53CFE87BA0565E3E10CF75660FB79DF8838ECE7455C2D7B1C3
26,869,858 UART: Caliptra RT
26,870,578 UART: [state] CFI Enabled
27,035,337 UART: [rt] RT listening for mailbox commands...
27,037,699 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,192,815 UART: [rt]cmd =0x41544d4e, len=14344
30,873,378 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,362,265 ready_for_fw is high
3,362,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,021,638 >>> mbox cmd response: success
19,307,115 UART:
19,307,503 UART: Running Caliptra FMC ...
19,308,630 UART:
19,308,790 UART: [state] CFI Enabled
19,373,923 UART: [fht] FMC Alias Private Key: 7
21,138,001 UART: [art] Extend RT PCRs Done
21,139,236 UART: [art] Lock RT PCRs Done
21,141,191 UART: [art] Populate DV Done
21,146,676 UART: [fht] FMC Alias Private Key: 7
21,148,220 UART: [art] Derive CDI
21,149,038 UART: [art] Store in in slot 0x4
21,206,526 UART: [art] Derive Key Pair
21,207,566 UART: [art] Store priv key in slot 0x5
23,670,837 UART: [art] Derive Key Pair - Done
23,684,316 UART: [art] Signing Cert with AUTHO
23,685,627 UART: RITY.KEYID = 7
25,397,027 UART: [art] Erasing AUTHORITY.KEYID = 7
25,398,537 UART: [art] PUB.X = C6941845161C58E2D44C0C65AE2B174D71D8AC519B7696D3FF573E5AEBB384333D75C694979DCC848374CEEB3563EC1B
25,405,785 UART: [art] PUB.Y = 1E6BBD4D8F4B1568CDCB9BEA08BE8FBF6D9FD668BD75C1002F1FE1B310428AFD07F6AB311E64FF2D6A90386078DE599A
25,413,039 UART: [art] SIG.R = 79A05312F73AF216BC75C526704DF660CA1A5AA16E8F593143AE79DB6553EFB90826C9F3B152866C62A1AFDE5CC74147
25,420,431 UART: [art] SIG.S = 7D3CFB3D53849E9E21A6B1AD117B4742D186F1A769762F4B3C8456F54AE7ECD0FD97D35D9F793951E8DC29755146BE7E
26,399,041 UART: Caliptra RT
26,399,726 UART: [state] CFI Enabled
26,564,955 UART: [rt] RT listening for mailbox commands...
26,567,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,722,624 UART: [rt]cmd =0x41544d4e, len=14344
30,404,463 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,017 writing to cptra_bootfsm_go
193,393 UART:
193,741 UART: Running Caliptra ROM ...
194,905 UART:
604,520 UART: [state] CFI Enabled
618,801 UART: [state] LifecycleState = Unprovisioned
620,592 UART: [state] DebugLocked = No
622,821 UART: [state] WD Timer not started. Device not locked for debugging
627,270 UART: [kat] SHA2-256
806,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,953 UART: [kat] ++
818,400 UART: [kat] sha1
829,696 UART: [kat] SHA2-256
832,697 UART: [kat] SHA2-384
838,402 UART: [kat] SHA2-512-ACC
841,334 UART: [kat] ECC-384
3,279,584 UART: [kat] HMAC-384Kdf
3,291,815 UART: [kat] LMS
3,821,316 UART: [kat] --
3,824,169 UART: [cold-reset] ++
3,826,519 UART: [fht] FHT @ 0x50003400
3,838,035 UART: [idev] ++
3,838,649 UART: [idev] CDI.KEYID = 6
3,839,571 UART: [idev] SUBJECT.KEYID = 7
3,840,752 UART: [idev] UDS.KEYID = 0
3,841,733 ready_for_fw is high
3,841,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,150 UART: [idev] Erasing UDS.KEYID = 0
6,313,607 UART: [idev] Sha1 KeyId Algorithm
6,336,250 UART: [idev] --
6,341,269 UART: [ldev] ++
6,341,836 UART: [ldev] CDI.KEYID = 6
6,342,742 UART: [ldev] SUBJECT.KEYID = 5
6,343,898 UART: [ldev] AUTHORITY.KEYID = 7
6,345,182 UART: [ldev] FE.KEYID = 1
6,354,806 UART: [ldev] Erasing FE.KEYID = 1
8,827,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,659 UART: [ldev] --
10,618,487 UART: [fwproc] Wait for Commands...
10,621,604 UART: [fwproc] Recv command 0x46574c44
10,623,695 UART: [fwproc] Recv'd Img size: 114168 bytes
15,168,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,241,437 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,310,193 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,627,470 >>> mbox cmd response: success
15,631,999 UART: [afmc] ++
15,632,597 UART: [afmc] CDI.KEYID = 6
15,633,513 UART: [afmc] SUBJECT.KEYID = 7
15,634,677 UART: [afmc] AUTHORITY.KEYID = 5
18,130,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,853,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,854,959 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,870,939 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,886,882 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,902,649 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,926,440 UART: [afmc] --
19,930,905 UART: [cold-reset] --
19,934,277 UART: [state] Locking Datavault
19,938,764 UART: [state] Locking PCR0, PCR1 and PCR31
19,940,464 UART: [state] Locking ICCM
19,942,128 UART: [exit] Launching FMC @ 0x40000130
19,950,575 UART:
19,950,809 UART: Running Caliptra FMC ...
19,951,912 UART:
19,952,079 UART: [state] CFI Enabled
19,960,418 UART: [fht] FMC Alias Private Key: 7
21,716,345 UART: [art] Extend RT PCRs Done
21,717,576 UART: [art] Lock RT PCRs Done
21,719,125 UART: [art] Populate DV Done
21,724,370 UART: [fht] FMC Alias Private Key: 7
21,725,854 UART: [art] Derive CDI
21,726,620 UART: [art] Store in in slot 0x4
21,769,221 UART: [art] Derive Key Pair
21,770,264 UART: [art] Store priv key in slot 0x5
24,197,705 UART: [art] Derive Key Pair - Done
24,210,534 UART: [art] Signing Cert with AUTHO
24,211,831 UART: RITY.KEYID = 7
25,917,508 UART: [art] Erasing AUTHORITY.KEYID = 7
25,919,019 UART: [art] PUB.X = 325FC3A84F57506E47F529AB27A043F8C62D876F5B2D1BE5A42AEBA0AD3E81C767A75CAD341DC74F01F28CAC42EDF7ED
25,926,283 UART: [art] PUB.Y = 0F4D4D8621629B096EF87F5699EB20929B38A6DDA7D61868E799143AC4F60A80A2484766ED91F15EF26CC5C072198EA4
25,933,525 UART: [art] SIG.R = A1011E4483CD611460FFBCA91575CB89A88B49BF5911F64DEC77A38EC0228C36CA494729CB0D7BDEC14F81FE972F6FF7
25,940,944 UART: [art] SIG.S = 38DDBA404E0CDC079BE0081EB9A56653DD06AB5A5CDDA762BA643D9A92EB8C5888B92AF2DE212FED1FE9BC490CC48A5D
26,919,714 UART: Caliptra RT
26,920,416 UART: [state] CFI Enabled
27,036,841 UART: [rt] RT listening for mailbox commands...
27,039,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,194,517 UART: [rt]cmd =0x41544d4e, len=14344
30,862,419 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,883 writing to cptra_bootfsm_go
3,695,639 ready_for_fw is high
3,696,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,247,840 >>> mbox cmd response: success
19,495,580 UART:
19,495,969 UART: Running Caliptra FMC ...
19,497,168 UART:
19,497,341 UART: [state] CFI Enabled
19,505,395 UART: [fht] FMC Alias Private Key: 7
21,262,486 UART: [art] Extend RT PCRs Done
21,263,701 UART: [art] Lock RT PCRs Done
21,265,275 UART: [art] Populate DV Done
21,270,737 UART: [fht] FMC Alias Private Key: 7
21,272,455 UART: [art] Derive CDI
21,273,269 UART: [art] Store in in slot 0x4
21,316,186 UART: [art] Derive Key Pair
21,317,189 UART: [art] Store priv key in slot 0x5
23,744,199 UART: [art] Derive Key Pair - Done
23,757,134 UART: [art] Signing Cert with AUTHO
23,758,437 UART: RITY.KEYID = 7
25,464,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,465,836 UART: [art] PUB.X = A64F20BED800016424B3C1F902B49A4CF0BA5B6C80E418FBEEBFAB9CCDA263F9482CD5B305EAB7F2EF3734CB42B875F7
25,473,091 UART: [art] PUB.Y = D61DA0A8C0F824060937E722D78D078CEAB73887DA9BE2D93F0E5A4852212217FFFAAA75C943802296542B180C7C167B
25,480,354 UART: [art] SIG.R = 8E219AD05B8E3B78F333BD6C1AC6F4F0DD3391C434829D8771DC61E233183C23EBAD7CBBF2F7363DE6A966E86788FDEA
25,487,756 UART: [art] SIG.S = C6D93B1D2F6ADF35A2F96219EE68282135F536DE2156946A031B396ED8933DE6D017D2A955B26AB17A72A6634952B1F6
26,467,686 UART: Caliptra RT
26,468,368 UART: [state] CFI Enabled
26,585,320 UART: [rt] RT listening for mailbox commands...
26,587,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,742,931 UART: [rt]cmd =0x41544d4e, len=14344
30,418,453 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,148 UART:
192,551 UART: Running Caliptra ROM ...
193,670 UART:
193,820 UART: [state] CFI Enabled
264,848 UART: [state] LifecycleState = Unprovisioned
267,229 UART: [state] DebugLocked = No
269,204 UART: [state] WD Timer not started. Device not locked for debugging
273,111 UART: [kat] SHA2-256
463,006 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,771 UART: [kat] ++
474,313 UART: [kat] sha1
485,693 UART: [kat] SHA2-256
488,710 UART: [kat] SHA2-384
494,066 UART: [kat] SHA2-512-ACC
496,652 UART: [kat] ECC-384
2,947,817 UART: [kat] HMAC-384Kdf
2,971,556 UART: [kat] LMS
3,503,264 UART: [kat] --
3,507,620 UART: [cold-reset] ++
3,509,270 UART: [fht] FHT @ 0x50003400
3,521,874 UART: [idev] ++
3,522,522 UART: [idev] CDI.KEYID = 6
3,523,556 UART: [idev] SUBJECT.KEYID = 7
3,524,740 UART: [idev] UDS.KEYID = 0
3,525,665 ready_for_fw is high
3,525,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,365 UART: [idev] Erasing UDS.KEYID = 0
6,030,033 UART: [idev] Sha1 KeyId Algorithm
6,053,044 UART: [idev] --
6,057,904 UART: [ldev] ++
6,058,590 UART: [ldev] CDI.KEYID = 6
6,059,483 UART: [ldev] SUBJECT.KEYID = 5
6,060,720 UART: [ldev] AUTHORITY.KEYID = 7
6,061,917 UART: [ldev] FE.KEYID = 1
6,099,338 UART: [ldev] Erasing FE.KEYID = 1
8,610,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,531 UART: [ldev] --
10,412,889 UART: [fwproc] Wait for Commands...
10,415,308 UART: [fwproc] Recv command 0x46574c44
10,417,612 UART: [fwproc] Recv'd Img size: 114168 bytes
15,056,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,140,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,256,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,798,782 >>> mbox cmd response: success
15,802,998 UART: [afmc] ++
15,803,773 UART: [afmc] CDI.KEYID = 6
15,804,875 UART: [afmc] SUBJECT.KEYID = 7
15,806,383 UART: [afmc] AUTHORITY.KEYID = 5
18,342,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,070,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,072,124 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,087,235 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,102,393 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,117,212 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,140,364 UART: [afmc] --
20,143,741 UART: [cold-reset] --
20,148,801 UART: [state] Locking Datavault
20,152,154 UART: [state] Locking PCR0, PCR1 and PCR31
20,154,332 UART: [state] Locking ICCM
20,156,224 UART: [exit] Launching FMC @ 0x40000130
20,164,881 UART:
20,165,120 UART: Running Caliptra FMC ...
20,166,224 UART:
20,166,386 UART: [state] CFI Enabled
20,227,284 UART: [fht] FMC Alias Private Key: 7
21,991,017 UART: [art] Extend RT PCRs Done
21,992,238 UART: [art] Lock RT PCRs Done
21,994,026 UART: [art] Populate DV Done
21,999,545 UART: [fht] FMC Alias Private Key: 7
22,001,094 UART: [art] Derive CDI
22,001,837 UART: [art] Store in in slot 0x4
22,059,850 UART: [art] Derive Key Pair
22,060,855 UART: [art] Store priv key in slot 0x5
24,524,371 UART: [art] Derive Key Pair - Done
24,537,369 UART: [art] Signing Cert with AUTHO
24,538,676 UART: RITY.KEYID = 7
26,250,167 UART: [art] Erasing AUTHORITY.KEYID = 7
26,251,672 UART: [art] PUB.X = 99538258629EDC8356F7006A885F4359D90ABFABEDD9B086849045A5123B2348698622BC577391380C127EBF8E44F04A
26,258,883 UART: [art] PUB.Y = 1F16671AD8DCFA9E7312AB272B20EAD910176BB1ADF3ED368DF374068C85B7742111E76A40031884F0187371EDFD7A5C
26,266,142 UART: [art] SIG.R = 73C06D5AF5AC37444B29D9CCA7D5D109203A5C5F129912066E8A35DFEDA8C22984E47F7FA0A8BDBF4C073E42E6E4D029
26,273,564 UART: [art] SIG.S = FD722E42878FE4F4CB14887E31107A0D74CE83483DFC68D2306868B03AFA8F81AAD180A64789A834D303B904D21FC753
27,252,128 UART: Caliptra RT
27,252,830 UART: [state] CFI Enabled
27,419,330 UART: [rt] RT listening for mailbox commands...
27,421,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,577,120 UART: [rt]cmd =0x41544d4e, len=14344
31,249,840 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,440,399 ready_for_fw is high
3,440,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,852,340 >>> mbox cmd response: success
20,134,710 UART:
20,135,096 UART: Running Caliptra FMC ...
20,136,290 UART:
20,136,462 UART: [state] CFI Enabled
20,203,692 UART: [fht] FMC Alias Private Key: 7
21,966,903 UART: [art] Extend RT PCRs Done
21,968,123 UART: [art] Lock RT PCRs Done
21,969,610 UART: [art] Populate DV Done
21,975,163 UART: [fht] FMC Alias Private Key: 7
21,976,682 UART: [art] Derive CDI
21,977,430 UART: [art] Store in in slot 0x4
22,035,822 UART: [art] Derive Key Pair
22,036,826 UART: [art] Store priv key in slot 0x5
24,499,866 UART: [art] Derive Key Pair - Done
24,512,672 UART: [art] Signing Cert with AUTHO
24,513,977 UART: RITY.KEYID = 7
26,225,322 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,807 UART: [art] PUB.X = B4294C94D6CE51D165B5BFAB09F83152E72A681C8F7E4804D5F337822E7CC9C7DAEEA3F28EA689F6FD94242280508AA0
26,234,091 UART: [art] PUB.Y = A0D10D02CCC6099ED133FB358E68048C9A91F6E8BF7BD885E524C2035CA2332C6DA1048CD3BBA8A52BE5122D3A87E8E9
26,241,352 UART: [art] SIG.R = B1DD5A28D0DA212DA8C1638A900294C6B23F7DC792124D63B7ED3D58F720F66806C539DBB41FCA3A48D6405CBA8D3A5F
26,248,735 UART: [art] SIG.S = 06D2007E6189DA25DF3353BBBB1BA606754D818996F529554A8CE864AEACDA07F46996498C62586CE853DAA56A64CA8E
27,227,552 UART: Caliptra RT
27,228,268 UART: [state] CFI Enabled
27,393,291 UART: [rt] RT listening for mailbox commands...
27,395,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,550,959 UART: [rt]cmd =0x41544d4e, len=14344
31,235,773 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,678 writing to cptra_bootfsm_go
193,961 UART:
194,325 UART: Running Caliptra ROM ...
195,506 UART:
605,137 UART: [state] CFI Enabled
618,954 UART: [state] LifecycleState = Unprovisioned
621,274 UART: [state] DebugLocked = No
623,146 UART: [state] WD Timer not started. Device not locked for debugging
627,745 UART: [kat] SHA2-256
817,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,439 UART: [kat] ++
828,957 UART: [kat] sha1
840,252 UART: [kat] SHA2-256
843,259 UART: [kat] SHA2-384
848,893 UART: [kat] SHA2-512-ACC
851,472 UART: [kat] ECC-384
3,290,111 UART: [kat] HMAC-384Kdf
3,304,003 UART: [kat] LMS
3,835,860 UART: [kat] --
3,840,577 UART: [cold-reset] ++
3,841,688 UART: [fht] FHT @ 0x50003400
3,853,667 UART: [idev] ++
3,854,313 UART: [idev] CDI.KEYID = 6
3,855,344 UART: [idev] SUBJECT.KEYID = 7
3,856,518 UART: [idev] UDS.KEYID = 0
3,857,445 ready_for_fw is high
3,857,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,098 UART: [idev] Erasing UDS.KEYID = 0
6,332,571 UART: [idev] Sha1 KeyId Algorithm
6,356,498 UART: [idev] --
6,361,029 UART: [ldev] ++
6,361,721 UART: [ldev] CDI.KEYID = 6
6,362,630 UART: [ldev] SUBJECT.KEYID = 5
6,363,807 UART: [ldev] AUTHORITY.KEYID = 7
6,365,041 UART: [ldev] FE.KEYID = 1
6,375,854 UART: [ldev] Erasing FE.KEYID = 1
8,848,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,601 UART: [ldev] --
10,641,732 UART: [fwproc] Wait for Commands...
10,644,103 UART: [fwproc] Recv command 0x46574c44
10,646,421 UART: [fwproc] Recv'd Img size: 114168 bytes
15,295,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,378,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,494,173 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,035,759 >>> mbox cmd response: success
16,039,998 UART: [afmc] ++
16,040,713 UART: [afmc] CDI.KEYID = 6
16,041,961 UART: [afmc] SUBJECT.KEYID = 7
16,043,398 UART: [afmc] AUTHORITY.KEYID = 5
18,545,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,267,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,269,488 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,284,559 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,299,775 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,314,609 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,338,392 UART: [afmc] --
20,342,155 UART: [cold-reset] --
20,346,125 UART: [state] Locking Datavault
20,352,130 UART: [state] Locking PCR0, PCR1 and PCR31
20,354,265 UART: [state] Locking ICCM
20,356,556 UART: [exit] Launching FMC @ 0x40000130
20,365,246 UART:
20,365,477 UART: Running Caliptra FMC ...
20,366,502 UART:
20,366,651 UART: [state] CFI Enabled
20,375,021 UART: [fht] FMC Alias Private Key: 7
22,132,074 UART: [art] Extend RT PCRs Done
22,133,295 UART: [art] Lock RT PCRs Done
22,135,051 UART: [art] Populate DV Done
22,140,631 UART: [fht] FMC Alias Private Key: 7
22,142,168 UART: [art] Derive CDI
22,142,978 UART: [art] Store in in slot 0x4
22,185,388 UART: [art] Derive Key Pair
22,186,416 UART: [art] Store priv key in slot 0x5
24,613,288 UART: [art] Derive Key Pair - Done
24,625,794 UART: [art] Signing Cert with AUTHO
24,627,095 UART: RITY.KEYID = 7
26,332,251 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,749 UART: [art] PUB.X = 46D9926CFBDFE3BF6A161F089DA9E435E8E065EF9165B37FD788B6C4DEF44D12E4A44E999516FF0649789CE36B6C015B
26,341,052 UART: [art] PUB.Y = 739207704A53FD63E5B539B2FD1252150A3C6A9BF0F777E7A3C4C0F7B105B0C29629FB91A699505EC20AA88C41019D7A
26,348,288 UART: [art] SIG.R = B5B21D62DE0AA863928645878E9ACEEA58EBF4C1FA07AB2FC341CC17FA7D7A5566995E4892F9DD157A5A8B9B5E3E432A
26,355,675 UART: [art] SIG.S = DC91EA546DC28CF4F147CD0745F061F13B7ECDADEB06EBCE7C667A6769DF2291E211DC122A774B0B29037B1101A1FB77
27,334,581 UART: Caliptra RT
27,335,291 UART: [state] CFI Enabled
27,452,921 UART: [rt] RT listening for mailbox commands...
27,455,237 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,610,811 UART: [rt]cmd =0x41544d4e, len=14344
31,297,189 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,580 writing to cptra_bootfsm_go
3,758,269 ready_for_fw is high
3,758,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,055,121 >>> mbox cmd response: success
20,305,664 UART:
20,306,053 UART: Running Caliptra FMC ...
20,307,193 UART:
20,307,355 UART: [state] CFI Enabled
20,315,256 UART: [fht] FMC Alias Private Key: 7
22,071,774 UART: [art] Extend RT PCRs Done
22,073,008 UART: [art] Lock RT PCRs Done
22,074,808 UART: [art] Populate DV Done
22,080,121 UART: [fht] FMC Alias Private Key: 7
22,081,774 UART: [art] Derive CDI
22,082,593 UART: [art] Store in in slot 0x4
22,125,141 UART: [art] Derive Key Pair
22,126,183 UART: [art] Store priv key in slot 0x5
24,553,009 UART: [art] Derive Key Pair - Done
24,565,537 UART: [art] Signing Cert with AUTHO
24,566,853 UART: RITY.KEYID = 7
26,272,493 UART: [art] Erasing AUTHORITY.KEYID = 7
26,273,995 UART: [art] PUB.X = 2A173A535A6F1CDC18119DA99E66EAD416B03FDB74FC72FD884BA1D396BD2BE23D3218015E43BABAE5F441001E897321
26,281,303 UART: [art] PUB.Y = BDA845557B988AF9383573C93FE50833455B2F2E19C5907169771E0AB425FD4F8174C9359A182CF4DEB80ACDF0AE4DA0
26,288,512 UART: [art] SIG.R = 8FFE35D7532A4B9FD2AE0D0660E68C624A2FE315BD94809CF65BB135B1C185A44D50FF081F5B8ABD09E391A20E2F518D
26,295,960 UART: [art] SIG.S = 940258D6725956DE29310EB91715BECC7CBE8AB04A258EBE5C2BA86B567349F64B5DE6C38F603A6F7E87B825668F4D1D
27,274,761 UART: Caliptra RT
27,275,457 UART: [state] CFI Enabled
27,392,154 UART: [rt] RT listening for mailbox commands...
27,394,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,549,855 UART: [rt]cmd =0x41544d4e, len=14344
31,227,626 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,733 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,365 UART: [kat] SHA2-256
882,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,411 UART: [kat] ++
886,563 UART: [kat] sha1
890,815 UART: [kat] SHA2-256
892,753 UART: [kat] SHA2-384
895,418 UART: [kat] SHA2-512-ACC
897,319 UART: [kat] ECC-384
902,768 UART: [kat] HMAC-384Kdf
907,354 UART: [kat] LMS
1,475,550 UART: [kat] --
1,476,795 UART: [cold-reset] ++
1,477,349 UART: [fht] Storing FHT @ 0x50003400
1,480,204 UART: [idev] ++
1,480,372 UART: [idev] CDI.KEYID = 6
1,480,732 UART: [idev] SUBJECT.KEYID = 7
1,481,156 UART: [idev] UDS.KEYID = 0
1,481,501 ready_for_fw is high
1,481,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,910 UART: [idev] Erasing UDS.KEYID = 0
1,505,358 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,932 UART: [idev] --
1,515,021 UART: [ldev] ++
1,515,189 UART: [ldev] CDI.KEYID = 6
1,515,552 UART: [ldev] SUBJECT.KEYID = 5
1,515,978 UART: [ldev] AUTHORITY.KEYID = 7
1,516,441 UART: [ldev] FE.KEYID = 1
1,521,441 UART: [ldev] Erasing FE.KEYID = 1
1,546,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,726 UART: [ldev] --
1,586,079 UART: [fwproc] Waiting for Commands...
1,586,774 UART: [fwproc] Received command 0x46574c44
1,587,565 UART: [fwproc] Received Image of size 114168 bytes
5,269,900 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,298,096 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,327,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,462,985 >>> mbox cmd response: success
5,464,079 UART: [afmc] ++
5,464,247 UART: [afmc] CDI.KEYID = 6
5,464,609 UART: [afmc] SUBJECT.KEYID = 7
5,465,034 UART: [afmc] AUTHORITY.KEYID = 5
5,499,628 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,515,948 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,516,728 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,522,437 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,528,329 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,534,030 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,541,682 UART: [afmc] --
5,542,710 UART: [cold-reset] --
5,543,672 UART: [state] Locking Datavault
5,544,697 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,301 UART: [state] Locking ICCM
5,545,905 UART: [exit] Launching FMC @ 0x40000130
5,551,234 UART:
5,551,250 UART: Running Caliptra FMC ...
5,551,658 UART:
5,551,712 UART: [state] CFI Enabled
5,562,158 UART: [fht] FMC Alias Private Key: 7
5,670,234 UART: [art] Extend RT PCRs Done
5,670,662 UART: [art] Lock RT PCRs Done
5,672,080 UART: [art] Populate DV Done
5,680,194 UART: [fht] FMC Alias Private Key: 7
5,681,148 UART: [art] Derive CDI
5,681,428 UART: [art] Store in in slot 0x4
5,767,263 UART: [art] Derive Key Pair
5,767,623 UART: [art] Store priv key in slot 0x5
5,781,089 UART: [art] Derive Key Pair - Done
5,795,464 UART: [art] Signing Cert with AUTHO
5,795,944 UART: RITY.KEYID = 7
5,811,148 UART: [art] Erasing AUTHORITY.KEYID = 7
5,811,913 UART: [art] PUB.X = 1CDDBB7354F735EBD30DAC2E4E4CD195A758384460DAD89678F5F88CB55D701D334FBDD76490E0F7A943ADC52496C903
5,818,689 UART: [art] PUB.Y = C98BEC185A7F8BF4F81BBD844902B27C45A8DFDB782E81547D458946C914D1B2CF8D6EDE6A6677C503489DAB321C4083
5,825,643 UART: [art] SIG.R = BFBF4721323EAB3C3C594B4337014B051D1CE3589F54989038E47569CC3A0A0315746876D4706A672991FFDEAD80C0BC
5,832,401 UART: [art] SIG.S = EBA790EBFF55EA611E9C609276935663F36BAD98587AC3BBA318EF4C7166120DE08266F207B6AAE35DCF5BF1880049E8
5,855,890 UART: Caliptra RT
5,856,143 UART: [state] CFI Enabled
5,964,147 UART: [rt] RT listening for mailbox commands...
5,964,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,087,983 UART: [rt]cmd =0x41544d4e, len=14344
7,208,436 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,275 ready_for_fw is high
1,362,275 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,161,991 >>> mbox cmd response: success
5,223,268 UART:
5,223,284 UART: Running Caliptra FMC ...
5,223,692 UART:
5,223,746 UART: [state] CFI Enabled
5,234,596 UART: [fht] FMC Alias Private Key: 7
5,342,462 UART: [art] Extend RT PCRs Done
5,342,890 UART: [art] Lock RT PCRs Done
5,344,378 UART: [art] Populate DV Done
5,352,736 UART: [fht] FMC Alias Private Key: 7
5,353,812 UART: [art] Derive CDI
5,354,092 UART: [art] Store in in slot 0x4
5,440,027 UART: [art] Derive Key Pair
5,440,387 UART: [art] Store priv key in slot 0x5
5,454,253 UART: [art] Derive Key Pair - Done
5,469,007 UART: [art] Signing Cert with AUTHO
5,469,487 UART: RITY.KEYID = 7
5,484,371 UART: [art] Erasing AUTHORITY.KEYID = 7
5,485,136 UART: [art] PUB.X = 53271D89BEC6C747F7B135FD1BBDCB17E5ADCCA6CF36ACF894A1A65559EC2106CDB891F6BE7680AE3557EAD0C900A96D
5,491,905 UART: [art] PUB.Y = A534C3303E58266A810D5269EAEE47D80759B69B60987A3F2FA71ED96AFFE34E17E42DAFA2EB9A46609F1506657BC1AA
5,498,856 UART: [art] SIG.R = DDA02829F4C250D0701E922012FE7914E99642EFBFB29584666789936441EFD842C79FC8863ECF42E79DE569FC95D04A
5,505,626 UART: [art] SIG.S = 65B64B730B9E67AF02334CCB1D81A39D348A805837652BC6D5D7CE442D3F3024BF28749582E612CF6790DA6B4E1A6018
5,529,559 UART: Caliptra RT
5,529,812 UART: [state] CFI Enabled
5,638,895 UART: [rt] RT listening for mailbox commands...
5,639,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,762,805 UART: [rt]cmd =0x41544d4e, len=14344
6,898,234 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,310 UART: [kat] SHA2-256
882,241 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,356 UART: [kat] ++
886,508 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,431 UART: [kat] SHA2-512-ACC
897,332 UART: [kat] ECC-384
902,793 UART: [kat] HMAC-384Kdf
907,527 UART: [kat] LMS
1,475,723 UART: [kat] --
1,476,668 UART: [cold-reset] ++
1,477,118 UART: [fht] Storing FHT @ 0x50003400
1,479,977 UART: [idev] ++
1,480,145 UART: [idev] CDI.KEYID = 6
1,480,505 UART: [idev] SUBJECT.KEYID = 7
1,480,929 UART: [idev] UDS.KEYID = 0
1,481,274 ready_for_fw is high
1,481,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,277 UART: [idev] Erasing UDS.KEYID = 0
1,505,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,461 UART: [idev] --
1,515,456 UART: [ldev] ++
1,515,624 UART: [ldev] CDI.KEYID = 6
1,515,987 UART: [ldev] SUBJECT.KEYID = 5
1,516,413 UART: [ldev] AUTHORITY.KEYID = 7
1,516,876 UART: [ldev] FE.KEYID = 1
1,522,284 UART: [ldev] Erasing FE.KEYID = 1
1,548,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,929 UART: [ldev] --
1,587,270 UART: [fwproc] Waiting for Commands...
1,587,969 UART: [fwproc] Received command 0x46574c44
1,588,760 UART: [fwproc] Received Image of size 114168 bytes
5,157,724 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,185,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,214,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,350,573 >>> mbox cmd response: success
5,351,597 UART: [afmc] ++
5,351,765 UART: [afmc] CDI.KEYID = 6
5,352,127 UART: [afmc] SUBJECT.KEYID = 7
5,352,552 UART: [afmc] AUTHORITY.KEYID = 5
5,387,978 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,404,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,405,278 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,410,987 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,416,879 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,422,580 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,430,450 UART: [afmc] --
5,431,396 UART: [cold-reset] --
5,432,282 UART: [state] Locking Datavault
5,433,413 UART: [state] Locking PCR0, PCR1 and PCR31
5,434,017 UART: [state] Locking ICCM
5,434,629 UART: [exit] Launching FMC @ 0x40000130
5,439,958 UART:
5,439,974 UART: Running Caliptra FMC ...
5,440,382 UART:
5,440,525 UART: [state] CFI Enabled
5,451,185 UART: [fht] FMC Alias Private Key: 7
5,559,093 UART: [art] Extend RT PCRs Done
5,559,521 UART: [art] Lock RT PCRs Done
5,560,695 UART: [art] Populate DV Done
5,569,037 UART: [fht] FMC Alias Private Key: 7
5,570,115 UART: [art] Derive CDI
5,570,395 UART: [art] Store in in slot 0x4
5,656,108 UART: [art] Derive Key Pair
5,656,468 UART: [art] Store priv key in slot 0x5
5,669,268 UART: [art] Derive Key Pair - Done
5,684,032 UART: [art] Signing Cert with AUTHO
5,684,512 UART: RITY.KEYID = 7
5,699,440 UART: [art] Erasing AUTHORITY.KEYID = 7
5,700,205 UART: [art] PUB.X = 49434F8477471250C427ECB89317DEE2EF2E09AD688F011B9828F7BF1478001E9819E894D06DE8059BE9ACB09C262CC5
5,706,944 UART: [art] PUB.Y = B456299379247B6CEBC02D6B6A49A8F02DB4BC87A32EF89824265A5B768CE7429B502A33DA780697DD5618854A521FCA
5,713,893 UART: [art] SIG.R = 7C75706105725F3F9A23379C115FEFA7E60B8E12A6C4030E61A98C232736549FFD59C709C93749A0A4580494D848208C
5,720,635 UART: [art] SIG.S = E778827F79E9613CDEA0C9976648ED79554A95DFD00D74C70FDBA6092C2947926E3D14B3FC487AB91B15E29C8A720EE3
5,744,414 UART: Caliptra RT
5,744,759 UART: [state] CFI Enabled
5,852,066 UART: [rt] RT listening for mailbox commands...
5,852,736 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,712 UART: [rt]cmd =0x41544d4e, len=14344
7,103,356 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,752 ready_for_fw is high
1,362,752 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,087,144 >>> mbox cmd response: success
5,148,591 UART:
5,148,607 UART: Running Caliptra FMC ...
5,149,015 UART:
5,149,158 UART: [state] CFI Enabled
5,159,804 UART: [fht] FMC Alias Private Key: 7
5,267,736 UART: [art] Extend RT PCRs Done
5,268,164 UART: [art] Lock RT PCRs Done
5,269,966 UART: [art] Populate DV Done
5,278,394 UART: [fht] FMC Alias Private Key: 7
5,279,432 UART: [art] Derive CDI
5,279,712 UART: [art] Store in in slot 0x4
5,365,613 UART: [art] Derive Key Pair
5,365,973 UART: [art] Store priv key in slot 0x5
5,379,267 UART: [art] Derive Key Pair - Done
5,394,354 UART: [art] Signing Cert with AUTHO
5,394,834 UART: RITY.KEYID = 7
5,410,080 UART: [art] Erasing AUTHORITY.KEYID = 7
5,410,845 UART: [art] PUB.X = 1C4D623B38E8A5B35F90315D55E9CA1D70F816D8F22407823B1B3967208D13CF9A4289BE0241A5F8BC717879C18E25AD
5,417,609 UART: [art] PUB.Y = 7C552962F9FC26F91E5E281B8182C42F5CEE48B298A4B5089D34F4D394AD968773AC2CACB0F49AC2D29F628E3F0CE1EE
5,424,567 UART: [art] SIG.R = A792860A4EE235CE6E19FBDA11D1BDDAEC531EDB563E02804825B8A3C6114DBFC66125FD460BCA8B320AAF4DC0DDC5C0
5,431,351 UART: [art] SIG.S = 1928D0DF2051FA10D89ABC810B2EB3BE8681F886DA6AC4A784F2E5E97586182F4B149F5E2D803F95E648B80CF5AD113D
5,454,838 UART: Caliptra RT
5,455,183 UART: [state] CFI Enabled
5,564,856 UART: [rt] RT listening for mailbox commands...
5,565,526 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,688,342 UART: [rt]cmd =0x41544d4e, len=14344
6,810,658 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
892,878 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,003 UART: [kat] ++
897,155 UART: [kat] sha1
901,275 UART: [kat] SHA2-256
903,215 UART: [kat] SHA2-384
906,102 UART: [kat] SHA2-512-ACC
908,003 UART: [kat] ECC-384
918,004 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,171,897 UART: [cold-reset] ++
1,172,341 UART: [fht] FHT @ 0x50003400
1,175,050 UART: [idev] ++
1,175,218 UART: [idev] CDI.KEYID = 6
1,175,578 UART: [idev] SUBJECT.KEYID = 7
1,176,002 UART: [idev] UDS.KEYID = 0
1,176,347 ready_for_fw is high
1,176,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,486 UART: [idev] Erasing UDS.KEYID = 0
1,202,287 UART: [idev] Sha1 KeyId Algorithm
1,210,927 UART: [idev] --
1,211,743 UART: [ldev] ++
1,211,911 UART: [ldev] CDI.KEYID = 6
1,212,274 UART: [ldev] SUBJECT.KEYID = 5
1,212,700 UART: [ldev] AUTHORITY.KEYID = 7
1,213,163 UART: [ldev] FE.KEYID = 1
1,218,265 UART: [ldev] Erasing FE.KEYID = 1
1,244,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,479 UART: [ldev] --
1,283,820 UART: [fwproc] Wait for Commands...
1,284,516 UART: [fwproc] Recv command 0x46574c44
1,285,244 UART: [fwproc] Recv'd Img size: 114168 bytes
3,124,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,575 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,879 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,316,450 >>> mbox cmd response: success
3,317,544 UART: [afmc] ++
3,317,712 UART: [afmc] CDI.KEYID = 6
3,318,074 UART: [afmc] SUBJECT.KEYID = 7
3,318,499 UART: [afmc] AUTHORITY.KEYID = 5
3,353,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,890 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,599 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,491 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,202 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,033 UART: [afmc] --
3,397,003 UART: [cold-reset] --
3,398,067 UART: [state] Locking Datavault
3,399,120 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,724 UART: [state] Locking ICCM
3,400,240 UART: [exit] Launching FMC @ 0x40000130
3,405,569 UART:
3,405,585 UART: Running Caliptra FMC ...
3,405,993 UART:
3,406,047 UART: [state] CFI Enabled
3,416,627 UART: [fht] FMC Alias Private Key: 7
3,525,013 UART: [art] Extend RT PCRs Done
3,525,441 UART: [art] Lock RT PCRs Done
3,526,765 UART: [art] Populate DV Done
3,535,171 UART: [fht] FMC Alias Private Key: 7
3,536,345 UART: [art] Derive CDI
3,536,625 UART: [art] Store in in slot 0x4
3,622,434 UART: [art] Derive Key Pair
3,622,794 UART: [art] Store priv key in slot 0x5
3,635,756 UART: [art] Derive Key Pair - Done
3,650,608 UART: [art] Signing Cert with AUTHO
3,651,088 UART: RITY.KEYID = 7
3,666,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,417 UART: [art] PUB.X = 2DF6C4485D33A58C664AF0D663D47E85C13F2D103C21BE0F70D7773E43A0289F187EA8E6CC69774C6A03F020AC48C6CB
3,674,189 UART: [art] PUB.Y = B5099593E5856B4292687E77528C35C01166D120928DE5B6FEC10E4C969DC18916A76B73E5FC3779C3AEEA80405B4C76
3,681,129 UART: [art] SIG.R = 1276154934066C39B0DDCB9144EAD4FD8724013D248310B2D994C9EF1FCA9803F610DA05D6BA8C25DAF74E75B9120EA0
3,687,890 UART: [art] SIG.S = 9A5416B34A8C5793944705F6D833F9F051C7A9D1FFA8A9473CA1BBCD5EFE57F35D1C8E737271B2699102509EE9F64CC8
3,711,597 UART: Caliptra RT
3,711,850 UART: [state] CFI Enabled
3,819,616 UART: [rt] RT listening for mailbox commands...
3,820,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,172 UART: [rt]cmd =0x41544d4e, len=14344
5,068,559 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,775 ready_for_fw is high
1,060,775 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,174,498 >>> mbox cmd response: success
3,236,143 UART:
3,236,159 UART: Running Caliptra FMC ...
3,236,567 UART:
3,236,621 UART: [state] CFI Enabled
3,246,895 UART: [fht] FMC Alias Private Key: 7
3,354,215 UART: [art] Extend RT PCRs Done
3,354,643 UART: [art] Lock RT PCRs Done
3,356,023 UART: [art] Populate DV Done
3,364,025 UART: [fht] FMC Alias Private Key: 7
3,365,183 UART: [art] Derive CDI
3,365,463 UART: [art] Store in in slot 0x4
3,451,008 UART: [art] Derive Key Pair
3,451,368 UART: [art] Store priv key in slot 0x5
3,465,104 UART: [art] Derive Key Pair - Done
3,480,125 UART: [art] Signing Cert with AUTHO
3,480,605 UART: RITY.KEYID = 7
3,495,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,526 UART: [art] PUB.X = 15ECB51FF3C4854632FBFD07B1927B4C7BC6EEB0CC3187ECE35B60F0302D596FE6DA2688C04EBDBA3DBE3FF61B4D79D9
3,503,319 UART: [art] PUB.Y = 886FB6481746FEE6591AC9334A23C8B16965DD90A962FFB991FF6F2311FA31A0FF07D0AC94C6AC7451D2208354E3F91D
3,510,272 UART: [art] SIG.R = A44595CC13BF91A54459C7C7639769E3DECD980AB66873E6ACD36A060C4082335916FEA530322EAFEC4C2115BEA036D7
3,517,039 UART: [art] SIG.S = 398CE32EAA16378E37F5E7E04930B989F76BA1724BEF2A7AE12DD8CE9421C840A8906BCC09AB16549C27EC9155A4A218
3,541,097 UART: Caliptra RT
3,541,350 UART: [state] CFI Enabled
3,648,732 UART: [rt] RT listening for mailbox commands...
3,649,402 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,458 UART: [rt]cmd =0x41544d4e, len=14344
4,897,115 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
893,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,700 UART: [kat] ++
897,852 UART: [kat] sha1
902,028 UART: [kat] SHA2-256
903,968 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
918,259 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,272 UART: [cold-reset] ++
1,172,762 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 ready_for_fw is high
1,176,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,021 UART: [idev] Erasing UDS.KEYID = 0
1,201,270 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,694 UART: [ldev] ++
1,210,862 UART: [ldev] CDI.KEYID = 6
1,211,225 UART: [ldev] SUBJECT.KEYID = 5
1,211,651 UART: [ldev] AUTHORITY.KEYID = 7
1,212,114 UART: [ldev] FE.KEYID = 1
1,217,226 UART: [ldev] Erasing FE.KEYID = 1
1,243,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,562 UART: [ldev] --
1,282,969 UART: [fwproc] Wait for Commands...
1,283,539 UART: [fwproc] Recv command 0x46574c44
1,284,267 UART: [fwproc] Recv'd Img size: 114168 bytes
3,126,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,318,965 >>> mbox cmd response: success
3,319,997 UART: [afmc] ++
3,320,165 UART: [afmc] CDI.KEYID = 6
3,320,527 UART: [afmc] SUBJECT.KEYID = 7
3,320,952 UART: [afmc] AUTHORITY.KEYID = 5
3,356,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,629 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,338 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,230 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,941 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,950 UART: [afmc] --
3,399,834 UART: [cold-reset] --
3,400,706 UART: [state] Locking Datavault
3,402,161 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,765 UART: [state] Locking ICCM
3,403,317 UART: [exit] Launching FMC @ 0x40000130
3,408,646 UART:
3,408,662 UART: Running Caliptra FMC ...
3,409,070 UART:
3,409,213 UART: [state] CFI Enabled
3,419,679 UART: [fht] FMC Alias Private Key: 7
3,526,803 UART: [art] Extend RT PCRs Done
3,527,231 UART: [art] Lock RT PCRs Done
3,528,673 UART: [art] Populate DV Done
3,537,037 UART: [fht] FMC Alias Private Key: 7
3,537,975 UART: [art] Derive CDI
3,538,255 UART: [art] Store in in slot 0x4
3,624,010 UART: [art] Derive Key Pair
3,624,370 UART: [art] Store priv key in slot 0x5
3,637,518 UART: [art] Derive Key Pair - Done
3,652,188 UART: [art] Signing Cert with AUTHO
3,652,668 UART: RITY.KEYID = 7
3,668,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,073 UART: [art] PUB.X = A34A3FA676AA6130ACDD4F4FE77C8755BB7A85D8A31D2F24E12FAC995E6C130DE0099027B63C2FA93565DA785AEAE5B4
3,675,855 UART: [art] PUB.Y = 054A92DC0FB71B183301999602E2CC7B643D168432942D1989FBC1F14AF451A0D27A754CDEB69774D7BF27A20711AC39
3,682,790 UART: [art] SIG.R = 6D63C89AB97D08FC33DF718FAEFAB12A0F4DD233160329E58CA4530C1051607C80D1814D022D29B4A383B741865B33B4
3,689,547 UART: [art] SIG.S = 3E3BBF02F13BACB99DABC7A06397D11F4980E0F48F7A48D3FEFD11130E6C18C6F68AC4A6C60713F5231920491339062A
3,713,042 UART: Caliptra RT
3,713,387 UART: [state] CFI Enabled
3,820,902 UART: [rt] RT listening for mailbox commands...
3,821,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,606 UART: [rt]cmd =0x41544d4e, len=14344
5,074,349 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,498 ready_for_fw is high
1,060,498 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,176,730 >>> mbox cmd response: success
3,238,959 UART:
3,238,975 UART: Running Caliptra FMC ...
3,239,383 UART:
3,239,526 UART: [state] CFI Enabled
3,249,792 UART: [fht] FMC Alias Private Key: 7
3,357,426 UART: [art] Extend RT PCRs Done
3,357,854 UART: [art] Lock RT PCRs Done
3,359,134 UART: [art] Populate DV Done
3,367,258 UART: [fht] FMC Alias Private Key: 7
3,368,344 UART: [art] Derive CDI
3,368,624 UART: [art] Store in in slot 0x4
3,454,483 UART: [art] Derive Key Pair
3,454,843 UART: [art] Store priv key in slot 0x5
3,468,161 UART: [art] Derive Key Pair - Done
3,482,502 UART: [art] Signing Cert with AUTHO
3,482,982 UART: RITY.KEYID = 7
3,497,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,715 UART: [art] PUB.X = ECE85EDE99B3535B3303C8477A9D4D19F02CCC5B55F85A4BD7F44ED80A9EDEA919F2B793B9CCFF2BD84EA66E8EB6F163
3,505,505 UART: [art] PUB.Y = C076FAF50C5DBCABDA021FBD217A2D27258D639399DA9331DE09014DF46EBE4455F8C5E0684721A883AF988569C593EC
3,512,453 UART: [art] SIG.R = 8568DF5CD27FDBE3599E01274E2127A3C90D5EBE24F4E9F54BB715BADC06D229E6206A4CE03EF6D5F04F8756FEA3A692
3,519,230 UART: [art] SIG.S = 1BAD1745CA5679216EEB17CFFAC273B8D806904B2A98F5720A5A28B3832DC0680E89CACE2E13927657D5B62098DBE665
3,543,210 UART: Caliptra RT
3,543,555 UART: [state] CFI Enabled
3,650,211 UART: [rt] RT listening for mailbox commands...
3,650,881 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,949 UART: [rt]cmd =0x41544d4e, len=14344
4,896,427 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,175 UART: [kat] SHA2-256
902,115 UART: [kat] SHA2-384
904,984 UART: [kat] SHA2-512-ACC
906,885 UART: [kat] ECC-384
915,964 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,169,825 UART: [cold-reset] ++
1,170,195 UART: [fht] FHT @ 0x50003400
1,172,689 UART: [idev] ++
1,172,857 UART: [idev] CDI.KEYID = 6
1,173,218 UART: [idev] SUBJECT.KEYID = 7
1,173,643 UART: [idev] UDS.KEYID = 0
1,173,989 ready_for_fw is high
1,173,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,755 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,478 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,740 UART: [ldev] --
1,281,228 UART: [fwproc] Wait for Commands...
1,281,941 UART: [fwproc] Recv command 0x46574c44
1,282,674 UART: [fwproc] Recv'd Img size: 114168 bytes
3,120,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,947 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,313,603 >>> mbox cmd response: success
3,314,852 UART: [afmc] ++
3,315,020 UART: [afmc] CDI.KEYID = 6
3,315,383 UART: [afmc] SUBJECT.KEYID = 7
3,315,809 UART: [afmc] AUTHORITY.KEYID = 5
3,351,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,544 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,254 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,144 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,855 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,789 UART: [afmc] --
3,395,711 UART: [cold-reset] --
3,396,553 UART: [state] Locking Datavault
3,397,994 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,598 UART: [state] Locking ICCM
3,399,268 UART: [exit] Launching FMC @ 0x40000130
3,404,597 UART:
3,404,613 UART: Running Caliptra FMC ...
3,405,021 UART:
3,405,075 UART: [state] CFI Enabled
3,415,439 UART: [fht] FMC Alias Private Key: 7
3,522,813 UART: [art] Extend RT PCRs Done
3,523,241 UART: [art] Lock RT PCRs Done
3,524,747 UART: [art] Populate DV Done
3,533,253 UART: [fht] FMC Alias Private Key: 7
3,534,369 UART: [art] Derive CDI
3,534,649 UART: [art] Store in in slot 0x4
3,620,518 UART: [art] Derive Key Pair
3,620,878 UART: [art] Store priv key in slot 0x5
3,633,770 UART: [art] Derive Key Pair - Done
3,648,484 UART: [art] Signing Cert with AUTHO
3,648,964 UART: RITY.KEYID = 7
3,663,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,713 UART: [art] PUB.X = EC54388DBA8EF4BCF2E003487804D1026B0448D48B425772B3E4DA00F1DC43290B06A3F6B11C4C674A5B9CD4F2226541
3,671,447 UART: [art] PUB.Y = B9620804C092678CDE36C3349808BA4B514DA6DA333F83F0265561E3E60A15368CDE218F86DAB3BBC809B0C3162DD17F
3,678,386 UART: [art] SIG.R = 18CA43AC1CAF878F6EF75516E0399A45FF56BB68E908383162C202066039FB80CD9D5E9C4B211148CB64C159E2238435
3,685,145 UART: [art] SIG.S = AB0BC25DF9495C41DBFD661D4D7AB02AA4C90C31E3E038578452BE86EACF7A82018BA0F2B966CE1AF605C8B6FEF30EE1
3,708,713 UART: Caliptra RT
3,708,966 UART: [state] CFI Enabled
3,816,992 UART: [rt] RT listening for mailbox commands...
3,817,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,822 UART: [rt]cmd =0x41544d4e, len=14344
5,058,254 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,444 ready_for_fw is high
1,055,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,172,033 >>> mbox cmd response: success
3,233,510 UART:
3,233,526 UART: Running Caliptra FMC ...
3,233,934 UART:
3,233,988 UART: [state] CFI Enabled
3,244,692 UART: [fht] FMC Alias Private Key: 7
3,352,552 UART: [art] Extend RT PCRs Done
3,352,980 UART: [art] Lock RT PCRs Done
3,354,588 UART: [art] Populate DV Done
3,362,908 UART: [fht] FMC Alias Private Key: 7
3,364,014 UART: [art] Derive CDI
3,364,294 UART: [art] Store in in slot 0x4
3,449,887 UART: [art] Derive Key Pair
3,450,247 UART: [art] Store priv key in slot 0x5
3,463,165 UART: [art] Derive Key Pair - Done
3,477,829 UART: [art] Signing Cert with AUTHO
3,478,309 UART: RITY.KEYID = 7
3,493,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,110 UART: [art] PUB.X = FCF60D464671444EAB6765FE3F349117990BE2E7B1EC62E6AD3118DCBCB04382CE287B9DEE0514FF957BD2777FD925D8
3,500,883 UART: [art] PUB.Y = B4AC76F822D5D4B036520E1F0C3B6BBF7B66DDB2AB2826A51F76AD45A1308829C00FA3E96C752A70C30C03164A71F979
3,507,826 UART: [art] SIG.R = 5FAF2F2C238CB20AB6A59BCFE14A5C4590FC676ECC33459B6C6404442EF6646E2AE194DFA7A509ABCF34155C1D8D8786
3,514,603 UART: [art] SIG.S = FA2DCD2A216B0F27E564794D2222D46E9ECCB137A7A7F65BC3566D7AAA78535FB857FB4EAA4371CF846C194141680CF5
3,538,050 UART: Caliptra RT
3,538,303 UART: [state] CFI Enabled
3,646,033 UART: [rt] RT listening for mailbox commands...
3,646,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,839 UART: [rt]cmd =0x41544d4e, len=14344
4,897,589 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,907 UART: [state] LifecycleState = Unprovisioned
86,562 UART: [state] DebugLocked = No
87,052 UART: [state] WD Timer not started. Device not locked for debugging
88,405 UART: [kat] SHA2-256
891,955 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,084 UART: [kat] ++
896,236 UART: [kat] sha1
900,462 UART: [kat] SHA2-256
902,402 UART: [kat] SHA2-384
905,179 UART: [kat] SHA2-512-ACC
907,080 UART: [kat] ECC-384
916,917 UART: [kat] HMAC-384Kdf
921,559 UART: [kat] LMS
1,169,871 UART: [kat] --
1,171,104 UART: [cold-reset] ++
1,171,576 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,711 UART: [idev] SUBJECT.KEYID = 7
1,175,136 UART: [idev] UDS.KEYID = 0
1,175,482 ready_for_fw is high
1,175,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,554 UART: [idev] Sha1 KeyId Algorithm
1,209,410 UART: [idev] --
1,210,445 UART: [ldev] ++
1,210,613 UART: [ldev] CDI.KEYID = 6
1,210,977 UART: [ldev] SUBJECT.KEYID = 5
1,211,404 UART: [ldev] AUTHORITY.KEYID = 7
1,211,867 UART: [ldev] FE.KEYID = 1
1,217,177 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,111 UART: [ldev] --
1,282,415 UART: [fwproc] Wait for Commands...
1,283,126 UART: [fwproc] Recv command 0x46574c44
1,283,859 UART: [fwproc] Recv'd Img size: 114168 bytes
3,126,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,109 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,320,068 >>> mbox cmd response: success
3,321,275 UART: [afmc] ++
3,321,443 UART: [afmc] CDI.KEYID = 6
3,321,806 UART: [afmc] SUBJECT.KEYID = 7
3,322,232 UART: [afmc] AUTHORITY.KEYID = 5
3,358,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,521 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,231 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,121 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,832 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,492 UART: [afmc] --
3,401,376 UART: [cold-reset] --
3,402,104 UART: [state] Locking Datavault
3,403,077 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,681 UART: [state] Locking ICCM
3,404,247 UART: [exit] Launching FMC @ 0x40000130
3,409,576 UART:
3,409,592 UART: Running Caliptra FMC ...
3,410,000 UART:
3,410,143 UART: [state] CFI Enabled
3,420,423 UART: [fht] FMC Alias Private Key: 7
3,528,229 UART: [art] Extend RT PCRs Done
3,528,657 UART: [art] Lock RT PCRs Done
3,530,363 UART: [art] Populate DV Done
3,538,457 UART: [fht] FMC Alias Private Key: 7
3,539,609 UART: [art] Derive CDI
3,539,889 UART: [art] Store in in slot 0x4
3,625,604 UART: [art] Derive Key Pair
3,625,964 UART: [art] Store priv key in slot 0x5
3,639,704 UART: [art] Derive Key Pair - Done
3,654,457 UART: [art] Signing Cert with AUTHO
3,654,937 UART: RITY.KEYID = 7
3,670,205 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,970 UART: [art] PUB.X = 6E6361171EED21ED33576AB22C3AA80AD6308EB3A484C9AA1F8D70B980D6019A750793CCAA19F86EE8A41A3A0AF6140C
3,677,737 UART: [art] PUB.Y = 49170A9A807E184D3909579ACA912CBC7C5C33172FAC5943861A36A782C971654DAC139DCAA62FC37C97DB09F0C3A62C
3,684,684 UART: [art] SIG.R = 0F5A4FEFBAB32DE0EA39F7A8E67A7B698238C9C6683A82D6370CA6F7F1A7F6B8195161658E0CC651C4498595C244CC94
3,691,453 UART: [art] SIG.S = B258028254FB82E033E6BC22BFA2873D98269C55532A61E36D2A8D26BCE056E787BFDC514114833196BF943E57875BEE
3,714,507 UART: Caliptra RT
3,714,852 UART: [state] CFI Enabled
3,823,074 UART: [rt] RT listening for mailbox commands...
3,823,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,780 UART: [rt]cmd =0x41544d4e, len=14344
5,067,019 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,507 ready_for_fw is high
1,056,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,163,146 >>> mbox cmd response: success
3,225,243 UART:
3,225,259 UART: Running Caliptra FMC ...
3,225,667 UART:
3,225,810 UART: [state] CFI Enabled
3,236,202 UART: [fht] FMC Alias Private Key: 7
3,344,266 UART: [art] Extend RT PCRs Done
3,344,694 UART: [art] Lock RT PCRs Done
3,346,430 UART: [art] Populate DV Done
3,354,766 UART: [fht] FMC Alias Private Key: 7
3,355,876 UART: [art] Derive CDI
3,356,156 UART: [art] Store in in slot 0x4
3,441,877 UART: [art] Derive Key Pair
3,442,237 UART: [art] Store priv key in slot 0x5
3,455,007 UART: [art] Derive Key Pair - Done
3,469,656 UART: [art] Signing Cert with AUTHO
3,470,136 UART: RITY.KEYID = 7
3,485,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,875 UART: [art] PUB.X = 37E09E334F970AA12607DE6794FCECCB84390DE6C66854FE205813F5D8358EC9392AAC7FE704E5ED85241A7ADAA001D5
3,492,640 UART: [art] PUB.Y = 945786F36722778F4C872583E2DAA68609CB34AF129403A4AD7872DC9481DBD3C07314A48FFB7C80DA41BF99897D0820
3,499,579 UART: [art] SIG.R = E93A5BBA32823C7F940105DA9F0AB01E6F0EA5B20A03404D23F164DA30BA4E303A4014BDBBAF9479F823423E1F80CE22
3,506,343 UART: [art] SIG.S = 1C680E2C9B7A9B7687E25C49AAA451438E848E7633B6B86EDBD35581C3AA3AC092E892195571407BEFC21270B377236B
3,530,161 UART: Caliptra RT
3,530,506 UART: [state] CFI Enabled
3,638,288 UART: [rt] RT listening for mailbox commands...
3,638,958 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,761,802 UART: [rt]cmd =0x41544d4e, len=14344
4,886,853 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,045 UART:
192,410 UART: Running Caliptra ROM ...
193,572 UART:
193,724 UART: [state] CFI Enabled
264,671 UART: [state] LifecycleState = Unprovisioned
266,659 UART: [state] DebugLocked = No
268,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,970 UART: [kat] SHA2-256
443,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,196 UART: [kat] ++
454,650 UART: [kat] sha1
465,803 UART: [kat] SHA2-256
468,449 UART: [kat] SHA2-384
474,646 UART: [kat] SHA2-512-ACC
477,005 UART: [kat] ECC-384
2,766,844 UART: [kat] HMAC-384Kdf
2,780,433 UART: [kat] LMS
3,970,758 UART: [kat] --
3,976,109 UART: [cold-reset] ++
3,977,333 UART: [fht] Storing FHT @ 0x50003400
3,989,020 UART: [idev] ++
3,989,588 UART: [idev] CDI.KEYID = 6
3,990,503 UART: [idev] SUBJECT.KEYID = 7
3,991,738 UART: [idev] UDS.KEYID = 0
3,992,842 ready_for_fw is high
3,993,070 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,136,351 UART: [idev] Erasing UDS.KEYID = 0
7,326,628 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,147 UART: [idev] --
7,351,244 UART: [ldev] ++
7,351,804 UART: [ldev] CDI.KEYID = 6
7,352,810 UART: [ldev] SUBJECT.KEYID = 5
7,353,960 UART: [ldev] AUTHORITY.KEYID = 7
7,355,233 UART: [ldev] FE.KEYID = 1
7,402,229 UART: [ldev] Erasing FE.KEYID = 1
10,734,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,222 UART: [ldev] --
13,096,061 UART: [fwproc] Waiting for Commands...
13,097,991 UART: [fwproc] Received command 0x46574c44
13,100,171 UART: [fwproc] Received Image of size 113844 bytes
21,409,430 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,479,019 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,547,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,864,716 >>> mbox cmd response: success
21,868,338 UART: [afmc] ++
21,868,932 UART: [afmc] CDI.KEYID = 6
21,869,901 UART: [afmc] SUBJECT.KEYID = 7
21,871,110 UART: [afmc] AUTHORITY.KEYID = 5
25,241,620 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,543,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,545,613 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,560,187 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,574,926 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,589,139 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,610,682 UART: [afmc] --
27,614,374 UART: [cold-reset] --
27,617,360 UART: [state] Locking Datavault
27,625,524 UART: [state] Locking PCR0, PCR1 and PCR31
27,627,274 UART: [state] Locking ICCM
27,629,630 UART: [exit] Launching FMC @ 0x40000130
27,638,025 UART:
27,638,298 UART: Running Caliptra FMC ...
27,639,326 UART:
27,639,468 UART: [state] CFI Enabled
27,703,041 UART: [fht] FMC Alias Private Key: 7
30,041,050 UART: [art] Extend RT PCRs Done
30,042,274 UART: [art] Lock RT PCRs Done
30,043,946 UART: [art] Populate DV Done
30,049,536 UART: [fht] FMC Alias Private Key: 7
30,051,295 UART: [art] Derive CDI
30,052,126 UART: [art] Store in in slot 0x4
30,111,088 UART: [art] Derive Key Pair
30,112,081 UART: [art] Store priv key in slot 0x5
33,405,586 UART: [art] Derive Key Pair - Done
33,418,478 UART: [art] Signing Cert with AUTHO
33,419,776 UART: RITY.KEYID = 7
35,707,385 UART: [art] Erasing AUTHORITY.KEYID = 7
35,708,887 UART: [art] PUB.X = 0F00284E1C1501AAB6779963FC62C820257622134D4D96DACE16F7AD8B08858230428B7E4BBA12920E8A39827AD5318F
35,716,313 UART: [art] PUB.Y = A5065AE2D1EC0C731F7B6FA2D89F669D233F54981076B1EEB68496CA8CF45F60ED621F71D4261CC001E69DB7EB90C424
35,723,378 UART: [art] SIG.R = C5201DCC7D92D2E8FE6A59604388C698BB8B95137A37770F0729BDA4EDC8E868E7A3402323F20127EBE3B0B0367FB4CE
35,730,802 UART: [art] SIG.S = 9A4AB40CB582B01DE38227CFC2912F60F2EDBDC10249490F2D2AB80A8A617DF1FDBF7BED442C218EB1AC9EB854B7741E
37,036,521 UART: Caliptra RT
37,037,238 UART: [state] CFI Enabled
37,198,045 UART: [rt] RT listening for mailbox commands...
37,200,394 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,355,763 UART: [rt]cmd =0x41544d4e, len=14344
43,728,122 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,803,785 ready_for_fw is high
3,804,194 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,076,861 >>> mbox cmd response: success
27,765,112 UART:
27,765,502 UART: Running Caliptra FMC ...
27,766,625 UART:
27,766,780 UART: [state] CFI Enabled
27,837,915 UART: [fht] FMC Alias Private Key: 7
30,175,971 UART: [art] Extend RT PCRs Done
30,177,195 UART: [art] Lock RT PCRs Done
30,178,932 UART: [art] Populate DV Done
30,184,340 UART: [fht] FMC Alias Private Key: 7
30,185,982 UART: [art] Derive CDI
30,186,800 UART: [art] Store in in slot 0x4
30,245,627 UART: [art] Derive Key Pair
30,246,660 UART: [art] Store priv key in slot 0x5
33,539,094 UART: [art] Derive Key Pair - Done
33,552,106 UART: [art] Signing Cert with AUTHO
33,553,437 UART: RITY.KEYID = 7
35,840,565 UART: [art] Erasing AUTHORITY.KEYID = 7
35,842,073 UART: [art] PUB.X = 494B641D97B404374CA9C28AD695A2C7A809979188DAE6D640BBFD79D78A71C14C5E722C8147AA3700A6C4B3AB061D5F
35,849,308 UART: [art] PUB.Y = 0A942E532859F66A7BFE71B594968AFF9D5253154260F9F826AC5B1E91744A4F9BE5DC5A7A14909D89BDED9C7D455A81
35,856,518 UART: [art] SIG.R = 8BA1AB70D63D1A65F4DE9A26525B9915EEA21037DED2F403FDE9C5539AF1B6C57864E319D7BF80E3140C337832CA94C8
35,863,909 UART: [art] SIG.S = 63DEE9B13AC82E06F376A6E18C15E74ABE843C147CEF4AE94C6AD093984F96F96557C194798C1DAB0D5FFFBE6D3FB301
37,168,753 UART: Caliptra RT
37,169,461 UART: [state] CFI Enabled
37,331,354 UART: [rt] RT listening for mailbox commands...
37,333,694 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,489,045 UART: [rt]cmd =0x41544d4e, len=14344
43,731,909 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,673 UART:
193,034 UART: Running Caliptra ROM ...
194,156 UART:
604,009 UART: [state] CFI Enabled
617,893 UART: [state] LifecycleState = Unprovisioned
619,790 UART: [state] DebugLocked = No
621,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,472 UART: [kat] SHA2-256
795,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,761 UART: [kat] ++
806,245 UART: [kat] sha1
818,110 UART: [kat] SHA2-256
820,813 UART: [kat] SHA2-384
826,035 UART: [kat] SHA2-512-ACC
828,428 UART: [kat] ECC-384
3,112,401 UART: [kat] HMAC-384Kdf
3,125,202 UART: [kat] LMS
4,315,273 UART: [kat] --
4,318,416 UART: [cold-reset] ++
4,319,988 UART: [fht] Storing FHT @ 0x50003400
4,330,065 UART: [idev] ++
4,330,667 UART: [idev] CDI.KEYID = 6
4,331,580 UART: [idev] SUBJECT.KEYID = 7
4,332,826 UART: [idev] UDS.KEYID = 0
4,333,890 ready_for_fw is high
4,334,096 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,030 UART: [idev] Erasing UDS.KEYID = 0
7,617,230 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,602 UART: [idev] --
7,641,920 UART: [ldev] ++
7,642,510 UART: [ldev] CDI.KEYID = 6
7,643,477 UART: [ldev] SUBJECT.KEYID = 5
7,644,688 UART: [ldev] AUTHORITY.KEYID = 7
7,645,914 UART: [ldev] FE.KEYID = 1
7,659,100 UART: [ldev] Erasing FE.KEYID = 1
10,952,081 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,905 UART: [ldev] --
13,314,968 UART: [fwproc] Waiting for Commands...
13,317,010 UART: [fwproc] Received command 0x46574c44
13,319,199 UART: [fwproc] Received Image of size 113844 bytes
21,955,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,033,343 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,102,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,419,224 >>> mbox cmd response: success
22,423,414 UART: [afmc] ++
22,424,063 UART: [afmc] CDI.KEYID = 6
22,424,977 UART: [afmc] SUBJECT.KEYID = 7
22,426,196 UART: [afmc] AUTHORITY.KEYID = 5
25,740,890 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,034,670 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,036,925 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,051,499 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,066,259 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,080,475 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,102,982 UART: [afmc] --
28,106,424 UART: [cold-reset] --
28,110,988 UART: [state] Locking Datavault
28,115,912 UART: [state] Locking PCR0, PCR1 and PCR31
28,117,690 UART: [state] Locking ICCM
28,119,141 UART: [exit] Launching FMC @ 0x40000130
28,127,545 UART:
28,127,784 UART: Running Caliptra FMC ...
28,128,840 UART:
28,128,995 UART: [state] CFI Enabled
28,137,450 UART: [fht] FMC Alias Private Key: 7
30,467,403 UART: [art] Extend RT PCRs Done
30,468,630 UART: [art] Lock RT PCRs Done
30,470,315 UART: [art] Populate DV Done
30,475,676 UART: [fht] FMC Alias Private Key: 7
30,477,427 UART: [art] Derive CDI
30,478,241 UART: [art] Store in in slot 0x4
30,520,893 UART: [art] Derive Key Pair
30,521,933 UART: [art] Store priv key in slot 0x5
33,763,460 UART: [art] Derive Key Pair - Done
33,776,495 UART: [art] Signing Cert with AUTHO
33,777,833 UART: RITY.KEYID = 7
36,057,530 UART: [art] Erasing AUTHORITY.KEYID = 7
36,059,053 UART: [art] PUB.X = D7C076ED671D5741E089ED4819B17F77ABB8621779E6528A477C9034C6AFD5E716B767C946DA5D177C460E6E0E67D5CA
36,066,272 UART: [art] PUB.Y = EBD52B2ECA74DF4F474A8AF9223281B6268334573D15C6BADF3FEAFED003FD123A0B772A25A0B11D2FC7E9A77745714C
36,073,523 UART: [art] SIG.R = 0B0E7CDAF652CD6C196F5D3F0282FDC8A54C9BFCB7A75CFFDD75DF565C2A26424DA1FCBF6D85EE260934075C9607BC2B
36,080,931 UART: [art] SIG.S = 4CE99C6D003AD4345EB699AA907E7D6C5D630303C54ADAD1E26DCBC5012BAC1C6E4B06BF92658766DB2F71B5EE102AF3
37,385,111 UART: Caliptra RT
37,385,814 UART: [state] CFI Enabled
37,503,199 UART: [rt] RT listening for mailbox commands...
37,505,485 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,660,906 UART: [rt]cmd =0x41544d4e, len=14344
44,007,415 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,130,177 ready_for_fw is high
4,130,811 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,113,301 >>> mbox cmd response: success
27,745,104 UART:
27,745,501 UART: Running Caliptra FMC ...
27,746,620 UART:
27,746,774 UART: [state] CFI Enabled
27,754,858 UART: [fht] FMC Alias Private Key: 7
30,085,552 UART: [art] Extend RT PCRs Done
30,086,795 UART: [art] Lock RT PCRs Done
30,088,400 UART: [art] Populate DV Done
30,093,878 UART: [fht] FMC Alias Private Key: 7
30,095,369 UART: [art] Derive CDI
30,096,107 UART: [art] Store in in slot 0x4
30,138,748 UART: [art] Derive Key Pair
30,139,763 UART: [art] Store priv key in slot 0x5
33,381,371 UART: [art] Derive Key Pair - Done
33,394,213 UART: [art] Signing Cert with AUTHO
33,395,519 UART: RITY.KEYID = 7
35,675,027 UART: [art] Erasing AUTHORITY.KEYID = 7
35,676,533 UART: [art] PUB.X = FC0569C57658356DC2728A4B6BEBC09C1E54C4090BCA64DB5569E3979E8DCFD9FF509692266E25B44417CB678234E7B9
35,683,758 UART: [art] PUB.Y = 0BB60271FA8C6DBBA560A419124B9A23D8A4EDFFBE3A33D0145158C0831EE47D77A6F59FB3A3DD9E94597645D58502D8
35,690,995 UART: [art] SIG.R = A3CC2A9DB69E80896D5E4B6D4F05840F56E5AD9EAAF7610A6BDA643985B31B2A0D6964CBECAB886CF4E041D97FDA69CE
35,698,429 UART: [art] SIG.S = 00E7A0061E0AF781F1A0FB7BE3F90217B3986D981A845B656FCF708B4DA256D142F225BAE19C4A11A6DB8E5C59C7B856
37,003,462 UART: Caliptra RT
37,004,181 UART: [state] CFI Enabled
37,122,507 UART: [rt] RT listening for mailbox commands...
37,124,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,280,122 UART: [rt]cmd =0x41544d4e, len=14344
43,756,457 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,134 UART:
192,511 UART: Running Caliptra ROM ...
193,607 UART:
193,754 UART: [state] CFI Enabled
262,142 UART: [state] LifecycleState = Unprovisioned
264,004 UART: [state] DebugLocked = No
265,689 UART: [state] WD Timer not started. Device not locked for debugging
268,687 UART: [kat] SHA2-256
447,794 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,407 UART: [kat] ++
459,857 UART: [kat] sha1
470,234 UART: [kat] SHA2-256
473,232 UART: [kat] SHA2-384
479,007 UART: [kat] SHA2-512-ACC
482,028 UART: [kat] ECC-384
2,927,010 UART: [kat] HMAC-384Kdf
2,949,168 UART: [kat] LMS
3,478,571 UART: [kat] --
3,482,490 UART: [cold-reset] ++
3,484,420 UART: [fht] FHT @ 0x50003400
3,494,466 UART: [idev] ++
3,495,027 UART: [idev] CDI.KEYID = 6
3,495,949 UART: [idev] SUBJECT.KEYID = 7
3,497,119 UART: [idev] UDS.KEYID = 0
3,498,045 ready_for_fw is high
3,498,285 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,641,939 UART: [idev] Erasing UDS.KEYID = 0
6,002,536 UART: [idev] Sha1 KeyId Algorithm
6,024,893 UART: [idev] --
6,028,543 UART: [ldev] ++
6,029,122 UART: [ldev] CDI.KEYID = 6
6,030,009 UART: [ldev] SUBJECT.KEYID = 5
6,031,230 UART: [ldev] AUTHORITY.KEYID = 7
6,032,472 UART: [ldev] FE.KEYID = 1
6,078,257 UART: [ldev] Erasing FE.KEYID = 1
8,582,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,365 UART: [ldev] --
10,389,594 UART: [fwproc] Wait for Commands...
10,391,259 UART: [fwproc] Recv command 0x46574c44
10,393,357 UART: [fwproc] Recv'd Img size: 114168 bytes
14,976,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,049,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,118,685 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,436,089 >>> mbox cmd response: success
15,440,691 UART: [afmc] ++
15,441,294 UART: [afmc] CDI.KEYID = 6
15,442,206 UART: [afmc] SUBJECT.KEYID = 7
15,443,420 UART: [afmc] AUTHORITY.KEYID = 5
17,977,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,701,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,703,806 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,719,808 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,735,730 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,751,540 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,774,988 UART: [afmc] --
19,779,019 UART: [cold-reset] --
19,783,644 UART: [state] Locking Datavault
19,789,446 UART: [state] Locking PCR0, PCR1 and PCR31
19,791,177 UART: [state] Locking ICCM
19,793,656 UART: [exit] Launching FMC @ 0x40000130
19,802,068 UART:
19,802,310 UART: Running Caliptra FMC ...
19,803,408 UART:
19,803,567 UART: [state] CFI Enabled
19,859,922 UART: [fht] FMC Alias Private Key: 7
21,624,179 UART: [art] Extend RT PCRs Done
21,625,532 UART: [art] Lock RT PCRs Done
21,627,188 UART: [art] Populate DV Done
21,632,815 UART: [fht] FMC Alias Private Key: 7
21,634,315 UART: [art] Derive CDI
21,635,053 UART: [art] Store in in slot 0x4
21,692,900 UART: [art] Derive Key Pair
21,693,896 UART: [art] Store priv key in slot 0x5
24,156,835 UART: [art] Derive Key Pair - Done
24,169,396 UART: [art] Signing Cert with AUTHO
24,170,698 UART: RITY.KEYID = 7
25,882,213 UART: [art] Erasing AUTHORITY.KEYID = 7
25,883,731 UART: [art] PUB.X = 2157FB07D79D77E6B78787711CB560CF6ECFE0A8D11B6D341FE044AF2B50FFE75975CC424B723CE082C9DCD8D0171B59
25,891,037 UART: [art] PUB.Y = 4C1BCA986F03F85F8322D76471B89593091E525EBF51799516AA7A9A9D16B4FF78A1E0940B341FAE774E121DDD19DC6A
25,898,282 UART: [art] SIG.R = FAB24858EA6FCB3162E153654965B6011E061BF766A6492DAC4F2F9DEF56B0D7981B3EA46468143FC7EC89C8C9C974A8
25,905,688 UART: [art] SIG.S = 63CE5130678C7EF17C304914B48FB7200A2DE6B5330FDC8EED4B1CAE4B5D529ED5F42C5A5D93893007F0683C5F92F60C
26,884,615 UART: Caliptra RT
26,885,321 UART: [state] CFI Enabled
27,049,797 UART: [rt] RT listening for mailbox commands...
27,052,114 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,207,887 UART: [rt]cmd =0x41544d4e, len=14344
30,887,622 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,383,491 ready_for_fw is high
3,384,117 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,066,103 >>> mbox cmd response: success
19,353,702 UART:
19,354,100 UART: Running Caliptra FMC ...
19,355,288 UART:
19,355,450 UART: [state] CFI Enabled
19,417,447 UART: [fht] FMC Alias Private Key: 7
21,181,545 UART: [art] Extend RT PCRs Done
21,182,775 UART: [art] Lock RT PCRs Done
21,184,682 UART: [art] Populate DV Done
21,190,037 UART: [fht] FMC Alias Private Key: 7
21,191,687 UART: [art] Derive CDI
21,192,520 UART: [art] Store in in slot 0x4
21,249,891 UART: [art] Derive Key Pair
21,250,927 UART: [art] Store priv key in slot 0x5
23,713,337 UART: [art] Derive Key Pair - Done
23,726,327 UART: [art] Signing Cert with AUTHO
23,727,658 UART: RITY.KEYID = 7
25,439,324 UART: [art] Erasing AUTHORITY.KEYID = 7
25,440,826 UART: [art] PUB.X = 4FB10BDC31E7DB4D4DB0BDFDF9E5F9AB996C1D6047D80BA59C933D1BE6DAB757A5751D529850D3AD0F6B540760EBDBF5
25,448,112 UART: [art] PUB.Y = E154134C14A9FB38E0171C864C74E9D39E6B159ED9B4E2E25C836CC6E91B31618A54143FFDB1ABB779A163FE89C96E94
25,455,363 UART: [art] SIG.R = DCBF0FE30D950F0F9F14B7D7E2997D584E4BC3A1EC9777A9A5EDE86CC28DFE701B2B6D782F164024A224D2E3023880F6
25,462,793 UART: [art] SIG.S = 79EFC2D5EB8BCF814D5FC92247E70CCD53F019238E4A677632A9831E662B60CDB5AC993F9BA8D5BFB4433332FDA5999C
26,442,032 UART: Caliptra RT
26,442,742 UART: [state] CFI Enabled
26,606,178 UART: [rt] RT listening for mailbox commands...
26,608,523 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,763,799 UART: [rt]cmd =0x41544d4e, len=14344
30,449,357 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,759 writing to cptra_bootfsm_go
192,978 UART:
193,330 UART: Running Caliptra ROM ...
194,473 UART:
604,278 UART: [state] CFI Enabled
619,039 UART: [state] LifecycleState = Unprovisioned
620,915 UART: [state] DebugLocked = No
623,781 UART: [state] WD Timer not started. Device not locked for debugging
627,018 UART: [kat] SHA2-256
806,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,693 UART: [kat] ++
818,143 UART: [kat] sha1
829,439 UART: [kat] SHA2-256
832,446 UART: [kat] SHA2-384
837,866 UART: [kat] SHA2-512-ACC
840,799 UART: [kat] ECC-384
3,283,133 UART: [kat] HMAC-384Kdf
3,296,590 UART: [kat] LMS
3,826,069 UART: [kat] --
3,829,960 UART: [cold-reset] ++
3,831,964 UART: [fht] FHT @ 0x50003400
3,842,863 UART: [idev] ++
3,843,432 UART: [idev] CDI.KEYID = 6
3,844,412 UART: [idev] SUBJECT.KEYID = 7
3,845,587 UART: [idev] UDS.KEYID = 0
3,846,509 ready_for_fw is high
3,846,700 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,104 UART: [idev] Erasing UDS.KEYID = 0
6,323,968 UART: [idev] Sha1 KeyId Algorithm
6,348,214 UART: [idev] --
6,352,340 UART: [ldev] ++
6,352,913 UART: [ldev] CDI.KEYID = 6
6,353,934 UART: [ldev] SUBJECT.KEYID = 5
6,355,041 UART: [ldev] AUTHORITY.KEYID = 7
6,356,269 UART: [ldev] FE.KEYID = 1
6,366,826 UART: [ldev] Erasing FE.KEYID = 1
8,844,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,874 UART: [ldev] --
10,636,758 UART: [fwproc] Wait for Commands...
10,639,508 UART: [fwproc] Recv command 0x46574c44
10,641,600 UART: [fwproc] Recv'd Img size: 114168 bytes
15,224,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,302,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,371,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,688,251 >>> mbox cmd response: success
15,693,313 UART: [afmc] ++
15,693,913 UART: [afmc] CDI.KEYID = 6
15,694,844 UART: [afmc] SUBJECT.KEYID = 7
15,696,009 UART: [afmc] AUTHORITY.KEYID = 5
18,195,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,914,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,915,986 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,931,941 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,947,923 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,963,676 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,987,029 UART: [afmc] --
19,991,433 UART: [cold-reset] --
19,993,787 UART: [state] Locking Datavault
19,999,680 UART: [state] Locking PCR0, PCR1 and PCR31
20,001,324 UART: [state] Locking ICCM
20,003,187 UART: [exit] Launching FMC @ 0x40000130
20,011,597 UART:
20,011,882 UART: Running Caliptra FMC ...
20,013,018 UART:
20,013,189 UART: [state] CFI Enabled
20,021,570 UART: [fht] FMC Alias Private Key: 7
21,777,706 UART: [art] Extend RT PCRs Done
21,778,927 UART: [art] Lock RT PCRs Done
21,780,875 UART: [art] Populate DV Done
21,786,017 UART: [fht] FMC Alias Private Key: 7
21,787,719 UART: [art] Derive CDI
21,788,531 UART: [art] Store in in slot 0x4
21,830,800 UART: [art] Derive Key Pair
21,831,800 UART: [art] Store priv key in slot 0x5
24,259,099 UART: [art] Derive Key Pair - Done
24,272,524 UART: [art] Signing Cert with AUTHO
24,273,829 UART: RITY.KEYID = 7
25,979,285 UART: [art] Erasing AUTHORITY.KEYID = 7
25,980,786 UART: [art] PUB.X = 182113A884889D6142CD3C8F1F5FFF78794B7468A392607D9E7F15315A77D3AE70A6B012B5B1E5E398C4C55842539C8C
25,988,061 UART: [art] PUB.Y = 83D1BDAA427A8D5DDBE59FDF782777BFBF55ADE01431E96890197000A410EFB2BBED473695D3963F3487594C10A4FB63
25,995,300 UART: [art] SIG.R = D1C2BE434F5406437EFC8031BB6997586BE568E9AA4EF6FC5FA8DB39D23171100273E51905A2BF2189C434D1F06E69D5
26,002,699 UART: [art] SIG.S = 71BF63B3D57B85B300BE1D4C9E1DD324C8154884A98754B42D91E786296C02652D2DD345F359FE3666D4AD1CAE57B345
26,981,656 UART: Caliptra RT
26,982,368 UART: [state] CFI Enabled
27,099,784 UART: [rt] RT listening for mailbox commands...
27,102,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,257,524 UART: [rt]cmd =0x41544d4e, len=14344
30,926,758 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,803 writing to cptra_bootfsm_go
3,698,251 ready_for_fw is high
3,698,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,229,939 >>> mbox cmd response: success
19,483,423 UART:
19,483,817 UART: Running Caliptra FMC ...
19,485,019 UART:
19,485,203 UART: [state] CFI Enabled
19,493,212 UART: [fht] FMC Alias Private Key: 7
21,250,037 UART: [art] Extend RT PCRs Done
21,251,370 UART: [art] Lock RT PCRs Done
21,252,890 UART: [art] Populate DV Done
21,258,307 UART: [fht] FMC Alias Private Key: 7
21,259,797 UART: [art] Derive CDI
21,260,561 UART: [art] Store in in slot 0x4
21,303,048 UART: [art] Derive Key Pair
21,304,046 UART: [art] Store priv key in slot 0x5
23,730,308 UART: [art] Derive Key Pair - Done
23,743,552 UART: [art] Signing Cert with AUTHO
23,744,863 UART: RITY.KEYID = 7
25,450,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,452,283 UART: [art] PUB.X = 719D21AE2B532F8F16E7ABC58AB21BEC26CD71A87A28EFABD614E8F3B41E152C3AC889E2372E9D29BA79E0760F636D51
25,459,592 UART: [art] PUB.Y = 5FDE8CF499CE71DBA2891942D9FB6F6C007278E716FBBEC5F0A5449F123450FC38609BAA27ED2FDE5B193D3AAF20C6D3
25,466,854 UART: [art] SIG.R = 2194753618C5C5014053E9AC49B08B54A3E4E63861402DA9916658191B1BA0FFFE7F3CA577D87BB28E2ACF354F4A769B
25,474,253 UART: [art] SIG.S = 67785029BAA19EF0FCFD8583090DA7A14065DD73B68FA09AEA390D879A8F6F99291597B2667D5A1C055D88B41DD9F878
26,452,896 UART: Caliptra RT
26,453,611 UART: [state] CFI Enabled
26,568,943 UART: [rt] RT listening for mailbox commands...
26,571,282 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,726,653 UART: [rt]cmd =0x41544d4e, len=14344
30,410,330 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
191,999 UART:
192,363 UART: Running Caliptra ROM ...
193,497 UART:
193,644 UART: [state] CFI Enabled
261,301 UART: [state] LifecycleState = Unprovisioned
263,653 UART: [state] DebugLocked = No
266,378 UART: [state] WD Timer not started. Device not locked for debugging
270,353 UART: [kat] SHA2-256
460,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,948 UART: [kat] ++
471,429 UART: [kat] sha1
481,309 UART: [kat] SHA2-256
484,319 UART: [kat] SHA2-384
490,471 UART: [kat] SHA2-512-ACC
493,058 UART: [kat] ECC-384
2,946,819 UART: [kat] HMAC-384Kdf
2,971,141 UART: [kat] LMS
3,502,930 UART: [kat] --
3,507,266 UART: [cold-reset] ++
3,509,412 UART: [fht] FHT @ 0x50003400
3,521,237 UART: [idev] ++
3,521,940 UART: [idev] CDI.KEYID = 6
3,522,896 UART: [idev] SUBJECT.KEYID = 7
3,524,137 UART: [idev] UDS.KEYID = 0
3,525,045 ready_for_fw is high
3,525,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,373 UART: [idev] Erasing UDS.KEYID = 0
6,030,847 UART: [idev] Sha1 KeyId Algorithm
6,053,984 UART: [idev] --
6,058,418 UART: [ldev] ++
6,059,113 UART: [ldev] CDI.KEYID = 6
6,060,004 UART: [ldev] SUBJECT.KEYID = 5
6,061,126 UART: [ldev] AUTHORITY.KEYID = 7
6,062,331 UART: [ldev] FE.KEYID = 1
6,100,847 UART: [ldev] Erasing FE.KEYID = 1
8,608,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,369 UART: [ldev] --
10,415,012 UART: [fwproc] Wait for Commands...
10,417,705 UART: [fwproc] Recv command 0x46574c44
10,420,010 UART: [fwproc] Recv'd Img size: 114168 bytes
15,047,902 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,129,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,245,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,786,843 >>> mbox cmd response: success
15,791,169 UART: [afmc] ++
15,791,887 UART: [afmc] CDI.KEYID = 6
15,793,092 UART: [afmc] SUBJECT.KEYID = 7
15,794,547 UART: [afmc] AUTHORITY.KEYID = 5
18,319,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,046,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,047,936 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,063,048 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,078,264 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,093,088 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,116,584 UART: [afmc] --
20,120,617 UART: [cold-reset] --
20,125,866 UART: [state] Locking Datavault
20,132,240 UART: [state] Locking PCR0, PCR1 and PCR31
20,134,411 UART: [state] Locking ICCM
20,135,996 UART: [exit] Launching FMC @ 0x40000130
20,144,688 UART:
20,144,924 UART: Running Caliptra FMC ...
20,145,952 UART:
20,146,100 UART: [state] CFI Enabled
20,203,004 UART: [fht] FMC Alias Private Key: 7
21,966,614 UART: [art] Extend RT PCRs Done
21,967,820 UART: [art] Lock RT PCRs Done
21,969,310 UART: [art] Populate DV Done
21,974,883 UART: [fht] FMC Alias Private Key: 7
21,976,527 UART: [art] Derive CDI
21,977,262 UART: [art] Store in in slot 0x4
22,035,437 UART: [art] Derive Key Pair
22,036,437 UART: [art] Store priv key in slot 0x5
24,498,841 UART: [art] Derive Key Pair - Done
24,512,328 UART: [art] Signing Cert with AUTHO
24,513,632 UART: RITY.KEYID = 7
26,225,173 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,656 UART: [art] PUB.X = 87DC16E6EC902CBCD465C4D2EC6C1B65120C13D167D6758E52697CBC23FC12CF004CFB114EEC501372687028DC4FFA95
26,233,916 UART: [art] PUB.Y = 55B10610B31C3F33B219F014AEDB2F9D6E3B3D264EBD5EB2FD6ADEB4A4750F3239AC2D563DAAB4CC1F40A9064519A1F1
26,241,222 UART: [art] SIG.R = 44309C72A6D3EFCCBB3AF4876D6CFBC80D8CAD5224C87CE955BC46B20621F5C8934C35B1592897A5B56207116D34300D
26,248,596 UART: [art] SIG.S = E31467CC8369EC009BC9A196A06A097180DEB7A6A32526E3135D7147698481011AB3E8D9914D1DAEDC340CBEFD10D016
27,228,009 UART: Caliptra RT
27,228,727 UART: [state] CFI Enabled
27,392,175 UART: [rt] RT listening for mailbox commands...
27,394,723 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,550,219 UART: [rt]cmd =0x41544d4e, len=14344
31,237,869 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,435,228 ready_for_fw is high
3,435,795 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,778,776 >>> mbox cmd response: success
20,068,726 UART:
20,069,115 UART: Running Caliptra FMC ...
20,070,304 UART:
20,070,484 UART: [state] CFI Enabled
20,136,517 UART: [fht] FMC Alias Private Key: 7
21,899,799 UART: [art] Extend RT PCRs Done
21,901,026 UART: [art] Lock RT PCRs Done
21,902,958 UART: [art] Populate DV Done
21,908,473 UART: [fht] FMC Alias Private Key: 7
21,910,080 UART: [art] Derive CDI
21,910,899 UART: [art] Store in in slot 0x4
21,969,669 UART: [art] Derive Key Pair
21,970,668 UART: [art] Store priv key in slot 0x5
24,433,825 UART: [art] Derive Key Pair - Done
24,446,671 UART: [art] Signing Cert with AUTHO
24,447,986 UART: RITY.KEYID = 7
26,159,595 UART: [art] Erasing AUTHORITY.KEYID = 7
26,161,092 UART: [art] PUB.X = C008C89CD4AA5AE6F93A51CE38AFE7221E32427516881363784ECE253E3AA45382A4C3C3DE5241FE8014ADEF0044134B
26,168,381 UART: [art] PUB.Y = C5ED12EC8074DFC0A07A0CD42FCFF4928D0ED0E397C3A179DE29CF0309E7330F32DFCDD795415A9128AF26548910133C
26,175,622 UART: [art] SIG.R = ABBFA82170E33DF028F74B058D118753744C84F3DC0E49AE9133BA076D19CEB6EF6C822796789819DF6C50FE29607AFC
26,183,018 UART: [art] SIG.S = 55FD93DA32A76374840AFC061A59EF006A8904B67C561CB71F5B718197F6A84BD471D427C3F96E3E3FDA80487408C967
27,162,166 UART: Caliptra RT
27,162,882 UART: [state] CFI Enabled
27,327,517 UART: [rt] RT listening for mailbox commands...
27,329,827 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,485,361 UART: [rt]cmd =0x41544d4e, len=14344
31,172,812 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
193,070 UART:
193,435 UART: Running Caliptra ROM ...
194,552 UART:
604,116 UART: [state] CFI Enabled
616,998 UART: [state] LifecycleState = Unprovisioned
619,373 UART: [state] DebugLocked = No
621,110 UART: [state] WD Timer not started. Device not locked for debugging
625,636 UART: [kat] SHA2-256
815,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,305 UART: [kat] ++
826,850 UART: [kat] sha1
838,363 UART: [kat] SHA2-256
841,375 UART: [kat] SHA2-384
847,010 UART: [kat] SHA2-512-ACC
849,593 UART: [kat] ECC-384
3,293,556 UART: [kat] HMAC-384Kdf
3,307,113 UART: [kat] LMS
3,838,922 UART: [kat] --
3,843,552 UART: [cold-reset] ++
3,845,269 UART: [fht] FHT @ 0x50003400
3,856,604 UART: [idev] ++
3,857,316 UART: [idev] CDI.KEYID = 6
3,858,345 UART: [idev] SUBJECT.KEYID = 7
3,859,645 UART: [idev] UDS.KEYID = 0
3,860,574 ready_for_fw is high
3,860,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,378 UART: [idev] Erasing UDS.KEYID = 0
6,334,853 UART: [idev] Sha1 KeyId Algorithm
6,357,695 UART: [idev] --
6,362,799 UART: [ldev] ++
6,363,487 UART: [ldev] CDI.KEYID = 6
6,364,401 UART: [ldev] SUBJECT.KEYID = 5
6,365,581 UART: [ldev] AUTHORITY.KEYID = 7
6,366,761 UART: [ldev] FE.KEYID = 1
6,379,783 UART: [ldev] Erasing FE.KEYID = 1
8,859,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,337 UART: [ldev] --
10,652,382 UART: [fwproc] Wait for Commands...
10,654,422 UART: [fwproc] Recv command 0x46574c44
10,656,731 UART: [fwproc] Recv'd Img size: 114168 bytes
15,278,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,351,416 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,467,576 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,009,066 >>> mbox cmd response: success
16,013,010 UART: [afmc] ++
16,013,727 UART: [afmc] CDI.KEYID = 6
16,014,972 UART: [afmc] SUBJECT.KEYID = 7
16,016,415 UART: [afmc] AUTHORITY.KEYID = 5
18,522,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,244,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,246,881 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,261,967 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,277,141 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,291,970 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,314,810 UART: [afmc] --
20,318,081 UART: [cold-reset] --
20,321,524 UART: [state] Locking Datavault
20,326,018 UART: [state] Locking PCR0, PCR1 and PCR31
20,328,221 UART: [state] Locking ICCM
20,329,186 UART: [exit] Launching FMC @ 0x40000130
20,337,880 UART:
20,338,117 UART: Running Caliptra FMC ...
20,339,428 UART:
20,339,603 UART: [state] CFI Enabled
20,347,277 UART: [fht] FMC Alias Private Key: 7
22,104,432 UART: [art] Extend RT PCRs Done
22,105,657 UART: [art] Lock RT PCRs Done
22,107,604 UART: [art] Populate DV Done
22,113,242 UART: [fht] FMC Alias Private Key: 7
22,114,779 UART: [art] Derive CDI
22,115,594 UART: [art] Store in in slot 0x4
22,158,083 UART: [art] Derive Key Pair
22,159,090 UART: [art] Store priv key in slot 0x5
24,585,760 UART: [art] Derive Key Pair - Done
24,598,814 UART: [art] Signing Cert with AUTHO
24,600,122 UART: RITY.KEYID = 7
26,305,471 UART: [art] Erasing AUTHORITY.KEYID = 7
26,306,976 UART: [art] PUB.X = 46029A068BCF9C8135F782D02AC78DDA25F41BB8758177358E4FB0308D709B202FCD4CFC032E7571C489C00C22ABFADD
26,314,223 UART: [art] PUB.Y = E269E46B22EC14A6267B11F2A24C13EC5D4E4F6430801918214FA43956AA81F24091ADCE187C08EA072A16F045724AA6
26,321,516 UART: [art] SIG.R = 524E0012EE2E407E9AF42A8D7C71C11129ABE719525C61B4ECCA805BC8EF1369DF1D1E31B685A86D87098DE3AE9EB77E
26,328,909 UART: [art] SIG.S = F27331D305BC9A191F02F34CB64B89FB428D170A6AFB1F8DE5A5EC74806D56542F09C3BD5BB2E9717F7FFF09D27FB7F2
27,307,871 UART: Caliptra RT
27,308,585 UART: [state] CFI Enabled
27,425,491 UART: [rt] RT listening for mailbox commands...
27,427,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,583,195 UART: [rt]cmd =0x41544d4e, len=14344
31,261,217 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,695 writing to cptra_bootfsm_go
3,759,605 ready_for_fw is high
3,760,126 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,055,696 >>> mbox cmd response: success
20,306,626 UART:
20,307,014 UART: Running Caliptra FMC ...
20,308,219 UART:
20,308,394 UART: [state] CFI Enabled
20,316,017 UART: [fht] FMC Alias Private Key: 7
22,072,492 UART: [art] Extend RT PCRs Done
22,073,712 UART: [art] Lock RT PCRs Done
22,075,396 UART: [art] Populate DV Done
22,080,710 UART: [fht] FMC Alias Private Key: 7
22,082,305 UART: [art] Derive CDI
22,083,141 UART: [art] Store in in slot 0x4
22,125,584 UART: [art] Derive Key Pair
22,126,620 UART: [art] Store priv key in slot 0x5
24,553,574 UART: [art] Derive Key Pair - Done
24,566,904 UART: [art] Signing Cert with AUTHO
24,568,203 UART: RITY.KEYID = 7
26,273,905 UART: [art] Erasing AUTHORITY.KEYID = 7
26,275,407 UART: [art] PUB.X = A383BAC7F9F460763A6264AD6A38E1891275B35CBB1B950556A9FA4454DC323700A1B0612DD176906FA4ED3F0B165396
26,282,663 UART: [art] PUB.Y = DDAA3ADCEF007AB7DFB317B054E589C64B0E985D33AF51DA6BCDF77328963C6DE307A500639AB1CBA8A27AC83E6485CE
26,289,901 UART: [art] SIG.R = 3CD1519D2B32E6DBCA95ADB5F6CD982621975CF136881E75595851A9AEBB7F469875547CD3AB7FE65DC0F28E43322DFB
26,297,309 UART: [art] SIG.S = 5E10F654C88BAA3D57A01A510E9A37C2D47C7BF22752854A5D40473C84E866BBF17AC09338BC0040A840CD6865F03A63
27,276,125 UART: Caliptra RT
27,276,850 UART: [state] CFI Enabled
27,394,994 UART: [rt] RT listening for mailbox commands...
27,397,298 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,552,649 UART: [rt]cmd =0x41544d4e, len=14344
31,237,047 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,303 UART: [kat] SHA2-256
882,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,349 UART: [kat] ++
886,501 UART: [kat] sha1
890,763 UART: [kat] SHA2-256
892,701 UART: [kat] SHA2-384
895,338 UART: [kat] SHA2-512-ACC
897,239 UART: [kat] ECC-384
902,696 UART: [kat] HMAC-384Kdf
907,506 UART: [kat] LMS
1,475,702 UART: [kat] --
1,476,471 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,686 UART: [idev] ++
1,479,854 UART: [idev] CDI.KEYID = 6
1,480,214 UART: [idev] SUBJECT.KEYID = 7
1,480,638 UART: [idev] UDS.KEYID = 0
1,480,983 ready_for_fw is high
1,480,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,172 UART: [idev] --
1,514,053 UART: [ldev] ++
1,514,221 UART: [ldev] CDI.KEYID = 6
1,514,584 UART: [ldev] SUBJECT.KEYID = 5
1,515,010 UART: [ldev] AUTHORITY.KEYID = 7
1,515,473 UART: [ldev] FE.KEYID = 1
1,520,663 UART: [ldev] Erasing FE.KEYID = 1
1,546,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,568 UART: [ldev] --
1,585,881 UART: [fwproc] Waiting for Commands...
1,586,686 UART: [fwproc] Received command 0x46574c44
1,587,477 UART: [fwproc] Received Image of size 114168 bytes
5,082,079 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,219 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,139,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,275,190 >>> mbox cmd response: success
5,276,248 UART: [afmc] ++
5,276,416 UART: [afmc] CDI.KEYID = 6
5,276,778 UART: [afmc] SUBJECT.KEYID = 7
5,277,203 UART: [afmc] AUTHORITY.KEYID = 5
5,311,825 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,328,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,328,847 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,334,556 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,340,448 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,149 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,354,049 UART: [afmc] --
5,355,117 UART: [cold-reset] --
5,355,929 UART: [state] Locking Datavault
5,357,170 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,774 UART: [state] Locking ICCM
5,358,398 UART: [exit] Launching FMC @ 0x40000130
5,363,727 UART:
5,363,743 UART: Running Caliptra FMC ...
5,364,151 UART:
5,364,205 UART: [state] CFI Enabled
5,374,855 UART: [fht] FMC Alias Private Key: 7
5,482,759 UART: [art] Extend RT PCRs Done
5,483,187 UART: [art] Lock RT PCRs Done
5,484,537 UART: [art] Populate DV Done
5,492,427 UART: [fht] FMC Alias Private Key: 7
5,493,373 UART: [art] Derive CDI
5,493,653 UART: [art] Store in in slot 0x4
5,579,328 UART: [art] Derive Key Pair
5,579,688 UART: [art] Store priv key in slot 0x5
5,592,304 UART: [art] Derive Key Pair - Done
5,606,912 UART: [art] Signing Cert with AUTHO
5,607,392 UART: RITY.KEYID = 7
5,622,576 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,341 UART: [art] PUB.X = 5FE4B2958B31C951B7A5DB4C382353EFC8D694068A6F40393B3FE907B4F8ABFAA4AC4379317A0824C3A8A1B5207EF7DD
5,630,114 UART: [art] PUB.Y = 3A7102D08E547C664F291B9FA3DA6C569FB42A39C0EDF461A5D8A882E9DC02358D35559C3DDB25E5E3740C5009FA6EFE
5,637,064 UART: [art] SIG.R = 2859A17B78C619319C7CB01E18D0DD47341839940AC4BB034A6328438A449E4E6E483F5CA8ED5ECA54F55779DF0AFCB9
5,643,831 UART: [art] SIG.S = B9C1D8A4B7BECBDD132C3C4A1341F3AF478FED0E768A8F80916A6DA9B23EA9133BFB99858B6A2B8C3F5C11CF64DDB8E1
5,667,559 UART: Caliptra RT
5,667,812 UART: [state] CFI Enabled
5,776,237 UART: [rt] RT listening for mailbox commands...
5,776,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,717 UART: [rt]cmd =0x41544d4e, len=14344
7,029,646 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 ready_for_fw is high
1,362,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,123,408 >>> mbox cmd response: success
5,184,835 UART:
5,184,851 UART: Running Caliptra FMC ...
5,185,259 UART:
5,185,313 UART: [state] CFI Enabled
5,196,141 UART: [fht] FMC Alias Private Key: 7
5,304,429 UART: [art] Extend RT PCRs Done
5,304,857 UART: [art] Lock RT PCRs Done
5,306,329 UART: [art] Populate DV Done
5,314,739 UART: [fht] FMC Alias Private Key: 7
5,315,847 UART: [art] Derive CDI
5,316,127 UART: [art] Store in in slot 0x4
5,402,058 UART: [art] Derive Key Pair
5,402,418 UART: [art] Store priv key in slot 0x5
5,415,778 UART: [art] Derive Key Pair - Done
5,430,924 UART: [art] Signing Cert with AUTHO
5,431,404 UART: RITY.KEYID = 7
5,446,782 UART: [art] Erasing AUTHORITY.KEYID = 7
5,447,547 UART: [art] PUB.X = B86B1D6E8420F0D2DB06F75269120F1B430B4BBA355850B93B866BDA72A958AC71FD2B565FCBB030C598DCF4742A4767
5,454,316 UART: [art] PUB.Y = BC11069338FC2011E07005234573F6370B0E6F2C1A465B73B9073E17FA8BFA6AA14DB8D8C168C5E312346C1CD597C7CC
5,461,255 UART: [art] SIG.R = 7C1BE8E530AE8EA3DFB758ABD46A07C4526C9A612FEFBE7F5F21652C59CBB03FBCAC5C4513CEA21BAE515BDAD6A3DF53
5,468,056 UART: [art] SIG.S = 9784DD0468942C8C25B7DF68A5DBBAA70CC21847F8F46213D39279F1588542286C07D840897A0247376FE6776C106A94
5,491,321 UART: Caliptra RT
5,491,574 UART: [state] CFI Enabled
5,600,293 UART: [rt] RT listening for mailbox commands...
5,600,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,723,991 UART: [rt]cmd =0x41544d4e, len=14344
6,849,018 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,928 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,524 UART: [kat] SHA2-256
882,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,570 UART: [kat] ++
886,722 UART: [kat] sha1
890,894 UART: [kat] SHA2-256
892,832 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,427 UART: [kat] LMS
1,475,623 UART: [kat] --
1,476,620 UART: [cold-reset] ++
1,477,164 UART: [fht] Storing FHT @ 0x50003400
1,480,041 UART: [idev] ++
1,480,209 UART: [idev] CDI.KEYID = 6
1,480,569 UART: [idev] SUBJECT.KEYID = 7
1,480,993 UART: [idev] UDS.KEYID = 0
1,481,338 ready_for_fw is high
1,481,338 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,505,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,389 UART: [idev] --
1,515,464 UART: [ldev] ++
1,515,632 UART: [ldev] CDI.KEYID = 6
1,515,995 UART: [ldev] SUBJECT.KEYID = 5
1,516,421 UART: [ldev] AUTHORITY.KEYID = 7
1,516,884 UART: [ldev] FE.KEYID = 1
1,522,052 UART: [ldev] Erasing FE.KEYID = 1
1,547,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,041 UART: [ldev] --
1,586,372 UART: [fwproc] Waiting for Commands...
1,587,107 UART: [fwproc] Received command 0x46574c44
1,587,898 UART: [fwproc] Received Image of size 114168 bytes
4,967,725 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,995,831 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,025,183 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,160,738 >>> mbox cmd response: success
5,161,980 UART: [afmc] ++
5,162,148 UART: [afmc] CDI.KEYID = 6
5,162,510 UART: [afmc] SUBJECT.KEYID = 7
5,162,935 UART: [afmc] AUTHORITY.KEYID = 5
5,198,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,214,313 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,215,093 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,220,802 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,226,694 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,232,395 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,240,113 UART: [afmc] --
5,241,063 UART: [cold-reset] --
5,241,787 UART: [state] Locking Datavault
5,243,010 UART: [state] Locking PCR0, PCR1 and PCR31
5,243,614 UART: [state] Locking ICCM
5,244,220 UART: [exit] Launching FMC @ 0x40000130
5,249,549 UART:
5,249,565 UART: Running Caliptra FMC ...
5,249,973 UART:
5,250,116 UART: [state] CFI Enabled
5,260,456 UART: [fht] FMC Alias Private Key: 7
5,368,272 UART: [art] Extend RT PCRs Done
5,368,700 UART: [art] Lock RT PCRs Done
5,370,148 UART: [art] Populate DV Done
5,378,158 UART: [fht] FMC Alias Private Key: 7
5,379,324 UART: [art] Derive CDI
5,379,604 UART: [art] Store in in slot 0x4
5,465,559 UART: [art] Derive Key Pair
5,465,919 UART: [art] Store priv key in slot 0x5
5,479,241 UART: [art] Derive Key Pair - Done
5,494,241 UART: [art] Signing Cert with AUTHO
5,494,721 UART: RITY.KEYID = 7
5,509,927 UART: [art] Erasing AUTHORITY.KEYID = 7
5,510,692 UART: [art] PUB.X = D6CA0EA6DF0C23625B185E85AF2FEDB84C02D5188A8A74F75F361099AC7887336419D50668D364FC0FCD5C2063E08611
5,517,451 UART: [art] PUB.Y = AE0EF6A19C8E7CC75FE461FD0074611F964DC734D3DBBD9CC97A99EAD9F2E8FF802DB943457FFE1F0E4EEA0C4BC1FEBF
5,524,404 UART: [art] SIG.R = 2D18DBA36B0889FC1B578B6B19C4AE79F942FA655CFE4D96956E2FF82634771C064B80BB72A9C6DA8FDFF8A5DA17F2C1
5,531,186 UART: [art] SIG.S = 87FC0ED0A58BD9B58C1EA78AEB86E6AD2647171410F56422EF620467B95456D2565E307ECE9CE0A13331F3EC692C4579
5,554,343 UART: Caliptra RT
5,554,688 UART: [state] CFI Enabled
5,663,331 UART: [rt] RT listening for mailbox commands...
5,664,001 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,786,975 UART: [rt]cmd =0x41544d4e, len=14344
6,911,702 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,852 ready_for_fw is high
1,363,852 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,200,371 >>> mbox cmd response: success
5,262,526 UART:
5,262,542 UART: Running Caliptra FMC ...
5,262,950 UART:
5,263,093 UART: [state] CFI Enabled
5,274,115 UART: [fht] FMC Alias Private Key: 7
5,382,827 UART: [art] Extend RT PCRs Done
5,383,255 UART: [art] Lock RT PCRs Done
5,384,645 UART: [art] Populate DV Done
5,393,031 UART: [fht] FMC Alias Private Key: 7
5,393,999 UART: [art] Derive CDI
5,394,279 UART: [art] Store in in slot 0x4
5,480,302 UART: [art] Derive Key Pair
5,480,662 UART: [art] Store priv key in slot 0x5
5,493,988 UART: [art] Derive Key Pair - Done
5,508,842 UART: [art] Signing Cert with AUTHO
5,509,322 UART: RITY.KEYID = 7
5,524,626 UART: [art] Erasing AUTHORITY.KEYID = 7
5,525,391 UART: [art] PUB.X = 11DC4A74E09FFC31D0106A9C6C78465DB91C076E51A049A3FD611372A2AE77FA4E41A82B90AC4A1CC1D62A126CD3358F
5,532,170 UART: [art] PUB.Y = 93446D282C9C6E4E4C35A8EB61CB4C8EE4C2758AA2B33B49AD0B3634F7F1CB1312B7D0F14F2E349E2CAD9B861C6221C1
5,539,131 UART: [art] SIG.R = 4E3805FAA02A215BC0B30FF00E377F53D8D1C82B8174157A5667687A7EFF7DA214A8FC688069CCBCC76B686241AEE7E2
5,545,902 UART: [art] SIG.S = 2B90225D353CE6DA1FE15EB82C9526DDF620C431AA1BF99A4BF35B1CEF22F528B94E5345EF7AEAB68D2DCF42884DF001
5,569,726 UART: Caliptra RT
5,570,071 UART: [state] CFI Enabled
5,678,209 UART: [rt] RT listening for mailbox commands...
5,678,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,802,079 UART: [rt]cmd =0x41544d4e, len=14344
6,934,897 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,465 UART: [kat] SHA2-256
903,405 UART: [kat] SHA2-384
906,300 UART: [kat] SHA2-512-ACC
908,201 UART: [kat] ECC-384
917,764 UART: [kat] HMAC-384Kdf
922,372 UART: [kat] LMS
1,170,700 UART: [kat] --
1,171,447 UART: [cold-reset] ++
1,171,945 UART: [fht] FHT @ 0x50003400
1,174,822 UART: [idev] ++
1,174,990 UART: [idev] CDI.KEYID = 6
1,175,350 UART: [idev] SUBJECT.KEYID = 7
1,175,774 UART: [idev] UDS.KEYID = 0
1,176,119 ready_for_fw is high
1,176,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,415 UART: [idev] Sha1 KeyId Algorithm
1,209,017 UART: [idev] --
1,210,173 UART: [ldev] ++
1,210,341 UART: [ldev] CDI.KEYID = 6
1,210,704 UART: [ldev] SUBJECT.KEYID = 5
1,211,130 UART: [ldev] AUTHORITY.KEYID = 7
1,211,593 UART: [ldev] FE.KEYID = 1
1,216,845 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,501 UART: [ldev] --
1,282,790 UART: [fwproc] Wait for Commands...
1,283,444 UART: [fwproc] Recv command 0x46574c44
1,284,172 UART: [fwproc] Recv'd Img size: 114168 bytes
3,129,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,238 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,324,165 >>> mbox cmd response: success
3,325,295 UART: [afmc] ++
3,325,463 UART: [afmc] CDI.KEYID = 6
3,325,825 UART: [afmc] SUBJECT.KEYID = 7
3,326,250 UART: [afmc] AUTHORITY.KEYID = 5
3,361,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,943 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,691 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,400 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,292 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,003 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,966 UART: [afmc] --
3,405,068 UART: [cold-reset] --
3,405,668 UART: [state] Locking Datavault
3,406,703 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,307 UART: [state] Locking ICCM
3,407,939 UART: [exit] Launching FMC @ 0x40000130
3,413,268 UART:
3,413,284 UART: Running Caliptra FMC ...
3,413,692 UART:
3,413,746 UART: [state] CFI Enabled
3,424,364 UART: [fht] FMC Alias Private Key: 7
3,531,828 UART: [art] Extend RT PCRs Done
3,532,256 UART: [art] Lock RT PCRs Done
3,534,052 UART: [art] Populate DV Done
3,542,372 UART: [fht] FMC Alias Private Key: 7
3,543,328 UART: [art] Derive CDI
3,543,608 UART: [art] Store in in slot 0x4
3,629,697 UART: [art] Derive Key Pair
3,630,057 UART: [art] Store priv key in slot 0x5
3,643,205 UART: [art] Derive Key Pair - Done
3,657,729 UART: [art] Signing Cert with AUTHO
3,658,209 UART: RITY.KEYID = 7
3,673,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,228 UART: [art] PUB.X = F0D1373B0BCE3499C4C0F7394DB9534F568A6735D8ED8B8BA45015F91C15141EED7679ABCA7D435819D7624A618CD24F
3,681,001 UART: [art] PUB.Y = 8E59C3166BD38C9D42CDE32EC1ECFB947051F5B1F6AC2A81F7240E67FFB2C5E74EC2F9D62279A01AF499E0378EA7FEB6
3,687,968 UART: [art] SIG.R = 056EBC6DAB81ADB3EBE20786ED49A2E4D1BFBCCACF52C182A8608D222EFF5291773E0DF1C0BB4427EEA8BB8C23A3FCD8
3,694,761 UART: [art] SIG.S = E98444C518BF2F934CD89D7786A10C244BE293768A5820444D5870FF003A5B5F9753A646F8CCF7BCDC727C050B2F59D1
3,718,439 UART: Caliptra RT
3,718,692 UART: [state] CFI Enabled
3,826,096 UART: [rt] RT listening for mailbox commands...
3,826,766 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,996 UART: [rt]cmd =0x41544d4e, len=14344
5,079,807 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,851 ready_for_fw is high
1,059,851 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,159,442 >>> mbox cmd response: success
3,222,093 UART:
3,222,109 UART: Running Caliptra FMC ...
3,222,517 UART:
3,222,571 UART: [state] CFI Enabled
3,232,923 UART: [fht] FMC Alias Private Key: 7
3,340,481 UART: [art] Extend RT PCRs Done
3,340,909 UART: [art] Lock RT PCRs Done
3,342,609 UART: [art] Populate DV Done
3,350,943 UART: [fht] FMC Alias Private Key: 7
3,352,125 UART: [art] Derive CDI
3,352,405 UART: [art] Store in in slot 0x4
3,438,326 UART: [art] Derive Key Pair
3,438,686 UART: [art] Store priv key in slot 0x5
3,452,340 UART: [art] Derive Key Pair - Done
3,467,095 UART: [art] Signing Cert with AUTHO
3,467,575 UART: RITY.KEYID = 7
3,483,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,484,160 UART: [art] PUB.X = 2AD56EA474141ED70F90E822AC763F306611376E219EF7BAAB5D108FC0C9F038F5C3B0D278D4D9B917E619EC6FEE8859
3,490,937 UART: [art] PUB.Y = AE1B731794120E6CDD21D0EB37A711C4B63F1F2C9FEA96DEFF54619B4B27283D8A1A85D294A0036F2B415E420C23EA44
3,497,888 UART: [art] SIG.R = 832F20F70F4FD4BEED799786DE860652335F30479ABD131461EA7BC8E2471DCF0DE07D7AA0A1A73F2A5740C7CB2F6100
3,504,637 UART: [art] SIG.S = DA13739810FC9FAB32320140F3386E2B4C3B8F45B37CC195AB04CCADCA7552B26433C26B7E417B9DF6F2AAF421B2DAD6
3,528,636 UART: Caliptra RT
3,528,889 UART: [state] CFI Enabled
3,636,596 UART: [rt] RT listening for mailbox commands...
3,637,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,384 UART: [rt]cmd =0x41544d4e, len=14344
4,882,874 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,332 UART: [kat] SHA2-256
904,272 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
922,883 UART: [kat] LMS
1,171,211 UART: [kat] --
1,172,230 UART: [cold-reset] ++
1,172,608 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 ready_for_fw is high
1,176,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,309 UART: [idev] Erasing UDS.KEYID = 0
1,201,914 UART: [idev] Sha1 KeyId Algorithm
1,210,260 UART: [idev] --
1,211,182 UART: [ldev] ++
1,211,350 UART: [ldev] CDI.KEYID = 6
1,211,713 UART: [ldev] SUBJECT.KEYID = 5
1,212,139 UART: [ldev] AUTHORITY.KEYID = 7
1,212,602 UART: [ldev] FE.KEYID = 1
1,217,634 UART: [ldev] Erasing FE.KEYID = 1
1,244,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,610 UART: [ldev] --
1,283,941 UART: [fwproc] Wait for Commands...
1,284,693 UART: [fwproc] Recv command 0x46574c44
1,285,421 UART: [fwproc] Recv'd Img size: 114168 bytes
3,130,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,623 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,324,454 >>> mbox cmd response: success
3,325,472 UART: [afmc] ++
3,325,640 UART: [afmc] CDI.KEYID = 6
3,326,002 UART: [afmc] SUBJECT.KEYID = 7
3,326,427 UART: [afmc] AUTHORITY.KEYID = 5
3,362,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,222 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,931 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,823 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,534 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,187 UART: [afmc] --
3,405,141 UART: [cold-reset] --
3,406,135 UART: [state] Locking Datavault
3,407,436 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,040 UART: [state] Locking ICCM
3,408,698 UART: [exit] Launching FMC @ 0x40000130
3,414,027 UART:
3,414,043 UART: Running Caliptra FMC ...
3,414,451 UART:
3,414,594 UART: [state] CFI Enabled
3,425,360 UART: [fht] FMC Alias Private Key: 7
3,533,666 UART: [art] Extend RT PCRs Done
3,534,094 UART: [art] Lock RT PCRs Done
3,535,864 UART: [art] Populate DV Done
3,544,144 UART: [fht] FMC Alias Private Key: 7
3,545,266 UART: [art] Derive CDI
3,545,546 UART: [art] Store in in slot 0x4
3,631,161 UART: [art] Derive Key Pair
3,631,521 UART: [art] Store priv key in slot 0x5
3,644,567 UART: [art] Derive Key Pair - Done
3,659,261 UART: [art] Signing Cert with AUTHO
3,659,741 UART: RITY.KEYID = 7
3,675,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,010 UART: [art] PUB.X = EA7311CDE1D4B8EE5078E2D955E54864DAEDD1FDDD7712F7A90FC6B602853CED274E277D27602B3A9EB147416B6A32E7
3,682,788 UART: [art] PUB.Y = 624506417989F94704550673D90F069AED7543A071B271DD003BDDCE9217C28EC539306E59AD0F467E2BAF02EF08D064
3,689,688 UART: [art] SIG.R = 6C3E156F6988A7B6D49BF0265F126D3C2C47886D3652EDA2D1326E7B99E9AACA52A7C677FE0CDB77E7F1A5292C5DAA2E
3,696,471 UART: [art] SIG.S = 1CEA7FCA70C96FE536FFE8C68D3E4837C7E2A2F7CDE1D7825759E31B409BAD05ED02A2C9D8C33AB2FE4DE5DB055B868D
3,720,325 UART: Caliptra RT
3,720,670 UART: [state] CFI Enabled
3,829,539 UART: [rt] RT listening for mailbox commands...
3,830,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,953,105 UART: [rt]cmd =0x41544d4e, len=14344
5,083,522 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,542 ready_for_fw is high
1,060,542 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,172,442 >>> mbox cmd response: success
3,234,805 UART:
3,234,821 UART: Running Caliptra FMC ...
3,235,229 UART:
3,235,372 UART: [state] CFI Enabled
3,245,804 UART: [fht] FMC Alias Private Key: 7
3,353,822 UART: [art] Extend RT PCRs Done
3,354,250 UART: [art] Lock RT PCRs Done
3,355,602 UART: [art] Populate DV Done
3,363,616 UART: [fht] FMC Alias Private Key: 7
3,364,642 UART: [art] Derive CDI
3,364,922 UART: [art] Store in in slot 0x4
3,450,413 UART: [art] Derive Key Pair
3,450,773 UART: [art] Store priv key in slot 0x5
3,464,217 UART: [art] Derive Key Pair - Done
3,479,009 UART: [art] Signing Cert with AUTHO
3,479,489 UART: RITY.KEYID = 7
3,494,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,286 UART: [art] PUB.X = 031257C8D818F147097F4911865D86019E27041D3D0EA4A684F25DDA2C6F8D905BB8883C80E7F482F9ED7F2A996285EA
3,502,039 UART: [art] PUB.Y = 3F4BE4BFB5A823B2F21A8023F3DB4210F6BCF3CED7B7A1B52C51483E39F19BA955FCBFAEB4BAACEF8BF324C53E1C6CD6
3,509,023 UART: [art] SIG.R = 582F84AE1659CFB983712385D0FD630E8F05FD7115C232D52EDB7519CFEF6499CCAA479C884ADBDED67AAC67B90C7688
3,515,798 UART: [art] SIG.S = D5A88BF08D3302965BAF45578AA063F0AB69AC8336A3973BC21832D42270A366E90F807928C6B414A3AEB4E85B8447E5
3,539,011 UART: Caliptra RT
3,539,356 UART: [state] CFI Enabled
3,647,310 UART: [rt] RT listening for mailbox commands...
3,647,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,882 UART: [rt]cmd =0x41544d4e, len=14344
4,902,846 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,493 UART: [kat] SHA2-256
901,433 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
915,518 UART: [kat] HMAC-384Kdf
920,074 UART: [kat] LMS
1,168,386 UART: [kat] --
1,169,137 UART: [cold-reset] ++
1,169,701 UART: [fht] FHT @ 0x50003400
1,172,291 UART: [idev] ++
1,172,459 UART: [idev] CDI.KEYID = 6
1,172,820 UART: [idev] SUBJECT.KEYID = 7
1,173,245 UART: [idev] UDS.KEYID = 0
1,173,591 ready_for_fw is high
1,173,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,315 UART: [idev] Erasing UDS.KEYID = 0
1,198,509 UART: [idev] Sha1 KeyId Algorithm
1,207,565 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,215,050 UART: [ldev] Erasing FE.KEYID = 1
1,241,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,988 UART: [fwproc] Wait for Commands...
1,281,689 UART: [fwproc] Recv command 0x46574c44
1,282,422 UART: [fwproc] Recv'd Img size: 114168 bytes
3,125,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,221 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,317,771 >>> mbox cmd response: success
3,318,904 UART: [afmc] ++
3,319,072 UART: [afmc] CDI.KEYID = 6
3,319,435 UART: [afmc] SUBJECT.KEYID = 7
3,319,861 UART: [afmc] AUTHORITY.KEYID = 5
3,356,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,184 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,894 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,784 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,495 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,409 UART: [afmc] --
3,399,405 UART: [cold-reset] --
3,400,173 UART: [state] Locking Datavault
3,401,406 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,010 UART: [state] Locking ICCM
3,402,590 UART: [exit] Launching FMC @ 0x40000130
3,407,919 UART:
3,407,935 UART: Running Caliptra FMC ...
3,408,343 UART:
3,408,397 UART: [state] CFI Enabled
3,419,137 UART: [fht] FMC Alias Private Key: 7
3,526,643 UART: [art] Extend RT PCRs Done
3,527,071 UART: [art] Lock RT PCRs Done
3,528,609 UART: [art] Populate DV Done
3,536,833 UART: [fht] FMC Alias Private Key: 7
3,537,799 UART: [art] Derive CDI
3,538,079 UART: [art] Store in in slot 0x4
3,623,532 UART: [art] Derive Key Pair
3,623,892 UART: [art] Store priv key in slot 0x5
3,637,064 UART: [art] Derive Key Pair - Done
3,651,780 UART: [art] Signing Cert with AUTHO
3,652,260 UART: RITY.KEYID = 7
3,667,464 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,229 UART: [art] PUB.X = 1BE415309B87115655AE852F77C900343E18CE60B9202748A1834EA110A6DD1C001404A0603AB6E958DF939F586AFB45
3,674,946 UART: [art] PUB.Y = C2AE9F9E45E3ABA18F3E16FE41AF7FE5D70A642A247C848B8246848205EF0AD75F51892B0BCD3FF17858E9257B774DA3
3,681,896 UART: [art] SIG.R = 1EDACC0AFD11DCEFF04A0A1AAA1ADA3D136B6FEF7B2B5668798077576CCD95D54A024DF64121681620386C9FADABE002
3,688,676 UART: [art] SIG.S = 40AF4B9ED17D676EDB8D91DCCF4BB17AA98399FD7CEE854082B07F184A042E8E2151BBB1B772541981E673C8F2A5BCD2
3,712,672 UART: Caliptra RT
3,712,925 UART: [state] CFI Enabled
3,820,886 UART: [rt] RT listening for mailbox commands...
3,821,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,936 UART: [rt]cmd =0x41544d4e, len=14344
5,070,011 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,770 ready_for_fw is high
1,055,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,158,809 >>> mbox cmd response: success
3,221,388 UART:
3,221,404 UART: Running Caliptra FMC ...
3,221,812 UART:
3,221,866 UART: [state] CFI Enabled
3,232,308 UART: [fht] FMC Alias Private Key: 7
3,340,784 UART: [art] Extend RT PCRs Done
3,341,212 UART: [art] Lock RT PCRs Done
3,342,754 UART: [art] Populate DV Done
3,350,758 UART: [fht] FMC Alias Private Key: 7
3,351,708 UART: [art] Derive CDI
3,351,988 UART: [art] Store in in slot 0x4
3,437,501 UART: [art] Derive Key Pair
3,437,861 UART: [art] Store priv key in slot 0x5
3,451,029 UART: [art] Derive Key Pair - Done
3,465,412 UART: [art] Signing Cert with AUTHO
3,465,892 UART: RITY.KEYID = 7
3,481,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,482,007 UART: [art] PUB.X = 93570047C825DAE5FE463D4B962F2B6EA5C84B7690353322A1425DBBDDCD285D2620AFF7863EC1910FCFFF310FC41C4E
3,488,761 UART: [art] PUB.Y = 1F0E401C34B5C1AB689CDFA89B1C1EF0A4C98A7D703D0E203D8EB9857580CCAFD6C7B937DAB66891E16EC17B42B703FC
3,495,722 UART: [art] SIG.R = 2505CD57CA24B685B7C25B4D1AAA45F1EF6DDF3C6E02F23E933F2FEEF33087A07059EAB4AC06F6589E3F17B7F3A753A6
3,502,501 UART: [art] SIG.S = 0EA8493C5768FD78EA942ABE8D70529268820E2C764D2BF878FCCFB4C42DC73D301628F1E6084ABEAF9AA750EDC4A3C0
3,525,991 UART: Caliptra RT
3,526,244 UART: [state] CFI Enabled
3,633,785 UART: [rt] RT listening for mailbox commands...
3,634,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,583 UART: [rt]cmd =0x41544d4e, len=14344
4,887,552 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,569 UART: [state] LifecycleState = Unprovisioned
86,224 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,639 UART: [kat] SHA2-512-ACC
906,540 UART: [kat] ECC-384
916,197 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,090 UART: [idev] ++
1,173,258 UART: [idev] CDI.KEYID = 6
1,173,619 UART: [idev] SUBJECT.KEYID = 7
1,174,044 UART: [idev] UDS.KEYID = 0
1,174,390 ready_for_fw is high
1,174,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,207,952 UART: [idev] --
1,209,049 UART: [ldev] ++
1,209,217 UART: [ldev] CDI.KEYID = 6
1,209,581 UART: [ldev] SUBJECT.KEYID = 5
1,210,008 UART: [ldev] AUTHORITY.KEYID = 7
1,210,471 UART: [ldev] FE.KEYID = 1
1,215,647 UART: [ldev] Erasing FE.KEYID = 1
1,241,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,039 UART: [ldev] --
1,280,491 UART: [fwproc] Wait for Commands...
1,281,254 UART: [fwproc] Recv command 0x46574c44
1,281,987 UART: [fwproc] Recv'd Img size: 114168 bytes
3,132,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,920 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,325,564 >>> mbox cmd response: success
3,326,777 UART: [afmc] ++
3,326,945 UART: [afmc] CDI.KEYID = 6
3,327,308 UART: [afmc] SUBJECT.KEYID = 7
3,327,734 UART: [afmc] AUTHORITY.KEYID = 5
3,363,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,001 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,711 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,601 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,312 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,406,208 UART: [afmc] --
3,407,116 UART: [cold-reset] --
3,407,972 UART: [state] Locking Datavault
3,409,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,009 UART: [state] Locking ICCM
3,410,525 UART: [exit] Launching FMC @ 0x40000130
3,415,854 UART:
3,415,870 UART: Running Caliptra FMC ...
3,416,278 UART:
3,416,421 UART: [state] CFI Enabled
3,426,669 UART: [fht] FMC Alias Private Key: 7
3,535,401 UART: [art] Extend RT PCRs Done
3,535,829 UART: [art] Lock RT PCRs Done
3,537,777 UART: [art] Populate DV Done
3,546,023 UART: [fht] FMC Alias Private Key: 7
3,547,145 UART: [art] Derive CDI
3,547,425 UART: [art] Store in in slot 0x4
3,633,184 UART: [art] Derive Key Pair
3,633,544 UART: [art] Store priv key in slot 0x5
3,646,796 UART: [art] Derive Key Pair - Done
3,661,462 UART: [art] Signing Cert with AUTHO
3,661,942 UART: RITY.KEYID = 7
3,677,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,678,327 UART: [art] PUB.X = 03B39DFDD93804D493245434343A15875FFFD61D1E5CE3AF973B203F48DD682F7943A6C8C4CDC1256DEFDC5A875A42C9
3,685,101 UART: [art] PUB.Y = 6D26E2FCA9FFCED9665FA4363775B08FAC972626C1F7AE5A044469645D50B6690061E3C6C9603650B764CF7C49C44E7B
3,692,030 UART: [art] SIG.R = 882BFAB51BF3AC74191E6D3CC18A8237E3673D688F6956128DAC603B480275C0165050A0CA022C2D44A1875E0D079E2E
3,698,788 UART: [art] SIG.S = 3BA053247B8845EB664AB93AD868C5E2A985D3AF1314190CA43F1E4A7BF30FFE8259CC592A62832368CE453839DCEABE
3,722,499 UART: Caliptra RT
3,722,844 UART: [state] CFI Enabled
3,830,458 UART: [rt] RT listening for mailbox commands...
3,831,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,954,252 UART: [rt]cmd =0x41544d4e, len=14344
5,091,742 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,357 ready_for_fw is high
1,056,357 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,863 >>> mbox cmd response: success
3,227,618 UART:
3,227,634 UART: Running Caliptra FMC ...
3,228,042 UART:
3,228,185 UART: [state] CFI Enabled
3,238,659 UART: [fht] FMC Alias Private Key: 7
3,346,241 UART: [art] Extend RT PCRs Done
3,346,669 UART: [art] Lock RT PCRs Done
3,347,967 UART: [art] Populate DV Done
3,356,103 UART: [fht] FMC Alias Private Key: 7
3,357,129 UART: [art] Derive CDI
3,357,409 UART: [art] Store in in slot 0x4
3,443,360 UART: [art] Derive Key Pair
3,443,720 UART: [art] Store priv key in slot 0x5
3,457,238 UART: [art] Derive Key Pair - Done
3,471,710 UART: [art] Signing Cert with AUTHO
3,472,190 UART: RITY.KEYID = 7
3,487,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,425 UART: [art] PUB.X = 5A94E30D823CBD3D3C043D29C7F8DA53708302C7431DF5F57171F61E75AB638743C185C05F247C391273EAC2570609EC
3,495,178 UART: [art] PUB.Y = 8AD8ADF9EAD3FAFDD83A6C574645913A9CF09472DAAB73DB11995FE8B5EFCF2EDA2B288601DFDB7CAB84CB314EB9C75D
3,502,159 UART: [art] SIG.R = 0161CD657AAE8C80E99903E56EE725DCC1BFFA4317EBC4A20FDD346DBBF67964285D3045FC2B6BA66A73FBAA69CA4F04
3,508,939 UART: [art] SIG.S = CF43A24B9B700B22B9E8E2C7620D6F769AD8ED236312734C47AC34E86AC6C775EF1917CADEAA696FEDC518330F8787C7
3,532,815 UART: Caliptra RT
3,533,160 UART: [state] CFI Enabled
3,641,046 UART: [rt] RT listening for mailbox commands...
3,641,716 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,850 UART: [rt]cmd =0x41544d4e, len=14344
4,887,726 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,124 UART:
192,485 UART: Running Caliptra ROM ...
193,674 UART:
193,842 UART: [state] CFI Enabled
265,274 UART: [state] LifecycleState = Unprovisioned
267,228 UART: [state] DebugLocked = No
269,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,341 UART: [kat] SHA2-256
444,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,550 UART: [kat] ++
455,040 UART: [kat] sha1
465,129 UART: [kat] SHA2-256
467,778 UART: [kat] SHA2-384
474,467 UART: [kat] SHA2-512-ACC
476,826 UART: [kat] ECC-384
2,769,020 UART: [kat] HMAC-384Kdf
2,799,515 UART: [kat] LMS
3,989,823 UART: [kat] --
3,993,908 UART: [cold-reset] ++
3,994,842 UART: [fht] Storing FHT @ 0x50003400
4,007,026 UART: [idev] ++
4,007,689 UART: [idev] CDI.KEYID = 6
4,008,604 UART: [idev] SUBJECT.KEYID = 7
4,009,834 UART: [idev] UDS.KEYID = 0
4,010,841 ready_for_fw is high
4,011,033 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,065 UART: [idev] Erasing UDS.KEYID = 0
7,342,662 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,432 UART: [idev] --
7,368,442 UART: [ldev] ++
7,369,214 UART: [ldev] CDI.KEYID = 6
7,370,197 UART: [ldev] SUBJECT.KEYID = 5
7,371,309 UART: [ldev] AUTHORITY.KEYID = 7
7,372,477 UART: [ldev] FE.KEYID = 1
7,399,749 UART: [ldev] Erasing FE.KEYID = 1
10,734,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,628 UART: [ldev] --
13,117,124 UART: [fwproc] Waiting for Commands...
13,120,128 UART: [fwproc] Received command 0x46574c44
13,122,353 UART: [fwproc] Received Image of size 113844 bytes
21,755,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,836,792 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,905,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,221,724 >>> mbox cmd response: success
22,225,525 UART: [afmc] ++
22,226,119 UART: [afmc] CDI.KEYID = 6
22,227,022 UART: [afmc] SUBJECT.KEYID = 7
22,228,293 UART: [afmc] AUTHORITY.KEYID = 5
25,588,689 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,888,406 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,890,718 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,905,276 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,919,979 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,934,253 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,956,134 UART: [afmc] --
27,959,406 UART: [cold-reset] --
27,963,100 UART: [state] Locking Datavault
27,967,365 UART: [state] Locking PCR0, PCR1 and PCR31
27,969,113 UART: [state] Locking ICCM
27,970,662 UART: [exit] Launching FMC @ 0x40000130
27,979,055 UART:
27,979,293 UART: Running Caliptra FMC ...
27,980,390 UART:
27,980,560 UART: [state] CFI Enabled
28,048,978 UART: [fht] FMC Alias Private Key: 7
30,386,721 UART: [art] Extend RT PCRs Done
30,387,943 UART: [art] Lock RT PCRs Done
30,389,832 UART: [art] Populate DV Done
30,395,568 UART: [fht] FMC Alias Private Key: 7
30,397,050 UART: [art] Derive CDI
30,397,795 UART: [art] Store in in slot 0x4
30,459,313 UART: [art] Derive Key Pair
30,460,348 UART: [art] Store priv key in slot 0x5
33,754,037 UART: [art] Derive Key Pair - Done
33,767,363 UART: [art] Signing Cert with AUTHO
33,768,666 UART: RITY.KEYID = 7
36,055,806 UART: [art] Erasing AUTHORITY.KEYID = 7
36,057,317 UART: [art] PUB.X = 26A4A4B6C28AC263A70D4AA67D7F47F918B6E50DBD66258D8E6622BC0FA7FE3337F3CAE62EAF2439E3A41A2603E9D887
36,064,582 UART: [art] PUB.Y = 940FEFE9C1F7B6466EAB54C1271322B4C48001E59FDA3AB1C4CBF6372F9B9B10AA059CD34F07774F9EF2338840002C30
36,071,844 UART: [art] SIG.R = 3D2E463C660653D0400EA0953F9C4B36136CCE18DB43D9B3B3AF03EA792CB696457B9A572510B1A75746A54204C0AFEC
36,079,201 UART: [art] SIG.S = 51B40BEF43ED069AD95722908DBC8B0374D7D1E085809BA34DDAF85E17C815CAC3CA2DD10CEDCB2537A445A33602E4EF
37,384,499 UART: Caliptra RT
37,385,214 UART: [state] CFI Enabled
37,545,896 UART: [rt] RT listening for mailbox commands...
37,548,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,704,613 UART: [rt]cmd =0x41544d4e, len=14344
37,706,585 >>> mbox cmd response: failed
37,707,309 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,862,548 UART: [rt]cmd =0x41544d4e, len=14344
37,864,086 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,803,911 ready_for_fw is high
3,804,757 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,035,395 >>> mbox cmd response: success
27,724,735 UART:
27,725,124 UART: Running Caliptra FMC ...
27,726,235 UART:
27,726,382 UART: [state] CFI Enabled
27,793,589 UART: [fht] FMC Alias Private Key: 7
30,130,904 UART: [art] Extend RT PCRs Done
30,132,148 UART: [art] Lock RT PCRs Done
30,133,808 UART: [art] Populate DV Done
30,139,010 UART: [fht] FMC Alias Private Key: 7
30,140,686 UART: [art] Derive CDI
30,141,417 UART: [art] Store in in slot 0x4
30,202,085 UART: [art] Derive Key Pair
30,203,119 UART: [art] Store priv key in slot 0x5
33,495,872 UART: [art] Derive Key Pair - Done
33,508,757 UART: [art] Signing Cert with AUTHO
33,510,061 UART: RITY.KEYID = 7
35,797,379 UART: [art] Erasing AUTHORITY.KEYID = 7
35,798,885 UART: [art] PUB.X = F4ACD8F5C7CF1917C91A23D660FB7A3424225CFB9FE08384E55DD969EFAA5D8E8ECDA1647C778606D356B86095BAB896
35,806,158 UART: [art] PUB.Y = 14683EC600BE1609EE64D4F02D7BFCA2CE84AD360A8671A80A3EEBAF7802546DC15542E8ED3F869BD55C4A09CB19365A
35,813,406 UART: [art] SIG.R = 4F3A0F6570B6E5AB5A6EF4273CBA6ECF79799062ADF13CCC4CBEF65CA3F9FCA739A4FFEFC84DD2D7835C6ADDBF06134C
35,820,837 UART: [art] SIG.S = 77DB2415B9C65A11BD735CE76B515DEAFFE4889AC00A9D726719C161A214454B5EE0D4E76F48290B8B6F62F69C81DD9F
37,125,981 UART: Caliptra RT
37,126,676 UART: [state] CFI Enabled
37,288,813 UART: [rt] RT listening for mailbox commands...
37,291,463 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,447,228 UART: [rt]cmd =0x41544d4e, len=14344
37,449,209 >>> mbox cmd response: failed
37,449,952 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,605,069 UART: [rt]cmd =0x41544d4e, len=14344
37,606,903 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,452 UART:
192,975 UART: Running Caliptra ROM ...
194,118 UART:
603,548 UART: [state] CFI Enabled
618,423 UART: [state] LifecycleState = Unprovisioned
620,367 UART: [state] DebugLocked = No
622,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,541 UART: [kat] SHA2-256
797,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,853 UART: [kat] ++
808,300 UART: [kat] sha1
819,819 UART: [kat] SHA2-256
822,567 UART: [kat] SHA2-384
828,710 UART: [kat] SHA2-512-ACC
831,080 UART: [kat] ECC-384
3,114,350 UART: [kat] HMAC-384Kdf
3,125,664 UART: [kat] LMS
4,315,806 UART: [kat] --
4,318,969 UART: [cold-reset] ++
4,321,264 UART: [fht] Storing FHT @ 0x50003400
4,331,752 UART: [idev] ++
4,332,316 UART: [idev] CDI.KEYID = 6
4,333,269 UART: [idev] SUBJECT.KEYID = 7
4,334,505 UART: [idev] UDS.KEYID = 0
4,335,468 ready_for_fw is high
4,335,676 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,665 UART: [idev] Erasing UDS.KEYID = 0
7,625,046 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,527 UART: [idev] --
7,650,470 UART: [ldev] ++
7,651,050 UART: [ldev] CDI.KEYID = 6
7,652,070 UART: [ldev] SUBJECT.KEYID = 5
7,653,232 UART: [ldev] AUTHORITY.KEYID = 7
7,654,468 UART: [ldev] FE.KEYID = 1
7,667,075 UART: [ldev] Erasing FE.KEYID = 1
10,957,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,646 UART: [ldev] --
13,316,759 UART: [fwproc] Waiting for Commands...
13,319,055 UART: [fwproc] Received command 0x46574c44
13,321,219 UART: [fwproc] Received Image of size 113844 bytes
22,275,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,352,534 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,421,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,737,250 >>> mbox cmd response: success
22,741,795 UART: [afmc] ++
22,742,393 UART: [afmc] CDI.KEYID = 6
22,743,291 UART: [afmc] SUBJECT.KEYID = 7
22,744,558 UART: [afmc] AUTHORITY.KEYID = 5
26,055,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,348,033 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,350,288 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,364,867 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,379,580 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,393,841 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,416,414 UART: [afmc] --
28,419,744 UART: [cold-reset] --
28,424,538 UART: [state] Locking Datavault
28,427,687 UART: [state] Locking PCR0, PCR1 and PCR31
28,429,383 UART: [state] Locking ICCM
28,430,940 UART: [exit] Launching FMC @ 0x40000130
28,439,327 UART:
28,439,582 UART: Running Caliptra FMC ...
28,440,691 UART:
28,440,853 UART: [state] CFI Enabled
28,448,664 UART: [fht] FMC Alias Private Key: 7
30,779,040 UART: [art] Extend RT PCRs Done
30,780,265 UART: [art] Lock RT PCRs Done
30,781,864 UART: [art] Populate DV Done
30,787,381 UART: [fht] FMC Alias Private Key: 7
30,788,981 UART: [art] Derive CDI
30,789,800 UART: [art] Store in in slot 0x4
30,832,391 UART: [art] Derive Key Pair
30,833,613 UART: [art] Store priv key in slot 0x5
34,075,640 UART: [art] Derive Key Pair - Done
34,088,796 UART: [art] Signing Cert with AUTHO
34,090,106 UART: RITY.KEYID = 7
36,369,229 UART: [art] Erasing AUTHORITY.KEYID = 7
36,370,739 UART: [art] PUB.X = 9B54EC707831B6EF8A2D4D2297E028AEB6D37366065555285A4C21CBBE98B4A879C83B6383C373E34043EDAE68A0B03C
36,377,955 UART: [art] PUB.Y = D2465262A95B8A12B8127433A4FD14908BA3436423904CA0B1BA665990BF382C4494D9080344379F0BA9F7DD87F48A6E
36,385,208 UART: [art] SIG.R = 35856B78BE20695037148E48B5BAB21610A7C32519FC1CE9A705711DFA3BB68C52E16DE5A9BC28111B3882635B04A8E4
36,392,565 UART: [art] SIG.S = 72E838FC27F454B44D98573B3581850C6B4A5C4572FBEBDAC436CCC51DC6EF8691CE736B361F2E0489471B564E185ACF
37,697,730 UART: Caliptra RT
37,698,456 UART: [state] CFI Enabled
37,816,885 UART: [rt] RT listening for mailbox commands...
37,819,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,975,175 UART: [rt]cmd =0x41544d4e, len=14344
37,977,042 >>> mbox cmd response: failed
37,977,883 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,133,311 UART: [rt]cmd =0x41544d4e, len=14344
38,134,909 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
4,128,731 ready_for_fw is high
4,129,320 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,324,626 >>> mbox cmd response: success
27,968,908 UART:
27,969,310 UART: Running Caliptra FMC ...
27,970,483 UART:
27,970,656 UART: [state] CFI Enabled
27,978,765 UART: [fht] FMC Alias Private Key: 7
30,309,752 UART: [art] Extend RT PCRs Done
30,310,989 UART: [art] Lock RT PCRs Done
30,312,781 UART: [art] Populate DV Done
30,318,045 UART: [fht] FMC Alias Private Key: 7
30,319,554 UART: [art] Derive CDI
30,320,320 UART: [art] Store in in slot 0x4
30,362,976 UART: [art] Derive Key Pair
30,364,042 UART: [art] Store priv key in slot 0x5
33,605,615 UART: [art] Derive Key Pair - Done
33,618,672 UART: [art] Signing Cert with AUTHO
33,619,980 UART: RITY.KEYID = 7
35,899,211 UART: [art] Erasing AUTHORITY.KEYID = 7
35,900,724 UART: [art] PUB.X = A69FEA38DF874B5E9EAC3CA32525E86A26D22FC6573555918926E41283B0D575BBF16B253AFA7AE9A0CC3784CE4DC7E4
35,908,007 UART: [art] PUB.Y = 2F84BA4E0D5DE525DF1508F57170AB1D4283381401B9EF79456D3C65587C259227C58ACFD8A8870A5DBEA4C401E95F5A
35,915,213 UART: [art] SIG.R = BA712287971A58A7810FAF032612347D81F9B2E19BD5F4E7B510F2C2CA1388F8D7D79E7C92138415B00050C114E52E94
35,922,561 UART: [art] SIG.S = B4434F26B1AE533047CB7D88F65D5E394818E8263CA4AAE7F7F8AC0CD6C1A6866BBDF2EDA54DEFCADEA5778F213E5DF0
37,227,933 UART: Caliptra RT
37,228,648 UART: [state] CFI Enabled
37,346,040 UART: [rt] RT listening for mailbox commands...
37,348,678 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,504,608 UART: [rt]cmd =0x41544d4e, len=14344
37,506,577 >>> mbox cmd response: failed
37,507,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,663,008 UART: [rt]cmd =0x41544d4e, len=14344
37,665,094 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,306 UART:
192,673 UART: Running Caliptra ROM ...
193,865 UART:
194,037 UART: [state] CFI Enabled
263,985 UART: [state] LifecycleState = Unprovisioned
265,913 UART: [state] DebugLocked = No
268,732 UART: [state] WD Timer not started. Device not locked for debugging
272,632 UART: [kat] SHA2-256
451,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,307 UART: [kat] ++
463,755 UART: [kat] sha1
476,273 UART: [kat] SHA2-256
479,334 UART: [kat] SHA2-384
485,196 UART: [kat] SHA2-512-ACC
488,136 UART: [kat] ECC-384
2,947,926 UART: [kat] HMAC-384Kdf
2,971,532 UART: [kat] LMS
3,500,981 UART: [kat] --
3,505,328 UART: [cold-reset] ++
3,506,570 UART: [fht] FHT @ 0x50003400
3,516,499 UART: [idev] ++
3,517,099 UART: [idev] CDI.KEYID = 6
3,518,034 UART: [idev] SUBJECT.KEYID = 7
3,519,142 UART: [idev] UDS.KEYID = 0
3,520,192 ready_for_fw is high
3,520,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,842 UART: [idev] Erasing UDS.KEYID = 0
6,026,394 UART: [idev] Sha1 KeyId Algorithm
6,049,138 UART: [idev] --
6,054,381 UART: [ldev] ++
6,054,954 UART: [ldev] CDI.KEYID = 6
6,055,843 UART: [ldev] SUBJECT.KEYID = 5
6,057,064 UART: [ldev] AUTHORITY.KEYID = 7
6,058,305 UART: [ldev] FE.KEYID = 1
6,101,348 UART: [ldev] Erasing FE.KEYID = 1
8,603,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,393 UART: [ldev] --
10,414,807 UART: [fwproc] Wait for Commands...
10,417,658 UART: [fwproc] Recv command 0x46574c44
10,419,694 UART: [fwproc] Recv'd Img size: 114168 bytes
15,007,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,092,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,161,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,477,908 >>> mbox cmd response: success
15,481,799 UART: [afmc] ++
15,482,399 UART: [afmc] CDI.KEYID = 6
15,483,321 UART: [afmc] SUBJECT.KEYID = 7
15,484,509 UART: [afmc] AUTHORITY.KEYID = 5
18,016,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,740,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,741,968 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,757,965 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,773,931 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,789,674 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,812,041 UART: [afmc] --
19,815,366 UART: [cold-reset] --
19,817,497 UART: [state] Locking Datavault
19,822,698 UART: [state] Locking PCR0, PCR1 and PCR31
19,824,340 UART: [state] Locking ICCM
19,826,516 UART: [exit] Launching FMC @ 0x40000130
19,834,968 UART:
19,835,246 UART: Running Caliptra FMC ...
19,836,272 UART:
19,836,440 UART: [state] CFI Enabled
19,898,101 UART: [fht] FMC Alias Private Key: 7
21,661,888 UART: [art] Extend RT PCRs Done
21,663,104 UART: [art] Lock RT PCRs Done
21,664,757 UART: [art] Populate DV Done
21,670,109 UART: [fht] FMC Alias Private Key: 7
21,671,699 UART: [art] Derive CDI
21,672,437 UART: [art] Store in in slot 0x4
21,730,746 UART: [art] Derive Key Pair
21,731,759 UART: [art] Store priv key in slot 0x5
24,194,648 UART: [art] Derive Key Pair - Done
24,207,210 UART: [art] Signing Cert with AUTHO
24,208,514 UART: RITY.KEYID = 7
25,919,795 UART: [art] Erasing AUTHORITY.KEYID = 7
25,921,303 UART: [art] PUB.X = A7BA1E16249CD332FAED64CD080996FF90915A01665CE6CDCE2E9FC12F17F68F74CA49920787D0200FBAC1A51580806F
25,928,609 UART: [art] PUB.Y = 3F011F6ED2117AAD01BD92D12BF362E936D7BC4D37CA010A6A3AFE5F373A235D362E85F80AF297FCD151EFB398B3527B
25,935,915 UART: [art] SIG.R = B2D838C86476BE63A9FDD3FFF1780A2B6E97EE82AF38E4CF5630A2029EAE475AA773C1DE1FD940D0AAB1E94BC70A0369
25,943,297 UART: [art] SIG.S = 060F10C2FB6AFEE9342F690678569D24508A6AEF4DFAA79BC666A3908237705CC7E550557B04995EADB5B86EC0F27AB5
26,922,281 UART: Caliptra RT
26,922,987 UART: [state] CFI Enabled
27,088,261 UART: [rt] RT listening for mailbox commands...
27,090,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,246,574 UART: [rt]cmd =0x41544d4e, len=14344
27,248,613 >>> mbox cmd response: failed
27,249,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,404,713 UART: [rt]cmd =0x41544d4e, len=14344
27,406,431 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,376,006 ready_for_fw is high
3,376,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,013,158 >>> mbox cmd response: success
19,291,760 UART:
19,292,152 UART: Running Caliptra FMC ...
19,293,354 UART:
19,293,529 UART: [state] CFI Enabled
19,357,966 UART: [fht] FMC Alias Private Key: 7
21,121,911 UART: [art] Extend RT PCRs Done
21,123,142 UART: [art] Lock RT PCRs Done
21,124,720 UART: [art] Populate DV Done
21,130,394 UART: [fht] FMC Alias Private Key: 7
21,131,937 UART: [art] Derive CDI
21,132,753 UART: [art] Store in in slot 0x4
21,190,023 UART: [art] Derive Key Pair
21,191,065 UART: [art] Store priv key in slot 0x5
23,653,599 UART: [art] Derive Key Pair - Done
23,666,396 UART: [art] Signing Cert with AUTHO
23,667,738 UART: RITY.KEYID = 7
25,379,603 UART: [art] Erasing AUTHORITY.KEYID = 7
25,381,111 UART: [art] PUB.X = A2165F2F195249E6BFB862CC732310E8D762D91286D3451816FC28D19EFC20FF7C0DC94FC2759D558856949017DAE6DC
25,388,402 UART: [art] PUB.Y = E677EF97854436A7EE1DE471C1BAB837A1DF2907F7961930259B24E815A5E84524CA5EB1CA26BD3B7516C3F052D72D78
25,395,645 UART: [art] SIG.R = E1779E71E0C43A5E810D86B4B636892B6D5314A1C6434F291095575B99DD4717716EF99A7D9CEC972FD3887FAE5655C9
25,403,034 UART: [art] SIG.S = DF796430E01BAF42F0ED59D658833906A1C8B341ABB9E9B7B29B857E4C5A8E42B78C51FAABC1D636E71BA7D4061B55DC
26,382,678 UART: Caliptra RT
26,383,367 UART: [state] CFI Enabled
26,546,464 UART: [rt] RT listening for mailbox commands...
26,549,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,704,899 UART: [rt]cmd =0x41544d4e, len=14344
26,706,670 >>> mbox cmd response: failed
26,707,403 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,862,669 UART: [rt]cmd =0x41544d4e, len=14344
26,864,644 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,837 writing to cptra_bootfsm_go
192,994 UART:
193,403 UART: Running Caliptra ROM ...
194,509 UART:
604,148 UART: [state] CFI Enabled
617,170 UART: [state] LifecycleState = Unprovisioned
619,040 UART: [state] DebugLocked = No
621,914 UART: [state] WD Timer not started. Device not locked for debugging
625,735 UART: [kat] SHA2-256
804,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,406 UART: [kat] ++
816,854 UART: [kat] sha1
828,367 UART: [kat] SHA2-256
831,380 UART: [kat] SHA2-384
837,888 UART: [kat] SHA2-512-ACC
840,856 UART: [kat] ECC-384
3,280,699 UART: [kat] HMAC-384Kdf
3,294,083 UART: [kat] LMS
3,823,606 UART: [kat] --
3,826,752 UART: [cold-reset] ++
3,828,612 UART: [fht] FHT @ 0x50003400
3,839,446 UART: [idev] ++
3,840,013 UART: [idev] CDI.KEYID = 6
3,840,926 UART: [idev] SUBJECT.KEYID = 7
3,842,096 UART: [idev] UDS.KEYID = 0
3,843,146 ready_for_fw is high
3,843,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,726 UART: [idev] Erasing UDS.KEYID = 0
6,316,726 UART: [idev] Sha1 KeyId Algorithm
6,340,309 UART: [idev] --
6,343,114 UART: [ldev] ++
6,343,686 UART: [ldev] CDI.KEYID = 6
6,344,619 UART: [ldev] SUBJECT.KEYID = 5
6,345,778 UART: [ldev] AUTHORITY.KEYID = 7
6,347,061 UART: [ldev] FE.KEYID = 1
6,356,854 UART: [ldev] Erasing FE.KEYID = 1
8,827,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,161 UART: [ldev] --
10,617,664 UART: [fwproc] Wait for Commands...
10,619,325 UART: [fwproc] Recv command 0x46574c44
10,621,425 UART: [fwproc] Recv'd Img size: 114168 bytes
15,206,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,280,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,349,644 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,666,739 >>> mbox cmd response: success
15,670,339 UART: [afmc] ++
15,670,946 UART: [afmc] CDI.KEYID = 6
15,671,837 UART: [afmc] SUBJECT.KEYID = 7
15,672,994 UART: [afmc] AUTHORITY.KEYID = 5
18,178,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,897,363 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,899,273 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,915,233 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,931,182 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,946,947 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,969,984 UART: [afmc] --
19,972,891 UART: [cold-reset] --
19,977,132 UART: [state] Locking Datavault
19,982,323 UART: [state] Locking PCR0, PCR1 and PCR31
19,983,963 UART: [state] Locking ICCM
19,986,511 UART: [exit] Launching FMC @ 0x40000130
19,994,962 UART:
19,995,206 UART: Running Caliptra FMC ...
19,996,313 UART:
19,996,473 UART: [state] CFI Enabled
20,004,685 UART: [fht] FMC Alias Private Key: 7
21,761,507 UART: [art] Extend RT PCRs Done
21,762,718 UART: [art] Lock RT PCRs Done
21,764,586 UART: [art] Populate DV Done
21,770,103 UART: [fht] FMC Alias Private Key: 7
21,771,583 UART: [art] Derive CDI
21,772,347 UART: [art] Store in in slot 0x4
21,815,264 UART: [art] Derive Key Pair
21,816,300 UART: [art] Store priv key in slot 0x5
24,243,431 UART: [art] Derive Key Pair - Done
24,256,286 UART: [art] Signing Cert with AUTHO
24,257,616 UART: RITY.KEYID = 7
25,963,097 UART: [art] Erasing AUTHORITY.KEYID = 7
25,964,597 UART: [art] PUB.X = 0BD196206CB3D657A4A338E5C080E30518D39251C984DF1CA4C366A2C146D60711A8A657D9DAC14D1EEFBA0A9CB255A4
25,971,862 UART: [art] PUB.Y = A5708D6B8D92B4EED2F5317ED07B0E859D44D3402CB524868440457A440659EBF69D1475D022287334FC05C7E812CAE8
25,979,102 UART: [art] SIG.R = 377C9538EFF4D35939BCE90C92F1EF14698AA08F6D48BEB8E6A1B7C6211BD819B40B8F19A81DE97B6EE73DEEE2B0D663
25,986,491 UART: [art] SIG.S = 48284B390A60689C0F217BB559FAB6E4A6DEEBFB85F9A1D73331191FA43B414053F6B1E6BCD6AD686498599EFB05A29A
26,966,135 UART: Caliptra RT
26,966,823 UART: [state] CFI Enabled
27,083,940 UART: [rt] RT listening for mailbox commands...
27,086,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,242,506 UART: [rt]cmd =0x41544d4e, len=14344
27,244,496 >>> mbox cmd response: failed
27,245,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,400,257 UART: [rt]cmd =0x41544d4e, len=14344
27,402,344 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,700 writing to cptra_bootfsm_go
3,699,837 ready_for_fw is high
3,700,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,246,037 >>> mbox cmd response: success
19,501,446 UART:
19,501,850 UART: Running Caliptra FMC ...
19,503,004 UART:
19,503,176 UART: [state] CFI Enabled
19,510,693 UART: [fht] FMC Alias Private Key: 7
21,267,775 UART: [art] Extend RT PCRs Done
21,269,010 UART: [art] Lock RT PCRs Done
21,270,912 UART: [art] Populate DV Done
21,276,353 UART: [fht] FMC Alias Private Key: 7
21,277,955 UART: [art] Derive CDI
21,278,779 UART: [art] Store in in slot 0x4
21,321,331 UART: [art] Derive Key Pair
21,322,374 UART: [art] Store priv key in slot 0x5
23,749,467 UART: [art] Derive Key Pair - Done
23,762,411 UART: [art] Signing Cert with AUTHO
23,763,709 UART: RITY.KEYID = 7
25,469,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,470,728 UART: [art] PUB.X = 07AFAFCECE2552925A4C98D7E9ADE1228267584A053A78F9EBBF3891BB5ADD75484A0D93BD422370BCC716D87144A0F1
25,477,996 UART: [art] PUB.Y = 907F026A52790FEFF711EB8EA28191407EB472B6FA6865F03F572C55EAFC823CD433C25AC1A110145969273DFC10FA7D
25,485,266 UART: [art] SIG.R = 24556EE32489E0F69DF93151520B1BF2CBAD9C5962912687897A9E1B8FB1712F18956AC939F0F02EB1C66BC6B0F8802D
25,492,673 UART: [art] SIG.S = 4F524705C3D4E8AD7F326E97EF8A0B162D30F282836D864853874BAEE567C28D9CD5793FF915FAD38CA5F23AA40B5646
26,471,881 UART: Caliptra RT
26,472,588 UART: [state] CFI Enabled
26,590,348 UART: [rt] RT listening for mailbox commands...
26,593,297 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,749,475 UART: [rt]cmd =0x41544d4e, len=14344
26,751,290 >>> mbox cmd response: failed
26,752,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,907,522 UART: [rt]cmd =0x41544d4e, len=14344
26,909,394 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,157 UART:
192,518 UART: Running Caliptra ROM ...
193,675 UART:
193,821 UART: [state] CFI Enabled
263,893 UART: [state] LifecycleState = Unprovisioned
266,304 UART: [state] DebugLocked = No
267,493 UART: [state] WD Timer not started. Device not locked for debugging
272,323 UART: [kat] SHA2-256
462,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,919 UART: [kat] ++
473,372 UART: [kat] sha1
484,983 UART: [kat] SHA2-256
487,992 UART: [kat] SHA2-384
493,575 UART: [kat] SHA2-512-ACC
496,169 UART: [kat] ECC-384
2,947,698 UART: [kat] HMAC-384Kdf
2,971,860 UART: [kat] LMS
3,503,680 UART: [kat] --
3,506,630 UART: [cold-reset] ++
3,507,568 UART: [fht] FHT @ 0x50003400
3,518,761 UART: [idev] ++
3,519,467 UART: [idev] CDI.KEYID = 6
3,520,446 UART: [idev] SUBJECT.KEYID = 7
3,521,618 UART: [idev] UDS.KEYID = 0
3,522,544 ready_for_fw is high
3,522,754 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,361 UART: [idev] Erasing UDS.KEYID = 0
6,027,203 UART: [idev] Sha1 KeyId Algorithm
6,048,661 UART: [idev] --
6,054,130 UART: [ldev] ++
6,054,812 UART: [ldev] CDI.KEYID = 6
6,055,698 UART: [ldev] SUBJECT.KEYID = 5
6,056,915 UART: [ldev] AUTHORITY.KEYID = 7
6,058,095 UART: [ldev] FE.KEYID = 1
6,101,829 UART: [ldev] Erasing FE.KEYID = 1
8,608,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,400 UART: [ldev] --
10,417,469 UART: [fwproc] Wait for Commands...
10,420,638 UART: [fwproc] Recv command 0x46574c44
10,422,941 UART: [fwproc] Recv'd Img size: 114168 bytes
15,033,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,113,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,229,823 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,771,080 >>> mbox cmd response: success
15,775,734 UART: [afmc] ++
15,776,444 UART: [afmc] CDI.KEYID = 6
15,777,697 UART: [afmc] SUBJECT.KEYID = 7
15,779,148 UART: [afmc] AUTHORITY.KEYID = 5
18,305,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,027,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,029,587 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,044,647 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,059,850 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,074,670 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,099,844 UART: [afmc] --
20,103,008 UART: [cold-reset] --
20,108,593 UART: [state] Locking Datavault
20,113,185 UART: [state] Locking PCR0, PCR1 and PCR31
20,115,406 UART: [state] Locking ICCM
20,117,346 UART: [exit] Launching FMC @ 0x40000130
20,126,032 UART:
20,126,280 UART: Running Caliptra FMC ...
20,127,381 UART:
20,127,540 UART: [state] CFI Enabled
20,185,902 UART: [fht] FMC Alias Private Key: 7
21,949,147 UART: [art] Extend RT PCRs Done
21,950,392 UART: [art] Lock RT PCRs Done
21,951,782 UART: [art] Populate DV Done
21,957,468 UART: [fht] FMC Alias Private Key: 7
21,959,005 UART: [art] Derive CDI
21,959,746 UART: [art] Store in in slot 0x4
22,018,405 UART: [art] Derive Key Pair
22,019,408 UART: [art] Store priv key in slot 0x5
24,482,590 UART: [art] Derive Key Pair - Done
24,495,255 UART: [art] Signing Cert with AUTHO
24,496,559 UART: RITY.KEYID = 7
26,209,169 UART: [art] Erasing AUTHORITY.KEYID = 7
26,210,684 UART: [art] PUB.X = 5981691A8DBF977D3DE3C9B7DAD18A13EE8A9993D14A8D7BC59990B6BB36DA0C0D728D549418FA5A1EEABDFCD5CC9F7C
26,218,010 UART: [art] PUB.Y = 4C42598150C51876A37A5479CC2B07C59F5C93F7FA6B4724CA3C69A2C0AC97F7CE54CAD096012C79F5B216D4C8FC4C13
26,225,272 UART: [art] SIG.R = F8678F9CFACBFBE2D0269FA198741EA8FFA0CF05337F7E970C6E29E51D1927019A70456039F875D5E4871F7E782B04AB
26,232,642 UART: [art] SIG.S = 6813C74A20FE69932B9315AA5EF8E510FC276EC85A9B4E910282A6FEA4D9F034A3F57A5EAF94C86DB6C763A884BF04D9
27,211,813 UART: Caliptra RT
27,212,504 UART: [state] CFI Enabled
27,377,885 UART: [rt] RT listening for mailbox commands...
27,380,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,536,803 UART: [rt]cmd =0x41544d4e, len=14344
27,538,634 >>> mbox cmd response: failed
27,539,436 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,694,827 UART: [rt]cmd =0x41544d4e, len=14344
27,696,382 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,438,132 ready_for_fw is high
3,438,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,830,461 >>> mbox cmd response: success
20,116,158 UART:
20,116,561 UART: Running Caliptra FMC ...
20,117,657 UART:
20,117,809 UART: [state] CFI Enabled
20,184,197 UART: [fht] FMC Alias Private Key: 7
21,948,213 UART: [art] Extend RT PCRs Done
21,949,464 UART: [art] Lock RT PCRs Done
21,951,120 UART: [art] Populate DV Done
21,956,750 UART: [fht] FMC Alias Private Key: 7
21,958,394 UART: [art] Derive CDI
21,959,133 UART: [art] Store in in slot 0x4
22,017,042 UART: [art] Derive Key Pair
22,018,046 UART: [art] Store priv key in slot 0x5
24,481,077 UART: [art] Derive Key Pair - Done
24,494,520 UART: [art] Signing Cert with AUTHO
24,495,821 UART: RITY.KEYID = 7
26,207,181 UART: [art] Erasing AUTHORITY.KEYID = 7
26,208,690 UART: [art] PUB.X = 10AA0631AAEA3EB2A8619B39001BB4877391216530BD84B279040CF46381870587F9098CB84CCA98D6B61E07B92B40DD
26,215,868 UART: [art] PUB.Y = A630FCD50C635F8521956FB092BFD5A789F74FB738F81B6D8F305E27D7BE2642814AF04AC5644745ADB5F528022A2744
26,223,142 UART: [art] SIG.R = 853A4E25A049497EB157A765B96517163F960FE317B1DFAEC4C4DC0235F3D5FAFAB40B275AF4C8BC2C5DFB05A646BA34
26,230,527 UART: [art] SIG.S = D0AD4BA83CBA3F3379A2C9924E64B31A2E4B3E1D08AD962D83550096232B50EE3E67AA5616373B0194FAC28854AEF895
27,209,605 UART: Caliptra RT
27,210,335 UART: [state] CFI Enabled
27,374,638 UART: [rt] RT listening for mailbox commands...
27,377,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,533,081 UART: [rt]cmd =0x41544d4e, len=14344
27,534,745 >>> mbox cmd response: failed
27,535,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,691,096 UART: [rt]cmd =0x41544d4e, len=14344
27,692,748 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,755 writing to cptra_bootfsm_go
193,051 UART:
193,475 UART: Running Caliptra ROM ...
194,645 UART:
604,099 UART: [state] CFI Enabled
618,482 UART: [state] LifecycleState = Unprovisioned
620,861 UART: [state] DebugLocked = No
622,806 UART: [state] WD Timer not started. Device not locked for debugging
627,054 UART: [kat] SHA2-256
816,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,729 UART: [kat] ++
828,176 UART: [kat] sha1
840,541 UART: [kat] SHA2-256
843,541 UART: [kat] SHA2-384
848,675 UART: [kat] SHA2-512-ACC
851,272 UART: [kat] ECC-384
3,295,313 UART: [kat] HMAC-384Kdf
3,308,039 UART: [kat] LMS
3,839,847 UART: [kat] --
3,846,061 UART: [cold-reset] ++
3,848,418 UART: [fht] FHT @ 0x50003400
3,860,181 UART: [idev] ++
3,860,887 UART: [idev] CDI.KEYID = 6
3,861,922 UART: [idev] SUBJECT.KEYID = 7
3,863,027 UART: [idev] UDS.KEYID = 0
3,863,938 ready_for_fw is high
3,864,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,604 UART: [idev] Erasing UDS.KEYID = 0
6,339,012 UART: [idev] Sha1 KeyId Algorithm
6,361,219 UART: [idev] --
6,365,425 UART: [ldev] ++
6,366,108 UART: [ldev] CDI.KEYID = 6
6,367,019 UART: [ldev] SUBJECT.KEYID = 5
6,368,177 UART: [ldev] AUTHORITY.KEYID = 7
6,369,406 UART: [ldev] FE.KEYID = 1
6,381,261 UART: [ldev] Erasing FE.KEYID = 1
8,854,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,322 UART: [ldev] --
10,648,294 UART: [fwproc] Wait for Commands...
10,651,249 UART: [fwproc] Recv command 0x46574c44
10,653,557 UART: [fwproc] Recv'd Img size: 114168 bytes
15,243,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,323,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,439,802 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,981,128 >>> mbox cmd response: success
15,984,391 UART: [afmc] ++
15,985,119 UART: [afmc] CDI.KEYID = 6
15,986,393 UART: [afmc] SUBJECT.KEYID = 7
15,987,729 UART: [afmc] AUTHORITY.KEYID = 5
18,494,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,217,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,219,746 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,234,837 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,250,009 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,264,850 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,287,456 UART: [afmc] --
20,290,943 UART: [cold-reset] --
20,295,892 UART: [state] Locking Datavault
20,302,382 UART: [state] Locking PCR0, PCR1 and PCR31
20,304,614 UART: [state] Locking ICCM
20,306,342 UART: [exit] Launching FMC @ 0x40000130
20,315,018 UART:
20,315,266 UART: Running Caliptra FMC ...
20,316,384 UART:
20,316,545 UART: [state] CFI Enabled
20,324,217 UART: [fht] FMC Alias Private Key: 7
22,080,910 UART: [art] Extend RT PCRs Done
22,082,128 UART: [art] Lock RT PCRs Done
22,083,780 UART: [art] Populate DV Done
22,089,353 UART: [fht] FMC Alias Private Key: 7
22,090,950 UART: [art] Derive CDI
22,091,765 UART: [art] Store in in slot 0x4
22,134,200 UART: [art] Derive Key Pair
22,135,201 UART: [art] Store priv key in slot 0x5
24,561,998 UART: [art] Derive Key Pair - Done
24,574,882 UART: [art] Signing Cert with AUTHO
24,576,182 UART: RITY.KEYID = 7
26,281,794 UART: [art] Erasing AUTHORITY.KEYID = 7
26,283,291 UART: [art] PUB.X = 82189D2589B5950DEF9A0E5DE2D850E423322612BF7FED396D85B110C88D2B454BDCA85FB1F9C0DD7DCB171FFA7EC600
26,290,564 UART: [art] PUB.Y = 11AB3EE01B2E7E8316991630D6CE14F754FAD688CE652FFE785E14A84AFF56FCEC103DA4BC08C9AC9E71A25DE58FDCC1
26,297,855 UART: [art] SIG.R = CBB3A7F0013CB2986B648A263CEAE8A38FDBEC7786845FE784A2DD8DDD1D15E9419918CD3DA3BCFFDACE57B0EC0EEF3C
26,305,278 UART: [art] SIG.S = 76C3FBD9DA90ACAB39F394D6002C6D75551B4AD3E7AF6F48CA7F0903D2652FC0C1F78C9B5DDABD01184B8FB85780172C
27,284,206 UART: Caliptra RT
27,284,925 UART: [state] CFI Enabled
27,402,098 UART: [rt] RT listening for mailbox commands...
27,404,700 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,560,630 UART: [rt]cmd =0x41544d4e, len=14344
27,562,437 >>> mbox cmd response: failed
27,563,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,718,505 UART: [rt]cmd =0x41544d4e, len=14344
27,720,156 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
3,756,349 ready_for_fw is high
3,756,758 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,081,288 >>> mbox cmd response: success
20,333,933 UART:
20,334,319 UART: Running Caliptra FMC ...
20,335,415 UART:
20,335,570 UART: [state] CFI Enabled
20,343,423 UART: [fht] FMC Alias Private Key: 7
22,100,366 UART: [art] Extend RT PCRs Done
22,101,589 UART: [art] Lock RT PCRs Done
22,102,976 UART: [art] Populate DV Done
22,108,227 UART: [fht] FMC Alias Private Key: 7
22,109,817 UART: [art] Derive CDI
22,110,559 UART: [art] Store in in slot 0x4
22,153,683 UART: [art] Derive Key Pair
22,154,682 UART: [art] Store priv key in slot 0x5
24,581,515 UART: [art] Derive Key Pair - Done
24,594,918 UART: [art] Signing Cert with AUTHO
24,596,223 UART: RITY.KEYID = 7
26,301,099 UART: [art] Erasing AUTHORITY.KEYID = 7
26,302,610 UART: [art] PUB.X = 181B9E4824CB089D0870E6DA63329127CF5520C0B46608680D645441226F1EF3260333F08CCE4D63E5383C4FED5A2C82
26,309,853 UART: [art] PUB.Y = 44BC46BCD7D0641B4F9B0F0F395CDA3CBDE144B4A18D647C91EA8752D7973AA66E43D91F59EE8123FB1943EB123124EC
26,317,114 UART: [art] SIG.R = 8D01B43B411D4D2352EC4303B41CACA2BD8EE266EC3360E2DF1059802209C93219C71DB36628AD94792BA8214AAC6339
26,324,514 UART: [art] SIG.S = D3E9104C7F702788623B7715C9C58FD30FEA90069DE250275FB04493616BD2C7535A2660483A730FE4633F6693417FB2
27,303,494 UART: Caliptra RT
27,304,211 UART: [state] CFI Enabled
27,421,575 UART: [rt] RT listening for mailbox commands...
27,424,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,580,158 UART: [rt]cmd =0x41544d4e, len=14344
27,582,191 >>> mbox cmd response: failed
27,582,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,738,140 UART: [rt]cmd =0x41544d4e, len=14344
27,740,164 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,708 UART: [state] LifecycleState = Unprovisioned
85,363 UART: [state] DebugLocked = No
85,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,467 UART: [kat] SHA2-256
881,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,513 UART: [kat] ++
885,665 UART: [kat] sha1
889,907 UART: [kat] SHA2-256
891,845 UART: [kat] SHA2-384
894,424 UART: [kat] SHA2-512-ACC
896,325 UART: [kat] ECC-384
901,764 UART: [kat] HMAC-384Kdf
906,440 UART: [kat] LMS
1,474,636 UART: [kat] --
1,475,447 UART: [cold-reset] ++
1,475,815 UART: [fht] Storing FHT @ 0x50003400
1,478,718 UART: [idev] ++
1,478,886 UART: [idev] CDI.KEYID = 6
1,479,246 UART: [idev] SUBJECT.KEYID = 7
1,479,670 UART: [idev] UDS.KEYID = 0
1,480,015 ready_for_fw is high
1,480,015 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,604 UART: [idev] Erasing UDS.KEYID = 0
1,504,378 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,942 UART: [idev] --
1,513,913 UART: [ldev] ++
1,514,081 UART: [ldev] CDI.KEYID = 6
1,514,444 UART: [ldev] SUBJECT.KEYID = 5
1,514,870 UART: [ldev] AUTHORITY.KEYID = 7
1,515,333 UART: [ldev] FE.KEYID = 1
1,520,407 UART: [ldev] Erasing FE.KEYID = 1
1,545,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,754 UART: [ldev] --
1,585,097 UART: [fwproc] Waiting for Commands...
1,585,956 UART: [fwproc] Received command 0x46574c44
1,586,747 UART: [fwproc] Received Image of size 114168 bytes
5,081,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,109,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,138,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,274,550 >>> mbox cmd response: success
5,275,742 UART: [afmc] ++
5,275,910 UART: [afmc] CDI.KEYID = 6
5,276,272 UART: [afmc] SUBJECT.KEYID = 7
5,276,697 UART: [afmc] AUTHORITY.KEYID = 5
5,311,461 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,327,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,328,691 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,334,400 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,340,292 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,345,993 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,353,791 UART: [afmc] --
5,354,791 UART: [cold-reset] --
5,355,671 UART: [state] Locking Datavault
5,356,800 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,404 UART: [state] Locking ICCM
5,357,852 UART: [exit] Launching FMC @ 0x40000130
5,363,181 UART:
5,363,197 UART: Running Caliptra FMC ...
5,363,605 UART:
5,363,659 UART: [state] CFI Enabled
5,374,187 UART: [fht] FMC Alias Private Key: 7
5,481,737 UART: [art] Extend RT PCRs Done
5,482,165 UART: [art] Lock RT PCRs Done
5,483,473 UART: [art] Populate DV Done
5,491,579 UART: [fht] FMC Alias Private Key: 7
5,492,539 UART: [art] Derive CDI
5,492,819 UART: [art] Store in in slot 0x4
5,578,578 UART: [art] Derive Key Pair
5,578,938 UART: [art] Store priv key in slot 0x5
5,592,084 UART: [art] Derive Key Pair - Done
5,607,230 UART: [art] Signing Cert with AUTHO
5,607,710 UART: RITY.KEYID = 7
5,622,962 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,727 UART: [art] PUB.X = 149BC84E3C444973AA3C7FA952ABC8A56411BD5FE60781FE0BF61E8DB100F3AAC74F338D8DB0494448787A4A45644EBC
5,630,481 UART: [art] PUB.Y = D991213CAB8B65C1E39154E2A72E70FF993FDD31BCC77A27E9A1D7E41B217C15152843673FFBF5770BA4697C625D8A1F
5,637,436 UART: [art] SIG.R = 577D7CAC205A98A7D4F23ED1350896D396884C0A7530A419BE21C8CEC746D66C7ED0AACB917EF749496757832F3596A3
5,644,202 UART: [art] SIG.S = ED3615CD29755FDB6B3958785623DD209B15401425CBF3C01AB3C5BEC9C67BAD94840AE5E3677E733C86E87684DBB879
5,668,058 UART: Caliptra RT
5,668,311 UART: [state] CFI Enabled
5,776,268 UART: [rt] RT listening for mailbox commands...
5,776,938 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,899,864 UART: [rt]cmd =0x41544d4e, len=14344
5,901,389 >>> mbox cmd response: failed
5,901,389 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,023,899 UART: [rt]cmd =0x41544d4e, len=14344
6,025,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 ready_for_fw is high
1,362,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,275,006 >>> mbox cmd response: success
5,336,207 UART:
5,336,223 UART: Running Caliptra FMC ...
5,336,631 UART:
5,336,685 UART: [state] CFI Enabled
5,347,329 UART: [fht] FMC Alias Private Key: 7
5,455,295 UART: [art] Extend RT PCRs Done
5,455,723 UART: [art] Lock RT PCRs Done
5,457,669 UART: [art] Populate DV Done
5,466,061 UART: [fht] FMC Alias Private Key: 7
5,467,069 UART: [art] Derive CDI
5,467,349 UART: [art] Store in in slot 0x4
5,552,922 UART: [art] Derive Key Pair
5,553,282 UART: [art] Store priv key in slot 0x5
5,566,394 UART: [art] Derive Key Pair - Done
5,581,313 UART: [art] Signing Cert with AUTHO
5,581,793 UART: RITY.KEYID = 7
5,597,379 UART: [art] Erasing AUTHORITY.KEYID = 7
5,598,144 UART: [art] PUB.X = 21EFF520FD7C5228420BEAE6D7D93071CEC208080FAD4A232712550D28EE57B704784DDB6B46748833C21AAD5244AFD5
5,604,902 UART: [art] PUB.Y = 13F2BEDB3388AA3757AEF1DEA2BBFF3B6BDB505BD7B883BA3FF61884F6ABEE1CC4D9789718F6D5B7058E0D96DCAC930A
5,611,873 UART: [art] SIG.R = C0565024EABAE8CAC340A0A9433D3381250D11370239870DD899CF682A9C467DCCA4A60A481A21091DF00A616619F8EA
5,618,627 UART: [art] SIG.S = 7323AE027D54A5E4DA6FA049A71658B86FD47F2F541ABF138B0A235DD21070A4459C64117EC4996C683AEB227D1E8676
5,643,070 UART: Caliptra RT
5,643,323 UART: [state] CFI Enabled
5,751,154 UART: [rt] RT listening for mailbox commands...
5,751,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,874,924 UART: [rt]cmd =0x41544d4e, len=14344
5,876,103 >>> mbox cmd response: failed
5,876,103 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,821 UART: [rt]cmd =0x41544d4e, len=14344
6,000,464 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,738 UART: [kat] SHA2-256
882,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,784 UART: [kat] ++
886,936 UART: [kat] sha1
891,048 UART: [kat] SHA2-256
892,986 UART: [kat] SHA2-384
895,705 UART: [kat] SHA2-512-ACC
897,606 UART: [kat] ECC-384
902,791 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,398 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,060 ready_for_fw is high
1,481,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,653 UART: [idev] Erasing UDS.KEYID = 0
1,505,459 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,097 UART: [idev] --
1,515,256 UART: [ldev] ++
1,515,424 UART: [ldev] CDI.KEYID = 6
1,515,787 UART: [ldev] SUBJECT.KEYID = 5
1,516,213 UART: [ldev] AUTHORITY.KEYID = 7
1,516,676 UART: [ldev] FE.KEYID = 1
1,521,856 UART: [ldev] Erasing FE.KEYID = 1
1,547,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,447 UART: [ldev] --
1,586,952 UART: [fwproc] Waiting for Commands...
1,587,819 UART: [fwproc] Received command 0x46574c44
1,588,610 UART: [fwproc] Received Image of size 114168 bytes
5,120,471 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,149,017 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,178,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,313,918 >>> mbox cmd response: success
5,315,086 UART: [afmc] ++
5,315,254 UART: [afmc] CDI.KEYID = 6
5,315,616 UART: [afmc] SUBJECT.KEYID = 7
5,316,041 UART: [afmc] AUTHORITY.KEYID = 5
5,351,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,367,677 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,368,457 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,374,166 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,058 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,385,759 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,393,627 UART: [afmc] --
5,394,581 UART: [cold-reset] --
5,395,435 UART: [state] Locking Datavault
5,396,478 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,082 UART: [state] Locking ICCM
5,397,552 UART: [exit] Launching FMC @ 0x40000130
5,402,881 UART:
5,402,897 UART: Running Caliptra FMC ...
5,403,305 UART:
5,403,448 UART: [state] CFI Enabled
5,413,722 UART: [fht] FMC Alias Private Key: 7
5,521,606 UART: [art] Extend RT PCRs Done
5,522,034 UART: [art] Lock RT PCRs Done
5,523,286 UART: [art] Populate DV Done
5,531,404 UART: [fht] FMC Alias Private Key: 7
5,532,562 UART: [art] Derive CDI
5,532,842 UART: [art] Store in in slot 0x4
5,618,669 UART: [art] Derive Key Pair
5,619,029 UART: [art] Store priv key in slot 0x5
5,631,571 UART: [art] Derive Key Pair - Done
5,646,131 UART: [art] Signing Cert with AUTHO
5,646,611 UART: RITY.KEYID = 7
5,662,121 UART: [art] Erasing AUTHORITY.KEYID = 7
5,662,886 UART: [art] PUB.X = B4FAD4AFE9123903BF803065C857BEFBDB905860735442DDB48839691ACC12786018617D71CE651BA6564623784563BE
5,669,649 UART: [art] PUB.Y = 3FF6F7ED26F944CC35959BEA43C38255EED5BBE4B7BD2A77D2696EF9AD17A7F538063972F058D9EB3C05D1207A141D75
5,676,605 UART: [art] SIG.R = 1323F45F4554D820246B8CE41FD9BB3E05422DD9794F17F8586333FED8762CC1987A5891004E0DD4AEC6B2F418E27797
5,683,345 UART: [art] SIG.S = 6EE571CF124F6BE6FDF576A35AABD47DA8E0458AFFA3C90ED5F43B9E9E7E48C025449689E8E4B5388FDD59AEAA870DD0
5,707,096 UART: Caliptra RT
5,707,441 UART: [state] CFI Enabled
5,815,379 UART: [rt] RT listening for mailbox commands...
5,816,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,063 UART: [rt]cmd =0x41544d4e, len=14344
5,940,566 >>> mbox cmd response: failed
5,940,566 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,062,956 UART: [rt]cmd =0x41544d4e, len=14344
6,064,625 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,246 ready_for_fw is high
1,363,246 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,047,331 >>> mbox cmd response: success
5,108,722 UART:
5,108,738 UART: Running Caliptra FMC ...
5,109,146 UART:
5,109,289 UART: [state] CFI Enabled
5,119,741 UART: [fht] FMC Alias Private Key: 7
5,228,265 UART: [art] Extend RT PCRs Done
5,228,693 UART: [art] Lock RT PCRs Done
5,230,127 UART: [art] Populate DV Done
5,238,289 UART: [fht] FMC Alias Private Key: 7
5,239,439 UART: [art] Derive CDI
5,239,719 UART: [art] Store in in slot 0x4
5,325,536 UART: [art] Derive Key Pair
5,325,896 UART: [art] Store priv key in slot 0x5
5,339,174 UART: [art] Derive Key Pair - Done
5,353,756 UART: [art] Signing Cert with AUTHO
5,354,236 UART: RITY.KEYID = 7
5,369,660 UART: [art] Erasing AUTHORITY.KEYID = 7
5,370,425 UART: [art] PUB.X = 83F698E320BB0269161419EDA54DBEB1CC6E4D2DF4C2BFDF151586475300A35A1AC08F79B11E9D97FBAD5F7F6A61E300
5,377,162 UART: [art] PUB.Y = 384B7DFB83949972822B1F67BB1A07CA40C0A7CF5A7A5846FAC2A97DEF414202904F93427BCA62A2EBEC78E6EFAEB5C5
5,384,124 UART: [art] SIG.R = 60F6A15435E373C4111DCDEE77406A556CE223BBC228C3C3AA9B3134C06A2014C43F6FB9C74C9ACE718B6629539092CE
5,390,900 UART: [art] SIG.S = ABFA1B829A66C642C49A71BD4D921134A9A3F1574D7AE1B7ACD5F3D4F3CF27DB37A66CE3AFBDC45EC5884119007DA96B
5,414,455 UART: Caliptra RT
5,414,800 UART: [state] CFI Enabled
5,523,101 UART: [rt] RT listening for mailbox commands...
5,523,771 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,646,995 UART: [rt]cmd =0x41544d4e, len=14344
5,648,524 >>> mbox cmd response: failed
5,648,524 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,770,964 UART: [rt]cmd =0x41544d4e, len=14344
5,772,801 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
907,034 UART: [kat] SHA2-512-ACC
908,935 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
923,244 UART: [kat] LMS
1,171,572 UART: [kat] --
1,172,477 UART: [cold-reset] ++
1,172,999 UART: [fht] FHT @ 0x50003400
1,175,566 UART: [idev] ++
1,175,734 UART: [idev] CDI.KEYID = 6
1,176,094 UART: [idev] SUBJECT.KEYID = 7
1,176,518 UART: [idev] UDS.KEYID = 0
1,176,863 ready_for_fw is high
1,176,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,350 UART: [idev] Erasing UDS.KEYID = 0
1,201,423 UART: [idev] Sha1 KeyId Algorithm
1,209,873 UART: [idev] --
1,210,985 UART: [ldev] ++
1,211,153 UART: [ldev] CDI.KEYID = 6
1,211,516 UART: [ldev] SUBJECT.KEYID = 5
1,211,942 UART: [ldev] AUTHORITY.KEYID = 7
1,212,405 UART: [ldev] FE.KEYID = 1
1,217,749 UART: [ldev] Erasing FE.KEYID = 1
1,244,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,927 UART: [ldev] --
1,284,406 UART: [fwproc] Wait for Commands...
1,285,068 UART: [fwproc] Recv command 0x46574c44
1,285,796 UART: [fwproc] Recv'd Img size: 114168 bytes
3,126,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,854 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,319,359 >>> mbox cmd response: success
3,320,411 UART: [afmc] ++
3,320,579 UART: [afmc] CDI.KEYID = 6
3,320,941 UART: [afmc] SUBJECT.KEYID = 7
3,321,366 UART: [afmc] AUTHORITY.KEYID = 5
3,356,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,799 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,508 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,400 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,111 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,814 UART: [afmc] --
3,399,798 UART: [cold-reset] --
3,400,790 UART: [state] Locking Datavault
3,401,993 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,597 UART: [state] Locking ICCM
3,403,197 UART: [exit] Launching FMC @ 0x40000130
3,408,526 UART:
3,408,542 UART: Running Caliptra FMC ...
3,408,950 UART:
3,409,004 UART: [state] CFI Enabled
3,419,352 UART: [fht] FMC Alias Private Key: 7
3,527,538 UART: [art] Extend RT PCRs Done
3,527,966 UART: [art] Lock RT PCRs Done
3,529,546 UART: [art] Populate DV Done
3,537,736 UART: [fht] FMC Alias Private Key: 7
3,538,790 UART: [art] Derive CDI
3,539,070 UART: [art] Store in in slot 0x4
3,624,737 UART: [art] Derive Key Pair
3,625,097 UART: [art] Store priv key in slot 0x5
3,638,427 UART: [art] Derive Key Pair - Done
3,653,045 UART: [art] Signing Cert with AUTHO
3,653,525 UART: RITY.KEYID = 7
3,668,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,144 UART: [art] PUB.X = E6635C3A7E8DE3C58250533E20B9A3A1DE94B3B47AE161FB4BA0182DADC68074C1AB8859EF45C290AC4E67DD0DA11861
3,675,925 UART: [art] PUB.Y = 4E99AF70AA9C8FF8751979C9AF321766EB0FA3955BA2006D1D8182DB31D8BD4B5D9247372DC765A601EB8359A153C0EB
3,682,855 UART: [art] SIG.R = 12D192E17C19E11D77CABF918543FFAE6AC2349DD904303E262A084B7003DCB59F26F03A3A908E8E266CBEE2D51B4616
3,689,624 UART: [art] SIG.S = D5EF47D0BA817CB669BDB3C4B4DE56F6E1BBAB203EDEA1657D909E8E4ECA567143B1E0B7539DD68E94F7DCA20492F101
3,713,247 UART: Caliptra RT
3,713,500 UART: [state] CFI Enabled
3,820,134 UART: [rt] RT listening for mailbox commands...
3,820,804 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,044 UART: [rt]cmd =0x41544d4e, len=14344
3,945,499 >>> mbox cmd response: failed
3,945,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,068,179 UART: [rt]cmd =0x41544d4e, len=14344
4,069,666 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,355 ready_for_fw is high
1,060,355 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,162,811 >>> mbox cmd response: success
3,225,366 UART:
3,225,382 UART: Running Caliptra FMC ...
3,225,790 UART:
3,225,844 UART: [state] CFI Enabled
3,236,310 UART: [fht] FMC Alias Private Key: 7
3,344,020 UART: [art] Extend RT PCRs Done
3,344,448 UART: [art] Lock RT PCRs Done
3,345,638 UART: [art] Populate DV Done
3,353,852 UART: [fht] FMC Alias Private Key: 7
3,354,880 UART: [art] Derive CDI
3,355,160 UART: [art] Store in in slot 0x4
3,440,985 UART: [art] Derive Key Pair
3,441,345 UART: [art] Store priv key in slot 0x5
3,455,105 UART: [art] Derive Key Pair - Done
3,470,049 UART: [art] Signing Cert with AUTHO
3,470,529 UART: RITY.KEYID = 7
3,485,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,212 UART: [art] PUB.X = E09AD7A0BC3942B55586FBEA6EADB383D8DAD6EDBF0E41DF0F07F37C4FBFC8BC9083428455CB7DA9E4928A1790C5BB5A
3,493,001 UART: [art] PUB.Y = 11500FDE0BC1056C085DCFD2EAF7A061445A85423FE2DC3F86FC2EB49AC9C24101D897721625ABEA4A07F248BF58F0E7
3,499,947 UART: [art] SIG.R = 82A8B8D98765C5C1795E138A15245C17FB18C09C42E1FC9C74655342532F0B2F5BD2E0C21586211E64590AF7FFCFE31B
3,506,713 UART: [art] SIG.S = 652048B835D82DC339272F9BD99AA91F8F9A383BB4A9A8F5799194E6D041A33CBF4166EDDC3D2DBEB861DF15800CF954
3,530,335 UART: Caliptra RT
3,530,588 UART: [state] CFI Enabled
3,638,430 UART: [rt] RT listening for mailbox commands...
3,639,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,268 UART: [rt]cmd =0x41544d4e, len=14344
3,763,811 >>> mbox cmd response: failed
3,763,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,886,191 UART: [rt]cmd =0x41544d4e, len=14344
3,887,884 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
907,163 UART: [kat] SHA2-512-ACC
909,064 UART: [kat] ECC-384
918,985 UART: [kat] HMAC-384Kdf
923,685 UART: [kat] LMS
1,172,013 UART: [kat] --
1,172,988 UART: [cold-reset] ++
1,173,552 UART: [fht] FHT @ 0x50003400
1,176,181 UART: [idev] ++
1,176,349 UART: [idev] CDI.KEYID = 6
1,176,709 UART: [idev] SUBJECT.KEYID = 7
1,177,133 UART: [idev] UDS.KEYID = 0
1,177,478 ready_for_fw is high
1,177,478 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,925 UART: [idev] Erasing UDS.KEYID = 0
1,202,098 UART: [idev] Sha1 KeyId Algorithm
1,210,638 UART: [idev] --
1,211,772 UART: [ldev] ++
1,211,940 UART: [ldev] CDI.KEYID = 6
1,212,303 UART: [ldev] SUBJECT.KEYID = 5
1,212,729 UART: [ldev] AUTHORITY.KEYID = 7
1,213,192 UART: [ldev] FE.KEYID = 1
1,218,256 UART: [ldev] Erasing FE.KEYID = 1
1,244,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,882 UART: [ldev] --
1,284,363 UART: [fwproc] Wait for Commands...
1,284,989 UART: [fwproc] Recv command 0x46574c44
1,285,717 UART: [fwproc] Recv'd Img size: 114168 bytes
3,128,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,320,729 >>> mbox cmd response: success
3,321,809 UART: [afmc] ++
3,321,977 UART: [afmc] CDI.KEYID = 6
3,322,339 UART: [afmc] SUBJECT.KEYID = 7
3,322,764 UART: [afmc] AUTHORITY.KEYID = 5
3,358,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,781 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,529 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,238 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,130 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,841 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,548 UART: [afmc] --
3,401,574 UART: [cold-reset] --
3,402,428 UART: [state] Locking Datavault
3,403,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,555 UART: [state] Locking ICCM
3,405,141 UART: [exit] Launching FMC @ 0x40000130
3,410,470 UART:
3,410,486 UART: Running Caliptra FMC ...
3,410,894 UART:
3,411,037 UART: [state] CFI Enabled
3,421,547 UART: [fht] FMC Alias Private Key: 7
3,528,783 UART: [art] Extend RT PCRs Done
3,529,211 UART: [art] Lock RT PCRs Done
3,530,913 UART: [art] Populate DV Done
3,539,199 UART: [fht] FMC Alias Private Key: 7
3,540,221 UART: [art] Derive CDI
3,540,501 UART: [art] Store in in slot 0x4
3,626,356 UART: [art] Derive Key Pair
3,626,716 UART: [art] Store priv key in slot 0x5
3,639,984 UART: [art] Derive Key Pair - Done
3,654,834 UART: [art] Signing Cert with AUTHO
3,655,314 UART: RITY.KEYID = 7
3,670,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,003 UART: [art] PUB.X = 5EFAFA2085EECCAE3E175370774AEF5D68E5B6FA12A622E802ACFFA97B2452960CF546EE44E2E82C2E9835BDC3AE4DEA
3,677,793 UART: [art] PUB.Y = E7B3F55FA8DE2534E8298B3E621A2D42ED2ADA2CA963B61D12066AD3E686642063A7F7C21F32F21ABC6900F33DC9CC6A
3,684,732 UART: [art] SIG.R = 164CEF11864146207402403F52540F349ECE3B53DC867150C62265A25C02CD5776A389FCC2C9213A4DA64A422DF723E7
3,691,487 UART: [art] SIG.S = 578F4215FBCBD01B7D2C3184BB09E17ED91765BC304F394844AC78A782A75109067CBB1C345A158F6F15BA39E104C20E
3,714,887 UART: Caliptra RT
3,715,232 UART: [state] CFI Enabled
3,824,327 UART: [rt] RT listening for mailbox commands...
3,824,997 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,295 UART: [rt]cmd =0x41544d4e, len=14344
3,949,636 >>> mbox cmd response: failed
3,949,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,072,146 UART: [rt]cmd =0x41544d4e, len=14344
4,073,719 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,168 ready_for_fw is high
1,061,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,170,721 >>> mbox cmd response: success
3,233,490 UART:
3,233,506 UART: Running Caliptra FMC ...
3,233,914 UART:
3,234,057 UART: [state] CFI Enabled
3,244,619 UART: [fht] FMC Alias Private Key: 7
3,353,001 UART: [art] Extend RT PCRs Done
3,353,429 UART: [art] Lock RT PCRs Done
3,355,037 UART: [art] Populate DV Done
3,363,001 UART: [fht] FMC Alias Private Key: 7
3,364,059 UART: [art] Derive CDI
3,364,339 UART: [art] Store in in slot 0x4
3,450,068 UART: [art] Derive Key Pair
3,450,428 UART: [art] Store priv key in slot 0x5
3,463,342 UART: [art] Derive Key Pair - Done
3,478,239 UART: [art] Signing Cert with AUTHO
3,478,719 UART: RITY.KEYID = 7
3,494,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,920 UART: [art] PUB.X = 151C92F46459F7097B67D81BC872A7324B89C7504D5EC2E8F3A4F31F9AC78685947B56B0348F19FEBA11A44801BEABC8
3,501,688 UART: [art] PUB.Y = A45480FB1081A432327BEACC08E768197C95DF0D5E158D4411C618838AEF0626A7A0F4CC54AC7FEF3DA773B9BDF03D8C
3,508,643 UART: [art] SIG.R = 8AFD9871B2C8C5171F779A77C48F44C36C6961715293C0781471706B5A8A55B3E047D149CB2407FA373A26B4BEA5CA90
3,515,408 UART: [art] SIG.S = 92A3B223A160633BA34768A463032D2235A38B5B672A3FC5D83DB8AA44942F4E77F236D3B7499599BFD83D6B3DFBEBEB
3,538,808 UART: Caliptra RT
3,539,153 UART: [state] CFI Enabled
3,646,392 UART: [rt] RT listening for mailbox commands...
3,647,062 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,866 UART: [rt]cmd =0x41544d4e, len=14344
3,771,241 >>> mbox cmd response: failed
3,771,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,601 UART: [rt]cmd =0x41544d4e, len=14344
3,895,046 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
891,250 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,379 UART: [kat] ++
895,531 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,179 UART: [cold-reset] ++
1,170,745 UART: [fht] FHT @ 0x50003400
1,173,521 UART: [idev] ++
1,173,689 UART: [idev] CDI.KEYID = 6
1,174,050 UART: [idev] SUBJECT.KEYID = 7
1,174,475 UART: [idev] UDS.KEYID = 0
1,174,821 ready_for_fw is high
1,174,821 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,443 UART: [idev] Erasing UDS.KEYID = 0
1,199,575 UART: [idev] Sha1 KeyId Algorithm
1,208,325 UART: [idev] --
1,209,410 UART: [ldev] ++
1,209,578 UART: [ldev] CDI.KEYID = 6
1,209,942 UART: [ldev] SUBJECT.KEYID = 5
1,210,369 UART: [ldev] AUTHORITY.KEYID = 7
1,210,832 UART: [ldev] FE.KEYID = 1
1,216,256 UART: [ldev] Erasing FE.KEYID = 1
1,242,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,756 UART: [ldev] --
1,282,156 UART: [fwproc] Wait for Commands...
1,282,729 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,317,605 >>> mbox cmd response: success
3,318,726 UART: [afmc] ++
3,318,894 UART: [afmc] CDI.KEYID = 6
3,319,257 UART: [afmc] SUBJECT.KEYID = 7
3,319,683 UART: [afmc] AUTHORITY.KEYID = 5
3,355,413 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,490 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,200 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,090 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,801 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,637 UART: [afmc] --
3,398,689 UART: [cold-reset] --
3,399,519 UART: [state] Locking Datavault
3,400,880 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,484 UART: [state] Locking ICCM
3,402,014 UART: [exit] Launching FMC @ 0x40000130
3,407,343 UART:
3,407,359 UART: Running Caliptra FMC ...
3,407,767 UART:
3,407,821 UART: [state] CFI Enabled
3,418,171 UART: [fht] FMC Alias Private Key: 7
3,526,489 UART: [art] Extend RT PCRs Done
3,526,917 UART: [art] Lock RT PCRs Done
3,528,195 UART: [art] Populate DV Done
3,536,429 UART: [fht] FMC Alias Private Key: 7
3,537,467 UART: [art] Derive CDI
3,537,747 UART: [art] Store in in slot 0x4
3,623,526 UART: [art] Derive Key Pair
3,623,886 UART: [art] Store priv key in slot 0x5
3,636,750 UART: [art] Derive Key Pair - Done
3,651,654 UART: [art] Signing Cert with AUTHO
3,652,134 UART: RITY.KEYID = 7
3,666,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,699 UART: [art] PUB.X = 7D4B4A385C88834529A8A2C84243BC6AC222AAACF703D70DCDEBA8EFA037CEEB38BAA23D68531B70ABC62AC47BD4EC39
3,674,489 UART: [art] PUB.Y = DB9BFA808C8502DD2FBA7B714CE9597023DF81BEB62EDEC46D5560C44342CF067B6CEEC60933699D63152C3FDCACC4E9
3,681,450 UART: [art] SIG.R = FB5944CAF5145CB4E07033A90D42F4D45C9297DB185C0659F6A9A63A1B4AF7E2556C870ABAEDEDDD0AD63477335C3697
3,688,220 UART: [art] SIG.S = 5746D5FEC10A645CF4DD1D0160150B58F6CED1B29DCD5BC2286053E6CA1DB6172C6CAD962BF424A8CEEA124C9DF4DC28
3,711,600 UART: Caliptra RT
3,711,853 UART: [state] CFI Enabled
3,819,587 UART: [rt] RT listening for mailbox commands...
3,820,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,279 UART: [rt]cmd =0x41544d4e, len=14344
3,944,754 >>> mbox cmd response: failed
3,944,754 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,067,460 UART: [rt]cmd =0x41544d4e, len=14344
4,068,901 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,530 ready_for_fw is high
1,055,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,982 >>> mbox cmd response: success
3,228,335 UART:
3,228,351 UART: Running Caliptra FMC ...
3,228,759 UART:
3,228,813 UART: [state] CFI Enabled
3,239,577 UART: [fht] FMC Alias Private Key: 7
3,347,821 UART: [art] Extend RT PCRs Done
3,348,249 UART: [art] Lock RT PCRs Done
3,349,793 UART: [art] Populate DV Done
3,357,965 UART: [fht] FMC Alias Private Key: 7
3,358,941 UART: [art] Derive CDI
3,359,221 UART: [art] Store in in slot 0x4
3,444,326 UART: [art] Derive Key Pair
3,444,686 UART: [art] Store priv key in slot 0x5
3,457,472 UART: [art] Derive Key Pair - Done
3,472,258 UART: [art] Signing Cert with AUTHO
3,472,738 UART: RITY.KEYID = 7
3,487,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,647 UART: [art] PUB.X = 6A4A849311997CBCD88553CD235003454C3AE78F5FF7EA2FF37291ED4B189A83FACB8CC1FB7607FA98A006480DE6E890
3,495,415 UART: [art] PUB.Y = 278FAA6C8A58FB8D90F14BF09B54410EAA68132D5648DFFF2E0B2F3382058DC243F29E290474B916D4879EFFF7CBC417
3,502,363 UART: [art] SIG.R = 6A0206050948E8D125B06E14698812E14259CDD2EF4B6047C909EE1FB853BB1B1B1B1081C2C10F793DAC60D4809F1950
3,509,113 UART: [art] SIG.S = 03EA54C272A770F95125AA3DD8B8BDA4C3BCEE54F00180F71A31BCDE95F0B720CBA67F2B4B427383DB58766B0D230F6F
3,532,584 UART: Caliptra RT
3,532,837 UART: [state] CFI Enabled
3,641,564 UART: [rt] RT listening for mailbox commands...
3,642,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,518 UART: [rt]cmd =0x41544d4e, len=14344
3,767,095 >>> mbox cmd response: failed
3,767,095 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,889,917 UART: [rt]cmd =0x41544d4e, len=14344
3,891,554 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,890 UART: [kat] ++
896,042 UART: [kat] sha1
900,098 UART: [kat] SHA2-256
902,038 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,378 UART: [idev] ++
1,173,546 UART: [idev] CDI.KEYID = 6
1,173,907 UART: [idev] SUBJECT.KEYID = 7
1,174,332 UART: [idev] UDS.KEYID = 0
1,174,678 ready_for_fw is high
1,174,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,242,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,367 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 114168 bytes
3,116,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,524 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,833 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,309,327 >>> mbox cmd response: success
3,310,552 UART: [afmc] ++
3,310,720 UART: [afmc] CDI.KEYID = 6
3,311,083 UART: [afmc] SUBJECT.KEYID = 7
3,311,509 UART: [afmc] AUTHORITY.KEYID = 5
3,347,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,363,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,160 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,870 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,375,760 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,381,471 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,345 UART: [afmc] --
3,390,395 UART: [cold-reset] --
3,391,323 UART: [state] Locking Datavault
3,392,128 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,732 UART: [state] Locking ICCM
3,393,368 UART: [exit] Launching FMC @ 0x40000130
3,398,697 UART:
3,398,713 UART: Running Caliptra FMC ...
3,399,121 UART:
3,399,264 UART: [state] CFI Enabled
3,409,894 UART: [fht] FMC Alias Private Key: 7
3,518,354 UART: [art] Extend RT PCRs Done
3,518,782 UART: [art] Lock RT PCRs Done
3,520,398 UART: [art] Populate DV Done
3,528,866 UART: [fht] FMC Alias Private Key: 7
3,529,970 UART: [art] Derive CDI
3,530,250 UART: [art] Store in in slot 0x4
3,615,993 UART: [art] Derive Key Pair
3,616,353 UART: [art] Store priv key in slot 0x5
3,629,367 UART: [art] Derive Key Pair - Done
3,644,540 UART: [art] Signing Cert with AUTHO
3,645,020 UART: RITY.KEYID = 7
3,660,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,007 UART: [art] PUB.X = 3026C21EF90DFDC13AE66748AD05B237C9BE497844C6D4159E7323E64CD432DA12B437BCEEE2055B0BCFDA6E84F1059D
3,667,776 UART: [art] PUB.Y = 1589AE852AAB8C2C96AEA912894017FB7CA1426B7F42F912169F5FF419E36994C2FD1D0E1AC5776940A59D24D7C5B8D8
3,674,729 UART: [art] SIG.R = 0BCDA9D10F08960DC7BFC58CDE3773A2AA2A4C8CEFA60412433C71613D1E79170FA9FBE374B3FDB0A9F7E047A20CEBCC
3,681,504 UART: [art] SIG.S = 01C6D94034F4E28C6A0FAE489B75A1A6D8B92285426F95BA273844B46F5265D3867D63F0B92E0DAB2C8C7A1EB54C7C99
3,705,182 UART: Caliptra RT
3,705,527 UART: [state] CFI Enabled
3,813,552 UART: [rt] RT listening for mailbox commands...
3,814,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,954 UART: [rt]cmd =0x41544d4e, len=14344
3,938,417 >>> mbox cmd response: failed
3,938,417 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,061,187 UART: [rt]cmd =0x41544d4e, len=14344
4,062,560 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,369 ready_for_fw is high
1,056,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,170,151 >>> mbox cmd response: success
3,232,774 UART:
3,232,790 UART: Running Caliptra FMC ...
3,233,198 UART:
3,233,341 UART: [state] CFI Enabled
3,243,831 UART: [fht] FMC Alias Private Key: 7
3,351,953 UART: [art] Extend RT PCRs Done
3,352,381 UART: [art] Lock RT PCRs Done
3,354,125 UART: [art] Populate DV Done
3,362,293 UART: [fht] FMC Alias Private Key: 7
3,363,243 UART: [art] Derive CDI
3,363,523 UART: [art] Store in in slot 0x4
3,449,216 UART: [art] Derive Key Pair
3,449,576 UART: [art] Store priv key in slot 0x5
3,462,514 UART: [art] Derive Key Pair - Done
3,477,209 UART: [art] Signing Cert with AUTHO
3,477,689 UART: RITY.KEYID = 7
3,493,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,940 UART: [art] PUB.X = 35BEDD319E71DAB05EFF6B2B69BB698D48EE25E0852B289FFFCD5B6216587BE7F0429073AD6B45AAEECC096961BAFC29
3,500,729 UART: [art] PUB.Y = 07102C45AF65AE7985721FE0D2228F34278BE5B60C968F15211219B58A11250D759AD16FCAC5DDE748CFC73640866251
3,507,666 UART: [art] SIG.R = 4906F3188B5A79A7757E53CF6AB5A92C6B002CEAD819CE52C6BB1DF6748173A56329F7AD7610156BB646806E1E4FFB08
3,514,414 UART: [art] SIG.S = B01D262DA5417A6432EFE6F3482F44641CDCCF6D7FF3497D8C757AADB30BD711B66415F62E500782ED93D742CC6C8E4E
3,537,893 UART: Caliptra RT
3,538,238 UART: [state] CFI Enabled
3,645,400 UART: [rt] RT listening for mailbox commands...
3,646,070 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,144 UART: [rt]cmd =0x41544d4e, len=14344
3,770,557 >>> mbox cmd response: failed
3,770,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,893,123 UART: [rt]cmd =0x41544d4e, len=14344
3,894,764 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,010 UART:
192,362 UART: Running Caliptra ROM ...
193,490 UART:
193,654 UART: [state] CFI Enabled
266,462 UART: [state] LifecycleState = Unprovisioned
268,362 UART: [state] DebugLocked = No
269,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,090 UART: [kat] SHA2-256
444,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,267 UART: [kat] ++
455,753 UART: [kat] sha1
466,762 UART: [kat] SHA2-256
469,486 UART: [kat] SHA2-384
476,533 UART: [kat] SHA2-512-ACC
478,895 UART: [kat] ECC-384
2,769,368 UART: [kat] HMAC-384Kdf
2,800,849 UART: [kat] LMS
3,991,168 UART: [kat] --
3,995,346 UART: [cold-reset] ++
3,996,870 UART: [fht] Storing FHT @ 0x50003400
4,009,199 UART: [idev] ++
4,009,765 UART: [idev] CDI.KEYID = 6
4,010,728 UART: [idev] SUBJECT.KEYID = 7
4,011,970 UART: [idev] UDS.KEYID = 0
4,012,913 ready_for_fw is high
4,013,119 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,381 UART: [idev] Erasing UDS.KEYID = 0
7,348,624 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,756 UART: [idev] --
7,374,097 UART: [ldev] ++
7,374,661 UART: [ldev] CDI.KEYID = 6
7,375,727 UART: [ldev] SUBJECT.KEYID = 5
7,376,879 UART: [ldev] AUTHORITY.KEYID = 7
7,378,096 UART: [ldev] FE.KEYID = 1
7,421,256 UART: [ldev] Erasing FE.KEYID = 1
10,755,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,417 UART: [ldev] --
13,115,898 UART: [fwproc] Waiting for Commands...
13,118,094 UART: [fwproc] Received command 0x46574c44
13,120,273 UART: [fwproc] Received Image of size 113844 bytes
21,676,263 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,756,757 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,825,608 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,142,575 >>> mbox cmd response: success
22,147,260 UART: [afmc] ++
22,147,847 UART: [afmc] CDI.KEYID = 6
22,148,748 UART: [afmc] SUBJECT.KEYID = 7
22,150,034 UART: [afmc] AUTHORITY.KEYID = 5
25,508,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,807,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,810,294 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,824,868 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,839,584 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,853,810 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,875,342 UART: [afmc] --
27,879,747 UART: [cold-reset] --
27,884,142 UART: [state] Locking Datavault
27,890,357 UART: [state] Locking PCR0, PCR1 and PCR31
27,892,057 UART: [state] Locking ICCM
27,894,574 UART: [exit] Launching FMC @ 0x40000130
27,902,939 UART:
27,903,173 UART: Running Caliptra FMC ...
27,904,267 UART:
27,904,436 UART: [state] CFI Enabled
27,969,389 UART: [fht] FMC Alias Private Key: 7
30,307,594 UART: [art] Extend RT PCRs Done
30,308,812 UART: [art] Lock RT PCRs Done
30,310,883 UART: [art] Populate DV Done
30,316,394 UART: [fht] FMC Alias Private Key: 7
30,317,925 UART: [art] Derive CDI
30,318,734 UART: [art] Store in in slot 0x4
30,378,080 UART: [art] Derive Key Pair
30,379,104 UART: [art] Store priv key in slot 0x5
33,671,788 UART: [art] Derive Key Pair - Done
33,684,895 UART: [art] Signing Cert with AUTHO
33,686,204 UART: RITY.KEYID = 7
35,974,150 UART: [art] Erasing AUTHORITY.KEYID = 7
35,975,658 UART: [art] PUB.X = 95733AB22F89AAA9241EC48F87C2C75AAE3988004F18B03AF753F02399D3FFBA43D8B94CEF34834FA5C7E076C4252114
35,982,864 UART: [art] PUB.Y = 7C0F43BB4E5F2A251B0630DCE58785D3E34780942FF2FDA6F80108F9803EB6EBB28FCF6B58593D340C6CA297D276CDD4
35,990,132 UART: [art] SIG.R = C07B151839F0A03CF55B58B3E1B967C19E2196C4BCEF95D45C81162FDE15B10DA6E0E4B6DEF16E525922D06455EBE74C
35,997,549 UART: [art] SIG.S = 0DAFD8E597E9598665D7ECA466D57593013572410245B78F4A61FDC75A50962D1207321AF476CECCBEC73C619F561F1B
37,303,034 UART: Caliptra RT
37,303,725 UART: [state] CFI Enabled
37,463,692 UART: [rt] RT listening for mailbox commands...
37,465,977 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,621,318 UART: [rt]cmd =0x41544d4e, len=14344
46,149,840 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,781,536 ready_for_fw is high
3,781,911 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,728,730 >>> mbox cmd response: success
27,428,365 UART:
27,428,750 UART: Running Caliptra FMC ...
27,429,878 UART:
27,430,038 UART: [state] CFI Enabled
27,498,047 UART: [fht] FMC Alias Private Key: 7
29,836,131 UART: [art] Extend RT PCRs Done
29,837,353 UART: [art] Lock RT PCRs Done
29,838,971 UART: [art] Populate DV Done
29,844,503 UART: [fht] FMC Alias Private Key: 7
29,846,072 UART: [art] Derive CDI
29,846,805 UART: [art] Store in in slot 0x4
29,907,138 UART: [art] Derive Key Pair
29,908,132 UART: [art] Store priv key in slot 0x5
33,201,299 UART: [art] Derive Key Pair - Done
33,214,299 UART: [art] Signing Cert with AUTHO
33,215,597 UART: RITY.KEYID = 7
35,502,981 UART: [art] Erasing AUTHORITY.KEYID = 7
35,504,488 UART: [art] PUB.X = 8445411ECF6FB7F96D60A1FB4A86D75B1403BDFA49984776264DE24AE7FFF82DD4B4268DF8B0A5F912D03692DCFE8B5E
35,511,749 UART: [art] PUB.Y = F4396B5A5A7FB7A5A1DC289DE2A0510480E7829271C7521031C984702D156246150AD729D3FA4F3B0F5BD7BF3BDA9E93
35,519,007 UART: [art] SIG.R = 25A8328D7B1525F7C771E9292F4BF3D76146DEDA725A5B8627D2DDEF462F607EC5E49FC54AD3463BDA333C302DD01574
35,526,384 UART: [art] SIG.S = C81DD3BA7764CED3ECEFEFBA46B01463AA10DEA69F811213CE1D92DC863A2A4B0A44629C17B0028443C4ADA2E1EC88A6
36,831,193 UART: Caliptra RT
36,831,907 UART: [state] CFI Enabled
36,993,165 UART: [rt] RT listening for mailbox commands...
36,995,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,150,659 UART: [rt]cmd =0x41544d4e, len=14344
45,627,238 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,373 UART:
192,728 UART: Running Caliptra ROM ...
193,913 UART:
603,559 UART: [state] CFI Enabled
619,626 UART: [state] LifecycleState = Unprovisioned
621,553 UART: [state] DebugLocked = No
623,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,344 UART: [kat] SHA2-256
799,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,593 UART: [kat] ++
810,131 UART: [kat] sha1
820,306 UART: [kat] SHA2-256
822,984 UART: [kat] SHA2-384
828,978 UART: [kat] SHA2-512-ACC
831,346 UART: [kat] ECC-384
3,114,395 UART: [kat] HMAC-384Kdf
3,126,053 UART: [kat] LMS
4,316,168 UART: [kat] --
4,318,958 UART: [cold-reset] ++
4,320,392 UART: [fht] Storing FHT @ 0x50003400
4,330,745 UART: [idev] ++
4,331,378 UART: [idev] CDI.KEYID = 6
4,332,295 UART: [idev] SUBJECT.KEYID = 7
4,333,538 UART: [idev] UDS.KEYID = 0
4,334,549 ready_for_fw is high
4,334,745 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,700 UART: [idev] Erasing UDS.KEYID = 0
7,621,529 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,080 UART: [idev] --
7,646,540 UART: [ldev] ++
7,647,107 UART: [ldev] CDI.KEYID = 6
7,648,071 UART: [ldev] SUBJECT.KEYID = 5
7,649,291 UART: [ldev] AUTHORITY.KEYID = 7
7,650,523 UART: [ldev] FE.KEYID = 1
7,660,032 UART: [ldev] Erasing FE.KEYID = 1
10,944,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,125 UART: [ldev] --
13,304,374 UART: [fwproc] Waiting for Commands...
13,306,299 UART: [fwproc] Received command 0x46574c44
13,308,481 UART: [fwproc] Received Image of size 113844 bytes
22,027,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,111,240 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,180,093 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,496,577 >>> mbox cmd response: success
22,500,689 UART: [afmc] ++
22,501,287 UART: [afmc] CDI.KEYID = 6
22,502,204 UART: [afmc] SUBJECT.KEYID = 7
22,503,418 UART: [afmc] AUTHORITY.KEYID = 5
25,815,474 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,109,133 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,111,385 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,125,920 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,140,673 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,154,980 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,175,954 UART: [afmc] --
28,179,447 UART: [cold-reset] --
28,183,441 UART: [state] Locking Datavault
28,189,938 UART: [state] Locking PCR0, PCR1 and PCR31
28,191,649 UART: [state] Locking ICCM
28,192,827 UART: [exit] Launching FMC @ 0x40000130
28,201,226 UART:
28,201,462 UART: Running Caliptra FMC ...
28,202,565 UART:
28,202,728 UART: [state] CFI Enabled
28,211,046 UART: [fht] FMC Alias Private Key: 7
30,541,569 UART: [art] Extend RT PCRs Done
30,542,795 UART: [art] Lock RT PCRs Done
30,544,423 UART: [art] Populate DV Done
30,549,941 UART: [fht] FMC Alias Private Key: 7
30,551,516 UART: [art] Derive CDI
30,552,335 UART: [art] Store in in slot 0x4
30,595,153 UART: [art] Derive Key Pair
30,596,174 UART: [art] Store priv key in slot 0x5
33,838,465 UART: [art] Derive Key Pair - Done
33,851,464 UART: [art] Signing Cert with AUTHO
33,852,776 UART: RITY.KEYID = 7
36,132,346 UART: [art] Erasing AUTHORITY.KEYID = 7
36,133,850 UART: [art] PUB.X = 73F45137BAF5E5F63F113C3F36D8BFA55ECE1111FACAA5B6763324FC26C10249D6AB2CAB68951AB766C5993A7E527AC5
36,141,109 UART: [art] PUB.Y = FAF5582EFB271BCAA3C8892A22BFC73FF175563209A6C4DF5EC85A7D8EB6EAB2602F885DBA6AB67EE04E53097B0BC5A8
36,148,402 UART: [art] SIG.R = 1F23D1E8669E9384E460EF8C3FBF93AEBBE449ABDEEE6579DF9D8B918ECBECE1D40BCBE8CF50444F9072725FDC931FA9
36,155,833 UART: [art] SIG.S = 5CBE5AFFC3FA7DB67A2D41C2A8571E1092C043D4BCA9553A6A09E14BFA4304F09A3811275CBD6C6AA7431C06C00F8C4E
37,461,167 UART: Caliptra RT
37,461,855 UART: [state] CFI Enabled
37,579,400 UART: [rt] RT listening for mailbox commands...
37,581,685 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,737,292 UART: [rt]cmd =0x41544d4e, len=14344
46,083,416 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,130,280 ready_for_fw is high
4,130,657 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,982,408 >>> mbox cmd response: success
27,618,558 UART:
27,618,953 UART: Running Caliptra FMC ...
27,620,148 UART:
27,620,331 UART: [state] CFI Enabled
27,628,085 UART: [fht] FMC Alias Private Key: 7
29,959,049 UART: [art] Extend RT PCRs Done
29,960,281 UART: [art] Lock RT PCRs Done
29,961,881 UART: [art] Populate DV Done
29,967,378 UART: [fht] FMC Alias Private Key: 7
29,969,054 UART: [art] Derive CDI
29,969,868 UART: [art] Store in in slot 0x4
30,012,891 UART: [art] Derive Key Pair
30,013,938 UART: [art] Store priv key in slot 0x5
33,255,765 UART: [art] Derive Key Pair - Done
33,268,598 UART: [art] Signing Cert with AUTHO
33,269,925 UART: RITY.KEYID = 7
35,549,495 UART: [art] Erasing AUTHORITY.KEYID = 7
35,551,014 UART: [art] PUB.X = 3E9C0909216C3DECA621F2BE158C61CF4B8CD0050ADB2C24101FF3062D9FA43D6022CC2D6DF0077F37DE5F0121FFB8BF
35,558,278 UART: [art] PUB.Y = A238CF49525731C20673B6D53EDA888918AB386EF04C50B020B3127EBBF3E809967844BC152D23FD04570F9735C8977B
35,565,504 UART: [art] SIG.R = 9537E2B9C4A036D8FB5B08442CB5D84DA6CD99E3184BBB41B42E9777093F87F13A739E81E2E6EDF87BA081930D25D603
35,572,902 UART: [art] SIG.S = 70ECCA828C6940451B469EA67421DB2A78F5FD1CE8F2CD31C9BA74B059451E51E8A79B2F2CFEE103857D5BF5578615D6
36,877,831 UART: Caliptra RT
36,878,536 UART: [state] CFI Enabled
36,995,167 UART: [rt] RT listening for mailbox commands...
36,997,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,152,611 UART: [rt]cmd =0x41544d4e, len=14344
45,654,501 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
192,366 UART:
192,734 UART: Running Caliptra ROM ...
193,914 UART:
194,066 UART: [state] CFI Enabled
264,385 UART: [state] LifecycleState = Unprovisioned
266,304 UART: [state] DebugLocked = No
268,977 UART: [state] WD Timer not started. Device not locked for debugging
273,510 UART: [kat] SHA2-256
452,630 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,231 UART: [kat] ++
464,684 UART: [kat] sha1
475,913 UART: [kat] SHA2-256
478,922 UART: [kat] SHA2-384
485,407 UART: [kat] SHA2-512-ACC
488,343 UART: [kat] ECC-384
2,950,447 UART: [kat] HMAC-384Kdf
2,972,142 UART: [kat] LMS
3,501,544 UART: [kat] --
3,505,480 UART: [cold-reset] ++
3,506,420 UART: [fht] FHT @ 0x50003400
3,518,605 UART: [idev] ++
3,519,174 UART: [idev] CDI.KEYID = 6
3,520,087 UART: [idev] SUBJECT.KEYID = 7
3,521,265 UART: [idev] UDS.KEYID = 0
3,522,337 ready_for_fw is high
3,522,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,125 UART: [idev] Erasing UDS.KEYID = 0
6,027,103 UART: [idev] Sha1 KeyId Algorithm
6,051,369 UART: [idev] --
6,054,429 UART: [ldev] ++
6,055,015 UART: [ldev] CDI.KEYID = 6
6,055,910 UART: [ldev] SUBJECT.KEYID = 5
6,057,186 UART: [ldev] AUTHORITY.KEYID = 7
6,058,372 UART: [ldev] FE.KEYID = 1
6,099,948 UART: [ldev] Erasing FE.KEYID = 1
8,603,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,738 UART: [ldev] --
10,391,820 UART: [fwproc] Wait for Commands...
10,393,862 UART: [fwproc] Recv command 0x46574c44
10,395,959 UART: [fwproc] Recv'd Img size: 114168 bytes
14,956,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,027,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,096,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,413,805 >>> mbox cmd response: success
15,417,755 UART: [afmc] ++
15,418,353 UART: [afmc] CDI.KEYID = 6
15,419,243 UART: [afmc] SUBJECT.KEYID = 7
15,420,416 UART: [afmc] AUTHORITY.KEYID = 5
17,959,294 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,684,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,686,431 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,702,410 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,718,393 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,734,139 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,756,000 UART: [afmc] --
19,760,205 UART: [cold-reset] --
19,763,202 UART: [state] Locking Datavault
19,768,609 UART: [state] Locking PCR0, PCR1 and PCR31
19,770,266 UART: [state] Locking ICCM
19,772,963 UART: [exit] Launching FMC @ 0x40000130
19,781,421 UART:
19,781,655 UART: Running Caliptra FMC ...
19,782,707 UART:
19,782,855 UART: [state] CFI Enabled
19,842,037 UART: [fht] FMC Alias Private Key: 7
21,606,577 UART: [art] Extend RT PCRs Done
21,607,801 UART: [art] Lock RT PCRs Done
21,609,410 UART: [art] Populate DV Done
21,614,738 UART: [fht] FMC Alias Private Key: 7
21,616,233 UART: [art] Derive CDI
21,616,971 UART: [art] Store in in slot 0x4
21,674,822 UART: [art] Derive Key Pair
21,675,857 UART: [art] Store priv key in slot 0x5
24,138,282 UART: [art] Derive Key Pair - Done
24,150,954 UART: [art] Signing Cert with AUTHO
24,152,264 UART: RITY.KEYID = 7
25,863,715 UART: [art] Erasing AUTHORITY.KEYID = 7
25,865,223 UART: [art] PUB.X = 04B6D61D8B6383BBDF9E140A10D54A23C8EB10DA9FC13E28A7153C2D1456F815BCE54E823172BF38D68AA9F6EDC8F5D9
25,872,537 UART: [art] PUB.Y = 2E19883C954AA639B5FE484D3750425A9D8DD0A3946E85D7760A0E79D850C196B43FFD2DB9E92896CB326F7DF574BF79
25,879,780 UART: [art] SIG.R = 7BAB9A4B30CD05966DB7CECC3F32E09B8F7F380EEAD9E68CAD3417FF72A3846DF96A11F43C58631510843B6D50D2F12E
25,887,231 UART: [art] SIG.S = 6F472C5E39D653754F39C522FB15113CBA288DDFFD5651F7AC4E63C44B9510EE68906BAF30ECE7214C2A7E3CE4925FB2
26,866,181 UART: Caliptra RT
26,866,888 UART: [state] CFI Enabled
27,030,938 UART: [rt] RT listening for mailbox commands...
27,033,274 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,188,740 UART: [rt]cmd =0x41544d4e, len=14344
32,047,553 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,379,978 ready_for_fw is high
3,380,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,061,522 >>> mbox cmd response: success
19,344,531 UART:
19,344,960 UART: Running Caliptra FMC ...
19,346,269 UART:
19,346,441 UART: [state] CFI Enabled
19,413,967 UART: [fht] FMC Alias Private Key: 7
21,177,936 UART: [art] Extend RT PCRs Done
21,179,150 UART: [art] Lock RT PCRs Done
21,181,114 UART: [art] Populate DV Done
21,186,467 UART: [fht] FMC Alias Private Key: 7
21,188,127 UART: [art] Derive CDI
21,188,948 UART: [art] Store in in slot 0x4
21,246,634 UART: [art] Derive Key Pair
21,247,662 UART: [art] Store priv key in slot 0x5
23,710,518 UART: [art] Derive Key Pair - Done
23,723,515 UART: [art] Signing Cert with AUTHO
23,724,821 UART: RITY.KEYID = 7
25,436,782 UART: [art] Erasing AUTHORITY.KEYID = 7
25,438,286 UART: [art] PUB.X = C399DAC5CBE4AFB928D809603F837E16279604C1764BC5C880FDE681C1C97812A6D024FFB6CC4CB7A33397C13861FE5F
25,445,600 UART: [art] PUB.Y = 65D38D24A1081C6E97068826828575D4E180F233F4017348D19E84F2FF04101D16FEF6EFDBF88B30E6D1B1E004318666
25,452,846 UART: [art] SIG.R = F2CBBB3D92896536998DA802DB71B6F6D3CDD8F4723EE5305155974A423184B9CB0DA745A8EAB1600B167E8D765A2E09
25,460,219 UART: [art] SIG.S = 693AFC2401D9218B5247499223E0522C35BF8E52E6A8967617064F5B3F0157E27E33A539C416329C9E0418F5D95FCDDC
26,439,230 UART: Caliptra RT
26,439,929 UART: [state] CFI Enabled
26,604,896 UART: [rt] RT listening for mailbox commands...
26,607,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,762,362 UART: [rt]cmd =0x41544d4e, len=14344
31,628,727 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,763 writing to cptra_bootfsm_go
193,040 UART:
193,407 UART: Running Caliptra ROM ...
194,513 UART:
604,327 UART: [state] CFI Enabled
616,026 UART: [state] LifecycleState = Unprovisioned
617,904 UART: [state] DebugLocked = No
620,637 UART: [state] WD Timer not started. Device not locked for debugging
624,758 UART: [kat] SHA2-256
803,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,532 UART: [kat] ++
816,004 UART: [kat] sha1
827,171 UART: [kat] SHA2-256
830,201 UART: [kat] SHA2-384
836,695 UART: [kat] SHA2-512-ACC
839,638 UART: [kat] ECC-384
3,279,630 UART: [kat] HMAC-384Kdf
3,291,783 UART: [kat] LMS
3,821,287 UART: [kat] --
3,826,498 UART: [cold-reset] ++
3,828,796 UART: [fht] FHT @ 0x50003400
3,839,416 UART: [idev] ++
3,839,977 UART: [idev] CDI.KEYID = 6
3,840,861 UART: [idev] SUBJECT.KEYID = 7
3,842,121 UART: [idev] UDS.KEYID = 0
3,843,018 ready_for_fw is high
3,843,225 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,682 UART: [idev] Erasing UDS.KEYID = 0
6,317,594 UART: [idev] Sha1 KeyId Algorithm
6,340,290 UART: [idev] --
6,344,311 UART: [ldev] ++
6,344,885 UART: [ldev] CDI.KEYID = 6
6,345,767 UART: [ldev] SUBJECT.KEYID = 5
6,346,976 UART: [ldev] AUTHORITY.KEYID = 7
6,348,209 UART: [ldev] FE.KEYID = 1
6,358,537 UART: [ldev] Erasing FE.KEYID = 1
8,828,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,562 UART: [ldev] --
10,618,850 UART: [fwproc] Wait for Commands...
10,621,867 UART: [fwproc] Recv command 0x46574c44
10,623,956 UART: [fwproc] Recv'd Img size: 114168 bytes
15,184,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,267,786 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,336,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,653,983 >>> mbox cmd response: success
15,657,393 UART: [afmc] ++
15,657,991 UART: [afmc] CDI.KEYID = 6
15,658,878 UART: [afmc] SUBJECT.KEYID = 7
15,660,087 UART: [afmc] AUTHORITY.KEYID = 5
18,160,088 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,883,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,885,463 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,901,435 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,917,425 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,933,193 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,956,592 UART: [afmc] --
19,960,680 UART: [cold-reset] --
19,964,649 UART: [state] Locking Datavault
19,970,105 UART: [state] Locking PCR0, PCR1 and PCR31
19,971,809 UART: [state] Locking ICCM
19,974,210 UART: [exit] Launching FMC @ 0x40000130
19,982,654 UART:
19,982,884 UART: Running Caliptra FMC ...
19,983,912 UART:
19,984,063 UART: [state] CFI Enabled
19,992,382 UART: [fht] FMC Alias Private Key: 7
21,748,811 UART: [art] Extend RT PCRs Done
21,750,051 UART: [art] Lock RT PCRs Done
21,751,922 UART: [art] Populate DV Done
21,757,234 UART: [fht] FMC Alias Private Key: 7
21,758,777 UART: [art] Derive CDI
21,759,593 UART: [art] Store in in slot 0x4
21,802,083 UART: [art] Derive Key Pair
21,803,127 UART: [art] Store priv key in slot 0x5
24,229,681 UART: [art] Derive Key Pair - Done
24,242,895 UART: [art] Signing Cert with AUTHO
24,244,194 UART: RITY.KEYID = 7
25,949,546 UART: [art] Erasing AUTHORITY.KEYID = 7
25,951,060 UART: [art] PUB.X = 6019CEAB7581BED20B5B36CD2B91E27052295CC6C22035534EB4D158FA3A7EAA4D19EC978B0B068993A95DA94C33BEB7
25,958,316 UART: [art] PUB.Y = 817308C071683ACC1F34278CDEFD52E8D7E9F54FD5314BBA591CC71D266F1EB90678435456A828C51931F908A41F7087
25,965,614 UART: [art] SIG.R = 6FEA90595066ADE457FA70579E0822DFD7F75C4537AF69CFFB24FE8EF34920B35EE73CE90D27AA0E7351504EE6AB4ECE
25,973,015 UART: [art] SIG.S = B3B866F16BBA4481DC21A9E672D1049EC3252E003A8E1FD4726C85917299199B3F53E3D0E10C5BE9384B6E7E8B24F0C1
26,951,998 UART: Caliptra RT
26,952,687 UART: [state] CFI Enabled
27,069,319 UART: [rt] RT listening for mailbox commands...
27,071,608 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,662 UART: [rt]cmd =0x41544d4e, len=14344
32,061,217 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,866 writing to cptra_bootfsm_go
3,697,129 ready_for_fw is high
3,697,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,232,932 >>> mbox cmd response: success
19,489,204 UART:
19,489,594 UART: Running Caliptra FMC ...
19,490,739 UART:
19,490,901 UART: [state] CFI Enabled
19,498,986 UART: [fht] FMC Alias Private Key: 7
21,256,086 UART: [art] Extend RT PCRs Done
21,257,328 UART: [art] Lock RT PCRs Done
21,258,933 UART: [art] Populate DV Done
21,264,029 UART: [fht] FMC Alias Private Key: 7
21,265,573 UART: [art] Derive CDI
21,266,339 UART: [art] Store in in slot 0x4
21,309,039 UART: [art] Derive Key Pair
21,310,044 UART: [art] Store priv key in slot 0x5
23,736,564 UART: [art] Derive Key Pair - Done
23,749,399 UART: [art] Signing Cert with AUTHO
23,750,704 UART: RITY.KEYID = 7
25,456,288 UART: [art] Erasing AUTHORITY.KEYID = 7
25,457,797 UART: [art] PUB.X = 598A6CB21B4F0C6C8C893D442EE050190A99BAA2C1AABF5439860D46B5CBDEC969204B347976EF81424F54477BC7C249
25,465,046 UART: [art] PUB.Y = 2E90F84FFE8E6A5F13FEFEBB037EA3AD104363DC64754EFD9BD798DB2F57A703C6DDC4720950F460DFF72B4EA6F85460
25,472,314 UART: [art] SIG.R = 5BA98520C78711CDAF98B83D03ABE2ED6BC8ABECD1DCBE39272E8463775DB75A11C4529369D9C7AC05B97D17D1E5200F
25,479,755 UART: [art] SIG.S = 813BEED9FED7CC9D7177C1742821B9248D7F8259D590137D6FB158629D315BD1B45B61F529A31D7FAAD6A2D3ABEBBFC3
26,459,246 UART: Caliptra RT
26,459,965 UART: [state] CFI Enabled
26,576,595 UART: [rt] RT listening for mailbox commands...
26,578,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,734,280 UART: [rt]cmd =0x41544d4e, len=14344
31,593,998 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,246 UART:
192,600 UART: Running Caliptra ROM ...
193,787 UART:
193,949 UART: [state] CFI Enabled
261,193 UART: [state] LifecycleState = Unprovisioned
263,600 UART: [state] DebugLocked = No
265,070 UART: [state] WD Timer not started. Device not locked for debugging
269,102 UART: [kat] SHA2-256
458,990 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,727 UART: [kat] ++
470,183 UART: [kat] sha1
481,908 UART: [kat] SHA2-256
484,919 UART: [kat] SHA2-384
490,842 UART: [kat] SHA2-512-ACC
493,430 UART: [kat] ECC-384
2,948,197 UART: [kat] HMAC-384Kdf
2,971,294 UART: [kat] LMS
3,503,062 UART: [kat] --
3,507,415 UART: [cold-reset] ++
3,510,072 UART: [fht] FHT @ 0x50003400
3,519,950 UART: [idev] ++
3,520,664 UART: [idev] CDI.KEYID = 6
3,521,695 UART: [idev] SUBJECT.KEYID = 7
3,522,801 UART: [idev] UDS.KEYID = 0
3,523,748 ready_for_fw is high
3,523,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,470 UART: [idev] Erasing UDS.KEYID = 0
6,027,820 UART: [idev] Sha1 KeyId Algorithm
6,049,647 UART: [idev] --
6,054,074 UART: [ldev] ++
6,054,762 UART: [ldev] CDI.KEYID = 6
6,055,728 UART: [ldev] SUBJECT.KEYID = 5
6,056,889 UART: [ldev] AUTHORITY.KEYID = 7
6,058,073 UART: [ldev] FE.KEYID = 1
6,099,011 UART: [ldev] Erasing FE.KEYID = 1
8,608,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,508 UART: [ldev] --
10,411,903 UART: [fwproc] Wait for Commands...
10,413,475 UART: [fwproc] Recv command 0x46574c44
10,415,794 UART: [fwproc] Recv'd Img size: 114168 bytes
15,017,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,099,003 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,215,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,755,850 >>> mbox cmd response: success
15,760,061 UART: [afmc] ++
15,760,775 UART: [afmc] CDI.KEYID = 6
15,761,973 UART: [afmc] SUBJECT.KEYID = 7
15,763,420 UART: [afmc] AUTHORITY.KEYID = 5
18,301,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,044,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,046,780 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,061,900 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,077,073 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,091,907 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,116,447 UART: [afmc] --
20,120,260 UART: [cold-reset] --
20,122,309 UART: [state] Locking Datavault
20,130,228 UART: [state] Locking PCR0, PCR1 and PCR31
20,132,392 UART: [state] Locking ICCM
20,134,063 UART: [exit] Launching FMC @ 0x40000130
20,142,756 UART:
20,143,001 UART: Running Caliptra FMC ...
20,144,113 UART:
20,144,271 UART: [state] CFI Enabled
20,202,300 UART: [fht] FMC Alias Private Key: 7
21,966,039 UART: [art] Extend RT PCRs Done
21,967,275 UART: [art] Lock RT PCRs Done
21,969,173 UART: [art] Populate DV Done
21,974,500 UART: [fht] FMC Alias Private Key: 7
21,976,155 UART: [art] Derive CDI
21,976,971 UART: [art] Store in in slot 0x4
22,036,689 UART: [art] Derive Key Pair
22,037,727 UART: [art] Store priv key in slot 0x5
24,500,674 UART: [art] Derive Key Pair - Done
24,513,675 UART: [art] Signing Cert with AUTHO
24,514,971 UART: RITY.KEYID = 7
26,226,091 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,684 UART: [art] PUB.X = 485419422D875CC1D05AB083DC7DBE6DAD0FDF3FE60199E85305E24869B805998E82F1DF6525BFF31ED7B5E18141948E
26,234,871 UART: [art] PUB.Y = C416315648413BAD1F4BC92D680E58ECF538D6706A08CBA2654421AA7D048921B488E6BBC11EBB820B2D3DFC42FAFF17
26,242,088 UART: [art] SIG.R = 8EAF155665D40F06FF0CD8933AD93524014159018EE6B9A726306CB546CB518A0E674FBA45A0FA32C1A3813CFF7F6C85
26,249,513 UART: [art] SIG.S = A107479BB1B9C750F4F96DE774786EE7D9308AF8752286E7D384B24EA05016495E649D6E59C7169EA4D7313D4D706142
27,228,471 UART: Caliptra RT
27,229,185 UART: [state] CFI Enabled
27,393,388 UART: [rt] RT listening for mailbox commands...
27,395,710 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,550,958 UART: [rt]cmd =0x41544d4e, len=14344
32,409,189 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,440,803 ready_for_fw is high
3,441,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,830,825 >>> mbox cmd response: success
20,114,458 UART:
20,114,855 UART: Running Caliptra FMC ...
20,115,962 UART:
20,116,114 UART: [state] CFI Enabled
20,181,130 UART: [fht] FMC Alias Private Key: 7
21,943,782 UART: [art] Extend RT PCRs Done
21,945,008 UART: [art] Lock RT PCRs Done
21,946,560 UART: [art] Populate DV Done
21,951,894 UART: [fht] FMC Alias Private Key: 7
21,953,597 UART: [art] Derive CDI
21,954,409 UART: [art] Store in in slot 0x4
22,014,206 UART: [art] Derive Key Pair
22,015,252 UART: [art] Store priv key in slot 0x5
24,477,746 UART: [art] Derive Key Pair - Done
24,490,699 UART: [art] Signing Cert with AUTHO
24,492,001 UART: RITY.KEYID = 7
26,203,961 UART: [art] Erasing AUTHORITY.KEYID = 7
26,205,457 UART: [art] PUB.X = 80903810E79233CF8ED54F1D383069552D588B8562823F3AF7152A199909794D223242B257E7292C357D8251E75B0BB2
26,212,691 UART: [art] PUB.Y = CFAF091C144FBE038582708E7852593F6B5B71A60FCC18EA4E8A13855FD2A587AC14B248FCCF6B6BD3CB64BF5799F99B
26,220,004 UART: [art] SIG.R = FD369169C9935C1520CB6BE83804066592CACEF6568465634FDD0BF6B8AF11DD470D8F72BFC112E2BB47F3D8868D3C51
26,227,504 UART: [art] SIG.S = 22846AC2D7422508B6B6746ABB3C8E067B459BBEF5A775038BE51B0A61C97F874274F40D29B227E05D87601322963B3C
27,206,604 UART: Caliptra RT
27,207,312 UART: [state] CFI Enabled
27,373,541 UART: [rt] RT listening for mailbox commands...
27,375,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,531,099 UART: [rt]cmd =0x41544d4e, len=14344
32,395,563 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,833 writing to cptra_bootfsm_go
193,110 UART:
193,470 UART: Running Caliptra ROM ...
194,651 UART:
604,353 UART: [state] CFI Enabled
618,009 UART: [state] LifecycleState = Unprovisioned
620,364 UART: [state] DebugLocked = No
622,258 UART: [state] WD Timer not started. Device not locked for debugging
626,204 UART: [kat] SHA2-256
816,065 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,857 UART: [kat] ++
827,380 UART: [kat] sha1
837,682 UART: [kat] SHA2-256
840,692 UART: [kat] SHA2-384
847,674 UART: [kat] SHA2-512-ACC
850,257 UART: [kat] ECC-384
3,296,451 UART: [kat] HMAC-384Kdf
3,309,763 UART: [kat] LMS
3,841,607 UART: [kat] --
3,844,907 UART: [cold-reset] ++
3,846,769 UART: [fht] FHT @ 0x50003400
3,857,528 UART: [idev] ++
3,858,167 UART: [idev] CDI.KEYID = 6
3,859,214 UART: [idev] SUBJECT.KEYID = 7
3,860,321 UART: [idev] UDS.KEYID = 0
3,861,252 ready_for_fw is high
3,861,446 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,821 UART: [idev] Erasing UDS.KEYID = 0
6,339,208 UART: [idev] Sha1 KeyId Algorithm
6,361,083 UART: [idev] --
6,365,822 UART: [ldev] ++
6,366,552 UART: [ldev] CDI.KEYID = 6
6,367,460 UART: [ldev] SUBJECT.KEYID = 5
6,368,617 UART: [ldev] AUTHORITY.KEYID = 7
6,369,843 UART: [ldev] FE.KEYID = 1
6,382,107 UART: [ldev] Erasing FE.KEYID = 1
8,860,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,262 UART: [ldev] --
10,653,074 UART: [fwproc] Wait for Commands...
10,655,556 UART: [fwproc] Recv command 0x46574c44
10,657,811 UART: [fwproc] Recv'd Img size: 114168 bytes
15,296,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,382,169 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,498,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,040,256 >>> mbox cmd response: success
16,043,481 UART: [afmc] ++
16,044,193 UART: [afmc] CDI.KEYID = 6
16,045,441 UART: [afmc] SUBJECT.KEYID = 7
16,046,879 UART: [afmc] AUTHORITY.KEYID = 5
18,548,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,271,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,273,642 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,288,734 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,303,918 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,318,793 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,340,992 UART: [afmc] --
20,343,838 UART: [cold-reset] --
20,347,862 UART: [state] Locking Datavault
20,352,363 UART: [state] Locking PCR0, PCR1 and PCR31
20,354,495 UART: [state] Locking ICCM
20,356,376 UART: [exit] Launching FMC @ 0x40000130
20,365,049 UART:
20,365,283 UART: Running Caliptra FMC ...
20,366,385 UART:
20,366,544 UART: [state] CFI Enabled
20,374,263 UART: [fht] FMC Alias Private Key: 7
22,130,274 UART: [art] Extend RT PCRs Done
22,131,516 UART: [art] Lock RT PCRs Done
22,133,382 UART: [art] Populate DV Done
22,138,689 UART: [fht] FMC Alias Private Key: 7
22,140,383 UART: [art] Derive CDI
22,141,120 UART: [art] Store in in slot 0x4
22,183,773 UART: [art] Derive Key Pair
22,184,810 UART: [art] Store priv key in slot 0x5
24,611,373 UART: [art] Derive Key Pair - Done
24,624,530 UART: [art] Signing Cert with AUTHO
24,625,840 UART: RITY.KEYID = 7
26,331,615 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,137 UART: [art] PUB.X = 7990A3386F564AFEB665AC7BC275966B067CB586076A64EC89CA4835CD3449048E303B748549254A26A827916036AA0E
26,340,387 UART: [art] PUB.Y = 19BADCBD81D1FE5878E1A35C433097741A319E3A84F2931618E0AC817890BFDBB813E34440355FDB7C4623EA082868A4
26,347,618 UART: [art] SIG.R = C96EAC361F23F86D4D2BE06F7EE53410629A467FD932D315395EEED041E7BDFAC7A7E5365735A67948215E01CCFD4D0E
26,355,005 UART: [art] SIG.S = 630FA2F68AF3900393496B1F27054CB85727CFF7227B86D0BCBDA178E651F8B7A524896D98D1FA8D25C841EA6382A9F4
27,334,188 UART: Caliptra RT
27,334,897 UART: [state] CFI Enabled
27,452,452 UART: [rt] RT listening for mailbox commands...
27,454,726 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,609,973 UART: [rt]cmd =0x41544d4e, len=14344
32,469,412 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,654 writing to cptra_bootfsm_go
3,762,352 ready_for_fw is high
3,762,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,061,762 >>> mbox cmd response: success
20,312,572 UART:
20,312,971 UART: Running Caliptra FMC ...
20,314,094 UART:
20,314,263 UART: [state] CFI Enabled
20,322,188 UART: [fht] FMC Alias Private Key: 7
22,079,509 UART: [art] Extend RT PCRs Done
22,080,736 UART: [art] Lock RT PCRs Done
22,082,170 UART: [art] Populate DV Done
22,087,621 UART: [fht] FMC Alias Private Key: 7
22,089,235 UART: [art] Derive CDI
22,089,976 UART: [art] Store in in slot 0x4
22,132,260 UART: [art] Derive Key Pair
22,133,331 UART: [art] Store priv key in slot 0x5
24,560,243 UART: [art] Derive Key Pair - Done
24,573,131 UART: [art] Signing Cert with AUTHO
24,574,441 UART: RITY.KEYID = 7
26,280,088 UART: [art] Erasing AUTHORITY.KEYID = 7
26,281,593 UART: [art] PUB.X = FE148EDA75EACC4212765A1992E148B20530D70B320678AFB4EE0915093B534316F674C8A1B787EDA7EBAF9F62E5A410
26,288,902 UART: [art] PUB.Y = 4789955DCCB30F9F506FBE78178433D3C6F23D7354FB27614B1361533ED13BB60B7F277CCE9F0896E2602136C9E1057B
26,296,116 UART: [art] SIG.R = FC5D1D338C2968177AFBC744046F08CFEA4A98972893D778E181DE995DF9B0BEED0482AC0521BF0AB9E2B62928C07510
26,303,502 UART: [art] SIG.S = B258C3CB66B8D5D25D3501F863041D1743EFB63D039E2B4F704FAEB41E2DB8B295C419655269BFEC694EC3525DDF8AA1
27,282,583 UART: Caliptra RT
27,283,271 UART: [state] CFI Enabled
27,401,259 UART: [rt] RT listening for mailbox commands...
27,403,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,558,995 UART: [rt]cmd =0x41544d4e, len=14344
32,434,744 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,649 UART: [kat] SHA2-256
881,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,695 UART: [kat] ++
885,847 UART: [kat] sha1
889,979 UART: [kat] SHA2-256
891,917 UART: [kat] SHA2-384
894,714 UART: [kat] SHA2-512-ACC
896,615 UART: [kat] ECC-384
901,824 UART: [kat] HMAC-384Kdf
906,288 UART: [kat] LMS
1,474,484 UART: [kat] --
1,475,555 UART: [cold-reset] ++
1,475,957 UART: [fht] Storing FHT @ 0x50003400
1,478,924 UART: [idev] ++
1,479,092 UART: [idev] CDI.KEYID = 6
1,479,452 UART: [idev] SUBJECT.KEYID = 7
1,479,876 UART: [idev] UDS.KEYID = 0
1,480,221 ready_for_fw is high
1,480,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,750 UART: [idev] Erasing UDS.KEYID = 0
1,504,378 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,116 UART: [idev] --
1,514,195 UART: [ldev] ++
1,514,363 UART: [ldev] CDI.KEYID = 6
1,514,726 UART: [ldev] SUBJECT.KEYID = 5
1,515,152 UART: [ldev] AUTHORITY.KEYID = 7
1,515,615 UART: [ldev] FE.KEYID = 1
1,520,811 UART: [ldev] Erasing FE.KEYID = 1
1,546,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,852 UART: [ldev] --
1,585,245 UART: [fwproc] Waiting for Commands...
1,586,094 UART: [fwproc] Received command 0x46574c44
1,586,885 UART: [fwproc] Received Image of size 114168 bytes
5,080,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,107,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,136,989 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,272,704 >>> mbox cmd response: success
5,273,928 UART: [afmc] ++
5,274,096 UART: [afmc] CDI.KEYID = 6
5,274,458 UART: [afmc] SUBJECT.KEYID = 7
5,274,883 UART: [afmc] AUTHORITY.KEYID = 5
5,310,261 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,326,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,326,999 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,332,708 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,338,600 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,344,301 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,352,303 UART: [afmc] --
5,353,323 UART: [cold-reset] --
5,354,121 UART: [state] Locking Datavault
5,355,104 UART: [state] Locking PCR0, PCR1 and PCR31
5,355,708 UART: [state] Locking ICCM
5,356,272 UART: [exit] Launching FMC @ 0x40000130
5,361,601 UART:
5,361,617 UART: Running Caliptra FMC ...
5,362,025 UART:
5,362,079 UART: [state] CFI Enabled
5,372,529 UART: [fht] FMC Alias Private Key: 7
5,480,253 UART: [art] Extend RT PCRs Done
5,480,681 UART: [art] Lock RT PCRs Done
5,482,391 UART: [art] Populate DV Done
5,490,683 UART: [fht] FMC Alias Private Key: 7
5,491,719 UART: [art] Derive CDI
5,491,999 UART: [art] Store in in slot 0x4
5,577,150 UART: [art] Derive Key Pair
5,577,510 UART: [art] Store priv key in slot 0x5
5,590,748 UART: [art] Derive Key Pair - Done
5,605,646 UART: [art] Signing Cert with AUTHO
5,606,126 UART: RITY.KEYID = 7
5,621,442 UART: [art] Erasing AUTHORITY.KEYID = 7
5,622,207 UART: [art] PUB.X = C5654591805BCA0A08B5C9C756E925B0E6E7DF0EBF8FFFF51A94D77CC3E681C9E79EFA34E1884ECB0D089B7F346FB2AA
5,628,984 UART: [art] PUB.Y = 0B5DE21C2114F08D9459420277A3A76C48ADA8C7919028C26A50F71CFEA0E0FEB8B4DD1FE70E6849579E9AFF27DC8882
5,635,935 UART: [art] SIG.R = BA527081A327AC8497D34A024BDFDC09EE90985E27C15EC7E75FD87166B94ED6616A13A49ED5E5ACB07A728F8945F5EB
5,642,711 UART: [art] SIG.S = E1B9E625F2D6217215CD940457AB740A9738B0C4EC72710EE7EFE5867277228F7F1FF618C087AAB2CC026F6F50559B35
5,666,350 UART: Caliptra RT
5,666,603 UART: [state] CFI Enabled
5,774,549 UART: [rt] RT listening for mailbox commands...
5,775,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,898,099 UART: [rt]cmd =0x41544d4e, len=14344
7,288,631 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,793 ready_for_fw is high
1,362,793 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,200,190 >>> mbox cmd response: success
5,262,345 UART:
5,262,361 UART: Running Caliptra FMC ...
5,262,769 UART:
5,262,823 UART: [state] CFI Enabled
5,273,081 UART: [fht] FMC Alias Private Key: 7
5,380,463 UART: [art] Extend RT PCRs Done
5,380,891 UART: [art] Lock RT PCRs Done
5,382,271 UART: [art] Populate DV Done
5,390,491 UART: [fht] FMC Alias Private Key: 7
5,391,625 UART: [art] Derive CDI
5,391,905 UART: [art] Store in in slot 0x4
5,477,286 UART: [art] Derive Key Pair
5,477,646 UART: [art] Store priv key in slot 0x5
5,491,116 UART: [art] Derive Key Pair - Done
5,506,336 UART: [art] Signing Cert with AUTHO
5,506,816 UART: RITY.KEYID = 7
5,521,998 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,763 UART: [art] PUB.X = 94BA32432C24326993572F65CA6C050D30AE1021432EBFFAD91AC22E1FFB334B0FF4E61510482A39D388B9FD09109778
5,529,521 UART: [art] PUB.Y = 513AEB788C07308CF2CB28D7667ED5AE246F67A88BC7D7AD378E2483EB1EC2D1A5E7F6BEE50A277955188B22A9F0752F
5,536,477 UART: [art] SIG.R = 7C3B35A7E3CF4940B16F4C90E8CCFFB88DEFF024724B14511420E033066C56F7D860710399FC4BFEFCB96FA3F7455C9F
5,543,253 UART: [art] SIG.S = 3490DE64CA1ADAC0AF354FE18A511FCBC404CB00CA4918FFA738B8C8B76D1C9187160410AE1BA0B503791F063CCD9990
5,567,796 UART: Caliptra RT
5,568,049 UART: [state] CFI Enabled
5,676,237 UART: [rt] RT listening for mailbox commands...
5,676,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,889 UART: [rt]cmd =0x41544d4e, len=14344
7,204,967 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,281 UART: [kat] SHA2-512-ACC
897,182 UART: [kat] ECC-384
902,779 UART: [kat] HMAC-384Kdf
907,305 UART: [kat] LMS
1,475,501 UART: [kat] --
1,476,622 UART: [cold-reset] ++
1,477,134 UART: [fht] Storing FHT @ 0x50003400
1,479,875 UART: [idev] ++
1,480,043 UART: [idev] CDI.KEYID = 6
1,480,403 UART: [idev] SUBJECT.KEYID = 7
1,480,827 UART: [idev] UDS.KEYID = 0
1,481,172 ready_for_fw is high
1,481,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,357 UART: [idev] Erasing UDS.KEYID = 0
1,505,231 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,933 UART: [idev] --
1,515,148 UART: [ldev] ++
1,515,316 UART: [ldev] CDI.KEYID = 6
1,515,679 UART: [ldev] SUBJECT.KEYID = 5
1,516,105 UART: [ldev] AUTHORITY.KEYID = 7
1,516,568 UART: [ldev] FE.KEYID = 1
1,521,616 UART: [ldev] Erasing FE.KEYID = 1
1,547,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,281 UART: [ldev] --
1,586,558 UART: [fwproc] Waiting for Commands...
1,587,195 UART: [fwproc] Received command 0x46574c44
1,587,986 UART: [fwproc] Received Image of size 114168 bytes
5,270,839 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,298,959 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,328,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,463,968 >>> mbox cmd response: success
5,465,100 UART: [afmc] ++
5,465,268 UART: [afmc] CDI.KEYID = 6
5,465,630 UART: [afmc] SUBJECT.KEYID = 7
5,466,055 UART: [afmc] AUTHORITY.KEYID = 5
5,500,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,516,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,517,577 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,523,286 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,529,178 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,534,879 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,542,811 UART: [afmc] --
5,543,709 UART: [cold-reset] --
5,544,541 UART: [state] Locking Datavault
5,545,686 UART: [state] Locking PCR0, PCR1 and PCR31
5,546,290 UART: [state] Locking ICCM
5,546,742 UART: [exit] Launching FMC @ 0x40000130
5,552,071 UART:
5,552,087 UART: Running Caliptra FMC ...
5,552,495 UART:
5,552,638 UART: [state] CFI Enabled
5,563,404 UART: [fht] FMC Alias Private Key: 7
5,671,178 UART: [art] Extend RT PCRs Done
5,671,606 UART: [art] Lock RT PCRs Done
5,673,258 UART: [art] Populate DV Done
5,681,802 UART: [fht] FMC Alias Private Key: 7
5,682,826 UART: [art] Derive CDI
5,683,106 UART: [art] Store in in slot 0x4
5,768,769 UART: [art] Derive Key Pair
5,769,129 UART: [art] Store priv key in slot 0x5
5,782,083 UART: [art] Derive Key Pair - Done
5,796,831 UART: [art] Signing Cert with AUTHO
5,797,311 UART: RITY.KEYID = 7
5,812,441 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,206 UART: [art] PUB.X = 15476FF3BF9BD57E40CC5CE7D9898F85624C4B04C61E7D87F293533FD38742DBAAF2243886E2BB3F18CC16CB2E854EFC
5,819,987 UART: [art] PUB.Y = 747460D3904AA3062D421042A89A135F181683A6EC99C8625D378BD5FFB8DAB7D6E30320622621B88717E355757E2261
5,826,919 UART: [art] SIG.R = 9D92BA13097803623634E63D7D82971D6372DBB798BC088A7410E5DE0B2C9A15EEDC77C4DE2279F9E7D9842C775B3062
5,833,677 UART: [art] SIG.S = 217E1659F856C28B053E3500365C8AA60787D2D87ED1B26AD1A30DA18BA2D4D26B381239819D9501EBFFA6EE4528DC07
5,857,699 UART: Caliptra RT
5,858,044 UART: [state] CFI Enabled
5,967,059 UART: [rt] RT listening for mailbox commands...
5,967,729 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,090,677 UART: [rt]cmd =0x41544d4e, len=14344
7,500,483 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,214 ready_for_fw is high
1,363,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,163,890 >>> mbox cmd response: success
5,225,737 UART:
5,225,753 UART: Running Caliptra FMC ...
5,226,161 UART:
5,226,304 UART: [state] CFI Enabled
5,237,038 UART: [fht] FMC Alias Private Key: 7
5,345,544 UART: [art] Extend RT PCRs Done
5,345,972 UART: [art] Lock RT PCRs Done
5,347,494 UART: [art] Populate DV Done
5,355,630 UART: [fht] FMC Alias Private Key: 7
5,356,572 UART: [art] Derive CDI
5,356,852 UART: [art] Store in in slot 0x4
5,442,055 UART: [art] Derive Key Pair
5,442,415 UART: [art] Store priv key in slot 0x5
5,456,137 UART: [art] Derive Key Pair - Done
5,471,294 UART: [art] Signing Cert with AUTHO
5,471,774 UART: RITY.KEYID = 7
5,486,928 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,693 UART: [art] PUB.X = 7CEFC92BDF861F4BDB8C96D2E4D0E36D40BE0704E05992D93A1B3C7A204477F7CAD0421E5E9FED145EAB84071245BFA9
5,494,472 UART: [art] PUB.Y = 3D58EB797B900E6EFCF7F589912CE57778E5EE1EAC2C80A8695D9BD1C2BFDE8A8A8B2BEE1AEF964B9C8EB1A84A0CED3C
5,501,448 UART: [art] SIG.R = 022EB5273F3EE02013A4C69C3D0B35525F9270A41C3877625096ABA33D6CD64852858080D5F5C65C3123C147ED7F7540
5,508,204 UART: [art] SIG.S = 98EA15755632753D0302FC46B216D73B6436AB8C4620E408D196201A2A4F989B910CA93D20EB42CC3B7060BAFF1E6312
5,531,911 UART: Caliptra RT
5,532,256 UART: [state] CFI Enabled
5,640,785 UART: [rt] RT listening for mailbox commands...
5,641,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,764,331 UART: [rt]cmd =0x41544d4e, len=14344
7,167,440 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,414 UART: [state] LifecycleState = Unprovisioned
85,069 UART: [state] DebugLocked = No
85,679 UART: [state] WD Timer not started. Device not locked for debugging
86,942 UART: [kat] SHA2-256
892,592 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,717 UART: [kat] ++
896,869 UART: [kat] sha1
901,279 UART: [kat] SHA2-256
903,219 UART: [kat] SHA2-384
906,024 UART: [kat] SHA2-512-ACC
907,925 UART: [kat] ECC-384
917,676 UART: [kat] HMAC-384Kdf
922,176 UART: [kat] LMS
1,170,504 UART: [kat] --
1,171,359 UART: [cold-reset] ++
1,171,897 UART: [fht] FHT @ 0x50003400
1,174,588 UART: [idev] ++
1,174,756 UART: [idev] CDI.KEYID = 6
1,175,116 UART: [idev] SUBJECT.KEYID = 7
1,175,540 UART: [idev] UDS.KEYID = 0
1,175,885 ready_for_fw is high
1,175,885 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,877 UART: [idev] Sha1 KeyId Algorithm
1,209,425 UART: [idev] --
1,210,599 UART: [ldev] ++
1,210,767 UART: [ldev] CDI.KEYID = 6
1,211,130 UART: [ldev] SUBJECT.KEYID = 5
1,211,556 UART: [ldev] AUTHORITY.KEYID = 7
1,212,019 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,556 UART: [fwproc] Wait for Commands...
1,283,310 UART: [fwproc] Recv command 0x46574c44
1,284,038 UART: [fwproc] Recv'd Img size: 114168 bytes
3,114,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,370 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,306,993 >>> mbox cmd response: success
3,308,243 UART: [afmc] ++
3,308,411 UART: [afmc] CDI.KEYID = 6
3,308,773 UART: [afmc] SUBJECT.KEYID = 7
3,309,198 UART: [afmc] AUTHORITY.KEYID = 5
3,344,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,433 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,142 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,034 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,745 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,598 UART: [afmc] --
3,387,582 UART: [cold-reset] --
3,388,440 UART: [state] Locking Datavault
3,389,693 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,297 UART: [state] Locking ICCM
3,390,817 UART: [exit] Launching FMC @ 0x40000130
3,396,146 UART:
3,396,162 UART: Running Caliptra FMC ...
3,396,570 UART:
3,396,624 UART: [state] CFI Enabled
3,406,862 UART: [fht] FMC Alias Private Key: 7
3,514,798 UART: [art] Extend RT PCRs Done
3,515,226 UART: [art] Lock RT PCRs Done
3,516,686 UART: [art] Populate DV Done
3,524,958 UART: [fht] FMC Alias Private Key: 7
3,526,138 UART: [art] Derive CDI
3,526,418 UART: [art] Store in in slot 0x4
3,611,997 UART: [art] Derive Key Pair
3,612,357 UART: [art] Store priv key in slot 0x5
3,625,279 UART: [art] Derive Key Pair - Done
3,640,001 UART: [art] Signing Cert with AUTHO
3,640,481 UART: RITY.KEYID = 7
3,655,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,200 UART: [art] PUB.X = 4B9E151E236C0552D0569615698D7A5A067EB1A30841C8144B0B06A9A0AFF8EEF6F1CF9AFA58BDD564FBA7937119694C
3,662,963 UART: [art] PUB.Y = A4B6A32CD3E1B47B8A4ED81ABD84BD4F2D177B6E220049BB31846B5ADAE2B5DD412A4DC62DD1550558859A382C3BA481
3,669,904 UART: [art] SIG.R = 112AB51F9080E4CC1CFB3801DD8D81C63C9F56079F6BC6C018C29E3DD0AAB002BE15B1C033407EAB4A9F3C93FD457647
3,676,679 UART: [art] SIG.S = C6123630AE11CB3BF08AFCFBEB7C800A002B636602C061ECA849709E5972D9E2D2B451FE0116BC3BBC4DA6EC5EF7E82A
3,700,855 UART: Caliptra RT
3,701,108 UART: [state] CFI Enabled
3,808,266 UART: [rt] RT listening for mailbox commands...
3,808,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,931,952 UART: [rt]cmd =0x41544d4e, len=14344
5,334,477 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,449 ready_for_fw is high
1,059,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,170,991 >>> mbox cmd response: success
3,232,820 UART:
3,232,836 UART: Running Caliptra FMC ...
3,233,244 UART:
3,233,298 UART: [state] CFI Enabled
3,243,642 UART: [fht] FMC Alias Private Key: 7
3,351,566 UART: [art] Extend RT PCRs Done
3,351,994 UART: [art] Lock RT PCRs Done
3,353,826 UART: [art] Populate DV Done
3,362,022 UART: [fht] FMC Alias Private Key: 7
3,363,030 UART: [art] Derive CDI
3,363,310 UART: [art] Store in in slot 0x4
3,448,915 UART: [art] Derive Key Pair
3,449,275 UART: [art] Store priv key in slot 0x5
3,462,651 UART: [art] Derive Key Pair - Done
3,477,223 UART: [art] Signing Cert with AUTHO
3,477,703 UART: RITY.KEYID = 7
3,492,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,538 UART: [art] PUB.X = 007F3225896578B12E4DCFAC28A3250A27097A5F77073F284BF1D9A86AD6536425F5E47B86713F3F1A82E67A891D5467
3,500,271 UART: [art] PUB.Y = 908D084C15F34C3D4772CBA9D52E78E0913C251D94F2E218D6E666B19BEF50590EF89C9F22D3650E708998F9B80C060C
3,507,203 UART: [art] SIG.R = 96DD6E4FF6627814D7355D71DD0C756BE5C72738B231FC3D3397C459FC48ABC88B2F09235669FA9E12AF518FF1498067
3,513,969 UART: [art] SIG.S = C9A3D7EFE542056AEB0178A60F125D2D181099F931E2F0E34EE3F5A961425FF6D47085D3CA1E36460CA6CE103C613412
3,538,102 UART: Caliptra RT
3,538,355 UART: [state] CFI Enabled
3,645,636 UART: [rt] RT listening for mailbox commands...
3,646,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,134 UART: [rt]cmd =0x41544d4e, len=14344
5,164,922 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
893,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,554 UART: [kat] ++
897,706 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
917,971 UART: [kat] HMAC-384Kdf
922,699 UART: [kat] LMS
1,171,027 UART: [kat] --
1,171,898 UART: [cold-reset] ++
1,172,364 UART: [fht] FHT @ 0x50003400
1,175,165 UART: [idev] ++
1,175,333 UART: [idev] CDI.KEYID = 6
1,175,693 UART: [idev] SUBJECT.KEYID = 7
1,176,117 UART: [idev] UDS.KEYID = 0
1,176,462 ready_for_fw is high
1,176,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,467 UART: [idev] Erasing UDS.KEYID = 0
1,201,484 UART: [idev] Sha1 KeyId Algorithm
1,210,032 UART: [idev] --
1,211,048 UART: [ldev] ++
1,211,216 UART: [ldev] CDI.KEYID = 6
1,211,579 UART: [ldev] SUBJECT.KEYID = 5
1,212,005 UART: [ldev] AUTHORITY.KEYID = 7
1,212,468 UART: [ldev] FE.KEYID = 1
1,217,832 UART: [ldev] Erasing FE.KEYID = 1
1,244,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,304 UART: [ldev] --
1,283,775 UART: [fwproc] Wait for Commands...
1,284,557 UART: [fwproc] Recv command 0x46574c44
1,285,285 UART: [fwproc] Recv'd Img size: 114168 bytes
3,118,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,230 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,311,775 >>> mbox cmd response: success
3,312,865 UART: [afmc] ++
3,313,033 UART: [afmc] CDI.KEYID = 6
3,313,395 UART: [afmc] SUBJECT.KEYID = 7
3,313,820 UART: [afmc] AUTHORITY.KEYID = 5
3,349,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,837 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,372,546 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,438 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,149 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,906 UART: [afmc] --
3,393,004 UART: [cold-reset] --
3,393,776 UART: [state] Locking Datavault
3,394,855 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,459 UART: [state] Locking ICCM
3,396,115 UART: [exit] Launching FMC @ 0x40000130
3,401,444 UART:
3,401,460 UART: Running Caliptra FMC ...
3,401,868 UART:
3,402,011 UART: [state] CFI Enabled
3,412,803 UART: [fht] FMC Alias Private Key: 7
3,520,475 UART: [art] Extend RT PCRs Done
3,520,903 UART: [art] Lock RT PCRs Done
3,522,577 UART: [art] Populate DV Done
3,530,449 UART: [fht] FMC Alias Private Key: 7
3,531,577 UART: [art] Derive CDI
3,531,857 UART: [art] Store in in slot 0x4
3,617,480 UART: [art] Derive Key Pair
3,617,840 UART: [art] Store priv key in slot 0x5
3,631,016 UART: [art] Derive Key Pair - Done
3,646,331 UART: [art] Signing Cert with AUTHO
3,646,811 UART: RITY.KEYID = 7
3,661,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,698 UART: [art] PUB.X = 18B13CAA8A65A3BFDB0679C9466A1FB0561975BBFAA621D1E42567B466EF63253D54DE5BE2BB75B6F1B4B99AEA2B1A5C
3,669,485 UART: [art] PUB.Y = 4007B3FE60C77490FA57BC02118CC55A19AD72E976B92F7F80857FF5A15AFA319486A6DF8E1AD6A3F4E8B0089A9D9BFD
3,676,440 UART: [art] SIG.R = 2BDE307FE3CDBC947D3935A8A493C25D5694DA8F93B07FDA7095A10915DA1966F73660C224E0C4D722D897A1DEC26D2C
3,683,217 UART: [art] SIG.S = 55EC7D07103AF30C20842C1DEE0BA6F118D52F8A4BDA67C870BD963D9592A203F7C6C2AAE1F4DA25EAD76A1DF7F6F1FA
3,706,732 UART: Caliptra RT
3,707,077 UART: [state] CFI Enabled
3,814,898 UART: [rt] RT listening for mailbox commands...
3,815,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,584 UART: [rt]cmd =0x41544d4e, len=14344
5,343,746 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,690 ready_for_fw is high
1,060,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,180,669 >>> mbox cmd response: success
3,244,206 UART:
3,244,222 UART: Running Caliptra FMC ...
3,244,630 UART:
3,244,773 UART: [state] CFI Enabled
3,255,181 UART: [fht] FMC Alias Private Key: 7
3,362,575 UART: [art] Extend RT PCRs Done
3,363,003 UART: [art] Lock RT PCRs Done
3,364,235 UART: [art] Populate DV Done
3,372,623 UART: [fht] FMC Alias Private Key: 7
3,373,641 UART: [art] Derive CDI
3,373,921 UART: [art] Store in in slot 0x4
3,459,158 UART: [art] Derive Key Pair
3,459,518 UART: [art] Store priv key in slot 0x5
3,472,972 UART: [art] Derive Key Pair - Done
3,487,804 UART: [art] Signing Cert with AUTHO
3,488,284 UART: RITY.KEYID = 7
3,503,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,449 UART: [art] PUB.X = 025E0BEE60DDD36C4DDE5A1E40631EAC67139D813A8B9F08BA54D061AAEF6C1005E6FC66025ADBF883D4D4819C73F541
3,511,220 UART: [art] PUB.Y = 9ED0917FBE1464F3B7064ACE486FE7B3A9501F0083C731012855DE7EE5A22FCE7940871EEF8ABC7B7715C779B8CACC29
3,518,154 UART: [art] SIG.R = 809503AFA1E8B8A817659383CF81BD40B185D943B6CDE09C48414B7C4E5662143BB114BEF26187D4EFF09219578A4D9C
3,524,923 UART: [art] SIG.S = 213A991ED38994FCAB9F52E8440C3E4A902C10DD188720D6247D756010A2FFFEFC2927F574708956104B81A60DA2A512
3,548,814 UART: Caliptra RT
3,549,159 UART: [state] CFI Enabled
3,656,789 UART: [rt] RT listening for mailbox commands...
3,657,459 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,780,609 UART: [rt]cmd =0x41544d4e, len=14344
5,183,648 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [kat] SHA2-256
891,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
900,157 UART: [kat] SHA2-256
902,097 UART: [kat] SHA2-384
904,826 UART: [kat] SHA2-512-ACC
906,727 UART: [kat] ECC-384
916,966 UART: [kat] HMAC-384Kdf
921,494 UART: [kat] LMS
1,169,806 UART: [kat] --
1,170,645 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,477 UART: [idev] ++
1,173,645 UART: [idev] CDI.KEYID = 6
1,174,006 UART: [idev] SUBJECT.KEYID = 7
1,174,431 UART: [idev] UDS.KEYID = 0
1,174,777 ready_for_fw is high
1,174,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,809 UART: [idev] Erasing UDS.KEYID = 0
1,199,611 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,384 UART: [ldev] ++
1,209,552 UART: [ldev] CDI.KEYID = 6
1,209,916 UART: [ldev] SUBJECT.KEYID = 5
1,210,343 UART: [ldev] AUTHORITY.KEYID = 7
1,210,806 UART: [ldev] FE.KEYID = 1
1,216,130 UART: [ldev] Erasing FE.KEYID = 1
1,242,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,228 UART: [ldev] --
1,281,680 UART: [fwproc] Wait for Commands...
1,282,479 UART: [fwproc] Recv command 0x46574c44
1,283,212 UART: [fwproc] Recv'd Img size: 114168 bytes
3,125,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,318,103 >>> mbox cmd response: success
3,319,130 UART: [afmc] ++
3,319,298 UART: [afmc] CDI.KEYID = 6
3,319,661 UART: [afmc] SUBJECT.KEYID = 7
3,320,087 UART: [afmc] AUTHORITY.KEYID = 5
3,355,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,521 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,272 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,982 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,872 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,583 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,309 UART: [afmc] --
3,399,359 UART: [cold-reset] --
3,400,285 UART: [state] Locking Datavault
3,401,540 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,144 UART: [state] Locking ICCM
3,402,758 UART: [exit] Launching FMC @ 0x40000130
3,408,087 UART:
3,408,103 UART: Running Caliptra FMC ...
3,408,511 UART:
3,408,565 UART: [state] CFI Enabled
3,419,271 UART: [fht] FMC Alias Private Key: 7
3,527,207 UART: [art] Extend RT PCRs Done
3,527,635 UART: [art] Lock RT PCRs Done
3,528,983 UART: [art] Populate DV Done
3,537,165 UART: [fht] FMC Alias Private Key: 7
3,538,149 UART: [art] Derive CDI
3,538,429 UART: [art] Store in in slot 0x4
3,623,714 UART: [art] Derive Key Pair
3,624,074 UART: [art] Store priv key in slot 0x5
3,636,964 UART: [art] Derive Key Pair - Done
3,651,862 UART: [art] Signing Cert with AUTHO
3,652,342 UART: RITY.KEYID = 7
3,667,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,411 UART: [art] PUB.X = B1AC55138B54DD39FB00B44E0015B5F1AD8E230BBF7380EEE1C1A065E534FC1B13C9AA69F8FCC0BCA587CAD9B7923411
3,675,154 UART: [art] PUB.Y = 8B760EA61D3CAD099EDACBA878C959862AD956D57B3E8721895951F5E0020FB43E070244C960296732F24DD76CAB345A
3,682,088 UART: [art] SIG.R = C569B5CE881F2A93869D8476D9828B2CEB31974E871D0177BBF5E0AADF3ACDBAD45EA0FAA05E65EAFE1DA1AB189E5EA1
3,688,883 UART: [art] SIG.S = 5F03A4CE285884DC3F5B5324D5F118F52E8C5CC6DC9398CA6AFBDA111051F89DFCA3CF80C893DF1A3863F3FF595D8E05
3,712,272 UART: Caliptra RT
3,712,525 UART: [state] CFI Enabled
3,819,989 UART: [rt] RT listening for mailbox commands...
3,820,659 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,817 UART: [rt]cmd =0x41544d4e, len=14344
5,351,930 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,916 ready_for_fw is high
1,055,916 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,165,492 >>> mbox cmd response: success
3,228,491 UART:
3,228,507 UART: Running Caliptra FMC ...
3,228,915 UART:
3,228,969 UART: [state] CFI Enabled
3,239,491 UART: [fht] FMC Alias Private Key: 7
3,346,977 UART: [art] Extend RT PCRs Done
3,347,405 UART: [art] Lock RT PCRs Done
3,348,935 UART: [art] Populate DV Done
3,357,261 UART: [fht] FMC Alias Private Key: 7
3,358,247 UART: [art] Derive CDI
3,358,527 UART: [art] Store in in slot 0x4
3,444,322 UART: [art] Derive Key Pair
3,444,682 UART: [art] Store priv key in slot 0x5
3,457,950 UART: [art] Derive Key Pair - Done
3,472,877 UART: [art] Signing Cert with AUTHO
3,473,357 UART: RITY.KEYID = 7
3,488,747 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,512 UART: [art] PUB.X = B88A28ABFA51050C33632BDACE7EEF3A4B452F84F2B1A5530E287D156BE14DF056BC0A6B63F8EBA1C508F791DED7C85C
3,496,289 UART: [art] PUB.Y = C4CC55688B0915DDD373BE4A8F5E692C058BF4FEB92DCA7BC51F5B8E40DB756D6D44F74CCA3263039620AD6E6697D654
3,503,244 UART: [art] SIG.R = BCEF999B1DB41F35E1705911916F4EECA5454B28CB471D3CEF1DD8657929933FB1CB63CC023CB9FF95A33E4189270548
3,510,016 UART: [art] SIG.S = 49F206AE457D758ABC3771615B5CB7C80B75BC784594E8C44607FFC58AF979540DC31842DD84CF58436AE5D98B7E15E7
3,533,939 UART: Caliptra RT
3,534,192 UART: [state] CFI Enabled
3,641,552 UART: [rt] RT listening for mailbox commands...
3,642,222 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,020 UART: [rt]cmd =0x41544d4e, len=14344
5,157,559 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,152 UART: [kat] SHA2-256
902,092 UART: [kat] SHA2-384
905,029 UART: [kat] SHA2-512-ACC
906,930 UART: [kat] ECC-384
916,651 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,516 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,174,906 ready_for_fw is high
1,174,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,604 UART: [idev] Erasing UDS.KEYID = 0
1,200,064 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,745 UART: [ldev] ++
1,209,913 UART: [ldev] CDI.KEYID = 6
1,210,277 UART: [ldev] SUBJECT.KEYID = 5
1,210,704 UART: [ldev] AUTHORITY.KEYID = 7
1,211,167 UART: [ldev] FE.KEYID = 1
1,216,225 UART: [ldev] Erasing FE.KEYID = 1
1,242,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: [fwproc] Recv'd Img size: 114168 bytes
3,118,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,273 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,310,831 >>> mbox cmd response: success
3,311,916 UART: [afmc] ++
3,312,084 UART: [afmc] CDI.KEYID = 6
3,312,447 UART: [afmc] SUBJECT.KEYID = 7
3,312,873 UART: [afmc] AUTHORITY.KEYID = 5
3,348,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,304 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,014 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,904 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,615 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,411 UART: [afmc] --
3,391,457 UART: [cold-reset] --
3,392,121 UART: [state] Locking Datavault
3,393,364 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,968 UART: [state] Locking ICCM
3,394,394 UART: [exit] Launching FMC @ 0x40000130
3,399,723 UART:
3,399,739 UART: Running Caliptra FMC ...
3,400,147 UART:
3,400,290 UART: [state] CFI Enabled
3,410,922 UART: [fht] FMC Alias Private Key: 7
3,519,120 UART: [art] Extend RT PCRs Done
3,519,548 UART: [art] Lock RT PCRs Done
3,521,236 UART: [art] Populate DV Done
3,529,576 UART: [fht] FMC Alias Private Key: 7
3,530,688 UART: [art] Derive CDI
3,530,968 UART: [art] Store in in slot 0x4
3,616,637 UART: [art] Derive Key Pair
3,616,997 UART: [art] Store priv key in slot 0x5
3,630,347 UART: [art] Derive Key Pair - Done
3,645,422 UART: [art] Signing Cert with AUTHO
3,645,902 UART: RITY.KEYID = 7
3,661,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,041 UART: [art] PUB.X = AF2A43F6085BC8AF3A17A078024A6B82A8F41B3F3F69360FFB8540879A41526DD5872C523863D82F59E2FF84DF0A6E90
3,668,803 UART: [art] PUB.Y = 3FA4C8A2EE8B6A4A6CA3FDF04DEF80DC11BA6AD3787C64FFEC51EFCB18C3FFF97A940B4455F5432E890629B331B63F89
3,675,771 UART: [art] SIG.R = DE706A4FAFEEFD1F68604FDEDAA67A35F5218758A6299EF75ACC7C522C2829F5183F855A6AF6AA2585FADDB882FAD21B
3,682,565 UART: [art] SIG.S = D50EC703D199131516949B4E37DA9CCAE0C6BF9F233E81DCD439C0A09EA7DAB3345333A7A594F700BBE080EBE706B8BC
3,706,053 UART: Caliptra RT
3,706,398 UART: [state] CFI Enabled
3,814,017 UART: [rt] RT listening for mailbox commands...
3,814,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,845 UART: [rt]cmd =0x41544d4e, len=14344
5,352,679 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,909 ready_for_fw is high
1,055,909 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,451 >>> mbox cmd response: success
3,227,554 UART:
3,227,570 UART: Running Caliptra FMC ...
3,227,978 UART:
3,228,121 UART: [state] CFI Enabled
3,238,647 UART: [fht] FMC Alias Private Key: 7
3,346,751 UART: [art] Extend RT PCRs Done
3,347,179 UART: [art] Lock RT PCRs Done
3,348,887 UART: [art] Populate DV Done
3,357,111 UART: [fht] FMC Alias Private Key: 7
3,358,041 UART: [art] Derive CDI
3,358,321 UART: [art] Store in in slot 0x4
3,444,326 UART: [art] Derive Key Pair
3,444,686 UART: [art] Store priv key in slot 0x5
3,457,966 UART: [art] Derive Key Pair - Done
3,472,564 UART: [art] Signing Cert with AUTHO
3,473,044 UART: RITY.KEYID = 7
3,488,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,151 UART: [art] PUB.X = C389867DDAD54DFE23F1FF0A4F3767CA616EBA00DCBF88A0D4C33A12F4FE6BA7F267BBF599C0CF7F97F3B84736592DA3
3,495,920 UART: [art] PUB.Y = EF3E63BB71EBC4871B1453E4D4391FD06D5196BF1916BAA71C6D2D1B3E7B9599E832EE8E1ED5D711E9292631E9AD2AF3
3,502,884 UART: [art] SIG.R = 006D811892B9A4E70CB60C06702C8D1BC1902CA9C7624237CA8A5CDD5262D39DE9F6784F3931AB485864EF025F65CEA3
3,509,624 UART: [art] SIG.S = 21BF7B9084F1B715F3804C00F454792A6ECE8664DFEEF0CF93EC8BA778C24A58F413A2F7336F4E9947A5F3B29FB119D0
3,533,187 UART: Caliptra RT
3,533,532 UART: [state] CFI Enabled
3,642,018 UART: [rt] RT listening for mailbox commands...
3,642,688 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,710 UART: [rt]cmd =0x41544d4e, len=14344
5,180,960 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,023 UART:
192,383 UART: Running Caliptra ROM ...
193,473 UART:
193,610 UART: [state] CFI Enabled
262,188 UART: [state] LifecycleState = Unprovisioned
264,144 UART: [state] DebugLocked = No
266,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,281 UART: [kat] SHA2-256
442,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,459 UART: [kat] ++
452,970 UART: [kat] sha1
463,264 UART: [kat] SHA2-256
465,986 UART: [kat] SHA2-384
472,131 UART: [kat] SHA2-512-ACC
474,493 UART: [kat] ECC-384
2,765,961 UART: [kat] HMAC-384Kdf
2,779,134 UART: [kat] LMS
3,969,447 UART: [kat] --
3,974,597 UART: [cold-reset] ++
3,976,803 UART: [fht] Storing FHT @ 0x50003400
3,988,413 UART: [idev] ++
3,989,041 UART: [idev] CDI.KEYID = 6
3,990,105 UART: [idev] SUBJECT.KEYID = 7
3,991,201 UART: [idev] UDS.KEYID = 0
3,992,155 ready_for_fw is high
3,992,348 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,517 UART: [idev] Erasing UDS.KEYID = 0
7,329,562 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,592 UART: [idev] --
7,356,144 UART: [ldev] ++
7,356,770 UART: [ldev] CDI.KEYID = 6
7,357,675 UART: [ldev] SUBJECT.KEYID = 5
7,358,883 UART: [ldev] AUTHORITY.KEYID = 7
7,360,159 UART: [ldev] FE.KEYID = 1
7,403,536 UART: [ldev] Erasing FE.KEYID = 1
10,739,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,215 UART: [ldev] --
13,118,552 UART: [fwproc] Waiting for Commands...
13,121,770 UART: [fwproc] Received command 0x46574c44
13,123,952 UART: [fwproc] Received Image of size 113844 bytes
21,364,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,437,339 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,506,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,822,412 >>> mbox cmd response: success
21,826,307 UART: [afmc] ++
21,826,904 UART: [afmc] CDI.KEYID = 6
21,827,867 UART: [afmc] SUBJECT.KEYID = 7
21,829,076 UART: [afmc] AUTHORITY.KEYID = 5
25,188,017 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,490,444 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,492,704 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,507,283 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,522,041 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,536,261 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,558,481 UART: [afmc] --
27,562,422 UART: [cold-reset] --
27,567,263 UART: [state] Locking Datavault
27,572,311 UART: [state] Locking PCR0, PCR1 and PCR31
27,574,074 UART: [state] Locking ICCM
27,576,332 UART: [exit] Launching FMC @ 0x40000130
27,584,694 UART:
27,584,923 UART: Running Caliptra FMC ...
27,586,015 UART:
27,586,176 UART: [state] CFI Enabled
27,651,411 UART: [fht] FMC Alias Private Key: 7
29,989,343 UART: [art] Extend RT PCRs Done
29,990,565 UART: [art] Lock RT PCRs Done
29,992,534 UART: [art] Populate DV Done
29,997,834 UART: [fht] FMC Alias Private Key: 7
29,999,362 UART: [art] Derive CDI
30,000,092 UART: [art] Store in in slot 0x4
30,060,162 UART: [art] Derive Key Pair
30,061,198 UART: [art] Store priv key in slot 0x5
33,353,850 UART: [art] Derive Key Pair - Done
33,366,578 UART: [art] Signing Cert with AUTHO
33,367,873 UART: RITY.KEYID = 7
35,656,220 UART: [art] Erasing AUTHORITY.KEYID = 7
35,657,728 UART: [art] PUB.X = D3DFBD667D5A2ECDCF8A0F6DB18512D5AC5B3E69EA4C69742C2D2C7592E08EF85B39FBDDFF35746CD430F8B8E67349DC
35,665,015 UART: [art] PUB.Y = CB95E8FCACBB77AD1F5CE47AB814FD42364BE77197E351C191BCB1B1AE861EEC4CC4950FC16754969641D61485ED83A1
35,672,266 UART: [art] SIG.R = F801F7AA8C1C639E220E2F3DB7ED06D8900E7A84CEC355723E0C7FC16CFCA02ED1E367983AF81A172DA86B98351D2EFF
35,679,656 UART: [art] SIG.S = 29F1F5BED8C6BF44CE4CB9EF5496CF4E9C4EFDB4D7D032A79F6046266241286BDDC7A4CE6C35C8B03D38EB4DBEABF0CB
36,984,826 UART: Caliptra RT
36,985,514 UART: [state] CFI Enabled
37,149,865 UART: [rt] RT listening for mailbox commands...
37,152,176 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,308,163 UART: [rt]cmd =0x41544d4e, len=14344
41,543,828 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,807,963 ready_for_fw is high
3,808,368 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,733,161 >>> mbox cmd response: success
27,428,569 UART:
27,428,947 UART: Running Caliptra FMC ...
27,430,134 UART:
27,430,298 UART: [state] CFI Enabled
27,497,716 UART: [fht] FMC Alias Private Key: 7
29,835,330 UART: [art] Extend RT PCRs Done
29,836,560 UART: [art] Lock RT PCRs Done
29,838,361 UART: [art] Populate DV Done
29,843,966 UART: [fht] FMC Alias Private Key: 7
29,845,562 UART: [art] Derive CDI
29,846,398 UART: [art] Store in in slot 0x4
29,905,993 UART: [art] Derive Key Pair
29,907,033 UART: [art] Store priv key in slot 0x5
33,200,223 UART: [art] Derive Key Pair - Done
33,213,236 UART: [art] Signing Cert with AUTHO
33,214,539 UART: RITY.KEYID = 7
35,503,444 UART: [art] Erasing AUTHORITY.KEYID = 7
35,504,943 UART: [art] PUB.X = 86A4CD6E8036E491DF6DABB08F06F9B4DFB27048984098CE9843E58EABAC90AA5F59665BC0B83912137E8B579B51AF35
35,512,249 UART: [art] PUB.Y = AAC11C9BBE26F2E6F67FF8944DA5A3095F6DEB6788774EE2B4F4D3921FD223B89BCE0DBAB79376B2136190D2BC79A487
35,519,472 UART: [art] SIG.R = EBBE5C85F2413BBD83688D32BDBB3A0C052CD38674458081323EC0FD7EFECBB178813AF7814F66545B0EF9CF111D5489
35,526,874 UART: [art] SIG.S = 4E9DAFB7C42D4C6C1BB8A003725F8A4EEA477CBC2A6C555E3421455D4C5D4550F028EAFED5A0EA5A2DF336E0EB9B79C7
36,831,803 UART: Caliptra RT
36,832,504 UART: [state] CFI Enabled
36,992,374 UART: [rt] RT listening for mailbox commands...
36,994,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,149,943 UART: [rt]cmd =0x41544d4e, len=14344
41,307,720 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,414 UART:
192,768 UART: Running Caliptra ROM ...
193,957 UART:
603,488 UART: [state] CFI Enabled
617,234 UART: [state] LifecycleState = Unprovisioned
619,161 UART: [state] DebugLocked = No
622,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,453 UART: [kat] SHA2-256
796,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,752 UART: [kat] ++
807,198 UART: [kat] sha1
817,575 UART: [kat] SHA2-256
820,223 UART: [kat] SHA2-384
825,297 UART: [kat] SHA2-512-ACC
827,666 UART: [kat] ECC-384
3,111,447 UART: [kat] HMAC-384Kdf
3,123,219 UART: [kat] LMS
4,313,303 UART: [kat] --
4,318,968 UART: [cold-reset] ++
4,321,143 UART: [fht] Storing FHT @ 0x50003400
4,333,640 UART: [idev] ++
4,334,211 UART: [idev] CDI.KEYID = 6
4,335,176 UART: [idev] SUBJECT.KEYID = 7
4,336,418 UART: [idev] UDS.KEYID = 0
4,337,376 ready_for_fw is high
4,337,584 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,696 UART: [idev] Erasing UDS.KEYID = 0
7,625,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,947 UART: [idev] --
7,650,080 UART: [ldev] ++
7,650,666 UART: [ldev] CDI.KEYID = 6
7,651,577 UART: [ldev] SUBJECT.KEYID = 5
7,652,787 UART: [ldev] AUTHORITY.KEYID = 7
7,654,071 UART: [ldev] FE.KEYID = 1
7,665,853 UART: [ldev] Erasing FE.KEYID = 1
10,957,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,929 UART: [ldev] --
13,318,811 UART: [fwproc] Waiting for Commands...
13,322,097 UART: [fwproc] Received command 0x46574c44
13,324,281 UART: [fwproc] Received Image of size 113844 bytes
21,722,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,806,738 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,875,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,192,018 >>> mbox cmd response: success
22,196,416 UART: [afmc] ++
22,197,009 UART: [afmc] CDI.KEYID = 6
22,197,929 UART: [afmc] SUBJECT.KEYID = 7
22,199,146 UART: [afmc] AUTHORITY.KEYID = 5
25,514,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,806,507 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,808,757 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,823,285 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,838,079 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,852,301 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,873,266 UART: [afmc] --
27,876,653 UART: [cold-reset] --
27,880,787 UART: [state] Locking Datavault
27,885,386 UART: [state] Locking PCR0, PCR1 and PCR31
27,887,141 UART: [state] Locking ICCM
27,888,321 UART: [exit] Launching FMC @ 0x40000130
27,896,715 UART:
27,896,956 UART: Running Caliptra FMC ...
27,898,064 UART:
27,898,227 UART: [state] CFI Enabled
27,906,134 UART: [fht] FMC Alias Private Key: 7
30,237,410 UART: [art] Extend RT PCRs Done
30,238,632 UART: [art] Lock RT PCRs Done
30,240,306 UART: [art] Populate DV Done
30,245,619 UART: [fht] FMC Alias Private Key: 7
30,247,328 UART: [art] Derive CDI
30,248,142 UART: [art] Store in in slot 0x4
30,290,482 UART: [art] Derive Key Pair
30,291,484 UART: [art] Store priv key in slot 0x5
33,533,647 UART: [art] Derive Key Pair - Done
33,546,618 UART: [art] Signing Cert with AUTHO
33,547,925 UART: RITY.KEYID = 7
35,827,275 UART: [art] Erasing AUTHORITY.KEYID = 7
35,828,782 UART: [art] PUB.X = 22F0F8FD937C5F184DA144F412E360FA604E159307B8077DC5A852F5FA462341A07A6BF858B84DCFD33164A158B7CC51
35,835,996 UART: [art] PUB.Y = 81378D8B1BB06EBC1E394A2D4F143410BA0E3A30C0061E797DFC9B7E7E7D454BD932122EE22729D1E6B6E046B012213E
35,843,254 UART: [art] SIG.R = 6FDD888C11DB761493F3AB0AEF400686EC7531B768FD7E977E1B4B2A69AFB13F212074C776F47D4D270A81D85B597B6E
35,850,637 UART: [art] SIG.S = F6A2270D119714DD24295FE455B2572F23896A7F5315BA4838C9E28F4E72C6050653C25A8B3518C1E62881CA1BD9296E
37,155,484 UART: Caliptra RT
37,156,209 UART: [state] CFI Enabled
37,274,517 UART: [rt] RT listening for mailbox commands...
37,276,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,432,253 UART: [rt]cmd =0x41544d4e, len=14344
41,615,970 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,128,445 ready_for_fw is high
4,128,851 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,304,753 >>> mbox cmd response: success
27,947,242 UART:
27,947,669 UART: Running Caliptra FMC ...
27,948,967 UART:
27,949,139 UART: [state] CFI Enabled
27,956,654 UART: [fht] FMC Alias Private Key: 7
30,287,385 UART: [art] Extend RT PCRs Done
30,288,614 UART: [art] Lock RT PCRs Done
30,290,484 UART: [art] Populate DV Done
30,295,769 UART: [fht] FMC Alias Private Key: 7
30,297,260 UART: [art] Derive CDI
30,298,027 UART: [art] Store in in slot 0x4
30,340,460 UART: [art] Derive Key Pair
30,341,456 UART: [art] Store priv key in slot 0x5
33,583,590 UART: [art] Derive Key Pair - Done
33,596,477 UART: [art] Signing Cert with AUTHO
33,597,783 UART: RITY.KEYID = 7
35,877,251 UART: [art] Erasing AUTHORITY.KEYID = 7
35,878,760 UART: [art] PUB.X = 2AC35675E8F6B9AFAE57ABE8F2887264D49AD5A771878D6BB0816F0A4839602AA8BDBE3E8565FC6781BE7EEC0478AA4C
35,885,967 UART: [art] PUB.Y = A1833CBD084F32AD2FF5B4E81BFAF8ED6C3975BD8307CB94EA4E2196E7E3D065518AE8DFB033545286F452233EE0129D
35,893,240 UART: [art] SIG.R = 90204EB221D5EC63D4EC784B8614BBEF2BAB99B40CC2AD3130B607FCBFCF2EB6A58521FD3EECDE9E78B4257CDD73B19B
35,900,642 UART: [art] SIG.S = 0AE15FF6473B14C74F1FD939AD40E5F8BEA1A24B5668B3D2049CE31B93D138854F6209BEEFD13539F85FD3FB9645F382
37,206,281 UART: Caliptra RT
37,206,991 UART: [state] CFI Enabled
37,324,704 UART: [rt] RT listening for mailbox commands...
37,327,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,482,170 UART: [rt]cmd =0x41544d4e, len=14344
41,640,385 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,026 UART:
192,402 UART: Running Caliptra ROM ...
193,605 UART:
193,766 UART: [state] CFI Enabled
264,861 UART: [state] LifecycleState = Unprovisioned
266,783 UART: [state] DebugLocked = No
269,177 UART: [state] WD Timer not started. Device not locked for debugging
272,997 UART: [kat] SHA2-256
452,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,692 UART: [kat] ++
464,228 UART: [kat] sha1
475,253 UART: [kat] SHA2-256
478,251 UART: [kat] SHA2-384
484,733 UART: [kat] SHA2-512-ACC
487,671 UART: [kat] ECC-384
2,951,026 UART: [kat] HMAC-384Kdf
2,973,303 UART: [kat] LMS
3,502,611 UART: [kat] --
3,505,561 UART: [cold-reset] ++
3,507,134 UART: [fht] FHT @ 0x50003400
3,517,615 UART: [idev] ++
3,518,183 UART: [idev] CDI.KEYID = 6
3,519,069 UART: [idev] SUBJECT.KEYID = 7
3,520,315 UART: [idev] UDS.KEYID = 0
3,521,240 ready_for_fw is high
3,521,432 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,128 UART: [idev] Erasing UDS.KEYID = 0
6,027,276 UART: [idev] Sha1 KeyId Algorithm
6,051,809 UART: [idev] --
6,055,373 UART: [ldev] ++
6,055,951 UART: [ldev] CDI.KEYID = 6
6,056,836 UART: [ldev] SUBJECT.KEYID = 5
6,057,939 UART: [ldev] AUTHORITY.KEYID = 7
6,059,281 UART: [ldev] FE.KEYID = 1
6,100,174 UART: [ldev] Erasing FE.KEYID = 1
8,603,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,212 UART: [ldev] --
10,412,204 UART: [fwproc] Wait for Commands...
10,415,211 UART: [fwproc] Recv command 0x46574c44
10,417,271 UART: [fwproc] Recv'd Img size: 114168 bytes
14,964,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,041,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,109,811 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,427,603 >>> mbox cmd response: success
15,432,472 UART: [afmc] ++
15,433,077 UART: [afmc] CDI.KEYID = 6
15,434,016 UART: [afmc] SUBJECT.KEYID = 7
15,435,129 UART: [afmc] AUTHORITY.KEYID = 5
17,979,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,275 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,721,256 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,737,216 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,752,954 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,775,830 UART: [afmc] --
19,779,256 UART: [cold-reset] --
19,782,531 UART: [state] Locking Datavault
19,787,780 UART: [state] Locking PCR0, PCR1 and PCR31
19,789,482 UART: [state] Locking ICCM
19,791,412 UART: [exit] Launching FMC @ 0x40000130
19,799,868 UART:
19,800,104 UART: Running Caliptra FMC ...
19,801,224 UART:
19,801,383 UART: [state] CFI Enabled
19,859,592 UART: [fht] FMC Alias Private Key: 7
21,623,457 UART: [art] Extend RT PCRs Done
21,624,686 UART: [art] Lock RT PCRs Done
21,626,394 UART: [art] Populate DV Done
21,632,028 UART: [fht] FMC Alias Private Key: 7
21,633,677 UART: [art] Derive CDI
21,634,493 UART: [art] Store in in slot 0x4
21,692,446 UART: [art] Derive Key Pair
21,693,622 UART: [art] Store priv key in slot 0x5
24,156,306 UART: [art] Derive Key Pair - Done
24,169,581 UART: [art] Signing Cert with AUTHO
24,170,883 UART: RITY.KEYID = 7
25,881,702 UART: [art] Erasing AUTHORITY.KEYID = 7
25,883,210 UART: [art] PUB.X = 83E40473E323C649DA4C2CB4DF84CC70C83840957628F6242B46C3B41A73CCFA3C6642D18155BB5186F0B09BE2A453EE
25,890,484 UART: [art] PUB.Y = 3FD505793B091246345155C8E136EF72DB84A20C7B1F59D44C9D1D8398354DB529B7439202F7A48F619456F91C894D39
25,897,732 UART: [art] SIG.R = 8A02D8C8F5BE6BEECD6F94336B0BFD7B78BD878BAFF8EBBFC13C92CA185B1B42C7B1FB2A31BBBF121C0DEAFAFDE4C5C1
25,905,167 UART: [art] SIG.S = D81466E19075B043FE994647C63543DF9B4B3C5308EECCB5169A2B1F5D62E102CC2E97C0EEB9C3089AB2124DE009CD91
26,884,385 UART: Caliptra RT
26,885,073 UART: [state] CFI Enabled
27,063,161 UART: [rt] RT listening for mailbox commands...
27,065,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,220,600 UART: [rt]cmd =0x41544d4e, len=14344
29,580,445 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,379,922 ready_for_fw is high
3,380,396 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,088,818 >>> mbox cmd response: success
19,379,294 UART:
19,379,692 UART: Running Caliptra FMC ...
19,380,840 UART:
19,381,004 UART: [state] CFI Enabled
19,448,794 UART: [fht] FMC Alias Private Key: 7
21,212,815 UART: [art] Extend RT PCRs Done
21,214,041 UART: [art] Lock RT PCRs Done
21,216,213 UART: [art] Populate DV Done
21,221,726 UART: [fht] FMC Alias Private Key: 7
21,223,262 UART: [art] Derive CDI
21,224,076 UART: [art] Store in in slot 0x4
21,281,651 UART: [art] Derive Key Pair
21,282,684 UART: [art] Store priv key in slot 0x5
23,745,815 UART: [art] Derive Key Pair - Done
23,758,920 UART: [art] Signing Cert with AUTHO
23,760,225 UART: RITY.KEYID = 7
25,471,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,473,280 UART: [art] PUB.X = 04A2D52504A631A690E0BE5B3194C651E5DE079241CEB8C06C244DAA1188FD70EF38FAA8960C24CC2141BCA0FCBA99D9
25,480,586 UART: [art] PUB.Y = ABEC00E594EA12154FED92F0AF892DAF429B8A187B453A24D3EA03465764F51D4833FCC5C5DC367EF40F0F765E237509
25,487,792 UART: [art] SIG.R = 68855448AAB2331C67F851E5C36609CEC21DFF84351B40E1DF46FDF993E57B7712E70FADA8E952521F7F02DD85A578F7
25,495,176 UART: [art] SIG.S = 0D2D28EBD808C44BAE2970C873021F4115710CEE89B52DAD37A304A55452AF2045D6FB11DCE5092DF6D3A2FE437BA671
26,474,089 UART: Caliptra RT
26,474,831 UART: [state] CFI Enabled
26,639,831 UART: [rt] RT listening for mailbox commands...
26,642,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,797,507 UART: [rt]cmd =0x41544d4e, len=14344
29,167,984 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,523 writing to cptra_bootfsm_go
194,720 UART:
195,080 UART: Running Caliptra ROM ...
196,263 UART:
605,944 UART: [state] CFI Enabled
624,446 UART: [state] LifecycleState = Unprovisioned
626,314 UART: [state] DebugLocked = No
628,398 UART: [state] WD Timer not started. Device not locked for debugging
631,928 UART: [kat] SHA2-256
811,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
822,573 UART: [kat] ++
823,020 UART: [kat] sha1
834,249 UART: [kat] SHA2-256
837,331 UART: [kat] SHA2-384
843,106 UART: [kat] SHA2-512-ACC
846,036 UART: [kat] ECC-384
3,289,811 UART: [kat] HMAC-384Kdf
3,301,649 UART: [kat] LMS
3,831,133 UART: [kat] --
3,836,563 UART: [cold-reset] ++
3,838,162 UART: [fht] FHT @ 0x50003400
3,849,512 UART: [idev] ++
3,850,118 UART: [idev] CDI.KEYID = 6
3,851,042 UART: [idev] SUBJECT.KEYID = 7
3,852,223 UART: [idev] UDS.KEYID = 0
3,853,151 ready_for_fw is high
3,853,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,996,650 UART: [idev] Erasing UDS.KEYID = 0
6,326,793 UART: [idev] Sha1 KeyId Algorithm
6,350,554 UART: [idev] --
6,355,088 UART: [ldev] ++
6,355,657 UART: [ldev] CDI.KEYID = 6
6,356,539 UART: [ldev] SUBJECT.KEYID = 5
6,357,747 UART: [ldev] AUTHORITY.KEYID = 7
6,358,981 UART: [ldev] FE.KEYID = 1
6,371,540 UART: [ldev] Erasing FE.KEYID = 1
8,849,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,157 UART: [ldev] --
10,640,285 UART: [fwproc] Wait for Commands...
10,642,380 UART: [fwproc] Recv command 0x46574c44
10,644,480 UART: [fwproc] Recv'd Img size: 114168 bytes
15,198,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,275,691 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,344,426 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,661,497 >>> mbox cmd response: success
15,666,424 UART: [afmc] ++
15,667,018 UART: [afmc] CDI.KEYID = 6
15,667,931 UART: [afmc] SUBJECT.KEYID = 7
15,669,108 UART: [afmc] AUTHORITY.KEYID = 5
18,172,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,893,198 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,895,068 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,911,026 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,927,017 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,942,810 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,965,160 UART: [afmc] --
19,969,562 UART: [cold-reset] --
19,974,176 UART: [state] Locking Datavault
19,979,482 UART: [state] Locking PCR0, PCR1 and PCR31
19,981,130 UART: [state] Locking ICCM
19,982,172 UART: [exit] Launching FMC @ 0x40000130
19,990,618 UART:
19,990,853 UART: Running Caliptra FMC ...
19,991,955 UART:
19,992,133 UART: [state] CFI Enabled
20,000,030 UART: [fht] FMC Alias Private Key: 7
21,756,436 UART: [art] Extend RT PCRs Done
21,757,674 UART: [art] Lock RT PCRs Done
21,759,686 UART: [art] Populate DV Done
21,764,775 UART: [fht] FMC Alias Private Key: 7
21,766,348 UART: [art] Derive CDI
21,767,173 UART: [art] Store in in slot 0x4
21,809,980 UART: [art] Derive Key Pair
21,810,982 UART: [art] Store priv key in slot 0x5
24,237,379 UART: [art] Derive Key Pair - Done
24,250,477 UART: [art] Signing Cert with AUTHO
24,251,814 UART: RITY.KEYID = 7
25,957,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,959,148 UART: [art] PUB.X = BB640FD7991AD3004DDFE7811D89E82C5FF3559FE64417D7B209C3FF8E252E6800C144E308F520541BD0698C9F7EEAE4
25,966,405 UART: [art] PUB.Y = F4A15C54C0EA7970D588391E2CA63621BDF3AA6877D97664EFCDF6486DFED210C34D46A79D06371F66954C723C272ED8
25,973,670 UART: [art] SIG.R = B767A931C316B30EE76899D583C93BDCB0E366BFEEE3F10F73EBAD5EEC2116C5A25FEBFB664E7ACC9812768992272E6E
25,981,073 UART: [art] SIG.S = D9D6C0321613425DCACB2A61F6AFC962344F8CE0FCA5F48494B24BFFBBC99F7BE9DEA6E54DBE1F972409A8F6A42B65EA
26,959,407 UART: Caliptra RT
26,960,100 UART: [state] CFI Enabled
27,076,838 UART: [rt] RT listening for mailbox commands...
27,079,167 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,234,396 UART: [rt]cmd =0x41544d4e, len=14344
29,598,287 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,798 writing to cptra_bootfsm_go
3,689,882 ready_for_fw is high
3,690,463 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,233,937 >>> mbox cmd response: success
19,486,354 UART:
19,486,748 UART: Running Caliptra FMC ...
19,487,940 UART:
19,488,128 UART: [state] CFI Enabled
19,495,796 UART: [fht] FMC Alias Private Key: 7
21,252,757 UART: [art] Extend RT PCRs Done
21,253,976 UART: [art] Lock RT PCRs Done
21,255,658 UART: [art] Populate DV Done
21,261,014 UART: [fht] FMC Alias Private Key: 7
21,262,509 UART: [art] Derive CDI
21,263,284 UART: [art] Store in in slot 0x4
21,306,171 UART: [art] Derive Key Pair
21,307,215 UART: [art] Store priv key in slot 0x5
23,734,124 UART: [art] Derive Key Pair - Done
23,747,023 UART: [art] Signing Cert with AUTHO
23,748,326 UART: RITY.KEYID = 7
25,453,703 UART: [art] Erasing AUTHORITY.KEYID = 7
25,455,210 UART: [art] PUB.X = 1F2DC33B09610C3FA47516A818DB997E969FA45C586BA5FCF73C704AF122E57A3FC94232E3D0F2A5D1BBD26EB8833A6A
25,462,528 UART: [art] PUB.Y = D68AC1E77DA8DE67D7289E0A09C19A63D46F804DB424D0210A7ACE1E4522BE4469F7D82D4974056D6425ED5299995EEB
25,469,740 UART: [art] SIG.R = 3AE3AD310A3DFE0FF0D67D43DAA52EF08F3433B8CAAD62E95F41021E753E65C0F4CDE93457F801FA468F7757D7AB3DCA
25,477,194 UART: [art] SIG.S = AA5844830C3FC7B5C9EFCF3153ED014A1A720047B8A2D86A0EA702C232BAC07F243DF2C9F0DEBCE6C810CA83B53F4211
26,455,961 UART: Caliptra RT
26,456,661 UART: [state] CFI Enabled
26,574,040 UART: [rt] RT listening for mailbox commands...
26,576,365 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,731,854 UART: [rt]cmd =0x41544d4e, len=14344
29,104,882 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,231 UART:
192,588 UART: Running Caliptra ROM ...
193,793 UART:
193,952 UART: [state] CFI Enabled
264,693 UART: [state] LifecycleState = Unprovisioned
267,078 UART: [state] DebugLocked = No
269,749 UART: [state] WD Timer not started. Device not locked for debugging
274,418 UART: [kat] SHA2-256
464,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,053 UART: [kat] ++
475,542 UART: [kat] sha1
487,838 UART: [kat] SHA2-256
490,855 UART: [kat] SHA2-384
496,774 UART: [kat] SHA2-512-ACC
499,357 UART: [kat] ECC-384
2,946,478 UART: [kat] HMAC-384Kdf
2,971,361 UART: [kat] LMS
3,503,114 UART: [kat] --
3,507,200 UART: [cold-reset] ++
3,509,131 UART: [fht] FHT @ 0x50003400
3,520,249 UART: [idev] ++
3,520,955 UART: [idev] CDI.KEYID = 6
3,521,989 UART: [idev] SUBJECT.KEYID = 7
3,523,090 UART: [idev] UDS.KEYID = 0
3,524,020 ready_for_fw is high
3,524,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,912 UART: [idev] Erasing UDS.KEYID = 0
6,027,523 UART: [idev] Sha1 KeyId Algorithm
6,049,569 UART: [idev] --
6,054,432 UART: [ldev] ++
6,055,706 UART: [ldev] CDI.KEYID = 6
6,056,613 UART: [ldev] SUBJECT.KEYID = 5
6,057,671 UART: [ldev] AUTHORITY.KEYID = 7
6,058,859 UART: [ldev] FE.KEYID = 1
6,100,245 UART: [ldev] Erasing FE.KEYID = 1
8,603,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,234 UART: [ldev] --
10,412,902 UART: [fwproc] Wait for Commands...
10,415,695 UART: [fwproc] Recv command 0x46574c44
10,418,001 UART: [fwproc] Recv'd Img size: 114168 bytes
15,051,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,129,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,246,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,787,112 >>> mbox cmd response: success
15,791,862 UART: [afmc] ++
15,792,587 UART: [afmc] CDI.KEYID = 6
15,793,804 UART: [afmc] SUBJECT.KEYID = 7
15,795,249 UART: [afmc] AUTHORITY.KEYID = 5
18,322,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,045,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,047,231 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,062,317 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,077,483 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,092,316 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,116,204 UART: [afmc] --
20,119,487 UART: [cold-reset] --
20,123,951 UART: [state] Locking Datavault
20,129,328 UART: [state] Locking PCR0, PCR1 and PCR31
20,131,494 UART: [state] Locking ICCM
20,132,622 UART: [exit] Launching FMC @ 0x40000130
20,141,264 UART:
20,141,543 UART: Running Caliptra FMC ...
20,142,624 UART:
20,142,780 UART: [state] CFI Enabled
20,201,520 UART: [fht] FMC Alias Private Key: 7
21,964,447 UART: [art] Extend RT PCRs Done
21,965,679 UART: [art] Lock RT PCRs Done
21,967,174 UART: [art] Populate DV Done
21,972,695 UART: [fht] FMC Alias Private Key: 7
21,974,285 UART: [art] Derive CDI
21,975,100 UART: [art] Store in in slot 0x4
22,034,460 UART: [art] Derive Key Pair
22,035,471 UART: [art] Store priv key in slot 0x5
24,498,325 UART: [art] Derive Key Pair - Done
24,511,161 UART: [art] Signing Cert with AUTHO
24,512,462 UART: RITY.KEYID = 7
26,224,556 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,066 UART: [art] PUB.X = EB25E0E30EDB6B1B9ED54C4DDC15AD1828B819F225E77AB5E710868E5A637822E19901CABD4D859ACCE7EDA2B5815800
26,233,305 UART: [art] PUB.Y = 41CF59FF79892C929F0BB48A2BC2BD3A4A102552401E5BB001CA6316447398A4A7C19F99E623642CD1C7BA6A5BAB5C90
26,240,560 UART: [art] SIG.R = E4CC2B29309ED49FA814E92BDE6DF485AC5BBCEE3F51D78A87AF238A5EF359D25E80A991EEE20C85814314514068F7F5
26,247,982 UART: [art] SIG.S = CFF6A6CD5A5EF2A21DA399DB4A275FB3317DEB6D0C436AA0F04F9E41278DBFB4A396CA5F633E40D28F2DC6D41EEDDCAE
27,226,848 UART: Caliptra RT
27,227,574 UART: [state] CFI Enabled
27,393,628 UART: [rt] RT listening for mailbox commands...
27,395,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,551,014 UART: [rt]cmd =0x41544d4e, len=14344
29,907,645 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,437,849 ready_for_fw is high
3,438,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,816,560 >>> mbox cmd response: success
20,103,437 UART:
20,103,821 UART: Running Caliptra FMC ...
20,104,957 UART:
20,105,123 UART: [state] CFI Enabled
20,170,230 UART: [fht] FMC Alias Private Key: 7
21,934,006 UART: [art] Extend RT PCRs Done
21,935,236 UART: [art] Lock RT PCRs Done
21,936,707 UART: [art] Populate DV Done
21,941,877 UART: [fht] FMC Alias Private Key: 7
21,943,521 UART: [art] Derive CDI
21,944,337 UART: [art] Store in in slot 0x4
22,002,836 UART: [art] Derive Key Pair
22,003,874 UART: [art] Store priv key in slot 0x5
24,467,296 UART: [art] Derive Key Pair - Done
24,480,734 UART: [art] Signing Cert with AUTHO
24,482,070 UART: RITY.KEYID = 7
26,192,767 UART: [art] Erasing AUTHORITY.KEYID = 7
26,194,278 UART: [art] PUB.X = A7265B515A642BEBAE82307FB78938DCE90F40A8CE9314516C200B36612581E085D360FF286068E2E37F66F035BB0C41
26,201,509 UART: [art] PUB.Y = 9AFAE115D310E1046DBDFCD2137040D9EB13459DCDC1CE1C48E7244DE51CA71EDF9C8489251243D5F78378646546DC2D
26,208,824 UART: [art] SIG.R = 50E40491D49D0DD5CA6E5CF7B4126AEEB536FF90453036A461C64AB7E44F1F5644D2CF2DCB0822329DBC02060E647C6D
26,216,229 UART: [art] SIG.S = 6D4F8394A6304DE78EE23020DF5FE12F5B308250647F31BCE8C86AB95447A1D4598F533BC3B43C670C585F117D11A068
27,194,957 UART: Caliptra RT
27,195,649 UART: [state] CFI Enabled
27,361,205 UART: [rt] RT listening for mailbox commands...
27,363,500 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,518,774 UART: [rt]cmd =0x41544d4e, len=14344
29,872,835 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,842 writing to cptra_bootfsm_go
193,174 UART:
193,534 UART: Running Caliptra ROM ...
194,726 UART:
604,258 UART: [state] CFI Enabled
618,691 UART: [state] LifecycleState = Unprovisioned
621,039 UART: [state] DebugLocked = No
623,343 UART: [state] WD Timer not started. Device not locked for debugging
627,136 UART: [kat] SHA2-256
816,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,838 UART: [kat] ++
828,302 UART: [kat] sha1
839,460 UART: [kat] SHA2-256
842,475 UART: [kat] SHA2-384
849,248 UART: [kat] SHA2-512-ACC
851,841 UART: [kat] ECC-384
3,294,079 UART: [kat] HMAC-384Kdf
3,308,300 UART: [kat] LMS
3,840,138 UART: [kat] --
3,844,353 UART: [cold-reset] ++
3,846,141 UART: [fht] FHT @ 0x50003400
3,857,406 UART: [idev] ++
3,858,044 UART: [idev] CDI.KEYID = 6
3,859,030 UART: [idev] SUBJECT.KEYID = 7
3,860,209 UART: [idev] UDS.KEYID = 0
3,861,154 ready_for_fw is high
3,861,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,741 UART: [idev] Erasing UDS.KEYID = 0
6,335,828 UART: [idev] Sha1 KeyId Algorithm
6,358,563 UART: [idev] --
6,364,765 UART: [ldev] ++
6,365,450 UART: [ldev] CDI.KEYID = 6
6,366,360 UART: [ldev] SUBJECT.KEYID = 5
6,367,518 UART: [ldev] AUTHORITY.KEYID = 7
6,368,748 UART: [ldev] FE.KEYID = 1
6,380,258 UART: [ldev] Erasing FE.KEYID = 1
8,861,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,658 UART: [ldev] --
10,654,091 UART: [fwproc] Wait for Commands...
10,655,589 UART: [fwproc] Recv command 0x46574c44
10,657,917 UART: [fwproc] Recv'd Img size: 114168 bytes
15,263,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,346,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,462,889 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,004,585 >>> mbox cmd response: success
16,008,215 UART: [afmc] ++
16,008,928 UART: [afmc] CDI.KEYID = 6
16,010,123 UART: [afmc] SUBJECT.KEYID = 7
16,011,565 UART: [afmc] AUTHORITY.KEYID = 5
18,517,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,241,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,243,148 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,258,216 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,273,405 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,288,242 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,313,208 UART: [afmc] --
20,316,975 UART: [cold-reset] --
20,321,587 UART: [state] Locking Datavault
20,326,309 UART: [state] Locking PCR0, PCR1 and PCR31
20,328,449 UART: [state] Locking ICCM
20,330,223 UART: [exit] Launching FMC @ 0x40000130
20,338,850 UART:
20,339,084 UART: Running Caliptra FMC ...
20,340,188 UART:
20,340,347 UART: [state] CFI Enabled
20,348,666 UART: [fht] FMC Alias Private Key: 7
22,105,840 UART: [art] Extend RT PCRs Done
22,107,500 UART: [art] Lock RT PCRs Done
22,108,509 UART: [art] Populate DV Done
22,114,024 UART: [fht] FMC Alias Private Key: 7
22,115,576 UART: [art] Derive CDI
22,116,394 UART: [art] Store in in slot 0x4
22,158,431 UART: [art] Derive Key Pair
22,159,477 UART: [art] Store priv key in slot 0x5
24,585,863 UART: [art] Derive Key Pair - Done
24,599,044 UART: [art] Signing Cert with AUTHO
24,600,340 UART: RITY.KEYID = 7
26,305,505 UART: [art] Erasing AUTHORITY.KEYID = 7
26,307,027 UART: [art] PUB.X = ABA180791D92422E3E9175472D4B028246A495000987F7643E65CF73D4E6F0626792ABACCB22E1BFBC5A8817CDFF9394
26,314,219 UART: [art] PUB.Y = 21E4C651AAB571848C643AEA95E9AC06A0C44B64D20C27809C766CE4BE7B7991041E9A0A53F9A06919365687E93D4A79
26,321,527 UART: [art] SIG.R = B8B3485E3249C381073C6D7191C7A6551FF2D3D8E639D86AE3A2C94BF4FFE23EAC292321BC8F4E3F207AC75232207493
26,328,875 UART: [art] SIG.S = 609F2BFD0D4877D9A32212E7F67D40B736E4528B80A0FDA71D66F89F3EFB6C6DC35949C5292AEE3E7E57B6F02622AF11
27,307,878 UART: Caliptra RT
27,308,585 UART: [state] CFI Enabled
27,425,051 UART: [rt] RT listening for mailbox commands...
27,427,378 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,582,981 UART: [rt]cmd =0x41544d4e, len=14344
29,934,430 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
3,756,757 ready_for_fw is high
3,757,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,073,222 >>> mbox cmd response: success
20,326,072 UART:
20,326,486 UART: Running Caliptra FMC ...
20,327,626 UART:
20,327,813 UART: [state] CFI Enabled
20,335,629 UART: [fht] FMC Alias Private Key: 7
22,092,492 UART: [art] Extend RT PCRs Done
22,093,720 UART: [art] Lock RT PCRs Done
22,095,565 UART: [art] Populate DV Done
22,100,690 UART: [fht] FMC Alias Private Key: 7
22,102,390 UART: [art] Derive CDI
22,103,209 UART: [art] Store in in slot 0x4
22,145,713 UART: [art] Derive Key Pair
22,146,754 UART: [art] Store priv key in slot 0x5
24,573,173 UART: [art] Derive Key Pair - Done
24,586,382 UART: [art] Signing Cert with AUTHO
24,587,693 UART: RITY.KEYID = 7
26,293,164 UART: [art] Erasing AUTHORITY.KEYID = 7
26,294,668 UART: [art] PUB.X = 84C08F2DE6DB7C95E729C97EE5662F46B0050E577FA8DDBB14ECFBB2E91AF371A0EC863BD8C6F1573235423162F7CC76
26,301,977 UART: [art] PUB.Y = 186023EEBA514423DB76279F31AE62E149DFC4E82B41E3188E889911AA7C20CA458FBCE096B1AE7697351735EEDD512F
26,309,241 UART: [art] SIG.R = 80935252EFBCC6D367FF6BA001A2CBDF5A695242A7FBF349AC4D1186890AF68DE4ACA763FD0FF5149464F3A65FB1FA18
26,316,643 UART: [art] SIG.S = 2B40C28C61085A81EE8AD4156BB5FAC9B685AF477F2C44740054D52605D40D507FD59AE680385CB1ED86AB1CAE34C47B
27,295,575 UART: Caliptra RT
27,296,264 UART: [state] CFI Enabled
27,414,672 UART: [rt] RT listening for mailbox commands...
27,417,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,305 UART: [rt]cmd =0x41544d4e, len=14344
29,924,834 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,692 UART: [state] LifecycleState = Unprovisioned
85,347 UART: [state] DebugLocked = No
85,941 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,619 UART: [kat] SHA2-256
881,550 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,665 UART: [kat] ++
885,817 UART: [kat] sha1
890,075 UART: [kat] SHA2-256
892,013 UART: [kat] SHA2-384
894,706 UART: [kat] SHA2-512-ACC
896,607 UART: [kat] ECC-384
902,180 UART: [kat] HMAC-384Kdf
906,606 UART: [kat] LMS
1,474,802 UART: [kat] --
1,475,831 UART: [cold-reset] ++
1,476,359 UART: [fht] Storing FHT @ 0x50003400
1,479,152 UART: [idev] ++
1,479,320 UART: [idev] CDI.KEYID = 6
1,479,680 UART: [idev] SUBJECT.KEYID = 7
1,480,104 UART: [idev] UDS.KEYID = 0
1,480,449 ready_for_fw is high
1,480,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,278 UART: [idev] Erasing UDS.KEYID = 0
1,504,294 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,104 UART: [idev] --
1,514,353 UART: [ldev] ++
1,514,521 UART: [ldev] CDI.KEYID = 6
1,514,884 UART: [ldev] SUBJECT.KEYID = 5
1,515,310 UART: [ldev] AUTHORITY.KEYID = 7
1,515,773 UART: [ldev] FE.KEYID = 1
1,520,959 UART: [ldev] Erasing FE.KEYID = 1
1,546,856 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,610 UART: [ldev] --
1,585,921 UART: [fwproc] Waiting for Commands...
1,586,608 UART: [fwproc] Received command 0x46574c44
1,587,399 UART: [fwproc] Received Image of size 114168 bytes
5,345,784 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,374,306 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,403,658 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,539,321 >>> mbox cmd response: success
5,540,571 UART: [afmc] ++
5,540,739 UART: [afmc] CDI.KEYID = 6
5,541,101 UART: [afmc] SUBJECT.KEYID = 7
5,541,526 UART: [afmc] AUTHORITY.KEYID = 5
5,575,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,591,956 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,592,736 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,598,445 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,604,337 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,610,038 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,617,822 UART: [afmc] --
5,618,722 UART: [cold-reset] --
5,619,286 UART: [state] Locking Datavault
5,620,387 UART: [state] Locking PCR0, PCR1 and PCR31
5,620,991 UART: [state] Locking ICCM
5,621,531 UART: [exit] Launching FMC @ 0x40000130
5,626,860 UART:
5,626,876 UART: Running Caliptra FMC ...
5,627,284 UART:
5,627,338 UART: [state] CFI Enabled
5,637,826 UART: [fht] FMC Alias Private Key: 7
5,746,704 UART: [art] Extend RT PCRs Done
5,747,132 UART: [art] Lock RT PCRs Done
5,748,610 UART: [art] Populate DV Done
5,756,810 UART: [fht] FMC Alias Private Key: 7
5,757,940 UART: [art] Derive CDI
5,758,220 UART: [art] Store in in slot 0x4
5,844,141 UART: [art] Derive Key Pair
5,844,501 UART: [art] Store priv key in slot 0x5
5,857,557 UART: [art] Derive Key Pair - Done
5,872,327 UART: [art] Signing Cert with AUTHO
5,872,807 UART: RITY.KEYID = 7
5,888,249 UART: [art] Erasing AUTHORITY.KEYID = 7
5,889,014 UART: [art] PUB.X = 53D1A53BF186CCD3144907C6E97AD7B0C2C8ED0E4B8A2808BF35E9AD6CB1454D4CFCB4D1FF2AFE27271DD3B89E8E95A4
5,895,799 UART: [art] PUB.Y = 8749DA028360AE838D24858B56F8A247C8BDEFA1F2F9FC1C6AED7B36B64E9AA3ACCD932A2B2EB05747AB23FFC2197501
5,902,761 UART: [art] SIG.R = 35922BEC964F09CF002B5A267E88DF5266EA7DC38FBE2129EF4A36B6E443D13082626549BD2B7CC3BF9D56B399353587
5,909,510 UART: [art] SIG.S = E2AC1E44A9E1935B2AACECFC66D3F58E4361BC4DF3CE621F6D4A4B37F79BE3FD71C8B26C4E1E6599C441A12C02EA28E2
5,932,790 UART: Caliptra RT
5,933,043 UART: [state] CFI Enabled
6,041,696 UART: [rt] RT listening for mailbox commands...
6,042,366 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,165,736 UART: [rt]cmd =0x41544d4e, len=14344
6,726,651 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,943 ready_for_fw is high
1,362,943 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,162,405 >>> mbox cmd response: success
5,223,444 UART:
5,223,460 UART: Running Caliptra FMC ...
5,223,868 UART:
5,223,922 UART: [state] CFI Enabled
5,234,328 UART: [fht] FMC Alias Private Key: 7
5,341,822 UART: [art] Extend RT PCRs Done
5,342,250 UART: [art] Lock RT PCRs Done
5,344,038 UART: [art] Populate DV Done
5,352,050 UART: [fht] FMC Alias Private Key: 7
5,352,986 UART: [art] Derive CDI
5,353,266 UART: [art] Store in in slot 0x4
5,439,029 UART: [art] Derive Key Pair
5,439,389 UART: [art] Store priv key in slot 0x5
5,452,327 UART: [art] Derive Key Pair - Done
5,467,434 UART: [art] Signing Cert with AUTHO
5,467,914 UART: RITY.KEYID = 7
5,482,862 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,627 UART: [art] PUB.X = A1B13E8DB37F46C3EF97DCFF45E256DC0178F0F15AB18ECDB0C87AD8F309EA0B2D5CB3D22ED74B936905DCA1673C890B
5,490,406 UART: [art] PUB.Y = 399B156A984898A442F92A8A32A09A25A2B7134B47AC9EA3ABCC794628D02E86C4431B0146EB2A5E5C8150C3E0459C8D
5,497,355 UART: [art] SIG.R = 352C01BF096455ADD7B46DA68AB422D5720B759C559EB20AEB628BC2FD0E9C66D82825A07FCBBD325735DAB4EA591C47
5,504,124 UART: [art] SIG.S = 8E333E426E78E168FDDA1B0EFB230C40F97AADB34377458ABB782F157FF77CB6C82439495ECA02D09779D18FD7E55A54
5,528,088 UART: Caliptra RT
5,528,341 UART: [state] CFI Enabled
5,636,682 UART: [rt] RT listening for mailbox commands...
5,637,352 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,760,168 UART: [rt]cmd =0x41544d4e, len=14344
6,315,965 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,034 UART: [kat] SHA2-256
881,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,080 UART: [kat] ++
886,232 UART: [kat] sha1
890,368 UART: [kat] SHA2-256
892,306 UART: [kat] SHA2-384
894,941 UART: [kat] SHA2-512-ACC
896,842 UART: [kat] ECC-384
902,695 UART: [kat] HMAC-384Kdf
907,445 UART: [kat] LMS
1,475,641 UART: [kat] --
1,476,476 UART: [cold-reset] ++
1,476,832 UART: [fht] Storing FHT @ 0x50003400
1,479,575 UART: [idev] ++
1,479,743 UART: [idev] CDI.KEYID = 6
1,480,103 UART: [idev] SUBJECT.KEYID = 7
1,480,527 UART: [idev] UDS.KEYID = 0
1,480,872 ready_for_fw is high
1,480,872 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,829 UART: [idev] Erasing UDS.KEYID = 0
1,505,929 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,551 UART: [idev] --
1,515,558 UART: [ldev] ++
1,515,726 UART: [ldev] CDI.KEYID = 6
1,516,089 UART: [ldev] SUBJECT.KEYID = 5
1,516,515 UART: [ldev] AUTHORITY.KEYID = 7
1,516,978 UART: [ldev] FE.KEYID = 1
1,522,030 UART: [ldev] Erasing FE.KEYID = 1
1,547,631 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,755 UART: [ldev] --
1,587,240 UART: [fwproc] Waiting for Commands...
1,588,055 UART: [fwproc] Received command 0x46574c44
1,588,846 UART: [fwproc] Received Image of size 114168 bytes
5,120,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,879 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,178,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,313,870 >>> mbox cmd response: success
5,314,912 UART: [afmc] ++
5,315,080 UART: [afmc] CDI.KEYID = 6
5,315,442 UART: [afmc] SUBJECT.KEYID = 7
5,315,867 UART: [afmc] AUTHORITY.KEYID = 5
5,350,999 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,367,073 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,367,853 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,373,562 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,379,454 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,385,155 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,393,213 UART: [afmc] --
5,394,331 UART: [cold-reset] --
5,395,079 UART: [state] Locking Datavault
5,396,458 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,062 UART: [state] Locking ICCM
5,397,656 UART: [exit] Launching FMC @ 0x40000130
5,402,985 UART:
5,403,001 UART: Running Caliptra FMC ...
5,403,409 UART:
5,403,552 UART: [state] CFI Enabled
5,414,092 UART: [fht] FMC Alias Private Key: 7
5,521,912 UART: [art] Extend RT PCRs Done
5,522,340 UART: [art] Lock RT PCRs Done
5,523,876 UART: [art] Populate DV Done
5,532,266 UART: [fht] FMC Alias Private Key: 7
5,533,410 UART: [art] Derive CDI
5,533,690 UART: [art] Store in in slot 0x4
5,619,379 UART: [art] Derive Key Pair
5,619,739 UART: [art] Store priv key in slot 0x5
5,632,515 UART: [art] Derive Key Pair - Done
5,647,546 UART: [art] Signing Cert with AUTHO
5,648,026 UART: RITY.KEYID = 7
5,663,114 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,879 UART: [art] PUB.X = 7D2C9D85E04E793EA06599F3E9C2B599D3955E7CC2675FBD586BE1728F97F40BCB7F2CBC7F7A64087E5F2D952E38E8BA
5,670,657 UART: [art] PUB.Y = EB4D38326AD09A01D488E51427C9657303C59AD1F568C0A43CD1414A400A0445C066000A3BC3DB83873E70E4E4232946
5,677,564 UART: [art] SIG.R = 1F2C119BF9E9EEA2A6E725A911CBA8943592E614F9F1B297DC8ACA44B5B42E737BF5386961A139442F86C0BD7556A2AA
5,684,344 UART: [art] SIG.S = 988EF901699BB9F6D3A8518FAD38C8613FCB19C58CF3CC3E2907466C40941F65B7AD6DA8B0EDFB1DFA613F6F6C649A78
5,708,503 UART: Caliptra RT
5,708,848 UART: [state] CFI Enabled
5,816,757 UART: [rt] RT listening for mailbox commands...
5,817,427 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,940,443 UART: [rt]cmd =0x41544d4e, len=14344
6,493,239 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,238 ready_for_fw is high
1,363,238 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,239,460 >>> mbox cmd response: success
5,300,507 UART:
5,300,523 UART: Running Caliptra FMC ...
5,300,931 UART:
5,301,074 UART: [state] CFI Enabled
5,311,486 UART: [fht] FMC Alias Private Key: 7
5,419,304 UART: [art] Extend RT PCRs Done
5,419,732 UART: [art] Lock RT PCRs Done
5,421,170 UART: [art] Populate DV Done
5,429,372 UART: [fht] FMC Alias Private Key: 7
5,430,396 UART: [art] Derive CDI
5,430,676 UART: [art] Store in in slot 0x4
5,516,395 UART: [art] Derive Key Pair
5,516,755 UART: [art] Store priv key in slot 0x5
5,529,915 UART: [art] Derive Key Pair - Done
5,544,846 UART: [art] Signing Cert with AUTHO
5,545,326 UART: RITY.KEYID = 7
5,560,732 UART: [art] Erasing AUTHORITY.KEYID = 7
5,561,497 UART: [art] PUB.X = 53F49FAAE1F762D0A8C4DA9912E87A8E1C08CC1F2049B8540F2245F7DF69A508A26A9A133084E4862DFACFABED361F62
5,568,272 UART: [art] PUB.Y = 8E3C69FE0D9AA2D4231066688269C7A96518AB85402B77E8AB3EC1A3E7484ABDE05635BB28BCE1191B2F978D7F2A9B26
5,575,227 UART: [art] SIG.R = F847F4075BE1FAAC489BF44E9110863F2AC13897D5C8D98DD471B72AAA3046A7922BB77A4ACF6AFF6C3EE9FFD5386384
5,582,010 UART: [art] SIG.S = 3DDCC85085ED0CA7F0E0E8BD1D07B43DD5BC892A182709800E7E91A9F3BC47A0DF822047E981ADB9C8266D5989D8DA1E
5,606,111 UART: Caliptra RT
5,606,456 UART: [state] CFI Enabled
5,713,845 UART: [rt] RT listening for mailbox commands...
5,714,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,577 UART: [rt]cmd =0x41544d4e, len=14344
6,403,418 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,756 UART: [state] LifecycleState = Unprovisioned
86,411 UART: [state] DebugLocked = No
87,021 UART: [state] WD Timer not started. Device not locked for debugging
88,214 UART: [kat] SHA2-256
893,864 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,989 UART: [kat] ++
898,141 UART: [kat] sha1
902,523 UART: [kat] SHA2-256
904,463 UART: [kat] SHA2-384
907,180 UART: [kat] SHA2-512-ACC
909,081 UART: [kat] ECC-384
918,840 UART: [kat] HMAC-384Kdf
923,482 UART: [kat] LMS
1,171,810 UART: [kat] --
1,172,499 UART: [cold-reset] ++
1,172,935 UART: [fht] FHT @ 0x50003400
1,175,570 UART: [idev] ++
1,175,738 UART: [idev] CDI.KEYID = 6
1,176,098 UART: [idev] SUBJECT.KEYID = 7
1,176,522 UART: [idev] UDS.KEYID = 0
1,176,867 ready_for_fw is high
1,176,867 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,406 UART: [idev] Erasing UDS.KEYID = 0
1,201,639 UART: [idev] Sha1 KeyId Algorithm
1,210,121 UART: [idev] --
1,211,073 UART: [ldev] ++
1,211,241 UART: [ldev] CDI.KEYID = 6
1,211,604 UART: [ldev] SUBJECT.KEYID = 5
1,212,030 UART: [ldev] AUTHORITY.KEYID = 7
1,212,493 UART: [ldev] FE.KEYID = 1
1,217,777 UART: [ldev] Erasing FE.KEYID = 1
1,243,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,795 UART: [ldev] --
1,283,140 UART: [fwproc] Wait for Commands...
1,283,824 UART: [fwproc] Recv command 0x46574c44
1,284,552 UART: [fwproc] Recv'd Img size: 114168 bytes
3,128,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,062 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,320,861 >>> mbox cmd response: success
3,322,115 UART: [afmc] ++
3,322,283 UART: [afmc] CDI.KEYID = 6
3,322,645 UART: [afmc] SUBJECT.KEYID = 7
3,323,070 UART: [afmc] AUTHORITY.KEYID = 5
3,358,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,033 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,742 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,634 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,345 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,282 UART: [afmc] --
3,402,168 UART: [cold-reset] --
3,403,060 UART: [state] Locking Datavault
3,404,249 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,853 UART: [state] Locking ICCM
3,405,463 UART: [exit] Launching FMC @ 0x40000130
3,410,792 UART:
3,410,808 UART: Running Caliptra FMC ...
3,411,216 UART:
3,411,270 UART: [state] CFI Enabled
3,421,950 UART: [fht] FMC Alias Private Key: 7
3,529,470 UART: [art] Extend RT PCRs Done
3,529,898 UART: [art] Lock RT PCRs Done
3,531,532 UART: [art] Populate DV Done
3,539,776 UART: [fht] FMC Alias Private Key: 7
3,540,794 UART: [art] Derive CDI
3,541,074 UART: [art] Store in in slot 0x4
3,626,757 UART: [art] Derive Key Pair
3,627,117 UART: [art] Store priv key in slot 0x5
3,640,495 UART: [art] Derive Key Pair - Done
3,655,162 UART: [art] Signing Cert with AUTHO
3,655,642 UART: RITY.KEYID = 7
3,671,124 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,889 UART: [art] PUB.X = 8648DD3BC973048E6C1DFE6F0D4BF394B7150C28F7DF3FC41EEDDB75D8974AD34C4E5826F652E3FACC505E3FD720E083
3,678,668 UART: [art] PUB.Y = EFCF08AAEBAD604A774F90F511E69EC6A99F65011563217F643914ED33CAB1C9852BF0BB6F182077EDE26803023DC414
3,685,614 UART: [art] SIG.R = 8CF00331B58AEF077A40D8B08E1F22C2E60AF2FAF92E48A1FF628243C95F3E0A8E02C54D394B34287355216C86AA86CF
3,692,377 UART: [art] SIG.S = 349E26BD1705162F32482207D0D5FBF5FEB6AA8C3DB7FA0794ADEBA7FE9C76B05CC52362A078FFEE976396E1E295EF3E
3,716,177 UART: Caliptra RT
3,716,430 UART: [state] CFI Enabled
3,823,718 UART: [rt] RT listening for mailbox commands...
3,824,388 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,198 UART: [rt]cmd =0x41544d4e, len=14344
4,507,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,091 ready_for_fw is high
1,060,091 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,172,040 >>> mbox cmd response: success
3,234,321 UART:
3,234,337 UART: Running Caliptra FMC ...
3,234,745 UART:
3,234,799 UART: [state] CFI Enabled
3,245,213 UART: [fht] FMC Alias Private Key: 7
3,353,193 UART: [art] Extend RT PCRs Done
3,353,621 UART: [art] Lock RT PCRs Done
3,355,175 UART: [art] Populate DV Done
3,363,265 UART: [fht] FMC Alias Private Key: 7
3,364,279 UART: [art] Derive CDI
3,364,559 UART: [art] Store in in slot 0x4
3,450,486 UART: [art] Derive Key Pair
3,450,846 UART: [art] Store priv key in slot 0x5
3,464,080 UART: [art] Derive Key Pair - Done
3,479,046 UART: [art] Signing Cert with AUTHO
3,479,526 UART: RITY.KEYID = 7
3,494,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,999 UART: [art] PUB.X = A7734994E46FCA2AA6B6855A2FF702FEFC63CEE5222CDB92A430065D4F059998496292416D90211DC3EF2F755C1EFF82
3,501,766 UART: [art] PUB.Y = 5919A2766DEFB465121445FF4F73871ED3C57051730F58E7C58BF3A71AEBFDBB9E6E5662B7BD2E6003A08AF9685364EB
3,508,718 UART: [art] SIG.R = 2B9708EB6B93D45C7F42948C6391A976C9F06DFFE141DC5AB5FE1426B3587E8AC5467954CF66FA607D6FCB1294B51B6C
3,515,495 UART: [art] SIG.S = 8957C696648D23D918962B66495C1DF93D6678943793EC70CD385F90BB3C9544BFB6D1345BF2789DC294DDA0B92C9F2C
3,539,238 UART: Caliptra RT
3,539,491 UART: [state] CFI Enabled
3,646,941 UART: [rt] RT listening for mailbox commands...
3,647,611 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,851 UART: [rt]cmd =0x41544d4e, len=14344
4,333,701 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,877 UART: [state] LifecycleState = Unprovisioned
85,532 UART: [state] DebugLocked = No
86,098 UART: [state] WD Timer not started. Device not locked for debugging
87,351 UART: [kat] SHA2-256
893,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,126 UART: [kat] ++
897,278 UART: [kat] sha1
901,626 UART: [kat] SHA2-256
903,566 UART: [kat] SHA2-384
906,205 UART: [kat] SHA2-512-ACC
908,106 UART: [kat] ECC-384
918,055 UART: [kat] HMAC-384Kdf
922,749 UART: [kat] LMS
1,171,077 UART: [kat] --
1,171,784 UART: [cold-reset] ++
1,172,166 UART: [fht] FHT @ 0x50003400
1,174,639 UART: [idev] ++
1,174,807 UART: [idev] CDI.KEYID = 6
1,175,167 UART: [idev] SUBJECT.KEYID = 7
1,175,591 UART: [idev] UDS.KEYID = 0
1,175,936 ready_for_fw is high
1,175,936 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,593 UART: [idev] Erasing UDS.KEYID = 0
1,200,888 UART: [idev] Sha1 KeyId Algorithm
1,209,318 UART: [idev] --
1,210,572 UART: [ldev] ++
1,210,740 UART: [ldev] CDI.KEYID = 6
1,211,103 UART: [ldev] SUBJECT.KEYID = 5
1,211,529 UART: [ldev] AUTHORITY.KEYID = 7
1,211,992 UART: [ldev] FE.KEYID = 1
1,217,026 UART: [ldev] Erasing FE.KEYID = 1
1,243,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,326 UART: [ldev] --
1,282,743 UART: [fwproc] Wait for Commands...
1,283,379 UART: [fwproc] Recv command 0x46574c44
1,284,107 UART: [fwproc] Recv'd Img size: 114168 bytes
3,119,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,405 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,312,314 >>> mbox cmd response: success
3,313,458 UART: [afmc] ++
3,313,626 UART: [afmc] CDI.KEYID = 6
3,313,988 UART: [afmc] SUBJECT.KEYID = 7
3,314,413 UART: [afmc] AUTHORITY.KEYID = 5
3,350,189 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,558 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,267 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,159 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,870 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,595 UART: [afmc] --
3,393,685 UART: [cold-reset] --
3,394,623 UART: [state] Locking Datavault
3,395,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,436 UART: [state] Locking ICCM
3,396,888 UART: [exit] Launching FMC @ 0x40000130
3,402,217 UART:
3,402,233 UART: Running Caliptra FMC ...
3,402,641 UART:
3,402,784 UART: [state] CFI Enabled
3,413,332 UART: [fht] FMC Alias Private Key: 7
3,521,482 UART: [art] Extend RT PCRs Done
3,521,910 UART: [art] Lock RT PCRs Done
3,523,540 UART: [art] Populate DV Done
3,531,502 UART: [fht] FMC Alias Private Key: 7
3,532,534 UART: [art] Derive CDI
3,532,814 UART: [art] Store in in slot 0x4
3,618,447 UART: [art] Derive Key Pair
3,618,807 UART: [art] Store priv key in slot 0x5
3,632,557 UART: [art] Derive Key Pair - Done
3,647,382 UART: [art] Signing Cert with AUTHO
3,647,862 UART: RITY.KEYID = 7
3,663,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,131 UART: [art] PUB.X = 78DCFFAFB6E8649389DAF4394D253961E20E6C66C3CA85B64B9B258F8005CCB35FB10AEC10F9ED19B2CE00B09F81B669
3,670,886 UART: [art] PUB.Y = FEEABF0BB69F3C438DD7B1BF85993E1F9379E526918E4ADC43145BCCB091A5D2CC406DC4D718AFDBA46205B04AEB9D74
3,677,854 UART: [art] SIG.R = E75BA0966B1A754D75CA2A3B0A74BAEB41981548A769ED519D643980A973B5B56A7D89697ABE63FCAF51D75240B7185B
3,684,627 UART: [art] SIG.S = 480D63348D9FD2731766F8DA9E926C54F2A78AD0126E6C22E312F88A0F4BD92BE02121F3E5C8F93D70A4D4D7D1827E8E
3,708,352 UART: Caliptra RT
3,708,697 UART: [state] CFI Enabled
3,816,619 UART: [rt] RT listening for mailbox commands...
3,817,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,341 UART: [rt]cmd =0x41544d4e, len=14344
4,493,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,582 ready_for_fw is high
1,059,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,168,098 >>> mbox cmd response: success
3,230,391 UART:
3,230,407 UART: Running Caliptra FMC ...
3,230,815 UART:
3,230,958 UART: [state] CFI Enabled
3,241,354 UART: [fht] FMC Alias Private Key: 7
3,349,202 UART: [art] Extend RT PCRs Done
3,349,630 UART: [art] Lock RT PCRs Done
3,351,390 UART: [art] Populate DV Done
3,359,716 UART: [fht] FMC Alias Private Key: 7
3,360,792 UART: [art] Derive CDI
3,361,072 UART: [art] Store in in slot 0x4
3,446,545 UART: [art] Derive Key Pair
3,446,905 UART: [art] Store priv key in slot 0x5
3,460,597 UART: [art] Derive Key Pair - Done
3,475,177 UART: [art] Signing Cert with AUTHO
3,475,657 UART: RITY.KEYID = 7
3,490,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,102 UART: [art] PUB.X = 5928A7E8DBAE60C4D870BB5623076F2C96A5C2372FCA5B1997B912AE384FA41F006AE8C7B116C37F254A4B6AE3351DF4
3,497,857 UART: [art] PUB.Y = 56A8C9D3C98F4B56B396714E8E5FE976D5EDA22408F2C06CF3098B03961DFC4E4790031CB21A8459390CE6FD3279BDDF
3,504,800 UART: [art] SIG.R = CBD6053F2DA49C9A8B0F320A8F094B90D54288DC4BA55186A62810CDA8E00DAE75DC367BA32EDF42CC074A84520B4624
3,511,561 UART: [art] SIG.S = 7D87329E4D082BE7DF02EF3AF0322BA1AA9CECB58606D8461D32F28E71C86B5D5727676E18B0165EF887B45AD6CAF950
3,535,563 UART: Caliptra RT
3,535,908 UART: [state] CFI Enabled
3,644,340 UART: [rt] RT listening for mailbox commands...
3,645,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,136 UART: [rt]cmd =0x41544d4e, len=14344
4,328,861 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,231 UART: [kat] ++
895,383 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,479 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 ready_for_fw is high
1,174,511 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,743 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,398 UART: [ldev] Erasing FE.KEYID = 1
1,241,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,490 UART: [fwproc] Wait for Commands...
1,281,119 UART: [fwproc] Recv command 0x46574c44
1,281,852 UART: [fwproc] Recv'd Img size: 114168 bytes
3,113,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,756 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,065 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,306,657 >>> mbox cmd response: success
3,307,860 UART: [afmc] ++
3,308,028 UART: [afmc] CDI.KEYID = 6
3,308,391 UART: [afmc] SUBJECT.KEYID = 7
3,308,817 UART: [afmc] AUTHORITY.KEYID = 5
3,344,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,258 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,968 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,858 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,569 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,441 UART: [afmc] --
3,387,525 UART: [cold-reset] --
3,388,401 UART: [state] Locking Datavault
3,389,558 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,162 UART: [state] Locking ICCM
3,390,812 UART: [exit] Launching FMC @ 0x40000130
3,396,141 UART:
3,396,157 UART: Running Caliptra FMC ...
3,396,565 UART:
3,396,619 UART: [state] CFI Enabled
3,407,203 UART: [fht] FMC Alias Private Key: 7
3,515,557 UART: [art] Extend RT PCRs Done
3,515,985 UART: [art] Lock RT PCRs Done
3,517,429 UART: [art] Populate DV Done
3,525,617 UART: [fht] FMC Alias Private Key: 7
3,526,775 UART: [art] Derive CDI
3,527,055 UART: [art] Store in in slot 0x4
3,612,290 UART: [art] Derive Key Pair
3,612,650 UART: [art] Store priv key in slot 0x5
3,625,656 UART: [art] Derive Key Pair - Done
3,639,977 UART: [art] Signing Cert with AUTHO
3,640,457 UART: RITY.KEYID = 7
3,656,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,900 UART: [art] PUB.X = A49AEDE35FC4BC59394F62937E6295F6F75BF159EFF72019F52A2C8300DD4FDF98DD1DEB15D9D2161E3345B5E6D71D39
3,663,662 UART: [art] PUB.Y = 596BBE82B8DB94F49443F82FD88C4E4DD801D599BF6CBF7B3B895E6B44FFC24A0BDFBB05A5A18C140612802F31E26754
3,670,614 UART: [art] SIG.R = BBEF76B6A34B318681714C4E7B33AF688F54D7B94B63764B81622502164F049EC2A3D5292A39898C570AC8BE2FA4E799
3,677,375 UART: [art] SIG.S = 2831DBBA6456897BE7EFA13BA11A25D095ED1056F10AADF142548B0851D36C747C533DBEA16BD3AF8826E8288F7970E9
3,701,202 UART: Caliptra RT
3,701,455 UART: [state] CFI Enabled
3,809,357 UART: [rt] RT listening for mailbox commands...
3,810,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,049 UART: [rt]cmd =0x41544d4e, len=14344
4,493,736 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,218 ready_for_fw is high
1,056,218 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,608 >>> mbox cmd response: success
3,226,541 UART:
3,226,557 UART: Running Caliptra FMC ...
3,226,965 UART:
3,227,019 UART: [state] CFI Enabled
3,237,563 UART: [fht] FMC Alias Private Key: 7
3,345,397 UART: [art] Extend RT PCRs Done
3,345,825 UART: [art] Lock RT PCRs Done
3,347,245 UART: [art] Populate DV Done
3,355,555 UART: [fht] FMC Alias Private Key: 7
3,356,723 UART: [art] Derive CDI
3,357,003 UART: [art] Store in in slot 0x4
3,442,478 UART: [art] Derive Key Pair
3,442,838 UART: [art] Store priv key in slot 0x5
3,455,930 UART: [art] Derive Key Pair - Done
3,470,715 UART: [art] Signing Cert with AUTHO
3,471,195 UART: RITY.KEYID = 7
3,486,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,856 UART: [art] PUB.X = E14F37D4AAA5B91AE9E1719B56B40AE05B212215D8F31809F9D505ABAF804E21EE35D3517A55202558947293479EB08D
3,493,617 UART: [art] PUB.Y = 28E5D2F6A814C04B473A05BA6135EAC7C233AE602D8B05993EB15B87170D73BEFCA220CFAEEAA96B90671915CF6808C9
3,500,567 UART: [art] SIG.R = 5443F2E4FFCB467A37FDC8F99E411B57EC7082B03180AE9881D2F958FDF87DB87E3A5D0DCC536E9612CE365BD52AD14C
3,507,350 UART: [art] SIG.S = E16AEA2D3E7DE860032996D8716CE854B8553182E93545702307A7909C62EB7AD09D02FED608BD0A1046DF1C26E88799
3,531,318 UART: Caliptra RT
3,531,571 UART: [state] CFI Enabled
3,639,303 UART: [rt] RT listening for mailbox commands...
3,639,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,987 UART: [rt]cmd =0x41544d4e, len=14344
4,323,920 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,687 UART: [kat] SHA2-512-ACC
906,588 UART: [kat] ECC-384
916,357 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,004 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,174,466 ready_for_fw is high
1,174,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,198,816 UART: [idev] Sha1 KeyId Algorithm
1,207,654 UART: [idev] --
1,208,689 UART: [ldev] ++
1,208,857 UART: [ldev] CDI.KEYID = 6
1,209,221 UART: [ldev] SUBJECT.KEYID = 5
1,209,648 UART: [ldev] AUTHORITY.KEYID = 7
1,210,111 UART: [ldev] FE.KEYID = 1
1,215,357 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,273 UART: [ldev] --
1,281,539 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,093 UART: [fwproc] Recv'd Img size: 114168 bytes
3,116,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,706 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,309,346 >>> mbox cmd response: success
3,310,529 UART: [afmc] ++
3,310,697 UART: [afmc] CDI.KEYID = 6
3,311,060 UART: [afmc] SUBJECT.KEYID = 7
3,311,486 UART: [afmc] AUTHORITY.KEYID = 5
3,347,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,045 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,755 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,645 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,356 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,002 UART: [afmc] --
3,390,882 UART: [cold-reset] --
3,391,694 UART: [state] Locking Datavault
3,393,017 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,621 UART: [state] Locking ICCM
3,394,107 UART: [exit] Launching FMC @ 0x40000130
3,399,436 UART:
3,399,452 UART: Running Caliptra FMC ...
3,399,860 UART:
3,400,003 UART: [state] CFI Enabled
3,410,487 UART: [fht] FMC Alias Private Key: 7
3,518,317 UART: [art] Extend RT PCRs Done
3,518,745 UART: [art] Lock RT PCRs Done
3,520,583 UART: [art] Populate DV Done
3,528,835 UART: [fht] FMC Alias Private Key: 7
3,529,889 UART: [art] Derive CDI
3,530,169 UART: [art] Store in in slot 0x4
3,615,708 UART: [art] Derive Key Pair
3,616,068 UART: [art] Store priv key in slot 0x5
3,629,858 UART: [art] Derive Key Pair - Done
3,644,873 UART: [art] Signing Cert with AUTHO
3,645,353 UART: RITY.KEYID = 7
3,660,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,948 UART: [art] PUB.X = E124F4ABD3A35F9DF289BB7CCE48F93D9D72117A80145F71C230493B9FCCC29420FEC6A157F0C3C7B285E338FAF0E4FA
3,667,736 UART: [art] PUB.Y = 62667092459DF77D8E6E24047727408C948F4FC2CD1D1F890B3B9FFCD630ABE0FAD3BFEFA4AA8399A08AF6D6A243CA34
3,674,696 UART: [art] SIG.R = B9BBAA98E48529812AE99E43E100595E14161F0E8307183A0C112E63E385DE9AC27348A474829779B8C9079733EFE6F6
3,681,426 UART: [art] SIG.S = 23E8B7B91C971C983283888945D037DF9E6F873B9152FE0DA40DB1F78C8ED0E88BF5072DF147A746DCD34462C121D7CC
3,705,418 UART: Caliptra RT
3,705,763 UART: [state] CFI Enabled
3,812,903 UART: [rt] RT listening for mailbox commands...
3,813,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,701 UART: [rt]cmd =0x41544d4e, len=14344
4,501,562 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,179 ready_for_fw is high
1,057,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,172,569 >>> mbox cmd response: success
3,235,504 UART:
3,235,520 UART: Running Caliptra FMC ...
3,235,928 UART:
3,236,071 UART: [state] CFI Enabled
3,246,829 UART: [fht] FMC Alias Private Key: 7
3,354,519 UART: [art] Extend RT PCRs Done
3,354,947 UART: [art] Lock RT PCRs Done
3,356,749 UART: [art] Populate DV Done
3,365,053 UART: [fht] FMC Alias Private Key: 7
3,366,043 UART: [art] Derive CDI
3,366,323 UART: [art] Store in in slot 0x4
3,451,552 UART: [art] Derive Key Pair
3,451,912 UART: [art] Store priv key in slot 0x5
3,464,972 UART: [art] Derive Key Pair - Done
3,479,458 UART: [art] Signing Cert with AUTHO
3,479,938 UART: RITY.KEYID = 7
3,495,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,257 UART: [art] PUB.X = FE24FAECCB4A09ADC6A114C53A80320A6288344B2DC60086DA48379AF517CB611423D79593DEA9824106FBCB55CF883D
3,503,006 UART: [art] PUB.Y = 7D45DCDB51517E484275E9AE8480EBF95494929B5C2F61EED989D0D10E7A8C80FFD3196C0C440F44CCFF46080C579D08
3,509,946 UART: [art] SIG.R = C6DBA3B78497819013D658CC2B0592A62A41B417AB8C93982B27893D03ED7530740687815852A98A3594A6EA3F877FA0
3,516,699 UART: [art] SIG.S = CD61E69CB5CFAEF23ADA549D523FA84AB82FAF7350B2ADFA6D64A698D9CAC0DD3812A8A9B0D8E5B0E192428BCC729722
3,540,346 UART: Caliptra RT
3,540,691 UART: [state] CFI Enabled
3,648,344 UART: [rt] RT listening for mailbox commands...
3,649,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,934 UART: [rt]cmd =0x41544d4e, len=14344
4,342,087 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,208 UART:
192,591 UART: Running Caliptra ROM ...
193,784 UART:
193,940 UART: [state] CFI Enabled
258,593 UART: [state] LifecycleState = Unprovisioned
260,513 UART: [state] DebugLocked = No
262,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,897 UART: [kat] SHA2-256
436,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,081 UART: [kat] ++
447,574 UART: [kat] sha1
457,588 UART: [kat] SHA2-256
460,241 UART: [kat] SHA2-384
466,964 UART: [kat] SHA2-512-ACC
469,311 UART: [kat] ECC-384
2,763,688 UART: [kat] HMAC-384Kdf
2,777,695 UART: [kat] LMS
3,967,989 UART: [kat] --
3,971,997 UART: [cold-reset] ++
3,973,280 UART: [fht] Storing FHT @ 0x50003400
3,985,129 UART: [idev] ++
3,985,731 UART: [idev] CDI.KEYID = 6
3,986,612 UART: [idev] SUBJECT.KEYID = 7
3,987,926 UART: [idev] UDS.KEYID = 0
3,988,929 ready_for_fw is high
3,989,136 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,132,220 UART: [idev] Erasing UDS.KEYID = 0
7,323,471 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,534 UART: [idev] --
7,349,067 UART: [ldev] ++
7,349,694 UART: [ldev] CDI.KEYID = 6
7,350,615 UART: [ldev] SUBJECT.KEYID = 5
7,351,818 UART: [ldev] AUTHORITY.KEYID = 7
7,353,114 UART: [ldev] FE.KEYID = 1
7,398,693 UART: [ldev] Erasing FE.KEYID = 1
10,733,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,105 UART: [ldev] --
13,112,268 UART: [fwproc] Waiting for Commands...
13,114,686 UART: [fwproc] Received command 0x46574c44
13,116,914 UART: [fwproc] Received Image of size 113844 bytes
22,309,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,386,809 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,455,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,771,916 >>> mbox cmd response: success
22,776,622 UART: [afmc] ++
22,777,232 UART: [afmc] CDI.KEYID = 6
22,778,115 UART: [afmc] SUBJECT.KEYID = 7
22,779,378 UART: [afmc] AUTHORITY.KEYID = 5
26,141,687 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,447,088 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,449,348 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,463,921 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,478,643 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,492,870 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,513,559 UART: [afmc] --
28,517,359 UART: [cold-reset] --
28,522,895 UART: [state] Locking Datavault
28,527,703 UART: [state] Locking PCR0, PCR1 and PCR31
28,529,394 UART: [state] Locking ICCM
28,530,946 UART: [exit] Launching FMC @ 0x40000130
28,539,333 UART:
28,539,586 UART: Running Caliptra FMC ...
28,540,682 UART:
28,540,835 UART: [state] CFI Enabled
28,604,997 UART: [fht] FMC Alias Private Key: 7
30,942,643 UART: [art] Extend RT PCRs Done
30,943,874 UART: [art] Lock RT PCRs Done
30,945,373 UART: [art] Populate DV Done
30,950,936 UART: [fht] FMC Alias Private Key: 7
30,952,587 UART: [art] Derive CDI
30,953,321 UART: [art] Store in in slot 0x4
31,012,190 UART: [art] Derive Key Pair
31,013,184 UART: [art] Store priv key in slot 0x5
34,305,676 UART: [art] Derive Key Pair - Done
34,318,723 UART: [art] Signing Cert with AUTHO
34,320,018 UART: RITY.KEYID = 7
36,606,541 UART: [art] Erasing AUTHORITY.KEYID = 7
36,608,069 UART: [art] PUB.X = CBC2E8B407C4D4E5D723037D6B37DAE74D2940CF1BC0E5F4BA173AAEBC64CB4BDA07C7F193224CADA7EECDA1D015F8C3
36,615,340 UART: [art] PUB.Y = 61EB266D051B088653783B1E49215FC04E4E8E32499BEFD6349F0D450E05C418A89DF919D42C943E00B49A4F7D07E7B3
36,622,593 UART: [art] SIG.R = 902596D0E67C25AEE8BB5CBFA5C23D7A3994B3B07660FC46E70F1256A12959371A0AB8A2F8B894B48C96AC05075BCEF5
36,629,987 UART: [art] SIG.S = 329C27C668078D1D7D6D17244AD0DC42F8DF24DBB75278E18B996346782A523750BC995E8AF39F2C43B0EC8B5A87FFFA
37,934,629 UART: Caliptra RT
37,935,336 UART: [state] CFI Enabled
38,096,369 UART: [rt] RT listening for mailbox commands...
38,098,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,253,861 UART: [rt]cmd =0x41544d4e, len=14344
42,386,101 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,784,650 ready_for_fw is high
3,785,052 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,796,941 >>> mbox cmd response: success
27,495,932 UART:
27,496,314 UART: Running Caliptra FMC ...
27,497,417 UART:
27,497,566 UART: [state] CFI Enabled
27,562,297 UART: [fht] FMC Alias Private Key: 7
29,900,723 UART: [art] Extend RT PCRs Done
29,901,966 UART: [art] Lock RT PCRs Done
29,903,825 UART: [art] Populate DV Done
29,909,455 UART: [fht] FMC Alias Private Key: 7
29,911,044 UART: [art] Derive CDI
29,911,778 UART: [art] Store in in slot 0x4
29,971,026 UART: [art] Derive Key Pair
29,972,021 UART: [art] Store priv key in slot 0x5
33,264,991 UART: [art] Derive Key Pair - Done
33,277,951 UART: [art] Signing Cert with AUTHO
33,279,258 UART: RITY.KEYID = 7
35,566,400 UART: [art] Erasing AUTHORITY.KEYID = 7
35,567,903 UART: [art] PUB.X = 537C3B0EA526D7B67879A1888E2035B7CA8F1609204C07A39273BBB53C7EC758851DC02AD2D16BC80942880C8433CBEE
35,575,105 UART: [art] PUB.Y = 6EC1438CFAE60400EFCC120DAFCB95EC8E31AB8A227DA0FD9F84B1A7F70ADCC3AFDF05C590BA658977E8F29D08363F3C
35,582,425 UART: [art] SIG.R = 95048B458DABADDD8118736ABE9B8E813C66E33BB0EBEF8405B24261119A290B0DAF3B0198890B9D6B98316CB923FD79
35,589,794 UART: [art] SIG.S = 281E5DB40B453AF7D3ACE1D133343521F788C6406F4BD5345C22655FA69C2ED59F4AEA7677A71ED0838FDB6E84393559
36,894,563 UART: Caliptra RT
36,895,262 UART: [state] CFI Enabled
37,056,803 UART: [rt] RT listening for mailbox commands...
37,059,089 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,214,396 UART: [rt]cmd =0x41544d4e, len=14344
41,242,932 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
192,467 UART:
192,818 UART: Running Caliptra ROM ...
194,020 UART:
603,783 UART: [state] CFI Enabled
617,384 UART: [state] LifecycleState = Unprovisioned
619,278 UART: [state] DebugLocked = No
621,800 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,161 UART: [kat] SHA2-256
796,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,441 UART: [kat] ++
807,895 UART: [kat] sha1
819,835 UART: [kat] SHA2-256
822,562 UART: [kat] SHA2-384
829,543 UART: [kat] SHA2-512-ACC
831,910 UART: [kat] ECC-384
3,115,675 UART: [kat] HMAC-384Kdf
3,128,332 UART: [kat] LMS
4,318,481 UART: [kat] --
4,324,353 UART: [cold-reset] ++
4,325,801 UART: [fht] Storing FHT @ 0x50003400
4,336,656 UART: [idev] ++
4,337,220 UART: [idev] CDI.KEYID = 6
4,338,255 UART: [idev] SUBJECT.KEYID = 7
4,339,430 UART: [idev] UDS.KEYID = 0
4,340,495 ready_for_fw is high
4,340,701 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,677 UART: [idev] Erasing UDS.KEYID = 0
7,626,913 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,964 UART: [idev] --
7,652,366 UART: [ldev] ++
7,652,938 UART: [ldev] CDI.KEYID = 6
7,653,957 UART: [ldev] SUBJECT.KEYID = 5
7,655,070 UART: [ldev] AUTHORITY.KEYID = 7
7,656,357 UART: [ldev] FE.KEYID = 1
7,667,183 UART: [ldev] Erasing FE.KEYID = 1
10,955,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,094 UART: [ldev] --
13,316,924 UART: [fwproc] Waiting for Commands...
13,319,566 UART: [fwproc] Received command 0x46574c44
13,321,803 UART: [fwproc] Received Image of size 113844 bytes
22,113,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,193,816 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,262,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,579,462 >>> mbox cmd response: success
22,583,507 UART: [afmc] ++
22,584,097 UART: [afmc] CDI.KEYID = 6
22,585,034 UART: [afmc] SUBJECT.KEYID = 7
22,586,255 UART: [afmc] AUTHORITY.KEYID = 5
25,901,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,195,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,197,872 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,212,406 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,227,151 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,241,397 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,262,138 UART: [afmc] --
28,266,217 UART: [cold-reset] --
28,270,018 UART: [state] Locking Datavault
28,273,547 UART: [state] Locking PCR0, PCR1 and PCR31
28,275,300 UART: [state] Locking ICCM
28,277,809 UART: [exit] Launching FMC @ 0x40000130
28,286,198 UART:
28,286,431 UART: Running Caliptra FMC ...
28,287,473 UART:
28,287,627 UART: [state] CFI Enabled
28,295,943 UART: [fht] FMC Alias Private Key: 7
30,626,460 UART: [art] Extend RT PCRs Done
30,627,677 UART: [art] Lock RT PCRs Done
30,629,221 UART: [art] Populate DV Done
30,634,800 UART: [fht] FMC Alias Private Key: 7
30,636,479 UART: [art] Derive CDI
30,637,224 UART: [art] Store in in slot 0x4
30,680,255 UART: [art] Derive Key Pair
30,681,252 UART: [art] Store priv key in slot 0x5
33,923,911 UART: [art] Derive Key Pair - Done
33,937,179 UART: [art] Signing Cert with AUTHO
33,938,489 UART: RITY.KEYID = 7
36,218,020 UART: [art] Erasing AUTHORITY.KEYID = 7
36,219,528 UART: [art] PUB.X = D57520E35DDB5AFC6D4ABB568784236E7BFDBF7D49F1B599CAF18421D18D24306E8D6BD3BA0E7160DEC4389438C2511D
36,226,810 UART: [art] PUB.Y = 6C9EF024717026642582ABC3E346C7B4C53B99D2139269AF96B73E8A31B61D603EECDE44C4969B3533411CD0DF238FCA
36,234,032 UART: [art] SIG.R = 83F88222D260A75117435BDC363A17B31ACCA7A9191E79DBF9D9F872D0DF9B588129B864C006FCD6EEFE61BD5C273617
36,241,410 UART: [art] SIG.S = 11D12A3E46532291BD651F10F3F5D3E14671C5635AC4F963F8D0029E96DA599198B461B613553F9A8FCBEE85642F1548
37,546,345 UART: Caliptra RT
37,547,051 UART: [state] CFI Enabled
37,665,577 UART: [rt] RT listening for mailbox commands...
37,667,848 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,823,544 UART: [rt]cmd =0x41544d4e, len=14344
42,033,489 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
4,129,245 ready_for_fw is high
4,129,632 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,312,290 >>> mbox cmd response: success
27,951,981 UART:
27,952,393 UART: Running Caliptra FMC ...
27,953,512 UART:
27,953,668 UART: [state] CFI Enabled
27,961,775 UART: [fht] FMC Alias Private Key: 7
30,292,233 UART: [art] Extend RT PCRs Done
30,293,460 UART: [art] Lock RT PCRs Done
30,295,226 UART: [art] Populate DV Done
30,300,829 UART: [fht] FMC Alias Private Key: 7
30,302,327 UART: [art] Derive CDI
30,303,094 UART: [art] Store in in slot 0x4
30,345,818 UART: [art] Derive Key Pair
30,346,862 UART: [art] Store priv key in slot 0x5
33,588,754 UART: [art] Derive Key Pair - Done
33,601,588 UART: [art] Signing Cert with AUTHO
33,602,901 UART: RITY.KEYID = 7
35,882,041 UART: [art] Erasing AUTHORITY.KEYID = 7
35,883,556 UART: [art] PUB.X = 37FDC83D2436D0FE78CF8264F2A9022182030B212FDC5DEBC6871C5FA280C65EAB675A9DED128A1DB4573B879F776823
35,890,764 UART: [art] PUB.Y = AF31D6DEF305A68841A12CEE2281E8035F58EF2782CAC206734EA34F6962D38605D94D1CE0382C7A933C78E2F7FED8EA
35,898,026 UART: [art] SIG.R = BF5866E405CF2156BE550C5FBF46B001688B90EF36F36652EB8CA56CDBDE01829B55162E8EA3A30C03855D6599F0F839
35,905,381 UART: [art] SIG.S = 176F791096B28FED6C5A1809CDBBB09E297CD2B994E91C663C00B2B2DF2A712B3404356C80EC311A1E02982E23232769
37,210,802 UART: Caliptra RT
37,211,515 UART: [state] CFI Enabled
37,328,037 UART: [rt] RT listening for mailbox commands...
37,330,335 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,485,765 UART: [rt]cmd =0x41544d4e, len=14344
41,515,130 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,026 UART:
192,392 UART: Running Caliptra ROM ...
193,508 UART:
193,651 UART: [state] CFI Enabled
262,395 UART: [state] LifecycleState = Unprovisioned
264,313 UART: [state] DebugLocked = No
267,113 UART: [state] WD Timer not started. Device not locked for debugging
270,090 UART: [kat] SHA2-256
449,214 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,819 UART: [kat] ++
461,272 UART: [kat] sha1
472,713 UART: [kat] SHA2-256
475,727 UART: [kat] SHA2-384
483,139 UART: [kat] SHA2-512-ACC
486,072 UART: [kat] ECC-384
2,947,847 UART: [kat] HMAC-384Kdf
2,970,110 UART: [kat] LMS
3,499,531 UART: [kat] --
3,504,673 UART: [cold-reset] ++
3,506,182 UART: [fht] FHT @ 0x50003400
3,517,253 UART: [idev] ++
3,517,823 UART: [idev] CDI.KEYID = 6
3,518,706 UART: [idev] SUBJECT.KEYID = 7
3,519,950 UART: [idev] UDS.KEYID = 0
3,520,894 ready_for_fw is high
3,521,102 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,703 UART: [idev] Erasing UDS.KEYID = 0
6,024,379 UART: [idev] Sha1 KeyId Algorithm
6,047,189 UART: [idev] --
6,051,481 UART: [ldev] ++
6,052,103 UART: [ldev] CDI.KEYID = 6
6,053,025 UART: [ldev] SUBJECT.KEYID = 5
6,054,199 UART: [ldev] AUTHORITY.KEYID = 7
6,055,435 UART: [ldev] FE.KEYID = 1
6,098,167 UART: [ldev] Erasing FE.KEYID = 1
8,601,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,566 UART: [ldev] --
10,412,288 UART: [fwproc] Wait for Commands...
10,413,795 UART: [fwproc] Recv command 0x46574c44
10,415,891 UART: [fwproc] Recv'd Img size: 114168 bytes
14,972,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,045,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,114,662 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,432,067 >>> mbox cmd response: success
15,436,358 UART: [afmc] ++
15,436,955 UART: [afmc] CDI.KEYID = 6
15,437,868 UART: [afmc] SUBJECT.KEYID = 7
15,439,030 UART: [afmc] AUTHORITY.KEYID = 5
17,974,942 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,700,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,702,491 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,718,480 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,734,418 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,750,228 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,772,474 UART: [afmc] --
19,776,230 UART: [cold-reset] --
19,779,491 UART: [state] Locking Datavault
19,786,737 UART: [state] Locking PCR0, PCR1 and PCR31
19,788,449 UART: [state] Locking ICCM
19,790,581 UART: [exit] Launching FMC @ 0x40000130
19,799,036 UART:
19,799,277 UART: Running Caliptra FMC ...
19,800,377 UART:
19,800,537 UART: [state] CFI Enabled
19,857,625 UART: [fht] FMC Alias Private Key: 7
21,621,535 UART: [art] Extend RT PCRs Done
21,622,763 UART: [art] Lock RT PCRs Done
21,624,338 UART: [art] Populate DV Done
21,629,756 UART: [fht] FMC Alias Private Key: 7
21,631,459 UART: [art] Derive CDI
21,632,275 UART: [art] Store in in slot 0x4
21,689,813 UART: [art] Derive Key Pair
21,690,853 UART: [art] Store priv key in slot 0x5
24,153,773 UART: [art] Derive Key Pair - Done
24,166,721 UART: [art] Signing Cert with AUTHO
24,168,025 UART: RITY.KEYID = 7
25,878,860 UART: [art] Erasing AUTHORITY.KEYID = 7
25,880,370 UART: [art] PUB.X = A4264E00029EDBB803F64430B93B95B7252FC59E50437222F4530AAF75F229430283179DD64F19A838DE19AE36EB8C92
25,887,631 UART: [art] PUB.Y = 4AD71FAC8143DD61DFB1569F70B2B956D4D3CAA3810A23E8662FEEB96C9998A9D63030820202E6A478DF17EB6CCAB4AD
25,894,918 UART: [art] SIG.R = 297D549F4081F44445F80C9048FF327866E81BA9B5158E1A732FE038C0069A95687986EC5CFFD7A1794AA2F29FEA41B0
25,902,303 UART: [art] SIG.S = 05E5F194C80E9FD0D0ED8FF98E1645F5F8156D9F1B19C64B92B3364851C418FB725200DDA5CEF5C078B93773DB593A5E
26,881,719 UART: Caliptra RT
26,882,411 UART: [state] CFI Enabled
27,046,049 UART: [rt] RT listening for mailbox commands...
27,048,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,203,632 UART: [rt]cmd =0x41544d4e, len=14344
29,560,523 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,365,513 ready_for_fw is high
3,366,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,004,577 >>> mbox cmd response: success
19,283,771 UART:
19,284,180 UART: Running Caliptra FMC ...
19,285,315 UART:
19,285,467 UART: [state] CFI Enabled
19,351,092 UART: [fht] FMC Alias Private Key: 7
21,114,820 UART: [art] Extend RT PCRs Done
21,116,054 UART: [art] Lock RT PCRs Done
21,117,822 UART: [art] Populate DV Done
21,123,056 UART: [fht] FMC Alias Private Key: 7
21,124,555 UART: [art] Derive CDI
21,125,293 UART: [art] Store in in slot 0x4
21,182,869 UART: [art] Derive Key Pair
21,183,908 UART: [art] Store priv key in slot 0x5
23,646,732 UART: [art] Derive Key Pair - Done
23,659,576 UART: [art] Signing Cert with AUTHO
23,660,885 UART: RITY.KEYID = 7
25,372,122 UART: [art] Erasing AUTHORITY.KEYID = 7
25,373,603 UART: [art] PUB.X = 6A4D2BD543E3D52BA758BB1B816989CBC78DAA0946296250F3DF1BA9200567A37297640DB91B8F8C6DAEE861CC13D803
25,380,916 UART: [art] PUB.Y = 5EB2CECE69F832FB3FCF31A4A8469E1910B77C6B6A1BA38DD2207BC48824451311BC04A2BE2DE58379B4733D1501CA20
25,388,166 UART: [art] SIG.R = FAF8A4AA08FCA79920E9A05F6D87D54083985D88D84DC65C7AB47B0953C061A793B86681DA8EA2A6D857411A697EF6FB
25,395,571 UART: [art] SIG.S = 32F6F441A54A1AAA6F330035A2D1948A0C88F8DB341669FFB9DFA4C709E845868389B00C19C077DBC804CFD01987F6B9
26,374,584 UART: Caliptra RT
26,375,301 UART: [state] CFI Enabled
26,539,652 UART: [rt] RT listening for mailbox commands...
26,542,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,697,237 UART: [rt]cmd =0x41544d4e, len=14344
29,062,234 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,777 writing to cptra_bootfsm_go
192,861 UART:
193,227 UART: Running Caliptra ROM ...
194,424 UART:
604,156 UART: [state] CFI Enabled
616,332 UART: [state] LifecycleState = Unprovisioned
618,216 UART: [state] DebugLocked = No
620,508 UART: [state] WD Timer not started. Device not locked for debugging
624,183 UART: [kat] SHA2-256
803,258 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,825 UART: [kat] ++
815,271 UART: [kat] sha1
825,716 UART: [kat] SHA2-256
828,721 UART: [kat] SHA2-384
834,713 UART: [kat] SHA2-512-ACC
837,638 UART: [kat] ECC-384
3,278,204 UART: [kat] HMAC-384Kdf
3,290,588 UART: [kat] LMS
3,820,107 UART: [kat] --
3,826,385 UART: [cold-reset] ++
3,828,102 UART: [fht] FHT @ 0x50003400
3,840,642 UART: [idev] ++
3,841,213 UART: [idev] CDI.KEYID = 6
3,842,095 UART: [idev] SUBJECT.KEYID = 7
3,843,340 UART: [idev] UDS.KEYID = 0
3,844,241 ready_for_fw is high
3,844,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,825 UART: [idev] Erasing UDS.KEYID = 0
6,312,823 UART: [idev] Sha1 KeyId Algorithm
6,335,677 UART: [idev] --
6,340,481 UART: [ldev] ++
6,341,076 UART: [ldev] CDI.KEYID = 6
6,341,993 UART: [ldev] SUBJECT.KEYID = 5
6,343,152 UART: [ldev] AUTHORITY.KEYID = 7
6,344,387 UART: [ldev] FE.KEYID = 1
6,355,465 UART: [ldev] Erasing FE.KEYID = 1
8,829,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,776 UART: [ldev] --
10,616,538 UART: [fwproc] Wait for Commands...
10,619,227 UART: [fwproc] Recv command 0x46574c44
10,621,320 UART: [fwproc] Recv'd Img size: 114168 bytes
15,189,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,269,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,338,586 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,655,123 >>> mbox cmd response: success
15,659,641 UART: [afmc] ++
15,660,231 UART: [afmc] CDI.KEYID = 6
15,661,117 UART: [afmc] SUBJECT.KEYID = 7
15,662,330 UART: [afmc] AUTHORITY.KEYID = 5
18,164,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,883,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,884,971 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,900,894 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,916,870 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,932,626 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,955,606 UART: [afmc] --
19,959,085 UART: [cold-reset] --
19,962,793 UART: [state] Locking Datavault
19,969,606 UART: [state] Locking PCR0, PCR1 and PCR31
19,971,328 UART: [state] Locking ICCM
19,972,784 UART: [exit] Launching FMC @ 0x40000130
19,981,237 UART:
19,981,475 UART: Running Caliptra FMC ...
19,982,578 UART:
19,982,741 UART: [state] CFI Enabled
19,990,899 UART: [fht] FMC Alias Private Key: 7
21,747,517 UART: [art] Extend RT PCRs Done
21,748,726 UART: [art] Lock RT PCRs Done
21,750,239 UART: [art] Populate DV Done
21,755,600 UART: [fht] FMC Alias Private Key: 7
21,757,136 UART: [art] Derive CDI
21,757,954 UART: [art] Store in in slot 0x4
21,800,507 UART: [art] Derive Key Pair
21,801,547 UART: [art] Store priv key in slot 0x5
24,228,033 UART: [art] Derive Key Pair - Done
24,240,949 UART: [art] Signing Cert with AUTHO
24,242,254 UART: RITY.KEYID = 7
25,947,493 UART: [art] Erasing AUTHORITY.KEYID = 7
25,949,003 UART: [art] PUB.X = 913781AAD9331916E1E7973D51B31D017DAA64CE58D8175EBF9A683DF3313DC848EC3DB25145B4B28EA4375EEE970937
25,956,351 UART: [art] PUB.Y = 72A3C520D08FB8E933A57BF2D66A09FFC7791A597AA2F280B6B9BD60DF6E8629096D75D1DBA9B2735FEA71320B3721DD
25,963,501 UART: [art] SIG.R = 80DAA718C6FC1D0F11356EA18918AAC4483B87375FF8315D4110A1CD9101BC4D6A5B2B92E3941D9D2FF8F60304028FD1
25,970,902 UART: [art] SIG.S = EEA354BE31578D6B61A6EA28AEA6B200B0CDFE794702D68D2E0A90F43C30266326EC60905BC7CF0634B8BBC891BFE1B6
26,950,636 UART: Caliptra RT
26,951,347 UART: [state] CFI Enabled
27,067,701 UART: [rt] RT listening for mailbox commands...
27,069,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,225,403 UART: [rt]cmd =0x41544d4e, len=14344
29,596,979 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,920 writing to cptra_bootfsm_go
3,695,711 ready_for_fw is high
3,696,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,241,212 >>> mbox cmd response: success
19,489,937 UART:
19,490,319 UART: Running Caliptra FMC ...
19,491,417 UART:
19,491,573 UART: [state] CFI Enabled
19,499,256 UART: [fht] FMC Alias Private Key: 7
21,255,768 UART: [art] Extend RT PCRs Done
21,256,985 UART: [art] Lock RT PCRs Done
21,258,556 UART: [art] Populate DV Done
21,263,917 UART: [fht] FMC Alias Private Key: 7
21,265,443 UART: [art] Derive CDI
21,266,193 UART: [art] Store in in slot 0x4
21,308,957 UART: [art] Derive Key Pair
21,309,957 UART: [art] Store priv key in slot 0x5
23,737,059 UART: [art] Derive Key Pair - Done
23,749,844 UART: [art] Signing Cert with AUTHO
23,751,177 UART: RITY.KEYID = 7
25,456,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,458,151 UART: [art] PUB.X = 81E0C882675F00B0603AC364B9DDDA1414D82E055AFE7C31CE2C74A39B4A1CE9D7A9BD5AEB3BD1F235E41761A66DF6DD
25,465,446 UART: [art] PUB.Y = 7C7C54D5D2A41D37C0084B4FCFA02AD4835F8119FE0A7777050CBEBDA0C12ABF84EDD413C89916CB55AA7824E1712388
25,472,710 UART: [art] SIG.R = 86D7C04D0BE9DDE3582C02E72307571C9172860080D1EF134A466AC545C853498A2050D52A9561040B09794D671CC390
25,480,050 UART: [art] SIG.S = 8471E27950F04DAF267091338D528A82819819864777686E3CD4EF2005D2EB20FF46984EA7400EEF7BDF98C36B424EB5
26,459,050 UART: Caliptra RT
26,459,773 UART: [state] CFI Enabled
26,577,771 UART: [rt] RT listening for mailbox commands...
26,580,075 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,735,447 UART: [rt]cmd =0x41544d4e, len=14344
29,091,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,983 UART:
192,340 UART: Running Caliptra ROM ...
193,444 UART:
193,587 UART: [state] CFI Enabled
263,954 UART: [state] LifecycleState = Unprovisioned
266,319 UART: [state] DebugLocked = No
267,701 UART: [state] WD Timer not started. Device not locked for debugging
272,819 UART: [kat] SHA2-256
462,700 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,462 UART: [kat] ++
473,908 UART: [kat] sha1
486,131 UART: [kat] SHA2-256
489,149 UART: [kat] SHA2-384
495,930 UART: [kat] SHA2-512-ACC
498,513 UART: [kat] ECC-384
2,947,892 UART: [kat] HMAC-384Kdf
2,971,044 UART: [kat] LMS
3,502,746 UART: [kat] --
3,509,648 UART: [cold-reset] ++
3,511,373 UART: [fht] FHT @ 0x50003400
3,522,212 UART: [idev] ++
3,522,918 UART: [idev] CDI.KEYID = 6
3,523,918 UART: [idev] SUBJECT.KEYID = 7
3,525,088 UART: [idev] UDS.KEYID = 0
3,526,038 ready_for_fw is high
3,526,244 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,956 UART: [idev] Erasing UDS.KEYID = 0
6,028,887 UART: [idev] Sha1 KeyId Algorithm
6,051,773 UART: [idev] --
6,055,332 UART: [ldev] ++
6,056,091 UART: [ldev] CDI.KEYID = 6
6,056,998 UART: [ldev] SUBJECT.KEYID = 5
6,058,108 UART: [ldev] AUTHORITY.KEYID = 7
6,059,291 UART: [ldev] FE.KEYID = 1
6,101,702 UART: [ldev] Erasing FE.KEYID = 1
8,603,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,575 UART: [ldev] --
10,415,607 UART: [fwproc] Wait for Commands...
10,417,701 UART: [fwproc] Recv command 0x46574c44
10,419,955 UART: [fwproc] Recv'd Img size: 114168 bytes
15,040,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,122,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,238,924 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,780,478 >>> mbox cmd response: success
15,783,835 UART: [afmc] ++
15,784,544 UART: [afmc] CDI.KEYID = 6
15,785,793 UART: [afmc] SUBJECT.KEYID = 7
15,787,233 UART: [afmc] AUTHORITY.KEYID = 5
18,325,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,065,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,067,891 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,082,960 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,098,135 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,113,013 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,137,469 UART: [afmc] --
20,141,408 UART: [cold-reset] --
20,146,419 UART: [state] Locking Datavault
20,150,395 UART: [state] Locking PCR0, PCR1 and PCR31
20,152,555 UART: [state] Locking ICCM
20,154,089 UART: [exit] Launching FMC @ 0x40000130
20,162,782 UART:
20,163,025 UART: Running Caliptra FMC ...
20,164,133 UART:
20,164,293 UART: [state] CFI Enabled
20,225,367 UART: [fht] FMC Alias Private Key: 7
21,989,387 UART: [art] Extend RT PCRs Done
21,990,610 UART: [art] Lock RT PCRs Done
21,992,029 UART: [art] Populate DV Done
21,997,624 UART: [fht] FMC Alias Private Key: 7
21,999,277 UART: [art] Derive CDI
22,000,092 UART: [art] Store in in slot 0x4
22,058,543 UART: [art] Derive Key Pair
22,059,587 UART: [art] Store priv key in slot 0x5
24,522,209 UART: [art] Derive Key Pair - Done
24,535,042 UART: [art] Signing Cert with AUTHO
24,536,376 UART: RITY.KEYID = 7
26,248,814 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,323 UART: [art] PUB.X = A6DE0C1C394871159B09FC82AD31DE11674B38178C5DA90EA3C71A0F046A056CD1608271A52224EA282DD8BD15E81561
26,257,596 UART: [art] PUB.Y = 386E3E9620C992C84021A39EAACDAD517A253D09E3F00AE20636CF2BD8312E4157ECEA873BE317A11118FE11ECAC51FE
26,264,854 UART: [art] SIG.R = 2E834968A1616BE1DA9A5D529820BA0F9448D79085A29BBBB6A72575D475D0A7D5F5A751975C6CAC76BBBFCA76A39B4A
26,272,272 UART: [art] SIG.S = D9C269F203824713FB5005F97DA30258B6250A64FD1FAB855DD22B0623BA5AE240E9824708B4D1B785F990EFB671C452
27,250,820 UART: Caliptra RT
27,251,507 UART: [state] CFI Enabled
27,417,756 UART: [rt] RT listening for mailbox commands...
27,420,061 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,575,464 UART: [rt]cmd =0x41544d4e, len=14344
29,943,274 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,438,301 ready_for_fw is high
3,438,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,839,952 >>> mbox cmd response: success
20,138,596 UART:
20,139,024 UART: Running Caliptra FMC ...
20,140,142 UART:
20,140,298 UART: [state] CFI Enabled
20,206,087 UART: [fht] FMC Alias Private Key: 7
21,970,203 UART: [art] Extend RT PCRs Done
21,971,436 UART: [art] Lock RT PCRs Done
21,973,197 UART: [art] Populate DV Done
21,978,791 UART: [fht] FMC Alias Private Key: 7
21,980,390 UART: [art] Derive CDI
21,981,209 UART: [art] Store in in slot 0x4
22,039,458 UART: [art] Derive Key Pair
22,040,520 UART: [art] Store priv key in slot 0x5
24,503,563 UART: [art] Derive Key Pair - Done
24,516,505 UART: [art] Signing Cert with AUTHO
24,517,815 UART: RITY.KEYID = 7
26,229,053 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,562 UART: [art] PUB.X = 7F057D1B46CDF63E2C664EA28107642E3A6071605FA00223B217AB9C5073D735CB319B4DF46C07082E26291F174558C7
26,237,797 UART: [art] PUB.Y = 853785ED09911033A891A790119C3E655695919B091EDF0DEFDBD5E614C8CB583104837FEE85DC095386E6590CC572D1
26,245,043 UART: [art] SIG.R = BA38F5C2E75C3AA377F1332CDE459596642EC10743D256D255B8383B5ECE01888742102AFB2E3E584D7BDAE2D387B585
26,252,378 UART: [art] SIG.S = 1C8F4263FF8FBFDB5D1A46F662B9AC8DE65F0F2681BFF8375CC9B3B51C96CF4B519C06713BAFD8F522DBCD0AE56ECA90
27,231,293 UART: Caliptra RT
27,231,999 UART: [state] CFI Enabled
27,398,788 UART: [rt] RT listening for mailbox commands...
27,401,089 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,556,236 UART: [rt]cmd =0x41544d4e, len=14344
29,909,831 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,007 writing to cptra_bootfsm_go
193,259 UART:
193,648 UART: Running Caliptra ROM ...
194,872 UART:
604,521 UART: [state] CFI Enabled
619,271 UART: [state] LifecycleState = Unprovisioned
621,616 UART: [state] DebugLocked = No
624,289 UART: [state] WD Timer not started. Device not locked for debugging
628,117 UART: [kat] SHA2-256
818,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,836 UART: [kat] ++
829,357 UART: [kat] sha1
840,726 UART: [kat] SHA2-256
843,737 UART: [kat] SHA2-384
850,656 UART: [kat] SHA2-512-ACC
853,238 UART: [kat] ECC-384
3,293,235 UART: [kat] HMAC-384Kdf
3,306,882 UART: [kat] LMS
3,838,649 UART: [kat] --
3,841,519 UART: [cold-reset] ++
3,843,736 UART: [fht] FHT @ 0x50003400
3,856,272 UART: [idev] ++
3,856,986 UART: [idev] CDI.KEYID = 6
3,857,912 UART: [idev] SUBJECT.KEYID = 7
3,859,154 UART: [idev] UDS.KEYID = 0
3,860,081 ready_for_fw is high
3,860,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,728 UART: [idev] Erasing UDS.KEYID = 0
6,338,985 UART: [idev] Sha1 KeyId Algorithm
6,361,893 UART: [idev] --
6,366,649 UART: [ldev] ++
6,367,330 UART: [ldev] CDI.KEYID = 6
6,368,245 UART: [ldev] SUBJECT.KEYID = 5
6,369,405 UART: [ldev] AUTHORITY.KEYID = 7
6,370,789 UART: [ldev] FE.KEYID = 1
6,381,388 UART: [ldev] Erasing FE.KEYID = 1
8,857,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,948 UART: [ldev] --
10,647,714 UART: [fwproc] Wait for Commands...
10,650,134 UART: [fwproc] Recv command 0x46574c44
10,652,439 UART: [fwproc] Recv'd Img size: 114168 bytes
15,279,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,355,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,471,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,013,011 >>> mbox cmd response: success
16,016,715 UART: [afmc] ++
16,017,428 UART: [afmc] CDI.KEYID = 6
16,018,544 UART: [afmc] SUBJECT.KEYID = 7
16,020,087 UART: [afmc] AUTHORITY.KEYID = 5
18,527,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,247,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,249,830 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,264,915 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,280,148 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,295,001 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,319,751 UART: [afmc] --
20,323,843 UART: [cold-reset] --
20,327,833 UART: [state] Locking Datavault
20,334,325 UART: [state] Locking PCR0, PCR1 and PCR31
20,336,520 UART: [state] Locking ICCM
20,339,048 UART: [exit] Launching FMC @ 0x40000130
20,347,725 UART:
20,347,959 UART: Running Caliptra FMC ...
20,349,009 UART:
20,349,167 UART: [state] CFI Enabled
20,357,459 UART: [fht] FMC Alias Private Key: 7
22,114,306 UART: [art] Extend RT PCRs Done
22,115,530 UART: [art] Lock RT PCRs Done
22,117,264 UART: [art] Populate DV Done
22,122,731 UART: [fht] FMC Alias Private Key: 7
22,124,241 UART: [art] Derive CDI
22,125,007 UART: [art] Store in in slot 0x4
22,167,605 UART: [art] Derive Key Pair
22,168,643 UART: [art] Store priv key in slot 0x5
24,595,714 UART: [art] Derive Key Pair - Done
24,608,764 UART: [art] Signing Cert with AUTHO
24,610,210 UART: RITY.KEYID = 7
26,315,458 UART: [art] Erasing AUTHORITY.KEYID = 7
26,316,966 UART: [art] PUB.X = 9B1AF2D2568D9DA19ECA7E2A13F99FFE780D2A4FE7A6E7B3AD7AADA1C030EFCF4B70E4EAAA63A558B20D33D2207C7A6D
26,324,270 UART: [art] PUB.Y = 49EFA2DE60C6F61AC57CB2CAD17AF077056992D4E02C00482BF0B3384EB77C87B2A4A2FAA2AE57EC5B81B457D976ED8C
26,331,504 UART: [art] SIG.R = D1A8705F0207F6F0F905D3775379BCFB4BEA588C3D48432DFC21367BDB31A01566DA9071E661BAA05FB0C93203219B4D
26,338,904 UART: [art] SIG.S = 43C478EC30F8A4C07AA0D0923F0243C6E8E165C09B5AD2893F899057D5CF18E38FE7EFB2625305E99974CCCAFD6CF33B
27,317,770 UART: Caliptra RT
27,318,458 UART: [state] CFI Enabled
27,435,139 UART: [rt] RT listening for mailbox commands...
27,437,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,592,714 UART: [rt]cmd =0x41544d4e, len=14344
29,953,855 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,640 writing to cptra_bootfsm_go
3,749,412 ready_for_fw is high
3,749,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,058,085 >>> mbox cmd response: success
20,307,477 UART:
20,307,867 UART: Running Caliptra FMC ...
20,309,051 UART:
20,309,230 UART: [state] CFI Enabled
20,316,987 UART: [fht] FMC Alias Private Key: 7
22,073,373 UART: [art] Extend RT PCRs Done
22,074,626 UART: [art] Lock RT PCRs Done
22,076,214 UART: [art] Populate DV Done
22,081,643 UART: [fht] FMC Alias Private Key: 7
22,083,243 UART: [art] Derive CDI
22,084,063 UART: [art] Store in in slot 0x4
22,126,556 UART: [art] Derive Key Pair
22,127,561 UART: [art] Store priv key in slot 0x5
24,554,961 UART: [art] Derive Key Pair - Done
24,567,541 UART: [art] Signing Cert with AUTHO
24,568,854 UART: RITY.KEYID = 7
26,273,942 UART: [art] Erasing AUTHORITY.KEYID = 7
26,275,459 UART: [art] PUB.X = 90DF792E650A1134687B24D7F5F5AA1F44CCD498155C9D459B1A429980A9EA0C8D78BE7D695F72AF264FC5247F297CE2
26,282,714 UART: [art] PUB.Y = F1DBAB58711E03CAE8B98AD8613C841B8E533630384AAAFE4FC412E0E090FCCD17ED6A924C11C53EB641C07EE291A6F6
26,289,977 UART: [art] SIG.R = 22DB3FCFD9A996BAC2DE4FA6B5A8B30359E7DEEAFB5C4E527E549481557203073433D2880E5A5A192428B491438A2E86
26,297,419 UART: [art] SIG.S = 14A1448FC7384AEF93652D4773C47D56788C97D0DFEE0DBF351D266D64BD34FD092C5F7469F99FDAC64A6B4FD4DD437B
27,275,978 UART: Caliptra RT
27,276,691 UART: [state] CFI Enabled
27,394,073 UART: [rt] RT listening for mailbox commands...
27,396,355 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,551,933 UART: [rt]cmd =0x41544d4e, len=14344
29,913,008 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,123 UART: [kat] SHA2-256
882,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,169 UART: [kat] ++
886,321 UART: [kat] sha1
890,577 UART: [kat] SHA2-256
892,515 UART: [kat] SHA2-384
895,118 UART: [kat] SHA2-512-ACC
897,019 UART: [kat] ECC-384
902,502 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,065 UART: [cold-reset] ++
1,476,405 UART: [fht] Storing FHT @ 0x50003400
1,479,162 UART: [idev] ++
1,479,330 UART: [idev] CDI.KEYID = 6
1,479,690 UART: [idev] SUBJECT.KEYID = 7
1,480,114 UART: [idev] UDS.KEYID = 0
1,480,459 ready_for_fw is high
1,480,459 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,238 UART: [idev] Erasing UDS.KEYID = 0
1,504,798 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,422 UART: [idev] --
1,514,425 UART: [ldev] ++
1,514,593 UART: [ldev] CDI.KEYID = 6
1,514,956 UART: [ldev] SUBJECT.KEYID = 5
1,515,382 UART: [ldev] AUTHORITY.KEYID = 7
1,515,845 UART: [ldev] FE.KEYID = 1
1,520,989 UART: [ldev] Erasing FE.KEYID = 1
1,546,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,508 UART: [ldev] --
1,585,949 UART: [fwproc] Waiting for Commands...
1,586,636 UART: [fwproc] Received command 0x46574c44
1,587,427 UART: [fwproc] Received Image of size 114168 bytes
5,232,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,260,347 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,289,699 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,425,434 >>> mbox cmd response: success
5,426,664 UART: [afmc] ++
5,426,832 UART: [afmc] CDI.KEYID = 6
5,427,194 UART: [afmc] SUBJECT.KEYID = 7
5,427,619 UART: [afmc] AUTHORITY.KEYID = 5
5,462,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,479,263 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,480,043 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,485,752 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,491,644 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,497,345 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,505,193 UART: [afmc] --
5,506,093 UART: [cold-reset] --
5,506,971 UART: [state] Locking Datavault
5,508,238 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,842 UART: [state] Locking ICCM
5,509,274 UART: [exit] Launching FMC @ 0x40000130
5,514,603 UART:
5,514,619 UART: Running Caliptra FMC ...
5,515,027 UART:
5,515,081 UART: [state] CFI Enabled
5,525,971 UART: [fht] FMC Alias Private Key: 7
5,633,843 UART: [art] Extend RT PCRs Done
5,634,271 UART: [art] Lock RT PCRs Done
5,635,723 UART: [art] Populate DV Done
5,643,849 UART: [fht] FMC Alias Private Key: 7
5,644,797 UART: [art] Derive CDI
5,645,077 UART: [art] Store in in slot 0x4
5,730,762 UART: [art] Derive Key Pair
5,731,122 UART: [art] Store priv key in slot 0x5
5,744,248 UART: [art] Derive Key Pair - Done
5,758,740 UART: [art] Signing Cert with AUTHO
5,759,220 UART: RITY.KEYID = 7
5,774,224 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,989 UART: [art] PUB.X = 3428AC455F77703C508DFB770A1A16E0C169E6F852FAB5ABD676B385AA8D568EAE819D472BD2F37AAEAFF08934484309
5,781,763 UART: [art] PUB.Y = 9232D8B04A53E9221FC461B25E45D428D4590FF8B63000101503392CAEF0EA05B3283F021885AB498773EDD6E9C7CBF1
5,788,679 UART: [art] SIG.R = 8133DC77FFB49B4D0370C54E7DE5733F40F1043E576ACAB6B7F83038E5D0C71ADC02E8B5D3249E54A4FEA5CE43B09FE1
5,795,456 UART: [art] SIG.S = DDFB6959F6ABF8118F68694A4602E0DFCEA0D77E5EED80C60BA67112C14AE4613238740EC33B306C50C94ED878FCAF77
5,819,862 UART: Caliptra RT
5,820,115 UART: [state] CFI Enabled
5,927,191 UART: [rt] RT listening for mailbox commands...
5,927,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,050,877 UART: [rt]cmd =0x41544d4e, len=14344
6,604,371 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,599 ready_for_fw is high
1,361,599 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,084,425 >>> mbox cmd response: success
5,146,056 UART:
5,146,072 UART: Running Caliptra FMC ...
5,146,480 UART:
5,146,534 UART: [state] CFI Enabled
5,156,976 UART: [fht] FMC Alias Private Key: 7
5,264,398 UART: [art] Extend RT PCRs Done
5,264,826 UART: [art] Lock RT PCRs Done
5,266,372 UART: [art] Populate DV Done
5,274,446 UART: [fht] FMC Alias Private Key: 7
5,275,538 UART: [art] Derive CDI
5,275,818 UART: [art] Store in in slot 0x4
5,361,351 UART: [art] Derive Key Pair
5,361,711 UART: [art] Store priv key in slot 0x5
5,374,359 UART: [art] Derive Key Pair - Done
5,389,382 UART: [art] Signing Cert with AUTHO
5,389,862 UART: RITY.KEYID = 7
5,404,892 UART: [art] Erasing AUTHORITY.KEYID = 7
5,405,657 UART: [art] PUB.X = ACA2122A893EB7EC291754C942D8A79579DBAF012483F4239903BF74E3802BAC9D5236DE200A72782A72A67CABD76423
5,412,420 UART: [art] PUB.Y = 4EE922B7D47AC3EAEC7D3BA19003DE762FFAEC20D6416BE39AC116B66B50577FD0E0890EBEB5F6196A4E1ECC8669B665
5,419,384 UART: [art] SIG.R = 7586DCF138138CA76AA6CBE52B7EFD5AC6D2C43A8DF4AA887C98ECB10F8253DB34E9F59D14B7DB23542D7E83274EED7C
5,426,173 UART: [art] SIG.S = A361CD7B29D57AEEBB0729504370DF2651D1A365EF69C14593905C23C3B4A4768D2B478AB5C2FC5AC24708F72B70384D
5,450,050 UART: Caliptra RT
5,450,303 UART: [state] CFI Enabled
5,558,414 UART: [rt] RT listening for mailbox commands...
5,559,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,682,258 UART: [rt]cmd =0x41544d4e, len=14344
6,252,627 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,472 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,972 UART: [kat] SHA2-256
881,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,018 UART: [kat] ++
886,170 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,481 UART: [kat] SHA2-512-ACC
897,382 UART: [kat] ECC-384
903,077 UART: [kat] HMAC-384Kdf
907,739 UART: [kat] LMS
1,475,935 UART: [kat] --
1,476,816 UART: [cold-reset] ++
1,477,342 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 ready_for_fw is high
1,481,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,919 UART: [idev] Erasing UDS.KEYID = 0
1,505,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,373 UART: [idev] --
1,515,320 UART: [ldev] ++
1,515,488 UART: [ldev] CDI.KEYID = 6
1,515,851 UART: [ldev] SUBJECT.KEYID = 5
1,516,277 UART: [ldev] AUTHORITY.KEYID = 7
1,516,740 UART: [ldev] FE.KEYID = 1
1,521,938 UART: [ldev] Erasing FE.KEYID = 1
1,547,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,239 UART: [ldev] --
1,586,666 UART: [fwproc] Waiting for Commands...
1,587,389 UART: [fwproc] Received command 0x46574c44
1,588,180 UART: [fwproc] Received Image of size 114168 bytes
5,119,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,217 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,177,569 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,313,224 >>> mbox cmd response: success
5,314,320 UART: [afmc] ++
5,314,488 UART: [afmc] CDI.KEYID = 6
5,314,850 UART: [afmc] SUBJECT.KEYID = 7
5,315,275 UART: [afmc] AUTHORITY.KEYID = 5
5,350,557 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,366,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,367,523 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,373,232 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,379,124 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,384,825 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,392,593 UART: [afmc] --
5,393,713 UART: [cold-reset] --
5,394,369 UART: [state] Locking Datavault
5,395,636 UART: [state] Locking PCR0, PCR1 and PCR31
5,396,240 UART: [state] Locking ICCM
5,396,886 UART: [exit] Launching FMC @ 0x40000130
5,402,215 UART:
5,402,231 UART: Running Caliptra FMC ...
5,402,639 UART:
5,402,782 UART: [state] CFI Enabled
5,413,334 UART: [fht] FMC Alias Private Key: 7
5,521,712 UART: [art] Extend RT PCRs Done
5,522,140 UART: [art] Lock RT PCRs Done
5,523,506 UART: [art] Populate DV Done
5,531,824 UART: [fht] FMC Alias Private Key: 7
5,532,762 UART: [art] Derive CDI
5,533,042 UART: [art] Store in in slot 0x4
5,618,683 UART: [art] Derive Key Pair
5,619,043 UART: [art] Store priv key in slot 0x5
5,632,857 UART: [art] Derive Key Pair - Done
5,647,639 UART: [art] Signing Cert with AUTHO
5,648,119 UART: RITY.KEYID = 7
5,663,225 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,990 UART: [art] PUB.X = 173D871D9F3FEB9E00E2C8320A4CBB3F111F9A906032646A7B8AE7E351644E9084CB7A00CBBB7073A54C187EE0670A43
5,670,716 UART: [art] PUB.Y = 4F915587D0BBCD04A97DD06C8B11EED967D40E7FDF452E69D8AEE4A62456D7A6D35639F067B9F8578B9FAEB033A01394
5,677,672 UART: [art] SIG.R = ACE1D075381B48F49B070409453C31714AA5F4D149F7C8A7AC713BED7D3A666AFBEE523ADD4BB3D8647EFAACE6D48E87
5,684,453 UART: [art] SIG.S = 1D76C2D563A7E4B1A55B6C99490F7E0CE7B136D27A2B3EF30B32BB47ADBC8932CD59D7130EAAD95721CBE6A9E0E8D8C2
5,708,084 UART: Caliptra RT
5,708,429 UART: [state] CFI Enabled
5,816,138 UART: [rt] RT listening for mailbox commands...
5,816,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,712 UART: [rt]cmd =0x41544d4e, len=14344
6,490,701 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,128 ready_for_fw is high
1,362,128 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,237,852 >>> mbox cmd response: success
5,300,031 UART:
5,300,047 UART: Running Caliptra FMC ...
5,300,455 UART:
5,300,598 UART: [state] CFI Enabled
5,311,098 UART: [fht] FMC Alias Private Key: 7
5,419,654 UART: [art] Extend RT PCRs Done
5,420,082 UART: [art] Lock RT PCRs Done
5,421,538 UART: [art] Populate DV Done
5,429,796 UART: [fht] FMC Alias Private Key: 7
5,430,904 UART: [art] Derive CDI
5,431,184 UART: [art] Store in in slot 0x4
5,517,101 UART: [art] Derive Key Pair
5,517,461 UART: [art] Store priv key in slot 0x5
5,531,245 UART: [art] Derive Key Pair - Done
5,546,004 UART: [art] Signing Cert with AUTHO
5,546,484 UART: RITY.KEYID = 7
5,561,642 UART: [art] Erasing AUTHORITY.KEYID = 7
5,562,407 UART: [art] PUB.X = C27F5806089133AE96CD66170BF15865466F7378094F679412BD9C8FAAA0902BCF029807238E05A9D9DF697664AFED6A
5,569,154 UART: [art] PUB.Y = 0AD5D52BCCF1E5A147869FB3D02D9664CAC3523B7D7D1986040B821B897925CCF9C84767496A179B892E9F9B13B678FB
5,576,099 UART: [art] SIG.R = D4C997F6C516862D24F3BF19172319D5DDE574634DFE3017ACB7ED2F66A8DBB4CC0B674E4CCABBE864DFFE419D5B74BB
5,582,890 UART: [art] SIG.S = EBBF27FD42BAD1B20A5CA73610D16F530B74F530F2BD27ECD6A995A721053A8ECBCB00E925BEF1665DCCFC735EF1B797
5,606,530 UART: Caliptra RT
5,606,875 UART: [state] CFI Enabled
5,715,575 UART: [rt] RT listening for mailbox commands...
5,716,245 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,361 UART: [rt]cmd =0x41544d4e, len=14344
6,404,560 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,598 UART: [kat] SHA2-512-ACC
908,499 UART: [kat] ECC-384
918,604 UART: [kat] HMAC-384Kdf
923,282 UART: [kat] LMS
1,171,610 UART: [kat] --
1,172,507 UART: [cold-reset] ++
1,172,961 UART: [fht] FHT @ 0x50003400
1,175,668 UART: [idev] ++
1,175,836 UART: [idev] CDI.KEYID = 6
1,176,196 UART: [idev] SUBJECT.KEYID = 7
1,176,620 UART: [idev] UDS.KEYID = 0
1,176,965 ready_for_fw is high
1,176,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,520 UART: [idev] Erasing UDS.KEYID = 0
1,201,891 UART: [idev] Sha1 KeyId Algorithm
1,210,597 UART: [idev] --
1,211,755 UART: [ldev] ++
1,211,923 UART: [ldev] CDI.KEYID = 6
1,212,286 UART: [ldev] SUBJECT.KEYID = 5
1,212,712 UART: [ldev] AUTHORITY.KEYID = 7
1,213,175 UART: [ldev] FE.KEYID = 1
1,218,487 UART: [ldev] Erasing FE.KEYID = 1
1,244,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,699 UART: [ldev] --
1,284,198 UART: [fwproc] Wait for Commands...
1,284,782 UART: [fwproc] Recv command 0x46574c44
1,285,510 UART: [fwproc] Recv'd Img size: 114168 bytes
3,128,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,322,544 >>> mbox cmd response: success
3,323,722 UART: [afmc] ++
3,323,890 UART: [afmc] CDI.KEYID = 6
3,324,252 UART: [afmc] SUBJECT.KEYID = 7
3,324,677 UART: [afmc] AUTHORITY.KEYID = 5
3,359,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,550 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,259 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,151 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,862 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,643 UART: [afmc] --
3,402,561 UART: [cold-reset] --
3,403,337 UART: [state] Locking Datavault
3,404,554 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,158 UART: [state] Locking ICCM
3,405,626 UART: [exit] Launching FMC @ 0x40000130
3,410,955 UART:
3,410,971 UART: Running Caliptra FMC ...
3,411,379 UART:
3,411,433 UART: [state] CFI Enabled
3,421,977 UART: [fht] FMC Alias Private Key: 7
3,529,823 UART: [art] Extend RT PCRs Done
3,530,251 UART: [art] Lock RT PCRs Done
3,531,485 UART: [art] Populate DV Done
3,539,789 UART: [fht] FMC Alias Private Key: 7
3,540,851 UART: [art] Derive CDI
3,541,131 UART: [art] Store in in slot 0x4
3,626,896 UART: [art] Derive Key Pair
3,627,256 UART: [art] Store priv key in slot 0x5
3,640,524 UART: [art] Derive Key Pair - Done
3,655,372 UART: [art] Signing Cert with AUTHO
3,655,852 UART: RITY.KEYID = 7
3,671,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,013 UART: [art] PUB.X = 3A8C4C440EEA288B21D62020DDA36A764F63F6BB6DACF29FBBDB8036BC596FD883C6989664C1C54F58953ACE5DE92CE8
3,678,798 UART: [art] PUB.Y = 42F7C78E0B640562969C1F3E1380EA51B8A98882ED7EEEC2C650383BD1DC9B3C09FC0FB6B1B970D364D27F8D1FBAF89B
3,685,752 UART: [art] SIG.R = 41404A90B3FCCBE124CF1F11EA2C140BFB2F57FD10462BD8441012B140B5860659E8D7FBE7008D08226161278D069F60
3,692,488 UART: [art] SIG.S = 4028C7C398189B13EBAA443BC87F6A35FB12F3401A1E224229D3B606530DF370A70F1A15731A8E528EAB017742731331
3,716,017 UART: Caliptra RT
3,716,270 UART: [state] CFI Enabled
3,824,111 UART: [rt] RT listening for mailbox commands...
3,824,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,817 UART: [rt]cmd =0x41544d4e, len=14344
4,508,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,655 ready_for_fw is high
1,060,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,169,760 >>> mbox cmd response: success
3,231,827 UART:
3,231,843 UART: Running Caliptra FMC ...
3,232,251 UART:
3,232,305 UART: [state] CFI Enabled
3,243,095 UART: [fht] FMC Alias Private Key: 7
3,350,751 UART: [art] Extend RT PCRs Done
3,351,179 UART: [art] Lock RT PCRs Done
3,352,835 UART: [art] Populate DV Done
3,361,143 UART: [fht] FMC Alias Private Key: 7
3,362,079 UART: [art] Derive CDI
3,362,359 UART: [art] Store in in slot 0x4
3,447,826 UART: [art] Derive Key Pair
3,448,186 UART: [art] Store priv key in slot 0x5
3,460,750 UART: [art] Derive Key Pair - Done
3,475,896 UART: [art] Signing Cert with AUTHO
3,476,376 UART: RITY.KEYID = 7
3,491,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,135 UART: [art] PUB.X = 920169CC0CE5505ACE00030B18F2D24137179A92C3A1F3897EDA823C884A78DCA71B79FCFA2C19FDCE134BCA1C5CB23F
3,498,887 UART: [art] PUB.Y = E0031F844066F96302C7366AB4CB47C74549FE6F1812DAE062D1381B6356CF7918DFB03D23D9E25AFF8DD83612B560B3
3,505,833 UART: [art] SIG.R = 287D57B672D3CF8BD9DCF1555EC04043AE143F6A0426F2CACC30ABD4D1A6DB06A4C770ABEE5741B751415766521388A4
3,512,607 UART: [art] SIG.S = E7CA150D516154A7B3340E2ECA7D99455E95A6DBD82D9E99353615D4AB76698FED983B8261D6EFA3A8C00D2B6A017AC6
3,536,428 UART: Caliptra RT
3,536,681 UART: [state] CFI Enabled
3,643,429 UART: [rt] RT listening for mailbox commands...
3,644,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,377 UART: [rt]cmd =0x41544d4e, len=14344
4,334,915 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
893,631 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,756 UART: [kat] ++
897,908 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,059 UART: [kat] HMAC-384Kdf
922,725 UART: [kat] LMS
1,171,053 UART: [kat] --
1,172,056 UART: [cold-reset] ++
1,172,530 UART: [fht] FHT @ 0x50003400
1,175,019 UART: [idev] ++
1,175,187 UART: [idev] CDI.KEYID = 6
1,175,547 UART: [idev] SUBJECT.KEYID = 7
1,175,971 UART: [idev] UDS.KEYID = 0
1,176,316 ready_for_fw is high
1,176,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,657 UART: [idev] Erasing UDS.KEYID = 0
1,200,168 UART: [idev] Sha1 KeyId Algorithm
1,208,578 UART: [idev] --
1,209,430 UART: [ldev] ++
1,209,598 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,387 UART: [ldev] AUTHORITY.KEYID = 7
1,210,850 UART: [ldev] FE.KEYID = 1
1,216,116 UART: [ldev] Erasing FE.KEYID = 1
1,242,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,266 UART: [ldev] --
1,281,665 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,149 UART: [fwproc] Recv'd Img size: 114168 bytes
3,117,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,310,654 >>> mbox cmd response: success
3,311,832 UART: [afmc] ++
3,312,000 UART: [afmc] CDI.KEYID = 6
3,312,362 UART: [afmc] SUBJECT.KEYID = 7
3,312,787 UART: [afmc] AUTHORITY.KEYID = 5
3,348,355 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,574 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,283 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,175 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,886 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,609 UART: [afmc] --
3,391,513 UART: [cold-reset] --
3,392,235 UART: [state] Locking Datavault
3,393,422 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,026 UART: [state] Locking ICCM
3,394,468 UART: [exit] Launching FMC @ 0x40000130
3,399,797 UART:
3,399,813 UART: Running Caliptra FMC ...
3,400,221 UART:
3,400,364 UART: [state] CFI Enabled
3,411,226 UART: [fht] FMC Alias Private Key: 7
3,519,200 UART: [art] Extend RT PCRs Done
3,519,628 UART: [art] Lock RT PCRs Done
3,521,092 UART: [art] Populate DV Done
3,529,314 UART: [fht] FMC Alias Private Key: 7
3,530,424 UART: [art] Derive CDI
3,530,704 UART: [art] Store in in slot 0x4
3,617,167 UART: [art] Derive Key Pair
3,617,527 UART: [art] Store priv key in slot 0x5
3,630,677 UART: [art] Derive Key Pair - Done
3,645,370 UART: [art] Signing Cert with AUTHO
3,645,850 UART: RITY.KEYID = 7
3,661,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,919 UART: [art] PUB.X = EE17D4DCD24F6616B8DDE4DB109A7881CD7738C55232A0955BF131A9A0C9C8611DD04B4D6460CF73B05FEA3044CFC866
3,668,701 UART: [art] PUB.Y = 57F7DCDCD9B6F85799F8037C410654753DAF301CC3E2B9C195BF9F15997157B612FFDCE5A01A74008996EAB3F5BA3AD3
3,675,635 UART: [art] SIG.R = 8BCE508348C8B73268FAA4342B99AD880F50CB8EB39D146E8213E6DB8960B8B5BA34B426E8FCE274609C4CDCDFAF54DA
3,682,420 UART: [art] SIG.S = AFCB70C919B483C93CACECB4A53DBAE41A3AE3EE929CC578717720CB51FAB15EB1A07D18C53197E5D48CFDDCFC7D4839
3,706,115 UART: Caliptra RT
3,706,460 UART: [state] CFI Enabled
3,814,295 UART: [rt] RT listening for mailbox commands...
3,814,965 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,115 UART: [rt]cmd =0x41544d4e, len=14344
4,496,557 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,204 ready_for_fw is high
1,060,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,165,191 >>> mbox cmd response: success
3,227,304 UART:
3,227,320 UART: Running Caliptra FMC ...
3,227,728 UART:
3,227,871 UART: [state] CFI Enabled
3,238,339 UART: [fht] FMC Alias Private Key: 7
3,346,271 UART: [art] Extend RT PCRs Done
3,346,699 UART: [art] Lock RT PCRs Done
3,348,345 UART: [art] Populate DV Done
3,356,617 UART: [fht] FMC Alias Private Key: 7
3,357,753 UART: [art] Derive CDI
3,358,033 UART: [art] Store in in slot 0x4
3,443,710 UART: [art] Derive Key Pair
3,444,070 UART: [art] Store priv key in slot 0x5
3,457,118 UART: [art] Derive Key Pair - Done
3,471,717 UART: [art] Signing Cert with AUTHO
3,472,197 UART: RITY.KEYID = 7
3,487,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,040 UART: [art] PUB.X = B36856815FAA17EA8000615204F79D59F67CC7F57E67F66A794286AE18A4B8710AA2EE63E080B773BB53DA1ECABE4798
3,494,788 UART: [art] PUB.Y = 6DD809F97A6392F4BC36BE78ACA68640DAC00D37CA84C30E9901C184F71CC30A3F67AA3EC8B36106E6259DCF3786D25A
3,501,732 UART: [art] SIG.R = 6847FA3A6E6F4297E62EFD2F1C992EFF0A6E89ECE16BAA2473F33A689154B5B7301A56143AC4134D27BE5BCC5E5C867C
3,508,513 UART: [art] SIG.S = CD1A4D543B65B4B888210D1F0DE4274BD91471A02E922706052B6E6CC11870F6BFBD54694B513AE6EC16E4A837355E23
3,531,920 UART: Caliptra RT
3,532,265 UART: [state] CFI Enabled
3,639,891 UART: [rt] RT listening for mailbox commands...
3,640,561 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,569 UART: [rt]cmd =0x41544d4e, len=14344
4,327,057 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,362 UART: [kat] HMAC-384Kdf
921,174 UART: [kat] LMS
1,169,486 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,174,803 ready_for_fw is high
1,174,803 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,263 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,242,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,354 UART: [ldev] --
1,281,758 UART: [fwproc] Wait for Commands...
1,282,375 UART: [fwproc] Recv command 0x46574c44
1,283,108 UART: [fwproc] Recv'd Img size: 114168 bytes
3,131,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,324,217 >>> mbox cmd response: success
3,325,390 UART: [afmc] ++
3,325,558 UART: [afmc] CDI.KEYID = 6
3,325,921 UART: [afmc] SUBJECT.KEYID = 7
3,326,347 UART: [afmc] AUTHORITY.KEYID = 5
3,361,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,638 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,348 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,238 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,949 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,711 UART: [afmc] --
3,404,821 UART: [cold-reset] --
3,405,497 UART: [state] Locking Datavault
3,406,692 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,296 UART: [state] Locking ICCM
3,407,726 UART: [exit] Launching FMC @ 0x40000130
3,413,055 UART:
3,413,071 UART: Running Caliptra FMC ...
3,413,479 UART:
3,413,533 UART: [state] CFI Enabled
3,423,659 UART: [fht] FMC Alias Private Key: 7
3,531,007 UART: [art] Extend RT PCRs Done
3,531,435 UART: [art] Lock RT PCRs Done
3,532,915 UART: [art] Populate DV Done
3,541,001 UART: [fht] FMC Alias Private Key: 7
3,541,929 UART: [art] Derive CDI
3,542,209 UART: [art] Store in in slot 0x4
3,627,584 UART: [art] Derive Key Pair
3,627,944 UART: [art] Store priv key in slot 0x5
3,641,074 UART: [art] Derive Key Pair - Done
3,655,628 UART: [art] Signing Cert with AUTHO
3,656,108 UART: RITY.KEYID = 7
3,671,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,007 UART: [art] PUB.X = C0313A28AFA6CDCBE3319BEF308CD0A64DEEC7A4E7FD6D36E506DBFBB44A3F5DC99296C53F8F35D1542670826FC6B66C
3,678,798 UART: [art] PUB.Y = 579FC625E3C95565621E33D2AFDA0FE5B79ED08FB5F7D78533E72BA5DA8F738EF2A6E77B552D8BC89ED7F302F7941506
3,685,751 UART: [art] SIG.R = C453B53BB58321A655E175D42CE4239A55F519F9BCFD5CAF067F1D0EC3DCCD41D13AADB57F51E4F477397A5CBEF76198
3,692,533 UART: [art] SIG.S = 7F1FC7D3F374A022387D9B8951B0A29C508CEBCF90E2F19137B6213CDDA02BC4890F2597AC7F7DEDCB98D36424EBF65C
3,715,543 UART: Caliptra RT
3,715,796 UART: [state] CFI Enabled
3,823,218 UART: [rt] RT listening for mailbox commands...
3,823,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,028 UART: [rt]cmd =0x41544d4e, len=14344
4,502,539 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,442 ready_for_fw is high
1,055,442 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,870 >>> mbox cmd response: success
3,226,463 UART:
3,226,479 UART: Running Caliptra FMC ...
3,226,887 UART:
3,226,941 UART: [state] CFI Enabled
3,237,857 UART: [fht] FMC Alias Private Key: 7
3,345,735 UART: [art] Extend RT PCRs Done
3,346,163 UART: [art] Lock RT PCRs Done
3,347,909 UART: [art] Populate DV Done
3,356,149 UART: [fht] FMC Alias Private Key: 7
3,357,145 UART: [art] Derive CDI
3,357,425 UART: [art] Store in in slot 0x4
3,443,182 UART: [art] Derive Key Pair
3,443,542 UART: [art] Store priv key in slot 0x5
3,457,398 UART: [art] Derive Key Pair - Done
3,471,929 UART: [art] Signing Cert with AUTHO
3,472,409 UART: RITY.KEYID = 7
3,487,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,142 UART: [art] PUB.X = 032AE590064AC91EC9A7D36434D87B5A3DBFA3AB3887982BF4076316957D4591AB3F1A80FA861B5EBCBBDA16652BB4A5
3,494,915 UART: [art] PUB.Y = 770AE875FCA62DAA7EA2FB0F8906F2D81833C8D28FFBF142F340851CB704F22EB68B93ABE6549BD0EE41D8C46751C9DE
3,501,871 UART: [art] SIG.R = 0B1DDB629D8DB429DB9BF8DD51DE51B4308E1095F6C7807AD1B3DBBA639DFEB152E245B0F9E7648F30ADA0D0D2A98A7D
3,508,662 UART: [art] SIG.S = 743E6CCB7068B30DB0D554FA8F236249EA4D11DB740604A7987480EA34592E9082B86C249E2631CDF5BD7049710F7A95
3,532,251 UART: Caliptra RT
3,532,504 UART: [state] CFI Enabled
3,641,281 UART: [rt] RT listening for mailbox commands...
3,641,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,957 UART: [rt]cmd =0x41544d4e, len=14344
4,320,742 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,873 UART: [kat] SHA2-512-ACC
906,774 UART: [kat] ECC-384
916,503 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,174,618 ready_for_fw is high
1,174,618 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,130 UART: [idev] Erasing UDS.KEYID = 0
1,199,344 UART: [idev] Sha1 KeyId Algorithm
1,208,364 UART: [idev] --
1,209,229 UART: [ldev] ++
1,209,397 UART: [ldev] CDI.KEYID = 6
1,209,761 UART: [ldev] SUBJECT.KEYID = 5
1,210,188 UART: [ldev] AUTHORITY.KEYID = 7
1,210,651 UART: [ldev] FE.KEYID = 1
1,215,783 UART: [ldev] Erasing FE.KEYID = 1
1,241,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,923 UART: [ldev] --
1,281,197 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 114168 bytes
3,125,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,350 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,317,892 >>> mbox cmd response: success
3,318,943 UART: [afmc] ++
3,319,111 UART: [afmc] CDI.KEYID = 6
3,319,474 UART: [afmc] SUBJECT.KEYID = 7
3,319,900 UART: [afmc] AUTHORITY.KEYID = 5
3,355,964 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,049 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,759 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,649 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,360 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,170 UART: [afmc] --
3,399,224 UART: [cold-reset] --
3,400,102 UART: [state] Locking Datavault
3,401,229 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,833 UART: [state] Locking ICCM
3,402,345 UART: [exit] Launching FMC @ 0x40000130
3,407,674 UART:
3,407,690 UART: Running Caliptra FMC ...
3,408,098 UART:
3,408,241 UART: [state] CFI Enabled
3,419,011 UART: [fht] FMC Alias Private Key: 7
3,527,263 UART: [art] Extend RT PCRs Done
3,527,691 UART: [art] Lock RT PCRs Done
3,529,273 UART: [art] Populate DV Done
3,537,585 UART: [fht] FMC Alias Private Key: 7
3,538,689 UART: [art] Derive CDI
3,538,969 UART: [art] Store in in slot 0x4
3,624,186 UART: [art] Derive Key Pair
3,624,546 UART: [art] Store priv key in slot 0x5
3,637,544 UART: [art] Derive Key Pair - Done
3,652,369 UART: [art] Signing Cert with AUTHO
3,652,849 UART: RITY.KEYID = 7
3,668,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,978 UART: [art] PUB.X = ECB41AC162FA81D52E6ACD01B84A874CD828B83597947B5DBD06CFC1A37F3073901AFF4553C4DF622FD275040CB2F007
3,675,745 UART: [art] PUB.Y = 23A57799A42EBAB77E52B74F97020866FF27689A346C98016CD1B50E791CC5E97BAC70D78F6904712A245207582A4250
3,682,669 UART: [art] SIG.R = CCD6438E19C2D68D0FD4BBB2A2DF590E1D4D241CE0E2A7109F38F3AC5C49983C3B1686C53AF560A5972B439C1A8AB4F8
3,689,449 UART: [art] SIG.S = D139F786C646DF5F6D975F16C0FBB492F2B5D2D50CD06CA21A1B13FDCE3B59A6B1E846C84014154C575B82FE5D483A9D
3,713,103 UART: Caliptra RT
3,713,448 UART: [state] CFI Enabled
3,821,111 UART: [rt] RT listening for mailbox commands...
3,821,781 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,769 UART: [rt]cmd =0x41544d4e, len=14344
4,498,129 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,955 ready_for_fw is high
1,055,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,167,013 >>> mbox cmd response: success
3,229,288 UART:
3,229,304 UART: Running Caliptra FMC ...
3,229,712 UART:
3,229,855 UART: [state] CFI Enabled
3,240,369 UART: [fht] FMC Alias Private Key: 7
3,348,187 UART: [art] Extend RT PCRs Done
3,348,615 UART: [art] Lock RT PCRs Done
3,350,091 UART: [art] Populate DV Done
3,358,299 UART: [fht] FMC Alias Private Key: 7
3,359,239 UART: [art] Derive CDI
3,359,519 UART: [art] Store in in slot 0x4
3,445,284 UART: [art] Derive Key Pair
3,445,644 UART: [art] Store priv key in slot 0x5
3,458,746 UART: [art] Derive Key Pair - Done
3,473,549 UART: [art] Signing Cert with AUTHO
3,474,029 UART: RITY.KEYID = 7
3,489,145 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,910 UART: [art] PUB.X = E201A0F9535A44661530F2DAC37CC9A7D6F3E8312AEED17C9428EC02CCB42937555532CFDC34ED8A310A2A2461F2F2B9
3,496,681 UART: [art] PUB.Y = 42AD7B5452083DFCC30B1727DA37A47A9876791D927115D40D1DF915E6DE029F9FAD018E7D670CD7B083FC22D91C79E6
3,503,619 UART: [art] SIG.R = D59CEEF8BEA3B991A9186F91299A9C3EAE35731E250458FFFAF528E25813D232EC1463701AA474A502DFCAA890EB5F69
3,510,395 UART: [art] SIG.S = 9F6716C78050A90CD96FF8C325543F2F53482024CA462F67D50FE7F272CCF82220D4B9349B5B67AEA746D1048193F3CC
3,534,477 UART: Caliptra RT
3,534,822 UART: [state] CFI Enabled
3,643,687 UART: [rt] RT listening for mailbox commands...
3,644,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,667 UART: [rt]cmd =0x41544d4e, len=14344
4,332,806 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,020 UART:
192,410 UART: Running Caliptra ROM ...
193,742 UART:
193,893 UART: [state] CFI Enabled
265,238 UART: [state] LifecycleState = Unprovisioned
267,171 UART: [state] DebugLocked = No
269,270 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,988 UART: [kat] SHA2-256
444,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,162 UART: [kat] ++
455,646 UART: [kat] sha1
467,580 UART: [kat] SHA2-256
470,301 UART: [kat] SHA2-384
476,212 UART: [kat] SHA2-512-ACC
478,570 UART: [kat] ECC-384
2,765,934 UART: [kat] HMAC-384Kdf
2,799,833 UART: [kat] LMS
3,990,144 UART: [kat] --
3,993,639 UART: [cold-reset] ++
3,995,135 UART: [fht] Storing FHT @ 0x50003400
4,006,322 UART: [idev] ++
4,006,911 UART: [idev] CDI.KEYID = 6
4,007,947 UART: [idev] SUBJECT.KEYID = 7
4,009,122 UART: [idev] UDS.KEYID = 0
4,010,111 ready_for_fw is high
4,010,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,853 UART: [idev] Erasing UDS.KEYID = 0
7,346,839 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,606 UART: [idev] --
7,370,255 UART: [ldev] ++
7,370,815 UART: [ldev] CDI.KEYID = 6
7,371,779 UART: [ldev] SUBJECT.KEYID = 5
7,372,982 UART: [ldev] AUTHORITY.KEYID = 7
7,374,263 UART: [ldev] FE.KEYID = 1
7,420,172 UART: [ldev] Erasing FE.KEYID = 1
10,754,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,002 UART: [ldev] --
13,136,419 UART: [fwproc] Waiting for Commands...
13,138,230 UART: [fwproc] Received command 0x46574c44
13,140,402 UART: [fwproc] Received Image of size 113844 bytes
21,779,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,857,403 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,926,306 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,242,505 >>> mbox cmd response: success
22,246,095 UART: [afmc] ++
22,246,685 UART: [afmc] CDI.KEYID = 6
22,247,650 UART: [afmc] SUBJECT.KEYID = 7
22,248,863 UART: [afmc] AUTHORITY.KEYID = 5
25,614,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,910,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,912,544 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,927,050 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,941,799 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,956,055 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,977,221 UART: [afmc] --
27,981,088 UART: [cold-reset] --
27,984,729 UART: [state] Locking Datavault
27,991,318 UART: [state] Locking PCR0, PCR1 and PCR31
27,993,011 UART: [state] Locking ICCM
27,994,614 UART: [exit] Launching FMC @ 0x40000130
28,003,003 UART:
28,003,243 UART: Running Caliptra FMC ...
28,004,342 UART:
28,004,505 UART: [state] CFI Enabled
28,071,653 UART: [fht] FMC Alias Private Key: 7
30,410,532 UART: [art] Extend RT PCRs Done
30,411,746 UART: [art] Lock RT PCRs Done
30,413,523 UART: [art] Populate DV Done
30,418,929 UART: [fht] FMC Alias Private Key: 7
30,420,510 UART: [art] Derive CDI
30,421,315 UART: [art] Store in in slot 0x4
30,480,243 UART: [art] Derive Key Pair
30,481,276 UART: [art] Store priv key in slot 0x5
33,774,203 UART: [art] Derive Key Pair - Done
33,787,349 UART: [art] Signing Cert with AUTHO
33,788,683 UART: RITY.KEYID = 7
36,074,968 UART: [art] Erasing AUTHORITY.KEYID = 7
36,076,506 UART: [art] PUB.X = 0D77FA69C4F9A6B23F2C673A8237A78FF80A7BEB66094D491EF57A405333B464E78AD782BDF69160B90256C442962F7F
36,083,714 UART: [art] PUB.Y = 88B5B0E47742C00684A06EB299BD9988654F2F16E9BDB63753222FD1435F821071F7FDB81615261D92B1791A8C169D16
36,090,918 UART: [art] SIG.R = 629C810CF077095A48519768B5462DA90AE32F3F723AF85CC3047CBC65D866333BE2A941BC14AABC9D3EDD5271DFB0F7
36,098,348 UART: [art] SIG.S = 3A03CDFB60188EA0BDCBDA3E06C16F81E66DA491A5DBDBC60E2D4442005BAFEBECB007FBEF15AD42F41A100D83FD3594
37,403,929 UART: Caliptra RT
37,404,643 UART: [state] CFI Enabled
37,566,114 UART: [rt] RT listening for mailbox commands...
41,603,296 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,758,675 UART: [rt]cmd =0x41544d4e, len=14344
50,206,829 >>> mbox cmd response data (8 bytes)
50,210,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,240,264 UART: [rt]cmd =0x494e464f, len=4
50,244,773 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,804,589 ready_for_fw is high
3,804,955 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,399,841 >>> mbox cmd response: success
28,089,266 UART:
28,089,681 UART: Running Caliptra FMC ...
28,090,820 UART:
28,090,977 UART: [state] CFI Enabled
28,161,803 UART: [fht] FMC Alias Private Key: 7
30,500,052 UART: [art] Extend RT PCRs Done
30,501,277 UART: [art] Lock RT PCRs Done
30,503,030 UART: [art] Populate DV Done
30,508,279 UART: [fht] FMC Alias Private Key: 7
30,509,760 UART: [art] Derive CDI
30,510,517 UART: [art] Store in in slot 0x4
30,571,207 UART: [art] Derive Key Pair
30,572,242 UART: [art] Store priv key in slot 0x5
33,864,793 UART: [art] Derive Key Pair - Done
33,877,468 UART: [art] Signing Cert with AUTHO
33,878,762 UART: RITY.KEYID = 7
36,166,952 UART: [art] Erasing AUTHORITY.KEYID = 7
36,168,468 UART: [art] PUB.X = 1D136D3C3FED8B2DA4F3091D9E6928653BEB44F54C36D78BC0BA4D6A48BBC89268A1FD3B412016F89DC1CA1596C7F975
36,175,699 UART: [art] PUB.Y = BBF28869227C401B352922AD54C5E98FC6FB7667C27640F8F5EEA48899961B149E367020281D9257514EC664281553A5
36,182,957 UART: [art] SIG.R = 178AFF6B06622E0BC37628C8A1FA37F6C5B2D29926C3916BB4D916F4A8FEB33E7483166CBB115C6350F57C146114F981
36,190,296 UART: [art] SIG.S = D45F43AD630CDCFC84D6ECF4A009DBAAA9FE78E5C3F89CD1DA5E2206666A5536C61BC50016E2C3D6A94AA28C9DA28138
37,496,023 UART: Caliptra RT
37,496,745 UART: [state] CFI Enabled
37,657,387 UART: [rt] RT listening for mailbox commands...
41,692,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,847,805 UART: [rt]cmd =0x41544d4e, len=14344
50,503,166 >>> mbox cmd response data (8 bytes)
50,506,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,536,443 UART: [rt]cmd =0x494e464f, len=4
50,540,713 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,455 UART:
192,825 UART: Running Caliptra ROM ...
194,024 UART:
603,637 UART: [state] CFI Enabled
618,024 UART: [state] LifecycleState = Unprovisioned
619,972 UART: [state] DebugLocked = No
622,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,436 UART: [kat] SHA2-256
797,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,682 UART: [kat] ++
808,280 UART: [kat] sha1
819,327 UART: [kat] SHA2-256
822,048 UART: [kat] SHA2-384
827,269 UART: [kat] SHA2-512-ACC
829,641 UART: [kat] ECC-384
3,115,750 UART: [kat] HMAC-384Kdf
3,126,917 UART: [kat] LMS
4,317,025 UART: [kat] --
4,320,126 UART: [cold-reset] ++
4,322,415 UART: [fht] Storing FHT @ 0x50003400
4,333,830 UART: [idev] ++
4,334,394 UART: [idev] CDI.KEYID = 6
4,335,308 UART: [idev] SUBJECT.KEYID = 7
4,336,562 UART: [idev] UDS.KEYID = 0
4,337,602 ready_for_fw is high
4,337,809 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,787 UART: [idev] Erasing UDS.KEYID = 0
7,626,044 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,639 UART: [idev] --
7,652,233 UART: [ldev] ++
7,652,803 UART: [ldev] CDI.KEYID = 6
7,653,762 UART: [ldev] SUBJECT.KEYID = 5
7,654,973 UART: [ldev] AUTHORITY.KEYID = 7
7,656,257 UART: [ldev] FE.KEYID = 1
7,668,155 UART: [ldev] Erasing FE.KEYID = 1
10,958,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,570 UART: [ldev] --
13,318,778 UART: [fwproc] Waiting for Commands...
13,321,625 UART: [fwproc] Received command 0x46574c44
13,323,825 UART: [fwproc] Received Image of size 113844 bytes
22,348,746 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,432,988 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,501,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,818,506 >>> mbox cmd response: success
22,822,644 UART: [afmc] ++
22,823,254 UART: [afmc] CDI.KEYID = 6
22,824,171 UART: [afmc] SUBJECT.KEYID = 7
22,825,396 UART: [afmc] AUTHORITY.KEYID = 5
26,139,926 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,434,449 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,436,716 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,451,242 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,465,981 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,480,254 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,500,921 UART: [afmc] --
28,504,693 UART: [cold-reset] --
28,508,026 UART: [state] Locking Datavault
28,513,343 UART: [state] Locking PCR0, PCR1 and PCR31
28,515,098 UART: [state] Locking ICCM
28,516,334 UART: [exit] Launching FMC @ 0x40000130
28,524,725 UART:
28,524,961 UART: Running Caliptra FMC ...
28,526,061 UART:
28,526,228 UART: [state] CFI Enabled
28,534,360 UART: [fht] FMC Alias Private Key: 7
30,864,905 UART: [art] Extend RT PCRs Done
30,866,130 UART: [art] Lock RT PCRs Done
30,867,919 UART: [art] Populate DV Done
30,873,278 UART: [fht] FMC Alias Private Key: 7
30,874,771 UART: [art] Derive CDI
30,875,535 UART: [art] Store in in slot 0x4
30,917,823 UART: [art] Derive Key Pair
30,918,848 UART: [art] Store priv key in slot 0x5
34,160,429 UART: [art] Derive Key Pair - Done
34,173,690 UART: [art] Signing Cert with AUTHO
34,174,993 UART: RITY.KEYID = 7
36,454,713 UART: [art] Erasing AUTHORITY.KEYID = 7
36,456,214 UART: [art] PUB.X = 1596F2579AAC455989FDF45FDC2A52B070AD853042ED2FC5EA1406BF0B63C77445DDED9838F2346498D57B6A2F7089E2
36,463,490 UART: [art] PUB.Y = F3F4B30C54F9BDE2DE8021ADFAD96334A00E898B73068B5914339D6867BE26C2E6015C6D42F6F6CF4F9AD71516B15E56
36,470,697 UART: [art] SIG.R = 8C7C0F46218921A43902F1EAD3784308343BA2E41371EB56D33525AC1A11B8B9571274B50CBD90123A76140EAD820E2B
36,478,116 UART: [art] SIG.S = D544C6BB5BE6E112D45990DC985FF8D560552CCC60164411C2088178CE363FD05FB6D49ED5F6B0AF8B1A2B854A08CE5F
37,783,592 UART: Caliptra RT
37,784,307 UART: [state] CFI Enabled
37,901,779 UART: [rt] RT listening for mailbox commands...
42,074,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,229,694 UART: [rt]cmd =0x41544d4e, len=14344
50,704,034 >>> mbox cmd response data (8 bytes)
50,707,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,737,231 UART: [rt]cmd =0x494e464f, len=4
50,741,475 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,128,987 ready_for_fw is high
4,129,570 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,974,344 >>> mbox cmd response: success
27,614,160 UART:
27,614,602 UART: Running Caliptra FMC ...
27,615,714 UART:
27,615,862 UART: [state] CFI Enabled
27,623,822 UART: [fht] FMC Alias Private Key: 7
29,954,186 UART: [art] Extend RT PCRs Done
29,955,424 UART: [art] Lock RT PCRs Done
29,957,038 UART: [art] Populate DV Done
29,962,510 UART: [fht] FMC Alias Private Key: 7
29,964,212 UART: [art] Derive CDI
29,964,952 UART: [art] Store in in slot 0x4
30,007,610 UART: [art] Derive Key Pair
30,008,662 UART: [art] Store priv key in slot 0x5
33,251,205 UART: [art] Derive Key Pair - Done
33,264,357 UART: [art] Signing Cert with AUTHO
33,265,661 UART: RITY.KEYID = 7
35,545,130 UART: [art] Erasing AUTHORITY.KEYID = 7
35,546,639 UART: [art] PUB.X = ACB26FFBFBF5AE2E75634E32EA46B305B86736C8F61A307F2F079279759C16F09462B8C66AF43C9559E9F98906ED6885
35,553,850 UART: [art] PUB.Y = 90762FCB112B49E1E2B50ADA805F5FFAD1B271AABA723C54E7952266C0B197C3606E6E0C933623FE352D881D0E75D229
35,561,095 UART: [art] SIG.R = 64A978F6B1453D0995D72FC30F5BD9D7F877725AD98D78C6A38FE318640936D0F46842DB9F8FAE09F022189D585D9585
35,568,496 UART: [art] SIG.S = B1EF56A9E518553E5D2863C36519FFF149B9F824F26943377B8AFF619D0ED6CBA4E20A7CFC3547671EB477A5B899138A
36,874,428 UART: Caliptra RT
36,875,149 UART: [state] CFI Enabled
36,993,406 UART: [rt] RT listening for mailbox commands...
41,168,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,323,967 UART: [rt]cmd =0x41544d4e, len=14344
49,616,802 >>> mbox cmd response data (8 bytes)
49,620,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,650,079 UART: [rt]cmd =0x494e464f, len=4
49,654,317 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,147 UART:
192,516 UART: Running Caliptra ROM ...
193,714 UART:
193,868 UART: [state] CFI Enabled
261,477 UART: [state] LifecycleState = Unprovisioned
263,397 UART: [state] DebugLocked = No
266,350 UART: [state] WD Timer not started. Device not locked for debugging
269,897 UART: [kat] SHA2-256
449,028 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,641 UART: [kat] ++
461,088 UART: [kat] sha1
472,069 UART: [kat] SHA2-256
475,056 UART: [kat] SHA2-384
480,206 UART: [kat] SHA2-512-ACC
483,223 UART: [kat] ECC-384
2,946,516 UART: [kat] HMAC-384Kdf
2,970,263 UART: [kat] LMS
3,499,776 UART: [kat] --
3,504,121 UART: [cold-reset] ++
3,506,731 UART: [fht] FHT @ 0x50003400
3,517,148 UART: [idev] ++
3,517,732 UART: [idev] CDI.KEYID = 6
3,518,657 UART: [idev] SUBJECT.KEYID = 7
3,519,839 UART: [idev] UDS.KEYID = 0
3,520,762 ready_for_fw is high
3,520,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,387 UART: [idev] Erasing UDS.KEYID = 0
6,024,226 UART: [idev] Sha1 KeyId Algorithm
6,047,784 UART: [idev] --
6,051,780 UART: [ldev] ++
6,052,353 UART: [ldev] CDI.KEYID = 6
6,053,269 UART: [ldev] SUBJECT.KEYID = 5
6,054,430 UART: [ldev] AUTHORITY.KEYID = 7
6,055,717 UART: [ldev] FE.KEYID = 1
6,098,513 UART: [ldev] Erasing FE.KEYID = 1
8,600,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,618 UART: [ldev] --
10,411,910 UART: [fwproc] Wait for Commands...
10,414,004 UART: [fwproc] Recv command 0x46574c44
10,416,098 UART: [fwproc] Recv'd Img size: 114168 bytes
14,993,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,074,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,142,732 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,460,407 >>> mbox cmd response: success
15,465,234 UART: [afmc] ++
15,465,835 UART: [afmc] CDI.KEYID = 6
15,466,725 UART: [afmc] SUBJECT.KEYID = 7
15,467,940 UART: [afmc] AUTHORITY.KEYID = 5
18,000,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,722,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,724,308 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,740,224 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,756,212 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,771,957 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,794,053 UART: [afmc] --
19,797,108 UART: [cold-reset] --
19,802,488 UART: [state] Locking Datavault
19,808,654 UART: [state] Locking PCR0, PCR1 and PCR31
19,810,303 UART: [state] Locking ICCM
19,812,621 UART: [exit] Launching FMC @ 0x40000130
19,821,076 UART:
19,821,322 UART: Running Caliptra FMC ...
19,822,428 UART:
19,822,588 UART: [state] CFI Enabled
19,881,760 UART: [fht] FMC Alias Private Key: 7
21,645,242 UART: [art] Extend RT PCRs Done
21,646,455 UART: [art] Lock RT PCRs Done
21,648,158 UART: [art] Populate DV Done
21,653,350 UART: [fht] FMC Alias Private Key: 7
21,654,882 UART: [art] Derive CDI
21,655,618 UART: [art] Store in in slot 0x4
21,713,536 UART: [art] Derive Key Pair
21,714,576 UART: [art] Store priv key in slot 0x5
24,177,402 UART: [art] Derive Key Pair - Done
24,190,288 UART: [art] Signing Cert with AUTHO
24,191,586 UART: RITY.KEYID = 7
25,903,392 UART: [art] Erasing AUTHORITY.KEYID = 7
25,904,906 UART: [art] PUB.X = C734FBF7E1B241751815C5FA431705A374A638C68EDDE59BFE47A68E18256463E48CA78DE75175E21727768ADAA301BC
25,912,171 UART: [art] PUB.Y = 7801B4627B28651537D4695C7757419146648D358486D058B97AEB54D9C23FD039E8B2AB6F58E8180619250B6D7E674D
25,919,358 UART: [art] SIG.R = 9C5CC2E19461B7DA90B99344E868CFAA3818A0E34BF3A50219CDA74E925704DA93AB88B7094C253B2C81848D362911D5
25,926,758 UART: [art] SIG.S = 380355A729A38C0D7D8F251AD560FC845C1600E2D9457C3569FB0B72C27580978492BB23EEF717D80FD7B73FFE75464A
26,905,238 UART: Caliptra RT
26,905,922 UART: [state] CFI Enabled
27,071,570 UART: [rt] RT listening for mailbox commands...
31,109,475 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,264,909 UART: [rt]cmd =0x41544d4e, len=14344
36,129,330 >>> mbox cmd response data (8 bytes)
36,132,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,162,303 UART: [rt]cmd =0x494e464f, len=4
36,166,542 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,382,744 ready_for_fw is high
3,383,186 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,021,871 >>> mbox cmd response: success
19,305,817 UART:
19,306,227 UART: Running Caliptra FMC ...
19,307,348 UART:
19,307,511 UART: [state] CFI Enabled
19,369,023 UART: [fht] FMC Alias Private Key: 7
21,133,229 UART: [art] Extend RT PCRs Done
21,134,454 UART: [art] Lock RT PCRs Done
21,136,192 UART: [art] Populate DV Done
21,141,333 UART: [fht] FMC Alias Private Key: 7
21,142,821 UART: [art] Derive CDI
21,143,562 UART: [art] Store in in slot 0x4
21,201,516 UART: [art] Derive Key Pair
21,202,535 UART: [art] Store priv key in slot 0x5
23,665,477 UART: [art] Derive Key Pair - Done
23,678,145 UART: [art] Signing Cert with AUTHO
23,679,449 UART: RITY.KEYID = 7
25,390,582 UART: [art] Erasing AUTHORITY.KEYID = 7
25,392,097 UART: [art] PUB.X = D7FDE15BC57E52D5B9986828F8B05F7C18459BB99C1F9BC8DF928E0195C2F9B9C2D8ED8574F6480DD95F8B9FA175BCD3
25,399,396 UART: [art] PUB.Y = EFD9734FF48E4ACE03FC7F14350F7E42F410410D68FF921C27B02E98D51B879BA60C14E90B595279D4214C7F94572258
25,406,634 UART: [art] SIG.R = BB3E20CA1A08122C44E066865E8835BEC41E923A34C9BED366EFAEC0E356EBCFF7D171147D1C6718BDBE1DD03A3D7445
25,414,070 UART: [art] SIG.S = 29F058298FA0024CFB35D7A67403BB2B7D4C008A06B31C0124BC3D1D17FA11F5B90A5FE7954A739F15D97E5BCA9B4E74
26,392,652 UART: Caliptra RT
26,393,347 UART: [state] CFI Enabled
26,557,061 UART: [rt] RT listening for mailbox commands...
30,595,673 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,751,081 UART: [rt]cmd =0x41544d4e, len=14344
35,598,946 >>> mbox cmd response data (8 bytes)
35,602,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
35,632,360 UART: [rt]cmd =0x494e464f, len=4
35,636,741 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,790 writing to cptra_bootfsm_go
193,018 UART:
193,402 UART: Running Caliptra ROM ...
194,595 UART:
604,071 UART: [state] CFI Enabled
618,948 UART: [state] LifecycleState = Unprovisioned
620,823 UART: [state] DebugLocked = No
623,267 UART: [state] WD Timer not started. Device not locked for debugging
627,300 UART: [kat] SHA2-256
806,399 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,975 UART: [kat] ++
818,422 UART: [kat] sha1
828,266 UART: [kat] SHA2-256
831,303 UART: [kat] SHA2-384
838,078 UART: [kat] SHA2-512-ACC
841,028 UART: [kat] ECC-384
3,283,609 UART: [kat] HMAC-384Kdf
3,295,768 UART: [kat] LMS
3,825,284 UART: [kat] --
3,831,108 UART: [cold-reset] ++
3,833,395 UART: [fht] FHT @ 0x50003400
3,843,166 UART: [idev] ++
3,843,728 UART: [idev] CDI.KEYID = 6
3,844,723 UART: [idev] SUBJECT.KEYID = 7
3,845,893 UART: [idev] UDS.KEYID = 0
3,846,819 ready_for_fw is high
3,847,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,457 UART: [idev] Erasing UDS.KEYID = 0
6,321,166 UART: [idev] Sha1 KeyId Algorithm
6,344,786 UART: [idev] --
6,348,536 UART: [ldev] ++
6,349,113 UART: [ldev] CDI.KEYID = 6
6,350,024 UART: [ldev] SUBJECT.KEYID = 5
6,351,183 UART: [ldev] AUTHORITY.KEYID = 7
6,352,465 UART: [ldev] FE.KEYID = 1
6,363,867 UART: [ldev] Erasing FE.KEYID = 1
8,836,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,609 UART: [ldev] --
10,626,468 UART: [fwproc] Wait for Commands...
10,629,100 UART: [fwproc] Recv command 0x46574c44
10,631,210 UART: [fwproc] Recv'd Img size: 114168 bytes
15,215,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,295,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,364,410 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,680,993 >>> mbox cmd response: success
15,685,129 UART: [afmc] ++
15,685,725 UART: [afmc] CDI.KEYID = 6
15,686,614 UART: [afmc] SUBJECT.KEYID = 7
15,687,826 UART: [afmc] AUTHORITY.KEYID = 5
18,190,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,912,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,913,988 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,929,977 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,945,916 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,961,668 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,984,108 UART: [afmc] --
19,988,690 UART: [cold-reset] --
19,993,197 UART: [state] Locking Datavault
19,996,886 UART: [state] Locking PCR0, PCR1 and PCR31
19,998,548 UART: [state] Locking ICCM
20,000,537 UART: [exit] Launching FMC @ 0x40000130
20,008,992 UART:
20,009,237 UART: Running Caliptra FMC ...
20,010,344 UART:
20,010,509 UART: [state] CFI Enabled
20,018,397 UART: [fht] FMC Alias Private Key: 7
21,775,429 UART: [art] Extend RT PCRs Done
21,776,650 UART: [art] Lock RT PCRs Done
21,778,366 UART: [art] Populate DV Done
21,783,673 UART: [fht] FMC Alias Private Key: 7
21,785,193 UART: [art] Derive CDI
21,785,934 UART: [art] Store in in slot 0x4
21,828,542 UART: [art] Derive Key Pair
21,829,543 UART: [art] Store priv key in slot 0x5
24,256,400 UART: [art] Derive Key Pair - Done
24,269,598 UART: [art] Signing Cert with AUTHO
24,270,933 UART: RITY.KEYID = 7
25,975,936 UART: [art] Erasing AUTHORITY.KEYID = 7
25,977,450 UART: [art] PUB.X = AA3A5C05F1FD5573523222629FD840D1A0CA794E7AB2822396CA537CFACA646AF17EF246E7AA493B2874C5D4A7F19BE5
25,984,665 UART: [art] PUB.Y = DBEB3A79601DE5233B5E075BCACB658F1D5C8E430B6D99A2B34ACB671216B6CC6B432C9C82AC041922E2F79363AF0DEE
25,991,967 UART: [art] SIG.R = 2FA274CA30544025E349E83C35064638755ABB86F365912D3AD0C06D8F9FC137619F116DD769DDEBA5938616199F5EB9
25,999,361 UART: [art] SIG.S = 61C720C2528E720BBEFDBD650CA1928D84F5488F64BEF49406C500BDEF7C0D3C02C56E21FA29B75844F8AC7E1C6025B3
26,978,289 UART: Caliptra RT
26,978,981 UART: [state] CFI Enabled
27,097,093 UART: [rt] RT listening for mailbox commands...
31,137,140 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,292,799 UART: [rt]cmd =0x41544d4e, len=14344
36,154,083 >>> mbox cmd response data (8 bytes)
36,157,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,187,349 UART: [rt]cmd =0x494e464f, len=4
36,191,613 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,777 writing to cptra_bootfsm_go
3,701,936 ready_for_fw is high
3,702,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,273,696 >>> mbox cmd response: success
19,522,661 UART:
19,523,055 UART: Running Caliptra FMC ...
19,524,161 UART:
19,524,316 UART: [state] CFI Enabled
19,531,973 UART: [fht] FMC Alias Private Key: 7
21,289,283 UART: [art] Extend RT PCRs Done
21,290,518 UART: [art] Lock RT PCRs Done
21,292,129 UART: [art] Populate DV Done
21,297,488 UART: [fht] FMC Alias Private Key: 7
21,299,201 UART: [art] Derive CDI
21,299,944 UART: [art] Store in in slot 0x4
21,342,653 UART: [art] Derive Key Pair
21,343,655 UART: [art] Store priv key in slot 0x5
23,770,100 UART: [art] Derive Key Pair - Done
23,783,291 UART: [art] Signing Cert with AUTHO
23,784,631 UART: RITY.KEYID = 7
25,490,117 UART: [art] Erasing AUTHORITY.KEYID = 7
25,491,631 UART: [art] PUB.X = F336683154A0567F393B6E5D92B45CA5C1B8DB7B3C86D354B16240F464D31FCE43D5D053B9408BAF5A7B5D57973AB17F
25,498,941 UART: [art] PUB.Y = 44525E674D1931745EBB69ACCE448F047038F112A7087A184C9B07AC3451B893E72175A5DF5C816185CF69E436F0F904
25,506,140 UART: [art] SIG.R = 96539FF95C39E21E4916982759989BBE81FDB8CD720C2FB9782BBC7750DA0ECF645C4D98CBFAE80AD1DD86D60AF480C1
25,513,600 UART: [art] SIG.S = 11456F83F222898042FF8AAC29638B2444E828C9723D2DD67670CD7DE8FA30341C17B9FAE548E29E24B56B50F5F784BB
26,492,050 UART: Caliptra RT
26,492,895 UART: [state] CFI Enabled
26,609,366 UART: [rt] RT listening for mailbox commands...
30,642,512 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,798,143 UART: [rt]cmd =0x41544d4e, len=14344
35,646,588 >>> mbox cmd response data (8 bytes)
35,650,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
35,679,922 UART: [rt]cmd =0x494e464f, len=4
35,684,218 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,063 UART:
192,430 UART: Running Caliptra ROM ...
193,558 UART:
193,709 UART: [state] CFI Enabled
260,202 UART: [state] LifecycleState = Unprovisioned
262,617 UART: [state] DebugLocked = No
265,005 UART: [state] WD Timer not started. Device not locked for debugging
269,999 UART: [kat] SHA2-256
459,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,612 UART: [kat] ++
471,064 UART: [kat] sha1
483,506 UART: [kat] SHA2-256
486,520 UART: [kat] SHA2-384
491,739 UART: [kat] SHA2-512-ACC
494,319 UART: [kat] ECC-384
2,948,564 UART: [kat] HMAC-384Kdf
2,971,522 UART: [kat] LMS
3,503,295 UART: [kat] --
3,508,314 UART: [cold-reset] ++
3,509,471 UART: [fht] FHT @ 0x50003400
3,520,975 UART: [idev] ++
3,521,686 UART: [idev] CDI.KEYID = 6
3,522,670 UART: [idev] SUBJECT.KEYID = 7
3,523,847 UART: [idev] UDS.KEYID = 0
3,524,775 ready_for_fw is high
3,524,975 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,581 UART: [idev] Erasing UDS.KEYID = 0
6,026,008 UART: [idev] Sha1 KeyId Algorithm
6,047,834 UART: [idev] --
6,051,551 UART: [ldev] ++
6,052,274 UART: [ldev] CDI.KEYID = 6
6,053,195 UART: [ldev] SUBJECT.KEYID = 5
6,054,365 UART: [ldev] AUTHORITY.KEYID = 7
6,055,497 UART: [ldev] FE.KEYID = 1
6,101,923 UART: [ldev] Erasing FE.KEYID = 1
8,607,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,535 UART: [ldev] --
10,415,525 UART: [fwproc] Wait for Commands...
10,417,677 UART: [fwproc] Recv command 0x46574c44
10,419,989 UART: [fwproc] Recv'd Img size: 114168 bytes
15,066,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,143,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,259,853 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,801,444 >>> mbox cmd response: success
15,806,188 UART: [afmc] ++
15,806,905 UART: [afmc] CDI.KEYID = 6
15,808,104 UART: [afmc] SUBJECT.KEYID = 7
15,809,588 UART: [afmc] AUTHORITY.KEYID = 5
18,345,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,071,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,073,026 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,088,086 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,103,290 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,118,112 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,142,123 UART: [afmc] --
20,145,724 UART: [cold-reset] --
20,148,852 UART: [state] Locking Datavault
20,153,907 UART: [state] Locking PCR0, PCR1 and PCR31
20,156,068 UART: [state] Locking ICCM
20,157,469 UART: [exit] Launching FMC @ 0x40000130
20,166,155 UART:
20,166,389 UART: Running Caliptra FMC ...
20,167,493 UART:
20,167,655 UART: [state] CFI Enabled
20,225,547 UART: [fht] FMC Alias Private Key: 7
21,989,167 UART: [art] Extend RT PCRs Done
21,990,398 UART: [art] Lock RT PCRs Done
21,992,322 UART: [art] Populate DV Done
21,997,696 UART: [fht] FMC Alias Private Key: 7
21,999,340 UART: [art] Derive CDI
22,000,158 UART: [art] Store in in slot 0x4
22,059,215 UART: [art] Derive Key Pair
22,060,267 UART: [art] Store priv key in slot 0x5
24,523,237 UART: [art] Derive Key Pair - Done
24,536,325 UART: [art] Signing Cert with AUTHO
24,537,666 UART: RITY.KEYID = 7
26,248,599 UART: [art] Erasing AUTHORITY.KEYID = 7
26,250,104 UART: [art] PUB.X = 42AACE9C105660189266491164EF817E9265D0525E43EFD099DA135E3BEC6DB83241712869DD38C7B516225A3E07410D
26,257,365 UART: [art] PUB.Y = CB5747D774419D5835B916F6C6A85D68B5400A9051E588421A3F045923A3E1B4E274F712E2845CF0A00739B69A75F32C
26,264,564 UART: [art] SIG.R = 031F1F4D3574203C7C6FBFE26F4645999A81B2BC8CFE93891DF5845C6D2D520D39950A61EF001F4FFC4B5017D5ABA09A
26,272,011 UART: [art] SIG.S = F7138A1180D70698F2794C0A3A5C36589C12422EC6ABC8811BE9F1D430ABDF23D05D3B512D9D59AD4763B2BE6D2B7C16
27,250,643 UART: Caliptra RT
27,251,329 UART: [state] CFI Enabled
27,415,786 UART: [rt] RT listening for mailbox commands...
31,464,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,620,530 UART: [rt]cmd =0x41544d4e, len=14344
36,478,162 >>> mbox cmd response data (8 bytes)
36,481,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,511,494 UART: [rt]cmd =0x494e464f, len=4
36,515,633 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,414,614 ready_for_fw is high
3,415,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,806,980 >>> mbox cmd response: success
20,092,586 UART:
20,093,001 UART: Running Caliptra FMC ...
20,094,141 UART:
20,094,309 UART: [state] CFI Enabled
20,158,200 UART: [fht] FMC Alias Private Key: 7
21,922,338 UART: [art] Extend RT PCRs Done
21,923,557 UART: [art] Lock RT PCRs Done
21,925,294 UART: [art] Populate DV Done
21,930,764 UART: [fht] FMC Alias Private Key: 7
21,932,271 UART: [art] Derive CDI
21,933,037 UART: [art] Store in in slot 0x4
21,991,303 UART: [art] Derive Key Pair
21,992,340 UART: [art] Store priv key in slot 0x5
24,455,343 UART: [art] Derive Key Pair - Done
24,468,439 UART: [art] Signing Cert with AUTHO
24,469,741 UART: RITY.KEYID = 7
26,181,547 UART: [art] Erasing AUTHORITY.KEYID = 7
26,183,053 UART: [art] PUB.X = 9EC97845649A5D4B6EBD5AB061F9C3D51F73613E4CDC6A938BDD74CF6D4C70CB5E51F7FC2E24369A10A8128AA081C48B
26,190,288 UART: [art] PUB.Y = DF7596C70AB5AB31C1C33D6BED618038BCC26E72BF35B4329CCAACBDECE2DB4491464E52207B7D9200BB0828D725E58B
26,197,570 UART: [art] SIG.R = C243A2AD62716C7544EF692C3B31E43DEA70BD72C3B3C01013C9C890438D901C2A0DEF3347B073C4B571B422AA70FE3E
26,204,991 UART: [art] SIG.S = 56464F97A78AD6B4245DE79B8943D145846CFB9225D2D6AA34221DB23E1D8C4E0D9483324AFC10282898AF11F911E9DC
27,184,187 UART: Caliptra RT
27,184,895 UART: [state] CFI Enabled
27,350,040 UART: [rt] RT listening for mailbox commands...
31,391,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,547,152 UART: [rt]cmd =0x41544d4e, len=14344
36,397,831 >>> mbox cmd response data (8 bytes)
36,401,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,430,963 UART: [rt]cmd =0x494e464f, len=4
36,435,367 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,680 writing to cptra_bootfsm_go
193,001 UART:
193,404 UART: Running Caliptra ROM ...
194,528 UART:
603,936 UART: [state] CFI Enabled
617,394 UART: [state] LifecycleState = Unprovisioned
619,759 UART: [state] DebugLocked = No
621,648 UART: [state] WD Timer not started. Device not locked for debugging
626,402 UART: [kat] SHA2-256
816,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,097 UART: [kat] ++
827,621 UART: [kat] sha1
838,632 UART: [kat] SHA2-256
841,605 UART: [kat] SHA2-384
847,490 UART: [kat] SHA2-512-ACC
850,075 UART: [kat] ECC-384
3,290,760 UART: [kat] HMAC-384Kdf
3,303,840 UART: [kat] LMS
3,835,668 UART: [kat] --
3,839,519 UART: [cold-reset] ++
3,841,446 UART: [fht] FHT @ 0x50003400
3,851,852 UART: [idev] ++
3,852,487 UART: [idev] CDI.KEYID = 6
3,853,438 UART: [idev] SUBJECT.KEYID = 7
3,854,683 UART: [idev] UDS.KEYID = 0
3,855,585 ready_for_fw is high
3,855,776 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,999,201 UART: [idev] Erasing UDS.KEYID = 0
6,332,744 UART: [idev] Sha1 KeyId Algorithm
6,355,219 UART: [idev] --
6,360,618 UART: [ldev] ++
6,361,332 UART: [ldev] CDI.KEYID = 6
6,362,251 UART: [ldev] SUBJECT.KEYID = 5
6,363,413 UART: [ldev] AUTHORITY.KEYID = 7
6,364,608 UART: [ldev] FE.KEYID = 1
6,373,854 UART: [ldev] Erasing FE.KEYID = 1
8,850,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,625 UART: [ldev] --
10,644,864 UART: [fwproc] Wait for Commands...
10,647,060 UART: [fwproc] Recv command 0x46574c44
10,649,379 UART: [fwproc] Recv'd Img size: 114168 bytes
15,262,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,346,678 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,462,832 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,003,518 >>> mbox cmd response: success
16,007,866 UART: [afmc] ++
16,008,603 UART: [afmc] CDI.KEYID = 6
16,009,795 UART: [afmc] SUBJECT.KEYID = 7
16,011,234 UART: [afmc] AUTHORITY.KEYID = 5
18,516,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,239,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,241,627 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,256,706 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,271,884 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,286,771 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,310,957 UART: [afmc] --
20,314,391 UART: [cold-reset] --
20,319,873 UART: [state] Locking Datavault
20,326,040 UART: [state] Locking PCR0, PCR1 and PCR31
20,328,229 UART: [state] Locking ICCM
20,329,838 UART: [exit] Launching FMC @ 0x40000130
20,338,509 UART:
20,338,770 UART: Running Caliptra FMC ...
20,339,877 UART:
20,340,039 UART: [state] CFI Enabled
20,348,144 UART: [fht] FMC Alias Private Key: 7
22,104,813 UART: [art] Extend RT PCRs Done
22,106,031 UART: [art] Lock RT PCRs Done
22,107,495 UART: [art] Populate DV Done
22,113,233 UART: [fht] FMC Alias Private Key: 7
22,114,771 UART: [art] Derive CDI
22,115,509 UART: [art] Store in in slot 0x4
22,157,940 UART: [art] Derive Key Pair
22,158,977 UART: [art] Store priv key in slot 0x5
24,585,580 UART: [art] Derive Key Pair - Done
24,598,850 UART: [art] Signing Cert with AUTHO
24,600,157 UART: RITY.KEYID = 7
26,305,663 UART: [art] Erasing AUTHORITY.KEYID = 7
26,307,195 UART: [art] PUB.X = 831F520E6D643D97C2BFAEB20581D54C46CAEE66019C2942727AE5C5CA1B05DC4A8E9CAA77AC340EDF58148ACB9C943B
26,314,510 UART: [art] PUB.Y = C99500325F63033FECB7DA023CE0BEDFA6096B957358E986331047D2D80B3F24BDE946ABCB54450D04AE4185D3ED9011
26,321,744 UART: [art] SIG.R = 2582714A56506CF6DB5D9E9BE674A437AC5AAC178037E08F31CFE4E5BFA9A92AFEA47E21EA9B6E710B8BF9A37E0DF939
26,329,137 UART: [art] SIG.S = 40B961FC02B5FF95368DB5A77DC000BB9B055676BACF7378C792505F5EC174878649FFCCD16458CEE64C9F1A4CD15556
27,308,375 UART: Caliptra RT
27,309,063 UART: [state] CFI Enabled
27,426,461 UART: [rt] RT listening for mailbox commands...
31,465,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,621,181 UART: [rt]cmd =0x41544d4e, len=14344
36,488,473 >>> mbox cmd response data (8 bytes)
36,492,394 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,522,496 UART: [rt]cmd =0x494e464f, len=4
36,526,726 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,635 writing to cptra_bootfsm_go
3,756,315 ready_for_fw is high
3,756,703 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,060,693 >>> mbox cmd response: success
20,314,835 UART:
20,315,222 UART: Running Caliptra FMC ...
20,316,353 UART:
20,316,516 UART: [state] CFI Enabled
20,324,300 UART: [fht] FMC Alias Private Key: 7
22,081,716 UART: [art] Extend RT PCRs Done
22,082,940 UART: [art] Lock RT PCRs Done
22,084,889 UART: [art] Populate DV Done
22,090,203 UART: [fht] FMC Alias Private Key: 7
22,091,884 UART: [art] Derive CDI
22,092,707 UART: [art] Store in in slot 0x4
22,135,304 UART: [art] Derive Key Pair
22,136,305 UART: [art] Store priv key in slot 0x5
24,563,644 UART: [art] Derive Key Pair - Done
24,576,416 UART: [art] Signing Cert with AUTHO
24,577,711 UART: RITY.KEYID = 7
26,283,369 UART: [art] Erasing AUTHORITY.KEYID = 7
26,284,878 UART: [art] PUB.X = 93799327150611B6F1469B08FD9936E503EF8DC46622B6B26761E22B21D345C73D72A80A079A272EE418DC788D9E8B5C
26,292,120 UART: [art] PUB.Y = 012174C6BB92241633B7311ADA66D64C3C353FB2E3A52E9131929E7429839C19FB2F91E581DB2822BF484F77DF3FBB30
26,299,346 UART: [art] SIG.R = 4AF54EF1FA6709398B27CC2AB369292665D06A686C5639231990999939A8CA096E93367A8326AE5375D4A0D8E8860EC3
26,306,746 UART: [art] SIG.S = 3ADCF53A8C7647114F479A16ABE1EDE8ABD3F112F8475A664B73AD066F73BB501E45A258B0D58B656443B509DD139EBF
27,285,651 UART: Caliptra RT
27,286,359 UART: [state] CFI Enabled
27,402,986 UART: [rt] RT listening for mailbox commands...
31,438,833 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,594,482 UART: [rt]cmd =0x41544d4e, len=14344
36,443,343 >>> mbox cmd response data (8 bytes)
36,446,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,476,770 UART: [rt]cmd =0x494e464f, len=4
36,481,092 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,995 UART: [kat] SHA2-256
881,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,041 UART: [kat] ++
886,193 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
902,898 UART: [kat] HMAC-384Kdf
907,532 UART: [kat] LMS
1,475,728 UART: [kat] --
1,476,767 UART: [cold-reset] ++
1,477,311 UART: [fht] Storing FHT @ 0x50003400
1,480,268 UART: [idev] ++
1,480,436 UART: [idev] CDI.KEYID = 6
1,480,796 UART: [idev] SUBJECT.KEYID = 7
1,481,220 UART: [idev] UDS.KEYID = 0
1,481,565 ready_for_fw is high
1,481,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,388 UART: [idev] Erasing UDS.KEYID = 0
1,505,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,446 UART: [idev] --
1,515,559 UART: [ldev] ++
1,515,727 UART: [ldev] CDI.KEYID = 6
1,516,090 UART: [ldev] SUBJECT.KEYID = 5
1,516,516 UART: [ldev] AUTHORITY.KEYID = 7
1,516,979 UART: [ldev] FE.KEYID = 1
1,522,281 UART: [ldev] Erasing FE.KEYID = 1
1,547,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,422 UART: [ldev] --
1,586,781 UART: [fwproc] Waiting for Commands...
1,587,598 UART: [fwproc] Received command 0x46574c44
1,588,389 UART: [fwproc] Received Image of size 114168 bytes
5,120,958 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,148,588 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,177,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,313,665 >>> mbox cmd response: success
5,314,923 UART: [afmc] ++
5,315,091 UART: [afmc] CDI.KEYID = 6
5,315,453 UART: [afmc] SUBJECT.KEYID = 7
5,315,878 UART: [afmc] AUTHORITY.KEYID = 5
5,351,268 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,367,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,368,598 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,374,307 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,380,199 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,385,900 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,393,864 UART: [afmc] --
5,394,790 UART: [cold-reset] --
5,395,904 UART: [state] Locking Datavault
5,397,195 UART: [state] Locking PCR0, PCR1 and PCR31
5,397,799 UART: [state] Locking ICCM
5,398,243 UART: [exit] Launching FMC @ 0x40000130
5,403,572 UART:
5,403,588 UART: Running Caliptra FMC ...
5,403,996 UART:
5,404,050 UART: [state] CFI Enabled
5,414,872 UART: [fht] FMC Alias Private Key: 7
5,523,318 UART: [art] Extend RT PCRs Done
5,523,746 UART: [art] Lock RT PCRs Done
5,525,122 UART: [art] Populate DV Done
5,533,288 UART: [fht] FMC Alias Private Key: 7
5,534,368 UART: [art] Derive CDI
5,534,648 UART: [art] Store in in slot 0x4
5,620,355 UART: [art] Derive Key Pair
5,620,715 UART: [art] Store priv key in slot 0x5
5,633,755 UART: [art] Derive Key Pair - Done
5,648,495 UART: [art] Signing Cert with AUTHO
5,648,975 UART: RITY.KEYID = 7
5,664,325 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,090 UART: [art] PUB.X = 1320F1F11D36730B3B63981EE00F3D190ECE264B7172F4122887B6C1EE37802F10D9F59DF1D473D9C435131127D66D25
5,671,845 UART: [art] PUB.Y = FD16072E5C89B8C39ED476C020927CA61E3333E984648C19C3BBC7481F13029FC44000FB1BEEFDE702E06788E0B89312
5,678,766 UART: [art] SIG.R = 3DEB15FB4428A6942814D36703DE39EBAF6E45E9EA147D382D3E1550CE09BBBFC915F178488DE405AF26715B2979C616
5,685,533 UART: [art] SIG.S = 51EFC923FD97D2DBE067A10052D3890232DFAFE18DB306CE791803B7EF73792E334E65E1821331F12A44830CC560DF10
5,709,392 UART: Caliptra RT
5,709,645 UART: [state] CFI Enabled
5,817,825 UART: [rt] RT listening for mailbox commands...
5,818,495 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,941,539 UART: [rt]cmd =0x41544d4e, len=14344
7,349,585 >>> mbox cmd response data (8 bytes)
7,349,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,378,783 UART: [rt]cmd =0x494e464f, len=4
7,382,632 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,971 ready_for_fw is high
1,361,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,275,466 >>> mbox cmd response: success
5,336,995 UART:
5,337,011 UART: Running Caliptra FMC ...
5,337,419 UART:
5,337,473 UART: [state] CFI Enabled
5,347,705 UART: [fht] FMC Alias Private Key: 7
5,455,543 UART: [art] Extend RT PCRs Done
5,455,971 UART: [art] Lock RT PCRs Done
5,457,309 UART: [art] Populate DV Done
5,465,409 UART: [fht] FMC Alias Private Key: 7
5,466,495 UART: [art] Derive CDI
5,466,775 UART: [art] Store in in slot 0x4
5,552,580 UART: [art] Derive Key Pair
5,552,940 UART: [art] Store priv key in slot 0x5
5,566,242 UART: [art] Derive Key Pair - Done
5,581,096 UART: [art] Signing Cert with AUTHO
5,581,576 UART: RITY.KEYID = 7
5,596,496 UART: [art] Erasing AUTHORITY.KEYID = 7
5,597,261 UART: [art] PUB.X = 5A58555AFF7AAC87427B4C3F9714353134CFAEEA619F19AEDEBFD5EC23B72CFD2B2869B2184FF97F7058B500F0D215F1
5,604,025 UART: [art] PUB.Y = 8544B82C74CF3F87A4D9D34110F99F3ED0E87E97EF4B55F48D2427185C489AF1A08934BE67EE028E402072B4B3FD8E2E
5,610,978 UART: [art] SIG.R = 42EF14A42F8ACF5BAC6D1F5330D8B561C382F2B3FF89B7AA43BAA664966DC85BC3B3A8736B62846640EC4F4D12FE2C47
5,617,764 UART: [art] SIG.S = 9E1352B953C632C92FD3E8F3B9E53632BB3A70A57BDCB9EFF741B9D6EF9A35BD832B3FC7871418239212884D4331CA46
5,641,855 UART: Caliptra RT
5,642,108 UART: [state] CFI Enabled
5,750,241 UART: [rt] RT listening for mailbox commands...
5,750,911 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,873,909 UART: [rt]cmd =0x41544d4e, len=14344
7,269,872 >>> mbox cmd response data (8 bytes)
7,269,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,299,268 UART: [rt]cmd =0x494e464f, len=4
7,302,987 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,838 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,408 UART: [kat] SHA2-256
882,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,454 UART: [kat] ++
886,606 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,553 UART: [kat] LMS
1,475,749 UART: [kat] --
1,476,322 UART: [cold-reset] ++
1,476,902 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 ready_for_fw is high
1,480,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,433 UART: [idev] Erasing UDS.KEYID = 0
1,504,985 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,729 UART: [idev] --
1,514,920 UART: [ldev] ++
1,515,088 UART: [ldev] CDI.KEYID = 6
1,515,451 UART: [ldev] SUBJECT.KEYID = 5
1,515,877 UART: [ldev] AUTHORITY.KEYID = 7
1,516,340 UART: [ldev] FE.KEYID = 1
1,521,516 UART: [ldev] Erasing FE.KEYID = 1
1,546,801 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,573 UART: [ldev] --
1,586,084 UART: [fwproc] Waiting for Commands...
1,586,883 UART: [fwproc] Received command 0x46574c44
1,587,674 UART: [fwproc] Received Image of size 114168 bytes
5,309,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,338,323 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,367,675 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,503,228 >>> mbox cmd response: success
5,504,388 UART: [afmc] ++
5,504,556 UART: [afmc] CDI.KEYID = 6
5,504,918 UART: [afmc] SUBJECT.KEYID = 7
5,505,343 UART: [afmc] AUTHORITY.KEYID = 5
5,539,871 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,555,925 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,556,705 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,562,414 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,568,306 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,574,007 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,581,813 UART: [afmc] --
5,582,737 UART: [cold-reset] --
5,583,557 UART: [state] Locking Datavault
5,584,866 UART: [state] Locking PCR0, PCR1 and PCR31
5,585,470 UART: [state] Locking ICCM
5,586,118 UART: [exit] Launching FMC @ 0x40000130
5,591,447 UART:
5,591,463 UART: Running Caliptra FMC ...
5,591,871 UART:
5,592,014 UART: [state] CFI Enabled
5,602,522 UART: [fht] FMC Alias Private Key: 7
5,710,780 UART: [art] Extend RT PCRs Done
5,711,208 UART: [art] Lock RT PCRs Done
5,712,862 UART: [art] Populate DV Done
5,721,078 UART: [fht] FMC Alias Private Key: 7
5,722,054 UART: [art] Derive CDI
5,722,334 UART: [art] Store in in slot 0x4
5,807,995 UART: [art] Derive Key Pair
5,808,355 UART: [art] Store priv key in slot 0x5
5,822,287 UART: [art] Derive Key Pair - Done
5,837,086 UART: [art] Signing Cert with AUTHO
5,837,566 UART: RITY.KEYID = 7
5,852,542 UART: [art] Erasing AUTHORITY.KEYID = 7
5,853,307 UART: [art] PUB.X = A936CB9448E93813BCE49CC985448838DD8DA6A17EC5BB289033EBD992E7D278748D69789129B494FB23E0348CE0F496
5,860,077 UART: [art] PUB.Y = 99A6828EBC28450B623B71088850E67E7D85F8431FA01E1DB2557953D7D4CF29CCE222EB68C594FDD167E4B17123C7A0
5,867,023 UART: [art] SIG.R = E3F6A0FD53D3C8CD4EC2591F09A01618CFB184B92B8101626FD2D50C1B12E0272D0B779C730990CC7A93C7F23832C358
5,873,782 UART: [art] SIG.S = 49D3B8A3068F2F340DB6A9C77003D29ADA9C1D36CF15A0945576BDC0FB1E08984C5D7F4E1118BBDC31C14BAD57438D84
5,897,777 UART: Caliptra RT
5,898,122 UART: [state] CFI Enabled
6,005,773 UART: [rt] RT listening for mailbox commands...
6,006,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,639 UART: [rt]cmd =0x41544d4e, len=14344
7,535,360 >>> mbox cmd response data (8 bytes)
7,535,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,564,540 UART: [rt]cmd =0x494e464f, len=4
7,568,331 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,772 ready_for_fw is high
1,362,772 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,200,113 >>> mbox cmd response: success
5,260,442 UART:
5,260,458 UART: Running Caliptra FMC ...
5,260,866 UART:
5,261,009 UART: [state] CFI Enabled
5,271,531 UART: [fht] FMC Alias Private Key: 7
5,379,621 UART: [art] Extend RT PCRs Done
5,380,049 UART: [art] Lock RT PCRs Done
5,381,535 UART: [art] Populate DV Done
5,389,557 UART: [fht] FMC Alias Private Key: 7
5,390,671 UART: [art] Derive CDI
5,390,951 UART: [art] Store in in slot 0x4
5,477,044 UART: [art] Derive Key Pair
5,477,404 UART: [art] Store priv key in slot 0x5
5,490,656 UART: [art] Derive Key Pair - Done
5,505,251 UART: [art] Signing Cert with AUTHO
5,505,731 UART: RITY.KEYID = 7
5,521,111 UART: [art] Erasing AUTHORITY.KEYID = 7
5,521,876 UART: [art] PUB.X = 4FE72637D05D53033EFA743E4CDB9B6002B55704FF9DB07943F5DF81CD4865F7423DA94EF6FA9FA02A0D4E876BB7601B
5,528,646 UART: [art] PUB.Y = C1F5DE36571CA703BD18441AED21A2604AE4C3D5EF8DFFAA542F55AB57D8ECE83902EF079BF7CCD2D987E53EADD92D81
5,535,613 UART: [art] SIG.R = 72AB4964462564BCD5992340B4BBEF6D1E80B287906A896F0273F92319087D5351FACF79F12353EC4AE7CC1BA529FB53
5,542,379 UART: [art] SIG.S = 208A298B5F41F94906730B14B79BCA763FC6EC5A374D8E92D437F0E6F3500E216DFF9BE4E88770FC265C0BDE45D054B6
5,566,326 UART: Caliptra RT
5,566,671 UART: [state] CFI Enabled
5,675,845 UART: [rt] RT listening for mailbox commands...
5,676,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,383 UART: [rt]cmd =0x41544d4e, len=14344
7,204,360 >>> mbox cmd response data (8 bytes)
7,204,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,233,570 UART: [rt]cmd =0x494e464f, len=4
7,237,205 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
918,524 UART: [kat] HMAC-384Kdf
923,106 UART: [kat] LMS
1,171,434 UART: [kat] --
1,172,415 UART: [cold-reset] ++
1,172,757 UART: [fht] FHT @ 0x50003400
1,175,552 UART: [idev] ++
1,175,720 UART: [idev] CDI.KEYID = 6
1,176,080 UART: [idev] SUBJECT.KEYID = 7
1,176,504 UART: [idev] UDS.KEYID = 0
1,176,849 ready_for_fw is high
1,176,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,426 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,659 UART: [idev] --
1,210,703 UART: [ldev] ++
1,210,871 UART: [ldev] CDI.KEYID = 6
1,211,234 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,509 UART: [ldev] Erasing FE.KEYID = 1
1,243,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,695 UART: [ldev] --
1,282,980 UART: [fwproc] Wait for Commands...
1,283,656 UART: [fwproc] Recv command 0x46574c44
1,284,384 UART: [fwproc] Recv'd Img size: 114168 bytes
3,120,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,544 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,848 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,313,407 >>> mbox cmd response: success
3,314,561 UART: [afmc] ++
3,314,729 UART: [afmc] CDI.KEYID = 6
3,315,091 UART: [afmc] SUBJECT.KEYID = 7
3,315,516 UART: [afmc] AUTHORITY.KEYID = 5
3,350,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,805 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,514 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,406 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,117 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,006 UART: [afmc] --
3,394,060 UART: [cold-reset] --
3,394,880 UART: [state] Locking Datavault
3,395,945 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,549 UART: [state] Locking ICCM
3,397,147 UART: [exit] Launching FMC @ 0x40000130
3,402,476 UART:
3,402,492 UART: Running Caliptra FMC ...
3,402,900 UART:
3,402,954 UART: [state] CFI Enabled
3,413,516 UART: [fht] FMC Alias Private Key: 7
3,520,778 UART: [art] Extend RT PCRs Done
3,521,206 UART: [art] Lock RT PCRs Done
3,522,690 UART: [art] Populate DV Done
3,531,098 UART: [fht] FMC Alias Private Key: 7
3,532,180 UART: [art] Derive CDI
3,532,460 UART: [art] Store in in slot 0x4
3,618,043 UART: [art] Derive Key Pair
3,618,403 UART: [art] Store priv key in slot 0x5
3,631,209 UART: [art] Derive Key Pair - Done
3,646,279 UART: [art] Signing Cert with AUTHO
3,646,759 UART: RITY.KEYID = 7
3,662,007 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,772 UART: [art] PUB.X = 581845D960A595DF7717460C272E556756075FE9CE97E1F551EBEC7C1EBD042EFBEFA941F3B868DD37AC7C6F3C5BDA58
3,669,547 UART: [art] PUB.Y = 7EAC05E4789DB61DB77E8D179FC100169EC0DDDA387F549461C16AA13F19AAB888F1463CEB8B4361D3D2331554237D83
3,676,478 UART: [art] SIG.R = A0B18EC6BFC01518F5FE1CAD51046BA670E57CB90267DCBB0B12760933BDEAA8CC870F78645F43071009F1DBA48D460D
3,683,238 UART: [art] SIG.S = 3B8475C8A6F0DF6BD180BC686B7753F582A4E87EC2768D141754902C4F51BB0C2A2B1D8A2EC28ECA27E6AE28D8F8D727
3,706,822 UART: Caliptra RT
3,707,075 UART: [state] CFI Enabled
3,814,221 UART: [rt] RT listening for mailbox commands...
3,814,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,883 UART: [rt]cmd =0x41544d4e, len=14344
5,336,723 >>> mbox cmd response data (8 bytes)
5,336,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,366,139 UART: [rt]cmd =0x494e464f, len=4
5,369,888 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,087 ready_for_fw is high
1,060,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,163,650 >>> mbox cmd response: success
3,225,563 UART:
3,225,579 UART: Running Caliptra FMC ...
3,225,987 UART:
3,226,041 UART: [state] CFI Enabled
3,236,341 UART: [fht] FMC Alias Private Key: 7
3,344,095 UART: [art] Extend RT PCRs Done
3,344,523 UART: [art] Lock RT PCRs Done
3,346,273 UART: [art] Populate DV Done
3,354,405 UART: [fht] FMC Alias Private Key: 7
3,355,351 UART: [art] Derive CDI
3,355,631 UART: [art] Store in in slot 0x4
3,441,214 UART: [art] Derive Key Pair
3,441,574 UART: [art] Store priv key in slot 0x5
3,454,660 UART: [art] Derive Key Pair - Done
3,469,513 UART: [art] Signing Cert with AUTHO
3,469,993 UART: RITY.KEYID = 7
3,484,941 UART: [art] Erasing AUTHORITY.KEYID = 7
3,485,706 UART: [art] PUB.X = E740F2646E9E327AD1B40AB8274B04CC1EC23522ECE3AAC763FA67AD4E80D6DF3F73AB731F2F5167A241423EC820246A
3,492,482 UART: [art] PUB.Y = 97439535FF8AF62784DE1848C6D146FE5CE76BAD775F72C38F5FF91FC35F1944D6836874EF8F7AA690058C0214EC8FA6
3,499,432 UART: [art] SIG.R = 2BCF3939F75A9F0B127385CDFC18CE77BC752B236B11CFD9DFA8551FC16FED746715BF1C91D4EA8A86D53F442D75E3AC
3,506,219 UART: [art] SIG.S = 3027ACCE361FAD7A0AE617CD71495A37AF9DBE21473A0FAE8A116E87E8F1D0E4FD77C0E5D5EACF438CA7CAA21C185207
3,530,325 UART: Caliptra RT
3,530,578 UART: [state] CFI Enabled
3,639,005 UART: [rt] RT listening for mailbox commands...
3,639,675 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,419 UART: [rt]cmd =0x41544d4e, len=14344
5,148,562 >>> mbox cmd response data (8 bytes)
5,148,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,178,200 UART: [rt]cmd =0x494e464f, len=4
5,181,827 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
893,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,986 UART: [kat] ++
898,138 UART: [kat] sha1
902,340 UART: [kat] SHA2-256
904,280 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
919,123 UART: [kat] HMAC-384Kdf
923,711 UART: [kat] LMS
1,172,039 UART: [kat] --
1,172,940 UART: [cold-reset] ++
1,173,276 UART: [fht] FHT @ 0x50003400
1,175,871 UART: [idev] ++
1,176,039 UART: [idev] CDI.KEYID = 6
1,176,399 UART: [idev] SUBJECT.KEYID = 7
1,176,823 UART: [idev] UDS.KEYID = 0
1,177,168 ready_for_fw is high
1,177,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,689 UART: [idev] Erasing UDS.KEYID = 0
1,202,354 UART: [idev] Sha1 KeyId Algorithm
1,210,654 UART: [idev] --
1,211,868 UART: [ldev] ++
1,212,036 UART: [ldev] CDI.KEYID = 6
1,212,399 UART: [ldev] SUBJECT.KEYID = 5
1,212,825 UART: [ldev] AUTHORITY.KEYID = 7
1,213,288 UART: [ldev] FE.KEYID = 1
1,218,680 UART: [ldev] Erasing FE.KEYID = 1
1,245,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,890 UART: [ldev] --
1,284,341 UART: [fwproc] Wait for Commands...
1,285,077 UART: [fwproc] Recv command 0x46574c44
1,285,805 UART: [fwproc] Recv'd Img size: 114168 bytes
3,136,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,163,778 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,193,082 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,328,545 >>> mbox cmd response: success
3,329,573 UART: [afmc] ++
3,329,741 UART: [afmc] CDI.KEYID = 6
3,330,103 UART: [afmc] SUBJECT.KEYID = 7
3,330,528 UART: [afmc] AUTHORITY.KEYID = 5
3,366,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,383,239 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,388,948 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,394,840 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,400,551 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,408,276 UART: [afmc] --
3,409,202 UART: [cold-reset] --
3,410,298 UART: [state] Locking Datavault
3,411,305 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,909 UART: [state] Locking ICCM
3,412,537 UART: [exit] Launching FMC @ 0x40000130
3,417,866 UART:
3,417,882 UART: Running Caliptra FMC ...
3,418,290 UART:
3,418,433 UART: [state] CFI Enabled
3,428,921 UART: [fht] FMC Alias Private Key: 7
3,536,509 UART: [art] Extend RT PCRs Done
3,536,937 UART: [art] Lock RT PCRs Done
3,538,701 UART: [art] Populate DV Done
3,546,843 UART: [fht] FMC Alias Private Key: 7
3,547,971 UART: [art] Derive CDI
3,548,251 UART: [art] Store in in slot 0x4
3,633,848 UART: [art] Derive Key Pair
3,634,208 UART: [art] Store priv key in slot 0x5
3,647,492 UART: [art] Derive Key Pair - Done
3,662,562 UART: [art] Signing Cert with AUTHO
3,663,042 UART: RITY.KEYID = 7
3,678,280 UART: [art] Erasing AUTHORITY.KEYID = 7
3,679,045 UART: [art] PUB.X = 151E4293F103708B5E71CA5A97FA3AC8DA6BC64828B6FFB3433F571FD86694A0A27CF455F4C7CA59C8DE73871F822990
3,685,818 UART: [art] PUB.Y = BC9599CDD4257246A3BD76DC3F23E860E765EF5EF86E7395C2222D1AA6BDA08C5B37BF903172A8CF22A59D3663C2BABD
3,692,784 UART: [art] SIG.R = A7C676D54E5CC4BB7E47FC4079D41C0D61DE8EB92627F96D9F35C5E8299B28DD107DFDBC4752CF2846C5C87CDA28E136
3,699,567 UART: [art] SIG.S = C6C647D14D23A48D01451BC2CB5FF9220D1D876E47031A0C004BA2FC04459616F57224B113A068C712AB0FB487916B80
3,723,630 UART: Caliptra RT
3,723,975 UART: [state] CFI Enabled
3,831,948 UART: [rt] RT listening for mailbox commands...
3,832,618 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,955,802 UART: [rt]cmd =0x41544d4e, len=14344
5,366,817 >>> mbox cmd response data (8 bytes)
5,366,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,396,451 UART: [rt]cmd =0x494e464f, len=4
5,400,328 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,066 ready_for_fw is high
1,061,066 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,176,037 >>> mbox cmd response: success
3,238,898 UART:
3,238,914 UART: Running Caliptra FMC ...
3,239,322 UART:
3,239,465 UART: [state] CFI Enabled
3,249,843 UART: [fht] FMC Alias Private Key: 7
3,358,469 UART: [art] Extend RT PCRs Done
3,358,897 UART: [art] Lock RT PCRs Done
3,360,411 UART: [art] Populate DV Done
3,368,517 UART: [fht] FMC Alias Private Key: 7
3,369,517 UART: [art] Derive CDI
3,369,797 UART: [art] Store in in slot 0x4
3,455,806 UART: [art] Derive Key Pair
3,456,166 UART: [art] Store priv key in slot 0x5
3,469,802 UART: [art] Derive Key Pair - Done
3,484,527 UART: [art] Signing Cert with AUTHO
3,485,007 UART: RITY.KEYID = 7
3,500,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,501,544 UART: [art] PUB.X = 5B9ABA024E8B982A5D135003748531FC68D14FF1AA8E25B7E3F3FE67408165CE2BBCD4C464D48AED072D2A615F035C6A
3,508,314 UART: [art] PUB.Y = 95093E897DAE0091D041DDDA198F9436E5BFFCD44E05157CE62B84320233A8001B042278A432C0FCAD5105A4AB2D9F59
3,515,209 UART: [art] SIG.R = 87106EE9E918D6FA315A2FFDF1B815707EDB68EB340B3FBEA87D157BCE049B10EC3F15ABB26A1F38C04C0B1EC30E5D7F
3,521,991 UART: [art] SIG.S = 6735B65BEC322BC920444F1CA41A0AA0851923B1760785F9B82F25A6A6734A10025A84EEDBB5E36D5FA92AA84BBAF7B8
3,545,789 UART: Caliptra RT
3,546,134 UART: [state] CFI Enabled
3,653,402 UART: [rt] RT listening for mailbox commands...
3,654,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,777,226 UART: [rt]cmd =0x41544d4e, len=14344
5,178,093 >>> mbox cmd response data (8 bytes)
5,178,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,207,503 UART: [rt]cmd =0x494e464f, len=4
5,211,044 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,174 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,169,899 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,174,343 ready_for_fw is high
1,174,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,436 UART: [ldev] ++
1,208,604 UART: [ldev] CDI.KEYID = 6
1,208,968 UART: [ldev] SUBJECT.KEYID = 5
1,209,395 UART: [ldev] AUTHORITY.KEYID = 7
1,209,858 UART: [ldev] FE.KEYID = 1
1,214,872 UART: [ldev] Erasing FE.KEYID = 1
1,240,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,416 UART: [ldev] --
1,279,906 UART: [fwproc] Wait for Commands...
1,280,481 UART: [fwproc] Recv command 0x46574c44
1,281,214 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,314,120 >>> mbox cmd response: success
3,315,201 UART: [afmc] ++
3,315,369 UART: [afmc] CDI.KEYID = 6
3,315,732 UART: [afmc] SUBJECT.KEYID = 7
3,316,158 UART: [afmc] AUTHORITY.KEYID = 5
3,351,496 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,485 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,195 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,085 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,796 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,408 UART: [afmc] --
3,394,414 UART: [cold-reset] --
3,395,248 UART: [state] Locking Datavault
3,396,527 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,131 UART: [state] Locking ICCM
3,397,633 UART: [exit] Launching FMC @ 0x40000130
3,402,962 UART:
3,402,978 UART: Running Caliptra FMC ...
3,403,386 UART:
3,403,440 UART: [state] CFI Enabled
3,413,786 UART: [fht] FMC Alias Private Key: 7
3,522,182 UART: [art] Extend RT PCRs Done
3,522,610 UART: [art] Lock RT PCRs Done
3,524,496 UART: [art] Populate DV Done
3,532,828 UART: [fht] FMC Alias Private Key: 7
3,534,004 UART: [art] Derive CDI
3,534,284 UART: [art] Store in in slot 0x4
3,620,377 UART: [art] Derive Key Pair
3,620,737 UART: [art] Store priv key in slot 0x5
3,634,557 UART: [art] Derive Key Pair - Done
3,649,895 UART: [art] Signing Cert with AUTHO
3,650,375 UART: RITY.KEYID = 7
3,665,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,102 UART: [art] PUB.X = 82BDD158CCA0C04FF3BFFB191A58EC543C86961A545BBFEF7B43C55AE73CDDCB70F458B98EDEBE4D6F126A7452E7B9C9
3,672,900 UART: [art] PUB.Y = 2D5C28B7A742E962AD806F2DD615716AC508BB5FBE9AA34A7442773D7CA551E7F19A15FFF6C9F6D7F72AA10B6701C96C
3,679,855 UART: [art] SIG.R = 023321FEB4CAF166C15BC4CB7787D43246F3821B8860541AACB4F822AA92069B5615F440123039A259E1C069BA965582
3,686,613 UART: [art] SIG.S = CEBD7216D731D52E07771B5F6F702E08822D15D582964A48C17582BC628D6D8AC80AC61F9345ABDAED93CFD87AB7C602
3,710,478 UART: Caliptra RT
3,710,731 UART: [state] CFI Enabled
3,818,047 UART: [rt] RT listening for mailbox commands...
3,818,717 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,631 UART: [rt]cmd =0x41544d4e, len=14344
5,342,636 >>> mbox cmd response data (8 bytes)
5,342,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,372,008 UART: [rt]cmd =0x494e464f, len=4
5,375,707 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,014 ready_for_fw is high
1,056,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,166,735 >>> mbox cmd response: success
3,227,992 UART:
3,228,008 UART: Running Caliptra FMC ...
3,228,416 UART:
3,228,470 UART: [state] CFI Enabled
3,239,232 UART: [fht] FMC Alias Private Key: 7
3,347,350 UART: [art] Extend RT PCRs Done
3,347,778 UART: [art] Lock RT PCRs Done
3,349,320 UART: [art] Populate DV Done
3,357,690 UART: [fht] FMC Alias Private Key: 7
3,358,640 UART: [art] Derive CDI
3,358,920 UART: [art] Store in in slot 0x4
3,444,417 UART: [art] Derive Key Pair
3,444,777 UART: [art] Store priv key in slot 0x5
3,458,213 UART: [art] Derive Key Pair - Done
3,472,924 UART: [art] Signing Cert with AUTHO
3,473,404 UART: RITY.KEYID = 7
3,488,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,527 UART: [art] PUB.X = 903DAE586E273AAE442A5F93FEB473039B89D3DFF984C816D215E4FDED0E8C11FA1A7AC34DC87639A2B0BC98BF599004
3,496,304 UART: [art] PUB.Y = 6997FC1B3C4237F6ED329855B71E719173ED47268582CD34A845991361855570A0192F4D038DBE45F40494849CF1B1DA
3,503,238 UART: [art] SIG.R = 2C05F068C5CF2DBC3797F28E53CD27A179C4AF7762E834711A32FAD7CCE8DDF0501EFE62D8CFBDAE97164CB57D1D185B
3,510,027 UART: [art] SIG.S = 5BC36B47EFDA1AB5BF342610E929120892FEB5681537BA60C251B2EF31BC1D5A83B28EB4947EDC292B76BDF866C6F116
3,533,535 UART: Caliptra RT
3,533,788 UART: [state] CFI Enabled
3,641,167 UART: [rt] RT listening for mailbox commands...
3,641,837 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,817 UART: [rt]cmd =0x41544d4e, len=14344
5,148,085 >>> mbox cmd response data (8 bytes)
5,148,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,177,601 UART: [rt]cmd =0x494e464f, len=4
5,181,502 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,923 UART: [kat] SHA2-512-ACC
906,824 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,235 UART: [kat] LMS
1,169,547 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,540 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,174,344 ready_for_fw is high
1,174,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,752 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,501 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,461 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,477 UART: [ldev] --
1,281,883 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 114168 bytes
3,126,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,983 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,318,794 >>> mbox cmd response: success
3,319,937 UART: [afmc] ++
3,320,105 UART: [afmc] CDI.KEYID = 6
3,320,468 UART: [afmc] SUBJECT.KEYID = 7
3,320,894 UART: [afmc] AUTHORITY.KEYID = 5
3,356,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,365 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,075 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,965 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,676 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,640 UART: [afmc] --
3,399,700 UART: [cold-reset] --
3,400,556 UART: [state] Locking Datavault
3,401,787 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,391 UART: [state] Locking ICCM
3,403,005 UART: [exit] Launching FMC @ 0x40000130
3,408,334 UART:
3,408,350 UART: Running Caliptra FMC ...
3,408,758 UART:
3,408,901 UART: [state] CFI Enabled
3,419,639 UART: [fht] FMC Alias Private Key: 7
3,527,399 UART: [art] Extend RT PCRs Done
3,527,827 UART: [art] Lock RT PCRs Done
3,529,155 UART: [art] Populate DV Done
3,537,325 UART: [fht] FMC Alias Private Key: 7
3,538,341 UART: [art] Derive CDI
3,538,621 UART: [art] Store in in slot 0x4
3,624,032 UART: [art] Derive Key Pair
3,624,392 UART: [art] Store priv key in slot 0x5
3,637,810 UART: [art] Derive Key Pair - Done
3,653,051 UART: [art] Signing Cert with AUTHO
3,653,531 UART: RITY.KEYID = 7
3,668,407 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,172 UART: [art] PUB.X = B7EE8FFAAEF9F0B3C1D83EB6DFCC0AD7E3BDB364F5608372DB14B2C2E44C57091F6666B0424DACA45C74BAFD033EB609
3,675,958 UART: [art] PUB.Y = 65B7C1D044B55033F4AE417CA520800AB6624B07D9EE27D2A8FA33CA9E770400B1D45D1DC7F3956C3C777EF99A5CEDEB
3,682,891 UART: [art] SIG.R = 93909D2C82BD23516CA4D2268B0A3D2F339660D752EA2BCC75F08B68543BF2853C681B452AA5F14261D7A4C145763242
3,689,654 UART: [art] SIG.S = 783BD45FA1EB23AC8EB29C336D199785E560366115412C487F064BE08CEB67ABBE06540F50E2E4BC343C3FD355EEE26C
3,713,280 UART: Caliptra RT
3,713,625 UART: [state] CFI Enabled
3,821,437 UART: [rt] RT listening for mailbox commands...
3,822,107 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,233 UART: [rt]cmd =0x41544d4e, len=14344
5,341,506 >>> mbox cmd response data (8 bytes)
5,341,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,370,808 UART: [rt]cmd =0x494e464f, len=4
5,374,757 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,031 ready_for_fw is high
1,056,031 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,175,511 >>> mbox cmd response: success
3,238,460 UART:
3,238,476 UART: Running Caliptra FMC ...
3,238,884 UART:
3,239,027 UART: [state] CFI Enabled
3,249,499 UART: [fht] FMC Alias Private Key: 7
3,357,351 UART: [art] Extend RT PCRs Done
3,357,779 UART: [art] Lock RT PCRs Done
3,359,869 UART: [art] Populate DV Done
3,368,095 UART: [fht] FMC Alias Private Key: 7
3,369,089 UART: [art] Derive CDI
3,369,369 UART: [art] Store in in slot 0x4
3,455,106 UART: [art] Derive Key Pair
3,455,466 UART: [art] Store priv key in slot 0x5
3,468,060 UART: [art] Derive Key Pair - Done
3,482,672 UART: [art] Signing Cert with AUTHO
3,483,152 UART: RITY.KEYID = 7
3,498,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,961 UART: [art] PUB.X = 1E71626F5F3BB67E6B2DC80C9A67F7ADEE9420DC19328949E11C4925A6CD5989829DD8DFF5F8C01D35DDA74D01679BB8
3,505,737 UART: [art] PUB.Y = 64575E487515DEC86A80A802A3E918331FA02E44D30870E42098C9626AE3E1ACC370CCA6FD78ADE60F04E1EF220EECE9
3,512,682 UART: [art] SIG.R = 17DFAB5CDD1FA2E5267B1AFB226D1774CC03D253145696F9C5A94D96D193229F1B256208F3C0272814365667C65E6DC8
3,519,446 UART: [art] SIG.S = 387B989B7E0A2F731C303D2385522A7F82931C80E5225DA3A2198F35BC6AA9783C676597FB9C27FDB1A803DD2A8631D4
3,542,967 UART: Caliptra RT
3,543,312 UART: [state] CFI Enabled
3,651,705 UART: [rt] RT listening for mailbox commands...
3,652,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,395 UART: [rt]cmd =0x41544d4e, len=14344
5,171,458 >>> mbox cmd response data (8 bytes)
5,171,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,200,784 UART: [rt]cmd =0x494e464f, len=4
5,204,563 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,184 UART:
192,548 UART: Running Caliptra ROM ...
193,645 UART:
193,781 UART: [state] CFI Enabled
260,973 UART: [state] LifecycleState = Unprovisioned
262,890 UART: [state] DebugLocked = No
265,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,898 UART: [kat] SHA2-256
440,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,116 UART: [kat] ++
451,580 UART: [kat] sha1
461,315 UART: [kat] SHA2-256
463,961 UART: [kat] SHA2-384
469,379 UART: [kat] SHA2-512-ACC
471,745 UART: [kat] ECC-384
2,767,547 UART: [kat] HMAC-384Kdf
2,798,040 UART: [kat] LMS
3,988,379 UART: [kat] --
3,992,528 UART: [cold-reset] ++
3,993,675 UART: [fht] Storing FHT @ 0x50003400
4,006,239 UART: [idev] ++
4,006,817 UART: [idev] CDI.KEYID = 6
4,007,700 UART: [idev] SUBJECT.KEYID = 7
4,009,012 UART: [idev] UDS.KEYID = 0
4,010,002 ready_for_fw is high
4,010,190 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,212 UART: [idev] Erasing UDS.KEYID = 0
7,348,587 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,257 UART: [idev] --
7,373,821 UART: [ldev] ++
7,374,394 UART: [ldev] CDI.KEYID = 6
7,375,406 UART: [ldev] SUBJECT.KEYID = 5
7,376,559 UART: [ldev] AUTHORITY.KEYID = 7
7,377,837 UART: [ldev] FE.KEYID = 1
7,421,102 UART: [ldev] Erasing FE.KEYID = 1
10,754,204 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,474 UART: [ldev] --
13,115,489 UART: [fwproc] Waiting for Commands...
13,118,120 UART: [fwproc] Received command 0x46574c44
13,120,366 UART: [fwproc] Received Image of size 113844 bytes
22,066,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,149,694 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,218,603 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,534,489 >>> mbox cmd response: success
22,538,961 UART: [afmc] ++
22,539,602 UART: [afmc] CDI.KEYID = 6
22,540,481 UART: [afmc] SUBJECT.KEYID = 7
22,541,744 UART: [afmc] AUTHORITY.KEYID = 5
25,910,969 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,213,313 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,215,575 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,230,120 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,244,887 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,259,123 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,281,073 UART: [afmc] --
28,284,404 UART: [cold-reset] --
28,288,850 UART: [state] Locking Datavault
28,293,281 UART: [state] Locking PCR0, PCR1 and PCR31
28,295,038 UART: [state] Locking ICCM
28,297,801 UART: [exit] Launching FMC @ 0x40000130
28,306,189 UART:
28,306,417 UART: Running Caliptra FMC ...
28,307,510 UART:
28,307,662 UART: [state] CFI Enabled
28,375,974 UART: [fht] FMC Alias Private Key: 7
30,713,471 UART: [art] Extend RT PCRs Done
30,714,696 UART: [art] Lock RT PCRs Done
30,716,503 UART: [art] Populate DV Done
30,722,253 UART: [fht] FMC Alias Private Key: 7
30,723,732 UART: [art] Derive CDI
30,724,508 UART: [art] Store in in slot 0x4
30,784,299 UART: [art] Derive Key Pair
30,785,298 UART: [art] Store priv key in slot 0x5
34,078,293 UART: [art] Derive Key Pair - Done
34,091,456 UART: [art] Signing Cert with AUTHO
34,092,763 UART: RITY.KEYID = 7
36,379,918 UART: [art] Erasing AUTHORITY.KEYID = 7
36,381,427 UART: [art] PUB.X = E73265ACA4FE88C4CE4ACC1FC843D28162BB8CFBF872F10BD31D50ADF0B0392FC62FCF6E6994A85A8B3FCEC215177C40
36,388,696 UART: [art] PUB.Y = 9DCA12BED4FEC96A4A7DA81464D3EDA483DC3E43D64773350AE1761B545FB6F91744791D98E489B782319067517F5C66
36,395,932 UART: [art] SIG.R = 62C75633DE5419DE616A8DC4A0EDC2FC616E91CEFE47503C2F2E10D5BA5DC64F2355EB58B88EFB294C3B7C472F997B69
36,403,359 UART: [art] SIG.S = DDB39341A1C6861B26EAEB1D8E7CBAF01E410FEF76A39816EDFFB1F3AD0255B065F1991B08C6C8EBC596CBBDD9FB611D
37,708,355 UART: Caliptra RT
37,709,065 UART: [state] CFI Enabled
37,868,821 UART: [rt] RT listening for mailbox commands...
37,871,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,026,350 UART: [rt]cmd =0x41544d4e, len=14344
42,236,462 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,784,765 ready_for_fw is high
3,785,133 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,053,353 >>> mbox cmd response: success
27,748,187 UART:
27,748,615 UART: Running Caliptra FMC ...
27,749,752 UART:
27,749,908 UART: [state] CFI Enabled
27,816,529 UART: [fht] FMC Alias Private Key: 7
30,153,894 UART: [art] Extend RT PCRs Done
30,155,130 UART: [art] Lock RT PCRs Done
30,156,808 UART: [art] Populate DV Done
30,162,241 UART: [fht] FMC Alias Private Key: 7
30,163,828 UART: [art] Derive CDI
30,164,562 UART: [art] Store in in slot 0x4
30,225,892 UART: [art] Derive Key Pair
30,226,921 UART: [art] Store priv key in slot 0x5
33,519,445 UART: [art] Derive Key Pair - Done
33,532,340 UART: [art] Signing Cert with AUTHO
33,533,643 UART: RITY.KEYID = 7
35,820,652 UART: [art] Erasing AUTHORITY.KEYID = 7
35,822,176 UART: [art] PUB.X = 8F13AFB942F1A0BA0023C9199C00849AC5E93F8EFFAFAA13F83E8FD9ECFD465BBBB6DD617A053118212FE533932F926E
35,829,429 UART: [art] PUB.Y = 8346B3727C6739301BDC772DFED8F7B593EF45694F8005C4E9552053FC7D0DE64BF50F31ECDDDE83970AE060E79FBC83
35,836,695 UART: [art] SIG.R = 1F2D40B202CEAB2E65CB8EE306823FC255515E7C27F7B60614BB8F0D8793A3685CC370CB36CF51769FE698D2F68BC1F9
35,844,077 UART: [art] SIG.S = F2B016A13D61BDD7CEB2D64C084B7DF6DEC835A5220441294D910675A9DFC2E823FAFB076BBD3883725C67E6FE701EF6
37,149,311 UART: Caliptra RT
37,149,999 UART: [state] CFI Enabled
37,310,725 UART: [rt] RT listening for mailbox commands...
37,313,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,468,087 UART: [rt]cmd =0x41544d4e, len=14344
41,600,224 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,444 UART:
192,798 UART: Running Caliptra ROM ...
193,981 UART:
603,486 UART: [state] CFI Enabled
615,462 UART: [state] LifecycleState = Unprovisioned
617,410 UART: [state] DebugLocked = No
620,219 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,381 UART: [kat] SHA2-256
794,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,685 UART: [kat] ++
805,135 UART: [kat] sha1
816,578 UART: [kat] SHA2-256
819,301 UART: [kat] SHA2-384
824,867 UART: [kat] SHA2-512-ACC
827,231 UART: [kat] ECC-384
3,111,607 UART: [kat] HMAC-384Kdf
3,125,038 UART: [kat] LMS
4,315,123 UART: [kat] --
4,319,339 UART: [cold-reset] ++
4,320,983 UART: [fht] Storing FHT @ 0x50003400
4,333,351 UART: [idev] ++
4,333,925 UART: [idev] CDI.KEYID = 6
4,334,852 UART: [idev] SUBJECT.KEYID = 7
4,336,098 UART: [idev] UDS.KEYID = 0
4,337,155 ready_for_fw is high
4,337,373 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,404 UART: [idev] Erasing UDS.KEYID = 0
7,623,466 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,462 UART: [idev] --
7,648,079 UART: [ldev] ++
7,648,649 UART: [ldev] CDI.KEYID = 6
7,649,587 UART: [ldev] SUBJECT.KEYID = 5
7,650,799 UART: [ldev] AUTHORITY.KEYID = 7
7,652,082 UART: [ldev] FE.KEYID = 1
7,665,682 UART: [ldev] Erasing FE.KEYID = 1
10,951,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,400 UART: [ldev] --
13,311,560 UART: [fwproc] Waiting for Commands...
13,313,380 UART: [fwproc] Received command 0x46574c44
13,315,615 UART: [fwproc] Received Image of size 113844 bytes
22,267,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,349,037 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,417,938 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,733,986 >>> mbox cmd response: success
22,738,364 UART: [afmc] ++
22,738,960 UART: [afmc] CDI.KEYID = 6
22,739,849 UART: [afmc] SUBJECT.KEYID = 7
22,741,119 UART: [afmc] AUTHORITY.KEYID = 5
26,051,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,346,987 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,349,240 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,363,806 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,378,723 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,392,810 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,414,790 UART: [afmc] --
28,418,384 UART: [cold-reset] --
28,422,138 UART: [state] Locking Datavault
28,426,409 UART: [state] Locking PCR0, PCR1 and PCR31
28,428,166 UART: [state] Locking ICCM
28,429,697 UART: [exit] Launching FMC @ 0x40000130
28,438,094 UART:
28,438,333 UART: Running Caliptra FMC ...
28,439,435 UART:
28,439,597 UART: [state] CFI Enabled
28,447,725 UART: [fht] FMC Alias Private Key: 7
30,778,394 UART: [art] Extend RT PCRs Done
30,779,748 UART: [art] Lock RT PCRs Done
30,781,245 UART: [art] Populate DV Done
30,786,823 UART: [fht] FMC Alias Private Key: 7
30,788,357 UART: [art] Derive CDI
30,789,093 UART: [art] Store in in slot 0x4
30,831,685 UART: [art] Derive Key Pair
30,832,686 UART: [art] Store priv key in slot 0x5
34,074,651 UART: [art] Derive Key Pair - Done
34,087,534 UART: [art] Signing Cert with AUTHO
34,088,845 UART: RITY.KEYID = 7
36,367,931 UART: [art] Erasing AUTHORITY.KEYID = 7
36,369,436 UART: [art] PUB.X = 241CB699CFC4801D5BF88780691A63ED04B8FECCC02F528B35B8139A861B3E019D002D510588983D8CA82A7DD6353E57
36,376,647 UART: [art] PUB.Y = 272BE04F8724066D3C343CCD46E697178EC62CD93ADE3233046B8CEDF95255BCCF0FEF1B57D89DCA42583D28D8173B89
36,383,907 UART: [art] SIG.R = 2F561B1E2DC29698FE8EE81E3C87706DF842A0281C2B0825EB057997346863502C7750B897DE740AE8AF1522EB54234A
36,391,328 UART: [art] SIG.S = EBA486981A54CAF43FD92CDF1F6A0B569A19BDB0EBD3B5D6E6F514C0B0F607E0CC88C2468A6325D90C260F1F44E89755
37,696,442 UART: Caliptra RT
37,697,134 UART: [state] CFI Enabled
37,814,680 UART: [rt] RT listening for mailbox commands...
37,816,946 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,972,390 UART: [rt]cmd =0x41544d4e, len=14344
42,156,591 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,220 writing to cptra_bootfsm_go
4,130,227 ready_for_fw is high
4,130,592 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,895,817 >>> mbox cmd response: success
27,537,538 UART:
27,537,957 UART: Running Caliptra FMC ...
27,539,094 UART:
27,539,260 UART: [state] CFI Enabled
27,547,148 UART: [fht] FMC Alias Private Key: 7
29,878,487 UART: [art] Extend RT PCRs Done
29,879,709 UART: [art] Lock RT PCRs Done
29,881,606 UART: [art] Populate DV Done
29,887,119 UART: [fht] FMC Alias Private Key: 7
29,888,876 UART: [art] Derive CDI
29,889,698 UART: [art] Store in in slot 0x4
29,931,717 UART: [art] Derive Key Pair
29,932,760 UART: [art] Store priv key in slot 0x5
33,174,630 UART: [art] Derive Key Pair - Done
33,187,790 UART: [art] Signing Cert with AUTHO
33,189,091 UART: RITY.KEYID = 7
35,468,782 UART: [art] Erasing AUTHORITY.KEYID = 7
35,470,308 UART: [art] PUB.X = D29F8B35D0CAE35F2A536DD9707F8E0DBE6B951407FAB1899BAE13AB4B427468BE1B8C7DA234D0AF9E78CA0FCC61B78D
35,477,576 UART: [art] PUB.Y = 910445BDF6B9CFB47B6EEBB497FD218B517C719A5B9962B651BCD4903545B906EDD6EEDED972670EDC8D90411B0881C8
35,484,848 UART: [art] SIG.R = A9AFF92A5567DAE4EA89C5ECD01AD939EF4A7AFC3239BFC7BC94DD107238F15F5BC0A350E09947A0172D3ADD9DFD7D64
35,492,248 UART: [art] SIG.S = 4C9B0E1B3AE2AF58EB3BBA829E46F4C3331AB1890D6CACDD77923ED6FB6B98AEFC7474DC4C2F5364B4E551419D279F6A
36,797,470 UART: Caliptra RT
36,798,185 UART: [state] CFI Enabled
36,915,540 UART: [rt] RT listening for mailbox commands...
36,918,101 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,073,557 UART: [rt]cmd =0x41544d4e, len=14344
41,283,534 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,149 UART:
192,507 UART: Running Caliptra ROM ...
193,651 UART:
193,799 UART: [state] CFI Enabled
264,062 UART: [state] LifecycleState = Unprovisioned
265,978 UART: [state] DebugLocked = No
267,873 UART: [state] WD Timer not started. Device not locked for debugging
271,061 UART: [kat] SHA2-256
450,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,702 UART: [kat] ++
462,154 UART: [kat] sha1
472,337 UART: [kat] SHA2-256
475,361 UART: [kat] SHA2-384
481,639 UART: [kat] SHA2-512-ACC
484,606 UART: [kat] ECC-384
2,949,277 UART: [kat] HMAC-384Kdf
2,970,046 UART: [kat] LMS
3,499,512 UART: [kat] --
3,504,156 UART: [cold-reset] ++
3,506,372 UART: [fht] FHT @ 0x50003400
3,516,922 UART: [idev] ++
3,517,484 UART: [idev] CDI.KEYID = 6
3,518,394 UART: [idev] SUBJECT.KEYID = 7
3,519,563 UART: [idev] UDS.KEYID = 0
3,520,492 ready_for_fw is high
3,520,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,254 UART: [idev] Erasing UDS.KEYID = 0
6,024,424 UART: [idev] Sha1 KeyId Algorithm
6,046,471 UART: [idev] --
6,049,609 UART: [ldev] ++
6,050,185 UART: [ldev] CDI.KEYID = 6
6,051,258 UART: [ldev] SUBJECT.KEYID = 5
6,052,371 UART: [ldev] AUTHORITY.KEYID = 7
6,053,552 UART: [ldev] FE.KEYID = 1
6,098,285 UART: [ldev] Erasing FE.KEYID = 1
8,602,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,053 UART: [ldev] --
10,409,803 UART: [fwproc] Wait for Commands...
10,412,825 UART: [fwproc] Recv command 0x46574c44
10,414,941 UART: [fwproc] Recv'd Img size: 114168 bytes
14,958,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,036,269 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,104,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,422,929 >>> mbox cmd response: success
15,428,014 UART: [afmc] ++
15,428,612 UART: [afmc] CDI.KEYID = 6
15,429,528 UART: [afmc] SUBJECT.KEYID = 7
15,430,687 UART: [afmc] AUTHORITY.KEYID = 5
17,958,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,684,994 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,700,971 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,716,938 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,732,727 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,755,801 UART: [afmc] --
19,760,177 UART: [cold-reset] --
19,764,812 UART: [state] Locking Datavault
19,771,942 UART: [state] Locking PCR0, PCR1 and PCR31
19,773,656 UART: [state] Locking ICCM
19,774,997 UART: [exit] Launching FMC @ 0x40000130
19,783,450 UART:
19,783,693 UART: Running Caliptra FMC ...
19,784,796 UART:
19,784,954 UART: [state] CFI Enabled
19,840,979 UART: [fht] FMC Alias Private Key: 7
21,604,938 UART: [art] Extend RT PCRs Done
21,606,160 UART: [art] Lock RT PCRs Done
21,607,676 UART: [art] Populate DV Done
21,613,256 UART: [fht] FMC Alias Private Key: 7
21,614,956 UART: [art] Derive CDI
21,615,777 UART: [art] Store in in slot 0x4
21,673,333 UART: [art] Derive Key Pair
21,674,340 UART: [art] Store priv key in slot 0x5
24,136,759 UART: [art] Derive Key Pair - Done
24,149,764 UART: [art] Signing Cert with AUTHO
24,151,075 UART: RITY.KEYID = 7
25,862,851 UART: [art] Erasing AUTHORITY.KEYID = 7
25,864,358 UART: [art] PUB.X = AF9145D697356A8C439CC6302D927209CC2114B4FC8E816EE30E19A58B2DAF1B05B5FA5DDC9963F7A46B1DA64A5944F7
25,871,661 UART: [art] PUB.Y = 5AECE25EFEB8D20ADE324F4F146DF6E8CF79115E600E3D64A2C4A55C8A45BC0D3B2FCAE138855F0AE70E441715B447E2
25,878,951 UART: [art] SIG.R = D159861580231D7BFB53A6C493CC3AD4B6AD039CB5C6EA3D40DA87CABBAE2613F7DD7FEEB1B9D3375C54AFFEA36C8A24
25,886,386 UART: [art] SIG.S = 9DCA351A16B08EDF949F178E656B040A0872F238E9605BD33E6BBDC3EE6E871963C50DDBA1F67158B0B9686070F36496
26,865,311 UART: Caliptra RT
26,865,999 UART: [state] CFI Enabled
27,029,549 UART: [rt] RT listening for mailbox commands...
27,031,844 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,187,501 UART: [rt]cmd =0x41544d4e, len=14344
29,541,593 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,357,931 ready_for_fw is high
3,358,357 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,028,265 >>> mbox cmd response: success
19,323,605 UART:
19,323,999 UART: Running Caliptra FMC ...
19,325,201 UART:
19,325,386 UART: [state] CFI Enabled
19,393,988 UART: [fht] FMC Alias Private Key: 7
21,157,119 UART: [art] Extend RT PCRs Done
21,158,338 UART: [art] Lock RT PCRs Done
21,159,809 UART: [art] Populate DV Done
21,165,125 UART: [fht] FMC Alias Private Key: 7
21,166,829 UART: [art] Derive CDI
21,167,645 UART: [art] Store in in slot 0x4
21,227,086 UART: [art] Derive Key Pair
21,228,131 UART: [art] Store priv key in slot 0x5
23,690,840 UART: [art] Derive Key Pair - Done
23,703,703 UART: [art] Signing Cert with AUTHO
23,705,013 UART: RITY.KEYID = 7
25,416,618 UART: [art] Erasing AUTHORITY.KEYID = 7
25,418,127 UART: [art] PUB.X = FA3A908E1E75582C4755D797F04B98ADFE98D902F590B6CFDA66E3DA6EEA4348969A0F5BD7B0D51529DC3DCAF66DB897
25,425,416 UART: [art] PUB.Y = 90D25D710237A8F84B783FCA20CF24CE3FAB5BA3033DD92A3AB850A434521EA28453C24153031C3B2476C0F9ABAA4E0D
25,432,715 UART: [art] SIG.R = 16914A21409DF804011D58F2772565EE6B25A3FE99E72C6378A070862A69C6619647021F4E44297DBD536C7F70B4ABAA
25,440,091 UART: [art] SIG.S = FADE95167FD5114EEDCA071470E7128BB57A32673FEFEF8440F389F49B44A7978F1DF53EF3F49B342537636543C25381
26,419,177 UART: Caliptra RT
26,419,892 UART: [state] CFI Enabled
26,584,406 UART: [rt] RT listening for mailbox commands...
26,586,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,742,027 UART: [rt]cmd =0x41544d4e, len=14344
29,094,346 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,880 writing to cptra_bootfsm_go
192,967 UART:
193,322 UART: Running Caliptra ROM ...
194,434 UART:
604,262 UART: [state] CFI Enabled
618,911 UART: [state] LifecycleState = Unprovisioned
620,786 UART: [state] DebugLocked = No
623,454 UART: [state] WD Timer not started. Device not locked for debugging
626,355 UART: [kat] SHA2-256
805,498 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,083 UART: [kat] ++
817,576 UART: [kat] sha1
828,845 UART: [kat] SHA2-256
831,829 UART: [kat] SHA2-384
837,630 UART: [kat] SHA2-512-ACC
840,640 UART: [kat] ECC-384
3,279,703 UART: [kat] HMAC-384Kdf
3,292,177 UART: [kat] LMS
3,821,670 UART: [kat] --
3,825,479 UART: [cold-reset] ++
3,826,913 UART: [fht] FHT @ 0x50003400
3,837,601 UART: [idev] ++
3,838,167 UART: [idev] CDI.KEYID = 6
3,839,080 UART: [idev] SUBJECT.KEYID = 7
3,840,256 UART: [idev] UDS.KEYID = 0
3,841,182 ready_for_fw is high
3,841,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,794 UART: [idev] Erasing UDS.KEYID = 0
6,313,575 UART: [idev] Sha1 KeyId Algorithm
6,336,314 UART: [idev] --
6,340,802 UART: [ldev] ++
6,341,415 UART: [ldev] CDI.KEYID = 6
6,342,335 UART: [ldev] SUBJECT.KEYID = 5
6,343,386 UART: [ldev] AUTHORITY.KEYID = 7
6,344,722 UART: [ldev] FE.KEYID = 1
6,357,148 UART: [ldev] Erasing FE.KEYID = 1
8,831,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,722 UART: [ldev] --
10,623,389 UART: [fwproc] Wait for Commands...
10,625,537 UART: [fwproc] Recv command 0x46574c44
10,627,629 UART: [fwproc] Recv'd Img size: 114168 bytes
15,187,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,263,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,332,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,650,101 >>> mbox cmd response: success
15,654,306 UART: [afmc] ++
15,654,901 UART: [afmc] CDI.KEYID = 6
15,655,811 UART: [afmc] SUBJECT.KEYID = 7
15,656,973 UART: [afmc] AUTHORITY.KEYID = 5
18,156,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,879,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,881,321 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,897,269 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,913,250 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,929,021 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,951,952 UART: [afmc] --
19,956,538 UART: [cold-reset] --
19,959,265 UART: [state] Locking Datavault
19,965,017 UART: [state] Locking PCR0, PCR1 and PCR31
19,966,665 UART: [state] Locking ICCM
19,968,493 UART: [exit] Launching FMC @ 0x40000130
19,976,899 UART:
19,977,133 UART: Running Caliptra FMC ...
19,978,232 UART:
19,978,395 UART: [state] CFI Enabled
19,986,442 UART: [fht] FMC Alias Private Key: 7
21,743,519 UART: [art] Extend RT PCRs Done
21,744,724 UART: [art] Lock RT PCRs Done
21,746,457 UART: [art] Populate DV Done
21,752,140 UART: [fht] FMC Alias Private Key: 7
21,753,682 UART: [art] Derive CDI
21,754,441 UART: [art] Store in in slot 0x4
21,797,081 UART: [art] Derive Key Pair
21,798,121 UART: [art] Store priv key in slot 0x5
24,224,622 UART: [art] Derive Key Pair - Done
24,237,954 UART: [art] Signing Cert with AUTHO
24,239,274 UART: RITY.KEYID = 7
25,944,849 UART: [art] Erasing AUTHORITY.KEYID = 7
25,946,380 UART: [art] PUB.X = EFFDB72CDE381D75F1D30747651BE6F0379A56A6FEB90E396BDFDDA416A267165CDBABF3A964A23E2EA2E653F7F70710
25,953,642 UART: [art] PUB.Y = F823E74EDB70E64F502504B8D214FCC9B9FC822083D4F0577590543EE60B2315E09C388473656601DF4114ED58E85CD9
25,960,882 UART: [art] SIG.R = 3AF151AE99B61287C3AEC4B18044EFBE7B904AF937487AB5B87E43D740F0F3FCF628820EA8E505334FEC4BE74009AACF
25,968,287 UART: [art] SIG.S = DABCBD33CB035C6A4055BA1DE9299994B1B06E262A3FE748F6846AF4075E7F177E47F19A1B3F77A3E306662A26C1A2E4
26,947,410 UART: Caliptra RT
26,948,405 UART: [state] CFI Enabled
27,065,556 UART: [rt] RT listening for mailbox commands...
27,067,885 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,223,059 UART: [rt]cmd =0x41544d4e, len=14344
29,591,736 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,774 writing to cptra_bootfsm_go
3,692,379 ready_for_fw is high
3,693,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,238,330 >>> mbox cmd response: success
19,484,862 UART:
19,485,277 UART: Running Caliptra FMC ...
19,486,412 UART:
19,486,578 UART: [state] CFI Enabled
19,494,386 UART: [fht] FMC Alias Private Key: 7
21,251,239 UART: [art] Extend RT PCRs Done
21,252,489 UART: [art] Lock RT PCRs Done
21,254,089 UART: [art] Populate DV Done
21,259,588 UART: [fht] FMC Alias Private Key: 7
21,261,246 UART: [art] Derive CDI
21,262,066 UART: [art] Store in in slot 0x4
21,304,454 UART: [art] Derive Key Pair
21,305,495 UART: [art] Store priv key in slot 0x5
23,731,969 UART: [art] Derive Key Pair - Done
23,744,808 UART: [art] Signing Cert with AUTHO
23,746,117 UART: RITY.KEYID = 7
25,451,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,452,983 UART: [art] PUB.X = 14562CAE440762E28FD31B63EB1E2A08097F41D1E9B70CEFC6E9E873C41EB45F093F66C1F1411D9FA1583D2047DF0EBC
25,460,243 UART: [art] PUB.Y = BDBB9A7AB542E66FD620FADC4B2BD316DAF8B187F5617476FEEDC46053758D2EF4003C81D47990F5B1AC1A0BFB7C4EC9
25,467,510 UART: [art] SIG.R = C13758AFE9E884D730AE46CCBC307CC6E8BDDAB5C06593B111AD3F71B7A2EC77550D84D1D7F5028D4F2EB34D0AD9F974
25,474,963 UART: [art] SIG.S = EBC0C78192DC561B963A1644680D3847CE7E413C2D639FEA00874A9BE463564C7E1E3AE97741E164B530DFE088A63166
26,453,937 UART: Caliptra RT
26,454,661 UART: [state] CFI Enabled
26,572,042 UART: [rt] RT listening for mailbox commands...
26,574,344 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,729,983 UART: [rt]cmd =0x41544d4e, len=14344
29,093,137 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,203 UART:
192,561 UART: Running Caliptra ROM ...
193,754 UART:
193,909 UART: [state] CFI Enabled
263,509 UART: [state] LifecycleState = Unprovisioned
265,936 UART: [state] DebugLocked = No
267,543 UART: [state] WD Timer not started. Device not locked for debugging
272,510 UART: [kat] SHA2-256
462,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,187 UART: [kat] ++
473,680 UART: [kat] sha1
484,508 UART: [kat] SHA2-256
487,581 UART: [kat] SHA2-384
492,441 UART: [kat] SHA2-512-ACC
495,024 UART: [kat] ECC-384
2,947,645 UART: [kat] HMAC-384Kdf
2,969,911 UART: [kat] LMS
3,501,637 UART: [kat] --
3,505,915 UART: [cold-reset] ++
3,507,921 UART: [fht] FHT @ 0x50003400
3,519,410 UART: [idev] ++
3,520,157 UART: [idev] CDI.KEYID = 6
3,521,074 UART: [idev] SUBJECT.KEYID = 7
3,522,253 UART: [idev] UDS.KEYID = 0
3,523,177 ready_for_fw is high
3,523,372 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,893 UART: [idev] Erasing UDS.KEYID = 0
6,025,674 UART: [idev] Sha1 KeyId Algorithm
6,047,880 UART: [idev] --
6,054,308 UART: [ldev] ++
6,054,992 UART: [ldev] CDI.KEYID = 6
6,055,901 UART: [ldev] SUBJECT.KEYID = 5
6,057,119 UART: [ldev] AUTHORITY.KEYID = 7
6,058,250 UART: [ldev] FE.KEYID = 1
6,098,099 UART: [ldev] Erasing FE.KEYID = 1
8,606,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,020 UART: [ldev] --
10,412,086 UART: [fwproc] Wait for Commands...
10,415,264 UART: [fwproc] Recv command 0x46574c44
10,417,573 UART: [fwproc] Recv'd Img size: 114168 bytes
15,034,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,116,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,232,462 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,773,028 >>> mbox cmd response: success
15,777,957 UART: [afmc] ++
15,778,667 UART: [afmc] CDI.KEYID = 6
15,779,776 UART: [afmc] SUBJECT.KEYID = 7
15,781,330 UART: [afmc] AUTHORITY.KEYID = 5
18,319,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,044,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,046,639 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,061,693 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,076,906 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,091,758 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,116,360 UART: [afmc] --
20,119,207 UART: [cold-reset] --
20,123,677 UART: [state] Locking Datavault
20,129,000 UART: [state] Locking PCR0, PCR1 and PCR31
20,131,162 UART: [state] Locking ICCM
20,132,200 UART: [exit] Launching FMC @ 0x40000130
20,140,840 UART:
20,141,077 UART: Running Caliptra FMC ...
20,142,178 UART:
20,142,333 UART: [state] CFI Enabled
20,201,887 UART: [fht] FMC Alias Private Key: 7
21,965,839 UART: [art] Extend RT PCRs Done
21,967,065 UART: [art] Lock RT PCRs Done
21,969,024 UART: [art] Populate DV Done
21,974,221 UART: [fht] FMC Alias Private Key: 7
21,975,759 UART: [art] Derive CDI
21,976,571 UART: [art] Store in in slot 0x4
22,033,993 UART: [art] Derive Key Pair
22,035,042 UART: [art] Store priv key in slot 0x5
24,498,033 UART: [art] Derive Key Pair - Done
24,510,656 UART: [art] Signing Cert with AUTHO
24,511,974 UART: RITY.KEYID = 7
26,222,989 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,499 UART: [art] PUB.X = 65D87451BA406EA27211453B69BBBC19F64EC43E377A7E19BE82D00AF09113A87D74509617674CAF8697822296BC0D24
26,231,771 UART: [art] PUB.Y = 64ABC1BFD8EE5024154D1BE06FB9C1A499F311B2A765F8191DF128AA0EBD05D8CBD10FE2EF7B652D0349E47AF8AD5975
26,239,087 UART: [art] SIG.R = 2AB496569DAB3FCC0264E229F582EB7D20860BAC3667C62A706C1E328CDFC83C4059F4341FDEF358EDED8093A266A99E
26,246,501 UART: [art] SIG.S = 62763148981E43D11A54026B6DCFE5A4ADCB25F05A0745BF6C03ED0AD21B0332E96CB356BD57444000F9C934C92F9E19
27,225,423 UART: Caliptra RT
27,226,133 UART: [state] CFI Enabled
27,390,909 UART: [rt] RT listening for mailbox commands...
27,393,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,588 UART: [rt]cmd =0x41544d4e, len=14344
29,908,810 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,440,632 ready_for_fw is high
3,441,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,875,455 >>> mbox cmd response: success
20,177,985 UART:
20,178,376 UART: Running Caliptra FMC ...
20,179,512 UART:
20,179,677 UART: [state] CFI Enabled
20,244,098 UART: [fht] FMC Alias Private Key: 7
22,007,744 UART: [art] Extend RT PCRs Done
22,008,962 UART: [art] Lock RT PCRs Done
22,010,272 UART: [art] Populate DV Done
22,015,584 UART: [fht] FMC Alias Private Key: 7
22,017,088 UART: [art] Derive CDI
22,017,856 UART: [art] Store in in slot 0x4
22,076,263 UART: [art] Derive Key Pair
22,077,302 UART: [art] Store priv key in slot 0x5
24,540,727 UART: [art] Derive Key Pair - Done
24,553,789 UART: [art] Signing Cert with AUTHO
24,555,100 UART: RITY.KEYID = 7
26,266,184 UART: [art] Erasing AUTHORITY.KEYID = 7
26,267,702 UART: [art] PUB.X = 55FE19E340BC2B88D114B0B05BBA50129AE01AB25E6D21F96923E8155EFD6D7C20BAE8E29A17D11F7F513DC263D8EA35
26,275,001 UART: [art] PUB.Y = 97853577E5A7F55F3B5D79DBC8D22E4CB20D0188CDAC888F7E940511FB5117A7FC9E89AE82B204FFA254C6A5DB05EB6E
26,282,244 UART: [art] SIG.R = EBD6184CA3D192708163004879559D1DB0057DF922E25A836C6BB0269751E2D0E76F6A232390A0827A3E7D8BCA182333
26,289,626 UART: [art] SIG.S = E4AEAAEEDDAA7B44B894C8F5E9546D9683192732852F65946532AA284A6A731545C249AAF1BA38E060EF75B19E66DBD1
27,268,895 UART: Caliptra RT
27,269,588 UART: [state] CFI Enabled
27,433,146 UART: [rt] RT listening for mailbox commands...
27,435,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,590,645 UART: [rt]cmd =0x41544d4e, len=14344
29,946,585 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,828 writing to cptra_bootfsm_go
193,089 UART:
193,456 UART: Running Caliptra ROM ...
194,666 UART:
604,189 UART: [state] CFI Enabled
619,014 UART: [state] LifecycleState = Unprovisioned
621,358 UART: [state] DebugLocked = No
624,245 UART: [state] WD Timer not started. Device not locked for debugging
629,340 UART: [kat] SHA2-256
819,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,981 UART: [kat] ++
830,592 UART: [kat] sha1
841,757 UART: [kat] SHA2-256
844,827 UART: [kat] SHA2-384
851,522 UART: [kat] SHA2-512-ACC
854,059 UART: [kat] ECC-384
3,295,545 UART: [kat] HMAC-384Kdf
3,309,339 UART: [kat] LMS
3,841,196 UART: [kat] --
3,845,576 UART: [cold-reset] ++
3,846,444 UART: [fht] FHT @ 0x50003400
3,857,847 UART: [idev] ++
3,858,552 UART: [idev] CDI.KEYID = 6
3,859,464 UART: [idev] SUBJECT.KEYID = 7
3,860,708 UART: [idev] UDS.KEYID = 0
3,861,634 ready_for_fw is high
3,861,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,259 UART: [idev] Erasing UDS.KEYID = 0
6,335,534 UART: [idev] Sha1 KeyId Algorithm
6,357,417 UART: [idev] --
6,362,764 UART: [ldev] ++
6,363,445 UART: [ldev] CDI.KEYID = 6
6,364,328 UART: [ldev] SUBJECT.KEYID = 5
6,365,540 UART: [ldev] AUTHORITY.KEYID = 7
6,366,779 UART: [ldev] FE.KEYID = 1
6,377,194 UART: [ldev] Erasing FE.KEYID = 1
8,851,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,505 UART: [ldev] --
10,639,733 UART: [fwproc] Wait for Commands...
10,642,637 UART: [fwproc] Recv command 0x46574c44
10,644,941 UART: [fwproc] Recv'd Img size: 114168 bytes
15,254,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,340,504 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,456,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,998,794 >>> mbox cmd response: success
16,002,031 UART: [afmc] ++
16,002,743 UART: [afmc] CDI.KEYID = 6
16,003,859 UART: [afmc] SUBJECT.KEYID = 7
16,005,404 UART: [afmc] AUTHORITY.KEYID = 5
18,508,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,230,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,232,145 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,247,221 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,262,389 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,277,246 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,300,601 UART: [afmc] --
20,303,696 UART: [cold-reset] --
20,308,705 UART: [state] Locking Datavault
20,313,699 UART: [state] Locking PCR0, PCR1 and PCR31
20,315,839 UART: [state] Locking ICCM
20,318,317 UART: [exit] Launching FMC @ 0x40000130
20,326,996 UART:
20,327,232 UART: Running Caliptra FMC ...
20,328,336 UART:
20,328,496 UART: [state] CFI Enabled
20,336,714 UART: [fht] FMC Alias Private Key: 7
22,093,616 UART: [art] Extend RT PCRs Done
22,094,851 UART: [art] Lock RT PCRs Done
22,096,354 UART: [art] Populate DV Done
22,101,936 UART: [fht] FMC Alias Private Key: 7
22,103,659 UART: [art] Derive CDI
22,104,485 UART: [art] Store in in slot 0x4
22,146,898 UART: [art] Derive Key Pair
22,147,935 UART: [art] Store priv key in slot 0x5
24,574,432 UART: [art] Derive Key Pair - Done
24,587,159 UART: [art] Signing Cert with AUTHO
24,588,466 UART: RITY.KEYID = 7
26,294,102 UART: [art] Erasing AUTHORITY.KEYID = 7
26,295,617 UART: [art] PUB.X = 9DA16EAF77BAC96BC7E2AD396180A045352D43B09184A613FD1649098C7A5EEB4770AC52D89762E42D90D0B5A648FEDD
26,302,920 UART: [art] PUB.Y = EC6D376EF4A688A9DAB554203DD998E5457A5AD817EC57DB835C8FF6B59FA048DFD9D4BD417DEE89AB9D78CA01D0F262
26,310,213 UART: [art] SIG.R = 7D2DFE6ECAC5B8D05401444CC1DD23A71702EE1A6A4455FBEE56AB24376CA7B6A0216911BC2ABDEBCE0B906ED44FABB1
26,317,605 UART: [art] SIG.S = 1BC493D092CA281256F19CD3F91875232D65175613A73934233B4BDDE521D6EF3F1585593430F4AC552F0E03DDEBE46F
27,296,997 UART: Caliptra RT
27,297,710 UART: [state] CFI Enabled
27,415,543 UART: [rt] RT listening for mailbox commands...
27,417,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,573,266 UART: [rt]cmd =0x41544d4e, len=14344
29,935,157 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,757 writing to cptra_bootfsm_go
3,759,493 ready_for_fw is high
3,759,892 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,084,150 >>> mbox cmd response: success
20,335,037 UART:
20,335,437 UART: Running Caliptra FMC ...
20,336,572 UART:
20,336,735 UART: [state] CFI Enabled
20,344,308 UART: [fht] FMC Alias Private Key: 7
22,101,368 UART: [art] Extend RT PCRs Done
22,102,577 UART: [art] Lock RT PCRs Done
22,104,390 UART: [art] Populate DV Done
22,109,756 UART: [fht] FMC Alias Private Key: 7
22,111,300 UART: [art] Derive CDI
22,112,120 UART: [art] Store in in slot 0x4
22,154,465 UART: [art] Derive Key Pair
22,155,539 UART: [art] Store priv key in slot 0x5
24,582,363 UART: [art] Derive Key Pair - Done
24,595,312 UART: [art] Signing Cert with AUTHO
24,596,631 UART: RITY.KEYID = 7
26,302,356 UART: [art] Erasing AUTHORITY.KEYID = 7
26,304,352 UART: [art] PUB.X = C35B8F2A95F104905AD7551C9AD8221038B2E9AA98DCCD7C6ED981430ED0BB3E4A8A124D21DC5C906923D10DD13FDB9F
26,311,112 UART: [art] PUB.Y = C5E80AF89D4525B9FF1F20439AB2B6F7AF2CF3D57AA15D5B6F2020BC8471B0F997F9F93146A153A688FFE2AC4A0B3345
26,318,383 UART: [art] SIG.R = CFE284C42DED7BBE6504A58F6C4739015DC33C9DB3A61B6DB8A5C93E0D5861F111F2ECA90AC77ED54FF2DCBA4684DCD2
26,325,832 UART: [art] SIG.S = C596E399836C8972E9AF1FEFB1CCF8E70399EB82134BF23409F559CD67CA648D4CA14002551E5B6E283CB9B0D12F5EC7
27,304,679 UART: Caliptra RT
27,305,392 UART: [state] CFI Enabled
27,422,767 UART: [rt] RT listening for mailbox commands...
27,425,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,580,474 UART: [rt]cmd =0x41544d4e, len=14344
29,947,550 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,593 UART: [kat] SHA2-256
882,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,639 UART: [kat] ++
886,791 UART: [kat] sha1
891,161 UART: [kat] SHA2-256
893,099 UART: [kat] SHA2-384
895,802 UART: [kat] SHA2-512-ACC
897,703 UART: [kat] ECC-384
902,862 UART: [kat] HMAC-384Kdf
907,622 UART: [kat] LMS
1,475,818 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,476,953 UART: [fht] Storing FHT @ 0x50003400
1,479,568 UART: [idev] ++
1,479,736 UART: [idev] CDI.KEYID = 6
1,480,096 UART: [idev] SUBJECT.KEYID = 7
1,480,520 UART: [idev] UDS.KEYID = 0
1,480,865 ready_for_fw is high
1,480,865 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,362 UART: [idev] Erasing UDS.KEYID = 0
1,504,874 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,528 UART: [idev] --
1,514,409 UART: [ldev] ++
1,514,577 UART: [ldev] CDI.KEYID = 6
1,514,940 UART: [ldev] SUBJECT.KEYID = 5
1,515,366 UART: [ldev] AUTHORITY.KEYID = 7
1,515,829 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,468 UART: [ldev] --
1,585,803 UART: [fwproc] Waiting for Commands...
1,586,512 UART: [fwproc] Received command 0x46574c44
1,587,303 UART: [fwproc] Received Image of size 114168 bytes
5,082,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,901 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,253 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,275,782 >>> mbox cmd response: success
5,276,936 UART: [afmc] ++
5,277,104 UART: [afmc] CDI.KEYID = 6
5,277,466 UART: [afmc] SUBJECT.KEYID = 7
5,277,891 UART: [afmc] AUTHORITY.KEYID = 5
5,312,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,329,053 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,329,833 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,335,542 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,341,434 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,347,135 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,355,017 UART: [afmc] --
5,356,069 UART: [cold-reset] --
5,356,981 UART: [state] Locking Datavault
5,358,356 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,960 UART: [state] Locking ICCM
5,359,512 UART: [exit] Launching FMC @ 0x40000130
5,364,841 UART:
5,364,857 UART: Running Caliptra FMC ...
5,365,265 UART:
5,365,319 UART: [state] CFI Enabled
5,376,213 UART: [fht] FMC Alias Private Key: 7
5,483,863 UART: [art] Extend RT PCRs Done
5,484,291 UART: [art] Lock RT PCRs Done
5,486,021 UART: [art] Populate DV Done
5,494,477 UART: [fht] FMC Alias Private Key: 7
5,495,613 UART: [art] Derive CDI
5,495,893 UART: [art] Store in in slot 0x4
5,581,528 UART: [art] Derive Key Pair
5,581,888 UART: [art] Store priv key in slot 0x5
5,594,874 UART: [art] Derive Key Pair - Done
5,609,539 UART: [art] Signing Cert with AUTHO
5,610,019 UART: RITY.KEYID = 7
5,625,541 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,306 UART: [art] PUB.X = FAABDAA6562BD5DD689B7B1D1AE0E588D636AB357EA2E505E02C893F1ABCC68FA600BB0443DAFAEB304F1CBA2DDA326F
5,633,082 UART: [art] PUB.Y = 45F824573DC1695992CE831D41908855DB6792DDE9B1DB668B9976462506BFE40E2AE0122F9A33A6BD296F40045F94E2
5,640,019 UART: [art] SIG.R = 7FEEFFC7EA4A72EFBD20807D7400473347CE745B90AF5BFA56C386F9DF052172888ADFB09A33FE5518EA3F9A98C11674
5,646,778 UART: [art] SIG.S = 5E1BE658D7F20BB67FAB57083FFF8B3E457F6327E3726797A6F96F387E416C70A86F09DC963DC07D92533E0EE5A0F6BA
5,670,405 UART: Caliptra RT
5,670,658 UART: [state] CFI Enabled
5,778,152 UART: [rt] RT listening for mailbox commands...
5,778,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,901,778 UART: [rt]cmd =0x41544d4e, len=14344
6,464,792 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 ready_for_fw is high
1,362,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,050,156 >>> mbox cmd response: success
5,111,387 UART:
5,111,403 UART: Running Caliptra FMC ...
5,111,811 UART:
5,111,865 UART: [state] CFI Enabled
5,122,269 UART: [fht] FMC Alias Private Key: 7
5,230,407 UART: [art] Extend RT PCRs Done
5,230,835 UART: [art] Lock RT PCRs Done
5,231,975 UART: [art] Populate DV Done
5,240,241 UART: [fht] FMC Alias Private Key: 7
5,241,235 UART: [art] Derive CDI
5,241,515 UART: [art] Store in in slot 0x4
5,327,140 UART: [art] Derive Key Pair
5,327,500 UART: [art] Store priv key in slot 0x5
5,340,920 UART: [art] Derive Key Pair - Done
5,355,907 UART: [art] Signing Cert with AUTHO
5,356,387 UART: RITY.KEYID = 7
5,371,341 UART: [art] Erasing AUTHORITY.KEYID = 7
5,372,106 UART: [art] PUB.X = C948E48DE1913A214AFBA73B04C29279FBAFC7879A4E4C16E299EC0FC8ED618EA1ADC1BA515B0271A70DE6632F19DB93
5,378,882 UART: [art] PUB.Y = A1CD272531A7AC62DB95B5F2825A3ECC7FBDF1A9E26CD275B2662F0510382C80104A50E84E3C6F32C47289C4989C5D46
5,385,835 UART: [art] SIG.R = AAF9914191EFC7FFE5089141664397CEB6F1600A3FF18F6A11FA1A32514DE0590ECF0E2D7CE6A59ADAEC2DEF8477F264
5,392,611 UART: [art] SIG.S = 8E91850DD8A9CF5AF46BD76ECDF4B6D4379B8D3F07D11108DB2D723E13F5D804CCFD5F9A6312CEF86EC5E8CDF110CB08
5,416,339 UART: Caliptra RT
5,416,592 UART: [state] CFI Enabled
5,524,828 UART: [rt] RT listening for mailbox commands...
5,525,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,648,914 UART: [rt]cmd =0x41544d4e, len=14344
6,214,463 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,089 UART: [state] LifecycleState = Unprovisioned
85,744 UART: [state] DebugLocked = No
86,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,870 UART: [kat] SHA2-256
881,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,916 UART: [kat] ++
886,068 UART: [kat] sha1
890,374 UART: [kat] SHA2-256
892,312 UART: [kat] SHA2-384
895,177 UART: [kat] SHA2-512-ACC
897,078 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,931 UART: [kat] LMS
1,476,127 UART: [kat] --
1,476,952 UART: [cold-reset] ++
1,477,282 UART: [fht] Storing FHT @ 0x50003400
1,480,151 UART: [idev] ++
1,480,319 UART: [idev] CDI.KEYID = 6
1,480,679 UART: [idev] SUBJECT.KEYID = 7
1,481,103 UART: [idev] UDS.KEYID = 0
1,481,448 ready_for_fw is high
1,481,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,501 UART: [idev] Erasing UDS.KEYID = 0
1,506,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,029 UART: [idev] --
1,515,942 UART: [ldev] ++
1,516,110 UART: [ldev] CDI.KEYID = 6
1,516,473 UART: [ldev] SUBJECT.KEYID = 5
1,516,899 UART: [ldev] AUTHORITY.KEYID = 7
1,517,362 UART: [ldev] FE.KEYID = 1
1,522,628 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,729 UART: [ldev] --
1,587,200 UART: [fwproc] Waiting for Commands...
1,587,819 UART: [fwproc] Received command 0x46574c44
1,588,610 UART: [fwproc] Received Image of size 114168 bytes
5,083,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,826 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,275,911 >>> mbox cmd response: success
5,277,045 UART: [afmc] ++
5,277,213 UART: [afmc] CDI.KEYID = 6
5,277,575 UART: [afmc] SUBJECT.KEYID = 7
5,278,000 UART: [afmc] AUTHORITY.KEYID = 5
5,313,288 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,329,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,330,390 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,336,099 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,341,991 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,347,692 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,355,764 UART: [afmc] --
5,356,724 UART: [cold-reset] --
5,357,424 UART: [state] Locking Datavault
5,358,689 UART: [state] Locking PCR0, PCR1 and PCR31
5,359,293 UART: [state] Locking ICCM
5,359,737 UART: [exit] Launching FMC @ 0x40000130
5,365,066 UART:
5,365,082 UART: Running Caliptra FMC ...
5,365,490 UART:
5,365,633 UART: [state] CFI Enabled
5,376,405 UART: [fht] FMC Alias Private Key: 7
5,484,535 UART: [art] Extend RT PCRs Done
5,484,963 UART: [art] Lock RT PCRs Done
5,486,685 UART: [art] Populate DV Done
5,494,773 UART: [fht] FMC Alias Private Key: 7
5,495,753 UART: [art] Derive CDI
5,496,033 UART: [art] Store in in slot 0x4
5,581,466 UART: [art] Derive Key Pair
5,581,826 UART: [art] Store priv key in slot 0x5
5,595,338 UART: [art] Derive Key Pair - Done
5,610,220 UART: [art] Signing Cert with AUTHO
5,610,700 UART: RITY.KEYID = 7
5,625,892 UART: [art] Erasing AUTHORITY.KEYID = 7
5,626,657 UART: [art] PUB.X = 7463F4595B9D3FFB3DB9AEDB90D11E6FD6DA10416AC68683A8D630A05D4D17305A96A6966417D8F4CFA66419D6A17001
5,633,430 UART: [art] PUB.Y = DAE93DB5BFCCA1807D683E2EA781049806F4E8EAB8BA804B4DA6255316C0E41503B08C1824CC8ADA1E3B707AED07586A
5,640,384 UART: [art] SIG.R = 64A978258E5DA9CB16537DFDB776CAF912635AEA2F15AE71B40DF3D88A43739DF8403F950358EEC7494550A2DC56985B
5,647,154 UART: [art] SIG.S = 5DA8B3D7E6056DE64B82344123338F367454C1F61AAE03AE7B086AB4E24D218FBDED65550C83A658157CFC9E7F2DED0D
5,670,556 UART: Caliptra RT
5,670,901 UART: [state] CFI Enabled
5,777,939 UART: [rt] RT listening for mailbox commands...
5,778,609 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,901,443 UART: [rt]cmd =0x41544d4e, len=14344
6,467,240 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,046 ready_for_fw is high
1,362,046 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,274,949 >>> mbox cmd response: success
5,334,970 UART:
5,334,986 UART: Running Caliptra FMC ...
5,335,394 UART:
5,335,537 UART: [state] CFI Enabled
5,346,047 UART: [fht] FMC Alias Private Key: 7
5,453,709 UART: [art] Extend RT PCRs Done
5,454,137 UART: [art] Lock RT PCRs Done
5,455,547 UART: [art] Populate DV Done
5,463,727 UART: [fht] FMC Alias Private Key: 7
5,464,879 UART: [art] Derive CDI
5,465,159 UART: [art] Store in in slot 0x4
5,550,506 UART: [art] Derive Key Pair
5,550,866 UART: [art] Store priv key in slot 0x5
5,564,324 UART: [art] Derive Key Pair - Done
5,579,186 UART: [art] Signing Cert with AUTHO
5,579,666 UART: RITY.KEYID = 7
5,594,506 UART: [art] Erasing AUTHORITY.KEYID = 7
5,595,271 UART: [art] PUB.X = CAF0CFFACC72284C6EBCF17EE1D7E9C1D67143E3242B8C3C15AEF2BC3A15E0B5EB83AEF84F67F2A5E2C0B968B651C203
5,602,066 UART: [art] PUB.Y = DBBE6EFEBB3D8BFC4AC8304F7971223816C9DD3B81AD5FE739B0ECD62AB7FC78219A6A19741898F66DA3EADD6FB61D5C
5,609,044 UART: [art] SIG.R = 3B793DA16DAED90196BCF54C5BB0727D2353B1A70396DEDDEB2F910AD36EF1EBBCB357719605AF5042A0EF273E6FEF7D
5,615,824 UART: [art] SIG.S = D606DD3C7AC0C33B903F008E18F86E129C5F529E2E4702683334A23BA5A0370532146082A18DD7884AA0BF575766C97A
5,639,468 UART: Caliptra RT
5,639,813 UART: [state] CFI Enabled
5,748,028 UART: [rt] RT listening for mailbox commands...
5,748,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,871,808 UART: [rt]cmd =0x41544d4e, len=14344
6,427,039 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,354 UART: [kat] LMS
1,170,682 UART: [kat] --
1,171,919 UART: [cold-reset] ++
1,172,421 UART: [fht] FHT @ 0x50003400
1,175,188 UART: [idev] ++
1,175,356 UART: [idev] CDI.KEYID = 6
1,175,716 UART: [idev] SUBJECT.KEYID = 7
1,176,140 UART: [idev] UDS.KEYID = 0
1,176,485 ready_for_fw is high
1,176,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,242 UART: [idev] Erasing UDS.KEYID = 0
1,201,009 UART: [idev] Sha1 KeyId Algorithm
1,209,491 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,044 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,217,199 UART: [ldev] Erasing FE.KEYID = 1
1,243,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,529 UART: [ldev] --
1,282,886 UART: [fwproc] Wait for Commands...
1,283,484 UART: [fwproc] Recv command 0x46574c44
1,284,212 UART: [fwproc] Recv'd Img size: 114168 bytes
3,115,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,142,924 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,228 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,307,875 >>> mbox cmd response: success
3,308,955 UART: [afmc] ++
3,309,123 UART: [afmc] CDI.KEYID = 6
3,309,485 UART: [afmc] SUBJECT.KEYID = 7
3,309,910 UART: [afmc] AUTHORITY.KEYID = 5
3,345,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,643 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,352 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,244 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,955 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,952 UART: [afmc] --
3,388,958 UART: [cold-reset] --
3,389,710 UART: [state] Locking Datavault
3,390,931 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,535 UART: [state] Locking ICCM
3,392,087 UART: [exit] Launching FMC @ 0x40000130
3,397,416 UART:
3,397,432 UART: Running Caliptra FMC ...
3,397,840 UART:
3,397,894 UART: [state] CFI Enabled
3,408,648 UART: [fht] FMC Alias Private Key: 7
3,516,546 UART: [art] Extend RT PCRs Done
3,516,974 UART: [art] Lock RT PCRs Done
3,518,762 UART: [art] Populate DV Done
3,526,958 UART: [fht] FMC Alias Private Key: 7
3,528,062 UART: [art] Derive CDI
3,528,342 UART: [art] Store in in slot 0x4
3,613,931 UART: [art] Derive Key Pair
3,614,291 UART: [art] Store priv key in slot 0x5
3,627,651 UART: [art] Derive Key Pair - Done
3,642,242 UART: [art] Signing Cert with AUTHO
3,642,722 UART: RITY.KEYID = 7
3,657,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,745 UART: [art] PUB.X = 987C0E18762258A5FD39F9923ABB942F0E55A56C1F049D57981CD003B7306D540BB632AC984AE7AFAB8B9A8B1241FFF8
3,665,508 UART: [art] PUB.Y = 559D858920A3605206C33CF33994892DE187FE6E5E98FAD77E3E7B978CED3CF3D962C23AFA69784B9285E61FE7616D77
3,672,457 UART: [art] SIG.R = 80D09715399025B04926DAD231CA79BB94BD6F1D0E6BA5489918797D432F8656637723C6CE88A5A2D664C876E60FD581
3,679,215 UART: [art] SIG.S = FDCFBF15F17728111AFC76E5F0F9B0238D9D687AD65665893C3A6E9FFB5B272BEDE9E654FBCF9D81CD6B076F1793A291
3,702,695 UART: Caliptra RT
3,702,948 UART: [state] CFI Enabled
3,809,623 UART: [rt] RT listening for mailbox commands...
3,810,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,309 UART: [rt]cmd =0x41544d4e, len=14344
4,493,944 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,397 ready_for_fw is high
1,059,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,855 >>> mbox cmd response: success
3,227,598 UART:
3,227,614 UART: Running Caliptra FMC ...
3,228,022 UART:
3,228,076 UART: [state] CFI Enabled
3,238,748 UART: [fht] FMC Alias Private Key: 7
3,346,876 UART: [art] Extend RT PCRs Done
3,347,304 UART: [art] Lock RT PCRs Done
3,348,978 UART: [art] Populate DV Done
3,357,310 UART: [fht] FMC Alias Private Key: 7
3,358,378 UART: [art] Derive CDI
3,358,658 UART: [art] Store in in slot 0x4
3,444,405 UART: [art] Derive Key Pair
3,444,765 UART: [art] Store priv key in slot 0x5
3,457,779 UART: [art] Derive Key Pair - Done
3,472,542 UART: [art] Signing Cert with AUTHO
3,473,022 UART: RITY.KEYID = 7
3,488,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,283 UART: [art] PUB.X = 441F9CFEA0FCDC7E115979FB2F891A177A286A27DB9B8DA4862D81194B05A86A88B0963F7DC136925222F81B657A6624
3,496,052 UART: [art] PUB.Y = A6CB8FB3779B99DC845FBFDB073408355054AD99803BF778B2D33E2422DA5E6EA602E31E134231DD9930B1E0D20FD840
3,502,996 UART: [art] SIG.R = 7DE21C0FD88AC014FD23209F117BF77C3F359F49CB46FF60AF5F5C1CCEC7662900413E0DCB95BB9AF04CF52B505D10A7
3,509,756 UART: [art] SIG.S = EF02D2BFBD7E50A17654B59BE2B410A115AEAF65ECB0417DB2C10388568D8A7AF0F489C6DF7ABD6D3CDC99514FE7BAEF
3,534,121 UART: Caliptra RT
3,534,374 UART: [state] CFI Enabled
3,642,390 UART: [rt] RT listening for mailbox commands...
3,643,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,930 UART: [rt]cmd =0x41544d4e, len=14344
4,336,679 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,895 UART: [state] LifecycleState = Unprovisioned
86,550 UART: [state] DebugLocked = No
87,178 UART: [state] WD Timer not started. Device not locked for debugging
88,451 UART: [kat] SHA2-256
894,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,226 UART: [kat] ++
898,378 UART: [kat] sha1
902,640 UART: [kat] SHA2-256
904,580 UART: [kat] SHA2-384
907,319 UART: [kat] SHA2-512-ACC
909,220 UART: [kat] ECC-384
918,991 UART: [kat] HMAC-384Kdf
923,567 UART: [kat] LMS
1,171,895 UART: [kat] --
1,172,990 UART: [cold-reset] ++
1,173,484 UART: [fht] FHT @ 0x50003400
1,176,223 UART: [idev] ++
1,176,391 UART: [idev] CDI.KEYID = 6
1,176,751 UART: [idev] SUBJECT.KEYID = 7
1,177,175 UART: [idev] UDS.KEYID = 0
1,177,520 ready_for_fw is high
1,177,520 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,947 UART: [idev] Erasing UDS.KEYID = 0
1,202,460 UART: [idev] Sha1 KeyId Algorithm
1,211,110 UART: [idev] --
1,212,326 UART: [ldev] ++
1,212,494 UART: [ldev] CDI.KEYID = 6
1,212,857 UART: [ldev] SUBJECT.KEYID = 5
1,213,283 UART: [ldev] AUTHORITY.KEYID = 7
1,213,746 UART: [ldev] FE.KEYID = 1
1,219,076 UART: [ldev] Erasing FE.KEYID = 1
1,245,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,538 UART: [ldev] --
1,284,899 UART: [fwproc] Wait for Commands...
1,285,635 UART: [fwproc] Recv command 0x46574c44
1,286,363 UART: [fwproc] Recv'd Img size: 114168 bytes
3,124,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,282 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,316,733 >>> mbox cmd response: success
3,317,871 UART: [afmc] ++
3,318,039 UART: [afmc] CDI.KEYID = 6
3,318,401 UART: [afmc] SUBJECT.KEYID = 7
3,318,826 UART: [afmc] AUTHORITY.KEYID = 5
3,354,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,205 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,914 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,806 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,517 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,416 UART: [afmc] --
3,397,536 UART: [cold-reset] --
3,398,094 UART: [state] Locking Datavault
3,399,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,769 UART: [state] Locking ICCM
3,400,203 UART: [exit] Launching FMC @ 0x40000130
3,405,532 UART:
3,405,548 UART: Running Caliptra FMC ...
3,405,956 UART:
3,406,099 UART: [state] CFI Enabled
3,416,709 UART: [fht] FMC Alias Private Key: 7
3,524,841 UART: [art] Extend RT PCRs Done
3,525,269 UART: [art] Lock RT PCRs Done
3,526,839 UART: [art] Populate DV Done
3,534,925 UART: [fht] FMC Alias Private Key: 7
3,535,951 UART: [art] Derive CDI
3,536,231 UART: [art] Store in in slot 0x4
3,621,730 UART: [art] Derive Key Pair
3,622,090 UART: [art] Store priv key in slot 0x5
3,634,964 UART: [art] Derive Key Pair - Done
3,649,793 UART: [art] Signing Cert with AUTHO
3,650,273 UART: RITY.KEYID = 7
3,665,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,666,652 UART: [art] PUB.X = 58BC8BACA2363C344BFC13C6D118D474713A631EF9DA0D71689273EEBF31BFB2AEF82CEB04DEE3F4E55F39F7F79AF97B
3,673,440 UART: [art] PUB.Y = C5D5DF6988A600DD361FAE2EC62076ABE8AE500AA4E16B485833609CCE428C0BC5CF3E4A932D5A5D1CBFD4448B14B5E4
3,680,382 UART: [art] SIG.R = 7CB3330DE0A3FF4C1BC79ED81F4942E6D5B64761782667B3805A47DC4B70F5E68C3DBD74F13C83DBA765338F0E49EF97
3,687,156 UART: [art] SIG.S = 10AD5A74A47C7423DE24729D40522917CAB0EB424A815FBEA6E1069FFB5617DB43E9AD6A47C36C9E11087C3A6099CCF8
3,710,503 UART: Caliptra RT
3,710,848 UART: [state] CFI Enabled
3,817,455 UART: [rt] RT listening for mailbox commands...
3,818,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,227 UART: [rt]cmd =0x41544d4e, len=14344
4,499,713 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 ready_for_fw is high
1,060,562 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,178,156 >>> mbox cmd response: success
3,240,871 UART:
3,240,887 UART: Running Caliptra FMC ...
3,241,295 UART:
3,241,438 UART: [state] CFI Enabled
3,251,872 UART: [fht] FMC Alias Private Key: 7
3,359,302 UART: [art] Extend RT PCRs Done
3,359,730 UART: [art] Lock RT PCRs Done
3,361,054 UART: [art] Populate DV Done
3,369,078 UART: [fht] FMC Alias Private Key: 7
3,370,166 UART: [art] Derive CDI
3,370,446 UART: [art] Store in in slot 0x4
3,455,689 UART: [art] Derive Key Pair
3,456,049 UART: [art] Store priv key in slot 0x5
3,469,351 UART: [art] Derive Key Pair - Done
3,484,171 UART: [art] Signing Cert with AUTHO
3,484,651 UART: RITY.KEYID = 7
3,500,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,886 UART: [art] PUB.X = DC8ADAF66AEF71C62D8DD5D996E53C51175097AE7AA62454FDD7E14008E3011496613C0166C3762D047528088675FCF4
3,507,641 UART: [art] PUB.Y = 7813E189F2FD314DB277ED1FBE2C6F9D8226661CD7191414D2896B26EBFD15EFD922B292E99CF894AB9D51AA0AA5DCA7
3,514,604 UART: [art] SIG.R = A636E03683833DB0B007F4CCEC7BAAF2B8077CB2176C6F11326D8D51D12B5C433F46DE04AF9B56A6BC231357623F8585
3,521,371 UART: [art] SIG.S = 74FFCA85553FED0B186424F2026F28BCE36A9B03ECF04BEF591682A9290C2D391773B4494859698BF9E9852DAC7F7729
3,545,090 UART: Caliptra RT
3,545,435 UART: [state] CFI Enabled
3,652,985 UART: [rt] RT listening for mailbox commands...
3,653,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,665 UART: [rt]cmd =0x41544d4e, len=14344
4,337,190 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,051 UART: [kat] ++
895,203 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
904,048 UART: [kat] SHA2-512-ACC
905,949 UART: [kat] ECC-384
915,800 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,169 UART: [fht] FHT @ 0x50003400
1,172,831 UART: [idev] ++
1,172,999 UART: [idev] CDI.KEYID = 6
1,173,360 UART: [idev] SUBJECT.KEYID = 7
1,173,785 UART: [idev] UDS.KEYID = 0
1,174,131 ready_for_fw is high
1,174,131 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,933 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,123 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,674 UART: [ldev] --
1,281,118 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,424 UART: [fwproc] Recv'd Img size: 114168 bytes
3,126,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,319,489 >>> mbox cmd response: success
3,320,506 UART: [afmc] ++
3,320,674 UART: [afmc] CDI.KEYID = 6
3,321,037 UART: [afmc] SUBJECT.KEYID = 7
3,321,463 UART: [afmc] AUTHORITY.KEYID = 5
3,357,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,246 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,956 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,846 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,557 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,405 UART: [afmc] --
3,400,527 UART: [cold-reset] --
3,401,501 UART: [state] Locking Datavault
3,402,766 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,370 UART: [state] Locking ICCM
3,403,876 UART: [exit] Launching FMC @ 0x40000130
3,409,205 UART:
3,409,221 UART: Running Caliptra FMC ...
3,409,629 UART:
3,409,683 UART: [state] CFI Enabled
3,420,185 UART: [fht] FMC Alias Private Key: 7
3,527,791 UART: [art] Extend RT PCRs Done
3,528,219 UART: [art] Lock RT PCRs Done
3,529,635 UART: [art] Populate DV Done
3,538,051 UART: [fht] FMC Alias Private Key: 7
3,539,233 UART: [art] Derive CDI
3,539,513 UART: [art] Store in in slot 0x4
3,624,788 UART: [art] Derive Key Pair
3,625,148 UART: [art] Store priv key in slot 0x5
3,638,522 UART: [art] Derive Key Pair - Done
3,653,236 UART: [art] Signing Cert with AUTHO
3,653,716 UART: RITY.KEYID = 7
3,669,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,670,019 UART: [art] PUB.X = B532C1D295E3A3058BF7589B49A078B75E765B298C16E0414CA1C0CE2B95E513161773AF98B37EFF8730C52852FDC3DB
3,676,790 UART: [art] PUB.Y = 8AF39DD70ECDE57F1F45D35C5D9B2B5CCA8755E3C4822A6D96AEA976E400A15F1D1454950E1D148766DB754285C084D1
3,683,720 UART: [art] SIG.R = 9BC268F88619964EF3C2E4E32E238D5DD36CD8B8A4834785B762B61F96C92F8F5382E2FE65DC58344C5F29F82763365B
3,690,490 UART: [art] SIG.S = 9E5A38095510C58BD6D4A1EC118B75BC958827FF9FD3979F762A2F96E8D0DEBA995410D1A5BA7A37B95D19FEA9D85FED
3,714,604 UART: Caliptra RT
3,714,857 UART: [state] CFI Enabled
3,822,204 UART: [rt] RT listening for mailbox commands...
3,822,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,658 UART: [rt]cmd =0x41544d4e, len=14344
4,509,010 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,164 ready_for_fw is high
1,056,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,156,933 >>> mbox cmd response: success
3,218,186 UART:
3,218,202 UART: Running Caliptra FMC ...
3,218,610 UART:
3,218,664 UART: [state] CFI Enabled
3,229,286 UART: [fht] FMC Alias Private Key: 7
3,337,426 UART: [art] Extend RT PCRs Done
3,337,854 UART: [art] Lock RT PCRs Done
3,339,328 UART: [art] Populate DV Done
3,347,474 UART: [fht] FMC Alias Private Key: 7
3,348,638 UART: [art] Derive CDI
3,348,918 UART: [art] Store in in slot 0x4
3,434,621 UART: [art] Derive Key Pair
3,434,981 UART: [art] Store priv key in slot 0x5
3,448,061 UART: [art] Derive Key Pair - Done
3,462,742 UART: [art] Signing Cert with AUTHO
3,463,222 UART: RITY.KEYID = 7
3,478,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,479,527 UART: [art] PUB.X = A5486B34858C01F53DDC919F3ACDD7518A5CABB23A2A7B1E854153D3CDB8693064E16F5AED02E906254EBFFDFD2A0893
3,486,301 UART: [art] PUB.Y = 3B066A9B21304F70F81FFAF3CDEBAA615CC00760595D8B5A0E5CA8A8E36A51C698C4218D55EF99C7EF6CEEC3D2B115B8
3,493,262 UART: [art] SIG.R = 82EB8B681930172BF001420C5755D197EE44B5C291B551C943AAF0AE6EB4541638DBA83127DB29C90298A83FA130C45F
3,500,023 UART: [art] SIG.S = BE627659D4EDFC713AEEE0BEA757702884D783255228C17267C4F212065086837F240F6E7CD5818EA47796304EB55F86
3,523,474 UART: Caliptra RT
3,523,727 UART: [state] CFI Enabled
3,631,666 UART: [rt] RT listening for mailbox commands...
3,632,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,755,328 UART: [rt]cmd =0x41544d4e, len=14344
4,311,487 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
891,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,520 UART: [kat] SHA2-256
901,460 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
915,887 UART: [kat] HMAC-384Kdf
920,441 UART: [kat] LMS
1,168,753 UART: [kat] --
1,169,396 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,520 UART: [idev] ++
1,172,688 UART: [idev] CDI.KEYID = 6
1,173,049 UART: [idev] SUBJECT.KEYID = 7
1,173,474 UART: [idev] UDS.KEYID = 0
1,173,820 ready_for_fw is high
1,173,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,622 UART: [idev] Erasing UDS.KEYID = 0
1,198,836 UART: [idev] Sha1 KeyId Algorithm
1,207,754 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,485 UART: [ldev] Erasing FE.KEYID = 1
1,241,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,861 UART: [ldev] --
1,281,307 UART: [fwproc] Wait for Commands...
1,282,130 UART: [fwproc] Recv command 0x46574c44
1,282,863 UART: [fwproc] Recv'd Img size: 114168 bytes
3,127,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,321,247 >>> mbox cmd response: success
3,322,346 UART: [afmc] ++
3,322,514 UART: [afmc] CDI.KEYID = 6
3,322,877 UART: [afmc] SUBJECT.KEYID = 7
3,323,303 UART: [afmc] AUTHORITY.KEYID = 5
3,358,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,571 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,322 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,032 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,922 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,633 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,293 UART: [afmc] --
3,402,401 UART: [cold-reset] --
3,402,993 UART: [state] Locking Datavault
3,404,096 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,700 UART: [state] Locking ICCM
3,405,186 UART: [exit] Launching FMC @ 0x40000130
3,410,515 UART:
3,410,531 UART: Running Caliptra FMC ...
3,410,939 UART:
3,411,082 UART: [state] CFI Enabled
3,421,644 UART: [fht] FMC Alias Private Key: 7
3,529,430 UART: [art] Extend RT PCRs Done
3,529,858 UART: [art] Lock RT PCRs Done
3,531,496 UART: [art] Populate DV Done
3,539,862 UART: [fht] FMC Alias Private Key: 7
3,540,824 UART: [art] Derive CDI
3,541,104 UART: [art] Store in in slot 0x4
3,626,849 UART: [art] Derive Key Pair
3,627,209 UART: [art] Store priv key in slot 0x5
3,641,059 UART: [art] Derive Key Pair - Done
3,656,167 UART: [art] Signing Cert with AUTHO
3,656,647 UART: RITY.KEYID = 7
3,672,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,852 UART: [art] PUB.X = D0C2268561F507AAD411106373FAFEBAB186D182394BA0515B710A0410593D17C82E21D9EE3ED71AADB8F37C4A84FE1B
3,679,623 UART: [art] PUB.Y = 219F47FB72F18A576CEB2CF0E2500BCAAA20272FD6F6E36ADC6ADA7FC2C44D754D6CC946A5749C9C79AD254B3F1319C7
3,686,590 UART: [art] SIG.R = 40D77333B503BF554E15A0FA0AB92E0FFF1B243C5AD11C0AEE41017DC479BBC01BEB8DB4F73462E589D4E5CA595BA6C1
3,693,365 UART: [art] SIG.S = 4CB3333235F765CEA038E5DB5D83C6275ED8BB5DC15C6BCF6DF899E1BF474B54CC33717DE508CC14FCDAC7B066AD423A
3,717,869 UART: Caliptra RT
3,718,214 UART: [state] CFI Enabled
3,825,085 UART: [rt] RT listening for mailbox commands...
3,825,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,607 UART: [rt]cmd =0x41544d4e, len=14344
4,508,686 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,535 ready_for_fw is high
1,056,535 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,165,519 >>> mbox cmd response: success
3,228,072 UART:
3,228,088 UART: Running Caliptra FMC ...
3,228,496 UART:
3,228,639 UART: [state] CFI Enabled
3,239,193 UART: [fht] FMC Alias Private Key: 7
3,346,531 UART: [art] Extend RT PCRs Done
3,346,959 UART: [art] Lock RT PCRs Done
3,348,483 UART: [art] Populate DV Done
3,356,761 UART: [fht] FMC Alias Private Key: 7
3,357,813 UART: [art] Derive CDI
3,358,093 UART: [art] Store in in slot 0x4
3,443,660 UART: [art] Derive Key Pair
3,444,020 UART: [art] Store priv key in slot 0x5
3,457,284 UART: [art] Derive Key Pair - Done
3,471,680 UART: [art] Signing Cert with AUTHO
3,472,160 UART: RITY.KEYID = 7
3,487,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,311 UART: [art] PUB.X = 49714F4B50024A360D80ED08B4349775754627B3C5FD338664D84E5CED573A2F01F47D490382E73B03669AC5BF9BDCDC
3,495,063 UART: [art] PUB.Y = 55F74C29BE4C74795F335755708B9A8A18A6420C5C8DA2C5C93BE1A7CF30AA6D801751B3D684DE2120915EA0BE0AB5EB
3,502,017 UART: [art] SIG.R = 44603BDDC691574EA863AC2A21067203A24654691CD94A51169A1CC4D4E2BDB75721E32AFD60DEC2F2939263C3E08A87
3,508,783 UART: [art] SIG.S = 8382B308A2FA2BBEE1524B0FFCA1194FFD4C0250C1CFAE61A5140BCC947B4B848DC7F37EF24AB92622E65E90DDF738F3
3,532,370 UART: Caliptra RT
3,532,715 UART: [state] CFI Enabled
3,640,371 UART: [rt] RT listening for mailbox commands...
3,641,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,117 UART: [rt]cmd =0x41544d4e, len=14344
4,322,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,241 UART:
192,687 UART: Running Caliptra ROM ...
193,806 UART:
193,945 UART: [state] CFI Enabled
262,308 UART: [state] LifecycleState = Unprovisioned
264,292 UART: [state] DebugLocked = No
266,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,333 UART: [kat] SHA2-256
441,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,540 UART: [kat] ++
452,033 UART: [kat] sha1
462,248 UART: [kat] SHA2-256
464,911 UART: [kat] SHA2-384
471,120 UART: [kat] SHA2-512-ACC
473,485 UART: [kat] ECC-384
2,765,943 UART: [kat] HMAC-384Kdf
2,799,784 UART: [kat] LMS
3,990,073 UART: [kat] --
3,994,365 UART: [cold-reset] ++
3,995,297 UART: [fht] Storing FHT @ 0x50003400
4,007,901 UART: [idev] ++
4,008,472 UART: [idev] CDI.KEYID = 6
4,009,455 UART: [idev] SUBJECT.KEYID = 7
4,010,695 UART: [idev] UDS.KEYID = 0
4,011,763 ready_for_fw is high
4,011,969 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,207 UART: [idev] Erasing UDS.KEYID = 0
7,346,568 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,136 UART: [idev] --
7,371,891 UART: [ldev] ++
7,372,513 UART: [ldev] CDI.KEYID = 6
7,373,466 UART: [ldev] SUBJECT.KEYID = 5
7,374,670 UART: [ldev] AUTHORITY.KEYID = 7
7,375,891 UART: [ldev] FE.KEYID = 1
7,422,177 UART: [ldev] Erasing FE.KEYID = 1
10,744,916 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,055,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,099,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,118,893 UART: [ldev] --
13,123,674 UART: [fwproc] Waiting for Commands...
13,126,042 UART: [fwproc] Received command 0x46574c44
13,128,220 UART: [fwproc] Received Image of size 113844 bytes
22,235,030 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,316,192 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,385,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,700,888 >>> mbox cmd response: success
22,704,747 UART: [afmc] ++
22,705,364 UART: [afmc] CDI.KEYID = 6
22,706,279 UART: [afmc] SUBJECT.KEYID = 7
22,707,491 UART: [afmc] AUTHORITY.KEYID = 5
26,062,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,363,495 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,365,809 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,380,342 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,395,081 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,409,312 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,430,652 UART: [afmc] --
28,434,455 UART: [cold-reset] --
28,438,662 UART: [state] Locking Datavault
28,443,366 UART: [state] Locking PCR0, PCR1 and PCR31
28,445,065 UART: [state] Locking ICCM
28,446,526 UART: [exit] Launching FMC @ 0x40000130
28,454,912 UART:
28,455,145 UART: Running Caliptra FMC ...
28,456,236 UART:
28,456,391 UART: [state] CFI Enabled
28,522,372 UART: [fht] FMC Alias Private Key: 7
30,859,856 UART: [art] Extend RT PCRs Done
30,861,083 UART: [art] Lock RT PCRs Done
30,862,467 UART: [art] Populate DV Done
30,867,866 UART: [fht] FMC Alias Private Key: 7
30,869,524 UART: [art] Derive CDI
30,870,335 UART: [art] Store in in slot 0x4
30,930,180 UART: [art] Derive Key Pair
30,931,191 UART: [art] Store priv key in slot 0x5
34,224,034 UART: [art] Derive Key Pair - Done
34,237,412 UART: [art] Signing Cert with AUTHO
34,238,714 UART: RITY.KEYID = 7
36,525,402 UART: [art] Erasing AUTHORITY.KEYID = 7
36,526,917 UART: [art] PUB.X = F37C8242FB985527F30078B4064C1AE55A4DA284722F29B5D226FEA07FFBB6FD6F24D9CFF17123B7A4739DAFB125269F
36,534,144 UART: [art] PUB.Y = 57AE318D6DE6A7D47F2B44410AB6248EB068993F9AF4ADD334ACA740AC2BDCBBBD28876884D85A1FC676529CC87B0BD2
36,541,446 UART: [art] SIG.R = 027295D31B65915AEA0209E63529176978CD76C5788014FBF25AEBC21974DD6ACF2823602FBBB402A341F3E87D3A950A
36,548,844 UART: [art] SIG.S = F9D112E3F97D7885CB6666C198751B6E365230C450F328414716A0767FF1680C7768425756A5155661B7E62B3E64B7DE
37,853,802 UART: Caliptra RT
37,854,510 UART: [state] CFI Enabled
38,014,833 UART: [rt] RT listening for mailbox commands...
38,017,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,172,456 UART: [rt]cmd =0x41544d4e, len=14344
40,307,939 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,805,320 ready_for_fw is high
3,805,747 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,061,764 >>> mbox cmd response: success
27,749,497 UART:
27,749,871 UART: Running Caliptra FMC ...
27,750,970 UART:
27,751,117 UART: [state] CFI Enabled
27,813,854 UART: [fht] FMC Alias Private Key: 7
30,152,116 UART: [art] Extend RT PCRs Done
30,153,346 UART: [art] Lock RT PCRs Done
30,155,103 UART: [art] Populate DV Done
30,160,451 UART: [fht] FMC Alias Private Key: 7
30,162,093 UART: [art] Derive CDI
30,162,829 UART: [art] Store in in slot 0x4
30,222,087 UART: [art] Derive Key Pair
30,223,126 UART: [art] Store priv key in slot 0x5
33,516,688 UART: [art] Derive Key Pair - Done
33,529,800 UART: [art] Signing Cert with AUTHO
33,531,107 UART: RITY.KEYID = 7
35,817,019 UART: [art] Erasing AUTHORITY.KEYID = 7
35,818,533 UART: [art] PUB.X = 5E5CD6DC41300C7A804D37E3146AE8B287B2C62D7B27CE98A4553D1B00D0ADA84253B787C1C834A8162C4F86DBF16E24
35,825,744 UART: [art] PUB.Y = 433213A783CBD7BC47AEC3FA7A5C5CF705BD5FFA38602B5DEAB0CE0FFEE5BE04859A1C884C8E2D67C36774520AB5EE2D
35,833,075 UART: [art] SIG.R = D51A2317E12459D378B7511C28E7CCF888AAEC26CA43ABB756FEEC186151A9E9A71C8BAF83E7980CDDE338A4F69D6FDA
35,840,502 UART: [art] SIG.S = DFFC697B2EE38D65F96CA47BC59F5FCFE443C5A75AF2EF17CCA9F1280B2F28F45AF56EB93A5E671CBAFAFB50F4D4C9E4
37,146,185 UART: Caliptra RT
37,147,095 UART: [state] CFI Enabled
37,307,927 UART: [rt] RT listening for mailbox commands...
37,310,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,465,929 UART: [rt]cmd =0x41544d4e, len=14344
39,548,919 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,471 UART:
192,833 UART: Running Caliptra ROM ...
194,038 UART:
603,579 UART: [state] CFI Enabled
620,510 UART: [state] LifecycleState = Unprovisioned
622,370 UART: [state] DebugLocked = No
624,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,952 UART: [kat] SHA2-256
799,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,271 UART: [kat] ++
810,735 UART: [kat] sha1
823,458 UART: [kat] SHA2-256
826,189 UART: [kat] SHA2-384
830,904 UART: [kat] SHA2-512-ACC
833,270 UART: [kat] ECC-384
3,118,952 UART: [kat] HMAC-384Kdf
3,131,952 UART: [kat] LMS
4,322,038 UART: [kat] --
4,326,913 UART: [cold-reset] ++
4,327,996 UART: [fht] Storing FHT @ 0x50003400
4,338,922 UART: [idev] ++
4,339,494 UART: [idev] CDI.KEYID = 6
4,340,487 UART: [idev] SUBJECT.KEYID = 7
4,341,733 UART: [idev] UDS.KEYID = 0
4,342,860 ready_for_fw is high
4,343,085 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,158 UART: [idev] Erasing UDS.KEYID = 0
7,623,608 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,038 UART: [idev] --
7,649,031 UART: [ldev] ++
7,649,603 UART: [ldev] CDI.KEYID = 6
7,650,568 UART: [ldev] SUBJECT.KEYID = 5
7,651,776 UART: [ldev] AUTHORITY.KEYID = 7
7,653,005 UART: [ldev] FE.KEYID = 1
7,662,381 UART: [ldev] Erasing FE.KEYID = 1
10,949,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,175 UART: [ldev] --
13,311,279 UART: [fwproc] Waiting for Commands...
13,313,550 UART: [fwproc] Received command 0x46574c44
13,315,734 UART: [fwproc] Received Image of size 113844 bytes
22,040,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,121,768 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,190,682 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,506,366 >>> mbox cmd response: success
22,510,858 UART: [afmc] ++
22,511,455 UART: [afmc] CDI.KEYID = 6
22,512,479 UART: [afmc] SUBJECT.KEYID = 7
22,513,641 UART: [afmc] AUTHORITY.KEYID = 5
25,823,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,117,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,120,024 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,134,574 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,149,333 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,163,569 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,186,174 UART: [afmc] --
28,190,700 UART: [cold-reset] --
28,194,565 UART: [state] Locking Datavault
28,199,002 UART: [state] Locking PCR0, PCR1 and PCR31
28,200,755 UART: [state] Locking ICCM
28,202,743 UART: [exit] Launching FMC @ 0x40000130
28,211,145 UART:
28,211,382 UART: Running Caliptra FMC ...
28,212,487 UART:
28,212,654 UART: [state] CFI Enabled
28,220,383 UART: [fht] FMC Alias Private Key: 7
30,551,939 UART: [art] Extend RT PCRs Done
30,553,152 UART: [art] Lock RT PCRs Done
30,554,980 UART: [art] Populate DV Done
30,560,640 UART: [fht] FMC Alias Private Key: 7
30,562,185 UART: [art] Derive CDI
30,563,019 UART: [art] Store in in slot 0x4
30,605,292 UART: [art] Derive Key Pair
30,606,297 UART: [art] Store priv key in slot 0x5
33,848,575 UART: [art] Derive Key Pair - Done
33,861,519 UART: [art] Signing Cert with AUTHO
33,862,819 UART: RITY.KEYID = 7
36,142,755 UART: [art] Erasing AUTHORITY.KEYID = 7
36,144,267 UART: [art] PUB.X = B4618C38A8F959C6CF3367B206D4FA5B30050D83F64F35879DB86656EA9AEEE405C0EBA25BF068D9BDBC0691AE77C20E
36,151,482 UART: [art] PUB.Y = 96E9B95A06DDBC72912557173593F545803958B9ACF1D551234B02C0D99D3D169329BED15BA70C33FB1BAE7743624455
36,158,713 UART: [art] SIG.R = 4539634DF8B3BE273B9A05455CDEE5084ECE8274A709102511C03E28FA3566E37B9FADE5D3333962CCA10393C4239922
36,166,078 UART: [art] SIG.S = 8620149B582F0447C4FBEA7C763C92629EBA9F8BFC64C89B1B2CEC84066571F9C51CB22C757A1FAE44414CA367A30FD9
37,471,059 UART: Caliptra RT
37,471,773 UART: [state] CFI Enabled
37,589,214 UART: [rt] RT listening for mailbox commands...
37,591,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,746,996 UART: [rt]cmd =0x41544d4e, len=14344
39,856,296 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,126,140 ready_for_fw is high
4,126,553 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,174,431 >>> mbox cmd response: success
27,807,750 UART:
27,808,153 UART: Running Caliptra FMC ...
27,809,263 UART:
27,809,418 UART: [state] CFI Enabled
27,817,461 UART: [fht] FMC Alias Private Key: 7
30,149,025 UART: [art] Extend RT PCRs Done
30,150,255 UART: [art] Lock RT PCRs Done
30,151,911 UART: [art] Populate DV Done
30,157,261 UART: [fht] FMC Alias Private Key: 7
30,158,799 UART: [art] Derive CDI
30,159,537 UART: [art] Store in in slot 0x4
30,201,808 UART: [art] Derive Key Pair
30,202,868 UART: [art] Store priv key in slot 0x5
33,445,130 UART: [art] Derive Key Pair - Done
33,458,244 UART: [art] Signing Cert with AUTHO
33,459,581 UART: RITY.KEYID = 7
35,739,005 UART: [art] Erasing AUTHORITY.KEYID = 7
35,740,520 UART: [art] PUB.X = 6AA962E9FF3325E291D185E3EB1090BED29A18300D8E1AFF25AFEC22719620BD4C0FB2A238D8EFD601A1763816B16CD2
35,747,782 UART: [art] PUB.Y = 3B2F785FAC8F154FB465AAC36D34697C89148E16E1A7DC89AB9D74A1EDE8B885BA84A5A88DDE60E3F1209B4B6F1C2903
35,755,054 UART: [art] SIG.R = A2985E660C4D8EE5948C5962C2BE31894E6036BB022EC3C20F7F3877858587EB80EBD3591C10D95DF7B1C92B10CB6E78
35,762,403 UART: [art] SIG.S = ECC0FE9E0304421A3AF99ABD7E8CED8E44109C1985AF73FE934EF597C60D7217CA1FAF69CBC869D99605DCC9798F96BF
37,067,468 UART: Caliptra RT
37,068,159 UART: [state] CFI Enabled
37,186,849 UART: [rt] RT listening for mailbox commands...
37,189,186 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,344,398 UART: [rt]cmd =0x41544d4e, len=14344
39,557,445 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,212 UART:
192,576 UART: Running Caliptra ROM ...
193,706 UART:
193,854 UART: [state] CFI Enabled
262,750 UART: [state] LifecycleState = Unprovisioned
264,585 UART: [state] DebugLocked = No
265,915 UART: [state] WD Timer not started. Device not locked for debugging
269,953 UART: [kat] SHA2-256
449,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,706 UART: [kat] ++
461,253 UART: [kat] sha1
471,636 UART: [kat] SHA2-256
474,645 UART: [kat] SHA2-384
480,652 UART: [kat] SHA2-512-ACC
483,658 UART: [kat] ECC-384
2,950,744 UART: [kat] HMAC-384Kdf
2,972,229 UART: [kat] LMS
3,501,741 UART: [kat] --
3,505,962 UART: [cold-reset] ++
3,507,186 UART: [fht] FHT @ 0x50003400
3,519,520 UART: [idev] ++
3,520,086 UART: [idev] CDI.KEYID = 6
3,520,998 UART: [idev] SUBJECT.KEYID = 7
3,522,171 UART: [idev] UDS.KEYID = 0
3,523,168 ready_for_fw is high
3,523,371 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,042 UART: [idev] Erasing UDS.KEYID = 0
6,027,827 UART: [idev] Sha1 KeyId Algorithm
6,050,620 UART: [idev] --
6,055,180 UART: [ldev] ++
6,055,757 UART: [ldev] CDI.KEYID = 6
6,056,648 UART: [ldev] SUBJECT.KEYID = 5
6,057,865 UART: [ldev] AUTHORITY.KEYID = 7
6,059,102 UART: [ldev] FE.KEYID = 1
6,100,837 UART: [ldev] Erasing FE.KEYID = 1
8,604,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,063 UART: [ldev] --
10,412,176 UART: [fwproc] Wait for Commands...
10,415,224 UART: [fwproc] Recv command 0x46574c44
10,417,323 UART: [fwproc] Recv'd Img size: 114168 bytes
14,985,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,057,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,126,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,443,200 >>> mbox cmd response: success
15,448,061 UART: [afmc] ++
15,448,990 UART: [afmc] CDI.KEYID = 6
15,449,887 UART: [afmc] SUBJECT.KEYID = 7
15,450,993 UART: [afmc] AUTHORITY.KEYID = 5
17,979,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,504 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,721,427 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,737,387 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,753,185 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,776,377 UART: [afmc] --
19,780,467 UART: [cold-reset] --
19,785,031 UART: [state] Locking Datavault
19,791,166 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,814 UART: [state] Locking ICCM
19,794,856 UART: [exit] Launching FMC @ 0x40000130
19,803,315 UART:
19,803,558 UART: Running Caliptra FMC ...
19,804,658 UART:
19,804,818 UART: [state] CFI Enabled
19,862,147 UART: [fht] FMC Alias Private Key: 7
21,626,339 UART: [art] Extend RT PCRs Done
21,627,556 UART: [art] Lock RT PCRs Done
21,629,370 UART: [art] Populate DV Done
21,634,618 UART: [fht] FMC Alias Private Key: 7
21,636,101 UART: [art] Derive CDI
21,636,881 UART: [art] Store in in slot 0x4
21,694,515 UART: [art] Derive Key Pair
21,695,552 UART: [art] Store priv key in slot 0x5
24,158,776 UART: [art] Derive Key Pair - Done
24,171,543 UART: [art] Signing Cert with AUTHO
24,172,878 UART: RITY.KEYID = 7
25,884,387 UART: [art] Erasing AUTHORITY.KEYID = 7
25,885,893 UART: [art] PUB.X = A74CFBADA018495FEE359CCD741DCC9DEB1D6D808AB4266C561EDDAABAACAF51FE655A49590B9D98FA4264966D57CA03
25,893,148 UART: [art] PUB.Y = F45BDA019B149CBF8E457493749F0762B27924096CCDAE835A7D522508DAD7D4457A66E12AC1E1FAF2782FFBCFEB7DBE
25,900,438 UART: [art] SIG.R = 5233B34B012060A78878ABE8CA908D08A1D8734BBD2FB6063D37C029D663FAC62727949AB60BBC22D3349B9E6BE4DC69
25,907,844 UART: [art] SIG.S = 7956B6E991795E3F2B5AB624DBEA996CBD2126FA0EC022722C9FAC817140D5736B4D3DC38BA69F6CD2A1CFBAB0012303
26,887,158 UART: Caliptra RT
26,887,844 UART: [state] CFI Enabled
27,052,028 UART: [rt] RT listening for mailbox commands...
27,054,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,569 UART: [rt]cmd =0x41544d4e, len=14344
28,397,549 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,382,460 ready_for_fw is high
3,382,990 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,032,864 >>> mbox cmd response: success
19,327,088 UART:
19,327,496 UART: Running Caliptra FMC ...
19,328,607 UART:
19,328,762 UART: [state] CFI Enabled
19,390,075 UART: [fht] FMC Alias Private Key: 7
21,154,306 UART: [art] Extend RT PCRs Done
21,155,530 UART: [art] Lock RT PCRs Done
21,156,892 UART: [art] Populate DV Done
21,162,300 UART: [fht] FMC Alias Private Key: 7
21,163,837 UART: [art] Derive CDI
21,164,575 UART: [art] Store in in slot 0x4
21,222,321 UART: [art] Derive Key Pair
21,223,365 UART: [art] Store priv key in slot 0x5
23,686,433 UART: [art] Derive Key Pair - Done
23,699,613 UART: [art] Signing Cert with AUTHO
23,700,925 UART: RITY.KEYID = 7
25,412,069 UART: [art] Erasing AUTHORITY.KEYID = 7
25,413,567 UART: [art] PUB.X = B07AED3C5DDB4EF648A647F1D7EE4C06591A6BDCA648288F27CF128452AC9EFECED4CAF8848F5F843A5F4EC1EEE18125
25,420,862 UART: [art] PUB.Y = CFC11F57AAB97BFC2F4FA265DE8F58B3889240BF2AAD48819D9E2FC00A7EE35EE3AAF984EBE5CFD089C86308DDA025B2
25,428,164 UART: [art] SIG.R = 57B86FB191D6F510961FEB4FEF02D7450F00E737B647BCD8CA7AC32BB13F72D5AE225DFCADA018E31F0C372BF7CDE7A4
25,435,616 UART: [art] SIG.S = 94B78C067822AA26B501CF207DAE1B1EE606566ABD5948E392A2220827E0E9ACCA35E9D4954F6E6F1715DA0570BD5312
26,414,208 UART: Caliptra RT
26,414,942 UART: [state] CFI Enabled
26,580,120 UART: [rt] RT listening for mailbox commands...
26,582,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,737,818 UART: [rt]cmd =0x41544d4e, len=14344
27,924,566 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,900 writing to cptra_bootfsm_go
193,199 UART:
193,562 UART: Running Caliptra ROM ...
194,764 UART:
604,410 UART: [state] CFI Enabled
621,128 UART: [state] LifecycleState = Unprovisioned
622,987 UART: [state] DebugLocked = No
625,851 UART: [state] WD Timer not started. Device not locked for debugging
630,168 UART: [kat] SHA2-256
809,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,861 UART: [kat] ++
821,393 UART: [kat] sha1
833,211 UART: [kat] SHA2-256
836,284 UART: [kat] SHA2-384
843,982 UART: [kat] SHA2-512-ACC
846,971 UART: [kat] ECC-384
3,284,833 UART: [kat] HMAC-384Kdf
3,297,284 UART: [kat] LMS
3,826,778 UART: [kat] --
3,832,774 UART: [cold-reset] ++
3,834,660 UART: [fht] FHT @ 0x50003400
3,845,718 UART: [idev] ++
3,846,284 UART: [idev] CDI.KEYID = 6
3,847,191 UART: [idev] SUBJECT.KEYID = 7
3,848,434 UART: [idev] UDS.KEYID = 0
3,849,364 ready_for_fw is high
3,849,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,933 UART: [idev] Erasing UDS.KEYID = 0
6,317,742 UART: [idev] Sha1 KeyId Algorithm
6,341,030 UART: [idev] --
6,344,700 UART: [ldev] ++
6,345,268 UART: [ldev] CDI.KEYID = 6
6,346,197 UART: [ldev] SUBJECT.KEYID = 5
6,347,358 UART: [ldev] AUTHORITY.KEYID = 7
6,348,597 UART: [ldev] FE.KEYID = 1
6,361,810 UART: [ldev] Erasing FE.KEYID = 1
8,830,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,501 UART: [ldev] --
10,621,869 UART: [fwproc] Wait for Commands...
10,624,445 UART: [fwproc] Recv command 0x46574c44
10,626,538 UART: [fwproc] Recv'd Img size: 114168 bytes
15,200,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,269,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,338,692 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,656,028 >>> mbox cmd response: success
15,660,118 UART: [afmc] ++
15,660,715 UART: [afmc] CDI.KEYID = 6
15,661,624 UART: [afmc] SUBJECT.KEYID = 7
15,662,837 UART: [afmc] AUTHORITY.KEYID = 5
18,165,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,887,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,889,788 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,905,734 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,921,687 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,937,472 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,959,760 UART: [afmc] --
19,964,323 UART: [cold-reset] --
19,967,056 UART: [state] Locking Datavault
19,971,923 UART: [state] Locking PCR0, PCR1 and PCR31
19,973,573 UART: [state] Locking ICCM
19,976,119 UART: [exit] Launching FMC @ 0x40000130
19,984,572 UART:
19,984,812 UART: Running Caliptra FMC ...
19,985,913 UART:
19,986,075 UART: [state] CFI Enabled
19,994,202 UART: [fht] FMC Alias Private Key: 7
21,750,793 UART: [art] Extend RT PCRs Done
21,752,004 UART: [art] Lock RT PCRs Done
21,753,564 UART: [art] Populate DV Done
21,758,881 UART: [fht] FMC Alias Private Key: 7
21,760,416 UART: [art] Derive CDI
21,761,149 UART: [art] Store in in slot 0x4
21,803,630 UART: [art] Derive Key Pair
21,804,628 UART: [art] Store priv key in slot 0x5
24,231,382 UART: [art] Derive Key Pair - Done
24,244,249 UART: [art] Signing Cert with AUTHO
24,245,580 UART: RITY.KEYID = 7
25,950,557 UART: [art] Erasing AUTHORITY.KEYID = 7
25,952,050 UART: [art] PUB.X = B1FC8E8C2E4E7876B522B41FA0F3958AB08ECD908A3CA774613C4050981B0B13D6A66EBECDD4F1700489B2452DC41640
25,959,353 UART: [art] PUB.Y = C0F5DBFF1DF40048F7BA935FC267CC7A9B8B6AA87EDCFB8EE606556CA9AF54C9864BF72332EEF1720B6E4555BEA1AE54
25,966,594 UART: [art] SIG.R = 53A150E459243D3B89207912F061501EDA9F571F69B4B0097ACE856231800AB71EB44E41CB5764AFECA48D0F3833240E
25,973,984 UART: [art] SIG.S = 09100585C6FE9AA7F34F7CD995D235D16DAE8B2353747D7D8160B586C7E2DAA03A28C538B75F1CA4651A18008B0202B9
26,952,554 UART: Caliptra RT
26,953,266 UART: [state] CFI Enabled
27,069,944 UART: [rt] RT listening for mailbox commands...
27,072,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,227,454 UART: [rt]cmd =0x41544d4e, len=14344
28,405,617 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,692 writing to cptra_bootfsm_go
3,703,358 ready_for_fw is high
3,703,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,267,672 >>> mbox cmd response: success
19,523,888 UART:
19,524,282 UART: Running Caliptra FMC ...
19,525,424 UART:
19,525,584 UART: [state] CFI Enabled
19,533,685 UART: [fht] FMC Alias Private Key: 7
21,290,635 UART: [art] Extend RT PCRs Done
21,291,866 UART: [art] Lock RT PCRs Done
21,293,610 UART: [art] Populate DV Done
21,298,947 UART: [fht] FMC Alias Private Key: 7
21,300,439 UART: [art] Derive CDI
21,301,206 UART: [art] Store in in slot 0x4
21,344,020 UART: [art] Derive Key Pair
21,345,024 UART: [art] Store priv key in slot 0x5
23,771,765 UART: [art] Derive Key Pair - Done
23,784,346 UART: [art] Signing Cert with AUTHO
23,785,670 UART: RITY.KEYID = 7
25,491,417 UART: [art] Erasing AUTHORITY.KEYID = 7
25,492,928 UART: [art] PUB.X = E5A9137D579135145D6B27800E261C73452A576B056BEB199EE228DD5B512E111E7B9E8FC2706B5934B163C6CE76CB14
25,500,125 UART: [art] PUB.Y = 4D25D5459FAF0730242F3175F58011D9D43742508082A52BDC6FEDD9147E9076D92CB85A95833E2E3A53CDE650608648
25,507,383 UART: [art] SIG.R = D86E669F2718F5AF7797E666975D24B2293393D09CE3A1C69DEB5DBE62571F825190117EC7519A766DA2E29F934346E1
25,514,881 UART: [art] SIG.S = 99B4A87622CAC9292A1D086FC593A29003802ACD44884FC321DF3E7352189B2C585C4C6FE63D13587E0A9B3ECE1168FA
26,494,296 UART: Caliptra RT
26,495,015 UART: [state] CFI Enabled
26,612,679 UART: [rt] RT listening for mailbox commands...
26,614,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,770,382 UART: [rt]cmd =0x41544d4e, len=14344
27,956,688 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,082 writing to cptra_bootfsm_go
193,188 UART:
193,542 UART: Running Caliptra ROM ...
194,659 UART:
194,808 UART: [state] CFI Enabled
265,722 UART: [state] LifecycleState = Unprovisioned
268,150 UART: [state] DebugLocked = No
269,606 UART: [state] WD Timer not started. Device not locked for debugging
273,724 UART: [kat] SHA2-256
463,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,346 UART: [kat] ++
474,831 UART: [kat] sha1
485,655 UART: [kat] SHA2-256
488,630 UART: [kat] SHA2-384
494,703 UART: [kat] SHA2-512-ACC
497,289 UART: [kat] ECC-384
2,949,789 UART: [kat] HMAC-384Kdf
2,974,453 UART: [kat] LMS
3,506,245 UART: [kat] --
3,512,602 UART: [cold-reset] ++
3,513,895 UART: [fht] FHT @ 0x50003400
3,524,676 UART: [idev] ++
3,525,432 UART: [idev] CDI.KEYID = 6
3,526,356 UART: [idev] SUBJECT.KEYID = 7
3,527,536 UART: [idev] UDS.KEYID = 0
3,528,465 ready_for_fw is high
3,528,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,307 UART: [idev] Erasing UDS.KEYID = 0
6,029,328 UART: [idev] Sha1 KeyId Algorithm
6,051,856 UART: [idev] --
6,056,339 UART: [ldev] ++
6,057,023 UART: [ldev] CDI.KEYID = 6
6,057,918 UART: [ldev] SUBJECT.KEYID = 5
6,059,138 UART: [ldev] AUTHORITY.KEYID = 7
6,060,242 UART: [ldev] FE.KEYID = 1
6,102,735 UART: [ldev] Erasing FE.KEYID = 1
8,610,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,277 UART: [ldev] --
10,418,248 UART: [fwproc] Wait for Commands...
10,419,913 UART: [fwproc] Recv command 0x46574c44
10,422,223 UART: [fwproc] Recv'd Img size: 114168 bytes
15,043,005 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,123,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,239,564 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,781,393 >>> mbox cmd response: success
15,785,071 UART: [afmc] ++
15,785,785 UART: [afmc] CDI.KEYID = 6
15,787,053 UART: [afmc] SUBJECT.KEYID = 7
15,788,446 UART: [afmc] AUTHORITY.KEYID = 5
18,326,376 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,049,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,051,731 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,066,786 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,081,994 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,096,846 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,121,560 UART: [afmc] --
20,125,101 UART: [cold-reset] --
20,128,652 UART: [state] Locking Datavault
20,136,412 UART: [state] Locking PCR0, PCR1 and PCR31
20,138,573 UART: [state] Locking ICCM
20,141,157 UART: [exit] Launching FMC @ 0x40000130
20,149,787 UART:
20,150,023 UART: Running Caliptra FMC ...
20,151,148 UART:
20,151,308 UART: [state] CFI Enabled
20,207,889 UART: [fht] FMC Alias Private Key: 7
21,972,231 UART: [art] Extend RT PCRs Done
21,973,902 UART: [art] Lock RT PCRs Done
21,974,909 UART: [art] Populate DV Done
21,980,563 UART: [fht] FMC Alias Private Key: 7
21,982,049 UART: [art] Derive CDI
21,982,844 UART: [art] Store in in slot 0x4
22,041,107 UART: [art] Derive Key Pair
22,042,421 UART: [art] Store priv key in slot 0x5
24,506,539 UART: [art] Derive Key Pair - Done
24,519,253 UART: [art] Signing Cert with AUTHO
24,520,570 UART: RITY.KEYID = 7
26,232,099 UART: [art] Erasing AUTHORITY.KEYID = 7
26,233,620 UART: [art] PUB.X = D21D067C5F691150162959C1E858F5F4BEDA83F904E7B8D9666668E77E22BC5ECE178353A92A726CBFE0B8828822FF19
26,240,918 UART: [art] PUB.Y = FA6BADDEDFB9F5F4F48D4A7D125BD13F7BD487C42734D5DA900FEC4CA4EF1EA0C543850B3ADD89E1333F12A2F4E586DE
26,248,209 UART: [art] SIG.R = F4B47C9920BA331F9483D8B35FDF94FA1725CFE48FD003AD1897D575A66FBAA14CC57026C3F32F40DE7A9BF6E0AA5985
26,255,648 UART: [art] SIG.S = AE9486681EABE0AC33A76E1B0CBA949C7FD1466A144909F3455AC3EECAA21DEE6E383ED86D79796A2039C1CC407ADE3D
27,234,307 UART: Caliptra RT
27,234,998 UART: [state] CFI Enabled
27,400,234 UART: [rt] RT listening for mailbox commands...
27,402,584 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,557,965 UART: [rt]cmd =0x41544d4e, len=14344
28,748,170 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,438,507 ready_for_fw is high
3,438,885 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,854,835 >>> mbox cmd response: success
20,135,466 UART:
20,135,859 UART: Running Caliptra FMC ...
20,136,989 UART:
20,137,157 UART: [state] CFI Enabled
20,202,024 UART: [fht] FMC Alias Private Key: 7
21,966,251 UART: [art] Extend RT PCRs Done
21,967,468 UART: [art] Lock RT PCRs Done
21,969,367 UART: [art] Populate DV Done
21,974,825 UART: [fht] FMC Alias Private Key: 7
21,976,523 UART: [art] Derive CDI
21,977,334 UART: [art] Store in in slot 0x4
22,034,488 UART: [art] Derive Key Pair
22,035,537 UART: [art] Store priv key in slot 0x5
24,498,211 UART: [art] Derive Key Pair - Done
24,510,994 UART: [art] Signing Cert with AUTHO
24,512,305 UART: RITY.KEYID = 7
26,223,446 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,951 UART: [art] PUB.X = 88497FEF747BB6D26E8EA40FA45C93E4BF9D4499C7B83C7BADB335F3CB6D0B3BF8B2A166C990B9D8E01FDBBB2F668D38
26,232,242 UART: [art] PUB.Y = D9BDA6658CE8037CFE1FF89B5E21BCD82AF86CDAED8D595E46D3F6CBECDCBDA81ED09F48AEFFABFA6EC56A352448306F
26,239,542 UART: [art] SIG.R = 9D2D05FACF524F6FB55B8926B4A4631D6F68B5B3B156FF2A223344BBCFEE6358C9C883C0A379FE307D4281FEB4DEAF3B
26,247,005 UART: [art] SIG.S = 8955B04009CEA806083518C84594A1345F9045407C8D39E1121FA30C22C51A94C4CA20A5BA564559A60B088989A025D6
27,225,631 UART: Caliptra RT
27,226,325 UART: [state] CFI Enabled
27,389,812 UART: [rt] RT listening for mailbox commands...
27,392,187 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,547,552 UART: [rt]cmd =0x41544d4e, len=14344
28,731,383 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,724 writing to cptra_bootfsm_go
192,958 UART:
193,342 UART: Running Caliptra ROM ...
194,449 UART:
604,251 UART: [state] CFI Enabled
615,577 UART: [state] LifecycleState = Unprovisioned
617,955 UART: [state] DebugLocked = No
619,414 UART: [state] WD Timer not started. Device not locked for debugging
623,456 UART: [kat] SHA2-256
813,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,089 UART: [kat] ++
824,543 UART: [kat] sha1
837,433 UART: [kat] SHA2-256
840,486 UART: [kat] SHA2-384
845,418 UART: [kat] SHA2-512-ACC
848,000 UART: [kat] ECC-384
3,288,656 UART: [kat] HMAC-384Kdf
3,302,383 UART: [kat] LMS
3,834,155 UART: [kat] --
3,838,875 UART: [cold-reset] ++
3,841,238 UART: [fht] FHT @ 0x50003400
3,853,634 UART: [idev] ++
3,854,338 UART: [idev] CDI.KEYID = 6
3,855,262 UART: [idev] SUBJECT.KEYID = 7
3,856,528 UART: [idev] UDS.KEYID = 0
3,857,451 ready_for_fw is high
3,857,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,038 UART: [idev] Erasing UDS.KEYID = 0
6,336,237 UART: [idev] Sha1 KeyId Algorithm
6,359,135 UART: [idev] --
6,364,452 UART: [ldev] ++
6,365,139 UART: [ldev] CDI.KEYID = 6
6,366,050 UART: [ldev] SUBJECT.KEYID = 5
6,367,210 UART: [ldev] AUTHORITY.KEYID = 7
6,368,438 UART: [ldev] FE.KEYID = 1
6,380,058 UART: [ldev] Erasing FE.KEYID = 1
8,860,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,069 UART: [ldev] --
10,648,847 UART: [fwproc] Wait for Commands...
10,650,729 UART: [fwproc] Recv command 0x46574c44
10,653,045 UART: [fwproc] Recv'd Img size: 114168 bytes
15,256,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,336,060 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,452,260 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,994,333 >>> mbox cmd response: success
15,997,946 UART: [afmc] ++
15,998,658 UART: [afmc] CDI.KEYID = 6
15,999,906 UART: [afmc] SUBJECT.KEYID = 7
16,001,354 UART: [afmc] AUTHORITY.KEYID = 5
18,502,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,224,820 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,226,736 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,241,849 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,257,035 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,271,904 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,295,592 UART: [afmc] --
20,299,458 UART: [cold-reset] --
20,304,087 UART: [state] Locking Datavault
20,308,642 UART: [state] Locking PCR0, PCR1 and PCR31
20,310,781 UART: [state] Locking ICCM
20,311,853 UART: [exit] Launching FMC @ 0x40000130
20,320,524 UART:
20,320,766 UART: Running Caliptra FMC ...
20,321,869 UART:
20,322,032 UART: [state] CFI Enabled
20,329,971 UART: [fht] FMC Alias Private Key: 7
22,086,311 UART: [art] Extend RT PCRs Done
22,087,533 UART: [art] Lock RT PCRs Done
22,089,238 UART: [art] Populate DV Done
22,094,822 UART: [fht] FMC Alias Private Key: 7
22,096,416 UART: [art] Derive CDI
22,097,233 UART: [art] Store in in slot 0x4
22,140,046 UART: [art] Derive Key Pair
22,141,090 UART: [art] Store priv key in slot 0x5
24,568,414 UART: [art] Derive Key Pair - Done
24,581,035 UART: [art] Signing Cert with AUTHO
24,582,340 UART: RITY.KEYID = 7
26,288,020 UART: [art] Erasing AUTHORITY.KEYID = 7
26,289,532 UART: [art] PUB.X = 9F2EC4BE5D17FF4695874414794E843C5946A4765BA071CA6FF9E00D3888751D8DD2321D664866D88486A5D8C3525FA6
26,296,788 UART: [art] PUB.Y = 231B66914413382851E415E9C2B6D3B3B553D9EF25D7924E8960802D1D8034AE84610CF3C5EDC279FDFA122DFEA80D5D
26,304,018 UART: [art] SIG.R = 1BF47EC2D2C11A307614AF3E168F50EB960EA8DD61BC7D5C60DF53F93B03AACF1544C11ECB8C6367CF0DC3895DA1D12B
26,311,462 UART: [art] SIG.S = BAEB10FFC1C0F4B888672C92E5D1E6C83262B9E10866880B359CF347FFB01E320AC5AB40D46C0CBB69A686F042B04542
27,290,585 UART: Caliptra RT
27,291,296 UART: [state] CFI Enabled
27,408,125 UART: [rt] RT listening for mailbox commands...
27,410,431 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,565,785 UART: [rt]cmd =0x41544d4e, len=14344
28,751,851 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,949 writing to cptra_bootfsm_go
3,750,819 ready_for_fw is high
3,751,269 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,038,824 >>> mbox cmd response: success
20,287,510 UART:
20,287,911 UART: Running Caliptra FMC ...
20,289,096 UART:
20,289,269 UART: [state] CFI Enabled
20,297,493 UART: [fht] FMC Alias Private Key: 7
22,055,269 UART: [art] Extend RT PCRs Done
22,056,489 UART: [art] Lock RT PCRs Done
22,058,279 UART: [art] Populate DV Done
22,063,468 UART: [fht] FMC Alias Private Key: 7
22,065,125 UART: [art] Derive CDI
22,065,965 UART: [art] Store in in slot 0x4
22,108,784 UART: [art] Derive Key Pair
22,109,795 UART: [art] Store priv key in slot 0x5
24,536,664 UART: [art] Derive Key Pair - Done
24,549,767 UART: [art] Signing Cert with AUTHO
24,551,067 UART: RITY.KEYID = 7
26,256,781 UART: [art] Erasing AUTHORITY.KEYID = 7
26,258,286 UART: [art] PUB.X = 369BC6936420324C741E3FFF5718DC92F45440A23F482DA1CB5A9CE6C3F2ACE132034EF7C833735E446737A3D45BF43C
26,265,529 UART: [art] PUB.Y = 4590C7D3ACFF446D430D24DE3CFBF338212EAF3A0EABF9DC2A39A6C806EEC95E7AA8FF565A36C3AAFA60500B3D55A7C4
26,272,817 UART: [art] SIG.R = 8259318DDC711533A011F14BD8A51EF248111F201E3DFC8F8D33432F3E15D0912BC10884C6C59638B52C5F383D73067F
26,280,225 UART: [art] SIG.S = D174F86AAE27D08BA8E8008B4DCB2751BE90A636E54F3B2008AC94A789C6F07CC0AB974685ACB2F959B0B05648278C58
27,259,333 UART: Caliptra RT
27,260,017 UART: [state] CFI Enabled
27,377,184 UART: [rt] RT listening for mailbox commands...
27,379,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,534,989 UART: [rt]cmd =0x41544d4e, len=14344
28,722,499 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,682 UART: [kat] HMAC-384Kdf
907,216 UART: [kat] LMS
1,475,412 UART: [kat] --
1,476,023 UART: [cold-reset] ++
1,476,451 UART: [fht] Storing FHT @ 0x50003400
1,479,442 UART: [idev] ++
1,479,610 UART: [idev] CDI.KEYID = 6
1,479,970 UART: [idev] SUBJECT.KEYID = 7
1,480,394 UART: [idev] UDS.KEYID = 0
1,480,739 ready_for_fw is high
1,480,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,338 UART: [idev] Erasing UDS.KEYID = 0
1,505,410 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,224 UART: [idev] --
1,515,147 UART: [ldev] ++
1,515,315 UART: [ldev] CDI.KEYID = 6
1,515,678 UART: [ldev] SUBJECT.KEYID = 5
1,516,104 UART: [ldev] AUTHORITY.KEYID = 7
1,516,567 UART: [ldev] FE.KEYID = 1
1,521,615 UART: [ldev] Erasing FE.KEYID = 1
1,546,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,016 UART: [ldev] --
1,586,383 UART: [fwproc] Waiting for Commands...
1,587,010 UART: [fwproc] Received command 0x46574c44
1,587,801 UART: [fwproc] Received Image of size 114168 bytes
5,233,949 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,261,899 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,291,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,426,958 >>> mbox cmd response: success
5,428,140 UART: [afmc] ++
5,428,308 UART: [afmc] CDI.KEYID = 6
5,428,670 UART: [afmc] SUBJECT.KEYID = 7
5,429,095 UART: [afmc] AUTHORITY.KEYID = 5
5,464,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,481,171 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,481,951 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,487,660 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,493,552 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,499,253 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,507,123 UART: [afmc] --
5,508,013 UART: [cold-reset] --
5,508,761 UART: [state] Locking Datavault
5,509,832 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,436 UART: [state] Locking ICCM
5,510,930 UART: [exit] Launching FMC @ 0x40000130
5,516,259 UART:
5,516,275 UART: Running Caliptra FMC ...
5,516,683 UART:
5,516,737 UART: [state] CFI Enabled
5,527,209 UART: [fht] FMC Alias Private Key: 7
5,635,493 UART: [art] Extend RT PCRs Done
5,635,921 UART: [art] Lock RT PCRs Done
5,637,211 UART: [art] Populate DV Done
5,645,415 UART: [fht] FMC Alias Private Key: 7
5,646,441 UART: [art] Derive CDI
5,646,721 UART: [art] Store in in slot 0x4
5,732,656 UART: [art] Derive Key Pair
5,733,016 UART: [art] Store priv key in slot 0x5
5,746,612 UART: [art] Derive Key Pair - Done
5,761,572 UART: [art] Signing Cert with AUTHO
5,762,052 UART: RITY.KEYID = 7
5,777,414 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,179 UART: [art] PUB.X = 4CCBE37BFB4B9FCB51CCD36E7B4FCAF6B1FA094265DAB661828394F7F36DA1F98D5C4C67439E6647E171B1C496753B33
5,784,962 UART: [art] PUB.Y = 5A9FF909C6E6EB7EBB5C7FFC9FF065E278015E788C0C481183266728473D2CB3F70AD170B2FEB0B8006EB12E85956584
5,791,884 UART: [art] SIG.R = F6D82D54B9E752C3726B4F769B1946EB1AC296BE964A39663100B74ECD391EA7C8B670FFF92647A07FB4457CAFF5CC28
5,798,642 UART: [art] SIG.S = 727DE5A1C9711900FC4E1F3B3036E804EBE79FF36B60F8C190D914F3DC1DBFC94C1E7D7A847EF34675DB70D9E62D9271
5,822,272 UART: Caliptra RT
5,822,525 UART: [state] CFI Enabled
5,930,924 UART: [rt] RT listening for mailbox commands...
5,931,594 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,054,440 UART: [rt]cmd =0x41544d4e, len=14344
6,342,909 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,215 ready_for_fw is high
1,363,215 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,201,218 >>> mbox cmd response: success
5,262,311 UART:
5,262,327 UART: Running Caliptra FMC ...
5,262,735 UART:
5,262,789 UART: [state] CFI Enabled
5,273,469 UART: [fht] FMC Alias Private Key: 7
5,381,483 UART: [art] Extend RT PCRs Done
5,381,911 UART: [art] Lock RT PCRs Done
5,383,097 UART: [art] Populate DV Done
5,391,547 UART: [fht] FMC Alias Private Key: 7
5,392,617 UART: [art] Derive CDI
5,392,897 UART: [art] Store in in slot 0x4
5,478,184 UART: [art] Derive Key Pair
5,478,544 UART: [art] Store priv key in slot 0x5
5,491,690 UART: [art] Derive Key Pair - Done
5,506,457 UART: [art] Signing Cert with AUTHO
5,506,937 UART: RITY.KEYID = 7
5,521,743 UART: [art] Erasing AUTHORITY.KEYID = 7
5,522,508 UART: [art] PUB.X = 67BD4B5F1882445E3213C27C3849AC571BD3C7DC3BF999CA7C467EB086AF8FAF683328650A21A8C80B77ADDDA4436F9A
5,529,284 UART: [art] PUB.Y = 1B8892F253F71C691DFC5A0AFC99F6957E2FC4EFCF4708F68BA556F14451D5682DE4B9511B86709AACDFB29A2E65FA98
5,536,242 UART: [art] SIG.R = 3275F0D6DDD01B2DF40937151C7A5DBFB7A0B76541F2BF39A47BC71D9D5522A7C0103AF100097389B533B1656FF08B7E
5,542,990 UART: [art] SIG.S = 0639ED4BF12BB2BD0414C6C33A1303195AFDB34A20DBDAF7882F01815AF4A852E2CA1CA1B2DE8AA9D0F81FD2555C2402
5,566,738 UART: Caliptra RT
5,566,991 UART: [state] CFI Enabled
5,675,333 UART: [rt] RT listening for mailbox commands...
5,676,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,083 UART: [rt]cmd =0x41544d4e, len=14344
6,082,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,808 UART: [kat] SHA2-256
881,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,854 UART: [kat] ++
886,006 UART: [kat] sha1
890,274 UART: [kat] SHA2-256
892,212 UART: [kat] SHA2-384
895,043 UART: [kat] SHA2-512-ACC
896,944 UART: [kat] ECC-384
902,523 UART: [kat] HMAC-384Kdf
907,265 UART: [kat] LMS
1,475,461 UART: [kat] --
1,476,610 UART: [cold-reset] ++
1,477,172 UART: [fht] Storing FHT @ 0x50003400
1,479,891 UART: [idev] ++
1,480,059 UART: [idev] CDI.KEYID = 6
1,480,419 UART: [idev] SUBJECT.KEYID = 7
1,480,843 UART: [idev] UDS.KEYID = 0
1,481,188 ready_for_fw is high
1,481,188 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,731 UART: [idev] Erasing UDS.KEYID = 0
1,505,759 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,411 UART: [idev] --
1,515,228 UART: [ldev] ++
1,515,396 UART: [ldev] CDI.KEYID = 6
1,515,759 UART: [ldev] SUBJECT.KEYID = 5
1,516,185 UART: [ldev] AUTHORITY.KEYID = 7
1,516,648 UART: [ldev] FE.KEYID = 1
1,522,026 UART: [ldev] Erasing FE.KEYID = 1
1,547,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,265 UART: [ldev] --
1,586,710 UART: [fwproc] Waiting for Commands...
1,587,435 UART: [fwproc] Received command 0x46574c44
1,588,226 UART: [fwproc] Received Image of size 114168 bytes
4,930,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,959,138 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
4,988,490 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,124,019 >>> mbox cmd response: success
5,125,281 UART: [afmc] ++
5,125,449 UART: [afmc] CDI.KEYID = 6
5,125,811 UART: [afmc] SUBJECT.KEYID = 7
5,126,236 UART: [afmc] AUTHORITY.KEYID = 5
5,162,180 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,178,154 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,178,934 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,184,643 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,190,535 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,196,236 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,204,032 UART: [afmc] --
5,205,036 UART: [cold-reset] --
5,205,906 UART: [state] Locking Datavault
5,206,999 UART: [state] Locking PCR0, PCR1 and PCR31
5,207,603 UART: [state] Locking ICCM
5,208,155 UART: [exit] Launching FMC @ 0x40000130
5,213,484 UART:
5,213,500 UART: Running Caliptra FMC ...
5,213,908 UART:
5,214,051 UART: [state] CFI Enabled
5,224,571 UART: [fht] FMC Alias Private Key: 7
5,333,169 UART: [art] Extend RT PCRs Done
5,333,597 UART: [art] Lock RT PCRs Done
5,335,137 UART: [art] Populate DV Done
5,343,177 UART: [fht] FMC Alias Private Key: 7
5,344,243 UART: [art] Derive CDI
5,344,523 UART: [art] Store in in slot 0x4
5,430,240 UART: [art] Derive Key Pair
5,430,600 UART: [art] Store priv key in slot 0x5
5,443,446 UART: [art] Derive Key Pair - Done
5,457,900 UART: [art] Signing Cert with AUTHO
5,458,380 UART: RITY.KEYID = 7
5,473,910 UART: [art] Erasing AUTHORITY.KEYID = 7
5,474,675 UART: [art] PUB.X = ED20EF95E142B6D1D74C1C6E2D199410C5C9BED924DEED7FFC7EF5C249772E550395F3C9BA052CFE3FF0C7A55906DD43
5,481,456 UART: [art] PUB.Y = E031DF2B76BA2A2C609025D71B678CE8981B31F682E7AD06F824578041FF0C32B6236028E51F51F00865C5B6F4D927F8
5,488,395 UART: [art] SIG.R = 1BADEC1332C78A0832451D4F96940E1829E339610E3FDC40F581005FACF5B613829F7C53A6FC1BF52D27A94247377BD7
5,495,136 UART: [art] SIG.S = FB43122E7DEF87C676FBA62C6357CA6CD14114DE9AF75863D996470C87D78BB231232B7A011D05F807C05183D75D8EB6
5,519,285 UART: Caliptra RT
5,519,630 UART: [state] CFI Enabled
5,627,619 UART: [rt] RT listening for mailbox commands...
5,628,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,751,349 UART: [rt]cmd =0x41544d4e, len=14344
6,036,661 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,528 ready_for_fw is high
1,362,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,161,616 >>> mbox cmd response: success
5,223,197 UART:
5,223,213 UART: Running Caliptra FMC ...
5,223,621 UART:
5,223,764 UART: [state] CFI Enabled
5,234,232 UART: [fht] FMC Alias Private Key: 7
5,342,404 UART: [art] Extend RT PCRs Done
5,342,832 UART: [art] Lock RT PCRs Done
5,344,484 UART: [art] Populate DV Done
5,352,762 UART: [fht] FMC Alias Private Key: 7
5,353,938 UART: [art] Derive CDI
5,354,218 UART: [art] Store in in slot 0x4
5,439,755 UART: [art] Derive Key Pair
5,440,115 UART: [art] Store priv key in slot 0x5
5,453,387 UART: [art] Derive Key Pair - Done
5,468,072 UART: [art] Signing Cert with AUTHO
5,468,552 UART: RITY.KEYID = 7
5,483,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,484,305 UART: [art] PUB.X = 0C584B3D0DED5A6889DE98A930C10443B975290D1EB3D41F6FDC79340DEE57AB45B474D99D3C4D0F7D93513C4CCADA51
5,491,071 UART: [art] PUB.Y = BCA2BCBFA546D359662D9E4B551C5E8CF8C29CA9172E38733071D84D58D37987518FE4A10E736BD185CD7C56BF5EB360
5,498,028 UART: [art] SIG.R = 9CA9FE759EB152F594F619C286AF9951F06D93496F1DB11E6AB8FB8B9E20CE60A46FCF84C9A49C713C01E48995447F70
5,504,803 UART: [art] SIG.S = 840B03360197787CF388751F90744BB5B002E7B9DB2707806E338193850263E1481578D713CCB0B653406CB247700EF6
5,528,501 UART: Caliptra RT
5,528,846 UART: [state] CFI Enabled
5,635,944 UART: [rt] RT listening for mailbox commands...
5,636,614 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,759,678 UART: [rt]cmd =0x41544d4e, len=14344
6,045,334 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
893,200 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,325 UART: [kat] ++
897,477 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,268 UART: [kat] SHA2-512-ACC
908,169 UART: [kat] ECC-384
917,628 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,513 UART: [cold-reset] ++
1,171,943 UART: [fht] FHT @ 0x50003400
1,174,502 UART: [idev] ++
1,174,670 UART: [idev] CDI.KEYID = 6
1,175,030 UART: [idev] SUBJECT.KEYID = 7
1,175,454 UART: [idev] UDS.KEYID = 0
1,175,799 ready_for_fw is high
1,175,799 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,578 UART: [idev] Erasing UDS.KEYID = 0
1,200,587 UART: [idev] Sha1 KeyId Algorithm
1,209,003 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,482 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,241,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,447 UART: [ldev] --
1,280,866 UART: [fwproc] Wait for Commands...
1,281,532 UART: [fwproc] Recv command 0x46574c44
1,282,260 UART: [fwproc] Recv'd Img size: 114168 bytes
3,116,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,208 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,512 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,310,145 >>> mbox cmd response: success
3,311,303 UART: [afmc] ++
3,311,471 UART: [afmc] CDI.KEYID = 6
3,311,833 UART: [afmc] SUBJECT.KEYID = 7
3,312,258 UART: [afmc] AUTHORITY.KEYID = 5
3,347,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,803 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,512 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,404 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,115 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,974 UART: [afmc] --
3,391,102 UART: [cold-reset] --
3,392,116 UART: [state] Locking Datavault
3,393,429 UART: [state] Locking PCR0, PCR1 and PCR31
3,394,033 UART: [state] Locking ICCM
3,394,677 UART: [exit] Launching FMC @ 0x40000130
3,400,006 UART:
3,400,022 UART: Running Caliptra FMC ...
3,400,430 UART:
3,400,484 UART: [state] CFI Enabled
3,411,224 UART: [fht] FMC Alias Private Key: 7
3,519,236 UART: [art] Extend RT PCRs Done
3,519,664 UART: [art] Lock RT PCRs Done
3,521,110 UART: [art] Populate DV Done
3,529,394 UART: [fht] FMC Alias Private Key: 7
3,530,374 UART: [art] Derive CDI
3,530,654 UART: [art] Store in in slot 0x4
3,616,075 UART: [art] Derive Key Pair
3,616,435 UART: [art] Store priv key in slot 0x5
3,629,331 UART: [art] Derive Key Pair - Done
3,644,179 UART: [art] Signing Cert with AUTHO
3,644,659 UART: RITY.KEYID = 7
3,659,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,660,556 UART: [art] PUB.X = BE857956C34B93AA55BDE3DE97EB797CEA2B3DC5021D73966435065EB62FC8166F0529F62F1B42B9422A2179B3D04E95
3,667,321 UART: [art] PUB.Y = 9FEB3C2412E346AA21C469D8086830CA1B1FE1B5400EDB21EE530F82A04E6C554D2948891A7F67AC3646AD8C33842540
3,674,264 UART: [art] SIG.R = A0399E1A3658CBE4AADB8D98E2B7180CC00AC3C38E5E08B6CCB52AD47930FB7653F468DF429F493C32F28C29A15715B3
3,681,037 UART: [art] SIG.S = 0C683E79E22C40863F89830FAEC29EDB00F7908D4EE06569E1BC5058010C6A3521772ADFCDEBA4C78C978F0ADAF2C7C0
3,705,219 UART: Caliptra RT
3,705,472 UART: [state] CFI Enabled
3,812,506 UART: [rt] RT listening for mailbox commands...
3,813,176 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,430 UART: [rt]cmd =0x41544d4e, len=14344
4,217,396 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 ready_for_fw is high
1,060,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,173,259 >>> mbox cmd response: success
3,234,952 UART:
3,234,968 UART: Running Caliptra FMC ...
3,235,376 UART:
3,235,430 UART: [state] CFI Enabled
3,246,346 UART: [fht] FMC Alias Private Key: 7
3,354,310 UART: [art] Extend RT PCRs Done
3,354,738 UART: [art] Lock RT PCRs Done
3,356,358 UART: [art] Populate DV Done
3,364,626 UART: [fht] FMC Alias Private Key: 7
3,365,732 UART: [art] Derive CDI
3,366,012 UART: [art] Store in in slot 0x4
3,451,689 UART: [art] Derive Key Pair
3,452,049 UART: [art] Store priv key in slot 0x5
3,465,405 UART: [art] Derive Key Pair - Done
3,480,077 UART: [art] Signing Cert with AUTHO
3,480,557 UART: RITY.KEYID = 7
3,495,081 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,846 UART: [art] PUB.X = 8149E3607EB2C424B73A5C51E015219EB1124E2ED247001F872BB72BC633BDD25ABCA2AC08FAA6186B06269DFFCCE9A0
3,502,602 UART: [art] PUB.Y = 21FFAC9E058D897F2E4F06F5BFE7C54AB25B937B850E881BA817C9DE5FEF13DC8903F88A8F57B9AAE66954049D4AC3B6
3,509,555 UART: [art] SIG.R = 206A58CF83A93D84627505AE0C2BF1D8817D18A78A61EA53CFA4EA814E51E2AD0DCB52FE664526D66E135A57664F3130
3,516,322 UART: [art] SIG.S = 0E95D4D15AB054B9CDDDD931174D93649F185482E9C9E2A2E714F0E1B078BE4E862151799D5D2A6F24A1430897A77C24
3,539,755 UART: Caliptra RT
3,540,008 UART: [state] CFI Enabled
3,647,057 UART: [rt] RT listening for mailbox commands...
3,647,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,993 UART: [rt]cmd =0x41544d4e, len=14344
4,054,204 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,765 UART: [state] LifecycleState = Unprovisioned
85,420 UART: [state] DebugLocked = No
85,910 UART: [state] WD Timer not started. Device not locked for debugging
87,219 UART: [kat] SHA2-256
892,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,994 UART: [kat] ++
897,146 UART: [kat] sha1
901,394 UART: [kat] SHA2-256
903,334 UART: [kat] SHA2-384
906,143 UART: [kat] SHA2-512-ACC
908,044 UART: [kat] ECC-384
918,073 UART: [kat] HMAC-384Kdf
922,643 UART: [kat] LMS
1,170,971 UART: [kat] --
1,171,766 UART: [cold-reset] ++
1,172,256 UART: [fht] FHT @ 0x50003400
1,174,997 UART: [idev] ++
1,175,165 UART: [idev] CDI.KEYID = 6
1,175,525 UART: [idev] SUBJECT.KEYID = 7
1,175,949 UART: [idev] UDS.KEYID = 0
1,176,294 ready_for_fw is high
1,176,294 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,029 UART: [idev] Erasing UDS.KEYID = 0
1,200,908 UART: [idev] Sha1 KeyId Algorithm
1,209,358 UART: [idev] --
1,210,252 UART: [ldev] ++
1,210,420 UART: [ldev] CDI.KEYID = 6
1,210,783 UART: [ldev] SUBJECT.KEYID = 5
1,211,209 UART: [ldev] AUTHORITY.KEYID = 7
1,211,672 UART: [ldev] FE.KEYID = 1
1,216,814 UART: [ldev] Erasing FE.KEYID = 1
1,243,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,218 UART: [ldev] --
1,282,585 UART: [fwproc] Wait for Commands...
1,283,255 UART: [fwproc] Recv command 0x46574c44
1,283,983 UART: [fwproc] Recv'd Img size: 114168 bytes
3,125,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,499 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,318,192 >>> mbox cmd response: success
3,319,222 UART: [afmc] ++
3,319,390 UART: [afmc] CDI.KEYID = 6
3,319,752 UART: [afmc] SUBJECT.KEYID = 7
3,320,177 UART: [afmc] AUTHORITY.KEYID = 5
3,355,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,212 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,921 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,813 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,524 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,419 UART: [afmc] --
3,399,351 UART: [cold-reset] --
3,400,371 UART: [state] Locking Datavault
3,401,450 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,054 UART: [state] Locking ICCM
3,402,594 UART: [exit] Launching FMC @ 0x40000130
3,407,923 UART:
3,407,939 UART: Running Caliptra FMC ...
3,408,347 UART:
3,408,490 UART: [state] CFI Enabled
3,418,942 UART: [fht] FMC Alias Private Key: 7
3,526,848 UART: [art] Extend RT PCRs Done
3,527,276 UART: [art] Lock RT PCRs Done
3,528,866 UART: [art] Populate DV Done
3,536,818 UART: [fht] FMC Alias Private Key: 7
3,537,954 UART: [art] Derive CDI
3,538,234 UART: [art] Store in in slot 0x4
3,623,985 UART: [art] Derive Key Pair
3,624,345 UART: [art] Store priv key in slot 0x5
3,637,329 UART: [art] Derive Key Pair - Done
3,652,075 UART: [art] Signing Cert with AUTHO
3,652,555 UART: RITY.KEYID = 7
3,667,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,374 UART: [art] PUB.X = E38A4D1BC72EF80F76BD7748B95C42D7D58212C45FF4CDA476DEF7D7314ECE6845081E7639833E2BBB7FB65387679A91
3,675,146 UART: [art] PUB.Y = D22EED85E34DB2CDD00419A712ABA436251E49C1D79D3F4ABE9F4E070C809BE346878DDFE83F80E158675B126C0E6239
3,682,094 UART: [art] SIG.R = 3374992CC9029C8E855A6781DF366DB5E289A209742F67286B85132B529BD205357D334157FE286176D4347B82A0EE75
3,688,841 UART: [art] SIG.S = AAD280944F0B8E7B8A082B8B24792B98D61FD684941C8E573E51FEA28D1D12FFDBDEBF7844F883BC12B67ACDCD6A971B
3,712,872 UART: Caliptra RT
3,713,217 UART: [state] CFI Enabled
3,821,849 UART: [rt] RT listening for mailbox commands...
3,822,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,215 UART: [rt]cmd =0x41544d4e, len=14344
4,230,759 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,314 ready_for_fw is high
1,060,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,175,465 >>> mbox cmd response: success
3,237,584 UART:
3,237,600 UART: Running Caliptra FMC ...
3,238,008 UART:
3,238,151 UART: [state] CFI Enabled
3,248,839 UART: [fht] FMC Alias Private Key: 7
3,356,285 UART: [art] Extend RT PCRs Done
3,356,713 UART: [art] Lock RT PCRs Done
3,358,323 UART: [art] Populate DV Done
3,366,681 UART: [fht] FMC Alias Private Key: 7
3,367,685 UART: [art] Derive CDI
3,367,965 UART: [art] Store in in slot 0x4
3,453,400 UART: [art] Derive Key Pair
3,453,760 UART: [art] Store priv key in slot 0x5
3,467,146 UART: [art] Derive Key Pair - Done
3,481,787 UART: [art] Signing Cert with AUTHO
3,482,267 UART: RITY.KEYID = 7
3,497,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,464 UART: [art] PUB.X = E3E37056221163F4B77EEB242C61B4371413654181B9E6B184FCA855F84ECA5A2EBE9724194A83294052828BBD42F97A
3,505,230 UART: [art] PUB.Y = 68373922A5DC73F693A3252765B81EBAEC3A3202B61E87F114EF8368E50772048896BDF2B8108403A9E6D05C5F523811
3,512,160 UART: [art] SIG.R = 8BD265E3A03A8F5D9FE03BF2C1BE682642DE8AFF482B5075C94515BC635B4A4E48D6A8EDD7DFF2261794C08CC685F7D2
3,518,946 UART: [art] SIG.S = 7F1A2AEE1EA32ECE74F58860D7DD675DFEC9E70DDA846CD4BD6D60028EDAC1FDD2E22D9D493916033F82DE0B5401FD3C
3,542,546 UART: Caliptra RT
3,542,891 UART: [state] CFI Enabled
3,650,321 UART: [rt] RT listening for mailbox commands...
3,650,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,841 UART: [rt]cmd =0x41544d4e, len=14344
4,057,240 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,518 UART: [state] LifecycleState = Unprovisioned
86,173 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,818 UART: [kat] SHA2-512-ACC
906,719 UART: [kat] ECC-384
915,892 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,599 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,879 UART: [idev] ++
1,173,047 UART: [idev] CDI.KEYID = 6
1,173,408 UART: [idev] SUBJECT.KEYID = 7
1,173,833 UART: [idev] UDS.KEYID = 0
1,174,179 ready_for_fw is high
1,174,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,739 UART: [idev] Sha1 KeyId Algorithm
1,207,697 UART: [idev] --
1,208,902 UART: [ldev] ++
1,209,070 UART: [ldev] CDI.KEYID = 6
1,209,434 UART: [ldev] SUBJECT.KEYID = 5
1,209,861 UART: [ldev] AUTHORITY.KEYID = 7
1,210,324 UART: [ldev] FE.KEYID = 1
1,215,596 UART: [ldev] Erasing FE.KEYID = 1
1,242,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,192 UART: [ldev] --
1,281,514 UART: [fwproc] Wait for Commands...
1,282,237 UART: [fwproc] Recv command 0x46574c44
1,282,970 UART: [fwproc] Recv'd Img size: 114168 bytes
3,125,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,661 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,319,211 >>> mbox cmd response: success
3,320,444 UART: [afmc] ++
3,320,612 UART: [afmc] CDI.KEYID = 6
3,320,975 UART: [afmc] SUBJECT.KEYID = 7
3,321,401 UART: [afmc] AUTHORITY.KEYID = 5
3,356,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,080 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,790 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,680 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,391 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,137 UART: [afmc] --
3,400,063 UART: [cold-reset] --
3,400,631 UART: [state] Locking Datavault
3,401,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,410 UART: [state] Locking ICCM
3,402,856 UART: [exit] Launching FMC @ 0x40000130
3,408,185 UART:
3,408,201 UART: Running Caliptra FMC ...
3,408,609 UART:
3,408,663 UART: [state] CFI Enabled
3,418,757 UART: [fht] FMC Alias Private Key: 7
3,526,561 UART: [art] Extend RT PCRs Done
3,526,989 UART: [art] Lock RT PCRs Done
3,528,825 UART: [art] Populate DV Done
3,537,197 UART: [fht] FMC Alias Private Key: 7
3,538,267 UART: [art] Derive CDI
3,538,547 UART: [art] Store in in slot 0x4
3,624,100 UART: [art] Derive Key Pair
3,624,460 UART: [art] Store priv key in slot 0x5
3,636,764 UART: [art] Derive Key Pair - Done
3,651,595 UART: [art] Signing Cert with AUTHO
3,652,075 UART: RITY.KEYID = 7
3,667,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,042 UART: [art] PUB.X = 865DCF0A8E37E5BB238ED682913B6A4CA032224FECC12A8CBCA8E006C7CF99B380E3E4BB01500D43EC815D9C86CCDD7C
3,674,822 UART: [art] PUB.Y = BA34BAEEB68C1D89AD2C148F86C06E6CD9E6A88A53E19D1004A20CD5176C7D59946927A80BD04BADD64A8938385EAFF6
3,681,779 UART: [art] SIG.R = DDB7B271FB9D8B87D147D10F5F0677BDF59377599EFB48D72E68412A5D981992F13ABEF77C08694FDFC99DAE8BB7AF27
3,688,556 UART: [art] SIG.S = 899175BD02A54C676E9874E5F2A220DB17C0D82C89AE6C16E5DE7CA378B595AE3DE0473D587C5346B35F7E0FBA04BE1F
3,711,724 UART: Caliptra RT
3,711,977 UART: [state] CFI Enabled
3,820,364 UART: [rt] RT listening for mailbox commands...
3,821,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,120 UART: [rt]cmd =0x41544d4e, len=14344
4,229,798 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,084 ready_for_fw is high
1,056,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,179,391 >>> mbox cmd response: success
3,241,708 UART:
3,241,724 UART: Running Caliptra FMC ...
3,242,132 UART:
3,242,186 UART: [state] CFI Enabled
3,253,090 UART: [fht] FMC Alias Private Key: 7
3,361,996 UART: [art] Extend RT PCRs Done
3,362,424 UART: [art] Lock RT PCRs Done
3,363,716 UART: [art] Populate DV Done
3,371,956 UART: [fht] FMC Alias Private Key: 7
3,373,066 UART: [art] Derive CDI
3,373,346 UART: [art] Store in in slot 0x4
3,458,573 UART: [art] Derive Key Pair
3,458,933 UART: [art] Store priv key in slot 0x5
3,471,619 UART: [art] Derive Key Pair - Done
3,486,625 UART: [art] Signing Cert with AUTHO
3,487,105 UART: RITY.KEYID = 7
3,502,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,814 UART: [art] PUB.X = 5E9DD4F5F7B89F80AACBB3A57479DC36DCFFDF02256C7A15CC56523B6705920B4A6D70042B2688FA839DD8D3D0DA4452
3,509,586 UART: [art] PUB.Y = C5B50571535BD5942CF08CD644A9641F9CF3CB08DECDB483FE7D86C52B4AAF79889690B7BEA4C8B1A4DE102075ADD1E5
3,516,548 UART: [art] SIG.R = 393DD0641746AD4A2EE3DC234A6CC115E88C41CCDF95A9FD81DAE80F6E1AE9FF8D4A5F21CF41479F30B12FD6350F053D
3,523,329 UART: [art] SIG.S = 7104B7C691FDBE1936C4FF0A612CE6148FD2A6621708C476AEAB3244905ABF4FFEEAAA7FEB79C233146AD13D09CFF39B
3,547,428 UART: Caliptra RT
3,547,681 UART: [state] CFI Enabled
3,654,326 UART: [rt] RT listening for mailbox commands...
3,654,996 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,342 UART: [rt]cmd =0x41544d4e, len=14344
4,066,665 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
921,073 UART: [kat] LMS
1,169,385 UART: [kat] --
1,170,042 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 ready_for_fw is high
1,174,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,292 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,153 UART: [ldev] ++
1,209,321 UART: [ldev] CDI.KEYID = 6
1,209,685 UART: [ldev] SUBJECT.KEYID = 5
1,210,112 UART: [ldev] AUTHORITY.KEYID = 7
1,210,575 UART: [ldev] FE.KEYID = 1
1,215,659 UART: [ldev] Erasing FE.KEYID = 1
1,241,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,575 UART: [ldev] --
1,281,055 UART: [fwproc] Wait for Commands...
1,281,874 UART: [fwproc] Recv command 0x46574c44
1,282,607 UART: [fwproc] Recv'd Img size: 114168 bytes
3,130,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,323,364 >>> mbox cmd response: success
3,324,609 UART: [afmc] ++
3,324,777 UART: [afmc] CDI.KEYID = 6
3,325,140 UART: [afmc] SUBJECT.KEYID = 7
3,325,566 UART: [afmc] AUTHORITY.KEYID = 5
3,360,950 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,731 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,441 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,331 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,042 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,690 UART: [afmc] --
3,403,692 UART: [cold-reset] --
3,404,684 UART: [state] Locking Datavault
3,405,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,406,457 UART: [state] Locking ICCM
3,406,889 UART: [exit] Launching FMC @ 0x40000130
3,412,218 UART:
3,412,234 UART: Running Caliptra FMC ...
3,412,642 UART:
3,412,785 UART: [state] CFI Enabled
3,423,931 UART: [fht] FMC Alias Private Key: 7
3,531,743 UART: [art] Extend RT PCRs Done
3,532,171 UART: [art] Lock RT PCRs Done
3,533,587 UART: [art] Populate DV Done
3,541,599 UART: [fht] FMC Alias Private Key: 7
3,542,575 UART: [art] Derive CDI
3,542,855 UART: [art] Store in in slot 0x4
3,628,300 UART: [art] Derive Key Pair
3,628,660 UART: [art] Store priv key in slot 0x5
3,641,462 UART: [art] Derive Key Pair - Done
3,656,170 UART: [art] Signing Cert with AUTHO
3,656,650 UART: RITY.KEYID = 7
3,671,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,751 UART: [art] PUB.X = 0EE3F91C3812B70ED3F3D71F34C9471B912AC1D99B77A48F7CC4FAC91956B2987187B24109A88411109611F5E5CF89AC
3,679,514 UART: [art] PUB.Y = 62EB0533BC3A508C5B2ED10B353F112450E89D7DB0BAF11462A2949CCEDE09BEC4ACA369AE54CCB1D7380FD187E2EEB4
3,686,474 UART: [art] SIG.R = DB50F853163E99CE4311BBCC89B1689F2731E518416964B98D20E9A4E1F9BAB208440326F8B368419E63D50C02C8FDAF
3,693,234 UART: [art] SIG.S = BE4983D4CBAE4E17178F4BFA58F827F6944C9D638D5E7EEB6C2FC763A34EFBD83CD89C119FB7301F198B6B68A013341D
3,717,671 UART: Caliptra RT
3,718,016 UART: [state] CFI Enabled
3,825,117 UART: [rt] RT listening for mailbox commands...
3,825,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,761 UART: [rt]cmd =0x41544d4e, len=14344
4,232,024 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,823 ready_for_fw is high
1,056,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,162,992 >>> mbox cmd response: success
3,225,351 UART:
3,225,367 UART: Running Caliptra FMC ...
3,225,775 UART:
3,225,918 UART: [state] CFI Enabled
3,236,594 UART: [fht] FMC Alias Private Key: 7
3,344,518 UART: [art] Extend RT PCRs Done
3,344,946 UART: [art] Lock RT PCRs Done
3,346,460 UART: [art] Populate DV Done
3,354,676 UART: [fht] FMC Alias Private Key: 7
3,355,612 UART: [art] Derive CDI
3,355,892 UART: [art] Store in in slot 0x4
3,441,953 UART: [art] Derive Key Pair
3,442,313 UART: [art] Store priv key in slot 0x5
3,455,267 UART: [art] Derive Key Pair - Done
3,469,797 UART: [art] Signing Cert with AUTHO
3,470,277 UART: RITY.KEYID = 7
3,485,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,230 UART: [art] PUB.X = 880C8D4402F60B5866359AAF17278E6A5FCA73B90EA5E03BDB861FB06EED1E302705EE7371B66851FC00D9F9056E1611
3,492,964 UART: [art] PUB.Y = 124BB93D2F65B5CC52F6A0E802FABB7FA401BF2A5D2064DBA5C0E1385A95CA5EE215AC09177DF955BE997916D4C90F10
3,499,918 UART: [art] SIG.R = 47219B2D4D500D3E4F1E661645700B15FAC97F3F1A6D04C309E24AF654F80BCB33ABE2DE4DFFFC21874711E29287BE3F
3,506,685 UART: [art] SIG.S = 6915C18F8078D22EC9ACFF3C2C2EBC2629884F7D4964A867722592326A6CBD1849276E6DA1AF2CC8D6DDF7A373D214E7
3,531,198 UART: Caliptra RT
3,531,543 UART: [state] CFI Enabled
3,640,274 UART: [rt] RT listening for mailbox commands...
3,640,944 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,190 UART: [rt]cmd =0x41544d4e, len=14344
4,047,507 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,154 UART:
192,530 UART: Running Caliptra ROM ...
193,641 UART:
193,777 UART: [state] CFI Enabled
259,916 UART: [state] LifecycleState = Unprovisioned
261,841 UART: [state] DebugLocked = No
263,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,588 UART: [kat] SHA2-256
438,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,812 UART: [kat] ++
449,250 UART: [kat] sha1
459,622 UART: [kat] SHA2-256
462,330 UART: [kat] SHA2-384
468,450 UART: [kat] SHA2-512-ACC
470,819 UART: [kat] ECC-384
2,765,494 UART: [kat] HMAC-384Kdf
2,797,117 UART: [kat] LMS
3,987,404 UART: [kat] --
3,992,664 UART: [cold-reset] ++
3,994,887 UART: [fht] Storing FHT @ 0x50003400
4,005,604 UART: [idev] ++
4,006,209 UART: [idev] CDI.KEYID = 6
4,007,098 UART: [idev] SUBJECT.KEYID = 7
4,008,368 UART: [idev] UDS.KEYID = 0
4,009,596 ready_for_fw is high
4,009,816 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,152,960 UART: [idev] Erasing UDS.KEYID = 0
7,346,043 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,753 UART: [idev] --
7,370,493 UART: [ldev] ++
7,371,122 UART: [ldev] CDI.KEYID = 6
7,372,031 UART: [ldev] SUBJECT.KEYID = 5
7,373,238 UART: [ldev] AUTHORITY.KEYID = 7
7,374,512 UART: [ldev] FE.KEYID = 1
7,420,907 UART: [ldev] Erasing FE.KEYID = 1
10,755,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,614 UART: [ldev] --
13,133,529 UART: [fwproc] Waiting for Commands...
13,135,779 UART: [fwproc] Received command 0x46574c44
13,137,957 UART: [fwproc] Received Image of size 113844 bytes
21,697,134 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,778,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,847,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,163,279 >>> mbox cmd response: success
22,166,569 UART: [afmc] ++
22,167,170 UART: [afmc] CDI.KEYID = 6
22,168,134 UART: [afmc] SUBJECT.KEYID = 7
22,169,345 UART: [afmc] AUTHORITY.KEYID = 5
25,526,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,827,920 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,830,171 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,844,773 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
27,859,485 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
27,873,705 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
27,895,487 UART: [afmc] --
27,898,585 UART: [cold-reset] --
27,902,333 UART: [state] Locking Datavault
27,907,197 UART: [state] Locking PCR0, PCR1 and PCR31
27,908,889 UART: [state] Locking ICCM
27,911,470 UART: [exit] Launching FMC @ 0x40000130
27,919,873 UART:
27,920,142 UART: Running Caliptra FMC ...
27,921,278 UART:
27,921,443 UART: [state] CFI Enabled
27,987,437 UART: [fht] FMC Alias Private Key: 7
30,326,017 UART: [art] Extend RT PCRs Done
30,327,245 UART: [art] Lock RT PCRs Done
30,329,078 UART: [art] Populate DV Done
30,334,486 UART: [fht] FMC Alias Private Key: 7
30,336,079 UART: [art] Derive CDI
30,336,819 UART: [art] Store in in slot 0x4
30,396,279 UART: [art] Derive Key Pair
30,397,273 UART: [art] Store priv key in slot 0x5
33,689,762 UART: [art] Derive Key Pair - Done
33,702,826 UART: [art] Signing Cert with AUTHO
33,704,126 UART: RITY.KEYID = 7
35,990,773 UART: [art] Erasing AUTHORITY.KEYID = 7
35,992,283 UART: [art] PUB.X = 8AEF526162F989167C8ED5D4352E1DD45A0DB685D9A0E791E3CF7768F94E42BB172709CDFF4DE4E2E32DBEE63A674C1D
35,999,699 UART: [art] PUB.Y = 2020D56779C5BE5894B62C61E40595FDE7126D38D19E0AF8400698663C0F5D052EEF6FA53A5599C576BD299366045C2F
36,006,740 UART: [art] SIG.R = 02C23D595F27C69CBF8213BA3747E0F7AC31C5664E5A7FFF50638B0867DC81348C3CACBFA21DABFF85C1EE01BE402D97
36,014,103 UART: [art] SIG.S = E0FC2C76FFB70DEE053B7EB0A3B067520747B14094498BF9717023681D6AB19CC19C5CD05B4BFA3217EB9AA9CA5E6EA9
37,319,751 UART: Caliptra RT
37,320,462 UART: [state] CFI Enabled
37,481,368 UART: [rt] RT listening for mailbox commands...
37,483,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,639,052 UART: [rt]cmd =0x41544d4e, len=14344
40,984,551 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,807,166 ready_for_fw is high
3,807,718 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,869,477 >>> mbox cmd response: success
27,563,897 UART:
27,564,319 UART: Running Caliptra FMC ...
27,565,443 UART:
27,565,598 UART: [state] CFI Enabled
27,636,203 UART: [fht] FMC Alias Private Key: 7
29,973,986 UART: [art] Extend RT PCRs Done
29,975,209 UART: [art] Lock RT PCRs Done
29,977,066 UART: [art] Populate DV Done
29,982,484 UART: [fht] FMC Alias Private Key: 7
29,984,051 UART: [art] Derive CDI
29,984,809 UART: [art] Store in in slot 0x4
30,045,357 UART: [art] Derive Key Pair
30,046,395 UART: [art] Store priv key in slot 0x5
33,339,258 UART: [art] Derive Key Pair - Done
33,351,978 UART: [art] Signing Cert with AUTHO
33,353,277 UART: RITY.KEYID = 7
35,640,679 UART: [art] Erasing AUTHORITY.KEYID = 7
35,642,193 UART: [art] PUB.X = 6F834628E8E511B85EDC7332C330449A2BC991F93EDFA50D98A0E7A25DAFB8B6314CADF86055362ED886CC8275D651EF
35,649,426 UART: [art] PUB.Y = 38C1FA50B16BAB0704589B45A112FEEC20E376D2E23E3321E70B61DC19A7410374ABD7BA274E0121344FAE3A04542363
35,656,708 UART: [art] SIG.R = CA52AA602397710246133101E374AC26A4411CBF0087F5ED5D0DCE37C491BE19368556940E738953503C549592491836
35,664,027 UART: [art] SIG.S = 447A78E41B9D9C593422290E9C465B3B081AA84F9E01F8649CA318635A2900137B064F0A640E0714017009CA0AC252CD
36,969,303 UART: Caliptra RT
36,970,024 UART: [state] CFI Enabled
37,130,965 UART: [rt] RT listening for mailbox commands...
37,133,321 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,288,752 UART: [rt]cmd =0x41544d4e, len=14344
40,582,872 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
192,662 UART:
193,013 UART: Running Caliptra ROM ...
194,204 UART:
603,746 UART: [state] CFI Enabled
617,832 UART: [state] LifecycleState = Unprovisioned
619,775 UART: [state] DebugLocked = No
622,783 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,306 UART: [kat] SHA2-256
798,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,582 UART: [kat] ++
809,028 UART: [kat] sha1
820,829 UART: [kat] SHA2-256
823,553 UART: [kat] SHA2-384
830,111 UART: [kat] SHA2-512-ACC
832,508 UART: [kat] ECC-384
3,115,662 UART: [kat] HMAC-384Kdf
3,127,754 UART: [kat] LMS
4,317,876 UART: [kat] --
4,323,299 UART: [cold-reset] ++
4,324,242 UART: [fht] Storing FHT @ 0x50003400
4,335,718 UART: [idev] ++
4,336,294 UART: [idev] CDI.KEYID = 6
4,337,329 UART: [idev] SUBJECT.KEYID = 7
4,338,504 UART: [idev] UDS.KEYID = 0
4,339,576 ready_for_fw is high
4,339,781 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,744 UART: [idev] Erasing UDS.KEYID = 0
7,624,709 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,356 UART: [idev] --
7,651,107 UART: [ldev] ++
7,651,751 UART: [ldev] CDI.KEYID = 6
7,652,661 UART: [ldev] SUBJECT.KEYID = 5
7,653,882 UART: [ldev] AUTHORITY.KEYID = 7
7,655,116 UART: [ldev] FE.KEYID = 1
7,664,624 UART: [ldev] Erasing FE.KEYID = 1
10,955,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,928 UART: [ldev] --
13,316,123 UART: [fwproc] Waiting for Commands...
13,318,218 UART: [fwproc] Received command 0x46574c44
13,320,403 UART: [fwproc] Received Image of size 113844 bytes
22,036,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,118,277 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,187,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,503,862 >>> mbox cmd response: success
22,508,657 UART: [afmc] ++
22,509,255 UART: [afmc] CDI.KEYID = 6
22,510,281 UART: [afmc] SUBJECT.KEYID = 7
22,511,438 UART: [afmc] AUTHORITY.KEYID = 5
25,829,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,123,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,125,564 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,140,153 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,154,894 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,169,111 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,189,580 UART: [afmc] --
28,193,063 UART: [cold-reset] --
28,197,411 UART: [state] Locking Datavault
28,204,289 UART: [state] Locking PCR0, PCR1 and PCR31
28,206,074 UART: [state] Locking ICCM
28,208,720 UART: [exit] Launching FMC @ 0x40000130
28,217,117 UART:
28,217,355 UART: Running Caliptra FMC ...
28,218,459 UART:
28,218,619 UART: [state] CFI Enabled
28,227,165 UART: [fht] FMC Alias Private Key: 7
30,558,377 UART: [art] Extend RT PCRs Done
30,559,613 UART: [art] Lock RT PCRs Done
30,561,724 UART: [art] Populate DV Done
30,567,244 UART: [fht] FMC Alias Private Key: 7
30,568,839 UART: [art] Derive CDI
30,569,661 UART: [art] Store in in slot 0x4
30,612,095 UART: [art] Derive Key Pair
30,613,101 UART: [art] Store priv key in slot 0x5
33,855,154 UART: [art] Derive Key Pair - Done
33,868,384 UART: [art] Signing Cert with AUTHO
33,869,694 UART: RITY.KEYID = 7
36,148,755 UART: [art] Erasing AUTHORITY.KEYID = 7
36,150,261 UART: [art] PUB.X = 3AA80A40C9BF629D840EB5ABF174D771F14D9789081A184408F7950658FC4AA4808E12BA11A177FBDA2765DF54C95294
36,157,462 UART: [art] PUB.Y = C99B0DE9520E65AE60B3D7B4CF6B5EFF73BABCDF6BF1FE66EB656873A4938DC5D0300A9134CE0B6069A21BA866EA4153
36,164,763 UART: [art] SIG.R = 8EC74DD17F75272A062ABDE30D9258BD86ED82BC492FFB5A62370393001BB824B25202EA178405AC0C27C178E669A05A
36,172,117 UART: [art] SIG.S = A2F1F6FDDA39D7F6A722E9B7569388F6F8A4E5F61B7A4FECAD08A2E596B06819CB777D37713214E74F655D7C0A728F5F
37,477,450 UART: Caliptra RT
37,478,163 UART: [state] CFI Enabled
37,596,637 UART: [rt] RT listening for mailbox commands...
37,598,937 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,754,292 UART: [rt]cmd =0x41544d4e, len=14344
41,125,301 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,130,845 ready_for_fw is high
4,131,389 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,389,590 >>> mbox cmd response: success
28,026,328 UART:
28,026,761 UART: Running Caliptra FMC ...
28,027,905 UART:
28,028,067 UART: [state] CFI Enabled
28,035,648 UART: [fht] FMC Alias Private Key: 7
30,366,364 UART: [art] Extend RT PCRs Done
30,367,594 UART: [art] Lock RT PCRs Done
30,369,423 UART: [art] Populate DV Done
30,375,050 UART: [fht] FMC Alias Private Key: 7
30,376,758 UART: [art] Derive CDI
30,377,496 UART: [art] Store in in slot 0x4
30,419,987 UART: [art] Derive Key Pair
30,421,032 UART: [art] Store priv key in slot 0x5
33,663,376 UART: [art] Derive Key Pair - Done
33,676,553 UART: [art] Signing Cert with AUTHO
33,677,865 UART: RITY.KEYID = 7
35,957,282 UART: [art] Erasing AUTHORITY.KEYID = 7
35,958,789 UART: [art] PUB.X = A6AD6A5B6981CB9F3E714285EB06B6A76A462CE7A133E875342D16A447A05606B5BBC0DB4E999AE4180C8CB5759437EE
35,966,074 UART: [art] PUB.Y = DC172AC6F80A998E09C4C037507B51A047286C7267F7B93EB05A9E7A09A80D3B591AF4EDC55AF192E549D399E8647BA1
35,973,300 UART: [art] SIG.R = F0F1A507A91DA9B63C9F73C0A289508BDE6F88EA958CDB57470DE5CA4FCC0C3C91F7E7E1D3E73015C557C541C271447D
35,980,713 UART: [art] SIG.S = 632B588C715DE5D48D1CD88CE89C20836DBCAAC634191DE19B164D8F40C5CC27BDE041E38D69B45023EC2438F307AEDC
37,286,056 UART: Caliptra RT
37,286,755 UART: [state] CFI Enabled
37,404,681 UART: [rt] RT listening for mailbox commands...
37,406,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,562,191 UART: [rt]cmd =0x41544d4e, len=14344
40,984,920 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,048 UART:
192,418 UART: Running Caliptra ROM ...
193,562 UART:
193,711 UART: [state] CFI Enabled
264,114 UART: [state] LifecycleState = Unprovisioned
265,959 UART: [state] DebugLocked = No
268,564 UART: [state] WD Timer not started. Device not locked for debugging
272,461 UART: [kat] SHA2-256
451,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,111 UART: [kat] ++
463,665 UART: [kat] sha1
475,827 UART: [kat] SHA2-256
478,846 UART: [kat] SHA2-384
485,265 UART: [kat] SHA2-512-ACC
488,205 UART: [kat] ECC-384
2,950,465 UART: [kat] HMAC-384Kdf
2,972,825 UART: [kat] LMS
3,502,303 UART: [kat] --
3,505,148 UART: [cold-reset] ++
3,506,798 UART: [fht] FHT @ 0x50003400
3,517,918 UART: [idev] ++
3,518,484 UART: [idev] CDI.KEYID = 6
3,519,373 UART: [idev] SUBJECT.KEYID = 7
3,520,615 UART: [idev] UDS.KEYID = 0
3,521,545 ready_for_fw is high
3,521,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,427 UART: [idev] Erasing UDS.KEYID = 0
6,028,568 UART: [idev] Sha1 KeyId Algorithm
6,051,636 UART: [idev] --
6,056,102 UART: [ldev] ++
6,056,688 UART: [ldev] CDI.KEYID = 6
6,057,606 UART: [ldev] SUBJECT.KEYID = 5
6,058,776 UART: [ldev] AUTHORITY.KEYID = 7
6,060,073 UART: [ldev] FE.KEYID = 1
6,100,755 UART: [ldev] Erasing FE.KEYID = 1
8,604,675 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,618 UART: [ldev] --
10,416,839 UART: [fwproc] Wait for Commands...
10,418,687 UART: [fwproc] Recv command 0x46574c44
10,420,785 UART: [fwproc] Recv'd Img size: 114168 bytes
15,013,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,096,283 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,165,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,482,213 >>> mbox cmd response: success
15,486,922 UART: [afmc] ++
15,487,545 UART: [afmc] CDI.KEYID = 6
15,488,467 UART: [afmc] SUBJECT.KEYID = 7
15,489,573 UART: [afmc] AUTHORITY.KEYID = 5
18,028,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,750,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,752,330 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,768,256 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,784,226 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,800,010 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,822,949 UART: [afmc] --
19,826,836 UART: [cold-reset] --
19,832,222 UART: [state] Locking Datavault
19,839,039 UART: [state] Locking PCR0, PCR1 and PCR31
19,840,694 UART: [state] Locking ICCM
19,843,225 UART: [exit] Launching FMC @ 0x40000130
19,851,681 UART:
19,851,924 UART: Running Caliptra FMC ...
19,853,027 UART:
19,853,195 UART: [state] CFI Enabled
19,908,331 UART: [fht] FMC Alias Private Key: 7
21,672,395 UART: [art] Extend RT PCRs Done
21,673,623 UART: [art] Lock RT PCRs Done
21,674,926 UART: [art] Populate DV Done
21,680,344 UART: [fht] FMC Alias Private Key: 7
21,681,885 UART: [art] Derive CDI
21,682,716 UART: [art] Store in in slot 0x4
21,741,879 UART: [art] Derive Key Pair
21,742,923 UART: [art] Store priv key in slot 0x5
24,205,681 UART: [art] Derive Key Pair - Done
24,218,803 UART: [art] Signing Cert with AUTHO
24,220,110 UART: RITY.KEYID = 7
25,931,972 UART: [art] Erasing AUTHORITY.KEYID = 7
25,933,468 UART: [art] PUB.X = 8D1B3493333555BC6CF6EFB18AFD7D9FF488FC631111A417CF9EAAF19BAC59706EF3297769C1563454E6E6A44911BAB7
25,940,768 UART: [art] PUB.Y = EAEDDFF23819AABA6D639E086C0908D367454ECE79E5EF53CC6CD0A5274D2E2996FCF6B3EC5FD903D57CC5609804D5E8
25,948,061 UART: [art] SIG.R = 48EB5D55238AE9F04E6A59D0964EAA7320997A22856504CBD7330F6A81FF8ADA6981BB6CE4423FF398121A2D5D27F86B
25,955,439 UART: [art] SIG.S = B956FF74D84748A99B81556942FDA5380F5464AFB9170DC0F31F66E1C3AB6FFF4B2D1CA901748728CC265E47719312E2
26,934,830 UART: Caliptra RT
26,935,537 UART: [state] CFI Enabled
27,100,703 UART: [rt] RT listening for mailbox commands...
27,102,989 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,258,464 UART: [rt]cmd =0x41544d4e, len=14344
29,404,677 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,357,691 ready_for_fw is high
3,358,111 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,986,384 >>> mbox cmd response: success
19,283,556 UART:
19,283,950 UART: Running Caliptra FMC ...
19,285,084 UART:
19,285,254 UART: [state] CFI Enabled
19,349,398 UART: [fht] FMC Alias Private Key: 7
21,113,398 UART: [art] Extend RT PCRs Done
21,114,623 UART: [art] Lock RT PCRs Done
21,116,385 UART: [art] Populate DV Done
21,121,824 UART: [fht] FMC Alias Private Key: 7
21,123,527 UART: [art] Derive CDI
21,124,265 UART: [art] Store in in slot 0x4
21,182,061 UART: [art] Derive Key Pair
21,183,108 UART: [art] Store priv key in slot 0x5
23,645,982 UART: [art] Derive Key Pair - Done
23,658,986 UART: [art] Signing Cert with AUTHO
23,660,295 UART: RITY.KEYID = 7
25,370,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,372,387 UART: [art] PUB.X = 1BAA07ADF6873BFA79DD47FDBAAF2AF81EB8C6442F43D916CC2986689670E747482D8B24D52519A13BBBA96DF9C53433
25,379,631 UART: [art] PUB.Y = 5096A8267B915CFE8FA7E2782E6D807CC8991B2211BD2092881D585C976A8A90816A1B7006777B5CD7BC4BC28F70F6FF
25,386,902 UART: [art] SIG.R = DA3FDF8887552AF112319AAA5FC4CB3E877FF3B0125EF4F54F0104D72454A8A63702DBA270B9A55F5A8B04C91AE261F5
25,394,292 UART: [art] SIG.S = 603B72E46A9A94840D84543C541C7EA2181E0EAB3BD8406B3BE145AA0E65ED2EEB7BF1F1C15D68D8C4DD2F88742674A2
26,372,637 UART: Caliptra RT
26,373,336 UART: [state] CFI Enabled
26,537,006 UART: [rt] RT listening for mailbox commands...
26,539,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,694,507 UART: [rt]cmd =0x41544d4e, len=14344
28,845,924 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,756 writing to cptra_bootfsm_go
193,037 UART:
193,440 UART: Running Caliptra ROM ...
194,649 UART:
604,238 UART: [state] CFI Enabled
616,970 UART: [state] LifecycleState = Unprovisioned
618,833 UART: [state] DebugLocked = No
621,774 UART: [state] WD Timer not started. Device not locked for debugging
624,663 UART: [kat] SHA2-256
803,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,372 UART: [kat] ++
815,904 UART: [kat] sha1
827,721 UART: [kat] SHA2-256
830,759 UART: [kat] SHA2-384
837,031 UART: [kat] SHA2-512-ACC
839,997 UART: [kat] ECC-384
3,282,045 UART: [kat] HMAC-384Kdf
3,294,352 UART: [kat] LMS
3,823,850 UART: [kat] --
3,829,145 UART: [cold-reset] ++
3,830,370 UART: [fht] FHT @ 0x50003400
3,840,632 UART: [idev] ++
3,841,201 UART: [idev] CDI.KEYID = 6
3,842,114 UART: [idev] SUBJECT.KEYID = 7
3,843,358 UART: [idev] UDS.KEYID = 0
3,844,282 ready_for_fw is high
3,844,488 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,300 UART: [idev] Erasing UDS.KEYID = 0
6,317,716 UART: [idev] Sha1 KeyId Algorithm
6,341,533 UART: [idev] --
6,345,410 UART: [ldev] ++
6,345,999 UART: [ldev] CDI.KEYID = 6
6,347,102 UART: [ldev] SUBJECT.KEYID = 5
6,348,137 UART: [ldev] AUTHORITY.KEYID = 7
6,349,228 UART: [ldev] FE.KEYID = 1
6,359,657 UART: [ldev] Erasing FE.KEYID = 1
8,836,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,278 UART: [ldev] --
10,626,643 UART: [fwproc] Wait for Commands...
10,629,596 UART: [fwproc] Recv command 0x46574c44
10,631,691 UART: [fwproc] Recv'd Img size: 114168 bytes
15,205,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,285,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,354,128 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,671,027 >>> mbox cmd response: success
15,676,173 UART: [afmc] ++
15,676,761 UART: [afmc] CDI.KEYID = 6
15,677,647 UART: [afmc] SUBJECT.KEYID = 7
15,678,804 UART: [afmc] AUTHORITY.KEYID = 5
18,177,660 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,900,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,902,023 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,917,979 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,933,982 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,949,791 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,972,489 UART: [afmc] --
19,976,246 UART: [cold-reset] --
19,979,784 UART: [state] Locking Datavault
19,983,355 UART: [state] Locking PCR0, PCR1 and PCR31
19,985,080 UART: [state] Locking ICCM
19,986,969 UART: [exit] Launching FMC @ 0x40000130
19,995,421 UART:
19,995,655 UART: Running Caliptra FMC ...
19,996,759 UART:
19,996,917 UART: [state] CFI Enabled
20,005,074 UART: [fht] FMC Alias Private Key: 7
21,760,850 UART: [art] Extend RT PCRs Done
21,762,074 UART: [art] Lock RT PCRs Done
21,764,077 UART: [art] Populate DV Done
21,769,495 UART: [fht] FMC Alias Private Key: 7
21,771,147 UART: [art] Derive CDI
21,771,966 UART: [art] Store in in slot 0x4
21,814,454 UART: [art] Derive Key Pair
21,815,487 UART: [art] Store priv key in slot 0x5
24,242,256 UART: [art] Derive Key Pair - Done
24,255,169 UART: [art] Signing Cert with AUTHO
24,256,471 UART: RITY.KEYID = 7
25,961,999 UART: [art] Erasing AUTHORITY.KEYID = 7
25,963,507 UART: [art] PUB.X = AA377110ED2E5FC57D8FBCB08BA13357815A2228B8454EB912F48CA1AD06D18433D9743AE9A5B6DB564CAD8A011D9E92
25,970,768 UART: [art] PUB.Y = 6544E8B135DF545136AAA9C06016C72EAF5CB9B3689737A99EE9A09E576B622CCD0F28B58406806AF883DBF0F59F53BA
25,978,013 UART: [art] SIG.R = 71F75AF11D7999E403EF484D906DB2C0286F6ACF30A05778F7A45B4691D6D600DC5157BA2ECD62E882E6F4D3F9A75F6C
25,985,423 UART: [art] SIG.S = 6DA4C483671FC8F2B071012031F8DF8578D2EDFEA7678E2555ED5516987618DF9357A7286C5E29715488888BC9C3FDB6
26,964,190 UART: Caliptra RT
26,964,900 UART: [state] CFI Enabled
27,082,251 UART: [rt] RT listening for mailbox commands...
27,084,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,239,660 UART: [rt]cmd =0x41544d4e, len=14344
29,391,123 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
15,761 writing to cptra_bootfsm_go
3,708,048 ready_for_fw is high
3,708,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,240,583 >>> mbox cmd response: success
19,492,256 UART:
19,492,645 UART: Running Caliptra FMC ...
19,493,748 UART:
19,493,903 UART: [state] CFI Enabled
19,502,014 UART: [fht] FMC Alias Private Key: 7
21,258,866 UART: [art] Extend RT PCRs Done
21,260,098 UART: [art] Lock RT PCRs Done
21,261,681 UART: [art] Populate DV Done
21,267,026 UART: [fht] FMC Alias Private Key: 7
21,268,741 UART: [art] Derive CDI
21,269,477 UART: [art] Store in in slot 0x4
21,312,115 UART: [art] Derive Key Pair
21,313,185 UART: [art] Store priv key in slot 0x5
23,739,734 UART: [art] Derive Key Pair - Done
23,752,302 UART: [art] Signing Cert with AUTHO
23,753,604 UART: RITY.KEYID = 7
25,459,091 UART: [art] Erasing AUTHORITY.KEYID = 7
25,460,604 UART: [art] PUB.X = 146733433E28C4F30D74DB1FBFA0D5C30D1D017A92996C47BDA5D5FDA9827375C3E8FA15F2D14A4080CDBBC173DD9A55
25,467,848 UART: [art] PUB.Y = 367026F13E7CD4B0E21F11953346EED837B8C5A5557DBA57BD8D9D159220893D77D92EF2206766EF072D76A55A5462FE
25,475,109 UART: [art] SIG.R = D17D4DEFA5475BFFE34441520B708893FB7BE573545A2B347D4FBD3716ECA879DE549D4437FD32FA056ECAE4E720A200
25,482,506 UART: [art] SIG.S = B69F5D1D0B7F3D71646C5CE8C4BB1719E4C262C25B663136DF816B951FCCD35DBD35A5987A4B44B50BD60174AEDDCDA3
26,461,271 UART: Caliptra RT
26,461,975 UART: [state] CFI Enabled
26,580,421 UART: [rt] RT listening for mailbox commands...
26,582,722 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,738,250 UART: [rt]cmd =0x41544d4e, len=14344
28,884,673 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,245 UART:
192,611 UART: Running Caliptra ROM ...
193,828 UART:
193,990 UART: [state] CFI Enabled
261,076 UART: [state] LifecycleState = Unprovisioned
263,496 UART: [state] DebugLocked = No
265,743 UART: [state] WD Timer not started. Device not locked for debugging
270,636 UART: [kat] SHA2-256
460,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,234 UART: [kat] ++
471,725 UART: [kat] sha1
481,959 UART: [kat] SHA2-256
484,975 UART: [kat] SHA2-384
492,387 UART: [kat] SHA2-512-ACC
494,968 UART: [kat] ECC-384
2,947,538 UART: [kat] HMAC-384Kdf
2,970,873 UART: [kat] LMS
3,502,690 UART: [kat] --
3,506,989 UART: [cold-reset] ++
3,508,924 UART: [fht] FHT @ 0x50003400
3,520,618 UART: [idev] ++
3,521,259 UART: [idev] CDI.KEYID = 6
3,522,253 UART: [idev] SUBJECT.KEYID = 7
3,523,428 UART: [idev] UDS.KEYID = 0
3,524,355 ready_for_fw is high
3,524,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,353 UART: [idev] Erasing UDS.KEYID = 0
6,027,468 UART: [idev] Sha1 KeyId Algorithm
6,049,609 UART: [idev] --
6,055,106 UART: [ldev] ++
6,055,802 UART: [ldev] CDI.KEYID = 6
6,056,716 UART: [ldev] SUBJECT.KEYID = 5
6,057,877 UART: [ldev] AUTHORITY.KEYID = 7
6,059,111 UART: [ldev] FE.KEYID = 1
6,099,113 UART: [ldev] Erasing FE.KEYID = 1
8,607,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,109 UART: [ldev] --
10,414,912 UART: [fwproc] Wait for Commands...
10,417,113 UART: [fwproc] Recv command 0x46574c44
10,419,429 UART: [fwproc] Recv'd Img size: 114168 bytes
15,031,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,109,733 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,225,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,766,892 >>> mbox cmd response: success
15,771,315 UART: [afmc] ++
15,772,029 UART: [afmc] CDI.KEYID = 6
15,773,250 UART: [afmc] SUBJECT.KEYID = 7
15,774,703 UART: [afmc] AUTHORITY.KEYID = 5
18,321,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,064,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,066,665 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,081,719 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,096,922 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,111,744 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,135,651 UART: [afmc] --
20,139,792 UART: [cold-reset] --
20,143,070 UART: [state] Locking Datavault
20,147,259 UART: [state] Locking PCR0, PCR1 and PCR31
20,149,419 UART: [state] Locking ICCM
20,151,925 UART: [exit] Launching FMC @ 0x40000130
20,160,561 UART:
20,160,799 UART: Running Caliptra FMC ...
20,161,920 UART:
20,162,077 UART: [state] CFI Enabled
20,221,090 UART: [fht] FMC Alias Private Key: 7
21,984,800 UART: [art] Extend RT PCRs Done
21,986,019 UART: [art] Lock RT PCRs Done
21,987,353 UART: [art] Populate DV Done
21,992,503 UART: [fht] FMC Alias Private Key: 7
21,994,148 UART: [art] Derive CDI
21,994,891 UART: [art] Store in in slot 0x4
22,053,930 UART: [art] Derive Key Pair
22,054,973 UART: [art] Store priv key in slot 0x5
24,517,819 UART: [art] Derive Key Pair - Done
24,530,910 UART: [art] Signing Cert with AUTHO
24,532,297 UART: RITY.KEYID = 7
26,244,290 UART: [art] Erasing AUTHORITY.KEYID = 7
26,245,806 UART: [art] PUB.X = 0DA0B0FCF7611403A6E8DAE08A238A68C9E03D7A5FCE3E7CC34D8C358F8A045B580B09F8AD46C01BE3E2F4A60CFBAE7C
26,253,107 UART: [art] PUB.Y = 2D37F5F3DBDF1F244F6B8F32F0DCD9CFE2704AA5E059386ABBFC9601D22739042B9DCA31B81871B133C0C51CD591B8D1
26,260,361 UART: [art] SIG.R = 79B8FBD471B1C86429A6FE4758868AB2BDF371815FB2B0006E561BDD8ECB0B7EEE9B5056D887094DB0E1605C30966770
26,267,721 UART: [art] SIG.S = 9902CB37E1CAE686FD2E430D57820159C278117989ADD6EC077D27E442E782AD80F3E58A17CE7F201E55C155C74857D0
27,246,872 UART: Caliptra RT
27,247,560 UART: [state] CFI Enabled
27,412,553 UART: [rt] RT listening for mailbox commands...
27,414,863 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,570,059 UART: [rt]cmd =0x41544d4e, len=14344
29,717,746 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,437,046 ready_for_fw is high
3,437,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,866,817 >>> mbox cmd response: success
20,156,972 UART:
20,157,403 UART: Running Caliptra FMC ...
20,158,512 UART:
20,158,672 UART: [state] CFI Enabled
20,224,621 UART: [fht] FMC Alias Private Key: 7
21,988,553 UART: [art] Extend RT PCRs Done
21,989,784 UART: [art] Lock RT PCRs Done
21,991,485 UART: [art] Populate DV Done
21,997,114 UART: [fht] FMC Alias Private Key: 7
21,998,822 UART: [art] Derive CDI
21,999,580 UART: [art] Store in in slot 0x4
22,056,681 UART: [art] Derive Key Pair
22,057,686 UART: [art] Store priv key in slot 0x5
24,520,635 UART: [art] Derive Key Pair - Done
24,533,532 UART: [art] Signing Cert with AUTHO
24,534,835 UART: RITY.KEYID = 7
26,245,460 UART: [art] Erasing AUTHORITY.KEYID = 7
26,246,968 UART: [art] PUB.X = 510B0EFE66CBA692C7513CBD722D4DA25AD7893DDA35F3A5E29E72AEB15F3BCB9AD1BD8D177847FD0B680BAAD2AF47EF
26,254,314 UART: [art] PUB.Y = 9F100FFE5688A51E3E09746860DFA2E2632B029DC435B792F6C3F288BCF8B2445D1BEE925BE08BAA8BBFCF757FC878AD
26,261,558 UART: [art] SIG.R = C9B0E06DB3A48C9E8644F7FFD147A972BF2C0011D421733DD5B34C9E08FEDDE2B0BA7B647727F5F9EB0BDC39C2BF754D
26,268,994 UART: [art] SIG.S = 69752E0929DF665A73DA7C2F29944C5C55DB77092E2EF09016F6DFC2F0CFB4F6BC3477BA716F97870433CBC51B2AB778
27,247,839 UART: Caliptra RT
27,248,551 UART: [state] CFI Enabled
27,412,427 UART: [rt] RT listening for mailbox commands...
27,414,751 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,570,280 UART: [rt]cmd =0x41544d4e, len=14344
29,722,804 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,733 writing to cptra_bootfsm_go
193,010 UART:
193,375 UART: Running Caliptra ROM ...
194,516 UART:
604,318 UART: [state] CFI Enabled
617,444 UART: [state] LifecycleState = Unprovisioned
619,832 UART: [state] DebugLocked = No
622,715 UART: [state] WD Timer not started. Device not locked for debugging
627,522 UART: [kat] SHA2-256
817,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,241 UART: [kat] ++
828,721 UART: [kat] sha1
840,167 UART: [kat] SHA2-256
843,177 UART: [kat] SHA2-384
848,240 UART: [kat] SHA2-512-ACC
850,819 UART: [kat] ECC-384
3,296,805 UART: [kat] HMAC-384Kdf
3,309,043 UART: [kat] LMS
3,840,829 UART: [kat] --
3,844,977 UART: [cold-reset] ++
3,846,776 UART: [fht] FHT @ 0x50003400
3,859,903 UART: [idev] ++
3,860,612 UART: [idev] CDI.KEYID = 6
3,861,641 UART: [idev] SUBJECT.KEYID = 7
3,862,747 UART: [idev] UDS.KEYID = 0
3,863,687 ready_for_fw is high
3,863,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,008,709 UART: [idev] Erasing UDS.KEYID = 0
6,340,413 UART: [idev] Sha1 KeyId Algorithm
6,361,257 UART: [idev] --
6,365,887 UART: [ldev] ++
6,366,564 UART: [ldev] CDI.KEYID = 6
6,367,579 UART: [ldev] SUBJECT.KEYID = 5
6,368,681 UART: [ldev] AUTHORITY.KEYID = 7
6,369,916 UART: [ldev] FE.KEYID = 1
6,381,211 UART: [ldev] Erasing FE.KEYID = 1
8,857,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,397 UART: [ldev] --
10,648,018 UART: [fwproc] Wait for Commands...
10,650,006 UART: [fwproc] Recv command 0x46574c44
10,652,262 UART: [fwproc] Recv'd Img size: 114168 bytes
15,251,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,336,294 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,452,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,993,923 >>> mbox cmd response: success
15,997,921 UART: [afmc] ++
15,998,663 UART: [afmc] CDI.KEYID = 6
15,999,852 UART: [afmc] SUBJECT.KEYID = 7
16,001,289 UART: [afmc] AUTHORITY.KEYID = 5
18,501,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,226,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,228,278 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,243,332 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,258,518 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,273,372 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,297,806 UART: [afmc] --
20,301,022 UART: [cold-reset] --
20,303,648 UART: [state] Locking Datavault
20,309,288 UART: [state] Locking PCR0, PCR1 and PCR31
20,311,488 UART: [state] Locking ICCM
20,313,100 UART: [exit] Launching FMC @ 0x40000130
20,321,779 UART:
20,322,053 UART: Running Caliptra FMC ...
20,323,167 UART:
20,323,334 UART: [state] CFI Enabled
20,331,564 UART: [fht] FMC Alias Private Key: 7
22,088,592 UART: [art] Extend RT PCRs Done
22,089,821 UART: [art] Lock RT PCRs Done
22,091,588 UART: [art] Populate DV Done
22,096,891 UART: [fht] FMC Alias Private Key: 7
22,098,595 UART: [art] Derive CDI
22,099,409 UART: [art] Store in in slot 0x4
22,141,731 UART: [art] Derive Key Pair
22,142,733 UART: [art] Store priv key in slot 0x5
24,569,113 UART: [art] Derive Key Pair - Done
24,582,162 UART: [art] Signing Cert with AUTHO
24,583,461 UART: RITY.KEYID = 7
26,289,015 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,522 UART: [art] PUB.X = 7888130A6104F93B31F6D764EDC83269638B5B43DA03A19F756E76F50861F93C0EBBCE16A1EF7F950F1BF69D87BD994E
26,297,765 UART: [art] PUB.Y = 0E791F5C2E2D89222980E62CD71FC241B35037AE8BBC1E90DE827CCB5DF9E31F3988497BB115608B8A08B906937B37ED
26,305,054 UART: [art] SIG.R = 6E273F3525967EE51D1B51B210D2C6DFA688E65ECCAA8DB24F16EC7A0576AA5F353E8A7346390FE3602DD471BE854421
26,312,468 UART: [art] SIG.S = 588E3A06F65A30AF587891805CF00C8D0D3D2BF85A392899B4B6C08C162378B7A52C3C4E8D8D2F289F712C8B33C980E9
27,291,239 UART: Caliptra RT
27,291,925 UART: [state] CFI Enabled
27,409,735 UART: [rt] RT listening for mailbox commands...
27,412,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,567,125 UART: [rt]cmd =0x41544d4e, len=14344
29,711,306 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,742 writing to cptra_bootfsm_go
3,753,184 ready_for_fw is high
3,753,792 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,057,788 >>> mbox cmd response: success
20,305,772 UART:
20,306,175 UART: Running Caliptra FMC ...
20,307,373 UART:
20,307,545 UART: [state] CFI Enabled
20,315,649 UART: [fht] FMC Alias Private Key: 7
22,071,717 UART: [art] Extend RT PCRs Done
22,072,948 UART: [art] Lock RT PCRs Done
22,074,853 UART: [art] Populate DV Done
22,080,486 UART: [fht] FMC Alias Private Key: 7
22,082,092 UART: [art] Derive CDI
22,082,937 UART: [art] Store in in slot 0x4
22,125,549 UART: [art] Derive Key Pair
22,126,595 UART: [art] Store priv key in slot 0x5
24,553,676 UART: [art] Derive Key Pair - Done
24,566,780 UART: [art] Signing Cert with AUTHO
24,568,082 UART: RITY.KEYID = 7
26,272,974 UART: [art] Erasing AUTHORITY.KEYID = 7
26,274,483 UART: [art] PUB.X = AFE42DFD39CC456A92B788D58D5EAAEFA61AC89F189C1FA65FD6A7C2E7D047A269063C7A636E1A0A2D95949CC3C220FF
26,281,786 UART: [art] PUB.Y = 5D265549A4CAE04FC4C50C7C43C39FF76CFE9CA7DD7A43A26968631CCDBE3FFC7DFE1E5F0164D6E10B0224408118CF23
26,289,040 UART: [art] SIG.R = EA1FA6B76CE475E26553FB2833C5B1C5FDCF6BC957485CD5294FEBA9096CB18C80B543327C50A713D88312D335F0545E
26,296,445 UART: [art] SIG.S = 7409115B3320834D68B520A014671A058D55D67CDE928E51ACAE1303B095FCDA048F1EF407C07C3976269510BF7C4B50
27,275,105 UART: Caliptra RT
27,275,810 UART: [state] CFI Enabled
27,392,029 UART: [rt] RT listening for mailbox commands...
27,394,350 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,549,701 UART: [rt]cmd =0x41544d4e, len=14344
29,693,872 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,723 UART: [kat] SHA2-256
881,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,769 UART: [kat] ++
885,921 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
894,828 UART: [kat] SHA2-512-ACC
896,729 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,930 UART: [kat] LMS
1,475,126 UART: [kat] --
1,475,947 UART: [cold-reset] ++
1,476,483 UART: [fht] Storing FHT @ 0x50003400
1,479,144 UART: [idev] ++
1,479,312 UART: [idev] CDI.KEYID = 6
1,479,672 UART: [idev] SUBJECT.KEYID = 7
1,480,096 UART: [idev] UDS.KEYID = 0
1,480,441 ready_for_fw is high
1,480,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,200 UART: [idev] Erasing UDS.KEYID = 0
1,505,122 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,650 UART: [idev] --
1,514,745 UART: [ldev] ++
1,514,913 UART: [ldev] CDI.KEYID = 6
1,515,276 UART: [ldev] SUBJECT.KEYID = 5
1,515,702 UART: [ldev] AUTHORITY.KEYID = 7
1,516,165 UART: [ldev] FE.KEYID = 1
1,521,349 UART: [ldev] Erasing FE.KEYID = 1
1,546,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,272 UART: [ldev] --
1,585,787 UART: [fwproc] Waiting for Commands...
1,586,472 UART: [fwproc] Received command 0x46574c44
1,587,263 UART: [fwproc] Received Image of size 114168 bytes
5,118,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,146,960 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,176,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,311,997 >>> mbox cmd response: success
5,313,061 UART: [afmc] ++
5,313,229 UART: [afmc] CDI.KEYID = 6
5,313,591 UART: [afmc] SUBJECT.KEYID = 7
5,314,016 UART: [afmc] AUTHORITY.KEYID = 5
5,348,872 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,365,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,365,826 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,371,535 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,377,427 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,383,128 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,390,886 UART: [afmc] --
5,391,828 UART: [cold-reset] --
5,392,688 UART: [state] Locking Datavault
5,393,883 UART: [state] Locking PCR0, PCR1 and PCR31
5,394,487 UART: [state] Locking ICCM
5,394,921 UART: [exit] Launching FMC @ 0x40000130
5,400,250 UART:
5,400,266 UART: Running Caliptra FMC ...
5,400,674 UART:
5,400,728 UART: [state] CFI Enabled
5,411,260 UART: [fht] FMC Alias Private Key: 7
5,519,336 UART: [art] Extend RT PCRs Done
5,519,764 UART: [art] Lock RT PCRs Done
5,521,490 UART: [art] Populate DV Done
5,529,498 UART: [fht] FMC Alias Private Key: 7
5,530,606 UART: [art] Derive CDI
5,530,886 UART: [art] Store in in slot 0x4
5,616,223 UART: [art] Derive Key Pair
5,616,583 UART: [art] Store priv key in slot 0x5
5,629,713 UART: [art] Derive Key Pair - Done
5,644,617 UART: [art] Signing Cert with AUTHO
5,645,097 UART: RITY.KEYID = 7
5,660,571 UART: [art] Erasing AUTHORITY.KEYID = 7
5,661,336 UART: [art] PUB.X = 76B39D908BCF1A59850C722F0B4DE8A5B08117FBFDADD310DEE787D2E97865F34EA20CDD0619232D4673FAD130B98314
5,668,104 UART: [art] PUB.Y = AAC67B0536BF0FE1A8D63DD71EB332ED40C4D84069808A2CA8DAFAE534E3AE9AEBC1FDDA2CC0F8CED1C444413CFD0F95
5,675,079 UART: [art] SIG.R = EF40A4A1BE7C5812DDA9156F0A867CD82625C671245D828AD855883FD8EB96048A10DF29A224EF98D866BA5D5C38C1BC
5,681,853 UART: [art] SIG.S = B7476352DC2C254AAF7F0E83862D84E91C62BDDE8F5400E2BD85AB400925AB037FF6EBEE8059EAE5784FA2EC3299C15F
5,704,867 UART: Caliptra RT
5,705,120 UART: [state] CFI Enabled
5,812,194 UART: [rt] RT listening for mailbox commands...
5,812,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,935,892 UART: [rt]cmd =0x41544d4e, len=14344
6,224,317 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,843 ready_for_fw is high
1,361,843 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,047,632 >>> mbox cmd response: success
5,108,977 UART:
5,108,993 UART: Running Caliptra FMC ...
5,109,401 UART:
5,109,455 UART: [state] CFI Enabled
5,119,587 UART: [fht] FMC Alias Private Key: 7
5,226,949 UART: [art] Extend RT PCRs Done
5,227,377 UART: [art] Lock RT PCRs Done
5,228,741 UART: [art] Populate DV Done
5,236,771 UART: [fht] FMC Alias Private Key: 7
5,237,779 UART: [art] Derive CDI
5,238,059 UART: [art] Store in in slot 0x4
5,323,732 UART: [art] Derive Key Pair
5,324,092 UART: [art] Store priv key in slot 0x5
5,337,256 UART: [art] Derive Key Pair - Done
5,352,026 UART: [art] Signing Cert with AUTHO
5,352,506 UART: RITY.KEYID = 7
5,367,808 UART: [art] Erasing AUTHORITY.KEYID = 7
5,368,573 UART: [art] PUB.X = 9ECE33B6EF887DBC88BEBC4520A90C6939D10EE4F08DCF73BB4987CE9C6E6CF410A50FE3C9445B3B8821BA030CFF77FE
5,375,352 UART: [art] PUB.Y = 7E95CB4B4FDE65FC189A43B44444A8522DC13955F09CDE33F4DDC4D227F8ADE5E8C472C171B3552C251BDAFE7B4A64EB
5,382,322 UART: [art] SIG.R = F7943C1A219A36FF353953BA9123D66D7B4BF8D401C7EF0FDD23861FBA601912FCF9D8E6B386A172F1202CDBECFB8D28
5,389,102 UART: [art] SIG.S = D52FB71986F8288106690A3D05EF758B1F612E5E9D679A4CB9508145604354B7FC09E3DEDEE290C700F87B4E15042DA7
5,412,524 UART: Caliptra RT
5,412,777 UART: [state] CFI Enabled
5,520,279 UART: [rt] RT listening for mailbox commands...
5,520,949 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,644,069 UART: [rt]cmd =0x41544d4e, len=14344
5,927,376 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,084 UART: [kat] SHA2-256
882,015 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,130 UART: [kat] ++
886,282 UART: [kat] sha1
890,372 UART: [kat] SHA2-256
892,310 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,813 UART: [kat] LMS
1,476,009 UART: [kat] --
1,477,070 UART: [cold-reset] ++
1,477,522 UART: [fht] Storing FHT @ 0x50003400
1,480,269 UART: [idev] ++
1,480,437 UART: [idev] CDI.KEYID = 6
1,480,797 UART: [idev] SUBJECT.KEYID = 7
1,481,221 UART: [idev] UDS.KEYID = 0
1,481,566 ready_for_fw is high
1,481,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,531 UART: [idev] Erasing UDS.KEYID = 0
1,506,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,363 UART: [idev] --
1,516,528 UART: [ldev] ++
1,516,696 UART: [ldev] CDI.KEYID = 6
1,517,059 UART: [ldev] SUBJECT.KEYID = 5
1,517,485 UART: [ldev] AUTHORITY.KEYID = 7
1,517,948 UART: [ldev] FE.KEYID = 1
1,523,214 UART: [ldev] Erasing FE.KEYID = 1
1,548,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,177 UART: [ldev] --
1,587,470 UART: [fwproc] Waiting for Commands...
1,588,223 UART: [fwproc] Received command 0x46574c44
1,589,014 UART: [fwproc] Received Image of size 114168 bytes
5,082,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,110,676 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,140,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,275,773 >>> mbox cmd response: success
5,276,885 UART: [afmc] ++
5,277,053 UART: [afmc] CDI.KEYID = 6
5,277,415 UART: [afmc] SUBJECT.KEYID = 7
5,277,840 UART: [afmc] AUTHORITY.KEYID = 5
5,312,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,328,550 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,329,330 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,335,039 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,340,931 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,632 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,354,554 UART: [afmc] --
5,355,640 UART: [cold-reset] --
5,356,680 UART: [state] Locking Datavault
5,357,909 UART: [state] Locking PCR0, PCR1 and PCR31
5,358,513 UART: [state] Locking ICCM
5,358,955 UART: [exit] Launching FMC @ 0x40000130
5,364,284 UART:
5,364,300 UART: Running Caliptra FMC ...
5,364,708 UART:
5,364,851 UART: [state] CFI Enabled
5,375,617 UART: [fht] FMC Alias Private Key: 7
5,482,823 UART: [art] Extend RT PCRs Done
5,483,251 UART: [art] Lock RT PCRs Done
5,484,755 UART: [art] Populate DV Done
5,492,929 UART: [fht] FMC Alias Private Key: 7
5,494,077 UART: [art] Derive CDI
5,494,357 UART: [art] Store in in slot 0x4
5,579,796 UART: [art] Derive Key Pair
5,580,156 UART: [art] Store priv key in slot 0x5
5,593,392 UART: [art] Derive Key Pair - Done
5,607,971 UART: [art] Signing Cert with AUTHO
5,608,451 UART: RITY.KEYID = 7
5,623,917 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,682 UART: [art] PUB.X = 006348789239FE10581948A7A31E929CE7F1A172714FC9F0178FAE2B2899C0FBD51423955BBD9985E3FFC364358A5C24
5,631,426 UART: [art] PUB.Y = A03B3CB999E005A17B4CEA67B6FAB939C8CE939B34350CF51A70F672C427052964633AACF0FC4A0FB2B818B3C592BD2B
5,638,378 UART: [art] SIG.R = 362D0BB8D81A06AEA5F1B1D0F128B7065F5D1E2915F04390AFF4F691C47A3A65CE4A04F91F8BF9B8F0CB911A0ED9790A
5,645,146 UART: [art] SIG.S = 5834828380B95B7A1CA78875992C51C8045E2E487BFE12F837F5B4BF45F00CD6E416C5446E8EC20BAC98BFE7C9CAAA5B
5,668,934 UART: Caliptra RT
5,669,279 UART: [state] CFI Enabled
5,777,781 UART: [rt] RT listening for mailbox commands...
5,778,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,901,365 UART: [rt]cmd =0x41544d4e, len=14344
6,192,025 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,237,324 >>> mbox cmd response: success
5,298,865 UART:
5,298,881 UART: Running Caliptra FMC ...
5,299,289 UART:
5,299,432 UART: [state] CFI Enabled
5,310,162 UART: [fht] FMC Alias Private Key: 7
5,418,496 UART: [art] Extend RT PCRs Done
5,418,924 UART: [art] Lock RT PCRs Done
5,420,344 UART: [art] Populate DV Done
5,428,464 UART: [fht] FMC Alias Private Key: 7
5,429,516 UART: [art] Derive CDI
5,429,796 UART: [art] Store in in slot 0x4
5,514,949 UART: [art] Derive Key Pair
5,515,309 UART: [art] Store priv key in slot 0x5
5,528,655 UART: [art] Derive Key Pair - Done
5,543,221 UART: [art] Signing Cert with AUTHO
5,543,701 UART: RITY.KEYID = 7
5,559,237 UART: [art] Erasing AUTHORITY.KEYID = 7
5,560,002 UART: [art] PUB.X = 33634CB59C38BF3FBCC77CC7CF273C90353824BC951AFC6B50E49503E03739DCC9589C9E0E647AC260C7C998A56694A1
5,566,772 UART: [art] PUB.Y = 6A55B5BCD729C1B271812C139A98EB9EB1BCD58F9C27BA1BFDF353A91F1E1A4375B69713A8A438BE53A1FC694029633A
5,573,734 UART: [art] SIG.R = A58B0A18345232139126BFA18351031BD3B4E7B2B89441807CADE9873F5DA61258F2A9EF896C8686D3BC91CFF2BECAB5
5,580,506 UART: [art] SIG.S = 9A0D5DBC035E9C945AAADF460FAE7AB206B63F4128FDE6C3CDDD3F6999E9F891ABB5346FAE4013EBA1F3C13282D67F17
5,604,697 UART: Caliptra RT
5,605,042 UART: [state] CFI Enabled
5,713,858 UART: [rt] RT listening for mailbox commands...
5,714,528 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,694 UART: [rt]cmd =0x41544d4e, len=14344
6,128,308 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
893,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,829 UART: [kat] ++
897,981 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,854 UART: [kat] SHA2-512-ACC
908,755 UART: [kat] ECC-384
918,454 UART: [kat] HMAC-384Kdf
922,916 UART: [kat] LMS
1,171,244 UART: [kat] --
1,171,747 UART: [cold-reset] ++
1,172,297 UART: [fht] FHT @ 0x50003400
1,174,950 UART: [idev] ++
1,175,118 UART: [idev] CDI.KEYID = 6
1,175,478 UART: [idev] SUBJECT.KEYID = 7
1,175,902 UART: [idev] UDS.KEYID = 0
1,176,247 ready_for_fw is high
1,176,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,830 UART: [idev] Erasing UDS.KEYID = 0
1,200,213 UART: [idev] Sha1 KeyId Algorithm
1,208,651 UART: [idev] --
1,209,767 UART: [ldev] ++
1,209,935 UART: [ldev] CDI.KEYID = 6
1,210,298 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,385 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,365 UART: [ldev] --
1,281,756 UART: [fwproc] Wait for Commands...
1,282,502 UART: [fwproc] Recv command 0x46574c44
1,283,230 UART: [fwproc] Recv'd Img size: 114168 bytes
3,115,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,777 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,173,081 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,308,608 >>> mbox cmd response: success
3,309,670 UART: [afmc] ++
3,309,838 UART: [afmc] CDI.KEYID = 6
3,310,200 UART: [afmc] SUBJECT.KEYID = 7
3,310,625 UART: [afmc] AUTHORITY.KEYID = 5
3,346,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,634 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,382 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,369,091 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,983 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,694 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,705 UART: [afmc] --
3,389,599 UART: [cold-reset] --
3,390,189 UART: [state] Locking Datavault
3,391,488 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,092 UART: [state] Locking ICCM
3,392,742 UART: [exit] Launching FMC @ 0x40000130
3,398,071 UART:
3,398,087 UART: Running Caliptra FMC ...
3,398,495 UART:
3,398,549 UART: [state] CFI Enabled
3,408,785 UART: [fht] FMC Alias Private Key: 7
3,516,063 UART: [art] Extend RT PCRs Done
3,516,491 UART: [art] Lock RT PCRs Done
3,518,265 UART: [art] Populate DV Done
3,526,719 UART: [fht] FMC Alias Private Key: 7
3,527,703 UART: [art] Derive CDI
3,527,983 UART: [art] Store in in slot 0x4
3,613,734 UART: [art] Derive Key Pair
3,614,094 UART: [art] Store priv key in slot 0x5
3,627,324 UART: [art] Derive Key Pair - Done
3,641,919 UART: [art] Signing Cert with AUTHO
3,642,399 UART: RITY.KEYID = 7
3,657,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,608 UART: [art] PUB.X = 4BE422D8960064BB312CE3D3DD73D1538A286C16D543FB8E5E043B4189FB003A1D99A121346FA5227D5FE9D66E6F24AC
3,665,337 UART: [art] PUB.Y = 4F53863DD21E14A6AD8B7B037BB131E85BA69463A03BFEB51051D3C5E0676B538AEE84555922970EC8934387ED9B2B29
3,672,283 UART: [art] SIG.R = A05E211E09058C1797CCD18E75D9E103779A67BD9DFB6204BDC4553C5A402D5738DDD7AECE63E50416BFDEBF882FC8FA
3,679,056 UART: [art] SIG.S = 94F21C6F666D7E78BB383C905817A6F33DC852EC5D2F32A27301C3C2535183A9B835F7AAEDA706D9052F79DCAE6EA6F5
3,702,610 UART: Caliptra RT
3,702,863 UART: [state] CFI Enabled
3,809,978 UART: [rt] RT listening for mailbox commands...
3,810,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,866 UART: [rt]cmd =0x41544d4e, len=14344
4,219,822 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,761 ready_for_fw is high
1,060,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,180,224 >>> mbox cmd response: success
3,243,339 UART:
3,243,355 UART: Running Caliptra FMC ...
3,243,763 UART:
3,243,817 UART: [state] CFI Enabled
3,254,485 UART: [fht] FMC Alias Private Key: 7
3,362,911 UART: [art] Extend RT PCRs Done
3,363,339 UART: [art] Lock RT PCRs Done
3,365,011 UART: [art] Populate DV Done
3,373,279 UART: [fht] FMC Alias Private Key: 7
3,374,267 UART: [art] Derive CDI
3,374,547 UART: [art] Store in in slot 0x4
3,459,838 UART: [art] Derive Key Pair
3,460,198 UART: [art] Store priv key in slot 0x5
3,473,364 UART: [art] Derive Key Pair - Done
3,488,353 UART: [art] Signing Cert with AUTHO
3,488,833 UART: RITY.KEYID = 7
3,503,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,714 UART: [art] PUB.X = 28A8BE3BF58A84F43964130F13B08B8BB49BD9129389EDD7E86E86804F83E9F046E61285887A0C814AB941A728DFB511
3,511,478 UART: [art] PUB.Y = 9E09AAED4A8054B060AD04C2283F43969BB45B3CD0236E5F7899908ADCC9C0EA3AF38829D465EAA0661E6D689EAC4187
3,518,432 UART: [art] SIG.R = 3EFDDCE065E4BBADF70400A05D0A9146C631284CEAC29ABBA6F59C612EF30F3B2F9C1E31005B33B347D1C34DABCC6BCB
3,525,177 UART: [art] SIG.S = 6490DC0B6657EA6D3F04511B84B23F0825AB1B93A5EF6FA9F25BAB6C5E3AF1447F270585E3676E57FB54C86F9E23FC4D
3,548,970 UART: Caliptra RT
3,549,223 UART: [state] CFI Enabled
3,657,814 UART: [rt] RT listening for mailbox commands...
3,658,484 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,781,304 UART: [rt]cmd =0x41544d4e, len=14344
4,065,023 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
893,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,936 UART: [kat] ++
898,088 UART: [kat] sha1
902,386 UART: [kat] SHA2-256
904,326 UART: [kat] SHA2-384
906,911 UART: [kat] SHA2-512-ACC
908,812 UART: [kat] ECC-384
918,687 UART: [kat] HMAC-384Kdf
923,475 UART: [kat] LMS
1,171,803 UART: [kat] --
1,172,586 UART: [cold-reset] ++
1,173,102 UART: [fht] FHT @ 0x50003400
1,175,861 UART: [idev] ++
1,176,029 UART: [idev] CDI.KEYID = 6
1,176,389 UART: [idev] SUBJECT.KEYID = 7
1,176,813 UART: [idev] UDS.KEYID = 0
1,177,158 ready_for_fw is high
1,177,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,202,170 UART: [idev] Sha1 KeyId Algorithm
1,210,504 UART: [idev] --
1,211,570 UART: [ldev] ++
1,211,738 UART: [ldev] CDI.KEYID = 6
1,212,101 UART: [ldev] SUBJECT.KEYID = 5
1,212,527 UART: [ldev] AUTHORITY.KEYID = 7
1,212,990 UART: [ldev] FE.KEYID = 1
1,218,348 UART: [ldev] Erasing FE.KEYID = 1
1,245,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,274 UART: [ldev] --
1,284,735 UART: [fwproc] Wait for Commands...
1,285,471 UART: [fwproc] Recv command 0x46574c44
1,286,199 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,059 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,313,884 >>> mbox cmd response: success
3,315,128 UART: [afmc] ++
3,315,296 UART: [afmc] CDI.KEYID = 6
3,315,658 UART: [afmc] SUBJECT.KEYID = 7
3,316,083 UART: [afmc] AUTHORITY.KEYID = 5
3,351,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,718 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,427 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,319 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,030 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,791 UART: [afmc] --
3,394,747 UART: [cold-reset] --
3,395,491 UART: [state] Locking Datavault
3,396,536 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,140 UART: [state] Locking ICCM
3,397,564 UART: [exit] Launching FMC @ 0x40000130
3,402,893 UART:
3,402,909 UART: Running Caliptra FMC ...
3,403,317 UART:
3,403,460 UART: [state] CFI Enabled
3,414,014 UART: [fht] FMC Alias Private Key: 7
3,521,796 UART: [art] Extend RT PCRs Done
3,522,224 UART: [art] Lock RT PCRs Done
3,523,858 UART: [art] Populate DV Done
3,531,998 UART: [fht] FMC Alias Private Key: 7
3,533,150 UART: [art] Derive CDI
3,533,430 UART: [art] Store in in slot 0x4
3,618,595 UART: [art] Derive Key Pair
3,618,955 UART: [art] Store priv key in slot 0x5
3,631,967 UART: [art] Derive Key Pair - Done
3,646,847 UART: [art] Signing Cert with AUTHO
3,647,327 UART: RITY.KEYID = 7
3,662,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,662,992 UART: [art] PUB.X = 8400D7A4DA61FD096EE6D6C4A90EC59AD8EDA84AE54B4D591EE0E922829CCE651F24BFCFFF6CC56DAB21C6A3CBAF2320
3,669,764 UART: [art] PUB.Y = 06C0AD7D2E076127B8B61759BBD61C76C638AFC89D61092F2568C5C4224E58229694008FB76F8C8E9A681E43CDDCA3A8
3,676,687 UART: [art] SIG.R = 10E551CE9011A60B4BF0900CF1D8773064F062062195A995D68501137C35D83540053D6721F3E2AA1943B58A43E96F19
3,683,428 UART: [art] SIG.S = 1805051610A2CEE989FB30667136A30B23428B99FF5D4612ED02E51B034893E896B3F7920BABA2C1951D3D39680BA5A8
3,707,706 UART: Caliptra RT
3,708,051 UART: [state] CFI Enabled
3,816,526 UART: [rt] RT listening for mailbox commands...
3,817,196 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,072 UART: [rt]cmd =0x41544d4e, len=14344
4,230,722 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,882 ready_for_fw is high
1,059,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,277 >>> mbox cmd response: success
3,225,438 UART:
3,225,454 UART: Running Caliptra FMC ...
3,225,862 UART:
3,226,005 UART: [state] CFI Enabled
3,236,589 UART: [fht] FMC Alias Private Key: 7
3,344,205 UART: [art] Extend RT PCRs Done
3,344,633 UART: [art] Lock RT PCRs Done
3,346,027 UART: [art] Populate DV Done
3,354,343 UART: [fht] FMC Alias Private Key: 7
3,355,329 UART: [art] Derive CDI
3,355,609 UART: [art] Store in in slot 0x4
3,441,152 UART: [art] Derive Key Pair
3,441,512 UART: [art] Store priv key in slot 0x5
3,455,234 UART: [art] Derive Key Pair - Done
3,470,008 UART: [art] Signing Cert with AUTHO
3,470,488 UART: RITY.KEYID = 7
3,485,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,571 UART: [art] PUB.X = CBBB310B55AE399EF1E53BD2E5D38F74F015A94B857594DFD2C4D1B4E1F26D6A22E4FAC72A4FE8EB47D06DBC0550D276
3,493,357 UART: [art] PUB.Y = 48B4ADA5F5C25F0B67E58D95E8A9F1EFA57691349F5D0E06046A175EFB0ABD710B7A0828F42C84B9B0570CDF30EEF00E
3,500,296 UART: [art] SIG.R = 397CF367144E5DDD656788A674554A11108C275C3A7C1DDF663CC257FFD015A5DDE753517ACFB4503089C6D6E6B9212F
3,507,070 UART: [art] SIG.S = 6F525E3BF0EA5FE7DA7ADC533C668978D9DDC5F7AD2910472759F79D9766962A1FEF7C54F625FFE17B3F4ACB595BD503
3,530,754 UART: Caliptra RT
3,531,099 UART: [state] CFI Enabled
3,639,684 UART: [rt] RT listening for mailbox commands...
3,640,354 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,550 UART: [rt]cmd =0x41544d4e, len=14344
4,046,641 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,249 UART: [kat] ++
895,401 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 ready_for_fw is high
1,174,711 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,199,745 UART: [idev] Sha1 KeyId Algorithm
1,208,645 UART: [idev] --
1,209,904 UART: [ldev] ++
1,210,072 UART: [ldev] CDI.KEYID = 6
1,210,436 UART: [ldev] SUBJECT.KEYID = 5
1,210,863 UART: [ldev] AUTHORITY.KEYID = 7
1,211,326 UART: [ldev] FE.KEYID = 1
1,216,566 UART: [ldev] Erasing FE.KEYID = 1
1,243,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,882 UART: [ldev] --
1,282,178 UART: [fwproc] Wait for Commands...
1,282,899 UART: [fwproc] Recv command 0x46574c44
1,283,632 UART: [fwproc] Recv'd Img size: 114168 bytes
3,130,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,186,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,322,475 >>> mbox cmd response: success
3,323,668 UART: [afmc] ++
3,323,836 UART: [afmc] CDI.KEYID = 6
3,324,199 UART: [afmc] SUBJECT.KEYID = 7
3,324,625 UART: [afmc] AUTHORITY.KEYID = 5
3,359,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,864 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,574 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,464 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,175 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,989 UART: [afmc] --
3,402,933 UART: [cold-reset] --
3,403,765 UART: [state] Locking Datavault
3,405,058 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,662 UART: [state] Locking ICCM
3,406,104 UART: [exit] Launching FMC @ 0x40000130
3,411,433 UART:
3,411,449 UART: Running Caliptra FMC ...
3,411,857 UART:
3,411,911 UART: [state] CFI Enabled
3,422,553 UART: [fht] FMC Alias Private Key: 7
3,530,493 UART: [art] Extend RT PCRs Done
3,530,921 UART: [art] Lock RT PCRs Done
3,532,391 UART: [art] Populate DV Done
3,540,619 UART: [fht] FMC Alias Private Key: 7
3,541,665 UART: [art] Derive CDI
3,541,945 UART: [art] Store in in slot 0x4
3,627,374 UART: [art] Derive Key Pair
3,627,734 UART: [art] Store priv key in slot 0x5
3,641,262 UART: [art] Derive Key Pair - Done
3,656,416 UART: [art] Signing Cert with AUTHO
3,656,896 UART: RITY.KEYID = 7
3,672,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,777 UART: [art] PUB.X = C5A1EEBABEFA0D33EAD21972C0E6B389F8C7969F0AE217E3B134EC1219BA725747A54B7D2CAF00D8DAACB2B03E204414
3,679,541 UART: [art] PUB.Y = D19D5BF17E6D4DF70B63B7271266DE98C5EBCE691F723804F02696D655DD0C44675C631E561AF1EAAE0F25D594933DE1
3,686,487 UART: [art] SIG.R = CEB2A43DFF3505D1A2567BEBF90E2CBFB090B0632241E714D54F03DB103626B2536EBEDFC5DF632A76B9466AA4E00FF3
3,693,263 UART: [art] SIG.S = 4C5602FB301214D79057D56C11165BD6AD0B63A97ADA7759B5945FAAE7DFAC3769019717AF33A9F73EA9B0532C6E78C8
3,717,313 UART: Caliptra RT
3,717,566 UART: [state] CFI Enabled
3,824,324 UART: [rt] RT listening for mailbox commands...
3,824,994 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,142 UART: [rt]cmd =0x41544d4e, len=14344
4,240,549 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,424 ready_for_fw is high
1,055,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,168,486 >>> mbox cmd response: success
3,230,027 UART:
3,230,043 UART: Running Caliptra FMC ...
3,230,451 UART:
3,230,505 UART: [state] CFI Enabled
3,241,349 UART: [fht] FMC Alias Private Key: 7
3,349,431 UART: [art] Extend RT PCRs Done
3,349,859 UART: [art] Lock RT PCRs Done
3,351,513 UART: [art] Populate DV Done
3,359,967 UART: [fht] FMC Alias Private Key: 7
3,360,947 UART: [art] Derive CDI
3,361,227 UART: [art] Store in in slot 0x4
3,446,874 UART: [art] Derive Key Pair
3,447,234 UART: [art] Store priv key in slot 0x5
3,460,352 UART: [art] Derive Key Pair - Done
3,475,643 UART: [art] Signing Cert with AUTHO
3,476,123 UART: RITY.KEYID = 7
3,490,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,476 UART: [art] PUB.X = 57C35A1E60C78E67ED8ABC3E923E4C548BB43933E5C1293ED1A844C10798E893082441835C380C798F1A7ACCC94CA05A
3,498,241 UART: [art] PUB.Y = D68261B8594D999A622784428B0B92BDEFECED3FE5E89D111634637053C62F979F944B9726F5783D0159F0CDF9916EAA
3,505,185 UART: [art] SIG.R = E34C722FA9D3F3F8A69E93189638147EAD678A7C0F6116CB5051E62B47C56ECC1E3B7E160552569D950BE015A96EDFB6
3,511,952 UART: [art] SIG.S = 9A5AFC6A794228C393E70364F479C37EFD55E33C19BD75583F965231201011DFB2D0F2CC2236CF50FA28358E66F1871C
3,535,402 UART: Caliptra RT
3,535,655 UART: [state] CFI Enabled
3,644,132 UART: [rt] RT listening for mailbox commands...
3,644,802 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,874 UART: [rt]cmd =0x41544d4e, len=14344
4,058,322 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,355 UART: [kat] HMAC-384Kdf
920,965 UART: [kat] LMS
1,169,277 UART: [kat] --
1,170,076 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,174,422 ready_for_fw is high
1,174,422 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,650 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,141 UART: [ldev] SUBJECT.KEYID = 5
1,210,568 UART: [ldev] AUTHORITY.KEYID = 7
1,211,031 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,595 UART: [ldev] --
1,282,059 UART: [fwproc] Wait for Commands...
1,282,736 UART: [fwproc] Recv command 0x46574c44
1,283,469 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,273 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,314,102 >>> mbox cmd response: success
3,315,179 UART: [afmc] ++
3,315,347 UART: [afmc] CDI.KEYID = 6
3,315,710 UART: [afmc] SUBJECT.KEYID = 7
3,316,136 UART: [afmc] AUTHORITY.KEYID = 5
3,352,020 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,595 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,305 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,195 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,906 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,834 UART: [afmc] --
3,395,814 UART: [cold-reset] --
3,396,722 UART: [state] Locking Datavault
3,397,829 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,433 UART: [state] Locking ICCM
3,398,979 UART: [exit] Launching FMC @ 0x40000130
3,404,308 UART:
3,404,324 UART: Running Caliptra FMC ...
3,404,732 UART:
3,404,875 UART: [state] CFI Enabled
3,415,345 UART: [fht] FMC Alias Private Key: 7
3,523,031 UART: [art] Extend RT PCRs Done
3,523,459 UART: [art] Lock RT PCRs Done
3,525,133 UART: [art] Populate DV Done
3,533,439 UART: [fht] FMC Alias Private Key: 7
3,534,509 UART: [art] Derive CDI
3,534,789 UART: [art] Store in in slot 0x4
3,620,164 UART: [art] Derive Key Pair
3,620,524 UART: [art] Store priv key in slot 0x5
3,633,802 UART: [art] Derive Key Pair - Done
3,648,561 UART: [art] Signing Cert with AUTHO
3,649,041 UART: RITY.KEYID = 7
3,664,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,956 UART: [art] PUB.X = D98C76EEBD474B3FCE9A766E3A4547D88E3EF9C78752ADD477347B15EFD039FDDE06BB5740504A881A51A94D65416120
3,671,731 UART: [art] PUB.Y = DAA395E9821EABC0598E42D4120F5E9AC77D9D83D389CFF3462939AA978393460FBA35EADB27ED1C5400DE9B185E4920
3,678,663 UART: [art] SIG.R = 11E9ACB16ABD4C40403CBC29D71388D3458A2F1FE860DDB50378623052D0794462173505D91E7C86836E75D4DE297529
3,685,421 UART: [art] SIG.S = 2E3B20FEFE7FA88049CCB3CBBDB37426A3DF752D0721753F6D44FB6969117267EE6A0A7C91F336AEA90E403C826EC66C
3,709,285 UART: Caliptra RT
3,709,630 UART: [state] CFI Enabled
3,817,349 UART: [rt] RT listening for mailbox commands...
3,818,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,181 UART: [rt]cmd =0x41544d4e, len=14344
4,234,234 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,517 ready_for_fw is high
1,056,517 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,166,369 >>> mbox cmd response: success
3,228,714 UART:
3,228,730 UART: Running Caliptra FMC ...
3,229,138 UART:
3,229,281 UART: [state] CFI Enabled
3,239,775 UART: [fht] FMC Alias Private Key: 7
3,347,765 UART: [art] Extend RT PCRs Done
3,348,193 UART: [art] Lock RT PCRs Done
3,349,941 UART: [art] Populate DV Done
3,358,339 UART: [fht] FMC Alias Private Key: 7
3,359,345 UART: [art] Derive CDI
3,359,625 UART: [art] Store in in slot 0x4
3,445,376 UART: [art] Derive Key Pair
3,445,736 UART: [art] Store priv key in slot 0x5
3,458,316 UART: [art] Derive Key Pair - Done
3,473,068 UART: [art] Signing Cert with AUTHO
3,473,548 UART: RITY.KEYID = 7
3,488,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,197 UART: [art] PUB.X = 1989CE278E486324D0B060D4838FDEA3ECE0A32307BF9F257C3DB08C4FC0820AF5CE22897ADC53CA4FE4230F02071FC7
3,495,964 UART: [art] PUB.Y = C870A982484DA9E89C0F4D29031B891BE31083627E87424C5079EF6816CEAEB84135D42A50F6B742E7CA114DD905C47F
3,502,905 UART: [art] SIG.R = B4A1211D70CB6B43F2DB5C6F3F167A14C2F52CB811B95CD64DCDDB1C4DB4E792A444777E0FE3B9D94DB5A2AA239A9611
3,509,692 UART: [art] SIG.S = C04D3CD373C9066F838D5D0C37F32D4AED72E4F0F612E97F85376F6A772013D7E848CA0D9B4A3510D514179C596A1A2F
3,533,236 UART: Caliptra RT
3,533,581 UART: [state] CFI Enabled
3,641,796 UART: [rt] RT listening for mailbox commands...
3,642,466 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,406 UART: [rt]cmd =0x41544d4e, len=14344
4,058,321 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,155 UART:
192,534 UART: Running Caliptra ROM ...
193,663 UART:
193,803 UART: [state] CFI Enabled
266,595 UART: [state] LifecycleState = Unprovisioned
268,509 UART: [state] DebugLocked = No
270,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,095 UART: [kat] SHA2-256
444,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,339 UART: [kat] ++
455,786 UART: [kat] sha1
467,469 UART: [kat] SHA2-256
470,187 UART: [kat] SHA2-384
474,605 UART: [kat] SHA2-512-ACC
476,963 UART: [kat] ECC-384
2,767,801 UART: [kat] HMAC-384Kdf
2,778,327 UART: [kat] LMS
3,968,625 UART: [kat] --
3,973,624 UART: [cold-reset] ++
3,976,117 UART: [fht] Storing FHT @ 0x50003400
3,987,241 UART: [idev] ++
3,987,864 UART: [idev] CDI.KEYID = 6
3,988,739 UART: [idev] SUBJECT.KEYID = 7
3,990,041 UART: [idev] UDS.KEYID = 0
3,991,029 ready_for_fw is high
3,991,224 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,393 UART: [idev] Erasing UDS.KEYID = 0
7,324,715 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,349 UART: [idev] --
7,348,584 UART: [ldev] ++
7,349,147 UART: [ldev] CDI.KEYID = 6
7,350,156 UART: [ldev] SUBJECT.KEYID = 5
7,351,302 UART: [ldev] AUTHORITY.KEYID = 7
7,352,597 UART: [ldev] FE.KEYID = 1
7,379,605 UART: [ldev] Erasing FE.KEYID = 1
10,716,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,035 UART: [ldev] --
13,097,683 UART: [fwproc] Waiting for Commands...
13,100,525 UART: [fwproc] Received command 0x46574c44
13,102,707 UART: [fwproc] Received Image of size 113844 bytes
17,156,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,231,525 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,616,016 >>> mbox cmd response: success
17,620,557 UART: [afmc] ++
17,621,168 UART: [afmc] CDI.KEYID = 6
17,622,076 UART: [afmc] SUBJECT.KEYID = 7
17,623,289 UART: [afmc] AUTHORITY.KEYID = 5
20,987,775 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,288,000 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,406 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,264 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,721 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,351,606 UART: [afmc] --
23,356,273 UART: [cold-reset] --
23,360,401 UART: [state] Locking Datavault
23,365,313 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,061 UART: [state] Locking ICCM
23,369,850 UART: [exit] Launching FMC @ 0x40000130
23,378,237 UART:
23,378,490 UART: Running Caliptra FMC ...
23,379,588 UART:
23,379,743 UART: [state] CFI Enabled
23,446,219 UART: [fht] FMC Alias Private Key: 7
25,784,960 UART: [art] Extend RT PCRs Done
25,786,185 UART: [art] Lock RT PCRs Done
25,787,885 UART: [art] Populate DV Done
25,793,412 UART: [fht] FMC Alias Private Key: 7
25,794,946 UART: [art] Derive CDI
25,795,758 UART: [art] Store in in slot 0x4
25,854,507 UART: [art] Derive Key Pair
25,855,559 UART: [art] Store priv key in slot 0x5
29,147,677 UART: [art] Derive Key Pair - Done
29,160,606 UART: [art] Signing Cert with AUTHO
29,161,934 UART: RITY.KEYID = 7
31,449,181 UART: [art] Erasing AUTHORITY.KEYID = 7
31,450,703 UART: [art] PUB.X = A58E9A7C734854BE08FE9269BE84FFBDBE47FD243D0EE98E570781DFCA1677F8408BF6A790E3D55755DAA739A909EE46
31,457,973 UART: [art] PUB.Y = 2EA2F61DA6E15D0E7325892159B109829A79EE40ED3F8824996B820216DB694594A397EC546D8EDA6B6577DF66E79E5F
31,465,205 UART: [art] SIG.R = 0812A67F1793510286813905BAE900AB93A8225003845D742862FEF5D7A6AC23234286B5DAC6196E8D2DC2663FB96F23
31,472,556 UART: [art] SIG.S = A3C129F612F3A1B24F57628722D7FC36C53AC5F15493AF9A9D4FED028516DA3774871B452E367CF499AE221F21964F65
32,777,283 UART: Caliptra RT
32,777,991 UART: [state] CFI Enabled
32,939,392 UART: [rt] RT listening for mailbox commands...
32,941,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,096,803 UART: [rt]cmd =0x41544d4e, len=14344
38,397,888 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,783,113 ready_for_fw is high
3,783,503 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,866,664 >>> mbox cmd response: success
23,569,143 UART:
23,569,516 UART: Running Caliptra FMC ...
23,570,643 UART:
23,570,799 UART: [state] CFI Enabled
23,637,252 UART: [fht] FMC Alias Private Key: 7
25,975,857 UART: [art] Extend RT PCRs Done
25,977,090 UART: [art] Lock RT PCRs Done
25,978,800 UART: [art] Populate DV Done
25,984,208 UART: [fht] FMC Alias Private Key: 7
25,985,848 UART: [art] Derive CDI
25,986,581 UART: [art] Store in in slot 0x4
26,046,433 UART: [art] Derive Key Pair
26,047,495 UART: [art] Store priv key in slot 0x5
29,340,173 UART: [art] Derive Key Pair - Done
29,353,222 UART: [art] Signing Cert with AUTHO
29,354,530 UART: RITY.KEYID = 7
31,642,655 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,163 UART: [art] PUB.X = 2C3B41AA15226EA9C8002EF40CB082EA936A4334545A4251B98A20DE0D7182A78035E9BE56AA9C58B77E7974799E019C
31,651,405 UART: [art] PUB.Y = D00C3858019588E90E11ED3B47D188655F2C2DBB8A1C77272E3D29B473A6A7A7B9D3BC41C4C8ED188C438E44178DED2D
31,658,621 UART: [art] SIG.R = 03DCA564B71C8C22A03DCDD22973326AA8AF4B041DD3C4D4161F5283AFD6464CDFF0AF06D13189FAAC8E56524FC3E3C7
31,666,075 UART: [art] SIG.S = 168913928D41DD2994CC8E9CE8F9EEBAB5D3B10AB2EE4798A8D7510889A0F785E6DFA3BD8449615092D742D0A8DA9271
32,971,235 UART: Caliptra RT
32,971,943 UART: [state] CFI Enabled
33,132,771 UART: [rt] RT listening for mailbox commands...
33,135,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,290,314 UART: [rt]cmd =0x41544d4e, len=14344
38,590,991 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,565 UART:
192,919 UART: Running Caliptra ROM ...
194,111 UART:
603,803 UART: [state] CFI Enabled
617,832 UART: [state] LifecycleState = Unprovisioned
619,714 UART: [state] DebugLocked = No
621,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,899 UART: [kat] SHA2-256
795,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,179 UART: [kat] ++
806,629 UART: [kat] sha1
818,569 UART: [kat] SHA2-256
821,294 UART: [kat] SHA2-384
825,788 UART: [kat] SHA2-512-ACC
828,157 UART: [kat] ECC-384
3,111,305 UART: [kat] HMAC-384Kdf
3,121,925 UART: [kat] LMS
4,312,055 UART: [kat] --
4,315,423 UART: [cold-reset] ++
4,316,857 UART: [fht] Storing FHT @ 0x50003400
4,328,482 UART: [idev] ++
4,329,115 UART: [idev] CDI.KEYID = 6
4,330,050 UART: [idev] SUBJECT.KEYID = 7
4,331,302 UART: [idev] UDS.KEYID = 0
4,332,378 ready_for_fw is high
4,332,587 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,475,583 UART: [idev] Erasing UDS.KEYID = 0
7,622,537 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,156 UART: [idev] --
7,648,991 UART: [ldev] ++
7,649,563 UART: [ldev] CDI.KEYID = 6
7,650,499 UART: [ldev] SUBJECT.KEYID = 5
7,651,766 UART: [ldev] AUTHORITY.KEYID = 7
7,652,919 UART: [ldev] FE.KEYID = 1
7,667,101 UART: [ldev] Erasing FE.KEYID = 1
10,953,468 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,518 UART: [ldev] --
13,313,596 UART: [fwproc] Waiting for Commands...
13,315,592 UART: [fwproc] Received command 0x46574c44
13,317,778 UART: [fwproc] Received Image of size 113844 bytes
17,370,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,525 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,377 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,839,683 >>> mbox cmd response: success
17,843,684 UART: [afmc] ++
17,844,285 UART: [afmc] CDI.KEYID = 6
17,845,198 UART: [afmc] SUBJECT.KEYID = 7
17,846,415 UART: [afmc] AUTHORITY.KEYID = 5
21,160,804 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,905 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,173 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,590 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,415 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,833 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,523,059 UART: [afmc] --
23,526,931 UART: [cold-reset] --
23,530,747 UART: [state] Locking Datavault
23,536,378 UART: [state] Locking PCR0, PCR1 and PCR31
23,538,127 UART: [state] Locking ICCM
23,540,118 UART: [exit] Launching FMC @ 0x40000130
23,548,515 UART:
23,548,759 UART: Running Caliptra FMC ...
23,549,864 UART:
23,550,026 UART: [state] CFI Enabled
23,557,862 UART: [fht] FMC Alias Private Key: 7
25,888,939 UART: [art] Extend RT PCRs Done
25,890,174 UART: [art] Lock RT PCRs Done
25,891,852 UART: [art] Populate DV Done
25,897,268 UART: [fht] FMC Alias Private Key: 7
25,898,868 UART: [art] Derive CDI
25,899,682 UART: [art] Store in in slot 0x4
25,942,216 UART: [art] Derive Key Pair
25,943,259 UART: [art] Store priv key in slot 0x5
29,184,932 UART: [art] Derive Key Pair - Done
29,197,702 UART: [art] Signing Cert with AUTHO
29,199,037 UART: RITY.KEYID = 7
31,478,524 UART: [art] Erasing AUTHORITY.KEYID = 7
31,480,032 UART: [art] PUB.X = 9CC4E351703B9C4499569B438DE97E50388D8286B0A992A61B001200FC033B5C3F918361209F8F2522A6B17D5DF5893E
31,487,190 UART: [art] PUB.Y = 6241DB639605E40F94B36DAA68CD48D993028EF6AC5918BA9111688498C3579E4DA69819F9DC84AD788A6F1DF42852B7
31,494,490 UART: [art] SIG.R = 3B6BA80626C1A1E4090FF72B9FEE6E6835D0C4385C9ACE705681CB604895DD596D1482003B49E9B2AE5508F4D9BC76B8
31,501,855 UART: [art] SIG.S = 5259F8D35866A307EFE598B8F717C30C5B084435B454967AEEB69D6EBE6A47EE29C7F0C7326FE6077360FE5C51D9C3AC
32,806,626 UART: Caliptra RT
32,807,354 UART: [state] CFI Enabled
32,925,618 UART: [rt] RT listening for mailbox commands...
32,927,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,083,366 UART: [rt]cmd =0x41544d4e, len=14344
38,384,269 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
4,124,426 ready_for_fw is high
4,125,144 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,060,167 >>> mbox cmd response: success
23,700,794 UART:
23,701,227 UART: Running Caliptra FMC ...
23,702,341 UART:
23,702,497 UART: [state] CFI Enabled
23,710,782 UART: [fht] FMC Alias Private Key: 7
26,041,796 UART: [art] Extend RT PCRs Done
26,043,027 UART: [art] Lock RT PCRs Done
26,044,379 UART: [art] Populate DV Done
26,049,692 UART: [fht] FMC Alias Private Key: 7
26,051,236 UART: [art] Derive CDI
26,052,056 UART: [art] Store in in slot 0x4
26,094,724 UART: [art] Derive Key Pair
26,095,792 UART: [art] Store priv key in slot 0x5
29,337,360 UART: [art] Derive Key Pair - Done
29,350,722 UART: [art] Signing Cert with AUTHO
29,352,045 UART: RITY.KEYID = 7
31,631,611 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,130 UART: [art] PUB.X = 8BCE00528DB95EC11E7D7E2050A6EF6B7B7C842CAD290CBD87B2AA9EC7AFD7A15B04FA53AF8692566598DADF43B7919D
31,640,386 UART: [art] PUB.Y = 4FA84B762BAA5D776310B9908A17FD4F3C3E05BDA5D0529C9AD1B08C68590B79E1D09DE22AAFEE1A6983C945FBCEB47C
31,647,652 UART: [art] SIG.R = 78632DED7C39D68542B3DB79129872172FC0385B983050953367A465600FF188E2E4E2CD15164936304A6E43668BD0BB
31,654,999 UART: [art] SIG.S = 700C6BB935F368BAC3B0930EB092969EBDF6601D8E6AC8B0087DA26BB932C43E77D97310C84BE9DAD4B0F61D55878DDA
32,960,941 UART: Caliptra RT
32,961,653 UART: [state] CFI Enabled
33,079,852 UART: [rt] RT listening for mailbox commands...
33,082,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,237,479 UART: [rt]cmd =0x41544d4e, len=14344
38,537,618 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,034 UART:
192,409 UART: Running Caliptra ROM ...
193,621 UART:
193,803 UART: [state] CFI Enabled
267,348 UART: [state] LifecycleState = Unprovisioned
269,214 UART: [state] DebugLocked = No
270,593 UART: [state] WD Timer not started. Device not locked for debugging
274,013 UART: [kat] SHA2-256
453,206 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,736 UART: [kat] ++
465,279 UART: [kat] sha1
475,737 UART: [kat] SHA2-256
478,808 UART: [kat] SHA2-384
484,653 UART: [kat] SHA2-512-ACC
487,657 UART: [kat] ECC-384
2,948,326 UART: [kat] HMAC-384Kdf
2,971,506 UART: [kat] LMS
3,500,983 UART: [kat] --
3,504,690 UART: [cold-reset] ++
3,507,067 UART: [fht] FHT @ 0x50003400
3,517,548 UART: [idev] ++
3,518,113 UART: [idev] CDI.KEYID = 6
3,518,996 UART: [idev] SUBJECT.KEYID = 7
3,520,236 UART: [idev] UDS.KEYID = 0
3,521,136 ready_for_fw is high
3,521,329 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,016 UART: [idev] Erasing UDS.KEYID = 0
6,027,802 UART: [idev] Sha1 KeyId Algorithm
6,050,301 UART: [idev] --
6,052,504 UART: [ldev] ++
6,053,091 UART: [ldev] CDI.KEYID = 6
6,053,986 UART: [ldev] SUBJECT.KEYID = 5
6,055,206 UART: [ldev] AUTHORITY.KEYID = 7
6,056,361 UART: [ldev] FE.KEYID = 1
6,099,708 UART: [ldev] Erasing FE.KEYID = 1
8,607,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,826 UART: [ldev] --
10,412,233 UART: [fwproc] Wait for Commands...
10,414,114 UART: [fwproc] Recv command 0x46574c44
10,416,207 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,887,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,956,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,272,904 >>> mbox cmd response: success
14,277,268 UART: [afmc] ++
14,277,867 UART: [afmc] CDI.KEYID = 6
14,278,750 UART: [afmc] SUBJECT.KEYID = 7
14,279,877 UART: [afmc] AUTHORITY.KEYID = 5
16,809,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,530,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,532,400 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,548,156 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,564,224 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,580,065 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,601,589 UART: [afmc] --
18,605,517 UART: [cold-reset] --
18,609,164 UART: [state] Locking Datavault
18,614,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,616,599 UART: [state] Locking ICCM
18,619,297 UART: [exit] Launching FMC @ 0x40000130
18,627,697 UART:
18,627,941 UART: Running Caliptra FMC ...
18,629,045 UART:
18,629,228 UART: [state] CFI Enabled
18,689,988 UART: [fht] FMC Alias Private Key: 7
20,454,342 UART: [art] Extend RT PCRs Done
20,455,560 UART: [art] Lock RT PCRs Done
20,457,375 UART: [art] Populate DV Done
20,462,520 UART: [fht] FMC Alias Private Key: 7
20,464,001 UART: [art] Derive CDI
20,464,746 UART: [art] Store in in slot 0x4
20,523,566 UART: [art] Derive Key Pair
20,524,606 UART: [art] Store priv key in slot 0x5
22,987,117 UART: [art] Derive Key Pair - Done
23,000,016 UART: [art] Signing Cert with AUTHO
23,001,358 UART: RITY.KEYID = 7
24,713,024 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,522 UART: [art] PUB.X = 8BCEA9FF674EFF85233E71BDB80E1153E5312CD8BE59C269E0976968277FB536D018E70A55DEC00DA8DB66A0E0FB0DD3
24,721,776 UART: [art] PUB.Y = F40B18F60801284496116DC9F076AEEF815C2CDF140B9B7B73A65001091F1C6BD1597AF1313D119C46B72AB6297DC3CD
24,729,092 UART: [art] SIG.R = D65AB1DBA746D805CA0691AA01B57D506EAA2FC7EDDDB25DDE9DCCA10324A90D2FF3171F79D1E09534BCC4CFB4D8A397
24,736,473 UART: [art] SIG.S = C6B5E5BC9851C1CF8AD1FA89031AEE1068063918E485CCC0D8F003A781D22E390A9A27B98C120231FC142085CDF6A013
25,715,208 UART: Caliptra RT
25,715,920 UART: [state] CFI Enabled
25,879,738 UART: [rt] RT listening for mailbox commands...
25,882,230 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,037,681 UART: [rt]cmd =0x41544d4e, len=14344
30,032,925 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,356,761 ready_for_fw is high
3,357,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,026,288 >>> mbox cmd response: success
18,322,569 UART:
18,322,974 UART: Running Caliptra FMC ...
18,324,106 UART:
18,324,269 UART: [state] CFI Enabled
18,392,441 UART: [fht] FMC Alias Private Key: 7
20,156,651 UART: [art] Extend RT PCRs Done
20,157,873 UART: [art] Lock RT PCRs Done
20,159,222 UART: [art] Populate DV Done
20,164,947 UART: [fht] FMC Alias Private Key: 7
20,166,651 UART: [art] Derive CDI
20,167,473 UART: [art] Store in in slot 0x4
20,225,121 UART: [art] Derive Key Pair
20,226,164 UART: [art] Store priv key in slot 0x5
22,689,716 UART: [art] Derive Key Pair - Done
22,702,391 UART: [art] Signing Cert with AUTHO
22,703,700 UART: RITY.KEYID = 7
24,416,306 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,814 UART: [art] PUB.X = 860E555033D88D144E4D74FCB46BB1CB5D2B4DA7C6BEBE457A4A058D94727D71B4A1925D2CA5A647DF4432723B5CA445
24,425,108 UART: [art] PUB.Y = 8AE8CD25DEF5EDF48EADE0D8BF1EB57A30AA287992ED8AF5BB3166A60618D139317C1C6D3E7CC62CCB8AB1AA9BAB4E4F
24,432,364 UART: [art] SIG.R = FB9C5719CE9CB175065DD172692A89CD9CF0D4831447212542B14A8F69A94989A54ACB5974864EEF6A4C6E08E1DE7690
24,439,753 UART: [art] SIG.S = 87A64C46C45874436C97381E9627C21D5FB3B9C41477610E2EAABAB8F9FB108F254D4850F5069C118E1FE02D9887BC2A
25,418,814 UART: Caliptra RT
25,419,501 UART: [state] CFI Enabled
25,585,265 UART: [rt] RT listening for mailbox commands...
25,587,596 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,742,765 UART: [rt]cmd =0x41544d4e, len=14344
29,738,560 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,704 writing to cptra_bootfsm_go
193,016 UART:
193,381 UART: Running Caliptra ROM ...
194,589 UART:
604,124 UART: [state] CFI Enabled
618,789 UART: [state] LifecycleState = Unprovisioned
620,667 UART: [state] DebugLocked = No
622,835 UART: [state] WD Timer not started. Device not locked for debugging
626,865 UART: [kat] SHA2-256
805,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,567 UART: [kat] ++
818,099 UART: [kat] sha1
829,908 UART: [kat] SHA2-256
832,904 UART: [kat] SHA2-384
838,391 UART: [kat] SHA2-512-ACC
841,390 UART: [kat] ECC-384
3,281,667 UART: [kat] HMAC-384Kdf
3,293,047 UART: [kat] LMS
3,822,570 UART: [kat] --
3,826,510 UART: [cold-reset] ++
3,828,814 UART: [fht] FHT @ 0x50003400
3,838,804 UART: [idev] ++
3,839,377 UART: [idev] CDI.KEYID = 6
3,840,293 UART: [idev] SUBJECT.KEYID = 7
3,841,466 UART: [idev] UDS.KEYID = 0
3,842,413 ready_for_fw is high
3,842,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,083 UART: [idev] Erasing UDS.KEYID = 0
6,318,786 UART: [idev] Sha1 KeyId Algorithm
6,340,518 UART: [idev] --
6,344,024 UART: [ldev] ++
6,344,603 UART: [ldev] CDI.KEYID = 6
6,345,517 UART: [ldev] SUBJECT.KEYID = 5
6,346,736 UART: [ldev] AUTHORITY.KEYID = 7
6,347,966 UART: [ldev] FE.KEYID = 1
6,358,506 UART: [ldev] Erasing FE.KEYID = 1
8,830,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,083 UART: [ldev] --
10,619,069 UART: [fwproc] Wait for Commands...
10,622,245 UART: [fwproc] Recv command 0x46574c44
10,624,335 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,006 >>> mbox cmd response: success
14,488,054 UART: [afmc] ++
14,488,652 UART: [afmc] CDI.KEYID = 6
14,489,542 UART: [afmc] SUBJECT.KEYID = 7
14,490,753 UART: [afmc] AUTHORITY.KEYID = 5
16,989,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,621 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,674 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,548 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,880 UART: [afmc] --
18,785,156 UART: [cold-reset] --
18,789,550 UART: [state] Locking Datavault
18,795,169 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,865 UART: [state] Locking ICCM
18,798,151 UART: [exit] Launching FMC @ 0x40000130
18,806,595 UART:
18,806,828 UART: Running Caliptra FMC ...
18,807,928 UART:
18,808,083 UART: [state] CFI Enabled
18,816,292 UART: [fht] FMC Alias Private Key: 7
20,573,005 UART: [art] Extend RT PCRs Done
20,574,201 UART: [art] Lock RT PCRs Done
20,575,786 UART: [art] Populate DV Done
20,581,208 UART: [fht] FMC Alias Private Key: 7
20,582,906 UART: [art] Derive CDI
20,583,649 UART: [art] Store in in slot 0x4
20,626,383 UART: [art] Derive Key Pair
20,627,416 UART: [art] Store priv key in slot 0x5
23,054,148 UART: [art] Derive Key Pair - Done
23,067,147 UART: [art] Signing Cert with AUTHO
23,068,455 UART: RITY.KEYID = 7
24,773,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,127 UART: [art] PUB.X = F5AD0C40FCA3CFADD4D3B4518D35B8F860DCC5AF254D32098D6113EF59180273586C7604E533E3E442F10DDAD3130461
24,782,437 UART: [art] PUB.Y = 80C564F3E40068986AC2D7F9A061C2B66FDE36B965CE06E28524EFB7181B605C8958AFE44E6AD3A1E805517E2C2A8DA5
24,789,674 UART: [art] SIG.R = EEFFA2F95C6B21FB31FCA578903640D8DBF69EBE46242021D847F9BDF09EAA1604FE90ACF8B77F65E7506D1AA0D57E05
24,797,066 UART: [art] SIG.S = 65E23C502000DA892F8BA3BDD1E0F935A3ACBE54AD0C0F189DA3540BA79F9E546CD461387A703775AF44628CCD478BC9
25,776,033 UART: Caliptra RT
25,776,748 UART: [state] CFI Enabled
25,893,650 UART: [rt] RT listening for mailbox commands...
25,895,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,051,266 UART: [rt]cmd =0x41544d4e, len=14344
30,047,523 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
3,697,006 ready_for_fw is high
3,697,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,591 >>> mbox cmd response: success
18,515,106 UART:
18,515,499 UART: Running Caliptra FMC ...
18,516,604 UART:
18,516,758 UART: [state] CFI Enabled
18,525,052 UART: [fht] FMC Alias Private Key: 7
20,281,543 UART: [art] Extend RT PCRs Done
20,282,772 UART: [art] Lock RT PCRs Done
20,284,376 UART: [art] Populate DV Done
20,289,642 UART: [fht] FMC Alias Private Key: 7
20,291,164 UART: [art] Derive CDI
20,291,939 UART: [art] Store in in slot 0x4
20,334,698 UART: [art] Derive Key Pair
20,335,702 UART: [art] Store priv key in slot 0x5
22,763,070 UART: [art] Derive Key Pair - Done
22,776,232 UART: [art] Signing Cert with AUTHO
22,777,572 UART: RITY.KEYID = 7
24,482,830 UART: [art] Erasing AUTHORITY.KEYID = 7
24,484,323 UART: [art] PUB.X = E20B730AA12E565807CECCC006DBCFE9564713471981F156BE64DEFA68DE33BE95470B7578B510B8A4C7FF15365AE20A
24,491,575 UART: [art] PUB.Y = B9164F879AE3BAF02734959B3527E2CB41808773AA6662C2BE42A1727FAF274A077B68733E0F2345029A9DA3ABFB9E34
24,498,839 UART: [art] SIG.R = 2D36283C01ED210026FD3C622C3EED484066ED7DBFEBD9DF18ED192BA78D5029C337D5904E6C7843041F56CCBBCA8455
24,506,253 UART: [art] SIG.S = 7EAF5A982EBC8F27B42D2938E7EEC7B21E46275F9761F3B8E1B2FCBE3D9B6B23B87D4F832FD66A217E5B3616F62F98DB
25,485,069 UART: Caliptra RT
25,485,786 UART: [state] CFI Enabled
25,603,810 UART: [rt] RT listening for mailbox commands...
25,606,111 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,761,556 UART: [rt]cmd =0x41544d4e, len=14344
29,756,233 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,272 UART:
192,625 UART: Running Caliptra ROM ...
193,823 UART:
193,976 UART: [state] CFI Enabled
265,123 UART: [state] LifecycleState = Unprovisioned
267,539 UART: [state] DebugLocked = No
269,924 UART: [state] WD Timer not started. Device not locked for debugging
274,179 UART: [kat] SHA2-256
464,035 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,785 UART: [kat] ++
475,302 UART: [kat] sha1
487,033 UART: [kat] SHA2-256
490,050 UART: [kat] SHA2-384
497,110 UART: [kat] SHA2-512-ACC
499,693 UART: [kat] ECC-384
2,946,657 UART: [kat] HMAC-384Kdf
2,970,628 UART: [kat] LMS
3,502,454 UART: [kat] --
3,508,187 UART: [cold-reset] ++
3,509,311 UART: [fht] FHT @ 0x50003400
3,520,440 UART: [idev] ++
3,521,152 UART: [idev] CDI.KEYID = 6
3,522,064 UART: [idev] SUBJECT.KEYID = 7
3,523,313 UART: [idev] UDS.KEYID = 0
3,524,216 ready_for_fw is high
3,524,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,168 UART: [idev] Erasing UDS.KEYID = 0
6,029,746 UART: [idev] Sha1 KeyId Algorithm
6,053,587 UART: [idev] --
6,058,612 UART: [ldev] ++
6,059,296 UART: [ldev] CDI.KEYID = 6
6,060,186 UART: [ldev] SUBJECT.KEYID = 5
6,061,404 UART: [ldev] AUTHORITY.KEYID = 7
6,062,588 UART: [ldev] FE.KEYID = 1
6,102,121 UART: [ldev] Erasing FE.KEYID = 1
8,607,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,601 UART: [ldev] --
10,416,679 UART: [fwproc] Wait for Commands...
10,418,692 UART: [fwproc] Recv command 0x46574c44
10,421,005 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,834 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,595,895 >>> mbox cmd response: success
14,599,739 UART: [afmc] ++
14,600,454 UART: [afmc] CDI.KEYID = 6
14,601,661 UART: [afmc] SUBJECT.KEYID = 7
14,603,111 UART: [afmc] AUTHORITY.KEYID = 5
17,152,593 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,512 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,679 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,841 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,816 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,965,573 UART: [afmc] --
18,968,433 UART: [cold-reset] --
18,972,849 UART: [state] Locking Datavault
18,977,576 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,741 UART: [state] Locking ICCM
18,982,334 UART: [exit] Launching FMC @ 0x40000130
18,991,036 UART:
18,991,275 UART: Running Caliptra FMC ...
18,992,377 UART:
18,992,541 UART: [state] CFI Enabled
19,051,502 UART: [fht] FMC Alias Private Key: 7
20,816,190 UART: [art] Extend RT PCRs Done
20,817,404 UART: [art] Lock RT PCRs Done
20,819,005 UART: [art] Populate DV Done
20,824,424 UART: [fht] FMC Alias Private Key: 7
20,826,017 UART: [art] Derive CDI
20,826,851 UART: [art] Store in in slot 0x4
20,884,443 UART: [art] Derive Key Pair
20,885,484 UART: [art] Store priv key in slot 0x5
23,348,440 UART: [art] Derive Key Pair - Done
23,361,274 UART: [art] Signing Cert with AUTHO
23,362,576 UART: RITY.KEYID = 7
25,074,770 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,266 UART: [art] PUB.X = F0533217120EFAC2FBDA2D051AF699FBABBF0ECABE7025F19673397173B105581B16D71B946CA44B509376EFB93E5406
25,083,535 UART: [art] PUB.Y = 21CF566544816C3FC46670E69B4741F6F65B3FA539A3D7AAD942F3DA782E32BA1B7C54EA18C34FEB3A3CB596A66E5C69
25,090,801 UART: [art] SIG.R = 55F7106D5B5CCCBA218F1C440CFDC37855E1E698EB003946A34B388A36C409B467113D962DF0E63C7057D3E23136FB8C
25,098,172 UART: [art] SIG.S = 638EA948E7FDA3C9C695181668249957F7BCC18ACE7F4183D4A0D31689BE941BFCAFE25F11BADE64798762F0EF8CC06B
26,077,381 UART: Caliptra RT
26,078,084 UART: [state] CFI Enabled
26,243,363 UART: [rt] RT listening for mailbox commands...
26,245,671 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,401,036 UART: [rt]cmd =0x41544d4e, len=14344
30,396,389 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,438,208 ready_for_fw is high
3,438,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,741,183 >>> mbox cmd response: success
19,029,912 UART:
19,030,301 UART: Running Caliptra FMC ...
19,031,432 UART:
19,031,598 UART: [state] CFI Enabled
19,098,462 UART: [fht] FMC Alias Private Key: 7
20,861,874 UART: [art] Extend RT PCRs Done
20,863,075 UART: [art] Lock RT PCRs Done
20,864,418 UART: [art] Populate DV Done
20,869,983 UART: [fht] FMC Alias Private Key: 7
20,871,476 UART: [art] Derive CDI
20,872,238 UART: [art] Store in in slot 0x4
20,930,735 UART: [art] Derive Key Pair
20,931,794 UART: [art] Store priv key in slot 0x5
23,394,792 UART: [art] Derive Key Pair - Done
23,407,636 UART: [art] Signing Cert with AUTHO
23,408,939 UART: RITY.KEYID = 7
25,121,124 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,610 UART: [art] PUB.X = 2E1029B1EDB20169C5733C428F1DEBF23929FD7A5F8E23F321E54A0D9A748E76F39DE061EFEF71675560FB25454DB5A6
25,129,887 UART: [art] PUB.Y = 5C5E706CCFB0CA48558B1A789523B1C69C513A36C63678F50C572A2A993EF6CD132C900181E559C422D1797BE8170096
25,137,128 UART: [art] SIG.R = 92EAAE520096FC00CE26637DF8BC22CF60AC1ECA0D2ABE9852E8AB3494E826BEDA2478BD3444BA82C19DC96F00A3FB12
25,144,469 UART: [art] SIG.S = A250CDE251EEA1857EA3663073D8A49A0EC306A84AF66E7A66F47AC47ECC20B2FF338CAAB44FA0F2D51152F5B5C3DB48
26,123,587 UART: Caliptra RT
26,124,300 UART: [state] CFI Enabled
26,289,854 UART: [rt] RT listening for mailbox commands...
26,292,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,447,073 UART: [rt]cmd =0x41544d4e, len=14344
30,443,022 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
192,988 UART:
193,361 UART: Running Caliptra ROM ...
194,499 UART:
604,183 UART: [state] CFI Enabled
619,272 UART: [state] LifecycleState = Unprovisioned
621,572 UART: [state] DebugLocked = No
623,385 UART: [state] WD Timer not started. Device not locked for debugging
627,203 UART: [kat] SHA2-256
817,095 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,834 UART: [kat] ++
828,353 UART: [kat] sha1
838,607 UART: [kat] SHA2-256
841,651 UART: [kat] SHA2-384
848,299 UART: [kat] SHA2-512-ACC
850,887 UART: [kat] ECC-384
3,290,524 UART: [kat] HMAC-384Kdf
3,303,330 UART: [kat] LMS
3,835,154 UART: [kat] --
3,839,106 UART: [cold-reset] ++
3,840,122 UART: [fht] FHT @ 0x50003400
3,850,249 UART: [idev] ++
3,850,956 UART: [idev] CDI.KEYID = 6
3,851,991 UART: [idev] SUBJECT.KEYID = 7
3,853,097 UART: [idev] UDS.KEYID = 0
3,854,029 ready_for_fw is high
3,854,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,997,655 UART: [idev] Erasing UDS.KEYID = 0
6,329,322 UART: [idev] Sha1 KeyId Algorithm
6,351,283 UART: [idev] --
6,356,469 UART: [ldev] ++
6,357,147 UART: [ldev] CDI.KEYID = 6
6,358,084 UART: [ldev] SUBJECT.KEYID = 5
6,359,246 UART: [ldev] AUTHORITY.KEYID = 7
6,360,631 UART: [ldev] FE.KEYID = 1
6,373,015 UART: [ldev] Erasing FE.KEYID = 1
8,847,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,871 UART: [ldev] --
10,638,650 UART: [fwproc] Wait for Commands...
10,641,285 UART: [fwproc] Recv command 0x46574c44
10,643,613 UART: [fwproc] Recv'd Img size: 114168 bytes
14,082,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,559 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,275,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,816,346 >>> mbox cmd response: success
14,819,713 UART: [afmc] ++
14,820,431 UART: [afmc] CDI.KEYID = 6
14,821,544 UART: [afmc] SUBJECT.KEYID = 7
14,823,088 UART: [afmc] AUTHORITY.KEYID = 5
17,326,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,045,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,047,710 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,062,851 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,077,984 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,093,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,117,577 UART: [afmc] --
19,121,734 UART: [cold-reset] --
19,124,142 UART: [state] Locking Datavault
19,129,987 UART: [state] Locking PCR0, PCR1 and PCR31
19,132,179 UART: [state] Locking ICCM
19,134,060 UART: [exit] Launching FMC @ 0x40000130
19,142,738 UART:
19,142,981 UART: Running Caliptra FMC ...
19,144,085 UART:
19,144,245 UART: [state] CFI Enabled
19,152,400 UART: [fht] FMC Alias Private Key: 7
20,910,077 UART: [art] Extend RT PCRs Done
20,911,297 UART: [art] Lock RT PCRs Done
20,913,324 UART: [art] Populate DV Done
20,918,626 UART: [fht] FMC Alias Private Key: 7
20,920,352 UART: [art] Derive CDI
20,921,095 UART: [art] Store in in slot 0x4
20,963,823 UART: [art] Derive Key Pair
20,964,828 UART: [art] Store priv key in slot 0x5
23,391,503 UART: [art] Derive Key Pair - Done
23,404,407 UART: [art] Signing Cert with AUTHO
23,405,750 UART: RITY.KEYID = 7
25,111,326 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,822 UART: [art] PUB.X = F36F08BF561802865B55F44F69A9EA7C5B6D0446A218A7B47C8026F064CA88A87CA61F1558FE04FF90A1FE13A13E09EE
25,120,064 UART: [art] PUB.Y = F4BC2C411BA0E00D02B5E2B5A36622C241538339FB4C0EDEC7A49082BC6302D981EDC779C80A732EEC85564B8AAD89E1
25,127,347 UART: [art] SIG.R = 576CFD0AE69CB73B773C04B3738575E40C1C25F250B64CBAEFCD1FF623A97A23D3F81D96ED49563F0AD26266ED1EEE32
25,134,740 UART: [art] SIG.S = AB051B25B960726AC3291E2B0A256CAE0B248EE98E631963200B363CF5BEFD308803B4A11FDD6FBBE93F8D1E7915249D
26,113,276 UART: Caliptra RT
26,113,978 UART: [state] CFI Enabled
26,231,156 UART: [rt] RT listening for mailbox commands...
26,233,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,388,702 UART: [rt]cmd =0x41544d4e, len=14344
30,384,743 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
3,755,764 ready_for_fw is high
3,756,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,019 >>> mbox cmd response: success
19,203,420 UART:
19,203,815 UART: Running Caliptra FMC ...
19,204,998 UART:
19,205,171 UART: [state] CFI Enabled
19,212,943 UART: [fht] FMC Alias Private Key: 7
20,969,912 UART: [art] Extend RT PCRs Done
20,971,128 UART: [art] Lock RT PCRs Done
20,972,869 UART: [art] Populate DV Done
20,978,388 UART: [fht] FMC Alias Private Key: 7
20,979,751 UART: [art] Derive CDI
20,980,493 UART: [art] Store in in slot 0x4
21,022,765 UART: [art] Derive Key Pair
21,023,791 UART: [art] Store priv key in slot 0x5
23,450,120 UART: [art] Derive Key Pair - Done
23,462,794 UART: [art] Signing Cert with AUTHO
23,464,131 UART: RITY.KEYID = 7
25,169,464 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,964 UART: [art] PUB.X = 810CFB084FF3B841297DC90327A8B0744B70C778D8A9BCB524362FA6963A0C1F018B426E074CEE227DA5747836B8DC6F
25,178,275 UART: [art] PUB.Y = EF9BC463A0B262184F78DCF8F7A7844A91297680F56C55B5C360EAAE21AF8B99756833894654593ADF944B8A4D71677D
25,185,491 UART: [art] SIG.R = 08DF7529D8C751C97884249D22771CC01B54A037BD81F979E571F243DAD0880067B56D30FAD3B5BAC7DC60E4C2A47F3E
25,192,827 UART: [art] SIG.S = C0D62E844B7BDA3B26F4645370B4A1CE685603DB11452854A9C87A23B5E2243210A47361BEBD6DFC366DA64EB57D2093
26,172,556 UART: Caliptra RT
26,173,255 UART: [state] CFI Enabled
26,290,431 UART: [rt] RT listening for mailbox commands...
26,292,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,448,092 UART: [rt]cmd =0x41544d4e, len=14344
30,443,604 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,305 UART: [kat] SHA2-256
882,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,351 UART: [kat] ++
886,503 UART: [kat] sha1
890,793 UART: [kat] SHA2-256
892,731 UART: [kat] SHA2-384
895,508 UART: [kat] SHA2-512-ACC
897,409 UART: [kat] ECC-384
902,900 UART: [kat] HMAC-384Kdf
907,536 UART: [kat] LMS
1,475,732 UART: [kat] --
1,476,625 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 ready_for_fw is high
1,481,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,128 UART: [idev] Erasing UDS.KEYID = 0
1,505,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,080 UART: [idev] --
1,515,153 UART: [ldev] ++
1,515,321 UART: [ldev] CDI.KEYID = 6
1,515,684 UART: [ldev] SUBJECT.KEYID = 5
1,516,110 UART: [ldev] AUTHORITY.KEYID = 7
1,516,573 UART: [ldev] FE.KEYID = 1
1,521,533 UART: [ldev] Erasing FE.KEYID = 1
1,546,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,646 UART: [ldev] --
1,586,019 UART: [fwproc] Waiting for Commands...
1,586,768 UART: [fwproc] Received command 0x46574c44
1,587,559 UART: [fwproc] Received Image of size 114168 bytes
2,884,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,635 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,592 >>> mbox cmd response: success
3,077,712 UART: [afmc] ++
3,077,880 UART: [afmc] CDI.KEYID = 6
3,078,242 UART: [afmc] SUBJECT.KEYID = 7
3,078,667 UART: [afmc] AUTHORITY.KEYID = 5
3,113,716 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,530 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,258 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,143 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,833 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,576 UART: [afmc] --
3,156,480 UART: [cold-reset] --
3,157,282 UART: [state] Locking Datavault
3,158,679 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,283 UART: [state] Locking ICCM
3,159,855 UART: [exit] Launching FMC @ 0x40000130
3,165,184 UART:
3,165,200 UART: Running Caliptra FMC ...
3,165,608 UART:
3,165,662 UART: [state] CFI Enabled
3,176,157 UART: [fht] FMC Alias Private Key: 7
3,285,196 UART: [art] Extend RT PCRs Done
3,285,624 UART: [art] Lock RT PCRs Done
3,287,044 UART: [art] Populate DV Done
3,295,277 UART: [fht] FMC Alias Private Key: 7
3,296,285 UART: [art] Derive CDI
3,296,565 UART: [art] Store in in slot 0x4
3,382,070 UART: [art] Derive Key Pair
3,382,430 UART: [art] Store priv key in slot 0x5
3,395,430 UART: [art] Derive Key Pair - Done
3,409,866 UART: [art] Signing Cert with AUTHO
3,410,346 UART: RITY.KEYID = 7
3,426,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,869 UART: [art] PUB.X = 6399C1FA4B2631F64BD273D3BC0DA0ED4AAE8BEFE9311A809AC33C58D50CA8FD1E8A25A9615E0FC33CBFDD517F680DC3
3,433,653 UART: [art] PUB.Y = 98A063915C301E7FD18C7B720F99FEBC6C29B307E782EB304EBE97AA0AB0EE098C2D8433D794F3A48FD517FAC0843F24
3,440,603 UART: [art] SIG.R = BD648377B848C0E6686A8EFDE46CD2291A05254B715D6AA0433FF6485B851570A073E7B21399FE5FD2E8B1D32B4C62E9
3,447,374 UART: [art] SIG.S = 7E2D252108359E1F5E58298779501C4265865B68A9E54A63797BECD628EC6407E90F8FFFF0F9047897AA82919BC31489
3,470,625 UART: Caliptra RT
3,470,878 UART: [state] CFI Enabled
3,578,751 UART: [rt] RT listening for mailbox commands...
3,579,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,767 UART: [rt]cmd =0x41544d4e, len=14344
4,012,932 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,413 ready_for_fw is high
1,363,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,692 >>> mbox cmd response: success
2,986,912 UART:
2,986,928 UART: Running Caliptra FMC ...
2,987,336 UART:
2,987,390 UART: [state] CFI Enabled
2,997,367 UART: [fht] FMC Alias Private Key: 7
3,104,948 UART: [art] Extend RT PCRs Done
3,105,376 UART: [art] Lock RT PCRs Done
3,106,956 UART: [art] Populate DV Done
3,115,147 UART: [fht] FMC Alias Private Key: 7
3,116,075 UART: [art] Derive CDI
3,116,355 UART: [art] Store in in slot 0x4
3,202,090 UART: [art] Derive Key Pair
3,202,450 UART: [art] Store priv key in slot 0x5
3,215,676 UART: [art] Derive Key Pair - Done
3,230,256 UART: [art] Signing Cert with AUTHO
3,230,736 UART: RITY.KEYID = 7
3,246,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,005 UART: [art] PUB.X = ECB6C42E73119E7876E5BFECF917CE0C6143455CB5B49D9277281D4543446791BD56B31D77B3A571A010C9E165B5E57B
3,253,774 UART: [art] PUB.Y = 94FCF562FDAA76EF5EF52DB7AB59159D7BFE735160F5184C4D49059AC88D23FAFA5804F40A47D0D93A2A8A811EBD55EC
3,260,735 UART: [art] SIG.R = A766E8373F1C7315F0B57F411E9185C450FDD2EFB84BBAC3B1347585D467E6703DC8C046524C2CC2465F7D4C8A49EE66
3,267,511 UART: [art] SIG.S = E8A73FE0F9287967DBD86E8C75305864B57D48ACE9862AF7C320E169D808E5C0A2DDEB44A023003D59459958E2B7B457
3,291,765 UART: Caliptra RT
3,292,018 UART: [state] CFI Enabled
3,400,894 UART: [rt] RT listening for mailbox commands...
3,401,564 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,166 UART: [rt]cmd =0x41544d4e, len=14344
3,834,781 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,750 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,179 UART: [kat] SHA2-512-ACC
897,080 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,373 UART: [kat] LMS
1,475,569 UART: [kat] --
1,476,678 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,481,396 ready_for_fw is high
1,481,396 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,039 UART: [idev] Erasing UDS.KEYID = 0
1,506,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,797 UART: [idev] --
1,515,692 UART: [ldev] ++
1,515,860 UART: [ldev] CDI.KEYID = 6
1,516,223 UART: [ldev] SUBJECT.KEYID = 5
1,516,649 UART: [ldev] AUTHORITY.KEYID = 7
1,517,112 UART: [ldev] FE.KEYID = 1
1,522,154 UART: [ldev] Erasing FE.KEYID = 1
1,547,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,463 UART: [ldev] --
1,586,886 UART: [fwproc] Waiting for Commands...
1,587,635 UART: [fwproc] Received command 0x46574c44
1,588,426 UART: [fwproc] Received Image of size 114168 bytes
2,884,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,198 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,550 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,251 >>> mbox cmd response: success
3,078,287 UART: [afmc] ++
3,078,455 UART: [afmc] CDI.KEYID = 6
3,078,817 UART: [afmc] SUBJECT.KEYID = 7
3,079,242 UART: [afmc] AUTHORITY.KEYID = 5
3,114,265 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,325 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,053 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,938 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,628 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,607 UART: [afmc] --
3,157,565 UART: [cold-reset] --
3,158,513 UART: [state] Locking Datavault
3,159,584 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,188 UART: [state] Locking ICCM
3,160,750 UART: [exit] Launching FMC @ 0x40000130
3,166,079 UART:
3,166,095 UART: Running Caliptra FMC ...
3,166,503 UART:
3,166,646 UART: [state] CFI Enabled
3,177,281 UART: [fht] FMC Alias Private Key: 7
3,285,118 UART: [art] Extend RT PCRs Done
3,285,546 UART: [art] Lock RT PCRs Done
3,287,130 UART: [art] Populate DV Done
3,295,351 UART: [fht] FMC Alias Private Key: 7
3,296,379 UART: [art] Derive CDI
3,296,659 UART: [art] Store in in slot 0x4
3,382,380 UART: [art] Derive Key Pair
3,382,740 UART: [art] Store priv key in slot 0x5
3,395,378 UART: [art] Derive Key Pair - Done
3,410,291 UART: [art] Signing Cert with AUTHO
3,410,771 UART: RITY.KEYID = 7
3,426,199 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,964 UART: [art] PUB.X = 6964192B8C4742C4055FDFBF7A498F73E63F878695C4EAA765DF7CB469B41764B67C5718D10E3FA979AC733B7C5EEC5A
3,433,736 UART: [art] PUB.Y = 1763D9A749EADACE04956A6B7D9D53458BD532F99B2061300C76DBE98A9E1EB01E890BB186EAE2E30B9A7B5127BB958C
3,440,686 UART: [art] SIG.R = 7278D32DBDB78DC56EA8491BD78B0AFFF0D7A02F324B73DD4A65228E708AAACA90463DEA8FBD1C626587D75F2BAF7C4A
3,447,477 UART: [art] SIG.S = 762FCD0AE70214B78BBC748DE17BC6FCF1C2B86698B76E13054FFF47DBC39C27E14E2AA0D6F158818769D8FDD76D2072
3,471,569 UART: Caliptra RT
3,471,914 UART: [state] CFI Enabled
3,579,728 UART: [rt] RT listening for mailbox commands...
3,580,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,184 UART: [rt]cmd =0x41544d4e, len=14344
4,013,089 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,480 ready_for_fw is high
1,362,480 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,325 >>> mbox cmd response: success
2,986,315 UART:
2,986,331 UART: Running Caliptra FMC ...
2,986,739 UART:
2,986,882 UART: [state] CFI Enabled
2,997,571 UART: [fht] FMC Alias Private Key: 7
3,105,088 UART: [art] Extend RT PCRs Done
3,105,516 UART: [art] Lock RT PCRs Done
3,106,948 UART: [art] Populate DV Done
3,115,367 UART: [fht] FMC Alias Private Key: 7
3,116,369 UART: [art] Derive CDI
3,116,649 UART: [art] Store in in slot 0x4
3,202,246 UART: [art] Derive Key Pair
3,202,606 UART: [art] Store priv key in slot 0x5
3,215,826 UART: [art] Derive Key Pair - Done
3,230,184 UART: [art] Signing Cert with AUTHO
3,230,664 UART: RITY.KEYID = 7
3,245,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,713 UART: [art] PUB.X = 0860CC9EFAEEF74045C6E13A905184A261A559F966ED7190DD39A47F57541B669FAEA0DB99B401ACBF7EA18A7E5AB0C7
3,253,493 UART: [art] PUB.Y = CAFF4C8C7CF5E59C433DEEB74A4DC7C7CF33D3B2185A3926262694026F572B109957F680CEE1B4B817479615E19FF1D1
3,260,448 UART: [art] SIG.R = 6E4100862E00D95B25941BF47F4ADB724AE7465E8036236EA1B1376D4549D1493195FFE2B3941A7B5CCE6E21C49E945D
3,267,174 UART: [art] SIG.S = 89B2A349BF6ACF67D1152C517E77167D14D3492E3990D3D65BA43089868CC217A800DBB421A603ED3487D0DF244837C1
3,291,372 UART: Caliptra RT
3,291,717 UART: [state] CFI Enabled
3,399,984 UART: [rt] RT listening for mailbox commands...
3,400,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,752 UART: [rt]cmd =0x41544d4e, len=14344
3,833,577 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,196 UART: [kat] SHA2-256
892,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,971 UART: [kat] ++
897,123 UART: [kat] sha1
901,245 UART: [kat] SHA2-256
903,185 UART: [kat] SHA2-384
905,904 UART: [kat] SHA2-512-ACC
907,805 UART: [kat] ECC-384
917,356 UART: [kat] HMAC-384Kdf
922,044 UART: [kat] LMS
1,170,372 UART: [kat] --
1,171,111 UART: [cold-reset] ++
1,171,471 UART: [fht] FHT @ 0x50003400
1,174,244 UART: [idev] ++
1,174,412 UART: [idev] CDI.KEYID = 6
1,174,772 UART: [idev] SUBJECT.KEYID = 7
1,175,196 UART: [idev] UDS.KEYID = 0
1,175,541 ready_for_fw is high
1,175,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,558 UART: [idev] Erasing UDS.KEYID = 0
1,200,477 UART: [idev] Sha1 KeyId Algorithm
1,208,913 UART: [idev] --
1,209,975 UART: [ldev] ++
1,210,143 UART: [ldev] CDI.KEYID = 6
1,210,506 UART: [ldev] SUBJECT.KEYID = 5
1,210,932 UART: [ldev] AUTHORITY.KEYID = 7
1,211,395 UART: [ldev] FE.KEYID = 1
1,216,425 UART: [ldev] Erasing FE.KEYID = 1
1,242,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,231 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,022 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,138 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,442 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,973 >>> mbox cmd response: success
2,773,173 UART: [afmc] ++
2,773,341 UART: [afmc] CDI.KEYID = 6
2,773,703 UART: [afmc] SUBJECT.KEYID = 7
2,774,128 UART: [afmc] AUTHORITY.KEYID = 5
2,808,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,158 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,886 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,771 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,456 UART: [afmc] --
2,852,550 UART: [cold-reset] --
2,853,280 UART: [state] Locking Datavault
2,854,451 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,055 UART: [state] Locking ICCM
2,855,549 UART: [exit] Launching FMC @ 0x40000130
2,860,878 UART:
2,860,894 UART: Running Caliptra FMC ...
2,861,302 UART:
2,861,356 UART: [state] CFI Enabled
2,871,925 UART: [fht] FMC Alias Private Key: 7
2,980,006 UART: [art] Extend RT PCRs Done
2,980,434 UART: [art] Lock RT PCRs Done
2,981,654 UART: [art] Populate DV Done
2,990,075 UART: [fht] FMC Alias Private Key: 7
2,991,099 UART: [art] Derive CDI
2,991,379 UART: [art] Store in in slot 0x4
3,077,270 UART: [art] Derive Key Pair
3,077,630 UART: [art] Store priv key in slot 0x5
3,090,582 UART: [art] Derive Key Pair - Done
3,105,325 UART: [art] Signing Cert with AUTHO
3,105,805 UART: RITY.KEYID = 7
3,120,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,656 UART: [art] PUB.X = CC4EB77C63B92A4FA815E40046A1E85FE2593A1019E347977C9B2757A0C23288F80616C3B7A236A01C04DDD081607609
3,128,391 UART: [art] PUB.Y = F680CF77F8869A9683C22D7DCA23C882E1EC2972940796AAE8BA1292D49D63E5295B0A513F0969EB9B31D0F58BF10838
3,135,331 UART: [art] SIG.R = D6791FCBD248A09B825D20056DCD2FFC5F266676667280AC0ADF33167AA130B624FC3663952B721EE81DB7F1E354D764
3,142,099 UART: [art] SIG.S = 189C000711BB8B963216C814FBBDEDA75A54BEDE5F8384FC385C5B032A8CE1F5C5437D82CB99B96C2B91E18A936371A4
3,165,860 UART: Caliptra RT
3,166,113 UART: [state] CFI Enabled
3,273,078 UART: [rt] RT listening for mailbox commands...
3,273,748 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,664 UART: [rt]cmd =0x41544d4e, len=14344
3,706,935 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,797 ready_for_fw is high
1,060,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,406 >>> mbox cmd response: success
2,687,330 UART:
2,687,346 UART: Running Caliptra FMC ...
2,687,754 UART:
2,687,808 UART: [state] CFI Enabled
2,698,597 UART: [fht] FMC Alias Private Key: 7
2,806,400 UART: [art] Extend RT PCRs Done
2,806,828 UART: [art] Lock RT PCRs Done
2,808,360 UART: [art] Populate DV Done
2,816,453 UART: [fht] FMC Alias Private Key: 7
2,817,573 UART: [art] Derive CDI
2,817,853 UART: [art] Store in in slot 0x4
2,903,844 UART: [art] Derive Key Pair
2,904,204 UART: [art] Store priv key in slot 0x5
2,917,116 UART: [art] Derive Key Pair - Done
2,931,875 UART: [art] Signing Cert with AUTHO
2,932,355 UART: RITY.KEYID = 7
2,947,985 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,750 UART: [art] PUB.X = 944D4000977F3E11B97B120A8DB776A7A1D059231BE20C48B259B4BDF47D5F5970F05122E60F77ABF9C08342168BCB31
2,955,489 UART: [art] PUB.Y = B8C1EB5540F92331DB65C61CFD9047A5C49E2227ECAE28260E11D5B456A333FC06A843E9FE2B225D2AB634C574B076BE
2,962,443 UART: [art] SIG.R = 419F0BCEA34FE0809DACC45F820A66D8483938392BCEC6A5A41E5345D6CA48D33C11EC54E140F02BFFAE73C93E7CA598
2,969,223 UART: [art] SIG.S = 2258FCEEEBB89A645CBCD83EA10E2363049E885FD3BD9DFF6CE4C4617B2854BDDC325D1F856F8ED84A17B4D28C263A72
2,992,780 UART: Caliptra RT
2,993,033 UART: [state] CFI Enabled
3,101,178 UART: [rt] RT listening for mailbox commands...
3,101,848 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,866 UART: [rt]cmd =0x41544d4e, len=14344
3,534,717 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
901,864 UART: [kat] SHA2-256
903,804 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
917,745 UART: [kat] HMAC-384Kdf
922,313 UART: [kat] LMS
1,170,641 UART: [kat] --
1,171,358 UART: [cold-reset] ++
1,171,876 UART: [fht] FHT @ 0x50003400
1,174,325 UART: [idev] ++
1,174,493 UART: [idev] CDI.KEYID = 6
1,174,853 UART: [idev] SUBJECT.KEYID = 7
1,175,277 UART: [idev] UDS.KEYID = 0
1,175,622 ready_for_fw is high
1,175,622 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,203 UART: [idev] Erasing UDS.KEYID = 0
1,201,002 UART: [idev] Sha1 KeyId Algorithm
1,209,588 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,244,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,532 UART: [ldev] --
1,283,979 UART: [fwproc] Wait for Commands...
1,284,723 UART: [fwproc] Recv command 0x46574c44
1,285,451 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,955 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,259 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,818 >>> mbox cmd response: success
2,773,874 UART: [afmc] ++
2,774,042 UART: [afmc] CDI.KEYID = 6
2,774,404 UART: [afmc] SUBJECT.KEYID = 7
2,774,829 UART: [afmc] AUTHORITY.KEYID = 5
2,810,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,449 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,062 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,677 UART: [afmc] --
2,853,557 UART: [cold-reset] --
2,854,315 UART: [state] Locking Datavault
2,855,684 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,288 UART: [state] Locking ICCM
2,856,812 UART: [exit] Launching FMC @ 0x40000130
2,862,141 UART:
2,862,157 UART: Running Caliptra FMC ...
2,862,565 UART:
2,862,708 UART: [state] CFI Enabled
2,873,859 UART: [fht] FMC Alias Private Key: 7
2,981,462 UART: [art] Extend RT PCRs Done
2,981,890 UART: [art] Lock RT PCRs Done
2,983,356 UART: [art] Populate DV Done
2,991,521 UART: [fht] FMC Alias Private Key: 7
2,992,469 UART: [art] Derive CDI
2,992,749 UART: [art] Store in in slot 0x4
3,078,392 UART: [art] Derive Key Pair
3,078,752 UART: [art] Store priv key in slot 0x5
3,092,220 UART: [art] Derive Key Pair - Done
3,106,949 UART: [art] Signing Cert with AUTHO
3,107,429 UART: RITY.KEYID = 7
3,123,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,876 UART: [art] PUB.X = 4730D9736CD191B1B70A485D5DA2D8CD2C9F3EEF3641B6C46EBD48F64863D6723359208478E5933E1930AC6C665BA213
3,130,643 UART: [art] PUB.Y = 3D13C082DFBC2D68BCDFC302AFAAEAC3C28FCD5A3CCD6E06F312D4345A656F27D6FC224EF303DF1E9907FE0B23399AB4
3,137,606 UART: [art] SIG.R = C46D641996DE2F0C8263732A529536AA6A25A20533EEE3DACCB739D097AFCD675C1D9786FA762BEC54B06EE3380FED32
3,144,379 UART: [art] SIG.S = D562199468724B5DCDF5628FA74DC5D8446B80F457716976702C6647B0C03FB0B60DE640FD1F8E38C2797DAC489A9A84
3,168,371 UART: Caliptra RT
3,168,716 UART: [state] CFI Enabled
3,276,258 UART: [rt] RT listening for mailbox commands...
3,276,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,990 UART: [rt]cmd =0x41544d4e, len=14344
3,710,347 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,308 ready_for_fw is high
1,061,308 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,805 >>> mbox cmd response: success
2,688,587 UART:
2,688,603 UART: Running Caliptra FMC ...
2,689,011 UART:
2,689,154 UART: [state] CFI Enabled
2,699,713 UART: [fht] FMC Alias Private Key: 7
2,807,290 UART: [art] Extend RT PCRs Done
2,807,718 UART: [art] Lock RT PCRs Done
2,809,482 UART: [art] Populate DV Done
2,817,635 UART: [fht] FMC Alias Private Key: 7
2,818,655 UART: [art] Derive CDI
2,818,935 UART: [art] Store in in slot 0x4
2,904,770 UART: [art] Derive Key Pair
2,905,130 UART: [art] Store priv key in slot 0x5
2,918,666 UART: [art] Derive Key Pair - Done
2,933,497 UART: [art] Signing Cert with AUTHO
2,933,977 UART: RITY.KEYID = 7
2,949,309 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,074 UART: [art] PUB.X = 233E23AA42656ACF9F952EC69044C8693AF1EB699BDD1A7E03B26B86E2026DFC95B945E50B3E7E64D4921DBFCA4BB904
2,956,846 UART: [art] PUB.Y = 8C5AA50BC62A643C64AE207FAC997B75EC5FEDB1E7FCDE35F2AE491B81CAB101AF5481517C119BC041545E4022580EE5
2,963,803 UART: [art] SIG.R = D2F245B6BAD4003240BA79DF6907562AB51678CB13AA11F0AE2333F2F6D353761E6967ADD25A478B0385EBC23284C888
2,970,547 UART: [art] SIG.S = 73DA54BBD332EBC1F94329AA5898513D886B7DA8C976D475FBA1F2EC95062C9B264BB45A4835F6475BC7D3093686C5FF
2,993,960 UART: Caliptra RT
2,994,305 UART: [state] CFI Enabled
3,102,426 UART: [rt] RT listening for mailbox commands...
3,103,096 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,226,122 UART: [rt]cmd =0x41544d4e, len=14344
3,535,709 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,587 UART: [kat] SHA2-256
901,527 UART: [kat] SHA2-384
904,044 UART: [kat] SHA2-512-ACC
905,945 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,212 UART: [kat] LMS
1,168,524 UART: [kat] --
1,169,177 UART: [cold-reset] ++
1,169,749 UART: [fht] FHT @ 0x50003400
1,172,521 UART: [idev] ++
1,172,689 UART: [idev] CDI.KEYID = 6
1,173,050 UART: [idev] SUBJECT.KEYID = 7
1,173,475 UART: [idev] UDS.KEYID = 0
1,173,821 ready_for_fw is high
1,173,821 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,523 UART: [idev] Sha1 KeyId Algorithm
1,207,497 UART: [idev] --
1,208,412 UART: [ldev] ++
1,208,580 UART: [ldev] CDI.KEYID = 6
1,208,944 UART: [ldev] SUBJECT.KEYID = 5
1,209,371 UART: [ldev] AUTHORITY.KEYID = 7
1,209,834 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,240,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,468 UART: [ldev] --
1,279,860 UART: [fwproc] Wait for Commands...
1,280,443 UART: [fwproc] Recv command 0x46574c44
1,281,176 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,089 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,571 >>> mbox cmd response: success
2,770,698 UART: [afmc] ++
2,770,866 UART: [afmc] CDI.KEYID = 6
2,771,229 UART: [afmc] SUBJECT.KEYID = 7
2,771,655 UART: [afmc] AUTHORITY.KEYID = 5
2,807,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,903 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,632 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,515 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,234 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,983 UART: [afmc] --
2,850,985 UART: [cold-reset] --
2,851,879 UART: [state] Locking Datavault
2,853,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,604 UART: [state] Locking ICCM
2,854,250 UART: [exit] Launching FMC @ 0x40000130
2,859,579 UART:
2,859,595 UART: Running Caliptra FMC ...
2,860,003 UART:
2,860,057 UART: [state] CFI Enabled
2,870,340 UART: [fht] FMC Alias Private Key: 7
2,978,389 UART: [art] Extend RT PCRs Done
2,978,817 UART: [art] Lock RT PCRs Done
2,980,299 UART: [art] Populate DV Done
2,988,680 UART: [fht] FMC Alias Private Key: 7
2,989,848 UART: [art] Derive CDI
2,990,128 UART: [art] Store in in slot 0x4
3,076,029 UART: [art] Derive Key Pair
3,076,389 UART: [art] Store priv key in slot 0x5
3,089,437 UART: [art] Derive Key Pair - Done
3,104,357 UART: [art] Signing Cert with AUTHO
3,104,837 UART: RITY.KEYID = 7
3,119,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,626 UART: [art] PUB.X = 6461E1A6C157394FB505E92EB2ED1BDE68E626ED179F62D3DF857FBAD8C11A7564CFC140B9EED76CA72B132616220E05
3,127,399 UART: [art] PUB.Y = 969B326A9E1AB4CB8865493C85FDA33BBB8133CCF60D6D24FCCF8D3F6BB0CCC3164D2661EEEE020C2D5569017CA9D08A
3,134,357 UART: [art] SIG.R = C8B612DC87B16229E68A2C069EA4220C4153D5CF9E8946FA05F12D812131B4B9DD2569F0FD9F69F25BEB0AD2EEF4FE5E
3,141,131 UART: [art] SIG.S = 5FF282A0636ABD7DAF0083ECA891A1AC9CFCA60EC305BC36BDF8826F98483F9BFE513CE0EADE76A79B24F90B220D42CE
3,165,218 UART: Caliptra RT
3,165,471 UART: [state] CFI Enabled
3,272,992 UART: [rt] RT listening for mailbox commands...
3,273,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,740 UART: [rt]cmd =0x41544d4e, len=14344
3,706,579 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,022 ready_for_fw is high
1,056,022 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,685 >>> mbox cmd response: success
2,681,455 UART:
2,681,471 UART: Running Caliptra FMC ...
2,681,879 UART:
2,681,933 UART: [state] CFI Enabled
2,692,548 UART: [fht] FMC Alias Private Key: 7
2,800,379 UART: [art] Extend RT PCRs Done
2,800,807 UART: [art] Lock RT PCRs Done
2,802,569 UART: [art] Populate DV Done
2,811,042 UART: [fht] FMC Alias Private Key: 7
2,812,008 UART: [art] Derive CDI
2,812,288 UART: [art] Store in in slot 0x4
2,898,021 UART: [art] Derive Key Pair
2,898,381 UART: [art] Store priv key in slot 0x5
2,910,987 UART: [art] Derive Key Pair - Done
2,926,059 UART: [art] Signing Cert with AUTHO
2,926,539 UART: RITY.KEYID = 7
2,941,405 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,170 UART: [art] PUB.X = 9F858661090F082EE763C7E373CFC2AB27BEDCFEAFD98B40CC58B24F4A48157DD82F0E4485ED26B2D8A022D9383A78CD
2,948,944 UART: [art] PUB.Y = 5148B66E225413D61450FD7D30AF643C16C2170076353ACF27AFB47C56460CF329BD307BA5B88EFF030FC92A40C7EC4C
2,955,869 UART: [art] SIG.R = E5BC3B5C92A7F8671A16DDE29CB9FF0CAA6846A7957D4CCA39BD57BB03620F8BBB2E72DC4FE7357CB3B327042D27811D
2,962,647 UART: [art] SIG.S = EB3D135C62D0ABBAF31088AAA789C2EFAB2A52A68C27315F7B69B1479D4390236B29ACDE156C2DFDD43BD988F9D6AB8E
2,986,580 UART: Caliptra RT
2,986,833 UART: [state] CFI Enabled
3,093,607 UART: [rt] RT listening for mailbox commands...
3,094,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,217,313 UART: [rt]cmd =0x41544d4e, len=14344
3,527,156 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,960 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,940 UART: [kat] ++
896,092 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,281 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,230 UART: [fht] FHT @ 0x50003400
1,172,924 UART: [idev] ++
1,173,092 UART: [idev] CDI.KEYID = 6
1,173,453 UART: [idev] SUBJECT.KEYID = 7
1,173,878 UART: [idev] UDS.KEYID = 0
1,174,224 ready_for_fw is high
1,174,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,888 UART: [idev] Erasing UDS.KEYID = 0
1,198,882 UART: [idev] Sha1 KeyId Algorithm
1,207,674 UART: [idev] --
1,208,639 UART: [ldev] ++
1,208,807 UART: [ldev] CDI.KEYID = 6
1,209,171 UART: [ldev] SUBJECT.KEYID = 5
1,209,598 UART: [ldev] AUTHORITY.KEYID = 7
1,210,061 UART: [ldev] FE.KEYID = 1
1,215,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,393 UART: [ldev] --
1,281,903 UART: [fwproc] Wait for Commands...
1,282,504 UART: [fwproc] Recv command 0x46574c44
1,283,237 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,606 >>> mbox cmd response: success
2,772,643 UART: [afmc] ++
2,772,811 UART: [afmc] CDI.KEYID = 6
2,773,174 UART: [afmc] SUBJECT.KEYID = 7
2,773,600 UART: [afmc] AUTHORITY.KEYID = 5
2,809,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,752 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,854 UART: [afmc] --
2,852,864 UART: [cold-reset] --
2,853,750 UART: [state] Locking Datavault
2,855,021 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,625 UART: [state] Locking ICCM
2,856,267 UART: [exit] Launching FMC @ 0x40000130
2,861,596 UART:
2,861,612 UART: Running Caliptra FMC ...
2,862,020 UART:
2,862,163 UART: [state] CFI Enabled
2,872,890 UART: [fht] FMC Alias Private Key: 7
2,980,239 UART: [art] Extend RT PCRs Done
2,980,667 UART: [art] Lock RT PCRs Done
2,982,207 UART: [art] Populate DV Done
2,990,606 UART: [fht] FMC Alias Private Key: 7
2,991,642 UART: [art] Derive CDI
2,991,922 UART: [art] Store in in slot 0x4
3,078,175 UART: [art] Derive Key Pair
3,078,535 UART: [art] Store priv key in slot 0x5
3,091,789 UART: [art] Derive Key Pair - Done
3,106,688 UART: [art] Signing Cert with AUTHO
3,107,168 UART: RITY.KEYID = 7
3,122,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,183 UART: [art] PUB.X = 702912B696A5B82EC8232AABDBAC86592FD4F96934F49460357564093C135CB9E49C64F07FE2D8977AC254CE2C5A6BB0
3,129,954 UART: [art] PUB.Y = 45D529A17A26AC38086F787BC3CCACB00226DD175DCB2DABFF1422339765BA1FC1433C7AC161F7EBDB7A177EFDFC45C9
3,136,920 UART: [art] SIG.R = A77F7826C1FFDBEA7E5DF5B3D396D43B44E7E7D3ABAC9F6C75E0DE062DF74AA394AB6F002A9ABCCB6B859F06726CCEE7
3,143,694 UART: [art] SIG.S = 67A18735EEB5824EA0F2F21702F09E9C9F4760FF7A036F3D1D2758A3A6F221E18E961C1A648B1ED47492DBD7133352C5
3,167,985 UART: Caliptra RT
3,168,330 UART: [state] CFI Enabled
3,275,637 UART: [rt] RT listening for mailbox commands...
3,276,307 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,311 UART: [rt]cmd =0x41544d4e, len=14344
3,709,764 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,565 ready_for_fw is high
1,056,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,618 >>> mbox cmd response: success
2,683,934 UART:
2,683,950 UART: Running Caliptra FMC ...
2,684,358 UART:
2,684,501 UART: [state] CFI Enabled
2,695,170 UART: [fht] FMC Alias Private Key: 7
2,803,465 UART: [art] Extend RT PCRs Done
2,803,893 UART: [art] Lock RT PCRs Done
2,805,329 UART: [art] Populate DV Done
2,813,618 UART: [fht] FMC Alias Private Key: 7
2,814,622 UART: [art] Derive CDI
2,814,902 UART: [art] Store in in slot 0x4
2,900,733 UART: [art] Derive Key Pair
2,901,093 UART: [art] Store priv key in slot 0x5
2,914,659 UART: [art] Derive Key Pair - Done
2,929,585 UART: [art] Signing Cert with AUTHO
2,930,065 UART: RITY.KEYID = 7
2,944,773 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,538 UART: [art] PUB.X = F9D7CE7EC8374C345529F549DC6B69BDBC5C27EDC8C898B2F463A13EB4D8EC617C5752657B96577186A5E078519160B5
2,952,312 UART: [art] PUB.Y = BA2AD46D2649E3DC0C4A0D62092EB4F22FA39AD611063541DF9EB140A6853C38D2CDDA482D12BAEBD6907E88A0D70092
2,959,242 UART: [art] SIG.R = 154ECB4859CB8FBAA9B067ACDCCF11B31DFC48F9F75CA11B926D0DF69935F3FE2821EEFFF5E3C5F99FACA5ABCDEA210C
2,966,044 UART: [art] SIG.S = 94619A599EADEDC24B621FEA220534C12E3AC1720CCD943AC0291CAA2FAC95CAED0DD853654878462D2472A22E7E26C0
2,990,396 UART: Caliptra RT
2,990,741 UART: [state] CFI Enabled
3,099,358 UART: [rt] RT listening for mailbox commands...
3,100,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,770 UART: [rt]cmd =0x41544d4e, len=14344
3,532,923 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,107 UART:
192,469 UART: Running Caliptra ROM ...
193,658 UART:
193,808 UART: [state] CFI Enabled
263,600 UART: [state] LifecycleState = Unprovisioned
265,593 UART: [state] DebugLocked = No
267,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,482 UART: [kat] SHA2-256
442,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,676 UART: [kat] ++
453,150 UART: [kat] sha1
464,796 UART: [kat] SHA2-256
467,449 UART: [kat] SHA2-384
474,215 UART: [kat] SHA2-512-ACC
476,574 UART: [kat] ECC-384
2,768,817 UART: [kat] HMAC-384Kdf
2,781,070 UART: [kat] LMS
3,971,334 UART: [kat] --
3,974,510 UART: [cold-reset] ++
3,977,152 UART: [fht] Storing FHT @ 0x50003400
3,989,831 UART: [idev] ++
3,990,395 UART: [idev] CDI.KEYID = 6
3,991,379 UART: [idev] SUBJECT.KEYID = 7
3,992,616 UART: [idev] UDS.KEYID = 0
3,993,643 ready_for_fw is high
3,993,859 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,137,553 UART: [idev] Erasing UDS.KEYID = 0
7,327,713 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,242 UART: [idev] --
7,354,632 UART: [ldev] ++
7,355,191 UART: [ldev] CDI.KEYID = 6
7,356,148 UART: [ldev] SUBJECT.KEYID = 5
7,357,355 UART: [ldev] AUTHORITY.KEYID = 7
7,358,632 UART: [ldev] FE.KEYID = 1
7,402,710 UART: [ldev] Erasing FE.KEYID = 1
10,740,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,130 UART: [ldev] --
13,115,174 UART: [fwproc] Waiting for Commands...
13,117,817 UART: [fwproc] Received command 0x46574c44
13,119,993 UART: [fwproc] Received Image of size 113844 bytes
22,073,983 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,159,125 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,228,028 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,544,354 >>> mbox cmd response: success
22,549,220 UART: [afmc] ++
22,549,870 UART: [afmc] CDI.KEYID = 6
22,550,775 UART: [afmc] SUBJECT.KEYID = 7
22,551,984 UART: [afmc] AUTHORITY.KEYID = 5
25,912,557 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,214,374 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,216,633 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,231,203 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,245,949 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,260,412 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,280,547 UART: [afmc] --
28,284,576 UART: [cold-reset] --
28,288,813 UART: [state] Locking Datavault
28,293,570 UART: [state] Locking PCR0, PCR1 and PCR31
28,295,334 UART: [state] Locking ICCM
28,296,992 UART: [exit] Launching FMC @ 0x40000130
28,305,390 UART:
28,305,619 UART: Running Caliptra FMC ...
28,306,714 UART:
28,306,872 UART: [state] CFI Enabled
28,374,132 UART: [fht] FMC Alias Private Key: 7
30,712,680 UART: [art] Extend RT PCRs Done
30,713,899 UART: [art] Lock RT PCRs Done
30,715,409 UART: [art] Populate DV Done
30,720,766 UART: [fht] FMC Alias Private Key: 7
30,722,297 UART: [art] Derive CDI
30,723,121 UART: [art] Store in in slot 0x4
30,783,289 UART: [art] Derive Key Pair
30,784,340 UART: [art] Store priv key in slot 0x5
34,077,127 UART: [art] Derive Key Pair - Done
34,090,183 UART: [art] Signing Cert with AUTHO
34,091,497 UART: RITY.KEYID = 7
36,378,856 UART: [art] Erasing AUTHORITY.KEYID = 7
36,380,368 UART: [art] PUB.X = 75554E9D9923BD23C2C952D759572F4B30146B9872E5DDA746792CC7EA80427A811192415E15D9AADC01FF470C8A661F
36,387,590 UART: [art] PUB.Y = 14CBF19B3A842F7C9C8B09A9E6B64A18F0162F184368CECA504D488487BABA7A9E04F47E299D015DD82FE9826B33C2C6
36,394,847 UART: [art] SIG.R = 341714859E3B0E7F725A64F97955CD715A515A85C6AEA477D224EB659B8876ABC417E2F31E0849593A02AF785F7833C0
36,402,203 UART: [art] SIG.S = 55A03451DBB18760CBA336BC56B71AAB72F7B665AC8BA81F57CDDD9ED9127FAF5CDAA2EDD1C1EEBD4CDED47EA09C7D92
37,706,807 UART: Caliptra RT
37,707,492 UART: [state] CFI Enabled
37,868,800 UART: [rt] RT listening for mailbox commands...
37,871,105 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,026,616 UART: [rt]cmd =0x41544d4e, len=14344
44,217,389 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,803,532 ready_for_fw is high
3,804,061 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,907,511 >>> mbox cmd response: success
27,595,829 UART:
27,596,219 UART: Running Caliptra FMC ...
27,597,405 UART:
27,597,569 UART: [state] CFI Enabled
27,665,685 UART: [fht] FMC Alias Private Key: 7
30,003,624 UART: [art] Extend RT PCRs Done
30,004,890 UART: [art] Lock RT PCRs Done
30,006,284 UART: [art] Populate DV Done
30,011,915 UART: [fht] FMC Alias Private Key: 7
30,013,506 UART: [art] Derive CDI
30,014,316 UART: [art] Store in in slot 0x4
30,074,984 UART: [art] Derive Key Pair
30,076,017 UART: [art] Store priv key in slot 0x5
33,368,891 UART: [art] Derive Key Pair - Done
33,381,685 UART: [art] Signing Cert with AUTHO
33,382,994 UART: RITY.KEYID = 7
35,671,155 UART: [art] Erasing AUTHORITY.KEYID = 7
35,672,658 UART: [art] PUB.X = 489B3C7CDEBF05475F3D03E3BC87DEF4A9E6985FE347A312973E1B1228B2CF18409511D7D6E9619C2EB46AE81C146A82
35,679,948 UART: [art] PUB.Y = AAF3D5BEFA1A46428F6494E392E707BAB31DAB9ACDD8DFF256023EFE05461D7B0A2B211ACFD40CE3FB865A8FD6D37EEB
35,687,209 UART: [art] SIG.R = E7B58DDA9121AC704258B3A2683FD16AC11F6E4101D14173B9DB4B7645D6F8C463071356627B9EB7EF26DD7AF4F68643
35,694,589 UART: [art] SIG.S = E96B51C11B9971CA2615B1961C0542A90569DEF84948DD3DDAA6F44DEC54DE83B7B88F3EA296C2ED2ABD511CB34ABB56
36,999,633 UART: Caliptra RT
37,000,345 UART: [state] CFI Enabled
37,161,842 UART: [rt] RT listening for mailbox commands...
37,164,204 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,319,389 UART: [rt]cmd =0x41544d4e, len=14344
43,586,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,521 UART:
192,883 UART: Running Caliptra ROM ...
194,025 UART:
603,549 UART: [state] CFI Enabled
616,940 UART: [state] LifecycleState = Unprovisioned
618,884 UART: [state] DebugLocked = No
620,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,561 UART: [kat] SHA2-256
795,325 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,855 UART: [kat] ++
806,331 UART: [kat] sha1
817,772 UART: [kat] SHA2-256
820,501 UART: [kat] SHA2-384
826,488 UART: [kat] SHA2-512-ACC
828,858 UART: [kat] ECC-384
3,114,442 UART: [kat] HMAC-384Kdf
3,127,312 UART: [kat] LMS
4,317,373 UART: [kat] --
4,322,658 UART: [cold-reset] ++
4,324,802 UART: [fht] Storing FHT @ 0x50003400
4,335,144 UART: [idev] ++
4,335,714 UART: [idev] CDI.KEYID = 6
4,336,598 UART: [idev] SUBJECT.KEYID = 7
4,337,935 UART: [idev] UDS.KEYID = 0
4,338,971 ready_for_fw is high
4,339,174 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,241 UART: [idev] Erasing UDS.KEYID = 0
7,626,330 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,648 UART: [idev] --
7,651,617 UART: [ldev] ++
7,652,193 UART: [ldev] CDI.KEYID = 6
7,653,162 UART: [ldev] SUBJECT.KEYID = 5
7,654,372 UART: [ldev] AUTHORITY.KEYID = 7
7,655,602 UART: [ldev] FE.KEYID = 1
7,667,057 UART: [ldev] Erasing FE.KEYID = 1
10,958,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,703 UART: [ldev] --
13,319,973 UART: [fwproc] Waiting for Commands...
13,322,226 UART: [fwproc] Received command 0x46574c44
13,324,407 UART: [fwproc] Received Image of size 113844 bytes
22,035,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,115,119 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,184,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,500,195 >>> mbox cmd response: success
22,504,266 UART: [afmc] ++
22,504,861 UART: [afmc] CDI.KEYID = 6
22,505,752 UART: [afmc] SUBJECT.KEYID = 7
22,507,211 UART: [afmc] AUTHORITY.KEYID = 5
25,824,300 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,118,030 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,120,284 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,134,849 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,149,606 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,163,819 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,185,862 UART: [afmc] --
28,190,325 UART: [cold-reset] --
28,194,443 UART: [state] Locking Datavault
28,197,918 UART: [state] Locking PCR0, PCR1 and PCR31
28,199,625 UART: [state] Locking ICCM
28,201,667 UART: [exit] Launching FMC @ 0x40000130
28,210,067 UART:
28,210,302 UART: Running Caliptra FMC ...
28,211,405 UART:
28,211,563 UART: [state] CFI Enabled
28,219,642 UART: [fht] FMC Alias Private Key: 7
30,550,709 UART: [art] Extend RT PCRs Done
30,551,950 UART: [art] Lock RT PCRs Done
30,553,370 UART: [art] Populate DV Done
30,558,951 UART: [fht] FMC Alias Private Key: 7
30,560,457 UART: [art] Derive CDI
30,561,208 UART: [art] Store in in slot 0x4
30,603,634 UART: [art] Derive Key Pair
30,604,668 UART: [art] Store priv key in slot 0x5
33,846,041 UART: [art] Derive Key Pair - Done
33,858,817 UART: [art] Signing Cert with AUTHO
33,860,125 UART: RITY.KEYID = 7
36,139,414 UART: [art] Erasing AUTHORITY.KEYID = 7
36,140,928 UART: [art] PUB.X = 71432203AF7000BC09D45BBB8EA48D549A897C5377F0AF63F1089BAFF5C04848FEEF6202708892D484D2F00F47F0B6DD
36,148,144 UART: [art] PUB.Y = C9360556F7363BCB8C64C5819F4CBDF51EEC2C132EBF801F7BD56BDC46747E7C695259A54118A35099FE4286C36EB312
36,155,437 UART: [art] SIG.R = BB24081D3C6632B7C2071883557E073BCDF8753162A69834FA3799D5D486BE6515587FDBDBE3A1968790801D39541370
36,162,784 UART: [art] SIG.S = F4707A7AC2B9BF17FB37EED36B48BF0F67C032F36BAF96FAB5088B8E7040046D13B841849D6F06E3717B5A74E4BA4BCD
37,467,801 UART: Caliptra RT
37,468,507 UART: [state] CFI Enabled
37,586,134 UART: [rt] RT listening for mailbox commands...
37,588,516 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,743,928 UART: [rt]cmd =0x41544d4e, len=14344
43,933,739 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,126,682 ready_for_fw is high
4,127,077 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,100,552 >>> mbox cmd response: success
27,744,476 UART:
27,744,860 UART: Running Caliptra FMC ...
27,745,981 UART:
27,746,136 UART: [state] CFI Enabled
27,754,023 UART: [fht] FMC Alias Private Key: 7
30,084,930 UART: [art] Extend RT PCRs Done
30,086,165 UART: [art] Lock RT PCRs Done
30,088,093 UART: [art] Populate DV Done
30,093,885 UART: [fht] FMC Alias Private Key: 7
30,095,471 UART: [art] Derive CDI
30,096,217 UART: [art] Store in in slot 0x4
30,138,783 UART: [art] Derive Key Pair
30,139,787 UART: [art] Store priv key in slot 0x5
33,381,924 UART: [art] Derive Key Pair - Done
33,394,981 UART: [art] Signing Cert with AUTHO
33,396,291 UART: RITY.KEYID = 7
35,675,759 UART: [art] Erasing AUTHORITY.KEYID = 7
35,677,262 UART: [art] PUB.X = FBBD4091B339A21E4BC7136D47618C107E2FA1D72825F46B3ADCF7E0B76FD8620E17D1477B1AD30615D2E5AF9F694F92
35,684,525 UART: [art] PUB.Y = F811F8E9D52B252EF9E1D9FBC0AC0B34B9121EB954F1F92D9FEAAC6144532DB1AE5DCBF0AABBE7671F37969DDFF4D0E1
35,691,795 UART: [art] SIG.R = E0D7859F13E15FF7173C3AAFFD50D2BF0E499A0B9F6685AC8CC98B349A54B82A1B80CB1D703D027ED1FA440C0943012C
35,699,185 UART: [art] SIG.S = 3C3284F2A2CEE2FB0F5F3C1CA4D52A79512C4F9C22AF3C722A8C768A18EDFB718478B47DC67A1BF5BED99E418290F312
37,004,342 UART: Caliptra RT
37,005,050 UART: [state] CFI Enabled
37,122,711 UART: [rt] RT listening for mailbox commands...
37,125,007 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,280,361 UART: [rt]cmd =0x41544d4e, len=14344
43,911,344 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,140 UART:
192,513 UART: Running Caliptra ROM ...
193,648 UART:
193,796 UART: [state] CFI Enabled
265,936 UART: [state] LifecycleState = Unprovisioned
268,094 UART: [state] DebugLocked = No
270,711 UART: [state] WD Timer not started. Device not locked for debugging
273,615 UART: [kat] SHA2-256
452,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,326 UART: [kat] ++
464,802 UART: [kat] sha1
475,322 UART: [kat] SHA2-256
478,405 UART: [kat] SHA2-384
484,535 UART: [kat] SHA2-512-ACC
487,477 UART: [kat] ECC-384
2,947,554 UART: [kat] HMAC-384Kdf
2,971,806 UART: [kat] LMS
3,501,243 UART: [kat] --
3,504,908 UART: [cold-reset] ++
3,506,002 UART: [fht] FHT @ 0x50003400
3,518,342 UART: [idev] ++
3,518,907 UART: [idev] CDI.KEYID = 6
3,519,821 UART: [idev] SUBJECT.KEYID = 7
3,520,994 UART: [idev] UDS.KEYID = 0
3,522,042 ready_for_fw is high
3,522,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,956 UART: [idev] Erasing UDS.KEYID = 0
6,026,500 UART: [idev] Sha1 KeyId Algorithm
6,047,824 UART: [idev] --
6,051,075 UART: [ldev] ++
6,051,658 UART: [ldev] CDI.KEYID = 6
6,052,572 UART: [ldev] SUBJECT.KEYID = 5
6,053,734 UART: [ldev] AUTHORITY.KEYID = 7
6,055,028 UART: [ldev] FE.KEYID = 1
6,099,439 UART: [ldev] Erasing FE.KEYID = 1
8,601,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,551 UART: [ldev] --
10,414,597 UART: [fwproc] Wait for Commands...
10,417,579 UART: [fwproc] Recv command 0x46574c44
10,419,624 UART: [fwproc] Recv'd Img size: 114168 bytes
14,975,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,050,200 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,118,955 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,437,162 >>> mbox cmd response: success
15,440,628 UART: [afmc] ++
15,441,224 UART: [afmc] CDI.KEYID = 6
15,442,139 UART: [afmc] SUBJECT.KEYID = 7
15,443,356 UART: [afmc] AUTHORITY.KEYID = 5
17,978,389 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,703,153 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,705,035 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,721,039 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,736,963 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,752,760 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,775,036 UART: [afmc] --
19,778,419 UART: [cold-reset] --
19,781,473 UART: [state] Locking Datavault
19,786,721 UART: [state] Locking PCR0, PCR1 and PCR31
19,788,510 UART: [state] Locking ICCM
19,790,668 UART: [exit] Launching FMC @ 0x40000130
19,799,133 UART:
19,799,377 UART: Running Caliptra FMC ...
19,800,483 UART:
19,800,645 UART: [state] CFI Enabled
19,860,999 UART: [fht] FMC Alias Private Key: 7
21,625,388 UART: [art] Extend RT PCRs Done
21,626,613 UART: [art] Lock RT PCRs Done
21,628,494 UART: [art] Populate DV Done
21,633,901 UART: [fht] FMC Alias Private Key: 7
21,635,495 UART: [art] Derive CDI
21,636,329 UART: [art] Store in in slot 0x4
21,693,815 UART: [art] Derive Key Pair
21,694,815 UART: [art] Store priv key in slot 0x5
24,157,814 UART: [art] Derive Key Pair - Done
24,170,826 UART: [art] Signing Cert with AUTHO
24,172,132 UART: RITY.KEYID = 7
25,883,199 UART: [art] Erasing AUTHORITY.KEYID = 7
25,884,698 UART: [art] PUB.X = 0BF239BB7D4FD95B3EE9D6BFECF3FAF9D7317558FC5074259A9190BC854017322D52D6DAFE82B705E04AA3A85B984D8E
25,891,942 UART: [art] PUB.Y = F2E3EB58DE56EFAE82BA2CF00A55DB65983A75F77E0AC9412AFD5A58F8FD8F16FCA618F090D1277AB05A014AFB6F2BF7
25,899,235 UART: [art] SIG.R = D531E7F2DE999253FEF00E032B5C5E58D0B2AAC653BCCA28E6EB77DB3C9C7F748A41B50411308B98D43D956E0F7E579E
25,906,643 UART: [art] SIG.S = 9E22CF4C70BEAE738A8181A726862F146FF3A5ABB9AC502324CDDCBAD030F8EF0E9C09ACDC00CECC18A8F92D2AADFC9F
26,885,633 UART: Caliptra RT
26,886,347 UART: [state] CFI Enabled
27,051,198 UART: [rt] RT listening for mailbox commands...
27,053,489 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,209,020 UART: [rt]cmd =0x41544d4e, len=14344
30,782,862 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,361,596 ready_for_fw is high
3,362,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,044,778 >>> mbox cmd response: success
19,336,670 UART:
19,337,066 UART: Running Caliptra FMC ...
19,338,200 UART:
19,338,368 UART: [state] CFI Enabled
19,403,613 UART: [fht] FMC Alias Private Key: 7
21,167,681 UART: [art] Extend RT PCRs Done
21,168,913 UART: [art] Lock RT PCRs Done
21,170,599 UART: [art] Populate DV Done
21,175,942 UART: [fht] FMC Alias Private Key: 7
21,177,483 UART: [art] Derive CDI
21,178,268 UART: [art] Store in in slot 0x4
21,236,405 UART: [art] Derive Key Pair
21,237,451 UART: [art] Store priv key in slot 0x5
23,700,234 UART: [art] Derive Key Pair - Done
23,713,394 UART: [art] Signing Cert with AUTHO
23,714,702 UART: RITY.KEYID = 7
25,426,259 UART: [art] Erasing AUTHORITY.KEYID = 7
25,427,757 UART: [art] PUB.X = B5DA0DD42C83AA2771F8E2EF5DD1A9405F4709453598E9DD75AC551BC258DD39A743C3DB28CA8C98FB77C9383AAAD1E8
25,435,043 UART: [art] PUB.Y = 6BA1102324A540CDE2CFFF490E8FA9434E1B6A55B01BDE62E0E22967F35AF00AC18F6D5723A39772B5A022638DBA9EC8
25,442,313 UART: [art] SIG.R = 2E413A2419503E2D1743503F93F05640CD43D963846F531C0F9C2AE179BCB21DC42B95B340C2EE777BA95EC2C16138DA
25,449,707 UART: [art] SIG.S = ADDE420240E7C0DAE23E325CAD209B27C9A8B9A55381DF6329CD005A4A5139EF4BEF6C5A95991E5DA8B8970D2101CC66
26,428,822 UART: Caliptra RT
26,429,516 UART: [state] CFI Enabled
26,594,958 UART: [rt] RT listening for mailbox commands...
26,597,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,752,694 UART: [rt]cmd =0x41544d4e, len=14344
30,311,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,844 writing to cptra_bootfsm_go
193,114 UART:
193,479 UART: Running Caliptra ROM ...
194,680 UART:
604,328 UART: [state] CFI Enabled
618,975 UART: [state] LifecycleState = Unprovisioned
620,847 UART: [state] DebugLocked = No
622,658 UART: [state] WD Timer not started. Device not locked for debugging
625,766 UART: [kat] SHA2-256
804,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,452 UART: [kat] ++
816,920 UART: [kat] sha1
826,658 UART: [kat] SHA2-256
829,672 UART: [kat] SHA2-384
835,305 UART: [kat] SHA2-512-ACC
838,263 UART: [kat] ECC-384
3,277,219 UART: [kat] HMAC-384Kdf
3,290,239 UART: [kat] LMS
3,819,663 UART: [kat] --
3,826,017 UART: [cold-reset] ++
3,827,805 UART: [fht] FHT @ 0x50003400
3,839,063 UART: [idev] ++
3,839,637 UART: [idev] CDI.KEYID = 6
3,840,519 UART: [idev] SUBJECT.KEYID = 7
3,841,757 UART: [idev] UDS.KEYID = 0
3,842,688 ready_for_fw is high
3,842,886 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,679 UART: [idev] Erasing UDS.KEYID = 0
6,310,321 UART: [idev] Sha1 KeyId Algorithm
6,333,867 UART: [idev] --
6,338,504 UART: [ldev] ++
6,339,070 UART: [ldev] CDI.KEYID = 6
6,339,984 UART: [ldev] SUBJECT.KEYID = 5
6,341,192 UART: [ldev] AUTHORITY.KEYID = 7
6,342,424 UART: [ldev] FE.KEYID = 1
6,354,579 UART: [ldev] Erasing FE.KEYID = 1
8,825,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,914 UART: [ldev] --
10,619,271 UART: [fwproc] Wait for Commands...
10,622,355 UART: [fwproc] Recv command 0x46574c44
10,624,450 UART: [fwproc] Recv'd Img size: 114168 bytes
15,177,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,256,811 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,325,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,642,015 >>> mbox cmd response: success
15,646,755 UART: [afmc] ++
15,647,344 UART: [afmc] CDI.KEYID = 6
15,648,258 UART: [afmc] SUBJECT.KEYID = 7
15,649,470 UART: [afmc] AUTHORITY.KEYID = 5
18,150,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,872,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,874,022 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,889,998 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,905,957 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,921,738 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,944,903 UART: [afmc] --
19,949,319 UART: [cold-reset] --
19,953,018 UART: [state] Locking Datavault
19,959,022 UART: [state] Locking PCR0, PCR1 and PCR31
19,960,705 UART: [state] Locking ICCM
19,962,375 UART: [exit] Launching FMC @ 0x40000130
19,970,780 UART:
19,971,016 UART: Running Caliptra FMC ...
19,972,119 UART:
19,972,280 UART: [state] CFI Enabled
19,980,327 UART: [fht] FMC Alias Private Key: 7
21,737,517 UART: [art] Extend RT PCRs Done
21,738,741 UART: [art] Lock RT PCRs Done
21,740,201 UART: [art] Populate DV Done
21,745,719 UART: [fht] FMC Alias Private Key: 7
21,747,477 UART: [art] Derive CDI
21,748,310 UART: [art] Store in in slot 0x4
21,791,013 UART: [art] Derive Key Pair
21,792,018 UART: [art] Store priv key in slot 0x5
24,218,582 UART: [art] Derive Key Pair - Done
24,231,552 UART: [art] Signing Cert with AUTHO
24,232,856 UART: RITY.KEYID = 7
25,938,649 UART: [art] Erasing AUTHORITY.KEYID = 7
25,940,156 UART: [art] PUB.X = B440EB7445C14FABF633A15C7537A35A54A321F4116AA98552B896258E3479EF371EFE36F23E3F86740326A34980D974
25,947,418 UART: [art] PUB.Y = FD0460BDB3A4B42155DB2751E11FB34702F705C4A090C9AB9402497079640F71953D25527CF4AD9F836068EB09EC178D
25,954,660 UART: [art] SIG.R = ACFB5A45D830AA6C5C7B8FBB5CF041E413262EE7E796D3A5521AFE31DE0A213ABB32ED491FA8C1D9BDF3E77CFFCF0943
25,962,109 UART: [art] SIG.S = 42A8F9D13108A9855DC4E4A2FBC87FD294023305B2564FBCD0332F3F8867D011B39480BCFC126970FAE1AA75791A28C6
26,941,194 UART: Caliptra RT
26,941,911 UART: [state] CFI Enabled
27,058,708 UART: [rt] RT listening for mailbox commands...
27,061,034 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,216,671 UART: [rt]cmd =0x41544d4e, len=14344
30,789,229 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,802 writing to cptra_bootfsm_go
3,700,531 ready_for_fw is high
3,700,922 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,264,095 >>> mbox cmd response: success
19,519,110 UART:
19,519,510 UART: Running Caliptra FMC ...
19,520,659 UART:
19,520,826 UART: [state] CFI Enabled
19,528,787 UART: [fht] FMC Alias Private Key: 7
21,285,119 UART: [art] Extend RT PCRs Done
21,286,348 UART: [art] Lock RT PCRs Done
21,288,628 UART: [art] Populate DV Done
21,294,078 UART: [fht] FMC Alias Private Key: 7
21,295,671 UART: [art] Derive CDI
21,296,433 UART: [art] Store in in slot 0x4
21,339,248 UART: [art] Derive Key Pair
21,340,285 UART: [art] Store priv key in slot 0x5
23,767,012 UART: [art] Derive Key Pair - Done
23,780,336 UART: [art] Signing Cert with AUTHO
23,781,643 UART: RITY.KEYID = 7
25,486,857 UART: [art] Erasing AUTHORITY.KEYID = 7
25,488,368 UART: [art] PUB.X = DC497CFAC8B6740EEB69E263D7F8BB945D991DC67045F26531E1BF953506C2D42234F880BA62627D89B94C8185DE9943
25,495,623 UART: [art] PUB.Y = AAEC3474B2CE54A40179BAE9419290CEF8DD19CACA2B78809A5BAC9E8612ACE04273F65612135AF36221767F21D09E28
25,502,833 UART: [art] SIG.R = 21B7D8B89A52E2689F8CB911EA0B986F2A5C8CA1592B5A2E9DC667D3652913C8CABB99F479BEB4118247779377E0CB38
25,510,227 UART: [art] SIG.S = 703354249F433E2752C14A6534BCE7FD3B5B1813F8840F282F74AD3FFEE186CB49C26BB202C2015D2213D7C513C05736
26,488,656 UART: Caliptra RT
26,489,359 UART: [state] CFI Enabled
26,607,134 UART: [rt] RT listening for mailbox commands...
26,609,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,764,822 UART: [rt]cmd =0x41544d4e, len=14344
30,337,570 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,078 UART:
192,451 UART: Running Caliptra ROM ...
193,577 UART:
193,730 UART: [state] CFI Enabled
263,463 UART: [state] LifecycleState = Unprovisioned
265,808 UART: [state] DebugLocked = No
268,765 UART: [state] WD Timer not started. Device not locked for debugging
272,804 UART: [kat] SHA2-256
462,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,483 UART: [kat] ++
473,956 UART: [kat] sha1
485,475 UART: [kat] SHA2-256
488,480 UART: [kat] SHA2-384
495,260 UART: [kat] SHA2-512-ACC
497,845 UART: [kat] ECC-384
2,946,553 UART: [kat] HMAC-384Kdf
2,972,946 UART: [kat] LMS
3,504,683 UART: [kat] --
3,510,552 UART: [cold-reset] ++
3,511,712 UART: [fht] FHT @ 0x50003400
3,523,258 UART: [idev] ++
3,523,968 UART: [idev] CDI.KEYID = 6
3,524,876 UART: [idev] SUBJECT.KEYID = 7
3,526,119 UART: [idev] UDS.KEYID = 0
3,527,044 ready_for_fw is high
3,527,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,855 UART: [idev] Erasing UDS.KEYID = 0
6,031,143 UART: [idev] Sha1 KeyId Algorithm
6,053,629 UART: [idev] --
6,058,417 UART: [ldev] ++
6,059,110 UART: [ldev] CDI.KEYID = 6
6,060,025 UART: [ldev] SUBJECT.KEYID = 5
6,061,211 UART: [ldev] AUTHORITY.KEYID = 7
6,062,392 UART: [ldev] FE.KEYID = 1
6,101,122 UART: [ldev] Erasing FE.KEYID = 1
8,611,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,776 UART: [ldev] --
10,415,527 UART: [fwproc] Wait for Commands...
10,417,726 UART: [fwproc] Recv command 0x46574c44
10,420,032 UART: [fwproc] Recv'd Img size: 114168 bytes
15,049,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,132,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,248,295 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,789,121 >>> mbox cmd response: success
15,792,447 UART: [afmc] ++
15,793,170 UART: [afmc] CDI.KEYID = 6
15,794,367 UART: [afmc] SUBJECT.KEYID = 7
15,795,812 UART: [afmc] AUTHORITY.KEYID = 5
18,323,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,047,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,049,326 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,064,458 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,079,622 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,094,439 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,119,032 UART: [afmc] --
20,122,909 UART: [cold-reset] --
20,126,511 UART: [state] Locking Datavault
20,131,997 UART: [state] Locking PCR0, PCR1 and PCR31
20,134,274 UART: [state] Locking ICCM
20,136,255 UART: [exit] Launching FMC @ 0x40000130
20,144,925 UART:
20,145,171 UART: Running Caliptra FMC ...
20,146,276 UART:
20,146,438 UART: [state] CFI Enabled
20,205,290 UART: [fht] FMC Alias Private Key: 7
21,969,322 UART: [art] Extend RT PCRs Done
21,970,541 UART: [art] Lock RT PCRs Done
21,971,843 UART: [art] Populate DV Done
21,977,097 UART: [fht] FMC Alias Private Key: 7
21,978,677 UART: [art] Derive CDI
21,979,498 UART: [art] Store in in slot 0x4
22,037,887 UART: [art] Derive Key Pair
22,038,891 UART: [art] Store priv key in slot 0x5
24,502,031 UART: [art] Derive Key Pair - Done
24,514,700 UART: [art] Signing Cert with AUTHO
24,515,998 UART: RITY.KEYID = 7
26,228,203 UART: [art] Erasing AUTHORITY.KEYID = 7
26,229,706 UART: [art] PUB.X = FD69E40E57552C5369090DC2D2AFDA5636F30C5146E6B5B27C74CD0F24650FB64FC07B482BE6A1CEC6B4C5E13645FDA8
26,236,974 UART: [art] PUB.Y = 8DD576244C67B60333F4D8B0204C63636371CE26AC218C5EFE69FCBF781EA88E9168EA54D5B91E546AA35B58771EEF6D
26,244,235 UART: [art] SIG.R = D2BCCA39B58A21D589006E6E3729BF2AF0694DDB32BEA261EF67C539864ACC8EAEE8644D014B05D215C1F68D6165CB10
26,251,656 UART: [art] SIG.S = CC23FD5107AD4B79B7A6C852D99431EB6D60DF8A0DB1BE1F75AC058E2C76940A23431DD1D68D3FD7C91FC99D3499A423
27,230,300 UART: Caliptra RT
27,230,989 UART: [state] CFI Enabled
27,395,376 UART: [rt] RT listening for mailbox commands...
27,397,668 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,553,152 UART: [rt]cmd =0x41544d4e, len=14344
31,141,255 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,436,630 ready_for_fw is high
3,436,998 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,825,936 >>> mbox cmd response: success
20,130,092 UART:
20,130,500 UART: Running Caliptra FMC ...
20,131,630 UART:
20,131,793 UART: [state] CFI Enabled
20,201,247 UART: [fht] FMC Alias Private Key: 7
21,965,431 UART: [art] Extend RT PCRs Done
21,966,679 UART: [art] Lock RT PCRs Done
21,968,255 UART: [art] Populate DV Done
21,973,456 UART: [fht] FMC Alias Private Key: 7
21,975,051 UART: [art] Derive CDI
21,975,873 UART: [art] Store in in slot 0x4
22,033,444 UART: [art] Derive Key Pair
22,034,461 UART: [art] Store priv key in slot 0x5
24,497,704 UART: [art] Derive Key Pair - Done
24,510,753 UART: [art] Signing Cert with AUTHO
24,512,065 UART: RITY.KEYID = 7
26,223,082 UART: [art] Erasing AUTHORITY.KEYID = 7
26,224,605 UART: [art] PUB.X = D50ED94A78944A028145970D2E80B9FB18206C87D9450DA66647F8FE032EF74BE14D43FFFC22A2E05482D89F0866700C
26,231,846 UART: [art] PUB.Y = ED45B92D5FCEEF92FADA57DECC673B296F33B60D10E5E5D767308DA28AD3D09F1D1A03BE8BBEAE9AE4E75C25C1D51557
26,239,140 UART: [art] SIG.R = 0663981FEB7CD881722F1A688B432BE48BE42149B13793698E8EB046AAC9E8F05A21D2899B6814FE76D8528B3A6BE564
26,246,528 UART: [art] SIG.S = 6AA66FE2958C0169F7DCF8A059DECC00BBE2193645D413A5C177ADD0E8EF38A090AC017DDE66F387DCA53E6E24DA0E2F
27,225,910 UART: Caliptra RT
27,226,638 UART: [state] CFI Enabled
27,390,612 UART: [rt] RT listening for mailbox commands...
27,392,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,548,365 UART: [rt]cmd =0x41544d4e, len=14344
31,125,978 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
192,906 UART:
193,261 UART: Running Caliptra ROM ...
194,451 UART:
604,153 UART: [state] CFI Enabled
615,093 UART: [state] LifecycleState = Unprovisioned
617,475 UART: [state] DebugLocked = No
619,353 UART: [state] WD Timer not started. Device not locked for debugging
623,949 UART: [kat] SHA2-256
813,777 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,578 UART: [kat] ++
825,097 UART: [kat] sha1
836,824 UART: [kat] SHA2-256
839,838 UART: [kat] SHA2-384
846,131 UART: [kat] SHA2-512-ACC
848,694 UART: [kat] ECC-384
3,292,794 UART: [kat] HMAC-384Kdf
3,306,571 UART: [kat] LMS
3,838,409 UART: [kat] --
3,842,201 UART: [cold-reset] ++
3,844,279 UART: [fht] FHT @ 0x50003400
3,856,249 UART: [idev] ++
3,856,887 UART: [idev] CDI.KEYID = 6
3,857,921 UART: [idev] SUBJECT.KEYID = 7
3,859,092 UART: [idev] UDS.KEYID = 0
3,860,025 ready_for_fw is high
3,860,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,599 UART: [idev] Erasing UDS.KEYID = 0
6,338,622 UART: [idev] Sha1 KeyId Algorithm
6,360,989 UART: [idev] --
6,366,719 UART: [ldev] ++
6,367,455 UART: [ldev] CDI.KEYID = 6
6,368,549 UART: [ldev] SUBJECT.KEYID = 5
6,369,657 UART: [ldev] AUTHORITY.KEYID = 7
6,370,833 UART: [ldev] FE.KEYID = 1
6,381,750 UART: [ldev] Erasing FE.KEYID = 1
8,855,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,753 UART: [ldev] --
10,646,122 UART: [fwproc] Wait for Commands...
10,647,841 UART: [fwproc] Recv command 0x46574c44
10,650,150 UART: [fwproc] Recv'd Img size: 114168 bytes
15,268,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,349,771 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,465,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,007,562 >>> mbox cmd response: success
16,011,789 UART: [afmc] ++
16,012,503 UART: [afmc] CDI.KEYID = 6
16,013,695 UART: [afmc] SUBJECT.KEYID = 7
16,015,194 UART: [afmc] AUTHORITY.KEYID = 5
18,518,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,239,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,240,994 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,256,062 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,271,278 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,286,156 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,310,178 UART: [afmc] --
20,313,721 UART: [cold-reset] --
20,317,209 UART: [state] Locking Datavault
20,323,434 UART: [state] Locking PCR0, PCR1 and PCR31
20,325,640 UART: [state] Locking ICCM
20,326,851 UART: [exit] Launching FMC @ 0x40000130
20,335,524 UART:
20,335,765 UART: Running Caliptra FMC ...
20,336,796 UART:
20,336,946 UART: [state] CFI Enabled
20,344,940 UART: [fht] FMC Alias Private Key: 7
22,101,974 UART: [art] Extend RT PCRs Done
22,103,191 UART: [art] Lock RT PCRs Done
22,104,839 UART: [art] Populate DV Done
22,110,139 UART: [fht] FMC Alias Private Key: 7
22,111,619 UART: [art] Derive CDI
22,112,383 UART: [art] Store in in slot 0x4
22,155,017 UART: [art] Derive Key Pair
22,156,050 UART: [art] Store priv key in slot 0x5
24,582,992 UART: [art] Derive Key Pair - Done
24,596,486 UART: [art] Signing Cert with AUTHO
24,597,788 UART: RITY.KEYID = 7
26,303,370 UART: [art] Erasing AUTHORITY.KEYID = 7
26,304,873 UART: [art] PUB.X = AC9041938C830EBB35EC54A27E56B195C3A06EA66E1B4F5D8CACE693C4DBA9F9B413F82964F205D6F293AD96E8FC3AC5
26,312,183 UART: [art] PUB.Y = D60AF95D9E184F152FAD91C597668D543700388F590842F61F5633827ECF66509718290CA3129545AB19B2E94605F8CE
26,319,417 UART: [art] SIG.R = 0130919DE8386596F600ECBE942B8EEAFEE8D99B02758A7F83FB3A4C7FE5C18E843BA769BCE7D0538A507667C0C52559
26,326,755 UART: [art] SIG.S = 1E6C67A9F8608F0E47A697E6747616D29AEA33A957807B69D6DBA5FED15312638A5F85AEC9DB9E2DE6D07D906FEB8A92
27,305,390 UART: Caliptra RT
27,306,096 UART: [state] CFI Enabled
27,422,624 UART: [rt] RT listening for mailbox commands...
27,424,929 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,580,239 UART: [rt]cmd =0x41544d4e, len=14344
31,162,424 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,816 writing to cptra_bootfsm_go
3,758,544 ready_for_fw is high
3,758,923 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,039,213 >>> mbox cmd response: success
20,294,492 UART:
20,294,900 UART: Running Caliptra FMC ...
20,296,036 UART:
20,296,207 UART: [state] CFI Enabled
20,304,307 UART: [fht] FMC Alias Private Key: 7
22,061,470 UART: [art] Extend RT PCRs Done
22,062,706 UART: [art] Lock RT PCRs Done
22,064,148 UART: [art] Populate DV Done
22,069,841 UART: [fht] FMC Alias Private Key: 7
22,071,546 UART: [art] Derive CDI
22,072,289 UART: [art] Store in in slot 0x4
22,114,781 UART: [art] Derive Key Pair
22,115,783 UART: [art] Store priv key in slot 0x5
24,542,515 UART: [art] Derive Key Pair - Done
24,555,138 UART: [art] Signing Cert with AUTHO
24,556,441 UART: RITY.KEYID = 7
26,261,776 UART: [art] Erasing AUTHORITY.KEYID = 7
26,263,278 UART: [art] PUB.X = 74F4EC035348C155AC5386EB3C5448FA9A01DF2D4139964B883B85E6AF31EB9C7A78B1967AE848C13EB91CEBA07863EF
26,270,577 UART: [art] PUB.Y = 96DC71E0BD3B51132B0E55A59FC04E8FDA2839E6A9C26CD7818AD3B8DB561EDE70EFB821B48AF101761F5B7CC3BF06CB
26,277,845 UART: [art] SIG.R = B1CCF83539353EDEFE0350623641C9E8D532BB4680DFA86B6D49368009A5AE75FB7711A9F86D081CEEA950B682B189F1
26,285,245 UART: [art] SIG.S = 1A184D161A887424FA306047C37D5C3417B9B8F7945290195EEB7158CBE8E04F60D0D0EA3B0CFE2893394550AB5E961F
27,264,130 UART: Caliptra RT
27,264,834 UART: [state] CFI Enabled
27,383,087 UART: [rt] RT listening for mailbox commands...
27,385,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,540,695 UART: [rt]cmd =0x41544d4e, len=14344
31,108,327 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,966 UART: [kat] SHA2-512-ACC
896,867 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
906,924 UART: [kat] LMS
1,475,120 UART: [kat] --
1,476,191 UART: [cold-reset] ++
1,476,589 UART: [fht] Storing FHT @ 0x50003400
1,479,386 UART: [idev] ++
1,479,554 UART: [idev] CDI.KEYID = 6
1,479,914 UART: [idev] SUBJECT.KEYID = 7
1,480,338 UART: [idev] UDS.KEYID = 0
1,480,683 ready_for_fw is high
1,480,683 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,282 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,634 UART: [idev] --
1,514,607 UART: [ldev] ++
1,514,775 UART: [ldev] CDI.KEYID = 6
1,515,138 UART: [ldev] SUBJECT.KEYID = 5
1,515,564 UART: [ldev] AUTHORITY.KEYID = 7
1,516,027 UART: [ldev] FE.KEYID = 1
1,521,295 UART: [ldev] Erasing FE.KEYID = 1
1,547,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,266 UART: [ldev] --
1,586,639 UART: [fwproc] Waiting for Commands...
1,587,506 UART: [fwproc] Received command 0x46574c44
1,588,297 UART: [fwproc] Received Image of size 114168 bytes
5,271,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,299,268 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,328,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,464,115 >>> mbox cmd response: success
5,465,345 UART: [afmc] ++
5,465,513 UART: [afmc] CDI.KEYID = 6
5,465,875 UART: [afmc] SUBJECT.KEYID = 7
5,466,300 UART: [afmc] AUTHORITY.KEYID = 5
5,501,432 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,517,648 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,518,428 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,524,137 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,530,029 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,535,730 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,543,658 UART: [afmc] --
5,544,646 UART: [cold-reset] --
5,545,778 UART: [state] Locking Datavault
5,547,117 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,721 UART: [state] Locking ICCM
5,548,331 UART: [exit] Launching FMC @ 0x40000130
5,553,660 UART:
5,553,676 UART: Running Caliptra FMC ...
5,554,084 UART:
5,554,138 UART: [state] CFI Enabled
5,564,888 UART: [fht] FMC Alias Private Key: 7
5,671,792 UART: [art] Extend RT PCRs Done
5,672,220 UART: [art] Lock RT PCRs Done
5,673,834 UART: [art] Populate DV Done
5,682,056 UART: [fht] FMC Alias Private Key: 7
5,683,122 UART: [art] Derive CDI
5,683,402 UART: [art] Store in in slot 0x4
5,768,835 UART: [art] Derive Key Pair
5,769,195 UART: [art] Store priv key in slot 0x5
5,782,669 UART: [art] Derive Key Pair - Done
5,797,376 UART: [art] Signing Cert with AUTHO
5,797,856 UART: RITY.KEYID = 7
5,812,900 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,665 UART: [art] PUB.X = 6BE7C038D3AE920120B6E3B6A2F78D1F8CAD74FCA052B4EA317C052FAE18C3CAFF961795EB3EB0A98033FDEEC8BA9154
5,820,453 UART: [art] PUB.Y = F3BF3FDCC9424A71948E0FB88812D1ED9CB6796E5B2947E524AC0A1989BEB84613584EC2D30F0E70C3967315F1E75AE7
5,827,399 UART: [art] SIG.R = C5E9FD12C1BE04ABA327AC162EEE08C4FB1AA3A3B17EE160F79C67E01BF5617B446B51C7A632C9531776BFF906687168
5,834,172 UART: [art] SIG.S = A98E07ED2BCF87EC5932EB3458A99E55BEE3C33AAE003A5E9DA45A2D7E868594EA6213A35C9218F8D6545F291EB0BA28
5,858,174 UART: Caliptra RT
5,858,427 UART: [state] CFI Enabled
5,966,771 UART: [rt] RT listening for mailbox commands...
5,967,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,090,423 UART: [rt]cmd =0x41544d4e, len=14344
7,008,568 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,499 ready_for_fw is high
1,363,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,048,920 >>> mbox cmd response: success
5,110,945 UART:
5,110,961 UART: Running Caliptra FMC ...
5,111,369 UART:
5,111,423 UART: [state] CFI Enabled
5,122,011 UART: [fht] FMC Alias Private Key: 7
5,230,109 UART: [art] Extend RT PCRs Done
5,230,537 UART: [art] Lock RT PCRs Done
5,232,143 UART: [art] Populate DV Done
5,240,187 UART: [fht] FMC Alias Private Key: 7
5,241,193 UART: [art] Derive CDI
5,241,473 UART: [art] Store in in slot 0x4
5,327,180 UART: [art] Derive Key Pair
5,327,540 UART: [art] Store priv key in slot 0x5
5,340,784 UART: [art] Derive Key Pair - Done
5,355,582 UART: [art] Signing Cert with AUTHO
5,356,062 UART: RITY.KEYID = 7
5,370,862 UART: [art] Erasing AUTHORITY.KEYID = 7
5,371,627 UART: [art] PUB.X = 58609B92950FD841B77F67F75B0DA3FBB719C294FDB839E58263F268E337D84B452608EB4E1C86F4067DFA2723D9B0DA
5,378,389 UART: [art] PUB.Y = EA4C61EF0ED985657F74123E5424B38D50426EB64CF7D203B8C2DB29FECAB69E238EA877DE51BAA39DFBE296334B2152
5,385,347 UART: [art] SIG.R = F56B5A0E23A74C9601198377BE600103AEC9151A4B6C2437B60673A08AD641C3EEFD57B19EAA0F8716CA42DBFB09AEDC
5,392,110 UART: [art] SIG.S = FA0EB66C3228D657F909EC81130B213E8C9B1AD7F9F8A2AF8C3B4CAF2B397990A40B4ABC2E63F6000D1294669F11FE3B
5,415,356 UART: Caliptra RT
5,415,609 UART: [state] CFI Enabled
5,523,511 UART: [rt] RT listening for mailbox commands...
5,524,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,647,391 UART: [rt]cmd =0x41544d4e, len=14344
6,570,722 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,150 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,678 UART: [kat] SHA2-256
882,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,724 UART: [kat] ++
886,876 UART: [kat] sha1
891,028 UART: [kat] SHA2-256
892,966 UART: [kat] SHA2-384
895,865 UART: [kat] SHA2-512-ACC
897,766 UART: [kat] ECC-384
903,527 UART: [kat] HMAC-384Kdf
908,251 UART: [kat] LMS
1,476,447 UART: [kat] --
1,477,212 UART: [cold-reset] ++
1,477,650 UART: [fht] Storing FHT @ 0x50003400
1,480,331 UART: [idev] ++
1,480,499 UART: [idev] CDI.KEYID = 6
1,480,859 UART: [idev] SUBJECT.KEYID = 7
1,481,283 UART: [idev] UDS.KEYID = 0
1,481,628 ready_for_fw is high
1,481,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,373 UART: [idev] Erasing UDS.KEYID = 0
1,506,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,049 UART: [idev] --
1,516,220 UART: [ldev] ++
1,516,388 UART: [ldev] CDI.KEYID = 6
1,516,751 UART: [ldev] SUBJECT.KEYID = 5
1,517,177 UART: [ldev] AUTHORITY.KEYID = 7
1,517,640 UART: [ldev] FE.KEYID = 1
1,522,870 UART: [ldev] Erasing FE.KEYID = 1
1,548,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,817 UART: [ldev] --
1,588,172 UART: [fwproc] Waiting for Commands...
1,588,819 UART: [fwproc] Received command 0x46574c44
1,589,610 UART: [fwproc] Received Image of size 114168 bytes
5,196,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,224,973 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,254,325 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,389,866 >>> mbox cmd response: success
5,391,042 UART: [afmc] ++
5,391,210 UART: [afmc] CDI.KEYID = 6
5,391,572 UART: [afmc] SUBJECT.KEYID = 7
5,391,997 UART: [afmc] AUTHORITY.KEYID = 5
5,426,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,443,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,444,013 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,449,722 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,455,614 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,461,315 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,469,277 UART: [afmc] --
5,470,333 UART: [cold-reset] --
5,471,163 UART: [state] Locking Datavault
5,472,458 UART: [state] Locking PCR0, PCR1 and PCR31
5,473,062 UART: [state] Locking ICCM
5,473,504 UART: [exit] Launching FMC @ 0x40000130
5,478,833 UART:
5,478,849 UART: Running Caliptra FMC ...
5,479,257 UART:
5,479,400 UART: [state] CFI Enabled
5,490,176 UART: [fht] FMC Alias Private Key: 7
5,598,082 UART: [art] Extend RT PCRs Done
5,598,510 UART: [art] Lock RT PCRs Done
5,599,886 UART: [art] Populate DV Done
5,608,068 UART: [fht] FMC Alias Private Key: 7
5,609,132 UART: [art] Derive CDI
5,609,412 UART: [art] Store in in slot 0x4
5,695,229 UART: [art] Derive Key Pair
5,695,589 UART: [art] Store priv key in slot 0x5
5,708,581 UART: [art] Derive Key Pair - Done
5,723,225 UART: [art] Signing Cert with AUTHO
5,723,705 UART: RITY.KEYID = 7
5,739,387 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,152 UART: [art] PUB.X = 72885FBA8EFC2248611015D9A775490C90897BCCF420A5A16428EC1CBCB4AAE0C71D746C16B7048537E1E705A7F6EE38
5,746,919 UART: [art] PUB.Y = 1FAABDE48AE2FDDB801ECACE8066602D2EEBE0F8CA632F359468E1034216D0A15E1BD6047843006C692BD9EC3625F9D5
5,753,857 UART: [art] SIG.R = 21BB8B9FE86E2064F446EF3B33895DFF7CD624FEE52975C9F4796ED8EB903083F64C2FCAA103A26A0A5E74C44D847079
5,760,631 UART: [art] SIG.S = C5B544A31A5D3BD698C1BE401392E8967F80323C06780BCD9FAEA4973ED71463851B4E6ED72083804500716EFE4C8DB7
5,784,522 UART: Caliptra RT
5,784,867 UART: [state] CFI Enabled
5,892,826 UART: [rt] RT listening for mailbox commands...
5,893,496 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,586 UART: [rt]cmd =0x41544d4e, len=14344
6,929,815 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,364 ready_for_fw is high
1,362,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,935,150 >>> mbox cmd response: success
4,995,733 UART:
4,995,749 UART: Running Caliptra FMC ...
4,996,157 UART:
4,996,300 UART: [state] CFI Enabled
5,006,614 UART: [fht] FMC Alias Private Key: 7
5,114,216 UART: [art] Extend RT PCRs Done
5,114,644 UART: [art] Lock RT PCRs Done
5,116,072 UART: [art] Populate DV Done
5,124,446 UART: [fht] FMC Alias Private Key: 7
5,125,566 UART: [art] Derive CDI
5,125,846 UART: [art] Store in in slot 0x4
5,211,811 UART: [art] Derive Key Pair
5,212,171 UART: [art] Store priv key in slot 0x5
5,225,693 UART: [art] Derive Key Pair - Done
5,240,524 UART: [art] Signing Cert with AUTHO
5,241,004 UART: RITY.KEYID = 7
5,255,932 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,697 UART: [art] PUB.X = AC9B4A59167452ECD55F9EE84CFDA9494DEB29BCC6555D69BD62EDA7464FE60DCCF3DB58497B947B5B11745A4689A170
5,263,480 UART: [art] PUB.Y = F7BFDA1C4B4C8793B488F34C2804753A13198EB153726093B4B9242CAF0B3FBD91F76A4603B6A4F4B43B3C252CBBB92E
5,270,431 UART: [art] SIG.R = D1470412F80E8438853288411542B8BDC9E3DC538556457D74730188E49C46247AF2559FFFAE7F5923D66BFED1A0E144
5,277,186 UART: [art] SIG.S = 5D2C2471AB01ECD660A5F45334B39573E433C97BD3BE2510AA794D44D982701E1FF45E798EB84DD927165C83E8A50867
5,301,265 UART: Caliptra RT
5,301,610 UART: [state] CFI Enabled
5,409,469 UART: [rt] RT listening for mailbox commands...
5,410,139 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,533,179 UART: [rt]cmd =0x41544d4e, len=14344
6,458,183 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
893,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,761 UART: [kat] ++
897,913 UART: [kat] sha1
902,311 UART: [kat] SHA2-256
904,251 UART: [kat] SHA2-384
906,818 UART: [kat] SHA2-512-ACC
908,719 UART: [kat] ECC-384
918,252 UART: [kat] HMAC-384Kdf
922,798 UART: [kat] LMS
1,171,126 UART: [kat] --
1,171,981 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,110 UART: [idev] ++
1,175,278 UART: [idev] CDI.KEYID = 6
1,175,638 UART: [idev] SUBJECT.KEYID = 7
1,176,062 UART: [idev] UDS.KEYID = 0
1,176,407 ready_for_fw is high
1,176,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,636 UART: [idev] Erasing UDS.KEYID = 0
1,200,013 UART: [idev] Sha1 KeyId Algorithm
1,208,493 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,972 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,215,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,569 UART: [ldev] --
1,280,984 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,432 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,119 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,313,650 >>> mbox cmd response: success
3,314,820 UART: [afmc] ++
3,314,988 UART: [afmc] CDI.KEYID = 6
3,315,350 UART: [afmc] SUBJECT.KEYID = 7
3,315,775 UART: [afmc] AUTHORITY.KEYID = 5
3,350,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,520 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,368,268 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,977 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,869 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,580 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,417 UART: [afmc] --
3,394,515 UART: [cold-reset] --
3,395,347 UART: [state] Locking Datavault
3,396,460 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,064 UART: [state] Locking ICCM
3,397,670 UART: [exit] Launching FMC @ 0x40000130
3,402,999 UART:
3,403,015 UART: Running Caliptra FMC ...
3,403,423 UART:
3,403,477 UART: [state] CFI Enabled
3,414,067 UART: [fht] FMC Alias Private Key: 7
3,522,267 UART: [art] Extend RT PCRs Done
3,522,695 UART: [art] Lock RT PCRs Done
3,524,317 UART: [art] Populate DV Done
3,532,641 UART: [fht] FMC Alias Private Key: 7
3,533,621 UART: [art] Derive CDI
3,533,901 UART: [art] Store in in slot 0x4
3,619,666 UART: [art] Derive Key Pair
3,620,026 UART: [art] Store priv key in slot 0x5
3,633,008 UART: [art] Derive Key Pair - Done
3,647,763 UART: [art] Signing Cert with AUTHO
3,648,243 UART: RITY.KEYID = 7
3,663,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,230 UART: [art] PUB.X = 00902E455951D9E1291E9FB524E301515BBBDA9E34E5112A3A75625F31FEC6C6902EF9CEEEA957CBB39B40B632C38BDD
3,670,987 UART: [art] PUB.Y = D7DE0A9199FB00CE7E543EB9A63CE5C58B6BB286711B1698338C731F1DEB70E71BCE38D1E4A5F50FEC1339B58FB71A75
3,677,925 UART: [art] SIG.R = 43B999FB7DD54F03E9ABAD9A5E67C98785955177E6DB51713B16AE40DA7EF22D6BC1303841BE8285E13A16C682E65CB4
3,684,700 UART: [art] SIG.S = CECDF88E79F3EC0A9DB9E1ADEDF47F12D4E82BFF34FDDF6D856B6F48983B7F86F75BD3BEC914D185A0E89AE109DD5E7B
3,708,231 UART: Caliptra RT
3,708,484 UART: [state] CFI Enabled
3,816,494 UART: [rt] RT listening for mailbox commands...
3,817,164 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,224 UART: [rt]cmd =0x41544d4e, len=14344
4,863,205 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,655 ready_for_fw is high
1,059,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,168,320 >>> mbox cmd response: success
3,230,855 UART:
3,230,871 UART: Running Caliptra FMC ...
3,231,279 UART:
3,231,333 UART: [state] CFI Enabled
3,241,993 UART: [fht] FMC Alias Private Key: 7
3,349,895 UART: [art] Extend RT PCRs Done
3,350,323 UART: [art] Lock RT PCRs Done
3,351,993 UART: [art] Populate DV Done
3,360,119 UART: [fht] FMC Alias Private Key: 7
3,361,173 UART: [art] Derive CDI
3,361,453 UART: [art] Store in in slot 0x4
3,447,354 UART: [art] Derive Key Pair
3,447,714 UART: [art] Store priv key in slot 0x5
3,461,066 UART: [art] Derive Key Pair - Done
3,476,078 UART: [art] Signing Cert with AUTHO
3,476,558 UART: RITY.KEYID = 7
3,491,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,219 UART: [art] PUB.X = F00F3FB6AC1B85946AFC3D67785864B4EA1BB87E93A98D8739020EC9E38C886FF1060588273D35B3DA6A722F35A341CC
3,498,980 UART: [art] PUB.Y = 6AB624BCB30544EE20AA87D1E15FADDA96E122FCF6F21938A176556D33A8F3A043CF9D7C2D45041DA73DBD72A2591475
3,505,936 UART: [art] SIG.R = 339C171D202B5F1EB038F9D900E1FECC4312383A9263339821913C645674F77A8178E246530C81C423A6C36624A99F19
3,512,667 UART: [art] SIG.S = E68C55E236FFCEE70131A4FB262FE7ADF710D895A5DD91C94DB62FF88AD015C803F615B0D3B3D0DBF1C1217F54FB0259
3,536,451 UART: Caliptra RT
3,536,704 UART: [state] CFI Enabled
3,644,482 UART: [rt] RT listening for mailbox commands...
3,645,152 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,280 UART: [rt]cmd =0x41544d4e, len=14344
4,678,828 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
893,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,392 UART: [kat] ++
897,544 UART: [kat] sha1
901,900 UART: [kat] SHA2-256
903,840 UART: [kat] SHA2-384
906,503 UART: [kat] SHA2-512-ACC
908,404 UART: [kat] ECC-384
918,369 UART: [kat] HMAC-384Kdf
923,017 UART: [kat] LMS
1,171,345 UART: [kat] --
1,172,230 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,337 UART: [idev] ++
1,175,505 UART: [idev] CDI.KEYID = 6
1,175,865 UART: [idev] SUBJECT.KEYID = 7
1,176,289 UART: [idev] UDS.KEYID = 0
1,176,634 ready_for_fw is high
1,176,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,263 UART: [idev] Erasing UDS.KEYID = 0
1,200,604 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,132 UART: [ldev] ++
1,210,300 UART: [ldev] CDI.KEYID = 6
1,210,663 UART: [ldev] SUBJECT.KEYID = 5
1,211,089 UART: [ldev] AUTHORITY.KEYID = 7
1,211,552 UART: [ldev] FE.KEYID = 1
1,216,988 UART: [ldev] Erasing FE.KEYID = 1
1,243,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,804 UART: [ldev] --
1,282,085 UART: [fwproc] Wait for Commands...
1,282,889 UART: [fwproc] Recv command 0x46574c44
1,283,617 UART: [fwproc] Recv'd Img size: 114168 bytes
3,114,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,306,914 >>> mbox cmd response: success
3,308,078 UART: [afmc] ++
3,308,246 UART: [afmc] CDI.KEYID = 6
3,308,608 UART: [afmc] SUBJECT.KEYID = 7
3,309,033 UART: [afmc] AUTHORITY.KEYID = 5
3,344,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,386 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,095 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,373,987 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,379,698 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,641 UART: [afmc] --
3,388,609 UART: [cold-reset] --
3,389,317 UART: [state] Locking Datavault
3,390,424 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,028 UART: [state] Locking ICCM
3,391,646 UART: [exit] Launching FMC @ 0x40000130
3,396,975 UART:
3,396,991 UART: Running Caliptra FMC ...
3,397,399 UART:
3,397,542 UART: [state] CFI Enabled
3,408,182 UART: [fht] FMC Alias Private Key: 7
3,516,118 UART: [art] Extend RT PCRs Done
3,516,546 UART: [art] Lock RT PCRs Done
3,518,112 UART: [art] Populate DV Done
3,526,332 UART: [fht] FMC Alias Private Key: 7
3,527,296 UART: [art] Derive CDI
3,527,576 UART: [art] Store in in slot 0x4
3,613,533 UART: [art] Derive Key Pair
3,613,893 UART: [art] Store priv key in slot 0x5
3,626,919 UART: [art] Derive Key Pair - Done
3,641,701 UART: [art] Signing Cert with AUTHO
3,642,181 UART: RITY.KEYID = 7
3,657,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,530 UART: [art] PUB.X = C5E86F9ABACA6C16661680A2FF30B31873C074F5892826445DA56E6AEA3413265FC4A4F00406B2F9276048395C794842
3,665,288 UART: [art] PUB.Y = B0C6FD22B33225C2C9DFDE994F70F01A5F51CED9C289EED72FE71638389AD7153021AF59E7C8AC2E786C504E2512C302
3,672,245 UART: [art] SIG.R = 914187E5405BB5C416049EAD6E1BF4C809C7E75362178CEA056C1CB8A86300840DF5615E207535755497804330BCA344
3,678,971 UART: [art] SIG.S = 83DA82E5A7D54872961B7AC9EFCF1D0634E5BB06D26CCB05435DD9B72AA7ACD61D4342C41DBA81901034B2A00FBF50E2
3,702,706 UART: Caliptra RT
3,703,051 UART: [state] CFI Enabled
3,810,630 UART: [rt] RT listening for mailbox commands...
3,811,300 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,282 UART: [rt]cmd =0x41544d4e, len=14344
4,854,966 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,620 ready_for_fw is high
1,060,620 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,167,644 >>> mbox cmd response: success
3,230,421 UART:
3,230,437 UART: Running Caliptra FMC ...
3,230,845 UART:
3,230,988 UART: [state] CFI Enabled
3,241,548 UART: [fht] FMC Alias Private Key: 7
3,348,990 UART: [art] Extend RT PCRs Done
3,349,418 UART: [art] Lock RT PCRs Done
3,351,014 UART: [art] Populate DV Done
3,359,456 UART: [fht] FMC Alias Private Key: 7
3,360,432 UART: [art] Derive CDI
3,360,712 UART: [art] Store in in slot 0x4
3,446,451 UART: [art] Derive Key Pair
3,446,811 UART: [art] Store priv key in slot 0x5
3,460,207 UART: [art] Derive Key Pair - Done
3,474,912 UART: [art] Signing Cert with AUTHO
3,475,392 UART: RITY.KEYID = 7
3,491,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,863 UART: [art] PUB.X = 3059829FBF67B73E014C9C06E9E516550E723C117512D47D6D86B6FFD629151C2F06657945A73489ABD0E7B74B3A5FE6
3,498,619 UART: [art] PUB.Y = 67340D4A977C542503546E06532E06FB50C312FAC1E4A6868EC7CE385E2A73C3B433D110F595FDE467B765C67AD084CB
3,505,559 UART: [art] SIG.R = 690D4299867A5D5A24134167EF3B4B1F9321F3F89C252C4CD1003934BBADD249E43B38644F049BB36E68DC8335AA721C
3,512,301 UART: [art] SIG.S = 9AE244E27FC6A63C541FFC8F52454D47A8CDE3CCB0A6027D47B8C6EF54D6E688DA46B3EC4551F8F8820C69C7058F7568
3,536,099 UART: Caliptra RT
3,536,444 UART: [state] CFI Enabled
3,643,856 UART: [rt] RT listening for mailbox commands...
3,644,526 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,570 UART: [rt]cmd =0x41544d4e, len=14344
4,678,228 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,170,311 UART: [cold-reset] ++
1,170,785 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,174,569 ready_for_fw is high
1,174,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,067 UART: [idev] Erasing UDS.KEYID = 0
1,198,841 UART: [idev] Sha1 KeyId Algorithm
1,207,895 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,342 UART: [ldev] Erasing FE.KEYID = 1
1,241,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,281,010 UART: [fwproc] Wait for Commands...
1,281,693 UART: [fwproc] Recv command 0x46574c44
1,282,426 UART: [fwproc] Recv'd Img size: 114168 bytes
3,128,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,156,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,321,346 >>> mbox cmd response: success
3,322,373 UART: [afmc] ++
3,322,541 UART: [afmc] CDI.KEYID = 6
3,322,904 UART: [afmc] SUBJECT.KEYID = 7
3,323,330 UART: [afmc] AUTHORITY.KEYID = 5
3,358,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,013 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,381,723 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,387,613 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,393,324 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,401,172 UART: [afmc] --
3,402,264 UART: [cold-reset] --
3,403,330 UART: [state] Locking Datavault
3,404,615 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,219 UART: [state] Locking ICCM
3,405,701 UART: [exit] Launching FMC @ 0x40000130
3,411,030 UART:
3,411,046 UART: Running Caliptra FMC ...
3,411,454 UART:
3,411,508 UART: [state] CFI Enabled
3,422,054 UART: [fht] FMC Alias Private Key: 7
3,529,596 UART: [art] Extend RT PCRs Done
3,530,024 UART: [art] Lock RT PCRs Done
3,531,834 UART: [art] Populate DV Done
3,539,890 UART: [fht] FMC Alias Private Key: 7
3,540,866 UART: [art] Derive CDI
3,541,146 UART: [art] Store in in slot 0x4
3,626,747 UART: [art] Derive Key Pair
3,627,107 UART: [art] Store priv key in slot 0x5
3,640,309 UART: [art] Derive Key Pair - Done
3,655,468 UART: [art] Signing Cert with AUTHO
3,655,948 UART: RITY.KEYID = 7
3,671,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,099 UART: [art] PUB.X = 31ED2150AACA5AE872B989BA9E30E4341B3508E2930ADCF71C61F317420ABA6327152880D1E3CD644FDB6ECBEBEFB39C
3,678,878 UART: [art] PUB.Y = 91D25CDF7FC2F689FB13111DB0A2014E6967AC9B39E8764E778A687AF8E685461E50F6279C8F54CC4EB013F9D934D06A
3,685,831 UART: [art] SIG.R = FE5924E6CB00ECE40F5CF8A37E2490EFE5765DD728EB7F7C63FE915CFCEFFB3FA95D57C219E93E0450EE20699DEA7EC9
3,692,599 UART: [art] SIG.S = 14D9C4596E3A77633CD221BAE4A6F2B52D2B7AE88C46D6C511D2754DE06A2108C915ED35934D46BF534F87767A2A9348
3,716,301 UART: Caliptra RT
3,716,554 UART: [state] CFI Enabled
3,824,252 UART: [rt] RT listening for mailbox commands...
3,824,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,116 UART: [rt]cmd =0x41544d4e, len=14344
4,858,418 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,592 ready_for_fw is high
1,056,592 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,772 >>> mbox cmd response: success
3,226,353 UART:
3,226,369 UART: Running Caliptra FMC ...
3,226,777 UART:
3,226,831 UART: [state] CFI Enabled
3,237,103 UART: [fht] FMC Alias Private Key: 7
3,344,797 UART: [art] Extend RT PCRs Done
3,345,225 UART: [art] Lock RT PCRs Done
3,346,677 UART: [art] Populate DV Done
3,354,891 UART: [fht] FMC Alias Private Key: 7
3,356,025 UART: [art] Derive CDI
3,356,305 UART: [art] Store in in slot 0x4
3,441,914 UART: [art] Derive Key Pair
3,442,274 UART: [art] Store priv key in slot 0x5
3,455,768 UART: [art] Derive Key Pair - Done
3,470,347 UART: [art] Signing Cert with AUTHO
3,470,827 UART: RITY.KEYID = 7
3,485,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,704 UART: [art] PUB.X = 7F40D0A559579A4DFB7EAAA26D9301F96C160E048C28AEC6812B67AA15697516A3878E8DCAC6AB97E00E1B35242C687C
3,493,470 UART: [art] PUB.Y = CCDC34285DD95BCE96B0BA22804142F88AB060E843AC21C5F7A69CC497FDDD6A95DC8B42CE510986947506EB59F3F2FF
3,500,430 UART: [art] SIG.R = 06867CABA8EDDCB4929499E9E08A771CAE8213B3BBE77DA49E1CA8D846AFED9B4909A6887B3EBA36ED442E836F79AF01
3,507,211 UART: [art] SIG.S = 92F6DD1DF82869AFDF2D53B83B786A767E70BB12673482A4BAB31162F2C6679B362B7C6A851C27CC1B2AC5962D422FE9
3,531,792 UART: Caliptra RT
3,532,045 UART: [state] CFI Enabled
3,639,925 UART: [rt] RT listening for mailbox commands...
3,640,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,575 UART: [rt]cmd =0x41544d4e, len=14344
4,686,122 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,662 UART: [kat] ++
895,814 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,519 UART: [kat] HMAC-384Kdf
921,377 UART: [kat] LMS
1,169,689 UART: [kat] --
1,170,694 UART: [cold-reset] ++
1,171,140 UART: [fht] FHT @ 0x50003400
1,173,814 UART: [idev] ++
1,173,982 UART: [idev] CDI.KEYID = 6
1,174,343 UART: [idev] SUBJECT.KEYID = 7
1,174,768 UART: [idev] UDS.KEYID = 0
1,175,114 ready_for_fw is high
1,175,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,200,168 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,773 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,216,779 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,501 UART: [fwproc] Wait for Commands...
1,283,160 UART: [fwproc] Recv command 0x46574c44
1,283,893 UART: [fwproc] Recv'd Img size: 114168 bytes
3,122,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,941 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,314,790 >>> mbox cmd response: success
3,315,851 UART: [afmc] ++
3,316,019 UART: [afmc] CDI.KEYID = 6
3,316,382 UART: [afmc] SUBJECT.KEYID = 7
3,316,808 UART: [afmc] AUTHORITY.KEYID = 5
3,352,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,851 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,561 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,451 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,162 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,988 UART: [afmc] --
3,396,038 UART: [cold-reset] --
3,397,206 UART: [state] Locking Datavault
3,398,303 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,907 UART: [state] Locking ICCM
3,399,457 UART: [exit] Launching FMC @ 0x40000130
3,404,786 UART:
3,404,802 UART: Running Caliptra FMC ...
3,405,210 UART:
3,405,353 UART: [state] CFI Enabled
3,416,095 UART: [fht] FMC Alias Private Key: 7
3,524,105 UART: [art] Extend RT PCRs Done
3,524,533 UART: [art] Lock RT PCRs Done
3,525,569 UART: [art] Populate DV Done
3,533,609 UART: [fht] FMC Alias Private Key: 7
3,534,665 UART: [art] Derive CDI
3,534,945 UART: [art] Store in in slot 0x4
3,620,406 UART: [art] Derive Key Pair
3,620,766 UART: [art] Store priv key in slot 0x5
3,633,388 UART: [art] Derive Key Pair - Done
3,648,264 UART: [art] Signing Cert with AUTHO
3,648,744 UART: RITY.KEYID = 7
3,664,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,923 UART: [art] PUB.X = BC5975EF48BF9862E611AC9FFFDBAC79DB3EAF472ED20ADAE8570B81FE85C8BDB7B252DF7F197AED0C4600CC70FDD1B0
3,671,696 UART: [art] PUB.Y = 236CEB79B364BB640D1209E1DD2C87C7B81522B2B26D7A355649A8799DB8323D4B31DF20DE1FBEF7411FC6827B6CFDDB
3,678,654 UART: [art] SIG.R = 92E8AD3F85A0E7187BE995C28DEC59B1E8DC64584DEB4568E6D2CAE7F00161CBA4DBF69CB761432787A6C7CAF96FEEC8
3,685,443 UART: [art] SIG.S = 4D92F842DB4D69E778BF9FD4CC9C11AF45FA4E2009CB7B372ABEB59DA37760AEBE8190AF4F7D072D1995017DBB2236A7
3,708,855 UART: Caliptra RT
3,709,200 UART: [state] CFI Enabled
3,816,856 UART: [rt] RT listening for mailbox commands...
3,817,526 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,260 UART: [rt]cmd =0x41544d4e, len=14344
4,855,760 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,625 ready_for_fw is high
1,055,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,168,857 >>> mbox cmd response: success
3,230,834 UART:
3,230,850 UART: Running Caliptra FMC ...
3,231,258 UART:
3,231,401 UART: [state] CFI Enabled
3,242,047 UART: [fht] FMC Alias Private Key: 7
3,349,881 UART: [art] Extend RT PCRs Done
3,350,309 UART: [art] Lock RT PCRs Done
3,351,751 UART: [art] Populate DV Done
3,360,033 UART: [fht] FMC Alias Private Key: 7
3,361,061 UART: [art] Derive CDI
3,361,341 UART: [art] Store in in slot 0x4
3,446,982 UART: [art] Derive Key Pair
3,447,342 UART: [art] Store priv key in slot 0x5
3,460,752 UART: [art] Derive Key Pair - Done
3,475,384 UART: [art] Signing Cert with AUTHO
3,475,864 UART: RITY.KEYID = 7
3,491,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,041 UART: [art] PUB.X = 469EFF69D95CFE780F9BDBFB4277A419B3C6854B79915A749B3D9B099D461C4047C6367238BB20D282DD2E96D2A8A82D
3,498,811 UART: [art] PUB.Y = E9924B0B477976F85907CD6D7F8F9D7565CF63A314374CCCF29C436202AEFF02EEBC983265E88CB0D29F8BEA40E2FC4B
3,505,763 UART: [art] SIG.R = 66F334430C9034B3678F539E0FD84A12AAEB90E0F967570DCE0F912D7EBB5CA67FDA9C1C4819CC7C58E4E1BE82832C81
3,512,533 UART: [art] SIG.S = E753FC5618E81958D5E81F1171CE6E0EAD7E70DBFC4C5785B33E70362F28435ACEC902FB50B8197CA1DD2855CC712626
3,536,140 UART: Caliptra RT
3,536,485 UART: [state] CFI Enabled
3,643,987 UART: [rt] RT listening for mailbox commands...
3,644,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,483 UART: [rt]cmd =0x41544d4e, len=14344
4,680,654 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,048 UART:
192,560 UART: Running Caliptra ROM ...
193,773 UART:
193,938 UART: [state] CFI Enabled
261,169 UART: [state] LifecycleState = Unprovisioned
263,100 UART: [state] DebugLocked = No
264,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,392 UART: [kat] SHA2-256
439,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,645 UART: [kat] ++
450,132 UART: [kat] sha1
462,497 UART: [kat] SHA2-256
465,218 UART: [kat] SHA2-384
471,132 UART: [kat] SHA2-512-ACC
473,492 UART: [kat] ECC-384
2,767,664 UART: [kat] HMAC-384Kdf
2,799,456 UART: [kat] LMS
3,989,746 UART: [kat] --
3,994,547 UART: [cold-reset] ++
3,996,129 UART: [fht] Storing FHT @ 0x50003400
4,009,236 UART: [idev] ++
4,009,800 UART: [idev] CDI.KEYID = 6
4,010,829 UART: [idev] SUBJECT.KEYID = 7
4,011,997 UART: [idev] UDS.KEYID = 0
4,013,075 ready_for_fw is high
4,013,281 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,487 UART: [idev] Erasing UDS.KEYID = 0
7,346,951 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,236 UART: [idev] --
7,374,086 UART: [ldev] ++
7,374,648 UART: [ldev] CDI.KEYID = 6
7,375,582 UART: [ldev] SUBJECT.KEYID = 5
7,376,835 UART: [ldev] AUTHORITY.KEYID = 7
7,378,055 UART: [ldev] FE.KEYID = 1
7,420,070 UART: [ldev] Erasing FE.KEYID = 1
10,752,882 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,819 UART: [ldev] --
13,115,859 UART: [fwproc] Waiting for Commands...
13,117,833 UART: [fwproc] Received command 0x46574c44
13,120,006 UART: [fwproc] Received Image of size 113844 bytes
22,151,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,230,119 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,298,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,614,422 >>> mbox cmd response: success
22,618,185 UART: [afmc] ++
22,618,799 UART: [afmc] CDI.KEYID = 6
22,619,711 UART: [afmc] SUBJECT.KEYID = 7
22,620,977 UART: [afmc] AUTHORITY.KEYID = 5
25,995,458 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,296,650 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,298,904 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,313,466 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,328,214 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,342,430 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,365,257 UART: [afmc] --
28,368,330 UART: [cold-reset] --
28,372,680 UART: [state] Locking Datavault
28,378,894 UART: [state] Locking PCR0, PCR1 and PCR31
28,380,644 UART: [state] Locking ICCM
28,381,812 UART: [exit] Launching FMC @ 0x40000130
28,390,215 UART:
28,390,472 UART: Running Caliptra FMC ...
28,391,570 UART:
28,391,724 UART: [state] CFI Enabled
28,455,875 UART: [fht] FMC Alias Private Key: 7
30,793,400 UART: [art] Extend RT PCRs Done
30,794,628 UART: [art] Lock RT PCRs Done
30,796,333 UART: [art] Populate DV Done
30,801,589 UART: [fht] FMC Alias Private Key: 7
30,803,285 UART: [art] Derive CDI
30,804,098 UART: [art] Store in in slot 0x4
30,864,750 UART: [art] Derive Key Pair
30,865,802 UART: [art] Store priv key in slot 0x5
34,159,313 UART: [art] Derive Key Pair - Done
34,172,380 UART: [art] Signing Cert with AUTHO
34,173,680 UART: RITY.KEYID = 7
36,461,097 UART: [art] Erasing AUTHORITY.KEYID = 7
36,462,624 UART: [art] PUB.X = 15BB4C68A14D0ADC50CDE422AA1DAB339D78B61CBE4AD032D540038CF89EA8B9D91D29BAF245BAFB1B0E9E720F914E0A
36,469,890 UART: [art] PUB.Y = 14521214DC1B52AE54FCE1189160FD9D4B71343BC3D637871D45EF8C520D51364212D466298C349123439332589D6DD0
36,477,088 UART: [art] SIG.R = DAC2960B0E7D429967BDFBE3422F4320961C01D06D9BCE60BDA21243DD841533C0340B65F616BB9B533EED4C93C99522
36,484,456 UART: [art] SIG.S = 3C0BB9109085C82063E0D0257310A6BF3688D5CE26E3990DF7B149E0DAE060088A7CA3B4C0A8555084C8D3E1C38A8CBF
37,789,924 UART: Caliptra RT
37,790,631 UART: [state] CFI Enabled
37,951,681 UART: [rt] RT listening for mailbox commands...
37,954,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,109,655 UART: [rt]cmd =0x41544d4e, len=14344
45,587,774 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
3,783,768 ready_for_fw is high
3,784,319 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,042,579 >>> mbox cmd response: success
27,729,070 UART:
27,729,469 UART: Running Caliptra FMC ...
27,730,615 UART:
27,730,771 UART: [state] CFI Enabled
27,800,695 UART: [fht] FMC Alias Private Key: 7
30,139,002 UART: [art] Extend RT PCRs Done
30,140,230 UART: [art] Lock RT PCRs Done
30,141,826 UART: [art] Populate DV Done
30,147,472 UART: [fht] FMC Alias Private Key: 7
30,149,058 UART: [art] Derive CDI
30,149,825 UART: [art] Store in in slot 0x4
30,211,508 UART: [art] Derive Key Pair
30,212,506 UART: [art] Store priv key in slot 0x5
33,504,880 UART: [art] Derive Key Pair - Done
33,517,957 UART: [art] Signing Cert with AUTHO
33,519,253 UART: RITY.KEYID = 7
35,806,407 UART: [art] Erasing AUTHORITY.KEYID = 7
35,807,909 UART: [art] PUB.X = 90280069AAAE843FAF1E9EB278304DEA75F9EF9884E13E3D7B910077B385D2D0A929207411583EE9989C3271C694C7AB
35,815,139 UART: [art] PUB.Y = D52F5457B6900AC63DFB59DF533272B14D2B662903039C21A9A430A6630F7AC5527C6484C4DE276A3DCD664309174F8C
35,822,352 UART: [art] SIG.R = A46A27C88C620CC11AB93F816BD29E272D258F0E57D222C90FB3053CC8AAC3CD77E7F14B9C33AED15536653E9BD01560
35,829,835 UART: [art] SIG.S = AAA9E6BFD713A31CD9289E871F3D05140B74F152930A6C42DC8AABF99031445BD072B4DFAAB8EEF12D86074BFB975D58
37,135,120 UART: Caliptra RT
37,135,821 UART: [state] CFI Enabled
37,297,738 UART: [rt] RT listening for mailbox commands...
37,300,085 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,455,307 UART: [rt]cmd =0x41544d4e, len=14344
44,933,349 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,593 UART:
192,958 UART: Running Caliptra ROM ...
194,145 UART:
603,786 UART: [state] CFI Enabled
618,596 UART: [state] LifecycleState = Unprovisioned
620,503 UART: [state] DebugLocked = No
622,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,327 UART: [kat] SHA2-256
798,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,630 UART: [kat] ++
809,078 UART: [kat] sha1
820,100 UART: [kat] SHA2-256
822,827 UART: [kat] SHA2-384
829,664 UART: [kat] SHA2-512-ACC
832,031 UART: [kat] ECC-384
3,117,069 UART: [kat] HMAC-384Kdf
3,127,980 UART: [kat] LMS
4,318,101 UART: [kat] --
4,323,887 UART: [cold-reset] ++
4,326,104 UART: [fht] Storing FHT @ 0x50003400
4,336,445 UART: [idev] ++
4,337,029 UART: [idev] CDI.KEYID = 6
4,338,061 UART: [idev] SUBJECT.KEYID = 7
4,339,247 UART: [idev] UDS.KEYID = 0
4,340,384 ready_for_fw is high
4,340,609 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,682 UART: [idev] Erasing UDS.KEYID = 0
7,627,172 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,539 UART: [idev] --
7,653,205 UART: [ldev] ++
7,653,792 UART: [ldev] CDI.KEYID = 6
7,654,776 UART: [ldev] SUBJECT.KEYID = 5
7,655,886 UART: [ldev] AUTHORITY.KEYID = 7
7,657,227 UART: [ldev] FE.KEYID = 1
7,669,167 UART: [ldev] Erasing FE.KEYID = 1
10,959,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,557 UART: [ldev] --
13,323,891 UART: [fwproc] Waiting for Commands...
13,326,511 UART: [fwproc] Received command 0x46574c44
13,328,702 UART: [fwproc] Received Image of size 113844 bytes
22,117,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,197,337 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,266,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,583,080 >>> mbox cmd response: success
22,587,337 UART: [afmc] ++
22,587,927 UART: [afmc] CDI.KEYID = 6
22,588,897 UART: [afmc] SUBJECT.KEYID = 7
22,590,110 UART: [afmc] AUTHORITY.KEYID = 5
25,906,074 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,199,293 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,201,548 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,216,119 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,230,828 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,245,089 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,268,090 UART: [afmc] --
28,272,612 UART: [cold-reset] --
28,277,823 UART: [state] Locking Datavault
28,283,568 UART: [state] Locking PCR0, PCR1 and PCR31
28,285,363 UART: [state] Locking ICCM
28,288,112 UART: [exit] Launching FMC @ 0x40000130
28,296,515 UART:
28,296,752 UART: Running Caliptra FMC ...
28,297,853 UART:
28,298,014 UART: [state] CFI Enabled
28,306,363 UART: [fht] FMC Alias Private Key: 7
30,636,824 UART: [art] Extend RT PCRs Done
30,638,047 UART: [art] Lock RT PCRs Done
30,639,782 UART: [art] Populate DV Done
30,645,351 UART: [fht] FMC Alias Private Key: 7
30,646,890 UART: [art] Derive CDI
30,647,702 UART: [art] Store in in slot 0x4
30,690,575 UART: [art] Derive Key Pair
30,691,619 UART: [art] Store priv key in slot 0x5
33,933,186 UART: [art] Derive Key Pair - Done
33,946,179 UART: [art] Signing Cert with AUTHO
33,947,478 UART: RITY.KEYID = 7
36,227,124 UART: [art] Erasing AUTHORITY.KEYID = 7
36,228,622 UART: [art] PUB.X = 1A0F7B7E2A255D4FA46867896B3BAB581E5E982E56B0D0924B1EE9F0705F0FDD22B317F4DBDE1422C0FA4C1BB35F1C06
36,235,871 UART: [art] PUB.Y = BDD3F46924A2B56BB5938358AF83F8F4F79172ECEE6C224C9BA0AA7A233DE3201115DACB8E1472BEBABABA5E5ACE6943
36,243,161 UART: [art] SIG.R = 800652F09731DA0A59B4FC4B863E1547C6EDEC72D0A0C1D36B6B46E4F9F3799679018EC9E8D01B93561442993475B183
36,250,510 UART: [art] SIG.S = 7FE26001428E52C4993ED82214A1C57AFD7756E38D99292BF890A00A0E290374A23C4257E5F04B0574E1E41A03138589
37,555,794 UART: Caliptra RT
37,556,485 UART: [state] CFI Enabled
37,675,172 UART: [rt] RT listening for mailbox commands...
37,677,449 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,832,584 UART: [rt]cmd =0x41544d4e, len=14344
45,362,208 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
4,131,431 ready_for_fw is high
4,131,845 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,896,389 >>> mbox cmd response: success
27,536,612 UART:
27,537,014 UART: Running Caliptra FMC ...
27,538,166 UART:
27,538,344 UART: [state] CFI Enabled
27,546,058 UART: [fht] FMC Alias Private Key: 7
29,877,122 UART: [art] Extend RT PCRs Done
29,878,356 UART: [art] Lock RT PCRs Done
29,880,413 UART: [art] Populate DV Done
29,885,821 UART: [fht] FMC Alias Private Key: 7
29,887,424 UART: [art] Derive CDI
29,888,243 UART: [art] Store in in slot 0x4
29,930,785 UART: [art] Derive Key Pair
29,931,788 UART: [art] Store priv key in slot 0x5
33,174,037 UART: [art] Derive Key Pair - Done
33,186,595 UART: [art] Signing Cert with AUTHO
33,187,912 UART: RITY.KEYID = 7
35,467,389 UART: [art] Erasing AUTHORITY.KEYID = 7
35,468,905 UART: [art] PUB.X = 2CD11A3F2221EA1D1B9E8EF32AB4A0868273B214F84A89783F2599CF13EAD0080AA5792D8B2E12C7821D7CE8B3E31C61
35,476,375 UART: [art] PUB.Y = 929FD1BC7006865F0CCC4171D4F4635EE92C860CE165819EE0A104910F51F6B5BCA6D536724560BCA91E6FC20547821E
35,483,396 UART: [art] SIG.R = 7E7176FFE65236DD360E56B7534B1A552F989904DB4B43539AC0E230600B8F9D64FE6D370A978437839AD404069EE59A
35,490,751 UART: [art] SIG.S = 801BB114CDF159A7E29465DCB86DB68AD72DCD12E94F5CA13F9BE49F72C266150DCB862B3BDF8D8E0C47D31223761950
36,796,327 UART: Caliptra RT
36,797,036 UART: [state] CFI Enabled
36,914,498 UART: [rt] RT listening for mailbox commands...
36,916,943 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,072,311 UART: [rt]cmd =0x41544d4e, len=14344
44,550,700 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,236 UART:
192,658 UART: Running Caliptra ROM ...
193,924 UART:
194,089 UART: [state] CFI Enabled
264,052 UART: [state] LifecycleState = Unprovisioned
265,981 UART: [state] DebugLocked = No
267,247 UART: [state] WD Timer not started. Device not locked for debugging
270,522 UART: [kat] SHA2-256
449,652 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,256 UART: [kat] ++
461,791 UART: [kat] sha1
473,269 UART: [kat] SHA2-256
476,312 UART: [kat] SHA2-384
482,666 UART: [kat] SHA2-512-ACC
485,682 UART: [kat] ECC-384
2,948,916 UART: [kat] HMAC-384Kdf
2,972,605 UART: [kat] LMS
3,502,053 UART: [kat] --
3,508,141 UART: [cold-reset] ++
3,508,973 UART: [fht] FHT @ 0x50003400
3,521,310 UART: [idev] ++
3,521,886 UART: [idev] CDI.KEYID = 6
3,522,769 UART: [idev] SUBJECT.KEYID = 7
3,524,033 UART: [idev] UDS.KEYID = 0
3,524,967 ready_for_fw is high
3,525,185 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,854 UART: [idev] Erasing UDS.KEYID = 0
6,029,910 UART: [idev] Sha1 KeyId Algorithm
6,052,336 UART: [idev] --
6,056,338 UART: [ldev] ++
6,056,907 UART: [ldev] CDI.KEYID = 6
6,057,792 UART: [ldev] SUBJECT.KEYID = 5
6,059,008 UART: [ldev] AUTHORITY.KEYID = 7
6,060,252 UART: [ldev] FE.KEYID = 1
6,098,918 UART: [ldev] Erasing FE.KEYID = 1
8,606,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,119 UART: [ldev] --
10,412,257 UART: [fwproc] Wait for Commands...
10,415,432 UART: [fwproc] Recv command 0x46574c44
10,417,525 UART: [fwproc] Recv'd Img size: 114168 bytes
14,973,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,057,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,126,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,443,778 >>> mbox cmd response: success
15,448,841 UART: [afmc] ++
15,449,440 UART: [afmc] CDI.KEYID = 6
15,450,356 UART: [afmc] SUBJECT.KEYID = 7
15,451,517 UART: [afmc] AUTHORITY.KEYID = 5
17,984,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,724,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,726,363 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,742,311 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,758,275 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,774,025 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,796,717 UART: [afmc] --
19,800,639 UART: [cold-reset] --
19,803,695 UART: [state] Locking Datavault
19,809,214 UART: [state] Locking PCR0, PCR1 and PCR31
19,810,864 UART: [state] Locking ICCM
19,812,315 UART: [exit] Launching FMC @ 0x40000130
19,820,715 UART:
19,820,956 UART: Running Caliptra FMC ...
19,822,062 UART:
19,822,223 UART: [state] CFI Enabled
19,883,932 UART: [fht] FMC Alias Private Key: 7
21,647,150 UART: [art] Extend RT PCRs Done
21,648,364 UART: [art] Lock RT PCRs Done
21,649,872 UART: [art] Populate DV Done
21,655,342 UART: [fht] FMC Alias Private Key: 7
21,656,880 UART: [art] Derive CDI
21,657,696 UART: [art] Store in in slot 0x4
21,716,258 UART: [art] Derive Key Pair
21,717,302 UART: [art] Store priv key in slot 0x5
24,180,447 UART: [art] Derive Key Pair - Done
24,193,644 UART: [art] Signing Cert with AUTHO
24,194,942 UART: RITY.KEYID = 7
25,907,521 UART: [art] Erasing AUTHORITY.KEYID = 7
25,909,186 UART: [art] PUB.X = F9B97DF88B3703B661520F86A309C92B6FBF083347ECD542043339D97B2A586BE7422B38855C22999D0000A29A47C99C
25,916,220 UART: [art] PUB.Y = 6C9A33828B183726132C00D82C43FD7F97DAABAB630E1ECCDAAFB3B780B074F297443892CC87C3C8396703E045263AA3
25,923,463 UART: [art] SIG.R = 3B3A0B8AA4019DF60BE078BEBEE09F2239F77F8126C2F3962330718F50898E80E8FC258E482729351734592CA03E7B31
25,930,785 UART: [art] SIG.S = 6109466616C5CD3B256B4CD29502DF8D37780F285984D52CA401E05E68C2565A0DD61F2DADF014FA60FAE4408DAFB17F
26,909,557 UART: Caliptra RT
26,910,266 UART: [state] CFI Enabled
27,075,971 UART: [rt] RT listening for mailbox commands...
27,078,285 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,233,549 UART: [rt]cmd =0x41544d4e, len=14344
31,771,774 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,380,605 ready_for_fw is high
3,380,984 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,066,863 >>> mbox cmd response: success
19,346,999 UART:
19,347,395 UART: Running Caliptra FMC ...
19,348,574 UART:
19,348,747 UART: [state] CFI Enabled
19,415,936 UART: [fht] FMC Alias Private Key: 7
21,179,027 UART: [art] Extend RT PCRs Done
21,180,251 UART: [art] Lock RT PCRs Done
21,182,045 UART: [art] Populate DV Done
21,187,324 UART: [fht] FMC Alias Private Key: 7
21,188,863 UART: [art] Derive CDI
21,189,675 UART: [art] Store in in slot 0x4
21,248,279 UART: [art] Derive Key Pair
21,249,270 UART: [art] Store priv key in slot 0x5
23,712,729 UART: [art] Derive Key Pair - Done
23,725,467 UART: [art] Signing Cert with AUTHO
23,726,776 UART: RITY.KEYID = 7
25,438,908 UART: [art] Erasing AUTHORITY.KEYID = 7
25,440,417 UART: [art] PUB.X = C964C099B371D2CEFAEBE18190A05A7E4C6857DC1BE00EABCC6E4D93FDFFB8F02702C82C666921D2CC6234805EFF5F9E
25,447,708 UART: [art] PUB.Y = CE2F9E434770F3C346A5C1AA2097C104C57B94FE9746112C49F852F42E845B0CC07FF856E8C5C1F355A01537D01B2A68
25,454,948 UART: [art] SIG.R = 2E7002CE639BB5031BAD94D10D91DB6A48B7C056416A9A8BB5A0BC6C2874A75DB6067FB28BD2B26BE70E0BD0276F6F27
25,462,395 UART: [art] SIG.S = 5854068E78884B23A2C35341AAF44DD540A1B8DB39CF317930D799A3FE0F5F8B2D8E9917BEBD944366C5244CD28F9B2A
26,441,753 UART: Caliptra RT
26,442,480 UART: [state] CFI Enabled
26,606,415 UART: [rt] RT listening for mailbox commands...
26,608,715 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,764,186 UART: [rt]cmd =0x41544d4e, len=14344
31,306,573 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
192,819 UART:
193,198 UART: Running Caliptra ROM ...
194,301 UART:
604,049 UART: [state] CFI Enabled
615,792 UART: [state] LifecycleState = Unprovisioned
617,656 UART: [state] DebugLocked = No
619,391 UART: [state] WD Timer not started. Device not locked for debugging
623,489 UART: [kat] SHA2-256
802,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,222 UART: [kat] ++
814,756 UART: [kat] sha1
826,914 UART: [kat] SHA2-256
829,917 UART: [kat] SHA2-384
836,258 UART: [kat] SHA2-512-ACC
839,201 UART: [kat] ECC-384
3,279,021 UART: [kat] HMAC-384Kdf
3,292,255 UART: [kat] LMS
3,821,762 UART: [kat] --
3,826,058 UART: [cold-reset] ++
3,828,569 UART: [fht] FHT @ 0x50003400
3,840,348 UART: [idev] ++
3,840,953 UART: [idev] CDI.KEYID = 6
3,841,878 UART: [idev] SUBJECT.KEYID = 7
3,842,988 UART: [idev] UDS.KEYID = 0
3,843,914 ready_for_fw is high
3,844,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,342 UART: [idev] Erasing UDS.KEYID = 0
6,313,531 UART: [idev] Sha1 KeyId Algorithm
6,335,343 UART: [idev] --
6,339,096 UART: [ldev] ++
6,339,672 UART: [ldev] CDI.KEYID = 6
6,340,583 UART: [ldev] SUBJECT.KEYID = 5
6,341,738 UART: [ldev] AUTHORITY.KEYID = 7
6,343,042 UART: [ldev] FE.KEYID = 1
6,354,394 UART: [ldev] Erasing FE.KEYID = 1
8,829,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,629 UART: [ldev] --
10,618,972 UART: [fwproc] Wait for Commands...
10,621,280 UART: [fwproc] Recv command 0x46574c44
10,623,370 UART: [fwproc] Recv'd Img size: 114168 bytes
15,199,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,280,636 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,349,386 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,666,709 >>> mbox cmd response: success
15,671,019 UART: [afmc] ++
15,671,634 UART: [afmc] CDI.KEYID = 6
15,672,550 UART: [afmc] SUBJECT.KEYID = 7
15,673,708 UART: [afmc] AUTHORITY.KEYID = 5
18,175,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,896,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,898,702 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,914,699 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,930,671 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,946,439 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,969,288 UART: [afmc] --
19,972,606 UART: [cold-reset] --
19,976,684 UART: [state] Locking Datavault
19,981,549 UART: [state] Locking PCR0, PCR1 and PCR31
19,983,251 UART: [state] Locking ICCM
19,984,590 UART: [exit] Launching FMC @ 0x40000130
19,993,043 UART:
19,993,299 UART: Running Caliptra FMC ...
19,994,407 UART:
19,994,569 UART: [state] CFI Enabled
20,002,677 UART: [fht] FMC Alias Private Key: 7
21,759,654 UART: [art] Extend RT PCRs Done
21,760,882 UART: [art] Lock RT PCRs Done
21,762,500 UART: [art] Populate DV Done
21,767,915 UART: [fht] FMC Alias Private Key: 7
21,769,450 UART: [art] Derive CDI
21,770,267 UART: [art] Store in in slot 0x4
21,813,024 UART: [art] Derive Key Pair
21,814,026 UART: [art] Store priv key in slot 0x5
24,240,797 UART: [art] Derive Key Pair - Done
24,253,854 UART: [art] Signing Cert with AUTHO
24,255,153 UART: RITY.KEYID = 7
25,961,081 UART: [art] Erasing AUTHORITY.KEYID = 7
25,962,621 UART: [art] PUB.X = DF5883C79489C0BBF43576D2F951078A2B2E3EA882AA010C8C73DBE9C706BE4365DCD560AEE158376C98BC7E8E1CFFA4
25,969,880 UART: [art] PUB.Y = 89ECC9D88B2F8251A30DF999DA901A07A5DA6A71437D743CBA9520B0A7F019DF9C3C0177512B0B105F630B50B0F6ED9B
25,977,180 UART: [art] SIG.R = D0EDE593832F7D924BD03FFE49B15A522CB31FCA77F34F8014DB0343238520D87EF9A8EDEE5F1EEED02AD3B586293592
25,984,581 UART: [art] SIG.S = 3038FB61CB7363E2D37BFF4B65781CDFB2CBC6A764EA00434BAECD510B21E6BF8BA4EA0918F4BF37BCB3DCF482CB0916
26,964,278 UART: Caliptra RT
26,964,985 UART: [state] CFI Enabled
27,081,715 UART: [rt] RT listening for mailbox commands...
27,084,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,239,433 UART: [rt]cmd =0x41544d4e, len=14344
31,777,516 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,622 writing to cptra_bootfsm_go
3,698,022 ready_for_fw is high
3,698,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,246,993 >>> mbox cmd response: success
19,491,365 UART:
19,491,784 UART: Running Caliptra FMC ...
19,492,897 UART:
19,493,073 UART: [state] CFI Enabled
19,500,761 UART: [fht] FMC Alias Private Key: 7
21,258,029 UART: [art] Extend RT PCRs Done
21,259,255 UART: [art] Lock RT PCRs Done
21,260,535 UART: [art] Populate DV Done
21,265,995 UART: [fht] FMC Alias Private Key: 7
21,267,485 UART: [art] Derive CDI
21,268,250 UART: [art] Store in in slot 0x4
21,310,797 UART: [art] Derive Key Pair
21,311,841 UART: [art] Store priv key in slot 0x5
23,738,802 UART: [art] Derive Key Pair - Done
23,752,145 UART: [art] Signing Cert with AUTHO
23,753,444 UART: RITY.KEYID = 7
25,459,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,460,807 UART: [art] PUB.X = 0919EE360990CB99EC88618E7FD73A0EFC5325E0BAF30D3C5B3A15F2EB0BE873CF6810997E04C0F8B524F2D8EC067681
25,468,050 UART: [art] PUB.Y = D92974B59FC423668F0A0907D9BA64EF02FF5FFFD67CCEAD6150532E412DDDBE8B9E2C9169443F4CA263DFC0B871413D
25,475,352 UART: [art] SIG.R = 64E531653DDEE1E222FD27B83A1576C668B8D9D32F38553F0E9825E1AB0F4779F0A2AA67ADF0EA42DCDBC10E743C3950
25,482,754 UART: [art] SIG.S = 455DF8EB84028985A094C64D6EF07A71DC97DB7547067381BFBCD80CDFE08C5D19B4330D8DCB3833792D84F7C855DD1A
26,461,940 UART: Caliptra RT
26,462,641 UART: [state] CFI Enabled
26,579,496 UART: [rt] RT listening for mailbox commands...
26,581,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,737,202 UART: [rt]cmd =0x41544d4e, len=14344
31,261,635 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,078 UART:
192,469 UART: Running Caliptra ROM ...
193,626 UART:
193,776 UART: [state] CFI Enabled
267,392 UART: [state] LifecycleState = Unprovisioned
269,802 UART: [state] DebugLocked = No
271,708 UART: [state] WD Timer not started. Device not locked for debugging
276,328 UART: [kat] SHA2-256
466,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,953 UART: [kat] ++
477,486 UART: [kat] sha1
488,727 UART: [kat] SHA2-256
491,741 UART: [kat] SHA2-384
496,880 UART: [kat] SHA2-512-ACC
499,463 UART: [kat] ECC-384
2,951,293 UART: [kat] HMAC-384Kdf
2,972,301 UART: [kat] LMS
3,503,982 UART: [kat] --
3,508,049 UART: [cold-reset] ++
3,510,475 UART: [fht] FHT @ 0x50003400
3,522,871 UART: [idev] ++
3,523,582 UART: [idev] CDI.KEYID = 6
3,524,491 UART: [idev] SUBJECT.KEYID = 7
3,525,733 UART: [idev] UDS.KEYID = 0
3,526,636 ready_for_fw is high
3,526,855 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,630 UART: [idev] Erasing UDS.KEYID = 0
6,031,607 UART: [idev] Sha1 KeyId Algorithm
6,054,071 UART: [idev] --
6,059,195 UART: [ldev] ++
6,059,896 UART: [ldev] CDI.KEYID = 6
6,060,784 UART: [ldev] SUBJECT.KEYID = 5
6,062,005 UART: [ldev] AUTHORITY.KEYID = 7
6,063,161 UART: [ldev] FE.KEYID = 1
6,100,594 UART: [ldev] Erasing FE.KEYID = 1
8,606,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,028 UART: [ldev] --
10,415,082 UART: [fwproc] Wait for Commands...
10,417,718 UART: [fwproc] Recv command 0x46574c44
10,420,025 UART: [fwproc] Recv'd Img size: 114168 bytes
15,026,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,113,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,229,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,770,757 >>> mbox cmd response: success
15,775,138 UART: [afmc] ++
15,775,854 UART: [afmc] CDI.KEYID = 6
15,777,024 UART: [afmc] SUBJECT.KEYID = 7
15,778,527 UART: [afmc] AUTHORITY.KEYID = 5
18,326,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,048,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,050,283 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,065,340 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,080,548 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,095,374 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,118,725 UART: [afmc] --
20,121,654 UART: [cold-reset] --
20,125,320 UART: [state] Locking Datavault
20,129,559 UART: [state] Locking PCR0, PCR1 and PCR31
20,131,720 UART: [state] Locking ICCM
20,134,017 UART: [exit] Launching FMC @ 0x40000130
20,142,653 UART:
20,142,887 UART: Running Caliptra FMC ...
20,143,989 UART:
20,144,144 UART: [state] CFI Enabled
20,205,585 UART: [fht] FMC Alias Private Key: 7
21,969,817 UART: [art] Extend RT PCRs Done
21,971,058 UART: [art] Lock RT PCRs Done
21,972,496 UART: [art] Populate DV Done
21,977,693 UART: [fht] FMC Alias Private Key: 7
21,979,292 UART: [art] Derive CDI
21,980,029 UART: [art] Store in in slot 0x4
22,038,155 UART: [art] Derive Key Pair
22,039,196 UART: [art] Store priv key in slot 0x5
24,502,336 UART: [art] Derive Key Pair - Done
24,515,431 UART: [art] Signing Cert with AUTHO
24,516,738 UART: RITY.KEYID = 7
26,227,432 UART: [art] Erasing AUTHORITY.KEYID = 7
26,228,938 UART: [art] PUB.X = A051764021735688187451C2D67804861D9FD488B84EA2979B3A01EE0F64627B92381CB2B9E6507C686EE801D69DC753
26,236,157 UART: [art] PUB.Y = 3078135EB362CC75F90DCA18E048E080A747282380A5066F17A039F6808D9E3808C64B16EE810DAE5C3CD485F00761CA
26,243,415 UART: [art] SIG.R = A49C79A68C84D0880C1FB172DB22597813C2515F594788BA28EED666E9A82446C9DD128E6371E1FAAFDC1E45D1A5CC5F
26,250,780 UART: [art] SIG.S = A0C28C7AD294C1F4F57D869A19FE63DE031884E767F0AD36B6CA2DB83A32BBB870C6EF56951A41D40BF9497343121E2B
27,229,979 UART: Caliptra RT
27,230,707 UART: [state] CFI Enabled
27,394,426 UART: [rt] RT listening for mailbox commands...
27,396,742 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,552,009 UART: [rt]cmd =0x41544d4e, len=14344
32,079,107 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,438,497 ready_for_fw is high
3,439,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,884,939 >>> mbox cmd response: success
20,178,226 UART:
20,178,619 UART: Running Caliptra FMC ...
20,179,733 UART:
20,179,886 UART: [state] CFI Enabled
20,246,107 UART: [fht] FMC Alias Private Key: 7
22,009,829 UART: [art] Extend RT PCRs Done
22,011,062 UART: [art] Lock RT PCRs Done
22,012,498 UART: [art] Populate DV Done
22,017,803 UART: [fht] FMC Alias Private Key: 7
22,019,310 UART: [art] Derive CDI
22,020,084 UART: [art] Store in in slot 0x4
22,079,085 UART: [art] Derive Key Pair
22,080,142 UART: [art] Store priv key in slot 0x5
24,543,193 UART: [art] Derive Key Pair - Done
24,556,244 UART: [art] Signing Cert with AUTHO
24,557,548 UART: RITY.KEYID = 7
26,269,065 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,576 UART: [art] PUB.X = 3F31CB479F221CEABA8EEF1A2BEEFC5960F09DBBC7A76935F134BA3788F8A2944961E910A1B477744B4192F9BBB51541
26,277,867 UART: [art] PUB.Y = EE4C54BFCF9DA8BD5B8497046736100FBAFF8472BBB353EB445964CB7B1840BB4242295FAFC59DEA504C68F6C3E51198
26,285,142 UART: [art] SIG.R = 40ABFAE27F7B2E45D6FFF266AA2281019ECA4878574FF476246E8AB480BCA82D718865181A6620B30185D9266EA2AC5D
26,292,535 UART: [art] SIG.S = E1CDC7898CD56506F2368C48C4068322DF22A64E6BBDBCF509BF00294D2A5F9AFA35DA1DE39C794FC8323B4F6263E1C3
27,271,841 UART: Caliptra RT
27,272,537 UART: [state] CFI Enabled
27,451,771 UART: [rt] RT listening for mailbox commands...
27,454,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,609,149 UART: [rt]cmd =0x41544d4e, len=14344
32,146,930 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,825 writing to cptra_bootfsm_go
193,138 UART:
193,501 UART: Running Caliptra ROM ...
194,640 UART:
604,423 UART: [state] CFI Enabled
616,680 UART: [state] LifecycleState = Unprovisioned
619,056 UART: [state] DebugLocked = No
621,797 UART: [state] WD Timer not started. Device not locked for debugging
627,099 UART: [kat] SHA2-256
816,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,781 UART: [kat] ++
828,385 UART: [kat] sha1
839,406 UART: [kat] SHA2-256
842,427 UART: [kat] SHA2-384
847,714 UART: [kat] SHA2-512-ACC
850,300 UART: [kat] ECC-384
3,292,297 UART: [kat] HMAC-384Kdf
3,305,344 UART: [kat] LMS
3,837,144 UART: [kat] --
3,842,647 UART: [cold-reset] ++
3,844,441 UART: [fht] FHT @ 0x50003400
3,854,783 UART: [idev] ++
3,855,488 UART: [idev] CDI.KEYID = 6
3,856,401 UART: [idev] SUBJECT.KEYID = 7
3,857,648 UART: [idev] UDS.KEYID = 0
3,858,578 ready_for_fw is high
3,858,786 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,639 UART: [idev] Erasing UDS.KEYID = 0
6,333,384 UART: [idev] Sha1 KeyId Algorithm
6,354,697 UART: [idev] --
6,359,667 UART: [ldev] ++
6,360,346 UART: [ldev] CDI.KEYID = 6
6,361,249 UART: [ldev] SUBJECT.KEYID = 5
6,362,410 UART: [ldev] AUTHORITY.KEYID = 7
6,363,644 UART: [ldev] FE.KEYID = 1
6,376,370 UART: [ldev] Erasing FE.KEYID = 1
8,855,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,252 UART: [ldev] --
10,644,876 UART: [fwproc] Wait for Commands...
10,646,653 UART: [fwproc] Recv command 0x46574c44
10,648,959 UART: [fwproc] Recv'd Img size: 114168 bytes
15,278,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,361,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,477,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,018,773 >>> mbox cmd response: success
16,023,271 UART: [afmc] ++
16,023,978 UART: [afmc] CDI.KEYID = 6
16,025,089 UART: [afmc] SUBJECT.KEYID = 7
16,026,636 UART: [afmc] AUTHORITY.KEYID = 5
18,532,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,253,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,255,616 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,270,686 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,285,906 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,300,743 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,324,047 UART: [afmc] --
20,327,577 UART: [cold-reset] --
20,331,344 UART: [state] Locking Datavault
20,337,246 UART: [state] Locking PCR0, PCR1 and PCR31
20,339,451 UART: [state] Locking ICCM
20,341,248 UART: [exit] Launching FMC @ 0x40000130
20,349,927 UART:
20,350,163 UART: Running Caliptra FMC ...
20,351,262 UART:
20,351,418 UART: [state] CFI Enabled
20,359,521 UART: [fht] FMC Alias Private Key: 7
22,116,398 UART: [art] Extend RT PCRs Done
22,117,623 UART: [art] Lock RT PCRs Done
22,119,330 UART: [art] Populate DV Done
22,124,633 UART: [fht] FMC Alias Private Key: 7
22,126,222 UART: [art] Derive CDI
22,126,957 UART: [art] Store in in slot 0x4
22,169,440 UART: [art] Derive Key Pair
22,170,475 UART: [art] Store priv key in slot 0x5
24,596,791 UART: [art] Derive Key Pair - Done
24,609,571 UART: [art] Signing Cert with AUTHO
24,610,890 UART: RITY.KEYID = 7
26,316,213 UART: [art] Erasing AUTHORITY.KEYID = 7
26,317,847 UART: [art] PUB.X = 6C3B476E1903B41E25D1D9CA2565B0B48480835FFF07451308E16076A954CF95388B57FF87F3C18823DDA26BCA02C3B6
26,324,981 UART: [art] PUB.Y = AD8E4E5D49BE74DCE6470B5AC0736E9732FD0D2F9057531BFF5AE833B07E038B836380A580E4C8B8A3EF714DB0BF34BE
26,332,265 UART: [art] SIG.R = 27FFA5C9F4233AF6DE1816E33DD8F360265D91D9E01C79AE1A64421519B365C887DD47FE751F1BEBA185834E66D29DB8
26,339,660 UART: [art] SIG.S = 0689F6E3942205FA44825C427CD616EBF68B24303C38E9A53CB870F64552B9AB7385BB21C2F6BF6016395652190B48AA
27,318,535 UART: Caliptra RT
27,319,244 UART: [state] CFI Enabled
27,436,462 UART: [rt] RT listening for mailbox commands...
27,438,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,594,249 UART: [rt]cmd =0x41544d4e, len=14344
32,123,146 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,634 writing to cptra_bootfsm_go
3,750,991 ready_for_fw is high
3,751,546 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,074,561 >>> mbox cmd response: success
20,320,759 UART:
20,321,163 UART: Running Caliptra FMC ...
20,322,349 UART:
20,322,520 UART: [state] CFI Enabled
20,330,357 UART: [fht] FMC Alias Private Key: 7
22,087,397 UART: [art] Extend RT PCRs Done
22,088,632 UART: [art] Lock RT PCRs Done
22,090,591 UART: [art] Populate DV Done
22,096,059 UART: [fht] FMC Alias Private Key: 7
22,097,687 UART: [art] Derive CDI
22,098,512 UART: [art] Store in in slot 0x4
22,140,789 UART: [art] Derive Key Pair
22,141,792 UART: [art] Store priv key in slot 0x5
24,568,841 UART: [art] Derive Key Pair - Done
24,582,008 UART: [art] Signing Cert with AUTHO
24,583,317 UART: RITY.KEYID = 7
26,288,432 UART: [art] Erasing AUTHORITY.KEYID = 7
26,289,949 UART: [art] PUB.X = A2D89ACEC996A1BE394CC874D6175718AA98B20BFFD0F72414C5BFD32A3E63D72D162C3443ED95C901F9BD475DA07093
26,297,203 UART: [art] PUB.Y = 2449B5350582A0ECDC8EFBB3704F1226EF29957C9AB5F9198D067B2A2499FFBB945C10EBACF97AAC1AF18C85BAF57E32
26,304,517 UART: [art] SIG.R = DB53C0C1A1950734518294D0CB04CDA68E091C1A3834A07EBF4A93573EC08F329F3C3A855C87DAC43CF33733D1127CC3
26,311,922 UART: [art] SIG.S = 4CAFEEF33D1533B1776AF51A467B25A1466BDF3D8A5BE2A407AB6BC0B909D7B0F842181AECAF67A55B5631725B5558B0
27,290,463 UART: Caliptra RT
27,291,151 UART: [state] CFI Enabled
27,409,453 UART: [rt] RT listening for mailbox commands...
27,411,808 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,566,833 UART: [rt]cmd =0x41544d4e, len=14344
32,103,558 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,979 UART: [kat] SHA2-256
881,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,025 UART: [kat] ++
886,177 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,796 UART: [kat] HMAC-384Kdf
907,316 UART: [kat] LMS
1,475,512 UART: [kat] --
1,476,591 UART: [cold-reset] ++
1,476,971 UART: [fht] Storing FHT @ 0x50003400
1,479,742 UART: [idev] ++
1,479,910 UART: [idev] CDI.KEYID = 6
1,480,270 UART: [idev] SUBJECT.KEYID = 7
1,480,694 UART: [idev] UDS.KEYID = 0
1,481,039 ready_for_fw is high
1,481,039 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,704 UART: [idev] Erasing UDS.KEYID = 0
1,505,446 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,020 UART: [idev] --
1,514,991 UART: [ldev] ++
1,515,159 UART: [ldev] CDI.KEYID = 6
1,515,522 UART: [ldev] SUBJECT.KEYID = 5
1,515,948 UART: [ldev] AUTHORITY.KEYID = 7
1,516,411 UART: [ldev] FE.KEYID = 1
1,521,795 UART: [ldev] Erasing FE.KEYID = 1
1,546,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,854 UART: [ldev] --
1,586,323 UART: [fwproc] Waiting for Commands...
1,587,004 UART: [fwproc] Received command 0x46574c44
1,587,795 UART: [fwproc] Received Image of size 114168 bytes
5,232,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,260,741 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,290,093 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,425,810 >>> mbox cmd response: success
5,426,950 UART: [afmc] ++
5,427,118 UART: [afmc] CDI.KEYID = 6
5,427,480 UART: [afmc] SUBJECT.KEYID = 7
5,427,905 UART: [afmc] AUTHORITY.KEYID = 5
5,462,791 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,479,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,479,865 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,485,574 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,491,466 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,497,167 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,505,083 UART: [afmc] --
5,506,033 UART: [cold-reset] --
5,506,709 UART: [state] Locking Datavault
5,508,134 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,738 UART: [state] Locking ICCM
5,509,170 UART: [exit] Launching FMC @ 0x40000130
5,514,499 UART:
5,514,515 UART: Running Caliptra FMC ...
5,514,923 UART:
5,514,977 UART: [state] CFI Enabled
5,525,335 UART: [fht] FMC Alias Private Key: 7
5,632,809 UART: [art] Extend RT PCRs Done
5,633,237 UART: [art] Lock RT PCRs Done
5,634,917 UART: [art] Populate DV Done
5,643,255 UART: [fht] FMC Alias Private Key: 7
5,644,213 UART: [art] Derive CDI
5,644,493 UART: [art] Store in in slot 0x4
5,730,098 UART: [art] Derive Key Pair
5,730,458 UART: [art] Store priv key in slot 0x5
5,743,134 UART: [art] Derive Key Pair - Done
5,757,748 UART: [art] Signing Cert with AUTHO
5,758,228 UART: RITY.KEYID = 7
5,773,302 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,067 UART: [art] PUB.X = 7F29A73333F314ADE018D184223DEF2C0A597AEA7C4A72748D56DDB2FBD8690C0677F18E886CE1A27BA9A72867D9AE33
5,780,838 UART: [art] PUB.Y = 918379F57022C3F3A0EA076CD77FD23E02E17A5D1BEDC13511B1B8E8C71424C2677CCC4B58DA879C38377F1E0E9E2053
5,787,785 UART: [art] SIG.R = 747F698FAA6FA39EB04A2CB7C4BB481DC0962FB8F703F105A9221F9852085BDEA2AFC9CA53966BB1F729254C82AF8A63
5,794,560 UART: [art] SIG.S = 2B3F0CA93932B93240DB57A5B2B5061B47B2E9405AFCE5169F64AFAB22C1DF4899C5FDB4891361DCD9079C2452903700
5,817,760 UART: Caliptra RT
5,818,013 UART: [state] CFI Enabled
5,925,585 UART: [rt] RT listening for mailbox commands...
5,926,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,049,249 UART: [rt]cmd =0x41544d4e, len=14344
6,969,726 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,805 ready_for_fw is high
1,362,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,353,426 >>> mbox cmd response: success
5,415,013 UART:
5,415,029 UART: Running Caliptra FMC ...
5,415,437 UART:
5,415,491 UART: [state] CFI Enabled
5,426,203 UART: [fht] FMC Alias Private Key: 7
5,534,153 UART: [art] Extend RT PCRs Done
5,534,581 UART: [art] Lock RT PCRs Done
5,535,973 UART: [art] Populate DV Done
5,544,033 UART: [fht] FMC Alias Private Key: 7
5,545,097 UART: [art] Derive CDI
5,545,377 UART: [art] Store in in slot 0x4
5,631,278 UART: [art] Derive Key Pair
5,631,638 UART: [art] Store priv key in slot 0x5
5,645,066 UART: [art] Derive Key Pair - Done
5,659,664 UART: [art] Signing Cert with AUTHO
5,660,144 UART: RITY.KEYID = 7
5,675,120 UART: [art] Erasing AUTHORITY.KEYID = 7
5,675,885 UART: [art] PUB.X = F10A43E1549C87D5046BD1738BDC695E6DA3C5BA5EFCFB068DEDBF043FFD896BAE9F641FD02564473C43DA7572A19766
5,682,659 UART: [art] PUB.Y = FFF92326FEC4E19B90E5D5523DB8715CD50CBA58632F13063C50D3F619CB656B366D427BB99813342874DDF714B5B9E6
5,689,607 UART: [art] SIG.R = 5897DF25EF97865B6E750A2FA6B0E72A734FED314C62E7506B85477AE3A0A49269C6528FD1B88C0E1D96A871B6433633
5,696,371 UART: [art] SIG.S = D54B3DBAEE7D7607B04C6E5C33180AE4B0BC878D1D1B9DD73C6E18F681944D7A2BB7819D4171995FA29A073171FC6DFC
5,720,289 UART: Caliptra RT
5,720,542 UART: [state] CFI Enabled
5,828,521 UART: [rt] RT listening for mailbox commands...
5,829,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,952,051 UART: [rt]cmd =0x41544d4e, len=14344
6,872,076 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,830 UART: [kat] SHA2-256
892,768 UART: [kat] SHA2-384
895,557 UART: [kat] SHA2-512-ACC
897,458 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,317 UART: [kat] LMS
1,475,513 UART: [kat] --
1,476,442 UART: [cold-reset] ++
1,476,982 UART: [fht] Storing FHT @ 0x50003400
1,479,667 UART: [idev] ++
1,479,835 UART: [idev] CDI.KEYID = 6
1,480,195 UART: [idev] SUBJECT.KEYID = 7
1,480,619 UART: [idev] UDS.KEYID = 0
1,480,964 ready_for_fw is high
1,480,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,495 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,043 UART: [idev] --
1,515,244 UART: [ldev] ++
1,515,412 UART: [ldev] CDI.KEYID = 6
1,515,775 UART: [ldev] SUBJECT.KEYID = 5
1,516,201 UART: [ldev] AUTHORITY.KEYID = 7
1,516,664 UART: [ldev] FE.KEYID = 1
1,521,912 UART: [ldev] Erasing FE.KEYID = 1
1,547,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,415 UART: [ldev] --
1,586,710 UART: [fwproc] Waiting for Commands...
1,587,557 UART: [fwproc] Received command 0x46574c44
1,588,348 UART: [fwproc] Received Image of size 114168 bytes
5,233,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,261,262 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,290,614 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,426,135 >>> mbox cmd response: success
5,427,389 UART: [afmc] ++
5,427,557 UART: [afmc] CDI.KEYID = 6
5,427,919 UART: [afmc] SUBJECT.KEYID = 7
5,428,344 UART: [afmc] AUTHORITY.KEYID = 5
5,463,728 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,479,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,480,666 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,486,375 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,492,267 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,497,968 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,505,798 UART: [afmc] --
5,506,806 UART: [cold-reset] --
5,507,712 UART: [state] Locking Datavault
5,508,585 UART: [state] Locking PCR0, PCR1 and PCR31
5,509,189 UART: [state] Locking ICCM
5,509,861 UART: [exit] Launching FMC @ 0x40000130
5,515,190 UART:
5,515,206 UART: Running Caliptra FMC ...
5,515,614 UART:
5,515,757 UART: [state] CFI Enabled
5,526,543 UART: [fht] FMC Alias Private Key: 7
5,633,659 UART: [art] Extend RT PCRs Done
5,634,087 UART: [art] Lock RT PCRs Done
5,635,427 UART: [art] Populate DV Done
5,643,647 UART: [fht] FMC Alias Private Key: 7
5,644,791 UART: [art] Derive CDI
5,645,071 UART: [art] Store in in slot 0x4
5,730,846 UART: [art] Derive Key Pair
5,731,206 UART: [art] Store priv key in slot 0x5
5,744,586 UART: [art] Derive Key Pair - Done
5,759,150 UART: [art] Signing Cert with AUTHO
5,759,630 UART: RITY.KEYID = 7
5,775,108 UART: [art] Erasing AUTHORITY.KEYID = 7
5,775,873 UART: [art] PUB.X = 4AADD31B4BC544A2D9ED62C2FACC60A98E8427BDC782282B068B0CF103A21B6C698A49DB791722D449A2492984495F09
5,782,637 UART: [art] PUB.Y = 9377BFD4D7C4AF8E0CC0D6B4D28F02720A57347EC53E222CC5B3010CB6C06F9AAAB414B67A94D51571066033CB5A3329
5,789,577 UART: [art] SIG.R = 1A378D18D01BD20131A8C4DEF842E03EC03E18ED5F25F72636FBAF3CD8CAEE29A1CCAC044E76C42AD3408DD41BD6A7CD
5,796,367 UART: [art] SIG.S = C61C0444DF01A4B8E1A18585723996643309B2B4085C4C03B3A1B14DBF1840BBB353B429E53B774009FCA30D4015D274
5,820,357 UART: Caliptra RT
5,820,702 UART: [state] CFI Enabled
5,928,687 UART: [rt] RT listening for mailbox commands...
5,929,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,052,325 UART: [rt]cmd =0x41544d4e, len=14344
6,965,005 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,004 ready_for_fw is high
1,363,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,086,704 >>> mbox cmd response: success
5,148,455 UART:
5,148,471 UART: Running Caliptra FMC ...
5,148,879 UART:
5,149,022 UART: [state] CFI Enabled
5,159,772 UART: [fht] FMC Alias Private Key: 7
5,267,436 UART: [art] Extend RT PCRs Done
5,267,864 UART: [art] Lock RT PCRs Done
5,269,588 UART: [art] Populate DV Done
5,277,820 UART: [fht] FMC Alias Private Key: 7
5,278,974 UART: [art] Derive CDI
5,279,254 UART: [art] Store in in slot 0x4
5,364,991 UART: [art] Derive Key Pair
5,365,351 UART: [art] Store priv key in slot 0x5
5,378,797 UART: [art] Derive Key Pair - Done
5,393,304 UART: [art] Signing Cert with AUTHO
5,393,784 UART: RITY.KEYID = 7
5,409,878 UART: [art] Erasing AUTHORITY.KEYID = 7
5,410,643 UART: [art] PUB.X = 8B334E70C5643374099DC775539FC0203EADC9EE3AD067D0AB03C6F0ABCF1CEE075A48ECC8B198E4BDF620768E63B708
5,417,415 UART: [art] PUB.Y = 1CF648A67D27A477165B9DBA166848FD25CC953AA7BC7ADDF20405CA0CDD7993A92659AB934C74FB22F2B9BF362655D0
5,424,368 UART: [art] SIG.R = F73B5C48BE5B08E5B2C9DC3EB1D59101AE84924F865451739CDA155B4F7A3172BE5FDE8566F04D78F45350CD09AD763D
5,431,139 UART: [art] SIG.S = D0CDFAB76C21E4466EDC69675451B61E2760FB79FDFC4D3755735C611BB06617665AD2746A78085E82E2024F32AFFD27
5,454,550 UART: Caliptra RT
5,454,895 UART: [state] CFI Enabled
5,563,151 UART: [rt] RT listening for mailbox commands...
5,563,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,645 UART: [rt]cmd =0x41544d4e, len=14344
6,603,739 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,776 UART: [state] LifecycleState = Unprovisioned
86,431 UART: [state] DebugLocked = No
87,043 UART: [state] WD Timer not started. Device not locked for debugging
88,224 UART: [kat] SHA2-256
893,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,999 UART: [kat] ++
898,151 UART: [kat] sha1
902,399 UART: [kat] SHA2-256
904,339 UART: [kat] SHA2-384
907,084 UART: [kat] SHA2-512-ACC
908,985 UART: [kat] ECC-384
918,688 UART: [kat] HMAC-384Kdf
923,234 UART: [kat] LMS
1,171,562 UART: [kat] --
1,172,351 UART: [cold-reset] ++
1,172,719 UART: [fht] FHT @ 0x50003400
1,175,434 UART: [idev] ++
1,175,602 UART: [idev] CDI.KEYID = 6
1,175,962 UART: [idev] SUBJECT.KEYID = 7
1,176,386 UART: [idev] UDS.KEYID = 0
1,176,731 ready_for_fw is high
1,176,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,190 UART: [idev] Erasing UDS.KEYID = 0
1,201,229 UART: [idev] Sha1 KeyId Algorithm
1,209,543 UART: [idev] --
1,210,525 UART: [ldev] ++
1,210,693 UART: [ldev] CDI.KEYID = 6
1,211,056 UART: [ldev] SUBJECT.KEYID = 5
1,211,482 UART: [ldev] AUTHORITY.KEYID = 7
1,211,945 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,466 UART: [fwproc] Wait for Commands...
1,283,280 UART: [fwproc] Recv command 0x46574c44
1,284,008 UART: [fwproc] Recv'd Img size: 114168 bytes
3,124,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,039 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,317,904 >>> mbox cmd response: success
3,318,946 UART: [afmc] ++
3,319,114 UART: [afmc] CDI.KEYID = 6
3,319,476 UART: [afmc] SUBJECT.KEYID = 7
3,319,901 UART: [afmc] AUTHORITY.KEYID = 5
3,354,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,806 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,515 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,407 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,389,118 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,053 UART: [afmc] --
3,397,945 UART: [cold-reset] --
3,398,891 UART: [state] Locking Datavault
3,400,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,752 UART: [state] Locking ICCM
3,401,290 UART: [exit] Launching FMC @ 0x40000130
3,406,619 UART:
3,406,635 UART: Running Caliptra FMC ...
3,407,043 UART:
3,407,097 UART: [state] CFI Enabled
3,417,621 UART: [fht] FMC Alias Private Key: 7
3,525,695 UART: [art] Extend RT PCRs Done
3,526,123 UART: [art] Lock RT PCRs Done
3,527,725 UART: [art] Populate DV Done
3,535,907 UART: [fht] FMC Alias Private Key: 7
3,536,939 UART: [art] Derive CDI
3,537,219 UART: [art] Store in in slot 0x4
3,623,214 UART: [art] Derive Key Pair
3,623,574 UART: [art] Store priv key in slot 0x5
3,636,456 UART: [art] Derive Key Pair - Done
3,651,351 UART: [art] Signing Cert with AUTHO
3,651,831 UART: RITY.KEYID = 7
3,667,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,667,790 UART: [art] PUB.X = 7AA4C1C20FE25E9B934C1C7238C4EA755258788841B238E425051D9CBBAE7D4C42E82721EBE48BE4D6E5B64114ED3933
3,674,560 UART: [art] PUB.Y = B92453467E18B2930F56C14A25BAE15B352767AB433F170D986D663B3C5924C26652D350672393607989CFC0DB094264
3,681,487 UART: [art] SIG.R = B355FE42BE01214397D3AB8CD32920141377F00ED723BB1FAF9E3C61B9490B021400BDA17440901FC292FF5C0772056E
3,688,217 UART: [art] SIG.S = 52BDC04335211755BD894C91EB617E4ACFE21833AFD1E95F0825550B5EC13EA6FEA7018B929687F6C70CC9AB0B6CCCFF
3,711,773 UART: Caliptra RT
3,712,026 UART: [state] CFI Enabled
3,819,402 UART: [rt] RT listening for mailbox commands...
3,820,072 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,940 UART: [rt]cmd =0x41544d4e, len=14344
4,855,350 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,159 ready_for_fw is high
1,060,159 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,166,508 >>> mbox cmd response: success
3,227,907 UART:
3,227,923 UART: Running Caliptra FMC ...
3,228,331 UART:
3,228,385 UART: [state] CFI Enabled
3,238,551 UART: [fht] FMC Alias Private Key: 7
3,346,759 UART: [art] Extend RT PCRs Done
3,347,187 UART: [art] Lock RT PCRs Done
3,348,513 UART: [art] Populate DV Done
3,356,611 UART: [fht] FMC Alias Private Key: 7
3,357,745 UART: [art] Derive CDI
3,358,025 UART: [art] Store in in slot 0x4
3,443,700 UART: [art] Derive Key Pair
3,444,060 UART: [art] Store priv key in slot 0x5
3,457,578 UART: [art] Derive Key Pair - Done
3,472,509 UART: [art] Signing Cert with AUTHO
3,472,989 UART: RITY.KEYID = 7
3,488,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,818 UART: [art] PUB.X = 24BDCC0F9F46082A519CA73DC358170EDFD70BFB9FF381E557D75EDAA06C374C9C18E3AF25494B1566D97B6AE11F464F
3,495,592 UART: [art] PUB.Y = 33B3079190666414C27DB9A329F14D6F33298C5174205E707B37D8410385FAE2E3B77AF2BD9C164A5E7AF545B521F157
3,502,530 UART: [art] SIG.R = AAA85733FDB516709D5F30B4BBB4DDF92775D5DC3323524E28BBB544782DEEF1B4F21557627A60CD50CE636C67882B0E
3,509,307 UART: [art] SIG.S = 2735C3F109F489B48AE89EEEF76BD3515D3F679D442A832AF06A2AF57CEAA96EFE88325597D06B7729CFEB7375FE1AFC
3,533,457 UART: Caliptra RT
3,533,710 UART: [state] CFI Enabled
3,640,950 UART: [rt] RT listening for mailbox commands...
3,641,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,570 UART: [rt]cmd =0x41544d4e, len=14344
4,689,097 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
902,294 UART: [kat] SHA2-256
904,234 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,729 UART: [kat] HMAC-384Kdf
923,313 UART: [kat] LMS
1,171,641 UART: [kat] --
1,172,686 UART: [cold-reset] ++
1,173,082 UART: [fht] FHT @ 0x50003400
1,175,803 UART: [idev] ++
1,175,971 UART: [idev] CDI.KEYID = 6
1,176,331 UART: [idev] SUBJECT.KEYID = 7
1,176,755 UART: [idev] UDS.KEYID = 0
1,177,100 ready_for_fw is high
1,177,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,745 UART: [idev] Erasing UDS.KEYID = 0
1,202,080 UART: [idev] Sha1 KeyId Algorithm
1,210,586 UART: [idev] --
1,211,674 UART: [ldev] ++
1,211,842 UART: [ldev] CDI.KEYID = 6
1,212,205 UART: [ldev] SUBJECT.KEYID = 5
1,212,631 UART: [ldev] AUTHORITY.KEYID = 7
1,213,094 UART: [ldev] FE.KEYID = 1
1,218,518 UART: [ldev] Erasing FE.KEYID = 1
1,245,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,808 UART: [ldev] --
1,284,209 UART: [fwproc] Wait for Commands...
1,284,937 UART: [fwproc] Recv command 0x46574c44
1,285,665 UART: [fwproc] Recv'd Img size: 114168 bytes
3,131,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,324,902 >>> mbox cmd response: success
3,326,074 UART: [afmc] ++
3,326,242 UART: [afmc] CDI.KEYID = 6
3,326,604 UART: [afmc] SUBJECT.KEYID = 7
3,327,029 UART: [afmc] AUTHORITY.KEYID = 5
3,362,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,740 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,449 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,341 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,052 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,035 UART: [afmc] --
3,406,047 UART: [cold-reset] --
3,406,847 UART: [state] Locking Datavault
3,407,904 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,508 UART: [state] Locking ICCM
3,408,942 UART: [exit] Launching FMC @ 0x40000130
3,414,271 UART:
3,414,287 UART: Running Caliptra FMC ...
3,414,695 UART:
3,414,838 UART: [state] CFI Enabled
3,425,050 UART: [fht] FMC Alias Private Key: 7
3,533,424 UART: [art] Extend RT PCRs Done
3,533,852 UART: [art] Lock RT PCRs Done
3,535,524 UART: [art] Populate DV Done
3,543,392 UART: [fht] FMC Alias Private Key: 7
3,544,394 UART: [art] Derive CDI
3,544,674 UART: [art] Store in in slot 0x4
3,630,199 UART: [art] Derive Key Pair
3,630,559 UART: [art] Store priv key in slot 0x5
3,643,359 UART: [art] Derive Key Pair - Done
3,658,143 UART: [art] Signing Cert with AUTHO
3,658,623 UART: RITY.KEYID = 7
3,673,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,220 UART: [art] PUB.X = 17D4DA3466848B6D31986945F687558CC8D12FA9FADFA97D767274D5739B8AA52EC6349497C094BB9525B7D240F1D520
3,680,988 UART: [art] PUB.Y = 2499991624479C7B3C37446A0EE5EB3BC6FB8A4FD5AFA021581B5BC4AAD5763BB21A5DE2219CF42D171F49DEC9C087F4
3,687,949 UART: [art] SIG.R = 70493CF6747EEF48D838F3E9D4015EACA1FB449516CC0D6AF7AFAD4CDCA858778626ACC75EC1EC8FFF010304B1B92487
3,694,722 UART: [art] SIG.S = 2B08679ACDE6F78FA2CFC078C4F8A6471C47E5F246777710D83CE823E887F652FBA06026C49F3980CE68D3735A3ED7EB
3,717,914 UART: Caliptra RT
3,718,259 UART: [state] CFI Enabled
3,825,440 UART: [rt] RT listening for mailbox commands...
3,826,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,872 UART: [rt]cmd =0x41544d4e, len=14344
4,864,279 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,426 ready_for_fw is high
1,060,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,172,049 >>> mbox cmd response: success
3,234,572 UART:
3,234,588 UART: Running Caliptra FMC ...
3,234,996 UART:
3,235,139 UART: [state] CFI Enabled
3,245,685 UART: [fht] FMC Alias Private Key: 7
3,353,419 UART: [art] Extend RT PCRs Done
3,353,847 UART: [art] Lock RT PCRs Done
3,355,629 UART: [art] Populate DV Done
3,363,725 UART: [fht] FMC Alias Private Key: 7
3,364,827 UART: [art] Derive CDI
3,365,107 UART: [art] Store in in slot 0x4
3,450,486 UART: [art] Derive Key Pair
3,450,846 UART: [art] Store priv key in slot 0x5
3,463,576 UART: [art] Derive Key Pair - Done
3,478,318 UART: [art] Signing Cert with AUTHO
3,478,798 UART: RITY.KEYID = 7
3,493,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,741 UART: [art] PUB.X = CCDCF0DE5F97886B116BB7CD39BB866C704471D2DA16D9800FD5AD1129FDA8E031C682ADD4C57873333BBB2AA869BF3B
3,501,528 UART: [art] PUB.Y = 9F7D703DFC14C361A56D73C7887BAA5C18822E9FFE6DB88F523C6B09A1CB41C5158BA827757FA555B342F74EF50CA9C0
3,508,484 UART: [art] SIG.R = 9D7BE02AFFF75472DB12F7B66AF78B8D8BFCF1B828311100195B05D17FD861E45D098471175B830BF8364187BB767DD5
3,515,227 UART: [art] SIG.S = D0098047E0C23DEEBD34186AC20C4737984BFC197A066356A144FB8654F1B405D238E83DA6A93FE96643AF87AD02A641
3,539,125 UART: Caliptra RT
3,539,470 UART: [state] CFI Enabled
3,647,133 UART: [rt] RT listening for mailbox commands...
3,647,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,770,983 UART: [rt]cmd =0x41544d4e, len=14344
4,696,136 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,458 UART: [state] LifecycleState = Unprovisioned
86,113 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,785 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,797 UART: [idev] ++
1,172,965 UART: [idev] CDI.KEYID = 6
1,173,326 UART: [idev] SUBJECT.KEYID = 7
1,173,751 UART: [idev] UDS.KEYID = 0
1,174,097 ready_for_fw is high
1,174,097 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,198,261 UART: [idev] Sha1 KeyId Algorithm
1,207,159 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,530 UART: [ldev] Erasing FE.KEYID = 1
1,240,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,450 UART: [ldev] --
1,279,848 UART: [fwproc] Wait for Commands...
1,280,431 UART: [fwproc] Recv command 0x46574c44
1,281,164 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,314,908 >>> mbox cmd response: success
3,315,935 UART: [afmc] ++
3,316,103 UART: [afmc] CDI.KEYID = 6
3,316,466 UART: [afmc] SUBJECT.KEYID = 7
3,316,892 UART: [afmc] AUTHORITY.KEYID = 5
3,351,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,113 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,823 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,713 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,424 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,280 UART: [afmc] --
3,395,322 UART: [cold-reset] --
3,396,064 UART: [state] Locking Datavault
3,397,485 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,089 UART: [state] Locking ICCM
3,398,701 UART: [exit] Launching FMC @ 0x40000130
3,404,030 UART:
3,404,046 UART: Running Caliptra FMC ...
3,404,454 UART:
3,404,508 UART: [state] CFI Enabled
3,414,962 UART: [fht] FMC Alias Private Key: 7
3,523,068 UART: [art] Extend RT PCRs Done
3,523,496 UART: [art] Lock RT PCRs Done
3,525,416 UART: [art] Populate DV Done
3,533,806 UART: [fht] FMC Alias Private Key: 7
3,534,852 UART: [art] Derive CDI
3,535,132 UART: [art] Store in in slot 0x4
3,620,421 UART: [art] Derive Key Pair
3,620,781 UART: [art] Store priv key in slot 0x5
3,634,141 UART: [art] Derive Key Pair - Done
3,648,950 UART: [art] Signing Cert with AUTHO
3,649,430 UART: RITY.KEYID = 7
3,664,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,587 UART: [art] PUB.X = 546BA6D13D28C8E0271EF87FCB1E902004CF683FB857A7108BC844037CCFA3681F57A0BFCB1EAD10A4E4235A7A3624B0
3,672,363 UART: [art] PUB.Y = CC453F946D76576FCBC8C8D523D4D1C7393DF322C9114FEA8B16C83C65F13C3948987DE5B5E4931FCFA9FC516177C5F3
3,679,323 UART: [art] SIG.R = 83BDD68713C82B3B46A281A96FE3459B880ADC384FC7AF7E8D73816D3A329C4A6E1140DD7D1DC513282E1F47A05A42B8
3,686,098 UART: [art] SIG.S = BF997AF5DA5839E5217BE11811253579C329E4A74DB72F5EFAB2B64C7F96136DA4BF683AFB1661CC7D97BA2A3292B9AA
3,710,603 UART: Caliptra RT
3,710,856 UART: [state] CFI Enabled
3,818,289 UART: [rt] RT listening for mailbox commands...
3,818,959 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,941,887 UART: [rt]cmd =0x41544d4e, len=14344
4,859,657 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,192 ready_for_fw is high
1,056,192 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,170,778 >>> mbox cmd response: success
3,232,125 UART:
3,232,141 UART: Running Caliptra FMC ...
3,232,549 UART:
3,232,603 UART: [state] CFI Enabled
3,243,095 UART: [fht] FMC Alias Private Key: 7
3,351,285 UART: [art] Extend RT PCRs Done
3,351,713 UART: [art] Lock RT PCRs Done
3,353,381 UART: [art] Populate DV Done
3,361,537 UART: [fht] FMC Alias Private Key: 7
3,362,683 UART: [art] Derive CDI
3,362,963 UART: [art] Store in in slot 0x4
3,448,622 UART: [art] Derive Key Pair
3,448,982 UART: [art] Store priv key in slot 0x5
3,462,714 UART: [art] Derive Key Pair - Done
3,477,830 UART: [art] Signing Cert with AUTHO
3,478,310 UART: RITY.KEYID = 7
3,493,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,167 UART: [art] PUB.X = EA2258D56213B267E8DC9C48D3436335F04EEF7E5BD1EF97E43B26A798B814CF5CB299DC58014474DAAB5608BE45B1AA
3,500,943 UART: [art] PUB.Y = 4315E9B06B34C3062435E984CBE9A0AC33F6ABCB9803B2E331AD7E13A77FAAF4335746FC992E86ACE6ACB563F50B2FBC
3,507,902 UART: [art] SIG.R = C6D1C82E44C18E16702E6A41DC436E1C9AAC9D0A0AF7C0437B7F7940F9B0CE87ACB36D812E25DDEC404574F6840C1FD1
3,514,679 UART: [art] SIG.S = 67138FDE569EA84AF2FFD658F85FFE610B42F84A55883B8DFF692E3D16808F7DA91E5A574DC5DD002C8E8DCC6F12EDC1
3,538,177 UART: Caliptra RT
3,538,430 UART: [state] CFI Enabled
3,645,176 UART: [rt] RT listening for mailbox commands...
3,645,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,768,874 UART: [rt]cmd =0x41544d4e, len=14344
4,684,273 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,516 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,174,414 ready_for_fw is high
1,174,414 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,862 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Sha1 KeyId Algorithm
1,207,556 UART: [idev] --
1,208,489 UART: [ldev] ++
1,208,657 UART: [ldev] CDI.KEYID = 6
1,209,021 UART: [ldev] SUBJECT.KEYID = 5
1,209,448 UART: [ldev] AUTHORITY.KEYID = 7
1,209,911 UART: [ldev] FE.KEYID = 1
1,215,327 UART: [ldev] Erasing FE.KEYID = 1
1,241,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,371 UART: [ldev] --
1,280,675 UART: [fwproc] Wait for Commands...
1,281,362 UART: [fwproc] Recv command 0x46574c44
1,282,095 UART: [fwproc] Recv'd Img size: 114168 bytes
3,126,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,319,249 >>> mbox cmd response: success
3,320,354 UART: [afmc] ++
3,320,522 UART: [afmc] CDI.KEYID = 6
3,320,885 UART: [afmc] SUBJECT.KEYID = 7
3,321,311 UART: [afmc] AUTHORITY.KEYID = 5
3,356,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,750 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,460 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,350 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,061 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,905 UART: [afmc] --
3,399,783 UART: [cold-reset] --
3,400,481 UART: [state] Locking Datavault
3,401,494 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,098 UART: [state] Locking ICCM
3,402,592 UART: [exit] Launching FMC @ 0x40000130
3,407,921 UART:
3,407,937 UART: Running Caliptra FMC ...
3,408,345 UART:
3,408,488 UART: [state] CFI Enabled
3,418,984 UART: [fht] FMC Alias Private Key: 7
3,526,684 UART: [art] Extend RT PCRs Done
3,527,112 UART: [art] Lock RT PCRs Done
3,528,796 UART: [art] Populate DV Done
3,536,914 UART: [fht] FMC Alias Private Key: 7
3,538,080 UART: [art] Derive CDI
3,538,360 UART: [art] Store in in slot 0x4
3,624,167 UART: [art] Derive Key Pair
3,624,527 UART: [art] Store priv key in slot 0x5
3,637,925 UART: [art] Derive Key Pair - Done
3,652,433 UART: [art] Signing Cert with AUTHO
3,652,913 UART: RITY.KEYID = 7
3,668,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,070 UART: [art] PUB.X = 3A64023D810921CE96C13B9C7D24DFFA562629989537EDB596CA700413593E23AFC74B1BCD09B987DD2DD99FADCF23CC
3,675,840 UART: [art] PUB.Y = 3F8A326DD791DC8532048214C4D3C65873CA4E25927FF152A9205889A6D1DFDAF3A4F2F341B7D1D05F259C1676917140
3,682,785 UART: [art] SIG.R = 0C1F7C499D7F42AACDD21209CB03202EABFB46683332D7C66E4F7859C9EF39FC3CEA7F341342170520EA06E0183EF5EA
3,689,552 UART: [art] SIG.S = 713EBFD386FCF8426FB35C0CFDC05335DBE7F9B0C33BF131CB2E0D15AA527D7A42BE599F12EEA02CB3569DFBAB339726
3,713,153 UART: Caliptra RT
3,713,498 UART: [state] CFI Enabled
3,821,311 UART: [rt] RT listening for mailbox commands...
3,821,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,151 UART: [rt]cmd =0x41544d4e, len=14344
4,867,475 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,187 ready_for_fw is high
1,057,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,168,106 >>> mbox cmd response: success
3,230,247 UART:
3,230,263 UART: Running Caliptra FMC ...
3,230,671 UART:
3,230,814 UART: [state] CFI Enabled
3,241,628 UART: [fht] FMC Alias Private Key: 7
3,348,892 UART: [art] Extend RT PCRs Done
3,349,320 UART: [art] Lock RT PCRs Done
3,350,826 UART: [art] Populate DV Done
3,359,248 UART: [fht] FMC Alias Private Key: 7
3,360,424 UART: [art] Derive CDI
3,360,704 UART: [art] Store in in slot 0x4
3,446,483 UART: [art] Derive Key Pair
3,446,843 UART: [art] Store priv key in slot 0x5
3,459,989 UART: [art] Derive Key Pair - Done
3,474,532 UART: [art] Signing Cert with AUTHO
3,475,012 UART: RITY.KEYID = 7
3,489,756 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,521 UART: [art] PUB.X = 4D5319C1568C16B4C38524F4CE12EE5659BDEEF26117BA1645D7D9A474174546D983AE1EDBB2CA7EA08D8C8531984855
3,497,295 UART: [art] PUB.Y = 606A9B51CE1791A9871B4120E133778AFFD539FD888AED52C5BC834B5F33FBFC46B141AD2CC7EDC612432F7D0036F340
3,504,233 UART: [art] SIG.R = A2F37ADA17AED1BD7C5F690C61345C61C174A3FA3C0317153E859A0518291C6C273CEA8A7271393261B125BA992A3716
3,510,994 UART: [art] SIG.S = 6FF6F81B92C4F837861514CE557DE5BCDDD7D1D578838C2E47585DD56E1F7132326D5607011495D344A4756DAB9FE04B
3,535,185 UART: Caliptra RT
3,535,530 UART: [state] CFI Enabled
3,642,472 UART: [rt] RT listening for mailbox commands...
3,643,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,765,902 UART: [rt]cmd =0x41544d4e, len=14344
4,693,980 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,076 UART:
192,442 UART: Running Caliptra ROM ...
193,640 UART:
193,793 UART: [state] CFI Enabled
267,282 UART: [state] LifecycleState = Unprovisioned
269,216 UART: [state] DebugLocked = No
270,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,207 UART: [kat] SHA2-256
444,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,461 UART: [kat] ++
455,904 UART: [kat] sha1
466,765 UART: [kat] SHA2-256
469,478 UART: [kat] SHA2-384
474,470 UART: [kat] SHA2-512-ACC
476,898 UART: [kat] ECC-384
2,769,165 UART: [kat] HMAC-384Kdf
2,800,605 UART: [kat] LMS
3,990,935 UART: [kat] --
3,996,592 UART: [cold-reset] ++
3,998,463 UART: [fht] Storing FHT @ 0x50003400
4,009,935 UART: [idev] ++
4,010,497 UART: [idev] CDI.KEYID = 6
4,011,524 UART: [idev] SUBJECT.KEYID = 7
4,012,692 UART: [idev] UDS.KEYID = 0
4,013,751 ready_for_fw is high
4,013,952 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,157 UART: [idev] Erasing UDS.KEYID = 0
7,349,294 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,625 UART: [idev] --
7,376,270 UART: [ldev] ++
7,376,890 UART: [ldev] CDI.KEYID = 6
7,377,824 UART: [ldev] SUBJECT.KEYID = 5
7,379,055 UART: [ldev] AUTHORITY.KEYID = 7
7,380,286 UART: [ldev] FE.KEYID = 1
7,423,089 UART: [ldev] Erasing FE.KEYID = 1
10,757,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,278 UART: [ldev] --
13,140,151 UART: [fwproc] Waiting for Commands...
13,143,477 UART: [fwproc] Received command 0x46574c44
13,145,651 UART: [fwproc] Received Image of size 113844 bytes
17,196,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,250 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,658,921 >>> mbox cmd response: success
17,663,750 UART: [afmc] ++
17,664,340 UART: [afmc] CDI.KEYID = 6
17,665,313 UART: [afmc] SUBJECT.KEYID = 7
17,666,522 UART: [afmc] AUTHORITY.KEYID = 5
21,028,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,673 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,933 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,344 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,357,207 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,645 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,657 UART: [afmc] --
23,398,223 UART: [cold-reset] --
23,402,408 UART: [state] Locking Datavault
23,407,382 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,077 UART: [state] Locking ICCM
23,411,278 UART: [exit] Launching FMC @ 0x40000130
23,419,646 UART:
23,419,879 UART: Running Caliptra FMC ...
23,420,972 UART:
23,421,128 UART: [state] CFI Enabled
23,487,882 UART: [fht] FMC Alias Private Key: 7
25,825,913 UART: [art] Extend RT PCRs Done
25,827,132 UART: [art] Lock RT PCRs Done
25,828,615 UART: [art] Populate DV Done
25,834,237 UART: [fht] FMC Alias Private Key: 7
25,835,767 UART: [art] Derive CDI
25,836,572 UART: [art] Store in in slot 0x4
25,895,753 UART: [art] Derive Key Pair
25,896,801 UART: [art] Store priv key in slot 0x5
29,189,215 UART: [art] Derive Key Pair - Done
29,202,288 UART: [art] Signing Cert with AUTHO
29,203,591 UART: RITY.KEYID = 7
31,490,093 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,662 UART: [art] PUB.X = EE1D4764E27191FC7272753F39B5ACEE38F22ACDEBADD7156664AD169D7D5077DAF046104FC8A6622EACF45A026A4BB1
31,498,829 UART: [art] PUB.Y = C5469CC97FC30C039632A8FE088D724F3B5486D8E8D9053ADA26E1F0C62AC24285B9F375A97ADD56FB8304461A0180B3
31,506,080 UART: [art] SIG.R = D91E85B816A5AFED0C78A67B5DE9632DF0EE054B8E500A05AA07AFDA7224235841C0A68C6EF22D28F755C0FDB31C643E
31,513,501 UART: [art] SIG.S = 5DE558B1480511A70C602DEE72D98B998D50F2A5C25B12211002B32F1D510FA68C12B69BB827B7B298575EE98344B9AF
32,818,485 UART: Caliptra RT
32,819,169 UART: [state] CFI Enabled
32,980,072 UART: [rt] RT listening for mailbox commands...
32,982,388 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,137,721 UART: [rt]cmd =0x41544d4e, len=14344
38,438,220 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,783,258 ready_for_fw is high
3,783,769 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,870,489 >>> mbox cmd response: success
23,567,648 UART:
23,568,032 UART: Running Caliptra FMC ...
23,569,220 UART:
23,569,387 UART: [state] CFI Enabled
23,637,444 UART: [fht] FMC Alias Private Key: 7
25,975,597 UART: [art] Extend RT PCRs Done
25,976,822 UART: [art] Lock RT PCRs Done
25,978,282 UART: [art] Populate DV Done
25,983,739 UART: [fht] FMC Alias Private Key: 7
25,985,219 UART: [art] Derive CDI
25,985,975 UART: [art] Store in in slot 0x4
26,046,319 UART: [art] Derive Key Pair
26,047,359 UART: [art] Store priv key in slot 0x5
29,339,805 UART: [art] Derive Key Pair - Done
29,353,128 UART: [art] Signing Cert with AUTHO
29,354,425 UART: RITY.KEYID = 7
31,642,545 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,056 UART: [art] PUB.X = 5E8A2C314B9780E431F87AB612EA2A37086475683DBEDBB86E53287EFF1681B3371664C99D465DCEACB9F820A5BE1107
31,651,281 UART: [art] PUB.Y = 56E65850B58BE9987F8B007412BEFDFB1EA6916E6B97413EBBC62987947867E2B814E77C19F9B125B4DF83362FB8A8EC
31,658,513 UART: [art] SIG.R = F22099B951C4D90AED44798AE2928637F152ADDC30519CCC4C34CFBCB9639ECE0D5044010643425C32C753A368CC39CF
31,665,942 UART: [art] SIG.S = 5F8C1C83E25086BCA684C2F96357E14B333725A123D5F53B29943575ADFE9A9E9BFFB6EF745237576E3ED46EBEEEBFCB
32,971,386 UART: Caliptra RT
32,972,098 UART: [state] CFI Enabled
33,132,782 UART: [rt] RT listening for mailbox commands...
33,135,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,290,514 UART: [rt]cmd =0x41544d4e, len=14344
38,590,499 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,429 UART:
192,787 UART: Running Caliptra ROM ...
193,990 UART:
603,518 UART: [state] CFI Enabled
616,074 UART: [state] LifecycleState = Unprovisioned
618,041 UART: [state] DebugLocked = No
619,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,346 UART: [kat] SHA2-256
794,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,646 UART: [kat] ++
805,094 UART: [kat] sha1
816,328 UART: [kat] SHA2-256
818,984 UART: [kat] SHA2-384
826,255 UART: [kat] SHA2-512-ACC
828,620 UART: [kat] ECC-384
3,110,376 UART: [kat] HMAC-384Kdf
3,122,058 UART: [kat] LMS
4,312,112 UART: [kat] --
4,317,328 UART: [cold-reset] ++
4,318,557 UART: [fht] Storing FHT @ 0x50003400
4,331,668 UART: [idev] ++
4,332,251 UART: [idev] CDI.KEYID = 6
4,333,214 UART: [idev] SUBJECT.KEYID = 7
4,334,391 UART: [idev] UDS.KEYID = 0
4,335,464 ready_for_fw is high
4,335,672 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,611 UART: [idev] Erasing UDS.KEYID = 0
7,619,174 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,110 UART: [idev] --
7,646,702 UART: [ldev] ++
7,647,279 UART: [ldev] CDI.KEYID = 6
7,648,247 UART: [ldev] SUBJECT.KEYID = 5
7,649,460 UART: [ldev] AUTHORITY.KEYID = 7
7,650,690 UART: [ldev] FE.KEYID = 1
7,663,708 UART: [ldev] Erasing FE.KEYID = 1
10,948,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,785 UART: [ldev] --
13,307,345 UART: [fwproc] Waiting for Commands...
13,309,332 UART: [fwproc] Received command 0x46574c44
13,311,513 UART: [fwproc] Received Image of size 113844 bytes
17,359,665 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,708 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,821,442 >>> mbox cmd response: success
17,826,086 UART: [afmc] ++
17,826,684 UART: [afmc] CDI.KEYID = 6
17,827,576 UART: [afmc] SUBJECT.KEYID = 7
17,828,846 UART: [afmc] AUTHORITY.KEYID = 5
21,144,127 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,803 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,111 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,443 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,304 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,731 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,676 UART: [afmc] --
23,508,261 UART: [cold-reset] --
23,511,106 UART: [state] Locking Datavault
23,516,197 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,952 UART: [state] Locking ICCM
23,519,295 UART: [exit] Launching FMC @ 0x40000130
23,527,695 UART:
23,527,936 UART: Running Caliptra FMC ...
23,529,038 UART:
23,529,200 UART: [state] CFI Enabled
23,537,299 UART: [fht] FMC Alias Private Key: 7
25,868,720 UART: [art] Extend RT PCRs Done
25,869,936 UART: [art] Lock RT PCRs Done
25,871,263 UART: [art] Populate DV Done
25,876,733 UART: [fht] FMC Alias Private Key: 7
25,878,323 UART: [art] Derive CDI
25,879,060 UART: [art] Store in in slot 0x4
25,922,029 UART: [art] Derive Key Pair
25,923,076 UART: [art] Store priv key in slot 0x5
29,165,614 UART: [art] Derive Key Pair - Done
29,178,279 UART: [art] Signing Cert with AUTHO
29,179,583 UART: RITY.KEYID = 7
31,459,122 UART: [art] Erasing AUTHORITY.KEYID = 7
31,460,630 UART: [art] PUB.X = 91629503271AE26436A3B9CBC3D32C58AA84B3A05E76415B0F3C17936033822118BD501DC6A2D741F2A7B46C3FBB692A
31,467,892 UART: [art] PUB.Y = CD6A0B2260C2EE1E4559D9702997B523A20F41D4FA914FBD085800D1D39FC93C9A9575A33FFB0DDC0785B82ACE322EDC
31,475,139 UART: [art] SIG.R = 618A7D43CF706BFB325EB2370F59BEF16904BAE6786155F238B4D07A98B7021780B5A75EEC6962103BA80F08C133FE16
31,482,536 UART: [art] SIG.S = 87E93960DC4FF4F18EBB026CF61CF6B6F36BE19EA3553A7EBB06B686D1DB6EB11EBC82B7EDDBEDFD751FBBD0ECA19115
32,787,782 UART: Caliptra RT
32,788,492 UART: [state] CFI Enabled
32,905,982 UART: [rt] RT listening for mailbox commands...
32,908,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,063,605 UART: [rt]cmd =0x41544d4e, len=14344
38,363,918 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
4,123,429 ready_for_fw is high
4,123,819 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,046,970 >>> mbox cmd response: success
23,685,909 UART:
23,686,320 UART: Running Caliptra FMC ...
23,687,423 UART:
23,687,588 UART: [state] CFI Enabled
23,695,917 UART: [fht] FMC Alias Private Key: 7
26,026,607 UART: [art] Extend RT PCRs Done
26,027,834 UART: [art] Lock RT PCRs Done
26,029,988 UART: [art] Populate DV Done
26,035,349 UART: [fht] FMC Alias Private Key: 7
26,036,945 UART: [art] Derive CDI
26,037,691 UART: [art] Store in in slot 0x4
26,080,896 UART: [art] Derive Key Pair
26,081,939 UART: [art] Store priv key in slot 0x5
29,324,122 UART: [art] Derive Key Pair - Done
29,337,143 UART: [art] Signing Cert with AUTHO
29,338,454 UART: RITY.KEYID = 7
31,617,696 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,205 UART: [art] PUB.X = A2AB3CB41F4BE845F52C681BFCEC1C7C75E1D7ED2877C1057F7AB45510FD32630B73F0F7A64980C97A2CF1A39A74F25C
31,626,463 UART: [art] PUB.Y = 1A6100A78F140D97E21BB83ED1002B5C515BB240D4C3684E68A7460434303D117D1C4EEDA2966EDE4A5E5DBF5E6E6876
31,633,633 UART: [art] SIG.R = 7E1D085C9477B998B6E6DE84822B749CB7B4F9AACD3188659576B6C59ECCE1F656F6741C777AB6D579C205D77A668449
31,641,041 UART: [art] SIG.S = 49A3BF3CEFF4A50A9ECA99182F6B4E392EB69C4DFC32F0CF6CDD9645DF53913AD6EFB78594D4F71DBEFC2AA9478CE0E7
32,945,764 UART: Caliptra RT
32,946,471 UART: [state] CFI Enabled
33,063,720 UART: [rt] RT listening for mailbox commands...
33,066,026 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,221,333 UART: [rt]cmd =0x41544d4e, len=14344
38,522,767 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,878 writing to cptra_bootfsm_go
192,989 UART:
193,341 UART: Running Caliptra ROM ...
194,536 UART:
194,710 UART: [state] CFI Enabled
264,315 UART: [state] LifecycleState = Unprovisioned
266,221 UART: [state] DebugLocked = No
269,025 UART: [state] WD Timer not started. Device not locked for debugging
273,277 UART: [kat] SHA2-256
452,352 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,967 UART: [kat] ++
464,507 UART: [kat] sha1
475,749 UART: [kat] SHA2-256
478,827 UART: [kat] SHA2-384
484,638 UART: [kat] SHA2-512-ACC
487,607 UART: [kat] ECC-384
2,948,405 UART: [kat] HMAC-384Kdf
2,971,447 UART: [kat] LMS
3,500,901 UART: [kat] --
3,504,459 UART: [cold-reset] ++
3,506,549 UART: [fht] FHT @ 0x50003400
3,517,598 UART: [idev] ++
3,518,166 UART: [idev] CDI.KEYID = 6
3,519,047 UART: [idev] SUBJECT.KEYID = 7
3,520,293 UART: [idev] UDS.KEYID = 0
3,521,975 ready_for_fw is high
3,522,191 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,629 UART: [idev] Erasing UDS.KEYID = 0
6,028,776 UART: [idev] Sha1 KeyId Algorithm
6,051,422 UART: [idev] --
6,054,020 UART: [ldev] ++
6,054,598 UART: [ldev] CDI.KEYID = 6
6,055,514 UART: [ldev] SUBJECT.KEYID = 5
6,056,677 UART: [ldev] AUTHORITY.KEYID = 7
6,057,965 UART: [ldev] FE.KEYID = 1
6,100,063 UART: [ldev] Erasing FE.KEYID = 1
8,604,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,600 UART: [ldev] --
10,413,928 UART: [fwproc] Wait for Commands...
10,416,135 UART: [fwproc] Recv command 0x46574c44
10,418,230 UART: [fwproc] Recv'd Img size: 114168 bytes
13,827,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,287,224 >>> mbox cmd response: success
14,291,608 UART: [afmc] ++
14,292,200 UART: [afmc] CDI.KEYID = 6
14,293,114 UART: [afmc] SUBJECT.KEYID = 7
14,294,303 UART: [afmc] AUTHORITY.KEYID = 5
16,832,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,440 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,292 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,648 UART: [afmc] --
18,629,944 UART: [cold-reset] --
18,634,391 UART: [state] Locking Datavault
18,639,265 UART: [state] Locking PCR0, PCR1 and PCR31
18,641,062 UART: [state] Locking ICCM
18,642,324 UART: [exit] Launching FMC @ 0x40000130
18,650,731 UART:
18,650,963 UART: Running Caliptra FMC ...
18,652,060 UART:
18,652,243 UART: [state] CFI Enabled
18,712,329 UART: [fht] FMC Alias Private Key: 7
20,477,148 UART: [art] Extend RT PCRs Done
20,478,368 UART: [art] Lock RT PCRs Done
20,480,079 UART: [art] Populate DV Done
20,485,587 UART: [fht] FMC Alias Private Key: 7
20,487,297 UART: [art] Derive CDI
20,488,111 UART: [art] Store in in slot 0x4
20,545,149 UART: [art] Derive Key Pair
20,546,147 UART: [art] Store priv key in slot 0x5
23,009,578 UART: [art] Derive Key Pair - Done
23,022,734 UART: [art] Signing Cert with AUTHO
23,024,048 UART: RITY.KEYID = 7
24,735,555 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,057 UART: [art] PUB.X = 345076CC83A15B6A8A99F2FC3CB704DA265419AE823CF8BFF41820CD422F38D94061F454791622A6B2FDE02DD55DF96C
24,744,317 UART: [art] PUB.Y = 7E801F416CC977841BF6D6C5AC9C733DDB5CB17FD79C79D4F9F04937F9C6F5F650E8FBA2D38CD8EA36ABF36A8B670B6E
24,751,574 UART: [art] SIG.R = FCF2B4E2C630394FE66D361E88EACA3F7B9E6E193A1BA722B5C7A66A493F525C620EE4459530DD5970043E117133B9F7
24,758,973 UART: [art] SIG.S = 8168F312D31FBD559A52BB71A4668C116F1A52908DF439075F9B008B3CBC764400E9CB6154DA2949CBB93BF23C083A66
25,737,756 UART: Caliptra RT
25,738,442 UART: [state] CFI Enabled
25,903,319 UART: [rt] RT listening for mailbox commands...
25,905,654 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,061,135 UART: [rt]cmd =0x41544d4e, len=14344
30,057,191 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,381,685 ready_for_fw is high
3,382,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,086,114 >>> mbox cmd response: success
18,380,852 UART:
18,381,238 UART: Running Caliptra FMC ...
18,382,381 UART:
18,382,541 UART: [state] CFI Enabled
18,451,670 UART: [fht] FMC Alias Private Key: 7
20,215,542 UART: [art] Extend RT PCRs Done
20,216,764 UART: [art] Lock RT PCRs Done
20,218,510 UART: [art] Populate DV Done
20,224,264 UART: [fht] FMC Alias Private Key: 7
20,225,813 UART: [art] Derive CDI
20,226,548 UART: [art] Store in in slot 0x4
20,284,663 UART: [art] Derive Key Pair
20,285,664 UART: [art] Store priv key in slot 0x5
22,748,429 UART: [art] Derive Key Pair - Done
22,761,421 UART: [art] Signing Cert with AUTHO
22,762,751 UART: RITY.KEYID = 7
24,473,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,474 UART: [art] PUB.X = A4AD4AD3A53C05621DED48BCFE1732CD23A7D17CAA4D4FCDBF32C900E9F5D9B7E791C62F1ED0F6688361F1D231EBB422
24,482,778 UART: [art] PUB.Y = 9DCD74F32CB08566EAB2B7E8D05ECEB4C2D4B7166D9A12609F8E5980393636FF8DC73BA9B964BD47BD8DBCE9475B7FE3
24,490,082 UART: [art] SIG.R = 0117BD489D9702EDFF9AE1720DA6036FD9A8D55014B079C96B0409290074E4145AC9AF884E468DC69AED18E12B0C9848
24,497,413 UART: [art] SIG.S = EF5668D0600CEF46B124964770CC303F81E6C015BED8C4D1664E052EAB9D5DC5D3048D8CC098B7E248C3722DFA2A3BFA
25,476,336 UART: Caliptra RT
25,477,030 UART: [state] CFI Enabled
25,641,378 UART: [rt] RT listening for mailbox commands...
25,643,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,798,987 UART: [rt]cmd =0x41544d4e, len=14344
29,794,114 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
192,972 UART:
193,351 UART: Running Caliptra ROM ...
194,455 UART:
604,286 UART: [state] CFI Enabled
617,888 UART: [state] LifecycleState = Unprovisioned
619,758 UART: [state] DebugLocked = No
621,211 UART: [state] WD Timer not started. Device not locked for debugging
625,737 UART: [kat] SHA2-256
804,837 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,512 UART: [kat] ++
816,993 UART: [kat] sha1
827,447 UART: [kat] SHA2-256
830,458 UART: [kat] SHA2-384
837,587 UART: [kat] SHA2-512-ACC
840,605 UART: [kat] ECC-384
3,279,802 UART: [kat] HMAC-384Kdf
3,291,776 UART: [kat] LMS
3,821,281 UART: [kat] --
3,826,129 UART: [cold-reset] ++
3,828,127 UART: [fht] FHT @ 0x50003400
3,839,047 UART: [idev] ++
3,839,623 UART: [idev] CDI.KEYID = 6
3,840,534 UART: [idev] SUBJECT.KEYID = 7
3,841,656 UART: [idev] UDS.KEYID = 0
3,842,707 ready_for_fw is high
3,842,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,359 UART: [idev] Erasing UDS.KEYID = 0
6,313,851 UART: [idev] Sha1 KeyId Algorithm
6,336,744 UART: [idev] --
6,340,922 UART: [ldev] ++
6,341,497 UART: [ldev] CDI.KEYID = 6
6,342,410 UART: [ldev] SUBJECT.KEYID = 5
6,343,565 UART: [ldev] AUTHORITY.KEYID = 7
6,344,792 UART: [ldev] FE.KEYID = 1
6,355,487 UART: [ldev] Erasing FE.KEYID = 1
8,826,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,751 UART: [ldev] --
10,618,230 UART: [fwproc] Wait for Commands...
10,619,783 UART: [fwproc] Recv command 0x46574c44
10,621,875 UART: [fwproc] Recv'd Img size: 114168 bytes
14,016,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,087,434 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,156,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,473,167 >>> mbox cmd response: success
14,476,951 UART: [afmc] ++
14,477,542 UART: [afmc] CDI.KEYID = 6
14,478,459 UART: [afmc] SUBJECT.KEYID = 7
14,479,619 UART: [afmc] AUTHORITY.KEYID = 5
16,973,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,692,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,694,893 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,710,677 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,726,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,742,586 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,764,849 UART: [afmc] --
18,768,624 UART: [cold-reset] --
18,772,378 UART: [state] Locking Datavault
18,776,593 UART: [state] Locking PCR0, PCR1 and PCR31
18,778,238 UART: [state] Locking ICCM
18,779,252 UART: [exit] Launching FMC @ 0x40000130
18,787,653 UART:
18,787,890 UART: Running Caliptra FMC ...
18,788,993 UART:
18,789,155 UART: [state] CFI Enabled
18,797,387 UART: [fht] FMC Alias Private Key: 7
20,554,776 UART: [art] Extend RT PCRs Done
20,555,996 UART: [art] Lock RT PCRs Done
20,557,513 UART: [art] Populate DV Done
20,563,298 UART: [fht] FMC Alias Private Key: 7
20,564,945 UART: [art] Derive CDI
20,565,756 UART: [art] Store in in slot 0x4
20,608,000 UART: [art] Derive Key Pair
20,609,042 UART: [art] Store priv key in slot 0x5
23,035,605 UART: [art] Derive Key Pair - Done
23,048,600 UART: [art] Signing Cert with AUTHO
23,049,908 UART: RITY.KEYID = 7
24,755,245 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,752 UART: [art] PUB.X = 07517DDC27A8B93B802B9D40160ACFB3E17EEC68C7971B7E7E7BB93C1BD5BD9582AED34F2E1714D5BE1E97F5507C93AE
24,764,015 UART: [art] PUB.Y = C6E7C25786F259982F751CD860E44A76A3DD31537FA0210012C77F353C3E5C6BCC5BB64B022A4D151FE7B3AAF0C1B53B
24,771,270 UART: [art] SIG.R = 7AD4A2436373729EC9D4DC43239C89CACE8E889AE997865721EA8C0BE36509E11AD76D741C8997BFBF1E7E6973BE6E9B
24,778,639 UART: [art] SIG.S = 0E284D9E578CC19BA5370A253F22D36E0D4F77A5AB2CE108213C54756085A20BC55DD60DBE7D0105B22E335302020A80
25,757,723 UART: Caliptra RT
25,758,414 UART: [state] CFI Enabled
25,876,068 UART: [rt] RT listening for mailbox commands...
25,878,369 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,033,668 UART: [rt]cmd =0x41544d4e, len=14344
30,028,947 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,798 writing to cptra_bootfsm_go
3,698,279 ready_for_fw is high
3,698,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,257,255 >>> mbox cmd response: success
18,513,135 UART:
18,513,536 UART: Running Caliptra FMC ...
18,514,641 UART:
18,514,799 UART: [state] CFI Enabled
18,522,937 UART: [fht] FMC Alias Private Key: 7
20,279,532 UART: [art] Extend RT PCRs Done
20,280,761 UART: [art] Lock RT PCRs Done
20,282,741 UART: [art] Populate DV Done
20,288,078 UART: [fht] FMC Alias Private Key: 7
20,289,784 UART: [art] Derive CDI
20,290,599 UART: [art] Store in in slot 0x4
20,332,765 UART: [art] Derive Key Pair
20,333,802 UART: [art] Store priv key in slot 0x5
22,760,113 UART: [art] Derive Key Pair - Done
22,772,836 UART: [art] Signing Cert with AUTHO
22,774,144 UART: RITY.KEYID = 7
24,479,377 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,016 UART: [art] PUB.X = EA214C06096DC1B8BA90487DF76752EB7DFE472284127B3A5BF9D2E1715012A7A980D229E0C14F7F5871061A033295E7
24,488,114 UART: [art] PUB.Y = C156E47C59FAB645811637384FC4910521DDA3C1FFB40C6307801FDEB993070D5471A05C07401E7250C584C413E7E881
24,495,375 UART: [art] SIG.R = 20E03330B4F811BF583F8F54FEED07871E5CF3CFFAF541AE8B73517A07B8907B6057C2698F304B9D6A02C98FD01B29A2
24,502,794 UART: [art] SIG.S = 1CC7C6748C41B5CA584A331C496A791FADE2451074368EB5ED8229D18B6B6897FAF716282C15C1A1B7F780E03DDD5A54
25,482,110 UART: Caliptra RT
25,482,802 UART: [state] CFI Enabled
25,600,019 UART: [rt] RT listening for mailbox commands...
25,602,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,757,875 UART: [rt]cmd =0x41544d4e, len=14344
29,753,312 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,028 UART:
192,417 UART: Running Caliptra ROM ...
193,733 UART:
193,898 UART: [state] CFI Enabled
260,126 UART: [state] LifecycleState = Unprovisioned
262,547 UART: [state] DebugLocked = No
263,874 UART: [state] WD Timer not started. Device not locked for debugging
268,972 UART: [kat] SHA2-256
458,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,606 UART: [kat] ++
470,101 UART: [kat] sha1
482,182 UART: [kat] SHA2-256
485,192 UART: [kat] SHA2-384
491,208 UART: [kat] SHA2-512-ACC
493,760 UART: [kat] ECC-384
2,947,515 UART: [kat] HMAC-384Kdf
2,971,893 UART: [kat] LMS
3,503,671 UART: [kat] --
3,509,264 UART: [cold-reset] ++
3,510,573 UART: [fht] FHT @ 0x50003400
3,523,195 UART: [idev] ++
3,523,831 UART: [idev] CDI.KEYID = 6
3,524,788 UART: [idev] SUBJECT.KEYID = 7
3,526,031 UART: [idev] UDS.KEYID = 0
3,526,957 ready_for_fw is high
3,527,178 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,977 UART: [idev] Erasing UDS.KEYID = 0
6,027,811 UART: [idev] Sha1 KeyId Algorithm
6,050,882 UART: [idev] --
6,056,184 UART: [ldev] ++
6,056,868 UART: [ldev] CDI.KEYID = 6
6,057,754 UART: [ldev] SUBJECT.KEYID = 5
6,058,968 UART: [ldev] AUTHORITY.KEYID = 7
6,060,204 UART: [ldev] FE.KEYID = 1
6,098,597 UART: [ldev] Erasing FE.KEYID = 1
8,605,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,585 UART: [ldev] --
10,410,479 UART: [fwproc] Wait for Commands...
10,413,313 UART: [fwproc] Recv command 0x46574c44
10,415,627 UART: [fwproc] Recv'd Img size: 114168 bytes
13,864,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,127 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,595,219 >>> mbox cmd response: success
14,599,561 UART: [afmc] ++
14,600,278 UART: [afmc] CDI.KEYID = 6
14,601,469 UART: [afmc] SUBJECT.KEYID = 7
14,602,911 UART: [afmc] AUTHORITY.KEYID = 5
17,126,805 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,604 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,832 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,951 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,013 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,150 UART: [afmc] --
18,924,831 UART: [cold-reset] --
18,928,488 UART: [state] Locking Datavault
18,934,025 UART: [state] Locking PCR0, PCR1 and PCR31
18,936,191 UART: [state] Locking ICCM
18,939,107 UART: [exit] Launching FMC @ 0x40000130
18,947,801 UART:
18,948,039 UART: Running Caliptra FMC ...
18,949,144 UART:
18,949,305 UART: [state] CFI Enabled
19,009,570 UART: [fht] FMC Alias Private Key: 7
20,773,585 UART: [art] Extend RT PCRs Done
20,774,804 UART: [art] Lock RT PCRs Done
20,776,544 UART: [art] Populate DV Done
20,782,133 UART: [fht] FMC Alias Private Key: 7
20,783,723 UART: [art] Derive CDI
20,784,538 UART: [art] Store in in slot 0x4
20,841,741 UART: [art] Derive Key Pair
20,842,781 UART: [art] Store priv key in slot 0x5
23,305,676 UART: [art] Derive Key Pair - Done
23,318,730 UART: [art] Signing Cert with AUTHO
23,320,032 UART: RITY.KEYID = 7
25,032,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,034,007 UART: [art] PUB.X = A6502E08462B3C91B01B88AF719E9D2019FDD84BA02789ACA74D6BE23D1EE02345D65A8C6035648B08CDDAEDDA7AA3B9
25,041,284 UART: [art] PUB.Y = 74F49DF4BD8D63F4E451D9E2DE80642FF8DA86F1E1E9D8475E802D27041FA90456357C71410E226D552E8D86120BBD7C
25,048,546 UART: [art] SIG.R = 9170665F918827E0B66092907CD1C0E78B93052D83FE8669739691222C4B638897DB933666A397878FD21AEA43361BE5
25,055,893 UART: [art] SIG.S = A88A9B1E6A9220FA280F80213E125E9892F64B72F567127ABB54BAFF45958378973855862E8A717325D65DCD17BE0013
26,034,363 UART: Caliptra RT
26,035,069 UART: [state] CFI Enabled
26,200,683 UART: [rt] RT listening for mailbox commands...
26,203,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,358,162 UART: [rt]cmd =0x41544d4e, len=14344
30,353,648 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,439,461 ready_for_fw is high
3,440,079 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,744,960 >>> mbox cmd response: success
19,020,401 UART:
19,020,803 UART: Running Caliptra FMC ...
19,022,016 UART:
19,022,203 UART: [state] CFI Enabled
19,092,046 UART: [fht] FMC Alias Private Key: 7
20,855,155 UART: [art] Extend RT PCRs Done
20,856,361 UART: [art] Lock RT PCRs Done
20,858,152 UART: [art] Populate DV Done
20,863,762 UART: [fht] FMC Alias Private Key: 7
20,865,353 UART: [art] Derive CDI
20,866,092 UART: [art] Store in in slot 0x4
20,924,276 UART: [art] Derive Key Pair
20,925,335 UART: [art] Store priv key in slot 0x5
23,388,108 UART: [art] Derive Key Pair - Done
23,401,381 UART: [art] Signing Cert with AUTHO
23,402,713 UART: RITY.KEYID = 7
25,113,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,099 UART: [art] PUB.X = 3445BC7AB0C1E711B6EB336BFFD11FDD1AC1E26934E47893C3DB0100A74F192D29EAD2D37E00F9107078283AE00238D0
25,122,338 UART: [art] PUB.Y = 48380B992C94A68B678106F3798F8E811269B7D398301CF3C697E7D0C66C396AF95431E719130C5E4AA16BF28EA589CF
25,129,573 UART: [art] SIG.R = 4B3A7E8198BB66A2EAF7CF7FEEA2351A542418FD1B3E12E004DD6284C1A8F9130DE6D6ADAF3FE4027F4B826F3D9352E2
25,137,002 UART: [art] SIG.S = 2D3B0AB92F7F8CCB40F4C227E16AFED3A572B9050D7B52FFF0F73A416B68E90E8EFACD26D6F79CE34CEB2A218069ED89
26,116,076 UART: Caliptra RT
26,116,795 UART: [state] CFI Enabled
26,282,392 UART: [rt] RT listening for mailbox commands...
26,284,719 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,439,867 UART: [rt]cmd =0x41544d4e, len=14344
30,434,884 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
192,855 UART:
193,221 UART: Running Caliptra ROM ...
194,350 UART:
604,066 UART: [state] CFI Enabled
621,000 UART: [state] LifecycleState = Unprovisioned
623,378 UART: [state] DebugLocked = No
625,844 UART: [state] WD Timer not started. Device not locked for debugging
630,507 UART: [kat] SHA2-256
820,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,309 UART: [kat] ++
831,779 UART: [kat] sha1
842,514 UART: [kat] SHA2-256
845,532 UART: [kat] SHA2-384
850,386 UART: [kat] SHA2-512-ACC
853,036 UART: [kat] ECC-384
3,292,866 UART: [kat] HMAC-384Kdf
3,304,751 UART: [kat] LMS
3,836,525 UART: [kat] --
3,840,122 UART: [cold-reset] ++
3,841,491 UART: [fht] FHT @ 0x50003400
3,853,750 UART: [idev] ++
3,854,390 UART: [idev] CDI.KEYID = 6
3,855,369 UART: [idev] SUBJECT.KEYID = 7
3,856,549 UART: [idev] UDS.KEYID = 0
3,857,456 ready_for_fw is high
3,857,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,570 UART: [idev] Erasing UDS.KEYID = 0
6,337,257 UART: [idev] Sha1 KeyId Algorithm
6,360,154 UART: [idev] --
6,365,958 UART: [ldev] ++
6,366,701 UART: [ldev] CDI.KEYID = 6
6,367,614 UART: [ldev] SUBJECT.KEYID = 5
6,368,772 UART: [ldev] AUTHORITY.KEYID = 7
6,370,003 UART: [ldev] FE.KEYID = 1
6,380,868 UART: [ldev] Erasing FE.KEYID = 1
8,855,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,759 UART: [ldev] --
10,645,513 UART: [fwproc] Wait for Commands...
10,647,556 UART: [fwproc] Recv command 0x46574c44
10,649,866 UART: [fwproc] Recv'd Img size: 114168 bytes
14,096,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,210 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,600 >>> mbox cmd response: success
14,835,415 UART: [afmc] ++
14,836,156 UART: [afmc] CDI.KEYID = 6
14,837,354 UART: [afmc] SUBJECT.KEYID = 7
14,838,792 UART: [afmc] AUTHORITY.KEYID = 5
17,343,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,315 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,311 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,759 UART: [afmc] --
19,143,413 UART: [cold-reset] --
19,148,573 UART: [state] Locking Datavault
19,154,421 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,607 UART: [state] Locking ICCM
19,159,308 UART: [exit] Launching FMC @ 0x40000130
19,167,983 UART:
19,168,227 UART: Running Caliptra FMC ...
19,169,279 UART:
19,169,437 UART: [state] CFI Enabled
19,177,970 UART: [fht] FMC Alias Private Key: 7
20,934,950 UART: [art] Extend RT PCRs Done
20,936,192 UART: [art] Lock RT PCRs Done
20,938,105 UART: [art] Populate DV Done
20,943,517 UART: [fht] FMC Alias Private Key: 7
20,945,052 UART: [art] Derive CDI
20,945,816 UART: [art] Store in in slot 0x4
20,988,516 UART: [art] Derive Key Pair
20,989,507 UART: [art] Store priv key in slot 0x5
23,416,624 UART: [art] Derive Key Pair - Done
23,429,503 UART: [art] Signing Cert with AUTHO
23,430,808 UART: RITY.KEYID = 7
25,136,608 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,112 UART: [art] PUB.X = F68C823B2CAB71933F7E05F38537B04339915A2067636F86BBE0115654D062AD824641B25C60669917809DF0959AD24E
25,145,360 UART: [art] PUB.Y = 6DF21ADC642A9F359B58261E05C6AD690EF8A195C4485B19449FCC9326342E25D08B104F114D160DA8F899AF8AEC8B5F
25,152,632 UART: [art] SIG.R = BEA469893D39B1A29AB4DB7E76E7DD261BDD1B5288E1387EE34E5B5B873B565A284A69D50FE4DE8751CD7CD2CF050E30
25,160,038 UART: [art] SIG.S = 1C00EA015A63A759E056F3A30A88288B1F3FFC73CB43567FD2EE90252049D3BA3FCB51FC811D4442F4FBAD28A6A7DBB6
26,138,783 UART: Caliptra RT
26,139,505 UART: [state] CFI Enabled
26,257,139 UART: [rt] RT listening for mailbox commands...
26,259,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,414,670 UART: [rt]cmd =0x41544d4e, len=14344
30,409,933 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
3,752,561 ready_for_fw is high
3,753,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,942,672 >>> mbox cmd response: success
19,193,919 UART:
19,194,348 UART: Running Caliptra FMC ...
19,195,487 UART:
19,195,647 UART: [state] CFI Enabled
19,203,619 UART: [fht] FMC Alias Private Key: 7
20,960,640 UART: [art] Extend RT PCRs Done
20,961,866 UART: [art] Lock RT PCRs Done
20,963,597 UART: [art] Populate DV Done
20,969,057 UART: [fht] FMC Alias Private Key: 7
20,970,717 UART: [art] Derive CDI
20,971,536 UART: [art] Store in in slot 0x4
21,013,977 UART: [art] Derive Key Pair
21,015,024 UART: [art] Store priv key in slot 0x5
23,442,183 UART: [art] Derive Key Pair - Done
23,455,252 UART: [art] Signing Cert with AUTHO
23,456,556 UART: RITY.KEYID = 7
25,161,557 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,066 UART: [art] PUB.X = 78FE05AC1247A5A78A3EF79DB0E6E341B19BB71949EAF2B3F9C8541C48AE9A0F656E60CC9473A3070BF86E6866AF7002
25,170,330 UART: [art] PUB.Y = 6AC96DCDE4ADAAEDE50A0089CD356C62205D0A2940F5EACEEF5B00F1D44AB7F297E86F5FF3A0BE5CA66D08021D377AFF
25,177,559 UART: [art] SIG.R = 9C863ACC8427618E7FF8DEC0517DA62FA445885BB6AE52B73AF02BDAFA6C297B685009619857150A53290A713D4FF7A9
25,184,985 UART: [art] SIG.S = 91B92888EAB01D53F30D9638E312CF4F9EE35CF6761CAE1FB210B9EA35B3896D3E80CD23B966BEEB60800897F3E07B02
26,163,772 UART: Caliptra RT
26,164,499 UART: [state] CFI Enabled
26,281,356 UART: [rt] RT listening for mailbox commands...
26,283,657 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,439,097 UART: [rt]cmd =0x41544d4e, len=14344
30,434,628 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,833 UART: [kat] SHA2-256
881,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,879 UART: [kat] ++
886,031 UART: [kat] sha1
890,253 UART: [kat] SHA2-256
892,191 UART: [kat] SHA2-384
894,812 UART: [kat] SHA2-512-ACC
896,713 UART: [kat] ECC-384
902,316 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,685 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 ready_for_fw is high
1,480,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,496 UART: [idev] Erasing UDS.KEYID = 0
1,505,350 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,056 UART: [idev] --
1,515,219 UART: [ldev] ++
1,515,387 UART: [ldev] CDI.KEYID = 6
1,515,750 UART: [ldev] SUBJECT.KEYID = 5
1,516,176 UART: [ldev] AUTHORITY.KEYID = 7
1,516,639 UART: [ldev] FE.KEYID = 1
1,521,767 UART: [ldev] Erasing FE.KEYID = 1
1,546,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,896 UART: [ldev] --
1,586,271 UART: [fwproc] Waiting for Commands...
1,586,902 UART: [fwproc] Received command 0x46574c44
1,587,693 UART: [fwproc] Received Image of size 114168 bytes
2,884,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,689 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,596 >>> mbox cmd response: success
3,077,640 UART: [afmc] ++
3,077,808 UART: [afmc] CDI.KEYID = 6
3,078,170 UART: [afmc] SUBJECT.KEYID = 7
3,078,595 UART: [afmc] AUTHORITY.KEYID = 5
3,112,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,018 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,798 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,526 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,411 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,101 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,914 UART: [afmc] --
3,155,954 UART: [cold-reset] --
3,156,700 UART: [state] Locking Datavault
3,157,873 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,477 UART: [state] Locking ICCM
3,159,083 UART: [exit] Launching FMC @ 0x40000130
3,164,412 UART:
3,164,428 UART: Running Caliptra FMC ...
3,164,836 UART:
3,164,890 UART: [state] CFI Enabled
3,175,465 UART: [fht] FMC Alias Private Key: 7
3,283,052 UART: [art] Extend RT PCRs Done
3,283,480 UART: [art] Lock RT PCRs Done
3,285,274 UART: [art] Populate DV Done
3,293,513 UART: [fht] FMC Alias Private Key: 7
3,294,445 UART: [art] Derive CDI
3,294,725 UART: [art] Store in in slot 0x4
3,380,652 UART: [art] Derive Key Pair
3,381,012 UART: [art] Store priv key in slot 0x5
3,393,784 UART: [art] Derive Key Pair - Done
3,408,117 UART: [art] Signing Cert with AUTHO
3,408,597 UART: RITY.KEYID = 7
3,423,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,292 UART: [art] PUB.X = E0F6723884BCB5B86023AFC101590BD10100B69A6F43707E1DF4E7252A42E5F920B36DC5AE8A29ADB3A0F9EFCAAFA41E
3,431,049 UART: [art] PUB.Y = 9E977B4066551AEE5E38999617CB7FBF47B5BBD3DF8D2ED76423FD074C4479BAA0E163D78957AFC92A53BB4DC3295C4C
3,438,010 UART: [art] SIG.R = 313E3159BE32DCE803F48AD7CC2DF46BF6FB563754B948AD14162CBAAEEB5AF36B1E53432D9B626DDF41B14F946E97AF
3,444,797 UART: [art] SIG.S = 4E1DC71B709D20FF4B360DD6B9B51EBA9C3A495E1D44014AA882C2A535A878798C1000B29DBB1DCDD1BD26F4C5F8B19B
3,468,500 UART: Caliptra RT
3,468,753 UART: [state] CFI Enabled
3,576,467 UART: [rt] RT listening for mailbox commands...
3,577,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,363 UART: [rt]cmd =0x41544d4e, len=14344
4,010,468 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,015 ready_for_fw is high
1,363,015 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,888 >>> mbox cmd response: success
2,987,694 UART:
2,987,710 UART: Running Caliptra FMC ...
2,988,118 UART:
2,988,172 UART: [state] CFI Enabled
2,998,805 UART: [fht] FMC Alias Private Key: 7
3,106,884 UART: [art] Extend RT PCRs Done
3,107,312 UART: [art] Lock RT PCRs Done
3,108,406 UART: [art] Populate DV Done
3,116,637 UART: [fht] FMC Alias Private Key: 7
3,117,607 UART: [art] Derive CDI
3,117,887 UART: [art] Store in in slot 0x4
3,204,080 UART: [art] Derive Key Pair
3,204,440 UART: [art] Store priv key in slot 0x5
3,217,784 UART: [art] Derive Key Pair - Done
3,232,580 UART: [art] Signing Cert with AUTHO
3,233,060 UART: RITY.KEYID = 7
3,247,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,701 UART: [art] PUB.X = C0C15F62D25D6523DC564266E54514F326638B1C8728BDEA5DA64F1C4BBA5805285B16043B745DDFF60906EDDAD3B307
3,255,462 UART: [art] PUB.Y = D60B52666353E41866B471884C451144324C41B3A197E2703AA34E8A0DDCA05BFB4713BE9CE489B8F145B1BEC3C205D7
3,262,405 UART: [art] SIG.R = 5AD67A9B275EFDF7D15D121D85AFB488F75B85EC1DBF6A85F02C6DC301AA10028A84CE0EAEE436419CE5466EF10A0ACD
3,269,184 UART: [art] SIG.S = 8AA0825CFD59204417E52EE792EDE81C8037ED32C0EB8D1BBDE9044DB3AA60E2FC404F483B7C732FE88387027A9D2617
3,293,013 UART: Caliptra RT
3,293,266 UART: [state] CFI Enabled
3,402,017 UART: [rt] RT listening for mailbox commands...
3,402,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,317 UART: [rt]cmd =0x41544d4e, len=14344
3,835,854 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,162 UART: [kat] SHA2-256
882,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,208 UART: [kat] ++
886,360 UART: [kat] sha1
890,704 UART: [kat] SHA2-256
892,642 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
902,911 UART: [kat] HMAC-384Kdf
907,493 UART: [kat] LMS
1,475,689 UART: [kat] --
1,476,514 UART: [cold-reset] ++
1,476,916 UART: [fht] Storing FHT @ 0x50003400
1,479,851 UART: [idev] ++
1,480,019 UART: [idev] CDI.KEYID = 6
1,480,379 UART: [idev] SUBJECT.KEYID = 7
1,480,803 UART: [idev] UDS.KEYID = 0
1,481,148 ready_for_fw is high
1,481,148 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,403 UART: [idev] Erasing UDS.KEYID = 0
1,505,115 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,751 UART: [idev] --
1,514,894 UART: [ldev] ++
1,515,062 UART: [ldev] CDI.KEYID = 6
1,515,425 UART: [ldev] SUBJECT.KEYID = 5
1,515,851 UART: [ldev] AUTHORITY.KEYID = 7
1,516,314 UART: [ldev] FE.KEYID = 1
1,521,490 UART: [ldev] Erasing FE.KEYID = 1
1,546,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,221 UART: [ldev] --
1,585,606 UART: [fwproc] Waiting for Commands...
1,586,273 UART: [fwproc] Received command 0x46574c44
1,587,064 UART: [fwproc] Received Image of size 114168 bytes
2,883,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,768 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,823 >>> mbox cmd response: success
3,077,847 UART: [afmc] ++
3,078,015 UART: [afmc] CDI.KEYID = 6
3,078,377 UART: [afmc] SUBJECT.KEYID = 7
3,078,802 UART: [afmc] AUTHORITY.KEYID = 5
3,114,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,172 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,862 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,635 UART: [afmc] --
3,157,655 UART: [cold-reset] --
3,158,511 UART: [state] Locking Datavault
3,159,524 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,128 UART: [state] Locking ICCM
3,160,690 UART: [exit] Launching FMC @ 0x40000130
3,166,019 UART:
3,166,035 UART: Running Caliptra FMC ...
3,166,443 UART:
3,166,586 UART: [state] CFI Enabled
3,177,297 UART: [fht] FMC Alias Private Key: 7
3,285,232 UART: [art] Extend RT PCRs Done
3,285,660 UART: [art] Lock RT PCRs Done
3,287,256 UART: [art] Populate DV Done
3,295,585 UART: [fht] FMC Alias Private Key: 7
3,296,599 UART: [art] Derive CDI
3,296,879 UART: [art] Store in in slot 0x4
3,382,650 UART: [art] Derive Key Pair
3,383,010 UART: [art] Store priv key in slot 0x5
3,396,596 UART: [art] Derive Key Pair - Done
3,411,085 UART: [art] Signing Cert with AUTHO
3,411,565 UART: RITY.KEYID = 7
3,426,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,490 UART: [art] PUB.X = F5CF07B9CFD6691C7300F15AF7BB70070E63C7356C3ABCA2CCCD111EFA578D63C1E194CD0312E726E85490DD2823D30D
3,434,237 UART: [art] PUB.Y = 40FA4E6B9553428EF5AAF6250F1F0D0AE805F2465035F7916A8568487B59A9E4944121449BF14AF7CAB1BC2B1CD31B70
3,441,179 UART: [art] SIG.R = 04939DA797AF0DC7806593090EAF2FB39965DC80B7AB85BFA318DE79E022E22CC3CE65B7EA91821884F25F5E858B60FA
3,447,947 UART: [art] SIG.S = E627085055266D80A19EA54F234132F4292FF820023605BF598DDAE28B0603FCB42109A29253E2FED9C4919C55B8DDC9
3,471,778 UART: Caliptra RT
3,472,123 UART: [state] CFI Enabled
3,581,504 UART: [rt] RT listening for mailbox commands...
3,582,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,282 UART: [rt]cmd =0x41544d4e, len=14344
4,015,305 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,364 ready_for_fw is high
1,362,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,883 >>> mbox cmd response: success
2,990,233 UART:
2,990,249 UART: Running Caliptra FMC ...
2,990,657 UART:
2,990,800 UART: [state] CFI Enabled
3,001,677 UART: [fht] FMC Alias Private Key: 7
3,109,938 UART: [art] Extend RT PCRs Done
3,110,366 UART: [art] Lock RT PCRs Done
3,111,680 UART: [art] Populate DV Done
3,119,987 UART: [fht] FMC Alias Private Key: 7
3,121,095 UART: [art] Derive CDI
3,121,375 UART: [art] Store in in slot 0x4
3,206,822 UART: [art] Derive Key Pair
3,207,182 UART: [art] Store priv key in slot 0x5
3,220,224 UART: [art] Derive Key Pair - Done
3,235,226 UART: [art] Signing Cert with AUTHO
3,235,706 UART: RITY.KEYID = 7
3,250,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,411 UART: [art] PUB.X = 8DBC849A3A4CB0692C483241B459210A9EE34BF4EE1F416D444E68F4A883F841F32BB486BE394840D30B3631C26B9D91
3,258,177 UART: [art] PUB.Y = 7528224F33E134337B88466F94CAA8D3EA5BDF3E76E4E1FAF2B9D3B81021E0A38B8A0E4A1FCFAEEB17F1382667095086
3,265,131 UART: [art] SIG.R = 818EC9819E253AA65CBAA0C01C5B4BF8267F1238B377843FFC9AD8896EC65C80F4AE878D4312BF8E3E044D9E2834E6C9
3,271,908 UART: [art] SIG.S = 619BF49DA6DA854070574E9AC312A838C6887423561FCEDA225CDDE58209686871CF10A0A6821BD1B96EC74C5E454A88
3,295,772 UART: Caliptra RT
3,296,117 UART: [state] CFI Enabled
3,404,666 UART: [rt] RT listening for mailbox commands...
3,405,336 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,528,138 UART: [rt]cmd =0x41544d4e, len=14344
3,837,769 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
892,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,117 UART: [kat] ++
897,269 UART: [kat] sha1
901,483 UART: [kat] SHA2-256
903,423 UART: [kat] SHA2-384
906,100 UART: [kat] SHA2-512-ACC
908,001 UART: [kat] ECC-384
917,650 UART: [kat] HMAC-384Kdf
922,208 UART: [kat] LMS
1,170,536 UART: [kat] --
1,171,317 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,524 UART: [idev] ++
1,174,692 UART: [idev] CDI.KEYID = 6
1,175,052 UART: [idev] SUBJECT.KEYID = 7
1,175,476 UART: [idev] UDS.KEYID = 0
1,175,821 ready_for_fw is high
1,175,821 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,426 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,208,713 UART: [idev] --
1,209,833 UART: [ldev] ++
1,210,001 UART: [ldev] CDI.KEYID = 6
1,210,364 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,409 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,346 UART: [fwproc] Recv command 0x46574c44
1,283,074 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,350 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,931 >>> mbox cmd response: success
2,773,043 UART: [afmc] ++
2,773,211 UART: [afmc] CDI.KEYID = 6
2,773,573 UART: [afmc] SUBJECT.KEYID = 7
2,773,998 UART: [afmc] AUTHORITY.KEYID = 5
2,809,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,715 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,434 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,368 UART: [afmc] --
2,853,306 UART: [cold-reset] --
2,854,316 UART: [state] Locking Datavault
2,855,427 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,031 UART: [state] Locking ICCM
2,856,601 UART: [exit] Launching FMC @ 0x40000130
2,861,930 UART:
2,861,946 UART: Running Caliptra FMC ...
2,862,354 UART:
2,862,408 UART: [state] CFI Enabled
2,873,075 UART: [fht] FMC Alias Private Key: 7
2,980,192 UART: [art] Extend RT PCRs Done
2,980,620 UART: [art] Lock RT PCRs Done
2,982,240 UART: [art] Populate DV Done
2,990,579 UART: [fht] FMC Alias Private Key: 7
2,991,579 UART: [art] Derive CDI
2,991,859 UART: [art] Store in in slot 0x4
3,077,132 UART: [art] Derive Key Pair
3,077,492 UART: [art] Store priv key in slot 0x5
3,090,826 UART: [art] Derive Key Pair - Done
3,105,773 UART: [art] Signing Cert with AUTHO
3,106,253 UART: RITY.KEYID = 7
3,121,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,164 UART: [art] PUB.X = E66386E21C6A459F27FE6C9B37BA2E9AE12BDC33763064670456E73063CFAC5127DD033A5748BC2CDE6D4D315C4405CA
3,128,933 UART: [art] PUB.Y = 57EE17222DCC918C69B665ECDB9BF415CE4C52A681B6DF95AE0785BB5F691E44AFAF73168F611F7DF3EC32CBF8F62367
3,135,898 UART: [art] SIG.R = F7C8D6492142EDDA29B6D06F7100778B87F1DA495197A5C3EDEB11E0417E8CE69A583FDFAE718FFDA8EE854593CDE728
3,142,662 UART: [art] SIG.S = F9C9C583FFCEA17C6D002F532080A3160D520A37A1255D6B6B09A58EFF842CC75500ED495A12395D3D2186D4C44B0F33
3,166,307 UART: Caliptra RT
3,166,560 UART: [state] CFI Enabled
3,274,258 UART: [rt] RT listening for mailbox commands...
3,274,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,894 UART: [rt]cmd =0x41544d4e, len=14344
3,707,685 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,617 ready_for_fw is high
1,060,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,268 >>> mbox cmd response: success
2,686,702 UART:
2,686,718 UART: Running Caliptra FMC ...
2,687,126 UART:
2,687,180 UART: [state] CFI Enabled
2,697,909 UART: [fht] FMC Alias Private Key: 7
2,806,436 UART: [art] Extend RT PCRs Done
2,806,864 UART: [art] Lock RT PCRs Done
2,808,354 UART: [art] Populate DV Done
2,816,677 UART: [fht] FMC Alias Private Key: 7
2,817,725 UART: [art] Derive CDI
2,818,005 UART: [art] Store in in slot 0x4
2,903,616 UART: [art] Derive Key Pair
2,903,976 UART: [art] Store priv key in slot 0x5
2,917,196 UART: [art] Derive Key Pair - Done
2,931,840 UART: [art] Signing Cert with AUTHO
2,932,320 UART: RITY.KEYID = 7
2,947,184 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,949 UART: [art] PUB.X = 7A2A274E01D005B0621813E1EF67B83E18BA3A5305247B15AEDF05760779B2899851AB8336C028C8B6F9E7E15EB41BCF
2,954,706 UART: [art] PUB.Y = C1F1AFF1DE50F25A8508CF16B5745A270DCA385B1265FC4C83BFD322B0067A0B2A0A267CE33EC86AB082BE226DA37F53
2,961,657 UART: [art] SIG.R = BDFB94B1351B715371372D337B85BB00F8A42E56DB05EAD737809B9B6569117176AABDA8D7EE6B6E05E92E2AEED32288
2,968,409 UART: [art] SIG.S = FDC5350BC7764651AF99FA42C2CD1EE35253E081EBEDE27F05DB4BBFEF1720744C7BFBDD44000910605C648D85F35D18
2,992,233 UART: Caliptra RT
2,992,486 UART: [state] CFI Enabled
3,099,740 UART: [rt] RT listening for mailbox commands...
3,100,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,630 UART: [rt]cmd =0x41544d4e, len=14344
3,533,555 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,843 UART: [kat] SHA2-256
893,493 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,618 UART: [kat] ++
897,770 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,371 UART: [kat] SHA2-512-ACC
908,272 UART: [kat] ECC-384
918,071 UART: [kat] HMAC-384Kdf
922,739 UART: [kat] LMS
1,171,067 UART: [kat] --
1,172,046 UART: [cold-reset] ++
1,172,494 UART: [fht] FHT @ 0x50003400
1,175,115 UART: [idev] ++
1,175,283 UART: [idev] CDI.KEYID = 6
1,175,643 UART: [idev] SUBJECT.KEYID = 7
1,176,067 UART: [idev] UDS.KEYID = 0
1,176,412 ready_for_fw is high
1,176,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,245 UART: [idev] Erasing UDS.KEYID = 0
1,200,768 UART: [idev] Sha1 KeyId Algorithm
1,209,240 UART: [idev] --
1,210,192 UART: [ldev] ++
1,210,360 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,149 UART: [ldev] AUTHORITY.KEYID = 7
1,211,612 UART: [ldev] FE.KEYID = 1
1,216,566 UART: [ldev] Erasing FE.KEYID = 1
1,242,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,988 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,595 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,224 >>> mbox cmd response: success
2,773,274 UART: [afmc] ++
2,773,442 UART: [afmc] CDI.KEYID = 6
2,773,804 UART: [afmc] SUBJECT.KEYID = 7
2,774,229 UART: [afmc] AUTHORITY.KEYID = 5
2,809,838 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,921 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,534 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,253 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,081 UART: [afmc] --
2,853,077 UART: [cold-reset] --
2,854,007 UART: [state] Locking Datavault
2,855,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,942 UART: [state] Locking ICCM
2,856,596 UART: [exit] Launching FMC @ 0x40000130
2,861,925 UART:
2,861,941 UART: Running Caliptra FMC ...
2,862,349 UART:
2,862,492 UART: [state] CFI Enabled
2,872,695 UART: [fht] FMC Alias Private Key: 7
2,980,986 UART: [art] Extend RT PCRs Done
2,981,414 UART: [art] Lock RT PCRs Done
2,982,794 UART: [art] Populate DV Done
2,991,035 UART: [fht] FMC Alias Private Key: 7
2,992,055 UART: [art] Derive CDI
2,992,335 UART: [art] Store in in slot 0x4
3,078,158 UART: [art] Derive Key Pair
3,078,518 UART: [art] Store priv key in slot 0x5
3,091,782 UART: [art] Derive Key Pair - Done
3,106,326 UART: [art] Signing Cert with AUTHO
3,106,806 UART: RITY.KEYID = 7
3,121,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,711 UART: [art] PUB.X = 8C496CF971BBE4F14C622FA669FD623BF418210A687CE003BF5F6E88C074B5DD1C9973F0EBF6346A130B878FE6AA615C
3,129,484 UART: [art] PUB.Y = E1273CC5D16C04DBDC668D8E475373E8ECDCAEAB47AF1CE9BE90850B7EEE6EEA2BB31D3AB26D36C10BE4C2DC55EA6226
3,136,457 UART: [art] SIG.R = 057FDC8DAB516F91814303BC41F84E744BE8FEFEE83B2EE993251FE21A85341811BBBFF27AFEA89F9793D63ADB109A10
3,143,237 UART: [art] SIG.S = 5178D9BFB8E23471BEE501A9FA283A9F424AFF01E15592B413ECEFD7AB6C243575653DA8678BA73E8ABFB200596B80FA
3,167,204 UART: Caliptra RT
3,167,549 UART: [state] CFI Enabled
3,276,418 UART: [rt] RT listening for mailbox commands...
3,277,088 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,266 UART: [rt]cmd =0x41544d4e, len=14344
3,710,013 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,560 ready_for_fw is high
1,060,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,453 >>> mbox cmd response: success
2,687,287 UART:
2,687,303 UART: Running Caliptra FMC ...
2,687,711 UART:
2,687,854 UART: [state] CFI Enabled
2,698,457 UART: [fht] FMC Alias Private Key: 7
2,805,870 UART: [art] Extend RT PCRs Done
2,806,298 UART: [art] Lock RT PCRs Done
2,807,906 UART: [art] Populate DV Done
2,816,111 UART: [fht] FMC Alias Private Key: 7
2,817,085 UART: [art] Derive CDI
2,817,365 UART: [art] Store in in slot 0x4
2,903,004 UART: [art] Derive Key Pair
2,903,364 UART: [art] Store priv key in slot 0x5
2,916,486 UART: [art] Derive Key Pair - Done
2,931,363 UART: [art] Signing Cert with AUTHO
2,931,843 UART: RITY.KEYID = 7
2,947,331 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,096 UART: [art] PUB.X = 6BA06E2CC0C05ED7943F680267C936B4DFFB8F5BDF4FAE7F173DA9470F94E6D4A89DB0035F00949D8FD90A70545A586F
2,954,846 UART: [art] PUB.Y = 161205217739373D04ACC564851D7FACAEB8CAB953C7A21D24D935C1C315A2062AE51638FCCE0E000CB7CE02F011995A
2,961,762 UART: [art] SIG.R = E57A5F12F263D43A40FC9910AEC6EEB849BC2BEB1B000A25BC68F959C13A6ACFED671C07F0E0CDB4F441E7ED16B351B1
2,968,528 UART: [art] SIG.S = 0EEB55E5C29590C5FF1793956B85D238D90B5EB7FA185AD69ECB6AC561341BD8CB64EA23238DA7FDC139EB4E18E4DEF1
2,992,433 UART: Caliptra RT
2,992,778 UART: [state] CFI Enabled
3,100,801 UART: [rt] RT listening for mailbox commands...
3,101,471 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,224,627 UART: [rt]cmd =0x41544d4e, len=14344
3,534,724 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
891,332 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,442 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,229 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,897 UART: [idev] Erasing UDS.KEYID = 0
1,199,293 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,424 UART: [ldev] ++
1,209,592 UART: [ldev] CDI.KEYID = 6
1,209,956 UART: [ldev] SUBJECT.KEYID = 5
1,210,383 UART: [ldev] AUTHORITY.KEYID = 7
1,210,846 UART: [ldev] FE.KEYID = 1
1,215,782 UART: [ldev] Erasing FE.KEYID = 1
1,242,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,614 UART: [ldev] --
1,281,882 UART: [fwproc] Wait for Commands...
1,282,665 UART: [fwproc] Recv command 0x46574c44
1,283,398 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,493 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,147 >>> mbox cmd response: success
2,773,188 UART: [afmc] ++
2,773,356 UART: [afmc] CDI.KEYID = 6
2,773,719 UART: [afmc] SUBJECT.KEYID = 7
2,774,145 UART: [afmc] AUTHORITY.KEYID = 5
2,809,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,047 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,776 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,659 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,378 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,031 UART: [afmc] --
2,853,053 UART: [cold-reset] --
2,854,019 UART: [state] Locking Datavault
2,855,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,696 UART: [state] Locking ICCM
2,856,138 UART: [exit] Launching FMC @ 0x40000130
2,861,467 UART:
2,861,483 UART: Running Caliptra FMC ...
2,861,891 UART:
2,861,945 UART: [state] CFI Enabled
2,872,018 UART: [fht] FMC Alias Private Key: 7
2,979,941 UART: [art] Extend RT PCRs Done
2,980,369 UART: [art] Lock RT PCRs Done
2,981,779 UART: [art] Populate DV Done
2,990,116 UART: [fht] FMC Alias Private Key: 7
2,991,236 UART: [art] Derive CDI
2,991,516 UART: [art] Store in in slot 0x4
3,077,265 UART: [art] Derive Key Pair
3,077,625 UART: [art] Store priv key in slot 0x5
3,090,971 UART: [art] Derive Key Pair - Done
3,105,823 UART: [art] Signing Cert with AUTHO
3,106,303 UART: RITY.KEYID = 7
3,121,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,282 UART: [art] PUB.X = 3DA54D0C6CD8098A1B9B00A494F871143C369C21CEE57BA929CB784410E6B1EF1E199A82A4E7D6062956695698430FF8
3,129,018 UART: [art] PUB.Y = 45896C3C06A1BA56EF62403B6D7E0A4F3796A31D9FFEE8A7F2028F4B95815E60E5DA79BA6586DA3E85812ECEA2B7460C
3,135,968 UART: [art] SIG.R = 656E6FD1C95332E2A5130EE8B070DB1E5D410E688725ABC9C99B13EC0E09DD09E68859D5121EB1CD0323DEFCF3734E51
3,142,730 UART: [art] SIG.S = F3CBAA9957140CBDE9D46272B461CD944B6EE0CEDBC76BF8D2A438C093EA0F70C2012BF257BDA32C87AA40551D18C1AE
3,166,108 UART: Caliptra RT
3,166,361 UART: [state] CFI Enabled
3,274,540 UART: [rt] RT listening for mailbox commands...
3,275,210 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,074 UART: [rt]cmd =0x41544d4e, len=14344
3,707,929 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,756 ready_for_fw is high
1,055,756 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,471 >>> mbox cmd response: success
2,681,261 UART:
2,681,277 UART: Running Caliptra FMC ...
2,681,685 UART:
2,681,739 UART: [state] CFI Enabled
2,692,198 UART: [fht] FMC Alias Private Key: 7
2,800,193 UART: [art] Extend RT PCRs Done
2,800,621 UART: [art] Lock RT PCRs Done
2,801,825 UART: [art] Populate DV Done
2,810,388 UART: [fht] FMC Alias Private Key: 7
2,811,528 UART: [art] Derive CDI
2,811,808 UART: [art] Store in in slot 0x4
2,897,505 UART: [art] Derive Key Pair
2,897,865 UART: [art] Store priv key in slot 0x5
2,911,781 UART: [art] Derive Key Pair - Done
2,926,544 UART: [art] Signing Cert with AUTHO
2,927,024 UART: RITY.KEYID = 7
2,942,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,429 UART: [art] PUB.X = 9354AF681D077CC5391B0EFD7B55E154AC584127B04F42ADE8406AD9A6E90E133DD7695738844FCE39729E2FCB0EBE31
2,950,195 UART: [art] PUB.Y = B24623144BADE752F6C55E42B745E41A91E85B8F836868E3D1AC71FBECF7D5D6D129B858F40FB77504410CCD2D94596C
2,957,144 UART: [art] SIG.R = 0F3485E9F86882A522291C5F59AFFC0367B42B1355C86D97C59AEA9B8DB3D7C375EE02C60CB9E13975C68BF980D30DD2
2,963,907 UART: [art] SIG.S = C94B174B4B34877E996DBC3AAB4E37BEF1CC5B198BC32495C4992C365947D10E3B37A93A670F8240AED20B1B851691F1
2,987,561 UART: Caliptra RT
2,987,814 UART: [state] CFI Enabled
3,095,687 UART: [rt] RT listening for mailbox commands...
3,096,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,137 UART: [rt]cmd =0x41544d4e, len=14344
3,528,382 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,937 UART: [state] LifecycleState = Unprovisioned
85,592 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,345 UART: [kat] SHA2-512-ACC
906,246 UART: [kat] ECC-384
916,255 UART: [kat] HMAC-384Kdf
920,825 UART: [kat] LMS
1,169,137 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,866 UART: [idev] ++
1,173,034 UART: [idev] CDI.KEYID = 6
1,173,395 UART: [idev] SUBJECT.KEYID = 7
1,173,820 UART: [idev] UDS.KEYID = 0
1,174,166 ready_for_fw is high
1,174,166 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,846 UART: [idev] Erasing UDS.KEYID = 0
1,198,586 UART: [idev] Sha1 KeyId Algorithm
1,207,398 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,359 UART: [ldev] Erasing FE.KEYID = 1
1,242,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,111 UART: [ldev] --
1,281,425 UART: [fwproc] Wait for Commands...
1,282,234 UART: [fwproc] Recv command 0x46574c44
1,282,967 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,580 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,280 >>> mbox cmd response: success
2,772,475 UART: [afmc] ++
2,772,643 UART: [afmc] CDI.KEYID = 6
2,773,006 UART: [afmc] SUBJECT.KEYID = 7
2,773,432 UART: [afmc] AUTHORITY.KEYID = 5
2,809,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,816 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,545 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,014 UART: [afmc] --
2,853,132 UART: [cold-reset] --
2,853,702 UART: [state] Locking Datavault
2,854,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,347 UART: [state] Locking ICCM
2,856,005 UART: [exit] Launching FMC @ 0x40000130
2,861,334 UART:
2,861,350 UART: Running Caliptra FMC ...
2,861,758 UART:
2,861,901 UART: [state] CFI Enabled
2,872,708 UART: [fht] FMC Alias Private Key: 7
2,981,599 UART: [art] Extend RT PCRs Done
2,982,027 UART: [art] Lock RT PCRs Done
2,983,445 UART: [art] Populate DV Done
2,991,468 UART: [fht] FMC Alias Private Key: 7
2,992,400 UART: [art] Derive CDI
2,992,680 UART: [art] Store in in slot 0x4
3,078,697 UART: [art] Derive Key Pair
3,079,057 UART: [art] Store priv key in slot 0x5
3,092,505 UART: [art] Derive Key Pair - Done
3,107,419 UART: [art] Signing Cert with AUTHO
3,107,899 UART: RITY.KEYID = 7
3,123,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,810 UART: [art] PUB.X = 6E5D50BE2000545561F7B059AB916198C0F45AFE24BA833AC6BA582964D3C4429A6E4EBD2A33BAD8F522D8AAFD77557D
3,130,570 UART: [art] PUB.Y = A7605118908C25BAA3D7C65912E1B650E493BDC2CD566375175B65911589E04DD52B1C089BF8AF751B67E8F13EC2DF0D
3,137,518 UART: [art] SIG.R = 03254EF3D23FBD136D8A1B2F51D7F2E64C4C579C9BFAFB2556CFBD2D05DE2F6F7B7F1E7E58BCEA0C418757A2E63B4BD1
3,144,305 UART: [art] SIG.S = CE83F8433BB443C30ED8A2B2FEB3ED06D8A8AB026140066A1D857B6E4DF9C7987A495714A673CCBB0031B8134730CDE4
3,167,518 UART: Caliptra RT
3,167,863 UART: [state] CFI Enabled
3,276,752 UART: [rt] RT listening for mailbox commands...
3,277,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,516 UART: [rt]cmd =0x41544d4e, len=14344
3,710,179 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,671 ready_for_fw is high
1,056,671 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,368 >>> mbox cmd response: success
2,681,256 UART:
2,681,272 UART: Running Caliptra FMC ...
2,681,680 UART:
2,681,823 UART: [state] CFI Enabled
2,692,570 UART: [fht] FMC Alias Private Key: 7
2,801,005 UART: [art] Extend RT PCRs Done
2,801,433 UART: [art] Lock RT PCRs Done
2,803,201 UART: [art] Populate DV Done
2,811,380 UART: [fht] FMC Alias Private Key: 7
2,812,544 UART: [art] Derive CDI
2,812,824 UART: [art] Store in in slot 0x4
2,898,317 UART: [art] Derive Key Pair
2,898,677 UART: [art] Store priv key in slot 0x5
2,912,117 UART: [art] Derive Key Pair - Done
2,926,875 UART: [art] Signing Cert with AUTHO
2,927,355 UART: RITY.KEYID = 7
2,942,451 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,216 UART: [art] PUB.X = 01EA7B2F3413A14707195C5236DD43F4AA825DE599CF8AAA18906DFAEE7662C61404BF1BCEFDA1BA85D3FF7252C66231
2,949,991 UART: [art] PUB.Y = A1E172F0C854CB5FD99E993D2D40EBF18D61814E4EB1B4DBD5E6E837B425AF236873EE1BD71EABC27DD87CAAE3A82872
2,956,963 UART: [art] SIG.R = C0C4B8CE2CBE0EFA05502970F667F69EDC2B068EE25349280952F6FE7344A72F444957173F12BAED0999C541832C5A78
2,963,720 UART: [art] SIG.S = 6EBB29492A23C4DFDE68A01C5D167CA2DF68E37963B3F2C272CEED764E3A6DC9F6FBA467120F2BE7820EB00814FA725E
2,987,866 UART: Caliptra RT
2,988,211 UART: [state] CFI Enabled
3,096,352 UART: [rt] RT listening for mailbox commands...
3,097,022 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,752 UART: [rt]cmd =0x41544d4e, len=14344
3,530,177 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,079 UART:
192,448 UART: Running Caliptra ROM ...
193,584 UART:
193,727 UART: [state] CFI Enabled
263,332 UART: [state] LifecycleState = Unprovisioned
265,323 UART: [state] DebugLocked = No
267,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,275 UART: [kat] SHA2-256
441,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,539 UART: [kat] ++
453,039 UART: [kat] sha1
462,527 UART: [kat] SHA2-256
465,152 UART: [kat] SHA2-384
471,002 UART: [kat] SHA2-512-ACC
473,381 UART: [kat] ECC-384
2,765,813 UART: [kat] HMAC-384Kdf
2,799,808 UART: [kat] LMS
3,990,128 UART: [kat] --
3,994,635 UART: [cold-reset] ++
3,996,639 UART: [fht] Storing FHT @ 0x50003400
4,006,975 UART: [idev] ++
4,007,532 UART: [idev] CDI.KEYID = 6
4,008,492 UART: [idev] SUBJECT.KEYID = 7
4,009,732 UART: [idev] UDS.KEYID = 0
4,010,746 ready_for_fw is high
4,010,950 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,188 UART: [idev] Erasing UDS.KEYID = 0
7,347,360 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,513 UART: [idev] --
7,372,177 UART: [ldev] ++
7,372,739 UART: [ldev] CDI.KEYID = 6
7,373,666 UART: [ldev] SUBJECT.KEYID = 5
7,374,923 UART: [ldev] AUTHORITY.KEYID = 7
7,376,070 UART: [ldev] FE.KEYID = 1
7,421,300 UART: [ldev] Erasing FE.KEYID = 1
10,755,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,493 UART: [ldev] --
13,131,457 UART: [fwproc] Waiting for Commands...
13,133,452 UART: [fwproc] Received command 0x46574c44
13,135,631 UART: [fwproc] Received Image of size 113844 bytes
22,091,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,171,081 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,239,990 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,557,012 >>> mbox cmd response: success
22,561,026 UART: [afmc] ++
22,561,618 UART: [afmc] CDI.KEYID = 6
22,562,586 UART: [afmc] SUBJECT.KEYID = 7
22,563,793 UART: [afmc] AUTHORITY.KEYID = 5
25,928,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,227,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,229,635 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,244,202 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,258,956 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,273,168 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,294,784 UART: [afmc] --
28,299,079 UART: [cold-reset] --
28,302,724 UART: [state] Locking Datavault
28,308,360 UART: [state] Locking PCR0, PCR1 and PCR31
28,310,135 UART: [state] Locking ICCM
28,312,419 UART: [exit] Launching FMC @ 0x40000130
28,320,810 UART:
28,321,048 UART: Running Caliptra FMC ...
28,322,145 UART:
28,322,296 UART: [state] CFI Enabled
28,385,853 UART: [fht] FMC Alias Private Key: 7
30,723,782 UART: [art] Extend RT PCRs Done
30,724,999 UART: [art] Lock RT PCRs Done
30,726,408 UART: [art] Populate DV Done
30,731,756 UART: [fht] FMC Alias Private Key: 7
30,733,241 UART: [art] Derive CDI
30,733,990 UART: [art] Store in in slot 0x4
30,794,508 UART: [art] Derive Key Pair
30,795,555 UART: [art] Store priv key in slot 0x5
34,088,263 UART: [art] Derive Key Pair - Done
34,101,325 UART: [art] Signing Cert with AUTHO
34,102,626 UART: RITY.KEYID = 7
36,389,146 UART: [art] Erasing AUTHORITY.KEYID = 7
36,390,648 UART: [art] PUB.X = 036922FA9DDC3F1299635C456F6B3BD30EEBC874BBAA8EC02C6A5DC762B265153DA1958D621DD853335B9AE07EFC3E0B
36,397,923 UART: [art] PUB.Y = F4CB069FB95E27D5681126014AB48482854B30677A8B4EB35AD8F4DB4ADF0B504C6CE2C0B697340169BE8844F09D54C2
36,405,175 UART: [art] SIG.R = 559A8126412D5A0198F9C246389F15BA312811FC7189AF5305A753242D548E3E5EBF6952D48E1ED85106ABC19B76FB28
36,412,501 UART: [art] SIG.S = 89F1B9BA164E3991B64A189C88F0538D110C84AB61156FD774E579B066AA87EE67034996A23526FBCEAC9D3A590476EE
37,717,658 UART: Caliptra RT
37,718,345 UART: [state] CFI Enabled
37,880,123 UART: [rt] RT listening for mailbox commands...
37,882,458 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,037,665 UART: [rt]cmd =0x41544d4e, len=14344
38,039,599 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,806,594 ready_for_fw is high
3,807,006 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,280,930 >>> mbox cmd response: success
27,981,712 UART:
27,982,099 UART: Running Caliptra FMC ...
27,983,223 UART:
27,983,373 UART: [state] CFI Enabled
28,051,045 UART: [fht] FMC Alias Private Key: 7
30,389,021 UART: [art] Extend RT PCRs Done
30,390,252 UART: [art] Lock RT PCRs Done
30,392,077 UART: [art] Populate DV Done
30,397,655 UART: [fht] FMC Alias Private Key: 7
30,399,136 UART: [art] Derive CDI
30,399,869 UART: [art] Store in in slot 0x4
30,459,070 UART: [art] Derive Key Pair
30,460,113 UART: [art] Store priv key in slot 0x5
33,752,807 UART: [art] Derive Key Pair - Done
33,765,482 UART: [art] Signing Cert with AUTHO
33,766,781 UART: RITY.KEYID = 7
36,053,874 UART: [art] Erasing AUTHORITY.KEYID = 7
36,055,424 UART: [art] PUB.X = E5EA9F36BAEA83FF07CA74E5C677742632B3FF2878058531F1BC3271D6DDC4D36BC4800B0A43A40022A8906EE341D535
36,062,678 UART: [art] PUB.Y = 3459425B3D8A2D2930D3B5CB313868425E5ACE4370C4A9EEBCF1824530FE826CF13961C58F1D420F4093D67C2C8C2837
36,069,918 UART: [art] SIG.R = BB4FDD7422F091CEA5E70656067CE3637FA198F1658800F99953F393B7D81231120E77FE26EADCF85EDB0B1A49981554
36,077,270 UART: [art] SIG.S = AB1DFE77C04DC20CCF5128630464AE35AA7934A6226D7825E4FFCFA663E030895EC8796A09358B7C4E009F58E88097BA
37,382,685 UART: Caliptra RT
37,383,376 UART: [state] CFI Enabled
37,543,430 UART: [rt] RT listening for mailbox commands...
37,545,770 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,701,184 UART: [rt]cmd =0x41544d4e, len=14344
37,703,102 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,619 UART:
192,985 UART: Running Caliptra ROM ...
194,177 UART:
603,920 UART: [state] CFI Enabled
617,942 UART: [state] LifecycleState = Unprovisioned
619,897 UART: [state] DebugLocked = No
622,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,138 UART: [kat] SHA2-256
796,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,417 UART: [kat] ++
807,956 UART: [kat] sha1
819,054 UART: [kat] SHA2-256
821,784 UART: [kat] SHA2-384
827,914 UART: [kat] SHA2-512-ACC
830,282 UART: [kat] ECC-384
3,114,946 UART: [kat] HMAC-384Kdf
3,127,340 UART: [kat] LMS
4,317,463 UART: [kat] --
4,320,987 UART: [cold-reset] ++
4,322,565 UART: [fht] Storing FHT @ 0x50003400
4,334,114 UART: [idev] ++
4,334,687 UART: [idev] CDI.KEYID = 6
4,335,599 UART: [idev] SUBJECT.KEYID = 7
4,336,848 UART: [idev] UDS.KEYID = 0
4,337,960 ready_for_fw is high
4,338,199 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,218 UART: [idev] Erasing UDS.KEYID = 0
7,625,687 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,373 UART: [idev] --
7,651,886 UART: [ldev] ++
7,652,464 UART: [ldev] CDI.KEYID = 6
7,653,433 UART: [ldev] SUBJECT.KEYID = 5
7,654,642 UART: [ldev] AUTHORITY.KEYID = 7
7,655,927 UART: [ldev] FE.KEYID = 1
7,668,736 UART: [ldev] Erasing FE.KEYID = 1
10,959,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,995 UART: [ldev] --
13,319,203 UART: [fwproc] Waiting for Commands...
13,321,464 UART: [fwproc] Received command 0x46574c44
13,323,718 UART: [fwproc] Received Image of size 113844 bytes
22,750,589 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,830,432 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,899,339 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
23,215,009 >>> mbox cmd response: success
23,218,471 UART: [afmc] ++
23,219,065 UART: [afmc] CDI.KEYID = 6
23,219,981 UART: [afmc] SUBJECT.KEYID = 7
23,221,254 UART: [afmc] AUTHORITY.KEYID = 5
26,533,170 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,829,122 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,831,424 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,845,967 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,860,722 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,874,946 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,896,398 UART: [afmc] --
28,900,208 UART: [cold-reset] --
28,905,422 UART: [state] Locking Datavault
28,910,839 UART: [state] Locking PCR0, PCR1 and PCR31
28,912,536 UART: [state] Locking ICCM
28,914,363 UART: [exit] Launching FMC @ 0x40000130
28,922,749 UART:
28,923,009 UART: Running Caliptra FMC ...
28,924,121 UART:
28,924,287 UART: [state] CFI Enabled
28,932,315 UART: [fht] FMC Alias Private Key: 7
31,262,906 UART: [art] Extend RT PCRs Done
31,264,125 UART: [art] Lock RT PCRs Done
31,265,914 UART: [art] Populate DV Done
31,271,383 UART: [fht] FMC Alias Private Key: 7
31,273,100 UART: [art] Derive CDI
31,273,920 UART: [art] Store in in slot 0x4
31,316,476 UART: [art] Derive Key Pair
31,317,513 UART: [art] Store priv key in slot 0x5
34,559,115 UART: [art] Derive Key Pair - Done
34,572,275 UART: [art] Signing Cert with AUTHO
34,573,579 UART: RITY.KEYID = 7
36,852,886 UART: [art] Erasing AUTHORITY.KEYID = 7
36,854,392 UART: [art] PUB.X = E73E829540DD333E2FA4B4B395A19A2B393EABD7C89328AAFED9D399D7E59FD0851F5635E04E617B825B64BE4F17FD10
36,861,640 UART: [art] PUB.Y = 06FF48FEBAF8B372741409C7FCCEBB7DE7CFE2FFF339AF75D29DAD41E41F65CCD7BB4D88222D50683A9AD2E3F654ECF1
36,868,940 UART: [art] SIG.R = FE68AEB091C7605B52D83D439B540B52595C38682840BB6F88625FB2EC30C62BFA42405FB4C663658EE05C6745412ED9
36,876,300 UART: [art] SIG.S = 001BA7BB8FD84E0F5AF81B0F1AABD5B33F2FC5A511C31D608456F4A17B6AA8D6BF158E47C40721952DC28BCA7CB02FFC
38,180,751 UART: Caliptra RT
38,181,452 UART: [state] CFI Enabled
38,299,068 UART: [rt] RT listening for mailbox commands...
38,301,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,456,616 UART: [rt]cmd =0x41544d4e, len=14344
38,458,531 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,126,874 ready_for_fw is high
4,127,469 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,178,745 >>> mbox cmd response: success
27,824,841 UART:
27,825,246 UART: Running Caliptra FMC ...
27,826,400 UART:
27,826,571 UART: [state] CFI Enabled
27,834,736 UART: [fht] FMC Alias Private Key: 7
30,165,224 UART: [art] Extend RT PCRs Done
30,166,440 UART: [art] Lock RT PCRs Done
30,168,121 UART: [art] Populate DV Done
30,173,689 UART: [fht] FMC Alias Private Key: 7
30,175,287 UART: [art] Derive CDI
30,176,105 UART: [art] Store in in slot 0x4
30,218,651 UART: [art] Derive Key Pair
30,219,682 UART: [art] Store priv key in slot 0x5
33,461,905 UART: [art] Derive Key Pair - Done
33,474,477 UART: [art] Signing Cert with AUTHO
33,475,788 UART: RITY.KEYID = 7
35,754,718 UART: [art] Erasing AUTHORITY.KEYID = 7
35,756,229 UART: [art] PUB.X = 50C401F69DC7CE7642976975666C31E3E09FDA67A603D1B7202A16F75816A4463993D50A03B38D4FF7E93FC6041D07ED
35,763,463 UART: [art] PUB.Y = 072418A6B1195201BCDC3F24B2E276AA4F981BE79B00F04D340BC3FA147F7DAF8019E45368389D2A1091187F01182EEC
35,770,680 UART: [art] SIG.R = AE912C12D2DE73C78C2BFE276CBB8E67B6E40C0CBAC6B168397A7964BC83AF7C4FE1F0A249579C9BAF72AA363E06CD63
35,778,077 UART: [art] SIG.S = 5C0DE84B4E9AF43D482CA208E193BE8BF754EB846F8799B20C9C6551A94734EAA613810F72D35BBA653D61621AFF96A0
37,083,341 UART: Caliptra RT
37,084,055 UART: [state] CFI Enabled
37,200,439 UART: [rt] RT listening for mailbox commands...
37,202,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,358,240 UART: [rt]cmd =0x41544d4e, len=14344
37,360,048 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,018 UART:
192,417 UART: Running Caliptra ROM ...
193,640 UART:
193,798 UART: [state] CFI Enabled
264,526 UART: [state] LifecycleState = Unprovisioned
266,384 UART: [state] DebugLocked = No
268,768 UART: [state] WD Timer not started. Device not locked for debugging
272,977 UART: [kat] SHA2-256
452,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,712 UART: [kat] ++
464,244 UART: [kat] sha1
476,193 UART: [kat] SHA2-256
479,201 UART: [kat] SHA2-384
484,759 UART: [kat] SHA2-512-ACC
487,692 UART: [kat] ECC-384
2,950,242 UART: [kat] HMAC-384Kdf
2,970,861 UART: [kat] LMS
3,500,291 UART: [kat] --
3,504,152 UART: [cold-reset] ++
3,505,591 UART: [fht] FHT @ 0x50003400
3,517,228 UART: [idev] ++
3,517,794 UART: [idev] CDI.KEYID = 6
3,518,705 UART: [idev] SUBJECT.KEYID = 7
3,519,952 UART: [idev] UDS.KEYID = 0
3,520,878 ready_for_fw is high
3,521,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,663 UART: [idev] Erasing UDS.KEYID = 0
6,025,333 UART: [idev] Sha1 KeyId Algorithm
6,048,302 UART: [idev] --
6,052,925 UART: [ldev] ++
6,053,508 UART: [ldev] CDI.KEYID = 6
6,054,399 UART: [ldev] SUBJECT.KEYID = 5
6,055,614 UART: [ldev] AUTHORITY.KEYID = 7
6,056,796 UART: [ldev] FE.KEYID = 1
6,099,735 UART: [ldev] Erasing FE.KEYID = 1
8,603,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,590 UART: [ldev] --
10,412,677 UART: [fwproc] Wait for Commands...
10,415,476 UART: [fwproc] Recv command 0x46574c44
10,417,518 UART: [fwproc] Recv'd Img size: 114168 bytes
14,998,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,072,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,141,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,458,257 >>> mbox cmd response: success
15,462,429 UART: [afmc] ++
15,463,046 UART: [afmc] CDI.KEYID = 6
15,463,942 UART: [afmc] SUBJECT.KEYID = 7
15,465,104 UART: [afmc] AUTHORITY.KEYID = 5
18,001,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,723,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,725,820 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,741,798 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,757,753 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,773,486 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,795,815 UART: [afmc] --
19,798,802 UART: [cold-reset] --
19,802,186 UART: [state] Locking Datavault
19,805,985 UART: [state] Locking PCR0, PCR1 and PCR31
19,807,636 UART: [state] Locking ICCM
19,810,384 UART: [exit] Launching FMC @ 0x40000130
19,818,841 UART:
19,819,075 UART: Running Caliptra FMC ...
19,820,178 UART:
19,820,337 UART: [state] CFI Enabled
19,883,474 UART: [fht] FMC Alias Private Key: 7
21,648,109 UART: [art] Extend RT PCRs Done
21,649,331 UART: [art] Lock RT PCRs Done
21,651,095 UART: [art] Populate DV Done
21,656,292 UART: [fht] FMC Alias Private Key: 7
21,657,937 UART: [art] Derive CDI
21,658,751 UART: [art] Store in in slot 0x4
21,716,369 UART: [art] Derive Key Pair
21,717,400 UART: [art] Store priv key in slot 0x5
24,180,539 UART: [art] Derive Key Pair - Done
24,193,796 UART: [art] Signing Cert with AUTHO
24,195,133 UART: RITY.KEYID = 7
25,906,735 UART: [art] Erasing AUTHORITY.KEYID = 7
25,908,243 UART: [art] PUB.X = CC52CC4645EDDB8F699EDF95EA72A8BDA6327893FA589ED990A7CCFB447F7ABB590AE8869D297A7D728339BFCA1FEC52
25,915,557 UART: [art] PUB.Y = 80C9365D1532E12C00E714D75BB5EB125B571A0CE21ECA456143EFD068A460D13C3F861AEE50261EE139D34E84D2688A
25,922,790 UART: [art] SIG.R = 18485CD900E9FA4D6793E1C4742F5E7A902B53E5A59D108D2194137D62833E2800254B9B2A6CAC058E2ACD3F636CFBF9
25,930,164 UART: [art] SIG.S = F4C371A0BFFE3555B61BA644540163825146550F9E652B4F984C00632E93EB67348D27F8F5A0FD72951851326917E732
26,909,031 UART: Caliptra RT
26,909,724 UART: [state] CFI Enabled
27,075,051 UART: [rt] RT listening for mailbox commands...
27,077,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,817 UART: [rt]cmd =0x41544d4e, len=14344
27,234,680 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,383,150 ready_for_fw is high
3,383,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,059,915 >>> mbox cmd response: success
19,361,772 UART:
19,362,184 UART: Running Caliptra FMC ...
19,363,317 UART:
19,363,480 UART: [state] CFI Enabled
19,429,871 UART: [fht] FMC Alias Private Key: 7
21,193,747 UART: [art] Extend RT PCRs Done
21,194,976 UART: [art] Lock RT PCRs Done
21,196,605 UART: [art] Populate DV Done
21,201,885 UART: [fht] FMC Alias Private Key: 7
21,203,373 UART: [art] Derive CDI
21,204,134 UART: [art] Store in in slot 0x4
21,255,171 UART: [art] Derive Key Pair
21,256,212 UART: [art] Store priv key in slot 0x5
23,719,160 UART: [art] Derive Key Pair - Done
23,732,263 UART: [art] Signing Cert with AUTHO
23,733,751 UART: RITY.KEYID = 7
25,446,089 UART: [art] Erasing AUTHORITY.KEYID = 7
25,447,615 UART: [art] PUB.X = A7751713E035FCEE089DFEF86B237885AB9501F2F2A3881BE514F675FD558FA91082455CD0241D3F65CFA66C816213EF
25,454,854 UART: [art] PUB.Y = 67B81415772E7F1F7FDE38F3B90E8A67CF8B08A2007BD36024503C2FD26F50853904E7490748ED8380AC207F6CF07D05
25,462,102 UART: [art] SIG.R = 797F03D31CB6E1D684866187C2096EDF640CB0D0AD5AEC9D75416931F2438C5CA685F673C20B2E0A87392CCECE1DF8A6
25,469,492 UART: [art] SIG.S = 3FDD893DDE4F8A1DEE6480E6FB1AD26CD61F851B7C02F0A86CC3D306B5036B55FB2375E9FF3DF138E6FA2CADD6295056
26,448,730 UART: Caliptra RT
26,449,429 UART: [state] CFI Enabled
26,615,067 UART: [rt] RT listening for mailbox commands...
26,617,424 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,772,626 UART: [rt]cmd =0x41544d4e, len=14344
26,774,647 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,771 writing to cptra_bootfsm_go
193,031 UART:
193,402 UART: Running Caliptra ROM ...
194,596 UART:
603,969 UART: [state] CFI Enabled
617,769 UART: [state] LifecycleState = Unprovisioned
619,651 UART: [state] DebugLocked = No
621,538 UART: [state] WD Timer not started. Device not locked for debugging
625,497 UART: [kat] SHA2-256
804,589 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,192 UART: [kat] ++
816,735 UART: [kat] sha1
828,134 UART: [kat] SHA2-256
831,182 UART: [kat] SHA2-384
837,107 UART: [kat] SHA2-512-ACC
840,039 UART: [kat] ECC-384
3,280,041 UART: [kat] HMAC-384Kdf
3,292,204 UART: [kat] LMS
3,821,648 UART: [kat] --
3,827,866 UART: [cold-reset] ++
3,829,303 UART: [fht] FHT @ 0x50003400
3,840,155 UART: [idev] ++
3,840,724 UART: [idev] CDI.KEYID = 6
3,841,606 UART: [idev] SUBJECT.KEYID = 7
3,842,846 UART: [idev] UDS.KEYID = 0
3,843,769 ready_for_fw is high
3,843,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,363 UART: [idev] Erasing UDS.KEYID = 0
6,317,221 UART: [idev] Sha1 KeyId Algorithm
6,340,244 UART: [idev] --
6,343,731 UART: [ldev] ++
6,344,326 UART: [ldev] CDI.KEYID = 6
6,345,212 UART: [ldev] SUBJECT.KEYID = 5
6,346,369 UART: [ldev] AUTHORITY.KEYID = 7
6,347,655 UART: [ldev] FE.KEYID = 1
6,357,948 UART: [ldev] Erasing FE.KEYID = 1
8,830,703 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,147 UART: [ldev] --
10,623,134 UART: [fwproc] Wait for Commands...
10,625,009 UART: [fwproc] Recv command 0x46574c44
10,627,050 UART: [fwproc] Recv'd Img size: 114168 bytes
15,160,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,239,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,308,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,625,134 >>> mbox cmd response: success
15,629,978 UART: [afmc] ++
15,630,570 UART: [afmc] CDI.KEYID = 6
15,631,481 UART: [afmc] SUBJECT.KEYID = 7
15,632,640 UART: [afmc] AUTHORITY.KEYID = 5
18,131,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,851,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,853,059 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,869,020 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,884,971 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,900,704 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,923,645 UART: [afmc] --
19,926,705 UART: [cold-reset] --
19,930,777 UART: [state] Locking Datavault
19,934,996 UART: [state] Locking PCR0, PCR1 and PCR31
19,936,640 UART: [state] Locking ICCM
19,937,710 UART: [exit] Launching FMC @ 0x40000130
19,946,171 UART:
19,946,450 UART: Running Caliptra FMC ...
19,947,558 UART:
19,947,722 UART: [state] CFI Enabled
19,955,720 UART: [fht] FMC Alias Private Key: 7
21,712,441 UART: [art] Extend RT PCRs Done
21,713,661 UART: [art] Lock RT PCRs Done
21,715,229 UART: [art] Populate DV Done
21,720,638 UART: [fht] FMC Alias Private Key: 7
21,722,301 UART: [art] Derive CDI
21,723,117 UART: [art] Store in in slot 0x4
21,765,928 UART: [art] Derive Key Pair
21,766,929 UART: [art] Store priv key in slot 0x5
24,194,114 UART: [art] Derive Key Pair - Done
24,206,845 UART: [art] Signing Cert with AUTHO
24,208,149 UART: RITY.KEYID = 7
25,913,629 UART: [art] Erasing AUTHORITY.KEYID = 7
25,915,149 UART: [art] PUB.X = CA8DE68CBC46BCD9AF768FD61E943C367F715E6FF09929F6CFC148982BAF7A082407561F9E00A91FB1271174F1E82652
25,922,418 UART: [art] PUB.Y = 64E951CFA9731806BF4D7C275FA54D42C5BC15892D5638712FEDC1EA7282FBE0D6F6BB3B08C0D58E603E4E721761132C
25,929,656 UART: [art] SIG.R = D3BC878CFDB5BEC77495EA66F67370F90EC02326E369F072004695140B658ECAF52A1F48228AB35F43462081DF440A74
25,937,051 UART: [art] SIG.S = 4DCDCFB758B435696A3B38583652B0037F1CA0B99628F36951DC1120E217E4F7B27DC9BFBAB485C994F1EBE8B99A1A46
26,916,645 UART: Caliptra RT
26,917,354 UART: [state] CFI Enabled
27,032,847 UART: [rt] RT listening for mailbox commands...
27,035,145 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,190,359 UART: [rt]cmd =0x41544d4e, len=14344
27,192,216 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,858 writing to cptra_bootfsm_go
3,699,246 ready_for_fw is high
3,699,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,264,319 >>> mbox cmd response: success
19,515,417 UART:
19,515,811 UART: Running Caliptra FMC ...
19,517,012 UART:
19,517,201 UART: [state] CFI Enabled
19,524,823 UART: [fht] FMC Alias Private Key: 7
21,281,842 UART: [art] Extend RT PCRs Done
21,283,069 UART: [art] Lock RT PCRs Done
21,284,864 UART: [art] Populate DV Done
21,290,203 UART: [fht] FMC Alias Private Key: 7
21,291,849 UART: [art] Derive CDI
21,292,589 UART: [art] Store in in slot 0x4
21,334,911 UART: [art] Derive Key Pair
21,336,150 UART: [art] Store priv key in slot 0x5
23,762,157 UART: [art] Derive Key Pair - Done
23,775,207 UART: [art] Signing Cert with AUTHO
23,776,509 UART: RITY.KEYID = 7
25,481,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,483,336 UART: [art] PUB.X = D33ED8C0006DF28A97D327571F5950675FEA6741555E9A8DE3FD762E1BFEE013C134B13C058BB9AB36C38AF7D1B9DC97
25,490,581 UART: [art] PUB.Y = 56770EE83B83DA1547C823B4B2F61CAB4A41BEAD733470472C59800564191D81F8C6DBB2D75D4B8AF61FA93F4799B459
25,497,820 UART: [art] SIG.R = 19B6767FFF446F773F67DC7FE295752E1399A3FD63BB3C9837A25D4459234BD4ACF6B3D07A93DBC1AA5E8D818CE25D02
25,505,227 UART: [art] SIG.S = 567821E67BD7E0D08E7395AE3A3B81CE669EFA1EE9C9DAF15FD751C4FCAE512CB6A2EBD2325074FBF406138A192A92F6
26,484,315 UART: Caliptra RT
26,485,032 UART: [state] CFI Enabled
26,602,699 UART: [rt] RT listening for mailbox commands...
26,605,006 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,760,465 UART: [rt]cmd =0x41544d4e, len=14344
26,762,265 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,041 UART:
192,407 UART: Running Caliptra ROM ...
193,516 UART:
193,659 UART: [state] CFI Enabled
262,185 UART: [state] LifecycleState = Unprovisioned
264,624 UART: [state] DebugLocked = No
266,577 UART: [state] WD Timer not started. Device not locked for debugging
271,395 UART: [kat] SHA2-256
461,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,032 UART: [kat] ++
472,567 UART: [kat] sha1
485,083 UART: [kat] SHA2-256
488,092 UART: [kat] SHA2-384
495,716 UART: [kat] SHA2-512-ACC
498,302 UART: [kat] ECC-384
2,947,899 UART: [kat] HMAC-384Kdf
2,971,507 UART: [kat] LMS
3,503,330 UART: [kat] --
3,508,558 UART: [cold-reset] ++
3,510,709 UART: [fht] FHT @ 0x50003400
3,520,915 UART: [idev] ++
3,521,570 UART: [idev] CDI.KEYID = 6
3,522,600 UART: [idev] SUBJECT.KEYID = 7
3,523,706 UART: [idev] UDS.KEYID = 0
3,524,784 ready_for_fw is high
3,524,997 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,705 UART: [idev] Erasing UDS.KEYID = 0
6,026,036 UART: [idev] Sha1 KeyId Algorithm
6,048,866 UART: [idev] --
6,053,878 UART: [ldev] ++
6,054,622 UART: [ldev] CDI.KEYID = 6
6,055,538 UART: [ldev] SUBJECT.KEYID = 5
6,056,703 UART: [ldev] AUTHORITY.KEYID = 7
6,057,885 UART: [ldev] FE.KEYID = 1
6,099,589 UART: [ldev] Erasing FE.KEYID = 1
8,602,442 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,545 UART: [ldev] --
10,411,484 UART: [fwproc] Wait for Commands...
10,414,287 UART: [fwproc] Recv command 0x46574c44
10,416,543 UART: [fwproc] Recv'd Img size: 114168 bytes
15,042,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,119,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,235,691 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,777,144 >>> mbox cmd response: success
15,780,662 UART: [afmc] ++
15,781,372 UART: [afmc] CDI.KEYID = 6
15,782,542 UART: [afmc] SUBJECT.KEYID = 7
15,784,038 UART: [afmc] AUTHORITY.KEYID = 5
18,314,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,042,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,043,939 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,059,004 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,074,209 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,089,036 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,113,724 UART: [afmc] --
20,117,912 UART: [cold-reset] --
20,121,846 UART: [state] Locking Datavault
20,127,910 UART: [state] Locking PCR0, PCR1 and PCR31
20,130,077 UART: [state] Locking ICCM
20,131,747 UART: [exit] Launching FMC @ 0x40000130
20,140,440 UART:
20,140,681 UART: Running Caliptra FMC ...
20,141,781 UART:
20,141,939 UART: [state] CFI Enabled
20,197,214 UART: [fht] FMC Alias Private Key: 7
21,961,078 UART: [art] Extend RT PCRs Done
21,962,309 UART: [art] Lock RT PCRs Done
21,963,987 UART: [art] Populate DV Done
21,969,299 UART: [fht] FMC Alias Private Key: 7
21,970,785 UART: [art] Derive CDI
21,971,519 UART: [art] Store in in slot 0x4
22,030,019 UART: [art] Derive Key Pair
22,031,024 UART: [art] Store priv key in slot 0x5
24,494,168 UART: [art] Derive Key Pair - Done
24,507,269 UART: [art] Signing Cert with AUTHO
24,508,571 UART: RITY.KEYID = 7
26,219,815 UART: [art] Erasing AUTHORITY.KEYID = 7
26,221,316 UART: [art] PUB.X = D708AE6039AE02DE87BE873788B738E8B99796EFA871E626C32262CBB7144592633B58D721ED635A88DB2C0DAC45C8C0
26,228,583 UART: [art] PUB.Y = E09ED766D897DBDDBCE42FE0AA09A62D83CAA5CA6E8850AD8D916965124A77B79AC229336F47976EF2C05F73D43B4D09
26,235,892 UART: [art] SIG.R = AE8EA624BE5B860CB8AA810C3AF65B51E53E1828A2E266D816B04F2FE3218AA3070B62EA0D7877BB761766E528F5AA5B
26,243,267 UART: [art] SIG.S = D8AE094AB496AB88CFD607B5797AEF4E71F81F3A5066B408D53B8B6897B2B9CA02A8EF5928D7B9C678D08A067520FC58
27,222,463 UART: Caliptra RT
27,223,154 UART: [state] CFI Enabled
27,387,187 UART: [rt] RT listening for mailbox commands...
27,389,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,544,893 UART: [rt]cmd =0x41544d4e, len=14344
27,547,071 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,438,639 ready_for_fw is high
3,439,005 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,818,293 >>> mbox cmd response: success
20,102,029 UART:
20,102,421 UART: Running Caliptra FMC ...
20,103,556 UART:
20,103,718 UART: [state] CFI Enabled
20,174,452 UART: [fht] FMC Alias Private Key: 7
21,938,359 UART: [art] Extend RT PCRs Done
21,939,588 UART: [art] Lock RT PCRs Done
21,941,214 UART: [art] Populate DV Done
21,946,992 UART: [fht] FMC Alias Private Key: 7
21,948,590 UART: [art] Derive CDI
21,949,412 UART: [art] Store in in slot 0x4
22,008,362 UART: [art] Derive Key Pair
22,009,416 UART: [art] Store priv key in slot 0x5
24,472,062 UART: [art] Derive Key Pair - Done
24,484,954 UART: [art] Signing Cert with AUTHO
24,486,261 UART: RITY.KEYID = 7
26,197,957 UART: [art] Erasing AUTHORITY.KEYID = 7
26,199,462 UART: [art] PUB.X = 9B765F85AF16FC539EAF7648C0A78001A40EE824F394641614D3E056313E08C684181A0135B87D936B0A553F5058D4D3
26,206,763 UART: [art] PUB.Y = EE53265CB5DBAEFAE493BFA54329809C01E199445AF3BA1B464512A4DE1B0C03407F17D0ABAC0C749A3BF1EBD3EC1CD8
26,214,012 UART: [art] SIG.R = E6D656A2818F7B55BC2538747526E907AE93C455072E57C1D1EF445DCE0F443C3566BD65A5A6664C99EDC7E95C35D59F
26,221,397 UART: [art] SIG.S = A7C0E4A9472EF371400475E2DE582A648940CC925465D41EA6223B6BC74B76F5CDD61CB1C72071B2DCCDFCCC0A347938
27,200,699 UART: Caliptra RT
27,201,385 UART: [state] CFI Enabled
27,363,910 UART: [rt] RT listening for mailbox commands...
27,366,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,521,526 UART: [rt]cmd =0x41544d4e, len=14344
27,523,492 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,797 writing to cptra_bootfsm_go
192,932 UART:
193,332 UART: Running Caliptra ROM ...
194,540 UART:
604,002 UART: [state] CFI Enabled
615,755 UART: [state] LifecycleState = Unprovisioned
618,140 UART: [state] DebugLocked = No
620,379 UART: [state] WD Timer not started. Device not locked for debugging
625,263 UART: [kat] SHA2-256
815,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,944 UART: [kat] ++
826,548 UART: [kat] sha1
837,712 UART: [kat] SHA2-256
840,722 UART: [kat] SHA2-384
845,008 UART: [kat] SHA2-512-ACC
847,594 UART: [kat] ECC-384
3,292,565 UART: [kat] HMAC-384Kdf
3,305,657 UART: [kat] LMS
3,837,499 UART: [kat] --
3,842,925 UART: [cold-reset] ++
3,845,359 UART: [fht] FHT @ 0x50003400
3,857,128 UART: [idev] ++
3,857,798 UART: [idev] CDI.KEYID = 6
3,858,684 UART: [idev] SUBJECT.KEYID = 7
3,859,933 UART: [idev] UDS.KEYID = 0
3,860,836 ready_for_fw is high
3,861,026 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,261 UART: [idev] Erasing UDS.KEYID = 0
6,338,919 UART: [idev] Sha1 KeyId Algorithm
6,362,587 UART: [idev] --
6,368,311 UART: [ldev] ++
6,368,990 UART: [ldev] CDI.KEYID = 6
6,370,004 UART: [ldev] SUBJECT.KEYID = 5
6,371,110 UART: [ldev] AUTHORITY.KEYID = 7
6,372,358 UART: [ldev] FE.KEYID = 1
6,383,389 UART: [ldev] Erasing FE.KEYID = 1
8,864,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,353 UART: [ldev] --
10,657,188 UART: [fwproc] Wait for Commands...
10,659,510 UART: [fwproc] Recv command 0x46574c44
10,661,766 UART: [fwproc] Recv'd Img size: 114168 bytes
15,277,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,360,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,477,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,018,007 >>> mbox cmd response: success
16,021,163 UART: [afmc] ++
16,021,894 UART: [afmc] CDI.KEYID = 6
16,023,091 UART: [afmc] SUBJECT.KEYID = 7
16,024,590 UART: [afmc] AUTHORITY.KEYID = 5
18,526,418 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,250,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,252,062 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,267,168 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,282,344 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,297,170 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,320,463 UART: [afmc] --
20,324,706 UART: [cold-reset] --
20,328,040 UART: [state] Locking Datavault
20,332,552 UART: [state] Locking PCR0, PCR1 and PCR31
20,334,785 UART: [state] Locking ICCM
20,336,809 UART: [exit] Launching FMC @ 0x40000130
20,345,480 UART:
20,345,742 UART: Running Caliptra FMC ...
20,346,851 UART:
20,347,011 UART: [state] CFI Enabled
20,355,222 UART: [fht] FMC Alias Private Key: 7
22,112,922 UART: [art] Extend RT PCRs Done
22,114,147 UART: [art] Lock RT PCRs Done
22,115,863 UART: [art] Populate DV Done
22,121,224 UART: [fht] FMC Alias Private Key: 7
22,122,763 UART: [art] Derive CDI
22,123,500 UART: [art] Store in in slot 0x4
22,166,529 UART: [art] Derive Key Pair
22,167,531 UART: [art] Store priv key in slot 0x5
24,594,175 UART: [art] Derive Key Pair - Done
24,607,176 UART: [art] Signing Cert with AUTHO
24,608,485 UART: RITY.KEYID = 7
26,314,108 UART: [art] Erasing AUTHORITY.KEYID = 7
26,315,634 UART: [art] PUB.X = 1DFD0F31E660A84005785A133BE662224F627FCC0BF6078E7CCF4BD3DA9383A51549F2750BDB0DFC5ACF14D992F104AE
26,322,886 UART: [art] PUB.Y = 979DB2325DDB6BF30DE53CEA67533909A498078A673B4A1AC183A458CAB06E2793C9F161BB782751BB7034BC3FF06635
26,330,293 UART: [art] SIG.R = 6D391E9330A6E00AADF5320EC6A7287392CD466CE5220E5DB673BEE56B11772E32EF8DD6FB96B42D21CF19D9191E8E52
26,337,546 UART: [art] SIG.S = 4214AD2EF74B52CEA13DD5C9ADFB6F7E8123F7F3EE2F5B5333E5C0945F252FAFA5998BC7E4BBE0F04E779917D4422CE2
27,316,356 UART: Caliptra RT
27,317,069 UART: [state] CFI Enabled
27,435,051 UART: [rt] RT listening for mailbox commands...
27,437,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,592,954 UART: [rt]cmd =0x41544d4e, len=14344
27,594,648 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
3,750,658 ready_for_fw is high
3,751,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,043,778 >>> mbox cmd response: success
20,297,313 UART:
20,297,716 UART: Running Caliptra FMC ...
20,298,809 UART:
20,298,975 UART: [state] CFI Enabled
20,306,801 UART: [fht] FMC Alias Private Key: 7
22,063,413 UART: [art] Extend RT PCRs Done
22,064,641 UART: [art] Lock RT PCRs Done
22,066,143 UART: [art] Populate DV Done
22,071,450 UART: [fht] FMC Alias Private Key: 7
22,072,942 UART: [art] Derive CDI
22,073,681 UART: [art] Store in in slot 0x4
22,116,395 UART: [art] Derive Key Pair
22,117,440 UART: [art] Store priv key in slot 0x5
24,544,419 UART: [art] Derive Key Pair - Done
24,557,280 UART: [art] Signing Cert with AUTHO
24,558,589 UART: RITY.KEYID = 7
26,264,205 UART: [art] Erasing AUTHORITY.KEYID = 7
26,265,705 UART: [art] PUB.X = ED21F32DE6109564296FD778FCA990501D00CC519CD43C95858A884B62E795125176BD325D4E311007B488F6CEECA8F6
26,272,949 UART: [art] PUB.Y = C75BEED205CF4FC1EDA4A72554DB00457F64456F995C666435E62DC66619F7D6036F3EB1B35F11F40F926F99FBABEC89
26,280,157 UART: [art] SIG.R = 51FBBB8CFA4067265D32DB6702B42C035378980D8380CF418C165F54370E503325B88803F45527729B8CEDD8AF7B39A6
26,287,546 UART: [art] SIG.S = C98A12538E493E3914B5B70471AD5D3BF2915600DB67D64FA143EEF163E9115A38E45AB8459AFB558B6D423E10EBC0D5
27,266,098 UART: Caliptra RT
27,266,813 UART: [state] CFI Enabled
27,384,707 UART: [rt] RT listening for mailbox commands...
27,387,060 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,542,482 UART: [rt]cmd =0x41544d4e, len=14344
27,544,504 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,237 UART: [kat] SHA2-256
892,175 UART: [kat] SHA2-384
895,072 UART: [kat] SHA2-512-ACC
896,973 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
906,932 UART: [kat] LMS
1,475,128 UART: [kat] --
1,476,019 UART: [cold-reset] ++
1,476,493 UART: [fht] Storing FHT @ 0x50003400
1,479,304 UART: [idev] ++
1,479,472 UART: [idev] CDI.KEYID = 6
1,479,832 UART: [idev] SUBJECT.KEYID = 7
1,480,256 UART: [idev] UDS.KEYID = 0
1,480,601 ready_for_fw is high
1,480,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,256 UART: [idev] Erasing UDS.KEYID = 0
1,505,104 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,515,075 UART: [ldev] ++
1,515,243 UART: [ldev] CDI.KEYID = 6
1,515,606 UART: [ldev] SUBJECT.KEYID = 5
1,516,032 UART: [ldev] AUTHORITY.KEYID = 7
1,516,495 UART: [ldev] FE.KEYID = 1
1,521,489 UART: [ldev] Erasing FE.KEYID = 1
1,546,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,526 UART: [ldev] --
1,585,849 UART: [fwproc] Waiting for Commands...
1,586,638 UART: [fwproc] Received command 0x46574c44
1,587,429 UART: [fwproc] Received Image of size 114168 bytes
5,233,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,261,113 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,290,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,426,130 >>> mbox cmd response: success
5,427,260 UART: [afmc] ++
5,427,428 UART: [afmc] CDI.KEYID = 6
5,427,790 UART: [afmc] SUBJECT.KEYID = 7
5,428,215 UART: [afmc] AUTHORITY.KEYID = 5
5,462,919 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,479,297 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,480,077 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,485,786 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,491,678 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,497,379 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,505,113 UART: [afmc] --
5,506,191 UART: [cold-reset] --
5,506,977 UART: [state] Locking Datavault
5,508,174 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,778 UART: [state] Locking ICCM
5,509,426 UART: [exit] Launching FMC @ 0x40000130
5,514,755 UART:
5,514,771 UART: Running Caliptra FMC ...
5,515,179 UART:
5,515,233 UART: [state] CFI Enabled
5,525,509 UART: [fht] FMC Alias Private Key: 7
5,633,307 UART: [art] Extend RT PCRs Done
5,633,735 UART: [art] Lock RT PCRs Done
5,635,159 UART: [art] Populate DV Done
5,643,171 UART: [fht] FMC Alias Private Key: 7
5,644,181 UART: [art] Derive CDI
5,644,461 UART: [art] Store in in slot 0x4
5,730,002 UART: [art] Derive Key Pair
5,730,362 UART: [art] Store priv key in slot 0x5
5,743,044 UART: [art] Derive Key Pair - Done
5,757,870 UART: [art] Signing Cert with AUTHO
5,758,350 UART: RITY.KEYID = 7
5,773,652 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,417 UART: [art] PUB.X = C1F4700B1B5A99C09421F73D8E21584D889084D9C24824849AD803FFB425B7AC4D2860517E60421A7800169D18C3CE6A
5,781,153 UART: [art] PUB.Y = B060D74B15476A7BA99B9A09181EB418A3C3067FC054FA33E016D4132FA1DFD0DEBACA2FAB827BDAA7CEDE27852785AC
5,788,119 UART: [art] SIG.R = 9C74C646CA1D33DAA2C5ECEF0F6D9432848A880850436AB33F6A3FA20A6776BFA2B41C95F5ED06EB6B2B28F4C6E23CE1
5,794,895 UART: [art] SIG.S = F581E09CA44C3C2F7B6CDF314F285D3419E90B24A6437362ECD113E3634B7018D4F02BB48890A3519C77DCB5F0B6656A
5,818,783 UART: Caliptra RT
5,819,036 UART: [state] CFI Enabled
5,926,870 UART: [rt] RT listening for mailbox commands...
5,927,540 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,050,596 UART: [rt]cmd =0x41544d4e, len=14344
6,052,069 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,441 ready_for_fw is high
1,362,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,351,700 >>> mbox cmd response: success
5,413,497 UART:
5,413,513 UART: Running Caliptra FMC ...
5,413,921 UART:
5,413,975 UART: [state] CFI Enabled
5,424,543 UART: [fht] FMC Alias Private Key: 7
5,532,479 UART: [art] Extend RT PCRs Done
5,532,907 UART: [art] Lock RT PCRs Done
5,534,617 UART: [art] Populate DV Done
5,543,031 UART: [fht] FMC Alias Private Key: 7
5,544,119 UART: [art] Derive CDI
5,544,399 UART: [art] Store in in slot 0x4
5,629,596 UART: [art] Derive Key Pair
5,629,956 UART: [art] Store priv key in slot 0x5
5,643,104 UART: [art] Derive Key Pair - Done
5,657,746 UART: [art] Signing Cert with AUTHO
5,658,226 UART: RITY.KEYID = 7
5,673,390 UART: [art] Erasing AUTHORITY.KEYID = 7
5,674,155 UART: [art] PUB.X = 46D7F5C666D2D994C7B922912B06ACC271A544ABB6BC455F890ED9F01A807B4CC594A9E76BE5D51F414CAC9C7C16A71D
5,680,933 UART: [art] PUB.Y = CA72A85D17D170F7C8DE5CAFD6F6800B89504B32FC857B9B5849284FF56491D2FB2C727B4DC4EA1D73365BCAEC4FBB94
5,687,898 UART: [art] SIG.R = 84543D793A26B22AD7F297977A38ADF4DB332CCBC8E4F9127C52902CE1AF5273D84FC9E5313076A7476CF9FF18C4563D
5,694,674 UART: [art] SIG.S = EF9AB549C94B9AFB0EB395C7B9F603D1D2328AD2DC2FD63051216989CE3E2A612AAB2A81CFB3382205617A5964CF3770
5,718,900 UART: Caliptra RT
5,719,153 UART: [state] CFI Enabled
5,828,061 UART: [rt] RT listening for mailbox commands...
5,828,731 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,951,685 UART: [rt]cmd =0x41544d4e, len=14344
5,953,154 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,688 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,236 UART: [kat] SHA2-256
882,167 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,282 UART: [kat] ++
886,434 UART: [kat] sha1
890,492 UART: [kat] SHA2-256
892,430 UART: [kat] SHA2-384
895,035 UART: [kat] SHA2-512-ACC
896,936 UART: [kat] ECC-384
902,607 UART: [kat] HMAC-384Kdf
907,205 UART: [kat] LMS
1,475,401 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,806 UART: [fht] Storing FHT @ 0x50003400
1,479,599 UART: [idev] ++
1,479,767 UART: [idev] CDI.KEYID = 6
1,480,127 UART: [idev] SUBJECT.KEYID = 7
1,480,551 UART: [idev] UDS.KEYID = 0
1,480,896 ready_for_fw is high
1,480,896 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,889 UART: [idev] Erasing UDS.KEYID = 0
1,505,697 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,229 UART: [idev] --
1,515,206 UART: [ldev] ++
1,515,374 UART: [ldev] CDI.KEYID = 6
1,515,737 UART: [ldev] SUBJECT.KEYID = 5
1,516,163 UART: [ldev] AUTHORITY.KEYID = 7
1,516,626 UART: [ldev] FE.KEYID = 1
1,521,864 UART: [ldev] Erasing FE.KEYID = 1
1,547,239 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,841 UART: [ldev] --
1,586,128 UART: [fwproc] Waiting for Commands...
1,586,985 UART: [fwproc] Received command 0x46574c44
1,587,776 UART: [fwproc] Received Image of size 114168 bytes
5,271,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,300,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,329,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,465,435 >>> mbox cmd response: success
5,466,651 UART: [afmc] ++
5,466,819 UART: [afmc] CDI.KEYID = 6
5,467,181 UART: [afmc] SUBJECT.KEYID = 7
5,467,606 UART: [afmc] AUTHORITY.KEYID = 5
5,502,774 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,519,208 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,519,988 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,525,697 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,531,589 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,537,290 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,545,378 UART: [afmc] --
5,546,428 UART: [cold-reset] --
5,547,246 UART: [state] Locking Datavault
5,548,215 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,819 UART: [state] Locking ICCM
5,549,281 UART: [exit] Launching FMC @ 0x40000130
5,554,610 UART:
5,554,626 UART: Running Caliptra FMC ...
5,555,034 UART:
5,555,177 UART: [state] CFI Enabled
5,565,815 UART: [fht] FMC Alias Private Key: 7
5,673,867 UART: [art] Extend RT PCRs Done
5,674,295 UART: [art] Lock RT PCRs Done
5,676,105 UART: [art] Populate DV Done
5,684,459 UART: [fht] FMC Alias Private Key: 7
5,685,477 UART: [art] Derive CDI
5,685,757 UART: [art] Store in in slot 0x4
5,771,512 UART: [art] Derive Key Pair
5,771,872 UART: [art] Store priv key in slot 0x5
5,785,340 UART: [art] Derive Key Pair - Done
5,800,250 UART: [art] Signing Cert with AUTHO
5,800,730 UART: RITY.KEYID = 7
5,815,864 UART: [art] Erasing AUTHORITY.KEYID = 7
5,816,629 UART: [art] PUB.X = 2C7A20F4A5848AB2F95CF19E076CAC983D9656898B0F7C5ED80AA6D2DE085704ED42537D784A0516ED2C3BC4CF1C293A
5,823,393 UART: [art] PUB.Y = EC67E46503DEA6B523092813CB3B056387F1CB6A131F778C6B449BC4CC68F673CC81904909D746B15289709F7C664107
5,830,322 UART: [art] SIG.R = 7B4979776AC86098930BFA1AA285ED7920B8B2FF3DF1F1E91EA536335F161EA95AA3AF204C1EB86EE9B99E73D69C4590
5,837,099 UART: [art] SIG.S = F1451C8DEB85C2F01391D5E9F0CACE4DA90D841BCB879C6307A43A02775259AAB5F37BB0A8B407DB5FFEA4F3D0C9BBB6
5,861,036 UART: Caliptra RT
5,861,381 UART: [state] CFI Enabled
5,969,514 UART: [rt] RT listening for mailbox commands...
5,970,184 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,093,282 UART: [rt]cmd =0x41544d4e, len=14344
6,094,835 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,864 ready_for_fw is high
1,362,864 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,049,371 >>> mbox cmd response: success
5,111,492 UART:
5,111,508 UART: Running Caliptra FMC ...
5,111,916 UART:
5,112,059 UART: [state] CFI Enabled
5,122,875 UART: [fht] FMC Alias Private Key: 7
5,231,329 UART: [art] Extend RT PCRs Done
5,231,757 UART: [art] Lock RT PCRs Done
5,233,245 UART: [art] Populate DV Done
5,241,303 UART: [fht] FMC Alias Private Key: 7
5,242,395 UART: [art] Derive CDI
5,242,675 UART: [art] Store in in slot 0x4
5,328,078 UART: [art] Derive Key Pair
5,328,438 UART: [art] Store priv key in slot 0x5
5,341,620 UART: [art] Derive Key Pair - Done
5,356,685 UART: [art] Signing Cert with AUTHO
5,357,165 UART: RITY.KEYID = 7
5,372,345 UART: [art] Erasing AUTHORITY.KEYID = 7
5,373,110 UART: [art] PUB.X = A9391F8FC83A7BB9DA754B2E0EF81DB8D94EC18702B5AC1DD30DCC8B3B15DBA774CE657F4DCE96EFFE751B2E3C0BB53A
5,379,900 UART: [art] PUB.Y = 31D15DFF52D3814D1334351A1AEC41991B62D8C44976A95C9223AADEE2DDE5D348E30149E25B9EDA99A40B30328FA5CC
5,386,854 UART: [art] SIG.R = E4549AD20D3F681D65ED9A408076D72D673552CC5306BA151A928B19AABFE2197C4A0CC3D9E677CAB55C1C3A09E129FA
5,393,624 UART: [art] SIG.S = EC8758E5191ED9B0F13B9CB546AF4BB288F2AC36972C832B95878978FBE7C964009025405684B004760F04CB5404FFBA
5,417,539 UART: Caliptra RT
5,417,884 UART: [state] CFI Enabled
5,526,334 UART: [rt] RT listening for mailbox commands...
5,527,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,649,976 UART: [rt]cmd =0x41544d4e, len=14344
5,651,595 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,293 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
893,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,389 UART: [kat] ++
897,541 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,172,011 UART: [cold-reset] ++
1,172,343 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 ready_for_fw is high
1,176,323 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,614 UART: [idev] Erasing UDS.KEYID = 0
1,200,485 UART: [idev] Sha1 KeyId Algorithm
1,208,941 UART: [idev] --
1,209,929 UART: [ldev] ++
1,210,097 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,246 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,692 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,313,450 >>> mbox cmd response: success
3,314,586 UART: [afmc] ++
3,314,754 UART: [afmc] CDI.KEYID = 6
3,315,116 UART: [afmc] SUBJECT.KEYID = 7
3,315,541 UART: [afmc] AUTHORITY.KEYID = 5
3,350,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,562 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,271 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,163 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,874 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,861 UART: [afmc] --
3,393,777 UART: [cold-reset] --
3,394,527 UART: [state] Locking Datavault
3,395,854 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,458 UART: [state] Locking ICCM
3,396,964 UART: [exit] Launching FMC @ 0x40000130
3,402,293 UART:
3,402,309 UART: Running Caliptra FMC ...
3,402,717 UART:
3,402,771 UART: [state] CFI Enabled
3,413,159 UART: [fht] FMC Alias Private Key: 7
3,520,881 UART: [art] Extend RT PCRs Done
3,521,309 UART: [art] Lock RT PCRs Done
3,523,013 UART: [art] Populate DV Done
3,530,879 UART: [fht] FMC Alias Private Key: 7
3,531,835 UART: [art] Derive CDI
3,532,115 UART: [art] Store in in slot 0x4
3,618,076 UART: [art] Derive Key Pair
3,618,436 UART: [art] Store priv key in slot 0x5
3,632,262 UART: [art] Derive Key Pair - Done
3,646,968 UART: [art] Signing Cert with AUTHO
3,647,448 UART: RITY.KEYID = 7
3,662,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,591 UART: [art] PUB.X = E35908ADF5A98E1E4697D36F0C18ACF5C462E4500144A9F0388A06D13FDE04D60FB32AD1C0A43772B92F67E6973FDD7D
3,670,353 UART: [art] PUB.Y = C7EB18572DD4598D385D843861BB4490D272CE9FA10816FCB6D35CD4B401A8C331249A0139BE74AB2A76B4C6FCF2BFFB
3,677,308 UART: [art] SIG.R = E6FBF553D282FB6A16FFF81D2BB0FADCE378F40DB097C75A99B32060CA4EBF24A7C39269941416219A4871D87F5B03D3
3,684,084 UART: [art] SIG.S = A43B0F77BC962DA669C1DCADA118A0C15839F6EE7F72B4F8C1C393F2E6BF155954E3291FCE1A86562EB80319118FDC9E
3,707,935 UART: Caliptra RT
3,708,188 UART: [state] CFI Enabled
3,816,177 UART: [rt] RT listening for mailbox commands...
3,816,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,101 UART: [rt]cmd =0x41544d4e, len=14344
3,941,602 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,149 ready_for_fw is high
1,061,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,169,536 >>> mbox cmd response: success
3,231,929 UART:
3,231,945 UART: Running Caliptra FMC ...
3,232,353 UART:
3,232,407 UART: [state] CFI Enabled
3,243,251 UART: [fht] FMC Alias Private Key: 7
3,351,007 UART: [art] Extend RT PCRs Done
3,351,435 UART: [art] Lock RT PCRs Done
3,353,171 UART: [art] Populate DV Done
3,361,439 UART: [fht] FMC Alias Private Key: 7
3,362,615 UART: [art] Derive CDI
3,362,895 UART: [art] Store in in slot 0x4
3,448,334 UART: [art] Derive Key Pair
3,448,694 UART: [art] Store priv key in slot 0x5
3,461,994 UART: [art] Derive Key Pair - Done
3,476,913 UART: [art] Signing Cert with AUTHO
3,477,393 UART: RITY.KEYID = 7
3,492,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,468 UART: [art] PUB.X = 7BB491760A96C6D67CB7E4CF2B333BE10B083DB88BE95E1865431123D1BE4FACAC319803DBB6C5F44E7EA6E0EAF77EA3
3,500,246 UART: [art] PUB.Y = 7B1051926FE959A7DBD5F4C994FA8584EAEC1C1D6D71C0E12F40136BA6A3E2AC8A2F1CFE391FD3F0B954EE2AADD880CF
3,507,222 UART: [art] SIG.R = 4E4D909F5AF0FCB5BAB7B471373ACDE514FEB8E0C6D2413DAF596A98A5C3C0C2EFAEEF68928E8635C51039A2A3439394
3,514,010 UART: [art] SIG.S = D2DFFD54F9336E6F221E48B21939F43F1985F82F36BAF9C59A7AAE017F55FA8E237CFAFF36C1C6037B83A20BDB149C65
3,537,660 UART: Caliptra RT
3,537,913 UART: [state] CFI Enabled
3,645,743 UART: [rt] RT listening for mailbox commands...
3,646,413 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,445 UART: [rt]cmd =0x41544d4e, len=14344
3,770,998 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,539 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,808 UART: [fht] FHT @ 0x50003400
1,175,511 UART: [idev] ++
1,175,679 UART: [idev] CDI.KEYID = 6
1,176,039 UART: [idev] SUBJECT.KEYID = 7
1,176,463 UART: [idev] UDS.KEYID = 0
1,176,808 ready_for_fw is high
1,176,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,401 UART: [idev] Erasing UDS.KEYID = 0
1,202,110 UART: [idev] Sha1 KeyId Algorithm
1,210,586 UART: [idev] --
1,211,640 UART: [ldev] ++
1,211,808 UART: [ldev] CDI.KEYID = 6
1,212,171 UART: [ldev] SUBJECT.KEYID = 5
1,212,597 UART: [ldev] AUTHORITY.KEYID = 7
1,213,060 UART: [ldev] FE.KEYID = 1
1,218,250 UART: [ldev] Erasing FE.KEYID = 1
1,244,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,166 UART: [ldev] --
1,284,501 UART: [fwproc] Wait for Commands...
1,285,137 UART: [fwproc] Recv command 0x46574c44
1,285,865 UART: [fwproc] Recv'd Img size: 114168 bytes
3,117,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,144,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,309,708 >>> mbox cmd response: success
3,310,890 UART: [afmc] ++
3,311,058 UART: [afmc] CDI.KEYID = 6
3,311,420 UART: [afmc] SUBJECT.KEYID = 7
3,311,845 UART: [afmc] AUTHORITY.KEYID = 5
3,347,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,364,870 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,579 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,471 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,182 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,389,989 UART: [afmc] --
3,391,111 UART: [cold-reset] --
3,392,075 UART: [state] Locking Datavault
3,393,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,978 UART: [state] Locking ICCM
3,394,590 UART: [exit] Launching FMC @ 0x40000130
3,399,919 UART:
3,399,935 UART: Running Caliptra FMC ...
3,400,343 UART:
3,400,486 UART: [state] CFI Enabled
3,411,270 UART: [fht] FMC Alias Private Key: 7
3,519,528 UART: [art] Extend RT PCRs Done
3,519,956 UART: [art] Lock RT PCRs Done
3,521,806 UART: [art] Populate DV Done
3,529,866 UART: [fht] FMC Alias Private Key: 7
3,530,864 UART: [art] Derive CDI
3,531,144 UART: [art] Store in in slot 0x4
3,616,517 UART: [art] Derive Key Pair
3,616,877 UART: [art] Store priv key in slot 0x5
3,630,303 UART: [art] Derive Key Pair - Done
3,644,992 UART: [art] Signing Cert with AUTHO
3,645,472 UART: RITY.KEYID = 7
3,660,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,015 UART: [art] PUB.X = D470C29071E81D3855E83B22CD859BA52E8D7543D7311B0F9876C8EB4D199AC92E9F88F99AE8A42AE08E8C234502F9BD
3,667,785 UART: [art] PUB.Y = B9881C651D835B68321140C72EB8503DBC8EEA57238A299E8E61D5EB1133798B1468C9419E5545BF3950707956147181
3,674,721 UART: [art] SIG.R = E2731F527801B58A8512D85FB550CB298B6DD263D6FFEB44A25AE09CFC32AC5A79BCF2CAD3C6DAEF305A2F7431BA762F
3,681,510 UART: [art] SIG.S = 3E4F6C22EF1F642C9FCF101D36F721BF0E91F7E5A4B53334BC869E7DECC45EABD1BECBA8E72BFCD0386CB88EA6CE1E74
3,705,464 UART: Caliptra RT
3,705,809 UART: [state] CFI Enabled
3,813,843 UART: [rt] RT listening for mailbox commands...
3,814,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,449 UART: [rt]cmd =0x41544d4e, len=14344
3,938,932 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,534 ready_for_fw is high
1,060,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,174,240 >>> mbox cmd response: success
3,236,195 UART:
3,236,211 UART: Running Caliptra FMC ...
3,236,619 UART:
3,236,762 UART: [state] CFI Enabled
3,247,346 UART: [fht] FMC Alias Private Key: 7
3,355,128 UART: [art] Extend RT PCRs Done
3,355,556 UART: [art] Lock RT PCRs Done
3,357,154 UART: [art] Populate DV Done
3,365,374 UART: [fht] FMC Alias Private Key: 7
3,366,452 UART: [art] Derive CDI
3,366,732 UART: [art] Store in in slot 0x4
3,452,499 UART: [art] Derive Key Pair
3,452,859 UART: [art] Store priv key in slot 0x5
3,465,971 UART: [art] Derive Key Pair - Done
3,480,952 UART: [art] Signing Cert with AUTHO
3,481,432 UART: RITY.KEYID = 7
3,496,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,293 UART: [art] PUB.X = 2A3B5BF064BD9B675CAE34A226A37B5F2A7CC9EEC68D2F1B56D60D0D49504D6F0294FEB894D3961CE6AB159A96D8A0D3
3,504,072 UART: [art] PUB.Y = 5F137A54DB76666BA4C8CDC2460AB896B5B41789A3DFEA2B41712BC6F7A715CEE8967848A1B818F38D33532B6C976723
3,511,023 UART: [art] SIG.R = 6249120C792986F6E8F312E043884E652CAA13596D48409AEA92A3469DFDF77B38ACFF902A33156019E83A2ACF980AD0
3,517,787 UART: [art] SIG.S = 3ED79ACB254D44A7B878670F4D18077B85208A3322E91AEC3539AB0205998E13AA21E9DF89370C77E43BA179C6786AC2
3,541,459 UART: Caliptra RT
3,541,804 UART: [state] CFI Enabled
3,648,467 UART: [rt] RT listening for mailbox commands...
3,649,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,772,107 UART: [rt]cmd =0x41544d4e, len=14344
3,773,482 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,925 UART: [kat] ++
895,077 UART: [kat] sha1
899,271 UART: [kat] SHA2-256
901,211 UART: [kat] SHA2-384
904,148 UART: [kat] SHA2-512-ACC
906,049 UART: [kat] ECC-384
915,650 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,785 UART: [idev] ++
1,172,953 UART: [idev] CDI.KEYID = 6
1,173,314 UART: [idev] SUBJECT.KEYID = 7
1,173,739 UART: [idev] UDS.KEYID = 0
1,174,085 ready_for_fw is high
1,174,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,199,183 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,216,116 UART: [ldev] Erasing FE.KEYID = 1
1,242,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,516 UART: [ldev] --
1,282,028 UART: [fwproc] Wait for Commands...
1,282,607 UART: [fwproc] Recv command 0x46574c44
1,283,340 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,917 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,226 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,317,812 >>> mbox cmd response: success
3,319,041 UART: [afmc] ++
3,319,209 UART: [afmc] CDI.KEYID = 6
3,319,572 UART: [afmc] SUBJECT.KEYID = 7
3,319,998 UART: [afmc] AUTHORITY.KEYID = 5
3,356,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,138 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,889 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,599 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,489 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,200 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,397,996 UART: [afmc] --
3,398,936 UART: [cold-reset] --
3,399,848 UART: [state] Locking Datavault
3,401,179 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,783 UART: [state] Locking ICCM
3,402,277 UART: [exit] Launching FMC @ 0x40000130
3,407,606 UART:
3,407,622 UART: Running Caliptra FMC ...
3,408,030 UART:
3,408,084 UART: [state] CFI Enabled
3,418,650 UART: [fht] FMC Alias Private Key: 7
3,526,560 UART: [art] Extend RT PCRs Done
3,526,988 UART: [art] Lock RT PCRs Done
3,528,650 UART: [art] Populate DV Done
3,537,072 UART: [fht] FMC Alias Private Key: 7
3,538,106 UART: [art] Derive CDI
3,538,386 UART: [art] Store in in slot 0x4
3,624,107 UART: [art] Derive Key Pair
3,624,467 UART: [art] Store priv key in slot 0x5
3,637,621 UART: [art] Derive Key Pair - Done
3,652,326 UART: [art] Signing Cert with AUTHO
3,652,806 UART: RITY.KEYID = 7
3,668,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,973 UART: [art] PUB.X = CCDBBD8A9D83CFB3D3C9733CED9A089D6AA10688CE10D6DB478580386F1E948014AB154B316B3E5B4A436FBAB4E3F82E
3,675,757 UART: [art] PUB.Y = 8DC1C773DE80ABE833BDF0E800E12B776A33BBDFA3463A20C4B80885979429EF78D0D16AFA9EFB881DA55975425EDD49
3,682,696 UART: [art] SIG.R = 52B112CD44042974FACE47200DB97AEAE288C5416CBC7A2596172B7DA3F4911D8D5C7850555982A4E98CEE2BEA294D03
3,689,463 UART: [art] SIG.S = 8B09054EA350351E1CF53826F71B044A9802C12447F4525E9C56F1B89B3AC8CB462ABE45816B0338C0856E79A75DD048
3,713,939 UART: Caliptra RT
3,714,192 UART: [state] CFI Enabled
3,820,512 UART: [rt] RT listening for mailbox commands...
3,821,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,944,460 UART: [rt]cmd =0x41544d4e, len=14344
3,946,093 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,764 ready_for_fw is high
1,056,764 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,175,474 >>> mbox cmd response: success
3,237,323 UART:
3,237,339 UART: Running Caliptra FMC ...
3,237,747 UART:
3,237,801 UART: [state] CFI Enabled
3,248,255 UART: [fht] FMC Alias Private Key: 7
3,356,173 UART: [art] Extend RT PCRs Done
3,356,601 UART: [art] Lock RT PCRs Done
3,357,883 UART: [art] Populate DV Done
3,365,991 UART: [fht] FMC Alias Private Key: 7
3,366,951 UART: [art] Derive CDI
3,367,231 UART: [art] Store in in slot 0x4
3,452,976 UART: [art] Derive Key Pair
3,453,336 UART: [art] Store priv key in slot 0x5
3,466,358 UART: [art] Derive Key Pair - Done
3,481,186 UART: [art] Signing Cert with AUTHO
3,481,666 UART: RITY.KEYID = 7
3,496,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,593 UART: [art] PUB.X = 617E855667790203D90DACC971C45FFFE7D23394926C2DD05D4DFA598112F682F213A4ABAA6FC98F3B536D9C372B16C4
3,504,360 UART: [art] PUB.Y = 1722FD6763523B39113BCD71267C2E3F6EF9B85AC44A44F7E5BFB9FA5829DC8BEEFF4726CCD4836DCA26A209349F4DEF
3,511,325 UART: [art] SIG.R = 0C009C9ED25CAACDF8EA39D28D9431B1887DDF914B0217789324A0198DAADB62A3A6D71D236A346EF52A936A3C2427A0
3,518,077 UART: [art] SIG.S = 064002AF6FDAFC909DA9F4638FA8EE89F2C8FB204F39F903767630FA3546E746D05321623AC6F7A455F0C4904AD19C56
3,541,563 UART: Caliptra RT
3,541,816 UART: [state] CFI Enabled
3,649,479 UART: [rt] RT listening for mailbox commands...
3,650,149 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,149 UART: [rt]cmd =0x41544d4e, len=14344
3,774,452 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,457 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,156 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,174,620 ready_for_fw is high
1,174,620 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,996 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,869 UART: [ldev] SUBJECT.KEYID = 5
1,210,296 UART: [ldev] AUTHORITY.KEYID = 7
1,210,759 UART: [ldev] FE.KEYID = 1
1,216,093 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,631 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,558 UART: [fwproc] Recv command 0x46574c44
1,283,291 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,316,919 >>> mbox cmd response: success
3,318,092 UART: [afmc] ++
3,318,260 UART: [afmc] CDI.KEYID = 6
3,318,623 UART: [afmc] SUBJECT.KEYID = 7
3,319,049 UART: [afmc] AUTHORITY.KEYID = 5
3,354,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,658 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,377,368 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,383,258 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,969 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,767 UART: [afmc] --
3,397,741 UART: [cold-reset] --
3,398,703 UART: [state] Locking Datavault
3,399,852 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,456 UART: [state] Locking ICCM
3,401,058 UART: [exit] Launching FMC @ 0x40000130
3,406,387 UART:
3,406,403 UART: Running Caliptra FMC ...
3,406,811 UART:
3,406,954 UART: [state] CFI Enabled
3,417,650 UART: [fht] FMC Alias Private Key: 7
3,525,488 UART: [art] Extend RT PCRs Done
3,525,916 UART: [art] Lock RT PCRs Done
3,527,758 UART: [art] Populate DV Done
3,535,924 UART: [fht] FMC Alias Private Key: 7
3,536,946 UART: [art] Derive CDI
3,537,226 UART: [art] Store in in slot 0x4
3,623,025 UART: [art] Derive Key Pair
3,623,385 UART: [art] Store priv key in slot 0x5
3,636,651 UART: [art] Derive Key Pair - Done
3,651,452 UART: [art] Signing Cert with AUTHO
3,651,932 UART: RITY.KEYID = 7
3,667,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,271 UART: [art] PUB.X = 83B0F2B6D9C4F9FD1913266463BF9829B67F73F3EBA9174B590ACA734DBC7649DEB1ACD9E5704199FB026CAC9F290EC4
3,675,046 UART: [art] PUB.Y = E11F3A18F598991BE2B22A94C9ADB6D9AE50A5D252EA1F603A223F3A36C8E657243A811AD457E976122F18A8B9388077
3,681,998 UART: [art] SIG.R = 2C3C6C1322F74329D664FB80C84103728300398413B9A6557265F9FD081D3908B7EE3FCA361D5FED2BCDEEF086CB811F
3,688,741 UART: [art] SIG.S = C7E7D39A5D20FE799B9AC4F84423F5CD50585E50AF0AB30FF2938751034AE2A9CB2213266B385A78628138F9B22E9E17
3,712,323 UART: Caliptra RT
3,712,668 UART: [state] CFI Enabled
3,819,678 UART: [rt] RT listening for mailbox commands...
3,820,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,943,552 UART: [rt]cmd =0x41544d4e, len=14344
3,945,123 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,897 ready_for_fw is high
1,055,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,171,117 >>> mbox cmd response: success
3,233,346 UART:
3,233,362 UART: Running Caliptra FMC ...
3,233,770 UART:
3,233,913 UART: [state] CFI Enabled
3,244,767 UART: [fht] FMC Alias Private Key: 7
3,352,655 UART: [art] Extend RT PCRs Done
3,353,083 UART: [art] Lock RT PCRs Done
3,354,579 UART: [art] Populate DV Done
3,362,903 UART: [fht] FMC Alias Private Key: 7
3,363,989 UART: [art] Derive CDI
3,364,269 UART: [art] Store in in slot 0x4
3,449,930 UART: [art] Derive Key Pair
3,450,290 UART: [art] Store priv key in slot 0x5
3,463,740 UART: [art] Derive Key Pair - Done
3,478,740 UART: [art] Signing Cert with AUTHO
3,479,220 UART: RITY.KEYID = 7
3,494,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,155 UART: [art] PUB.X = 12E94610B422C82913081F86C11C7BE9AABC0CE0AE6A9270D2FAE97A719C1476F1D6481BA83EC4FED8798B7A57878367
3,501,925 UART: [art] PUB.Y = FD3C7E91E45E3170A0646AE4533A1BC9D1C4A5BC0CF48EB610B9C773F4B17BCFEA6439902C14410DD255A23FA35B8B55
3,508,883 UART: [art] SIG.R = D2914DB1DD6222B2B07D493067AA57DAB1468497D25FEC426C911D0EED38758F17D96A9E8880CC94691149705E29C8B9
3,515,650 UART: [art] SIG.S = EDAE146E2CFCD56011D6FE6F3934D323B23D9F0A0EB1045225E19DC799ED4D08F409749EB0366605D95F1E77DE725AAB
3,539,603 UART: Caliptra RT
3,539,948 UART: [state] CFI Enabled
3,647,699 UART: [rt] RT listening for mailbox commands...
3,648,369 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,709 UART: [rt]cmd =0x41544d4e, len=14344
3,773,316 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,061 UART:
192,429 UART: Running Caliptra ROM ...
193,527 UART:
193,664 UART: [state] CFI Enabled
264,915 UART: [state] LifecycleState = Unprovisioned
266,901 UART: [state] DebugLocked = No
269,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,841 UART: [kat] SHA2-256
443,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,013 UART: [kat] ++
454,459 UART: [kat] sha1
466,175 UART: [kat] SHA2-256
468,887 UART: [kat] SHA2-384
475,314 UART: [kat] SHA2-512-ACC
477,684 UART: [kat] ECC-384
2,770,013 UART: [kat] HMAC-384Kdf
2,802,718 UART: [kat] LMS
3,993,072 UART: [kat] --
3,997,669 UART: [cold-reset] ++
3,999,674 UART: [fht] Storing FHT @ 0x50003400
4,012,071 UART: [idev] ++
4,012,633 UART: [idev] CDI.KEYID = 6
4,013,556 UART: [idev] SUBJECT.KEYID = 7
4,015,047 UART: [idev] UDS.KEYID = 0
4,016,158 ready_for_fw is high
4,016,380 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,159,536 UART: [idev] Erasing UDS.KEYID = 0
7,351,551 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,879 UART: [idev] --
7,377,920 UART: [ldev] ++
7,378,525 UART: [ldev] CDI.KEYID = 6
7,379,435 UART: [ldev] SUBJECT.KEYID = 5
7,380,641 UART: [ldev] AUTHORITY.KEYID = 7
7,381,917 UART: [ldev] FE.KEYID = 1
7,425,124 UART: [ldev] Erasing FE.KEYID = 1
10,757,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,054 UART: [ldev] --
13,119,504 UART: [fwproc] Waiting for Commands...
13,122,784 UART: [fwproc] Received command 0x46574c44
13,124,958 UART: [fwproc] Received Image of size 113844 bytes
22,229,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,314,337 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,383,251 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,700,314 >>> mbox cmd response: success
22,704,079 UART: [afmc] ++
22,704,682 UART: [afmc] CDI.KEYID = 6
22,705,646 UART: [afmc] SUBJECT.KEYID = 7
22,706,854 UART: [afmc] AUTHORITY.KEYID = 5
26,066,757 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,364,898 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,367,165 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,381,718 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,396,472 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,410,690 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,432,173 UART: [afmc] --
28,436,908 UART: [cold-reset] --
28,440,492 UART: [state] Locking Datavault
28,444,892 UART: [state] Locking PCR0, PCR1 and PCR31
28,446,586 UART: [state] Locking ICCM
28,448,238 UART: [exit] Launching FMC @ 0x40000130
28,456,583 UART:
28,456,814 UART: Running Caliptra FMC ...
28,457,907 UART:
28,458,063 UART: [state] CFI Enabled
28,524,857 UART: [fht] FMC Alias Private Key: 7
30,863,002 UART: [art] Extend RT PCRs Done
30,864,224 UART: [art] Lock RT PCRs Done
30,866,226 UART: [art] Populate DV Done
30,871,687 UART: [fht] FMC Alias Private Key: 7
30,873,220 UART: [art] Derive CDI
30,874,027 UART: [art] Store in in slot 0x4
30,933,174 UART: [art] Derive Key Pair
30,934,228 UART: [art] Store priv key in slot 0x5
34,227,370 UART: [art] Derive Key Pair - Done
34,240,364 UART: [art] Signing Cert with AUTHO
34,241,674 UART: RITY.KEYID = 7
36,528,657 UART: [art] Erasing AUTHORITY.KEYID = 7
36,530,164 UART: [art] PUB.X = 4D3C12EE1EBC47E2F8D1FE1C92EB320A354DB85C00B8C1D7632C01FA157FD0D64AEDB4D16C4746600E75662692A24B18
36,537,422 UART: [art] PUB.Y = 0AFC83EB512502E53DC54C15D5C102A652CE9DA736C6B09F242D4E1F79E8F4857B93F3AAE6AAAACDD8F9D5455DE32431
36,544,673 UART: [art] SIG.R = D7D2F519239D105711469278EF47D74BDB186586FB7A45C9D1AAB780709118537CEDD4DA84943BECFF3DEA30B7D2652D
36,552,080 UART: [art] SIG.S = F76F48A75FAA0D3A7FCE2F67A2CAAA0DABDE408D15BAC3DB687B4D47D44428F226A15FC4FC3B2BB588B3130CC9D2768D
37,856,739 UART: Caliptra RT
37,857,446 UART: [state] CFI Enabled
38,019,631 UART: [rt] RT listening for mailbox commands...
38,021,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,177,141 UART: [rt]cmd =0x41544d4e, len=14344
38,179,003 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,786,102 ready_for_fw is high
3,786,493 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,263,793 >>> mbox cmd response: success
27,959,367 UART:
27,959,737 UART: Running Caliptra FMC ...
27,960,914 UART:
27,961,078 UART: [state] CFI Enabled
28,028,512 UART: [fht] FMC Alias Private Key: 7
30,366,497 UART: [art] Extend RT PCRs Done
30,367,775 UART: [art] Lock RT PCRs Done
30,369,287 UART: [art] Populate DV Done
30,374,536 UART: [fht] FMC Alias Private Key: 7
30,376,234 UART: [art] Derive CDI
30,377,041 UART: [art] Store in in slot 0x4
30,437,246 UART: [art] Derive Key Pair
30,438,280 UART: [art] Store priv key in slot 0x5
33,731,177 UART: [art] Derive Key Pair - Done
33,744,068 UART: [art] Signing Cert with AUTHO
33,745,368 UART: RITY.KEYID = 7
36,033,077 UART: [art] Erasing AUTHORITY.KEYID = 7
36,034,589 UART: [art] PUB.X = 779E3B1065F691DEBA05E369FE553BDE911933A3397C9885B29EE03C66C29C6C0B326D6C988F4D9FC439CDCA61B51B19
36,041,834 UART: [art] PUB.Y = 85E0E5B523F2E47DF3666C7C03971716CF0A7081DE7CF64C1E4B3B964B565D3943FE0DBA2C28035A6D4056C418A9F1EF
36,049,047 UART: [art] SIG.R = 460A76E839227C4869AD8ABD6ED4136AE5BBD67E11BA32D296F1D5B55E3CF95B678C019256EDE66198DAD9DD39DF1F5E
36,056,471 UART: [art] SIG.S = 7050614DDD0B93082DF0061B4309196C0361F8486DB3F33C2975FCFEA41E7D193C3535E3F58A36C2B8EC6C78C9840374
37,361,421 UART: Caliptra RT
37,362,120 UART: [state] CFI Enabled
37,524,317 UART: [rt] RT listening for mailbox commands...
37,526,640 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,681,971 UART: [rt]cmd =0x41544d4e, len=14344
37,683,931 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,391 writing to cptra_bootfsm_go
193,694 UART:
194,037 UART: Running Caliptra ROM ...
195,145 UART:
605,031 UART: [state] CFI Enabled
625,335 UART: [state] LifecycleState = Unprovisioned
627,219 UART: [state] DebugLocked = No
629,100 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
634,737 UART: [kat] SHA2-256
804,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
815,051 UART: [kat] ++
815,591 UART: [kat] sha1
826,281 UART: [kat] SHA2-256
829,006 UART: [kat] SHA2-384
834,296 UART: [kat] SHA2-512-ACC
836,665 UART: [kat] ECC-384
3,122,423 UART: [kat] HMAC-384Kdf
3,135,441 UART: [kat] LMS
4,325,589 UART: [kat] --
4,330,324 UART: [cold-reset] ++
4,331,769 UART: [fht] Storing FHT @ 0x50003400
4,343,143 UART: [idev] ++
4,343,709 UART: [idev] CDI.KEYID = 6
4,344,744 UART: [idev] SUBJECT.KEYID = 7
4,345,926 UART: [idev] UDS.KEYID = 0
4,347,008 ready_for_fw is high
4,347,225 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,490,222 UART: [idev] Erasing UDS.KEYID = 0
7,638,513 UART: [idev] Using Sha1 for KeyId Algorithm
7,658,871 UART: [idev] --
7,662,272 UART: [ldev] ++
7,662,845 UART: [ldev] CDI.KEYID = 6
7,663,881 UART: [ldev] SUBJECT.KEYID = 5
7,665,043 UART: [ldev] AUTHORITY.KEYID = 7
7,666,282 UART: [ldev] FE.KEYID = 1
7,679,572 UART: [ldev] Erasing FE.KEYID = 1
10,970,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,264,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,279,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,293,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,308,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,328,767 UART: [ldev] --
13,333,868 UART: [fwproc] Waiting for Commands...
13,336,177 UART: [fwproc] Received command 0x46574c44
13,338,380 UART: [fwproc] Received Image of size 113844 bytes
22,293,246 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,370,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,439,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,755,774 >>> mbox cmd response: success
22,760,408 UART: [afmc] ++
22,760,997 UART: [afmc] CDI.KEYID = 6
22,761,886 UART: [afmc] SUBJECT.KEYID = 7
22,763,159 UART: [afmc] AUTHORITY.KEYID = 5
26,077,266 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,370,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,373,111 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,387,680 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,402,436 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,416,685 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,436,895 UART: [afmc] --
28,440,891 UART: [cold-reset] --
28,443,727 UART: [state] Locking Datavault
28,449,453 UART: [state] Locking PCR0, PCR1 and PCR31
28,451,213 UART: [state] Locking ICCM
28,453,174 UART: [exit] Launching FMC @ 0x40000130
28,461,563 UART:
28,461,795 UART: Running Caliptra FMC ...
28,462,819 UART:
28,462,966 UART: [state] CFI Enabled
28,471,232 UART: [fht] FMC Alias Private Key: 7
30,801,815 UART: [art] Extend RT PCRs Done
30,803,189 UART: [art] Lock RT PCRs Done
30,804,419 UART: [art] Populate DV Done
30,809,844 UART: [fht] FMC Alias Private Key: 7
30,811,327 UART: [art] Derive CDI
30,812,065 UART: [art] Store in in slot 0x4
30,854,732 UART: [art] Derive Key Pair
30,855,738 UART: [art] Store priv key in slot 0x5
34,097,654 UART: [art] Derive Key Pair - Done
34,110,543 UART: [art] Signing Cert with AUTHO
34,111,844 UART: RITY.KEYID = 7
36,391,460 UART: [art] Erasing AUTHORITY.KEYID = 7
36,392,968 UART: [art] PUB.X = 89C0FE139F2C1B47270E6C07D0B11DF236B2B2B1F536AFB765913EF59BAD570206D3AE15BF23467A6DB19A67CE5E17F9
36,400,224 UART: [art] PUB.Y = F9E97A3B7D62CEC8A5C2B8C0458178CC47371D18EA9F097A6021C15E354D4805F29FCC09A2DBB2395918F0DD1B97EB58
36,407,450 UART: [art] SIG.R = B409E85650DF42F7FDC2096878FF91C5D522FC0D340FD538EA813E4977F64B8A5DEA237F8B5C02812A4D956B4A192904
36,414,861 UART: [art] SIG.S = 29E077BD9B48018BBA88101B00FCD767800905085A4AA4232AEB8E07B607DDF9D5043268808A8262CD67588B0A502E26
37,720,437 UART: Caliptra RT
37,721,148 UART: [state] CFI Enabled
37,838,170 UART: [rt] RT listening for mailbox commands...
37,840,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,995,871 UART: [rt]cmd =0x41544d4e, len=14344
37,997,728 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
4,129,167 ready_for_fw is high
4,129,550 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,176,915 >>> mbox cmd response: success
27,818,135 UART:
27,818,543 UART: Running Caliptra FMC ...
27,819,673 UART:
27,819,835 UART: [state] CFI Enabled
27,827,708 UART: [fht] FMC Alias Private Key: 7
30,158,860 UART: [art] Extend RT PCRs Done
30,160,109 UART: [art] Lock RT PCRs Done
30,161,790 UART: [art] Populate DV Done
30,167,307 UART: [fht] FMC Alias Private Key: 7
30,168,827 UART: [art] Derive CDI
30,169,594 UART: [art] Store in in slot 0x4
30,212,413 UART: [art] Derive Key Pair
30,213,458 UART: [art] Store priv key in slot 0x5
33,454,899 UART: [art] Derive Key Pair - Done
33,467,745 UART: [art] Signing Cert with AUTHO
33,469,048 UART: RITY.KEYID = 7
35,748,354 UART: [art] Erasing AUTHORITY.KEYID = 7
35,749,863 UART: [art] PUB.X = 22D5E0C741A3AA5477F1403A2394E0AD96D23C6A3F177E4A37FD59DF22CE0C9C4D35AEB5612E8A6089D39633BD69442F
35,757,121 UART: [art] PUB.Y = AABE69D0830071A7EB9A28ACF8558D4C4A693C5F2F80829071586A604F186A87C2F8C7B5A6DB54024DBC548D1967F6BA
35,764,356 UART: [art] SIG.R = 89553F3FF10F953CC5732A970DA052E8393ED344028991EFE0BBEBFDF390C8A988DB2CF7E43D75A75CDC6DB3B579BE96
35,771,761 UART: [art] SIG.S = 09F7BCB33CA66942D643B9A81359A13BB64373BD1DD3D39156898BECC8603D20F3503C2C282B19C57CD7D1B8D6526069
37,076,459 UART: Caliptra RT
37,077,167 UART: [state] CFI Enabled
37,194,791 UART: [rt] RT listening for mailbox commands...
37,197,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,352,588 UART: [rt]cmd =0x41544d4e, len=14344
37,354,289 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,009 UART:
192,377 UART: Running Caliptra ROM ...
193,583 UART:
193,742 UART: [state] CFI Enabled
264,742 UART: [state] LifecycleState = Unprovisioned
266,603 UART: [state] DebugLocked = No
268,274 UART: [state] WD Timer not started. Device not locked for debugging
271,970 UART: [kat] SHA2-256
451,053 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,650 UART: [kat] ++
463,120 UART: [kat] sha1
474,347 UART: [kat] SHA2-256
477,356 UART: [kat] SHA2-384
483,991 UART: [kat] SHA2-512-ACC
487,001 UART: [kat] ECC-384
2,949,573 UART: [kat] HMAC-384Kdf
2,972,404 UART: [kat] LMS
3,501,830 UART: [kat] --
3,507,460 UART: [cold-reset] ++
3,508,323 UART: [fht] FHT @ 0x50003400
3,518,877 UART: [idev] ++
3,519,449 UART: [idev] CDI.KEYID = 6
3,520,359 UART: [idev] SUBJECT.KEYID = 7
3,521,532 UART: [idev] UDS.KEYID = 0
3,522,456 ready_for_fw is high
3,522,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,381 UART: [idev] Erasing UDS.KEYID = 0
6,027,498 UART: [idev] Sha1 KeyId Algorithm
6,051,405 UART: [idev] --
6,055,226 UART: [ldev] ++
6,055,810 UART: [ldev] CDI.KEYID = 6
6,056,697 UART: [ldev] SUBJECT.KEYID = 5
6,057,911 UART: [ldev] AUTHORITY.KEYID = 7
6,059,150 UART: [ldev] FE.KEYID = 1
6,098,939 UART: [ldev] Erasing FE.KEYID = 1
8,603,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,117 UART: [ldev] --
10,414,891 UART: [fwproc] Wait for Commands...
10,416,516 UART: [fwproc] Recv command 0x46574c44
10,418,626 UART: [fwproc] Recv'd Img size: 114168 bytes
14,988,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,063,848 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,132,638 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,450,131 >>> mbox cmd response: success
15,454,821 UART: [afmc] ++
15,455,418 UART: [afmc] CDI.KEYID = 6
15,456,301 UART: [afmc] SUBJECT.KEYID = 7
15,457,518 UART: [afmc] AUTHORITY.KEYID = 5
17,996,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,723,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,725,600 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,741,579 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,757,541 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,773,277 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,796,360 UART: [afmc] --
19,799,298 UART: [cold-reset] --
19,802,360 UART: [state] Locking Datavault
19,805,882 UART: [state] Locking PCR0, PCR1 and PCR31
19,807,531 UART: [state] Locking ICCM
19,809,365 UART: [exit] Launching FMC @ 0x40000130
19,817,819 UART:
19,818,063 UART: Running Caliptra FMC ...
19,819,171 UART:
19,819,329 UART: [state] CFI Enabled
19,880,721 UART: [fht] FMC Alias Private Key: 7
21,644,417 UART: [art] Extend RT PCRs Done
21,645,632 UART: [art] Lock RT PCRs Done
21,647,296 UART: [art] Populate DV Done
21,652,875 UART: [fht] FMC Alias Private Key: 7
21,654,518 UART: [art] Derive CDI
21,655,275 UART: [art] Store in in slot 0x4
21,712,815 UART: [art] Derive Key Pair
21,713,852 UART: [art] Store priv key in slot 0x5
24,176,751 UART: [art] Derive Key Pair - Done
24,189,744 UART: [art] Signing Cert with AUTHO
24,191,236 UART: RITY.KEYID = 7
25,902,650 UART: [art] Erasing AUTHORITY.KEYID = 7
25,904,159 UART: [art] PUB.X = C379F8DA38912FFF9EC4F4ED7207C1A1DC288F0DFCD5EFE920EC16FD5A524BEBCB524A6F7B4B9C2D8C450FC13DB668FA
25,911,473 UART: [art] PUB.Y = 4DE5E31108C6270855CEE5ADF31FAB602D250EDC6601A198E421D26DCA83DB083420A89F68A6BF931A3FF1EBDAD88FED
25,918,770 UART: [art] SIG.R = 21796A18F50C747902F253835C0561BCB61BA1060F1C6A24CB57A7E7630394F48EED3B1430805A6A4ECE4B6F3D96C5BE
25,926,148 UART: [art] SIG.S = 2303B864AB066CC57326AF750056EFE99244437B8E0190DFB98926B594E5AE5DD7C924359AE3AA8636953840EDB682EF
26,905,524 UART: Caliptra RT
26,906,218 UART: [state] CFI Enabled
27,068,415 UART: [rt] RT listening for mailbox commands...
27,070,923 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,145 UART: [rt]cmd =0x41544d4e, len=14344
27,228,186 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,357,656 ready_for_fw is high
3,358,080 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,004,522 >>> mbox cmd response: success
19,299,075 UART:
19,299,492 UART: Running Caliptra FMC ...
19,300,623 UART:
19,300,789 UART: [state] CFI Enabled
19,368,254 UART: [fht] FMC Alias Private Key: 7
21,131,427 UART: [art] Extend RT PCRs Done
21,132,663 UART: [art] Lock RT PCRs Done
21,134,184 UART: [art] Populate DV Done
21,139,649 UART: [fht] FMC Alias Private Key: 7
21,141,248 UART: [art] Derive CDI
21,142,070 UART: [art] Store in in slot 0x4
21,200,927 UART: [art] Derive Key Pair
21,201,971 UART: [art] Store priv key in slot 0x5
23,664,561 UART: [art] Derive Key Pair - Done
23,677,991 UART: [art] Signing Cert with AUTHO
23,679,302 UART: RITY.KEYID = 7
25,391,375 UART: [art] Erasing AUTHORITY.KEYID = 7
25,393,007 UART: [art] PUB.X = F46F0A84CB51CFF37A384C9B2793C2004BD1FCB06198887DC10FA9EE780B5CBD3DCED7BBF023DFCE0F81AFD2421EA1E9
25,400,136 UART: [art] PUB.Y = 2A39ADEA6EF4932B95DD7407B9E78B614145D84D7EA630BBFD5D22C0E0786C596AE42D6F10D26C385A64B882138A845F
25,407,442 UART: [art] SIG.R = E43B924EAF55C60BF563C025E3B4D05467510B87CEFF91981CA5F36BEDB8F9ED83A3853FD8D4A0EEB57B64039199BC3A
25,414,833 UART: [art] SIG.S = 3DDA9777A8AE23D54C8688E420BDF4EEB4345527D3D6306578059603319897096C09B3C8AF4A7A6787A613D48E723614
26,393,289 UART: Caliptra RT
26,394,013 UART: [state] CFI Enabled
26,559,945 UART: [rt] RT listening for mailbox commands...
26,562,288 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,717,697 UART: [rt]cmd =0x41544d4e, len=14344
26,719,720 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,962 writing to cptra_bootfsm_go
193,113 UART:
193,605 UART: Running Caliptra ROM ...
194,793 UART:
604,458 UART: [state] CFI Enabled
617,842 UART: [state] LifecycleState = Unprovisioned
619,718 UART: [state] DebugLocked = No
621,191 UART: [state] WD Timer not started. Device not locked for debugging
625,374 UART: [kat] SHA2-256
804,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,091 UART: [kat] ++
816,634 UART: [kat] sha1
828,084 UART: [kat] SHA2-256
831,089 UART: [kat] SHA2-384
836,437 UART: [kat] SHA2-512-ACC
839,372 UART: [kat] ECC-384
3,281,350 UART: [kat] HMAC-384Kdf
3,293,862 UART: [kat] LMS
3,823,329 UART: [kat] --
3,828,045 UART: [cold-reset] ++
3,829,366 UART: [fht] FHT @ 0x50003400
3,839,499 UART: [idev] ++
3,840,064 UART: [idev] CDI.KEYID = 6
3,841,117 UART: [idev] SUBJECT.KEYID = 7
3,842,174 UART: [idev] UDS.KEYID = 0
3,843,165 ready_for_fw is high
3,843,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,809 UART: [idev] Erasing UDS.KEYID = 0
6,312,798 UART: [idev] Sha1 KeyId Algorithm
6,336,998 UART: [idev] --
6,340,239 UART: [ldev] ++
6,340,815 UART: [ldev] CDI.KEYID = 6
6,341,724 UART: [ldev] SUBJECT.KEYID = 5
6,342,882 UART: [ldev] AUTHORITY.KEYID = 7
6,344,164 UART: [ldev] FE.KEYID = 1
6,354,219 UART: [ldev] Erasing FE.KEYID = 1
8,827,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,262 UART: [ldev] --
10,616,387 UART: [fwproc] Wait for Commands...
10,619,073 UART: [fwproc] Recv command 0x46574c44
10,621,167 UART: [fwproc] Recv'd Img size: 114168 bytes
15,181,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,251,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,320,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,637,492 >>> mbox cmd response: success
15,641,728 UART: [afmc] ++
15,642,323 UART: [afmc] CDI.KEYID = 6
15,643,211 UART: [afmc] SUBJECT.KEYID = 7
15,644,426 UART: [afmc] AUTHORITY.KEYID = 5
18,144,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,866,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,868,770 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,884,751 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,900,730 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,916,522 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,938,587 UART: [afmc] --
19,941,866 UART: [cold-reset] --
19,946,052 UART: [state] Locking Datavault
19,952,330 UART: [state] Locking PCR0, PCR1 and PCR31
19,953,974 UART: [state] Locking ICCM
19,956,661 UART: [exit] Launching FMC @ 0x40000130
19,965,119 UART:
19,965,356 UART: Running Caliptra FMC ...
19,966,459 UART:
19,966,630 UART: [state] CFI Enabled
19,975,062 UART: [fht] FMC Alias Private Key: 7
21,731,962 UART: [art] Extend RT PCRs Done
21,733,199 UART: [art] Lock RT PCRs Done
21,735,227 UART: [art] Populate DV Done
21,740,746 UART: [fht] FMC Alias Private Key: 7
21,742,236 UART: [art] Derive CDI
21,742,972 UART: [art] Store in in slot 0x4
21,785,459 UART: [art] Derive Key Pair
21,786,499 UART: [art] Store priv key in slot 0x5
24,213,353 UART: [art] Derive Key Pair - Done
24,226,387 UART: [art] Signing Cert with AUTHO
24,227,722 UART: RITY.KEYID = 7
25,933,105 UART: [art] Erasing AUTHORITY.KEYID = 7
25,934,613 UART: [art] PUB.X = D93C75CBB282E31DE4ED45C5E9F176AD0479D3B856652EDB1DD43716E1CB64F37B7EF53ACE84C71C4016D06004A9BD2D
25,941,928 UART: [art] PUB.Y = 5002ACB3C69947BE93E182AC21164C8AA154CE6F15066B6BCD4310770DA94968D4BCC91DFD0E829AD6B118BB5ECEF07D
25,949,219 UART: [art] SIG.R = 2C643DC369D5F7B5A9AE4550C331A4FAD90949BADD137B69D7BF3439F24371151C8DF8CEA61DC7F95E969A2972A82B47
25,956,622 UART: [art] SIG.S = 9E33F06F1D446EA6E9BDD2040ABE0CC710D0303B634E61F0CD77EEA6B2A1555B1A9B8985BCBEB18C9C1ECFCF62812210
26,935,007 UART: Caliptra RT
26,935,717 UART: [state] CFI Enabled
27,052,632 UART: [rt] RT listening for mailbox commands...
27,055,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,210,345 UART: [rt]cmd =0x41544d4e, len=14344
27,212,200 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,971 writing to cptra_bootfsm_go
3,700,360 ready_for_fw is high
3,700,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,245,026 >>> mbox cmd response: success
19,491,750 UART:
19,492,142 UART: Running Caliptra FMC ...
19,493,241 UART:
19,493,432 UART: [state] CFI Enabled
19,501,280 UART: [fht] FMC Alias Private Key: 7
21,258,147 UART: [art] Extend RT PCRs Done
21,259,362 UART: [art] Lock RT PCRs Done
21,260,964 UART: [art] Populate DV Done
21,266,515 UART: [fht] FMC Alias Private Key: 7
21,268,066 UART: [art] Derive CDI
21,268,807 UART: [art] Store in in slot 0x4
21,311,399 UART: [art] Derive Key Pair
21,312,401 UART: [art] Store priv key in slot 0x5
23,739,870 UART: [art] Derive Key Pair - Done
23,752,812 UART: [art] Signing Cert with AUTHO
23,754,112 UART: RITY.KEYID = 7
25,459,339 UART: [art] Erasing AUTHORITY.KEYID = 7
25,460,842 UART: [art] PUB.X = D93775F6357105481F6999A19355F74BB3D13F7A2D8A0A35A28CE43AC536379337E6E8BFBD42C55C23784B1AE9841258
25,468,087 UART: [art] PUB.Y = 75146F6686D1A573DF03959B892E16DDD479A552B25551D9710F06D4A04819CD9C4FBAF69B7E05CBF67485183FFF3040
25,475,363 UART: [art] SIG.R = 5D07B4156131295AC97CC6C09C305D76E9E0E2BE46644AE88DC9F9CBD9028BBF1FBB0B8B1C336A71842B355CFAED6316
25,482,769 UART: [art] SIG.S = FE8C653EAFE8B3FBC1287D1D8AEED050977D122A1A71F54CBFF2D8A3948380100A2F28E24D5938863575E083E9D84FCB
26,461,549 UART: Caliptra RT
26,462,268 UART: [state] CFI Enabled
26,579,326 UART: [rt] RT listening for mailbox commands...
26,581,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,736,830 UART: [rt]cmd =0x41544d4e, len=14344
26,738,524 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,191 UART:
192,561 UART: Running Caliptra ROM ...
193,759 UART:
193,912 UART: [state] CFI Enabled
265,927 UART: [state] LifecycleState = Unprovisioned
268,275 UART: [state] DebugLocked = No
269,594 UART: [state] WD Timer not started. Device not locked for debugging
274,915 UART: [kat] SHA2-256
464,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,572 UART: [kat] ++
476,048 UART: [kat] sha1
488,562 UART: [kat] SHA2-256
491,570 UART: [kat] SHA2-384
495,930 UART: [kat] SHA2-512-ACC
498,494 UART: [kat] ECC-384
2,951,630 UART: [kat] HMAC-384Kdf
2,972,475 UART: [kat] LMS
3,504,266 UART: [kat] --
3,508,935 UART: [cold-reset] ++
3,509,892 UART: [fht] FHT @ 0x50003400
3,522,361 UART: [idev] ++
3,523,074 UART: [idev] CDI.KEYID = 6
3,524,113 UART: [idev] SUBJECT.KEYID = 7
3,525,219 UART: [idev] UDS.KEYID = 0
3,526,151 ready_for_fw is high
3,526,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,155 UART: [idev] Erasing UDS.KEYID = 0
6,029,624 UART: [idev] Sha1 KeyId Algorithm
6,051,578 UART: [idev] --
6,056,389 UART: [ldev] ++
6,057,077 UART: [ldev] CDI.KEYID = 6
6,058,018 UART: [ldev] SUBJECT.KEYID = 5
6,059,187 UART: [ldev] AUTHORITY.KEYID = 7
6,060,369 UART: [ldev] FE.KEYID = 1
6,101,963 UART: [ldev] Erasing FE.KEYID = 1
8,610,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,249 UART: [ldev] --
10,416,407 UART: [fwproc] Wait for Commands...
10,418,112 UART: [fwproc] Recv command 0x46574c44
10,420,435 UART: [fwproc] Recv'd Img size: 114168 bytes
15,014,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,101,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,217,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,759,556 >>> mbox cmd response: success
15,764,335 UART: [afmc] ++
15,765,050 UART: [afmc] CDI.KEYID = 6
15,766,251 UART: [afmc] SUBJECT.KEYID = 7
15,767,692 UART: [afmc] AUTHORITY.KEYID = 5
18,307,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,047,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,049,855 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,064,917 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,080,127 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,094,944 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,118,149 UART: [afmc] --
20,121,971 UART: [cold-reset] --
20,127,950 UART: [state] Locking Datavault
20,133,003 UART: [state] Locking PCR0, PCR1 and PCR31
20,135,170 UART: [state] Locking ICCM
20,136,910 UART: [exit] Launching FMC @ 0x40000130
20,145,548 UART:
20,145,793 UART: Running Caliptra FMC ...
20,146,898 UART:
20,147,062 UART: [state] CFI Enabled
20,206,289 UART: [fht] FMC Alias Private Key: 7
21,970,100 UART: [art] Extend RT PCRs Done
21,971,318 UART: [art] Lock RT PCRs Done
21,973,054 UART: [art] Populate DV Done
21,978,521 UART: [fht] FMC Alias Private Key: 7
21,980,169 UART: [art] Derive CDI
21,980,981 UART: [art] Store in in slot 0x4
22,039,049 UART: [art] Derive Key Pair
22,040,094 UART: [art] Store priv key in slot 0x5
24,503,572 UART: [art] Derive Key Pair - Done
24,516,187 UART: [art] Signing Cert with AUTHO
24,517,507 UART: RITY.KEYID = 7
26,229,043 UART: [art] Erasing AUTHORITY.KEYID = 7
26,230,565 UART: [art] PUB.X = 298A793C3EF20B83F77710C74BE42314E4B495EEB3DDE5909878D5092B0A7E56ABCD7DD00E3DFDEB310518585613C673
26,237,836 UART: [art] PUB.Y = D1C2B522FE79D8BA60A79577BB6E0607DD14FBEBD31D002F954E996D052806F09DFABB6636790CCF6FEF6475726D7A1F
26,245,103 UART: [art] SIG.R = E43923802322519997517497D8655B3D3E3C41F2B56244835CC7C7D0DB5CF2A14930CF4612456276D43297B4CB0EC916
26,252,419 UART: [art] SIG.S = 273BF6D1780FF61694D0BB2F78BF97C48AC258E95BED16BE04CC42BAE0494C1A339EC1DE01B8C515D713CB92E3D40648
27,231,003 UART: Caliptra RT
27,231,698 UART: [state] CFI Enabled
27,396,365 UART: [rt] RT listening for mailbox commands...
27,398,705 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,554,132 UART: [rt]cmd =0x41544d4e, len=14344
27,556,043 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,440,088 ready_for_fw is high
3,440,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,846,081 >>> mbox cmd response: success
20,152,753 UART:
20,153,157 UART: Running Caliptra FMC ...
20,154,356 UART:
20,154,529 UART: [state] CFI Enabled
20,219,982 UART: [fht] FMC Alias Private Key: 7
21,983,346 UART: [art] Extend RT PCRs Done
21,984,580 UART: [art] Lock RT PCRs Done
21,986,104 UART: [art] Populate DV Done
21,991,609 UART: [fht] FMC Alias Private Key: 7
21,993,218 UART: [art] Derive CDI
21,993,988 UART: [art] Store in in slot 0x4
22,052,436 UART: [art] Derive Key Pair
22,053,446 UART: [art] Store priv key in slot 0x5
24,516,295 UART: [art] Derive Key Pair - Done
24,529,029 UART: [art] Signing Cert with AUTHO
24,530,346 UART: RITY.KEYID = 7
26,242,024 UART: [art] Erasing AUTHORITY.KEYID = 7
26,243,548 UART: [art] PUB.X = 716DA5E2E30B227D8F9CBB8634097BB4BFDEE24AEE58B45981EB3D25E872C21FCF9A18F7820E886AB087C4633040BB63
26,250,843 UART: [art] PUB.Y = 05E93F897CD61205A2207103085F1D18C65F380CE9B57C1BFA4968DC241142084080F275789F1CCBC5CD11D5F9D39CA6
26,258,040 UART: [art] SIG.R = 96A8D1E7229E396186B6553227E1D7712F2147B9FD8CBD39A190278B8790CE9EE5D1F066BD6828EB88215B0943500E2E
26,265,429 UART: [art] SIG.S = 9587D6BA12928B0CAEB1D8ECEBBCADE9D27DBE64681505BFF840C3D5C2372A94B965EAEE52F2C441FFD8F8FBA65FB394
27,243,450 UART: Caliptra RT
27,244,162 UART: [state] CFI Enabled
27,409,487 UART: [rt] RT listening for mailbox commands...
27,411,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,567,215 UART: [rt]cmd =0x41544d4e, len=14344
27,569,238 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,562 writing to cptra_bootfsm_go
193,883 UART:
194,237 UART: Running Caliptra ROM ...
195,423 UART:
605,180 UART: [state] CFI Enabled
620,157 UART: [state] LifecycleState = Unprovisioned
622,182 UART: [state] DebugLocked = No
624,418 UART: [state] WD Timer not started. Device not locked for debugging
628,442 UART: [kat] SHA2-256
818,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,127 UART: [kat] ++
829,643 UART: [kat] sha1
842,363 UART: [kat] SHA2-256
845,372 UART: [kat] SHA2-384
851,437 UART: [kat] SHA2-512-ACC
854,013 UART: [kat] ECC-384
3,296,992 UART: [kat] HMAC-384Kdf
3,310,967 UART: [kat] LMS
3,842,783 UART: [kat] --
3,847,637 UART: [cold-reset] ++
3,850,065 UART: [fht] FHT @ 0x50003400
3,861,818 UART: [idev] ++
3,862,531 UART: [idev] CDI.KEYID = 6
3,863,452 UART: [idev] SUBJECT.KEYID = 7
3,864,697 UART: [idev] UDS.KEYID = 0
3,865,623 ready_for_fw is high
3,865,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,009,310 UART: [idev] Erasing UDS.KEYID = 0
6,338,668 UART: [idev] Sha1 KeyId Algorithm
6,362,063 UART: [idev] --
6,367,127 UART: [ldev] ++
6,367,810 UART: [ldev] CDI.KEYID = 6
6,368,718 UART: [ldev] SUBJECT.KEYID = 5
6,369,896 UART: [ldev] AUTHORITY.KEYID = 7
6,371,126 UART: [ldev] FE.KEYID = 1
6,379,935 UART: [ldev] Erasing FE.KEYID = 1
8,857,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,283 UART: [ldev] --
10,648,345 UART: [fwproc] Wait for Commands...
10,651,310 UART: [fwproc] Recv command 0x46574c44
10,653,576 UART: [fwproc] Recv'd Img size: 114168 bytes
15,287,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,365,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,481,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,023,196 >>> mbox cmd response: success
16,027,306 UART: [afmc] ++
16,028,021 UART: [afmc] CDI.KEYID = 6
16,029,222 UART: [afmc] SUBJECT.KEYID = 7
16,030,720 UART: [afmc] AUTHORITY.KEYID = 5
18,533,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,255,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,257,004 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,272,094 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,287,279 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,302,133 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,325,531 UART: [afmc] --
20,329,176 UART: [cold-reset] --
20,334,776 UART: [state] Locking Datavault
20,339,431 UART: [state] Locking PCR0, PCR1 and PCR31
20,341,621 UART: [state] Locking ICCM
20,342,696 UART: [exit] Launching FMC @ 0x40000130
20,351,388 UART:
20,351,625 UART: Running Caliptra FMC ...
20,352,725 UART:
20,352,886 UART: [state] CFI Enabled
20,361,256 UART: [fht] FMC Alias Private Key: 7
22,118,340 UART: [art] Extend RT PCRs Done
22,119,554 UART: [art] Lock RT PCRs Done
22,121,181 UART: [art] Populate DV Done
22,126,755 UART: [fht] FMC Alias Private Key: 7
22,128,414 UART: [art] Derive CDI
22,129,232 UART: [art] Store in in slot 0x4
22,171,885 UART: [art] Derive Key Pair
22,172,923 UART: [art] Store priv key in slot 0x5
24,599,610 UART: [art] Derive Key Pair - Done
24,612,384 UART: [art] Signing Cert with AUTHO
24,613,679 UART: RITY.KEYID = 7
26,319,127 UART: [art] Erasing AUTHORITY.KEYID = 7
26,320,792 UART: [art] PUB.X = BB696C63CB9101C3F20D78044B8A7C528C09FC5F2D7FAE52C156C9B07A46049E6014855E07C65948DB134E7C449DBB7C
26,327,918 UART: [art] PUB.Y = BFB5B4FF8F29B825D5521165A713EF4B8E3DBEACBE84E90C28C3528871F9BE9F77A8ADC96072B2547A8BD6FC33CBA8CF
26,335,212 UART: [art] SIG.R = 4C0EDD4D560C57B6773F71DF845691A61AD516EAA8A6BB67D9F6E5BBEDF536678968B1CC4807EC728ED7C3876A77DB6B
26,342,614 UART: [art] SIG.S = 38769CE932D1DAA10A399D2C3241A0A1718792264C2A9AED2C74FA3BF92EF19FA8539DC277742480872ED91CA53C652E
27,320,990 UART: Caliptra RT
27,321,679 UART: [state] CFI Enabled
27,439,228 UART: [rt] RT listening for mailbox commands...
27,441,853 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,597,014 UART: [rt]cmd =0x41544d4e, len=14344
27,599,029 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,748 writing to cptra_bootfsm_go
3,751,825 ready_for_fw is high
3,752,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,043,652 >>> mbox cmd response: success
20,293,964 UART:
20,294,378 UART: Running Caliptra FMC ...
20,295,569 UART:
20,295,742 UART: [state] CFI Enabled
20,303,956 UART: [fht] FMC Alias Private Key: 7
22,060,665 UART: [art] Extend RT PCRs Done
22,061,898 UART: [art] Lock RT PCRs Done
22,063,746 UART: [art] Populate DV Done
22,069,104 UART: [fht] FMC Alias Private Key: 7
22,070,760 UART: [art] Derive CDI
22,071,583 UART: [art] Store in in slot 0x4
22,113,916 UART: [art] Derive Key Pair
22,114,959 UART: [art] Store priv key in slot 0x5
24,541,397 UART: [art] Derive Key Pair - Done
24,554,190 UART: [art] Signing Cert with AUTHO
24,555,493 UART: RITY.KEYID = 7
26,260,780 UART: [art] Erasing AUTHORITY.KEYID = 7
26,262,362 UART: [art] PUB.X = 6223B5D1AC4474E395055EBC3CDE8B176B19BF754443651B34BF91175F5BEA1078E4F9A638C86E9B2A667564423E3CBA
26,269,556 UART: [art] PUB.Y = 8046E4946A4FE108BE984CD53FDCE6729B90DE87E852DD8482E862A2B4C4EAC715B56EE1175F92698107415562CA3F3C
26,276,789 UART: [art] SIG.R = 9B6679D3AFB5D352E5B7D79128D5CB5B93FD77BC61878A3B72030BE8AFA3AB9728A9BE6E7153CE7BCA89815BF44BEE44
26,284,247 UART: [art] SIG.S = C20D57FB6F6FF7E7C18ED6561E4E1809F71D14A75A7B96D0C9C4AC0B3DF54D2771A7CB0A9983E84740869A7ADE924A2E
27,262,814 UART: Caliptra RT
27,263,525 UART: [state] CFI Enabled
27,380,419 UART: [rt] RT listening for mailbox commands...
27,382,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,538,241 UART: [rt]cmd =0x41544d4e, len=14344
27,540,415 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,343 UART: [kat] SHA2-256
882,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,389 UART: [kat] ++
886,541 UART: [kat] sha1
890,849 UART: [kat] SHA2-256
892,787 UART: [kat] SHA2-384
895,396 UART: [kat] SHA2-512-ACC
897,297 UART: [kat] ECC-384
902,880 UART: [kat] HMAC-384Kdf
907,376 UART: [kat] LMS
1,475,572 UART: [kat] --
1,476,237 UART: [cold-reset] ++
1,476,719 UART: [fht] Storing FHT @ 0x50003400
1,479,390 UART: [idev] ++
1,479,558 UART: [idev] CDI.KEYID = 6
1,479,918 UART: [idev] SUBJECT.KEYID = 7
1,480,342 UART: [idev] UDS.KEYID = 0
1,480,687 ready_for_fw is high
1,480,687 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,338 UART: [idev] Erasing UDS.KEYID = 0
1,505,290 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,914 UART: [idev] --
1,514,937 UART: [ldev] ++
1,515,105 UART: [ldev] CDI.KEYID = 6
1,515,468 UART: [ldev] SUBJECT.KEYID = 5
1,515,894 UART: [ldev] AUTHORITY.KEYID = 7
1,516,357 UART: [ldev] FE.KEYID = 1
1,521,557 UART: [ldev] Erasing FE.KEYID = 1
1,546,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,314 UART: [ldev] --
1,585,645 UART: [fwproc] Waiting for Commands...
1,586,324 UART: [fwproc] Received command 0x46574c44
1,587,115 UART: [fwproc] Received Image of size 114168 bytes
5,308,011 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,336,159 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,365,511 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,501,160 >>> mbox cmd response: success
5,502,376 UART: [afmc] ++
5,502,544 UART: [afmc] CDI.KEYID = 6
5,502,906 UART: [afmc] SUBJECT.KEYID = 7
5,503,331 UART: [afmc] AUTHORITY.KEYID = 5
5,538,271 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,554,521 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,555,301 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,561,010 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,566,902 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,572,603 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,580,473 UART: [afmc] --
5,581,543 UART: [cold-reset] --
5,582,483 UART: [state] Locking Datavault
5,583,572 UART: [state] Locking PCR0, PCR1 and PCR31
5,584,176 UART: [state] Locking ICCM
5,584,792 UART: [exit] Launching FMC @ 0x40000130
5,590,121 UART:
5,590,137 UART: Running Caliptra FMC ...
5,590,545 UART:
5,590,599 UART: [state] CFI Enabled
5,601,257 UART: [fht] FMC Alias Private Key: 7
5,709,035 UART: [art] Extend RT PCRs Done
5,709,463 UART: [art] Lock RT PCRs Done
5,710,901 UART: [art] Populate DV Done
5,719,023 UART: [fht] FMC Alias Private Key: 7
5,720,051 UART: [art] Derive CDI
5,720,331 UART: [art] Store in in slot 0x4
5,806,126 UART: [art] Derive Key Pair
5,806,486 UART: [art] Store priv key in slot 0x5
5,819,868 UART: [art] Derive Key Pair - Done
5,834,480 UART: [art] Signing Cert with AUTHO
5,834,960 UART: RITY.KEYID = 7
5,850,508 UART: [art] Erasing AUTHORITY.KEYID = 7
5,851,273 UART: [art] PUB.X = AF3049C02CCADDB943F6BB347E832679417ABA27FF8A93648ADAB55850BFA832B5DC9AC5C0BAA35EF3FBFB68E4E68B26
5,858,069 UART: [art] PUB.Y = 6CFED39176D329CE65AC5761E1EF422C22FED2015CACBD2BD89A03F3AB2B47FDF62C1945318FAB8D8E1A5B5C3F59C477
5,865,035 UART: [art] SIG.R = 374904752BAD51940CFFD3EEBE4939AC7ECCF9A129D3FB42A73FB3DE7F1511DDBB04C5197E5FCA606ED9F1AAE4B5CAB4
5,871,826 UART: [art] SIG.S = 880C5DB21D2FC9EF01183B7129FFC31829DEDA28B2F5CC86EF6B16E6F8D48B628D0EFC0E6078719694825A1694AEAF7F
5,896,219 UART: Caliptra RT
5,896,472 UART: [state] CFI Enabled
6,003,683 UART: [rt] RT listening for mailbox commands...
6,004,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,589 UART: [rt]cmd =0x41544d4e, len=14344
6,128,834 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,063 ready_for_fw is high
1,362,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,237,859 >>> mbox cmd response: success
5,299,212 UART:
5,299,228 UART: Running Caliptra FMC ...
5,299,636 UART:
5,299,690 UART: [state] CFI Enabled
5,310,066 UART: [fht] FMC Alias Private Key: 7
5,418,190 UART: [art] Extend RT PCRs Done
5,418,618 UART: [art] Lock RT PCRs Done
5,420,038 UART: [art] Populate DV Done
5,428,610 UART: [fht] FMC Alias Private Key: 7
5,429,736 UART: [art] Derive CDI
5,430,016 UART: [art] Store in in slot 0x4
5,516,015 UART: [art] Derive Key Pair
5,516,375 UART: [art] Store priv key in slot 0x5
5,529,101 UART: [art] Derive Key Pair - Done
5,543,814 UART: [art] Signing Cert with AUTHO
5,544,294 UART: RITY.KEYID = 7
5,559,456 UART: [art] Erasing AUTHORITY.KEYID = 7
5,560,221 UART: [art] PUB.X = 3F239679638D1215BCEF6BC5EF24A79DD405B617B1852AB79D3F84674D6074738B0E3F6D8744C5EC8D2648C4CF068F42
5,566,984 UART: [art] PUB.Y = D4F8A1D8EC1A8EAC9FC0A50CF811F7E628B4772460CF56BDF37877324FADF642CFEAD56DF4CB8E762B6FA20D70F7FA55
5,573,954 UART: [art] SIG.R = 88ADB77BAF4B12C233B332C50A2A2ABB399184CECE18926BA26DF1A8BF2EC95843B7547E390028DD0ED4737222F36563
5,580,704 UART: [art] SIG.S = 3F50FA3AB6A6206BCEE05ED784D412A215329C4EE6DBA6330328F9B5131ED567DBD4BA0AB2F69F27376FD655C6FDE34F
5,604,747 UART: Caliptra RT
5,605,000 UART: [state] CFI Enabled
5,712,843 UART: [rt] RT listening for mailbox commands...
5,713,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,836,375 UART: [rt]cmd =0x41544d4e, len=14344
5,837,894 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,174 UART: [kat] SHA2-256
882,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,220 UART: [kat] ++
886,372 UART: [kat] sha1
890,602 UART: [kat] SHA2-256
892,540 UART: [kat] SHA2-384
895,361 UART: [kat] SHA2-512-ACC
897,262 UART: [kat] ECC-384
903,033 UART: [kat] HMAC-384Kdf
907,817 UART: [kat] LMS
1,476,013 UART: [kat] --
1,477,004 UART: [cold-reset] ++
1,477,358 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,481,396 ready_for_fw is high
1,481,396 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,091 UART: [idev] Erasing UDS.KEYID = 0
1,505,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,143 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,521,580 UART: [ldev] Erasing FE.KEYID = 1
1,547,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,199 UART: [ldev] --
1,586,518 UART: [fwproc] Waiting for Commands...
1,587,255 UART: [fwproc] Received command 0x46574c44
1,588,046 UART: [fwproc] Received Image of size 114168 bytes
5,270,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,299,097 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,328,449 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,464,092 >>> mbox cmd response: success
5,465,190 UART: [afmc] ++
5,465,358 UART: [afmc] CDI.KEYID = 6
5,465,720 UART: [afmc] SUBJECT.KEYID = 7
5,466,145 UART: [afmc] AUTHORITY.KEYID = 5
5,501,483 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,517,837 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,518,617 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,524,326 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,530,218 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,535,919 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,543,789 UART: [afmc] --
5,544,749 UART: [cold-reset] --
5,545,809 UART: [state] Locking Datavault
5,547,152 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,756 UART: [state] Locking ICCM
5,548,292 UART: [exit] Launching FMC @ 0x40000130
5,553,621 UART:
5,553,637 UART: Running Caliptra FMC ...
5,554,045 UART:
5,554,188 UART: [state] CFI Enabled
5,564,994 UART: [fht] FMC Alias Private Key: 7
5,673,082 UART: [art] Extend RT PCRs Done
5,673,510 UART: [art] Lock RT PCRs Done
5,675,298 UART: [art] Populate DV Done
5,683,272 UART: [fht] FMC Alias Private Key: 7
5,684,444 UART: [art] Derive CDI
5,684,724 UART: [art] Store in in slot 0x4
5,770,491 UART: [art] Derive Key Pair
5,770,851 UART: [art] Store priv key in slot 0x5
5,783,961 UART: [art] Derive Key Pair - Done
5,798,790 UART: [art] Signing Cert with AUTHO
5,799,270 UART: RITY.KEYID = 7
5,814,174 UART: [art] Erasing AUTHORITY.KEYID = 7
5,814,939 UART: [art] PUB.X = 55888F37FC43D246C612671D4FFE22AE98FADCBBF51F741CD5812CBC7FA0A9B9A7E2DAE7F7820BAFFDA34BB3883CBE96
5,821,734 UART: [art] PUB.Y = 63B624DA390AFCA8A6526C3AAE2172CA5B2A1C2EF5CDDD827D6798E7B534A7F5BFC68C20F7AAF760628BC556B976F586
5,828,699 UART: [art] SIG.R = 39B01100F3767DEB6EF0676EA1FA3A22D293ECACEFDC9AD7901E88458C6FFECDAD4CB259914F556D5AF3F885CFB12CFC
5,835,475 UART: [art] SIG.S = 20E92909E0EEE0AC6153A076D3B0BD36D7AA692912C7B96BEC91FF9415B74919062CF1A63BBFCB628CEB1E2EABD78C58
5,859,116 UART: Caliptra RT
5,859,461 UART: [state] CFI Enabled
5,968,117 UART: [rt] RT listening for mailbox commands...
5,968,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,945 UART: [rt]cmd =0x41544d4e, len=14344
6,093,624 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,956 ready_for_fw is high
1,362,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,047,031 >>> mbox cmd response: success
5,108,290 UART:
5,108,306 UART: Running Caliptra FMC ...
5,108,714 UART:
5,108,857 UART: [state] CFI Enabled
5,119,805 UART: [fht] FMC Alias Private Key: 7
5,227,475 UART: [art] Extend RT PCRs Done
5,227,903 UART: [art] Lock RT PCRs Done
5,229,055 UART: [art] Populate DV Done
5,237,527 UART: [fht] FMC Alias Private Key: 7
5,238,551 UART: [art] Derive CDI
5,238,831 UART: [art] Store in in slot 0x4
5,324,456 UART: [art] Derive Key Pair
5,324,816 UART: [art] Store priv key in slot 0x5
5,338,372 UART: [art] Derive Key Pair - Done
5,353,063 UART: [art] Signing Cert with AUTHO
5,353,543 UART: RITY.KEYID = 7
5,369,431 UART: [art] Erasing AUTHORITY.KEYID = 7
5,370,196 UART: [art] PUB.X = F6853B1F52A60B16912CBA662BED7553E7A33DE579F1DD878B1CAC64F8376D10A2666E070B3B45472DF817E905996D4E
5,376,958 UART: [art] PUB.Y = EBD38E6A8D067BDB2E8A4DE24B604BEB809FFCAFCA8D7158E74B8B69BE0ED1B478CDD59AC7DF55287A690F139CECF26D
5,383,931 UART: [art] SIG.R = 6B9789C95F3951C03976BAF900B077A429C63D9103690E052DD83BD8724767FF74B5FE8410440D4CB73BD0E48042B293
5,390,661 UART: [art] SIG.S = 4649B3B6D5E17FCD4B6194ECA77AF3FA147E2C38B478F357861870542BD6F96C8CADF3E6F1D2E75524E6CFE242E7A80D
5,414,663 UART: Caliptra RT
5,415,008 UART: [state] CFI Enabled
5,522,922 UART: [rt] RT listening for mailbox commands...
5,523,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,646,600 UART: [rt]cmd =0x41544d4e, len=14344
5,647,845 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
893,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,463 UART: [kat] ++
897,615 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,392 UART: [kat] SHA2-512-ACC
908,293 UART: [kat] ECC-384
917,822 UART: [kat] HMAC-384Kdf
922,384 UART: [kat] LMS
1,170,712 UART: [kat] --
1,171,719 UART: [cold-reset] ++
1,172,149 UART: [fht] FHT @ 0x50003400
1,174,676 UART: [idev] ++
1,174,844 UART: [idev] CDI.KEYID = 6
1,175,204 UART: [idev] SUBJECT.KEYID = 7
1,175,628 UART: [idev] UDS.KEYID = 0
1,175,973 ready_for_fw is high
1,175,973 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,257 UART: [idev] Sha1 KeyId Algorithm
1,208,819 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,607 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,624 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 114168 bytes
3,129,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,322,811 >>> mbox cmd response: success
3,323,977 UART: [afmc] ++
3,324,145 UART: [afmc] CDI.KEYID = 6
3,324,507 UART: [afmc] SUBJECT.KEYID = 7
3,324,932 UART: [afmc] AUTHORITY.KEYID = 5
3,360,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,153 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,382,862 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,388,754 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,394,465 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,402,260 UART: [afmc] --
3,403,154 UART: [cold-reset] --
3,403,956 UART: [state] Locking Datavault
3,405,205 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,809 UART: [state] Locking ICCM
3,406,299 UART: [exit] Launching FMC @ 0x40000130
3,411,628 UART:
3,411,644 UART: Running Caliptra FMC ...
3,412,052 UART:
3,412,106 UART: [state] CFI Enabled
3,422,542 UART: [fht] FMC Alias Private Key: 7
3,530,586 UART: [art] Extend RT PCRs Done
3,531,014 UART: [art] Lock RT PCRs Done
3,532,624 UART: [art] Populate DV Done
3,540,756 UART: [fht] FMC Alias Private Key: 7
3,541,710 UART: [art] Derive CDI
3,541,990 UART: [art] Store in in slot 0x4
3,627,843 UART: [art] Derive Key Pair
3,628,203 UART: [art] Store priv key in slot 0x5
3,641,319 UART: [art] Derive Key Pair - Done
3,656,171 UART: [art] Signing Cert with AUTHO
3,656,651 UART: RITY.KEYID = 7
3,671,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,672,698 UART: [art] PUB.X = F97300125231F787E519A984707DFE6092ADAE239A389C9ADC12D1820B062A2BCC368511137A67EF57AF004AAAEA41A0
3,679,422 UART: [art] PUB.Y = FAC819618F28276A5719FA706B1F9F886844089A58F0BA3B16ACA1FA2F74F36D601533E7237ECDB9C79E3E1B7832BE72
3,686,375 UART: [art] SIG.R = 7D8D9D1B1F2252A4C444D11647C0F386CEA01CC0639DB9C757735312C1EE500A2710143286AA5BCF168F765E19093BC2
3,693,139 UART: [art] SIG.S = E9CA98FE431D8273B8840FF8D2530D5B316A0A4F2F8A9461FB5E48C5C07B9CB7A11DB984BF37B241542F551E1ECA16B2
3,716,393 UART: Caliptra RT
3,716,646 UART: [state] CFI Enabled
3,823,110 UART: [rt] RT listening for mailbox commands...
3,823,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,946,920 UART: [rt]cmd =0x41544d4e, len=14344
3,948,635 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,403 ready_for_fw is high
1,059,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,178,247 >>> mbox cmd response: success
3,241,594 UART:
3,241,610 UART: Running Caliptra FMC ...
3,242,018 UART:
3,242,072 UART: [state] CFI Enabled
3,252,696 UART: [fht] FMC Alias Private Key: 7
3,360,738 UART: [art] Extend RT PCRs Done
3,361,166 UART: [art] Lock RT PCRs Done
3,362,632 UART: [art] Populate DV Done
3,370,970 UART: [fht] FMC Alias Private Key: 7
3,372,096 UART: [art] Derive CDI
3,372,376 UART: [art] Store in in slot 0x4
3,458,455 UART: [art] Derive Key Pair
3,458,815 UART: [art] Store priv key in slot 0x5
3,472,025 UART: [art] Derive Key Pair - Done
3,487,031 UART: [art] Signing Cert with AUTHO
3,487,511 UART: RITY.KEYID = 7
3,502,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,246 UART: [art] PUB.X = AE05C549C11ED9A319D8FECF92D414495D5587771F9AD0AF44AA331C6AE3019CA0052FE30DA9B47423069432CD89E6DE
3,510,011 UART: [art] PUB.Y = 73715152CCED8119C79F239C400C01BE7A7D407FE8EADD1CD08F111A7855FF6F567496A825D96D27718204161C24DD40
3,516,952 UART: [art] SIG.R = A6CC2CE49AE9683940DE3F7D66C3B91FCB8183DFD388B8597E68D870DBC92753837D87E74ECD4B60880C2528A4CA3E7C
3,523,731 UART: [art] SIG.S = 2BF091D3C06917B1F47471BDB04AD376A83C6D2978A575167AEE9C355DCEFC9BCDC3A7BA17F0B9B92D0B93535644565B
3,547,121 UART: Caliptra RT
3,547,374 UART: [state] CFI Enabled
3,655,708 UART: [rt] RT listening for mailbox commands...
3,656,378 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,779,586 UART: [rt]cmd =0x41544d4e, len=14344
3,781,019 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
893,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,542 UART: [kat] ++
897,694 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,513 UART: [kat] SHA2-512-ACC
908,414 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,416 UART: [cold-reset] ++
1,172,942 UART: [fht] FHT @ 0x50003400
1,175,583 UART: [idev] ++
1,175,751 UART: [idev] CDI.KEYID = 6
1,176,111 UART: [idev] SUBJECT.KEYID = 7
1,176,535 UART: [idev] UDS.KEYID = 0
1,176,880 ready_for_fw is high
1,176,880 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,469 UART: [idev] Erasing UDS.KEYID = 0
1,201,624 UART: [idev] Sha1 KeyId Algorithm
1,210,320 UART: [idev] --
1,211,288 UART: [ldev] ++
1,211,456 UART: [ldev] CDI.KEYID = 6
1,211,819 UART: [ldev] SUBJECT.KEYID = 5
1,212,245 UART: [ldev] AUTHORITY.KEYID = 7
1,212,708 UART: [ldev] FE.KEYID = 1
1,217,884 UART: [ldev] Erasing FE.KEYID = 1
1,244,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,816 UART: [ldev] --
1,284,179 UART: [fwproc] Wait for Commands...
1,284,963 UART: [fwproc] Recv command 0x46574c44
1,285,691 UART: [fwproc] Recv'd Img size: 114168 bytes
3,131,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,159,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,324,906 >>> mbox cmd response: success
3,325,958 UART: [afmc] ++
3,326,126 UART: [afmc] CDI.KEYID = 6
3,326,488 UART: [afmc] SUBJECT.KEYID = 7
3,326,913 UART: [afmc] AUTHORITY.KEYID = 5
3,362,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,640 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,385,349 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,391,241 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,952 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,815 UART: [afmc] --
3,405,737 UART: [cold-reset] --
3,406,725 UART: [state] Locking Datavault
3,407,908 UART: [state] Locking PCR0, PCR1 and PCR31
3,408,512 UART: [state] Locking ICCM
3,409,034 UART: [exit] Launching FMC @ 0x40000130
3,414,363 UART:
3,414,379 UART: Running Caliptra FMC ...
3,414,787 UART:
3,414,930 UART: [state] CFI Enabled
3,425,802 UART: [fht] FMC Alias Private Key: 7
3,534,266 UART: [art] Extend RT PCRs Done
3,534,694 UART: [art] Lock RT PCRs Done
3,536,214 UART: [art] Populate DV Done
3,544,426 UART: [fht] FMC Alias Private Key: 7
3,545,534 UART: [art] Derive CDI
3,545,814 UART: [art] Store in in slot 0x4
3,631,779 UART: [art] Derive Key Pair
3,632,139 UART: [art] Store priv key in slot 0x5
3,645,047 UART: [art] Derive Key Pair - Done
3,659,756 UART: [art] Signing Cert with AUTHO
3,660,236 UART: RITY.KEYID = 7
3,675,622 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,387 UART: [art] PUB.X = 9B414D8735C743DEB5E3BFF72904B2BDD3EA0B96F1351AEBF0C8EAE055E06180D1E4EAD8C2787EBA1A4757895FD55B26
3,683,169 UART: [art] PUB.Y = 106A080CA522C8D1AA345765EE3D1A9D0BE0652AE1EF0B8580C54B170948DEEC8A29ABBE482AE1BF61E5BC9240589E45
3,690,118 UART: [art] SIG.R = 0B9566548F6708D3BFA2BD40228BE1F58FFD92AF12E8724E6E62656486DE0B458F3974C5F9702B85CF2FF98B8A534401
3,696,878 UART: [art] SIG.S = 3E81A4453A9779A7FB5C94238BA3320046C2F249D7E7F90CED1D3F705F1AED183835C0C44D7FBD485A0183F03D82997D
3,720,983 UART: Caliptra RT
3,721,328 UART: [state] CFI Enabled
3,829,011 UART: [rt] RT listening for mailbox commands...
3,829,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,655 UART: [rt]cmd =0x41544d4e, len=14344
3,953,792 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,858 ready_for_fw is high
1,060,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,186,603 >>> mbox cmd response: success
3,250,012 UART:
3,250,028 UART: Running Caliptra FMC ...
3,250,436 UART:
3,250,579 UART: [state] CFI Enabled
3,261,013 UART: [fht] FMC Alias Private Key: 7
3,368,927 UART: [art] Extend RT PCRs Done
3,369,355 UART: [art] Lock RT PCRs Done
3,370,963 UART: [art] Populate DV Done
3,379,121 UART: [fht] FMC Alias Private Key: 7
3,380,239 UART: [art] Derive CDI
3,380,519 UART: [art] Store in in slot 0x4
3,466,212 UART: [art] Derive Key Pair
3,466,572 UART: [art] Store priv key in slot 0x5
3,479,702 UART: [art] Derive Key Pair - Done
3,494,382 UART: [art] Signing Cert with AUTHO
3,494,862 UART: RITY.KEYID = 7
3,509,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,510,569 UART: [art] PUB.X = 3788BCE4FC0720EE97ED1F2E78D76332254B4BC7A27EB6AC31B0B26017EB0DBEA3116CD45A176671466B73541A809B9F
3,517,341 UART: [art] PUB.Y = C87B9F4F1603BB393B68A5146F84748740BA1659A39BE706FC9B12A41CF6EA83B419741ABA77A98FB201473B41F85CAA
3,524,288 UART: [art] SIG.R = 8D473E94F5553742B4FCBBD8932F51EA2E0B234925D5DF4EF1A9FE160CB760EA7181A7B60E538D1992ED31A6D96AC273
3,531,059 UART: [art] SIG.S = 9F5735C680C6671553DD8EFA7C47E4E355E08762D9A93E46C5C343F5BD5AC8A97B62FB7519CF236EA525AE65C89B2104
3,555,205 UART: Caliptra RT
3,555,550 UART: [state] CFI Enabled
3,663,713 UART: [rt] RT listening for mailbox commands...
3,664,383 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,787,603 UART: [rt]cmd =0x41544d4e, len=14344
3,789,242 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,431 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,174,443 ready_for_fw is high
1,174,443 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,893 UART: [idev] Erasing UDS.KEYID = 0
1,198,533 UART: [idev] Sha1 KeyId Algorithm
1,207,509 UART: [idev] --
1,208,414 UART: [ldev] ++
1,208,582 UART: [ldev] CDI.KEYID = 6
1,208,946 UART: [ldev] SUBJECT.KEYID = 5
1,209,373 UART: [ldev] AUTHORITY.KEYID = 7
1,209,836 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,240,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,800 UART: [ldev] --
1,280,306 UART: [fwproc] Wait for Commands...
1,281,087 UART: [fwproc] Recv command 0x46574c44
1,281,820 UART: [fwproc] Recv'd Img size: 114168 bytes
3,127,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,185,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,320,910 >>> mbox cmd response: success
3,321,953 UART: [afmc] ++
3,322,121 UART: [afmc] CDI.KEYID = 6
3,322,484 UART: [afmc] SUBJECT.KEYID = 7
3,322,910 UART: [afmc] AUTHORITY.KEYID = 5
3,357,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,943 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,653 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,386,543 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,392,254 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,400,170 UART: [afmc] --
3,401,246 UART: [cold-reset] --
3,402,000 UART: [state] Locking Datavault
3,403,375 UART: [state] Locking PCR0, PCR1 and PCR31
3,403,979 UART: [state] Locking ICCM
3,404,621 UART: [exit] Launching FMC @ 0x40000130
3,409,950 UART:
3,409,966 UART: Running Caliptra FMC ...
3,410,374 UART:
3,410,428 UART: [state] CFI Enabled
3,421,172 UART: [fht] FMC Alias Private Key: 7
3,528,920 UART: [art] Extend RT PCRs Done
3,529,348 UART: [art] Lock RT PCRs Done
3,530,564 UART: [art] Populate DV Done
3,538,792 UART: [fht] FMC Alias Private Key: 7
3,539,892 UART: [art] Derive CDI
3,540,172 UART: [art] Store in in slot 0x4
3,625,035 UART: [art] Derive Key Pair
3,625,395 UART: [art] Store priv key in slot 0x5
3,638,391 UART: [art] Derive Key Pair - Done
3,653,225 UART: [art] Signing Cert with AUTHO
3,653,705 UART: RITY.KEYID = 7
3,668,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,698 UART: [art] PUB.X = ADAC0EAE7EFEA1B967035869F8E2528CEA93A8F7CF37FBFF882FC060D87C98B6BF35D864D5A461EC1C6681909EE2A11E
3,676,484 UART: [art] PUB.Y = C427372054EF7080C5D5D0B5D4D39B07B6D1F4453DDA05D6539AE3F630C0DAB3FA5BE3C9AC4BA427BB144AB48D9FEEB5
3,683,450 UART: [art] SIG.R = 7ACEC7FB4B8C98915319D7114738A9FB082E0979F988717BDBCA863A4D0334B58CD26053D29A9BF7380DFFB63163F4EC
3,690,216 UART: [art] SIG.S = 90037CE197001638A08D8DBD05ECBB6304036F9D48424A4539780803588273523B74F4E912161414238A324A3D1D0C34
3,714,010 UART: Caliptra RT
3,714,263 UART: [state] CFI Enabled
3,821,775 UART: [rt] RT listening for mailbox commands...
3,822,445 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,815 UART: [rt]cmd =0x41544d4e, len=14344
3,947,526 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,492 ready_for_fw is high
1,056,492 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,169,592 >>> mbox cmd response: success
3,231,795 UART:
3,231,811 UART: Running Caliptra FMC ...
3,232,219 UART:
3,232,273 UART: [state] CFI Enabled
3,242,711 UART: [fht] FMC Alias Private Key: 7
3,349,947 UART: [art] Extend RT PCRs Done
3,350,375 UART: [art] Lock RT PCRs Done
3,351,649 UART: [art] Populate DV Done
3,359,917 UART: [fht] FMC Alias Private Key: 7
3,361,005 UART: [art] Derive CDI
3,361,285 UART: [art] Store in in slot 0x4
3,446,798 UART: [art] Derive Key Pair
3,447,158 UART: [art] Store priv key in slot 0x5
3,460,298 UART: [art] Derive Key Pair - Done
3,475,355 UART: [art] Signing Cert with AUTHO
3,475,835 UART: RITY.KEYID = 7
3,491,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,966 UART: [art] PUB.X = C76C28E66F858849EBF9EC5324F09A8ADE239223D81354CF95F7F1CE87F0298D72B94119FBF4494A9F1D8B2185E13C09
3,498,737 UART: [art] PUB.Y = 6A108B6844B46E07BD5D55FC23EA3B23978034A16953E69F3FB56EA7CBE6931B51915476FDAE26E60C6289BCC705F44A
3,505,684 UART: [art] SIG.R = BDB4995F9CCFB332A8E85128C00B55A66E7CBC4C77808960D3E76E3395E391C135D48FC8D9C359CF5657C3954D4649D0
3,512,455 UART: [art] SIG.S = 525B09ED282862706B594306F664656A7F154BEA3E16E6F03DBE54DA80C43C0EB6951C271B5214164333A525095CFFCC
3,536,308 UART: Caliptra RT
3,536,561 UART: [state] CFI Enabled
3,643,417 UART: [rt] RT listening for mailbox commands...
3,644,087 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,767,327 UART: [rt]cmd =0x41544d4e, len=14344
3,768,672 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,749 UART: [kat] HMAC-384Kdf
920,307 UART: [kat] LMS
1,168,619 UART: [kat] --
1,169,130 UART: [cold-reset] ++
1,169,540 UART: [fht] FHT @ 0x50003400
1,172,348 UART: [idev] ++
1,172,516 UART: [idev] CDI.KEYID = 6
1,172,877 UART: [idev] SUBJECT.KEYID = 7
1,173,302 UART: [idev] UDS.KEYID = 0
1,173,648 ready_for_fw is high
1,173,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,652 UART: [idev] Erasing UDS.KEYID = 0
1,199,294 UART: [idev] Sha1 KeyId Algorithm
1,208,154 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,091 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 114168 bytes
3,119,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,147,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,176,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,311,958 >>> mbox cmd response: success
3,313,187 UART: [afmc] ++
3,313,355 UART: [afmc] CDI.KEYID = 6
3,313,718 UART: [afmc] SUBJECT.KEYID = 7
3,314,144 UART: [afmc] AUTHORITY.KEYID = 5
3,349,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,366,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,337 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,047 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,378,937 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,384,648 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,392,486 UART: [afmc] --
3,393,408 UART: [cold-reset] --
3,394,108 UART: [state] Locking Datavault
3,395,367 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,971 UART: [state] Locking ICCM
3,396,631 UART: [exit] Launching FMC @ 0x40000130
3,401,960 UART:
3,401,976 UART: Running Caliptra FMC ...
3,402,384 UART:
3,402,527 UART: [state] CFI Enabled
3,413,219 UART: [fht] FMC Alias Private Key: 7
3,521,447 UART: [art] Extend RT PCRs Done
3,521,875 UART: [art] Lock RT PCRs Done
3,523,565 UART: [art] Populate DV Done
3,531,623 UART: [fht] FMC Alias Private Key: 7
3,532,647 UART: [art] Derive CDI
3,532,927 UART: [art] Store in in slot 0x4
3,618,572 UART: [art] Derive Key Pair
3,618,932 UART: [art] Store priv key in slot 0x5
3,632,316 UART: [art] Derive Key Pair - Done
3,646,953 UART: [art] Signing Cert with AUTHO
3,647,433 UART: RITY.KEYID = 7
3,662,561 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,326 UART: [art] PUB.X = FEFDB0DA6A3EAE2D8B5A10261885565E5312AECF562FCDA9411EDD645EAEA9C16622576872E69004E8F275B506471BF0
3,670,102 UART: [art] PUB.Y = 34D08696938D41AF36F79342CC56640EFC134813662CE614E528B1098C4A8925DCE77A1381DF7B378703E8BCE3AFDD10
3,677,043 UART: [art] SIG.R = C3C75245624678FF1D8C7E7CD4F784F198D73A35F173F8DFC950BDFEB850991E8B5322E765C632F4305F0F0B08ECE4EE
3,683,814 UART: [art] SIG.S = C79DA6FF0F076542E61ACF3438FD14DB066DEF00253E25B33A2C2EE8C4F7E7F26266ED204D16832E9CB59657862EE6B1
3,707,518 UART: Caliptra RT
3,707,863 UART: [state] CFI Enabled
3,815,904 UART: [rt] RT listening for mailbox commands...
3,816,574 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,658 UART: [rt]cmd =0x41544d4e, len=14344
3,940,877 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,147 ready_for_fw is high
1,056,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,172,842 >>> mbox cmd response: success
3,234,477 UART:
3,234,493 UART: Running Caliptra FMC ...
3,234,901 UART:
3,235,044 UART: [state] CFI Enabled
3,245,692 UART: [fht] FMC Alias Private Key: 7
3,353,578 UART: [art] Extend RT PCRs Done
3,354,006 UART: [art] Lock RT PCRs Done
3,355,924 UART: [art] Populate DV Done
3,364,104 UART: [fht] FMC Alias Private Key: 7
3,365,158 UART: [art] Derive CDI
3,365,438 UART: [art] Store in in slot 0x4
3,450,965 UART: [art] Derive Key Pair
3,451,325 UART: [art] Store priv key in slot 0x5
3,464,887 UART: [art] Derive Key Pair - Done
3,479,441 UART: [art] Signing Cert with AUTHO
3,479,921 UART: RITY.KEYID = 7
3,495,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,290 UART: [art] PUB.X = 10EA6A72587D0D19180D6D52DA98ED5EB00176F9D83832E6E6FEDF47F037101BAB6F52527F24B6F75552A1F5ADAED8E9
3,503,063 UART: [art] PUB.Y = C061F922BC1E21231F1955F70F16976323B5DC4A50397D92E1317A007E1BC4EDB2D16B530F038A56ECDEF67F136D2D97
3,509,986 UART: [art] SIG.R = 9667BC5A71A3501B7404E86E10C2D8718C8D91877FA0CE670389F0496E96905C51DBC1A48333A3AE0F66B54AA8615443
3,516,743 UART: [art] SIG.S = A5A25D6EF2B14BAB61C59DE8C0E17942BEFBA1B5E3DA2E39C49372172683B83827D004A03DA37D5D14C7FCDF16B7DBCC
3,540,547 UART: Caliptra RT
3,540,892 UART: [state] CFI Enabled
3,647,531 UART: [rt] RT listening for mailbox commands...
3,648,201 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,307 UART: [rt]cmd =0x41544d4e, len=14344
3,772,870 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
192,283 UART:
192,627 UART: Running Caliptra ROM ...
193,811 UART:
193,959 UART: [state] CFI Enabled
265,031 UART: [state] LifecycleState = Unprovisioned
266,998 UART: [state] DebugLocked = No
269,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,369 UART: [kat] SHA2-256
444,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,624 UART: [kat] ++
455,109 UART: [kat] sha1
465,997 UART: [kat] SHA2-256
468,716 UART: [kat] SHA2-384
475,475 UART: [kat] SHA2-512-ACC
477,871 UART: [kat] ECC-384
2,768,559 UART: [kat] HMAC-384Kdf
2,798,837 UART: [kat] LMS
3,989,200 UART: [kat] --
3,992,493 UART: [cold-reset] ++
3,994,859 UART: [fht] Storing FHT @ 0x50003400
4,006,255 UART: [idev] ++
4,006,830 UART: [idev] CDI.KEYID = 6
4,007,815 UART: [idev] SUBJECT.KEYID = 7
4,008,988 UART: [idev] UDS.KEYID = 0
4,010,071 ready_for_fw is high
4,010,295 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,375 UART: [idev] Erasing UDS.KEYID = 0
7,345,606 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,853 UART: [idev] --
7,370,842 UART: [ldev] ++
7,371,413 UART: [ldev] CDI.KEYID = 6
7,372,368 UART: [ldev] SUBJECT.KEYID = 5
7,373,572 UART: [ldev] AUTHORITY.KEYID = 7
7,374,854 UART: [ldev] FE.KEYID = 1
7,420,650 UART: [ldev] Erasing FE.KEYID = 1
10,755,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,365 UART: [ldev] --
13,134,385 UART: [fwproc] Waiting for Commands...
13,137,604 UART: [fwproc] Received command 0x46574c44
13,139,799 UART: [fwproc] Received Image of size 113844 bytes
22,091,112 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,174,163 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,243,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,559,975 >>> mbox cmd response: success
22,563,437 UART: [afmc] ++
22,564,025 UART: [afmc] CDI.KEYID = 6
22,564,989 UART: [afmc] SUBJECT.KEYID = 7
22,566,194 UART: [afmc] AUTHORITY.KEYID = 5
25,933,931 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,232,792 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,235,045 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,249,637 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,264,371 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,278,594 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,299,970 UART: [afmc] --
28,304,502 UART: [cold-reset] --
28,308,414 UART: [state] Locking Datavault
28,313,005 UART: [state] Locking PCR0, PCR1 and PCR31
28,314,760 UART: [state] Locking ICCM
28,317,504 UART: [exit] Launching FMC @ 0x40000130
28,325,887 UART:
28,326,122 UART: Running Caliptra FMC ...
28,327,219 UART:
28,327,380 UART: [state] CFI Enabled
28,390,822 UART: [fht] FMC Alias Private Key: 7
30,728,447 UART: [art] Extend RT PCRs Done
30,729,660 UART: [art] Lock RT PCRs Done
30,731,436 UART: [art] Populate DV Done
30,736,687 UART: [fht] FMC Alias Private Key: 7
30,738,330 UART: [art] Derive CDI
30,739,136 UART: [art] Store in in slot 0x4
30,798,089 UART: [art] Derive Key Pair
30,799,125 UART: [art] Store priv key in slot 0x5
34,091,184 UART: [art] Derive Key Pair - Done
34,103,969 UART: [art] Signing Cert with AUTHO
34,105,260 UART: RITY.KEYID = 7
36,391,754 UART: [art] Erasing AUTHORITY.KEYID = 7
36,393,249 UART: [art] PUB.X = 5041085EFE85FDBD9CE6A52D0D83E0C3F9FCAE8B851DB824965FAF1F1C83F1513C017ABBEA38BA34997626088AB30779
36,400,535 UART: [art] PUB.Y = 6C19E47894878518B65E77F528F8EA741F3A175A9D183C305621F86308C3F9ACFB0F47F307C068470B0920E287853181
36,407,736 UART: [art] SIG.R = 0FCF346A875A5EE545FCD5A528F138A036CA73B042FBEC0CE55224B9306D710F80910D0873F1D9CA8F27C2020AF9AF72
36,415,105 UART: [art] SIG.S = 93062AFB01AD43BFA3711CFC5286749145D71E946A3A4318CFAA654E3B6416D8EEC79428632347FFAC08FE2104C99815
37,720,060 UART: Caliptra RT
37,720,748 UART: [state] CFI Enabled
37,881,458 UART: [rt] RT listening for mailbox commands...
37,883,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,039,060 UART: [rt]cmd =0x41544d4e, len=14344
38,044,378 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,784,181 ready_for_fw is high
3,784,567 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,978,595 >>> mbox cmd response: success
27,682,560 UART:
27,682,938 UART: Running Caliptra FMC ...
27,684,067 UART:
27,684,223 UART: [state] CFI Enabled
27,753,129 UART: [fht] FMC Alias Private Key: 7
30,091,185 UART: [art] Extend RT PCRs Done
30,092,414 UART: [art] Lock RT PCRs Done
30,094,203 UART: [art] Populate DV Done
30,099,662 UART: [fht] FMC Alias Private Key: 7
30,101,201 UART: [art] Derive CDI
30,102,007 UART: [art] Store in in slot 0x4
30,160,842 UART: [art] Derive Key Pair
30,161,881 UART: [art] Store priv key in slot 0x5
33,454,122 UART: [art] Derive Key Pair - Done
33,467,282 UART: [art] Signing Cert with AUTHO
33,468,592 UART: RITY.KEYID = 7
35,755,406 UART: [art] Erasing AUTHORITY.KEYID = 7
35,756,910 UART: [art] PUB.X = 51466BC8083EEDECCD0C703D79E1CF96291D7AF42720C0E2533E9F7EDDF4D9268EDF602148AFB5BC0624ADAE1B4AF460
35,764,188 UART: [art] PUB.Y = D845E5A3184B20B7BC37A72FE87073A1F5E4043B362C9FAC180DEAC22A00D2604FFF6CEE2B0CCBED3EF16B2237B2DE2D
35,771,423 UART: [art] SIG.R = C385764B0C1CF3DCFDAC00A5AA95A19E4EBEFC8849A77C18C2C8EC4C837375CDF993E3640532B75E3180ADCBF65C3A9D
35,778,868 UART: [art] SIG.S = D2A49379A89E78F59B9E83BE400AA9BE5FE6F3D7CF0F600F82987BBCF0DC04D22E4FA9CE977290A8FEC3EF4E3575F737
37,084,311 UART: Caliptra RT
37,085,034 UART: [state] CFI Enabled
37,245,186 UART: [rt] RT listening for mailbox commands...
37,247,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,402,813 UART: [rt]cmd =0x41544d4e, len=14344
37,407,638 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,415 UART:
192,783 UART: Running Caliptra ROM ...
193,891 UART:
603,740 UART: [state] CFI Enabled
617,330 UART: [state] LifecycleState = Unprovisioned
619,202 UART: [state] DebugLocked = No
621,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,799 UART: [kat] SHA2-256
795,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,041 UART: [kat] ++
806,500 UART: [kat] sha1
817,374 UART: [kat] SHA2-256
820,090 UART: [kat] SHA2-384
825,499 UART: [kat] SHA2-512-ACC
827,814 UART: [kat] ECC-384
3,112,635 UART: [kat] HMAC-384Kdf
3,124,436 UART: [kat] LMS
4,314,536 UART: [kat] --
4,318,545 UART: [cold-reset] ++
4,320,973 UART: [fht] Storing FHT @ 0x50003400
4,332,241 UART: [idev] ++
4,332,814 UART: [idev] CDI.KEYID = 6
4,333,776 UART: [idev] SUBJECT.KEYID = 7
4,335,050 UART: [idev] UDS.KEYID = 0
4,336,124 ready_for_fw is high
4,336,332 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,680 UART: [idev] Erasing UDS.KEYID = 0
7,621,539 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,018 UART: [idev] --
7,646,528 UART: [ldev] ++
7,647,099 UART: [ldev] CDI.KEYID = 6
7,648,040 UART: [ldev] SUBJECT.KEYID = 5
7,649,251 UART: [ldev] AUTHORITY.KEYID = 7
7,650,537 UART: [ldev] FE.KEYID = 1
7,661,701 UART: [ldev] Erasing FE.KEYID = 1
10,949,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,461 UART: [ldev] --
13,307,226 UART: [fwproc] Waiting for Commands...
13,310,513 UART: [fwproc] Received command 0x46574c44
13,312,694 UART: [fwproc] Received Image of size 113844 bytes
22,028,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,108,254 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,177,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,492,704 >>> mbox cmd response: success
22,496,872 UART: [afmc] ++
22,497,521 UART: [afmc] CDI.KEYID = 6
22,498,439 UART: [afmc] SUBJECT.KEYID = 7
22,499,683 UART: [afmc] AUTHORITY.KEYID = 5
25,808,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,103,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,105,369 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,119,931 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,134,685 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,148,867 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,170,295 UART: [afmc] --
28,173,733 UART: [cold-reset] --
28,179,008 UART: [state] Locking Datavault
28,185,286 UART: [state] Locking PCR0, PCR1 and PCR31
28,187,043 UART: [state] Locking ICCM
28,188,280 UART: [exit] Launching FMC @ 0x40000130
28,196,680 UART:
28,196,923 UART: Running Caliptra FMC ...
28,198,027 UART:
28,198,204 UART: [state] CFI Enabled
28,206,414 UART: [fht] FMC Alias Private Key: 7
30,537,404 UART: [art] Extend RT PCRs Done
30,538,615 UART: [art] Lock RT PCRs Done
30,540,453 UART: [art] Populate DV Done
30,546,084 UART: [fht] FMC Alias Private Key: 7
30,547,838 UART: [art] Derive CDI
30,548,591 UART: [art] Store in in slot 0x4
30,590,982 UART: [art] Derive Key Pair
30,592,033 UART: [art] Store priv key in slot 0x5
33,834,094 UART: [art] Derive Key Pair - Done
33,847,147 UART: [art] Signing Cert with AUTHO
33,848,451 UART: RITY.KEYID = 7
36,127,969 UART: [art] Erasing AUTHORITY.KEYID = 7
36,129,473 UART: [art] PUB.X = F0580770B9CB4236E5946E8320E928C81EE6C4B8FA41786048E20F42EDD69B5B1BB98CC0B5712E71B2E7D4B2E6944703
36,136,682 UART: [art] PUB.Y = E8E8D8773827AA73F2867963EEE576093194E555F69029E8DEEEF99FFDE4F9AB6C1DA47ACAE48AD418665573D73936FB
36,143,926 UART: [art] SIG.R = D9C75DB8CC5D4B42BD793BB977E8728C663A30CCFC9A68E373610ED6B6BEA74328E3C21285BCC645DD9905A7880548F8
36,151,295 UART: [art] SIG.S = 9B53E31E6539F52F752CD67F21C97E5D186B23C3D5D4B2A6F17A3D97BA3AECF0BB2DD2068E767A0C6CC9A768B186BEDE
37,456,623 UART: Caliptra RT
37,457,310 UART: [state] CFI Enabled
37,574,893 UART: [rt] RT listening for mailbox commands...
37,577,215 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,732,615 UART: [rt]cmd =0x41544d4e, len=14344
37,737,727 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,134,605 ready_for_fw is high
4,134,988 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,603,387 >>> mbox cmd response: success
28,241,885 UART:
28,242,291 UART: Running Caliptra FMC ...
28,243,412 UART:
28,243,577 UART: [state] CFI Enabled
28,251,582 UART: [fht] FMC Alias Private Key: 7
30,582,715 UART: [art] Extend RT PCRs Done
30,583,946 UART: [art] Lock RT PCRs Done
30,585,632 UART: [art] Populate DV Done
30,590,988 UART: [fht] FMC Alias Private Key: 7
30,592,603 UART: [art] Derive CDI
30,593,417 UART: [art] Store in in slot 0x4
30,635,970 UART: [art] Derive Key Pair
30,637,011 UART: [art] Store priv key in slot 0x5
33,879,343 UART: [art] Derive Key Pair - Done
33,892,282 UART: [art] Signing Cert with AUTHO
33,893,593 UART: RITY.KEYID = 7
36,173,078 UART: [art] Erasing AUTHORITY.KEYID = 7
36,174,589 UART: [art] PUB.X = F3651AFCE477CB4B2D32436F2FA1AC7EE16C6AC9F9D68F21E8D594FFD04F5547634453DAEF23F8320BDB8606CECACBDC
36,181,849 UART: [art] PUB.Y = 75A1E99965EE00BEBA006A9E9137A1F931CDC0F6AF1A947036ED7E282BB6A32C9E946950A8672FBA4F8F8381FBF9BB17
36,189,070 UART: [art] SIG.R = A59FDCBC7077BCB854C7866F6AEA9ADA87C10FCD36D92B441D08A86F662A4E88B2FC93C5F652B3024CADCDB2772DF7A6
36,196,532 UART: [art] SIG.S = EDD9EBDEE63DC46884244EDAF6714EB5175C66690DDBDDDB6B66A8CF00F2C0D1145FCCB49237EDFD0C8599CB497CF16D
37,501,805 UART: Caliptra RT
37,502,490 UART: [state] CFI Enabled
37,620,379 UART: [rt] RT listening for mailbox commands...
37,622,665 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,778,047 UART: [rt]cmd =0x41544d4e, len=14344
37,783,201 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,065 UART:
192,427 UART: Running Caliptra ROM ...
193,575 UART:
193,743 UART: [state] CFI Enabled
265,795 UART: [state] LifecycleState = Unprovisioned
267,716 UART: [state] DebugLocked = No
269,037 UART: [state] WD Timer not started. Device not locked for debugging
272,154 UART: [kat] SHA2-256
451,291 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,901 UART: [kat] ++
463,354 UART: [kat] sha1
474,791 UART: [kat] SHA2-256
477,796 UART: [kat] SHA2-384
483,356 UART: [kat] SHA2-512-ACC
486,289 UART: [kat] ECC-384
2,949,776 UART: [kat] HMAC-384Kdf
2,973,248 UART: [kat] LMS
3,502,722 UART: [kat] --
3,505,801 UART: [cold-reset] ++
3,507,606 UART: [fht] FHT @ 0x50003400
3,519,578 UART: [idev] ++
3,520,148 UART: [idev] CDI.KEYID = 6
3,521,061 UART: [idev] SUBJECT.KEYID = 7
3,522,239 UART: [idev] UDS.KEYID = 0
3,523,285 ready_for_fw is high
3,523,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,218 UART: [idev] Erasing UDS.KEYID = 0
6,028,183 UART: [idev] Sha1 KeyId Algorithm
6,050,767 UART: [idev] --
6,056,369 UART: [ldev] ++
6,056,954 UART: [ldev] CDI.KEYID = 6
6,057,872 UART: [ldev] SUBJECT.KEYID = 5
6,059,036 UART: [ldev] AUTHORITY.KEYID = 7
6,060,327 UART: [ldev] FE.KEYID = 1
6,100,549 UART: [ldev] Erasing FE.KEYID = 1
8,603,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,384 UART: [ldev] --
10,412,892 UART: [fwproc] Wait for Commands...
10,415,258 UART: [fwproc] Recv command 0x46574c44
10,417,349 UART: [fwproc] Recv'd Img size: 114168 bytes
14,966,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,045,724 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,114,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,431,936 >>> mbox cmd response: success
15,435,676 UART: [afmc] ++
15,436,274 UART: [afmc] CDI.KEYID = 6
15,437,189 UART: [afmc] SUBJECT.KEYID = 7
15,438,370 UART: [afmc] AUTHORITY.KEYID = 5
17,982,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,707,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,709,492 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,725,488 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,741,409 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,757,204 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,778,868 UART: [afmc] --
19,782,517 UART: [cold-reset] --
19,787,618 UART: [state] Locking Datavault
19,793,510 UART: [state] Locking PCR0, PCR1 and PCR31
19,795,215 UART: [state] Locking ICCM
19,796,287 UART: [exit] Launching FMC @ 0x40000130
19,804,687 UART:
19,804,965 UART: Running Caliptra FMC ...
19,806,079 UART:
19,806,265 UART: [state] CFI Enabled
19,863,658 UART: [fht] FMC Alias Private Key: 7
21,627,167 UART: [art] Extend RT PCRs Done
21,628,392 UART: [art] Lock RT PCRs Done
21,629,726 UART: [art] Populate DV Done
21,635,085 UART: [fht] FMC Alias Private Key: 7
21,636,621 UART: [art] Derive CDI
21,637,385 UART: [art] Store in in slot 0x4
21,696,040 UART: [art] Derive Key Pair
21,697,087 UART: [art] Store priv key in slot 0x5
24,159,675 UART: [art] Derive Key Pair - Done
24,172,297 UART: [art] Signing Cert with AUTHO
24,173,599 UART: RITY.KEYID = 7
25,885,300 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,804 UART: [art] PUB.X = 7A7192B500C33420B0B792A94055127C932C2424090FCAF3372A4351E451FC74A8BD58BEF3F64B7E109D858028B81159
25,894,003 UART: [art] PUB.Y = AA38E366C8AF6ECDE5FA9354AE465C35BCAB3B2F2057E342E06149B18A3CBFD1BB5ED28C396EC66C597E4F34368D5D0B
25,901,279 UART: [art] SIG.R = 051FC10B6EE35C8283AE90DE45082FB2D016DF991C753E6B773C6E7DA576DFD7E667F492D289E29595B57A5E0840332F
25,908,687 UART: [art] SIG.S = EB6049817B833A962C41E9F5DD264F7B4777180544099B5C9F70CBC580B05B4304A68052D9CD9F7CA4606F4AC31B097D
26,888,167 UART: Caliptra RT
26,888,860 UART: [state] CFI Enabled
27,053,630 UART: [rt] RT listening for mailbox commands...
27,056,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,211,361 UART: [rt]cmd =0x41544d4e, len=14344
27,216,627 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,360,503 ready_for_fw is high
3,360,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,045,528 >>> mbox cmd response: success
19,347,598 UART:
19,347,988 UART: Running Caliptra FMC ...
19,349,086 UART:
19,349,247 UART: [state] CFI Enabled
19,411,783 UART: [fht] FMC Alias Private Key: 7
21,175,326 UART: [art] Extend RT PCRs Done
21,176,544 UART: [art] Lock RT PCRs Done
21,178,632 UART: [art] Populate DV Done
21,184,168 UART: [fht] FMC Alias Private Key: 7
21,185,764 UART: [art] Derive CDI
21,186,576 UART: [art] Store in in slot 0x4
21,244,268 UART: [art] Derive Key Pair
21,245,307 UART: [art] Store priv key in slot 0x5
23,709,760 UART: [art] Derive Key Pair - Done
23,722,720 UART: [art] Signing Cert with AUTHO
23,724,038 UART: RITY.KEYID = 7
25,435,177 UART: [art] Erasing AUTHORITY.KEYID = 7
25,436,891 UART: [art] PUB.X = 3F6DAA1E3204073D344EB44C3792854BD68AEFF625FE1C655A032FF1996A35D1BF2AEF29CB43E776A2BC7ED988828B22
25,443,971 UART: [art] PUB.Y = 685A8B29AEFA8B6B351DF995DD91404662DB9F6EE163FBEC5B06AD164ACD715D624F1A85B0E47E79EFC1355821E21BF1
25,451,264 UART: [art] SIG.R = D0F77BC6B25012B8935DDF7328AA72F982020C36548315BFBFA57F2AF681D0848F902CA7872B51E78CDE6A30B559491E
25,458,665 UART: [art] SIG.S = 0A629D5EEA658BB4D4460595D43B507748FD08EA086CE8D49389F6E82FF914950B96C9D391AE5AB83F9E8A1C675072B9
26,437,487 UART: Caliptra RT
26,438,484 UART: [state] CFI Enabled
26,601,858 UART: [rt] RT listening for mailbox commands...
26,604,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,759,367 UART: [rt]cmd =0x41544d4e, len=14344
26,764,631 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,829 writing to cptra_bootfsm_go
193,931 UART:
194,299 UART: Running Caliptra ROM ...
195,400 UART:
605,244 UART: [state] CFI Enabled
620,181 UART: [state] LifecycleState = Unprovisioned
622,050 UART: [state] DebugLocked = No
624,426 UART: [state] WD Timer not started. Device not locked for debugging
627,385 UART: [kat] SHA2-256
806,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,070 UART: [kat] ++
818,524 UART: [kat] sha1
829,464 UART: [kat] SHA2-256
832,471 UART: [kat] SHA2-384
838,032 UART: [kat] SHA2-512-ACC
840,976 UART: [kat] ECC-384
3,281,570 UART: [kat] HMAC-384Kdf
3,293,093 UART: [kat] LMS
3,822,600 UART: [kat] --
3,828,535 UART: [cold-reset] ++
3,829,476 UART: [fht] FHT @ 0x50003400
3,840,160 UART: [idev] ++
3,840,897 UART: [idev] CDI.KEYID = 6
3,841,809 UART: [idev] SUBJECT.KEYID = 7
3,842,924 UART: [idev] UDS.KEYID = 0
3,843,857 ready_for_fw is high
3,844,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,301 UART: [idev] Erasing UDS.KEYID = 0
6,317,261 UART: [idev] Sha1 KeyId Algorithm
6,340,478 UART: [idev] --
6,345,687 UART: [ldev] ++
6,346,264 UART: [ldev] CDI.KEYID = 6
6,347,172 UART: [ldev] SUBJECT.KEYID = 5
6,348,331 UART: [ldev] AUTHORITY.KEYID = 7
6,349,561 UART: [ldev] FE.KEYID = 1
6,358,263 UART: [ldev] Erasing FE.KEYID = 1
8,831,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,012 UART: [ldev] --
10,623,159 UART: [fwproc] Wait for Commands...
10,624,657 UART: [fwproc] Recv command 0x46574c44
10,626,752 UART: [fwproc] Recv'd Img size: 114168 bytes
15,198,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,274,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,343,163 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,660,618 >>> mbox cmd response: success
15,664,052 UART: [afmc] ++
15,664,643 UART: [afmc] CDI.KEYID = 6
15,665,523 UART: [afmc] SUBJECT.KEYID = 7
15,666,734 UART: [afmc] AUTHORITY.KEYID = 5
18,165,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,884,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,886,007 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,901,963 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,917,898 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,933,727 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,956,963 UART: [afmc] --
19,961,584 UART: [cold-reset] --
19,964,365 UART: [state] Locking Datavault
19,969,942 UART: [state] Locking PCR0, PCR1 and PCR31
19,971,586 UART: [state] Locking ICCM
19,972,873 UART: [exit] Launching FMC @ 0x40000130
19,981,323 UART:
19,981,555 UART: Running Caliptra FMC ...
19,982,658 UART:
19,982,815 UART: [state] CFI Enabled
19,990,807 UART: [fht] FMC Alias Private Key: 7
21,748,076 UART: [art] Extend RT PCRs Done
21,749,302 UART: [art] Lock RT PCRs Done
21,750,928 UART: [art] Populate DV Done
21,756,499 UART: [fht] FMC Alias Private Key: 7
21,758,214 UART: [art] Derive CDI
21,759,032 UART: [art] Store in in slot 0x4
21,801,316 UART: [art] Derive Key Pair
21,802,355 UART: [art] Store priv key in slot 0x5
24,229,154 UART: [art] Derive Key Pair - Done
24,242,239 UART: [art] Signing Cert with AUTHO
24,243,571 UART: RITY.KEYID = 7
25,949,047 UART: [art] Erasing AUTHORITY.KEYID = 7
25,950,553 UART: [art] PUB.X = EC0135D4D4ECA4CDA4FC665A50347665E19135ADAA4BE11EE6CDDE4CF67996C8F7C654C5BFE388DE486F5F7EC96027EB
25,957,812 UART: [art] PUB.Y = AC4475AA7C94A35E2A040B40983654B346D23F368169AC86FE31C05F4AB600B0A1EC125B94512B9EA0C42D21D8A493CD
25,965,059 UART: [art] SIG.R = AFB300F569CD01F4D854ED5A99E6AFCB6F98EDEEA4FC183D8C5EB1C3B74C7B185B09C6D3B99A3014249690EF11773469
25,972,464 UART: [art] SIG.S = 52A738C695BE5AA834FBFDEA73FABA179946FD3158A4A871231CD3A80CC81E8A7E4CBB7BB851AF770C0A153C705ED048
26,951,058 UART: Caliptra RT
26,951,787 UART: [state] CFI Enabled
27,069,135 UART: [rt] RT listening for mailbox commands...
27,071,452 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,945 UART: [rt]cmd =0x41544d4e, len=14344
27,231,939 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,958 writing to cptra_bootfsm_go
3,707,116 ready_for_fw is high
3,707,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,270,352 >>> mbox cmd response: success
19,519,927 UART:
19,520,331 UART: Running Caliptra FMC ...
19,521,435 UART:
19,521,591 UART: [state] CFI Enabled
19,529,654 UART: [fht] FMC Alias Private Key: 7
21,286,328 UART: [art] Extend RT PCRs Done
21,287,541 UART: [art] Lock RT PCRs Done
21,289,407 UART: [art] Populate DV Done
21,294,688 UART: [fht] FMC Alias Private Key: 7
21,296,286 UART: [art] Derive CDI
21,297,101 UART: [art] Store in in slot 0x4
21,339,640 UART: [art] Derive Key Pair
21,340,643 UART: [art] Store priv key in slot 0x5
23,767,188 UART: [art] Derive Key Pair - Done
23,780,190 UART: [art] Signing Cert with AUTHO
23,781,521 UART: RITY.KEYID = 7
25,486,761 UART: [art] Erasing AUTHORITY.KEYID = 7
25,488,245 UART: [art] PUB.X = D89AF224FC9D4929E21F321D927BF24EC9D9B2E555CDA5D49C237D7579C4D69EC50F1FD1D129ED639547366EE7039EE9
25,495,546 UART: [art] PUB.Y = BF6DAD855BC46AB971850B3EAC342D9965ADC067EFB6EC28DFBB37BE64E1360D38ED4E64AD1AC9D8FE742D1F36327767
25,502,807 UART: [art] SIG.R = 957F913FE4267EFE8876CE14D104C50B024A188AF46B4BAD2C58A609A5977F66503590472C5DBC87B8F7F180C9FE7E35
25,510,201 UART: [art] SIG.S = 7EF7DE6E0EF6FDEABA0AF97087A1965FF309150D201E9806611B23D0F53F753D3F701B4C3889E0EBD6652D6D31829B95
26,489,068 UART: Caliptra RT
26,489,779 UART: [state] CFI Enabled
26,606,627 UART: [rt] RT listening for mailbox commands...
26,608,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,764,184 UART: [rt]cmd =0x41544d4e, len=14344
26,769,224 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,310 UART:
192,675 UART: Running Caliptra ROM ...
193,780 UART:
193,924 UART: [state] CFI Enabled
266,375 UART: [state] LifecycleState = Unprovisioned
268,799 UART: [state] DebugLocked = No
270,962 UART: [state] WD Timer not started. Device not locked for debugging
275,425 UART: [kat] SHA2-256
465,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,091 UART: [kat] ++
476,545 UART: [kat] sha1
488,200 UART: [kat] SHA2-256
491,279 UART: [kat] SHA2-384
497,343 UART: [kat] SHA2-512-ACC
499,931 UART: [kat] ECC-384
2,948,009 UART: [kat] HMAC-384Kdf
2,969,843 UART: [kat] LMS
3,501,647 UART: [kat] --
3,506,946 UART: [cold-reset] ++
3,509,524 UART: [fht] FHT @ 0x50003400
3,520,857 UART: [idev] ++
3,521,499 UART: [idev] CDI.KEYID = 6
3,522,530 UART: [idev] SUBJECT.KEYID = 7
3,523,708 UART: [idev] UDS.KEYID = 0
3,524,636 ready_for_fw is high
3,524,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,434 UART: [idev] Erasing UDS.KEYID = 0
6,024,899 UART: [idev] Sha1 KeyId Algorithm
6,047,166 UART: [idev] --
6,053,278 UART: [ldev] ++
6,053,970 UART: [ldev] CDI.KEYID = 6
6,055,065 UART: [ldev] SUBJECT.KEYID = 5
6,056,184 UART: [ldev] AUTHORITY.KEYID = 7
6,057,365 UART: [ldev] FE.KEYID = 1
6,098,353 UART: [ldev] Erasing FE.KEYID = 1
8,605,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,418 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,051 UART: [ldev] --
10,410,379 UART: [fwproc] Wait for Commands...
10,412,583 UART: [fwproc] Recv command 0x46574c44
10,414,899 UART: [fwproc] Recv'd Img size: 114168 bytes
15,051,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,132,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,249,010 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,791,137 >>> mbox cmd response: success
15,794,716 UART: [afmc] ++
15,795,431 UART: [afmc] CDI.KEYID = 6
15,796,623 UART: [afmc] SUBJECT.KEYID = 7
15,798,122 UART: [afmc] AUTHORITY.KEYID = 5
18,340,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,063,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,065,643 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,080,699 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,095,908 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,110,740 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,134,785 UART: [afmc] --
20,137,892 UART: [cold-reset] --
20,141,224 UART: [state] Locking Datavault
20,146,937 UART: [state] Locking PCR0, PCR1 and PCR31
20,149,110 UART: [state] Locking ICCM
20,150,421 UART: [exit] Launching FMC @ 0x40000130
20,159,063 UART:
20,159,301 UART: Running Caliptra FMC ...
20,160,405 UART:
20,160,566 UART: [state] CFI Enabled
20,221,034 UART: [fht] FMC Alias Private Key: 7
21,984,623 UART: [art] Extend RT PCRs Done
21,985,837 UART: [art] Lock RT PCRs Done
21,987,250 UART: [art] Populate DV Done
21,992,390 UART: [fht] FMC Alias Private Key: 7
21,994,044 UART: [art] Derive CDI
21,994,861 UART: [art] Store in in slot 0x4
22,053,948 UART: [art] Derive Key Pair
22,054,955 UART: [art] Store priv key in slot 0x5
24,518,015 UART: [art] Derive Key Pair - Done
24,530,791 UART: [art] Signing Cert with AUTHO
24,532,121 UART: RITY.KEYID = 7
26,244,149 UART: [art] Erasing AUTHORITY.KEYID = 7
26,245,659 UART: [art] PUB.X = E03122BD75247C99BA9AFEB2D63FCFF4BAB670EBC41546B586F101AE08B83D6514AC94D68B80AC0FC403120DC74F0C5E
26,252,933 UART: [art] PUB.Y = 67B7B2361DAC00990B9BE6653D484F114A0367C40DD61F04D504D63CFE193C714F5A3EE327CB7B6BE39D38C33CAB0BFB
26,260,187 UART: [art] SIG.R = FD6A98D598F5A3214362681ECA4720C6020B6DA542034C65F3A5FF6F68D261FBAC93E3FD2375E2EBD6DC5AEC7A91AEFD
26,267,563 UART: [art] SIG.S = 8FC24B4FB9C7C9C178F79452D95A5AF7800F1B4F6ED46E4D3E7D5E459C0B4F7CA4126677DA65BF32179BDD9A9DA8F355
27,246,459 UART: Caliptra RT
27,247,146 UART: [state] CFI Enabled
27,412,476 UART: [rt] RT listening for mailbox commands...
27,414,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,570,155 UART: [rt]cmd =0x41544d4e, len=14344
27,575,261 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,440,005 ready_for_fw is high
3,440,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,847,321 >>> mbox cmd response: success
20,133,228 UART:
20,133,623 UART: Running Caliptra FMC ...
20,134,826 UART:
20,134,999 UART: [state] CFI Enabled
20,203,296 UART: [fht] FMC Alias Private Key: 7
21,967,448 UART: [art] Extend RT PCRs Done
21,968,695 UART: [art] Lock RT PCRs Done
21,970,654 UART: [art] Populate DV Done
21,976,220 UART: [fht] FMC Alias Private Key: 7
21,977,869 UART: [art] Derive CDI
21,978,685 UART: [art] Store in in slot 0x4
22,036,057 UART: [art] Derive Key Pair
22,037,107 UART: [art] Store priv key in slot 0x5
24,499,753 UART: [art] Derive Key Pair - Done
24,512,931 UART: [art] Signing Cert with AUTHO
24,514,248 UART: RITY.KEYID = 7
26,225,925 UART: [art] Erasing AUTHORITY.KEYID = 7
26,227,417 UART: [art] PUB.X = 00A3686B424D90EED578EEF44D2C865B6471C5B6AEBBF18D5A28A8B3D8779DDB21D50C069D4CA5C72063AA3569B01EDB
26,234,705 UART: [art] PUB.Y = 212B99B3007C20F8DA412132AFD6A63A76CDFACA5B2F980F84CFBB38F5C648FEC0F107612B85939C89FD2BF8D5E338A5
26,241,944 UART: [art] SIG.R = EB4963D9493EF420E7C2B869CB1A81881EC8F56D17641816641EEBE7DE6D0FABE861D7DB08274FA2A16DA16E0C630AB3
26,249,464 UART: [art] SIG.S = 038DAA1413D716078A1112F990E822DBEF9E52F7EDD61E2D6C35CE73F238502B9784BD824AAED033B572D394F340DDBB
27,228,892 UART: Caliptra RT
27,229,628 UART: [state] CFI Enabled
27,395,642 UART: [rt] RT listening for mailbox commands...
27,397,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,553,083 UART: [rt]cmd =0x41544d4e, len=14344
27,557,808 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,752 writing to cptra_bootfsm_go
192,831 UART:
193,192 UART: Running Caliptra ROM ...
194,305 UART:
604,246 UART: [state] CFI Enabled
615,155 UART: [state] LifecycleState = Unprovisioned
617,530 UART: [state] DebugLocked = No
620,054 UART: [state] WD Timer not started. Device not locked for debugging
625,147 UART: [kat] SHA2-256
815,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,845 UART: [kat] ++
826,345 UART: [kat] sha1
837,580 UART: [kat] SHA2-256
840,594 UART: [kat] SHA2-384
846,589 UART: [kat] SHA2-512-ACC
849,169 UART: [kat] ECC-384
3,290,349 UART: [kat] HMAC-384Kdf
3,303,300 UART: [kat] LMS
3,835,139 UART: [kat] --
3,838,185 UART: [cold-reset] ++
3,839,979 UART: [fht] FHT @ 0x50003400
3,851,596 UART: [idev] ++
3,852,301 UART: [idev] CDI.KEYID = 6
3,853,186 UART: [idev] SUBJECT.KEYID = 7
3,854,431 UART: [idev] UDS.KEYID = 0
3,855,336 ready_for_fw is high
3,855,525 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,901 UART: [idev] Erasing UDS.KEYID = 0
6,331,743 UART: [idev] Sha1 KeyId Algorithm
6,354,332 UART: [idev] --
6,359,413 UART: [ldev] ++
6,360,097 UART: [ldev] CDI.KEYID = 6
6,361,015 UART: [ldev] SUBJECT.KEYID = 5
6,362,176 UART: [ldev] AUTHORITY.KEYID = 7
6,363,409 UART: [ldev] FE.KEYID = 1
6,375,587 UART: [ldev] Erasing FE.KEYID = 1
8,852,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,823 UART: [ldev] --
10,644,957 UART: [fwproc] Wait for Commands...
10,648,125 UART: [fwproc] Recv command 0x46574c44
10,650,437 UART: [fwproc] Recv'd Img size: 114168 bytes
15,277,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,359,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,475,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,017,533 >>> mbox cmd response: success
16,021,811 UART: [afmc] ++
16,022,524 UART: [afmc] CDI.KEYID = 6
16,023,742 UART: [afmc] SUBJECT.KEYID = 7
16,025,110 UART: [afmc] AUTHORITY.KEYID = 5
18,532,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,254,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,256,546 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,271,660 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,286,824 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,301,667 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,326,352 UART: [afmc] --
20,329,202 UART: [cold-reset] --
20,333,555 UART: [state] Locking Datavault
20,339,996 UART: [state] Locking PCR0, PCR1 and PCR31
20,342,200 UART: [state] Locking ICCM
20,344,437 UART: [exit] Launching FMC @ 0x40000130
20,353,055 UART:
20,353,293 UART: Running Caliptra FMC ...
20,354,338 UART:
20,354,490 UART: [state] CFI Enabled
20,362,975 UART: [fht] FMC Alias Private Key: 7
22,119,792 UART: [art] Extend RT PCRs Done
22,120,997 UART: [art] Lock RT PCRs Done
22,122,809 UART: [art] Populate DV Done
22,128,277 UART: [fht] FMC Alias Private Key: 7
22,129,976 UART: [art] Derive CDI
22,130,791 UART: [art] Store in in slot 0x4
22,173,062 UART: [art] Derive Key Pair
22,174,101 UART: [art] Store priv key in slot 0x5
24,600,949 UART: [art] Derive Key Pair - Done
24,613,950 UART: [art] Signing Cert with AUTHO
24,615,256 UART: RITY.KEYID = 7
26,320,531 UART: [art] Erasing AUTHORITY.KEYID = 7
26,322,021 UART: [art] PUB.X = 3B4FEB405A0DCF6B1CE1A5974C260DA5CD988E11031916189D7AC54CDE7B99EA62AA93DDA72123FF6DDF429F7DB16611
26,329,338 UART: [art] PUB.Y = 7FED1FC1079FF4D853500985AC1E311DE0C2C52C216B7C2AF989D43AE32439D4E778FD1FF262BDF04F898F6EF2A2919C
26,336,585 UART: [art] SIG.R = 8FC1C4702889A6FE716B85A6FAF72777049AC8282957996B2E2ADB1FBB1A4414073F3742ACFF972E525578BB472CF536
26,343,981 UART: [art] SIG.S = D6B12224E6BCC4A9722D575FBFE526B8160645E2B9966C4F7CCB1B3DE76C2F59D62AE219F299EF95FAFC85FDA76B8ACA
27,322,850 UART: Caliptra RT
27,323,561 UART: [state] CFI Enabled
27,439,980 UART: [rt] RT listening for mailbox commands...
27,442,285 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,597,437 UART: [rt]cmd =0x41544d4e, len=14344
27,602,643 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,869 writing to cptra_bootfsm_go
3,753,211 ready_for_fw is high
3,753,696 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,044,615 >>> mbox cmd response: success
20,297,578 UART:
20,297,961 UART: Running Caliptra FMC ...
20,299,091 UART:
20,299,258 UART: [state] CFI Enabled
20,307,042 UART: [fht] FMC Alias Private Key: 7
22,063,024 UART: [art] Extend RT PCRs Done
22,064,248 UART: [art] Lock RT PCRs Done
22,066,038 UART: [art] Populate DV Done
22,071,291 UART: [fht] FMC Alias Private Key: 7
22,072,993 UART: [art] Derive CDI
22,073,814 UART: [art] Store in in slot 0x4
22,116,258 UART: [art] Derive Key Pair
22,117,264 UART: [art] Store priv key in slot 0x5
24,543,538 UART: [art] Derive Key Pair - Done
24,556,814 UART: [art] Signing Cert with AUTHO
24,558,124 UART: RITY.KEYID = 7
26,263,222 UART: [art] Erasing AUTHORITY.KEYID = 7
26,264,727 UART: [art] PUB.X = 6A271D3887578CAC01EFFE2E18784B0624FFB9550F10070BB702761E59384BB6E80C83E35D0E5A4734C3ABC526F420AA
26,271,970 UART: [art] PUB.Y = 3A426185BAF7122386F1809ACD3B16A46239FA0EE4351A04DF8327AA80D250AE3FCEC78D2435904C976252A562C6D9D3
26,279,235 UART: [art] SIG.R = 85CB9DAF9D66060B364FDC333BF0AEDBFD9EACAFDBDE1D13B1C5083185BA3537A410FEB53C9EBED4C35C6CF8E16C989A
26,286,817 UART: [art] SIG.S = 4F2082124B6D783400A7BA34880A4EB3EECC211768929E9660B022288D2DCB750D0CAEA54C3FD7A8333D03CD539F92E0
27,265,459 UART: Caliptra RT
27,266,172 UART: [state] CFI Enabled
27,383,729 UART: [rt] RT listening for mailbox commands...
27,386,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,541,438 UART: [rt]cmd =0x41544d4e, len=14344
27,546,540 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,650 UART: [state] LifecycleState = Unprovisioned
86,305 UART: [state] DebugLocked = No
86,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,343 UART: [kat] SHA2-256
882,274 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,389 UART: [kat] ++
886,541 UART: [kat] sha1
890,721 UART: [kat] SHA2-256
892,659 UART: [kat] SHA2-384
895,542 UART: [kat] SHA2-512-ACC
897,443 UART: [kat] ECC-384
902,938 UART: [kat] HMAC-384Kdf
907,364 UART: [kat] LMS
1,475,560 UART: [kat] --
1,476,529 UART: [cold-reset] ++
1,477,099 UART: [fht] Storing FHT @ 0x50003400
1,480,046 UART: [idev] ++
1,480,214 UART: [idev] CDI.KEYID = 6
1,480,574 UART: [idev] SUBJECT.KEYID = 7
1,480,998 UART: [idev] UDS.KEYID = 0
1,481,343 ready_for_fw is high
1,481,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,862 UART: [idev] Erasing UDS.KEYID = 0
1,505,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,474 UART: [idev] --
1,515,711 UART: [ldev] ++
1,515,879 UART: [ldev] CDI.KEYID = 6
1,516,242 UART: [ldev] SUBJECT.KEYID = 5
1,516,668 UART: [ldev] AUTHORITY.KEYID = 7
1,517,131 UART: [ldev] FE.KEYID = 1
1,522,309 UART: [ldev] Erasing FE.KEYID = 1
1,547,482 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,724 UART: [ldev] --
1,587,205 UART: [fwproc] Waiting for Commands...
1,588,046 UART: [fwproc] Received command 0x46574c44
1,588,837 UART: [fwproc] Received Image of size 114168 bytes
5,271,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,299,218 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,328,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,464,239 >>> mbox cmd response: success
5,465,287 UART: [afmc] ++
5,465,455 UART: [afmc] CDI.KEYID = 6
5,465,817 UART: [afmc] SUBJECT.KEYID = 7
5,466,242 UART: [afmc] AUTHORITY.KEYID = 5
5,501,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,517,746 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,518,526 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,524,235 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,530,127 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,535,828 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,543,874 UART: [afmc] --
5,544,898 UART: [cold-reset] --
5,545,802 UART: [state] Locking Datavault
5,546,869 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,473 UART: [state] Locking ICCM
5,547,999 UART: [exit] Launching FMC @ 0x40000130
5,553,328 UART:
5,553,344 UART: Running Caliptra FMC ...
5,553,752 UART:
5,553,806 UART: [state] CFI Enabled
5,564,458 UART: [fht] FMC Alias Private Key: 7
5,672,152 UART: [art] Extend RT PCRs Done
5,672,580 UART: [art] Lock RT PCRs Done
5,674,394 UART: [art] Populate DV Done
5,682,688 UART: [fht] FMC Alias Private Key: 7
5,683,842 UART: [art] Derive CDI
5,684,122 UART: [art] Store in in slot 0x4
5,769,371 UART: [art] Derive Key Pair
5,769,731 UART: [art] Store priv key in slot 0x5
5,783,521 UART: [art] Derive Key Pair - Done
5,798,155 UART: [art] Signing Cert with AUTHO
5,798,635 UART: RITY.KEYID = 7
5,813,899 UART: [art] Erasing AUTHORITY.KEYID = 7
5,814,664 UART: [art] PUB.X = 3ACC294B7C346A6E27B41F6C8040EE7024BD043B2C367225D543AD759AD08D565205674DA5E05C69CEA7CBEB18D72650
5,821,434 UART: [art] PUB.Y = 5910B37896203668A557FCA197C0DC1DEB6801C26E593EE254097079CA59764CC1DF28A77E770BD8664AAC8652CC5F6A
5,828,377 UART: [art] SIG.R = 2883E84C5C73C4FE5A91590934053AF87DC48A9C317D94C02AA17B48CA1E87DE0495E467F3569798A857745AD16CE0CE
5,835,140 UART: [art] SIG.S = D1B045F03A32C2962209FDC3149F2E1B72863F68B57A4BABB1D2E8888438DCCAAB6FFEAD0DE9638EA49342B9B19ED0A6
5,859,465 UART: Caliptra RT
5,859,718 UART: [state] CFI Enabled
5,968,119 UART: [rt] RT listening for mailbox commands...
5,968,789 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,655 UART: [rt]cmd =0x41544d4e, len=14344
6,097,950 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,155 ready_for_fw is high
1,362,155 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,273,798 >>> mbox cmd response: success
5,335,721 UART:
5,335,737 UART: Running Caliptra FMC ...
5,336,145 UART:
5,336,199 UART: [state] CFI Enabled
5,346,405 UART: [fht] FMC Alias Private Key: 7
5,453,693 UART: [art] Extend RT PCRs Done
5,454,121 UART: [art] Lock RT PCRs Done
5,456,093 UART: [art] Populate DV Done
5,464,581 UART: [fht] FMC Alias Private Key: 7
5,465,533 UART: [art] Derive CDI
5,465,813 UART: [art] Store in in slot 0x4
5,551,414 UART: [art] Derive Key Pair
5,551,774 UART: [art] Store priv key in slot 0x5
5,564,728 UART: [art] Derive Key Pair - Done
5,579,738 UART: [art] Signing Cert with AUTHO
5,580,218 UART: RITY.KEYID = 7
5,595,366 UART: [art] Erasing AUTHORITY.KEYID = 7
5,596,131 UART: [art] PUB.X = 90758109FC20E5A70AA5D3ECDCC1363B71D8D2B52974506F390A69251BEEE79C0543DA81576599E1343623DBBAB14D9F
5,602,893 UART: [art] PUB.Y = 28EDC7CC03BCB906025CD5F9826C98C829B0D3405F66920F2262D35E616132C740A95991E36B88BD39091E8CED5C9A1A
5,609,830 UART: [art] SIG.R = CB47EBD9A8F0626A2E0EBFAF96DEA378ABD5D124108C5ED52FD7D656E5268EA7537D8BF11A3C5D0E4C5B78FC7B06F22E
5,616,617 UART: [art] SIG.S = F39CB78D2FF88EA7D9100DC336960C64F886131D10468D8C68947437FBCEE8E3D313D2F74C00EF173081F727EA9C89FA
5,640,724 UART: Caliptra RT
5,640,977 UART: [state] CFI Enabled
5,749,123 UART: [rt] RT listening for mailbox commands...
5,749,793 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,873,071 UART: [rt]cmd =0x41544d4e, len=14344
5,879,164 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,488 UART: [kat] SHA2-256
882,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,534 UART: [kat] ++
886,686 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
902,929 UART: [kat] HMAC-384Kdf
907,629 UART: [kat] LMS
1,475,825 UART: [kat] --
1,476,878 UART: [cold-reset] ++
1,477,318 UART: [fht] Storing FHT @ 0x50003400
1,479,955 UART: [idev] ++
1,480,123 UART: [idev] CDI.KEYID = 6
1,480,483 UART: [idev] SUBJECT.KEYID = 7
1,480,907 UART: [idev] UDS.KEYID = 0
1,481,252 ready_for_fw is high
1,481,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,789 UART: [idev] Erasing UDS.KEYID = 0
1,505,115 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,753 UART: [idev] --
1,514,896 UART: [ldev] ++
1,515,064 UART: [ldev] CDI.KEYID = 6
1,515,427 UART: [ldev] SUBJECT.KEYID = 5
1,515,853 UART: [ldev] AUTHORITY.KEYID = 7
1,516,316 UART: [ldev] FE.KEYID = 1
1,521,552 UART: [ldev] Erasing FE.KEYID = 1
1,546,917 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,483 UART: [ldev] --
1,585,974 UART: [fwproc] Waiting for Commands...
1,586,839 UART: [fwproc] Received command 0x46574c44
1,587,630 UART: [fwproc] Received Image of size 114168 bytes
5,043,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,072,233 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,101,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,237,096 >>> mbox cmd response: success
5,238,284 UART: [afmc] ++
5,238,452 UART: [afmc] CDI.KEYID = 6
5,238,814 UART: [afmc] SUBJECT.KEYID = 7
5,239,239 UART: [afmc] AUTHORITY.KEYID = 5
5,274,117 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,290,029 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,290,809 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,296,518 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,302,410 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,308,111 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,315,983 UART: [afmc] --
5,317,091 UART: [cold-reset] --
5,318,237 UART: [state] Locking Datavault
5,319,556 UART: [state] Locking PCR0, PCR1 and PCR31
5,320,160 UART: [state] Locking ICCM
5,320,658 UART: [exit] Launching FMC @ 0x40000130
5,325,987 UART:
5,326,003 UART: Running Caliptra FMC ...
5,326,411 UART:
5,326,554 UART: [state] CFI Enabled
5,336,986 UART: [fht] FMC Alias Private Key: 7
5,444,084 UART: [art] Extend RT PCRs Done
5,444,512 UART: [art] Lock RT PCRs Done
5,446,130 UART: [art] Populate DV Done
5,454,434 UART: [fht] FMC Alias Private Key: 7
5,455,508 UART: [art] Derive CDI
5,455,788 UART: [art] Store in in slot 0x4
5,541,715 UART: [art] Derive Key Pair
5,542,075 UART: [art] Store priv key in slot 0x5
5,554,873 UART: [art] Derive Key Pair - Done
5,569,443 UART: [art] Signing Cert with AUTHO
5,569,923 UART: RITY.KEYID = 7
5,585,279 UART: [art] Erasing AUTHORITY.KEYID = 7
5,586,044 UART: [art] PUB.X = 0B19722A371B1432B7617B74A1CF93D27AE6564A73F0B88632822BC1798A2C70C42C2DA8745518F28DDE07395B860539
5,592,797 UART: [art] PUB.Y = 276A65D1881EC0EAEA2F111D5D239E4324FC58253F325DC1DB112CA63E4589136F732C3E94FCBCFD5FA8FF1388A7FC56
5,599,761 UART: [art] SIG.R = F9C589E3EE2FD5657077279B83F82952B92DE863B1FF3FB08128B4819B7191648BD880A2DEF116300EDC3C5D69925EDB
5,606,532 UART: [art] SIG.S = BF0E4491B693796CCD59A67FCFB73E4B3738D3AD4086E75F23DA1BDBD57C4580C201656711E8DDB2F49B8BE15BCCB7A2
5,630,539 UART: Caliptra RT
5,630,884 UART: [state] CFI Enabled
5,739,542 UART: [rt] RT listening for mailbox commands...
5,740,212 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,226 UART: [rt]cmd =0x41544d4e, len=14344
5,869,339 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,838 ready_for_fw is high
1,362,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,086,746 >>> mbox cmd response: success
5,148,443 UART:
5,148,459 UART: Running Caliptra FMC ...
5,148,867 UART:
5,149,010 UART: [state] CFI Enabled
5,159,576 UART: [fht] FMC Alias Private Key: 7
5,267,526 UART: [art] Extend RT PCRs Done
5,267,954 UART: [art] Lock RT PCRs Done
5,269,396 UART: [art] Populate DV Done
5,277,610 UART: [fht] FMC Alias Private Key: 7
5,278,562 UART: [art] Derive CDI
5,278,842 UART: [art] Store in in slot 0x4
5,364,693 UART: [art] Derive Key Pair
5,365,053 UART: [art] Store priv key in slot 0x5
5,378,603 UART: [art] Derive Key Pair - Done
5,392,988 UART: [art] Signing Cert with AUTHO
5,393,468 UART: RITY.KEYID = 7
5,408,928 UART: [art] Erasing AUTHORITY.KEYID = 7
5,409,693 UART: [art] PUB.X = DE24720376A663862FD23E371A30BE451592AD16D18C20B020E0DFE16451917AE7764AF018AF805FA8CE20DEE6ADADB0
5,416,470 UART: [art] PUB.Y = 6E824C15F6E53D9AFCDAF30754A31D708D35C1831D741BF224ED5A09E1A245DEAAAFE5D4D9B0AE43773DB64BABD49327
5,423,434 UART: [art] SIG.R = 6D50DD47E5417B15CF4A5B0ECAF7F1D7BA6FC7C30E7344FD8FF2B0F5413ADBDCB9CFC981BB5C6D4AEC6A44B476BFBE87
5,430,234 UART: [art] SIG.S = 7083F4C821E5A66B6359F6555A419A2515E3E79BC5DE1C597F8247F67164F8EAC6AFEE6FF5B584F15C92D9FF36BC6EF9
5,453,731 UART: Caliptra RT
5,454,076 UART: [state] CFI Enabled
5,562,504 UART: [rt] RT listening for mailbox commands...
5,563,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,686,436 UART: [rt]cmd =0x41544d4e, len=14344
5,692,927 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,801 UART: [kat] SHA2-256
903,741 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
918,082 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,171,955 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,174,942 UART: [idev] ++
1,175,110 UART: [idev] CDI.KEYID = 6
1,175,470 UART: [idev] SUBJECT.KEYID = 7
1,175,894 UART: [idev] UDS.KEYID = 0
1,176,239 ready_for_fw is high
1,176,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,880 UART: [idev] Erasing UDS.KEYID = 0
1,201,313 UART: [idev] Sha1 KeyId Algorithm
1,209,855 UART: [idev] --
1,210,835 UART: [ldev] ++
1,211,003 UART: [ldev] CDI.KEYID = 6
1,211,366 UART: [ldev] SUBJECT.KEYID = 5
1,211,792 UART: [ldev] AUTHORITY.KEYID = 7
1,212,255 UART: [ldev] FE.KEYID = 1
1,217,567 UART: [ldev] Erasing FE.KEYID = 1
1,244,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,715 UART: [ldev] --
1,283,108 UART: [fwproc] Wait for Commands...
1,283,720 UART: [fwproc] Recv command 0x46574c44
1,284,448 UART: [fwproc] Recv'd Img size: 114168 bytes
3,114,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,728 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,308,249 >>> mbox cmd response: success
3,309,471 UART: [afmc] ++
3,309,639 UART: [afmc] CDI.KEYID = 6
3,310,001 UART: [afmc] SUBJECT.KEYID = 7
3,310,426 UART: [afmc] AUTHORITY.KEYID = 5
3,345,886 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,362,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,363,083 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,792 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,684 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,395 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,388,288 UART: [afmc] --
3,389,280 UART: [cold-reset] --
3,390,308 UART: [state] Locking Datavault
3,391,567 UART: [state] Locking PCR0, PCR1 and PCR31
3,392,171 UART: [state] Locking ICCM
3,392,719 UART: [exit] Launching FMC @ 0x40000130
3,398,048 UART:
3,398,064 UART: Running Caliptra FMC ...
3,398,472 UART:
3,398,526 UART: [state] CFI Enabled
3,409,030 UART: [fht] FMC Alias Private Key: 7
3,516,798 UART: [art] Extend RT PCRs Done
3,517,226 UART: [art] Lock RT PCRs Done
3,518,686 UART: [art] Populate DV Done
3,527,084 UART: [fht] FMC Alias Private Key: 7
3,528,216 UART: [art] Derive CDI
3,528,496 UART: [art] Store in in slot 0x4
3,614,203 UART: [art] Derive Key Pair
3,614,563 UART: [art] Store priv key in slot 0x5
3,627,933 UART: [art] Derive Key Pair - Done
3,642,709 UART: [art] Signing Cert with AUTHO
3,643,189 UART: RITY.KEYID = 7
3,658,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,112 UART: [art] PUB.X = B602ADCC60A8F40505399539A456AC72FE0BAE775BA61B969A68E479495262EF198891EEA264092B11E576E0F03CF4BA
3,665,871 UART: [art] PUB.Y = A4CF02D5C92141E248F90DF8C566E22E39227330D78154CA2D19BA63C4BCA54F01C67B69DAC50E2D200BF4D72A89F93E
3,672,816 UART: [art] SIG.R = 8ED5F3F95DFF90B30D2AD8EC36013CCD801074EFFA4E0184C508E42D00D1A4D7CE52E7CF2D4FD3FB5583C6812181BD8D
3,679,572 UART: [art] SIG.S = D83AB79F68EBA309C8949C7EB52EC7A97EB2859951FF7F8B827932F31653E84AE8D65B1307B6A1585C5BFA7DDF113437
3,703,327 UART: Caliptra RT
3,703,580 UART: [state] CFI Enabled
3,810,963 UART: [rt] RT listening for mailbox commands...
3,811,633 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,934,377 UART: [rt]cmd =0x41544d4e, len=14344
3,940,774 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,761 ready_for_fw is high
1,059,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,172,536 >>> mbox cmd response: success
3,234,207 UART:
3,234,223 UART: Running Caliptra FMC ...
3,234,631 UART:
3,234,685 UART: [state] CFI Enabled
3,245,219 UART: [fht] FMC Alias Private Key: 7
3,352,975 UART: [art] Extend RT PCRs Done
3,353,403 UART: [art] Lock RT PCRs Done
3,354,967 UART: [art] Populate DV Done
3,363,221 UART: [fht] FMC Alias Private Key: 7
3,364,351 UART: [art] Derive CDI
3,364,631 UART: [art] Store in in slot 0x4
3,450,178 UART: [art] Derive Key Pair
3,450,538 UART: [art] Store priv key in slot 0x5
3,463,094 UART: [art] Derive Key Pair - Done
3,477,974 UART: [art] Signing Cert with AUTHO
3,478,454 UART: RITY.KEYID = 7
3,493,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,273 UART: [art] PUB.X = 4C0BA509C32965815A3C4BB25CE8646DB81CBCF71DF52B07F7DC5F2E578F080D003442A84D64BD57C025443D92EC7578
3,501,012 UART: [art] PUB.Y = 74AC22340DF52E5DF3A2F4EB969FC6F59C379F9EF41889EE76EC699529BED0B8AB1CE48050502984A8732A0EEA07EEDE
3,507,969 UART: [art] SIG.R = ED468544C821199CC0831FA0E71D343D3E71062506C900C27FE49F533B0B0C5C8FEA1D7F10C6026FD7668A6DA638E488
3,514,704 UART: [art] SIG.S = 350983C1BAA55B24B272EB1543D9D9192E14883BBF9B0C47512F4CF25E507039C0A58F61956B0D423AEE5C7A454499B6
3,538,522 UART: Caliptra RT
3,538,775 UART: [state] CFI Enabled
3,645,709 UART: [rt] RT listening for mailbox commands...
3,646,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,769,519 UART: [rt]cmd =0x41544d4e, len=14344
3,775,948 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
893,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,420 UART: [kat] ++
897,572 UART: [kat] sha1
901,748 UART: [kat] SHA2-256
903,688 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,185 UART: [kat] HMAC-384Kdf
922,797 UART: [kat] LMS
1,171,125 UART: [kat] --
1,172,170 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,389 UART: [idev] ++
1,175,557 UART: [idev] CDI.KEYID = 6
1,175,917 UART: [idev] SUBJECT.KEYID = 7
1,176,341 UART: [idev] UDS.KEYID = 0
1,176,686 ready_for_fw is high
1,176,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,541 UART: [idev] Erasing UDS.KEYID = 0
1,201,706 UART: [idev] Sha1 KeyId Algorithm
1,210,404 UART: [idev] --
1,211,510 UART: [ldev] ++
1,211,678 UART: [ldev] CDI.KEYID = 6
1,212,041 UART: [ldev] SUBJECT.KEYID = 5
1,212,467 UART: [ldev] AUTHORITY.KEYID = 7
1,212,930 UART: [ldev] FE.KEYID = 1
1,218,134 UART: [ldev] Erasing FE.KEYID = 1
1,245,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,090 UART: [ldev] --
1,284,365 UART: [fwproc] Wait for Commands...
1,285,179 UART: [fwproc] Recv command 0x46574c44
1,285,907 UART: [fwproc] Recv'd Img size: 114168 bytes
3,126,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,183,631 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,319,228 >>> mbox cmd response: success
3,320,344 UART: [afmc] ++
3,320,512 UART: [afmc] CDI.KEYID = 6
3,320,874 UART: [afmc] SUBJECT.KEYID = 7
3,321,299 UART: [afmc] AUTHORITY.KEYID = 5
3,356,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,954 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,379,663 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,555 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,266 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,129 UART: [afmc] --
3,400,223 UART: [cold-reset] --
3,400,987 UART: [state] Locking Datavault
3,402,204 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,808 UART: [state] Locking ICCM
3,403,236 UART: [exit] Launching FMC @ 0x40000130
3,408,565 UART:
3,408,581 UART: Running Caliptra FMC ...
3,408,989 UART:
3,409,132 UART: [state] CFI Enabled
3,419,672 UART: [fht] FMC Alias Private Key: 7
3,528,086 UART: [art] Extend RT PCRs Done
3,528,514 UART: [art] Lock RT PCRs Done
3,530,380 UART: [art] Populate DV Done
3,538,604 UART: [fht] FMC Alias Private Key: 7
3,539,650 UART: [art] Derive CDI
3,539,930 UART: [art] Store in in slot 0x4
3,625,467 UART: [art] Derive Key Pair
3,625,827 UART: [art] Store priv key in slot 0x5
3,639,379 UART: [art] Derive Key Pair - Done
3,654,249 UART: [art] Signing Cert with AUTHO
3,654,729 UART: RITY.KEYID = 7
3,670,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,018 UART: [art] PUB.X = E1ACC2698EB7A21685A51A683CF41DFD1D2941BC7345313FE1EF09BB3B0C0A5B74982F3E928D3EF41424D47989959233
3,677,783 UART: [art] PUB.Y = 8D26F312BE9D3491A803D441CFA2EA3B6179F3708B09B18F7D7479D45675DC0B8C5B8B7C7FE9746D237061C727B95B5E
3,684,728 UART: [art] SIG.R = BB85B10007AF2719E2545E08E7C5B4BE7FF2DA3D5C8D54DD2B1B28C83DCB524636E1F41F8A07B9E2BF9AADEB744AD9DB
3,691,493 UART: [art] SIG.S = DC97E8E449C04BAD99FE21EF85E0C4C6927ADDA7DCB7ABF3D21487D2F0F2C196F4D54F5F2E5647A8FB058F314391E832
3,715,761 UART: Caliptra RT
3,716,106 UART: [state] CFI Enabled
3,824,125 UART: [rt] RT listening for mailbox commands...
3,824,795 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,947,969 UART: [rt]cmd =0x41544d4e, len=14344
3,954,178 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,412 ready_for_fw is high
1,061,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,176,035 >>> mbox cmd response: success
3,237,872 UART:
3,237,888 UART: Running Caliptra FMC ...
3,238,296 UART:
3,238,439 UART: [state] CFI Enabled
3,248,939 UART: [fht] FMC Alias Private Key: 7
3,357,191 UART: [art] Extend RT PCRs Done
3,357,619 UART: [art] Lock RT PCRs Done
3,358,885 UART: [art] Populate DV Done
3,367,213 UART: [fht] FMC Alias Private Key: 7
3,368,267 UART: [art] Derive CDI
3,368,547 UART: [art] Store in in slot 0x4
3,454,526 UART: [art] Derive Key Pair
3,454,886 UART: [art] Store priv key in slot 0x5
3,468,018 UART: [art] Derive Key Pair - Done
3,482,540 UART: [art] Signing Cert with AUTHO
3,483,020 UART: RITY.KEYID = 7
3,498,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,987 UART: [art] PUB.X = 4556163327605477B700E65E4E9774F45638DBC38556B44AF03278C0D473F876FE8D77A41FF14EB5E8A7ADCA5642AD3B
3,505,735 UART: [art] PUB.Y = F80D7F06AAF15C815D3E8DB25249864F4595FEB0F34A082C2EB2A77477BE7CBE965EB5B8B4CF3A235099B76FF0E66199
3,512,688 UART: [art] SIG.R = F4920A890F009DF75E1B54C12EFBF900B790EB522C80638AF6D8DF67DB687030DF87672BA9F5B622B26A8793FB8F3E13
3,519,416 UART: [art] SIG.S = CC58620A85279EA5DEA88E6BC6836E35D026671C2F4A76C8BEA09E4979B5A96B11DD3217D379EFAE2813C1C0A29616E1
3,543,370 UART: Caliptra RT
3,543,715 UART: [state] CFI Enabled
3,652,136 UART: [rt] RT listening for mailbox commands...
3,652,806 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,858 UART: [rt]cmd =0x41544d4e, len=14344
3,782,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,153 UART: [kat] ++
895,305 UART: [kat] sha1
899,439 UART: [kat] SHA2-256
901,379 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,583 UART: [fht] FHT @ 0x50003400
1,173,147 UART: [idev] ++
1,173,315 UART: [idev] CDI.KEYID = 6
1,173,676 UART: [idev] SUBJECT.KEYID = 7
1,174,101 UART: [idev] UDS.KEYID = 0
1,174,447 ready_for_fw is high
1,174,447 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,593 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,214,986 UART: [ldev] Erasing FE.KEYID = 1
1,241,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,282 UART: [ldev] --
1,280,630 UART: [fwproc] Wait for Commands...
1,281,293 UART: [fwproc] Recv command 0x46574c44
1,282,026 UART: [fwproc] Recv'd Img size: 114168 bytes
3,130,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,188,245 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,323,915 >>> mbox cmd response: success
3,325,050 UART: [afmc] ++
3,325,218 UART: [afmc] CDI.KEYID = 6
3,325,581 UART: [afmc] SUBJECT.KEYID = 7
3,326,007 UART: [afmc] AUTHORITY.KEYID = 5
3,361,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,868 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,384,578 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,390,468 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,396,179 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,404,023 UART: [afmc] --
3,405,105 UART: [cold-reset] --
3,405,983 UART: [state] Locking Datavault
3,407,270 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,874 UART: [state] Locking ICCM
3,408,428 UART: [exit] Launching FMC @ 0x40000130
3,413,757 UART:
3,413,773 UART: Running Caliptra FMC ...
3,414,181 UART:
3,414,235 UART: [state] CFI Enabled
3,424,339 UART: [fht] FMC Alias Private Key: 7
3,532,209 UART: [art] Extend RT PCRs Done
3,532,637 UART: [art] Lock RT PCRs Done
3,534,053 UART: [art] Populate DV Done
3,542,099 UART: [fht] FMC Alias Private Key: 7
3,543,109 UART: [art] Derive CDI
3,543,389 UART: [art] Store in in slot 0x4
3,628,996 UART: [art] Derive Key Pair
3,629,356 UART: [art] Store priv key in slot 0x5
3,642,902 UART: [art] Derive Key Pair - Done
3,657,815 UART: [art] Signing Cert with AUTHO
3,658,295 UART: RITY.KEYID = 7
3,673,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,252 UART: [art] PUB.X = 34A89C9A746AD18CFABFE172275ADC1D7CDD7888D4D939ABF6BDD90058BBDD4EC5D5774D75E104E30120A95597290C0C
3,681,004 UART: [art] PUB.Y = B1C6CEA9A7A2469E7720167353690B928BD229F6F93935C0E5FF8BA3D259AACB2350F3C4E86E4962EB5A6E26E42022BF
3,687,959 UART: [art] SIG.R = B8574C8C110471C0DEE850852381A7204C2D6E5C446C1A1B25C1A594F96BF89CA802A26BC38888798C034A620B37C454
3,694,713 UART: [art] SIG.S = DF0E477F3EBAD329AF1052D9E670CE5E537C03DF0FE3BF73E55F4388ECBFA9EA3FA927795250801C52BFE54BB07542D5
3,718,377 UART: Caliptra RT
3,718,630 UART: [state] CFI Enabled
3,825,937 UART: [rt] RT listening for mailbox commands...
3,826,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,541 UART: [rt]cmd =0x41544d4e, len=14344
3,955,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,738 ready_for_fw is high
1,055,738 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,636 >>> mbox cmd response: success
3,227,251 UART:
3,227,267 UART: Running Caliptra FMC ...
3,227,675 UART:
3,227,729 UART: [state] CFI Enabled
3,238,115 UART: [fht] FMC Alias Private Key: 7
3,345,637 UART: [art] Extend RT PCRs Done
3,346,065 UART: [art] Lock RT PCRs Done
3,347,613 UART: [art] Populate DV Done
3,355,781 UART: [fht] FMC Alias Private Key: 7
3,356,841 UART: [art] Derive CDI
3,357,121 UART: [art] Store in in slot 0x4
3,442,748 UART: [art] Derive Key Pair
3,443,108 UART: [art] Store priv key in slot 0x5
3,456,406 UART: [art] Derive Key Pair - Done
3,471,270 UART: [art] Signing Cert with AUTHO
3,471,750 UART: RITY.KEYID = 7
3,486,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,553 UART: [art] PUB.X = B626CA9022117DE62E0E718431B64BED531E7E30849D08CA9CA4F23601C7EDE74E22B6142F52D61AB584574CF6A5039B
3,494,315 UART: [art] PUB.Y = D23C7C49CA420B8DE9B129C08FD5C761BDC434A850C9B18A07EEEB7834AF54B7B1D196E07C0E83FC3410511AE9120ED1
3,501,267 UART: [art] SIG.R = C08F75B684FFF084AAADEB9FDDD95D576C2477360AA0590874D74B9CBB5D5F36265F79AF3ADB1B532F314CC6CA8633C7
3,508,049 UART: [art] SIG.S = EE59757B01D20D6D01AEBEBCD0067D66FBA7A5402B548F5182AE3FF639A726BBED6AE362CD25EC11195FC80967E7C005
3,532,052 UART: Caliptra RT
3,532,305 UART: [state] CFI Enabled
3,639,516 UART: [rt] RT listening for mailbox commands...
3,640,186 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,354 UART: [rt]cmd =0x41544d4e, len=14344
3,769,917 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,773 UART: [kat] HMAC-384Kdf
921,333 UART: [kat] LMS
1,169,645 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,171,036 UART: [fht] FHT @ 0x50003400
1,173,782 UART: [idev] ++
1,173,950 UART: [idev] CDI.KEYID = 6
1,174,311 UART: [idev] SUBJECT.KEYID = 7
1,174,736 UART: [idev] UDS.KEYID = 0
1,175,082 ready_for_fw is high
1,175,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,560 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,452 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,775 UART: [fwproc] Wait for Commands...
1,282,460 UART: [fwproc] Recv command 0x46574c44
1,283,193 UART: [fwproc] Recv'd Img size: 114168 bytes
3,113,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,141,902 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,171,211 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,306,859 >>> mbox cmd response: success
3,308,006 UART: [afmc] ++
3,308,174 UART: [afmc] CDI.KEYID = 6
3,308,537 UART: [afmc] SUBJECT.KEYID = 7
3,308,963 UART: [afmc] AUTHORITY.KEYID = 5
3,344,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,360,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,361,396 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,367,106 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,372,996 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,378,707 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,386,377 UART: [afmc] --
3,387,311 UART: [cold-reset] --
3,388,265 UART: [state] Locking Datavault
3,389,470 UART: [state] Locking PCR0, PCR1 and PCR31
3,390,074 UART: [state] Locking ICCM
3,390,684 UART: [exit] Launching FMC @ 0x40000130
3,396,013 UART:
3,396,029 UART: Running Caliptra FMC ...
3,396,437 UART:
3,396,580 UART: [state] CFI Enabled
3,407,250 UART: [fht] FMC Alias Private Key: 7
3,515,198 UART: [art] Extend RT PCRs Done
3,515,626 UART: [art] Lock RT PCRs Done
3,517,320 UART: [art] Populate DV Done
3,525,626 UART: [fht] FMC Alias Private Key: 7
3,526,804 UART: [art] Derive CDI
3,527,084 UART: [art] Store in in slot 0x4
3,612,823 UART: [art] Derive Key Pair
3,613,183 UART: [art] Store priv key in slot 0x5
3,626,675 UART: [art] Derive Key Pair - Done
3,641,475 UART: [art] Signing Cert with AUTHO
3,641,955 UART: RITY.KEYID = 7
3,657,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,658,478 UART: [art] PUB.X = 7EAD4025639C1DFD1291A8A75BCE8F62CE2599A417C012AE0D587FACEF75CC5FB4C64F8D8A29C5B44B187310EA17E32C
3,665,263 UART: [art] PUB.Y = 62DE33972C60E5C2C1811C289A5CA0FE6546229C5A2AC366693064C9F79B9A13C6C18591BC9EA9553B29E6411F1D90EC
3,672,215 UART: [art] SIG.R = 35CD6D961E5FF47666A9A3117A3942454EB6FEF0ECD75679D19C5ED1F43713B7662918C8ACF705686E966BD6577AB847
3,678,984 UART: [art] SIG.S = 6CE06FD7C6DEB127FC3AD1110A70696473C888AED3ADE79F06AF2DBA4268D78BC8B24A93B0222F4FFAB8AB77F9402E4A
3,702,529 UART: Caliptra RT
3,702,874 UART: [state] CFI Enabled
3,809,415 UART: [rt] RT listening for mailbox commands...
3,810,085 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,933,471 UART: [rt]cmd =0x41544d4e, len=14344
3,939,788 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,007 ready_for_fw is high
1,057,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,174,398 >>> mbox cmd response: success
3,236,987 UART:
3,237,003 UART: Running Caliptra FMC ...
3,237,411 UART:
3,237,554 UART: [state] CFI Enabled
3,248,190 UART: [fht] FMC Alias Private Key: 7
3,356,556 UART: [art] Extend RT PCRs Done
3,356,984 UART: [art] Lock RT PCRs Done
3,358,616 UART: [art] Populate DV Done
3,367,028 UART: [fht] FMC Alias Private Key: 7
3,367,998 UART: [art] Derive CDI
3,368,278 UART: [art] Store in in slot 0x4
3,454,069 UART: [art] Derive Key Pair
3,454,429 UART: [art] Store priv key in slot 0x5
3,467,577 UART: [art] Derive Key Pair - Done
3,482,478 UART: [art] Signing Cert with AUTHO
3,482,958 UART: RITY.KEYID = 7
3,498,140 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,905 UART: [art] PUB.X = BFF52CCF4FE6DCE48E584F6B5CCB6DA05004AFDF0D0AB7A1186CAC4EEA9BB042A6DF87A6A8029CE2411D920F98D8D627
3,505,690 UART: [art] PUB.Y = 3BB6BF89A7E8FED12354F2F8AA48BC61B27AE52016388B9D52292548E06C1C5C440C62931AEC4572DBB457C4828C3AF6
3,512,645 UART: [art] SIG.R = 16B3CFF4E38D2C91613FE86CC624BF1F26AD3A11FC6007C823E0D39B53BE3C8FCDFC801B9B2C288BA92AF282049C7615
3,519,425 UART: [art] SIG.S = 097CC0E464F8D4C9693B25E41D0907A2C9A308D474BC07E2D801BCEBD0E4A1F70F7B805807FF9DEAD36D0CE87D69C283
3,543,671 UART: Caliptra RT
3,544,016 UART: [state] CFI Enabled
3,651,307 UART: [rt] RT listening for mailbox commands...
3,651,977 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,774,987 UART: [rt]cmd =0x41544d4e, len=14344
3,781,420 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,081 UART:
192,444 UART: Running Caliptra ROM ...
193,542 UART:
193,681 UART: [state] CFI Enabled
261,829 UART: [state] LifecycleState = Unprovisioned
263,747 UART: [state] DebugLocked = No
265,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,754 UART: [kat] SHA2-256
440,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,000 UART: [kat] ++
451,478 UART: [kat] sha1
463,504 UART: [kat] SHA2-256
466,152 UART: [kat] SHA2-384
472,274 UART: [kat] SHA2-512-ACC
474,640 UART: [kat] ECC-384
2,768,307 UART: [kat] HMAC-384Kdf
2,800,294 UART: [kat] LMS
3,990,551 UART: [kat] --
3,995,921 UART: [cold-reset] ++
3,997,637 UART: [fht] Storing FHT @ 0x50003400
4,010,486 UART: [idev] ++
4,011,094 UART: [idev] CDI.KEYID = 6
4,012,009 UART: [idev] SUBJECT.KEYID = 7
4,013,266 UART: [idev] UDS.KEYID = 0
4,014,331 ready_for_fw is high
4,014,526 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,554 UART: [idev] Erasing UDS.KEYID = 0
7,345,744 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,275 UART: [idev] --
7,371,611 UART: [ldev] ++
7,372,175 UART: [ldev] CDI.KEYID = 6
7,373,104 UART: [ldev] SUBJECT.KEYID = 5
7,374,362 UART: [ldev] AUTHORITY.KEYID = 7
7,375,633 UART: [ldev] FE.KEYID = 1
7,422,274 UART: [ldev] Erasing FE.KEYID = 1
10,757,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,404 UART: [ldev] --
13,136,541 UART: [fwproc] Waiting for Commands...
13,138,205 UART: [fwproc] Received command 0x46574c44
13,140,398 UART: [fwproc] Received Image of size 113844 bytes
21,934,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,016,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,085,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,402,045 >>> mbox cmd response: success
22,406,018 UART: [afmc] ++
22,406,645 UART: [afmc] CDI.KEYID = 6
22,407,531 UART: [afmc] SUBJECT.KEYID = 7
22,408,802 UART: [afmc] AUTHORITY.KEYID = 5
25,780,766 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,081,640 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,083,912 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,098,499 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,113,220 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,127,425 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,148,108 UART: [afmc] --
28,152,526 UART: [cold-reset] --
28,156,608 UART: [state] Locking Datavault
28,161,433 UART: [state] Locking PCR0, PCR1 and PCR31
28,163,184 UART: [state] Locking ICCM
28,165,584 UART: [exit] Launching FMC @ 0x40000130
28,173,967 UART:
28,174,215 UART: Running Caliptra FMC ...
28,175,241 UART:
28,175,383 UART: [state] CFI Enabled
28,241,501 UART: [fht] FMC Alias Private Key: 7
30,579,270 UART: [art] Extend RT PCRs Done
30,580,494 UART: [art] Lock RT PCRs Done
30,582,578 UART: [art] Populate DV Done
30,587,983 UART: [fht] FMC Alias Private Key: 7
30,589,571 UART: [art] Derive CDI
30,590,315 UART: [art] Store in in slot 0x4
30,650,905 UART: [art] Derive Key Pair
30,651,939 UART: [art] Store priv key in slot 0x5
33,944,857 UART: [art] Derive Key Pair - Done
33,958,289 UART: [art] Signing Cert with AUTHO
33,959,615 UART: RITY.KEYID = 7
36,247,128 UART: [art] Erasing AUTHORITY.KEYID = 7
36,248,650 UART: [art] PUB.X = 66AAD9D325FC0942F79D9297688700826354CC47319C736580264EF6595A53835DA0DC81E703FB2C467C2E463884F928
36,255,811 UART: [art] PUB.Y = A30F08326DB29FE1C8890C6D509E3715181C1957248D4C0B9165289F1CBFB873F2C0524FE35B87ED7229200C9CC10057
36,263,014 UART: [art] SIG.R = A454DFE4695DC12A34339D53943634E59B4AE24033B8A55430DEDB590A63626C464BD385DFF85A58C8D679C3C52252A8
36,270,432 UART: [art] SIG.S = 0CBE93752763556C196B0762052D9D9AB757AC1F6905FD20CDA6B283DC3FD5509D8624BA2128CA2C3170594AE90A5D17
37,576,209 UART: Caliptra RT
37,576,929 UART: [state] CFI Enabled
37,736,552 UART: [rt] RT listening for mailbox commands...
37,738,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,894,114 UART: [rt]cmd =0x41544d4e, len=14344
39,187,386 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
3,807,052 ready_for_fw is high
3,807,605 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,936,106 >>> mbox cmd response: success
27,634,829 UART:
27,635,248 UART: Running Caliptra FMC ...
27,636,340 UART:
27,636,499 UART: [state] CFI Enabled
27,705,936 UART: [fht] FMC Alias Private Key: 7
30,044,379 UART: [art] Extend RT PCRs Done
30,045,636 UART: [art] Lock RT PCRs Done
30,047,163 UART: [art] Populate DV Done
30,052,634 UART: [fht] FMC Alias Private Key: 7
30,054,337 UART: [art] Derive CDI
30,055,078 UART: [art] Store in in slot 0x4
30,114,940 UART: [art] Derive Key Pair
30,115,974 UART: [art] Store priv key in slot 0x5
33,408,929 UART: [art] Derive Key Pair - Done
33,421,773 UART: [art] Signing Cert with AUTHO
33,423,077 UART: RITY.KEYID = 7
35,711,700 UART: [art] Erasing AUTHORITY.KEYID = 7
35,713,208 UART: [art] PUB.X = B24E66A34C38FEEF286100021D7E415085CBFBF96B6F567D4C8E3B2834FE7BDCEB20201BD477B74454F7302D00ABDAA2
35,720,467 UART: [art] PUB.Y = F62C3D95C5761F1899E3058350FB06CDF1FA827F4ECA35759C9FD39EAEF5C3DA7EA6A6972E759B4117849258C72ADF86
35,727,738 UART: [art] SIG.R = 1E5FCDC4F7BE135B5A50B3D24F33DC96D107C9A30E4506169250178ECE9ACADED684454A9BB759966B4E85F6B385EF39
35,735,144 UART: [art] SIG.S = 79FDED6F7A0AF14B4D06D2445F8E19F8651C3451286F64083D752881D37F2F17AAD903E57E46090D08F2D4F964C520A1
37,040,510 UART: Caliptra RT
37,041,240 UART: [state] CFI Enabled
37,201,395 UART: [rt] RT listening for mailbox commands...
37,203,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,359,078 UART: [rt]cmd =0x41544d4e, len=14344
38,652,184 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,554 UART:
192,915 UART: Running Caliptra ROM ...
194,053 UART:
603,787 UART: [state] CFI Enabled
618,107 UART: [state] LifecycleState = Unprovisioned
620,020 UART: [state] DebugLocked = No
621,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,958 UART: [kat] SHA2-256
795,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,233 UART: [kat] ++
806,710 UART: [kat] sha1
818,227 UART: [kat] SHA2-256
820,949 UART: [kat] SHA2-384
825,952 UART: [kat] SHA2-512-ACC
828,324 UART: [kat] ECC-384
3,110,567 UART: [kat] HMAC-384Kdf
3,121,517 UART: [kat] LMS
4,311,681 UART: [kat] --
4,315,562 UART: [cold-reset] ++
4,317,991 UART: [fht] Storing FHT @ 0x50003400
4,329,835 UART: [idev] ++
4,330,409 UART: [idev] CDI.KEYID = 6
4,331,319 UART: [idev] SUBJECT.KEYID = 7
4,332,588 UART: [idev] UDS.KEYID = 0
4,333,651 ready_for_fw is high
4,333,864 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,476,873 UART: [idev] Erasing UDS.KEYID = 0
7,624,846 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,373 UART: [idev] --
7,650,589 UART: [ldev] ++
7,651,191 UART: [ldev] CDI.KEYID = 6
7,652,136 UART: [ldev] SUBJECT.KEYID = 5
7,653,352 UART: [ldev] AUTHORITY.KEYID = 7
7,654,637 UART: [ldev] FE.KEYID = 1
7,664,718 UART: [ldev] Erasing FE.KEYID = 1
10,954,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,883 UART: [ldev] --
13,318,096 UART: [fwproc] Waiting for Commands...
13,320,037 UART: [fwproc] Received command 0x46574c44
13,322,225 UART: [fwproc] Received Image of size 113844 bytes
21,957,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,041,794 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,110,650 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,427,275 >>> mbox cmd response: success
22,431,472 UART: [afmc] ++
22,432,070 UART: [afmc] CDI.KEYID = 6
22,432,962 UART: [afmc] SUBJECT.KEYID = 7
22,434,235 UART: [afmc] AUTHORITY.KEYID = 5
25,750,243 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,045,179 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,047,488 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,062,081 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,076,786 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,091,001 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,112,346 UART: [afmc] --
28,116,101 UART: [cold-reset] --
28,119,965 UART: [state] Locking Datavault
28,125,643 UART: [state] Locking PCR0, PCR1 and PCR31
28,127,349 UART: [state] Locking ICCM
28,129,205 UART: [exit] Launching FMC @ 0x40000130
28,137,603 UART:
28,137,847 UART: Running Caliptra FMC ...
28,138,949 UART:
28,139,108 UART: [state] CFI Enabled
28,147,171 UART: [fht] FMC Alias Private Key: 7
30,477,779 UART: [art] Extend RT PCRs Done
30,478,996 UART: [art] Lock RT PCRs Done
30,480,641 UART: [art] Populate DV Done
30,486,167 UART: [fht] FMC Alias Private Key: 7
30,487,733 UART: [art] Derive CDI
30,488,494 UART: [art] Store in in slot 0x4
30,531,368 UART: [art] Derive Key Pair
30,532,398 UART: [art] Store priv key in slot 0x5
33,774,172 UART: [art] Derive Key Pair - Done
33,787,175 UART: [art] Signing Cert with AUTHO
33,788,485 UART: RITY.KEYID = 7
36,068,068 UART: [art] Erasing AUTHORITY.KEYID = 7
36,069,579 UART: [art] PUB.X = 5AF2DEEE6B227AF88E7D45CCEC38E61951758EB8083F05FCA584ABCFB27D025B8F9704759E52DA0D52F1E3CA906A5708
36,076,850 UART: [art] PUB.Y = 5C7C8CF4DA1A9976ADE2593B3A2CEE4081A9100D09359C4EE4F026B84FE1542BF784AC5B15ACF68917D5E653C5CE2D9F
36,084,104 UART: [art] SIG.R = 5CB77E2A13CEBBB26B442DED7EFED744B6B024FA37121DC38C7BCE17D5C07D08BC5AA56BC222255B2CDB841EB65AEB5B
36,091,517 UART: [art] SIG.S = CFF650EAFCB4AD9546F620EED6C2F22BE8DC914CA028F6120238381B8781439D68179FE0DCAB1FE17E3E0CD07D6F7F39
37,396,862 UART: Caliptra RT
37,397,568 UART: [state] CFI Enabled
37,514,820 UART: [rt] RT listening for mailbox commands...
37,517,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,672,322 UART: [rt]cmd =0x41544d4e, len=14344
38,965,341 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,129,956 ready_for_fw is high
4,130,342 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,116,763 >>> mbox cmd response: success
27,757,786 UART:
27,758,180 UART: Running Caliptra FMC ...
27,759,372 UART:
27,759,546 UART: [state] CFI Enabled
27,767,699 UART: [fht] FMC Alias Private Key: 7
30,098,683 UART: [art] Extend RT PCRs Done
30,099,915 UART: [art] Lock RT PCRs Done
30,101,922 UART: [art] Populate DV Done
30,107,332 UART: [fht] FMC Alias Private Key: 7
30,108,923 UART: [art] Derive CDI
30,109,737 UART: [art] Store in in slot 0x4
30,152,452 UART: [art] Derive Key Pair
30,153,493 UART: [art] Store priv key in slot 0x5
33,395,406 UART: [art] Derive Key Pair - Done
33,408,688 UART: [art] Signing Cert with AUTHO
33,410,015 UART: RITY.KEYID = 7
35,689,317 UART: [art] Erasing AUTHORITY.KEYID = 7
35,690,835 UART: [art] PUB.X = 481677D5A2B25EAD4845E87EB3ADE5BE2C07789B07E6B6D1FEDD3B655F86AD0E1F200C90618961CFB3B74325083CE74D
35,698,047 UART: [art] PUB.Y = EA0148FC185A25E9E9221156571DE53D4D90DF7103EF6513FB18C0F3D837A7B1B4F694542545D8AA5E1B184CBB100788
35,705,285 UART: [art] SIG.R = 46B783E6EEE0B5B39D265BFBB6047C2496CDDA46A82E6E7B2A288C26D0A3DA1E6F447C1CBFFC38D167847158832A2379
35,712,682 UART: [art] SIG.S = 86940FD661BC57223E06086B6191D78C1DB50F9A24DB1042AA358BFEF2CBC8FE75D21279A0F24D42AD22C1C6F51E6E56
37,017,675 UART: Caliptra RT
37,018,374 UART: [state] CFI Enabled
37,136,683 UART: [rt] RT listening for mailbox commands...
37,138,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,294,288 UART: [rt]cmd =0x41544d4e, len=14344
38,587,866 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
191,986 UART:
192,354 UART: Running Caliptra ROM ...
193,469 UART:
193,613 UART: [state] CFI Enabled
266,785 UART: [state] LifecycleState = Unprovisioned
268,706 UART: [state] DebugLocked = No
271,083 UART: [state] WD Timer not started. Device not locked for debugging
274,907 UART: [kat] SHA2-256
454,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,617 UART: [kat] ++
466,158 UART: [kat] sha1
477,823 UART: [kat] SHA2-256
480,832 UART: [kat] SHA2-384
486,887 UART: [kat] SHA2-512-ACC
489,825 UART: [kat] ECC-384
2,948,735 UART: [kat] HMAC-384Kdf
2,974,414 UART: [kat] LMS
3,503,878 UART: [kat] --
3,508,514 UART: [cold-reset] ++
3,509,663 UART: [fht] FHT @ 0x50003400
3,520,425 UART: [idev] ++
3,521,015 UART: [idev] CDI.KEYID = 6
3,521,934 UART: [idev] SUBJECT.KEYID = 7
3,523,113 UART: [idev] UDS.KEYID = 0
3,524,039 ready_for_fw is high
3,524,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,956 UART: [idev] Erasing UDS.KEYID = 0
6,027,488 UART: [idev] Sha1 KeyId Algorithm
6,051,127 UART: [idev] --
6,054,730 UART: [ldev] ++
6,055,324 UART: [ldev] CDI.KEYID = 6
6,056,240 UART: [ldev] SUBJECT.KEYID = 5
6,057,401 UART: [ldev] AUTHORITY.KEYID = 7
6,058,690 UART: [ldev] FE.KEYID = 1
6,101,851 UART: [ldev] Erasing FE.KEYID = 1
8,604,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,866 UART: [ldev] --
10,396,809 UART: [fwproc] Wait for Commands...
10,399,019 UART: [fwproc] Recv command 0x46574c44
10,401,064 UART: [fwproc] Recv'd Img size: 114168 bytes
14,976,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,052,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,121,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,438,346 >>> mbox cmd response: success
15,442,961 UART: [afmc] ++
15,443,562 UART: [afmc] CDI.KEYID = 6
15,444,482 UART: [afmc] SUBJECT.KEYID = 7
15,445,648 UART: [afmc] AUTHORITY.KEYID = 5
17,983,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,709,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,711,612 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,727,555 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,743,526 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,759,264 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,782,125 UART: [afmc] --
19,786,690 UART: [cold-reset] --
19,791,304 UART: [state] Locking Datavault
19,797,047 UART: [state] Locking PCR0, PCR1 and PCR31
19,798,702 UART: [state] Locking ICCM
19,801,178 UART: [exit] Launching FMC @ 0x40000130
19,809,647 UART:
19,809,926 UART: Running Caliptra FMC ...
19,811,040 UART:
19,811,206 UART: [state] CFI Enabled
19,865,726 UART: [fht] FMC Alias Private Key: 7
21,629,659 UART: [art] Extend RT PCRs Done
21,630,882 UART: [art] Lock RT PCRs Done
21,632,515 UART: [art] Populate DV Done
21,637,820 UART: [fht] FMC Alias Private Key: 7
21,639,371 UART: [art] Derive CDI
21,640,191 UART: [art] Store in in slot 0x4
21,698,435 UART: [art] Derive Key Pair
21,699,480 UART: [art] Store priv key in slot 0x5
24,162,375 UART: [art] Derive Key Pair - Done
24,175,328 UART: [art] Signing Cert with AUTHO
24,176,641 UART: RITY.KEYID = 7
25,887,961 UART: [art] Erasing AUTHORITY.KEYID = 7
25,889,470 UART: [art] PUB.X = 9F758FE12E8848B45A3E939878511B99976E1DB83FBF06B627AC643BB994D3BFF6BB20807333E5CE557D02C51F083CFD
25,896,738 UART: [art] PUB.Y = 733123A12C4F0C7C61448CEBFAC871E6105D5B61F8F10A999C2F785069B29CF5CDC09A6484BAB3656908C3D8E8F280DD
25,903,987 UART: [art] SIG.R = 3CDB2D5B3B00B16BCD95EDD06872B24C277A3D6247F343AE415664A952AD955B411076EE5383C118A9F7FC9B7E140E6A
25,911,365 UART: [art] SIG.S = 84642D758B9497E8A7D03CF2B4C8DAF49B9BD20939FA225217340D06581F8FA013B0459842C1953E64E8ADFAD8C63AEB
26,889,901 UART: Caliptra RT
26,890,593 UART: [state] CFI Enabled
27,056,309 UART: [rt] RT listening for mailbox commands...
27,058,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,213,754 UART: [rt]cmd =0x41544d4e, len=14344
28,180,412 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,360,279 ready_for_fw is high
3,360,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,011,342 >>> mbox cmd response: success
19,304,817 UART:
19,305,230 UART: Running Caliptra FMC ...
19,306,367 UART:
19,306,531 UART: [state] CFI Enabled
19,371,284 UART: [fht] FMC Alias Private Key: 7
21,134,810 UART: [art] Extend RT PCRs Done
21,136,048 UART: [art] Lock RT PCRs Done
21,137,601 UART: [art] Populate DV Done
21,143,159 UART: [fht] FMC Alias Private Key: 7
21,144,789 UART: [art] Derive CDI
21,145,614 UART: [art] Store in in slot 0x4
21,203,793 UART: [art] Derive Key Pair
21,204,793 UART: [art] Store priv key in slot 0x5
23,667,741 UART: [art] Derive Key Pair - Done
23,680,635 UART: [art] Signing Cert with AUTHO
23,681,948 UART: RITY.KEYID = 7
25,393,942 UART: [art] Erasing AUTHORITY.KEYID = 7
25,395,475 UART: [art] PUB.X = 6AF045A9BEDD5E4864AA5FFCF1A3590E5C0C67C2773AE50040ECE4BA4193B6447CE602331C80752E38A616A4B4704370
25,402,711 UART: [art] PUB.Y = BEA73E9B8D5235C03BC1B241304FA6EAEA8DE2A9BC8A5F229F724BFB611EF63E1FEB9BAC2EBA3385E3360F95CDD34ACD
25,410,006 UART: [art] SIG.R = D92FA4D0655051049FA77F79542FB4588C316B2C3956BB7C79C5C74A3CB7D9C782741ECFE2CADC0E6361114B37B06225
25,417,402 UART: [art] SIG.S = 350EE5B45DAD9B3477AFE9D33010AD650B884267972DE61C1A03D3BC05C183CCD02E5F2E15A25E4676CC58469D976FD9
26,395,980 UART: Caliptra RT
26,396,689 UART: [state] CFI Enabled
26,563,428 UART: [rt] RT listening for mailbox commands...
26,565,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,721,404 UART: [rt]cmd =0x41544d4e, len=14344
27,688,169 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
193,156 UART:
193,510 UART: Running Caliptra ROM ...
194,717 UART:
604,305 UART: [state] CFI Enabled
614,489 UART: [state] LifecycleState = Unprovisioned
616,362 UART: [state] DebugLocked = No
618,670 UART: [state] WD Timer not started. Device not locked for debugging
622,220 UART: [kat] SHA2-256
801,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,942 UART: [kat] ++
813,474 UART: [kat] sha1
823,431 UART: [kat] SHA2-256
826,433 UART: [kat] SHA2-384
832,775 UART: [kat] SHA2-512-ACC
835,706 UART: [kat] ECC-384
3,277,557 UART: [kat] HMAC-384Kdf
3,291,613 UART: [kat] LMS
3,821,137 UART: [kat] --
3,826,011 UART: [cold-reset] ++
3,827,960 UART: [fht] FHT @ 0x50003400
3,839,000 UART: [idev] ++
3,839,649 UART: [idev] CDI.KEYID = 6
3,840,573 UART: [idev] SUBJECT.KEYID = 7
3,841,700 UART: [idev] UDS.KEYID = 0
3,842,630 ready_for_fw is high
3,842,835 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,158 UART: [idev] Erasing UDS.KEYID = 0
6,314,909 UART: [idev] Sha1 KeyId Algorithm
6,337,931 UART: [idev] --
6,340,281 UART: [ldev] ++
6,340,870 UART: [ldev] CDI.KEYID = 6
6,341,756 UART: [ldev] SUBJECT.KEYID = 5
6,342,830 UART: [ldev] AUTHORITY.KEYID = 7
6,344,162 UART: [ldev] FE.KEYID = 1
6,353,701 UART: [ldev] Erasing FE.KEYID = 1
8,824,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,829 UART: [ldev] --
10,617,497 UART: [fwproc] Wait for Commands...
10,620,177 UART: [fwproc] Recv command 0x46574c44
10,622,263 UART: [fwproc] Recv'd Img size: 114168 bytes
15,187,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,269,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,338,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,655,564 >>> mbox cmd response: success
15,660,119 UART: [afmc] ++
15,660,713 UART: [afmc] CDI.KEYID = 6
15,661,627 UART: [afmc] SUBJECT.KEYID = 7
15,662,839 UART: [afmc] AUTHORITY.KEYID = 5
18,160,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,882,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,883,970 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,899,973 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,915,886 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,931,693 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,954,197 UART: [afmc] --
19,957,852 UART: [cold-reset] --
19,963,543 UART: [state] Locking Datavault
19,968,623 UART: [state] Locking PCR0, PCR1 and PCR31
19,970,315 UART: [state] Locking ICCM
19,972,085 UART: [exit] Launching FMC @ 0x40000130
19,980,548 UART:
19,980,783 UART: Running Caliptra FMC ...
19,981,885 UART:
19,982,045 UART: [state] CFI Enabled
19,990,311 UART: [fht] FMC Alias Private Key: 7
21,747,417 UART: [art] Extend RT PCRs Done
21,748,633 UART: [art] Lock RT PCRs Done
21,749,901 UART: [art] Populate DV Done
21,755,264 UART: [fht] FMC Alias Private Key: 7
21,756,760 UART: [art] Derive CDI
21,757,523 UART: [art] Store in in slot 0x4
21,800,734 UART: [art] Derive Key Pair
21,801,744 UART: [art] Store priv key in slot 0x5
24,228,334 UART: [art] Derive Key Pair - Done
24,241,315 UART: [art] Signing Cert with AUTHO
24,242,654 UART: RITY.KEYID = 7
25,948,389 UART: [art] Erasing AUTHORITY.KEYID = 7
25,949,896 UART: [art] PUB.X = 9998F719FED90FC0752AE3E8B45B77341700A0526D1BEE90B20F0FC670DBBC16811A9A95EF6B6E7308938624CB4B7381
25,957,153 UART: [art] PUB.Y = 99D674C147D9940E9AA84C1C7232804E6011E7DB4C1D13E8E203AF1718B23E2E2124E6B2F124A5BA9749BBDBD9B6D2AB
25,964,401 UART: [art] SIG.R = 266E7CBF5E27E1148668A4591E6AB6D98EBFE8237CE0E494DF7D52FE8D1C3F1972172C83204EAC8B1A445CE46D616157
25,971,804 UART: [art] SIG.S = 7A850604D9CC744E0B0915EA79691C57D9D7DF6DB292D0CAE4BF564C756B5D6DFAD64EDE5BD4365136C8B4645FD07D3A
26,951,025 UART: Caliptra RT
26,951,735 UART: [state] CFI Enabled
27,069,100 UART: [rt] RT listening for mailbox commands...
27,071,409 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,451 UART: [rt]cmd =0x41544d4e, len=14344
28,193,327 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,894 writing to cptra_bootfsm_go
3,699,189 ready_for_fw is high
3,699,562 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,249,687 >>> mbox cmd response: success
19,501,525 UART:
19,501,913 UART: Running Caliptra FMC ...
19,503,015 UART:
19,503,174 UART: [state] CFI Enabled
19,511,298 UART: [fht] FMC Alias Private Key: 7
21,268,252 UART: [art] Extend RT PCRs Done
21,269,490 UART: [art] Lock RT PCRs Done
21,271,365 UART: [art] Populate DV Done
21,276,831 UART: [fht] FMC Alias Private Key: 7
21,278,539 UART: [art] Derive CDI
21,279,368 UART: [art] Store in in slot 0x4
21,322,141 UART: [art] Derive Key Pair
21,323,185 UART: [art] Store priv key in slot 0x5
23,750,001 UART: [art] Derive Key Pair - Done
23,762,907 UART: [art] Signing Cert with AUTHO
23,764,219 UART: RITY.KEYID = 7
25,469,762 UART: [art] Erasing AUTHORITY.KEYID = 7
25,471,273 UART: [art] PUB.X = 0736AF461E455A82B6E8CD3E37C377338FD6E01E84AEEE97147F1EE812B80E0358D312BDFB1E24FE5E506BC71E975EE9
25,478,526 UART: [art] PUB.Y = 5E7811B9DB32605D38B06582B3EAC76562DD2B365ED04671C1944B8E0556B9BC7EE744DBD361FA7866ECDB6242C07F07
25,485,790 UART: [art] SIG.R = 53A8657993CF80674E986866DCA3FF2623AFD9A322F47EC9B2929595CF0511528753CEA63C374DFB5626D50489B4B59C
25,493,185 UART: [art] SIG.S = 6442D33DF6DF3D81361262E8356FD400BA71C77D8B474BACA3E1C28172C0ADAFA4AD542E0DC46219D1042FB25F7A448A
26,471,925 UART: Caliptra RT
26,472,626 UART: [state] CFI Enabled
26,590,720 UART: [rt] RT listening for mailbox commands...
26,593,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,748,255 UART: [rt]cmd =0x41544d4e, len=14344
27,715,341 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,201 UART:
192,565 UART: Running Caliptra ROM ...
193,763 UART:
193,916 UART: [state] CFI Enabled
264,100 UART: [state] LifecycleState = Unprovisioned
266,436 UART: [state] DebugLocked = No
269,101 UART: [state] WD Timer not started. Device not locked for debugging
273,429 UART: [kat] SHA2-256
463,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,020 UART: [kat] ++
474,477 UART: [kat] sha1
486,485 UART: [kat] SHA2-256
489,560 UART: [kat] SHA2-384
494,487 UART: [kat] SHA2-512-ACC
497,072 UART: [kat] ECC-384
2,946,194 UART: [kat] HMAC-384Kdf
2,971,475 UART: [kat] LMS
3,503,235 UART: [kat] --
3,508,121 UART: [cold-reset] ++
3,509,458 UART: [fht] FHT @ 0x50003400
3,520,804 UART: [idev] ++
3,521,441 UART: [idev] CDI.KEYID = 6
3,522,471 UART: [idev] SUBJECT.KEYID = 7
3,523,649 UART: [idev] UDS.KEYID = 0
3,524,579 ready_for_fw is high
3,524,790 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,436 UART: [idev] Erasing UDS.KEYID = 0
6,029,863 UART: [idev] Sha1 KeyId Algorithm
6,052,133 UART: [idev] --
6,057,647 UART: [ldev] ++
6,058,332 UART: [ldev] CDI.KEYID = 6
6,059,267 UART: [ldev] SUBJECT.KEYID = 5
6,060,431 UART: [ldev] AUTHORITY.KEYID = 7
6,061,663 UART: [ldev] FE.KEYID = 1
6,101,158 UART: [ldev] Erasing FE.KEYID = 1
8,605,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,237 UART: [ldev] --
10,415,989 UART: [fwproc] Wait for Commands...
10,418,891 UART: [fwproc] Recv command 0x46574c44
10,421,146 UART: [fwproc] Recv'd Img size: 114168 bytes
15,053,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,129,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,245,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,787,305 >>> mbox cmd response: success
15,790,734 UART: [afmc] ++
15,791,447 UART: [afmc] CDI.KEYID = 6
15,792,700 UART: [afmc] SUBJECT.KEYID = 7
15,794,096 UART: [afmc] AUTHORITY.KEYID = 5
18,326,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,068,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,070,160 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,085,226 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,100,391 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,115,272 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,138,508 UART: [afmc] --
20,141,247 UART: [cold-reset] --
20,145,555 UART: [state] Locking Datavault
20,150,018 UART: [state] Locking PCR0, PCR1 and PCR31
20,152,223 UART: [state] Locking ICCM
20,153,645 UART: [exit] Launching FMC @ 0x40000130
20,162,290 UART:
20,162,537 UART: Running Caliptra FMC ...
20,163,643 UART:
20,163,805 UART: [state] CFI Enabled
20,225,250 UART: [fht] FMC Alias Private Key: 7
21,988,468 UART: [art] Extend RT PCRs Done
21,989,681 UART: [art] Lock RT PCRs Done
21,991,171 UART: [art] Populate DV Done
21,996,368 UART: [fht] FMC Alias Private Key: 7
21,997,846 UART: [art] Derive CDI
21,998,582 UART: [art] Store in in slot 0x4
22,057,783 UART: [art] Derive Key Pair
22,058,788 UART: [art] Store priv key in slot 0x5
24,534,989 UART: [art] Derive Key Pair - Done
24,547,823 UART: [art] Signing Cert with AUTHO
24,549,335 UART: RITY.KEYID = 7
26,260,364 UART: [art] Erasing AUTHORITY.KEYID = 7
26,261,863 UART: [art] PUB.X = E27C94BDD8CEB2B9AEA558A92026D9DEB54FDFA026A37C279A3E0ABFD690EC656D629143D83DA7B1CD138D22527F990B
26,269,131 UART: [art] PUB.Y = 7474AA811FF42169618F4E1B4C1245CB231F7918110860DE1BE9A21D0586A14D9EF5DE7036AB7515B5FCD9E1E64C0E16
26,276,387 UART: [art] SIG.R = E2139700C99EDBF4A087F4BFE72643C6780167E24959CB281EC5926EEE4C873F1ECFC7E89F9602C8B108D9D3CDFEFB4F
26,283,814 UART: [art] SIG.S = 782CBDF302B5273B3F7AB9B07512B30FC9B454E7A6FB4A9B03D4162244BF5BE160F03C976B7430EC50DA48AF7B5DE3A6
27,262,883 UART: Caliptra RT
27,263,566 UART: [state] CFI Enabled
27,428,479 UART: [rt] RT listening for mailbox commands...
27,430,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,586,080 UART: [rt]cmd =0x41544d4e, len=14344
28,553,215 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,439,672 ready_for_fw is high
3,440,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,836,406 >>> mbox cmd response: success
20,131,686 UART:
20,132,084 UART: Running Caliptra FMC ...
20,133,305 UART:
20,133,475 UART: [state] CFI Enabled
20,201,424 UART: [fht] FMC Alias Private Key: 7
21,964,991 UART: [art] Extend RT PCRs Done
21,966,215 UART: [art] Lock RT PCRs Done
21,967,790 UART: [art] Populate DV Done
21,973,308 UART: [fht] FMC Alias Private Key: 7
21,974,793 UART: [art] Derive CDI
21,975,555 UART: [art] Store in in slot 0x4
22,034,588 UART: [art] Derive Key Pair
22,035,593 UART: [art] Store priv key in slot 0x5
24,499,013 UART: [art] Derive Key Pair - Done
24,512,130 UART: [art] Signing Cert with AUTHO
24,513,445 UART: RITY.KEYID = 7
26,224,886 UART: [art] Erasing AUTHORITY.KEYID = 7
26,226,395 UART: [art] PUB.X = 32442443A1DA56449E87E35FE6D814D331EA94D2980524C51FB899028660EE5B935ABB28237183EFBA8D0C9AE6AACEF2
26,233,705 UART: [art] PUB.Y = 75E167CB244424EC579C72F4287DC3CEB788C338FB9E40F360BDCE85198D7371EE883BD6B0C9B073BAFA974C02B0D522
26,240,947 UART: [art] SIG.R = 430D27BE484196E03B57ADD4243306DE0DDCBD6ABDF66A71183BE9690CBACBA49919CD4C090B8EC2FD23DCA17FD2C2F7
26,248,392 UART: [art] SIG.S = D1186A8A23ECAB053D17FC8668567D97B8A02009FB330C80274777098727A061BA413405AB8F6A7B609FAC9A3B5677F1
27,227,391 UART: Caliptra RT
27,228,080 UART: [state] CFI Enabled
27,393,508 UART: [rt] RT listening for mailbox commands...
27,395,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,551,238 UART: [rt]cmd =0x41544d4e, len=14344
28,518,006 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,784 writing to cptra_bootfsm_go
193,052 UART:
193,411 UART: Running Caliptra ROM ...
194,601 UART:
604,217 UART: [state] CFI Enabled
620,919 UART: [state] LifecycleState = Unprovisioned
623,320 UART: [state] DebugLocked = No
625,268 UART: [state] WD Timer not started. Device not locked for debugging
630,573 UART: [kat] SHA2-256
820,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,273 UART: [kat] ++
831,793 UART: [kat] sha1
842,969 UART: [kat] SHA2-256
845,979 UART: [kat] SHA2-384
852,041 UART: [kat] SHA2-512-ACC
854,641 UART: [kat] ECC-384
3,296,332 UART: [kat] HMAC-384Kdf
3,309,536 UART: [kat] LMS
3,841,367 UART: [kat] --
3,846,508 UART: [cold-reset] ++
3,848,370 UART: [fht] FHT @ 0x50003400
3,861,199 UART: [idev] ++
3,861,912 UART: [idev] CDI.KEYID = 6
3,862,841 UART: [idev] SUBJECT.KEYID = 7
3,864,019 UART: [idev] UDS.KEYID = 0
3,864,949 ready_for_fw is high
3,865,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,008,611 UART: [idev] Erasing UDS.KEYID = 0
6,338,520 UART: [idev] Sha1 KeyId Algorithm
6,361,275 UART: [idev] --
6,366,406 UART: [ldev] ++
6,367,089 UART: [ldev] CDI.KEYID = 6
6,368,004 UART: [ldev] SUBJECT.KEYID = 5
6,369,173 UART: [ldev] AUTHORITY.KEYID = 7
6,370,352 UART: [ldev] FE.KEYID = 1
6,380,034 UART: [ldev] Erasing FE.KEYID = 1
8,864,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,915 UART: [ldev] --
10,656,042 UART: [fwproc] Wait for Commands...
10,658,456 UART: [fwproc] Recv command 0x46574c44
10,660,779 UART: [fwproc] Recv'd Img size: 114168 bytes
15,278,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,356,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,472,883 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,015,202 >>> mbox cmd response: success
16,019,384 UART: [afmc] ++
16,020,093 UART: [afmc] CDI.KEYID = 6
16,021,341 UART: [afmc] SUBJECT.KEYID = 7
16,022,778 UART: [afmc] AUTHORITY.KEYID = 5
18,523,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,244,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,246,937 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,262,020 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,277,212 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,292,046 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,316,378 UART: [afmc] --
20,320,665 UART: [cold-reset] --
20,325,131 UART: [state] Locking Datavault
20,328,928 UART: [state] Locking PCR0, PCR1 and PCR31
20,331,068 UART: [state] Locking ICCM
20,332,679 UART: [exit] Launching FMC @ 0x40000130
20,341,361 UART:
20,341,599 UART: Running Caliptra FMC ...
20,342,702 UART:
20,342,859 UART: [state] CFI Enabled
20,350,850 UART: [fht] FMC Alias Private Key: 7
22,108,099 UART: [art] Extend RT PCRs Done
22,109,320 UART: [art] Lock RT PCRs Done
22,110,924 UART: [art] Populate DV Done
22,116,338 UART: [fht] FMC Alias Private Key: 7
22,118,042 UART: [art] Derive CDI
22,118,862 UART: [art] Store in in slot 0x4
22,161,311 UART: [art] Derive Key Pair
22,162,353 UART: [art] Store priv key in slot 0x5
24,588,757 UART: [art] Derive Key Pair - Done
24,601,760 UART: [art] Signing Cert with AUTHO
24,603,058 UART: RITY.KEYID = 7
26,308,260 UART: [art] Erasing AUTHORITY.KEYID = 7
26,309,761 UART: [art] PUB.X = 01054B35C4DD675222A71020497333AD9EC7CAC289377B7FC3DEAA4556EB0A70CAD720805430C8F5CBAD3DCB4273DDE6
26,317,057 UART: [art] PUB.Y = D9C60C1132C7A5AF4700AE5AC02AFA0D82D33DA22FAE15BD3CF8867F0BD8AD1EE2DE664D5F28CE220D16A594348EE6D3
26,324,347 UART: [art] SIG.R = FFECAEAA32BF7F9D78C408A071FFD5E168E0001A32F3A9C8A072AD775E38E59D05680638B1FA84E29805856CE4B97763
26,331,693 UART: [art] SIG.S = A18C0BCBE7295FC26EEDA9F0A3BCDAF2198C210C933E3BDF2AB8478E5B4D266187695D1F934AD6B88B8A22A5FCDA6818
27,310,256 UART: Caliptra RT
27,310,968 UART: [state] CFI Enabled
27,428,970 UART: [rt] RT listening for mailbox commands...
27,431,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,586,367 UART: [rt]cmd =0x41544d4e, len=14344
28,553,239 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,744 writing to cptra_bootfsm_go
3,756,545 ready_for_fw is high
3,757,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,051,478 >>> mbox cmd response: success
20,294,770 UART:
20,295,159 UART: Running Caliptra FMC ...
20,296,351 UART:
20,296,519 UART: [state] CFI Enabled
20,304,454 UART: [fht] FMC Alias Private Key: 7
22,061,197 UART: [art] Extend RT PCRs Done
22,062,426 UART: [art] Lock RT PCRs Done
22,064,008 UART: [art] Populate DV Done
22,069,361 UART: [fht] FMC Alias Private Key: 7
22,070,848 UART: [art] Derive CDI
22,071,619 UART: [art] Store in in slot 0x4
22,114,460 UART: [art] Derive Key Pair
22,115,500 UART: [art] Store priv key in slot 0x5
24,542,135 UART: [art] Derive Key Pair - Done
24,554,912 UART: [art] Signing Cert with AUTHO
24,556,204 UART: RITY.KEYID = 7
26,261,105 UART: [art] Erasing AUTHORITY.KEYID = 7
26,262,618 UART: [art] PUB.X = BAC3D5526AEAD6CCC4FF4BFB5EF4BB7F4A89C787AD8EF9FB0CE04B9C5D28C96E65B0D5E5B25DA5E299D92FC807BCABF1
26,269,919 UART: [art] PUB.Y = 16A29805E401943DA7E8A31153578F9EAC03FB09B47417BE5E602C6799B6877353188ABECD829F7ECE90645D84CF5D48
26,277,180 UART: [art] SIG.R = 2027301AAEE5221227AD450F00B621AAA85F1776BD9A1FE9EB912D85DE0C76858766F08742D3BA0D4D86A52C8BE0B958
26,284,578 UART: [art] SIG.S = B5640D3B8181B4CD257855D920992C9614CA73B51E53044DE1A4C70803D66F5FFF4167897486AE488BF8E719C08DD093
27,262,859 UART: Caliptra RT
27,263,561 UART: [state] CFI Enabled
27,381,017 UART: [rt] RT listening for mailbox commands...
27,383,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,538,667 UART: [rt]cmd =0x41544d4e, len=14344
28,505,606 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,979 UART: [kat] SHA2-256
881,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,025 UART: [kat] ++
886,177 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,218 UART: [kat] LMS
1,475,414 UART: [kat] --
1,476,319 UART: [cold-reset] ++
1,476,667 UART: [fht] Storing FHT @ 0x50003400
1,479,416 UART: [idev] ++
1,479,584 UART: [idev] CDI.KEYID = 6
1,479,944 UART: [idev] SUBJECT.KEYID = 7
1,480,368 UART: [idev] UDS.KEYID = 0
1,480,713 ready_for_fw is high
1,480,713 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,338 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,377 UART: [ldev] ++
1,514,545 UART: [ldev] CDI.KEYID = 6
1,514,908 UART: [ldev] SUBJECT.KEYID = 5
1,515,334 UART: [ldev] AUTHORITY.KEYID = 7
1,515,797 UART: [ldev] FE.KEYID = 1
1,521,155 UART: [ldev] Erasing FE.KEYID = 1
1,546,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,718 UART: [ldev] --
1,586,231 UART: [fwproc] Waiting for Commands...
1,586,890 UART: [fwproc] Received command 0x46574c44
1,587,681 UART: [fwproc] Received Image of size 114168 bytes
4,969,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
4,996,482 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,025,834 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,161,557 >>> mbox cmd response: success
5,162,687 UART: [afmc] ++
5,162,855 UART: [afmc] CDI.KEYID = 6
5,163,217 UART: [afmc] SUBJECT.KEYID = 7
5,163,642 UART: [afmc] AUTHORITY.KEYID = 5
5,199,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,215,392 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,216,172 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,221,881 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,227,773 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,233,474 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,241,482 UART: [afmc] --
5,242,562 UART: [cold-reset] --
5,243,324 UART: [state] Locking Datavault
5,244,441 UART: [state] Locking PCR0, PCR1 and PCR31
5,245,045 UART: [state] Locking ICCM
5,245,671 UART: [exit] Launching FMC @ 0x40000130
5,251,000 UART:
5,251,016 UART: Running Caliptra FMC ...
5,251,424 UART:
5,251,478 UART: [state] CFI Enabled
5,262,242 UART: [fht] FMC Alias Private Key: 7
5,369,682 UART: [art] Extend RT PCRs Done
5,370,110 UART: [art] Lock RT PCRs Done
5,371,656 UART: [art] Populate DV Done
5,379,784 UART: [fht] FMC Alias Private Key: 7
5,380,834 UART: [art] Derive CDI
5,381,114 UART: [art] Store in in slot 0x4
5,466,765 UART: [art] Derive Key Pair
5,467,125 UART: [art] Store priv key in slot 0x5
5,480,041 UART: [art] Derive Key Pair - Done
5,494,794 UART: [art] Signing Cert with AUTHO
5,495,274 UART: RITY.KEYID = 7
5,510,916 UART: [art] Erasing AUTHORITY.KEYID = 7
5,511,681 UART: [art] PUB.X = F1E7C798622A569CA67CDFE92E91E9C52E800A444E9B196081CE2F00A558249FB528E89A03B2B81C70E64F64028F9426
5,518,420 UART: [art] PUB.Y = B8BE74A2DFF897B0BEAB97B908800D9778567FA201CD78F283AA5A1E7C983E588E1B8A8EA81AD89183841F547DF849ED
5,525,373 UART: [art] SIG.R = BA42AD342BE5FF56479A43074AC43D8265033A8A562D4EC09034C4C53A6FBED07D163A1AE26C32E0F9B4F662A651CFB3
5,532,149 UART: [art] SIG.S = C75FB1C56067F820FAC3CA544AA834C007995FE794D62909D99849384FAA1257CCE61276C4B54DA11E88953B586229ED
5,555,570 UART: Caliptra RT
5,555,823 UART: [state] CFI Enabled
5,663,195 UART: [rt] RT listening for mailbox commands...
5,663,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,786,975 UART: [rt]cmd =0x41544d4e, len=14344
5,795,247 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,967 ready_for_fw is high
1,362,967 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,276,372 >>> mbox cmd response: success
5,337,537 UART:
5,337,553 UART: Running Caliptra FMC ...
5,337,961 UART:
5,338,015 UART: [state] CFI Enabled
5,348,241 UART: [fht] FMC Alias Private Key: 7
5,456,227 UART: [art] Extend RT PCRs Done
5,456,655 UART: [art] Lock RT PCRs Done
5,458,207 UART: [art] Populate DV Done
5,466,363 UART: [fht] FMC Alias Private Key: 7
5,467,481 UART: [art] Derive CDI
5,467,761 UART: [art] Store in in slot 0x4
5,553,082 UART: [art] Derive Key Pair
5,553,442 UART: [art] Store priv key in slot 0x5
5,566,254 UART: [art] Derive Key Pair - Done
5,581,257 UART: [art] Signing Cert with AUTHO
5,581,737 UART: RITY.KEYID = 7
5,596,869 UART: [art] Erasing AUTHORITY.KEYID = 7
5,597,634 UART: [art] PUB.X = BC387A764BF15C7853D957D5F68B2228A548B631E27088BFE152EA6421B38FC4FBB7B5523FA7342B47FAA223C4BB00A4
5,604,390 UART: [art] PUB.Y = 0C03A96160F7F7AF139A2CCF1480DF7801D76212E48DD1C48F416C3B65C562071F152645012F62F310D174684594FF76
5,611,317 UART: [art] SIG.R = DAB61410710B498D22D6F93D41D512EF88544E8F480A72BCE189DDA79DA20643EEF90D0112FED742C6C12A040D75F62A
5,618,074 UART: [art] SIG.S = BC73FE111B9004FAF4429662C3E99C49955E2E8E9B7E08CBBCA670FC740C41341AC3421DA8D40E3B83F7C69CA47A69A4
5,641,901 UART: Caliptra RT
5,642,154 UART: [state] CFI Enabled
5,749,880 UART: [rt] RT listening for mailbox commands...
5,750,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,873,556 UART: [rt]cmd =0x41544d4e, len=14344
5,882,014 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,450 UART: [kat] SHA2-256
882,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,496 UART: [kat] ++
886,648 UART: [kat] sha1
890,642 UART: [kat] SHA2-256
892,580 UART: [kat] SHA2-384
895,315 UART: [kat] SHA2-512-ACC
897,216 UART: [kat] ECC-384
902,759 UART: [kat] HMAC-384Kdf
907,579 UART: [kat] LMS
1,475,775 UART: [kat] --
1,476,934 UART: [cold-reset] ++
1,477,512 UART: [fht] Storing FHT @ 0x50003400
1,480,291 UART: [idev] ++
1,480,459 UART: [idev] CDI.KEYID = 6
1,480,819 UART: [idev] SUBJECT.KEYID = 7
1,481,243 UART: [idev] UDS.KEYID = 0
1,481,588 ready_for_fw is high
1,481,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,175 UART: [idev] Erasing UDS.KEYID = 0
1,506,043 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,543 UART: [idev] --
1,515,724 UART: [ldev] ++
1,515,892 UART: [ldev] CDI.KEYID = 6
1,516,255 UART: [ldev] SUBJECT.KEYID = 5
1,516,681 UART: [ldev] AUTHORITY.KEYID = 7
1,517,144 UART: [ldev] FE.KEYID = 1
1,522,432 UART: [ldev] Erasing FE.KEYID = 1
1,548,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,203 UART: [ldev] --
1,587,626 UART: [fwproc] Waiting for Commands...
1,588,481 UART: [fwproc] Received command 0x46574c44
1,589,272 UART: [fwproc] Received Image of size 114168 bytes
5,309,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,337,746 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,367,098 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,502,809 >>> mbox cmd response: success
5,503,867 UART: [afmc] ++
5,504,035 UART: [afmc] CDI.KEYID = 6
5,504,397 UART: [afmc] SUBJECT.KEYID = 7
5,504,822 UART: [afmc] AUTHORITY.KEYID = 5
5,539,828 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,555,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,556,686 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,562,395 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,568,287 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,573,988 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,581,866 UART: [afmc] --
5,582,934 UART: [cold-reset] --
5,583,886 UART: [state] Locking Datavault
5,584,945 UART: [state] Locking PCR0, PCR1 and PCR31
5,585,549 UART: [state] Locking ICCM
5,585,999 UART: [exit] Launching FMC @ 0x40000130
5,591,328 UART:
5,591,344 UART: Running Caliptra FMC ...
5,591,752 UART:
5,591,895 UART: [state] CFI Enabled
5,602,725 UART: [fht] FMC Alias Private Key: 7
5,710,839 UART: [art] Extend RT PCRs Done
5,711,267 UART: [art] Lock RT PCRs Done
5,712,953 UART: [art] Populate DV Done
5,721,277 UART: [fht] FMC Alias Private Key: 7
5,722,441 UART: [art] Derive CDI
5,722,721 UART: [art] Store in in slot 0x4
5,807,968 UART: [art] Derive Key Pair
5,808,328 UART: [art] Store priv key in slot 0x5
5,821,700 UART: [art] Derive Key Pair - Done
5,836,596 UART: [art] Signing Cert with AUTHO
5,837,076 UART: RITY.KEYID = 7
5,852,680 UART: [art] Erasing AUTHORITY.KEYID = 7
5,853,445 UART: [art] PUB.X = F5FC60CD128E011FD06E8A16A444A6DF99B11930893F68420FA2030E48FF719F1CC6AEAA99BBD62E51A384FB17669D32
5,860,213 UART: [art] PUB.Y = FD1D806EDCA2B0E01375361687F53B14EAB7EBF67644D9AC967751C8CAFFEBF1838886857040146F39179124EEB4C73B
5,867,169 UART: [art] SIG.R = 79A000F12CBC9CA887F8EEE2BC5A81D7FCB9C81195C44A2F2F64152F0071CD251CA49E301F28D441E16152E8B2A4E1AA
5,873,909 UART: [art] SIG.S = CEB507D9AADDE00277E9C605DA3C3576D2B149A696807F60EF5201B127DB6A8F0DE233F531F389CF36F81E9AC05A861B
5,897,783 UART: Caliptra RT
5,898,128 UART: [state] CFI Enabled
6,005,751 UART: [rt] RT listening for mailbox commands...
6,006,421 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,129,463 UART: [rt]cmd =0x41544d4e, len=14344
6,138,145 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,282 ready_for_fw is high
1,363,282 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,199,975 >>> mbox cmd response: success
5,261,464 UART:
5,261,480 UART: Running Caliptra FMC ...
5,261,888 UART:
5,262,031 UART: [state] CFI Enabled
5,272,741 UART: [fht] FMC Alias Private Key: 7
5,380,887 UART: [art] Extend RT PCRs Done
5,381,315 UART: [art] Lock RT PCRs Done
5,382,989 UART: [art] Populate DV Done
5,391,245 UART: [fht] FMC Alias Private Key: 7
5,392,323 UART: [art] Derive CDI
5,392,603 UART: [art] Store in in slot 0x4
5,478,258 UART: [art] Derive Key Pair
5,478,618 UART: [art] Store priv key in slot 0x5
5,492,380 UART: [art] Derive Key Pair - Done
5,506,957 UART: [art] Signing Cert with AUTHO
5,507,437 UART: RITY.KEYID = 7
5,522,927 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,692 UART: [art] PUB.X = 8D7C83FF34A11B5BB908659F9142B4F45F3F8D8401A47A53A0E8D4D9C5E8C396CBB1CF0193688B0A6B33538E746619A0
5,530,454 UART: [art] PUB.Y = C863284256CBA27C06D105EB923486F7F7725950D0E59D22C34A97DD0617BA2BF4F1064F5DD18CAB97662DDB90EB3151
5,537,396 UART: [art] SIG.R = FCCBC150A2A0613CCCC1945E97FF3C965EC91301C4BE302F8496E64E64A9BC9B9549DDE6372B9A87BCAEA8420A2B0983
5,544,173 UART: [art] SIG.S = BBA6C7C73CECD8D907A6B34A074CF267523E3105E600536C437A01AB68C8CED702AB5E3C9724AB63CD0B72F5A36A1218
5,567,400 UART: Caliptra RT
5,567,745 UART: [state] CFI Enabled
5,675,707 UART: [rt] RT listening for mailbox commands...
5,676,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,521 UART: [rt]cmd =0x41544d4e, len=14344
5,808,029 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
893,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,347 UART: [kat] ++
897,499 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,532 UART: [kat] SHA2-512-ACC
908,433 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,363 UART: [fht] FHT @ 0x50003400
1,175,020 UART: [idev] ++
1,175,188 UART: [idev] CDI.KEYID = 6
1,175,548 UART: [idev] SUBJECT.KEYID = 7
1,175,972 UART: [idev] UDS.KEYID = 0
1,176,317 ready_for_fw is high
1,176,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,144 UART: [idev] Erasing UDS.KEYID = 0
1,200,631 UART: [idev] Sha1 KeyId Algorithm
1,209,043 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,765 UART: [ldev] --
1,281,270 UART: [fwproc] Wait for Commands...
1,281,972 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,316,093 >>> mbox cmd response: success
3,317,127 UART: [afmc] ++
3,317,295 UART: [afmc] CDI.KEYID = 6
3,317,657 UART: [afmc] SUBJECT.KEYID = 7
3,318,082 UART: [afmc] AUTHORITY.KEYID = 5
3,352,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,031 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,740 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,632 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,343 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,388 UART: [afmc] --
3,396,478 UART: [cold-reset] --
3,397,244 UART: [state] Locking Datavault
3,398,285 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,889 UART: [state] Locking ICCM
3,399,319 UART: [exit] Launching FMC @ 0x40000130
3,404,648 UART:
3,404,664 UART: Running Caliptra FMC ...
3,405,072 UART:
3,405,126 UART: [state] CFI Enabled
3,415,284 UART: [fht] FMC Alias Private Key: 7
3,523,460 UART: [art] Extend RT PCRs Done
3,523,888 UART: [art] Lock RT PCRs Done
3,525,216 UART: [art] Populate DV Done
3,533,476 UART: [fht] FMC Alias Private Key: 7
3,534,418 UART: [art] Derive CDI
3,534,698 UART: [art] Store in in slot 0x4
3,620,671 UART: [art] Derive Key Pair
3,621,031 UART: [art] Store priv key in slot 0x5
3,634,299 UART: [art] Derive Key Pair - Done
3,649,007 UART: [art] Signing Cert with AUTHO
3,649,487 UART: RITY.KEYID = 7
3,664,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,050 UART: [art] PUB.X = 6177E221E1BBF767D02D5494E4173CDBA82BE3D929014C22F867DA14F260F415575B47A53F598275BF35C138A3E5C745
3,671,815 UART: [art] PUB.Y = 4AC3FB07294EEB7FCBE231169B5ADA364628F1E1A156E2FF071C4E95F5ABD51D3B024D5E60DD267CEE508313B095A2F9
3,678,772 UART: [art] SIG.R = 823D36B85DADDF31A747E81AE911BA7C997107B3E5F5BB592619233D1CCEE81D610AA0B4217345B963D086D8F98EE990
3,685,542 UART: [art] SIG.S = BB17D22F7454E805F77F1DE2906D2A16308BF0906E6CA75EFD5B8DBFD1962B35A9EAF3884317C1C51E3F44BEE96334EB
3,709,702 UART: Caliptra RT
3,709,955 UART: [state] CFI Enabled
3,818,136 UART: [rt] RT listening for mailbox commands...
3,818,806 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,220 UART: [rt]cmd =0x41544d4e, len=14344
3,950,548 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 ready_for_fw is high
1,060,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,177,041 >>> mbox cmd response: success
3,239,656 UART:
3,239,672 UART: Running Caliptra FMC ...
3,240,080 UART:
3,240,134 UART: [state] CFI Enabled
3,250,476 UART: [fht] FMC Alias Private Key: 7
3,358,190 UART: [art] Extend RT PCRs Done
3,358,618 UART: [art] Lock RT PCRs Done
3,360,064 UART: [art] Populate DV Done
3,368,612 UART: [fht] FMC Alias Private Key: 7
3,369,652 UART: [art] Derive CDI
3,369,932 UART: [art] Store in in slot 0x4
3,455,371 UART: [art] Derive Key Pair
3,455,731 UART: [art] Store priv key in slot 0x5
3,469,105 UART: [art] Derive Key Pair - Done
3,483,931 UART: [art] Signing Cert with AUTHO
3,484,411 UART: RITY.KEYID = 7
3,499,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,499,882 UART: [art] PUB.X = B74C2E428850E37F0060313E43001258F1351AD05E16ECBB342888959718B7BC79FC40503278DF52BA4313317BFAAB81
3,506,602 UART: [art] PUB.Y = 4BD9D1D16E084A6AB361A3D379A5B0874A8DE722B53DD172C445AAE081CDFD3CE3501638B70442D58F0856B6FC70D8CB
3,513,555 UART: [art] SIG.R = CFF8EC3359AD4E19B7D4AB3F035C7CD09DDE162CAEF76D102BB6C7CD86309D8923547BCD5D9A59CDD65D826A36068C81
3,520,339 UART: [art] SIG.S = 37D28666681BDEAEEA3BA0A2F1EC3DE2600C849B77D668199E2CEFDCDD41EDCA1A73EF4677C0A74BCC749D5014F8E816
3,543,835 UART: Caliptra RT
3,544,088 UART: [state] CFI Enabled
3,652,264 UART: [rt] RT listening for mailbox commands...
3,652,934 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,106 UART: [rt]cmd =0x41544d4e, len=14344
3,784,044 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,298 UART: [kat] SHA2-256
904,238 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,299 UART: [kat] HMAC-384Kdf
922,915 UART: [kat] LMS
1,171,243 UART: [kat] --
1,172,046 UART: [cold-reset] ++
1,172,416 UART: [fht] FHT @ 0x50003400
1,175,137 UART: [idev] ++
1,175,305 UART: [idev] CDI.KEYID = 6
1,175,665 UART: [idev] SUBJECT.KEYID = 7
1,176,089 UART: [idev] UDS.KEYID = 0
1,176,434 ready_for_fw is high
1,176,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,921 UART: [idev] Erasing UDS.KEYID = 0
1,201,302 UART: [idev] Sha1 KeyId Algorithm
1,209,886 UART: [idev] --
1,210,860 UART: [ldev] ++
1,211,028 UART: [ldev] CDI.KEYID = 6
1,211,391 UART: [ldev] SUBJECT.KEYID = 5
1,211,817 UART: [ldev] AUTHORITY.KEYID = 7
1,212,280 UART: [ldev] FE.KEYID = 1
1,217,350 UART: [ldev] Erasing FE.KEYID = 1
1,243,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,014 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,055 UART: [fwproc] Recv command 0x46574c44
1,284,783 UART: [fwproc] Recv'd Img size: 114168 bytes
3,129,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,157,923 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,187,227 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,322,806 >>> mbox cmd response: success
3,323,874 UART: [afmc] ++
3,324,042 UART: [afmc] CDI.KEYID = 6
3,324,404 UART: [afmc] SUBJECT.KEYID = 7
3,324,829 UART: [afmc] AUTHORITY.KEYID = 5
3,360,741 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,230 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,383,939 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,389,831 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,395,542 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,403,485 UART: [afmc] --
3,404,371 UART: [cold-reset] --
3,405,163 UART: [state] Locking Datavault
3,406,606 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,210 UART: [state] Locking ICCM
3,407,644 UART: [exit] Launching FMC @ 0x40000130
3,412,973 UART:
3,412,989 UART: Running Caliptra FMC ...
3,413,397 UART:
3,413,540 UART: [state] CFI Enabled
3,424,108 UART: [fht] FMC Alias Private Key: 7
3,531,820 UART: [art] Extend RT PCRs Done
3,532,248 UART: [art] Lock RT PCRs Done
3,533,870 UART: [art] Populate DV Done
3,542,348 UART: [fht] FMC Alias Private Key: 7
3,543,518 UART: [art] Derive CDI
3,543,798 UART: [art] Store in in slot 0x4
3,629,545 UART: [art] Derive Key Pair
3,629,905 UART: [art] Store priv key in slot 0x5
3,643,487 UART: [art] Derive Key Pair - Done
3,658,449 UART: [art] Signing Cert with AUTHO
3,658,929 UART: RITY.KEYID = 7
3,674,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,962 UART: [art] PUB.X = B842E594052BDD6E67F691C8D97A9F4FE29672774938F55487918BB9EA2C95E1E9FCC7DE8E914186174DDE0BF3C361DE
3,681,734 UART: [art] PUB.Y = DFAF3783630213AB1AE366034241BA2708974B6965B02B648858CF180D04E5E16AFDBC808E076FC478470E555679ED65
3,688,659 UART: [art] SIG.R = A565B6094D69B879619BC844B5E222D68F225B24903E7C778CC3744BE24C6063AD245266C0CCCEE3B111D07492F48EDE
3,695,428 UART: [art] SIG.S = C4938048ED24293F6A3FBD067E1D6F3EE4016266CD09A1C2408114519DFA14AE13DEDE87BE3B40B5CCA8B475AFB38BB0
3,719,302 UART: Caliptra RT
3,719,647 UART: [state] CFI Enabled
3,827,448 UART: [rt] RT listening for mailbox commands...
3,828,118 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,951,154 UART: [rt]cmd =0x41544d4e, len=14344
3,959,888 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,958 ready_for_fw is high
1,060,958 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,154,517 >>> mbox cmd response: success
3,216,862 UART:
3,216,878 UART: Running Caliptra FMC ...
3,217,286 UART:
3,217,429 UART: [state] CFI Enabled
3,228,045 UART: [fht] FMC Alias Private Key: 7
3,335,915 UART: [art] Extend RT PCRs Done
3,336,343 UART: [art] Lock RT PCRs Done
3,338,107 UART: [art] Populate DV Done
3,346,391 UART: [fht] FMC Alias Private Key: 7
3,347,535 UART: [art] Derive CDI
3,347,815 UART: [art] Store in in slot 0x4
3,433,654 UART: [art] Derive Key Pair
3,434,014 UART: [art] Store priv key in slot 0x5
3,447,546 UART: [art] Derive Key Pair - Done
3,462,354 UART: [art] Signing Cert with AUTHO
3,462,834 UART: RITY.KEYID = 7
3,477,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,478,593 UART: [art] PUB.X = F5972ED2E200B87B63E427159A384A5160AF956952044A9EFAC0B57523C7510F4D889ACCC1C9393BAD534EB863D71E85
3,485,337 UART: [art] PUB.Y = D530DA97F37F997B076AE18241133B8465F41D8A8979C10A22C556C5DFE2110A4A479B3D51914FA5BA202F1238B3231E
3,492,276 UART: [art] SIG.R = 77BDFDB9DA32AD5A3F222D739951A16217ADF8D96617D854F94CCD3E462E30BAF10800FF97FCF1B2767FF07321BFB039
3,499,035 UART: [art] SIG.S = CE033E93514E0C89DAB1D101B484412D890A4FFD7C000D80553F07E663618FE2EBA166F9A244B06B4D854C32CB443095
3,522,890 UART: Caliptra RT
3,523,235 UART: [state] CFI Enabled
3,631,027 UART: [rt] RT listening for mailbox commands...
3,631,697 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,754,745 UART: [rt]cmd =0x41544d4e, len=14344
3,763,395 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,669 UART: [kat] ++
895,821 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,265 UART: [fht] FHT @ 0x50003400
1,172,907 UART: [idev] ++
1,173,075 UART: [idev] CDI.KEYID = 6
1,173,436 UART: [idev] SUBJECT.KEYID = 7
1,173,861 UART: [idev] UDS.KEYID = 0
1,174,207 ready_for_fw is high
1,174,207 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,953 UART: [idev] Erasing UDS.KEYID = 0
1,198,851 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,278 UART: [ldev] --
1,281,620 UART: [fwproc] Wait for Commands...
1,282,445 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 114168 bytes
3,132,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,190,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,325,680 >>> mbox cmd response: success
3,326,809 UART: [afmc] ++
3,326,977 UART: [afmc] CDI.KEYID = 6
3,327,340 UART: [afmc] SUBJECT.KEYID = 7
3,327,766 UART: [afmc] AUTHORITY.KEYID = 5
3,363,566 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,813 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,523 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,413 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,398,124 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,772 UART: [afmc] --
3,406,744 UART: [cold-reset] --
3,407,722 UART: [state] Locking Datavault
3,408,597 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,201 UART: [state] Locking ICCM
3,409,797 UART: [exit] Launching FMC @ 0x40000130
3,415,126 UART:
3,415,142 UART: Running Caliptra FMC ...
3,415,550 UART:
3,415,604 UART: [state] CFI Enabled
3,426,060 UART: [fht] FMC Alias Private Key: 7
3,533,396 UART: [art] Extend RT PCRs Done
3,533,824 UART: [art] Lock RT PCRs Done
3,535,320 UART: [art] Populate DV Done
3,543,562 UART: [fht] FMC Alias Private Key: 7
3,544,684 UART: [art] Derive CDI
3,544,964 UART: [art] Store in in slot 0x4
3,630,249 UART: [art] Derive Key Pair
3,630,609 UART: [art] Store priv key in slot 0x5
3,644,007 UART: [art] Derive Key Pair - Done
3,658,381 UART: [art] Signing Cert with AUTHO
3,658,861 UART: RITY.KEYID = 7
3,673,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,674,504 UART: [art] PUB.X = 7114E5322C6006A5A939B1DEC2D81467E4D53F7DA867BCBE69C24F9841C9EF51AD3239D7AB613F295B6DDB194A160EF3
3,681,278 UART: [art] PUB.Y = 3CA7606616A4275C85937B951069B7B7C8F9462BEF66C82305F7F5010E853DFB2BD2DA13DEF20806179D4307551FC404
3,688,203 UART: [art] SIG.R = 882D1B77D40CB578592DCB9D4826219EA10AB9426053C0AABC7EAEEA4801D2AD522EECD0772DFFD3B02B1EAD77FAA406
3,694,983 UART: [art] SIG.S = 6A7338FF4767CA3F556BA03005E8FE364539E5CF6D2D3EECD08781715A294351A0BCFD2F27A629432B4C970902441E48
3,718,553 UART: Caliptra RT
3,718,806 UART: [state] CFI Enabled
3,826,586 UART: [rt] RT listening for mailbox commands...
3,827,256 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,950,156 UART: [rt]cmd =0x41544d4e, len=14344
3,959,130 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,174 ready_for_fw is high
1,056,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,151,120 >>> mbox cmd response: success
3,213,061 UART:
3,213,077 UART: Running Caliptra FMC ...
3,213,485 UART:
3,213,539 UART: [state] CFI Enabled
3,224,047 UART: [fht] FMC Alias Private Key: 7
3,331,953 UART: [art] Extend RT PCRs Done
3,332,381 UART: [art] Lock RT PCRs Done
3,333,985 UART: [art] Populate DV Done
3,342,039 UART: [fht] FMC Alias Private Key: 7
3,343,077 UART: [art] Derive CDI
3,343,357 UART: [art] Store in in slot 0x4
3,428,698 UART: [art] Derive Key Pair
3,429,058 UART: [art] Store priv key in slot 0x5
3,442,308 UART: [art] Derive Key Pair - Done
3,457,328 UART: [art] Signing Cert with AUTHO
3,457,808 UART: RITY.KEYID = 7
3,473,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,473,845 UART: [art] PUB.X = 6236253043AFE2F02764940CFFF81F53ED030EA7A141D2DDE3C3C40F8937FCAB246FCAC9B8D551ACD402C8B6EE439F07
3,480,613 UART: [art] PUB.Y = 390D11AC93726532498813F7A7F9873D6FE8B0C8F27BF768FD28CA43A47CE6DCDB17686B46CD829EDB4FB3F1AF0EADEB
3,487,577 UART: [art] SIG.R = 44CD0F097E91894D86B11624EB60668E4C7A56A7260AEAE6CC13A4623F66C68FFCC94338BB2B624CC41A98564EF8B5FD
3,494,348 UART: [art] SIG.S = 96D44B785FE69D433B66A4D2157702943C6C46B204482997BF566E4F5B41AF39FD69DF9EF142654604AAC7968921EE05
3,517,735 UART: Caliptra RT
3,517,988 UART: [state] CFI Enabled
3,626,184 UART: [rt] RT listening for mailbox commands...
3,626,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,750,136 UART: [rt]cmd =0x41544d4e, len=14344
3,758,208 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,726 UART: [kat] ++
895,878 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,917 UART: [kat] SHA2-512-ACC
906,818 UART: [kat] ECC-384
916,633 UART: [kat] HMAC-384Kdf
921,333 UART: [kat] LMS
1,169,645 UART: [kat] --
1,170,666 UART: [cold-reset] ++
1,171,186 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,175,046 ready_for_fw is high
1,175,046 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,754 UART: [idev] Erasing UDS.KEYID = 0
1,200,422 UART: [idev] Sha1 KeyId Algorithm
1,209,236 UART: [idev] --
1,210,227 UART: [ldev] ++
1,210,395 UART: [ldev] CDI.KEYID = 6
1,210,759 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,273 UART: [ldev] --
1,282,655 UART: [fwproc] Wait for Commands...
1,283,244 UART: [fwproc] Recv command 0x46574c44
1,283,977 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,152,126 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,181,435 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,316,927 >>> mbox cmd response: success
3,317,966 UART: [afmc] ++
3,318,134 UART: [afmc] CDI.KEYID = 6
3,318,497 UART: [afmc] SUBJECT.KEYID = 7
3,318,923 UART: [afmc] AUTHORITY.KEYID = 5
3,353,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,371,132 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,842 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,732 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,443 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,396,331 UART: [afmc] --
3,397,247 UART: [cold-reset] --
3,397,989 UART: [state] Locking Datavault
3,398,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,470 UART: [state] Locking ICCM
3,400,060 UART: [exit] Launching FMC @ 0x40000130
3,405,389 UART:
3,405,405 UART: Running Caliptra FMC ...
3,405,813 UART:
3,405,956 UART: [state] CFI Enabled
3,416,374 UART: [fht] FMC Alias Private Key: 7
3,523,758 UART: [art] Extend RT PCRs Done
3,524,186 UART: [art] Lock RT PCRs Done
3,525,734 UART: [art] Populate DV Done
3,534,104 UART: [fht] FMC Alias Private Key: 7
3,535,270 UART: [art] Derive CDI
3,535,550 UART: [art] Store in in slot 0x4
3,621,199 UART: [art] Derive Key Pair
3,621,559 UART: [art] Store priv key in slot 0x5
3,634,261 UART: [art] Derive Key Pair - Done
3,648,775 UART: [art] Signing Cert with AUTHO
3,649,255 UART: RITY.KEYID = 7
3,664,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,518 UART: [art] PUB.X = 3372546500B510B07320361727B7CF7CF91E7F7AFE1F401AFCA82350F3A4481C8A526F4FAFDF23FA3B24E8D9EB65CED2
3,672,278 UART: [art] PUB.Y = 89580CDA97D2035BC620748E852280262FBF22FFFDB1C37C6C1B3DC8918BC5A557E0375F7C0488BAFE34075AF660CF40
3,679,224 UART: [art] SIG.R = 5F3B61E98EEF7DAA625BF27D67577075EB4504C58ADCBC20CEAB5F5BDBEA699714FF14AAEA5A4A1EEB4B27E6DFF442F2
3,686,023 UART: [art] SIG.S = 1948E5FB36DD37E26DC9E714794B2830B744A1DE2FFC326FAA528C03521060EDA79028D26A1A227AD29C28EF21020B02
3,709,960 UART: Caliptra RT
3,710,305 UART: [state] CFI Enabled
3,817,118 UART: [rt] RT listening for mailbox commands...
3,817,788 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,906 UART: [rt]cmd =0x41544d4e, len=14344
3,949,316 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,585 ready_for_fw is high
1,056,585 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,159,900 >>> mbox cmd response: success
3,222,351 UART:
3,222,367 UART: Running Caliptra FMC ...
3,222,775 UART:
3,222,918 UART: [state] CFI Enabled
3,233,530 UART: [fht] FMC Alias Private Key: 7
3,341,534 UART: [art] Extend RT PCRs Done
3,341,962 UART: [art] Lock RT PCRs Done
3,343,284 UART: [art] Populate DV Done
3,351,458 UART: [fht] FMC Alias Private Key: 7
3,352,528 UART: [art] Derive CDI
3,352,808 UART: [art] Store in in slot 0x4
3,438,501 UART: [art] Derive Key Pair
3,438,861 UART: [art] Store priv key in slot 0x5
3,452,265 UART: [art] Derive Key Pair - Done
3,467,090 UART: [art] Signing Cert with AUTHO
3,467,570 UART: RITY.KEYID = 7
3,483,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,783 UART: [art] PUB.X = 020131800A11299B1B41BCD4C121AA02E47ACD136C3BDFC5D9BC1E7C5FFF7967AB51BD850E74A6B5BE6082867DF18CF7
3,490,554 UART: [art] PUB.Y = 4EE1E8C220D034B154AAE04096FE316E4269D569C643D1AE9714951C1894D3145696DE2669E3DCD63327197E55942674
3,497,494 UART: [art] SIG.R = FF7A3B6E293E7F2DB3A55BF45BBAE0792CF1119880D102524FF660AC7CCD5756BF52A56E5CCB7AA29F691CADA9730606
3,504,273 UART: [art] SIG.S = F19D9CA691E1CE30E7F820F1C8B2AAB074194CA33F11E58E2CF60B7A0AD61178E253BB19D7F2797EECC629A000FBEB2A
3,528,032 UART: Caliptra RT
3,528,377 UART: [state] CFI Enabled
3,637,226 UART: [rt] RT listening for mailbox commands...
3,637,896 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,760,998 UART: [rt]cmd =0x41544d4e, len=14344
3,769,732 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,013 UART:
192,387 UART: Running Caliptra ROM ...
193,495 UART:
193,641 UART: [state] CFI Enabled
262,648 UART: [state] LifecycleState = Unprovisioned
264,642 UART: [state] DebugLocked = No
267,158 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,822 UART: [kat] SHA2-256
441,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,008 UART: [kat] ++
452,453 UART: [kat] sha1
463,390 UART: [kat] SHA2-256
466,035 UART: [kat] SHA2-384
471,735 UART: [kat] SHA2-512-ACC
474,093 UART: [kat] ECC-384
2,768,057 UART: [kat] HMAC-384Kdf
2,798,679 UART: [kat] LMS
3,988,976 UART: [kat] --
3,992,224 UART: [cold-reset] ++
3,994,718 UART: [fht] Storing FHT @ 0x50003400
4,006,471 UART: [idev] ++
4,007,040 UART: [idev] CDI.KEYID = 6
4,008,070 UART: [idev] SUBJECT.KEYID = 7
4,009,262 UART: [idev] UDS.KEYID = 0
4,010,570 ready_for_fw is high
4,010,804 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,928 UART: [idev] Erasing UDS.KEYID = 0
7,343,363 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,597 UART: [idev] --
7,368,884 UART: [ldev] ++
7,369,503 UART: [ldev] CDI.KEYID = 6
7,370,583 UART: [ldev] SUBJECT.KEYID = 5
7,371,699 UART: [ldev] AUTHORITY.KEYID = 7
7,372,925 UART: [ldev] FE.KEYID = 1
7,398,633 UART: [ldev] Erasing FE.KEYID = 1
10,729,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,905 UART: [ldev] --
13,093,787 UART: [fwproc] Waiting for Commands...
13,096,793 UART: [fwproc] Received command 0x46574c44
13,098,964 UART: [fwproc] Received Image of size 113844 bytes
17,146,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,938 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,797 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,603,956 >>> mbox cmd response: success
17,607,303 UART: [afmc] ++
17,607,899 UART: [afmc] CDI.KEYID = 6
17,608,809 UART: [afmc] SUBJECT.KEYID = 7
17,610,073 UART: [afmc] AUTHORITY.KEYID = 5
20,983,332 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,677 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,935 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,424 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,194 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,647 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,347,407 UART: [afmc] --
23,351,428 UART: [cold-reset] --
23,356,685 UART: [state] Locking Datavault
23,362,204 UART: [state] Locking PCR0, PCR1 and PCR31
23,363,955 UART: [state] Locking ICCM
23,366,040 UART: [exit] Launching FMC @ 0x40000130
23,374,440 UART:
23,374,710 UART: Running Caliptra FMC ...
23,375,741 UART:
23,375,885 UART: [state] CFI Enabled
23,442,315 UART: [fht] FMC Alias Private Key: 7
25,780,368 UART: [art] Extend RT PCRs Done
25,781,583 UART: [art] Lock RT PCRs Done
25,783,261 UART: [art] Populate DV Done
25,788,725 UART: [fht] FMC Alias Private Key: 7
25,790,258 UART: [art] Derive CDI
25,791,066 UART: [art] Store in in slot 0x4
25,850,597 UART: [art] Derive Key Pair
25,851,627 UART: [art] Store priv key in slot 0x5
29,144,428 UART: [art] Derive Key Pair - Done
29,157,372 UART: [art] Signing Cert with AUTHO
29,158,672 UART: RITY.KEYID = 7
31,446,918 UART: [art] Erasing AUTHORITY.KEYID = 7
31,448,432 UART: [art] PUB.X = A3D91CF644D7AC6929410417FE34A3B17CE49365D3D4B9BD783274E155F4FE35639DC84DD72188926D2119F792D142BA
31,455,683 UART: [art] PUB.Y = 3EAC0D410845DD42551F160FC4B7258B0ABA92BC1961EAAF3400B0B5EA88AB46AE0276122205FBAF81D7CA026F58E4F7
31,462,946 UART: [art] SIG.R = 267D5EFDC973D2D6070E20D00B2CEA0D04071CB2444AD7DE32F009D6E560B865217DE9EE73F2D0E240041BF80786D60B
31,470,304 UART: [art] SIG.S = D2680AB127CBCDFB8F2724B4551BB87D75D765D6F35B7BECA57F14007DF15B873748919FE4E81925BB831774294B94E6
32,775,819 UART: Caliptra RT
32,776,537 UART: [state] CFI Enabled
32,937,355 UART: [rt] RT listening for mailbox commands...
32,939,693 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,094,686 UART: [rt]cmd =0x41544d4e, len=14344
38,394,794 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,806,626 ready_for_fw is high
3,807,023 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,891,152 >>> mbox cmd response: success
23,588,935 UART:
23,589,314 UART: Running Caliptra FMC ...
23,590,406 UART:
23,590,557 UART: [state] CFI Enabled
23,657,884 UART: [fht] FMC Alias Private Key: 7
25,996,330 UART: [art] Extend RT PCRs Done
25,997,555 UART: [art] Lock RT PCRs Done
25,999,235 UART: [art] Populate DV Done
26,004,303 UART: [fht] FMC Alias Private Key: 7
26,006,002 UART: [art] Derive CDI
26,006,743 UART: [art] Store in in slot 0x4
26,067,460 UART: [art] Derive Key Pair
26,068,515 UART: [art] Store priv key in slot 0x5
29,361,400 UART: [art] Derive Key Pair - Done
29,374,191 UART: [art] Signing Cert with AUTHO
29,375,519 UART: RITY.KEYID = 7
31,662,593 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,100 UART: [art] PUB.X = 829CCC09396AC49DA79D0F2D262DBA637305C6326813BCE2F2611B1E8EE3E8E6C4EB7CDC245CEDB698683E6329E4086A
31,671,304 UART: [art] PUB.Y = AB798B03BC792B8AC2E97243823C40003223093773CAD22004A1610AE6DD77AAFFC7D1C5718C85DA3465229EC9F47D15
31,678,575 UART: [art] SIG.R = 06B9138DD4E4C31474601A767EE9C9ED4DDC651683DA56EAAA818A04FACEF700BA879FE0E64BFBCD776521807047850D
31,685,920 UART: [art] SIG.S = B86925AC4DF6879B3B3D52981C2AB129DBC51128CC3E7AF922425D227FA55F5E0023651A1E615F5A85DFE04A6E056D69
32,991,160 UART: Caliptra RT
32,991,873 UART: [state] CFI Enabled
33,152,110 UART: [rt] RT listening for mailbox commands...
33,154,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,310,073 UART: [rt]cmd =0x41544d4e, len=14344
38,609,949 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,478 UART:
192,831 UART: Running Caliptra ROM ...
193,950 UART:
603,680 UART: [state] CFI Enabled
617,239 UART: [state] LifecycleState = Unprovisioned
619,149 UART: [state] DebugLocked = No
621,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,318 UART: [kat] SHA2-256
797,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,627 UART: [kat] ++
808,166 UART: [kat] sha1
818,056 UART: [kat] SHA2-256
820,777 UART: [kat] SHA2-384
825,909 UART: [kat] SHA2-512-ACC
828,283 UART: [kat] ECC-384
3,111,647 UART: [kat] HMAC-384Kdf
3,123,602 UART: [kat] LMS
4,313,695 UART: [kat] --
4,317,561 UART: [cold-reset] ++
4,318,495 UART: [fht] Storing FHT @ 0x50003400
4,331,108 UART: [idev] ++
4,331,681 UART: [idev] CDI.KEYID = 6
4,332,713 UART: [idev] SUBJECT.KEYID = 7
4,333,889 UART: [idev] UDS.KEYID = 0
4,334,965 ready_for_fw is high
4,335,197 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,196 UART: [idev] Erasing UDS.KEYID = 0
7,627,558 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,291 UART: [idev] --
7,652,724 UART: [ldev] ++
7,653,331 UART: [ldev] CDI.KEYID = 6
7,654,247 UART: [ldev] SUBJECT.KEYID = 5
7,655,459 UART: [ldev] AUTHORITY.KEYID = 7
7,656,741 UART: [ldev] FE.KEYID = 1
7,667,652 UART: [ldev] Erasing FE.KEYID = 1
10,952,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,987 UART: [ldev] --
13,313,243 UART: [fwproc] Waiting for Commands...
13,316,197 UART: [fwproc] Received command 0x46574c44
13,318,376 UART: [fwproc] Received Image of size 113844 bytes
17,365,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,276 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,178 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,824,340 >>> mbox cmd response: success
17,828,363 UART: [afmc] ++
17,828,959 UART: [afmc] CDI.KEYID = 6
17,829,881 UART: [afmc] SUBJECT.KEYID = 7
17,831,152 UART: [afmc] AUTHORITY.KEYID = 5
21,148,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,690 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,997 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,458,333 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,473,199 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,633 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,202 UART: [afmc] --
23,512,451 UART: [cold-reset] --
23,517,074 UART: [state] Locking Datavault
23,523,901 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,604 UART: [state] Locking ICCM
23,528,293 UART: [exit] Launching FMC @ 0x40000130
23,536,696 UART:
23,536,928 UART: Running Caliptra FMC ...
23,538,031 UART:
23,538,199 UART: [state] CFI Enabled
23,546,084 UART: [fht] FMC Alias Private Key: 7
25,876,710 UART: [art] Extend RT PCRs Done
25,877,932 UART: [art] Lock RT PCRs Done
25,879,502 UART: [art] Populate DV Done
25,884,968 UART: [fht] FMC Alias Private Key: 7
25,886,681 UART: [art] Derive CDI
25,887,672 UART: [art] Store in in slot 0x4
25,930,177 UART: [art] Derive Key Pair
25,931,238 UART: [art] Store priv key in slot 0x5
29,173,299 UART: [art] Derive Key Pair - Done
29,186,204 UART: [art] Signing Cert with AUTHO
29,187,512 UART: RITY.KEYID = 7
31,466,856 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,365 UART: [art] PUB.X = 38542D3BC7514C8F635421B1F946C316F9694C09376913A12DFBF75E88CED0DB6EC60D25E3CCCF3FD791C8EEFCBBFC10
31,475,627 UART: [art] PUB.Y = 1E0BC7829DED5A87DACB46F0335BFC26279CE15B69C852D0C04DDA9270D523D4F6B3C5ADB98C352451E804AD37583119
31,482,870 UART: [art] SIG.R = 0593A5B04347E79523514ABE7565C7800D44D0CF4C4BF94FFDD8D824DD35288212754403D8A0A7C160C5E7B0CDF54E01
31,490,221 UART: [art] SIG.S = 8ADA3A962C0EC4E9A9B7C1D11AACB7431CC80A3178E4BA7AE342201F668312CE6BC3D1A3346EF11075313B20A134CCCD
32,795,384 UART: Caliptra RT
32,796,093 UART: [state] CFI Enabled
32,914,302 UART: [rt] RT listening for mailbox commands...
32,916,614 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,072,107 UART: [rt]cmd =0x41544d4e, len=14344
38,373,040 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
4,132,595 ready_for_fw is high
4,133,017 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,429 >>> mbox cmd response: success
23,708,823 UART:
23,709,217 UART: Running Caliptra FMC ...
23,710,407 UART:
23,710,577 UART: [state] CFI Enabled
23,718,517 UART: [fht] FMC Alias Private Key: 7
26,049,711 UART: [art] Extend RT PCRs Done
26,050,939 UART: [art] Lock RT PCRs Done
26,052,681 UART: [art] Populate DV Done
26,058,307 UART: [fht] FMC Alias Private Key: 7
26,059,963 UART: [art] Derive CDI
26,060,783 UART: [art] Store in in slot 0x4
26,103,391 UART: [art] Derive Key Pair
26,104,430 UART: [art] Store priv key in slot 0x5
29,346,367 UART: [art] Derive Key Pair - Done
29,359,012 UART: [art] Signing Cert with AUTHO
29,360,326 UART: RITY.KEYID = 7
31,639,653 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,151 UART: [art] PUB.X = 7681958534D6E1845CAD16EF949C624FB829C45FE543B1A8BA43F2DC3EE06555D36167623946E2C41217EF714D038458
31,648,417 UART: [art] PUB.Y = 14A72D00906BFC8BEDE1ADFCC02F3106649FB44AC989A5932C7DDD6EF289B49AAB777068119CFD472A2FBE3E97653034
31,655,686 UART: [art] SIG.R = A21C1D4F9DB1B2F6E155B4E02774672E8D7FADF67DB852E89A8FDAED8BCAE312EC8A5D3CD0A5E5A3287A3A3C71433130
31,663,086 UART: [art] SIG.S = A23CCD21D00D3B706B1DFC710CA4FD7DEAA9337345F2E5B93ABEBB6E91F57999E79002DB6E757EAAE10B4D877F0089A3
32,968,472 UART: Caliptra RT
32,969,158 UART: [state] CFI Enabled
33,087,034 UART: [rt] RT listening for mailbox commands...
33,089,370 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,244,859 UART: [rt]cmd =0x41544d4e, len=14344
38,545,857 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,112 UART:
192,479 UART: Running Caliptra ROM ...
193,594 UART:
193,735 UART: [state] CFI Enabled
262,981 UART: [state] LifecycleState = Unprovisioned
264,885 UART: [state] DebugLocked = No
266,407 UART: [state] WD Timer not started. Device not locked for debugging
269,586 UART: [kat] SHA2-256
448,706 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,242 UART: [kat] ++
460,693 UART: [kat] sha1
472,206 UART: [kat] SHA2-256
475,218 UART: [kat] SHA2-384
481,022 UART: [kat] SHA2-512-ACC
484,038 UART: [kat] ECC-384
2,946,223 UART: [kat] HMAC-384Kdf
2,970,863 UART: [kat] LMS
3,500,352 UART: [kat] --
3,506,624 UART: [cold-reset] ++
3,507,773 UART: [fht] FHT @ 0x50003400
3,518,543 UART: [idev] ++
3,519,118 UART: [idev] CDI.KEYID = 6
3,520,114 UART: [idev] SUBJECT.KEYID = 7
3,521,297 UART: [idev] UDS.KEYID = 0
3,522,202 ready_for_fw is high
3,522,415 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,183 UART: [idev] Erasing UDS.KEYID = 0
6,025,822 UART: [idev] Sha1 KeyId Algorithm
6,049,299 UART: [idev] --
6,052,381 UART: [ldev] ++
6,052,972 UART: [ldev] CDI.KEYID = 6
6,053,862 UART: [ldev] SUBJECT.KEYID = 5
6,054,941 UART: [ldev] AUTHORITY.KEYID = 7
6,056,278 UART: [ldev] FE.KEYID = 1
6,098,279 UART: [ldev] Erasing FE.KEYID = 1
8,608,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,082 UART: [ldev] --
10,412,997 UART: [fwproc] Wait for Commands...
10,414,655 UART: [fwproc] Recv command 0x46574c44
10,416,698 UART: [fwproc] Recv'd Img size: 114168 bytes
13,815,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,695 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,270,275 >>> mbox cmd response: success
14,273,893 UART: [afmc] ++
14,274,483 UART: [afmc] CDI.KEYID = 6
14,275,369 UART: [afmc] SUBJECT.KEYID = 7
14,276,582 UART: [afmc] AUTHORITY.KEYID = 5
16,807,744 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,529,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,531,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,547,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,563,461 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,579,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,603,073 UART: [afmc] --
18,607,263 UART: [cold-reset] --
18,611,442 UART: [state] Locking Datavault
18,617,273 UART: [state] Locking PCR0, PCR1 and PCR31
18,618,928 UART: [state] Locking ICCM
18,621,323 UART: [exit] Launching FMC @ 0x40000130
18,629,718 UART:
18,629,954 UART: Running Caliptra FMC ...
18,631,051 UART:
18,631,210 UART: [state] CFI Enabled
18,686,489 UART: [fht] FMC Alias Private Key: 7
20,450,445 UART: [art] Extend RT PCRs Done
20,451,661 UART: [art] Lock RT PCRs Done
20,453,478 UART: [art] Populate DV Done
20,458,940 UART: [fht] FMC Alias Private Key: 7
20,460,645 UART: [art] Derive CDI
20,461,386 UART: [art] Store in in slot 0x4
20,518,209 UART: [art] Derive Key Pair
20,519,210 UART: [art] Store priv key in slot 0x5
22,982,655 UART: [art] Derive Key Pair - Done
22,995,761 UART: [art] Signing Cert with AUTHO
22,997,066 UART: RITY.KEYID = 7
24,708,520 UART: [art] Erasing AUTHORITY.KEYID = 7
24,710,025 UART: [art] PUB.X = 09BB6207D9FBD38E70126287AC04AFAAC5B5A41BC571A40F0E40570CAC6F5418655A8E41B6AC910CB05806146A5F5723
24,717,292 UART: [art] PUB.Y = F360B4A931876993A0802B69D89A99470352507A44FBE6A520A291769A040F67E8F258C3D199B3B07673FF616FD26D18
24,724,535 UART: [art] SIG.R = 0E0FE8D1F5850EB2FC1641C41299702E4FEA6DED03A13C7E272FFEBFB9C1F3E74CCE649D2B14585B93CE7B86432D0BFF
24,731,967 UART: [art] SIG.S = BF90CE813A433671662B2D6CA21BB37F8A89FE2068BFE893D4B943D5D7A8AB71264EDB1D2700AA2D715575DE92E7E154
25,710,718 UART: Caliptra RT
25,711,409 UART: [state] CFI Enabled
25,876,569 UART: [rt] RT listening for mailbox commands...
25,878,886 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,034,383 UART: [rt]cmd =0x41544d4e, len=14344
30,030,248 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,384,951 ready_for_fw is high
3,385,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,072,306 >>> mbox cmd response: success
18,368,284 UART:
18,368,686 UART: Running Caliptra FMC ...
18,369,791 UART:
18,369,945 UART: [state] CFI Enabled
18,436,535 UART: [fht] FMC Alias Private Key: 7
20,200,368 UART: [art] Extend RT PCRs Done
20,201,595 UART: [art] Lock RT PCRs Done
20,202,872 UART: [art] Populate DV Done
20,208,363 UART: [fht] FMC Alias Private Key: 7
20,210,009 UART: [art] Derive CDI
20,211,046 UART: [art] Store in in slot 0x4
20,269,070 UART: [art] Derive Key Pair
20,270,076 UART: [art] Store priv key in slot 0x5
22,733,663 UART: [art] Derive Key Pair - Done
22,746,499 UART: [art] Signing Cert with AUTHO
22,747,800 UART: RITY.KEYID = 7
24,459,205 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,732 UART: [art] PUB.X = 5AD47B1DA5F1D5A2DB02BAB799DDEDA81D3156A16BBC87A41960F367D99D7DD69F8AE8C4C20D4AADFC5B85961820892F
24,468,019 UART: [art] PUB.Y = 7E47AED62C53B93CB5D169EA452E38C7DC03748A507C1B146B4A092B745326143DBB6F8B17CE2B046784AD42457430C5
24,475,271 UART: [art] SIG.R = 8A33E38FA05CCC481A095775874433280C3A91243BF3B33AECCCB9CFE9DB982CDE98D79BEB363D8FC302D57DBE19DB14
24,482,708 UART: [art] SIG.S = 3AC9ED488F1F4FBC7E3CEAB3E7CBCF1AAEF8DAD334008EEA524AE85968B22B27419E97F719E9B108D3E4E242A6AB9EE8
25,461,808 UART: Caliptra RT
25,462,522 UART: [state] CFI Enabled
25,626,507 UART: [rt] RT listening for mailbox commands...
25,628,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,784,336 UART: [rt]cmd =0x41544d4e, len=14344
29,779,832 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
192,918 UART:
193,264 UART: Running Caliptra ROM ...
194,474 UART:
604,061 UART: [state] CFI Enabled
616,593 UART: [state] LifecycleState = Unprovisioned
618,396 UART: [state] DebugLocked = No
620,422 UART: [state] WD Timer not started. Device not locked for debugging
623,663 UART: [kat] SHA2-256
802,815 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,401 UART: [kat] ++
814,852 UART: [kat] sha1
825,795 UART: [kat] SHA2-256
828,881 UART: [kat] SHA2-384
835,013 UART: [kat] SHA2-512-ACC
837,953 UART: [kat] ECC-384
3,278,850 UART: [kat] HMAC-384Kdf
3,291,286 UART: [kat] LMS
3,820,757 UART: [kat] --
3,824,131 UART: [cold-reset] ++
3,826,720 UART: [fht] FHT @ 0x50003400
3,837,716 UART: [idev] ++
3,838,317 UART: [idev] CDI.KEYID = 6
3,839,243 UART: [idev] SUBJECT.KEYID = 7
3,840,415 UART: [idev] UDS.KEYID = 0
3,841,315 ready_for_fw is high
3,841,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,736 UART: [idev] Erasing UDS.KEYID = 0
6,315,192 UART: [idev] Sha1 KeyId Algorithm
6,338,273 UART: [idev] --
6,341,291 UART: [ldev] ++
6,341,856 UART: [ldev] CDI.KEYID = 6
6,342,818 UART: [ldev] SUBJECT.KEYID = 5
6,343,973 UART: [ldev] AUTHORITY.KEYID = 7
6,345,199 UART: [ldev] FE.KEYID = 1
6,357,243 UART: [ldev] Erasing FE.KEYID = 1
8,829,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,313 UART: [ldev] --
10,622,847 UART: [fwproc] Wait for Commands...
10,625,595 UART: [fwproc] Recv command 0x46574c44
10,627,685 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,493,022 >>> mbox cmd response: success
14,497,020 UART: [afmc] ++
14,497,619 UART: [afmc] CDI.KEYID = 6
14,498,507 UART: [afmc] SUBJECT.KEYID = 7
14,499,739 UART: [afmc] AUTHORITY.KEYID = 5
17,001,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,856 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,652 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,478 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,003 UART: [afmc] --
18,796,234 UART: [cold-reset] --
18,800,997 UART: [state] Locking Datavault
18,804,793 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,434 UART: [state] Locking ICCM
18,808,942 UART: [exit] Launching FMC @ 0x40000130
18,817,386 UART:
18,817,629 UART: Running Caliptra FMC ...
18,818,655 UART:
18,818,822 UART: [state] CFI Enabled
18,827,037 UART: [fht] FMC Alias Private Key: 7
20,584,002 UART: [art] Extend RT PCRs Done
20,585,222 UART: [art] Lock RT PCRs Done
20,586,821 UART: [art] Populate DV Done
20,592,177 UART: [fht] FMC Alias Private Key: 7
20,593,823 UART: [art] Derive CDI
20,594,637 UART: [art] Store in in slot 0x4
20,637,174 UART: [art] Derive Key Pair
20,638,211 UART: [art] Store priv key in slot 0x5
23,064,789 UART: [art] Derive Key Pair - Done
23,077,783 UART: [art] Signing Cert with AUTHO
23,079,089 UART: RITY.KEYID = 7
24,784,914 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,423 UART: [art] PUB.X = DB42816DAE114FEFFDF147677BB3E146DFE714ABEC9965E695DB9329FF43D157D689D53EC8A0369BC101D57B423D16A5
24,793,686 UART: [art] PUB.Y = 9467CCBFB2B228CA000D38AFACE599BAAD6CD57372EB0D25D0019DB5233A3F0F5D559A178308AAC64840C1E88C8D3E40
24,800,978 UART: [art] SIG.R = 5CA4368E7AF634A085CCC5AB6144CD75AB92896A1B6C71EB86243B4EF6022BE6B58BA69663E83CBF9C559F2488CA177B
24,808,398 UART: [art] SIG.S = C2F64AB1D5DBD0C462468B402FD86CC0B32083AEE1F88DA4275995621F57F6395211FB8E5AE3E653C8D7DAC6A442B1E1
25,787,147 UART: Caliptra RT
25,787,847 UART: [state] CFI Enabled
25,904,797 UART: [rt] RT listening for mailbox commands...
25,907,111 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,062,426 UART: [rt]cmd =0x41544d4e, len=14344
30,058,361 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,867 writing to cptra_bootfsm_go
3,698,676 ready_for_fw is high
3,699,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,054 >>> mbox cmd response: success
18,518,489 UART:
18,518,878 UART: Running Caliptra FMC ...
18,520,063 UART:
18,520,234 UART: [state] CFI Enabled
18,528,337 UART: [fht] FMC Alias Private Key: 7
20,284,822 UART: [art] Extend RT PCRs Done
20,286,047 UART: [art] Lock RT PCRs Done
20,287,679 UART: [art] Populate DV Done
20,293,233 UART: [fht] FMC Alias Private Key: 7
20,294,881 UART: [art] Derive CDI
20,295,694 UART: [art] Store in in slot 0x4
20,338,217 UART: [art] Derive Key Pair
20,339,251 UART: [art] Store priv key in slot 0x5
22,766,040 UART: [art] Derive Key Pair - Done
22,779,408 UART: [art] Signing Cert with AUTHO
22,780,709 UART: RITY.KEYID = 7
24,485,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,540 UART: [art] PUB.X = F60F300D8D3E3854765098D95D045D946FD8F17F9E94A150A85B45BD2B02FE50E5962F83B5A31998146BECFA199271D6
24,494,687 UART: [art] PUB.Y = C4129A0A547AE4794A20F7D4D0D035F0AC01A46763CCA0DC3CBC991D46507B1FC24D169CFC55313D8C84BC18EBFFAF9E
24,502,000 UART: [art] SIG.R = 72AA56C711D8AAC908186C50DFC7E726AD9784E71C384AB4FA6E7D61753E545A201AEAAC7F572B819C3E68ED4380D64C
24,509,399 UART: [art] SIG.S = FF933955D8A998E7E6546552628C7056F65D7DFB814162F74E96B657A10706773A7FEA86088A6B99C22ECB215EE317A5
25,488,494 UART: Caliptra RT
25,489,178 UART: [state] CFI Enabled
25,606,448 UART: [rt] RT listening for mailbox commands...
25,608,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,764,014 UART: [rt]cmd =0x41544d4e, len=14344
29,759,301 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,174 UART:
192,540 UART: Running Caliptra ROM ...
193,711 UART:
193,864 UART: [state] CFI Enabled
261,906 UART: [state] LifecycleState = Unprovisioned
264,327 UART: [state] DebugLocked = No
265,787 UART: [state] WD Timer not started. Device not locked for debugging
271,037 UART: [kat] SHA2-256
460,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,685 UART: [kat] ++
472,180 UART: [kat] sha1
483,483 UART: [kat] SHA2-256
486,563 UART: [kat] SHA2-384
493,195 UART: [kat] SHA2-512-ACC
495,784 UART: [kat] ECC-384
2,948,432 UART: [kat] HMAC-384Kdf
2,970,628 UART: [kat] LMS
3,502,339 UART: [kat] --
3,506,759 UART: [cold-reset] ++
3,509,401 UART: [fht] FHT @ 0x50003400
3,520,532 UART: [idev] ++
3,521,242 UART: [idev] CDI.KEYID = 6
3,522,275 UART: [idev] SUBJECT.KEYID = 7
3,523,382 UART: [idev] UDS.KEYID = 0
3,524,311 ready_for_fw is high
3,524,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,378 UART: [idev] Erasing UDS.KEYID = 0
6,026,640 UART: [idev] Sha1 KeyId Algorithm
6,048,788 UART: [idev] --
6,053,224 UART: [ldev] ++
6,053,912 UART: [ldev] CDI.KEYID = 6
6,054,828 UART: [ldev] SUBJECT.KEYID = 5
6,055,993 UART: [ldev] AUTHORITY.KEYID = 7
6,057,231 UART: [ldev] FE.KEYID = 1
6,098,229 UART: [ldev] Erasing FE.KEYID = 1
8,602,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,229 UART: [ldev] --
10,408,901 UART: [fwproc] Wait for Commands...
10,410,969 UART: [fwproc] Recv command 0x46574c44
10,413,284 UART: [fwproc] Recv'd Img size: 114168 bytes
13,857,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,047,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,589,230 >>> mbox cmd response: success
14,592,690 UART: [afmc] ++
14,593,398 UART: [afmc] CDI.KEYID = 6
14,594,594 UART: [afmc] SUBJECT.KEYID = 7
14,596,092 UART: [afmc] AUTHORITY.KEYID = 5
17,124,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,848,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,850,001 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,865,193 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,880,352 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,895,341 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,918,920 UART: [afmc] --
18,921,708 UART: [cold-reset] --
18,925,481 UART: [state] Locking Datavault
18,930,588 UART: [state] Locking PCR0, PCR1 and PCR31
18,932,748 UART: [state] Locking ICCM
18,934,655 UART: [exit] Launching FMC @ 0x40000130
18,943,351 UART:
18,943,628 UART: Running Caliptra FMC ...
18,944,745 UART:
18,944,906 UART: [state] CFI Enabled
19,005,372 UART: [fht] FMC Alias Private Key: 7
20,768,845 UART: [art] Extend RT PCRs Done
20,770,065 UART: [art] Lock RT PCRs Done
20,771,775 UART: [art] Populate DV Done
20,777,079 UART: [fht] FMC Alias Private Key: 7
20,778,731 UART: [art] Derive CDI
20,779,782 UART: [art] Store in in slot 0x4
20,837,921 UART: [art] Derive Key Pair
20,838,927 UART: [art] Store priv key in slot 0x5
23,302,191 UART: [art] Derive Key Pair - Done
23,315,300 UART: [art] Signing Cert with AUTHO
23,316,608 UART: RITY.KEYID = 7
25,028,701 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,220 UART: [art] PUB.X = 4721C0FD84C817AFC904E2026D6F0B1A5F4539BEDE1DE0732344E1996A6836D110879F3EB66D6EC9C3334B5CAB0C60AB
25,037,496 UART: [art] PUB.Y = A8D8DAC799EF3DD9F28D5D658F4D68B43A8C708C20E9BE2A58F3ABB50B978BED524FDF155E1DEB9284C37D9FA03D1AB3
25,044,812 UART: [art] SIG.R = AE06FEAA0168163C5F5A3733E73FDC158B706A4A5BFDC2BA3FEA8502E4B5C53F39A74432BD5F7CADEBBFB41012C35998
25,052,199 UART: [art] SIG.S = 5AB220EF1AC0BB1300A64A38A57D0228E1F3356779C5FCB772E9CD6EA51D9DED458E798609D80665159496DA0BFDB0C0
26,030,970 UART: Caliptra RT
26,031,697 UART: [state] CFI Enabled
26,196,489 UART: [rt] RT listening for mailbox commands...
26,198,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,353,984 UART: [rt]cmd =0x41544d4e, len=14344
30,349,082 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,415,475 ready_for_fw is high
3,415,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,727,305 >>> mbox cmd response: success
19,019,926 UART:
19,020,470 UART: Running Caliptra FMC ...
19,021,708 UART:
19,021,887 UART: [state] CFI Enabled
19,089,395 UART: [fht] FMC Alias Private Key: 7
20,853,361 UART: [art] Extend RT PCRs Done
20,854,584 UART: [art] Lock RT PCRs Done
20,856,238 UART: [art] Populate DV Done
20,861,696 UART: [fht] FMC Alias Private Key: 7
20,863,278 UART: [art] Derive CDI
20,864,020 UART: [art] Store in in slot 0x4
20,921,546 UART: [art] Derive Key Pair
20,922,547 UART: [art] Store priv key in slot 0x5
23,384,676 UART: [art] Derive Key Pair - Done
23,397,890 UART: [art] Signing Cert with AUTHO
23,399,192 UART: RITY.KEYID = 7
25,110,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,165 UART: [art] PUB.X = 1995C9A06DF830089930D5E95622A29E2CF8E80F22E06C86F61888CF0EBA0DBE25F8BFC0FE3BCB10BF5A6F57CC9CC0E6
25,119,472 UART: [art] PUB.Y = BA2650D3E0622797AADD10060F0446EF0BFD3E4B1F625CA71DE83832854089B147367F0C414954A6D45FCFED93776264
25,126,661 UART: [art] SIG.R = 4C6766B13B59743C9C4132AF38B95F442CB2865FA405AE89AAFCA9BC199410AB13C0161F1838E7B4C7C47608D0889B31
25,134,040 UART: [art] SIG.S = AACDF077C6D961EDF5B2DC31CDBBA73337399A0E4F4DA7779C209AF66CE768CD599184BD04042669DF54D89942FAC71B
26,113,141 UART: Caliptra RT
26,113,856 UART: [state] CFI Enabled
26,277,674 UART: [rt] RT listening for mailbox commands...
26,279,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,435,512 UART: [rt]cmd =0x41544d4e, len=14344
30,430,926 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,803 writing to cptra_bootfsm_go
193,099 UART:
193,481 UART: Running Caliptra ROM ...
194,586 UART:
604,432 UART: [state] CFI Enabled
616,407 UART: [state] LifecycleState = Unprovisioned
618,982 UART: [state] DebugLocked = No
621,501 UART: [state] WD Timer not started. Device not locked for debugging
626,309 UART: [kat] SHA2-256
816,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,007 UART: [kat] ++
827,464 UART: [kat] sha1
839,338 UART: [kat] SHA2-256
842,343 UART: [kat] SHA2-384
848,902 UART: [kat] SHA2-512-ACC
851,483 UART: [kat] ECC-384
3,290,498 UART: [kat] HMAC-384Kdf
3,304,499 UART: [kat] LMS
3,836,299 UART: [kat] --
3,841,646 UART: [cold-reset] ++
3,843,015 UART: [fht] FHT @ 0x50003400
3,853,357 UART: [idev] ++
3,854,066 UART: [idev] CDI.KEYID = 6
3,854,985 UART: [idev] SUBJECT.KEYID = 7
3,856,234 UART: [idev] UDS.KEYID = 0
3,857,157 ready_for_fw is high
3,857,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,700 UART: [idev] Erasing UDS.KEYID = 0
6,333,715 UART: [idev] Sha1 KeyId Algorithm
6,356,669 UART: [idev] --
6,361,845 UART: [ldev] ++
6,362,520 UART: [ldev] CDI.KEYID = 6
6,363,404 UART: [ldev] SUBJECT.KEYID = 5
6,364,615 UART: [ldev] AUTHORITY.KEYID = 7
6,365,817 UART: [ldev] FE.KEYID = 1
6,379,000 UART: [ldev] Erasing FE.KEYID = 1
8,855,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,903 UART: [ldev] --
10,648,327 UART: [fwproc] Wait for Commands...
10,650,583 UART: [fwproc] Recv command 0x46574c44
10,652,889 UART: [fwproc] Recv'd Img size: 114168 bytes
14,100,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,836 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,838,745 >>> mbox cmd response: success
14,842,106 UART: [afmc] ++
14,842,829 UART: [afmc] CDI.KEYID = 6
14,843,939 UART: [afmc] SUBJECT.KEYID = 7
14,845,480 UART: [afmc] AUTHORITY.KEYID = 5
17,348,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,668 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,087,853 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,102,958 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,087 UART: [afmc] --
19,144,031 UART: [cold-reset] --
19,148,108 UART: [state] Locking Datavault
19,155,151 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,291 UART: [state] Locking ICCM
19,159,553 UART: [exit] Launching FMC @ 0x40000130
19,168,229 UART:
19,168,483 UART: Running Caliptra FMC ...
19,169,588 UART:
19,169,750 UART: [state] CFI Enabled
19,177,964 UART: [fht] FMC Alias Private Key: 7
20,934,451 UART: [art] Extend RT PCRs Done
20,935,665 UART: [art] Lock RT PCRs Done
20,937,644 UART: [art] Populate DV Done
20,942,723 UART: [fht] FMC Alias Private Key: 7
20,944,405 UART: [art] Derive CDI
20,945,148 UART: [art] Store in in slot 0x4
20,987,526 UART: [art] Derive Key Pair
20,988,525 UART: [art] Store priv key in slot 0x5
23,414,921 UART: [art] Derive Key Pair - Done
23,427,609 UART: [art] Signing Cert with AUTHO
23,428,957 UART: RITY.KEYID = 7
25,134,344 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,875 UART: [art] PUB.X = DD34BF99AC16209EA472FFBCB928F195F9BCFDF0AC924AE223AED51EC0175D3D2856198A97CB7D4A2EFDFCDA7FACE2A0
25,143,126 UART: [art] PUB.Y = 12ED5E8F4156F81979D546966C2D3C53BE7092EFB9C3C8A9356403168ADA7F11184CADA616F42BAA02F169798E4879C8
25,150,418 UART: [art] SIG.R = CB1C0DFF8DCA8AA735C171BF1B6D30F21947AE610B06CD7A6FDF8FC96D4DC0D870A9D14DD4946F5FF761210AF9DBA753
25,157,817 UART: [art] SIG.S = 1AAFB20C68D48C3F4ECA257C09EA474C332F535285946978FFEE5F2C990211116D74C25D7CFC041AD8AA0150EC783FE6
26,136,935 UART: Caliptra RT
26,137,652 UART: [state] CFI Enabled
26,255,658 UART: [rt] RT listening for mailbox commands...
26,257,967 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,413,358 UART: [rt]cmd =0x41544d4e, len=14344
30,408,932 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
3,753,568 ready_for_fw is high
3,753,974 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,936,586 >>> mbox cmd response: success
19,190,355 UART:
19,190,740 UART: Running Caliptra FMC ...
19,191,925 UART:
19,192,112 UART: [state] CFI Enabled
19,199,673 UART: [fht] FMC Alias Private Key: 7
20,955,382 UART: [art] Extend RT PCRs Done
20,956,612 UART: [art] Lock RT PCRs Done
20,958,242 UART: [art] Populate DV Done
20,963,813 UART: [fht] FMC Alias Private Key: 7
20,965,417 UART: [art] Derive CDI
20,966,258 UART: [art] Store in in slot 0x4
21,008,750 UART: [art] Derive Key Pair
21,009,752 UART: [art] Store priv key in slot 0x5
23,436,255 UART: [art] Derive Key Pair - Done
23,449,197 UART: [art] Signing Cert with AUTHO
23,450,503 UART: RITY.KEYID = 7
25,155,997 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,505 UART: [art] PUB.X = 96E6151FE1E360E604449D73438B2B2D0F912B141D1B0A4D3F6830135D11BF97AACFD13BC22FDEF23CDF2BF4A94B3CB9
25,164,800 UART: [art] PUB.Y = 04F08D3793E4035FE44AC3792C3B523D3B8417A2E5BB1492535B2C5687DDF9B8AF4D0938D567EA56EFD7EDECD71B6FF2
25,172,057 UART: [art] SIG.R = 2EE93E888940E49C4A3EA8B49A6BF1A55F27275F0D57E64420A6B88D1B73AE32F0CDF84A72302188595BE5D6C48C9A4F
25,179,459 UART: [art] SIG.S = 3522F2C50E3AF104B43BBD0C7E4EFB12DB4EDBDC6249597F6B833C05A795397327686DAC84EF5EB2A81EB8A4A3F7A6B0
26,158,166 UART: Caliptra RT
26,158,878 UART: [state] CFI Enabled
26,275,779 UART: [rt] RT listening for mailbox commands...
26,278,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,433,459 UART: [rt]cmd =0x41544d4e, len=14344
30,429,396 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,647 UART: [kat] SHA2-256
881,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,693 UART: [kat] ++
885,845 UART: [kat] sha1
889,925 UART: [kat] SHA2-256
891,863 UART: [kat] SHA2-384
894,648 UART: [kat] SHA2-512-ACC
896,549 UART: [kat] ECC-384
902,080 UART: [kat] HMAC-384Kdf
906,770 UART: [kat] LMS
1,474,966 UART: [kat] --
1,475,865 UART: [cold-reset] ++
1,476,303 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 ready_for_fw is high
1,480,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,042 UART: [idev] Erasing UDS.KEYID = 0
1,504,572 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,031 UART: [ldev] ++
1,514,199 UART: [ldev] CDI.KEYID = 6
1,514,562 UART: [ldev] SUBJECT.KEYID = 5
1,514,988 UART: [ldev] AUTHORITY.KEYID = 7
1,515,451 UART: [ldev] FE.KEYID = 1
1,520,311 UART: [ldev] Erasing FE.KEYID = 1
1,546,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,960 UART: [ldev] --
1,585,447 UART: [fwproc] Waiting for Commands...
1,586,294 UART: [fwproc] Received command 0x46574c44
1,587,085 UART: [fwproc] Received Image of size 114168 bytes
2,883,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,177 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,529 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,260 >>> mbox cmd response: success
3,077,492 UART: [afmc] ++
3,077,660 UART: [afmc] CDI.KEYID = 6
3,078,022 UART: [afmc] SUBJECT.KEYID = 7
3,078,447 UART: [afmc] AUTHORITY.KEYID = 5
3,113,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,206 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,714 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,599 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,289 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,142 UART: [afmc] --
3,156,046 UART: [cold-reset] --
3,156,766 UART: [state] Locking Datavault
3,157,981 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,585 UART: [state] Locking ICCM
3,159,193 UART: [exit] Launching FMC @ 0x40000130
3,164,522 UART:
3,164,538 UART: Running Caliptra FMC ...
3,164,946 UART:
3,165,000 UART: [state] CFI Enabled
3,175,215 UART: [fht] FMC Alias Private Key: 7
3,283,540 UART: [art] Extend RT PCRs Done
3,283,968 UART: [art] Lock RT PCRs Done
3,285,782 UART: [art] Populate DV Done
3,293,797 UART: [fht] FMC Alias Private Key: 7
3,294,799 UART: [art] Derive CDI
3,295,079 UART: [art] Store in in slot 0x4
3,380,762 UART: [art] Derive Key Pair
3,381,122 UART: [art] Store priv key in slot 0x5
3,393,768 UART: [art] Derive Key Pair - Done
3,408,747 UART: [art] Signing Cert with AUTHO
3,409,227 UART: RITY.KEYID = 7
3,424,627 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,392 UART: [art] PUB.X = D3700766C43AA72914850399BE1E78FEB32B51B61311835199AE9C837BDE1CD01639E39D5D27901F423809D419B05221
3,432,143 UART: [art] PUB.Y = 7DACFF9CE86C5ED22F76A8D86A3967BA00D0C8B5AC93FAD9BB1A7C041FC023E8CCB1A1D1EB35A078AFFC0142AC8177B5
3,439,095 UART: [art] SIG.R = 42BD744C80FB9E83B6984016662209C0AE64B2D120A2BDC40D8D058DCFD55271932C10A5A27D8EFA637B3C7E5815B2C8
3,445,862 UART: [art] SIG.S = B02DC3507AB49CBDEA9A35DAAD3F491891B54E22EA745806756419C2FE789B90A3B7DB74C2A855D70FEEF463CC854429
3,469,133 UART: Caliptra RT
3,469,386 UART: [state] CFI Enabled
3,576,485 UART: [rt] RT listening for mailbox commands...
3,577,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,399 UART: [rt]cmd =0x41544d4e, len=14344
4,010,054 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,625 ready_for_fw is high
1,362,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,530 >>> mbox cmd response: success
2,987,546 UART:
2,987,562 UART: Running Caliptra FMC ...
2,987,970 UART:
2,988,024 UART: [state] CFI Enabled
2,998,369 UART: [fht] FMC Alias Private Key: 7
3,106,392 UART: [art] Extend RT PCRs Done
3,106,820 UART: [art] Lock RT PCRs Done
3,108,444 UART: [art] Populate DV Done
3,116,643 UART: [fht] FMC Alias Private Key: 7
3,117,733 UART: [art] Derive CDI
3,118,013 UART: [art] Store in in slot 0x4
3,203,998 UART: [art] Derive Key Pair
3,204,358 UART: [art] Store priv key in slot 0x5
3,217,738 UART: [art] Derive Key Pair - Done
3,232,445 UART: [art] Signing Cert with AUTHO
3,232,925 UART: RITY.KEYID = 7
3,248,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,232 UART: [art] PUB.X = 3E02D9909D2CE947A77AD8B8F68D337082D60F6BF44D7B32A0184A85B2CEE9472309E3CCD0D5C03A0E5E64EE8A1DB746
3,256,002 UART: [art] PUB.Y = E8C683572E8F54E48AE56A14B3156EC3D04EFE05627CB9D181EDD4D986685A2122B0BF4E82E9F1ED9C189C6DC838D7CA
3,262,963 UART: [art] SIG.R = 489416320B0610F8F1140560C51E12695F25F483B5182FD6A2DECC02B814B8F358D091A065F8C8EBE0CC79C79F65EE23
3,269,721 UART: [art] SIG.S = 5046248FE9FAD215F9683D79B7AA877F298892A34937FA5ED0DE7241112B70CBC9421FFCFCD04639965CC422DD2C266D
3,293,868 UART: Caliptra RT
3,294,121 UART: [state] CFI Enabled
3,402,339 UART: [rt] RT listening for mailbox commands...
3,403,009 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,937 UART: [rt]cmd =0x41544d4e, len=14344
3,836,334 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,642 UART: [kat] SHA2-256
882,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,688 UART: [kat] ++
886,840 UART: [kat] sha1
891,056 UART: [kat] SHA2-256
892,994 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
903,039 UART: [kat] HMAC-384Kdf
907,749 UART: [kat] LMS
1,475,945 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,252 UART: [fht] Storing FHT @ 0x50003400
1,480,125 UART: [idev] ++
1,480,293 UART: [idev] CDI.KEYID = 6
1,480,653 UART: [idev] SUBJECT.KEYID = 7
1,481,077 UART: [idev] UDS.KEYID = 0
1,481,422 ready_for_fw is high
1,481,422 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,443 UART: [idev] Erasing UDS.KEYID = 0
1,506,351 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,957 UART: [idev] --
1,515,994 UART: [ldev] ++
1,516,162 UART: [ldev] CDI.KEYID = 6
1,516,525 UART: [ldev] SUBJECT.KEYID = 5
1,516,951 UART: [ldev] AUTHORITY.KEYID = 7
1,517,414 UART: [ldev] FE.KEYID = 1
1,522,662 UART: [ldev] Erasing FE.KEYID = 1
1,547,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,497 UART: [ldev] --
1,586,880 UART: [fwproc] Waiting for Commands...
1,587,613 UART: [fwproc] Received command 0x46574c44
1,588,404 UART: [fwproc] Received Image of size 114168 bytes
2,884,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,240 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,263 >>> mbox cmd response: success
3,078,513 UART: [afmc] ++
3,078,681 UART: [afmc] CDI.KEYID = 6
3,079,043 UART: [afmc] SUBJECT.KEYID = 7
3,079,468 UART: [afmc] AUTHORITY.KEYID = 5
3,115,057 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,341 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,121 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,849 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,734 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,424 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,261 UART: [afmc] --
3,158,185 UART: [cold-reset] --
3,159,019 UART: [state] Locking Datavault
3,159,990 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,594 UART: [state] Locking ICCM
3,161,154 UART: [exit] Launching FMC @ 0x40000130
3,166,483 UART:
3,166,499 UART: Running Caliptra FMC ...
3,166,907 UART:
3,167,050 UART: [state] CFI Enabled
3,177,413 UART: [fht] FMC Alias Private Key: 7
3,284,992 UART: [art] Extend RT PCRs Done
3,285,420 UART: [art] Lock RT PCRs Done
3,286,962 UART: [art] Populate DV Done
3,295,123 UART: [fht] FMC Alias Private Key: 7
3,296,107 UART: [art] Derive CDI
3,296,387 UART: [art] Store in in slot 0x4
3,381,880 UART: [art] Derive Key Pair
3,382,240 UART: [art] Store priv key in slot 0x5
3,395,452 UART: [art] Derive Key Pair - Done
3,410,316 UART: [art] Signing Cert with AUTHO
3,410,796 UART: RITY.KEYID = 7
3,425,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,759 UART: [art] PUB.X = 67157D8ECF8971F0F56B3607D4F29E23601B4015ED85E449DCF8FB97CB80BE5E164A93D67A5348F74183E9ECDE3399BF
3,433,534 UART: [art] PUB.Y = 34BE3F4684333B481B1257F29FAA5C9386D067B5104F52E651ADAAD8863083FA36465679C478F1219E75A52FCD252845
3,440,478 UART: [art] SIG.R = 284EEBFE9D3D50AA0A9334C7D0AAB06739BD47647FA0B44AF98B140B4C7D0D06674B72575B11B8E97960F7D74A0C3881
3,447,241 UART: [art] SIG.S = 9DD0D8E3C24E4B1BE77D2A56683DE13783E9FCA92D5A9CBA487BB35B4E4F667E975A94B8F47BEDBDA9A05D4E03C334DC
3,471,325 UART: Caliptra RT
3,471,670 UART: [state] CFI Enabled
3,578,947 UART: [rt] RT listening for mailbox commands...
3,579,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,702,355 UART: [rt]cmd =0x41544d4e, len=14344
4,012,002 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,610 ready_for_fw is high
1,362,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,187 >>> mbox cmd response: success
2,988,827 UART:
2,988,843 UART: Running Caliptra FMC ...
2,989,251 UART:
2,989,394 UART: [state] CFI Enabled
2,999,673 UART: [fht] FMC Alias Private Key: 7
3,107,448 UART: [art] Extend RT PCRs Done
3,107,876 UART: [art] Lock RT PCRs Done
3,109,156 UART: [art] Populate DV Done
3,117,565 UART: [fht] FMC Alias Private Key: 7
3,118,745 UART: [art] Derive CDI
3,119,025 UART: [art] Store in in slot 0x4
3,204,736 UART: [art] Derive Key Pair
3,205,096 UART: [art] Store priv key in slot 0x5
3,218,676 UART: [art] Derive Key Pair - Done
3,233,557 UART: [art] Signing Cert with AUTHO
3,234,037 UART: RITY.KEYID = 7
3,249,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,816 UART: [art] PUB.X = 2F6E8B5E9D119246A79F4DB0B108BB5BA05D916447877461A415A8EA3F37789E4DE39082668EC4A1D2D87EE4913D2FC7
3,256,587 UART: [art] PUB.Y = 7FB31BB3CD40E80DA7B32730B4BF4818ADCC399F7DB6D19493B670365C95F5FB21118040C901D7C89ED648EA375048E8
3,263,537 UART: [art] SIG.R = 3B4FE383CCC552E790CB8B044C880ACCC65E43A980D13D51E9336DE6008B8C9AA008AFF23A0AF3E1DBD2ABDF281B1DD9
3,270,297 UART: [art] SIG.S = 3F6A8B631FE370E971AB434A205E584AEB6B63CD90D314EA4F59E2A115B0590BFB209D59C7C9085C9029D0C0DB1BA180
3,294,284 UART: Caliptra RT
3,294,629 UART: [state] CFI Enabled
3,403,781 UART: [rt] RT listening for mailbox commands...
3,404,451 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,673 UART: [rt]cmd =0x41544d4e, len=14344
3,837,720 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
901,867 UART: [kat] SHA2-256
903,807 UART: [kat] SHA2-384
906,330 UART: [kat] SHA2-512-ACC
908,231 UART: [kat] ECC-384
917,726 UART: [kat] HMAC-384Kdf
922,234 UART: [kat] LMS
1,170,562 UART: [kat] --
1,171,551 UART: [cold-reset] ++
1,172,097 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 ready_for_fw is high
1,176,135 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,620 UART: [idev] Erasing UDS.KEYID = 0
1,201,039 UART: [idev] Sha1 KeyId Algorithm
1,209,613 UART: [idev] --
1,210,653 UART: [ldev] ++
1,210,821 UART: [ldev] CDI.KEYID = 6
1,211,184 UART: [ldev] SUBJECT.KEYID = 5
1,211,610 UART: [ldev] AUTHORITY.KEYID = 7
1,212,073 UART: [ldev] FE.KEYID = 1
1,217,205 UART: [ldev] Erasing FE.KEYID = 1
1,243,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,609 UART: [ldev] --
1,283,110 UART: [fwproc] Wait for Commands...
1,283,712 UART: [fwproc] Recv command 0x46574c44
1,284,440 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,090 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,867 >>> mbox cmd response: success
2,774,093 UART: [afmc] ++
2,774,261 UART: [afmc] CDI.KEYID = 6
2,774,623 UART: [afmc] SUBJECT.KEYID = 7
2,775,048 UART: [afmc] AUTHORITY.KEYID = 5
2,811,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,938 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,392 UART: [afmc] --
2,854,428 UART: [cold-reset] --
2,855,396 UART: [state] Locking Datavault
2,856,419 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,023 UART: [state] Locking ICCM
2,857,641 UART: [exit] Launching FMC @ 0x40000130
2,862,970 UART:
2,862,986 UART: Running Caliptra FMC ...
2,863,394 UART:
2,863,448 UART: [state] CFI Enabled
2,873,927 UART: [fht] FMC Alias Private Key: 7
2,982,674 UART: [art] Extend RT PCRs Done
2,983,102 UART: [art] Lock RT PCRs Done
2,984,504 UART: [art] Populate DV Done
2,992,903 UART: [fht] FMC Alias Private Key: 7
2,993,921 UART: [art] Derive CDI
2,994,201 UART: [art] Store in in slot 0x4
3,080,080 UART: [art] Derive Key Pair
3,080,440 UART: [art] Store priv key in slot 0x5
3,093,342 UART: [art] Derive Key Pair - Done
3,108,404 UART: [art] Signing Cert with AUTHO
3,108,884 UART: RITY.KEYID = 7
3,123,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,691 UART: [art] PUB.X = 5F098D65894CFBE0B591F48202D87393A53C69F758E881AC2B2865DB66F8619664680E746AB6344413064B7B60274DF0
3,131,439 UART: [art] PUB.Y = 3F328EDBB8E914F723BF01DD507AE84E9F006E649AF25D7A9FBBB90062057DA85453707D4DEEBB8E8C1B6B7E9922AD87
3,138,355 UART: [art] SIG.R = 2A9339D1CFF8FD1CDEE46445435847FF192C516EB0ADBF4083162A1399BDBB89767AFB49A8251EF9A8CBBC30CB120748
3,145,136 UART: [art] SIG.S = 3568C6EEAFA8627F3EF2ADFF8E2B06C3CA356060EBBBE28DB1F2CC69A940CAEA1FCEDC456EB55B40B44C8C1B9D7831C1
3,169,134 UART: Caliptra RT
3,169,387 UART: [state] CFI Enabled
3,276,706 UART: [rt] RT listening for mailbox commands...
3,277,376 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,518 UART: [rt]cmd =0x41544d4e, len=14344
3,710,855 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 ready_for_fw is high
1,060,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,492 >>> mbox cmd response: success
2,686,294 UART:
2,686,310 UART: Running Caliptra FMC ...
2,686,718 UART:
2,686,772 UART: [state] CFI Enabled
2,697,223 UART: [fht] FMC Alias Private Key: 7
2,805,896 UART: [art] Extend RT PCRs Done
2,806,324 UART: [art] Lock RT PCRs Done
2,807,960 UART: [art] Populate DV Done
2,816,185 UART: [fht] FMC Alias Private Key: 7
2,817,183 UART: [art] Derive CDI
2,817,463 UART: [art] Store in in slot 0x4
2,903,092 UART: [art] Derive Key Pair
2,903,452 UART: [art] Store priv key in slot 0x5
2,916,652 UART: [art] Derive Key Pair - Done
2,931,575 UART: [art] Signing Cert with AUTHO
2,932,055 UART: RITY.KEYID = 7
2,946,999 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,764 UART: [art] PUB.X = 77C5058A694B3F0E0A6B4233672BDCE04140C19105A36AA958CA3893EE46F89E267D432AD91B796AB2B14B28F17ED452
2,954,524 UART: [art] PUB.Y = A464964040B311F5884C971F4175B686B23D53B07A01F648713777346BA78284F06E47A66E42A318670E6A51A092A352
2,961,450 UART: [art] SIG.R = EC9AED02FD9EDA3B8ECDB232DE5B5DEBC584B8858EAF8C023344C9774C5C126E07A82AA8C18FEB89595052EDD3CF6DC1
2,968,239 UART: [art] SIG.S = 4828D7A0C8F19813D8303ACEE6935C9D01966113E1D607BDE9125A259C758942864F2C5BF96F4C45595783AF8C058C39
2,992,013 UART: Caliptra RT
2,992,266 UART: [state] CFI Enabled
3,099,617 UART: [rt] RT listening for mailbox commands...
3,100,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,221 UART: [rt]cmd =0x41544d4e, len=14344
3,532,834 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,282 UART: [state] WD Timer not started. Device not locked for debugging
88,463 UART: [kat] SHA2-256
894,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,238 UART: [kat] ++
898,390 UART: [kat] sha1
902,514 UART: [kat] SHA2-256
904,454 UART: [kat] SHA2-384
907,353 UART: [kat] SHA2-512-ACC
909,254 UART: [kat] ECC-384
919,001 UART: [kat] HMAC-384Kdf
923,595 UART: [kat] LMS
1,171,923 UART: [kat] --
1,172,948 UART: [cold-reset] ++
1,173,350 UART: [fht] FHT @ 0x50003400
1,176,077 UART: [idev] ++
1,176,245 UART: [idev] CDI.KEYID = 6
1,176,605 UART: [idev] SUBJECT.KEYID = 7
1,177,029 UART: [idev] UDS.KEYID = 0
1,177,374 ready_for_fw is high
1,177,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,793 UART: [idev] Erasing UDS.KEYID = 0
1,201,942 UART: [idev] Sha1 KeyId Algorithm
1,210,530 UART: [idev] --
1,211,714 UART: [ldev] ++
1,211,882 UART: [ldev] CDI.KEYID = 6
1,212,245 UART: [ldev] SUBJECT.KEYID = 5
1,212,671 UART: [ldev] AUTHORITY.KEYID = 7
1,213,134 UART: [ldev] FE.KEYID = 1
1,218,704 UART: [ldev] Erasing FE.KEYID = 1
1,245,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,896 UART: [ldev] --
1,285,223 UART: [fwproc] Wait for Commands...
1,286,021 UART: [fwproc] Recv command 0x46574c44
1,286,749 UART: [fwproc] Recv'd Img size: 114168 bytes
2,584,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,041 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,345 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,808 >>> mbox cmd response: success
2,777,002 UART: [afmc] ++
2,777,170 UART: [afmc] CDI.KEYID = 6
2,777,532 UART: [afmc] SUBJECT.KEYID = 7
2,777,957 UART: [afmc] AUTHORITY.KEYID = 5
2,814,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,441 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,169 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,054 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,848,773 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,575 UART: [afmc] --
2,857,511 UART: [cold-reset] --
2,858,357 UART: [state] Locking Datavault
2,859,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,344 UART: [state] Locking ICCM
2,861,010 UART: [exit] Launching FMC @ 0x40000130
2,866,339 UART:
2,866,355 UART: Running Caliptra FMC ...
2,866,763 UART:
2,866,906 UART: [state] CFI Enabled
2,877,493 UART: [fht] FMC Alias Private Key: 7
2,985,364 UART: [art] Extend RT PCRs Done
2,985,792 UART: [art] Lock RT PCRs Done
2,987,550 UART: [art] Populate DV Done
2,995,555 UART: [fht] FMC Alias Private Key: 7
2,996,559 UART: [art] Derive CDI
2,996,839 UART: [art] Store in in slot 0x4
3,082,856 UART: [art] Derive Key Pair
3,083,216 UART: [art] Store priv key in slot 0x5
3,096,214 UART: [art] Derive Key Pair - Done
3,111,234 UART: [art] Signing Cert with AUTHO
3,111,714 UART: RITY.KEYID = 7
3,126,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,291 UART: [art] PUB.X = CC94E556B3DDBEACEC082AE7753A4FCCCACD2059E7934A5BD125B9354315C5E63FA087516EBC35D9DE9CD17944673DB2
3,134,078 UART: [art] PUB.Y = D4CBF5A52DBCF283209A89C42A7F5BEB4955871C6D92903FBB633787198A81428F390FC9F359DFF97765FFC021D9E30B
3,141,030 UART: [art] SIG.R = 4D4F1D502189654C7B44566111EFFD9C0200C151663866C70F0D831094698DC0B4CCB5342EFD539BC06584AEDE248A14
3,147,767 UART: [art] SIG.S = 65791341A50A6E9B3B5B7893F414F31CBA50D56D86D46B23A1DBE4C5A8A43D54E0FC0D887365CA31C496E5DBA22432FC
3,171,554 UART: Caliptra RT
3,171,899 UART: [state] CFI Enabled
3,280,354 UART: [rt] RT listening for mailbox commands...
3,281,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,810 UART: [rt]cmd =0x41544d4e, len=14344
3,713,195 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,240 ready_for_fw is high
1,061,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,093 >>> mbox cmd response: success
2,688,655 UART:
2,688,671 UART: Running Caliptra FMC ...
2,689,079 UART:
2,689,222 UART: [state] CFI Enabled
2,699,601 UART: [fht] FMC Alias Private Key: 7
2,807,980 UART: [art] Extend RT PCRs Done
2,808,408 UART: [art] Lock RT PCRs Done
2,810,140 UART: [art] Populate DV Done
2,818,131 UART: [fht] FMC Alias Private Key: 7
2,819,263 UART: [art] Derive CDI
2,819,543 UART: [art] Store in in slot 0x4
2,905,722 UART: [art] Derive Key Pair
2,906,082 UART: [art] Store priv key in slot 0x5
2,919,320 UART: [art] Derive Key Pair - Done
2,934,030 UART: [art] Signing Cert with AUTHO
2,934,510 UART: RITY.KEYID = 7
2,949,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,515 UART: [art] PUB.X = 25C2B8C3C11B9DFD0CE1667CB8F809F5D06B0814530C6C5626D02D1642B2F7D2504CF2D6F0ECC6ED3796601AA8EA3EC1
2,957,287 UART: [art] PUB.Y = AEF57A9A1EEC7C6DD121F02AC49C10504FA09D695095E4B1A5732A07784025EFB15DACC9E4EB0E768052BFE861C57F09
2,964,242 UART: [art] SIG.R = C915C5F1229724DB165753936B08209D5E0CD7BD001B708A7F165BB3228926B93D133255370BC7D8CAEDD3FD6B07C105
2,970,975 UART: [art] SIG.S = 0BCFA7CD7A6C8BB9BE59C83D7CCA2446959814F4DD7CD3EBEB500A5B95900758EC7231ED71A3E51C042BB28E4BC13523
2,994,940 UART: Caliptra RT
2,995,285 UART: [state] CFI Enabled
3,103,208 UART: [rt] RT listening for mailbox commands...
3,103,878 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,227,124 UART: [rt]cmd =0x41544d4e, len=14344
3,537,199 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,279 UART: [kat] SHA2-256
901,219 UART: [kat] SHA2-384
904,098 UART: [kat] SHA2-512-ACC
905,999 UART: [kat] ECC-384
915,488 UART: [kat] HMAC-384Kdf
919,988 UART: [kat] LMS
1,168,300 UART: [kat] --
1,168,959 UART: [cold-reset] ++
1,169,339 UART: [fht] FHT @ 0x50003400
1,172,049 UART: [idev] ++
1,172,217 UART: [idev] CDI.KEYID = 6
1,172,578 UART: [idev] SUBJECT.KEYID = 7
1,173,003 UART: [idev] UDS.KEYID = 0
1,173,349 ready_for_fw is high
1,173,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,231 UART: [idev] Erasing UDS.KEYID = 0
1,198,049 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,286 UART: [ldev] ++
1,208,454 UART: [ldev] CDI.KEYID = 6
1,208,818 UART: [ldev] SUBJECT.KEYID = 5
1,209,245 UART: [ldev] AUTHORITY.KEYID = 7
1,209,708 UART: [ldev] FE.KEYID = 1
1,214,936 UART: [ldev] Erasing FE.KEYID = 1
1,241,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,532 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46574c44
1,282,084 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,437 >>> mbox cmd response: success
2,772,532 UART: [afmc] ++
2,772,700 UART: [afmc] CDI.KEYID = 6
2,773,063 UART: [afmc] SUBJECT.KEYID = 7
2,773,489 UART: [afmc] AUTHORITY.KEYID = 5
2,808,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,967 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,696 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,579 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,298 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,207 UART: [afmc] --
2,852,303 UART: [cold-reset] --
2,853,021 UART: [state] Locking Datavault
2,854,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,846 UART: [state] Locking ICCM
2,855,330 UART: [exit] Launching FMC @ 0x40000130
2,860,659 UART:
2,860,675 UART: Running Caliptra FMC ...
2,861,083 UART:
2,861,137 UART: [state] CFI Enabled
2,871,734 UART: [fht] FMC Alias Private Key: 7
2,979,095 UART: [art] Extend RT PCRs Done
2,979,523 UART: [art] Lock RT PCRs Done
2,980,913 UART: [art] Populate DV Done
2,989,268 UART: [fht] FMC Alias Private Key: 7
2,990,320 UART: [art] Derive CDI
2,990,600 UART: [art] Store in in slot 0x4
3,076,383 UART: [art] Derive Key Pair
3,076,743 UART: [art] Store priv key in slot 0x5
3,089,975 UART: [art] Derive Key Pair - Done
3,104,725 UART: [art] Signing Cert with AUTHO
3,105,205 UART: RITY.KEYID = 7
3,120,467 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,232 UART: [art] PUB.X = 5E0AF138C76752DC223ED269FBC59B425298A69790A24D469ACF5DC94CE0001D9FAE524A0507B6DBEDDFD7F9CBA4FC4E
3,127,993 UART: [art] PUB.Y = 2EC2F31B0452E109E6F754B5791F89C58AAC302B9876BB83AD56AD8B0DC558D53032476023E7CF796C9B31AEAA1B44B6
3,134,942 UART: [art] SIG.R = 3F3104700FA6841FC8225F7DC0755B82C865AF4F98B57AB15B08B88F9EDD409FB05C7840BCD7E1B11041210EA1170A25
3,141,701 UART: [art] SIG.S = 9A2FBEB8A3062B9F8EE1D99AB7E8566B464350CF408C084817EB9654379BC9F91212E6915493AFB0E7E09FAEA83C1B7D
3,164,846 UART: Caliptra RT
3,165,099 UART: [state] CFI Enabled
3,272,316 UART: [rt] RT listening for mailbox commands...
3,272,986 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,838 UART: [rt]cmd =0x41544d4e, len=14344
3,705,563 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,556 ready_for_fw is high
1,055,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,829 >>> mbox cmd response: success
2,682,241 UART:
2,682,257 UART: Running Caliptra FMC ...
2,682,665 UART:
2,682,719 UART: [state] CFI Enabled
2,693,008 UART: [fht] FMC Alias Private Key: 7
2,801,051 UART: [art] Extend RT PCRs Done
2,801,479 UART: [art] Lock RT PCRs Done
2,802,843 UART: [art] Populate DV Done
2,811,300 UART: [fht] FMC Alias Private Key: 7
2,812,354 UART: [art] Derive CDI
2,812,634 UART: [art] Store in in slot 0x4
2,897,845 UART: [art] Derive Key Pair
2,898,205 UART: [art] Store priv key in slot 0x5
2,911,259 UART: [art] Derive Key Pair - Done
2,925,960 UART: [art] Signing Cert with AUTHO
2,926,440 UART: RITY.KEYID = 7
2,941,822 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,587 UART: [art] PUB.X = 2427A6FE3D0BD5C790BB26F8B2CA1A99FB3D4DBFA9691CDA20DC5DE0FB1EA7EAB6EAAAEEFCF980258ACC10C127066EE4
2,949,389 UART: [art] PUB.Y = 3CBEC07F60723E4E61B999EFB1A7C0853275A2AAB25FA2A817F62DE359FFD22EC7E65A7E3C4F7BB26E0963B1C62E4F5A
2,956,356 UART: [art] SIG.R = A962417EF1E731119DBC4958A1BDE1C822D62161A6A9125D5A938D6AA2AFE2B427F355FF7840E845741E111088C5A290
2,963,126 UART: [art] SIG.S = 8D92BFD32D9C07462AC1A523AB55FAE813D7F11A7B968C2D5CB54286B4B3995F0CAADB56B1E70BD75297AC9E54201BC9
2,986,930 UART: Caliptra RT
2,987,183 UART: [state] CFI Enabled
3,094,737 UART: [rt] RT listening for mailbox commands...
3,095,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,411 UART: [rt]cmd =0x41544d4e, len=14344
3,529,046 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,524 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,484 UART: [kat] ++
895,636 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,021 UART: [kat] HMAC-384Kdf
920,855 UART: [kat] LMS
1,169,167 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,173,076 UART: [idev] ++
1,173,244 UART: [idev] CDI.KEYID = 6
1,173,605 UART: [idev] SUBJECT.KEYID = 7
1,174,030 UART: [idev] UDS.KEYID = 0
1,174,376 ready_for_fw is high
1,174,376 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,264 UART: [idev] Erasing UDS.KEYID = 0
1,199,412 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,243,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,201 UART: [ldev] --
1,282,585 UART: [fwproc] Wait for Commands...
1,283,360 UART: [fwproc] Recv command 0x46574c44
1,284,093 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,850 >>> mbox cmd response: success
2,774,083 UART: [afmc] ++
2,774,251 UART: [afmc] CDI.KEYID = 6
2,774,614 UART: [afmc] SUBJECT.KEYID = 7
2,775,040 UART: [afmc] AUTHORITY.KEYID = 5
2,810,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,986 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,715 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,317 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,150 UART: [afmc] --
2,854,264 UART: [cold-reset] --
2,855,220 UART: [state] Locking Datavault
2,856,171 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,775 UART: [state] Locking ICCM
2,857,447 UART: [exit] Launching FMC @ 0x40000130
2,862,776 UART:
2,862,792 UART: Running Caliptra FMC ...
2,863,200 UART:
2,863,343 UART: [state] CFI Enabled
2,873,794 UART: [fht] FMC Alias Private Key: 7
2,981,751 UART: [art] Extend RT PCRs Done
2,982,179 UART: [art] Lock RT PCRs Done
2,983,803 UART: [art] Populate DV Done
2,992,168 UART: [fht] FMC Alias Private Key: 7
2,993,258 UART: [art] Derive CDI
2,993,538 UART: [art] Store in in slot 0x4
3,079,379 UART: [art] Derive Key Pair
3,079,739 UART: [art] Store priv key in slot 0x5
3,093,361 UART: [art] Derive Key Pair - Done
3,108,166 UART: [art] Signing Cert with AUTHO
3,108,646 UART: RITY.KEYID = 7
3,123,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,467 UART: [art] PUB.X = 18309E4931C77A5DE13D783A87B29CCB6A8C2385C19CB43A8B1C08E10CDB43398CAD92C27B4C5040F71FD60EECDF50AF
3,131,244 UART: [art] PUB.Y = 85C9CC368834F934F9F9A7989F6111F0E6250FC288202614AF47E84B229C357805F3812E7A68AF0F84969A35CF4D996D
3,138,179 UART: [art] SIG.R = 361A2F64C83343834F69CFDF26898842C689CD95585EF243F183F28C2ED83A46F975E0867FA7355CA6B34D3F050B6E27
3,144,941 UART: [art] SIG.S = C03201C828131584447DDF2B765943E23191B45D798ACC138A876EE520BFE26A73BEABDA8E6CEA3AEDABF9A1CE46DB4B
3,168,957 UART: Caliptra RT
3,169,302 UART: [state] CFI Enabled
3,276,389 UART: [rt] RT listening for mailbox commands...
3,277,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,991 UART: [rt]cmd =0x41544d4e, len=14344
3,709,456 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,187 ready_for_fw is high
1,056,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,730 >>> mbox cmd response: success
2,681,428 UART:
2,681,444 UART: Running Caliptra FMC ...
2,681,852 UART:
2,681,995 UART: [state] CFI Enabled
2,692,448 UART: [fht] FMC Alias Private Key: 7
2,800,531 UART: [art] Extend RT PCRs Done
2,800,959 UART: [art] Lock RT PCRs Done
2,802,481 UART: [art] Populate DV Done
2,810,774 UART: [fht] FMC Alias Private Key: 7
2,811,910 UART: [art] Derive CDI
2,812,190 UART: [art] Store in in slot 0x4
2,897,605 UART: [art] Derive Key Pair
2,897,965 UART: [art] Store priv key in slot 0x5
2,911,389 UART: [art] Derive Key Pair - Done
2,926,026 UART: [art] Signing Cert with AUTHO
2,926,506 UART: RITY.KEYID = 7
2,941,632 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,397 UART: [art] PUB.X = D34075BC7DCC59C244D6739249B1C2D35DCDAC3FD92B60A8D74069AD4C717659C70F68905B4AF153A774EAAE60D50210
2,949,169 UART: [art] PUB.Y = EE4DF16D4040D8AA5B0CDA05668FED28CF96591E79367EA35C3608D0F0C4D976574CD036EBD7C45A39382B4547205132
2,956,114 UART: [art] SIG.R = 11F361C5698533EFA6FD9B6A02E5B759D25E692CE1C77496A6AB3DA8C2AEA92F4CE25616F6F47A5AAC3C4F524060C582
2,962,893 UART: [art] SIG.S = 9D5C7AFD050BD411196472742CAC611CDA9DA44D57074D73D59566542D79474330E520190C1B19077883E8018F55CEBA
2,987,344 UART: Caliptra RT
2,987,689 UART: [state] CFI Enabled
3,096,100 UART: [rt] RT listening for mailbox commands...
3,096,770 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,219,702 UART: [rt]cmd =0x41544d4e, len=14344
3,530,025 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,098 UART:
192,452 UART: Running Caliptra ROM ...
193,572 UART:
193,718 UART: [state] CFI Enabled
264,535 UART: [state] LifecycleState = Unprovisioned
266,450 UART: [state] DebugLocked = No
267,912 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,619 UART: [kat] SHA2-256
442,332 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,842 UART: [kat] ++
453,292 UART: [kat] sha1
464,019 UART: [kat] SHA2-256
466,678 UART: [kat] SHA2-384
472,412 UART: [kat] SHA2-512-ACC
474,820 UART: [kat] ECC-384
2,769,194 UART: [kat] HMAC-384Kdf
2,800,399 UART: [kat] LMS
3,990,639 UART: [kat] --
3,996,132 UART: [cold-reset] ++
3,997,911 UART: [fht] Storing FHT @ 0x50003400
4,009,093 UART: [idev] ++
4,009,664 UART: [idev] CDI.KEYID = 6
4,010,567 UART: [idev] SUBJECT.KEYID = 7
4,011,810 UART: [idev] UDS.KEYID = 0
4,012,878 ready_for_fw is high
4,013,097 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,288 UART: [idev] Erasing UDS.KEYID = 0
7,348,545 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,665 UART: [idev] --
7,372,087 UART: [ldev] ++
7,372,704 UART: [ldev] CDI.KEYID = 6
7,373,662 UART: [ldev] SUBJECT.KEYID = 5
7,374,863 UART: [ldev] AUTHORITY.KEYID = 7
7,376,085 UART: [ldev] FE.KEYID = 1
7,423,756 UART: [ldev] Erasing FE.KEYID = 1
10,753,065 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,191 UART: [ldev] --
13,117,482 UART: [fwproc] Waiting for Commands...
13,119,467 UART: [fwproc] Received command 0x46574c44
13,121,695 UART: [fwproc] Received Image of size 113844 bytes
22,148,840 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,228,010 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,296,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,612,615 >>> mbox cmd response: success
22,616,067 UART: [afmc] ++
22,616,656 UART: [afmc] CDI.KEYID = 6
22,617,560 UART: [afmc] SUBJECT.KEYID = 7
22,618,829 UART: [afmc] AUTHORITY.KEYID = 5
25,981,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,281,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,283,754 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,298,364 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,313,097 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,327,344 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,349,061 UART: [afmc] --
28,352,330 UART: [cold-reset] --
28,355,695 UART: [state] Locking Datavault
28,360,994 UART: [state] Locking PCR0, PCR1 and PCR31
28,362,691 UART: [state] Locking ICCM
28,364,833 UART: [exit] Launching FMC @ 0x40000130
28,373,220 UART:
28,373,446 UART: Running Caliptra FMC ...
28,374,540 UART:
28,374,688 UART: [state] CFI Enabled
28,441,007 UART: [fht] FMC Alias Private Key: 7
30,779,307 UART: [art] Extend RT PCRs Done
30,780,518 UART: [art] Lock RT PCRs Done
30,782,107 UART: [art] Populate DV Done
30,787,289 UART: [fht] FMC Alias Private Key: 7
30,788,902 UART: [art] Derive CDI
30,789,714 UART: [art] Store in in slot 0x4
30,849,302 UART: [art] Derive Key Pair
30,850,312 UART: [art] Store priv key in slot 0x5
34,143,760 UART: [art] Derive Key Pair - Done
34,156,580 UART: [art] Signing Cert with AUTHO
34,157,959 UART: RITY.KEYID = 7
36,445,749 UART: [art] Erasing AUTHORITY.KEYID = 7
36,447,244 UART: [art] PUB.X = F167007E7D48557614DB07BD65B24DC51F312258A6032A3DDDE725C2AF02FD180D1992F4C7A180A19DC76725EB1D018C
36,454,468 UART: [art] PUB.Y = 43806040CD44F906DE97DA248AB8A98E3679A623477BEF83501C07706D558133111C4D1FF4E1B79B42439DBC363C93E9
36,461,723 UART: [art] SIG.R = F62E8E9B80204A9B9F6FDC404B33EFA53C9B1DAFC87529D979F8AD9603151A59FB8DE2DC82E560DCDA27958A37626C87
36,469,138 UART: [art] SIG.S = EF1AD8B82FC36FA48909EEA4F22F9CB9EAAA45BC95D0B3619EF7159B229FEE19FB0479FE42D395B4B11067BE7E6262E9
37,774,733 UART: Caliptra RT
37,775,436 UART: [state] CFI Enabled
37,936,995 UART: [rt] RT listening for mailbox commands...
37,939,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,094,651 UART: [rt]cmd =0x41544d4e, len=14344
42,363,859 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,806,493 ready_for_fw is high
3,807,010 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,876,915 >>> mbox cmd response: success
27,554,206 UART:
27,554,592 UART: Running Caliptra FMC ...
27,555,783 UART:
27,555,962 UART: [state] CFI Enabled
27,606,596 UART: [fht] FMC Alias Private Key: 7
29,944,608 UART: [art] Extend RT PCRs Done
29,945,832 UART: [art] Lock RT PCRs Done
29,947,394 UART: [art] Populate DV Done
29,952,744 UART: [fht] FMC Alias Private Key: 7
29,954,286 UART: [art] Derive CDI
29,955,018 UART: [art] Store in in slot 0x4
30,015,081 UART: [art] Derive Key Pair
30,016,123 UART: [art] Store priv key in slot 0x5
33,308,994 UART: [art] Derive Key Pair - Done
33,322,155 UART: [art] Signing Cert with AUTHO
33,323,454 UART: RITY.KEYID = 7
35,610,337 UART: [art] Erasing AUTHORITY.KEYID = 7
35,611,842 UART: [art] PUB.X = 874461787B263EB82FFD48D134F9A9A0E32FBAEF224B45694C4DD070C10635DEF3641179398389445EFB850FA94FE81C
35,619,069 UART: [art] PUB.Y = FC117A0ABD1B14B322B71AD5216587FD5DE7E4DA04828473B0DAE2EA69F29A9890444D41D1EA995E781E8306644CD2B8
35,626,306 UART: [art] SIG.R = 633294F13A0C23975ED51F7218C711D6403B5B69245BA403F4B5E7118710303523740EA49BF999804511937254374F68
35,633,657 UART: [art] SIG.S = 6D7720B7D3288A78A14DE2EA0D56099EFFCB087FC9FFE595B05A596250AB039552F48F7FB6706CCD1C159A2911C5AC88
36,938,630 UART: Caliptra RT
36,939,344 UART: [state] CFI Enabled
37,100,832 UART: [rt] RT listening for mailbox commands...
37,103,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,258,708 UART: [rt]cmd =0x41544d4e, len=14344
41,399,454 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,354 UART:
192,722 UART: Running Caliptra ROM ...
193,824 UART:
603,561 UART: [state] CFI Enabled
618,143 UART: [state] LifecycleState = Unprovisioned
620,085 UART: [state] DebugLocked = No
623,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,062 UART: [kat] SHA2-256
797,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,317 UART: [kat] ++
808,850 UART: [kat] sha1
820,184 UART: [kat] SHA2-256
822,941 UART: [kat] SHA2-384
828,935 UART: [kat] SHA2-512-ACC
831,305 UART: [kat] ECC-384
3,115,715 UART: [kat] HMAC-384Kdf
3,126,957 UART: [kat] LMS
4,317,063 UART: [kat] --
4,319,949 UART: [cold-reset] ++
4,321,103 UART: [fht] Storing FHT @ 0x50003400
4,331,804 UART: [idev] ++
4,332,367 UART: [idev] CDI.KEYID = 6
4,333,303 UART: [idev] SUBJECT.KEYID = 7
4,334,472 UART: [idev] UDS.KEYID = 0
4,335,565 ready_for_fw is high
4,335,774 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,478,812 UART: [idev] Erasing UDS.KEYID = 0
7,624,382 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,191 UART: [idev] --
7,651,477 UART: [ldev] ++
7,652,048 UART: [ldev] CDI.KEYID = 6
7,652,987 UART: [ldev] SUBJECT.KEYID = 5
7,654,198 UART: [ldev] AUTHORITY.KEYID = 7
7,655,483 UART: [ldev] FE.KEYID = 1
7,667,185 UART: [ldev] Erasing FE.KEYID = 1
10,952,520 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,371 UART: [ldev] --
13,312,969 UART: [fwproc] Waiting for Commands...
13,316,252 UART: [fwproc] Received command 0x46574c44
13,318,435 UART: [fwproc] Received Image of size 113844 bytes
22,118,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,199,997 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,268,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,585,560 >>> mbox cmd response: success
22,589,735 UART: [afmc] ++
22,590,335 UART: [afmc] CDI.KEYID = 6
22,591,249 UART: [afmc] SUBJECT.KEYID = 7
22,592,466 UART: [afmc] AUTHORITY.KEYID = 5
25,907,776 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,200,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,203,083 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,217,634 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,232,376 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,246,596 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,268,520 UART: [afmc] --
28,273,038 UART: [cold-reset] --
28,278,250 UART: [state] Locking Datavault
28,282,572 UART: [state] Locking PCR0, PCR1 and PCR31
28,284,327 UART: [state] Locking ICCM
28,285,404 UART: [exit] Launching FMC @ 0x40000130
28,293,798 UART:
28,294,029 UART: Running Caliptra FMC ...
28,295,134 UART:
28,295,291 UART: [state] CFI Enabled
28,303,206 UART: [fht] FMC Alias Private Key: 7
30,634,510 UART: [art] Extend RT PCRs Done
30,635,747 UART: [art] Lock RT PCRs Done
30,637,319 UART: [art] Populate DV Done
30,642,623 UART: [fht] FMC Alias Private Key: 7
30,644,321 UART: [art] Derive CDI
30,645,144 UART: [art] Store in in slot 0x4
30,687,823 UART: [art] Derive Key Pair
30,688,893 UART: [art] Store priv key in slot 0x5
33,930,662 UART: [art] Derive Key Pair - Done
33,943,430 UART: [art] Signing Cert with AUTHO
33,944,767 UART: RITY.KEYID = 7
36,223,828 UART: [art] Erasing AUTHORITY.KEYID = 7
36,225,334 UART: [art] PUB.X = FDAB66E38947A2CDCB9535A431E575E057DDF079C85D6E8EBED1DF48CDEBAD76A2B720744355EFC2534779CD2012A244
36,232,601 UART: [art] PUB.Y = CA7CCC0ABE57E99536785F9190E2003E287D47808856A3674DFAFEB29A2C16FD2BBA72618DE01DB4FD56A148A189D735
36,239,854 UART: [art] SIG.R = B3ACF1258C5C09C2D4C84E6CE395620BDD432FC531F455731C7CD68F3A7884EA66CF8B8BCB5C51F502222CE08FB4EE20
36,247,261 UART: [art] SIG.S = CBF9E3230A51787F6250B366960B286CA5C6AB0C64FFF3E28E95F83BD5ABE0D787C3C20D1ACC418779ED28B65B3E9D17
37,553,241 UART: Caliptra RT
37,553,972 UART: [state] CFI Enabled
37,671,417 UART: [rt] RT listening for mailbox commands...
37,673,703 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,829,280 UART: [rt]cmd =0x41544d4e, len=14344
42,047,537 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,124,699 ready_for_fw is high
4,125,088 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,522,073 >>> mbox cmd response: success
28,170,064 UART:
28,170,489 UART: Running Caliptra FMC ...
28,171,604 UART:
28,171,758 UART: [state] CFI Enabled
28,179,924 UART: [fht] FMC Alias Private Key: 7
30,509,749 UART: [art] Extend RT PCRs Done
30,510,988 UART: [art] Lock RT PCRs Done
30,512,456 UART: [art] Populate DV Done
30,518,023 UART: [fht] FMC Alias Private Key: 7
30,519,542 UART: [art] Derive CDI
30,520,284 UART: [art] Store in in slot 0x4
30,562,989 UART: [art] Derive Key Pair
30,564,029 UART: [art] Store priv key in slot 0x5
33,805,864 UART: [art] Derive Key Pair - Done
33,818,745 UART: [art] Signing Cert with AUTHO
33,820,080 UART: RITY.KEYID = 7
36,099,010 UART: [art] Erasing AUTHORITY.KEYID = 7
36,100,520 UART: [art] PUB.X = 803F323349EEC42FABE2179CD38C2497642810BB85DB91995F70EDDF21850DED58F48F74B0BDE852F30D49D1EF3B3C13
36,107,786 UART: [art] PUB.Y = FA55871409F200522F837D0F3A53AFA58559A951A27EFBD33646CCD40C3AEF6E3E853EADA7B02313BF8986C21E89C588
36,115,051 UART: [art] SIG.R = 9EFE3287BC44F1F2E03FD268D483655E37C8E2D00AF75DE5C3A742DB77EE009E2DE9C58777A1C498588050A7C0C22405
36,122,398 UART: [art] SIG.S = A272E9411645FFEE97F21F80FA1837A96136E36F06B581D372241684210070B8B9ECE8B85F3C941E305138F68385C8F5
37,427,379 UART: Caliptra RT
37,428,106 UART: [state] CFI Enabled
37,545,873 UART: [rt] RT listening for mailbox commands...
37,548,246 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,703,368 UART: [rt]cmd =0x41544d4e, len=14344
41,921,878 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,275 UART:
192,639 UART: Running Caliptra ROM ...
193,790 UART:
193,939 UART: [state] CFI Enabled
262,668 UART: [state] LifecycleState = Unprovisioned
264,520 UART: [state] DebugLocked = No
265,990 UART: [state] WD Timer not started. Device not locked for debugging
269,829 UART: [kat] SHA2-256
448,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,531 UART: [kat] ++
461,057 UART: [kat] sha1
472,508 UART: [kat] SHA2-256
475,515 UART: [kat] SHA2-384
481,855 UART: [kat] SHA2-512-ACC
484,788 UART: [kat] ECC-384
2,948,664 UART: [kat] HMAC-384Kdf
2,972,056 UART: [kat] LMS
3,501,494 UART: [kat] --
3,506,702 UART: [cold-reset] ++
3,507,997 UART: [fht] FHT @ 0x50003400
3,518,998 UART: [idev] ++
3,519,562 UART: [idev] CDI.KEYID = 6
3,520,467 UART: [idev] SUBJECT.KEYID = 7
3,521,661 UART: [idev] UDS.KEYID = 0
3,522,641 ready_for_fw is high
3,522,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,515 UART: [idev] Erasing UDS.KEYID = 0
6,026,671 UART: [idev] Sha1 KeyId Algorithm
6,048,523 UART: [idev] --
6,052,241 UART: [ldev] ++
6,052,825 UART: [ldev] CDI.KEYID = 6
6,053,715 UART: [ldev] SUBJECT.KEYID = 5
6,054,817 UART: [ldev] AUTHORITY.KEYID = 7
6,056,166 UART: [ldev] FE.KEYID = 1
6,102,484 UART: [ldev] Erasing FE.KEYID = 1
8,605,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,541 UART: [ldev] --
10,415,316 UART: [fwproc] Wait for Commands...
10,418,543 UART: [fwproc] Recv command 0x46574c44
10,420,638 UART: [fwproc] Recv'd Img size: 114168 bytes
14,993,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,072,022 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,140,769 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,458,211 >>> mbox cmd response: success
15,462,656 UART: [afmc] ++
15,463,259 UART: [afmc] CDI.KEYID = 6
15,464,144 UART: [afmc] SUBJECT.KEYID = 7
15,465,361 UART: [afmc] AUTHORITY.KEYID = 5
18,003,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,727,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,729,245 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,745,242 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,761,158 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,776,949 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,799,319 UART: [afmc] --
19,802,482 UART: [cold-reset] --
19,806,336 UART: [state] Locking Datavault
19,811,596 UART: [state] Locking PCR0, PCR1 and PCR31
19,813,243 UART: [state] Locking ICCM
19,815,807 UART: [exit] Launching FMC @ 0x40000130
19,824,253 UART:
19,824,495 UART: Running Caliptra FMC ...
19,825,520 UART:
19,825,666 UART: [state] CFI Enabled
19,885,053 UART: [fht] FMC Alias Private Key: 7
21,648,569 UART: [art] Extend RT PCRs Done
21,649,785 UART: [art] Lock RT PCRs Done
21,651,785 UART: [art] Populate DV Done
21,657,144 UART: [fht] FMC Alias Private Key: 7
21,658,736 UART: [art] Derive CDI
21,659,473 UART: [art] Store in in slot 0x4
21,717,583 UART: [art] Derive Key Pair
21,718,579 UART: [art] Store priv key in slot 0x5
24,181,346 UART: [art] Derive Key Pair - Done
24,193,795 UART: [art] Signing Cert with AUTHO
24,195,098 UART: RITY.KEYID = 7
25,907,512 UART: [art] Erasing AUTHORITY.KEYID = 7
25,909,014 UART: [art] PUB.X = 71C2E975B03FD3F180A73AC88D59626E52E575C7E213419A2CABA22B20823D269D49F0CAE62EA7E9D37DBEBB07EC9272
25,916,269 UART: [art] PUB.Y = 76056BBC7333856A2BA8FEBC16397B235E5A3A1BB2FFB6104F91F807994FEFB3DA4D38C35FC29C0EB575924700F39EC0
25,923,553 UART: [art] SIG.R = 2799642D70CCCFE48D125C88C29523BE844AB7F4C7DC0CA5EDFC2DE424D766DB45F1879536699A9D533013E8D5477F15
25,930,936 UART: [art] SIG.S = AD789FDFEE501050A577F5E3B4FBCCCF7B219B3DF3C32072090CD08F556FC72B8DA0255F20D0C8C04470DE6D90B6238C
26,909,882 UART: Caliptra RT
26,910,574 UART: [state] CFI Enabled
27,074,671 UART: [rt] RT listening for mailbox commands...
27,076,979 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,232,451 UART: [rt]cmd =0x41544d4e, len=14344
29,631,218 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,381,090 ready_for_fw is high
3,381,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,085,911 >>> mbox cmd response: success
19,369,487 UART:
19,369,897 UART: Running Caliptra FMC ...
19,371,039 UART:
19,371,208 UART: [state] CFI Enabled
19,434,034 UART: [fht] FMC Alias Private Key: 7
21,198,416 UART: [art] Extend RT PCRs Done
21,199,645 UART: [art] Lock RT PCRs Done
21,201,439 UART: [art] Populate DV Done
21,206,875 UART: [fht] FMC Alias Private Key: 7
21,208,542 UART: [art] Derive CDI
21,209,286 UART: [art] Store in in slot 0x4
21,267,427 UART: [art] Derive Key Pair
21,268,495 UART: [art] Store priv key in slot 0x5
23,731,589 UART: [art] Derive Key Pair - Done
23,744,863 UART: [art] Signing Cert with AUTHO
23,746,167 UART: RITY.KEYID = 7
25,457,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,458,696 UART: [art] PUB.X = 415518ABECE362DEFB1EFD6DB6E78EE7E20249B19C38808945EB8B8CD208AE23BB5BE786587D0CAC0A7BA77DBF1538BB
25,465,986 UART: [art] PUB.Y = 664393F3D6899FBBECDC91E27E8EB47AFB5F8AFC8D08081762E2C85CEA510E2E460034DB4DB909900417B4D60DC5088E
25,473,225 UART: [art] SIG.R = 4C0DF04C9389EE6AC1F571642A74BA28742EB828D6A1BA8093291BF590DC47E42677CA7828BF8A57A6F272A2691DD1BF
25,480,608 UART: [art] SIG.S = FF0D2B4F518F173B6617B058766C4F28B1FB878695A3A02B8457C81CE5BD17EDBE2B0190275E53D0CC736E67394F8C0D
26,459,213 UART: Caliptra RT
26,459,919 UART: [state] CFI Enabled
26,625,585 UART: [rt] RT listening for mailbox commands...
26,628,021 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,783,218 UART: [rt]cmd =0x41544d4e, len=14344
29,181,924 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
193,099 UART:
193,475 UART: Running Caliptra ROM ...
194,685 UART:
604,205 UART: [state] CFI Enabled
619,347 UART: [state] LifecycleState = Unprovisioned
621,241 UART: [state] DebugLocked = No
623,695 UART: [state] WD Timer not started. Device not locked for debugging
627,722 UART: [kat] SHA2-256
806,806 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,424 UART: [kat] ++
818,878 UART: [kat] sha1
830,603 UART: [kat] SHA2-256
833,690 UART: [kat] SHA2-384
839,323 UART: [kat] SHA2-512-ACC
842,324 UART: [kat] ECC-384
3,284,071 UART: [kat] HMAC-384Kdf
3,296,429 UART: [kat] LMS
3,825,923 UART: [kat] --
3,832,693 UART: [cold-reset] ++
3,834,054 UART: [fht] FHT @ 0x50003400
3,845,529 UART: [idev] ++
3,846,099 UART: [idev] CDI.KEYID = 6
3,847,015 UART: [idev] SUBJECT.KEYID = 7
3,848,190 UART: [idev] UDS.KEYID = 0
3,849,237 ready_for_fw is high
3,849,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,909 UART: [idev] Erasing UDS.KEYID = 0
6,318,900 UART: [idev] Sha1 KeyId Algorithm
6,342,021 UART: [idev] --
6,347,638 UART: [ldev] ++
6,348,205 UART: [ldev] CDI.KEYID = 6
6,349,115 UART: [ldev] SUBJECT.KEYID = 5
6,350,351 UART: [ldev] AUTHORITY.KEYID = 7
6,351,584 UART: [ldev] FE.KEYID = 1
6,362,277 UART: [ldev] Erasing FE.KEYID = 1
8,834,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,168 UART: [ldev] --
10,622,411 UART: [fwproc] Wait for Commands...
10,624,648 UART: [fwproc] Recv command 0x46574c44
10,626,744 UART: [fwproc] Recv'd Img size: 114168 bytes
15,206,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,284,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,353,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,670,208 >>> mbox cmd response: success
15,674,085 UART: [afmc] ++
15,674,696 UART: [afmc] CDI.KEYID = 6
15,675,609 UART: [afmc] SUBJECT.KEYID = 7
15,676,769 UART: [afmc] AUTHORITY.KEYID = 5
18,182,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,905,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,907,771 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,923,751 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,939,740 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,955,457 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,978,612 UART: [afmc] --
19,982,496 UART: [cold-reset] --
19,987,098 UART: [state] Locking Datavault
19,992,247 UART: [state] Locking PCR0, PCR1 and PCR31
19,993,900 UART: [state] Locking ICCM
19,996,002 UART: [exit] Launching FMC @ 0x40000130
20,004,425 UART:
20,004,667 UART: Running Caliptra FMC ...
20,005,775 UART:
20,005,949 UART: [state] CFI Enabled
20,014,007 UART: [fht] FMC Alias Private Key: 7
21,770,809 UART: [art] Extend RT PCRs Done
21,772,041 UART: [art] Lock RT PCRs Done
21,773,855 UART: [art] Populate DV Done
21,779,532 UART: [fht] FMC Alias Private Key: 7
21,781,238 UART: [art] Derive CDI
21,782,053 UART: [art] Store in in slot 0x4
21,824,788 UART: [art] Derive Key Pair
21,825,818 UART: [art] Store priv key in slot 0x5
24,252,716 UART: [art] Derive Key Pair - Done
24,265,708 UART: [art] Signing Cert with AUTHO
24,267,006 UART: RITY.KEYID = 7
25,972,378 UART: [art] Erasing AUTHORITY.KEYID = 7
25,973,882 UART: [art] PUB.X = FCC01DD73BEF012FA98690F1DCD9983CCF91F8B8C13EEFE28DF64388D45B791046B7FBF9494F7C8ECAFFAA0C8A0E107E
25,981,204 UART: [art] PUB.Y = E5C4DD5AA62664396CFABCF7F983D421192924CBFF04753A909CDAEF905F7185A55FF127763E1317D74A6586D8A6624B
25,988,452 UART: [art] SIG.R = A2D4FDE27E5ABCD5BB8AB674C01CC19013DEEF04E38CD5EAA78C8863C66080F0EB78A82A7E75724DE05AB3373AC29C41
25,995,911 UART: [art] SIG.S = D4F76B1DA90512004BBE871C6085C72F3DE50AE0A8267C95534954EC49DAC6E7CF74AE59C806AD21E0A89CA1AEFF1A61
26,974,639 UART: Caliptra RT
26,975,317 UART: [state] CFI Enabled
27,092,541 UART: [rt] RT listening for mailbox commands...
27,094,829 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,250,621 UART: [rt]cmd =0x41544d4e, len=14344
29,649,191 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,949 writing to cptra_bootfsm_go
3,691,467 ready_for_fw is high
3,691,846 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,241,869 >>> mbox cmd response: success
19,498,474 UART:
19,498,873 UART: Running Caliptra FMC ...
19,499,982 UART:
19,500,137 UART: [state] CFI Enabled
19,508,049 UART: [fht] FMC Alias Private Key: 7
21,264,693 UART: [art] Extend RT PCRs Done
21,266,052 UART: [art] Lock RT PCRs Done
21,267,837 UART: [art] Populate DV Done
21,273,019 UART: [fht] FMC Alias Private Key: 7
21,274,616 UART: [art] Derive CDI
21,275,356 UART: [art] Store in in slot 0x4
21,318,057 UART: [art] Derive Key Pair
21,319,063 UART: [art] Store priv key in slot 0x5
23,746,022 UART: [art] Derive Key Pair - Done
23,759,024 UART: [art] Signing Cert with AUTHO
23,760,339 UART: RITY.KEYID = 7
25,465,852 UART: [art] Erasing AUTHORITY.KEYID = 7
25,467,361 UART: [art] PUB.X = 23EC84ECEB03E8CEB19F579784FAE84A2FA994D1BDD1E8F18223297245D65D4AB84D38F7BF9456C37B1CAC476E1CFED7
25,474,610 UART: [art] PUB.Y = B1AA7D87D882AB1450C84B2AA2B4BAC6E6F77D81FD7D72CB876DC18EB7FAD964CA44D865056E167C23E55B2FD7BAB021
25,481,937 UART: [art] SIG.R = 8800CEF306487F8D09D2DA4383CE73CB9854DA6A7ED711D7171913896ED1D733F512A7DE85AF52A6C5424D2387773126
25,489,277 UART: [art] SIG.S = DD5EB511938BEA9B340207DC0C9784C609971B3AF701B6906416701DAFB71BC8707B5F8944FC59F8EB9FF1EABF97B881
26,468,214 UART: Caliptra RT
26,468,932 UART: [state] CFI Enabled
26,586,022 UART: [rt] RT listening for mailbox commands...
26,588,360 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,743,725 UART: [rt]cmd =0x41544d4e, len=14344
29,145,160 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,035 UART:
192,405 UART: Running Caliptra ROM ...
193,615 UART:
193,792 UART: [state] CFI Enabled
266,907 UART: [state] LifecycleState = Unprovisioned
269,331 UART: [state] DebugLocked = No
270,661 UART: [state] WD Timer not started. Device not locked for debugging
276,058 UART: [kat] SHA2-256
465,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,706 UART: [kat] ++
477,197 UART: [kat] sha1
489,138 UART: [kat] SHA2-256
492,147 UART: [kat] SHA2-384
498,602 UART: [kat] SHA2-512-ACC
501,158 UART: [kat] ECC-384
2,947,757 UART: [kat] HMAC-384Kdf
2,970,791 UART: [kat] LMS
3,502,573 UART: [kat] --
3,507,665 UART: [cold-reset] ++
3,509,253 UART: [fht] FHT @ 0x50003400
3,521,158 UART: [idev] ++
3,521,871 UART: [idev] CDI.KEYID = 6
3,522,786 UART: [idev] SUBJECT.KEYID = 7
3,523,965 UART: [idev] UDS.KEYID = 0
3,524,893 ready_for_fw is high
3,525,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,679 UART: [idev] Erasing UDS.KEYID = 0
6,028,629 UART: [idev] Sha1 KeyId Algorithm
6,052,279 UART: [idev] --
6,056,946 UART: [ldev] ++
6,057,635 UART: [ldev] CDI.KEYID = 6
6,058,529 UART: [ldev] SUBJECT.KEYID = 5
6,059,637 UART: [ldev] AUTHORITY.KEYID = 7
6,060,926 UART: [ldev] FE.KEYID = 1
6,098,883 UART: [ldev] Erasing FE.KEYID = 1
8,604,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,988 UART: [ldev] --
10,414,278 UART: [fwproc] Wait for Commands...
10,417,330 UART: [fwproc] Recv command 0x46574c44
10,419,649 UART: [fwproc] Recv'd Img size: 114168 bytes
15,010,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,092,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,208,190 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,749,458 >>> mbox cmd response: success
15,753,343 UART: [afmc] ++
15,754,056 UART: [afmc] CDI.KEYID = 6
15,755,231 UART: [afmc] SUBJECT.KEYID = 7
15,756,728 UART: [afmc] AUTHORITY.KEYID = 5
18,300,332 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,024,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,026,172 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,041,227 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,056,431 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,071,258 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,094,985 UART: [afmc] --
20,098,835 UART: [cold-reset] --
20,104,073 UART: [state] Locking Datavault
20,108,062 UART: [state] Locking PCR0, PCR1 and PCR31
20,110,226 UART: [state] Locking ICCM
20,112,515 UART: [exit] Launching FMC @ 0x40000130
20,121,149 UART:
20,121,382 UART: Running Caliptra FMC ...
20,122,409 UART:
20,122,558 UART: [state] CFI Enabled
20,181,781 UART: [fht] FMC Alias Private Key: 7
21,946,356 UART: [art] Extend RT PCRs Done
21,947,562 UART: [art] Lock RT PCRs Done
21,949,485 UART: [art] Populate DV Done
21,954,843 UART: [fht] FMC Alias Private Key: 7
21,956,487 UART: [art] Derive CDI
21,957,223 UART: [art] Store in in slot 0x4
22,014,690 UART: [art] Derive Key Pair
22,015,900 UART: [art] Store priv key in slot 0x5
24,479,026 UART: [art] Derive Key Pair - Done
24,492,083 UART: [art] Signing Cert with AUTHO
24,493,392 UART: RITY.KEYID = 7
26,205,576 UART: [art] Erasing AUTHORITY.KEYID = 7
26,207,082 UART: [art] PUB.X = AF3FE310D2F08B8EA4667B4A566E5F1CCC3034CC7F437A0B3869C7DF90E6C80CE1AAF17303E3584E945F9273E6B1C151
26,214,357 UART: [art] PUB.Y = 3B99198F99DD21EBC789E59D24734986C15F727DA9DA761F53AA795A6DC2062D355E236A4FE06AD0EB80F9E105439C54
26,221,612 UART: [art] SIG.R = B8781251B7515AF33580A1ABC00984955B9575918614D0B1F27159C5B3DD0AD2EE643DD7C0FEC0AA1747B4E9510295E2
26,228,975 UART: [art] SIG.S = 85126A528057F677FC2DE4C3201FF9D10E335423809D6949EDED18E39B73A8841E6ACBDF183BF5C8EFBAC88154705816
27,208,030 UART: Caliptra RT
27,208,724 UART: [state] CFI Enabled
27,373,675 UART: [rt] RT listening for mailbox commands...
27,376,174 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,531,344 UART: [rt]cmd =0x41544d4e, len=14344
29,933,895 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,438,380 ready_for_fw is high
3,438,783 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,864,391 >>> mbox cmd response: success
20,176,760 UART:
20,177,179 UART: Running Caliptra FMC ...
20,178,286 UART:
20,178,440 UART: [state] CFI Enabled
20,242,868 UART: [fht] FMC Alias Private Key: 7
22,007,295 UART: [art] Extend RT PCRs Done
22,008,512 UART: [art] Lock RT PCRs Done
22,010,387 UART: [art] Populate DV Done
22,015,744 UART: [fht] FMC Alias Private Key: 7
22,017,396 UART: [art] Derive CDI
22,018,137 UART: [art] Store in in slot 0x4
22,075,149 UART: [art] Derive Key Pair
22,076,155 UART: [art] Store priv key in slot 0x5
24,539,040 UART: [art] Derive Key Pair - Done
24,551,940 UART: [art] Signing Cert with AUTHO
24,553,244 UART: RITY.KEYID = 7
26,264,395 UART: [art] Erasing AUTHORITY.KEYID = 7
26,265,893 UART: [art] PUB.X = 045094E8FE3E3A7B1FDF746B8E3A17AC0909DC5346EC44B9C1D7D936E03FFEAA0CB05666EE0EFBE3671812B6E3BFAC1B
26,273,179 UART: [art] PUB.Y = E509F691D5F7055D3EB1C18475CB5E97E792E834D759DDDE779C120BAB6C776CA0BFD6056E0539EACC308D5D3FA140A7
26,280,476 UART: [art] SIG.R = CED6FEB8520072C006BB04F83FF706BC83E982027CA2D0AE2164A466872D747A1F2E50345F15FDBAC10FB5A3D5FF9A49
26,287,852 UART: [art] SIG.S = 2BEE94963D8F15A5CCC3A376D726C45F9599A11C346786D6F51F8911134374C80A34E595A5BEEE32971A79436AF6428F
27,267,301 UART: Caliptra RT
27,268,014 UART: [state] CFI Enabled
27,431,248 UART: [rt] RT listening for mailbox commands...
27,433,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,589,170 UART: [rt]cmd =0x41544d4e, len=14344
29,984,549 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,869 writing to cptra_bootfsm_go
193,040 UART:
193,413 UART: Running Caliptra ROM ...
194,613 UART:
604,234 UART: [state] CFI Enabled
614,404 UART: [state] LifecycleState = Unprovisioned
616,749 UART: [state] DebugLocked = No
618,288 UART: [state] WD Timer not started. Device not locked for debugging
623,268 UART: [kat] SHA2-256
813,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,885 UART: [kat] ++
824,437 UART: [kat] sha1
836,309 UART: [kat] SHA2-256
839,339 UART: [kat] SHA2-384
846,541 UART: [kat] SHA2-512-ACC
849,134 UART: [kat] ECC-384
3,290,578 UART: [kat] HMAC-384Kdf
3,304,173 UART: [kat] LMS
3,835,965 UART: [kat] --
3,839,329 UART: [cold-reset] ++
3,840,482 UART: [fht] FHT @ 0x50003400
3,851,885 UART: [idev] ++
3,852,603 UART: [idev] CDI.KEYID = 6
3,853,513 UART: [idev] SUBJECT.KEYID = 7
3,854,761 UART: [idev] UDS.KEYID = 0
3,855,691 ready_for_fw is high
3,855,907 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,999,391 UART: [idev] Erasing UDS.KEYID = 0
6,332,322 UART: [idev] Sha1 KeyId Algorithm
6,354,552 UART: [idev] --
6,359,577 UART: [ldev] ++
6,360,256 UART: [ldev] CDI.KEYID = 6
6,361,139 UART: [ldev] SUBJECT.KEYID = 5
6,362,351 UART: [ldev] AUTHORITY.KEYID = 7
6,363,591 UART: [ldev] FE.KEYID = 1
6,375,405 UART: [ldev] Erasing FE.KEYID = 1
8,852,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,350 UART: [ldev] --
10,644,350 UART: [fwproc] Wait for Commands...
10,647,199 UART: [fwproc] Recv command 0x46574c44
10,649,454 UART: [fwproc] Recv'd Img size: 114168 bytes
15,264,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,351,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,467,280 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,008,765 >>> mbox cmd response: success
16,013,717 UART: [afmc] ++
16,014,432 UART: [afmc] CDI.KEYID = 6
16,015,683 UART: [afmc] SUBJECT.KEYID = 7
16,017,122 UART: [afmc] AUTHORITY.KEYID = 5
18,522,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,244,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,246,555 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,261,588 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,276,823 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,291,697 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,316,470 UART: [afmc] --
20,319,543 UART: [cold-reset] --
20,323,214 UART: [state] Locking Datavault
20,328,525 UART: [state] Locking PCR0, PCR1 and PCR31
20,330,672 UART: [state] Locking ICCM
20,333,258 UART: [exit] Launching FMC @ 0x40000130
20,341,932 UART:
20,342,165 UART: Running Caliptra FMC ...
20,343,268 UART:
20,343,431 UART: [state] CFI Enabled
20,351,536 UART: [fht] FMC Alias Private Key: 7
22,107,790 UART: [art] Extend RT PCRs Done
22,109,009 UART: [art] Lock RT PCRs Done
22,110,478 UART: [art] Populate DV Done
22,115,841 UART: [fht] FMC Alias Private Key: 7
22,117,432 UART: [art] Derive CDI
22,118,245 UART: [art] Store in in slot 0x4
22,160,790 UART: [art] Derive Key Pair
22,161,851 UART: [art] Store priv key in slot 0x5
24,588,698 UART: [art] Derive Key Pair - Done
24,601,909 UART: [art] Signing Cert with AUTHO
24,603,210 UART: RITY.KEYID = 7
26,308,310 UART: [art] Erasing AUTHORITY.KEYID = 7
26,309,813 UART: [art] PUB.X = 9AC84FA401CA6366BFD8EDD62F0155F7EB1035D2D3B89E26FB9A76D9AC7F3048467C2097B70FCE726F854BD87714B057
26,317,109 UART: [art] PUB.Y = F341D01EA4273871B72B99E47C7B348AAD1704DED107B37757BC99BD14487AB7448B85267EADFC134BE37862B4FEF2BC
26,324,340 UART: [art] SIG.R = 74D22CE2FF24E7B8959EEECA4D74019C2C64255BD0F23794BA32B72B5A5AEAF6AAB15BAA6BB1F34F17D460E9146DC7C1
26,331,787 UART: [art] SIG.S = 39BF3AD908DC03EAC539522F4A7F757A1850B9F80B94BE52CFE12F6E44DC915E8C84D1AE6B4AC1B826DB0DF9759868A5
27,310,797 UART: Caliptra RT
27,311,484 UART: [state] CFI Enabled
27,427,950 UART: [rt] RT listening for mailbox commands...
27,430,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,585,487 UART: [rt]cmd =0x41544d4e, len=14344
29,974,177 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,731 writing to cptra_bootfsm_go
3,752,521 ready_for_fw is high
3,753,026 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,048,273 >>> mbox cmd response: success
20,295,456 UART:
20,295,850 UART: Running Caliptra FMC ...
20,297,003 UART:
20,297,196 UART: [state] CFI Enabled
20,305,319 UART: [fht] FMC Alias Private Key: 7
22,062,371 UART: [art] Extend RT PCRs Done
22,063,600 UART: [art] Lock RT PCRs Done
22,064,906 UART: [art] Populate DV Done
22,070,326 UART: [fht] FMC Alias Private Key: 7
22,071,866 UART: [art] Derive CDI
22,072,631 UART: [art] Store in in slot 0x4
22,115,235 UART: [art] Derive Key Pair
22,116,273 UART: [art] Store priv key in slot 0x5
24,543,804 UART: [art] Derive Key Pair - Done
24,556,591 UART: [art] Signing Cert with AUTHO
24,557,893 UART: RITY.KEYID = 7
26,263,713 UART: [art] Erasing AUTHORITY.KEYID = 7
26,265,210 UART: [art] PUB.X = 43F4FFCF6E86A2EFEB75955E84FD8581AAA6CB66D018BC3E0402A0A336539CA2EFBE0611E12F650F002E1F91CD8A60D1
26,272,467 UART: [art] PUB.Y = 17750CFF01B36B03A8F630409C9EA4FF6A8103E6478AE516324F8572D37D53C8324B9015042A832A6D98A88512CEF9A7
26,279,740 UART: [art] SIG.R = 4CE54681D5AFB424B583D588A84967D6CFFEAE096438597CBEE74CBE02500F93464A085F2D4181A9986E0AEDEB69E348
26,287,134 UART: [art] SIG.S = 9858137FCAC3D246CB49CD16AFCC95ACF193D66FD7DA644EE618DCCA936107B4273234795A10C9E64712F8506E519F97
27,266,441 UART: Caliptra RT
27,267,157 UART: [state] CFI Enabled
27,384,401 UART: [rt] RT listening for mailbox commands...
27,386,716 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,542,033 UART: [rt]cmd =0x41544d4e, len=14344
29,932,158 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,654 UART: [state] LifecycleState = Unprovisioned
85,309 UART: [state] DebugLocked = No
85,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,517 UART: [kat] SHA2-256
881,448 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,563 UART: [kat] ++
885,715 UART: [kat] sha1
889,913 UART: [kat] SHA2-256
891,851 UART: [kat] SHA2-384
894,734 UART: [kat] SHA2-512-ACC
896,635 UART: [kat] ECC-384
901,858 UART: [kat] HMAC-384Kdf
906,570 UART: [kat] LMS
1,474,766 UART: [kat] --
1,475,695 UART: [cold-reset] ++
1,476,037 UART: [fht] Storing FHT @ 0x50003400
1,478,878 UART: [idev] ++
1,479,046 UART: [idev] CDI.KEYID = 6
1,479,406 UART: [idev] SUBJECT.KEYID = 7
1,479,830 UART: [idev] UDS.KEYID = 0
1,480,175 ready_for_fw is high
1,480,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,948 UART: [idev] Erasing UDS.KEYID = 0
1,504,320 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,742 UART: [idev] --
1,513,927 UART: [ldev] ++
1,514,095 UART: [ldev] CDI.KEYID = 6
1,514,458 UART: [ldev] SUBJECT.KEYID = 5
1,514,884 UART: [ldev] AUTHORITY.KEYID = 7
1,515,347 UART: [ldev] FE.KEYID = 1
1,520,673 UART: [ldev] Erasing FE.KEYID = 1
1,545,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,086 UART: [ldev] --
1,585,371 UART: [fwproc] Waiting for Commands...
1,586,206 UART: [fwproc] Received command 0x46574c44
1,586,997 UART: [fwproc] Received Image of size 114168 bytes
5,118,588 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,147,024 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,176,376 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,311,953 >>> mbox cmd response: success
5,313,069 UART: [afmc] ++
5,313,237 UART: [afmc] CDI.KEYID = 6
5,313,599 UART: [afmc] SUBJECT.KEYID = 7
5,314,024 UART: [afmc] AUTHORITY.KEYID = 5
5,349,072 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,365,510 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,366,290 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,371,999 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,377,891 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,383,592 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,391,534 UART: [afmc] --
5,392,492 UART: [cold-reset] --
5,393,134 UART: [state] Locking Datavault
5,394,051 UART: [state] Locking PCR0, PCR1 and PCR31
5,394,655 UART: [state] Locking ICCM
5,395,243 UART: [exit] Launching FMC @ 0x40000130
5,400,572 UART:
5,400,588 UART: Running Caliptra FMC ...
5,400,996 UART:
5,401,050 UART: [state] CFI Enabled
5,411,410 UART: [fht] FMC Alias Private Key: 7
5,518,944 UART: [art] Extend RT PCRs Done
5,519,372 UART: [art] Lock RT PCRs Done
5,521,026 UART: [art] Populate DV Done
5,529,078 UART: [fht] FMC Alias Private Key: 7
5,530,228 UART: [art] Derive CDI
5,530,508 UART: [art] Store in in slot 0x4
5,615,987 UART: [art] Derive Key Pair
5,616,347 UART: [art] Store priv key in slot 0x5
5,629,563 UART: [art] Derive Key Pair - Done
5,644,483 UART: [art] Signing Cert with AUTHO
5,644,963 UART: RITY.KEYID = 7
5,660,639 UART: [art] Erasing AUTHORITY.KEYID = 7
5,661,404 UART: [art] PUB.X = 4770D3C5D418E24C09F683AFD5ECEF8777C173C4A91BE6D763EEFD77E25EA30ADF50F87A941398FD73EE7F36EE53CAA2
5,668,188 UART: [art] PUB.Y = B08BC888BA92722303E743A3B25B4F84DAE676079C69A5BB353887DAF2C136CDDBF5293B8B93C29346B48FCC6FF312BA
5,675,144 UART: [art] SIG.R = A3B031691B31FF9881C8F067D65C5F6448C66FF48EDEDB2EF38C38C864B5BD2956FBAFF6AC5DC19C45C1C69FFBC7D9C2
5,681,938 UART: [art] SIG.S = 106157DCCB0D84999F586F95E2F83255D423FCF447C19B3895241F0E77AD09A3947B16D0FD05BE9E67DD5585CE5C9E8A
5,706,255 UART: Caliptra RT
5,706,508 UART: [state] CFI Enabled
5,813,791 UART: [rt] RT listening for mailbox commands...
5,814,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,937,435 UART: [rt]cmd =0x41544d4e, len=14344
6,584,317 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,487 ready_for_fw is high
1,362,487 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,199,776 >>> mbox cmd response: success
5,261,591 UART:
5,261,607 UART: Running Caliptra FMC ...
5,262,015 UART:
5,262,069 UART: [state] CFI Enabled
5,272,457 UART: [fht] FMC Alias Private Key: 7
5,380,753 UART: [art] Extend RT PCRs Done
5,381,181 UART: [art] Lock RT PCRs Done
5,382,719 UART: [art] Populate DV Done
5,391,145 UART: [fht] FMC Alias Private Key: 7
5,392,237 UART: [art] Derive CDI
5,392,517 UART: [art] Store in in slot 0x4
5,478,152 UART: [art] Derive Key Pair
5,478,512 UART: [art] Store priv key in slot 0x5
5,492,164 UART: [art] Derive Key Pair - Done
5,506,776 UART: [art] Signing Cert with AUTHO
5,507,256 UART: RITY.KEYID = 7
5,522,538 UART: [art] Erasing AUTHORITY.KEYID = 7
5,523,303 UART: [art] PUB.X = 214822871836A732C51B169FA9C062EE2BC26FA2A40B0E7CCE2D7F9B94E43E065B5191D5B33BFAB1BCC3210A3419AA78
5,530,071 UART: [art] PUB.Y = 7CB441D9295905D9F6A37D044252051AE229192543C940C7EF587240A1A668548BA208DD34B63950DB5EFD2B279C320C
5,537,000 UART: [art] SIG.R = 9B238ADDB0DD100EDB22439C455541F4F2B2B68666B510706626956BA0295DDB52DB6768F7B1A789F5201F77472B27E7
5,543,765 UART: [art] SIG.S = C66E67CAACD4E48ECE05DE8E96852A3B40C910AD203579BE0BE41099C1F40012586FAF74ABC2A1189CB156011270793F
5,567,291 UART: Caliptra RT
5,567,544 UART: [state] CFI Enabled
5,675,982 UART: [rt] RT listening for mailbox commands...
5,676,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,799,884 UART: [rt]cmd =0x41544d4e, len=14344
6,429,877 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,234 UART: [kat] SHA2-256
882,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,280 UART: [kat] ++
886,432 UART: [kat] sha1
890,824 UART: [kat] SHA2-256
892,762 UART: [kat] SHA2-384
895,357 UART: [kat] SHA2-512-ACC
897,258 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,527 UART: [kat] LMS
1,475,723 UART: [kat] --
1,476,584 UART: [cold-reset] ++
1,476,982 UART: [fht] Storing FHT @ 0x50003400
1,479,929 UART: [idev] ++
1,480,097 UART: [idev] CDI.KEYID = 6
1,480,457 UART: [idev] SUBJECT.KEYID = 7
1,480,881 UART: [idev] UDS.KEYID = 0
1,481,226 ready_for_fw is high
1,481,226 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,677 UART: [idev] Erasing UDS.KEYID = 0
1,505,725 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,378 UART: [ldev] ++
1,515,546 UART: [ldev] CDI.KEYID = 6
1,515,909 UART: [ldev] SUBJECT.KEYID = 5
1,516,335 UART: [ldev] AUTHORITY.KEYID = 7
1,516,798 UART: [ldev] FE.KEYID = 1
1,522,126 UART: [ldev] Erasing FE.KEYID = 1
1,547,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,331 UART: [ldev] --
1,586,736 UART: [fwproc] Waiting for Commands...
1,587,363 UART: [fwproc] Received command 0x46574c44
1,588,154 UART: [fwproc] Received Image of size 114168 bytes
5,421,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,448,969 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,478,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,613,812 >>> mbox cmd response: success
5,614,966 UART: [afmc] ++
5,615,134 UART: [afmc] CDI.KEYID = 6
5,615,496 UART: [afmc] SUBJECT.KEYID = 7
5,615,921 UART: [afmc] AUTHORITY.KEYID = 5
5,650,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,667,361 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,668,141 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,673,850 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,679,742 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,685,443 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,693,357 UART: [afmc] --
5,694,261 UART: [cold-reset] --
5,695,103 UART: [state] Locking Datavault
5,696,174 UART: [state] Locking PCR0, PCR1 and PCR31
5,696,778 UART: [state] Locking ICCM
5,697,294 UART: [exit] Launching FMC @ 0x40000130
5,702,623 UART:
5,702,639 UART: Running Caliptra FMC ...
5,703,047 UART:
5,703,190 UART: [state] CFI Enabled
5,714,090 UART: [fht] FMC Alias Private Key: 7
5,822,046 UART: [art] Extend RT PCRs Done
5,822,474 UART: [art] Lock RT PCRs Done
5,824,072 UART: [art] Populate DV Done
5,832,138 UART: [fht] FMC Alias Private Key: 7
5,833,174 UART: [art] Derive CDI
5,833,454 UART: [art] Store in in slot 0x4
5,918,879 UART: [art] Derive Key Pair
5,919,239 UART: [art] Store priv key in slot 0x5
5,932,345 UART: [art] Derive Key Pair - Done
5,947,094 UART: [art] Signing Cert with AUTHO
5,947,574 UART: RITY.KEYID = 7
5,962,508 UART: [art] Erasing AUTHORITY.KEYID = 7
5,963,273 UART: [art] PUB.X = D87EBDD13ABA0BC6A7535F75FBF6B88968ED26962FB2CB1EAD39FC37F6348DADD47B30634F3995E33C1B38DAF3F80BF8
5,970,061 UART: [art] PUB.Y = 260E92E3A9182C201D470B15A8EBAFF0D7B173A31EC5B87FD2685F06FFC9053B3C1FC59398496281519126D8EF0B487B
5,977,000 UART: [art] SIG.R = 7B1187F444FA74905BA27EEC9AEE734C8309E4FAA5D78F38EA94DD47AF5A1A4FC3B318E7F17DCC6947B79FE420D3F272
5,983,785 UART: [art] SIG.S = D56B499BFC32905EDC8EBCEAED7F1FF3757245D0ADE3F999F4172EB87EC5683F371DAA755B4391374BDAF7B70BC01116
6,007,419 UART: Caliptra RT
6,007,764 UART: [state] CFI Enabled
6,116,051 UART: [rt] RT listening for mailbox commands...
6,116,721 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,239,771 UART: [rt]cmd =0x41544d4e, len=14344
6,881,977 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,982 ready_for_fw is high
1,362,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,238,156 >>> mbox cmd response: success
5,299,231 UART:
5,299,247 UART: Running Caliptra FMC ...
5,299,655 UART:
5,299,798 UART: [state] CFI Enabled
5,310,258 UART: [fht] FMC Alias Private Key: 7
5,418,244 UART: [art] Extend RT PCRs Done
5,418,672 UART: [art] Lock RT PCRs Done
5,420,022 UART: [art] Populate DV Done
5,428,128 UART: [fht] FMC Alias Private Key: 7
5,429,264 UART: [art] Derive CDI
5,429,544 UART: [art] Store in in slot 0x4
5,515,289 UART: [art] Derive Key Pair
5,515,649 UART: [art] Store priv key in slot 0x5
5,529,147 UART: [art] Derive Key Pair - Done
5,544,166 UART: [art] Signing Cert with AUTHO
5,544,646 UART: RITY.KEYID = 7
5,559,902 UART: [art] Erasing AUTHORITY.KEYID = 7
5,560,667 UART: [art] PUB.X = 9FC9646ADB8F6B1837D715C8BBCBD663FFC1C7BB12717C57DAEE3D6282513614BAF802093A33FF641144CAE5C6A9EB76
5,567,447 UART: [art] PUB.Y = B12F0BBA421BA48830E09092B8B2CED4CA8BE98752F79F80ABADA5DF503B1E754672DAFBFD35333560DA92BF4910B5BB
5,574,414 UART: [art] SIG.R = 9AA85EF8BF9B4BC9F7A6258D1AED8DD3DDCEFE86D3EA3EE19E606BCA8CC30EA88E913B7EC15E69AA50B9B9C7913AC806
5,581,212 UART: [art] SIG.S = 6D948FBDC0B827325D7F35379F8FFD4C0260C4B032C10FC56DBD01ADDA7941D67DFED80D172E12AAEB76E5CA5F74B97F
5,604,699 UART: Caliptra RT
5,605,044 UART: [state] CFI Enabled
5,712,947 UART: [rt] RT listening for mailbox commands...
5,713,617 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,836,445 UART: [rt]cmd =0x41544d4e, len=14344
6,476,208 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
893,142 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,267 UART: [kat] ++
897,419 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,362 UART: [kat] SHA2-512-ACC
908,263 UART: [kat] ECC-384
918,064 UART: [kat] HMAC-384Kdf
922,644 UART: [kat] LMS
1,170,972 UART: [kat] --
1,171,877 UART: [cold-reset] ++
1,172,267 UART: [fht] FHT @ 0x50003400
1,174,866 UART: [idev] ++
1,175,034 UART: [idev] CDI.KEYID = 6
1,175,394 UART: [idev] SUBJECT.KEYID = 7
1,175,818 UART: [idev] UDS.KEYID = 0
1,176,163 ready_for_fw is high
1,176,163 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,052 UART: [idev] Erasing UDS.KEYID = 0
1,200,837 UART: [idev] Sha1 KeyId Algorithm
1,209,155 UART: [idev] --
1,210,151 UART: [ldev] ++
1,210,319 UART: [ldev] CDI.KEYID = 6
1,210,682 UART: [ldev] SUBJECT.KEYID = 5
1,211,108 UART: [ldev] AUTHORITY.KEYID = 7
1,211,571 UART: [ldev] FE.KEYID = 1
1,216,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,133 UART: [ldev] --
1,282,562 UART: [fwproc] Wait for Commands...
1,283,328 UART: [fwproc] Recv command 0x46574c44
1,284,056 UART: [fwproc] Recv'd Img size: 114168 bytes
3,122,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,179,067 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,314,568 >>> mbox cmd response: success
3,315,736 UART: [afmc] ++
3,315,904 UART: [afmc] CDI.KEYID = 6
3,316,266 UART: [afmc] SUBJECT.KEYID = 7
3,316,691 UART: [afmc] AUTHORITY.KEYID = 5
3,352,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,880 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,375,589 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,381,481 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,387,192 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,141 UART: [afmc] --
3,396,237 UART: [cold-reset] --
3,397,155 UART: [state] Locking Datavault
3,398,344 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,948 UART: [state] Locking ICCM
3,399,546 UART: [exit] Launching FMC @ 0x40000130
3,404,875 UART:
3,404,891 UART: Running Caliptra FMC ...
3,405,299 UART:
3,405,353 UART: [state] CFI Enabled
3,415,687 UART: [fht] FMC Alias Private Key: 7
3,523,459 UART: [art] Extend RT PCRs Done
3,523,887 UART: [art] Lock RT PCRs Done
3,525,501 UART: [art] Populate DV Done
3,533,671 UART: [fht] FMC Alias Private Key: 7
3,534,657 UART: [art] Derive CDI
3,534,937 UART: [art] Store in in slot 0x4
3,620,642 UART: [art] Derive Key Pair
3,621,002 UART: [art] Store priv key in slot 0x5
3,634,054 UART: [art] Derive Key Pair - Done
3,648,386 UART: [art] Signing Cert with AUTHO
3,648,866 UART: RITY.KEYID = 7
3,664,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,664,775 UART: [art] PUB.X = EA0D9E1239CAD9172E61CC82CCF0DACE148051E8FF57012F08F1D556EDDAB6BCB2CE2C8EF1C3F95D49C88D74D7BDD8AF
3,671,568 UART: [art] PUB.Y = 3C3A1ECAA40DEC7882AF6BF5ECEED867E541D31271E279EC9E143EFDB50208C8649C7A190E18066D585780B5F0A7DD94
3,678,517 UART: [art] SIG.R = 9FA7D3D0BDA7E2EDE85FFBE87BF57B98676426CDA1AD92752A5A1098B9C6925115BC35FDACCDB3D2809BF52EBA7A5F02
3,685,310 UART: [art] SIG.S = 6244C30F478626C66FDF902561C60BCC30AA9729968D06330A8A4AF8C2FF2289B07E7652A1E54A26285D82FEC51CBCE1
3,709,241 UART: Caliptra RT
3,709,494 UART: [state] CFI Enabled
3,816,252 UART: [rt] RT listening for mailbox commands...
3,816,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,174 UART: [rt]cmd =0x41544d4e, len=14344
4,592,184 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,625 ready_for_fw is high
1,060,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,160,078 >>> mbox cmd response: success
3,221,949 UART:
3,221,965 UART: Running Caliptra FMC ...
3,222,373 UART:
3,222,427 UART: [state] CFI Enabled
3,233,195 UART: [fht] FMC Alias Private Key: 7
3,341,297 UART: [art] Extend RT PCRs Done
3,341,725 UART: [art] Lock RT PCRs Done
3,343,471 UART: [art] Populate DV Done
3,351,783 UART: [fht] FMC Alias Private Key: 7
3,352,767 UART: [art] Derive CDI
3,353,047 UART: [art] Store in in slot 0x4
3,438,642 UART: [art] Derive Key Pair
3,439,002 UART: [art] Store priv key in slot 0x5
3,452,168 UART: [art] Derive Key Pair - Done
3,467,057 UART: [art] Signing Cert with AUTHO
3,467,537 UART: RITY.KEYID = 7
3,482,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,483,662 UART: [art] PUB.X = CF567F5F45F424A4676F6F7E03CF826E5111CE35EA2C39E8ADEBF5A0870ABCD9814F135001D438C3C234C7B93F20ACFF
3,490,439 UART: [art] PUB.Y = 3A3B5CF51892FAD33EC61B2222AB31EB3047E375A91744F4DFBFAB346D5D0FB895EBF1849B3083CF9EAA46088BAB6E77
3,497,401 UART: [art] SIG.R = 2EB7089235C4CD75D0468BCE3DB0EEFDF8EF27F6BF8B54259E58FD900AF7F763A56094846DC5AC3105BC1FB36C29270F
3,504,175 UART: [art] SIG.S = 86A16C760F2DAC379275FC0EAA5F323C877C1D250A4F14F2123D6E964E2964134E033012BC93DB8031A9AD65E7F18DCE
3,528,216 UART: Caliptra RT
3,528,469 UART: [state] CFI Enabled
3,635,571 UART: [rt] RT listening for mailbox commands...
3,636,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,759,209 UART: [rt]cmd =0x41544d4e, len=14344
4,399,192 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
893,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,520 UART: [kat] ++
897,672 UART: [kat] sha1
901,724 UART: [kat] SHA2-256
903,664 UART: [kat] SHA2-384
906,571 UART: [kat] SHA2-512-ACC
908,472 UART: [kat] ECC-384
918,197 UART: [kat] HMAC-384Kdf
922,805 UART: [kat] LMS
1,171,133 UART: [kat] --
1,171,908 UART: [cold-reset] ++
1,172,410 UART: [fht] FHT @ 0x50003400
1,175,119 UART: [idev] ++
1,175,287 UART: [idev] CDI.KEYID = 6
1,175,647 UART: [idev] SUBJECT.KEYID = 7
1,176,071 UART: [idev] UDS.KEYID = 0
1,176,416 ready_for_fw is high
1,176,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,625 UART: [idev] Erasing UDS.KEYID = 0
1,201,312 UART: [idev] Sha1 KeyId Algorithm
1,209,792 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,380 UART: [ldev] Erasing FE.KEYID = 1
1,243,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,604 UART: [ldev] --
1,282,967 UART: [fwproc] Wait for Commands...
1,283,693 UART: [fwproc] Recv command 0x46574c44
1,284,421 UART: [fwproc] Recv'd Img size: 114168 bytes
3,120,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,148,295 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,177,599 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,313,126 >>> mbox cmd response: success
3,314,312 UART: [afmc] ++
3,314,480 UART: [afmc] CDI.KEYID = 6
3,314,842 UART: [afmc] SUBJECT.KEYID = 7
3,315,267 UART: [afmc] AUTHORITY.KEYID = 5
3,350,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,367,202 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,367,950 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,373,659 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,379,551 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,385,262 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,393,047 UART: [afmc] --
3,394,103 UART: [cold-reset] --
3,394,901 UART: [state] Locking Datavault
3,396,008 UART: [state] Locking PCR0, PCR1 and PCR31
3,396,612 UART: [state] Locking ICCM
3,397,276 UART: [exit] Launching FMC @ 0x40000130
3,402,605 UART:
3,402,621 UART: Running Caliptra FMC ...
3,403,029 UART:
3,403,172 UART: [state] CFI Enabled
3,413,998 UART: [fht] FMC Alias Private Key: 7
3,521,188 UART: [art] Extend RT PCRs Done
3,521,616 UART: [art] Lock RT PCRs Done
3,523,178 UART: [art] Populate DV Done
3,531,192 UART: [fht] FMC Alias Private Key: 7
3,532,218 UART: [art] Derive CDI
3,532,498 UART: [art] Store in in slot 0x4
3,618,139 UART: [art] Derive Key Pair
3,618,499 UART: [art] Store priv key in slot 0x5
3,632,181 UART: [art] Derive Key Pair - Done
3,647,110 UART: [art] Signing Cert with AUTHO
3,647,590 UART: RITY.KEYID = 7
3,662,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,511 UART: [art] PUB.X = D09E65E610657FDE8B26EB6C7FAFE6009346DED2E0498F8CCE366017CA1D71D34A9E09E5B90A34B5434E08DA70C67CCC
3,670,266 UART: [art] PUB.Y = 7629E25B6A8148829B7CE75F5066DEF9347CF2AA0D64058E097DA763FEF758B8A35510E435A9C896574B847465AE31D6
3,677,205 UART: [art] SIG.R = F2507DC43334552DD461F07103E21F0D0880A57F323780EB05B0422129865247430C3EF1BBFCE180F8E542F7EAF641DC
3,683,958 UART: [art] SIG.S = DFD7B66C5D29D3F0511B39E9D1F5ED8B888E03AD5AF7E3F6F45B42587996961F070D561C22EE7B96E28490FEFD9A6932
3,707,712 UART: Caliptra RT
3,708,057 UART: [state] CFI Enabled
3,816,128 UART: [rt] RT listening for mailbox commands...
3,816,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,940,016 UART: [rt]cmd =0x41544d4e, len=14344
4,586,956 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,454 ready_for_fw is high
1,061,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,669 >>> mbox cmd response: success
3,226,444 UART:
3,226,460 UART: Running Caliptra FMC ...
3,226,868 UART:
3,227,011 UART: [state] CFI Enabled
3,237,263 UART: [fht] FMC Alias Private Key: 7
3,345,223 UART: [art] Extend RT PCRs Done
3,345,651 UART: [art] Lock RT PCRs Done
3,346,959 UART: [art] Populate DV Done
3,354,969 UART: [fht] FMC Alias Private Key: 7
3,355,913 UART: [art] Derive CDI
3,356,193 UART: [art] Store in in slot 0x4
3,441,574 UART: [art] Derive Key Pair
3,441,934 UART: [art] Store priv key in slot 0x5
3,454,886 UART: [art] Derive Key Pair - Done
3,469,567 UART: [art] Signing Cert with AUTHO
3,470,047 UART: RITY.KEYID = 7
3,485,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,198 UART: [art] PUB.X = 63BC520E77D7938120EE5ECE4C1291D06B9859CE06E4134D9DC3F41547D6914FAAC389A0760786A08FB87CC09CAFD174
3,492,965 UART: [art] PUB.Y = 13683476F6A61C1E2F0F0C50040AF34F7F95273B5EC577F1C7A56B081C1CCE20D51352E3FDFA485D280FF71F35777891
3,499,899 UART: [art] SIG.R = 4A118DA4D325AB4D6C65A9530F8701FB10A67B95A57034745B44441C429FA6D01C0AA2825326481A654035AF79C13B05
3,506,651 UART: [art] SIG.S = 0EEEB56FC3FF8CF47F8695250CBB0C7ACD7B7B68EB9C0FC3A14C5C6BAABE22C995EC50E6A063544A91FD10A213DE8572
3,530,864 UART: Caliptra RT
3,531,209 UART: [state] CFI Enabled
3,638,350 UART: [rt] RT listening for mailbox commands...
3,639,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,762,076 UART: [rt]cmd =0x41544d4e, len=14344
4,409,350 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
1,169,132 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,173,117 UART: [idev] ++
1,173,285 UART: [idev] CDI.KEYID = 6
1,173,646 UART: [idev] SUBJECT.KEYID = 7
1,174,071 UART: [idev] UDS.KEYID = 0
1,174,417 ready_for_fw is high
1,174,417 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,198,519 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,460 UART: [ldev] ++
1,208,628 UART: [ldev] CDI.KEYID = 6
1,208,992 UART: [ldev] SUBJECT.KEYID = 5
1,209,419 UART: [ldev] AUTHORITY.KEYID = 7
1,209,882 UART: [ldev] FE.KEYID = 1
1,215,104 UART: [ldev] Erasing FE.KEYID = 1
1,241,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,908 UART: [ldev] --
1,280,298 UART: [fwproc] Wait for Commands...
1,281,063 UART: [fwproc] Recv command 0x46574c44
1,281,796 UART: [fwproc] Recv'd Img size: 114168 bytes
3,105,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,133,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,162,533 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,297,983 >>> mbox cmd response: success
3,299,156 UART: [afmc] ++
3,299,324 UART: [afmc] CDI.KEYID = 6
3,299,687 UART: [afmc] SUBJECT.KEYID = 7
3,300,113 UART: [afmc] AUTHORITY.KEYID = 5
3,336,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,352,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,353,314 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,359,024 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,364,914 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,370,625 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,378,429 UART: [afmc] --
3,379,459 UART: [cold-reset] --
3,380,149 UART: [state] Locking Datavault
3,381,346 UART: [state] Locking PCR0, PCR1 and PCR31
3,381,950 UART: [state] Locking ICCM
3,382,404 UART: [exit] Launching FMC @ 0x40000130
3,387,733 UART:
3,387,749 UART: Running Caliptra FMC ...
3,388,157 UART:
3,388,211 UART: [state] CFI Enabled
3,398,297 UART: [fht] FMC Alias Private Key: 7
3,505,943 UART: [art] Extend RT PCRs Done
3,506,371 UART: [art] Lock RT PCRs Done
3,507,681 UART: [art] Populate DV Done
3,516,245 UART: [fht] FMC Alias Private Key: 7
3,517,377 UART: [art] Derive CDI
3,517,657 UART: [art] Store in in slot 0x4
3,603,270 UART: [art] Derive Key Pair
3,603,630 UART: [art] Store priv key in slot 0x5
3,616,808 UART: [art] Derive Key Pair - Done
3,631,606 UART: [art] Signing Cert with AUTHO
3,632,086 UART: RITY.KEYID = 7
3,647,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,648,083 UART: [art] PUB.X = 4215C9476B6805AE44CD58A55C440B54FD08937763DE0B0FB47B507EF333DD2FD21ED1745CAD04CB5A4EE773E07156D5
3,654,843 UART: [art] PUB.Y = F31641EA6A01C29F6F75AFA2E9BDE8DB215A6CBB91840CE49F9D829F853024B8CBF4DA98BCBE14D3F8333A51DBB89310
3,661,807 UART: [art] SIG.R = 9CC3AB78FACB869134F3B2A0D270F817E95F6DE57DA478391ADEF256E2A48239A07A7CCF66C3C0BF1DCF7F562DA5CCC5
3,668,601 UART: [art] SIG.S = 15EF6DA0B9277B1A91ED63D1689456D71575F485ABBDDB0470824FC17519779001E3283024C3818E5971F04EBA62E7B7
3,692,572 UART: Caliptra RT
3,692,825 UART: [state] CFI Enabled
3,799,177 UART: [rt] RT listening for mailbox commands...
3,799,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,922,827 UART: [rt]cmd =0x41544d4e, len=14344
4,555,299 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,382 ready_for_fw is high
1,056,382 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,136 >>> mbox cmd response: success
3,226,109 UART:
3,226,125 UART: Running Caliptra FMC ...
3,226,533 UART:
3,226,587 UART: [state] CFI Enabled
3,237,189 UART: [fht] FMC Alias Private Key: 7
3,345,431 UART: [art] Extend RT PCRs Done
3,345,859 UART: [art] Lock RT PCRs Done
3,347,199 UART: [art] Populate DV Done
3,355,275 UART: [fht] FMC Alias Private Key: 7
3,356,233 UART: [art] Derive CDI
3,356,513 UART: [art] Store in in slot 0x4
3,441,862 UART: [art] Derive Key Pair
3,442,222 UART: [art] Store priv key in slot 0x5
3,455,308 UART: [art] Derive Key Pair - Done
3,470,053 UART: [art] Signing Cert with AUTHO
3,470,533 UART: RITY.KEYID = 7
3,486,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,984 UART: [art] PUB.X = 86F458C2B6F65A9BA162FB52BAEAB91AF43F6DF7BAEA66B11C9ECA228BAFD49A815EA1B9FC4A5433E8D60B69D460AD60
3,493,779 UART: [art] PUB.Y = 98DAE5F3862B1A45B387127FC27CA49E714490CA3A8436B020AD3A6EB4E45A5E3602F11BF94DB08993B9797C2E3DDE16
3,500,734 UART: [art] SIG.R = 0BF49D07F85AFB08A19D8A4C8C354B097107A89B97512E85612BDD8398536893CB616DBCC0E884D5B60022349042339A
3,507,463 UART: [art] SIG.S = D6F4E8432FAA87DE3C7627C05A29395597479297C39FA5E50B97AD95E1402B0CA18D3ADD86421E8EF854C7ED8F269D9C
3,531,528 UART: Caliptra RT
3,531,781 UART: [state] CFI Enabled
3,639,627 UART: [rt] RT listening for mailbox commands...
3,640,297 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,293 UART: [rt]cmd =0x41544d4e, len=14344
4,405,245 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,644 UART: [kat] SHA2-256
901,584 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
915,555 UART: [kat] HMAC-384Kdf
920,359 UART: [kat] LMS
1,168,671 UART: [kat] --
1,169,720 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,902 UART: [idev] ++
1,173,070 UART: [idev] CDI.KEYID = 6
1,173,431 UART: [idev] SUBJECT.KEYID = 7
1,173,856 UART: [idev] UDS.KEYID = 0
1,174,202 ready_for_fw is high
1,174,202 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,198,914 UART: [idev] Sha1 KeyId Algorithm
1,207,762 UART: [idev] --
1,208,691 UART: [ldev] ++
1,208,859 UART: [ldev] CDI.KEYID = 6
1,209,223 UART: [ldev] SUBJECT.KEYID = 5
1,209,650 UART: [ldev] AUTHORITY.KEYID = 7
1,210,113 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,949 UART: [ldev] --
1,281,249 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,581 UART: [fwproc] Recv'd Img size: 114168 bytes
3,124,981 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,182,856 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,318,468 >>> mbox cmd response: success
3,319,691 UART: [afmc] ++
3,319,859 UART: [afmc] CDI.KEYID = 6
3,320,222 UART: [afmc] SUBJECT.KEYID = 7
3,320,648 UART: [afmc] AUTHORITY.KEYID = 5
3,356,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,372,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,373,281 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,378,991 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,384,881 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,390,592 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,398,370 UART: [afmc] --
3,399,352 UART: [cold-reset] --
3,400,138 UART: [state] Locking Datavault
3,401,157 UART: [state] Locking PCR0, PCR1 and PCR31
3,401,761 UART: [state] Locking ICCM
3,402,209 UART: [exit] Launching FMC @ 0x40000130
3,407,538 UART:
3,407,554 UART: Running Caliptra FMC ...
3,407,962 UART:
3,408,105 UART: [state] CFI Enabled
3,418,759 UART: [fht] FMC Alias Private Key: 7
3,527,029 UART: [art] Extend RT PCRs Done
3,527,457 UART: [art] Lock RT PCRs Done
3,529,357 UART: [art] Populate DV Done
3,537,549 UART: [fht] FMC Alias Private Key: 7
3,538,683 UART: [art] Derive CDI
3,538,963 UART: [art] Store in in slot 0x4
3,624,496 UART: [art] Derive Key Pair
3,624,856 UART: [art] Store priv key in slot 0x5
3,638,040 UART: [art] Derive Key Pair - Done
3,652,835 UART: [art] Signing Cert with AUTHO
3,653,315 UART: RITY.KEYID = 7
3,668,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,669,336 UART: [art] PUB.X = CBA70AF899BDF80EEEEBEF4C1F59291780EE2066B2843B99BBA9801951B5809605AE10291D636C90DFF5ACD7A3AA9589
3,676,111 UART: [art] PUB.Y = 3C2D20A492DD8080417B9FCECD9311E61528957C5848D084BAF7CE9F20BAE0D56B32FE5F71C6FDFCB734DEF3CE863FA3
3,683,081 UART: [art] SIG.R = DB0DBE63A0BB8E514B80235743C131BFD118D6942151E666C70AFE319ADD16370225D02F68F445D94E6BC089E89F44CC
3,689,848 UART: [art] SIG.S = F4E1AB40E7901C3723E3C9807009E97A2A8521BC4A080DDC5B213DA08BD0DB3F416FECCA0D1148C7BCF35BD82A767CD2
3,713,873 UART: Caliptra RT
3,714,218 UART: [state] CFI Enabled
3,821,849 UART: [rt] RT listening for mailbox commands...
3,822,519 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,945,799 UART: [rt]cmd =0x41544d4e, len=14344
4,590,506 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,623 ready_for_fw is high
1,056,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,980 >>> mbox cmd response: success
3,227,819 UART:
3,227,835 UART: Running Caliptra FMC ...
3,228,243 UART:
3,228,386 UART: [state] CFI Enabled
3,239,082 UART: [fht] FMC Alias Private Key: 7
3,347,024 UART: [art] Extend RT PCRs Done
3,347,452 UART: [art] Lock RT PCRs Done
3,348,846 UART: [art] Populate DV Done
3,357,052 UART: [fht] FMC Alias Private Key: 7
3,358,048 UART: [art] Derive CDI
3,358,328 UART: [art] Store in in slot 0x4
3,444,095 UART: [art] Derive Key Pair
3,444,455 UART: [art] Store priv key in slot 0x5
3,457,703 UART: [art] Derive Key Pair - Done
3,472,401 UART: [art] Signing Cert with AUTHO
3,472,881 UART: RITY.KEYID = 7
3,488,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,056 UART: [art] PUB.X = 5CC4E7370B6FFA6C9FDC4411752CB081366441A582470D739EB37F257C71969FD3DBB27684CE35F7D5F894F4CC24FA48
3,495,826 UART: [art] PUB.Y = 5F8575D0BC896046BF15B7E282A020DB1D0FD8FC7E8AA81F43BD2995F52C48A2EABE8A782822A9CA1DC437C4C43A08F2
3,502,786 UART: [art] SIG.R = 1646E3A449E9120CD7408B8AB5B2F2B76E102C108FD854C6908EA93C632981ED7D4633FA3A1141D6BDA04C241972BC90
3,509,555 UART: [art] SIG.S = 96232967F397BD414F3A3DF84D8C5835C459D7410D7AC66E926AF60D2C958CD2FA747C37618DC1D2B17088BE2151AAA5
3,533,282 UART: Caliptra RT
3,533,627 UART: [state] CFI Enabled
3,640,907 UART: [rt] RT listening for mailbox commands...
3,641,577 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,764,685 UART: [rt]cmd =0x41544d4e, len=14344
4,409,418 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
192,909 UART:
193,250 UART: Running Caliptra ROM ...
194,427 UART:
194,577 UART: [state] CFI Enabled
263,252 UART: [state] LifecycleState = Unprovisioned
265,235 UART: [state] DebugLocked = No
266,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,331 UART: [kat] SHA2-256
441,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,523 UART: [kat] ++
452,116 UART: [kat] sha1
461,569 UART: [kat] SHA2-256
464,297 UART: [kat] SHA2-384
469,639 UART: [kat] SHA2-512-ACC
472,010 UART: [kat] ECC-384
2,766,526 UART: [kat] HMAC-384Kdf
2,800,142 UART: [kat] LMS
3,990,446 UART: [kat] --
3,995,599 UART: [cold-reset] ++
3,996,746 UART: [fht] Storing FHT @ 0x50003400
4,007,739 UART: [idev] ++
4,008,339 UART: [idev] CDI.KEYID = 6
4,009,340 UART: [idev] SUBJECT.KEYID = 7
4,010,513 UART: [idev] UDS.KEYID = 0
4,011,567 ready_for_fw is high
4,011,763 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,779 UART: [idev] Erasing UDS.KEYID = 0
7,344,218 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,391 UART: [idev] --
7,368,703 UART: [ldev] ++
7,369,330 UART: [ldev] CDI.KEYID = 6
7,370,234 UART: [ldev] SUBJECT.KEYID = 5
7,371,438 UART: [ldev] AUTHORITY.KEYID = 7
7,372,714 UART: [ldev] FE.KEYID = 1
7,399,933 UART: [ldev] Erasing FE.KEYID = 1
10,732,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,354 UART: [ldev] --
13,113,851 UART: [fwproc] Waiting for Commands...
13,115,674 UART: [fwproc] Received command 0x46574c44
13,117,900 UART: [fwproc] Received Image of size 113844 bytes
22,068,652 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,153,432 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,222,288 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,538,504 >>> mbox cmd response: success
22,543,453 UART: [afmc] ++
22,544,044 UART: [afmc] CDI.KEYID = 6
22,545,063 UART: [afmc] SUBJECT.KEYID = 7
22,546,223 UART: [afmc] AUTHORITY.KEYID = 5
25,912,276 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,212,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,215,111 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,229,657 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,244,402 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,258,646 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,280,999 UART: [afmc] --
28,285,077 UART: [cold-reset] --
28,291,438 UART: [state] Locking Datavault
28,298,676 UART: [state] Locking PCR0, PCR1 and PCR31
28,300,436 UART: [state] Locking ICCM
28,303,229 UART: [exit] Launching FMC @ 0x40000130
28,311,617 UART:
28,311,843 UART: Running Caliptra FMC ...
28,312,932 UART:
28,313,087 UART: [state] CFI Enabled
28,373,975 UART: [fht] FMC Alias Private Key: 7
30,711,883 UART: [art] Extend RT PCRs Done
30,713,100 UART: [art] Lock RT PCRs Done
30,715,016 UART: [art] Populate DV Done
30,720,585 UART: [fht] FMC Alias Private Key: 7
30,722,165 UART: [art] Derive CDI
30,722,893 UART: [art] Store in in slot 0x4
30,782,135 UART: [art] Derive Key Pair
30,783,159 UART: [art] Store priv key in slot 0x5
34,076,023 UART: [art] Derive Key Pair - Done
34,089,341 UART: [art] Signing Cert with AUTHO
34,090,680 UART: RITY.KEYID = 7
36,378,753 UART: [art] Erasing AUTHORITY.KEYID = 7
36,380,268 UART: [art] PUB.X = 0042B6CF2C5E3B8484043574912ACBD231AA6D0276B0922A62019B892729FCF3BA95D56BC6DAC129AD79E5CF7A3C81D7
36,387,474 UART: [art] PUB.Y = B3292799A8214DCCE8D343ACB371892F6FF9070321F1D2315946E1DF233D327E3872B5A5939A892CEF2EB2212157EF9F
36,394,728 UART: [art] SIG.R = 55B31492388AE056DD04AF486C8C2A22AD3077612FFB116CE7358FE58E39CBA7472290F3488F8D05489B6F10B8075F9C
36,402,137 UART: [art] SIG.S = 076F8C35D4A82ADF0DA1A0F9C7392515BB143E60288E781F58C7F195F1E3F9885D968E534E27B18C96C8B6A4D2ED7216
37,707,203 UART: Caliptra RT
37,707,909 UART: [state] CFI Enabled
37,867,550 UART: [rt] RT listening for mailbox commands...
37,869,892 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,025,314 UART: [rt]cmd =0x41544d4e, len=14344
43,531,102 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,784,980 ready_for_fw is high
3,785,611 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,328,627 >>> mbox cmd response: success
28,029,337 UART:
28,029,769 UART: Running Caliptra FMC ...
28,030,878 UART:
28,031,066 UART: [state] CFI Enabled
28,099,075 UART: [fht] FMC Alias Private Key: 7
30,436,785 UART: [art] Extend RT PCRs Done
30,438,045 UART: [art] Lock RT PCRs Done
30,439,562 UART: [art] Populate DV Done
30,444,970 UART: [fht] FMC Alias Private Key: 7
30,446,586 UART: [art] Derive CDI
30,447,396 UART: [art] Store in in slot 0x4
30,507,683 UART: [art] Derive Key Pair
30,508,717 UART: [art] Store priv key in slot 0x5
33,801,526 UART: [art] Derive Key Pair - Done
33,814,735 UART: [art] Signing Cert with AUTHO
33,816,028 UART: RITY.KEYID = 7
36,103,689 UART: [art] Erasing AUTHORITY.KEYID = 7
36,105,209 UART: [art] PUB.X = 335ED734B8FAF648F4FCA8FD1AAA997034D9BE6D6BBD76B4A331FDFA7675FF2F71C9D27D5FBEEA2F2DAFAD839A35F909
36,112,484 UART: [art] PUB.Y = E7A4F6E92285712451356AAE0A4DF60B6AAD8BDE5E5F5638BF9B98177278F9A37CA026E50433B6C476C16471DD61C08A
36,119,727 UART: [art] SIG.R = 11501B3E3D5CBE76031CCFC4A4B7555D23E0C1624C82D670B3BEB991EA045018265A4311DDACD0BA92BA91D4C3ACF792
36,127,119 UART: [art] SIG.S = 2A5BE14C3741373343986023D3F0B376502D1FB3DA52D5B785A57F366106B0F023577E659CC68C87FB6AB492D05BE351
37,431,936 UART: Caliptra RT
37,432,647 UART: [state] CFI Enabled
37,595,114 UART: [rt] RT listening for mailbox commands...
37,597,407 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,752,495 UART: [rt]cmd =0x41544d4e, len=14344
43,232,883 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,608 UART:
192,963 UART: Running Caliptra ROM ...
194,165 UART:
603,824 UART: [state] CFI Enabled
618,551 UART: [state] LifecycleState = Unprovisioned
620,430 UART: [state] DebugLocked = No
622,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,400 UART: [kat] SHA2-256
797,142 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,689 UART: [kat] ++
808,227 UART: [kat] sha1
818,402 UART: [kat] SHA2-256
821,118 UART: [kat] SHA2-384
827,175 UART: [kat] SHA2-512-ACC
829,477 UART: [kat] ECC-384
3,112,444 UART: [kat] HMAC-384Kdf
3,123,820 UART: [kat] LMS
4,313,929 UART: [kat] --
4,318,074 UART: [cold-reset] ++
4,319,089 UART: [fht] Storing FHT @ 0x50003400
4,330,499 UART: [idev] ++
4,331,072 UART: [idev] CDI.KEYID = 6
4,331,987 UART: [idev] SUBJECT.KEYID = 7
4,333,252 UART: [idev] UDS.KEYID = 0
4,334,321 ready_for_fw is high
4,334,524 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,494 UART: [idev] Erasing UDS.KEYID = 0
7,618,391 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,708 UART: [idev] --
7,642,790 UART: [ldev] ++
7,643,358 UART: [ldev] CDI.KEYID = 6
7,644,320 UART: [ldev] SUBJECT.KEYID = 5
7,645,534 UART: [ldev] AUTHORITY.KEYID = 7
7,646,815 UART: [ldev] FE.KEYID = 1
7,656,223 UART: [ldev] Erasing FE.KEYID = 1
10,948,762 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,419 UART: [ldev] --
13,309,851 UART: [fwproc] Waiting for Commands...
13,311,563 UART: [fwproc] Received command 0x46574c44
13,313,797 UART: [fwproc] Received Image of size 113844 bytes
21,944,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,023,959 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,092,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,409,882 >>> mbox cmd response: success
22,413,491 UART: [afmc] ++
22,414,087 UART: [afmc] CDI.KEYID = 6
22,415,006 UART: [afmc] SUBJECT.KEYID = 7
22,416,228 UART: [afmc] AUTHORITY.KEYID = 5
25,731,782 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,025,194 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,027,505 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,042,061 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,056,773 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,071,018 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,092,267 UART: [afmc] --
28,096,508 UART: [cold-reset] --
28,101,772 UART: [state] Locking Datavault
28,104,855 UART: [state] Locking PCR0, PCR1 and PCR31
28,106,555 UART: [state] Locking ICCM
28,108,920 UART: [exit] Launching FMC @ 0x40000130
28,117,309 UART:
28,117,541 UART: Running Caliptra FMC ...
28,118,579 UART:
28,118,728 UART: [state] CFI Enabled
28,126,941 UART: [fht] FMC Alias Private Key: 7
30,457,946 UART: [art] Extend RT PCRs Done
30,459,664 UART: [art] Lock RT PCRs Done
30,460,752 UART: [art] Populate DV Done
30,466,354 UART: [fht] FMC Alias Private Key: 7
30,468,002 UART: [art] Derive CDI
30,469,036 UART: [art] Store in in slot 0x4
30,511,427 UART: [art] Derive Key Pair
30,512,420 UART: [art] Store priv key in slot 0x5
33,754,239 UART: [art] Derive Key Pair - Done
33,767,015 UART: [art] Signing Cert with AUTHO
33,768,317 UART: RITY.KEYID = 7
36,047,845 UART: [art] Erasing AUTHORITY.KEYID = 7
36,049,354 UART: [art] PUB.X = 3A686E9D913CF5679F5AD66BC9191647474BE2D59973FF8D2DE03A6670484C7D23D9674E4EC457B6B12492EB60744DE8
36,056,617 UART: [art] PUB.Y = AF062A3A224E519CABC3050FEB96F48F00DD24FBF0165047B40B5D563159C2F816EB6FC7588610D2550E024685A6C471
36,063,812 UART: [art] SIG.R = C20D91D2A031F333BABF0F9C337A4FBC3EECB6C3764A8E3CF14299E5E324CB2DF1770C26D3BA024A3B98699B603EAD0E
36,071,281 UART: [art] SIG.S = F061D5DAE89ED19D8D8072C25C51D44EC756B8FF2DCB496D5C47F77CAD8B115296A8D238A4CDCCF207332F8E5FBA9086
37,376,647 UART: Caliptra RT
37,377,333 UART: [state] CFI Enabled
37,496,301 UART: [rt] RT listening for mailbox commands...
37,498,645 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,654,299 UART: [rt]cmd =0x41544d4e, len=14344
43,186,174 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,128,120 ready_for_fw is high
4,128,492 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,128,840 >>> mbox cmd response: success
27,769,856 UART:
27,770,249 UART: Running Caliptra FMC ...
27,771,350 UART:
27,771,522 UART: [state] CFI Enabled
27,779,248 UART: [fht] FMC Alias Private Key: 7
30,111,074 UART: [art] Extend RT PCRs Done
30,112,301 UART: [art] Lock RT PCRs Done
30,114,121 UART: [art] Populate DV Done
30,119,584 UART: [fht] FMC Alias Private Key: 7
30,121,286 UART: [art] Derive CDI
30,122,025 UART: [art] Store in in slot 0x4
30,165,004 UART: [art] Derive Key Pair
30,166,047 UART: [art] Store priv key in slot 0x5
33,407,680 UART: [art] Derive Key Pair - Done
33,420,678 UART: [art] Signing Cert with AUTHO
33,422,013 UART: RITY.KEYID = 7
35,701,726 UART: [art] Erasing AUTHORITY.KEYID = 7
35,703,229 UART: [art] PUB.X = 65F8BEBB023BF02E9E176D4C9127C08002B89604B770AC15B3E580DAD46B432A9D1BF38D1181EAA7751660361D86A851
35,710,435 UART: [art] PUB.Y = FF860CC1CA4F25AC790AEFCFE63FA4F469E1190D377E5C75D4F78F1CB0137769A6D8DD44981112CF57B0554EB2925AE1
35,717,728 UART: [art] SIG.R = DA5FC434729291C1B128D7049DF1E4E16EDBCE09FBF76E338EE35A66AE6FD775E43C76D9964B53A1B399D18703599127
35,725,076 UART: [art] SIG.S = 2F66D841CD28A87554653A70804044BAC157C3226049EA382B101F4264041C5860C2C852FD057956FE4EF8593715106F
37,030,248 UART: Caliptra RT
37,030,956 UART: [state] CFI Enabled
37,148,093 UART: [rt] RT listening for mailbox commands...
37,150,403 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,305,697 UART: [rt]cmd =0x41544d4e, len=14344
42,863,404 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,071 UART:
192,476 UART: Running Caliptra ROM ...
193,583 UART:
193,727 UART: [state] CFI Enabled
264,863 UART: [state] LifecycleState = Unprovisioned
266,697 UART: [state] DebugLocked = No
269,426 UART: [state] WD Timer not started. Device not locked for debugging
273,603 UART: [kat] SHA2-256
452,710 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,319 UART: [kat] ++
464,768 UART: [kat] sha1
474,716 UART: [kat] SHA2-256
477,728 UART: [kat] SHA2-384
484,356 UART: [kat] SHA2-512-ACC
487,295 UART: [kat] ECC-384
2,948,628 UART: [kat] HMAC-384Kdf
2,971,180 UART: [kat] LMS
3,500,598 UART: [kat] --
3,504,947 UART: [cold-reset] ++
3,505,888 UART: [fht] FHT @ 0x50003400
3,517,225 UART: [idev] ++
3,517,787 UART: [idev] CDI.KEYID = 6
3,518,814 UART: [idev] SUBJECT.KEYID = 7
3,519,918 UART: [idev] UDS.KEYID = 0
3,520,853 ready_for_fw is high
3,521,043 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,765 UART: [idev] Erasing UDS.KEYID = 0
6,030,185 UART: [idev] Sha1 KeyId Algorithm
6,053,235 UART: [idev] --
6,056,470 UART: [ldev] ++
6,057,055 UART: [ldev] CDI.KEYID = 6
6,057,970 UART: [ldev] SUBJECT.KEYID = 5
6,059,139 UART: [ldev] AUTHORITY.KEYID = 7
6,060,454 UART: [ldev] FE.KEYID = 1
6,099,084 UART: [ldev] Erasing FE.KEYID = 1
8,604,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,004 UART: [ldev] --
10,413,118 UART: [fwproc] Wait for Commands...
10,414,726 UART: [fwproc] Recv command 0x46574c44
10,416,773 UART: [fwproc] Recv'd Img size: 114168 bytes
15,008,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,086,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,154,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,472,659 >>> mbox cmd response: success
15,477,739 UART: [afmc] ++
15,478,351 UART: [afmc] CDI.KEYID = 6
15,479,236 UART: [afmc] SUBJECT.KEYID = 7
15,480,457 UART: [afmc] AUTHORITY.KEYID = 5
18,020,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,744,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,745,876 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,761,851 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,777,814 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,793,601 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,816,373 UART: [afmc] --
19,820,191 UART: [cold-reset] --
19,822,539 UART: [state] Locking Datavault
19,828,711 UART: [state] Locking PCR0, PCR1 and PCR31
19,830,361 UART: [state] Locking ICCM
19,832,517 UART: [exit] Launching FMC @ 0x40000130
19,840,972 UART:
19,841,225 UART: Running Caliptra FMC ...
19,842,254 UART:
19,842,403 UART: [state] CFI Enabled
19,905,038 UART: [fht] FMC Alias Private Key: 7
21,668,600 UART: [art] Extend RT PCRs Done
21,669,829 UART: [art] Lock RT PCRs Done
21,671,587 UART: [art] Populate DV Done
21,677,111 UART: [fht] FMC Alias Private Key: 7
21,678,596 UART: [art] Derive CDI
21,679,331 UART: [art] Store in in slot 0x4
21,737,462 UART: [art] Derive Key Pair
21,738,504 UART: [art] Store priv key in slot 0x5
24,201,105 UART: [art] Derive Key Pair - Done
24,214,320 UART: [art] Signing Cert with AUTHO
24,215,630 UART: RITY.KEYID = 7
25,927,046 UART: [art] Erasing AUTHORITY.KEYID = 7
25,928,592 UART: [art] PUB.X = 807A508D3B1591A9EA1CF049EE82FE486A4676B4689CBA6E912500853798DF00CE65C14E7D9FC7E6714AD71BDF308994
25,935,803 UART: [art] PUB.Y = 555AA9715B2C596853547B75F058280C395ED1FDE02D7AEFB7B76A2C324CB01FDA941083945AC98DCEB8DDF108A1D7CE
25,943,048 UART: [art] SIG.R = E3701B2E0AC506C7E5BD7EB3D53D2DD4AED5392E29C9B3A89BB8BBCE1DBC70A459C808CB20F026B44F9795474DD91FD9
25,950,466 UART: [art] SIG.S = 52B0CE798D4DDC4C02CF673419758B0603045F2383F86A78FA3B0C9BA61207E8A0276714F941D847AE0000DCB510B9D4
26,929,651 UART: Caliptra RT
26,930,363 UART: [state] CFI Enabled
27,093,609 UART: [rt] RT listening for mailbox commands...
27,096,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,251,257 UART: [rt]cmd =0x41544d4e, len=14344
30,601,764 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,382,270 ready_for_fw is high
3,382,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,052,835 >>> mbox cmd response: success
19,346,832 UART:
19,347,259 UART: Running Caliptra FMC ...
19,348,370 UART:
19,348,528 UART: [state] CFI Enabled
19,414,911 UART: [fht] FMC Alias Private Key: 7
21,179,248 UART: [art] Extend RT PCRs Done
21,180,471 UART: [art] Lock RT PCRs Done
21,181,854 UART: [art] Populate DV Done
21,187,183 UART: [fht] FMC Alias Private Key: 7
21,188,780 UART: [art] Derive CDI
21,189,518 UART: [art] Store in in slot 0x4
21,247,963 UART: [art] Derive Key Pair
21,249,002 UART: [art] Store priv key in slot 0x5
23,711,848 UART: [art] Derive Key Pair - Done
23,724,516 UART: [art] Signing Cert with AUTHO
23,725,856 UART: RITY.KEYID = 7
25,438,396 UART: [art] Erasing AUTHORITY.KEYID = 7
25,439,896 UART: [art] PUB.X = 6A5F5E336054B3EA8CCF122993B1EDC4E28CB691119B3313BFCB485196255E32373E81E02F443C60E3DF9596E1451AE1
25,447,187 UART: [art] PUB.Y = 2FD66A261EFD89EA440D748A8B74C6078D18054599B9DEA097E418CF0F4383594EEA35A329E7CAFFDABA94859DC939D8
25,454,420 UART: [art] SIG.R = B69AE1129908329D63CA316717A09DB4CDC4DC0FF1157451503F24BA83E258F3B0ADF9C441638C4CCC1DB56CE49C8130
25,461,863 UART: [art] SIG.S = 24180E3838E9666D5FDAD657B1795F02CDFF10F3133A2CB36D8DD9DDC7221DBD72C40994FE0CF4E3EC80C6D37AE69E93
26,441,309 UART: Caliptra RT
26,442,027 UART: [state] CFI Enabled
26,606,309 UART: [rt] RT listening for mailbox commands...
26,608,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,763,614 UART: [rt]cmd =0x41544d4e, len=14344
30,122,161 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,827 writing to cptra_bootfsm_go
193,056 UART:
193,413 UART: Running Caliptra ROM ...
194,620 UART:
604,287 UART: [state] CFI Enabled
618,457 UART: [state] LifecycleState = Unprovisioned
620,285 UART: [state] DebugLocked = No
621,970 UART: [state] WD Timer not started. Device not locked for debugging
625,722 UART: [kat] SHA2-256
804,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,396 UART: [kat] ++
816,952 UART: [kat] sha1
827,269 UART: [kat] SHA2-256
830,283 UART: [kat] SHA2-384
835,706 UART: [kat] SHA2-512-ACC
838,643 UART: [kat] ECC-384
3,283,673 UART: [kat] HMAC-384Kdf
3,295,700 UART: [kat] LMS
3,825,217 UART: [kat] --
3,829,648 UART: [cold-reset] ++
3,831,298 UART: [fht] FHT @ 0x50003400
3,842,916 UART: [idev] ++
3,843,488 UART: [idev] CDI.KEYID = 6
3,844,525 UART: [idev] SUBJECT.KEYID = 7
3,845,629 UART: [idev] UDS.KEYID = 0
3,846,560 ready_for_fw is high
3,846,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,498 UART: [idev] Erasing UDS.KEYID = 0
6,318,732 UART: [idev] Sha1 KeyId Algorithm
6,342,453 UART: [idev] --
6,346,718 UART: [ldev] ++
6,347,289 UART: [ldev] CDI.KEYID = 6
6,348,223 UART: [ldev] SUBJECT.KEYID = 5
6,349,429 UART: [ldev] AUTHORITY.KEYID = 7
6,350,660 UART: [ldev] FE.KEYID = 1
6,363,443 UART: [ldev] Erasing FE.KEYID = 1
8,835,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,985 UART: [ldev] --
10,625,343 UART: [fwproc] Wait for Commands...
10,628,321 UART: [fwproc] Recv command 0x46574c44
10,630,429 UART: [fwproc] Recv'd Img size: 114168 bytes
15,229,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,308,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,376,877 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,695,054 >>> mbox cmd response: success
15,699,760 UART: [afmc] ++
15,700,364 UART: [afmc] CDI.KEYID = 6
15,701,279 UART: [afmc] SUBJECT.KEYID = 7
15,702,436 UART: [afmc] AUTHORITY.KEYID = 5
18,204,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,922,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,924,795 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,940,725 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,956,696 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,972,506 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,995,748 UART: [afmc] --
20,000,434 UART: [cold-reset] --
20,004,569 UART: [state] Locking Datavault
20,011,497 UART: [state] Locking PCR0, PCR1 and PCR31
20,013,149 UART: [state] Locking ICCM
20,015,577 UART: [exit] Launching FMC @ 0x40000130
20,024,028 UART:
20,024,269 UART: Running Caliptra FMC ...
20,025,372 UART:
20,025,535 UART: [state] CFI Enabled
20,033,801 UART: [fht] FMC Alias Private Key: 7
21,790,726 UART: [art] Extend RT PCRs Done
21,791,943 UART: [art] Lock RT PCRs Done
21,793,600 UART: [art] Populate DV Done
21,799,123 UART: [fht] FMC Alias Private Key: 7
21,800,769 UART: [art] Derive CDI
21,801,607 UART: [art] Store in in slot 0x4
21,844,153 UART: [art] Derive Key Pair
21,845,195 UART: [art] Store priv key in slot 0x5
24,271,221 UART: [art] Derive Key Pair - Done
24,284,327 UART: [art] Signing Cert with AUTHO
24,285,657 UART: RITY.KEYID = 7
25,990,708 UART: [art] Erasing AUTHORITY.KEYID = 7
25,992,214 UART: [art] PUB.X = 206AD0528B9F13D413C05CAC714E419C1C393921DC8EE5462266C77E98944976DDFC3410F95E2CE54006A0C7E6F18DEE
25,999,471 UART: [art] PUB.Y = 8E5A930CE5105902EB000370A570BB0AB4CA1BE0EB3475F57F0FEFD90C1FE94E29F84363817049D7416B42C020B56B1D
26,006,769 UART: [art] SIG.R = 345F507CBBADE6468C8077260840FB50991ECA806BFECA37671DA85EEF17AFB3990CB11A7F094C0E7B36496B9777D70D
26,014,126 UART: [art] SIG.S = 2CADC37E6B21CCB769423A349C22CA6D769092EC6762FB2FAFBDB16B50B22FF8C04C44CDDDCBA760835DD6FA74B6D4C3
26,993,302 UART: Caliptra RT
26,994,013 UART: [state] CFI Enabled
27,110,316 UART: [rt] RT listening for mailbox commands...
27,112,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,267,852 UART: [rt]cmd =0x41544d4e, len=14344
30,632,966 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,988 writing to cptra_bootfsm_go
3,693,127 ready_for_fw is high
3,693,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,235,995 >>> mbox cmd response: success
19,489,620 UART:
19,490,048 UART: Running Caliptra FMC ...
19,491,189 UART:
19,491,354 UART: [state] CFI Enabled
19,498,807 UART: [fht] FMC Alias Private Key: 7
21,255,410 UART: [art] Extend RT PCRs Done
21,256,646 UART: [art] Lock RT PCRs Done
21,258,139 UART: [art] Populate DV Done
21,263,635 UART: [fht] FMC Alias Private Key: 7
21,265,335 UART: [art] Derive CDI
21,266,074 UART: [art] Store in in slot 0x4
21,308,510 UART: [art] Derive Key Pair
21,309,553 UART: [art] Store priv key in slot 0x5
23,735,685 UART: [art] Derive Key Pair - Done
23,748,954 UART: [art] Signing Cert with AUTHO
23,750,255 UART: RITY.KEYID = 7
25,455,796 UART: [art] Erasing AUTHORITY.KEYID = 7
25,457,302 UART: [art] PUB.X = 53C005FAF51DF592729591B69EE5586EBA443E5A6576C0D2A7C769B0E4D79E1DCB79DDF4576E64FB48A6130E38EA3E72
25,464,625 UART: [art] PUB.Y = 7C123BF129A05B4C3BDBAD10B03FCFF98EC664C3CB6FADD16AE4FAAFD7849D42DD88BF7FA3F9218FD1B5CAF0D1C15E15
25,471,902 UART: [art] SIG.R = C9C563E45F9D7BE80DB0F9C551FE4F170DE1F51CB3DECE34CCED7F9DF0952A0B59A04D10D78F41AC5D69A1EAE8393D2C
25,479,355 UART: [art] SIG.S = 09CE0F0307CA002A0FB03526AAF1137C5839D9159FF17BA66FB639725A129F12B1773606E1D3A4DB250DE3D851CE352C
26,458,226 UART: Caliptra RT
26,458,930 UART: [state] CFI Enabled
26,576,104 UART: [rt] RT listening for mailbox commands...
26,578,415 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,733,833 UART: [rt]cmd =0x41544d4e, len=14344
30,092,232 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,189 UART:
192,554 UART: Running Caliptra ROM ...
193,748 UART:
193,906 UART: [state] CFI Enabled
262,869 UART: [state] LifecycleState = Unprovisioned
265,219 UART: [state] DebugLocked = No
268,031 UART: [state] WD Timer not started. Device not locked for debugging
272,725 UART: [kat] SHA2-256
462,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,412 UART: [kat] ++
474,140 UART: [kat] sha1
484,966 UART: [kat] SHA2-256
487,973 UART: [kat] SHA2-384
494,813 UART: [kat] SHA2-512-ACC
497,413 UART: [kat] ECC-384
2,946,329 UART: [kat] HMAC-384Kdf
2,972,288 UART: [kat] LMS
3,504,067 UART: [kat] --
3,508,274 UART: [cold-reset] ++
3,510,081 UART: [fht] FHT @ 0x50003400
3,521,474 UART: [idev] ++
3,522,233 UART: [idev] CDI.KEYID = 6
3,523,165 UART: [idev] SUBJECT.KEYID = 7
3,524,348 UART: [idev] UDS.KEYID = 0
3,525,276 ready_for_fw is high
3,525,502 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,192 UART: [idev] Erasing UDS.KEYID = 0
6,026,750 UART: [idev] Sha1 KeyId Algorithm
6,048,399 UART: [idev] --
6,053,753 UART: [ldev] ++
6,054,457 UART: [ldev] CDI.KEYID = 6
6,055,346 UART: [ldev] SUBJECT.KEYID = 5
6,056,560 UART: [ldev] AUTHORITY.KEYID = 7
6,057,689 UART: [ldev] FE.KEYID = 1
6,099,537 UART: [ldev] Erasing FE.KEYID = 1
8,606,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,309 UART: [ldev] --
10,413,044 UART: [fwproc] Wait for Commands...
10,415,734 UART: [fwproc] Recv command 0x46574c44
10,418,043 UART: [fwproc] Recv'd Img size: 114168 bytes
15,060,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,142,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,258,850 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,800,469 >>> mbox cmd response: success
15,805,118 UART: [afmc] ++
15,805,834 UART: [afmc] CDI.KEYID = 6
15,807,083 UART: [afmc] SUBJECT.KEYID = 7
15,808,525 UART: [afmc] AUTHORITY.KEYID = 5
18,343,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,064,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,066,455 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,081,545 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,096,722 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,111,559 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,135,130 UART: [afmc] --
20,139,210 UART: [cold-reset] --
20,142,916 UART: [state] Locking Datavault
20,147,427 UART: [state] Locking PCR0, PCR1 and PCR31
20,149,602 UART: [state] Locking ICCM
20,150,893 UART: [exit] Launching FMC @ 0x40000130
20,159,583 UART:
20,159,860 UART: Running Caliptra FMC ...
20,160,974 UART:
20,161,134 UART: [state] CFI Enabled
20,223,830 UART: [fht] FMC Alias Private Key: 7
21,988,153 UART: [art] Extend RT PCRs Done
21,989,376 UART: [art] Lock RT PCRs Done
21,991,023 UART: [art] Populate DV Done
21,996,218 UART: [fht] FMC Alias Private Key: 7
21,997,847 UART: [art] Derive CDI
21,998,671 UART: [art] Store in in slot 0x4
22,056,255 UART: [art] Derive Key Pair
22,057,260 UART: [art] Store priv key in slot 0x5
24,520,184 UART: [art] Derive Key Pair - Done
24,533,414 UART: [art] Signing Cert with AUTHO
24,534,725 UART: RITY.KEYID = 7
26,246,498 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,019 UART: [art] PUB.X = E4A684B0B656225DDCE71C65C1511549F153A064EF54AF032FFFF628C6F073CBDD18DC2EA60BF95781F2C10854C7B70C
26,255,297 UART: [art] PUB.Y = E424B2A5FB9AEF085BD02A32B937EC129FFB9248B989FFE3EE6A829E03B3D46EBF9D49C6890EA1645DE74D58945E2C47
26,262,608 UART: [art] SIG.R = 8AC1B1577C32742D67D4587B3CD23529E5186F68406F0764021D20774E92B8A190FDAD41D12D1F6FAFCFE4BC062CF834
26,269,991 UART: [art] SIG.S = A962FE5055C580AACD2C393218F5BE834CCCF1BF7CC665ACCAE1B2D15E2B9A10FA30661D512D29E7846CE9E8283571BB
27,249,382 UART: Caliptra RT
27,250,071 UART: [state] CFI Enabled
27,414,775 UART: [rt] RT listening for mailbox commands...
27,417,113 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,572,500 UART: [rt]cmd =0x41544d4e, len=14344
30,933,761 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,416,837 ready_for_fw is high
3,417,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,814,658 >>> mbox cmd response: success
20,087,503 UART:
20,087,933 UART: Running Caliptra FMC ...
20,089,081 UART:
20,089,252 UART: [state] CFI Enabled
20,139,446 UART: [fht] FMC Alias Private Key: 7
21,903,451 UART: [art] Extend RT PCRs Done
21,904,686 UART: [art] Lock RT PCRs Done
21,906,501 UART: [art] Populate DV Done
21,911,754 UART: [fht] FMC Alias Private Key: 7
21,913,246 UART: [art] Derive CDI
21,914,015 UART: [art] Store in in slot 0x4
21,972,266 UART: [art] Derive Key Pair
21,973,306 UART: [art] Store priv key in slot 0x5
24,436,000 UART: [art] Derive Key Pair - Done
24,449,032 UART: [art] Signing Cert with AUTHO
24,450,363 UART: RITY.KEYID = 7
26,162,744 UART: [art] Erasing AUTHORITY.KEYID = 7
26,164,253 UART: [art] PUB.X = E66EF39EC5052EB96A7CA88BF2CC37D72AD0D55AD0DD1DAD96282111655F6B98F9EC9B4C8A509FA06F6A67AFBDD37893
26,171,492 UART: [art] PUB.Y = 77889AE8E396A41FC7A82F0FF1078099BE68B8844FF52730C2D11F7D011817793C5B8522ABDCA3FAE3B4A9F6B777AE57
26,178,747 UART: [art] SIG.R = FFCA92BCF944442B25F1FCE8822D80BF2BF51E51F6DFA060CE322AC07DD76E17813196055F8E73D30C6FCD55606BA256
26,186,184 UART: [art] SIG.S = 83903ADF0EF472548563F3B0ACC93CF94AF409AAA693D60E734519BD75042D81EFF1B036A13E8F8C4F5444FD8C21F96C
27,164,900 UART: Caliptra RT
27,165,613 UART: [state] CFI Enabled
27,332,562 UART: [rt] RT listening for mailbox commands...
27,334,880 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,490,348 UART: [rt]cmd =0x41544d4e, len=14344
30,849,992 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,698 writing to cptra_bootfsm_go
192,963 UART:
193,311 UART: Running Caliptra ROM ...
194,501 UART:
604,222 UART: [state] CFI Enabled
616,614 UART: [state] LifecycleState = Unprovisioned
618,987 UART: [state] DebugLocked = No
621,313 UART: [state] WD Timer not started. Device not locked for debugging
625,569 UART: [kat] SHA2-256
815,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,229 UART: [kat] ++
826,834 UART: [kat] sha1
838,715 UART: [kat] SHA2-256
841,726 UART: [kat] SHA2-384
846,438 UART: [kat] SHA2-512-ACC
849,019 UART: [kat] ECC-384
3,289,001 UART: [kat] HMAC-384Kdf
3,300,957 UART: [kat] LMS
3,832,785 UART: [kat] --
3,835,383 UART: [cold-reset] ++
3,837,536 UART: [fht] FHT @ 0x50003400
3,848,371 UART: [idev] ++
3,849,088 UART: [idev] CDI.KEYID = 6
3,850,023 UART: [idev] SUBJECT.KEYID = 7
3,851,206 UART: [idev] UDS.KEYID = 0
3,852,136 ready_for_fw is high
3,852,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,995,553 UART: [idev] Erasing UDS.KEYID = 0
6,327,785 UART: [idev] Sha1 KeyId Algorithm
6,350,983 UART: [idev] --
6,355,038 UART: [ldev] ++
6,355,719 UART: [ldev] CDI.KEYID = 6
6,356,628 UART: [ldev] SUBJECT.KEYID = 5
6,357,793 UART: [ldev] AUTHORITY.KEYID = 7
6,359,025 UART: [ldev] FE.KEYID = 1
6,371,121 UART: [ldev] Erasing FE.KEYID = 1
8,852,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,495 UART: [ldev] --
10,644,498 UART: [fwproc] Wait for Commands...
10,645,946 UART: [fwproc] Recv command 0x46574c44
10,648,203 UART: [fwproc] Recv'd Img size: 114168 bytes
15,286,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,371,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,487,174 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,028,914 >>> mbox cmd response: success
16,033,767 UART: [afmc] ++
16,034,481 UART: [afmc] CDI.KEYID = 6
16,035,674 UART: [afmc] SUBJECT.KEYID = 7
16,037,116 UART: [afmc] AUTHORITY.KEYID = 5
18,541,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,263,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,265,052 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,280,124 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,295,344 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,310,173 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,333,527 UART: [afmc] --
20,336,493 UART: [cold-reset] --
20,341,221 UART: [state] Locking Datavault
20,346,581 UART: [state] Locking PCR0, PCR1 and PCR31
20,348,721 UART: [state] Locking ICCM
20,350,575 UART: [exit] Launching FMC @ 0x40000130
20,359,244 UART:
20,359,486 UART: Running Caliptra FMC ...
20,360,515 UART:
20,360,666 UART: [state] CFI Enabled
20,368,824 UART: [fht] FMC Alias Private Key: 7
22,125,471 UART: [art] Extend RT PCRs Done
22,126,695 UART: [art] Lock RT PCRs Done
22,128,305 UART: [art] Populate DV Done
22,133,716 UART: [fht] FMC Alias Private Key: 7
22,135,307 UART: [art] Derive CDI
22,136,041 UART: [art] Store in in slot 0x4
22,178,090 UART: [art] Derive Key Pair
22,179,130 UART: [art] Store priv key in slot 0x5
24,606,742 UART: [art] Derive Key Pair - Done
24,619,374 UART: [art] Signing Cert with AUTHO
24,620,682 UART: RITY.KEYID = 7
26,326,343 UART: [art] Erasing AUTHORITY.KEYID = 7
26,327,830 UART: [art] PUB.X = 337034FF5C8DC5C8EE294385FE4D34431FF15ED87FC6D0523AA2A27CB787EBA5581CB85AADC5E60CD20779CCBE02F6E5
26,335,079 UART: [art] PUB.Y = 1CBFF8BBF8D20DDCBB7B7990BDBF3771D1A0EA55CEAD5862488C22166491EBDD3C4CECF671DA3BC263B449D51D63C500
26,342,372 UART: [art] SIG.R = 8BAB01A0A20C1216C0C2DFE0DD9F49B98AC919D433EAF32352E982C9092831252773BA8ED4D835BA07F975F92B4ABC95
26,349,763 UART: [art] SIG.S = 9DD553D656C7D2EF08A6133B1E00877D5F9DB2E4C44A88D487E637E55DC210C82F424A4EFEFFCA4BA5E774812FA33EE7
27,328,784 UART: Caliptra RT
27,329,512 UART: [state] CFI Enabled
27,446,474 UART: [rt] RT listening for mailbox commands...
27,448,762 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,603,961 UART: [rt]cmd =0x41544d4e, len=14344
30,958,822 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,670 writing to cptra_bootfsm_go
3,752,801 ready_for_fw is high
3,753,469 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,058,159 >>> mbox cmd response: success
20,311,579 UART:
20,311,984 UART: Running Caliptra FMC ...
20,313,183 UART:
20,313,362 UART: [state] CFI Enabled
20,320,873 UART: [fht] FMC Alias Private Key: 7
22,078,111 UART: [art] Extend RT PCRs Done
22,079,333 UART: [art] Lock RT PCRs Done
22,080,969 UART: [art] Populate DV Done
22,086,559 UART: [fht] FMC Alias Private Key: 7
22,088,174 UART: [art] Derive CDI
22,088,955 UART: [art] Store in in slot 0x4
22,131,371 UART: [art] Derive Key Pair
22,132,384 UART: [art] Store priv key in slot 0x5
24,559,106 UART: [art] Derive Key Pair - Done
24,572,310 UART: [art] Signing Cert with AUTHO
24,573,637 UART: RITY.KEYID = 7
26,278,816 UART: [art] Erasing AUTHORITY.KEYID = 7
26,280,318 UART: [art] PUB.X = A804FDF0E4B22BC2298EAEC8FDBB5A3EFB82A4E4D820145241BE1E7580019706D5F6B553FC4A82647BE53712AB315586
26,287,559 UART: [art] PUB.Y = 0087BCBC68E295054373EFA9914B524B3C7BF6AB258988E04F71045E9D3B06E02B64928DAE12B85630F5803F830B06A9
26,294,823 UART: [art] SIG.R = A1555B923139DB1ED0AD879A137CC7AE93D22C0F29FE25DBC3427537B89D2C3E716D3844D9DAD778179ED5725F90DC5A
26,302,212 UART: [art] SIG.S = 53A0FE73BD5D962A6BE3ABA0BF234252246DA91594D28B4AF805604712D6758A20D70285292B4A901717012412ED1F91
27,281,130 UART: Caliptra RT
27,281,818 UART: [state] CFI Enabled
27,399,641 UART: [rt] RT listening for mailbox commands...
27,401,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,557,152 UART: [rt]cmd =0x41544d4e, len=14344
30,920,268 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,649 UART: [kat] SHA2-256
892,587 UART: [kat] SHA2-384
895,288 UART: [kat] SHA2-512-ACC
897,189 UART: [kat] ECC-384
903,050 UART: [kat] HMAC-384Kdf
907,864 UART: [kat] LMS
1,476,060 UART: [kat] --
1,476,881 UART: [cold-reset] ++
1,477,207 UART: [fht] Storing FHT @ 0x50003400
1,480,022 UART: [idev] ++
1,480,190 UART: [idev] CDI.KEYID = 6
1,480,550 UART: [idev] SUBJECT.KEYID = 7
1,480,974 UART: [idev] UDS.KEYID = 0
1,481,319 ready_for_fw is high
1,481,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,212 UART: [idev] Erasing UDS.KEYID = 0
1,505,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,354 UART: [idev] --
1,515,477 UART: [ldev] ++
1,515,645 UART: [ldev] CDI.KEYID = 6
1,516,008 UART: [ldev] SUBJECT.KEYID = 5
1,516,434 UART: [ldev] AUTHORITY.KEYID = 7
1,516,897 UART: [ldev] FE.KEYID = 1
1,521,763 UART: [ldev] Erasing FE.KEYID = 1
1,547,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,596 UART: [ldev] --
1,586,087 UART: [fwproc] Waiting for Commands...
1,586,720 UART: [fwproc] Received command 0x46574c44
1,587,511 UART: [fwproc] Received Image of size 114168 bytes
5,157,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,185,915 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,215,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,350,948 >>> mbox cmd response: success
5,351,968 UART: [afmc] ++
5,352,136 UART: [afmc] CDI.KEYID = 6
5,352,498 UART: [afmc] SUBJECT.KEYID = 7
5,352,923 UART: [afmc] AUTHORITY.KEYID = 5
5,388,203 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,404,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,405,561 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,411,270 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,417,162 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,422,863 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,430,701 UART: [afmc] --
5,431,731 UART: [cold-reset] --
5,432,387 UART: [state] Locking Datavault
5,433,384 UART: [state] Locking PCR0, PCR1 and PCR31
5,433,988 UART: [state] Locking ICCM
5,434,504 UART: [exit] Launching FMC @ 0x40000130
5,439,833 UART:
5,439,849 UART: Running Caliptra FMC ...
5,440,257 UART:
5,440,311 UART: [state] CFI Enabled
5,450,459 UART: [fht] FMC Alias Private Key: 7
5,558,257 UART: [art] Extend RT PCRs Done
5,558,685 UART: [art] Lock RT PCRs Done
5,560,345 UART: [art] Populate DV Done
5,568,601 UART: [fht] FMC Alias Private Key: 7
5,569,649 UART: [art] Derive CDI
5,569,929 UART: [art] Store in in slot 0x4
5,655,580 UART: [art] Derive Key Pair
5,655,940 UART: [art] Store priv key in slot 0x5
5,669,458 UART: [art] Derive Key Pair - Done
5,683,899 UART: [art] Signing Cert with AUTHO
5,684,379 UART: RITY.KEYID = 7
5,699,559 UART: [art] Erasing AUTHORITY.KEYID = 7
5,700,324 UART: [art] PUB.X = FB3467F7A053D16367C770E0053C20503F64CC6BEE74E568F23189A71D48C628D342F5F9A8EC88B27F3FA813DDC584B5
5,707,095 UART: [art] PUB.Y = 165E0C76FC8CD54291BC4BA2EA05F3176D881AC0F9F60182E56A48360C28566D84A816C3ED918010845FBA270DFA0B0C
5,714,030 UART: [art] SIG.R = 67E369CA9E4341CAFED34B258107B8BF03516A560C01AAD23459F0842A8872555BE77E00D5879A34D84FA626C02C93E3
5,720,766 UART: [art] SIG.S = 1EAD5AA45F1F5E0CCCED810DA11E006DB247B85228306DAFEE6208952DB815102C96DF6745133A4C36E811DDC6ECD48F
5,744,634 UART: Caliptra RT
5,744,887 UART: [state] CFI Enabled
5,853,201 UART: [rt] RT listening for mailbox commands...
5,853,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,977,133 UART: [rt]cmd =0x41544d4e, len=14344
6,629,226 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 ready_for_fw is high
1,362,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,122,554 >>> mbox cmd response: success
5,184,455 UART:
5,184,471 UART: Running Caliptra FMC ...
5,184,879 UART:
5,184,933 UART: [state] CFI Enabled
5,195,945 UART: [fht] FMC Alias Private Key: 7
5,304,011 UART: [art] Extend RT PCRs Done
5,304,439 UART: [art] Lock RT PCRs Done
5,305,827 UART: [art] Populate DV Done
5,314,023 UART: [fht] FMC Alias Private Key: 7
5,315,139 UART: [art] Derive CDI
5,315,419 UART: [art] Store in in slot 0x4
5,401,054 UART: [art] Derive Key Pair
5,401,414 UART: [art] Store priv key in slot 0x5
5,414,170 UART: [art] Derive Key Pair - Done
5,429,165 UART: [art] Signing Cert with AUTHO
5,429,645 UART: RITY.KEYID = 7
5,444,921 UART: [art] Erasing AUTHORITY.KEYID = 7
5,445,686 UART: [art] PUB.X = 2634A491976E7E3C856BD304865F99CAED116B1E520F91CB4670D017E9114B4E98CA8F094CCDD21105B5A3C33F899C10
5,452,446 UART: [art] PUB.Y = 0F94F05A0262F9BBD26179E46E309563023AA614EBABF72112358E8D7C22EFA48319478FBE4681DB7D61DF384AD66051
5,459,389 UART: [art] SIG.R = 18FB8F583416D0831FAB13AA6140294F1239595E60E06EFB5931FA74B0E9E40778A52040734B89A52314886DA86AD3BD
5,466,152 UART: [art] SIG.S = C3F260AD57B0A4E1EEC2EB2065EE066433FAD32F272BECBA5D168A90DD563E186E82CB712B440EA8D0B7F1514F58D906
5,490,100 UART: Caliptra RT
5,490,353 UART: [state] CFI Enabled
5,597,914 UART: [rt] RT listening for mailbox commands...
5,598,584 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,721,570 UART: [rt]cmd =0x41544d4e, len=14344
6,370,762 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
86,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,550 UART: [kat] SHA2-256
882,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,596 UART: [kat] ++
886,748 UART: [kat] sha1
891,082 UART: [kat] SHA2-256
893,020 UART: [kat] SHA2-384
895,797 UART: [kat] SHA2-512-ACC
897,698 UART: [kat] ECC-384
903,375 UART: [kat] HMAC-384Kdf
907,945 UART: [kat] LMS
1,476,141 UART: [kat] --
1,477,050 UART: [cold-reset] ++
1,477,556 UART: [fht] Storing FHT @ 0x50003400
1,480,477 UART: [idev] ++
1,480,645 UART: [idev] CDI.KEYID = 6
1,481,005 UART: [idev] SUBJECT.KEYID = 7
1,481,429 UART: [idev] UDS.KEYID = 0
1,481,774 ready_for_fw is high
1,481,774 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,529 UART: [idev] Erasing UDS.KEYID = 0
1,506,797 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,313 UART: [idev] --
1,516,340 UART: [ldev] ++
1,516,508 UART: [ldev] CDI.KEYID = 6
1,516,871 UART: [ldev] SUBJECT.KEYID = 5
1,517,297 UART: [ldev] AUTHORITY.KEYID = 7
1,517,760 UART: [ldev] FE.KEYID = 1
1,523,118 UART: [ldev] Erasing FE.KEYID = 1
1,548,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,371 UART: [ldev] --
1,587,810 UART: [fwproc] Waiting for Commands...
1,588,425 UART: [fwproc] Received command 0x46574c44
1,589,216 UART: [fwproc] Received Image of size 114168 bytes
5,045,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,073,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,102,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,238,310 >>> mbox cmd response: success
5,239,560 UART: [afmc] ++
5,239,728 UART: [afmc] CDI.KEYID = 6
5,240,090 UART: [afmc] SUBJECT.KEYID = 7
5,240,515 UART: [afmc] AUTHORITY.KEYID = 5
5,275,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,291,357 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,292,137 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,297,846 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,303,738 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,309,439 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,317,275 UART: [afmc] --
5,318,275 UART: [cold-reset] --
5,318,987 UART: [state] Locking Datavault
5,320,466 UART: [state] Locking PCR0, PCR1 and PCR31
5,321,070 UART: [state] Locking ICCM
5,321,584 UART: [exit] Launching FMC @ 0x40000130
5,326,913 UART:
5,326,929 UART: Running Caliptra FMC ...
5,327,337 UART:
5,327,480 UART: [state] CFI Enabled
5,338,506 UART: [fht] FMC Alias Private Key: 7
5,446,850 UART: [art] Extend RT PCRs Done
5,447,278 UART: [art] Lock RT PCRs Done
5,448,630 UART: [art] Populate DV Done
5,456,914 UART: [fht] FMC Alias Private Key: 7
5,458,074 UART: [art] Derive CDI
5,458,354 UART: [art] Store in in slot 0x4
5,544,159 UART: [art] Derive Key Pair
5,544,519 UART: [art] Store priv key in slot 0x5
5,557,835 UART: [art] Derive Key Pair - Done
5,572,869 UART: [art] Signing Cert with AUTHO
5,573,349 UART: RITY.KEYID = 7
5,588,909 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,674 UART: [art] PUB.X = 5FDAD4A8D94EF97AB80B5585881D5CA919115E11E906BCE3F8C8A33E95DCE71E08C6A7762AB8A1A4FC34DFE1003C2579
5,596,429 UART: [art] PUB.Y = 0A723F6EC086C1D3F347AF955EB84F09C0A3C3D1AECD505DF60DABFE63994EA441821F38FAF08501AC65985EB6C762E4
5,603,383 UART: [art] SIG.R = C9C5B260C1EAAD6F5738D12D7F148B0C7D5531CC7880DDB2DE07B0A42D04DD389BA2A32E8B83EC10AD3BD9FA462781DC
5,610,166 UART: [art] SIG.S = 147DCB33D4713BFF71E66D8035C014305C05D5FCEABD17A1F6B1C39537715868BAFDD3A317B4D7C1017482538D9DF3CB
5,634,435 UART: Caliptra RT
5,634,780 UART: [state] CFI Enabled
5,743,091 UART: [rt] RT listening for mailbox commands...
5,743,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,866,755 UART: [rt]cmd =0x41544d4e, len=14344
6,506,461 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,878 ready_for_fw is high
1,362,878 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,199,895 >>> mbox cmd response: success
5,261,302 UART:
5,261,318 UART: Running Caliptra FMC ...
5,261,726 UART:
5,261,869 UART: [state] CFI Enabled
5,272,299 UART: [fht] FMC Alias Private Key: 7
5,379,529 UART: [art] Extend RT PCRs Done
5,379,957 UART: [art] Lock RT PCRs Done
5,381,269 UART: [art] Populate DV Done
5,389,535 UART: [fht] FMC Alias Private Key: 7
5,390,521 UART: [art] Derive CDI
5,390,801 UART: [art] Store in in slot 0x4
5,476,428 UART: [art] Derive Key Pair
5,476,788 UART: [art] Store priv key in slot 0x5
5,490,108 UART: [art] Derive Key Pair - Done
5,504,757 UART: [art] Signing Cert with AUTHO
5,505,237 UART: RITY.KEYID = 7
5,519,987 UART: [art] Erasing AUTHORITY.KEYID = 7
5,520,752 UART: [art] PUB.X = 343BBA729196316934BB973FB64BBA909955B6402C30C679BED4813EB9B5DFD8020AE135C5DBF96A62CF95D144C3D63F
5,527,524 UART: [art] PUB.Y = BE352DEE33A1BB91AAF985B9B850DD2BE4A9E91BF5E1A837DE996EC86C5E0DC38C3A4A941A7EDA4E09425DB358E5FEDE
5,534,498 UART: [art] SIG.R = A7318B99B0D928D5C363A3049F753C36F96C0CDC3850325EC3E5D544E39F35BF7AF74BD5C0D25F90D8BD22F8C6696C38
5,541,270 UART: [art] SIG.S = D6C206C68B90EA43A15CB62D03774ABD8A7CB8649475EEF31E6E6B7FFDCCB9F7FD0F758092B9E0DED02989FEF390EA2A
5,564,950 UART: Caliptra RT
5,565,295 UART: [state] CFI Enabled
5,674,105 UART: [rt] RT listening for mailbox commands...
5,674,775 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,797,783 UART: [rt]cmd =0x41544d4e, len=14344
6,437,309 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
893,192 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,317 UART: [kat] ++
897,469 UART: [kat] sha1
901,641 UART: [kat] SHA2-256
903,581 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
917,718 UART: [kat] HMAC-384Kdf
922,240 UART: [kat] LMS
1,170,568 UART: [kat] --
1,171,543 UART: [cold-reset] ++
1,171,907 UART: [fht] FHT @ 0x50003400
1,174,590 UART: [idev] ++
1,174,758 UART: [idev] CDI.KEYID = 6
1,175,118 UART: [idev] SUBJECT.KEYID = 7
1,175,542 UART: [idev] UDS.KEYID = 0
1,175,887 ready_for_fw is high
1,175,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,430 UART: [idev] Erasing UDS.KEYID = 0
1,200,651 UART: [idev] Sha1 KeyId Algorithm
1,209,239 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,831 UART: [ldev] --
1,282,290 UART: [fwproc] Wait for Commands...
1,283,032 UART: [fwproc] Recv command 0x46574c44
1,283,760 UART: [fwproc] Recv'd Img size: 114168 bytes
3,121,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,149,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,178,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,314,262 >>> mbox cmd response: success
3,315,364 UART: [afmc] ++
3,315,532 UART: [afmc] CDI.KEYID = 6
3,315,894 UART: [afmc] SUBJECT.KEYID = 7
3,316,319 UART: [afmc] AUTHORITY.KEYID = 5
3,351,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,368,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,104 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,374,813 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,380,705 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,386,416 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,394,411 UART: [afmc] --
3,395,415 UART: [cold-reset] --
3,396,257 UART: [state] Locking Datavault
3,397,370 UART: [state] Locking PCR0, PCR1 and PCR31
3,397,974 UART: [state] Locking ICCM
3,398,526 UART: [exit] Launching FMC @ 0x40000130
3,403,855 UART:
3,403,871 UART: Running Caliptra FMC ...
3,404,279 UART:
3,404,333 UART: [state] CFI Enabled
3,415,027 UART: [fht] FMC Alias Private Key: 7
3,522,473 UART: [art] Extend RT PCRs Done
3,522,901 UART: [art] Lock RT PCRs Done
3,524,095 UART: [art] Populate DV Done
3,532,567 UART: [fht] FMC Alias Private Key: 7
3,533,649 UART: [art] Derive CDI
3,533,929 UART: [art] Store in in slot 0x4
3,619,518 UART: [art] Derive Key Pair
3,619,878 UART: [art] Store priv key in slot 0x5
3,632,774 UART: [art] Derive Key Pair - Done
3,647,687 UART: [art] Signing Cert with AUTHO
3,648,167 UART: RITY.KEYID = 7
3,663,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,932 UART: [art] PUB.X = 6E9CF125E98315F8008F8F1F6740DA5B1D4A184CBED33004FB81752CF44B443A25BA1D842CE3D8D14ED05516DDA5D88D
3,670,689 UART: [art] PUB.Y = 24AC93943DF0FA761A725A2AEEF534EB6833BD08DD5BFC8923870FF91670221E6B8F439E3DCCCC8D57C01D9928C01A76
3,677,645 UART: [art] SIG.R = 11E1BAA0177096A236B9329C11C86DB64C9E0AF7888F0F0B3A6159B67191672D5CDAF2FBC7860192632B9184F0D58562
3,684,401 UART: [art] SIG.S = 7BF3E81FB26EB023BED0B638BB8AB03EA5188C2DDFCD7110B352AD9F678F4B8F7FE6F340E58FCC00C62F56B16EA86577
3,708,112 UART: Caliptra RT
3,708,365 UART: [state] CFI Enabled
3,816,140 UART: [rt] RT listening for mailbox commands...
3,816,810 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,939,754 UART: [rt]cmd =0x41544d4e, len=14344
4,591,781 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,839 ready_for_fw is high
1,060,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,175,410 >>> mbox cmd response: success
3,237,505 UART:
3,237,521 UART: Running Caliptra FMC ...
3,237,929 UART:
3,237,983 UART: [state] CFI Enabled
3,248,303 UART: [fht] FMC Alias Private Key: 7
3,356,729 UART: [art] Extend RT PCRs Done
3,357,157 UART: [art] Lock RT PCRs Done
3,358,351 UART: [art] Populate DV Done
3,366,561 UART: [fht] FMC Alias Private Key: 7
3,367,635 UART: [art] Derive CDI
3,367,915 UART: [art] Store in in slot 0x4
3,453,872 UART: [art] Derive Key Pair
3,454,232 UART: [art] Store priv key in slot 0x5
3,467,026 UART: [art] Derive Key Pair - Done
3,481,831 UART: [art] Signing Cert with AUTHO
3,482,311 UART: RITY.KEYID = 7
3,496,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,738 UART: [art] PUB.X = 31501F072471343A77AB42BA51CFF2FF90784531280B821ADC529D3DE0EB78751E906E2636CAF16E17C706D38E73F4D1
3,504,499 UART: [art] PUB.Y = C353939295F1BFE967C915B30767CB930963D44BE3C5220DC3E9204BE93A7CAB04D596C77CCF2BA2810D235421756A74
3,511,434 UART: [art] SIG.R = 688E643EB0C1B6F7394632509A927630084EACA6D788C16EDC0B36A15D75D2F36CB5660B3B395EBA7B646604180B9ACD
3,518,193 UART: [art] SIG.S = A2E21909A14211CB28224F8C94BD8029ACFD6D4858BD22466906F411CDD19A909317B35F56C75E8F220666BC97693221
3,541,781 UART: Caliptra RT
3,542,034 UART: [state] CFI Enabled
3,650,038 UART: [rt] RT listening for mailbox commands...
3,650,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,773,570 UART: [rt]cmd =0x41544d4e, len=14344
4,419,871 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,486 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
893,419 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,544 UART: [kat] ++
897,696 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
918,143 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,171,988 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,299 UART: [idev] ++
1,175,467 UART: [idev] CDI.KEYID = 6
1,175,827 UART: [idev] SUBJECT.KEYID = 7
1,176,251 UART: [idev] UDS.KEYID = 0
1,176,596 ready_for_fw is high
1,176,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,507 UART: [idev] Erasing UDS.KEYID = 0
1,201,844 UART: [idev] Sha1 KeyId Algorithm
1,210,082 UART: [idev] --
1,211,024 UART: [ldev] ++
1,211,192 UART: [ldev] CDI.KEYID = 6
1,211,555 UART: [ldev] SUBJECT.KEYID = 5
1,211,981 UART: [ldev] AUTHORITY.KEYID = 7
1,212,444 UART: [ldev] FE.KEYID = 1
1,217,682 UART: [ldev] Erasing FE.KEYID = 1
1,244,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,656 UART: [ldev] --
1,284,109 UART: [fwproc] Wait for Commands...
1,284,747 UART: [fwproc] Recv command 0x46574c44
1,285,475 UART: [fwproc] Recv'd Img size: 114168 bytes
3,123,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,422 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,180,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,316,173 >>> mbox cmd response: success
3,317,311 UART: [afmc] ++
3,317,479 UART: [afmc] CDI.KEYID = 6
3,317,841 UART: [afmc] SUBJECT.KEYID = 7
3,318,266 UART: [afmc] AUTHORITY.KEYID = 5
3,353,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,713 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,376,422 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,382,314 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,388,025 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,395,860 UART: [afmc] --
3,396,830 UART: [cold-reset] --
3,397,856 UART: [state] Locking Datavault
3,399,243 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,847 UART: [state] Locking ICCM
3,400,345 UART: [exit] Launching FMC @ 0x40000130
3,405,674 UART:
3,405,690 UART: Running Caliptra FMC ...
3,406,098 UART:
3,406,241 UART: [state] CFI Enabled
3,416,659 UART: [fht] FMC Alias Private Key: 7
3,523,905 UART: [art] Extend RT PCRs Done
3,524,333 UART: [art] Lock RT PCRs Done
3,525,957 UART: [art] Populate DV Done
3,533,979 UART: [fht] FMC Alias Private Key: 7
3,535,033 UART: [art] Derive CDI
3,535,313 UART: [art] Store in in slot 0x4
3,620,876 UART: [art] Derive Key Pair
3,621,236 UART: [art] Store priv key in slot 0x5
3,634,314 UART: [art] Derive Key Pair - Done
3,649,296 UART: [art] Signing Cert with AUTHO
3,649,776 UART: RITY.KEYID = 7
3,665,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,665,955 UART: [art] PUB.X = CF1042D3426F7363120EB8E004E470C5016D954EC20DDE9977B0A60ACC2AD2CF8D6E61FAD9B5E59339365CBA855E10C1
3,672,720 UART: [art] PUB.Y = 86BAD2F8DCDE4DEEDAACE2808D92026073548A894522D9B441BBAFF140B6097CCC3406C5A46357C85E2467A87578D848
3,679,669 UART: [art] SIG.R = 4FA79E5E9C890FD777AC75F2066DA6D228F82CB3D197518659C4A4A908197A7F96C49BA1ACD172615D5F35371D5512A2
3,686,432 UART: [art] SIG.S = 6B2E3B9E5B84D4E853792D44E7D9A800B605F62DB6A1128EAE90F18052D71D483C6735E763B4C9BD4C06295D73F30D4A
3,710,442 UART: Caliptra RT
3,710,787 UART: [state] CFI Enabled
3,819,026 UART: [rt] RT listening for mailbox commands...
3,819,696 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,972 UART: [rt]cmd =0x41544d4e, len=14344
4,589,729 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,382 ready_for_fw is high
1,060,382 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,177,542 >>> mbox cmd response: success
3,239,489 UART:
3,239,505 UART: Running Caliptra FMC ...
3,239,913 UART:
3,240,056 UART: [state] CFI Enabled
3,250,950 UART: [fht] FMC Alias Private Key: 7
3,359,008 UART: [art] Extend RT PCRs Done
3,359,436 UART: [art] Lock RT PCRs Done
3,360,642 UART: [art] Populate DV Done
3,368,696 UART: [fht] FMC Alias Private Key: 7
3,369,762 UART: [art] Derive CDI
3,370,042 UART: [art] Store in in slot 0x4
3,455,511 UART: [art] Derive Key Pair
3,455,871 UART: [art] Store priv key in slot 0x5
3,468,835 UART: [art] Derive Key Pair - Done
3,483,628 UART: [art] Signing Cert with AUTHO
3,484,108 UART: RITY.KEYID = 7
3,499,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,271 UART: [art] PUB.X = 2B5D794F1C2FD1522823870B80A9C25C852E12F8BA9B5C76B3DC58AC9DBC31AEC91051ED8193EB4BB6DA9C7E79AFCFBE
3,507,062 UART: [art] PUB.Y = 99743653182909C4D8BBF887ADA6608D551337539DA46543107940779E5F78233EC7B1988ADCB1F3DFEEEA1AAE4B490D
3,514,008 UART: [art] SIG.R = A3DA2C80B70486AFF9F7551AE5855B54CFD03680FA328ABEE713C5BB56B89927426DDB29D6D485820E6419EB84FA76B8
3,520,782 UART: [art] SIG.S = 0561FF39FE34D573CA603694AADCF50563FF59B0BD6F2905188ECDABFE4C9EF7A3D42D8C75F8CECF7A38D6FACCF867F4
3,544,908 UART: Caliptra RT
3,545,253 UART: [state] CFI Enabled
3,652,609 UART: [rt] RT listening for mailbox commands...
3,653,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,776,369 UART: [rt]cmd =0x41544d4e, len=14344
4,428,234 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,676 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,174,271 ready_for_fw is high
1,174,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,793 UART: [idev] Sha1 KeyId Algorithm
1,207,855 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,868 UART: [ldev] --
1,281,324 UART: [fwproc] Wait for Commands...
1,282,007 UART: [fwproc] Recv command 0x46574c44
1,282,740 UART: [fwproc] Recv'd Img size: 114168 bytes
3,118,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,146,252 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,175,561 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,311,065 >>> mbox cmd response: success
3,312,310 UART: [afmc] ++
3,312,478 UART: [afmc] CDI.KEYID = 6
3,312,841 UART: [afmc] SUBJECT.KEYID = 7
3,313,267 UART: [afmc] AUTHORITY.KEYID = 5
3,348,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,365,461 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,366,212 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,371,922 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,377,812 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,383,523 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,391,519 UART: [afmc] --
3,392,399 UART: [cold-reset] --
3,393,311 UART: [state] Locking Datavault
3,394,544 UART: [state] Locking PCR0, PCR1 and PCR31
3,395,148 UART: [state] Locking ICCM
3,395,620 UART: [exit] Launching FMC @ 0x40000130
3,400,949 UART:
3,400,965 UART: Running Caliptra FMC ...
3,401,373 UART:
3,401,427 UART: [state] CFI Enabled
3,411,931 UART: [fht] FMC Alias Private Key: 7
3,519,551 UART: [art] Extend RT PCRs Done
3,519,979 UART: [art] Lock RT PCRs Done
3,521,551 UART: [art] Populate DV Done
3,529,729 UART: [fht] FMC Alias Private Key: 7
3,530,741 UART: [art] Derive CDI
3,531,021 UART: [art] Store in in slot 0x4
3,616,560 UART: [art] Derive Key Pair
3,616,920 UART: [art] Store priv key in slot 0x5
3,629,524 UART: [art] Derive Key Pair - Done
3,644,425 UART: [art] Signing Cert with AUTHO
3,644,905 UART: RITY.KEYID = 7
3,660,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,220 UART: [art] PUB.X = 734EA1D482DB29074C0FB9A8C0DD11706E11EB5392CC7D649A27563DA2766732C1E2329FB0A19AB36684FFA29B599727
3,667,986 UART: [art] PUB.Y = 5B91E278D0DCF147D7144083BBFFDE02BDEA4495916260B0BFA94AC4E89294C64D3C3D3DFBC90A6B45DA16E03058E3E5
3,674,946 UART: [art] SIG.R = 196163892CE357462154BFCEA466C2A5137838730CC4B7DDD26F56813DC85BF9F27AB07076B7A2965C28A9E1AD6CD01E
3,681,717 UART: [art] SIG.S = F7B0AB20E89CED5D86AF47B575214F4A8DCAACBE76688C5E23FC30FECDCBD386E001090842BB5C6D9F212E29B1F1928F
3,705,521 UART: Caliptra RT
3,705,774 UART: [state] CFI Enabled
3,814,084 UART: [rt] RT listening for mailbox commands...
3,814,754 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,937,890 UART: [rt]cmd =0x41544d4e, len=14344
4,591,734 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,224 ready_for_fw is high
1,056,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,165,172 >>> mbox cmd response: success
3,227,309 UART:
3,227,325 UART: Running Caliptra FMC ...
3,227,733 UART:
3,227,787 UART: [state] CFI Enabled
3,237,889 UART: [fht] FMC Alias Private Key: 7
3,345,125 UART: [art] Extend RT PCRs Done
3,345,553 UART: [art] Lock RT PCRs Done
3,347,103 UART: [art] Populate DV Done
3,355,163 UART: [fht] FMC Alias Private Key: 7
3,356,325 UART: [art] Derive CDI
3,356,605 UART: [art] Store in in slot 0x4
3,442,030 UART: [art] Derive Key Pair
3,442,390 UART: [art] Store priv key in slot 0x5
3,455,280 UART: [art] Derive Key Pair - Done
3,470,135 UART: [art] Signing Cert with AUTHO
3,470,615 UART: RITY.KEYID = 7
3,485,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,486,490 UART: [art] PUB.X = 32127F089D455602335CDB035B8C5AED4394A68C0A20B7D927A3567F414149A446C595E41525CB155639B60BC6816FAD
3,493,239 UART: [art] PUB.Y = EFEBF4D0AB8BAECB7F2F50CDF62D1016DF49D87F343884F8B372EFA64386E545B525CBD993E063A1D70BC933882268CE
3,500,204 UART: [art] SIG.R = 166D5CF31F35B557CD310600B09AAE578642852641FD6072C441B9A380BE36949086DFECC175CE292C5004DFEB008C7C
3,506,926 UART: [art] SIG.S = 0B552FBC3B5F1637FA8D149E18A391FD029DA84159B78E6EBF5FB93F05C9BFE10022E0950F4523F0E621FB0F6DE2B6AC
3,530,498 UART: Caliptra RT
3,530,751 UART: [state] CFI Enabled
3,639,472 UART: [rt] RT listening for mailbox commands...
3,640,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,244 UART: [rt]cmd =0x41544d4e, len=14344
4,403,040 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,497 UART: [kat] HMAC-384Kdf
921,091 UART: [kat] LMS
1,169,403 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,476 UART: [fht] FHT @ 0x50003400
1,173,128 UART: [idev] ++
1,173,296 UART: [idev] CDI.KEYID = 6
1,173,657 UART: [idev] SUBJECT.KEYID = 7
1,174,082 UART: [idev] UDS.KEYID = 0
1,174,428 ready_for_fw is high
1,174,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,556 UART: [idev] Sha1 KeyId Algorithm
1,208,390 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 114168 bytes
3,115,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,143,189 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,172,498 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,308,186 >>> mbox cmd response: success
3,309,369 UART: [afmc] ++
3,309,537 UART: [afmc] CDI.KEYID = 6
3,309,900 UART: [afmc] SUBJECT.KEYID = 7
3,310,326 UART: [afmc] AUTHORITY.KEYID = 5
3,345,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,361,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,362,703 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,368,413 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,374,303 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,380,014 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,387,722 UART: [afmc] --
3,388,770 UART: [cold-reset] --
3,389,650 UART: [state] Locking Datavault
3,390,961 UART: [state] Locking PCR0, PCR1 and PCR31
3,391,565 UART: [state] Locking ICCM
3,392,077 UART: [exit] Launching FMC @ 0x40000130
3,397,406 UART:
3,397,422 UART: Running Caliptra FMC ...
3,397,830 UART:
3,397,973 UART: [state] CFI Enabled
3,408,875 UART: [fht] FMC Alias Private Key: 7
3,516,791 UART: [art] Extend RT PCRs Done
3,517,219 UART: [art] Lock RT PCRs Done
3,518,747 UART: [art] Populate DV Done
3,526,989 UART: [fht] FMC Alias Private Key: 7
3,528,059 UART: [art] Derive CDI
3,528,339 UART: [art] Store in in slot 0x4
3,614,180 UART: [art] Derive Key Pair
3,614,540 UART: [art] Store priv key in slot 0x5
3,628,450 UART: [art] Derive Key Pair - Done
3,643,306 UART: [art] Signing Cert with AUTHO
3,643,786 UART: RITY.KEYID = 7
3,659,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,659,965 UART: [art] PUB.X = FA90E05F3E123A4DA1F574EE3C09AD34089B3C67362F8438E8BF9393AF4E24A83D22D4D51BFAB6FF167D47051C763364
3,666,734 UART: [art] PUB.Y = 6EB8489D54F28207BC9D8379A12253A277FD49A5B62231DF0443CAE036D04D62C986C6CC84F4FFC204A6E88FE09DD9B8
3,673,683 UART: [art] SIG.R = FA2BF76C56B6856E43FD946A09ACD50E0B7E21944824155FB8BBE7AF76F3E11C5F7CFDF1D7CF1A5EC5ED55DFA0155A21
3,680,468 UART: [art] SIG.S = 390CE40AB998B37818B16D4D689CB391C503D672C0159CF8037C1BD353C8DACD710315C6C6E2E26EE56BDC4A97E394A0
3,704,110 UART: Caliptra RT
3,704,455 UART: [state] CFI Enabled
3,812,159 UART: [rt] RT listening for mailbox commands...
3,812,829 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,936,093 UART: [rt]cmd =0x41544d4e, len=14344
4,583,070 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,141 ready_for_fw is high
1,057,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,170,982 >>> mbox cmd response: success
3,233,591 UART:
3,233,607 UART: Running Caliptra FMC ...
3,234,015 UART:
3,234,158 UART: [state] CFI Enabled
3,244,926 UART: [fht] FMC Alias Private Key: 7
3,353,434 UART: [art] Extend RT PCRs Done
3,353,862 UART: [art] Lock RT PCRs Done
3,355,058 UART: [art] Populate DV Done
3,363,378 UART: [fht] FMC Alias Private Key: 7
3,364,520 UART: [art] Derive CDI
3,364,800 UART: [art] Store in in slot 0x4
3,450,505 UART: [art] Derive Key Pair
3,450,865 UART: [art] Store priv key in slot 0x5
3,463,619 UART: [art] Derive Key Pair - Done
3,478,484 UART: [art] Signing Cert with AUTHO
3,478,964 UART: RITY.KEYID = 7
3,494,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,085 UART: [art] PUB.X = 4F43B13142D20B70CD9B7DBE581D659496B841C26F81BBA525BEE6B7AB6E481BAC13C98FE20B3A7BE07ACD66DD98C77B
3,501,869 UART: [art] PUB.Y = ED2AF75DCEE045ECEC566C656D27F1DE28FD7B47A591047853A1C405E38576A0F9865734BB356977EB6349B02D972742
3,508,815 UART: [art] SIG.R = 9CC36B64B896FCAE72E2E7E184DD5005074835DF4CDDBCD6D2038B2A419AD1644ED5DF0DE56ABBAA52BBCE10F0CEBCE1
3,515,605 UART: [art] SIG.S = 0B5A0C6FB31D48EFDA1E3C15EE1021300D6286BD9A72A2605AA6E5844DEFC2F37B6CDD465CE8B9EC54205BA7286493E6
3,539,183 UART: Caliptra RT
3,539,528 UART: [state] CFI Enabled
3,647,442 UART: [rt] RT listening for mailbox commands...
3,648,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,771,006 UART: [rt]cmd =0x41544d4e, len=14344
4,424,952 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,366 UART:
192,709 UART: Running Caliptra ROM ...
193,888 UART:
194,032 UART: [state] CFI Enabled
263,082 UART: [state] LifecycleState = Unprovisioned
264,990 UART: [state] DebugLocked = No
267,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,783 UART: [kat] SHA2-256
442,482 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,939 UART: [kat] ++
453,558 UART: [kat] sha1
464,066 UART: [kat] SHA2-256
466,766 UART: [kat] SHA2-384
473,972 UART: [kat] SHA2-512-ACC
476,334 UART: [kat] ECC-384
2,769,649 UART: [kat] HMAC-384Kdf
2,800,293 UART: [kat] LMS
3,990,554 UART: [kat] --
3,995,143 UART: [cold-reset] ++
3,997,147 UART: [fht] Storing FHT @ 0x50003400
4,008,406 UART: [idev] ++
4,008,967 UART: [idev] CDI.KEYID = 6
4,009,877 UART: [idev] SUBJECT.KEYID = 7
4,011,127 UART: [idev] UDS.KEYID = 0
4,012,187 ready_for_fw is high
4,012,384 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,588 UART: [idev] Erasing UDS.KEYID = 0
7,346,927 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,493 UART: [idev] --
7,373,374 UART: [ldev] ++
7,373,932 UART: [ldev] CDI.KEYID = 6
7,374,893 UART: [ldev] SUBJECT.KEYID = 5
7,376,101 UART: [ldev] AUTHORITY.KEYID = 7
7,377,379 UART: [ldev] FE.KEYID = 1
7,403,737 UART: [ldev] Erasing FE.KEYID = 1
10,734,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,478 UART: [ldev] --
13,098,601 UART: [fwproc] Waiting for Commands...
13,100,483 UART: [fwproc] Received command 0x46574c44
13,102,669 UART: [fwproc] Received Image of size 113844 bytes
17,157,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,614,281 >>> mbox cmd response: success
17,619,041 UART: [afmc] ++
17,619,640 UART: [afmc] CDI.KEYID = 6
17,620,602 UART: [afmc] SUBJECT.KEYID = 7
17,621,815 UART: [afmc] AUTHORITY.KEYID = 5
20,989,167 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,288,675 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,290,940 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,305,338 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,320,193 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,334,611 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,354,929 UART: [afmc] --
23,359,550 UART: [cold-reset] --
23,363,621 UART: [state] Locking Datavault
23,369,405 UART: [state] Locking PCR0, PCR1 and PCR31
23,371,163 UART: [state] Locking ICCM
23,373,578 UART: [exit] Launching FMC @ 0x40000130
23,381,974 UART:
23,382,203 UART: Running Caliptra FMC ...
23,383,296 UART:
23,383,457 UART: [state] CFI Enabled
23,450,964 UART: [fht] FMC Alias Private Key: 7
25,788,106 UART: [art] Extend RT PCRs Done
25,789,328 UART: [art] Lock RT PCRs Done
25,791,087 UART: [art] Populate DV Done
25,796,498 UART: [fht] FMC Alias Private Key: 7
25,798,031 UART: [art] Derive CDI
25,798,863 UART: [art] Store in in slot 0x4
25,858,881 UART: [art] Derive Key Pair
25,859,938 UART: [art] Store priv key in slot 0x5
29,152,891 UART: [art] Derive Key Pair - Done
29,166,060 UART: [art] Signing Cert with AUTHO
29,167,371 UART: RITY.KEYID = 7
31,453,458 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,967 UART: [art] PUB.X = 575F6BEB6221018252E42774C4E50078D4D8F6F28940C5B93033579538C217034F55A612783F5459498A3472B387BF5C
31,462,122 UART: [art] PUB.Y = 916754C43EABD4728AD88840CFF91180C8F1BBB23181BA21091EBBB1F4797947449960E1F1ADFCB29887CE19FFE2C255
31,469,421 UART: [art] SIG.R = FFE7240731A79995EA926B20B64B3F206003D4AE4C2D97AA643FAA202029421D73979C7E0A2CF90FA029907A58C7149B
31,476,774 UART: [art] SIG.S = B0C310446427E81761F7757DB2D4EBF1F23CB1CF25168DE44A79FFA8941C1292D3F463A73BAFD93D87DD56BFE3FAFF19
32,782,024 UART: Caliptra RT
32,782,736 UART: [state] CFI Enabled
32,944,344 UART: [rt] RT listening for mailbox commands...
32,946,730 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,102,096 UART: [rt]cmd =0x41544d4e, len=14344
38,402,808 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,802,471 ready_for_fw is high
3,803,015 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,840,190 >>> mbox cmd response: success
23,523,331 UART:
23,523,729 UART: Running Caliptra FMC ...
23,524,876 UART:
23,525,030 UART: [state] CFI Enabled
23,592,481 UART: [fht] FMC Alias Private Key: 7
25,930,658 UART: [art] Extend RT PCRs Done
25,931,883 UART: [art] Lock RT PCRs Done
25,933,748 UART: [art] Populate DV Done
25,939,263 UART: [fht] FMC Alias Private Key: 7
25,940,962 UART: [art] Derive CDI
25,941,712 UART: [art] Store in in slot 0x4
26,002,001 UART: [art] Derive Key Pair
26,003,048 UART: [art] Store priv key in slot 0x5
29,295,598 UART: [art] Derive Key Pair - Done
29,308,654 UART: [art] Signing Cert with AUTHO
29,309,958 UART: RITY.KEYID = 7
31,597,935 UART: [art] Erasing AUTHORITY.KEYID = 7
31,599,490 UART: [art] PUB.X = 6801471C57391E873D08C0242DE565B2B47B0CC01F938A196869065EC01D5DD4C150872BE46B19DC37C1991A53821F3E
31,606,716 UART: [art] PUB.Y = 05E1161AED704C63CBFC5ECAD31BEDFB195E64351FFC01539851C88206AE4BAC245A988CE93EF331D0B77ECF48654E3E
31,613,898 UART: [art] SIG.R = EEAA3BD42E9C9619F2449E910887191E79DA84A333899D07C1941EE0D1A758ADD1964FCE3002AF0C2AF81DB0A584900A
31,621,291 UART: [art] SIG.S = 63C2A9C2F662526F8FEB83DCCC7A5A53556B55561A3758236F30313F7F4BA3CDB65E44187C3205DEC06BE83A28852117
32,926,713 UART: Caliptra RT
32,927,428 UART: [state] CFI Enabled
33,090,760 UART: [rt] RT listening for mailbox commands...
33,093,061 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,248,597 UART: [rt]cmd =0x41544d4e, len=14344
38,549,146 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,515 UART:
192,899 UART: Running Caliptra ROM ...
194,047 UART:
603,583 UART: [state] CFI Enabled
619,132 UART: [state] LifecycleState = Unprovisioned
621,085 UART: [state] DebugLocked = No
623,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,476 UART: [kat] SHA2-256
798,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,800 UART: [kat] ++
809,278 UART: [kat] sha1
820,875 UART: [kat] SHA2-256
823,524 UART: [kat] SHA2-384
828,671 UART: [kat] SHA2-512-ACC
831,036 UART: [kat] ECC-384
3,114,071 UART: [kat] HMAC-384Kdf
3,125,019 UART: [kat] LMS
4,315,138 UART: [kat] --
4,319,732 UART: [cold-reset] ++
4,320,679 UART: [fht] Storing FHT @ 0x50003400
4,332,043 UART: [idev] ++
4,332,613 UART: [idev] CDI.KEYID = 6
4,333,650 UART: [idev] SUBJECT.KEYID = 7
4,334,822 UART: [idev] UDS.KEYID = 0
4,335,894 ready_for_fw is high
4,336,117 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,155 UART: [idev] Erasing UDS.KEYID = 0
7,622,060 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,842 UART: [idev] --
7,648,180 UART: [ldev] ++
7,648,748 UART: [ldev] CDI.KEYID = 6
7,649,715 UART: [ldev] SUBJECT.KEYID = 5
7,650,928 UART: [ldev] AUTHORITY.KEYID = 7
7,652,162 UART: [ldev] FE.KEYID = 1
7,663,346 UART: [ldev] Erasing FE.KEYID = 1
10,953,503 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,215 UART: [ldev] --
13,310,620 UART: [fwproc] Waiting for Commands...
13,313,416 UART: [fwproc] Received command 0x46574c44
13,315,654 UART: [fwproc] Received Image of size 113844 bytes
17,367,979 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,435,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,504,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,820,578 >>> mbox cmd response: success
17,824,626 UART: [afmc] ++
17,825,217 UART: [afmc] CDI.KEYID = 6
17,826,157 UART: [afmc] SUBJECT.KEYID = 7
17,827,370 UART: [afmc] AUTHORITY.KEYID = 5
21,142,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,182 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,431 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,817 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,680 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,116 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,492 UART: [afmc] --
23,508,546 UART: [cold-reset] --
23,513,865 UART: [state] Locking Datavault
23,519,538 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,294 UART: [state] Locking ICCM
23,522,523 UART: [exit] Launching FMC @ 0x40000130
23,530,917 UART:
23,531,164 UART: Running Caliptra FMC ...
23,532,268 UART:
23,532,424 UART: [state] CFI Enabled
23,540,722 UART: [fht] FMC Alias Private Key: 7
25,870,670 UART: [art] Extend RT PCRs Done
25,871,880 UART: [art] Lock RT PCRs Done
25,873,748 UART: [art] Populate DV Done
25,879,206 UART: [fht] FMC Alias Private Key: 7
25,880,853 UART: [art] Derive CDI
25,881,671 UART: [art] Store in in slot 0x4
25,923,888 UART: [art] Derive Key Pair
25,924,891 UART: [art] Store priv key in slot 0x5
29,166,692 UART: [art] Derive Key Pair - Done
29,179,746 UART: [art] Signing Cert with AUTHO
29,181,046 UART: RITY.KEYID = 7
31,460,038 UART: [art] Erasing AUTHORITY.KEYID = 7
31,461,687 UART: [art] PUB.X = 005DD0DBFF58C98824B8B90A3B1C86C61264329C5BF39ADA84173925D5EA8849996C0A00BFDF9C5414CED733E0D1D6E1
31,468,791 UART: [art] PUB.Y = 79BAF14E00688AC25D000CC8E9C5688929BFE22A279F775A774D032071A27E15E4234F1F5C5B3613BC4889A0EA265201
31,475,990 UART: [art] SIG.R = C45FA53FD687AA247098061E14DF2B8EAB9C72AC560C865FF9ED5EE463F3186695906BF6D7FB42CCB730A5589A7EAD83
31,483,405 UART: [art] SIG.S = 82ACF443756CBDD5556E1092E083153AC5D15293A14FE708F1950CB5C2DFCD021BEFADBC41DD4438411498215CEF6261
32,788,068 UART: Caliptra RT
32,788,790 UART: [state] CFI Enabled
32,906,376 UART: [rt] RT listening for mailbox commands...
32,908,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,063,928 UART: [rt]cmd =0x41544d4e, len=14344
38,364,235 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
4,121,355 ready_for_fw is high
4,121,782 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,051,132 >>> mbox cmd response: success
23,693,185 UART:
23,693,605 UART: Running Caliptra FMC ...
23,694,710 UART:
23,694,873 UART: [state] CFI Enabled
23,702,671 UART: [fht] FMC Alias Private Key: 7
26,033,431 UART: [art] Extend RT PCRs Done
26,034,657 UART: [art] Lock RT PCRs Done
26,036,346 UART: [art] Populate DV Done
26,041,871 UART: [fht] FMC Alias Private Key: 7
26,043,465 UART: [art] Derive CDI
26,044,213 UART: [art] Store in in slot 0x4
26,087,077 UART: [art] Derive Key Pair
26,088,089 UART: [art] Store priv key in slot 0x5
29,330,603 UART: [art] Derive Key Pair - Done
29,343,684 UART: [art] Signing Cert with AUTHO
29,344,996 UART: RITY.KEYID = 7
31,624,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,121 UART: [art] PUB.X = 975F9C2E176DDBFBE6633F35B37D3D15499B39AB1F2ABB3D58DEF996D92EDBDEC585D84ADE6AC507481F1DB605735932
31,633,377 UART: [art] PUB.Y = 6EECF12ADE8EC643C27325405727BED9588BB4A33846458143E47062B9DC1FFDEB809DC09681722DD7782DEE709997D1
31,640,589 UART: [art] SIG.R = 1F672F7223B81419CFBBACE31052F50623232797235BC67D5FD4DC84314D9BCE464C05DB709CB5DB13A8D240DF84839B
31,647,992 UART: [art] SIG.S = 11A132399B2010DEC6DA88560917C8975BDC61FEE797368C6DC626A888F99ABF20DD02050372247C20F4A8CEDE9A1CC5
32,953,285 UART: Caliptra RT
32,954,001 UART: [state] CFI Enabled
33,071,680 UART: [rt] RT listening for mailbox commands...
33,074,002 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,229,328 UART: [rt]cmd =0x41544d4e, len=14344
38,529,808 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,181 UART:
192,543 UART: Running Caliptra ROM ...
193,744 UART:
193,897 UART: [state] CFI Enabled
264,003 UART: [state] LifecycleState = Unprovisioned
265,931 UART: [state] DebugLocked = No
267,896 UART: [state] WD Timer not started. Device not locked for debugging
271,289 UART: [kat] SHA2-256
450,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,962 UART: [kat] ++
462,414 UART: [kat] sha1
473,143 UART: [kat] SHA2-256
476,151 UART: [kat] SHA2-384
483,202 UART: [kat] SHA2-512-ACC
486,134 UART: [kat] ECC-384
2,947,467 UART: [kat] HMAC-384Kdf
2,972,078 UART: [kat] LMS
3,501,516 UART: [kat] --
3,507,151 UART: [cold-reset] ++
3,509,580 UART: [fht] FHT @ 0x50003400
3,521,694 UART: [idev] ++
3,522,268 UART: [idev] CDI.KEYID = 6
3,523,194 UART: [idev] SUBJECT.KEYID = 7
3,524,367 UART: [idev] UDS.KEYID = 0
3,525,416 ready_for_fw is high
3,525,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,465 UART: [idev] Erasing UDS.KEYID = 0
6,025,964 UART: [idev] Sha1 KeyId Algorithm
6,049,055 UART: [idev] --
6,052,771 UART: [ldev] ++
6,053,363 UART: [ldev] CDI.KEYID = 6
6,054,253 UART: [ldev] SUBJECT.KEYID = 5
6,055,379 UART: [ldev] AUTHORITY.KEYID = 7
6,056,683 UART: [ldev] FE.KEYID = 1
6,100,687 UART: [ldev] Erasing FE.KEYID = 1
8,603,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,998 UART: [ldev] --
10,413,562 UART: [fwproc] Wait for Commands...
10,416,366 UART: [fwproc] Recv command 0x46574c44
10,418,459 UART: [fwproc] Recv'd Img size: 114168 bytes
13,817,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,539 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,964,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,281,963 >>> mbox cmd response: success
14,285,457 UART: [afmc] ++
14,286,059 UART: [afmc] CDI.KEYID = 6
14,286,977 UART: [afmc] SUBJECT.KEYID = 7
14,288,083 UART: [afmc] AUTHORITY.KEYID = 5
16,829,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,217 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,604,099 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,767 UART: [afmc] --
18,631,442 UART: [cold-reset] --
18,636,652 UART: [state] Locking Datavault
18,641,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,854 UART: [state] Locking ICCM
18,644,386 UART: [exit] Launching FMC @ 0x40000130
18,652,801 UART:
18,653,036 UART: Running Caliptra FMC ...
18,654,072 UART:
18,654,222 UART: [state] CFI Enabled
18,710,700 UART: [fht] FMC Alias Private Key: 7
20,474,915 UART: [art] Extend RT PCRs Done
20,476,132 UART: [art] Lock RT PCRs Done
20,477,513 UART: [art] Populate DV Done
20,482,711 UART: [fht] FMC Alias Private Key: 7
20,484,419 UART: [art] Derive CDI
20,485,236 UART: [art] Store in in slot 0x4
20,543,625 UART: [art] Derive Key Pair
20,544,664 UART: [art] Store priv key in slot 0x5
23,006,480 UART: [art] Derive Key Pair - Done
23,019,635 UART: [art] Signing Cert with AUTHO
23,020,947 UART: RITY.KEYID = 7
24,732,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,519 UART: [art] PUB.X = 2A61861242B288C6B7F77CD75B7734DD34C60427012BD267E2E75D26979B19E2DAE01FF5D10E70967A0D4534BD440E2D
24,741,777 UART: [art] PUB.Y = 5BBDA453019C62D17AB3E440A3CE8AEB6C48776BD93E18CFEBC7FF900EEACD0D39AB564F40DBDAD390F070760F58E86C
24,749,017 UART: [art] SIG.R = 2F58791E86787C1DAB47B6CA9543899F70F13D347898E1FA3DF2E0F3DBA97A3EDA4506670B65CC8FB869FB600C8354AE
24,756,414 UART: [art] SIG.S = D261B03A4E539932E8C850EEC2E939D3740EAD538EEA7AEDA0C99A7DD001C46A428AB016E3442D4FED8280E833E5ED02
25,735,097 UART: Caliptra RT
25,735,788 UART: [state] CFI Enabled
25,901,721 UART: [rt] RT listening for mailbox commands...
25,904,050 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,059,363 UART: [rt]cmd =0x41544d4e, len=14344
30,055,705 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,381,368 ready_for_fw is high
3,381,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,042,270 >>> mbox cmd response: success
18,324,356 UART:
18,324,749 UART: Running Caliptra FMC ...
18,325,847 UART:
18,325,997 UART: [state] CFI Enabled
18,388,585 UART: [fht] FMC Alias Private Key: 7
20,152,451 UART: [art] Extend RT PCRs Done
20,153,681 UART: [art] Lock RT PCRs Done
20,155,009 UART: [art] Populate DV Done
20,160,241 UART: [fht] FMC Alias Private Key: 7
20,161,946 UART: [art] Derive CDI
20,162,683 UART: [art] Store in in slot 0x4
20,221,786 UART: [art] Derive Key Pair
20,222,825 UART: [art] Store priv key in slot 0x5
22,685,687 UART: [art] Derive Key Pair - Done
22,698,626 UART: [art] Signing Cert with AUTHO
22,699,930 UART: RITY.KEYID = 7
24,411,279 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,796 UART: [art] PUB.X = 3C7D97AD087EEA71F1DF6602237A14B8547BBE0F79A29C76BD88F0835E702FBFBF30AB244BAE8506D30EA6336175496C
24,420,095 UART: [art] PUB.Y = E4FEE89B7FBA8648124A05AC2AB39E902A33C9DE1591B9284CE07CC85A1074729D0A6A887D6C84DE26300FF08688DFE0
24,427,339 UART: [art] SIG.R = DFC01169561A9D25B1CC499D685151B4024025163FA0A2B17540869518B3C1356068AD81A2330BACCD21ADD63C2B5B96
24,434,811 UART: [art] SIG.S = 65FE937DD5F2AC241C4AE0E8AC25EEB952CCB6D59AD3411F1444A261C7A41101EF763031EFBD881647E365D0ABB79F49
25,414,235 UART: Caliptra RT
25,414,924 UART: [state] CFI Enabled
25,579,983 UART: [rt] RT listening for mailbox commands...
25,582,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,737,705 UART: [rt]cmd =0x41544d4e, len=14344
29,733,510 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
193,007 UART:
193,386 UART: Running Caliptra ROM ...
194,486 UART:
604,354 UART: [state] CFI Enabled
615,383 UART: [state] LifecycleState = Unprovisioned
617,178 UART: [state] DebugLocked = No
619,190 UART: [state] WD Timer not started. Device not locked for debugging
623,420 UART: [kat] SHA2-256
802,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,163 UART: [kat] ++
814,609 UART: [kat] sha1
824,978 UART: [kat] SHA2-256
828,019 UART: [kat] SHA2-384
834,270 UART: [kat] SHA2-512-ACC
837,217 UART: [kat] ECC-384
3,278,453 UART: [kat] HMAC-384Kdf
3,291,341 UART: [kat] LMS
3,820,784 UART: [kat] --
3,822,519 UART: [cold-reset] ++
3,824,650 UART: [fht] FHT @ 0x50003400
3,836,124 UART: [idev] ++
3,836,691 UART: [idev] CDI.KEYID = 6
3,837,608 UART: [idev] SUBJECT.KEYID = 7
3,838,778 UART: [idev] UDS.KEYID = 0
3,839,824 ready_for_fw is high
3,840,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,983,416 UART: [idev] Erasing UDS.KEYID = 0
6,314,234 UART: [idev] Sha1 KeyId Algorithm
6,337,511 UART: [idev] --
6,342,369 UART: [ldev] ++
6,342,933 UART: [ldev] CDI.KEYID = 6
6,343,900 UART: [ldev] SUBJECT.KEYID = 5
6,345,077 UART: [ldev] AUTHORITY.KEYID = 7
6,346,309 UART: [ldev] FE.KEYID = 1
6,356,766 UART: [ldev] Erasing FE.KEYID = 1
8,835,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,274 UART: [ldev] --
10,627,593 UART: [fwproc] Wait for Commands...
10,629,687 UART: [fwproc] Recv command 0x46574c44
10,631,725 UART: [fwproc] Recv'd Img size: 114168 bytes
14,032,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,267 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,059 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,490,680 >>> mbox cmd response: success
14,495,222 UART: [afmc] ++
14,495,828 UART: [afmc] CDI.KEYID = 6
14,496,741 UART: [afmc] SUBJECT.KEYID = 7
14,497,901 UART: [afmc] AUTHORITY.KEYID = 5
16,996,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,327 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,953 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,788,194 UART: [afmc] --
18,792,434 UART: [cold-reset] --
18,796,343 UART: [state] Locking Datavault
18,800,894 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,539 UART: [state] Locking ICCM
18,804,801 UART: [exit] Launching FMC @ 0x40000130
18,813,212 UART:
18,813,447 UART: Running Caliptra FMC ...
18,814,548 UART:
18,814,704 UART: [state] CFI Enabled
18,822,698 UART: [fht] FMC Alias Private Key: 7
20,579,603 UART: [art] Extend RT PCRs Done
20,580,818 UART: [art] Lock RT PCRs Done
20,582,565 UART: [art] Populate DV Done
20,588,029 UART: [fht] FMC Alias Private Key: 7
20,589,603 UART: [art] Derive CDI
20,590,342 UART: [art] Store in in slot 0x4
20,633,253 UART: [art] Derive Key Pair
20,634,255 UART: [art] Store priv key in slot 0x5
23,060,656 UART: [art] Derive Key Pair - Done
23,073,569 UART: [art] Signing Cert with AUTHO
23,074,901 UART: RITY.KEYID = 7
24,780,257 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,768 UART: [art] PUB.X = ED42C30DDFF29365179BF2DE7DB0287422025A7FE8AE6666B6964A6F70C8C6D343D06C172897CA7BCFAF9B00BDD39829
24,789,032 UART: [art] PUB.Y = 80397EA087FC33CFA4475BFD362EA0895EAEFD60805B48D930D8EA89B3A61169779BE472E557ADC59A11E4F68B3C9137
24,796,278 UART: [art] SIG.R = 6F3CDF3830F2C3E63869CD86C3ECF0F854484C6E572B2ED88C96168D2D4CB729151C0CEED69D266BFD006AFAE12F923A
24,803,674 UART: [art] SIG.S = 9E1B3E36FE8559D9E402055D22FA5D9664F94AEA240CE6A85B3C3F8D01211B75C792A8689EA45C40C5E57AB25C3A6848
25,782,479 UART: Caliptra RT
25,783,167 UART: [state] CFI Enabled
25,900,866 UART: [rt] RT listening for mailbox commands...
25,903,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,058,490 UART: [rt]cmd =0x41544d4e, len=14344
30,054,379 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,906 writing to cptra_bootfsm_go
3,696,455 ready_for_fw is high
3,696,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,264,696 >>> mbox cmd response: success
18,511,332 UART:
18,511,743 UART: Running Caliptra FMC ...
18,512,843 UART:
18,513,000 UART: [state] CFI Enabled
18,520,640 UART: [fht] FMC Alias Private Key: 7
20,277,383 UART: [art] Extend RT PCRs Done
20,278,618 UART: [art] Lock RT PCRs Done
20,280,324 UART: [art] Populate DV Done
20,285,703 UART: [fht] FMC Alias Private Key: 7
20,287,302 UART: [art] Derive CDI
20,288,045 UART: [art] Store in in slot 0x4
20,330,333 UART: [art] Derive Key Pair
20,331,379 UART: [art] Store priv key in slot 0x5
22,758,418 UART: [art] Derive Key Pair - Done
22,771,260 UART: [art] Signing Cert with AUTHO
22,772,557 UART: RITY.KEYID = 7
24,478,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,715 UART: [art] PUB.X = E67A074B43301CA49E8BBA4CFCE3F6237A8A27DCB83BF00101D9EFCE9E47F0E625657FCBE9226AD299FE35DF7AD858D1
24,487,026 UART: [art] PUB.Y = 5D859AB590CCFC8154E545AED470727D477253D49A70F4137DB933AFBFBA6FA7C0B9A0DA4CFEEF0A553C778EE9A60A46
24,494,286 UART: [art] SIG.R = B47ADF175DCDF18F9C774EA8BA1D37A79CC1ADA4BEFA0437CBA377B067F9C163BD0B20E5D74CE39130F94F4E853081C1
24,501,747 UART: [art] SIG.S = B38D5DB519D7C02D46A9CADCEAFDF7CF2DBCA4A8D9EB504585376DB8AD1B529C6BEF1913D94A860009AD113565753728
25,480,921 UART: Caliptra RT
25,481,634 UART: [state] CFI Enabled
25,598,768 UART: [rt] RT listening for mailbox commands...
25,601,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,756,594 UART: [rt]cmd =0x41544d4e, len=14344
29,751,837 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
191,988 UART:
192,360 UART: Running Caliptra ROM ...
193,483 UART:
193,632 UART: [state] CFI Enabled
262,208 UART: [state] LifecycleState = Unprovisioned
264,630 UART: [state] DebugLocked = No
266,309 UART: [state] WD Timer not started. Device not locked for debugging
271,629 UART: [kat] SHA2-256
461,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,254 UART: [kat] ++
472,703 UART: [kat] sha1
483,577 UART: [kat] SHA2-256
486,656 UART: [kat] SHA2-384
493,384 UART: [kat] SHA2-512-ACC
495,939 UART: [kat] ECC-384
2,948,368 UART: [kat] HMAC-384Kdf
2,970,617 UART: [kat] LMS
3,502,396 UART: [kat] --
3,507,183 UART: [cold-reset] ++
3,508,557 UART: [fht] FHT @ 0x50003400
3,520,251 UART: [idev] ++
3,520,891 UART: [idev] CDI.KEYID = 6
3,521,887 UART: [idev] SUBJECT.KEYID = 7
3,523,061 UART: [idev] UDS.KEYID = 0
3,523,990 ready_for_fw is high
3,524,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,880 UART: [idev] Erasing UDS.KEYID = 0
6,025,344 UART: [idev] Sha1 KeyId Algorithm
6,046,738 UART: [idev] --
6,051,868 UART: [ldev] ++
6,052,552 UART: [ldev] CDI.KEYID = 6
6,053,467 UART: [ldev] SUBJECT.KEYID = 5
6,054,547 UART: [ldev] AUTHORITY.KEYID = 7
6,055,833 UART: [ldev] FE.KEYID = 1
6,100,400 UART: [ldev] Erasing FE.KEYID = 1
8,603,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,122 UART: [ldev] --
10,412,772 UART: [fwproc] Wait for Commands...
10,415,848 UART: [fwproc] Recv command 0x46574c44
10,418,120 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,383 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,590 >>> mbox cmd response: success
14,601,237 UART: [afmc] ++
14,601,961 UART: [afmc] CDI.KEYID = 6
14,603,177 UART: [afmc] SUBJECT.KEYID = 7
14,604,622 UART: [afmc] AUTHORITY.KEYID = 5
17,149,030 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,531 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,695 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,832 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,876 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,941 UART: [afmc] --
18,948,247 UART: [cold-reset] --
18,952,768 UART: [state] Locking Datavault
18,956,847 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,062 UART: [state] Locking ICCM
18,961,059 UART: [exit] Launching FMC @ 0x40000130
18,969,762 UART:
18,969,997 UART: Running Caliptra FMC ...
18,971,118 UART:
18,971,284 UART: [state] CFI Enabled
19,028,188 UART: [fht] FMC Alias Private Key: 7
20,792,210 UART: [art] Extend RT PCRs Done
20,793,427 UART: [art] Lock RT PCRs Done
20,795,104 UART: [art] Populate DV Done
20,800,570 UART: [fht] FMC Alias Private Key: 7
20,802,215 UART: [art] Derive CDI
20,803,031 UART: [art] Store in in slot 0x4
20,860,721 UART: [art] Derive Key Pair
20,861,765 UART: [art] Store priv key in slot 0x5
23,325,201 UART: [art] Derive Key Pair - Done
23,338,250 UART: [art] Signing Cert with AUTHO
23,339,554 UART: RITY.KEYID = 7
25,050,804 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,450 UART: [art] PUB.X = 64159BAAF59592C20485CD71D13767D6C3085DEEB8B3077CDC5A3F64D22CDB54C3445AA2EF29FFAAEB313934051AFD7C
25,059,630 UART: [art] PUB.Y = FC269944DDBC024924A3AD2B73D09789B2D2B07FBBD53EA2D2EEE8547EEB2CABF2B8CDC773B7D632287C5EDC9E4F0007
25,066,898 UART: [art] SIG.R = 8D8026E059BAC0F5F66600F7ADA6F33890654D7E0FE569393F1975581D15B726DB4F6BA0E07C6A564F282705FB79FB94
25,074,227 UART: [art] SIG.S = 80203EFABA013B5109F8CE04262B0FC26C658E707927FC3D3FF2B0D7EFF250800DE62DF2B6BD2717F999C0310A7E90D8
26,053,135 UART: Caliptra RT
26,053,840 UART: [state] CFI Enabled
26,219,669 UART: [rt] RT listening for mailbox commands...
26,221,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,377,300 UART: [rt]cmd =0x41544d4e, len=14344
30,372,626 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,440,032 ready_for_fw is high
3,440,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,724,169 >>> mbox cmd response: success
19,018,874 UART:
19,019,271 UART: Running Caliptra FMC ...
19,020,462 UART:
19,020,657 UART: [state] CFI Enabled
19,085,781 UART: [fht] FMC Alias Private Key: 7
20,849,863 UART: [art] Extend RT PCRs Done
20,851,079 UART: [art] Lock RT PCRs Done
20,852,730 UART: [art] Populate DV Done
20,858,306 UART: [fht] FMC Alias Private Key: 7
20,859,902 UART: [art] Derive CDI
20,860,715 UART: [art] Store in in slot 0x4
20,918,775 UART: [art] Derive Key Pair
20,919,827 UART: [art] Store priv key in slot 0x5
23,382,658 UART: [art] Derive Key Pair - Done
23,395,608 UART: [art] Signing Cert with AUTHO
23,396,915 UART: RITY.KEYID = 7
25,108,803 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,322 UART: [art] PUB.X = 8E9F4FD4461E166BDC0B7931F3FBA13BC17971C39C313369820B22D969F66F5967FCBB02D57498549B8AC253D2CBD463
25,117,615 UART: [art] PUB.Y = BA3B1072F2B05D019C3AEE77A3D36430278B9BA049269D43FAD3D51468CF721780A366905DCCDF45FDC4BFAE402325BE
25,124,859 UART: [art] SIG.R = 9BB765C7BF6E49E5B51109A86BAD1C2828B128BAF70B147EEDF628CBF13E9786ED4B3F5826C10EA6E8CB96B4148FBA4D
25,132,299 UART: [art] SIG.S = 6797F465311C8854640FD578F99CB7978AA482AF4609417232D9845BA178E245CDDB6F6C9C0313C497B365C35E8C3E42
26,110,899 UART: Caliptra RT
26,111,595 UART: [state] CFI Enabled
26,277,434 UART: [rt] RT listening for mailbox commands...
26,279,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,434,985 UART: [rt]cmd =0x41544d4e, len=14344
30,430,492 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,859 writing to cptra_bootfsm_go
192,976 UART:
193,338 UART: Running Caliptra ROM ...
194,429 UART:
603,953 UART: [state] CFI Enabled
620,886 UART: [state] LifecycleState = Unprovisioned
623,253 UART: [state] DebugLocked = No
626,063 UART: [state] WD Timer not started. Device not locked for debugging
630,406 UART: [kat] SHA2-256
820,309 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,110 UART: [kat] ++
831,553 UART: [kat] sha1
842,781 UART: [kat] SHA2-256
845,783 UART: [kat] SHA2-384
851,274 UART: [kat] SHA2-512-ACC
853,851 UART: [kat] ECC-384
3,296,432 UART: [kat] HMAC-384Kdf
3,308,740 UART: [kat] LMS
3,840,560 UART: [kat] --
3,845,215 UART: [cold-reset] ++
3,847,295 UART: [fht] FHT @ 0x50003400
3,859,903 UART: [idev] ++
3,860,608 UART: [idev] CDI.KEYID = 6
3,861,560 UART: [idev] SUBJECT.KEYID = 7
3,862,803 UART: [idev] UDS.KEYID = 0
3,863,724 ready_for_fw is high
3,863,924 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,355 UART: [idev] Erasing UDS.KEYID = 0
6,335,518 UART: [idev] Sha1 KeyId Algorithm
6,357,200 UART: [idev] --
6,362,703 UART: [ldev] ++
6,363,389 UART: [ldev] CDI.KEYID = 6
6,364,307 UART: [ldev] SUBJECT.KEYID = 5
6,365,465 UART: [ldev] AUTHORITY.KEYID = 7
6,366,698 UART: [ldev] FE.KEYID = 1
6,376,803 UART: [ldev] Erasing FE.KEYID = 1
8,857,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,132 UART: [ldev] --
10,645,573 UART: [fwproc] Wait for Commands...
10,648,154 UART: [fwproc] Recv command 0x46574c44
10,650,457 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,278 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,832,484 >>> mbox cmd response: success
14,836,614 UART: [afmc] ++
14,837,316 UART: [afmc] CDI.KEYID = 6
14,838,556 UART: [afmc] SUBJECT.KEYID = 7
14,839,992 UART: [afmc] AUTHORITY.KEYID = 5
17,345,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,104 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,107 UART: [afmc] --
19,142,844 UART: [cold-reset] --
19,148,276 UART: [state] Locking Datavault
19,152,445 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,644 UART: [state] Locking ICCM
19,157,550 UART: [exit] Launching FMC @ 0x40000130
19,166,224 UART:
19,166,461 UART: Running Caliptra FMC ...
19,167,565 UART:
19,167,729 UART: [state] CFI Enabled
19,175,514 UART: [fht] FMC Alias Private Key: 7
20,931,805 UART: [art] Extend RT PCRs Done
20,933,020 UART: [art] Lock RT PCRs Done
20,934,753 UART: [art] Populate DV Done
20,940,029 UART: [fht] FMC Alias Private Key: 7
20,941,732 UART: [art] Derive CDI
20,942,548 UART: [art] Store in in slot 0x4
20,985,418 UART: [art] Derive Key Pair
20,986,456 UART: [art] Store priv key in slot 0x5
23,412,374 UART: [art] Derive Key Pair - Done
23,425,426 UART: [art] Signing Cert with AUTHO
23,426,729 UART: RITY.KEYID = 7
25,132,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,725 UART: [art] PUB.X = 686562C0F9B99271BF55373636FB96CAF1763543513880EF2D0A117201D48C80F5E17B5D6DF34B46208F260082366755
25,140,970 UART: [art] PUB.Y = 786624EDEE9225903DE6F1241E1D4DD62CCE89C15A621EE8AE688434497742A844B66A5675C35E9ED3EEB628333F8B8E
25,148,253 UART: [art] SIG.R = 9BB18AB76BEC626BAAF80611AD842AA114186C2B1413C3F1CA7AE2E604067A136BC0357FC186D18227C9C6601CF4648C
25,155,651 UART: [art] SIG.S = 158FC1E3847359D9456B0F77565064EBEDFA88493687CA432673FA0F4E65CCCB15639FDE4834A5EB373DBAFD35B12CCA
26,134,134 UART: Caliptra RT
26,134,831 UART: [state] CFI Enabled
26,252,648 UART: [rt] RT listening for mailbox commands...
26,255,046 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,410,314 UART: [rt]cmd =0x41544d4e, len=14344
30,406,153 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,661 writing to cptra_bootfsm_go
3,758,484 ready_for_fw is high
3,758,903 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,958,788 >>> mbox cmd response: success
19,213,581 UART:
19,213,979 UART: Running Caliptra FMC ...
19,215,161 UART:
19,215,358 UART: [state] CFI Enabled
19,223,339 UART: [fht] FMC Alias Private Key: 7
20,979,798 UART: [art] Extend RT PCRs Done
20,981,025 UART: [art] Lock RT PCRs Done
20,982,712 UART: [art] Populate DV Done
20,988,114 UART: [fht] FMC Alias Private Key: 7
20,989,708 UART: [art] Derive CDI
20,990,524 UART: [art] Store in in slot 0x4
21,033,130 UART: [art] Derive Key Pair
21,034,174 UART: [art] Store priv key in slot 0x5
23,460,716 UART: [art] Derive Key Pair - Done
23,473,728 UART: [art] Signing Cert with AUTHO
23,475,027 UART: RITY.KEYID = 7
25,180,937 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,444 UART: [art] PUB.X = 6B80B24ED42F44E706BD914BEDB4BB32FCA7FD7464B19BA44CC0905514591ECA913098E13E28C391D1E993AFE4D8F7DF
25,189,691 UART: [art] PUB.Y = 2F0EEC25F79AF2CC89BD269B8E237C4DD9B061CE9D44644261B2E69D6A252404934C59F983AAAAF21F102B1936BB06FE
25,196,983 UART: [art] SIG.R = 1F5724572ACECC9EA8631FE35DD5E9B119FBB6E43A06B987E586CE5725812772FE02D9F921F28FB1A5BA3723D5D40F78
25,204,379 UART: [art] SIG.S = FC14C35091944000C79CD7914B0064C8A916CC3B2CDB2FF5EA0F94ABFF8D686E99576D336741770B591D11744C9C4FDF
26,183,621 UART: Caliptra RT
26,184,328 UART: [state] CFI Enabled
26,301,718 UART: [rt] RT listening for mailbox commands...
26,304,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,367 UART: [rt]cmd =0x41544d4e, len=14344
30,454,565 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,261 UART: [kat] SHA2-256
882,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,307 UART: [kat] ++
886,459 UART: [kat] sha1
890,805 UART: [kat] SHA2-256
892,743 UART: [kat] SHA2-384
895,480 UART: [kat] SHA2-512-ACC
897,381 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,298 UART: [kat] LMS
1,475,494 UART: [kat] --
1,476,709 UART: [cold-reset] ++
1,477,217 UART: [fht] Storing FHT @ 0x50003400
1,480,064 UART: [idev] ++
1,480,232 UART: [idev] CDI.KEYID = 6
1,480,592 UART: [idev] SUBJECT.KEYID = 7
1,481,016 UART: [idev] UDS.KEYID = 0
1,481,361 ready_for_fw is high
1,481,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,312 UART: [idev] Erasing UDS.KEYID = 0
1,506,132 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,540 UART: [idev] --
1,515,817 UART: [ldev] ++
1,515,985 UART: [ldev] CDI.KEYID = 6
1,516,348 UART: [ldev] SUBJECT.KEYID = 5
1,516,774 UART: [ldev] AUTHORITY.KEYID = 7
1,517,237 UART: [ldev] FE.KEYID = 1
1,522,431 UART: [ldev] Erasing FE.KEYID = 1
1,547,964 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,920 UART: [ldev] --
1,587,205 UART: [fwproc] Waiting for Commands...
1,587,932 UART: [fwproc] Received command 0x46574c44
1,588,723 UART: [fwproc] Received Image of size 114168 bytes
2,884,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,105 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,158 >>> mbox cmd response: success
3,078,172 UART: [afmc] ++
3,078,340 UART: [afmc] CDI.KEYID = 6
3,078,702 UART: [afmc] SUBJECT.KEYID = 7
3,079,127 UART: [afmc] AUTHORITY.KEYID = 5
3,113,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,219 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,909 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,694 UART: [afmc] --
3,156,798 UART: [cold-reset] --
3,157,690 UART: [state] Locking Datavault
3,158,901 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,505 UART: [state] Locking ICCM
3,160,097 UART: [exit] Launching FMC @ 0x40000130
3,165,426 UART:
3,165,442 UART: Running Caliptra FMC ...
3,165,850 UART:
3,165,904 UART: [state] CFI Enabled
3,176,735 UART: [fht] FMC Alias Private Key: 7
3,284,856 UART: [art] Extend RT PCRs Done
3,285,284 UART: [art] Lock RT PCRs Done
3,286,846 UART: [art] Populate DV Done
3,294,765 UART: [fht] FMC Alias Private Key: 7
3,295,701 UART: [art] Derive CDI
3,295,981 UART: [art] Store in in slot 0x4
3,381,420 UART: [art] Derive Key Pair
3,381,780 UART: [art] Store priv key in slot 0x5
3,394,924 UART: [art] Derive Key Pair - Done
3,409,663 UART: [art] Signing Cert with AUTHO
3,410,143 UART: RITY.KEYID = 7
3,425,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,432 UART: [art] PUB.X = 7129CFCE89C18C1283704A1C0DD46C67BCA8066CC004545A7BC5973FBE941A41D1EFC9D2657087F655ACA19F29096416
3,433,194 UART: [art] PUB.Y = 5F0580CD81EFC03587CE312F83D0271F309F09252BD4E97565076D5147940078B3D086CD94D695ADAF9D1B189FBEB2DC
3,440,117 UART: [art] SIG.R = 46C4B6EB4BD03D9B9CBD3CE21EBC6557AD32293DECFF268ED0157FE63785F34C70BE1C17DAC5AAAAE76DF523D5E2214B
3,446,915 UART: [art] SIG.S = 5D7C33175C14B08F1629F7C0D1DEDF01CB2ADE754A65308E8BF898E20E332E8F89431A89CEAF698C3841F1C725F8E33B
3,471,200 UART: Caliptra RT
3,471,453 UART: [state] CFI Enabled
3,580,673 UART: [rt] RT listening for mailbox commands...
3,581,343 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,409 UART: [rt]cmd =0x41544d4e, len=14344
4,013,974 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 ready_for_fw is high
1,362,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,588 >>> mbox cmd response: success
2,987,094 UART:
2,987,110 UART: Running Caliptra FMC ...
2,987,518 UART:
2,987,572 UART: [state] CFI Enabled
2,998,193 UART: [fht] FMC Alias Private Key: 7
3,105,532 UART: [art] Extend RT PCRs Done
3,105,960 UART: [art] Lock RT PCRs Done
3,107,250 UART: [art] Populate DV Done
3,115,393 UART: [fht] FMC Alias Private Key: 7
3,116,365 UART: [art] Derive CDI
3,116,645 UART: [art] Store in in slot 0x4
3,202,216 UART: [art] Derive Key Pair
3,202,576 UART: [art] Store priv key in slot 0x5
3,215,404 UART: [art] Derive Key Pair - Done
3,230,270 UART: [art] Signing Cert with AUTHO
3,230,750 UART: RITY.KEYID = 7
3,246,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,143 UART: [art] PUB.X = BC807DEAB5A94CDFDCB628097D7B4C3714759AC54A744B595483340CC4B4B4AC92F8CFBD43BE35B6D62AD3497C42F35D
3,253,925 UART: [art] PUB.Y = 6474BE62B79EFE8056D4B8362BE8B74D63D8D2CC5E3591F7D9EA48DB352C3E15D09C6185C6A80F5B7095BC820C50B452
3,260,877 UART: [art] SIG.R = 78F6708AC1825DD3F345348D2DB12F383B0F789550A47A7CA76476A38CD4D87D28A974C6D67495E0E18D1087DE4E3ED1
3,267,646 UART: [art] SIG.S = 878F9B10061C0F71E507B9C046E6EB7B0127179416A899E7D6573232A862C95E714D008C8B4725469C99037EF3B7B26A
3,291,928 UART: Caliptra RT
3,292,181 UART: [state] CFI Enabled
3,400,312 UART: [rt] RT listening for mailbox commands...
3,400,982 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,523,936 UART: [rt]cmd =0x41544d4e, len=14344
3,833,531 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,522 UART: [kat] SHA2-256
892,460 UART: [kat] SHA2-384
895,025 UART: [kat] SHA2-512-ACC
896,926 UART: [kat] ECC-384
902,595 UART: [kat] HMAC-384Kdf
907,303 UART: [kat] LMS
1,475,499 UART: [kat] --
1,476,580 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,901 UART: [idev] ++
1,480,069 UART: [idev] CDI.KEYID = 6
1,480,429 UART: [idev] SUBJECT.KEYID = 7
1,480,853 UART: [idev] UDS.KEYID = 0
1,481,198 ready_for_fw is high
1,481,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,939 UART: [idev] Erasing UDS.KEYID = 0
1,505,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,557 UART: [idev] --
1,515,568 UART: [ldev] ++
1,515,736 UART: [ldev] CDI.KEYID = 6
1,516,099 UART: [ldev] SUBJECT.KEYID = 5
1,516,525 UART: [ldev] AUTHORITY.KEYID = 7
1,516,988 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,548,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,569 UART: [ldev] --
1,587,984 UART: [fwproc] Waiting for Commands...
1,588,783 UART: [fwproc] Received command 0x46574c44
1,589,574 UART: [fwproc] Received Image of size 114168 bytes
2,885,502 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,318 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,670 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,329 >>> mbox cmd response: success
3,078,367 UART: [afmc] ++
3,078,535 UART: [afmc] CDI.KEYID = 6
3,078,897 UART: [afmc] SUBJECT.KEYID = 7
3,079,322 UART: [afmc] AUTHORITY.KEYID = 5
3,113,731 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,270 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,960 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,757 UART: [afmc] --
3,156,731 UART: [cold-reset] --
3,157,547 UART: [state] Locking Datavault
3,158,700 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,304 UART: [state] Locking ICCM
3,159,892 UART: [exit] Launching FMC @ 0x40000130
3,165,221 UART:
3,165,237 UART: Running Caliptra FMC ...
3,165,645 UART:
3,165,788 UART: [state] CFI Enabled
3,176,581 UART: [fht] FMC Alias Private Key: 7
3,284,546 UART: [art] Extend RT PCRs Done
3,284,974 UART: [art] Lock RT PCRs Done
3,286,628 UART: [art] Populate DV Done
3,294,773 UART: [fht] FMC Alias Private Key: 7
3,295,925 UART: [art] Derive CDI
3,296,205 UART: [art] Store in in slot 0x4
3,382,032 UART: [art] Derive Key Pair
3,382,392 UART: [art] Store priv key in slot 0x5
3,395,200 UART: [art] Derive Key Pair - Done
3,409,767 UART: [art] Signing Cert with AUTHO
3,410,247 UART: RITY.KEYID = 7
3,425,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,012 UART: [art] PUB.X = 4BCEB65DAA96F641E0E79B3499FEFEDD6129B5D9BE455CB84A390EFD46E33346F3DED6E87298A7355241E6298EFCEC82
3,432,797 UART: [art] PUB.Y = 2C8E2A10CCC725FAB8982FF7F61E83BB96F949E91D7980B384C4C686D1A2B457A20E47E6C60471FB4310945A0D38B2FF
3,439,746 UART: [art] SIG.R = DB9A2D9781F4BC71F7DB063D404A3E7E29730934B21A5A8E78F85BBED504911E2CFE8BD36C605E833EDAB561BB47C898
3,446,521 UART: [art] SIG.S = 1E448072717E2175F50BBD9DB76F703EAFFA9BF807D5F05F24F1CEDCAFFCECA9C2C3DCD9690EF2CD079054182CF21F32
3,470,492 UART: Caliptra RT
3,470,837 UART: [state] CFI Enabled
3,579,488 UART: [rt] RT listening for mailbox commands...
3,580,158 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,228 UART: [rt]cmd =0x41544d4e, len=14344
4,013,309 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,672 ready_for_fw is high
1,362,672 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,955 >>> mbox cmd response: success
2,988,797 UART:
2,988,813 UART: Running Caliptra FMC ...
2,989,221 UART:
2,989,364 UART: [state] CFI Enabled
2,999,599 UART: [fht] FMC Alias Private Key: 7
3,107,876 UART: [art] Extend RT PCRs Done
3,108,304 UART: [art] Lock RT PCRs Done
3,109,600 UART: [art] Populate DV Done
3,117,823 UART: [fht] FMC Alias Private Key: 7
3,118,955 UART: [art] Derive CDI
3,119,235 UART: [art] Store in in slot 0x4
3,205,014 UART: [art] Derive Key Pair
3,205,374 UART: [art] Store priv key in slot 0x5
3,218,812 UART: [art] Derive Key Pair - Done
3,233,408 UART: [art] Signing Cert with AUTHO
3,233,888 UART: RITY.KEYID = 7
3,248,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,541 UART: [art] PUB.X = 7A80A1130260E08AD864E06E978C6009EA9345C225B0906544809621AB1D9BB8767E9C4E1E5FF6DC93BBD88F2E9A16E4
3,256,307 UART: [art] PUB.Y = 726CD92F7C150270D0E75990C7C71D31D276EF17F538EE7D31818913B0B87B28563F7D4A92365E23F54D9F1CFC26827F
3,263,252 UART: [art] SIG.R = EC57693B1978EC123BE3E84677FF853EF9AC1CECE7B378C381CFFFDDAABDC48FC2A00EA97A134404C4E206A6B7BE2A57
3,270,039 UART: [art] SIG.S = 258B1953E7DD50594363478E3C7558759A1E5733BBAD70D688121004F8100F966BAC00DF2893A9E8D0162DD272DD04A0
3,293,565 UART: Caliptra RT
3,293,910 UART: [state] CFI Enabled
3,401,341 UART: [rt] RT listening for mailbox commands...
3,402,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,211 UART: [rt]cmd =0x41544d4e, len=14344
3,835,860 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
893,026 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,151 UART: [kat] ++
897,303 UART: [kat] sha1
901,645 UART: [kat] SHA2-256
903,585 UART: [kat] SHA2-384
906,382 UART: [kat] SHA2-512-ACC
908,283 UART: [kat] ECC-384
918,026 UART: [kat] HMAC-384Kdf
922,658 UART: [kat] LMS
1,170,986 UART: [kat] --
1,171,707 UART: [cold-reset] ++
1,172,171 UART: [fht] FHT @ 0x50003400
1,174,684 UART: [idev] ++
1,174,852 UART: [idev] CDI.KEYID = 6
1,175,212 UART: [idev] SUBJECT.KEYID = 7
1,175,636 UART: [idev] UDS.KEYID = 0
1,175,981 ready_for_fw is high
1,175,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,344 UART: [idev] Erasing UDS.KEYID = 0
1,200,749 UART: [idev] Sha1 KeyId Algorithm
1,209,351 UART: [idev] --
1,210,547 UART: [ldev] ++
1,210,715 UART: [ldev] CDI.KEYID = 6
1,211,078 UART: [ldev] SUBJECT.KEYID = 5
1,211,504 UART: [ldev] AUTHORITY.KEYID = 7
1,211,967 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,121 UART: [ldev] --
1,283,472 UART: [fwproc] Wait for Commands...
1,284,138 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,081 >>> mbox cmd response: success
2,774,125 UART: [afmc] ++
2,774,293 UART: [afmc] CDI.KEYID = 6
2,774,655 UART: [afmc] SUBJECT.KEYID = 7
2,775,080 UART: [afmc] AUTHORITY.KEYID = 5
2,810,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,168 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,781 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,500 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,244 UART: [afmc] --
2,853,160 UART: [cold-reset] --
2,854,070 UART: [state] Locking Datavault
2,855,295 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,899 UART: [state] Locking ICCM
2,856,357 UART: [exit] Launching FMC @ 0x40000130
2,861,686 UART:
2,861,702 UART: Running Caliptra FMC ...
2,862,110 UART:
2,862,164 UART: [state] CFI Enabled
2,872,601 UART: [fht] FMC Alias Private Key: 7
2,980,660 UART: [art] Extend RT PCRs Done
2,981,088 UART: [art] Lock RT PCRs Done
2,982,394 UART: [art] Populate DV Done
2,990,531 UART: [fht] FMC Alias Private Key: 7
2,991,591 UART: [art] Derive CDI
2,991,871 UART: [art] Store in in slot 0x4
3,077,714 UART: [art] Derive Key Pair
3,078,074 UART: [art] Store priv key in slot 0x5
3,091,062 UART: [art] Derive Key Pair - Done
3,105,600 UART: [art] Signing Cert with AUTHO
3,106,080 UART: RITY.KEYID = 7
3,121,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,085 UART: [art] PUB.X = F3A446101F1415DE2E0DEFDBC9348771151BD807F463EDAB92B28DAD453A2FDFA1E9ABBF7000EF59CADD3C84807C719B
3,128,849 UART: [art] PUB.Y = BC587D561370570F89CD7E6391F5ED2F5CBB3B4B84A1EF3E49F9CBBA3B87C5964633257FC236D0CE0B4269EDE38D6119
3,135,805 UART: [art] SIG.R = 20CA26F2814054160931566B641B0A68F41A0B351CCE47BE564E2D8CFC321A0DCE9CB7F9728B99DA20F9069FD07369CA
3,142,566 UART: [art] SIG.S = 1E9C7DCE01F5C28F3D00F9C91DB2E4E1C2D382DE863CBFEC34FE63D8445D0785412B109E1C1CD009B28690EDC5C1028B
3,167,045 UART: Caliptra RT
3,167,298 UART: [state] CFI Enabled
3,275,455 UART: [rt] RT listening for mailbox commands...
3,276,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,163 UART: [rt]cmd =0x41544d4e, len=14344
3,708,136 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,175 ready_for_fw is high
1,059,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,068 >>> mbox cmd response: success
2,685,814 UART:
2,685,830 UART: Running Caliptra FMC ...
2,686,238 UART:
2,686,292 UART: [state] CFI Enabled
2,696,703 UART: [fht] FMC Alias Private Key: 7
2,804,142 UART: [art] Extend RT PCRs Done
2,804,570 UART: [art] Lock RT PCRs Done
2,806,404 UART: [art] Populate DV Done
2,814,765 UART: [fht] FMC Alias Private Key: 7
2,815,849 UART: [art] Derive CDI
2,816,129 UART: [art] Store in in slot 0x4
2,901,750 UART: [art] Derive Key Pair
2,902,110 UART: [art] Store priv key in slot 0x5
2,915,190 UART: [art] Derive Key Pair - Done
2,929,677 UART: [art] Signing Cert with AUTHO
2,930,157 UART: RITY.KEYID = 7
2,945,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,914 UART: [art] PUB.X = 9E6E8DF48503F6ADC1E4F2483460D094BF9EA37B4F27FE207FA0C02A48D985F9B0B3CE43E73DB20312C1D1D43E78F9E3
2,952,692 UART: [art] PUB.Y = DD3EB5F20E4AFED6971BC446DF7019DAF86805A8D8B28D7212AE455E219E002DA52EE9084D039770864A41A7DB970F87
2,959,613 UART: [art] SIG.R = 763196EAF9474667FC80D33FD237181A357B15B48115A131DEFB85CF67040335DF5559190A63F50B8F75BD8039B4C3EC
2,966,369 UART: [art] SIG.S = 9F9C943C6E8D035EE4D5773BA643B92F01B3BF6FD5D9FC27311D180B574BD736555E54D8CCD937E67B1F4CE14F45A241
2,990,541 UART: Caliptra RT
2,990,794 UART: [state] CFI Enabled
3,098,309 UART: [rt] RT listening for mailbox commands...
3,098,979 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,222,175 UART: [rt]cmd =0x41544d4e, len=14344
3,532,186 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,667 UART: [kat] SHA2-256
893,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,442 UART: [kat] ++
897,594 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,737 UART: [kat] SHA2-512-ACC
908,638 UART: [kat] ECC-384
918,297 UART: [kat] HMAC-384Kdf
922,741 UART: [kat] LMS
1,171,069 UART: [kat] --
1,172,072 UART: [cold-reset] ++
1,172,646 UART: [fht] FHT @ 0x50003400
1,175,339 UART: [idev] ++
1,175,507 UART: [idev] CDI.KEYID = 6
1,175,867 UART: [idev] SUBJECT.KEYID = 7
1,176,291 UART: [idev] UDS.KEYID = 0
1,176,636 ready_for_fw is high
1,176,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,737 UART: [idev] Erasing UDS.KEYID = 0
1,200,652 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,209,956 UART: [ldev] ++
1,210,124 UART: [ldev] CDI.KEYID = 6
1,210,487 UART: [ldev] SUBJECT.KEYID = 5
1,210,913 UART: [ldev] AUTHORITY.KEYID = 7
1,211,376 UART: [ldev] FE.KEYID = 1
1,216,716 UART: [ldev] Erasing FE.KEYID = 1
1,243,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,698 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,994 UART: [ldev] --
1,282,437 UART: [fwproc] Wait for Commands...
1,283,131 UART: [fwproc] Recv command 0x46574c44
1,283,859 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,301 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,186 >>> mbox cmd response: success
2,774,350 UART: [afmc] ++
2,774,518 UART: [afmc] CDI.KEYID = 6
2,774,880 UART: [afmc] SUBJECT.KEYID = 7
2,775,305 UART: [afmc] AUTHORITY.KEYID = 5
2,811,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,771 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,499 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,384 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,103 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,053 UART: [afmc] --
2,855,017 UART: [cold-reset] --
2,855,761 UART: [state] Locking Datavault
2,857,062 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,666 UART: [state] Locking ICCM
2,858,234 UART: [exit] Launching FMC @ 0x40000130
2,863,563 UART:
2,863,579 UART: Running Caliptra FMC ...
2,863,987 UART:
2,864,130 UART: [state] CFI Enabled
2,874,765 UART: [fht] FMC Alias Private Key: 7
2,982,724 UART: [art] Extend RT PCRs Done
2,983,152 UART: [art] Lock RT PCRs Done
2,984,680 UART: [art] Populate DV Done
2,992,833 UART: [fht] FMC Alias Private Key: 7
2,993,953 UART: [art] Derive CDI
2,994,233 UART: [art] Store in in slot 0x4
3,080,102 UART: [art] Derive Key Pair
3,080,462 UART: [art] Store priv key in slot 0x5
3,093,788 UART: [art] Derive Key Pair - Done
3,108,549 UART: [art] Signing Cert with AUTHO
3,109,029 UART: RITY.KEYID = 7
3,124,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,962 UART: [art] PUB.X = 73E042704E6EEC80E26D01683397F3A5AF34A681FED6FEDA1129271DDF3D1C818F4D0DAD080F0E0660CF7FB696A1F0B6
3,131,728 UART: [art] PUB.Y = E6678238B0CF22E13D224B8D2CB3CD9B335E74A9792B3C415C8FA20FB425C8FCEC468D3DD71C68D7370D227D3BA575F7
3,138,684 UART: [art] SIG.R = 704C745D8143FF050058725579399B013AE4FA26536CC050984D261ACDF181431B3E9A3F95118C9CE0354BDAA6E60270
3,145,417 UART: [art] SIG.S = D29CFD170556AA8B3A89C4045807B551A424D99FB903B5A644F08ED9E7024096BA70EBFD1A4F51D4FF498F03D2114CEA
3,169,226 UART: Caliptra RT
3,169,571 UART: [state] CFI Enabled
3,277,270 UART: [rt] RT listening for mailbox commands...
3,277,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,228 UART: [rt]cmd =0x41544d4e, len=14344
3,710,593 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,004 ready_for_fw is high
1,061,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,223 >>> mbox cmd response: success
2,690,783 UART:
2,690,799 UART: Running Caliptra FMC ...
2,691,207 UART:
2,691,350 UART: [state] CFI Enabled
2,702,033 UART: [fht] FMC Alias Private Key: 7
2,810,004 UART: [art] Extend RT PCRs Done
2,810,432 UART: [art] Lock RT PCRs Done
2,811,716 UART: [art] Populate DV Done
2,820,021 UART: [fht] FMC Alias Private Key: 7
2,821,065 UART: [art] Derive CDI
2,821,345 UART: [art] Store in in slot 0x4
2,906,560 UART: [art] Derive Key Pair
2,906,920 UART: [art] Store priv key in slot 0x5
2,920,040 UART: [art] Derive Key Pair - Done
2,934,747 UART: [art] Signing Cert with AUTHO
2,935,227 UART: RITY.KEYID = 7
2,950,477 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,242 UART: [art] PUB.X = C619C155EFD77A8737948552ED5F7C7360E28DC49A67F1C217DA22E7414A5F412FE5412921EDB50351A8D28A13678330
2,958,005 UART: [art] PUB.Y = E4BD3CC94B3DF13FB9DAF44CC9A6DE2C6DF044731DE55ACC5C9F5B0579B747D37B13F9F3834A0BE5CE45F18B188043C1
2,964,971 UART: [art] SIG.R = 282FFF989BE3A931FAA3458049F16F3AFD22F95CFAB04FBA32CE40A47103A6FD49B26FB946A63B828625DD14EC81767B
2,971,752 UART: [art] SIG.S = A8EF9E01B321FB673CF5539727BC6708EAF97D6584C9F8EF591F1E2243BFD0851225F4F6B5C6CD57EE2FC4BFB977D9FC
2,995,885 UART: Caliptra RT
2,996,230 UART: [state] CFI Enabled
3,104,867 UART: [rt] RT listening for mailbox commands...
3,105,537 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,521 UART: [rt]cmd =0x41544d4e, len=14344
3,538,306 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,302 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,172,991 UART: [idev] ++
1,173,159 UART: [idev] CDI.KEYID = 6
1,173,520 UART: [idev] SUBJECT.KEYID = 7
1,173,945 UART: [idev] UDS.KEYID = 0
1,174,291 ready_for_fw is high
1,174,291 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,965 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,215,178 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,521 UART: [fwproc] Recv command 0x46574c44
1,282,254 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,408 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,717 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,251 >>> mbox cmd response: success
2,772,466 UART: [afmc] ++
2,772,634 UART: [afmc] CDI.KEYID = 6
2,772,997 UART: [afmc] SUBJECT.KEYID = 7
2,773,423 UART: [afmc] AUTHORITY.KEYID = 5
2,808,900 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,535 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,264 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,147 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,866 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,743 UART: [afmc] --
2,852,631 UART: [cold-reset] --
2,853,597 UART: [state] Locking Datavault
2,854,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,370 UART: [state] Locking ICCM
2,856,012 UART: [exit] Launching FMC @ 0x40000130
2,861,341 UART:
2,861,357 UART: Running Caliptra FMC ...
2,861,765 UART:
2,861,819 UART: [state] CFI Enabled
2,872,468 UART: [fht] FMC Alias Private Key: 7
2,980,985 UART: [art] Extend RT PCRs Done
2,981,413 UART: [art] Lock RT PCRs Done
2,982,999 UART: [art] Populate DV Done
2,991,136 UART: [fht] FMC Alias Private Key: 7
2,992,164 UART: [art] Derive CDI
2,992,444 UART: [art] Store in in slot 0x4
3,077,785 UART: [art] Derive Key Pair
3,078,145 UART: [art] Store priv key in slot 0x5
3,090,891 UART: [art] Derive Key Pair - Done
3,105,486 UART: [art] Signing Cert with AUTHO
3,105,966 UART: RITY.KEYID = 7
3,121,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,165 UART: [art] PUB.X = 4BF18E736908881F9F9F0B38AD873C9FA801ADCF8A04204CB4A50776C62C2694D919F6FE35DD43BFDF451CC516292801
3,128,923 UART: [art] PUB.Y = 04EC3F09B8AFD33E68716040A650A5174412A0FBDF7B9FCA05F1423C4687C341D456987EC44C2AE82F07073E583775A9
3,135,858 UART: [art] SIG.R = B0634DC654B280DAFC5B3698AF063D1A050D12CE844311AD4C548E0D83E26467E8FA4E894A1BBFA7E07698930628A063
3,142,617 UART: [art] SIG.S = C21299324F95B87CACAEB7313EA7E38E16F809602F8E615D67D627BECA9DBF8F4BCB9198A3840852D4DC145B7DE2C70C
3,166,293 UART: Caliptra RT
3,166,546 UART: [state] CFI Enabled
3,273,864 UART: [rt] RT listening for mailbox commands...
3,274,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,444 UART: [rt]cmd =0x41544d4e, len=14344
3,707,585 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,828 ready_for_fw is high
1,055,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,599 >>> mbox cmd response: success
2,680,737 UART:
2,680,753 UART: Running Caliptra FMC ...
2,681,161 UART:
2,681,215 UART: [state] CFI Enabled
2,691,850 UART: [fht] FMC Alias Private Key: 7
2,799,965 UART: [art] Extend RT PCRs Done
2,800,393 UART: [art] Lock RT PCRs Done
2,801,921 UART: [art] Populate DV Done
2,810,240 UART: [fht] FMC Alias Private Key: 7
2,811,214 UART: [art] Derive CDI
2,811,494 UART: [art] Store in in slot 0x4
2,896,749 UART: [art] Derive Key Pair
2,897,109 UART: [art] Store priv key in slot 0x5
2,910,721 UART: [art] Derive Key Pair - Done
2,925,665 UART: [art] Signing Cert with AUTHO
2,926,145 UART: RITY.KEYID = 7
2,941,263 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,028 UART: [art] PUB.X = F2BFCF3EF5A50CC327145599B79666CBA61007FEC04D582002AF9E200F06072C435251CBDC65B0EA4814CAEB0B99EC5C
2,948,791 UART: [art] PUB.Y = 6E3ADFDF72941B67F1C0D979019CC9DC8F6F4AC7CF3754D791F37F693FACEB15A090D8744D56CDEB1517DED3763D1E8D
2,955,758 UART: [art] SIG.R = 240FD579F5C9551F6FDC6515AA5D13FD6C715B2E1FABC90F51C4675D76DDF84DFFFBDE75B70703F88C47B52971F66B39
2,962,532 UART: [art] SIG.S = 0F130C1C490018F285DCDB1FF705E91D9E9D1B8E573CD20C6F43DCEFD3FE9A4982ECB22316C4BAAB4EDD987F14193F48
2,986,315 UART: Caliptra RT
2,986,568 UART: [state] CFI Enabled
3,094,549 UART: [rt] RT listening for mailbox commands...
3,095,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,218,371 UART: [rt]cmd =0x41544d4e, len=14344
3,528,180 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
900,134 UART: [kat] SHA2-256
902,074 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,277 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,170,336 UART: [cold-reset] ++
1,170,810 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,174,712 ready_for_fw is high
1,174,712 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,016 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,126 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,161 UART: [fwproc] Wait for Commands...
1,282,890 UART: [fwproc] Recv command 0x46574c44
1,283,623 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,814 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,438 >>> mbox cmd response: success
2,773,579 UART: [afmc] ++
2,773,747 UART: [afmc] CDI.KEYID = 6
2,774,110 UART: [afmc] SUBJECT.KEYID = 7
2,774,536 UART: [afmc] AUTHORITY.KEYID = 5
2,809,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,036 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,765 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,648 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,367 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,042 UART: [afmc] --
2,852,982 UART: [cold-reset] --
2,853,730 UART: [state] Locking Datavault
2,854,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,579 UART: [state] Locking ICCM
2,856,073 UART: [exit] Launching FMC @ 0x40000130
2,861,402 UART:
2,861,418 UART: Running Caliptra FMC ...
2,861,826 UART:
2,861,969 UART: [state] CFI Enabled
2,872,474 UART: [fht] FMC Alias Private Key: 7
2,979,343 UART: [art] Extend RT PCRs Done
2,979,771 UART: [art] Lock RT PCRs Done
2,981,327 UART: [art] Populate DV Done
2,989,510 UART: [fht] FMC Alias Private Key: 7
2,990,552 UART: [art] Derive CDI
2,990,832 UART: [art] Store in in slot 0x4
3,076,113 UART: [art] Derive Key Pair
3,076,473 UART: [art] Store priv key in slot 0x5
3,089,887 UART: [art] Derive Key Pair - Done
3,104,592 UART: [art] Signing Cert with AUTHO
3,105,072 UART: RITY.KEYID = 7
3,120,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,579 UART: [art] PUB.X = E7A8A53F7C932CD90D14F41C4F252CB7F1B7AFC622460769ED2651D23394A2B2EFCE625A99644AF0D27111913F17C9EC
3,128,351 UART: [art] PUB.Y = 878169B724B030A553B4E5F00CAC66CF067285B004AA6B419E55434A93A61A31476E95B172F0D9B705E67612C9460C46
3,135,278 UART: [art] SIG.R = 75E6C16BEB16F93AFA6EFC660A4B1A7C587DAC69FD4235831232EBBABEF6850F7EF86DA35442AB88BA4E167374EE159E
3,142,062 UART: [art] SIG.S = 3FD9D86564079184015DFBC70328B523EE3FC51197B87481EB85BE2C70F031DA618A2A17CCC3817BAE061BF1D488AFA2
3,165,599 UART: Caliptra RT
3,165,944 UART: [state] CFI Enabled
3,273,727 UART: [rt] RT listening for mailbox commands...
3,274,397 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,461 UART: [rt]cmd =0x41544d4e, len=14344
3,707,998 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,779 ready_for_fw is high
1,056,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,896 >>> mbox cmd response: success
2,684,874 UART:
2,684,890 UART: Running Caliptra FMC ...
2,685,298 UART:
2,685,441 UART: [state] CFI Enabled
2,695,956 UART: [fht] FMC Alias Private Key: 7
2,803,481 UART: [art] Extend RT PCRs Done
2,803,909 UART: [art] Lock RT PCRs Done
2,805,297 UART: [art] Populate DV Done
2,813,420 UART: [fht] FMC Alias Private Key: 7
2,814,360 UART: [art] Derive CDI
2,814,640 UART: [art] Store in in slot 0x4
2,899,887 UART: [art] Derive Key Pair
2,900,247 UART: [art] Store priv key in slot 0x5
2,913,331 UART: [art] Derive Key Pair - Done
2,928,257 UART: [art] Signing Cert with AUTHO
2,928,737 UART: RITY.KEYID = 7
2,943,903 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,668 UART: [art] PUB.X = 6755156DD9B88DF2367B1F401FC8D1142DD9F1728E96946085CF62FDD29C13D51A7D959D548BA1E95B735244E48D0259
2,951,433 UART: [art] PUB.Y = 8524FC8471DA0AF5BEF4E49B4C358420ECA7C3CF6AB55799FCFFDD9D30D7D9F989F71EA1A4B7E974C3366A0664022E04
2,958,387 UART: [art] SIG.R = D8FB71180C1AA85754264DFE018B5EB5595CC7E619AD61FAD58DB6CBC5708C387C35D4F33081CAB7787F55005102E17F
2,965,134 UART: [art] SIG.S = E7A5D3A6AFF1C4092E3B0A34B95617BD09639DAE98CB9DE695033E8FDE0E19910E994F5D56A7E4792D4E476F17925A0B
2,989,248 UART: Caliptra RT
2,989,593 UART: [state] CFI Enabled
3,097,933 UART: [rt] RT listening for mailbox commands...
3,098,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,221,589 UART: [rt]cmd =0x41544d4e, len=14344
3,531,300 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,375 UART:
192,740 UART: Running Caliptra ROM ...
193,867 UART:
194,008 UART: [state] CFI Enabled
261,769 UART: [state] LifecycleState = Unprovisioned
263,756 UART: [state] DebugLocked = No
266,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,403 UART: [kat] SHA2-256
441,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,615 UART: [kat] ++
452,055 UART: [kat] sha1
464,414 UART: [kat] SHA2-256
467,123 UART: [kat] SHA2-384
473,525 UART: [kat] SHA2-512-ACC
475,881 UART: [kat] ECC-384
2,769,096 UART: [kat] HMAC-384Kdf
2,798,969 UART: [kat] LMS
3,989,263 UART: [kat] --
3,994,618 UART: [cold-reset] ++
3,997,324 UART: [fht] Storing FHT @ 0x50003400
4,008,920 UART: [idev] ++
4,009,561 UART: [idev] CDI.KEYID = 6
4,010,472 UART: [idev] SUBJECT.KEYID = 7
4,011,711 UART: [idev] UDS.KEYID = 0
4,012,697 ready_for_fw is high
4,012,885 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,912 UART: [idev] Erasing UDS.KEYID = 0
7,347,331 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,870 UART: [idev] --
7,370,652 UART: [ldev] ++
7,371,221 UART: [ldev] CDI.KEYID = 6
7,372,206 UART: [ldev] SUBJECT.KEYID = 5
7,373,409 UART: [ldev] AUTHORITY.KEYID = 7
7,374,631 UART: [ldev] FE.KEYID = 1
7,421,190 UART: [ldev] Erasing FE.KEYID = 1
10,756,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,691 UART: [ldev] --
13,133,417 UART: [fwproc] Waiting for Commands...
13,135,407 UART: [fwproc] Received command 0x46574c44
13,137,583 UART: [fwproc] Received Image of size 113844 bytes
17,194,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,112 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,652,674 >>> mbox cmd response: success
17,656,437 UART: [afmc] ++
17,657,029 UART: [afmc] CDI.KEYID = 6
17,657,945 UART: [afmc] SUBJECT.KEYID = 7
17,659,212 UART: [afmc] AUTHORITY.KEYID = 5
21,022,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,752 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,329,013 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,409 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,268 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,733 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,395,366 UART: [afmc] --
23,398,629 UART: [cold-reset] --
23,401,619 UART: [state] Locking Datavault
23,405,834 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,530 UART: [state] Locking ICCM
23,409,418 UART: [exit] Launching FMC @ 0x40000130
23,417,823 UART:
23,418,053 UART: Running Caliptra FMC ...
23,419,151 UART:
23,419,306 UART: [state] CFI Enabled
23,484,977 UART: [fht] FMC Alias Private Key: 7
25,823,058 UART: [art] Extend RT PCRs Done
25,824,283 UART: [art] Lock RT PCRs Done
25,825,881 UART: [art] Populate DV Done
25,831,451 UART: [fht] FMC Alias Private Key: 7
25,832,929 UART: [art] Derive CDI
25,833,685 UART: [art] Store in in slot 0x4
25,893,804 UART: [art] Derive Key Pair
25,894,838 UART: [art] Store priv key in slot 0x5
29,187,483 UART: [art] Derive Key Pair - Done
29,200,531 UART: [art] Signing Cert with AUTHO
29,201,885 UART: RITY.KEYID = 7
31,488,599 UART: [art] Erasing AUTHORITY.KEYID = 7
31,490,106 UART: [art] PUB.X = 1615661CAD2A070EB0E0497B7B3D33553CB3C504C58733C7088C298C6CB9417A57C6E7AC18FADFC30B4291EED655EE27
31,497,410 UART: [art] PUB.Y = 11057A5C7BED62872F6456ECAC9B2EE721F957B6FCC86BC4373A1A3733D75D9C00E6C341F5B11D686A137F18DF930B36
31,504,613 UART: [art] SIG.R = 23253CC9B532A0386A02C00DDDA51721BBB81E22DB2C57CE804DEBB839D692049153CB3A213AAEA4EC9FCF1A520DFBB0
31,512,028 UART: [art] SIG.S = 7C409641A77B84F06D975CF8F9BE75A597A6975F7963F2183F16867360C3845226961BCFCE43A45A4DFC4A966EAEAF80
32,816,671 UART: Caliptra RT
32,817,383 UART: [state] CFI Enabled
32,978,931 UART: [rt] RT listening for mailbox commands...
32,981,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,012,718 UART: [rt]cmd =0x44504543, len=96
38,795,038 >>> mbox cmd response data (6236 bytes)
38,824,332 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,855,130 UART: [rt]cmd =0x53574545, len=84
44,439,212 >>> mbox cmd response data (200 bytes)
44,827,978 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,857,886 UART: [rt]cmd =0x4453424c, len=4
48,167,536 >>> mbox cmd response data (8 bytes)
48,168,118 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,198,597 UART: [rt]cmd =0x53574545, len=84
53,781,444 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,785,363 ready_for_fw is high
3,786,000 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,847,086 >>> mbox cmd response: success
23,549,286 UART:
23,549,674 UART: Running Caliptra FMC ...
23,550,803 UART:
23,550,957 UART: [state] CFI Enabled
23,620,039 UART: [fht] FMC Alias Private Key: 7
25,958,420 UART: [art] Extend RT PCRs Done
25,959,646 UART: [art] Lock RT PCRs Done
25,961,271 UART: [art] Populate DV Done
25,966,572 UART: [fht] FMC Alias Private Key: 7
25,968,274 UART: [art] Derive CDI
25,969,084 UART: [art] Store in in slot 0x4
26,028,856 UART: [art] Derive Key Pair
26,029,894 UART: [art] Store priv key in slot 0x5
29,322,911 UART: [art] Derive Key Pair - Done
29,335,907 UART: [art] Signing Cert with AUTHO
29,337,209 UART: RITY.KEYID = 7
31,625,126 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,631 UART: [art] PUB.X = 775AC31F0384443DCE6E33AB6C19EB62A59AFA4A60A0C8BF6A243C274330B5A41FFDC6A67236B272D5C4947297CAB2FF
31,633,894 UART: [art] PUB.Y = B16322BFBFFD4E1676FBC17266AC887AF70BB3B59B2EE8A73B14D794FEEBCC605BAB018A27C0A25846CDF04B4D7F9A24
31,641,156 UART: [art] SIG.R = F3FEBFD8D751658A95A1815788B5C4795EDBB843869CDAE2BFD6F9B70038D4D19939FC901F10DCD1BA012691FEBFB8E6
31,648,557 UART: [art] SIG.S = 8DA5D2465AD2AB0B6C7862D9A8493087654912D97460DBDBA836F5E58C488C13C346F337BCD044093C681AEE9600EB58
32,953,892 UART: Caliptra RT
32,954,606 UART: [state] CFI Enabled
33,118,115 UART: [rt] RT listening for mailbox commands...
33,120,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,151,850 UART: [rt]cmd =0x44504543, len=96
38,934,042 >>> mbox cmd response data (6236 bytes)
38,963,269 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,994,045 UART: [rt]cmd =0x53574545, len=84
44,578,424 >>> mbox cmd response data (200 bytes)
44,965,534 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,995,589 UART: [rt]cmd =0x4453424c, len=4
48,305,538 >>> mbox cmd response data (8 bytes)
48,306,077 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,336,573 UART: [rt]cmd =0x53574545, len=84
53,919,588 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
193,435 UART:
193,786 UART: Running Caliptra ROM ...
194,887 UART:
604,860 UART: [state] CFI Enabled
618,950 UART: [state] LifecycleState = Unprovisioned
620,893 UART: [state] DebugLocked = No
622,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,496 UART: [kat] SHA2-256
796,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,810 UART: [kat] ++
807,345 UART: [kat] sha1
818,013 UART: [kat] SHA2-256
820,751 UART: [kat] SHA2-384
826,740 UART: [kat] SHA2-512-ACC
829,132 UART: [kat] ECC-384
3,114,693 UART: [kat] HMAC-384Kdf
3,125,736 UART: [kat] LMS
4,315,904 UART: [kat] --
4,320,208 UART: [cold-reset] ++
4,321,729 UART: [fht] Storing FHT @ 0x50003400
4,332,348 UART: [idev] ++
4,332,929 UART: [idev] CDI.KEYID = 6
4,333,858 UART: [idev] SUBJECT.KEYID = 7
4,335,107 UART: [idev] UDS.KEYID = 0
4,336,157 ready_for_fw is high
4,336,363 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,201 UART: [idev] Erasing UDS.KEYID = 0
7,621,134 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,072 UART: [idev] --
7,647,900 UART: [ldev] ++
7,648,485 UART: [ldev] CDI.KEYID = 6
7,649,523 UART: [ldev] SUBJECT.KEYID = 5
7,650,687 UART: [ldev] AUTHORITY.KEYID = 7
7,651,921 UART: [ldev] FE.KEYID = 1
7,663,055 UART: [ldev] Erasing FE.KEYID = 1
10,953,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,379 UART: [ldev] --
13,313,479 UART: [fwproc] Waiting for Commands...
13,316,216 UART: [fwproc] Received command 0x46574c44
13,318,404 UART: [fwproc] Received Image of size 113844 bytes
17,370,798 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,829,973 >>> mbox cmd response: success
17,834,740 UART: [afmc] ++
17,835,346 UART: [afmc] CDI.KEYID = 6
17,836,259 UART: [afmc] SUBJECT.KEYID = 7
17,837,472 UART: [afmc] AUTHORITY.KEYID = 5
21,150,723 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,237 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,554 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,887 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,761 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,491,183 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,513,482 UART: [afmc] --
23,516,650 UART: [cold-reset] --
23,520,729 UART: [state] Locking Datavault
23,526,900 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,655 UART: [state] Locking ICCM
23,530,544 UART: [exit] Launching FMC @ 0x40000130
23,538,899 UART:
23,539,134 UART: Running Caliptra FMC ...
23,540,238 UART:
23,540,402 UART: [state] CFI Enabled
23,548,502 UART: [fht] FMC Alias Private Key: 7
25,879,043 UART: [art] Extend RT PCRs Done
25,880,270 UART: [art] Lock RT PCRs Done
25,881,625 UART: [art] Populate DV Done
25,887,196 UART: [fht] FMC Alias Private Key: 7
25,888,893 UART: [art] Derive CDI
25,889,704 UART: [art] Store in in slot 0x4
25,932,298 UART: [art] Derive Key Pair
25,933,337 UART: [art] Store priv key in slot 0x5
29,174,910 UART: [art] Derive Key Pair - Done
29,187,867 UART: [art] Signing Cert with AUTHO
29,189,172 UART: RITY.KEYID = 7
31,468,673 UART: [art] Erasing AUTHORITY.KEYID = 7
31,470,182 UART: [art] PUB.X = 6ED9F881125049DCBD66D9D3DA286507434B20444E1F42A6FDA21E77B6A03F0138223658E7D9C16D4F5CB5C5050EA41A
31,477,442 UART: [art] PUB.Y = 4369CBD47CD1694A5E8E1CF8BBD1F28AC8779493ADCF505359A0983FFEC81288801EFBFF5FBF302AC661B6DE570AFE89
31,484,683 UART: [art] SIG.R = 47A58144A89CBB94740EB6DC3E4ABFD75B7071881CAB877842B7959752B3726566F332E453937344444A6E22C5673CDF
31,492,025 UART: [art] SIG.S = 7A02249588CF681CF397978BE758AD4D98C37B273199A2B29C253F6F29CBE15161FD7D33C6FF7C840C707679AE6B3C41
32,797,413 UART: Caliptra RT
32,798,125 UART: [state] CFI Enabled
32,914,194 UART: [rt] RT listening for mailbox commands...
32,916,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,947,964 UART: [rt]cmd =0x44504543, len=96
38,621,335 >>> mbox cmd response data (6236 bytes)
38,650,794 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,681,212 UART: [rt]cmd =0x53574545, len=84
44,205,672 >>> mbox cmd response data (200 bytes)
44,589,852 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,619,937 UART: [rt]cmd =0x4453424c, len=4
47,865,823 >>> mbox cmd response data (8 bytes)
47,866,367 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
47,896,844 UART: [rt]cmd =0x53574545, len=84
53,421,161 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,125,921 ready_for_fw is high
4,126,303 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,072,917 >>> mbox cmd response: success
23,715,605 UART:
23,716,031 UART: Running Caliptra FMC ...
23,717,156 UART:
23,717,311 UART: [state] CFI Enabled
23,725,380 UART: [fht] FMC Alias Private Key: 7
26,055,959 UART: [art] Extend RT PCRs Done
26,057,182 UART: [art] Lock RT PCRs Done
26,058,836 UART: [art] Populate DV Done
26,064,276 UART: [fht] FMC Alias Private Key: 7
26,065,869 UART: [art] Derive CDI
26,066,616 UART: [art] Store in in slot 0x4
26,109,052 UART: [art] Derive Key Pair
26,110,057 UART: [art] Store priv key in slot 0x5
29,352,262 UART: [art] Derive Key Pair - Done
29,365,494 UART: [art] Signing Cert with AUTHO
29,366,806 UART: RITY.KEYID = 7
31,645,864 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,371 UART: [art] PUB.X = 3C2EC3BF9566296595A9E4216488A90BE7EE950030A78B07900270D29FAB38D0D83034E48CDC8306FDB3757599494EA5
31,654,627 UART: [art] PUB.Y = DB66CDBFB2BD5CD8AC746C99AF27CF2884E939FEF889F2FA674A08B95315A9C4CCEB1F0D3A915A171B94185520822AA3
31,661,964 UART: [art] SIG.R = 852069F77B3F9A7461FD810B204D16DB46C2BC370774506F7F31417E279F9C586724F8C10428E30004676A7056070A4D
31,669,226 UART: [art] SIG.S = 3C617C02A74C4817A77999FB1E120738FC4B87E1EDB974AEA6A19F08A8EFDF186F4EAA448C4B4323D95E28A59FDF881C
32,974,582 UART: Caliptra RT
32,975,291 UART: [state] CFI Enabled
33,093,644 UART: [rt] RT listening for mailbox commands...
33,096,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,127,343 UART: [rt]cmd =0x44504543, len=96
38,800,980 >>> mbox cmd response data (6236 bytes)
38,830,046 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,860,437 UART: [rt]cmd =0x53574545, len=84
44,384,889 >>> mbox cmd response data (200 bytes)
44,768,400 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,798,243 UART: [rt]cmd =0x4453424c, len=4
48,043,792 >>> mbox cmd response data (8 bytes)
48,044,323 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,074,923 UART: [rt]cmd =0x53574545, len=84
53,599,431 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,013 UART:
192,381 UART: Running Caliptra ROM ...
193,601 UART:
193,759 UART: [state] CFI Enabled
263,893 UART: [state] LifecycleState = Unprovisioned
265,767 UART: [state] DebugLocked = No
267,363 UART: [state] WD Timer not started. Device not locked for debugging
271,188 UART: [kat] SHA2-256
450,325 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,929 UART: [kat] ++
462,476 UART: [kat] sha1
472,858 UART: [kat] SHA2-256
475,860 UART: [kat] SHA2-384
482,695 UART: [kat] SHA2-512-ACC
485,639 UART: [kat] ECC-384
2,947,763 UART: [kat] HMAC-384Kdf
2,972,800 UART: [kat] LMS
3,502,281 UART: [kat] --
3,508,634 UART: [cold-reset] ++
3,509,995 UART: [fht] FHT @ 0x50003400
3,522,249 UART: [idev] ++
3,522,811 UART: [idev] CDI.KEYID = 6
3,523,719 UART: [idev] SUBJECT.KEYID = 7
3,524,893 UART: [idev] UDS.KEYID = 0
3,525,819 ready_for_fw is high
3,526,022 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,657 UART: [idev] Erasing UDS.KEYID = 0
6,029,080 UART: [idev] Sha1 KeyId Algorithm
6,053,007 UART: [idev] --
6,056,013 UART: [ldev] ++
6,056,594 UART: [ldev] CDI.KEYID = 6
6,057,483 UART: [ldev] SUBJECT.KEYID = 5
6,058,641 UART: [ldev] AUTHORITY.KEYID = 7
6,059,983 UART: [ldev] FE.KEYID = 1
6,100,896 UART: [ldev] Erasing FE.KEYID = 1
8,604,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,785 UART: [ldev] --
10,414,858 UART: [fwproc] Wait for Commands...
10,416,952 UART: [fwproc] Recv command 0x46574c44
10,418,985 UART: [fwproc] Recv'd Img size: 114168 bytes
13,824,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,282,360 >>> mbox cmd response: success
14,287,132 UART: [afmc] ++
14,287,726 UART: [afmc] CDI.KEYID = 6
14,288,635 UART: [afmc] SUBJECT.KEYID = 7
14,289,800 UART: [afmc] AUTHORITY.KEYID = 5
16,825,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,165 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,947 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,883 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,645 UART: [afmc] --
18,629,738 UART: [cold-reset] --
18,633,170 UART: [state] Locking Datavault
18,637,448 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,153 UART: [state] Locking ICCM
18,640,175 UART: [exit] Launching FMC @ 0x40000130
18,648,577 UART:
18,648,822 UART: Running Caliptra FMC ...
18,649,944 UART:
18,650,104 UART: [state] CFI Enabled
18,711,928 UART: [fht] FMC Alias Private Key: 7
20,476,065 UART: [art] Extend RT PCRs Done
20,477,289 UART: [art] Lock RT PCRs Done
20,478,943 UART: [art] Populate DV Done
20,484,301 UART: [fht] FMC Alias Private Key: 7
20,486,000 UART: [art] Derive CDI
20,486,739 UART: [art] Store in in slot 0x4
20,544,259 UART: [art] Derive Key Pair
20,545,297 UART: [art] Store priv key in slot 0x5
23,008,288 UART: [art] Derive Key Pair - Done
23,021,508 UART: [art] Signing Cert with AUTHO
23,022,812 UART: RITY.KEYID = 7
24,733,801 UART: [art] Erasing AUTHORITY.KEYID = 7
24,735,300 UART: [art] PUB.X = C477081F9FB5169C882E1E7F362AF37F0FD5161D154452654F20AE7EB70AFE574DB097919C124162D70D903AA67565D9
24,742,570 UART: [art] PUB.Y = CE6B9C25E5C6CC8E63D137780A027C226769033E34789DD1988B5DF9124FD3339A0A14BC60E710FA33B31DAFF5D3E98A
24,749,818 UART: [art] SIG.R = 64CE25D347547D1922854649D738E531D197BF59D02AF499D431AD749A671D36FC0D0B102F641F3D1C4D23697592F787
24,757,211 UART: [art] SIG.S = 863A0E7752C5F56BFCFC327039495B28301BB5427760E67CBBA0515487EDC30223245E0158D53ACED97CC9A0E03BD778
25,736,377 UART: Caliptra RT
25,737,085 UART: [state] CFI Enabled
25,901,298 UART: [rt] RT listening for mailbox commands...
25,903,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,934,606 UART: [rt]cmd =0x44504543, len=96
30,313,363 >>> mbox cmd response data (6236 bytes)
30,342,438 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,373,003 UART: [rt]cmd =0x53574545, len=84
34,551,447 >>> mbox cmd response data (200 bytes)
34,939,751 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,969,794 UART: [rt]cmd =0x4453424c, len=4
37,448,727 >>> mbox cmd response data (8 bytes)
37,449,255 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,479,875 UART: [rt]cmd =0x53574545, len=84
41,655,376 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,384,191 ready_for_fw is high
3,384,578 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,034,062 >>> mbox cmd response: success
18,322,503 UART:
18,322,929 UART: Running Caliptra FMC ...
18,324,066 UART:
18,324,240 UART: [state] CFI Enabled
18,383,824 UART: [fht] FMC Alias Private Key: 7
20,147,817 UART: [art] Extend RT PCRs Done
20,149,021 UART: [art] Lock RT PCRs Done
20,150,811 UART: [art] Populate DV Done
20,156,109 UART: [fht] FMC Alias Private Key: 7
20,157,645 UART: [art] Derive CDI
20,158,456 UART: [art] Store in in slot 0x4
20,216,578 UART: [art] Derive Key Pair
20,217,615 UART: [art] Store priv key in slot 0x5
22,680,567 UART: [art] Derive Key Pair - Done
22,693,304 UART: [art] Signing Cert with AUTHO
22,694,627 UART: RITY.KEYID = 7
24,406,779 UART: [art] Erasing AUTHORITY.KEYID = 7
24,408,264 UART: [art] PUB.X = 30A42BEDB7F9AC6BC8DA8684F7E57C9D3C14D44248BDA461C683F6500666409ACFF25DCCFF2BB7EF3161FEB98AA01A81
24,415,598 UART: [art] PUB.Y = 1D68732B3F9CD4E69C8DA7874F5CE741B7BD73E4BB14A1A034C177D158F352D1F3E072CAC334EBEF5F9975F8EA8830C7
24,422,885 UART: [art] SIG.R = 37A5A07C1E0125CBEB95D3C07E4038DD1E1342AA18AEDBC3DCFDA06AC8CA49D8C894D7D3DCD9A07C3A5647A49DC1E13A
24,430,323 UART: [art] SIG.S = 1C0546D6FDB7B12C68E660857D2D1C36DFA1CB48F257CE04C9FAC139575F4B6FE2E31AC2922A07194434CC4ADAFA8A2E
25,409,220 UART: Caliptra RT
25,409,933 UART: [state] CFI Enabled
25,574,187 UART: [rt] RT listening for mailbox commands...
25,576,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,607,907 UART: [rt]cmd =0x44504543, len=96
29,967,060 >>> mbox cmd response data (6236 bytes)
29,996,386 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,027,260 UART: [rt]cmd =0x53574545, len=84
34,205,273 >>> mbox cmd response data (200 bytes)
34,592,970 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,623,048 UART: [rt]cmd =0x4453424c, len=4
37,100,646 >>> mbox cmd response data (8 bytes)
37,101,182 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,131,543 UART: [rt]cmd =0x53574545, len=84
41,306,231 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,811 writing to cptra_bootfsm_go
193,092 UART:
193,461 UART: Running Caliptra ROM ...
194,591 UART:
604,260 UART: [state] CFI Enabled
618,557 UART: [state] LifecycleState = Unprovisioned
620,486 UART: [state] DebugLocked = No
623,429 UART: [state] WD Timer not started. Device not locked for debugging
626,820 UART: [kat] SHA2-256
805,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,581 UART: [kat] ++
818,119 UART: [kat] sha1
828,394 UART: [kat] SHA2-256
831,301 UART: [kat] SHA2-384
838,430 UART: [kat] SHA2-512-ACC
841,383 UART: [kat] ECC-384
3,283,005 UART: [kat] HMAC-384Kdf
3,296,447 UART: [kat] LMS
3,825,932 UART: [kat] --
3,829,928 UART: [cold-reset] ++
3,831,216 UART: [fht] FHT @ 0x50003400
3,841,625 UART: [idev] ++
3,842,199 UART: [idev] CDI.KEYID = 6
3,843,232 UART: [idev] SUBJECT.KEYID = 7
3,844,336 UART: [idev] UDS.KEYID = 0
3,845,262 ready_for_fw is high
3,845,458 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,843 UART: [idev] Erasing UDS.KEYID = 0
6,317,492 UART: [idev] Sha1 KeyId Algorithm
6,341,216 UART: [idev] --
6,344,608 UART: [ldev] ++
6,345,191 UART: [ldev] CDI.KEYID = 6
6,346,077 UART: [ldev] SUBJECT.KEYID = 5
6,347,235 UART: [ldev] AUTHORITY.KEYID = 7
6,348,669 UART: [ldev] FE.KEYID = 1
6,359,675 UART: [ldev] Erasing FE.KEYID = 1
8,830,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,717 UART: [ldev] --
10,619,630 UART: [fwproc] Wait for Commands...
10,621,826 UART: [fwproc] Recv command 0x46574c44
10,623,863 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,166,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,483,012 >>> mbox cmd response: success
14,486,470 UART: [afmc] ++
14,487,069 UART: [afmc] CDI.KEYID = 6
14,487,953 UART: [afmc] SUBJECT.KEYID = 7
14,489,163 UART: [afmc] AUTHORITY.KEYID = 5
16,991,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,318 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,047 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,011 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,783,508 UART: [afmc] --
18,787,529 UART: [cold-reset] --
18,791,277 UART: [state] Locking Datavault
18,794,153 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,816 UART: [state] Locking ICCM
18,797,564 UART: [exit] Launching FMC @ 0x40000130
18,806,010 UART:
18,806,249 UART: Running Caliptra FMC ...
18,807,348 UART:
18,807,510 UART: [state] CFI Enabled
18,815,502 UART: [fht] FMC Alias Private Key: 7
20,572,489 UART: [art] Extend RT PCRs Done
20,573,710 UART: [art] Lock RT PCRs Done
20,575,263 UART: [art] Populate DV Done
20,580,567 UART: [fht] FMC Alias Private Key: 7
20,582,211 UART: [art] Derive CDI
20,582,947 UART: [art] Store in in slot 0x4
20,625,805 UART: [art] Derive Key Pair
20,626,890 UART: [art] Store priv key in slot 0x5
23,053,444 UART: [art] Derive Key Pair - Done
23,066,352 UART: [art] Signing Cert with AUTHO
23,067,660 UART: RITY.KEYID = 7
24,773,333 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,834 UART: [art] PUB.X = 39E323D55B08E4BD1E943BFF51633DDBD03526C23A0F6E4C0409D33B59C1E6790ADA4E12B2092B88F33F8C7C1C5FED0D
24,782,089 UART: [art] PUB.Y = 46382BD521F09F7B05652F4EBF61EED24DFBCFF7B6011BF6D91A0745F31C798A8DE96E0DC55193C19F189A3AD97CA80C
24,789,380 UART: [art] SIG.R = 88BFCEFA30917AE198B141B0F67D1FEDAE05BE7DAE53D07F1E704E5C1E130BE77C762BA8CD7B663A2B2E328957795624
24,796,825 UART: [art] SIG.S = FD9F54F6D4D76AD9D4E16E8E6D01AD0D3CD015AFAE67FE3BA84A16CB121E85F75E1287E760983EA26462233D7B4E82C4
25,775,577 UART: Caliptra RT
25,776,280 UART: [state] CFI Enabled
25,892,669 UART: [rt] RT listening for mailbox commands...
25,895,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,926,046 UART: [rt]cmd =0x44504543, len=96
30,210,264 >>> mbox cmd response data (6236 bytes)
30,239,365 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,269,885 UART: [rt]cmd =0x53574545, len=84
34,405,017 >>> mbox cmd response data (200 bytes)
34,789,807 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,819,748 UART: [rt]cmd =0x4453424c, len=4
37,250,264 >>> mbox cmd response data (8 bytes)
37,250,810 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,281,123 UART: [rt]cmd =0x53574545, len=84
41,416,818 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,844 writing to cptra_bootfsm_go
3,697,973 ready_for_fw is high
3,698,486 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,271,553 >>> mbox cmd response: success
18,518,684 UART:
18,519,078 UART: Running Caliptra FMC ...
18,520,210 UART:
18,520,389 UART: [state] CFI Enabled
18,528,236 UART: [fht] FMC Alias Private Key: 7
20,284,794 UART: [art] Extend RT PCRs Done
20,286,019 UART: [art] Lock RT PCRs Done
20,287,865 UART: [art] Populate DV Done
20,293,338 UART: [fht] FMC Alias Private Key: 7
20,295,039 UART: [art] Derive CDI
20,295,863 UART: [art] Store in in slot 0x4
20,338,797 UART: [art] Derive Key Pair
20,339,837 UART: [art] Store priv key in slot 0x5
22,765,857 UART: [art] Derive Key Pair - Done
22,778,847 UART: [art] Signing Cert with AUTHO
22,780,176 UART: RITY.KEYID = 7
24,486,082 UART: [art] Erasing AUTHORITY.KEYID = 7
24,487,597 UART: [art] PUB.X = 9832C735B923C9FA01F009F9969D799BEA62F8957768694B5DE6385E6EFF58273CBAF3BC77A3719D837D6FC04333BD1E
24,494,840 UART: [art] PUB.Y = 9CA53A25E8B6DBA4BA994833DA81F0704507EF4ABD014E676AE07C56778AA09717D9AD731E65D629665B4019658101D9
24,502,128 UART: [art] SIG.R = 48048BCAD4BEEA6EF684513CFC7C3D5EF5624EA0CE7C65630CBE96A1B1569DEEE82D00FFB3B7F1902A83692BA763824E
24,509,530 UART: [art] SIG.S = 07F7E7964284359AE378676E0FE91AA3E685D567F6A3C44C9E38ADABD5923E0847324E0A6C893068DBCDB5EAC8CD1D8D
25,488,611 UART: Caliptra RT
25,489,314 UART: [state] CFI Enabled
25,605,618 UART: [rt] RT listening for mailbox commands...
25,608,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,639,173 UART: [rt]cmd =0x44504543, len=96
29,923,617 >>> mbox cmd response data (6236 bytes)
29,952,974 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,983,493 UART: [rt]cmd =0x53574545, len=84
34,119,492 >>> mbox cmd response data (200 bytes)
34,502,603 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,532,908 UART: [rt]cmd =0x4453424c, len=4
36,963,549 >>> mbox cmd response data (8 bytes)
36,964,074 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
36,994,666 UART: [rt]cmd =0x53574545, len=84
41,129,011 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,188 UART:
192,559 UART: Running Caliptra ROM ...
193,670 UART:
193,812 UART: [state] CFI Enabled
262,540 UART: [state] LifecycleState = Unprovisioned
264,966 UART: [state] DebugLocked = No
267,574 UART: [state] WD Timer not started. Device not locked for debugging
272,206 UART: [kat] SHA2-256
462,120 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,924 UART: [kat] ++
473,406 UART: [kat] sha1
484,775 UART: [kat] SHA2-256
487,735 UART: [kat] SHA2-384
493,660 UART: [kat] SHA2-512-ACC
496,246 UART: [kat] ECC-384
2,946,601 UART: [kat] HMAC-384Kdf
2,971,719 UART: [kat] LMS
3,503,472 UART: [kat] --
3,507,959 UART: [cold-reset] ++
3,509,887 UART: [fht] FHT @ 0x50003400
3,522,217 UART: [idev] ++
3,522,930 UART: [idev] CDI.KEYID = 6
3,523,885 UART: [idev] SUBJECT.KEYID = 7
3,525,058 UART: [idev] UDS.KEYID = 0
3,525,968 ready_for_fw is high
3,526,184 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,835 UART: [idev] Erasing UDS.KEYID = 0
6,029,273 UART: [idev] Sha1 KeyId Algorithm
6,051,827 UART: [idev] --
6,057,558 UART: [ldev] ++
6,058,285 UART: [ldev] CDI.KEYID = 6
6,059,214 UART: [ldev] SUBJECT.KEYID = 5
6,060,327 UART: [ldev] AUTHORITY.KEYID = 7
6,061,567 UART: [ldev] FE.KEYID = 1
6,099,763 UART: [ldev] Erasing FE.KEYID = 1
8,608,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,124 UART: [ldev] --
10,414,798 UART: [fwproc] Wait for Commands...
10,416,296 UART: [fwproc] Recv command 0x46574c44
10,418,610 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,324 >>> mbox cmd response: success
14,601,612 UART: [afmc] ++
14,602,326 UART: [afmc] CDI.KEYID = 6
14,603,523 UART: [afmc] SUBJECT.KEYID = 7
14,605,021 UART: [afmc] AUTHORITY.KEYID = 5
17,150,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,179 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,457 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,493 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,113 UART: [afmc] --
18,950,202 UART: [cold-reset] --
18,955,986 UART: [state] Locking Datavault
18,961,270 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,429 UART: [state] Locking ICCM
18,966,022 UART: [exit] Launching FMC @ 0x40000130
18,974,718 UART:
18,974,962 UART: Running Caliptra FMC ...
18,976,068 UART:
18,976,234 UART: [state] CFI Enabled
19,030,445 UART: [fht] FMC Alias Private Key: 7
20,794,530 UART: [art] Extend RT PCRs Done
20,795,749 UART: [art] Lock RT PCRs Done
20,797,678 UART: [art] Populate DV Done
20,803,364 UART: [fht] FMC Alias Private Key: 7
20,804,905 UART: [art] Derive CDI
20,805,646 UART: [art] Store in in slot 0x4
20,863,170 UART: [art] Derive Key Pair
20,864,229 UART: [art] Store priv key in slot 0x5
23,327,024 UART: [art] Derive Key Pair - Done
23,340,076 UART: [art] Signing Cert with AUTHO
23,341,418 UART: RITY.KEYID = 7
25,052,163 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,675 UART: [art] PUB.X = EF521CBA262E4B7AFE03EA4D940B65F02BA309DC3008C13F223187DCF1D721C846607AEF435912830F8DEEAF8E6EDD94
25,060,955 UART: [art] PUB.Y = B2CBDC1839427424953F199DA497109F1225105F6E242AA9F2570D8F1ABAE4D0135B8AF9A78443432132B17528368185
25,068,166 UART: [art] SIG.R = F5CB588931089B58B33A4622108A2C952F9455C05C1607AB6E97E65500E946135896C17EC970DBD4290B201334E252DB
25,075,536 UART: [art] SIG.S = 879F4F4D0EB32C840C87522295F639BD8608DF734249C7D6CE5AB77D1266D064C33839C0DDA16EE097FE4B6A1E267BB7
26,054,821 UART: Caliptra RT
26,055,651 UART: [state] CFI Enabled
26,219,473 UART: [rt] RT listening for mailbox commands...
26,221,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,027 UART: [rt]cmd =0x44504543, len=96
30,632,725 >>> mbox cmd response data (6236 bytes)
30,661,859 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,692,428 UART: [rt]cmd =0x53574545, len=84
34,871,172 >>> mbox cmd response data (200 bytes)
35,259,411 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,289,492 UART: [rt]cmd =0x4453424c, len=4
37,768,169 >>> mbox cmd response data (8 bytes)
37,768,715 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,799,186 UART: [rt]cmd =0x53574545, len=84
41,975,814 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
3,440,383 ready_for_fw is high
3,440,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,731,200 >>> mbox cmd response: success
19,048,958 UART:
19,049,374 UART: Running Caliptra FMC ...
19,050,512 UART:
19,050,681 UART: [state] CFI Enabled
19,114,950 UART: [fht] FMC Alias Private Key: 7
20,878,622 UART: [art] Extend RT PCRs Done
20,879,840 UART: [art] Lock RT PCRs Done
20,881,632 UART: [art] Populate DV Done
20,887,208 UART: [fht] FMC Alias Private Key: 7
20,888,922 UART: [art] Derive CDI
20,889,737 UART: [art] Store in in slot 0x4
20,947,383 UART: [art] Derive Key Pair
20,948,399 UART: [art] Store priv key in slot 0x5
23,411,333 UART: [art] Derive Key Pair - Done
23,424,382 UART: [art] Signing Cert with AUTHO
23,425,692 UART: RITY.KEYID = 7
25,136,459 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,968 UART: [art] PUB.X = 59471F3924DAB7A37A540B4048D5A682661BED2BE76824AFC0B417434B8232EE45C0EB22E7EA99B0A1FFED20A089E561
25,145,202 UART: [art] PUB.Y = FB29966AD7C74DFC88EEBE9288B639AFC89ED94A03112AFE8B9A0E5F101E46A42EC4BD0446A3370BD99EAE0E834D46E5
25,152,471 UART: [art] SIG.R = 2DD8A671033D1AB07B0A3FFE2D774B7605C95374DFC488BAB55BF1211019DAE737D147B63DE87CE3791BD7C29EC03E8A
25,159,912 UART: [art] SIG.S = AB592D11AFD2FDC1ABC66EDAB6D4EB50C5E1A9CD9AE57D5080294DEEDDACE6F1DF017BCB89410D55F684EBF539EEE09D
26,138,332 UART: Caliptra RT
26,139,025 UART: [state] CFI Enabled
26,305,762 UART: [rt] RT listening for mailbox commands...
26,308,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,557 UART: [rt]cmd =0x44504543, len=96
30,718,146 >>> mbox cmd response data (6236 bytes)
30,747,209 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,777,991 UART: [rt]cmd =0x53574545, len=84
34,956,462 >>> mbox cmd response data (200 bytes)
35,345,372 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,375,516 UART: [rt]cmd =0x4453424c, len=4
37,853,366 >>> mbox cmd response data (8 bytes)
37,853,878 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,884,509 UART: [rt]cmd =0x53574545, len=84
42,060,599 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,506 writing to cptra_bootfsm_go
194,695 UART:
195,053 UART: Running Caliptra ROM ...
196,158 UART:
605,977 UART: [state] CFI Enabled
622,632 UART: [state] LifecycleState = Unprovisioned
624,999 UART: [state] DebugLocked = No
626,445 UART: [state] WD Timer not started. Device not locked for debugging
631,614 UART: [kat] SHA2-256
821,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,273 UART: [kat] ++
832,811 UART: [kat] sha1
844,961 UART: [kat] SHA2-256
847,973 UART: [kat] SHA2-384
853,038 UART: [kat] SHA2-512-ACC
855,691 UART: [kat] ECC-384
3,298,197 UART: [kat] HMAC-384Kdf
3,312,267 UART: [kat] LMS
3,844,094 UART: [kat] --
3,849,085 UART: [cold-reset] ++
3,850,454 UART: [fht] FHT @ 0x50003400
3,861,641 UART: [idev] ++
3,862,346 UART: [idev] CDI.KEYID = 6
3,863,257 UART: [idev] SUBJECT.KEYID = 7
3,864,496 UART: [idev] UDS.KEYID = 0
3,865,419 ready_for_fw is high
3,865,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,009,115 UART: [idev] Erasing UDS.KEYID = 0
6,340,376 UART: [idev] Sha1 KeyId Algorithm
6,364,033 UART: [idev] --
6,368,952 UART: [ldev] ++
6,369,631 UART: [ldev] CDI.KEYID = 6
6,370,541 UART: [ldev] SUBJECT.KEYID = 5
6,371,754 UART: [ldev] AUTHORITY.KEYID = 7
6,372,930 UART: [ldev] FE.KEYID = 1
6,383,889 UART: [ldev] Erasing FE.KEYID = 1
8,863,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,627 UART: [ldev] --
10,656,571 UART: [fwproc] Wait for Commands...
10,659,170 UART: [fwproc] Recv command 0x46574c44
10,661,478 UART: [fwproc] Recv'd Img size: 114168 bytes
14,103,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,181,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,297,711 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,839,378 >>> mbox cmd response: success
14,843,280 UART: [afmc] ++
14,843,993 UART: [afmc] CDI.KEYID = 6
14,845,178 UART: [afmc] SUBJECT.KEYID = 7
14,846,664 UART: [afmc] AUTHORITY.KEYID = 5
17,354,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,035 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,094,220 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,109,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,124,390 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,868 UART: [afmc] --
19,149,927 UART: [cold-reset] --
19,153,468 UART: [state] Locking Datavault
19,158,608 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,753 UART: [state] Locking ICCM
19,163,016 UART: [exit] Launching FMC @ 0x40000130
19,171,696 UART:
19,171,933 UART: Running Caliptra FMC ...
19,173,033 UART:
19,173,197 UART: [state] CFI Enabled
19,181,456 UART: [fht] FMC Alias Private Key: 7
20,938,624 UART: [art] Extend RT PCRs Done
20,940,114 UART: [art] Lock RT PCRs Done
20,941,553 UART: [art] Populate DV Done
20,946,875 UART: [fht] FMC Alias Private Key: 7
20,948,417 UART: [art] Derive CDI
20,949,214 UART: [art] Store in in slot 0x4
20,991,961 UART: [art] Derive Key Pair
20,993,004 UART: [art] Store priv key in slot 0x5
23,420,132 UART: [art] Derive Key Pair - Done
23,433,245 UART: [art] Signing Cert with AUTHO
23,434,550 UART: RITY.KEYID = 7
25,140,112 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,611 UART: [art] PUB.X = B297143809ADE239F52676BACA35F2619A8766EF417EF38E663DF0E43718790185E4A8EECDF43A77988C7F3CE6FD5CE2
25,148,857 UART: [art] PUB.Y = BB7056C0A82B3E862D1F12EB3EB448F0F83AC929B81832C4020D7D0EE18E92FA558646FA837BD8C0278E27B7C8FBD431
25,156,156 UART: [art] SIG.R = 745038799EE8581D7383E1FF7DEEA82C01AE481C6C88EE81854AE03FAB64C95ECA71304B27E41620D79D98E68E269645
25,163,551 UART: [art] SIG.S = 5FE40EF38087E049AF41545A97B8BB885E81A62339C9D206CD27A81082093812F7AE83D8E0EDEE38D4285CB7FFC736EC
26,142,277 UART: Caliptra RT
26,142,986 UART: [state] CFI Enabled
26,260,423 UART: [rt] RT listening for mailbox commands...
26,262,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,893 UART: [rt]cmd =0x44504543, len=96
30,577,248 >>> mbox cmd response data (6236 bytes)
30,606,433 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,636,936 UART: [rt]cmd =0x53574545, len=84
34,772,325 >>> mbox cmd response data (200 bytes)
35,156,169 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,186,075 UART: [rt]cmd =0x4453424c, len=4
37,617,281 >>> mbox cmd response data (8 bytes)
37,617,799 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,648,052 UART: [rt]cmd =0x53574545, len=84
41,783,226 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,602 writing to cptra_bootfsm_go
3,754,784 ready_for_fw is high
3,755,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,949,414 >>> mbox cmd response: success
19,206,906 UART:
19,207,303 UART: Running Caliptra FMC ...
19,208,417 UART:
19,208,574 UART: [state] CFI Enabled
19,216,742 UART: [fht] FMC Alias Private Key: 7
20,973,373 UART: [art] Extend RT PCRs Done
20,974,598 UART: [art] Lock RT PCRs Done
20,976,363 UART: [art] Populate DV Done
20,981,626 UART: [fht] FMC Alias Private Key: 7
20,983,172 UART: [art] Derive CDI
20,983,904 UART: [art] Store in in slot 0x4
21,026,607 UART: [art] Derive Key Pair
21,027,612 UART: [art] Store priv key in slot 0x5
23,454,604 UART: [art] Derive Key Pair - Done
23,467,389 UART: [art] Signing Cert with AUTHO
23,468,699 UART: RITY.KEYID = 7
25,173,899 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,414 UART: [art] PUB.X = EA11CC8AF5134780BC07E9D4EC704E2CA1B12B29D68D4A743B5BE9E4A1377CCFC980B6694AC9F58CEA5D32F88163134F
25,182,730 UART: [art] PUB.Y = 865194D84BAEAB4C3230150B9946476D4347F4030B3DD070B2745B7DAB4F7A53D3A860733CBAEC9D3DEDC4FD76AD3FD4
25,189,964 UART: [art] SIG.R = 88F5F42614B6438E22E1D2CF24B1D1AA32D9780852FA288B3286211EDDA18C7D19F9425CB79B5799BE3391EDDFFD907B
25,197,365 UART: [art] SIG.S = 3261460573DC827CE24B4301FF8CAE6A232162767A37867F00B98E7D810C5401B1E9462E4B7DD03BAFE8EE29A1C4C4A1
26,176,634 UART: Caliptra RT
26,177,352 UART: [state] CFI Enabled
26,293,548 UART: [rt] RT listening for mailbox commands...
26,295,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,327,196 UART: [rt]cmd =0x44504543, len=96
30,611,881 >>> mbox cmd response data (6236 bytes)
30,640,999 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,671,626 UART: [rt]cmd =0x53574545, len=84
34,806,723 >>> mbox cmd response data (200 bytes)
35,190,715 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,220,732 UART: [rt]cmd =0x4453424c, len=4
37,651,255 >>> mbox cmd response data (8 bytes)
37,651,774 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,682,085 UART: [rt]cmd =0x53574545, len=84
41,816,970 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,235 UART: [kat] SHA2-256
882,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,281 UART: [kat] ++
886,433 UART: [kat] sha1
890,727 UART: [kat] SHA2-256
892,665 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,560 UART: [kat] LMS
1,475,756 UART: [kat] --
1,476,705 UART: [cold-reset] ++
1,477,139 UART: [fht] Storing FHT @ 0x50003400
1,479,868 UART: [idev] ++
1,480,036 UART: [idev] CDI.KEYID = 6
1,480,396 UART: [idev] SUBJECT.KEYID = 7
1,480,820 UART: [idev] UDS.KEYID = 0
1,481,165 ready_for_fw is high
1,481,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,136 UART: [idev] Erasing UDS.KEYID = 0
1,505,818 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,338 UART: [idev] --
1,515,449 UART: [ldev] ++
1,515,617 UART: [ldev] CDI.KEYID = 6
1,515,980 UART: [ldev] SUBJECT.KEYID = 5
1,516,406 UART: [ldev] AUTHORITY.KEYID = 7
1,516,869 UART: [ldev] FE.KEYID = 1
1,521,789 UART: [ldev] Erasing FE.KEYID = 1
1,546,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,420 UART: [ldev] --
1,585,933 UART: [fwproc] Waiting for Commands...
1,586,676 UART: [fwproc] Received command 0x46574c44
1,587,467 UART: [fwproc] Received Image of size 114168 bytes
2,883,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,243 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,188 >>> mbox cmd response: success
3,076,404 UART: [afmc] ++
3,076,572 UART: [afmc] CDI.KEYID = 6
3,076,934 UART: [afmc] SUBJECT.KEYID = 7
3,077,359 UART: [afmc] AUTHORITY.KEYID = 5
3,112,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,584 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,197 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,887 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,676 UART: [afmc] --
3,155,620 UART: [cold-reset] --
3,156,438 UART: [state] Locking Datavault
3,157,643 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,247 UART: [state] Locking ICCM
3,158,711 UART: [exit] Launching FMC @ 0x40000130
3,164,040 UART:
3,164,056 UART: Running Caliptra FMC ...
3,164,464 UART:
3,164,518 UART: [state] CFI Enabled
3,174,921 UART: [fht] FMC Alias Private Key: 7
3,282,364 UART: [art] Extend RT PCRs Done
3,282,792 UART: [art] Lock RT PCRs Done
3,284,218 UART: [art] Populate DV Done
3,292,571 UART: [fht] FMC Alias Private Key: 7
3,293,617 UART: [art] Derive CDI
3,293,897 UART: [art] Store in in slot 0x4
3,379,532 UART: [art] Derive Key Pair
3,379,892 UART: [art] Store priv key in slot 0x5
3,392,570 UART: [art] Derive Key Pair - Done
3,407,582 UART: [art] Signing Cert with AUTHO
3,408,062 UART: RITY.KEYID = 7
3,423,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,093 UART: [art] PUB.X = A9017178E1838A1129D7BEFF51E2F9E8E64CF0E65054DEC7066BA17F388709347219BE19695272EB94F9188F81A3C148
3,430,850 UART: [art] PUB.Y = 2EC1EF7408A24AC5E7BF66A73D887C96A87C92E06C8A5887CCE3700C206942F2DF6B47FAE42988ACA5349BC98B0A06B5
3,437,800 UART: [art] SIG.R = 164B552B55364C3CD0F5DD81173F676A075D18CAFC0AC65028511F40B9531D5B257912F43B9970DADE7717092189D28C
3,444,557 UART: [art] SIG.S = 177C95D30A3F35C089C2F38E16368A3E2507B8BB8CF00C5B7CE21B83D93D20B3D931954D702217DF1C500716E0BDAEA9
3,469,178 UART: Caliptra RT
3,469,431 UART: [state] CFI Enabled
3,578,137 UART: [rt] RT listening for mailbox commands...
3,578,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,229 UART: [rt]cmd =0x44504543, len=96
3,789,976 >>> mbox cmd response data (6236 bytes)
3,789,977 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,656 UART: [rt]cmd =0x53574545, len=84
3,845,285 >>> mbox cmd response data (200 bytes)
3,845,286 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,874,513 UART: [rt]cmd =0x4453424c, len=4
3,891,745 >>> mbox cmd response data (8 bytes)
3,891,746 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,921,919 UART: [rt]cmd =0x53574545, len=84
3,947,302 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,903 ready_for_fw is high
1,361,903 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,436 >>> mbox cmd response: success
2,986,712 UART:
2,986,728 UART: Running Caliptra FMC ...
2,987,136 UART:
2,987,190 UART: [state] CFI Enabled
2,997,773 UART: [fht] FMC Alias Private Key: 7
3,105,496 UART: [art] Extend RT PCRs Done
3,105,924 UART: [art] Lock RT PCRs Done
3,107,078 UART: [art] Populate DV Done
3,115,345 UART: [fht] FMC Alias Private Key: 7
3,116,359 UART: [art] Derive CDI
3,116,639 UART: [art] Store in in slot 0x4
3,202,072 UART: [art] Derive Key Pair
3,202,432 UART: [art] Store priv key in slot 0x5
3,215,454 UART: [art] Derive Key Pair - Done
3,229,746 UART: [art] Signing Cert with AUTHO
3,230,226 UART: RITY.KEYID = 7
3,245,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,297 UART: [art] PUB.X = C03E6067442BD64ED40E3E5EEE92FD9BBEB2F23F6C1BC1BC2D23DA944DE31517E08DF28EC3511524434BE76D2311DF3C
3,253,082 UART: [art] PUB.Y = D04B6876ACDAEC80059B19503B4FB917CF3DBDC4BB7CC537D365CBDA1CCD0B9E5F633B9DF2386718C1B85B5FC9942005
3,260,043 UART: [art] SIG.R = 015CC5629EF92444304247F933A37B58612C3965D347B12A07344E11C2C5E04EFD4E4D3D83FEEC06BFF365C7F6B0666C
3,266,806 UART: [art] SIG.S = C0F38EC54846B995196077DDEBB2E7098268BFB416D815F70367308A639E1D40BC99EEFD0546AA2E7CD5A69758461A0B
3,290,947 UART: Caliptra RT
3,291,200 UART: [state] CFI Enabled
3,399,799 UART: [rt] RT listening for mailbox commands...
3,400,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,779 UART: [rt]cmd =0x44504543, len=96
3,611,954 >>> mbox cmd response data (6236 bytes)
3,611,955 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,742 UART: [rt]cmd =0x53574545, len=84
3,667,483 >>> mbox cmd response data (200 bytes)
3,667,484 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,863 UART: [rt]cmd =0x4453424c, len=4
3,714,187 >>> mbox cmd response data (8 bytes)
3,714,188 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,119 UART: [rt]cmd =0x53574545, len=84
3,770,290 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,768 UART: [kat] SHA2-256
892,706 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
902,803 UART: [kat] HMAC-384Kdf
907,549 UART: [kat] LMS
1,475,745 UART: [kat] --
1,476,464 UART: [cold-reset] ++
1,476,840 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 ready_for_fw is high
1,480,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,179 UART: [idev] Erasing UDS.KEYID = 0
1,505,079 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,863 UART: [idev] --
1,514,812 UART: [ldev] ++
1,514,980 UART: [ldev] CDI.KEYID = 6
1,515,343 UART: [ldev] SUBJECT.KEYID = 5
1,515,769 UART: [ldev] AUTHORITY.KEYID = 7
1,516,232 UART: [ldev] FE.KEYID = 1
1,521,320 UART: [ldev] Erasing FE.KEYID = 1
1,547,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,781 UART: [ldev] --
1,586,284 UART: [fwproc] Waiting for Commands...
1,586,981 UART: [fwproc] Received command 0x46574c44
1,587,772 UART: [fwproc] Received Image of size 114168 bytes
2,883,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,777 >>> mbox cmd response: success
3,076,971 UART: [afmc] ++
3,077,139 UART: [afmc] CDI.KEYID = 6
3,077,501 UART: [afmc] SUBJECT.KEYID = 7
3,077,926 UART: [afmc] AUTHORITY.KEYID = 5
3,113,299 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,481 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,874 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,564 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,431 UART: [afmc] --
3,156,531 UART: [cold-reset] --
3,157,215 UART: [state] Locking Datavault
3,158,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,306 UART: [state] Locking ICCM
3,159,944 UART: [exit] Launching FMC @ 0x40000130
3,165,273 UART:
3,165,289 UART: Running Caliptra FMC ...
3,165,697 UART:
3,165,840 UART: [state] CFI Enabled
3,176,519 UART: [fht] FMC Alias Private Key: 7
3,284,840 UART: [art] Extend RT PCRs Done
3,285,268 UART: [art] Lock RT PCRs Done
3,286,748 UART: [art] Populate DV Done
3,294,939 UART: [fht] FMC Alias Private Key: 7
3,296,113 UART: [art] Derive CDI
3,296,393 UART: [art] Store in in slot 0x4
3,382,134 UART: [art] Derive Key Pair
3,382,494 UART: [art] Store priv key in slot 0x5
3,395,382 UART: [art] Derive Key Pair - Done
3,409,890 UART: [art] Signing Cert with AUTHO
3,410,370 UART: RITY.KEYID = 7
3,425,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,163 UART: [art] PUB.X = 864BC11553476430D00117D47D8F14C3E04653B613D32E8E485C5CDD84B1E931FD717D39CA9B74652C8273B8B1B831CD
3,432,928 UART: [art] PUB.Y = 86AB0998ECC460D1728BEBB5CEDD980B3C1BED9E7D14B5D31E2A957B893B026C8CD0F77EB4990B553C088D6C34D82380
3,439,877 UART: [art] SIG.R = 79380CE0EB4BBF121279B77748693D2FA0B2C18A861A0202F7A479472518F04EA3A3AC9341B9ACDACFA02C24409ACDC2
3,446,648 UART: [art] SIG.S = 56551E6375434412BA04FAC54F77EFEC032CD5BBF04D2F8C5A33850222E785A555754043AE6FE186E1E0A3616F3CDAD9
3,470,460 UART: Caliptra RT
3,470,805 UART: [state] CFI Enabled
3,578,697 UART: [rt] RT listening for mailbox commands...
3,579,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,693 UART: [rt]cmd =0x44504543, len=96
3,791,457 >>> mbox cmd response data (6236 bytes)
3,791,458 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,415 UART: [rt]cmd =0x53574545, len=84
3,847,186 >>> mbox cmd response data (200 bytes)
3,847,187 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,606 UART: [rt]cmd =0x4453424c, len=4
3,893,494 >>> mbox cmd response data (8 bytes)
3,893,495 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,923,226 UART: [rt]cmd =0x53574545, len=84
3,949,841 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,808 ready_for_fw is high
1,361,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,241 >>> mbox cmd response: success
2,988,999 UART:
2,989,015 UART: Running Caliptra FMC ...
2,989,423 UART:
2,989,566 UART: [state] CFI Enabled
3,000,529 UART: [fht] FMC Alias Private Key: 7
3,108,616 UART: [art] Extend RT PCRs Done
3,109,044 UART: [art] Lock RT PCRs Done
3,110,580 UART: [art] Populate DV Done
3,118,957 UART: [fht] FMC Alias Private Key: 7
3,120,093 UART: [art] Derive CDI
3,120,373 UART: [art] Store in in slot 0x4
3,205,772 UART: [art] Derive Key Pair
3,206,132 UART: [art] Store priv key in slot 0x5
3,219,330 UART: [art] Derive Key Pair - Done
3,234,352 UART: [art] Signing Cert with AUTHO
3,234,832 UART: RITY.KEYID = 7
3,250,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,033 UART: [art] PUB.X = 2477E9604A986B0F167B21AF47ADA10DF18D3AB7D8F9240749E6FD91279718CC9D0065A002CBD7FCF1435163019FD4C9
3,257,770 UART: [art] PUB.Y = AC7416354C3FDAA93B7250D0AB926563F516721D833A24CDEF07A6EC686540F7B44CBBAECD592753C6B9C7C072C3E994
3,264,727 UART: [art] SIG.R = 8EDDA6A732759E42D26686FE6486616C523B32049E4948BA12C159EADADFFC5EEC2779F71B29A1DA8F1FF5DADEE535CC
3,271,514 UART: [art] SIG.S = 15706DA71CD6EAD2599478AA3C527F97B316D95FA8E655188E52C6BC0873CC32857C10BC9FFA8D2FE1F76CBA95C97D59
3,295,412 UART: Caliptra RT
3,295,757 UART: [state] CFI Enabled
3,404,796 UART: [rt] RT listening for mailbox commands...
3,405,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,880 UART: [rt]cmd =0x44504543, len=96
3,616,724 >>> mbox cmd response data (6236 bytes)
3,616,725 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,732 UART: [rt]cmd =0x53574545, len=84
3,672,317 >>> mbox cmd response data (200 bytes)
3,672,318 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,533 UART: [rt]cmd =0x4453424c, len=4
3,718,411 >>> mbox cmd response data (8 bytes)
3,718,412 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,748,495 UART: [rt]cmd =0x53574545, len=84
3,773,984 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
893,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,391 UART: [kat] ++
897,543 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,310 UART: [kat] SHA2-512-ACC
908,211 UART: [kat] ECC-384
917,866 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,691 UART: [cold-reset] ++
1,172,261 UART: [fht] FHT @ 0x50003400
1,175,038 UART: [idev] ++
1,175,206 UART: [idev] CDI.KEYID = 6
1,175,566 UART: [idev] SUBJECT.KEYID = 7
1,175,990 UART: [idev] UDS.KEYID = 0
1,176,335 ready_for_fw is high
1,176,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,194 UART: [idev] Erasing UDS.KEYID = 0
1,201,673 UART: [idev] Sha1 KeyId Algorithm
1,210,073 UART: [idev] --
1,211,365 UART: [ldev] ++
1,211,533 UART: [ldev] CDI.KEYID = 6
1,211,896 UART: [ldev] SUBJECT.KEYID = 5
1,212,322 UART: [ldev] AUTHORITY.KEYID = 7
1,212,785 UART: [ldev] FE.KEYID = 1
1,217,785 UART: [ldev] Erasing FE.KEYID = 1
1,244,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,223 UART: [ldev] --
1,283,676 UART: [fwproc] Wait for Commands...
1,284,256 UART: [fwproc] Recv command 0x46574c44
1,284,984 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,629 >>> mbox cmd response: success
2,773,683 UART: [afmc] ++
2,773,851 UART: [afmc] CDI.KEYID = 6
2,774,213 UART: [afmc] SUBJECT.KEYID = 7
2,774,638 UART: [afmc] AUTHORITY.KEYID = 5
2,810,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,442 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,803 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,522 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,460 UART: [afmc] --
2,853,556 UART: [cold-reset] --
2,854,314 UART: [state] Locking Datavault
2,855,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,093 UART: [state] Locking ICCM
2,856,687 UART: [exit] Launching FMC @ 0x40000130
2,862,016 UART:
2,862,032 UART: Running Caliptra FMC ...
2,862,440 UART:
2,862,494 UART: [state] CFI Enabled
2,872,605 UART: [fht] FMC Alias Private Key: 7
2,980,116 UART: [art] Extend RT PCRs Done
2,980,544 UART: [art] Lock RT PCRs Done
2,982,406 UART: [art] Populate DV Done
2,990,727 UART: [fht] FMC Alias Private Key: 7
2,991,879 UART: [art] Derive CDI
2,992,159 UART: [art] Store in in slot 0x4
3,077,592 UART: [art] Derive Key Pair
3,077,952 UART: [art] Store priv key in slot 0x5
3,091,694 UART: [art] Derive Key Pair - Done
3,106,394 UART: [art] Signing Cert with AUTHO
3,106,874 UART: RITY.KEYID = 7
3,121,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,683 UART: [art] PUB.X = 6EAF335EDC6D09FB74AF430567DAC653475EFE227E445738C4D2275B3B05D11AB9E43DBF1C1AD67CA545FBCE39F16F7C
3,129,464 UART: [art] PUB.Y = 7FFD4BF5985E1DB851780ADFFC72CE5DF886B8E0A9DAB845279026EE4C5CA7210229F53EE48DA702AA4397A064DA1A84
3,136,421 UART: [art] SIG.R = EE7A142B406CEDD808F21E6263045090C65DCB8DA9C54571365BAFECBAAF2CAEDC53C2B7B795E11E268C5A9D58634660
3,143,201 UART: [art] SIG.S = 7D188A7403FC9719EDF5E2B8D9B60D2B89FC61F81690F64CF2FBA17FDCFC17700971EDBC99F58C894CEBE54B57B46B15
3,167,099 UART: Caliptra RT
3,167,352 UART: [state] CFI Enabled
3,274,463 UART: [rt] RT listening for mailbox commands...
3,275,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,377 UART: [rt]cmd =0x44504543, len=96
3,486,515 >>> mbox cmd response data (6236 bytes)
3,486,516 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,325 UART: [rt]cmd =0x53574545, len=84
3,541,872 >>> mbox cmd response data (200 bytes)
3,541,873 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,096 UART: [rt]cmd =0x4453424c, len=4
3,588,598 >>> mbox cmd response data (8 bytes)
3,588,599 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,412 UART: [rt]cmd =0x53574545, len=84
3,643,753 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,407 ready_for_fw is high
1,060,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,074 >>> mbox cmd response: success
2,687,170 UART:
2,687,186 UART: Running Caliptra FMC ...
2,687,594 UART:
2,687,648 UART: [state] CFI Enabled
2,698,519 UART: [fht] FMC Alias Private Key: 7
2,806,362 UART: [art] Extend RT PCRs Done
2,806,790 UART: [art] Lock RT PCRs Done
2,808,376 UART: [art] Populate DV Done
2,816,455 UART: [fht] FMC Alias Private Key: 7
2,817,637 UART: [art] Derive CDI
2,817,917 UART: [art] Store in in slot 0x4
2,903,834 UART: [art] Derive Key Pair
2,904,194 UART: [art] Store priv key in slot 0x5
2,916,942 UART: [art] Derive Key Pair - Done
2,931,453 UART: [art] Signing Cert with AUTHO
2,931,933 UART: RITY.KEYID = 7
2,947,291 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,056 UART: [art] PUB.X = 70B7C46B6A12DEFC3A3A28CD9E85579AE1F3EFB895E7A8B819D2069F8DEF2BA839CCA4172442C23A07C792EE4370FD8D
2,954,838 UART: [art] PUB.Y = 95F27F4AD9ED70F4568827F270BCD8390F5E540EC0B7DCC1148C5F69786EAE206B75B0816DC8B5CA4E447F9FBB5CECD8
2,961,800 UART: [art] SIG.R = ACD268652863B201A330FC665742A54E6982A5FA6491CF2BE7507D7E76FC6B20348538CA1C1719C6FEA00A96F6F7A8DE
2,968,570 UART: [art] SIG.S = 7F1F7A8D5B96E69DBAF63C070F8BCE9C8C3336621C5DB40ECB69681831CA3EBA393DC24725C6C632CD3FA4A3E8BD19B0
2,992,480 UART: Caliptra RT
2,992,733 UART: [state] CFI Enabled
3,100,464 UART: [rt] RT listening for mailbox commands...
3,101,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,246 UART: [rt]cmd =0x44504543, len=96
3,312,790 >>> mbox cmd response data (6236 bytes)
3,312,791 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,342,730 UART: [rt]cmd =0x53574545, len=84
3,368,107 >>> mbox cmd response data (200 bytes)
3,368,108 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,397,303 UART: [rt]cmd =0x4453424c, len=4
3,414,631 >>> mbox cmd response data (8 bytes)
3,414,632 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,487 UART: [rt]cmd =0x53574545, len=84
3,470,752 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
87,076 UART: [state] WD Timer not started. Device not locked for debugging
88,395 UART: [kat] SHA2-256
894,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,170 UART: [kat] ++
898,322 UART: [kat] sha1
902,524 UART: [kat] SHA2-256
904,464 UART: [kat] SHA2-384
907,169 UART: [kat] SHA2-512-ACC
909,070 UART: [kat] ECC-384
918,715 UART: [kat] HMAC-384Kdf
923,273 UART: [kat] LMS
1,171,601 UART: [kat] --
1,172,328 UART: [cold-reset] ++
1,172,790 UART: [fht] FHT @ 0x50003400
1,175,513 UART: [idev] ++
1,175,681 UART: [idev] CDI.KEYID = 6
1,176,041 UART: [idev] SUBJECT.KEYID = 7
1,176,465 UART: [idev] UDS.KEYID = 0
1,176,810 ready_for_fw is high
1,176,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,283 UART: [idev] Erasing UDS.KEYID = 0
1,201,630 UART: [idev] Sha1 KeyId Algorithm
1,210,020 UART: [idev] --
1,210,946 UART: [ldev] ++
1,211,114 UART: [ldev] CDI.KEYID = 6
1,211,477 UART: [ldev] SUBJECT.KEYID = 5
1,211,903 UART: [ldev] AUTHORITY.KEYID = 7
1,212,366 UART: [ldev] FE.KEYID = 1
1,217,738 UART: [ldev] Erasing FE.KEYID = 1
1,243,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,016 UART: [ldev] --
1,283,391 UART: [fwproc] Wait for Commands...
1,284,153 UART: [fwproc] Recv command 0x46574c44
1,284,881 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,417 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,962 >>> mbox cmd response: success
2,773,042 UART: [afmc] ++
2,773,210 UART: [afmc] CDI.KEYID = 6
2,773,572 UART: [afmc] SUBJECT.KEYID = 7
2,773,997 UART: [afmc] AUTHORITY.KEYID = 5
2,809,212 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,316 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,743 UART: [afmc] --
2,852,829 UART: [cold-reset] --
2,853,511 UART: [state] Locking Datavault
2,854,410 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,014 UART: [state] Locking ICCM
2,855,600 UART: [exit] Launching FMC @ 0x40000130
2,860,929 UART:
2,860,945 UART: Running Caliptra FMC ...
2,861,353 UART:
2,861,496 UART: [state] CFI Enabled
2,871,859 UART: [fht] FMC Alias Private Key: 7
2,979,450 UART: [art] Extend RT PCRs Done
2,979,878 UART: [art] Lock RT PCRs Done
2,981,386 UART: [art] Populate DV Done
2,989,501 UART: [fht] FMC Alias Private Key: 7
2,990,491 UART: [art] Derive CDI
2,990,771 UART: [art] Store in in slot 0x4
3,076,736 UART: [art] Derive Key Pair
3,077,096 UART: [art] Store priv key in slot 0x5
3,090,098 UART: [art] Derive Key Pair - Done
3,105,060 UART: [art] Signing Cert with AUTHO
3,105,540 UART: RITY.KEYID = 7
3,120,944 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,709 UART: [art] PUB.X = B6901BD434104FA85B01E3B0E3A435B3893F4B0FA124812EBD205EC12436D26423186979519CE18C5C0CC09580750841
3,128,459 UART: [art] PUB.Y = 0298C0CC5B5A4123DE4D96C824978759B9BFA08B4F924B66C8AD85228C4B2DB5B9AF82D442F959F276BBCA4724B5CECD
3,135,420 UART: [art] SIG.R = 5F78D80C4EC899182A672B7173899AACABCC9031D454EDB827035A92F7EA8EDBAF092DF49E148850F80AB78A46015C55
3,142,183 UART: [art] SIG.S = 5D4D47EB36187CD5420D95E05E91931EC90542E6298F2AAE36378DDC6F84C8A5EEEE3E1E9539D128CCEF4E9AA1E83633
3,166,542 UART: Caliptra RT
3,166,887 UART: [state] CFI Enabled
3,273,514 UART: [rt] RT listening for mailbox commands...
3,274,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,770 UART: [rt]cmd =0x44504543, len=96
3,486,705 >>> mbox cmd response data (6236 bytes)
3,486,706 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,609 UART: [rt]cmd =0x53574545, len=84
3,542,544 >>> mbox cmd response data (200 bytes)
3,542,545 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,790 UART: [rt]cmd =0x4453424c, len=4
3,589,748 >>> mbox cmd response data (8 bytes)
3,589,749 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,488 UART: [rt]cmd =0x53574545, len=84
3,645,835 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,032 ready_for_fw is high
1,061,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,151 >>> mbox cmd response: success
2,686,315 UART:
2,686,331 UART: Running Caliptra FMC ...
2,686,739 UART:
2,686,882 UART: [state] CFI Enabled
2,697,559 UART: [fht] FMC Alias Private Key: 7
2,806,082 UART: [art] Extend RT PCRs Done
2,806,510 UART: [art] Lock RT PCRs Done
2,808,066 UART: [art] Populate DV Done
2,816,227 UART: [fht] FMC Alias Private Key: 7
2,817,365 UART: [art] Derive CDI
2,817,645 UART: [art] Store in in slot 0x4
2,903,098 UART: [art] Derive Key Pair
2,903,458 UART: [art] Store priv key in slot 0x5
2,916,742 UART: [art] Derive Key Pair - Done
2,931,328 UART: [art] Signing Cert with AUTHO
2,931,808 UART: RITY.KEYID = 7
2,947,266 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,031 UART: [art] PUB.X = 123C6AC53D49482018C7E830761DBAE582279B5889579BF12A880E5BC39C35C6C07007A35A1296BDD4E074B581B3BA15
2,954,793 UART: [art] PUB.Y = 760FB72A6A55DFA67947ACE90CBAC7621D662484193D6F7409907B7E417BDA79B5694CB829C36FA366266288CA8CFD8E
2,961,740 UART: [art] SIG.R = DBBC8B03CC75066056E16F94AC6C3C2BBA18B82B2B73C65777E6BBC62DB142752317D0FED8D0328AB4CA1DCD0E64E214
2,968,519 UART: [art] SIG.S = F733C83A8B9562A8C9B9F53B38A64C8FB9F81A29F8BFA403317B58738969078AEA245E88FF3A31D2D55FC717F32DF57F
2,992,314 UART: Caliptra RT
2,992,659 UART: [state] CFI Enabled
3,100,853 UART: [rt] RT listening for mailbox commands...
3,101,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,841 UART: [rt]cmd =0x44504543, len=96
3,312,164 >>> mbox cmd response data (6236 bytes)
3,312,165 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,976 UART: [rt]cmd =0x53574545, len=84
3,367,469 >>> mbox cmd response data (200 bytes)
3,367,470 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,735 UART: [rt]cmd =0x4453424c, len=4
3,414,351 >>> mbox cmd response data (8 bytes)
3,414,352 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,227 UART: [rt]cmd =0x53574545, len=84
3,469,708 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,504 UART: [state] LifecycleState = Unprovisioned
85,159 UART: [state] DebugLocked = No
85,723 UART: [state] WD Timer not started. Device not locked for debugging
87,010 UART: [kat] SHA2-256
890,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,689 UART: [kat] ++
894,841 UART: [kat] sha1
899,021 UART: [kat] SHA2-256
900,961 UART: [kat] SHA2-384
903,694 UART: [kat] SHA2-512-ACC
905,595 UART: [kat] ECC-384
914,900 UART: [kat] HMAC-384Kdf
919,712 UART: [kat] LMS
1,168,024 UART: [kat] --
1,168,995 UART: [cold-reset] ++
1,169,515 UART: [fht] FHT @ 0x50003400
1,172,107 UART: [idev] ++
1,172,275 UART: [idev] CDI.KEYID = 6
1,172,636 UART: [idev] SUBJECT.KEYID = 7
1,173,061 UART: [idev] UDS.KEYID = 0
1,173,407 ready_for_fw is high
1,173,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,017 UART: [idev] Erasing UDS.KEYID = 0
1,197,811 UART: [idev] Sha1 KeyId Algorithm
1,206,657 UART: [idev] --
1,207,694 UART: [ldev] ++
1,207,862 UART: [ldev] CDI.KEYID = 6
1,208,226 UART: [ldev] SUBJECT.KEYID = 5
1,208,653 UART: [ldev] AUTHORITY.KEYID = 7
1,209,116 UART: [ldev] FE.KEYID = 1
1,214,558 UART: [ldev] Erasing FE.KEYID = 1
1,240,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,300 UART: [ldev] --
1,279,706 UART: [fwproc] Wait for Commands...
1,280,355 UART: [fwproc] Recv command 0x46574c44
1,281,088 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,077 >>> mbox cmd response: success
2,771,330 UART: [afmc] ++
2,771,498 UART: [afmc] CDI.KEYID = 6
2,771,861 UART: [afmc] SUBJECT.KEYID = 7
2,772,287 UART: [afmc] AUTHORITY.KEYID = 5
2,807,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,883 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,612 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,495 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,214 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,171 UART: [afmc] --
2,851,253 UART: [cold-reset] --
2,852,233 UART: [state] Locking Datavault
2,853,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,898 UART: [state] Locking ICCM
2,854,444 UART: [exit] Launching FMC @ 0x40000130
2,859,773 UART:
2,859,789 UART: Running Caliptra FMC ...
2,860,197 UART:
2,860,251 UART: [state] CFI Enabled
2,870,400 UART: [fht] FMC Alias Private Key: 7
2,978,813 UART: [art] Extend RT PCRs Done
2,979,241 UART: [art] Lock RT PCRs Done
2,981,047 UART: [art] Populate DV Done
2,989,418 UART: [fht] FMC Alias Private Key: 7
2,990,470 UART: [art] Derive CDI
2,990,750 UART: [art] Store in in slot 0x4
3,076,177 UART: [art] Derive Key Pair
3,076,537 UART: [art] Store priv key in slot 0x5
3,089,563 UART: [art] Derive Key Pair - Done
3,104,525 UART: [art] Signing Cert with AUTHO
3,105,005 UART: RITY.KEYID = 7
3,120,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,984 UART: [art] PUB.X = 9F561C3A3F874FECB95C64B02BB9C096BC00D1E5DB331B3337062A34736EEFDF8DC2F61AD1114D6D74188C2C4F110598
3,127,736 UART: [art] PUB.Y = 6BB415995D328F5D586C58448C0AB0698363B9FDDFB8367A725722A02D9E97A479BB9785F1BEABA66A479878A8A47725
3,134,683 UART: [art] SIG.R = 6929CD9123675A0F312A3D63AB30603BB1E8E9339D3CFA10F4974615D2E627B7B3A1B5B5C3302E7DD7D041C1A1A66F48
3,141,454 UART: [art] SIG.S = 00FC0BFD6AD302506603D6241E2AC61768A4E91407F605D083F428E9D26F51DE3B8259EC10D367F6753410009AE05E44
3,165,334 UART: Caliptra RT
3,165,587 UART: [state] CFI Enabled
3,273,441 UART: [rt] RT listening for mailbox commands...
3,274,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,595 UART: [rt]cmd =0x44504543, len=96
3,486,140 >>> mbox cmd response data (6236 bytes)
3,486,141 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,030 UART: [rt]cmd =0x53574545, len=84
3,541,719 >>> mbox cmd response data (200 bytes)
3,541,720 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,861 UART: [rt]cmd =0x4453424c, len=4
3,588,189 >>> mbox cmd response data (8 bytes)
3,588,190 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,159 UART: [rt]cmd =0x53574545, len=84
3,644,328 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,736 ready_for_fw is high
1,055,736 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,443 >>> mbox cmd response: success
2,683,293 UART:
2,683,309 UART: Running Caliptra FMC ...
2,683,717 UART:
2,683,771 UART: [state] CFI Enabled
2,694,198 UART: [fht] FMC Alias Private Key: 7
2,801,759 UART: [art] Extend RT PCRs Done
2,802,187 UART: [art] Lock RT PCRs Done
2,803,709 UART: [art] Populate DV Done
2,811,886 UART: [fht] FMC Alias Private Key: 7
2,812,930 UART: [art] Derive CDI
2,813,210 UART: [art] Store in in slot 0x4
2,898,655 UART: [art] Derive Key Pair
2,899,015 UART: [art] Store priv key in slot 0x5
2,912,371 UART: [art] Derive Key Pair - Done
2,927,183 UART: [art] Signing Cert with AUTHO
2,927,663 UART: RITY.KEYID = 7
2,942,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,374 UART: [art] PUB.X = 842E1110B2B0E0BA6FEFBDABFCB71903A6489EDB8FEFC0E6BEC12EB405296ED35F3569F79CBE895CDB4E0B7F67C97C41
2,950,163 UART: [art] PUB.Y = 35228F27032D683BAC8D4DF89ED85D06A89A6144DF8AD01DC60E03A0A94426081CCD9B890E52FC3852003CA7EEE59BB5
2,957,083 UART: [art] SIG.R = 3A67B0CD47C4A9D7EBC3A9E95F2F27FB88AE435961DA383E445E7C44E4AC6DA02F8B96F7747E443A00CB53FD0DC4DA6A
2,963,850 UART: [art] SIG.S = F4821022BD36C022BD4F398A1CAFB948BE9F4F09A0597AE9026FAF1A5D1C1FBBAA41BE7FAC278132110C32E0EC2E86CD
2,987,492 UART: Caliptra RT
2,987,745 UART: [state] CFI Enabled
3,095,456 UART: [rt] RT listening for mailbox commands...
3,096,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,616 UART: [rt]cmd =0x44504543, len=96
3,307,141 >>> mbox cmd response data (6236 bytes)
3,307,142 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,041 UART: [rt]cmd =0x53574545, len=84
3,363,156 >>> mbox cmd response data (200 bytes)
3,363,157 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,710 UART: [rt]cmd =0x4453424c, len=4
3,410,178 >>> mbox cmd response data (8 bytes)
3,410,179 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,970 UART: [rt]cmd =0x53574545, len=84
3,465,651 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,626 UART: [kat] ++
895,778 UART: [kat] sha1
899,998 UART: [kat] SHA2-256
901,938 UART: [kat] SHA2-384
904,651 UART: [kat] SHA2-512-ACC
906,552 UART: [kat] ECC-384
916,469 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,496 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 ready_for_fw is high
1,174,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,772 UART: [idev] Erasing UDS.KEYID = 0
1,197,962 UART: [idev] Sha1 KeyId Algorithm
1,206,798 UART: [idev] --
1,207,799 UART: [ldev] ++
1,207,967 UART: [ldev] CDI.KEYID = 6
1,208,331 UART: [ldev] SUBJECT.KEYID = 5
1,208,758 UART: [ldev] AUTHORITY.KEYID = 7
1,209,221 UART: [ldev] FE.KEYID = 1
1,214,249 UART: [ldev] Erasing FE.KEYID = 1
1,241,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,301 UART: [ldev] --
1,280,569 UART: [fwproc] Wait for Commands...
1,281,306 UART: [fwproc] Recv command 0x46574c44
1,282,039 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,377 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,340 >>> mbox cmd response: success
2,772,523 UART: [afmc] ++
2,772,691 UART: [afmc] CDI.KEYID = 6
2,773,054 UART: [afmc] SUBJECT.KEYID = 7
2,773,480 UART: [afmc] AUTHORITY.KEYID = 5
2,808,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,634 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,042 UART: [afmc] --
2,851,962 UART: [cold-reset] --
2,852,666 UART: [state] Locking Datavault
2,853,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,299 UART: [state] Locking ICCM
2,854,783 UART: [exit] Launching FMC @ 0x40000130
2,860,112 UART:
2,860,128 UART: Running Caliptra FMC ...
2,860,536 UART:
2,860,679 UART: [state] CFI Enabled
2,870,952 UART: [fht] FMC Alias Private Key: 7
2,979,337 UART: [art] Extend RT PCRs Done
2,979,765 UART: [art] Lock RT PCRs Done
2,981,091 UART: [art] Populate DV Done
2,989,330 UART: [fht] FMC Alias Private Key: 7
2,990,366 UART: [art] Derive CDI
2,990,646 UART: [art] Store in in slot 0x4
3,076,175 UART: [art] Derive Key Pair
3,076,535 UART: [art] Store priv key in slot 0x5
3,089,625 UART: [art] Derive Key Pair - Done
3,104,127 UART: [art] Signing Cert with AUTHO
3,104,607 UART: RITY.KEYID = 7
3,120,367 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,132 UART: [art] PUB.X = 1C5B996690577B4FF9044E0593116191B111E3C9D020EEFB4140F56834119C77D7D70F16366B03A927ED2C8047418E10
3,127,878 UART: [art] PUB.Y = A642940CCAD23F2DD862BFC8B7BE03164E62B76EF3786F15121AFF5CB15824FD75510347B186C25F0104C494C2C6F42E
3,134,819 UART: [art] SIG.R = 7D8EC503892D0873145EB416B201266594BC37A28A673AF2DF7639E21B3CF7EC795AE3CF3C7C00999FDB24E7FD26D156
3,141,564 UART: [art] SIG.S = 15EDDC70B239FCE86770DE5026BB79B9890323320620C263A9A13CE796A2ABF6E5B7FB7AB47352331796F8997CAE6469
3,165,747 UART: Caliptra RT
3,166,092 UART: [state] CFI Enabled
3,274,073 UART: [rt] RT listening for mailbox commands...
3,274,743 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,423 UART: [rt]cmd =0x44504543, len=96
3,485,879 >>> mbox cmd response data (6236 bytes)
3,485,880 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,865 UART: [rt]cmd =0x53574545, len=84
3,541,164 >>> mbox cmd response data (200 bytes)
3,541,165 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,372 UART: [rt]cmd =0x4453424c, len=4
3,587,664 >>> mbox cmd response data (8 bytes)
3,587,665 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,658 UART: [rt]cmd =0x53574545, len=84
3,643,829 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,973 ready_for_fw is high
1,056,973 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,172 >>> mbox cmd response: success
2,686,140 UART:
2,686,156 UART: Running Caliptra FMC ...
2,686,564 UART:
2,686,707 UART: [state] CFI Enabled
2,697,558 UART: [fht] FMC Alias Private Key: 7
2,806,145 UART: [art] Extend RT PCRs Done
2,806,573 UART: [art] Lock RT PCRs Done
2,808,143 UART: [art] Populate DV Done
2,816,360 UART: [fht] FMC Alias Private Key: 7
2,817,318 UART: [art] Derive CDI
2,817,598 UART: [art] Store in in slot 0x4
2,903,463 UART: [art] Derive Key Pair
2,903,823 UART: [art] Store priv key in slot 0x5
2,917,093 UART: [art] Derive Key Pair - Done
2,931,793 UART: [art] Signing Cert with AUTHO
2,932,273 UART: RITY.KEYID = 7
2,947,163 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,928 UART: [art] PUB.X = 1E1222DEAF1272A1FB36E46BFAE03C3E693CB6B6C4BEA815EC5D71A33AF260A1AA0FA327F96156CBAD70285DCBF1918D
2,954,719 UART: [art] PUB.Y = 8D5B49273C02B09518377F1C20F7DEA5A81991A69FCFF09BC6076BE9EB62B8DA06873CD7E4DDEE0684339EFB5BAC8F4B
2,961,675 UART: [art] SIG.R = 90B7750D35E7E7AB23089D40405EDB524D3AD0E9EC29A0252E6D2084528E64B4DF0BAFB0AA09EEA1DF02E4CC7258133A
2,968,444 UART: [art] SIG.S = FF041C3DD82B1CD95826F185592C8F5B3A0115ABB674CF5CC3474199D97517479B2CCCC72DB4341C45CFBDFF36C15080
2,992,559 UART: Caliptra RT
2,992,904 UART: [state] CFI Enabled
3,100,804 UART: [rt] RT listening for mailbox commands...
3,101,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,720 UART: [rt]cmd =0x44504543, len=96
3,313,036 >>> mbox cmd response data (6236 bytes)
3,313,037 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,030 UART: [rt]cmd =0x53574545, len=84
3,369,271 >>> mbox cmd response data (200 bytes)
3,369,272 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,759 UART: [rt]cmd =0x4453424c, len=4
3,415,321 >>> mbox cmd response data (8 bytes)
3,415,322 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,101 UART: [rt]cmd =0x53574545, len=84
3,470,822 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
191,992 UART:
192,347 UART: Running Caliptra ROM ...
193,516 UART:
193,667 UART: [state] CFI Enabled
267,322 UART: [state] LifecycleState = Unprovisioned
269,236 UART: [state] DebugLocked = No
271,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,253 UART: [kat] SHA2-256
446,969 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,481 UART: [kat] ++
457,963 UART: [kat] sha1
470,108 UART: [kat] SHA2-256
472,824 UART: [kat] SHA2-384
477,594 UART: [kat] SHA2-512-ACC
479,949 UART: [kat] ECC-384
2,769,205 UART: [kat] HMAC-384Kdf
2,801,001 UART: [kat] LMS
3,991,322 UART: [kat] --
3,995,264 UART: [cold-reset] ++
3,996,976 UART: [fht] Storing FHT @ 0x50003400
4,009,368 UART: [idev] ++
4,009,935 UART: [idev] CDI.KEYID = 6
4,010,818 UART: [idev] SUBJECT.KEYID = 7
4,012,139 UART: [idev] UDS.KEYID = 0
4,013,151 ready_for_fw is high
4,013,364 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,625 UART: [idev] Erasing UDS.KEYID = 0
7,347,408 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,345 UART: [idev] --
7,372,004 UART: [ldev] ++
7,372,569 UART: [ldev] CDI.KEYID = 6
7,373,529 UART: [ldev] SUBJECT.KEYID = 5
7,374,752 UART: [ldev] AUTHORITY.KEYID = 7
7,376,033 UART: [ldev] FE.KEYID = 1
7,423,238 UART: [ldev] Erasing FE.KEYID = 1
10,755,032 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,204 UART: [ldev] --
13,118,727 UART: [fwproc] Waiting for Commands...
13,121,944 UART: [fwproc] Received command 0x46574c44
13,124,114 UART: [fwproc] Received Image of size 113844 bytes
17,174,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,251,608 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,320,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,636,314 >>> mbox cmd response: success
17,640,688 UART: [afmc] ++
17,641,345 UART: [afmc] CDI.KEYID = 6
17,642,227 UART: [afmc] SUBJECT.KEYID = 7
17,643,496 UART: [afmc] AUTHORITY.KEYID = 5
21,002,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,306,649 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,308,916 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,308 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,170 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,352,602 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,840 UART: [afmc] --
23,379,087 UART: [cold-reset] --
23,383,958 UART: [state] Locking Datavault
23,390,069 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,825 UART: [state] Locking ICCM
23,392,861 UART: [exit] Launching FMC @ 0x40000130
23,401,271 UART:
23,401,501 UART: Running Caliptra FMC ...
23,402,521 UART:
23,402,667 UART: [state] CFI Enabled
23,465,161 UART: [fht] FMC Alias Private Key: 7
25,803,586 UART: [art] Extend RT PCRs Done
25,804,802 UART: [art] Lock RT PCRs Done
25,806,559 UART: [art] Populate DV Done
25,811,906 UART: [fht] FMC Alias Private Key: 7
25,813,435 UART: [art] Derive CDI
25,814,164 UART: [art] Store in in slot 0x4
25,874,438 UART: [art] Derive Key Pair
25,875,492 UART: [art] Store priv key in slot 0x5
29,168,412 UART: [art] Derive Key Pair - Done
29,181,535 UART: [art] Signing Cert with AUTHO
29,182,841 UART: RITY.KEYID = 7
31,470,169 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,687 UART: [art] PUB.X = B5F14CE861285B387B58E9DCD6CC1179708D7F103BAD9031C0C194856F8F2DBA53DA34587A8250541D93F0BBA8D5981B
31,478,905 UART: [art] PUB.Y = 3E2F84A30F2F212D9BEA68A920B45F92839FFB67B7A1931461E3329136A56DADB79BDA31EFA12612EC2CD57CDB0569E5
31,486,169 UART: [art] SIG.R = 96959AFF392A43A5DBE78294A9530F27E804ACFB2CD54A2F5FE77A96729A6E30980F74D6299D83619C3922642AB4DF62
31,493,528 UART: [art] SIG.S = 2D4A02E3A331F21F3110C7C170C3AC8218F87E97252849AA4F22F3C852DC115FD719EC4E06478B906C1BB1489D23A253
32,798,737 UART: Caliptra RT
32,799,900 UART: [state] CFI Enabled
32,961,139 UART: [rt] RT listening for mailbox commands...
32,963,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,994,506 UART: [rt]cmd =0x44504543, len=96
38,779,536 >>> mbox cmd response data (6236 bytes)
38,809,697 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,840,153 UART: [rt]cmd =0x53574545, len=84
44,428,328 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,808,697 ready_for_fw is high
3,809,110 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,872,026 >>> mbox cmd response: success
23,573,181 UART:
23,573,586 UART: Running Caliptra FMC ...
23,574,786 UART:
23,574,970 UART: [state] CFI Enabled
23,641,006 UART: [fht] FMC Alias Private Key: 7
25,979,130 UART: [art] Extend RT PCRs Done
25,980,365 UART: [art] Lock RT PCRs Done
25,982,156 UART: [art] Populate DV Done
25,987,457 UART: [fht] FMC Alias Private Key: 7
25,988,935 UART: [art] Derive CDI
25,989,669 UART: [art] Store in in slot 0x4
26,049,352 UART: [art] Derive Key Pair
26,050,394 UART: [art] Store priv key in slot 0x5
29,342,870 UART: [art] Derive Key Pair - Done
29,355,966 UART: [art] Signing Cert with AUTHO
29,357,272 UART: RITY.KEYID = 7
31,644,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,645,824 UART: [art] PUB.X = A5CFC3C675F3B3F9901B4305CFDFB272AF0101FEE21CEA44952FD3B6D2CD48B7CFC1188211712DD152DEA5246F0EE7EB
31,652,915 UART: [art] PUB.Y = B9EF5FD9C2B8FE8F8366FDCB54C961BFEED70D78056F2B6BF2397C7E94138CEAA36F4E2BD8225E7D00F8A287C4134432
31,660,168 UART: [art] SIG.R = 4E850FEAA87DF25B087612DDF9C119CC41394A8E875F211A805CD7C26C974DE1C8C4F7B58A33D9DA111CA6DB1436E014
31,667,585 UART: [art] SIG.S = 634BA967819ADE564AA1670840870B55F89EFE7E40A1DE9B47E6747BF4F0EDEBA5E256BE53A1FA60B8CD4F2083FA8C71
32,972,829 UART: Caliptra RT
32,973,527 UART: [state] CFI Enabled
33,133,562 UART: [rt] RT listening for mailbox commands...
33,135,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,166,864 UART: [rt]cmd =0x44504543, len=96
38,910,907 >>> mbox cmd response data (6236 bytes)
38,940,694 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,971,317 UART: [rt]cmd =0x53574545, len=84
44,555,727 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,385 UART:
192,743 UART: Running Caliptra ROM ...
193,877 UART:
603,659 UART: [state] CFI Enabled
617,246 UART: [state] LifecycleState = Unprovisioned
619,197 UART: [state] DebugLocked = No
621,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,768 UART: [kat] SHA2-256
796,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,103 UART: [kat] ++
807,633 UART: [kat] sha1
818,306 UART: [kat] SHA2-256
821,025 UART: [kat] SHA2-384
827,448 UART: [kat] SHA2-512-ACC
829,820 UART: [kat] ECC-384
3,114,329 UART: [kat] HMAC-384Kdf
3,126,829 UART: [kat] LMS
4,316,961 UART: [kat] --
4,321,550 UART: [cold-reset] ++
4,323,842 UART: [fht] Storing FHT @ 0x50003400
4,334,326 UART: [idev] ++
4,334,959 UART: [idev] CDI.KEYID = 6
4,335,902 UART: [idev] SUBJECT.KEYID = 7
4,337,080 UART: [idev] UDS.KEYID = 0
4,338,174 ready_for_fw is high
4,338,388 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,453 UART: [idev] Erasing UDS.KEYID = 0
7,624,519 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,228 UART: [idev] --
7,650,282 UART: [ldev] ++
7,650,849 UART: [ldev] CDI.KEYID = 6
7,651,787 UART: [ldev] SUBJECT.KEYID = 5
7,653,053 UART: [ldev] AUTHORITY.KEYID = 7
7,654,288 UART: [ldev] FE.KEYID = 1
7,665,943 UART: [ldev] Erasing FE.KEYID = 1
10,955,333 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,194 UART: [ldev] --
13,315,482 UART: [fwproc] Waiting for Commands...
13,317,843 UART: [fwproc] Received command 0x46574c44
13,320,032 UART: [fwproc] Received Image of size 113844 bytes
17,370,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,138 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,833,753 >>> mbox cmd response: success
17,837,756 UART: [afmc] ++
17,838,345 UART: [afmc] CDI.KEYID = 6
17,839,236 UART: [afmc] SUBJECT.KEYID = 7
17,840,503 UART: [afmc] AUTHORITY.KEYID = 5
21,152,311 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,851 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,227 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,048 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,482 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,487 UART: [afmc] --
23,522,363 UART: [cold-reset] --
23,523,794 UART: [state] Locking Datavault
23,526,941 UART: [state] Locking PCR0, PCR1 and PCR31
23,528,691 UART: [state] Locking ICCM
23,531,489 UART: [exit] Launching FMC @ 0x40000130
23,539,889 UART:
23,540,125 UART: Running Caliptra FMC ...
23,541,223 UART:
23,541,382 UART: [state] CFI Enabled
23,549,378 UART: [fht] FMC Alias Private Key: 7
25,879,971 UART: [art] Extend RT PCRs Done
25,881,217 UART: [art] Lock RT PCRs Done
25,883,085 UART: [art] Populate DV Done
25,888,664 UART: [fht] FMC Alias Private Key: 7
25,890,147 UART: [art] Derive CDI
25,890,908 UART: [art] Store in in slot 0x4
25,933,387 UART: [art] Derive Key Pair
25,934,425 UART: [art] Store priv key in slot 0x5
29,176,454 UART: [art] Derive Key Pair - Done
29,189,578 UART: [art] Signing Cert with AUTHO
29,190,908 UART: RITY.KEYID = 7
31,470,319 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,825 UART: [art] PUB.X = EAEEAFC703B4372C9E7491F23A56D038246B7698C8D0F6C885D1C36E361B4C6E6F7FDCB82811C13BE2EDBE8D70E2DB2A
31,479,037 UART: [art] PUB.Y = 81E124456504B07F6A667343A4AE75DFDC4DA805AC66A3735E9192B2F08E638DB618CB08BFB8E5BAA4A5BE911D8067EC
31,486,343 UART: [art] SIG.R = FF3169E4157AD14F1C2FCAC8951F21D4F0B2662292C7F254C9017BE0E20637CE6DFF0FF9CC86E9894987634B651D44AC
31,493,694 UART: [art] SIG.S = 9046E8ABDC4866768AE841040CB784AF775E93779A6061D3039C8C0DB73B5840A25137FAB98024540171D881AD0C4784
32,798,924 UART: Caliptra RT
32,799,660 UART: [state] CFI Enabled
32,916,839 UART: [rt] RT listening for mailbox commands...
32,918,748 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,949,864 UART: [rt]cmd =0x44504543, len=96
38,621,306 >>> mbox cmd response data (6236 bytes)
38,651,220 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,681,840 UART: [rt]cmd =0x53574545, len=84
44,206,173 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
4,125,660 ready_for_fw is high
4,126,249 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,065,077 >>> mbox cmd response: success
23,707,204 UART:
23,707,586 UART: Running Caliptra FMC ...
23,708,693 UART:
23,708,847 UART: [state] CFI Enabled
23,716,829 UART: [fht] FMC Alias Private Key: 7
26,047,297 UART: [art] Extend RT PCRs Done
26,048,524 UART: [art] Lock RT PCRs Done
26,050,292 UART: [art] Populate DV Done
26,055,653 UART: [fht] FMC Alias Private Key: 7
26,057,225 UART: [art] Derive CDI
26,057,996 UART: [art] Store in in slot 0x4
26,100,243 UART: [art] Derive Key Pair
26,101,287 UART: [art] Store priv key in slot 0x5
29,343,296 UART: [art] Derive Key Pair - Done
29,356,236 UART: [art] Signing Cert with AUTHO
29,357,539 UART: RITY.KEYID = 7
31,636,962 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,462 UART: [art] PUB.X = 7DCDC8D39A58B701457C447535EB84CA5EBABE52C7CDCC0A6D8B1FB95B6F9DF33BA8509DD45D01B1E471C9D131A5DA7E
31,645,722 UART: [art] PUB.Y = 017540DC2680E98CCC378F991E83037B69102EF9C6EF2C344AAD8142FD7F077A455D75B6DB45D4C24BA73E4418C9E838
31,652,973 UART: [art] SIG.R = AF06CC7A22268319D1428E2F6CF89B3734C81AAB34506F5F376F4465E1F30B20742EFCE057938EC4787063633B61F24A
31,660,349 UART: [art] SIG.S = 0204092363701318E4563E9CB28F1C1C7C7487D590F010DF453FFF4BD1BC959299489900AE8160F2534DCBAA8CDD9A62
32,964,927 UART: Caliptra RT
32,965,638 UART: [state] CFI Enabled
33,082,940 UART: [rt] RT listening for mailbox commands...
33,084,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,116,177 UART: [rt]cmd =0x44504543, len=96
38,788,313 >>> mbox cmd response data (6236 bytes)
38,818,345 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,849,027 UART: [rt]cmd =0x53574545, len=84
44,373,577 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,145 UART:
192,510 UART: Running Caliptra ROM ...
193,614 UART:
193,761 UART: [state] CFI Enabled
262,541 UART: [state] LifecycleState = Unprovisioned
264,446 UART: [state] DebugLocked = No
266,325 UART: [state] WD Timer not started. Device not locked for debugging
270,429 UART: [kat] SHA2-256
449,542 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,182 UART: [kat] ++
461,634 UART: [kat] sha1
472,153 UART: [kat] SHA2-256
475,235 UART: [kat] SHA2-384
482,861 UART: [kat] SHA2-512-ACC
485,795 UART: [kat] ECC-384
2,947,338 UART: [kat] HMAC-384Kdf
2,971,034 UART: [kat] LMS
3,500,534 UART: [kat] --
3,505,245 UART: [cold-reset] ++
3,506,692 UART: [fht] FHT @ 0x50003400
3,516,915 UART: [idev] ++
3,517,480 UART: [idev] CDI.KEYID = 6
3,518,515 UART: [idev] SUBJECT.KEYID = 7
3,519,621 UART: [idev] UDS.KEYID = 0
3,520,549 ready_for_fw is high
3,520,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,852 UART: [idev] Erasing UDS.KEYID = 0
6,039,063 UART: [idev] Sha1 KeyId Algorithm
6,061,961 UART: [idev] --
6,066,857 UART: [ldev] ++
6,067,446 UART: [ldev] CDI.KEYID = 6
6,068,364 UART: [ldev] SUBJECT.KEYID = 5
6,069,530 UART: [ldev] AUTHORITY.KEYID = 7
6,070,823 UART: [ldev] FE.KEYID = 1
6,111,666 UART: [ldev] Erasing FE.KEYID = 1
8,616,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,419,988 UART: [ldev] --
10,425,413 UART: [fwproc] Wait for Commands...
10,428,105 UART: [fwproc] Recv command 0x46574c44
10,430,201 UART: [fwproc] Recv'd Img size: 114168 bytes
13,831,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,904,446 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,973,204 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,290,111 >>> mbox cmd response: success
14,294,044 UART: [afmc] ++
14,294,647 UART: [afmc] CDI.KEYID = 6
14,295,563 UART: [afmc] SUBJECT.KEYID = 7
14,296,907 UART: [afmc] AUTHORITY.KEYID = 5
16,840,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,560,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,562,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,578,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,594,675 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,610,525 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,633,629 UART: [afmc] --
18,637,831 UART: [cold-reset] --
18,643,155 UART: [state] Locking Datavault
18,647,701 UART: [state] Locking PCR0, PCR1 and PCR31
18,649,362 UART: [state] Locking ICCM
18,651,135 UART: [exit] Launching FMC @ 0x40000130
18,659,536 UART:
18,659,770 UART: Running Caliptra FMC ...
18,660,865 UART:
18,661,021 UART: [state] CFI Enabled
18,720,328 UART: [fht] FMC Alias Private Key: 7
20,484,260 UART: [art] Extend RT PCRs Done
20,485,480 UART: [art] Lock RT PCRs Done
20,487,243 UART: [art] Populate DV Done
20,492,547 UART: [fht] FMC Alias Private Key: 7
20,494,095 UART: [art] Derive CDI
20,494,912 UART: [art] Store in in slot 0x4
20,553,195 UART: [art] Derive Key Pair
20,554,230 UART: [art] Store priv key in slot 0x5
23,017,399 UART: [art] Derive Key Pair - Done
23,030,719 UART: [art] Signing Cert with AUTHO
23,032,034 UART: RITY.KEYID = 7
24,743,407 UART: [art] Erasing AUTHORITY.KEYID = 7
24,744,908 UART: [art] PUB.X = 5C083CC5B949AEBE03AC27E9BFDF470CF52D5BE9423BC7F8B0256486F3DAAEBFE97886A14891F924B624B381C25EF046
24,752,221 UART: [art] PUB.Y = 51CC2CA4AE96D31B1FB2242D4D5717F987A811E366F974065812F3099943BF554232D164D72DD1490E262F8C19AC1983
24,759,462 UART: [art] SIG.R = C653A07DCB6932D5625A8B1E3B9EC2AAACD5DDD25E054E47198EF5B592865BBE6913A7C5A16EB70EFD54B97E74A278E3
24,766,858 UART: [art] SIG.S = 02E4370F54BC34D852BA33F89F3EB4D61DE8CF8848D1BF67DE5DA0DCB40A52531B5E09DBF4B0A4B46A73C8450B999ECE
25,745,460 UART: Caliptra RT
25,746,176 UART: [state] CFI Enabled
25,911,462 UART: [rt] RT listening for mailbox commands...
25,913,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,944,991 UART: [rt]cmd =0x44504543, len=96
30,324,726 >>> mbox cmd response data (6236 bytes)
30,354,629 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,385,273 UART: [rt]cmd =0x53574545, len=84
34,562,040 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,380,709 ready_for_fw is high
3,381,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,066,121 >>> mbox cmd response: success
18,362,913 UART:
18,363,314 UART: Running Caliptra FMC ...
18,364,459 UART:
18,364,621 UART: [state] CFI Enabled
18,432,839 UART: [fht] FMC Alias Private Key: 7
20,196,589 UART: [art] Extend RT PCRs Done
20,197,823 UART: [art] Lock RT PCRs Done
20,199,526 UART: [art] Populate DV Done
20,204,848 UART: [fht] FMC Alias Private Key: 7
20,206,393 UART: [art] Derive CDI
20,207,213 UART: [art] Store in in slot 0x4
20,266,586 UART: [art] Derive Key Pair
20,267,630 UART: [art] Store priv key in slot 0x5
22,729,990 UART: [art] Derive Key Pair - Done
22,742,726 UART: [art] Signing Cert with AUTHO
22,744,070 UART: RITY.KEYID = 7
24,456,198 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,685 UART: [art] PUB.X = D2063D00637EFE4EB11543BE9AEC262EA02910E628E6586BCAB5C0C64C3CE6595A462A9EFAD9CF10D5187D69C5EAA903
24,464,968 UART: [art] PUB.Y = 1100E571172E21527A2304B433C7F37361CECB02BB71C4E0BBC918558BB0B7ED0720F5FB76E050B2D19EECD4C28EE9C9
24,472,267 UART: [art] SIG.R = 816FA02DBD73CE61B4F385046B8C37340F0C26374F15220244EE0CC7F4E07695B0B695F8367CA62E6B0CEA5AE9112173
24,479,653 UART: [art] SIG.S = C6BD5D0426821C3C75D1864D87FE69B3AE1D876CC557A10C7F987EB88D8B6968F4B3CD3099D785C1797DB93C0147657F
25,458,287 UART: Caliptra RT
25,459,003 UART: [state] CFI Enabled
25,625,180 UART: [rt] RT listening for mailbox commands...
25,627,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,658,682 UART: [rt]cmd =0x44504543, len=96
30,037,478 >>> mbox cmd response data (6236 bytes)
30,067,682 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,098,495 UART: [rt]cmd =0x53574545, len=84
34,275,633 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
193,115 UART:
193,470 UART: Running Caliptra ROM ...
194,581 UART:
604,107 UART: [state] CFI Enabled
618,171 UART: [state] LifecycleState = Unprovisioned
620,086 UART: [state] DebugLocked = No
621,765 UART: [state] WD Timer not started. Device not locked for debugging
625,309 UART: [kat] SHA2-256
804,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,045 UART: [kat] ++
816,495 UART: [kat] sha1
828,362 UART: [kat] SHA2-256
831,374 UART: [kat] SHA2-384
837,171 UART: [kat] SHA2-512-ACC
840,107 UART: [kat] ECC-384
3,280,321 UART: [kat] HMAC-384Kdf
3,292,559 UART: [kat] LMS
3,822,098 UART: [kat] --
3,825,661 UART: [cold-reset] ++
3,827,589 UART: [fht] FHT @ 0x50003400
3,838,433 UART: [idev] ++
3,838,998 UART: [idev] CDI.KEYID = 6
3,839,914 UART: [idev] SUBJECT.KEYID = 7
3,841,099 UART: [idev] UDS.KEYID = 0
3,842,092 ready_for_fw is high
3,842,306 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,775 UART: [idev] Erasing UDS.KEYID = 0
6,311,505 UART: [idev] Sha1 KeyId Algorithm
6,334,021 UART: [idev] --
6,338,739 UART: [ldev] ++
6,339,309 UART: [ldev] CDI.KEYID = 6
6,340,220 UART: [ldev] SUBJECT.KEYID = 5
6,341,434 UART: [ldev] AUTHORITY.KEYID = 7
6,342,665 UART: [ldev] FE.KEYID = 1
6,352,829 UART: [ldev] Erasing FE.KEYID = 1
8,826,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,610,549 UART: [ldev] --
10,615,577 UART: [fwproc] Wait for Commands...
10,617,186 UART: [fwproc] Recv command 0x46574c44
10,619,281 UART: [fwproc] Recv'd Img size: 114168 bytes
14,019,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,088,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,157,040 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,474,769 >>> mbox cmd response: success
14,479,338 UART: [afmc] ++
14,479,935 UART: [afmc] CDI.KEYID = 6
14,480,846 UART: [afmc] SUBJECT.KEYID = 7
14,482,008 UART: [afmc] AUTHORITY.KEYID = 5
16,982,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,702,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,704,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,720,045 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,736,046 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,751,909 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,775,073 UART: [afmc] --
18,778,006 UART: [cold-reset] --
18,781,551 UART: [state] Locking Datavault
18,787,307 UART: [state] Locking PCR0, PCR1 and PCR31
18,788,950 UART: [state] Locking ICCM
18,791,103 UART: [exit] Launching FMC @ 0x40000130
18,799,556 UART:
18,799,789 UART: Running Caliptra FMC ...
18,800,890 UART:
18,801,058 UART: [state] CFI Enabled
18,808,948 UART: [fht] FMC Alias Private Key: 7
20,565,914 UART: [art] Extend RT PCRs Done
20,567,136 UART: [art] Lock RT PCRs Done
20,568,652 UART: [art] Populate DV Done
20,574,118 UART: [fht] FMC Alias Private Key: 7
20,575,817 UART: [art] Derive CDI
20,576,635 UART: [art] Store in in slot 0x4
20,618,915 UART: [art] Derive Key Pair
20,619,947 UART: [art] Store priv key in slot 0x5
23,047,188 UART: [art] Derive Key Pair - Done
23,060,026 UART: [art] Signing Cert with AUTHO
23,061,334 UART: RITY.KEYID = 7
24,767,114 UART: [art] Erasing AUTHORITY.KEYID = 7
24,768,616 UART: [art] PUB.X = AF29A9F85559AF3359A6CB167A0D4D4BC375374A2FA77107F8D3523A61F53D2D08FBDB357843751B80104FB86C6B120F
24,775,896 UART: [art] PUB.Y = 2EBE274BA5F9675B1AFD736774F8AB2B71FFC3DC92B50B02E1281ACAE5C875866BDF807F9891954BC1101E869F4F605E
24,783,166 UART: [art] SIG.R = 0E1E711AAA0A1A47E5784E23E7229793230B636AF4283CB8536CFB5D8541B73B75DD7FFCD290D9867DBB74EAFDF5EEF6
24,790,569 UART: [art] SIG.S = F3616AE26E98ED5696C9DAE02D0102591FC71E9021DD5FEC01D84C766754FB7264A4EC9CC63821F417380CD861B95662
25,769,078 UART: Caliptra RT
25,769,769 UART: [state] CFI Enabled
25,887,802 UART: [rt] RT listening for mailbox commands...
25,889,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,921,151 UART: [rt]cmd =0x44504543, len=96
30,204,558 >>> mbox cmd response data (6236 bytes)
30,234,677 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,265,091 UART: [rt]cmd =0x53574545, len=84
34,399,859 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,809 writing to cptra_bootfsm_go
3,701,875 ready_for_fw is high
3,702,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,989 >>> mbox cmd response: success
18,525,427 UART:
18,525,809 UART: Running Caliptra FMC ...
18,526,926 UART:
18,527,079 UART: [state] CFI Enabled
18,535,143 UART: [fht] FMC Alias Private Key: 7
20,292,381 UART: [art] Extend RT PCRs Done
20,293,603 UART: [art] Lock RT PCRs Done
20,295,533 UART: [art] Populate DV Done
20,300,913 UART: [fht] FMC Alias Private Key: 7
20,302,451 UART: [art] Derive CDI
20,303,186 UART: [art] Store in in slot 0x4
20,346,262 UART: [art] Derive Key Pair
20,347,261 UART: [art] Store priv key in slot 0x5
22,774,330 UART: [art] Derive Key Pair - Done
22,787,438 UART: [art] Signing Cert with AUTHO
22,788,744 UART: RITY.KEYID = 7
24,493,991 UART: [art] Erasing AUTHORITY.KEYID = 7
24,495,504 UART: [art] PUB.X = 125EF54E19ED879314AB5A250443ABA20AF9F392D438F143A9E74BAD2DC44897907F48360EE73E521ED290BFD591DA2C
24,502,761 UART: [art] PUB.Y = 20F43742DCAE18BDBB0A8DAE1302768774056D80375F6486CE763929D6327503E202289C4FEB67D4179617EED20A2B56
24,510,013 UART: [art] SIG.R = 3DA24A3C1C71258914AD91A5E565452E282CD0FE7C27E4C7EAD326429117228DD7D556B7A2343100313378AA5FA1ED87
24,517,350 UART: [art] SIG.S = B6A82033D48897C364D045558308BC464F88A0840E23F40321026BE63D9137538FAE8B22B99A1196066CF1348FCC92C7
25,496,051 UART: Caliptra RT
25,496,770 UART: [state] CFI Enabled
25,613,998 UART: [rt] RT listening for mailbox commands...
25,615,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,647,126 UART: [rt]cmd =0x44504543, len=96
29,929,471 >>> mbox cmd response data (6236 bytes)
29,959,515 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,989,944 UART: [rt]cmd =0x53574545, len=84
34,125,703 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
192,239 UART:
192,599 UART: Running Caliptra ROM ...
193,736 UART:
194,306 UART: [state] CFI Enabled
267,247 UART: [state] LifecycleState = Unprovisioned
269,619 UART: [state] DebugLocked = No
271,142 UART: [state] WD Timer not started. Device not locked for debugging
275,764 UART: [kat] SHA2-256
465,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,399 UART: [kat] ++
476,873 UART: [kat] sha1
489,024 UART: [kat] SHA2-256
492,043 UART: [kat] SHA2-384
498,484 UART: [kat] SHA2-512-ACC
501,069 UART: [kat] ECC-384
2,949,923 UART: [kat] HMAC-384Kdf
2,972,542 UART: [kat] LMS
3,504,358 UART: [kat] --
3,508,994 UART: [cold-reset] ++
3,509,941 UART: [fht] FHT @ 0x50003400
3,521,201 UART: [idev] ++
3,521,906 UART: [idev] CDI.KEYID = 6
3,522,861 UART: [idev] SUBJECT.KEYID = 7
3,524,035 UART: [idev] UDS.KEYID = 0
3,524,937 ready_for_fw is high
3,525,132 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,722 UART: [idev] Erasing UDS.KEYID = 0
6,029,778 UART: [idev] Sha1 KeyId Algorithm
6,052,303 UART: [idev] --
6,057,703 UART: [ldev] ++
6,058,400 UART: [ldev] CDI.KEYID = 6
6,059,293 UART: [ldev] SUBJECT.KEYID = 5
6,060,510 UART: [ldev] AUTHORITY.KEYID = 7
6,061,694 UART: [ldev] FE.KEYID = 1
6,101,163 UART: [ldev] Erasing FE.KEYID = 1
8,604,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,611 UART: [ldev] --
10,416,849 UART: [fwproc] Wait for Commands...
10,419,645 UART: [fwproc] Recv command 0x46574c44
10,421,897 UART: [fwproc] Recv'd Img size: 114168 bytes
13,870,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,603,789 >>> mbox cmd response: success
14,607,352 UART: [afmc] ++
14,608,068 UART: [afmc] CDI.KEYID = 6
14,609,196 UART: [afmc] SUBJECT.KEYID = 7
14,610,755 UART: [afmc] AUTHORITY.KEYID = 5
17,149,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,920 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,991 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,493 UART: [afmc] --
18,947,499 UART: [cold-reset] --
18,951,696 UART: [state] Locking Datavault
18,957,250 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,408 UART: [state] Locking ICCM
18,960,791 UART: [exit] Launching FMC @ 0x40000130
18,969,484 UART:
18,969,720 UART: Running Caliptra FMC ...
18,970,748 UART:
18,970,894 UART: [state] CFI Enabled
19,029,638 UART: [fht] FMC Alias Private Key: 7
20,794,123 UART: [art] Extend RT PCRs Done
20,795,350 UART: [art] Lock RT PCRs Done
20,796,948 UART: [art] Populate DV Done
20,802,421 UART: [fht] FMC Alias Private Key: 7
20,804,009 UART: [art] Derive CDI
20,804,755 UART: [art] Store in in slot 0x4
20,861,960 UART: [art] Derive Key Pair
20,863,003 UART: [art] Store priv key in slot 0x5
23,326,310 UART: [art] Derive Key Pair - Done
23,339,471 UART: [art] Signing Cert with AUTHO
23,340,774 UART: RITY.KEYID = 7
25,051,688 UART: [art] Erasing AUTHORITY.KEYID = 7
25,053,203 UART: [art] PUB.X = 5C58AA56AE8C66499F11FAC7EA11D40A9A084E45DE5651AB90622B184C47CE00C8EE129C00F3292B88AA00CBF837C211
25,060,421 UART: [art] PUB.Y = 0CAD500C848D47B0EFDA526791F2482EBB2432D0E1890F3D14BD056A7575A22AD2B99D71652E8B36B6A2F6AC1A2318FF
25,067,685 UART: [art] SIG.R = E572D6899B2F302C052088123149A55D11ECBDC9E6E75DBBB5D33B92B226165DDB98415D1C0BBC7331935A57452BAF03
25,075,156 UART: [art] SIG.S = A02650AB5D0959E859C3061EB80CB21F51B31F3786BD3EEE5C5583F7A845BB1AC9890911F5D2F317215C7FB22A1BDDE6
26,053,582 UART: Caliptra RT
26,054,297 UART: [state] CFI Enabled
26,219,966 UART: [rt] RT listening for mailbox commands...
26,221,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,253,092 UART: [rt]cmd =0x44504543, len=96
30,611,459 >>> mbox cmd response data (6236 bytes)
30,641,310 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,671,876 UART: [rt]cmd =0x53574545, len=84
34,850,527 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,434,322 ready_for_fw is high
3,434,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,732,529 >>> mbox cmd response: success
19,021,253 UART:
19,021,706 UART: Running Caliptra FMC ...
19,022,825 UART:
19,022,983 UART: [state] CFI Enabled
19,088,223 UART: [fht] FMC Alias Private Key: 7
20,852,684 UART: [art] Extend RT PCRs Done
20,853,917 UART: [art] Lock RT PCRs Done
20,855,461 UART: [art] Populate DV Done
20,860,891 UART: [fht] FMC Alias Private Key: 7
20,862,498 UART: [art] Derive CDI
20,863,240 UART: [art] Store in in slot 0x4
20,920,924 UART: [art] Derive Key Pair
20,921,932 UART: [art] Store priv key in slot 0x5
23,384,498 UART: [art] Derive Key Pair - Done
23,397,557 UART: [art] Signing Cert with AUTHO
23,398,870 UART: RITY.KEYID = 7
25,110,325 UART: [art] Erasing AUTHORITY.KEYID = 7
25,111,824 UART: [art] PUB.X = 0A285747842D6B744CAE0632DA1EAFCC1D582B94DD7051903994CB8D45FC8786A0C5A9255548C1EB3F87E1ED3A12392B
25,119,123 UART: [art] PUB.Y = 931FBA4623AF6AD632C20A360DD07FFAB129AF63554657AF435E4759DE53B587B193372864058CB0E235E49663C28DBC
25,126,397 UART: [art] SIG.R = 23B133FB6002F304243800A65D64DF5DDAA90AE751DB0BF08CBB9DFC3A7627A7765809E2495D452630BD926E38A0B191
25,133,777 UART: [art] SIG.S = BA2EF8786DE8C1870D775D507544A80019941FF6DB465580139D55AD856D9C17976FEA88B240726268DBE67BF63181A7
26,113,495 UART: Caliptra RT
26,114,213 UART: [state] CFI Enabled
26,278,561 UART: [rt] RT listening for mailbox commands...
26,280,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,311,913 UART: [rt]cmd =0x44504543, len=96
30,690,450 >>> mbox cmd response data (6236 bytes)
30,720,549 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,750,959 UART: [rt]cmd =0x53574545, len=84
34,927,110 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,651 writing to cptra_bootfsm_go
192,763 UART:
193,156 UART: Running Caliptra ROM ...
194,355 UART:
603,772 UART: [state] CFI Enabled
616,728 UART: [state] LifecycleState = Unprovisioned
619,110 UART: [state] DebugLocked = No
620,431 UART: [state] WD Timer not started. Device not locked for debugging
624,960 UART: [kat] SHA2-256
814,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,668 UART: [kat] ++
826,115 UART: [kat] sha1
838,693 UART: [kat] SHA2-256
841,707 UART: [kat] SHA2-384
847,772 UART: [kat] SHA2-512-ACC
850,356 UART: [kat] ECC-384
3,291,473 UART: [kat] HMAC-384Kdf
3,304,698 UART: [kat] LMS
3,836,545 UART: [kat] --
3,839,970 UART: [cold-reset] ++
3,842,539 UART: [fht] FHT @ 0x50003400
3,853,318 UART: [idev] ++
3,854,014 UART: [idev] CDI.KEYID = 6
3,854,941 UART: [idev] SUBJECT.KEYID = 7
3,856,191 UART: [idev] UDS.KEYID = 0
3,857,118 ready_for_fw is high
3,857,309 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,550 UART: [idev] Erasing UDS.KEYID = 0
6,337,793 UART: [idev] Sha1 KeyId Algorithm
6,360,689 UART: [idev] --
6,365,376 UART: [ldev] ++
6,366,050 UART: [ldev] CDI.KEYID = 6
6,366,962 UART: [ldev] SUBJECT.KEYID = 5
6,368,174 UART: [ldev] AUTHORITY.KEYID = 7
6,369,350 UART: [ldev] FE.KEYID = 1
6,379,351 UART: [ldev] Erasing FE.KEYID = 1
8,864,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,017 UART: [ldev] --
10,656,604 UART: [fwproc] Wait for Commands...
10,659,030 UART: [fwproc] Recv command 0x46574c44
10,661,289 UART: [fwproc] Recv'd Img size: 114168 bytes
14,113,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,563 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,309,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,851,258 >>> mbox cmd response: success
14,855,623 UART: [afmc] ++
14,856,331 UART: [afmc] CDI.KEYID = 6
14,857,571 UART: [afmc] SUBJECT.KEYID = 7
14,859,005 UART: [afmc] AUTHORITY.KEYID = 5
17,355,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,540 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,742 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,939 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,148,647 UART: [afmc] --
19,152,245 UART: [cold-reset] --
19,156,054 UART: [state] Locking Datavault
19,160,446 UART: [state] Locking PCR0, PCR1 and PCR31
19,162,581 UART: [state] Locking ICCM
19,164,367 UART: [exit] Launching FMC @ 0x40000130
19,173,046 UART:
19,173,285 UART: Running Caliptra FMC ...
19,174,385 UART:
19,174,549 UART: [state] CFI Enabled
19,182,813 UART: [fht] FMC Alias Private Key: 7
20,939,924 UART: [art] Extend RT PCRs Done
20,941,145 UART: [art] Lock RT PCRs Done
20,943,099 UART: [art] Populate DV Done
20,948,405 UART: [fht] FMC Alias Private Key: 7
20,949,950 UART: [art] Derive CDI
20,950,770 UART: [art] Store in in slot 0x4
20,993,307 UART: [art] Derive Key Pair
20,994,348 UART: [art] Store priv key in slot 0x5
23,421,585 UART: [art] Derive Key Pair - Done
23,434,309 UART: [art] Signing Cert with AUTHO
23,435,611 UART: RITY.KEYID = 7
25,141,498 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,004 UART: [art] PUB.X = 32476C4BA6576A9FCED9AC34D11483B9EA90953827ACF37CA0D9962DE7A05590B4416ED58A43343916B80CDDCCFBD158
25,150,307 UART: [art] PUB.Y = 3224C0D4AE0B8B3A49056160235470B62227523BD64000A0A0F92BDC4C88693FA7AF504E2C5B3D8EB6082DC7CD0D5EDF
25,157,538 UART: [art] SIG.R = 52951B77E88C615277014E43F53236ED6F7A5E32098939CA7BEEB28247172FC718FB38D00AD9FED080804503A1F56764
25,164,926 UART: [art] SIG.S = 1C9C16ED62F430E68247884628C0E672C41B55FA06B4E3F8B73670C52B11A4505D7B98754A5516AAE52A6234325FAB32
26,143,939 UART: Caliptra RT
26,144,640 UART: [state] CFI Enabled
26,261,863 UART: [rt] RT listening for mailbox commands...
26,263,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,294,747 UART: [rt]cmd =0x44504543, len=96
30,576,825 >>> mbox cmd response data (6236 bytes)
30,606,694 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,637,143 UART: [rt]cmd =0x53574545, len=84
34,772,320 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,726 writing to cptra_bootfsm_go
3,758,646 ready_for_fw is high
3,759,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,952,293 >>> mbox cmd response: success
19,213,007 UART:
19,213,407 UART: Running Caliptra FMC ...
19,214,599 UART:
19,214,769 UART: [state] CFI Enabled
19,222,657 UART: [fht] FMC Alias Private Key: 7
20,979,329 UART: [art] Extend RT PCRs Done
20,980,540 UART: [art] Lock RT PCRs Done
20,982,250 UART: [art] Populate DV Done
20,987,675 UART: [fht] FMC Alias Private Key: 7
20,989,128 UART: [art] Derive CDI
20,990,053 UART: [art] Store in in slot 0x4
21,032,942 UART: [art] Derive Key Pair
21,034,017 UART: [art] Store priv key in slot 0x5
23,461,168 UART: [art] Derive Key Pair - Done
23,473,909 UART: [art] Signing Cert with AUTHO
23,475,220 UART: RITY.KEYID = 7
25,179,808 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,316 UART: [art] PUB.X = AD0C355E911F664B0B9E461B6B5F988968B995EE0F6A9D423040C71003FC128DFC847F3B1FE507AC32EABBFA5C8CEEFC
25,188,559 UART: [art] PUB.Y = B778846B2A1704C74A95712B84E3CD4C73D179498EBA46433CF19DDEBEE0557372CB3DFD351C9073F67337E7ADF366DF
25,195,853 UART: [art] SIG.R = 19AA391DBF69975E6C67B59F822DD5CDBDFEDCE194948DF9880CD085F27E793A0B6DE02386D2DDB82A4BA486ECA0B94E
25,203,246 UART: [art] SIG.S = D1E156845D73792B76955B0EBA3D3A62F45C44B5C39350D49E9653D85EBCD77CFEB6910AB0549AD7889DC0E0DBF9B583
26,182,229 UART: Caliptra RT
26,182,923 UART: [state] CFI Enabled
26,300,157 UART: [rt] RT listening for mailbox commands...
26,302,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,326 UART: [rt]cmd =0x44504543, len=96
30,616,360 >>> mbox cmd response data (6236 bytes)
30,646,302 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,677,024 UART: [rt]cmd =0x53574545, len=84
34,812,557 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
895,052 UART: [kat] SHA2-512-ACC
896,953 UART: [kat] ECC-384
902,784 UART: [kat] HMAC-384Kdf
907,238 UART: [kat] LMS
1,475,434 UART: [kat] --
1,476,349 UART: [cold-reset] ++
1,476,711 UART: [fht] Storing FHT @ 0x50003400
1,479,470 UART: [idev] ++
1,479,638 UART: [idev] CDI.KEYID = 6
1,479,998 UART: [idev] SUBJECT.KEYID = 7
1,480,422 UART: [idev] UDS.KEYID = 0
1,480,767 ready_for_fw is high
1,480,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,516 UART: [idev] Erasing UDS.KEYID = 0
1,504,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,056 UART: [idev] --
1,513,953 UART: [ldev] ++
1,514,121 UART: [ldev] CDI.KEYID = 6
1,514,484 UART: [ldev] SUBJECT.KEYID = 5
1,514,910 UART: [ldev] AUTHORITY.KEYID = 7
1,515,373 UART: [ldev] FE.KEYID = 1
1,520,747 UART: [ldev] Erasing FE.KEYID = 1
1,546,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,198 UART: [ldev] --
1,585,677 UART: [fwproc] Waiting for Commands...
1,586,312 UART: [fwproc] Received command 0x46574c44
1,587,103 UART: [fwproc] Received Image of size 114168 bytes
2,883,113 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,439 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,791 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,366 >>> mbox cmd response: success
3,075,424 UART: [afmc] ++
3,075,592 UART: [afmc] CDI.KEYID = 6
3,075,954 UART: [afmc] SUBJECT.KEYID = 7
3,076,379 UART: [afmc] AUTHORITY.KEYID = 5
3,111,284 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,728 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,121 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,811 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,618 UART: [afmc] --
3,154,644 UART: [cold-reset] --
3,155,426 UART: [state] Locking Datavault
3,156,535 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,139 UART: [state] Locking ICCM
3,157,705 UART: [exit] Launching FMC @ 0x40000130
3,163,034 UART:
3,163,050 UART: Running Caliptra FMC ...
3,163,458 UART:
3,163,512 UART: [state] CFI Enabled
3,173,967 UART: [fht] FMC Alias Private Key: 7
3,281,214 UART: [art] Extend RT PCRs Done
3,281,642 UART: [art] Lock RT PCRs Done
3,283,052 UART: [art] Populate DV Done
3,291,113 UART: [fht] FMC Alias Private Key: 7
3,292,103 UART: [art] Derive CDI
3,292,383 UART: [art] Store in in slot 0x4
3,377,848 UART: [art] Derive Key Pair
3,378,208 UART: [art] Store priv key in slot 0x5
3,390,906 UART: [art] Derive Key Pair - Done
3,405,955 UART: [art] Signing Cert with AUTHO
3,406,435 UART: RITY.KEYID = 7
3,421,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,112 UART: [art] PUB.X = E3F8C73A20CECD31E90892B36DDFAEF725A06DB065912C6942E35227AB10CFC7725F2BC9AE43BDE489650589D46E81A3
3,428,888 UART: [art] PUB.Y = 8AB87EDB49629BFAF9B0B6FDAA054438A8047C4900005A160B54749DBAAD23ADA26513EFF0FF6754523348076CA34FD5
3,435,792 UART: [art] SIG.R = 6BFBF034F05F13A53F240722CB70F2AB1B32417BFFBFCE90E01E54E819E3602AF9D85C56F54A153336F087A2E9696C04
3,442,564 UART: [art] SIG.S = D31AEF4618B75FAC06A61EFD1376C7F22D729323786A2A9CDE65CCAC5B638B96A662D5FE6FDA8CD394D3FCB9A275C3B4
3,466,618 UART: Caliptra RT
3,466,871 UART: [state] CFI Enabled
3,574,694 UART: [rt] RT listening for mailbox commands...
3,575,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,940 UART: [rt]cmd =0x44504543, len=96
3,786,697 >>> mbox cmd response data (6236 bytes)
3,786,698 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,749 UART: [rt]cmd =0x53574545, len=84
3,842,646 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,369 ready_for_fw is high
1,362,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,528 >>> mbox cmd response: success
2,987,862 UART:
2,987,878 UART: Running Caliptra FMC ...
2,988,286 UART:
2,988,340 UART: [state] CFI Enabled
2,998,877 UART: [fht] FMC Alias Private Key: 7
3,106,746 UART: [art] Extend RT PCRs Done
3,107,174 UART: [art] Lock RT PCRs Done
3,108,860 UART: [art] Populate DV Done
3,116,967 UART: [fht] FMC Alias Private Key: 7
3,118,089 UART: [art] Derive CDI
3,118,369 UART: [art] Store in in slot 0x4
3,204,246 UART: [art] Derive Key Pair
3,204,606 UART: [art] Store priv key in slot 0x5
3,218,064 UART: [art] Derive Key Pair - Done
3,232,810 UART: [art] Signing Cert with AUTHO
3,233,290 UART: RITY.KEYID = 7
3,248,518 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,283 UART: [art] PUB.X = BB47CA93C84035F98A0CE03E3261E0FE40EF154A294C98A263371481EA1ADC777B9A67F67EAD4A67BFF338F5FF2E41AF
3,256,066 UART: [art] PUB.Y = 266FD85953F57C02CFE765DA55C6AEE37E7772CC1A92ACE24BAB2B4EE7F413AF51A5684F6777504D4DFFD694163428B4
3,263,025 UART: [art] SIG.R = C06A4D1D4C75686F92357C43DF1A326FB3688C973C030E94C2841728AFB66B2CC35502167AAEB9430297E0FF99433666
3,269,779 UART: [art] SIG.S = 928B7B49E6B94A9FBE01E54AC6E4B0FE01E5CB8D6629A3E5FF201C071BE37F1FC3506DD20353995185CFAF37D4DF0DD9
3,293,839 UART: Caliptra RT
3,294,092 UART: [state] CFI Enabled
3,403,418 UART: [rt] RT listening for mailbox commands...
3,404,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,526 UART: [rt]cmd =0x44504543, len=96
3,615,026 >>> mbox cmd response data (6236 bytes)
3,615,027 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,688 UART: [rt]cmd =0x53574545, len=84
3,670,315 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,440 UART: [kat] SHA2-256
892,378 UART: [kat] SHA2-384
895,091 UART: [kat] SHA2-512-ACC
896,992 UART: [kat] ECC-384
902,503 UART: [kat] HMAC-384Kdf
907,163 UART: [kat] LMS
1,475,359 UART: [kat] --
1,476,182 UART: [cold-reset] ++
1,476,528 UART: [fht] Storing FHT @ 0x50003400
1,479,295 UART: [idev] ++
1,479,463 UART: [idev] CDI.KEYID = 6
1,479,823 UART: [idev] SUBJECT.KEYID = 7
1,480,247 UART: [idev] UDS.KEYID = 0
1,480,592 ready_for_fw is high
1,480,592 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,163 UART: [idev] Erasing UDS.KEYID = 0
1,505,313 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,803 UART: [idev] --
1,514,864 UART: [ldev] ++
1,515,032 UART: [ldev] CDI.KEYID = 6
1,515,395 UART: [ldev] SUBJECT.KEYID = 5
1,515,821 UART: [ldev] AUTHORITY.KEYID = 7
1,516,284 UART: [ldev] FE.KEYID = 1
1,521,460 UART: [ldev] Erasing FE.KEYID = 1
1,546,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,565 UART: [ldev] --
1,585,928 UART: [fwproc] Waiting for Commands...
1,586,791 UART: [fwproc] Received command 0x46574c44
1,587,582 UART: [fwproc] Received Image of size 114168 bytes
2,883,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,750 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,277 >>> mbox cmd response: success
3,076,453 UART: [afmc] ++
3,076,621 UART: [afmc] CDI.KEYID = 6
3,076,983 UART: [afmc] SUBJECT.KEYID = 7
3,077,408 UART: [afmc] AUTHORITY.KEYID = 5
3,113,013 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,081 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,966 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,656 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,561 UART: [afmc] --
3,156,669 UART: [cold-reset] --
3,157,359 UART: [state] Locking Datavault
3,158,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,146 UART: [state] Locking ICCM
3,159,740 UART: [exit] Launching FMC @ 0x40000130
3,165,069 UART:
3,165,085 UART: Running Caliptra FMC ...
3,165,493 UART:
3,165,636 UART: [state] CFI Enabled
3,176,239 UART: [fht] FMC Alias Private Key: 7
3,283,914 UART: [art] Extend RT PCRs Done
3,284,342 UART: [art] Lock RT PCRs Done
3,285,978 UART: [art] Populate DV Done
3,294,389 UART: [fht] FMC Alias Private Key: 7
3,295,499 UART: [art] Derive CDI
3,295,779 UART: [art] Store in in slot 0x4
3,381,146 UART: [art] Derive Key Pair
3,381,506 UART: [art] Store priv key in slot 0x5
3,394,528 UART: [art] Derive Key Pair - Done
3,409,473 UART: [art] Signing Cert with AUTHO
3,409,953 UART: RITY.KEYID = 7
3,424,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,734 UART: [art] PUB.X = 1B3EEF8F126321815E0B0CFEFB8615B5C788358E9BFE3244AF54D8A88149407FBC8D413B9A9DF6E0E8680FFA22FE7260
3,432,507 UART: [art] PUB.Y = 2752958A581D6DA52425E50874665A1489AB88E5FE18A8E41BA4A55BF96B7A418CC2CA987B1EACDC7AFF69F7E7F4CFEF
3,439,472 UART: [art] SIG.R = 749417A6B7625FA5FACB9A74F480DE7CCE96CE6AEF6A569D77F4ECC16B067505756027254705BF9D45EE385903FDA763
3,446,238 UART: [art] SIG.S = AB3348D578D00BB693DF5431C4E3157B0C0397A62F4F9E90BFC92EBB2B23CB04164F0D96AB4B71B3E4A1651FA55332D9
3,469,974 UART: Caliptra RT
3,470,319 UART: [state] CFI Enabled
3,577,832 UART: [rt] RT listening for mailbox commands...
3,578,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,846 UART: [rt]cmd =0x44504543, len=96
3,789,362 >>> mbox cmd response data (6236 bytes)
3,789,363 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,238 UART: [rt]cmd =0x53574545, len=84
3,844,753 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,242 ready_for_fw is high
1,363,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,735 >>> mbox cmd response: success
2,989,353 UART:
2,989,369 UART: Running Caliptra FMC ...
2,989,777 UART:
2,989,920 UART: [state] CFI Enabled
3,000,463 UART: [fht] FMC Alias Private Key: 7
3,108,088 UART: [art] Extend RT PCRs Done
3,108,516 UART: [art] Lock RT PCRs Done
3,110,042 UART: [art] Populate DV Done
3,118,091 UART: [fht] FMC Alias Private Key: 7
3,119,185 UART: [art] Derive CDI
3,119,465 UART: [art] Store in in slot 0x4
3,205,322 UART: [art] Derive Key Pair
3,205,682 UART: [art] Store priv key in slot 0x5
3,218,612 UART: [art] Derive Key Pair - Done
3,233,374 UART: [art] Signing Cert with AUTHO
3,233,854 UART: RITY.KEYID = 7
3,248,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,725 UART: [art] PUB.X = 8ECF02265DE144F591AA38029C39CA194056B648DD17BCF7ADD59D3D271153FA0F1AC79743155516D5A5A5F2FB652F9E
3,256,494 UART: [art] PUB.Y = 080C7FE7FCBD3AEB1559512FE09275B1E74B11FE0327610363D3ACF351997E8907DAD1F42549432CE581B9470C863345
3,263,424 UART: [art] SIG.R = F5728746A987421D26122062E2FD0A4BEF4B7FCECE4AC289B275DC919B27DD4C8758DB7CB40E77EA683F7A7D97D4C40A
3,270,199 UART: [art] SIG.S = F79E1EE39B37F391C1E9F5025B3F7059C31262D3E4200A275F2C88B7E8570260886A7A21B25271B3E0AB8315645C0AA9
3,294,228 UART: Caliptra RT
3,294,573 UART: [state] CFI Enabled
3,402,937 UART: [rt] RT listening for mailbox commands...
3,403,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,945 UART: [rt]cmd =0x44504543, len=96
3,614,905 >>> mbox cmd response data (6236 bytes)
3,614,906 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,849 UART: [rt]cmd =0x53574545, len=84
3,670,790 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,739 UART: [kat] SHA2-256
903,679 UART: [kat] SHA2-384
906,400 UART: [kat] SHA2-512-ACC
908,301 UART: [kat] ECC-384
918,206 UART: [kat] HMAC-384Kdf
922,704 UART: [kat] LMS
1,171,032 UART: [kat] --
1,171,831 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,175,090 UART: [idev] ++
1,175,258 UART: [idev] CDI.KEYID = 6
1,175,618 UART: [idev] SUBJECT.KEYID = 7
1,176,042 UART: [idev] UDS.KEYID = 0
1,176,387 ready_for_fw is high
1,176,387 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,776 UART: [idev] Erasing UDS.KEYID = 0
1,200,363 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,209,983 UART: [ldev] ++
1,210,151 UART: [ldev] CDI.KEYID = 6
1,210,514 UART: [ldev] SUBJECT.KEYID = 5
1,210,940 UART: [ldev] AUTHORITY.KEYID = 7
1,211,403 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,400 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,774 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,702 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,673 >>> mbox cmd response: success
2,773,807 UART: [afmc] ++
2,773,975 UART: [afmc] CDI.KEYID = 6
2,774,337 UART: [afmc] SUBJECT.KEYID = 7
2,774,762 UART: [afmc] AUTHORITY.KEYID = 5
2,809,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,316 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,558 UART: [afmc] --
2,852,542 UART: [cold-reset] --
2,853,346 UART: [state] Locking Datavault
2,854,381 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,985 UART: [state] Locking ICCM
2,855,577 UART: [exit] Launching FMC @ 0x40000130
2,860,906 UART:
2,860,922 UART: Running Caliptra FMC ...
2,861,330 UART:
2,861,384 UART: [state] CFI Enabled
2,872,177 UART: [fht] FMC Alias Private Key: 7
2,980,164 UART: [art] Extend RT PCRs Done
2,980,592 UART: [art] Lock RT PCRs Done
2,982,042 UART: [art] Populate DV Done
2,990,313 UART: [fht] FMC Alias Private Key: 7
2,991,311 UART: [art] Derive CDI
2,991,591 UART: [art] Store in in slot 0x4
3,077,196 UART: [art] Derive Key Pair
3,077,556 UART: [art] Store priv key in slot 0x5
3,091,046 UART: [art] Derive Key Pair - Done
3,106,056 UART: [art] Signing Cert with AUTHO
3,106,536 UART: RITY.KEYID = 7
3,122,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,883 UART: [art] PUB.X = 90B50B33E4E37BFA1D936A12EAE3AE798A9A3F4C1964EEBD599858E03E95D11FED56628CF87DAE3064B7DCF762AA0B63
3,129,665 UART: [art] PUB.Y = 5127BDC2673171E7FCAD0775B011090B0D45CBA5BBD5310E2DDFF24385177EEAF046FC608B7C23FCF7A494A2DB823F1F
3,136,616 UART: [art] SIG.R = 8147D05357874B8D50B8194BA94C0C72C40E29CA30B9B4EC70622C1349CD8B01E0F55FA99AAB66B20BC2F501F85C8170
3,143,375 UART: [art] SIG.S = E3F68C064854CA4761852CB56BBEA1AEE3E61E4A68B251E4D9667977476383F3016F9068A6FB3059680F88E59E4730AD
3,167,799 UART: Caliptra RT
3,168,052 UART: [state] CFI Enabled
3,275,214 UART: [rt] RT listening for mailbox commands...
3,275,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,960 UART: [rt]cmd =0x44504543, len=96
3,487,020 >>> mbox cmd response data (6236 bytes)
3,487,021 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,764 UART: [rt]cmd =0x53574545, len=84
3,542,381 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,627 ready_for_fw is high
1,059,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,414 >>> mbox cmd response: success
2,686,064 UART:
2,686,080 UART: Running Caliptra FMC ...
2,686,488 UART:
2,686,542 UART: [state] CFI Enabled
2,696,773 UART: [fht] FMC Alias Private Key: 7
2,804,968 UART: [art] Extend RT PCRs Done
2,805,396 UART: [art] Lock RT PCRs Done
2,807,014 UART: [art] Populate DV Done
2,815,301 UART: [fht] FMC Alias Private Key: 7
2,816,411 UART: [art] Derive CDI
2,816,691 UART: [art] Store in in slot 0x4
2,901,990 UART: [art] Derive Key Pair
2,902,350 UART: [art] Store priv key in slot 0x5
2,915,670 UART: [art] Derive Key Pair - Done
2,930,292 UART: [art] Signing Cert with AUTHO
2,930,772 UART: RITY.KEYID = 7
2,945,736 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,501 UART: [art] PUB.X = 7ECCEF9DE38CAD0C8FBE5FD6DD97AFA773B89714136AD2C1C03F5494A7D6A76F1DBD5C16833CE8F432B8A55B8ED5A0CD
2,953,298 UART: [art] PUB.Y = 7C22DDB5AD77F0CD1A0142D05D8A11971357CA2135F59043F2239D51DE161C8F699C236303ABB1FF8F05EB66646D85B1
2,960,243 UART: [art] SIG.R = 987C96909C00C8DB6D5C7A50CC53AA9173B86AD14DC5DB9C37D7586F088FE1BEDF7B57714A9793D567A4E07B988867FE
2,966,998 UART: [art] SIG.S = 3C9C956F535CC9673F6B24525649AB2632900A7B03343461EF1FCA85BFA5BD9A3D641416E25A877C1101682546FA1681
2,990,906 UART: Caliptra RT
2,991,159 UART: [state] CFI Enabled
3,097,794 UART: [rt] RT listening for mailbox commands...
3,098,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,854 UART: [rt]cmd =0x44504543, len=96
3,310,330 >>> mbox cmd response data (6236 bytes)
3,310,331 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,964 UART: [rt]cmd =0x53574545, len=84
3,365,231 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Unprovisioned
86,508 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,436 UART: [kat] SHA2-256
904,376 UART: [kat] SHA2-384
906,997 UART: [kat] SHA2-512-ACC
908,898 UART: [kat] ECC-384
918,745 UART: [kat] HMAC-384Kdf
923,393 UART: [kat] LMS
1,171,721 UART: [kat] --
1,172,704 UART: [cold-reset] ++
1,173,218 UART: [fht] FHT @ 0x50003400
1,176,023 UART: [idev] ++
1,176,191 UART: [idev] CDI.KEYID = 6
1,176,551 UART: [idev] SUBJECT.KEYID = 7
1,176,975 UART: [idev] UDS.KEYID = 0
1,177,320 ready_for_fw is high
1,177,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,053 UART: [idev] Erasing UDS.KEYID = 0
1,201,888 UART: [idev] Sha1 KeyId Algorithm
1,210,378 UART: [idev] --
1,211,456 UART: [ldev] ++
1,211,624 UART: [ldev] CDI.KEYID = 6
1,211,987 UART: [ldev] SUBJECT.KEYID = 5
1,212,413 UART: [ldev] AUTHORITY.KEYID = 7
1,212,876 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,243,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,736 UART: [ldev] --
1,283,125 UART: [fwproc] Wait for Commands...
1,283,771 UART: [fwproc] Recv command 0x46574c44
1,284,499 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,135 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,582 >>> mbox cmd response: success
2,773,822 UART: [afmc] ++
2,773,990 UART: [afmc] CDI.KEYID = 6
2,774,352 UART: [afmc] SUBJECT.KEYID = 7
2,774,777 UART: [afmc] AUTHORITY.KEYID = 5
2,811,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,791 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,519 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,123 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,915 UART: [afmc] --
2,853,939 UART: [cold-reset] --
2,854,909 UART: [state] Locking Datavault
2,856,172 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,776 UART: [state] Locking ICCM
2,857,310 UART: [exit] Launching FMC @ 0x40000130
2,862,639 UART:
2,862,655 UART: Running Caliptra FMC ...
2,863,063 UART:
2,863,206 UART: [state] CFI Enabled
2,873,897 UART: [fht] FMC Alias Private Key: 7
2,982,432 UART: [art] Extend RT PCRs Done
2,982,860 UART: [art] Lock RT PCRs Done
2,984,678 UART: [art] Populate DV Done
2,992,957 UART: [fht] FMC Alias Private Key: 7
2,993,993 UART: [art] Derive CDI
2,994,273 UART: [art] Store in in slot 0x4
3,080,130 UART: [art] Derive Key Pair
3,080,490 UART: [art] Store priv key in slot 0x5
3,094,136 UART: [art] Derive Key Pair - Done
3,108,468 UART: [art] Signing Cert with AUTHO
3,108,948 UART: RITY.KEYID = 7
3,124,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,767 UART: [art] PUB.X = 8655D96DEC7A265C8B30F44A958B05E70DC7FA52815C610C37358B7763E8CCA246AE801525A4992C5E9429DDE27D6992
3,131,528 UART: [art] PUB.Y = 623700CED027E1E6424C333BD638F2B5A4B262BD76FD90004617CBBB4827A56856B44144034E59C2A4A80104F16C6A3D
3,138,423 UART: [art] SIG.R = 7108136727F53D7DB12730064A932F5D7F708B2EE74F375D6FCD5EB9AC7D8FD8A6A0C396987CE464D649EBC9EC2B424E
3,145,197 UART: [art] SIG.S = 1D75261ADB29F6776192953EF6E47D2586544BBD3EFCF9ED9B3D6942A0441D9D4647D861C034FEE5CED2B6297A88C7F4
3,168,822 UART: Caliptra RT
3,169,167 UART: [state] CFI Enabled
3,276,734 UART: [rt] RT listening for mailbox commands...
3,277,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,052 UART: [rt]cmd =0x44504543, len=96
3,488,742 >>> mbox cmd response data (6236 bytes)
3,488,743 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,858 UART: [rt]cmd =0x53574545, len=84
3,545,043 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,662 ready_for_fw is high
1,060,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,199 >>> mbox cmd response: success
2,686,725 UART:
2,686,741 UART: Running Caliptra FMC ...
2,687,149 UART:
2,687,292 UART: [state] CFI Enabled
2,698,311 UART: [fht] FMC Alias Private Key: 7
2,805,348 UART: [art] Extend RT PCRs Done
2,805,776 UART: [art] Lock RT PCRs Done
2,807,314 UART: [art] Populate DV Done
2,815,399 UART: [fht] FMC Alias Private Key: 7
2,816,439 UART: [art] Derive CDI
2,816,719 UART: [art] Store in in slot 0x4
2,902,424 UART: [art] Derive Key Pair
2,902,784 UART: [art] Store priv key in slot 0x5
2,916,300 UART: [art] Derive Key Pair - Done
2,931,127 UART: [art] Signing Cert with AUTHO
2,931,607 UART: RITY.KEYID = 7
2,946,535 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,300 UART: [art] PUB.X = D395938A2252DB8A106A7149385A97234BE72F11CA0738C33C3297828EC9C92A84B529B0B25F986B32DA3389BA3F8839
2,954,061 UART: [art] PUB.Y = A1F1A48B7DFE6ECA48F40325839526F0D017031A39C4C0443DB4D7F8D8E363EB5335E8B2D4A4E9F62C0514356CB901BB
2,961,007 UART: [art] SIG.R = BA7DFD49FCC4EA253AB739CE97D73A85F8C7D72843B1F9BEB410E511DF9D1447755AF7D11E6211FCE88B66602B1B4078
2,967,791 UART: [art] SIG.S = 8C4A92D0CA2B83A407B4D078B9C223C7493CE548F9231AEE72B35DB7B6D292AF3F1A402E4D531A9F100621256CF740AE
2,991,854 UART: Caliptra RT
2,992,199 UART: [state] CFI Enabled
3,100,037 UART: [rt] RT listening for mailbox commands...
3,100,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,979 UART: [rt]cmd =0x44504543, len=96
3,311,608 >>> mbox cmd response data (6236 bytes)
3,311,609 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,642 UART: [rt]cmd =0x53574545, len=84
3,367,325 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,170 UART: [kat] LMS
1,168,482 UART: [kat] --
1,169,311 UART: [cold-reset] ++
1,169,715 UART: [fht] FHT @ 0x50003400
1,172,335 UART: [idev] ++
1,172,503 UART: [idev] CDI.KEYID = 6
1,172,864 UART: [idev] SUBJECT.KEYID = 7
1,173,289 UART: [idev] UDS.KEYID = 0
1,173,635 ready_for_fw is high
1,173,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,198,471 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,004 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,064 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,233 UART: [fwproc] Recv command 0x46574c44
1,281,966 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,803 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,503 >>> mbox cmd response: success
2,770,728 UART: [afmc] ++
2,770,896 UART: [afmc] CDI.KEYID = 6
2,771,259 UART: [afmc] SUBJECT.KEYID = 7
2,771,685 UART: [afmc] AUTHORITY.KEYID = 5
2,807,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,163 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,892 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,775 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,494 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,457 UART: [afmc] --
2,850,539 UART: [cold-reset] --
2,851,307 UART: [state] Locking Datavault
2,852,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,988 UART: [state] Locking ICCM
2,853,410 UART: [exit] Launching FMC @ 0x40000130
2,858,739 UART:
2,858,755 UART: Running Caliptra FMC ...
2,859,163 UART:
2,859,217 UART: [state] CFI Enabled
2,869,716 UART: [fht] FMC Alias Private Key: 7
2,977,173 UART: [art] Extend RT PCRs Done
2,977,601 UART: [art] Lock RT PCRs Done
2,979,001 UART: [art] Populate DV Done
2,987,170 UART: [fht] FMC Alias Private Key: 7
2,988,280 UART: [art] Derive CDI
2,988,560 UART: [art] Store in in slot 0x4
3,074,043 UART: [art] Derive Key Pair
3,074,403 UART: [art] Store priv key in slot 0x5
3,087,603 UART: [art] Derive Key Pair - Done
3,102,636 UART: [art] Signing Cert with AUTHO
3,103,116 UART: RITY.KEYID = 7
3,118,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,433 UART: [art] PUB.X = 304E4CBA10F18C82298D97BD375A67B1B0AD77EFE397D82B839A8828BDCBAF30418EED815D72DBE5658E3A460BDFA01B
3,126,218 UART: [art] PUB.Y = 280648F84C2B8C194E120CBF629E9209B00B83F79143AA60A0886CA0259FA69BC12F8875E3C975544392D72502F481D6
3,133,145 UART: [art] SIG.R = 8B386FE842C9040715815D0312F6E28850FB6808E2226A8FDE0259B4C1F1E6CFBBB47B8BA6FEBC3A04489CA731A3FE60
3,139,907 UART: [art] SIG.S = 848B881CED1227C91C4329272AF6097673564066F69D71B671BE0508BB65CDB9D2B76E9DCAAFD4AE174494614FF7FD7E
3,163,695 UART: Caliptra RT
3,163,948 UART: [state] CFI Enabled
3,272,058 UART: [rt] RT listening for mailbox commands...
3,272,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,180 UART: [rt]cmd =0x44504543, len=96
3,482,995 >>> mbox cmd response data (6236 bytes)
3,482,996 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,512,893 UART: [rt]cmd =0x53574545, len=84
3,538,796 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,230 ready_for_fw is high
1,056,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,343 >>> mbox cmd response: success
2,683,285 UART:
2,683,301 UART: Running Caliptra FMC ...
2,683,709 UART:
2,683,763 UART: [state] CFI Enabled
2,694,724 UART: [fht] FMC Alias Private Key: 7
2,802,305 UART: [art] Extend RT PCRs Done
2,802,733 UART: [art] Lock RT PCRs Done
2,804,267 UART: [art] Populate DV Done
2,812,546 UART: [fht] FMC Alias Private Key: 7
2,813,654 UART: [art] Derive CDI
2,813,934 UART: [art] Store in in slot 0x4
2,899,775 UART: [art] Derive Key Pair
2,900,135 UART: [art] Store priv key in slot 0x5
2,914,057 UART: [art] Derive Key Pair - Done
2,928,861 UART: [art] Signing Cert with AUTHO
2,929,341 UART: RITY.KEYID = 7
2,944,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,048 UART: [art] PUB.X = 305365A966AD4E2C50CB966BCD01CF83E90210DB6E59917E37FF8FDD0B823FEDBCE51085683B0AAF5C1BC156D85830C2
2,951,820 UART: [art] PUB.Y = DF2D6CB6C35545F1F9ECBEF77B98F18D7BE2E1909FB2BCB7EF028848AD431E754F635DB8D7D268651FE3108FFBC7F769
2,958,787 UART: [art] SIG.R = 35EF0A6D304C0B41E619EAB74F23402F57C86317623D3D27A27B50070389BB5AEA429264E5A9D5813D87ED1FA1B09C12
2,965,547 UART: [art] SIG.S = 515DD4AEC7E0F434BB8100D93C958BED37A00A7583965F91EC41890554F17921AA439DF2F282FD76112E4562196B9E29
2,989,656 UART: Caliptra RT
2,989,909 UART: [state] CFI Enabled
3,097,128 UART: [rt] RT listening for mailbox commands...
3,097,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,032 UART: [rt]cmd =0x44504543, len=96
3,308,706 >>> mbox cmd response data (6236 bytes)
3,308,707 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,434 UART: [rt]cmd =0x53574545, len=84
3,363,895 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,783 UART: [kat] SHA2-512-ACC
906,684 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,522 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,174,564 ready_for_fw is high
1,174,564 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,104 UART: [idev] Erasing UDS.KEYID = 0
1,198,992 UART: [idev] Sha1 KeyId Algorithm
1,207,866 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,505 UART: [ldev] Erasing FE.KEYID = 1
1,242,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,829 UART: [ldev] --
1,281,313 UART: [fwproc] Wait for Commands...
1,281,984 UART: [fwproc] Recv command 0x46574c44
1,282,717 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,441 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,750 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,230 >>> mbox cmd response: success
2,772,255 UART: [afmc] ++
2,772,423 UART: [afmc] CDI.KEYID = 6
2,772,786 UART: [afmc] SUBJECT.KEYID = 7
2,773,212 UART: [afmc] AUTHORITY.KEYID = 5
2,809,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,553 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,436 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,155 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,920 UART: [afmc] --
2,852,890 UART: [cold-reset] --
2,853,496 UART: [state] Locking Datavault
2,855,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,629 UART: [state] Locking ICCM
2,856,097 UART: [exit] Launching FMC @ 0x40000130
2,861,426 UART:
2,861,442 UART: Running Caliptra FMC ...
2,861,850 UART:
2,861,993 UART: [state] CFI Enabled
2,872,882 UART: [fht] FMC Alias Private Key: 7
2,980,477 UART: [art] Extend RT PCRs Done
2,980,905 UART: [art] Lock RT PCRs Done
2,982,309 UART: [art] Populate DV Done
2,990,604 UART: [fht] FMC Alias Private Key: 7
2,991,586 UART: [art] Derive CDI
2,991,866 UART: [art] Store in in slot 0x4
3,077,695 UART: [art] Derive Key Pair
3,078,055 UART: [art] Store priv key in slot 0x5
3,091,401 UART: [art] Derive Key Pair - Done
3,106,060 UART: [art] Signing Cert with AUTHO
3,106,540 UART: RITY.KEYID = 7
3,121,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,379 UART: [art] PUB.X = 3E8B7EA6307669273CBF954E0438C2B9A4ACFD50E5442CF2F6DB180A5ACA8F9E136F32047A27CE6CDA01D60C7FF0E5C8
3,129,152 UART: [art] PUB.Y = B9FA38507D88E731647C2508F3694D215EE99D0E037422A575F334A0AC6A3D2C9137AC7C0F2C1396142A667C5E867E5B
3,136,088 UART: [art] SIG.R = 56827E3FF6F4AD873B05B1EE5924CDFD8A9E314BFA804A24D65E2B7FD6234460451DB21C547AB1C3A3735DEC05BED1D7
3,142,868 UART: [art] SIG.S = E4957F7806368BBBFFBEEA48E7BA669934BAC6E2EB43C64E2C8A827844BB7E5F6A07FE327ABCC603E07CA6CC63AB107E
3,166,878 UART: Caliptra RT
3,167,223 UART: [state] CFI Enabled
3,274,818 UART: [rt] RT listening for mailbox commands...
3,275,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,124 UART: [rt]cmd =0x44504543, len=96
3,486,483 >>> mbox cmd response data (6236 bytes)
3,486,484 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,185 UART: [rt]cmd =0x53574545, len=84
3,541,802 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,713 ready_for_fw is high
1,056,713 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,464 >>> mbox cmd response: success
2,683,324 UART:
2,683,340 UART: Running Caliptra FMC ...
2,683,748 UART:
2,683,891 UART: [state] CFI Enabled
2,694,334 UART: [fht] FMC Alias Private Key: 7
2,802,479 UART: [art] Extend RT PCRs Done
2,802,907 UART: [art] Lock RT PCRs Done
2,804,695 UART: [art] Populate DV Done
2,813,090 UART: [fht] FMC Alias Private Key: 7
2,814,254 UART: [art] Derive CDI
2,814,534 UART: [art] Store in in slot 0x4
2,900,481 UART: [art] Derive Key Pair
2,900,841 UART: [art] Store priv key in slot 0x5
2,914,237 UART: [art] Derive Key Pair - Done
2,928,994 UART: [art] Signing Cert with AUTHO
2,929,474 UART: RITY.KEYID = 7
2,944,798 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,563 UART: [art] PUB.X = 0ACE7D4537E1818D89605093F2A4B3EAFF7ABAEA77CB4101855EF9FBEB99CD620EDD6979C66418328A4F3A7B9D454F53
2,952,338 UART: [art] PUB.Y = BAE8C5051D1C9112C658F675F603B589DB42B53DD95DA70D72CE3680E509D27DAB0AA609E070BF197E38B4CE01BB571C
2,959,279 UART: [art] SIG.R = DEB18BD72AB364387473AC9CAC41E7B60D6EF947E54A8A404841228E10EE9F4E329AFA86027D1F3103ED0A8948DFF1E4
2,966,049 UART: [art] SIG.S = 4C179BD2792BF06133ACBFD0F28546055FA9EE68AC6FBC9C569B41BBCB359469EC77D6EDEC212CA0F16195DDE7172AC9
2,989,513 UART: Caliptra RT
2,989,858 UART: [state] CFI Enabled
3,097,873 UART: [rt] RT listening for mailbox commands...
3,098,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,735 UART: [rt]cmd =0x44504543, len=96
3,309,608 >>> mbox cmd response data (6236 bytes)
3,309,609 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,572 UART: [rt]cmd =0x53574545, len=84
3,365,173 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,336 UART:
192,703 UART: Running Caliptra ROM ...
193,804 UART:
193,942 UART: [state] CFI Enabled
265,543 UART: [state] LifecycleState = Unprovisioned
267,535 UART: [state] DebugLocked = No
269,687 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,842 UART: [kat] SHA2-256
443,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,024 UART: [kat] ++
454,472 UART: [kat] sha1
465,332 UART: [kat] SHA2-256
467,998 UART: [kat] SHA2-384
474,197 UART: [kat] SHA2-512-ACC
476,623 UART: [kat] ECC-384
2,768,402 UART: [kat] HMAC-384Kdf
2,799,958 UART: [kat] LMS
3,990,261 UART: [kat] --
3,995,969 UART: [cold-reset] ++
3,998,042 UART: [fht] Storing FHT @ 0x50003400
4,009,587 UART: [idev] ++
4,010,227 UART: [idev] CDI.KEYID = 6
4,011,111 UART: [idev] SUBJECT.KEYID = 7
4,012,346 UART: [idev] UDS.KEYID = 0
4,013,359 ready_for_fw is high
4,013,568 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,816 UART: [idev] Erasing UDS.KEYID = 0
7,346,771 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,308 UART: [idev] --
7,373,047 UART: [ldev] ++
7,373,609 UART: [ldev] CDI.KEYID = 6
7,374,566 UART: [ldev] SUBJECT.KEYID = 5
7,375,766 UART: [ldev] AUTHORITY.KEYID = 7
7,377,039 UART: [ldev] FE.KEYID = 1
7,421,766 UART: [ldev] Erasing FE.KEYID = 1
10,755,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,343 UART: [ldev] --
13,136,651 UART: [fwproc] Waiting for Commands...
13,138,461 UART: [fwproc] Received command 0x46574c44
13,140,704 UART: [fwproc] Received Image of size 113844 bytes
17,189,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,272,042 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,953 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,656,416 >>> mbox cmd response: success
17,660,016 UART: [afmc] ++
17,660,611 UART: [afmc] CDI.KEYID = 6
17,661,575 UART: [afmc] SUBJECT.KEYID = 7
17,662,788 UART: [afmc] AUTHORITY.KEYID = 5
21,025,505 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,326,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,328,750 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,343,153 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,358,011 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,372,452 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,577 UART: [afmc] --
23,396,234 UART: [cold-reset] --
23,400,456 UART: [state] Locking Datavault
23,407,439 UART: [state] Locking PCR0, PCR1 and PCR31
23,409,245 UART: [state] Locking ICCM
23,411,265 UART: [exit] Launching FMC @ 0x40000130
23,419,676 UART:
23,419,911 UART: Running Caliptra FMC ...
23,420,958 UART:
23,421,102 UART: [state] CFI Enabled
23,486,229 UART: [fht] FMC Alias Private Key: 7
25,825,354 UART: [art] Extend RT PCRs Done
25,826,573 UART: [art] Lock RT PCRs Done
25,828,141 UART: [art] Populate DV Done
25,833,492 UART: [fht] FMC Alias Private Key: 7
25,835,076 UART: [art] Derive CDI
25,835,883 UART: [art] Store in in slot 0x4
25,895,105 UART: [art] Derive Key Pair
25,896,138 UART: [art] Store priv key in slot 0x5
29,188,826 UART: [art] Derive Key Pair - Done
29,201,981 UART: [art] Signing Cert with AUTHO
29,203,278 UART: RITY.KEYID = 7
31,490,258 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,770 UART: [art] PUB.X = 0B8416DE1C28D0CB623D5AB031B201A377794FE50F22007F59CB3A20A2690E2477F121FCD7614F5C76D1AFE87923E46E
31,499,034 UART: [art] PUB.Y = 1C1AAE01CAC8EABE6333CA4A3FA805D014718E4161CA35CA7B0BFD29D57590FC10FDEB3A7174640285941F70F5EEE215
31,506,293 UART: [art] SIG.R = 06B7D97E1997D62C4118827A6C8FDC8B7D898CC52F948BCA8A9930460F9CA8F632D21A303F6572ED38A50712E6511C57
31,513,651 UART: [art] SIG.S = FD60F1CCE06CCCB0026E831920AC288D49484D64AFBCAF0BF1A1855E24856EE46F36F1419A7AA635133F25674D75FC0C
32,819,078 UART: Caliptra RT
32,819,797 UART: [state] CFI Enabled
32,979,405 UART: [rt] RT listening for mailbox commands...
32,981,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,012,665 UART: [rt]cmd =0x44504543, len=96
38,797,394 >>> mbox cmd response data (6236 bytes)
38,826,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,857,629 UART: [rt]cmd =0x44504543, len=96
38,888,788 >>> mbox cmd response data (56 bytes)
38,889,520 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,919,572 UART: [rt]cmd =0x52564348, len=36
38,922,576 >>> mbox cmd response data (8 bytes)
38,923,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,953,715 UART: [rt]cmd =0x44504543, len=96
44,707,837 >>> mbox cmd response data (6236 bytes)
44,736,673 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,767,437 UART: [rt]cmd =0x53574545, len=84
50,351,039 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,805,399 ready_for_fw is high
3,805,797 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,873,220 >>> mbox cmd response: success
23,564,070 UART:
23,564,533 UART: Running Caliptra FMC ...
23,565,681 UART:
23,565,838 UART: [state] CFI Enabled
23,635,303 UART: [fht] FMC Alias Private Key: 7
25,973,198 UART: [art] Extend RT PCRs Done
25,974,431 UART: [art] Lock RT PCRs Done
25,976,109 UART: [art] Populate DV Done
25,981,298 UART: [fht] FMC Alias Private Key: 7
25,982,891 UART: [art] Derive CDI
25,983,640 UART: [art] Store in in slot 0x4
26,043,064 UART: [art] Derive Key Pair
26,044,109 UART: [art] Store priv key in slot 0x5
29,336,792 UART: [art] Derive Key Pair - Done
29,350,193 UART: [art] Signing Cert with AUTHO
29,351,494 UART: RITY.KEYID = 7
31,638,362 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,882 UART: [art] PUB.X = AF2EEF78E4F878143A9ABE81BA3356021F19EA5A7D10900F6F808BDCADDDA7859DF919562A375963B81A1A30DE9243CD
31,647,152 UART: [art] PUB.Y = 116B84ACDFC6DC1BC81F03C094764FA38E4605C7F808DC64382CAA84D7F0B795ECEB9ACA345A262D9D5DC08D381527E7
31,654,376 UART: [art] SIG.R = F5406A6952C518B0B9606C566DA84A281E1908B1A253858691D26EDE7E15B846D71740B5FFBFCEA87B12A7DB9D7FA1A5
31,661,776 UART: [art] SIG.S = 350F275206D8A9C1AF9DCB77210859D7CD0249EEB9728176761A864C457E9593C0287FE77B9271A9EF9C87E6556994EA
32,966,493 UART: Caliptra RT
32,967,207 UART: [state] CFI Enabled
33,128,531 UART: [rt] RT listening for mailbox commands...
33,131,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,162,239 UART: [rt]cmd =0x44504543, len=96
38,947,497 >>> mbox cmd response data (6236 bytes)
38,976,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,007,333 UART: [rt]cmd =0x44504543, len=96
39,038,448 >>> mbox cmd response data (56 bytes)
39,039,161 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,068,928 UART: [rt]cmd =0x52564348, len=36
39,071,691 >>> mbox cmd response data (8 bytes)
39,072,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,102,902 UART: [rt]cmd =0x44504543, len=96
44,878,309 >>> mbox cmd response data (6236 bytes)
44,907,287 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,937,887 UART: [rt]cmd =0x53574545, len=84
50,524,754 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
192,539 UART:
192,903 UART: Running Caliptra ROM ...
194,003 UART:
603,722 UART: [state] CFI Enabled
618,476 UART: [state] LifecycleState = Unprovisioned
620,454 UART: [state] DebugLocked = No
622,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,679 UART: [kat] SHA2-256
797,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,994 UART: [kat] ++
808,440 UART: [kat] sha1
819,668 UART: [kat] SHA2-256
822,421 UART: [kat] SHA2-384
828,634 UART: [kat] SHA2-512-ACC
830,943 UART: [kat] ECC-384
3,114,808 UART: [kat] HMAC-384Kdf
3,127,188 UART: [kat] LMS
4,317,303 UART: [kat] --
4,320,463 UART: [cold-reset] ++
4,322,681 UART: [fht] Storing FHT @ 0x50003400
4,333,946 UART: [idev] ++
4,334,523 UART: [idev] CDI.KEYID = 6
4,335,559 UART: [idev] SUBJECT.KEYID = 7
4,336,737 UART: [idev] UDS.KEYID = 0
4,337,778 ready_for_fw is high
4,337,983 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,961 UART: [idev] Erasing UDS.KEYID = 0
7,622,526 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,995 UART: [idev] --
7,650,922 UART: [ldev] ++
7,651,500 UART: [ldev] CDI.KEYID = 6
7,652,487 UART: [ldev] SUBJECT.KEYID = 5
7,653,587 UART: [ldev] AUTHORITY.KEYID = 7
7,654,919 UART: [ldev] FE.KEYID = 1
7,665,657 UART: [ldev] Erasing FE.KEYID = 1
10,955,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,018 UART: [ldev] --
13,310,590 UART: [fwproc] Waiting for Commands...
13,312,253 UART: [fwproc] Received command 0x46574c44
13,314,434 UART: [fwproc] Received Image of size 113844 bytes
17,355,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,428,903 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,497,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,814,354 >>> mbox cmd response: success
17,818,755 UART: [afmc] ++
17,819,349 UART: [afmc] CDI.KEYID = 6
17,820,265 UART: [afmc] SUBJECT.KEYID = 7
17,821,482 UART: [afmc] AUTHORITY.KEYID = 5
21,136,989 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,431,674 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,433,978 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,358 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,463,178 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,477,611 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,498,344 UART: [afmc] --
23,502,963 UART: [cold-reset] --
23,508,149 UART: [state] Locking Datavault
23,512,973 UART: [state] Locking PCR0, PCR1 and PCR31
23,514,676 UART: [state] Locking ICCM
23,517,423 UART: [exit] Launching FMC @ 0x40000130
23,525,826 UART:
23,526,064 UART: Running Caliptra FMC ...
23,527,171 UART:
23,527,335 UART: [state] CFI Enabled
23,535,327 UART: [fht] FMC Alias Private Key: 7
25,866,834 UART: [art] Extend RT PCRs Done
25,868,053 UART: [art] Lock RT PCRs Done
25,869,789 UART: [art] Populate DV Done
25,875,170 UART: [fht] FMC Alias Private Key: 7
25,876,705 UART: [art] Derive CDI
25,877,518 UART: [art] Store in in slot 0x4
25,919,899 UART: [art] Derive Key Pair
25,920,960 UART: [art] Store priv key in slot 0x5
29,163,223 UART: [art] Derive Key Pair - Done
29,176,045 UART: [art] Signing Cert with AUTHO
29,177,368 UART: RITY.KEYID = 7
31,456,382 UART: [art] Erasing AUTHORITY.KEYID = 7
31,457,880 UART: [art] PUB.X = F4D3896A17C8FFE7500DAE1388B13E912FE096528F4560577C787B325629A17E974CBE88A5ED537F540BBA436DFB865C
31,465,150 UART: [art] PUB.Y = 9773607E7EB8F698AC45178855CC2302181C163A8F2D314FFB57B85F804F1442F30537FEBC54A2B060B5EC629200397E
31,472,344 UART: [art] SIG.R = 290393F2AB94D37944AD6F92D5177C4ABD6D6A3738BF59D64FEC6AB7E989A0152D3AD5B1A62432987793067AB608C2B5
31,479,740 UART: [art] SIG.S = 1BE2FA3EBC9097E0F9A100838F6EDE44B6904B899E33343C32620F51ED075C3C9B63CB85793B3F9A3681F25F4A90F5A2
32,785,104 UART: Caliptra RT
32,785,802 UART: [state] CFI Enabled
32,903,670 UART: [rt] RT listening for mailbox commands...
32,906,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,937,120 UART: [rt]cmd =0x44504543, len=96
38,609,238 >>> mbox cmd response data (6236 bytes)
38,638,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,669,490 UART: [rt]cmd =0x44504543, len=96
38,700,193 >>> mbox cmd response data (56 bytes)
38,700,957 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,731,094 UART: [rt]cmd =0x52564348, len=36
38,733,792 >>> mbox cmd response data (8 bytes)
38,734,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,764,843 UART: [rt]cmd =0x44504543, len=96
44,436,460 >>> mbox cmd response data (6236 bytes)
44,465,430 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,496,032 UART: [rt]cmd =0x53574545, len=84
50,020,441 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,127,534 ready_for_fw is high
4,127,921 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,065,483 >>> mbox cmd response: success
23,712,093 UART:
23,712,485 UART: Running Caliptra FMC ...
23,713,629 UART:
23,713,791 UART: [state] CFI Enabled
23,721,891 UART: [fht] FMC Alias Private Key: 7
26,053,125 UART: [art] Extend RT PCRs Done
26,054,350 UART: [art] Lock RT PCRs Done
26,056,168 UART: [art] Populate DV Done
26,061,748 UART: [fht] FMC Alias Private Key: 7
26,063,369 UART: [art] Derive CDI
26,064,186 UART: [art] Store in in slot 0x4
26,106,518 UART: [art] Derive Key Pair
26,107,573 UART: [art] Store priv key in slot 0x5
29,349,601 UART: [art] Derive Key Pair - Done
29,362,268 UART: [art] Signing Cert with AUTHO
29,363,603 UART: RITY.KEYID = 7
31,643,347 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,853 UART: [art] PUB.X = 2E09DED64875D302C8980E6CDF0E02B5A87722F9CF77CCB9195C184B954FE98B6210BF088E3B9B305EEAFE27AE6E50B8
31,652,111 UART: [art] PUB.Y = 9B680CF554FA9998F2FD2CBE8B7297263BA82038DFD05335910D7EBE016F57E557A9E907087FB4091822BC37271E380D
31,659,361 UART: [art] SIG.R = 0EDF78A68E6401C8BC748C4C17BC97AD34C4EBA8DC17A98C937A81C4C355AC91959B6ADC2E1BDDA39CE60763CD491C20
31,666,753 UART: [art] SIG.S = 6E9B5A378D70D9379F6A774FB9630D502B24855F95110724D8DE9BF81B97B8205B3C53A674F46CE41B52EA761F2DE64E
32,971,878 UART: Caliptra RT
32,972,589 UART: [state] CFI Enabled
33,090,030 UART: [rt] RT listening for mailbox commands...
33,092,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,123,714 UART: [rt]cmd =0x44504543, len=96
38,796,879 >>> mbox cmd response data (6236 bytes)
38,826,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,857,034 UART: [rt]cmd =0x44504543, len=96
38,888,223 >>> mbox cmd response data (56 bytes)
38,888,980 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,919,163 UART: [rt]cmd =0x52564348, len=36
38,922,134 >>> mbox cmd response data (8 bytes)
38,922,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,953,089 UART: [rt]cmd =0x44504543, len=96
44,626,315 >>> mbox cmd response data (6236 bytes)
44,655,268 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,685,924 UART: [rt]cmd =0x53574545, len=84
50,210,676 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,005 UART:
192,413 UART: Running Caliptra ROM ...
193,778 UART:
193,943 UART: [state] CFI Enabled
265,667 UART: [state] LifecycleState = Unprovisioned
267,463 UART: [state] DebugLocked = No
269,553 UART: [state] WD Timer not started. Device not locked for debugging
272,526 UART: [kat] SHA2-256
451,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,225 UART: [kat] ++
463,760 UART: [kat] sha1
475,567 UART: [kat] SHA2-256
478,562 UART: [kat] SHA2-384
485,114 UART: [kat] SHA2-512-ACC
488,129 UART: [kat] ECC-384
2,950,661 UART: [kat] HMAC-384Kdf
2,972,420 UART: [kat] LMS
3,501,861 UART: [kat] --
3,507,567 UART: [cold-reset] ++
3,509,284 UART: [fht] FHT @ 0x50003400
3,521,186 UART: [idev] ++
3,521,745 UART: [idev] CDI.KEYID = 6
3,522,697 UART: [idev] SUBJECT.KEYID = 7
3,523,870 UART: [idev] UDS.KEYID = 0
3,525,042 ready_for_fw is high
3,525,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,813 UART: [idev] Erasing UDS.KEYID = 0
6,027,272 UART: [idev] Sha1 KeyId Algorithm
6,050,186 UART: [idev] --
6,053,731 UART: [ldev] ++
6,054,314 UART: [ldev] CDI.KEYID = 6
6,055,244 UART: [ldev] SUBJECT.KEYID = 5
6,056,413 UART: [ldev] AUTHORITY.KEYID = 7
6,057,666 UART: [ldev] FE.KEYID = 1
6,099,430 UART: [ldev] Erasing FE.KEYID = 1
8,604,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,616 UART: [ldev] --
10,412,913 UART: [fwproc] Wait for Commands...
10,416,085 UART: [fwproc] Recv command 0x46574c44
10,418,182 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,210 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,282,186 >>> mbox cmd response: success
14,286,900 UART: [afmc] ++
14,287,517 UART: [afmc] CDI.KEYID = 6
14,288,407 UART: [afmc] SUBJECT.KEYID = 7
14,289,569 UART: [afmc] AUTHORITY.KEYID = 5
16,827,718 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,566,772 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,582,786 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,598,666 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,843 UART: [afmc] --
18,627,305 UART: [cold-reset] --
18,630,411 UART: [state] Locking Datavault
18,636,044 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,753 UART: [state] Locking ICCM
18,639,045 UART: [exit] Launching FMC @ 0x40000130
18,647,454 UART:
18,647,716 UART: Running Caliptra FMC ...
18,648,822 UART:
18,648,979 UART: [state] CFI Enabled
18,708,486 UART: [fht] FMC Alias Private Key: 7
20,472,413 UART: [art] Extend RT PCRs Done
20,473,634 UART: [art] Lock RT PCRs Done
20,475,313 UART: [art] Populate DV Done
20,480,619 UART: [fht] FMC Alias Private Key: 7
20,482,262 UART: [art] Derive CDI
20,483,078 UART: [art] Store in in slot 0x4
20,540,843 UART: [art] Derive Key Pair
20,541,888 UART: [art] Store priv key in slot 0x5
23,004,277 UART: [art] Derive Key Pair - Done
23,017,220 UART: [art] Signing Cert with AUTHO
23,018,525 UART: RITY.KEYID = 7
24,730,774 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,294 UART: [art] PUB.X = 60B8617E17C8B2176DEFA43A9CB07E958B0067E1AB9D454E2A02CFC22706CE40A0B4EFCB31D32E03D9FD1F8513C5912A
24,739,548 UART: [art] PUB.Y = 4DACA001091F09648967D32D34568CBA3C09395B69413D16B0D7E6A8CF009E298B4A3EB9B4B874D9EFA09AE7D5A7F457
24,746,787 UART: [art] SIG.R = E84896AC64F146EBA8942EF9230A2C75CEB1FA63EC0EC9A06575C46C89C0CAA9E9CBEC88CB31BCC19AE192FA37CD24D2
24,754,235 UART: [art] SIG.S = C47A4404557E5E9D847968001697443943C543B79045FAE577352E002981FBFA551AC6D749E8F82E5F9EBA6E4E6DFCF9
25,733,254 UART: Caliptra RT
25,733,952 UART: [state] CFI Enabled
25,898,511 UART: [rt] RT listening for mailbox commands...
25,900,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,931,932 UART: [rt]cmd =0x44504543, len=96
30,310,254 >>> mbox cmd response data (6236 bytes)
30,339,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,370,139 UART: [rt]cmd =0x44504543, len=96
30,401,444 >>> mbox cmd response data (56 bytes)
30,402,176 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,432,311 UART: [rt]cmd =0x52564348, len=36
30,435,145 >>> mbox cmd response data (8 bytes)
30,435,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,466,102 UART: [rt]cmd =0x44504543, len=96
34,831,054 >>> mbox cmd response data (6236 bytes)
34,860,125 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,890,955 UART: [rt]cmd =0x53574545, len=84
39,068,354 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,360,159 ready_for_fw is high
3,360,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,049,468 >>> mbox cmd response: success
18,342,753 UART:
18,343,158 UART: Running Caliptra FMC ...
18,344,293 UART:
18,344,461 UART: [state] CFI Enabled
18,409,336 UART: [fht] FMC Alias Private Key: 7
20,172,902 UART: [art] Extend RT PCRs Done
20,174,126 UART: [art] Lock RT PCRs Done
20,175,756 UART: [art] Populate DV Done
20,181,274 UART: [fht] FMC Alias Private Key: 7
20,182,921 UART: [art] Derive CDI
20,183,736 UART: [art] Store in in slot 0x4
20,242,005 UART: [art] Derive Key Pair
20,243,054 UART: [art] Store priv key in slot 0x5
22,705,520 UART: [art] Derive Key Pair - Done
22,718,416 UART: [art] Signing Cert with AUTHO
22,719,722 UART: RITY.KEYID = 7
24,431,609 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,121 UART: [art] PUB.X = ADE8DE1791A29DE4AD6F2DEA497D73E6DE6483BD2914F0FF79C1FDB9B611D6A986F257BBC4856AA96FB1133F58C36C1A
24,440,411 UART: [art] PUB.Y = F3FCAA6D43730A738CE742EF032BDE2165493BC4631E33F2554FECC0C0359A6D555E8E1DA89F62BFB6A13D3121FA0579
24,447,662 UART: [art] SIG.R = 30EE3971BE25742CFBA4B7157BEDDB349EC82DA93BAD3C332D08A3BDC0FD7DB7F83F3D2B3A94511B5F3921337D96B2C7
24,455,247 UART: [art] SIG.S = 1C2EC688D0B05AB1248E1A9E0D481AB17264599B5056334AA894C999B664D703CE0806BEAE7D13A1B3432FB71B56E237
25,434,813 UART: Caliptra RT
25,435,513 UART: [state] CFI Enabled
25,600,981 UART: [rt] RT listening for mailbox commands...
25,603,399 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,634,540 UART: [rt]cmd =0x44504543, len=96
30,012,895 >>> mbox cmd response data (6236 bytes)
30,042,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,073,188 UART: [rt]cmd =0x44504543, len=96
30,104,555 >>> mbox cmd response data (56 bytes)
30,105,286 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,135,174 UART: [rt]cmd =0x52564348, len=36
30,137,963 >>> mbox cmd response data (8 bytes)
30,138,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,168,952 UART: [rt]cmd =0x44504543, len=96
34,535,707 >>> mbox cmd response data (6236 bytes)
34,564,510 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,594,828 UART: [rt]cmd =0x53574545, len=84
38,774,617 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
193,109 UART:
193,464 UART: Running Caliptra ROM ...
194,666 UART:
604,066 UART: [state] CFI Enabled
614,996 UART: [state] LifecycleState = Unprovisioned
616,936 UART: [state] DebugLocked = No
619,539 UART: [state] WD Timer not started. Device not locked for debugging
623,444 UART: [kat] SHA2-256
802,525 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,110 UART: [kat] ++
814,642 UART: [kat] sha1
826,230 UART: [kat] SHA2-256
829,237 UART: [kat] SHA2-384
835,441 UART: [kat] SHA2-512-ACC
838,377 UART: [kat] ECC-384
3,278,747 UART: [kat] HMAC-384Kdf
3,291,131 UART: [kat] LMS
3,820,639 UART: [kat] --
3,824,782 UART: [cold-reset] ++
3,827,089 UART: [fht] FHT @ 0x50003400
3,838,212 UART: [idev] ++
3,838,779 UART: [idev] CDI.KEYID = 6
3,839,659 UART: [idev] SUBJECT.KEYID = 7
3,840,907 UART: [idev] UDS.KEYID = 0
3,841,847 ready_for_fw is high
3,842,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,572 UART: [idev] Erasing UDS.KEYID = 0
6,313,287 UART: [idev] Sha1 KeyId Algorithm
6,336,620 UART: [idev] --
6,340,125 UART: [ldev] ++
6,340,697 UART: [ldev] CDI.KEYID = 6
6,341,606 UART: [ldev] SUBJECT.KEYID = 5
6,342,817 UART: [ldev] AUTHORITY.KEYID = 7
6,344,047 UART: [ldev] FE.KEYID = 1
6,354,697 UART: [ldev] Erasing FE.KEYID = 1
8,832,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,394 UART: [ldev] --
10,623,649 UART: [fwproc] Wait for Commands...
10,626,890 UART: [fwproc] Recv command 0x46574c44
10,628,929 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,103,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,172,421 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,489,178 >>> mbox cmd response: success
14,493,277 UART: [afmc] ++
14,493,870 UART: [afmc] CDI.KEYID = 6
14,494,784 UART: [afmc] SUBJECT.KEYID = 7
14,495,963 UART: [afmc] AUTHORITY.KEYID = 5
16,996,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,715,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,717,824 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,733,603 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,749,598 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,482 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,787,531 UART: [afmc] --
18,791,023 UART: [cold-reset] --
18,796,398 UART: [state] Locking Datavault
18,801,156 UART: [state] Locking PCR0, PCR1 and PCR31
18,802,806 UART: [state] Locking ICCM
18,804,635 UART: [exit] Launching FMC @ 0x40000130
18,813,084 UART:
18,813,321 UART: Running Caliptra FMC ...
18,814,420 UART:
18,814,597 UART: [state] CFI Enabled
18,822,913 UART: [fht] FMC Alias Private Key: 7
20,579,710 UART: [art] Extend RT PCRs Done
20,580,929 UART: [art] Lock RT PCRs Done
20,582,685 UART: [art] Populate DV Done
20,587,827 UART: [fht] FMC Alias Private Key: 7
20,589,520 UART: [art] Derive CDI
20,590,336 UART: [art] Store in in slot 0x4
20,632,602 UART: [art] Derive Key Pair
20,633,642 UART: [art] Store priv key in slot 0x5
23,060,105 UART: [art] Derive Key Pair - Done
23,073,260 UART: [art] Signing Cert with AUTHO
23,074,561 UART: RITY.KEYID = 7
24,780,515 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,019 UART: [art] PUB.X = CB9C2455B6143FCA92B0F0FAA39D2013B833243D90E65303BF6ADC357EDB7BA51FB548571F4624689777D03642BDA374
24,789,269 UART: [art] PUB.Y = D1B65B23B6CA5E36342DF2A15734C7B7499D9184F8D0F145FCDE57A8181D64AEA579E5155556B0B522797DA453A3A39A
24,796,532 UART: [art] SIG.R = 7E77A15372D524739CD92188EB2DC84719796506CF2FFF563FFF357CE48D2205516DD3549B449F864776BCB5A145F6F2
24,803,882 UART: [art] SIG.S = 57077FA68BCD6EFF761549636967B6B68DD6DFA1E36AADFB8847477BF90B1FAF70A3291D2D2512D3B73583E239C8F9E2
25,782,974 UART: Caliptra RT
25,783,679 UART: [state] CFI Enabled
25,901,068 UART: [rt] RT listening for mailbox commands...
25,903,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,934,516 UART: [rt]cmd =0x44504543, len=96
30,218,156 >>> mbox cmd response data (6236 bytes)
30,247,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,278,178 UART: [rt]cmd =0x44504543, len=96
30,309,905 >>> mbox cmd response data (56 bytes)
30,310,674 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,340,384 UART: [rt]cmd =0x52564348, len=36
30,342,865 >>> mbox cmd response data (8 bytes)
30,343,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,373,823 UART: [rt]cmd =0x44504543, len=96
34,657,743 >>> mbox cmd response data (6236 bytes)
34,686,557 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,717,054 UART: [rt]cmd =0x53574545, len=84
38,851,934 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,722 writing to cptra_bootfsm_go
3,698,731 ready_for_fw is high
3,699,400 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,585 >>> mbox cmd response: success
18,522,918 UART:
18,523,691 UART: Running Caliptra FMC ...
18,524,862 UART:
18,525,053 UART: [state] CFI Enabled
18,532,281 UART: [fht] FMC Alias Private Key: 7
20,288,707 UART: [art] Extend RT PCRs Done
20,289,930 UART: [art] Lock RT PCRs Done
20,291,775 UART: [art] Populate DV Done
20,297,126 UART: [fht] FMC Alias Private Key: 7
20,298,618 UART: [art] Derive CDI
20,299,385 UART: [art] Store in in slot 0x4
20,341,930 UART: [art] Derive Key Pair
20,342,966 UART: [art] Store priv key in slot 0x5
22,770,224 UART: [art] Derive Key Pair - Done
22,783,501 UART: [art] Signing Cert with AUTHO
22,784,801 UART: RITY.KEYID = 7
24,490,000 UART: [art] Erasing AUTHORITY.KEYID = 7
24,491,489 UART: [art] PUB.X = E8B43FF5F287D84BE2A4CD6EF8FE9AAF159B693CA292F5E3D4469C200ADD4FD252090F1CFA147CF1EE99BD79256CBA8E
24,498,799 UART: [art] PUB.Y = FC99C69401A86A11A52D97940A8A6E5D0FE9D3C79EDA5C79DE1C9CE65413364CE3246F5598A95D76BEF3E0779B58847D
24,506,092 UART: [art] SIG.R = ABE5175D031F8B589F229E66C04CC4BC33646965BBEA5E7C4F9F9A82DB303438DD35055B570EB5297D9F6B440066DB33
24,513,445 UART: [art] SIG.S = E6A2BB2E24876A8E21D1EACCCF7A4D10D3F455991756C7606B12657AC12DB33DC29F4C73C175F0D4F5D40F9AC5E25226
25,492,484 UART: Caliptra RT
25,493,203 UART: [state] CFI Enabled
25,609,620 UART: [rt] RT listening for mailbox commands...
25,612,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,643,120 UART: [rt]cmd =0x44504543, len=96
29,926,679 >>> mbox cmd response data (6236 bytes)
29,956,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
29,987,091 UART: [rt]cmd =0x44504543, len=96
30,018,887 >>> mbox cmd response data (56 bytes)
30,019,642 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,049,565 UART: [rt]cmd =0x52564348, len=36
30,051,894 >>> mbox cmd response data (8 bytes)
30,052,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,082,811 UART: [rt]cmd =0x44504543, len=96
34,366,152 >>> mbox cmd response data (6236 bytes)
34,394,948 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,425,651 UART: [rt]cmd =0x53574545, len=84
38,561,116 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,057 UART:
192,443 UART: Running Caliptra ROM ...
193,640 UART:
193,801 UART: [state] CFI Enabled
267,046 UART: [state] LifecycleState = Unprovisioned
269,475 UART: [state] DebugLocked = No
270,617 UART: [state] WD Timer not started. Device not locked for debugging
274,552 UART: [kat] SHA2-256
464,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,211 UART: [kat] ++
475,662 UART: [kat] sha1
487,032 UART: [kat] SHA2-256
490,070 UART: [kat] SHA2-384
496,106 UART: [kat] SHA2-512-ACC
498,700 UART: [kat] ECC-384
2,944,903 UART: [kat] HMAC-384Kdf
2,969,289 UART: [kat] LMS
3,501,057 UART: [kat] --
3,506,006 UART: [cold-reset] ++
3,507,244 UART: [fht] FHT @ 0x50003400
3,517,945 UART: [idev] ++
3,518,586 UART: [idev] CDI.KEYID = 6
3,519,618 UART: [idev] SUBJECT.KEYID = 7
3,520,744 UART: [idev] UDS.KEYID = 0
3,521,677 ready_for_fw is high
3,521,891 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,564 UART: [idev] Erasing UDS.KEYID = 0
6,024,673 UART: [idev] Sha1 KeyId Algorithm
6,046,074 UART: [idev] --
6,051,047 UART: [ldev] ++
6,051,733 UART: [ldev] CDI.KEYID = 6
6,052,810 UART: [ldev] SUBJECT.KEYID = 5
6,053,923 UART: [ldev] AUTHORITY.KEYID = 7
6,055,101 UART: [ldev] FE.KEYID = 1
6,097,725 UART: [ldev] Erasing FE.KEYID = 1
8,605,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,049 UART: [ldev] --
10,410,020 UART: [fwproc] Wait for Commands...
10,411,568 UART: [fwproc] Recv command 0x46574c44
10,413,846 UART: [fwproc] Recv'd Img size: 114168 bytes
13,851,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,050,149 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,591,788 >>> mbox cmd response: success
14,595,258 UART: [afmc] ++
14,595,921 UART: [afmc] CDI.KEYID = 6
14,597,168 UART: [afmc] SUBJECT.KEYID = 7
14,598,609 UART: [afmc] AUTHORITY.KEYID = 5
17,125,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,848,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,849,959 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,865,142 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,880,244 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,895,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,919,215 UART: [afmc] --
18,921,997 UART: [cold-reset] --
18,927,756 UART: [state] Locking Datavault
18,933,400 UART: [state] Locking PCR0, PCR1 and PCR31
18,935,566 UART: [state] Locking ICCM
18,938,425 UART: [exit] Launching FMC @ 0x40000130
18,947,118 UART:
18,947,349 UART: Running Caliptra FMC ...
18,948,443 UART:
18,948,602 UART: [state] CFI Enabled
19,005,610 UART: [fht] FMC Alias Private Key: 7
20,770,210 UART: [art] Extend RT PCRs Done
20,771,430 UART: [art] Lock RT PCRs Done
20,773,245 UART: [art] Populate DV Done
20,778,615 UART: [fht] FMC Alias Private Key: 7
20,780,217 UART: [art] Derive CDI
20,780,957 UART: [art] Store in in slot 0x4
20,837,882 UART: [art] Derive Key Pair
20,838,919 UART: [art] Store priv key in slot 0x5
23,301,750 UART: [art] Derive Key Pair - Done
23,314,855 UART: [art] Signing Cert with AUTHO
23,316,159 UART: RITY.KEYID = 7
25,027,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,029,373 UART: [art] PUB.X = 5D17514272BFFDAE10F1BB988FFF224AB560A96DA24DAC1DC84C1B398D84C8C7F7DF9C371651F9D02F35AFE116A2B4B3
25,036,650 UART: [art] PUB.Y = 01C3CFD95F9A71267C7AD5AE064BED637EDD6B27631CED79C25188C38219C55C0613C04F4A761FEDAA7A51E9455E710E
25,043,910 UART: [art] SIG.R = D6A7DD10C5C4BE32622175F308A3D3FC46AF4167CBD1CE7D9F9859040CE0798DE37BB37E48BD3DF4CE25F21999905069
25,051,363 UART: [art] SIG.S = 2DBA52D4F747729E086ADE1B9A0FC33FED55057CF2D92806F1B4397FB0E08F4582A815E7783C5418D399FA025041FB8B
26,030,218 UART: Caliptra RT
26,030,931 UART: [state] CFI Enabled
26,196,800 UART: [rt] RT listening for mailbox commands...
26,198,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,229,963 UART: [rt]cmd =0x44504543, len=96
30,609,256 >>> mbox cmd response data (6236 bytes)
30,638,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,669,195 UART: [rt]cmd =0x44504543, len=96
30,701,211 >>> mbox cmd response data (56 bytes)
30,701,957 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,731,887 UART: [rt]cmd =0x52564348, len=36
30,734,678 >>> mbox cmd response data (8 bytes)
30,735,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,765,843 UART: [rt]cmd =0x44504543, len=96
35,132,266 >>> mbox cmd response data (6236 bytes)
35,161,102 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,191,629 UART: [rt]cmd =0x53574545, len=84
39,371,190 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,435,618 ready_for_fw is high
3,436,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,717,322 >>> mbox cmd response: success
19,021,140 UART:
19,021,528 UART: Running Caliptra FMC ...
19,022,629 UART:
19,022,786 UART: [state] CFI Enabled
19,092,711 UART: [fht] FMC Alias Private Key: 7
20,856,485 UART: [art] Extend RT PCRs Done
20,857,710 UART: [art] Lock RT PCRs Done
20,859,313 UART: [art] Populate DV Done
20,864,830 UART: [fht] FMC Alias Private Key: 7
20,866,423 UART: [art] Derive CDI
20,867,166 UART: [art] Store in in slot 0x4
20,925,716 UART: [art] Derive Key Pair
20,926,759 UART: [art] Store priv key in slot 0x5
23,390,221 UART: [art] Derive Key Pair - Done
23,403,058 UART: [art] Signing Cert with AUTHO
23,404,373 UART: RITY.KEYID = 7
25,116,405 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,913 UART: [art] PUB.X = 3B736553FBAFB72015B04A2C221011803218126B4F4176290045272373F13B2C40ACAB7B3A64DC2880383E0EE33B5886
25,125,150 UART: [art] PUB.Y = F63734AB17F4E6141E4206A31E869E9F127E14F101A4CA8A999E229A10BA1B6146B789C730C422C43987A6CAC426DDDC
25,132,426 UART: [art] SIG.R = 73F254F68B7716E25C6092AADABBBE2B39A951D3089AE2AF1347F5000F4D0C4DF7341685A06E2D2A17FA86064124B1E3
25,139,804 UART: [art] SIG.S = 83C21EDF7D71002454D65CDF982E2FF65B9350AEC772D29E3B42F6841B6083C280ADEB7AB19AE284A08915CB67F0F3A9
26,118,513 UART: Caliptra RT
26,119,220 UART: [state] CFI Enabled
26,284,882 UART: [rt] RT listening for mailbox commands...
26,287,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,241 UART: [rt]cmd =0x44504543, len=96
30,697,023 >>> mbox cmd response data (6236 bytes)
30,726,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,756,964 UART: [rt]cmd =0x44504543, len=96
30,788,760 >>> mbox cmd response data (56 bytes)
30,789,485 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,819,562 UART: [rt]cmd =0x52564348, len=36
30,822,069 >>> mbox cmd response data (8 bytes)
30,822,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,853,172 UART: [rt]cmd =0x44504543, len=96
35,219,922 >>> mbox cmd response data (6236 bytes)
35,248,851 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,279,391 UART: [rt]cmd =0x53574545, len=84
39,457,861 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,685 writing to cptra_bootfsm_go
192,926 UART:
193,292 UART: Running Caliptra ROM ...
194,397 UART:
604,056 UART: [state] CFI Enabled
614,525 UART: [state] LifecycleState = Unprovisioned
616,888 UART: [state] DebugLocked = No
619,641 UART: [state] WD Timer not started. Device not locked for debugging
623,685 UART: [kat] SHA2-256
813,630 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,370 UART: [kat] ++
824,885 UART: [kat] sha1
836,891 UART: [kat] SHA2-256
839,973 UART: [kat] SHA2-384
845,463 UART: [kat] SHA2-512-ACC
848,040 UART: [kat] ECC-384
3,290,294 UART: [kat] HMAC-384Kdf
3,303,472 UART: [kat] LMS
3,835,297 UART: [kat] --
3,840,952 UART: [cold-reset] ++
3,843,171 UART: [fht] FHT @ 0x50003400
3,854,219 UART: [idev] ++
3,854,933 UART: [idev] CDI.KEYID = 6
3,855,935 UART: [idev] SUBJECT.KEYID = 7
3,857,116 UART: [idev] UDS.KEYID = 0
3,858,047 ready_for_fw is high
3,858,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,683 UART: [idev] Erasing UDS.KEYID = 0
6,336,476 UART: [idev] Sha1 KeyId Algorithm
6,360,508 UART: [idev] --
6,365,146 UART: [ldev] ++
6,365,825 UART: [ldev] CDI.KEYID = 6
6,366,710 UART: [ldev] SUBJECT.KEYID = 5
6,367,918 UART: [ldev] AUTHORITY.KEYID = 7
6,369,149 UART: [ldev] FE.KEYID = 1
6,379,630 UART: [ldev] Erasing FE.KEYID = 1
8,860,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,213 UART: [ldev] --
10,650,134 UART: [fwproc] Wait for Commands...
10,651,849 UART: [fwproc] Recv command 0x46574c44
10,654,156 UART: [fwproc] Recv'd Img size: 114168 bytes
14,106,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,328 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,841,999 >>> mbox cmd response: success
14,846,458 UART: [afmc] ++
14,847,166 UART: [afmc] CDI.KEYID = 6
14,848,278 UART: [afmc] SUBJECT.KEYID = 7
14,849,817 UART: [afmc] AUTHORITY.KEYID = 5
17,350,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,154 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,350 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,483 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,547 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,634 UART: [afmc] --
19,148,811 UART: [cold-reset] --
19,152,895 UART: [state] Locking Datavault
19,157,719 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,862 UART: [state] Locking ICCM
19,161,578 UART: [exit] Launching FMC @ 0x40000130
19,170,252 UART:
19,170,488 UART: Running Caliptra FMC ...
19,171,589 UART:
19,171,748 UART: [state] CFI Enabled
19,179,850 UART: [fht] FMC Alias Private Key: 7
20,936,420 UART: [art] Extend RT PCRs Done
20,937,659 UART: [art] Lock RT PCRs Done
20,939,183 UART: [art] Populate DV Done
20,944,650 UART: [fht] FMC Alias Private Key: 7
20,946,251 UART: [art] Derive CDI
20,947,067 UART: [art] Store in in slot 0x4
20,990,047 UART: [art] Derive Key Pair
20,991,088 UART: [art] Store priv key in slot 0x5
23,417,732 UART: [art] Derive Key Pair - Done
23,430,403 UART: [art] Signing Cert with AUTHO
23,431,883 UART: RITY.KEYID = 7
25,136,716 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,219 UART: [art] PUB.X = 97FD1FE9CB384BE549CE21DA4B4F3B6E2806BD2C78CF8684D9C488923BD4A68541B2D9F8A00A939B25412E938157B45A
25,145,518 UART: [art] PUB.Y = 81F97F6268A8465E906C8F151CB08666FEE148EF59A80D28F34A01806B049FD25A1E7CB512396A10C41099E1235E6AAF
25,152,749 UART: [art] SIG.R = A05E4C033E1640AA233BAB106989CDE8603317F079923131E0100E2190AC39F9A048F4D7BB22E732702950EC5C14E561
25,160,144 UART: [art] SIG.S = 6FB1CA0E03278C8BFA7E440E04D2EA5F62D346B5C2F6DEADC259F142FE01659005F9F85BFEEC7F03DF8C550EFB7E4826
26,138,867 UART: Caliptra RT
26,139,571 UART: [state] CFI Enabled
26,257,203 UART: [rt] RT listening for mailbox commands...
26,259,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,290,311 UART: [rt]cmd =0x44504543, len=96
30,573,795 >>> mbox cmd response data (6236 bytes)
30,602,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,633,503 UART: [rt]cmd =0x44504543, len=96
30,664,596 >>> mbox cmd response data (56 bytes)
30,665,321 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,695,347 UART: [rt]cmd =0x52564348, len=36
30,697,939 >>> mbox cmd response data (8 bytes)
30,698,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,728,933 UART: [rt]cmd =0x44504543, len=96
35,012,014 >>> mbox cmd response data (6236 bytes)
35,041,010 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,071,678 UART: [rt]cmd =0x53574545, len=84
39,206,822 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
3,746,826 ready_for_fw is high
3,747,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,944,209 >>> mbox cmd response: success
19,199,711 UART:
19,200,110 UART: Running Caliptra FMC ...
19,201,254 UART:
19,201,425 UART: [state] CFI Enabled
19,209,507 UART: [fht] FMC Alias Private Key: 7
20,966,971 UART: [art] Extend RT PCRs Done
20,968,340 UART: [art] Lock RT PCRs Done
20,969,886 UART: [art] Populate DV Done
20,975,311 UART: [fht] FMC Alias Private Key: 7
20,976,902 UART: [art] Derive CDI
20,977,717 UART: [art] Store in in slot 0x4
21,020,335 UART: [art] Derive Key Pair
21,021,344 UART: [art] Store priv key in slot 0x5
23,448,427 UART: [art] Derive Key Pair - Done
23,461,161 UART: [art] Signing Cert with AUTHO
23,462,472 UART: RITY.KEYID = 7
25,167,898 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,409 UART: [art] PUB.X = 291E8F764BF2551056D587036F39464CD58A0BF0AD6960A183F1775B958A9FA023B45D00105F8D7F26509CF0A1F67016
25,176,601 UART: [art] PUB.Y = 7A7EAB51DB4819380577C810E946227D22AD058248AE86E378FEA654D7E090E32AA8CF8A2DE170282E46B68EA160CC4A
25,183,886 UART: [art] SIG.R = AC6EFF16AE700113CBADDA1093B45F04051AB1A57B6F58D78AF3C53A408265F346689FC458C37FB618AC0C82C2CABEA4
25,191,277 UART: [art] SIG.S = 84CBF02D6D2B761AFD74457C4D4CE1AD093750DAC94864638AB8F3BB7F8DE658D03C927CE6F3531B31EA8A13858137A5
26,170,593 UART: Caliptra RT
26,171,283 UART: [state] CFI Enabled
26,288,131 UART: [rt] RT listening for mailbox commands...
26,290,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,321,579 UART: [rt]cmd =0x44504543, len=96
30,605,651 >>> mbox cmd response data (6236 bytes)
30,634,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,665,474 UART: [rt]cmd =0x44504543, len=96
30,696,841 >>> mbox cmd response data (56 bytes)
30,697,576 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,727,503 UART: [rt]cmd =0x52564348, len=36
30,730,080 >>> mbox cmd response data (8 bytes)
30,730,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,761,244 UART: [rt]cmd =0x44504543, len=96
35,044,964 >>> mbox cmd response data (6236 bytes)
35,073,936 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,104,706 UART: [rt]cmd =0x53574545, len=84
39,240,418 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,830 UART: [state] LifecycleState = Unprovisioned
85,485 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,625 UART: [kat] SHA2-256
881,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,671 UART: [kat] ++
885,823 UART: [kat] sha1
890,045 UART: [kat] SHA2-256
891,983 UART: [kat] SHA2-384
894,904 UART: [kat] SHA2-512-ACC
896,805 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
906,894 UART: [kat] LMS
1,475,090 UART: [kat] --
1,476,247 UART: [cold-reset] ++
1,476,741 UART: [fht] Storing FHT @ 0x50003400
1,479,740 UART: [idev] ++
1,479,908 UART: [idev] CDI.KEYID = 6
1,480,268 UART: [idev] SUBJECT.KEYID = 7
1,480,692 UART: [idev] UDS.KEYID = 0
1,481,037 ready_for_fw is high
1,481,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,432 UART: [idev] Erasing UDS.KEYID = 0
1,504,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,198 UART: [idev] --
1,514,369 UART: [ldev] ++
1,514,537 UART: [ldev] CDI.KEYID = 6
1,514,900 UART: [ldev] SUBJECT.KEYID = 5
1,515,326 UART: [ldev] AUTHORITY.KEYID = 7
1,515,789 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,696 UART: [ldev] --
1,586,123 UART: [fwproc] Waiting for Commands...
1,586,746 UART: [fwproc] Received command 0x46574c44
1,587,537 UART: [fwproc] Received Image of size 114168 bytes
2,883,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,722 >>> mbox cmd response: success
3,076,740 UART: [afmc] ++
3,076,908 UART: [afmc] CDI.KEYID = 6
3,077,270 UART: [afmc] SUBJECT.KEYID = 7
3,077,695 UART: [afmc] AUTHORITY.KEYID = 5
3,112,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,936 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,716 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,444 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,329 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,019 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,984 UART: [afmc] --
3,155,924 UART: [cold-reset] --
3,156,772 UART: [state] Locking Datavault
3,157,789 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,393 UART: [state] Locking ICCM
3,158,827 UART: [exit] Launching FMC @ 0x40000130
3,164,156 UART:
3,164,172 UART: Running Caliptra FMC ...
3,164,580 UART:
3,164,634 UART: [state] CFI Enabled
3,175,025 UART: [fht] FMC Alias Private Key: 7
3,283,080 UART: [art] Extend RT PCRs Done
3,283,508 UART: [art] Lock RT PCRs Done
3,285,032 UART: [art] Populate DV Done
3,293,121 UART: [fht] FMC Alias Private Key: 7
3,294,093 UART: [art] Derive CDI
3,294,373 UART: [art] Store in in slot 0x4
3,379,768 UART: [art] Derive Key Pair
3,380,128 UART: [art] Store priv key in slot 0x5
3,393,522 UART: [art] Derive Key Pair - Done
3,408,284 UART: [art] Signing Cert with AUTHO
3,408,764 UART: RITY.KEYID = 7
3,423,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,665 UART: [art] PUB.X = D729AE77C7A6DB71EC8E328C3B24883A07CBF7222B587F039E4A4F238657475333BE45DB1388195DF6FEBC1E08A3CD39
3,431,434 UART: [art] PUB.Y = E0FD3E062B881A461497679334B7417E4FB3C29C40275D3B80FDF8D93B9DF7CAF253A4942A74D9CE70002D90F25AEEBF
3,438,369 UART: [art] SIG.R = DC1A0C82E881AA087F623ADA5F2306F25B8ACE02FC9FE4B047792A72B43E99262732E2A85EE29E8355B25CDE6380CFC8
3,445,139 UART: [art] SIG.S = C428B905E6A3A28594F47B0FE5A99613F76FB8640C6CD58E43262827D4EFE4C9AFBE85168CA18CF4E5770B2BD9B9B9BA
3,468,920 UART: Caliptra RT
3,469,173 UART: [state] CFI Enabled
3,577,239 UART: [rt] RT listening for mailbox commands...
3,577,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,329 UART: [rt]cmd =0x44504543, len=96
3,788,711 >>> mbox cmd response data (6236 bytes)
3,788,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,818,769 UART: [rt]cmd =0x44504543, len=96
3,850,900 >>> mbox cmd response data (56 bytes)
3,850,901 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,198 UART: [rt]cmd =0x52564348, len=36
3,882,535 >>> mbox cmd response data (8 bytes)
3,882,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,912,447 UART: [rt]cmd =0x44504543, len=96
4,092,791 >>> mbox cmd response data (6236 bytes)
4,092,792 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,122,613 UART: [rt]cmd =0x53574545, len=84
4,148,028 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,497 ready_for_fw is high
1,362,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,524 >>> mbox cmd response: success
2,989,554 UART:
2,989,570 UART: Running Caliptra FMC ...
2,989,978 UART:
2,990,032 UART: [state] CFI Enabled
3,000,563 UART: [fht] FMC Alias Private Key: 7
3,108,928 UART: [art] Extend RT PCRs Done
3,109,356 UART: [art] Lock RT PCRs Done
3,111,066 UART: [art] Populate DV Done
3,119,289 UART: [fht] FMC Alias Private Key: 7
3,120,357 UART: [art] Derive CDI
3,120,637 UART: [art] Store in in slot 0x4
3,206,078 UART: [art] Derive Key Pair
3,206,438 UART: [art] Store priv key in slot 0x5
3,219,394 UART: [art] Derive Key Pair - Done
3,234,174 UART: [art] Signing Cert with AUTHO
3,234,654 UART: RITY.KEYID = 7
3,250,430 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,195 UART: [art] PUB.X = 5CC9346D2E42FF78266091ED8F8094B949BA99B11DE800C3A01019992AFA0E524E32BD5E6D29CC657CB1367F6CFDA50A
3,257,947 UART: [art] PUB.Y = 2FB8AFB4D6AB5D8A3217D6757F0E0875AF947798EB1F9916EF7F9923C84FF4BC956BCA936EBAAD3E9F193C87655FB796
3,264,907 UART: [art] SIG.R = 8D65502EED103A4EE8B5587846023D3163511F3FAD02167ADE7BEA89D77A8215B28C4F3A3E2B8D00E69FA8D654C5ECA5
3,271,659 UART: [art] SIG.S = 960CA37BC4011FA9A2DDDAF076FA90B4CAC41BB8921296C93C23BB2AB92A6F493D8250060F8C7345BF7BC6B2C455B5E5
3,295,626 UART: Caliptra RT
3,295,879 UART: [state] CFI Enabled
3,403,779 UART: [rt] RT listening for mailbox commands...
3,404,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,953 UART: [rt]cmd =0x44504543, len=96
3,615,896 >>> mbox cmd response data (6236 bytes)
3,615,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,646,092 UART: [rt]cmd =0x44504543, len=96
3,678,067 >>> mbox cmd response data (56 bytes)
3,678,068 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,521 UART: [rt]cmd =0x52564348, len=36
3,709,594 >>> mbox cmd response data (8 bytes)
3,709,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,739,724 UART: [rt]cmd =0x44504543, len=96
3,919,463 >>> mbox cmd response data (6236 bytes)
3,919,464 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,583 UART: [rt]cmd =0x53574545, len=84
3,974,702 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,734 UART: [kat] SHA2-256
892,672 UART: [kat] SHA2-384
895,273 UART: [kat] SHA2-512-ACC
897,174 UART: [kat] ECC-384
902,449 UART: [kat] HMAC-384Kdf
907,239 UART: [kat] LMS
1,475,435 UART: [kat] --
1,476,464 UART: [cold-reset] ++
1,477,008 UART: [fht] Storing FHT @ 0x50003400
1,479,905 UART: [idev] ++
1,480,073 UART: [idev] CDI.KEYID = 6
1,480,433 UART: [idev] SUBJECT.KEYID = 7
1,480,857 UART: [idev] UDS.KEYID = 0
1,481,202 ready_for_fw is high
1,481,202 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,506,199 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,749 UART: [idev] --
1,515,714 UART: [ldev] ++
1,515,882 UART: [ldev] CDI.KEYID = 6
1,516,245 UART: [ldev] SUBJECT.KEYID = 5
1,516,671 UART: [ldev] AUTHORITY.KEYID = 7
1,517,134 UART: [ldev] FE.KEYID = 1
1,522,636 UART: [ldev] Erasing FE.KEYID = 1
1,548,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,075 UART: [ldev] --
1,587,544 UART: [fwproc] Waiting for Commands...
1,588,253 UART: [fwproc] Received command 0x46574c44
1,589,044 UART: [fwproc] Received Image of size 114168 bytes
2,885,588 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,618 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,970 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,577 >>> mbox cmd response: success
3,078,661 UART: [afmc] ++
3,078,829 UART: [afmc] CDI.KEYID = 6
3,079,191 UART: [afmc] SUBJECT.KEYID = 7
3,079,616 UART: [afmc] AUTHORITY.KEYID = 5
3,114,619 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,099 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,712 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,402 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,207 UART: [afmc] --
3,158,279 UART: [cold-reset] --
3,159,203 UART: [state] Locking Datavault
3,160,732 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,336 UART: [state] Locking ICCM
3,161,758 UART: [exit] Launching FMC @ 0x40000130
3,167,087 UART:
3,167,103 UART: Running Caliptra FMC ...
3,167,511 UART:
3,167,654 UART: [state] CFI Enabled
3,178,241 UART: [fht] FMC Alias Private Key: 7
3,286,398 UART: [art] Extend RT PCRs Done
3,286,826 UART: [art] Lock RT PCRs Done
3,288,178 UART: [art] Populate DV Done
3,296,569 UART: [fht] FMC Alias Private Key: 7
3,297,719 UART: [art] Derive CDI
3,297,999 UART: [art] Store in in slot 0x4
3,383,650 UART: [art] Derive Key Pair
3,384,010 UART: [art] Store priv key in slot 0x5
3,397,270 UART: [art] Derive Key Pair - Done
3,412,224 UART: [art] Signing Cert with AUTHO
3,412,704 UART: RITY.KEYID = 7
3,427,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,925 UART: [art] PUB.X = FA24F7ED5727B30211BF123E5BC24B6120DA89B5E9D52DE6709FB8DB818B535F19582C3D17FCF5E2AB711273661E631D
3,434,700 UART: [art] PUB.Y = CC05E0080E1818491A2759B6FD7F92AFDC3A66E881B9C355314397A4C97C1A1D0894F2752451BAD33D7EE93A1DFB1FD2
3,441,646 UART: [art] SIG.R = 86B2C29A91A9778EB20E00787B12457FF1CD4AB4A9055ECBECDEFADF5A4302ED6FE127CEA27D0511B3EC51B0FB9CA035
3,448,406 UART: [art] SIG.S = 9967E0F87B9B27AB02593DEEBB5A5670F31588408AC835D97D3412C927422E6D42EEB7EC83133761534EC8908971C424
3,472,684 UART: Caliptra RT
3,473,029 UART: [state] CFI Enabled
3,581,533 UART: [rt] RT listening for mailbox commands...
3,582,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,767 UART: [rt]cmd =0x44504543, len=96
3,793,724 >>> mbox cmd response data (6236 bytes)
3,793,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,616 UART: [rt]cmd =0x44504543, len=96
3,855,771 >>> mbox cmd response data (56 bytes)
3,855,772 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,885,379 UART: [rt]cmd =0x52564348, len=36
3,887,346 >>> mbox cmd response data (8 bytes)
3,887,347 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,917,276 UART: [rt]cmd =0x44504543, len=96
4,098,715 >>> mbox cmd response data (6236 bytes)
4,098,716 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,128,507 UART: [rt]cmd =0x53574545, len=84
4,154,348 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,296 ready_for_fw is high
1,363,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,443 >>> mbox cmd response: success
2,989,107 UART:
2,989,123 UART: Running Caliptra FMC ...
2,989,531 UART:
2,989,674 UART: [state] CFI Enabled
3,000,111 UART: [fht] FMC Alias Private Key: 7
3,108,612 UART: [art] Extend RT PCRs Done
3,109,040 UART: [art] Lock RT PCRs Done
3,110,492 UART: [art] Populate DV Done
3,118,655 UART: [fht] FMC Alias Private Key: 7
3,119,831 UART: [art] Derive CDI
3,120,111 UART: [art] Store in in slot 0x4
3,205,856 UART: [art] Derive Key Pair
3,206,216 UART: [art] Store priv key in slot 0x5
3,219,722 UART: [art] Derive Key Pair - Done
3,234,340 UART: [art] Signing Cert with AUTHO
3,234,820 UART: RITY.KEYID = 7
3,250,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,277 UART: [art] PUB.X = C87C793B875F5F6B341A4AB545ECF1C32BB03A6C5B6BCEBC95D4C1FC95DABE4FA441C0B704A82D53D2A23573BBD9BD28
3,258,070 UART: [art] PUB.Y = A7D546FDB9CE1C28D46C531DBD857418B7AA1AC639F07B3311D708E6B4B06A1855DC2829F2AFF36CB5965F8BD2C17209
3,265,026 UART: [art] SIG.R = 1C707CA63E50D84F709182E986D5672E33504E17F67E2D23EA0D4502673A2328BBB983AA023F480E0BCABFACC5830A8E
3,271,784 UART: [art] SIG.S = 9E0FCDAE5B153D6C6D6DDB6B6D17D7EB01F3730989442D9627A1F2627CD2EF01F2CA0849DEF4985DB73ECD824F02DB50
3,295,485 UART: Caliptra RT
3,295,830 UART: [state] CFI Enabled
3,403,269 UART: [rt] RT listening for mailbox commands...
3,403,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,259 UART: [rt]cmd =0x44504543, len=96
3,614,666 >>> mbox cmd response data (6236 bytes)
3,614,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,388 UART: [rt]cmd =0x44504543, len=96
3,676,315 >>> mbox cmd response data (56 bytes)
3,676,316 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,917 UART: [rt]cmd =0x52564348, len=36
3,708,164 >>> mbox cmd response data (8 bytes)
3,708,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,738,112 UART: [rt]cmd =0x44504543, len=96
3,918,800 >>> mbox cmd response data (6236 bytes)
3,918,801 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,948,556 UART: [rt]cmd =0x53574545, len=84
3,974,149 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,693 UART: [kat] SHA2-256
903,633 UART: [kat] SHA2-384
906,402 UART: [kat] SHA2-512-ACC
908,303 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,730 UART: [kat] LMS
1,171,058 UART: [kat] --
1,172,057 UART: [cold-reset] ++
1,172,431 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 ready_for_fw is high
1,176,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,144 UART: [idev] Erasing UDS.KEYID = 0
1,201,019 UART: [idev] Sha1 KeyId Algorithm
1,209,435 UART: [idev] --
1,210,595 UART: [ldev] ++
1,210,763 UART: [ldev] CDI.KEYID = 6
1,211,126 UART: [ldev] SUBJECT.KEYID = 5
1,211,552 UART: [ldev] AUTHORITY.KEYID = 7
1,212,015 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,718 UART: [fwproc] Wait for Commands...
1,283,378 UART: [fwproc] Recv command 0x46574c44
1,284,106 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,374 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,957 >>> mbox cmd response: success
2,773,201 UART: [afmc] ++
2,773,369 UART: [afmc] CDI.KEYID = 6
2,773,731 UART: [afmc] SUBJECT.KEYID = 7
2,774,156 UART: [afmc] AUTHORITY.KEYID = 5
2,809,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,242 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,855 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,420 UART: [afmc] --
2,853,440 UART: [cold-reset] --
2,854,246 UART: [state] Locking Datavault
2,855,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,155 UART: [state] Locking ICCM
2,856,813 UART: [exit] Launching FMC @ 0x40000130
2,862,142 UART:
2,862,158 UART: Running Caliptra FMC ...
2,862,566 UART:
2,862,620 UART: [state] CFI Enabled
2,873,223 UART: [fht] FMC Alias Private Key: 7
2,980,526 UART: [art] Extend RT PCRs Done
2,980,954 UART: [art] Lock RT PCRs Done
2,982,304 UART: [art] Populate DV Done
2,990,751 UART: [fht] FMC Alias Private Key: 7
2,991,911 UART: [art] Derive CDI
2,992,191 UART: [art] Store in in slot 0x4
3,077,784 UART: [art] Derive Key Pair
3,078,144 UART: [art] Store priv key in slot 0x5
3,091,600 UART: [art] Derive Key Pair - Done
3,106,086 UART: [art] Signing Cert with AUTHO
3,106,566 UART: RITY.KEYID = 7
3,121,776 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,541 UART: [art] PUB.X = 4CF22DBF3FD6BA03BA848792B190C2115E493BC1726234CB1C7E1D7E28C286EFB51E6C629730FB08F034FAAD1DB0F367
3,129,319 UART: [art] PUB.Y = 05ADA4E24F9E92ACC4791CD1FD25E611E6042931A91BB7FA92C7E827808E965BAA8A50183F6F6718434ACF0278A6A000
3,136,244 UART: [art] SIG.R = BEBA838C12F7FF939392E2CDBD21F4377110112195B59FCD108A6768A08816B077405866227596737BF997052ACA6F48
3,143,003 UART: [art] SIG.S = 775AEA0A5276C78DB68002DDCDCEB2C92A4068A2CA1B8A7CFF320CEFD2017BBB186BE93DA750CD751F14F18882A42E49
3,167,170 UART: Caliptra RT
3,167,423 UART: [state] CFI Enabled
3,274,644 UART: [rt] RT listening for mailbox commands...
3,275,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,850 UART: [rt]cmd =0x44504543, len=96
3,485,624 >>> mbox cmd response data (6236 bytes)
3,485,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,448 UART: [rt]cmd =0x44504543, len=96
3,547,351 >>> mbox cmd response data (56 bytes)
3,547,352 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,576,831 UART: [rt]cmd =0x52564348, len=36
3,578,874 >>> mbox cmd response data (8 bytes)
3,578,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,694 UART: [rt]cmd =0x44504543, len=96
3,789,312 >>> mbox cmd response data (6236 bytes)
3,789,313 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,168 UART: [rt]cmd =0x53574545, len=84
3,844,823 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 ready_for_fw is high
1,060,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,074 >>> mbox cmd response: success
2,684,870 UART:
2,684,886 UART: Running Caliptra FMC ...
2,685,294 UART:
2,685,348 UART: [state] CFI Enabled
2,695,963 UART: [fht] FMC Alias Private Key: 7
2,803,264 UART: [art] Extend RT PCRs Done
2,803,692 UART: [art] Lock RT PCRs Done
2,805,360 UART: [art] Populate DV Done
2,813,557 UART: [fht] FMC Alias Private Key: 7
2,814,583 UART: [art] Derive CDI
2,814,863 UART: [art] Store in in slot 0x4
2,900,396 UART: [art] Derive Key Pair
2,900,756 UART: [art] Store priv key in slot 0x5
2,913,528 UART: [art] Derive Key Pair - Done
2,927,967 UART: [art] Signing Cert with AUTHO
2,928,447 UART: RITY.KEYID = 7
2,942,937 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,702 UART: [art] PUB.X = 5A18A8A472FA1D8A1C38D13D2D458E9038A4D463EDE33A494464CE97FFEE7D93DD6279EA4175C655733FD7AA435EBD24
2,950,484 UART: [art] PUB.Y = 88B0D0603A87370AAB0450ECD4F96A48EC474517A970DEAAF0026143A8540DA1636B760F55DCD0DBBCD4CA1AB3CF0EBB
2,957,436 UART: [art] SIG.R = 656706D9F86A7B663A4AFC803069DC71C75DCCE6DB12F75F42DD2DC4C621C5A988820C42C5B923B22F79C3320BFC6266
2,964,205 UART: [art] SIG.S = C0771B5DC46897EB2185E5BDE403658B7F9F4823149E20C23425688B1AEB9F19CB8B01E4804DE767FA2E0C188DD7A556
2,988,389 UART: Caliptra RT
2,988,642 UART: [state] CFI Enabled
3,097,773 UART: [rt] RT listening for mailbox commands...
3,098,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,827 UART: [rt]cmd =0x44504543, len=96
3,308,889 >>> mbox cmd response data (6236 bytes)
3,308,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,803 UART: [rt]cmd =0x44504543, len=96
3,370,374 >>> mbox cmd response data (56 bytes)
3,370,375 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,400,032 UART: [rt]cmd =0x52564348, len=36
3,402,001 >>> mbox cmd response data (8 bytes)
3,402,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,861 UART: [rt]cmd =0x44504543, len=96
3,613,565 >>> mbox cmd response data (6236 bytes)
3,613,566 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,191 UART: [rt]cmd =0x53574545, len=84
3,669,286 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,276 UART: [kat] SHA2-256
904,216 UART: [kat] SHA2-384
906,993 UART: [kat] SHA2-512-ACC
908,894 UART: [kat] ECC-384
918,621 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,710 UART: [fht] FHT @ 0x50003400
1,175,255 UART: [idev] ++
1,175,423 UART: [idev] CDI.KEYID = 6
1,175,783 UART: [idev] SUBJECT.KEYID = 7
1,176,207 UART: [idev] UDS.KEYID = 0
1,176,552 ready_for_fw is high
1,176,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,517 UART: [idev] Erasing UDS.KEYID = 0
1,201,802 UART: [idev] Sha1 KeyId Algorithm
1,210,228 UART: [idev] --
1,211,230 UART: [ldev] ++
1,211,398 UART: [ldev] CDI.KEYID = 6
1,211,761 UART: [ldev] SUBJECT.KEYID = 5
1,212,187 UART: [ldev] AUTHORITY.KEYID = 7
1,212,650 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,204 UART: [ldev] --
1,283,569 UART: [fwproc] Wait for Commands...
1,284,185 UART: [fwproc] Recv command 0x46574c44
1,284,913 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,663 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,967 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,452 >>> mbox cmd response: success
2,773,472 UART: [afmc] ++
2,773,640 UART: [afmc] CDI.KEYID = 6
2,774,002 UART: [afmc] SUBJECT.KEYID = 7
2,774,427 UART: [afmc] AUTHORITY.KEYID = 5
2,810,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,973 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,586 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,305 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,101 UART: [afmc] --
2,853,167 UART: [cold-reset] --
2,854,073 UART: [state] Locking Datavault
2,855,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,932 UART: [state] Locking ICCM
2,856,470 UART: [exit] Launching FMC @ 0x40000130
2,861,799 UART:
2,861,815 UART: Running Caliptra FMC ...
2,862,223 UART:
2,862,366 UART: [state] CFI Enabled
2,873,125 UART: [fht] FMC Alias Private Key: 7
2,981,362 UART: [art] Extend RT PCRs Done
2,981,790 UART: [art] Lock RT PCRs Done
2,983,386 UART: [art] Populate DV Done
2,991,639 UART: [fht] FMC Alias Private Key: 7
2,992,605 UART: [art] Derive CDI
2,992,885 UART: [art] Store in in slot 0x4
3,078,366 UART: [art] Derive Key Pair
3,078,726 UART: [art] Store priv key in slot 0x5
3,092,454 UART: [art] Derive Key Pair - Done
3,107,357 UART: [art] Signing Cert with AUTHO
3,107,837 UART: RITY.KEYID = 7
3,122,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,742 UART: [art] PUB.X = 4064E7F86CB48F67FF37813C22374B857761FF51510D21AD3E1898F319B5E11DC49FC7993AA8500364D866EDF00B82BC
3,130,503 UART: [art] PUB.Y = F1AFCE54C9BCACE0F1497CC5DE94A8000150010D9D76D2925E4231188B408CC8687E7707B501E611D6AAB0CD25455968
3,137,420 UART: [art] SIG.R = D4A4D00F5BEF95446A6104499245D4C01BBBCF4874F931F9DE78215C88DC4DB08A5E7BC7648277C325FCC54C174380C4
3,144,190 UART: [art] SIG.S = 805EBB49D12B3AF0B9ADA927EA96D3DAB08279DE123340CA9BF8577B2CBE0B174326DB70F1CEDC1673A25A2F49C2A7C9
3,167,886 UART: Caliptra RT
3,168,231 UART: [state] CFI Enabled
3,275,335 UART: [rt] RT listening for mailbox commands...
3,276,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,747 UART: [rt]cmd =0x44504543, len=96
3,488,178 >>> mbox cmd response data (6236 bytes)
3,488,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,182 UART: [rt]cmd =0x44504543, len=96
3,549,601 >>> mbox cmd response data (56 bytes)
3,549,602 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,579,111 UART: [rt]cmd =0x52564348, len=36
3,581,310 >>> mbox cmd response data (8 bytes)
3,581,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,354 UART: [rt]cmd =0x44504543, len=96
3,792,441 >>> mbox cmd response data (6236 bytes)
3,792,442 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,822,147 UART: [rt]cmd =0x53574545, len=84
3,848,432 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,934 ready_for_fw is high
1,059,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,935 >>> mbox cmd response: success
2,687,889 UART:
2,687,905 UART: Running Caliptra FMC ...
2,688,313 UART:
2,688,456 UART: [state] CFI Enabled
2,698,867 UART: [fht] FMC Alias Private Key: 7
2,807,248 UART: [art] Extend RT PCRs Done
2,807,676 UART: [art] Lock RT PCRs Done
2,809,128 UART: [art] Populate DV Done
2,817,331 UART: [fht] FMC Alias Private Key: 7
2,818,435 UART: [art] Derive CDI
2,818,715 UART: [art] Store in in slot 0x4
2,904,782 UART: [art] Derive Key Pair
2,905,142 UART: [art] Store priv key in slot 0x5
2,918,088 UART: [art] Derive Key Pair - Done
2,932,840 UART: [art] Signing Cert with AUTHO
2,933,320 UART: RITY.KEYID = 7
2,948,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,283 UART: [art] PUB.X = C6EDEA14F6CAABFF9D462C024EA6F4828D5EAE4D00DC166CBF43DC94749260CE1F9B8A8B129B3E8BD68DDF0885C6837B
2,956,051 UART: [art] PUB.Y = B4179C5188A8E309E8D064C879F6DD3AE50EE7455D030294C353D9C97CDE34AD50DD1EBDC7CE869D9ACAEF9E22FE1AFC
2,963,013 UART: [art] SIG.R = 7FF19FE0158C0363BE842F9F6DA2671006C235240F280B92654CA03C57A2AAD91C4886495B2CB0DAB5CD83CC24B226D9
2,969,777 UART: [art] SIG.S = 119B72E392C37C419790AC28E58AA5F9B9FE2CA6515968853298FD1ADBB536F8F05A28B1F51A074BFC670F959D0AF891
2,993,431 UART: Caliptra RT
2,993,776 UART: [state] CFI Enabled
3,101,197 UART: [rt] RT listening for mailbox commands...
3,101,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,235 UART: [rt]cmd =0x44504543, len=96
3,314,117 >>> mbox cmd response data (6236 bytes)
3,314,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,344,139 UART: [rt]cmd =0x44504543, len=96
3,376,006 >>> mbox cmd response data (56 bytes)
3,376,007 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,684 UART: [rt]cmd =0x52564348, len=36
3,407,673 >>> mbox cmd response data (8 bytes)
3,407,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,801 UART: [rt]cmd =0x44504543, len=96
3,619,088 >>> mbox cmd response data (6236 bytes)
3,619,089 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,648,786 UART: [rt]cmd =0x53574545, len=84
3,674,077 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,470 UART: [kat] LMS
1,168,782 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,173,943 ready_for_fw is high
1,173,943 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,508 UART: [ldev] --
1,280,884 UART: [fwproc] Wait for Commands...
1,281,601 UART: [fwproc] Recv command 0x46574c44
1,282,334 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,803 >>> mbox cmd response: success
2,771,026 UART: [afmc] ++
2,771,194 UART: [afmc] CDI.KEYID = 6
2,771,557 UART: [afmc] SUBJECT.KEYID = 7
2,771,983 UART: [afmc] AUTHORITY.KEYID = 5
2,807,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,960 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,843 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,562 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,187 UART: [afmc] --
2,850,215 UART: [cold-reset] --
2,850,931 UART: [state] Locking Datavault
2,851,942 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,546 UART: [state] Locking ICCM
2,853,186 UART: [exit] Launching FMC @ 0x40000130
2,858,515 UART:
2,858,531 UART: Running Caliptra FMC ...
2,858,939 UART:
2,858,993 UART: [state] CFI Enabled
2,869,240 UART: [fht] FMC Alias Private Key: 7
2,976,483 UART: [art] Extend RT PCRs Done
2,976,911 UART: [art] Lock RT PCRs Done
2,978,791 UART: [art] Populate DV Done
2,987,090 UART: [fht] FMC Alias Private Key: 7
2,988,194 UART: [art] Derive CDI
2,988,474 UART: [art] Store in in slot 0x4
3,073,849 UART: [art] Derive Key Pair
3,074,209 UART: [art] Store priv key in slot 0x5
3,086,867 UART: [art] Derive Key Pair - Done
3,101,510 UART: [art] Signing Cert with AUTHO
3,101,990 UART: RITY.KEYID = 7
3,116,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,759 UART: [art] PUB.X = C9CC36BEBB10C0467BC3489D4652437CD993B4FA2F6EC0B2F3DAEBE2E1FF14416F0D46FA862167D0EC80AF1DC53163C4
3,124,546 UART: [art] PUB.Y = C0338F77165FB6A173741D15D0ED849DD6433675ED3BF06DA25CE63AA050EF8980DB495957D58D0EE0623C1F9CB15C0B
3,131,498 UART: [art] SIG.R = E2AC110D013B189980D30ADA35DE99430BFC013FAB64E1E6471AEED472AA68840D9D8ACDB3DF4AEB85BEBCEFCE4DF8C9
3,138,282 UART: [art] SIG.S = CB1E92B80A62089102AA5A755696D2CD6EBD1D71B0ED09C72CBAFB18256A0890F03CB5468F5290E4780D04BEBD24BBBD
3,161,890 UART: Caliptra RT
3,162,143 UART: [state] CFI Enabled
3,270,485 UART: [rt] RT listening for mailbox commands...
3,271,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,539 UART: [rt]cmd =0x44504543, len=96
3,482,031 >>> mbox cmd response data (6236 bytes)
3,482,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,511,839 UART: [rt]cmd =0x44504543, len=96
3,544,030 >>> mbox cmd response data (56 bytes)
3,544,031 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,616 UART: [rt]cmd =0x52564348, len=36
3,575,737 >>> mbox cmd response data (8 bytes)
3,575,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,605,387 UART: [rt]cmd =0x44504543, len=96
3,786,708 >>> mbox cmd response data (6236 bytes)
3,786,709 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,658 UART: [rt]cmd =0x53574545, len=84
3,842,505 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,392 ready_for_fw is high
1,056,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,489 >>> mbox cmd response: success
2,681,789 UART:
2,681,805 UART: Running Caliptra FMC ...
2,682,213 UART:
2,682,267 UART: [state] CFI Enabled
2,693,084 UART: [fht] FMC Alias Private Key: 7
2,800,669 UART: [art] Extend RT PCRs Done
2,801,097 UART: [art] Lock RT PCRs Done
2,802,421 UART: [art] Populate DV Done
2,810,650 UART: [fht] FMC Alias Private Key: 7
2,811,588 UART: [art] Derive CDI
2,811,868 UART: [art] Store in in slot 0x4
2,897,239 UART: [art] Derive Key Pair
2,897,599 UART: [art] Store priv key in slot 0x5
2,910,833 UART: [art] Derive Key Pair - Done
2,925,976 UART: [art] Signing Cert with AUTHO
2,926,456 UART: RITY.KEYID = 7
2,942,054 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,819 UART: [art] PUB.X = 3984E045466EA7FE5D857DAA403142C9ADF2FC29B1D749515CBC44A84B003F3F2EF51C7CB75B46905BDFDC87E38AC39A
2,949,583 UART: [art] PUB.Y = 70FC46ECE1DC840B3001927BEFDDFBA1752B79182842D8736E8CBB630C1C203E2F0F232FEE4745D6D52725B798084B34
2,956,524 UART: [art] SIG.R = A1BC899BB3DC505419125D1FAAA523B0A7A27DBCB72F9C3AAB8B706F564A6B9F0261235967AF90BA514D2F872DC578E7
2,963,305 UART: [art] SIG.S = 6F770E46525548D8534A6DAB7C3E8224C08252FE7AE5C572406E81AF09AA9CAC67E68CDF0BC8820B295E6ED741AD33D2
2,987,470 UART: Caliptra RT
2,987,723 UART: [state] CFI Enabled
3,095,286 UART: [rt] RT listening for mailbox commands...
3,095,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,432 UART: [rt]cmd =0x44504543, len=96
3,306,654 >>> mbox cmd response data (6236 bytes)
3,306,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,704 UART: [rt]cmd =0x44504543, len=96
3,368,803 >>> mbox cmd response data (56 bytes)
3,368,804 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,398,249 UART: [rt]cmd =0x52564348, len=36
3,400,410 >>> mbox cmd response data (8 bytes)
3,400,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,266 UART: [rt]cmd =0x44504543, len=96
3,610,979 >>> mbox cmd response data (6236 bytes)
3,610,980 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,977 UART: [rt]cmd =0x53574545, len=84
3,666,388 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,428 UART: [kat] ++
895,580 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
917,055 UART: [kat] HMAC-384Kdf
921,831 UART: [kat] LMS
1,170,143 UART: [kat] --
1,170,882 UART: [cold-reset] ++
1,171,332 UART: [fht] FHT @ 0x50003400
1,173,980 UART: [idev] ++
1,174,148 UART: [idev] CDI.KEYID = 6
1,174,509 UART: [idev] SUBJECT.KEYID = 7
1,174,934 UART: [idev] UDS.KEYID = 0
1,175,280 ready_for_fw is high
1,175,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,916 UART: [idev] Sha1 KeyId Algorithm
1,208,616 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,251 UART: [ldev] SUBJECT.KEYID = 5
1,210,678 UART: [ldev] AUTHORITY.KEYID = 7
1,211,141 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,242,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,319 UART: [ldev] --
1,281,817 UART: [fwproc] Wait for Commands...
1,282,390 UART: [fwproc] Recv command 0x46574c44
1,283,123 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,159 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,990 >>> mbox cmd response: success
2,771,079 UART: [afmc] ++
2,771,247 UART: [afmc] CDI.KEYID = 6
2,771,610 UART: [afmc] SUBJECT.KEYID = 7
2,772,036 UART: [afmc] AUTHORITY.KEYID = 5
2,807,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,248 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,977 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,860 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,579 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,194 UART: [afmc] --
2,851,180 UART: [cold-reset] --
2,851,814 UART: [state] Locking Datavault
2,852,851 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,455 UART: [state] Locking ICCM
2,853,943 UART: [exit] Launching FMC @ 0x40000130
2,859,272 UART:
2,859,288 UART: Running Caliptra FMC ...
2,859,696 UART:
2,859,839 UART: [state] CFI Enabled
2,870,828 UART: [fht] FMC Alias Private Key: 7
2,978,649 UART: [art] Extend RT PCRs Done
2,979,077 UART: [art] Lock RT PCRs Done
2,980,721 UART: [art] Populate DV Done
2,988,970 UART: [fht] FMC Alias Private Key: 7
2,990,090 UART: [art] Derive CDI
2,990,370 UART: [art] Store in in slot 0x4
3,075,921 UART: [art] Derive Key Pair
3,076,281 UART: [art] Store priv key in slot 0x5
3,089,805 UART: [art] Derive Key Pair - Done
3,104,658 UART: [art] Signing Cert with AUTHO
3,105,138 UART: RITY.KEYID = 7
3,120,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,789 UART: [art] PUB.X = 561B60EEDF821B7EB0CD1FC522DABA9AA443F0A8C1F007B767CEC508D639A769E75C32EB672E645341E4FAA5B6E67CDF
3,127,575 UART: [art] PUB.Y = 4A6C18AEF513964946D50F5E534E451DF145EB048E4DFB4C82155D00B5C3AF9F3A3DC55C1D7E2476EF6782048B2C2836
3,134,500 UART: [art] SIG.R = BEEF74EB00A3011EC32EAC2D73727A5E30F4699EFEC1FE4B5B5B2720CE12EAB8670D099D6C608F7F52CF97812F8928BC
3,141,257 UART: [art] SIG.S = F799FBD616EC7221EA02BAB40C6B3BE46BB801769762E481CEABF0FA07B55FB4729C7373AE2534E0521A7C9091E0022B
3,164,963 UART: Caliptra RT
3,165,308 UART: [state] CFI Enabled
3,273,616 UART: [rt] RT listening for mailbox commands...
3,274,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,502 UART: [rt]cmd =0x44504543, len=96
3,486,390 >>> mbox cmd response data (6236 bytes)
3,486,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,510 UART: [rt]cmd =0x44504543, len=96
3,547,821 >>> mbox cmd response data (56 bytes)
3,547,822 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,577,405 UART: [rt]cmd =0x52564348, len=36
3,579,808 >>> mbox cmd response data (8 bytes)
3,579,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,670 UART: [rt]cmd =0x44504543, len=96
3,789,958 >>> mbox cmd response data (6236 bytes)
3,789,959 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,819,800 UART: [rt]cmd =0x53574545, len=84
3,846,139 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,737 ready_for_fw is high
1,056,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,186 >>> mbox cmd response: success
2,684,370 UART:
2,684,386 UART: Running Caliptra FMC ...
2,684,794 UART:
2,684,937 UART: [state] CFI Enabled
2,695,734 UART: [fht] FMC Alias Private Key: 7
2,803,737 UART: [art] Extend RT PCRs Done
2,804,165 UART: [art] Lock RT PCRs Done
2,805,865 UART: [art] Populate DV Done
2,814,122 UART: [fht] FMC Alias Private Key: 7
2,815,236 UART: [art] Derive CDI
2,815,516 UART: [art] Store in in slot 0x4
2,901,261 UART: [art] Derive Key Pair
2,901,621 UART: [art] Store priv key in slot 0x5
2,914,961 UART: [art] Derive Key Pair - Done
2,929,778 UART: [art] Signing Cert with AUTHO
2,930,258 UART: RITY.KEYID = 7
2,945,354 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,119 UART: [art] PUB.X = 24C8B9BA6F256AEF6517778B028E7E68DC51E365200E904BDAA6834532CA91D1C06D44BA506935E2CA13D0A27A43C0F9
2,952,889 UART: [art] PUB.Y = 4677CCA983EE23B73C77EDB2FB49D3874655BFE9091EA48C438EE346D693373155ACD7D67CB7787609C80D0DEE4A7EC3
2,959,837 UART: [art] SIG.R = F215079D54FDA1863BE402E51A3EF97ACCA3EFE211C2AE7C5A58447AE580A4D238E43352504CDDB7CBC5ED5F66C448F6
2,966,619 UART: [art] SIG.S = 4620D1C90E0B14E9227AC6ECAF244D3CAAB9FF881AF4E9906343C66A70A69A761AA319E7669DFC7A6BB84507324B2E81
2,990,713 UART: Caliptra RT
2,991,058 UART: [state] CFI Enabled
3,099,301 UART: [rt] RT listening for mailbox commands...
3,099,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,527 UART: [rt]cmd =0x44504543, len=96
3,310,890 >>> mbox cmd response data (6236 bytes)
3,310,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,960 UART: [rt]cmd =0x44504543, len=96
3,372,215 >>> mbox cmd response data (56 bytes)
3,372,216 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,401,751 UART: [rt]cmd =0x52564348, len=36
3,403,990 >>> mbox cmd response data (8 bytes)
3,403,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,782 UART: [rt]cmd =0x44504543, len=96
3,614,584 >>> mbox cmd response data (6236 bytes)
3,614,585 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,644,508 UART: [rt]cmd =0x53574545, len=84
3,670,675 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,228 UART:
192,573 UART: Running Caliptra ROM ...
193,757 UART:
193,910 UART: [state] CFI Enabled
260,958 UART: [state] LifecycleState = Unprovisioned
262,939 UART: [state] DebugLocked = No
264,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,045 UART: [kat] SHA2-256
438,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,288 UART: [kat] ++
449,774 UART: [kat] sha1
460,167 UART: [kat] SHA2-256
462,887 UART: [kat] SHA2-384
468,049 UART: [kat] SHA2-512-ACC
470,392 UART: [kat] ECC-384
2,766,154 UART: [kat] HMAC-384Kdf
2,778,069 UART: [kat] LMS
3,968,339 UART: [kat] --
3,974,279 UART: [cold-reset] ++
3,976,500 UART: [fht] Storing FHT @ 0x50003400
3,988,842 UART: [idev] ++
3,989,447 UART: [idev] CDI.KEYID = 6
3,990,361 UART: [idev] SUBJECT.KEYID = 7
3,991,596 UART: [idev] UDS.KEYID = 0
3,992,576 ready_for_fw is high
3,992,767 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,759 UART: [idev] Erasing UDS.KEYID = 0
7,325,364 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,787 UART: [idev] --
7,350,918 UART: [ldev] ++
7,351,486 UART: [ldev] CDI.KEYID = 6
7,352,441 UART: [ldev] SUBJECT.KEYID = 5
7,353,669 UART: [ldev] AUTHORITY.KEYID = 7
7,354,898 UART: [ldev] FE.KEYID = 1
7,400,854 UART: [ldev] Erasing FE.KEYID = 1
10,733,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,148 UART: [ldev] --
13,095,490 UART: [fwproc] Waiting for Commands...
13,097,253 UART: [fwproc] Received command 0x46574c44
13,099,426 UART: [fwproc] Received Image of size 113844 bytes
17,147,279 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,222,418 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,291,271 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,606,822 >>> mbox cmd response: success
17,610,313 UART: [afmc] ++
17,610,908 UART: [afmc] CDI.KEYID = 6
17,611,815 UART: [afmc] SUBJECT.KEYID = 7
17,613,086 UART: [afmc] AUTHORITY.KEYID = 5
20,982,591 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,789 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,284,051 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,440 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,302 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,742 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,275 UART: [afmc] --
23,353,773 UART: [cold-reset] --
23,359,256 UART: [state] Locking Datavault
23,364,820 UART: [state] Locking PCR0, PCR1 and PCR31
23,366,573 UART: [state] Locking ICCM
23,367,953 UART: [exit] Launching FMC @ 0x40000130
23,376,366 UART:
23,376,595 UART: Running Caliptra FMC ...
23,377,687 UART:
23,377,840 UART: [state] CFI Enabled
23,443,722 UART: [fht] FMC Alias Private Key: 7
25,781,194 UART: [art] Extend RT PCRs Done
25,782,412 UART: [art] Lock RT PCRs Done
25,784,274 UART: [art] Populate DV Done
25,789,520 UART: [fht] FMC Alias Private Key: 7
25,791,047 UART: [art] Derive CDI
25,791,778 UART: [art] Store in in slot 0x4
25,852,757 UART: [art] Derive Key Pair
25,853,789 UART: [art] Store priv key in slot 0x5
29,146,651 UART: [art] Derive Key Pair - Done
29,159,862 UART: [art] Signing Cert with AUTHO
29,161,164 UART: RITY.KEYID = 7
31,448,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,807 UART: [art] PUB.X = 1CCBB1518136C20546A257C06BAC8BBEDD60C2AAA109EF0B8EBD3FFB84B531307F4AC1EE2959E183262606A1892DC508
31,457,023 UART: [art] PUB.Y = 34E3BA0471FBECAA41162CD13D784E61B07354EDCC71606108FCA06016CD335F9A8E81DBD7ABCCA30B3ACB2A32CEFEAA
31,464,349 UART: [art] SIG.R = E7FF5A9C2C9915D66BD3C1903C29CB56682763D3DF9A2687CA5940BD8189734CCAB6BF2A2AD4CBBA0180D9674D4D5CCF
31,471,708 UART: [art] SIG.S = 59614FB7547F9AA604ABD23C9464F95781E1DF3AE86FCE2C2C82E5BCEA3940296FB41BFBFC4934A23F4510DB9FD73CA9
32,776,958 UART: Caliptra RT
32,777,671 UART: [state] CFI Enabled
32,939,756 UART: [rt] RT listening for mailbox commands...
32,941,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,972,943 UART: [rt]cmd =0x44504543, len=96
38,757,347 >>> mbox cmd response data (6236 bytes)
38,786,704 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,817,535 UART: [rt]cmd =0x53574545, len=84
44,402,780 >>> mbox cmd response data (200 bytes)
44,789,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,820,775 UART: [rt]cmd =0x44504543, len=96
44,851,535 >>> mbox cmd response data (56 bytes)
44,852,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,882,775 UART: [rt]cmd =0x44504543, len=96
44,933,794 >>> mbox cmd response data (24 bytes)
44,934,341 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,964,976 UART: [rt]cmd =0x53574545, len=84
50,545,756 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,806,895 ready_for_fw is high
3,807,467 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,867,292 >>> mbox cmd response: success
23,571,065 UART:
23,571,452 UART: Running Caliptra FMC ...
23,572,579 UART:
23,572,755 UART: [state] CFI Enabled
23,641,341 UART: [fht] FMC Alias Private Key: 7
25,979,067 UART: [art] Extend RT PCRs Done
25,980,297 UART: [art] Lock RT PCRs Done
25,981,787 UART: [art] Populate DV Done
25,986,767 UART: [fht] FMC Alias Private Key: 7
25,988,474 UART: [art] Derive CDI
25,989,281 UART: [art] Store in in slot 0x4
26,050,977 UART: [art] Derive Key Pair
26,052,041 UART: [art] Store priv key in slot 0x5
29,344,725 UART: [art] Derive Key Pair - Done
29,357,941 UART: [art] Signing Cert with AUTHO
29,359,244 UART: RITY.KEYID = 7
31,646,647 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,154 UART: [art] PUB.X = AE034CB3B21D1F1AA130262826AFB026853A54C4384EDF87586DDE76B54629522BAD40CA9F91685DF2C065CC6F3F59AE
31,655,414 UART: [art] PUB.Y = 5598E4048F9B5C1B49B50F390E0FD0E4FCBD0FF4AA41070D9437EE001B6BE4B0A76F833F68102810A13711124A361F3C
31,662,635 UART: [art] SIG.R = BECBBEBD8F7E65DB3A4BBFA03AB14F0DC6FF66806520610B59EDE999CBD463D708413F120E69408693C3A0699EFD3032
31,669,995 UART: [art] SIG.S = 49654B1654C426D81BF9A8A7081302CDD2155538F009EFC12092BE5E33B743B2A72DB3A081E0042B8587A1A8AC0E50AB
32,975,130 UART: Caliptra RT
32,975,839 UART: [state] CFI Enabled
33,136,912 UART: [rt] RT listening for mailbox commands...
33,139,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,170,078 UART: [rt]cmd =0x44504543, len=96
38,933,458 >>> mbox cmd response data (6236 bytes)
38,962,731 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,993,143 UART: [rt]cmd =0x53574545, len=84
44,577,388 >>> mbox cmd response data (200 bytes)
44,963,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,994,025 UART: [rt]cmd =0x44504543, len=96
45,025,421 >>> mbox cmd response data (56 bytes)
45,026,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,056,966 UART: [rt]cmd =0x44504543, len=96
45,107,258 >>> mbox cmd response data (24 bytes)
45,107,854 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,138,317 UART: [rt]cmd =0x53574545, len=84
50,719,940 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,341 UART:
192,701 UART: Running Caliptra ROM ...
193,833 UART:
603,710 UART: [state] CFI Enabled
616,733 UART: [state] LifecycleState = Unprovisioned
618,675 UART: [state] DebugLocked = No
620,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,068 UART: [kat] SHA2-256
794,813 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,331 UART: [kat] ++
805,780 UART: [kat] sha1
816,318 UART: [kat] SHA2-256
819,012 UART: [kat] SHA2-384
825,229 UART: [kat] SHA2-512-ACC
827,593 UART: [kat] ECC-384
3,112,758 UART: [kat] HMAC-384Kdf
3,123,367 UART: [kat] LMS
4,313,490 UART: [kat] --
4,318,626 UART: [cold-reset] ++
4,320,203 UART: [fht] Storing FHT @ 0x50003400
4,332,677 UART: [idev] ++
4,333,242 UART: [idev] CDI.KEYID = 6
4,334,333 UART: [idev] SUBJECT.KEYID = 7
4,335,394 UART: [idev] UDS.KEYID = 0
4,336,439 ready_for_fw is high
4,336,656 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,549 UART: [idev] Erasing UDS.KEYID = 0
7,625,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,195 UART: [idev] --
7,650,725 UART: [ldev] ++
7,651,292 UART: [ldev] CDI.KEYID = 6
7,652,253 UART: [ldev] SUBJECT.KEYID = 5
7,653,464 UART: [ldev] AUTHORITY.KEYID = 7
7,654,746 UART: [ldev] FE.KEYID = 1
7,665,100 UART: [ldev] Erasing FE.KEYID = 1
10,956,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,002 UART: [ldev] --
13,319,067 UART: [fwproc] Waiting for Commands...
13,320,840 UART: [fwproc] Received command 0x46574c44
13,323,026 UART: [fwproc] Received Image of size 113844 bytes
17,378,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,452,681 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,521,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,838,562 >>> mbox cmd response: success
17,843,079 UART: [afmc] ++
17,843,679 UART: [afmc] CDI.KEYID = 6
17,844,567 UART: [afmc] SUBJECT.KEYID = 7
17,845,836 UART: [afmc] AUTHORITY.KEYID = 5
21,155,993 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,449,958 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,266 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,466,624 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,444 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,495,869 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,516,179 UART: [afmc] --
23,519,557 UART: [cold-reset] --
23,523,310 UART: [state] Locking Datavault
23,528,835 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,590 UART: [state] Locking ICCM
23,532,654 UART: [exit] Launching FMC @ 0x40000130
23,541,011 UART:
23,541,256 UART: Running Caliptra FMC ...
23,542,358 UART:
23,542,520 UART: [state] CFI Enabled
23,550,783 UART: [fht] FMC Alias Private Key: 7
25,881,916 UART: [art] Extend RT PCRs Done
25,883,137 UART: [art] Lock RT PCRs Done
25,884,831 UART: [art] Populate DV Done
25,890,068 UART: [fht] FMC Alias Private Key: 7
25,891,560 UART: [art] Derive CDI
25,892,297 UART: [art] Store in in slot 0x4
25,934,416 UART: [art] Derive Key Pair
25,935,455 UART: [art] Store priv key in slot 0x5
29,177,459 UART: [art] Derive Key Pair - Done
29,190,784 UART: [art] Signing Cert with AUTHO
29,192,113 UART: RITY.KEYID = 7
31,472,006 UART: [art] Erasing AUTHORITY.KEYID = 7
31,473,520 UART: [art] PUB.X = C5A6615328439817D95355EA8F5A208C8F14C8656FAB291349934DC199AE6EE470426093FD54B4476C1B1ECAFB643EC0
31,480,720 UART: [art] PUB.Y = 5105043508BE7A6CB9DDF56DBECEBA213BC36DDC0D1A6825894CD53C3AD37BD04207ED2FE3CC8EAE5D225F21EB2ABA76
31,488,019 UART: [art] SIG.R = 803E2A6FC4C91513ED5C75B0A023A2BFA7983D08510BBE45BC5B4E0AAD8FED8FBA736166F3F819B9CB3D3134F30EDC30
31,495,430 UART: [art] SIG.S = C16C29F57984D95947B569CAA8F75A2A63711E8960E76775D2E33F13CA3F821D863A07A41620FC7139B2072E8C18DC68
32,800,306 UART: Caliptra RT
32,801,019 UART: [state] CFI Enabled
32,918,915 UART: [rt] RT listening for mailbox commands...
32,921,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,952,366 UART: [rt]cmd =0x44504543, len=96
38,625,767 >>> mbox cmd response data (6236 bytes)
38,655,123 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,685,490 UART: [rt]cmd =0x53574545, len=84
44,210,225 >>> mbox cmd response data (200 bytes)
44,594,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,625,299 UART: [rt]cmd =0x44504543, len=96
44,655,663 >>> mbox cmd response data (56 bytes)
44,656,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,686,916 UART: [rt]cmd =0x44504543, len=96
44,725,806 >>> mbox cmd response data (24 bytes)
44,726,360 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,756,733 UART: [rt]cmd =0x53574545, len=84
50,281,637 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,142,619 ready_for_fw is high
4,143,262 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,078,681 >>> mbox cmd response: success
23,719,219 UART:
23,720,120 UART: Running Caliptra FMC ...
23,721,259 UART:
23,721,417 UART: [state] CFI Enabled
23,728,844 UART: [fht] FMC Alias Private Key: 7
26,059,287 UART: [art] Extend RT PCRs Done
26,060,513 UART: [art] Lock RT PCRs Done
26,062,410 UART: [art] Populate DV Done
26,067,720 UART: [fht] FMC Alias Private Key: 7
26,069,425 UART: [art] Derive CDI
26,070,249 UART: [art] Store in in slot 0x4
26,112,764 UART: [art] Derive Key Pair
26,113,804 UART: [art] Store priv key in slot 0x5
29,356,007 UART: [art] Derive Key Pair - Done
29,369,206 UART: [art] Signing Cert with AUTHO
29,370,543 UART: RITY.KEYID = 7
31,650,269 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,774 UART: [art] PUB.X = A646865A32803977EC78861CB865C7BEDE6224FE878EFED2DE433106C5180A9085498B97223F44FC508F2AFDA029B619
31,658,980 UART: [art] PUB.Y = D8735C8191C5A97F9D70B56F0B7AD694329AA4BA042425DD6BB82FE7ED35A017EBC13288EAAC9B828F6F55542B2354B6
31,666,226 UART: [art] SIG.R = 043CE204C624C4F4D45554BC55EC483C0BC8A929CE13448599E92BB382E6FC2AB4A5A6156BB3DB38A1B25B4CBAB09B3E
31,673,630 UART: [art] SIG.S = 3A3B123BA41532F1A03F29D3646042DE7FDE54028025CA70F2BAE31B92D3A36EC3A1BA38C1468D0764F64A6CAED530D0
32,978,142 UART: Caliptra RT
32,978,859 UART: [state] CFI Enabled
33,096,570 UART: [rt] RT listening for mailbox commands...
33,099,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,130,297 UART: [rt]cmd =0x44504543, len=96
38,802,411 >>> mbox cmd response data (6236 bytes)
38,831,824 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,862,552 UART: [rt]cmd =0x53574545, len=84
44,387,037 >>> mbox cmd response data (200 bytes)
44,770,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,801,449 UART: [rt]cmd =0x44504543, len=96
44,832,315 >>> mbox cmd response data (56 bytes)
44,833,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,863,449 UART: [rt]cmd =0x44504543, len=96
44,901,920 >>> mbox cmd response data (24 bytes)
44,902,523 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,932,986 UART: [rt]cmd =0x53574545, len=84
50,457,114 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,215 UART:
192,577 UART: Running Caliptra ROM ...
193,686 UART:
193,830 UART: [state] CFI Enabled
262,466 UART: [state] LifecycleState = Unprovisioned
264,368 UART: [state] DebugLocked = No
266,265 UART: [state] WD Timer not started. Device not locked for debugging
269,393 UART: [kat] SHA2-256
448,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,093 UART: [kat] ++
460,547 UART: [kat] sha1
470,922 UART: [kat] SHA2-256
474,007 UART: [kat] SHA2-384
478,777 UART: [kat] SHA2-512-ACC
481,687 UART: [kat] ECC-384
2,947,798 UART: [kat] HMAC-384Kdf
2,969,714 UART: [kat] LMS
3,499,160 UART: [kat] --
3,504,285 UART: [cold-reset] ++
3,506,072 UART: [fht] FHT @ 0x50003400
3,517,064 UART: [idev] ++
3,517,637 UART: [idev] CDI.KEYID = 6
3,518,731 UART: [idev] SUBJECT.KEYID = 7
3,519,865 UART: [idev] UDS.KEYID = 0
3,520,772 ready_for_fw is high
3,520,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,397 UART: [idev] Erasing UDS.KEYID = 0
6,022,711 UART: [idev] Sha1 KeyId Algorithm
6,046,255 UART: [idev] --
6,051,337 UART: [ldev] ++
6,051,913 UART: [ldev] CDI.KEYID = 6
6,052,835 UART: [ldev] SUBJECT.KEYID = 5
6,054,002 UART: [ldev] AUTHORITY.KEYID = 7
6,055,245 UART: [ldev] FE.KEYID = 1
6,098,400 UART: [ldev] Erasing FE.KEYID = 1
8,603,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,324 UART: [ldev] --
10,410,633 UART: [fwproc] Wait for Commands...
10,413,700 UART: [fwproc] Recv command 0x46574c44
10,415,793 UART: [fwproc] Recv'd Img size: 114168 bytes
13,824,202 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,744 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,543 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,280,214 >>> mbox cmd response: success
14,285,139 UART: [afmc] ++
14,285,733 UART: [afmc] CDI.KEYID = 6
14,286,625 UART: [afmc] SUBJECT.KEYID = 7
14,287,784 UART: [afmc] AUTHORITY.KEYID = 5
16,817,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,540,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,542,793 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,558,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,574,592 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,590,446 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,612,969 UART: [afmc] --
18,616,181 UART: [cold-reset] --
18,620,954 UART: [state] Locking Datavault
18,625,986 UART: [state] Locking PCR0, PCR1 and PCR31
18,627,636 UART: [state] Locking ICCM
18,630,227 UART: [exit] Launching FMC @ 0x40000130
18,638,654 UART:
18,638,934 UART: Running Caliptra FMC ...
18,639,963 UART:
18,640,112 UART: [state] CFI Enabled
18,698,827 UART: [fht] FMC Alias Private Key: 7
20,462,500 UART: [art] Extend RT PCRs Done
20,463,725 UART: [art] Lock RT PCRs Done
20,465,271 UART: [art] Populate DV Done
20,470,791 UART: [fht] FMC Alias Private Key: 7
20,472,382 UART: [art] Derive CDI
20,473,197 UART: [art] Store in in slot 0x4
20,524,669 UART: [art] Derive Key Pair
20,525,712 UART: [art] Store priv key in slot 0x5
22,988,600 UART: [art] Derive Key Pair - Done
23,001,811 UART: [art] Signing Cert with AUTHO
23,003,122 UART: RITY.KEYID = 7
24,714,441 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,930 UART: [art] PUB.X = C58C9C4F15E87440E83BD9FE7CABD5DFD919B9CDE5092D585250A7EFAE0D3E53905156082C08713E5CC475878489C6E5
24,723,258 UART: [art] PUB.Y = 6E57782218534E1E220C0733DF05841358E127D8C344DB00873D4CDCF5063144FE245940C7ADCBB4283D4BB4C0CCE886
24,730,458 UART: [art] SIG.R = 01190A2ACD9283B6F1A30ACDD7ACF68279CA6116E4C8FCA25CA89123A829ECAEF47FC5DE83D9B2F58A29233C07C00E52
24,737,864 UART: [art] SIG.S = 56631D08ABFEB7C5A33AFF341388A34FBE003E92235A2619DA18BA0EA050F1E8EFDBA33ED4908CC6F561F0AA97C093A6
25,717,045 UART: Caliptra RT
25,717,779 UART: [state] CFI Enabled
25,881,768 UART: [rt] RT listening for mailbox commands...
25,883,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,915,060 UART: [rt]cmd =0x44504543, len=96
30,294,825 >>> mbox cmd response data (6236 bytes)
30,324,217 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,355,005 UART: [rt]cmd =0x53574545, len=84
34,531,204 >>> mbox cmd response data (200 bytes)
34,922,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,953,117 UART: [rt]cmd =0x44504543, len=96
34,983,490 >>> mbox cmd response data (56 bytes)
34,984,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,014,943 UART: [rt]cmd =0x44504543, len=96
35,060,350 >>> mbox cmd response data (24 bytes)
35,060,936 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,091,338 UART: [rt]cmd =0x53574545, len=84
39,267,407 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,386,702 ready_for_fw is high
3,387,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,042,055 >>> mbox cmd response: success
18,325,691 UART:
18,326,108 UART: Running Caliptra FMC ...
18,327,232 UART:
18,327,399 UART: [state] CFI Enabled
18,394,223 UART: [fht] FMC Alias Private Key: 7
20,158,326 UART: [art] Extend RT PCRs Done
20,159,572 UART: [art] Lock RT PCRs Done
20,160,958 UART: [art] Populate DV Done
20,166,316 UART: [fht] FMC Alias Private Key: 7
20,168,007 UART: [art] Derive CDI
20,168,843 UART: [art] Store in in slot 0x4
20,226,258 UART: [art] Derive Key Pair
20,227,261 UART: [art] Store priv key in slot 0x5
22,690,155 UART: [art] Derive Key Pair - Done
22,703,267 UART: [art] Signing Cert with AUTHO
22,704,575 UART: RITY.KEYID = 7
24,415,387 UART: [art] Erasing AUTHORITY.KEYID = 7
24,416,901 UART: [art] PUB.X = 9C12B2FD9D8155F87A048DB4672C4936B969F22DB26D948FBA0C4B02F9F741BBBEF640C284C691C8A8AE2D87D999C276
24,424,195 UART: [art] PUB.Y = 8447016416F495F2974E893ADD49B3E4D158FBC1B4D896DE5A6C9406AC25168079771C92EF9DDFD851A8C82D9F116E51
24,431,446 UART: [art] SIG.R = BEA1A9AA8B6172A66A92A382BECB0A10173B22B647345974E8144472F920A7F05E2EC9C0FB38F6F4072E0664369D1F72
24,438,839 UART: [art] SIG.S = 896233A094D50DAFC25819F10EF2949ACE0BA6D8428EE1942A5D19E3DE4D3F094DF0F40DE158E0153BCAE03DD19ADBF8
25,418,093 UART: Caliptra RT
25,418,816 UART: [state] CFI Enabled
25,583,826 UART: [rt] RT listening for mailbox commands...
25,586,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,617,721 UART: [rt]cmd =0x44504543, len=96
29,995,379 >>> mbox cmd response data (6236 bytes)
30,025,301 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,055,995 UART: [rt]cmd =0x53574545, len=84
34,232,482 >>> mbox cmd response data (200 bytes)
34,622,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,652,899 UART: [rt]cmd =0x44504543, len=96
34,683,314 >>> mbox cmd response data (56 bytes)
34,684,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,714,585 UART: [rt]cmd =0x44504543, len=96
34,759,958 >>> mbox cmd response data (24 bytes)
34,760,557 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,790,964 UART: [rt]cmd =0x53574545, len=84
38,965,750 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,749 writing to cptra_bootfsm_go
193,029 UART:
193,406 UART: Running Caliptra ROM ...
194,542 UART:
604,247 UART: [state] CFI Enabled
620,245 UART: [state] LifecycleState = Unprovisioned
622,114 UART: [state] DebugLocked = No
624,921 UART: [state] WD Timer not started. Device not locked for debugging
628,455 UART: [kat] SHA2-256
807,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,186 UART: [kat] ++
819,641 UART: [kat] sha1
829,662 UART: [kat] SHA2-256
832,670 UART: [kat] SHA2-384
838,518 UART: [kat] SHA2-512-ACC
841,458 UART: [kat] ECC-384
3,282,777 UART: [kat] HMAC-384Kdf
3,296,403 UART: [kat] LMS
3,825,880 UART: [kat] --
3,831,008 UART: [cold-reset] ++
3,832,450 UART: [fht] FHT @ 0x50003400
3,843,708 UART: [idev] ++
3,844,279 UART: [idev] CDI.KEYID = 6
3,845,316 UART: [idev] SUBJECT.KEYID = 7
3,846,421 UART: [idev] UDS.KEYID = 0
3,847,356 ready_for_fw is high
3,847,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,015 UART: [idev] Erasing UDS.KEYID = 0
6,321,081 UART: [idev] Sha1 KeyId Algorithm
6,343,490 UART: [idev] --
6,346,978 UART: [ldev] ++
6,347,559 UART: [ldev] CDI.KEYID = 6
6,348,474 UART: [ldev] SUBJECT.KEYID = 5
6,349,653 UART: [ldev] AUTHORITY.KEYID = 7
6,350,889 UART: [ldev] FE.KEYID = 1
6,361,860 UART: [ldev] Erasing FE.KEYID = 1
8,834,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,629 UART: [ldev] --
10,624,189 UART: [fwproc] Wait for Commands...
10,626,120 UART: [fwproc] Recv command 0x46574c44
10,628,210 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,518 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,270 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,921 >>> mbox cmd response: success
14,492,038 UART: [afmc] ++
14,492,642 UART: [afmc] CDI.KEYID = 6
14,493,531 UART: [afmc] SUBJECT.KEYID = 7
14,494,742 UART: [afmc] AUTHORITY.KEYID = 5
16,993,758 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,710,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,712,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,932 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,939 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,807 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,159 UART: [afmc] --
18,785,207 UART: [cold-reset] --
18,788,470 UART: [state] Locking Datavault
18,794,747 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,388 UART: [state] Locking ICCM
18,798,619 UART: [exit] Launching FMC @ 0x40000130
18,807,034 UART:
18,807,272 UART: Running Caliptra FMC ...
18,808,368 UART:
18,808,526 UART: [state] CFI Enabled
18,816,625 UART: [fht] FMC Alias Private Key: 7
20,572,887 UART: [art] Extend RT PCRs Done
20,574,103 UART: [art] Lock RT PCRs Done
20,575,729 UART: [art] Populate DV Done
20,581,409 UART: [fht] FMC Alias Private Key: 7
20,582,925 UART: [art] Derive CDI
20,583,694 UART: [art] Store in in slot 0x4
20,626,179 UART: [art] Derive Key Pair
20,627,179 UART: [art] Store priv key in slot 0x5
23,054,588 UART: [art] Derive Key Pair - Done
23,067,528 UART: [art] Signing Cert with AUTHO
23,068,866 UART: RITY.KEYID = 7
24,774,004 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,530 UART: [art] PUB.X = 23287177BCE8F1A67CEB40D375D9F97D3AD58DDDCBBE60AA8276B6B14C9F55F1FCA5D9789E0F8C175F61671A63F16898
24,782,798 UART: [art] PUB.Y = 84D032DF1916CC06BD5386900677AAA22DD0EB4C86D97B452FE28744A31779A59AC0137A7BA06C09B89BE5375DC68889
24,790,048 UART: [art] SIG.R = 13802827B50AE8430D936DE0ACB1F9D23DEF3CB045F574E31C071DE50C7A0BF6BA9A10E9000489512244412F5D4CDC46
24,797,395 UART: [art] SIG.S = AE827D367CCDB76582E0947B58167104940C0E4D1412E13E6525A5661AF41E7747FD8379284CE12C2B65717DD5B8CCD3
25,776,876 UART: Caliptra RT
25,777,682 UART: [state] CFI Enabled
25,894,470 UART: [rt] RT listening for mailbox commands...
25,896,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,928,047 UART: [rt]cmd =0x44504543, len=96
30,211,642 >>> mbox cmd response data (6236 bytes)
30,240,830 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,271,355 UART: [rt]cmd =0x53574545, len=84
34,406,644 >>> mbox cmd response data (200 bytes)
34,790,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,821,284 UART: [rt]cmd =0x44504543, len=96
34,851,964 >>> mbox cmd response data (56 bytes)
34,852,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,883,045 UART: [rt]cmd =0x44504543, len=96
34,921,245 >>> mbox cmd response data (24 bytes)
34,921,832 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,952,243 UART: [rt]cmd =0x53574545, len=84
39,087,539 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,743 writing to cptra_bootfsm_go
3,696,481 ready_for_fw is high
3,696,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,489 >>> mbox cmd response: success
18,515,972 UART:
18,516,375 UART: Running Caliptra FMC ...
18,517,522 UART:
18,517,687 UART: [state] CFI Enabled
18,525,990 UART: [fht] FMC Alias Private Key: 7
20,282,722 UART: [art] Extend RT PCRs Done
20,283,945 UART: [art] Lock RT PCRs Done
20,285,562 UART: [art] Populate DV Done
20,290,834 UART: [fht] FMC Alias Private Key: 7
20,292,325 UART: [art] Derive CDI
20,293,086 UART: [art] Store in in slot 0x4
20,335,898 UART: [art] Derive Key Pair
20,336,898 UART: [art] Store priv key in slot 0x5
22,763,743 UART: [art] Derive Key Pair - Done
22,776,759 UART: [art] Signing Cert with AUTHO
22,778,070 UART: RITY.KEYID = 7
24,483,504 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,006 UART: [art] PUB.X = 15FEF83E1123A9F151F3496F287E886E47EDEC2F459312EDA924E6CE497710A28B866BFDEA63BE5DCE9C360D3B4B40E6
24,492,266 UART: [art] PUB.Y = 5D7039EA0C1ECE8D92F0BDA214176A45AADF76F84DF19ED95B7637254FCFE35B5597B1F721907F643EB51B547000E52B
24,499,533 UART: [art] SIG.R = 69CBF8FEB33D50A6ACEA2A6AB8F90834CB7A46BB2472D8A8C3FC3EC0358E904D24E91E2CB56AD254A5C6F3185709DFDD
24,506,930 UART: [art] SIG.S = F73B571BFF45B121905A11218501CF9FFC97FC73EB6BD673AC73FE703ED9E7E02708E6D08165343170D66CEBFA29C79E
25,485,711 UART: Caliptra RT
25,486,428 UART: [state] CFI Enabled
25,604,150 UART: [rt] RT listening for mailbox commands...
25,606,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,637,670 UART: [rt]cmd =0x44504543, len=96
29,921,887 >>> mbox cmd response data (6236 bytes)
29,951,327 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,982,184 UART: [rt]cmd =0x53574545, len=84
34,117,775 >>> mbox cmd response data (200 bytes)
34,502,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,533,356 UART: [rt]cmd =0x44504543, len=96
34,564,676 >>> mbox cmd response data (56 bytes)
34,565,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,596,134 UART: [rt]cmd =0x44504543, len=96
34,634,349 >>> mbox cmd response data (24 bytes)
34,634,936 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,665,402 UART: [rt]cmd =0x53574545, len=84
38,800,846 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
192,128 UART:
192,496 UART: Running Caliptra ROM ...
193,688 UART:
193,843 UART: [state] CFI Enabled
263,814 UART: [state] LifecycleState = Unprovisioned
266,221 UART: [state] DebugLocked = No
268,748 UART: [state] WD Timer not started. Device not locked for debugging
273,647 UART: [kat] SHA2-256
463,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,266 UART: [kat] ++
474,719 UART: [kat] sha1
487,486 UART: [kat] SHA2-256
490,499 UART: [kat] SHA2-384
496,578 UART: [kat] SHA2-512-ACC
499,174 UART: [kat] ECC-384
2,946,137 UART: [kat] HMAC-384Kdf
2,970,663 UART: [kat] LMS
3,502,412 UART: [kat] --
3,506,683 UART: [cold-reset] ++
3,508,683 UART: [fht] FHT @ 0x50003400
3,520,086 UART: [idev] ++
3,520,798 UART: [idev] CDI.KEYID = 6
3,521,725 UART: [idev] SUBJECT.KEYID = 7
3,522,898 UART: [idev] UDS.KEYID = 0
3,523,821 ready_for_fw is high
3,524,018 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,987 UART: [idev] Erasing UDS.KEYID = 0
6,028,664 UART: [idev] Sha1 KeyId Algorithm
6,051,245 UART: [idev] --
6,055,966 UART: [ldev] ++
6,056,650 UART: [ldev] CDI.KEYID = 6
6,057,738 UART: [ldev] SUBJECT.KEYID = 5
6,058,865 UART: [ldev] AUTHORITY.KEYID = 7
6,060,053 UART: [ldev] FE.KEYID = 1
6,099,929 UART: [ldev] Erasing FE.KEYID = 1
8,604,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,067 UART: [ldev] --
10,411,956 UART: [fwproc] Wait for Commands...
10,415,032 UART: [fwproc] Recv command 0x46574c44
10,417,344 UART: [fwproc] Recv'd Img size: 114168 bytes
13,862,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,602,932 >>> mbox cmd response: success
14,606,132 UART: [afmc] ++
14,606,842 UART: [afmc] CDI.KEYID = 6
14,608,094 UART: [afmc] SUBJECT.KEYID = 7
14,609,537 UART: [afmc] AUTHORITY.KEYID = 5
17,146,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,872,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,874,704 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,889,870 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,016 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,059 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,943,885 UART: [afmc] --
18,947,896 UART: [cold-reset] --
18,950,760 UART: [state] Locking Datavault
18,955,562 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,725 UART: [state] Locking ICCM
18,960,587 UART: [exit] Launching FMC @ 0x40000130
18,969,278 UART:
18,969,519 UART: Running Caliptra FMC ...
18,970,619 UART:
18,970,784 UART: [state] CFI Enabled
19,030,873 UART: [fht] FMC Alias Private Key: 7
20,794,287 UART: [art] Extend RT PCRs Done
20,795,506 UART: [art] Lock RT PCRs Done
20,797,136 UART: [art] Populate DV Done
20,802,547 UART: [fht] FMC Alias Private Key: 7
20,804,085 UART: [art] Derive CDI
20,804,852 UART: [art] Store in in slot 0x4
20,864,060 UART: [art] Derive Key Pair
20,865,101 UART: [art] Store priv key in slot 0x5
23,327,318 UART: [art] Derive Key Pair - Done
23,340,367 UART: [art] Signing Cert with AUTHO
23,341,707 UART: RITY.KEYID = 7
25,054,014 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,849 UART: [art] PUB.X = 7AAAC722A87537E525D42A75AAA5B0B488E8117CE30206AC2EA319AE65CAEAA08744A20E04670E73C0D4ECD219E63AD3
25,062,837 UART: [art] PUB.Y = E964DBB90A9EE5D1C9804A58E2D6CBB222398FFCDF23BB206F28583FC6491AECC983502A663F29521724BE72559901C9
25,070,094 UART: [art] SIG.R = FB6EC53FFA7C022909728D1D137A23C8B4C80C69859BE2769DB1091D62F86CFE1B569CD1F032B682C6FBC118F9B07E4A
25,077,479 UART: [art] SIG.S = 0E2CF6E063CF221EEC57DDA1914778042BBF6623A0C7A1C001F60EA3F78E7CBB3054C3AF14920D0EDE324831F06FE3AC
26,056,730 UART: Caliptra RT
26,057,424 UART: [state] CFI Enabled
26,221,928 UART: [rt] RT listening for mailbox commands...
26,224,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,255,179 UART: [rt]cmd =0x44504543, len=96
30,614,318 >>> mbox cmd response data (6236 bytes)
30,644,500 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,675,252 UART: [rt]cmd =0x53574545, len=84
34,852,812 >>> mbox cmd response data (200 bytes)
35,242,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,273,625 UART: [rt]cmd =0x44504543, len=96
35,304,327 >>> mbox cmd response data (56 bytes)
35,305,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,335,704 UART: [rt]cmd =0x44504543, len=96
35,381,488 >>> mbox cmd response data (24 bytes)
35,382,073 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,412,539 UART: [rt]cmd =0x53574545, len=84
39,589,053 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,436,737 ready_for_fw is high
3,437,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,731,126 >>> mbox cmd response: success
19,023,676 UART:
19,024,065 UART: Running Caliptra FMC ...
19,025,297 UART:
19,025,477 UART: [state] CFI Enabled
19,092,380 UART: [fht] FMC Alias Private Key: 7
20,856,394 UART: [art] Extend RT PCRs Done
20,857,619 UART: [art] Lock RT PCRs Done
20,859,518 UART: [art] Populate DV Done
20,864,774 UART: [fht] FMC Alias Private Key: 7
20,866,259 UART: [art] Derive CDI
20,867,226 UART: [art] Store in in slot 0x4
20,925,463 UART: [art] Derive Key Pair
20,926,469 UART: [art] Store priv key in slot 0x5
23,389,777 UART: [art] Derive Key Pair - Done
23,402,668 UART: [art] Signing Cert with AUTHO
23,403,978 UART: RITY.KEYID = 7
25,115,553 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,069 UART: [art] PUB.X = 98E27FDBF10F19DE8B6C01ADE19A5609DA7D9C7B9D74C161B9F8548B1A71ECC99EF61E586244F44B5CC3C2FE1E823353
25,124,379 UART: [art] PUB.Y = D903D9EAB9AD13355EE37314AC0C05F171E01CF983D7010C463C4732C5CAFE9543C8E6042FF005486BFD7908300A87F0
25,131,620 UART: [art] SIG.R = BD0165A8D804321569C6D66D4B7AD9608285A4CF12FB0117C92E04AE8CCDDB4709ACBA252ECF009EB7E309ADDF9F65FD
25,139,002 UART: [art] SIG.S = AEAC610663357ABB638FC1CF513BC58340E3D8B654A6B0A4E0B5F3BB449ED596F155400EE95A585C5DC491658B95E6A4
26,117,923 UART: Caliptra RT
26,118,617 UART: [state] CFI Enabled
26,284,769 UART: [rt] RT listening for mailbox commands...
26,287,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,318,578 UART: [rt]cmd =0x44504543, len=96
30,696,647 >>> mbox cmd response data (6236 bytes)
30,726,054 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,756,790 UART: [rt]cmd =0x53574545, len=84
34,933,852 >>> mbox cmd response data (200 bytes)
35,323,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,354,239 UART: [rt]cmd =0x44504543, len=96
35,384,619 >>> mbox cmd response data (56 bytes)
35,385,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,415,811 UART: [rt]cmd =0x44504543, len=96
35,461,193 >>> mbox cmd response data (24 bytes)
35,461,788 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,492,306 UART: [rt]cmd =0x53574545, len=84
39,667,898 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,728 writing to cptra_bootfsm_go
193,013 UART:
193,398 UART: Running Caliptra ROM ...
194,528 UART:
604,129 UART: [state] CFI Enabled
619,136 UART: [state] LifecycleState = Unprovisioned
621,502 UART: [state] DebugLocked = No
623,516 UART: [state] WD Timer not started. Device not locked for debugging
627,476 UART: [kat] SHA2-256
817,357 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,157 UART: [kat] ++
828,677 UART: [kat] sha1
840,258 UART: [kat] SHA2-256
843,305 UART: [kat] SHA2-384
849,338 UART: [kat] SHA2-512-ACC
851,926 UART: [kat] ECC-384
3,292,527 UART: [kat] HMAC-384Kdf
3,306,248 UART: [kat] LMS
3,838,127 UART: [kat] --
3,844,106 UART: [cold-reset] ++
3,846,681 UART: [fht] FHT @ 0x50003400
3,857,942 UART: [idev] ++
3,858,573 UART: [idev] CDI.KEYID = 6
3,859,603 UART: [idev] SUBJECT.KEYID = 7
3,860,774 UART: [idev] UDS.KEYID = 0
3,861,701 ready_for_fw is high
3,861,896 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,265 UART: [idev] Erasing UDS.KEYID = 0
6,335,399 UART: [idev] Sha1 KeyId Algorithm
6,358,968 UART: [idev] --
6,363,238 UART: [ldev] ++
6,363,954 UART: [ldev] CDI.KEYID = 6
6,364,871 UART: [ldev] SUBJECT.KEYID = 5
6,365,983 UART: [ldev] AUTHORITY.KEYID = 7
6,367,216 UART: [ldev] FE.KEYID = 1
6,377,213 UART: [ldev] Erasing FE.KEYID = 1
8,855,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,155 UART: [ldev] --
10,645,170 UART: [fwproc] Wait for Commands...
10,647,044 UART: [fwproc] Recv command 0x46574c44
10,649,298 UART: [fwproc] Recv'd Img size: 114168 bytes
14,101,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,592 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,840,622 >>> mbox cmd response: success
14,844,529 UART: [afmc] ++
14,845,259 UART: [afmc] CDI.KEYID = 6
14,846,453 UART: [afmc] SUBJECT.KEYID = 7
14,847,886 UART: [afmc] AUTHORITY.KEYID = 5
17,352,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,039 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,375 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,238 UART: [afmc] --
19,149,886 UART: [cold-reset] --
19,153,282 UART: [state] Locking Datavault
19,159,721 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,860 UART: [state] Locking ICCM
19,163,804 UART: [exit] Launching FMC @ 0x40000130
19,172,434 UART:
19,172,679 UART: Running Caliptra FMC ...
19,173,708 UART:
19,173,858 UART: [state] CFI Enabled
19,182,017 UART: [fht] FMC Alias Private Key: 7
20,938,712 UART: [art] Extend RT PCRs Done
20,939,930 UART: [art] Lock RT PCRs Done
20,941,369 UART: [art] Populate DV Done
20,946,616 UART: [fht] FMC Alias Private Key: 7
20,948,265 UART: [art] Derive CDI
20,949,006 UART: [art] Store in in slot 0x4
20,991,331 UART: [art] Derive Key Pair
20,992,350 UART: [art] Store priv key in slot 0x5
23,419,148 UART: [art] Derive Key Pair - Done
23,431,929 UART: [art] Signing Cert with AUTHO
23,433,235 UART: RITY.KEYID = 7
25,139,096 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,606 UART: [art] PUB.X = 17C8A2572B5C43AB43ABD5AC1F24C215609434103CC4A4C087D1E9788D2C6500A4812D0115DAA92A5783DDE2456DD1CA
25,147,854 UART: [art] PUB.Y = 8B563FD5289BA6B8AEFF230CD5071AD38DA352D5308300D7B61053C14875555F91ACD8E3B6B37E1399ABC951DA5221DE
25,155,135 UART: [art] SIG.R = 45CC064D5B1266D8A513EF7A704B5DEDD9DB77DB34D24F9D5F8B1EF30FF10D93774B386A142F0BD13CE14157D5802BCF
25,162,556 UART: [art] SIG.S = 58C64E454A8A4F66138C7B143B168B68F9A4986908B4D26F0A2F0D21CCFF1DC5D6113EC6738CCBB0AF88B1AB9203E518
26,141,505 UART: Caliptra RT
26,142,185 UART: [state] CFI Enabled
26,259,022 UART: [rt] RT listening for mailbox commands...
26,261,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,292,006 UART: [rt]cmd =0x44504543, len=96
30,575,589 >>> mbox cmd response data (6236 bytes)
30,604,970 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,635,391 UART: [rt]cmd =0x53574545, len=84
34,771,610 >>> mbox cmd response data (200 bytes)
35,154,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,185,404 UART: [rt]cmd =0x44504543, len=96
35,216,898 >>> mbox cmd response data (56 bytes)
35,217,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,248,076 UART: [rt]cmd =0x44504543, len=96
35,286,005 >>> mbox cmd response data (24 bytes)
35,286,579 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,316,938 UART: [rt]cmd =0x53574545, len=84
39,451,854 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
3,756,302 ready_for_fw is high
3,756,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,961,138 >>> mbox cmd response: success
19,217,061 UART:
19,217,453 UART: Running Caliptra FMC ...
19,218,647 UART:
19,218,818 UART: [state] CFI Enabled
19,227,058 UART: [fht] FMC Alias Private Key: 7
20,984,378 UART: [art] Extend RT PCRs Done
20,985,605 UART: [art] Lock RT PCRs Done
20,987,100 UART: [art] Populate DV Done
20,992,247 UART: [fht] FMC Alias Private Key: 7
20,993,785 UART: [art] Derive CDI
20,994,600 UART: [art] Store in in slot 0x4
21,037,194 UART: [art] Derive Key Pair
21,038,202 UART: [art] Store priv key in slot 0x5
23,464,536 UART: [art] Derive Key Pair - Done
23,477,650 UART: [art] Signing Cert with AUTHO
23,478,978 UART: RITY.KEYID = 7
25,183,884 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,382 UART: [art] PUB.X = F0D586C7274FE9A874E5057184390A99CB3FC1654FF92924DB62FC78A700D0611C5DE426889BB44AA2D2F48F2FF89EBA
25,192,634 UART: [art] PUB.Y = B21D3DBA0294C1C80C1F0DF7B1209D0CE55D0C836882856B68E61B49B01083528F0BE3A43D5EC765C4A6C14897C5E470
25,199,925 UART: [art] SIG.R = BD3021A4262A500907393EC6EB19F99ACAA1632F277C9AF7D6BC7A6E1940EEC469A01C62645238493CE3E3FAB182B5A8
25,207,260 UART: [art] SIG.S = 43815F84844D0B78C3094198417E430814A2C0A13E532DA5257E2BB8E201F7570DD5261DD89169E55D9283693542AD48
26,186,758 UART: Caliptra RT
26,187,465 UART: [state] CFI Enabled
26,304,341 UART: [rt] RT listening for mailbox commands...
26,306,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,568 UART: [rt]cmd =0x44504543, len=96
30,622,127 >>> mbox cmd response data (6236 bytes)
30,651,242 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,681,751 UART: [rt]cmd =0x53574545, len=84
34,816,658 >>> mbox cmd response data (200 bytes)
35,200,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,231,130 UART: [rt]cmd =0x44504543, len=96
35,262,097 >>> mbox cmd response data (56 bytes)
35,262,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,293,265 UART: [rt]cmd =0x44504543, len=96
35,331,891 >>> mbox cmd response data (24 bytes)
35,332,478 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,362,996 UART: [rt]cmd =0x53574545, len=84
39,498,087 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,112 UART: [kat] SHA2-512-ACC
897,013 UART: [kat] ECC-384
902,880 UART: [kat] HMAC-384Kdf
907,508 UART: [kat] LMS
1,475,704 UART: [kat] --
1,476,413 UART: [cold-reset] ++
1,476,813 UART: [fht] Storing FHT @ 0x50003400
1,479,610 UART: [idev] ++
1,479,778 UART: [idev] CDI.KEYID = 6
1,480,138 UART: [idev] SUBJECT.KEYID = 7
1,480,562 UART: [idev] UDS.KEYID = 0
1,480,907 ready_for_fw is high
1,480,907 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,774 UART: [idev] Erasing UDS.KEYID = 0
1,506,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,578 UART: [idev] --
1,515,539 UART: [ldev] ++
1,515,707 UART: [ldev] CDI.KEYID = 6
1,516,070 UART: [ldev] SUBJECT.KEYID = 5
1,516,496 UART: [ldev] AUTHORITY.KEYID = 7
1,516,959 UART: [ldev] FE.KEYID = 1
1,522,441 UART: [ldev] Erasing FE.KEYID = 1
1,547,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,546 UART: [ldev] --
1,586,891 UART: [fwproc] Waiting for Commands...
1,587,640 UART: [fwproc] Received command 0x46574c44
1,588,431 UART: [fwproc] Received Image of size 114168 bytes
2,884,365 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,749 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,704 >>> mbox cmd response: success
3,077,878 UART: [afmc] ++
3,078,046 UART: [afmc] CDI.KEYID = 6
3,078,408 UART: [afmc] SUBJECT.KEYID = 7
3,078,833 UART: [afmc] AUTHORITY.KEYID = 5
3,114,568 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,526 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,306 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,034 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,919 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,609 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,562 UART: [afmc] --
3,157,520 UART: [cold-reset] --
3,158,328 UART: [state] Locking Datavault
3,159,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,959 UART: [state] Locking ICCM
3,160,409 UART: [exit] Launching FMC @ 0x40000130
3,165,738 UART:
3,165,754 UART: Running Caliptra FMC ...
3,166,162 UART:
3,166,216 UART: [state] CFI Enabled
3,176,707 UART: [fht] FMC Alias Private Key: 7
3,285,278 UART: [art] Extend RT PCRs Done
3,285,706 UART: [art] Lock RT PCRs Done
3,287,300 UART: [art] Populate DV Done
3,295,649 UART: [fht] FMC Alias Private Key: 7
3,296,645 UART: [art] Derive CDI
3,296,925 UART: [art] Store in in slot 0x4
3,382,490 UART: [art] Derive Key Pair
3,382,850 UART: [art] Store priv key in slot 0x5
3,395,942 UART: [art] Derive Key Pair - Done
3,410,569 UART: [art] Signing Cert with AUTHO
3,411,049 UART: RITY.KEYID = 7
3,425,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,730 UART: [art] PUB.X = 03400E2F7E6ABB8A4ADF292A3E713747419DE2FD923E1D7C6211739A2F1688AB04547382E072C2F0BA0CCC9BF9B6AF66
3,433,498 UART: [art] PUB.Y = 77CB3F8860C1658C844307F3B8FF868F784EFCB4F36BB82D582B6CE69943F6F658266DAB92115D4EC9767F75BD3E5ABB
3,440,455 UART: [art] SIG.R = E103BE2964818511A75ECE19E19E418FC02089BB396A94D289404BABB5BD5EFC1BA24DE3F7E98B78900D42632765A90E
3,447,222 UART: [art] SIG.S = E011BCC3EE16EBFDDBBE75CF383EE6BA7069E74E6FCD4B2A11765D1A98D5B71C6DAE3D25635A15BCF4DF2EE1079C7540
3,471,312 UART: Caliptra RT
3,471,565 UART: [state] CFI Enabled
3,579,901 UART: [rt] RT listening for mailbox commands...
3,580,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,629 UART: [rt]cmd =0x44504543, len=96
3,790,827 >>> mbox cmd response data (6236 bytes)
3,790,828 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,611 UART: [rt]cmd =0x53574545, len=84
3,846,884 >>> mbox cmd response data (200 bytes)
3,846,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,902 UART: [rt]cmd =0x44504543, len=96
3,908,321 >>> mbox cmd response data (56 bytes)
3,908,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,938,329 UART: [rt]cmd =0x44504543, len=96
3,977,351 >>> mbox cmd response data (24 bytes)
3,977,352 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,007,221 UART: [rt]cmd =0x53574545, len=84
4,032,324 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,999 ready_for_fw is high
1,362,999 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,692 >>> mbox cmd response: success
2,986,324 UART:
2,986,340 UART: Running Caliptra FMC ...
2,986,748 UART:
2,986,802 UART: [state] CFI Enabled
2,997,761 UART: [fht] FMC Alias Private Key: 7
3,105,716 UART: [art] Extend RT PCRs Done
3,106,144 UART: [art] Lock RT PCRs Done
3,107,790 UART: [art] Populate DV Done
3,116,045 UART: [fht] FMC Alias Private Key: 7
3,117,225 UART: [art] Derive CDI
3,117,505 UART: [art] Store in in slot 0x4
3,203,290 UART: [art] Derive Key Pair
3,203,650 UART: [art] Store priv key in slot 0x5
3,216,718 UART: [art] Derive Key Pair - Done
3,231,513 UART: [art] Signing Cert with AUTHO
3,231,993 UART: RITY.KEYID = 7
3,247,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,146 UART: [art] PUB.X = D5ECD5B3D868E783C3B286426209F5FEDACB9261BC27465AEA01AB889D223BB64AC83F976466F1884FE0FC2AA518A13C
3,254,924 UART: [art] PUB.Y = 603600AD8B281CC476079D60253230A8DA7C0D0F7066755ECD0E1CD6349CB973D6374E768610737B0D80CC2A5BA6946E
3,261,835 UART: [art] SIG.R = 6CD767A9B10EB072877F6D64246BC9364BDB2D2F24E67ECD2650B8CBE5254BFF6BABA94333684D609C4775C7CEE579E0
3,268,614 UART: [art] SIG.S = 31B620D8BA7F196A14734D21D2D8B8345755A1FBE4A22AB0AF944BE417925ED166F847B189315B78FB7CAD9971861578
3,292,309 UART: Caliptra RT
3,292,562 UART: [state] CFI Enabled
3,399,596 UART: [rt] RT listening for mailbox commands...
3,400,266 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,548 UART: [rt]cmd =0x44504543, len=96
3,611,090 >>> mbox cmd response data (6236 bytes)
3,611,091 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,058 UART: [rt]cmd =0x53574545, len=84
3,666,905 >>> mbox cmd response data (200 bytes)
3,666,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,696,753 UART: [rt]cmd =0x44504543, len=96
3,728,178 >>> mbox cmd response data (56 bytes)
3,728,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,757,894 UART: [rt]cmd =0x44504543, len=96
3,797,746 >>> mbox cmd response data (24 bytes)
3,797,747 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,827,638 UART: [rt]cmd =0x53574545, len=84
3,852,807 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,644 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,364 UART: [kat] SHA2-256
882,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,410 UART: [kat] ++
886,562 UART: [kat] sha1
890,842 UART: [kat] SHA2-256
892,780 UART: [kat] SHA2-384
895,495 UART: [kat] SHA2-512-ACC
897,396 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
907,801 UART: [kat] LMS
1,475,997 UART: [kat] --
1,476,774 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,480,033 UART: [idev] ++
1,480,201 UART: [idev] CDI.KEYID = 6
1,480,561 UART: [idev] SUBJECT.KEYID = 7
1,480,985 UART: [idev] UDS.KEYID = 0
1,481,330 ready_for_fw is high
1,481,330 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,117 UART: [idev] Erasing UDS.KEYID = 0
1,505,731 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,345 UART: [idev] --
1,515,322 UART: [ldev] ++
1,515,490 UART: [ldev] CDI.KEYID = 6
1,515,853 UART: [ldev] SUBJECT.KEYID = 5
1,516,279 UART: [ldev] AUTHORITY.KEYID = 7
1,516,742 UART: [ldev] FE.KEYID = 1
1,522,158 UART: [ldev] Erasing FE.KEYID = 1
1,548,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,161 UART: [ldev] --
1,587,574 UART: [fwproc] Waiting for Commands...
1,588,391 UART: [fwproc] Received command 0x46574c44
1,589,182 UART: [fwproc] Received Image of size 114168 bytes
2,885,608 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,012 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,364 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,051 >>> mbox cmd response: success
3,079,195 UART: [afmc] ++
3,079,363 UART: [afmc] CDI.KEYID = 6
3,079,725 UART: [afmc] SUBJECT.KEYID = 7
3,080,150 UART: [afmc] AUTHORITY.KEYID = 5
3,115,759 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,281 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,789 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,674 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,364 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,333 UART: [afmc] --
3,159,433 UART: [cold-reset] --
3,160,303 UART: [state] Locking Datavault
3,161,474 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,078 UART: [state] Locking ICCM
3,162,622 UART: [exit] Launching FMC @ 0x40000130
3,167,951 UART:
3,167,967 UART: Running Caliptra FMC ...
3,168,375 UART:
3,168,518 UART: [state] CFI Enabled
3,179,345 UART: [fht] FMC Alias Private Key: 7
3,287,426 UART: [art] Extend RT PCRs Done
3,287,854 UART: [art] Lock RT PCRs Done
3,289,422 UART: [art] Populate DV Done
3,297,525 UART: [fht] FMC Alias Private Key: 7
3,298,549 UART: [art] Derive CDI
3,298,829 UART: [art] Store in in slot 0x4
3,384,812 UART: [art] Derive Key Pair
3,385,172 UART: [art] Store priv key in slot 0x5
3,398,520 UART: [art] Derive Key Pair - Done
3,412,998 UART: [art] Signing Cert with AUTHO
3,413,478 UART: RITY.KEYID = 7
3,428,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,287 UART: [art] PUB.X = 0A17D9D196F5FDFFF834BE56D9CEB1013E132C2D1A89F8137BD8CA338EFE728743D71C69E5A7BB528A42F42587527E49
3,436,061 UART: [art] PUB.Y = 49937C6E82450D48AB43F127F5E16340AE40203E715881EA01844AFAD61AC01B37319777436451858F0A63787F673F7E
3,442,990 UART: [art] SIG.R = 875EC643F86CEC34DAF4194DBFF8B8A3A0C8C6C69AB2331C12C850ABE4334848336BB2CF218014883CBBB3E43E4CB874
3,449,774 UART: [art] SIG.S = 8442AF17D9CD5DA9ECFC914CB335B0D6EFA316F78099A42ADB59A906A48C4B11795FBC3B97C764DCB5B80E9D730BD8F8
3,473,364 UART: Caliptra RT
3,473,709 UART: [state] CFI Enabled
3,581,877 UART: [rt] RT listening for mailbox commands...
3,582,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,993 UART: [rt]cmd =0x44504543, len=96
3,793,794 >>> mbox cmd response data (6236 bytes)
3,793,795 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,823,840 UART: [rt]cmd =0x53574545, len=84
3,850,223 >>> mbox cmd response data (200 bytes)
3,850,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,880,189 UART: [rt]cmd =0x44504543, len=96
3,912,752 >>> mbox cmd response data (56 bytes)
3,912,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,942,526 UART: [rt]cmd =0x44504543, len=96
3,982,930 >>> mbox cmd response data (24 bytes)
3,982,931 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,012,756 UART: [rt]cmd =0x53574545, len=84
4,038,365 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,512 ready_for_fw is high
1,362,512 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,061 >>> mbox cmd response: success
2,989,239 UART:
2,989,255 UART: Running Caliptra FMC ...
2,989,663 UART:
2,989,806 UART: [state] CFI Enabled
3,000,691 UART: [fht] FMC Alias Private Key: 7
3,108,770 UART: [art] Extend RT PCRs Done
3,109,198 UART: [art] Lock RT PCRs Done
3,110,520 UART: [art] Populate DV Done
3,118,811 UART: [fht] FMC Alias Private Key: 7
3,119,849 UART: [art] Derive CDI
3,120,129 UART: [art] Store in in slot 0x4
3,205,924 UART: [art] Derive Key Pair
3,206,284 UART: [art] Store priv key in slot 0x5
3,219,340 UART: [art] Derive Key Pair - Done
3,234,458 UART: [art] Signing Cert with AUTHO
3,234,938 UART: RITY.KEYID = 7
3,250,256 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,021 UART: [art] PUB.X = 63CDCB25E144028286FFA9F4FF7814C793409310734C86D5D1CA3DE96F214C0E693FB4E7B470490593921E0833477AAA
3,257,777 UART: [art] PUB.Y = 67A2CD10E77DDAD1B3FC417AB54A1272AEC74DFF0A4FF66A9C9C88383230B3795B7334868CE2CC5AE308A1FEA4106F27
3,264,737 UART: [art] SIG.R = D32A70C0AB988DEC01F2EE629B13B639DF5F73601C10DEE503338934F1BACB873A0EB19960BF5C985C4885E0640A9908
3,271,498 UART: [art] SIG.S = B2DE61072637D5B273E562B8EE8488265CE8BB46D1C617CEE0793843328CA4E38ACC726486E424234CFEDA876B075B7B
3,295,025 UART: Caliptra RT
3,295,370 UART: [state] CFI Enabled
3,403,310 UART: [rt] RT listening for mailbox commands...
3,403,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,188 UART: [rt]cmd =0x44504543, len=96
3,615,985 >>> mbox cmd response data (6236 bytes)
3,615,986 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,975 UART: [rt]cmd =0x53574545, len=84
3,671,638 >>> mbox cmd response data (200 bytes)
3,671,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,536 UART: [rt]cmd =0x44504543, len=96
3,733,279 >>> mbox cmd response data (56 bytes)
3,733,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,763,229 UART: [rt]cmd =0x44504543, len=96
3,803,067 >>> mbox cmd response data (24 bytes)
3,803,068 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,832,997 UART: [rt]cmd =0x53574545, len=84
3,858,194 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
901,937 UART: [kat] SHA2-256
903,877 UART: [kat] SHA2-384
906,592 UART: [kat] SHA2-512-ACC
908,493 UART: [kat] ECC-384
918,290 UART: [kat] HMAC-384Kdf
922,932 UART: [kat] LMS
1,171,260 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,455 UART: [fht] FHT @ 0x50003400
1,174,952 UART: [idev] ++
1,175,120 UART: [idev] CDI.KEYID = 6
1,175,480 UART: [idev] SUBJECT.KEYID = 7
1,175,904 UART: [idev] UDS.KEYID = 0
1,176,249 ready_for_fw is high
1,176,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,210 UART: [idev] Erasing UDS.KEYID = 0
1,200,887 UART: [idev] Sha1 KeyId Algorithm
1,209,303 UART: [idev] --
1,210,265 UART: [ldev] ++
1,210,433 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,222 UART: [ldev] AUTHORITY.KEYID = 7
1,211,685 UART: [ldev] FE.KEYID = 1
1,216,759 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,985 UART: [ldev] --
1,282,332 UART: [fwproc] Wait for Commands...
1,282,956 UART: [fwproc] Recv command 0x46574c44
1,283,684 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,642 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,431 >>> mbox cmd response: success
2,772,691 UART: [afmc] ++
2,772,859 UART: [afmc] CDI.KEYID = 6
2,773,221 UART: [afmc] SUBJECT.KEYID = 7
2,773,646 UART: [afmc] AUTHORITY.KEYID = 5
2,808,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,178 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,906 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,791 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,510 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,280 UART: [afmc] --
2,852,212 UART: [cold-reset] --
2,853,092 UART: [state] Locking Datavault
2,854,391 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,995 UART: [state] Locking ICCM
2,855,509 UART: [exit] Launching FMC @ 0x40000130
2,860,838 UART:
2,860,854 UART: Running Caliptra FMC ...
2,861,262 UART:
2,861,316 UART: [state] CFI Enabled
2,871,987 UART: [fht] FMC Alias Private Key: 7
2,980,128 UART: [art] Extend RT PCRs Done
2,980,556 UART: [art] Lock RT PCRs Done
2,981,618 UART: [art] Populate DV Done
2,989,677 UART: [fht] FMC Alias Private Key: 7
2,990,811 UART: [art] Derive CDI
2,991,091 UART: [art] Store in in slot 0x4
3,076,604 UART: [art] Derive Key Pair
3,076,964 UART: [art] Store priv key in slot 0x5
3,090,214 UART: [art] Derive Key Pair - Done
3,104,854 UART: [art] Signing Cert with AUTHO
3,105,334 UART: RITY.KEYID = 7
3,120,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,395 UART: [art] PUB.X = 2018B70B3AE7F58DD95349BC0E96FCC65624595E1BD67A1DDD21E6DEF846D8C429E5DC5DFD53225308FB7DD6063E1F08
3,128,164 UART: [art] PUB.Y = 9508930AEB3D9680F5180FB08B6C873C14E7BC7B617D914F83B97160559E904BFE590CA025CE60455680989A682BC6B7
3,135,098 UART: [art] SIG.R = ECDE6204A2B2B267CB8114D08E47B0853AFFDEED9BE3E43CBAC57B7818900962EB81803021E523AE43ECCBD0B97EFC1F
3,141,884 UART: [art] SIG.S = D71F74A2996026129E9853E023E04FFBB3BFA673C77D01A75AD50F68036E2B8CDE06133F4306FEA7EDEA3610AA4725E2
3,165,296 UART: Caliptra RT
3,165,549 UART: [state] CFI Enabled
3,272,857 UART: [rt] RT listening for mailbox commands...
3,273,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,965 UART: [rt]cmd =0x44504543, len=96
3,483,802 >>> mbox cmd response data (6236 bytes)
3,483,803 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,513,760 UART: [rt]cmd =0x53574545, len=84
3,539,147 >>> mbox cmd response data (200 bytes)
3,539,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,569,111 UART: [rt]cmd =0x44504543, len=96
3,601,610 >>> mbox cmd response data (56 bytes)
3,601,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,438 UART: [rt]cmd =0x44504543, len=96
3,671,544 >>> mbox cmd response data (24 bytes)
3,671,545 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,388 UART: [rt]cmd =0x53574545, len=84
3,727,323 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,869 ready_for_fw is high
1,059,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,134 >>> mbox cmd response: success
2,686,728 UART:
2,686,744 UART: Running Caliptra FMC ...
2,687,152 UART:
2,687,206 UART: [state] CFI Enabled
2,697,411 UART: [fht] FMC Alias Private Key: 7
2,805,618 UART: [art] Extend RT PCRs Done
2,806,046 UART: [art] Lock RT PCRs Done
2,807,444 UART: [art] Populate DV Done
2,815,561 UART: [fht] FMC Alias Private Key: 7
2,816,639 UART: [art] Derive CDI
2,816,919 UART: [art] Store in in slot 0x4
2,902,780 UART: [art] Derive Key Pair
2,903,140 UART: [art] Store priv key in slot 0x5
2,916,272 UART: [art] Derive Key Pair - Done
2,931,041 UART: [art] Signing Cert with AUTHO
2,931,521 UART: RITY.KEYID = 7
2,946,717 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,482 UART: [art] PUB.X = AFFC6F11F6C6EDB9AEC2B4053AA27F2AE8FD938E88BD2E575DF0AA7AADC8ABAA975CB583E5E5D77CC2333FF3C6D97357
2,954,283 UART: [art] PUB.Y = B1C8FC0761B2B192D93F7B7DA5DFF63701B9C9A4C13A93EA1E1B67F31F1F290C6E14D2D937FBB91B378F534185511C42
2,961,234 UART: [art] SIG.R = 0937D6789AC7B100835F5BEA198A5E84DF99CD81184E5FF951E7E8B93C52022A64A5BD41001512C65EE8B9A13DB0FC43
2,967,960 UART: [art] SIG.S = CED284495764396F235D3AC849192AF343736D6F433F0E9153B09240DAAF76F43CC907179C9543F7F08115B13FF10F88
2,991,618 UART: Caliptra RT
2,991,871 UART: [state] CFI Enabled
3,099,846 UART: [rt] RT listening for mailbox commands...
3,100,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,888 UART: [rt]cmd =0x44504543, len=96
3,310,717 >>> mbox cmd response data (6236 bytes)
3,310,718 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,379 UART: [rt]cmd =0x53574545, len=84
3,366,352 >>> mbox cmd response data (200 bytes)
3,366,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,084 UART: [rt]cmd =0x44504543, len=96
3,427,893 >>> mbox cmd response data (56 bytes)
3,427,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,457,729 UART: [rt]cmd =0x44504543, len=96
3,497,435 >>> mbox cmd response data (24 bytes)
3,497,436 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,527,351 UART: [rt]cmd =0x53574545, len=84
3,552,868 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
893,405 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,530 UART: [kat] ++
897,682 UART: [kat] sha1
901,924 UART: [kat] SHA2-256
903,864 UART: [kat] SHA2-384
906,553 UART: [kat] SHA2-512-ACC
908,454 UART: [kat] ECC-384
918,215 UART: [kat] HMAC-384Kdf
922,967 UART: [kat] LMS
1,171,295 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,576 UART: [fht] FHT @ 0x50003400
1,175,255 UART: [idev] ++
1,175,423 UART: [idev] CDI.KEYID = 6
1,175,783 UART: [idev] SUBJECT.KEYID = 7
1,176,207 UART: [idev] UDS.KEYID = 0
1,176,552 ready_for_fw is high
1,176,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,255 UART: [idev] Erasing UDS.KEYID = 0
1,201,222 UART: [idev] Sha1 KeyId Algorithm
1,209,554 UART: [idev] --
1,210,554 UART: [ldev] ++
1,210,722 UART: [ldev] CDI.KEYID = 6
1,211,085 UART: [ldev] SUBJECT.KEYID = 5
1,211,511 UART: [ldev] AUTHORITY.KEYID = 7
1,211,974 UART: [ldev] FE.KEYID = 1
1,217,202 UART: [ldev] Erasing FE.KEYID = 1
1,243,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,808 UART: [ldev] --
1,283,253 UART: [fwproc] Wait for Commands...
1,283,939 UART: [fwproc] Recv command 0x46574c44
1,284,667 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,549 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,066 >>> mbox cmd response: success
2,773,108 UART: [afmc] ++
2,773,276 UART: [afmc] CDI.KEYID = 6
2,773,638 UART: [afmc] SUBJECT.KEYID = 7
2,774,063 UART: [afmc] AUTHORITY.KEYID = 5
2,809,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,364 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,083 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,771 UART: [afmc] --
2,852,817 UART: [cold-reset] --
2,853,475 UART: [state] Locking Datavault
2,854,848 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,452 UART: [state] Locking ICCM
2,855,942 UART: [exit] Launching FMC @ 0x40000130
2,861,271 UART:
2,861,287 UART: Running Caliptra FMC ...
2,861,695 UART:
2,861,838 UART: [state] CFI Enabled
2,872,759 UART: [fht] FMC Alias Private Key: 7
2,979,852 UART: [art] Extend RT PCRs Done
2,980,280 UART: [art] Lock RT PCRs Done
2,981,956 UART: [art] Populate DV Done
2,990,109 UART: [fht] FMC Alias Private Key: 7
2,991,123 UART: [art] Derive CDI
2,991,403 UART: [art] Store in in slot 0x4
3,077,216 UART: [art] Derive Key Pair
3,077,576 UART: [art] Store priv key in slot 0x5
3,091,452 UART: [art] Derive Key Pair - Done
3,105,945 UART: [art] Signing Cert with AUTHO
3,106,425 UART: RITY.KEYID = 7
3,122,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,892 UART: [art] PUB.X = 09C23586ED3BD08341734502A3E28988E1128F144C71CBDF88B857A9C4F6EF47C42ED8693BA1E1BB99AAD6280D832FBD
3,129,661 UART: [art] PUB.Y = 248A49DE9841F1EF60B22DA6C01657355C62D0F0C0FA464D9912A95E80A687BDDC1E1E9E0E9851A819F5A0A4B9B49FE7
3,136,618 UART: [art] SIG.R = 3B57EC88A5EE087D0ED0FD5572AB90B62B31B0C4DA530636F9F165B704FE1DBFE5EA30E5228EBB00A9357AA150342EAD
3,143,372 UART: [art] SIG.S = 054026F24C58905C2F17AFD810802740E504BE299FFC35435F22409421E8AC42B3FBB681449C1AE6990CF602F55B3711
3,166,775 UART: Caliptra RT
3,167,120 UART: [state] CFI Enabled
3,274,289 UART: [rt] RT listening for mailbox commands...
3,274,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,131 UART: [rt]cmd =0x44504543, len=96
3,486,202 >>> mbox cmd response data (6236 bytes)
3,486,203 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,104 UART: [rt]cmd =0x53574545, len=84
3,541,963 >>> mbox cmd response data (200 bytes)
3,541,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,225 UART: [rt]cmd =0x44504543, len=96
3,604,420 >>> mbox cmd response data (56 bytes)
3,604,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,224 UART: [rt]cmd =0x44504543, len=96
3,673,784 >>> mbox cmd response data (24 bytes)
3,673,785 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,366 UART: [rt]cmd =0x53574545, len=84
3,728,901 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,844 ready_for_fw is high
1,060,844 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,831 >>> mbox cmd response: success
2,688,309 UART:
2,688,325 UART: Running Caliptra FMC ...
2,688,733 UART:
2,688,876 UART: [state] CFI Enabled
2,699,707 UART: [fht] FMC Alias Private Key: 7
2,807,286 UART: [art] Extend RT PCRs Done
2,807,714 UART: [art] Lock RT PCRs Done
2,809,298 UART: [art] Populate DV Done
2,817,783 UART: [fht] FMC Alias Private Key: 7
2,818,879 UART: [art] Derive CDI
2,819,159 UART: [art] Store in in slot 0x4
2,904,882 UART: [art] Derive Key Pair
2,905,242 UART: [art] Store priv key in slot 0x5
2,918,646 UART: [art] Derive Key Pair - Done
2,933,098 UART: [art] Signing Cert with AUTHO
2,933,578 UART: RITY.KEYID = 7
2,949,008 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,773 UART: [art] PUB.X = 57667057525B96ACAEC98A3ABE9E1FCA57B8B7B2E1350EEF2FFE7BB116F392445E357A573FA3D5483C1D3992189FC3FC
2,956,554 UART: [art] PUB.Y = D062F5D26A9A320706BA1821DE4C607E1A1CB5744A5BF67F66FE449D7B77A7B3FA6D92D2988EE50098E45CD780F27E12
2,963,484 UART: [art] SIG.R = F066DC2F430D8C1A980634A2C38587B7E049C5217FF9B3E0A0B86BB1BBD9AF9D3A8BEA61A44ECCC8D68E7951BB1BCAF4
2,970,272 UART: [art] SIG.S = CD3AF87F497AF9EA17BFDC2ABC44DB8C19DE57D5657F115F08E2A4CA92BA0D6351A67A067FCB879A5EAB5440E34E5FC4
2,994,010 UART: Caliptra RT
2,994,355 UART: [state] CFI Enabled
3,101,881 UART: [rt] RT listening for mailbox commands...
3,102,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,319 UART: [rt]cmd =0x44504543, len=96
3,313,956 >>> mbox cmd response data (6236 bytes)
3,313,957 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,876 UART: [rt]cmd =0x53574545, len=84
3,368,949 >>> mbox cmd response data (200 bytes)
3,368,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,399,027 UART: [rt]cmd =0x44504543, len=96
3,430,998 >>> mbox cmd response data (56 bytes)
3,430,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,460,980 UART: [rt]cmd =0x44504543, len=96
3,501,306 >>> mbox cmd response data (24 bytes)
3,501,307 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,531,318 UART: [rt]cmd =0x53574545, len=84
3,556,599 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
916,068 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,801 UART: [idev] ++
1,172,969 UART: [idev] CDI.KEYID = 6
1,173,330 UART: [idev] SUBJECT.KEYID = 7
1,173,755 UART: [idev] UDS.KEYID = 0
1,174,101 ready_for_fw is high
1,174,101 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,887 UART: [idev] Erasing UDS.KEYID = 0
1,198,815 UART: [idev] Sha1 KeyId Algorithm
1,207,725 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,464 UART: [ldev] --
1,280,814 UART: [fwproc] Wait for Commands...
1,281,501 UART: [fwproc] Recv command 0x46574c44
1,282,234 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,748 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,057 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,571 >>> mbox cmd response: success
2,771,688 UART: [afmc] ++
2,771,856 UART: [afmc] CDI.KEYID = 6
2,772,219 UART: [afmc] SUBJECT.KEYID = 7
2,772,645 UART: [afmc] AUTHORITY.KEYID = 5
2,807,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,093 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,165 UART: [afmc] --
2,851,273 UART: [cold-reset] --
2,852,181 UART: [state] Locking Datavault
2,853,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,226 UART: [state] Locking ICCM
2,854,696 UART: [exit] Launching FMC @ 0x40000130
2,860,025 UART:
2,860,041 UART: Running Caliptra FMC ...
2,860,449 UART:
2,860,503 UART: [state] CFI Enabled
2,870,936 UART: [fht] FMC Alias Private Key: 7
2,979,071 UART: [art] Extend RT PCRs Done
2,979,499 UART: [art] Lock RT PCRs Done
2,981,081 UART: [art] Populate DV Done
2,989,660 UART: [fht] FMC Alias Private Key: 7
2,990,634 UART: [art] Derive CDI
2,990,914 UART: [art] Store in in slot 0x4
3,076,423 UART: [art] Derive Key Pair
3,076,783 UART: [art] Store priv key in slot 0x5
3,090,011 UART: [art] Derive Key Pair - Done
3,104,660 UART: [art] Signing Cert with AUTHO
3,105,140 UART: RITY.KEYID = 7
3,120,722 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,487 UART: [art] PUB.X = C438365E2998D9EEFD38ECBCC820217486B4F756F4C8D16CB8C98AAA60FB1239EB07C69CE2B70FE28A1FC31FC47DB38C
3,128,271 UART: [art] PUB.Y = 4D1AB0EB3CDD68FF6FFF8FB3F13AB9426EFDAC7214C18E556F02CBF75D9EC7D089520DA7F26D3AC2D4B7011536374C3D
3,135,236 UART: [art] SIG.R = 33DDC833E447770B1FD48D91EFF1BF495E392E78B4313C3C200C25140BAEAB5F89987CAAD0AB84DD1C0CEC29E34AEE48
3,142,014 UART: [art] SIG.S = AAC06375FF3FFD144CC92768AD2874CD2E6CF739240F1421AF0F35284209B919613946D0BE040F5FDED4EC6900D86CD8
3,165,706 UART: Caliptra RT
3,165,959 UART: [state] CFI Enabled
3,273,704 UART: [rt] RT listening for mailbox commands...
3,274,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,840 UART: [rt]cmd =0x44504543, len=96
3,485,016 >>> mbox cmd response data (6236 bytes)
3,485,017 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,850 UART: [rt]cmd =0x53574545, len=84
3,540,099 >>> mbox cmd response data (200 bytes)
3,540,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,255 UART: [rt]cmd =0x44504543, len=96
3,601,464 >>> mbox cmd response data (56 bytes)
3,601,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,631,416 UART: [rt]cmd =0x44504543, len=96
3,670,838 >>> mbox cmd response data (24 bytes)
3,670,839 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,700,804 UART: [rt]cmd =0x53574545, len=84
3,726,745 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,508 ready_for_fw is high
1,055,508 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,585 >>> mbox cmd response: success
2,682,013 UART:
2,682,029 UART: Running Caliptra FMC ...
2,682,437 UART:
2,682,491 UART: [state] CFI Enabled
2,692,786 UART: [fht] FMC Alias Private Key: 7
2,800,853 UART: [art] Extend RT PCRs Done
2,801,281 UART: [art] Lock RT PCRs Done
2,802,727 UART: [art] Populate DV Done
2,811,108 UART: [fht] FMC Alias Private Key: 7
2,812,114 UART: [art] Derive CDI
2,812,394 UART: [art] Store in in slot 0x4
2,898,073 UART: [art] Derive Key Pair
2,898,433 UART: [art] Store priv key in slot 0x5
2,910,807 UART: [art] Derive Key Pair - Done
2,925,271 UART: [art] Signing Cert with AUTHO
2,925,751 UART: RITY.KEYID = 7
2,940,751 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,516 UART: [art] PUB.X = 6269FDE2BBD1E9B28EFE4830ADEBBCCD8688E6E669C27C6E5A310DBBDBE10DB00801B8F8429DF41E8C1BE1A06B866A34
2,948,300 UART: [art] PUB.Y = 194D29558B0E5FA7F14EA1A52644A2E9F02CB189E658A9F42BCA2C32B9CCA326E4AF989FBCA3D022534EA89BA68B8EF1
2,955,265 UART: [art] SIG.R = 9E2E5AA128BEA51351739E40E28D101AB18A8DC08D52DE877CE9F1017C8A18FC88CE2C6FB4814DC00EF3BDCA28BA8E7B
2,962,051 UART: [art] SIG.S = 6827A1A627DC4A9577521922658E34AF3BF57686883334FD9613B23A651B4CB3B3CEFF7600D9BA291C28F48071A08BF5
2,986,480 UART: Caliptra RT
2,986,733 UART: [state] CFI Enabled
3,095,176 UART: [rt] RT listening for mailbox commands...
3,095,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,360 UART: [rt]cmd =0x44504543, len=96
3,307,143 >>> mbox cmd response data (6236 bytes)
3,307,144 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,243 UART: [rt]cmd =0x53574545, len=84
3,363,388 >>> mbox cmd response data (200 bytes)
3,363,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,393,274 UART: [rt]cmd =0x44504543, len=96
3,425,213 >>> mbox cmd response data (56 bytes)
3,425,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,455,211 UART: [rt]cmd =0x44504543, len=96
3,495,525 >>> mbox cmd response data (24 bytes)
3,495,526 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,525,297 UART: [rt]cmd =0x53574545, len=84
3,550,742 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,797 UART: [kat] SHA2-256
891,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,597 UART: [kat] HMAC-384Kdf
921,281 UART: [kat] LMS
1,169,593 UART: [kat] --
1,170,476 UART: [cold-reset] ++
1,171,048 UART: [fht] FHT @ 0x50003400
1,173,732 UART: [idev] ++
1,173,900 UART: [idev] CDI.KEYID = 6
1,174,261 UART: [idev] SUBJECT.KEYID = 7
1,174,686 UART: [idev] UDS.KEYID = 0
1,175,032 ready_for_fw is high
1,175,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,962 UART: [idev] Sha1 KeyId Algorithm
1,208,836 UART: [idev] --
1,209,985 UART: [ldev] ++
1,210,153 UART: [ldev] CDI.KEYID = 6
1,210,517 UART: [ldev] SUBJECT.KEYID = 5
1,210,944 UART: [ldev] AUTHORITY.KEYID = 7
1,211,407 UART: [ldev] FE.KEYID = 1
1,216,355 UART: [ldev] Erasing FE.KEYID = 1
1,243,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,828 UART: [fwproc] Recv command 0x46574c44
1,283,561 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,182 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,732 >>> mbox cmd response: success
2,771,765 UART: [afmc] ++
2,771,933 UART: [afmc] CDI.KEYID = 6
2,772,296 UART: [afmc] SUBJECT.KEYID = 7
2,772,722 UART: [afmc] AUTHORITY.KEYID = 5
2,808,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,379 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,262 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,981 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,876 UART: [afmc] --
2,851,844 UART: [cold-reset] --
2,852,736 UART: [state] Locking Datavault
2,853,881 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,485 UART: [state] Locking ICCM
2,854,995 UART: [exit] Launching FMC @ 0x40000130
2,860,324 UART:
2,860,340 UART: Running Caliptra FMC ...
2,860,748 UART:
2,860,891 UART: [state] CFI Enabled
2,871,754 UART: [fht] FMC Alias Private Key: 7
2,979,991 UART: [art] Extend RT PCRs Done
2,980,419 UART: [art] Lock RT PCRs Done
2,982,075 UART: [art] Populate DV Done
2,990,238 UART: [fht] FMC Alias Private Key: 7
2,991,382 UART: [art] Derive CDI
2,991,662 UART: [art] Store in in slot 0x4
3,077,275 UART: [art] Derive Key Pair
3,077,635 UART: [art] Store priv key in slot 0x5
3,091,415 UART: [art] Derive Key Pair - Done
3,105,783 UART: [art] Signing Cert with AUTHO
3,106,263 UART: RITY.KEYID = 7
3,121,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,464 UART: [art] PUB.X = BEE568266B69066F346385675A6B061C4341E396B90BE4F54AF853669DBF975E8B7B03BFCD8673241DEFDCA866A36984
3,129,224 UART: [art] PUB.Y = FBF3BFBFC3CDD0B11D5C3CA68DB32C95CD7034EBEDAC81A45334EF1EB325791AE12E09D987B19D7596DCAFE51D4A3261
3,136,199 UART: [art] SIG.R = 658F41E914878A0F3E33F886C8799C36E45187DA95CF703350F8FCD60106B4F2AAE12D983629FC1E54B759ED82D9B506
3,142,957 UART: [art] SIG.S = E34443AEAB499C65E60187D13BF8EF665E6E846E0FA0EA1777C266200FFB5F7147A6D2342D29F9894EF2AE0B1F82AD67
3,166,574 UART: Caliptra RT
3,166,919 UART: [state] CFI Enabled
3,275,786 UART: [rt] RT listening for mailbox commands...
3,276,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,962 UART: [rt]cmd =0x44504543, len=96
3,488,271 >>> mbox cmd response data (6236 bytes)
3,488,272 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,255 UART: [rt]cmd =0x53574545, len=84
3,543,766 >>> mbox cmd response data (200 bytes)
3,543,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,573,606 UART: [rt]cmd =0x44504543, len=96
3,604,495 >>> mbox cmd response data (56 bytes)
3,604,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,634,435 UART: [rt]cmd =0x44504543, len=96
3,673,457 >>> mbox cmd response data (24 bytes)
3,673,458 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,703,363 UART: [rt]cmd =0x53574545, len=84
3,729,596 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,987 ready_for_fw is high
1,055,987 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,940 >>> mbox cmd response: success
2,683,100 UART:
2,683,116 UART: Running Caliptra FMC ...
2,683,524 UART:
2,683,667 UART: [state] CFI Enabled
2,694,284 UART: [fht] FMC Alias Private Key: 7
2,802,983 UART: [art] Extend RT PCRs Done
2,803,411 UART: [art] Lock RT PCRs Done
2,804,643 UART: [art] Populate DV Done
2,812,986 UART: [fht] FMC Alias Private Key: 7
2,813,916 UART: [art] Derive CDI
2,814,196 UART: [art] Store in in slot 0x4
2,899,935 UART: [art] Derive Key Pair
2,900,295 UART: [art] Store priv key in slot 0x5
2,913,315 UART: [art] Derive Key Pair - Done
2,928,347 UART: [art] Signing Cert with AUTHO
2,928,827 UART: RITY.KEYID = 7
2,943,555 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,320 UART: [art] PUB.X = 23D274066B02E34A4F82B9B0319780ECAABB9AC9C800061E8F361EB9475DBD919A074944DE8CD4BB2FE26E6C401B4585
2,951,064 UART: [art] PUB.Y = 6575785BDBBF12CB4C5A23FDDA44A9247A5E89628513FF891FA5A9148E3E1C05BEBA1D2E2B5AC071B443E810A972D9F4
2,958,025 UART: [art] SIG.R = 400DAEEE7137C6CB58E944F06CEABF4C76A5BEA2C3C1DECF5EE3D9E7B57596E8C012D91A673722A470D2EE4DE0BE36A9
2,964,818 UART: [art] SIG.S = CC1A0DEE2303B060F785F0780C91680BEE7C7E4FB5E3CFC7719B2B13DF702EA7E9C9E0B10E0F08B80E2B404254202DC5
2,987,901 UART: Caliptra RT
2,988,246 UART: [state] CFI Enabled
3,095,969 UART: [rt] RT listening for mailbox commands...
3,096,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,753 UART: [rt]cmd =0x44504543, len=96
3,307,172 >>> mbox cmd response data (6236 bytes)
3,307,173 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,014 UART: [rt]cmd =0x53574545, len=84
3,362,329 >>> mbox cmd response data (200 bytes)
3,362,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,137 UART: [rt]cmd =0x44504543, len=96
3,423,704 >>> mbox cmd response data (56 bytes)
3,423,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,453,826 UART: [rt]cmd =0x44504543, len=96
3,494,174 >>> mbox cmd response data (24 bytes)
3,494,175 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,524,024 UART: [rt]cmd =0x53574545, len=84
3,549,587 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,167 UART:
192,529 UART: Running Caliptra ROM ...
193,723 UART:
193,874 UART: [state] CFI Enabled
261,609 UART: [state] LifecycleState = Unprovisioned
263,605 UART: [state] DebugLocked = No
264,988 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,339 UART: [kat] SHA2-256
439,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,498 UART: [kat] ++
450,103 UART: [kat] sha1
460,760 UART: [kat] SHA2-256
463,440 UART: [kat] SHA2-384
469,113 UART: [kat] SHA2-512-ACC
471,477 UART: [kat] ECC-384
2,767,768 UART: [kat] HMAC-384Kdf
2,798,063 UART: [kat] LMS
3,988,366 UART: [kat] --
3,990,458 UART: [cold-reset] ++
3,992,745 UART: [fht] Storing FHT @ 0x50003400
4,004,850 UART: [idev] ++
4,005,481 UART: [idev] CDI.KEYID = 6
4,006,386 UART: [idev] SUBJECT.KEYID = 7
4,007,627 UART: [idev] UDS.KEYID = 0
4,008,673 ready_for_fw is high
4,008,867 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,152,067 UART: [idev] Erasing UDS.KEYID = 0
7,343,557 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,263 UART: [idev] --
7,367,826 UART: [ldev] ++
7,368,389 UART: [ldev] CDI.KEYID = 6
7,369,358 UART: [ldev] SUBJECT.KEYID = 5
7,370,567 UART: [ldev] AUTHORITY.KEYID = 7
7,371,842 UART: [ldev] FE.KEYID = 1
7,401,405 UART: [ldev] Erasing FE.KEYID = 1
10,735,098 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,788 UART: [ldev] --
13,116,271 UART: [fwproc] Waiting for Commands...
13,118,572 UART: [fwproc] Received command 0x46574c44
13,120,796 UART: [fwproc] Received Image of size 113844 bytes
17,170,733 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,248,976 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,317,876 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,635,001 >>> mbox cmd response: success
17,639,172 UART: [afmc] ++
17,639,765 UART: [afmc] CDI.KEYID = 6
17,640,670 UART: [afmc] SUBJECT.KEYID = 7
17,641,938 UART: [afmc] AUTHORITY.KEYID = 5
21,009,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,208 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,468 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,323,865 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,725 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,211 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,981 UART: [afmc] --
23,377,943 UART: [cold-reset] --
23,382,227 UART: [state] Locking Datavault
23,388,654 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,347 UART: [state] Locking ICCM
23,392,466 UART: [exit] Launching FMC @ 0x40000130
23,400,854 UART:
23,401,079 UART: Running Caliptra FMC ...
23,402,195 UART:
23,402,349 UART: [state] CFI Enabled
23,467,603 UART: [fht] FMC Alias Private Key: 7
25,805,502 UART: [art] Extend RT PCRs Done
25,806,730 UART: [art] Lock RT PCRs Done
25,808,648 UART: [art] Populate DV Done
25,814,210 UART: [fht] FMC Alias Private Key: 7
25,815,792 UART: [art] Derive CDI
25,816,518 UART: [art] Store in in slot 0x4
25,875,006 UART: [art] Derive Key Pair
25,876,044 UART: [art] Store priv key in slot 0x5
29,169,243 UART: [art] Derive Key Pair - Done
29,182,295 UART: [art] Signing Cert with AUTHO
29,183,786 UART: RITY.KEYID = 7
31,470,547 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,052 UART: [art] PUB.X = 9F17BE0A4B6F65744A9214E1507566F8767B9D92640EA4368DE3C63743C7EFDE422F1F8D14217806CFFD5D55C9271BC9
31,479,284 UART: [art] PUB.Y = A1A0C23AA8EFF6383908144C35FA3D84F4FCCF5561FDA4F20DC982DCDA7DBD7CE68EAEC22E700F734C90F67C865A44D2
31,486,532 UART: [art] SIG.R = 2777ADBD5220E0267827155BE198F76986C16B290DF4BAFB33E714C626BDE73D5AC6CD2A88EE603B5C97C9ED7AFCB55B
31,493,944 UART: [art] SIG.S = 2CA11F1E579A05626D7F3CA79AD30ACC1A0657821444403B4FE8B064B431458278932DE685FFF4B801F7764C779D538E
32,798,586 UART: Caliptra RT
32,799,298 UART: [state] CFI Enabled
32,960,314 UART: [rt] RT listening for mailbox commands...
32,962,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,993,464 UART: [rt]cmd =0x44504543, len=96
38,735,597 >>> mbox cmd response data (6236 bytes)
38,764,735 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,795,250 UART: [rt]cmd =0x53574545, len=84
38,798,285 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,783,166 ready_for_fw is high
3,783,576 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,819,188 >>> mbox cmd response: success
23,503,443 UART:
23,503,852 UART: Running Caliptra FMC ...
23,504,953 UART:
23,505,102 UART: [state] CFI Enabled
23,573,344 UART: [fht] FMC Alias Private Key: 7
25,911,763 UART: [art] Extend RT PCRs Done
25,912,991 UART: [art] Lock RT PCRs Done
25,914,377 UART: [art] Populate DV Done
25,919,696 UART: [fht] FMC Alias Private Key: 7
25,921,233 UART: [art] Derive CDI
25,921,988 UART: [art] Store in in slot 0x4
25,981,846 UART: [art] Derive Key Pair
25,982,887 UART: [art] Store priv key in slot 0x5
29,275,178 UART: [art] Derive Key Pair - Done
29,288,326 UART: [art] Signing Cert with AUTHO
29,289,661 UART: RITY.KEYID = 7
31,576,495 UART: [art] Erasing AUTHORITY.KEYID = 7
31,578,007 UART: [art] PUB.X = 1609D1EE3507931734AA12361FDDE81B921AAACF5D183DBD4B6615C9F44365C38A21387E9C27CE880624E5B775BAD7DB
31,585,232 UART: [art] PUB.Y = 37BFDE64156C89B68F95260E7FD7E39AAFBD5198572778FEE75504B122BA2CFE9EE83354CBC1870C449053FBF854EFAB
31,592,503 UART: [art] SIG.R = 8A74EBE5B8DFDD9905EEE563F65D127AB80098EDC7C5BB0579B653586B94F027143F10FBC12462C34D8B9CAEA9F28F5E
31,599,851 UART: [art] SIG.S = D910AA7E392648D687FA8533B954CDD35E8F1E1E3D495999B942E426066E3F40F9D86267615DF258D15A2D67A2074A31
32,905,353 UART: Caliptra RT
32,906,050 UART: [state] CFI Enabled
33,065,409 UART: [rt] RT listening for mailbox commands...
33,067,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,098,711 UART: [rt]cmd =0x44504543, len=96
38,862,042 >>> mbox cmd response data (6236 bytes)
38,891,471 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,922,196 UART: [rt]cmd =0x53574545, len=84
38,926,014 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,463 UART:
192,829 UART: Running Caliptra ROM ...
193,969 UART:
603,689 UART: [state] CFI Enabled
619,979 UART: [state] LifecycleState = Unprovisioned
621,924 UART: [state] DebugLocked = No
623,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,228 UART: [kat] SHA2-256
798,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,538 UART: [kat] ++
810,011 UART: [kat] sha1
820,819 UART: [kat] SHA2-256
823,543 UART: [kat] SHA2-384
828,035 UART: [kat] SHA2-512-ACC
830,416 UART: [kat] ECC-384
3,112,574 UART: [kat] HMAC-384Kdf
3,124,025 UART: [kat] LMS
4,314,105 UART: [kat] --
4,316,841 UART: [cold-reset] ++
4,318,421 UART: [fht] Storing FHT @ 0x50003400
4,330,893 UART: [idev] ++
4,331,466 UART: [idev] CDI.KEYID = 6
4,332,421 UART: [idev] SUBJECT.KEYID = 7
4,333,660 UART: [idev] UDS.KEYID = 0
4,334,625 ready_for_fw is high
4,334,826 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,810 UART: [idev] Erasing UDS.KEYID = 0
7,617,262 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,497 UART: [idev] --
7,644,433 UART: [ldev] ++
7,645,020 UART: [ldev] CDI.KEYID = 6
7,646,010 UART: [ldev] SUBJECT.KEYID = 5
7,647,178 UART: [ldev] AUTHORITY.KEYID = 7
7,648,409 UART: [ldev] FE.KEYID = 1
7,659,665 UART: [ldev] Erasing FE.KEYID = 1
10,947,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,522 UART: [ldev] --
13,305,973 UART: [fwproc] Waiting for Commands...
13,308,287 UART: [fwproc] Received command 0x46574c44
13,310,470 UART: [fwproc] Received Image of size 113844 bytes
17,362,998 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,808 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,832,802 >>> mbox cmd response: success
17,836,849 UART: [afmc] ++
17,837,450 UART: [afmc] CDI.KEYID = 6
17,838,364 UART: [afmc] SUBJECT.KEYID = 7
17,839,635 UART: [afmc] AUTHORITY.KEYID = 5
21,152,611 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,446,805 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,449,106 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,463,456 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,478,320 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,492,787 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,514,450 UART: [afmc] --
23,518,537 UART: [cold-reset] --
23,522,667 UART: [state] Locking Datavault
23,528,397 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,146 UART: [state] Locking ICCM
23,531,235 UART: [exit] Launching FMC @ 0x40000130
23,539,631 UART:
23,539,864 UART: Running Caliptra FMC ...
23,540,964 UART:
23,541,129 UART: [state] CFI Enabled
23,549,032 UART: [fht] FMC Alias Private Key: 7
25,880,179 UART: [art] Extend RT PCRs Done
25,881,411 UART: [art] Lock RT PCRs Done
25,882,846 UART: [art] Populate DV Done
25,888,253 UART: [fht] FMC Alias Private Key: 7
25,889,960 UART: [art] Derive CDI
25,890,778 UART: [art] Store in in slot 0x4
25,933,206 UART: [art] Derive Key Pair
25,934,207 UART: [art] Store priv key in slot 0x5
29,176,127 UART: [art] Derive Key Pair - Done
29,189,396 UART: [art] Signing Cert with AUTHO
29,190,720 UART: RITY.KEYID = 7
31,470,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,784 UART: [art] PUB.X = 1ED9D6543C453FD42C69CBA3AB8C020F14B8049CA2FF6E22E9576DF16671F7C020A09A0CF0BDF8614C3450A59659C508
31,479,039 UART: [art] PUB.Y = 6C4BB1E1852D4365BD128DF6973D5B6B632350AB7C1A72B3C9ABB1EB3D7A5D744AF7AFA3DBBC9F25F6A33254D8F802CB
31,486,324 UART: [art] SIG.R = E79B688C670BB32847505B916C7D588B15F273BE20BFB7EC30892906E436C520356F7C0FBA2B321EDFA1B9C155DFE6AE
31,493,745 UART: [art] SIG.S = 4214909AF82EA482E1B3FC25190DD86BBDEFFCC166AF46C1D65E8087F0D671A206E273E5EB97848D60F64139C417FB6C
32,799,093 UART: Caliptra RT
32,799,813 UART: [state] CFI Enabled
32,917,081 UART: [rt] RT listening for mailbox commands...
32,919,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,950,420 UART: [rt]cmd =0x44504543, len=96
38,622,690 >>> mbox cmd response data (6236 bytes)
38,651,951 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,682,533 UART: [rt]cmd =0x53574545, len=84
38,685,899 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
4,124,329 ready_for_fw is high
4,124,728 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,059,895 >>> mbox cmd response: success
23,702,386 UART:
23,702,798 UART: Running Caliptra FMC ...
23,703,948 UART:
23,704,109 UART: [state] CFI Enabled
23,711,868 UART: [fht] FMC Alias Private Key: 7
26,042,702 UART: [art] Extend RT PCRs Done
26,043,933 UART: [art] Lock RT PCRs Done
26,045,564 UART: [art] Populate DV Done
26,050,825 UART: [fht] FMC Alias Private Key: 7
26,052,373 UART: [art] Derive CDI
26,053,141 UART: [art] Store in in slot 0x4
26,095,904 UART: [art] Derive Key Pair
26,096,953 UART: [art] Store priv key in slot 0x5
29,339,427 UART: [art] Derive Key Pair - Done
29,352,972 UART: [art] Signing Cert with AUTHO
29,354,284 UART: RITY.KEYID = 7
31,633,649 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,158 UART: [art] PUB.X = 43E46B16F6597D19FC19222168794165B7BC9D583DC5D0027B2EC662A72594FE31252F42592474B9B38CD28294D8DC52
31,642,357 UART: [art] PUB.Y = 0564B72341FB107EE3571F773D962CF5FF363097A1AE073076F4E8A8F1C6A9380AC9086F13E85B1FD4A94E007D798375
31,649,554 UART: [art] SIG.R = E7C182DB36A1FB2F3445BF5E61847A3C0D30376D85E911825F92C2F5C2B7D70180FFE91927F8331E4865A19CB9A1EA55
31,656,955 UART: [art] SIG.S = 81D42BCA4D626E8494396DCEF9B3EE1FECF4BC2B05D68A151C06CCFFA7B09C9E1E77E2DCDB1307DDEE22BCC750F18BDA
32,962,260 UART: Caliptra RT
32,962,974 UART: [state] CFI Enabled
33,080,378 UART: [rt] RT listening for mailbox commands...
33,082,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,113,648 UART: [rt]cmd =0x44504543, len=96
38,785,463 >>> mbox cmd response data (6236 bytes)
38,814,899 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,845,354 UART: [rt]cmd =0x53574545, len=84
38,848,853 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,166 UART:
192,541 UART: Running Caliptra ROM ...
193,720 UART:
193,875 UART: [state] CFI Enabled
263,146 UART: [state] LifecycleState = Unprovisioned
265,066 UART: [state] DebugLocked = No
267,038 UART: [state] WD Timer not started. Device not locked for debugging
271,081 UART: [kat] SHA2-256
450,200 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,790 UART: [kat] ++
462,242 UART: [kat] sha1
472,046 UART: [kat] SHA2-256
475,062 UART: [kat] SHA2-384
482,475 UART: [kat] SHA2-512-ACC
485,405 UART: [kat] ECC-384
2,947,489 UART: [kat] HMAC-384Kdf
2,971,647 UART: [kat] LMS
3,501,122 UART: [kat] --
3,506,607 UART: [cold-reset] ++
3,509,180 UART: [fht] FHT @ 0x50003400
3,520,247 UART: [idev] ++
3,520,809 UART: [idev] CDI.KEYID = 6
3,521,763 UART: [idev] SUBJECT.KEYID = 7
3,522,936 UART: [idev] UDS.KEYID = 0
3,523,910 ready_for_fw is high
3,524,123 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,160 UART: [idev] Erasing UDS.KEYID = 0
6,029,513 UART: [idev] Sha1 KeyId Algorithm
6,051,936 UART: [idev] --
6,055,776 UART: [ldev] ++
6,056,353 UART: [ldev] CDI.KEYID = 6
6,057,286 UART: [ldev] SUBJECT.KEYID = 5
6,058,453 UART: [ldev] AUTHORITY.KEYID = 7
6,059,740 UART: [ldev] FE.KEYID = 1
6,100,105 UART: [ldev] Erasing FE.KEYID = 1
8,602,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,732 UART: [ldev] --
10,391,707 UART: [fwproc] Wait for Commands...
10,394,662 UART: [fwproc] Recv command 0x46574c44
10,396,755 UART: [fwproc] Recv'd Img size: 114168 bytes
13,800,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,194 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,942,928 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,260,821 >>> mbox cmd response: success
14,265,511 UART: [afmc] ++
14,266,118 UART: [afmc] CDI.KEYID = 6
14,267,005 UART: [afmc] SUBJECT.KEYID = 7
14,268,112 UART: [afmc] AUTHORITY.KEYID = 5
16,808,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,851 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,689 UART: [afmc] --
18,609,072 UART: [cold-reset] --
18,612,074 UART: [state] Locking Datavault
18,615,601 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,250 UART: [state] Locking ICCM
18,619,398 UART: [exit] Launching FMC @ 0x40000130
18,627,798 UART:
18,628,039 UART: Running Caliptra FMC ...
18,629,143 UART:
18,629,300 UART: [state] CFI Enabled
18,688,918 UART: [fht] FMC Alias Private Key: 7
20,452,663 UART: [art] Extend RT PCRs Done
20,453,883 UART: [art] Lock RT PCRs Done
20,455,536 UART: [art] Populate DV Done
20,460,891 UART: [fht] FMC Alias Private Key: 7
20,462,586 UART: [art] Derive CDI
20,463,321 UART: [art] Store in in slot 0x4
20,521,222 UART: [art] Derive Key Pair
20,522,259 UART: [art] Store priv key in slot 0x5
22,987,298 UART: [art] Derive Key Pair - Done
23,000,291 UART: [art] Signing Cert with AUTHO
23,001,603 UART: RITY.KEYID = 7
24,713,053 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,565 UART: [art] PUB.X = 7571984B5767362A4AC9A0757C0350B29721376DE64907F70F05BDD77E47A5F9BA959DDB1080B2E5006CB033CDC5A183
24,721,814 UART: [art] PUB.Y = D633EF17986353D3E32489C5478E66B229800D41BA8FE9A72B967C49DF1E47DEDDEB1566BE1302DC3F9F6EE9D609E3B0
24,729,054 UART: [art] SIG.R = 75412769C22801F548D5AE59DF74471DB95EA2409D0902DC212092958CE6D7E902379505C66E74D6A62398F79D9B1647
24,736,467 UART: [art] SIG.S = C85B5A527362D11B237ED0E023A6C2DBE6FEBA199232C1709B50F6F46E3F7D36BEBE4CED056425565ACA46C1D5BB943D
25,716,067 UART: Caliptra RT
25,716,773 UART: [state] CFI Enabled
25,879,888 UART: [rt] RT listening for mailbox commands...
25,881,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,912,975 UART: [rt]cmd =0x44504543, len=96
30,270,489 >>> mbox cmd response data (6236 bytes)
30,299,776 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,330,114 UART: [rt]cmd =0x53574545, len=84
30,333,994 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,382,239 ready_for_fw is high
3,382,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,069,595 >>> mbox cmd response: success
18,362,590 UART:
18,362,999 UART: Running Caliptra FMC ...
18,364,103 UART:
18,364,255 UART: [state] CFI Enabled
18,429,616 UART: [fht] FMC Alias Private Key: 7
20,193,869 UART: [art] Extend RT PCRs Done
20,195,088 UART: [art] Lock RT PCRs Done
20,196,926 UART: [art] Populate DV Done
20,202,287 UART: [fht] FMC Alias Private Key: 7
20,203,775 UART: [art] Derive CDI
20,204,512 UART: [art] Store in in slot 0x4
20,262,149 UART: [art] Derive Key Pair
20,263,190 UART: [art] Store priv key in slot 0x5
22,725,826 UART: [art] Derive Key Pair - Done
22,739,026 UART: [art] Signing Cert with AUTHO
22,740,366 UART: RITY.KEYID = 7
24,451,033 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,541 UART: [art] PUB.X = 77DCA80FE6262722D8B344E2A2FE47E9BB3A1E3D918A82597168DCC1A3DCF55357BB0B9E807458DABE96AEC93661DE40
24,459,840 UART: [art] PUB.Y = FD2A16FB0DF75E429FA9F8C04D8839656B1DE2C596190A42B18AAF2A8CE15F2ABD6E01F44D0B6F0BE34BABA1D7DFDA1A
24,467,079 UART: [art] SIG.R = 680CAAEE83F7DDB381381EA0B011FF129FCFDAF2755DFFB4ED6B189E41F4F8E13E6B5B0A2D6C328B9C4B858417B1D19B
24,474,516 UART: [art] SIG.S = 04B59CB30C5566887F399EFE0B33F73118AAF2EB9F61CDE86DAAB9AC125F08F31381A4D41089D03D4142BA2458CDDDCB
25,453,488 UART: Caliptra RT
25,454,346 UART: [state] CFI Enabled
25,618,531 UART: [rt] RT listening for mailbox commands...
25,620,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,651,369 UART: [rt]cmd =0x44504543, len=96
30,009,591 >>> mbox cmd response data (6236 bytes)
30,038,988 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,069,337 UART: [rt]cmd =0x53574545, len=84
30,073,005 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,877 writing to cptra_bootfsm_go
193,141 UART:
193,576 UART: Running Caliptra ROM ...
194,818 UART:
604,403 UART: [state] CFI Enabled
617,303 UART: [state] LifecycleState = Unprovisioned
619,173 UART: [state] DebugLocked = No
620,832 UART: [state] WD Timer not started. Device not locked for debugging
623,793 UART: [kat] SHA2-256
802,949 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,493 UART: [kat] ++
814,947 UART: [kat] sha1
825,535 UART: [kat] SHA2-256
828,538 UART: [kat] SHA2-384
833,603 UART: [kat] SHA2-512-ACC
836,607 UART: [kat] ECC-384
3,277,108 UART: [kat] HMAC-384Kdf
3,289,351 UART: [kat] LMS
3,818,830 UART: [kat] --
3,823,752 UART: [cold-reset] ++
3,825,541 UART: [fht] FHT @ 0x50003400
3,836,991 UART: [idev] ++
3,837,572 UART: [idev] CDI.KEYID = 6
3,838,497 UART: [idev] SUBJECT.KEYID = 7
3,839,672 UART: [idev] UDS.KEYID = 0
3,840,597 ready_for_fw is high
3,840,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,039 UART: [idev] Erasing UDS.KEYID = 0
6,311,243 UART: [idev] Sha1 KeyId Algorithm
6,333,984 UART: [idev] --
6,339,000 UART: [ldev] ++
6,339,574 UART: [ldev] CDI.KEYID = 6
6,340,489 UART: [ldev] SUBJECT.KEYID = 5
6,341,704 UART: [ldev] AUTHORITY.KEYID = 7
6,342,952 UART: [ldev] FE.KEYID = 1
6,353,710 UART: [ldev] Erasing FE.KEYID = 1
8,827,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,385 UART: [ldev] --
10,619,809 UART: [fwproc] Wait for Commands...
10,622,437 UART: [fwproc] Recv command 0x46574c44
10,624,526 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,241 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,045 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,982 >>> mbox cmd response: success
14,484,917 UART: [afmc] ++
14,485,533 UART: [afmc] CDI.KEYID = 6
14,486,451 UART: [afmc] SUBJECT.KEYID = 7
14,487,615 UART: [afmc] AUTHORITY.KEYID = 5
16,986,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,441 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,209 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,223 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,106 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,779,815 UART: [afmc] --
18,783,515 UART: [cold-reset] --
18,787,111 UART: [state] Locking Datavault
18,791,533 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,239 UART: [state] Locking ICCM
18,794,444 UART: [exit] Launching FMC @ 0x40000130
18,802,891 UART:
18,803,183 UART: Running Caliptra FMC ...
18,804,241 UART:
18,804,398 UART: [state] CFI Enabled
18,812,495 UART: [fht] FMC Alias Private Key: 7
20,569,078 UART: [art] Extend RT PCRs Done
20,570,305 UART: [art] Lock RT PCRs Done
20,572,010 UART: [art] Populate DV Done
20,577,426 UART: [fht] FMC Alias Private Key: 7
20,579,069 UART: [art] Derive CDI
20,579,809 UART: [art] Store in in slot 0x4
20,622,398 UART: [art] Derive Key Pair
20,623,396 UART: [art] Store priv key in slot 0x5
23,050,245 UART: [art] Derive Key Pair - Done
23,063,296 UART: [art] Signing Cert with AUTHO
23,064,598 UART: RITY.KEYID = 7
24,769,751 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,270 UART: [art] PUB.X = EC2320F6EDEE0C6EB6382B0D805234A01D2F1FF5F2B04C0BC6056A4FEB351A3CC66E7AD704E52FFF34C54A55AE105A11
24,778,575 UART: [art] PUB.Y = E3870AF9320E6EC410B06C2BDC5EDA26EE767909FB4FA35B7FD802C7D159011AA273EB39C6682F3E15A06608183F0889
24,785,809 UART: [art] SIG.R = 4A749E425E4603E18A5A07064F1F0D57642E2980D2002504D1AECFCC3D4C564634DE9C9B50732E25FA8C4FF6FBE17B22
24,793,242 UART: [art] SIG.S = 36E72BC5BE415579A683D59E308B6EFD4299A35DBAC195B6153F00864757BA85DEF96A2A5F1CC05A639DBB2C54341084
25,771,685 UART: Caliptra RT
25,772,397 UART: [state] CFI Enabled
25,888,862 UART: [rt] RT listening for mailbox commands...
25,890,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,921,943 UART: [rt]cmd =0x44504543, len=96
30,204,219 >>> mbox cmd response data (6236 bytes)
30,233,493 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,264,220 UART: [rt]cmd =0x53574545, len=84
30,268,102 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,816 writing to cptra_bootfsm_go
3,700,180 ready_for_fw is high
3,700,549 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,282,402 >>> mbox cmd response: success
18,531,664 UART:
18,532,056 UART: Running Caliptra FMC ...
18,533,243 UART:
18,533,410 UART: [state] CFI Enabled
18,541,635 UART: [fht] FMC Alias Private Key: 7
20,298,041 UART: [art] Extend RT PCRs Done
20,299,268 UART: [art] Lock RT PCRs Done
20,301,061 UART: [art] Populate DV Done
20,306,452 UART: [fht] FMC Alias Private Key: 7
20,308,050 UART: [art] Derive CDI
20,308,873 UART: [art] Store in in slot 0x4
20,351,309 UART: [art] Derive Key Pair
20,352,353 UART: [art] Store priv key in slot 0x5
22,779,360 UART: [art] Derive Key Pair - Done
22,792,348 UART: [art] Signing Cert with AUTHO
22,793,649 UART: RITY.KEYID = 7
24,499,310 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,818 UART: [art] PUB.X = 8F39CABCFCEF39249200205A8772E4E7DB5D5306B1212AADCBC43CB54262BCAE62A548DE4DD954F0FF3C017839EFF8C4
24,508,126 UART: [art] PUB.Y = 5409BD54B8D6D63FCB3AB51538AD3EF5B680051A03564AEB18094D5D6CC32C1033BA5D6DAF19A776572908A7477266E6
24,515,379 UART: [art] SIG.R = 9ED2A1688E22A56D54AE74CDE622E9FF05158D6B28C2011C2E79CCA98D72F4C325FBB71B9B45FEDE72AEBA24398DF30F
24,522,782 UART: [art] SIG.S = 0289F8F880505C6AE5A00D747DBD66BADEA2A75AF79D3E696E6AC84940C190E520A03A4C2E4114B5BCC25439F3ADBC5C
25,501,651 UART: Caliptra RT
25,502,340 UART: [state] CFI Enabled
25,619,955 UART: [rt] RT listening for mailbox commands...
25,621,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,653,120 UART: [rt]cmd =0x44504543, len=96
29,935,600 >>> mbox cmd response data (6236 bytes)
29,964,788 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,995,284 UART: [rt]cmd =0x53574545, len=84
29,999,103 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,115 UART:
192,485 UART: Running Caliptra ROM ...
193,671 UART:
193,828 UART: [state] CFI Enabled
266,668 UART: [state] LifecycleState = Unprovisioned
269,021 UART: [state] DebugLocked = No
270,916 UART: [state] WD Timer not started. Device not locked for debugging
275,217 UART: [kat] SHA2-256
465,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,866 UART: [kat] ++
476,399 UART: [kat] sha1
487,930 UART: [kat] SHA2-256
490,951 UART: [kat] SHA2-384
497,244 UART: [kat] SHA2-512-ACC
499,832 UART: [kat] ECC-384
2,949,543 UART: [kat] HMAC-384Kdf
2,972,578 UART: [kat] LMS
3,504,388 UART: [kat] --
3,509,026 UART: [cold-reset] ++
3,511,032 UART: [fht] FHT @ 0x50003400
3,521,584 UART: [idev] ++
3,522,290 UART: [idev] CDI.KEYID = 6
3,523,272 UART: [idev] SUBJECT.KEYID = 7
3,524,442 UART: [idev] UDS.KEYID = 0
3,525,365 ready_for_fw is high
3,525,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,160 UART: [idev] Erasing UDS.KEYID = 0
6,029,785 UART: [idev] Sha1 KeyId Algorithm
6,053,130 UART: [idev] --
6,058,586 UART: [ldev] ++
6,059,284 UART: [ldev] CDI.KEYID = 6
6,060,202 UART: [ldev] SUBJECT.KEYID = 5
6,061,369 UART: [ldev] AUTHORITY.KEYID = 7
6,062,550 UART: [ldev] FE.KEYID = 1
6,101,822 UART: [ldev] Erasing FE.KEYID = 1
8,608,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,365 UART: [ldev] --
10,415,116 UART: [fwproc] Wait for Commands...
10,416,718 UART: [fwproc] Recv command 0x46574c44
10,418,974 UART: [fwproc] Recv'd Img size: 114168 bytes
13,866,232 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,948 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,600,655 >>> mbox cmd response: success
14,604,199 UART: [afmc] ++
14,604,921 UART: [afmc] CDI.KEYID = 6
14,606,121 UART: [afmc] SUBJECT.KEYID = 7
14,607,569 UART: [afmc] AUTHORITY.KEYID = 5
17,151,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,875,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,054 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,199 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,272 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,160 UART: [afmc] --
18,951,023 UART: [cold-reset] --
18,953,332 UART: [state] Locking Datavault
18,958,294 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,460 UART: [state] Locking ICCM
18,962,817 UART: [exit] Launching FMC @ 0x40000130
18,971,458 UART:
18,971,694 UART: Running Caliptra FMC ...
18,972,795 UART:
18,972,953 UART: [state] CFI Enabled
19,032,832 UART: [fht] FMC Alias Private Key: 7
20,797,175 UART: [art] Extend RT PCRs Done
20,798,402 UART: [art] Lock RT PCRs Done
20,799,949 UART: [art] Populate DV Done
20,805,200 UART: [fht] FMC Alias Private Key: 7
20,806,899 UART: [art] Derive CDI
20,807,637 UART: [art] Store in in slot 0x4
20,864,404 UART: [art] Derive Key Pair
20,865,436 UART: [art] Store priv key in slot 0x5
23,327,857 UART: [art] Derive Key Pair - Done
23,340,856 UART: [art] Signing Cert with AUTHO
23,342,165 UART: RITY.KEYID = 7
25,053,469 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,982 UART: [art] PUB.X = DA54604B992EC90AC3D777187E1B8E6518A3F66CDBC39694BF36690DF5E9E518DBB8FB8AAC339E77A0A621710A5CBAC8
25,062,257 UART: [art] PUB.Y = 608DE8A88031C8D795B8561765DC871F65EC4824D4253F50A648E47F07166098548B2A4E3F251A8BBC460874C938F2AA
25,069,458 UART: [art] SIG.R = AE3512B4F06C5D991E3DDB6730F82EB4855F843E4B631403C0EA2FD19CAFA2D18D1FA09B852A3AE6413ED2981CE5D936
25,076,907 UART: [art] SIG.S = 5C6327A3C88777AD56C90DE7FA98F86FEA5B716123BA53EA466C6A1621D7443103237BD50D679E94481DC0A6D8029D97
26,055,832 UART: Caliptra RT
26,056,543 UART: [state] CFI Enabled
26,222,108 UART: [rt] RT listening for mailbox commands...
26,224,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,255,256 UART: [rt]cmd =0x44504543, len=96
30,613,399 >>> mbox cmd response data (6236 bytes)
30,642,720 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,673,265 UART: [rt]cmd =0x53574545, len=84
30,676,740 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,439,198 ready_for_fw is high
3,439,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,721,198 >>> mbox cmd response: success
18,996,422 UART:
18,996,800 UART: Running Caliptra FMC ...
18,997,914 UART:
18,998,067 UART: [state] CFI Enabled
19,067,435 UART: [fht] FMC Alias Private Key: 7
20,831,103 UART: [art] Extend RT PCRs Done
20,832,466 UART: [art] Lock RT PCRs Done
20,834,180 UART: [art] Populate DV Done
20,839,215 UART: [fht] FMC Alias Private Key: 7
20,840,918 UART: [art] Derive CDI
20,841,735 UART: [art] Store in in slot 0x4
20,899,810 UART: [art] Derive Key Pair
20,900,813 UART: [art] Store priv key in slot 0x5
23,363,719 UART: [art] Derive Key Pair - Done
23,376,886 UART: [art] Signing Cert with AUTHO
23,378,207 UART: RITY.KEYID = 7
25,088,896 UART: [art] Erasing AUTHORITY.KEYID = 7
25,090,412 UART: [art] PUB.X = ACEBCF1B1D5F6AFE07825F65672EC675D4A68D5A47F21886F8A1D1CE6FCDD5B5661715A4B455FBD8264D2CC7CD556AD6
25,097,707 UART: [art] PUB.Y = 1D613DF56114CEB0C6F66AF5A7D81F72F368E8D54DA146DBB9C18CA9F9619CEE1D7A269F5CA85C412CD6278B72997AFF
25,104,988 UART: [art] SIG.R = 2CF8DB7E365C648B656DDC8D233F095ABA9A313D6C4BA4A0C7DE84F9FE22193EE4ED0052CD364EB70E864DD2AC098A7C
25,112,373 UART: [art] SIG.S = DFC143915766E76FA5888F5D6C07ADC5FC321A0B21448BC78092A777832E050D3D33285693E2F4F6DF877F193E87E39E
26,091,575 UART: Caliptra RT
26,092,274 UART: [state] CFI Enabled
26,256,891 UART: [rt] RT listening for mailbox commands...
26,258,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,289,935 UART: [rt]cmd =0x44504543, len=96
30,667,797 >>> mbox cmd response data (6236 bytes)
30,697,205 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,727,549 UART: [rt]cmd =0x53574545, len=84
30,730,947 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,650 writing to cptra_bootfsm_go
192,920 UART:
193,305 UART: Running Caliptra ROM ...
194,421 UART:
604,052 UART: [state] CFI Enabled
617,781 UART: [state] LifecycleState = Unprovisioned
620,137 UART: [state] DebugLocked = No
622,717 UART: [state] WD Timer not started. Device not locked for debugging
626,967 UART: [kat] SHA2-256
816,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,612 UART: [kat] ++
828,154 UART: [kat] sha1
839,955 UART: [kat] SHA2-256
842,964 UART: [kat] SHA2-384
848,176 UART: [kat] SHA2-512-ACC
850,755 UART: [kat] ECC-384
3,294,273 UART: [kat] HMAC-384Kdf
3,307,367 UART: [kat] LMS
3,839,191 UART: [kat] --
3,841,833 UART: [cold-reset] ++
3,843,690 UART: [fht] FHT @ 0x50003400
3,854,959 UART: [idev] ++
3,855,700 UART: [idev] CDI.KEYID = 6
3,856,590 UART: [idev] SUBJECT.KEYID = 7
3,857,712 UART: [idev] UDS.KEYID = 0
3,858,706 ready_for_fw is high
3,858,892 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,142 UART: [idev] Erasing UDS.KEYID = 0
6,335,612 UART: [idev] Sha1 KeyId Algorithm
6,358,303 UART: [idev] --
6,362,511 UART: [ldev] ++
6,363,187 UART: [ldev] CDI.KEYID = 6
6,364,123 UART: [ldev] SUBJECT.KEYID = 5
6,365,279 UART: [ldev] AUTHORITY.KEYID = 7
6,366,506 UART: [ldev] FE.KEYID = 1
6,379,205 UART: [ldev] Erasing FE.KEYID = 1
8,858,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,055 UART: [ldev] --
10,650,540 UART: [fwproc] Wait for Commands...
10,652,695 UART: [fwproc] Recv command 0x46574c44
10,655,018 UART: [fwproc] Recv'd Img size: 114168 bytes
14,097,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,912 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,076 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,684 >>> mbox cmd response: success
14,834,339 UART: [afmc] ++
14,835,047 UART: [afmc] CDI.KEYID = 6
14,836,232 UART: [afmc] SUBJECT.KEYID = 7
14,837,663 UART: [afmc] AUTHORITY.KEYID = 5
17,341,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,545 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,654 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,826 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,818 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,143 UART: [afmc] --
19,137,992 UART: [cold-reset] --
19,141,754 UART: [state] Locking Datavault
19,146,637 UART: [state] Locking PCR0, PCR1 and PCR31
19,148,828 UART: [state] Locking ICCM
19,151,504 UART: [exit] Launching FMC @ 0x40000130
19,160,182 UART:
19,160,414 UART: Running Caliptra FMC ...
19,161,514 UART:
19,161,673 UART: [state] CFI Enabled
19,169,614 UART: [fht] FMC Alias Private Key: 7
20,926,169 UART: [art] Extend RT PCRs Done
20,927,392 UART: [art] Lock RT PCRs Done
20,928,747 UART: [art] Populate DV Done
20,934,159 UART: [fht] FMC Alias Private Key: 7
20,935,748 UART: [art] Derive CDI
20,936,580 UART: [art] Store in in slot 0x4
20,978,905 UART: [art] Derive Key Pair
20,979,940 UART: [art] Store priv key in slot 0x5
23,407,698 UART: [art] Derive Key Pair - Done
23,420,904 UART: [art] Signing Cert with AUTHO
23,422,207 UART: RITY.KEYID = 7
25,127,648 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,285 UART: [art] PUB.X = 8963986FAB25B0031629BAD813DCB6D4585747D771CF06EB056DA4DFC693D406739D622B06AFC9C304B58AA787599E69
25,136,417 UART: [art] PUB.Y = 18D2EEFFBD90F3C5CB466F6F5EAAA8C95EAD2727E63938F44131A77743C1F635F8A70325C54CA3D5273BFD6BB90D759A
25,143,711 UART: [art] SIG.R = F042F6699B36AEDD73C4BC145074533331BE31A5A76CE57EE2630974E1AE1F0AE426F0D11E0CEFAD1D191491897ECB03
25,151,105 UART: [art] SIG.S = 9BCE3959F8E90B4C15C7E4D1FDDD1F74ED2413413C3B68830531A86D2A325475B1C2C5D9792D839EE11FE942EE9533D1
26,129,392 UART: Caliptra RT
26,130,100 UART: [state] CFI Enabled
26,246,357 UART: [rt] RT listening for mailbox commands...
26,248,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,279,578 UART: [rt]cmd =0x44504543, len=96
30,561,368 >>> mbox cmd response data (6236 bytes)
30,590,842 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,621,471 UART: [rt]cmd =0x53574545, len=84
30,625,242 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,596 writing to cptra_bootfsm_go
3,757,528 ready_for_fw is high
3,757,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,946,473 >>> mbox cmd response: success
19,198,514 UART:
19,198,926 UART: Running Caliptra FMC ...
19,200,063 UART:
19,200,232 UART: [state] CFI Enabled
19,208,242 UART: [fht] FMC Alias Private Key: 7
20,964,837 UART: [art] Extend RT PCRs Done
20,966,055 UART: [art] Lock RT PCRs Done
20,967,788 UART: [art] Populate DV Done
20,973,257 UART: [fht] FMC Alias Private Key: 7
20,974,739 UART: [art] Derive CDI
20,975,557 UART: [art] Store in in slot 0x4
21,017,999 UART: [art] Derive Key Pair
21,019,041 UART: [art] Store priv key in slot 0x5
23,445,870 UART: [art] Derive Key Pair - Done
23,458,658 UART: [art] Signing Cert with AUTHO
23,459,989 UART: RITY.KEYID = 7
25,165,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,136 UART: [art] PUB.X = E732CC29B53364B521B81198CE9532624FB9400A4880EFC2D74593D4A21A52DC22A186F4A70A20C79FC3B0D87581EBF7
25,174,378 UART: [art] PUB.Y = F6178A87EA223D92DE21D203AC1E2B7DA8E7C769E844CA9A0E65C198A30CE273277F57DE4D66BB3614D4AFD4BC9A0183
25,181,668 UART: [art] SIG.R = B968F71F1501BBEE53CF317650E30954D6CA37AC18F83D6A7168C026F049486B8800708F0438BF7883CB9B9AE49E3C9A
25,189,065 UART: [art] SIG.S = DC48413B1C60C9E8B65FFB6FF7F0FD099B7E35FA29C4DA795BF0B87595E1D84DFBBCCB3AD43913130538E9A26168873C
26,167,624 UART: Caliptra RT
26,168,341 UART: [state] CFI Enabled
26,286,322 UART: [rt] RT listening for mailbox commands...
26,288,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,319,359 UART: [rt]cmd =0x44504543, len=96
30,601,762 >>> mbox cmd response data (6236 bytes)
30,631,020 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,661,646 UART: [rt]cmd =0x53574545, len=84
30,665,123 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,069 UART: [kat] SHA2-256
882,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,115 UART: [kat] ++
886,267 UART: [kat] sha1
890,523 UART: [kat] SHA2-256
892,461 UART: [kat] SHA2-384
895,080 UART: [kat] SHA2-512-ACC
896,981 UART: [kat] ECC-384
902,498 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,475,743 UART: [cold-reset] ++
1,476,259 UART: [fht] Storing FHT @ 0x50003400
1,478,886 UART: [idev] ++
1,479,054 UART: [idev] CDI.KEYID = 6
1,479,414 UART: [idev] SUBJECT.KEYID = 7
1,479,838 UART: [idev] UDS.KEYID = 0
1,480,183 ready_for_fw is high
1,480,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,848 UART: [idev] Erasing UDS.KEYID = 0
1,504,150 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,786 UART: [idev] --
1,513,675 UART: [ldev] ++
1,513,843 UART: [ldev] CDI.KEYID = 6
1,514,206 UART: [ldev] SUBJECT.KEYID = 5
1,514,632 UART: [ldev] AUTHORITY.KEYID = 7
1,515,095 UART: [ldev] FE.KEYID = 1
1,520,217 UART: [ldev] Erasing FE.KEYID = 1
1,544,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,636 UART: [ldev] --
1,583,953 UART: [fwproc] Waiting for Commands...
1,584,570 UART: [fwproc] Received command 0x46574c44
1,585,361 UART: [fwproc] Received Image of size 114168 bytes
2,881,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,740 >>> mbox cmd response: success
3,075,778 UART: [afmc] ++
3,075,946 UART: [afmc] CDI.KEYID = 6
3,076,308 UART: [afmc] SUBJECT.KEYID = 7
3,076,733 UART: [afmc] AUTHORITY.KEYID = 5
3,111,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,692 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,472 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,200 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,085 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,775 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,546 UART: [afmc] --
3,154,518 UART: [cold-reset] --
3,155,358 UART: [state] Locking Datavault
3,156,331 UART: [state] Locking PCR0, PCR1 and PCR31
3,156,935 UART: [state] Locking ICCM
3,157,397 UART: [exit] Launching FMC @ 0x40000130
3,162,726 UART:
3,162,742 UART: Running Caliptra FMC ...
3,163,150 UART:
3,163,204 UART: [state] CFI Enabled
3,173,713 UART: [fht] FMC Alias Private Key: 7
3,281,064 UART: [art] Extend RT PCRs Done
3,281,492 UART: [art] Lock RT PCRs Done
3,283,042 UART: [art] Populate DV Done
3,291,301 UART: [fht] FMC Alias Private Key: 7
3,292,315 UART: [art] Derive CDI
3,292,595 UART: [art] Store in in slot 0x4
3,377,808 UART: [art] Derive Key Pair
3,378,168 UART: [art] Store priv key in slot 0x5
3,391,376 UART: [art] Derive Key Pair - Done
3,406,252 UART: [art] Signing Cert with AUTHO
3,406,732 UART: RITY.KEYID = 7
3,421,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,422,303 UART: [art] PUB.X = 7697D720E45ECDF84D46E8D58A3C4C120075F9D5D08A55F33227765E5F3CD820C07CF6CF0E53B9DCF91BFB66BCC2DAF0
3,429,066 UART: [art] PUB.Y = D9B8D1D0DDA36C6A4A2D17337FECB61B4F7EB38C9F25D9CFDED0055B540E0FB881BEA149321F42FDC43098D8FA1E03D0
3,436,028 UART: [art] SIG.R = F9DF425081DB43AA7583AE01CE5663B258603C48A72AABDEFE298E20A85D750451BFF31FCAF2BED73ADC56A49A95827E
3,442,810 UART: [art] SIG.S = E1AF84F3317592C047236814848EAA39D9581EF8F1D87F037E78656D2139A5AD5D71659DEB6B95CDCFA7E6A553534DBA
3,466,838 UART: Caliptra RT
3,467,091 UART: [state] CFI Enabled
3,575,049 UART: [rt] RT listening for mailbox commands...
3,575,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,115 UART: [rt]cmd =0x44504543, len=96
3,786,389 >>> mbox cmd response data (6236 bytes)
3,786,390 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,409 UART: [rt]cmd =0x53574545, len=84
3,819,482 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,957 ready_for_fw is high
1,362,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,864 >>> mbox cmd response: success
2,988,634 UART:
2,988,650 UART: Running Caliptra FMC ...
2,989,058 UART:
2,989,112 UART: [state] CFI Enabled
2,999,559 UART: [fht] FMC Alias Private Key: 7
3,107,744 UART: [art] Extend RT PCRs Done
3,108,172 UART: [art] Lock RT PCRs Done
3,109,592 UART: [art] Populate DV Done
3,117,769 UART: [fht] FMC Alias Private Key: 7
3,118,721 UART: [art] Derive CDI
3,119,001 UART: [art] Store in in slot 0x4
3,204,798 UART: [art] Derive Key Pair
3,205,158 UART: [art] Store priv key in slot 0x5
3,218,346 UART: [art] Derive Key Pair - Done
3,233,319 UART: [art] Signing Cert with AUTHO
3,233,799 UART: RITY.KEYID = 7
3,248,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,416 UART: [art] PUB.X = 405FBAE41B6020AF7D7DFC4CF59A0C44DC7B7A575E19910024BFB9B7EB9FDCC426A5CCAB184EBEFBD960E7A4EF76165C
3,256,191 UART: [art] PUB.Y = 94C67407E3CE7229436971D68F36D83C7F6A3CF7FCA09C41759A19F7AF60110634D681A7871CC798CF04AC4C63DB3FC2
3,263,136 UART: [art] SIG.R = C0F02309AADC886B1702DDCB9686FE5ECBC8B07ACF133D8227F084251065172C00084AE1EB7832FEB3068A55DCDC5CB2
3,269,886 UART: [art] SIG.S = 069EE1ED0CEEC21E65D92482FF3DD5D86584DC6CCA160690444766EA8995EA7C83BA19BF6AFF82959B08F3F7DCD9B90A
3,294,206 UART: Caliptra RT
3,294,459 UART: [state] CFI Enabled
3,401,704 UART: [rt] RT listening for mailbox commands...
3,402,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,932 UART: [rt]cmd =0x44504543, len=96
3,612,709 >>> mbox cmd response data (6236 bytes)
3,612,710 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,629 UART: [rt]cmd =0x53574545, len=84
3,645,720 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,270 UART: [kat] SHA2-256
882,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,316 UART: [kat] ++
886,468 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,449 UART: [kat] SHA2-512-ACC
897,350 UART: [kat] ECC-384
902,963 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,666 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,895 UART: [idev] ++
1,480,063 UART: [idev] CDI.KEYID = 6
1,480,423 UART: [idev] SUBJECT.KEYID = 7
1,480,847 UART: [idev] UDS.KEYID = 0
1,481,192 ready_for_fw is high
1,481,192 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,719 UART: [idev] Erasing UDS.KEYID = 0
1,505,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,325 UART: [idev] --
1,515,368 UART: [ldev] ++
1,515,536 UART: [ldev] CDI.KEYID = 6
1,515,899 UART: [ldev] SUBJECT.KEYID = 5
1,516,325 UART: [ldev] AUTHORITY.KEYID = 7
1,516,788 UART: [ldev] FE.KEYID = 1
1,522,206 UART: [ldev] Erasing FE.KEYID = 1
1,547,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,993 UART: [ldev] --
1,587,348 UART: [fwproc] Waiting for Commands...
1,588,131 UART: [fwproc] Received command 0x46574c44
1,588,922 UART: [fwproc] Received Image of size 114168 bytes
2,885,142 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,230 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,582 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,261 >>> mbox cmd response: success
3,078,463 UART: [afmc] ++
3,078,631 UART: [afmc] CDI.KEYID = 6
3,078,993 UART: [afmc] SUBJECT.KEYID = 7
3,079,418 UART: [afmc] AUTHORITY.KEYID = 5
3,114,199 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,263 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,991 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,876 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,566 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,485 UART: [afmc] --
3,157,559 UART: [cold-reset] --
3,158,433 UART: [state] Locking Datavault
3,159,732 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,336 UART: [state] Locking ICCM
3,160,870 UART: [exit] Launching FMC @ 0x40000130
3,166,199 UART:
3,166,215 UART: Running Caliptra FMC ...
3,166,623 UART:
3,166,766 UART: [state] CFI Enabled
3,177,433 UART: [fht] FMC Alias Private Key: 7
3,285,552 UART: [art] Extend RT PCRs Done
3,285,980 UART: [art] Lock RT PCRs Done
3,287,260 UART: [art] Populate DV Done
3,295,535 UART: [fht] FMC Alias Private Key: 7
3,296,479 UART: [art] Derive CDI
3,296,759 UART: [art] Store in in slot 0x4
3,382,460 UART: [art] Derive Key Pair
3,382,820 UART: [art] Store priv key in slot 0x5
3,395,878 UART: [art] Derive Key Pair - Done
3,410,955 UART: [art] Signing Cert with AUTHO
3,411,435 UART: RITY.KEYID = 7
3,426,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,884 UART: [art] PUB.X = 89E937431E6ADDE72A6F49CBBD1AA6EE322EAC937B9C2AF4092FF1A8DB1D40A57D2406B3100D8BE85F7F4BC0AF48EAE3
3,433,671 UART: [art] PUB.Y = 93024C91CF00F86640569184C1D459ABF570C7A82B6E6A282C072EA4D573937A1BBD22FE06C9D12EA73C161116D09314
3,440,588 UART: [art] SIG.R = C4B62CA8880DE11F4C1A479C64F245BFB2FD542D42B0FD8AF03E045784B44DEECDDF144BB48387295BFB39C0E65083FA
3,447,370 UART: [art] SIG.S = 4ADF31FB368263FE6159041989761D5A810F3C6A4DAAD0796717CFC14D318A8E18DCAC2DF48414DCDB7199EE16B9489F
3,471,313 UART: Caliptra RT
3,471,658 UART: [state] CFI Enabled
3,580,237 UART: [rt] RT listening for mailbox commands...
3,580,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,383 UART: [rt]cmd =0x44504543, len=96
3,791,924 >>> mbox cmd response data (6236 bytes)
3,791,925 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,722 UART: [rt]cmd =0x53574545, len=84
3,825,015 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,074 ready_for_fw is high
1,363,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,827 >>> mbox cmd response: success
2,988,483 UART:
2,988,499 UART: Running Caliptra FMC ...
2,988,907 UART:
2,989,050 UART: [state] CFI Enabled
2,999,793 UART: [fht] FMC Alias Private Key: 7
3,107,738 UART: [art] Extend RT PCRs Done
3,108,166 UART: [art] Lock RT PCRs Done
3,109,814 UART: [art] Populate DV Done
3,118,117 UART: [fht] FMC Alias Private Key: 7
3,119,047 UART: [art] Derive CDI
3,119,327 UART: [art] Store in in slot 0x4
3,204,804 UART: [art] Derive Key Pair
3,205,164 UART: [art] Store priv key in slot 0x5
3,218,690 UART: [art] Derive Key Pair - Done
3,233,241 UART: [art] Signing Cert with AUTHO
3,233,721 UART: RITY.KEYID = 7
3,248,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,622 UART: [art] PUB.X = 11123540B180C6ADAA86746936529A47CB857D3714C23F25B954DC8AF8264C70E5303D7C5223AEC4D16484D87DCD95AB
3,256,392 UART: [art] PUB.Y = 91480C53ADCF335EE3A8AA9487210B6A2752E1C9789670E4145697EB88DE72364E32AB0A1F166D503FDC39BF441B988F
3,263,335 UART: [art] SIG.R = E06D90D8D991899C230D9915680ACA7573430905866C978FED9AA79683468ABCFD2AFC8773F4C3C4990F5D490A7FC46E
3,270,089 UART: [art] SIG.S = 7A4036D40F69A72A1E76F99B8703FA534F0BCEB4C35FF60847101B1CFD82B96D6EC121B03AFB53C97EE56C832F18AC8E
3,294,142 UART: Caliptra RT
3,294,487 UART: [state] CFI Enabled
3,402,168 UART: [rt] RT listening for mailbox commands...
3,402,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,296 UART: [rt]cmd =0x44504543, len=96
3,614,037 >>> mbox cmd response data (6236 bytes)
3,614,038 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,891 UART: [rt]cmd =0x53574545, len=84
3,647,324 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,344 UART: [kat] HMAC-384Kdf
922,992 UART: [kat] LMS
1,171,320 UART: [kat] --
1,172,347 UART: [cold-reset] ++
1,172,895 UART: [fht] FHT @ 0x50003400
1,175,658 UART: [idev] ++
1,175,826 UART: [idev] CDI.KEYID = 6
1,176,186 UART: [idev] SUBJECT.KEYID = 7
1,176,610 UART: [idev] UDS.KEYID = 0
1,176,955 ready_for_fw is high
1,176,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,868 UART: [idev] Erasing UDS.KEYID = 0
1,202,011 UART: [idev] Sha1 KeyId Algorithm
1,210,597 UART: [idev] --
1,211,655 UART: [ldev] ++
1,211,823 UART: [ldev] CDI.KEYID = 6
1,212,186 UART: [ldev] SUBJECT.KEYID = 5
1,212,612 UART: [ldev] AUTHORITY.KEYID = 7
1,213,075 UART: [ldev] FE.KEYID = 1
1,218,171 UART: [ldev] Erasing FE.KEYID = 1
1,244,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,303 UART: [ldev] --
1,283,690 UART: [fwproc] Wait for Commands...
1,284,338 UART: [fwproc] Recv command 0x46574c44
1,285,066 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,862 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,375 >>> mbox cmd response: success
2,774,601 UART: [afmc] ++
2,774,769 UART: [afmc] CDI.KEYID = 6
2,775,131 UART: [afmc] SUBJECT.KEYID = 7
2,775,556 UART: [afmc] AUTHORITY.KEYID = 5
2,812,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,974 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,306 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,198 UART: [afmc] --
2,855,110 UART: [cold-reset] --
2,856,086 UART: [state] Locking Datavault
2,857,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,745 UART: [state] Locking ICCM
2,858,213 UART: [exit] Launching FMC @ 0x40000130
2,863,542 UART:
2,863,558 UART: Running Caliptra FMC ...
2,863,966 UART:
2,864,020 UART: [state] CFI Enabled
2,874,419 UART: [fht] FMC Alias Private Key: 7
2,982,026 UART: [art] Extend RT PCRs Done
2,982,454 UART: [art] Lock RT PCRs Done
2,983,968 UART: [art] Populate DV Done
2,992,071 UART: [fht] FMC Alias Private Key: 7
2,993,101 UART: [art] Derive CDI
2,993,381 UART: [art] Store in in slot 0x4
3,079,104 UART: [art] Derive Key Pair
3,079,464 UART: [art] Store priv key in slot 0x5
3,093,012 UART: [art] Derive Key Pair - Done
3,107,767 UART: [art] Signing Cert with AUTHO
3,108,247 UART: RITY.KEYID = 7
3,123,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,840 UART: [art] PUB.X = 4A6FCE3C9CDA5309EC42741B4D961C03730C3B404F5E8BE0AF4C37173030613D105C2E840A42DDCCA115E70C55C08A53
3,130,603 UART: [art] PUB.Y = 9A2848B2FE6C203F12D80C4A5354E0070166D132867990E7818ED4495F699501F63B1FCCDE1D3201C8374174520E9BCB
3,137,529 UART: [art] SIG.R = 59A5B7553C93ADEDE65E9A99BFC482971DEB3DCBFF40B850769F42020A9F50345660189C716C90AF915E96AC40713FF4
3,144,299 UART: [art] SIG.S = 80BD49D0D9A78A6E309A5CB06CE71ED20FE7EA587B46BB4982C230F5A85C46639947908EB9DA43C5F4559223B26FDD49
3,167,875 UART: Caliptra RT
3,168,128 UART: [state] CFI Enabled
3,276,961 UART: [rt] RT listening for mailbox commands...
3,277,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,919 UART: [rt]cmd =0x44504543, len=96
3,488,495 >>> mbox cmd response data (6236 bytes)
3,488,496 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,317 UART: [rt]cmd =0x53574545, len=84
3,521,142 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,359 ready_for_fw is high
1,060,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,346 >>> mbox cmd response: success
2,688,052 UART:
2,688,068 UART: Running Caliptra FMC ...
2,688,476 UART:
2,688,530 UART: [state] CFI Enabled
2,699,175 UART: [fht] FMC Alias Private Key: 7
2,806,970 UART: [art] Extend RT PCRs Done
2,807,398 UART: [art] Lock RT PCRs Done
2,808,998 UART: [art] Populate DV Done
2,817,481 UART: [fht] FMC Alias Private Key: 7
2,818,649 UART: [art] Derive CDI
2,818,929 UART: [art] Store in in slot 0x4
2,904,844 UART: [art] Derive Key Pair
2,905,204 UART: [art] Store priv key in slot 0x5
2,918,508 UART: [art] Derive Key Pair - Done
2,932,948 UART: [art] Signing Cert with AUTHO
2,933,428 UART: RITY.KEYID = 7
2,948,434 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,199 UART: [art] PUB.X = EEBE6953E43E3EC94A7D2241E021D4581C5939EC6ADB01EAE8BCA7D69F43D7B263D7DCBD59D61F5C4064C0194172E78A
2,955,982 UART: [art] PUB.Y = FF5F29C84CF15BF22CA6EAD24CCAE6A401CA31BBF87DA4D94104AF607E999CEEAC332E4F32B9072B38620B84C56AE065
2,962,942 UART: [art] SIG.R = 14D2452EF9215AD970697A77CBDD173D513EC1FA2077CC49B05AFA97CC6D4366431B0818EC57939D7FB058B0750A3634
2,969,708 UART: [art] SIG.S = 6A4ABA257C844D3A046E3CDE1C8718E9B4BE329DF37A75CFCBF9DEC68A15A20642C5B41FDBF6ACD3813AF03A2E878944
2,993,367 UART: Caliptra RT
2,993,620 UART: [state] CFI Enabled
3,100,567 UART: [rt] RT listening for mailbox commands...
3,101,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,557 UART: [rt]cmd =0x44504543, len=96
3,311,774 >>> mbox cmd response data (6236 bytes)
3,311,775 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,341,650 UART: [rt]cmd =0x53574545, len=84
3,344,499 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
893,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,760 UART: [kat] ++
897,912 UART: [kat] sha1
902,264 UART: [kat] SHA2-256
904,204 UART: [kat] SHA2-384
907,001 UART: [kat] SHA2-512-ACC
908,902 UART: [kat] ECC-384
918,909 UART: [kat] HMAC-384Kdf
923,443 UART: [kat] LMS
1,171,771 UART: [kat] --
1,172,500 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,663 UART: [idev] ++
1,175,831 UART: [idev] CDI.KEYID = 6
1,176,191 UART: [idev] SUBJECT.KEYID = 7
1,176,615 UART: [idev] UDS.KEYID = 0
1,176,960 ready_for_fw is high
1,176,960 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,523 UART: [idev] Erasing UDS.KEYID = 0
1,202,266 UART: [idev] Sha1 KeyId Algorithm
1,210,664 UART: [idev] --
1,211,760 UART: [ldev] ++
1,211,928 UART: [ldev] CDI.KEYID = 6
1,212,291 UART: [ldev] SUBJECT.KEYID = 5
1,212,717 UART: [ldev] AUTHORITY.KEYID = 7
1,213,180 UART: [ldev] FE.KEYID = 1
1,218,370 UART: [ldev] Erasing FE.KEYID = 1
1,245,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,292 UART: [ldev] --
1,284,587 UART: [fwproc] Wait for Commands...
1,285,277 UART: [fwproc] Recv command 0x46574c44
1,286,005 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,066 >>> mbox cmd response: success
2,776,328 UART: [afmc] ++
2,776,496 UART: [afmc] CDI.KEYID = 6
2,776,858 UART: [afmc] SUBJECT.KEYID = 7
2,777,283 UART: [afmc] AUTHORITY.KEYID = 5
2,812,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,959 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,844 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,563 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,447 UART: [afmc] --
2,855,429 UART: [cold-reset] --
2,856,317 UART: [state] Locking Datavault
2,857,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,364 UART: [state] Locking ICCM
2,858,928 UART: [exit] Launching FMC @ 0x40000130
2,864,257 UART:
2,864,273 UART: Running Caliptra FMC ...
2,864,681 UART:
2,864,824 UART: [state] CFI Enabled
2,875,669 UART: [fht] FMC Alias Private Key: 7
2,983,868 UART: [art] Extend RT PCRs Done
2,984,296 UART: [art] Lock RT PCRs Done
2,985,650 UART: [art] Populate DV Done
2,993,683 UART: [fht] FMC Alias Private Key: 7
2,994,809 UART: [art] Derive CDI
2,995,089 UART: [art] Store in in slot 0x4
3,080,954 UART: [art] Derive Key Pair
3,081,314 UART: [art] Store priv key in slot 0x5
3,094,336 UART: [art] Derive Key Pair - Done
3,108,981 UART: [art] Signing Cert with AUTHO
3,109,461 UART: RITY.KEYID = 7
3,124,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,558 UART: [art] PUB.X = 5159993305524E74547F12E405711902EA145B2BC547D981B716B3C491EDAB39A80D699FF5667193A3EE3F842BC38295
3,132,306 UART: [art] PUB.Y = F9B2DD911DAFFF240291191DA707AC366149D898241BCC47DD0014CF42AEA1F523C310B898A7FFA5040F424E9E7D3F71
3,139,232 UART: [art] SIG.R = 890C6EFA4AED5C629204AB7B4E0C482B0D2B12A5186CE572FC444ED51574F5313F737510417F9FCB7B7A2249934E9DD2
3,145,996 UART: [art] SIG.S = 5990453AA2F7308BDE1BB0CC4FE7E94291AC2830BEFAF3D137FFB81B4F1893E6DA7EFE91C841729622F9C0C8F14DDF0C
3,169,830 UART: Caliptra RT
3,170,175 UART: [state] CFI Enabled
3,278,162 UART: [rt] RT listening for mailbox commands...
3,278,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,194 UART: [rt]cmd =0x44504543, len=96
3,490,005 >>> mbox cmd response data (6236 bytes)
3,490,006 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,045 UART: [rt]cmd =0x53574545, len=84
3,523,638 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,132 ready_for_fw is high
1,061,132 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,245 >>> mbox cmd response: success
2,687,017 UART:
2,687,033 UART: Running Caliptra FMC ...
2,687,441 UART:
2,687,584 UART: [state] CFI Enabled
2,698,115 UART: [fht] FMC Alias Private Key: 7
2,806,032 UART: [art] Extend RT PCRs Done
2,806,460 UART: [art] Lock RT PCRs Done
2,807,932 UART: [art] Populate DV Done
2,816,237 UART: [fht] FMC Alias Private Key: 7
2,817,205 UART: [art] Derive CDI
2,817,485 UART: [art] Store in in slot 0x4
2,902,958 UART: [art] Derive Key Pair
2,903,318 UART: [art] Store priv key in slot 0x5
2,917,324 UART: [art] Derive Key Pair - Done
2,932,225 UART: [art] Signing Cert with AUTHO
2,932,705 UART: RITY.KEYID = 7
2,947,957 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,722 UART: [art] PUB.X = 60CA3F17E43086F965FFC1EF01BACAF0AE2772EBFF12B68F163FAE0EE0427E3C2374BA20CBCD9B0F3CA7E432EE88F338
2,955,509 UART: [art] PUB.Y = 3B4FB0E9900F48CFD353698379A0711F47310821E31073B0BAC17ACC68287862DF56C4A5530505F35DC739EA41FF6A16
2,962,445 UART: [art] SIG.R = 034452CC08AD9619222C3A9EC5600E5C1DB4BF780D4DB143986CC80CB31A62B3A2550357D1CDF04188CF5C6A3B064F30
2,969,200 UART: [art] SIG.S = 1B3F658A10E1B62CB0433B5EEC8BB0591A870003436C0AF6593B7A4E2D8105E23804954BFDF7CA1B8B301047D0C2F14D
2,992,551 UART: Caliptra RT
2,992,896 UART: [state] CFI Enabled
3,101,857 UART: [rt] RT listening for mailbox commands...
3,102,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,851 UART: [rt]cmd =0x44504543, len=96
3,313,654 >>> mbox cmd response data (6236 bytes)
3,313,655 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,343,766 UART: [rt]cmd =0x53574545, len=84
3,347,209 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,072 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 ready_for_fw is high
1,174,605 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,198,965 UART: [idev] Sha1 KeyId Algorithm
1,207,811 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,828 UART: [ldev] Erasing FE.KEYID = 1
1,241,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,582 UART: [fwproc] Wait for Commands...
1,282,313 UART: [fwproc] Recv command 0x46574c44
1,283,046 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,319 >>> mbox cmd response: success
2,771,360 UART: [afmc] ++
2,771,528 UART: [afmc] CDI.KEYID = 6
2,771,891 UART: [afmc] SUBJECT.KEYID = 7
2,772,317 UART: [afmc] AUTHORITY.KEYID = 5
2,808,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,589 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,318 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,201 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,920 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,831 UART: [afmc] --
2,851,917 UART: [cold-reset] --
2,852,721 UART: [state] Locking Datavault
2,853,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,356 UART: [state] Locking ICCM
2,854,956 UART: [exit] Launching FMC @ 0x40000130
2,860,285 UART:
2,860,301 UART: Running Caliptra FMC ...
2,860,709 UART:
2,860,763 UART: [state] CFI Enabled
2,871,214 UART: [fht] FMC Alias Private Key: 7
2,979,721 UART: [art] Extend RT PCRs Done
2,980,149 UART: [art] Lock RT PCRs Done
2,981,441 UART: [art] Populate DV Done
2,989,502 UART: [fht] FMC Alias Private Key: 7
2,990,546 UART: [art] Derive CDI
2,990,826 UART: [art] Store in in slot 0x4
3,076,681 UART: [art] Derive Key Pair
3,077,041 UART: [art] Store priv key in slot 0x5
3,090,125 UART: [art] Derive Key Pair - Done
3,105,190 UART: [art] Signing Cert with AUTHO
3,105,670 UART: RITY.KEYID = 7
3,120,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,503 UART: [art] PUB.X = B4033028A66BB16A5EB0DCEA64E509C324901D639358AE0CD8AEAA122180DCB2F3509ABCCE93E3BABBA438A0F830E7DE
3,128,286 UART: [art] PUB.Y = CAE68824710856EE09E370AF58021F8B70A2AEA40A835BF64146C952CD00FFD1028A25AFE18490F8739D843D51CAEE23
3,135,205 UART: [art] SIG.R = EC90A47B64554B17711EC90BE9518AFD3789538ADA8F1EFCCDF8E9793E6C6506CBD4F7342CB5F1F608E5E10FD6C176DA
3,141,981 UART: [art] SIG.S = 58C7144E14891BC91B1FA1B1268E53F5BAF765184D68395772247DFE3E6BB600986D31DCD6D5281435CE7D43C6AC196F
3,165,572 UART: Caliptra RT
3,165,825 UART: [state] CFI Enabled
3,274,528 UART: [rt] RT listening for mailbox commands...
3,275,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,556 UART: [rt]cmd =0x44504543, len=96
3,485,636 >>> mbox cmd response data (6236 bytes)
3,485,637 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,515,434 UART: [rt]cmd =0x53574545, len=84
3,518,511 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,770 ready_for_fw is high
1,055,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,201 >>> mbox cmd response: success
2,681,495 UART:
2,681,511 UART: Running Caliptra FMC ...
2,681,919 UART:
2,681,973 UART: [state] CFI Enabled
2,692,640 UART: [fht] FMC Alias Private Key: 7
2,800,639 UART: [art] Extend RT PCRs Done
2,801,067 UART: [art] Lock RT PCRs Done
2,802,437 UART: [art] Populate DV Done
2,810,746 UART: [fht] FMC Alias Private Key: 7
2,811,732 UART: [art] Derive CDI
2,812,012 UART: [art] Store in in slot 0x4
2,897,713 UART: [art] Derive Key Pair
2,898,073 UART: [art] Store priv key in slot 0x5
2,911,281 UART: [art] Derive Key Pair - Done
2,926,152 UART: [art] Signing Cert with AUTHO
2,926,632 UART: RITY.KEYID = 7
2,941,734 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,499 UART: [art] PUB.X = 25A3C3EEF76C4E6A174187F1E9C08BB74F52D6C04C5E05A0CF74D35EC14743609AC983EC710DCE73140B9932EB6F4823
2,949,268 UART: [art] PUB.Y = 31614337ABD02CD51D82C60C114852022CFC84D83173671D9AB13F848D3E791C122990AD65F03E90F49ECAA6A98623CB
2,956,212 UART: [art] SIG.R = 037DED2B5D3369662A88EED1A975E850CF1EA24CEAB4DC55A8C18E94729EFE33D89AA67847B0066C3B976B43B535B713
2,962,986 UART: [art] SIG.S = 126309C682B4660B9283E0244ED39257656B5C19EA17FBA65CD643B06D08D678EF349E3D91C6E86E6418E157A5C26171
2,986,802 UART: Caliptra RT
2,987,055 UART: [state] CFI Enabled
3,095,288 UART: [rt] RT listening for mailbox commands...
3,095,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,642 UART: [rt]cmd =0x44504543, len=96
3,307,218 >>> mbox cmd response data (6236 bytes)
3,307,219 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,266 UART: [rt]cmd =0x53574545, len=84
3,340,541 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,762 UART: [kat] ++
895,914 UART: [kat] sha1
900,142 UART: [kat] SHA2-256
902,082 UART: [kat] SHA2-384
904,961 UART: [kat] SHA2-512-ACC
906,862 UART: [kat] ECC-384
916,705 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,786 UART: [cold-reset] ++
1,171,210 UART: [fht] FHT @ 0x50003400
1,174,032 UART: [idev] ++
1,174,200 UART: [idev] CDI.KEYID = 6
1,174,561 UART: [idev] SUBJECT.KEYID = 7
1,174,986 UART: [idev] UDS.KEYID = 0
1,175,332 ready_for_fw is high
1,175,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,216 UART: [idev] Erasing UDS.KEYID = 0
1,200,070 UART: [idev] Sha1 KeyId Algorithm
1,209,160 UART: [idev] --
1,210,217 UART: [ldev] ++
1,210,385 UART: [ldev] CDI.KEYID = 6
1,210,749 UART: [ldev] SUBJECT.KEYID = 5
1,211,176 UART: [ldev] AUTHORITY.KEYID = 7
1,211,639 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,243,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,599 UART: [fwproc] Wait for Commands...
1,283,410 UART: [fwproc] Recv command 0x46574c44
1,284,143 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,110 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,570 >>> mbox cmd response: success
2,773,667 UART: [afmc] ++
2,773,835 UART: [afmc] CDI.KEYID = 6
2,774,198 UART: [afmc] SUBJECT.KEYID = 7
2,774,624 UART: [afmc] AUTHORITY.KEYID = 5
2,810,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,306 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,035 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,918 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,637 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,334 UART: [afmc] --
2,853,222 UART: [cold-reset] --
2,854,304 UART: [state] Locking Datavault
2,855,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,057 UART: [state] Locking ICCM
2,856,665 UART: [exit] Launching FMC @ 0x40000130
2,861,994 UART:
2,862,010 UART: Running Caliptra FMC ...
2,862,418 UART:
2,862,561 UART: [state] CFI Enabled
2,873,482 UART: [fht] FMC Alias Private Key: 7
2,981,541 UART: [art] Extend RT PCRs Done
2,981,969 UART: [art] Lock RT PCRs Done
2,983,733 UART: [art] Populate DV Done
2,991,878 UART: [fht] FMC Alias Private Key: 7
2,993,004 UART: [art] Derive CDI
2,993,284 UART: [art] Store in in slot 0x4
3,078,941 UART: [art] Derive Key Pair
3,079,301 UART: [art] Store priv key in slot 0x5
3,092,065 UART: [art] Derive Key Pair - Done
3,106,948 UART: [art] Signing Cert with AUTHO
3,107,428 UART: RITY.KEYID = 7
3,122,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,379 UART: [art] PUB.X = CA93CED3D79A27FEF12F958EDD69015F32E796F584397E0BD6FD82908969927017AC543235E88078A6374FB43609A055
3,130,136 UART: [art] PUB.Y = 3F1CA31FD043038E71A2C60CC8CAF09D1FFB81FEF8DC5D7487D6A590108DCB3158D91C072F6DEBDCF17ACB536601FABB
3,137,100 UART: [art] SIG.R = 50ED26EEFDB57E7B8DD46B3053132019F6E391113210A715561CE75E27976EF4499895F8E20FDD4D1332040F6DF834AB
3,143,861 UART: [art] SIG.S = A1DC77A1CB8C5C2C51B1E964B12F3C1F6F2CF561CC99E44FDCDE38DE4FB96C1B35CBBD32D121EDA770C33857C63AAC0E
3,167,139 UART: Caliptra RT
3,167,484 UART: [state] CFI Enabled
3,276,043 UART: [rt] RT listening for mailbox commands...
3,276,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,187 UART: [rt]cmd =0x44504543, len=96
3,488,311 >>> mbox cmd response data (6236 bytes)
3,488,312 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,518,081 UART: [rt]cmd =0x53574545, len=84
3,521,152 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,349 ready_for_fw is high
1,056,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,914 >>> mbox cmd response: success
2,681,880 UART:
2,681,896 UART: Running Caliptra FMC ...
2,682,304 UART:
2,682,447 UART: [state] CFI Enabled
2,693,024 UART: [fht] FMC Alias Private Key: 7
2,801,371 UART: [art] Extend RT PCRs Done
2,801,799 UART: [art] Lock RT PCRs Done
2,803,367 UART: [art] Populate DV Done
2,811,866 UART: [fht] FMC Alias Private Key: 7
2,812,862 UART: [art] Derive CDI
2,813,142 UART: [art] Store in in slot 0x4
2,898,851 UART: [art] Derive Key Pair
2,899,211 UART: [art] Store priv key in slot 0x5
2,912,999 UART: [art] Derive Key Pair - Done
2,928,030 UART: [art] Signing Cert with AUTHO
2,928,510 UART: RITY.KEYID = 7
2,943,604 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,369 UART: [art] PUB.X = 4B6F652150A9F383527D99EC2E741457CA743A92EC6FDF3495D0E61FCF4D3D1D11B25680B33976B2E54AB4D6A3C28805
2,951,140 UART: [art] PUB.Y = EE4F7FF4BA8E0319D4E75CA6C9A034839283834390EB2843019659A4EACC38B38FF792673B36664E47167C319B71B34E
2,958,082 UART: [art] SIG.R = C82A50E420EE615C17B813E35D30691B3946B773231365CFE0983D9A398B5FCDAF499D903F514284EE357303ED1FECF9
2,964,851 UART: [art] SIG.S = 436E6A3BDF909E44CC75F0527393F5A460D180C6192885B34F7B179FB5AE72A8D3CB46085237FC95D35EE9232A1C2732
2,988,549 UART: Caliptra RT
2,988,894 UART: [state] CFI Enabled
3,095,739 UART: [rt] RT listening for mailbox commands...
3,096,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,161 UART: [rt]cmd =0x44504543, len=96
3,306,386 >>> mbox cmd response data (6236 bytes)
3,306,387 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,262 UART: [rt]cmd =0x53574545, len=84
3,339,439 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,101 UART:
192,478 UART: Running Caliptra ROM ...
193,660 UART:
193,811 UART: [state] CFI Enabled
263,558 UART: [state] LifecycleState = Unprovisioned
265,546 UART: [state] DebugLocked = No
266,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,948 UART: [kat] SHA2-256
441,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,124 UART: [kat] ++
452,721 UART: [kat] sha1
464,729 UART: [kat] SHA2-256
467,383 UART: [kat] SHA2-384
471,519 UART: [kat] SHA2-512-ACC
473,877 UART: [kat] ECC-384
2,769,378 UART: [kat] HMAC-384Kdf
2,781,771 UART: [kat] LMS
3,972,128 UART: [kat] --
3,977,270 UART: [cold-reset] ++
3,978,485 UART: [fht] Storing FHT @ 0x50003400
3,990,022 UART: [idev] ++
3,990,654 UART: [idev] CDI.KEYID = 6
3,991,735 UART: [idev] SUBJECT.KEYID = 7
3,992,833 UART: [idev] UDS.KEYID = 0
3,993,838 ready_for_fw is high
3,994,040 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,137,248 UART: [idev] Erasing UDS.KEYID = 0
7,333,083 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,284 UART: [idev] --
7,360,357 UART: [ldev] ++
7,360,968 UART: [ldev] CDI.KEYID = 6
7,361,898 UART: [ldev] SUBJECT.KEYID = 5
7,363,098 UART: [ldev] AUTHORITY.KEYID = 7
7,364,376 UART: [ldev] FE.KEYID = 1
7,408,577 UART: [ldev] Erasing FE.KEYID = 1
10,741,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,034,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,048,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,063,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,638 UART: [ldev] --
13,100,894 UART: [fwproc] Waiting for Commands...
13,102,761 UART: [fwproc] Received command 0x46574c44
13,104,932 UART: [fwproc] Received Image of size 113844 bytes
17,154,928 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,230,143 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,299,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,614,604 >>> mbox cmd response: success
17,619,198 UART: [afmc] ++
17,619,807 UART: [afmc] CDI.KEYID = 6
17,620,711 UART: [afmc] SUBJECT.KEYID = 7
17,621,982 UART: [afmc] AUTHORITY.KEYID = 5
20,991,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,292,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,294,999 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,309,398 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,324,259 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,338,688 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,360,550 UART: [afmc] --
23,364,891 UART: [cold-reset] --
23,368,372 UART: [state] Locking Datavault
23,373,788 UART: [state] Locking PCR0, PCR1 and PCR31
23,375,534 UART: [state] Locking ICCM
23,376,623 UART: [exit] Launching FMC @ 0x40000130
23,385,012 UART:
23,385,251 UART: Running Caliptra FMC ...
23,386,270 UART:
23,386,408 UART: [state] CFI Enabled
23,451,929 UART: [fht] FMC Alias Private Key: 7
25,790,395 UART: [art] Extend RT PCRs Done
25,791,638 UART: [art] Lock RT PCRs Done
25,793,236 UART: [art] Populate DV Done
25,798,641 UART: [fht] FMC Alias Private Key: 7
25,800,252 UART: [art] Derive CDI
25,800,982 UART: [art] Store in in slot 0x4
25,861,108 UART: [art] Derive Key Pair
25,862,139 UART: [art] Store priv key in slot 0x5
29,155,251 UART: [art] Derive Key Pair - Done
29,168,512 UART: [art] Signing Cert with AUTHO
29,169,803 UART: RITY.KEYID = 7
31,456,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,433 UART: [art] PUB.X = 76576BC8F2DE7387C6DDF2F5823A4E28812201948F97F3572D99360B1E4D7A31852141F7BF1BEEDBA2B32FF06DE79C84
31,465,691 UART: [art] PUB.Y = A362A47A3F2511FBB9F83E03D9D106CE6DB4A30C23A5BD90B21AA63BADF873B371E01573484D3CA2CDE0D00E7B1EFA45
31,472,993 UART: [art] SIG.R = D11E071E6911DFC5BC7F34CD4823023D533FACB4D8EC070521A733CA94AD182EA0B221F40A3720FC594D8D68F284A870
31,480,356 UART: [art] SIG.S = 7C7A90083A49DA5B951DAC408DFEF072FFBE69ECAFAD030869F6F40E7FBFA43EA552886CC4095E5408DFA29EC73C22D2
32,785,441 UART: Caliptra RT
32,786,173 UART: [state] CFI Enabled
32,949,131 UART: [rt] RT listening for mailbox commands...
32,951,023 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,981,934 UART: [rt]cmd =0x53574545, len=84
32,985,199 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,804,768 ready_for_fw is high
3,805,159 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,886,891 >>> mbox cmd response: success
23,590,785 UART:
23,591,165 UART: Running Caliptra FMC ...
23,592,353 UART:
23,592,516 UART: [state] CFI Enabled
23,657,493 UART: [fht] FMC Alias Private Key: 7
25,994,877 UART: [art] Extend RT PCRs Done
25,996,103 UART: [art] Lock RT PCRs Done
25,997,968 UART: [art] Populate DV Done
26,003,448 UART: [fht] FMC Alias Private Key: 7
26,005,106 UART: [art] Derive CDI
26,005,928 UART: [art] Store in in slot 0x4
26,065,303 UART: [art] Derive Key Pair
26,066,342 UART: [art] Store priv key in slot 0x5
29,359,319 UART: [art] Derive Key Pair - Done
29,372,597 UART: [art] Signing Cert with AUTHO
29,373,895 UART: RITY.KEYID = 7
31,659,861 UART: [art] Erasing AUTHORITY.KEYID = 7
31,661,370 UART: [art] PUB.X = FE6FAA41EE9CA9D7FD00D747DA4FE34C4183363C1674288075B57576B7CBA7C19C32B09DF93793EC06987B5B8CBAAC47
31,668,639 UART: [art] PUB.Y = A27B1455A09D2AEC360795858190BDB180D5BB8D4A941AF8A67EAFB17CFDAAF338980FBF6C3EE1C4CC47B7AD2967A4BE
31,675,900 UART: [art] SIG.R = 005224C113634C44C3661E31ADFB5C9505E03DC1A947140F4D20E516CA4AE22362F7D5214AE9D8A02F1C43717C981235
31,683,271 UART: [art] SIG.S = 1175CC1D8C620AA25468CD527AC67868347AC54E0C8A76A3D4BE73B08ED835A351F66D37549A5832785D31961383C6C7
32,988,340 UART: Caliptra RT
32,989,055 UART: [state] CFI Enabled
33,150,668 UART: [rt] RT listening for mailbox commands...
33,152,546 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,183,472 UART: [rt]cmd =0x53574545, len=84
33,187,381 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,432 UART:
192,801 UART: Running Caliptra ROM ...
193,901 UART:
603,551 UART: [state] CFI Enabled
615,085 UART: [state] LifecycleState = Unprovisioned
616,966 UART: [state] DebugLocked = No
618,771 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,196 UART: [kat] SHA2-256
792,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,469 UART: [kat] ++
803,915 UART: [kat] sha1
816,065 UART: [kat] SHA2-256
818,729 UART: [kat] SHA2-384
823,932 UART: [kat] SHA2-512-ACC
826,298 UART: [kat] ECC-384
3,111,140 UART: [kat] HMAC-384Kdf
3,123,019 UART: [kat] LMS
4,313,142 UART: [kat] --
4,317,440 UART: [cold-reset] ++
4,319,162 UART: [fht] Storing FHT @ 0x50003400
4,330,433 UART: [idev] ++
4,330,999 UART: [idev] CDI.KEYID = 6
4,331,954 UART: [idev] SUBJECT.KEYID = 7
4,333,197 UART: [idev] UDS.KEYID = 0
4,334,178 ready_for_fw is high
4,334,386 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,382 UART: [idev] Erasing UDS.KEYID = 0
7,620,708 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,452 UART: [idev] --
7,646,163 UART: [ldev] ++
7,646,743 UART: [ldev] CDI.KEYID = 6
7,647,673 UART: [ldev] SUBJECT.KEYID = 5
7,648,883 UART: [ldev] AUTHORITY.KEYID = 7
7,650,169 UART: [ldev] FE.KEYID = 1
7,661,679 UART: [ldev] Erasing FE.KEYID = 1
10,950,019 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,262 UART: [ldev] --
13,312,540 UART: [fwproc] Waiting for Commands...
13,315,622 UART: [fwproc] Received command 0x46574c44
13,317,859 UART: [fwproc] Received Image of size 113844 bytes
17,365,838 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,248 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,130 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,828,851 >>> mbox cmd response: success
17,832,340 UART: [afmc] ++
17,832,940 UART: [afmc] CDI.KEYID = 6
17,833,854 UART: [afmc] SUBJECT.KEYID = 7
17,835,125 UART: [afmc] AUTHORITY.KEYID = 5
21,145,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,441,313 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,443,570 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,956 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,795 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,487,231 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,508,374 UART: [afmc] --
23,512,298 UART: [cold-reset] --
23,516,593 UART: [state] Locking Datavault
23,522,920 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,682 UART: [state] Locking ICCM
23,527,266 UART: [exit] Launching FMC @ 0x40000130
23,535,606 UART:
23,535,836 UART: Running Caliptra FMC ...
23,536,937 UART:
23,537,112 UART: [state] CFI Enabled
23,545,112 UART: [fht] FMC Alias Private Key: 7
25,875,901 UART: [art] Extend RT PCRs Done
25,877,120 UART: [art] Lock RT PCRs Done
25,879,121 UART: [art] Populate DV Done
25,884,557 UART: [fht] FMC Alias Private Key: 7
25,886,072 UART: [art] Derive CDI
25,886,838 UART: [art] Store in in slot 0x4
25,929,159 UART: [art] Derive Key Pair
25,930,153 UART: [art] Store priv key in slot 0x5
29,172,077 UART: [art] Derive Key Pair - Done
29,185,293 UART: [art] Signing Cert with AUTHO
29,186,591 UART: RITY.KEYID = 7
31,466,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,573 UART: [art] PUB.X = 5C915927F787482D4FA9CA22F8C6E6EE3B8235970B885BF9891D3977F7986F9EFC129CD3A3D85133A08F6CE86B9B33B6
31,474,830 UART: [art] PUB.Y = 0C988065B621EED9974BB73785E34A6EC0CE77269DEE1F30B3911CE53F93A21146E1009FDA21E6EE8CE690EC2DB03D0C
31,482,044 UART: [art] SIG.R = E7EB25CE6512935F198C9B00246934C278DDAC01039AE5FA0F561FE4B2AAE1534E9641CF0C7E68B8EA391BBF5622E756
31,489,445 UART: [art] SIG.S = 145F776309458198E157D0F717711AA8711E91F09D6B2B67501CDA3B4FCD06D62ABCD01501756F4FDDF3AC1E89A952DB
32,794,852 UART: Caliptra RT
32,795,564 UART: [state] CFI Enabled
32,914,205 UART: [rt] RT listening for mailbox commands...
32,916,108 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
32,947,276 UART: [rt]cmd =0x53574545, len=84
32,950,877 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
4,130,497 ready_for_fw is high
4,130,870 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,077,892 >>> mbox cmd response: success
23,719,311 UART:
23,719,731 UART: Running Caliptra FMC ...
23,720,872 UART:
23,721,035 UART: [state] CFI Enabled
23,729,237 UART: [fht] FMC Alias Private Key: 7
26,060,539 UART: [art] Extend RT PCRs Done
26,061,766 UART: [art] Lock RT PCRs Done
26,063,339 UART: [art] Populate DV Done
26,068,714 UART: [fht] FMC Alias Private Key: 7
26,070,423 UART: [art] Derive CDI
26,071,420 UART: [art] Store in in slot 0x4
26,113,446 UART: [art] Derive Key Pair
26,114,478 UART: [art] Store priv key in slot 0x5
29,356,398 UART: [art] Derive Key Pair - Done
29,369,347 UART: [art] Signing Cert with AUTHO
29,370,650 UART: RITY.KEYID = 7
31,650,013 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,524 UART: [art] PUB.X = 846AD27A026E2D395F006E1967BE17D7B8C649EEA3BDC9560D17B543B2FEFF67768B37632354088D2AE67574CBE00C6B
31,658,779 UART: [art] PUB.Y = 47FB2D62FC8BB101E4976B32F9B9644A120DE7032A946BE2FE32D07B0D1F679BC0F7038B187E726A043AAFDC18BDB864
31,666,031 UART: [art] SIG.R = C0CC6D680FAB656E1A01134259924F094A89D7F72F54C440B250F32316550CD339FA2237E451860F3FDC1E6E3E49615F
31,673,436 UART: [art] SIG.S = 09DA393B01028807217EAAAD1D00D6BFAAE19270D8A894038F20EABAF2F93931AE0EADA5FE03D36B1A99F1E35B6EEA51
32,978,724 UART: Caliptra RT
32,979,443 UART: [state] CFI Enabled
33,096,613 UART: [rt] RT listening for mailbox commands...
33,098,492 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,129,529 UART: [rt]cmd =0x53574545, len=84
33,133,433 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,179 UART:
192,550 UART: Running Caliptra ROM ...
193,749 UART:
193,908 UART: [state] CFI Enabled
258,823 UART: [state] LifecycleState = Unprovisioned
260,741 UART: [state] DebugLocked = No
263,203 UART: [state] WD Timer not started. Device not locked for debugging
266,399 UART: [kat] SHA2-256
445,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,103 UART: [kat] ++
457,557 UART: [kat] sha1
467,318 UART: [kat] SHA2-256
470,361 UART: [kat] SHA2-384
476,429 UART: [kat] SHA2-512-ACC
479,442 UART: [kat] ECC-384
2,925,645 UART: [kat] HMAC-384Kdf
2,948,469 UART: [kat] LMS
3,477,857 UART: [kat] --
3,484,075 UART: [cold-reset] ++
3,486,579 UART: [fht] FHT @ 0x50003400
3,497,624 UART: [idev] ++
3,498,194 UART: [idev] CDI.KEYID = 6
3,500,012 UART: [idev] SUBJECT.KEYID = 7
3,501,139 UART: [idev] UDS.KEYID = 0
3,502,069 ready_for_fw is high
3,502,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,645,760 UART: [idev] Erasing UDS.KEYID = 0
6,004,480 UART: [idev] Sha1 KeyId Algorithm
6,026,844 UART: [idev] --
6,031,053 UART: [ldev] ++
6,031,636 UART: [ldev] CDI.KEYID = 6
6,032,552 UART: [ldev] SUBJECT.KEYID = 5
6,033,714 UART: [ldev] AUTHORITY.KEYID = 7
6,034,947 UART: [ldev] FE.KEYID = 1
6,075,353 UART: [ldev] Erasing FE.KEYID = 1
8,580,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,991 UART: [ldev] --
10,388,988 UART: [fwproc] Wait for Commands...
10,391,737 UART: [fwproc] Recv command 0x46574c44
10,393,784 UART: [fwproc] Recv'd Img size: 114168 bytes
13,795,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,867,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,870 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,253,704 >>> mbox cmd response: success
14,258,793 UART: [afmc] ++
14,259,388 UART: [afmc] CDI.KEYID = 6
14,260,300 UART: [afmc] SUBJECT.KEYID = 7
14,261,461 UART: [afmc] AUTHORITY.KEYID = 5
16,803,406 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,566 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,481 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,242 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,263 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,132 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,726 UART: [afmc] --
18,603,485 UART: [cold-reset] --
18,607,346 UART: [state] Locking Datavault
18,613,887 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,544 UART: [state] Locking ICCM
18,617,967 UART: [exit] Launching FMC @ 0x40000130
18,626,411 UART:
18,626,659 UART: Running Caliptra FMC ...
18,627,764 UART:
18,627,924 UART: [state] CFI Enabled
18,685,095 UART: [fht] FMC Alias Private Key: 7
20,448,753 UART: [art] Extend RT PCRs Done
20,449,977 UART: [art] Lock RT PCRs Done
20,451,606 UART: [art] Populate DV Done
20,457,076 UART: [fht] FMC Alias Private Key: 7
20,458,633 UART: [art] Derive CDI
20,459,643 UART: [art] Store in in slot 0x4
20,517,728 UART: [art] Derive Key Pair
20,518,734 UART: [art] Store priv key in slot 0x5
22,981,834 UART: [art] Derive Key Pair - Done
22,994,989 UART: [art] Signing Cert with AUTHO
22,996,290 UART: RITY.KEYID = 7
24,707,509 UART: [art] Erasing AUTHORITY.KEYID = 7
24,709,011 UART: [art] PUB.X = DD1194B850285BA5C3470C8EE8FA9D4ED72EAAD4423CFE0E5A113BD18388480FD85259A09FBBC674E5C4CBFDC36A01A0
24,716,321 UART: [art] PUB.Y = 8C322B31F82685AA1BD2B11C48725718D321FF8B5E58EEEF1EF97B81A6EEFF94C47BABBB818AA46BF8F0F9E664598DEE
24,723,605 UART: [art] SIG.R = 5156457145BD7AE6C9DF31FC167252D77FF34196F2A92D94A907CC07AC21B335EB3936D4C377D0A29EFEFB4B0F6FBEFE
24,731,002 UART: [art] SIG.S = 487F766A2AA21DAA4121BEE60DFFDE104D7C5A357B4DF88E848975F8F303304CF40437B817AABA64C1CDC5E02CC59C6B
25,710,562 UART: Caliptra RT
25,711,261 UART: [state] CFI Enabled
25,875,457 UART: [rt] RT listening for mailbox commands...
25,877,342 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,908,325 UART: [rt]cmd =0x53574545, len=84
25,912,068 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,377,611 ready_for_fw is high
3,378,018 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,067,106 >>> mbox cmd response: success
18,357,748 UART:
18,358,150 UART: Running Caliptra FMC ...
18,359,340 UART:
18,359,518 UART: [state] CFI Enabled
18,429,086 UART: [fht] FMC Alias Private Key: 7
20,193,383 UART: [art] Extend RT PCRs Done
20,194,609 UART: [art] Lock RT PCRs Done
20,196,245 UART: [art] Populate DV Done
20,201,709 UART: [fht] FMC Alias Private Key: 7
20,203,356 UART: [art] Derive CDI
20,204,171 UART: [art] Store in in slot 0x4
20,261,535 UART: [art] Derive Key Pair
20,262,582 UART: [art] Store priv key in slot 0x5
22,725,613 UART: [art] Derive Key Pair - Done
22,738,545 UART: [art] Signing Cert with AUTHO
22,739,896 UART: RITY.KEYID = 7
24,451,374 UART: [art] Erasing AUTHORITY.KEYID = 7
24,452,881 UART: [art] PUB.X = B235DDB92A3085983F9A41E88A7E5DAD7A4055008408CA1CC978C9C1A8C78A64958929FA4AD3583F80ED26492BC413D6
24,460,124 UART: [art] PUB.Y = 5CC40CD5A9E01651781EF8176A1A2899B4B59BE5DAE5549CABBFF3A1E3EB5D482A9F77D5C98F905EFE4B761D921BC457
24,467,428 UART: [art] SIG.R = 6BAC3615471370E60D4432BCB6A15C204A27301CFB203E2CBE21DF1DB136D30B8669FCD24713AE74F5E9AD64BAB709BC
24,474,813 UART: [art] SIG.S = 57BA96A8F9C12BDA00832303A9DBC69EBAF99D5AE7AB58E25F79D24FE9BCB81FD5B35BA47C4BAC7D9D614E13453CF778
25,453,764 UART: Caliptra RT
25,454,465 UART: [state] CFI Enabled
25,619,099 UART: [rt] RT listening for mailbox commands...
25,620,989 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,652,143 UART: [rt]cmd =0x53574545, len=84
25,656,292 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,689 writing to cptra_bootfsm_go
193,003 UART:
193,385 UART: Running Caliptra ROM ...
194,516 UART:
604,243 UART: [state] CFI Enabled
616,563 UART: [state] LifecycleState = Unprovisioned
618,373 UART: [state] DebugLocked = No
619,967 UART: [state] WD Timer not started. Device not locked for debugging
623,514 UART: [kat] SHA2-256
802,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,221 UART: [kat] ++
814,749 UART: [kat] sha1
826,981 UART: [kat] SHA2-256
830,012 UART: [kat] SHA2-384
835,990 UART: [kat] SHA2-512-ACC
838,935 UART: [kat] ECC-384
3,282,381 UART: [kat] HMAC-384Kdf
3,296,170 UART: [kat] LMS
3,825,640 UART: [kat] --
3,828,991 UART: [cold-reset] ++
3,831,132 UART: [fht] FHT @ 0x50003400
3,841,682 UART: [idev] ++
3,842,244 UART: [idev] CDI.KEYID = 6
3,843,275 UART: [idev] SUBJECT.KEYID = 7
3,844,386 UART: [idev] UDS.KEYID = 0
3,845,312 ready_for_fw is high
3,845,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,915 UART: [idev] Erasing UDS.KEYID = 0
6,318,405 UART: [idev] Sha1 KeyId Algorithm
6,340,672 UART: [idev] --
6,345,931 UART: [ldev] ++
6,346,503 UART: [ldev] CDI.KEYID = 6
6,347,421 UART: [ldev] SUBJECT.KEYID = 5
6,348,577 UART: [ldev] AUTHORITY.KEYID = 7
6,349,959 UART: [ldev] FE.KEYID = 1
6,360,728 UART: [ldev] Erasing FE.KEYID = 1
8,833,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,568 UART: [ldev] --
10,624,892 UART: [fwproc] Wait for Commands...
10,626,449 UART: [fwproc] Recv command 0x46574c44
10,628,545 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,007 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,494,034 >>> mbox cmd response: success
14,498,394 UART: [afmc] ++
14,498,991 UART: [afmc] CDI.KEYID = 6
14,499,876 UART: [afmc] SUBJECT.KEYID = 7
14,501,096 UART: [afmc] AUTHORITY.KEYID = 5
17,002,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,076 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,137 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,898 UART: [afmc] --
18,798,302 UART: [cold-reset] --
18,801,146 UART: [state] Locking Datavault
18,808,622 UART: [state] Locking PCR0, PCR1 and PCR31
18,810,268 UART: [state] Locking ICCM
18,813,016 UART: [exit] Launching FMC @ 0x40000130
18,821,463 UART:
18,821,707 UART: Running Caliptra FMC ...
18,822,814 UART:
18,822,974 UART: [state] CFI Enabled
18,831,023 UART: [fht] FMC Alias Private Key: 7
20,587,097 UART: [art] Extend RT PCRs Done
20,588,324 UART: [art] Lock RT PCRs Done
20,590,022 UART: [art] Populate DV Done
20,595,635 UART: [fht] FMC Alias Private Key: 7
20,597,125 UART: [art] Derive CDI
20,597,890 UART: [art] Store in in slot 0x4
20,640,648 UART: [art] Derive Key Pair
20,641,650 UART: [art] Store priv key in slot 0x5
23,068,546 UART: [art] Derive Key Pair - Done
23,081,450 UART: [art] Signing Cert with AUTHO
23,082,760 UART: RITY.KEYID = 7
24,788,266 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,780 UART: [art] PUB.X = 5D305248A23DE6039BF6F3BBCD350945576FBE22F91179C558D8815773019902C476E4DDF8C9E7C0AC6603D19D877BAD
24,797,051 UART: [art] PUB.Y = DD9118AD7021D49ED50975C4E35667F5A4909C47C7F7FFF077D37625D0F0B8343F5743A7800789607C9A6CC00B1A40C0
24,804,294 UART: [art] SIG.R = 391BFBD4F6CDB180DDE678D57A401A17657F9FD2CD5E9AD1BE669E2313B5CBE7B307486D038CDD0A80EE97947FC86E7A
24,811,693 UART: [art] SIG.S = 1EB124C31DAD13C2F2C0CD2C31E92211D3BC4EB33DF8DF3BD0F4A4F19EFA8FE953AC0590FBC8A451B98F7D13F0879A74
25,791,247 UART: Caliptra RT
25,791,951 UART: [state] CFI Enabled
25,909,499 UART: [rt] RT listening for mailbox commands...
25,911,389 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,942,505 UART: [rt]cmd =0x53574545, len=84
25,946,003 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,872 writing to cptra_bootfsm_go
3,701,849 ready_for_fw is high
3,702,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,056 >>> mbox cmd response: success
18,517,135 UART:
18,517,541 UART: Running Caliptra FMC ...
18,518,674 UART:
18,518,840 UART: [state] CFI Enabled
18,526,682 UART: [fht] FMC Alias Private Key: 7
20,283,903 UART: [art] Extend RT PCRs Done
20,285,130 UART: [art] Lock RT PCRs Done
20,286,879 UART: [art] Populate DV Done
20,292,136 UART: [fht] FMC Alias Private Key: 7
20,293,785 UART: [art] Derive CDI
20,294,606 UART: [art] Store in in slot 0x4
20,337,153 UART: [art] Derive Key Pair
20,338,196 UART: [art] Store priv key in slot 0x5
22,765,325 UART: [art] Derive Key Pair - Done
22,778,379 UART: [art] Signing Cert with AUTHO
22,779,683 UART: RITY.KEYID = 7
24,484,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,382 UART: [art] PUB.X = 32B0CCCD74BA686459F1FBB72ADD2108EC8CC4CD5AC350D39FFF43683AB99CFEA30DC4242F37A3847AF59B3F42FE4422
24,493,688 UART: [art] PUB.Y = 9F3D36265A05FD1616050580E050C5FFC34D4C18688EE1E2B7696788406619365E1C8F1801A461C49525D6D52629A504
24,500,889 UART: [art] SIG.R = 5CC12CCDE5505F9B1DB122EFFBE23C984555AE751AF08C3F7159B75B037225DE1F5C158CB972D5241620628114A081F2
24,508,282 UART: [art] SIG.S = 9F4DC1BF3D2E524B001FFEF4026537604D5F39B9792CA24A454E8C28797109371884576A70042F2CD2BA3D0C2D3D44DC
25,487,222 UART: Caliptra RT
25,487,924 UART: [state] CFI Enabled
25,604,587 UART: [rt] RT listening for mailbox commands...
25,606,467 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,637,616 UART: [rt]cmd =0x53574545, len=84
25,641,220 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,136 UART:
192,504 UART: Running Caliptra ROM ...
193,703 UART:
193,865 UART: [state] CFI Enabled
266,730 UART: [state] LifecycleState = Unprovisioned
269,152 UART: [state] DebugLocked = No
272,023 UART: [state] WD Timer not started. Device not locked for debugging
277,452 UART: [kat] SHA2-256
467,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,084 UART: [kat] ++
478,535 UART: [kat] sha1
489,904 UART: [kat] SHA2-256
492,916 UART: [kat] SHA2-384
497,862 UART: [kat] SHA2-512-ACC
500,412 UART: [kat] ECC-384
2,949,530 UART: [kat] HMAC-384Kdf
2,973,434 UART: [kat] LMS
3,505,222 UART: [kat] --
3,509,040 UART: [cold-reset] ++
3,511,336 UART: [fht] FHT @ 0x50003400
3,522,672 UART: [idev] ++
3,523,309 UART: [idev] CDI.KEYID = 6
3,524,344 UART: [idev] SUBJECT.KEYID = 7
3,525,539 UART: [idev] UDS.KEYID = 0
3,526,471 ready_for_fw is high
3,526,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,792 UART: [idev] Erasing UDS.KEYID = 0
6,029,347 UART: [idev] Sha1 KeyId Algorithm
6,052,897 UART: [idev] --
6,058,083 UART: [ldev] ++
6,058,770 UART: [ldev] CDI.KEYID = 6
6,059,686 UART: [ldev] SUBJECT.KEYID = 5
6,060,850 UART: [ldev] AUTHORITY.KEYID = 7
6,062,084 UART: [ldev] FE.KEYID = 1
6,101,908 UART: [ldev] Erasing FE.KEYID = 1
8,610,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,538 UART: [ldev] --
10,416,670 UART: [fwproc] Wait for Commands...
10,418,531 UART: [fwproc] Recv command 0x46574c44
10,420,790 UART: [fwproc] Recv'd Img size: 114168 bytes
13,856,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,217 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,598,464 >>> mbox cmd response: success
14,601,806 UART: [afmc] ++
14,602,524 UART: [afmc] CDI.KEYID = 6
14,603,775 UART: [afmc] SUBJECT.KEYID = 7
14,605,216 UART: [afmc] AUTHORITY.KEYID = 5
17,150,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,132 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,312 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,479 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,792 UART: [afmc] --
18,948,954 UART: [cold-reset] --
18,953,420 UART: [state] Locking Datavault
18,960,092 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,254 UART: [state] Locking ICCM
18,963,764 UART: [exit] Launching FMC @ 0x40000130
18,972,400 UART:
18,972,635 UART: Running Caliptra FMC ...
18,973,734 UART:
18,973,896 UART: [state] CFI Enabled
19,031,715 UART: [fht] FMC Alias Private Key: 7
20,795,254 UART: [art] Extend RT PCRs Done
20,796,470 UART: [art] Lock RT PCRs Done
20,798,170 UART: [art] Populate DV Done
20,803,526 UART: [fht] FMC Alias Private Key: 7
20,805,020 UART: [art] Derive CDI
20,805,763 UART: [art] Store in in slot 0x4
20,864,482 UART: [art] Derive Key Pair
20,865,527 UART: [art] Store priv key in slot 0x5
23,328,216 UART: [art] Derive Key Pair - Done
23,341,214 UART: [art] Signing Cert with AUTHO
23,342,523 UART: RITY.KEYID = 7
25,054,528 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,179 UART: [art] PUB.X = 6EA59D5D2049A58A4B34ED0B4DF414F45F5920CD65B4A3E85128E36BCC351F3120DFCED4AC28AE4040FD1940A62EC7FE
25,063,363 UART: [art] PUB.Y = 3F3B914CD7BAAC9CBB1AE0F0D7F5FB1937EA57360E285BA14E97C6EABD5EF8A461DA1FF08DF0FCAEE05A9332DF220904
25,070,624 UART: [art] SIG.R = 50A14DABAF09A9C3290337EE3465834781E1EFF37D88E44598CFEDE9DA285C46F644239F43BC9C2DD5E88DCC2DA96521
25,078,041 UART: [art] SIG.S = FAF25ACC2FC5C3EBDBC04A7A735953FF1F2D06311037D738FF67206BED1DF21B1A1C69AC901192BD5941F509106C8D72
26,057,372 UART: Caliptra RT
26,058,063 UART: [state] CFI Enabled
26,222,421 UART: [rt] RT listening for mailbox commands...
26,224,311 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,255,553 UART: [rt]cmd =0x53574545, len=84
26,258,935 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,415,737 ready_for_fw is high
3,416,330 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,711,078 >>> mbox cmd response: success
19,004,234 UART:
19,004,626 UART: Running Caliptra FMC ...
19,005,783 UART:
19,005,956 UART: [state] CFI Enabled
19,072,229 UART: [fht] FMC Alias Private Key: 7
20,836,388 UART: [art] Extend RT PCRs Done
20,837,614 UART: [art] Lock RT PCRs Done
20,839,351 UART: [art] Populate DV Done
20,844,612 UART: [fht] FMC Alias Private Key: 7
20,846,194 UART: [art] Derive CDI
20,847,016 UART: [art] Store in in slot 0x4
20,905,038 UART: [art] Derive Key Pair
20,906,044 UART: [art] Store priv key in slot 0x5
23,369,258 UART: [art] Derive Key Pair - Done
23,381,872 UART: [art] Signing Cert with AUTHO
23,383,171 UART: RITY.KEYID = 7
25,095,262 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,777 UART: [art] PUB.X = 7350873D2C8201D9053E55DCF73A3A0DD8F30857806935131A041913F955FB66ADFDFA020D623A7CFF39D9F81975A705
25,104,015 UART: [art] PUB.Y = A268C47346353E2F4DE889B6B7EB1867DD2555C1E5A29D777DA374CD7B8D502E353F62E99B147F0DA346A138B4AB92C1
25,111,231 UART: [art] SIG.R = 4091A9A0FC9D453A56C4006A40053FAE6D20FB8ABE5DD43E1A587093DDE1D729E154CB3D42D9FC49B78386EA2D3201D6
25,118,620 UART: [art] SIG.S = C77F3542763F4B1DEBCD47B4609481E21B88376AF6991678232644EC84CC1761302A5E1B3D10C0F784993D4C7746816F
26,098,010 UART: Caliptra RT
26,098,720 UART: [state] CFI Enabled
26,264,394 UART: [rt] RT listening for mailbox commands...
26,266,280 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,297,426 UART: [rt]cmd =0x53574545, len=84
26,300,890 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
192,966 UART:
193,374 UART: Running Caliptra ROM ...
194,488 UART:
604,348 UART: [state] CFI Enabled
616,517 UART: [state] LifecycleState = Unprovisioned
618,896 UART: [state] DebugLocked = No
621,492 UART: [state] WD Timer not started. Device not locked for debugging
625,670 UART: [kat] SHA2-256
815,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,297 UART: [kat] ++
826,854 UART: [kat] sha1
837,892 UART: [kat] SHA2-256
840,943 UART: [kat] SHA2-384
847,082 UART: [kat] SHA2-512-ACC
849,672 UART: [kat] ECC-384
3,289,525 UART: [kat] HMAC-384Kdf
3,302,803 UART: [kat] LMS
3,834,613 UART: [kat] --
3,838,250 UART: [cold-reset] ++
3,839,193 UART: [fht] FHT @ 0x50003400
3,850,810 UART: [idev] ++
3,851,447 UART: [idev] CDI.KEYID = 6
3,852,480 UART: [idev] SUBJECT.KEYID = 7
3,853,658 UART: [idev] UDS.KEYID = 0
3,854,593 ready_for_fw is high
3,854,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,270 UART: [idev] Erasing UDS.KEYID = 0
6,330,220 UART: [idev] Sha1 KeyId Algorithm
6,350,929 UART: [idev] --
6,356,490 UART: [ldev] ++
6,357,215 UART: [ldev] CDI.KEYID = 6
6,358,137 UART: [ldev] SUBJECT.KEYID = 5
6,359,303 UART: [ldev] AUTHORITY.KEYID = 7
6,360,478 UART: [ldev] FE.KEYID = 1
6,368,101 UART: [ldev] Erasing FE.KEYID = 1
8,845,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,564,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,570 UART: [ldev] --
10,635,229 UART: [fwproc] Wait for Commands...
10,637,010 UART: [fwproc] Recv command 0x46574c44
10,639,267 UART: [fwproc] Recv'd Img size: 114168 bytes
14,074,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,266,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,808,351 >>> mbox cmd response: success
14,812,523 UART: [afmc] ++
14,813,231 UART: [afmc] CDI.KEYID = 6
14,814,476 UART: [afmc] SUBJECT.KEYID = 7
14,815,914 UART: [afmc] AUTHORITY.KEYID = 5
17,325,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,049,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,050,976 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,066,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,081,301 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,096,331 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,120,123 UART: [afmc] --
19,124,090 UART: [cold-reset] --
19,129,301 UART: [state] Locking Datavault
19,135,963 UART: [state] Locking PCR0, PCR1 and PCR31
19,138,100 UART: [state] Locking ICCM
19,140,736 UART: [exit] Launching FMC @ 0x40000130
19,149,354 UART:
19,149,595 UART: Running Caliptra FMC ...
19,150,695 UART:
19,150,857 UART: [state] CFI Enabled
19,159,346 UART: [fht] FMC Alias Private Key: 7
20,916,861 UART: [art] Extend RT PCRs Done
20,918,088 UART: [art] Lock RT PCRs Done
20,919,963 UART: [art] Populate DV Done
20,925,159 UART: [fht] FMC Alias Private Key: 7
20,926,876 UART: [art] Derive CDI
20,927,692 UART: [art] Store in in slot 0x4
20,970,389 UART: [art] Derive Key Pair
20,971,387 UART: [art] Store priv key in slot 0x5
23,397,904 UART: [art] Derive Key Pair - Done
23,410,897 UART: [art] Signing Cert with AUTHO
23,412,200 UART: RITY.KEYID = 7
25,117,425 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,934 UART: [art] PUB.X = 2C75C70BED6FADBD71F2122078A753AB7F43C9754728BC7A1A2C8D1F3D0789CB47D258DEE278B43338D30EAD1909AA2F
25,126,181 UART: [art] PUB.Y = D5063C8E933062B1F3A35378B72AEB26E2502E4A7D1A250B8E308DDD5285E621AEDEF76C12F5C0548DBCB754C7C98D34
25,133,472 UART: [art] SIG.R = A8FB4116F434B79457E39AA9C91DDAC13F5C0EFA2EFA32A53A7EC78FA7031CFC830D84EAE12A1333DB34176AF301A832
25,140,861 UART: [art] SIG.S = 41708EEF11EE591103F3825E39DBD54E8AB6C82767FD56088574D03766112DFC8BD374BEBF5B7FB6CE22CD1B0829CC71
26,119,940 UART: Caliptra RT
26,120,644 UART: [state] CFI Enabled
26,237,820 UART: [rt] RT listening for mailbox commands...
26,239,691 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,270,734 UART: [rt]cmd =0x53574545, len=84
26,274,786 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,720 writing to cptra_bootfsm_go
3,753,497 ready_for_fw is high
3,754,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,940,979 >>> mbox cmd response: success
19,194,597 UART:
19,194,984 UART: Running Caliptra FMC ...
19,196,170 UART:
19,196,342 UART: [state] CFI Enabled
19,204,402 UART: [fht] FMC Alias Private Key: 7
20,960,661 UART: [art] Extend RT PCRs Done
20,961,884 UART: [art] Lock RT PCRs Done
20,963,457 UART: [art] Populate DV Done
20,968,677 UART: [fht] FMC Alias Private Key: 7
20,970,168 UART: [art] Derive CDI
20,970,932 UART: [art] Store in in slot 0x4
21,013,643 UART: [art] Derive Key Pair
21,014,689 UART: [art] Store priv key in slot 0x5
23,441,105 UART: [art] Derive Key Pair - Done
23,453,956 UART: [art] Signing Cert with AUTHO
23,455,257 UART: RITY.KEYID = 7
25,160,871 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,385 UART: [art] PUB.X = 6019B93CD382AE4AE99CE119AFE97C265901BFE1A4500362E6084BFDE8A91BC1CD60DF73E9FF9B84A8F199251493074F
25,169,630 UART: [art] PUB.Y = F3A448DAAAC26560CD3D942EA097390EDFE8B7BB09ACD9D26E9C186C24C479861DA5D47E4F3D07C090381FFA1F0BFAED
25,176,939 UART: [art] SIG.R = B38D67FD6D2E3977A4D1E6E397A25C53F3981B46E160865936DB125297D85A3D43045344B5622DC1F62834C643129774
25,184,280 UART: [art] SIG.S = 63967A335432F85E7D165AC13A310938EDDC1A7A74EC8C41D1E7A14208F5428AA9F6DCC5DC8605186602BFE911ECC7F4
26,163,628 UART: Caliptra RT
26,164,317 UART: [state] CFI Enabled
26,283,194 UART: [rt] RT listening for mailbox commands...
26,285,092 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,316,067 UART: [rt]cmd =0x53574545, len=84
26,319,514 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,273 UART: [kat] SHA2-256
882,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,319 UART: [kat] ++
886,471 UART: [kat] sha1
890,499 UART: [kat] SHA2-256
892,437 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,692 UART: [kat] HMAC-384Kdf
907,342 UART: [kat] LMS
1,475,538 UART: [kat] --
1,476,449 UART: [cold-reset] ++
1,476,823 UART: [fht] Storing FHT @ 0x50003400
1,479,572 UART: [idev] ++
1,479,740 UART: [idev] CDI.KEYID = 6
1,480,100 UART: [idev] SUBJECT.KEYID = 7
1,480,524 UART: [idev] UDS.KEYID = 0
1,480,869 ready_for_fw is high
1,480,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,668 UART: [idev] Erasing UDS.KEYID = 0
1,505,598 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,160 UART: [idev] --
1,515,239 UART: [ldev] ++
1,515,407 UART: [ldev] CDI.KEYID = 6
1,515,770 UART: [ldev] SUBJECT.KEYID = 5
1,516,196 UART: [ldev] AUTHORITY.KEYID = 7
1,516,659 UART: [ldev] FE.KEYID = 1
1,521,821 UART: [ldev] Erasing FE.KEYID = 1
1,546,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,812 UART: [ldev] --
1,586,105 UART: [fwproc] Waiting for Commands...
1,586,772 UART: [fwproc] Received command 0x46574c44
1,587,563 UART: [fwproc] Received Image of size 114168 bytes
2,884,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,739 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,628 >>> mbox cmd response: success
3,077,748 UART: [afmc] ++
3,077,916 UART: [afmc] CDI.KEYID = 6
3,078,278 UART: [afmc] SUBJECT.KEYID = 7
3,078,703 UART: [afmc] AUTHORITY.KEYID = 5
3,113,448 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,262 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,990 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,875 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,565 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,462 UART: [afmc] --
3,156,398 UART: [cold-reset] --
3,157,220 UART: [state] Locking Datavault
3,158,529 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,133 UART: [state] Locking ICCM
3,159,773 UART: [exit] Launching FMC @ 0x40000130
3,165,102 UART:
3,165,118 UART: Running Caliptra FMC ...
3,165,526 UART:
3,165,580 UART: [state] CFI Enabled
3,176,123 UART: [fht] FMC Alias Private Key: 7
3,284,056 UART: [art] Extend RT PCRs Done
3,284,484 UART: [art] Lock RT PCRs Done
3,286,178 UART: [art] Populate DV Done
3,294,341 UART: [fht] FMC Alias Private Key: 7
3,295,453 UART: [art] Derive CDI
3,295,733 UART: [art] Store in in slot 0x4
3,381,354 UART: [art] Derive Key Pair
3,381,714 UART: [art] Store priv key in slot 0x5
3,395,000 UART: [art] Derive Key Pair - Done
3,409,683 UART: [art] Signing Cert with AUTHO
3,410,163 UART: RITY.KEYID = 7
3,425,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,294 UART: [art] PUB.X = 3CA6D3018EA3D6D7034E4E1418552DF07A62AE19992C21D0B82C6326B86D5C1DFF79B1053CEF3D3265CA452F19CE3D77
3,433,063 UART: [art] PUB.Y = FB8F76CD430103E42E0B7D73F6A313D5B452CD9C731EC0BE40C6248BDC628151F180EF0F29B5B47706709DF09B3B6BBA
3,440,010 UART: [art] SIG.R = B57E9FDD4CD55570F99A07C4968C571F36E5EF752CDEE0BE0ACF0F0E977754812A4130C02E63E2FC62EF31D5258168C6
3,446,778 UART: [art] SIG.S = EDD9A3121E892CD8CF03EBFA41F4A27E940D2F56223DDD5C5B602B33D434EFECA438F922F236656F2431B1557E0F9EC7
3,470,280 UART: Caliptra RT
3,470,533 UART: [state] CFI Enabled
3,579,095 UART: [rt] RT listening for mailbox commands...
3,579,765 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,181 UART: [rt]cmd =0x53574545, len=84
3,613,005 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,385 ready_for_fw is high
1,362,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,160 >>> mbox cmd response: success
2,989,004 UART:
2,989,020 UART: Running Caliptra FMC ...
2,989,428 UART:
2,989,482 UART: [state] CFI Enabled
3,000,133 UART: [fht] FMC Alias Private Key: 7
3,107,686 UART: [art] Extend RT PCRs Done
3,108,114 UART: [art] Lock RT PCRs Done
3,109,966 UART: [art] Populate DV Done
3,118,395 UART: [fht] FMC Alias Private Key: 7
3,119,331 UART: [art] Derive CDI
3,119,611 UART: [art] Store in in slot 0x4
3,205,510 UART: [art] Derive Key Pair
3,205,870 UART: [art] Store priv key in slot 0x5
3,219,034 UART: [art] Derive Key Pair - Done
3,233,899 UART: [art] Signing Cert with AUTHO
3,234,379 UART: RITY.KEYID = 7
3,249,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,278 UART: [art] PUB.X = 77ADD6BC5426F3B74B0F7AB197B4580D1240E11031DF7DD604ABFA7DB99F412F850CF3F34CFECEBBEC83484EDA631019
3,257,056 UART: [art] PUB.Y = 23FDC97120F14B9A46138EC01B6A30F2740D3F106D11F70217E1B29623FB14E3641904586A2B1B6135E7E9C1714B0D4F
3,263,990 UART: [art] SIG.R = 64444952C3A77A338C83894D54603E0AD2A7C46C76A6BFD0A3F62C3B464169562F01BCEC00DABAF321E4791F920FCC3A
3,270,737 UART: [art] SIG.S = E429FD6D9C99154C935C2D87AE5FA9FE4FC688121B096A0A9DCCD28D7D0BF3ACD812FD837BD2022E91A6197647271774
3,294,710 UART: Caliptra RT
3,294,963 UART: [state] CFI Enabled
3,403,286 UART: [rt] RT listening for mailbox commands...
3,403,956 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,392 UART: [rt]cmd =0x53574545, len=84
3,437,796 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
87,162 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,772 UART: [kat] SHA2-256
882,703 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,818 UART: [kat] ++
886,970 UART: [kat] sha1
891,138 UART: [kat] SHA2-256
893,076 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,567 UART: [kat] HMAC-384Kdf
908,047 UART: [kat] LMS
1,476,243 UART: [kat] --
1,477,330 UART: [cold-reset] ++
1,477,846 UART: [fht] Storing FHT @ 0x50003400
1,480,777 UART: [idev] ++
1,480,945 UART: [idev] CDI.KEYID = 6
1,481,305 UART: [idev] SUBJECT.KEYID = 7
1,481,729 UART: [idev] UDS.KEYID = 0
1,482,074 ready_for_fw is high
1,482,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,757 UART: [idev] Erasing UDS.KEYID = 0
1,506,439 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,125 UART: [idev] --
1,516,238 UART: [ldev] ++
1,516,406 UART: [ldev] CDI.KEYID = 6
1,516,769 UART: [ldev] SUBJECT.KEYID = 5
1,517,195 UART: [ldev] AUTHORITY.KEYID = 7
1,517,658 UART: [ldev] FE.KEYID = 1
1,523,068 UART: [ldev] Erasing FE.KEYID = 1
1,548,957 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,691 UART: [ldev] --
1,588,016 UART: [fwproc] Waiting for Commands...
1,588,727 UART: [fwproc] Received command 0x46574c44
1,589,518 UART: [fwproc] Received Image of size 114168 bytes
2,884,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,714 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,759 >>> mbox cmd response: success
3,079,017 UART: [afmc] ++
3,079,185 UART: [afmc] CDI.KEYID = 6
3,079,547 UART: [afmc] SUBJECT.KEYID = 7
3,079,972 UART: [afmc] AUTHORITY.KEYID = 5
3,115,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,961 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,689 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,574 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,264 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,269 UART: [afmc] --
3,159,231 UART: [cold-reset] --
3,160,081 UART: [state] Locking Datavault
3,161,314 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,918 UART: [state] Locking ICCM
3,162,386 UART: [exit] Launching FMC @ 0x40000130
3,167,715 UART:
3,167,731 UART: Running Caliptra FMC ...
3,168,139 UART:
3,168,282 UART: [state] CFI Enabled
3,178,819 UART: [fht] FMC Alias Private Key: 7
3,286,590 UART: [art] Extend RT PCRs Done
3,287,018 UART: [art] Lock RT PCRs Done
3,288,372 UART: [art] Populate DV Done
3,296,517 UART: [fht] FMC Alias Private Key: 7
3,297,453 UART: [art] Derive CDI
3,297,733 UART: [art] Store in in slot 0x4
3,383,528 UART: [art] Derive Key Pair
3,383,888 UART: [art] Store priv key in slot 0x5
3,397,392 UART: [art] Derive Key Pair - Done
3,412,068 UART: [art] Signing Cert with AUTHO
3,412,548 UART: RITY.KEYID = 7
3,427,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,503 UART: [art] PUB.X = 4978C708FBF59960D35968790687B7CA80ADE40545F9F61E989452B1C12030F6E0C13C19936A189E3B3AF0B2A5405C37
3,435,258 UART: [art] PUB.Y = E40D5A5F801FC06F9E47EA2D1AEB03765303CACB6924B7FEE742C4D07090A83D86C4F51A3A66C6EE488EBC251838A03C
3,442,213 UART: [art] SIG.R = 8FC82B0EAA2CFE9F0D5F5325F0A8EFB68857384792D248A657EB0058923F071806E8DC80D8FEB28AE6ACF258A4AA1466
3,448,961 UART: [art] SIG.S = F5C6062357A65216AFB1B844154E2FA7DAE5A43D33003D8EBBF2E4AECF6656662710B21F84DB0E2787AD68F9BBCEA59E
3,472,238 UART: Caliptra RT
3,472,583 UART: [state] CFI Enabled
3,580,321 UART: [rt] RT listening for mailbox commands...
3,580,991 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,299 UART: [rt]cmd =0x53574545, len=84
3,614,793 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,462 ready_for_fw is high
1,362,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,005 >>> mbox cmd response: success
2,989,087 UART:
2,989,103 UART: Running Caliptra FMC ...
2,989,511 UART:
2,989,654 UART: [state] CFI Enabled
3,000,273 UART: [fht] FMC Alias Private Key: 7
3,107,854 UART: [art] Extend RT PCRs Done
3,108,282 UART: [art] Lock RT PCRs Done
3,109,986 UART: [art] Populate DV Done
3,118,205 UART: [fht] FMC Alias Private Key: 7
3,119,307 UART: [art] Derive CDI
3,119,587 UART: [art] Store in in slot 0x4
3,205,576 UART: [art] Derive Key Pair
3,205,936 UART: [art] Store priv key in slot 0x5
3,219,458 UART: [art] Derive Key Pair - Done
3,233,994 UART: [art] Signing Cert with AUTHO
3,234,474 UART: RITY.KEYID = 7
3,249,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,493 UART: [art] PUB.X = 4E8B37EEC923D5844BDCCD61567B86158B1299C59FC9201254EE4A9B948F75E51BC985F096F323B6E95060BFE3EFE9B9
3,257,271 UART: [art] PUB.Y = C60FF599C863E7377607CE6A04C428AE5F64A275CAB7EB65D762DBA973E782B70569CC909D9AAF93505700F4BC43F271
3,264,193 UART: [art] SIG.R = A95EDBE2F7DE12333C9E530C9556924C26911AA8A7D41C385E0D63F00F43B353A8728B0314691FA31FF954F65D2DF71F
3,270,955 UART: [art] SIG.S = 3FE26B3E667030D520340775975278CE316E4CDD63A3C45C41EFF5274918E6DFBB1A7D84EF76B3D020BB7686B403A12C
3,294,406 UART: Caliptra RT
3,294,751 UART: [state] CFI Enabled
3,402,876 UART: [rt] RT listening for mailbox commands...
3,403,546 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,434,142 UART: [rt]cmd =0x53574545, len=84
3,437,532 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Unprovisioned
86,319 UART: [state] DebugLocked = No
86,983 UART: [state] WD Timer not started. Device not locked for debugging
88,206 UART: [kat] SHA2-256
893,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,981 UART: [kat] ++
898,133 UART: [kat] sha1
902,275 UART: [kat] SHA2-256
904,215 UART: [kat] SHA2-384
907,002 UART: [kat] SHA2-512-ACC
908,903 UART: [kat] ECC-384
918,466 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,172,081 UART: [cold-reset] ++
1,172,555 UART: [fht] FHT @ 0x50003400
1,175,368 UART: [idev] ++
1,175,536 UART: [idev] CDI.KEYID = 6
1,175,896 UART: [idev] SUBJECT.KEYID = 7
1,176,320 UART: [idev] UDS.KEYID = 0
1,176,665 ready_for_fw is high
1,176,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,448 UART: [idev] Erasing UDS.KEYID = 0
1,201,311 UART: [idev] Sha1 KeyId Algorithm
1,209,821 UART: [idev] --
1,210,845 UART: [ldev] ++
1,211,013 UART: [ldev] CDI.KEYID = 6
1,211,376 UART: [ldev] SUBJECT.KEYID = 5
1,211,802 UART: [ldev] AUTHORITY.KEYID = 7
1,212,265 UART: [ldev] FE.KEYID = 1
1,217,459 UART: [ldev] Erasing FE.KEYID = 1
1,244,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,839 UART: [ldev] --
1,283,328 UART: [fwproc] Wait for Commands...
1,284,108 UART: [fwproc] Recv command 0x46574c44
1,284,836 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,139 >>> mbox cmd response: success
2,773,387 UART: [afmc] ++
2,773,555 UART: [afmc] CDI.KEYID = 6
2,773,917 UART: [afmc] SUBJECT.KEYID = 7
2,774,342 UART: [afmc] AUTHORITY.KEYID = 5
2,809,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,546 UART: [afmc] --
2,852,616 UART: [cold-reset] --
2,853,656 UART: [state] Locking Datavault
2,854,877 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,481 UART: [state] Locking ICCM
2,856,135 UART: [exit] Launching FMC @ 0x40000130
2,861,464 UART:
2,861,480 UART: Running Caliptra FMC ...
2,861,888 UART:
2,861,942 UART: [state] CFI Enabled
2,872,437 UART: [fht] FMC Alias Private Key: 7
2,979,908 UART: [art] Extend RT PCRs Done
2,980,336 UART: [art] Lock RT PCRs Done
2,981,658 UART: [art] Populate DV Done
2,989,569 UART: [fht] FMC Alias Private Key: 7
2,990,503 UART: [art] Derive CDI
2,990,783 UART: [art] Store in in slot 0x4
3,076,634 UART: [art] Derive Key Pair
3,076,994 UART: [art] Store priv key in slot 0x5
3,090,926 UART: [art] Derive Key Pair - Done
3,105,703 UART: [art] Signing Cert with AUTHO
3,106,183 UART: RITY.KEYID = 7
3,121,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,076 UART: [art] PUB.X = 892A4C279E4DBD8648DC7315A59BCD3B3D7B1FA862A023FD72F9B3B5B2F8839EB7FBD841300F48682995D06DA3420921
3,128,846 UART: [art] PUB.Y = 5A56361826C2A530C9B3C3C3862F1064CCB21DAECE7BA1F87417632FAE4593B79D370FE57992EC198200AAF1276A8EE5
3,135,777 UART: [art] SIG.R = 756805A30C9F34240A1F285ABCB3794EE872C2D976AD0077BE3071ACCD7E2F2AAA36914AD5DCE411971F694A5723CF1C
3,142,526 UART: [art] SIG.S = CD54E4C5F9C469A4E1A1DF8574F3DFCA7B060901C4D92DC3C31F2D86C17710D4C6A905F6F996C16DF440E708269545A9
3,166,566 UART: Caliptra RT
3,166,819 UART: [state] CFI Enabled
3,274,848 UART: [rt] RT listening for mailbox commands...
3,275,518 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,702 UART: [rt]cmd =0x53574545, len=84
3,308,732 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,954 >>> mbox cmd response: success
2,685,928 UART:
2,685,944 UART: Running Caliptra FMC ...
2,686,352 UART:
2,686,406 UART: [state] CFI Enabled
2,696,641 UART: [fht] FMC Alias Private Key: 7
2,804,656 UART: [art] Extend RT PCRs Done
2,805,084 UART: [art] Lock RT PCRs Done
2,806,602 UART: [art] Populate DV Done
2,814,663 UART: [fht] FMC Alias Private Key: 7
2,815,679 UART: [art] Derive CDI
2,815,959 UART: [art] Store in in slot 0x4
2,901,248 UART: [art] Derive Key Pair
2,901,608 UART: [art] Store priv key in slot 0x5
2,914,630 UART: [art] Derive Key Pair - Done
2,929,273 UART: [art] Signing Cert with AUTHO
2,929,753 UART: RITY.KEYID = 7
2,945,311 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,076 UART: [art] PUB.X = 0E9609F42C4948EA4476B67AABF12D86EDC2189A72822403C9DE8630E32DBA3A3652AC05D8E2FFF6CD04237AA24AE755
2,952,841 UART: [art] PUB.Y = 2182205EB5BC1036E072A919D12CA44C69768D56A1FE6AF993454CF92B8E9293432985EA780E59FFA87D61F5A0521307
2,959,781 UART: [art] SIG.R = 0FFEAEDA0898F00866F7832B526C84CAE150178DE2E355B69F40B29BE7083629A36C5844D440CD33C335E966FB9E87CD
2,966,545 UART: [art] SIG.S = DAD560919C1D34243228ACA99AB3F69B8D06601BD8F484E144C6A60E84CE663028C1D006D2D79B694BFE3CF2369B1EF6
2,991,003 UART: Caliptra RT
2,991,256 UART: [state] CFI Enabled
3,098,239 UART: [rt] RT listening for mailbox commands...
3,098,909 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,103 UART: [rt]cmd =0x53574545, len=84
3,132,245 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
893,539 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,664 UART: [kat] ++
897,816 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,621 UART: [kat] SHA2-512-ACC
908,522 UART: [kat] ECC-384
918,197 UART: [kat] HMAC-384Kdf
922,673 UART: [kat] LMS
1,171,001 UART: [kat] --
1,171,934 UART: [cold-reset] ++
1,172,476 UART: [fht] FHT @ 0x50003400
1,175,041 UART: [idev] ++
1,175,209 UART: [idev] CDI.KEYID = 6
1,175,569 UART: [idev] SUBJECT.KEYID = 7
1,175,993 UART: [idev] UDS.KEYID = 0
1,176,338 ready_for_fw is high
1,176,338 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,941 UART: [idev] Erasing UDS.KEYID = 0
1,200,870 UART: [idev] Sha1 KeyId Algorithm
1,209,480 UART: [idev] --
1,210,576 UART: [ldev] ++
1,210,744 UART: [ldev] CDI.KEYID = 6
1,211,107 UART: [ldev] SUBJECT.KEYID = 5
1,211,533 UART: [ldev] AUTHORITY.KEYID = 7
1,211,996 UART: [ldev] FE.KEYID = 1
1,217,100 UART: [ldev] Erasing FE.KEYID = 1
1,242,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,914 UART: [ldev] --
1,282,323 UART: [fwproc] Wait for Commands...
1,283,115 UART: [fwproc] Recv command 0x46574c44
1,283,843 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,369 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,673 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,284 >>> mbox cmd response: success
2,773,460 UART: [afmc] ++
2,773,628 UART: [afmc] CDI.KEYID = 6
2,773,990 UART: [afmc] SUBJECT.KEYID = 7
2,774,415 UART: [afmc] AUTHORITY.KEYID = 5
2,810,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,433 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,046 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,765 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,675 UART: [afmc] --
2,853,761 UART: [cold-reset] --
2,854,633 UART: [state] Locking Datavault
2,856,128 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,732 UART: [state] Locking ICCM
2,857,368 UART: [exit] Launching FMC @ 0x40000130
2,862,697 UART:
2,862,713 UART: Running Caliptra FMC ...
2,863,121 UART:
2,863,264 UART: [state] CFI Enabled
2,873,741 UART: [fht] FMC Alias Private Key: 7
2,981,792 UART: [art] Extend RT PCRs Done
2,982,220 UART: [art] Lock RT PCRs Done
2,984,094 UART: [art] Populate DV Done
2,992,583 UART: [fht] FMC Alias Private Key: 7
2,993,725 UART: [art] Derive CDI
2,994,005 UART: [art] Store in in slot 0x4
3,079,854 UART: [art] Derive Key Pair
3,080,214 UART: [art] Store priv key in slot 0x5
3,093,564 UART: [art] Derive Key Pair - Done
3,108,097 UART: [art] Signing Cert with AUTHO
3,108,577 UART: RITY.KEYID = 7
3,123,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,398 UART: [art] PUB.X = CDD8D03293A9648B2218F3BAE030E8B8BD9990CBA570BF21CD7DBD675B464A2B39768BCC6C904999722B86808B449370
3,131,172 UART: [art] PUB.Y = C16A897570D58D066807D4E74D48E16EB90CBF2D9D57403A138780E46990499CC97E5ADA0CEA4187C56CCE31A75597CA
3,138,114 UART: [art] SIG.R = 5FF649A84BE78240D21B219EDA0C7042BFE0E239C0C858A2EAC93AEAD2BDA9BE4026B3BE184ED34FAF1FC8AFA0D53F4F
3,144,911 UART: [art] SIG.S = 64C704F03BD8D2B73F28F27A6E8EA72FC222BAD5EDCAF817E4214134D660E756F50A2C4DB3B1E63A009721EF2303BC59
3,168,833 UART: Caliptra RT
3,169,178 UART: [state] CFI Enabled
3,276,577 UART: [rt] RT listening for mailbox commands...
3,277,247 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,727 UART: [rt]cmd =0x53574545, len=84
3,310,793 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,520 ready_for_fw is high
1,060,520 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,839 >>> mbox cmd response: success
2,688,219 UART:
2,688,235 UART: Running Caliptra FMC ...
2,688,643 UART:
2,688,786 UART: [state] CFI Enabled
2,699,281 UART: [fht] FMC Alias Private Key: 7
2,807,526 UART: [art] Extend RT PCRs Done
2,807,954 UART: [art] Lock RT PCRs Done
2,808,966 UART: [art] Populate DV Done
2,817,147 UART: [fht] FMC Alias Private Key: 7
2,818,277 UART: [art] Derive CDI
2,818,557 UART: [art] Store in in slot 0x4
2,904,674 UART: [art] Derive Key Pair
2,905,034 UART: [art] Store priv key in slot 0x5
2,917,970 UART: [art] Derive Key Pair - Done
2,932,615 UART: [art] Signing Cert with AUTHO
2,933,095 UART: RITY.KEYID = 7
2,948,569 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,334 UART: [art] PUB.X = 8791C4748E5389DD0ACB39407D3A4A986F4F092929A4B79279569DAC94D92C8F46DAA4F8F5EBE669CB2FDC3B91929A3A
2,956,108 UART: [art] PUB.Y = 8931779917FEC71733B6B9F8A609912A6720F3B1CF5F743928288DBFB998C16CBEFE4D720B7C152BBAB7060572738E9E
2,963,048 UART: [art] SIG.R = CAAC86E1E379E273EAB9807C075080C7409D937AC07AB68A144ED7C92AC366573961357D19CA1602A4E06D1584B8BCE8
2,969,816 UART: [art] SIG.S = DFE22C1A1D3214693992D75FD61E9080076A952F5DE01B3E7403481780DB83136D07DA9B9134FA05F0D4EC9227698E32
2,994,349 UART: Caliptra RT
2,994,694 UART: [state] CFI Enabled
3,102,660 UART: [rt] RT listening for mailbox commands...
3,103,330 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,544 UART: [rt]cmd =0x53574545, len=84
3,136,448 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,861 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
899,931 UART: [kat] SHA2-256
901,871 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,772 UART: [kat] HMAC-384Kdf
921,420 UART: [kat] LMS
1,169,732 UART: [kat] --
1,170,617 UART: [cold-reset] ++
1,171,045 UART: [fht] FHT @ 0x50003400
1,173,657 UART: [idev] ++
1,173,825 UART: [idev] CDI.KEYID = 6
1,174,186 UART: [idev] SUBJECT.KEYID = 7
1,174,611 UART: [idev] UDS.KEYID = 0
1,174,957 ready_for_fw is high
1,174,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,775 UART: [idev] Erasing UDS.KEYID = 0
1,199,463 UART: [idev] Sha1 KeyId Algorithm
1,208,337 UART: [idev] --
1,209,472 UART: [ldev] ++
1,209,640 UART: [ldev] CDI.KEYID = 6
1,210,004 UART: [ldev] SUBJECT.KEYID = 5
1,210,431 UART: [ldev] AUTHORITY.KEYID = 7
1,210,894 UART: [ldev] FE.KEYID = 1
1,216,064 UART: [ldev] Erasing FE.KEYID = 1
1,242,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,712 UART: [ldev] --
1,282,100 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x46574c44
1,283,536 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,419 >>> mbox cmd response: success
2,772,534 UART: [afmc] ++
2,772,702 UART: [afmc] CDI.KEYID = 6
2,773,065 UART: [afmc] SUBJECT.KEYID = 7
2,773,491 UART: [afmc] AUTHORITY.KEYID = 5
2,808,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,310 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,061 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,790 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,073 UART: [afmc] --
2,851,999 UART: [cold-reset] --
2,853,015 UART: [state] Locking Datavault
2,854,026 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,630 UART: [state] Locking ICCM
2,855,054 UART: [exit] Launching FMC @ 0x40000130
2,860,383 UART:
2,860,399 UART: Running Caliptra FMC ...
2,860,807 UART:
2,860,861 UART: [state] CFI Enabled
2,871,300 UART: [fht] FMC Alias Private Key: 7
2,978,983 UART: [art] Extend RT PCRs Done
2,979,411 UART: [art] Lock RT PCRs Done
2,980,841 UART: [art] Populate DV Done
2,989,374 UART: [fht] FMC Alias Private Key: 7
2,990,502 UART: [art] Derive CDI
2,990,782 UART: [art] Store in in slot 0x4
3,076,283 UART: [art] Derive Key Pair
3,076,643 UART: [art] Store priv key in slot 0x5
3,089,279 UART: [art] Derive Key Pair - Done
3,103,998 UART: [art] Signing Cert with AUTHO
3,104,478 UART: RITY.KEYID = 7
3,119,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,549 UART: [art] PUB.X = 1C1BF201AEC284D9E19B17A1C130722D521FD86CA1EF71A2FF5A80980BF2E208E6B44F89C870561A0A41A03FE3D77BB1
3,127,319 UART: [art] PUB.Y = D1A97B41C3551388DBB83E56843B276B01F5EA6A5C50B6549112850DDA5CACB544124B95E348CD2538D22990341B1229
3,134,259 UART: [art] SIG.R = C06C308030529F9C869BB8D425FC1C48682D3B2DCA49694442BA7A698E76A9320DB2C5B89A0B9DE42E932E70592FE480
3,141,025 UART: [art] SIG.S = 3702B9FED57767A6D586EC39AEDEF5D399D39EFD2700E40567BB70385C324AA8DEFC992A949C17B356D57D0DA0F6D327
3,165,081 UART: Caliptra RT
3,165,334 UART: [state] CFI Enabled
3,272,933 UART: [rt] RT listening for mailbox commands...
3,273,603 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,121 UART: [rt]cmd =0x53574545, len=84
3,307,647 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,810 ready_for_fw is high
1,055,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,927 >>> mbox cmd response: success
2,680,659 UART:
2,680,675 UART: Running Caliptra FMC ...
2,681,083 UART:
2,681,137 UART: [state] CFI Enabled
2,691,736 UART: [fht] FMC Alias Private Key: 7
2,800,187 UART: [art] Extend RT PCRs Done
2,800,615 UART: [art] Lock RT PCRs Done
2,802,297 UART: [art] Populate DV Done
2,810,404 UART: [fht] FMC Alias Private Key: 7
2,811,404 UART: [art] Derive CDI
2,811,684 UART: [art] Store in in slot 0x4
2,897,523 UART: [art] Derive Key Pair
2,897,883 UART: [art] Store priv key in slot 0x5
2,911,141 UART: [art] Derive Key Pair - Done
2,925,914 UART: [art] Signing Cert with AUTHO
2,926,394 UART: RITY.KEYID = 7
2,941,420 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,185 UART: [art] PUB.X = F24A9FFB12AAD5422FCD34B4E6898FB2806273D09B177990FF0A1564D87045301D2A1AB9B09D3A7C39B0AF4005B0F673
2,948,955 UART: [art] PUB.Y = 5631FE72E2807F4D96E6293CCE7326CCD5E3F76D4D73D07F3CCBBBDE7BEF7349553BDC32C2B3F5191D15BB836C55B415
2,955,921 UART: [art] SIG.R = DB8C93FE3AAE668987524F32E1AC422FF11D8FB17FE2E03FC50AA22E3009100DE2820FC11A89C879A50C4737F38D72DF
2,962,688 UART: [art] SIG.S = 64F47E3B9704E69B69C8C8FC442BD27D075B8198C4DC323E6D706351E26C3F7318DDADBA734023DE6F913D37A328CD19
2,986,739 UART: Caliptra RT
2,986,992 UART: [state] CFI Enabled
3,095,531 UART: [rt] RT listening for mailbox commands...
3,096,201 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,631 UART: [rt]cmd =0x53574545, len=84
3,129,655 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,725 UART: [kat] HMAC-384Kdf
921,283 UART: [kat] LMS
1,169,595 UART: [kat] --
1,170,376 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,388 UART: [idev] ++
1,173,556 UART: [idev] CDI.KEYID = 6
1,173,917 UART: [idev] SUBJECT.KEYID = 7
1,174,342 UART: [idev] UDS.KEYID = 0
1,174,688 ready_for_fw is high
1,174,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,199,264 UART: [idev] Sha1 KeyId Algorithm
1,208,040 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,733 UART: [ldev] Erasing FE.KEYID = 1
1,241,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,655 UART: [ldev] --
1,280,949 UART: [fwproc] Wait for Commands...
1,281,574 UART: [fwproc] Recv command 0x46574c44
1,282,307 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,071 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,380 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,834 >>> mbox cmd response: success
2,770,941 UART: [afmc] ++
2,771,109 UART: [afmc] CDI.KEYID = 6
2,771,472 UART: [afmc] SUBJECT.KEYID = 7
2,771,898 UART: [afmc] AUTHORITY.KEYID = 5
2,807,743 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,662 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,381 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,294 UART: [afmc] --
2,851,334 UART: [cold-reset] --
2,852,102 UART: [state] Locking Datavault
2,853,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,867 UART: [state] Locking ICCM
2,854,537 UART: [exit] Launching FMC @ 0x40000130
2,859,866 UART:
2,859,882 UART: Running Caliptra FMC ...
2,860,290 UART:
2,860,433 UART: [state] CFI Enabled
2,870,798 UART: [fht] FMC Alias Private Key: 7
2,978,627 UART: [art] Extend RT PCRs Done
2,979,055 UART: [art] Lock RT PCRs Done
2,980,409 UART: [art] Populate DV Done
2,988,454 UART: [fht] FMC Alias Private Key: 7
2,989,564 UART: [art] Derive CDI
2,989,844 UART: [art] Store in in slot 0x4
3,075,641 UART: [art] Derive Key Pair
3,076,001 UART: [art] Store priv key in slot 0x5
3,089,123 UART: [art] Derive Key Pair - Done
3,104,076 UART: [art] Signing Cert with AUTHO
3,104,556 UART: RITY.KEYID = 7
3,119,708 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,473 UART: [art] PUB.X = C6D0AE46D5C3A032652B92B285BB83D0778B70261FC515833EDB4CB90AC35831B6AC3AB2DA5C91C8F9F838D728B16D6D
3,127,252 UART: [art] PUB.Y = A1E5A0F172D5E937B220953BF37969AC6F2BE77F30AF3845F28F204214D10CA73D03E132B7A67C3AF85C346337DB6A3C
3,134,202 UART: [art] SIG.R = CED581729C7987D2D87A4985BFDB57CC19DECAFD5716DF26382840848C2420A96504A927707E835527A85CD8D8789223
3,140,965 UART: [art] SIG.S = E75DD5C4EF37EAC6985CE2379E572AE210CEC910991BE867D403EFEA52C3E879B0BE5AFEDED40237A1CD5CB2DC932525
3,164,796 UART: Caliptra RT
3,165,141 UART: [state] CFI Enabled
3,271,911 UART: [rt] RT listening for mailbox commands...
3,272,581 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,219 UART: [rt]cmd =0x53574545, len=84
3,306,239 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,393 ready_for_fw is high
1,056,393 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,230 >>> mbox cmd response: success
2,684,664 UART:
2,684,680 UART: Running Caliptra FMC ...
2,685,088 UART:
2,685,231 UART: [state] CFI Enabled
2,695,712 UART: [fht] FMC Alias Private Key: 7
2,804,627 UART: [art] Extend RT PCRs Done
2,805,055 UART: [art] Lock RT PCRs Done
2,806,421 UART: [art] Populate DV Done
2,814,568 UART: [fht] FMC Alias Private Key: 7
2,815,564 UART: [art] Derive CDI
2,815,844 UART: [art] Store in in slot 0x4
2,901,765 UART: [art] Derive Key Pair
2,902,125 UART: [art] Store priv key in slot 0x5
2,915,567 UART: [art] Derive Key Pair - Done
2,930,574 UART: [art] Signing Cert with AUTHO
2,931,054 UART: RITY.KEYID = 7
2,946,416 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,181 UART: [art] PUB.X = DD0739360FCEEA9BF004A9BF9F12F441B24E96AEDC7861ADD7C6C3792E66625FDBDF3815B7AD268556A9800BF1559C24
2,953,953 UART: [art] PUB.Y = 1951F59A86DB1EFCDC96B81E456F96974491C0016D266C2B86838CBF45ECE6A53B0CE8E8D2B8CC5037CA5BC816D91EBD
2,960,913 UART: [art] SIG.R = F4FAAE225DFD34F5B5454688326B581C3F2A1E6D197B4B0B17BDC718F0B2D3EC93705E4BC0C6F2BF4680F2C699211B5A
2,967,694 UART: [art] SIG.S = C2319142CAF6AF3955AEA209DE1595ED7FB45604E51CF88C89A20F7944D62911AA0588FF549803335DE4B5B99CEC86C8
2,992,176 UART: Caliptra RT
2,992,521 UART: [state] CFI Enabled
3,100,715 UART: [rt] RT listening for mailbox commands...
3,101,385 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,565 UART: [rt]cmd =0x53574545, len=84
3,134,821 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,076 UART:
192,428 UART: Running Caliptra ROM ...
193,611 UART:
193,762 UART: [state] CFI Enabled
264,625 UART: [state] LifecycleState = Unprovisioned
266,609 UART: [state] DebugLocked = No
268,073 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,306 UART: [kat] SHA2-256
443,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,582 UART: [kat] ++
454,055 UART: [kat] sha1
464,804 UART: [kat] SHA2-256
467,463 UART: [kat] SHA2-384
474,766 UART: [kat] SHA2-512-ACC
477,111 UART: [kat] ECC-384
2,769,720 UART: [kat] HMAC-384Kdf
2,801,504 UART: [kat] LMS
3,991,787 UART: [kat] --
3,997,400 UART: [cold-reset] ++
4,000,032 UART: [fht] Storing FHT @ 0x50003400
4,011,440 UART: [idev] ++
4,011,999 UART: [idev] CDI.KEYID = 6
4,012,974 UART: [idev] SUBJECT.KEYID = 7
4,014,212 UART: [idev] UDS.KEYID = 0
4,015,185 ready_for_fw is high
4,015,372 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,158,550 UART: [idev] Erasing UDS.KEYID = 0
7,347,732 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,918 UART: [idev] --
7,372,885 UART: [ldev] ++
7,373,457 UART: [ldev] CDI.KEYID = 6
7,374,416 UART: [ldev] SUBJECT.KEYID = 5
7,375,624 UART: [ldev] AUTHORITY.KEYID = 7
7,376,900 UART: [ldev] FE.KEYID = 1
7,403,053 UART: [ldev] Erasing FE.KEYID = 1
10,738,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,928 UART: [ldev] --
13,117,115 UART: [fwproc] Waiting for Commands...
13,120,396 UART: [fwproc] Received command 0x46574c44
13,122,594 UART: [fwproc] Received Image of size 113844 bytes
17,178,772 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,253,567 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,322,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,637,875 >>> mbox cmd response: success
17,641,378 UART: [afmc] ++
17,641,972 UART: [afmc] CDI.KEYID = 6
17,642,879 UART: [afmc] SUBJECT.KEYID = 7
17,644,143 UART: [afmc] AUTHORITY.KEYID = 5
21,012,542 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,310,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,694 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,327,089 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,901 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,356,421 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,377,929 UART: [afmc] --
23,382,355 UART: [cold-reset] --
23,385,678 UART: [state] Locking Datavault
23,390,971 UART: [state] Locking PCR0, PCR1 and PCR31
23,392,720 UART: [state] Locking ICCM
23,394,107 UART: [exit] Launching FMC @ 0x40000130
23,402,443 UART:
23,402,680 UART: Running Caliptra FMC ...
23,403,774 UART:
23,403,929 UART: [state] CFI Enabled
23,470,266 UART: [fht] FMC Alias Private Key: 7
25,808,303 UART: [art] Extend RT PCRs Done
25,809,522 UART: [art] Lock RT PCRs Done
25,811,189 UART: [art] Populate DV Done
25,816,588 UART: [fht] FMC Alias Private Key: 7
25,818,117 UART: [art] Derive CDI
25,818,872 UART: [art] Store in in slot 0x4
25,877,982 UART: [art] Derive Key Pair
25,879,016 UART: [art] Store priv key in slot 0x5
29,171,756 UART: [art] Derive Key Pair - Done
29,184,646 UART: [art] Signing Cert with AUTHO
29,185,936 UART: RITY.KEYID = 7
31,473,106 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,610 UART: [art] PUB.X = F53209E520403C59BA40EBE28073B52874C07209F75702E5253D4A2F1C1B796CBC26E73044921E842C6E576DA4F02B03
31,481,818 UART: [art] PUB.Y = 5963C56C151F049652403C82ABF032E76AF17D00B37CF23DF3AC1218EFE2DE7EF86A635BB8CFEC0160CAABD8865C76BF
31,489,121 UART: [art] SIG.R = DB5044CE2C18044B83EE7BE33A9DF84C304418682B9C1B062DD0C1C0F43C9A25611199E02A118ECA0964963C76AEF29F
31,496,531 UART: [art] SIG.S = 4CB92DA57DC9561E246EFCB310522EC5EC47BE7F3CC0B5263112804CB9E10E831C634F2AA122923B6CCBCFAEB76E97B7
32,801,505 UART: Caliptra RT
32,802,218 UART: [state] CFI Enabled
32,983,028 UART: [rt] RT listening for mailbox commands...
32,985,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,016,422 UART: [rt]cmd =0x44504543, len=96
38,800,451 >>> mbox cmd response data (6236 bytes)
38,829,722 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,860,329 UART: [rt]cmd =0x53574545, len=84
44,446,828 >>> mbox cmd response data (200 bytes)
44,830,537 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,860,950 UART: [rt]cmd =0x52564348, len=36
44,863,741 >>> mbox cmd response data (8 bytes)
44,864,115 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,894,659 UART: [rt]cmd =0x53574545, len=84
44,898,081 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,783,726 ready_for_fw is high
3,784,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,846,553 >>> mbox cmd response: success
23,549,596 UART:
23,549,982 UART: Running Caliptra FMC ...
23,551,100 UART:
23,551,251 UART: [state] CFI Enabled
23,616,772 UART: [fht] FMC Alias Private Key: 7
25,954,224 UART: [art] Extend RT PCRs Done
25,955,445 UART: [art] Lock RT PCRs Done
25,957,421 UART: [art] Populate DV Done
25,962,609 UART: [fht] FMC Alias Private Key: 7
25,964,090 UART: [art] Derive CDI
25,964,851 UART: [art] Store in in slot 0x4
26,025,634 UART: [art] Derive Key Pair
26,026,674 UART: [art] Store priv key in slot 0x5
29,320,058 UART: [art] Derive Key Pair - Done
29,333,171 UART: [art] Signing Cert with AUTHO
29,334,469 UART: RITY.KEYID = 7
31,621,032 UART: [art] Erasing AUTHORITY.KEYID = 7
31,622,555 UART: [art] PUB.X = A6AA156D39587C1432F61482E264211163BCEE93B80E2EF11C2C0AEFBF7294574C866421361A3A47960E568EC7866638
31,629,788 UART: [art] PUB.Y = 27234C7BE0E085E8D9D3C1D94B3D28BE4F59339CB9C768406E6AAA8D69217347D79298311DB98DFE58110955E2EA3944
31,636,997 UART: [art] SIG.R = 98132E3C382D73700B46010635F227CC1CF3F865CA7BA2A157E0CA5AE884BDD44D1C187EE4C7911932E36BEBA277CAC4
31,644,358 UART: [art] SIG.S = 9414D4F74BCB56922A8F998BF140E1CF65DEF629C4971D0CD78A0AE5C74AA9BCD4229BC7F5A9F1867618EAF2D8B5D0DC
32,949,550 UART: Caliptra RT
32,950,244 UART: [state] CFI Enabled
33,111,013 UART: [rt] RT listening for mailbox commands...
33,113,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,144,531 UART: [rt]cmd =0x44504543, len=96
38,927,425 >>> mbox cmd response data (6236 bytes)
38,956,628 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,987,154 UART: [rt]cmd =0x53574545, len=84
44,572,255 >>> mbox cmd response data (200 bytes)
44,959,671 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,989,885 UART: [rt]cmd =0x52564348, len=36
44,992,355 >>> mbox cmd response data (8 bytes)
44,992,707 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,023,158 UART: [rt]cmd =0x53574545, len=84
45,026,792 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,544 UART:
192,902 UART: Running Caliptra ROM ...
194,080 UART:
603,715 UART: [state] CFI Enabled
616,526 UART: [state] LifecycleState = Unprovisioned
618,484 UART: [state] DebugLocked = No
619,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,941 UART: [kat] SHA2-256
794,722 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,235 UART: [kat] ++
805,708 UART: [kat] sha1
816,017 UART: [kat] SHA2-256
818,752 UART: [kat] SHA2-384
825,097 UART: [kat] SHA2-512-ACC
827,464 UART: [kat] ECC-384
3,110,966 UART: [kat] HMAC-384Kdf
3,122,952 UART: [kat] LMS
4,313,019 UART: [kat] --
4,318,392 UART: [cold-reset] ++
4,320,681 UART: [fht] Storing FHT @ 0x50003400
4,332,372 UART: [idev] ++
4,332,964 UART: [idev] CDI.KEYID = 6
4,333,929 UART: [idev] SUBJECT.KEYID = 7
4,335,173 UART: [idev] UDS.KEYID = 0
4,336,168 ready_for_fw is high
4,336,360 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,415 UART: [idev] Erasing UDS.KEYID = 0
7,624,439 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,082 UART: [idev] --
7,650,560 UART: [ldev] ++
7,651,185 UART: [ldev] CDI.KEYID = 6
7,652,130 UART: [ldev] SUBJECT.KEYID = 5
7,653,345 UART: [ldev] AUTHORITY.KEYID = 7
7,654,574 UART: [ldev] FE.KEYID = 1
7,666,840 UART: [ldev] Erasing FE.KEYID = 1
10,958,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,262 UART: [ldev] --
13,318,790 UART: [fwproc] Waiting for Commands...
13,320,935 UART: [fwproc] Received command 0x46574c44
13,323,118 UART: [fwproc] Received Image of size 113844 bytes
17,373,063 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,496 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,343 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,835,963 >>> mbox cmd response: success
17,839,368 UART: [afmc] ++
17,839,988 UART: [afmc] CDI.KEYID = 6
17,840,920 UART: [afmc] SUBJECT.KEYID = 7
17,842,139 UART: [afmc] AUTHORITY.KEYID = 5
21,157,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,461 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,774 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,109 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,481,978 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,395 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,517,652 UART: [afmc] --
23,521,011 UART: [cold-reset] --
23,524,784 UART: [state] Locking Datavault
23,530,627 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,380 UART: [state] Locking ICCM
23,535,021 UART: [exit] Launching FMC @ 0x40000130
23,543,364 UART:
23,543,608 UART: Running Caliptra FMC ...
23,544,715 UART:
23,544,879 UART: [state] CFI Enabled
23,552,929 UART: [fht] FMC Alias Private Key: 7
25,884,085 UART: [art] Extend RT PCRs Done
25,885,306 UART: [art] Lock RT PCRs Done
25,886,689 UART: [art] Populate DV Done
25,892,264 UART: [fht] FMC Alias Private Key: 7
25,893,960 UART: [art] Derive CDI
25,894,700 UART: [art] Store in in slot 0x4
25,937,282 UART: [art] Derive Key Pair
25,938,316 UART: [art] Store priv key in slot 0x5
29,181,083 UART: [art] Derive Key Pair - Done
29,193,804 UART: [art] Signing Cert with AUTHO
29,195,130 UART: RITY.KEYID = 7
31,474,218 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,726 UART: [art] PUB.X = 3214A47210E93688F2469D9BE5526BD3E3CC650CD9AD1572E7A7A3282E939237564398FCBB7175C60806CB67C00B13EF
31,482,988 UART: [art] PUB.Y = 5441E7A581F661917F2D47691DAAA0FD149B72C343B78DC0940CEB9ACC9980077A397E8643C787F23E4149ECA5756312
31,490,184 UART: [art] SIG.R = D4F99FFE708D6380A64CFA16BBBC45CD02EA12BAC25D042A585B7E2E494C96FC683CD5950F8D5D70FA69428D4D8B3CAC
31,497,589 UART: [art] SIG.S = 327C636A184A190B3981FF9EC115167A73CDEB87775B2AB471628CE79B8B3D07A37BB5B53328C4ECEB51E76289EE87BE
32,802,733 UART: Caliptra RT
32,803,447 UART: [state] CFI Enabled
32,919,865 UART: [rt] RT listening for mailbox commands...
32,922,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
32,953,466 UART: [rt]cmd =0x44504543, len=96
38,626,627 >>> mbox cmd response data (6236 bytes)
38,656,069 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,686,868 UART: [rt]cmd =0x53574545, len=84
44,211,042 >>> mbox cmd response data (200 bytes)
44,594,428 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,624,572 UART: [rt]cmd =0x52564348, len=36
44,627,005 >>> mbox cmd response data (8 bytes)
44,627,360 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,657,838 UART: [rt]cmd =0x53574545, len=84
44,661,384 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
4,126,646 ready_for_fw is high
4,127,183 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,071,890 >>> mbox cmd response: success
23,715,625 UART:
23,716,025 UART: Running Caliptra FMC ...
23,717,133 UART:
23,717,301 UART: [state] CFI Enabled
23,725,264 UART: [fht] FMC Alias Private Key: 7
26,056,875 UART: [art] Extend RT PCRs Done
26,058,330 UART: [art] Lock RT PCRs Done
26,059,349 UART: [art] Populate DV Done
26,064,860 UART: [fht] FMC Alias Private Key: 7
26,066,357 UART: [art] Derive CDI
26,067,130 UART: [art] Store in in slot 0x4
26,109,422 UART: [art] Derive Key Pair
26,110,465 UART: [art] Store priv key in slot 0x5
29,352,671 UART: [art] Derive Key Pair - Done
29,365,829 UART: [art] Signing Cert with AUTHO
29,367,185 UART: RITY.KEYID = 7
31,646,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,626 UART: [art] PUB.X = F0488F9B35C2C28980B463C0B40BFAC57C30A1F1BA43E22BF0F1D05B9D9C0A5248E9996730E1D0D65684F546AFA00C9F
31,654,884 UART: [art] PUB.Y = 01C7BF4C7CCA4CC68B7B9BA3FDE28C19A46AFC5345159DE3BD7B9D5B5B5F7BB8986BD65CC6136D5CD154F9D10681A682
31,662,137 UART: [art] SIG.R = 15D5BD394A837802CEFB7422A5793C5BEAA02C578C941D504BC9E019B6488C0E230A8DF12EBF47E28AD0B9C95D3474C2
31,669,536 UART: [art] SIG.S = EF363B85F173714B6B051FEDD3E789416F758D360E2C2832858D73ACFFC68B74D09CE5C21ABBE196C38427FCAB87FB4D
32,974,178 UART: Caliptra RT
32,974,901 UART: [state] CFI Enabled
33,093,104 UART: [rt] RT listening for mailbox commands...
33,095,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,126,820 UART: [rt]cmd =0x44504543, len=96
38,798,789 >>> mbox cmd response data (6236 bytes)
38,828,168 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,858,844 UART: [rt]cmd =0x53574545, len=84
44,383,214 >>> mbox cmd response data (200 bytes)
44,768,046 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,798,236 UART: [rt]cmd =0x52564348, len=36
44,800,815 >>> mbox cmd response data (8 bytes)
44,801,262 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,831,717 UART: [rt]cmd =0x53574545, len=84
44,835,709 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,273 UART:
193,019 UART: Running Caliptra ROM ...
194,230 UART:
194,386 UART: [state] CFI Enabled
265,025 UART: [state] LifecycleState = Unprovisioned
266,816 UART: [state] DebugLocked = No
269,336 UART: [state] WD Timer not started. Device not locked for debugging
273,726 UART: [kat] SHA2-256
452,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,378 UART: [kat] ++
464,832 UART: [kat] sha1
475,989 UART: [kat] SHA2-256
478,999 UART: [kat] SHA2-384
483,874 UART: [kat] SHA2-512-ACC
486,812 UART: [kat] ECC-384
2,947,374 UART: [kat] HMAC-384Kdf
2,971,702 UART: [kat] LMS
3,501,137 UART: [kat] --
3,505,516 UART: [cold-reset] ++
3,507,520 UART: [fht] FHT @ 0x50003400
3,517,572 UART: [idev] ++
3,518,141 UART: [idev] CDI.KEYID = 6
3,519,092 UART: [idev] SUBJECT.KEYID = 7
3,520,269 UART: [idev] UDS.KEYID = 0
3,521,190 ready_for_fw is high
3,521,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,969 UART: [idev] Erasing UDS.KEYID = 0
6,025,625 UART: [idev] Sha1 KeyId Algorithm
6,048,366 UART: [idev] --
6,051,708 UART: [ldev] ++
6,052,297 UART: [ldev] CDI.KEYID = 6
6,053,188 UART: [ldev] SUBJECT.KEYID = 5
6,054,404 UART: [ldev] AUTHORITY.KEYID = 7
6,055,639 UART: [ldev] FE.KEYID = 1
6,098,647 UART: [ldev] Erasing FE.KEYID = 1
8,601,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,765 UART: [ldev] --
10,412,705 UART: [fwproc] Wait for Commands...
10,414,968 UART: [fwproc] Recv command 0x46574c44
10,417,062 UART: [fwproc] Recv'd Img size: 114168 bytes
13,816,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,918 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,719 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,279,575 >>> mbox cmd response: success
14,283,701 UART: [afmc] ++
14,284,296 UART: [afmc] CDI.KEYID = 6
14,285,209 UART: [afmc] SUBJECT.KEYID = 7
14,286,372 UART: [afmc] AUTHORITY.KEYID = 5
16,835,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,572 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,591,322 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,607,351 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,623,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,645,529 UART: [afmc] --
18,648,801 UART: [cold-reset] --
18,652,391 UART: [state] Locking Datavault
18,656,308 UART: [state] Locking PCR0, PCR1 and PCR31
18,657,954 UART: [state] Locking ICCM
18,660,593 UART: [exit] Launching FMC @ 0x40000130
18,668,995 UART:
18,669,230 UART: Running Caliptra FMC ...
18,670,328 UART:
18,670,488 UART: [state] CFI Enabled
18,732,802 UART: [fht] FMC Alias Private Key: 7
20,497,100 UART: [art] Extend RT PCRs Done
20,498,319 UART: [art] Lock RT PCRs Done
20,499,892 UART: [art] Populate DV Done
20,504,979 UART: [fht] FMC Alias Private Key: 7
20,506,624 UART: [art] Derive CDI
20,507,439 UART: [art] Store in in slot 0x4
20,565,674 UART: [art] Derive Key Pair
20,566,712 UART: [art] Store priv key in slot 0x5
23,029,771 UART: [art] Derive Key Pair - Done
23,042,731 UART: [art] Signing Cert with AUTHO
23,044,047 UART: RITY.KEYID = 7
24,754,849 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,360 UART: [art] PUB.X = 128E284E6D0B297FB6C640FBF56C3AF35B2263F195328038CF9D388CAB4FBBDA6A58A38FF2B921FF7236C8B514F3D078
24,763,666 UART: [art] PUB.Y = 20F8FA7022951B0B7412DB34F427345220D49BEE06AF1E98DF025D2C8761B84F9F73F6FF3D4BDC8A3B134A0EF2F2EF50
24,770,960 UART: [art] SIG.R = 5345D651FBDB7EF4BBD98AA583DD3CA7EE0902898F1459B4FD26B3163E2285388DA8258AC2DAAD72310963433C0CA233
24,778,342 UART: [art] SIG.S = 1AE2AABA8F5D4051DD5FB9128F49E3C54A3E43FEB604F0B113A9645CDC037DE4A049DDB6897008CE35FCE2F93CA952EE
25,757,398 UART: Caliptra RT
25,758,112 UART: [state] CFI Enabled
25,922,144 UART: [rt] RT listening for mailbox commands...
25,924,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,955,765 UART: [rt]cmd =0x44504543, len=96
30,334,325 >>> mbox cmd response data (6236 bytes)
30,363,793 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,394,527 UART: [rt]cmd =0x53574545, len=84
34,565,738 >>> mbox cmd response data (200 bytes)
34,955,509 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,985,745 UART: [rt]cmd =0x52564348, len=36
34,988,264 >>> mbox cmd response data (8 bytes)
34,988,610 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,018,990 UART: [rt]cmd =0x53574545, len=84
35,022,634 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,358,718 ready_for_fw is high
3,359,318 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,022,658 >>> mbox cmd response: success
18,303,134 UART:
18,303,524 UART: Running Caliptra FMC ...
18,304,712 UART:
18,304,884 UART: [state] CFI Enabled
18,368,673 UART: [fht] FMC Alias Private Key: 7
20,132,089 UART: [art] Extend RT PCRs Done
20,133,325 UART: [art] Lock RT PCRs Done
20,134,960 UART: [art] Populate DV Done
20,140,375 UART: [fht] FMC Alias Private Key: 7
20,142,080 UART: [art] Derive CDI
20,142,902 UART: [art] Store in in slot 0x4
20,201,427 UART: [art] Derive Key Pair
20,202,474 UART: [art] Store priv key in slot 0x5
22,665,906 UART: [art] Derive Key Pair - Done
22,678,964 UART: [art] Signing Cert with AUTHO
22,680,267 UART: RITY.KEYID = 7
24,391,460 UART: [art] Erasing AUTHORITY.KEYID = 7
24,392,964 UART: [art] PUB.X = CCBAD23CEA88A8125FAE4E8B34818BE91621C599D674091CB818150617776FE7C591149D0F464ECD8CB4E11A8A414131
24,400,250 UART: [art] PUB.Y = DDCA6DCDA1A6338F83BD1A0368ECBFB48A7EE2252B0B9D7634D970B80013E7F0C5312EBD0E3F762437953D6D0C7C3DB8
24,407,545 UART: [art] SIG.R = A85D41F2C1D90C742CC22A7C4266CDFBB0C3AC4B3F539CD4CE82631DCC584905A7489FA65FCE9E1BDFDF3D7B84E3BC0E
24,414,928 UART: [art] SIG.S = A559B5A74B2FE4253ABB30B322D78A040F2DC8FEDFE96C8485B4B16830F68C60E4CB2F2564A1D539E484917284F530FF
25,394,108 UART: Caliptra RT
25,394,828 UART: [state] CFI Enabled
25,560,333 UART: [rt] RT listening for mailbox commands...
25,562,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,593,671 UART: [rt]cmd =0x44504543, len=96
29,971,533 >>> mbox cmd response data (6236 bytes)
30,000,917 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,031,330 UART: [rt]cmd =0x53574545, len=84
34,208,881 >>> mbox cmd response data (200 bytes)
34,597,683 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,628,071 UART: [rt]cmd =0x52564348, len=36
34,630,713 >>> mbox cmd response data (8 bytes)
34,631,156 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,661,549 UART: [rt]cmd =0x53574545, len=84
34,665,300 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,695 writing to cptra_bootfsm_go
192,966 UART:
193,351 UART: Running Caliptra ROM ...
194,504 UART:
604,019 UART: [state] CFI Enabled
615,705 UART: [state] LifecycleState = Unprovisioned
617,502 UART: [state] DebugLocked = No
620,165 UART: [state] WD Timer not started. Device not locked for debugging
624,553 UART: [kat] SHA2-256
803,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,296 UART: [kat] ++
815,827 UART: [kat] sha1
825,993 UART: [kat] SHA2-256
828,999 UART: [kat] SHA2-384
835,341 UART: [kat] SHA2-512-ACC
838,348 UART: [kat] ECC-384
3,282,983 UART: [kat] HMAC-384Kdf
3,296,777 UART: [kat] LMS
3,826,237 UART: [kat] --
3,830,899 UART: [cold-reset] ++
3,831,834 UART: [fht] FHT @ 0x50003400
3,842,276 UART: [idev] ++
3,842,883 UART: [idev] CDI.KEYID = 6
3,843,803 UART: [idev] SUBJECT.KEYID = 7
3,844,975 UART: [idev] UDS.KEYID = 0
3,845,904 ready_for_fw is high
3,846,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,388 UART: [idev] Erasing UDS.KEYID = 0
6,319,504 UART: [idev] Sha1 KeyId Algorithm
6,341,589 UART: [idev] --
6,344,003 UART: [ldev] ++
6,344,572 UART: [ldev] CDI.KEYID = 6
6,345,537 UART: [ldev] SUBJECT.KEYID = 5
6,346,694 UART: [ldev] AUTHORITY.KEYID = 7
6,347,946 UART: [ldev] FE.KEYID = 1
6,358,861 UART: [ldev] Erasing FE.KEYID = 1
8,835,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,662 UART: [ldev] --
10,628,760 UART: [fwproc] Wait for Commands...
10,631,613 UART: [fwproc] Recv command 0x46574c44
10,633,699 UART: [fwproc] Recv'd Img size: 114168 bytes
14,036,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,706 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,180,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,497,952 >>> mbox cmd response: success
14,502,874 UART: [afmc] ++
14,503,492 UART: [afmc] CDI.KEYID = 6
14,504,410 UART: [afmc] SUBJECT.KEYID = 7
14,505,518 UART: [afmc] AUTHORITY.KEYID = 5
17,008,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,746,373 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,762,407 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,778,278 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,375 UART: [afmc] --
18,804,737 UART: [cold-reset] --
18,808,819 UART: [state] Locking Datavault
18,815,089 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,734 UART: [state] Locking ICCM
18,817,965 UART: [exit] Launching FMC @ 0x40000130
18,826,358 UART:
18,826,612 UART: Running Caliptra FMC ...
18,827,714 UART:
18,827,878 UART: [state] CFI Enabled
18,836,247 UART: [fht] FMC Alias Private Key: 7
20,593,630 UART: [art] Extend RT PCRs Done
20,594,863 UART: [art] Lock RT PCRs Done
20,596,352 UART: [art] Populate DV Done
20,601,655 UART: [fht] FMC Alias Private Key: 7
20,603,354 UART: [art] Derive CDI
20,604,166 UART: [art] Store in in slot 0x4
20,646,488 UART: [art] Derive Key Pair
20,647,521 UART: [art] Store priv key in slot 0x5
23,074,432 UART: [art] Derive Key Pair - Done
23,087,271 UART: [art] Signing Cert with AUTHO
23,088,581 UART: RITY.KEYID = 7
24,794,148 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,796 UART: [art] PUB.X = 73954B01D7F9B1D84E8EAEC3C4A1658BA967B4CB2CFE0E98F920CB872A07FB90E83168C404B23A572F3A933261D3EF6F
24,802,953 UART: [art] PUB.Y = 334FC46235EC741AEC2BBFC3B41CB1C71536F64304194930CED8DC9A55D01A0649F1E201B22085634A62971F35BFDFA8
24,810,187 UART: [art] SIG.R = DCBC57139A545CAF24E2AF2CBFFEF7555544423ADA335E857FF9013060CE61AAA82BF494232E4268B979D94B3CC8BCA3
24,817,632 UART: [art] SIG.S = 08308F73FC70E090051B1AEE0A98C1AE0EA61879FE7680773C091762630556CED9452B9F56F781AE9D56C8222F16EEC2
25,797,203 UART: Caliptra RT
25,797,900 UART: [state] CFI Enabled
25,915,725 UART: [rt] RT listening for mailbox commands...
25,918,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,949,428 UART: [rt]cmd =0x44504543, len=96
30,232,644 >>> mbox cmd response data (6236 bytes)
30,262,007 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,292,743 UART: [rt]cmd =0x53574545, len=84
34,428,093 >>> mbox cmd response data (200 bytes)
34,812,745 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,842,957 UART: [rt]cmd =0x52564348, len=36
34,845,261 >>> mbox cmd response data (8 bytes)
34,845,609 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,875,831 UART: [rt]cmd =0x53574545, len=84
34,879,274 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
3,692,739 ready_for_fw is high
3,693,155 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,065 >>> mbox cmd response: success
18,512,249 UART:
18,512,643 UART: Running Caliptra FMC ...
18,513,834 UART:
18,514,007 UART: [state] CFI Enabled
18,522,069 UART: [fht] FMC Alias Private Key: 7
20,278,991 UART: [art] Extend RT PCRs Done
20,280,207 UART: [art] Lock RT PCRs Done
20,281,833 UART: [art] Populate DV Done
20,286,871 UART: [fht] FMC Alias Private Key: 7
20,288,419 UART: [art] Derive CDI
20,289,236 UART: [art] Store in in slot 0x4
20,331,830 UART: [art] Derive Key Pair
20,332,827 UART: [art] Store priv key in slot 0x5
22,759,288 UART: [art] Derive Key Pair - Done
22,772,211 UART: [art] Signing Cert with AUTHO
22,773,514 UART: RITY.KEYID = 7
24,479,006 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,522 UART: [art] PUB.X = 1B807678941B0187CA369AE78C0F4067B990AF57D83D68747268828CC8AC43A6F23A09E08DDB54AEEB181E1E4B5024AF
24,487,775 UART: [art] PUB.Y = 565BA511BECE825CEEC13D1417289839799D8764ECB90F6525CA13D636E6979825082A08C9A70F00B0A5AB7A38B63B9E
24,494,978 UART: [art] SIG.R = 3A63492F899F76351A04FA16BBC0C35C720FA2E8742EF7F458743F7AC74B2852DC138F9DF1A671DDE1C180F820DF566C
24,502,380 UART: [art] SIG.S = 41F635966CEEB06A0584AD03252595BF8D4F44B9CA33184DC143640F59CB49A8E18A3026C583E747979669DA1FE9FBCF
25,481,328 UART: Caliptra RT
25,482,036 UART: [state] CFI Enabled
25,599,370 UART: [rt] RT listening for mailbox commands...
25,601,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,632,933 UART: [rt]cmd =0x44504543, len=96
29,915,535 >>> mbox cmd response data (6236 bytes)
29,945,142 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
29,975,979 UART: [rt]cmd =0x53574545, len=84
34,111,467 >>> mbox cmd response data (200 bytes)
34,496,541 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,526,793 UART: [rt]cmd =0x52564348, len=36
34,529,450 >>> mbox cmd response data (8 bytes)
34,529,887 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,560,406 UART: [rt]cmd =0x53574545, len=84
34,563,908 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,748 writing to cptra_bootfsm_go
193,043 UART:
193,404 UART: Running Caliptra ROM ...
194,506 UART:
194,650 UART: [state] CFI Enabled
264,860 UART: [state] LifecycleState = Unprovisioned
267,279 UART: [state] DebugLocked = No
268,874 UART: [state] WD Timer not started. Device not locked for debugging
273,844 UART: [kat] SHA2-256
463,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,486 UART: [kat] ++
474,931 UART: [kat] sha1
486,469 UART: [kat] SHA2-256
489,446 UART: [kat] SHA2-384
495,870 UART: [kat] SHA2-512-ACC
498,456 UART: [kat] ECC-384
2,951,104 UART: [kat] HMAC-384Kdf
2,973,669 UART: [kat] LMS
3,505,450 UART: [kat] --
3,510,551 UART: [cold-reset] ++
3,512,343 UART: [fht] FHT @ 0x50003400
3,525,047 UART: [idev] ++
3,525,727 UART: [idev] CDI.KEYID = 6
3,526,767 UART: [idev] SUBJECT.KEYID = 7
3,527,871 UART: [idev] UDS.KEYID = 0
3,528,818 ready_for_fw is high
3,529,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,526 UART: [idev] Erasing UDS.KEYID = 0
6,032,937 UART: [idev] Sha1 KeyId Algorithm
6,054,844 UART: [idev] --
6,060,902 UART: [ldev] ++
6,061,586 UART: [ldev] CDI.KEYID = 6
6,062,472 UART: [ldev] SUBJECT.KEYID = 5
6,063,707 UART: [ldev] AUTHORITY.KEYID = 7
6,064,890 UART: [ldev] FE.KEYID = 1
6,102,473 UART: [ldev] Erasing FE.KEYID = 1
8,609,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,521 UART: [ldev] --
10,415,123 UART: [fwproc] Wait for Commands...
10,416,948 UART: [fwproc] Recv command 0x46574c44
10,419,205 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,516 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,594,869 >>> mbox cmd response: success
14,599,360 UART: [afmc] ++
14,600,078 UART: [afmc] CDI.KEYID = 6
14,601,276 UART: [afmc] SUBJECT.KEYID = 7
14,602,724 UART: [afmc] AUTHORITY.KEYID = 5
17,130,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,855,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,857,915 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,873,131 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,888,259 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,903,255 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,928,308 UART: [afmc] --
18,932,013 UART: [cold-reset] --
18,937,886 UART: [state] Locking Datavault
18,943,961 UART: [state] Locking PCR0, PCR1 and PCR31
18,946,129 UART: [state] Locking ICCM
18,949,026 UART: [exit] Launching FMC @ 0x40000130
18,957,677 UART:
18,957,914 UART: Running Caliptra FMC ...
18,959,018 UART:
18,959,178 UART: [state] CFI Enabled
19,013,105 UART: [fht] FMC Alias Private Key: 7
20,777,044 UART: [art] Extend RT PCRs Done
20,778,270 UART: [art] Lock RT PCRs Done
20,779,704 UART: [art] Populate DV Done
20,785,391 UART: [fht] FMC Alias Private Key: 7
20,786,928 UART: [art] Derive CDI
20,787,666 UART: [art] Store in in slot 0x4
20,846,161 UART: [art] Derive Key Pair
20,847,200 UART: [art] Store priv key in slot 0x5
23,310,127 UART: [art] Derive Key Pair - Done
23,323,018 UART: [art] Signing Cert with AUTHO
23,324,324 UART: RITY.KEYID = 7
25,036,110 UART: [art] Erasing AUTHORITY.KEYID = 7
25,037,620 UART: [art] PUB.X = A6BA5B4AF0319B9C3AC908739636CBE975C570B8B7A27B9716F1B3AB039375EF9A7C471570402364C354045B3883DE70
25,044,910 UART: [art] PUB.Y = 6450752B372E305B48C0B50680EBE4519CD45DC65563D8B0A201F6C21A7F4C416C407AE69FD280A8B135B0B5E1BC6869
25,052,121 UART: [art] SIG.R = B97CC172B57A913352B3B52D931C43E2D387A1AB5F8A52374F227C0D7F27B85202A916157FACCBB153EBCA84B8FF6E1E
25,059,498 UART: [art] SIG.S = 4F8D2F8489DD57C74D2A4188C015AC335E8F2FE2D908894F8CA46BFE8EC900F1F05C93E92245D08BAA0A24D2BBB6E2F9
26,038,685 UART: Caliptra RT
26,039,398 UART: [state] CFI Enabled
26,204,357 UART: [rt] RT listening for mailbox commands...
26,206,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,237,987 UART: [rt]cmd =0x44504543, len=96
30,615,570 >>> mbox cmd response data (6236 bytes)
30,645,037 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,675,657 UART: [rt]cmd =0x53574545, len=84
34,852,596 >>> mbox cmd response data (200 bytes)
35,240,948 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,271,162 UART: [rt]cmd =0x52564348, len=36
35,273,677 >>> mbox cmd response data (8 bytes)
35,274,030 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,304,515 UART: [rt]cmd =0x53574545, len=84
35,307,946 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,438,706 ready_for_fw is high
3,439,283 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,726,666 >>> mbox cmd response: success
19,001,473 UART:
19,001,857 UART: Running Caliptra FMC ...
19,003,054 UART:
19,003,237 UART: [state] CFI Enabled
19,072,924 UART: [fht] FMC Alias Private Key: 7
20,836,704 UART: [art] Extend RT PCRs Done
20,837,929 UART: [art] Lock RT PCRs Done
20,839,720 UART: [art] Populate DV Done
20,845,454 UART: [fht] FMC Alias Private Key: 7
20,847,159 UART: [art] Derive CDI
20,847,974 UART: [art] Store in in slot 0x4
20,906,102 UART: [art] Derive Key Pair
20,907,138 UART: [art] Store priv key in slot 0x5
23,370,056 UART: [art] Derive Key Pair - Done
23,382,845 UART: [art] Signing Cert with AUTHO
23,384,150 UART: RITY.KEYID = 7
25,096,006 UART: [art] Erasing AUTHORITY.KEYID = 7
25,097,536 UART: [art] PUB.X = B6CD0C20D7B91BE51207424B2B5487B1A4E033F3744B44FDC401941C40AC0A79C67DCAC3A179C58BE0FE8AD2BAC7C8AA
25,104,839 UART: [art] PUB.Y = B6BEA06370ED9DEC054CBC71CE22AB6DC8B5E5C7F053BEC79B7A2958EEC65780EE831AF7FCE81AE651FBD3F1C16D5DAB
25,112,105 UART: [art] SIG.R = 755DF4D4162C5DA1A6434A1986603C5C1B04CC0C149CE59A00A848735C987DE2D416B8D4E28372A34E2E2E7C6452CDBA
25,119,535 UART: [art] SIG.S = 427B3D51A1248EB89D0269988458E5448F0159B4AEEFFEFA8EA3ACA8BCAA41B1E2207730A932F26049977767C4CCD313
26,098,577 UART: Caliptra RT
26,099,290 UART: [state] CFI Enabled
26,264,237 UART: [rt] RT listening for mailbox commands...
26,266,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,297,941 UART: [rt]cmd =0x44504543, len=96
30,676,261 >>> mbox cmd response data (6236 bytes)
30,705,460 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,736,087 UART: [rt]cmd =0x53574545, len=84
34,912,978 >>> mbox cmd response data (200 bytes)
35,301,784 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,331,967 UART: [rt]cmd =0x52564348, len=36
35,334,332 >>> mbox cmd response data (8 bytes)
35,334,687 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,365,063 UART: [rt]cmd =0x53574545, len=84
35,368,290 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,702 writing to cptra_bootfsm_go
193,000 UART:
193,379 UART: Running Caliptra ROM ...
194,577 UART:
604,011 UART: [state] CFI Enabled
621,284 UART: [state] LifecycleState = Unprovisioned
623,649 UART: [state] DebugLocked = No
626,242 UART: [state] WD Timer not started. Device not locked for debugging
631,199 UART: [kat] SHA2-256
821,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,874 UART: [kat] ++
832,473 UART: [kat] sha1
845,124 UART: [kat] SHA2-256
848,193 UART: [kat] SHA2-384
854,889 UART: [kat] SHA2-512-ACC
857,490 UART: [kat] ECC-384
3,299,028 UART: [kat] HMAC-384Kdf
3,311,494 UART: [kat] LMS
3,843,378 UART: [kat] --
3,846,006 UART: [cold-reset] ++
3,847,949 UART: [fht] FHT @ 0x50003400
3,858,997 UART: [idev] ++
3,859,701 UART: [idev] CDI.KEYID = 6
3,860,801 UART: [idev] SUBJECT.KEYID = 7
3,861,922 UART: [idev] UDS.KEYID = 0
3,862,820 ready_for_fw is high
3,863,022 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,329 UART: [idev] Erasing UDS.KEYID = 0
6,337,629 UART: [idev] Sha1 KeyId Algorithm
6,359,763 UART: [idev] --
6,364,164 UART: [ldev] ++
6,364,881 UART: [ldev] CDI.KEYID = 6
6,365,802 UART: [ldev] SUBJECT.KEYID = 5
6,366,967 UART: [ldev] AUTHORITY.KEYID = 7
6,368,148 UART: [ldev] FE.KEYID = 1
6,377,610 UART: [ldev] Erasing FE.KEYID = 1
8,856,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,367 UART: [ldev] --
10,648,064 UART: [fwproc] Wait for Commands...
10,650,969 UART: [fwproc] Recv command 0x46574c44
10,653,279 UART: [fwproc] Recv'd Img size: 114168 bytes
14,095,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,501 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,640 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,362 >>> mbox cmd response: success
14,835,280 UART: [afmc] ++
14,835,993 UART: [afmc] CDI.KEYID = 6
14,837,180 UART: [afmc] SUBJECT.KEYID = 7
14,838,615 UART: [afmc] AUTHORITY.KEYID = 5
17,340,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,060,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,062,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,168 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,221 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,005 UART: [afmc] --
19,136,360 UART: [cold-reset] --
19,139,579 UART: [state] Locking Datavault
19,145,686 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,858 UART: [state] Locking ICCM
19,150,284 UART: [exit] Launching FMC @ 0x40000130
19,158,964 UART:
19,159,208 UART: Running Caliptra FMC ...
19,160,311 UART:
19,160,473 UART: [state] CFI Enabled
19,168,522 UART: [fht] FMC Alias Private Key: 7
20,924,713 UART: [art] Extend RT PCRs Done
20,925,935 UART: [art] Lock RT PCRs Done
20,927,483 UART: [art] Populate DV Done
20,932,895 UART: [fht] FMC Alias Private Key: 7
20,934,539 UART: [art] Derive CDI
20,935,280 UART: [art] Store in in slot 0x4
20,977,868 UART: [art] Derive Key Pair
20,978,867 UART: [art] Store priv key in slot 0x5
23,405,172 UART: [art] Derive Key Pair - Done
23,418,079 UART: [art] Signing Cert with AUTHO
23,419,398 UART: RITY.KEYID = 7
25,124,652 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,165 UART: [art] PUB.X = 1AE48FC835F32DC288AF13CBA87BF25B8E7E771E23531CFF5E5A8C89137724AE0CDCB9DBD1AF540579666361B0AEC12A
25,133,473 UART: [art] PUB.Y = 655EFA267A5638F11FEF053E935BEAB52EB1DF23180899F7EFA97460112AE043908BD0E57298338099A493C07514019C
25,140,796 UART: [art] SIG.R = 60C28ECDD452821F7C6639B6B269A503B2089EEAAEA9C38A0D2222BBCC2CAF32E9E866BBF45585F4CAE25B3AC1BFFDAB
25,148,144 UART: [art] SIG.S = A5653367A4BAB9456DDC78C64392F1B180A336D83E3E1A8417C08320329BF2BEBEC736B31AE63455744F197D6ACE3CF6
26,126,609 UART: Caliptra RT
26,127,289 UART: [state] CFI Enabled
26,244,069 UART: [rt] RT listening for mailbox commands...
26,246,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,277,619 UART: [rt]cmd =0x44504543, len=96
30,561,053 >>> mbox cmd response data (6236 bytes)
30,590,437 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,621,072 UART: [rt]cmd =0x53574545, len=84
34,756,498 >>> mbox cmd response data (200 bytes)
35,141,083 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,171,556 UART: [rt]cmd =0x52564348, len=36
35,173,760 >>> mbox cmd response data (8 bytes)
35,174,214 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,204,678 UART: [rt]cmd =0x53574545, len=84
35,208,449 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,643 writing to cptra_bootfsm_go
3,761,769 ready_for_fw is high
3,762,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,957,812 >>> mbox cmd response: success
19,211,465 UART:
19,211,867 UART: Running Caliptra FMC ...
19,213,005 UART:
19,213,174 UART: [state] CFI Enabled
19,220,702 UART: [fht] FMC Alias Private Key: 7
20,976,939 UART: [art] Extend RT PCRs Done
20,978,161 UART: [art] Lock RT PCRs Done
20,979,757 UART: [art] Populate DV Done
20,985,181 UART: [fht] FMC Alias Private Key: 7
20,986,886 UART: [art] Derive CDI
20,987,700 UART: [art] Store in in slot 0x4
21,030,358 UART: [art] Derive Key Pair
21,031,402 UART: [art] Store priv key in slot 0x5
23,457,987 UART: [art] Derive Key Pair - Done
23,471,193 UART: [art] Signing Cert with AUTHO
23,472,505 UART: RITY.KEYID = 7
25,177,729 UART: [art] Erasing AUTHORITY.KEYID = 7
25,179,233 UART: [art] PUB.X = 1189D1DAE6EED6FAA499A34854BD0EF15B476BBC66B17D58C0D66FF92E27F0BC781A07121E03883AF461F3A1D7A10420
25,186,474 UART: [art] PUB.Y = 0D534D30E478905D9D7BF4D5A340120C61F66C299050AAD29C75C8905E94336B3BC2A70BB0308304915E05383AD119B5
25,193,704 UART: [art] SIG.R = C6FF86A8AA1C972AC95CF172C2053CE86A8E230241C1F6AAA2ABC95911325864230EC0460A7DBA2C8991041BD3FD2A27
25,201,093 UART: [art] SIG.S = 898E98D3F7F5EE6196922805DE1293C9A42C6C42D9AECDDF355FA3A4204ABC5092417AE51AF1D4CC9D65AB546E5DB29C
26,180,277 UART: Caliptra RT
26,180,988 UART: [state] CFI Enabled
26,297,624 UART: [rt] RT listening for mailbox commands...
26,300,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,331,109 UART: [rt]cmd =0x44504543, len=96
30,614,633 >>> mbox cmd response data (6236 bytes)
30,643,817 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,674,192 UART: [rt]cmd =0x53574545, len=84
34,810,098 >>> mbox cmd response data (200 bytes)
35,194,097 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,224,350 UART: [rt]cmd =0x52564348, len=36
35,227,140 >>> mbox cmd response data (8 bytes)
35,227,572 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,258,137 UART: [rt]cmd =0x53574545, len=84
35,261,830 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,821 UART: [kat] SHA2-256
892,759 UART: [kat] SHA2-384
895,564 UART: [kat] SHA2-512-ACC
897,465 UART: [kat] ECC-384
902,936 UART: [kat] HMAC-384Kdf
907,596 UART: [kat] LMS
1,475,792 UART: [kat] --
1,476,803 UART: [cold-reset] ++
1,477,171 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 ready_for_fw is high
1,481,073 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,446 UART: [idev] Erasing UDS.KEYID = 0
1,504,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,374 UART: [idev] --
1,514,385 UART: [ldev] ++
1,514,553 UART: [ldev] CDI.KEYID = 6
1,514,916 UART: [ldev] SUBJECT.KEYID = 5
1,515,342 UART: [ldev] AUTHORITY.KEYID = 7
1,515,805 UART: [ldev] FE.KEYID = 1
1,521,071 UART: [ldev] Erasing FE.KEYID = 1
1,546,470 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,316 UART: [ldev] --
1,585,807 UART: [fwproc] Waiting for Commands...
1,586,490 UART: [fwproc] Received command 0x46574c44
1,587,281 UART: [fwproc] Received Image of size 114168 bytes
2,882,933 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,987 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,339 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,952 >>> mbox cmd response: success
3,077,180 UART: [afmc] ++
3,077,348 UART: [afmc] CDI.KEYID = 6
3,077,710 UART: [afmc] SUBJECT.KEYID = 7
3,078,135 UART: [afmc] AUTHORITY.KEYID = 5
3,113,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,286 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,171 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,861 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,798 UART: [afmc] --
3,156,866 UART: [cold-reset] --
3,157,754 UART: [state] Locking Datavault
3,158,867 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,471 UART: [state] Locking ICCM
3,159,987 UART: [exit] Launching FMC @ 0x40000130
3,165,316 UART:
3,165,332 UART: Running Caliptra FMC ...
3,165,740 UART:
3,165,794 UART: [state] CFI Enabled
3,176,219 UART: [fht] FMC Alias Private Key: 7
3,284,408 UART: [art] Extend RT PCRs Done
3,284,836 UART: [art] Lock RT PCRs Done
3,286,572 UART: [art] Populate DV Done
3,294,603 UART: [fht] FMC Alias Private Key: 7
3,295,649 UART: [art] Derive CDI
3,295,929 UART: [art] Store in in slot 0x4
3,381,448 UART: [art] Derive Key Pair
3,381,808 UART: [art] Store priv key in slot 0x5
3,395,006 UART: [art] Derive Key Pair - Done
3,409,764 UART: [art] Signing Cert with AUTHO
3,410,244 UART: RITY.KEYID = 7
3,425,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,741 UART: [art] PUB.X = 78AFEC5E768F9F4CE78558FB55C2D02EA83F4AF2D2C26AE5C033422E3A726A8CFA8272E68F2FC4DB0EC6373F693187EB
3,433,526 UART: [art] PUB.Y = BA3E92D4D1A37E11D214C2EAE9283BE3E31F4E94864FC991F8B4CDA547502A996903D9AB6696DCAC0318AB03996CC285
3,440,477 UART: [art] SIG.R = EB57F03A60D6EAF71246D2A46E29B547DE22D14F9C50DA5F05956CE7B44705293F4B3D4645978E74C6CFEA132C05285C
3,447,244 UART: [art] SIG.S = 2088C5FD51ABB688BA030A5ABC0844443BA284CA89D6E6AC1586906886223F043F372744D147EF35B6A907B7638989B1
3,471,576 UART: Caliptra RT
3,471,829 UART: [state] CFI Enabled
3,579,304 UART: [rt] RT listening for mailbox commands...
3,579,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,484 UART: [rt]cmd =0x44504543, len=96
3,790,995 >>> mbox cmd response data (6236 bytes)
3,790,996 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,891 UART: [rt]cmd =0x53574545, len=84
3,846,834 >>> mbox cmd response data (200 bytes)
3,846,835 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,876,304 UART: [rt]cmd =0x52564348, len=36
3,878,295 >>> mbox cmd response data (8 bytes)
3,878,296 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,197 UART: [rt]cmd =0x53574545, len=84
3,910,973 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,083 ready_for_fw is high
1,363,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,750 >>> mbox cmd response: success
2,985,018 UART:
2,985,034 UART: Running Caliptra FMC ...
2,985,442 UART:
2,985,496 UART: [state] CFI Enabled
2,996,213 UART: [fht] FMC Alias Private Key: 7
3,104,300 UART: [art] Extend RT PCRs Done
3,104,728 UART: [art] Lock RT PCRs Done
3,106,384 UART: [art] Populate DV Done
3,114,321 UART: [fht] FMC Alias Private Key: 7
3,115,433 UART: [art] Derive CDI
3,115,713 UART: [art] Store in in slot 0x4
3,201,326 UART: [art] Derive Key Pair
3,201,686 UART: [art] Store priv key in slot 0x5
3,214,896 UART: [art] Derive Key Pair - Done
3,229,624 UART: [art] Signing Cert with AUTHO
3,230,104 UART: RITY.KEYID = 7
3,245,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,093 UART: [art] PUB.X = 23E1DEA8C5FD046D9DE5544E6C737F5C2497327D9082DD538E114F129C7C6BEC7383F2D3FBD1B93643898C33C43B8BFB
3,252,870 UART: [art] PUB.Y = C3249EABDB73B8BC004D0A54ACD4B4FD99E25A0035AB1CC234278D921AF54C2F39315C144780E88EE7D0622054820A7C
3,259,778 UART: [art] SIG.R = 516E43AC1440AED67B7D700A3C76B06217CA31ADB316702A15ECDE1A9BAAE638B37EF53C693CE6092BC4F8058B254C4E
3,266,553 UART: [art] SIG.S = 78CB469A17CC40A4201F2E4DF64C25E8B396973F057B068E5C42DDCBF3FF1153EF9DD063592DA47DB509E3B4B7001505
3,290,374 UART: Caliptra RT
3,290,627 UART: [state] CFI Enabled
3,398,051 UART: [rt] RT listening for mailbox commands...
3,398,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,115 UART: [rt]cmd =0x44504543, len=96
3,609,312 >>> mbox cmd response data (6236 bytes)
3,609,313 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,192 UART: [rt]cmd =0x53574545, len=84
3,664,705 >>> mbox cmd response data (200 bytes)
3,664,706 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,559 UART: [rt]cmd =0x52564348, len=36
3,696,480 >>> mbox cmd response data (8 bytes)
3,696,481 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,726,308 UART: [rt]cmd =0x53574545, len=84
3,729,330 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
87,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
890,950 UART: [kat] SHA2-256
892,888 UART: [kat] SHA2-384
895,843 UART: [kat] SHA2-512-ACC
897,744 UART: [kat] ECC-384
903,687 UART: [kat] HMAC-384Kdf
908,389 UART: [kat] LMS
1,476,585 UART: [kat] --
1,477,504 UART: [cold-reset] ++
1,477,864 UART: [fht] Storing FHT @ 0x50003400
1,480,699 UART: [idev] ++
1,480,867 UART: [idev] CDI.KEYID = 6
1,481,227 UART: [idev] SUBJECT.KEYID = 7
1,481,651 UART: [idev] UDS.KEYID = 0
1,481,996 ready_for_fw is high
1,481,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,490,027 UART: [idev] Erasing UDS.KEYID = 0
1,506,779 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,467 UART: [idev] --
1,516,506 UART: [ldev] ++
1,516,674 UART: [ldev] CDI.KEYID = 6
1,517,037 UART: [ldev] SUBJECT.KEYID = 5
1,517,463 UART: [ldev] AUTHORITY.KEYID = 7
1,517,926 UART: [ldev] FE.KEYID = 1
1,523,218 UART: [ldev] Erasing FE.KEYID = 1
1,548,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,129 UART: [ldev] --
1,587,494 UART: [fwproc] Waiting for Commands...
1,588,133 UART: [fwproc] Received command 0x46574c44
1,588,924 UART: [fwproc] Received Image of size 114168 bytes
2,885,350 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,662 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,657 >>> mbox cmd response: success
3,078,799 UART: [afmc] ++
3,078,967 UART: [afmc] CDI.KEYID = 6
3,079,329 UART: [afmc] SUBJECT.KEYID = 7
3,079,754 UART: [afmc] AUTHORITY.KEYID = 5
3,114,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,785 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,178 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,868 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,673 UART: [afmc] --
3,157,665 UART: [cold-reset] --
3,158,483 UART: [state] Locking Datavault
3,159,838 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,442 UART: [state] Locking ICCM
3,161,024 UART: [exit] Launching FMC @ 0x40000130
3,166,353 UART:
3,166,369 UART: Running Caliptra FMC ...
3,166,777 UART:
3,166,920 UART: [state] CFI Enabled
3,177,317 UART: [fht] FMC Alias Private Key: 7
3,285,054 UART: [art] Extend RT PCRs Done
3,285,482 UART: [art] Lock RT PCRs Done
3,286,816 UART: [art] Populate DV Done
3,294,783 UART: [fht] FMC Alias Private Key: 7
3,295,931 UART: [art] Derive CDI
3,296,211 UART: [art] Store in in slot 0x4
3,381,504 UART: [art] Derive Key Pair
3,381,864 UART: [art] Store priv key in slot 0x5
3,395,126 UART: [art] Derive Key Pair - Done
3,409,810 UART: [art] Signing Cert with AUTHO
3,410,290 UART: RITY.KEYID = 7
3,425,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,099 UART: [art] PUB.X = 1D9051640DBF7FF1E7FAA4F51368C95B60DD99747E4D83868F3D56F60954DFBA8D6094F700A9D460A57543162ACEF2F5
3,432,847 UART: [art] PUB.Y = C2E93DE48599721B61E51F3EB9A95F7EED0333DD19674276B67EF12F8E311C9B7C202FFFC8A12FBC1267B6D51EB1463D
3,439,806 UART: [art] SIG.R = 728035C13A0CAB160D168DAC15480BBAA34CBFCDC7D3DE2A8D4DF27DC56DF583FD2A55E482C1F3D73DA971B528869BD3
3,446,589 UART: [art] SIG.S = 95266003DAE7873599F3495D341DC40E1448633F9F96BA685CF2B43E988FFF3A7FBE3E80FE9A8A0CD12AEF6A69F250C0
3,470,489 UART: Caliptra RT
3,470,834 UART: [state] CFI Enabled
3,579,275 UART: [rt] RT listening for mailbox commands...
3,579,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,659 UART: [rt]cmd =0x44504543, len=96
3,791,300 >>> mbox cmd response data (6236 bytes)
3,791,301 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,821,394 UART: [rt]cmd =0x53574545, len=84
3,847,531 >>> mbox cmd response data (200 bytes)
3,847,532 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,877,127 UART: [rt]cmd =0x52564348, len=36
3,879,534 >>> mbox cmd response data (8 bytes)
3,879,535 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,909,402 UART: [rt]cmd =0x53574545, len=84
3,912,452 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,536 ready_for_fw is high
1,363,536 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,603 >>> mbox cmd response: success
2,989,691 UART:
2,989,707 UART: Running Caliptra FMC ...
2,990,115 UART:
2,990,258 UART: [state] CFI Enabled
3,000,725 UART: [fht] FMC Alias Private Key: 7
3,109,350 UART: [art] Extend RT PCRs Done
3,109,778 UART: [art] Lock RT PCRs Done
3,111,168 UART: [art] Populate DV Done
3,119,543 UART: [fht] FMC Alias Private Key: 7
3,120,489 UART: [art] Derive CDI
3,120,769 UART: [art] Store in in slot 0x4
3,206,342 UART: [art] Derive Key Pair
3,206,702 UART: [art] Store priv key in slot 0x5
3,220,216 UART: [art] Derive Key Pair - Done
3,235,021 UART: [art] Signing Cert with AUTHO
3,235,501 UART: RITY.KEYID = 7
3,250,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,030 UART: [art] PUB.X = B4397E59B44EBCFE9BB26D312A7E6D2CEE22C2C66911894424D3B84D8FF5A1FF9F824A0EFE5561B60CF8B9166CE393CD
3,257,812 UART: [art] PUB.Y = 7FAD10300BCCA45809D408794C13FC3A84399F3D679A8171A80377480606D62FF7E1C796E74ABA0F9F4DE16732D58D18
3,264,741 UART: [art] SIG.R = D50530CC852539D88E964DD1094D36B1CBA96B3072369BBDC417E4E4B4829C426E5F7D7A5D8C099A9834FB8113E42BB3
3,271,506 UART: [art] SIG.S = 53C483D163C5AB21CE60728203CBBBBBE55168A1FEE270EFC8D2C4F1B65A159D3F53A6730334B7B35AE0E8D13ED294E9
3,294,879 UART: Caliptra RT
3,295,224 UART: [state] CFI Enabled
3,403,917 UART: [rt] RT listening for mailbox commands...
3,404,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,137 UART: [rt]cmd =0x44504543, len=96
3,616,064 >>> mbox cmd response data (6236 bytes)
3,616,065 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,645,982 UART: [rt]cmd =0x53574545, len=84
3,671,931 >>> mbox cmd response data (200 bytes)
3,671,932 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,701,565 UART: [rt]cmd =0x52564348, len=36
3,703,370 >>> mbox cmd response data (8 bytes)
3,703,371 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,176 UART: [rt]cmd =0x53574545, len=84
3,736,370 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
893,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,449 UART: [kat] ++
897,601 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
917,988 UART: [kat] HMAC-384Kdf
922,436 UART: [kat] LMS
1,170,764 UART: [kat] --
1,171,697 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,766 UART: [idev] ++
1,174,934 UART: [idev] CDI.KEYID = 6
1,175,294 UART: [idev] SUBJECT.KEYID = 7
1,175,718 UART: [idev] UDS.KEYID = 0
1,176,063 ready_for_fw is high
1,176,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,458 UART: [idev] Erasing UDS.KEYID = 0
1,200,431 UART: [idev] Sha1 KeyId Algorithm
1,209,001 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,562 UART: [ldev] SUBJECT.KEYID = 5
1,210,988 UART: [ldev] AUTHORITY.KEYID = 7
1,211,451 UART: [ldev] FE.KEYID = 1
1,216,333 UART: [ldev] Erasing FE.KEYID = 1
1,242,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,230 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,609 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,376 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,680 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,147 >>> mbox cmd response: success
2,773,359 UART: [afmc] ++
2,773,527 UART: [afmc] CDI.KEYID = 6
2,773,889 UART: [afmc] SUBJECT.KEYID = 7
2,774,314 UART: [afmc] AUTHORITY.KEYID = 5
2,809,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,060 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,788 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,673 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,392 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,220 UART: [afmc] --
2,852,126 UART: [cold-reset] --
2,853,096 UART: [state] Locking Datavault
2,854,579 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,183 UART: [state] Locking ICCM
2,855,665 UART: [exit] Launching FMC @ 0x40000130
2,860,994 UART:
2,861,010 UART: Running Caliptra FMC ...
2,861,418 UART:
2,861,472 UART: [state] CFI Enabled
2,871,831 UART: [fht] FMC Alias Private Key: 7
2,980,534 UART: [art] Extend RT PCRs Done
2,980,962 UART: [art] Lock RT PCRs Done
2,982,590 UART: [art] Populate DV Done
2,990,895 UART: [fht] FMC Alias Private Key: 7
2,991,881 UART: [art] Derive CDI
2,992,161 UART: [art] Store in in slot 0x4
3,077,844 UART: [art] Derive Key Pair
3,078,204 UART: [art] Store priv key in slot 0x5
3,090,804 UART: [art] Derive Key Pair - Done
3,105,684 UART: [art] Signing Cert with AUTHO
3,106,164 UART: RITY.KEYID = 7
3,121,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,011 UART: [art] PUB.X = B1B5E3482DF347889B1638D557CCD5F14D596579476293C2131ADCAA0E7DD86345C6807E98E2A2ECA1E693B4AD024CD9
3,128,781 UART: [art] PUB.Y = 1DD4C2B1147ADC9715911C7713E6735813F8E60F03E8EAD5ED8456BBB72CDDB18A6D75F572AF9FFFCD450B0DF9A37A16
3,135,737 UART: [art] SIG.R = B01BA1E4C2A522C220A63881C93091A00752AFE6C5700770BE981DC38A0E3D5C68F3D9927E0D230FBB9C34747B46BDCC
3,142,500 UART: [art] SIG.S = 95D4061C319EF6062913A3445B900FCFFFC207C7F79239554BC2288AD8F75A0B32953A08F694255B724EE49A22F903D7
3,166,324 UART: Caliptra RT
3,166,577 UART: [state] CFI Enabled
3,274,779 UART: [rt] RT listening for mailbox commands...
3,275,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,867 UART: [rt]cmd =0x44504543, len=96
3,486,598 >>> mbox cmd response data (6236 bytes)
3,486,599 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,536 UART: [rt]cmd =0x53574545, len=84
3,541,681 >>> mbox cmd response data (200 bytes)
3,541,682 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,571,287 UART: [rt]cmd =0x52564348, len=36
3,573,474 >>> mbox cmd response data (8 bytes)
3,573,475 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,603,404 UART: [rt]cmd =0x53574545, len=84
3,606,638 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,999 ready_for_fw is high
1,059,999 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,942 >>> mbox cmd response: success
2,686,420 UART:
2,686,436 UART: Running Caliptra FMC ...
2,686,844 UART:
2,686,898 UART: [state] CFI Enabled
2,696,987 UART: [fht] FMC Alias Private Key: 7
2,804,804 UART: [art] Extend RT PCRs Done
2,805,232 UART: [art] Lock RT PCRs Done
2,806,718 UART: [art] Populate DV Done
2,814,933 UART: [fht] FMC Alias Private Key: 7
2,815,875 UART: [art] Derive CDI
2,816,155 UART: [art] Store in in slot 0x4
2,901,844 UART: [art] Derive Key Pair
2,902,204 UART: [art] Store priv key in slot 0x5
2,915,524 UART: [art] Derive Key Pair - Done
2,930,144 UART: [art] Signing Cert with AUTHO
2,930,624 UART: RITY.KEYID = 7
2,945,692 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,457 UART: [art] PUB.X = FD261F4A0AE9B34314054CF63774819DA0F26FBF57E3641496A788552624044DFCBEE023E8484DE1808174257B460891
2,953,207 UART: [art] PUB.Y = C683F41D20A03976347CCB29454806A55CB17FA5A8B586A35612A777119D5F4B1B166F9EFCC1F012FD6A82E809501448
2,960,149 UART: [art] SIG.R = D0819E0BAA06110FE5FCF3A2516CB621741798410FA529C6B25EF6DDDADD554BDB8CCEC499E406AD5B178ABE2950CDAE
2,966,928 UART: [art] SIG.S = 88DDF8BD69E7FF708CD06224960714BCDA8FFC8E5C6D65AF0BE6A6853F344F70277409EF9AD37EAD3964C6EA6C689EE4
2,990,366 UART: Caliptra RT
2,990,619 UART: [state] CFI Enabled
3,098,207 UART: [rt] RT listening for mailbox commands...
3,098,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,241 UART: [rt]cmd =0x44504543, len=96
3,309,584 >>> mbox cmd response data (6236 bytes)
3,309,585 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,570 UART: [rt]cmd =0x53574545, len=84
3,365,309 >>> mbox cmd response data (200 bytes)
3,365,310 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,395,101 UART: [rt]cmd =0x52564348, len=36
3,396,954 >>> mbox cmd response data (8 bytes)
3,396,955 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,426,944 UART: [rt]cmd =0x53574545, len=84
3,430,102 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
893,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,932 UART: [kat] ++
898,084 UART: [kat] sha1
902,432 UART: [kat] SHA2-256
904,372 UART: [kat] SHA2-384
907,233 UART: [kat] SHA2-512-ACC
909,134 UART: [kat] ECC-384
918,529 UART: [kat] HMAC-384Kdf
923,045 UART: [kat] LMS
1,171,373 UART: [kat] --
1,172,294 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,299 UART: [idev] ++
1,175,467 UART: [idev] CDI.KEYID = 6
1,175,827 UART: [idev] SUBJECT.KEYID = 7
1,176,251 UART: [idev] UDS.KEYID = 0
1,176,596 ready_for_fw is high
1,176,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,201,392 UART: [idev] Sha1 KeyId Algorithm
1,209,890 UART: [idev] --
1,211,022 UART: [ldev] ++
1,211,190 UART: [ldev] CDI.KEYID = 6
1,211,553 UART: [ldev] SUBJECT.KEYID = 5
1,211,979 UART: [ldev] AUTHORITY.KEYID = 7
1,212,442 UART: [ldev] FE.KEYID = 1
1,217,856 UART: [ldev] Erasing FE.KEYID = 1
1,244,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,670 UART: [ldev] --
1,284,099 UART: [fwproc] Wait for Commands...
1,284,889 UART: [fwproc] Recv command 0x46574c44
1,285,617 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,101 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,072 >>> mbox cmd response: success
2,776,288 UART: [afmc] ++
2,776,456 UART: [afmc] CDI.KEYID = 6
2,776,818 UART: [afmc] SUBJECT.KEYID = 7
2,777,243 UART: [afmc] AUTHORITY.KEYID = 5
2,813,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,829,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,593 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,836,321 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,842,206 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,847,925 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,855,737 UART: [afmc] --
2,856,797 UART: [cold-reset] --
2,857,723 UART: [state] Locking Datavault
2,858,868 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,472 UART: [state] Locking ICCM
2,859,998 UART: [exit] Launching FMC @ 0x40000130
2,865,327 UART:
2,865,343 UART: Running Caliptra FMC ...
2,865,751 UART:
2,865,894 UART: [state] CFI Enabled
2,876,649 UART: [fht] FMC Alias Private Key: 7
2,985,060 UART: [art] Extend RT PCRs Done
2,985,488 UART: [art] Lock RT PCRs Done
2,986,602 UART: [art] Populate DV Done
2,994,787 UART: [fht] FMC Alias Private Key: 7
2,995,857 UART: [art] Derive CDI
2,996,137 UART: [art] Store in in slot 0x4
3,081,810 UART: [art] Derive Key Pair
3,082,170 UART: [art] Store priv key in slot 0x5
3,095,686 UART: [art] Derive Key Pair - Done
3,110,309 UART: [art] Signing Cert with AUTHO
3,110,789 UART: RITY.KEYID = 7
3,125,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,638 UART: [art] PUB.X = 11BF329547C40A7ADD03BEC4E8A8A98028E895764CBA9D85C3056FF976EAC5EB44FDD4BBCB0C90E125390F109A2C9638
3,133,407 UART: [art] PUB.Y = CEB402E2BE8A2E094C20A91C099D5E48D2DB9A5505A48E364CB80465F0C483B7997BF21A67C6412D584EEA257BC6989D
3,140,350 UART: [art] SIG.R = 735534271F72371E6255F2F38E10BD8E7912EF2E8ECB7C91ABCAA3D5CF83392E97F671B383694955AC3A3F226FA56B75
3,147,124 UART: [art] SIG.S = 96477E7DECDBA09747BBEFD458AB22688A1EA17B53E14EC4C2F81EE2F90C7F4D1323C9FD99431673B948D1285B826AEF
3,171,544 UART: Caliptra RT
3,171,889 UART: [state] CFI Enabled
3,279,304 UART: [rt] RT listening for mailbox commands...
3,279,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,524 UART: [rt]cmd =0x44504543, len=96
3,490,483 >>> mbox cmd response data (6236 bytes)
3,490,484 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,520,405 UART: [rt]cmd =0x53574545, len=84
3,546,446 >>> mbox cmd response data (200 bytes)
3,546,447 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,575,884 UART: [rt]cmd =0x52564348, len=36
3,577,773 >>> mbox cmd response data (8 bytes)
3,577,774 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,735 UART: [rt]cmd =0x53574545, len=84
3,611,325 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,124 ready_for_fw is high
1,060,124 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,255 >>> mbox cmd response: success
2,687,089 UART:
2,687,105 UART: Running Caliptra FMC ...
2,687,513 UART:
2,687,656 UART: [state] CFI Enabled
2,698,291 UART: [fht] FMC Alias Private Key: 7
2,805,952 UART: [art] Extend RT PCRs Done
2,806,380 UART: [art] Lock RT PCRs Done
2,807,850 UART: [art] Populate DV Done
2,816,071 UART: [fht] FMC Alias Private Key: 7
2,817,007 UART: [art] Derive CDI
2,817,287 UART: [art] Store in in slot 0x4
2,902,772 UART: [art] Derive Key Pair
2,903,132 UART: [art] Store priv key in slot 0x5
2,916,674 UART: [art] Derive Key Pair - Done
2,931,698 UART: [art] Signing Cert with AUTHO
2,932,178 UART: RITY.KEYID = 7
2,947,546 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,311 UART: [art] PUB.X = 5F5BD3307DEF6CF2C9C2830FDC07216DB951A299CF066BBC65F74758F197FBCDF5DDB841019AE9C5DB765615C7FB9FF1
2,955,089 UART: [art] PUB.Y = 83DD9A264330904674130F8E4ACB7D17B2CA9789EDC226E26BBDCA45C2CDF4726DE4C6FCC01F0006449B7F6127B40357
2,962,016 UART: [art] SIG.R = 6835D98F807CEE0E237AAD95E988F3311248582BF29CBC23D5C79A7EEB7C051D6EC3DB2ADBA99DAB1E15F9CCC8C4736B
2,968,802 UART: [art] SIG.S = D246362004B9FBED38C001F8700E85620C4CF2FBE05FF58F21B19624856C25E8BB532F202AD940C766AE735AC056B1BA
2,991,617 UART: Caliptra RT
2,991,962 UART: [state] CFI Enabled
3,099,991 UART: [rt] RT listening for mailbox commands...
3,100,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,279 UART: [rt]cmd =0x44504543, len=96
3,311,104 >>> mbox cmd response data (6236 bytes)
3,311,105 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,340,962 UART: [rt]cmd =0x53574545, len=84
3,366,575 >>> mbox cmd response data (200 bytes)
3,366,576 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,396,003 UART: [rt]cmd =0x52564348, len=36
3,397,988 >>> mbox cmd response data (8 bytes)
3,397,989 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,428,086 UART: [rt]cmd =0x53574545, len=84
3,431,220 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,174,491 ready_for_fw is high
1,174,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,727 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,574 UART: [ldev] ++
1,208,742 UART: [ldev] CDI.KEYID = 6
1,209,106 UART: [ldev] SUBJECT.KEYID = 5
1,209,533 UART: [ldev] AUTHORITY.KEYID = 7
1,209,996 UART: [ldev] FE.KEYID = 1
1,215,184 UART: [ldev] Erasing FE.KEYID = 1
1,241,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,624 UART: [fwproc] Wait for Commands...
1,281,319 UART: [fwproc] Recv command 0x46574c44
1,282,052 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,455 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,127 >>> mbox cmd response: success
2,771,356 UART: [afmc] ++
2,771,524 UART: [afmc] CDI.KEYID = 6
2,771,887 UART: [afmc] SUBJECT.KEYID = 7
2,772,313 UART: [afmc] AUTHORITY.KEYID = 5
2,807,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,214 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,965 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,694 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,577 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,296 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,199 UART: [afmc] --
2,851,279 UART: [cold-reset] --
2,852,009 UART: [state] Locking Datavault
2,853,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,738 UART: [state] Locking ICCM
2,854,316 UART: [exit] Launching FMC @ 0x40000130
2,859,645 UART:
2,859,661 UART: Running Caliptra FMC ...
2,860,069 UART:
2,860,123 UART: [state] CFI Enabled
2,870,524 UART: [fht] FMC Alias Private Key: 7
2,978,845 UART: [art] Extend RT PCRs Done
2,979,273 UART: [art] Lock RT PCRs Done
2,981,195 UART: [art] Populate DV Done
2,989,402 UART: [fht] FMC Alias Private Key: 7
2,990,526 UART: [art] Derive CDI
2,990,806 UART: [art] Store in in slot 0x4
3,076,501 UART: [art] Derive Key Pair
3,076,861 UART: [art] Store priv key in slot 0x5
3,090,045 UART: [art] Derive Key Pair - Done
3,104,912 UART: [art] Signing Cert with AUTHO
3,105,392 UART: RITY.KEYID = 7
3,120,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,343 UART: [art] PUB.X = 055EC0EA75BA100C4009AAA30687FD0D4C5D3F475932D36A3FFCF850B46982A6D3A8E623B73181EDF08795906A458BA6
3,128,104 UART: [art] PUB.Y = 990D4D5D0C29B4F15643BB8867F68FAC2200E7FBA237C1D451CD0079E75CDBB64A75F21F912A2F65122A28449E5D4238
3,135,008 UART: [art] SIG.R = 25006B39019570B0C04DD398DA60EFFB28C28EA9427E14E37402C5A24985966D87B6F60598E5CBC4D6449C18C151C680
3,141,743 UART: [art] SIG.S = 9F30B902F0E8B4C883AC9C86D6A6016637191B98F772AC1C420108349F05D4070503CC84863BA552AA55404C75B7F64C
3,165,340 UART: Caliptra RT
3,165,593 UART: [state] CFI Enabled
3,273,028 UART: [rt] RT listening for mailbox commands...
3,273,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,908 UART: [rt]cmd =0x44504543, len=96
3,484,778 >>> mbox cmd response data (6236 bytes)
3,484,779 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,514,584 UART: [rt]cmd =0x53574545, len=84
3,541,033 >>> mbox cmd response data (200 bytes)
3,541,034 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,570,583 UART: [rt]cmd =0x52564348, len=36
3,572,866 >>> mbox cmd response data (8 bytes)
3,572,867 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,602,858 UART: [rt]cmd =0x53574545, len=84
3,605,892 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,532 ready_for_fw is high
1,055,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,531 >>> mbox cmd response: success
2,683,093 UART:
2,683,109 UART: Running Caliptra FMC ...
2,683,517 UART:
2,683,571 UART: [state] CFI Enabled
2,693,852 UART: [fht] FMC Alias Private Key: 7
2,802,025 UART: [art] Extend RT PCRs Done
2,802,453 UART: [art] Lock RT PCRs Done
2,804,099 UART: [art] Populate DV Done
2,812,180 UART: [fht] FMC Alias Private Key: 7
2,813,310 UART: [art] Derive CDI
2,813,590 UART: [art] Store in in slot 0x4
2,898,943 UART: [art] Derive Key Pair
2,899,303 UART: [art] Store priv key in slot 0x5
2,912,441 UART: [art] Derive Key Pair - Done
2,926,769 UART: [art] Signing Cert with AUTHO
2,927,249 UART: RITY.KEYID = 7
2,942,719 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,484 UART: [art] PUB.X = 7548EE537B514E0B7896C1B9806E3EFCC7A0040F0BDA7C6B11C8160AF57A864B3D8D2A20CC5355A8E86A9347E1925548
2,950,243 UART: [art] PUB.Y = B0ADB84338AC196E38675EC0A886532EEA8BC565499CFF1364D663F4D0EE40A042D94BE91C246EFC41DA28C23E765892
2,957,201 UART: [art] SIG.R = EEA972B4E94EB1577B5990FD2AB5E30BF0246B7BB01DC9D8779C40C49AE02AE83911212DFF916F3D89017F31633FE553
2,963,973 UART: [art] SIG.S = E940ADF2108E376C9F558E77317AD9CB60690593B863D457BDAAC9EA5EDA84D8654C9F4C3C0A32145901A61202D6D338
2,987,932 UART: Caliptra RT
2,988,185 UART: [state] CFI Enabled
3,094,973 UART: [rt] RT listening for mailbox commands...
3,095,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,145 UART: [rt]cmd =0x44504543, len=96
3,306,729 >>> mbox cmd response data (6236 bytes)
3,306,730 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,759 UART: [rt]cmd =0x53574545, len=84
3,363,032 >>> mbox cmd response data (200 bytes)
3,363,033 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,686 UART: [rt]cmd =0x52564348, len=36
3,395,013 >>> mbox cmd response data (8 bytes)
3,395,014 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,424,919 UART: [rt]cmd =0x53574545, len=84
3,428,069 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,778 UART: [kat] SHA2-256
901,718 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,298 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,174,526 ready_for_fw is high
1,174,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,198,786 UART: [idev] Sha1 KeyId Algorithm
1,207,698 UART: [idev] --
1,208,715 UART: [ldev] ++
1,208,883 UART: [ldev] CDI.KEYID = 6
1,209,247 UART: [ldev] SUBJECT.KEYID = 5
1,209,674 UART: [ldev] AUTHORITY.KEYID = 7
1,210,137 UART: [ldev] FE.KEYID = 1
1,215,585 UART: [ldev] Erasing FE.KEYID = 1
1,241,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,439 UART: [ldev] --
1,280,755 UART: [fwproc] Wait for Commands...
1,281,510 UART: [fwproc] Recv command 0x46574c44
1,282,243 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,744 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,420 >>> mbox cmd response: success
2,772,581 UART: [afmc] ++
2,772,749 UART: [afmc] CDI.KEYID = 6
2,773,112 UART: [afmc] SUBJECT.KEYID = 7
2,773,538 UART: [afmc] AUTHORITY.KEYID = 5
2,808,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,312 UART: [afmc] --
2,852,248 UART: [cold-reset] --
2,853,030 UART: [state] Locking Datavault
2,854,293 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,897 UART: [state] Locking ICCM
2,855,491 UART: [exit] Launching FMC @ 0x40000130
2,860,820 UART:
2,860,836 UART: Running Caliptra FMC ...
2,861,244 UART:
2,861,387 UART: [state] CFI Enabled
2,871,640 UART: [fht] FMC Alias Private Key: 7
2,979,367 UART: [art] Extend RT PCRs Done
2,979,795 UART: [art] Lock RT PCRs Done
2,981,217 UART: [art] Populate DV Done
2,989,572 UART: [fht] FMC Alias Private Key: 7
2,990,662 UART: [art] Derive CDI
2,990,942 UART: [art] Store in in slot 0x4
3,076,731 UART: [art] Derive Key Pair
3,077,091 UART: [art] Store priv key in slot 0x5
3,090,265 UART: [art] Derive Key Pair - Done
3,105,051 UART: [art] Signing Cert with AUTHO
3,105,531 UART: RITY.KEYID = 7
3,121,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,818 UART: [art] PUB.X = 62F8B8EF36351ED50340643ABE6EBC4939A1CA879E970EDB16979DD4AE0BD72BBB508E85D3862BE9FFBA8A0B05BBEA62
3,128,595 UART: [art] PUB.Y = 4AD7E93C9A0EF35DAA3BFAEF5D0EB743FBA4B4F876ADAD1B0DB3D5944F2BD55581940CCE18C30A8DEC32935DB9A9E357
3,135,560 UART: [art] SIG.R = 7BDBEFFFCCF8BA9CDBF209891B33B8090408A142CDA4DE8944F20D7B6B0B21A455F372EECE7483A64017C8D705B3DDCE
3,142,333 UART: [art] SIG.S = EFFFCDACA6F642487593CCD2AA8B633A9C67D57F3A1AEC53CA878F84F56FE7CC06C5C50AA3265908FFEEABA97CD9EDB5
3,166,035 UART: Caliptra RT
3,166,380 UART: [state] CFI Enabled
3,274,699 UART: [rt] RT listening for mailbox commands...
3,275,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,609 UART: [rt]cmd =0x44504543, len=96
3,486,454 >>> mbox cmd response data (6236 bytes)
3,486,455 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,516,320 UART: [rt]cmd =0x53574545, len=84
3,542,613 >>> mbox cmd response data (200 bytes)
3,542,614 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,572,223 UART: [rt]cmd =0x52564348, len=36
3,574,628 >>> mbox cmd response data (8 bytes)
3,574,629 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,604,418 UART: [rt]cmd =0x53574545, len=84
3,607,726 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,595 ready_for_fw is high
1,056,595 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,334 >>> mbox cmd response: success
2,683,840 UART:
2,683,856 UART: Running Caliptra FMC ...
2,684,264 UART:
2,684,407 UART: [state] CFI Enabled
2,695,132 UART: [fht] FMC Alias Private Key: 7
2,802,717 UART: [art] Extend RT PCRs Done
2,803,145 UART: [art] Lock RT PCRs Done
2,804,935 UART: [art] Populate DV Done
2,813,248 UART: [fht] FMC Alias Private Key: 7
2,814,320 UART: [art] Derive CDI
2,814,600 UART: [art] Store in in slot 0x4
2,900,313 UART: [art] Derive Key Pair
2,900,673 UART: [art] Store priv key in slot 0x5
2,913,987 UART: [art] Derive Key Pair - Done
2,928,585 UART: [art] Signing Cert with AUTHO
2,929,065 UART: RITY.KEYID = 7
2,944,251 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,016 UART: [art] PUB.X = 535C02AF4A6C7483CAB516856E5D5370EAB57594B9229A8A36C078BE1D9C51AC0FB967923A4D0BC46220732472891E2B
2,951,777 UART: [art] PUB.Y = 5A73ADC45711F3D5DAAAEAC4E4F8907ED467C7503A272947A4DA0933A437EC58ED33937F8DD10F65E917834F89536AA5
2,958,729 UART: [art] SIG.R = 1FDBCEC642115CEEC5428C009ADC4B8A4CC6540DA4E1E5C915BA076C97D27D8A5BCCDFADF8F3997179C2F4A38DA84F20
2,965,497 UART: [art] SIG.S = A17CA6F7D5CE8CD4B3BCAD7F8E0E72046E86F29ED6B11EA30D63FDE7B53BD517F0EB46A6878404096A5E9C7ED82624D3
2,988,877 UART: Caliptra RT
2,989,222 UART: [state] CFI Enabled
3,096,475 UART: [rt] RT listening for mailbox commands...
3,097,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,561 UART: [rt]cmd =0x44504543, len=96
3,307,933 >>> mbox cmd response data (6236 bytes)
3,307,934 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,705 UART: [rt]cmd =0x53574545, len=84
3,363,026 >>> mbox cmd response data (200 bytes)
3,363,027 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,392,532 UART: [rt]cmd =0x52564348, len=36
3,394,499 >>> mbox cmd response data (8 bytes)
3,394,500 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,424,525 UART: [rt]cmd =0x53574545, len=84
3,427,661 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.24s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,075,798 UART: [fwproc] Received Image of size 78576 bytes
16,697,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,779,994 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,848,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,041,129 >>> mbox cmd response: success
17,041,593 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,044,814 UART: [afmc] ++
17,045,409 UART: [afmc] CDI.KEYID = 6
17,046,377 UART: [afmc] SUBJECT.KEYID = 7
17,047,593 UART: [afmc] AUTHORITY.KEYID = 5
20,405,898 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,707,391 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,709,647 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,724,047 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,738,900 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,753,315 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,775,082 UART: [afmc] --
22,779,318 UART: [cold-reset] --
22,782,468 UART: [state] Locking Datavault
22,790,563 UART: [state] Locking PCR0, PCR1 and PCR31
22,792,317 UART: [state] Locking ICCM
22,793,734 UART: [exit] Launching FMC @ 0x40000130
22,802,119 UART:
22,802,347 UART: Running Caliptra FMC ...
22,803,437 UART:
22,803,588 UART: [state] CFI Enabled
22,866,016 UART: [fht] FMC Alias Private Key: 7
25,204,082 UART: [art] Extend RT PCRs Done
25,205,304 UART: [art] Lock RT PCRs Done
25,207,075 UART: [art] Populate DV Done
25,212,592 UART: [fht] FMC Alias Private Key: 7
25,214,177 UART: [art] Derive CDI
25,214,906 UART: [art] Store in in slot 0x4
25,274,027 UART: [art] Derive Key Pair
25,275,078 UART: [art] Store priv key in slot 0x5
28,567,473 UART: [art] Derive Key Pair - Done
28,580,090 UART: [art] Signing Cert with AUTHO
28,581,469 UART: RITY.KEYID = 7
30,869,663 UART: [art] Erasing AUTHORITY.KEYID = 7
30,871,172 UART: [art] PUB.X = 15DEF27599FFBBC4FF760DE854EFBFFADBA585EAADE3A7373F561C97D94FA23F5507C046CC47B77A8D6DA9A42DF402A4
30,878,447 UART: [art] PUB.Y = 193C3CE05F8608C13A79C2B841FAFA92291A8B3296CC1BE4249A0E929B09C3B6B87280AAFCD2C835136308B349316A08
30,885,676 UART: [art] SIG.R = 67D32B66381DBDE8FF9796729423A2EDF84D64437F3EE75DEC2D0A2683A0FD5D798854BD34968B5224D54B0309720A78
30,893,084 UART: [art] SIG.S = 74CF497B9D6134C3EF4E2B0E291896DCCE029AEC7B07ECA8AE3690A80453568F93645A39AEA4E93CB8AE3B8A5E755EFF
32,197,728 UART: mbox::rt_entry...
32,198,696 UART: ____ _ _ _ ____ _____
32,200,698 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,202,711 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,204,639 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,206,564 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,208,458 UART: |_|
32,209,251 UART:
32,322,676 UART: [rt] Runtime listening for mailbox commands...
32,324,836 >>> mbox cmd response data (48 bytes)
34,385,207 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,529,079 UART:
34,529,471 UART: Running Caliptra ROM ...
34,530,601 UART:
34,530,768 UART: [state] CFI Enabled
34,604,289 UART: [state] LifecycleState = Unprovisioned
34,606,221 UART: [state] DebugLocked = No
34,609,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,614,736 UART: [kat] SHA2-256
34,784,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,794,931 UART: [kat] ++
34,795,463 UART: [kat] sha1
34,805,433 UART: [kat] SHA2-256
34,808,118 UART: [kat] SHA2-384
34,813,825 UART: [kat] SHA2-512-ACC
34,816,217 UART: [kat] ECC-384
37,107,321 UART: [kat] HMAC-384Kdf
37,120,444 UART: [kat] LMS
38,310,742 UART: [kat] --
38,313,385 UART: [update-reset] ++
42,458,377 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,461,394 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,842,645 >>> mbox cmd response: success
42,843,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,843,516 UART: [update-reset] Copying MAN_2 To MAN_1
42,865,793 UART: [update-reset Success] --
42,870,660 UART: [state] Locking Datavault
42,872,294 UART: [state] Locking PCR0, PCR1 and PCR31
42,874,082 UART: [state] Locking ICCM
42,876,750 UART: [exit] Launching FMC @ 0x40000130
42,885,199 UART:
42,885,430 UART: Running Caliptra FMC ...
42,886,449 UART:
42,886,590 UART: [state] CFI Enabled
42,976,421 UART: [art] Extend RT PCRs Done
42,977,608 UART: [art] Lock RT PCRs Done
42,979,030 UART: [art] Populate DV Done
42,984,486 UART: [fht] FMC Alias Private Key: 7
42,986,068 UART: [art] Derive CDI
42,986,877 UART: [art] Store in in slot 0x4
43,046,096 UART: [art] Derive Key Pair
43,047,137 UART: [art] Store priv key in slot 0x5
46,339,754 UART: [art] Derive Key Pair - Done
46,352,853 UART: [art] Signing Cert with AUTHO
46,354,146 UART: RITY.KEYID = 7
48,641,255 UART: [art] Erasing AUTHORITY.KEYID = 7
48,642,762 UART: [art] PUB.X = DE97E62EC496E46DDF44CDAAACAAB7BDA1F0E307F99C1406FD51D4B21554A324A956F610DA2156EBB3D51D1779C182DE
48,650,017 UART: [art] PUB.Y = 0127F3F1BE4B8934AC498178E1380C07B1DA27D8A1AFCBCD73218F5CED45D85C8AC8A3FEDF189C6484D324C05A91091F
48,657,299 UART: [art] SIG.R = 863C1CFE29842C4EB4F40A288BCB7C8955DDEE10B477A210358B459C5FFC5EA88C63FE56AD484107AE86E63577A25FE5
48,664,697 UART: [art] SIG.S = BE894300F026153BE777AA847993A003CE6FDE581726F6986225EF2140C269C61656342556D3EF4706F3D241424890E0
49,969,948 UART: Caliptra RT
49,970,660 UART: [state] CFI Enabled
50,300,644 UART: [rt] RT listening for mailbox commands...
50,332,647 UART: [rt]cmd =0x4d454153, len=108
50,351,334 >>> mbox cmd response data (12 bytes)
52,402,918 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,503,396 UART:
52,503,750 UART: Running Caliptra ROM ...
52,504,881 UART:
52,505,043 UART: [state] CFI Enabled
52,567,756 UART: [state] LifecycleState = Unprovisioned
52,569,683 UART: [state] DebugLocked = No
52,571,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,576,832 UART: [kat] SHA2-256
52,746,535 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,757,038 UART: [kat] ++
52,757,492 UART: [kat] sha1
52,768,108 UART: [kat] SHA2-256
52,770,784 UART: [kat] SHA2-384
52,775,412 UART: [kat] SHA2-512-ACC
52,777,757 UART: [kat] ECC-384
55,072,557 UART: [kat] HMAC-384Kdf
55,103,264 UART: [kat] LMS
56,293,546 UART: [kat] --
56,297,142 UART: [update-reset] ++
59,999,214 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,003,788 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
60,261,631 >>> mbox cmd response: success
62,305,379 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
62,404,741 UART: [update-reset] Copying MAN_2 To MAN_1
62,406,426 UART: [update-reset Success] --
62,407,582 UART: [state] Locking Datavault
62,408,715 UART: [state] Locking PCR0, PCR1 and PCR31
62,410,243 UART: [state] Locking ICCM
62,411,119 UART: [exit] Launching FMC @ 0x40000130
62,412,530 UART:
62,412,686 UART: Running Caliptra FMC ...
62,413,699 UART:
62,413,840 UART: [state] CFI Enabled
62,414,668 UART: [art] Extend RT PCRs Done
62,415,794 UART: [art] Lock RT PCRs Done
62,416,776 UART: [art] Populate DV Done
62,417,794 UART: [fht] FMC Alias Private Key: 7
62,419,047 UART: [art] Derive CDI
62,419,774 UART: [art] Store in in slot 0x4
62,420,934 UART: [art] Derive Key Pair
62,422,039 UART: [art] Store priv key in slot 0x5
63,768,541 UART: [art] Derive Key Pair - Done
63,781,652 UART: [art] Signing Cert with AUTHO
63,782,947 UART: RITY.KEYID = 7
66,070,160 UART: [art] Erasing AUTHORITY.KEYID = 7
66,071,698 UART: [art] PUB.X = D7819E4D14C0CD5949A2811E714B74FE18E1C172339E5F1C828A332B209156C2AB3FE669F1CEC682EAA47DD367DA6E7D
66,078,961 UART: [art] PUB.Y = 03D7D6E55FC56B16E825234806BFDDCC4C7575DEB331363E7AEB00401C92B73B9F02B22AD90A5E78EB57606E0EF29D0D
66,086,186 UART: [art] SIG.R = C51739920BB72C13F523CF8899A95F500F9002393C11F7280DBE219647053DB49475D89C5C68B3B34216D983B9A9554E
66,093,572 UART: [art] SIG.S = 15C099FDD96F4D2ED97D5C944C280A99F804F0A76051342C41472310E14B3686BEC1BE0420D883AA2EB18D6DD8B3EDE7
67,397,833 UART: mbox::rt_entry...
67,398,784 UART: ____ _ _ _ ____ _____
67,400,709 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,402,704 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,404,599 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,406,520 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,408,365 UART: |_|
67,409,235 UART:
67,692,819 UART: [rt] Runtime listening for mailbox commands...
67,694,897 UART:
67,695,058 UART: Running Caliptra ROM ...
67,696,076 UART:
67,696,221 UART: [state] CFI Enabled
67,757,902 UART: [state] LifecycleState = Unprovisioned
67,759,832 UART: [state] DebugLocked = No
67,761,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,766,667 UART: [kat] SHA2-256
67,936,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,946,883 UART: [kat] ++
67,947,335 UART: [kat] sha1
67,959,318 UART: [kat] SHA2-256
67,962,003 UART: [kat] SHA2-384
67,968,202 UART: [kat] SHA2-512-ACC
67,970,537 UART: [kat] ECC-384
70,258,652 UART: [kat] HMAC-384Kdf
70,291,237 UART: [kat] LMS
71,481,607 UART: [kat] --
71,486,370 UART: [update-reset] ++
75,191,409 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,194,534 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
75,452,349 >>> mbox cmd response: success
75,452,699 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,452,972 UART: [update-reset] Copying MAN_2 To MAN_1
75,475,267 UART: [update-reset Success] --
75,478,736 UART: [state] Locking Datavault
75,482,249 UART: [state] Locking PCR0, PCR1 and PCR31
75,483,963 UART: [state] Locking ICCM
75,485,008 UART: [exit] Launching FMC @ 0x40000130
75,493,408 UART:
75,493,638 UART: Running Caliptra FMC ...
75,494,728 UART:
75,494,880 UART: [state] CFI Enabled
75,591,848 UART: [art] Extend RT PCRs Done
75,593,040 UART: [art] Lock RT PCRs Done
75,594,276 UART: [art] Populate DV Done
75,599,672 UART: [fht] FMC Alias Private Key: 7
75,601,252 UART: [art] Derive CDI
75,602,056 UART: [art] Store in in slot 0x4
75,660,788 UART: [art] Derive Key Pair
75,661,782 UART: [art] Store priv key in slot 0x5
78,955,264 UART: [art] Derive Key Pair - Done
78,967,731 UART: [art] Signing Cert with AUTHO
78,969,048 UART: RITY.KEYID = 7
81,256,186 UART: [art] Erasing AUTHORITY.KEYID = 7
81,257,689 UART: [art] PUB.X = A6BF0DAF26E2503BE0C7BABC3860E9CBFB1F59C28F18D1ACD099CAC267920C926EC63F1E4BE0997585BB7E8FDA5F7F10
81,265,017 UART: [art] PUB.Y = B2C6FF9F7E649831AA283BE124B95F534A4A37625DC47606DF34247934CE67D344CE568D80548034FE117DF54EE180EE
81,272,231 UART: [art] SIG.R = 80109A7C1883C740AB6BE909059655807B0002571FFF84FEB861F170FC465E4297702BC0D31FB53F0A83197DAA6AF730
81,279,577 UART: [art] SIG.S = 4BAF3402161CD01B1EDD8DCF0BB261B5059E7AC391E9878A46D4C7F0860559B1AF55EE63297AADB4301142E03C312284
82,584,237 UART: mbox::rt_entry...
82,585,209 UART: ____ _ _ _ ____ _____
82,587,104 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,589,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,590,947 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,592,862 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,594,707 UART: |_|
82,595,577 UART:
82,878,125 UART: [rt] Runtime listening for mailbox commands...
82,880,290 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,804,242 ready_for_fw is high
3,804,634 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,152,591 >>> mbox cmd response: success
17,153,273 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,847,201 UART:
22,847,584 UART: Running Caliptra FMC ...
22,848,699 UART:
22,848,848 UART: [state] CFI Enabled
22,914,698 UART: [fht] FMC Alias Private Key: 7
25,252,960 UART: [art] Extend RT PCRs Done
25,254,179 UART: [art] Lock RT PCRs Done
25,256,202 UART: [art] Populate DV Done
25,261,666 UART: [fht] FMC Alias Private Key: 7
25,263,253 UART: [art] Derive CDI
25,264,060 UART: [art] Store in in slot 0x4
25,323,130 UART: [art] Derive Key Pair
25,324,156 UART: [art] Store priv key in slot 0x5
28,616,594 UART: [art] Derive Key Pair - Done
28,629,402 UART: [art] Signing Cert with AUTHO
28,630,708 UART: RITY.KEYID = 7
30,918,219 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,730 UART: [art] PUB.X = 980AFB9D837691CACA07B2E4F616EE0721F279A8A87942FA7707CE9307CD30AE1A174925E13BACB0B36302ECDA7B6120
30,926,932 UART: [art] PUB.Y = ABDC636001F7F947112C998FB42FBB9830180ACEF61241A1EFEFD84BEA2FA52279221E28D7795BBD4A6B57273F9AF076
30,934,176 UART: [art] SIG.R = 48C61618F2082BBE5CA08C76CDEEF31C02104792DEA4FACCD24E284165722673C0B6C2CEDD24D39B7763A369729C84AD
30,941,569 UART: [art] SIG.S = 1187FD8480FB0AEF596A9FEA74DF6B8DB4ED51B249938ACA499F96FCDE99AB74CA227F0AF83B32FF860C175855C71583
32,246,483 UART: mbox::rt_entry...
32,247,446 UART: ____ _ _ _ ____ _____
32,249,376 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,372 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,223 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,105 UART: |_|
32,257,900 UART:
32,371,251 UART: [rt] Runtime listening for mailbox commands...
32,373,381 >>> mbox cmd response data (48 bytes)
34,428,791 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,150,587 >>> mbox cmd response: success
43,151,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,185,490 UART:
43,185,776 UART: Running Caliptra FMC ...
43,186,888 UART:
43,187,041 UART: [state] CFI Enabled
43,275,676 UART: [art] Extend RT PCRs Done
43,276,861 UART: [art] Lock RT PCRs Done
43,278,261 UART: [art] Populate DV Done
43,283,892 UART: [fht] FMC Alias Private Key: 7
43,285,559 UART: [art] Derive CDI
43,286,294 UART: [art] Store in in slot 0x4
43,344,873 UART: [art] Derive Key Pair
43,345,954 UART: [art] Store priv key in slot 0x5
46,638,350 UART: [art] Derive Key Pair - Done
46,651,181 UART: [art] Signing Cert with AUTHO
46,652,481 UART: RITY.KEYID = 7
48,939,892 UART: [art] Erasing AUTHORITY.KEYID = 7
48,941,391 UART: [art] PUB.X = 91636793B0E5D939C116889C04A503F34C22FA6E2546BD6E156D9C8B514372B4CEF196E614DAA0A8C047914EE53FBA37
48,948,606 UART: [art] PUB.Y = B64A3D874DD6A376C11C13B06053DE322001FCB4AC172366C50F5977A7BA51651BAC735E466D5809755D6B817534F571
48,955,823 UART: [art] SIG.R = B343A01C2DB946993DC8C807B55F2AD06B4E530E4A07FA8D49FDE218E2BAC25D5DDC2C0A0D95F04381825D9C6CC5AF47
48,963,253 UART: [art] SIG.S = AE9A6F8918BF01158D698FB67BD8B5E67D7FC52EF405CECD11081A38B610B3E77A620A27DF7FEFF79841F264A7891672
50,268,858 UART: Caliptra RT
50,269,571 UART: [state] CFI Enabled
50,601,109 UART: [rt] RT listening for mailbox commands...
50,633,225 UART: [rt]cmd =0x4d454153, len=108
50,652,284 >>> mbox cmd response data (12 bytes)
52,696,628 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
60,674,210 >>> mbox cmd response: success
62,717,653 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
62,817,009 UART:
62,817,365 UART: Running Caliptra FMC ...
62,818,496 UART:
62,818,660 UART: [state] CFI Enabled
62,819,581 UART: [art] Extend RT PCRs Done
62,820,716 UART: [art] Lock RT PCRs Done
62,821,800 UART: [art] Populate DV Done
62,822,826 UART: [fht] FMC Alias Private Key: 7
62,824,134 UART: [art] Derive CDI
62,824,861 UART: [art] Store in in slot 0x4
62,826,018 UART: [art] Derive Key Pair
62,826,979 UART: [art] Store priv key in slot 0x5
64,171,011 UART: [art] Derive Key Pair - Done
64,183,831 UART: [art] Signing Cert with AUTHO
64,185,117 UART: RITY.KEYID = 7
66,473,453 UART: [art] Erasing AUTHORITY.KEYID = 7
66,474,965 UART: [art] PUB.X = 8EDF2684156434D0B44ACA75524B93080E133A9074F27539B575792AFB2FB0BF98E23F99F64307D3BA0BCB21F722F042
66,482,213 UART: [art] PUB.Y = AF5478A29A25DB5316F9B4E848CB3C48DA5B0A08514C7555B03CEF46982C53DB7DB2775050C57C2039618F9AE30544A6
66,489,448 UART: [art] SIG.R = 28832B52A6424FD3F877266716A2C884FFF2D3404A70D2368EC9A741C4F5DD66CC9E64A2C8A3EDC847E88FF51C9ACC3D
66,496,790 UART: [art] SIG.S = E04AE7CBD1FDDBD3F1E6E57D0CFE3A2BD1CEF5E3B83D9713545F2792036ECBFA19C473E03E15F8672F6909D34B20A3AD
67,800,875 UART: mbox::rt_entry...
67,801,846 UART: ____ _ _ _ ____ _____
67,803,850 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,805,855 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,807,775 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,809,693 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,811,613 UART: |_|
67,812,413 UART:
68,097,646 UART: [rt] Runtime listening for mailbox commands...
75,960,783 >>> mbox cmd response: success
75,961,179 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,995,159 UART:
75,995,418 UART: Running Caliptra FMC ...
75,996,527 UART:
75,996,682 UART: [state] CFI Enabled
76,101,464 UART: [art] Extend RT PCRs Done
76,102,645 UART: [art] Lock RT PCRs Done
76,104,095 UART: [art] Populate DV Done
76,109,404 UART: [fht] FMC Alias Private Key: 7
76,111,081 UART: [art] Derive CDI
76,111,898 UART: [art] Store in in slot 0x4
76,171,280 UART: [art] Derive Key Pair
76,172,273 UART: [art] Store priv key in slot 0x5
79,464,942 UART: [art] Derive Key Pair - Done
79,477,820 UART: [art] Signing Cert with AUTHO
79,479,146 UART: RITY.KEYID = 7
81,766,076 UART: [art] Erasing AUTHORITY.KEYID = 7
81,767,584 UART: [art] PUB.X = 56BB4CAEDFD8FEAF971D173419D4409F70ACB548FBF00CC6B3A4B0E1DDAA5192A28C2F4AA05AF252C77FD034A8E22533
81,774,871 UART: [art] PUB.Y = 6E09AF685AA98A2138D882EBF426423C0D23D4DC98E53DEF8C4D3A913B119801913BE1C8E197BD53A4BB7C3E45481650
81,782,076 UART: [art] SIG.R = A2AD9DF803BF283682ED63026E43587193FDFC1E012A2FA2C484DC6A92FFC1A4F9478C9523BD7610796657CB40950A6C
81,789,501 UART: [art] SIG.S = 46799197AF8AB9E046ADCE5C7DB44EE15C1D15DC27E0C6E44DA9D661E1C3755403306143BEA38C9F2993D60382171D21
83,093,940 UART: mbox::rt_entry...
83,094,907 UART: ____ _ _ _ ____ _____
83,096,974 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,098,996 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,100,927 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,102,776 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,104,615 UART: |_|
83,105,433 UART:
83,388,583 UART: [rt] Runtime listening for mailbox commands...
83,390,752 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.29s
Truncated 2675 bytes from beginning
ceived command 0x46574c44
13,311,164 UART: [fwproc] Received Image of size 78576 bytes
16,927,193 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,001,277 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,070,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,263,570 >>> mbox cmd response: success
17,264,064 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,267,254 UART: [afmc] ++
17,267,848 UART: [afmc] CDI.KEYID = 6
17,268,728 UART: [afmc] SUBJECT.KEYID = 7
17,270,006 UART: [afmc] AUTHORITY.KEYID = 5
20,585,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,878,041 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,880,300 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,894,713 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,909,497 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,923,948 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,944,462 UART: [afmc] --
22,947,467 UART: [cold-reset] --
22,950,143 UART: [state] Locking Datavault
22,954,466 UART: [state] Locking PCR0, PCR1 and PCR31
22,956,227 UART: [state] Locking ICCM
22,957,297 UART: [exit] Launching FMC @ 0x40000130
22,965,650 UART:
22,965,923 UART: Running Caliptra FMC ...
22,967,032 UART:
22,967,198 UART: [state] CFI Enabled
22,975,198 UART: [fht] FMC Alias Private Key: 7
25,305,317 UART: [art] Extend RT PCRs Done
25,306,536 UART: [art] Lock RT PCRs Done
25,307,945 UART: [art] Populate DV Done
25,313,201 UART: [fht] FMC Alias Private Key: 7
25,314,844 UART: [art] Derive CDI
25,315,679 UART: [art] Store in in slot 0x4
25,357,640 UART: [art] Derive Key Pair
25,358,641 UART: [art] Store priv key in slot 0x5
28,600,618 UART: [art] Derive Key Pair - Done
28,613,567 UART: [art] Signing Cert with AUTHO
28,614,871 UART: RITY.KEYID = 7
30,893,912 UART: [art] Erasing AUTHORITY.KEYID = 7
30,895,412 UART: [art] PUB.X = 912871B1797B5E80E98CFA8B727E027434F277746E79A00295ECDDD7D23FCA17B5632B3D5C044341C5F8D5C7A6DCB50D
30,902,667 UART: [art] PUB.Y = 55DB9F74BDD8C2283AFE2CAE2C282ABA74C47B8ABCBD0741A5B206D56AE4EA665519B69AC4249B3664F4A269141406A0
30,909,906 UART: [art] SIG.R = 2124BD5A37360221BAA0CA85518A481C8E862FA048A729985BBD75F5237F3EA679E9DAAD142EEDD43FAF61D840E850CD
30,917,300 UART: [art] SIG.S = C14F6F30D53EE9C179784D65F09ADB01B5904B0DEE7B61EECECFE797B4E4CA7BEC341F8286E1AB750EE497CF2F5870A9
32,221,612 UART: mbox::rt_entry...
32,222,565 UART: ____ _ _ _ ____ _____
32,224,497 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,226,504 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,228,435 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,230,387 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,232,322 UART: |_|
32,233,136 UART:
32,347,338 UART: [rt] Runtime listening for mailbox commands...
32,349,478 >>> mbox cmd response data (48 bytes)
34,476,355 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,620,380 UART:
34,620,766 UART: Running Caliptra ROM ...
34,621,855 UART:
34,622,023 UART: [state] CFI Enabled
34,635,137 UART: [state] LifecycleState = Unprovisioned
34,637,038 UART: [state] DebugLocked = No
34,638,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,643,551 UART: [kat] SHA2-256
34,813,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,823,819 UART: [kat] ++
34,824,281 UART: [kat] sha1
34,835,599 UART: [kat] SHA2-256
34,838,345 UART: [kat] SHA2-384
34,844,219 UART: [kat] SHA2-512-ACC
34,846,620 UART: [kat] ECC-384
37,132,077 UART: [kat] HMAC-384Kdf
37,143,495 UART: [kat] LMS
38,333,574 UART: [kat] --
38,337,565 UART: [update-reset] ++
42,474,536 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,478,770 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,860,043 >>> mbox cmd response: success
42,860,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,862,057 UART: [update-reset] Copying MAN_2 To MAN_1
42,884,504 UART: [update-reset Success] --
42,888,014 UART: [state] Locking Datavault
42,892,139 UART: [state] Locking PCR0, PCR1 and PCR31
42,893,908 UART: [state] Locking ICCM
42,896,682 UART: [exit] Launching FMC @ 0x40000130
42,905,086 UART:
42,905,331 UART: Running Caliptra FMC ...
42,906,438 UART:
42,906,595 UART: [state] CFI Enabled
42,950,931 UART: [art] Extend RT PCRs Done
42,952,073 UART: [art] Lock RT PCRs Done
42,953,682 UART: [art] Populate DV Done
42,959,217 UART: [fht] FMC Alias Private Key: 7
42,960,875 UART: [art] Derive CDI
42,961,678 UART: [art] Store in in slot 0x4
43,003,962 UART: [art] Derive Key Pair
43,004,976 UART: [art] Store priv key in slot 0x5
46,247,064 UART: [art] Derive Key Pair - Done
46,260,171 UART: [art] Signing Cert with AUTHO
46,261,476 UART: RITY.KEYID = 7
48,540,634 UART: [art] Erasing AUTHORITY.KEYID = 7
48,542,150 UART: [art] PUB.X = 7A1062B3609E8ECBA187EDF8C93699578B7D3170B656E7A5C2DF888654FF7C3C595AA072011530AB699D8635829644CE
48,549,375 UART: [art] PUB.Y = E9893465ABF20301299AE81FF11287548F10BA046E14A78B974445DAAC078A00B23625A022640AF550935F57C41BC238
48,556,562 UART: [art] SIG.R = 61411859B58B78CD4F41264944B096EE9A89DDCAC96717CE4D2FD0E9B4CB0B1B1A2A38AB3515920A2EA44D99958A8D06
48,564,012 UART: [art] SIG.S = E11B10C32CCA33F74F1EEE0DA50A710CA021187D5E421E35D7E6F79C4A40E9ECEBEAF05810C7C34ED1045722E0230B67
49,869,547 UART: Caliptra RT
49,870,257 UART: [state] CFI Enabled
50,159,963 UART: [rt] RT listening for mailbox commands...
50,192,014 UART: [rt]cmd =0x4d454153, len=108
50,210,416 >>> mbox cmd response data (12 bytes)
52,324,840 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,425,407 UART:
52,425,752 UART: Running Caliptra ROM ...
52,426,808 UART:
52,427,070 UART: [state] CFI Enabled
52,439,406 UART: [state] LifecycleState = Unprovisioned
52,441,358 UART: [state] DebugLocked = No
52,442,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,448,032 UART: [kat] SHA2-256
52,617,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,628,264 UART: [kat] ++
52,628,725 UART: [kat] sha1
52,639,473 UART: [kat] SHA2-256
52,642,173 UART: [kat] SHA2-384
52,648,466 UART: [kat] SHA2-512-ACC
52,650,823 UART: [kat] ECC-384
54,935,815 UART: [kat] HMAC-384Kdf
54,948,009 UART: [kat] LMS
56,138,024 UART: [kat] --
56,143,882 UART: [update-reset] ++
59,850,838 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,854,020 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
60,111,855 >>> mbox cmd response: success
62,224,324 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
62,323,794 UART: [update-reset] Copying MAN_2 To MAN_1
62,325,538 UART: [update-reset Success] --
62,326,711 UART: [state] Locking Datavault
62,327,862 UART: [state] Locking PCR0, PCR1 and PCR31
62,329,399 UART: [state] Locking ICCM
62,330,327 UART: [exit] Launching FMC @ 0x40000130
62,331,752 UART:
62,331,917 UART: Running Caliptra FMC ...
62,333,017 UART:
62,333,178 UART: [state] CFI Enabled
62,334,096 UART: [art] Extend RT PCRs Done
62,335,238 UART: [art] Lock RT PCRs Done
62,336,308 UART: [art] Populate DV Done
62,337,339 UART: [fht] FMC Alias Private Key: 7
62,338,658 UART: [art] Derive CDI
62,339,401 UART: [art] Store in in slot 0x4
62,340,573 UART: [art] Derive Key Pair
62,341,587 UART: [art] Store priv key in slot 0x5
63,496,604 UART: [art] Derive Key Pair - Done
63,509,818 UART: [art] Signing Cert with AUTHO
63,511,115 UART: RITY.KEYID = 7
65,790,166 UART: [art] Erasing AUTHORITY.KEYID = 7
65,791,674 UART: [art] PUB.X = C47247ED721B478E5AA78091B21CAD314EF7AB0ACA31A90A518FE67474FC6E491636D4E4F2AEFBF9E4813FC4BCC70167
65,798,935 UART: [art] PUB.Y = A7FA74F5513D1BFF1F09D01BF64AFC07DFB451B936DB2D06D8BE561BB16C91C57F993DAE8F86B55843E74E43C1190FAF
65,806,230 UART: [art] SIG.R = 476FEB1A31EE1CF612A36A7085462C472D3EAC7F2E1C84DB5F252B5A9718EBCC695EAE94F773D9480C1FCA800A29BA0A
65,813,578 UART: [art] SIG.S = 85CD45822BCCC0FDC58B24F2DC734845FF04217231A0CA8692133C4143D328F5C2A12FB20D5999F4861A4E6A7ED51729
67,118,004 UART: mbox::rt_entry...
67,118,977 UART: ____ _ _ _ ____ _____
67,121,155 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,123,188 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,125,189 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,127,135 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,129,071 UART: |_|
67,129,905 UART:
67,417,640 UART: [rt] Runtime listening for mailbox commands...
67,419,749 UART:
67,419,911 UART: Running Caliptra ROM ...
67,420,935 UART:
67,421,358 UART: [state] CFI Enabled
67,432,979 UART: [state] LifecycleState = Unprovisioned
67,434,860 UART: [state] DebugLocked = No
67,436,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,441,959 UART: [kat] SHA2-256
67,611,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,622,180 UART: [kat] ++
67,622,666 UART: [kat] sha1
67,633,715 UART: [kat] SHA2-256
67,636,413 UART: [kat] SHA2-384
67,642,725 UART: [kat] SHA2-512-ACC
67,645,093 UART: [kat] ECC-384
69,929,505 UART: [kat] HMAC-384Kdf
69,940,431 UART: [kat] LMS
71,130,467 UART: [kat] --
71,135,268 UART: [update-reset] ++
74,838,191 UART: [update-reset] Image verified using Vendor ECC Key Index 0
74,841,491 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
75,099,321 >>> mbox cmd response: success
75,099,692 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,101,332 UART: [update-reset] Copying MAN_2 To MAN_1
75,123,766 UART: [update-reset Success] --
75,129,599 UART: [state] Locking Datavault
75,133,992 UART: [state] Locking PCR0, PCR1 and PCR31
75,135,752 UART: [state] Locking ICCM
75,138,122 UART: [exit] Launching FMC @ 0x40000130
75,146,573 UART:
75,146,827 UART: Running Caliptra FMC ...
75,147,932 UART:
75,148,087 UART: [state] CFI Enabled
75,192,230 UART: [art] Extend RT PCRs Done
75,193,373 UART: [art] Lock RT PCRs Done
75,194,873 UART: [art] Populate DV Done
75,200,062 UART: [fht] FMC Alias Private Key: 7
75,201,696 UART: [art] Derive CDI
75,202,468 UART: [art] Store in in slot 0x4
75,245,062 UART: [art] Derive Key Pair
75,246,071 UART: [art] Store priv key in slot 0x5
78,488,163 UART: [art] Derive Key Pair - Done
78,501,158 UART: [art] Signing Cert with AUTHO
78,502,456 UART: RITY.KEYID = 7
80,781,364 UART: [art] Erasing AUTHORITY.KEYID = 7
80,782,914 UART: [art] PUB.X = FE9A4A43ADFB23F60099B41757178B905C51762A657208A7D10041CF65AE11FAB4420D4B0E767FFDCBED5FF29D7E0C97
80,790,146 UART: [art] PUB.Y = 55C4127ADB6D963A70832B9CD33656C591CB91B58CB8DFA01D7147F3629679A9F5280E735F99551EB6F7ED63D8451FB7
80,797,388 UART: [art] SIG.R = 13E624674D466C00DD76D31F55A195F380C2D79DDD39817B16C9385C7DE6E8BDA517E0F204E858BABD142264A9314C3A
80,804,787 UART: [art] SIG.S = 857E1AB5927972BA6EEE61127724FAD6970E61E3258526F4759DCCC47496F758CA927F3001D7C452A8B45AECA03008C8
82,109,386 UART: mbox::rt_entry...
82,110,337 UART: ____ _ _ _ ____ _____
82,112,319 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,114,327 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,116,186 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,118,106 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,119,962 UART: |_|
82,120,789 UART:
82,401,279 UART: [rt] Runtime listening for mailbox commands...
82,403,418 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,127,673 ready_for_fw is high
4,128,212 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,357,656 >>> mbox cmd response: success
17,358,265 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,997,678 UART:
22,998,072 UART: Running Caliptra FMC ...
22,999,183 UART:
22,999,339 UART: [state] CFI Enabled
23,007,193 UART: [fht] FMC Alias Private Key: 7
25,337,751 UART: [art] Extend RT PCRs Done
25,338,986 UART: [art] Lock RT PCRs Done
25,340,794 UART: [art] Populate DV Done
25,346,000 UART: [fht] FMC Alias Private Key: 7
25,347,652 UART: [art] Derive CDI
25,348,472 UART: [art] Store in in slot 0x4
25,391,020 UART: [art] Derive Key Pair
25,392,065 UART: [art] Store priv key in slot 0x5
28,633,979 UART: [art] Derive Key Pair - Done
28,646,661 UART: [art] Signing Cert with AUTHO
28,647,967 UART: RITY.KEYID = 7
30,927,068 UART: [art] Erasing AUTHORITY.KEYID = 7
30,928,579 UART: [art] PUB.X = 0B53E6E3236BC70B129930A8B737AEDCDABDE6FCF0A5E5EF073510F9F1C99131B99F692D176B27E0DF7EF41EF18BAE19
30,935,834 UART: [art] PUB.Y = AA2C43DC816A3C21D8B0E99701E84676CB084368A51A7487A259D5CEB7B8620DD238BBE81070C3A703E248C0E70B773D
30,943,078 UART: [art] SIG.R = BDB6209069CDD05D2DD36E03EB104D11317EFA3916C70AE6A539A677C5D0F63CC054B38D0DEBED6AA3316F5971582477
30,950,481 UART: [art] SIG.S = 6B2D59343EDD9CF356F102A9D9CC95910B951E0D11D335892568528CA4C38D2FBEC36631CE81239B877E6CBD9468BE95
32,254,982 UART: mbox::rt_entry...
32,255,953 UART: ____ _ _ _ ____ _____
32,257,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,260,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,262,122 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,264,086 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,266,021 UART: |_|
32,266,834 UART:
32,380,532 UART: [rt] Runtime listening for mailbox commands...
32,382,712 >>> mbox cmd response data (48 bytes)
34,508,891 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,154,475 >>> mbox cmd response: success
43,155,037 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,188,844 UART:
43,189,156 UART: Running Caliptra FMC ...
43,190,195 UART:
43,190,345 UART: [state] CFI Enabled
43,234,655 UART: [art] Extend RT PCRs Done
43,235,855 UART: [art] Lock RT PCRs Done
43,237,124 UART: [art] Populate DV Done
43,242,807 UART: [fht] FMC Alias Private Key: 7
43,244,455 UART: [art] Derive CDI
43,245,193 UART: [art] Store in in slot 0x4
43,288,111 UART: [art] Derive Key Pair
43,289,111 UART: [art] Store priv key in slot 0x5
46,531,018 UART: [art] Derive Key Pair - Done
46,544,075 UART: [art] Signing Cert with AUTHO
46,545,389 UART: RITY.KEYID = 7
48,824,960 UART: [art] Erasing AUTHORITY.KEYID = 7
48,826,475 UART: [art] PUB.X = F55C4503D182463319F10AC830AF82C724FC3625A9F2A06444499E04EDD2BB1EFE18A46310486F100ABD8305631C2777
48,833,698 UART: [art] PUB.Y = B7C42841CFB4D65AC4FA399B3F6A1E496BE6887E5F8FF3F4617A4498B99563FF64B908C6FC34F6EA7096D9D1930A4296
48,840,959 UART: [art] SIG.R = 669CB7A10E426BC18E916DFBD494261273479538F218F26397C072EF4365B8BE2C1310DF7DFD682A4ACF74EC79A1B86B
48,848,365 UART: [art] SIG.S = E79FABCCF80743B2E68112C562BEDDCB9937194E313977F255C309F64BF2B756264E84F78716D62A1A86B0D2F9F72F0C
50,153,850 UART: Caliptra RT
50,154,556 UART: [state] CFI Enabled
50,442,876 UART: [rt] RT listening for mailbox commands...
50,474,723 UART: [rt]cmd =0x4d454153, len=108
50,493,761 >>> mbox cmd response data (12 bytes)
52,616,329 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
60,506,912 >>> mbox cmd response: success
62,619,598 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
62,718,990 UART:
62,719,340 UART: Running Caliptra FMC ...
62,720,394 UART:
62,720,545 UART: [state] CFI Enabled
62,721,428 UART: [art] Extend RT PCRs Done
62,722,492 UART: [art] Lock RT PCRs Done
62,723,570 UART: [art] Populate DV Done
62,724,554 UART: [fht] FMC Alias Private Key: 7
62,725,883 UART: [art] Derive CDI
62,726,618 UART: [art] Store in in slot 0x4
62,727,711 UART: [art] Derive Key Pair
62,728,705 UART: [art] Store priv key in slot 0x5
63,883,647 UART: [art] Derive Key Pair - Done
63,896,380 UART: [art] Signing Cert with AUTHO
63,897,684 UART: RITY.KEYID = 7
66,177,503 UART: [art] Erasing AUTHORITY.KEYID = 7
66,179,140 UART: [art] PUB.X = 4C7CADE92B6D8F762CA668E43F85504E8D0BA391738FC3D5FA71A1252F90D6E9C86EF6B0A25EBA8BB4E1A1D33A85E1DE
66,186,290 UART: [art] PUB.Y = E5C1EB2512BADE320E9119F44EBD476F4F64F034427ECEE00FBAD600F4AFBB1D6DD7E47F00C398954BBDBED39DAD3DBB
66,193,532 UART: [art] SIG.R = A4880449BE6230AFE04A1EB6A561F614E6F81FB032FA24340AA5AF9C16BEE35F7C06BCB5DBC7ACC301DD2CA927011D6F
66,200,978 UART: [art] SIG.S = 46029EA3D31C6E3C80E29707EBA3D5CBFA54C3B8F46628D9FE8E64A3A05864FBA3C1A1607808CF4DAC0D15780A720303
67,505,584 UART: mbox::rt_entry...
67,506,553 UART: ____ _ _ _ ____ _____
67,508,486 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,510,494 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,512,355 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,514,282 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,516,167 UART: |_|
67,517,055 UART:
67,797,155 UART: [rt] Runtime listening for mailbox commands...
75,593,197 >>> mbox cmd response: success
75,593,612 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,628,591 UART:
75,628,887 UART: Running Caliptra FMC ...
75,629,923 UART:
75,630,072 UART: [state] CFI Enabled
75,674,495 UART: [art] Extend RT PCRs Done
75,675,647 UART: [art] Lock RT PCRs Done
75,677,230 UART: [art] Populate DV Done
75,683,117 UART: [fht] FMC Alias Private Key: 7
75,684,596 UART: [art] Derive CDI
75,685,327 UART: [art] Store in in slot 0x4
75,727,763 UART: [art] Derive Key Pair
75,728,828 UART: [art] Store priv key in slot 0x5
78,971,227 UART: [art] Derive Key Pair - Done
78,984,024 UART: [art] Signing Cert with AUTHO
78,985,364 UART: RITY.KEYID = 7
81,264,296 UART: [art] Erasing AUTHORITY.KEYID = 7
81,265,819 UART: [art] PUB.X = 3F3DE99D0AA96796C7443F0816862B40CF5507E6477E26772FA1783D8BB8E9ADC0EF0A6C410A4945E52506CEDDB0360E
81,273,029 UART: [art] PUB.Y = 16E299561A9B81401E838F4D7FF345E8CA8A7D31F5DBB500C3F51CEE3BAFB8AB159D974C41079B3A400ACBF3A2DCA48B
81,280,271 UART: [art] SIG.R = 109A39416F5EB3907DF4C97C6535EA0298AC3A1A68B8F6BB1673A1CD92BA2AC41898E7FBF426D9264FF6E40952D49750
81,287,719 UART: [art] SIG.S = F24A4873C90E8D2A690CBE70B52E27C5D6698D1E0002D67137FFBD1163539E4AA6DF38826029E904F761B9EFC9CDB4FD
82,592,374 UART: mbox::rt_entry...
82,593,339 UART: ____ _ _ _ ____ _____
82,595,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,597,406 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,599,338 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,601,270 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,603,197 UART: |_|
82,604,033 UART:
82,884,408 UART: [rt] Runtime listening for mailbox commands...
82,886,578 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 4.26s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,404,508 UART: [ldev] --
10,409,993 UART: [fwproc] Wait for Commands...
10,413,009 UART: [fwproc] Recv command 0x46574c44
10,415,110 UART: [fwproc] Recv'd Img size: 78532 bytes
13,386,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,463,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,532,274 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,725,737 >>> mbox cmd response: success
13,726,240 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,729,236 UART: [afmc] ++
13,729,819 UART: [afmc] CDI.KEYID = 6
13,730,890 UART: [afmc] SUBJECT.KEYID = 7
13,731,992 UART: [afmc] AUTHORITY.KEYID = 5
16,268,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,992,208 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,994,127 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,009,855 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,025,914 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,041,786 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,065,551 UART: [afmc] --
18,068,712 UART: [cold-reset] --
18,072,696 UART: [state] Locking Datavault
18,077,138 UART: [state] Locking PCR0, PCR1 and PCR31
18,078,785 UART: [state] Locking ICCM
18,081,455 UART: [exit] Launching FMC @ 0x40000130
18,089,850 UART:
18,090,083 UART: Running Caliptra FMC ...
18,091,113 UART:
18,091,261 UART: [state] CFI Enabled
18,151,623 UART: [fht] FMC Alias Private Key: 7
19,915,497 UART: [art] Extend RT PCRs Done
19,916,715 UART: [art] Lock RT PCRs Done
19,918,316 UART: [art] Populate DV Done
19,923,944 UART: [fht] FMC Alias Private Key: 7
19,925,433 UART: [art] Derive CDI
19,926,175 UART: [art] Store in in slot 0x4
19,984,262 UART: [art] Derive Key Pair
19,985,328 UART: [art] Store priv key in slot 0x5
22,448,403 UART: [art] Derive Key Pair - Done
22,461,395 UART: [art] Signing Cert with AUTHO
22,462,699 UART: RITY.KEYID = 7
24,174,327 UART: [art] Erasing AUTHORITY.KEYID = 7
24,175,827 UART: [art] PUB.X = C53C555954891B058774D63FD792114E2FDA60C16979E20A60F9A35BDF541CC9824137CD4C2BB6698DDDBC432719D60A
24,183,102 UART: [art] PUB.Y = 13787F80E0E8FB70CB18DBAE28A06F4508861A0F5408D91C39CD803FE9915443140CED98483BE561270CC50B156640C3
24,190,355 UART: [art] SIG.R = AA83BB6ABA492F8AB5584E475B495CCDA7E030AA4DD0928040EC88DBE7EF1D3EED1A80A02EE63FD87C7D16CD3CEC9FDA
24,197,760 UART: [art] SIG.S = E825C77ADCF0D33E0E955CCF38458B61EDF2C274A4089914988021CF1409EDBEC4050E4C3C0E72E991B61C4BAB153A78
25,176,809 UART: mbox::rt_entry...
25,177,777 UART: ____ _ _ _ ____ _____
25,179,761 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,181,768 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,183,701 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,185,628 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,187,556 UART: |_|
25,188,383 UART:
25,301,945 UART: [rt] Runtime listening for mailbox commands...
25,304,106 >>> mbox cmd response data (48 bytes)
27,365,960 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,510,550 UART:
27,510,918 UART: Running Caliptra ROM ...
27,512,056 UART:
27,512,235 UART: [state] CFI Enabled
27,583,704 UART: [state] LifecycleState = Unprovisioned
27,585,587 UART: [state] DebugLocked = No
27,588,079 UART: [state] WD Timer not started. Device not locked for debugging
27,592,531 UART: [kat] SHA2-256
27,771,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,783,238 UART: [kat] ++
27,783,787 UART: [kat] sha1
27,795,983 UART: [kat] SHA2-256
27,799,007 UART: [kat] SHA2-384
27,805,071 UART: [kat] SHA2-512-ACC
27,808,003 UART: [kat] ECC-384
30,269,086 UART: [kat] HMAC-384Kdf
30,290,657 UART: [kat] LMS
30,820,134 UART: [kat] --
30,823,254 UART: [update-reset] ++
34,256,829 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,260,583 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,642,920 >>> mbox cmd response: success
34,643,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,643,809 UART: [update-reset] Copying MAN_2 To MAN_1
34,665,506 UART: [update-reset Success] --
34,668,279 UART: [state] Locking Datavault
34,671,858 UART: [state] Locking PCR0, PCR1 and PCR31
34,673,505 UART: [state] Locking ICCM
34,674,550 UART: [exit] Launching FMC @ 0x40000130
34,683,013 UART:
34,683,288 UART: Running Caliptra FMC ...
34,684,981 UART:
34,685,156 UART: [state] CFI Enabled
34,782,556 UART: [art] Extend RT PCRs Done
34,783,746 UART: [art] Lock RT PCRs Done
34,785,263 UART: [art] Populate DV Done
34,790,776 UART: [fht] FMC Alias Private Key: 7
34,792,417 UART: [art] Derive CDI
34,793,248 UART: [art] Store in in slot 0x4
34,851,065 UART: [art] Derive Key Pair
34,852,121 UART: [art] Store priv key in slot 0x5
37,315,398 UART: [art] Derive Key Pair - Done
37,328,910 UART: [art] Signing Cert with AUTHO
37,330,264 UART: RITY.KEYID = 7
39,041,620 UART: [art] Erasing AUTHORITY.KEYID = 7
39,043,131 UART: [art] PUB.X = BFB69D5A626E52846143B0FA7581617A7E847455EBFFE985AC5E3A6A821E12729EFA11CF624E2E43E7E45489C351EE67
39,050,344 UART: [art] PUB.Y = 877EFEB4901FDDC5AEC3439FD6E13B62739C98907D2A52CAFCA11FE6251F34CBE845D40F47CE84CDF31845DA0A0CF8DD
39,057,655 UART: [art] SIG.R = F1151D208ED9FD8CDA1D984DD13CF52C882E124479B21125EAA71476C2BBDBFDF805AA3A9DB186F28AE900B78961BDDB
39,065,074 UART: [art] SIG.S = 26DFE7148C47B639E40EAFA98C47AC2868983C19B556AAD5E70AB4B5840A1E0352CF252D885B2A9A2FB91BBE9E0CA768
40,043,781 UART: Caliptra RT
40,044,504 UART: [state] CFI Enabled
40,375,965 UART: [rt] RT listening for mailbox commands...
40,408,304 UART: [rt]cmd =0x4d454153, len=108
40,427,348 >>> mbox cmd response data (12 bytes)
42,472,522 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,573,192 UART:
42,573,557 UART: Running Caliptra ROM ...
42,574,692 UART:
42,574,862 UART: [state] CFI Enabled
42,644,450 UART: [state] LifecycleState = Unprovisioned
42,646,327 UART: [state] DebugLocked = No
42,649,010 UART: [state] WD Timer not started. Device not locked for debugging
42,653,572 UART: [kat] SHA2-256
42,832,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,844,261 UART: [kat] ++
42,844,800 UART: [kat] sha1
42,856,073 UART: [kat] SHA2-256
42,859,090 UART: [kat] SHA2-384
42,866,066 UART: [kat] SHA2-512-ACC
42,869,013 UART: [kat] ECC-384
45,330,035 UART: [kat] HMAC-384Kdf
45,352,208 UART: [kat] LMS
45,881,694 UART: [kat] --
45,886,005 UART: [update-reset] ++
48,877,443 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,880,015 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,137,608 >>> mbox cmd response: success
51,181,018 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
51,280,213 UART: [update-reset] Copying MAN_2 To MAN_1
51,281,897 UART: [update-reset Success] --
51,283,061 UART: [state] Locking Datavault
51,284,213 UART: [state] Locking PCR0, PCR1 and PCR31
51,285,770 UART: [state] Locking ICCM
51,286,732 UART: [exit] Launching FMC @ 0x40000130
51,288,162 UART:
51,288,331 UART: Running Caliptra FMC ...
51,289,433 UART:
51,289,591 UART: [state] CFI Enabled
51,290,506 UART: [art] Extend RT PCRs Done
51,291,642 UART: [art] Lock RT PCRs Done
51,292,666 UART: [art] Populate DV Done
51,293,642 UART: [fht] FMC Alias Private Key: 7
51,294,958 UART: [art] Derive CDI
51,295,696 UART: [art] Store in in slot 0x4
51,296,866 UART: [art] Derive Key Pair
51,297,860 UART: [art] Store priv key in slot 0x5
51,822,180 UART: [art] Derive Key Pair - Done
51,835,213 UART: [art] Signing Cert with AUTHO
51,836,528 UART: RITY.KEYID = 7
53,548,375 UART: [art] Erasing AUTHORITY.KEYID = 7
53,549,886 UART: [art] PUB.X = F92CA4B8CD84AE74072C85F708CE0BA18FB015A17ABB2FDA846BB68708CE2534B292F7BEE86B0D7D1DDC6DC7D06D3F6F
53,557,153 UART: [art] PUB.Y = 940FA2BE6415B969E72CA2F0B4157FCA95AD071BF6ED2BAC8774D028B7DF44AAF29BC5B6E3988F7BC3DEF6531B7AA30B
53,564,496 UART: [art] SIG.R = A456A8BFB47402DBE38FC15439488078DFFC3DE89009BCE6895D3C230BBA6855EE8414F03A0C8C06D8690E877AAD163F
53,571,861 UART: [art] SIG.S = 40E535A14F84B70B255E81570B18854972733AD8EFAC2CDC06A5E96ACFD25B2C2B43781D098DDD3207628DF6E40DAAC8
54,549,936 UART: mbox::rt_entry...
54,550,904 UART: ____ _ _ _ ____ _____
54,552,838 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,554,849 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,556,788 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,558,721 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,560,652 UART: |_|
54,561,464 UART:
54,842,954 UART: [rt] Runtime listening for mailbox commands...
54,845,025 UART:
54,845,221 UART: Running Caliptra ROM ...
54,846,332 UART:
54,846,490 UART: [state] CFI Enabled
54,911,272 UART: [state] LifecycleState = Unprovisioned
54,913,106 UART: [state] DebugLocked = No
54,914,867 UART: [state] WD Timer not started. Device not locked for debugging
54,918,400 UART: [kat] SHA2-256
55,097,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
55,109,077 UART: [kat] ++
55,109,532 UART: [kat] sha1
55,121,227 UART: [kat] SHA2-256
55,124,295 UART: [kat] SHA2-384
55,130,437 UART: [kat] SHA2-512-ACC
55,133,377 UART: [kat] ECC-384
57,596,515 UART: [kat] HMAC-384Kdf
57,618,948 UART: [kat] LMS
58,148,435 UART: [kat] --
58,152,957 UART: [update-reset] ++
61,143,936 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,146,503 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
61,404,103 >>> mbox cmd response: success
61,404,456 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,405,169 UART: [update-reset] Copying MAN_2 To MAN_1
61,427,505 UART: [update-reset Success] --
61,433,518 UART: [state] Locking Datavault
61,435,961 UART: [state] Locking PCR0, PCR1 and PCR31
61,437,658 UART: [state] Locking ICCM
61,439,812 UART: [exit] Launching FMC @ 0x40000130
61,448,268 UART:
61,448,512 UART: Running Caliptra FMC ...
61,449,616 UART:
61,449,775 UART: [state] CFI Enabled
61,554,089 UART: [art] Extend RT PCRs Done
61,555,278 UART: [art] Lock RT PCRs Done
61,556,679 UART: [art] Populate DV Done
61,562,083 UART: [fht] FMC Alias Private Key: 7
61,563,710 UART: [art] Derive CDI
61,564,532 UART: [art] Store in in slot 0x4
61,622,690 UART: [art] Derive Key Pair
61,623,687 UART: [art] Store priv key in slot 0x5
64,101,383 UART: [art] Derive Key Pair - Done
64,114,484 UART: [art] Signing Cert with AUTHO
64,115,792 UART: RITY.KEYID = 7
65,826,495 UART: [art] Erasing AUTHORITY.KEYID = 7
65,828,001 UART: [art] PUB.X = 75FB79B9F341558DC2017998224108F604D77324533C4739B9B5601805B03F006D5449CEC5389E72B2D6A0FD694E2E16
65,835,223 UART: [art] PUB.Y = 9590ACCC5289FE077036C946FA4CCF8F19436E6E8C70885DC2D607F84EA463A0E97EA607B26ABAF44BD32994AB531938
65,842,475 UART: [art] SIG.R = 296410779CD39B7D21558348B71B506476EB9572F76D13896FAD7C72E6CDD835C6D6F03CE5271558A912550913AE69E3
65,849,846 UART: [art] SIG.S = C90B4DBE9FEBA6C94E3B0C8765020D5C47C3B202CEF93218F72334CD1E91E576754BDE868FB92A9EC5A76AB8C9AACBB7
66,827,691 UART: mbox::rt_entry...
66,828,647 UART: ____ _ _ _ ____ _____
66,830,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,832,632 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,834,564 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,836,495 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,838,434 UART: |_|
66,839,245 UART:
67,122,877 UART: [rt] Runtime listening for mailbox commands...
67,125,059 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,382,121 ready_for_fw is high
3,382,682 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,499,624 >>> mbox cmd response: success
13,500,251 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,792,164 UART:
17,792,551 UART: Running Caliptra FMC ...
17,793,661 UART:
17,793,815 UART: [state] CFI Enabled
17,858,679 UART: [fht] FMC Alias Private Key: 7
19,622,568 UART: [art] Extend RT PCRs Done
19,623,791 UART: [art] Lock RT PCRs Done
19,625,716 UART: [art] Populate DV Done
19,630,975 UART: [fht] FMC Alias Private Key: 7
19,632,679 UART: [art] Derive CDI
19,633,437 UART: [art] Store in in slot 0x4
19,691,165 UART: [art] Derive Key Pair
19,692,212 UART: [art] Store priv key in slot 0x5
22,155,507 UART: [art] Derive Key Pair - Done
22,168,238 UART: [art] Signing Cert with AUTHO
22,169,542 UART: RITY.KEYID = 7
23,881,434 UART: [art] Erasing AUTHORITY.KEYID = 7
23,882,946 UART: [art] PUB.X = CF61020AE53FBEEE1096D443CD74A6CE3C7FEBDF64A17DDEF0A68DBDB8EE2B4E699D981398F0F0F38428258C3110A054
23,890,242 UART: [art] PUB.Y = B395C8EECF4D77E41CF55F3419042947EE9102949DEE892BCC728B182AB2BE4B9FAA695E9847F95569C02E9CA3001D42
23,897,523 UART: [art] SIG.R = 807D08E3B33AE88315C631604380A27823B7591C04D4186667C60ACBC03362141C0DAF43092E3BAE1D32E86CC8841687
23,904,855 UART: [art] SIG.S = 39DEE858A6D78CC09CBA1C36F5931146489796A6040CFC1DBCDE3C110CA7503C016D77FC6CB18D62E555EB69AC215433
24,883,029 UART: mbox::rt_entry...
24,883,975 UART: ____ _ _ _ ____ _____
24,885,901 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,887,906 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,889,836 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,891,818 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,893,754 UART: |_|
24,894,585 UART:
25,007,642 UART: [rt] Runtime listening for mailbox commands...
25,009,827 >>> mbox cmd response data (48 bytes)
27,066,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,188,065 >>> mbox cmd response: success
34,188,641 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,222,015 UART:
34,222,307 UART: Running Caliptra FMC ...
34,223,343 UART:
34,223,496 UART: [state] CFI Enabled
34,317,480 UART: [art] Extend RT PCRs Done
34,318,681 UART: [art] Lock RT PCRs Done
34,320,170 UART: [art] Populate DV Done
34,325,688 UART: [fht] FMC Alias Private Key: 7
34,327,223 UART: [art] Derive CDI
34,327,956 UART: [art] Store in in slot 0x4
34,386,367 UART: [art] Derive Key Pair
34,387,366 UART: [art] Store priv key in slot 0x5
36,850,163 UART: [art] Derive Key Pair - Done
36,862,793 UART: [art] Signing Cert with AUTHO
36,864,104 UART: RITY.KEYID = 7
38,575,682 UART: [art] Erasing AUTHORITY.KEYID = 7
38,577,187 UART: [art] PUB.X = 564743583A1144A5DF8A0FE9B7961619F2F81D5FD62DB490EF5176DCA412C3083523E4006DACA01CE5D8209963559782
38,584,436 UART: [art] PUB.Y = 490A9DC70F70A5B1A7E4B74591DEEEE7AD3B2164B08F87F1E247EEE56D097EA836B730DD199F4D03BA34C680E9C1E496
38,591,720 UART: [art] SIG.R = 2198D987416407DF25136CF40531FFF33B99BB98A26E8D7C6065F8B06EDC43C751A4EFEE25F0CA7115C2FB09F60C90F4
38,599,105 UART: [art] SIG.S = EFA2F087781D1DDFDA05903B305F72FE5CBF3C7BAA442604CE28F5E602080A5EF974103F2E7B528D8008425C46526531
39,577,464 UART: Caliptra RT
39,578,154 UART: [state] CFI Enabled
39,914,878 UART: [rt] RT listening for mailbox commands...
39,946,650 UART: [rt]cmd =0x4d454153, len=108
39,965,262 >>> mbox cmd response data (12 bytes)
42,011,600 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
48,506,867 >>> mbox cmd response: success
50,552,132 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
50,651,446 UART:
50,651,811 UART: Running Caliptra FMC ...
50,652,920 UART:
50,653,087 UART: [state] CFI Enabled
50,653,959 UART: [art] Extend RT PCRs Done
50,655,012 UART: [art] Lock RT PCRs Done
50,656,093 UART: [art] Populate DV Done
50,657,051 UART: [fht] FMC Alias Private Key: 7
50,658,288 UART: [art] Derive CDI
50,659,017 UART: [art] Store in in slot 0x4
50,660,193 UART: [art] Derive Key Pair
50,661,113 UART: [art] Store priv key in slot 0x5
51,159,985 UART: [art] Derive Key Pair - Done
51,172,636 UART: [art] Signing Cert with AUTHO
51,173,932 UART: RITY.KEYID = 7
52,885,158 UART: [art] Erasing AUTHORITY.KEYID = 7
52,886,677 UART: [art] PUB.X = 6096339D745EBF67B8BDFFAA5A2A83765DADC0105E6B28FE77B3BA473743CB05A9F785F751CB6E372DFABCA4FAF4AEA0
52,893,982 UART: [art] PUB.Y = EE71978E83D9845AB3798C0D961CA8EEF6B5CA72717D0AA924C6AE90BBB46AC200D9C0B3B18A70771CBD8A11ADE8ACCE
52,901,232 UART: [art] SIG.R = 7AFD66DED172E2E488B34AF467DA88587F99AC4AAAE6DFE68FBA6CC2A4AE22F13D3B9519528259917BAF6E224F76AF45
52,908,682 UART: [art] SIG.S = 6EAFD4CD48219D758555CFE388931E4E69132EEE8CF12D64DD9B6BF43151F125C4E54194DCAFE4769B444DE7A270DDA7
53,886,932 UART: mbox::rt_entry...
53,887,873 UART: ____ _ _ _ ____ _____
53,889,850 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,891,854 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,893,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,895,715 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,897,646 UART: |_|
53,898,453 UART:
54,184,838 UART: [rt] Runtime listening for mailbox commands...
60,617,774 >>> mbox cmd response: success
60,618,187 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,650,922 UART:
60,651,221 UART: Running Caliptra FMC ...
60,652,257 UART:
60,652,423 UART: [state] CFI Enabled
60,742,730 UART: [art] Extend RT PCRs Done
60,743,916 UART: [art] Lock RT PCRs Done
60,745,362 UART: [art] Populate DV Done
60,750,991 UART: [fht] FMC Alias Private Key: 7
60,752,527 UART: [art] Derive CDI
60,753,287 UART: [art] Store in in slot 0x4
60,811,648 UART: [art] Derive Key Pair
60,812,680 UART: [art] Store priv key in slot 0x5
63,275,787 UART: [art] Derive Key Pair - Done
63,288,789 UART: [art] Signing Cert with AUTHO
63,290,095 UART: RITY.KEYID = 7
65,001,715 UART: [art] Erasing AUTHORITY.KEYID = 7
65,003,219 UART: [art] PUB.X = 87ABFCFFF75C42737E41DB788C539058349D94BD05C547210B68BDCFDF33F5DF5ED7B312DABB3A44CFDA9D05199155C5
65,010,521 UART: [art] PUB.Y = AB3D50F3ABAA47890BEA238392C5E3B907234676A10A92B835BCEC6A8F6896632B366A40885CAAECCBFF07EB4A0D4CB9
65,017,798 UART: [art] SIG.R = 6B43EBF57C111528B7601771865CABD54B7570B71493B5928D8524A464FF27F63F2DB7CD05DD30995F05609A88DC7DB7
65,025,165 UART: [art] SIG.S = B243A10BCBAA935D7CABFE04468795351C8E004700B12E168120256123B6F55B710ADC06CC7286535743D33731DCCF69
66,003,497 UART: mbox::rt_entry...
66,004,472 UART: ____ _ _ _ ____ _____
66,006,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,008,556 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,010,507 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,012,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,014,374 UART: |_|
66,015,212 UART:
66,297,933 UART: [rt] Runtime listening for mailbox commands...
66,300,098 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.43s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,616,301 UART: [ldev] --
10,621,135 UART: [fwproc] Wait for Commands...
10,623,011 UART: [fwproc] Recv command 0x46574c44
10,625,104 UART: [fwproc] Recv'd Img size: 78532 bytes
13,594,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,665,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,734,729 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,926,898 >>> mbox cmd response: success
13,927,354 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,930,579 UART: [afmc] ++
13,931,171 UART: [afmc] CDI.KEYID = 6
13,932,089 UART: [afmc] SUBJECT.KEYID = 7
13,933,256 UART: [afmc] AUTHORITY.KEYID = 5
16,434,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,153,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,155,654 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,171,467 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,187,480 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,203,311 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,227,063 UART: [afmc] --
18,230,278 UART: [cold-reset] --
18,233,328 UART: [state] Locking Datavault
18,239,430 UART: [state] Locking PCR0, PCR1 and PCR31
18,241,110 UART: [state] Locking ICCM
18,242,724 UART: [exit] Launching FMC @ 0x40000130
18,251,123 UART:
18,251,354 UART: Running Caliptra FMC ...
18,252,464 UART:
18,252,626 UART: [state] CFI Enabled
18,261,031 UART: [fht] FMC Alias Private Key: 7
20,018,403 UART: [art] Extend RT PCRs Done
20,019,647 UART: [art] Lock RT PCRs Done
20,021,357 UART: [art] Populate DV Done
20,026,720 UART: [fht] FMC Alias Private Key: 7
20,028,369 UART: [art] Derive CDI
20,029,107 UART: [art] Store in in slot 0x4
20,071,555 UART: [art] Derive Key Pair
20,072,640 UART: [art] Store priv key in slot 0x5
22,499,083 UART: [art] Derive Key Pair - Done
22,512,399 UART: [art] Signing Cert with AUTHO
22,513,697 UART: RITY.KEYID = 7
24,219,224 UART: [art] Erasing AUTHORITY.KEYID = 7
24,220,719 UART: [art] PUB.X = 85B0A602A458AFC9E4836DAD20FAB2B6F13BD121082029FF7B0E7A26FDF28C2CA37D74171C99EBF9B7A574CFCC689755
24,228,025 UART: [art] PUB.Y = BE3D4155D142726F27AD3523B8132FEE81F68C975B85D3BD779AB047ADCF5AC3F2E9D1CEC35054FB4C25CE7117D0BA3C
24,235,319 UART: [art] SIG.R = F4750507E0A80D1FBDE8F21BEE6992F7FFE381DE92D8127E9C4099CFA301A204FD67B4BF9C184553BFFDD011840E35C0
24,242,771 UART: [art] SIG.S = A3076506547463EFCD3F2731EC73F5425E04ECBC96F2947CB2F22901474E2F857AFE41B747AE86E7DD1FDAE653AE6BA5
25,220,537 UART: mbox::rt_entry...
25,221,513 UART: ____ _ _ _ ____ _____
25,223,503 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,225,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,227,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,229,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,231,292 UART: |_|
25,232,102 UART:
25,345,940 UART: [rt] Runtime listening for mailbox commands...
25,348,055 >>> mbox cmd response data (48 bytes)
27,411,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,556,045 UART:
27,556,424 UART: Running Caliptra ROM ...
27,557,567 UART:
27,557,745 UART: [state] CFI Enabled
27,575,583 UART: [state] LifecycleState = Unprovisioned
27,577,431 UART: [state] DebugLocked = No
27,579,706 UART: [state] WD Timer not started. Device not locked for debugging
27,583,979 UART: [kat] SHA2-256
27,763,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,774,727 UART: [kat] ++
27,775,187 UART: [kat] sha1
27,785,584 UART: [kat] SHA2-256
27,788,605 UART: [kat] SHA2-384
27,793,185 UART: [kat] SHA2-512-ACC
27,796,118 UART: [kat] ECC-384
30,236,334 UART: [kat] HMAC-384Kdf
30,248,170 UART: [kat] LMS
30,777,673 UART: [kat] --
30,781,231 UART: [update-reset] ++
34,206,925 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,209,986 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,592,350 >>> mbox cmd response: success
34,592,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,593,487 UART: [update-reset] Copying MAN_2 To MAN_1
34,615,870 UART: [update-reset Success] --
34,621,559 UART: [state] Locking Datavault
34,623,839 UART: [state] Locking PCR0, PCR1 and PCR31
34,625,539 UART: [state] Locking ICCM
34,627,369 UART: [exit] Launching FMC @ 0x40000130
34,635,816 UART:
34,636,052 UART: Running Caliptra FMC ...
34,637,717 UART:
34,637,905 UART: [state] CFI Enabled
34,681,626 UART: [art] Extend RT PCRs Done
34,682,774 UART: [art] Lock RT PCRs Done
34,684,523 UART: [art] Populate DV Done
34,690,036 UART: [fht] FMC Alias Private Key: 7
34,691,736 UART: [art] Derive CDI
34,692,472 UART: [art] Store in in slot 0x4
34,735,176 UART: [art] Derive Key Pair
34,736,231 UART: [art] Store priv key in slot 0x5
37,163,015 UART: [art] Derive Key Pair - Done
37,176,443 UART: [art] Signing Cert with AUTHO
37,177,747 UART: RITY.KEYID = 7
38,883,010 UART: [art] Erasing AUTHORITY.KEYID = 7
38,884,522 UART: [art] PUB.X = 12332EFD683F1C34352A8E2981413CB7EE0BD8635CEB7F541663ACD02EAD9DC0FD4C7D57FD470469E4629625949A4A0D
38,891,781 UART: [art] PUB.Y = A135451AE2E9AB123F2D0B04F113D4CA3B03A4F0EF02B2E23FC23B11008CDCAC4EE3601C7CE0DB3EFB5BDB45237327F9
38,899,078 UART: [art] SIG.R = 1460154BE439B98DF3A89348EB1B57449A391BBEE64CA5EC1AD252C661E670EA3458CAF98FC36FFB2C0A08BBF34AC763
38,906,494 UART: [art] SIG.S = 6457BAB002E59BF04BAC772FBD819683ADBD36F21C4812746F26DA9983786A91600F48D5293F3E423A462EBC9B895015
39,885,908 UART: Caliptra RT
39,886,616 UART: [state] CFI Enabled
40,172,675 UART: [rt] RT listening for mailbox commands...
40,204,625 UART: [rt]cmd =0x4d454153, len=108
40,223,497 >>> mbox cmd response data (12 bytes)
42,269,321 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,369,772 UART:
42,370,129 UART: Running Caliptra ROM ...
42,371,257 UART:
42,371,425 UART: [state] CFI Enabled
42,384,393 UART: [state] LifecycleState = Unprovisioned
42,386,280 UART: [state] DebugLocked = No
42,387,552 UART: [state] WD Timer not started. Device not locked for debugging
42,391,848 UART: [kat] SHA2-256
42,571,035 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,582,609 UART: [kat] ++
42,583,065 UART: [kat] sha1
42,594,112 UART: [kat] SHA2-256
42,597,127 UART: [kat] SHA2-384
42,602,295 UART: [kat] SHA2-512-ACC
42,605,231 UART: [kat] ECC-384
45,048,133 UART: [kat] HMAC-384Kdf
45,060,308 UART: [kat] LMS
45,589,807 UART: [kat] --
45,595,299 UART: [update-reset] ++
48,590,438 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,594,623 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
48,852,213 >>> mbox cmd response: success
50,898,859 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
50,998,123 UART: [update-reset] Copying MAN_2 To MAN_1
50,999,809 UART: [update-reset Success] --
51,000,890 UART: [state] Locking Datavault
51,002,047 UART: [state] Locking PCR0, PCR1 and PCR31
51,003,596 UART: [state] Locking ICCM
51,004,483 UART: [exit] Launching FMC @ 0x40000130
51,005,832 UART:
51,005,984 UART: Running Caliptra FMC ...
51,007,094 UART:
51,007,259 UART: [state] CFI Enabled
51,008,100 UART: [art] Extend RT PCRs Done
51,009,157 UART: [art] Lock RT PCRs Done
51,010,142 UART: [art] Populate DV Done
51,011,172 UART: [fht] FMC Alias Private Key: 7
51,012,518 UART: [art] Derive CDI
51,013,257 UART: [art] Store in in slot 0x4
51,014,350 UART: [art] Derive Key Pair
51,015,341 UART: [art] Store priv key in slot 0x5
51,422,083 UART: [art] Derive Key Pair - Done
51,435,218 UART: [art] Signing Cert with AUTHO
51,436,691 UART: RITY.KEYID = 7
53,141,839 UART: [art] Erasing AUTHORITY.KEYID = 7
53,143,349 UART: [art] PUB.X = 7533C554D3B5FF87770C77452BB48A768FA1C53B0CC2C4E315F52C5B2809D076ECCD1366932B552C0650EE03EABD4C9E
53,150,605 UART: [art] PUB.Y = 199329CCDB78E303FC2CD9B60BFA19DC77D50B78729BE0C56A1D4CE6886E3553FE2A062E2B01D4B66DEE074BB8BE204E
53,157,899 UART: [art] SIG.R = BE123F82949B04D18282C972CFAC3D80665062574708910F1DE3E9688ADD0D813ADAD322899347B9EAD643A767069285
53,165,297 UART: [art] SIG.S = 0B6CBE61F501ABC5235E3FB3ED64CCB6248FB7FA8C7E9C557E2F526C2666A30BBB119E6969F302D57CE945AC996E574E
54,143,813 UART: mbox::rt_entry...
54,144,756 UART: ____ _ _ _ ____ _____
54,146,699 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,148,701 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,150,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,152,579 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,154,504 UART: |_|
54,155,337 UART:
54,436,482 UART: [rt] Runtime listening for mailbox commands...
54,438,563 UART:
54,438,726 UART: Running Caliptra ROM ...
54,439,745 UART:
54,440,127 UART: [state] CFI Enabled
54,452,335 UART: [state] LifecycleState = Unprovisioned
54,454,159 UART: [state] DebugLocked = No
54,455,588 UART: [state] WD Timer not started. Device not locked for debugging
54,459,489 UART: [kat] SHA2-256
54,638,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
54,650,230 UART: [kat] ++
54,650,769 UART: [kat] sha1
54,660,544 UART: [kat] SHA2-256
54,663,556 UART: [kat] SHA2-384
54,669,000 UART: [kat] SHA2-512-ACC
54,671,949 UART: [kat] ECC-384
57,115,381 UART: [kat] HMAC-384Kdf
57,127,423 UART: [kat] LMS
57,656,938 UART: [kat] --
57,659,952 UART: [update-reset] ++
60,649,810 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
60,653,980 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
60,911,581 >>> mbox cmd response: success
60,911,932 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,912,219 UART: [update-reset] Copying MAN_2 To MAN_1
60,934,540 UART: [update-reset Success] --
60,939,136 UART: [state] Locking Datavault
60,943,633 UART: [state] Locking PCR0, PCR1 and PCR31
60,945,296 UART: [state] Locking ICCM
60,947,450 UART: [exit] Launching FMC @ 0x40000130
60,955,903 UART:
60,956,138 UART: Running Caliptra FMC ...
60,957,444 UART:
60,957,619 UART: [state] CFI Enabled
61,001,745 UART: [art] Extend RT PCRs Done
61,002,903 UART: [art] Lock RT PCRs Done
61,004,467 UART: [art] Populate DV Done
61,010,147 UART: [fht] FMC Alias Private Key: 7
61,011,738 UART: [art] Derive CDI
61,012,555 UART: [art] Store in in slot 0x4
61,054,932 UART: [art] Derive Key Pair
61,055,971 UART: [art] Store priv key in slot 0x5
63,483,088 UART: [art] Derive Key Pair - Done
63,496,124 UART: [art] Signing Cert with AUTHO
63,497,451 UART: RITY.KEYID = 7
65,203,035 UART: [art] Erasing AUTHORITY.KEYID = 7
65,204,544 UART: [art] PUB.X = 23FDF017A1BCE66C3F66078976888DCDF784C31347322503EB3C1DF74F7B881165826727037470CDBFA7AD2A2D682D75
65,211,794 UART: [art] PUB.Y = 57B5C0AB06C6221BCDB37DE7E6CFF401624B394C3C49A17FE972D62574E6A50CEF3136CDE28C969FD56303B5ED00E93B
65,219,045 UART: [art] SIG.R = 38EDABB2F00DB7E860A5EF51087904172446026173E742A10FF9CF14BB340095845071783CB621B2CECE8CFA80267DD0
65,226,394 UART: [art] SIG.S = 574BDD06D5A3A1D977A6DCC512D6269463E6AF501B9B6891584560E2D5BA50F1D486BCFA58183B3167F9343469573717
66,205,173 UART: mbox::rt_entry...
66,206,113 UART: ____ _ _ _ ____ _____
66,208,095 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,210,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,212,027 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,213,954 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,215,882 UART: |_|
66,216,717 UART:
66,503,267 UART: [rt] Runtime listening for mailbox commands...
66,505,426 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,745 writing to cptra_bootfsm_go
3,703,362 ready_for_fw is high
3,703,776 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,712,976 >>> mbox cmd response: success
13,713,547 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,961,174 UART:
17,961,561 UART: Running Caliptra FMC ...
17,962,652 UART:
17,962,809 UART: [state] CFI Enabled
17,970,812 UART: [fht] FMC Alias Private Key: 7
19,728,265 UART: [art] Extend RT PCRs Done
19,729,484 UART: [art] Lock RT PCRs Done
19,731,087 UART: [art] Populate DV Done
19,736,672 UART: [fht] FMC Alias Private Key: 7
19,738,326 UART: [art] Derive CDI
19,739,144 UART: [art] Store in in slot 0x4
19,782,287 UART: [art] Derive Key Pair
19,783,325 UART: [art] Store priv key in slot 0x5
22,210,380 UART: [art] Derive Key Pair - Done
22,223,481 UART: [art] Signing Cert with AUTHO
22,224,803 UART: RITY.KEYID = 7
23,930,002 UART: [art] Erasing AUTHORITY.KEYID = 7
23,931,517 UART: [art] PUB.X = 5F3FAD72721A553621E28E7D6B54919A58209CB6245E128178543E4155957907B73D5ECC144EE830F8401E4013B2CFAE
23,938,768 UART: [art] PUB.Y = 1AD6065E6F493197909F44BAD526F80E7CF01746DED0F88DA8ECA6982C0454DA86D2DB87A2B5C22C85FF246A98DE2BDC
23,946,037 UART: [art] SIG.R = 9BFDE307B49D12B26BC34D2024796DA8F9BB69E114A9F1614793F6526ACEED1B8769A221E39A64554BD97D78B1318FF8
23,953,385 UART: [art] SIG.S = 37470FA161235DD8D97DDF8DC6917A0F72883296AE82FEAC442579598C36F84B53C56EEC617C7FC83545D9DDECB986E0
24,931,166 UART: mbox::rt_entry...
24,932,109 UART: ____ _ _ _ ____ _____
24,934,213 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,936,224 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,938,153 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,940,116 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,942,051 UART: |_|
24,942,891 UART:
25,055,362 UART: [rt] Runtime listening for mailbox commands...
25,057,546 >>> mbox cmd response data (48 bytes)
27,119,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,164,832 >>> mbox cmd response: success
34,165,398 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,198,410 UART:
34,198,763 UART: Running Caliptra FMC ...
34,199,807 UART:
34,199,959 UART: [state] CFI Enabled
34,243,663 UART: [art] Extend RT PCRs Done
34,244,814 UART: [art] Lock RT PCRs Done
34,246,130 UART: [art] Populate DV Done
34,251,539 UART: [fht] FMC Alias Private Key: 7
34,253,237 UART: [art] Derive CDI
34,253,993 UART: [art] Store in in slot 0x4
34,296,391 UART: [art] Derive Key Pair
34,297,435 UART: [art] Store priv key in slot 0x5
36,724,647 UART: [art] Derive Key Pair - Done
36,737,698 UART: [art] Signing Cert with AUTHO
36,739,008 UART: RITY.KEYID = 7
38,444,166 UART: [art] Erasing AUTHORITY.KEYID = 7
38,445,664 UART: [art] PUB.X = 851BBB706F5F8BD3DA05DA94F236AD2A4A9CA29CB2164CC0BEB7AC8BD5D08AF7CD205235537F3F023C45E57D2AD9D92A
38,453,029 UART: [art] PUB.Y = F85578540583D4CC6FD6F0D2E451FDC0BE19F795FA4C0FCE840ADC3443F95A7B336DDBD5F3238FA88D109646F2927EAE
38,460,262 UART: [art] SIG.R = BCA225F42EDAA0CA8780BDFC5372FDA4A5DDF178FB5DDF5207A5ADBFB7C9DF9787CF00FE9724596D4C2F03D0CB5C8F44
38,467,707 UART: [art] SIG.S = 430EF40E4D8004A1F486E550D7206197C022CB5B2E6834C5ADC871FD91D4A96BEBEA144EF97278F4A55A70D2B4D449D9
39,446,305 UART: Caliptra RT
39,446,990 UART: [state] CFI Enabled
39,734,898 UART: [rt] RT listening for mailbox commands...
39,767,079 UART: [rt]cmd =0x4d454153, len=108
39,785,152 >>> mbox cmd response data (12 bytes)
41,831,069 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
48,263,400 >>> mbox cmd response: success
50,306,686 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
50,406,010 UART:
50,406,369 UART: Running Caliptra FMC ...
50,407,502 UART:
50,407,673 UART: [state] CFI Enabled
50,408,603 UART: [art] Extend RT PCRs Done
50,409,746 UART: [art] Lock RT PCRs Done
50,410,815 UART: [art] Populate DV Done
50,411,862 UART: [fht] FMC Alias Private Key: 7
50,413,185 UART: [art] Derive CDI
50,413,926 UART: [art] Store in in slot 0x4
50,415,097 UART: [art] Derive Key Pair
50,416,061 UART: [art] Store priv key in slot 0x5
50,821,426 UART: [art] Derive Key Pair - Done
50,834,760 UART: [art] Signing Cert with AUTHO
50,836,117 UART: RITY.KEYID = 7
52,541,537 UART: [art] Erasing AUTHORITY.KEYID = 7
52,543,040 UART: [art] PUB.X = 054E1AC09F20D0470EDBEA71D92643D2F141AE249413CEA921F06D0F1469655F6C165F502B6FE575EC9E80C0F457F2B9
52,550,289 UART: [art] PUB.Y = 4B693F371F2BEEB5AFA08D804945143170181A8AE600181D0066D682DA5265CA6467BA48FF14FB755907F21CD865C412
52,557,523 UART: [art] SIG.R = 7A44E209DD7AF5065E83713FC633E9CA039190BDC7442A0DE65B54303F188E957480D3DF296B898CE2862CF29D143204
52,564,868 UART: [art] SIG.S = B7D9725402F86267905DB41F329738F4725211B64916553C794B77BAF43028B1C0BE4EB8A2093D403568D252A35B6BCD
53,543,198 UART: mbox::rt_entry...
53,544,290 UART: ____ _ _ _ ____ _____
53,546,225 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,548,251 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,550,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,552,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,553,930 UART: |_|
53,554,762 UART:
53,843,789 UART: [rt] Runtime listening for mailbox commands...
60,182,203 >>> mbox cmd response: success
60,182,615 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
60,214,862 UART:
60,215,313 UART: Running Caliptra FMC ...
60,216,393 UART:
60,216,560 UART: [state] CFI Enabled
60,260,761 UART: [art] Extend RT PCRs Done
60,261,903 UART: [art] Lock RT PCRs Done
60,263,431 UART: [art] Populate DV Done
60,268,929 UART: [fht] FMC Alias Private Key: 7
60,270,496 UART: [art] Derive CDI
60,271,311 UART: [art] Store in in slot 0x4
60,314,073 UART: [art] Derive Key Pair
60,315,079 UART: [art] Store priv key in slot 0x5
62,742,171 UART: [art] Derive Key Pair - Done
62,755,493 UART: [art] Signing Cert with AUTHO
62,756,830 UART: RITY.KEYID = 7
64,462,723 UART: [art] Erasing AUTHORITY.KEYID = 7
64,464,224 UART: [art] PUB.X = 83654F738E6CD01716C9235EECC87169B2E9CEC354DBD6AE8B265117011362C7D04A52C35EF89FD3E491C3709BBA2C8A
64,471,465 UART: [art] PUB.Y = 4F8CC7C37AAAB10C939D55E89DA8B8BE71A5501082DBF37CAEC0BC13F6B4DF1DA93A171B01BF1214B0559EBCE4A23D7A
64,478,812 UART: [art] SIG.R = C43788FE46D691332798DACCBB3B30C49FC9067237E0DC220576A19D1739FF65528207FF7442818F96E89A8E6371DA56
64,486,145 UART: [art] SIG.S = 5EFF12C6668658666D8D98EBD366E31FBD327F1E4396FB14FFC4276A2252E0AA0D30F8A05C8305B5ACB9378A413385E1
65,465,108 UART: mbox::rt_entry...
65,466,081 UART: ____ _ _ _ ____ _____
65,468,131 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
65,470,144 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
65,472,094 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
65,474,034 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
65,475,890 UART: |_|
65,476,723 UART:
65,761,991 UART: [rt] Runtime listening for mailbox commands...
65,764,163 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.40s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,408,232 UART: [ldev] --
10,412,992 UART: [fwproc] Wait for Commands...
10,416,009 UART: [fwproc] Recv command 0x46574c44
10,418,323 UART: [fwproc] Recv'd Img size: 78532 bytes
13,422,992 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,499,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,616,024 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,943,721 >>> mbox cmd response: success
13,944,236 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,948,004 UART: [afmc] ++
13,948,708 UART: [afmc] CDI.KEYID = 6
13,949,900 UART: [afmc] SUBJECT.KEYID = 7
13,951,339 UART: [afmc] AUTHORITY.KEYID = 5
16,488,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,212,835 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,214,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,229,954 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,245,085 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,260,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,282,157 UART: [afmc] --
18,285,702 UART: [cold-reset] --
18,289,359 UART: [state] Locking Datavault
18,295,371 UART: [state] Locking PCR0, PCR1 and PCR31
18,297,572 UART: [state] Locking ICCM
18,298,871 UART: [exit] Launching FMC @ 0x40000130
18,307,548 UART:
18,307,788 UART: Running Caliptra FMC ...
18,308,816 UART:
18,308,966 UART: [state] CFI Enabled
18,369,885 UART: [fht] FMC Alias Private Key: 7
20,133,346 UART: [art] Extend RT PCRs Done
20,134,571 UART: [art] Lock RT PCRs Done
20,136,481 UART: [art] Populate DV Done
20,141,595 UART: [fht] FMC Alias Private Key: 7
20,143,137 UART: [art] Derive CDI
20,143,955 UART: [art] Store in in slot 0x4
20,202,483 UART: [art] Derive Key Pair
20,203,524 UART: [art] Store priv key in slot 0x5
22,666,605 UART: [art] Derive Key Pair - Done
22,679,701 UART: [art] Signing Cert with AUTHO
22,680,997 UART: RITY.KEYID = 7
24,392,483 UART: [art] Erasing AUTHORITY.KEYID = 7
24,393,992 UART: [art] PUB.X = DB545E4925F2B2151A1A5A756F32B6D645ACCD18E294D7644A68E428C17806717E9589749A301E8F8F9A19A059DB92AB
24,401,258 UART: [art] PUB.Y = AA83A070E1A157CDACF7497A003D34505FBB3DEE7A456A38334CF189BC31878447A3C5EF38235199DA67FA6427C8AF86
24,408,477 UART: [art] SIG.R = 296F4D6EE67DB0E1DDFBA7CB9DE91B1789DB4FF1CAD5985B08DD476760A77B78796CECA1309C6A2ED7ABFA9E647FA2D3
24,415,911 UART: [art] SIG.S = 6A872F35B89873DC4DB7D03073288EDCF13F4EAD698F24B12554A536C4602043F27D0064FDC6BBF08198727B2D7F5312
25,394,846 UART: mbox::rt_entry...
25,395,797 UART: ____ _ _ _ ____ _____
25,397,781 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,399,816 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,401,756 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,403,691 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,405,550 UART: |_|
25,406,433 UART:
25,519,775 UART: [rt] Runtime listening for mailbox commands...
25,521,924 >>> mbox cmd response data (48 bytes)
27,581,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,726,035 UART:
27,726,446 UART: Running Caliptra ROM ...
27,727,521 UART:
27,727,682 UART: [state] CFI Enabled
27,804,342 UART: [state] LifecycleState = Unprovisioned
27,806,452 UART: [state] DebugLocked = No
27,808,030 UART: [state] WD Timer not started. Device not locked for debugging
27,812,667 UART: [kat] SHA2-256
28,002,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,013,301 UART: [kat] ++
28,013,767 UART: [kat] sha1
28,026,661 UART: [kat] SHA2-256
28,029,634 UART: [kat] SHA2-384
28,034,012 UART: [kat] SHA2-512-ACC
28,036,591 UART: [kat] ECC-384
30,486,880 UART: [kat] HMAC-384Kdf
30,512,561 UART: [kat] LMS
31,044,092 UART: [kat] --
31,047,025 UART: [update-reset] ++
34,496,577 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,500,231 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,106,798 >>> mbox cmd response: success
35,107,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,107,679 UART: [update-reset] Copying MAN_2 To MAN_1
35,144,986 UART: [update-reset Success] --
35,147,476 UART: [state] Locking Datavault
35,149,883 UART: [state] Locking PCR0, PCR1 and PCR31
35,152,089 UART: [state] Locking ICCM
35,154,414 UART: [exit] Launching FMC @ 0x40000130
35,163,044 UART:
35,163,282 UART: Running Caliptra FMC ...
35,164,602 UART:
35,164,767 UART: [state] CFI Enabled
35,256,599 UART: [art] Extend RT PCRs Done
35,257,807 UART: [art] Lock RT PCRs Done
35,259,268 UART: [art] Populate DV Done
35,265,001 UART: [fht] FMC Alias Private Key: 7
35,266,489 UART: [art] Derive CDI
35,267,259 UART: [art] Store in in slot 0x4
35,325,892 UART: [art] Derive Key Pair
35,326,924 UART: [art] Store priv key in slot 0x5
37,790,033 UART: [art] Derive Key Pair - Done
37,802,811 UART: [art] Signing Cert with AUTHO
37,804,108 UART: RITY.KEYID = 7
39,515,150 UART: [art] Erasing AUTHORITY.KEYID = 7
39,516,661 UART: [art] PUB.X = 730AD87FC7A4A3CB1A997A739C65D5D49A72D1F5AAF2B3811EAF998E2F107E9A74E844060E4C3DF8B56684D328863585
39,523,953 UART: [art] PUB.Y = 0D87DE7E04381816EDD6E06C289C4F01090066E05E9D7A2F33F1C0CE254CCAF5C24F3961522BFFE4C043EBCD5245D307
39,531,219 UART: [art] SIG.R = 516D29A8927DC7A5E52C91B2FADC8CC71DAD8EB318D63DCBE5EF0FB1A2037B47E5AEA9507CA2E34DC8FE5604D8EDC417
39,538,629 UART: [art] SIG.S = E31A4D6CB04737FEC0FF59C3D1D07CC8E608638D8A3A55FE1684F3CE223D9A5D29AE130F28A00391008A0CC18328A29A
40,517,219 UART: Caliptra RT
40,517,938 UART: [state] CFI Enabled
40,853,230 UART: [rt] RT listening for mailbox commands...
40,885,092 UART: [rt]cmd =0x4d454153, len=108
40,903,622 >>> mbox cmd response data (12 bytes)
42,948,519 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
43,049,080 UART:
43,049,455 UART: Running Caliptra ROM ...
43,050,595 UART:
43,050,771 UART: [state] CFI Enabled
43,119,821 UART: [state] LifecycleState = Unprovisioned
43,121,883 UART: [state] DebugLocked = No
43,123,578 UART: [state] WD Timer not started. Device not locked for debugging
43,128,715 UART: [kat] SHA2-256
43,318,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,329,317 UART: [kat] ++
43,329,805 UART: [kat] sha1
43,339,891 UART: [kat] SHA2-256
43,342,912 UART: [kat] SHA2-384
43,348,523 UART: [kat] SHA2-512-ACC
43,351,101 UART: [kat] ECC-384
45,801,054 UART: [kat] HMAC-384Kdf
45,822,197 UART: [kat] LMS
46,353,774 UART: [kat] --
46,359,972 UART: [update-reset] ++
49,381,070 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,383,704 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,776,459 >>> mbox cmd response: success
51,821,525 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
51,920,861 UART: [update-reset] Copying MAN_2 To MAN_1
51,922,725 UART: [update-reset Success] --
51,923,850 UART: [state] Locking Datavault
51,924,937 UART: [state] Locking PCR0, PCR1 and PCR31
51,926,480 UART: [state] Locking ICCM
51,927,387 UART: [exit] Launching FMC @ 0x40000130
51,928,811 UART:
51,928,981 UART: Running Caliptra FMC ...
51,930,082 UART:
51,930,247 UART: [state] CFI Enabled
51,931,168 UART: [art] Extend RT PCRs Done
51,932,304 UART: [art] Lock RT PCRs Done
51,933,371 UART: [art] Populate DV Done
51,934,327 UART: [fht] FMC Alias Private Key: 7
51,935,644 UART: [art] Derive CDI
51,936,398 UART: [art] Store in in slot 0x4
51,937,574 UART: [art] Derive Key Pair
51,938,515 UART: [art] Store priv key in slot 0x5
52,461,789 UART: [art] Derive Key Pair - Done
52,474,932 UART: [art] Signing Cert with AUTHO
52,476,237 UART: RITY.KEYID = 7
54,187,995 UART: [art] Erasing AUTHORITY.KEYID = 7
54,189,498 UART: [art] PUB.X = 1E5A6AF5134B6C8159C31A63DD47581613A0D2488728A7906F6BD0005B9692C832C1375197EBAC6848545BE7E8378165
54,196,711 UART: [art] PUB.Y = DB8C2CF76471615EC5876C9E288586DFBFC0AC4FE6A2E2661D4C46B83C889E854709A1E5BB6D222F5530A2A266882A15
54,204,018 UART: [art] SIG.R = 5AECF25BC39414E896CDF81FA339DA2AFDFBBCA5AA6AE4484091293E3D7760A372FBC5175DB44524B4A925F6981A505B
54,211,387 UART: [art] SIG.S = 74EE5E70DD087E4DCD109A883658AE8C28390955ABDBF43E6FB35C8B93BF9953EEB4640982D873662FFFB9C7281F55A4
55,190,079 UART: mbox::rt_entry...
55,191,031 UART: ____ _ _ _ ____ _____
55,193,017 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,195,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,196,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,198,919 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,200,861 UART: |_|
55,201,674 UART:
55,487,601 UART: [rt] Runtime listening for mailbox commands...
55,489,687 UART:
55,489,855 UART: Running Caliptra ROM ...
55,490,877 UART:
55,491,019 UART: [state] CFI Enabled
55,552,606 UART: [state] LifecycleState = Unprovisioned
55,554,706 UART: [state] DebugLocked = No
55,556,284 UART: [state] WD Timer not started. Device not locked for debugging
55,561,509 UART: [kat] SHA2-256
55,751,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,762,162 UART: [kat] ++
55,762,788 UART: [kat] sha1
55,773,905 UART: [kat] SHA2-256
55,776,890 UART: [kat] SHA2-384
55,783,801 UART: [kat] SHA2-512-ACC
55,786,380 UART: [kat] ECC-384
58,233,251 UART: [kat] HMAC-384Kdf
58,259,504 UART: [kat] LMS
58,791,030 UART: [kat] --
58,796,046 UART: [update-reset] ++
61,811,905 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,815,400 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
62,208,155 >>> mbox cmd response: success
62,208,519 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,210,099 UART: [update-reset] Copying MAN_2 To MAN_1
62,247,624 UART: [update-reset Success] --
62,252,002 UART: [state] Locking Datavault
62,254,414 UART: [state] Locking PCR0, PCR1 and PCR31
62,256,562 UART: [state] Locking ICCM
62,259,277 UART: [exit] Launching FMC @ 0x40000130
62,267,957 UART:
62,268,199 UART: Running Caliptra FMC ...
62,269,304 UART:
62,269,463 UART: [state] CFI Enabled
62,364,782 UART: [art] Extend RT PCRs Done
62,365,962 UART: [art] Lock RT PCRs Done
62,367,363 UART: [art] Populate DV Done
62,372,879 UART: [fht] FMC Alias Private Key: 7
62,374,630 UART: [art] Derive CDI
62,375,444 UART: [art] Store in in slot 0x4
62,434,299 UART: [art] Derive Key Pair
62,435,339 UART: [art] Store priv key in slot 0x5
64,897,686 UART: [art] Derive Key Pair - Done
64,911,060 UART: [art] Signing Cert with AUTHO
64,912,372 UART: RITY.KEYID = 7
66,623,090 UART: [art] Erasing AUTHORITY.KEYID = 7
66,624,599 UART: [art] PUB.X = 47D497239CD61BEA046E1BC5736584074AFF564B61008D158051CB491270E2AACA2EE5B728AC71B0CC8F6059FDE55112
66,631,878 UART: [art] PUB.Y = 2DFAF601D963BEC9AD56FD929A0006F3531B875EDEC5B28FD68870F37316986657E5A9F3149BBE2B5DD65F3D2C0C83E5
66,639,074 UART: [art] SIG.R = 8A6AD4737D28BE83635DCD9FD075570EE378BDCDC4E886D3CDED1D7FD61C59BCFDE2E9DD18595FD286E3C1B2BCA0BDE2
66,646,531 UART: [art] SIG.S = FA244CDE2F42D8B2A13C606324B58E93E6A67F917425BFA7182B922CB89932B2FC0ABD1A99A56D417E9698E7ECB6EA36
67,624,595 UART: mbox::rt_entry...
67,625,546 UART: ____ _ _ _ ____ _____
67,627,530 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,629,547 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,631,493 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,633,425 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,635,282 UART: |_|
67,636,108 UART:
67,921,332 UART: [rt] Runtime listening for mailbox commands...
67,923,536 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,418,786 ready_for_fw is high
3,419,245 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,944,538 >>> mbox cmd response: success
13,945,358 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,237,129 UART:
18,237,530 UART: Running Caliptra FMC ...
18,238,670 UART:
18,238,836 UART: [state] CFI Enabled
18,302,360 UART: [fht] FMC Alias Private Key: 7
20,066,114 UART: [art] Extend RT PCRs Done
20,067,332 UART: [art] Lock RT PCRs Done
20,069,234 UART: [art] Populate DV Done
20,074,598 UART: [fht] FMC Alias Private Key: 7
20,076,150 UART: [art] Derive CDI
20,076,977 UART: [art] Store in in slot 0x4
20,134,700 UART: [art] Derive Key Pair
20,135,740 UART: [art] Store priv key in slot 0x5
22,599,027 UART: [art] Derive Key Pair - Done
22,611,982 UART: [art] Signing Cert with AUTHO
22,613,299 UART: RITY.KEYID = 7
24,324,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,326,030 UART: [art] PUB.X = 65BFE8AC5916CF22013646D29480E74DA46FCFD97C9D8FBB2DC2B55B3F0974FBD2F818E2EE395CE50C0204376D92E6C7
24,333,175 UART: [art] PUB.Y = 21E64A0E6594B691A6C0F3976ED2D2247143DA57936ECCAF6277E4911659500E0B11955484B8948ABDEB3408E93A99CD
24,340,415 UART: [art] SIG.R = AE6F1B8C67381650451D310E25262A665C3233A79BF6B48B4D7F4E58A8E06E279B0E10A84E9C4A4788D93E9C9B0AB0D8
24,347,768 UART: [art] SIG.S = D6C1BE488AE08749A49CD5A4F6678EAF2D9C7A93BF481841989A4EC7A5E640325FD8C42D33770DDCF294B9CF6C3924B0
25,326,433 UART: mbox::rt_entry...
25,327,394 UART: ____ _ _ _ ____ _____
25,329,382 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,331,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,333,327 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,335,292 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,337,150 UART: |_|
25,337,949 UART:
25,451,208 UART: [rt] Runtime listening for mailbox commands...
25,453,317 >>> mbox cmd response data (48 bytes)
27,511,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,309,512 >>> mbox cmd response: success
35,310,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,342,898 UART:
35,343,193 UART: Running Caliptra FMC ...
35,344,311 UART:
35,344,473 UART: [state] CFI Enabled
35,442,949 UART: [art] Extend RT PCRs Done
35,444,133 UART: [art] Lock RT PCRs Done
35,445,594 UART: [art] Populate DV Done
35,451,292 UART: [fht] FMC Alias Private Key: 7
35,452,991 UART: [art] Derive CDI
35,453,804 UART: [art] Store in in slot 0x4
35,512,036 UART: [art] Derive Key Pair
35,513,071 UART: [art] Store priv key in slot 0x5
37,975,926 UART: [art] Derive Key Pair - Done
37,988,937 UART: [art] Signing Cert with AUTHO
37,990,249 UART: RITY.KEYID = 7
39,701,745 UART: [art] Erasing AUTHORITY.KEYID = 7
39,703,252 UART: [art] PUB.X = B87EAF912B065B94026FFB08C9A1E6493D8F7643023C73E6A7DDEDDC973E24EAF5299B843818E379DE0A17D172A543E1
39,710,544 UART: [art] PUB.Y = 5BD836370B2336506C4AF3B92A1BA87D05D44CF4561A0D5B2D999D74A7BC3E47ED9D809671182E4BC0D47A897E97CF10
39,717,824 UART: [art] SIG.R = 2F24E2552C3C92D653FE0A3BCFBA76C5BFBEDEE8A38E6D311202A7CD56A356DBB53196F7CF20C64C2D17CA4D76DED064
39,725,220 UART: [art] SIG.S = D441080B3D972E67B2D168400AB5A09C0B205860F5D59D8B377C626F9A47B9AB24AC49E66DC0CED9AAC92C5B39C2188B
40,704,510 UART: Caliptra RT
40,705,206 UART: [state] CFI Enabled
41,039,203 UART: [rt] RT listening for mailbox commands...
41,071,257 UART: [rt]cmd =0x4d454153, len=108
41,089,532 >>> mbox cmd response data (12 bytes)
43,136,032 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
50,141,289 >>> mbox cmd response: success
52,189,696 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
52,288,942 UART:
52,289,297 UART: Running Caliptra FMC ...
52,290,433 UART:
52,290,608 UART: [state] CFI Enabled
52,291,532 UART: [art] Extend RT PCRs Done
52,292,693 UART: [art] Lock RT PCRs Done
52,293,760 UART: [art] Populate DV Done
52,294,720 UART: [fht] FMC Alias Private Key: 7
52,296,100 UART: [art] Derive CDI
52,296,847 UART: [art] Store in in slot 0x4
52,298,023 UART: [art] Derive Key Pair
52,298,997 UART: [art] Store priv key in slot 0x5
52,801,162 UART: [art] Derive Key Pair - Done
52,814,033 UART: [art] Signing Cert with AUTHO
52,815,338 UART: RITY.KEYID = 7
54,528,258 UART: [art] Erasing AUTHORITY.KEYID = 7
54,529,778 UART: [art] PUB.X = C27C8D796A1A969EBF099EBDD466D922E69D022FD3F099C7B06F78AAEFCE311F8AD8C82153B305A07A8FB0A54BBBF5E2
54,537,024 UART: [art] PUB.Y = 93638528242BFAEE7BEDC2233AF5F0456A899A6D224E86B4435CAAB4A4B767516078A05220F7762DE79A4015FB1BD28A
54,544,307 UART: [art] SIG.R = 1F9C5830F439987CCA109793CD31EF42A67FE4B31F55BE5A6E9C49914CD64AA86314B31EBA1E5349B9619D96EA7E909B
54,551,696 UART: [art] SIG.S = DCAA08A71AFF6A6189B8F4619863676884EF00DD22E0E4B0EDB9FBE1F81750A4E41273CF6B5BCD15763B0CFF8F81216F
55,530,237 UART: mbox::rt_entry...
55,531,214 UART: ____ _ _ _ ____ _____
55,533,202 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,535,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,537,770 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,539,721 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,541,657 UART: |_|
55,542,493 UART:
55,826,906 UART: [rt] Runtime listening for mailbox commands...
62,733,829 >>> mbox cmd response: success
62,734,231 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,770,223 UART:
62,770,524 UART: Running Caliptra FMC ...
62,771,644 UART:
62,771,808 UART: [state] CFI Enabled
62,875,887 UART: [art] Extend RT PCRs Done
62,877,076 UART: [art] Lock RT PCRs Done
62,878,505 UART: [art] Populate DV Done
62,883,704 UART: [fht] FMC Alias Private Key: 7
62,885,185 UART: [art] Derive CDI
62,885,948 UART: [art] Store in in slot 0x4
62,945,283 UART: [art] Derive Key Pair
62,946,328 UART: [art] Store priv key in slot 0x5
65,409,004 UART: [art] Derive Key Pair - Done
65,422,128 UART: [art] Signing Cert with AUTHO
65,423,434 UART: RITY.KEYID = 7
67,134,317 UART: [art] Erasing AUTHORITY.KEYID = 7
67,135,835 UART: [art] PUB.X = 25FF2C8369C122C58FDB840DCAFC8FAF8248BA9DA1E4513A937D4BA5988817135811E07608BE49271278CAA0688E4DB9
67,143,088 UART: [art] PUB.Y = 44C5AA67DC7B9A6F02E96F10C3153391FB9582D2A12FD335EF7F289ADFBB84AF1895B14A1D5604771492A01C9F318330
67,150,348 UART: [art] SIG.R = AA1F994D0D1D98596ED19EBE05254E3DAC65373BAE6784FC1984AAB63A099078BF4BD62AC6D7D0013E3A14A1E9011E10
67,157,767 UART: [art] SIG.S = 799DBDCDFE8987AFE988A160BC5BC9285DDD8AE0C2EEB25E987A4F6BD1381EEFCCC206CDEAAD83B20CBBD2B8753B701B
68,136,492 UART: mbox::rt_entry...
68,137,456 UART: ____ _ _ _ ____ _____
68,139,462 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,141,486 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,143,543 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,145,476 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,147,410 UART: |_|
68,148,244 UART:
68,428,750 UART: [rt] Runtime listening for mailbox commands...
68,430,919 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.54s
Truncated 2509 bytes from beginning
449C41B5D86AD0
10,637,670 UART: [ldev] --
10,642,939 UART: [fwproc] Wait for Commands...
10,645,953 UART: [fwproc] Recv command 0x46574c44
10,648,257 UART: [fwproc] Recv'd Img size: 78532 bytes
13,648,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,727,882 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,844,046 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,171,698 >>> mbox cmd response: success
14,172,211 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,176,679 UART: [afmc] ++
14,177,377 UART: [afmc] CDI.KEYID = 6
14,178,616 UART: [afmc] SUBJECT.KEYID = 7
14,180,047 UART: [afmc] AUTHORITY.KEYID = 5
16,680,433 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,401,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,403,858 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,419,033 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,434,139 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,449,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,472,859 UART: [afmc] --
18,476,295 UART: [cold-reset] --
18,479,992 UART: [state] Locking Datavault
18,484,170 UART: [state] Locking PCR0, PCR1 and PCR31
18,486,364 UART: [state] Locking ICCM
18,487,942 UART: [exit] Launching FMC @ 0x40000130
18,496,620 UART:
18,496,856 UART: Running Caliptra FMC ...
18,497,956 UART:
18,498,122 UART: [state] CFI Enabled
18,506,115 UART: [fht] FMC Alias Private Key: 7
20,262,534 UART: [art] Extend RT PCRs Done
20,263,750 UART: [art] Lock RT PCRs Done
20,265,427 UART: [art] Populate DV Done
20,270,838 UART: [fht] FMC Alias Private Key: 7
20,272,428 UART: [art] Derive CDI
20,273,241 UART: [art] Store in in slot 0x4
20,315,869 UART: [art] Derive Key Pair
20,316,895 UART: [art] Store priv key in slot 0x5
22,743,936 UART: [art] Derive Key Pair - Done
22,756,770 UART: [art] Signing Cert with AUTHO
22,758,087 UART: RITY.KEYID = 7
24,463,751 UART: [art] Erasing AUTHORITY.KEYID = 7
24,465,256 UART: [art] PUB.X = 155A4F5149FA53B8BF6E8130F48C2E43EE68714D95E379FDC1F262FC54CF9F2A6D9D3F709CCA126316C9E72EEF7EE26F
24,472,497 UART: [art] PUB.Y = 68752D0056EE89B0120D2AF41E6C53AA93348AB58B0CCD7F5667DE275435348ED081868F00958420D37C47BDFA31F836
24,479,727 UART: [art] SIG.R = 073F4A5782F928835B9DC18A3AB518ABF92888404CC4410C77216BA1DEB6C54E13B7A58C729E8EAD6665485AF634A7E2
24,487,120 UART: [art] SIG.S = 44C0E84B53E595E169E9841FB905E8036BDE9E74713820570E7766721EBAF610FD2140F78029AE322EAF98877980D90B
25,465,261 UART: mbox::rt_entry...
25,466,214 UART: ____ _ _ _ ____ _____
25,468,140 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,470,146 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,472,008 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,473,942 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,475,875 UART: |_|
25,476,684 UART:
25,589,828 UART: [rt] Runtime listening for mailbox commands...
25,591,991 >>> mbox cmd response data (48 bytes)
27,649,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,793,899 UART:
27,794,263 UART: Running Caliptra ROM ...
27,795,318 UART:
27,795,528 UART: [state] CFI Enabled
27,806,957 UART: [state] LifecycleState = Unprovisioned
27,808,880 UART: [state] DebugLocked = No
27,811,483 UART: [state] WD Timer not started. Device not locked for debugging
27,815,408 UART: [kat] SHA2-256
28,005,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,016,038 UART: [kat] ++
28,016,557 UART: [kat] sha1
28,027,502 UART: [kat] SHA2-256
28,030,526 UART: [kat] SHA2-384
28,036,464 UART: [kat] SHA2-512-ACC
28,039,036 UART: [kat] ECC-384
30,480,954 UART: [kat] HMAC-384Kdf
30,492,283 UART: [kat] LMS
31,023,896 UART: [kat] --
31,028,968 UART: [update-reset] ++
34,479,918 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,483,639 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,090,184 >>> mbox cmd response: success
35,090,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,091,350 UART: [update-reset] Copying MAN_2 To MAN_1
35,128,923 UART: [update-reset Success] --
35,134,035 UART: [state] Locking Datavault
35,136,329 UART: [state] Locking PCR0, PCR1 and PCR31
35,138,468 UART: [state] Locking ICCM
35,140,351 UART: [exit] Launching FMC @ 0x40000130
35,149,027 UART:
35,149,262 UART: Running Caliptra FMC ...
35,150,532 UART:
35,150,696 UART: [state] CFI Enabled
35,194,724 UART: [art] Extend RT PCRs Done
35,195,906 UART: [art] Lock RT PCRs Done
35,197,632 UART: [art] Populate DV Done
35,203,259 UART: [fht] FMC Alias Private Key: 7
35,204,903 UART: [art] Derive CDI
35,205,716 UART: [art] Store in in slot 0x4
35,248,415 UART: [art] Derive Key Pair
35,249,454 UART: [art] Store priv key in slot 0x5
37,676,750 UART: [art] Derive Key Pair - Done
37,689,421 UART: [art] Signing Cert with AUTHO
37,690,726 UART: RITY.KEYID = 7
39,396,280 UART: [art] Erasing AUTHORITY.KEYID = 7
39,397,784 UART: [art] PUB.X = 8C30619870011DAD035A00EA781B6BDD016BBD37C667751EB8366C730310B295732AA650C7B4246ED9B9665693EC0934
39,404,976 UART: [art] PUB.Y = 38F2E54A35161869DFB38A221592940FC871C99600CFE1A9DE5CC266832201B54055723E7652F96827C3667AE6293B3B
39,412,206 UART: [art] SIG.R = 67DAC61F5D68E1F03F967CD7787EA0EEF8FAE8F500E5617E8FD1FD07217C8344E80ACB255DA22A6C7431B9F51C4DD76B
39,419,555 UART: [art] SIG.S = 7FEC6B548691266E78FFB7286808B2CE7D5CF365B228F8A2C8D7AF1C98555EE9EAF070F882192017B8318578531913BF
40,398,889 UART: Caliptra RT
40,399,588 UART: [state] CFI Enabled
40,688,497 UART: [rt] RT listening for mailbox commands...
40,720,904 UART: [rt]cmd =0x4d454153, len=108
40,739,459 >>> mbox cmd response data (12 bytes)
42,784,591 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,885,025 UART:
42,885,453 UART: Running Caliptra ROM ...
42,886,516 UART:
42,886,681 UART: [state] CFI Enabled
42,900,702 UART: [state] LifecycleState = Unprovisioned
42,902,552 UART: [state] DebugLocked = No
42,905,396 UART: [state] WD Timer not started. Device not locked for debugging
42,909,152 UART: [kat] SHA2-256
43,098,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,109,543 UART: [kat] ++
43,110,139 UART: [kat] sha1
43,122,007 UART: [kat] SHA2-256
43,124,980 UART: [kat] SHA2-384
43,131,782 UART: [kat] SHA2-512-ACC
43,134,407 UART: [kat] ECC-384
45,574,910 UART: [kat] HMAC-384Kdf
45,587,889 UART: [kat] LMS
46,119,511 UART: [kat] --
46,124,581 UART: [update-reset] ++
49,148,852 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,151,467 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,544,252 >>> mbox cmd response: success
51,587,064 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
51,686,367 UART: [update-reset] Copying MAN_2 To MAN_1
51,688,064 UART: [update-reset Success] --
51,689,238 UART: [state] Locking Datavault
51,690,393 UART: [state] Locking PCR0, PCR1 and PCR31
51,691,931 UART: [state] Locking ICCM
51,692,819 UART: [exit] Launching FMC @ 0x40000130
51,694,187 UART:
51,694,339 UART: Running Caliptra FMC ...
51,695,435 UART:
51,695,588 UART: [state] CFI Enabled
51,696,429 UART: [art] Extend RT PCRs Done
51,697,572 UART: [art] Lock RT PCRs Done
51,698,643 UART: [art] Populate DV Done
51,699,676 UART: [fht] FMC Alias Private Key: 7
51,700,991 UART: [art] Derive CDI
51,701,737 UART: [art] Store in in slot 0x4
51,702,906 UART: [art] Derive Key Pair
51,703,901 UART: [art] Store priv key in slot 0x5
52,130,562 UART: [art] Derive Key Pair - Done
52,143,321 UART: [art] Signing Cert with AUTHO
52,144,626 UART: RITY.KEYID = 7
53,850,307 UART: [art] Erasing AUTHORITY.KEYID = 7
53,851,852 UART: [art] PUB.X = CF2C337841F58000EAEB6E3C9C829E0BE9C66C57132DCAC1F6164F8C6994AFB3FA67503F738A832CB12D7B310AB65AEE
53,859,054 UART: [art] PUB.Y = 6C442E35BD1370C61D99B872184CECC4C287A8CF2E5052DAC7AC72A09D0B173293F40303E8C805B0C55A6E1571A9C80B
53,866,343 UART: [art] SIG.R = B18F0514AE88B48B9899A5EF727468332AF335FB07B156F14B3B6A9FAB4454A68556122F8006908D9FDDBA5DA155971E
53,873,681 UART: [art] SIG.S = 6CEAD139E8F0F734A6BB54AA7CA460BF5B3666CD80DA4616B295A9B558448E31EC817C2899DBD63C36B57433E238D818
54,851,905 UART: mbox::rt_entry...
54,852,862 UART: ____ _ _ _ ____ _____
54,854,794 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,856,802 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,858,657 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,860,585 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,862,465 UART: |_|
54,863,295 UART:
55,149,805 UART: [rt] Runtime listening for mailbox commands...
55,151,836 UART:
55,152,003 UART: Running Caliptra ROM ...
55,153,029 UART:
55,153,473 UART: [state] CFI Enabled
55,168,684 UART: [state] LifecycleState = Unprovisioned
55,170,551 UART: [state] DebugLocked = No
55,173,473 UART: [state] WD Timer not started. Device not locked for debugging
55,178,471 UART: [kat] SHA2-256
55,368,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,379,134 UART: [kat] ++
55,379,645 UART: [kat] sha1
55,389,561 UART: [kat] SHA2-256
55,392,585 UART: [kat] SHA2-384
55,398,411 UART: [kat] SHA2-512-ACC
55,400,977 UART: [kat] ECC-384
57,843,692 UART: [kat] HMAC-384Kdf
57,857,927 UART: [kat] LMS
58,389,537 UART: [kat] --
58,394,823 UART: [update-reset] ++
61,414,274 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,417,383 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
61,810,123 >>> mbox cmd response: success
61,810,484 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,811,479 UART: [update-reset] Copying MAN_2 To MAN_1
61,849,048 UART: [update-reset Success] --
61,854,373 UART: [state] Locking Datavault
61,857,739 UART: [state] Locking PCR0, PCR1 and PCR31
61,859,936 UART: [state] Locking ICCM
61,862,253 UART: [exit] Launching FMC @ 0x40000130
61,870,872 UART:
61,871,117 UART: Running Caliptra FMC ...
61,872,223 UART:
61,872,383 UART: [state] CFI Enabled
61,916,181 UART: [art] Extend RT PCRs Done
61,917,362 UART: [art] Lock RT PCRs Done
61,918,780 UART: [art] Populate DV Done
61,924,357 UART: [fht] FMC Alias Private Key: 7
61,926,058 UART: [art] Derive CDI
61,926,876 UART: [art] Store in in slot 0x4
61,969,304 UART: [art] Derive Key Pair
61,970,335 UART: [art] Store priv key in slot 0x5
64,396,799 UART: [art] Derive Key Pair - Done
64,409,735 UART: [art] Signing Cert with AUTHO
64,411,039 UART: RITY.KEYID = 7
66,116,507 UART: [art] Erasing AUTHORITY.KEYID = 7
66,118,015 UART: [art] PUB.X = 74F98AA4B02AD62156CA71C8A262536EE8D7D507C5D831A1356E0E289A140AC77AC5DCABD28205003BC41BC2C7B4A3B5
66,125,266 UART: [art] PUB.Y = C74A618C0C543368E9EDBC39170C4DC9554E8D37D21468DB7D1DBF2B53DF9B9422E3F589161D952A7F7D48FB30E36D9B
66,132,530 UART: [art] SIG.R = 29CCE3DE5FC53E4BD431F76BAEF1DEA7F747C7F0DA5241E2FAA0547C44B3955C7C00AD4A5E7FE53745B00670D4D3E222
66,139,942 UART: [art] SIG.S = 4C4265C43A7739DD9D98D33447D25ECA3BDC1D005B0A8DE54CDC34D0380DBE32177359E18F683F86CBF312149268CA84
67,117,925 UART: mbox::rt_entry...
67,118,865 UART: ____ _ _ _ ____ _____
67,120,813 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,122,823 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,124,684 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,126,610 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,128,653 UART: |_|
67,129,465 UART:
67,415,796 UART: [rt] Runtime listening for mailbox commands...
67,417,938 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
3,753,160 ready_for_fw is high
3,753,579 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,180,345 >>> mbox cmd response: success
14,181,071 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,435,600 UART:
18,436,018 UART: Running Caliptra FMC ...
18,437,213 UART:
18,437,393 UART: [state] CFI Enabled
18,445,237 UART: [fht] FMC Alias Private Key: 7
20,202,054 UART: [art] Extend RT PCRs Done
20,203,277 UART: [art] Lock RT PCRs Done
20,205,336 UART: [art] Populate DV Done
20,210,752 UART: [fht] FMC Alias Private Key: 7
20,212,401 UART: [art] Derive CDI
20,213,218 UART: [art] Store in in slot 0x4
20,255,978 UART: [art] Derive Key Pair
20,256,981 UART: [art] Store priv key in slot 0x5
22,683,571 UART: [art] Derive Key Pair - Done
22,697,112 UART: [art] Signing Cert with AUTHO
22,698,416 UART: RITY.KEYID = 7
24,403,931 UART: [art] Erasing AUTHORITY.KEYID = 7
24,405,459 UART: [art] PUB.X = 821317452E1DE56BA3B897D52C9596725A7B92167289F7F95ED50F9CF9BEF0C10BDAB812E1219C238735F4A733BE20CA
24,412,711 UART: [art] PUB.Y = CCCE81ABE4F901B55F59C1470318444A9F7338554A64EDAE84DA1159884AC6C1BB65340CFD6D2A6A537DF28DED57FAC3
24,420,008 UART: [art] SIG.R = 7F781D8FD628096F9B336BB165518A01011A60C8C6A10D0D01350EA9CB03541EE76F180B0B58B8C2BEF191C36280EE96
24,427,382 UART: [art] SIG.S = 2252EC0CA1152B28861A3C4DE18CA0921BA1115C5FD05AD05DF685662C09444ACD0CB1222AEF48536CC582F87CF180FA
25,406,074 UART: mbox::rt_entry...
25,407,038 UART: ____ _ _ _ ____ _____
25,408,965 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,410,970 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,412,829 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,414,793 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,416,676 UART: |_|
25,417,509 UART:
25,530,639 UART: [rt] Runtime listening for mailbox commands...
25,532,798 >>> mbox cmd response data (48 bytes)
27,597,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,331,172 >>> mbox cmd response: success
35,331,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,366,613 UART:
35,366,908 UART: Running Caliptra FMC ...
35,368,032 UART:
35,368,202 UART: [state] CFI Enabled
35,412,183 UART: [art] Extend RT PCRs Done
35,413,409 UART: [art] Lock RT PCRs Done
35,414,712 UART: [art] Populate DV Done
35,420,289 UART: [fht] FMC Alias Private Key: 7
35,421,936 UART: [art] Derive CDI
35,422,756 UART: [art] Store in in slot 0x4
35,465,572 UART: [art] Derive Key Pair
35,466,625 UART: [art] Store priv key in slot 0x5
37,893,550 UART: [art] Derive Key Pair - Done
37,906,498 UART: [art] Signing Cert with AUTHO
37,907,811 UART: RITY.KEYID = 7
39,613,035 UART: [art] Erasing AUTHORITY.KEYID = 7
39,614,541 UART: [art] PUB.X = 8E90B5CCD18002CE5B6DCC5A81D065FA1598D99159BD76379E0DF74DBAA7AF06BFB7595AC0F741F73B62145C401D99AB
39,621,780 UART: [art] PUB.Y = A51F94C771A03528DAC9B7230752B5CC61CAC7B20277337740793A35C491BF979A82CE9D376C6392754034C9AF6660E9
39,629,038 UART: [art] SIG.R = F8EB3973C90D23C215A1F6C830F992655C6BA38B94037479FA9C5FBB25FBB429EBE854FDD918D5BAD9DD0E650C6B0F60
39,636,443 UART: [art] SIG.S = E578F859F660F918BF4B73E7F52B6E7A1FB2176474D7715E57E1940578EC9607F42E1DAB3B419846F2BA1672FAE7EC07
40,615,433 UART: Caliptra RT
40,616,148 UART: [state] CFI Enabled
40,903,334 UART: [rt] RT listening for mailbox commands...
40,935,401 UART: [rt]cmd =0x4d454153, len=108
40,954,120 >>> mbox cmd response data (12 bytes)
43,001,713 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
49,913,402 >>> mbox cmd response: success
51,956,642 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
52,055,979 UART:
52,056,327 UART: Running Caliptra FMC ...
52,057,459 UART:
52,057,651 UART: [state] CFI Enabled
52,058,584 UART: [art] Extend RT PCRs Done
52,059,730 UART: [art] Lock RT PCRs Done
52,060,799 UART: [art] Populate DV Done
52,061,834 UART: [fht] FMC Alias Private Key: 7
52,063,155 UART: [art] Derive CDI
52,063,921 UART: [art] Store in in slot 0x4
52,065,099 UART: [art] Derive Key Pair
52,066,063 UART: [art] Store priv key in slot 0x5
52,475,526 UART: [art] Derive Key Pair - Done
52,488,796 UART: [art] Signing Cert with AUTHO
52,490,098 UART: RITY.KEYID = 7
54,195,712 UART: [art] Erasing AUTHORITY.KEYID = 7
54,197,189 UART: [art] PUB.X = 1068908E114A846B80D6C4219202BDA90DFEF081451A7BC8860C5C933CC6952E1839F8727D907C785D07836CD4E6DF5A
54,204,491 UART: [art] PUB.Y = 47BF7641EC398E829080F8B702D0344B339202FCBE11C5FFABA1751547A8CCEE906B838461734DC5BBB4C9D772301D1C
54,211,722 UART: [art] SIG.R = E6943C87D56B88BBA73DB82ADFE29FD1A95D23D494B03C603CF0AD8288D32CCF5A1212BC39AF504DD6D76F42B9D7555F
54,219,169 UART: [art] SIG.S = 702E02362660A5D2ACFAE072CC91BCCBF31103F2F6B190E8F04060E66DACC9411DE88A7C0BF1F4303DC6EE45B248DCE8
55,197,494 UART: mbox::rt_entry...
55,198,457 UART: ____ _ _ _ ____ _____
55,200,453 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,202,463 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,204,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,206,353 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,208,259 UART: |_|
55,209,067 UART:
55,494,000 UART: [rt] Runtime listening for mailbox commands...
62,318,917 >>> mbox cmd response: success
62,319,332 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,355,375 UART:
62,355,665 UART: Running Caliptra FMC ...
62,356,699 UART:
62,356,850 UART: [state] CFI Enabled
62,400,497 UART: [art] Extend RT PCRs Done
62,401,645 UART: [art] Lock RT PCRs Done
62,403,282 UART: [art] Populate DV Done
62,408,840 UART: [fht] FMC Alias Private Key: 7
62,410,535 UART: [art] Derive CDI
62,411,273 UART: [art] Store in in slot 0x4
62,453,993 UART: [art] Derive Key Pair
62,455,032 UART: [art] Store priv key in slot 0x5
64,882,188 UART: [art] Derive Key Pair - Done
64,895,342 UART: [art] Signing Cert with AUTHO
64,896,646 UART: RITY.KEYID = 7
66,602,079 UART: [art] Erasing AUTHORITY.KEYID = 7
66,603,553 UART: [art] PUB.X = 30136B2D6EE21463713D4513A0DCB20866E10C486163B7D5F1325F951AB455629D20DA92C2C74B63A9EF850F7A8DA8F2
66,610,838 UART: [art] PUB.Y = B8FB048F7E0C36C661BBA96C915F75A6F32027E4F553508198BDEBA58213617FAB42F9E4EC79DC7C2FF0F984C187F09A
66,618,128 UART: [art] SIG.R = 824AA90ECF0C5691B9E99665EDF6D43EEA28A6EEC174317972EA9EA2D04F5FC661EAE1C8A52FC16BC01C57F2CE28D48F
66,625,513 UART: [art] SIG.S = 89034DB899D7E7335E74050434F9859743DE5C548DD473C837441B69E51A96AC37097CBC67566B472C3FCB0D7E5ADBE1
67,603,883 UART: mbox::rt_entry...
67,604,851 UART: ____ _ _ _ ____ _____
67,606,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,608,861 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,610,794 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,612,724 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,614,671 UART: |_|
67,615,505 UART:
67,902,172 UART: [rt] Runtime listening for mailbox commands...
67,904,341 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.51s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,501,171 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,530,523 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,612,578 >>> mbox cmd response: success
2,612,578 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,613,634 UART: [afmc] ++
2,613,802 UART: [afmc] CDI.KEYID = 6
2,614,164 UART: [afmc] SUBJECT.KEYID = 7
2,614,589 UART: [afmc] AUTHORITY.KEYID = 5
2,649,798 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,665,988 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,666,768 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,672,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,678,381 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,071 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,691,912 UART: [afmc] --
2,692,798 UART: [cold-reset] --
2,693,392 UART: [state] Locking Datavault
2,694,549 UART: [state] Locking PCR0, PCR1 and PCR31
2,695,153 UART: [state] Locking ICCM
2,695,587 UART: [exit] Launching FMC @ 0x40000130
2,700,916 UART:
2,700,932 UART: Running Caliptra FMC ...
2,701,340 UART:
2,701,394 UART: [state] CFI Enabled
2,711,869 UART: [fht] FMC Alias Private Key: 7
2,820,244 UART: [art] Extend RT PCRs Done
2,820,672 UART: [art] Lock RT PCRs Done
2,822,314 UART: [art] Populate DV Done
2,830,737 UART: [fht] FMC Alias Private Key: 7
2,831,767 UART: [art] Derive CDI
2,832,047 UART: [art] Store in in slot 0x4
2,917,694 UART: [art] Derive Key Pair
2,918,054 UART: [art] Store priv key in slot 0x5
2,931,868 UART: [art] Derive Key Pair - Done
2,946,606 UART: [art] Signing Cert with AUTHO
2,947,086 UART: RITY.KEYID = 7
2,962,324 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,089 UART: [art] PUB.X = FE29374AFEBF70C7863130201E12043032C6F79A50D937D33509716283C3199A4417D52033B84BB937F28775E172E7F7
2,969,839 UART: [art] PUB.Y = CCB3F6F83F86886465F0753BC1A2B9AE58497D4D2DA5009501A557D01A582BFFD6E34F99FFFDF2FC7221372FB83D45CC
2,976,778 UART: [art] SIG.R = CBB75D9D53ABA2B4D3EE7049E6AA79EA54F93D6ADEA850B921BB249B58AA351A6D8B59BCB795F24A54FB9B96F3904149
2,983,568 UART: [art] SIG.S = 6ED6417216FB9EE67B25DDCEF5BD65376E8DA547A89DF6DC58082438E81BDE8A63BDF8CD74D1DC0BF1C5BE30E1EEACC2
3,007,143 UART: mbox::rt_entry...
3,007,515 UART: ____ _ _ _ ____ _____
3,008,299 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,009,867 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,635 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,403 UART: |_|
3,011,715 UART:
3,117,693 UART: [rt] Runtime listening for mailbox commands...
3,118,880 >>> mbox cmd response data (48 bytes)
3,118,881 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,118,995 UART:
3,119,011 UART: Running Caliptra ROM ...
3,119,419 UART:
3,119,473 UART: [state] CFI Enabled
3,122,081 UART: [state] LifecycleState = Unprovisioned
3,122,736 UART: [state] DebugLocked = No
3,123,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,125,095 UART: [kat] SHA2-256
3,919,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,923,141 UART: [kat] ++
3,923,293 UART: [kat] sha1
3,927,481 UART: [kat] SHA2-256
3,929,419 UART: [kat] SHA2-384
3,931,992 UART: [kat] SHA2-512-ACC
3,933,892 UART: [kat] ECC-384
3,939,359 UART: [kat] HMAC-384Kdf
3,944,045 UART: [kat] LMS
4,512,241 UART: [kat] --
4,513,074 UART: [update-reset] ++
5,846,515 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,847,729 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
5,997,359 >>> mbox cmd response: success
5,997,359 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,997,508 UART: [update-reset] Copying MAN_2 To MAN_1
6,005,522 UART: [update-reset Success] --
6,006,487 UART: [state] Locking Datavault
6,007,193 UART: [state] Locking PCR0, PCR1 and PCR31
6,007,797 UART: [state] Locking ICCM
6,008,257 UART: [exit] Launching FMC @ 0x40000130
6,013,586 UART:
6,013,602 UART: Running Caliptra FMC ...
6,014,010 UART:
6,014,064 UART: [state] CFI Enabled
6,103,175 UART: [art] Extend RT PCRs Done
6,103,603 UART: [art] Lock RT PCRs Done
6,104,742 UART: [art] Populate DV Done
6,113,021 UART: [fht] FMC Alias Private Key: 7
6,114,203 UART: [art] Derive CDI
6,114,483 UART: [art] Store in in slot 0x4
6,200,264 UART: [art] Derive Key Pair
6,200,624 UART: [art] Store priv key in slot 0x5
6,214,018 UART: [art] Derive Key Pair - Done
6,228,349 UART: [art] Signing Cert with AUTHO
6,228,829 UART: RITY.KEYID = 7
6,244,329 UART: [art] Erasing AUTHORITY.KEYID = 7
6,245,094 UART: [art] PUB.X = BCD605EAB8A83B180A5E7E778C414DA6D60666497B6D0EFA0C65DE0D4BBEC3955725F23DE0050089FBE1D5202210A9C8
6,251,833 UART: [art] PUB.Y = FE815068DA735CF6DFAA63E076CFD631B2E91D883F9C1D6F8E80876A30562F588358F27D520CAC55A784AD8B39426CC3
6,258,788 UART: [art] SIG.R = F42A50968398E6422675C65B1336D46CFA0902D1A67B393B1B2139B954EACA9C924F70C15FF0F5866ED3096CDE4F24BE
6,265,553 UART: [art] SIG.S = 76B45CC14DC46C6ABAD644AD3B6128F6A27F474C4ECE587711C295AE9426F52F7CBD2028E4A569531FF2B6E013B4E10A
6,289,481 UART: Caliptra RT
6,289,734 UART: [state] CFI Enabled
6,570,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,601,887 UART: [rt]cmd =0x4d454153, len=108
6,621,572 >>> mbox cmd response data (12 bytes)
6,621,573 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,622,499 UART:
6,622,515 UART: Running Caliptra ROM ...
6,622,923 UART:
6,622,977 UART: [state] CFI Enabled
6,625,739 UART: [state] LifecycleState = Unprovisioned
6,626,394 UART: [state] DebugLocked = No
6,627,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,628,801 UART: [kat] SHA2-256
7,422,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,426,847 UART: [kat] ++
7,426,999 UART: [kat] sha1
7,431,413 UART: [kat] SHA2-256
7,433,351 UART: [kat] SHA2-384
7,436,242 UART: [kat] SHA2-512-ACC
7,438,142 UART: [kat] ECC-384
7,443,531 UART: [kat] HMAC-384Kdf
7,448,129 UART: [kat] LMS
8,016,325 UART: [kat] --
8,017,296 UART: [update-reset] ++
8,942,172 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,943,222 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
9,039,398 >>> mbox cmd response: success
9,039,398 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
9,039,679 UART: [update-reset] Copying MAN_2 To MAN_1
9,047,693 UART: [update-reset Success] --
9,048,720 UART: [state] Locking Datavault
9,049,572 UART: [state] Locking PCR0, PCR1 and PCR31
9,050,176 UART: [state] Locking ICCM
9,050,714 UART: [exit] Launching FMC @ 0x40000130
9,056,043 UART:
9,056,059 UART: Running Caliptra FMC ...
9,056,467 UART:
9,056,521 UART: [state] CFI Enabled
9,144,764 UART: [art] Extend RT PCRs Done
9,145,192 UART: [art] Lock RT PCRs Done
9,146,279 UART: [art] Populate DV Done
9,154,700 UART: [fht] FMC Alias Private Key: 7
9,155,650 UART: [art] Derive CDI
9,155,930 UART: [art] Store in in slot 0x4
9,241,769 UART: [art] Derive Key Pair
9,242,129 UART: [art] Store priv key in slot 0x5
9,255,191 UART: [art] Derive Key Pair - Done
9,270,225 UART: [art] Signing Cert with AUTHO
9,270,705 UART: RITY.KEYID = 7
9,285,869 UART: [art] Erasing AUTHORITY.KEYID = 7
9,286,634 UART: [art] PUB.X = DDAA64321D18FCBCB748C89BB35B21C8C9B652CC4E45626A650A34C9BF6C3E3CD0F6A8F5EE8A6574DA31F14579755E74
9,293,417 UART: [art] PUB.Y = 44D84F0673EFDBEB3B9003E1872C4F5BDC1FF2BBD29902FAC087E44D8B338EFE56AC69BE0829C578319B7FA6B1CF6AD2
9,300,377 UART: [art] SIG.R = 98EBBC2D8F37946FB3ABEF539BD93FC391BEE4EF687096EA162A6B6A3A4A0876320663EE5B097F8C5542864222E9B73F
9,307,148 UART: [art] SIG.S = EF6C6E14D8C838FABA9112A796ABC43A5028F07C79B036778F0A00860DC1A6DB0E2251A0A729106206460FFCB3797EB1
9,330,602 UART: mbox::rt_entry...
9,330,974 UART: ____ _ _ _ ____ _____
9,331,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,332,558 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,333,326 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,334,094 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,334,862 UART: |_|
9,335,174 UART:
9,610,193 UART: [rt] Runtime listening for mailbox commands...
9,611,160 UART:
9,611,176 UART: Running Caliptra ROM ...
9,611,584 UART:
9,611,638 UART: [state] CFI Enabled
9,614,366 UART: [state] LifecycleState = Unprovisioned
9,615,021 UART: [state] DebugLocked = No
9,615,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,617,280 UART: [kat] SHA2-256
10,411,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,415,326 UART: [kat] ++
10,415,478 UART: [kat] sha1
10,419,858 UART: [kat] SHA2-256
10,421,796 UART: [kat] SHA2-384
10,424,639 UART: [kat] SHA2-512-ACC
10,426,539 UART: [kat] ECC-384
10,432,228 UART: [kat] HMAC-384Kdf
10,436,816 UART: [kat] LMS
11,005,012 UART: [kat] --
11,006,059 UART: [update-reset] ++
11,929,925 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,931,131 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
12,027,307 >>> mbox cmd response: success
12,027,307 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,027,452 UART: [update-reset] Copying MAN_2 To MAN_1
12,035,466 UART: [update-reset Success] --
12,036,123 UART: [state] Locking Datavault
12,036,721 UART: [state] Locking PCR0, PCR1 and PCR31
12,037,325 UART: [state] Locking ICCM
12,037,925 UART: [exit] Launching FMC @ 0x40000130
12,043,254 UART:
12,043,270 UART: Running Caliptra FMC ...
12,043,678 UART:
12,043,732 UART: [state] CFI Enabled
12,132,537 UART: [art] Extend RT PCRs Done
12,132,965 UART: [art] Lock RT PCRs Done
12,134,168 UART: [art] Populate DV Done
12,142,407 UART: [fht] FMC Alias Private Key: 7
12,143,363 UART: [art] Derive CDI
12,143,643 UART: [art] Store in in slot 0x4
12,229,318 UART: [art] Derive Key Pair
12,229,678 UART: [art] Store priv key in slot 0x5
12,242,770 UART: [art] Derive Key Pair - Done
12,257,627 UART: [art] Signing Cert with AUTHO
12,258,107 UART: RITY.KEYID = 7
12,273,203 UART: [art] Erasing AUTHORITY.KEYID = 7
12,273,968 UART: [art] PUB.X = C77F459F3FA49C0B0D8B982B361E7074328F06A29994C1802026FB20212B537BBA0B05185D31AC6C5BC8210635203DF7
12,280,716 UART: [art] PUB.Y = 980547CDEF4E76ECAE8FFBE095B48E415412A882B867FAF5A836577539D475DA73ACCAA94CC9EEB9C2E34E3154097C25
12,287,674 UART: [art] SIG.R = DFC70DC9B46025292CEB7A878BB4469D4857FF61C061749288F5D8F23B0EC9039E6B09FC57A92B3327D34A7EF7EC8E48
12,294,440 UART: [art] SIG.S = DCC61C33086480085C79005C267D166CB5F6FAD36C33CD77D5E97AA8FE0592A70A77A068A073EABBF3197E894A15ED4D
12,318,321 UART: mbox::rt_entry...
12,318,693 UART: ____ _ _ _ ____ _____
12,319,477 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,320,277 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,321,045 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,321,813 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,322,581 UART: |_|
12,322,893 UART:
12,603,312 UART: [rt] Runtime listening for mailbox commands...
12,604,508 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,925 ready_for_fw is high
1,361,925 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,464,676 >>> mbox cmd response: success
2,464,676 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,526,150 UART:
2,526,166 UART: Running Caliptra FMC ...
2,526,574 UART:
2,526,628 UART: [state] CFI Enabled
2,537,339 UART: [fht] FMC Alias Private Key: 7
2,646,084 UART: [art] Extend RT PCRs Done
2,646,512 UART: [art] Lock RT PCRs Done
2,647,952 UART: [art] Populate DV Done
2,656,341 UART: [fht] FMC Alias Private Key: 7
2,657,393 UART: [art] Derive CDI
2,657,673 UART: [art] Store in in slot 0x4
2,743,334 UART: [art] Derive Key Pair
2,743,694 UART: [art] Store priv key in slot 0x5
2,757,100 UART: [art] Derive Key Pair - Done
2,772,167 UART: [art] Signing Cert with AUTHO
2,772,647 UART: RITY.KEYID = 7
2,787,865 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,630 UART: [art] PUB.X = AEA2EBE380F1C4F666589F151700038DD194FA019BBE6DDAABD7FF32AA6DDB803D68BCE30D8DCDF9954D3B2C4D5E098C
2,795,394 UART: [art] PUB.Y = F7E4F3165BEBA4B6A6392E2123AA60967ED3F13F6357701B4402BDE16580E2F8F1D21C7AB5A17CC965214A6230C5B037
2,802,345 UART: [art] SIG.R = 721717112070A53270A95BF2B50FFFD18F3C71C922A20E9DEC0FC68E5791476C2986FA29B375ACF43ADA0019FB0DC19A
2,809,089 UART: [art] SIG.S = 6CB91E66ED434382E1A9F73E98DFB2A9FBCF55C71BCB2343EED8518D2EB4A88523F661984EE982A0022F15CD3D2CCAC6
2,832,537 UART: mbox::rt_entry...
2,832,909 UART: ____ _ _ _ ____ _____
2,833,693 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,493 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,261 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,029 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,797 UART: |_|
2,837,109 UART:
2,944,200 UART: [rt] Runtime listening for mailbox commands...
2,945,387 >>> mbox cmd response data (48 bytes)
2,945,388 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,705,019 >>> mbox cmd response: success
5,705,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,718,378 UART:
5,718,394 UART: Running Caliptra FMC ...
5,718,802 UART:
5,718,856 UART: [state] CFI Enabled
5,806,873 UART: [art] Extend RT PCRs Done
5,807,301 UART: [art] Lock RT PCRs Done
5,808,268 UART: [art] Populate DV Done
5,816,665 UART: [fht] FMC Alias Private Key: 7
5,817,823 UART: [art] Derive CDI
5,818,103 UART: [art] Store in in slot 0x4
5,903,932 UART: [art] Derive Key Pair
5,904,292 UART: [art] Store priv key in slot 0x5
5,917,754 UART: [art] Derive Key Pair - Done
5,932,382 UART: [art] Signing Cert with AUTHO
5,932,862 UART: RITY.KEYID = 7
5,948,264 UART: [art] Erasing AUTHORITY.KEYID = 7
5,949,029 UART: [art] PUB.X = 801C0D7E80445EFDA19FD8D662643540F6269F84D310F894770C2E77AB4EF03ACB119E2CF4A88AABD9A4338F21013062
5,955,794 UART: [art] PUB.Y = 8DB5E0FF4E747BF2F1CE62C0FF54C84FC3A0E4652B642151717BCDFD1565D778A3229F985CFFA2E285F3ACEEB96EC03B
5,962,766 UART: [art] SIG.R = 1B1DC00A5B743BD591D1037318E536C075987323E495FF09DC657694CE8A87CBF9A041E83FDEE89EB931E0169F6E608E
5,969,531 UART: [art] SIG.S = 635A6D1F51CBB64902937B0DB8813EFFCF48312013D0A348F3782A6BF0786E9AB61C6DC3E7A8F55954AA666D9E524058
5,993,972 UART: Caliptra RT
5,994,225 UART: [state] CFI Enabled
6,273,481 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,304,389 UART: [rt]cmd =0x4d454153, len=108
6,325,354 >>> mbox cmd response data (12 bytes)
6,325,355 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,621,838 >>> mbox cmd response: success
8,621,838 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,635,259 UART:
8,635,275 UART: Running Caliptra FMC ...
8,635,683 UART:
8,635,737 UART: [state] CFI Enabled
8,724,658 UART: [art] Extend RT PCRs Done
8,725,086 UART: [art] Lock RT PCRs Done
8,726,665 UART: [art] Populate DV Done
8,735,014 UART: [fht] FMC Alias Private Key: 7
8,736,188 UART: [art] Derive CDI
8,736,468 UART: [art] Store in in slot 0x4
8,821,949 UART: [art] Derive Key Pair
8,822,309 UART: [art] Store priv key in slot 0x5
8,835,829 UART: [art] Derive Key Pair - Done
8,850,802 UART: [art] Signing Cert with AUTHO
8,851,282 UART: RITY.KEYID = 7
8,866,060 UART: [art] Erasing AUTHORITY.KEYID = 7
8,866,825 UART: [art] PUB.X = A0567087B4B14F65032D4B744FC211F44F684BF673ED5B289D8C36E236024CC2B77A40741754F65CBFCE6ADA92F6C63F
8,873,595 UART: [art] PUB.Y = 08D4C9B0D722E0168413C99BAA8045422BA10F2C42500EE204A0714D74F56B42BD411B33D393D88329CAEBA094139BF5
8,880,533 UART: [art] SIG.R = 49D6ED72046D1978749CC3A93B052CA428D5458FB92F00314D505194C3BE9D4F28F269C218CD2E702EE56E82653A7F69
8,887,273 UART: [art] SIG.S = B7738518B78A2DA98E93043EA4C41163BFE98E360D38F2E3F4D7F237D5021A356B558D32C4744882ECEFACAF2CF41DB4
8,911,013 UART: mbox::rt_entry...
8,911,385 UART: ____ _ _ _ ____ _____
8,912,169 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,912,969 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,913,737 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,914,505 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,915,273 UART: |_|
8,915,585 UART:
9,194,205 UART: [rt] Runtime listening for mailbox commands...
11,492,777 >>> mbox cmd response: success
11,492,777 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,506,250 UART:
11,506,266 UART: Running Caliptra FMC ...
11,506,674 UART:
11,506,728 UART: [state] CFI Enabled
11,595,767 UART: [art] Extend RT PCRs Done
11,596,195 UART: [art] Lock RT PCRs Done
11,597,538 UART: [art] Populate DV Done
11,605,695 UART: [fht] FMC Alias Private Key: 7
11,606,849 UART: [art] Derive CDI
11,607,129 UART: [art] Store in in slot 0x4
11,692,794 UART: [art] Derive Key Pair
11,693,154 UART: [art] Store priv key in slot 0x5
11,705,962 UART: [art] Derive Key Pair - Done
11,720,817 UART: [art] Signing Cert with AUTHO
11,721,297 UART: RITY.KEYID = 7
11,736,721 UART: [art] Erasing AUTHORITY.KEYID = 7
11,737,486 UART: [art] PUB.X = 0968F7BC1654B6E2B2122B99BA8611F89BF209F4B85A21003363AE260D0184996350BD75CE538A0F0EE571A22BCC08DE
11,744,215 UART: [art] PUB.Y = 32AA635A24A6372D761990A117E85F5A39DC97D3C1B2E8AF2C8A30ED2CC2952FFCD060B6E6B81556B8958CE43827AE05
11,751,170 UART: [art] SIG.R = E9EC471A22C73A44633D26BEB9CE41B02EEE45C20FB2394ED18131AB49E210EC59D1FB4C2CEBFE853ED57D09357CEEA0
11,757,956 UART: [art] SIG.S = DB3FEBDD8E2747CD0756B6454978E832C2DD4D591149100FE5D4D10C0F62EFAFB5416476081CA52723C01C525A0AACC1
11,781,541 UART: mbox::rt_entry...
11,781,913 UART: ____ _ _ _ ____ _____
11,782,697 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,783,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,784,265 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,785,033 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,785,801 UART: |_|
11,786,113 UART:
12,065,126 UART: [rt] Runtime listening for mailbox commands...
12,066,322 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.62s
Truncated 2720 bytes from beginning
roc] Image verified using Vendor ECC Key Index 0
2,503,372 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,614,811 >>> mbox cmd response: success
2,614,811 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,615,853 UART: [afmc] ++
2,616,021 UART: [afmc] CDI.KEYID = 6
2,616,383 UART: [afmc] SUBJECT.KEYID = 7
2,616,808 UART: [afmc] AUTHORITY.KEYID = 5
2,652,213 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,847 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,732 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,422 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,423 UART: [afmc] --
2,695,441 UART: [cold-reset] --
2,696,535 UART: [state] Locking Datavault
2,697,728 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,332 UART: [state] Locking ICCM
2,698,840 UART: [exit] Launching FMC @ 0x40000130
2,704,169 UART:
2,704,185 UART: Running Caliptra FMC ...
2,704,593 UART:
2,704,736 UART: [state] CFI Enabled
2,715,633 UART: [fht] FMC Alias Private Key: 7
2,823,670 UART: [art] Extend RT PCRs Done
2,824,098 UART: [art] Lock RT PCRs Done
2,825,670 UART: [art] Populate DV Done
2,834,115 UART: [fht] FMC Alias Private Key: 7
2,835,163 UART: [art] Derive CDI
2,835,443 UART: [art] Store in in slot 0x4
2,921,322 UART: [art] Derive Key Pair
2,921,682 UART: [art] Store priv key in slot 0x5
2,935,148 UART: [art] Derive Key Pair - Done
2,950,201 UART: [art] Signing Cert with AUTHO
2,950,681 UART: RITY.KEYID = 7
2,965,673 UART: [art] Erasing AUTHORITY.KEYID = 7
2,966,438 UART: [art] PUB.X = 20B9623AFF3832719E989E786D8ABA017946991736CE3471A4F6E5444D961CFF1CA1E00C1C4463593CF17D81594A8E50
2,973,198 UART: [art] PUB.Y = C69CE443EEEB4CB7752706C9767673F487160F4E8DFA8080BBF92C10D3B601A6259132886849DA4AB40734D3F5932358
2,980,132 UART: [art] SIG.R = 0613457382AFF2A0B1EE00DEC9AD280E87C9843009624A8D2A2BADCF1DCF42C269F9373DCF847DE1CFD2A3487E5C10DD
2,986,889 UART: [art] SIG.S = A6BC52914112B98ECA950ED77920D2CC80BECD36D77B76F78826425DCA74AF77F983583D711BA8675700A3B357ED05AA
3,010,152 UART: mbox::rt_entry...
3,010,524 UART: ____ _ _ _ ____ _____
3,011,308 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,012,108 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,876 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,013,644 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,014,412 UART: |_|
3,014,724 UART:
3,122,086 UART: [rt] Runtime listening for mailbox commands...
3,123,273 >>> mbox cmd response data (48 bytes)
3,123,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,123,388 UART:
3,123,404 UART: Running Caliptra ROM ...
3,123,812 UART:
3,123,953 UART: [state] CFI Enabled
3,126,735 UART: [state] LifecycleState = Unprovisioned
3,127,390 UART: [state] DebugLocked = No
3,128,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,129,627 UART: [kat] SHA2-256
3,923,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,927,673 UART: [kat] ++
3,927,825 UART: [kat] sha1
3,931,957 UART: [kat] SHA2-256
3,933,895 UART: [kat] SHA2-384
3,936,662 UART: [kat] SHA2-512-ACC
3,938,562 UART: [kat] ECC-384
3,944,205 UART: [kat] HMAC-384Kdf
3,948,723 UART: [kat] LMS
4,516,919 UART: [kat] --
4,517,774 UART: [update-reset] ++
5,851,322 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,852,410 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,002,040 >>> mbox cmd response: success
6,002,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,002,167 UART: [update-reset] Copying MAN_2 To MAN_1
6,010,181 UART: [update-reset Success] --
6,011,126 UART: [state] Locking Datavault
6,011,968 UART: [state] Locking PCR0, PCR1 and PCR31
6,012,572 UART: [state] Locking ICCM
6,013,056 UART: [exit] Launching FMC @ 0x40000130
6,018,385 UART:
6,018,401 UART: Running Caliptra FMC ...
6,018,809 UART:
6,018,952 UART: [state] CFI Enabled
6,108,161 UART: [art] Extend RT PCRs Done
6,108,589 UART: [art] Lock RT PCRs Done
6,109,854 UART: [art] Populate DV Done
6,118,309 UART: [fht] FMC Alias Private Key: 7
6,119,409 UART: [art] Derive CDI
6,119,689 UART: [art] Store in in slot 0x4
6,205,244 UART: [art] Derive Key Pair
6,205,604 UART: [art] Store priv key in slot 0x5
6,219,092 UART: [art] Derive Key Pair - Done
6,233,845 UART: [art] Signing Cert with AUTHO
6,234,325 UART: RITY.KEYID = 7
6,249,139 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,904 UART: [art] PUB.X = D54077DF1521B6197F6A564AA2061D40E8A7BD965DC0ED3485AAC0978D278104C8E0F875479BF589C33E8DDE65EFD8DB
6,256,678 UART: [art] PUB.Y = B4E595288D0517232305C1B58AFC2DA421CAE219AB435C6EAD1FD2768882BCBDC0A987DDC1AC7DEE1174DC75D1496717
6,263,636 UART: [art] SIG.R = 5F4B908422BC60C87CA704631CA09739A93852FC0A1258C185331D63DA79757CF410C08D0804FD6FA00B159F9C8FE86B
6,270,391 UART: [art] SIG.S = A23DB1588EC611697AD96CA8877D8BF08F38525A7C0FD0F85B84F8636D2DC461AFE7FC83F246C0769AD3972B66FD2E7B
6,294,345 UART: Caliptra RT
6,294,690 UART: [state] CFI Enabled
6,575,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,606,389 UART: [rt]cmd =0x4d454153, len=108
6,626,872 >>> mbox cmd response data (12 bytes)
6,626,873 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,627,427 UART:
6,627,443 UART: Running Caliptra ROM ...
6,627,851 UART:
6,627,992 UART: [state] CFI Enabled
6,630,586 UART: [state] LifecycleState = Unprovisioned
6,631,241 UART: [state] DebugLocked = No
6,631,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,633,338 UART: [kat] SHA2-256
7,427,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,431,384 UART: [kat] ++
7,431,536 UART: [kat] sha1
7,435,864 UART: [kat] SHA2-256
7,437,802 UART: [kat] SHA2-384
7,440,315 UART: [kat] SHA2-512-ACC
7,442,215 UART: [kat] ECC-384
7,447,798 UART: [kat] HMAC-384Kdf
7,452,304 UART: [kat] LMS
8,020,500 UART: [kat] --
8,021,527 UART: [update-reset] ++
8,945,383 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,946,471 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
9,042,647 >>> mbox cmd response: success
9,042,647 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
9,042,856 UART: [update-reset] Copying MAN_2 To MAN_1
9,050,870 UART: [update-reset Success] --
9,052,075 UART: [state] Locking Datavault
9,052,757 UART: [state] Locking PCR0, PCR1 and PCR31
9,053,361 UART: [state] Locking ICCM
9,053,939 UART: [exit] Launching FMC @ 0x40000130
9,059,268 UART:
9,059,284 UART: Running Caliptra FMC ...
9,059,692 UART:
9,059,835 UART: [state] CFI Enabled
9,149,322 UART: [art] Extend RT PCRs Done
9,149,750 UART: [art] Lock RT PCRs Done
9,150,893 UART: [art] Populate DV Done
9,159,094 UART: [fht] FMC Alias Private Key: 7
9,160,172 UART: [art] Derive CDI
9,160,452 UART: [art] Store in in slot 0x4
9,245,977 UART: [art] Derive Key Pair
9,246,337 UART: [art] Store priv key in slot 0x5
9,259,435 UART: [art] Derive Key Pair - Done
9,274,235 UART: [art] Signing Cert with AUTHO
9,274,715 UART: RITY.KEYID = 7
9,290,413 UART: [art] Erasing AUTHORITY.KEYID = 7
9,291,178 UART: [art] PUB.X = 3AAC1B25EAB22D13D70FCEA4A3F57DED28B1577352B6DEAC3B864B4D9A46D3567B4C6C127E77753AA4BC25A574FD7750
9,297,963 UART: [art] PUB.Y = B5D55F7BDA1F8D2ED6061F82A8A9B8937EF1DB35DE55A7FC59871B73F3437BD98543797D82CBA0A9BA4875322E5B47FB
9,304,924 UART: [art] SIG.R = 61B9A72125B58560C5A97C882063296A9F4481C660E045EB5B5B5A62ED7284667726F3F201E74A4E45D043123BEA083C
9,311,680 UART: [art] SIG.S = 259FB5ABB04A91DD482E7630E8D552276F7A18FDAC15DC2B52FE66ED3ADEDAC936EA71652B81D108ECDB38594B246DB0
9,335,996 UART: mbox::rt_entry...
9,336,368 UART: ____ _ _ _ ____ _____
9,337,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,337,952 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,338,720 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,339,488 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,340,256 UART: |_|
9,340,568 UART:
9,616,389 UART: [rt] Runtime listening for mailbox commands...
9,617,356 UART:
9,617,372 UART: Running Caliptra ROM ...
9,617,780 UART:
9,617,921 UART: [state] CFI Enabled
9,621,051 UART: [state] LifecycleState = Unprovisioned
9,621,706 UART: [state] DebugLocked = No
9,622,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,624,097 UART: [kat] SHA2-256
10,418,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,422,143 UART: [kat] ++
10,422,295 UART: [kat] sha1
10,426,419 UART: [kat] SHA2-256
10,428,357 UART: [kat] SHA2-384
10,431,222 UART: [kat] SHA2-512-ACC
10,433,122 UART: [kat] ECC-384
10,438,949 UART: [kat] HMAC-384Kdf
10,443,569 UART: [kat] LMS
11,011,765 UART: [kat] --
11,012,646 UART: [update-reset] ++
11,937,048 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,938,196 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
12,034,372 >>> mbox cmd response: success
12,034,372 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,034,723 UART: [update-reset] Copying MAN_2 To MAN_1
12,042,737 UART: [update-reset Success] --
12,043,686 UART: [state] Locking Datavault
12,044,426 UART: [state] Locking PCR0, PCR1 and PCR31
12,045,030 UART: [state] Locking ICCM
12,045,654 UART: [exit] Launching FMC @ 0x40000130
12,050,983 UART:
12,050,999 UART: Running Caliptra FMC ...
12,051,407 UART:
12,051,550 UART: [state] CFI Enabled
12,140,825 UART: [art] Extend RT PCRs Done
12,141,253 UART: [art] Lock RT PCRs Done
12,142,300 UART: [art] Populate DV Done
12,150,271 UART: [fht] FMC Alias Private Key: 7
12,151,425 UART: [art] Derive CDI
12,151,705 UART: [art] Store in in slot 0x4
12,236,862 UART: [art] Derive Key Pair
12,237,222 UART: [art] Store priv key in slot 0x5
12,250,420 UART: [art] Derive Key Pair - Done
12,264,668 UART: [art] Signing Cert with AUTHO
12,265,148 UART: RITY.KEYID = 7
12,280,284 UART: [art] Erasing AUTHORITY.KEYID = 7
12,281,049 UART: [art] PUB.X = D33FE3C0F2B3743599FEF3D52699F89A29BE0E8E84B9EA1815D4974CB3D40AADC073408BEFD14D72477CAD0A8A8A4C13
12,287,826 UART: [art] PUB.Y = 891E219854A5C3B0A5B0678A22A592A4C1EC184C438B1D131D8B1DA989DE4621D9692D11051C7BC2DFD91BDB14DF81BA
12,294,783 UART: [art] SIG.R = A77059F75149B73B636676080119DDC2472F73A91084F5ED9A5622A2142E208697D7EA64D8196C38B18FA24FEF489349
12,301,537 UART: [art] SIG.S = 49F4250E38ABBC87D5C047DBBADECF3C1907E0891AA7EFA1D796A08F60A9A9FFB2456AAC74B5FA068F7E8BCD044D78D7
12,325,382 UART: mbox::rt_entry...
12,325,754 UART: ____ _ _ _ ____ _____
12,326,538 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,327,338 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,328,106 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,328,874 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,329,642 UART: |_|
12,329,954 UART:
12,611,996 UART: [rt] Runtime listening for mailbox commands...
12,613,192 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,488 ready_for_fw is high
1,362,488 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,463,589 >>> mbox cmd response: success
2,463,589 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,524,819 UART:
2,524,835 UART: Running Caliptra FMC ...
2,525,243 UART:
2,525,386 UART: [state] CFI Enabled
2,536,191 UART: [fht] FMC Alias Private Key: 7
2,644,156 UART: [art] Extend RT PCRs Done
2,644,584 UART: [art] Lock RT PCRs Done
2,646,302 UART: [art] Populate DV Done
2,654,295 UART: [fht] FMC Alias Private Key: 7
2,655,423 UART: [art] Derive CDI
2,655,703 UART: [art] Store in in slot 0x4
2,741,142 UART: [art] Derive Key Pair
2,741,502 UART: [art] Store priv key in slot 0x5
2,754,094 UART: [art] Derive Key Pair - Done
2,768,922 UART: [art] Signing Cert with AUTHO
2,769,402 UART: RITY.KEYID = 7
2,784,490 UART: [art] Erasing AUTHORITY.KEYID = 7
2,785,255 UART: [art] PUB.X = 8EC60CEB0449CE7DD8302A0652C8A3EA791B83088D6868190C26D4CE0B44DCD2CD99763619FA96F2BCFBD3A64F7472DB
2,792,021 UART: [art] PUB.Y = AD2F663A685EDCF0E0B3B55F536D08B920F1971AA1203834971EB26C50F4CA8921BE4D89AEE80CA9BC8F6F38AB877C8B
2,798,981 UART: [art] SIG.R = 54B7A876D55B715A14268575E206F7365F5F0CC58A3EF79D55D411844E0DE52A23EC03C66F9687FDF0881B16BD6BF974
2,805,741 UART: [art] SIG.S = 6A249A346F05D8EF9E4D5A21D271A04E79177C97148BE8E444308FF8F68B3C01677041758DA3BBE159C1DA9F08FBED45
2,829,911 UART: mbox::rt_entry...
2,830,283 UART: ____ _ _ _ ____ _____
2,831,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,832,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,834,171 UART: |_|
2,834,483 UART:
2,940,890 UART: [rt] Runtime listening for mailbox commands...
2,942,077 >>> mbox cmd response data (48 bytes)
2,942,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,702,374 >>> mbox cmd response: success
5,702,374 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,715,983 UART:
5,715,999 UART: Running Caliptra FMC ...
5,716,407 UART:
5,716,550 UART: [state] CFI Enabled
5,805,049 UART: [art] Extend RT PCRs Done
5,805,477 UART: [art] Lock RT PCRs Done
5,807,000 UART: [art] Populate DV Done
5,815,247 UART: [fht] FMC Alias Private Key: 7
5,816,385 UART: [art] Derive CDI
5,816,665 UART: [art] Store in in slot 0x4
5,902,330 UART: [art] Derive Key Pair
5,902,690 UART: [art] Store priv key in slot 0x5
5,916,340 UART: [art] Derive Key Pair - Done
5,931,280 UART: [art] Signing Cert with AUTHO
5,931,760 UART: RITY.KEYID = 7
5,946,840 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,605 UART: [art] PUB.X = F028D1389C3D264C539CA1AD3B18EAB0A0969FFE6FE24890063DFECC427F004EC3251CAC1B3FC99ADACD7CDFDE452AEB
5,954,380 UART: [art] PUB.Y = ED41852202D2BE3509C1ED8280F8F90E7DD12B448599712BE50F80E664E8C52A0DC5B8C9EA9F6CC94409BCDC38835AB8
5,961,322 UART: [art] SIG.R = 6AB05C949A80D0E80663BFD5489C94B128EA541FB5749DE4798270F6B222E6AC83F6C733367BDBB55D811409255427F1
5,968,084 UART: [art] SIG.S = B755E9E9AA51FC2EF08B395DC1B9D66DFD86EF17E77A8567B1FD77F1CD15C908FC8A2E477F3C89DAB5EB736C8F86E582
5,991,332 UART: Caliptra RT
5,991,677 UART: [state] CFI Enabled
6,271,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,302,886 UART: [rt]cmd =0x4d454153, len=108
6,323,425 >>> mbox cmd response data (12 bytes)
6,323,426 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,621,890 >>> mbox cmd response: success
8,621,890 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,635,113 UART:
8,635,129 UART: Running Caliptra FMC ...
8,635,537 UART:
8,635,680 UART: [state] CFI Enabled
8,724,737 UART: [art] Extend RT PCRs Done
8,725,165 UART: [art] Lock RT PCRs Done
8,726,522 UART: [art] Populate DV Done
8,734,707 UART: [fht] FMC Alias Private Key: 7
8,735,677 UART: [art] Derive CDI
8,735,957 UART: [art] Store in in slot 0x4
8,821,722 UART: [art] Derive Key Pair
8,822,082 UART: [art] Store priv key in slot 0x5
8,835,988 UART: [art] Derive Key Pair - Done
8,850,995 UART: [art] Signing Cert with AUTHO
8,851,475 UART: RITY.KEYID = 7
8,866,261 UART: [art] Erasing AUTHORITY.KEYID = 7
8,867,026 UART: [art] PUB.X = 56CADD0E2737101742F2FC361909EC67DE59A5983F03DD2AF62ED9E15F28C04B7C59F57D7889DE6665A96DEE2664AF05
8,873,792 UART: [art] PUB.Y = 794EB4E360D8F782D400A34E4DE4A6918008C41588B1AE68F748FD5DF8DBB8381BA3A8DBB3E1A419D329AEE94C4F576E
8,880,731 UART: [art] SIG.R = 536C5284F1A06F00F5EE922E013135FAE0B5517C28B6F7D4224D4C8E55114CA21392755B72663B46B634D63A300A3B5F
8,887,469 UART: [art] SIG.S = ED9DF8F85415E54A7C6FCDC15D9B36DE76FADCD05917819F33D0D9821810B7048B8C9AB9F6EEBEFFA2F0E28D1E03D7CE
8,911,104 UART: mbox::rt_entry...
8,911,476 UART: ____ _ _ _ ____ _____
8,912,260 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,913,060 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,913,828 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,914,596 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,915,364 UART: |_|
8,915,676 UART:
9,192,454 UART: [rt] Runtime listening for mailbox commands...
11,489,521 >>> mbox cmd response: success
11,489,521 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,503,216 UART:
11,503,232 UART: Running Caliptra FMC ...
11,503,640 UART:
11,503,783 UART: [state] CFI Enabled
11,592,978 UART: [art] Extend RT PCRs Done
11,593,406 UART: [art] Lock RT PCRs Done
11,594,691 UART: [art] Populate DV Done
11,602,912 UART: [fht] FMC Alias Private Key: 7
11,603,896 UART: [art] Derive CDI
11,604,176 UART: [art] Store in in slot 0x4
11,689,971 UART: [art] Derive Key Pair
11,690,331 UART: [art] Store priv key in slot 0x5
11,703,729 UART: [art] Derive Key Pair - Done
11,718,258 UART: [art] Signing Cert with AUTHO
11,718,738 UART: RITY.KEYID = 7
11,734,092 UART: [art] Erasing AUTHORITY.KEYID = 7
11,734,857 UART: [art] PUB.X = C73391457B18746856DB7E01DA05C0FFD619BB01A26C4A0E2493F99862B2CC412E5007B65D59D58524DD65B5E81E4FBE
11,741,616 UART: [art] PUB.Y = BB42A16EE72C9EB83C699518E9DFC585BAB1FCC85AC100AD3DBA0554A4F36385A17C67A281B001E851159F30AD889630
11,748,548 UART: [art] SIG.R = 0B9E6385118953B38E207268AC974005C2A76D28B68453BE878882C10984F15F035816EC9C51438875A874CC1AFE2707
11,755,289 UART: [art] SIG.S = EDEF3705E99976CC218111FC0584095C17F83FD47FF5E72EBF6F3E75A94655E8A00531D9FC68C02BBAE5FD251D70EFDA
11,778,732 UART: mbox::rt_entry...
11,779,104 UART: ____ _ _ _ ____ _____
11,779,888 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,780,688 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,781,456 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,782,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,782,992 UART: |_|
11,783,304 UART:
12,065,012 UART: [rt] Runtime listening for mailbox commands...
12,066,208 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.52s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,283,736 UART: [fwproc] Recv'd Img size: 78532 bytes
2,171,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,890 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,194 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,310,281 >>> mbox cmd response: success
2,310,281 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,311,371 UART: [afmc] ++
2,311,539 UART: [afmc] CDI.KEYID = 6
2,311,901 UART: [afmc] SUBJECT.KEYID = 7
2,312,326 UART: [afmc] AUTHORITY.KEYID = 5
2,347,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,508 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,236 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,121 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,840 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,640 UART: [afmc] --
2,390,686 UART: [cold-reset] --
2,391,546 UART: [state] Locking Datavault
2,392,741 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,345 UART: [state] Locking ICCM
2,393,967 UART: [exit] Launching FMC @ 0x40000130
2,399,296 UART:
2,399,312 UART: Running Caliptra FMC ...
2,399,720 UART:
2,399,774 UART: [state] CFI Enabled
2,410,233 UART: [fht] FMC Alias Private Key: 7
2,518,258 UART: [art] Extend RT PCRs Done
2,518,686 UART: [art] Lock RT PCRs Done
2,520,096 UART: [art] Populate DV Done
2,528,373 UART: [fht] FMC Alias Private Key: 7
2,529,483 UART: [art] Derive CDI
2,529,763 UART: [art] Store in in slot 0x4
2,615,684 UART: [art] Derive Key Pair
2,616,044 UART: [art] Store priv key in slot 0x5
2,629,544 UART: [art] Derive Key Pair - Done
2,644,677 UART: [art] Signing Cert with AUTHO
2,645,157 UART: RITY.KEYID = 7
2,660,607 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,372 UART: [art] PUB.X = 96B38F87D429B7B0CE3DD3789D0917A8397BE4AAC97063E53DA737D448392869E50D4E6144C7BD9F8BEEFE7295BDBB09
2,668,143 UART: [art] PUB.Y = 494A78A079459760DEFE11130C1DBE6CF1A5317A96FE04FA6D2A3E3E57039D939C8C4585B569CAB7D44FF63539A0B79F
2,675,092 UART: [art] SIG.R = A15D45A3989200E975026D791FA9EE6063E298DF30CA411B119C0FD995204FAA9021C133C04ACDB252E6CD305DBFCD71
2,681,842 UART: [art] SIG.S = 91C1339F313FA4D7988FA28152F1CFA2F2D3D6AB87F7A77821951229319C7600DFF92D5904C280A6E58C197E0D9F7154
2,705,479 UART: mbox::rt_entry...
2,705,851 UART: ____ _ _ _ ____ _____
2,706,635 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,435 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,203 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,739 UART: |_|
2,710,051 UART:
2,817,238 UART: [rt] Runtime listening for mailbox commands...
2,818,425 >>> mbox cmd response data (48 bytes)
2,818,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,818,537 UART:
2,818,553 UART: Running Caliptra ROM ...
2,818,961 UART:
2,819,016 UART: [state] CFI Enabled
2,822,076 UART: [state] LifecycleState = Unprovisioned
2,822,731 UART: [state] DebugLocked = No
2,823,459 UART: [state] WD Timer not started. Device not locked for debugging
2,824,641 UART: [kat] SHA2-256
3,630,291 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,416 UART: [kat] ++
3,634,568 UART: [kat] sha1
3,638,808 UART: [kat] SHA2-256
3,640,748 UART: [kat] SHA2-384
3,643,579 UART: [kat] SHA2-512-ACC
3,645,479 UART: [kat] ECC-384
3,654,850 UART: [kat] HMAC-384Kdf
3,659,598 UART: [kat] LMS
3,907,926 UART: [kat] --
3,908,890 UART: [update-reset] ++
5,220,724 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,221,753 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,371,331 >>> mbox cmd response: success
5,371,331 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,371,462 UART: [update-reset] Copying MAN_2 To MAN_1
5,379,476 UART: [update-reset Success] --
5,380,239 UART: [state] Locking Datavault
5,380,813 UART: [state] Locking PCR0, PCR1 and PCR31
5,381,417 UART: [state] Locking ICCM
5,382,053 UART: [exit] Launching FMC @ 0x40000130
5,387,382 UART:
5,387,398 UART: Running Caliptra FMC ...
5,387,806 UART:
5,387,860 UART: [state] CFI Enabled
5,476,949 UART: [art] Extend RT PCRs Done
5,477,377 UART: [art] Lock RT PCRs Done
5,478,718 UART: [art] Populate DV Done
5,486,975 UART: [fht] FMC Alias Private Key: 7
5,487,983 UART: [art] Derive CDI
5,488,263 UART: [art] Store in in slot 0x4
5,574,366 UART: [art] Derive Key Pair
5,574,726 UART: [art] Store priv key in slot 0x5
5,588,148 UART: [art] Derive Key Pair - Done
5,602,816 UART: [art] Signing Cert with AUTHO
5,603,296 UART: RITY.KEYID = 7
5,618,668 UART: [art] Erasing AUTHORITY.KEYID = 7
5,619,433 UART: [art] PUB.X = 2F69EA644F8A3AA7F1A053593655612B5FE7D9E6651D78D57302643F2662D8116C84CD50ABF7D80483B74586A4B0E334
5,626,193 UART: [art] PUB.Y = 72B6BE60CDEAAAE1EF05FAE787337709A2C4D177AF70C03CA6AF6617312BA37FDF9214368C28BDCF55206D48618221EE
5,633,151 UART: [art] SIG.R = CDCC6B8911CC557B66171B5091C2EA98292E3694505336BAFA559D06FCDBBC0FBAF60EFBA7AEDAFEAD9A146D627672F5
5,639,936 UART: [art] SIG.S = DDBA74DE8268119DC44DDE3C815DDAFD4CCFF172D003CEC28DFE92F07D8030C2ACB6B735AE7D357F106228BB65AFB792
5,664,636 UART: Caliptra RT
5,664,889 UART: [state] CFI Enabled
5,943,889 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,213 UART: [rt]cmd =0x4d454153, len=108
5,996,154 >>> mbox cmd response data (12 bytes)
5,996,155 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,806 UART:
5,996,822 UART: Running Caliptra ROM ...
5,997,230 UART:
5,997,285 UART: [state] CFI Enabled
5,999,971 UART: [state] LifecycleState = Unprovisioned
6,000,626 UART: [state] DebugLocked = No
6,001,350 UART: [state] WD Timer not started. Device not locked for debugging
6,002,648 UART: [kat] SHA2-256
6,808,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,812,423 UART: [kat] ++
6,812,575 UART: [kat] sha1
6,816,903 UART: [kat] SHA2-256
6,818,843 UART: [kat] SHA2-384
6,821,634 UART: [kat] SHA2-512-ACC
6,823,534 UART: [kat] ECC-384
6,832,895 UART: [kat] HMAC-384Kdf
6,837,553 UART: [kat] LMS
7,085,881 UART: [kat] --
7,086,825 UART: [update-reset] ++
7,989,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,990,336 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,086,460 >>> mbox cmd response: success
8,086,460 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,086,761 UART: [update-reset] Copying MAN_2 To MAN_1
8,094,775 UART: [update-reset Success] --
8,095,760 UART: [state] Locking Datavault
8,096,434 UART: [state] Locking PCR0, PCR1 and PCR31
8,097,038 UART: [state] Locking ICCM
8,097,484 UART: [exit] Launching FMC @ 0x40000130
8,102,813 UART:
8,102,829 UART: Running Caliptra FMC ...
8,103,237 UART:
8,103,291 UART: [state] CFI Enabled
8,192,558 UART: [art] Extend RT PCRs Done
8,192,986 UART: [art] Lock RT PCRs Done
8,194,153 UART: [art] Populate DV Done
8,202,428 UART: [fht] FMC Alias Private Key: 7
8,203,602 UART: [art] Derive CDI
8,203,882 UART: [art] Store in in slot 0x4
8,289,329 UART: [art] Derive Key Pair
8,289,689 UART: [art] Store priv key in slot 0x5
8,302,599 UART: [art] Derive Key Pair - Done
8,317,324 UART: [art] Signing Cert with AUTHO
8,317,804 UART: RITY.KEYID = 7
8,333,348 UART: [art] Erasing AUTHORITY.KEYID = 7
8,334,113 UART: [art] PUB.X = 62560410942819AFBE84DDC59F940C45AC92AE3635D921CFE12B80BDA6A19DC4B8EB4AB6963C05C43B384B7942E0B19F
8,340,884 UART: [art] PUB.Y = 8E4C77E0876DC83E709F6BC427D2921300A578C3805B17D6C95C1EE6C49D48D67A5F8F48DBF238142CCBCC110876EAF4
8,347,817 UART: [art] SIG.R = 4762015C14346C8C1C882242E5243997A46971787BF9464904A33A0BE2B1CF6A479E24CBB65BE2E685A111BC206C81DF
8,354,574 UART: [art] SIG.S = 99A6801825836CA5CA3D8E677BA0EC0DFEAF861391445202ABF0457B2FF5962C832A94C89A73FD258590BED701331789
8,378,516 UART: mbox::rt_entry...
8,378,888 UART: ____ _ _ _ ____ _____
8,379,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,380,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,381,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,382,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,382,776 UART: |_|
8,383,088 UART:
8,665,760 UART: [rt] Runtime listening for mailbox commands...
8,666,724 UART:
8,666,740 UART: Running Caliptra ROM ...
8,667,148 UART:
8,667,203 UART: [state] CFI Enabled
8,669,791 UART: [state] LifecycleState = Unprovisioned
8,670,446 UART: [state] DebugLocked = No
8,671,006 UART: [state] WD Timer not started. Device not locked for debugging
8,672,346 UART: [kat] SHA2-256
9,477,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,482,121 UART: [kat] ++
9,482,273 UART: [kat] sha1
9,486,569 UART: [kat] SHA2-256
9,488,509 UART: [kat] SHA2-384
9,491,354 UART: [kat] SHA2-512-ACC
9,493,254 UART: [kat] ECC-384
9,502,793 UART: [kat] HMAC-384Kdf
9,507,333 UART: [kat] LMS
9,755,661 UART: [kat] --
9,756,631 UART: [update-reset] ++
10,656,901 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,658,096 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
10,754,220 >>> mbox cmd response: success
10,754,220 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,754,461 UART: [update-reset] Copying MAN_2 To MAN_1
10,762,475 UART: [update-reset Success] --
10,763,570 UART: [state] Locking Datavault
10,764,472 UART: [state] Locking PCR0, PCR1 and PCR31
10,765,076 UART: [state] Locking ICCM
10,765,650 UART: [exit] Launching FMC @ 0x40000130
10,770,979 UART:
10,770,995 UART: Running Caliptra FMC ...
10,771,403 UART:
10,771,457 UART: [state] CFI Enabled
10,860,378 UART: [art] Extend RT PCRs Done
10,860,806 UART: [art] Lock RT PCRs Done
10,862,079 UART: [art] Populate DV Done
10,870,336 UART: [fht] FMC Alias Private Key: 7
10,871,422 UART: [art] Derive CDI
10,871,702 UART: [art] Store in in slot 0x4
10,957,553 UART: [art] Derive Key Pair
10,957,913 UART: [art] Store priv key in slot 0x5
10,971,059 UART: [art] Derive Key Pair - Done
10,985,791 UART: [art] Signing Cert with AUTHO
10,986,271 UART: RITY.KEYID = 7
11,001,397 UART: [art] Erasing AUTHORITY.KEYID = 7
11,002,162 UART: [art] PUB.X = 900938544704EB538320C52627EB18E21F9CFFE1D2AEBB2A51C74221DDA007ABAE6DE52621C179C3F243AE98DAED6C03
11,008,932 UART: [art] PUB.Y = 6606E0EC91382E47F2F737C49CDF3B7770362122E1AB79BE06BE643B753DFFF4442D9B3147309636FEBF7FE3A77B4919
11,015,880 UART: [art] SIG.R = E9F7977CA611B992FC3CE74DD0046690A1C85AE4DB6134BA05DAFEA5F798F433BE1C1509C423618144BA947D034FD909
11,022,643 UART: [art] SIG.S = 55BD3EFB09C22E7B64AB4567328B0E777FCE01275A1E00691DD508CD59367254E07A90C850AAA4D1ACE0ED8E8B8DD13C
11,046,414 UART: mbox::rt_entry...
11,046,786 UART: ____ _ _ _ ____ _____
11,047,570 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,048,370 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,049,138 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,049,906 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,050,674 UART: |_|
11,050,986 UART:
11,327,770 UART: [rt] Runtime listening for mailbox commands...
11,328,966 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,281 ready_for_fw is high
1,060,281 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,161,920 >>> mbox cmd response: success
2,161,920 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,223,918 UART:
2,223,934 UART: Running Caliptra FMC ...
2,224,342 UART:
2,224,396 UART: [state] CFI Enabled
2,234,577 UART: [fht] FMC Alias Private Key: 7
2,342,452 UART: [art] Extend RT PCRs Done
2,342,880 UART: [art] Lock RT PCRs Done
2,344,418 UART: [art] Populate DV Done
2,352,731 UART: [fht] FMC Alias Private Key: 7
2,353,883 UART: [art] Derive CDI
2,354,163 UART: [art] Store in in slot 0x4
2,439,706 UART: [art] Derive Key Pair
2,440,066 UART: [art] Store priv key in slot 0x5
2,453,596 UART: [art] Derive Key Pair - Done
2,468,404 UART: [art] Signing Cert with AUTHO
2,468,884 UART: RITY.KEYID = 7
2,483,904 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,669 UART: [art] PUB.X = 79CC59F87791EB7BEEA85947FF228204B1A76E3FB8D762B033934AA7B1F68D435AA22A3A38DC3B21BDE1DFE4589E7CE8
2,491,452 UART: [art] PUB.Y = 091F5A310EDAF5C94687DA7DEABCCEA217EE26752F255755293985E40B864EA0C011A16ABB10B8DA58F2E5E1E1B19985
2,498,405 UART: [art] SIG.R = E4AECCED02E07F8DA862755E551C7034FA1AF789342D2EA7C392B7A31B11393A8141C67A1E519E811BF45AEFC3DA6EB7
2,505,188 UART: [art] SIG.S = 5D33403F1CA91C076F44225C971E93D5E85BE8D2C3112FBC0702AFCA9BF34EEC38ED84B956D9B96999CA027564F2249D
2,529,019 UART: mbox::rt_entry...
2,529,391 UART: ____ _ _ _ ____ _____
2,530,175 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,743 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,279 UART: |_|
2,533,591 UART:
2,639,055 UART: [rt] Runtime listening for mailbox commands...
2,640,242 >>> mbox cmd response data (48 bytes)
2,640,243 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,076,597 >>> mbox cmd response: success
5,076,597 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,090,113 UART:
5,090,129 UART: Running Caliptra FMC ...
5,090,537 UART:
5,090,591 UART: [state] CFI Enabled
5,179,776 UART: [art] Extend RT PCRs Done
5,180,204 UART: [art] Lock RT PCRs Done
5,181,445 UART: [art] Populate DV Done
5,189,322 UART: [fht] FMC Alias Private Key: 7
5,190,348 UART: [art] Derive CDI
5,190,628 UART: [art] Store in in slot 0x4
5,276,531 UART: [art] Derive Key Pair
5,276,891 UART: [art] Store priv key in slot 0x5
5,289,695 UART: [art] Derive Key Pair - Done
5,304,577 UART: [art] Signing Cert with AUTHO
5,305,057 UART: RITY.KEYID = 7
5,320,417 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,182 UART: [art] PUB.X = E7E6DFB66AA708405D8F2313FD4D4E774D43D6546D3EB5F8CB83121F234208E4323ADEB711A0D1285E8AF58AB0898E51
5,327,954 UART: [art] PUB.Y = 7C0E4CACB397B9E422E9C763CA4C79FCD2F3072BEC6B9D74E09B73F3B3C78D7CB040515CEB3868B4632A6CB63BB02BC2
5,334,918 UART: [art] SIG.R = 8D25232298803B00B793E7071BEE255DCF234C3CE601C56DFC1851A6EC6A78F2884E40C007598C8FC56BC01656228476
5,341,653 UART: [art] SIG.S = 45D30CA0B4BEE77B9DE4F80B846F3BE96BA6011CB646A39CE9286F444AC610FD66500D96EE26B618EC6D98DF655CCD94
5,366,018 UART: Caliptra RT
5,366,271 UART: [state] CFI Enabled
5,646,420 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,677,392 UART: [rt]cmd =0x4d454153, len=108
5,697,771 >>> mbox cmd response data (12 bytes)
5,697,772 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,672,384 >>> mbox cmd response: success
7,672,384 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,685,786 UART:
7,685,802 UART: Running Caliptra FMC ...
7,686,210 UART:
7,686,264 UART: [state] CFI Enabled
7,775,305 UART: [art] Extend RT PCRs Done
7,775,733 UART: [art] Lock RT PCRs Done
7,776,938 UART: [art] Populate DV Done
7,785,041 UART: [fht] FMC Alias Private Key: 7
7,786,047 UART: [art] Derive CDI
7,786,327 UART: [art] Store in in slot 0x4
7,872,044 UART: [art] Derive Key Pair
7,872,404 UART: [art] Store priv key in slot 0x5
7,885,720 UART: [art] Derive Key Pair - Done
7,900,522 UART: [art] Signing Cert with AUTHO
7,901,002 UART: RITY.KEYID = 7
7,915,778 UART: [art] Erasing AUTHORITY.KEYID = 7
7,916,543 UART: [art] PUB.X = 2B16718A6F023DB734233824BF18402EC482C0E29644DC2C16D0CD38B9B5EFABB9F899649186E2775DF5CDC4719F3343
7,923,312 UART: [art] PUB.Y = 08455633B436BEF7750322DD31F1A2E6E92101DC4C21C65D201AB347C17CD43A0D7B292FE55894A6EFE99811C83F9323
7,930,250 UART: [art] SIG.R = EB6BA61E0A77F3560F7EF29A7B4CD818C8E13CB207896491B5A17CE136CAA7A37EC1FF2E09C34A16B4435ADB89D107F0
7,937,021 UART: [art] SIG.S = 40A18D5FCF26ECED489C15C50D3D4C6DA46E1207F083902A81B3EF177E4DACAB78C31D918DE58F921B4930C6CC618ED0
7,960,644 UART: mbox::rt_entry...
7,961,016 UART: ____ _ _ _ ____ _____
7,961,800 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,962,600 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,963,368 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,964,136 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,964,904 UART: |_|
7,965,216 UART:
8,242,398 UART: [rt] Runtime listening for mailbox commands...
10,217,155 >>> mbox cmd response: success
10,217,155 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,230,177 UART:
10,230,193 UART: Running Caliptra FMC ...
10,230,601 UART:
10,230,655 UART: [state] CFI Enabled
10,319,604 UART: [art] Extend RT PCRs Done
10,320,032 UART: [art] Lock RT PCRs Done
10,321,287 UART: [art] Populate DV Done
10,329,586 UART: [fht] FMC Alias Private Key: 7
10,330,722 UART: [art] Derive CDI
10,331,002 UART: [art] Store in in slot 0x4
10,416,431 UART: [art] Derive Key Pair
10,416,791 UART: [art] Store priv key in slot 0x5
10,430,385 UART: [art] Derive Key Pair - Done
10,445,325 UART: [art] Signing Cert with AUTHO
10,445,805 UART: RITY.KEYID = 7
10,460,771 UART: [art] Erasing AUTHORITY.KEYID = 7
10,461,536 UART: [art] PUB.X = 4E99822DDD94F4FF88D75DF819E200FF15F030E031409ED2CA32853D9705E2EAAAAB55133FC12A906BAB11FFE4E99F59
10,468,295 UART: [art] PUB.Y = E69A81C2C00A650BBF0316CE87B4FA144E2D83D91F97BD69029C0F7D7815AA8DDFFD54568755F709A45022DC1DC0883B
10,475,237 UART: [art] SIG.R = 4848950505FE8B3329718B4B3784697D67CEE2B174F9B0D70269E41C4EE479A11BFF2104952CD9F86927B486A7B05585
10,481,987 UART: [art] SIG.S = 00C5CD0D5C59ED7140E834547A5EDC6E7468576088077548D91747D35CF8FE38B1D625D5F4B7613A97312F0791F7E2B2
10,505,661 UART: mbox::rt_entry...
10,506,033 UART: ____ _ _ _ ____ _____
10,506,817 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,507,617 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,508,385 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,509,153 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,509,921 UART: |_|
10,510,233 UART:
10,790,768 UART: [rt] Runtime listening for mailbox commands...
10,791,964 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.32s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,284,349 UART: [fwproc] Recv'd Img size: 78532 bytes
2,171,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,851 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,310,906 >>> mbox cmd response: success
2,310,906 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,311,950 UART: [afmc] ++
2,312,118 UART: [afmc] CDI.KEYID = 6
2,312,480 UART: [afmc] SUBJECT.KEYID = 7
2,312,905 UART: [afmc] AUTHORITY.KEYID = 5
2,348,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,881 UART: [afmc] --
2,391,835 UART: [cold-reset] --
2,392,585 UART: [state] Locking Datavault
2,393,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,534 UART: [state] Locking ICCM
2,395,110 UART: [exit] Launching FMC @ 0x40000130
2,400,439 UART:
2,400,455 UART: Running Caliptra FMC ...
2,400,863 UART:
2,401,006 UART: [state] CFI Enabled
2,411,599 UART: [fht] FMC Alias Private Key: 7
2,519,038 UART: [art] Extend RT PCRs Done
2,519,466 UART: [art] Lock RT PCRs Done
2,521,188 UART: [art] Populate DV Done
2,529,233 UART: [fht] FMC Alias Private Key: 7
2,530,261 UART: [art] Derive CDI
2,530,541 UART: [art] Store in in slot 0x4
2,616,314 UART: [art] Derive Key Pair
2,616,674 UART: [art] Store priv key in slot 0x5
2,629,610 UART: [art] Derive Key Pair - Done
2,644,402 UART: [art] Signing Cert with AUTHO
2,644,882 UART: RITY.KEYID = 7
2,660,362 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,127 UART: [art] PUB.X = A340B3A888F8A13C01700575E9400580E82B64D0B2F011F5AEAFE202AAB7FD57001CBEB68A6CEA067B0678E9B9374251
2,667,863 UART: [art] PUB.Y = 4BD00071E50400447C21904B3BABF46ED8B9EEAF8FD66143520E26BE500999712A1218C5C0704714C2444E8FAE070219
2,674,750 UART: [art] SIG.R = 27DD27EB78D7445BF502C6332C2D6FFFF20D7982C7756EC2ACF43C6B7B9A0C8690C5996B408D778D0784B934AF5A8096
2,681,514 UART: [art] SIG.S = 6A91AF40FB374D191BACAA1223A85237E72D028A1AAA8697F2463C09FBD4213B1F807336B0B0F9E742E970A8362E71F7
2,705,133 UART: mbox::rt_entry...
2,705,505 UART: ____ _ _ _ ____ _____
2,706,289 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,089 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,857 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,625 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,393 UART: |_|
2,709,705 UART:
2,815,273 UART: [rt] Runtime listening for mailbox commands...
2,816,460 >>> mbox cmd response data (48 bytes)
2,816,461 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,816,572 UART:
2,816,588 UART: Running Caliptra ROM ...
2,816,996 UART:
2,817,138 UART: [state] CFI Enabled
2,820,196 UART: [state] LifecycleState = Unprovisioned
2,820,851 UART: [state] DebugLocked = No
2,821,545 UART: [state] WD Timer not started. Device not locked for debugging
2,822,663 UART: [kat] SHA2-256
3,628,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,632,438 UART: [kat] ++
3,632,590 UART: [kat] sha1
3,636,646 UART: [kat] SHA2-256
3,638,586 UART: [kat] SHA2-384
3,641,417 UART: [kat] SHA2-512-ACC
3,643,317 UART: [kat] ECC-384
3,653,086 UART: [kat] HMAC-384Kdf
3,657,856 UART: [kat] LMS
3,906,184 UART: [kat] --
3,907,032 UART: [update-reset] ++
5,218,178 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,149 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,368,727 >>> mbox cmd response: success
5,368,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,369,008 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,022 UART: [update-reset Success] --
5,377,971 UART: [state] Locking Datavault
5,378,731 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,335 UART: [state] Locking ICCM
5,379,963 UART: [exit] Launching FMC @ 0x40000130
5,385,292 UART:
5,385,308 UART: Running Caliptra FMC ...
5,385,716 UART:
5,385,859 UART: [state] CFI Enabled
5,474,534 UART: [art] Extend RT PCRs Done
5,474,962 UART: [art] Lock RT PCRs Done
5,476,613 UART: [art] Populate DV Done
5,484,922 UART: [fht] FMC Alias Private Key: 7
5,485,970 UART: [art] Derive CDI
5,486,250 UART: [art] Store in in slot 0x4
5,571,705 UART: [art] Derive Key Pair
5,572,065 UART: [art] Store priv key in slot 0x5
5,585,741 UART: [art] Derive Key Pair - Done
5,600,872 UART: [art] Signing Cert with AUTHO
5,601,352 UART: RITY.KEYID = 7
5,616,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,305 UART: [art] PUB.X = CB26EF2AB26AA5FFD4559F079492CB30DD4E4EA03EEDE12ED375057CD5C368757FB67EA2E4DF199BAA2834ACEF9C55F3
5,624,095 UART: [art] PUB.Y = EC6F95FAC7F27EBFFC1A632760579DEDF7731B8B3940F6B524F869C68FE81DB0BC930F576F819327B6F1D0D45771DDBA
5,631,058 UART: [art] SIG.R = FA5549E98E5DB647284A9E56A121AE8862974221E07D3D50AB8F02FA5F4FD224759655C0C6871AA4889F356708F7DDC7
5,637,822 UART: [art] SIG.S = 7ADEDEBF038062A42793F0F77153949DA14CA5F1D65FC9DAA279EA46ABDD2499129729F4CD03766AB7706A4569545C4F
5,661,219 UART: Caliptra RT
5,661,564 UART: [state] CFI Enabled
5,946,341 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,977,623 UART: [rt]cmd =0x4d454153, len=108
5,998,346 >>> mbox cmd response data (12 bytes)
5,998,347 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,999,168 UART:
5,999,184 UART: Running Caliptra ROM ...
5,999,592 UART:
5,999,734 UART: [state] CFI Enabled
6,002,950 UART: [state] LifecycleState = Unprovisioned
6,003,605 UART: [state] DebugLocked = No
6,004,131 UART: [state] WD Timer not started. Device not locked for debugging
6,005,469 UART: [kat] SHA2-256
6,811,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,815,244 UART: [kat] ++
6,815,396 UART: [kat] sha1
6,819,494 UART: [kat] SHA2-256
6,821,434 UART: [kat] SHA2-384
6,824,083 UART: [kat] SHA2-512-ACC
6,825,983 UART: [kat] ECC-384
6,835,894 UART: [kat] HMAC-384Kdf
6,840,700 UART: [kat] LMS
7,089,028 UART: [kat] --
7,090,118 UART: [update-reset] ++
7,992,254 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,993,225 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,089,349 >>> mbox cmd response: success
8,089,349 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,089,464 UART: [update-reset] Copying MAN_2 To MAN_1
8,097,478 UART: [update-reset Success] --
8,098,181 UART: [state] Locking Datavault
8,099,007 UART: [state] Locking PCR0, PCR1 and PCR31
8,099,611 UART: [state] Locking ICCM
8,100,209 UART: [exit] Launching FMC @ 0x40000130
8,105,538 UART:
8,105,554 UART: Running Caliptra FMC ...
8,105,962 UART:
8,106,105 UART: [state] CFI Enabled
8,195,206 UART: [art] Extend RT PCRs Done
8,195,634 UART: [art] Lock RT PCRs Done
8,197,183 UART: [art] Populate DV Done
8,205,422 UART: [fht] FMC Alias Private Key: 7
8,206,604 UART: [art] Derive CDI
8,206,884 UART: [art] Store in in slot 0x4
8,292,123 UART: [art] Derive Key Pair
8,292,483 UART: [art] Store priv key in slot 0x5
8,305,631 UART: [art] Derive Key Pair - Done
8,320,473 UART: [art] Signing Cert with AUTHO
8,320,953 UART: RITY.KEYID = 7
8,336,697 UART: [art] Erasing AUTHORITY.KEYID = 7
8,337,462 UART: [art] PUB.X = D831FE5C67A9A60FD462158681BB57F3DBACDDBB94CD6BB0B92D28C6A54E74E524CFF2199BB079DBC61C8F671476172D
8,344,247 UART: [art] PUB.Y = 0ABDCE9DBB630881D2C11D3E0BA394C74E15B1D0A56B2BBA62DFC27A59132B2FBB33F1C572305A57B896D528DF2602A0
8,351,201 UART: [art] SIG.R = 5114723CC2B705C8EBB0380156AD4A5FBE96D973A9DAD97135A3F15F4592FC4C4C56F0F21A06BE056A1C86EC8ADEFEF6
8,357,977 UART: [art] SIG.S = E2B318B8450FA37F777B8C907CBC187AA1939FE84EDF8AE8FEF32DAF3AA1925B54D8C323CA697AEA8ACCA38230FEE0F0
8,381,647 UART: mbox::rt_entry...
8,382,019 UART: ____ _ _ _ ____ _____
8,382,803 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,383,603 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,384,371 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,385,139 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,385,907 UART: |_|
8,386,219 UART:
8,669,439 UART: [rt] Runtime listening for mailbox commands...
8,670,403 UART:
8,670,419 UART: Running Caliptra ROM ...
8,670,827 UART:
8,670,969 UART: [state] CFI Enabled
8,673,621 UART: [state] LifecycleState = Unprovisioned
8,674,276 UART: [state] DebugLocked = No
8,674,782 UART: [state] WD Timer not started. Device not locked for debugging
8,675,914 UART: [kat] SHA2-256
9,481,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,485,689 UART: [kat] ++
9,485,841 UART: [kat] sha1
9,490,069 UART: [kat] SHA2-256
9,492,009 UART: [kat] SHA2-384
9,494,864 UART: [kat] SHA2-512-ACC
9,496,764 UART: [kat] ECC-384
9,506,549 UART: [kat] HMAC-384Kdf
9,511,091 UART: [kat] LMS
9,759,419 UART: [kat] --
9,760,299 UART: [update-reset] ++
10,661,497 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,662,584 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
10,758,708 >>> mbox cmd response: success
10,758,708 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,759,037 UART: [update-reset] Copying MAN_2 To MAN_1
10,767,051 UART: [update-reset Success] --
10,767,992 UART: [state] Locking Datavault
10,768,820 UART: [state] Locking PCR0, PCR1 and PCR31
10,769,424 UART: [state] Locking ICCM
10,769,934 UART: [exit] Launching FMC @ 0x40000130
10,775,263 UART:
10,775,279 UART: Running Caliptra FMC ...
10,775,687 UART:
10,775,830 UART: [state] CFI Enabled
10,865,055 UART: [art] Extend RT PCRs Done
10,865,483 UART: [art] Lock RT PCRs Done
10,866,646 UART: [art] Populate DV Done
10,874,773 UART: [fht] FMC Alias Private Key: 7
10,875,805 UART: [art] Derive CDI
10,876,085 UART: [art] Store in in slot 0x4
10,961,662 UART: [art] Derive Key Pair
10,962,022 UART: [art] Store priv key in slot 0x5
10,975,878 UART: [art] Derive Key Pair - Done
10,990,531 UART: [art] Signing Cert with AUTHO
10,991,011 UART: RITY.KEYID = 7
11,006,655 UART: [art] Erasing AUTHORITY.KEYID = 7
11,007,420 UART: [art] PUB.X = 191D0F19C5C87A7635679D9AF4A0AB2404FE4065564975E343F9F09C7666AEF5B786776C483F83694652DFCBA32E0EF4
11,014,181 UART: [art] PUB.Y = D3CB3D39DEBFE89015631A9DD367D2696C61A6093CF85B40CEC715F11F95733D2A539FD71167BD22ACCA2A9A70589755
11,021,136 UART: [art] SIG.R = 04065475E2423E5C80C8045C28957FD084F2121EF6BE6D6FA2B450C53EEF87AFC659C4ABBF34DE0305E5C4EA167D6C22
11,027,901 UART: [art] SIG.S = 6652028BF964237C8C7BA2ED6C3F455410D1D8AD60C85E9AA94647BDA394F7008938A026792330894EF357D17B4C9351
11,051,661 UART: mbox::rt_entry...
11,052,033 UART: ____ _ _ _ ____ _____
11,052,817 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,053,617 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,054,385 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,055,153 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,055,921 UART: |_|
11,056,233 UART:
11,340,339 UART: [rt] Runtime listening for mailbox commands...
11,341,535 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,030 ready_for_fw is high
1,061,030 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,163,451 >>> mbox cmd response: success
2,163,451 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,225,703 UART:
2,225,719 UART: Running Caliptra FMC ...
2,226,127 UART:
2,226,270 UART: [state] CFI Enabled
2,236,709 UART: [fht] FMC Alias Private Key: 7
2,344,896 UART: [art] Extend RT PCRs Done
2,345,324 UART: [art] Lock RT PCRs Done
2,346,782 UART: [art] Populate DV Done
2,355,055 UART: [fht] FMC Alias Private Key: 7
2,356,051 UART: [art] Derive CDI
2,356,331 UART: [art] Store in in slot 0x4
2,441,844 UART: [art] Derive Key Pair
2,442,204 UART: [art] Store priv key in slot 0x5
2,455,474 UART: [art] Derive Key Pair - Done
2,470,252 UART: [art] Signing Cert with AUTHO
2,470,732 UART: RITY.KEYID = 7
2,485,740 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,505 UART: [art] PUB.X = E488128426A735F1D43D4F86595CB4E5C8CE47F5998C5F202B497CF2841E76D0FA5E0D960B278876702308A45BE37A59
2,493,262 UART: [art] PUB.Y = D10F3E9DA8D569F73D1EA3FCE754A152FB052E3D0B1D37F9A98E1D54F50BD6E798531C06B03983E76265A163C4E8C55B
2,500,207 UART: [art] SIG.R = 89108135D8240CD533C85097402B3EAE22FD68F60722F9CA1FADDE6B68473BDE22057D6E9A5858376512438C9E11718D
2,506,964 UART: [art] SIG.S = 81E88274F9564A9C81FFEE4650862804C7BA8A830B91EABE46896DAC060835E284DEDC311780188BD2E858811072CEB2
2,529,987 UART: mbox::rt_entry...
2,530,359 UART: ____ _ _ _ ____ _____
2,531,143 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,943 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,711 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,479 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,247 UART: |_|
2,534,559 UART:
2,641,046 UART: [rt] Runtime listening for mailbox commands...
2,642,233 >>> mbox cmd response data (48 bytes)
2,642,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,077,555 >>> mbox cmd response: success
5,077,555 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,090,709 UART:
5,090,725 UART: Running Caliptra FMC ...
5,091,133 UART:
5,091,276 UART: [state] CFI Enabled
5,180,351 UART: [art] Extend RT PCRs Done
5,180,779 UART: [art] Lock RT PCRs Done
5,181,920 UART: [art] Populate DV Done
5,190,103 UART: [fht] FMC Alias Private Key: 7
5,191,149 UART: [art] Derive CDI
5,191,429 UART: [art] Store in in slot 0x4
5,277,354 UART: [art] Derive Key Pair
5,277,714 UART: [art] Store priv key in slot 0x5
5,290,888 UART: [art] Derive Key Pair - Done
5,305,751 UART: [art] Signing Cert with AUTHO
5,306,231 UART: RITY.KEYID = 7
5,321,589 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,354 UART: [art] PUB.X = 3646CF3474E884CC860F721D4F3BDA54527AB5272359E496E9C1890269FADBFE840ABE9C719801A548197778E5EA2672
5,329,110 UART: [art] PUB.Y = 010FA0C071108F4427DA2B39D823802C44274DADFA2CA8F2A5500FBA62B5F702CCDB679B8F2C125EF9AE3A7651824B9A
5,336,060 UART: [art] SIG.R = 31C0C00BEC8C28418AF1184E3D272F1EE13B2F612594711503E24FE2F71027E9A423BEA5DC60DB042D8B9427417E2692
5,342,821 UART: [art] SIG.S = 20936F5C0A8034F89FBCF118A6B044AC6087C593D767163084A7C63532671B55E0A1678D1390F1C8593CCCF181F69E20
5,366,495 UART: Caliptra RT
5,366,840 UART: [state] CFI Enabled
5,650,923 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,681,957 UART: [rt]cmd =0x4d454153, len=108
5,702,500 >>> mbox cmd response data (12 bytes)
5,702,501 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,675,910 >>> mbox cmd response: success
7,675,910 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,689,126 UART:
7,689,142 UART: Running Caliptra FMC ...
7,689,550 UART:
7,689,693 UART: [state] CFI Enabled
7,779,248 UART: [art] Extend RT PCRs Done
7,779,676 UART: [art] Lock RT PCRs Done
7,780,699 UART: [art] Populate DV Done
7,789,098 UART: [fht] FMC Alias Private Key: 7
7,790,070 UART: [art] Derive CDI
7,790,350 UART: [art] Store in in slot 0x4
7,876,345 UART: [art] Derive Key Pair
7,876,705 UART: [art] Store priv key in slot 0x5
7,889,379 UART: [art] Derive Key Pair - Done
7,904,338 UART: [art] Signing Cert with AUTHO
7,904,818 UART: RITY.KEYID = 7
7,919,832 UART: [art] Erasing AUTHORITY.KEYID = 7
7,920,597 UART: [art] PUB.X = 360FCDC71C4541965895DDC80175B92A7A041DC156F81D3E075772D7AA7D2BC872BD4287CCAB8DE4E65E07E1FC5BA942
7,927,364 UART: [art] PUB.Y = EED3F43653B275E9EC0D17F0FE5023C5BFFC7852FCCF90448DA873E4801BE8B8CA91F938E6EB250B68F783ED05BECE9C
7,934,327 UART: [art] SIG.R = BC6A17B1D92488763734BE3BA27963B09EED4D5692A4AE98816E58D189A14A98F722A3891A02F45644617C7E95F7F734
7,941,090 UART: [art] SIG.S = 5739439F6D049D33FD320A5600DB09B8BC633C020BC5040D6A0C0438056F39A582C84704CA4B45816A3E412F77499DF3
7,964,450 UART: mbox::rt_entry...
7,964,822 UART: ____ _ _ _ ____ _____
7,965,606 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,966,406 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,967,174 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,967,942 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,968,710 UART: |_|
7,969,022 UART:
8,248,540 UART: [rt] Runtime listening for mailbox commands...
10,222,426 >>> mbox cmd response: success
10,222,426 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,235,770 UART:
10,235,786 UART: Running Caliptra FMC ...
10,236,194 UART:
10,236,337 UART: [state] CFI Enabled
10,325,978 UART: [art] Extend RT PCRs Done
10,326,406 UART: [art] Lock RT PCRs Done
10,327,333 UART: [art] Populate DV Done
10,335,606 UART: [fht] FMC Alias Private Key: 7
10,336,756 UART: [art] Derive CDI
10,337,036 UART: [art] Store in in slot 0x4
10,422,849 UART: [art] Derive Key Pair
10,423,209 UART: [art] Store priv key in slot 0x5
10,436,039 UART: [art] Derive Key Pair - Done
10,450,588 UART: [art] Signing Cert with AUTHO
10,451,068 UART: RITY.KEYID = 7
10,465,822 UART: [art] Erasing AUTHORITY.KEYID = 7
10,466,587 UART: [art] PUB.X = F0EFECE3CEF2107C990DAD1DB1E4970C090AB84515FE6145A955AB0EC3082AF30C5290F7C74873DBF54D880FC3C1D0B7
10,473,351 UART: [art] PUB.Y = 0E4DA8C7D6837A11CAA934249D9FFF68D604D5F67657CAEB6C22ECD42AD86399ABEC9B84BB09B8D60468D1612361F3EA
10,480,305 UART: [art] SIG.R = A2443A73CFA7976A9F2C4E715C111ADA40517C22524B8EE419AF04A5F282998F14F66F327ECEA6650A3703C62A043B29
10,487,065 UART: [art] SIG.S = 8F36CB6CE4B86E9A8D87C8D3522139FD70D4453816A879FC01AA61977ACC6E97451979DDD5561DE28BDB81FF234534F2
10,510,613 UART: mbox::rt_entry...
10,510,985 UART: ____ _ _ _ ____ _____
10,511,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,512,569 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,513,337 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,514,105 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,514,873 UART: |_|
10,515,185 UART:
10,795,558 UART: [rt] Runtime listening for mailbox commands...
10,796,754 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.49s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,282,064 UART: [fwproc] Recv'd Img size: 78532 bytes
2,168,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,224,693 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,306,725 >>> mbox cmd response: success
2,306,725 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,307,910 UART: [afmc] ++
2,308,078 UART: [afmc] CDI.KEYID = 6
2,308,441 UART: [afmc] SUBJECT.KEYID = 7
2,308,867 UART: [afmc] AUTHORITY.KEYID = 5
2,344,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,360,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,361,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,378,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,386,743 UART: [afmc] --
2,387,787 UART: [cold-reset] --
2,388,611 UART: [state] Locking Datavault
2,389,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,390,582 UART: [state] Locking ICCM
2,391,210 UART: [exit] Launching FMC @ 0x40000130
2,396,539 UART:
2,396,555 UART: Running Caliptra FMC ...
2,396,963 UART:
2,397,017 UART: [state] CFI Enabled
2,407,468 UART: [fht] FMC Alias Private Key: 7
2,515,091 UART: [art] Extend RT PCRs Done
2,515,519 UART: [art] Lock RT PCRs Done
2,517,143 UART: [art] Populate DV Done
2,525,388 UART: [fht] FMC Alias Private Key: 7
2,526,446 UART: [art] Derive CDI
2,526,726 UART: [art] Store in in slot 0x4
2,612,529 UART: [art] Derive Key Pair
2,612,889 UART: [art] Store priv key in slot 0x5
2,626,281 UART: [art] Derive Key Pair - Done
2,640,927 UART: [art] Signing Cert with AUTHO
2,641,407 UART: RITY.KEYID = 7
2,656,581 UART: [art] Erasing AUTHORITY.KEYID = 7
2,657,346 UART: [art] PUB.X = 2C2F18CF90B5BEBBD8BFB1ED50CC1DA786F2D921523738042230D3A374E8C4F9A07F3EF3454EBB08C2D649AD44CB1C13
2,664,128 UART: [art] PUB.Y = 4D06398F068F767F8CCA19CEAAE984969ED035537F9A1EEF264B3B6AFC9FB9B1EEC83836F090D2FAE9EFA2F06163E4D5
2,671,092 UART: [art] SIG.R = 0B16F75E2803BEA36DAFD307B7AE51C49FB503860A05170A51A43713B276EE5F498DDD2C0F8DC39766D74187696A5F33
2,677,842 UART: [art] SIG.S = C4804672BF6B9CF2C3511E79832004F81678B8E53C032BD65EE1F63450F39058E72F4A5652C48FD894826424122B9229
2,702,123 UART: mbox::rt_entry...
2,702,495 UART: ____ _ _ _ ____ _____
2,703,279 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,704,079 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,704,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,705,615 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,383 UART: |_|
2,706,695 UART:
2,813,523 UART: [rt] Runtime listening for mailbox commands...
2,814,710 >>> mbox cmd response data (48 bytes)
2,814,711 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,814,822 UART:
2,814,838 UART: Running Caliptra ROM ...
2,815,246 UART:
2,815,301 UART: [state] CFI Enabled
2,818,033 UART: [state] LifecycleState = Unprovisioned
2,818,688 UART: [state] DebugLocked = No
2,819,178 UART: [state] WD Timer not started. Device not locked for debugging
2,820,308 UART: [kat] SHA2-256
3,623,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,627,987 UART: [kat] ++
3,628,139 UART: [kat] sha1
3,632,447 UART: [kat] SHA2-256
3,634,387 UART: [kat] SHA2-384
3,637,008 UART: [kat] SHA2-512-ACC
3,638,908 UART: [kat] ECC-384
3,648,477 UART: [kat] HMAC-384Kdf
3,653,229 UART: [kat] LMS
3,901,541 UART: [kat] --
3,902,463 UART: [update-reset] ++
5,212,358 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,213,429 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,363,007 >>> mbox cmd response: success
5,363,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,363,286 UART: [update-reset] Copying MAN_2 To MAN_1
5,371,300 UART: [update-reset Success] --
5,372,377 UART: [state] Locking Datavault
5,373,259 UART: [state] Locking PCR0, PCR1 and PCR31
5,373,863 UART: [state] Locking ICCM
5,374,393 UART: [exit] Launching FMC @ 0x40000130
5,379,722 UART:
5,379,738 UART: Running Caliptra FMC ...
5,380,146 UART:
5,380,200 UART: [state] CFI Enabled
5,469,295 UART: [art] Extend RT PCRs Done
5,469,723 UART: [art] Lock RT PCRs Done
5,471,196 UART: [art] Populate DV Done
5,479,409 UART: [fht] FMC Alias Private Key: 7
5,480,589 UART: [art] Derive CDI
5,480,869 UART: [art] Store in in slot 0x4
5,566,884 UART: [art] Derive Key Pair
5,567,244 UART: [art] Store priv key in slot 0x5
5,580,578 UART: [art] Derive Key Pair - Done
5,595,345 UART: [art] Signing Cert with AUTHO
5,595,825 UART: RITY.KEYID = 7
5,610,719 UART: [art] Erasing AUTHORITY.KEYID = 7
5,611,484 UART: [art] PUB.X = 1602681B6DEDB4CF6DC4A7806A36DF84B686CFB7196DFB64B287CA67482E46A70953931E290A3EA7F7D597850CA046B8
5,618,248 UART: [art] PUB.Y = 2F56B03C95C4885001D4222C6D0786D5B323F847AADACE3DC3402C46AF654CFA68A648A22986556F4AC21A9A2494EEC4
5,625,198 UART: [art] SIG.R = FDCA4F541A4213B14393CEFA5FCB19B90B636A0147C51A7AA03B59CBCFA8035B19A2E6D82A34D17A615349E50C290326
5,631,963 UART: [art] SIG.S = A371C6AD494F4D473DD8465E6C16FA334C6DAF5393DF7C00F2116C39559C9101DA1F47837582B1103B17D3A03C4D8BC6
5,655,789 UART: Caliptra RT
5,656,042 UART: [state] CFI Enabled
5,941,740 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,972,830 UART: [rt]cmd =0x4d454153, len=108
5,993,613 >>> mbox cmd response data (12 bytes)
5,993,614 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,994,249 UART:
5,994,265 UART: Running Caliptra ROM ...
5,994,673 UART:
5,994,728 UART: [state] CFI Enabled
5,997,710 UART: [state] LifecycleState = Unprovisioned
5,998,365 UART: [state] DebugLocked = No
5,999,025 UART: [state] WD Timer not started. Device not locked for debugging
6,000,293 UART: [kat] SHA2-256
6,803,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,807,972 UART: [kat] ++
6,808,124 UART: [kat] sha1
6,812,350 UART: [kat] SHA2-256
6,814,290 UART: [kat] SHA2-384
6,817,011 UART: [kat] SHA2-512-ACC
6,818,911 UART: [kat] ECC-384
6,828,790 UART: [kat] HMAC-384Kdf
6,833,438 UART: [kat] LMS
7,081,750 UART: [kat] --
7,082,804 UART: [update-reset] ++
7,985,389 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,986,558 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,082,682 >>> mbox cmd response: success
8,082,682 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,082,891 UART: [update-reset] Copying MAN_2 To MAN_1
8,090,905 UART: [update-reset Success] --
8,091,840 UART: [state] Locking Datavault
8,092,720 UART: [state] Locking PCR0, PCR1 and PCR31
8,093,324 UART: [state] Locking ICCM
8,093,842 UART: [exit] Launching FMC @ 0x40000130
8,099,171 UART:
8,099,187 UART: Running Caliptra FMC ...
8,099,595 UART:
8,099,649 UART: [state] CFI Enabled
8,188,844 UART: [art] Extend RT PCRs Done
8,189,272 UART: [art] Lock RT PCRs Done
8,190,365 UART: [art] Populate DV Done
8,198,460 UART: [fht] FMC Alias Private Key: 7
8,199,506 UART: [art] Derive CDI
8,199,786 UART: [art] Store in in slot 0x4
8,285,425 UART: [art] Derive Key Pair
8,285,785 UART: [art] Store priv key in slot 0x5
8,299,277 UART: [art] Derive Key Pair - Done
8,314,274 UART: [art] Signing Cert with AUTHO
8,314,754 UART: RITY.KEYID = 7
8,329,770 UART: [art] Erasing AUTHORITY.KEYID = 7
8,330,535 UART: [art] PUB.X = 6F945E935A05D4D3B5371C8A8925474FD3A168DFE6699EDFEE590B102C03980C540831326C833894802F2EAAEC10FFE0
8,337,292 UART: [art] PUB.Y = 92633DFB91D5265E9EFC148233D999CF873AAA23B24774F07596520D619B15B86546AD3DEF487E9F02F98DBD23A94352
8,344,236 UART: [art] SIG.R = D22F3109246844BBA503FE925654074770A1BCCAC397159B5901A33B03E3C71EC57CDB89B675A56A8ACE247D9ADF4F9F
8,350,999 UART: [art] SIG.S = 02AD1E7C72E82B4BD8709623EFA98D21C0535DB6E1FC3F15C8075636D40D93A98C68B7EDAB740F3A657CD59046B26B3E
8,374,694 UART: mbox::rt_entry...
8,375,066 UART: ____ _ _ _ ____ _____
8,375,850 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,376,650 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,377,418 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,378,186 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,378,954 UART: |_|
8,379,266 UART:
8,658,776 UART: [rt] Runtime listening for mailbox commands...
8,659,740 UART:
8,659,756 UART: Running Caliptra ROM ...
8,660,164 UART:
8,660,219 UART: [state] CFI Enabled
8,662,641 UART: [state] LifecycleState = Unprovisioned
8,663,296 UART: [state] DebugLocked = No
8,663,884 UART: [state] WD Timer not started. Device not locked for debugging
8,665,044 UART: [kat] SHA2-256
9,468,594 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,472,723 UART: [kat] ++
9,472,875 UART: [kat] sha1
9,477,191 UART: [kat] SHA2-256
9,479,131 UART: [kat] SHA2-384
9,481,866 UART: [kat] SHA2-512-ACC
9,483,766 UART: [kat] ECC-384
9,493,239 UART: [kat] HMAC-384Kdf
9,497,825 UART: [kat] LMS
9,746,137 UART: [kat] --
9,747,237 UART: [update-reset] ++
10,648,120 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,649,293 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
10,745,417 >>> mbox cmd response: success
10,745,417 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,745,730 UART: [update-reset] Copying MAN_2 To MAN_1
10,753,744 UART: [update-reset Success] --
10,754,617 UART: [state] Locking Datavault
10,755,339 UART: [state] Locking PCR0, PCR1 and PCR31
10,755,943 UART: [state] Locking ICCM
10,756,517 UART: [exit] Launching FMC @ 0x40000130
10,761,846 UART:
10,761,862 UART: Running Caliptra FMC ...
10,762,270 UART:
10,762,324 UART: [state] CFI Enabled
10,851,323 UART: [art] Extend RT PCRs Done
10,851,751 UART: [art] Lock RT PCRs Done
10,852,880 UART: [art] Populate DV Done
10,861,275 UART: [fht] FMC Alias Private Key: 7
10,862,217 UART: [art] Derive CDI
10,862,497 UART: [art] Store in in slot 0x4
10,948,386 UART: [art] Derive Key Pair
10,948,746 UART: [art] Store priv key in slot 0x5
10,962,468 UART: [art] Derive Key Pair - Done
10,977,355 UART: [art] Signing Cert with AUTHO
10,977,835 UART: RITY.KEYID = 7
10,993,023 UART: [art] Erasing AUTHORITY.KEYID = 7
10,993,788 UART: [art] PUB.X = F5D85B973FCB50F8B1E99DB56E0276E2B3099D3418ED8B98B89686D63B59352B6B2C705FD9273504F90B63945B712F82
11,000,544 UART: [art] PUB.Y = 9AB7B4294D341105716AFDF86CD1D71D848C882BE7112C30DECDC9F5B37907AC14C9B1DF576E32E3213CB97D2E700EDB
11,007,499 UART: [art] SIG.R = 529F113AE3369841B357FB0C9C6E28B5C4DE17FD0EF13817A5C108FEEA7B20FCC409E34B6AB3E917424A91B0D764F4B9
11,014,269 UART: [art] SIG.S = 20F811A9554A5C1615C4C276ED0BFD3DB523813C29D2390EDBF50A064635D0A01F99EF857B0A5BA097FC8DB862220DBF
11,038,144 UART: mbox::rt_entry...
11,038,516 UART: ____ _ _ _ ____ _____
11,039,300 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,040,100 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,040,868 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,041,636 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,042,404 UART: |_|
11,042,716 UART:
11,317,958 UART: [rt] Runtime listening for mailbox commands...
11,319,154 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,262 ready_for_fw is high
1,056,262 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,158,391 >>> mbox cmd response: success
2,158,391 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,219,939 UART:
2,219,955 UART: Running Caliptra FMC ...
2,220,363 UART:
2,220,417 UART: [state] CFI Enabled
2,230,890 UART: [fht] FMC Alias Private Key: 7
2,339,229 UART: [art] Extend RT PCRs Done
2,339,657 UART: [art] Lock RT PCRs Done
2,341,247 UART: [art] Populate DV Done
2,349,376 UART: [fht] FMC Alias Private Key: 7
2,350,542 UART: [art] Derive CDI
2,350,822 UART: [art] Store in in slot 0x4
2,436,439 UART: [art] Derive Key Pair
2,436,799 UART: [art] Store priv key in slot 0x5
2,449,621 UART: [art] Derive Key Pair - Done
2,464,352 UART: [art] Signing Cert with AUTHO
2,464,832 UART: RITY.KEYID = 7
2,479,936 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,701 UART: [art] PUB.X = 89C207DD3B4251486B109BF1CAEF9A8AF2DE7D8EFEEE41E2C89259A612F5227C2F00C392DED5C1689F168144FB320905
2,487,450 UART: [art] PUB.Y = C2A3E2CA3DF17BF31A4F4188B19CAB64D9CA35424DE6FA9EFBB1C29857E1963F2FE8EEC4278FB022482047473754F023
2,494,412 UART: [art] SIG.R = 97E495A59C3103008FEDE8E3D5780C97E492932E3592316B4CBEF6381FB0784DABDC82C7DE3D73B4B165576C00A471D1
2,501,136 UART: [art] SIG.S = 08EBAD176BE0C1529FCEE4947C9F8FCBA91AFD4CDD9A9C47A4D76C181C93D3D8EE1EFF1DD9466C76AAA2A173D4D7E83C
2,524,480 UART: mbox::rt_entry...
2,524,852 UART: ____ _ _ _ ____ _____
2,525,636 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,436 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,204 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,527,972 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,740 UART: |_|
2,529,052 UART:
2,636,018 UART: [rt] Runtime listening for mailbox commands...
2,637,205 >>> mbox cmd response data (48 bytes)
2,637,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,067,535 >>> mbox cmd response: success
5,067,535 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,080,809 UART:
5,080,825 UART: Running Caliptra FMC ...
5,081,233 UART:
5,081,287 UART: [state] CFI Enabled
5,170,300 UART: [art] Extend RT PCRs Done
5,170,728 UART: [art] Lock RT PCRs Done
5,171,901 UART: [art] Populate DV Done
5,179,902 UART: [fht] FMC Alias Private Key: 7
5,181,042 UART: [art] Derive CDI
5,181,322 UART: [art] Store in in slot 0x4
5,266,853 UART: [art] Derive Key Pair
5,267,213 UART: [art] Store priv key in slot 0x5
5,280,341 UART: [art] Derive Key Pair - Done
5,295,392 UART: [art] Signing Cert with AUTHO
5,295,872 UART: RITY.KEYID = 7
5,310,646 UART: [art] Erasing AUTHORITY.KEYID = 7
5,311,411 UART: [art] PUB.X = 71C09FC326DFB88C80FDE4A4CD9764C94E984D9358BEC08B605570FB213482E1A854FF8C75D4E2685144749201F1AF4D
5,318,182 UART: [art] PUB.Y = 99B39BBDB49FF7FE46324718708D4D3BA6ECA0CC7B590FA20D34E7FD90DC3BF06BE47672144D4FECBBF1C072B00E3C7F
5,325,147 UART: [art] SIG.R = C8A1FEE1D906DF1F8B9C0229FDB4776AC05785C73B1FFF0F6B12494F2F69713F01F9FF5AA5CA49913223CDCFBCF985BF
5,331,927 UART: [art] SIG.S = 087ACB65654688843B0CDAF6D15FFCFF43C8876273344869FEFDE3F4A2534BFF7E1DA98E99559EBF8954FAFD1E476E26
5,356,102 UART: Caliptra RT
5,356,355 UART: [state] CFI Enabled
5,641,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,672,458 UART: [rt]cmd =0x4d454153, len=108
5,692,773 >>> mbox cmd response data (12 bytes)
5,692,774 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,661,247 >>> mbox cmd response: success
7,661,247 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,674,521 UART:
7,674,537 UART: Running Caliptra FMC ...
7,674,945 UART:
7,674,999 UART: [state] CFI Enabled
7,764,198 UART: [art] Extend RT PCRs Done
7,764,626 UART: [art] Lock RT PCRs Done
7,765,897 UART: [art] Populate DV Done
7,774,174 UART: [fht] FMC Alias Private Key: 7
7,775,262 UART: [art] Derive CDI
7,775,542 UART: [art] Store in in slot 0x4
7,861,379 UART: [art] Derive Key Pair
7,861,739 UART: [art] Store priv key in slot 0x5
7,875,181 UART: [art] Derive Key Pair - Done
7,889,754 UART: [art] Signing Cert with AUTHO
7,890,234 UART: RITY.KEYID = 7
7,905,374 UART: [art] Erasing AUTHORITY.KEYID = 7
7,906,139 UART: [art] PUB.X = 7D4D654A9A177B0917577A3BB8E5C5C703BA9843D21CB1E557F9E85177EBD4880C4F54526E3308B8595BEB8AF9E6F95F
7,912,903 UART: [art] PUB.Y = 0F39C633FA0C96944514820F9A281240CFC043F091C750F153B2243467E144B4C8E3BE6AE89ABFED57BD37F8ECEBF832
7,919,852 UART: [art] SIG.R = A8019493A2DC2FBD0B9F01B60C3A8846C7E2BC08ABA3B5FFF28F17A649FE057FDAD16054636A05E14EF02ACB515FF469
7,926,619 UART: [art] SIG.S = 7C97B494A60E2A44210B9C77ECF8967B57FDA704B2ED1C5ADF7411224883E0CA5C61F4F034504DE0B2E76B1FF9642C8E
7,951,163 UART: mbox::rt_entry...
7,951,535 UART: ____ _ _ _ ____ _____
7,952,319 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,953,119 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,953,887 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,954,655 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,955,423 UART: |_|
7,955,735 UART:
8,236,563 UART: [rt] Runtime listening for mailbox commands...
10,205,867 >>> mbox cmd response: success
10,205,867 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,219,005 UART:
10,219,021 UART: Running Caliptra FMC ...
10,219,429 UART:
10,219,483 UART: [state] CFI Enabled
10,308,728 UART: [art] Extend RT PCRs Done
10,309,156 UART: [art] Lock RT PCRs Done
10,310,335 UART: [art] Populate DV Done
10,318,702 UART: [fht] FMC Alias Private Key: 7
10,319,730 UART: [art] Derive CDI
10,320,010 UART: [art] Store in in slot 0x4
10,405,499 UART: [art] Derive Key Pair
10,405,859 UART: [art] Store priv key in slot 0x5
10,418,833 UART: [art] Derive Key Pair - Done
10,433,680 UART: [art] Signing Cert with AUTHO
10,434,160 UART: RITY.KEYID = 7
10,449,780 UART: [art] Erasing AUTHORITY.KEYID = 7
10,450,545 UART: [art] PUB.X = 591EFBA8EE7659C00B77C1CF5914034504A67F344ED7E76EF5076353288706ECAD9D78554CE02FC3B8B9CF912362CA55
10,457,304 UART: [art] PUB.Y = ABEAEDDF3CA48E4D438EF91ED3FD39D19AC1049DE2CFA2EA42F1576D5F962DF2AD96B2CB70034B42AE694C10768A7FC5
10,464,276 UART: [art] SIG.R = 3D7D4D19DB6C84525ADF953E24BE1D9FA4EBD77C084FEB5D5C4F604FBDE02EB1225D92429DE607CD89DBEDCDA584B266
10,471,066 UART: [art] SIG.S = 12791A1D589E6AF7651531B576E724211AD5545B4DE094A1275EC4641DEC989B996D7287B4DA546C99BD0968CB731329
10,494,836 UART: mbox::rt_entry...
10,495,208 UART: ____ _ _ _ ____ _____
10,495,992 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,496,792 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,497,560 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,498,328 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,499,096 UART: |_|
10,499,408 UART:
10,777,346 UART: [rt] Runtime listening for mailbox commands...
10,778,542 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.28s
Truncated 2554 bytes from beginning
fwproc] Recv command 0x46574c44
1,282,725 UART: [fwproc] Recv'd Img size: 78532 bytes
2,170,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,782 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,309,902 >>> mbox cmd response: success
2,309,902 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,311,095 UART: [afmc] ++
2,311,263 UART: [afmc] CDI.KEYID = 6
2,311,626 UART: [afmc] SUBJECT.KEYID = 7
2,312,052 UART: [afmc] AUTHORITY.KEYID = 5
2,347,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,203 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,954 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,285 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,040 UART: [afmc] --
2,391,044 UART: [cold-reset] --
2,391,988 UART: [state] Locking Datavault
2,393,097 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,701 UART: [state] Locking ICCM
2,394,203 UART: [exit] Launching FMC @ 0x40000130
2,399,532 UART:
2,399,548 UART: Running Caliptra FMC ...
2,399,956 UART:
2,400,099 UART: [state] CFI Enabled
2,410,814 UART: [fht] FMC Alias Private Key: 7
2,518,693 UART: [art] Extend RT PCRs Done
2,519,121 UART: [art] Lock RT PCRs Done
2,520,649 UART: [art] Populate DV Done
2,528,652 UART: [fht] FMC Alias Private Key: 7
2,529,758 UART: [art] Derive CDI
2,530,038 UART: [art] Store in in slot 0x4
2,615,533 UART: [art] Derive Key Pair
2,615,893 UART: [art] Store priv key in slot 0x5
2,629,337 UART: [art] Derive Key Pair - Done
2,644,336 UART: [art] Signing Cert with AUTHO
2,644,816 UART: RITY.KEYID = 7
2,659,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,393 UART: [art] PUB.X = 39F02B7521AADEB7ECB7FA988621963E10549F9C3700EB5F3A97BF7D3DF341A23F76C88C7A85F63380EDF32FCF0CFFF4
2,667,156 UART: [art] PUB.Y = DC5C759B484A832FB8155BD30BBC1C4E443410CF503623CC5A16E083B7402103A097F846FFB77360D099EBDE1275363F
2,674,102 UART: [art] SIG.R = B075289DBEADD4C8270CA23A90A06953586BCA1C012428CA9428F49D7BE5C5E9BC5BA4E3B2C4ACB972967BEAE23D5D1C
2,680,886 UART: [art] SIG.S = DC360F4CAC32C7219E5C278833C82FD04DDF6D88102B44CC4B576EE2EC0012F210710EDA4697AC6E03DC582F2E8F679A
2,704,314 UART: mbox::rt_entry...
2,704,686 UART: ____ _ _ _ ____ _____
2,705,470 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,270 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,038 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,806 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,574 UART: |_|
2,708,886 UART:
2,815,439 UART: [rt] Runtime listening for mailbox commands...
2,816,626 >>> mbox cmd response data (48 bytes)
2,816,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,816,738 UART:
2,816,754 UART: Running Caliptra ROM ...
2,817,162 UART:
2,817,304 UART: [state] CFI Enabled
2,820,170 UART: [state] LifecycleState = Unprovisioned
2,820,825 UART: [state] DebugLocked = No
2,821,519 UART: [state] WD Timer not started. Device not locked for debugging
2,822,853 UART: [kat] SHA2-256
3,626,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,532 UART: [kat] ++
3,630,684 UART: [kat] sha1
3,634,982 UART: [kat] SHA2-256
3,636,922 UART: [kat] SHA2-384
3,639,475 UART: [kat] SHA2-512-ACC
3,641,375 UART: [kat] ECC-384
3,650,696 UART: [kat] HMAC-384Kdf
3,655,380 UART: [kat] LMS
3,903,692 UART: [kat] --
3,904,474 UART: [update-reset] ++
5,214,855 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,215,884 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,365,462 >>> mbox cmd response: success
5,365,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,365,661 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,675 UART: [update-reset Success] --
5,374,648 UART: [state] Locking Datavault
5,375,556 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,160 UART: [state] Locking ICCM
5,376,704 UART: [exit] Launching FMC @ 0x40000130
5,382,033 UART:
5,382,049 UART: Running Caliptra FMC ...
5,382,457 UART:
5,382,600 UART: [state] CFI Enabled
5,471,411 UART: [art] Extend RT PCRs Done
5,471,839 UART: [art] Lock RT PCRs Done
5,473,310 UART: [art] Populate DV Done
5,481,669 UART: [fht] FMC Alias Private Key: 7
5,482,769 UART: [art] Derive CDI
5,483,049 UART: [art] Store in in slot 0x4
5,568,856 UART: [art] Derive Key Pair
5,569,216 UART: [art] Store priv key in slot 0x5
5,582,264 UART: [art] Derive Key Pair - Done
5,596,911 UART: [art] Signing Cert with AUTHO
5,597,391 UART: RITY.KEYID = 7
5,612,433 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,198 UART: [art] PUB.X = A5D3AA988146A37332B2FF872C99B6BC891F48EAF8625F33642BBBD94E3BE4D43B436E801EEFC38623BB45577602A03C
5,619,973 UART: [art] PUB.Y = 2EA546ABFE2FF4F1F000DC0775DF7F43B11386456C47776D30D6CF259B691F848FFD2C4A57BCAB6D217439E4BCD14B5C
5,626,914 UART: [art] SIG.R = 7515D365CC33F9C24A060503D869C459BD65F7E45C863BA80F9A277CFA1FED0A6A5F41C7B6E009B3650D2AE5A4E367BE
5,633,675 UART: [art] SIG.S = 5C0089976B89CCFF4936B751BF3F1EA1CD43EB7038EF170F9059397555609A9441A1BABCB94886001E66053ECDC38043
5,657,328 UART: Caliptra RT
5,657,673 UART: [state] CFI Enabled
5,939,846 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,970,870 UART: [rt]cmd =0x4d454153, len=108
5,991,283 >>> mbox cmd response data (12 bytes)
5,991,284 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,992,243 UART:
5,992,259 UART: Running Caliptra ROM ...
5,992,667 UART:
5,992,809 UART: [state] CFI Enabled
5,995,925 UART: [state] LifecycleState = Unprovisioned
5,996,580 UART: [state] DebugLocked = No
5,997,152 UART: [state] WD Timer not started. Device not locked for debugging
5,998,442 UART: [kat] SHA2-256
6,801,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,806,121 UART: [kat] ++
6,806,273 UART: [kat] sha1
6,810,525 UART: [kat] SHA2-256
6,812,465 UART: [kat] SHA2-384
6,815,332 UART: [kat] SHA2-512-ACC
6,817,232 UART: [kat] ECC-384
6,827,189 UART: [kat] HMAC-384Kdf
6,831,769 UART: [kat] LMS
7,080,081 UART: [kat] --
7,081,061 UART: [update-reset] ++
7,982,144 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,983,137 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,079,261 >>> mbox cmd response: success
8,079,261 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,079,500 UART: [update-reset] Copying MAN_2 To MAN_1
8,087,514 UART: [update-reset Success] --
8,088,491 UART: [state] Locking Datavault
8,089,385 UART: [state] Locking PCR0, PCR1 and PCR31
8,089,989 UART: [state] Locking ICCM
8,090,637 UART: [exit] Launching FMC @ 0x40000130
8,095,966 UART:
8,095,982 UART: Running Caliptra FMC ...
8,096,390 UART:
8,096,533 UART: [state] CFI Enabled
8,185,794 UART: [art] Extend RT PCRs Done
8,186,222 UART: [art] Lock RT PCRs Done
8,187,275 UART: [art] Populate DV Done
8,195,522 UART: [fht] FMC Alias Private Key: 7
8,196,584 UART: [art] Derive CDI
8,196,864 UART: [art] Store in in slot 0x4
8,282,453 UART: [art] Derive Key Pair
8,282,813 UART: [art] Store priv key in slot 0x5
8,296,837 UART: [art] Derive Key Pair - Done
8,311,681 UART: [art] Signing Cert with AUTHO
8,312,161 UART: RITY.KEYID = 7
8,327,557 UART: [art] Erasing AUTHORITY.KEYID = 7
8,328,322 UART: [art] PUB.X = 9AC727E94FDC3F7F332D775B71CF38D4E3F6EECD2D98597F698EDADF64798D60251498CAFA371A991F9CF6F553E550C1
8,335,106 UART: [art] PUB.Y = 4A6DA64BEDCE0A23E40A9578392CAA22DC2C96CF0822266356CCBD71A76211A6C589EB441D23F84F92DB6FCE80A48438
8,342,059 UART: [art] SIG.R = CF84BD91F058F20D4FDC319819D578FE3D427986819AE00D7EADE21A5FA322745BEB7F36622AEFA7CE85DB775FD472F6
8,348,839 UART: [art] SIG.S = D45B9B2F246BA4B48EFF4E1607D1A133287CA948105D731C2F1D9AA9DCB2BCB48336990A9E1688821FD0C0CB091BF221
8,372,057 UART: mbox::rt_entry...
8,372,429 UART: ____ _ _ _ ____ _____
8,373,213 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,374,013 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,374,781 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,375,549 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,376,317 UART: |_|
8,376,629 UART:
8,655,998 UART: [rt] Runtime listening for mailbox commands...
8,656,962 UART:
8,656,978 UART: Running Caliptra ROM ...
8,657,386 UART:
8,657,528 UART: [state] CFI Enabled
8,659,962 UART: [state] LifecycleState = Unprovisioned
8,660,617 UART: [state] DebugLocked = No
8,661,179 UART: [state] WD Timer not started. Device not locked for debugging
8,662,325 UART: [kat] SHA2-256
9,465,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,470,004 UART: [kat] ++
9,470,156 UART: [kat] sha1
9,474,436 UART: [kat] SHA2-256
9,476,376 UART: [kat] SHA2-384
9,478,993 UART: [kat] SHA2-512-ACC
9,480,893 UART: [kat] ECC-384
9,490,402 UART: [kat] HMAC-384Kdf
9,495,198 UART: [kat] LMS
9,743,510 UART: [kat] --
9,744,484 UART: [update-reset] ++
10,645,991 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
10,646,966 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
10,743,090 >>> mbox cmd response: success
10,743,090 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,743,379 UART: [update-reset] Copying MAN_2 To MAN_1
10,751,393 UART: [update-reset Success] --
10,752,358 UART: [state] Locking Datavault
10,753,230 UART: [state] Locking PCR0, PCR1 and PCR31
10,753,834 UART: [state] Locking ICCM
10,754,424 UART: [exit] Launching FMC @ 0x40000130
10,759,753 UART:
10,759,769 UART: Running Caliptra FMC ...
10,760,177 UART:
10,760,320 UART: [state] CFI Enabled
10,849,657 UART: [art] Extend RT PCRs Done
10,850,085 UART: [art] Lock RT PCRs Done
10,851,278 UART: [art] Populate DV Done
10,859,383 UART: [fht] FMC Alias Private Key: 7
10,860,413 UART: [art] Derive CDI
10,860,693 UART: [art] Store in in slot 0x4
10,946,582 UART: [art] Derive Key Pair
10,946,942 UART: [art] Store priv key in slot 0x5
10,960,662 UART: [art] Derive Key Pair - Done
10,975,515 UART: [art] Signing Cert with AUTHO
10,975,995 UART: RITY.KEYID = 7
10,991,091 UART: [art] Erasing AUTHORITY.KEYID = 7
10,991,856 UART: [art] PUB.X = EDD305EFDC34A50BB7DEC47DE6DB0CDD463CFAED2F37B5CE201AC46D34189E1ECD544661E3E980D804D65C95D78EE4D3
10,998,642 UART: [art] PUB.Y = 08E6F25265D0DAC2142B35DA2FDC7CDFC2C3ED0C617858EBFA630403F69B8534FAAE7207068E234A81D940B13896677C
11,005,582 UART: [art] SIG.R = 2F2422AB35C0C03A468BC7E79861B5D0DB8902D5A3AF99ECF7E9963037A20255A2D25DA8713A2E7758BC0B5AAE7E17C0
11,012,353 UART: [art] SIG.S = 6238FDD8C627EA5A07D123E9E5E04F5F4A9E215200F0E64EFE0DCC011B561AC0465579FC5EC1857E711B421789FD26D1
11,036,217 UART: mbox::rt_entry...
11,036,589 UART: ____ _ _ _ ____ _____
11,037,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,038,173 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,038,941 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,039,709 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,040,477 UART: |_|
11,040,789 UART:
11,322,557 UART: [rt] Runtime listening for mailbox commands...
11,323,753 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,709 ready_for_fw is high
1,056,709 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,159,228 >>> mbox cmd response: success
2,159,228 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,221,614 UART:
2,221,630 UART: Running Caliptra FMC ...
2,222,038 UART:
2,222,181 UART: [state] CFI Enabled
2,232,850 UART: [fht] FMC Alias Private Key: 7
2,340,617 UART: [art] Extend RT PCRs Done
2,341,045 UART: [art] Lock RT PCRs Done
2,342,257 UART: [art] Populate DV Done
2,350,466 UART: [fht] FMC Alias Private Key: 7
2,351,472 UART: [art] Derive CDI
2,351,752 UART: [art] Store in in slot 0x4
2,437,363 UART: [art] Derive Key Pair
2,437,723 UART: [art] Store priv key in slot 0x5
2,450,985 UART: [art] Derive Key Pair - Done
2,465,598 UART: [art] Signing Cert with AUTHO
2,466,078 UART: RITY.KEYID = 7
2,481,450 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,215 UART: [art] PUB.X = DA00BAFB13F07D49463DAA2EBD6818A2DF593DDC8304BA244FBA2F687A4B8FE86924B6000CCEE3E61DD1EE008B568560
2,488,933 UART: [art] PUB.Y = F691B81ED1AF5746BDF4D598873820DE9FD7F8D978A83841CF7AF539E123586B7ED837D94EE88E755924DED2A85D364F
2,495,891 UART: [art] SIG.R = A25C6E9CFAA826627720E0915F789CDA4030BFB37E13E7A076F4F3DEBF19E9A6357797E353449E92263CB0879EEAAAAA
2,502,673 UART: [art] SIG.S = E5AD129D3DF877F65815CCF51D0EB6517101706BA621C078F3B82242BA4B053EB5D4E1891248FBB39F800A983204F59F
2,526,829 UART: mbox::rt_entry...
2,527,201 UART: ____ _ _ _ ____ _____
2,527,985 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,785 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,529,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,321 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,089 UART: |_|
2,531,401 UART:
2,638,392 UART: [rt] Runtime listening for mailbox commands...
2,639,579 >>> mbox cmd response data (48 bytes)
2,639,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,070,494 >>> mbox cmd response: success
5,070,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,084,058 UART:
5,084,074 UART: Running Caliptra FMC ...
5,084,482 UART:
5,084,625 UART: [state] CFI Enabled
5,173,660 UART: [art] Extend RT PCRs Done
5,174,088 UART: [art] Lock RT PCRs Done
5,175,553 UART: [art] Populate DV Done
5,183,756 UART: [fht] FMC Alias Private Key: 7
5,184,854 UART: [art] Derive CDI
5,185,134 UART: [art] Store in in slot 0x4
5,270,547 UART: [art] Derive Key Pair
5,270,907 UART: [art] Store priv key in slot 0x5
5,284,069 UART: [art] Derive Key Pair - Done
5,298,924 UART: [art] Signing Cert with AUTHO
5,299,404 UART: RITY.KEYID = 7
5,314,368 UART: [art] Erasing AUTHORITY.KEYID = 7
5,315,133 UART: [art] PUB.X = C0987DF4C5078BCE63D3AE08217136922BF93647061AC6C9BCE695CEB98F87E65302413B9723691CCD271CB80ACCCB04
5,321,891 UART: [art] PUB.Y = 0A30CE8E6A32B61FB1055944ACE445B74072A6DD0E80B61903912756E7010E967B8B7ADC7ED7E3953227DADD62CBD325
5,328,829 UART: [art] SIG.R = 961880DAF27F98879CBF2D9A2C839B6A784C33D66F420F11AE2641EC8617BF27B444C17F016C3DB06ADA1052CCE1EE9E
5,335,605 UART: [art] SIG.S = DF1F140E9393C833A3B40EA35C4B6C30AA9E6BFBD632D0ADBAED4D37B87814A3B80C6CBE38BC2B0AC1302616351AB54F
5,359,844 UART: Caliptra RT
5,360,189 UART: [state] CFI Enabled
5,641,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,672,775 UART: [rt]cmd =0x4d454153, len=108
5,693,262 >>> mbox cmd response data (12 bytes)
5,693,263 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,663,253 >>> mbox cmd response: success
7,663,253 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,676,105 UART:
7,676,121 UART: Running Caliptra FMC ...
7,676,529 UART:
7,676,672 UART: [state] CFI Enabled
7,765,643 UART: [art] Extend RT PCRs Done
7,766,071 UART: [art] Lock RT PCRs Done
7,767,418 UART: [art] Populate DV Done
7,775,661 UART: [fht] FMC Alias Private Key: 7
7,776,649 UART: [art] Derive CDI
7,776,929 UART: [art] Store in in slot 0x4
7,862,316 UART: [art] Derive Key Pair
7,862,676 UART: [art] Store priv key in slot 0x5
7,876,416 UART: [art] Derive Key Pair - Done
7,891,279 UART: [art] Signing Cert with AUTHO
7,891,759 UART: RITY.KEYID = 7
7,907,257 UART: [art] Erasing AUTHORITY.KEYID = 7
7,908,022 UART: [art] PUB.X = D7C8AFFF8DFEA80F7CD1A0A302C6FFADF94EBA54B8FB8428BEFFD69EBCBE95E7DAE4B8479F44004BBA1309F1BAA5C890
7,914,801 UART: [art] PUB.Y = 830855612FAE4E4C34EC0F2B87FC8C704C9D8E698EBD75C2339D5A6ED36FF5B19A1F4B3255110C1293F8F50F549DCF39
7,921,749 UART: [art] SIG.R = C6C586AA12180FE04B4B559482F80C06E8EE06A28404B45AB898504CBBA5D14B9830EB7558091FC3E4E78BAA3D9E9667
7,928,507 UART: [art] SIG.S = 0290B53B6724B5E76C7F657F18DC2E029F49AED8EBE7C528C395B1D6114CB188809D9AB080794B00DB1ECF579274ADA3
7,952,808 UART: mbox::rt_entry...
7,953,180 UART: ____ _ _ _ ____ _____
7,953,964 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,954,764 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,955,532 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,956,300 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,957,068 UART: |_|
7,957,380 UART:
8,236,208 UART: [rt] Runtime listening for mailbox commands...
10,205,545 >>> mbox cmd response: success
10,205,545 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,219,161 UART:
10,219,177 UART: Running Caliptra FMC ...
10,219,585 UART:
10,219,728 UART: [state] CFI Enabled
10,308,649 UART: [art] Extend RT PCRs Done
10,309,077 UART: [art] Lock RT PCRs Done
10,310,118 UART: [art] Populate DV Done
10,318,249 UART: [fht] FMC Alias Private Key: 7
10,319,189 UART: [art] Derive CDI
10,319,469 UART: [art] Store in in slot 0x4
10,405,330 UART: [art] Derive Key Pair
10,405,690 UART: [art] Store priv key in slot 0x5
10,418,736 UART: [art] Derive Key Pair - Done
10,433,436 UART: [art] Signing Cert with AUTHO
10,433,916 UART: RITY.KEYID = 7
10,448,880 UART: [art] Erasing AUTHORITY.KEYID = 7
10,449,645 UART: [art] PUB.X = D9ED5203E7B02BAA2CF68FC4787C7AEB10EFB0E8FCBE04CB631359E4D6C756AFEEDD8FD666DD3F21114434A3D8C80F57
10,456,432 UART: [art] PUB.Y = E7EF019E9B254CB71DDA986400CA7E7CBB68807E2FEEE148CDCD665A11B2B3D406403D8AF4CF405137E43A29D2659A43
10,463,368 UART: [art] SIG.R = A011954B36163FF1FB46AF77DD1FEFD595D35FE5AE202BCD818C68EC0044E7A90E9644D38FFC61553751725FAE170F1F
10,470,122 UART: [art] SIG.S = 87A424441E0BD53ABCB81E01134D996DACAFD82D4347CAEA57D667EE9E9E7F64B912BF39302CDC78437CE0D3D577A607
10,493,976 UART: mbox::rt_entry...
10,494,348 UART: ____ _ _ _ ____ _____
10,495,132 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,495,932 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,496,700 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,497,468 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,498,236 UART: |_|
10,498,548 UART:
10,776,627 UART: [rt] Runtime listening for mailbox commands...
10,777,823 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 3.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,009 UART:
192,389 UART: Running Caliptra ROM ...
193,539 UART:
193,681 UART: [state] CFI Enabled
266,941 UART: [state] LifecycleState = Unprovisioned
268,865 UART: [state] DebugLocked = No
270,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,836 UART: [kat] SHA2-256
444,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,058 UART: [kat] ++
455,594 UART: [kat] sha1
466,806 UART: [kat] SHA2-256
469,495 UART: [kat] SHA2-384
476,548 UART: [kat] SHA2-512-ACC
478,921 UART: [kat] ECC-384
2,768,867 UART: [kat] HMAC-384Kdf
2,799,154 UART: [kat] LMS
3,989,475 UART: [kat] --
3,995,679 UART: [cold-reset] ++
3,997,539 UART: [fht] Storing FHT @ 0x50003400
4,008,869 UART: [idev] ++
4,009,428 UART: [idev] CDI.KEYID = 6
4,010,305 UART: [idev] SUBJECT.KEYID = 7
4,011,617 UART: [idev] UDS.KEYID = 0
4,012,574 ready_for_fw is high
4,012,776 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,952 UART: [idev] Erasing UDS.KEYID = 0
7,346,377 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,011 UART: [idev] --
7,371,856 UART: [ldev] ++
7,372,421 UART: [ldev] CDI.KEYID = 6
7,373,399 UART: [ldev] SUBJECT.KEYID = 5
7,374,605 UART: [ldev] AUTHORITY.KEYID = 7
7,375,884 UART: [ldev] FE.KEYID = 1
7,421,841 UART: [ldev] Erasing FE.KEYID = 1
10,753,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,370 UART: [ldev] --
13,136,247 UART: [fwproc] Waiting for Commands...
13,138,762 UART: [fwproc] Received command 0x46574c44
13,140,961 UART: [fwproc] Received Image of size 113844 bytes
17,186,304 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,434 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,329,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,645,186 >>> mbox cmd response: success
17,649,135 UART: [afmc] ++
17,649,729 UART: [afmc] CDI.KEYID = 6
17,650,608 UART: [afmc] SUBJECT.KEYID = 7
17,651,877 UART: [afmc] AUTHORITY.KEYID = 5
21,007,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,307,469 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,309,723 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,324,175 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,338,993 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,353,456 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,374,797 UART: [afmc] --
23,378,304 UART: [cold-reset] --
23,384,487 UART: [state] Locking Datavault
23,388,270 UART: [state] Locking PCR0, PCR1 and PCR31
23,389,964 UART: [state] Locking ICCM
23,392,539 UART: [exit] Launching FMC @ 0x40000130
23,400,931 UART:
23,401,156 UART: Running Caliptra FMC ...
23,402,248 UART:
23,402,404 UART: [state] CFI Enabled
23,468,095 UART: [fht] FMC Alias Private Key: 7
25,805,832 UART: [art] Extend RT PCRs Done
25,807,058 UART: [art] Lock RT PCRs Done
25,808,873 UART: [art] Populate DV Done
25,814,005 UART: [fht] FMC Alias Private Key: 7
25,815,492 UART: [art] Derive CDI
25,816,247 UART: [art] Store in in slot 0x4
25,877,363 UART: [art] Derive Key Pair
25,878,402 UART: [art] Store priv key in slot 0x5
29,171,168 UART: [art] Derive Key Pair - Done
29,184,280 UART: [art] Signing Cert with AUTHO
29,185,626 UART: RITY.KEYID = 7
31,472,987 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,496 UART: [art] PUB.X = 68387178C1DC701072A8595BBDE5FC84F7BEF17A7D6279AF81580A663703EC471352F198062930FEF4A4144D1BA2306F
31,481,710 UART: [art] PUB.Y = 1B9749CE5BEA2E9BFC883ACA2BDB4D8A269C6F8AF3323E79A73636DC804BF05AEB99F2F2FD42D3FB52A4D0E2D5D5A2EB
31,489,015 UART: [art] SIG.R = D2B10DAE7FCE7E8C49F62B9726C1EB3CDDA47F618C512CA5055065D3739A815D004F8ED3E00B4F7756C91AFB93927EF9
31,496,363 UART: [art] SIG.S = 6C501C1BB1B2CBFDA573C00DE260360FFA640B7934DE2DC53AED5E5961B9187774F851F5DC73E60E5DEACF6216CED423
32,801,307 UART: Caliptra RT
32,802,002 UART: [state] CFI Enabled
32,961,969 UART: [rt] RT listening for mailbox commands...
32,964,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,995,323 UART: [rt]cmd =0x4d454153, len=108
33,014,325 >>> mbox cmd response data (12 bytes)
35,068,554 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,169,380 UART:
35,169,741 UART: Running Caliptra ROM ...
35,170,787 UART:
35,170,937 UART: [state] CFI Enabled
35,244,798 UART: [state] LifecycleState = Unprovisioned
35,246,735 UART: [state] DebugLocked = No
35,249,278 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,254,702 UART: [kat] SHA2-256
35,424,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,434,903 UART: [kat] ++
35,435,363 UART: [kat] sha1
35,445,726 UART: [kat] SHA2-256
35,448,415 UART: [kat] SHA2-384
35,454,067 UART: [kat] SHA2-512-ACC
35,456,478 UART: [kat] ECC-384
37,751,072 UART: [kat] HMAC-384Kdf
37,781,822 UART: [kat] LMS
38,972,176 UART: [kat] --
38,976,744 UART: [update-reset] ++
42,677,882 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,682,418 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,940,234 >>> mbox cmd response: success
42,940,591 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,941,946 UART: [update-reset] Copying MAN_2 To MAN_1
42,964,353 UART: [update-reset Success] --
42,969,023 UART: [state] Locking Datavault
42,971,516 UART: [state] Locking PCR0, PCR1 and PCR31
42,973,283 UART: [state] Locking ICCM
42,974,346 UART: [exit] Launching FMC @ 0x40000130
42,982,734 UART:
42,982,970 UART: Running Caliptra FMC ...
42,984,064 UART:
42,984,223 UART: [state] CFI Enabled
43,083,055 UART: [art] Extend RT PCRs Done
43,084,261 UART: [art] Lock RT PCRs Done
43,085,659 UART: [art] Populate DV Done
43,091,279 UART: [fht] FMC Alias Private Key: 7
43,092,967 UART: [art] Derive CDI
43,093,783 UART: [art] Store in in slot 0x4
43,151,930 UART: [art] Derive Key Pair
43,152,964 UART: [art] Store priv key in slot 0x5
46,446,141 UART: [art] Derive Key Pair - Done
46,458,770 UART: [art] Signing Cert with AUTHO
46,460,090 UART: RITY.KEYID = 7
48,747,933 UART: [art] Erasing AUTHORITY.KEYID = 7
48,749,442 UART: [art] PUB.X = 8C89D5D5671E4F9862CD99ABE8FB79AFB5046357AA26A283B99E4E6D57D1953669DEAF85B22477565761CFBC39BC3B61
48,756,680 UART: [art] PUB.Y = 9506128F37C4AD74EBA9CC3B86C70E0984443822FA9642390E4B2718C6F1A038A6FB96E230D50E3666A043B2A6E36580
48,763,906 UART: [art] SIG.R = 56830F9A15F791E1335F346C5CD52DFB733DB53AF4B49DD017DB0CC19CE8FBE69B242B3AA530E073D39EE3F4AEFB480F
48,771,292 UART: [art] SIG.S = 775F250C019BEE25B23E5870EDD626DEF9C11C0A318FAA0A4D358882EDAD6A102F0F1755142D8BD94A0C172CCFA330AC
50,076,186 UART: mbox::rt_entry...
50,077,154 UART: ____ _ _ _ ____ _____
50,079,083 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,081,087 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,082,939 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,084,860 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,086,737 UART: |_|
50,087,560 UART:
50,374,697 UART: [rt] Runtime listening for mailbox commands...
50,376,866 >>> mbox cmd response data (48 bytes)
50,377,471 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,379,794 >>> mbox cmd response data (48 bytes)
50,380,671 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,394,536 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,786,622 ready_for_fw is high
3,787,009 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,887,469 >>> mbox cmd response: success
23,588,862 UART:
23,589,244 UART: Running Caliptra FMC ...
23,590,346 UART:
23,590,494 UART: [state] CFI Enabled
23,659,990 UART: [fht] FMC Alias Private Key: 7
25,997,393 UART: [art] Extend RT PCRs Done
25,998,639 UART: [art] Lock RT PCRs Done
26,000,210 UART: [art] Populate DV Done
26,005,644 UART: [fht] FMC Alias Private Key: 7
26,007,352 UART: [art] Derive CDI
26,008,166 UART: [art] Store in in slot 0x4
26,068,285 UART: [art] Derive Key Pair
26,069,278 UART: [art] Store priv key in slot 0x5
29,362,211 UART: [art] Derive Key Pair - Done
29,375,466 UART: [art] Signing Cert with AUTHO
29,376,766 UART: RITY.KEYID = 7
31,663,429 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,939 UART: [art] PUB.X = 97844E5DCCA595F08730161B3E48F32570B7631CE076983226F14E0F8FFBA7D61D90D4A588825FED8F63B7B1A0D9B625
31,672,144 UART: [art] PUB.Y = 6877551B9550369FFC538463B2A63F0483452B65C55546920806D35D169C9F2A16B0143B2E896F725CA2DF7679347420
31,679,387 UART: [art] SIG.R = EE33EE75B3A4256D8D5E3B674E6B14EB3ED1A6C8F3F89226E9433C959DADD5A64E53920F9E41263DE10ECDDF26762F93
31,686,754 UART: [art] SIG.S = 7600E3C0E8BEA933D81A84F79A548A67F8AD4C04CD99D0723BDA095C8066DD22AE803A1FA51C1D8DAC983492C258FB81
32,992,552 UART: Caliptra RT
32,993,287 UART: [state] CFI Enabled
33,173,895 UART: [rt] RT listening for mailbox commands...
33,176,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,207,668 UART: [rt]cmd =0x4d454153, len=108
33,226,270 >>> mbox cmd response data (12 bytes)
35,283,384 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,266,844 >>> mbox cmd response: success
43,267,351 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,302,472 UART:
43,302,791 UART: Running Caliptra FMC ...
43,303,828 UART:
43,303,971 UART: [state] CFI Enabled
43,402,289 UART: [art] Extend RT PCRs Done
43,403,483 UART: [art] Lock RT PCRs Done
43,404,940 UART: [art] Populate DV Done
43,410,511 UART: [fht] FMC Alias Private Key: 7
43,412,099 UART: [art] Derive CDI
43,412,832 UART: [art] Store in in slot 0x4
43,471,458 UART: [art] Derive Key Pair
43,472,494 UART: [art] Store priv key in slot 0x5
46,765,164 UART: [art] Derive Key Pair - Done
46,778,318 UART: [art] Signing Cert with AUTHO
46,779,616 UART: RITY.KEYID = 7
49,066,211 UART: [art] Erasing AUTHORITY.KEYID = 7
49,067,721 UART: [art] PUB.X = 9FA25EE8F1671C98B9E5772B920D1571C41BEE1D2FC3C05552D23A3FD34557AF1BCCA543C6D64A781446122B142C6034
49,074,967 UART: [art] PUB.Y = 6B69A35158BD82020BD13ACB2D441C0349F94618DF3D64FEE8ADD9AD59A8929A9E541E893B1D4C49977EED973E09C0E9
49,082,201 UART: [art] SIG.R = 944091462AA1B005A4D1ABD73220065EB7F7D0131AC8D62798E562063CD57370BF8276146D709572D6980B50F02EA7E5
49,089,536 UART: [art] SIG.S = 3B0915B8F69B4749FDE54DF7B92B48E30BC8BF17345AEC80C84678BB10CA4063AD3A2A8153E27FF817D52FED8130A64E
50,394,405 UART: mbox::rt_entry...
50,395,358 UART: ____ _ _ _ ____ _____
50,397,258 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,399,446 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,401,346 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,403,268 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,405,111 UART: |_|
50,405,983 UART:
50,687,890 UART: [rt] Runtime listening for mailbox commands...
50,690,055 >>> mbox cmd response data (48 bytes)
50,690,632 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,692,946 >>> mbox cmd response data (48 bytes)
50,693,824 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,707,660 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,416 UART:
192,996 UART: Running Caliptra ROM ...
194,168 UART:
603,528 UART: [state] CFI Enabled
617,330 UART: [state] LifecycleState = Unprovisioned
619,280 UART: [state] DebugLocked = No
622,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,874 UART: [kat] SHA2-256
797,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,179 UART: [kat] ++
808,652 UART: [kat] sha1
821,161 UART: [kat] SHA2-256
823,811 UART: [kat] SHA2-384
830,227 UART: [kat] SHA2-512-ACC
832,763 UART: [kat] ECC-384
3,117,868 UART: [kat] HMAC-384Kdf
3,129,968 UART: [kat] LMS
4,320,117 UART: [kat] --
4,325,151 UART: [cold-reset] ++
4,327,243 UART: [fht] Storing FHT @ 0x50003400
4,339,503 UART: [idev] ++
4,340,068 UART: [idev] CDI.KEYID = 6
4,341,101 UART: [idev] SUBJECT.KEYID = 7
4,342,278 UART: [idev] UDS.KEYID = 0
4,343,337 ready_for_fw is high
4,343,545 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,580 UART: [idev] Erasing UDS.KEYID = 0
7,627,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,125 UART: [idev] --
7,654,689 UART: [ldev] ++
7,655,268 UART: [ldev] CDI.KEYID = 6
7,656,233 UART: [ldev] SUBJECT.KEYID = 5
7,657,445 UART: [ldev] AUTHORITY.KEYID = 7
7,658,679 UART: [ldev] FE.KEYID = 1
7,671,125 UART: [ldev] Erasing FE.KEYID = 1
10,960,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,325 UART: [ldev] --
13,320,759 UART: [fwproc] Waiting for Commands...
13,323,785 UART: [fwproc] Received command 0x46574c44
13,325,970 UART: [fwproc] Received Image of size 113844 bytes
17,374,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,767 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,648 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,839,820 >>> mbox cmd response: success
17,844,881 UART: [afmc] ++
17,845,482 UART: [afmc] CDI.KEYID = 6
17,846,421 UART: [afmc] SUBJECT.KEYID = 7
17,847,641 UART: [afmc] AUTHORITY.KEYID = 5
21,167,501 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,462,138 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,389 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,753 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,571 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,508,046 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,529,009 UART: [afmc] --
23,532,499 UART: [cold-reset] --
23,537,602 UART: [state] Locking Datavault
23,543,282 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,980 UART: [state] Locking ICCM
23,546,808 UART: [exit] Launching FMC @ 0x40000130
23,555,214 UART:
23,555,485 UART: Running Caliptra FMC ...
23,556,616 UART:
23,556,785 UART: [state] CFI Enabled
23,564,845 UART: [fht] FMC Alias Private Key: 7
25,896,310 UART: [art] Extend RT PCRs Done
25,897,531 UART: [art] Lock RT PCRs Done
25,899,404 UART: [art] Populate DV Done
25,905,030 UART: [fht] FMC Alias Private Key: 7
25,906,684 UART: [art] Derive CDI
25,907,426 UART: [art] Store in in slot 0x4
25,950,286 UART: [art] Derive Key Pair
25,951,286 UART: [art] Store priv key in slot 0x5
29,193,253 UART: [art] Derive Key Pair - Done
29,206,303 UART: [art] Signing Cert with AUTHO
29,207,606 UART: RITY.KEYID = 7
31,486,752 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,248 UART: [art] PUB.X = 8F8D2E80A0AB4A204027F455F773553C8BE621A942D586989A9390853E8F8B16CF59812741877043DBA77754C5644B71
31,495,475 UART: [art] PUB.Y = 01F40248D0C8034E6C3CDAE490B61730662ACF127DA0D1A04AB09F981393D704D1B7C610040F914084006A67DAA3D88E
31,502,720 UART: [art] SIG.R = 5D384A85F9F23A9737422229CBE51EEB880096BDF7D8D8C22400F89A4065D1EBF7F7FA75F31EC2B14982016221AE3CF2
31,510,064 UART: [art] SIG.S = BC4C1B5F4732C100134181D1C120A5FA9754592B890A9097CAA0A60570FBC95B989F49C44928A5D8449B3CD0B2ADB4CB
32,814,513 UART: Caliptra RT
32,815,232 UART: [state] CFI Enabled
32,933,010 UART: [rt] RT listening for mailbox commands...
32,935,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
32,966,704 UART: [rt]cmd =0x4d454153, len=108
32,984,994 >>> mbox cmd response data (12 bytes)
35,105,402 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,205,825 UART:
35,206,190 UART: Running Caliptra ROM ...
35,207,266 UART:
35,207,478 UART: [state] CFI Enabled
35,221,269 UART: [state] LifecycleState = Unprovisioned
35,223,164 UART: [state] DebugLocked = No
35,224,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,229,627 UART: [kat] SHA2-256
35,399,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,409,886 UART: [kat] ++
35,410,345 UART: [kat] sha1
35,420,256 UART: [kat] SHA2-256
35,422,999 UART: [kat] SHA2-384
35,428,769 UART: [kat] SHA2-512-ACC
35,431,172 UART: [kat] ECC-384
37,713,642 UART: [kat] HMAC-384Kdf
37,725,971 UART: [kat] LMS
38,916,006 UART: [kat] --
38,921,335 UART: [update-reset] ++
42,631,546 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,634,684 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,892,510 >>> mbox cmd response: success
42,892,880 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,893,701 UART: [update-reset] Copying MAN_2 To MAN_1
42,916,099 UART: [update-reset Success] --
42,921,986 UART: [state] Locking Datavault
42,926,054 UART: [state] Locking PCR0, PCR1 and PCR31
42,927,762 UART: [state] Locking ICCM
42,930,022 UART: [exit] Launching FMC @ 0x40000130
42,938,418 UART:
42,938,665 UART: Running Caliptra FMC ...
42,939,768 UART:
42,939,928 UART: [state] CFI Enabled
42,984,206 UART: [art] Extend RT PCRs Done
42,985,367 UART: [art] Lock RT PCRs Done
42,987,033 UART: [art] Populate DV Done
42,992,332 UART: [fht] FMC Alias Private Key: 7
42,994,024 UART: [art] Derive CDI
42,994,800 UART: [art] Store in in slot 0x4
43,037,878 UART: [art] Derive Key Pair
43,038,881 UART: [art] Store priv key in slot 0x5
46,280,791 UART: [art] Derive Key Pair - Done
46,293,678 UART: [art] Signing Cert with AUTHO
46,294,984 UART: RITY.KEYID = 7
48,574,151 UART: [art] Erasing AUTHORITY.KEYID = 7
48,575,654 UART: [art] PUB.X = E744140A51A115EDE309812C3102D8E6720F98401A39CFEE6BF7109ABC76B0CBDA7CA582D3C59B5957CE9B2BD54D01EF
48,582,918 UART: [art] PUB.Y = 1DF25E57A4D632E9FE8A248CEDABB99DFCCEDD5B1E99C467F607879C713ED090B195275F9C8387A0496388670FED3E05
48,590,206 UART: [art] SIG.R = FEA7E0CCFF38EEEC20D63466FB59FA63DEE2AF93D2F5210B89C7825EFE167D96014C5E94070EC2F0BB19CBBC150E4F41
48,597,649 UART: [art] SIG.S = 0ED558522178F719760BFE25930059F157A7D5F91C751D4D8620AC927C0DAE7193A995F938431955C0CDF9E8B68D3C63
49,902,450 UART: mbox::rt_entry...
49,903,434 UART: ____ _ _ _ ____ _____
49,905,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,907,371 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,909,226 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,911,151 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,913,030 UART: |_|
49,913,918 UART:
50,197,221 UART: [rt] Runtime listening for mailbox commands...
50,199,335 >>> mbox cmd response data (48 bytes)
50,199,925 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,202,240 >>> mbox cmd response data (48 bytes)
50,203,126 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,216,963 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,129,568 ready_for_fw is high
4,129,977 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,208 >>> mbox cmd response: success
23,711,201 UART:
23,711,612 UART: Running Caliptra FMC ...
23,712,815 UART:
23,712,988 UART: [state] CFI Enabled
23,720,503 UART: [fht] FMC Alias Private Key: 7
26,051,066 UART: [art] Extend RT PCRs Done
26,052,315 UART: [art] Lock RT PCRs Done
26,053,852 UART: [art] Populate DV Done
26,059,479 UART: [fht] FMC Alias Private Key: 7
26,061,188 UART: [art] Derive CDI
26,062,007 UART: [art] Store in in slot 0x4
26,104,716 UART: [art] Derive Key Pair
26,105,718 UART: [art] Store priv key in slot 0x5
29,347,480 UART: [art] Derive Key Pair - Done
29,360,210 UART: [art] Signing Cert with AUTHO
29,361,514 UART: RITY.KEYID = 7
31,640,564 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,071 UART: [art] PUB.X = C259D04021244D4848396046D860D115D77D19FC6BFFE2F9BF89911ED64A052C9D57596290CB17857C703273479D977F
31,649,349 UART: [art] PUB.Y = B87159318423DE6ED93B05E25E01160D79D46217B25012EA40227B6A4183FEA4F0881869A5462019546EA986942D95BE
31,656,543 UART: [art] SIG.R = 21D6E24FA512C93AF0FD5E78AD5DC1740B8D631B1A6A737BCF9B8FE01AA6E1F6734120B06BEA8DD19F8AFD028CFB24BE
31,663,955 UART: [art] SIG.S = CEE89F869C783275FE31AC40E5D431B7A33C2E6F47C9EBBFC42B7B63F944C206258E999658D20560466BDF5CDF099C48
32,969,384 UART: Caliptra RT
32,970,118 UART: [state] CFI Enabled
33,087,677 UART: [rt] RT listening for mailbox commands...
33,090,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,121,175 UART: [rt]cmd =0x4d454153, len=108
33,139,967 >>> mbox cmd response data (12 bytes)
35,260,810 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,152,765 >>> mbox cmd response: success
43,153,263 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,186,398 UART:
43,186,714 UART: Running Caliptra FMC ...
43,187,756 UART:
43,187,907 UART: [state] CFI Enabled
43,232,331 UART: [art] Extend RT PCRs Done
43,233,483 UART: [art] Lock RT PCRs Done
43,234,621 UART: [art] Populate DV Done
43,239,985 UART: [fht] FMC Alias Private Key: 7
43,241,582 UART: [art] Derive CDI
43,242,326 UART: [art] Store in in slot 0x4
43,284,871 UART: [art] Derive Key Pair
43,285,911 UART: [art] Store priv key in slot 0x5
46,528,020 UART: [art] Derive Key Pair - Done
46,540,805 UART: [art] Signing Cert with AUTHO
46,542,118 UART: RITY.KEYID = 7
48,821,580 UART: [art] Erasing AUTHORITY.KEYID = 7
48,823,118 UART: [art] PUB.X = B9A44E112694AC736AA3A6B5D836B1EA4F58DA1BF857517BBF9B761F9FF6F2D51C04F09B68610D2D4BD7FAF977D410AF
48,830,320 UART: [art] PUB.Y = D533BD41F0AD8B5F3253ECBB0226C9DF5480B0F38B1EAB2A5DAE26C8760C67066F8060508BE64E9F385B31A56A7B56A4
48,837,609 UART: [art] SIG.R = 7C03FFAA9B1D6E573E48A5AE59C2EBBCB80817CB39B094BF8F79D380AE8DD31AA291F89DFFA2F0D05DAC4C5BE91FE390
48,845,002 UART: [art] SIG.S = 1D17C73344FBFC505ACAE0039400BD043FDDF734271ED3A32C64B8516F7F3E7DBC806B5B96FF55C98E062A9950ABB2A3
50,149,832 UART: mbox::rt_entry...
50,150,792 UART: ____ _ _ _ ____ _____
50,152,731 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,154,738 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,156,600 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,158,530 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,160,413 UART: |_|
50,161,240 UART:
50,448,008 UART: [rt] Runtime listening for mailbox commands...
50,450,076 >>> mbox cmd response data (48 bytes)
50,450,642 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,452,959 >>> mbox cmd response data (48 bytes)
50,453,850 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,467,685 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,110 UART:
192,481 UART: Running Caliptra ROM ...
193,638 UART:
193,786 UART: [state] CFI Enabled
262,262 UART: [state] LifecycleState = Unprovisioned
264,183 UART: [state] DebugLocked = No
266,073 UART: [state] WD Timer not started. Device not locked for debugging
269,408 UART: [kat] SHA2-256
448,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,121 UART: [kat] ++
460,567 UART: [kat] sha1
471,812 UART: [kat] SHA2-256
474,820 UART: [kat] SHA2-384
481,945 UART: [kat] SHA2-512-ACC
484,878 UART: [kat] ECC-384
2,948,664 UART: [kat] HMAC-384Kdf
2,971,070 UART: [kat] LMS
3,500,497 UART: [kat] --
3,506,146 UART: [cold-reset] ++
3,507,447 UART: [fht] FHT @ 0x50003400
3,518,639 UART: [idev] ++
3,519,202 UART: [idev] CDI.KEYID = 6
3,520,189 UART: [idev] SUBJECT.KEYID = 7
3,521,360 UART: [idev] UDS.KEYID = 0
3,522,285 ready_for_fw is high
3,522,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,185 UART: [idev] Erasing UDS.KEYID = 0
6,023,484 UART: [idev] Sha1 KeyId Algorithm
6,046,234 UART: [idev] --
6,050,986 UART: [ldev] ++
6,051,570 UART: [ldev] CDI.KEYID = 6
6,052,482 UART: [ldev] SUBJECT.KEYID = 5
6,053,646 UART: [ldev] AUTHORITY.KEYID = 7
6,054,882 UART: [ldev] FE.KEYID = 1
6,100,997 UART: [ldev] Erasing FE.KEYID = 1
8,604,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,138 UART: [ldev] --
10,415,402 UART: [fwproc] Wait for Commands...
10,418,571 UART: [fwproc] Recv command 0x46574c44
10,420,698 UART: [fwproc] Recv'd Img size: 114168 bytes
13,823,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,638 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,378 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,285,562 >>> mbox cmd response: success
14,289,163 UART: [afmc] ++
14,289,759 UART: [afmc] CDI.KEYID = 6
14,290,673 UART: [afmc] SUBJECT.KEYID = 7
14,291,829 UART: [afmc] AUTHORITY.KEYID = 5
16,830,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,390 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,155 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,151 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,008 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,037 UART: [afmc] --
18,629,280 UART: [cold-reset] --
18,633,526 UART: [state] Locking Datavault
18,638,348 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,051 UART: [state] Locking ICCM
18,641,615 UART: [exit] Launching FMC @ 0x40000130
18,650,013 UART:
18,650,252 UART: Running Caliptra FMC ...
18,651,351 UART:
18,651,525 UART: [state] CFI Enabled
18,712,263 UART: [fht] FMC Alias Private Key: 7
20,476,042 UART: [art] Extend RT PCRs Done
20,477,272 UART: [art] Lock RT PCRs Done
20,478,872 UART: [art] Populate DV Done
20,484,177 UART: [fht] FMC Alias Private Key: 7
20,485,716 UART: [art] Derive CDI
20,486,529 UART: [art] Store in in slot 0x4
20,544,785 UART: [art] Derive Key Pair
20,545,849 UART: [art] Store priv key in slot 0x5
23,008,619 UART: [art] Derive Key Pair - Done
23,021,405 UART: [art] Signing Cert with AUTHO
23,022,716 UART: RITY.KEYID = 7
24,734,912 UART: [art] Erasing AUTHORITY.KEYID = 7
24,736,411 UART: [art] PUB.X = E7F4C3B932A269FD87B90999E1B6B45293618C19A74D45C7C3994B652EE8B67A8C101721AB6614D720FCC6D4AB892521
24,743,697 UART: [art] PUB.Y = B7678566BCD92DA8B2A0BDA1DC0519BDDEF1E38E71838FB337F1C4934280EC519BF21546970484DA6303A4BF78DB15C0
24,750,944 UART: [art] SIG.R = 2FF13515000EF7DCCD1887CD0677F7DBE814BF3CD255A518CED8C8BC201BECF0DCBF4762E6344F8635FDCB3D71D9F3A4
24,758,329 UART: [art] SIG.S = 4BB4560E0C3A5FED06D78D5349150EC1B7A78C9780870F11E022763E1388C7BD5113BD9920857D90615114F43132C81E
25,736,713 UART: Caliptra RT
25,737,403 UART: [state] CFI Enabled
25,904,072 UART: [rt] RT listening for mailbox commands...
25,906,429 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,937,906 UART: [rt]cmd =0x4d454153, len=108
25,956,764 >>> mbox cmd response data (12 bytes)
28,010,316 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,111,094 UART:
28,111,473 UART: Running Caliptra ROM ...
28,112,620 UART:
28,112,796 UART: [state] CFI Enabled
28,188,962 UART: [state] LifecycleState = Unprovisioned
28,190,836 UART: [state] DebugLocked = No
28,193,140 UART: [state] WD Timer not started. Device not locked for debugging
28,196,182 UART: [kat] SHA2-256
28,375,315 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,386,880 UART: [kat] ++
28,387,420 UART: [kat] sha1
28,399,408 UART: [kat] SHA2-256
28,402,416 UART: [kat] SHA2-384
28,407,371 UART: [kat] SHA2-512-ACC
28,410,322 UART: [kat] ECC-384
30,872,507 UART: [kat] HMAC-384Kdf
30,896,144 UART: [kat] LMS
31,425,572 UART: [kat] --
31,428,421 UART: [update-reset] ++
34,428,164 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,430,786 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,688,384 >>> mbox cmd response: success
34,688,746 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,690,105 UART: [update-reset] Copying MAN_2 To MAN_1
34,712,430 UART: [update-reset Success] --
34,716,931 UART: [state] Locking Datavault
34,719,744 UART: [state] Locking PCR0, PCR1 and PCR31
34,721,460 UART: [state] Locking ICCM
34,723,424 UART: [exit] Launching FMC @ 0x40000130
34,731,870 UART:
34,732,098 UART: Running Caliptra FMC ...
34,733,126 UART:
34,733,271 UART: [state] CFI Enabled
34,833,315 UART: [art] Extend RT PCRs Done
34,834,503 UART: [art] Lock RT PCRs Done
34,835,552 UART: [art] Populate DV Done
34,840,905 UART: [fht] FMC Alias Private Key: 7
34,842,436 UART: [art] Derive CDI
34,843,168 UART: [art] Store in in slot 0x4
34,902,536 UART: [art] Derive Key Pair
34,903,562 UART: [art] Store priv key in slot 0x5
37,366,653 UART: [art] Derive Key Pair - Done
37,379,874 UART: [art] Signing Cert with AUTHO
37,381,225 UART: RITY.KEYID = 7
39,092,425 UART: [art] Erasing AUTHORITY.KEYID = 7
39,093,933 UART: [art] PUB.X = 14DDC65D843663AFE14C05339D946D4588CB28E38BF86DA4DCD9FA94383EF1EC6440AF09CFDDFA5AF85C0D97E9195B0C
39,101,202 UART: [art] PUB.Y = B965B4DA29FA18848449DCE0B240BFFC3A994D706D30DAAB77003CF51FB8FCF84E5C99E7A88CF97AD6BB1B4B2690C0A7
39,108,503 UART: [art] SIG.R = A16E5BDC391A34FD246EE17EF3EDE7B6C7BE675305E5F8E5FFD7FFB0E2F95B71FCEB253E0C934052246B95F8695A38D8
39,115,910 UART: [art] SIG.S = 74048C94FB7A5C7219EDF0E5E926665D83CF3CA2A014A9F2364694B52529AFD500C512D269383404814D2BB3B118D427
40,094,467 UART: mbox::rt_entry...
40,095,425 UART: ____ _ _ _ ____ _____
40,097,514 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,099,541 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,101,478 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,103,411 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,105,338 UART: |_|
40,106,170 UART:
40,389,220 UART: [rt] Runtime listening for mailbox commands...
40,391,412 >>> mbox cmd response data (48 bytes)
40,392,017 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,394,386 >>> mbox cmd response data (48 bytes)
40,395,282 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,409,205 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,383,373 ready_for_fw is high
3,383,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,731 >>> mbox cmd response: success
18,367,074 UART:
18,367,494 UART: Running Caliptra FMC ...
18,368,632 UART:
18,368,800 UART: [state] CFI Enabled
18,433,874 UART: [fht] FMC Alias Private Key: 7
20,197,916 UART: [art] Extend RT PCRs Done
20,199,149 UART: [art] Lock RT PCRs Done
20,201,099 UART: [art] Populate DV Done
20,206,461 UART: [fht] FMC Alias Private Key: 7
20,208,010 UART: [art] Derive CDI
20,208,747 UART: [art] Store in in slot 0x4
20,266,659 UART: [art] Derive Key Pair
20,267,700 UART: [art] Store priv key in slot 0x5
22,730,439 UART: [art] Derive Key Pair - Done
22,742,969 UART: [art] Signing Cert with AUTHO
22,744,275 UART: RITY.KEYID = 7
24,457,067 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,574 UART: [art] PUB.X = 519B10F8626DE1833BE032773BEC1C7FB30103BEC48C2FC08E96FBB1F6138EE6CBB1E3B9904C9AFD5C2E468D8186B626
24,465,874 UART: [art] PUB.Y = AAA01ACE0D9402D2BB453F3BE41DEB2BA15CBF1922FFFFB332A049BD6EE30637576B75B82D961306CFF1E0E5844D8785
24,473,117 UART: [art] SIG.R = 74226CD1B0E52F881373D91FD357DC639EF90F047ECE799EF0CCA8AD1E340190FDC5A1BDE274D75F8EB6060C478D430C
24,480,543 UART: [art] SIG.S = B1CCFA993570E3F928D2457ADCE1F984C31E78DF405804AD4E28AD4FE9F6FF1184BD684C4218913456BF64B98C3EA675
25,459,206 UART: Caliptra RT
25,459,926 UART: [state] CFI Enabled
25,624,401 UART: [rt] RT listening for mailbox commands...
25,626,793 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,658,316 UART: [rt]cmd =0x4d454153, len=108
25,677,161 >>> mbox cmd response data (12 bytes)
27,729,962 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,257,657 >>> mbox cmd response: success
34,258,158 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,295,556 UART:
34,295,845 UART: Running Caliptra FMC ...
34,296,878 UART:
34,297,025 UART: [state] CFI Enabled
34,384,700 UART: [art] Extend RT PCRs Done
34,385,889 UART: [art] Lock RT PCRs Done
34,387,532 UART: [art] Populate DV Done
34,393,052 UART: [fht] FMC Alias Private Key: 7
34,394,775 UART: [art] Derive CDI
34,395,527 UART: [art] Store in in slot 0x4
34,453,851 UART: [art] Derive Key Pair
34,454,854 UART: [art] Store priv key in slot 0x5
36,917,684 UART: [art] Derive Key Pair - Done
36,930,733 UART: [art] Signing Cert with AUTHO
36,932,031 UART: RITY.KEYID = 7
38,643,623 UART: [art] Erasing AUTHORITY.KEYID = 7
38,645,143 UART: [art] PUB.X = B83D082E7098A5531AFD9703B3AE7CA2B23F5759E0B3942CCB939F84076F3F4C96F0867E1BFB12A813B222FB0D2B4D3E
38,652,446 UART: [art] PUB.Y = 1CF676B0A27EEE10DD8BFCC906ABD7C60712370DA66892232F42EF86A5EB8BBB9E4E7A084DD3F1090F81D14818DEE2E6
38,659,723 UART: [art] SIG.R = 37D0C7E4EA8013D916EA8204C5FCFD4ACE7A4853F82F14B4299D47C76C288A2276E73A3C442EAB08E33C377192DA6F22
38,667,106 UART: [art] SIG.S = FAA4DC0500C4008E4B750CA2C59F292D1DADD2FBC12A62CC453397EFDE685F158D1405837786EA4C493B9EDD05B9CC2B
39,645,474 UART: mbox::rt_entry...
39,646,438 UART: ____ _ _ _ ____ _____
39,648,369 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,650,375 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,652,306 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,654,237 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,656,163 UART: |_|
39,656,998 UART:
39,944,221 UART: [rt] Runtime listening for mailbox commands...
39,946,399 >>> mbox cmd response data (48 bytes)
39,946,973 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,949,290 >>> mbox cmd response data (48 bytes)
39,950,182 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,964,076 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,768 writing to cptra_bootfsm_go
193,047 UART:
193,435 UART: Running Caliptra ROM ...
194,540 UART:
604,076 UART: [state] CFI Enabled
619,412 UART: [state] LifecycleState = Unprovisioned
621,300 UART: [state] DebugLocked = No
622,608 UART: [state] WD Timer not started. Device not locked for debugging
626,014 UART: [kat] SHA2-256
805,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,704 UART: [kat] ++
817,152 UART: [kat] sha1
828,204 UART: [kat] SHA2-256
831,257 UART: [kat] SHA2-384
837,536 UART: [kat] SHA2-512-ACC
840,467 UART: [kat] ECC-384
3,284,443 UART: [kat] HMAC-384Kdf
3,298,408 UART: [kat] LMS
3,827,952 UART: [kat] --
3,831,733 UART: [cold-reset] ++
3,832,811 UART: [fht] FHT @ 0x50003400
3,842,792 UART: [idev] ++
3,843,359 UART: [idev] CDI.KEYID = 6
3,844,393 UART: [idev] SUBJECT.KEYID = 7
3,845,494 UART: [idev] UDS.KEYID = 0
3,846,419 ready_for_fw is high
3,846,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,076 UART: [idev] Erasing UDS.KEYID = 0
6,317,465 UART: [idev] Sha1 KeyId Algorithm
6,339,769 UART: [idev] --
6,342,616 UART: [ldev] ++
6,343,221 UART: [ldev] CDI.KEYID = 6
6,344,144 UART: [ldev] SUBJECT.KEYID = 5
6,345,252 UART: [ldev] AUTHORITY.KEYID = 7
6,346,537 UART: [ldev] FE.KEYID = 1
6,359,332 UART: [ldev] Erasing FE.KEYID = 1
8,831,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,041 UART: [ldev] --
10,622,613 UART: [fwproc] Wait for Commands...
10,624,277 UART: [fwproc] Recv command 0x46574c44
10,626,392 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,091,873 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,160,648 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,477,869 >>> mbox cmd response: success
14,483,021 UART: [afmc] ++
14,483,623 UART: [afmc] CDI.KEYID = 6
14,484,507 UART: [afmc] SUBJECT.KEYID = 7
14,485,722 UART: [afmc] AUTHORITY.KEYID = 5
16,987,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,765 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,502 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,600 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,453 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,054 UART: [afmc] --
18,785,828 UART: [cold-reset] --
18,789,956 UART: [state] Locking Datavault
18,795,307 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,008 UART: [state] Locking ICCM
18,798,764 UART: [exit] Launching FMC @ 0x40000130
18,807,211 UART:
18,807,442 UART: Running Caliptra FMC ...
18,808,467 UART:
18,808,616 UART: [state] CFI Enabled
18,817,045 UART: [fht] FMC Alias Private Key: 7
20,574,221 UART: [art] Extend RT PCRs Done
20,575,453 UART: [art] Lock RT PCRs Done
20,577,110 UART: [art] Populate DV Done
20,582,624 UART: [fht] FMC Alias Private Key: 7
20,584,254 UART: [art] Derive CDI
20,584,999 UART: [art] Store in in slot 0x4
20,627,850 UART: [art] Derive Key Pair
20,628,847 UART: [art] Store priv key in slot 0x5
23,055,552 UART: [art] Derive Key Pair - Done
23,068,865 UART: [art] Signing Cert with AUTHO
23,070,200 UART: RITY.KEYID = 7
24,776,029 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,541 UART: [art] PUB.X = 70E42DFCEC0FB0FF6FD80125FEF687B81B39A38F4CE0454006F224E8E531696E65E1D55462D253CD5A40E13B8F175778
24,784,797 UART: [art] PUB.Y = DDDDE7DDEC7FEDE988B994AC0647AA2CEF118AFF8DD259087EC72F2553695EF1EB3CDD5C1839F291266AA14AC9189DEC
24,792,085 UART: [art] SIG.R = 5C5EAF80C83DB8B4083239BF8F4D7FC1906BBCFF13799308C49C44EC2E50C1FEFA80155DEB0C2238380FFF95A1358E2C
24,799,496 UART: [art] SIG.S = CE89432A787692F2038ED83417192B036A9AE794F96AC6574296B5BBC57DF4549603B34C14233E32210A721E47FFF697
25,778,314 UART: Caliptra RT
25,779,005 UART: [state] CFI Enabled
25,896,618 UART: [rt] RT listening for mailbox commands...
25,898,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,930,179 UART: [rt]cmd =0x4d454153, len=108
25,948,700 >>> mbox cmd response data (12 bytes)
28,001,681 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,102,292 UART:
28,103,310 UART: Running Caliptra ROM ...
28,104,383 UART:
28,104,544 UART: [state] CFI Enabled
28,114,297 UART: [state] LifecycleState = Unprovisioned
28,116,143 UART: [state] DebugLocked = No
28,118,527 UART: [state] WD Timer not started. Device not locked for debugging
28,121,556 UART: [kat] SHA2-256
28,300,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,312,282 UART: [kat] ++
28,312,821 UART: [kat] sha1
28,325,570 UART: [kat] SHA2-256
28,328,642 UART: [kat] SHA2-384
28,335,651 UART: [kat] SHA2-512-ACC
28,338,644 UART: [kat] ECC-384
30,782,235 UART: [kat] HMAC-384Kdf
30,794,140 UART: [kat] LMS
31,323,684 UART: [kat] --
31,325,724 UART: [update-reset] ++
34,313,428 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,317,121 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,574,689 >>> mbox cmd response: success
34,575,048 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,576,362 UART: [update-reset] Copying MAN_2 To MAN_1
34,598,692 UART: [update-reset Success] --
34,604,850 UART: [state] Locking Datavault
34,609,400 UART: [state] Locking PCR0, PCR1 and PCR31
34,611,072 UART: [state] Locking ICCM
34,612,693 UART: [exit] Launching FMC @ 0x40000130
34,621,088 UART:
34,621,324 UART: Running Caliptra FMC ...
34,622,428 UART:
34,622,587 UART: [state] CFI Enabled
34,666,755 UART: [art] Extend RT PCRs Done
34,667,949 UART: [art] Lock RT PCRs Done
34,669,403 UART: [art] Populate DV Done
34,674,757 UART: [fht] FMC Alias Private Key: 7
34,676,348 UART: [art] Derive CDI
34,677,158 UART: [art] Store in in slot 0x4
34,719,640 UART: [art] Derive Key Pair
34,720,639 UART: [art] Store priv key in slot 0x5
37,147,226 UART: [art] Derive Key Pair - Done
37,159,995 UART: [art] Signing Cert with AUTHO
37,161,310 UART: RITY.KEYID = 7
38,866,546 UART: [art] Erasing AUTHORITY.KEYID = 7
38,868,046 UART: [art] PUB.X = 7583C833F32A31EC9600BFEB9F5A1D112B16B22737AA54014B9B1656926F3FC6B7CF4770C8FD8637CE6B4BB55D304A16
38,875,303 UART: [art] PUB.Y = DFF035B4337AF556F166CAB201CFFA1F1C24B6C291E93EB1205D0A42529B906AF777A1C74C8136EB29084CFAB8EED308
38,882,542 UART: [art] SIG.R = 917E1B922AEBEB374F5D6E3F44F611BE46496431245244C8895B253A2745ED520CDE97D2FF60626A139FB29FFFC09EFA
38,889,946 UART: [art] SIG.S = 07B997D735437A1B42E2595863EB05AFAB677CBCD5D8EF9D51E1B145C48CA0B2C6F5615E27E0288FD06AF19A8A132ED7
39,868,642 UART: mbox::rt_entry...
39,869,590 UART: ____ _ _ _ ____ _____
39,871,688 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,873,690 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,875,544 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,877,462 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,879,315 UART: |_|
39,880,193 UART:
40,166,847 UART: [rt] Runtime listening for mailbox commands...
40,169,017 >>> mbox cmd response data (48 bytes)
40,169,675 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,172,003 >>> mbox cmd response data (48 bytes)
40,172,899 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,186,798 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
3,701,897 ready_for_fw is high
3,702,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,201 >>> mbox cmd response: success
18,516,598 UART:
18,516,999 UART: Running Caliptra FMC ...
18,518,193 UART:
18,518,361 UART: [state] CFI Enabled
18,526,139 UART: [fht] FMC Alias Private Key: 7
20,282,887 UART: [art] Extend RT PCRs Done
20,284,112 UART: [art] Lock RT PCRs Done
20,285,586 UART: [art] Populate DV Done
20,291,210 UART: [fht] FMC Alias Private Key: 7
20,292,749 UART: [art] Derive CDI
20,293,565 UART: [art] Store in in slot 0x4
20,335,948 UART: [art] Derive Key Pair
20,336,990 UART: [art] Store priv key in slot 0x5
22,763,235 UART: [art] Derive Key Pair - Done
22,776,374 UART: [art] Signing Cert with AUTHO
22,777,686 UART: RITY.KEYID = 7
24,483,522 UART: [art] Erasing AUTHORITY.KEYID = 7
24,485,027 UART: [art] PUB.X = B373FC048DA74D9BC1E12EDABFA7C8FFE431502EBBD8F28F1128E5909EF640BF3CAF49B85BC2E4B51C4E28710A62C5B1
24,492,354 UART: [art] PUB.Y = 701917036B830A312CC2FAB6D1D290F912CEB41F2E74428CE89C9B10296861493F12D377FFA8FE823EC185E9CEEDA57B
24,499,580 UART: [art] SIG.R = F6DB77D7C94E6E08AB6513748AAF7B90F1F20A6620CFC5069819F65D9D6AD2EE9251C534019E8EE358D3CE41E51C5218
24,506,979 UART: [art] SIG.S = 725140F16F35A2CD91C07D2A541B64AED2661A95FF44B09A91C737118A27AF2500B4FDF67450A432A6AB0B466DD62510
25,486,136 UART: Caliptra RT
25,486,835 UART: [state] CFI Enabled
25,603,868 UART: [rt] RT listening for mailbox commands...
25,606,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,637,343 UART: [rt]cmd =0x4d454153, len=108
25,655,231 >>> mbox cmd response data (12 bytes)
27,709,871 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,153,358 >>> mbox cmd response: success
34,153,843 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,188,716 UART:
34,189,041 UART: Running Caliptra FMC ...
34,190,168 UART:
34,190,327 UART: [state] CFI Enabled
34,234,614 UART: [art] Extend RT PCRs Done
34,235,763 UART: [art] Lock RT PCRs Done
34,237,155 UART: [art] Populate DV Done
34,242,460 UART: [fht] FMC Alias Private Key: 7
34,244,155 UART: [art] Derive CDI
34,244,970 UART: [art] Store in in slot 0x4
34,287,841 UART: [art] Derive Key Pair
34,288,883 UART: [art] Store priv key in slot 0x5
36,714,946 UART: [art] Derive Key Pair - Done
36,727,997 UART: [art] Signing Cert with AUTHO
36,729,307 UART: RITY.KEYID = 7
38,434,963 UART: [art] Erasing AUTHORITY.KEYID = 7
38,436,484 UART: [art] PUB.X = 13CDF94F7CA12FB1053664F4E64F5ABCB4F9D48F2E35A09CBF129D3568A810A805EE0E7248FCEF866636C9B742844E7F
38,443,736 UART: [art] PUB.Y = C6DA6CD190D3C1BB39EF77739EC0C3EBF388B1E418CD56B513CED82E1BF41987F933B7560AC1A48DA53F2366F65A23D1
38,451,026 UART: [art] SIG.R = D218DC1BB2C6A9919F0779BE5DD4D6BA10BE9A2F07D69AC67A440010F68B31ACB195EFFB2B12677231208F70CAA65278
38,458,417 UART: [art] SIG.S = EA8BA6F0468E071E8DE21FCD32531B2E22A4FC1E5CB8D64C9847DA31D4AC395F3C9858FC4FFC2295A2E42D11F401A561
39,436,243 UART: mbox::rt_entry...
39,437,209 UART: ____ _ _ _ ____ _____
39,439,194 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,441,199 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,443,138 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,445,073 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,446,935 UART: |_|
39,447,823 UART:
39,733,691 UART: [rt] Runtime listening for mailbox commands...
39,735,856 >>> mbox cmd response data (48 bytes)
39,736,421 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,738,739 >>> mbox cmd response data (48 bytes)
39,739,628 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
39,753,553 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,101 UART:
192,458 UART: Running Caliptra ROM ...
193,611 UART:
193,759 UART: [state] CFI Enabled
265,568 UART: [state] LifecycleState = Unprovisioned
267,931 UART: [state] DebugLocked = No
270,109 UART: [state] WD Timer not started. Device not locked for debugging
273,801 UART: [kat] SHA2-256
463,647 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,450 UART: [kat] ++
474,981 UART: [kat] sha1
486,219 UART: [kat] SHA2-256
489,229 UART: [kat] SHA2-384
495,712 UART: [kat] SHA2-512-ACC
498,315 UART: [kat] ECC-384
2,947,949 UART: [kat] HMAC-384Kdf
2,970,491 UART: [kat] LMS
3,502,294 UART: [kat] --
3,505,150 UART: [cold-reset] ++
3,506,654 UART: [fht] FHT @ 0x50003400
3,517,925 UART: [idev] ++
3,518,557 UART: [idev] CDI.KEYID = 6
3,519,515 UART: [idev] SUBJECT.KEYID = 7
3,520,760 UART: [idev] UDS.KEYID = 0
3,521,906 ready_for_fw is high
3,522,102 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,704 UART: [idev] Erasing UDS.KEYID = 0
6,026,643 UART: [idev] Sha1 KeyId Algorithm
6,048,706 UART: [idev] --
6,053,844 UART: [ldev] ++
6,054,549 UART: [ldev] CDI.KEYID = 6
6,055,445 UART: [ldev] SUBJECT.KEYID = 5
6,056,660 UART: [ldev] AUTHORITY.KEYID = 7
6,057,798 UART: [ldev] FE.KEYID = 1
6,098,584 UART: [ldev] Erasing FE.KEYID = 1
8,605,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,239 UART: [ldev] --
10,414,419 UART: [fwproc] Wait for Commands...
10,416,139 UART: [fwproc] Recv command 0x46574c44
10,418,391 UART: [fwproc] Recv'd Img size: 114168 bytes
13,872,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,977 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,096 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,607,132 >>> mbox cmd response: success
14,610,790 UART: [afmc] ++
14,611,499 UART: [afmc] CDI.KEYID = 6
14,612,696 UART: [afmc] SUBJECT.KEYID = 7
14,614,196 UART: [afmc] AUTHORITY.KEYID = 5
17,152,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,702 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,910,953 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,018 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,836 UART: [afmc] --
18,967,783 UART: [cold-reset] --
18,972,311 UART: [state] Locking Datavault
18,977,796 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,034 UART: [state] Locking ICCM
18,982,411 UART: [exit] Launching FMC @ 0x40000130
18,991,058 UART:
18,991,346 UART: Running Caliptra FMC ...
18,992,459 UART:
18,992,620 UART: [state] CFI Enabled
19,051,029 UART: [fht] FMC Alias Private Key: 7
20,815,169 UART: [art] Extend RT PCRs Done
20,816,390 UART: [art] Lock RT PCRs Done
20,818,287 UART: [art] Populate DV Done
20,823,809 UART: [fht] FMC Alias Private Key: 7
20,825,337 UART: [art] Derive CDI
20,826,120 UART: [art] Store in in slot 0x4
20,884,079 UART: [art] Derive Key Pair
20,885,090 UART: [art] Store priv key in slot 0x5
23,348,003 UART: [art] Derive Key Pair - Done
23,361,251 UART: [art] Signing Cert with AUTHO
23,362,560 UART: RITY.KEYID = 7
25,074,444 UART: [art] Erasing AUTHORITY.KEYID = 7
25,075,958 UART: [art] PUB.X = CFF3DB9869BBF0B2798CF81DD18C4B40085E336BF384310D44790CE2DDC75CB6CB7BB8695320F77B94B9066D9B720F6F
25,083,231 UART: [art] PUB.Y = 99FC05E5CC35D6DFF251A903BDAB88450DB01352D0F9DEFC914C383BBCBFF7DEA4569BF297E04D1C45F8343B6C6B4A95
25,090,551 UART: [art] SIG.R = 5F6A4F1C55EB9B46D7058868E85311AC6D5BAAC8A7248204BA4E2B7BDF59B5104836CE4ECC42359E4A61F9463F09C192
25,097,923 UART: [art] SIG.S = 9DAC484FB3F39439D7FECA2BDE2229591F9690F483CC845A90D4C457294F01A64159543573C78EF22E8EFF65C82EC9F8
26,077,169 UART: Caliptra RT
26,077,884 UART: [state] CFI Enabled
26,243,038 UART: [rt] RT listening for mailbox commands...
26,245,415 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,276,793 UART: [rt]cmd =0x4d454153, len=108
26,295,598 >>> mbox cmd response data (12 bytes)
28,348,571 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,449,205 UART:
28,449,570 UART: Running Caliptra ROM ...
28,450,707 UART:
28,450,877 UART: [state] CFI Enabled
28,505,974 UART: [state] LifecycleState = Unprovisioned
28,508,021 UART: [state] DebugLocked = No
28,510,874 UART: [state] WD Timer not started. Device not locked for debugging
28,515,506 UART: [kat] SHA2-256
28,705,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,716,134 UART: [kat] ++
28,716,679 UART: [kat] sha1
28,728,715 UART: [kat] SHA2-256
28,731,693 UART: [kat] SHA2-384
28,738,337 UART: [kat] SHA2-512-ACC
28,740,931 UART: [kat] ECC-384
31,191,628 UART: [kat] HMAC-384Kdf
31,215,538 UART: [kat] LMS
31,747,120 UART: [kat] --
31,751,185 UART: [update-reset] ++
34,770,347 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,773,667 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,166,439 >>> mbox cmd response: success
35,166,811 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,167,853 UART: [update-reset] Copying MAN_2 To MAN_1
35,205,422 UART: [update-reset Success] --
35,211,543 UART: [state] Locking Datavault
35,213,779 UART: [state] Locking PCR0, PCR1 and PCR31
35,215,927 UART: [state] Locking ICCM
35,217,222 UART: [exit] Launching FMC @ 0x40000130
35,225,909 UART:
35,226,202 UART: Running Caliptra FMC ...
35,227,314 UART:
35,227,478 UART: [state] CFI Enabled
35,321,879 UART: [art] Extend RT PCRs Done
35,323,053 UART: [art] Lock RT PCRs Done
35,324,674 UART: [art] Populate DV Done
35,330,079 UART: [fht] FMC Alias Private Key: 7
35,331,671 UART: [art] Derive CDI
35,332,486 UART: [art] Store in in slot 0x4
35,391,172 UART: [art] Derive Key Pair
35,392,208 UART: [art] Store priv key in slot 0x5
37,855,114 UART: [art] Derive Key Pair - Done
37,867,954 UART: [art] Signing Cert with AUTHO
37,869,296 UART: RITY.KEYID = 7
39,581,513 UART: [art] Erasing AUTHORITY.KEYID = 7
39,583,016 UART: [art] PUB.X = 2D7618778AB915AEF10E0938F31496BA0DE6BD830FC0ADA9F6D539C27D19B6A662F0CCF5C643D2C05C73C057023B3240
39,590,302 UART: [art] PUB.Y = 02D6CCAE0C3453E328166F84A7DAD4F45A4F95E6F1428C43F2A2CB26A9DEE2B15028596B7B7BC7C3F5C636FFFEB0B67D
39,597,556 UART: [art] SIG.R = 39547E00D7C70822DB7D277A9791FCF5983E3122C2A79989720244D16B96F7C75673FA334D40EC85F57359789A52C2DF
39,604,933 UART: [art] SIG.S = BDAAF15B536E7D780FA0DA6A6046E7657706AA065ED1FC24DFB4A2FBE320FB23B85772029F60170A1E3E0AD5E4E1D74A
40,582,692 UART: mbox::rt_entry...
40,583,664 UART: ____ _ _ _ ____ _____
40,585,662 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,587,854 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,589,795 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,591,726 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,593,654 UART: |_|
40,594,464 UART:
40,877,705 UART: [rt] Runtime listening for mailbox commands...
40,879,877 >>> mbox cmd response data (48 bytes)
40,880,455 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,882,776 >>> mbox cmd response data (48 bytes)
40,883,675 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,897,778 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,434,131 ready_for_fw is high
3,434,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,732,113 >>> mbox cmd response: success
19,022,241 UART:
19,022,637 UART: Running Caliptra FMC ...
19,023,768 UART:
19,023,936 UART: [state] CFI Enabled
19,091,573 UART: [fht] FMC Alias Private Key: 7
20,855,474 UART: [art] Extend RT PCRs Done
20,856,719 UART: [art] Lock RT PCRs Done
20,858,212 UART: [art] Populate DV Done
20,863,680 UART: [fht] FMC Alias Private Key: 7
20,865,221 UART: [art] Derive CDI
20,865,954 UART: [art] Store in in slot 0x4
20,923,755 UART: [art] Derive Key Pair
20,924,795 UART: [art] Store priv key in slot 0x5
23,387,673 UART: [art] Derive Key Pair - Done
23,400,225 UART: [art] Signing Cert with AUTHO
23,401,526 UART: RITY.KEYID = 7
25,113,388 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,892 UART: [art] PUB.X = 1565CC8BD89AF455C1807C7F8784E6FCBEA6F70028621643FB331B03CDD907E6371E0C0220749A00C932379BF9F77243
25,122,070 UART: [art] PUB.Y = 086DBEB4C91B55C2359CF56C9CA8A7F0D13D9809906655E8AF7F923967E9090F1300D465C80CE1479947AD835D25D5DD
25,129,291 UART: [art] SIG.R = 57610B60E8CF2D20C75DE849E7A47441F2D98BEAA9D0BDE391311909D538F2D57A219E308905ED0E8BDC10945D390E58
25,136,680 UART: [art] SIG.S = DBCDC5B2F2576B5C0B5EB1720016BFC4CAA94C56C9C8B5CDCF680E0925A538A9BBCCEF06280BD1F405C9DB4629EC25F3
26,115,768 UART: Caliptra RT
26,116,474 UART: [state] CFI Enabled
26,281,854 UART: [rt] RT listening for mailbox commands...
26,284,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,315,650 UART: [rt]cmd =0x4d454153, len=108
26,334,021 >>> mbox cmd response data (12 bytes)
28,389,728 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,399,263 >>> mbox cmd response: success
35,399,924 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,432,801 UART:
35,433,138 UART: Running Caliptra FMC ...
35,434,263 UART:
35,434,426 UART: [state] CFI Enabled
35,529,450 UART: [art] Extend RT PCRs Done
35,530,642 UART: [art] Lock RT PCRs Done
35,531,922 UART: [art] Populate DV Done
35,537,400 UART: [fht] FMC Alias Private Key: 7
35,538,997 UART: [art] Derive CDI
35,539,811 UART: [art] Store in in slot 0x4
35,599,093 UART: [art] Derive Key Pair
35,600,140 UART: [art] Store priv key in slot 0x5
38,063,033 UART: [art] Derive Key Pair - Done
38,075,923 UART: [art] Signing Cert with AUTHO
38,077,265 UART: RITY.KEYID = 7
39,788,941 UART: [art] Erasing AUTHORITY.KEYID = 7
39,790,460 UART: [art] PUB.X = 55773D2321D1D992AF2E4AEFCBB536A3131A0F8FDCD69F718521FF32FDE1E51683D63A77780BEAB5CA080A5540CFEF66
39,797,702 UART: [art] PUB.Y = C80B43F2E3C881AD35AE67497B70BBF72E91DE44D97A19893C83FFA6E165A68D6933EAC21B8FAD78383941F37144FD24
39,804,979 UART: [art] SIG.R = F177144B6969301B8D38E4F640FCF8BBC6496CAF53739D9DA550AA50736181E71096B9A4E838D7DDEE52F9064D61808B
39,812,372 UART: [art] SIG.S = 44B38F56E539CCAF6A9C7B404A150068E158560FAE8BCC8499F3BE3CA7C3446B171786BC7FAFC071447724B3B3EB5884
40,791,131 UART: mbox::rt_entry...
40,792,071 UART: ____ _ _ _ ____ _____
40,794,055 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,796,064 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,797,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,799,921 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,801,774 UART: |_|
40,802,577 UART:
41,084,372 UART: [rt] Runtime listening for mailbox commands...
41,086,561 >>> mbox cmd response data (48 bytes)
41,087,157 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,089,481 >>> mbox cmd response data (48 bytes)
41,090,373 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,104,301 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,544 writing to cptra_bootfsm_go
192,749 UART:
193,125 UART: Running Caliptra ROM ...
194,271 UART:
603,855 UART: [state] CFI Enabled
617,605 UART: [state] LifecycleState = Unprovisioned
620,041 UART: [state] DebugLocked = No
621,426 UART: [state] WD Timer not started. Device not locked for debugging
625,119 UART: [kat] SHA2-256
814,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,603 UART: [kat] ++
826,205 UART: [kat] sha1
836,519 UART: [kat] SHA2-256
839,528 UART: [kat] SHA2-384
846,298 UART: [kat] SHA2-512-ACC
848,951 UART: [kat] ECC-384
3,288,356 UART: [kat] HMAC-384Kdf
3,301,511 UART: [kat] LMS
3,833,288 UART: [kat] --
3,838,229 UART: [cold-reset] ++
3,839,879 UART: [fht] FHT @ 0x50003400
3,851,590 UART: [idev] ++
3,852,302 UART: [idev] CDI.KEYID = 6
3,853,212 UART: [idev] SUBJECT.KEYID = 7
3,854,534 UART: [idev] UDS.KEYID = 0
3,855,470 ready_for_fw is high
3,855,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,917 UART: [idev] Erasing UDS.KEYID = 0
6,337,585 UART: [idev] Sha1 KeyId Algorithm
6,361,706 UART: [idev] --
6,365,324 UART: [ldev] ++
6,366,008 UART: [ldev] CDI.KEYID = 6
6,366,923 UART: [ldev] SUBJECT.KEYID = 5
6,368,081 UART: [ldev] AUTHORITY.KEYID = 7
6,369,314 UART: [ldev] FE.KEYID = 1
6,379,420 UART: [ldev] Erasing FE.KEYID = 1
8,855,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,088 UART: [ldev] --
10,650,160 UART: [fwproc] Wait for Commands...
10,652,527 UART: [fwproc] Recv command 0x46574c44
10,654,862 UART: [fwproc] Recv'd Img size: 114168 bytes
14,093,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,976 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,107 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,772 >>> mbox cmd response: success
14,834,054 UART: [afmc] ++
14,834,766 UART: [afmc] CDI.KEYID = 6
14,835,954 UART: [afmc] SUBJECT.KEYID = 7
14,837,387 UART: [afmc] AUTHORITY.KEYID = 5
17,344,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,675 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,850 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,019 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,116,012 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,146 UART: [afmc] --
19,142,886 UART: [cold-reset] --
19,146,227 UART: [state] Locking Datavault
19,152,727 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,921 UART: [state] Locking ICCM
19,156,374 UART: [exit] Launching FMC @ 0x40000130
19,165,049 UART:
19,165,295 UART: Running Caliptra FMC ...
19,166,395 UART:
19,166,561 UART: [state] CFI Enabled
19,174,624 UART: [fht] FMC Alias Private Key: 7
20,931,900 UART: [art] Extend RT PCRs Done
20,933,113 UART: [art] Lock RT PCRs Done
20,934,790 UART: [art] Populate DV Done
20,940,152 UART: [fht] FMC Alias Private Key: 7
20,941,632 UART: [art] Derive CDI
20,942,393 UART: [art] Store in in slot 0x4
20,985,201 UART: [art] Derive Key Pair
20,986,237 UART: [art] Store priv key in slot 0x5
23,414,123 UART: [art] Derive Key Pair - Done
23,427,227 UART: [art] Signing Cert with AUTHO
23,428,536 UART: RITY.KEYID = 7
25,134,257 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,759 UART: [art] PUB.X = 633A24328E505E9BAA467948CD01B9C2188B8B20157543AE6308E10950005BD205B0E7B3FC5A46FD4F97167AE3CFD2EC
25,143,009 UART: [art] PUB.Y = 34745A0844A9ECDEB64A79F284B9340C20F23211C11523116A5334DBD94263BA45E67C9E14389D4593EC55EF3CB5249B
25,150,297 UART: [art] SIG.R = 4F086EBF40D9E8F48B7CB095270381890CD198988AF70534174F3D5133A4084F098C165A23B971A642788E0CE7F4D520
25,157,651 UART: [art] SIG.S = 0513C24F26F1DFD43F228CA2A64099CC30773D95A6BE2CFC65B10917BA45D9AFC2AF30578415E475310DD8CD97C85FEA
26,136,719 UART: Caliptra RT
26,137,411 UART: [state] CFI Enabled
26,255,543 UART: [rt] RT listening for mailbox commands...
26,257,665 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,288,832 UART: [rt]cmd =0x4d454153, len=108
26,306,961 >>> mbox cmd response data (12 bytes)
28,358,576 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,459,071 UART:
28,459,420 UART: Running Caliptra ROM ...
28,460,551 UART:
28,460,736 UART: [state] CFI Enabled
28,476,542 UART: [state] LifecycleState = Unprovisioned
28,478,386 UART: [state] DebugLocked = No
28,481,285 UART: [state] WD Timer not started. Device not locked for debugging
28,486,399 UART: [kat] SHA2-256
28,676,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,687,057 UART: [kat] ++
28,687,580 UART: [kat] sha1
28,699,817 UART: [kat] SHA2-256
28,702,836 UART: [kat] SHA2-384
28,709,853 UART: [kat] SHA2-512-ACC
28,712,432 UART: [kat] ECC-384
31,153,101 UART: [kat] HMAC-384Kdf
31,166,957 UART: [kat] LMS
31,698,600 UART: [kat] --
31,702,260 UART: [update-reset] ++
34,720,823 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,724,331 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,117,091 >>> mbox cmd response: success
35,117,475 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,118,358 UART: [update-reset] Copying MAN_2 To MAN_1
35,155,928 UART: [update-reset Success] --
35,161,548 UART: [state] Locking Datavault
35,164,271 UART: [state] Locking PCR0, PCR1 and PCR31
35,166,419 UART: [state] Locking ICCM
35,168,066 UART: [exit] Launching FMC @ 0x40000130
35,176,740 UART:
35,176,977 UART: Running Caliptra FMC ...
35,178,036 UART:
35,178,187 UART: [state] CFI Enabled
35,222,095 UART: [art] Extend RT PCRs Done
35,223,274 UART: [art] Lock RT PCRs Done
35,224,864 UART: [art] Populate DV Done
35,230,404 UART: [fht] FMC Alias Private Key: 7
35,232,114 UART: [art] Derive CDI
35,232,935 UART: [art] Store in in slot 0x4
35,275,419 UART: [art] Derive Key Pair
35,276,420 UART: [art] Store priv key in slot 0x5
37,702,883 UART: [art] Derive Key Pair - Done
37,715,717 UART: [art] Signing Cert with AUTHO
37,717,020 UART: RITY.KEYID = 7
39,422,475 UART: [art] Erasing AUTHORITY.KEYID = 7
39,423,977 UART: [art] PUB.X = CD6493872E4FC6453B98B79EF0DBDC4CFBC842B57FF0D4ED7D56351FF0A8A7D30763FD096471E1D6EABF5D91CB01F0D0
39,431,276 UART: [art] PUB.Y = A558C2954BC36BE0AE8E64D28B9B7B947FB71A1A49F118CE404EA13D8B2F0194E72BDC4C8715324E2EDB7FED09C13D9F
39,438,558 UART: [art] SIG.R = 1A9B752899E51FFDD6C2C4A83E041208E41158970FF671682F4CF488737D71D6FD64A4536CBB4D01F647B3A68E20826B
39,445,957 UART: [art] SIG.S = 3F1349CDA3AB0A7F89A6311D2AA41F1EF1096E3891072C9546B17EFFCF264D6E01FEB930283A7679E38B8201C5ADD554
40,424,540 UART: mbox::rt_entry...
40,425,491 UART: ____ _ _ _ ____ _____
40,427,471 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,429,505 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,431,438 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,433,370 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,435,298 UART: |_|
40,436,132 UART:
40,724,751 UART: [rt] Runtime listening for mailbox commands...
40,726,889 >>> mbox cmd response data (48 bytes)
40,727,491 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,729,820 >>> mbox cmd response data (48 bytes)
40,730,718 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,744,611 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,845 writing to cptra_bootfsm_go
3,754,709 ready_for_fw is high
3,755,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,944,890 >>> mbox cmd response: success
19,196,417 UART:
19,196,805 UART: Running Caliptra FMC ...
19,197,911 UART:
19,198,063 UART: [state] CFI Enabled
19,206,248 UART: [fht] FMC Alias Private Key: 7
20,962,673 UART: [art] Extend RT PCRs Done
20,963,898 UART: [art] Lock RT PCRs Done
20,965,795 UART: [art] Populate DV Done
20,971,265 UART: [fht] FMC Alias Private Key: 7
20,972,801 UART: [art] Derive CDI
20,973,633 UART: [art] Store in in slot 0x4
21,015,908 UART: [art] Derive Key Pair
21,016,948 UART: [art] Store priv key in slot 0x5
23,443,645 UART: [art] Derive Key Pair - Done
23,456,420 UART: [art] Signing Cert with AUTHO
23,457,716 UART: RITY.KEYID = 7
25,163,176 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,675 UART: [art] PUB.X = 1F0F303AB0110EF88C2575C352C5C28835F2141F1F93694C14E8B40AC4402FE1C23E84B33D0DB86A52BA835AEC994E5E
25,171,924 UART: [art] PUB.Y = 4BCF3039B7AA89DA77141022197B45E329273F9F42EE5D984CEBE8EE1DC43C0FD7F2824D960704FE11DAF85D8B9F442D
25,179,186 UART: [art] SIG.R = FF272AEB6C5ECB07731E86A458B0791EE0BE29ED7CE111EA4D6BF4E1C13D3BC42FCE7C241B78BA00FF911A062B665522
25,186,587 UART: [art] SIG.S = DCDFCDBC908A19274AF13C43BB375C58CC9456622AA15E886996ED9A7F8809E06AF1D2FF8C10004460FF74A62F1AA3D4
26,165,805 UART: Caliptra RT
26,166,487 UART: [state] CFI Enabled
26,283,756 UART: [rt] RT listening for mailbox commands...
26,286,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,317,307 UART: [rt]cmd =0x4d454153, len=108
26,336,197 >>> mbox cmd response data (12 bytes)
28,387,778 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,306,997 >>> mbox cmd response: success
35,307,492 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,341,736 UART:
35,342,057 UART: Running Caliptra FMC ...
35,343,186 UART:
35,343,363 UART: [state] CFI Enabled
35,387,273 UART: [art] Extend RT PCRs Done
35,388,419 UART: [art] Lock RT PCRs Done
35,389,862 UART: [art] Populate DV Done
35,395,432 UART: [fht] FMC Alias Private Key: 7
35,396,934 UART: [art] Derive CDI
35,397,748 UART: [art] Store in in slot 0x4
35,440,302 UART: [art] Derive Key Pair
35,441,339 UART: [art] Store priv key in slot 0x5
37,868,512 UART: [art] Derive Key Pair - Done
37,881,614 UART: [art] Signing Cert with AUTHO
37,882,919 UART: RITY.KEYID = 7
39,588,034 UART: [art] Erasing AUTHORITY.KEYID = 7
39,589,540 UART: [art] PUB.X = D16065652B8C2BC67848C3A9F5F05EE3277C1F4019A0F3F2EE34426EF36B59A34329A4EBD928F0DED2C836DD36E46DAF
39,596,783 UART: [art] PUB.Y = DD9ABE5E12A4B507B25B187BE4C934E4099103C3279C8D8A237DE1DCDF2899EFF3E4854E580700B7CEDEF255A46DF48C
39,604,069 UART: [art] SIG.R = 09AFC005842C5CA09AD5779887F84B1B9CFC781C2B70AC8779813DA63160B9F63E018152CAC6FD432CE9CA3A9E1F3ABE
39,611,465 UART: [art] SIG.S = 4B040FDB56B4438A05AD93B3D338BF381F61E696D8284964EA796107E773DBFBE120BA1AA87A08B740370EC37068154F
40,590,722 UART: mbox::rt_entry...
40,591,684 UART: ____ _ _ _ ____ _____
40,593,664 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,595,594 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,597,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,599,392 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,601,315 UART: |_|
40,602,121 UART:
40,890,439 UART: [rt] Runtime listening for mailbox commands...
40,892,605 >>> mbox cmd response data (48 bytes)
40,893,179 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,895,500 >>> mbox cmd response data (48 bytes)
40,896,430 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,910,562 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,407 UART: [kat] SHA2-256
892,345 UART: [kat] SHA2-384
895,026 UART: [kat] SHA2-512-ACC
896,927 UART: [kat] ECC-384
902,310 UART: [kat] HMAC-384Kdf
906,982 UART: [kat] LMS
1,475,178 UART: [kat] --
1,475,993 UART: [cold-reset] ++
1,476,363 UART: [fht] Storing FHT @ 0x50003400
1,478,928 UART: [idev] ++
1,479,096 UART: [idev] CDI.KEYID = 6
1,479,456 UART: [idev] SUBJECT.KEYID = 7
1,479,880 UART: [idev] UDS.KEYID = 0
1,480,225 ready_for_fw is high
1,480,225 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,936 UART: [idev] Erasing UDS.KEYID = 0
1,504,540 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,170 UART: [idev] --
1,514,041 UART: [ldev] ++
1,514,209 UART: [ldev] CDI.KEYID = 6
1,514,572 UART: [ldev] SUBJECT.KEYID = 5
1,514,998 UART: [ldev] AUTHORITY.KEYID = 7
1,515,461 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,788 UART: [ldev] --
1,585,197 UART: [fwproc] Waiting for Commands...
1,585,964 UART: [fwproc] Received command 0x46574c44
1,586,755 UART: [fwproc] Received Image of size 114168 bytes
2,883,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,893 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,868 >>> mbox cmd response: success
3,076,002 UART: [afmc] ++
3,076,170 UART: [afmc] CDI.KEYID = 6
3,076,532 UART: [afmc] SUBJECT.KEYID = 7
3,076,957 UART: [afmc] AUTHORITY.KEYID = 5
3,111,780 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,976 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,756 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,484 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,369 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,059 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,892 UART: [afmc] --
3,154,794 UART: [cold-reset] --
3,155,738 UART: [state] Locking Datavault
3,157,049 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,653 UART: [state] Locking ICCM
3,158,159 UART: [exit] Launching FMC @ 0x40000130
3,163,488 UART:
3,163,504 UART: Running Caliptra FMC ...
3,163,912 UART:
3,163,966 UART: [state] CFI Enabled
3,174,341 UART: [fht] FMC Alias Private Key: 7
3,281,572 UART: [art] Extend RT PCRs Done
3,282,000 UART: [art] Lock RT PCRs Done
3,283,432 UART: [art] Populate DV Done
3,291,611 UART: [fht] FMC Alias Private Key: 7
3,292,781 UART: [art] Derive CDI
3,293,061 UART: [art] Store in in slot 0x4
3,379,244 UART: [art] Derive Key Pair
3,379,604 UART: [art] Store priv key in slot 0x5
3,392,468 UART: [art] Derive Key Pair - Done
3,407,201 UART: [art] Signing Cert with AUTHO
3,407,681 UART: RITY.KEYID = 7
3,422,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,738 UART: [art] PUB.X = C19F119C442ABC34633B116AC0202ADE8B7AC98D2355A072B7547553B967AC546D1ABEED60A453BEBAC1BF989CE2CCB4
3,430,526 UART: [art] PUB.Y = C3189ECC9CE09FDFABAE2C10A59DDEFA052CEFD06214ACDDD913D0DE379F75D6D713137BA7444B2D5C768AE509509757
3,437,492 UART: [art] SIG.R = 0B8BFDA39313EDC8488C1B2853C7AF318E8B7E3A48F272FA76399A126B2E6EA6B4BB947D35CA0E4D3A949006016AE0DA
3,444,264 UART: [art] SIG.S = 26977CFBCB3C0C9255B8FC33290E21D8F508C630031B2232BB57253FDE4D79D80D3FFBB1BC39F5D03FA736CB4249FD34
3,468,330 UART: Caliptra RT
3,468,583 UART: [state] CFI Enabled
3,576,579 UART: [rt] RT listening for mailbox commands...
3,577,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,831 UART: [rt]cmd =0x4d454153, len=108
3,628,342 >>> mbox cmd response data (12 bytes)
3,628,343 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,151 UART:
3,629,167 UART: Running Caliptra ROM ...
3,629,575 UART:
3,629,629 UART: [state] CFI Enabled
3,632,141 UART: [state] LifecycleState = Unprovisioned
3,632,796 UART: [state] DebugLocked = No
3,633,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,635,011 UART: [kat] SHA2-256
4,428,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,433,057 UART: [kat] ++
4,433,209 UART: [kat] sha1
4,437,281 UART: [kat] SHA2-256
4,439,219 UART: [kat] SHA2-384
4,441,894 UART: [kat] SHA2-512-ACC
4,443,794 UART: [kat] ECC-384
4,449,201 UART: [kat] HMAC-384Kdf
4,453,889 UART: [kat] LMS
5,022,085 UART: [kat] --
5,022,810 UART: [update-reset] ++
5,947,124 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,948,194 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,044,370 >>> mbox cmd response: success
6,044,370 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,044,501 UART: [update-reset] Copying MAN_2 To MAN_1
6,052,515 UART: [update-reset Success] --
6,053,432 UART: [state] Locking Datavault
6,054,052 UART: [state] Locking PCR0, PCR1 and PCR31
6,054,656 UART: [state] Locking ICCM
6,055,278 UART: [exit] Launching FMC @ 0x40000130
6,060,607 UART:
6,060,623 UART: Running Caliptra FMC ...
6,061,031 UART:
6,061,085 UART: [state] CFI Enabled
6,149,876 UART: [art] Extend RT PCRs Done
6,150,304 UART: [art] Lock RT PCRs Done
6,151,783 UART: [art] Populate DV Done
6,159,804 UART: [fht] FMC Alias Private Key: 7
6,160,802 UART: [art] Derive CDI
6,161,082 UART: [art] Store in in slot 0x4
6,246,681 UART: [art] Derive Key Pair
6,247,041 UART: [art] Store priv key in slot 0x5
6,259,963 UART: [art] Derive Key Pair - Done
6,274,601 UART: [art] Signing Cert with AUTHO
6,275,081 UART: RITY.KEYID = 7
6,290,109 UART: [art] Erasing AUTHORITY.KEYID = 7
6,290,874 UART: [art] PUB.X = BB94D875A24646AB1FE78DA692AF8AC7BFC107A78527E994ACF25E2281FE5529D0D864053B8284B53EDBD1B60E376BF2
6,297,647 UART: [art] PUB.Y = 9279781A73B2067C96C118ACE61B5910B326CBBCFF40A210CD2405CF403F75A598946C23D861FDBFD31D4F5181762573
6,304,591 UART: [art] SIG.R = 471C92736C8E6C2B3BAEBFFB87946E83729956CCACAC2C0F16083262A425A86FD8EC15BBBDCC7C35433774773A914DDE
6,311,369 UART: [art] SIG.S = C87EA983526D926116B4F1A65F968A5E663AB240FDFD3DF5AD40D63F5267CDE13F9CF120A2F03D975649CCDB1CFF1574
6,334,804 UART: mbox::rt_entry...
6,335,176 UART: ____ _ _ _ ____ _____
6,335,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,336,760 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,337,528 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,338,296 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,339,064 UART: |_|
6,339,376 UART:
6,619,246 UART: [rt] Runtime listening for mailbox commands...
6,620,436 >>> mbox cmd response data (48 bytes)
6,620,437 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,623,220 >>> mbox cmd response data (48 bytes)
6,623,221 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,638,358 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,005 ready_for_fw is high
1,363,005 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,156 >>> mbox cmd response: success
2,986,920 UART:
2,986,936 UART: Running Caliptra FMC ...
2,987,344 UART:
2,987,398 UART: [state] CFI Enabled
2,998,001 UART: [fht] FMC Alias Private Key: 7
3,106,324 UART: [art] Extend RT PCRs Done
3,106,752 UART: [art] Lock RT PCRs Done
3,108,340 UART: [art] Populate DV Done
3,116,599 UART: [fht] FMC Alias Private Key: 7
3,117,617 UART: [art] Derive CDI
3,117,897 UART: [art] Store in in slot 0x4
3,203,182 UART: [art] Derive Key Pair
3,203,542 UART: [art] Store priv key in slot 0x5
3,216,632 UART: [art] Derive Key Pair - Done
3,231,224 UART: [art] Signing Cert with AUTHO
3,231,704 UART: RITY.KEYID = 7
3,247,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,209 UART: [art] PUB.X = 2EC8499066DC9F9EF3C3D2060C78AB4E0FF2F1B20021819F8FC93265BE5AA329840A8DC64895323AEC122C665C43278D
3,254,949 UART: [art] PUB.Y = 51809F3AD1BD6823B12B9775AB10B83897B60EF3E645830EA9DC69F24F844FABF09A49BE5EE90F43BE3B2965FE5033A2
3,261,900 UART: [art] SIG.R = E9FECE55CB047FF380F99F221180493E4C246F6F153D9660C6073CB30E4D070E91E9DBC5AC5D9C5FB959C99DC2BB85AC
3,268,671 UART: [art] SIG.S = B86F78D6E659FD6C98EC72015350840FF70BC79D90F23C625BAE7B49DEAE5B6A1CE3C38CA859895125C37A9BF0222F32
3,291,803 UART: Caliptra RT
3,292,056 UART: [state] CFI Enabled
3,399,080 UART: [rt] RT listening for mailbox commands...
3,399,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,036 UART: [rt]cmd =0x4d454153, len=108
3,450,657 >>> mbox cmd response data (12 bytes)
3,450,658 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,749,611 >>> mbox cmd response: success
5,749,611 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,763,026 UART:
5,763,042 UART: Running Caliptra FMC ...
5,763,450 UART:
5,763,504 UART: [state] CFI Enabled
5,852,685 UART: [art] Extend RT PCRs Done
5,853,113 UART: [art] Lock RT PCRs Done
5,854,324 UART: [art] Populate DV Done
5,862,517 UART: [fht] FMC Alias Private Key: 7
5,863,567 UART: [art] Derive CDI
5,863,847 UART: [art] Store in in slot 0x4
5,949,508 UART: [art] Derive Key Pair
5,949,868 UART: [art] Store priv key in slot 0x5
5,963,454 UART: [art] Derive Key Pair - Done
5,978,326 UART: [art] Signing Cert with AUTHO
5,978,806 UART: RITY.KEYID = 7
5,993,336 UART: [art] Erasing AUTHORITY.KEYID = 7
5,994,101 UART: [art] PUB.X = 96A0B6300693C1453D481347CD900A32D0F5BA4271A6ADB65EF5FEC6AD17CDA4BF701C5864CAD8209DCC32E2AE85BC61
6,000,881 UART: [art] PUB.Y = A1C6B279EAE77BE5BD86DC7E349E813E536B471D6B9EB1C21DE0FF40BB18B32EDEBD78A3AC01D8EF38570A6FB08639BC
6,007,851 UART: [art] SIG.R = B9917DFC8825C4B223F627BEC7ECBB035CE852BE6E5676BAE1F811E7ECAA5760252F925DA9A32741660EEDB56CCA8A7A
6,014,635 UART: [art] SIG.S = 0E021DDEFE03491DE1C25D3CEC90FA341ECD0497984E789A99827EF105D5086E919A90D563F96CFC099EDAB57C027410
6,038,682 UART: mbox::rt_entry...
6,039,054 UART: ____ _ _ _ ____ _____
6,039,838 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,040,638 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,041,406 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,042,174 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,042,942 UART: |_|
6,043,254 UART:
6,325,290 UART: [rt] Runtime listening for mailbox commands...
6,326,480 >>> mbox cmd response data (48 bytes)
6,326,481 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,329,264 >>> mbox cmd response data (48 bytes)
6,329,265 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,344,402 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,510 UART: [kat] SHA2-256
882,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,556 UART: [kat] ++
886,708 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,667 UART: [kat] SHA2-512-ACC
897,568 UART: [kat] ECC-384
903,159 UART: [kat] HMAC-384Kdf
907,881 UART: [kat] LMS
1,476,077 UART: [kat] --
1,477,118 UART: [cold-reset] ++
1,477,520 UART: [fht] Storing FHT @ 0x50003400
1,480,433 UART: [idev] ++
1,480,601 UART: [idev] CDI.KEYID = 6
1,480,961 UART: [idev] SUBJECT.KEYID = 7
1,481,385 UART: [idev] UDS.KEYID = 0
1,481,730 ready_for_fw is high
1,481,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,599 UART: [idev] Erasing UDS.KEYID = 0
1,506,537 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,085 UART: [idev] --
1,516,296 UART: [ldev] ++
1,516,464 UART: [ldev] CDI.KEYID = 6
1,516,827 UART: [ldev] SUBJECT.KEYID = 5
1,517,253 UART: [ldev] AUTHORITY.KEYID = 7
1,517,716 UART: [ldev] FE.KEYID = 1
1,522,886 UART: [ldev] Erasing FE.KEYID = 1
1,548,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,375 UART: [ldev] --
1,587,780 UART: [fwproc] Waiting for Commands...
1,588,411 UART: [fwproc] Received command 0x46574c44
1,589,202 UART: [fwproc] Received Image of size 114168 bytes
2,886,054 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,472 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,129 >>> mbox cmd response: success
3,078,195 UART: [afmc] ++
3,078,363 UART: [afmc] CDI.KEYID = 6
3,078,725 UART: [afmc] SUBJECT.KEYID = 7
3,079,150 UART: [afmc] AUTHORITY.KEYID = 5
3,114,585 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,049 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,829 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,557 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,442 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,132 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,111 UART: [afmc] --
3,158,153 UART: [cold-reset] --
3,158,897 UART: [state] Locking Datavault
3,160,080 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,684 UART: [state] Locking ICCM
3,161,244 UART: [exit] Launching FMC @ 0x40000130
3,166,573 UART:
3,166,589 UART: Running Caliptra FMC ...
3,166,997 UART:
3,167,140 UART: [state] CFI Enabled
3,177,753 UART: [fht] FMC Alias Private Key: 7
3,286,108 UART: [art] Extend RT PCRs Done
3,286,536 UART: [art] Lock RT PCRs Done
3,288,080 UART: [art] Populate DV Done
3,296,027 UART: [fht] FMC Alias Private Key: 7
3,297,147 UART: [art] Derive CDI
3,297,427 UART: [art] Store in in slot 0x4
3,383,438 UART: [art] Derive Key Pair
3,383,798 UART: [art] Store priv key in slot 0x5
3,397,410 UART: [art] Derive Key Pair - Done
3,412,589 UART: [art] Signing Cert with AUTHO
3,413,069 UART: RITY.KEYID = 7
3,428,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,146 UART: [art] PUB.X = D8F9A9E8C665068D66AB0AADC270F8760A4C1F8FB44A3AD1ACC875A23D691F96059F64080457346A967EE62F8BFB0FBD
3,435,909 UART: [art] PUB.Y = 90D28C47FF3BB60DE042A4E1633283C2E5769D85E1774A8D9A0083E92129C3803B445DBE9EDD141D38EFC64C12C29FB0
3,442,840 UART: [art] SIG.R = B8484FD2735C6DCCDB53F404D8B343B9058CF1E3514B06A0453467DD20146929762C32936ACCF5749298C9E4DC3651F5
3,449,599 UART: [art] SIG.S = B626E8BE07C2E2F08AB9033DAC2777EFFECFC7EFA10CCCE2097B3125B34213A3BA3C1D162446F7EB611FE350E7ABB68B
3,474,030 UART: Caliptra RT
3,474,375 UART: [state] CFI Enabled
3,582,207 UART: [rt] RT listening for mailbox commands...
3,582,877 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,509 UART: [rt]cmd =0x4d454153, len=108
3,634,574 >>> mbox cmd response data (12 bytes)
3,634,575 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,635,339 UART:
3,635,355 UART: Running Caliptra ROM ...
3,635,763 UART:
3,635,904 UART: [state] CFI Enabled
3,638,686 UART: [state] LifecycleState = Unprovisioned
3,639,341 UART: [state] DebugLocked = No
3,639,883 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,641,512 UART: [kat] SHA2-256
4,435,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,439,558 UART: [kat] ++
4,439,710 UART: [kat] sha1
4,443,830 UART: [kat] SHA2-256
4,445,768 UART: [kat] SHA2-384
4,448,477 UART: [kat] SHA2-512-ACC
4,450,377 UART: [kat] ECC-384
4,456,000 UART: [kat] HMAC-384Kdf
4,460,754 UART: [kat] LMS
5,028,950 UART: [kat] --
5,029,661 UART: [update-reset] ++
5,952,573 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,953,685 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,049,861 >>> mbox cmd response: success
6,049,861 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,050,058 UART: [update-reset] Copying MAN_2 To MAN_1
6,058,072 UART: [update-reset Success] --
6,059,197 UART: [state] Locking Datavault
6,059,957 UART: [state] Locking PCR0, PCR1 and PCR31
6,060,561 UART: [state] Locking ICCM
6,061,185 UART: [exit] Launching FMC @ 0x40000130
6,066,514 UART:
6,066,530 UART: Running Caliptra FMC ...
6,066,938 UART:
6,067,081 UART: [state] CFI Enabled
6,156,184 UART: [art] Extend RT PCRs Done
6,156,612 UART: [art] Lock RT PCRs Done
6,158,031 UART: [art] Populate DV Done
6,166,402 UART: [fht] FMC Alias Private Key: 7
6,167,364 UART: [art] Derive CDI
6,167,644 UART: [art] Store in in slot 0x4
6,253,339 UART: [art] Derive Key Pair
6,253,699 UART: [art] Store priv key in slot 0x5
6,267,163 UART: [art] Derive Key Pair - Done
6,281,948 UART: [art] Signing Cert with AUTHO
6,282,428 UART: RITY.KEYID = 7
6,297,544 UART: [art] Erasing AUTHORITY.KEYID = 7
6,298,309 UART: [art] PUB.X = F9CB7C22A3523A78ECCE7A2404B26A22BE9AF3136A3C6CC71909147504C583A386E5A851FBA60981CFF901D2F69AA97A
6,305,074 UART: [art] PUB.Y = AD809A6990FEC55FC271624E4FF1E5C7B21489A1694B8B4AC93F8E8AC6B218FCDE4C00B465660F64D3A149E9528EDD34
6,312,011 UART: [art] SIG.R = 67E0794B84A1C664023D1FF29AC7423B0C18E2B228A74808A599BC54C8AFFEE9FA32BB396E322D11B2AE0864C0CCE43C
6,318,781 UART: [art] SIG.S = 414FD26AC94ECF7AE1AA3CBE100AF59606BBF8757B51937F145E534C5D0550A62C844C298AAF711367124DDA95852197
6,342,719 UART: mbox::rt_entry...
6,343,091 UART: ____ _ _ _ ____ _____
6,343,875 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,344,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,345,443 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,346,211 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,346,979 UART: |_|
6,347,291 UART:
6,628,778 UART: [rt] Runtime listening for mailbox commands...
6,629,968 >>> mbox cmd response data (48 bytes)
6,629,969 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,632,752 >>> mbox cmd response data (48 bytes)
6,632,753 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,647,890 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,348 ready_for_fw is high
1,363,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,195 >>> mbox cmd response: success
2,989,119 UART:
2,989,135 UART: Running Caliptra FMC ...
2,989,543 UART:
2,989,686 UART: [state] CFI Enabled
3,000,395 UART: [fht] FMC Alias Private Key: 7
3,107,682 UART: [art] Extend RT PCRs Done
3,108,110 UART: [art] Lock RT PCRs Done
3,109,632 UART: [art] Populate DV Done
3,117,895 UART: [fht] FMC Alias Private Key: 7
3,119,073 UART: [art] Derive CDI
3,119,353 UART: [art] Store in in slot 0x4
3,205,136 UART: [art] Derive Key Pair
3,205,496 UART: [art] Store priv key in slot 0x5
3,218,336 UART: [art] Derive Key Pair - Done
3,233,163 UART: [art] Signing Cert with AUTHO
3,233,643 UART: RITY.KEYID = 7
3,248,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,612 UART: [art] PUB.X = AB7EF77640B8C012B0A26282A3900C48262E79C632AD6BA73E3C2CCFCA3C0EE83A08539905BFF32FFDBCE62358B9B7B7
3,256,386 UART: [art] PUB.Y = 737DE2978BA37957EB62D293435468E1FED96BAA821F9491BA63375B747F2F46748575EE35BBDBBE26AC69B0AEF0B5EA
3,263,348 UART: [art] SIG.R = D9268B511A68F7D557E236E264B4BFC1D54AE8537557965E45C4DE6BA49004FA2D9DC47DC524F46368CD7164AE8655C7
3,270,119 UART: [art] SIG.S = 28D5B234DEADD3B47B75CDC451CB9CBAE5DB0581F47277828E08ED4C7BBDF976F9F935CFF331DEDB0F132C50F1483D3E
3,294,061 UART: Caliptra RT
3,294,406 UART: [state] CFI Enabled
3,402,737 UART: [rt] RT listening for mailbox commands...
3,403,407 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,989 UART: [rt]cmd =0x4d454153, len=108
3,454,244 >>> mbox cmd response data (12 bytes)
3,454,245 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,751,385 >>> mbox cmd response: success
5,751,385 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,764,268 UART:
5,764,284 UART: Running Caliptra FMC ...
5,764,692 UART:
5,764,835 UART: [state] CFI Enabled
5,854,564 UART: [art] Extend RT PCRs Done
5,854,992 UART: [art] Lock RT PCRs Done
5,856,209 UART: [art] Populate DV Done
5,864,648 UART: [fht] FMC Alias Private Key: 7
5,865,648 UART: [art] Derive CDI
5,865,928 UART: [art] Store in in slot 0x4
5,951,731 UART: [art] Derive Key Pair
5,952,091 UART: [art] Store priv key in slot 0x5
5,965,871 UART: [art] Derive Key Pair - Done
5,980,712 UART: [art] Signing Cert with AUTHO
5,981,192 UART: RITY.KEYID = 7
5,996,694 UART: [art] Erasing AUTHORITY.KEYID = 7
5,997,459 UART: [art] PUB.X = ED54989748FF429F766EE60D80A26118ABC38D810FA0C7F194C34C376528802F103251B6F4A20061E9C6CA2B18300A5D
6,004,196 UART: [art] PUB.Y = 77CDD4A1870CAC03FF8EDE4E58A2BC52430239EB2A9FFFD31966A99E0A8A78E09E7AD0C60C49D22391126362A2E71992
6,011,141 UART: [art] SIG.R = 369F026B5CAC7E575083F2D2A11B8E9777A2ADDD790ED89AE7591B4A4A754B30F93C29F632768C46974F9B0A0FAC8B0B
6,017,906 UART: [art] SIG.S = 9AE97CA8A63091830A5749C9881AF38D503325D108CC025E3D5B536A5EDB69B09FFB04AEEB2A44315393D7449DBBAAAD
6,041,137 UART: mbox::rt_entry...
6,041,509 UART: ____ _ _ _ ____ _____
6,042,293 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,043,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,043,861 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,044,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,045,397 UART: |_|
6,045,709 UART:
6,330,127 UART: [rt] Runtime listening for mailbox commands...
6,331,317 >>> mbox cmd response data (48 bytes)
6,331,318 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,334,101 >>> mbox cmd response data (48 bytes)
6,334,102 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,349,239 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
85,973 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
892,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,921 UART: [kat] ++
897,073 UART: [kat] sha1
901,195 UART: [kat] SHA2-256
903,135 UART: [kat] SHA2-384
905,874 UART: [kat] SHA2-512-ACC
907,775 UART: [kat] ECC-384
917,568 UART: [kat] HMAC-384Kdf
922,178 UART: [kat] LMS
1,170,506 UART: [kat] --
1,171,409 UART: [cold-reset] ++
1,171,931 UART: [fht] FHT @ 0x50003400
1,174,536 UART: [idev] ++
1,174,704 UART: [idev] CDI.KEYID = 6
1,175,064 UART: [idev] SUBJECT.KEYID = 7
1,175,488 UART: [idev] UDS.KEYID = 0
1,175,833 ready_for_fw is high
1,175,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,352 UART: [idev] Erasing UDS.KEYID = 0
1,200,003 UART: [idev] Sha1 KeyId Algorithm
1,208,411 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,912 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,215,969 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,382 UART: [fwproc] Wait for Commands...
1,282,062 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,779 >>> mbox cmd response: success
2,772,885 UART: [afmc] ++
2,773,053 UART: [afmc] CDI.KEYID = 6
2,773,415 UART: [afmc] SUBJECT.KEYID = 7
2,773,840 UART: [afmc] AUTHORITY.KEYID = 5
2,809,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,652 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,380 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,265 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,984 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,852 UART: [afmc] --
2,852,966 UART: [cold-reset] --
2,853,890 UART: [state] Locking Datavault
2,855,103 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,707 UART: [state] Locking ICCM
2,856,163 UART: [exit] Launching FMC @ 0x40000130
2,861,492 UART:
2,861,508 UART: Running Caliptra FMC ...
2,861,916 UART:
2,861,970 UART: [state] CFI Enabled
2,872,301 UART: [fht] FMC Alias Private Key: 7
2,979,492 UART: [art] Extend RT PCRs Done
2,979,920 UART: [art] Lock RT PCRs Done
2,981,394 UART: [art] Populate DV Done
2,989,621 UART: [fht] FMC Alias Private Key: 7
2,990,663 UART: [art] Derive CDI
2,990,943 UART: [art] Store in in slot 0x4
3,076,278 UART: [art] Derive Key Pair
3,076,638 UART: [art] Store priv key in slot 0x5
3,089,942 UART: [art] Derive Key Pair - Done
3,104,515 UART: [art] Signing Cert with AUTHO
3,104,995 UART: RITY.KEYID = 7
3,120,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,320 UART: [art] PUB.X = 968FE5E25BD57765BD20FAFEFD96C3AC9591AC6E7A0F3510118ED92594A39633421FF449CE6DC2BB981E63C80A2778C9
3,128,094 UART: [art] PUB.Y = 48ADAA79E29A9E8F15FF4BFEF29F3AE85B278BD145633B6A7AEA850F96BF8E7B32000385C704CCA842E31FF8E8B2763B
3,135,031 UART: [art] SIG.R = C6DDEDA02CD26E04F13EE88E118C2DDC039664AB368CEF74B2C7AE06DAD968AAF17433310649F39A94CC8EAB42FA4F9C
3,141,813 UART: [art] SIG.S = EC3D47AF6C4F0569C755203352B5967B090033AC8CC50106CA6E28F499B73C1DD770E800E6A02412D0FD5639331E7518
3,165,746 UART: Caliptra RT
3,165,999 UART: [state] CFI Enabled
3,274,349 UART: [rt] RT listening for mailbox commands...
3,275,019 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,375 UART: [rt]cmd =0x4d454153, len=108
3,326,358 >>> mbox cmd response data (12 bytes)
3,326,359 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,312 UART:
3,327,328 UART: Running Caliptra ROM ...
3,327,736 UART:
3,327,791 UART: [state] CFI Enabled
3,330,325 UART: [state] LifecycleState = Unprovisioned
3,330,980 UART: [state] DebugLocked = No
3,331,708 UART: [state] WD Timer not started. Device not locked for debugging
3,333,040 UART: [kat] SHA2-256
4,138,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,142,815 UART: [kat] ++
4,142,967 UART: [kat] sha1
4,147,127 UART: [kat] SHA2-256
4,149,067 UART: [kat] SHA2-384
4,151,922 UART: [kat] SHA2-512-ACC
4,153,822 UART: [kat] ECC-384
4,163,775 UART: [kat] HMAC-384Kdf
4,168,359 UART: [kat] LMS
4,416,687 UART: [kat] --
4,417,507 UART: [update-reset] ++
5,319,235 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,320,246 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,416,370 >>> mbox cmd response: success
5,416,370 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,416,501 UART: [update-reset] Copying MAN_2 To MAN_1
5,424,515 UART: [update-reset Success] --
5,425,394 UART: [state] Locking Datavault
5,426,160 UART: [state] Locking PCR0, PCR1 and PCR31
5,426,764 UART: [state] Locking ICCM
5,427,400 UART: [exit] Launching FMC @ 0x40000130
5,432,729 UART:
5,432,745 UART: Running Caliptra FMC ...
5,433,153 UART:
5,433,207 UART: [state] CFI Enabled
5,522,360 UART: [art] Extend RT PCRs Done
5,522,788 UART: [art] Lock RT PCRs Done
5,524,189 UART: [art] Populate DV Done
5,532,266 UART: [fht] FMC Alias Private Key: 7
5,533,216 UART: [art] Derive CDI
5,533,496 UART: [art] Store in in slot 0x4
5,619,231 UART: [art] Derive Key Pair
5,619,591 UART: [art] Store priv key in slot 0x5
5,632,687 UART: [art] Derive Key Pair - Done
5,647,502 UART: [art] Signing Cert with AUTHO
5,647,982 UART: RITY.KEYID = 7
5,663,522 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,287 UART: [art] PUB.X = 09FAB614A1F6733A77A39CE722D6DCF0DF722FA234CBE281CADB9266D1AD81B7C458A99F0E92AF0B07BA2ADA9C296D4F
5,671,069 UART: [art] PUB.Y = 136AB4AAB81DAF21B8F5C640886F8114419520545BE11B3DCECC87451EB1324393873DA6C13937FFE358024E4B04449F
5,678,013 UART: [art] SIG.R = 31934E686D85F0A1842319F2864E6D3B4ABA7016B27CB739C559DD790396DFCED82ED26282B15195E1B0EFAAA12FF415
5,684,786 UART: [art] SIG.S = D3A69DB11C3B9C039E94564117A691CC3B8D6EE51328985F4BC59216F188244CCF080C62AF23082EEFCFACBC2544D257
5,708,943 UART: mbox::rt_entry...
5,709,315 UART: ____ _ _ _ ____ _____
5,710,099 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,710,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,711,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,712,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,713,203 UART: |_|
5,713,515 UART:
5,993,441 UART: [rt] Runtime listening for mailbox commands...
5,994,631 >>> mbox cmd response data (48 bytes)
5,994,632 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,997,415 >>> mbox cmd response data (48 bytes)
5,997,416 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,012,553 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 ready_for_fw is high
1,060,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,432 >>> mbox cmd response: success
2,688,668 UART:
2,688,684 UART: Running Caliptra FMC ...
2,689,092 UART:
2,689,146 UART: [state] CFI Enabled
2,699,687 UART: [fht] FMC Alias Private Key: 7
2,807,754 UART: [art] Extend RT PCRs Done
2,808,182 UART: [art] Lock RT PCRs Done
2,809,924 UART: [art] Populate DV Done
2,818,161 UART: [fht] FMC Alias Private Key: 7
2,819,159 UART: [art] Derive CDI
2,819,439 UART: [art] Store in in slot 0x4
2,904,954 UART: [art] Derive Key Pair
2,905,314 UART: [art] Store priv key in slot 0x5
2,918,478 UART: [art] Derive Key Pair - Done
2,933,327 UART: [art] Signing Cert with AUTHO
2,933,807 UART: RITY.KEYID = 7
2,949,057 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,822 UART: [art] PUB.X = D38D0AA086F4FCF1E89EA0AC6D856C8DE3F62E9637AEDCB6D4BA7200B5B89E8F571A21BF1B32EFF09C18B2A63B6D2B6E
2,956,595 UART: [art] PUB.Y = 9E0B7314A854875419BE8A685D5DBBE4F6B825ABD84DD6544FE4C79C7AF6DEB84B4509C0C25385101EE9310C83F50A9A
2,963,543 UART: [art] SIG.R = 03C3E18B17B0B54D37A89060AEE873C5A2AB4603EB9BA3B5CDE97057046C20BB4E3FA6367ED272CA885B9DC9F15D0DC5
2,970,317 UART: [art] SIG.S = 84101C390362C7862B439ECE2B0FBF67B9FCBC7A87E096E4005D2B252E77A5A17AA716B0780472BDF78186899400FFC4
2,994,339 UART: Caliptra RT
2,994,592 UART: [state] CFI Enabled
3,103,057 UART: [rt] RT listening for mailbox commands...
3,103,727 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,079 UART: [rt]cmd =0x4d454153, len=108
3,154,690 >>> mbox cmd response data (12 bytes)
3,154,691 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,128,555 >>> mbox cmd response: success
5,128,555 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,142,009 UART:
5,142,025 UART: Running Caliptra FMC ...
5,142,433 UART:
5,142,487 UART: [state] CFI Enabled
5,231,416 UART: [art] Extend RT PCRs Done
5,231,844 UART: [art] Lock RT PCRs Done
5,233,211 UART: [art] Populate DV Done
5,241,242 UART: [fht] FMC Alias Private Key: 7
5,242,268 UART: [art] Derive CDI
5,242,548 UART: [art] Store in in slot 0x4
5,328,013 UART: [art] Derive Key Pair
5,328,373 UART: [art] Store priv key in slot 0x5
5,341,427 UART: [art] Derive Key Pair - Done
5,356,152 UART: [art] Signing Cert with AUTHO
5,356,632 UART: RITY.KEYID = 7
5,372,462 UART: [art] Erasing AUTHORITY.KEYID = 7
5,373,227 UART: [art] PUB.X = 2438326E0B90054BF2DD7C3FB024DFFE9473289E3EAC01817404841624BA245C55E82A0ABA51AE067EE348D9E3A7572C
5,379,983 UART: [art] PUB.Y = 607136B0C790BA95C20644ECE83D895D515060A9B432157F7DF1C22233B2DFA3DD1FA4F6BE134448A9BC5EBFEAA4A0F1
5,386,944 UART: [art] SIG.R = EE85006438A2F91C80C71FB961C43FB2AE0F8973C25F9DFCC4325FAC1CD898403126B863CE8D42CEBCF85BCD9FC76090
5,393,705 UART: [art] SIG.S = E27C14D4EAE16C853EEEABF53698F5974376A31022D653FA44867E3B474279CA3BDEBEEFCDEA6721798D87C7E5E72928
5,417,478 UART: mbox::rt_entry...
5,417,850 UART: ____ _ _ _ ____ _____
5,418,634 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,419,434 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,420,202 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,420,970 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,421,738 UART: |_|
5,422,050 UART:
5,703,009 UART: [rt] Runtime listening for mailbox commands...
5,704,199 >>> mbox cmd response data (48 bytes)
5,704,200 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,706,983 >>> mbox cmd response data (48 bytes)
5,706,984 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,722,121 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,082 UART: [kat] SHA2-256
904,022 UART: [kat] SHA2-384
906,575 UART: [kat] SHA2-512-ACC
908,476 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
923,203 UART: [kat] LMS
1,171,531 UART: [kat] --
1,172,248 UART: [cold-reset] ++
1,172,826 UART: [fht] FHT @ 0x50003400
1,175,393 UART: [idev] ++
1,175,561 UART: [idev] CDI.KEYID = 6
1,175,921 UART: [idev] SUBJECT.KEYID = 7
1,176,345 UART: [idev] UDS.KEYID = 0
1,176,690 ready_for_fw is high
1,176,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,671 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,222 UART: [idev] --
1,211,312 UART: [ldev] ++
1,211,480 UART: [ldev] CDI.KEYID = 6
1,211,843 UART: [ldev] SUBJECT.KEYID = 5
1,212,269 UART: [ldev] AUTHORITY.KEYID = 7
1,212,732 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,244,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,106 UART: [ldev] --
1,283,547 UART: [fwproc] Wait for Commands...
1,284,239 UART: [fwproc] Recv command 0x46574c44
1,284,967 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,181 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,004 >>> mbox cmd response: success
2,774,252 UART: [afmc] ++
2,774,420 UART: [afmc] CDI.KEYID = 6
2,774,782 UART: [afmc] SUBJECT.KEYID = 7
2,775,207 UART: [afmc] AUTHORITY.KEYID = 5
2,810,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,587 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,315 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,200 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,919 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,651 UART: [afmc] --
2,853,659 UART: [cold-reset] --
2,854,647 UART: [state] Locking Datavault
2,856,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,636 UART: [state] Locking ICCM
2,857,202 UART: [exit] Launching FMC @ 0x40000130
2,862,531 UART:
2,862,547 UART: Running Caliptra FMC ...
2,862,955 UART:
2,863,098 UART: [state] CFI Enabled
2,873,681 UART: [fht] FMC Alias Private Key: 7
2,981,368 UART: [art] Extend RT PCRs Done
2,981,796 UART: [art] Lock RT PCRs Done
2,983,442 UART: [art] Populate DV Done
2,991,737 UART: [fht] FMC Alias Private Key: 7
2,992,833 UART: [art] Derive CDI
2,993,113 UART: [art] Store in in slot 0x4
3,078,728 UART: [art] Derive Key Pair
3,079,088 UART: [art] Store priv key in slot 0x5
3,093,006 UART: [art] Derive Key Pair - Done
3,107,643 UART: [art] Signing Cert with AUTHO
3,108,123 UART: RITY.KEYID = 7
3,123,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,770 UART: [art] PUB.X = 4454DD42107F48E701AD15B6FD4D599670AE5A828272C27818B13AE06A2D205A3AF2166B3E8D25637932F5FC71C83D84
3,130,535 UART: [art] PUB.Y = 78AEA73F74A71019D5511A812E7D585ED370AF2EC21F331DD3DB648B5D9C43E2AA1E96B254EC7F4A3001B227DA82851C
3,137,492 UART: [art] SIG.R = CD24F6F901610CFDD244F3B709293CBC4978036EDD4CF22D374F640A18C68A8AAE2DA3019A8F39E2F65DFD6878401394
3,144,252 UART: [art] SIG.S = E691031357E68C52A8FFFC15CA820027D1FC9C31C579B50F79243D04C066FE2B60E6696C8B9DAD1C1287AE4E71D5B641
3,167,596 UART: Caliptra RT
3,167,941 UART: [state] CFI Enabled
3,276,511 UART: [rt] RT listening for mailbox commands...
3,277,181 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,407 UART: [rt]cmd =0x4d454153, len=108
3,327,844 >>> mbox cmd response data (12 bytes)
3,327,845 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,584 UART:
3,328,600 UART: Running Caliptra ROM ...
3,329,008 UART:
3,329,150 UART: [state] CFI Enabled
3,332,566 UART: [state] LifecycleState = Unprovisioned
3,333,221 UART: [state] DebugLocked = No
3,333,803 UART: [state] WD Timer not started. Device not locked for debugging
3,335,041 UART: [kat] SHA2-256
4,140,691 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,144,816 UART: [kat] ++
4,144,968 UART: [kat] sha1
4,149,296 UART: [kat] SHA2-256
4,151,236 UART: [kat] SHA2-384
4,153,943 UART: [kat] SHA2-512-ACC
4,155,843 UART: [kat] ECC-384
4,165,762 UART: [kat] HMAC-384Kdf
4,170,410 UART: [kat] LMS
4,418,738 UART: [kat] --
4,419,452 UART: [update-reset] ++
5,321,708 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,322,741 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,418,865 >>> mbox cmd response: success
5,418,865 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,419,192 UART: [update-reset] Copying MAN_2 To MAN_1
5,427,206 UART: [update-reset Success] --
5,428,393 UART: [state] Locking Datavault
5,429,265 UART: [state] Locking PCR0, PCR1 and PCR31
5,429,869 UART: [state] Locking ICCM
5,430,519 UART: [exit] Launching FMC @ 0x40000130
5,435,848 UART:
5,435,864 UART: Running Caliptra FMC ...
5,436,272 UART:
5,436,415 UART: [state] CFI Enabled
5,525,636 UART: [art] Extend RT PCRs Done
5,526,064 UART: [art] Lock RT PCRs Done
5,527,163 UART: [art] Populate DV Done
5,535,392 UART: [fht] FMC Alias Private Key: 7
5,536,538 UART: [art] Derive CDI
5,536,818 UART: [art] Store in in slot 0x4
5,622,467 UART: [art] Derive Key Pair
5,622,827 UART: [art] Store priv key in slot 0x5
5,636,003 UART: [art] Derive Key Pair - Done
5,650,726 UART: [art] Signing Cert with AUTHO
5,651,206 UART: RITY.KEYID = 7
5,666,592 UART: [art] Erasing AUTHORITY.KEYID = 7
5,667,357 UART: [art] PUB.X = 99923E545241F083A714F742B950FB43C05356D3FAAF115EDF076155F0F47FEAF921FA3974C59C570EDE15AF44989C88
5,674,123 UART: [art] PUB.Y = D99B138C530FB276BEBF9A57E922E5AD3DD8E9F06157E2EA478006638FDE873683C7ED65FE1E92779CD76DFF340D2675
5,681,074 UART: [art] SIG.R = F54FE372723742C0650EDE0F2AF8047850392145B3AB2E4DFDCB1CF30C95DC3C9494173D4BB3168A5574FFEF9482C5C8
5,687,840 UART: [art] SIG.S = CD867D324406793F306729305173956A1ED71FEA3FAAAC34FE42A39339840B11A9330F8DAD4063866EB8BC9786E835E6
5,711,676 UART: mbox::rt_entry...
5,712,048 UART: ____ _ _ _ ____ _____
5,712,832 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,713,632 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,714,400 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,715,168 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,715,936 UART: |_|
5,716,248 UART:
5,996,073 UART: [rt] Runtime listening for mailbox commands...
5,997,263 >>> mbox cmd response data (48 bytes)
5,997,264 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,000,047 >>> mbox cmd response data (48 bytes)
6,000,048 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,015,185 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,826 ready_for_fw is high
1,060,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,981 >>> mbox cmd response: success
2,687,241 UART:
2,687,257 UART: Running Caliptra FMC ...
2,687,665 UART:
2,687,808 UART: [state] CFI Enabled
2,698,785 UART: [fht] FMC Alias Private Key: 7
2,806,382 UART: [art] Extend RT PCRs Done
2,806,810 UART: [art] Lock RT PCRs Done
2,808,512 UART: [art] Populate DV Done
2,816,487 UART: [fht] FMC Alias Private Key: 7
2,817,593 UART: [art] Derive CDI
2,817,873 UART: [art] Store in in slot 0x4
2,903,534 UART: [art] Derive Key Pair
2,903,894 UART: [art] Store priv key in slot 0x5
2,916,490 UART: [art] Derive Key Pair - Done
2,931,548 UART: [art] Signing Cert with AUTHO
2,932,028 UART: RITY.KEYID = 7
2,947,214 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,979 UART: [art] PUB.X = BD1CEA2115D5CA79F051A449394C5338DD0CCB2634217A25973768B93EB2FEED7A00291FBFAFA4B8A23624BDAFA93B4B
2,954,742 UART: [art] PUB.Y = CB1903E039E240E4B03C386E7E3B0147C28EF5FE85716EE4E2E53B434E47153B09436B207389A06BA2CC17E7A321786D
2,961,683 UART: [art] SIG.R = 95F8800CC662959E859DE85F20F9C48523EC1B978C03E118EC54C7F5935AE6FAF881EE9B5BC4D41656B89C7E0822924E
2,968,448 UART: [art] SIG.S = 64DFAA143947449635F0F1A32EF3981B54C613722AF53A35A06ADC80B36849AE7FE1B9F5A6D017419E25AF6FD02292FE
2,991,897 UART: Caliptra RT
2,992,242 UART: [state] CFI Enabled
3,100,693 UART: [rt] RT listening for mailbox commands...
3,101,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,935 UART: [rt]cmd =0x4d454153, len=108
3,152,822 >>> mbox cmd response data (12 bytes)
3,152,823 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,126,816 >>> mbox cmd response: success
5,126,816 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,140,266 UART:
5,140,282 UART: Running Caliptra FMC ...
5,140,690 UART:
5,140,833 UART: [state] CFI Enabled
5,229,598 UART: [art] Extend RT PCRs Done
5,230,026 UART: [art] Lock RT PCRs Done
5,231,329 UART: [art] Populate DV Done
5,239,320 UART: [fht] FMC Alias Private Key: 7
5,240,388 UART: [art] Derive CDI
5,240,668 UART: [art] Store in in slot 0x4
5,326,407 UART: [art] Derive Key Pair
5,326,767 UART: [art] Store priv key in slot 0x5
5,339,783 UART: [art] Derive Key Pair - Done
5,354,604 UART: [art] Signing Cert with AUTHO
5,355,084 UART: RITY.KEYID = 7
5,370,180 UART: [art] Erasing AUTHORITY.KEYID = 7
5,370,945 UART: [art] PUB.X = 8806D1B44CBFB093C90210C81E3529C8AC6ED8ECAE09E4216FDC9BC407DCA7DB18A427549D8255AA96636E6055AF9C50
5,377,715 UART: [art] PUB.Y = 2C305F2D543E9FF3BCF4DD5879A2AB48FABF854D3499D5BCDBDC9352D57A4A8C889DEAEC54F9C48B33C7D7708E477A01
5,384,684 UART: [art] SIG.R = 1239ADF5743309350BF83CC4D74D324E0CD04E68DAD3A5CE3DCF95A5B9D8ED142AB7C0CE23200A19B727CC1F933BBF9D
5,391,462 UART: [art] SIG.S = 90EEB7495AC427E7273FE4695E6B827A7B8A7D6F6AB2847C233F3EADD3A33E6DF6D7F07E006CBD08ABF3F9A03D3D1F7C
5,415,054 UART: mbox::rt_entry...
5,415,426 UART: ____ _ _ _ ____ _____
5,416,210 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,417,010 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,417,778 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,418,546 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,419,314 UART: |_|
5,419,626 UART:
5,699,162 UART: [rt] Runtime listening for mailbox commands...
5,700,352 >>> mbox cmd response data (48 bytes)
5,700,353 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,703,136 >>> mbox cmd response data (48 bytes)
5,703,137 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,718,274 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,856 UART: [state] LifecycleState = Unprovisioned
86,511 UART: [state] DebugLocked = No
87,245 UART: [state] WD Timer not started. Device not locked for debugging
88,594 UART: [kat] SHA2-256
892,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,273 UART: [kat] ++
896,425 UART: [kat] sha1
900,691 UART: [kat] SHA2-256
902,631 UART: [kat] SHA2-384
905,256 UART: [kat] SHA2-512-ACC
907,157 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,577 UART: [fht] FHT @ 0x50003400
1,173,435 UART: [idev] ++
1,173,603 UART: [idev] CDI.KEYID = 6
1,173,964 UART: [idev] SUBJECT.KEYID = 7
1,174,389 UART: [idev] UDS.KEYID = 0
1,174,735 ready_for_fw is high
1,174,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,103 UART: [idev] Erasing UDS.KEYID = 0
1,199,535 UART: [idev] Sha1 KeyId Algorithm
1,208,565 UART: [idev] --
1,209,738 UART: [ldev] ++
1,209,906 UART: [ldev] CDI.KEYID = 6
1,210,270 UART: [ldev] SUBJECT.KEYID = 5
1,210,697 UART: [ldev] AUTHORITY.KEYID = 7
1,211,160 UART: [ldev] FE.KEYID = 1
1,216,126 UART: [ldev] Erasing FE.KEYID = 1
1,242,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,680 UART: [ldev] --
1,282,090 UART: [fwproc] Wait for Commands...
1,282,773 UART: [fwproc] Recv command 0x46574c44
1,283,506 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,474 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,783 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,377 >>> mbox cmd response: success
2,773,638 UART: [afmc] ++
2,773,806 UART: [afmc] CDI.KEYID = 6
2,774,169 UART: [afmc] SUBJECT.KEYID = 7
2,774,595 UART: [afmc] AUTHORITY.KEYID = 5
2,810,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,524 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,275 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,887 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,606 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,267 UART: [afmc] --
2,853,149 UART: [cold-reset] --
2,854,213 UART: [state] Locking Datavault
2,855,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,932 UART: [state] Locking ICCM
2,856,568 UART: [exit] Launching FMC @ 0x40000130
2,861,897 UART:
2,861,913 UART: Running Caliptra FMC ...
2,862,321 UART:
2,862,375 UART: [state] CFI Enabled
2,873,142 UART: [fht] FMC Alias Private Key: 7
2,980,635 UART: [art] Extend RT PCRs Done
2,981,063 UART: [art] Lock RT PCRs Done
2,982,667 UART: [art] Populate DV Done
2,990,932 UART: [fht] FMC Alias Private Key: 7
2,991,886 UART: [art] Derive CDI
2,992,166 UART: [art] Store in in slot 0x4
3,077,513 UART: [art] Derive Key Pair
3,077,873 UART: [art] Store priv key in slot 0x5
3,091,427 UART: [art] Derive Key Pair - Done
3,106,293 UART: [art] Signing Cert with AUTHO
3,106,773 UART: RITY.KEYID = 7
3,122,533 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,298 UART: [art] PUB.X = 47AEDDE3A96AE28AE223F3FE1F0842F82C5A7EEF70DE9313C62CAF3B87F2130AF5F559A17406D3DCA2689E823839C7BB
3,130,077 UART: [art] PUB.Y = DE9752B3D7F59C987729A872602D96B6191493EB9A2B2A162EC27A4FFFDD7FB987365891CBCA51C454B4D84C0D10908E
3,137,030 UART: [art] SIG.R = 3F6E63F53BBF0A7F71E586B46FD4536502A82C140FF0CC4A555B4AC3EA1793A9AB1DFBE88A01281CE27EACD25AB4248A
3,143,808 UART: [art] SIG.S = B85F131870FD9D378C1EB13AA56F3A88C4480ABA74A8B5977382D312F95847666B4F79446E2C7EDE8C55BB591A588C5E
3,167,584 UART: Caliptra RT
3,167,837 UART: [state] CFI Enabled
3,275,570 UART: [rt] RT listening for mailbox commands...
3,276,240 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,684 UART: [rt]cmd =0x4d454153, len=108
3,327,337 >>> mbox cmd response data (12 bytes)
3,327,338 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,328,111 UART:
3,328,127 UART: Running Caliptra ROM ...
3,328,535 UART:
3,328,590 UART: [state] CFI Enabled
3,331,458 UART: [state] LifecycleState = Unprovisioned
3,332,113 UART: [state] DebugLocked = No
3,332,635 UART: [state] WD Timer not started. Device not locked for debugging
3,333,953 UART: [kat] SHA2-256
4,137,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,141,632 UART: [kat] ++
4,141,784 UART: [kat] sha1
4,145,994 UART: [kat] SHA2-256
4,147,934 UART: [kat] SHA2-384
4,150,719 UART: [kat] SHA2-512-ACC
4,152,619 UART: [kat] ECC-384
4,162,434 UART: [kat] HMAC-384Kdf
4,167,036 UART: [kat] LMS
4,415,348 UART: [kat] --
4,416,054 UART: [update-reset] ++
5,317,703 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,318,674 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,414,798 >>> mbox cmd response: success
5,414,798 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,415,087 UART: [update-reset] Copying MAN_2 To MAN_1
5,423,101 UART: [update-reset Success] --
5,423,842 UART: [state] Locking Datavault
5,424,632 UART: [state] Locking PCR0, PCR1 and PCR31
5,425,236 UART: [state] Locking ICCM
5,425,814 UART: [exit] Launching FMC @ 0x40000130
5,431,143 UART:
5,431,159 UART: Running Caliptra FMC ...
5,431,567 UART:
5,431,621 UART: [state] CFI Enabled
5,520,582 UART: [art] Extend RT PCRs Done
5,521,010 UART: [art] Lock RT PCRs Done
5,522,485 UART: [art] Populate DV Done
5,530,314 UART: [fht] FMC Alias Private Key: 7
5,531,254 UART: [art] Derive CDI
5,531,534 UART: [art] Store in in slot 0x4
5,617,751 UART: [art] Derive Key Pair
5,618,111 UART: [art] Store priv key in slot 0x5
5,631,361 UART: [art] Derive Key Pair - Done
5,646,448 UART: [art] Signing Cert with AUTHO
5,646,928 UART: RITY.KEYID = 7
5,662,230 UART: [art] Erasing AUTHORITY.KEYID = 7
5,662,995 UART: [art] PUB.X = A07E2C11E2C6D9CD2A2156CDAC05B437FEE8A385A3CBE874782D513144092C94AF6CFEC1A842F62EB83EC7BB0F1E537D
5,669,776 UART: [art] PUB.Y = 31B78877ED099D416A930D345AF82098F98E2572894DA835B1D13B92CC095765B7065D9EFD32D9381B8BE6B50E998E50
5,676,707 UART: [art] SIG.R = 05C99830B472C7CD40EF97C8C609AC2D9F79F69BF8AE40AE2E4DEB78172ED08A6225801DF8842E4F454604F089179F66
5,683,472 UART: [art] SIG.S = 5F78DCD510FBE79A75840AC39375F3367FA5CAA192BFE855D869AA6F6345B3091AC0709C36468E3612852C9928090DA8
5,707,033 UART: mbox::rt_entry...
5,707,405 UART: ____ _ _ _ ____ _____
5,708,189 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,708,989 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,709,757 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,710,525 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,711,293 UART: |_|
5,711,605 UART:
5,992,439 UART: [rt] Runtime listening for mailbox commands...
5,993,629 >>> mbox cmd response data (48 bytes)
5,993,630 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,996,413 >>> mbox cmd response data (48 bytes)
5,996,414 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,011,551 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,466 ready_for_fw is high
1,055,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,395 >>> mbox cmd response: success
2,681,275 UART:
2,681,291 UART: Running Caliptra FMC ...
2,681,699 UART:
2,681,753 UART: [state] CFI Enabled
2,691,968 UART: [fht] FMC Alias Private Key: 7
2,799,623 UART: [art] Extend RT PCRs Done
2,800,051 UART: [art] Lock RT PCRs Done
2,801,667 UART: [art] Populate DV Done
2,810,046 UART: [fht] FMC Alias Private Key: 7
2,811,034 UART: [art] Derive CDI
2,811,314 UART: [art] Store in in slot 0x4
2,896,557 UART: [art] Derive Key Pair
2,896,917 UART: [art] Store priv key in slot 0x5
2,910,069 UART: [art] Derive Key Pair - Done
2,925,046 UART: [art] Signing Cert with AUTHO
2,925,526 UART: RITY.KEYID = 7
2,939,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,667 UART: [art] PUB.X = 927A5A77722031808551D62DB10BFA1582229388A67E86A0C6D3A790270FA94836FDCE3DB1FD5BF4E8D6D697EF2AB830
2,947,435 UART: [art] PUB.Y = F9FEDD9DF350BF11EC56A3F2D14C6094F94E93B51E2CF067ED8552A4F936B02488F1412E4319D1B629947096D42EBAD6
2,954,393 UART: [art] SIG.R = 494C3992091EC2EE5A18DB9236556070AB0398FAB7207263A683577FC2E1BB08305F3F83D95594BCAC9F5F77FA62B062
2,961,154 UART: [art] SIG.S = 9A5F639D7A6A1CF6E242A47366FBA3D1C404AE2EEC31B3EAD0AE407F574F4DAE739CC198CD0B2CA2126AA6AEFF5B3860
2,984,685 UART: Caliptra RT
2,984,938 UART: [state] CFI Enabled
3,091,725 UART: [rt] RT listening for mailbox commands...
3,092,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,122,863 UART: [rt]cmd =0x4d454153, len=108
3,143,680 >>> mbox cmd response data (12 bytes)
3,143,681 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,112,146 >>> mbox cmd response: success
5,112,146 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,125,678 UART:
5,125,694 UART: Running Caliptra FMC ...
5,126,102 UART:
5,126,156 UART: [state] CFI Enabled
5,215,247 UART: [art] Extend RT PCRs Done
5,215,675 UART: [art] Lock RT PCRs Done
5,217,062 UART: [art] Populate DV Done
5,225,187 UART: [fht] FMC Alias Private Key: 7
5,226,357 UART: [art] Derive CDI
5,226,637 UART: [art] Store in in slot 0x4
5,312,520 UART: [art] Derive Key Pair
5,312,880 UART: [art] Store priv key in slot 0x5
5,326,206 UART: [art] Derive Key Pair - Done
5,341,039 UART: [art] Signing Cert with AUTHO
5,341,519 UART: RITY.KEYID = 7
5,356,707 UART: [art] Erasing AUTHORITY.KEYID = 7
5,357,472 UART: [art] PUB.X = EF9284AA32E52CA34F6D95CEE6E29528081393D786E15B8680D6E0A06219F2E8EB83F33B4F05FA65BE887679B0E2619D
5,364,240 UART: [art] PUB.Y = 15D18ED1B8C018460CD4A3DEC565DDA346FB817CF6E8DB7EB1BA34239140DC32F403E8138CBCC94572AFE2AADFEF6243
5,371,206 UART: [art] SIG.R = A214DB24A7AFEE38BD0CD6CC07AA160BE31D4799F0547D4CAF38C894AB2761293378B933DDBFEC160CF590B2D8051861
5,377,975 UART: [art] SIG.S = 83DFC2ADB5F1CBE40897BFF73AAF09378919D0E6E45428DFD3DBC07683FAA05591E54F44EB4E12F2944237FF79C52804
5,401,483 UART: mbox::rt_entry...
5,401,855 UART: ____ _ _ _ ____ _____
5,402,639 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,403,439 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,404,207 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,404,975 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,405,743 UART: |_|
5,406,055 UART:
5,685,468 UART: [rt] Runtime listening for mailbox commands...
5,686,658 >>> mbox cmd response data (48 bytes)
5,686,659 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,689,442 >>> mbox cmd response data (48 bytes)
5,689,443 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,704,580 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,395 UART: [kat] SHA2-256
891,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,074 UART: [kat] ++
896,226 UART: [kat] sha1
900,498 UART: [kat] SHA2-256
902,438 UART: [kat] SHA2-384
905,307 UART: [kat] SHA2-512-ACC
907,208 UART: [kat] ECC-384
917,107 UART: [kat] HMAC-384Kdf
921,739 UART: [kat] LMS
1,170,051 UART: [kat] --
1,170,996 UART: [cold-reset] ++
1,171,456 UART: [fht] FHT @ 0x50003400
1,174,092 UART: [idev] ++
1,174,260 UART: [idev] CDI.KEYID = 6
1,174,621 UART: [idev] SUBJECT.KEYID = 7
1,175,046 UART: [idev] UDS.KEYID = 0
1,175,392 ready_for_fw is high
1,175,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,504 UART: [idev] Sha1 KeyId Algorithm
1,209,428 UART: [idev] --
1,210,481 UART: [ldev] ++
1,210,649 UART: [ldev] CDI.KEYID = 6
1,211,013 UART: [ldev] SUBJECT.KEYID = 5
1,211,440 UART: [ldev] AUTHORITY.KEYID = 7
1,211,903 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,017 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,069 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,521 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,498 >>> mbox cmd response: success
2,772,637 UART: [afmc] ++
2,772,805 UART: [afmc] CDI.KEYID = 6
2,773,168 UART: [afmc] SUBJECT.KEYID = 7
2,773,594 UART: [afmc] AUTHORITY.KEYID = 5
2,809,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,796 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,525 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,408 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,127 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,856 UART: [afmc] --
2,852,846 UART: [cold-reset] --
2,853,652 UART: [state] Locking Datavault
2,854,519 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,123 UART: [state] Locking ICCM
2,855,765 UART: [exit] Launching FMC @ 0x40000130
2,861,094 UART:
2,861,110 UART: Running Caliptra FMC ...
2,861,518 UART:
2,861,661 UART: [state] CFI Enabled
2,872,314 UART: [fht] FMC Alias Private Key: 7
2,980,085 UART: [art] Extend RT PCRs Done
2,980,513 UART: [art] Lock RT PCRs Done
2,981,809 UART: [art] Populate DV Done
2,989,888 UART: [fht] FMC Alias Private Key: 7
2,991,062 UART: [art] Derive CDI
2,991,342 UART: [art] Store in in slot 0x4
3,077,047 UART: [art] Derive Key Pair
3,077,407 UART: [art] Store priv key in slot 0x5
3,090,461 UART: [art] Derive Key Pair - Done
3,105,341 UART: [art] Signing Cert with AUTHO
3,105,821 UART: RITY.KEYID = 7
3,121,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,894 UART: [art] PUB.X = 66091118C8E93A32F64EB096F2D3C8458E9CD0837B91CEF03950E9355C122DFD96445CEA18D26360B95C82C72DC22C86
3,128,661 UART: [art] PUB.Y = 33FCCB6C977F8A102BAF87AC4CBF716620746D60767FE656496823B22FC0176E98632DE4850B2E78DFEBFEAA5CE4AD57
3,135,622 UART: [art] SIG.R = 2B24C6DBCE96F67AABD6B838A240F2ECA6337FD56BC4D7F388635C705956E8DDE888A0D980FC7D116EED3967C0124869
3,142,404 UART: [art] SIG.S = AAE7C508FC48DF6B3F7BDE7F14FC08B6828989BD008A92D1F525075410B732DCB6FDECCB7AC370ED5B7D7CC8E71B7A5F
3,166,160 UART: Caliptra RT
3,166,505 UART: [state] CFI Enabled
3,273,660 UART: [rt] RT listening for mailbox commands...
3,274,330 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,790 UART: [rt]cmd =0x4d454153, len=108
3,324,949 >>> mbox cmd response data (12 bytes)
3,324,950 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,325,635 UART:
3,325,651 UART: Running Caliptra ROM ...
3,326,059 UART:
3,326,201 UART: [state] CFI Enabled
3,329,443 UART: [state] LifecycleState = Unprovisioned
3,330,098 UART: [state] DebugLocked = No
3,330,632 UART: [state] WD Timer not started. Device not locked for debugging
3,331,812 UART: [kat] SHA2-256
4,135,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,139,491 UART: [kat] ++
4,139,643 UART: [kat] sha1
4,143,813 UART: [kat] SHA2-256
4,145,753 UART: [kat] SHA2-384
4,148,316 UART: [kat] SHA2-512-ACC
4,150,216 UART: [kat] ECC-384
4,160,037 UART: [kat] HMAC-384Kdf
4,164,751 UART: [kat] LMS
4,413,063 UART: [kat] --
4,414,035 UART: [update-reset] ++
5,315,964 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,317,067 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,413,191 >>> mbox cmd response: success
5,413,191 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,413,316 UART: [update-reset] Copying MAN_2 To MAN_1
5,421,330 UART: [update-reset Success] --
5,422,403 UART: [state] Locking Datavault
5,423,285 UART: [state] Locking PCR0, PCR1 and PCR31
5,423,889 UART: [state] Locking ICCM
5,424,479 UART: [exit] Launching FMC @ 0x40000130
5,429,808 UART:
5,429,824 UART: Running Caliptra FMC ...
5,430,232 UART:
5,430,375 UART: [state] CFI Enabled
5,519,674 UART: [art] Extend RT PCRs Done
5,520,102 UART: [art] Lock RT PCRs Done
5,521,267 UART: [art] Populate DV Done
5,529,304 UART: [fht] FMC Alias Private Key: 7
5,530,462 UART: [art] Derive CDI
5,530,742 UART: [art] Store in in slot 0x4
5,616,303 UART: [art] Derive Key Pair
5,616,663 UART: [art] Store priv key in slot 0x5
5,630,395 UART: [art] Derive Key Pair - Done
5,645,102 UART: [art] Signing Cert with AUTHO
5,645,582 UART: RITY.KEYID = 7
5,660,760 UART: [art] Erasing AUTHORITY.KEYID = 7
5,661,525 UART: [art] PUB.X = E2E24994C6D6D07896C06C668A596A95C5E095470F1496984C5467FF0F3C648ED7B88C63ACB5F57092B056A4E4399425
5,668,283 UART: [art] PUB.Y = 6CAED56255B3802CB8543C466E6DD93A2CCA490DBA69FC271CFE0F2B795E8680C0C594B7CE1DE3B236303CE5E432B835
5,675,241 UART: [art] SIG.R = 7C5C7532888BA097D4A6992E48FFA171E2FA6CAB0BBBC6DB02D2F058553524D9ACBADFF99480226BCB783151713E252A
5,682,017 UART: [art] SIG.S = 3A3A9DD15C70C1BC72713C98E5462F5BFD20F2488EF2D7C2AA0DED68D056887D1BE86C26365D99C197A4059E899B47F9
5,706,100 UART: mbox::rt_entry...
5,706,472 UART: ____ _ _ _ ____ _____
5,707,256 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,708,056 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,708,824 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,709,592 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,710,360 UART: |_|
5,710,672 UART:
5,990,754 UART: [rt] Runtime listening for mailbox commands...
5,991,944 >>> mbox cmd response data (48 bytes)
5,991,945 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,994,728 >>> mbox cmd response data (48 bytes)
5,994,729 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,009,866 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,981 ready_for_fw is high
1,056,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,586 >>> mbox cmd response: success
2,683,336 UART:
2,683,352 UART: Running Caliptra FMC ...
2,683,760 UART:
2,683,903 UART: [state] CFI Enabled
2,694,386 UART: [fht] FMC Alias Private Key: 7
2,802,605 UART: [art] Extend RT PCRs Done
2,803,033 UART: [art] Lock RT PCRs Done
2,804,593 UART: [art] Populate DV Done
2,812,906 UART: [fht] FMC Alias Private Key: 7
2,813,848 UART: [art] Derive CDI
2,814,128 UART: [art] Store in in slot 0x4
2,899,977 UART: [art] Derive Key Pair
2,900,337 UART: [art] Store priv key in slot 0x5
2,913,655 UART: [art] Derive Key Pair - Done
2,928,190 UART: [art] Signing Cert with AUTHO
2,928,670 UART: RITY.KEYID = 7
2,944,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,923 UART: [art] PUB.X = AA21C80F7485F2E55477BB7874549FBFFE0C94AEF0FAA2E82FBF3EB813F6241D3BE42BD5220DC38813DE3A2E91D9D3B6
2,951,704 UART: [art] PUB.Y = 7208D7AA74C9F3F748D8C0D48F1EB69D985E058971900EBA6D3B3C95A152D99ABAD50B1303A254705F3EF7D9D5A86510
2,958,645 UART: [art] SIG.R = 30534EA9118862C0DAD0503B0F5A26C2C04AE53EF921F7C016B667A508B5A08B05C478D811A4B1A729D53A65E1C558C3
2,965,408 UART: [art] SIG.S = 3F17FB21A44FF0B8AAEB6E2D40813D774476D630B33421818D3A0CEF3CE3F678A65A1AD9BC605D93898BEBCB820A4B2B
2,989,701 UART: Caliptra RT
2,990,046 UART: [state] CFI Enabled
3,097,913 UART: [rt] RT listening for mailbox commands...
3,098,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,007 UART: [rt]cmd =0x4d454153, len=108
3,149,840 >>> mbox cmd response data (12 bytes)
3,149,841 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,119,837 >>> mbox cmd response: success
5,119,837 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,133,465 UART:
5,133,481 UART: Running Caliptra FMC ...
5,133,889 UART:
5,134,032 UART: [state] CFI Enabled
5,223,673 UART: [art] Extend RT PCRs Done
5,224,101 UART: [art] Lock RT PCRs Done
5,225,220 UART: [art] Populate DV Done
5,233,323 UART: [fht] FMC Alias Private Key: 7
5,234,383 UART: [art] Derive CDI
5,234,663 UART: [art] Store in in slot 0x4
5,320,514 UART: [art] Derive Key Pair
5,320,874 UART: [art] Store priv key in slot 0x5
5,334,134 UART: [art] Derive Key Pair - Done
5,349,060 UART: [art] Signing Cert with AUTHO
5,349,540 UART: RITY.KEYID = 7
5,364,714 UART: [art] Erasing AUTHORITY.KEYID = 7
5,365,479 UART: [art] PUB.X = 0E462F90F48F281BA4D602828A512262D19E9DB560BF7A7D27C22F421AEC7A34BBA9E0338F08FB3CBBED9AEB3F9EFA1E
5,372,262 UART: [art] PUB.Y = FD43270A99E03A177DD99DD135BB549D13DEB296E2875B11F53708D2F291C736267FAD42F6FBA4CE19CA4F3F6C7D1C24
5,379,218 UART: [art] SIG.R = C68348881E31AFCEB26B07A4390437DCB097CC453283E1536FC522148C8149B5EEA5A8A3328310CB6C1DE0F6494D39AE
5,385,986 UART: [art] SIG.S = 2B07E2A145E7445920030E191293FA6A0104ECA56144E7D83B9690EA9702F9D115AC1117FD49864767541486958E8F6B
5,409,669 UART: mbox::rt_entry...
5,410,041 UART: ____ _ _ _ ____ _____
5,410,825 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,411,625 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,412,393 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,413,161 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,413,929 UART: |_|
5,414,241 UART:
5,693,317 UART: [rt] Runtime listening for mailbox commands...
5,694,507 >>> mbox cmd response data (48 bytes)
5,694,508 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,697,291 >>> mbox cmd response data (48 bytes)
5,697,292 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,712,429 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,000 UART:
192,381 UART: Running Caliptra ROM ...
193,476 UART:
193,616 UART: [state] CFI Enabled
264,418 UART: [state] LifecycleState = Unprovisioned
266,339 UART: [state] DebugLocked = No
268,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,149 UART: [kat] SHA2-256
442,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,364 UART: [kat] ++
453,897 UART: [kat] sha1
464,906 UART: [kat] SHA2-256
467,560 UART: [kat] SHA2-384
472,336 UART: [kat] SHA2-512-ACC
474,696 UART: [kat] ECC-384
2,766,333 UART: [kat] HMAC-384Kdf
2,799,527 UART: [kat] LMS
3,989,825 UART: [kat] --
3,996,275 UART: [cold-reset] ++
3,997,348 UART: [fht] Storing FHT @ 0x50003400
4,008,347 UART: [idev] ++
4,008,918 UART: [idev] CDI.KEYID = 6
4,009,801 UART: [idev] SUBJECT.KEYID = 7
4,011,112 UART: [idev] UDS.KEYID = 0
4,012,092 ready_for_fw is high
4,012,301 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,576 UART: [idev] Erasing UDS.KEYID = 0
7,345,817 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,970 UART: [idev] --
7,374,038 UART: [ldev] ++
7,374,603 UART: [ldev] CDI.KEYID = 6
7,375,556 UART: [ldev] SUBJECT.KEYID = 5
7,376,973 UART: [ldev] AUTHORITY.KEYID = 7
7,378,108 UART: [ldev] FE.KEYID = 1
7,422,076 UART: [ldev] Erasing FE.KEYID = 1
10,752,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,810 UART: [ldev] --
13,114,119 UART: [fwproc] Waiting for Commands...
13,116,385 UART: [fwproc] Received command 0x46574c44
13,118,561 UART: [fwproc] Received Image of size 113844 bytes
17,168,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,246,851 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,315,704 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,632,459 >>> mbox cmd response: success
17,633,015 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,636,361 UART: [afmc] ++
17,636,947 UART: [afmc] CDI.KEYID = 6
17,637,906 UART: [afmc] SUBJECT.KEYID = 7
17,639,112 UART: [afmc] AUTHORITY.KEYID = 5
21,010,697 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,971 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,312,235 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,634 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,520 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,947 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,950 UART: [afmc] --
23,381,176 UART: [cold-reset] --
23,384,501 UART: [state] Locking Datavault
23,388,672 UART: [state] Locking PCR0, PCR1 and PCR31
23,390,421 UART: [state] Locking ICCM
23,392,454 UART: [exit] Launching FMC @ 0x40000130
23,400,850 UART:
23,401,078 UART: Running Caliptra FMC ...
23,402,171 UART:
23,402,323 UART: [state] CFI Enabled
23,469,406 UART: [fht] FMC Alias Private Key: 7
25,807,158 UART: [art] Extend RT PCRs Done
25,808,380 UART: [art] Lock RT PCRs Done
25,810,053 UART: [art] Populate DV Done
25,815,242 UART: [fht] FMC Alias Private Key: 7
25,816,858 UART: [art] Derive CDI
25,817,672 UART: [art] Store in in slot 0x4
25,878,196 UART: [art] Derive Key Pair
25,879,232 UART: [art] Store priv key in slot 0x5
29,172,414 UART: [art] Derive Key Pair - Done
29,185,251 UART: [art] Signing Cert with AUTHO
29,186,547 UART: RITY.KEYID = 7
31,474,101 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,605 UART: [art] PUB.X = 4F31A778732CACA2B90B4F79AFB97BCD1B21DA27860AEA54DB3ABF90FA32E5174886F7B172589DAD6FB8C8D8BBD1ED01
31,482,907 UART: [art] PUB.Y = 1F07C2065C8C2C4675A77A78E0CFC742F0B729E5C106E02B88BA4833C75927EA2F9FC808BA33BAD1C67050DCB983BD61
31,490,174 UART: [art] SIG.R = AD53BD5866DF789F04D0AFE2801F65D5026E47D8F36BB94E14FB9D6608C81A13F57F625A700A7CDBE3AC0DDFF3C0FE67
31,497,537 UART: [art] SIG.S = 40D83EAF9F515AFE79A207FF297F6B31A833AE7513E1F7768F25424690253834EE35ACEAAA22E96E9E0D1FCF6A066895
32,802,496 UART: Caliptra RT
32,803,211 UART: [state] CFI Enabled
32,963,625 UART: [rt] RT listening for mailbox commands...
32,994,884 UART: [rt]cmd =0x54514754, len=24
32,997,383 >>> mbox cmd response data (8 bytes)
32,997,917 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,027,817 UART: [rt]cmd =0x54514754, len=24
33,029,564 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,805,886 ready_for_fw is high
3,806,290 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,866,190 >>> mbox cmd response: success
17,867,025 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,567,659 UART:
23,568,062 UART: Running Caliptra FMC ...
23,569,267 UART:
23,569,431 UART: [state] CFI Enabled
23,635,872 UART: [fht] FMC Alias Private Key: 7
25,973,291 UART: [art] Extend RT PCRs Done
25,974,519 UART: [art] Lock RT PCRs Done
25,976,085 UART: [art] Populate DV Done
25,981,297 UART: [fht] FMC Alias Private Key: 7
25,982,783 UART: [art] Derive CDI
25,983,554 UART: [art] Store in in slot 0x4
26,043,860 UART: [art] Derive Key Pair
26,044,900 UART: [art] Store priv key in slot 0x5
29,337,941 UART: [art] Derive Key Pair - Done
29,351,484 UART: [art] Signing Cert with AUTHO
29,352,786 UART: RITY.KEYID = 7
31,639,384 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,909 UART: [art] PUB.X = 4775C47C99EC665DA5B9506D730B6088E921FC3242FAA6C5A330800A552C7B2120B78237AEE24140021A04FCA1705562
31,648,113 UART: [art] PUB.Y = EF766886EBB90F641866E2F46BD62CDA22C1D45711E74401CC49B953914CB716DF4B9772465996C1F30CAF41D11990E6
31,655,376 UART: [art] SIG.R = CAAC047553015D6418C88906565D9223E9A5979EF111FB03510946C5B43BF087595FEC204DA9650CBA8B31DDCDF694AF
31,662,733 UART: [art] SIG.S = FBB5C61175E86C188134DACCBD7F3881C2EB50A8DF3F83318A850B49E41D317CD5E454C9C26E640EDE65E1F70033F18C
32,968,100 UART: Caliptra RT
32,968,798 UART: [state] CFI Enabled
33,129,510 UART: [rt] RT listening for mailbox commands...
33,161,237 UART: [rt]cmd =0x54514754, len=24
33,163,934 >>> mbox cmd response data (8 bytes)
33,164,433 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,194,440 UART: [rt]cmd =0x54514754, len=24
33,196,250 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,435 UART:
192,818 UART: Running Caliptra ROM ...
193,943 UART:
603,466 UART: [state] CFI Enabled
620,562 UART: [state] LifecycleState = Unprovisioned
622,505 UART: [state] DebugLocked = No
624,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,817 UART: [kat] SHA2-256
799,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,128 UART: [kat] ++
810,603 UART: [kat] sha1
822,615 UART: [kat] SHA2-256
825,337 UART: [kat] SHA2-384
831,539 UART: [kat] SHA2-512-ACC
833,904 UART: [kat] ECC-384
3,116,584 UART: [kat] HMAC-384Kdf
3,129,600 UART: [kat] LMS
4,319,694 UART: [kat] --
4,324,918 UART: [cold-reset] ++
4,327,466 UART: [fht] Storing FHT @ 0x50003400
4,339,343 UART: [idev] ++
4,339,920 UART: [idev] CDI.KEYID = 6
4,340,831 UART: [idev] SUBJECT.KEYID = 7
4,342,070 UART: [idev] UDS.KEYID = 0
4,343,060 ready_for_fw is high
4,343,269 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,235 UART: [idev] Erasing UDS.KEYID = 0
7,629,319 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,455 UART: [idev] --
7,655,552 UART: [ldev] ++
7,656,123 UART: [ldev] CDI.KEYID = 6
7,657,101 UART: [ldev] SUBJECT.KEYID = 5
7,658,257 UART: [ldev] AUTHORITY.KEYID = 7
7,659,546 UART: [ldev] FE.KEYID = 1
7,672,356 UART: [ldev] Erasing FE.KEYID = 1
10,961,031 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,730 UART: [ldev] --
13,321,158 UART: [fwproc] Waiting for Commands...
13,323,468 UART: [fwproc] Received command 0x46574c44
13,325,660 UART: [fwproc] Received Image of size 113844 bytes
17,375,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,445,411 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,514,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,830,670 >>> mbox cmd response: success
17,831,220 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,835,403 UART: [afmc] ++
17,836,049 UART: [afmc] CDI.KEYID = 6
17,836,959 UART: [afmc] SUBJECT.KEYID = 7
17,838,193 UART: [afmc] AUTHORITY.KEYID = 5
21,156,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,853 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,453,112 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,497 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,327 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,738 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,518,541 UART: [afmc] --
23,523,109 UART: [cold-reset] --
23,528,383 UART: [state] Locking Datavault
23,534,860 UART: [state] Locking PCR0, PCR1 and PCR31
23,536,625 UART: [state] Locking ICCM
23,538,721 UART: [exit] Launching FMC @ 0x40000130
23,547,131 UART:
23,547,368 UART: Running Caliptra FMC ...
23,548,472 UART:
23,548,657 UART: [state] CFI Enabled
23,556,940 UART: [fht] FMC Alias Private Key: 7
25,888,058 UART: [art] Extend RT PCRs Done
25,889,277 UART: [art] Lock RT PCRs Done
25,891,068 UART: [art] Populate DV Done
25,896,427 UART: [fht] FMC Alias Private Key: 7
25,897,911 UART: [art] Derive CDI
25,898,677 UART: [art] Store in in slot 0x4
25,941,436 UART: [art] Derive Key Pair
25,942,471 UART: [art] Store priv key in slot 0x5
29,184,411 UART: [art] Derive Key Pair - Done
29,197,343 UART: [art] Signing Cert with AUTHO
29,198,643 UART: RITY.KEYID = 7
31,478,155 UART: [art] Erasing AUTHORITY.KEYID = 7
31,479,671 UART: [art] PUB.X = D278AA4E02BCF0AD13821C53E698F0E3CC6170AE74D83EB64EE1118DF0C5E9B8591A09BF3FD459C187DE3BD233A53830
31,486,937 UART: [art] PUB.Y = FABDF2134C2CA8FEC3B971AFF08457F612879981737E4096B8A1DAEA98713D87B3953D3C30AA88A3BF107E622E7F5EAA
31,494,195 UART: [art] SIG.R = 4DF6A30D733CED6359114C158B1CD6DC438A334D5CE14BD4267FAFB2B74BA60D6D57F26D4E0E8620BFFE3EBB75B006E4
31,501,602 UART: [art] SIG.S = 5241BFFF343DA8B9B93D71CD1066431BFD5D3274D98AFE6E24D0364B65B10DE0516318756FFEB7E09D1114F563262EBD
32,806,677 UART: Caliptra RT
32,807,389 UART: [state] CFI Enabled
32,924,138 UART: [rt] RT listening for mailbox commands...
32,955,549 UART: [rt]cmd =0x54514754, len=24
32,958,137 >>> mbox cmd response data (8 bytes)
32,958,567 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,988,686 UART: [rt]cmd =0x54514754, len=24
32,990,259 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,130,274 ready_for_fw is high
4,130,874 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,077,246 >>> mbox cmd response: success
18,077,940 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,724,490 UART:
23,724,879 UART: Running Caliptra FMC ...
23,726,019 UART:
23,726,181 UART: [state] CFI Enabled
23,734,241 UART: [fht] FMC Alias Private Key: 7
26,064,570 UART: [art] Extend RT PCRs Done
26,065,806 UART: [art] Lock RT PCRs Done
26,067,490 UART: [art] Populate DV Done
26,072,801 UART: [fht] FMC Alias Private Key: 7
26,074,485 UART: [art] Derive CDI
26,075,305 UART: [art] Store in in slot 0x4
26,117,746 UART: [art] Derive Key Pair
26,118,791 UART: [art] Store priv key in slot 0x5
29,361,119 UART: [art] Derive Key Pair - Done
29,374,192 UART: [art] Signing Cert with AUTHO
29,375,510 UART: RITY.KEYID = 7
31,655,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,656,568 UART: [art] PUB.X = FB058537251D5842671B0CB6A5697BC71222CFD1EC5EDB5C91B7EA2CA88C2374F4238E10DA69B800F07F4EF1AB2FE0E4
31,663,825 UART: [art] PUB.Y = BFFAFE8257FA75F9873F27870FDD6DB015ADC962941D7EBD19C61913521E08BB801F02445CC3A7088D30DA68995C4647
31,671,070 UART: [art] SIG.R = 1154150F192212E58DD2DA370907A051C95556FEFC96C1BE9227EE1B0898AF783DA31A9FE438C8AEBBFC24E084ADDB79
31,678,478 UART: [art] SIG.S = F34D4E7997DC6385F324903EB1592BF10331861629D4E7419547D19AD7FC74D7971C6D7F7D2A346DB94B2E9AB3F1C639
32,983,400 UART: Caliptra RT
32,984,113 UART: [state] CFI Enabled
33,102,124 UART: [rt] RT listening for mailbox commands...
33,133,542 UART: [rt]cmd =0x54514754, len=24
33,136,079 >>> mbox cmd response data (8 bytes)
33,136,575 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,166,432 UART: [rt]cmd =0x54514754, len=24
33,168,261 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,280 UART:
192,658 UART: Running Caliptra ROM ...
193,854 UART:
194,006 UART: [state] CFI Enabled
263,538 UART: [state] LifecycleState = Unprovisioned
265,395 UART: [state] DebugLocked = No
268,281 UART: [state] WD Timer not started. Device not locked for debugging
271,532 UART: [kat] SHA2-256
450,609 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,215 UART: [kat] ++
462,758 UART: [kat] sha1
473,811 UART: [kat] SHA2-256
476,854 UART: [kat] SHA2-384
483,851 UART: [kat] SHA2-512-ACC
486,784 UART: [kat] ECC-384
2,946,173 UART: [kat] HMAC-384Kdf
2,970,430 UART: [kat] LMS
3,499,887 UART: [kat] --
3,504,308 UART: [cold-reset] ++
3,505,600 UART: [fht] FHT @ 0x50003400
3,516,984 UART: [idev] ++
3,517,563 UART: [idev] CDI.KEYID = 6
3,518,478 UART: [idev] SUBJECT.KEYID = 7
3,519,656 UART: [idev] UDS.KEYID = 0
3,520,583 ready_for_fw is high
3,520,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,600 UART: [idev] Erasing UDS.KEYID = 0
6,025,692 UART: [idev] Sha1 KeyId Algorithm
6,048,008 UART: [idev] --
6,051,525 UART: [ldev] ++
6,052,096 UART: [ldev] CDI.KEYID = 6
6,053,012 UART: [ldev] SUBJECT.KEYID = 5
6,054,122 UART: [ldev] AUTHORITY.KEYID = 7
6,055,442 UART: [ldev] FE.KEYID = 1
6,100,198 UART: [ldev] Erasing FE.KEYID = 1
8,606,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,130 UART: [ldev] --
10,415,554 UART: [fwproc] Wait for Commands...
10,418,239 UART: [fwproc] Recv command 0x46574c44
10,420,331 UART: [fwproc] Recv'd Img size: 114168 bytes
13,831,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,112 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,288,914 >>> mbox cmd response: success
14,289,478 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,292,497 UART: [afmc] ++
14,293,080 UART: [afmc] CDI.KEYID = 6
14,293,995 UART: [afmc] SUBJECT.KEYID = 7
14,295,146 UART: [afmc] AUTHORITY.KEYID = 5
16,827,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,549,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,551,442 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,567,235 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,583,230 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,599,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,622,310 UART: [afmc] --
18,626,564 UART: [cold-reset] --
18,629,763 UART: [state] Locking Datavault
18,634,637 UART: [state] Locking PCR0, PCR1 and PCR31
18,636,276 UART: [state] Locking ICCM
18,637,430 UART: [exit] Launching FMC @ 0x40000130
18,645,837 UART:
18,646,069 UART: Running Caliptra FMC ...
18,647,101 UART:
18,647,246 UART: [state] CFI Enabled
18,708,136 UART: [fht] FMC Alias Private Key: 7
20,472,318 UART: [art] Extend RT PCRs Done
20,473,539 UART: [art] Lock RT PCRs Done
20,475,243 UART: [art] Populate DV Done
20,480,654 UART: [fht] FMC Alias Private Key: 7
20,482,243 UART: [art] Derive CDI
20,483,057 UART: [art] Store in in slot 0x4
20,533,273 UART: [art] Derive Key Pair
20,534,272 UART: [art] Store priv key in slot 0x5
22,997,129 UART: [art] Derive Key Pair - Done
23,010,286 UART: [art] Signing Cert with AUTHO
23,011,590 UART: RITY.KEYID = 7
24,722,559 UART: [art] Erasing AUTHORITY.KEYID = 7
24,724,063 UART: [art] PUB.X = D66246E8E65887DE296048E21E94ECBB31B980A8AE71C430C7575C1BBF05811311F0DCEEB3AE4CD0A527603A94D407BC
24,731,330 UART: [art] PUB.Y = DEBCE89E6D5C6F640C2DE81DD10559BA8A46C60475ED7322B3E3412E723D6E6C4F13D8F019CE672AD193A8137EF69992
24,738,578 UART: [art] SIG.R = 88F750F51049D122CEA6FC2DDE9C58615D71BE8943A6E858244517818D4DCBB6D69301C219F270561C7886C969473CAA
24,745,991 UART: [art] SIG.S = 8FBE0E42D587E85B7D32A67EBADD1A4BECB4E636FE06D948933215B8A7129B5024F63A1DCC5DE86181BBC5C60B4E33A7
25,725,042 UART: Caliptra RT
25,725,744 UART: [state] CFI Enabled
25,889,156 UART: [rt] RT listening for mailbox commands...
25,920,661 UART: [rt]cmd =0x54514754, len=24
25,923,278 >>> mbox cmd response data (8 bytes)
25,923,744 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,953,915 UART: [rt]cmd =0x54514754, len=24
25,955,733 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,361,930 ready_for_fw is high
3,362,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,045,890 >>> mbox cmd response: success
14,046,601 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,321,858 UART:
18,322,273 UART: Running Caliptra FMC ...
18,323,481 UART:
18,323,654 UART: [state] CFI Enabled
18,390,965 UART: [fht] FMC Alias Private Key: 7
20,154,377 UART: [art] Extend RT PCRs Done
20,155,582 UART: [art] Lock RT PCRs Done
20,157,535 UART: [art] Populate DV Done
20,162,935 UART: [fht] FMC Alias Private Key: 7
20,164,419 UART: [art] Derive CDI
20,165,182 UART: [art] Store in in slot 0x4
20,222,951 UART: [art] Derive Key Pair
20,223,988 UART: [art] Store priv key in slot 0x5
22,686,935 UART: [art] Derive Key Pair - Done
22,699,783 UART: [art] Signing Cert with AUTHO
22,701,099 UART: RITY.KEYID = 7
24,413,039 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,546 UART: [art] PUB.X = 336ECBF9AC44E6794D01BFEF0CFEEA7AD98B14EE007BF1F4ABAD21C9A8816F660142AF97558D1A695AEF4D359619D7AC
24,421,861 UART: [art] PUB.Y = 0C2F5B425DFB7323360A6F37BC5D8A8B141D815F33C5C1591C8068A5126605A144459CBE68E612C2378EF27F3A503919
24,429,054 UART: [art] SIG.R = 1620BB7FBA510880D283FEFAF193C0C13C6ADB1EABEA2815F3F918E47CB7952E70E41F9E6486BC0358A090A6629B60EA
24,436,466 UART: [art] SIG.S = 6CBCAE7D9051B7DA2F24A8D5EF3273F735541355E292497CF0FF990A43AA4C582671CC9C634C75F66E6EA602E5166870
25,415,408 UART: Caliptra RT
25,416,110 UART: [state] CFI Enabled
25,582,451 UART: [rt] RT listening for mailbox commands...
25,614,130 UART: [rt]cmd =0x54514754, len=24
25,616,782 >>> mbox cmd response data (8 bytes)
25,617,281 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,647,401 UART: [rt]cmd =0x54514754, len=24
25,649,218 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
192,965 UART:
193,331 UART: Running Caliptra ROM ...
194,522 UART:
604,116 UART: [state] CFI Enabled
617,432 UART: [state] LifecycleState = Unprovisioned
619,305 UART: [state] DebugLocked = No
620,904 UART: [state] WD Timer not started. Device not locked for debugging
624,739 UART: [kat] SHA2-256
803,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,419 UART: [kat] ++
815,951 UART: [kat] sha1
826,121 UART: [kat] SHA2-256
829,129 UART: [kat] SHA2-384
836,396 UART: [kat] SHA2-512-ACC
839,330 UART: [kat] ECC-384
3,279,924 UART: [kat] HMAC-384Kdf
3,292,736 UART: [kat] LMS
3,822,227 UART: [kat] --
3,826,143 UART: [cold-reset] ++
3,827,812 UART: [fht] FHT @ 0x50003400
3,837,511 UART: [idev] ++
3,838,077 UART: [idev] CDI.KEYID = 6
3,838,995 UART: [idev] SUBJECT.KEYID = 7
3,840,170 UART: [idev] UDS.KEYID = 0
3,841,277 ready_for_fw is high
3,841,487 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,270 UART: [idev] Erasing UDS.KEYID = 0
6,315,308 UART: [idev] Sha1 KeyId Algorithm
6,337,877 UART: [idev] --
6,343,049 UART: [ldev] ++
6,343,624 UART: [ldev] CDI.KEYID = 6
6,344,538 UART: [ldev] SUBJECT.KEYID = 5
6,345,750 UART: [ldev] AUTHORITY.KEYID = 7
6,346,976 UART: [ldev] FE.KEYID = 1
6,357,836 UART: [ldev] Erasing FE.KEYID = 1
8,830,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,944 UART: [ldev] --
10,623,157 UART: [fwproc] Wait for Commands...
10,626,324 UART: [fwproc] Recv command 0x46574c44
10,628,419 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,099,205 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,974 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,485,457 >>> mbox cmd response: success
14,485,998 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,490,048 UART: [afmc] ++
14,490,647 UART: [afmc] CDI.KEYID = 6
14,491,580 UART: [afmc] SUBJECT.KEYID = 7
14,492,750 UART: [afmc] AUTHORITY.KEYID = 5
16,996,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,714 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,482 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,190 UART: [afmc] --
18,795,551 UART: [cold-reset] --
18,798,871 UART: [state] Locking Datavault
18,802,177 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,817 UART: [state] Locking ICCM
18,805,190 UART: [exit] Launching FMC @ 0x40000130
18,813,582 UART:
18,813,816 UART: Running Caliptra FMC ...
18,814,860 UART:
18,815,014 UART: [state] CFI Enabled
18,823,177 UART: [fht] FMC Alias Private Key: 7
20,579,676 UART: [art] Extend RT PCRs Done
20,580,883 UART: [art] Lock RT PCRs Done
20,582,555 UART: [art] Populate DV Done
20,588,020 UART: [fht] FMC Alias Private Key: 7
20,589,613 UART: [art] Derive CDI
20,590,429 UART: [art] Store in in slot 0x4
20,632,604 UART: [art] Derive Key Pair
20,633,662 UART: [art] Store priv key in slot 0x5
23,060,326 UART: [art] Derive Key Pair - Done
23,073,538 UART: [art] Signing Cert with AUTHO
23,074,842 UART: RITY.KEYID = 7
24,780,197 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,186 UART: [art] PUB.X = 0D8AA731946DAD2929136B1578F33E28BEAD6DDCFDA6CF76757E85D8A06AA28C3FD182EF82EA969CA30A347F6446135C
24,788,970 UART: [art] PUB.Y = F9E831CCE01BA2FB1E5955B2DFB1DF2473259B38D3485A9408917FC196A23A4ED410CBA5C1EE5629262C004751A38960
24,796,205 UART: [art] SIG.R = 3B47DDA9B3F60603EB6BCF20819D85566E838F984E3B1B83C22F9AD600BFF14554E25292E2C678FB81CCC8A419E61069
24,803,596 UART: [art] SIG.S = 0F56729017B96079249C8F47612AA72B179C5CD1F13F4FCA3AE09B5059F37199B69174B200A2DC45017F242AC4217E32
25,782,731 UART: Caliptra RT
25,783,430 UART: [state] CFI Enabled
25,900,921 UART: [rt] RT listening for mailbox commands...
25,932,196 UART: [rt]cmd =0x54514754, len=24
25,934,508 >>> mbox cmd response data (8 bytes)
25,935,018 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,964,919 UART: [rt]cmd =0x54514754, len=24
25,966,621 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,848 writing to cptra_bootfsm_go
3,697,807 ready_for_fw is high
3,698,200 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,186 >>> mbox cmd response: success
14,268,812 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,520,038 UART:
18,520,433 UART: Running Caliptra FMC ...
18,521,562 UART:
18,521,721 UART: [state] CFI Enabled
18,529,560 UART: [fht] FMC Alias Private Key: 7
20,286,482 UART: [art] Extend RT PCRs Done
20,287,714 UART: [art] Lock RT PCRs Done
20,289,141 UART: [art] Populate DV Done
20,294,405 UART: [fht] FMC Alias Private Key: 7
20,296,009 UART: [art] Derive CDI
20,296,835 UART: [art] Store in in slot 0x4
20,339,216 UART: [art] Derive Key Pair
20,340,216 UART: [art] Store priv key in slot 0x5
22,768,080 UART: [art] Derive Key Pair - Done
22,780,966 UART: [art] Signing Cert with AUTHO
22,782,268 UART: RITY.KEYID = 7
24,487,861 UART: [art] Erasing AUTHORITY.KEYID = 7
24,489,366 UART: [art] PUB.X = A412E07CA58D9386A165A80A67F60F92A440B2D4EDC4DA659CE887212B9323A05D92672EEB24D07DA1356848F4C4FC92
24,496,616 UART: [art] PUB.Y = C914E552BBA33283EF89DB326675FA23ED12B04EC900996CB15B3E5E7803941B9E9075088FE0DFE4BCF9C529D8436B45
24,503,855 UART: [art] SIG.R = F29410D337640F139926E1124C914CFE2E906CFD09E48A18229143729516A755B24B70AAB66E959C277F2BFE70284C7D
24,511,212 UART: [art] SIG.S = 91A017CF88B465C1ADAA42D14C87B312AAED336B41CD02CF3E9203910ABB7C0E3D9D085133A5D33E1950E65EEC2AFA7B
25,490,504 UART: Caliptra RT
25,491,204 UART: [state] CFI Enabled
25,608,121 UART: [rt] RT listening for mailbox commands...
25,639,681 UART: [rt]cmd =0x54514754, len=24
25,642,129 >>> mbox cmd response data (8 bytes)
25,642,538 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,672,489 UART: [rt]cmd =0x54514754, len=24
25,674,355 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,047 UART:
192,426 UART: Running Caliptra ROM ...
193,534 UART:
193,679 UART: [state] CFI Enabled
262,981 UART: [state] LifecycleState = Unprovisioned
265,396 UART: [state] DebugLocked = No
266,637 UART: [state] WD Timer not started. Device not locked for debugging
270,762 UART: [kat] SHA2-256
460,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,404 UART: [kat] ++
471,851 UART: [kat] sha1
483,859 UART: [kat] SHA2-256
486,867 UART: [kat] SHA2-384
493,731 UART: [kat] SHA2-512-ACC
496,289 UART: [kat] ECC-384
2,948,636 UART: [kat] HMAC-384Kdf
2,970,331 UART: [kat] LMS
3,502,077 UART: [kat] --
3,507,134 UART: [cold-reset] ++
3,508,068 UART: [fht] FHT @ 0x50003400
3,520,183 UART: [idev] ++
3,520,891 UART: [idev] CDI.KEYID = 6
3,521,842 UART: [idev] SUBJECT.KEYID = 7
3,523,037 UART: [idev] UDS.KEYID = 0
3,523,949 ready_for_fw is high
3,524,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,226 UART: [idev] Erasing UDS.KEYID = 0
6,027,882 UART: [idev] Sha1 KeyId Algorithm
6,050,799 UART: [idev] --
6,056,467 UART: [ldev] ++
6,057,201 UART: [ldev] CDI.KEYID = 6
6,058,134 UART: [ldev] SUBJECT.KEYID = 5
6,059,295 UART: [ldev] AUTHORITY.KEYID = 7
6,060,477 UART: [ldev] FE.KEYID = 1
6,098,676 UART: [ldev] Erasing FE.KEYID = 1
8,603,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,998 UART: [ldev] --
10,413,860 UART: [fwproc] Wait for Commands...
10,416,974 UART: [fwproc] Recv command 0x46574c44
10,419,295 UART: [fwproc] Recv'd Img size: 114168 bytes
13,855,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,045,529 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,586,794 >>> mbox cmd response: success
14,587,336 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,591,624 UART: [afmc] ++
14,592,334 UART: [afmc] CDI.KEYID = 6
14,593,577 UART: [afmc] SUBJECT.KEYID = 7
14,595,012 UART: [afmc] AUTHORITY.KEYID = 5
17,127,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,081 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,882,424 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,897,437 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,511 UART: [afmc] --
18,926,269 UART: [cold-reset] --
18,930,835 UART: [state] Locking Datavault
18,935,335 UART: [state] Locking PCR0, PCR1 and PCR31
18,937,478 UART: [state] Locking ICCM
18,939,362 UART: [exit] Launching FMC @ 0x40000130
18,947,984 UART:
18,948,219 UART: Running Caliptra FMC ...
18,949,328 UART:
18,949,493 UART: [state] CFI Enabled
19,006,828 UART: [fht] FMC Alias Private Key: 7
20,771,410 UART: [art] Extend RT PCRs Done
20,772,656 UART: [art] Lock RT PCRs Done
20,774,391 UART: [art] Populate DV Done
20,779,591 UART: [fht] FMC Alias Private Key: 7
20,781,292 UART: [art] Derive CDI
20,782,105 UART: [art] Store in in slot 0x4
20,840,095 UART: [art] Derive Key Pair
20,841,137 UART: [art] Store priv key in slot 0x5
23,304,745 UART: [art] Derive Key Pair - Done
23,317,412 UART: [art] Signing Cert with AUTHO
23,318,721 UART: RITY.KEYID = 7
25,030,351 UART: [art] Erasing AUTHORITY.KEYID = 7
25,031,865 UART: [art] PUB.X = 6FA08C54CFC89806AC641803DD69E52CF38D5A8D3AD061A6EC140157096D1CFA2E5275D6C0D868D76F21C3347C68798E
25,039,137 UART: [art] PUB.Y = 3E9A477D4A06440C6638050A5EA9A1008CD892DC04114C87CD77026F4F79C1BA9D415EB9E9B468F2250CA208E6BA3EB8
25,046,389 UART: [art] SIG.R = 4505B3BC981DE2C334EFB5BD80F4498D6A5C0F3DE16AD9C3AE6C66829E6B37E51A2DEE40CBDCDBC894A2E4B8254A1EC1
25,053,841 UART: [art] SIG.S = 49E2DA7C044E6ABB0EDD739D1845A61285E32876ED22B4354D94B7A0646A0B26B6D279EEABBBCB0172A8D8E73B03CD03
26,032,259 UART: Caliptra RT
26,032,994 UART: [state] CFI Enabled
26,199,204 UART: [rt] RT listening for mailbox commands...
26,230,779 UART: [rt]cmd =0x54514754, len=24
26,233,312 >>> mbox cmd response data (8 bytes)
26,233,847 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,263,547 UART: [rt]cmd =0x54514754, len=24
26,265,067 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,440,531 ready_for_fw is high
3,440,958 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,723,074 >>> mbox cmd response: success
14,723,671 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,000,697 UART:
19,001,088 UART: Running Caliptra FMC ...
19,002,289 UART:
19,002,466 UART: [state] CFI Enabled
19,069,442 UART: [fht] FMC Alias Private Key: 7
20,834,244 UART: [art] Extend RT PCRs Done
20,835,465 UART: [art] Lock RT PCRs Done
20,837,447 UART: [art] Populate DV Done
20,842,977 UART: [fht] FMC Alias Private Key: 7
20,844,467 UART: [art] Derive CDI
20,845,387 UART: [art] Store in in slot 0x4
20,902,439 UART: [art] Derive Key Pair
20,903,482 UART: [art] Store priv key in slot 0x5
23,366,527 UART: [art] Derive Key Pair - Done
23,379,311 UART: [art] Signing Cert with AUTHO
23,380,619 UART: RITY.KEYID = 7
25,092,811 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,328 UART: [art] PUB.X = A55E62A3AC224283D930D77EAB74017D34D8448B37D21AD12662094B01BED6CCBB85D1458BAC17C8751A285E842CD2CA
25,101,599 UART: [art] PUB.Y = E693C5716E8C9D3BF4D3E9E1F0DBA05D34E5B7EF2788CD0B420E4BBA1E7BA6C6DD76EB6D450B0DBD8DEB695EC6262EFC
25,108,891 UART: [art] SIG.R = D9639EAF278ABE556C01017FC5103A81825FC1227D3E0B5F14734C5A384E6727EEB0221DFB207D020F4ADB05102B0F0B
25,116,240 UART: [art] SIG.S = A562ECBADDE4DC58400D2DEEA686B59A529EF0675CFB7F1397C21827015E1BFA7F3B8B7D1BE86C66569F0177CCDD520C
26,095,478 UART: Caliptra RT
26,096,170 UART: [state] CFI Enabled
26,261,961 UART: [rt] RT listening for mailbox commands...
26,293,726 UART: [rt]cmd =0x54514754, len=24
26,296,480 >>> mbox cmd response data (8 bytes)
26,296,900 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,326,706 UART: [rt]cmd =0x54514754, len=24
26,328,473 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
192,926 UART:
193,287 UART: Running Caliptra ROM ...
194,378 UART:
604,145 UART: [state] CFI Enabled
616,034 UART: [state] LifecycleState = Unprovisioned
618,407 UART: [state] DebugLocked = No
620,135 UART: [state] WD Timer not started. Device not locked for debugging
624,872 UART: [kat] SHA2-256
814,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,550 UART: [kat] ++
825,994 UART: [kat] sha1
836,020 UART: [kat] SHA2-256
839,038 UART: [kat] SHA2-384
845,809 UART: [kat] SHA2-512-ACC
848,400 UART: [kat] ECC-384
3,289,972 UART: [kat] HMAC-384Kdf
3,301,651 UART: [kat] LMS
3,833,432 UART: [kat] --
3,836,307 UART: [cold-reset] ++
3,838,757 UART: [fht] FHT @ 0x50003400
3,848,958 UART: [idev] ++
3,849,673 UART: [idev] CDI.KEYID = 6
3,850,705 UART: [idev] SUBJECT.KEYID = 7
3,851,813 UART: [idev] UDS.KEYID = 0
3,852,905 ready_for_fw is high
3,853,162 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,996,686 UART: [idev] Erasing UDS.KEYID = 0
6,330,275 UART: [idev] Sha1 KeyId Algorithm
6,352,148 UART: [idev] --
6,357,893 UART: [ldev] ++
6,358,579 UART: [ldev] CDI.KEYID = 6
6,359,464 UART: [ldev] SUBJECT.KEYID = 5
6,360,675 UART: [ldev] AUTHORITY.KEYID = 7
6,361,907 UART: [ldev] FE.KEYID = 1
6,374,741 UART: [ldev] Erasing FE.KEYID = 1
8,851,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,158 UART: [ldev] --
10,641,318 UART: [fwproc] Wait for Commands...
10,643,247 UART: [fwproc] Recv command 0x46574c44
10,645,497 UART: [fwproc] Recv'd Img size: 114168 bytes
14,087,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,527 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,825,920 >>> mbox cmd response: success
14,826,438 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,829,878 UART: [afmc] ++
14,830,582 UART: [afmc] CDI.KEYID = 6
14,831,765 UART: [afmc] SUBJECT.KEYID = 7
14,833,256 UART: [afmc] AUTHORITY.KEYID = 5
17,335,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,057,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,059,679 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,074,867 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,090,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,105,031 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,128,505 UART: [afmc] --
19,132,480 UART: [cold-reset] --
19,136,332 UART: [state] Locking Datavault
19,140,834 UART: [state] Locking PCR0, PCR1 and PCR31
19,142,975 UART: [state] Locking ICCM
19,145,612 UART: [exit] Launching FMC @ 0x40000130
19,154,285 UART:
19,154,530 UART: Running Caliptra FMC ...
19,155,651 UART:
19,155,814 UART: [state] CFI Enabled
19,163,594 UART: [fht] FMC Alias Private Key: 7
20,920,839 UART: [art] Extend RT PCRs Done
20,922,062 UART: [art] Lock RT PCRs Done
20,923,503 UART: [art] Populate DV Done
20,928,922 UART: [fht] FMC Alias Private Key: 7
20,930,460 UART: [art] Derive CDI
20,931,196 UART: [art] Store in in slot 0x4
20,974,111 UART: [art] Derive Key Pair
20,975,152 UART: [art] Store priv key in slot 0x5
23,401,457 UART: [art] Derive Key Pair - Done
23,414,240 UART: [art] Signing Cert with AUTHO
23,415,554 UART: RITY.KEYID = 7
25,121,368 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,879 UART: [art] PUB.X = 04CE079A429BCCF97796201E2FAF1CC75CFD6E17AE1DD522864D40F81C3A64757D82DC14C3EE5CCCED2AB4AFBFBA4ADE
25,130,211 UART: [art] PUB.Y = 4A19103428A65014A2B7A688041812BB9AF9813375930B22DCDE9CA63F9FEBC42EB63653D316C64CD986E844E340BFB0
25,137,422 UART: [art] SIG.R = A2CB6C4AB47F49FB258A80AAAC1F6F91D463F83B36CD076280B53AF36F080B3D950F559B3451E0BC84082A17160F5812
25,144,827 UART: [art] SIG.S = F8CCBB2D7BEDE6C8419B1F91315049A6CDC5881A523F22FD090F906FD1B21050BF8C711C8C08B597C922BCF8A7D7AE04
26,123,310 UART: Caliptra RT
26,124,002 UART: [state] CFI Enabled
26,241,262 UART: [rt] RT listening for mailbox commands...
26,272,705 UART: [rt]cmd =0x54514754, len=24
26,275,315 >>> mbox cmd response data (8 bytes)
26,275,839 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,305,858 UART: [rt]cmd =0x54514754, len=24
26,307,563 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,625 writing to cptra_bootfsm_go
3,756,254 ready_for_fw is high
3,756,866 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,427 >>> mbox cmd response: success
14,954,101 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,202,536 UART:
19,202,928 UART: Running Caliptra FMC ...
19,204,058 UART:
19,204,225 UART: [state] CFI Enabled
19,212,387 UART: [fht] FMC Alias Private Key: 7
20,969,314 UART: [art] Extend RT PCRs Done
20,970,547 UART: [art] Lock RT PCRs Done
20,972,283 UART: [art] Populate DV Done
20,977,769 UART: [fht] FMC Alias Private Key: 7
20,979,371 UART: [art] Derive CDI
20,980,187 UART: [art] Store in in slot 0x4
21,022,141 UART: [art] Derive Key Pair
21,023,187 UART: [art] Store priv key in slot 0x5
23,449,958 UART: [art] Derive Key Pair - Done
23,463,011 UART: [art] Signing Cert with AUTHO
23,464,311 UART: RITY.KEYID = 7
25,169,700 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,218 UART: [art] PUB.X = 7BC8D0FE3600430065255BFE5E40C7EDE1449C36047F439FEE95EEE7657060B1CCB08B500DB8DAA596B4ACA117B5DC0E
25,178,463 UART: [art] PUB.Y = 3432864635D8615FF4C1A124C77C42F5CE68DE88183C78C6C7E7A4F2BDAB129C95A0C6C3D11AFFFEC208DDC671618FC9
25,185,751 UART: [art] SIG.R = 0437CC3CDD272ED08318E67ED64D1DF29D1903CD991FF3062B92C27F86868CB4E91D99FC74523B72E5945A7AF766D7B2
25,193,149 UART: [art] SIG.S = 82B108E10BC5D9A1EA1C4B91D000FBA9CC50F7A5582963D6AF7558A7CECED2F6ECD59EC52B7DB9C28F57E600DF016969
26,171,980 UART: Caliptra RT
26,172,691 UART: [state] CFI Enabled
26,289,477 UART: [rt] RT listening for mailbox commands...
26,320,888 UART: [rt]cmd =0x54514754, len=24
26,323,362 >>> mbox cmd response data (8 bytes)
26,323,865 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,353,826 UART: [rt]cmd =0x54514754, len=24
26,355,531 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,779 UART: [kat] SHA2-256
881,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,825 UART: [kat] ++
885,977 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,914 UART: [kat] SHA2-512-ACC
896,815 UART: [kat] ECC-384
902,292 UART: [kat] HMAC-384Kdf
906,926 UART: [kat] LMS
1,475,122 UART: [kat] --
1,475,909 UART: [cold-reset] ++
1,476,295 UART: [fht] Storing FHT @ 0x50003400
1,478,868 UART: [idev] ++
1,479,036 UART: [idev] CDI.KEYID = 6
1,479,396 UART: [idev] SUBJECT.KEYID = 7
1,479,820 UART: [idev] UDS.KEYID = 0
1,480,165 ready_for_fw is high
1,480,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,400 UART: [idev] Erasing UDS.KEYID = 0
1,504,744 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,406 UART: [idev] --
1,514,309 UART: [ldev] ++
1,514,477 UART: [ldev] CDI.KEYID = 6
1,514,840 UART: [ldev] SUBJECT.KEYID = 5
1,515,266 UART: [ldev] AUTHORITY.KEYID = 7
1,515,729 UART: [ldev] FE.KEYID = 1
1,520,949 UART: [ldev] Erasing FE.KEYID = 1
1,546,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,070 UART: [ldev] --
1,585,487 UART: [fwproc] Waiting for Commands...
1,586,258 UART: [fwproc] Received command 0x46574c44
1,587,049 UART: [fwproc] Received Image of size 114168 bytes
2,883,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,045 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,100 >>> mbox cmd response: success
3,076,100 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,166 UART: [afmc] ++
3,077,334 UART: [afmc] CDI.KEYID = 6
3,077,696 UART: [afmc] SUBJECT.KEYID = 7
3,078,121 UART: [afmc] AUTHORITY.KEYID = 5
3,113,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,862 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,590 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,475 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,165 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,200 UART: [afmc] --
3,156,292 UART: [cold-reset] --
3,157,190 UART: [state] Locking Datavault
3,158,311 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,915 UART: [state] Locking ICCM
3,159,547 UART: [exit] Launching FMC @ 0x40000130
3,164,876 UART:
3,164,892 UART: Running Caliptra FMC ...
3,165,300 UART:
3,165,354 UART: [state] CFI Enabled
3,175,719 UART: [fht] FMC Alias Private Key: 7
3,284,250 UART: [art] Extend RT PCRs Done
3,284,678 UART: [art] Lock RT PCRs Done
3,286,514 UART: [art] Populate DV Done
3,294,419 UART: [fht] FMC Alias Private Key: 7
3,295,455 UART: [art] Derive CDI
3,295,735 UART: [art] Store in in slot 0x4
3,381,204 UART: [art] Derive Key Pair
3,381,564 UART: [art] Store priv key in slot 0x5
3,394,882 UART: [art] Derive Key Pair - Done
3,409,581 UART: [art] Signing Cert with AUTHO
3,410,061 UART: RITY.KEYID = 7
3,425,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,960 UART: [art] PUB.X = AC65266B3381F0078AB6E35BFA74DECE304E02549A2EABEC55A9DEB683913704C130F1A8FBE0E0890C259BC24480F05E
3,432,730 UART: [art] PUB.Y = 193EFF245C458F20BD07D88156CFD6DE17E58934C831971E595B00BD72352157E1DE6CA1DC0CCDD5C6DDE96BEAEB9238
3,439,668 UART: [art] SIG.R = 9387DDB4896284DAA173B0B14D400B73150E2F5A0E5D7614D966A27307E7678BEF469C412E3C3460924A6A9446BD0B69
3,446,419 UART: [art] SIG.S = EEB8D2136332339754371A83F7048D12E006AC173BF6D775B7F6EB9862E5CF37CF25323C87FED56017A890360361B2A9
3,470,703 UART: Caliptra RT
3,470,956 UART: [state] CFI Enabled
3,578,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,304 UART: [rt]cmd =0x54514754, len=24
3,611,581 >>> mbox cmd response data (8 bytes)
3,611,582 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,087 UART: [rt]cmd =0x54514754, len=24
3,642,359 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,711 ready_for_fw is high
1,362,711 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,004 >>> mbox cmd response: success
2,926,004 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,908 UART:
2,987,924 UART: Running Caliptra FMC ...
2,988,332 UART:
2,988,386 UART: [state] CFI Enabled
2,998,825 UART: [fht] FMC Alias Private Key: 7
3,106,424 UART: [art] Extend RT PCRs Done
3,106,852 UART: [art] Lock RT PCRs Done
3,108,600 UART: [art] Populate DV Done
3,116,727 UART: [fht] FMC Alias Private Key: 7
3,117,857 UART: [art] Derive CDI
3,118,137 UART: [art] Store in in slot 0x4
3,203,930 UART: [art] Derive Key Pair
3,204,290 UART: [art] Store priv key in slot 0x5
3,218,024 UART: [art] Derive Key Pair - Done
3,232,795 UART: [art] Signing Cert with AUTHO
3,233,275 UART: RITY.KEYID = 7
3,248,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,900 UART: [art] PUB.X = FA6E0B6EE7989C88F26B220F6E94BA568AC6DF08CDC456D79D1BCEC1E6A22C556EB4A68F6CDBFA62ECC4B88793BB2DB4
3,255,691 UART: [art] PUB.Y = 40DB8AD0091B640EEBEE431B6DF766DD5250001AFC37EE2AD253406CAE347E1EC19366CD722C22E605D58FF82E2C56C1
3,262,624 UART: [art] SIG.R = 01DB650F2F5A86F0BFFBA23BCBE2F407F879D778E1A26590230447C6B67D14526849F63391CB9B662184B0D84A836765
3,269,380 UART: [art] SIG.S = 2478653C5F4A935062ED9D4128EF2F4F9A205B066C77E2EFAF165AE589675AB8492B81140F872583B26DF92EC421B1FE
3,292,603 UART: Caliptra RT
3,292,856 UART: [state] CFI Enabled
3,401,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,216 UART: [rt]cmd =0x54514754, len=24
3,434,579 >>> mbox cmd response data (8 bytes)
3,434,580 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,011 UART: [rt]cmd =0x54514754, len=24
3,465,295 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,194 UART: [kat] SHA2-256
882,125 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,240 UART: [kat] ++
886,392 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,057 UART: [kat] SHA2-512-ACC
896,958 UART: [kat] ECC-384
902,555 UART: [kat] HMAC-384Kdf
907,247 UART: [kat] LMS
1,475,443 UART: [kat] --
1,476,162 UART: [cold-reset] ++
1,476,638 UART: [fht] Storing FHT @ 0x50003400
1,479,441 UART: [idev] ++
1,479,609 UART: [idev] CDI.KEYID = 6
1,479,969 UART: [idev] SUBJECT.KEYID = 7
1,480,393 UART: [idev] UDS.KEYID = 0
1,480,738 ready_for_fw is high
1,480,738 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,439 UART: [idev] Erasing UDS.KEYID = 0
1,505,611 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,205 UART: [idev] --
1,515,198 UART: [ldev] ++
1,515,366 UART: [ldev] CDI.KEYID = 6
1,515,729 UART: [ldev] SUBJECT.KEYID = 5
1,516,155 UART: [ldev] AUTHORITY.KEYID = 7
1,516,618 UART: [ldev] FE.KEYID = 1
1,521,924 UART: [ldev] Erasing FE.KEYID = 1
1,547,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,313 UART: [ldev] --
1,586,656 UART: [fwproc] Waiting for Commands...
1,587,511 UART: [fwproc] Received command 0x46574c44
1,588,302 UART: [fwproc] Received Image of size 114168 bytes
2,883,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,279 >>> mbox cmd response: success
3,075,279 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,076,397 UART: [afmc] ++
3,076,565 UART: [afmc] CDI.KEYID = 6
3,076,927 UART: [afmc] SUBJECT.KEYID = 7
3,077,352 UART: [afmc] AUTHORITY.KEYID = 5
3,112,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,008 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,698 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,377 UART: [afmc] --
3,155,441 UART: [cold-reset] --
3,156,135 UART: [state] Locking Datavault
3,157,302 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,906 UART: [state] Locking ICCM
3,158,508 UART: [exit] Launching FMC @ 0x40000130
3,163,837 UART:
3,163,853 UART: Running Caliptra FMC ...
3,164,261 UART:
3,164,404 UART: [state] CFI Enabled
3,175,097 UART: [fht] FMC Alias Private Key: 7
3,282,400 UART: [art] Extend RT PCRs Done
3,282,828 UART: [art] Lock RT PCRs Done
3,284,736 UART: [art] Populate DV Done
3,293,127 UART: [fht] FMC Alias Private Key: 7
3,294,115 UART: [art] Derive CDI
3,294,395 UART: [art] Store in in slot 0x4
3,380,616 UART: [art] Derive Key Pair
3,380,976 UART: [art] Store priv key in slot 0x5
3,394,518 UART: [art] Derive Key Pair - Done
3,409,542 UART: [art] Signing Cert with AUTHO
3,410,022 UART: RITY.KEYID = 7
3,425,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,853 UART: [art] PUB.X = C4B6025CDE60F546FAC9A9B06EE02B9A30A3149AEE6C5727DBA09D11E5C45572D59FEC77603A27077E9C27D9DCC21CFA
3,432,635 UART: [art] PUB.Y = AA83362CAF8AC96A6AC201408C81BDB214C5A6B6F921D5278AB06C05E6BB5FDA805214E1D19540A44C7D033C41A34F60
3,439,586 UART: [art] SIG.R = DF59F13F9AA0006389B14C716BDF78180A06AAAC90C51CEDE06733ADA1F3BD8E59F10147312D5181F2E7AB84967339FC
3,446,335 UART: [art] SIG.S = B303D2C9F330AFCE4E6F966F2D8D803A45C27313220C12CA28238AECBA423453AD1F7A7BD0048FA1F3FCFD89A1E07F39
3,470,219 UART: Caliptra RT
3,470,564 UART: [state] CFI Enabled
3,578,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,976 UART: [rt]cmd =0x54514754, len=24
3,611,179 >>> mbox cmd response data (8 bytes)
3,611,180 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,640,655 UART: [rt]cmd =0x54514754, len=24
3,642,051 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,560 ready_for_fw is high
1,362,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,971 >>> mbox cmd response: success
2,927,971 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,957 UART:
2,989,973 UART: Running Caliptra FMC ...
2,990,381 UART:
2,990,524 UART: [state] CFI Enabled
3,001,473 UART: [fht] FMC Alias Private Key: 7
3,110,104 UART: [art] Extend RT PCRs Done
3,110,532 UART: [art] Lock RT PCRs Done
3,112,054 UART: [art] Populate DV Done
3,120,263 UART: [fht] FMC Alias Private Key: 7
3,121,429 UART: [art] Derive CDI
3,121,709 UART: [art] Store in in slot 0x4
3,207,702 UART: [art] Derive Key Pair
3,208,062 UART: [art] Store priv key in slot 0x5
3,221,218 UART: [art] Derive Key Pair - Done
3,236,156 UART: [art] Signing Cert with AUTHO
3,236,636 UART: RITY.KEYID = 7
3,252,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,253,277 UART: [art] PUB.X = 09AEC7F03EEA81E1B368C54D5DD074DCCA9B33BC32722A09CE317F3041D6A4A78878DFE8C090DC75AC2249269AA25207
3,260,050 UART: [art] PUB.Y = C8A47B7148B2F5CDF24FEF5D63543793186229DAAA75C4659C1B140A37ACF1AB8164032701D60423BE90180ADA420339
3,266,982 UART: [art] SIG.R = 4EB2728DCF2E9F2140636C1257E33D83857D1AFB34465C5080D69425B26039840B2DA75D945E81C803F4929EFD9B2D66
3,273,742 UART: [art] SIG.S = 6F9D5CDE369701586485664EB9A24582297CB8771E9EC6284C29C5F9AA85A172E877BA7D2626661800FACDBE3091D984
3,297,236 UART: Caliptra RT
3,297,581 UART: [state] CFI Enabled
3,407,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,437,859 UART: [rt]cmd =0x54514754, len=24
3,439,960 >>> mbox cmd response data (8 bytes)
3,439,961 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,469,494 UART: [rt]cmd =0x54514754, len=24
3,471,034 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,652 UART: [state] LifecycleState = Unprovisioned
86,307 UART: [state] DebugLocked = No
86,891 UART: [state] WD Timer not started. Device not locked for debugging
88,072 UART: [kat] SHA2-256
893,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,847 UART: [kat] ++
897,999 UART: [kat] sha1
902,413 UART: [kat] SHA2-256
904,353 UART: [kat] SHA2-384
907,042 UART: [kat] SHA2-512-ACC
908,943 UART: [kat] ECC-384
918,790 UART: [kat] HMAC-384Kdf
923,354 UART: [kat] LMS
1,171,682 UART: [kat] --
1,172,405 UART: [cold-reset] ++
1,172,897 UART: [fht] FHT @ 0x50003400
1,175,648 UART: [idev] ++
1,175,816 UART: [idev] CDI.KEYID = 6
1,176,176 UART: [idev] SUBJECT.KEYID = 7
1,176,600 UART: [idev] UDS.KEYID = 0
1,176,945 ready_for_fw is high
1,176,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,462 UART: [idev] Erasing UDS.KEYID = 0
1,201,095 UART: [idev] Sha1 KeyId Algorithm
1,209,627 UART: [idev] --
1,210,573 UART: [ldev] ++
1,210,741 UART: [ldev] CDI.KEYID = 6
1,211,104 UART: [ldev] SUBJECT.KEYID = 5
1,211,530 UART: [ldev] AUTHORITY.KEYID = 7
1,211,993 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,580 UART: [fwproc] Wait for Commands...
1,283,390 UART: [fwproc] Recv command 0x46574c44
1,284,118 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,250 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,847 >>> mbox cmd response: success
2,772,847 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,029 UART: [afmc] ++
2,774,197 UART: [afmc] CDI.KEYID = 6
2,774,559 UART: [afmc] SUBJECT.KEYID = 7
2,774,984 UART: [afmc] AUTHORITY.KEYID = 5
2,809,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,606 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,334 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,219 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,704 UART: [afmc] --
2,852,756 UART: [cold-reset] --
2,853,648 UART: [state] Locking Datavault
2,855,017 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,621 UART: [state] Locking ICCM
2,856,111 UART: [exit] Launching FMC @ 0x40000130
2,861,440 UART:
2,861,456 UART: Running Caliptra FMC ...
2,861,864 UART:
2,861,918 UART: [state] CFI Enabled
2,872,345 UART: [fht] FMC Alias Private Key: 7
2,980,862 UART: [art] Extend RT PCRs Done
2,981,290 UART: [art] Lock RT PCRs Done
2,982,884 UART: [art] Populate DV Done
2,991,137 UART: [fht] FMC Alias Private Key: 7
2,992,241 UART: [art] Derive CDI
2,992,521 UART: [art] Store in in slot 0x4
3,077,990 UART: [art] Derive Key Pair
3,078,350 UART: [art] Store priv key in slot 0x5
3,091,514 UART: [art] Derive Key Pair - Done
3,106,483 UART: [art] Signing Cert with AUTHO
3,106,963 UART: RITY.KEYID = 7
3,121,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,644 UART: [art] PUB.X = 7BE088EEC05CA797086BB224532B67584CEC01FF8EAB1F4E0A2FE5924BC1E509FF79F9A6EF09BB80AB59686A6B68E9B0
3,129,417 UART: [art] PUB.Y = AE61F594586DBC5003850F932DFD56C6F3DCA8A10DD6FAD3F460063C5ACC800BF8B57717CBA5D51457B0861435D2C322
3,136,362 UART: [art] SIG.R = D213755B39A787356AE7EEE64543DC8478E55FB42B2B55B633673E43D4378A4D276E25E063B3559C0728179D37C446DA
3,143,123 UART: [art] SIG.S = 56532CF2BAAE081B603B74C10F9CC472CFE99FE1B8E31749057619D53C2614EB7174F08D1CD6BDD7FCA29CAF032908E9
3,166,815 UART: Caliptra RT
3,167,068 UART: [state] CFI Enabled
3,275,267 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,209 UART: [rt]cmd =0x54514754, len=24
3,308,142 >>> mbox cmd response data (8 bytes)
3,308,143 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,684 UART: [rt]cmd =0x54514754, len=24
3,339,072 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,569 ready_for_fw is high
1,060,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,492 >>> mbox cmd response: success
2,623,492 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,004 UART:
2,686,020 UART: Running Caliptra FMC ...
2,686,428 UART:
2,686,482 UART: [state] CFI Enabled
2,697,075 UART: [fht] FMC Alias Private Key: 7
2,805,476 UART: [art] Extend RT PCRs Done
2,805,904 UART: [art] Lock RT PCRs Done
2,807,538 UART: [art] Populate DV Done
2,815,763 UART: [fht] FMC Alias Private Key: 7
2,816,901 UART: [art] Derive CDI
2,817,181 UART: [art] Store in in slot 0x4
2,902,800 UART: [art] Derive Key Pair
2,903,160 UART: [art] Store priv key in slot 0x5
2,916,870 UART: [art] Derive Key Pair - Done
2,931,548 UART: [art] Signing Cert with AUTHO
2,932,028 UART: RITY.KEYID = 7
2,947,058 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,823 UART: [art] PUB.X = 643B40AE0E2E34AE60B98955DFDBB0D46F049EA9DBD1806751A2A4C3BB08B61881B45B3F543F10F61FB52D276A7140D5
2,954,594 UART: [art] PUB.Y = EE0DA412907E3E6BE3AA52EBE80689259AE65CFE43A1048B4D0DEC91354C03C15F9380C659C9E405BAC1F34EDC18D9AA
2,961,544 UART: [art] SIG.R = 37BC714590047A67392C86BF48C7C29C0BF9C1A0127B960180A9AB0BF5948CE1BB9C58AA4A3F2956A3968E7D20C970EC
2,968,308 UART: [art] SIG.S = 88A5B34DECDE1584B140CB012C5C8DAD98B0616076653AEE07B4762E75E4DA6CB89F9BB386410850F6651E11E819A02F
2,991,760 UART: Caliptra RT
2,992,013 UART: [state] CFI Enabled
3,100,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,090 UART: [rt]cmd =0x54514754, len=24
3,133,025 >>> mbox cmd response data (8 bytes)
3,133,026 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,657 UART: [rt]cmd =0x54514754, len=24
3,164,219 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,234 UART: [kat] SHA2-256
904,174 UART: [kat] SHA2-384
906,807 UART: [kat] SHA2-512-ACC
908,708 UART: [kat] ECC-384
918,783 UART: [kat] HMAC-384Kdf
923,387 UART: [kat] LMS
1,171,715 UART: [kat] --
1,172,690 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,777 UART: [idev] ++
1,175,945 UART: [idev] CDI.KEYID = 6
1,176,305 UART: [idev] SUBJECT.KEYID = 7
1,176,729 UART: [idev] UDS.KEYID = 0
1,177,074 ready_for_fw is high
1,177,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,473 UART: [idev] Erasing UDS.KEYID = 0
1,201,436 UART: [idev] Sha1 KeyId Algorithm
1,209,932 UART: [idev] --
1,211,058 UART: [ldev] ++
1,211,226 UART: [ldev] CDI.KEYID = 6
1,211,589 UART: [ldev] SUBJECT.KEYID = 5
1,212,015 UART: [ldev] AUTHORITY.KEYID = 7
1,212,478 UART: [ldev] FE.KEYID = 1
1,217,774 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,396 UART: [ldev] --
1,283,831 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,652 >>> mbox cmd response: success
2,772,652 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,900 UART: [afmc] ++
2,774,068 UART: [afmc] CDI.KEYID = 6
2,774,430 UART: [afmc] SUBJECT.KEYID = 7
2,774,855 UART: [afmc] AUTHORITY.KEYID = 5
2,810,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,397 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,010 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,729 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,539 UART: [afmc] --
2,854,605 UART: [cold-reset] --
2,855,155 UART: [state] Locking Datavault
2,856,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,998 UART: [state] Locking ICCM
2,857,438 UART: [exit] Launching FMC @ 0x40000130
2,862,767 UART:
2,862,783 UART: Running Caliptra FMC ...
2,863,191 UART:
2,863,334 UART: [state] CFI Enabled
2,874,063 UART: [fht] FMC Alias Private Key: 7
2,982,150 UART: [art] Extend RT PCRs Done
2,982,578 UART: [art] Lock RT PCRs Done
2,983,932 UART: [art] Populate DV Done
2,992,113 UART: [fht] FMC Alias Private Key: 7
2,993,109 UART: [art] Derive CDI
2,993,389 UART: [art] Store in in slot 0x4
3,079,180 UART: [art] Derive Key Pair
3,079,540 UART: [art] Store priv key in slot 0x5
3,093,162 UART: [art] Derive Key Pair - Done
3,107,957 UART: [art] Signing Cert with AUTHO
3,108,437 UART: RITY.KEYID = 7
3,123,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,292 UART: [art] PUB.X = 1CE70BD45C1991DDB6445FC88A7F0ECFD3BFB349176C5B1640216E2BAB6B396372F6A215E9C80337AB7FCFD5A22117AA
3,131,069 UART: [art] PUB.Y = 712140701FAC626F6BB01ABDB8B8BF426FF6EF1D9AAFB5B80D14E4467B4ABE63E11362306E0FB727B38558A23E8429CA
3,138,027 UART: [art] SIG.R = 19DDC5A154A64AF7237575394F3D2D2B5ACD7F16B848D8458C2DDC4DF41BED73E235AADC1081EC74BD9F6448BCA816E5
3,144,815 UART: [art] SIG.S = E47495A25C31D9C829D38026E23DC7DEE8F26055046A96A8742A75E8A35B9C1C6BB0D37AC98EECAE409B95B952E08D0A
3,167,890 UART: Caliptra RT
3,168,235 UART: [state] CFI Enabled
3,275,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,096 UART: [rt]cmd =0x54514754, len=24
3,308,331 >>> mbox cmd response data (8 bytes)
3,308,332 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,909 UART: [rt]cmd =0x54514754, len=24
3,339,503 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,806 ready_for_fw is high
1,060,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,725 >>> mbox cmd response: success
2,624,725 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,837 UART:
2,687,853 UART: Running Caliptra FMC ...
2,688,261 UART:
2,688,404 UART: [state] CFI Enabled
2,699,259 UART: [fht] FMC Alias Private Key: 7
2,807,824 UART: [art] Extend RT PCRs Done
2,808,252 UART: [art] Lock RT PCRs Done
2,810,070 UART: [art] Populate DV Done
2,818,121 UART: [fht] FMC Alias Private Key: 7
2,819,257 UART: [art] Derive CDI
2,819,537 UART: [art] Store in in slot 0x4
2,905,280 UART: [art] Derive Key Pair
2,905,640 UART: [art] Store priv key in slot 0x5
2,918,854 UART: [art] Derive Key Pair - Done
2,933,327 UART: [art] Signing Cert with AUTHO
2,933,807 UART: RITY.KEYID = 7
2,949,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,778 UART: [art] PUB.X = 10573E81C97DC5D01B813D3BB23EFE445E705F864EFD76410EA8B106E938B9EF7DF948D2D9AC89C9C206E7F395C5858B
2,956,549 UART: [art] PUB.Y = E2EEE6F1492C29A58D1A8D05C8B34CFAB4FC35D897FC539EDD215EC31261F8B6B53300C1536401AEFEFA5CAFE5F0C567
2,963,493 UART: [art] SIG.R = 46C2C798666F5C1EB744B7C9BF35D042A7B84307D795079CD98BF92419C0F3B46434CE7DDD83B9EB5DF8A4CDD62639C2
2,970,267 UART: [art] SIG.S = 75CAC0D0EB0A018D7F559E3C8BB0B9F6E30026E5A7BF49205183BE87EC03EC386790E1EE407FCC2514368666FBBA8B6B
2,994,235 UART: Caliptra RT
2,994,580 UART: [state] CFI Enabled
3,102,155 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,915 UART: [rt]cmd =0x54514754, len=24
3,134,992 >>> mbox cmd response data (8 bytes)
3,134,993 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,282 UART: [rt]cmd =0x54514754, len=24
3,165,852 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,712 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
85,895 UART: [state] WD Timer not started. Device not locked for debugging
87,012 UART: [kat] SHA2-256
890,562 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,691 UART: [kat] ++
894,843 UART: [kat] sha1
899,093 UART: [kat] SHA2-256
901,033 UART: [kat] SHA2-384
903,684 UART: [kat] SHA2-512-ACC
905,585 UART: [kat] ECC-384
915,376 UART: [kat] HMAC-384Kdf
919,866 UART: [kat] LMS
1,168,178 UART: [kat] --
1,169,161 UART: [cold-reset] ++
1,169,627 UART: [fht] FHT @ 0x50003400
1,172,397 UART: [idev] ++
1,172,565 UART: [idev] CDI.KEYID = 6
1,172,926 UART: [idev] SUBJECT.KEYID = 7
1,173,351 UART: [idev] UDS.KEYID = 0
1,173,697 ready_for_fw is high
1,173,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,517 UART: [idev] Erasing UDS.KEYID = 0
1,198,505 UART: [idev] Sha1 KeyId Algorithm
1,207,505 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,215,224 UART: [ldev] Erasing FE.KEYID = 1
1,241,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,410 UART: [ldev] --
1,280,770 UART: [fwproc] Wait for Commands...
1,281,389 UART: [fwproc] Recv command 0x46574c44
1,282,122 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,543 >>> mbox cmd response: success
2,771,543 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,782 UART: [afmc] ++
2,772,950 UART: [afmc] CDI.KEYID = 6
2,773,313 UART: [afmc] SUBJECT.KEYID = 7
2,773,739 UART: [afmc] AUTHORITY.KEYID = 5
2,809,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,175 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,904 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,787 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,207 UART: [afmc] --
2,852,273 UART: [cold-reset] --
2,853,131 UART: [state] Locking Datavault
2,854,268 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,872 UART: [state] Locking ICCM
2,855,420 UART: [exit] Launching FMC @ 0x40000130
2,860,749 UART:
2,860,765 UART: Running Caliptra FMC ...
2,861,173 UART:
2,861,227 UART: [state] CFI Enabled
2,871,236 UART: [fht] FMC Alias Private Key: 7
2,979,461 UART: [art] Extend RT PCRs Done
2,979,889 UART: [art] Lock RT PCRs Done
2,981,271 UART: [art] Populate DV Done
2,989,452 UART: [fht] FMC Alias Private Key: 7
2,990,382 UART: [art] Derive CDI
2,990,662 UART: [art] Store in in slot 0x4
3,076,615 UART: [art] Derive Key Pair
3,076,975 UART: [art] Store priv key in slot 0x5
3,089,265 UART: [art] Derive Key Pair - Done
3,103,856 UART: [art] Signing Cert with AUTHO
3,104,336 UART: RITY.KEYID = 7
3,119,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,437 UART: [art] PUB.X = E45D0B132200C227E8D725DEAD57F85733220DECBFAE57BC2EC0C4C525F7426046F495E0D33F0715AF7A3BBB08EFF476
3,127,187 UART: [art] PUB.Y = 7460C7FE61362972D3FEAA1F5EBE2F0551A793045653CFFEE162DBEDC8CBD1D566108A3D0A0ECC4F1B9D9ED97D538659
3,134,143 UART: [art] SIG.R = 6A2EFE06FBABE25FB904202EEDFE313F9CFA7CEAD9CC681C905A605C70BEDE5C784F54A981BA44AB58640663928F8C7A
3,140,928 UART: [art] SIG.S = 26C9C39CFE2E2BA735204790B91260911751CCD5E449F0542D79C2C80346CCE625417249C6CBE31E07FB3BA7D10508F5
3,164,643 UART: Caliptra RT
3,164,896 UART: [state] CFI Enabled
3,272,569 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,445 UART: [rt]cmd =0x54514754, len=24
3,305,588 >>> mbox cmd response data (8 bytes)
3,305,589 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,230 UART: [rt]cmd =0x54514754, len=24
3,336,454 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,588 ready_for_fw is high
1,056,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,113 >>> mbox cmd response: success
2,621,113 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,751 UART:
2,682,767 UART: Running Caliptra FMC ...
2,683,175 UART:
2,683,229 UART: [state] CFI Enabled
2,693,550 UART: [fht] FMC Alias Private Key: 7
2,801,301 UART: [art] Extend RT PCRs Done
2,801,729 UART: [art] Lock RT PCRs Done
2,803,187 UART: [art] Populate DV Done
2,811,596 UART: [fht] FMC Alias Private Key: 7
2,812,604 UART: [art] Derive CDI
2,812,884 UART: [art] Store in in slot 0x4
2,898,813 UART: [art] Derive Key Pair
2,899,173 UART: [art] Store priv key in slot 0x5
2,912,049 UART: [art] Derive Key Pair - Done
2,927,279 UART: [art] Signing Cert with AUTHO
2,927,759 UART: RITY.KEYID = 7
2,942,809 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,574 UART: [art] PUB.X = C741FF9D31BFF9A99D0FCDD24001D4B5FEEC8753CB9BDD754B6162C153780E1D85D42062F0C6394A1A0499C3F81DC8F4
2,950,346 UART: [art] PUB.Y = 26ABD5D445233FD06E9573D6CECB790AC4644B4EBFF6EF9A3ED17B6E0F8BFE14EB463AC888C8C1425662245B13133B63
2,957,304 UART: [art] SIG.R = 2F7B3E73A6DB7258FA459C3714A36E804BDC6B34AEE797288C9CA71B8D5401A2CED4DF55F12759735FDBA7D6D4EC64A0
2,964,087 UART: [art] SIG.S = E0C5F4D15768E37C4CCEDB063CFE24907966F6F243F9A466FCFB56688D90192E573D35AD032B037B6B0904D19586C877
2,987,861 UART: Caliptra RT
2,988,114 UART: [state] CFI Enabled
3,096,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,041 UART: [rt]cmd =0x54514754, len=24
3,129,132 >>> mbox cmd response data (8 bytes)
3,129,133 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,788 UART: [rt]cmd =0x54514754, len=24
3,160,534 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,460 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,497 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,344 UART: [idev] ++
1,173,512 UART: [idev] CDI.KEYID = 6
1,173,873 UART: [idev] SUBJECT.KEYID = 7
1,174,298 UART: [idev] UDS.KEYID = 0
1,174,644 ready_for_fw is high
1,174,644 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,786 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,797 UART: [ldev] ++
1,209,965 UART: [ldev] CDI.KEYID = 6
1,210,329 UART: [ldev] SUBJECT.KEYID = 5
1,210,756 UART: [ldev] AUTHORITY.KEYID = 7
1,211,219 UART: [ldev] FE.KEYID = 1
1,216,301 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,851 UART: [fwproc] Wait for Commands...
1,282,518 UART: [fwproc] Recv command 0x46574c44
1,283,251 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,294 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,860 >>> mbox cmd response: success
2,769,860 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,039 UART: [afmc] ++
2,771,207 UART: [afmc] CDI.KEYID = 6
2,771,570 UART: [afmc] SUBJECT.KEYID = 7
2,771,996 UART: [afmc] AUTHORITY.KEYID = 5
2,807,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,048 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,777 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,660 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,379 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,308 UART: [afmc] --
2,851,226 UART: [cold-reset] --
2,851,752 UART: [state] Locking Datavault
2,852,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,203 UART: [state] Locking ICCM
2,853,645 UART: [exit] Launching FMC @ 0x40000130
2,858,974 UART:
2,858,990 UART: Running Caliptra FMC ...
2,859,398 UART:
2,859,541 UART: [state] CFI Enabled
2,869,964 UART: [fht] FMC Alias Private Key: 7
2,978,441 UART: [art] Extend RT PCRs Done
2,978,869 UART: [art] Lock RT PCRs Done
2,980,661 UART: [art] Populate DV Done
2,989,132 UART: [fht] FMC Alias Private Key: 7
2,990,164 UART: [art] Derive CDI
2,990,444 UART: [art] Store in in slot 0x4
3,076,209 UART: [art] Derive Key Pair
3,076,569 UART: [art] Store priv key in slot 0x5
3,089,371 UART: [art] Derive Key Pair - Done
3,104,306 UART: [art] Signing Cert with AUTHO
3,104,786 UART: RITY.KEYID = 7
3,120,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,897 UART: [art] PUB.X = 525CAC6E78D7167E32A62CAC63B8C52A8F7E768F0E1D93E852BFB53A0C4059B61B2273266937C5A469A06B9B8403EA77
3,127,662 UART: [art] PUB.Y = 9183A99DA51F828553A044892B03826054AAB3809472A09C5004D04AC430D38801D1361A8BDBC2B3B3978902C1A9E4EF
3,134,594 UART: [art] SIG.R = 0B86357E767C5315FD553FF6E6F583DB306B28B69538CF9CEBD629B7CC3033CBB03FF626A80640FB3F480F04E986E7B9
3,141,360 UART: [art] SIG.S = 233B5AD947A91D3E5C9E1DAF6B639A9BB39D47F317D9EFA245BF47DB35D2B837E5860D43056F29A534D2A2D9EED44D6D
3,165,773 UART: Caliptra RT
3,166,118 UART: [state] CFI Enabled
3,273,833 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,715 UART: [rt]cmd =0x54514754, len=24
3,307,116 >>> mbox cmd response data (8 bytes)
3,307,117 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,624 UART: [rt]cmd =0x54514754, len=24
3,338,290 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,103 ready_for_fw is high
1,056,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,348 >>> mbox cmd response: success
2,619,348 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,681,854 UART:
2,681,870 UART: Running Caliptra FMC ...
2,682,278 UART:
2,682,421 UART: [state] CFI Enabled
2,692,864 UART: [fht] FMC Alias Private Key: 7
2,800,849 UART: [art] Extend RT PCRs Done
2,801,277 UART: [art] Lock RT PCRs Done
2,802,871 UART: [art] Populate DV Done
2,810,848 UART: [fht] FMC Alias Private Key: 7
2,811,948 UART: [art] Derive CDI
2,812,228 UART: [art] Store in in slot 0x4
2,898,331 UART: [art] Derive Key Pair
2,898,691 UART: [art] Store priv key in slot 0x5
2,911,953 UART: [art] Derive Key Pair - Done
2,926,777 UART: [art] Signing Cert with AUTHO
2,927,257 UART: RITY.KEYID = 7
2,942,655 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,420 UART: [art] PUB.X = 4016427FB04F9A8130636B4F5445DECB1C35BAF91DDBAD47375C16022DC1357A2CF2A97B7CA44A854C87364D7A66D89E
2,950,195 UART: [art] PUB.Y = 64F22C05F3E6159A9E977A7D9A39946880D5BC5E35FA6595EBE258BD0E024363BBEC5202D68BC3C3035E5796BE9FC138
2,957,136 UART: [art] SIG.R = D2ACF048AC5636D6364564F848B26EE4590D4034AAD2A719D9D32DD1AD38716D084E1D8FA0D6164C505426861258BC4D
2,963,902 UART: [art] SIG.S = 33F1C904F4FFD3E24DCC8B906BEE78DA4C1011A90496A26C96E3B76B73BB29AF9368C6F9BBC1A5B6BC6437BA5FCFE99F
2,987,495 UART: Caliptra RT
2,987,840 UART: [state] CFI Enabled
3,094,889 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,401 UART: [rt]cmd =0x54514754, len=24
3,127,442 >>> mbox cmd response data (8 bytes)
3,127,443 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,840 UART: [rt]cmd =0x54514754, len=24
3,158,388 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,973 UART:
192,328 UART: Running Caliptra ROM ...
193,508 UART:
193,661 UART: [state] CFI Enabled
260,351 UART: [state] LifecycleState = Unprovisioned
262,328 UART: [state] DebugLocked = No
263,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,355 UART: [kat] SHA2-256
439,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,622 UART: [kat] ++
450,170 UART: [kat] sha1
460,152 UART: [kat] SHA2-256
462,838 UART: [kat] SHA2-384
468,403 UART: [kat] SHA2-512-ACC
470,772 UART: [kat] ECC-384
2,767,561 UART: [kat] HMAC-384Kdf
2,799,273 UART: [kat] LMS
3,989,640 UART: [kat] --
3,994,224 UART: [cold-reset] ++
3,996,301 UART: [fht] Storing FHT @ 0x50003400
4,008,692 UART: [idev] ++
4,009,253 UART: [idev] CDI.KEYID = 6
4,010,132 UART: [idev] SUBJECT.KEYID = 7
4,011,439 UART: [idev] UDS.KEYID = 0
4,012,419 ready_for_fw is high
4,012,603 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,784 UART: [idev] Erasing UDS.KEYID = 0
7,345,045 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,636 UART: [idev] --
7,371,222 UART: [ldev] ++
7,371,811 UART: [ldev] CDI.KEYID = 6
7,372,782 UART: [ldev] SUBJECT.KEYID = 5
7,373,987 UART: [ldev] AUTHORITY.KEYID = 7
7,375,269 UART: [ldev] FE.KEYID = 1
7,423,080 UART: [ldev] Erasing FE.KEYID = 1
10,757,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,726 UART: [ldev] --
13,140,696 UART: [fwproc] Waiting for Commands...
13,143,837 UART: [fwproc] Received command 0x46574c44
13,146,016 UART: [fwproc] Received Image of size 113844 bytes
17,202,857 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,352,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,669,036 >>> mbox cmd response: success
17,669,605 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,673,450 UART: [afmc] ++
17,674,093 UART: [afmc] CDI.KEYID = 6
17,674,984 UART: [afmc] SUBJECT.KEYID = 7
17,676,254 UART: [afmc] AUTHORITY.KEYID = 5
21,050,238 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,348,834 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,351,092 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,365,498 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,380,314 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,394,768 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,416,167 UART: [afmc] --
23,419,679 UART: [cold-reset] --
23,424,185 UART: [state] Locking Datavault
23,428,779 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,532 UART: [state] Locking ICCM
23,433,000 UART: [exit] Launching FMC @ 0x40000130
23,441,407 UART:
23,441,636 UART: Running Caliptra FMC ...
23,442,729 UART:
23,442,879 UART: [state] CFI Enabled
23,507,901 UART: [fht] FMC Alias Private Key: 7
25,845,625 UART: [art] Extend RT PCRs Done
25,846,839 UART: [art] Lock RT PCRs Done
25,848,592 UART: [art] Populate DV Done
25,853,887 UART: [fht] FMC Alias Private Key: 7
25,855,490 UART: [art] Derive CDI
25,856,225 UART: [art] Store in in slot 0x4
25,915,502 UART: [art] Derive Key Pair
25,916,536 UART: [art] Store priv key in slot 0x5
29,209,086 UART: [art] Derive Key Pair - Done
29,221,975 UART: [art] Signing Cert with AUTHO
29,223,275 UART: RITY.KEYID = 7
31,511,595 UART: [art] Erasing AUTHORITY.KEYID = 7
31,513,094 UART: [art] PUB.X = 4FD8B9830363C98ED723622104B1BF2DDF83BA8D51A598C4F35E0B6D29F55744DB27DEAA64CE71526F75C080F05A3B04
31,520,363 UART: [art] PUB.Y = A1C2F1146223246959353613B1B5701D4B6ADFC241E70E3C90042A6FB32C7078BE420626E527EE1DD84C2A2700992D63
31,527,559 UART: [art] SIG.R = B0D2155EF5B3864E697D4E7FBB61F7F3E7850AD32CB6C22646AA14A404BCF1D2694D4132263343A1B6A81C7F8F076CA9
31,534,990 UART: [art] SIG.S = F5F31C5B1D4FBB6530D2B3B47035C48ACC2F722E693A25D4E33F3FFB74C778CDF67124320D6955AE0F016C8DB25B8FFD
32,840,449 UART: Caliptra RT
32,841,158 UART: [state] CFI Enabled
33,021,394 UART: [rt] RT listening for mailbox commands...
33,052,799 UART: [rt]cmd =0x47544744, len=8
33,054,912 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,805,188 ready_for_fw is high
3,805,576 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,888,325 >>> mbox cmd response: success
17,889,014 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,587,232 UART:
23,587,646 UART: Running Caliptra FMC ...
23,588,748 UART:
23,588,902 UART: [state] CFI Enabled
23,656,698 UART: [fht] FMC Alias Private Key: 7
25,994,850 UART: [art] Extend RT PCRs Done
25,996,084 UART: [art] Lock RT PCRs Done
25,997,927 UART: [art] Populate DV Done
26,003,494 UART: [fht] FMC Alias Private Key: 7
26,005,037 UART: [art] Derive CDI
26,005,799 UART: [art] Store in in slot 0x4
26,065,103 UART: [art] Derive Key Pair
26,066,133 UART: [art] Store priv key in slot 0x5
29,359,427 UART: [art] Derive Key Pair - Done
29,372,098 UART: [art] Signing Cert with AUTHO
29,373,425 UART: RITY.KEYID = 7
31,661,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,887 UART: [art] PUB.X = 79BFE9F3AAF2B43EB17142B8211D74924B029BEBC534BF19188130D8B2063CA3AE2ECA8AC4507EC459C1582CDF2C6B1A
31,670,137 UART: [art] PUB.Y = 87EAF40DC53A424D3A6DEB0EBAC0BC506EE337F4A28F7DEAE10468A0A8809B365867771C076D747039CD6BA08FD898CA
31,677,403 UART: [art] SIG.R = C9574895C6C6740B0D1808C1F5E08251BCD2940796646D1E492BCAE89D566064BF45964B16CC03E923B6192BC6D4BA5E
31,684,798 UART: [art] SIG.S = 550F35464B57559D25D17BE31055B584C78D55DD6C1329F384D80E975797A35D6253968E8AD5041358A6A4E5B9B0EF87
32,989,549 UART: Caliptra RT
32,990,264 UART: [state] CFI Enabled
33,151,172 UART: [rt] RT listening for mailbox commands...
33,182,527 UART: [rt]cmd =0x47544744, len=8
33,184,491 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,775 writing to cptra_bootfsm_go
193,839 UART:
194,324 UART: Running Caliptra ROM ...
195,484 UART:
605,135 UART: [state] CFI Enabled
618,875 UART: [state] LifecycleState = Unprovisioned
620,753 UART: [state] DebugLocked = No
623,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,488 UART: [kat] SHA2-256
798,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,763 UART: [kat] ++
809,218 UART: [kat] sha1
820,024 UART: [kat] SHA2-256
822,764 UART: [kat] SHA2-384
829,344 UART: [kat] SHA2-512-ACC
831,716 UART: [kat] ECC-384
3,114,169 UART: [kat] HMAC-384Kdf
3,126,697 UART: [kat] LMS
4,316,760 UART: [kat] --
4,320,475 UART: [cold-reset] ++
4,322,638 UART: [fht] Storing FHT @ 0x50003400
4,333,866 UART: [idev] ++
4,334,437 UART: [idev] CDI.KEYID = 6
4,335,469 UART: [idev] SUBJECT.KEYID = 7
4,336,648 UART: [idev] UDS.KEYID = 0
4,337,697 ready_for_fw is high
4,337,918 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,837 UART: [idev] Erasing UDS.KEYID = 0
7,630,566 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,735 UART: [idev] --
7,655,319 UART: [ldev] ++
7,655,943 UART: [ldev] CDI.KEYID = 6
7,656,880 UART: [ldev] SUBJECT.KEYID = 5
7,658,092 UART: [ldev] AUTHORITY.KEYID = 7
7,659,326 UART: [ldev] FE.KEYID = 1
7,670,760 UART: [ldev] Erasing FE.KEYID = 1
10,957,377 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,089 UART: [ldev] --
13,320,689 UART: [fwproc] Waiting for Commands...
13,322,894 UART: [fwproc] Received command 0x46574c44
13,325,077 UART: [fwproc] Received Image of size 113844 bytes
17,381,315 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,462,464 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,531,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,847,493 >>> mbox cmd response: success
17,848,026 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,852,082 UART: [afmc] ++
17,852,675 UART: [afmc] CDI.KEYID = 6
17,853,562 UART: [afmc] SUBJECT.KEYID = 7
17,854,838 UART: [afmc] AUTHORITY.KEYID = 5
21,170,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,465,058 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,467,369 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,481,699 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,496,557 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,510,973 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,531,257 UART: [afmc] --
23,535,718 UART: [cold-reset] --
23,539,004 UART: [state] Locking Datavault
23,543,556 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,255 UART: [state] Locking ICCM
23,546,975 UART: [exit] Launching FMC @ 0x40000130
23,555,368 UART:
23,555,601 UART: Running Caliptra FMC ...
23,556,708 UART:
23,556,871 UART: [state] CFI Enabled
23,565,136 UART: [fht] FMC Alias Private Key: 7
25,895,945 UART: [art] Extend RT PCRs Done
25,897,163 UART: [art] Lock RT PCRs Done
25,898,738 UART: [art] Populate DV Done
25,904,155 UART: [fht] FMC Alias Private Key: 7
25,905,638 UART: [art] Derive CDI
25,906,399 UART: [art] Store in in slot 0x4
25,948,839 UART: [art] Derive Key Pair
25,949,902 UART: [art] Store priv key in slot 0x5
29,191,625 UART: [art] Derive Key Pair - Done
29,204,556 UART: [art] Signing Cert with AUTHO
29,205,885 UART: RITY.KEYID = 7
31,485,065 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,570 UART: [art] PUB.X = FB9E3EA90443CF823C3E9D2AD9EB0FA2BEE091132A9AD1B61A3D5735CC3C2A4352CECD8B663E69FB24D54ADC34C108E6
31,493,830 UART: [art] PUB.Y = 9B46BD732C00713EE4B739B6383F0795ED138F6F8D094BE82A2FEF4C61B3A4E1AE3B890C108660E05AD1C811CD6112B6
31,501,080 UART: [art] SIG.R = CFBF2C49F8707BB73E0D50D7F1824D936731238AC6FBE4D039FC32E8477FC5AB553347A52089297F0A2D1F0D0F681DEC
31,508,480 UART: [art] SIG.S = 1978F66517FCE6E2EF3809D37239267C9FDFE973EFAE79889682876031600BB25B4C0CBD1864E62FA3D8EFB57358EB01
32,814,192 UART: Caliptra RT
32,814,911 UART: [state] CFI Enabled
32,931,376 UART: [rt] RT listening for mailbox commands...
32,962,559 UART: [rt]cmd =0x47544744, len=8
32,964,520 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,126,041 ready_for_fw is high
4,126,415 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,065,309 >>> mbox cmd response: success
18,065,953 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,703,303 UART:
23,703,686 UART: Running Caliptra FMC ...
23,704,794 UART:
23,704,949 UART: [state] CFI Enabled
23,712,963 UART: [fht] FMC Alias Private Key: 7
26,043,277 UART: [art] Extend RT PCRs Done
26,044,504 UART: [art] Lock RT PCRs Done
26,046,113 UART: [art] Populate DV Done
26,051,212 UART: [fht] FMC Alias Private Key: 7
26,052,921 UART: [art] Derive CDI
26,053,743 UART: [art] Store in in slot 0x4
26,096,089 UART: [art] Derive Key Pair
26,097,136 UART: [art] Store priv key in slot 0x5
29,338,884 UART: [art] Derive Key Pair - Done
29,351,931 UART: [art] Signing Cert with AUTHO
29,353,238 UART: RITY.KEYID = 7
31,632,369 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,876 UART: [art] PUB.X = CAC8CDD8BEEFED31DAE4F2F242F8A9324CC578349A196B1D03F467D0ACDF9595A36D8FF5BEBAA5329F2D90B890F23DB5
31,641,132 UART: [art] PUB.Y = 7DB627AC898A63A09B540550A772E2D55E5B87DCB053FD9DF6B5A1686EC95C611AC5F2AA083009AF36957B7CB0936658
31,648,373 UART: [art] SIG.R = E9FC88855C273F9D3CC48480F138DBEAE643E32DC0A286561762B8629719F47A9306D21535AD4965A681BF2E8EFEA849
31,655,766 UART: [art] SIG.S = 58F768CA1CF6696B235BB59E4720BCDD326BBA04FC07FEC1B7E87B37501AEE8A17A56A7979F858547AE47594B6617CEB
32,961,362 UART: Caliptra RT
32,962,080 UART: [state] CFI Enabled
33,079,257 UART: [rt] RT listening for mailbox commands...
33,110,670 UART: [rt]cmd =0x47544744, len=8
33,112,872 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,280 UART:
192,678 UART: Running Caliptra ROM ...
193,787 UART:
193,933 UART: [state] CFI Enabled
265,617 UART: [state] LifecycleState = Unprovisioned
267,541 UART: [state] DebugLocked = No
268,951 UART: [state] WD Timer not started. Device not locked for debugging
272,574 UART: [kat] SHA2-256
451,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,287 UART: [kat] ++
463,819 UART: [kat] sha1
475,218 UART: [kat] SHA2-256
478,231 UART: [kat] SHA2-384
484,005 UART: [kat] SHA2-512-ACC
487,016 UART: [kat] ECC-384
2,949,911 UART: [kat] HMAC-384Kdf
2,972,992 UART: [kat] LMS
3,502,451 UART: [kat] --
3,509,096 UART: [cold-reset] ++
3,510,256 UART: [fht] FHT @ 0x50003400
3,522,089 UART: [idev] ++
3,522,659 UART: [idev] CDI.KEYID = 6
3,523,570 UART: [idev] SUBJECT.KEYID = 7
3,524,815 UART: [idev] UDS.KEYID = 0
3,525,714 ready_for_fw is high
3,525,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,585 UART: [idev] Erasing UDS.KEYID = 0
6,023,599 UART: [idev] Sha1 KeyId Algorithm
6,047,537 UART: [idev] --
6,051,972 UART: [ldev] ++
6,052,549 UART: [ldev] CDI.KEYID = 6
6,053,461 UART: [ldev] SUBJECT.KEYID = 5
6,054,678 UART: [ldev] AUTHORITY.KEYID = 7
6,055,920 UART: [ldev] FE.KEYID = 1
6,101,137 UART: [ldev] Erasing FE.KEYID = 1
8,604,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,564 UART: [ldev] --
10,413,041 UART: [fwproc] Wait for Commands...
10,414,810 UART: [fwproc] Recv command 0x46574c44
10,416,939 UART: [fwproc] Recv'd Img size: 114168 bytes
13,826,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,965 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,708 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,283,327 >>> mbox cmd response: success
14,283,868 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,287,912 UART: [afmc] ++
14,288,497 UART: [afmc] CDI.KEYID = 6
14,289,411 UART: [afmc] SUBJECT.KEYID = 7
14,290,571 UART: [afmc] AUTHORITY.KEYID = 5
16,836,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,553,965 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,569,771 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,585,758 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,601,658 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,585 UART: [afmc] --
18,628,239 UART: [cold-reset] --
18,631,667 UART: [state] Locking Datavault
18,636,221 UART: [state] Locking PCR0, PCR1 and PCR31
18,637,924 UART: [state] Locking ICCM
18,639,915 UART: [exit] Launching FMC @ 0x40000130
18,648,315 UART:
18,648,551 UART: Running Caliptra FMC ...
18,649,657 UART:
18,649,819 UART: [state] CFI Enabled
18,709,369 UART: [fht] FMC Alias Private Key: 7
20,473,277 UART: [art] Extend RT PCRs Done
20,474,493 UART: [art] Lock RT PCRs Done
20,476,763 UART: [art] Populate DV Done
20,481,958 UART: [fht] FMC Alias Private Key: 7
20,483,443 UART: [art] Derive CDI
20,484,207 UART: [art] Store in in slot 0x4
20,542,555 UART: [art] Derive Key Pair
20,543,589 UART: [art] Store priv key in slot 0x5
23,006,696 UART: [art] Derive Key Pair - Done
23,019,756 UART: [art] Signing Cert with AUTHO
23,021,065 UART: RITY.KEYID = 7
24,732,244 UART: [art] Erasing AUTHORITY.KEYID = 7
24,733,748 UART: [art] PUB.X = CB7D2500A08311F15183023DD41F482E2C730D4B80FD89E008357359A40DFECEE5A738D302A7227289CFA1E5BB90E958
24,740,975 UART: [art] PUB.Y = 7F3D7C6B1C7F1FBE956FA435606D435079D209F664D647C3B67FD182BFE268534E160F23DEF02A82BD7A23FE737BECA4
24,748,240 UART: [art] SIG.R = 990E8BE526533B3DB7FB5D8E687583119EF50FD7FACB7A455B466B3A47174561E51E01C902896F266C2CD13D3CE1D09D
24,755,606 UART: [art] SIG.S = F1CE0E5B01A050BD2408510926F73463CD22E0948CCBF73AA01CFF53DD36AF8C51AC9D309F11DF626DFF7CAF2788F565
25,734,501 UART: Caliptra RT
25,735,211 UART: [state] CFI Enabled
25,901,329 UART: [rt] RT listening for mailbox commands...
25,932,915 UART: [rt]cmd =0x47544744, len=8
25,934,756 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,351,284 ready_for_fw is high
3,352,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,061,249 >>> mbox cmd response: success
14,062,030 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,349,093 UART:
18,349,576 UART: Running Caliptra FMC ...
18,350,681 UART:
18,350,864 UART: [state] CFI Enabled
18,416,193 UART: [fht] FMC Alias Private Key: 7
20,180,486 UART: [art] Extend RT PCRs Done
20,181,725 UART: [art] Lock RT PCRs Done
20,183,458 UART: [art] Populate DV Done
20,188,961 UART: [fht] FMC Alias Private Key: 7
20,190,462 UART: [art] Derive CDI
20,191,201 UART: [art] Store in in slot 0x4
20,248,371 UART: [art] Derive Key Pair
20,249,371 UART: [art] Store priv key in slot 0x5
22,712,052 UART: [art] Derive Key Pair - Done
22,725,272 UART: [art] Signing Cert with AUTHO
22,726,629 UART: RITY.KEYID = 7
24,437,649 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,156 UART: [art] PUB.X = A9B5D3E294A60305C33F50B44DBC2D8722263E712A5530E9C9273D3ABA175D3B4AE8DF0945E9E544B9C6824A45F3D10E
24,446,403 UART: [art] PUB.Y = C0E196996D0EAF1CC3370C52B13A284E3B2D4CC847C775D8D330ADEE2FA2145AB07251427AECFC87B30F01768277D07F
24,453,708 UART: [art] SIG.R = 03453DD176E122A6A7A540BD9FCD112D1747E9D6EC03EC82A4BBA778A09A220EF0ADFF355D328BA991056C3CC17BA9D2
24,461,128 UART: [art] SIG.S = FEFE5BF4C6C722446C12591E507FDD0F6DD6EC5F1F91C09F9A6C2099C9EE65A96E7C904DDAD67D84CEB88A65A6B98B34
25,439,658 UART: Caliptra RT
25,440,377 UART: [state] CFI Enabled
25,605,092 UART: [rt] RT listening for mailbox commands...
25,636,769 UART: [rt]cmd =0x47544744, len=8
25,638,676 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,841 writing to cptra_bootfsm_go
192,978 UART:
193,355 UART: Running Caliptra ROM ...
194,455 UART:
604,274 UART: [state] CFI Enabled
619,569 UART: [state] LifecycleState = Unprovisioned
621,434 UART: [state] DebugLocked = No
622,950 UART: [state] WD Timer not started. Device not locked for debugging
626,349 UART: [kat] SHA2-256
805,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,014 UART: [kat] ++
817,476 UART: [kat] sha1
828,989 UART: [kat] SHA2-256
832,070 UART: [kat] SHA2-384
837,639 UART: [kat] SHA2-512-ACC
840,581 UART: [kat] ECC-384
3,283,188 UART: [kat] HMAC-384Kdf
3,295,599 UART: [kat] LMS
3,825,055 UART: [kat] --
3,829,479 UART: [cold-reset] ++
3,831,837 UART: [fht] FHT @ 0x50003400
3,842,815 UART: [idev] ++
3,843,388 UART: [idev] CDI.KEYID = 6
3,844,421 UART: [idev] SUBJECT.KEYID = 7
3,845,661 UART: [idev] UDS.KEYID = 0
3,846,597 ready_for_fw is high
3,846,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,325 UART: [idev] Erasing UDS.KEYID = 0
6,319,453 UART: [idev] Sha1 KeyId Algorithm
6,343,313 UART: [idev] --
6,346,305 UART: [ldev] ++
6,346,880 UART: [ldev] CDI.KEYID = 6
6,347,764 UART: [ldev] SUBJECT.KEYID = 5
6,348,975 UART: [ldev] AUTHORITY.KEYID = 7
6,350,202 UART: [ldev] FE.KEYID = 1
6,360,365 UART: [ldev] Erasing FE.KEYID = 1
8,839,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,574,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,967 UART: [ldev] --
10,630,683 UART: [fwproc] Wait for Commands...
10,632,297 UART: [fwproc] Recv command 0x46574c44
10,634,388 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,484,524 >>> mbox cmd response: success
14,485,163 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,488,051 UART: [afmc] ++
14,488,649 UART: [afmc] CDI.KEYID = 6
14,489,563 UART: [afmc] SUBJECT.KEYID = 7
14,490,722 UART: [afmc] AUTHORITY.KEYID = 5
16,989,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,743 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,370 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,496 UART: [afmc] --
18,784,657 UART: [cold-reset] --
18,788,946 UART: [state] Locking Datavault
18,795,975 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,613 UART: [state] Locking ICCM
18,799,519 UART: [exit] Launching FMC @ 0x40000130
18,807,906 UART:
18,808,170 UART: Running Caliptra FMC ...
18,809,204 UART:
18,809,353 UART: [state] CFI Enabled
18,817,777 UART: [fht] FMC Alias Private Key: 7
20,574,514 UART: [art] Extend RT PCRs Done
20,575,739 UART: [art] Lock RT PCRs Done
20,577,338 UART: [art] Populate DV Done
20,582,604 UART: [fht] FMC Alias Private Key: 7
20,584,191 UART: [art] Derive CDI
20,584,931 UART: [art] Store in in slot 0x4
20,627,786 UART: [art] Derive Key Pair
20,628,784 UART: [art] Store priv key in slot 0x5
23,055,392 UART: [art] Derive Key Pair - Done
23,068,503 UART: [art] Signing Cert with AUTHO
23,069,812 UART: RITY.KEYID = 7
24,774,998 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,495 UART: [art] PUB.X = 533FF0363CFD718B936178CB9E01489096FFA829377F1E3494BF44E1AF1FA38E5C828637A5E858DFF2321D66ED0D761A
24,783,797 UART: [art] PUB.Y = CB8C1973E5C1DDD46836A574962726CDAB2944728B6F159AE0F782F61B30D600BA88147C06AB1C1BA82DED0CB5DFFE79
24,791,030 UART: [art] SIG.R = D953503ACCBDC3B4A89ED754AC31499BBE9FE951F511C34F0CC75B0F50855828E6863A7C4E008386EBF1976D9BD5F4D8
24,798,427 UART: [art] SIG.S = 9A6309777560C83AA0CC2903B8E89B3EB548953FED91D4A6D675C13368FC2226AF5CA283BE55BFE978886CCF9E09204D
25,777,195 UART: Caliptra RT
25,777,939 UART: [state] CFI Enabled
25,896,448 UART: [rt] RT listening for mailbox commands...
25,927,967 UART: [rt]cmd =0x47544744, len=8
25,929,709 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,795 writing to cptra_bootfsm_go
3,696,190 ready_for_fw is high
3,697,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,258,523 >>> mbox cmd response: success
14,259,188 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,506,209 UART:
18,506,597 UART: Running Caliptra FMC ...
18,507,732 UART:
18,507,895 UART: [state] CFI Enabled
18,515,743 UART: [fht] FMC Alias Private Key: 7
20,272,537 UART: [art] Extend RT PCRs Done
20,273,757 UART: [art] Lock RT PCRs Done
20,275,543 UART: [art] Populate DV Done
20,281,218 UART: [fht] FMC Alias Private Key: 7
20,282,927 UART: [art] Derive CDI
20,283,666 UART: [art] Store in in slot 0x4
20,326,588 UART: [art] Derive Key Pair
20,327,586 UART: [art] Store priv key in slot 0x5
22,754,294 UART: [art] Derive Key Pair - Done
22,767,356 UART: [art] Signing Cert with AUTHO
22,768,656 UART: RITY.KEYID = 7
24,474,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,719 UART: [art] PUB.X = C34132C7BA7D0055F26A166423A30ED20F0C2F8BD0F084174FAA86A17B78B7AA2EFB6AEBD3580068A93B71C1F6902886
24,482,965 UART: [art] PUB.Y = 57B85266D288E60ACA3AC91DDF5F48F36C3E0DC0AE02CBB04D0DF5542AE1B38629280F816E1AD707B8419F8249B37D4D
24,490,189 UART: [art] SIG.R = 30CDC41056852805445D4F0D0732E10E5878F833AC4934C214D200057080F54C7191EA2E4B521B98D95E2A6370E7ACE8
24,497,540 UART: [art] SIG.S = 9B931A71A787720E62BA4929C2EBDFC993F1E40A7D4F609B593330CE2548CA7A8073EE59B115DF59D474BF449F9A38A9
25,476,623 UART: Caliptra RT
25,477,324 UART: [state] CFI Enabled
25,595,303 UART: [rt] RT listening for mailbox commands...
25,626,702 UART: [rt]cmd =0x47544744, len=8
25,628,386 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,007 UART:
192,375 UART: Running Caliptra ROM ...
193,513 UART:
193,669 UART: [state] CFI Enabled
263,771 UART: [state] LifecycleState = Unprovisioned
266,119 UART: [state] DebugLocked = No
268,300 UART: [state] WD Timer not started. Device not locked for debugging
273,492 UART: [kat] SHA2-256
463,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,133 UART: [kat] ++
474,630 UART: [kat] sha1
485,864 UART: [kat] SHA2-256
488,877 UART: [kat] SHA2-384
494,475 UART: [kat] SHA2-512-ACC
497,026 UART: [kat] ECC-384
2,949,013 UART: [kat] HMAC-384Kdf
2,972,149 UART: [kat] LMS
3,503,957 UART: [kat] --
3,508,510 UART: [cold-reset] ++
3,509,953 UART: [fht] FHT @ 0x50003400
3,520,865 UART: [idev] ++
3,521,572 UART: [idev] CDI.KEYID = 6
3,522,568 UART: [idev] SUBJECT.KEYID = 7
3,523,745 UART: [idev] UDS.KEYID = 0
3,524,676 ready_for_fw is high
3,524,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,982 UART: [idev] Erasing UDS.KEYID = 0
6,029,027 UART: [idev] Sha1 KeyId Algorithm
6,050,871 UART: [idev] --
6,054,386 UART: [ldev] ++
6,055,072 UART: [ldev] CDI.KEYID = 6
6,055,966 UART: [ldev] SUBJECT.KEYID = 5
6,057,181 UART: [ldev] AUTHORITY.KEYID = 7
6,058,416 UART: [ldev] FE.KEYID = 1
6,102,181 UART: [ldev] Erasing FE.KEYID = 1
8,609,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,835 UART: [ldev] --
10,406,477 UART: [fwproc] Wait for Commands...
10,408,208 UART: [fwproc] Recv command 0x46574c44
10,410,523 UART: [fwproc] Recv'd Img size: 114168 bytes
13,852,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,929,632 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,045,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,587,902 >>> mbox cmd response: success
14,588,423 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,591,643 UART: [afmc] ++
14,592,332 UART: [afmc] CDI.KEYID = 6
14,593,569 UART: [afmc] SUBJECT.KEYID = 7
14,595,002 UART: [afmc] AUTHORITY.KEYID = 5
17,121,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,864,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,866,225 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,881,397 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,896,557 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,911,607 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,936,400 UART: [afmc] --
18,940,208 UART: [cold-reset] --
18,944,884 UART: [state] Locking Datavault
18,950,255 UART: [state] Locking PCR0, PCR1 and PCR31
18,952,396 UART: [state] Locking ICCM
18,955,199 UART: [exit] Launching FMC @ 0x40000130
18,963,875 UART:
18,964,110 UART: Running Caliptra FMC ...
18,965,213 UART:
18,965,374 UART: [state] CFI Enabled
19,021,920 UART: [fht] FMC Alias Private Key: 7
20,786,066 UART: [art] Extend RT PCRs Done
20,787,290 UART: [art] Lock RT PCRs Done
20,788,996 UART: [art] Populate DV Done
20,794,413 UART: [fht] FMC Alias Private Key: 7
20,796,136 UART: [art] Derive CDI
20,796,876 UART: [art] Store in in slot 0x4
20,854,429 UART: [art] Derive Key Pair
20,855,469 UART: [art] Store priv key in slot 0x5
23,318,655 UART: [art] Derive Key Pair - Done
23,331,601 UART: [art] Signing Cert with AUTHO
23,332,908 UART: RITY.KEYID = 7
25,045,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,047,172 UART: [art] PUB.X = C365ADD9A241C8A7B0B4D50EFBC6B286CFDF489FB90B895C71532101548138D41516729977D35BF2A9BDB5E0CEEAA842
25,054,469 UART: [art] PUB.Y = E3FE9225F67D81B915D8AF2123E28EABB259DDDE02D9ABBA3AF3F8C0C22C2D763222BB98AC1E8AA757CD131B57334FFF
25,061,742 UART: [art] SIG.R = 1ED7F3C05EF6DD6CE2D8B17A50C84FE16ACC1C40F28132A32AABB4670D1489B88080D00CD30CE68EA6149D24D76E85A0
25,069,126 UART: [art] SIG.S = 2E1DDB59C10CB83FF36DACC79B17CEADD08CB5B7D52D88BEAA3606B804C0DBC66284EDCF9DD5D4995687C018D6B4775B
26,048,123 UART: Caliptra RT
26,048,836 UART: [state] CFI Enabled
26,213,827 UART: [rt] RT listening for mailbox commands...
26,245,075 UART: [rt]cmd =0x47544744, len=8
26,247,250 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,438,424 ready_for_fw is high
3,439,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,728,299 >>> mbox cmd response: success
14,728,981 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,035,271 UART:
19,035,668 UART: Running Caliptra FMC ...
19,036,785 UART:
19,036,945 UART: [state] CFI Enabled
19,105,785 UART: [fht] FMC Alias Private Key: 7
20,869,750 UART: [art] Extend RT PCRs Done
20,870,992 UART: [art] Lock RT PCRs Done
20,872,754 UART: [art] Populate DV Done
20,878,060 UART: [fht] FMC Alias Private Key: 7
20,879,659 UART: [art] Derive CDI
20,880,400 UART: [art] Store in in slot 0x4
20,938,713 UART: [art] Derive Key Pair
20,939,750 UART: [art] Store priv key in slot 0x5
23,403,113 UART: [art] Derive Key Pair - Done
23,415,516 UART: [art] Signing Cert with AUTHO
23,416,817 UART: RITY.KEYID = 7
25,128,988 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,492 UART: [art] PUB.X = 3E3092D41ADC9AEC80E6EFD4F8FC5045B2DE1474F8DB0F72FE8919548E09F7A9CD52EE6249451D6F5C5A1E6119108210
25,137,738 UART: [art] PUB.Y = 2804F8C5EB36AECCBEBAD549EEED9E0ABF8B465C1A56C4B2BD609BDE23823312DE4A4B86AC0E4CF18A39C0D5E2D7E7CF
25,145,029 UART: [art] SIG.R = 81B101E7917C10F685680F259C442F157C5ABCEEA4D91DE0088D6B168F5B6E18D9F6D194EF6AA2087CCB2FE8CE6C9BCB
25,152,512 UART: [art] SIG.S = 8268C237E987280389E3B6E69FD79D85A31BA851FE7285E23C6A8B851C4E0538968A674681F9086AA86CCB2282B34E8B
26,131,529 UART: Caliptra RT
26,132,255 UART: [state] CFI Enabled
26,298,141 UART: [rt] RT listening for mailbox commands...
26,329,723 UART: [rt]cmd =0x47544744, len=8
26,331,659 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,759 writing to cptra_bootfsm_go
193,009 UART:
193,376 UART: Running Caliptra ROM ...
194,576 UART:
604,313 UART: [state] CFI Enabled
619,005 UART: [state] LifecycleState = Unprovisioned
621,412 UART: [state] DebugLocked = No
622,944 UART: [state] WD Timer not started. Device not locked for debugging
627,554 UART: [kat] SHA2-256
817,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,270 UART: [kat] ++
828,874 UART: [kat] sha1
839,755 UART: [kat] SHA2-256
842,759 UART: [kat] SHA2-384
848,675 UART: [kat] SHA2-512-ACC
851,345 UART: [kat] ECC-384
3,292,679 UART: [kat] HMAC-384Kdf
3,306,903 UART: [kat] LMS
3,838,748 UART: [kat] --
3,843,831 UART: [cold-reset] ++
3,845,409 UART: [fht] FHT @ 0x50003400
3,856,952 UART: [idev] ++
3,857,656 UART: [idev] CDI.KEYID = 6
3,858,689 UART: [idev] SUBJECT.KEYID = 7
3,859,796 UART: [idev] UDS.KEYID = 0
3,860,739 ready_for_fw is high
3,860,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,399 UART: [idev] Erasing UDS.KEYID = 0
6,335,783 UART: [idev] Sha1 KeyId Algorithm
6,358,010 UART: [idev] --
6,362,982 UART: [ldev] ++
6,363,662 UART: [ldev] CDI.KEYID = 6
6,364,591 UART: [ldev] SUBJECT.KEYID = 5
6,365,756 UART: [ldev] AUTHORITY.KEYID = 7
6,366,981 UART: [ldev] FE.KEYID = 1
6,377,513 UART: [ldev] Erasing FE.KEYID = 1
8,854,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,844 UART: [ldev] --
10,644,575 UART: [fwproc] Wait for Commands...
10,646,889 UART: [fwproc] Recv command 0x46574c44
10,649,194 UART: [fwproc] Recv'd Img size: 114168 bytes
14,094,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,666 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,687 >>> mbox cmd response: success
14,831,211 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,834,047 UART: [afmc] ++
14,834,752 UART: [afmc] CDI.KEYID = 6
14,835,993 UART: [afmc] SUBJECT.KEYID = 7
14,837,428 UART: [afmc] AUTHORITY.KEYID = 5
17,344,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,222 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,218 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,140,074 UART: [afmc] --
19,143,942 UART: [cold-reset] --
19,147,966 UART: [state] Locking Datavault
19,154,143 UART: [state] Locking PCR0, PCR1 and PCR31
19,156,301 UART: [state] Locking ICCM
19,157,969 UART: [exit] Launching FMC @ 0x40000130
19,166,642 UART:
19,166,875 UART: Running Caliptra FMC ...
19,167,973 UART:
19,168,140 UART: [state] CFI Enabled
19,176,140 UART: [fht] FMC Alias Private Key: 7
20,933,098 UART: [art] Extend RT PCRs Done
20,934,307 UART: [art] Lock RT PCRs Done
20,936,304 UART: [art] Populate DV Done
20,941,820 UART: [fht] FMC Alias Private Key: 7
20,943,575 UART: [art] Derive CDI
20,944,390 UART: [art] Store in in slot 0x4
20,986,550 UART: [art] Derive Key Pair
20,987,546 UART: [art] Store priv key in slot 0x5
23,414,389 UART: [art] Derive Key Pair - Done
23,427,563 UART: [art] Signing Cert with AUTHO
23,428,881 UART: RITY.KEYID = 7
25,134,583 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,069 UART: [art] PUB.X = 4310E923B009BBA7A96CE91FB33BDFF6F64F707324DD0F8A7FC78D49A3CC68C6BDEE01489D4F60886B66351CDE977068
25,143,367 UART: [art] PUB.Y = 1E1B2E490C65DF8B63EAAD4C2D53C71F9DDC4039DA4A8BCAE958DE3E1784A8E0FACF207E902308DA3E9BBBB80F84F90A
25,150,648 UART: [art] SIG.R = 77852452FF26B08363C05CD2856F6C3283653A524AC730D657FD561D83E7FD2F34EC80E2C137EF696B513C0F0DB5FEF7
25,158,041 UART: [art] SIG.S = BF77B1E314D3BD1F35C04B7A394BC82AFC83280178A293429F544EF6A05FB4C9F16194A33A180F774172A6CA24028D54
26,137,228 UART: Caliptra RT
26,137,937 UART: [state] CFI Enabled
26,254,567 UART: [rt] RT listening for mailbox commands...
26,285,713 UART: [rt]cmd =0x47544744, len=8
26,287,315 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
3,758,032 ready_for_fw is high
3,758,605 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,950,938 >>> mbox cmd response: success
14,951,610 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,205,707 UART:
19,206,102 UART: Running Caliptra FMC ...
19,207,307 UART:
19,207,495 UART: [state] CFI Enabled
19,215,546 UART: [fht] FMC Alias Private Key: 7
20,973,016 UART: [art] Extend RT PCRs Done
20,974,240 UART: [art] Lock RT PCRs Done
20,976,043 UART: [art] Populate DV Done
20,981,335 UART: [fht] FMC Alias Private Key: 7
20,982,943 UART: [art] Derive CDI
20,983,763 UART: [art] Store in in slot 0x4
21,026,847 UART: [art] Derive Key Pair
21,027,851 UART: [art] Store priv key in slot 0x5
23,454,836 UART: [art] Derive Key Pair - Done
23,467,610 UART: [art] Signing Cert with AUTHO
23,468,939 UART: RITY.KEYID = 7
25,174,184 UART: [art] Erasing AUTHORITY.KEYID = 7
25,175,695 UART: [art] PUB.X = 963A39EA05DBDDEDE8D31604256A825BD95E807AFE38D24630272D6BBF898E8D1219E4FACF6B40ED8A05D0E6CD72263D
25,182,994 UART: [art] PUB.Y = 85667C2D91271714985D3C54B536F6DAA1586C2C4051BED628AFE1FBC28F037800B97733017CE214010B58AD11BE0087
25,190,167 UART: [art] SIG.R = 8262EED71AECDDF358A6FA1417524C02F48A81BD8F75EAFD2172228841008744B42DF03993AFC8264DAA607B22FD84E3
25,197,570 UART: [art] SIG.S = 5D3FF92C1B67DD75697207D418F0C23B1EDF52C2199AEE905629DC2AA6D193C3D9120AE416692F1EDD143190E8130A9B
26,176,292 UART: Caliptra RT
26,177,116 UART: [state] CFI Enabled
26,294,491 UART: [rt] RT listening for mailbox commands...
26,326,063 UART: [rt]cmd =0x47544744, len=8
26,328,108 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,197 UART: [kat] SHA2-256
882,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,243 UART: [kat] ++
886,395 UART: [kat] sha1
890,521 UART: [kat] SHA2-256
892,459 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,466 UART: [kat] HMAC-384Kdf
906,878 UART: [kat] LMS
1,475,074 UART: [kat] --
1,475,591 UART: [cold-reset] ++
1,476,163 UART: [fht] Storing FHT @ 0x50003400
1,478,990 UART: [idev] ++
1,479,158 UART: [idev] CDI.KEYID = 6
1,479,518 UART: [idev] SUBJECT.KEYID = 7
1,479,942 UART: [idev] UDS.KEYID = 0
1,480,287 ready_for_fw is high
1,480,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,236 UART: [idev] Erasing UDS.KEYID = 0
1,504,646 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,284 UART: [idev] --
1,514,325 UART: [ldev] ++
1,514,493 UART: [ldev] CDI.KEYID = 6
1,514,856 UART: [ldev] SUBJECT.KEYID = 5
1,515,282 UART: [ldev] AUTHORITY.KEYID = 7
1,515,745 UART: [ldev] FE.KEYID = 1
1,521,159 UART: [ldev] Erasing FE.KEYID = 1
1,546,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,272 UART: [ldev] --
1,585,543 UART: [fwproc] Waiting for Commands...
1,586,226 UART: [fwproc] Received command 0x46574c44
1,587,017 UART: [fwproc] Received Image of size 114168 bytes
2,881,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,981 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,044 >>> mbox cmd response: success
3,074,044 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,075,128 UART: [afmc] ++
3,075,296 UART: [afmc] CDI.KEYID = 6
3,075,658 UART: [afmc] SUBJECT.KEYID = 7
3,076,083 UART: [afmc] AUTHORITY.KEYID = 5
3,110,702 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,298 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,078 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,133,806 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,691 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,381 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,298 UART: [afmc] --
3,154,348 UART: [cold-reset] --
3,155,210 UART: [state] Locking Datavault
3,156,495 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,099 UART: [state] Locking ICCM
3,157,731 UART: [exit] Launching FMC @ 0x40000130
3,163,060 UART:
3,163,076 UART: Running Caliptra FMC ...
3,163,484 UART:
3,163,538 UART: [state] CFI Enabled
3,174,093 UART: [fht] FMC Alias Private Key: 7
3,282,144 UART: [art] Extend RT PCRs Done
3,282,572 UART: [art] Lock RT PCRs Done
3,284,106 UART: [art] Populate DV Done
3,292,519 UART: [fht] FMC Alias Private Key: 7
3,293,501 UART: [art] Derive CDI
3,293,781 UART: [art] Store in in slot 0x4
3,379,438 UART: [art] Derive Key Pair
3,379,798 UART: [art] Store priv key in slot 0x5
3,393,384 UART: [art] Derive Key Pair - Done
3,408,177 UART: [art] Signing Cert with AUTHO
3,408,657 UART: RITY.KEYID = 7
3,423,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,396 UART: [art] PUB.X = 5E855FC6979A2F7FF14AC43A6C3E7FB72C8459775F690105C4B35E3DE63A2606D9A8DEA0F84296F7DA98D1B4A764DD5A
3,431,169 UART: [art] PUB.Y = 50B1F820C71E0136EA1AFBEC14F5C47EF98768DF1C633FFE704B7636B85E1229AFCD1C42B014C37F85B9C3EDDACCC941
3,438,136 UART: [art] SIG.R = 4219E149629149B92E90EF40350C0B51EC4E92EFD95FEF934721C27E804E3C1530D374623431CAFC23E0BB9A132A9275
3,444,898 UART: [art] SIG.S = 1ABBD0AB1C4015DCAC053496F2118A9AE728278833EDEE865CAD1C25409ADE67FFCA6D57AA86CF2CA6043F5B123504D3
3,468,384 UART: Caliptra RT
3,468,637 UART: [state] CFI Enabled
3,575,685 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,451 UART: [rt]cmd =0x47544744, len=8
3,607,948 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,669 ready_for_fw is high
1,362,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,284 >>> mbox cmd response: success
2,926,284 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,988,554 UART:
2,988,570 UART: Running Caliptra FMC ...
2,988,978 UART:
2,989,032 UART: [state] CFI Enabled
2,999,399 UART: [fht] FMC Alias Private Key: 7
3,107,530 UART: [art] Extend RT PCRs Done
3,107,958 UART: [art] Lock RT PCRs Done
3,109,546 UART: [art] Populate DV Done
3,117,427 UART: [fht] FMC Alias Private Key: 7
3,118,527 UART: [art] Derive CDI
3,118,807 UART: [art] Store in in slot 0x4
3,204,332 UART: [art] Derive Key Pair
3,204,692 UART: [art] Store priv key in slot 0x5
3,218,100 UART: [art] Derive Key Pair - Done
3,232,879 UART: [art] Signing Cert with AUTHO
3,233,359 UART: RITY.KEYID = 7
3,248,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,300 UART: [art] PUB.X = 3719E636AB02E5D5E3B010D53B780525CDE7BBE978E83F6D5DC130126B7E433162BC6E0F84D6AB76C53BBB52CB756ABE
3,256,075 UART: [art] PUB.Y = 1510E7943BDCE9227E0E7D1BBB8BA58E6546C511654E999246D8EDC3D856B6B48F478414D7C22A75917C5E6EE881A439
3,263,024 UART: [art] SIG.R = 05AC2976443A4295B727F2E81B12DB9E98F9C90830D146BBD156235C31336913B9218710188432027A53C19B84AABCA5
3,269,775 UART: [art] SIG.S = C8DA19E689B12C1315474D04E56D1082767F93A526ACCCA995B91D57BD1402115459180EBEAE5C9D777842706CA0214C
3,293,359 UART: Caliptra RT
3,293,612 UART: [state] CFI Enabled
3,401,635 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,121 UART: [rt]cmd =0x47544744, len=8
3,433,232 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,906 UART: [kat] SHA2-256
881,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,952 UART: [kat] ++
886,104 UART: [kat] sha1
890,276 UART: [kat] SHA2-256
892,214 UART: [kat] SHA2-384
894,971 UART: [kat] SHA2-512-ACC
896,872 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,175 UART: [kat] LMS
1,475,371 UART: [kat] --
1,476,222 UART: [cold-reset] ++
1,476,802 UART: [fht] Storing FHT @ 0x50003400
1,479,561 UART: [idev] ++
1,479,729 UART: [idev] CDI.KEYID = 6
1,480,089 UART: [idev] SUBJECT.KEYID = 7
1,480,513 UART: [idev] UDS.KEYID = 0
1,480,858 ready_for_fw is high
1,480,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,569 UART: [idev] Erasing UDS.KEYID = 0
1,505,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,229 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,522,054 UART: [ldev] Erasing FE.KEYID = 1
1,547,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,623 UART: [ldev] --
1,587,024 UART: [fwproc] Waiting for Commands...
1,587,781 UART: [fwproc] Received command 0x46574c44
1,588,572 UART: [fwproc] Received Image of size 114168 bytes
2,886,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,849 >>> mbox cmd response: success
3,078,849 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,080,007 UART: [afmc] ++
3,080,175 UART: [afmc] CDI.KEYID = 6
3,080,537 UART: [afmc] SUBJECT.KEYID = 7
3,080,962 UART: [afmc] AUTHORITY.KEYID = 5
3,116,469 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,643 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,145,256 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,946 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,769 UART: [afmc] --
3,159,825 UART: [cold-reset] --
3,160,787 UART: [state] Locking Datavault
3,161,856 UART: [state] Locking PCR0, PCR1 and PCR31
3,162,460 UART: [state] Locking ICCM
3,163,128 UART: [exit] Launching FMC @ 0x40000130
3,168,457 UART:
3,168,473 UART: Running Caliptra FMC ...
3,168,881 UART:
3,169,024 UART: [state] CFI Enabled
3,179,649 UART: [fht] FMC Alias Private Key: 7
3,287,518 UART: [art] Extend RT PCRs Done
3,287,946 UART: [art] Lock RT PCRs Done
3,289,312 UART: [art] Populate DV Done
3,297,679 UART: [fht] FMC Alias Private Key: 7
3,298,707 UART: [art] Derive CDI
3,298,987 UART: [art] Store in in slot 0x4
3,384,952 UART: [art] Derive Key Pair
3,385,312 UART: [art] Store priv key in slot 0x5
3,398,350 UART: [art] Derive Key Pair - Done
3,413,070 UART: [art] Signing Cert with AUTHO
3,413,550 UART: RITY.KEYID = 7
3,428,758 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,523 UART: [art] PUB.X = E27D40F20982B7837F0B889B492399DB81B20615CB4BFCEE6FDDBD755B28D1FD340765C04B01549868043CB27E6AC4AC
3,436,283 UART: [art] PUB.Y = BCF2437A35F4E2E2E6EFA592B706CF96914D5F58FB5D02E2C7190914D4929863AB4734AEBD49265DB5967BD2E97FD300
3,443,210 UART: [art] SIG.R = 1F504938480AE01D027AEDCE2CA826F243EAE3354EEB3D0F498506AB52C9B019018EA0EAC0115EDCEF9E9EE6D3067CAF
3,449,982 UART: [art] SIG.S = 3B3FC21CB4B2996DF675F77B462199909C85861553B741232A8F332C896F940B1665883963185B581BCC3C9DA06AE986
3,473,786 UART: Caliptra RT
3,474,131 UART: [state] CFI Enabled
3,582,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,107 UART: [rt]cmd =0x47544744, len=8
3,614,806 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,444 ready_for_fw is high
1,362,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,671 >>> mbox cmd response: success
2,924,671 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,987,259 UART:
2,987,275 UART: Running Caliptra FMC ...
2,987,683 UART:
2,987,826 UART: [state] CFI Enabled
2,998,449 UART: [fht] FMC Alias Private Key: 7
3,106,526 UART: [art] Extend RT PCRs Done
3,106,954 UART: [art] Lock RT PCRs Done
3,108,592 UART: [art] Populate DV Done
3,116,851 UART: [fht] FMC Alias Private Key: 7
3,117,923 UART: [art] Derive CDI
3,118,203 UART: [art] Store in in slot 0x4
3,204,122 UART: [art] Derive Key Pair
3,204,482 UART: [art] Store priv key in slot 0x5
3,217,414 UART: [art] Derive Key Pair - Done
3,231,919 UART: [art] Signing Cert with AUTHO
3,232,399 UART: RITY.KEYID = 7
3,247,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,312 UART: [art] PUB.X = 0B82E6A9D0A367FEF65259D4649D0DC84D182AA072C451D8A7DA3A19A2E9A7DDD234C6508E7147403E8E169E73CD7768
3,255,082 UART: [art] PUB.Y = 72D568CBA66155309ADCB6C699D8BBBDBA86331A7A951F496FC8104E10FE990FC9997D2A9A7F1BDCD744B677423233B8
3,262,039 UART: [art] SIG.R = 5AC2D1D32644090D747B9EB940B18E0BC16E7EB9001A53757C65662385F0677B5DBF1103CEE6E11F9E192234C0F8CD99
3,268,777 UART: [art] SIG.S = 1D01C3F6F0E40D5DEEB38D36C020EFCA91F6BB5F0DAF1148B7C4EB3C469B85693F7A65CC46880DA8D030C56DD321399A
3,293,038 UART: Caliptra RT
3,293,383 UART: [state] CFI Enabled
3,401,773 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,245 UART: [rt]cmd =0x47544744, len=8
3,434,220 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,628 UART: [kat] SHA2-512-ACC
908,529 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,526 UART: [kat] LMS
1,170,854 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,602 UART: [idev] ++
1,174,770 UART: [idev] CDI.KEYID = 6
1,175,130 UART: [idev] SUBJECT.KEYID = 7
1,175,554 UART: [idev] UDS.KEYID = 0
1,175,899 ready_for_fw is high
1,175,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,566 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,445 UART: [idev] --
1,210,299 UART: [ldev] ++
1,210,467 UART: [ldev] CDI.KEYID = 6
1,210,830 UART: [ldev] SUBJECT.KEYID = 5
1,211,256 UART: [ldev] AUTHORITY.KEYID = 7
1,211,719 UART: [ldev] FE.KEYID = 1
1,217,181 UART: [ldev] Erasing FE.KEYID = 1
1,243,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,282,950 UART: [fwproc] Wait for Commands...
1,283,722 UART: [fwproc] Recv command 0x46574c44
1,284,450 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,798 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,102 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,687 >>> mbox cmd response: success
2,773,687 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,774,949 UART: [afmc] ++
2,775,117 UART: [afmc] CDI.KEYID = 6
2,775,479 UART: [afmc] SUBJECT.KEYID = 7
2,775,904 UART: [afmc] AUTHORITY.KEYID = 5
2,811,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,620 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,348 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,233 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,952 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,742 UART: [afmc] --
2,854,640 UART: [cold-reset] --
2,855,712 UART: [state] Locking Datavault
2,856,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,449 UART: [state] Locking ICCM
2,858,099 UART: [exit] Launching FMC @ 0x40000130
2,863,428 UART:
2,863,444 UART: Running Caliptra FMC ...
2,863,852 UART:
2,863,906 UART: [state] CFI Enabled
2,874,413 UART: [fht] FMC Alias Private Key: 7
2,982,864 UART: [art] Extend RT PCRs Done
2,983,292 UART: [art] Lock RT PCRs Done
2,984,858 UART: [art] Populate DV Done
2,992,933 UART: [fht] FMC Alias Private Key: 7
2,994,107 UART: [art] Derive CDI
2,994,387 UART: [art] Store in in slot 0x4
3,079,990 UART: [art] Derive Key Pair
3,080,350 UART: [art] Store priv key in slot 0x5
3,093,718 UART: [art] Derive Key Pair - Done
3,108,215 UART: [art] Signing Cert with AUTHO
3,108,695 UART: RITY.KEYID = 7
3,123,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,144 UART: [art] PUB.X = EFCAB02CC5E37624C304EDF3A161A46D9475C757CDF1D5C9705F1C5D682256458E60CECD0C9A0FAB3B3C5573BF5F5013
3,130,921 UART: [art] PUB.Y = FDA30EB0DFB313CEC9032711724F3EBA0B3B7CAC2E564FB57C15EB37B1A6C4E4FB78BD7696393AD7C68E1C994A148D3A
3,137,884 UART: [art] SIG.R = D22F799517EADA482C41A399D1D34F478840081DA5E99D229930E72EFBF09B97E5015A766079133145BE9B87F6447398
3,144,640 UART: [art] SIG.S = A063728DBD93A32B67650ADCE5AFE98C4ADD89C27724035F4FF5F768C696AE971347B47AFADE9BBCA2F0D983F6DFCEB7
3,168,297 UART: Caliptra RT
3,168,550 UART: [state] CFI Enabled
3,276,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,354 UART: [rt]cmd =0x47544744, len=8
3,309,027 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,123 ready_for_fw is high
1,059,123 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,628 >>> mbox cmd response: success
2,623,628 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,685,340 UART:
2,685,356 UART: Running Caliptra FMC ...
2,685,764 UART:
2,685,818 UART: [state] CFI Enabled
2,696,499 UART: [fht] FMC Alias Private Key: 7
2,804,360 UART: [art] Extend RT PCRs Done
2,804,788 UART: [art] Lock RT PCRs Done
2,806,266 UART: [art] Populate DV Done
2,814,479 UART: [fht] FMC Alias Private Key: 7
2,815,583 UART: [art] Derive CDI
2,815,863 UART: [art] Store in in slot 0x4
2,901,438 UART: [art] Derive Key Pair
2,901,798 UART: [art] Store priv key in slot 0x5
2,915,256 UART: [art] Derive Key Pair - Done
2,930,200 UART: [art] Signing Cert with AUTHO
2,930,680 UART: RITY.KEYID = 7
2,945,972 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,737 UART: [art] PUB.X = 03CBC6DEB7D6ECA2B9C71375DC4DFEBACF390C69A6F26A2936AE1EF0876437ABBB82711DCFE2F6BA4C9B4F52341AE421
2,953,529 UART: [art] PUB.Y = B8FAED777DFC2376C99F69DD3488F5FDE55D8197FD780B7DBD9643D3CF233A5E64AF64F13FA7319C08720D0405A086D9
2,960,476 UART: [art] SIG.R = 7409BE3EF3DEB7D1A7B7EC409414314D858803ECA182B3155877920F19416740ECA9E4F67AF991F9AA9D090FAFE37843
2,967,235 UART: [art] SIG.S = 171CB8197BD5DF79F0B2B3E4900486A053B3F1198B627F6F60CA26BBDD20E8C7D54DB5A6D8E958F9FA73CF2CB3C9095D
2,990,744 UART: Caliptra RT
2,990,997 UART: [state] CFI Enabled
3,099,172 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,578 UART: [rt]cmd =0x47544744, len=8
3,131,153 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
893,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,454 UART: [kat] ++
897,606 UART: [kat] sha1
901,838 UART: [kat] SHA2-256
903,778 UART: [kat] SHA2-384
906,391 UART: [kat] SHA2-512-ACC
908,292 UART: [kat] ECC-384
917,661 UART: [kat] HMAC-384Kdf
922,149 UART: [kat] LMS
1,170,477 UART: [kat] --
1,171,248 UART: [cold-reset] ++
1,171,806 UART: [fht] FHT @ 0x50003400
1,174,545 UART: [idev] ++
1,174,713 UART: [idev] CDI.KEYID = 6
1,175,073 UART: [idev] SUBJECT.KEYID = 7
1,175,497 UART: [idev] UDS.KEYID = 0
1,175,842 ready_for_fw is high
1,175,842 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,865 UART: [idev] Erasing UDS.KEYID = 0
1,200,690 UART: [idev] Sha1 KeyId Algorithm
1,209,074 UART: [idev] --
1,210,258 UART: [ldev] ++
1,210,426 UART: [ldev] CDI.KEYID = 6
1,210,789 UART: [ldev] SUBJECT.KEYID = 5
1,211,215 UART: [ldev] AUTHORITY.KEYID = 7
1,211,678 UART: [ldev] FE.KEYID = 1
1,217,108 UART: [ldev] Erasing FE.KEYID = 1
1,243,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,082 UART: [ldev] --
1,283,571 UART: [fwproc] Wait for Commands...
1,284,273 UART: [fwproc] Recv command 0x46574c44
1,285,001 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,699 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,366 >>> mbox cmd response: success
2,773,366 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,774,576 UART: [afmc] ++
2,774,744 UART: [afmc] CDI.KEYID = 6
2,775,106 UART: [afmc] SUBJECT.KEYID = 7
2,775,531 UART: [afmc] AUTHORITY.KEYID = 5
2,810,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,165 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,050 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,747 UART: [afmc] --
2,854,877 UART: [cold-reset] --
2,855,649 UART: [state] Locking Datavault
2,856,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,320 UART: [state] Locking ICCM
2,857,930 UART: [exit] Launching FMC @ 0x40000130
2,863,259 UART:
2,863,275 UART: Running Caliptra FMC ...
2,863,683 UART:
2,863,826 UART: [state] CFI Enabled
2,874,131 UART: [fht] FMC Alias Private Key: 7
2,981,664 UART: [art] Extend RT PCRs Done
2,982,092 UART: [art] Lock RT PCRs Done
2,983,870 UART: [art] Populate DV Done
2,992,189 UART: [fht] FMC Alias Private Key: 7
2,993,153 UART: [art] Derive CDI
2,993,433 UART: [art] Store in in slot 0x4
3,078,942 UART: [art] Derive Key Pair
3,079,302 UART: [art] Store priv key in slot 0x5
3,092,344 UART: [art] Derive Key Pair - Done
3,106,753 UART: [art] Signing Cert with AUTHO
3,107,233 UART: RITY.KEYID = 7
3,122,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,282 UART: [art] PUB.X = C80B013B97FE0A2823EEDF309B0B5A76707AA31E940439E523BDE719A09715A405C61900D0A6F3F2F6EA3A0930318587
3,130,009 UART: [art] PUB.Y = B2D75E470815760148BCC9445FAE0B832006ED5174C950D01ED6AB00E2AFFD14C67BA50F6E36E49F68D3A93F175968A1
3,136,928 UART: [art] SIG.R = D251857835A4DE9C8D0F8237477746988D81B0368D55FF35E74C997C2719ACD63B6F7883A1546BCB9D3460BF661B0F03
3,143,685 UART: [art] SIG.S = 7696CDA7E112A6775E419B3F470DF9B60C8C690A26F691A91D68FF724D16D4D3C4885337CEA402300FCAD2B36679ABB6
3,168,081 UART: Caliptra RT
3,168,426 UART: [state] CFI Enabled
3,276,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,535 UART: [rt]cmd =0x47544744, len=8
3,308,356 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,270 ready_for_fw is high
1,060,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,557 >>> mbox cmd response: success
2,625,557 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,687,209 UART:
2,687,225 UART: Running Caliptra FMC ...
2,687,633 UART:
2,687,776 UART: [state] CFI Enabled
2,698,455 UART: [fht] FMC Alias Private Key: 7
2,806,624 UART: [art] Extend RT PCRs Done
2,807,052 UART: [art] Lock RT PCRs Done
2,808,570 UART: [art] Populate DV Done
2,816,669 UART: [fht] FMC Alias Private Key: 7
2,817,677 UART: [art] Derive CDI
2,817,957 UART: [art] Store in in slot 0x4
2,903,948 UART: [art] Derive Key Pair
2,904,308 UART: [art] Store priv key in slot 0x5
2,917,564 UART: [art] Derive Key Pair - Done
2,932,318 UART: [art] Signing Cert with AUTHO
2,932,798 UART: RITY.KEYID = 7
2,947,952 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,717 UART: [art] PUB.X = C16CB8CCF3C3A5E3136E486B6C54C64AFB0B083B7AF1AFD9C47B3BC6E44ACBBC5735067E64D253E84AC91789680A5A49
2,955,493 UART: [art] PUB.Y = 896FC3A6FC1FEAA6966C91046C7CA8F3730C0830C11BF79B4B0B414AE601F632A30F73032DF632EC917C1CDB63720D50
2,962,427 UART: [art] SIG.R = 2C21BFD3C91A04DACE5AD89383A43BFDF2565806F86DF98957D4CE8E264B123493D95469961CBCBF0A7422C23D7363DB
2,969,198 UART: [art] SIG.S = 8E0C6D53DAC4596ABDBD743596C08245697C51748204FA349B67FD8603C04344B57910C0B944C7CBDD302A503F6771FF
2,993,136 UART: Caliptra RT
2,993,481 UART: [state] CFI Enabled
3,101,464 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,910 UART: [rt]cmd =0x47544744, len=8
3,133,505 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,039 UART: [kat] ++
895,191 UART: [kat] sha1
899,399 UART: [kat] SHA2-256
901,339 UART: [kat] SHA2-384
903,908 UART: [kat] SHA2-512-ACC
905,809 UART: [kat] ECC-384
915,600 UART: [kat] HMAC-384Kdf
920,246 UART: [kat] LMS
1,168,558 UART: [kat] --
1,169,417 UART: [cold-reset] ++
1,169,853 UART: [fht] FHT @ 0x50003400
1,172,505 UART: [idev] ++
1,172,673 UART: [idev] CDI.KEYID = 6
1,173,034 UART: [idev] SUBJECT.KEYID = 7
1,173,459 UART: [idev] UDS.KEYID = 0
1,173,805 ready_for_fw is high
1,173,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,535 UART: [idev] Erasing UDS.KEYID = 0
1,198,247 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,208,312 UART: [ldev] ++
1,208,480 UART: [ldev] CDI.KEYID = 6
1,208,844 UART: [ldev] SUBJECT.KEYID = 5
1,209,271 UART: [ldev] AUTHORITY.KEYID = 7
1,209,734 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,804 UART: [ldev] --
1,281,260 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x46574c44
1,282,630 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,550 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,561 >>> mbox cmd response: success
2,770,561 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,771,726 UART: [afmc] ++
2,771,894 UART: [afmc] CDI.KEYID = 6
2,772,257 UART: [afmc] SUBJECT.KEYID = 7
2,772,683 UART: [afmc] AUTHORITY.KEYID = 5
2,807,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,240 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,991 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,720 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,603 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,322 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,307 UART: [afmc] --
2,851,321 UART: [cold-reset] --
2,852,039 UART: [state] Locking Datavault
2,853,180 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,784 UART: [state] Locking ICCM
2,854,240 UART: [exit] Launching FMC @ 0x40000130
2,859,569 UART:
2,859,585 UART: Running Caliptra FMC ...
2,859,993 UART:
2,860,047 UART: [state] CFI Enabled
2,870,854 UART: [fht] FMC Alias Private Key: 7
2,978,503 UART: [art] Extend RT PCRs Done
2,978,931 UART: [art] Lock RT PCRs Done
2,980,553 UART: [art] Populate DV Done
2,988,874 UART: [fht] FMC Alias Private Key: 7
2,990,040 UART: [art] Derive CDI
2,990,320 UART: [art] Store in in slot 0x4
3,076,015 UART: [art] Derive Key Pair
3,076,375 UART: [art] Store priv key in slot 0x5
3,088,925 UART: [art] Derive Key Pair - Done
3,103,653 UART: [art] Signing Cert with AUTHO
3,104,133 UART: RITY.KEYID = 7
3,118,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,694 UART: [art] PUB.X = 9257383D3A4600AA8B55069016A08FF3FC97E71B4187E5B42A67257BBED4720A03786E6E86A71B7E87C7B42462E77D29
3,126,429 UART: [art] PUB.Y = 40B0638E900B24842BAD035122EBF956C99C597FB3183A363E505550906C3F5C90D25E6C7EC884333F766FB5C1A1FD38
3,133,371 UART: [art] SIG.R = 4CE58C72DDB9C444E663DFAF0667D9412A5A5869A54548D6A87BFF9F599288782F20440C11239315D5A67C7FD11C01B5
3,140,132 UART: [art] SIG.S = E133E72E9718F1354894D3BD4210FBFA14DD9FB7F426D8424162C6D105E948DFBAFEFEB82DFDD27B8EE7450B6D3C05FE
3,163,706 UART: Caliptra RT
3,163,959 UART: [state] CFI Enabled
3,271,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,144 UART: [rt]cmd =0x47544744, len=8
3,303,815 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,820 ready_for_fw is high
1,055,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,769 >>> mbox cmd response: success
2,619,769 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,681,825 UART:
2,681,841 UART: Running Caliptra FMC ...
2,682,249 UART:
2,682,303 UART: [state] CFI Enabled
2,692,714 UART: [fht] FMC Alias Private Key: 7
2,800,193 UART: [art] Extend RT PCRs Done
2,800,621 UART: [art] Lock RT PCRs Done
2,802,187 UART: [art] Populate DV Done
2,810,332 UART: [fht] FMC Alias Private Key: 7
2,811,376 UART: [art] Derive CDI
2,811,656 UART: [art] Store in in slot 0x4
2,897,197 UART: [art] Derive Key Pair
2,897,557 UART: [art] Store priv key in slot 0x5
2,910,305 UART: [art] Derive Key Pair - Done
2,924,989 UART: [art] Signing Cert with AUTHO
2,925,469 UART: RITY.KEYID = 7
2,941,067 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,832 UART: [art] PUB.X = F73948D7BC92F2FA098AB00DF25B0AA3977EE021827F356F9CC783EE74AEDC0122520E8DC49F0A9E0DAB5F8B4EB96D34
2,948,599 UART: [art] PUB.Y = 83519FB51E2A8DD75040FD90AE64F50772853390A692AA55EAB139A5749B027B7FDF0DCC72E1614AB4CC6AEB8A5EFC59
2,955,554 UART: [art] SIG.R = A7684A1FEB9D6FBDA4C4AECD23C76FF0617CAC5A01AC2A338CE87FB5CE4DFBA3B6E09BFF9FBCE2A88E9527CAE22A7CF8
2,962,363 UART: [art] SIG.S = B9CADA379FEC2EAD8D1B5ACAFB27503540ACF5D1943035160F9BC3E93B40EFBC11DD95B52862FA5471C2CE8C0E0B905A
2,986,477 UART: Caliptra RT
2,986,730 UART: [state] CFI Enabled
3,094,912 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,600 UART: [rt]cmd =0x47544744, len=8
3,127,003 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,100 UART: [kat] ++
896,252 UART: [kat] sha1
900,582 UART: [kat] SHA2-256
902,522 UART: [kat] SHA2-384
905,251 UART: [kat] SHA2-512-ACC
907,152 UART: [kat] ECC-384
916,841 UART: [kat] HMAC-384Kdf
921,305 UART: [kat] LMS
1,169,617 UART: [kat] --
1,170,480 UART: [cold-reset] ++
1,170,978 UART: [fht] FHT @ 0x50003400
1,173,760 UART: [idev] ++
1,173,928 UART: [idev] CDI.KEYID = 6
1,174,289 UART: [idev] SUBJECT.KEYID = 7
1,174,714 UART: [idev] UDS.KEYID = 0
1,175,060 ready_for_fw is high
1,175,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,594 UART: [idev] Erasing UDS.KEYID = 0
1,199,638 UART: [idev] Sha1 KeyId Algorithm
1,208,610 UART: [idev] --
1,209,631 UART: [ldev] ++
1,209,799 UART: [ldev] CDI.KEYID = 6
1,210,163 UART: [ldev] SUBJECT.KEYID = 5
1,210,590 UART: [ldev] AUTHORITY.KEYID = 7
1,211,053 UART: [ldev] FE.KEYID = 1
1,216,355 UART: [ldev] Erasing FE.KEYID = 1
1,242,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,251 UART: [ldev] --
1,281,693 UART: [fwproc] Wait for Commands...
1,282,308 UART: [fwproc] Recv command 0x46574c44
1,283,041 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,417 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,726 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,414 >>> mbox cmd response: success
2,770,414 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,771,543 UART: [afmc] ++
2,771,711 UART: [afmc] CDI.KEYID = 6
2,772,074 UART: [afmc] SUBJECT.KEYID = 7
2,772,500 UART: [afmc] AUTHORITY.KEYID = 5
2,807,933 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,284 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,896 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,615 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,608 UART: [afmc] --
2,851,700 UART: [cold-reset] --
2,852,722 UART: [state] Locking Datavault
2,853,897 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,501 UART: [state] Locking ICCM
2,854,969 UART: [exit] Launching FMC @ 0x40000130
2,860,298 UART:
2,860,314 UART: Running Caliptra FMC ...
2,860,722 UART:
2,860,865 UART: [state] CFI Enabled
2,871,854 UART: [fht] FMC Alias Private Key: 7
2,978,749 UART: [art] Extend RT PCRs Done
2,979,177 UART: [art] Lock RT PCRs Done
2,980,473 UART: [art] Populate DV Done
2,988,776 UART: [fht] FMC Alias Private Key: 7
2,989,738 UART: [art] Derive CDI
2,990,018 UART: [art] Store in in slot 0x4
3,075,699 UART: [art] Derive Key Pair
3,076,059 UART: [art] Store priv key in slot 0x5
3,089,495 UART: [art] Derive Key Pair - Done
3,104,315 UART: [art] Signing Cert with AUTHO
3,104,795 UART: RITY.KEYID = 7
3,119,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,674 UART: [art] PUB.X = 1440A387923F484C2A93893814BAD3ABB58A619C8B2BDA9F2CE5DCB782C5DD2A1C0CF24F1BA7B75721849DBED9996AE8
3,127,457 UART: [art] PUB.Y = 51B1B14C0373AE84B18A25B18ACB88480606B49F090BC4F0E8A4DB20E578FF7BFE51177EE6CC6F1066855D7BC356EECD
3,134,406 UART: [art] SIG.R = 1E96A23A41F3462CDA25EDCCB0641698B0EFA81AF2DC0C69B20D6D603092974CAE2C7894174E4E5CAE1937894218731A
3,141,176 UART: [art] SIG.S = 324A856B94BE2C48F954B809EA2FE2DE5B2EC54DFD035D38A81C4B8CBB14523D1489D12E97EE8229842A491C280D76E3
3,164,992 UART: Caliptra RT
3,165,337 UART: [state] CFI Enabled
3,273,830 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,178 UART: [rt]cmd =0x47544744, len=8
3,305,709 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,589 ready_for_fw is high
1,056,589 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,700 >>> mbox cmd response: success
2,620,700 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,682,902 UART:
2,682,918 UART: Running Caliptra FMC ...
2,683,326 UART:
2,683,469 UART: [state] CFI Enabled
2,694,208 UART: [fht] FMC Alias Private Key: 7
2,801,829 UART: [art] Extend RT PCRs Done
2,802,257 UART: [art] Lock RT PCRs Done
2,803,899 UART: [art] Populate DV Done
2,812,050 UART: [fht] FMC Alias Private Key: 7
2,813,230 UART: [art] Derive CDI
2,813,510 UART: [art] Store in in slot 0x4
2,899,321 UART: [art] Derive Key Pair
2,899,681 UART: [art] Store priv key in slot 0x5
2,912,647 UART: [art] Derive Key Pair - Done
2,927,320 UART: [art] Signing Cert with AUTHO
2,927,800 UART: RITY.KEYID = 7
2,943,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,801 UART: [art] PUB.X = 33E46BAFC683DC904BD18FA9291DF83D859508C2A627AF317BE9A7404C99007882C52B850EBE7C731F072ED1384A28BF
2,950,546 UART: [art] PUB.Y = 863503DFC3C363BC2FDCAA3D2BA56CD555B30E0ED057538F406E9A0F03167200485EE709ABE0182F5380AECD7CB3A858
2,957,468 UART: [art] SIG.R = 1BE5545BBF59E33E31E56BFD674F184D217B969967FB0206FE2811859745E5F0C0646F0A26012A79D581EC841B00A83B
2,964,202 UART: [art] SIG.S = 77B900DEBD335FBAB7BF7414A773E33A01E6BFBD7F5C8FD7CE53F44EA345314AEE712B616785AA05980C2A42E5AF5CB0
2,988,356 UART: Caliptra RT
2,988,701 UART: [state] CFI Enabled
3,096,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,372 UART: [rt]cmd =0x47544744, len=8
3,128,999 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
191,941 UART:
192,328 UART: Running Caliptra ROM ...
193,511 UART:
193,661 UART: [state] CFI Enabled
263,609 UART: [state] LifecycleState = Unprovisioned
265,593 UART: [state] DebugLocked = No
268,190 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,123 UART: [kat] SHA2-256
442,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,339 UART: [kat] ++
453,869 UART: [kat] sha1
464,746 UART: [kat] SHA2-256
467,394 UART: [kat] SHA2-384
472,591 UART: [kat] SHA2-512-ACC
474,950 UART: [kat] ECC-384
2,768,883 UART: [kat] HMAC-384Kdf
2,801,591 UART: [kat] LMS
3,991,885 UART: [kat] --
3,996,210 UART: [cold-reset] ++
3,998,220 UART: [fht] Storing FHT @ 0x50003400
4,009,057 UART: [idev] ++
4,009,622 UART: [idev] CDI.KEYID = 6
4,010,544 UART: [idev] SUBJECT.KEYID = 7
4,011,785 UART: [idev] UDS.KEYID = 0
4,012,848 ready_for_fw is high
4,013,076 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,376 UART: [idev] Erasing UDS.KEYID = 0
7,349,207 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,551 UART: [idev] --
7,373,593 UART: [ldev] ++
7,374,156 UART: [ldev] CDI.KEYID = 6
7,375,118 UART: [ldev] SUBJECT.KEYID = 5
7,376,322 UART: [ldev] AUTHORITY.KEYID = 7
7,377,618 UART: [ldev] FE.KEYID = 1
7,422,075 UART: [ldev] Erasing FE.KEYID = 1
10,754,181 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,351 UART: [ldev] --
13,115,578 UART: [fwproc] Waiting for Commands...
13,118,309 UART: [fwproc] Received command 0x46574c44
13,120,478 UART: [fwproc] Received Image of size 113844 bytes
17,167,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,238,807 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,307,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,623,237 >>> mbox cmd response: success
17,623,776 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,627,409 UART: [afmc] ++
17,627,998 UART: [afmc] CDI.KEYID = 6
17,629,017 UART: [afmc] SUBJECT.KEYID = 7
17,630,168 UART: [afmc] AUTHORITY.KEYID = 5
20,982,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,444 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,707 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,135 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,951 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,412 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,311 UART: [afmc] --
23,356,843 UART: [cold-reset] --
23,361,894 UART: [state] Locking Datavault
23,366,882 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,571 UART: [state] Locking ICCM
23,370,014 UART: [exit] Launching FMC @ 0x40000130
23,378,428 UART:
23,378,668 UART: Running Caliptra FMC ...
23,379,762 UART:
23,379,919 UART: [state] CFI Enabled
23,445,013 UART: [fht] FMC Alias Private Key: 7
25,783,524 UART: [art] Extend RT PCRs Done
25,784,739 UART: [art] Lock RT PCRs Done
25,786,786 UART: [art] Populate DV Done
25,792,086 UART: [fht] FMC Alias Private Key: 7
25,793,736 UART: [art] Derive CDI
25,794,557 UART: [art] Store in in slot 0x4
25,852,939 UART: [art] Derive Key Pair
25,853,968 UART: [art] Store priv key in slot 0x5
29,146,409 UART: [art] Derive Key Pair - Done
29,159,232 UART: [art] Signing Cert with AUTHO
29,160,525 UART: RITY.KEYID = 7
31,447,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,298 UART: [art] PUB.X = B6EE28C73335198A7EDFF395219CF3E36D51216297E94900BBB7541788C10BC7CC7EDBA993A9071DD508D59ABFA9A3B7
31,456,533 UART: [art] PUB.Y = 5AE9C9BE0A02FE1CEFBB050CDBFFA5E41758B339C68801AC88926E45403AF1D7D6278D1C29D352C6092C14B5EBD58875
31,463,848 UART: [art] SIG.R = E8D84530E5A5176EE4D0757366A95E8D66380B801258DCD24848B3C2F13EBD27AFC79DCE148974C63355BDA66AD9BF74
31,471,224 UART: [art] SIG.S = F72D416BBBADDFADFB1C2132B0C4F3C51E2E2DEABD2FE57691CC91B9E8BB6C7969CAC9CEBC24C33948E00FFFAE5C3C7F
32,776,477 UART: Caliptra RT
32,777,185 UART: [state] CFI Enabled
32,938,926 UART: [rt] RT listening for mailbox commands...
32,970,342 UART: [rt]cmd =0x54514754, len=24
32,973,133 >>> mbox cmd response data (8 bytes)
32,973,566 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,003,515 UART: [rt]cmd =0x54514754, len=24
33,005,756 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,782,640 ready_for_fw is high
3,783,200 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,839,471 >>> mbox cmd response: success
17,840,201 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,526,417 UART:
23,526,822 UART: Running Caliptra FMC ...
23,527,933 UART:
23,528,080 UART: [state] CFI Enabled
23,595,218 UART: [fht] FMC Alias Private Key: 7
25,933,037 UART: [art] Extend RT PCRs Done
25,934,265 UART: [art] Lock RT PCRs Done
25,935,915 UART: [art] Populate DV Done
25,941,322 UART: [fht] FMC Alias Private Key: 7
25,943,075 UART: [art] Derive CDI
25,943,885 UART: [art] Store in in slot 0x4
26,003,054 UART: [art] Derive Key Pair
26,004,093 UART: [art] Store priv key in slot 0x5
29,296,867 UART: [art] Derive Key Pair - Done
29,309,647 UART: [art] Signing Cert with AUTHO
29,310,977 UART: RITY.KEYID = 7
31,598,492 UART: [art] Erasing AUTHORITY.KEYID = 7
31,600,039 UART: [art] PUB.X = 503F1C4B0CEF83772305C3D641170627227397782EF3C5E72EFA0BF13C65B135B025D8985435D873AD66819612538569
31,607,229 UART: [art] PUB.Y = 5F118CB19F594D6A4A7037352055C2638DBBA816416C03E28B93BA1E7414E02407250D51A1DB0064DA973BC37FA93A5D
31,614,451 UART: [art] SIG.R = 8D0F70A3DEE9EC74DECF803269C8BE69D545B37B9A49AD3251FF91F043ED7FF594C4C9CA108488A5523BD306F415B472
31,621,836 UART: [art] SIG.S = 4CAD7A1D123D79E764101B44C2BE7B2B9015C40A24428C1B5FC8DB89B6352AB7B715D162B7D85D9ACC2C6F93C0183066
32,927,331 UART: Caliptra RT
32,928,043 UART: [state] CFI Enabled
33,089,463 UART: [rt] RT listening for mailbox commands...
33,120,980 UART: [rt]cmd =0x54514754, len=24
33,123,654 >>> mbox cmd response data (8 bytes)
33,124,068 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,154,075 UART: [rt]cmd =0x54514754, len=24
33,156,316 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,481 UART:
192,844 UART: Running Caliptra ROM ...
194,036 UART:
603,890 UART: [state] CFI Enabled
619,633 UART: [state] LifecycleState = Unprovisioned
621,582 UART: [state] DebugLocked = No
623,460 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,608 UART: [kat] SHA2-256
798,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,938 UART: [kat] ++
809,385 UART: [kat] sha1
820,766 UART: [kat] SHA2-256
823,498 UART: [kat] SHA2-384
829,512 UART: [kat] SHA2-512-ACC
831,887 UART: [kat] ECC-384
3,116,275 UART: [kat] HMAC-384Kdf
3,127,441 UART: [kat] LMS
4,317,574 UART: [kat] --
4,323,010 UART: [cold-reset] ++
4,324,322 UART: [fht] Storing FHT @ 0x50003400
4,336,444 UART: [idev] ++
4,337,009 UART: [idev] CDI.KEYID = 6
4,338,046 UART: [idev] SUBJECT.KEYID = 7
4,339,225 UART: [idev] UDS.KEYID = 0
4,340,271 ready_for_fw is high
4,340,476 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,469 UART: [idev] Erasing UDS.KEYID = 0
7,624,865 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,443 UART: [idev] --
7,650,595 UART: [ldev] ++
7,651,177 UART: [ldev] CDI.KEYID = 6
7,652,144 UART: [ldev] SUBJECT.KEYID = 5
7,653,360 UART: [ldev] AUTHORITY.KEYID = 7
7,654,589 UART: [ldev] FE.KEYID = 1
7,666,372 UART: [ldev] Erasing FE.KEYID = 1
10,958,924 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,292 UART: [ldev] --
13,320,351 UART: [fwproc] Waiting for Commands...
13,323,731 UART: [fwproc] Received command 0x46574c44
13,325,938 UART: [fwproc] Received Image of size 113844 bytes
17,379,833 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,057 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,951 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,840,023 >>> mbox cmd response: success
17,840,571 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,843,632 UART: [afmc] ++
17,844,139 UART: [afmc] CDI.KEYID = 6
17,845,217 UART: [afmc] SUBJECT.KEYID = 7
17,846,330 UART: [afmc] AUTHORITY.KEYID = 5
21,157,892 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,453,576 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,455,839 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,470,243 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,485,033 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,499,524 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,521,087 UART: [afmc] --
23,524,899 UART: [cold-reset] --
23,527,752 UART: [state] Locking Datavault
23,534,135 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,839 UART: [state] Locking ICCM
23,537,158 UART: [exit] Launching FMC @ 0x40000130
23,545,550 UART:
23,545,786 UART: Running Caliptra FMC ...
23,546,820 UART:
23,546,972 UART: [state] CFI Enabled
23,555,129 UART: [fht] FMC Alias Private Key: 7
25,886,000 UART: [art] Extend RT PCRs Done
25,887,232 UART: [art] Lock RT PCRs Done
25,888,773 UART: [art] Populate DV Done
25,894,185 UART: [fht] FMC Alias Private Key: 7
25,895,940 UART: [art] Derive CDI
25,896,679 UART: [art] Store in in slot 0x4
25,939,705 UART: [art] Derive Key Pair
25,940,724 UART: [art] Store priv key in slot 0x5
29,183,228 UART: [art] Derive Key Pair - Done
29,196,543 UART: [art] Signing Cert with AUTHO
29,197,847 UART: RITY.KEYID = 7
31,477,239 UART: [art] Erasing AUTHORITY.KEYID = 7
31,478,739 UART: [art] PUB.X = E49E757E2CA1C1EB2443F81356CF266090C8A68C75A85763DF0EE1BC9518C3297CF3A4048CD562C2A64AFEBD204D9D18
31,485,994 UART: [art] PUB.Y = 5DDEA2A59B48193D522C541F4840EC2E279319D498D5B52B5D030A66B1FF235A433B2834A6C2E764BB8348AC56449C78
31,493,233 UART: [art] SIG.R = C2448D16C3D4804F3DD3F95C0C4CA4BE24DD5AD4B9E99C6C0E0A5AFC9D4B5BCCAC0FF33FA105D55CC2F38F7EFC3DC457
31,500,626 UART: [art] SIG.S = 392441C093753C04D2CF503CD9C40A1395E49330B9EFFCE34CB2D290D683BA50C8F0D2C8582F25565E2A8C41916E399F
32,805,598 UART: Caliptra RT
32,806,296 UART: [state] CFI Enabled
32,922,939 UART: [rt] RT listening for mailbox commands...
32,954,602 UART: [rt]cmd =0x54514754, len=24
32,957,241 >>> mbox cmd response data (8 bytes)
32,957,701 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,987,610 UART: [rt]cmd =0x54514754, len=24
32,990,139 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
4,120,584 ready_for_fw is high
4,121,166 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,059,474 >>> mbox cmd response: success
18,060,139 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,696,822 UART:
23,697,208 UART: Running Caliptra FMC ...
23,698,325 UART:
23,698,478 UART: [state] CFI Enabled
23,706,380 UART: [fht] FMC Alias Private Key: 7
26,037,176 UART: [art] Extend RT PCRs Done
26,038,399 UART: [art] Lock RT PCRs Done
26,040,380 UART: [art] Populate DV Done
26,046,121 UART: [fht] FMC Alias Private Key: 7
26,047,611 UART: [art] Derive CDI
26,048,381 UART: [art] Store in in slot 0x4
26,090,760 UART: [art] Derive Key Pair
26,091,786 UART: [art] Store priv key in slot 0x5
29,333,456 UART: [art] Derive Key Pair - Done
29,346,077 UART: [art] Signing Cert with AUTHO
29,347,392 UART: RITY.KEYID = 7
31,626,905 UART: [art] Erasing AUTHORITY.KEYID = 7
31,628,411 UART: [art] PUB.X = CB5D0763E0E588008697BB5D22CB9F90EF208F45F51D834CA0A2A11CD068B8A740642F37320F1001A8D12300E11959E2
31,635,623 UART: [art] PUB.Y = 5120C07759F57A7DE7D751719B51B6CF0BF98551776F772C4571450ED4C23173728A43A478F20D3D0035FA36D6AE608F
31,642,797 UART: [art] SIG.R = 0ABBABB0082775D36F96EF0FC6A844C064A40FEEF726E26BA3B17FAEB345C05CE0ACBC8FA20E683A4925C93421EC182B
31,650,253 UART: [art] SIG.S = F901321E9C1F07408EE9CACFDC82D5ECA3E49AEDD7E25DCE72A4803B93B5D521D69EA51D61005918B993411D2D2BB7E9
32,955,580 UART: Caliptra RT
32,956,291 UART: [state] CFI Enabled
33,073,508 UART: [rt] RT listening for mailbox commands...
33,105,018 UART: [rt]cmd =0x54514754, len=24
33,107,685 >>> mbox cmd response data (8 bytes)
33,108,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,137,940 UART: [rt]cmd =0x54514754, len=24
33,140,529 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,027 UART:
192,400 UART: Running Caliptra ROM ...
193,595 UART:
193,752 UART: [state] CFI Enabled
258,766 UART: [state] LifecycleState = Unprovisioned
260,683 UART: [state] DebugLocked = No
263,291 UART: [state] WD Timer not started. Device not locked for debugging
267,775 UART: [kat] SHA2-256
446,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,459 UART: [kat] ++
459,005 UART: [kat] sha1
471,670 UART: [kat] SHA2-256
474,687 UART: [kat] SHA2-384
480,037 UART: [kat] SHA2-512-ACC
482,974 UART: [kat] ECC-384
2,926,558 UART: [kat] HMAC-384Kdf
2,950,814 UART: [kat] LMS
3,480,268 UART: [kat] --
3,486,037 UART: [cold-reset] ++
3,487,479 UART: [fht] FHT @ 0x50003400
3,498,785 UART: [idev] ++
3,499,359 UART: [idev] CDI.KEYID = 6
3,500,316 UART: [idev] SUBJECT.KEYID = 7
3,501,516 UART: [idev] UDS.KEYID = 0
3,502,424 ready_for_fw is high
3,502,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,646,153 UART: [idev] Erasing UDS.KEYID = 0
6,005,895 UART: [idev] Sha1 KeyId Algorithm
6,028,816 UART: [idev] --
6,033,577 UART: [ldev] ++
6,034,151 UART: [ldev] CDI.KEYID = 6
6,035,038 UART: [ldev] SUBJECT.KEYID = 5
6,036,202 UART: [ldev] AUTHORITY.KEYID = 7
6,037,500 UART: [ldev] FE.KEYID = 1
6,078,961 UART: [ldev] Erasing FE.KEYID = 1
8,580,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,738 UART: [ldev] --
10,391,903 UART: [fwproc] Wait for Commands...
10,394,545 UART: [fwproc] Recv command 0x46574c44
10,396,640 UART: [fwproc] Recv'd Img size: 114168 bytes
13,799,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,581 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,252,866 >>> mbox cmd response: success
14,253,455 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,257,291 UART: [afmc] ++
14,257,879 UART: [afmc] CDI.KEYID = 6
14,258,762 UART: [afmc] SUBJECT.KEYID = 7
14,259,977 UART: [afmc] AUTHORITY.KEYID = 5
16,781,273 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,510,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,512,278 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,528,057 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,544,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,559,983 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,583,598 UART: [afmc] --
18,587,087 UART: [cold-reset] --
18,592,408 UART: [state] Locking Datavault
18,598,146 UART: [state] Locking PCR0, PCR1 and PCR31
18,599,793 UART: [state] Locking ICCM
18,601,895 UART: [exit] Launching FMC @ 0x40000130
18,610,297 UART:
18,610,580 UART: Running Caliptra FMC ...
18,611,691 UART:
18,611,851 UART: [state] CFI Enabled
18,669,587 UART: [fht] FMC Alias Private Key: 7
20,433,642 UART: [art] Extend RT PCRs Done
20,434,882 UART: [art] Lock RT PCRs Done
20,436,534 UART: [art] Populate DV Done
20,442,217 UART: [fht] FMC Alias Private Key: 7
20,443,699 UART: [art] Derive CDI
20,444,461 UART: [art] Store in in slot 0x4
20,502,481 UART: [art] Derive Key Pair
20,503,515 UART: [art] Store priv key in slot 0x5
22,966,632 UART: [art] Derive Key Pair - Done
22,979,577 UART: [art] Signing Cert with AUTHO
22,980,883 UART: RITY.KEYID = 7
24,692,797 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,297 UART: [art] PUB.X = 944CC1DB5C125CC4661BE222C4AF71845964A591253A9A6E3866C2F81AB486734CCD22549F0E95E6614A6BB5B20A8AAD
24,701,559 UART: [art] PUB.Y = 0ED33FB1A693A9A73BAF537F93A367823142A3D8A2DD6E0F0FAF504F94ECFC1FBD29C350B0DDB3D4526101E306D15B09
24,708,857 UART: [art] SIG.R = D4B88271C154E1D8C22B1ADADBF00D785C5BE5C2387144DD2924AE4BFF9059090CF9783FE30D7C129348DA83BE1AD605
24,716,216 UART: [art] SIG.S = C337BDE5F0EA40C62CDA4BA0AFE9028D5AD8C9D7ACEE50BC0A6968B665223D00C2A8390383548E14D1ED1E06DFC2C1ED
25,695,673 UART: Caliptra RT
25,696,407 UART: [state] CFI Enabled
25,860,996 UART: [rt] RT listening for mailbox commands...
25,892,458 UART: [rt]cmd =0x54514754, len=24
25,895,180 >>> mbox cmd response data (8 bytes)
25,895,641 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,925,656 UART: [rt]cmd =0x54514754, len=24
25,927,960 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,384,971 ready_for_fw is high
3,385,405 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,048,877 >>> mbox cmd response: success
14,049,660 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,345,979 UART:
18,346,388 UART: Running Caliptra FMC ...
18,347,504 UART:
18,347,667 UART: [state] CFI Enabled
18,410,169 UART: [fht] FMC Alias Private Key: 7
20,174,509 UART: [art] Extend RT PCRs Done
20,175,735 UART: [art] Lock RT PCRs Done
20,177,428 UART: [art] Populate DV Done
20,182,892 UART: [fht] FMC Alias Private Key: 7
20,184,562 UART: [art] Derive CDI
20,185,383 UART: [art] Store in in slot 0x4
20,242,899 UART: [art] Derive Key Pair
20,243,936 UART: [art] Store priv key in slot 0x5
22,706,801 UART: [art] Derive Key Pair - Done
22,719,747 UART: [art] Signing Cert with AUTHO
22,721,049 UART: RITY.KEYID = 7
24,433,026 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,531 UART: [art] PUB.X = 217EDB813C874E3CF86B98B49A76BFE24CAA5464F31F529CD18CC39B61247317EB037581FF3F1AC759C7BB46438784D3
24,441,771 UART: [art] PUB.Y = 750B3FFC3D470FC869FCD90E5AD04AAB47B73CF392B1A4D3CB31A1A4B6DB5F8F82A7852FCB94BE458E47D36217684AA3
24,449,054 UART: [art] SIG.R = E666E2D3F473C2C09215A6BFE7DE300F816A3F53D7D7E33CDBA69F35EAAA17FE55E0B55F03952A5374D232092872BF19
24,456,463 UART: [art] SIG.S = 6EC642C7B675B831CE37888A510D8375C88496C4F6D67026E2F8DEE870848AB62643A4E6C33A71A096C765E50221B47D
25,435,709 UART: Caliptra RT
25,436,408 UART: [state] CFI Enabled
25,602,400 UART: [rt] RT listening for mailbox commands...
25,633,868 UART: [rt]cmd =0x54514754, len=24
25,636,354 >>> mbox cmd response data (8 bytes)
25,636,856 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,666,825 UART: [rt]cmd =0x54514754, len=24
25,669,049 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,862 writing to cptra_bootfsm_go
193,057 UART:
193,443 UART: Running Caliptra ROM ...
194,644 UART:
603,980 UART: [state] CFI Enabled
618,353 UART: [state] LifecycleState = Unprovisioned
620,210 UART: [state] DebugLocked = No
622,299 UART: [state] WD Timer not started. Device not locked for debugging
625,205 UART: [kat] SHA2-256
804,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,938 UART: [kat] ++
816,384 UART: [kat] sha1
828,693 UART: [kat] SHA2-256
831,708 UART: [kat] SHA2-384
838,055 UART: [kat] SHA2-512-ACC
841,001 UART: [kat] ECC-384
3,282,850 UART: [kat] HMAC-384Kdf
3,296,300 UART: [kat] LMS
3,825,756 UART: [kat] --
3,830,670 UART: [cold-reset] ++
3,833,237 UART: [fht] FHT @ 0x50003400
3,844,139 UART: [idev] ++
3,844,710 UART: [idev] CDI.KEYID = 6
3,845,619 UART: [idev] SUBJECT.KEYID = 7
3,846,794 UART: [idev] UDS.KEYID = 0
3,847,845 ready_for_fw is high
3,848,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,917 UART: [idev] Erasing UDS.KEYID = 0
6,319,371 UART: [idev] Sha1 KeyId Algorithm
6,343,895 UART: [idev] --
6,346,701 UART: [ldev] ++
6,347,271 UART: [ldev] CDI.KEYID = 6
6,348,236 UART: [ldev] SUBJECT.KEYID = 5
6,349,397 UART: [ldev] AUTHORITY.KEYID = 7
6,350,627 UART: [ldev] FE.KEYID = 1
6,361,432 UART: [ldev] Erasing FE.KEYID = 1
8,839,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,625,012 UART: [ldev] --
10,630,287 UART: [fwproc] Wait for Commands...
10,632,867 UART: [fwproc] Recv command 0x46574c44
10,634,977 UART: [fwproc] Recv'd Img size: 114168 bytes
14,034,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,369 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,493,494 >>> mbox cmd response: success
14,494,053 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,498,604 UART: [afmc] ++
14,499,195 UART: [afmc] CDI.KEYID = 6
14,500,110 UART: [afmc] SUBJECT.KEYID = 7
14,501,273 UART: [afmc] AUTHORITY.KEYID = 5
16,998,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,720,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,747 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,640 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,635 UART: [afmc] --
18,794,532 UART: [cold-reset] --
18,798,936 UART: [state] Locking Datavault
18,804,502 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,146 UART: [state] Locking ICCM
18,808,348 UART: [exit] Launching FMC @ 0x40000130
18,816,742 UART:
18,816,979 UART: Running Caliptra FMC ...
18,818,081 UART:
18,818,246 UART: [state] CFI Enabled
18,826,240 UART: [fht] FMC Alias Private Key: 7
20,583,695 UART: [art] Extend RT PCRs Done
20,584,921 UART: [art] Lock RT PCRs Done
20,586,329 UART: [art] Populate DV Done
20,591,683 UART: [fht] FMC Alias Private Key: 7
20,593,158 UART: [art] Derive CDI
20,593,941 UART: [art] Store in in slot 0x4
20,636,465 UART: [art] Derive Key Pair
20,637,523 UART: [art] Store priv key in slot 0x5
23,063,718 UART: [art] Derive Key Pair - Done
23,076,815 UART: [art] Signing Cert with AUTHO
23,078,127 UART: RITY.KEYID = 7
24,783,808 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,316 UART: [art] PUB.X = 9CCF86E8471108CFA499D595789AB473C4EF17F9944D32662400D187F01B95E8491275CA230D363C56CEBD699D28545A
24,792,513 UART: [art] PUB.Y = 4C304CCF09A476EA1564AE8C626FD3DED35F754D5300EB4E1472DA88F67A502E24AC40F3E90445863044CE4E36B5F10E
24,799,804 UART: [art] SIG.R = 3B0C4BA3C6F0469A23FD5B1A85F94D1A83087D5204B827632A8F6389E947B5715EE0F465DEB2AE4DB0DA69490EE19730
24,807,145 UART: [art] SIG.S = 107CA485C0BB45D17A092F159DE1120EB8EF5994ED3D4E516ED6AAB74F69699A230CFFF0D9F15616324F7D2633E49B71
25,786,375 UART: Caliptra RT
25,787,079 UART: [state] CFI Enabled
25,904,263 UART: [rt] RT listening for mailbox commands...
25,935,730 UART: [rt]cmd =0x54514754, len=24
25,938,418 >>> mbox cmd response data (8 bytes)
25,938,951 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,969,023 UART: [rt]cmd =0x54514754, len=24
25,971,196 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,598 writing to cptra_bootfsm_go
3,697,638 ready_for_fw is high
3,698,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,545 >>> mbox cmd response: success
14,270,208 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,515,761 UART:
18,516,166 UART: Running Caliptra FMC ...
18,517,307 UART:
18,517,470 UART: [state] CFI Enabled
18,525,104 UART: [fht] FMC Alias Private Key: 7
20,282,059 UART: [art] Extend RT PCRs Done
20,283,294 UART: [art] Lock RT PCRs Done
20,284,702 UART: [art] Populate DV Done
20,290,167 UART: [fht] FMC Alias Private Key: 7
20,291,708 UART: [art] Derive CDI
20,292,522 UART: [art] Store in in slot 0x4
20,334,849 UART: [art] Derive Key Pair
20,335,895 UART: [art] Store priv key in slot 0x5
22,762,315 UART: [art] Derive Key Pair - Done
22,775,280 UART: [art] Signing Cert with AUTHO
22,776,583 UART: RITY.KEYID = 7
24,482,341 UART: [art] Erasing AUTHORITY.KEYID = 7
24,483,845 UART: [art] PUB.X = E2DC4105DCE6C10758A2CBD5CA112A77865B1895119EB023092EC20A3581BD251B4FD384C386A964174E9FD9567A2656
24,491,090 UART: [art] PUB.Y = 21B1798B1A1671C177DCF9CDA0CC473F38C8D79CE8B2D8ACF6DD646361FF52C3AB1D7AD99D737262880BAB74FB3AA3FA
24,498,446 UART: [art] SIG.R = C9F4F2C71EBD12AA8CC8A8354FCAA304F64082A3055E69C9F588491DF0AE459BC2FFFDB99BED12EB8F8D6B4A83C5238D
24,505,853 UART: [art] SIG.S = 4D1D09990BFC735DE527F5AEE40B3F83F172FC8980C5B77E6378993878F4FBA734ADEFEC723EB37E33F00B0B6DCA8242
25,484,694 UART: Caliptra RT
25,485,413 UART: [state] CFI Enabled
25,601,967 UART: [rt] RT listening for mailbox commands...
25,633,328 UART: [rt]cmd =0x54514754, len=24
25,635,696 >>> mbox cmd response data (8 bytes)
25,636,195 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,665,874 UART: [rt]cmd =0x54514754, len=24
25,668,012 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,212 UART:
192,574 UART: Running Caliptra ROM ...
193,767 UART:
193,925 UART: [state] CFI Enabled
265,212 UART: [state] LifecycleState = Unprovisioned
267,549 UART: [state] DebugLocked = No
270,005 UART: [state] WD Timer not started. Device not locked for debugging
273,708 UART: [kat] SHA2-256
463,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,180 UART: [kat] ++
474,672 UART: [kat] sha1
486,472 UART: [kat] SHA2-256
489,478 UART: [kat] SHA2-384
495,291 UART: [kat] SHA2-512-ACC
497,864 UART: [kat] ECC-384
2,947,536 UART: [kat] HMAC-384Kdf
2,971,924 UART: [kat] LMS
3,503,740 UART: [kat] --
3,509,001 UART: [cold-reset] ++
3,510,664 UART: [fht] FHT @ 0x50003400
3,523,354 UART: [idev] ++
3,523,995 UART: [idev] CDI.KEYID = 6
3,525,030 UART: [idev] SUBJECT.KEYID = 7
3,526,207 UART: [idev] UDS.KEYID = 0
3,527,149 ready_for_fw is high
3,527,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,022 UART: [idev] Erasing UDS.KEYID = 0
6,050,759 UART: [idev] Sha1 KeyId Algorithm
6,072,312 UART: [idev] --
6,076,907 UART: [ldev] ++
6,077,610 UART: [ldev] CDI.KEYID = 6
6,078,529 UART: [ldev] SUBJECT.KEYID = 5
6,079,695 UART: [ldev] AUTHORITY.KEYID = 7
6,080,926 UART: [ldev] FE.KEYID = 1
6,121,215 UART: [ldev] Erasing FE.KEYID = 1
8,625,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,901 UART: [ldev] --
10,433,171 UART: [fwproc] Wait for Commands...
10,434,623 UART: [fwproc] Recv command 0x46574c44
10,436,563 UART: [fwproc] Recv'd Img size: 114168 bytes
13,892,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,968,953 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,085,129 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,625,788 >>> mbox cmd response: success
14,626,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,629,099 UART: [afmc] ++
14,629,800 UART: [afmc] CDI.KEYID = 6
14,630,985 UART: [afmc] SUBJECT.KEYID = 7
14,632,473 UART: [afmc] AUTHORITY.KEYID = 5
17,172,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,162 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,928,330 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,943,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,967,001 UART: [afmc] --
18,970,013 UART: [cold-reset] --
18,974,695 UART: [state] Locking Datavault
18,981,040 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,203 UART: [state] Locking ICCM
18,985,635 UART: [exit] Launching FMC @ 0x40000130
18,994,323 UART:
18,994,561 UART: Running Caliptra FMC ...
18,995,593 UART:
18,995,740 UART: [state] CFI Enabled
19,052,821 UART: [fht] FMC Alias Private Key: 7
20,816,499 UART: [art] Extend RT PCRs Done
20,817,720 UART: [art] Lock RT PCRs Done
20,819,484 UART: [art] Populate DV Done
20,825,165 UART: [fht] FMC Alias Private Key: 7
20,826,700 UART: [art] Derive CDI
20,827,512 UART: [art] Store in in slot 0x4
20,885,497 UART: [art] Derive Key Pair
20,886,498 UART: [art] Store priv key in slot 0x5
23,349,276 UART: [art] Derive Key Pair - Done
23,362,220 UART: [art] Signing Cert with AUTHO
23,363,521 UART: RITY.KEYID = 7
25,075,105 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,617 UART: [art] PUB.X = 7DFE7741E3F7ACE852EE17D2DDB6BFA74E1BD51C3133583D154E377A89EE123F2FA57BEC000B75B2D8A2C4F0427BCA32
25,083,885 UART: [art] PUB.Y = 11CA67799CB22AD7C2542DB26FDBBE5FABBFA3FC5C538A2E83090CAC2E4B01B27E73B47ED6C3888963FCE15E9D47089E
25,091,195 UART: [art] SIG.R = 29560F3885B4D293975F6F6B77554DA4EE306DD9529D30953D1EE836B2034A9627DC00041B9D4934F65EEFA704FC3D49
25,098,505 UART: [art] SIG.S = 4D7936CDF92C10397DBA914DA2D761F21AD79F971090E3238D6C92F33099DF452D18C270ACEE37C69C683FE310466936
26,077,524 UART: Caliptra RT
26,078,215 UART: [state] CFI Enabled
26,242,313 UART: [rt] RT listening for mailbox commands...
26,273,799 UART: [rt]cmd =0x54514754, len=24
26,276,540 >>> mbox cmd response data (8 bytes)
26,276,992 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,306,890 UART: [rt]cmd =0x54514754, len=24
26,309,035 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,440,592 ready_for_fw is high
3,441,220 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,739,576 >>> mbox cmd response: success
14,740,272 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,017,772 UART:
19,018,184 UART: Running Caliptra FMC ...
19,019,288 UART:
19,019,447 UART: [state] CFI Enabled
19,086,931 UART: [fht] FMC Alias Private Key: 7
20,851,435 UART: [art] Extend RT PCRs Done
20,852,660 UART: [art] Lock RT PCRs Done
20,854,584 UART: [art] Populate DV Done
20,859,946 UART: [fht] FMC Alias Private Key: 7
20,861,485 UART: [art] Derive CDI
20,862,220 UART: [art] Store in in slot 0x4
20,918,960 UART: [art] Derive Key Pair
20,919,954 UART: [art] Store priv key in slot 0x5
23,383,327 UART: [art] Derive Key Pair - Done
23,396,218 UART: [art] Signing Cert with AUTHO
23,397,517 UART: RITY.KEYID = 7
25,108,879 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,406 UART: [art] PUB.X = E754B139CC9EEEAE2020B6FC66F866666EF3829A4B9BB9A2364F6A668FC346F117911B0C348884363229A0B2BFAA8745
25,117,652 UART: [art] PUB.Y = BC1AAC9119F969B98C1B72F18470E2974A5B84D2B514F1E4D03BECD71713D545F814CD3B412C4DB38694517BA0DAE429
25,124,943 UART: [art] SIG.R = 662BAC7AB5F13899E681477F9D2635AE24D46855A72E10CD1F931E617AE0953F1F45034C138125017C6F6639BD59C215
25,132,274 UART: [art] SIG.S = 7FB162B217A6AC0D4D1523FA4AC0DEBFE4AE7DBCD3AF6DF2C331F7F94C2DF863373E6E7DA8A9082B5292A70BAF27183D
26,111,162 UART: Caliptra RT
26,111,865 UART: [state] CFI Enabled
26,276,528 UART: [rt] RT listening for mailbox commands...
26,307,933 UART: [rt]cmd =0x54514754, len=24
26,310,664 >>> mbox cmd response data (8 bytes)
26,311,159 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,341,166 UART: [rt]cmd =0x54514754, len=24
26,343,630 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,687 writing to cptra_bootfsm_go
192,922 UART:
193,310 UART: Running Caliptra ROM ...
194,454 UART:
604,095 UART: [state] CFI Enabled
619,408 UART: [state] LifecycleState = Unprovisioned
621,783 UART: [state] DebugLocked = No
624,090 UART: [state] WD Timer not started. Device not locked for debugging
628,193 UART: [kat] SHA2-256
818,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,827 UART: [kat] ++
829,431 UART: [kat] sha1
840,877 UART: [kat] SHA2-256
843,958 UART: [kat] SHA2-384
851,081 UART: [kat] SHA2-512-ACC
853,662 UART: [kat] ECC-384
3,292,332 UART: [kat] HMAC-384Kdf
3,303,941 UART: [kat] LMS
3,835,751 UART: [kat] --
3,841,094 UART: [cold-reset] ++
3,843,099 UART: [fht] FHT @ 0x50003400
3,854,717 UART: [idev] ++
3,855,428 UART: [idev] CDI.KEYID = 6
3,856,336 UART: [idev] SUBJECT.KEYID = 7
3,857,579 UART: [idev] UDS.KEYID = 0
3,858,504 ready_for_fw is high
3,858,702 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,102 UART: [idev] Erasing UDS.KEYID = 0
6,333,927 UART: [idev] Sha1 KeyId Algorithm
6,357,747 UART: [idev] --
6,363,880 UART: [ldev] ++
6,364,633 UART: [ldev] CDI.KEYID = 6
6,365,551 UART: [ldev] SUBJECT.KEYID = 5
6,366,661 UART: [ldev] AUTHORITY.KEYID = 7
6,367,917 UART: [ldev] FE.KEYID = 1
6,378,674 UART: [ldev] Erasing FE.KEYID = 1
8,856,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,935 UART: [ldev] --
10,650,195 UART: [fwproc] Wait for Commands...
10,652,450 UART: [fwproc] Recv command 0x46574c44
10,654,706 UART: [fwproc] Recv'd Img size: 114168 bytes
14,090,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,288,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,539 >>> mbox cmd response: success
14,831,088 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,833,890 UART: [afmc] ++
14,834,589 UART: [afmc] CDI.KEYID = 6
14,835,833 UART: [afmc] SUBJECT.KEYID = 7
14,837,276 UART: [afmc] AUTHORITY.KEYID = 5
17,341,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,063,647 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,065,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,080,785 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,095,891 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,110,937 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,134,524 UART: [afmc] --
19,137,580 UART: [cold-reset] --
19,141,117 UART: [state] Locking Datavault
19,145,436 UART: [state] Locking PCR0, PCR1 and PCR31
19,147,670 UART: [state] Locking ICCM
19,149,437 UART: [exit] Launching FMC @ 0x40000130
19,158,132 UART:
19,158,371 UART: Running Caliptra FMC ...
19,159,475 UART:
19,159,634 UART: [state] CFI Enabled
19,167,586 UART: [fht] FMC Alias Private Key: 7
20,924,649 UART: [art] Extend RT PCRs Done
20,925,896 UART: [art] Lock RT PCRs Done
20,927,367 UART: [art] Populate DV Done
20,932,894 UART: [fht] FMC Alias Private Key: 7
20,934,376 UART: [art] Derive CDI
20,935,142 UART: [art] Store in in slot 0x4
20,977,622 UART: [art] Derive Key Pair
20,978,623 UART: [art] Store priv key in slot 0x5
23,405,117 UART: [art] Derive Key Pair - Done
23,418,542 UART: [art] Signing Cert with AUTHO
23,419,858 UART: RITY.KEYID = 7
25,125,452 UART: [art] Erasing AUTHORITY.KEYID = 7
25,126,987 UART: [art] PUB.X = 7723909FA55B021BE92C8D759DF041E46BF5AD0F3CD39462494D17308C2C4B7BC840838B714AD8710DC80A5EF6332516
25,134,184 UART: [art] PUB.Y = 1C3EA6BE5DAEC73E0F8A1C3E3B58A8F85D717BBB4E029E18F466F321C3C9283D467C1D59F19B204954FB72614FB96734
25,141,478 UART: [art] SIG.R = D6E13ECCE589E300B6192AC6852EEA81F2AA9CC1F34004E9EE435B3EB1CC8DFF29E86FCB2AE4544394EACC4AD113DA77
25,148,905 UART: [art] SIG.S = 18A757AC62E7DB9D39706ECCE8DB33DD7A02644B422357A3CBE268A32E356EFEE686F06748B6BCCBD2C8E0D690957621
26,128,273 UART: Caliptra RT
26,128,988 UART: [state] CFI Enabled
26,246,154 UART: [rt] RT listening for mailbox commands...
26,277,776 UART: [rt]cmd =0x54514754, len=24
26,280,555 >>> mbox cmd response data (8 bytes)
26,281,190 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,310,954 UART: [rt]cmd =0x54514754, len=24
26,313,039 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,637 writing to cptra_bootfsm_go
3,757,789 ready_for_fw is high
3,758,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,474 >>> mbox cmd response: success
14,954,139 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,202,701 UART:
19,203,113 UART: Running Caliptra FMC ...
19,204,249 UART:
19,204,410 UART: [state] CFI Enabled
19,212,426 UART: [fht] FMC Alias Private Key: 7
20,969,192 UART: [art] Extend RT PCRs Done
20,970,416 UART: [art] Lock RT PCRs Done
20,972,039 UART: [art] Populate DV Done
20,977,463 UART: [fht] FMC Alias Private Key: 7
20,979,056 UART: [art] Derive CDI
20,979,872 UART: [art] Store in in slot 0x4
21,022,846 UART: [art] Derive Key Pair
21,023,889 UART: [art] Store priv key in slot 0x5
23,450,065 UART: [art] Derive Key Pair - Done
23,462,793 UART: [art] Signing Cert with AUTHO
23,464,091 UART: RITY.KEYID = 7
25,169,377 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,907 UART: [art] PUB.X = B72BE1A2C8C5F2139786BC6F8CC1568D57F72E3813C633C286D81B97E5B7F35AC0EDA2167442F0594F998B3D9EC5B724
25,178,153 UART: [art] PUB.Y = 91420F05A420C57373D5A1D12BBBA4C9E48673F68074094149B5291F011C7C6A86950CAB4F714FABBD24D0EC2D6F66D2
25,185,394 UART: [art] SIG.R = E77D42DFE164B8FD37C235B7E99B3C0817608434610D94E4B94BBFFB36F906C6B69D3536A4FE282D48D9D61BAC6415E0
25,192,782 UART: [art] SIG.S = 6A414614C6BD9FB8D0F1029443FB273A6E35FD2F44E7901A17B61D6841720B3AA3A501DEF41ADE2E8505456C86E90F04
26,172,096 UART: Caliptra RT
26,172,780 UART: [state] CFI Enabled
26,290,653 UART: [rt] RT listening for mailbox commands...
26,322,060 UART: [rt]cmd =0x54514754, len=24
26,324,699 >>> mbox cmd response data (8 bytes)
26,325,102 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,355,003 UART: [rt]cmd =0x54514754, len=24
26,357,067 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
85,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,615 UART: [kat] SHA2-256
881,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,661 UART: [kat] ++
885,813 UART: [kat] sha1
890,031 UART: [kat] SHA2-256
891,969 UART: [kat] SHA2-384
894,710 UART: [kat] SHA2-512-ACC
896,611 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
906,996 UART: [kat] LMS
1,475,192 UART: [kat] --
1,476,141 UART: [cold-reset] ++
1,476,665 UART: [fht] Storing FHT @ 0x50003400
1,479,392 UART: [idev] ++
1,479,560 UART: [idev] CDI.KEYID = 6
1,479,920 UART: [idev] SUBJECT.KEYID = 7
1,480,344 UART: [idev] UDS.KEYID = 0
1,480,689 ready_for_fw is high
1,480,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,208 UART: [idev] Erasing UDS.KEYID = 0
1,505,198 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,920 UART: [idev] --
1,514,825 UART: [ldev] ++
1,514,993 UART: [ldev] CDI.KEYID = 6
1,515,356 UART: [ldev] SUBJECT.KEYID = 5
1,515,782 UART: [ldev] AUTHORITY.KEYID = 7
1,516,245 UART: [ldev] FE.KEYID = 1
1,521,455 UART: [ldev] Erasing FE.KEYID = 1
1,546,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,910 UART: [ldev] --
1,585,289 UART: [fwproc] Waiting for Commands...
1,585,924 UART: [fwproc] Received command 0x46574c44
1,586,715 UART: [fwproc] Received Image of size 114168 bytes
2,883,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,615 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,680 >>> mbox cmd response: success
3,075,680 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,076,850 UART: [afmc] ++
3,077,018 UART: [afmc] CDI.KEYID = 6
3,077,380 UART: [afmc] SUBJECT.KEYID = 7
3,077,805 UART: [afmc] AUTHORITY.KEYID = 5
3,113,076 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,920 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,700 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,428 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,313 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,003 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,898 UART: [afmc] --
3,155,806 UART: [cold-reset] --
3,156,626 UART: [state] Locking Datavault
3,157,873 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,477 UART: [state] Locking ICCM
3,159,113 UART: [exit] Launching FMC @ 0x40000130
3,164,442 UART:
3,164,458 UART: Running Caliptra FMC ...
3,164,866 UART:
3,164,920 UART: [state] CFI Enabled
3,175,663 UART: [fht] FMC Alias Private Key: 7
3,283,714 UART: [art] Extend RT PCRs Done
3,284,142 UART: [art] Lock RT PCRs Done
3,285,678 UART: [art] Populate DV Done
3,293,713 UART: [fht] FMC Alias Private Key: 7
3,294,641 UART: [art] Derive CDI
3,294,921 UART: [art] Store in in slot 0x4
3,380,660 UART: [art] Derive Key Pair
3,381,020 UART: [art] Store priv key in slot 0x5
3,394,124 UART: [art] Derive Key Pair - Done
3,408,667 UART: [art] Signing Cert with AUTHO
3,409,147 UART: RITY.KEYID = 7
3,424,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,002 UART: [art] PUB.X = B661FFA5B57E5D207FA95E233281A37EFB59AD0ECB82A7172A24B618B4EA5F80107C95515177724A78267B37B263B678
3,431,769 UART: [art] PUB.Y = FFE4B576AB1922C9FDEBE8C7AABAC276BCEBA72F466A44D2C363BA81828B3FA2A8351883BF80DCB40CB8B122CBF4219C
3,438,744 UART: [art] SIG.R = 20B8BB0BD5D6A4D4C2FE529CC2BC16733D5993063B2C0ADB078EF835F8980C55267F72D24713C8B955594186B1B22101
3,445,496 UART: [art] SIG.S = 5A2C44B997A35037B7A699A8673B55DC77109EB1E8E0F7CC02AE9224F61AF5A448CF07E9DE4B6165FDA81A7AFFC939A2
3,469,611 UART: Caliptra RT
3,469,864 UART: [state] CFI Enabled
3,579,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,796 UART: [rt]cmd =0x54514754, len=24
3,611,705 >>> mbox cmd response data (8 bytes)
3,611,706 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,045 UART: [rt]cmd =0x54514754, len=24
3,643,094 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,719 ready_for_fw is high
1,362,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,206 >>> mbox cmd response: success
2,926,206 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,372 UART:
2,988,388 UART: Running Caliptra FMC ...
2,988,796 UART:
2,988,850 UART: [state] CFI Enabled
2,999,373 UART: [fht] FMC Alias Private Key: 7
3,107,274 UART: [art] Extend RT PCRs Done
3,107,702 UART: [art] Lock RT PCRs Done
3,109,200 UART: [art] Populate DV Done
3,117,471 UART: [fht] FMC Alias Private Key: 7
3,118,633 UART: [art] Derive CDI
3,118,913 UART: [art] Store in in slot 0x4
3,204,624 UART: [art] Derive Key Pair
3,204,984 UART: [art] Store priv key in slot 0x5
3,217,864 UART: [art] Derive Key Pair - Done
3,232,969 UART: [art] Signing Cert with AUTHO
3,233,449 UART: RITY.KEYID = 7
3,248,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,614 UART: [art] PUB.X = 4E5AF69D7C06CB7071BBD70FDE575C3AF1AFE4A115C71082026B31D30087ABC1674D717AD8D68A5489DE9FF9DABEDB43
3,256,373 UART: [art] PUB.Y = F8224243641DE197B84BBBF266AF300A1B8BC12346284ACB1503079DFBDFAE90FD40148EB37A7D08A802882729F0FD97
3,263,314 UART: [art] SIG.R = B80441079CC8BB124E39DE58D768B742C1CE2CC25357B0591E416728B0986F4301D3A7DD768314589864B67A4D9CCEA7
3,270,073 UART: [art] SIG.S = 2BF734B38A45E7CA534696A3309E0B1D4DE3632AA306DF553F7BE9872E3090C474D8227821FDDCE5EF2B4A5F4F5284D8
3,293,438 UART: Caliptra RT
3,293,691 UART: [state] CFI Enabled
3,402,358 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,014 UART: [rt]cmd =0x54514754, len=24
3,435,027 >>> mbox cmd response data (8 bytes)
3,435,028 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,523 UART: [rt]cmd =0x54514754, len=24
3,466,566 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,782 UART: [kat] SHA2-256
881,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,828 UART: [kat] ++
885,980 UART: [kat] sha1
890,136 UART: [kat] SHA2-256
892,074 UART: [kat] SHA2-384
894,607 UART: [kat] SHA2-512-ACC
896,508 UART: [kat] ECC-384
902,169 UART: [kat] HMAC-384Kdf
906,917 UART: [kat] LMS
1,475,113 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,708 UART: [fht] Storing FHT @ 0x50003400
1,479,625 UART: [idev] ++
1,479,793 UART: [idev] CDI.KEYID = 6
1,480,153 UART: [idev] SUBJECT.KEYID = 7
1,480,577 UART: [idev] UDS.KEYID = 0
1,480,922 ready_for_fw is high
1,480,922 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,703 UART: [idev] Erasing UDS.KEYID = 0
1,505,291 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,925 UART: [idev] --
1,514,808 UART: [ldev] ++
1,514,976 UART: [ldev] CDI.KEYID = 6
1,515,339 UART: [ldev] SUBJECT.KEYID = 5
1,515,765 UART: [ldev] AUTHORITY.KEYID = 7
1,516,228 UART: [ldev] FE.KEYID = 1
1,521,714 UART: [ldev] Erasing FE.KEYID = 1
1,547,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,967 UART: [ldev] --
1,586,482 UART: [fwproc] Waiting for Commands...
1,587,145 UART: [fwproc] Received command 0x46574c44
1,587,936 UART: [fwproc] Received Image of size 114168 bytes
2,884,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,256 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,608 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,107 >>> mbox cmd response: success
3,076,107 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,267 UART: [afmc] ++
3,077,435 UART: [afmc] CDI.KEYID = 6
3,077,797 UART: [afmc] SUBJECT.KEYID = 7
3,078,222 UART: [afmc] AUTHORITY.KEYID = 5
3,112,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,830 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,520 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,435 UART: [afmc] --
3,156,453 UART: [cold-reset] --
3,157,345 UART: [state] Locking Datavault
3,158,636 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,240 UART: [state] Locking ICCM
3,159,666 UART: [exit] Launching FMC @ 0x40000130
3,164,995 UART:
3,165,011 UART: Running Caliptra FMC ...
3,165,419 UART:
3,165,562 UART: [state] CFI Enabled
3,175,945 UART: [fht] FMC Alias Private Key: 7
3,283,550 UART: [art] Extend RT PCRs Done
3,283,978 UART: [art] Lock RT PCRs Done
3,285,366 UART: [art] Populate DV Done
3,293,619 UART: [fht] FMC Alias Private Key: 7
3,294,721 UART: [art] Derive CDI
3,295,001 UART: [art] Store in in slot 0x4
3,381,238 UART: [art] Derive Key Pair
3,381,598 UART: [art] Store priv key in slot 0x5
3,395,242 UART: [art] Derive Key Pair - Done
3,409,927 UART: [art] Signing Cert with AUTHO
3,410,407 UART: RITY.KEYID = 7
3,425,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,356 UART: [art] PUB.X = B9C619B2564A1DC3E5821EA24C7429D51082B7B7BC6F0F4A3E2D4C50839BD120748C68690DF30869FE5351EA358EA757
3,433,119 UART: [art] PUB.Y = 449C342C6B9B5B9C2368D16C09D7C872FB6A97729FE1BD68E170F0AB86385C4964DE55394159AE10505EC62410AF6BCB
3,440,070 UART: [art] SIG.R = 2CC1148F822C90D48B756C64537795C919399EC09FF6FFA9181C9D00FBFBF4970448B4D770B074EF8510389A03F6F69A
3,446,812 UART: [art] SIG.S = 5FDFE2B1734129E4A06A19DB5E180F8C8FDE096C36559DAFAE059846A58732F6708818CDF4A74D4FC18F50F45377BF42
3,470,958 UART: Caliptra RT
3,471,303 UART: [state] CFI Enabled
3,580,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,519 UART: [rt]cmd =0x54514754, len=24
3,613,648 >>> mbox cmd response data (8 bytes)
3,613,649 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,643,096 UART: [rt]cmd =0x54514754, len=24
3,644,867 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,856 ready_for_fw is high
1,361,856 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,775 >>> mbox cmd response: success
2,925,775 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,547 UART:
2,987,563 UART: Running Caliptra FMC ...
2,987,971 UART:
2,988,114 UART: [state] CFI Enabled
2,998,927 UART: [fht] FMC Alias Private Key: 7
3,106,842 UART: [art] Extend RT PCRs Done
3,107,270 UART: [art] Lock RT PCRs Done
3,108,430 UART: [art] Populate DV Done
3,116,839 UART: [fht] FMC Alias Private Key: 7
3,117,897 UART: [art] Derive CDI
3,118,177 UART: [art] Store in in slot 0x4
3,204,082 UART: [art] Derive Key Pair
3,204,442 UART: [art] Store priv key in slot 0x5
3,217,786 UART: [art] Derive Key Pair - Done
3,232,541 UART: [art] Signing Cert with AUTHO
3,233,021 UART: RITY.KEYID = 7
3,248,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,052 UART: [art] PUB.X = AADB212C665829B2A31ED8C09AB76C7D7DAAB59097CC3B1672FA1EF6FE6E24DC5DB807CBC820395043D2AC045332F7B7
3,255,834 UART: [art] PUB.Y = 9AC330A6783089188BBCA29EE46BC45AA36A09C5B6F30257C8EEBEC6E63414936B89A11FD89F50A2035F676D2AFC1BE1
3,262,787 UART: [art] SIG.R = 3A660E976D2738347A1D56444BD4CCF6DD9210677F8F9800FA1D2CF47C29248E663E6F15ED84F372F00669A605062361
3,269,517 UART: [art] SIG.S = 7ACEA187F77EF962144763E8DFC6021ABF08692A88A705A8EF155150B02BC289483D8C9523F81AB82324DE212EBACBB3
3,293,645 UART: Caliptra RT
3,293,990 UART: [state] CFI Enabled
3,401,090 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,646 UART: [rt]cmd =0x54514754, len=24
3,433,665 >>> mbox cmd response data (8 bytes)
3,433,666 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,059 UART: [rt]cmd =0x54514754, len=24
3,464,998 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,788 UART: [kat] SHA2-512-ACC
908,689 UART: [kat] ECC-384
918,366 UART: [kat] HMAC-384Kdf
922,706 UART: [kat] LMS
1,171,034 UART: [kat] --
1,171,929 UART: [cold-reset] ++
1,172,389 UART: [fht] FHT @ 0x50003400
1,174,906 UART: [idev] ++
1,175,074 UART: [idev] CDI.KEYID = 6
1,175,434 UART: [idev] SUBJECT.KEYID = 7
1,175,858 UART: [idev] UDS.KEYID = 0
1,176,203 ready_for_fw is high
1,176,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,786 UART: [idev] Erasing UDS.KEYID = 0
1,200,401 UART: [idev] Sha1 KeyId Algorithm
1,209,045 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,502 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,242,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,763 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,922 UART: [fwproc] Recv command 0x46574c44
1,283,650 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,910 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,891 >>> mbox cmd response: success
2,771,891 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,773,035 UART: [afmc] ++
2,773,203 UART: [afmc] CDI.KEYID = 6
2,773,565 UART: [afmc] SUBJECT.KEYID = 7
2,773,990 UART: [afmc] AUTHORITY.KEYID = 5
2,809,343 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,350 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,963 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,682 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,504 UART: [afmc] --
2,852,536 UART: [cold-reset] --
2,853,358 UART: [state] Locking Datavault
2,854,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,045 UART: [state] Locking ICCM
2,855,547 UART: [exit] Launching FMC @ 0x40000130
2,860,876 UART:
2,860,892 UART: Running Caliptra FMC ...
2,861,300 UART:
2,861,354 UART: [state] CFI Enabled
2,871,557 UART: [fht] FMC Alias Private Key: 7
2,978,920 UART: [art] Extend RT PCRs Done
2,979,348 UART: [art] Lock RT PCRs Done
2,980,934 UART: [art] Populate DV Done
2,988,987 UART: [fht] FMC Alias Private Key: 7
2,990,053 UART: [art] Derive CDI
2,990,333 UART: [art] Store in in slot 0x4
3,075,984 UART: [art] Derive Key Pair
3,076,344 UART: [art] Store priv key in slot 0x5
3,089,694 UART: [art] Derive Key Pair - Done
3,104,433 UART: [art] Signing Cert with AUTHO
3,104,913 UART: RITY.KEYID = 7
3,120,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,028 UART: [art] PUB.X = 5682061CC3974ECBAAF7B117B5FA96B79FC2AF242E892459DAE0A1C96E28F496DAEEA744A2B5329A57FAD37E03480649
3,127,801 UART: [art] PUB.Y = 27B4E6F52EF24D21521617542CE94A6CD8EA7A9E4BDEBF05C9D0D162D78274F6B14F832C97FA88BEA73FBD19CF433985
3,134,762 UART: [art] SIG.R = 3246B90737261D642ADAFFEAA0112991DD065269024DC6DFF88D5354641C3D0C892E52DD341DA4F0313FC2B134160644
3,141,515 UART: [art] SIG.S = BEE5431C23B6E7BCEBCC7A2AAB942212D40E4FBA22C24273FCF723FC635D413F15EDF9E2FDF2A6C6A318A33EEF4540A6
3,165,659 UART: Caliptra RT
3,165,912 UART: [state] CFI Enabled
3,274,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,209 UART: [rt]cmd =0x54514754, len=24
3,307,058 >>> mbox cmd response data (8 bytes)
3,307,059 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,630 UART: [rt]cmd =0x54514754, len=24
3,338,451 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 ready_for_fw is high
1,060,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,972 >>> mbox cmd response: success
2,624,972 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,154 UART:
2,688,170 UART: Running Caliptra FMC ...
2,688,578 UART:
2,688,632 UART: [state] CFI Enabled
2,699,109 UART: [fht] FMC Alias Private Key: 7
2,807,466 UART: [art] Extend RT PCRs Done
2,807,894 UART: [art] Lock RT PCRs Done
2,809,582 UART: [art] Populate DV Done
2,818,083 UART: [fht] FMC Alias Private Key: 7
2,819,079 UART: [art] Derive CDI
2,819,359 UART: [art] Store in in slot 0x4
2,904,856 UART: [art] Derive Key Pair
2,905,216 UART: [art] Store priv key in slot 0x5
2,918,464 UART: [art] Derive Key Pair - Done
2,933,141 UART: [art] Signing Cert with AUTHO
2,933,621 UART: RITY.KEYID = 7
2,949,143 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,908 UART: [art] PUB.X = 00229DB1C4D1C0AD6D590258ECEC5DD1D35CA6E70CA525FBA7749A2E35291E3925C04DB7FC4514E6BC1550AF68B1CFF6
2,956,668 UART: [art] PUB.Y = AA02DF5DE4A0C28FD8B9D7E7979026774163D0A9800AE441D294EA189A97AB90A70730FD8B0E6C1D714C95D745A910A3
2,963,612 UART: [art] SIG.R = 3803DFA8EAF01A7FE27421FEBBD012565BB36E6DC1C71FEC6EB9F62E26E3695DD80E30C0F5F7D112993B4F9D4A0229B9
2,970,391 UART: [art] SIG.S = F4D4D6FC8A79C80DD9231EA7376BEDA10D4312978D24FB52600905A74327BEE1B52AD9F6916A8AF58906BCD35F18161D
2,994,161 UART: Caliptra RT
2,994,414 UART: [state] CFI Enabled
3,101,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,385 UART: [rt]cmd =0x54514754, len=24
3,134,596 >>> mbox cmd response data (8 bytes)
3,134,597 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,164,012 UART: [rt]cmd =0x54514754, len=24
3,166,097 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,579 UART: [kat] SHA2-512-ACC
908,480 UART: [kat] ECC-384
918,489 UART: [kat] HMAC-384Kdf
923,125 UART: [kat] LMS
1,171,453 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,172,914 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 ready_for_fw is high
1,176,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,601 UART: [idev] Erasing UDS.KEYID = 0
1,201,260 UART: [idev] Sha1 KeyId Algorithm
1,209,868 UART: [idev] --
1,210,870 UART: [ldev] ++
1,211,038 UART: [ldev] CDI.KEYID = 6
1,211,401 UART: [ldev] SUBJECT.KEYID = 5
1,211,827 UART: [ldev] AUTHORITY.KEYID = 7
1,212,290 UART: [ldev] FE.KEYID = 1
1,217,454 UART: [ldev] Erasing FE.KEYID = 1
1,244,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,344 UART: [ldev] --
1,283,615 UART: [fwproc] Wait for Commands...
1,284,379 UART: [fwproc] Recv command 0x46574c44
1,285,107 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,457 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,761 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,266 >>> mbox cmd response: success
2,774,266 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,312 UART: [afmc] ++
2,775,480 UART: [afmc] CDI.KEYID = 6
2,775,842 UART: [afmc] SUBJECT.KEYID = 7
2,776,267 UART: [afmc] AUTHORITY.KEYID = 5
2,811,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,287 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,015 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,900 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,619 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,555 UART: [afmc] --
2,855,627 UART: [cold-reset] --
2,856,473 UART: [state] Locking Datavault
2,857,568 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,172 UART: [state] Locking ICCM
2,858,704 UART: [exit] Launching FMC @ 0x40000130
2,864,033 UART:
2,864,049 UART: Running Caliptra FMC ...
2,864,457 UART:
2,864,600 UART: [state] CFI Enabled
2,875,167 UART: [fht] FMC Alias Private Key: 7
2,983,308 UART: [art] Extend RT PCRs Done
2,983,736 UART: [art] Lock RT PCRs Done
2,985,378 UART: [art] Populate DV Done
2,993,701 UART: [fht] FMC Alias Private Key: 7
2,994,745 UART: [art] Derive CDI
2,995,025 UART: [art] Store in in slot 0x4
3,080,056 UART: [art] Derive Key Pair
3,080,416 UART: [art] Store priv key in slot 0x5
3,094,222 UART: [art] Derive Key Pair - Done
3,109,116 UART: [art] Signing Cert with AUTHO
3,109,596 UART: RITY.KEYID = 7
3,124,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,467 UART: [art] PUB.X = CABDB305B0C2C01F3B28B482D788D5FBBE50B6BD6B9699D5CBDBFA3B1C44A66413A4FDA84FB91F5F5D467B8EA727FDE6
3,132,264 UART: [art] PUB.Y = 3E22FC6966507CF172FDDB8117B2082993EA7E94B502D94C2A1591063F957477A7FB8DD957EC55FDFF5C706CC005B99D
3,139,208 UART: [art] SIG.R = B57D67B9EFB9AB8720B2DC24DB4F74C2201A0C664EFA6699CA3821A7164EEC91394A4071C0D52420D3B1F26E05B1B8AF
3,145,984 UART: [art] SIG.S = E41DF28B0BA7367CB82A349E2C8B080EE04A3F02770D4C9CDB6D699E2C422C8A5C8FDB23EFB5C01C1E38AFA80E6B8C37
3,169,635 UART: Caliptra RT
3,169,980 UART: [state] CFI Enabled
3,277,724 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,186 UART: [rt]cmd =0x54514754, len=24
3,310,221 >>> mbox cmd response data (8 bytes)
3,310,222 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,723 UART: [rt]cmd =0x54514754, len=24
3,341,508 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,646 ready_for_fw is high
1,060,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,231 >>> mbox cmd response: success
2,623,231 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,653 UART:
2,685,669 UART: Running Caliptra FMC ...
2,686,077 UART:
2,686,220 UART: [state] CFI Enabled
2,696,695 UART: [fht] FMC Alias Private Key: 7
2,804,276 UART: [art] Extend RT PCRs Done
2,804,704 UART: [art] Lock RT PCRs Done
2,805,998 UART: [art] Populate DV Done
2,814,225 UART: [fht] FMC Alias Private Key: 7
2,815,215 UART: [art] Derive CDI
2,815,495 UART: [art] Store in in slot 0x4
2,901,102 UART: [art] Derive Key Pair
2,901,462 UART: [art] Store priv key in slot 0x5
2,914,518 UART: [art] Derive Key Pair - Done
2,929,435 UART: [art] Signing Cert with AUTHO
2,929,915 UART: RITY.KEYID = 7
2,945,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,048 UART: [art] PUB.X = EC3A55DD74AA5C8A631D7A093E2E3E0AC6FBC39A7873A4740A40776D26C66D829898994AC09311D4BBFE29472E397CAD
2,952,819 UART: [art] PUB.Y = 4CB62A2ACEE86801D8A89C84F73B55C28C9E387E0F7EEF5A627357409ABD44D3D463CB107EBFD5F2DE718ED18DA28016
2,959,779 UART: [art] SIG.R = 2B8D1822C028FF057A7F6C7CA8A2B993DD74917B07DEB83350AC6E730CEA327CD054B9A7FF20830215A2B2A758A0D9CF
2,966,549 UART: [art] SIG.S = E683AAEC81C623A53F8AF38C09D1E987E27D71463E292DE9B2F0F8B35F046F214E8AA7BF4141F4A41A6C9052759390E2
2,990,136 UART: Caliptra RT
2,990,481 UART: [state] CFI Enabled
3,098,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,028 UART: [rt]cmd =0x54514754, len=24
3,131,311 >>> mbox cmd response data (8 bytes)
3,131,312 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,459 UART: [rt]cmd =0x54514754, len=24
3,162,338 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,522 UART: [state] LifecycleState = Unprovisioned
85,177 UART: [state] DebugLocked = No
85,789 UART: [state] WD Timer not started. Device not locked for debugging
87,008 UART: [kat] SHA2-256
890,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,687 UART: [kat] ++
894,839 UART: [kat] sha1
899,167 UART: [kat] SHA2-256
901,107 UART: [kat] SHA2-384
903,894 UART: [kat] SHA2-512-ACC
905,795 UART: [kat] ECC-384
915,116 UART: [kat] HMAC-384Kdf
919,860 UART: [kat] LMS
1,168,172 UART: [kat] --
1,169,355 UART: [cold-reset] ++
1,169,923 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,173,679 ready_for_fw is high
1,173,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,383 UART: [idev] Sha1 KeyId Algorithm
1,207,311 UART: [idev] --
1,208,256 UART: [ldev] ++
1,208,424 UART: [ldev] CDI.KEYID = 6
1,208,788 UART: [ldev] SUBJECT.KEYID = 5
1,209,215 UART: [ldev] AUTHORITY.KEYID = 7
1,209,678 UART: [ldev] FE.KEYID = 1
1,214,746 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,702 UART: [ldev] --
1,281,158 UART: [fwproc] Wait for Commands...
1,281,981 UART: [fwproc] Recv command 0x46574c44
1,282,714 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,413 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,893 >>> mbox cmd response: success
2,769,893 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,770,948 UART: [afmc] ++
2,771,116 UART: [afmc] CDI.KEYID = 6
2,771,479 UART: [afmc] SUBJECT.KEYID = 7
2,771,905 UART: [afmc] AUTHORITY.KEYID = 5
2,807,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,867 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,596 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,479 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,198 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,169 UART: [afmc] --
2,851,153 UART: [cold-reset] --
2,852,163 UART: [state] Locking Datavault
2,853,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,974 UART: [state] Locking ICCM
2,854,620 UART: [exit] Launching FMC @ 0x40000130
2,859,949 UART:
2,859,965 UART: Running Caliptra FMC ...
2,860,373 UART:
2,860,427 UART: [state] CFI Enabled
2,870,706 UART: [fht] FMC Alias Private Key: 7
2,978,575 UART: [art] Extend RT PCRs Done
2,979,003 UART: [art] Lock RT PCRs Done
2,980,533 UART: [art] Populate DV Done
2,988,416 UART: [fht] FMC Alias Private Key: 7
2,989,562 UART: [art] Derive CDI
2,989,842 UART: [art] Store in in slot 0x4
3,075,305 UART: [art] Derive Key Pair
3,075,665 UART: [art] Store priv key in slot 0x5
3,089,111 UART: [art] Derive Key Pair - Done
3,103,965 UART: [art] Signing Cert with AUTHO
3,104,445 UART: RITY.KEYID = 7
3,119,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,292 UART: [art] PUB.X = 14E1A7965F6F85C6CD137982A058F8ACD3CB1118DF920CA79B7BFA9A8D923848A7F3C034419C779FC68B8DE7BE7963BE
3,127,071 UART: [art] PUB.Y = E23E7A8FA420A4D7216FC7FDF8F3001D66CE7D4AF567D40DAB0FEBB9E20D6FDEFA32EF12D87CE7F1AE498AA584A1907A
3,134,020 UART: [art] SIG.R = 74519D90A6D43FDD5102DA1BBF48DE7792D48F607A2B2A124897B2D38A27EF09771F0C697C412966BD489030ABD8C120
3,140,783 UART: [art] SIG.S = 258DB467E1259742A7A6FE4199F67217CE1FC529F7181BFBC0681A65D9422D907ED3AC52271C6BE3C2C1ADEAB1F532EB
3,164,910 UART: Caliptra RT
3,165,163 UART: [state] CFI Enabled
3,271,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,566 UART: [rt]cmd =0x54514754, len=24
3,304,433 >>> mbox cmd response data (8 bytes)
3,304,434 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,333,871 UART: [rt]cmd =0x54514754, len=24
3,335,932 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,408 ready_for_fw is high
1,056,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,947 >>> mbox cmd response: success
2,620,947 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,865 UART:
2,682,881 UART: Running Caliptra FMC ...
2,683,289 UART:
2,683,343 UART: [state] CFI Enabled
2,693,852 UART: [fht] FMC Alias Private Key: 7
2,801,681 UART: [art] Extend RT PCRs Done
2,802,109 UART: [art] Lock RT PCRs Done
2,803,529 UART: [art] Populate DV Done
2,811,762 UART: [fht] FMC Alias Private Key: 7
2,812,802 UART: [art] Derive CDI
2,813,082 UART: [art] Store in in slot 0x4
2,898,309 UART: [art] Derive Key Pair
2,898,669 UART: [art] Store priv key in slot 0x5
2,912,309 UART: [art] Derive Key Pair - Done
2,927,294 UART: [art] Signing Cert with AUTHO
2,927,774 UART: RITY.KEYID = 7
2,942,446 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,211 UART: [art] PUB.X = 107A28CA9861A952BF44EAF582718F9617D1F528AFF62BE07F306042AB1BDFF33CE879E686F8003B82F0CAA45D42CB59
2,949,969 UART: [art] PUB.Y = 6AADBBC164D24E69A14E4E81C8540832E11DEB278C57C55905056623FBE6FC9BE3C19B784B3DA027EFC0700CA8CAF0B7
2,956,923 UART: [art] SIG.R = 80FAEE699C901F2CD15A3B183DE020F654BBC8FF82DB9E1AC7D5E7284D644B4196741DF2F9912001B6CB5860CCC10AC2
2,963,701 UART: [art] SIG.S = E791E36112618030D68CF8870C44D1B88CE326D1930E19638E53315762AD9F56A0C31A7BD6F6CED054F6A6CDDF08376D
2,987,513 UART: Caliptra RT
2,987,766 UART: [state] CFI Enabled
3,095,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,866 UART: [rt]cmd =0x54514754, len=24
3,127,653 >>> mbox cmd response data (8 bytes)
3,127,654 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,157,309 UART: [rt]cmd =0x54514754, len=24
3,159,346 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,000 UART: [kat] SHA2-256
901,940 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,261 UART: [kat] HMAC-384Kdf
921,005 UART: [kat] LMS
1,169,317 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,174,528 ready_for_fw is high
1,174,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,736 UART: [idev] --
1,208,717 UART: [ldev] ++
1,208,885 UART: [ldev] CDI.KEYID = 6
1,209,249 UART: [ldev] SUBJECT.KEYID = 5
1,209,676 UART: [ldev] AUTHORITY.KEYID = 7
1,210,139 UART: [ldev] FE.KEYID = 1
1,215,417 UART: [ldev] Erasing FE.KEYID = 1
1,242,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,907 UART: [ldev] --
1,281,265 UART: [fwproc] Wait for Commands...
1,282,034 UART: [fwproc] Recv command 0x46574c44
1,282,767 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,672 >>> mbox cmd response: success
2,771,672 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,871 UART: [afmc] ++
2,773,039 UART: [afmc] CDI.KEYID = 6
2,773,402 UART: [afmc] SUBJECT.KEYID = 7
2,773,828 UART: [afmc] AUTHORITY.KEYID = 5
2,809,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,710 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,322 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,041 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,892 UART: [afmc] --
2,852,832 UART: [cold-reset] --
2,853,698 UART: [state] Locking Datavault
2,855,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,693 UART: [state] Locking ICCM
2,856,261 UART: [exit] Launching FMC @ 0x40000130
2,861,590 UART:
2,861,606 UART: Running Caliptra FMC ...
2,862,014 UART:
2,862,157 UART: [state] CFI Enabled
2,872,324 UART: [fht] FMC Alias Private Key: 7
2,979,511 UART: [art] Extend RT PCRs Done
2,979,939 UART: [art] Lock RT PCRs Done
2,981,791 UART: [art] Populate DV Done
2,990,076 UART: [fht] FMC Alias Private Key: 7
2,991,038 UART: [art] Derive CDI
2,991,318 UART: [art] Store in in slot 0x4
3,077,449 UART: [art] Derive Key Pair
3,077,809 UART: [art] Store priv key in slot 0x5
3,090,477 UART: [art] Derive Key Pair - Done
3,105,224 UART: [art] Signing Cert with AUTHO
3,105,704 UART: RITY.KEYID = 7
3,120,768 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,533 UART: [art] PUB.X = A4148F9E6AB7D05F9249F3813217CB910D86880E82BB43EE798A120CF0B4BF7AD159F53DC910FD82F9ABDE88FDEA5A1E
3,128,312 UART: [art] PUB.Y = 2D3A98DC8196C0A7C6C808C5F5B9179905FD01198B50ECF86A43C07CAD07A31C238B2F44C6A948D26BFABE290FC79903
3,135,254 UART: [art] SIG.R = AD52936A9DD8C569132405CF90C5B19B1EA9802E418A74ECB5B91F11334A7FB7B3E2940B5CE636CBF4A2EC01D0A1614C
3,142,027 UART: [art] SIG.S = 1EC508D036133860F575D5BF3B0D7A2283AC3885BD1B65CFB7AC8903CE5A82F1962D012CE1462A789B35F03BA57673D7
3,165,858 UART: Caliptra RT
3,166,203 UART: [state] CFI Enabled
3,273,242 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,968 UART: [rt]cmd =0x54514754, len=24
3,306,383 >>> mbox cmd response data (8 bytes)
3,306,384 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,793 UART: [rt]cmd =0x54514754, len=24
3,338,004 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,325 ready_for_fw is high
1,056,325 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,696 >>> mbox cmd response: success
2,621,696 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,760 UART:
2,683,776 UART: Running Caliptra FMC ...
2,684,184 UART:
2,684,327 UART: [state] CFI Enabled
2,694,802 UART: [fht] FMC Alias Private Key: 7
2,802,189 UART: [art] Extend RT PCRs Done
2,802,617 UART: [art] Lock RT PCRs Done
2,804,165 UART: [art] Populate DV Done
2,812,544 UART: [fht] FMC Alias Private Key: 7
2,813,562 UART: [art] Derive CDI
2,813,842 UART: [art] Store in in slot 0x4
2,899,605 UART: [art] Derive Key Pair
2,899,965 UART: [art] Store priv key in slot 0x5
2,913,085 UART: [art] Derive Key Pair - Done
2,927,602 UART: [art] Signing Cert with AUTHO
2,928,082 UART: RITY.KEYID = 7
2,942,982 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,747 UART: [art] PUB.X = 8E648D7E0C8C0718D317733EE2A216374933BB436196C306FB9A15690721AC2706344466A8CDA92E1364804C36389E80
2,950,488 UART: [art] PUB.Y = 904EE2E520F1A95B21A87523ABDE9649A43B5E590F4F4BA76FC52227EE2689562D3D8997E63A83EAD6206D64D3CF5294
2,957,439 UART: [art] SIG.R = 57BBCF25A98A9345DB991A51563CA40AA1B8532D32E7FE4DBBA052F62E1073E297323DFE7BD80C23BF04086B372F2C2B
2,964,209 UART: [art] SIG.S = D1067D866C996780BB52C898BEE7F97EDB97DA199F6DCC658A04826EC6644550D8593DD7275041C4C7441D6C5AC367EB
2,987,690 UART: Caliptra RT
2,988,035 UART: [state] CFI Enabled
3,095,880 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,706 UART: [rt]cmd =0x54514754, len=24
3,129,035 >>> mbox cmd response data (8 bytes)
3,129,036 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,158,521 UART: [rt]cmd =0x54514754, len=24
3,160,442 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,140 UART:
192,518 UART: Running Caliptra ROM ...
193,715 UART:
193,864 UART: [state] CFI Enabled
267,739 UART: [state] LifecycleState = Unprovisioned
269,719 UART: [state] DebugLocked = No
271,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,340 UART: [kat] SHA2-256
447,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,527 UART: [kat] ++
457,995 UART: [kat] sha1
469,218 UART: [kat] SHA2-256
471,930 UART: [kat] SHA2-384
478,266 UART: [kat] SHA2-512-ACC
480,626 UART: [kat] ECC-384
2,769,258 UART: [kat] HMAC-384Kdf
2,781,278 UART: [kat] LMS
3,971,565 UART: [kat] --
3,975,927 UART: [cold-reset] ++
3,977,927 UART: [fht] Storing FHT @ 0x50003400
3,990,675 UART: [idev] ++
3,991,304 UART: [idev] CDI.KEYID = 6
3,992,224 UART: [idev] SUBJECT.KEYID = 7
3,993,466 UART: [idev] UDS.KEYID = 0
3,994,448 ready_for_fw is high
3,994,642 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,137,831 UART: [idev] Erasing UDS.KEYID = 0
7,331,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,021 UART: [idev] --
7,358,449 UART: [ldev] ++
7,359,012 UART: [ldev] CDI.KEYID = 6
7,359,943 UART: [ldev] SUBJECT.KEYID = 5
7,361,205 UART: [ldev] AUTHORITY.KEYID = 7
7,362,351 UART: [ldev] FE.KEYID = 1
7,404,501 UART: [ldev] Erasing FE.KEYID = 1
10,733,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,062 UART: [ldev] --
13,097,377 UART: [fwproc] Waiting for Commands...
13,100,654 UART: [fwproc] Received command 0x46574c44
13,102,829 UART: [fwproc] Received Image of size 113844 bytes
17,153,708 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,226,100 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,611,219 >>> mbox cmd response: success
17,611,828 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,614,975 UART: [afmc] ++
17,615,572 UART: [afmc] CDI.KEYID = 6
17,616,493 UART: [afmc] SUBJECT.KEYID = 7
17,617,761 UART: [afmc] AUTHORITY.KEYID = 5
20,985,324 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,199 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,459 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,301,860 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,316,716 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,167 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,352,807 UART: [afmc] --
23,356,075 UART: [cold-reset] --
23,360,739 UART: [state] Locking Datavault
23,366,196 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,938 UART: [state] Locking ICCM
23,369,436 UART: [exit] Launching FMC @ 0x40000130
23,377,825 UART:
23,378,051 UART: Running Caliptra FMC ...
23,379,149 UART:
23,379,309 UART: [state] CFI Enabled
23,446,772 UART: [fht] FMC Alias Private Key: 7
25,784,596 UART: [art] Extend RT PCRs Done
25,785,824 UART: [art] Lock RT PCRs Done
25,787,313 UART: [art] Populate DV Done
25,792,827 UART: [fht] FMC Alias Private Key: 7
25,794,352 UART: [art] Derive CDI
25,795,116 UART: [art] Store in in slot 0x4
25,854,010 UART: [art] Derive Key Pair
25,855,007 UART: [art] Store priv key in slot 0x5
29,147,370 UART: [art] Derive Key Pair - Done
29,160,528 UART: [art] Signing Cert with AUTHO
29,161,827 UART: RITY.KEYID = 7
31,448,481 UART: [art] Erasing AUTHORITY.KEYID = 7
31,449,990 UART: [art] PUB.X = 6F1CCA515F5A2C5DED626C1E5AFDCFDFBD24D28B8FF611CE5700D9668DF99FFED5CA44C4ED00386EB854D7EC9A0777B9
31,457,261 UART: [art] PUB.Y = D1B2D16A7C646C5CEC8A640524066FA2B541920D9CCFBE7E1ADD89F6F785C62DE211AC28EEF51A1B7A1D9FB4D76FA235
31,464,545 UART: [art] SIG.R = 86A49BF9AB3EC36C335998EC9CBFA19098C5FE546CBC60C4124D6601D7F2BE0B0F52964A0C05F85ADBE9981B4EB47D43
31,471,929 UART: [art] SIG.S = 852F74856091C95518068646F068DD1C0628361BC313A86F4FF90AA9521526B5176ED3BF7D0E804E008E95A78569ED56
32,777,291 UART: Caliptra RT
32,778,003 UART: [state] CFI Enabled
32,938,392 UART: [rt] RT listening for mailbox commands...
32,970,070 UART: [rt]cmd =0x54514754, len=24
32,972,708 >>> mbox cmd response data (8 bytes)
32,973,245 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,002,962 UART: [rt]cmd =0x47544744, len=8
33,005,874 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,784,041 ready_for_fw is high
3,784,442 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,849,257 >>> mbox cmd response: success
17,850,234 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,548,393 UART:
23,548,789 UART: Running Caliptra FMC ...
23,549,899 UART:
23,550,055 UART: [state] CFI Enabled
23,617,703 UART: [fht] FMC Alias Private Key: 7
25,955,089 UART: [art] Extend RT PCRs Done
25,956,312 UART: [art] Lock RT PCRs Done
25,958,392 UART: [art] Populate DV Done
25,963,959 UART: [fht] FMC Alias Private Key: 7
25,965,501 UART: [art] Derive CDI
25,966,261 UART: [art] Store in in slot 0x4
26,026,841 UART: [art] Derive Key Pair
26,027,882 UART: [art] Store priv key in slot 0x5
29,321,078 UART: [art] Derive Key Pair - Done
29,334,243 UART: [art] Signing Cert with AUTHO
29,335,567 UART: RITY.KEYID = 7
31,622,866 UART: [art] Erasing AUTHORITY.KEYID = 7
31,624,376 UART: [art] PUB.X = FB31B98E3F25F063EE591921C6CF099E9A007D0F6AF30AF0E0F01A5EA06450828D87D4F29CED10A45C6BD4D63DD65A55
31,631,577 UART: [art] PUB.Y = 093743F5A65A5C51621005BD4D7690615DB24C860FB92B939DE63C7A121387758761EAD841EDE8781C2706F83465C8EF
31,638,806 UART: [art] SIG.R = D13004BF12D29504C1C04780F6233F3F2E1F4395D50877D040DC8E4B63AB96282A84FF7DAFC3AD18207E6438F959583B
31,646,189 UART: [art] SIG.S = 703E4EC0D379D18BA0DB448F6AF01C4B1883DC1E0B661DC0FD7FCE19EABABD0058B0712A4949B8D06037097BACB606D8
32,951,337 UART: Caliptra RT
32,952,034 UART: [state] CFI Enabled
33,113,173 UART: [rt] RT listening for mailbox commands...
33,144,750 UART: [rt]cmd =0x54514754, len=24
33,147,609 >>> mbox cmd response data (8 bytes)
33,148,022 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,177,795 UART: [rt]cmd =0x47544744, len=8
33,180,871 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,508 UART:
192,877 UART: Running Caliptra ROM ...
194,018 UART:
603,551 UART: [state] CFI Enabled
623,195 UART: [state] LifecycleState = Unprovisioned
625,159 UART: [state] DebugLocked = No
626,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,989 UART: [kat] SHA2-256
800,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,315 UART: [kat] ++
811,758 UART: [kat] sha1
821,922 UART: [kat] SHA2-256
824,643 UART: [kat] SHA2-384
829,798 UART: [kat] SHA2-512-ACC
832,168 UART: [kat] ECC-384
3,116,083 UART: [kat] HMAC-384Kdf
3,129,171 UART: [kat] LMS
4,319,253 UART: [kat] --
4,324,056 UART: [cold-reset] ++
4,326,703 UART: [fht] Storing FHT @ 0x50003400
4,338,675 UART: [idev] ++
4,339,318 UART: [idev] CDI.KEYID = 6
4,340,229 UART: [idev] SUBJECT.KEYID = 7
4,341,473 UART: [idev] UDS.KEYID = 0
4,342,510 ready_for_fw is high
4,342,724 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,739 UART: [idev] Erasing UDS.KEYID = 0
7,633,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,655,948 UART: [idev] --
7,659,785 UART: [ldev] ++
7,660,368 UART: [ldev] CDI.KEYID = 6
7,661,279 UART: [ldev] SUBJECT.KEYID = 5
7,662,488 UART: [ldev] AUTHORITY.KEYID = 7
7,663,769 UART: [ldev] FE.KEYID = 1
7,674,142 UART: [ldev] Erasing FE.KEYID = 1
10,963,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,292 UART: [ldev] --
13,322,569 UART: [fwproc] Waiting for Commands...
13,324,702 UART: [fwproc] Received command 0x46574c44
13,326,945 UART: [fwproc] Received Image of size 113844 bytes
17,378,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,450,456 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,519,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,834,852 >>> mbox cmd response: success
17,835,365 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,839,085 UART: [afmc] ++
17,839,684 UART: [afmc] CDI.KEYID = 6
17,840,598 UART: [afmc] SUBJECT.KEYID = 7
17,841,865 UART: [afmc] AUTHORITY.KEYID = 5
21,154,496 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,754 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,013 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,407 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,377 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,722 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,673 UART: [afmc] --
23,520,344 UART: [cold-reset] --
23,523,845 UART: [state] Locking Datavault
23,529,584 UART: [state] Locking PCR0, PCR1 and PCR31
23,531,344 UART: [state] Locking ICCM
23,533,061 UART: [exit] Launching FMC @ 0x40000130
23,541,460 UART:
23,541,695 UART: Running Caliptra FMC ...
23,542,796 UART:
23,542,952 UART: [state] CFI Enabled
23,551,488 UART: [fht] FMC Alias Private Key: 7
25,882,449 UART: [art] Extend RT PCRs Done
25,883,663 UART: [art] Lock RT PCRs Done
25,885,214 UART: [art] Populate DV Done
25,890,514 UART: [fht] FMC Alias Private Key: 7
25,892,047 UART: [art] Derive CDI
25,892,787 UART: [art] Store in in slot 0x4
25,935,754 UART: [art] Derive Key Pair
25,936,770 UART: [art] Store priv key in slot 0x5
29,179,285 UART: [art] Derive Key Pair - Done
29,192,329 UART: [art] Signing Cert with AUTHO
29,193,632 UART: RITY.KEYID = 7
31,472,591 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,088 UART: [art] PUB.X = 72F10D4605466F5C9475AB515A368CF1E404CCBAB3EF5F43F2C8F2C8EAF64A0E17415D8610A0476FA04E22FB8D85AD60
31,481,360 UART: [art] PUB.Y = 80686EE956B34EEE5C6EB80FCF108BEE3E4183C1089D610E562AF87ED013F5EF6B566AF4D417D0FB34F924CFF7386ED8
31,488,608 UART: [art] SIG.R = 298F7EF926232ADBC78E2A794D9FDCFC9B96465FD83B7F964389B1E49AB7CF07635D6ED942BC74A4F56CEEF09029D8A5
31,495,994 UART: [art] SIG.S = 2AD9C7D196D5D246A109B35ABCE2D5510D36220D8E7F06D0A8C5DFDDF013EB86910C75C1CE9AD0BD22B186564472A8D0
32,801,317 UART: Caliptra RT
32,802,020 UART: [state] CFI Enabled
32,919,199 UART: [rt] RT listening for mailbox commands...
32,950,724 UART: [rt]cmd =0x54514754, len=24
32,953,199 >>> mbox cmd response data (8 bytes)
32,953,642 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
32,983,405 UART: [rt]cmd =0x47544744, len=8
32,986,352 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,126,545 ready_for_fw is high
4,126,940 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,071,837 >>> mbox cmd response: success
18,072,669 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,710,488 UART:
23,710,897 UART: Running Caliptra FMC ...
23,712,048 UART:
23,712,218 UART: [state] CFI Enabled
23,719,655 UART: [fht] FMC Alias Private Key: 7
26,050,661 UART: [art] Extend RT PCRs Done
26,051,889 UART: [art] Lock RT PCRs Done
26,053,573 UART: [art] Populate DV Done
26,059,098 UART: [fht] FMC Alias Private Key: 7
26,060,590 UART: [art] Derive CDI
26,061,409 UART: [art] Store in in slot 0x4
26,104,167 UART: [art] Derive Key Pair
26,105,175 UART: [art] Store priv key in slot 0x5
29,347,067 UART: [art] Derive Key Pair - Done
29,360,079 UART: [art] Signing Cert with AUTHO
29,361,395 UART: RITY.KEYID = 7
31,640,945 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,464 UART: [art] PUB.X = 06CD67982B60F828C9286DAE9ABA4CE68F283049DF9C8E55B0979BDB59BB0A367F1076E0606B0E66A1627C3602DF7EB1
31,649,682 UART: [art] PUB.Y = A074F3E9DFC3CC201278BE26CD597BFA7EF11200A24CF299F595664F7FACC72F3679574DE52252CB3DBFD168AF55F5AD
31,656,952 UART: [art] SIG.R = BED6C72218D2006CD2394F6350120FE4F3874BAC264D06532554E5CCE739C1F64C2B4469953BC14D2B2F6DC91D349F09
31,664,313 UART: [art] SIG.S = 886DBA9F3F417DFC905C043A71EF59F8A48296C907D1279FD651929E0D174FBEA710F34C7364081EBE2CD24B21ED9D6B
32,969,490 UART: Caliptra RT
32,970,192 UART: [state] CFI Enabled
33,087,845 UART: [rt] RT listening for mailbox commands...
33,119,590 UART: [rt]cmd =0x54514754, len=24
33,122,334 >>> mbox cmd response data (8 bytes)
33,122,797 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,152,613 UART: [rt]cmd =0x47544744, len=8
33,155,708 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,129 UART:
192,497 UART: Running Caliptra ROM ...
193,604 UART:
193,750 UART: [state] CFI Enabled
267,056 UART: [state] LifecycleState = Unprovisioned
268,925 UART: [state] DebugLocked = No
270,737 UART: [state] WD Timer not started. Device not locked for debugging
274,147 UART: [kat] SHA2-256
453,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,836 UART: [kat] ++
465,287 UART: [kat] sha1
476,658 UART: [kat] SHA2-256
479,670 UART: [kat] SHA2-384
486,583 UART: [kat] SHA2-512-ACC
489,589 UART: [kat] ECC-384
2,948,577 UART: [kat] HMAC-384Kdf
2,971,677 UART: [kat] LMS
3,501,126 UART: [kat] --
3,507,102 UART: [cold-reset] ++
3,509,668 UART: [fht] FHT @ 0x50003400
3,520,737 UART: [idev] ++
3,521,366 UART: [idev] CDI.KEYID = 6
3,522,265 UART: [idev] SUBJECT.KEYID = 7
3,523,411 UART: [idev] UDS.KEYID = 0
3,524,315 ready_for_fw is high
3,524,518 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,182 UART: [idev] Erasing UDS.KEYID = 0
6,032,466 UART: [idev] Sha1 KeyId Algorithm
6,054,517 UART: [idev] --
6,058,737 UART: [ldev] ++
6,059,313 UART: [ldev] CDI.KEYID = 6
6,060,251 UART: [ldev] SUBJECT.KEYID = 5
6,061,418 UART: [ldev] AUTHORITY.KEYID = 7
6,062,654 UART: [ldev] FE.KEYID = 1
6,101,817 UART: [ldev] Erasing FE.KEYID = 1
8,603,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,195 UART: [ldev] --
10,416,960 UART: [fwproc] Wait for Commands...
10,419,437 UART: [fwproc] Recv command 0x46574c44
10,421,476 UART: [fwproc] Recv'd Img size: 114168 bytes
13,813,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,886,681 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,955,468 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,273,701 >>> mbox cmd response: success
14,274,245 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,277,965 UART: [afmc] ++
14,278,559 UART: [afmc] CDI.KEYID = 6
14,279,441 UART: [afmc] SUBJECT.KEYID = 7
14,280,599 UART: [afmc] AUTHORITY.KEYID = 5
16,811,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,075 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,884 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,879 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,760 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,371 UART: [afmc] --
18,609,729 UART: [cold-reset] --
18,612,621 UART: [state] Locking Datavault
18,618,254 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,920 UART: [state] Locking ICCM
18,621,961 UART: [exit] Launching FMC @ 0x40000130
18,630,416 UART:
18,630,654 UART: Running Caliptra FMC ...
18,631,763 UART:
18,631,922 UART: [state] CFI Enabled
18,691,111 UART: [fht] FMC Alias Private Key: 7
20,454,717 UART: [art] Extend RT PCRs Done
20,455,944 UART: [art] Lock RT PCRs Done
20,457,466 UART: [art] Populate DV Done
20,462,877 UART: [fht] FMC Alias Private Key: 7
20,464,367 UART: [art] Derive CDI
20,465,132 UART: [art] Store in in slot 0x4
20,523,384 UART: [art] Derive Key Pair
20,524,424 UART: [art] Store priv key in slot 0x5
22,987,411 UART: [art] Derive Key Pair - Done
23,000,532 UART: [art] Signing Cert with AUTHO
23,001,849 UART: RITY.KEYID = 7
24,712,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,599 UART: [art] PUB.X = F1A8ED69001B7ED6D2E493FB20021E7DB0B4617BC625FD8FECD129078A8305488E43C4E8706B97FF8906C37A7733AAF6
24,720,809 UART: [art] PUB.Y = 27A9F8E377608E66AADBD5371EA094F00960EB5E045A78D14D05A6432F1E9B771989DB5141DAB51B0C557B93D630242C
24,728,112 UART: [art] SIG.R = E42976FED8EF0721205A43ED0A9187B378BE93D0B634435F094EF40B48802D66315625427A1D4E8D5FAF6B6E2B39E9A4
24,735,473 UART: [art] SIG.S = 86E45B61A745661CAC8817A9DFCF6C3C4F5999CE95C28D0B0DA8A11A280A54179EDA7328745F0A71F8EB3BB3D2C9DEF1
25,714,300 UART: Caliptra RT
25,715,017 UART: [state] CFI Enabled
25,880,173 UART: [rt] RT listening for mailbox commands...
25,911,640 UART: [rt]cmd =0x54514754, len=24
25,914,179 >>> mbox cmd response data (8 bytes)
25,914,700 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,944,470 UART: [rt]cmd =0x47544744, len=8
25,947,555 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,360,031 ready_for_fw is high
3,360,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,045,989 >>> mbox cmd response: success
14,046,875 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,322,815 UART:
18,323,217 UART: Running Caliptra FMC ...
18,324,336 UART:
18,324,489 UART: [state] CFI Enabled
18,389,867 UART: [fht] FMC Alias Private Key: 7
20,153,389 UART: [art] Extend RT PCRs Done
20,154,616 UART: [art] Lock RT PCRs Done
20,156,380 UART: [art] Populate DV Done
20,162,005 UART: [fht] FMC Alias Private Key: 7
20,163,498 UART: [art] Derive CDI
20,164,234 UART: [art] Store in in slot 0x4
20,222,330 UART: [art] Derive Key Pair
20,223,367 UART: [art] Store priv key in slot 0x5
22,686,070 UART: [art] Derive Key Pair - Done
22,699,032 UART: [art] Signing Cert with AUTHO
22,700,369 UART: RITY.KEYID = 7
24,411,715 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,219 UART: [art] PUB.X = 05B8C7F80AAC71BF97B0AED24D167C78B7537C2C9989D10DC968BFB8AF81142FF6C31A1BC863EC921BEA5AE3BCF35745
24,420,512 UART: [art] PUB.Y = 46540F10E103386558CB6A33D751B461433E593A12180E3260476C5DC809F4AAD907E95B65B0B12794C096B4859E060D
24,427,757 UART: [art] SIG.R = EAC9E8F1D136B7FA08F50AA587ECE06903C88EB45E358EC0859EE2AED536C4315CBB0A25BABBC3618F5FD393EEA6B7A4
24,435,144 UART: [art] SIG.S = FA233590BD293F7B6458B38842A2821681F134F600963B428314F7CA4F64E060B2D612DFB9381F6A679EC9E1A4092D0F
25,413,922 UART: Caliptra RT
25,414,636 UART: [state] CFI Enabled
25,578,817 UART: [rt] RT listening for mailbox commands...
25,610,770 UART: [rt]cmd =0x54514754, len=24
25,613,739 >>> mbox cmd response data (8 bytes)
25,614,148 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,643,749 UART: [rt]cmd =0x47544744, len=8
25,646,570 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,883 writing to cptra_bootfsm_go
193,101 UART:
193,457 UART: Running Caliptra ROM ...
194,555 UART:
604,190 UART: [state] CFI Enabled
619,234 UART: [state] LifecycleState = Unprovisioned
621,142 UART: [state] DebugLocked = No
622,318 UART: [state] WD Timer not started. Device not locked for debugging
626,352 UART: [kat] SHA2-256
805,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,010 UART: [kat] ++
817,464 UART: [kat] sha1
829,189 UART: [kat] SHA2-256
832,190 UART: [kat] SHA2-384
838,177 UART: [kat] SHA2-512-ACC
841,197 UART: [kat] ECC-384
3,283,812 UART: [kat] HMAC-384Kdf
3,297,537 UART: [kat] LMS
3,826,959 UART: [kat] --
3,831,518 UART: [cold-reset] ++
3,832,948 UART: [fht] FHT @ 0x50003400
3,842,710 UART: [idev] ++
3,843,282 UART: [idev] CDI.KEYID = 6
3,844,167 UART: [idev] SUBJECT.KEYID = 7
3,845,406 UART: [idev] UDS.KEYID = 0
3,846,343 ready_for_fw is high
3,846,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,000 UART: [idev] Erasing UDS.KEYID = 0
6,320,225 UART: [idev] Sha1 KeyId Algorithm
6,344,585 UART: [idev] --
6,349,229 UART: [ldev] ++
6,349,819 UART: [ldev] CDI.KEYID = 6
6,350,733 UART: [ldev] SUBJECT.KEYID = 5
6,351,943 UART: [ldev] AUTHORITY.KEYID = 7
6,353,167 UART: [ldev] FE.KEYID = 1
6,363,219 UART: [ldev] Erasing FE.KEYID = 1
8,837,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,141 UART: [ldev] --
10,629,038 UART: [fwproc] Wait for Commands...
10,631,569 UART: [fwproc] Recv command 0x46574c44
10,633,671 UART: [fwproc] Recv'd Img size: 114168 bytes
14,042,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,122,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,190,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,507,866 >>> mbox cmd response: success
14,508,384 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,512,225 UART: [afmc] ++
14,512,818 UART: [afmc] CDI.KEYID = 6
14,513,729 UART: [afmc] SUBJECT.KEYID = 7
14,514,945 UART: [afmc] AUTHORITY.KEYID = 5
17,017,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,737,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,739,673 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,755,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,771,441 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,787,337 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,810,498 UART: [afmc] --
18,814,036 UART: [cold-reset] --
18,817,356 UART: [state] Locking Datavault
18,823,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,395 UART: [state] Locking ICCM
18,826,679 UART: [exit] Launching FMC @ 0x40000130
18,835,071 UART:
18,835,313 UART: Running Caliptra FMC ...
18,836,413 UART:
18,836,578 UART: [state] CFI Enabled
18,844,843 UART: [fht] FMC Alias Private Key: 7
20,600,887 UART: [art] Extend RT PCRs Done
20,602,123 UART: [art] Lock RT PCRs Done
20,603,859 UART: [art] Populate DV Done
20,609,218 UART: [fht] FMC Alias Private Key: 7
20,610,806 UART: [art] Derive CDI
20,611,622 UART: [art] Store in in slot 0x4
20,654,054 UART: [art] Derive Key Pair
20,655,096 UART: [art] Store priv key in slot 0x5
23,082,064 UART: [art] Derive Key Pair - Done
23,095,247 UART: [art] Signing Cert with AUTHO
23,096,554 UART: RITY.KEYID = 7
24,801,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,461 UART: [art] PUB.X = DF9C0CB8BF85CF546CFC505E155C012D09B39D0E06AB7C3EAACCE4E45C97F939B8E2068E60E9C323B93C0230BB3650E2
24,810,775 UART: [art] PUB.Y = D64DF1185CD4CB14F48C454931B28BFC0FFA19906B5CCD63333477D1EFBE19BD81479BBB720A73DD5FA7A8F5CC7B73B7
24,818,058 UART: [art] SIG.R = B89F7BB20ADD4896647FDE91E1F933F67956761F5DE65D8F3E13C53648DBC2F49C250F14B944FB04318FC5692BCAAA0A
24,825,418 UART: [art] SIG.S = 83D61EAE6B46451864FB6002A7A089475E45C36882477627020A8FB6DE78E56DCFF2088A9E1B4509E9AA3721857706C9
25,804,560 UART: Caliptra RT
25,805,281 UART: [state] CFI Enabled
25,923,065 UART: [rt] RT listening for mailbox commands...
25,954,757 UART: [rt]cmd =0x54514754, len=24
25,957,511 >>> mbox cmd response data (8 bytes)
25,958,079 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,987,823 UART: [rt]cmd =0x47544744, len=8
25,990,840 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,744 writing to cptra_bootfsm_go
3,700,512 ready_for_fw is high
3,700,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,497 >>> mbox cmd response: success
14,264,319 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,512,634 UART:
18,513,024 UART: Running Caliptra FMC ...
18,514,223 UART:
18,514,394 UART: [state] CFI Enabled
18,522,076 UART: [fht] FMC Alias Private Key: 7
20,278,720 UART: [art] Extend RT PCRs Done
20,279,951 UART: [art] Lock RT PCRs Done
20,281,319 UART: [art] Populate DV Done
20,286,895 UART: [fht] FMC Alias Private Key: 7
20,288,494 UART: [art] Derive CDI
20,289,310 UART: [art] Store in in slot 0x4
20,331,635 UART: [art] Derive Key Pair
20,332,840 UART: [art] Store priv key in slot 0x5
22,759,581 UART: [art] Derive Key Pair - Done
22,772,736 UART: [art] Signing Cert with AUTHO
22,774,039 UART: RITY.KEYID = 7
24,479,682 UART: [art] Erasing AUTHORITY.KEYID = 7
24,481,195 UART: [art] PUB.X = 215063B3EBF5CDD1F518C6C2F2623081FD193B6D3C1B780255769F3D8079DDCC6603A6196AA0B06CEFAE3DD4AF82F58D
24,488,450 UART: [art] PUB.Y = 8278732337B6873FBA5A98F880B34C6917A71A5665AF24EB8A335A26690B12967EE4DC3A0F3D9DDA127D8CC852FDE8B5
24,495,737 UART: [art] SIG.R = BFFB31B9AD7406F1F62223CF375A5EF6942B2DC3E643F5A67E101269A446210E807FF300E870B3D679204942620E5EC4
24,503,084 UART: [art] SIG.S = A2CE058498BDA1242A9E6CC426BED1256C99BB6B219595A9469028CC02C354F2C6558C87D79A0BD71B642414537ED0E4
25,481,597 UART: Caliptra RT
25,482,298 UART: [state] CFI Enabled
25,598,818 UART: [rt] RT listening for mailbox commands...
25,630,113 UART: [rt]cmd =0x54514754, len=24
25,632,666 >>> mbox cmd response data (8 bytes)
25,633,187 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,662,858 UART: [rt]cmd =0x47544744, len=8
25,665,678 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,193 UART:
192,584 UART: Running Caliptra ROM ...
193,785 UART:
193,956 UART: [state] CFI Enabled
265,456 UART: [state] LifecycleState = Unprovisioned
267,800 UART: [state] DebugLocked = No
270,045 UART: [state] WD Timer not started. Device not locked for debugging
275,528 UART: [kat] SHA2-256
465,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,230 UART: [kat] ++
476,725 UART: [kat] sha1
487,888 UART: [kat] SHA2-256
490,902 UART: [kat] SHA2-384
497,252 UART: [kat] SHA2-512-ACC
499,831 UART: [kat] ECC-384
2,948,469 UART: [kat] HMAC-384Kdf
2,971,854 UART: [kat] LMS
3,503,672 UART: [kat] --
3,508,019 UART: [cold-reset] ++
3,509,689 UART: [fht] FHT @ 0x50003400
3,521,738 UART: [idev] ++
3,522,449 UART: [idev] CDI.KEYID = 6
3,523,333 UART: [idev] SUBJECT.KEYID = 7
3,524,518 UART: [idev] UDS.KEYID = 0
3,525,853 ready_for_fw is high
3,526,043 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,625 UART: [idev] Erasing UDS.KEYID = 0
6,030,534 UART: [idev] Sha1 KeyId Algorithm
6,052,608 UART: [idev] --
6,057,341 UART: [ldev] ++
6,058,041 UART: [ldev] CDI.KEYID = 6
6,058,932 UART: [ldev] SUBJECT.KEYID = 5
6,060,150 UART: [ldev] AUTHORITY.KEYID = 7
6,061,285 UART: [ldev] FE.KEYID = 1
6,099,685 UART: [ldev] Erasing FE.KEYID = 1
8,605,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,338 UART: [ldev] --
10,416,119 UART: [fwproc] Wait for Commands...
10,418,325 UART: [fwproc] Recv command 0x46574c44
10,420,642 UART: [fwproc] Recv'd Img size: 114168 bytes
13,860,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,633 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,591,418 >>> mbox cmd response: success
14,591,957 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,596,356 UART: [afmc] ++
14,597,067 UART: [afmc] CDI.KEYID = 6
14,598,285 UART: [afmc] SUBJECT.KEYID = 7
14,599,722 UART: [afmc] AUTHORITY.KEYID = 5
17,129,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,850,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,852,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,867,964 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,133 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,134 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,922,147 UART: [afmc] --
18,925,216 UART: [cold-reset] --
18,929,124 UART: [state] Locking Datavault
18,932,604 UART: [state] Locking PCR0, PCR1 and PCR31
18,934,754 UART: [state] Locking ICCM
18,937,127 UART: [exit] Launching FMC @ 0x40000130
18,945,803 UART:
18,946,036 UART: Running Caliptra FMC ...
18,947,159 UART:
18,947,318 UART: [state] CFI Enabled
19,007,542 UART: [fht] FMC Alias Private Key: 7
20,771,427 UART: [art] Extend RT PCRs Done
20,772,627 UART: [art] Lock RT PCRs Done
20,774,449 UART: [art] Populate DV Done
20,779,809 UART: [fht] FMC Alias Private Key: 7
20,781,355 UART: [art] Derive CDI
20,782,174 UART: [art] Store in in slot 0x4
20,839,678 UART: [art] Derive Key Pair
20,840,676 UART: [art] Store priv key in slot 0x5
23,303,448 UART: [art] Derive Key Pair - Done
23,316,552 UART: [art] Signing Cert with AUTHO
23,317,860 UART: RITY.KEYID = 7
25,028,695 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,194 UART: [art] PUB.X = 54F7E76509298C7D81F4A6F6D37694FB70CA478C28045C38A14364793D8D66DF7EFCF724E34DAF85ABB7DE48B300C36D
25,037,429 UART: [art] PUB.Y = 0F64F6B8C9F0B4885249AB6C976C9BA3C68C1278EB77C433AF78A0198296479C252F28E13B9E749AAEB4331569A9027F
25,044,685 UART: [art] SIG.R = CBA71A7CD2886C60D29211B1B9D694F47102C9A6971A3D6995F2BA937D8C102136AB3E6AC5AC4012D3EFC4825D22F89C
25,052,041 UART: [art] SIG.S = 0851DC5FAEF07B8C80FD8675C12CBD694B5C8C4B37DD3442AABD67AF534B1E52CA02A508BEE0D4DFECAB01AFC7681BB4
26,031,402 UART: Caliptra RT
26,032,120 UART: [state] CFI Enabled
26,196,293 UART: [rt] RT listening for mailbox commands...
26,227,750 UART: [rt]cmd =0x54514754, len=24
26,230,374 >>> mbox cmd response data (8 bytes)
26,230,817 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,260,579 UART: [rt]cmd =0x47544744, len=8
26,263,407 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,437,758 ready_for_fw is high
3,438,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,780 >>> mbox cmd response: success
14,734,437 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,048,705 UART:
19,049,108 UART: Running Caliptra FMC ...
19,050,253 UART:
19,050,423 UART: [state] CFI Enabled
19,116,756 UART: [fht] FMC Alias Private Key: 7
20,880,278 UART: [art] Extend RT PCRs Done
20,881,514 UART: [art] Lock RT PCRs Done
20,883,202 UART: [art] Populate DV Done
20,888,774 UART: [fht] FMC Alias Private Key: 7
20,890,439 UART: [art] Derive CDI
20,891,259 UART: [art] Store in in slot 0x4
20,948,935 UART: [art] Derive Key Pair
20,949,978 UART: [art] Store priv key in slot 0x5
23,412,757 UART: [art] Derive Key Pair - Done
23,425,547 UART: [art] Signing Cert with AUTHO
23,426,861 UART: RITY.KEYID = 7
25,138,770 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,287 UART: [art] PUB.X = FA57EEC3F526A30D2887E2AF5E43A11921313E1E4BC7A1D612110901A0DD745F0527FB55ADF5FCDE0E5B7EEE90AC169C
25,147,546 UART: [art] PUB.Y = B8747BC601C97D9A960AD95A01877A2BECCA6F65B397D8CEA026455DA8E8DE666FAC8517C50318BD0EE14C56D3897608
25,154,841 UART: [art] SIG.R = E48A9AB06A5A736B52FB3F54E2D30BF9B7F6F6A48EE0612AE39EDAA3AF2B973965F261E276326171529309DBFF23BC7C
25,162,232 UART: [art] SIG.S = F15D84FD85C24042A746D312B8FF0CA25F01148F9533ACFA2AB4CE6B97E826890E43FAB46C9E8F4F3E9DE20343086083
26,140,450 UART: Caliptra RT
26,141,169 UART: [state] CFI Enabled
26,306,222 UART: [rt] RT listening for mailbox commands...
26,337,743 UART: [rt]cmd =0x54514754, len=24
26,340,186 >>> mbox cmd response data (8 bytes)
26,340,700 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,370,529 UART: [rt]cmd =0x47544744, len=8
26,373,393 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,687 writing to cptra_bootfsm_go
192,862 UART:
193,210 UART: Running Caliptra ROM ...
194,457 UART:
604,052 UART: [state] CFI Enabled
616,087 UART: [state] LifecycleState = Unprovisioned
618,454 UART: [state] DebugLocked = No
621,120 UART: [state] WD Timer not started. Device not locked for debugging
624,867 UART: [kat] SHA2-256
814,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,545 UART: [kat] ++
826,062 UART: [kat] sha1
837,649 UART: [kat] SHA2-256
840,659 UART: [kat] SHA2-384
846,221 UART: [kat] SHA2-512-ACC
848,825 UART: [kat] ECC-384
3,292,376 UART: [kat] HMAC-384Kdf
3,305,543 UART: [kat] LMS
3,837,402 UART: [kat] --
3,843,313 UART: [cold-reset] ++
3,844,181 UART: [fht] FHT @ 0x50003400
3,854,517 UART: [idev] ++
3,855,233 UART: [idev] CDI.KEYID = 6
3,856,145 UART: [idev] SUBJECT.KEYID = 7
3,857,391 UART: [idev] UDS.KEYID = 0
3,858,317 ready_for_fw is high
3,858,508 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,274 UART: [idev] Erasing UDS.KEYID = 0
6,333,825 UART: [idev] Sha1 KeyId Algorithm
6,356,102 UART: [idev] --
6,361,766 UART: [ldev] ++
6,362,461 UART: [ldev] CDI.KEYID = 6
6,363,379 UART: [ldev] SUBJECT.KEYID = 5
6,364,541 UART: [ldev] AUTHORITY.KEYID = 7
6,365,773 UART: [ldev] FE.KEYID = 1
6,377,066 UART: [ldev] Erasing FE.KEYID = 1
8,852,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,841 UART: [ldev] --
10,645,136 UART: [fwproc] Wait for Commands...
10,646,747 UART: [fwproc] Recv command 0x46574c44
10,649,058 UART: [fwproc] Recv'd Img size: 114168 bytes
14,097,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,046 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,219 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,819 >>> mbox cmd response: success
14,831,375 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,835,794 UART: [afmc] ++
14,836,491 UART: [afmc] CDI.KEYID = 6
14,837,680 UART: [afmc] SUBJECT.KEYID = 7
14,839,170 UART: [afmc] AUTHORITY.KEYID = 5
17,343,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,069,661 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,071,634 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,086,816 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,101,936 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,117,026 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,790 UART: [afmc] --
19,144,912 UART: [cold-reset] --
19,149,803 UART: [state] Locking Datavault
19,155,338 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,535 UART: [state] Locking ICCM
19,160,375 UART: [exit] Launching FMC @ 0x40000130
19,168,998 UART:
19,169,234 UART: Running Caliptra FMC ...
19,170,270 UART:
19,170,419 UART: [state] CFI Enabled
19,178,501 UART: [fht] FMC Alias Private Key: 7
20,935,179 UART: [art] Extend RT PCRs Done
20,936,399 UART: [art] Lock RT PCRs Done
20,938,212 UART: [art] Populate DV Done
20,943,466 UART: [fht] FMC Alias Private Key: 7
20,945,008 UART: [art] Derive CDI
20,945,756 UART: [art] Store in in slot 0x4
20,988,402 UART: [art] Derive Key Pair
20,989,405 UART: [art] Store priv key in slot 0x5
23,416,660 UART: [art] Derive Key Pair - Done
23,429,963 UART: [art] Signing Cert with AUTHO
23,431,293 UART: RITY.KEYID = 7
25,136,746 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,254 UART: [art] PUB.X = 4B5BD205ADFE0C983C574547089A8EE5390600E0B75D87FDCC12F4E61CB48C2444821E3CFB98DE520869E97AAB528268
25,145,554 UART: [art] PUB.Y = F0D630AD6CB1B963271DB6996D7010305814F976829973D7B7D8D82AE2AEB31D54F52F897756960F45D991BC988EBA96
25,152,787 UART: [art] SIG.R = 7BDA8A94538D07BC58E8197B5B2D21A84C231DAF3DEE34B44B3E3BE9CBEFB5225FD170F2D470E6E62CEEDEC3565184A8
25,160,190 UART: [art] SIG.S = B55CE424952D347FC109AFCBAD73AF9A940699DCFBA8F8C742E143340288E5019851818F638BF0772E3F41D8D0711678
26,139,261 UART: Caliptra RT
26,139,946 UART: [state] CFI Enabled
26,257,940 UART: [rt] RT listening for mailbox commands...
26,289,353 UART: [rt]cmd =0x54514754, len=24
26,291,883 >>> mbox cmd response data (8 bytes)
26,292,394 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,322,284 UART: [rt]cmd =0x47544744, len=8
26,325,042 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,594 writing to cptra_bootfsm_go
3,760,890 ready_for_fw is high
3,761,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,949,859 >>> mbox cmd response: success
14,950,705 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,198,706 UART:
19,199,102 UART: Running Caliptra FMC ...
19,200,249 UART:
19,200,413 UART: [state] CFI Enabled
19,208,490 UART: [fht] FMC Alias Private Key: 7
20,964,835 UART: [art] Extend RT PCRs Done
20,966,054 UART: [art] Lock RT PCRs Done
20,967,679 UART: [art] Populate DV Done
20,973,072 UART: [fht] FMC Alias Private Key: 7
20,974,732 UART: [art] Derive CDI
20,975,551 UART: [art] Store in in slot 0x4
21,017,870 UART: [art] Derive Key Pair
21,018,868 UART: [art] Store priv key in slot 0x5
23,445,238 UART: [art] Derive Key Pair - Done
23,458,285 UART: [art] Signing Cert with AUTHO
23,459,638 UART: RITY.KEYID = 7
25,165,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,189 UART: [art] PUB.X = C142084430F1A4BADD6778EA48F2C59721100157513CB689B93372057168F7D761BFE5DFA4651E59C8A556C337842087
25,174,431 UART: [art] PUB.Y = 23FD57DE895AE7259A029B7C09E0BC2C22F22AD4B2B38940798FD25E810AC87D0840EEB9A3EFEC29F23D2B4FAA304E60
25,181,714 UART: [art] SIG.R = A2AD667710C84F99D52A819F9A4FF55CAD96233823B9EBED7269F168B9EC4F043E72439D89DA1034485D7B4D5C972166
25,189,108 UART: [art] SIG.S = 7E1F995BFFC7F2B7880B0D9F7D2D28302A5704672C9B52CA0E59F21566EAADCE3423CDE26C804595B444120DAA7287E6
26,168,548 UART: Caliptra RT
26,169,261 UART: [state] CFI Enabled
26,286,375 UART: [rt] RT listening for mailbox commands...
26,318,107 UART: [rt]cmd =0x54514754, len=24
26,320,474 >>> mbox cmd response data (8 bytes)
26,320,896 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,350,511 UART: [rt]cmd =0x47544744, len=8
26,353,471 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,285 UART: [kat] SHA2-256
882,216 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,331 UART: [kat] ++
886,483 UART: [kat] sha1
890,597 UART: [kat] SHA2-256
892,535 UART: [kat] SHA2-384
895,318 UART: [kat] SHA2-512-ACC
897,219 UART: [kat] ECC-384
903,022 UART: [kat] HMAC-384Kdf
907,610 UART: [kat] LMS
1,475,806 UART: [kat] --
1,476,571 UART: [cold-reset] ++
1,477,057 UART: [fht] Storing FHT @ 0x50003400
1,479,732 UART: [idev] ++
1,479,900 UART: [idev] CDI.KEYID = 6
1,480,260 UART: [idev] SUBJECT.KEYID = 7
1,480,684 UART: [idev] UDS.KEYID = 0
1,481,029 ready_for_fw is high
1,481,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,462 UART: [idev] Erasing UDS.KEYID = 0
1,505,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,042 UART: [idev] --
1,515,003 UART: [ldev] ++
1,515,171 UART: [ldev] CDI.KEYID = 6
1,515,534 UART: [ldev] SUBJECT.KEYID = 5
1,515,960 UART: [ldev] AUTHORITY.KEYID = 7
1,516,423 UART: [ldev] FE.KEYID = 1
1,521,363 UART: [ldev] Erasing FE.KEYID = 1
1,546,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,138 UART: [ldev] --
1,585,539 UART: [fwproc] Waiting for Commands...
1,586,208 UART: [fwproc] Received command 0x46574c44
1,586,999 UART: [fwproc] Received Image of size 114168 bytes
2,883,829 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,803 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,774 >>> mbox cmd response: success
3,076,774 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,828 UART: [afmc] ++
3,077,996 UART: [afmc] CDI.KEYID = 6
3,078,358 UART: [afmc] SUBJECT.KEYID = 7
3,078,783 UART: [afmc] AUTHORITY.KEYID = 5
3,113,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,470 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,250 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,978 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,863 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,553 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,616 UART: [afmc] --
3,156,694 UART: [cold-reset] --
3,157,820 UART: [state] Locking Datavault
3,159,073 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,677 UART: [state] Locking ICCM
3,160,161 UART: [exit] Launching FMC @ 0x40000130
3,165,490 UART:
3,165,506 UART: Running Caliptra FMC ...
3,165,914 UART:
3,165,968 UART: [state] CFI Enabled
3,176,545 UART: [fht] FMC Alias Private Key: 7
3,284,316 UART: [art] Extend RT PCRs Done
3,284,744 UART: [art] Lock RT PCRs Done
3,286,138 UART: [art] Populate DV Done
3,294,433 UART: [fht] FMC Alias Private Key: 7
3,295,535 UART: [art] Derive CDI
3,295,815 UART: [art] Store in in slot 0x4
3,381,080 UART: [art] Derive Key Pair
3,381,440 UART: [art] Store priv key in slot 0x5
3,394,252 UART: [art] Derive Key Pair - Done
3,409,141 UART: [art] Signing Cert with AUTHO
3,409,621 UART: RITY.KEYID = 7
3,424,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,610 UART: [art] PUB.X = 81A3B443624B9D0F44989616D8DC9C17E17E2DC96832BBB97A0471CDB690E15DA6F4D901A870034EAA175511210275D3
3,432,363 UART: [art] PUB.Y = E1D291BE704BDBA2F3EAE80083D2B29C1D426ECD2F2EBE51C47D0FE81CE82B73E9B9765D50F6CB1C00B34D0C9C4CDBD2
3,439,291 UART: [art] SIG.R = F65563DF7540936422FB9F15166C334F3FC3E50E6426139B4B237DEBED109D2734D2EC11EF4C4DCD8FBA10D71879693A
3,446,064 UART: [art] SIG.S = 566E0091988AC796F37FFA6F2F49F6CB4A9F52FB9FEBC989397CFDFCC552AF097BAE1AD2A00E5CA2AAE42704DCF68D8B
3,469,420 UART: Caliptra RT
3,469,673 UART: [state] CFI Enabled
3,577,078 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,572 UART: [rt]cmd =0x54514754, len=24
3,609,687 >>> mbox cmd response data (8 bytes)
3,609,688 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,077 UART: [rt]cmd =0x47544744, len=8
3,641,461 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,839 ready_for_fw is high
1,362,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,092 >>> mbox cmd response: success
2,927,092 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,728 UART:
2,989,744 UART: Running Caliptra FMC ...
2,990,152 UART:
2,990,206 UART: [state] CFI Enabled
3,000,899 UART: [fht] FMC Alias Private Key: 7
3,108,580 UART: [art] Extend RT PCRs Done
3,109,008 UART: [art] Lock RT PCRs Done
3,110,404 UART: [art] Populate DV Done
3,118,469 UART: [fht] FMC Alias Private Key: 7
3,119,431 UART: [art] Derive CDI
3,119,711 UART: [art] Store in in slot 0x4
3,205,576 UART: [art] Derive Key Pair
3,205,936 UART: [art] Store priv key in slot 0x5
3,219,344 UART: [art] Derive Key Pair - Done
3,234,352 UART: [art] Signing Cert with AUTHO
3,234,832 UART: RITY.KEYID = 7
3,250,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,115 UART: [art] PUB.X = 7C66FF60D0779F905352E234682B97B9C08AB5F1AA06A5932232A90DF8D3168902D96FB3806C3ABADCCF9870260085DE
3,257,856 UART: [art] PUB.Y = 3D1177B6BEDE542B17FC57B4B06F1D3D9327BDB298FF8431CDD85AB868FB3C98DFCE3D180FBE86406F792EC978630770
3,264,814 UART: [art] SIG.R = F2AFF2CB21174F1547E4FBD3919967EF43A62B879DEFA86B2F79D83C09A8653D21FE956682F4A3AD5D7810A739CABDA5
3,271,595 UART: [art] SIG.S = 3BB5BD506CF0A60211FED852D3A5C7B06D96068B54CC650C9DA2C5F75C866E9D0E31D93C58C977AA57BF95CE3740B151
3,295,596 UART: Caliptra RT
3,295,849 UART: [state] CFI Enabled
3,404,724 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,190 UART: [rt]cmd =0x54514754, len=24
3,437,531 >>> mbox cmd response data (8 bytes)
3,437,532 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,779 UART: [rt]cmd =0x47544744, len=8
3,469,203 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,098 UART: [kat] SHA2-256
882,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,144 UART: [kat] ++
886,296 UART: [kat] sha1
890,588 UART: [kat] SHA2-256
892,526 UART: [kat] SHA2-384
895,361 UART: [kat] SHA2-512-ACC
897,262 UART: [kat] ECC-384
902,901 UART: [kat] HMAC-384Kdf
907,429 UART: [kat] LMS
1,475,625 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,946 UART: [fht] Storing FHT @ 0x50003400
1,479,717 UART: [idev] ++
1,479,885 UART: [idev] CDI.KEYID = 6
1,480,245 UART: [idev] SUBJECT.KEYID = 7
1,480,669 UART: [idev] UDS.KEYID = 0
1,481,014 ready_for_fw is high
1,481,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,311 UART: [idev] Erasing UDS.KEYID = 0
1,504,933 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,643 UART: [idev] --
1,514,664 UART: [ldev] ++
1,514,832 UART: [ldev] CDI.KEYID = 6
1,515,195 UART: [ldev] SUBJECT.KEYID = 5
1,515,621 UART: [ldev] AUTHORITY.KEYID = 7
1,516,084 UART: [ldev] FE.KEYID = 1
1,521,542 UART: [ldev] Erasing FE.KEYID = 1
1,547,139 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,915 UART: [ldev] --
1,586,404 UART: [fwproc] Waiting for Commands...
1,587,103 UART: [fwproc] Received command 0x46574c44
1,587,894 UART: [fwproc] Received Image of size 114168 bytes
2,884,226 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,643 >>> mbox cmd response: success
3,076,643 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,659 UART: [afmc] ++
3,077,827 UART: [afmc] CDI.KEYID = 6
3,078,189 UART: [afmc] SUBJECT.KEYID = 7
3,078,614 UART: [afmc] AUTHORITY.KEYID = 5
3,113,813 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,362 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,052 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,899 UART: [afmc] --
3,156,841 UART: [cold-reset] --
3,157,747 UART: [state] Locking Datavault
3,158,968 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,572 UART: [state] Locking ICCM
3,160,028 UART: [exit] Launching FMC @ 0x40000130
3,165,357 UART:
3,165,373 UART: Running Caliptra FMC ...
3,165,781 UART:
3,165,924 UART: [state] CFI Enabled
3,176,339 UART: [fht] FMC Alias Private Key: 7
3,284,488 UART: [art] Extend RT PCRs Done
3,284,916 UART: [art] Lock RT PCRs Done
3,286,160 UART: [art] Populate DV Done
3,294,161 UART: [fht] FMC Alias Private Key: 7
3,295,329 UART: [art] Derive CDI
3,295,609 UART: [art] Store in in slot 0x4
3,381,270 UART: [art] Derive Key Pair
3,381,630 UART: [art] Store priv key in slot 0x5
3,395,094 UART: [art] Derive Key Pair - Done
3,410,025 UART: [art] Signing Cert with AUTHO
3,410,505 UART: RITY.KEYID = 7
3,425,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,282 UART: [art] PUB.X = 751293184271DD01CA515F65953898E5843DABB83FCDD7246508A3125718B9AAF4F6DEB278F65E09E2FBAB4E113D2B06
3,433,044 UART: [art] PUB.Y = CDD1FA56FAF4D337F5840AAF573F26D1320AF66430231295CF53931EAE3267C9C10A51C263CBCDA7C8F6A292E8A837A4
3,439,997 UART: [art] SIG.R = AF67B615F3878550F1FB88DFCDC25F2733E03D1439597335800E39A31C3A911388C99264F9CBC6ED4B5974C2ABC50453
3,446,761 UART: [art] SIG.S = CC6E53C6E5585AB4091915A6A93070551E762F8D46AE018988A1924AA1D3E771AB179E38DC1739C70ABD9BACAEB4C2A0
3,470,897 UART: Caliptra RT
3,471,242 UART: [state] CFI Enabled
3,580,330 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,234 UART: [rt]cmd =0x54514754, len=24
3,613,163 >>> mbox cmd response data (8 bytes)
3,613,164 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,767 UART: [rt]cmd =0x47544744, len=8
3,645,397 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 ready_for_fw is high
1,362,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,665 >>> mbox cmd response: success
2,925,665 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,986,751 UART:
2,986,767 UART: Running Caliptra FMC ...
2,987,175 UART:
2,987,318 UART: [state] CFI Enabled
2,998,167 UART: [fht] FMC Alias Private Key: 7
3,106,340 UART: [art] Extend RT PCRs Done
3,106,768 UART: [art] Lock RT PCRs Done
3,108,404 UART: [art] Populate DV Done
3,116,773 UART: [fht] FMC Alias Private Key: 7
3,117,907 UART: [art] Derive CDI
3,118,187 UART: [art] Store in in slot 0x4
3,203,892 UART: [art] Derive Key Pair
3,204,252 UART: [art] Store priv key in slot 0x5
3,217,586 UART: [art] Derive Key Pair - Done
3,232,399 UART: [art] Signing Cert with AUTHO
3,232,879 UART: RITY.KEYID = 7
3,247,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,594 UART: [art] PUB.X = D8F879144668886F24C5025E5235A355AC35A9ED1C283237B6178F0CF0687B9F459FA0BB244B6EB5DB254C5C326115F7
3,255,356 UART: [art] PUB.Y = 91B023DE4794DBCA64A06B6C42D7C741C7FCAE92CCA3A234D95DE14F1BC8CF3254C49F827D20738F3AE550C04D411D01
3,262,317 UART: [art] SIG.R = B0A39BE94FBBE0FB9EF3E0AAF17D18C018F8BA14A084C52DA4DFA978819D1825398D282077A26CB1522C0B6A1351FD75
3,269,098 UART: [art] SIG.S = 75084C7EA19FF5B0FFA6F5A2BA49BC26116592D16431C49487469A9875C97B00A7F37515B7F00C3FB7CE93A5B2DD74D4
3,293,137 UART: Caliptra RT
3,293,482 UART: [state] CFI Enabled
3,402,249 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,943 UART: [rt]cmd =0x54514754, len=24
3,435,248 >>> mbox cmd response data (8 bytes)
3,435,249 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,446 UART: [rt]cmd =0x47544744, len=8
3,467,190 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,742 UART: [state] LifecycleState = Unprovisioned
86,397 UART: [state] DebugLocked = No
86,943 UART: [state] WD Timer not started. Device not locked for debugging
88,302 UART: [kat] SHA2-256
893,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,077 UART: [kat] ++
898,229 UART: [kat] sha1
902,471 UART: [kat] SHA2-256
904,411 UART: [kat] SHA2-384
907,328 UART: [kat] SHA2-512-ACC
909,229 UART: [kat] ECC-384
918,558 UART: [kat] HMAC-384Kdf
923,210 UART: [kat] LMS
1,171,538 UART: [kat] --
1,172,059 UART: [cold-reset] ++
1,172,459 UART: [fht] FHT @ 0x50003400
1,175,334 UART: [idev] ++
1,175,502 UART: [idev] CDI.KEYID = 6
1,175,862 UART: [idev] SUBJECT.KEYID = 7
1,176,286 UART: [idev] UDS.KEYID = 0
1,176,631 ready_for_fw is high
1,176,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,160 UART: [idev] Erasing UDS.KEYID = 0
1,201,111 UART: [idev] Sha1 KeyId Algorithm
1,209,507 UART: [idev] --
1,210,615 UART: [ldev] ++
1,210,783 UART: [ldev] CDI.KEYID = 6
1,211,146 UART: [ldev] SUBJECT.KEYID = 5
1,211,572 UART: [ldev] AUTHORITY.KEYID = 7
1,212,035 UART: [ldev] FE.KEYID = 1
1,217,207 UART: [ldev] Erasing FE.KEYID = 1
1,243,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,535 UART: [ldev] --
1,283,006 UART: [fwproc] Wait for Commands...
1,283,626 UART: [fwproc] Recv command 0x46574c44
1,284,354 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,719 >>> mbox cmd response: success
2,773,719 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,851 UART: [afmc] ++
2,775,019 UART: [afmc] CDI.KEYID = 6
2,775,381 UART: [afmc] SUBJECT.KEYID = 7
2,775,806 UART: [afmc] AUTHORITY.KEYID = 5
2,811,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,338 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,066 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,951 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,670 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,536 UART: [afmc] --
2,854,566 UART: [cold-reset] --
2,855,450 UART: [state] Locking Datavault
2,856,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,113 UART: [state] Locking ICCM
2,857,729 UART: [exit] Launching FMC @ 0x40000130
2,863,058 UART:
2,863,074 UART: Running Caliptra FMC ...
2,863,482 UART:
2,863,536 UART: [state] CFI Enabled
2,873,641 UART: [fht] FMC Alias Private Key: 7
2,981,752 UART: [art] Extend RT PCRs Done
2,982,180 UART: [art] Lock RT PCRs Done
2,983,730 UART: [art] Populate DV Done
2,991,993 UART: [fht] FMC Alias Private Key: 7
2,993,063 UART: [art] Derive CDI
2,993,343 UART: [art] Store in in slot 0x4
3,079,160 UART: [art] Derive Key Pair
3,079,520 UART: [art] Store priv key in slot 0x5
3,092,892 UART: [art] Derive Key Pair - Done
3,107,571 UART: [art] Signing Cert with AUTHO
3,108,051 UART: RITY.KEYID = 7
3,123,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,926 UART: [art] PUB.X = A80B17A824E3609749AD5BD383D8CAB8E4F061D26961397394A9C5F468D6038D1E4168FFBF99E49B2D167133A24E2E64
3,130,690 UART: [art] PUB.Y = 965C34FBB402EAFBB50BF25B5EA27027AA5F9B3B746C47B80EE6B85CBF8D38BECB1B2342518BE93613FB6BCA5A9F2EA0
3,137,657 UART: [art] SIG.R = A61D313FDF1AE8A3EF966436B13F02A04F726644DB29D0F4491A7D4D4FD57EF96597CDACC5CB6F3285D926F5AD0D635B
3,144,437 UART: [art] SIG.S = 2D1BA3A092C33CD3E044E883FBCC770E8563E218CBCB56347C98B60EE4D4103FA91000F1FD6A461ADD2461A42AA3EE1F
3,168,256 UART: Caliptra RT
3,168,509 UART: [state] CFI Enabled
3,275,872 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,824 UART: [rt]cmd =0x54514754, len=24
3,308,897 >>> mbox cmd response data (8 bytes)
3,308,898 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,179 UART: [rt]cmd =0x47544744, len=8
3,340,973 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,200 >>> mbox cmd response: success
2,623,200 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,636 UART:
2,685,652 UART: Running Caliptra FMC ...
2,686,060 UART:
2,686,114 UART: [state] CFI Enabled
2,696,651 UART: [fht] FMC Alias Private Key: 7
2,804,158 UART: [art] Extend RT PCRs Done
2,804,586 UART: [art] Lock RT PCRs Done
2,805,910 UART: [art] Populate DV Done
2,814,065 UART: [fht] FMC Alias Private Key: 7
2,815,103 UART: [art] Derive CDI
2,815,383 UART: [art] Store in in slot 0x4
2,901,042 UART: [art] Derive Key Pair
2,901,402 UART: [art] Store priv key in slot 0x5
2,914,120 UART: [art] Derive Key Pair - Done
2,928,937 UART: [art] Signing Cert with AUTHO
2,929,417 UART: RITY.KEYID = 7
2,944,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,688 UART: [art] PUB.X = 054DB336D950A733760187E5AF0BB7E1949B9BC87FEC9ECB70545B41319AFF33F5B9D336729758DED1CB14495CAE6047
2,952,455 UART: [art] PUB.Y = 9EB5264C0234F83AF1211B63428AFA310E67B6917E46F80B8755BDA40EF56721EB992CDC0713B2500F934677B01263C1
2,959,383 UART: [art] SIG.R = 65B0FD07C1EA7C9FCD01BDF09218E27953F3B88A5BCE970DF24605F87B29D19DA68E432BFB07F2CD5BC3F8584A2EEE66
2,966,158 UART: [art] SIG.S = 8DB9126857B8A3FBD4DA7AF39FFF2C4B30492DB1F06ECD0EF1BA627F7D3D315D9C327DE946BF477025AB7966672A7E35
2,989,996 UART: Caliptra RT
2,990,249 UART: [state] CFI Enabled
3,097,674 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,532 UART: [rt]cmd =0x54514754, len=24
3,130,765 >>> mbox cmd response data (8 bytes)
3,130,766 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,259 UART: [rt]cmd =0x47544744, len=8
3,162,901 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
893,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,670 UART: [kat] ++
897,822 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
918,287 UART: [kat] HMAC-384Kdf
922,835 UART: [kat] LMS
1,171,163 UART: [kat] --
1,172,338 UART: [cold-reset] ++
1,172,880 UART: [fht] FHT @ 0x50003400
1,175,333 UART: [idev] ++
1,175,501 UART: [idev] CDI.KEYID = 6
1,175,861 UART: [idev] SUBJECT.KEYID = 7
1,176,285 UART: [idev] UDS.KEYID = 0
1,176,630 ready_for_fw is high
1,176,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,427 UART: [idev] Erasing UDS.KEYID = 0
1,201,446 UART: [idev] Sha1 KeyId Algorithm
1,210,084 UART: [idev] --
1,211,000 UART: [ldev] ++
1,211,168 UART: [ldev] CDI.KEYID = 6
1,211,531 UART: [ldev] SUBJECT.KEYID = 5
1,211,957 UART: [ldev] AUTHORITY.KEYID = 7
1,212,420 UART: [ldev] FE.KEYID = 1
1,217,548 UART: [ldev] Erasing FE.KEYID = 1
1,244,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,090 UART: [ldev] --
1,283,425 UART: [fwproc] Wait for Commands...
1,284,043 UART: [fwproc] Recv command 0x46574c44
1,284,771 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,020 >>> mbox cmd response: success
2,773,020 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,282 UART: [afmc] ++
2,774,450 UART: [afmc] CDI.KEYID = 6
2,774,812 UART: [afmc] SUBJECT.KEYID = 7
2,775,237 UART: [afmc] AUTHORITY.KEYID = 5
2,811,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,347 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,075 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,960 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,679 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,701 UART: [afmc] --
2,854,685 UART: [cold-reset] --
2,855,699 UART: [state] Locking Datavault
2,856,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,582 UART: [state] Locking ICCM
2,858,212 UART: [exit] Launching FMC @ 0x40000130
2,863,541 UART:
2,863,557 UART: Running Caliptra FMC ...
2,863,965 UART:
2,864,108 UART: [state] CFI Enabled
2,874,607 UART: [fht] FMC Alias Private Key: 7
2,982,848 UART: [art] Extend RT PCRs Done
2,983,276 UART: [art] Lock RT PCRs Done
2,985,030 UART: [art] Populate DV Done
2,993,173 UART: [fht] FMC Alias Private Key: 7
2,994,161 UART: [art] Derive CDI
2,994,441 UART: [art] Store in in slot 0x4
3,080,080 UART: [art] Derive Key Pair
3,080,440 UART: [art] Store priv key in slot 0x5
3,094,084 UART: [art] Derive Key Pair - Done
3,108,866 UART: [art] Signing Cert with AUTHO
3,109,346 UART: RITY.KEYID = 7
3,124,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,923 UART: [art] PUB.X = 702DF2F7A5CDBC74601CB364070CF9DA230200FF14817E212331181BB75CB7F62E80F2C0593FD3848244BF716EF02CA9
3,131,666 UART: [art] PUB.Y = AB44D6381BA5B40C919E5F72EFFECA8AEF31844015809BBF0BF07B96208B6BB4D8BA218309B0411D4209F095AAF99848
3,138,614 UART: [art] SIG.R = 7EE1F3DDD9163DB8B54187CA833D30AF07620538D82F0961289DFB818F1529D5494D295068EB898E2F4C73084A2ECFE6
3,145,374 UART: [art] SIG.S = A3F29736E59B9E27DF8E7035D3E48221B5DEA4CDEB638CAF9C57228C3D3A8B05A299E75C30F2AB77E32ED88C62F03951
3,169,052 UART: Caliptra RT
3,169,397 UART: [state] CFI Enabled
3,277,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,054 UART: [rt]cmd =0x54514754, len=24
3,310,107 >>> mbox cmd response data (8 bytes)
3,310,108 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,673 UART: [rt]cmd =0x47544744, len=8
3,342,401 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,164 ready_for_fw is high
1,060,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,947 >>> mbox cmd response: success
2,622,947 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,684,485 UART:
2,684,501 UART: Running Caliptra FMC ...
2,684,909 UART:
2,685,052 UART: [state] CFI Enabled
2,695,765 UART: [fht] FMC Alias Private Key: 7
2,803,330 UART: [art] Extend RT PCRs Done
2,803,758 UART: [art] Lock RT PCRs Done
2,805,424 UART: [art] Populate DV Done
2,813,461 UART: [fht] FMC Alias Private Key: 7
2,814,579 UART: [art] Derive CDI
2,814,859 UART: [art] Store in in slot 0x4
2,900,494 UART: [art] Derive Key Pair
2,900,854 UART: [art] Store priv key in slot 0x5
2,914,608 UART: [art] Derive Key Pair - Done
2,928,945 UART: [art] Signing Cert with AUTHO
2,929,425 UART: RITY.KEYID = 7
2,944,505 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,270 UART: [art] PUB.X = F423550314C7B894282011A0F3AE84EF9F890C974C5E6B4FB163EE487F9D97431C5A53BEB20B0BCE9535636FF0C4CC9D
2,952,036 UART: [art] PUB.Y = D57EAA8AE4DCE0FB84ADA625C8698B25BE4EC652CE91F04890095CCAD44031BE17FB63000FCB061E274ECCFD3B2A5F5F
2,958,981 UART: [art] SIG.R = E45CB473B51B5E732154FC60E41701634CB6719FAE1DA272085DE801414062751BCD98EE357772B178AA1CCCABE215C3
2,965,746 UART: [art] SIG.S = 905316FF57ED60B89E570AFAC7D806BF2BAE0296A006EA60F24DBB077008C55F246400E44DC071F1A5F35F0CDE199D93
2,989,308 UART: Caliptra RT
2,989,653 UART: [state] CFI Enabled
3,096,947 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,765 UART: [rt]cmd =0x54514754, len=24
3,129,832 >>> mbox cmd response data (8 bytes)
3,129,833 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,114 UART: [rt]cmd =0x47544744, len=8
3,161,682 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,882 UART: [kat] SHA2-512-ACC
906,783 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,720 UART: [kat] LMS
1,169,032 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,174,399 ready_for_fw is high
1,174,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,331 UART: [idev] Erasing UDS.KEYID = 0
1,199,251 UART: [idev] Sha1 KeyId Algorithm
1,208,023 UART: [idev] --
1,209,168 UART: [ldev] ++
1,209,336 UART: [ldev] CDI.KEYID = 6
1,209,700 UART: [ldev] SUBJECT.KEYID = 5
1,210,127 UART: [ldev] AUTHORITY.KEYID = 7
1,210,590 UART: [ldev] FE.KEYID = 1
1,215,650 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,888 UART: [ldev] --
1,281,404 UART: [fwproc] Wait for Commands...
1,282,155 UART: [fwproc] Recv command 0x46574c44
1,282,888 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,935 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,619 >>> mbox cmd response: success
2,769,619 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,770,736 UART: [afmc] ++
2,770,904 UART: [afmc] CDI.KEYID = 6
2,771,267 UART: [afmc] SUBJECT.KEYID = 7
2,771,693 UART: [afmc] AUTHORITY.KEYID = 5
2,807,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,015 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,627 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,346 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,247 UART: [afmc] --
2,851,337 UART: [cold-reset] --
2,852,105 UART: [state] Locking Datavault
2,853,372 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,976 UART: [state] Locking ICCM
2,854,508 UART: [exit] Launching FMC @ 0x40000130
2,859,837 UART:
2,859,853 UART: Running Caliptra FMC ...
2,860,261 UART:
2,860,315 UART: [state] CFI Enabled
2,870,910 UART: [fht] FMC Alias Private Key: 7
2,979,723 UART: [art] Extend RT PCRs Done
2,980,151 UART: [art] Lock RT PCRs Done
2,981,953 UART: [art] Populate DV Done
2,990,004 UART: [fht] FMC Alias Private Key: 7
2,991,084 UART: [art] Derive CDI
2,991,364 UART: [art] Store in in slot 0x4
3,077,201 UART: [art] Derive Key Pair
3,077,561 UART: [art] Store priv key in slot 0x5
3,090,451 UART: [art] Derive Key Pair - Done
3,105,253 UART: [art] Signing Cert with AUTHO
3,105,733 UART: RITY.KEYID = 7
3,121,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,872 UART: [art] PUB.X = 9CBCC699DA7105F04454F4B0E24BA91489BFF2C5F625A5CDE201A45742C83D8E2FA7A20BAD977DCDE011914FAF450F39
3,128,646 UART: [art] PUB.Y = 50E2A9380E4871BC1BB1CC11BF6000940A33391C73F40FA23F1FD44AFC8C4BB00E9919CB60BD2F615DF8E0FB824BFEE3
3,135,580 UART: [art] SIG.R = 216D1A0DA5A75731E0A39FDF64AF003F38C3E9814033106E000D6C1AFCE26190487B6F5E65E250A05234EB18056A1957
3,142,295 UART: [art] SIG.S = 100972E3201208843CDF2EBBFB27E5CD5F1DDEE2359AFA4D47A206ADD30A7A551C59B7356D775018B71E06E6C640FF48
3,165,731 UART: Caliptra RT
3,165,984 UART: [state] CFI Enabled
3,273,385 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,009 UART: [rt]cmd =0x54514754, len=24
3,306,220 >>> mbox cmd response data (8 bytes)
3,306,221 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,776 UART: [rt]cmd =0x47544744, len=8
3,338,386 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,484 ready_for_fw is high
1,055,484 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,345 >>> mbox cmd response: success
2,618,345 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,680,013 UART:
2,680,029 UART: Running Caliptra FMC ...
2,680,437 UART:
2,680,491 UART: [state] CFI Enabled
2,690,894 UART: [fht] FMC Alias Private Key: 7
2,798,787 UART: [art] Extend RT PCRs Done
2,799,215 UART: [art] Lock RT PCRs Done
2,800,695 UART: [art] Populate DV Done
2,808,854 UART: [fht] FMC Alias Private Key: 7
2,809,986 UART: [art] Derive CDI
2,810,266 UART: [art] Store in in slot 0x4
2,895,761 UART: [art] Derive Key Pair
2,896,121 UART: [art] Store priv key in slot 0x5
2,909,239 UART: [art] Derive Key Pair - Done
2,923,995 UART: [art] Signing Cert with AUTHO
2,924,475 UART: RITY.KEYID = 7
2,939,653 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,418 UART: [art] PUB.X = 3A2137D639210EFDF9DA3AD7CEEA845FF0E6CCA41366405BA4EB1C9B434A154503088B15D95BE3CE4B4EDF0B3E22BE91
2,947,196 UART: [art] PUB.Y = F9330E52920ABC6A88A15B136D96DC72A033DB019C77F6F0E38D8646A0144B3D42BF233D625675FE29FC03D0ACB39D90
2,954,140 UART: [art] SIG.R = D5CF8A005C7E98DD49742CF7689921571B60EF53345B459EDEE5F68C99B53B728776D7210B4954416732C84865DB90FD
2,960,881 UART: [art] SIG.S = 63FEC4ACAEFEFB76DC20653B4DAADE10DFF7FFEB1EF392FF9642606B29D19BD773198E03E879CB9C7457D10767E8DCFE
2,985,254 UART: Caliptra RT
2,985,507 UART: [state] CFI Enabled
3,093,228 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,123,836 UART: [rt]cmd =0x54514754, len=24
3,125,869 >>> mbox cmd response data (8 bytes)
3,125,870 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,155,177 UART: [rt]cmd =0x47544744, len=8
3,157,587 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
891,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,170,286 UART: [cold-reset] ++
1,170,778 UART: [fht] FHT @ 0x50003400
1,173,458 UART: [idev] ++
1,173,626 UART: [idev] CDI.KEYID = 6
1,173,987 UART: [idev] SUBJECT.KEYID = 7
1,174,412 UART: [idev] UDS.KEYID = 0
1,174,758 ready_for_fw is high
1,174,758 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,572 UART: [idev] Sha1 KeyId Algorithm
1,208,482 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,031 UART: [ldev] Erasing FE.KEYID = 1
1,241,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,151 UART: [ldev] --
1,281,459 UART: [fwproc] Wait for Commands...
1,282,244 UART: [fwproc] Recv command 0x46574c44
1,282,977 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,648 >>> mbox cmd response: success
2,770,648 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,813 UART: [afmc] ++
2,771,981 UART: [afmc] CDI.KEYID = 6
2,772,344 UART: [afmc] SUBJECT.KEYID = 7
2,772,770 UART: [afmc] AUTHORITY.KEYID = 5
2,807,809 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,268 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,880 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,599 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,444 UART: [afmc] --
2,851,534 UART: [cold-reset] --
2,852,452 UART: [state] Locking Datavault
2,853,605 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,209 UART: [state] Locking ICCM
2,854,663 UART: [exit] Launching FMC @ 0x40000130
2,859,992 UART:
2,860,008 UART: Running Caliptra FMC ...
2,860,416 UART:
2,860,559 UART: [state] CFI Enabled
2,871,548 UART: [fht] FMC Alias Private Key: 7
2,979,287 UART: [art] Extend RT PCRs Done
2,979,715 UART: [art] Lock RT PCRs Done
2,981,315 UART: [art] Populate DV Done
2,989,710 UART: [fht] FMC Alias Private Key: 7
2,990,648 UART: [art] Derive CDI
2,990,928 UART: [art] Store in in slot 0x4
3,076,451 UART: [art] Derive Key Pair
3,076,811 UART: [art] Store priv key in slot 0x5
3,090,193 UART: [art] Derive Key Pair - Done
3,104,980 UART: [art] Signing Cert with AUTHO
3,105,460 UART: RITY.KEYID = 7
3,120,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,609 UART: [art] PUB.X = F69F6B9D348E4E4114FFAC470A7DFDF91CAE734C655226E8D0B6782E9C4D4101FD86BC4E946948365ED63AB71458D978
3,128,381 UART: [art] PUB.Y = 4005616EA1047563AA126DCDAC7D6E3DBFA11AA5DFDBC6ED7028C31402D49831F81A35165B17CD9B3D8100DE8179A56A
3,135,312 UART: [art] SIG.R = 05A14E6830417B5B2073B9B71489C145FDEA01DC1890EAA374C92C948572468B655EDEC39FD2C3A9EE71BA5C1B810714
3,142,077 UART: [art] SIG.S = 6A8F9E4230FB6B03016B74ACE2DF50E43DD847B2A94761FD0D9CD2611810B67E81722BE22D26F40C5A9B77EA0164FCEF
3,165,845 UART: Caliptra RT
3,166,190 UART: [state] CFI Enabled
3,274,121 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,815 UART: [rt]cmd =0x54514754, len=24
3,306,978 >>> mbox cmd response data (8 bytes)
3,306,979 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,172 UART: [rt]cmd =0x47544744, len=8
3,339,058 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,627 ready_for_fw is high
1,056,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,636 >>> mbox cmd response: success
2,620,636 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,176 UART:
2,683,192 UART: Running Caliptra FMC ...
2,683,600 UART:
2,683,743 UART: [state] CFI Enabled
2,694,246 UART: [fht] FMC Alias Private Key: 7
2,801,855 UART: [art] Extend RT PCRs Done
2,802,283 UART: [art] Lock RT PCRs Done
2,803,607 UART: [art] Populate DV Done
2,812,006 UART: [fht] FMC Alias Private Key: 7
2,813,028 UART: [art] Derive CDI
2,813,308 UART: [art] Store in in slot 0x4
2,899,103 UART: [art] Derive Key Pair
2,899,463 UART: [art] Store priv key in slot 0x5
2,912,667 UART: [art] Derive Key Pair - Done
2,927,261 UART: [art] Signing Cert with AUTHO
2,927,741 UART: RITY.KEYID = 7
2,942,801 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,566 UART: [art] PUB.X = 330D5009DBDDE025B4F5883BCD9F8E0BD8641CC0F79B7932401CDC9C114E67349A61D4B217C652257346556BFF4F8BC0
2,950,333 UART: [art] PUB.Y = F0A1B2C0746CF70F41C4727016FF0AF34B9802F11C680DF21D4E938AE599B9CC1D3A10118FE8B582CD92E9BD2CB3694F
2,957,283 UART: [art] SIG.R = B8FAFE966F3F12221298DA99C4FF854BE63F35C1E2A4FB586D6C0AF2BDB806A99C402F94192FB4A4D24AA8FE927F3853
2,964,063 UART: [art] SIG.S = F866F84D1F4E02D997FEB39E9A5D15FC203BBFBA5511A6619F88CB37AA7FF7B3B7E80F2449D7A9E8B0BD3646B560BC47
2,987,816 UART: Caliptra RT
2,988,161 UART: [state] CFI Enabled
3,097,115 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,871 UART: [rt]cmd =0x54514754, len=24
3,130,016 >>> mbox cmd response data (8 bytes)
3,130,017 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,159,594 UART: [rt]cmd =0x47544744, len=8
3,162,302 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
191,985 UART:
192,379 UART: Running Caliptra ROM ...
193,550 UART:
193,699 UART: [state] CFI Enabled
265,317 UART: [state] LifecycleState = Unprovisioned
267,307 UART: [state] DebugLocked = No
269,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,405 UART: [kat] SHA2-256
445,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,636 UART: [kat] ++
456,093 UART: [kat] sha1
465,337 UART: [kat] SHA2-256
468,056 UART: [kat] SHA2-384
474,467 UART: [kat] SHA2-512-ACC
476,838 UART: [kat] ECC-384
2,768,064 UART: [kat] HMAC-384Kdf
2,799,627 UART: [kat] LMS
3,989,982 UART: [kat] --
3,995,055 UART: [cold-reset] ++
3,996,343 UART: [fht] Storing FHT @ 0x50003400
4,007,267 UART: [idev] ++
4,007,869 UART: [idev] CDI.KEYID = 6
4,008,799 UART: [idev] SUBJECT.KEYID = 7
4,010,043 UART: [idev] UDS.KEYID = 0
4,011,097 ready_for_fw is high
4,011,323 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,454 UART: [idev] Erasing UDS.KEYID = 0
7,344,866 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,955 UART: [idev] --
7,371,187 UART: [ldev] ++
7,371,762 UART: [ldev] CDI.KEYID = 6
7,372,727 UART: [ldev] SUBJECT.KEYID = 5
7,373,930 UART: [ldev] AUTHORITY.KEYID = 7
7,375,154 UART: [ldev] FE.KEYID = 1
7,423,240 UART: [ldev] Erasing FE.KEYID = 1
10,757,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,841 UART: [ldev] --
13,137,620 UART: [fwproc] Waiting for Commands...
13,139,870 UART: [fwproc] Received command 0x46574c44
13,142,096 UART: [fwproc] Received Image of size 113844 bytes
17,188,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,299 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,648,493 >>> mbox cmd response: success
17,649,031 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,652,449 UART: [afmc] ++
17,653,114 UART: [afmc] CDI.KEYID = 6
17,653,995 UART: [afmc] SUBJECT.KEYID = 7
17,655,256 UART: [afmc] AUTHORITY.KEYID = 5
21,028,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,097 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,330,410 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,344,771 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,359,646 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,082 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,082 UART: [afmc] --
23,399,794 UART: [cold-reset] --
23,404,675 UART: [state] Locking Datavault
23,410,510 UART: [state] Locking PCR0, PCR1 and PCR31
23,412,250 UART: [state] Locking ICCM
23,413,963 UART: [exit] Launching FMC @ 0x40000130
23,422,363 UART:
23,422,615 UART: Running Caliptra FMC ...
23,423,710 UART:
23,423,861 UART: [state] CFI Enabled
23,489,582 UART: [fht] FMC Alias Private Key: 7
25,826,966 UART: [art] Extend RT PCRs Done
25,828,180 UART: [art] Lock RT PCRs Done
25,829,847 UART: [art] Populate DV Done
25,835,252 UART: [fht] FMC Alias Private Key: 7
25,836,836 UART: [art] Derive CDI
25,837,646 UART: [art] Store in in slot 0x4
25,897,712 UART: [art] Derive Key Pair
25,898,741 UART: [art] Store priv key in slot 0x5
29,191,200 UART: [art] Derive Key Pair - Done
29,204,190 UART: [art] Signing Cert with AUTHO
29,205,683 UART: RITY.KEYID = 7
31,492,602 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,138 UART: [art] PUB.X = 43D61B080925135C2050A4EBF74FD0E4C554230400FFB4477D051AA918EA9503C0585FC368849326B7ADA4CDA94D0E84
31,501,323 UART: [art] PUB.Y = 4E8160D2A9F69C61FBAD09CD42159E338B67460AF592FEEF890186D7BE7769C8DC9C2E9036F74EB1674F3029A087A37E
31,508,594 UART: [art] SIG.R = 5BFAB85C193CC079A16E234CB25666FC28DAF870C579C06A8A34D542B15BB89FDDBC91E08010C96C79E78613AF486B0F
31,515,983 UART: [art] SIG.S = FE6FBF32D513B1F967122C3E608F926E4CD7B21E0F4CE50BA1D82B363AD4A6BDCDD1630D18508E78B3AC412A39F63977
32,820,685 UART: Caliptra RT
32,821,402 UART: [state] CFI Enabled
32,982,235 UART: [rt] RT listening for mailbox commands...
33,013,709 UART: [rt]cmd =0x54514754, len=24
33,016,241 >>> mbox cmd response data (8 bytes)
33,017,175 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,047,382 UART: [rt]cmd =0x44504543, len=36
33,085,116 >>> mbox cmd response data (24 bytes)
33,085,771 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,115,544 UART: [rt]cmd =0x47544744, len=8
33,117,750 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,804,876 ready_for_fw is high
3,805,501 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,859,155 >>> mbox cmd response: success
17,859,886 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,548,086 UART:
23,548,535 UART: Running Caliptra FMC ...
23,549,642 UART:
23,549,801 UART: [state] CFI Enabled
23,619,516 UART: [fht] FMC Alias Private Key: 7
25,957,382 UART: [art] Extend RT PCRs Done
25,958,619 UART: [art] Lock RT PCRs Done
25,960,273 UART: [art] Populate DV Done
25,965,689 UART: [fht] FMC Alias Private Key: 7
25,967,295 UART: [art] Derive CDI
25,968,109 UART: [art] Store in in slot 0x4
26,029,503 UART: [art] Derive Key Pair
26,030,568 UART: [art] Store priv key in slot 0x5
29,323,607 UART: [art] Derive Key Pair - Done
29,336,842 UART: [art] Signing Cert with AUTHO
29,338,142 UART: RITY.KEYID = 7
31,624,721 UART: [art] Erasing AUTHORITY.KEYID = 7
31,626,221 UART: [art] PUB.X = 7B8851CDB85A90EF8966019A64D609D9EFF7AEE6ED2CE559A5737CD6ED03FCFD7F5D641CA469BC01387BA042232A3EB4
31,633,534 UART: [art] PUB.Y = FA37D57564241D6603CE5589985A592964007C7B3B49EBA64067DF830689192484710341B934B72083C7EB5D7314166E
31,640,654 UART: [art] SIG.R = 7EDC77E62821C32C516B432D898979D8C3567594C9D03C25197104DBE9F47BE5A6972F3B22F59BCF37D16994BEDDD182
31,648,048 UART: [art] SIG.S = 5D2AF2BD64AEF352A3515979DAC61F7F22D73F2294C393B4B345AEF3EF3FB4575577B252CC98811B6770EBD5BA0B7607
32,953,891 UART: Caliptra RT
32,954,614 UART: [state] CFI Enabled
33,116,175 UART: [rt] RT listening for mailbox commands...
33,147,744 UART: [rt]cmd =0x54514754, len=24
33,150,250 >>> mbox cmd response data (8 bytes)
33,151,105 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,181,473 UART: [rt]cmd =0x44504543, len=36
33,218,239 >>> mbox cmd response data (24 bytes)
33,218,861 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,248,573 UART: [rt]cmd =0x47544744, len=8
33,250,390 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,397 UART:
192,786 UART: Running Caliptra ROM ...
193,889 UART:
603,729 UART: [state] CFI Enabled
616,910 UART: [state] LifecycleState = Unprovisioned
618,856 UART: [state] DebugLocked = No
620,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,941 UART: [kat] SHA2-256
794,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,235 UART: [kat] ++
805,684 UART: [kat] sha1
816,130 UART: [kat] SHA2-256
818,782 UART: [kat] SHA2-384
825,480 UART: [kat] SHA2-512-ACC
827,873 UART: [kat] ECC-384
3,111,230 UART: [kat] HMAC-384Kdf
3,121,891 UART: [kat] LMS
4,311,993 UART: [kat] --
4,315,910 UART: [cold-reset] ++
4,316,988 UART: [fht] Storing FHT @ 0x50003400
4,326,978 UART: [idev] ++
4,327,545 UART: [idev] CDI.KEYID = 6
4,328,580 UART: [idev] SUBJECT.KEYID = 7
4,329,754 UART: [idev] UDS.KEYID = 0
4,330,753 ready_for_fw is high
4,330,973 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,474,396 UART: [idev] Erasing UDS.KEYID = 0
7,613,634 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,247 UART: [idev] --
7,639,276 UART: [ldev] ++
7,639,853 UART: [ldev] CDI.KEYID = 6
7,640,790 UART: [ldev] SUBJECT.KEYID = 5
7,642,008 UART: [ldev] AUTHORITY.KEYID = 7
7,643,314 UART: [ldev] FE.KEYID = 1
7,653,505 UART: [ldev] Erasing FE.KEYID = 1
10,942,045 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,041 UART: [ldev] --
13,303,168 UART: [fwproc] Waiting for Commands...
13,305,745 UART: [fwproc] Received command 0x46574c44
13,307,928 UART: [fwproc] Received Image of size 113844 bytes
17,359,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,430,191 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,499,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,815,671 >>> mbox cmd response: success
17,816,219 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,819,736 UART: [afmc] ++
17,820,334 UART: [afmc] CDI.KEYID = 6
17,821,219 UART: [afmc] SUBJECT.KEYID = 7
17,822,492 UART: [afmc] AUTHORITY.KEYID = 5
21,136,879 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,431,485 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,433,750 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,448,147 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,462,951 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,477,410 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,460 UART: [afmc] --
23,502,836 UART: [cold-reset] --
23,506,751 UART: [state] Locking Datavault
23,511,243 UART: [state] Locking PCR0, PCR1 and PCR31
23,512,999 UART: [state] Locking ICCM
23,514,448 UART: [exit] Launching FMC @ 0x40000130
23,522,807 UART:
23,523,047 UART: Running Caliptra FMC ...
23,524,150 UART:
23,524,310 UART: [state] CFI Enabled
23,532,300 UART: [fht] FMC Alias Private Key: 7
25,863,768 UART: [art] Extend RT PCRs Done
25,865,010 UART: [art] Lock RT PCRs Done
25,867,073 UART: [art] Populate DV Done
25,872,087 UART: [fht] FMC Alias Private Key: 7
25,873,793 UART: [art] Derive CDI
25,874,532 UART: [art] Store in in slot 0x4
25,917,120 UART: [art] Derive Key Pair
25,918,114 UART: [art] Store priv key in slot 0x5
29,160,822 UART: [art] Derive Key Pair - Done
29,173,543 UART: [art] Signing Cert with AUTHO
29,174,884 UART: RITY.KEYID = 7
31,454,107 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,618 UART: [art] PUB.X = 367CB1FE459CE67B1153AB4D37D3F987F4B447304F1FDF131FD0EE2B53DA9FF4B220CAC393CC02F4036F4B4A9037D489
31,462,822 UART: [art] PUB.Y = E3C0455B03E448360E7F700D82C45E48D70E20170E9D22324C67407C611AE7A96607F76E3E6CFDD50E453AA422D46DA5
31,470,076 UART: [art] SIG.R = F1F22D4D0C0EB89DE623F4ED2374865EF834824BCB6083A84597BC4C97B46E5001BE7F7EEE6AF3DADCFDB214E04D924D
31,477,505 UART: [art] SIG.S = 48089449576E795AE84CC7631D989234DCC6171FEE8E6322F9E8EEB75E46CD126DA2DE3A0F95DEFAC5118852F1642AFC
32,782,338 UART: Caliptra RT
32,783,044 UART: [state] CFI Enabled
32,900,862 UART: [rt] RT listening for mailbox commands...
32,932,479 UART: [rt]cmd =0x54514754, len=24
32,934,995 >>> mbox cmd response data (8 bytes)
32,936,036 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
32,966,138 UART: [rt]cmd =0x44504543, len=36
33,003,843 >>> mbox cmd response data (24 bytes)
33,004,541 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,034,264 UART: [rt]cmd =0x47544744, len=8
33,036,310 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,127,387 ready_for_fw is high
4,128,044 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,056,239 >>> mbox cmd response: success
18,056,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,698,254 UART:
23,698,660 UART: Running Caliptra FMC ...
23,699,776 UART:
23,699,929 UART: [state] CFI Enabled
23,707,994 UART: [fht] FMC Alias Private Key: 7
26,038,597 UART: [art] Extend RT PCRs Done
26,039,825 UART: [art] Lock RT PCRs Done
26,041,480 UART: [art] Populate DV Done
26,046,733 UART: [fht] FMC Alias Private Key: 7
26,048,240 UART: [art] Derive CDI
26,048,979 UART: [art] Store in in slot 0x4
26,091,474 UART: [art] Derive Key Pair
26,092,471 UART: [art] Store priv key in slot 0x5
29,335,059 UART: [art] Derive Key Pair - Done
29,347,733 UART: [art] Signing Cert with AUTHO
29,349,044 UART: RITY.KEYID = 7
31,628,667 UART: [art] Erasing AUTHORITY.KEYID = 7
31,630,433 UART: [art] PUB.X = 3D6436DE661EEA0F3675E4AD30CA21487B82244170547D91984B1F53CFEC0CA06839B79A03873C07355BD3AF319DB713
31,637,438 UART: [art] PUB.Y = 1E069C093A8EFC92D2BBBC3328F3DDA25E763ADF8E65882690589BAAF02ECD094AFCFD2B843F9EC6657795E61F57D701
31,644,640 UART: [art] SIG.R = 7F57322C8DB731AB40DC46AC46B686CAD48333096ACA455BABB5B48CFFF425BE3FF9EE145C9BE3A2E75443659B3B62C5
31,652,043 UART: [art] SIG.S = 9F5F20797D79D01E822FCE0538742D3A28B48A954C0AFD5B26EFF62A030AA8106BBD732C7E726FBF87A05BC7F3E584E0
32,957,175 UART: Caliptra RT
32,957,878 UART: [state] CFI Enabled
33,075,283 UART: [rt] RT listening for mailbox commands...
33,106,913 UART: [rt]cmd =0x54514754, len=24
33,109,735 >>> mbox cmd response data (8 bytes)
33,110,848 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,141,143 UART: [rt]cmd =0x44504543, len=36
33,177,772 >>> mbox cmd response data (24 bytes)
33,179,043 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,208,793 UART: [rt]cmd =0x47544744, len=8
33,210,601 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,163 UART:
192,522 UART: Running Caliptra ROM ...
193,716 UART:
193,871 UART: [state] CFI Enabled
262,174 UART: [state] LifecycleState = Unprovisioned
264,021 UART: [state] DebugLocked = No
265,349 UART: [state] WD Timer not started. Device not locked for debugging
269,247 UART: [kat] SHA2-256
448,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,953 UART: [kat] ++
460,499 UART: [kat] sha1
471,168 UART: [kat] SHA2-256
474,175 UART: [kat] SHA2-384
480,306 UART: [kat] SHA2-512-ACC
483,317 UART: [kat] ECC-384
2,946,741 UART: [kat] HMAC-384Kdf
2,969,216 UART: [kat] LMS
3,498,681 UART: [kat] --
3,503,125 UART: [cold-reset] ++
3,504,207 UART: [fht] FHT @ 0x50003400
3,514,049 UART: [idev] ++
3,514,616 UART: [idev] CDI.KEYID = 6
3,515,527 UART: [idev] SUBJECT.KEYID = 7
3,516,700 UART: [idev] UDS.KEYID = 0
3,517,623 ready_for_fw is high
3,517,836 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,661,400 UART: [idev] Erasing UDS.KEYID = 0
6,024,908 UART: [idev] Sha1 KeyId Algorithm
6,046,190 UART: [idev] --
6,048,680 UART: [ldev] ++
6,049,257 UART: [ldev] CDI.KEYID = 6
6,050,171 UART: [ldev] SUBJECT.KEYID = 5
6,051,389 UART: [ldev] AUTHORITY.KEYID = 7
6,052,629 UART: [ldev] FE.KEYID = 1
6,096,597 UART: [ldev] Erasing FE.KEYID = 1
8,598,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,273 UART: [ldev] --
10,392,357 UART: [fwproc] Wait for Commands...
10,394,618 UART: [fwproc] Recv command 0x46574c44
10,396,715 UART: [fwproc] Recv'd Img size: 114168 bytes
13,803,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,985 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,777 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,261,493 >>> mbox cmd response: success
14,262,040 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,265,898 UART: [afmc] ++
14,266,499 UART: [afmc] CDI.KEYID = 6
14,267,394 UART: [afmc] SUBJECT.KEYID = 7
14,268,492 UART: [afmc] AUTHORITY.KEYID = 5
16,803,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,528,975 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,544,791 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,560,826 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,576,656 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,600,261 UART: [afmc] --
18,604,070 UART: [cold-reset] --
18,607,176 UART: [state] Locking Datavault
18,613,453 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,098 UART: [state] Locking ICCM
18,617,341 UART: [exit] Launching FMC @ 0x40000130
18,625,734 UART:
18,625,974 UART: Running Caliptra FMC ...
18,627,002 UART:
18,627,154 UART: [state] CFI Enabled
18,684,676 UART: [fht] FMC Alias Private Key: 7
20,449,284 UART: [art] Extend RT PCRs Done
20,450,507 UART: [art] Lock RT PCRs Done
20,452,277 UART: [art] Populate DV Done
20,457,436 UART: [fht] FMC Alias Private Key: 7
20,459,177 UART: [art] Derive CDI
20,459,924 UART: [art] Store in in slot 0x4
20,516,619 UART: [art] Derive Key Pair
20,517,619 UART: [art] Store priv key in slot 0x5
22,981,031 UART: [art] Derive Key Pair - Done
22,994,254 UART: [art] Signing Cert with AUTHO
22,995,559 UART: RITY.KEYID = 7
24,706,188 UART: [art] Erasing AUTHORITY.KEYID = 7
24,707,687 UART: [art] PUB.X = 162B999861507884048705D61D7BF11DBB6C5213F059F067694F486F23739EBFBACD06CFBE83BA264BE6C894BCBFEDAA
24,714,949 UART: [art] PUB.Y = 8DFBCFD961746AB4515AE7AAE20A6953E01A04470FE3B30F71C87B4378F4F71AE03EDC991F81C8CF92AA76AE3E3244DE
24,722,244 UART: [art] SIG.R = F18EE82F788C6508EA40F5ECFFDCFBF8A2673A3270BA6C0AD63FE488114D5F8AA43576914522A239ACF0D08D7EE856F0
24,729,649 UART: [art] SIG.S = 3B29D8E20C0A4EAB42955DC897D1E5FB016761FE0689B54503D0200F8BBF6991FCE3BECA9D0A05D8791B86D12D7E79D6
25,708,803 UART: Caliptra RT
25,709,503 UART: [state] CFI Enabled
25,872,495 UART: [rt] RT listening for mailbox commands...
25,903,969 UART: [rt]cmd =0x54514754, len=24
25,906,642 >>> mbox cmd response data (8 bytes)
25,907,526 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,937,502 UART: [rt]cmd =0x44504543, len=36
25,975,050 >>> mbox cmd response data (24 bytes)
25,975,656 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,005,342 UART: [rt]cmd =0x47544744, len=8
26,007,598 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,358,139 ready_for_fw is high
3,358,522 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,045,896 >>> mbox cmd response: success
14,046,486 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,328,653 UART:
18,329,044 UART: Running Caliptra FMC ...
18,330,132 UART:
18,330,287 UART: [state] CFI Enabled
18,399,207 UART: [fht] FMC Alias Private Key: 7
20,163,137 UART: [art] Extend RT PCRs Done
20,164,352 UART: [art] Lock RT PCRs Done
20,166,254 UART: [art] Populate DV Done
20,171,580 UART: [fht] FMC Alias Private Key: 7
20,173,234 UART: [art] Derive CDI
20,174,048 UART: [art] Store in in slot 0x4
20,232,310 UART: [art] Derive Key Pair
20,233,349 UART: [art] Store priv key in slot 0x5
22,696,237 UART: [art] Derive Key Pair - Done
22,709,226 UART: [art] Signing Cert with AUTHO
22,710,525 UART: RITY.KEYID = 7
24,422,186 UART: [art] Erasing AUTHORITY.KEYID = 7
24,423,698 UART: [art] PUB.X = 6EBC562CDD3F5D55C85018538BC4B699C86319C8B0B0E5F8BE4DEB389F1E4D4189CF53982BFC767AC9FA4E312B77BE55
24,430,955 UART: [art] PUB.Y = 2DB4DB4697F5A6F9B97C3D29C58384D7A540131E4D98EACB6DDB3DDA18365A11E3FEDEB20FB6CF69A79FA4112170D62B
24,438,266 UART: [art] SIG.R = A652454473CDB262A29B35A55D68A64C3721A7E3285ACC52D814ED23A9AB21E0B2EA30BB8EF3B2746F042B0A9DA6B98B
24,445,667 UART: [art] SIG.S = 85E3311C235F41948ACBA8D6E83F2C8879325B414B9E8D66B87A8569079EDEE2054BB6E80D1DC930EF5B91DDFCAF0FBF
25,424,978 UART: Caliptra RT
25,425,681 UART: [state] CFI Enabled
25,590,503 UART: [rt] RT listening for mailbox commands...
25,622,057 UART: [rt]cmd =0x54514754, len=24
25,624,658 >>> mbox cmd response data (8 bytes)
25,625,541 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,655,958 UART: [rt]cmd =0x44504543, len=36
25,693,409 >>> mbox cmd response data (24 bytes)
25,694,061 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,723,736 UART: [rt]cmd =0x47544744, len=8
25,725,629 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,837 writing to cptra_bootfsm_go
193,132 UART:
193,499 UART: Running Caliptra ROM ...
194,627 UART:
604,079 UART: [state] CFI Enabled
617,039 UART: [state] LifecycleState = Unprovisioned
618,914 UART: [state] DebugLocked = No
620,882 UART: [state] WD Timer not started. Device not locked for debugging
625,141 UART: [kat] SHA2-256
804,294 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,811 UART: [kat] ++
816,341 UART: [kat] sha1
828,005 UART: [kat] SHA2-256
831,017 UART: [kat] SHA2-384
836,731 UART: [kat] SHA2-512-ACC
839,688 UART: [kat] ECC-384
3,279,251 UART: [kat] HMAC-384Kdf
3,293,248 UART: [kat] LMS
3,822,719 UART: [kat] --
3,828,627 UART: [cold-reset] ++
3,830,128 UART: [fht] FHT @ 0x50003400
3,840,680 UART: [idev] ++
3,841,242 UART: [idev] CDI.KEYID = 6
3,842,127 UART: [idev] SUBJECT.KEYID = 7
3,843,369 UART: [idev] UDS.KEYID = 0
3,844,274 ready_for_fw is high
3,844,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,008 UART: [idev] Erasing UDS.KEYID = 0
6,312,421 UART: [idev] Sha1 KeyId Algorithm
6,336,535 UART: [idev] --
6,340,153 UART: [ldev] ++
6,340,746 UART: [ldev] CDI.KEYID = 6
6,341,665 UART: [ldev] SUBJECT.KEYID = 5
6,342,823 UART: [ldev] AUTHORITY.KEYID = 7
6,344,106 UART: [ldev] FE.KEYID = 1
6,357,775 UART: [ldev] Erasing FE.KEYID = 1
8,831,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,584 UART: [ldev] --
10,618,401 UART: [fwproc] Wait for Commands...
10,620,456 UART: [fwproc] Recv command 0x46574c44
10,622,548 UART: [fwproc] Recv'd Img size: 114168 bytes
14,022,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,526 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,482,205 >>> mbox cmd response: success
14,482,780 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,486,441 UART: [afmc] ++
14,487,029 UART: [afmc] CDI.KEYID = 6
14,487,917 UART: [afmc] SUBJECT.KEYID = 7
14,489,131 UART: [afmc] AUTHORITY.KEYID = 5
16,988,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,161 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,162 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,989 UART: [afmc] --
18,785,109 UART: [cold-reset] --
18,789,511 UART: [state] Locking Datavault
18,793,748 UART: [state] Locking PCR0, PCR1 and PCR31
18,795,392 UART: [state] Locking ICCM
18,797,761 UART: [exit] Launching FMC @ 0x40000130
18,806,150 UART:
18,806,391 UART: Running Caliptra FMC ...
18,807,491 UART:
18,807,649 UART: [state] CFI Enabled
18,815,588 UART: [fht] FMC Alias Private Key: 7
20,572,792 UART: [art] Extend RT PCRs Done
20,574,000 UART: [art] Lock RT PCRs Done
20,575,871 UART: [art] Populate DV Done
20,581,335 UART: [fht] FMC Alias Private Key: 7
20,582,761 UART: [art] Derive CDI
20,583,497 UART: [art] Store in in slot 0x4
20,626,083 UART: [art] Derive Key Pair
20,627,121 UART: [art] Store priv key in slot 0x5
23,054,207 UART: [art] Derive Key Pair - Done
23,067,362 UART: [art] Signing Cert with AUTHO
23,068,669 UART: RITY.KEYID = 7
24,773,827 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,335 UART: [art] PUB.X = A37B8062550F9708BBD48F952EA4ECC339B01749B09EF91E65BCFF0AA0DB1C3863BA603DF4A1DD148911FE2F4F50A4BA
24,782,645 UART: [art] PUB.Y = 19B6D59DB314641480A9B1A6547B00D89431E5159549315E948F89825EA22AAE7708629894E1E2D064F038370030687D
24,789,839 UART: [art] SIG.R = 27B5CB604B071FE71238E220592CA8D46129ED523943A461F7FB188221E721F306D15D7C433BB43AAAA342420158F139
24,797,176 UART: [art] SIG.S = B20428C8F71D4F9B1EB270DB5A8A1CCBB5D2DE832A87FD51A23F97E9493C8FEEFC8F1254A0FE61227E9E6E2F28BE17F8
25,775,737 UART: Caliptra RT
25,776,449 UART: [state] CFI Enabled
25,894,165 UART: [rt] RT listening for mailbox commands...
25,925,744 UART: [rt]cmd =0x54514754, len=24
25,928,335 >>> mbox cmd response data (8 bytes)
25,929,199 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,959,242 UART: [rt]cmd =0x44504543, len=36
25,996,049 >>> mbox cmd response data (24 bytes)
25,996,724 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,026,502 UART: [rt]cmd =0x47544744, len=8
26,028,341 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,772 writing to cptra_bootfsm_go
3,699,077 ready_for_fw is high
3,699,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,281,373 >>> mbox cmd response: success
14,282,155 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,532,819 UART:
18,533,222 UART: Running Caliptra FMC ...
18,534,334 UART:
18,534,494 UART: [state] CFI Enabled
18,542,445 UART: [fht] FMC Alias Private Key: 7
20,299,097 UART: [art] Extend RT PCRs Done
20,300,321 UART: [art] Lock RT PCRs Done
20,301,841 UART: [art] Populate DV Done
20,307,322 UART: [fht] FMC Alias Private Key: 7
20,308,866 UART: [art] Derive CDI
20,309,678 UART: [art] Store in in slot 0x4
20,352,281 UART: [art] Derive Key Pair
20,353,314 UART: [art] Store priv key in slot 0x5
22,779,880 UART: [art] Derive Key Pair - Done
22,792,770 UART: [art] Signing Cert with AUTHO
22,794,073 UART: RITY.KEYID = 7
24,499,861 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,361 UART: [art] PUB.X = 3452BB2FC4E66A56BDF142F1D6CE0E821546DF80D966A32C58C782334D4FA934828CA44546B6D8C3C5CC409AA4A71EBE
24,508,684 UART: [art] PUB.Y = 8B5D636E577996686FDC399777F18173A9E65643CEBB6358CEFA25DD1269C2054B0E4BFA2E1437D4C099592488860597
24,515,901 UART: [art] SIG.R = 8E7964A8B9AE0D70DCBD52A4A9582B4ADBC78884E0318800583EE6159465F114251C075EA6C9F903BF00EBC5AC9A6A3B
24,523,245 UART: [art] SIG.S = 4E7751E0D3024FED564F99A99BDDC18CE896042C592ADF8DDD5F1CBF932D18CF6036C1C5B57D4F411FBC156AF180923E
25,502,161 UART: Caliptra RT
25,502,857 UART: [state] CFI Enabled
25,619,469 UART: [rt] RT listening for mailbox commands...
25,651,253 UART: [rt]cmd =0x54514754, len=24
25,653,986 >>> mbox cmd response data (8 bytes)
25,654,788 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,684,710 UART: [rt]cmd =0x44504543, len=36
25,722,383 >>> mbox cmd response data (24 bytes)
25,723,051 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,752,942 UART: [rt]cmd =0x47544744, len=8
25,754,892 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,213 UART:
192,615 UART: Running Caliptra ROM ...
193,750 UART:
193,904 UART: [state] CFI Enabled
261,064 UART: [state] LifecycleState = Unprovisioned
263,429 UART: [state] DebugLocked = No
264,758 UART: [state] WD Timer not started. Device not locked for debugging
269,878 UART: [kat] SHA2-256
459,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,541 UART: [kat] ++
471,044 UART: [kat] sha1
482,845 UART: [kat] SHA2-256
485,875 UART: [kat] SHA2-384
491,726 UART: [kat] SHA2-512-ACC
494,318 UART: [kat] ECC-384
2,961,666 UART: [kat] HMAC-384Kdf
2,985,493 UART: [kat] LMS
3,517,266 UART: [kat] --
3,524,102 UART: [cold-reset] ++
3,526,456 UART: [fht] FHT @ 0x50003400
3,538,711 UART: [idev] ++
3,539,359 UART: [idev] CDI.KEYID = 6
3,540,344 UART: [idev] SUBJECT.KEYID = 7
3,541,522 UART: [idev] UDS.KEYID = 0
3,542,447 ready_for_fw is high
3,542,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,686,686 UART: [idev] Erasing UDS.KEYID = 0
6,044,244 UART: [idev] Sha1 KeyId Algorithm
6,067,794 UART: [idev] --
6,072,715 UART: [ldev] ++
6,073,454 UART: [ldev] CDI.KEYID = 6
6,074,366 UART: [ldev] SUBJECT.KEYID = 5
6,075,523 UART: [ldev] AUTHORITY.KEYID = 7
6,076,755 UART: [ldev] FE.KEYID = 1
6,114,034 UART: [ldev] Erasing FE.KEYID = 1
8,617,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,371,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,213 UART: [ldev] --
10,428,908 UART: [fwproc] Wait for Commands...
10,431,976 UART: [fwproc] Recv command 0x46574c44
10,434,228 UART: [fwproc] Recv'd Img size: 114168 bytes
13,881,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,613,819 >>> mbox cmd response: success
14,614,365 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,617,619 UART: [afmc] ++
14,618,332 UART: [afmc] CDI.KEYID = 6
14,619,521 UART: [afmc] SUBJECT.KEYID = 7
14,621,018 UART: [afmc] AUTHORITY.KEYID = 5
17,167,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,908,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,910,807 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,926,024 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,941,100 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,956,143 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,980,593 UART: [afmc] --
18,984,101 UART: [cold-reset] --
18,987,436 UART: [state] Locking Datavault
18,991,837 UART: [state] Locking PCR0, PCR1 and PCR31
18,993,982 UART: [state] Locking ICCM
18,995,871 UART: [exit] Launching FMC @ 0x40000130
19,004,554 UART:
19,004,839 UART: Running Caliptra FMC ...
19,005,956 UART:
19,006,125 UART: [state] CFI Enabled
19,065,000 UART: [fht] FMC Alias Private Key: 7
20,828,989 UART: [art] Extend RT PCRs Done
20,830,212 UART: [art] Lock RT PCRs Done
20,831,868 UART: [art] Populate DV Done
20,837,172 UART: [fht] FMC Alias Private Key: 7
20,838,825 UART: [art] Derive CDI
20,839,625 UART: [art] Store in in slot 0x4
20,897,750 UART: [art] Derive Key Pair
20,898,759 UART: [art] Store priv key in slot 0x5
23,362,774 UART: [art] Derive Key Pair - Done
23,375,666 UART: [art] Signing Cert with AUTHO
23,376,973 UART: RITY.KEYID = 7
25,088,383 UART: [art] Erasing AUTHORITY.KEYID = 7
25,089,892 UART: [art] PUB.X = B4EC5649BE25E1C7FA3B4B2E86126570727080587CBEA47D0D67E50E26FEBB67AE878991FDDAEF09A5BC85645E56B19A
25,097,162 UART: [art] PUB.Y = 30F9EE7D4BA7D6E6846F5132F6587AD1847D9DE7D62ADF0710FB94CA61BE6ED55AA4695A820ECC98354E865312AD0266
25,104,421 UART: [art] SIG.R = 675461AECAF41BD4FCE6E707D881805E1E86831135B5F50EAAB9FD1FFDBFD531A8E7B5EBCC8E3D49546DA509410253FA
25,111,839 UART: [art] SIG.S = CF0A8C00AAFDFA1AC6F80944896669EE83FE2893D8B02608C923D6B9CE6503FBA63CF9EC0F4A499449E4F6B1E000DAA7
26,091,078 UART: Caliptra RT
26,091,765 UART: [state] CFI Enabled
26,256,109 UART: [rt] RT listening for mailbox commands...
26,287,894 UART: [rt]cmd =0x54514754, len=24
26,290,182 >>> mbox cmd response data (8 bytes)
26,291,112 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,321,558 UART: [rt]cmd =0x44504543, len=36
26,359,218 >>> mbox cmd response data (24 bytes)
26,359,876 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,389,813 UART: [rt]cmd =0x47544744, len=8
26,391,761 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,439,319 ready_for_fw is high
3,439,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,709,217 >>> mbox cmd response: success
14,709,877 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,025,672 UART:
19,026,069 UART: Running Caliptra FMC ...
19,027,273 UART:
19,027,452 UART: [state] CFI Enabled
19,094,278 UART: [fht] FMC Alias Private Key: 7
20,857,852 UART: [art] Extend RT PCRs Done
20,859,092 UART: [art] Lock RT PCRs Done
20,860,886 UART: [art] Populate DV Done
20,866,202 UART: [fht] FMC Alias Private Key: 7
20,867,745 UART: [art] Derive CDI
20,868,509 UART: [art] Store in in slot 0x4
20,926,723 UART: [art] Derive Key Pair
20,927,759 UART: [art] Store priv key in slot 0x5
23,390,587 UART: [art] Derive Key Pair - Done
23,403,902 UART: [art] Signing Cert with AUTHO
23,405,209 UART: RITY.KEYID = 7
25,116,790 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,298 UART: [art] PUB.X = 6676F78FD6769EA7B8A67AF4D1CE7EFFBEC011047882C6F3B923AEEC248C25275D1DD987642D19B2966E09E559F41AC5
25,125,544 UART: [art] PUB.Y = C39D00C7C941D853FC47521DE57429DF32DFB79C83E2B049E7F74571BC76C2423256361D0289E60D886EA129FE2AE374
25,132,771 UART: [art] SIG.R = 7669E74AD9580BBF7BEB8D0FC37D4ECFD717D00806AF398D714B3EA196B2FCCEF10F8AAEFACEEA923FCBC74B84F8A85D
25,140,310 UART: [art] SIG.S = 01E2E7F1BC9FD2E56E20B11E3B78581A2ECE304A0019C370C4450FB8D10F6631EED61BDFFDC29D8C901B6FCCA00722DF
26,119,639 UART: Caliptra RT
26,120,343 UART: [state] CFI Enabled
26,285,696 UART: [rt] RT listening for mailbox commands...
26,317,060 UART: [rt]cmd =0x54514754, len=24
26,319,599 >>> mbox cmd response data (8 bytes)
26,320,520 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,350,675 UART: [rt]cmd =0x44504543, len=36
26,388,100 >>> mbox cmd response data (24 bytes)
26,388,731 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,418,611 UART: [rt]cmd =0x47544744, len=8
26,420,667 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,868 writing to cptra_bootfsm_go
194,036 UART:
194,429 UART: Running Caliptra ROM ...
195,533 UART:
605,232 UART: [state] CFI Enabled
618,984 UART: [state] LifecycleState = Unprovisioned
621,358 UART: [state] DebugLocked = No
623,305 UART: [state] WD Timer not started. Device not locked for debugging
627,411 UART: [kat] SHA2-256
817,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,071 UART: [kat] ++
828,591 UART: [kat] sha1
840,669 UART: [kat] SHA2-256
843,747 UART: [kat] SHA2-384
848,105 UART: [kat] SHA2-512-ACC
850,680 UART: [kat] ECC-384
3,293,421 UART: [kat] HMAC-384Kdf
3,305,938 UART: [kat] LMS
3,837,787 UART: [kat] --
3,841,862 UART: [cold-reset] ++
3,842,900 UART: [fht] FHT @ 0x50003400
3,855,085 UART: [idev] ++
3,855,735 UART: [idev] CDI.KEYID = 6
3,856,866 UART: [idev] SUBJECT.KEYID = 7
3,857,974 UART: [idev] UDS.KEYID = 0
3,858,906 ready_for_fw is high
3,859,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,471 UART: [idev] Erasing UDS.KEYID = 0
6,331,729 UART: [idev] Sha1 KeyId Algorithm
6,354,633 UART: [idev] --
6,358,892 UART: [ldev] ++
6,359,571 UART: [ldev] CDI.KEYID = 6
6,360,533 UART: [ldev] SUBJECT.KEYID = 5
6,361,696 UART: [ldev] AUTHORITY.KEYID = 7
6,362,890 UART: [ldev] FE.KEYID = 1
6,373,644 UART: [ldev] Erasing FE.KEYID = 1
8,851,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,779 UART: [ldev] --
10,645,364 UART: [fwproc] Wait for Commands...
10,647,663 UART: [fwproc] Recv command 0x46574c44
10,649,979 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,041 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,840,671 >>> mbox cmd response: success
14,841,269 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,845,607 UART: [afmc] ++
14,846,316 UART: [afmc] CDI.KEYID = 6
14,847,507 UART: [afmc] SUBJECT.KEYID = 7
14,848,948 UART: [afmc] AUTHORITY.KEYID = 5
17,351,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,074,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,076,003 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,091,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,106,307 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,121,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,145,172 UART: [afmc] --
19,148,731 UART: [cold-reset] --
19,152,270 UART: [state] Locking Datavault
19,159,790 UART: [state] Locking PCR0, PCR1 and PCR31
19,161,988 UART: [state] Locking ICCM
19,163,397 UART: [exit] Launching FMC @ 0x40000130
19,172,037 UART:
19,172,279 UART: Running Caliptra FMC ...
19,173,380 UART:
19,173,542 UART: [state] CFI Enabled
19,181,918 UART: [fht] FMC Alias Private Key: 7
20,938,399 UART: [art] Extend RT PCRs Done
20,939,608 UART: [art] Lock RT PCRs Done
20,941,232 UART: [art] Populate DV Done
20,946,540 UART: [fht] FMC Alias Private Key: 7
20,948,023 UART: [art] Derive CDI
20,948,787 UART: [art] Store in in slot 0x4
20,991,430 UART: [art] Derive Key Pair
20,992,472 UART: [art] Store priv key in slot 0x5
23,419,409 UART: [art] Derive Key Pair - Done
23,432,565 UART: [art] Signing Cert with AUTHO
23,433,871 UART: RITY.KEYID = 7
25,139,450 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,960 UART: [art] PUB.X = C53DB0BBE34D721938F8A6E54AB1A5FB6854A77B99C41027E438C669981D23759811416276111A5A27B46219FAC81171
25,148,207 UART: [art] PUB.Y = 8973855BE6CE81047DAF20EA59C45C425B48905E54FAC8FEAB73E99FAC0F8D5135A273E2D9D9667C29C5788065616CCB
25,155,433 UART: [art] SIG.R = 82DE0E3B1DB0BC2F80CF6A931AD53E08722056F0888CA5CDB5B787018BD80D30C0373A2E09EFFDFC596FDAA5E801A0E0
25,162,819 UART: [art] SIG.S = E805EDC5A2B5E886CEA1565DC9E5FEAD4336EEADDA0BD2849F275EC6CA08647B1EA01D153FD33DB4A3AF67F5F3F04391
26,141,446 UART: Caliptra RT
26,142,154 UART: [state] CFI Enabled
26,259,939 UART: [rt] RT listening for mailbox commands...
26,291,514 UART: [rt]cmd =0x54514754, len=24
26,294,046 >>> mbox cmd response data (8 bytes)
26,294,911 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,324,920 UART: [rt]cmd =0x44504543, len=36
26,362,864 >>> mbox cmd response data (24 bytes)
26,363,481 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,393,254 UART: [rt]cmd =0x47544744, len=8
26,395,090 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,647 writing to cptra_bootfsm_go
3,757,511 ready_for_fw is high
3,757,889 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,572 >>> mbox cmd response: success
14,952,379 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,203,619 UART:
19,204,004 UART: Running Caliptra FMC ...
19,205,145 UART:
19,205,325 UART: [state] CFI Enabled
19,213,049 UART: [fht] FMC Alias Private Key: 7
20,969,486 UART: [art] Extend RT PCRs Done
20,970,711 UART: [art] Lock RT PCRs Done
20,972,314 UART: [art] Populate DV Done
20,977,676 UART: [fht] FMC Alias Private Key: 7
20,979,318 UART: [art] Derive CDI
20,980,056 UART: [art] Store in in slot 0x4
21,022,699 UART: [art] Derive Key Pair
21,023,701 UART: [art] Store priv key in slot 0x5
23,450,963 UART: [art] Derive Key Pair - Done
23,464,114 UART: [art] Signing Cert with AUTHO
23,465,418 UART: RITY.KEYID = 7
25,170,767 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,272 UART: [art] PUB.X = 65EE7E3394E1D7402C453EE7760CBEDD3AD0AFB1327574FFBE5D6BDCB0B3370C22E0BD1481D0D640182839FFD4710023
25,179,520 UART: [art] PUB.Y = 5B8808305A27A5E20EE0E2C5A5B398524A759D3DC46B8DC20B8C350A27EA8FB9B46ACD533DE2B6009B16DCABE8397C96
25,186,817 UART: [art] SIG.R = 87BDC3291598D9D3B28E980813E107425D442D52466E12AA664CB2A0EEA00262EE6A7FD08A67EF66B96A3EF37296AD96
25,194,209 UART: [art] SIG.S = E3260D7FC15BFB485CE4FD72A3101F3E92B833AA6F34B475D2B3E23817CEC423D36B318F7D6E9CCF4E7DE4942C0EF325
26,173,339 UART: Caliptra RT
26,174,028 UART: [state] CFI Enabled
26,290,765 UART: [rt] RT listening for mailbox commands...
26,322,382 UART: [rt]cmd =0x54514754, len=24
26,325,371 >>> mbox cmd response data (8 bytes)
26,326,356 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,356,337 UART: [rt]cmd =0x44504543, len=36
26,394,248 >>> mbox cmd response data (24 bytes)
26,394,866 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,424,534 UART: [rt]cmd =0x47544744, len=8
26,426,288 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Unprovisioned
85,949 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,713 UART: [kat] SHA2-256
892,651 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,210 UART: [kat] LMS
1,475,406 UART: [kat] --
1,476,337 UART: [cold-reset] ++
1,476,673 UART: [fht] Storing FHT @ 0x50003400
1,479,494 UART: [idev] ++
1,479,662 UART: [idev] CDI.KEYID = 6
1,480,022 UART: [idev] SUBJECT.KEYID = 7
1,480,446 UART: [idev] UDS.KEYID = 0
1,480,791 ready_for_fw is high
1,480,791 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,124 UART: [idev] Erasing UDS.KEYID = 0
1,504,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,500 UART: [idev] --
1,514,727 UART: [ldev] ++
1,514,895 UART: [ldev] CDI.KEYID = 6
1,515,258 UART: [ldev] SUBJECT.KEYID = 5
1,515,684 UART: [ldev] AUTHORITY.KEYID = 7
1,516,147 UART: [ldev] FE.KEYID = 1
1,521,347 UART: [ldev] Erasing FE.KEYID = 1
1,546,150 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,252 UART: [ldev] --
1,585,573 UART: [fwproc] Waiting for Commands...
1,586,356 UART: [fwproc] Received command 0x46574c44
1,587,147 UART: [fwproc] Received Image of size 114168 bytes
2,882,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,042 >>> mbox cmd response: success
3,075,042 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,076,172 UART: [afmc] ++
3,076,340 UART: [afmc] CDI.KEYID = 6
3,076,702 UART: [afmc] SUBJECT.KEYID = 7
3,077,127 UART: [afmc] AUTHORITY.KEYID = 5
3,112,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,882 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,662 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,390 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,275 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,965 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,812 UART: [afmc] --
3,155,806 UART: [cold-reset] --
3,156,700 UART: [state] Locking Datavault
3,158,009 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,613 UART: [state] Locking ICCM
3,159,131 UART: [exit] Launching FMC @ 0x40000130
3,164,460 UART:
3,164,476 UART: Running Caliptra FMC ...
3,164,884 UART:
3,164,938 UART: [state] CFI Enabled
3,175,257 UART: [fht] FMC Alias Private Key: 7
3,283,018 UART: [art] Extend RT PCRs Done
3,283,446 UART: [art] Lock RT PCRs Done
3,284,722 UART: [art] Populate DV Done
3,293,017 UART: [fht] FMC Alias Private Key: 7
3,294,047 UART: [art] Derive CDI
3,294,327 UART: [art] Store in in slot 0x4
3,379,904 UART: [art] Derive Key Pair
3,380,264 UART: [art] Store priv key in slot 0x5
3,393,634 UART: [art] Derive Key Pair - Done
3,408,141 UART: [art] Signing Cert with AUTHO
3,408,621 UART: RITY.KEYID = 7
3,423,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,328 UART: [art] PUB.X = 8638DCF9A955D5F437682CB8BD30980EFD03AE471C5AD6F6C130BA524EAE3DB528A2B2DBB2B148CE8410637F76311BF6
3,431,106 UART: [art] PUB.Y = 2CAEA9D5ED888F85225E9C807A3EC2D8503704969F73F49F48199BF30F73FA8E1F4CE61E1D728AE5F8A475829B10AB6C
3,438,060 UART: [art] SIG.R = C3205677F89EF7DE3EFF36F4A4E0A4E63488736F2F5B788FDFE64C386E0121CBF1595794594E9CBC6200FC1942EF14B7
3,444,813 UART: [art] SIG.S = 0AA3F3BBBDC981E28B03AF1C5583FBFD636C5B53C4188A0DE4DCCC8CE036BD6E68C5AC252D775EA6165445E845226088
3,468,813 UART: Caliptra RT
3,469,066 UART: [state] CFI Enabled
3,576,901 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,607,669 UART: [rt]cmd =0x54514754, len=24
3,609,770 >>> mbox cmd response data (8 bytes)
3,609,771 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,639,250 UART: [rt]cmd =0x44504543, len=36
3,676,549 >>> mbox cmd response data (24 bytes)
3,676,550 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,705,837 UART: [rt]cmd =0x47544744, len=8
3,707,522 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 ready_for_fw is high
1,362,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,628 >>> mbox cmd response: success
2,926,628 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,440 UART:
2,987,456 UART: Running Caliptra FMC ...
2,987,864 UART:
2,987,918 UART: [state] CFI Enabled
2,998,277 UART: [fht] FMC Alias Private Key: 7
3,106,548 UART: [art] Extend RT PCRs Done
3,106,976 UART: [art] Lock RT PCRs Done
3,108,572 UART: [art] Populate DV Done
3,116,761 UART: [fht] FMC Alias Private Key: 7
3,117,739 UART: [art] Derive CDI
3,118,019 UART: [art] Store in in slot 0x4
3,203,842 UART: [art] Derive Key Pair
3,204,202 UART: [art] Store priv key in slot 0x5
3,217,552 UART: [art] Derive Key Pair - Done
3,232,671 UART: [art] Signing Cert with AUTHO
3,233,151 UART: RITY.KEYID = 7
3,248,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,026 UART: [art] PUB.X = C1F2AB913443735D7D5F36B341D8323899A134357526D51ACAF386633DE43F62DD0E0A33EF5B2A0BBC6A92EC1BF50B77
3,255,792 UART: [art] PUB.Y = 8ECDF862C4E2085810CC10C30CAA6F6CFA190DE0851A82448A1352809ED2BE8F3EFE5DC1EDCF5A7A6E2A35D87123A3A4
3,262,753 UART: [art] SIG.R = E1C317BD86E822B3FC6C95D6945315CAA8FB2595129C8411E99AADBBBCD4C42035CF8648DAE41CC0EC9238AA5E8B169E
3,269,541 UART: [art] SIG.S = 2BF919E3F96470EC63F53B2A6A2C6265E77944369A064206B226E17A7F66BAB40A79E8BA91B5AF7201FBF2EDD95223D7
3,292,922 UART: Caliptra RT
3,293,175 UART: [state] CFI Enabled
3,400,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,898 UART: [rt]cmd =0x54514754, len=24
3,434,105 >>> mbox cmd response data (8 bytes)
3,434,106 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,463,545 UART: [rt]cmd =0x44504543, len=36
3,501,212 >>> mbox cmd response data (24 bytes)
3,501,213 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,280 UART: [rt]cmd =0x47544744, len=8
3,531,883 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,827 UART: [state] LifecycleState = Unprovisioned
85,482 UART: [state] DebugLocked = No
86,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,716 UART: [kat] SHA2-256
881,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,762 UART: [kat] ++
885,914 UART: [kat] sha1
890,354 UART: [kat] SHA2-256
892,292 UART: [kat] SHA2-384
895,003 UART: [kat] SHA2-512-ACC
896,904 UART: [kat] ECC-384
902,797 UART: [kat] HMAC-384Kdf
907,401 UART: [kat] LMS
1,475,597 UART: [kat] --
1,476,592 UART: [cold-reset] ++
1,477,118 UART: [fht] Storing FHT @ 0x50003400
1,479,845 UART: [idev] ++
1,480,013 UART: [idev] CDI.KEYID = 6
1,480,373 UART: [idev] SUBJECT.KEYID = 7
1,480,797 UART: [idev] UDS.KEYID = 0
1,481,142 ready_for_fw is high
1,481,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,595 UART: [idev] Erasing UDS.KEYID = 0
1,505,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,705 UART: [idev] --
1,514,918 UART: [ldev] ++
1,515,086 UART: [ldev] CDI.KEYID = 6
1,515,449 UART: [ldev] SUBJECT.KEYID = 5
1,515,875 UART: [ldev] AUTHORITY.KEYID = 7
1,516,338 UART: [ldev] FE.KEYID = 1
1,521,872 UART: [ldev] Erasing FE.KEYID = 1
1,547,461 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,643 UART: [ldev] --
1,586,906 UART: [fwproc] Waiting for Commands...
1,587,669 UART: [fwproc] Received command 0x46574c44
1,588,460 UART: [fwproc] Received Image of size 114168 bytes
2,885,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,524 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,876 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,589 >>> mbox cmd response: success
3,077,589 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,078,795 UART: [afmc] ++
3,078,963 UART: [afmc] CDI.KEYID = 6
3,079,325 UART: [afmc] SUBJECT.KEYID = 7
3,079,750 UART: [afmc] AUTHORITY.KEYID = 5
3,115,167 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,751 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,531 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,259 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,144 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,834 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,835 UART: [afmc] --
3,158,869 UART: [cold-reset] --
3,159,603 UART: [state] Locking Datavault
3,160,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,252 UART: [state] Locking ICCM
3,161,810 UART: [exit] Launching FMC @ 0x40000130
3,167,139 UART:
3,167,155 UART: Running Caliptra FMC ...
3,167,563 UART:
3,167,706 UART: [state] CFI Enabled
3,178,301 UART: [fht] FMC Alias Private Key: 7
3,285,974 UART: [art] Extend RT PCRs Done
3,286,402 UART: [art] Lock RT PCRs Done
3,287,944 UART: [art] Populate DV Done
3,296,403 UART: [fht] FMC Alias Private Key: 7
3,297,421 UART: [art] Derive CDI
3,297,701 UART: [art] Store in in slot 0x4
3,383,668 UART: [art] Derive Key Pair
3,384,028 UART: [art] Store priv key in slot 0x5
3,397,460 UART: [art] Derive Key Pair - Done
3,412,471 UART: [art] Signing Cert with AUTHO
3,412,951 UART: RITY.KEYID = 7
3,428,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,814 UART: [art] PUB.X = 4A3467F7D79120AA27A2DEBB25D325EF6707D5F0333C8C11657D362824A7261A7FF20E46D653DD3479BED78CAC893B9B
3,435,584 UART: [art] PUB.Y = D262134CBA3BC910F1F528064AF55E5B09223882D1EEA92A19168C119012B0725C6FB2DD4B97D634D64875F8C1D8448B
3,442,528 UART: [art] SIG.R = 6008504BD9628F7DB46F311318B7FCE8EE2422A63ACDACDD17C36E9CCDFD4BB75DA69F5B09E8EC90EF77E15941B86CD7
3,449,314 UART: [art] SIG.S = 590801712E4E652E19795E0181000C76EFF2D54B96387A835CBBAC3EB691578E830C05CC922D9785F1257EB99C1AC4CF
3,472,633 UART: Caliptra RT
3,472,978 UART: [state] CFI Enabled
3,579,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,634 UART: [rt]cmd =0x54514754, len=24
3,612,559 >>> mbox cmd response data (8 bytes)
3,612,560 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,642,201 UART: [rt]cmd =0x44504543, len=36
3,680,760 >>> mbox cmd response data (24 bytes)
3,680,761 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,938 UART: [rt]cmd =0x47544744, len=8
3,711,251 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,004 ready_for_fw is high
1,363,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,903 >>> mbox cmd response: success
2,926,903 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,988,711 UART:
2,988,727 UART: Running Caliptra FMC ...
2,989,135 UART:
2,989,278 UART: [state] CFI Enabled
2,999,875 UART: [fht] FMC Alias Private Key: 7
3,108,002 UART: [art] Extend RT PCRs Done
3,108,430 UART: [art] Lock RT PCRs Done
3,109,818 UART: [art] Populate DV Done
3,118,059 UART: [fht] FMC Alias Private Key: 7
3,119,101 UART: [art] Derive CDI
3,119,381 UART: [art] Store in in slot 0x4
3,204,986 UART: [art] Derive Key Pair
3,205,346 UART: [art] Store priv key in slot 0x5
3,218,178 UART: [art] Derive Key Pair - Done
3,233,173 UART: [art] Signing Cert with AUTHO
3,233,653 UART: RITY.KEYID = 7
3,248,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,408 UART: [art] PUB.X = 80862C1989DCE1F7386637BED1AD5EB64E693A67153AD0088EC6C9072E8A4BF0CB9283EA40D5406AD588E19D39E84CF8
3,256,180 UART: [art] PUB.Y = 033CCC458C64CFB1E4E8188F24F59D5C9F449ED4B117E3105FE7F8FA63F4C1DA8534EBCEB76E50A49B9DB25BE78B426E
3,263,147 UART: [art] SIG.R = E78278DF99F9ED04DBE0AF1AD110DACBD9A8CB806F284A0B70DFDA0D206CC3470D26472FC765FCEAE7F0E633A15868CA
3,269,931 UART: [art] SIG.S = 67278909A60E04A1AEE82C6AD6C92502627B040BAF275AAF4D73169A46E1F81346CDF6EBC803E38069740B8E50C4833D
3,294,562 UART: Caliptra RT
3,294,907 UART: [state] CFI Enabled
3,403,008 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,444 UART: [rt]cmd =0x54514754, len=24
3,435,381 >>> mbox cmd response data (8 bytes)
3,435,382 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,464,711 UART: [rt]cmd =0x44504543, len=36
3,501,484 >>> mbox cmd response data (24 bytes)
3,501,485 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,960 UART: [rt]cmd =0x47544744, len=8
3,532,711 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,688 UART: [state] LifecycleState = Unprovisioned
86,343 UART: [state] DebugLocked = No
86,921 UART: [state] WD Timer not started. Device not locked for debugging
88,152 UART: [kat] SHA2-256
893,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,927 UART: [kat] ++
898,079 UART: [kat] sha1
902,295 UART: [kat] SHA2-256
904,235 UART: [kat] SHA2-384
907,058 UART: [kat] SHA2-512-ACC
908,959 UART: [kat] ECC-384
918,500 UART: [kat] HMAC-384Kdf
923,202 UART: [kat] LMS
1,171,530 UART: [kat] --
1,172,421 UART: [cold-reset] ++
1,172,995 UART: [fht] FHT @ 0x50003400
1,175,608 UART: [idev] ++
1,175,776 UART: [idev] CDI.KEYID = 6
1,176,136 UART: [idev] SUBJECT.KEYID = 7
1,176,560 UART: [idev] UDS.KEYID = 0
1,176,905 ready_for_fw is high
1,176,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,448 UART: [idev] Erasing UDS.KEYID = 0
1,201,839 UART: [idev] Sha1 KeyId Algorithm
1,210,271 UART: [idev] --
1,211,437 UART: [ldev] ++
1,211,605 UART: [ldev] CDI.KEYID = 6
1,211,968 UART: [ldev] SUBJECT.KEYID = 5
1,212,394 UART: [ldev] AUTHORITY.KEYID = 7
1,212,857 UART: [ldev] FE.KEYID = 1
1,218,057 UART: [ldev] Erasing FE.KEYID = 1
1,244,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,903 UART: [ldev] --
1,283,324 UART: [fwproc] Wait for Commands...
1,283,918 UART: [fwproc] Recv command 0x46574c44
1,284,646 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,790 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,445 >>> mbox cmd response: success
2,773,445 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,701 UART: [afmc] ++
2,774,869 UART: [afmc] CDI.KEYID = 6
2,775,231 UART: [afmc] SUBJECT.KEYID = 7
2,775,656 UART: [afmc] AUTHORITY.KEYID = 5
2,811,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,833 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,552 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,470 UART: [afmc] --
2,854,600 UART: [cold-reset] --
2,855,232 UART: [state] Locking Datavault
2,856,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,939 UART: [state] Locking ICCM
2,857,475 UART: [exit] Launching FMC @ 0x40000130
2,862,804 UART:
2,862,820 UART: Running Caliptra FMC ...
2,863,228 UART:
2,863,282 UART: [state] CFI Enabled
2,874,041 UART: [fht] FMC Alias Private Key: 7
2,981,642 UART: [art] Extend RT PCRs Done
2,982,070 UART: [art] Lock RT PCRs Done
2,983,694 UART: [art] Populate DV Done
2,992,017 UART: [fht] FMC Alias Private Key: 7
2,992,957 UART: [art] Derive CDI
2,993,237 UART: [art] Store in in slot 0x4
3,079,216 UART: [art] Derive Key Pair
3,079,576 UART: [art] Store priv key in slot 0x5
3,092,486 UART: [art] Derive Key Pair - Done
3,107,137 UART: [art] Signing Cert with AUTHO
3,107,617 UART: RITY.KEYID = 7
3,122,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,654 UART: [art] PUB.X = B2330C21930342A018FB69B4A743D3584B380AA7B5865E3110D36CDEBDF1A37CB1459C738BE66D2492BE96136B05E85C
3,130,414 UART: [art] PUB.Y = 961B340F815578A727ED19C3B6F4B6912070CF072C05B8514301336642E2D7544DE163A86ABACD1665E37F700AF97DB7
3,137,345 UART: [art] SIG.R = 2B7357C2874CFF4776B5DD6AF3ACB6F214C88CD2D97B1F8627216111341D509708C0C9DF0D4ED88073E0C58865DAE893
3,144,113 UART: [art] SIG.S = 9441C6E45CC38A5E96848951E34556254CEB57C2B247D2448E61BD628A7632338FB30936133641D860C4773255936098
3,167,853 UART: Caliptra RT
3,168,106 UART: [state] CFI Enabled
3,275,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,655 UART: [rt]cmd =0x54514754, len=24
3,307,534 >>> mbox cmd response data (8 bytes)
3,307,535 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,266 UART: [rt]cmd =0x44504543, len=36
3,375,761 >>> mbox cmd response data (24 bytes)
3,375,762 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,405,175 UART: [rt]cmd =0x47544744, len=8
3,406,664 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,397 ready_for_fw is high
1,060,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,910 >>> mbox cmd response: success
2,623,910 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,685,940 UART:
2,685,956 UART: Running Caliptra FMC ...
2,686,364 UART:
2,686,418 UART: [state] CFI Enabled
2,696,487 UART: [fht] FMC Alias Private Key: 7
2,804,718 UART: [art] Extend RT PCRs Done
2,805,146 UART: [art] Lock RT PCRs Done
2,806,882 UART: [art] Populate DV Done
2,815,183 UART: [fht] FMC Alias Private Key: 7
2,816,317 UART: [art] Derive CDI
2,816,597 UART: [art] Store in in slot 0x4
2,902,380 UART: [art] Derive Key Pair
2,902,740 UART: [art] Store priv key in slot 0x5
2,915,972 UART: [art] Derive Key Pair - Done
2,930,414 UART: [art] Signing Cert with AUTHO
2,930,894 UART: RITY.KEYID = 7
2,945,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,429 UART: [art] PUB.X = A118E6A6FA8A115617A8B57CC7527767501F0E10C44E577DAA33B4824A289726C5CEA3621ED5AEC8F42ABDF0EBBF384B
2,953,210 UART: [art] PUB.Y = 508E1D7706B3C20EE9155FD111FE97C08C9BC0257DF864C033A0CB70E11432CA1946F39B73D2049486204A1188C8B8F3
2,960,149 UART: [art] SIG.R = F617B3982BA08CCBC1C30717762280B6217A89B34C07D53B57C3A62A58C3656645DC5C0AA820AD0B837466C2F0938971
2,966,903 UART: [art] SIG.S = 77D53C72644F5076E32888DCBC896673EDF542D1C9D76F1F22154134BF363D96F7374E596130D3C9418519BDF5CF3D5F
2,990,008 UART: Caliptra RT
2,990,261 UART: [state] CFI Enabled
3,097,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,718 UART: [rt]cmd =0x54514754, len=24
3,130,959 >>> mbox cmd response data (8 bytes)
3,130,960 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,371 UART: [rt]cmd =0x44504543, len=36
3,198,772 >>> mbox cmd response data (24 bytes)
3,198,773 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,332 UART: [rt]cmd =0x47544744, len=8
3,229,911 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
893,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,938 UART: [kat] ++
898,090 UART: [kat] sha1
902,232 UART: [kat] SHA2-256
904,172 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,355 UART: [kat] HMAC-384Kdf
922,855 UART: [kat] LMS
1,171,183 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,330 UART: [fht] FHT @ 0x50003400
1,175,087 UART: [idev] ++
1,175,255 UART: [idev] CDI.KEYID = 6
1,175,615 UART: [idev] SUBJECT.KEYID = 7
1,176,039 UART: [idev] UDS.KEYID = 0
1,176,384 ready_for_fw is high
1,176,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,941 UART: [idev] Erasing UDS.KEYID = 0
1,200,902 UART: [idev] Sha1 KeyId Algorithm
1,209,296 UART: [idev] --
1,210,456 UART: [ldev] ++
1,210,624 UART: [ldev] CDI.KEYID = 6
1,210,987 UART: [ldev] SUBJECT.KEYID = 5
1,211,413 UART: [ldev] AUTHORITY.KEYID = 7
1,211,876 UART: [ldev] FE.KEYID = 1
1,217,084 UART: [ldev] Erasing FE.KEYID = 1
1,243,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,744 UART: [ldev] --
1,283,015 UART: [fwproc] Wait for Commands...
1,283,827 UART: [fwproc] Recv command 0x46574c44
1,284,555 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,501 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,110 >>> mbox cmd response: success
2,774,110 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,340 UART: [afmc] ++
2,775,508 UART: [afmc] CDI.KEYID = 6
2,775,870 UART: [afmc] SUBJECT.KEYID = 7
2,776,295 UART: [afmc] AUTHORITY.KEYID = 5
2,812,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,633 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,361 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,965 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,795 UART: [afmc] --
2,855,813 UART: [cold-reset] --
2,856,651 UART: [state] Locking Datavault
2,857,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,590 UART: [state] Locking ICCM
2,859,116 UART: [exit] Launching FMC @ 0x40000130
2,864,445 UART:
2,864,461 UART: Running Caliptra FMC ...
2,864,869 UART:
2,865,012 UART: [state] CFI Enabled
2,875,693 UART: [fht] FMC Alias Private Key: 7
2,984,080 UART: [art] Extend RT PCRs Done
2,984,508 UART: [art] Lock RT PCRs Done
2,985,724 UART: [art] Populate DV Done
2,993,735 UART: [fht] FMC Alias Private Key: 7
2,994,747 UART: [art] Derive CDI
2,995,027 UART: [art] Store in in slot 0x4
3,081,192 UART: [art] Derive Key Pair
3,081,552 UART: [art] Store priv key in slot 0x5
3,094,494 UART: [art] Derive Key Pair - Done
3,109,081 UART: [art] Signing Cert with AUTHO
3,109,561 UART: RITY.KEYID = 7
3,124,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,256 UART: [art] PUB.X = 926ACB8DB9E108B281FDAEC64E7E03673E8DC1EEE411596E15CBA54D113F67A35D14775A03CBBDD361BEE8A5657F5E32
3,132,035 UART: [art] PUB.Y = 39EFF1B2EF0F7142378EEBCAA75AA16F16AB2AEFE1AC07A15987329D0291542E7886B545E26CBE251C0A88AC3032C705
3,138,982 UART: [art] SIG.R = 5A7543E4751C7E9AFD04C7794E4436479A25D4DDCB5D452EC2B56FE6A640855958ADD6EA4065B970BABB79E41A11C74D
3,145,759 UART: [art] SIG.S = 3BAED88196EF82C8A28E162ED95A3FCFC714F04AC597D7FF18F4266E289E3561F816C2CC76A0F6F37A916E07721DF38D
3,169,887 UART: Caliptra RT
3,170,232 UART: [state] CFI Enabled
3,277,093 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,709 UART: [rt]cmd =0x54514754, len=24
3,309,848 >>> mbox cmd response data (8 bytes)
3,309,849 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,339,352 UART: [rt]cmd =0x44504543, len=36
3,377,691 >>> mbox cmd response data (24 bytes)
3,377,692 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,406,819 UART: [rt]cmd =0x47544744, len=8
3,408,254 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,210 ready_for_fw is high
1,060,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,275 >>> mbox cmd response: success
2,624,275 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,686,489 UART:
2,686,505 UART: Running Caliptra FMC ...
2,686,913 UART:
2,687,056 UART: [state] CFI Enabled
2,697,963 UART: [fht] FMC Alias Private Key: 7
2,806,070 UART: [art] Extend RT PCRs Done
2,806,498 UART: [art] Lock RT PCRs Done
2,808,050 UART: [art] Populate DV Done
2,816,489 UART: [fht] FMC Alias Private Key: 7
2,817,647 UART: [art] Derive CDI
2,817,927 UART: [art] Store in in slot 0x4
2,903,806 UART: [art] Derive Key Pair
2,904,166 UART: [art] Store priv key in slot 0x5
2,917,456 UART: [art] Derive Key Pair - Done
2,931,889 UART: [art] Signing Cert with AUTHO
2,932,369 UART: RITY.KEYID = 7
2,947,695 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,460 UART: [art] PUB.X = 8AA4F3F4E425BD0D01693AC9D5F5AACCBE91C22A1195C2B5C4F3BC31C089F71E6CA4600F6BB0681E998D2BF94F829831
2,955,237 UART: [art] PUB.Y = ACA191DE3B576FB35486F6227FB6686C164724C136DD17555C4B975F455A5BB8B2B56DE1DB33F13CD0087E95D94CBC10
2,962,192 UART: [art] SIG.R = 6E1558DC321D9A8655025D78B01AE213041E4AD0DD8F3A7786FC653E154E2726D8FDDA2281C7B6FCE24FAF60BE0AC7C6
2,968,967 UART: [art] SIG.S = 5D73CF2C7CB58CE9F78FA0E2F948B4D5C0A5D6B79AD882F8C5A7C420CC35ED5C59FB65CED5299A28A49DF73E2BF0221F
2,992,694 UART: Caliptra RT
2,993,039 UART: [state] CFI Enabled
3,100,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,422 UART: [rt]cmd =0x54514754, len=24
3,133,569 >>> mbox cmd response data (8 bytes)
3,133,570 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,163,217 UART: [rt]cmd =0x44504543, len=36
3,200,956 >>> mbox cmd response data (24 bytes)
3,200,957 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,230,466 UART: [rt]cmd =0x47544744, len=8
3,232,091 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,807 UART: [state] WD Timer not started. Device not locked for debugging
88,150 UART: [kat] SHA2-256
891,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,829 UART: [kat] ++
895,981 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,930 UART: [kat] SHA2-512-ACC
906,831 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,842 UART: [kat] LMS
1,169,154 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 ready_for_fw is high
1,174,511 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,979 UART: [idev] Erasing UDS.KEYID = 0
1,199,127 UART: [idev] Sha1 KeyId Algorithm
1,207,823 UART: [idev] --
1,208,904 UART: [ldev] ++
1,209,072 UART: [ldev] CDI.KEYID = 6
1,209,436 UART: [ldev] SUBJECT.KEYID = 5
1,209,863 UART: [ldev] AUTHORITY.KEYID = 7
1,210,326 UART: [ldev] FE.KEYID = 1
1,215,468 UART: [ldev] Erasing FE.KEYID = 1
1,241,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,208 UART: [ldev] --
1,280,542 UART: [fwproc] Wait for Commands...
1,281,161 UART: [fwproc] Recv command 0x46574c44
1,281,894 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,954 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,263 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,777 >>> mbox cmd response: success
2,770,777 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,771,906 UART: [afmc] ++
2,772,074 UART: [afmc] CDI.KEYID = 6
2,772,437 UART: [afmc] SUBJECT.KEYID = 7
2,772,863 UART: [afmc] AUTHORITY.KEYID = 5
2,808,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,455 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,184 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,067 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,786 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,843 UART: [afmc] --
2,851,761 UART: [cold-reset] --
2,852,533 UART: [state] Locking Datavault
2,853,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,504 UART: [state] Locking ICCM
2,854,938 UART: [exit] Launching FMC @ 0x40000130
2,860,267 UART:
2,860,283 UART: Running Caliptra FMC ...
2,860,691 UART:
2,860,745 UART: [state] CFI Enabled
2,871,256 UART: [fht] FMC Alias Private Key: 7
2,979,235 UART: [art] Extend RT PCRs Done
2,979,663 UART: [art] Lock RT PCRs Done
2,981,423 UART: [art] Populate DV Done
2,989,904 UART: [fht] FMC Alias Private Key: 7
2,990,980 UART: [art] Derive CDI
2,991,260 UART: [art] Store in in slot 0x4
3,076,593 UART: [art] Derive Key Pair
3,076,953 UART: [art] Store priv key in slot 0x5
3,090,099 UART: [art] Derive Key Pair - Done
3,105,112 UART: [art] Signing Cert with AUTHO
3,105,592 UART: RITY.KEYID = 7
3,120,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,199 UART: [art] PUB.X = B775461F4EC075CCA864EEE24D047B4C54091F9C1A049CE9DF5C8D54A5D543CC74F5A5C2A5316B4A2061016924E7394E
3,127,963 UART: [art] PUB.Y = A21B33AF3CB46FA0E6FB524002753CF92FFB8FE4F4A8716B456A98734388AB4980B46AD2B8D6F2565B677D587722418C
3,134,914 UART: [art] SIG.R = 1D9CEB124E074914864EB081718486BACFEAF6EAA3F3220877923417C8FDAD7BBD4FA27F8651AB2CFC1FBE0E7332128E
3,141,691 UART: [art] SIG.S = 34D4D16532EC94F38E330CB0D46BD732E140B4286484F6EE96B8E12D2583504E3DEBBE53459D2F05621EDA87960599B0
3,165,453 UART: Caliptra RT
3,165,706 UART: [state] CFI Enabled
3,273,101 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,755 UART: [rt]cmd =0x54514754, len=24
3,306,104 >>> mbox cmd response data (8 bytes)
3,306,105 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,440 UART: [rt]cmd =0x44504543, len=36
3,372,855 >>> mbox cmd response data (24 bytes)
3,372,856 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,402,383 UART: [rt]cmd =0x47544744, len=8
3,403,876 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,624 ready_for_fw is high
1,055,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,275 >>> mbox cmd response: success
2,620,275 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,521 UART:
2,682,537 UART: Running Caliptra FMC ...
2,682,945 UART:
2,682,999 UART: [state] CFI Enabled
2,693,322 UART: [fht] FMC Alias Private Key: 7
2,801,689 UART: [art] Extend RT PCRs Done
2,802,117 UART: [art] Lock RT PCRs Done
2,803,367 UART: [art] Populate DV Done
2,811,512 UART: [fht] FMC Alias Private Key: 7
2,812,480 UART: [art] Derive CDI
2,812,760 UART: [art] Store in in slot 0x4
2,898,521 UART: [art] Derive Key Pair
2,898,881 UART: [art] Store priv key in slot 0x5
2,911,561 UART: [art] Derive Key Pair - Done
2,926,497 UART: [art] Signing Cert with AUTHO
2,926,977 UART: RITY.KEYID = 7
2,942,155 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,920 UART: [art] PUB.X = D158887A2AC265AE4C92A7D6B83F3808DADEAAE91C1CF1B97EAE83CD57ADED4C51BD2BE5886E4DC27A169611A1A8A350
2,949,711 UART: [art] PUB.Y = C192C32CA582C556DC1CDAAB1770FCFED3781DE23CC5E61685314CA87BCFC5A7DDD41FFA0B950C88E465A58B08D7634B
2,956,674 UART: [art] SIG.R = BE4DF42D7733C0698FBF430DD6FAC92D658B6FE26C20890E2B7252278C6D20F4698153F5FF80F0161F901CF833BC3607
2,963,439 UART: [art] SIG.S = 2121D2257A0848316C5E504987ED01A646FCE2C9B1AEFA6721FE3D160A043D3B8FD8EBEB4459C1EF90D258B395EBED9C
2,987,166 UART: Caliptra RT
2,987,419 UART: [state] CFI Enabled
3,093,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,254 UART: [rt]cmd =0x54514754, len=24
3,126,543 >>> mbox cmd response data (8 bytes)
3,126,544 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,147 UART: [rt]cmd =0x44504543, len=36
3,194,140 >>> mbox cmd response data (24 bytes)
3,194,141 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,223,608 UART: [rt]cmd =0x47544744, len=8
3,225,147 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,829 UART: [state] LifecycleState = Unprovisioned
86,484 UART: [state] DebugLocked = No
87,148 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
891,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,118 UART: [kat] ++
896,270 UART: [kat] sha1
900,558 UART: [kat] SHA2-256
902,498 UART: [kat] SHA2-384
905,275 UART: [kat] SHA2-512-ACC
907,176 UART: [kat] ECC-384
916,835 UART: [kat] HMAC-384Kdf
921,431 UART: [kat] LMS
1,169,743 UART: [kat] --
1,170,798 UART: [cold-reset] ++
1,171,130 UART: [fht] FHT @ 0x50003400
1,173,860 UART: [idev] ++
1,174,028 UART: [idev] CDI.KEYID = 6
1,174,389 UART: [idev] SUBJECT.KEYID = 7
1,174,814 UART: [idev] UDS.KEYID = 0
1,175,160 ready_for_fw is high
1,175,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,200 UART: [idev] Erasing UDS.KEYID = 0
1,200,696 UART: [idev] Sha1 KeyId Algorithm
1,209,464 UART: [idev] --
1,210,441 UART: [ldev] ++
1,210,609 UART: [ldev] CDI.KEYID = 6
1,210,973 UART: [ldev] SUBJECT.KEYID = 5
1,211,400 UART: [ldev] AUTHORITY.KEYID = 7
1,211,863 UART: [ldev] FE.KEYID = 1
1,217,067 UART: [ldev] Erasing FE.KEYID = 1
1,243,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,727 UART: [ldev] --
1,283,219 UART: [fwproc] Wait for Commands...
1,283,948 UART: [fwproc] Recv command 0x46574c44
1,284,681 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,764 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,340 >>> mbox cmd response: success
2,771,340 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,772,457 UART: [afmc] ++
2,772,625 UART: [afmc] CDI.KEYID = 6
2,772,988 UART: [afmc] SUBJECT.KEYID = 7
2,773,414 UART: [afmc] AUTHORITY.KEYID = 5
2,809,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,518 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,247 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,130 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,576 UART: [afmc] --
2,852,704 UART: [cold-reset] --
2,853,528 UART: [state] Locking Datavault
2,854,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,185 UART: [state] Locking ICCM
2,855,679 UART: [exit] Launching FMC @ 0x40000130
2,861,008 UART:
2,861,024 UART: Running Caliptra FMC ...
2,861,432 UART:
2,861,575 UART: [state] CFI Enabled
2,872,264 UART: [fht] FMC Alias Private Key: 7
2,979,733 UART: [art] Extend RT PCRs Done
2,980,161 UART: [art] Lock RT PCRs Done
2,981,707 UART: [art] Populate DV Done
2,990,024 UART: [fht] FMC Alias Private Key: 7
2,991,078 UART: [art] Derive CDI
2,991,358 UART: [art] Store in in slot 0x4
3,077,055 UART: [art] Derive Key Pair
3,077,415 UART: [art] Store priv key in slot 0x5
3,091,085 UART: [art] Derive Key Pair - Done
3,106,201 UART: [art] Signing Cert with AUTHO
3,106,681 UART: RITY.KEYID = 7
3,122,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,786 UART: [art] PUB.X = FA309E5C002E3EDC205D3F346BE7B52363CB9F140C3C18AFD241960EC6883E1B359030C917189292EEBD1C25DBB61594
3,129,534 UART: [art] PUB.Y = 015F1C486861B9F0C85C2ABD2E94C94FD16B1ED38478D9BEA89C89C15F452742D675CE95BBF14F9D1F2C149CE5664D43
3,136,491 UART: [art] SIG.R = D26DBE00792CB102F27F9F895DE014B98CC74FEA0A91F7C3B896DDC7B4541E4A3A67BC77820FC62B904A4470941443D6
3,143,238 UART: [art] SIG.S = FD826ABAB943C5D1CEF4CBA9A6D7862C0C7264A10C3C97520A1DDB5A63C38DE1B1AAF87C3D5AAEA320BF6B04DCA99413
3,166,981 UART: Caliptra RT
3,167,326 UART: [state] CFI Enabled
3,274,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,176 UART: [rt]cmd =0x54514754, len=24
3,307,537 >>> mbox cmd response data (8 bytes)
3,307,538 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,237 UART: [rt]cmd =0x44504543, len=36
3,375,006 >>> mbox cmd response data (24 bytes)
3,375,007 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,484 UART: [rt]cmd =0x47544744, len=8
3,405,801 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,345 ready_for_fw is high
1,056,345 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,890 >>> mbox cmd response: success
2,620,890 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,683,022 UART:
2,683,038 UART: Running Caliptra FMC ...
2,683,446 UART:
2,683,589 UART: [state] CFI Enabled
2,694,378 UART: [fht] FMC Alias Private Key: 7
2,802,643 UART: [art] Extend RT PCRs Done
2,803,071 UART: [art] Lock RT PCRs Done
2,804,593 UART: [art] Populate DV Done
2,812,938 UART: [fht] FMC Alias Private Key: 7
2,814,056 UART: [art] Derive CDI
2,814,336 UART: [art] Store in in slot 0x4
2,900,023 UART: [art] Derive Key Pair
2,900,383 UART: [art] Store priv key in slot 0x5
2,913,737 UART: [art] Derive Key Pair - Done
2,928,459 UART: [art] Signing Cert with AUTHO
2,928,939 UART: RITY.KEYID = 7
2,944,485 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,250 UART: [art] PUB.X = 19773392E0E7B08B6DDF96D63851E57C15187C0F05B14947CD661D7D33DCFBF050D10B0BB5D43597987CB22D91FFD296
2,952,012 UART: [art] PUB.Y = 1A1F1D59DBDDC90C11623D04E3105699A443CDA76DAB2B3FCD3D28F6147473A388B42ED132A6BEAB160D2C0FCFC5FAC6
2,958,972 UART: [art] SIG.R = 363D6FA743FCF5E10E102B92966B5177F61C094FA20CE4C04BB1C8195D6DCEC90F2787DA36B95FD49477AB18E8AB3DED
2,965,746 UART: [art] SIG.S = 20D381E7740DF179C204B3D1BCC4A1D18285A90289A038479F20CADBAEC1038A02BD7F249540A64AFD598B6FBEB724A3
2,989,964 UART: Caliptra RT
2,990,309 UART: [state] CFI Enabled
3,098,034 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,824 UART: [rt]cmd =0x54514754, len=24
3,130,935 >>> mbox cmd response data (8 bytes)
3,130,936 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,571 UART: [rt]cmd =0x44504543, len=36
3,199,332 >>> mbox cmd response data (24 bytes)
3,199,333 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,720 UART: [rt]cmd =0x47544744, len=8
3,230,233 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,156 UART:
192,543 UART: Running Caliptra ROM ...
193,719 UART:
193,864 UART: [state] CFI Enabled
268,780 UART: [state] LifecycleState = Unprovisioned
270,765 UART: [state] DebugLocked = No
273,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,504 UART: [kat] SHA2-256
448,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,687 UART: [kat] ++
459,305 UART: [kat] sha1
469,612 UART: [kat] SHA2-256
472,327 UART: [kat] SHA2-384
478,874 UART: [kat] SHA2-512-ACC
481,242 UART: [kat] ECC-384
2,768,316 UART: [kat] HMAC-384Kdf
2,800,371 UART: [kat] LMS
3,990,669 UART: [kat] --
3,996,300 UART: [cold-reset] ++
3,998,291 UART: [fht] Storing FHT @ 0x50003400
4,009,901 UART: [idev] ++
4,010,468 UART: [idev] CDI.KEYID = 6
4,011,449 UART: [idev] SUBJECT.KEYID = 7
4,012,688 UART: [idev] UDS.KEYID = 0
4,013,730 ready_for_fw is high
4,013,926 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,130 UART: [idev] Erasing UDS.KEYID = 0
7,347,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,716 UART: [idev] --
7,371,280 UART: [ldev] ++
7,371,842 UART: [ldev] CDI.KEYID = 6
7,372,803 UART: [ldev] SUBJECT.KEYID = 5
7,374,006 UART: [ldev] AUTHORITY.KEYID = 7
7,375,295 UART: [ldev] FE.KEYID = 1
7,423,160 UART: [ldev] Erasing FE.KEYID = 1
10,757,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,903 UART: [ldev] --
13,136,562 UART: [fwproc] Waiting for Commands...
13,139,637 UART: [fwproc] Received command 0x46574c44
13,141,814 UART: [fwproc] Received Image of size 113844 bytes
17,193,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,903 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,818 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,659,080 >>> mbox cmd response: success
17,659,640 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,663,196 UART: [afmc] ++
17,663,840 UART: [afmc] CDI.KEYID = 6
17,664,715 UART: [afmc] SUBJECT.KEYID = 7
17,665,936 UART: [afmc] AUTHORITY.KEYID = 5
21,025,665 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,568 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,826 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,340,214 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,355,055 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,369,549 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,390,970 UART: [afmc] --
23,394,724 UART: [cold-reset] --
23,399,323 UART: [state] Locking Datavault
23,404,334 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,084 UART: [state] Locking ICCM
23,407,881 UART: [exit] Launching FMC @ 0x40000130
23,416,264 UART:
23,416,491 UART: Running Caliptra FMC ...
23,417,508 UART:
23,417,648 UART: [state] CFI Enabled
23,483,633 UART: [fht] FMC Alias Private Key: 7
25,821,386 UART: [art] Extend RT PCRs Done
25,822,602 UART: [art] Lock RT PCRs Done
25,824,467 UART: [art] Populate DV Done
25,829,868 UART: [fht] FMC Alias Private Key: 7
25,831,522 UART: [art] Derive CDI
25,832,256 UART: [art] Store in in slot 0x4
25,892,507 UART: [art] Derive Key Pair
25,893,544 UART: [art] Store priv key in slot 0x5
29,186,163 UART: [art] Derive Key Pair - Done
29,199,703 UART: [art] Signing Cert with AUTHO
29,201,005 UART: RITY.KEYID = 7
31,487,324 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,833 UART: [art] PUB.X = 4ADB264382EB7EC57320CC6EAA93EE739AFD1648D43B350688F13E29E61D141744F25BCE3E228F2CA08B461C3E8EC73A
31,496,078 UART: [art] PUB.Y = AD9131BF16A145EB5D62EAA0305762025EE4D2D5F4E569571B6DA47D351852A2C51F677714B387E552DDA24BF20159C8
31,503,308 UART: [art] SIG.R = A277982954F0438A5B1127C8DE837D13D73746283CD5EEBFC7A596B9B57E49EAA5B402E78AC84B38FFE3B5F9A1DD262D
31,510,689 UART: [art] SIG.S = 94D8C7C83071EB0E55423A856696CF14AFD5C185AAA6B23A17B17741A99949858298037495AC1B39A81430A2E9029B96
32,816,296 UART: Caliptra RT
32,816,992 UART: [state] CFI Enabled
32,998,310 UART: [rt] RT listening for mailbox commands...
33,030,046 UART: [rt]cmd =0x54514754, len=24
33,032,573 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,782,848 ready_for_fw is high
3,783,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,862,765 >>> mbox cmd response: success
17,863,935 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,547,554 UART:
23,547,963 UART: Running Caliptra FMC ...
23,549,088 UART:
23,549,245 UART: [state] CFI Enabled
23,615,526 UART: [fht] FMC Alias Private Key: 7
25,952,763 UART: [art] Extend RT PCRs Done
25,953,984 UART: [art] Lock RT PCRs Done
25,955,613 UART: [art] Populate DV Done
25,961,018 UART: [fht] FMC Alias Private Key: 7
25,962,657 UART: [art] Derive CDI
25,963,391 UART: [art] Store in in slot 0x4
26,022,794 UART: [art] Derive Key Pair
26,023,828 UART: [art] Store priv key in slot 0x5
29,316,689 UART: [art] Derive Key Pair - Done
29,329,365 UART: [art] Signing Cert with AUTHO
29,330,672 UART: RITY.KEYID = 7
31,617,729 UART: [art] Erasing AUTHORITY.KEYID = 7
31,619,236 UART: [art] PUB.X = CEF5EE02CB7D45A44D1BA5398F6E870E418119262725EC5BC3FF8B5CF3B5A8B2B926A45B0F6CE459E0A6D7AB0B04E79E
31,626,479 UART: [art] PUB.Y = EB1B2DE0E0EF4620E5E727BC63C285DDD5BF988E30383AF01EA47A5B0CB86EA462E97E90714EDCB4AD9F25ADA09414E0
31,633,761 UART: [art] SIG.R = D7F27DCF1A2D1C5DACA1A73DBB53D952643B1C9351FEDC591F0C0A14E30D4C8A0EFBFEADD668746326E387931CF5BF3C
31,641,194 UART: [art] SIG.S = 6070DA4F4B70D70CC17B0B0D274E8F099A3242FD75DBDE91DC1BBC34E1B0491D56316DF350F9DC11DE558D402824FB5D
32,946,759 UART: Caliptra RT
32,947,504 UART: [state] CFI Enabled
33,127,172 UART: [rt] RT listening for mailbox commands...
33,158,687 UART: [rt]cmd =0x54514754, len=24
33,160,919 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,422 UART:
192,780 UART: Running Caliptra ROM ...
193,973 UART:
603,484 UART: [state] CFI Enabled
620,132 UART: [state] LifecycleState = Unprovisioned
622,003 UART: [state] DebugLocked = No
623,549 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,889 UART: [kat] SHA2-256
798,516 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,102 UART: [kat] ++
809,548 UART: [kat] sha1
821,558 UART: [kat] SHA2-256
824,282 UART: [kat] SHA2-384
829,917 UART: [kat] SHA2-512-ACC
832,280 UART: [kat] ECC-384
3,116,629 UART: [kat] HMAC-384Kdf
3,127,515 UART: [kat] LMS
4,317,630 UART: [kat] --
4,320,938 UART: [cold-reset] ++
4,322,815 UART: [fht] Storing FHT @ 0x50003400
4,335,148 UART: [idev] ++
4,335,713 UART: [idev] CDI.KEYID = 6
4,336,765 UART: [idev] SUBJECT.KEYID = 7
4,337,941 UART: [idev] UDS.KEYID = 0
4,338,905 ready_for_fw is high
4,339,102 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,120 UART: [idev] Erasing UDS.KEYID = 0
7,621,972 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,935 UART: [idev] --
7,647,845 UART: [ldev] ++
7,648,411 UART: [ldev] CDI.KEYID = 6
7,649,384 UART: [ldev] SUBJECT.KEYID = 5
7,650,540 UART: [ldev] AUTHORITY.KEYID = 7
7,651,819 UART: [ldev] FE.KEYID = 1
7,663,165 UART: [ldev] Erasing FE.KEYID = 1
10,952,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,584 UART: [ldev] --
13,312,311 UART: [fwproc] Waiting for Commands...
13,314,626 UART: [fwproc] Received command 0x46574c44
13,316,809 UART: [fwproc] Received Image of size 113844 bytes
17,369,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,444,174 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,513,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,828,574 >>> mbox cmd response: success
17,829,250 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,832,903 UART: [afmc] ++
17,833,548 UART: [afmc] CDI.KEYID = 6
17,834,428 UART: [afmc] SUBJECT.KEYID = 7
17,835,704 UART: [afmc] AUTHORITY.KEYID = 5
21,153,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,448,523 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,827 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,465,153 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,480,017 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,494,443 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,511 UART: [afmc] --
23,519,515 UART: [cold-reset] --
23,524,353 UART: [state] Locking Datavault
23,530,471 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,172 UART: [state] Locking ICCM
23,533,542 UART: [exit] Launching FMC @ 0x40000130
23,541,930 UART:
23,542,160 UART: Running Caliptra FMC ...
23,543,188 UART:
23,543,337 UART: [state] CFI Enabled
23,551,221 UART: [fht] FMC Alias Private Key: 7
25,881,907 UART: [art] Extend RT PCRs Done
25,883,127 UART: [art] Lock RT PCRs Done
25,884,777 UART: [art] Populate DV Done
25,890,243 UART: [fht] FMC Alias Private Key: 7
25,891,937 UART: [art] Derive CDI
25,892,674 UART: [art] Store in in slot 0x4
25,935,162 UART: [art] Derive Key Pair
25,936,195 UART: [art] Store priv key in slot 0x5
29,178,819 UART: [art] Derive Key Pair - Done
29,191,856 UART: [art] Signing Cert with AUTHO
29,193,190 UART: RITY.KEYID = 7
31,472,863 UART: [art] Erasing AUTHORITY.KEYID = 7
31,474,376 UART: [art] PUB.X = 6D66558995C13708ECDBF4AED937F09C5D08351664910D4DC2385225F16A14DFCBA59220178179A024A01127188F0487
31,481,581 UART: [art] PUB.Y = E6275FDBFCDCFC762326E143382F3B7C656B2F9A35FF5E8929A9AAC0EE4592BB16B6689427E022931EC58F017D5D6269
31,488,820 UART: [art] SIG.R = 4103BD6D456FFCAB68CB92E4E0E8E6C99E62D43FF6FC644101C19EB61379A9AE7CAD2B05B0B99EDDE5B9BA8F592A75F8
31,496,230 UART: [art] SIG.S = 5AFE93E673FCA3D8DE2CFFC3B1F47E437DEA74F2A2BDA369ADDCEABD0895CD2754297637732768E899353258B202249B
32,801,675 UART: Caliptra RT
32,802,374 UART: [state] CFI Enabled
32,919,810 UART: [rt] RT listening for mailbox commands...
32,951,287 UART: [rt]cmd =0x54514754, len=24
32,953,632 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
4,132,632 ready_for_fw is high
4,133,044 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,083,679 >>> mbox cmd response: success
18,084,466 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,721,768 UART:
23,722,149 UART: Running Caliptra FMC ...
23,723,258 UART:
23,723,411 UART: [state] CFI Enabled
23,731,258 UART: [fht] FMC Alias Private Key: 7
26,061,218 UART: [art] Extend RT PCRs Done
26,062,437 UART: [art] Lock RT PCRs Done
26,064,285 UART: [art] Populate DV Done
26,069,655 UART: [fht] FMC Alias Private Key: 7
26,071,268 UART: [art] Derive CDI
26,072,113 UART: [art] Store in in slot 0x4
26,114,602 UART: [art] Derive Key Pair
26,115,601 UART: [art] Store priv key in slot 0x5
29,357,693 UART: [art] Derive Key Pair - Done
29,370,475 UART: [art] Signing Cert with AUTHO
29,371,778 UART: RITY.KEYID = 7
31,650,865 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,376 UART: [art] PUB.X = 28088565FD806904ADADE756B0398AFDAC36AC2489F8874C103B4FA234A8D15DC348AF63DDE37E667776DD21E620E430
31,659,616 UART: [art] PUB.Y = 0B5FDA060ECEE1C8279D0A7FDE0A82F1C2ADF45CC419D5570B3EE70373C9A06CF2BE444D86674EDA57ECEE413CEB5494
31,666,885 UART: [art] SIG.R = C1FFD174F472C6227FD231E5A2B4542F42447F48CC21BC00BC2B1C2FB624F4F968D54742A895A208778D231E8EB1747D
31,674,225 UART: [art] SIG.S = E14D350A392B8BA818C871FD85B6595B96790B90837B81C61AE6332ED9146606948AD16B4D667D1745E7968562A93159
32,978,944 UART: Caliptra RT
32,979,659 UART: [state] CFI Enabled
33,097,294 UART: [rt] RT listening for mailbox commands...
33,128,979 UART: [rt]cmd =0x54514754, len=24
33,131,546 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,229 UART:
192,603 UART: Running Caliptra ROM ...
193,800 UART:
193,966 UART: [state] CFI Enabled
264,108 UART: [state] LifecycleState = Unprovisioned
265,947 UART: [state] DebugLocked = No
268,619 UART: [state] WD Timer not started. Device not locked for debugging
272,089 UART: [kat] SHA2-256
451,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,793 UART: [kat] ++
463,329 UART: [kat] sha1
475,204 UART: [kat] SHA2-256
478,288 UART: [kat] SHA2-384
485,204 UART: [kat] SHA2-512-ACC
488,140 UART: [kat] ECC-384
2,947,337 UART: [kat] HMAC-384Kdf
2,971,958 UART: [kat] LMS
3,501,366 UART: [kat] --
3,504,506 UART: [cold-reset] ++
3,506,507 UART: [fht] FHT @ 0x50003400
3,517,551 UART: [idev] ++
3,518,122 UART: [idev] CDI.KEYID = 6
3,519,036 UART: [idev] SUBJECT.KEYID = 7
3,520,216 UART: [idev] UDS.KEYID = 0
3,521,214 ready_for_fw is high
3,521,405 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,966 UART: [idev] Erasing UDS.KEYID = 0
6,026,848 UART: [idev] Sha1 KeyId Algorithm
6,048,659 UART: [idev] --
6,053,167 UART: [ldev] ++
6,053,757 UART: [ldev] CDI.KEYID = 6
6,054,650 UART: [ldev] SUBJECT.KEYID = 5
6,055,888 UART: [ldev] AUTHORITY.KEYID = 7
6,057,131 UART: [ldev] FE.KEYID = 1
6,099,760 UART: [ldev] Erasing FE.KEYID = 1
8,604,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,564 UART: [ldev] --
10,411,584 UART: [fwproc] Wait for Commands...
10,413,189 UART: [fwproc] Recv command 0x46574c44
10,415,291 UART: [fwproc] Recv'd Img size: 114168 bytes
13,821,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,174 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,973 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,282,891 >>> mbox cmd response: success
14,283,466 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,286,638 UART: [afmc] ++
14,287,226 UART: [afmc] CDI.KEYID = 6
14,288,108 UART: [afmc] SUBJECT.KEYID = 7
14,289,323 UART: [afmc] AUTHORITY.KEYID = 5
16,827,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,569,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,571,193 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,586,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,602,989 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,618,861 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,641,323 UART: [afmc] --
18,644,276 UART: [cold-reset] --
18,647,758 UART: [state] Locking Datavault
18,653,759 UART: [state] Locking PCR0, PCR1 and PCR31
18,655,404 UART: [state] Locking ICCM
18,657,682 UART: [exit] Launching FMC @ 0x40000130
18,666,133 UART:
18,666,367 UART: Running Caliptra FMC ...
18,667,469 UART:
18,667,624 UART: [state] CFI Enabled
18,728,515 UART: [fht] FMC Alias Private Key: 7
20,492,976 UART: [art] Extend RT PCRs Done
20,494,178 UART: [art] Lock RT PCRs Done
20,495,612 UART: [art] Populate DV Done
20,501,295 UART: [fht] FMC Alias Private Key: 7
20,502,840 UART: [art] Derive CDI
20,503,652 UART: [art] Store in in slot 0x4
20,561,200 UART: [art] Derive Key Pair
20,562,237 UART: [art] Store priv key in slot 0x5
23,025,557 UART: [art] Derive Key Pair - Done
23,038,611 UART: [art] Signing Cert with AUTHO
23,039,932 UART: RITY.KEYID = 7
24,751,197 UART: [art] Erasing AUTHORITY.KEYID = 7
24,752,687 UART: [art] PUB.X = 4D9095E887C95380E88DCE4C4BA871B0531C5181580ACAB152792005484C1B2DFC7792D54479CAAE28CE91B083FCB706
24,759,969 UART: [art] PUB.Y = 0AA66E2312D59F9A4AE0686EC2518DE02E6371EFE2A9650ED96D9FB4AE4C13303EB468AAE54467EDE19A84D4424204FE
24,767,231 UART: [art] SIG.R = 28E0D77FC6C9D82A7D04341D8F05104ED4DC9B37AE30C9DB0C5D610C2706EB043EE951E9D30492E84CC04302CA074EEC
24,774,641 UART: [art] SIG.S = C256C5367BBF2803199F4CD236827D4253BC3E9797859B23544A897AD458BDE34A20E133529078250D02ACAF4445752F
25,753,077 UART: Caliptra RT
25,753,856 UART: [state] CFI Enabled
25,918,903 UART: [rt] RT listening for mailbox commands...
25,950,539 UART: [rt]cmd =0x54514754, len=24
25,952,944 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,360,058 ready_for_fw is high
3,360,639 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,032,094 >>> mbox cmd response: success
14,033,172 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,322,367 UART:
18,322,787 UART: Running Caliptra FMC ...
18,323,932 UART:
18,324,091 UART: [state] CFI Enabled
18,390,056 UART: [fht] FMC Alias Private Key: 7
20,154,079 UART: [art] Extend RT PCRs Done
20,155,293 UART: [art] Lock RT PCRs Done
20,157,027 UART: [art] Populate DV Done
20,162,706 UART: [fht] FMC Alias Private Key: 7
20,164,248 UART: [art] Derive CDI
20,165,062 UART: [art] Store in in slot 0x4
20,222,287 UART: [art] Derive Key Pair
20,223,354 UART: [art] Store priv key in slot 0x5
22,686,413 UART: [art] Derive Key Pair - Done
22,699,681 UART: [art] Signing Cert with AUTHO
22,700,991 UART: RITY.KEYID = 7
24,411,890 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,549 UART: [art] PUB.X = A4A2289F032205BD01798DD993A4F67FD912B42688D409F4B8ADBA5A954176B9C65553DEC673903D27757E38F1BB8412
24,420,687 UART: [art] PUB.Y = EFB885C690E99E264F4A3A5C67F8478C546776A27262158E5A69EBE30DFBB2843999CA5B43F8DB2CD6B9DF266F87B71F
24,427,936 UART: [art] SIG.R = 74993EB18C9BA80F8DD4F6A71EC20F77BD262CD58C817DC22D9BA22FA57A99FB9E00294F9FEA8B1F31FDB2724971FEF5
24,435,331 UART: [art] SIG.S = 055EE71D918FEE17B398EA91197C5BE6909A7D95E932C551802FDBAAFAB2F5550CEA5EAF5016DF4070E34B988E17ADA6
25,414,089 UART: Caliptra RT
25,414,795 UART: [state] CFI Enabled
25,579,619 UART: [rt] RT listening for mailbox commands...
25,611,302 UART: [rt]cmd =0x54514754, len=24
25,613,717 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,782 writing to cptra_bootfsm_go
193,960 UART:
194,333 UART: Running Caliptra ROM ...
195,518 UART:
605,281 UART: [state] CFI Enabled
620,100 UART: [state] LifecycleState = Unprovisioned
621,912 UART: [state] DebugLocked = No
624,354 UART: [state] WD Timer not started. Device not locked for debugging
628,815 UART: [kat] SHA2-256
807,911 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,501 UART: [kat] ++
819,965 UART: [kat] sha1
831,410 UART: [kat] SHA2-256
834,417 UART: [kat] SHA2-384
840,762 UART: [kat] SHA2-512-ACC
843,776 UART: [kat] ECC-384
3,283,229 UART: [kat] HMAC-384Kdf
3,295,382 UART: [kat] LMS
3,824,882 UART: [kat] --
3,829,090 UART: [cold-reset] ++
3,831,379 UART: [fht] FHT @ 0x50003400
3,843,418 UART: [idev] ++
3,843,988 UART: [idev] CDI.KEYID = 6
3,845,258 UART: [idev] SUBJECT.KEYID = 7
3,846,373 UART: [idev] UDS.KEYID = 0
3,847,300 ready_for_fw is high
3,847,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,733 UART: [idev] Erasing UDS.KEYID = 0
6,315,905 UART: [idev] Sha1 KeyId Algorithm
6,337,239 UART: [idev] --
6,341,104 UART: [ldev] ++
6,341,685 UART: [ldev] CDI.KEYID = 6
6,342,605 UART: [ldev] SUBJECT.KEYID = 5
6,343,765 UART: [ldev] AUTHORITY.KEYID = 7
6,345,052 UART: [ldev] FE.KEYID = 1
6,355,757 UART: [ldev] Erasing FE.KEYID = 1
8,830,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,017 UART: [ldev] --
10,621,636 UART: [fwproc] Wait for Commands...
10,624,504 UART: [fwproc] Recv command 0x46574c44
10,626,597 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,100,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,169,502 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,588 >>> mbox cmd response: success
14,488,159 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,492,391 UART: [afmc] ++
14,492,977 UART: [afmc] CDI.KEYID = 6
14,493,893 UART: [afmc] SUBJECT.KEYID = 7
14,495,050 UART: [afmc] AUTHORITY.KEYID = 5
16,998,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,241 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,126 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,792,755 UART: [afmc] --
18,797,379 UART: [cold-reset] --
18,802,747 UART: [state] Locking Datavault
18,808,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,727 UART: [state] Locking ICCM
18,812,294 UART: [exit] Launching FMC @ 0x40000130
18,820,695 UART:
18,820,931 UART: Running Caliptra FMC ...
18,821,958 UART:
18,822,108 UART: [state] CFI Enabled
18,830,342 UART: [fht] FMC Alias Private Key: 7
20,587,219 UART: [art] Extend RT PCRs Done
20,588,442 UART: [art] Lock RT PCRs Done
20,590,093 UART: [art] Populate DV Done
20,595,287 UART: [fht] FMC Alias Private Key: 7
20,596,903 UART: [art] Derive CDI
20,597,641 UART: [art] Store in in slot 0x4
20,640,558 UART: [art] Derive Key Pair
20,641,559 UART: [art] Store priv key in slot 0x5
23,068,168 UART: [art] Derive Key Pair - Done
23,080,958 UART: [art] Signing Cert with AUTHO
23,082,260 UART: RITY.KEYID = 7
24,788,166 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,674 UART: [art] PUB.X = D308853B36E89B2CF8B366F06E5D838881721AFD543E70FBD06A61B714007D465A00211DA36D4F0D800069554107987F
24,796,907 UART: [art] PUB.Y = 39641DC6DF78C3AE5448AED09DB6F6F46D6605D5FAF18A892EA36442A5803E97B72783305386F5301D07B7AE1FA9B27C
24,804,104 UART: [art] SIG.R = C25C01DBB9FA76209379540A9892B0B6C18940444B1CF4A0BF53A9A53CE2B9C02D9E88F824691A98C3357846E8AD7947
24,811,535 UART: [art] SIG.S = 063996E82E94165DB51530D2148B3D66BE847911CF4F7260F7491EC92605CB6251C5270D9497FD258DEB7336CE162FEF
25,790,779 UART: Caliptra RT
25,791,490 UART: [state] CFI Enabled
25,908,474 UART: [rt] RT listening for mailbox commands...
25,940,202 UART: [rt]cmd =0x54514754, len=24
25,942,596 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,772 writing to cptra_bootfsm_go
3,695,713 ready_for_fw is high
3,696,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,283,498 >>> mbox cmd response: success
14,284,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,535,161 UART:
18,535,558 UART: Running Caliptra FMC ...
18,536,748 UART:
18,536,948 UART: [state] CFI Enabled
18,544,897 UART: [fht] FMC Alias Private Key: 7
20,301,749 UART: [art] Extend RT PCRs Done
20,302,972 UART: [art] Lock RT PCRs Done
20,304,761 UART: [art] Populate DV Done
20,309,848 UART: [fht] FMC Alias Private Key: 7
20,311,440 UART: [art] Derive CDI
20,312,255 UART: [art] Store in in slot 0x4
20,354,806 UART: [art] Derive Key Pair
20,355,843 UART: [art] Store priv key in slot 0x5
22,782,763 UART: [art] Derive Key Pair - Done
22,795,863 UART: [art] Signing Cert with AUTHO
22,797,167 UART: RITY.KEYID = 7
24,502,247 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,749 UART: [art] PUB.X = 1F9471295491FAF542A2FE24C9F23A443B97DF73B3000A1E14561A1E8860F43CC1BCFC79C6D9D29043BED91EBA92F1CA
24,510,996 UART: [art] PUB.Y = CE292CEDD592F41D54C77C9B71A8F8D17A3A333DD80B8E6BFFF4E8B687F0FB825417214E5D4689EC6B67935BF44F19F7
24,518,322 UART: [art] SIG.R = E5A50CF59C4B7009C5905CFB4722B0051440FCCECF12BD0335B7125C9B469531DBEC2FD302309C0F8C951E76DFDBFEFD
24,525,729 UART: [art] SIG.S = E411C7633A724B8A3E2D84B493CD9E1D4E43063E8AB019DFCF3957DB8F4023C460583A1819A16300624503B907A02450
25,504,769 UART: Caliptra RT
25,505,484 UART: [state] CFI Enabled
25,622,741 UART: [rt] RT listening for mailbox commands...
25,654,348 UART: [rt]cmd =0x54514754, len=24
25,656,678 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
192,154 UART:
192,522 UART: Running Caliptra ROM ...
193,719 UART:
193,880 UART: [state] CFI Enabled
263,005 UART: [state] LifecycleState = Unprovisioned
265,360 UART: [state] DebugLocked = No
268,316 UART: [state] WD Timer not started. Device not locked for debugging
272,506 UART: [kat] SHA2-256
462,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,134 UART: [kat] ++
473,640 UART: [kat] sha1
484,895 UART: [kat] SHA2-256
487,937 UART: [kat] SHA2-384
493,935 UART: [kat] SHA2-512-ACC
496,521 UART: [kat] ECC-384
2,949,319 UART: [kat] HMAC-384Kdf
2,972,372 UART: [kat] LMS
3,504,098 UART: [kat] --
3,509,454 UART: [cold-reset] ++
3,511,339 UART: [fht] FHT @ 0x50003400
3,522,613 UART: [idev] ++
3,523,333 UART: [idev] CDI.KEYID = 6
3,524,376 UART: [idev] SUBJECT.KEYID = 7
3,525,486 UART: [idev] UDS.KEYID = 0
3,526,411 ready_for_fw is high
3,526,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,217 UART: [idev] Erasing UDS.KEYID = 0
6,026,037 UART: [idev] Sha1 KeyId Algorithm
6,048,050 UART: [idev] --
6,053,133 UART: [ldev] ++
6,053,822 UART: [ldev] CDI.KEYID = 6
6,054,741 UART: [ldev] SUBJECT.KEYID = 5
6,055,907 UART: [ldev] AUTHORITY.KEYID = 7
6,057,090 UART: [ldev] FE.KEYID = 1
6,099,504 UART: [ldev] Erasing FE.KEYID = 1
8,606,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,954 UART: [ldev] --
10,414,095 UART: [fwproc] Wait for Commands...
10,416,680 UART: [fwproc] Recv command 0x46574c44
10,418,991 UART: [fwproc] Recv'd Img size: 114168 bytes
13,855,763 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,595,025 >>> mbox cmd response: success
14,595,592 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,599,290 UART: [afmc] ++
14,599,989 UART: [afmc] CDI.KEYID = 6
14,601,167 UART: [afmc] SUBJECT.KEYID = 7
14,602,656 UART: [afmc] AUTHORITY.KEYID = 5
17,128,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,851,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,853,049 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,868,208 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,883,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,898,361 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,921,873 UART: [afmc] --
18,926,089 UART: [cold-reset] --
18,931,262 UART: [state] Locking Datavault
18,936,789 UART: [state] Locking PCR0, PCR1 and PCR31
18,938,941 UART: [state] Locking ICCM
18,940,340 UART: [exit] Launching FMC @ 0x40000130
18,949,025 UART:
18,949,306 UART: Running Caliptra FMC ...
18,950,418 UART:
18,950,580 UART: [state] CFI Enabled
19,007,642 UART: [fht] FMC Alias Private Key: 7
20,771,148 UART: [art] Extend RT PCRs Done
20,772,369 UART: [art] Lock RT PCRs Done
20,773,915 UART: [art] Populate DV Done
20,779,219 UART: [fht] FMC Alias Private Key: 7
20,780,866 UART: [art] Derive CDI
20,781,603 UART: [art] Store in in slot 0x4
20,839,773 UART: [art] Derive Key Pair
20,840,819 UART: [art] Store priv key in slot 0x5
23,303,946 UART: [art] Derive Key Pair - Done
23,317,158 UART: [art] Signing Cert with AUTHO
23,318,463 UART: RITY.KEYID = 7
25,029,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,030,729 UART: [art] PUB.X = 6D6FC6634D11A694E7A4A00593B5AD83728FA35A662F627EEE8C2C03D8C29753A5C47E86902DFAB3356953BDBF00B3D9
25,037,950 UART: [art] PUB.Y = 5AA281A2A81330086E3CFD4EA8C78C3CCA5BDB52379841624C869A4D2365EE33171BF30A8C298DB95F93648F42CB2AFE
25,045,209 UART: [art] SIG.R = C4EA9C9A6379DDD7E4A5EE967DD4E0F3E5885DDE658821450C21AC64D6A2964EB0184425EC8171FD78483ADC0B89240E
25,052,623 UART: [art] SIG.S = A7673B967CDD0473A6FBBD2277AE80084D53EFD130B96186F5A3299A95944962C0796785E2F40BE508FD5A4B6E257C44
26,031,273 UART: Caliptra RT
26,031,981 UART: [state] CFI Enabled
26,195,775 UART: [rt] RT listening for mailbox commands...
26,227,299 UART: [rt]cmd =0x54514754, len=24
26,229,533 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,438,374 ready_for_fw is high
3,438,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,730,294 >>> mbox cmd response: success
14,731,179 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,024,166 UART:
19,024,558 UART: Running Caliptra FMC ...
19,025,771 UART:
19,025,947 UART: [state] CFI Enabled
19,092,874 UART: [fht] FMC Alias Private Key: 7
20,856,292 UART: [art] Extend RT PCRs Done
20,857,520 UART: [art] Lock RT PCRs Done
20,859,287 UART: [art] Populate DV Done
20,864,705 UART: [fht] FMC Alias Private Key: 7
20,866,411 UART: [art] Derive CDI
20,867,150 UART: [art] Store in in slot 0x4
20,925,200 UART: [art] Derive Key Pair
20,926,267 UART: [art] Store priv key in slot 0x5
23,389,172 UART: [art] Derive Key Pair - Done
23,402,127 UART: [art] Signing Cert with AUTHO
23,403,425 UART: RITY.KEYID = 7
25,114,847 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,360 UART: [art] PUB.X = C3D2267894396E5A9B45AD9E0F1697F26E10AF19A8E1DE1D5D21AACAF0731C7F6B3E33678F10E0F6B717EADD90FB33C4
25,123,615 UART: [art] PUB.Y = 0988D0C19F7953BA41A6834138A674D7B5F8BE2FA5E81AA96566CC0FE35A9B218C530437380874A336558E4827F41347
25,130,886 UART: [art] SIG.R = D37772D9AC8C5564459FBFD8AB09968A83FB41F1069593FE21A7DC30AA8B32C088F987B9C61F33B34970E1AE2DA8BFDB
25,138,283 UART: [art] SIG.S = 93229A7E3072CBB93ECC09CD2AB028B65818A5FEA6034A7FF654A962A6CC2ECF47606DF9EF39ABB1C4882228557B456F
26,117,070 UART: Caliptra RT
26,117,768 UART: [state] CFI Enabled
26,281,628 UART: [rt] RT listening for mailbox commands...
26,312,983 UART: [rt]cmd =0x54514754, len=24
26,315,387 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
192,886 UART:
193,258 UART: Running Caliptra ROM ...
194,396 UART:
604,038 UART: [state] CFI Enabled
617,998 UART: [state] LifecycleState = Unprovisioned
620,366 UART: [state] DebugLocked = No
623,109 UART: [state] WD Timer not started. Device not locked for debugging
627,212 UART: [kat] SHA2-256
817,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,912 UART: [kat] ++
828,515 UART: [kat] sha1
840,127 UART: [kat] SHA2-256
843,103 UART: [kat] SHA2-384
848,958 UART: [kat] SHA2-512-ACC
851,573 UART: [kat] ECC-384
3,294,229 UART: [kat] HMAC-384Kdf
3,306,807 UART: [kat] LMS
3,838,667 UART: [kat] --
3,843,087 UART: [cold-reset] ++
3,845,023 UART: [fht] FHT @ 0x50003400
3,855,789 UART: [idev] ++
3,856,504 UART: [idev] CDI.KEYID = 6
3,857,538 UART: [idev] SUBJECT.KEYID = 7
3,858,642 UART: [idev] UDS.KEYID = 0
3,859,570 ready_for_fw is high
3,859,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,149 UART: [idev] Erasing UDS.KEYID = 0
6,337,065 UART: [idev] Sha1 KeyId Algorithm
6,358,910 UART: [idev] --
6,362,847 UART: [ldev] ++
6,363,557 UART: [ldev] CDI.KEYID = 6
6,364,471 UART: [ldev] SUBJECT.KEYID = 5
6,365,636 UART: [ldev] AUTHORITY.KEYID = 7
6,366,869 UART: [ldev] FE.KEYID = 1
6,377,731 UART: [ldev] Erasing FE.KEYID = 1
8,861,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,597 UART: [ldev] --
10,650,349 UART: [fwproc] Wait for Commands...
10,652,818 UART: [fwproc] Recv command 0x46574c44
10,655,126 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,592 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,302,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,843,570 >>> mbox cmd response: success
14,844,084 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,846,886 UART: [afmc] ++
14,847,601 UART: [afmc] CDI.KEYID = 6
14,848,799 UART: [afmc] SUBJECT.KEYID = 7
14,850,239 UART: [afmc] AUTHORITY.KEYID = 5
17,358,464 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,576 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,766 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,930 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,087 UART: [afmc] --
19,156,483 UART: [cold-reset] --
19,160,172 UART: [state] Locking Datavault
19,166,151 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,346 UART: [state] Locking ICCM
19,171,290 UART: [exit] Launching FMC @ 0x40000130
19,179,961 UART:
19,180,203 UART: Running Caliptra FMC ...
19,181,232 UART:
19,181,380 UART: [state] CFI Enabled
19,189,593 UART: [fht] FMC Alias Private Key: 7
20,946,268 UART: [art] Extend RT PCRs Done
20,947,487 UART: [art] Lock RT PCRs Done
20,949,088 UART: [art] Populate DV Done
20,954,614 UART: [fht] FMC Alias Private Key: 7
20,956,096 UART: [art] Derive CDI
20,956,863 UART: [art] Store in in slot 0x4
20,999,465 UART: [art] Derive Key Pair
21,000,504 UART: [art] Store priv key in slot 0x5
23,426,775 UART: [art] Derive Key Pair - Done
23,439,598 UART: [art] Signing Cert with AUTHO
23,440,901 UART: RITY.KEYID = 7
25,146,837 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,336 UART: [art] PUB.X = 5961272B057D38D24051873E113B8330E8104601167D31C137BCE821A56250435D9448B12F5A25C9D8A2A06F5C4977CC
25,155,583 UART: [art] PUB.Y = 6D48DB1AAF85A859EC86ED3CCF05A12B8561F945C3CA7C76A02E3B6DA1B4223C8AE8A9DF4BA83E818E16AAC2C1B64295
25,162,845 UART: [art] SIG.R = F55B7D11A235D7D89F052E49460EDD4C6A9392FF36467A90FBFB0A5A29A30CF359322E0CF81AE9D6871CC5D3AF047AA2
25,170,242 UART: [art] SIG.S = E9942DD155480A0B438425ED3721E74DFACE9A99BD5D274210A0375F7DE3775F030592BEBAFD10590079A1BF0499BA78
26,149,401 UART: Caliptra RT
26,150,088 UART: [state] CFI Enabled
26,268,167 UART: [rt] RT listening for mailbox commands...
26,299,664 UART: [rt]cmd =0x54514754, len=24
26,301,984 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,715 writing to cptra_bootfsm_go
3,754,811 ready_for_fw is high
3,755,209 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,949,611 >>> mbox cmd response: success
14,950,373 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,201,600 UART:
19,201,992 UART: Running Caliptra FMC ...
19,203,190 UART:
19,203,359 UART: [state] CFI Enabled
19,211,220 UART: [fht] FMC Alias Private Key: 7
20,967,915 UART: [art] Extend RT PCRs Done
20,969,146 UART: [art] Lock RT PCRs Done
20,971,126 UART: [art] Populate DV Done
20,976,486 UART: [fht] FMC Alias Private Key: 7
20,978,135 UART: [art] Derive CDI
20,978,901 UART: [art] Store in in slot 0x4
21,021,769 UART: [art] Derive Key Pair
21,022,779 UART: [art] Store priv key in slot 0x5
23,449,650 UART: [art] Derive Key Pair - Done
23,462,920 UART: [art] Signing Cert with AUTHO
23,464,232 UART: RITY.KEYID = 7
25,170,016 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,820 UART: [art] PUB.X = C41F7979754956645497C48DA34A2485CB4B9293FAC1FE96CBF696EA15C6C837860DEC7DBE84DEA27F7FECC10A3E44BB
25,178,795 UART: [art] PUB.Y = 33421A45029FEBBB7859B23DED47800FC764BB021392F51ED8B01DFC986BA65CC94C2839F0BA97193FE89FA471CBC5E7
25,186,032 UART: [art] SIG.R = 84EC6409AA874681C5DE9AB0477609721BA95AA1C8A0665173F8382AD0EC7016C3F18289DABB7555620A936BE904CA19
25,193,432 UART: [art] SIG.S = DAA0F89C06853320EC436C662F9CED7C28CF55B72574E9ADF62AEBBCEDCD4E4A0D0064B4198839169BC49617763311F4
26,172,532 UART: Caliptra RT
26,173,283 UART: [state] CFI Enabled
26,290,963 UART: [rt] RT listening for mailbox commands...
26,322,460 UART: [rt]cmd =0x54514754, len=24
26,324,756 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
85,845 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,353 UART: [kat] SHA2-256
881,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,399 UART: [kat] ++
885,551 UART: [kat] sha1
889,917 UART: [kat] SHA2-256
891,855 UART: [kat] SHA2-384
894,736 UART: [kat] SHA2-512-ACC
896,637 UART: [kat] ECC-384
902,492 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,265 UART: [cold-reset] ++
1,476,739 UART: [fht] Storing FHT @ 0x50003400
1,479,698 UART: [idev] ++
1,479,866 UART: [idev] CDI.KEYID = 6
1,480,226 UART: [idev] SUBJECT.KEYID = 7
1,480,650 UART: [idev] UDS.KEYID = 0
1,480,995 ready_for_fw is high
1,480,995 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,962 UART: [idev] Erasing UDS.KEYID = 0
1,505,636 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,306 UART: [idev] --
1,515,307 UART: [ldev] ++
1,515,475 UART: [ldev] CDI.KEYID = 6
1,515,838 UART: [ldev] SUBJECT.KEYID = 5
1,516,264 UART: [ldev] AUTHORITY.KEYID = 7
1,516,727 UART: [ldev] FE.KEYID = 1
1,521,585 UART: [ldev] Erasing FE.KEYID = 1
1,547,086 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,314 UART: [ldev] --
1,586,741 UART: [fwproc] Waiting for Commands...
1,587,516 UART: [fwproc] Received command 0x46574c44
1,588,307 UART: [fwproc] Received Image of size 114168 bytes
2,884,823 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,002 >>> mbox cmd response: success
3,076,002 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,077,156 UART: [afmc] ++
3,077,324 UART: [afmc] CDI.KEYID = 6
3,077,686 UART: [afmc] SUBJECT.KEYID = 7
3,078,111 UART: [afmc] AUTHORITY.KEYID = 5
3,113,208 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,394 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,787 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,477 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,208 UART: [afmc] --
3,156,194 UART: [cold-reset] --
3,157,240 UART: [state] Locking Datavault
3,158,497 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,101 UART: [state] Locking ICCM
3,159,603 UART: [exit] Launching FMC @ 0x40000130
3,164,932 UART:
3,164,948 UART: Running Caliptra FMC ...
3,165,356 UART:
3,165,410 UART: [state] CFI Enabled
3,175,427 UART: [fht] FMC Alias Private Key: 7
3,283,500 UART: [art] Extend RT PCRs Done
3,283,928 UART: [art] Lock RT PCRs Done
3,285,552 UART: [art] Populate DV Done
3,293,797 UART: [fht] FMC Alias Private Key: 7
3,294,897 UART: [art] Derive CDI
3,295,177 UART: [art] Store in in slot 0x4
3,381,362 UART: [art] Derive Key Pair
3,381,722 UART: [art] Store priv key in slot 0x5
3,395,016 UART: [art] Derive Key Pair - Done
3,409,585 UART: [art] Signing Cert with AUTHO
3,410,065 UART: RITY.KEYID = 7
3,425,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,084 UART: [art] PUB.X = 4E8866E42C7236F7765A498F98936D884217418C23F151848091614968F377F89EBB63F6A9441B12AF837CB5D51D9BEF
3,432,844 UART: [art] PUB.Y = D20D9D8C9009D6E6640E0A3CC48E59545F98E1856BCD41E70437234CFEF7F80749716511089D019E081FB426EBB6B438
3,439,765 UART: [art] SIG.R = 07C80232E9FC28A3ACE145CB50435B552265144D2799247A62FB6F91CF0D6914C83DB07FBBEE1C75B8AF744BA7D6C71E
3,446,536 UART: [art] SIG.S = 7BFAC275B2B4AF60355705AF54D40E39B4D50A4CF0F92B245F5FC5363E6E3F08E53983C0172E31BB1C8878D15E150F46
3,470,150 UART: Caliptra RT
3,470,403 UART: [state] CFI Enabled
3,579,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,943 UART: [rt]cmd =0x54514754, len=24
3,611,863 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,915 ready_for_fw is high
1,362,915 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,090 >>> mbox cmd response: success
2,928,090 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,989,906 UART:
2,989,922 UART: Running Caliptra FMC ...
2,990,330 UART:
2,990,384 UART: [state] CFI Enabled
3,000,855 UART: [fht] FMC Alias Private Key: 7
3,109,482 UART: [art] Extend RT PCRs Done
3,109,910 UART: [art] Lock RT PCRs Done
3,111,554 UART: [art] Populate DV Done
3,119,887 UART: [fht] FMC Alias Private Key: 7
3,120,975 UART: [art] Derive CDI
3,121,255 UART: [art] Store in in slot 0x4
3,206,658 UART: [art] Derive Key Pair
3,207,018 UART: [art] Store priv key in slot 0x5
3,220,494 UART: [art] Derive Key Pair - Done
3,235,168 UART: [art] Signing Cert with AUTHO
3,235,648 UART: RITY.KEYID = 7
3,251,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,985 UART: [art] PUB.X = 11978CFB55360F7C9EADA99745540BA1561AB08BD97D39E56E6B1F04C016CB5FEC80DEDCBA2F8F982ADC40346622CD7D
3,258,764 UART: [art] PUB.Y = 3707259B5F1511582DF8D2E1063AC681C650C425F0F54B4B13B733DB4BA906748659B00FC0544919CF28B63CE45190EC
3,265,698 UART: [art] SIG.R = C3690F9FBF4A98F5B4560292B0C3D4BB44AFF3B27768BEC59D90EAE251230DF1FF671EC63575E9397CE41C762FAC1F0C
3,272,472 UART: [art] SIG.S = F018DEE18DB98AF35AFAE73932C2AD2540934335F811722253D409CB759031463BD7E197D4F1FE4B558D2B4F21A1F6DD
3,296,034 UART: Caliptra RT
3,296,287 UART: [state] CFI Enabled
3,405,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,319 UART: [rt]cmd =0x54514754, len=24
3,438,375 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,962 UART: [kat] SHA2-256
881,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,008 UART: [kat] ++
886,160 UART: [kat] sha1
890,278 UART: [kat] SHA2-256
892,216 UART: [kat] SHA2-384
894,989 UART: [kat] SHA2-512-ACC
896,890 UART: [kat] ECC-384
902,685 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,646 UART: [cold-reset] ++
1,477,216 UART: [fht] Storing FHT @ 0x50003400
1,479,935 UART: [idev] ++
1,480,103 UART: [idev] CDI.KEYID = 6
1,480,463 UART: [idev] SUBJECT.KEYID = 7
1,480,887 UART: [idev] UDS.KEYID = 0
1,481,232 ready_for_fw is high
1,481,232 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,271 UART: [idev] --
1,515,250 UART: [ldev] ++
1,515,418 UART: [ldev] CDI.KEYID = 6
1,515,781 UART: [ldev] SUBJECT.KEYID = 5
1,516,207 UART: [ldev] AUTHORITY.KEYID = 7
1,516,670 UART: [ldev] FE.KEYID = 1
1,522,134 UART: [ldev] Erasing FE.KEYID = 1
1,547,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,849 UART: [ldev] --
1,587,238 UART: [fwproc] Waiting for Commands...
1,588,037 UART: [fwproc] Received command 0x46574c44
1,588,828 UART: [fwproc] Received Image of size 114168 bytes
2,885,936 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,350 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,193 >>> mbox cmd response: success
3,078,193 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,079,357 UART: [afmc] ++
3,079,525 UART: [afmc] CDI.KEYID = 6
3,079,887 UART: [afmc] SUBJECT.KEYID = 7
3,080,312 UART: [afmc] AUTHORITY.KEYID = 5
3,115,319 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,761 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,541 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,269 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,154 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,844 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,711 UART: [afmc] --
3,158,665 UART: [cold-reset] --
3,159,425 UART: [state] Locking Datavault
3,160,320 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,924 UART: [state] Locking ICCM
3,161,572 UART: [exit] Launching FMC @ 0x40000130
3,166,901 UART:
3,166,917 UART: Running Caliptra FMC ...
3,167,325 UART:
3,167,468 UART: [state] CFI Enabled
3,178,539 UART: [fht] FMC Alias Private Key: 7
3,286,664 UART: [art] Extend RT PCRs Done
3,287,092 UART: [art] Lock RT PCRs Done
3,288,834 UART: [art] Populate DV Done
3,297,001 UART: [fht] FMC Alias Private Key: 7
3,298,015 UART: [art] Derive CDI
3,298,295 UART: [art] Store in in slot 0x4
3,383,936 UART: [art] Derive Key Pair
3,384,296 UART: [art] Store priv key in slot 0x5
3,398,352 UART: [art] Derive Key Pair - Done
3,413,235 UART: [art] Signing Cert with AUTHO
3,413,715 UART: RITY.KEYID = 7
3,428,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,656 UART: [art] PUB.X = C687E316B5A08EB6F854E66777CD40B35A6C4A1B9876B4867246A6370037B8EBADDDF8342C1D96EC9187A8570CF64B7B
3,436,407 UART: [art] PUB.Y = 323F3801F93C071B2B162410B08D85453D52C9E2A9F8CA07E32F1A724135D2B736DE790DD55967A293B48380F0988D56
3,443,337 UART: [art] SIG.R = 80139012641944833E59CD12CB6B4DB8F365CA9E6BF4323D3229F2E2DAF260CF3760C1B7AD90AAEBA6A169E9848A376D
3,450,115 UART: [art] SIG.S = 407A3B58203FB6470D76EEEF7A8DB65A2A474CB4B36BB08464901B417C6460F3A48AC50B3DFCC363D96179A05B606E8D
3,473,712 UART: Caliptra RT
3,474,057 UART: [state] CFI Enabled
3,581,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,102 UART: [rt]cmd =0x54514754, len=24
3,613,790 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,922 ready_for_fw is high
1,362,922 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,641 >>> mbox cmd response: success
2,925,641 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,987,467 UART:
2,987,483 UART: Running Caliptra FMC ...
2,987,891 UART:
2,988,034 UART: [state] CFI Enabled
2,998,535 UART: [fht] FMC Alias Private Key: 7
3,105,980 UART: [art] Extend RT PCRs Done
3,106,408 UART: [art] Lock RT PCRs Done
3,107,850 UART: [art] Populate DV Done
3,116,039 UART: [fht] FMC Alias Private Key: 7
3,117,043 UART: [art] Derive CDI
3,117,323 UART: [art] Store in in slot 0x4
3,202,844 UART: [art] Derive Key Pair
3,203,204 UART: [art] Store priv key in slot 0x5
3,216,914 UART: [art] Derive Key Pair - Done
3,231,629 UART: [art] Signing Cert with AUTHO
3,232,109 UART: RITY.KEYID = 7
3,247,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,248 UART: [art] PUB.X = FA7F50E2D93CC34407D5779B063BA23789117B92D73AC76041D6A80C7531282E75AC4FD0D4ECAA06BF9B1CD274C5F119
3,255,014 UART: [art] PUB.Y = B4EC8E3F6DD04554FECCD97E5BA7853F648D6C9A1C9EBE313D0326669050DDFDCAA233988980A89078118D79C68C0364
3,261,966 UART: [art] SIG.R = 3F73906D569D100368B6E65D1643BD453B3BC6EB2167DFC88B8BF73A79AB2D24EA92504241786850D7F2D9AAA1F65178
3,268,735 UART: [art] SIG.S = 1656D5066DDF5CDBAFB7207DE460513C6BEB4986BA879A52065A249C60BD41C40D35DE4943E1750B8E1AC363D51451A2
3,293,088 UART: Caliptra RT
3,293,433 UART: [state] CFI Enabled
3,400,873 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,053 UART: [rt]cmd =0x54514754, len=24
3,432,627 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
906,216 UART: [kat] SHA2-512-ACC
908,117 UART: [kat] ECC-384
918,088 UART: [kat] HMAC-384Kdf
922,684 UART: [kat] LMS
1,171,012 UART: [kat] --
1,172,069 UART: [cold-reset] ++
1,172,443 UART: [fht] FHT @ 0x50003400
1,175,174 UART: [idev] ++
1,175,342 UART: [idev] CDI.KEYID = 6
1,175,702 UART: [idev] SUBJECT.KEYID = 7
1,176,126 UART: [idev] UDS.KEYID = 0
1,176,471 ready_for_fw is high
1,176,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,020 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,208,959 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,562 UART: [ldev] SUBJECT.KEYID = 5
1,210,988 UART: [ldev] AUTHORITY.KEYID = 7
1,211,451 UART: [ldev] FE.KEYID = 1
1,216,531 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,139 UART: [ldev] --
1,282,540 UART: [fwproc] Wait for Commands...
1,283,116 UART: [fwproc] Recv command 0x46574c44
1,283,844 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,020 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,324 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,957 >>> mbox cmd response: success
2,772,957 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,774,031 UART: [afmc] ++
2,774,199 UART: [afmc] CDI.KEYID = 6
2,774,561 UART: [afmc] SUBJECT.KEYID = 7
2,774,986 UART: [afmc] AUTHORITY.KEYID = 5
2,810,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,904 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,632 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,517 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,236 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,014 UART: [afmc] --
2,854,000 UART: [cold-reset] --
2,854,900 UART: [state] Locking Datavault
2,856,215 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,819 UART: [state] Locking ICCM
2,857,473 UART: [exit] Launching FMC @ 0x40000130
2,862,802 UART:
2,862,818 UART: Running Caliptra FMC ...
2,863,226 UART:
2,863,280 UART: [state] CFI Enabled
2,873,727 UART: [fht] FMC Alias Private Key: 7
2,981,780 UART: [art] Extend RT PCRs Done
2,982,208 UART: [art] Lock RT PCRs Done
2,983,966 UART: [art] Populate DV Done
2,992,051 UART: [fht] FMC Alias Private Key: 7
2,993,139 UART: [art] Derive CDI
2,993,419 UART: [art] Store in in slot 0x4
3,079,292 UART: [art] Derive Key Pair
3,079,652 UART: [art] Store priv key in slot 0x5
3,091,978 UART: [art] Derive Key Pair - Done
3,106,641 UART: [art] Signing Cert with AUTHO
3,107,121 UART: RITY.KEYID = 7
3,121,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,704 UART: [art] PUB.X = F0B5FCDB58A074D2F59DB6912DF12890ED6AEBCB111BEB3403AD88F8472952141F7A8CC7FAE4E7E1E48E7263B5D1A92D
3,129,491 UART: [art] PUB.Y = 05ABCE8C4B7EFFE3D16510D23DF76F94E2EB588CB68566CE7C685BF7BFC5211AF2B6DEA6B5534B23ECB226F80E8869FA
3,136,459 UART: [art] SIG.R = 876688CBAEBCAB92A5D2C67B6BC852E7DC6701AEFE196489F2816581CD7A3734BB5ED3AD75FB16A116A9001A31CCFC71
3,143,222 UART: [art] SIG.S = B810A280F623F2A418723538ED7C23926E7AB57703CBE9F5D2D983EFE0C97A487140A8DB7BCB74849E2413ECE5F026CB
3,166,742 UART: Caliptra RT
3,166,995 UART: [state] CFI Enabled
3,274,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,121 UART: [rt]cmd =0x54514754, len=24
3,307,125 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,619 ready_for_fw is high
1,060,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,786 >>> mbox cmd response: success
2,625,786 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,687,598 UART:
2,687,614 UART: Running Caliptra FMC ...
2,688,022 UART:
2,688,076 UART: [state] CFI Enabled
2,698,569 UART: [fht] FMC Alias Private Key: 7
2,806,058 UART: [art] Extend RT PCRs Done
2,806,486 UART: [art] Lock RT PCRs Done
2,807,742 UART: [art] Populate DV Done
2,815,871 UART: [fht] FMC Alias Private Key: 7
2,816,811 UART: [art] Derive CDI
2,817,091 UART: [art] Store in in slot 0x4
2,902,488 UART: [art] Derive Key Pair
2,902,848 UART: [art] Store priv key in slot 0x5
2,916,100 UART: [art] Derive Key Pair - Done
2,930,876 UART: [art] Signing Cert with AUTHO
2,931,356 UART: RITY.KEYID = 7
2,946,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,601 UART: [art] PUB.X = 25BBE4C5D3F7D41DAABAB71DDF59A2AEE395E320FE6C9532366A47324C402A89D28AF44E3A955A801C30D5E137F2A6CC
2,954,389 UART: [art] PUB.Y = BEB3204EB488DB9007456F5964CEB8C3F4B6AFD919A333E8C1A6AD274AED65B84FC458E902C84918BC7F203257EA8E2C
2,961,347 UART: [art] SIG.R = 8BFC1507437937682A6E8301A885FE448288DC42D126589F3158ACA2A82B078930CE7911B44DF0956EADEBC7742E53F2
2,968,106 UART: [art] SIG.S = 5EE603BADCE4AF02A8F7911F25F79406F7DC77D89DC48521FC372B456C0437E68748990A1054AA02E9128F6D491D09AB
2,991,750 UART: Caliptra RT
2,992,003 UART: [state] CFI Enabled
3,100,246 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,062 UART: [rt]cmd =0x54514754, len=24
3,132,944 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Unprovisioned
85,724 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,607 UART: [kat] SHA2-256
893,257 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,382 UART: [kat] ++
897,534 UART: [kat] sha1
901,836 UART: [kat] SHA2-256
903,776 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
918,093 UART: [kat] HMAC-384Kdf
922,877 UART: [kat] LMS
1,171,205 UART: [kat] --
1,172,198 UART: [cold-reset] ++
1,172,676 UART: [fht] FHT @ 0x50003400
1,175,241 UART: [idev] ++
1,175,409 UART: [idev] CDI.KEYID = 6
1,175,769 UART: [idev] SUBJECT.KEYID = 7
1,176,193 UART: [idev] UDS.KEYID = 0
1,176,538 ready_for_fw is high
1,176,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,305 UART: [idev] Erasing UDS.KEYID = 0
1,201,698 UART: [idev] Sha1 KeyId Algorithm
1,210,194 UART: [idev] --
1,211,198 UART: [ldev] ++
1,211,366 UART: [ldev] CDI.KEYID = 6
1,211,729 UART: [ldev] SUBJECT.KEYID = 5
1,212,155 UART: [ldev] AUTHORITY.KEYID = 7
1,212,618 UART: [ldev] FE.KEYID = 1
1,218,016 UART: [ldev] Erasing FE.KEYID = 1
1,244,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,740 UART: [ldev] --
1,284,245 UART: [fwproc] Wait for Commands...
1,284,833 UART: [fwproc] Recv command 0x46574c44
1,285,561 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,655 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,434 >>> mbox cmd response: success
2,774,434 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,775,566 UART: [afmc] ++
2,775,734 UART: [afmc] CDI.KEYID = 6
2,776,096 UART: [afmc] SUBJECT.KEYID = 7
2,776,521 UART: [afmc] AUTHORITY.KEYID = 5
2,812,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,197 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,925 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,810 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,529 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,463 UART: [afmc] --
2,855,569 UART: [cold-reset] --
2,856,313 UART: [state] Locking Datavault
2,857,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,962 UART: [state] Locking ICCM
2,858,556 UART: [exit] Launching FMC @ 0x40000130
2,863,885 UART:
2,863,901 UART: Running Caliptra FMC ...
2,864,309 UART:
2,864,452 UART: [state] CFI Enabled
2,875,379 UART: [fht] FMC Alias Private Key: 7
2,983,530 UART: [art] Extend RT PCRs Done
2,983,958 UART: [art] Lock RT PCRs Done
2,985,674 UART: [art] Populate DV Done
2,993,889 UART: [fht] FMC Alias Private Key: 7
2,994,889 UART: [art] Derive CDI
2,995,169 UART: [art] Store in in slot 0x4
3,080,832 UART: [art] Derive Key Pair
3,081,192 UART: [art] Store priv key in slot 0x5
3,094,968 UART: [art] Derive Key Pair - Done
3,109,698 UART: [art] Signing Cert with AUTHO
3,110,178 UART: RITY.KEYID = 7
3,125,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,126,259 UART: [art] PUB.X = B1F1CAC4F57791D721ECF0600DB0240E736C04ECD3E10E60D63D214FCFE516FA1D2C98FBA657711F8C0DB56F316743D6
3,133,028 UART: [art] PUB.Y = 0D5E7B64A2E8F50E01C5B0F1FE5C9128F8A144D706724A04A2EAD4780DB31646C71216D9D1BC6AE9FBCE063B72D6B06E
3,139,971 UART: [art] SIG.R = 79FB13D119F85CE37F3544948FEACB5A6F425AB98A9FD663D611068620E261AC348584082821646284F4B0EC6643D63C
3,146,731 UART: [art] SIG.S = 2EDA7F0A243D3AA9608AE6A5E2440D29B2076042FB18FC730042249420CD92D5DAA711F1E82D2046910960BE23C79D13
3,170,368 UART: Caliptra RT
3,170,713 UART: [state] CFI Enabled
3,278,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,718 UART: [rt]cmd =0x54514754, len=24
3,311,592 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 ready_for_fw is high
1,060,874 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,397 >>> mbox cmd response: success
2,626,397 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,688,875 UART:
2,688,891 UART: Running Caliptra FMC ...
2,689,299 UART:
2,689,442 UART: [state] CFI Enabled
2,699,847 UART: [fht] FMC Alias Private Key: 7
2,808,724 UART: [art] Extend RT PCRs Done
2,809,152 UART: [art] Lock RT PCRs Done
2,810,776 UART: [art] Populate DV Done
2,818,923 UART: [fht] FMC Alias Private Key: 7
2,820,003 UART: [art] Derive CDI
2,820,283 UART: [art] Store in in slot 0x4
2,905,780 UART: [art] Derive Key Pair
2,906,140 UART: [art] Store priv key in slot 0x5
2,919,272 UART: [art] Derive Key Pair - Done
2,934,059 UART: [art] Signing Cert with AUTHO
2,934,539 UART: RITY.KEYID = 7
2,949,419 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,184 UART: [art] PUB.X = D2259BFC7672B99430114B4269C11536ABEA16F5DE44919E625940B7E395B47FAF6FBF4D8E8DACE1551C748F33344C4E
2,956,960 UART: [art] PUB.Y = 3C7826E19B7708077B83067EBFDC1E0E28495B92F124838692E04385EB5333059A9F52662BE0A45EC96810C4B3ED1B72
2,963,889 UART: [art] SIG.R = 83C03A23441F29E1154A636497C9F31B266E80F8D044808BF9F6C82E183A3BB0A629E766B7C45623380EE29158E4BCF2
2,970,652 UART: [art] SIG.S = 41781F521D735B15F62C18BBE7319926A099F25DCCE1FBF92442E7BF0EE823F44511FDBF8A0187C13AF55495D4D37C38
2,994,317 UART: Caliptra RT
2,994,662 UART: [state] CFI Enabled
3,101,717 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,215 UART: [rt]cmd =0x54514754, len=24
3,133,871 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,977 UART: [kat] ++
895,129 UART: [kat] sha1
899,201 UART: [kat] SHA2-256
901,141 UART: [kat] SHA2-384
903,774 UART: [kat] SHA2-512-ACC
905,675 UART: [kat] ECC-384
915,356 UART: [kat] HMAC-384Kdf
920,032 UART: [kat] LMS
1,168,344 UART: [kat] --
1,169,449 UART: [cold-reset] ++
1,169,835 UART: [fht] FHT @ 0x50003400
1,172,409 UART: [idev] ++
1,172,577 UART: [idev] CDI.KEYID = 6
1,172,938 UART: [idev] SUBJECT.KEYID = 7
1,173,363 UART: [idev] UDS.KEYID = 0
1,173,709 ready_for_fw is high
1,173,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,239 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,206,943 UART: [idev] --
1,207,862 UART: [ldev] ++
1,208,030 UART: [ldev] CDI.KEYID = 6
1,208,394 UART: [ldev] SUBJECT.KEYID = 5
1,208,821 UART: [ldev] AUTHORITY.KEYID = 7
1,209,284 UART: [ldev] FE.KEYID = 1
1,214,424 UART: [ldev] Erasing FE.KEYID = 1
1,240,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,340 UART: [ldev] --
1,279,828 UART: [fwproc] Wait for Commands...
1,280,617 UART: [fwproc] Recv command 0x46574c44
1,281,350 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,734 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,043 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,651 >>> mbox cmd response: success
2,769,651 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,770,744 UART: [afmc] ++
2,770,912 UART: [afmc] CDI.KEYID = 6
2,771,275 UART: [afmc] SUBJECT.KEYID = 7
2,771,701 UART: [afmc] AUTHORITY.KEYID = 5
2,807,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,241 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,970 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,853 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,572 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,565 UART: [afmc] --
2,850,641 UART: [cold-reset] --
2,851,567 UART: [state] Locking Datavault
2,852,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,146 UART: [state] Locking ICCM
2,853,818 UART: [exit] Launching FMC @ 0x40000130
2,859,147 UART:
2,859,163 UART: Running Caliptra FMC ...
2,859,571 UART:
2,859,625 UART: [state] CFI Enabled
2,869,970 UART: [fht] FMC Alias Private Key: 7
2,978,157 UART: [art] Extend RT PCRs Done
2,978,585 UART: [art] Lock RT PCRs Done
2,980,013 UART: [art] Populate DV Done
2,988,256 UART: [fht] FMC Alias Private Key: 7
2,989,278 UART: [art] Derive CDI
2,989,558 UART: [art] Store in in slot 0x4
3,074,879 UART: [art] Derive Key Pair
3,075,239 UART: [art] Store priv key in slot 0x5
3,088,349 UART: [art] Derive Key Pair - Done
3,102,895 UART: [art] Signing Cert with AUTHO
3,103,375 UART: RITY.KEYID = 7
3,118,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,028 UART: [art] PUB.X = 0AB402554DE5D5AF79EE208E96B982039540EBE9E6C50E52538FDE1D87DEFC2FA431409EB527DC2B41A76ABA83C579A3
3,125,800 UART: [art] PUB.Y = C5722356E0FBBF425EC55C4BF2E0512C6634FE0B2425944D0CC4960059C9989E44215EE952E9BE377E3DA696A2E3E37A
3,132,726 UART: [art] SIG.R = 57198ADA6E408892A7CDCA8C73AD36DF35107EF6CE181BAB5D457D270A6CD8FF1D1A4742B6136107D30FA91D043A7DF0
3,139,498 UART: [art] SIG.S = 6ABDC384A2FF97C50DB83AE7B0748BB7370BA380D0BCF77E258B4F21F947B7D962C53ABBE4F8888E07162DE9F9436E87
3,163,154 UART: Caliptra RT
3,163,407 UART: [state] CFI Enabled
3,270,934 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,301,442 UART: [rt]cmd =0x54514754, len=24
3,303,132 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,170 ready_for_fw is high
1,056,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,133 >>> mbox cmd response: success
2,621,133 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,939 UART:
2,682,955 UART: Running Caliptra FMC ...
2,683,363 UART:
2,683,417 UART: [state] CFI Enabled
2,694,144 UART: [fht] FMC Alias Private Key: 7
2,801,547 UART: [art] Extend RT PCRs Done
2,801,975 UART: [art] Lock RT PCRs Done
2,803,619 UART: [art] Populate DV Done
2,811,740 UART: [fht] FMC Alias Private Key: 7
2,812,832 UART: [art] Derive CDI
2,813,112 UART: [art] Store in in slot 0x4
2,898,603 UART: [art] Derive Key Pair
2,898,963 UART: [art] Store priv key in slot 0x5
2,912,287 UART: [art] Derive Key Pair - Done
2,927,064 UART: [art] Signing Cert with AUTHO
2,927,544 UART: RITY.KEYID = 7
2,942,946 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,711 UART: [art] PUB.X = DE8E064D19C943482ECFDE5AFD71E651334B040C9F039ED8436984AE3546DB1453761F8394540303ACBDCF4C7979A3C4
2,950,467 UART: [art] PUB.Y = 0DA43C453778D253592B1DD9E63A2798D3AA5971F2BAF8A71E19B00751EF397B7171DD2CA485D3CCC05CF77CA743EC99
2,957,421 UART: [art] SIG.R = B2B1396A805397413119FBFB2E3606935C0AF9FCF7DD15F9BA3BCFD3954C11E55D72C02F56CFD019B1D17287FEC33F16
2,964,197 UART: [art] SIG.S = 17ABA2F64C61F259A4BF01ED716ACAFECE6B05BEF9357859F43AD8D202CAD9D52ABDF27FD56B1D70665F1A5E2FDB1286
2,988,319 UART: Caliptra RT
2,988,572 UART: [state] CFI Enabled
3,096,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,199 UART: [rt]cmd =0x54514754, len=24
3,128,969 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,234 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
891,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,274 UART: [kat] ++
895,426 UART: [kat] sha1
899,600 UART: [kat] SHA2-256
901,540 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,929 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 ready_for_fw is high
1,174,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,198,452 UART: [idev] Sha1 KeyId Algorithm
1,207,454 UART: [idev] --
1,208,457 UART: [ldev] ++
1,208,625 UART: [ldev] CDI.KEYID = 6
1,208,989 UART: [ldev] SUBJECT.KEYID = 5
1,209,416 UART: [ldev] AUTHORITY.KEYID = 7
1,209,879 UART: [ldev] FE.KEYID = 1
1,214,929 UART: [ldev] Erasing FE.KEYID = 1
1,240,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,605 UART: [ldev] --
1,280,081 UART: [fwproc] Wait for Commands...
1,280,876 UART: [fwproc] Recv command 0x46574c44
1,281,609 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,453 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,208 >>> mbox cmd response: success
2,769,208 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,770,295 UART: [afmc] ++
2,770,463 UART: [afmc] CDI.KEYID = 6
2,770,826 UART: [afmc] SUBJECT.KEYID = 7
2,771,252 UART: [afmc] AUTHORITY.KEYID = 5
2,807,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,823,489 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,240 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,969 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,852 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,571 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,849,398 UART: [afmc] --
2,850,490 UART: [cold-reset] --
2,851,214 UART: [state] Locking Datavault
2,852,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,097 UART: [state] Locking ICCM
2,853,575 UART: [exit] Launching FMC @ 0x40000130
2,858,904 UART:
2,858,920 UART: Running Caliptra FMC ...
2,859,328 UART:
2,859,471 UART: [state] CFI Enabled
2,869,980 UART: [fht] FMC Alias Private Key: 7
2,978,121 UART: [art] Extend RT PCRs Done
2,978,549 UART: [art] Lock RT PCRs Done
2,980,445 UART: [art] Populate DV Done
2,988,634 UART: [fht] FMC Alias Private Key: 7
2,989,696 UART: [art] Derive CDI
2,989,976 UART: [art] Store in in slot 0x4
3,075,371 UART: [art] Derive Key Pair
3,075,731 UART: [art] Store priv key in slot 0x5
3,089,333 UART: [art] Derive Key Pair - Done
3,103,807 UART: [art] Signing Cert with AUTHO
3,104,287 UART: RITY.KEYID = 7
3,119,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,696 UART: [art] PUB.X = 8DEB931FC347B9E988AFCEF3F54DA4C5D1654876FBE3EBF301D9DD9B1457D212E9D574AEC6A855440112A71E774BECF0
3,127,478 UART: [art] PUB.Y = CD7AD3F5E696B2EEE2B4030ACA7503E4942B0C57C423832C2A9B81D93A90E4E1266BF9818F1A9FC02F96E48DFD5DF0AA
3,134,434 UART: [art] SIG.R = 9C58B29B799CE5A5EC0BB0A8D35808658996B29231FB1A1BCA28FE4A8C86CDB8F8E3BF1CCEE141DFD2C85C88BD3F80CD
3,141,224 UART: [art] SIG.S = 182C28C791BA3FDC42064D4D41DA748E559B0F08BCF389B557235D7F4F9DC95D744CB945B6F49D5CDE7A56F9A7D138D7
3,165,136 UART: Caliptra RT
3,165,481 UART: [state] CFI Enabled
3,273,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,424 UART: [rt]cmd =0x54514754, len=24
3,305,198 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,583 ready_for_fw is high
1,055,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,898 >>> mbox cmd response: success
2,619,898 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,682,042 UART:
2,682,058 UART: Running Caliptra FMC ...
2,682,466 UART:
2,682,609 UART: [state] CFI Enabled
2,693,136 UART: [fht] FMC Alias Private Key: 7
2,801,479 UART: [art] Extend RT PCRs Done
2,801,907 UART: [art] Lock RT PCRs Done
2,803,195 UART: [art] Populate DV Done
2,811,418 UART: [fht] FMC Alias Private Key: 7
2,812,560 UART: [art] Derive CDI
2,812,840 UART: [art] Store in in slot 0x4
2,898,581 UART: [art] Derive Key Pair
2,898,941 UART: [art] Store priv key in slot 0x5
2,911,937 UART: [art] Derive Key Pair - Done
2,926,591 UART: [art] Signing Cert with AUTHO
2,927,071 UART: RITY.KEYID = 7
2,942,303 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,068 UART: [art] PUB.X = F94C6203EA0B0919311AC2F1FAA8C0A046CBADDDD14125AB57AEA5B9819F45CEABD171617F936457EB2C05809C8F04F8
2,949,839 UART: [art] PUB.Y = C66D363C05F39D620725F7B7F9D7BE1EBFAD2803CC7D7A3973F41A72478EF308175AFDF7738B015A7A18C65D506D93EC
2,956,784 UART: [art] SIG.R = 707BB0D51C0C2A171C5B9886E6ECF48D4F4001B0A8A1AF42C9D79FF8F189A91960022411DD5C097EFDC25642D0E69D7B
2,963,552 UART: [art] SIG.S = 0E93EFFBE08E0873014C1BC19968AC7AE93CF4AF86071B46E1E61663AE39B1E5DEA898C172B94285F3867705BA03020F
2,987,099 UART: Caliptra RT
2,987,444 UART: [state] CFI Enabled
3,094,909 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,141 UART: [rt]cmd =0x54514754, len=24
3,126,857 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,055 UART:
192,421 UART: Running Caliptra ROM ...
193,505 UART:
193,645 UART: [state] CFI Enabled
264,320 UART: [state] LifecycleState = Unprovisioned
266,330 UART: [state] DebugLocked = No
268,006 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,791 UART: [kat] SHA2-256
443,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,961 UART: [kat] ++
454,473 UART: [kat] sha1
465,348 UART: [kat] SHA2-256
468,003 UART: [kat] SHA2-384
474,128 UART: [kat] SHA2-512-ACC
476,483 UART: [kat] ECC-384
2,767,022 UART: [kat] HMAC-384Kdf
2,780,491 UART: [kat] LMS
3,970,743 UART: [kat] --
3,976,224 UART: [cold-reset] ++
3,978,433 UART: [fht] Storing FHT @ 0x50003400
3,990,325 UART: [idev] ++
3,990,885 UART: [idev] CDI.KEYID = 6
3,991,911 UART: [idev] SUBJECT.KEYID = 7
3,993,075 UART: [idev] UDS.KEYID = 0
3,994,054 ready_for_fw is high
3,994,243 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,137,439 UART: [idev] Erasing UDS.KEYID = 0
7,327,253 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,043 UART: [idev] --
7,353,635 UART: [ldev] ++
7,354,260 UART: [ldev] CDI.KEYID = 6
7,355,216 UART: [ldev] SUBJECT.KEYID = 5
7,356,429 UART: [ldev] AUTHORITY.KEYID = 7
7,357,648 UART: [ldev] FE.KEYID = 1
7,401,175 UART: [ldev] Erasing FE.KEYID = 1
10,730,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,350 UART: [ldev] --
13,091,264 UART: [fwproc] Waiting for Commands...
13,094,220 UART: [fwproc] Received command 0x46574c44
13,096,407 UART: [fwproc] Received Image of size 113844 bytes
17,144,954 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,121 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,607,095 >>> mbox cmd response: success
17,607,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,611,549 UART: [afmc] ++
17,612,198 UART: [afmc] CDI.KEYID = 6
17,613,078 UART: [afmc] SUBJECT.KEYID = 7
17,614,349 UART: [afmc] AUTHORITY.KEYID = 5
20,981,673 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,276,436 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,278,687 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,293,083 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,307,950 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,322,388 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,342,854 UART: [afmc] --
23,346,396 UART: [cold-reset] --
23,350,411 UART: [state] Locking Datavault
23,356,242 UART: [state] Locking PCR0, PCR1 and PCR31
23,357,929 UART: [state] Locking ICCM
23,359,341 UART: [exit] Launching FMC @ 0x40000130
23,367,731 UART:
23,367,962 UART: Running Caliptra FMC ...
23,368,985 UART:
23,369,128 UART: [state] CFI Enabled
23,435,115 UART: [fht] FMC Alias Private Key: 7
25,772,819 UART: [art] Extend RT PCRs Done
25,774,036 UART: [art] Lock RT PCRs Done
25,775,846 UART: [art] Populate DV Done
25,781,247 UART: [fht] FMC Alias Private Key: 7
25,782,794 UART: [art] Derive CDI
25,783,522 UART: [art] Store in in slot 0x4
25,843,442 UART: [art] Derive Key Pair
25,844,481 UART: [art] Store priv key in slot 0x5
29,137,408 UART: [art] Derive Key Pair - Done
29,150,241 UART: [art] Signing Cert with AUTHO
29,151,537 UART: RITY.KEYID = 7
31,438,342 UART: [art] Erasing AUTHORITY.KEYID = 7
31,439,852 UART: [art] PUB.X = F90DE9AE96C3C683CA2CA7D5AB5D029D37DED270AE5FA8B899E0C96AFEF4B4976EED9361143910BA8C57A719247E0389
31,447,073 UART: [art] PUB.Y = FD8305623D253A90C33ED866034462FF042AEF2437C769C0F57A70CFE0FC69510990F4836AE07F6853C51E0EBEA93ED5
31,454,354 UART: [art] SIG.R = D502FB150125A1E1E0B84AFCBEF33B1418557A1BA66015E2883F591CF5A144F40437948C212E2B909471EF6E7C2BF63D
31,461,728 UART: [art] SIG.S = 51E5FB452F7E61234304F12126989227B1429D9272AA8755EDD9BF4EB1DC80ADB2671F66FCB188D8973908D81D035AAB
32,766,590 UART: Caliptra RT
32,767,287 UART: [state] CFI Enabled
32,928,806 UART: [rt] RT listening for mailbox commands...
32,960,704 UART: [rt]cmd =0x44504543, len=96
33,010,153 >>> mbox cmd response data (56 bytes)
33,011,442 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,041,359 UART: [rt]cmd =0x54514754, len=24
33,043,830 >>> mbox cmd response: failed
33,044,314 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,074,327 UART: [rt]cmd =0x54514754, len=24
33,077,027 >>> mbox cmd response data (8 bytes)
33,077,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,108,228 UART: [rt]cmd =0x44504543, len=96
33,158,805 >>> mbox cmd response data (56 bytes)
33,159,507 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,189,190 UART: [rt]cmd =0x47544744, len=8
33,192,269 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,804,512 ready_for_fw is high
3,805,147 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,877,174 >>> mbox cmd response: success
17,877,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,560,626 UART:
23,561,047 UART: Running Caliptra FMC ...
23,562,190 UART:
23,562,346 UART: [state] CFI Enabled
23,632,325 UART: [fht] FMC Alias Private Key: 7
25,969,963 UART: [art] Extend RT PCRs Done
25,971,183 UART: [art] Lock RT PCRs Done
25,972,912 UART: [art] Populate DV Done
25,978,319 UART: [fht] FMC Alias Private Key: 7
25,979,910 UART: [art] Derive CDI
25,980,719 UART: [art] Store in in slot 0x4
26,040,914 UART: [art] Derive Key Pair
26,041,913 UART: [art] Store priv key in slot 0x5
29,334,624 UART: [art] Derive Key Pair - Done
29,347,588 UART: [art] Signing Cert with AUTHO
29,348,891 UART: RITY.KEYID = 7
31,635,928 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,460 UART: [art] PUB.X = EF6D7968836DD54119611D6A173D296A543E17CEBB891C7A3DCCC532B062C0CEF0216409BA8BC3E0235810D43C20B9CA
31,644,840 UART: [art] PUB.Y = 818E40052C57E99B2D1E997092EF134365E019300BD1323271571CFB35F74A51F41740BA145F34D73405E07289ADDFB4
31,651,945 UART: [art] SIG.R = 498259024FA0563D673CA7F485139A75D9C5B0368830BFF61B98B46BF3F0B91282FDAD84DCD3E4098BB2BAD4204BDCC9
31,659,323 UART: [art] SIG.S = 468380422ABE39345F96D87CCDDC810E02BAD79E31FFE271EF27DBF2DC7E2829F325A4FE5BFE0835F99D0BB981A7E6B6
32,964,370 UART: Caliptra RT
32,965,091 UART: [state] CFI Enabled
33,126,832 UART: [rt] RT listening for mailbox commands...
33,159,166 UART: [rt]cmd =0x44504543, len=96
33,206,780 >>> mbox cmd response data (56 bytes)
33,208,209 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,238,503 UART: [rt]cmd =0x54514754, len=24
33,240,638 >>> mbox cmd response: failed
33,241,082 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,270,960 UART: [rt]cmd =0x54514754, len=24
33,273,688 >>> mbox cmd response data (8 bytes)
33,274,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,305,024 UART: [rt]cmd =0x44504543, len=96
33,355,673 >>> mbox cmd response data (56 bytes)
33,356,398 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,386,329 UART: [rt]cmd =0x47544744, len=8
33,389,357 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,315 UART:
192,688 UART: Running Caliptra ROM ...
193,892 UART:
603,614 UART: [state] CFI Enabled
616,486 UART: [state] LifecycleState = Unprovisioned
618,432 UART: [state] DebugLocked = No
620,386 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,978 UART: [kat] SHA2-256
794,707 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,285 UART: [kat] ++
805,735 UART: [kat] sha1
817,124 UART: [kat] SHA2-256
819,815 UART: [kat] SHA2-384
824,744 UART: [kat] SHA2-512-ACC
827,113 UART: [kat] ECC-384
3,111,788 UART: [kat] HMAC-384Kdf
3,124,468 UART: [kat] LMS
4,314,587 UART: [kat] --
4,319,192 UART: [cold-reset] ++
4,320,786 UART: [fht] Storing FHT @ 0x50003400
4,332,222 UART: [idev] ++
4,332,828 UART: [idev] CDI.KEYID = 6
4,333,806 UART: [idev] SUBJECT.KEYID = 7
4,334,985 UART: [idev] UDS.KEYID = 0
4,336,074 ready_for_fw is high
4,336,299 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,221 UART: [idev] Erasing UDS.KEYID = 0
7,622,660 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,273 UART: [idev] --
7,649,748 UART: [ldev] ++
7,650,319 UART: [ldev] CDI.KEYID = 6
7,651,339 UART: [ldev] SUBJECT.KEYID = 5
7,652,499 UART: [ldev] AUTHORITY.KEYID = 7
7,653,727 UART: [ldev] FE.KEYID = 1
7,666,185 UART: [ldev] Erasing FE.KEYID = 1
10,956,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,358 UART: [ldev] --
13,313,784 UART: [fwproc] Waiting for Commands...
13,316,528 UART: [fwproc] Received command 0x46574c44
13,318,713 UART: [fwproc] Received Image of size 113844 bytes
17,365,716 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,438,818 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,507,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,824,564 >>> mbox cmd response: success
17,825,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,828,746 UART: [afmc] ++
17,829,341 UART: [afmc] CDI.KEYID = 6
17,830,284 UART: [afmc] SUBJECT.KEYID = 7
17,831,500 UART: [afmc] AUTHORITY.KEYID = 5
21,140,779 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,433,043 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,435,298 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,449,746 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,464,529 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,478,978 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,499,784 UART: [afmc] --
23,502,897 UART: [cold-reset] --
23,505,248 UART: [state] Locking Datavault
23,510,443 UART: [state] Locking PCR0, PCR1 and PCR31
23,512,144 UART: [state] Locking ICCM
23,513,754 UART: [exit] Launching FMC @ 0x40000130
23,522,150 UART:
23,522,394 UART: Running Caliptra FMC ...
23,523,494 UART:
23,523,652 UART: [state] CFI Enabled
23,531,919 UART: [fht] FMC Alias Private Key: 7
25,862,980 UART: [art] Extend RT PCRs Done
25,864,203 UART: [art] Lock RT PCRs Done
25,866,042 UART: [art] Populate DV Done
25,871,456 UART: [fht] FMC Alias Private Key: 7
25,873,046 UART: [art] Derive CDI
25,873,861 UART: [art] Store in in slot 0x4
25,916,610 UART: [art] Derive Key Pair
25,917,609 UART: [art] Store priv key in slot 0x5
29,160,042 UART: [art] Derive Key Pair - Done
29,173,206 UART: [art] Signing Cert with AUTHO
29,174,507 UART: RITY.KEYID = 7
31,453,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,455,302 UART: [art] PUB.X = 4C0A44B5B1993C134DC8FCC841B1BA05C26C02AB47FC06F10459968610521517C5587A50BD0EB952552ABFD0E06132B8
31,462,506 UART: [art] PUB.Y = 2D2641B8DF30E5086819B9A10C1AD20EBF3CB8867B1124C8CFF6F4A2042F228251871400EA7DB45A7A99BDD3F2CE1443
31,469,805 UART: [art] SIG.R = 08106997136E42F9365379AE0BCEBF575418841B880C0CD1C90AD05FFBF6B51F2678DA71F1517218E6E4DC2BFED377C8
31,477,143 UART: [art] SIG.S = 21309DF31F72A45B38623C9BE84E856160FB0BCD6F6FBA29E094F7036EF48DC414A877C1F5E604BBB0F8AB57005095D1
32,781,698 UART: Caliptra RT
32,782,403 UART: [state] CFI Enabled
32,899,534 UART: [rt] RT listening for mailbox commands...
32,931,539 UART: [rt]cmd =0x44504543, len=96
32,967,718 >>> mbox cmd response data (56 bytes)
32,969,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,999,619 UART: [rt]cmd =0x54514754, len=24
33,001,955 >>> mbox cmd response: failed
33,002,482 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,032,610 UART: [rt]cmd =0x54514754, len=24
33,035,254 >>> mbox cmd response data (8 bytes)
33,035,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,066,126 UART: [rt]cmd =0x44504543, len=96
33,101,692 >>> mbox cmd response data (56 bytes)
33,102,407 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,132,470 UART: [rt]cmd =0x47544744, len=8
33,135,516 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
4,126,288 ready_for_fw is high
4,126,668 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,063,979 >>> mbox cmd response: success
18,064,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,700,716 UART:
23,701,122 UART: Running Caliptra FMC ...
23,702,230 UART:
23,702,383 UART: [state] CFI Enabled
23,710,070 UART: [fht] FMC Alias Private Key: 7
26,041,402 UART: [art] Extend RT PCRs Done
26,042,631 UART: [art] Lock RT PCRs Done
26,044,127 UART: [art] Populate DV Done
26,049,326 UART: [fht] FMC Alias Private Key: 7
26,050,817 UART: [art] Derive CDI
26,051,584 UART: [art] Store in in slot 0x4
26,094,130 UART: [art] Derive Key Pair
26,095,188 UART: [art] Store priv key in slot 0x5
29,337,589 UART: [art] Derive Key Pair - Done
29,351,020 UART: [art] Signing Cert with AUTHO
29,352,326 UART: RITY.KEYID = 7
31,631,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,263 UART: [art] PUB.X = 37A9089E6930E4761304E87D31B712EF92EC708CBCAE60969EC5AD8CC629D2D2647730FAB5D4AB0999A9FC919461E5A8
31,640,522 UART: [art] PUB.Y = D2F590056EC754499F68ABED5289613509D2027C9CE05F9AA6EB4AD3587BA4511AED2BB4AFD9F80FA896C23FDB1D2163
31,647,791 UART: [art] SIG.R = 7257873A2B70B4FD90BE3792011B5DB7310626C7309ED8938EA660140DE1A5CD1D2B8373A6AA22F0E28E90EB41BDEC65
31,655,180 UART: [art] SIG.S = 31DE18E6586BF0C5F110D943C02047826C7083A22DC5056B70BD8017A073365E495923B11042E00931999DF56D486FD9
32,960,213 UART: Caliptra RT
32,960,921 UART: [state] CFI Enabled
33,080,092 UART: [rt] RT listening for mailbox commands...
33,112,184 UART: [rt]cmd =0x44504543, len=96
33,148,057 >>> mbox cmd response data (56 bytes)
33,149,349 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,179,507 UART: [rt]cmd =0x54514754, len=24
33,181,952 >>> mbox cmd response: failed
33,182,368 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,212,106 UART: [rt]cmd =0x54514754, len=24
33,214,587 >>> mbox cmd response data (8 bytes)
33,215,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,245,696 UART: [rt]cmd =0x44504543, len=96
33,281,824 >>> mbox cmd response data (56 bytes)
33,282,563 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,312,443 UART: [rt]cmd =0x47544744, len=8
33,315,513 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,063 UART:
192,460 UART: Running Caliptra ROM ...
193,654 UART:
193,806 UART: [state] CFI Enabled
264,084 UART: [state] LifecycleState = Unprovisioned
265,996 UART: [state] DebugLocked = No
267,955 UART: [state] WD Timer not started. Device not locked for debugging
272,343 UART: [kat] SHA2-256
451,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,068 UART: [kat] ++
463,523 UART: [kat] sha1
475,104 UART: [kat] SHA2-256
478,107 UART: [kat] SHA2-384
484,239 UART: [kat] SHA2-512-ACC
487,179 UART: [kat] ECC-384
2,949,022 UART: [kat] HMAC-384Kdf
2,973,000 UART: [kat] LMS
3,502,507 UART: [kat] --
3,506,575 UART: [cold-reset] ++
3,509,073 UART: [fht] FHT @ 0x50003400
3,520,904 UART: [idev] ++
3,521,463 UART: [idev] CDI.KEYID = 6
3,522,495 UART: [idev] SUBJECT.KEYID = 7
3,523,596 UART: [idev] UDS.KEYID = 0
3,524,523 ready_for_fw is high
3,524,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,311 UART: [idev] Erasing UDS.KEYID = 0
6,027,014 UART: [idev] Sha1 KeyId Algorithm
6,049,920 UART: [idev] --
6,053,247 UART: [ldev] ++
6,053,829 UART: [ldev] CDI.KEYID = 6
6,054,743 UART: [ldev] SUBJECT.KEYID = 5
6,055,905 UART: [ldev] AUTHORITY.KEYID = 7
6,057,111 UART: [ldev] FE.KEYID = 1
6,102,536 UART: [ldev] Erasing FE.KEYID = 1
8,608,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,336 UART: [ldev] --
10,416,112 UART: [fwproc] Wait for Commands...
10,417,879 UART: [fwproc] Recv command 0x46574c44
10,419,976 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,896,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,965,686 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,283,628 >>> mbox cmd response: success
14,284,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,288,617 UART: [afmc] ++
14,289,202 UART: [afmc] CDI.KEYID = 6
14,290,113 UART: [afmc] SUBJECT.KEYID = 7
14,291,212 UART: [afmc] AUTHORITY.KEYID = 5
16,831,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,555,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,382 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,177 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,203 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,480 UART: [afmc] --
18,630,648 UART: [cold-reset] --
18,636,180 UART: [state] Locking Datavault
18,641,912 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,554 UART: [state] Locking ICCM
18,645,735 UART: [exit] Launching FMC @ 0x40000130
18,654,145 UART:
18,654,381 UART: Running Caliptra FMC ...
18,655,412 UART:
18,655,560 UART: [state] CFI Enabled
18,715,259 UART: [fht] FMC Alias Private Key: 7
20,479,773 UART: [art] Extend RT PCRs Done
20,481,002 UART: [art] Lock RT PCRs Done
20,482,453 UART: [art] Populate DV Done
20,487,866 UART: [fht] FMC Alias Private Key: 7
20,489,406 UART: [art] Derive CDI
20,490,220 UART: [art] Store in in slot 0x4
20,548,266 UART: [art] Derive Key Pair
20,549,335 UART: [art] Store priv key in slot 0x5
23,012,515 UART: [art] Derive Key Pair - Done
23,025,372 UART: [art] Signing Cert with AUTHO
23,026,679 UART: RITY.KEYID = 7
24,738,307 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,809 UART: [art] PUB.X = 870238F60421BBC35EB632AF7948099F247B0EB680966D4529B66640EE1B8A20A33D4BA64E3A1E8F3B83949D3F8A1B36
24,747,082 UART: [art] PUB.Y = 6291004C33471B44E11CB308EF954D337282C19D4D4F7C99F29A941A04837C0BAD05A7552E8F452965BA2DB6A577B71A
24,754,284 UART: [art] SIG.R = 9AD72A7165C3DCCADEF5A16B3386CB035D59702D831CEC3D472D53872F1CDB772262091C11BDAD398880469779C61CD6
24,761,724 UART: [art] SIG.S = 74E0CB6EFDFB5E60478C41C0722B3887F112E8A60644CA2E95185448209F8F0C7EE07559794BC34B09DAA096F97FF4C5
25,741,044 UART: Caliptra RT
25,741,760 UART: [state] CFI Enabled
25,905,449 UART: [rt] RT listening for mailbox commands...
25,937,728 UART: [rt]cmd =0x44504543, len=96
25,985,676 >>> mbox cmd response data (56 bytes)
25,987,037 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,017,143 UART: [rt]cmd =0x54514754, len=24
26,019,562 >>> mbox cmd response: failed
26,019,968 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,049,782 UART: [rt]cmd =0x54514754, len=24
26,052,200 >>> mbox cmd response data (8 bytes)
26,052,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,083,106 UART: [rt]cmd =0x44504543, len=96
26,135,150 >>> mbox cmd response data (56 bytes)
26,135,879 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,165,595 UART: [rt]cmd =0x47544744, len=8
26,168,641 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,383,497 ready_for_fw is high
3,384,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,052,418 >>> mbox cmd response: success
14,053,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,345,773 UART:
18,346,186 UART: Running Caliptra FMC ...
18,347,288 UART:
18,347,448 UART: [state] CFI Enabled
18,411,739 UART: [fht] FMC Alias Private Key: 7
20,175,216 UART: [art] Extend RT PCRs Done
20,176,440 UART: [art] Lock RT PCRs Done
20,178,096 UART: [art] Populate DV Done
20,183,360 UART: [fht] FMC Alias Private Key: 7
20,184,960 UART: [art] Derive CDI
20,185,773 UART: [art] Store in in slot 0x4
20,245,066 UART: [art] Derive Key Pair
20,246,112 UART: [art] Store priv key in slot 0x5
22,708,676 UART: [art] Derive Key Pair - Done
22,722,157 UART: [art] Signing Cert with AUTHO
22,723,458 UART: RITY.KEYID = 7
24,435,001 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,531 UART: [art] PUB.X = EB48FA3A1988EC1E518498B2B6CDAFA3EF546DA0AF02BFF4DFD76321AEF6FEBE9388F274D13F466E7200FDD995A520A6
24,443,826 UART: [art] PUB.Y = BD7E12C3996C4C71279052C43889534BF575A298889CF27AEC589A51CA3DFE90C0F70C069F5926D47377A6964FFDA469
24,451,073 UART: [art] SIG.R = 74ECB08BCC66738583D4C635B74F3064F571A18358B42FABA13A4195DB366FF87EEB4D2E535BE128A3A88FD924A1B8FE
24,458,493 UART: [art] SIG.S = 7BB549D93C340AC800B90D0BEF8E33F9F90A9E7FC7A8C4CDB03E7AA20A1A28E306AF18A21E0E7B03908072DB0AB7B7B3
25,438,046 UART: Caliptra RT
25,438,762 UART: [state] CFI Enabled
25,616,713 UART: [rt] RT listening for mailbox commands...
25,648,720 UART: [rt]cmd =0x44504543, len=96
25,696,445 >>> mbox cmd response data (56 bytes)
25,697,720 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,727,429 UART: [rt]cmd =0x54514754, len=24
25,729,841 >>> mbox cmd response: failed
25,730,497 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,760,538 UART: [rt]cmd =0x54514754, len=24
25,763,110 >>> mbox cmd response data (8 bytes)
25,763,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,793,965 UART: [rt]cmd =0x44504543, len=96
25,846,297 >>> mbox cmd response data (56 bytes)
25,847,032 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,876,815 UART: [rt]cmd =0x47544744, len=8
25,879,754 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
192,950 UART:
193,325 UART: Running Caliptra ROM ...
194,460 UART:
604,127 UART: [state] CFI Enabled
617,241 UART: [state] LifecycleState = Unprovisioned
619,141 UART: [state] DebugLocked = No
621,240 UART: [state] WD Timer not started. Device not locked for debugging
624,223 UART: [kat] SHA2-256
803,336 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,920 UART: [kat] ++
815,448 UART: [kat] sha1
825,970 UART: [kat] SHA2-256
829,039 UART: [kat] SHA2-384
833,914 UART: [kat] SHA2-512-ACC
836,927 UART: [kat] ECC-384
3,279,482 UART: [kat] HMAC-384Kdf
3,290,862 UART: [kat] LMS
3,820,329 UART: [kat] --
3,822,262 UART: [cold-reset] ++
3,823,839 UART: [fht] FHT @ 0x50003400
3,834,884 UART: [idev] ++
3,835,453 UART: [idev] CDI.KEYID = 6
3,836,361 UART: [idev] SUBJECT.KEYID = 7
3,837,605 UART: [idev] UDS.KEYID = 0
3,838,532 ready_for_fw is high
3,838,723 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,982,097 UART: [idev] Erasing UDS.KEYID = 0
6,311,568 UART: [idev] Sha1 KeyId Algorithm
6,334,412 UART: [idev] --
6,338,688 UART: [ldev] ++
6,339,258 UART: [ldev] CDI.KEYID = 6
6,340,198 UART: [ldev] SUBJECT.KEYID = 5
6,341,348 UART: [ldev] AUTHORITY.KEYID = 7
6,342,629 UART: [ldev] FE.KEYID = 1
6,353,277 UART: [ldev] Erasing FE.KEYID = 1
8,827,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,439 UART: [ldev] --
10,618,354 UART: [fwproc] Wait for Commands...
10,621,585 UART: [fwproc] Recv command 0x46574c44
10,623,622 UART: [fwproc] Recv'd Img size: 114168 bytes
14,024,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,183 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,956 >>> mbox cmd response: success
14,481,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,484,443 UART: [afmc] ++
14,485,039 UART: [afmc] CDI.KEYID = 6
14,485,955 UART: [afmc] SUBJECT.KEYID = 7
14,487,117 UART: [afmc] AUTHORITY.KEYID = 5
16,988,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,528 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,570 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,442 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,840 UART: [afmc] --
18,787,374 UART: [cold-reset] --
18,791,098 UART: [state] Locking Datavault
18,795,810 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,495 UART: [state] Locking ICCM
18,799,789 UART: [exit] Launching FMC @ 0x40000130
18,808,184 UART:
18,808,425 UART: Running Caliptra FMC ...
18,809,450 UART:
18,809,599 UART: [state] CFI Enabled
18,817,860 UART: [fht] FMC Alias Private Key: 7
20,574,997 UART: [art] Extend RT PCRs Done
20,576,205 UART: [art] Lock RT PCRs Done
20,577,666 UART: [art] Populate DV Done
20,583,194 UART: [fht] FMC Alias Private Key: 7
20,584,681 UART: [art] Derive CDI
20,585,454 UART: [art] Store in in slot 0x4
20,628,269 UART: [art] Derive Key Pair
20,629,325 UART: [art] Store priv key in slot 0x5
23,056,370 UART: [art] Derive Key Pair - Done
23,069,693 UART: [art] Signing Cert with AUTHO
23,070,994 UART: RITY.KEYID = 7
24,776,667 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,164 UART: [art] PUB.X = 5A3CB0D72E97C014395A18320BE2B3F2BB18A9767DD8989C266A3F7E926581F7C10294178611D5CA1037BCDBEDE0FBC2
24,785,421 UART: [art] PUB.Y = 19A4FD0FCB5C8998755B1A26384AF9AE671300849D965393F3854BF46B08DEE8839FAF63802AF0C5D5F2A8D51C05ECD3
24,792,661 UART: [art] SIG.R = 84912EE8AA8FF1A50744C5E37A781FEE6F515BBC97B60F0BE94FB6AAD632558848CE0D1ADEAAC9AB65FAEC87BBCA08F2
24,800,054 UART: [art] SIG.S = 874A9659128BB3AD8074B75BA6C5DEF7D9E8D1FB005327281061BBDCA53261496F347CD9F23E3A705D27871A34223C9F
25,779,230 UART: Caliptra RT
25,779,943 UART: [state] CFI Enabled
25,897,057 UART: [rt] RT listening for mailbox commands...
25,928,951 UART: [rt]cmd =0x44504543, len=96
25,965,606 >>> mbox cmd response data (56 bytes)
25,966,869 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,996,805 UART: [rt]cmd =0x54514754, len=24
25,999,055 >>> mbox cmd response: failed
25,999,485 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,029,060 UART: [rt]cmd =0x54514754, len=24
26,031,879 >>> mbox cmd response data (8 bytes)
26,032,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,063,080 UART: [rt]cmd =0x44504543, len=96
26,098,544 >>> mbox cmd response data (56 bytes)
26,099,233 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,129,117 UART: [rt]cmd =0x47544744, len=8
26,132,017 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,781 writing to cptra_bootfsm_go
3,699,978 ready_for_fw is high
3,700,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,278,869 >>> mbox cmd response: success
14,279,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,529,167 UART:
18,529,559 UART: Running Caliptra FMC ...
18,530,661 UART:
18,530,839 UART: [state] CFI Enabled
18,539,220 UART: [fht] FMC Alias Private Key: 7
20,296,022 UART: [art] Extend RT PCRs Done
20,297,255 UART: [art] Lock RT PCRs Done
20,298,882 UART: [art] Populate DV Done
20,304,139 UART: [fht] FMC Alias Private Key: 7
20,305,787 UART: [art] Derive CDI
20,306,602 UART: [art] Store in in slot 0x4
20,348,883 UART: [art] Derive Key Pair
20,349,886 UART: [art] Store priv key in slot 0x5
22,776,171 UART: [art] Derive Key Pair - Done
22,789,446 UART: [art] Signing Cert with AUTHO
22,790,745 UART: RITY.KEYID = 7
24,496,071 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,584 UART: [art] PUB.X = 044B3DDDA89F5ABB8750FE09E251CCA5469E4CBA6027B7C1D782824F0266B8D03F67E4130C2290A0EFD40A8FD984EBEC
24,504,886 UART: [art] PUB.Y = F28EE9D62049066F3CF4E814B3E1CF406227EE48189E0AC5D42F7613024E049DC55B5BDF844B98E59CC6303B3C24ABDE
24,512,108 UART: [art] SIG.R = 5CA31025FC29BB28951227D0836BADE882B591913BF62640629E41F4A50C939D4CB8D1EF4F48279F296E10A90E452F94
24,519,510 UART: [art] SIG.S = 2E345C9EE1D474B88DCCE481416A06DD9FC7C69902FB0C838C6E913E82796A88BD05C7B0093527A7E1F9B662956EEC15
25,498,516 UART: Caliptra RT
25,499,218 UART: [state] CFI Enabled
25,616,009 UART: [rt] RT listening for mailbox commands...
25,647,845 UART: [rt]cmd =0x44504543, len=96
25,683,290 >>> mbox cmd response data (56 bytes)
25,684,531 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,714,503 UART: [rt]cmd =0x54514754, len=24
25,717,074 >>> mbox cmd response: failed
25,717,818 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,747,530 UART: [rt]cmd =0x54514754, len=24
25,750,050 >>> mbox cmd response data (8 bytes)
25,750,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,781,034 UART: [rt]cmd =0x44504543, len=96
25,817,277 >>> mbox cmd response data (56 bytes)
25,818,052 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,847,566 UART: [rt]cmd =0x47544744, len=8
25,850,444 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
191,966 UART:
192,358 UART: Running Caliptra ROM ...
193,470 UART:
193,611 UART: [state] CFI Enabled
265,997 UART: [state] LifecycleState = Unprovisioned
268,424 UART: [state] DebugLocked = No
269,680 UART: [state] WD Timer not started. Device not locked for debugging
273,883 UART: [kat] SHA2-256
463,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,526 UART: [kat] ++
475,016 UART: [kat] sha1
486,356 UART: [kat] SHA2-256
489,340 UART: [kat] SHA2-384
494,725 UART: [kat] SHA2-512-ACC
497,317 UART: [kat] ECC-384
2,949,656 UART: [kat] HMAC-384Kdf
2,972,564 UART: [kat] LMS
3,504,326 UART: [kat] --
3,509,842 UART: [cold-reset] ++
3,512,421 UART: [fht] FHT @ 0x50003400
3,524,040 UART: [idev] ++
3,524,759 UART: [idev] CDI.KEYID = 6
3,525,947 UART: [idev] SUBJECT.KEYID = 7
3,527,082 UART: [idev] UDS.KEYID = 0
3,528,020 ready_for_fw is high
3,528,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,710 UART: [idev] Erasing UDS.KEYID = 0
6,030,711 UART: [idev] Sha1 KeyId Algorithm
6,053,617 UART: [idev] --
6,059,246 UART: [ldev] ++
6,059,928 UART: [ldev] CDI.KEYID = 6
6,060,845 UART: [ldev] SUBJECT.KEYID = 5
6,062,063 UART: [ldev] AUTHORITY.KEYID = 7
6,063,247 UART: [ldev] FE.KEYID = 1
6,102,088 UART: [ldev] Erasing FE.KEYID = 1
8,605,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,937 UART: [ldev] --
10,412,864 UART: [fwproc] Wait for Commands...
10,414,859 UART: [fwproc] Recv command 0x46574c44
10,417,120 UART: [fwproc] Recv'd Img size: 114168 bytes
13,861,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,048 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,603,611 >>> mbox cmd response: success
14,604,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,608,010 UART: [afmc] ++
14,608,707 UART: [afmc] CDI.KEYID = 6
14,609,897 UART: [afmc] SUBJECT.KEYID = 7
14,611,389 UART: [afmc] AUTHORITY.KEYID = 5
17,151,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,254 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,589 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,506 UART: [afmc] --
18,947,996 UART: [cold-reset] --
18,952,045 UART: [state] Locking Datavault
18,956,997 UART: [state] Locking PCR0, PCR1 and PCR31
18,959,200 UART: [state] Locking ICCM
18,961,628 UART: [exit] Launching FMC @ 0x40000130
18,970,257 UART:
18,970,530 UART: Running Caliptra FMC ...
18,971,638 UART:
18,971,805 UART: [state] CFI Enabled
19,031,002 UART: [fht] FMC Alias Private Key: 7
20,794,928 UART: [art] Extend RT PCRs Done
20,796,151 UART: [art] Lock RT PCRs Done
20,797,518 UART: [art] Populate DV Done
20,802,879 UART: [fht] FMC Alias Private Key: 7
20,804,578 UART: [art] Derive CDI
20,805,396 UART: [art] Store in in slot 0x4
20,864,968 UART: [art] Derive Key Pair
20,866,010 UART: [art] Store priv key in slot 0x5
23,329,734 UART: [art] Derive Key Pair - Done
23,342,558 UART: [art] Signing Cert with AUTHO
23,343,864 UART: RITY.KEYID = 7
25,055,628 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,466 UART: [art] PUB.X = 4A2B1851E35BE0ADFE30BC0B7037E2DF0D583021B53DDF32D71ABDD60DD28DB21978AD934005A0CBCC01EABB9E4AEB30
25,064,482 UART: [art] PUB.Y = C20E3A8FF58466766FF2C4B5203391CA51D3A4CC57AF66F2AD9C560D8EAC8CC18C8B649C20C05034154D3C14A4490694
25,071,680 UART: [art] SIG.R = 28BA68971C07EC60BAEC83D294C8479F47B2B48F1E84AD52B8CEA3ABF082E15257BAC47396DC02C621B4DA95C774A8F3
25,079,102 UART: [art] SIG.S = C536A69191DC7275FDB4EA9C97C6D63EF118C4BF979AD07A18E5449D1CB15A66A976DBDCC30E21D665D9BD149C9D0626
26,058,420 UART: Caliptra RT
26,059,135 UART: [state] CFI Enabled
26,224,256 UART: [rt] RT listening for mailbox commands...
26,256,147 UART: [rt]cmd =0x44504543, len=96
26,305,418 >>> mbox cmd response data (56 bytes)
26,307,035 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,336,990 UART: [rt]cmd =0x54514754, len=24
26,339,298 >>> mbox cmd response: failed
26,339,813 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,369,774 UART: [rt]cmd =0x54514754, len=24
26,372,208 >>> mbox cmd response data (8 bytes)
26,372,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,424 UART: [rt]cmd =0x44504543, len=96
26,454,758 >>> mbox cmd response data (56 bytes)
26,455,491 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,485,152 UART: [rt]cmd =0x47544744, len=8
26,488,318 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,437,526 ready_for_fw is high
3,437,912 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,733,345 >>> mbox cmd response: success
14,734,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,023,233 UART:
19,023,646 UART: Running Caliptra FMC ...
19,024,760 UART:
19,024,937 UART: [state] CFI Enabled
19,074,884 UART: [fht] FMC Alias Private Key: 7
20,839,396 UART: [art] Extend RT PCRs Done
20,840,647 UART: [art] Lock RT PCRs Done
20,842,293 UART: [art] Populate DV Done
20,847,601 UART: [fht] FMC Alias Private Key: 7
20,849,258 UART: [art] Derive CDI
20,849,995 UART: [art] Store in in slot 0x4
20,907,231 UART: [art] Derive Key Pair
20,908,232 UART: [art] Store priv key in slot 0x5
23,370,856 UART: [art] Derive Key Pair - Done
23,383,801 UART: [art] Signing Cert with AUTHO
23,385,114 UART: RITY.KEYID = 7
25,096,626 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,135 UART: [art] PUB.X = 8CEA00ECF45DCBA2CA2432AF0B0BBA591E80B75E0C0AB3DC36670CD644F66B520309F618BFFDA4549699C22AD85BED01
25,105,379 UART: [art] PUB.Y = CB41ABCB73D2E4BCE7707F3C20F98DF7EAD734CA3D7245D71292BC6402CC6E698017334661260C4B0DDFD8A730B5AA79
25,112,666 UART: [art] SIG.R = 141B477E8CD6DDDF0CE3F34F5255D5439999026AABF8DF594667FD023F8B61103159B607DD33112407A586AE352F9C65
25,120,050 UART: [art] SIG.S = 15302341FB30AC7330108F03037FEC0896115FB02CB11E9BCE48895DC2AD2AF77E3522FBB0CDBD43CB7ED91431EEE959
26,099,426 UART: Caliptra RT
26,100,131 UART: [state] CFI Enabled
26,266,248 UART: [rt] RT listening for mailbox commands...
26,298,309 UART: [rt]cmd =0x44504543, len=96
26,346,133 >>> mbox cmd response data (56 bytes)
26,347,378 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,377,249 UART: [rt]cmd =0x54514754, len=24
26,379,377 >>> mbox cmd response: failed
26,379,891 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,409,741 UART: [rt]cmd =0x54514754, len=24
26,412,283 >>> mbox cmd response data (8 bytes)
26,412,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,443,506 UART: [rt]cmd =0x44504543, len=96
26,495,246 >>> mbox cmd response data (56 bytes)
26,495,949 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,525,952 UART: [rt]cmd =0x47544744, len=8
26,528,969 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,404 writing to cptra_bootfsm_go
194,653 UART:
195,029 UART: Running Caliptra ROM ...
196,168 UART:
605,911 UART: [state] CFI Enabled
617,513 UART: [state] LifecycleState = Unprovisioned
619,880 UART: [state] DebugLocked = No
622,107 UART: [state] WD Timer not started. Device not locked for debugging
626,575 UART: [kat] SHA2-256
816,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,265 UART: [kat] ++
827,784 UART: [kat] sha1
839,246 UART: [kat] SHA2-256
842,259 UART: [kat] SHA2-384
848,037 UART: [kat] SHA2-512-ACC
850,623 UART: [kat] ECC-384
3,288,267 UART: [kat] HMAC-384Kdf
3,302,262 UART: [kat] LMS
3,834,096 UART: [kat] --
3,839,507 UART: [cold-reset] ++
3,841,375 UART: [fht] FHT @ 0x50003400
3,852,879 UART: [idev] ++
3,853,602 UART: [idev] CDI.KEYID = 6
3,854,512 UART: [idev] SUBJECT.KEYID = 7
3,855,685 UART: [idev] UDS.KEYID = 0
3,856,609 ready_for_fw is high
3,856,800 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,043 UART: [idev] Erasing UDS.KEYID = 0
6,332,388 UART: [idev] Sha1 KeyId Algorithm
6,354,207 UART: [idev] --
6,358,197 UART: [ldev] ++
6,358,873 UART: [ldev] CDI.KEYID = 6
6,359,781 UART: [ldev] SUBJECT.KEYID = 5
6,360,939 UART: [ldev] AUTHORITY.KEYID = 7
6,362,169 UART: [ldev] FE.KEYID = 1
6,371,901 UART: [ldev] Erasing FE.KEYID = 1
8,853,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,530 UART: [ldev] --
10,641,441 UART: [fwproc] Wait for Commands...
10,643,786 UART: [fwproc] Recv command 0x46574c44
10,646,066 UART: [fwproc] Recv'd Img size: 114168 bytes
14,090,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,307 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,451 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,833,247 >>> mbox cmd response: success
14,833,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,836,897 UART: [afmc] ++
14,837,605 UART: [afmc] CDI.KEYID = 6
14,838,799 UART: [afmc] SUBJECT.KEYID = 7
14,840,237 UART: [afmc] AUTHORITY.KEYID = 5
17,343,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,066,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,068,809 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,083,986 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,099 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,144 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,292 UART: [afmc] --
19,140,032 UART: [cold-reset] --
19,145,037 UART: [state] Locking Datavault
19,148,404 UART: [state] Locking PCR0, PCR1 and PCR31
19,150,538 UART: [state] Locking ICCM
19,151,880 UART: [exit] Launching FMC @ 0x40000130
19,160,502 UART:
19,160,735 UART: Running Caliptra FMC ...
19,161,773 UART:
19,161,923 UART: [state] CFI Enabled
19,170,050 UART: [fht] FMC Alias Private Key: 7
20,927,459 UART: [art] Extend RT PCRs Done
20,928,685 UART: [art] Lock RT PCRs Done
20,930,397 UART: [art] Populate DV Done
20,935,705 UART: [fht] FMC Alias Private Key: 7
20,937,404 UART: [art] Derive CDI
20,938,235 UART: [art] Store in in slot 0x4
20,980,564 UART: [art] Derive Key Pair
20,981,604 UART: [art] Store priv key in slot 0x5
23,408,775 UART: [art] Derive Key Pair - Done
23,421,335 UART: [art] Signing Cert with AUTHO
23,422,637 UART: RITY.KEYID = 7
25,128,147 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,650 UART: [art] PUB.X = B7E8D0F0B9CE98B6F5B764CABB08C0E52DBDA1BF594D63BB52FFD077C9CBF0B272EAA87FE5AFA29A8873FF7D74E4B986
25,136,954 UART: [art] PUB.Y = 4F5E3E282BFC162BB4D0E88357E0E197FF404E0B1A1D74CF219DE8C3D1D988630F5042298E0B2848210367F41A002690
25,144,188 UART: [art] SIG.R = 031C6C6ED1D897D123AC075C4CD1D71719C7AFB5DA97ED2F8FD90F4DC28CEF36D25E6D482C63EBE97D2F094F048FBC85
25,151,635 UART: [art] SIG.S = DD717F164E84406AE996276D0C901F1796CA4456DE9EFD8ECC66C3B5B1387B6467B342A94D6F696A6DD7F609F325D0A8
26,130,912 UART: Caliptra RT
26,131,624 UART: [state] CFI Enabled
26,248,835 UART: [rt] RT listening for mailbox commands...
26,280,844 UART: [rt]cmd =0x44504543, len=96
26,316,805 >>> mbox cmd response data (56 bytes)
26,318,147 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,348,372 UART: [rt]cmd =0x54514754, len=24
26,350,504 >>> mbox cmd response: failed
26,350,926 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,380,774 UART: [rt]cmd =0x54514754, len=24
26,383,429 >>> mbox cmd response data (8 bytes)
26,383,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,414,373 UART: [rt]cmd =0x44504543, len=96
26,449,674 >>> mbox cmd response data (56 bytes)
26,450,370 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,479,978 UART: [rt]cmd =0x47544744, len=8
26,483,102 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
3,753,413 ready_for_fw is high
3,753,835 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,669 >>> mbox cmd response: success
14,955,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,211,535 UART:
19,211,942 UART: Running Caliptra FMC ...
19,213,162 UART:
19,213,342 UART: [state] CFI Enabled
19,221,410 UART: [fht] FMC Alias Private Key: 7
20,978,367 UART: [art] Extend RT PCRs Done
20,979,591 UART: [art] Lock RT PCRs Done
20,981,133 UART: [art] Populate DV Done
20,986,503 UART: [fht] FMC Alias Private Key: 7
20,988,097 UART: [art] Derive CDI
20,988,844 UART: [art] Store in in slot 0x4
21,031,322 UART: [art] Derive Key Pair
21,032,328 UART: [art] Store priv key in slot 0x5
23,459,444 UART: [art] Derive Key Pair - Done
23,472,564 UART: [art] Signing Cert with AUTHO
23,473,878 UART: RITY.KEYID = 7
25,179,194 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,708 UART: [art] PUB.X = D69EA4BB5DD217B5B991FE9E3710EE335D0BBA08D0602AEFDCBFF4024EF1A45015F96BA857C6D0955011ED7928CEB510
25,187,979 UART: [art] PUB.Y = A2F70C0ECA48D638F576DC1AD196DD840F1CC6452B981623122C006BC2BE833CBACDEEAC39D1B5DF7B2F506E46CCC603
25,195,220 UART: [art] SIG.R = B054A49F05E3DAA5F4139E7B9CC59ACE470A1654564FAEB93103D1D43F99B34D4FA0FA164E17EACC8CF8CDF7BF69E07A
25,202,665 UART: [art] SIG.S = 169A81CBF6D94EE434C08FAC8D18516F5FB5CF4CA59BF125E67BFB086E405FDA2FA90D418CF46140C91EE17979A8DA00
26,181,339 UART: Caliptra RT
26,182,055 UART: [state] CFI Enabled
26,299,236 UART: [rt] RT listening for mailbox commands...
26,331,514 UART: [rt]cmd =0x44504543, len=96
26,367,139 >>> mbox cmd response data (56 bytes)
26,368,434 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,398,570 UART: [rt]cmd =0x54514754, len=24
26,400,822 >>> mbox cmd response: failed
26,401,329 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,431,409 UART: [rt]cmd =0x54514754, len=24
26,434,143 >>> mbox cmd response data (8 bytes)
26,434,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,465,340 UART: [rt]cmd =0x44504543, len=96
26,501,067 >>> mbox cmd response data (56 bytes)
26,501,801 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,531,737 UART: [rt]cmd =0x47544744, len=8
26,534,777 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,289 UART: [kat] SHA2-256
882,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,335 UART: [kat] ++
886,487 UART: [kat] sha1
890,759 UART: [kat] SHA2-256
892,697 UART: [kat] SHA2-384
895,544 UART: [kat] SHA2-512-ACC
897,445 UART: [kat] ECC-384
903,146 UART: [kat] HMAC-384Kdf
907,834 UART: [kat] LMS
1,476,030 UART: [kat] --
1,476,789 UART: [cold-reset] ++
1,477,305 UART: [fht] Storing FHT @ 0x50003400
1,479,996 UART: [idev] ++
1,480,164 UART: [idev] CDI.KEYID = 6
1,480,524 UART: [idev] SUBJECT.KEYID = 7
1,480,948 UART: [idev] UDS.KEYID = 0
1,481,293 ready_for_fw is high
1,481,293 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,976 UART: [idev] Erasing UDS.KEYID = 0
1,505,832 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,528 UART: [idev] --
1,515,637 UART: [ldev] ++
1,515,805 UART: [ldev] CDI.KEYID = 6
1,516,168 UART: [ldev] SUBJECT.KEYID = 5
1,516,594 UART: [ldev] AUTHORITY.KEYID = 7
1,517,057 UART: [ldev] FE.KEYID = 1
1,522,439 UART: [ldev] Erasing FE.KEYID = 1
1,547,756 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,250 UART: [ldev] --
1,586,597 UART: [fwproc] Waiting for Commands...
1,587,326 UART: [fwproc] Received command 0x46574c44
1,588,117 UART: [fwproc] Received Image of size 114168 bytes
2,884,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,771 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,768 >>> mbox cmd response: success
3,076,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,078,024 UART: [afmc] ++
3,078,192 UART: [afmc] CDI.KEYID = 6
3,078,554 UART: [afmc] SUBJECT.KEYID = 7
3,078,979 UART: [afmc] AUTHORITY.KEYID = 5
3,114,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,410 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,190 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,918 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,803 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,493 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,560 UART: [afmc] --
3,157,630 UART: [cold-reset] --
3,158,610 UART: [state] Locking Datavault
3,159,761 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,365 UART: [state] Locking ICCM
3,160,893 UART: [exit] Launching FMC @ 0x40000130
3,166,222 UART:
3,166,238 UART: Running Caliptra FMC ...
3,166,646 UART:
3,166,700 UART: [state] CFI Enabled
3,177,285 UART: [fht] FMC Alias Private Key: 7
3,285,046 UART: [art] Extend RT PCRs Done
3,285,474 UART: [art] Lock RT PCRs Done
3,286,968 UART: [art] Populate DV Done
3,295,493 UART: [fht] FMC Alias Private Key: 7
3,296,443 UART: [art] Derive CDI
3,296,723 UART: [art] Store in in slot 0x4
3,382,278 UART: [art] Derive Key Pair
3,382,638 UART: [art] Store priv key in slot 0x5
3,396,068 UART: [art] Derive Key Pair - Done
3,410,960 UART: [art] Signing Cert with AUTHO
3,411,440 UART: RITY.KEYID = 7
3,426,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,395 UART: [art] PUB.X = 4373CDC9606DAB966EB2C1A7E47E029EB5067616AF1A62D65DA80308E82E996E7AB2A327023C8293ED89D56095B25329
3,434,150 UART: [art] PUB.Y = E17A2AC011D104D41195B4264DA01B8A1F2182E4032F94CC416742DD6C05F200E7475782F138CA615D7B2C6E2696C7BD
3,441,069 UART: [art] SIG.R = 8CCC73B6D4E9F77CF029C1288DDD183D2FE2657D4998BCC53E41A42AE384E60B3595BEB21F064ABF3B4BDCAB8B7C973A
3,447,855 UART: [art] SIG.S = B5221D9F07FEC3CDC32CF131D76ECD9148A8E46A8F543EB573FE3C2F83EEDA3625ACEAE0384EFFC1E5EE8BBD91C8CE0F
3,471,978 UART: Caliptra RT
3,472,231 UART: [state] CFI Enabled
3,580,683 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,981 UART: [rt]cmd =0x44504543, len=96
3,648,345 >>> mbox cmd response data (56 bytes)
3,648,346 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,677,743 UART: [rt]cmd =0x54514754, len=24
3,679,617 >>> mbox cmd response: failed
3,679,617 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,709,229 UART: [rt]cmd =0x54514754, len=24
3,711,509 >>> mbox cmd response data (8 bytes)
3,711,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,741,657 UART: [rt]cmd =0x44504543, len=96
3,777,960 >>> mbox cmd response data (56 bytes)
3,777,961 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,807,278 UART: [rt]cmd =0x47544744, len=8
3,809,630 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,519 ready_for_fw is high
1,362,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,222 >>> mbox cmd response: success
2,925,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,986,758 UART:
2,986,774 UART: Running Caliptra FMC ...
2,987,182 UART:
2,987,236 UART: [state] CFI Enabled
2,998,081 UART: [fht] FMC Alias Private Key: 7
3,106,110 UART: [art] Extend RT PCRs Done
3,106,538 UART: [art] Lock RT PCRs Done
3,107,694 UART: [art] Populate DV Done
3,115,693 UART: [fht] FMC Alias Private Key: 7
3,116,665 UART: [art] Derive CDI
3,116,945 UART: [art] Store in in slot 0x4
3,202,632 UART: [art] Derive Key Pair
3,202,992 UART: [art] Store priv key in slot 0x5
3,215,988 UART: [art] Derive Key Pair - Done
3,230,820 UART: [art] Signing Cert with AUTHO
3,231,300 UART: RITY.KEYID = 7
3,246,216 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,981 UART: [art] PUB.X = ED65A6FA4F9F77720E73CC013569A507DE7AA8D114078AE18251D3CF2892E85CF30771EB9D75EF2CAF340D4BCD1D1A93
3,253,747 UART: [art] PUB.Y = 274D94B839A87BB6AE04A58EED70908B1C473370E43A83FC3A258C42A5245F8E9A6123CD5237BF12D7F20C0946B5F671
3,260,690 UART: [art] SIG.R = 3AF1BD741BF927FE0CD1A6697AA68C34725427F68F0E0D11C0874019093A733DD7DC0D56F1ACFFC46E2989B4BE6418A1
3,267,455 UART: [art] SIG.S = 55A1E720C5F0F8B3911BEC7BE2B9962FA8A036DB270E03C2130EF3267A2F8D247BAA71AF47D5DAF858384CCDB3CFBBE8
3,291,077 UART: Caliptra RT
3,291,330 UART: [state] CFI Enabled
3,398,758 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,902 UART: [rt]cmd =0x44504543, len=96
3,466,200 >>> mbox cmd response data (56 bytes)
3,466,201 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,495,446 UART: [rt]cmd =0x54514754, len=24
3,497,092 >>> mbox cmd response: failed
3,497,092 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,526,524 UART: [rt]cmd =0x54514754, len=24
3,528,718 >>> mbox cmd response data (8 bytes)
3,528,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,558,612 UART: [rt]cmd =0x44504543, len=96
3,595,041 >>> mbox cmd response data (56 bytes)
3,595,042 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,624,389 UART: [rt]cmd =0x47544744, len=8
3,626,813 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,060 UART: [kat] SHA2-256
881,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,106 UART: [kat] ++
886,258 UART: [kat] sha1
890,456 UART: [kat] SHA2-256
892,394 UART: [kat] SHA2-384
895,015 UART: [kat] SHA2-512-ACC
896,916 UART: [kat] ECC-384
902,591 UART: [kat] HMAC-384Kdf
907,305 UART: [kat] LMS
1,475,501 UART: [kat] --
1,476,562 UART: [cold-reset] ++
1,476,956 UART: [fht] Storing FHT @ 0x50003400
1,479,815 UART: [idev] ++
1,479,983 UART: [idev] CDI.KEYID = 6
1,480,343 UART: [idev] SUBJECT.KEYID = 7
1,480,767 UART: [idev] UDS.KEYID = 0
1,481,112 ready_for_fw is high
1,481,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,321 UART: [idev] Erasing UDS.KEYID = 0
1,505,025 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,761 UART: [idev] --
1,514,600 UART: [ldev] ++
1,514,768 UART: [ldev] CDI.KEYID = 6
1,515,131 UART: [ldev] SUBJECT.KEYID = 5
1,515,557 UART: [ldev] AUTHORITY.KEYID = 7
1,516,020 UART: [ldev] FE.KEYID = 1
1,521,016 UART: [ldev] Erasing FE.KEYID = 1
1,546,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,851 UART: [ldev] --
1,586,128 UART: [fwproc] Waiting for Commands...
1,586,799 UART: [fwproc] Received command 0x46574c44
1,587,590 UART: [fwproc] Received Image of size 114168 bytes
2,883,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,660 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,693 >>> mbox cmd response: success
3,076,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,077,823 UART: [afmc] ++
3,077,991 UART: [afmc] CDI.KEYID = 6
3,078,353 UART: [afmc] SUBJECT.KEYID = 7
3,078,778 UART: [afmc] AUTHORITY.KEYID = 5
3,114,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,493 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,273 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,001 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,886 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,576 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,239 UART: [afmc] --
3,157,341 UART: [cold-reset] --
3,158,347 UART: [state] Locking Datavault
3,159,394 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,998 UART: [state] Locking ICCM
3,160,642 UART: [exit] Launching FMC @ 0x40000130
3,165,971 UART:
3,165,987 UART: Running Caliptra FMC ...
3,166,395 UART:
3,166,538 UART: [state] CFI Enabled
3,177,365 UART: [fht] FMC Alias Private Key: 7
3,285,690 UART: [art] Extend RT PCRs Done
3,286,118 UART: [art] Lock RT PCRs Done
3,288,072 UART: [art] Populate DV Done
3,296,219 UART: [fht] FMC Alias Private Key: 7
3,297,369 UART: [art] Derive CDI
3,297,649 UART: [art] Store in in slot 0x4
3,383,362 UART: [art] Derive Key Pair
3,383,722 UART: [art] Store priv key in slot 0x5
3,396,576 UART: [art] Derive Key Pair - Done
3,411,313 UART: [art] Signing Cert with AUTHO
3,411,793 UART: RITY.KEYID = 7
3,427,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,790 UART: [art] PUB.X = 985EF46AF78203B996CD9C97124BBABEBF56C60A4F8DC948DFB94186AA368302FF28845AA067F7DA1368F9EFCFEF8BE4
3,434,571 UART: [art] PUB.Y = 24117F8ADCD38FA91BF7765E95E711B3FDB1D2CF0D4E0B96729620B251EE4D281B58D4E8BD5DEC38F98A2FF1E5551343
3,441,529 UART: [art] SIG.R = 3F59FA42545610E0070B9C275E7A71DE2B8EF25D305FEF92AB07817D452B0660DB04C466D8469B1997809366FA74F6BA
3,448,284 UART: [art] SIG.S = B35479D76C28F8096F21C88902A21743F79ECF211B1EFB42031EF82204CE2B60208E3EB11FF1A8CB52A3E4F05FBDCED5
3,471,777 UART: Caliptra RT
3,472,122 UART: [state] CFI Enabled
3,579,625 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,497 UART: [rt]cmd =0x44504543, len=96
3,647,407 >>> mbox cmd response data (56 bytes)
3,647,408 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,676,599 UART: [rt]cmd =0x54514754, len=24
3,678,271 >>> mbox cmd response: failed
3,678,271 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,707,625 UART: [rt]cmd =0x54514754, len=24
3,709,873 >>> mbox cmd response data (8 bytes)
3,709,874 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,740,085 UART: [rt]cmd =0x44504543, len=96
3,776,162 >>> mbox cmd response data (56 bytes)
3,776,163 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,805,350 UART: [rt]cmd =0x47544744, len=8
3,807,998 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,618 ready_for_fw is high
1,362,618 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,719 >>> mbox cmd response: success
2,926,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,988,905 UART:
2,988,921 UART: Running Caliptra FMC ...
2,989,329 UART:
2,989,472 UART: [state] CFI Enabled
3,000,145 UART: [fht] FMC Alias Private Key: 7
3,107,924 UART: [art] Extend RT PCRs Done
3,108,352 UART: [art] Lock RT PCRs Done
3,109,742 UART: [art] Populate DV Done
3,117,863 UART: [fht] FMC Alias Private Key: 7
3,118,963 UART: [art] Derive CDI
3,119,243 UART: [art] Store in in slot 0x4
3,205,110 UART: [art] Derive Key Pair
3,205,470 UART: [art] Store priv key in slot 0x5
3,218,674 UART: [art] Derive Key Pair - Done
3,233,629 UART: [art] Signing Cert with AUTHO
3,234,109 UART: RITY.KEYID = 7
3,249,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,950 UART: [art] PUB.X = 0357AF3E0D4176A5FC5A2E7B9ED78F63EE307431114074F20D3B172D0C5A5521FEE2BE65F05937EF1062B0BC426F6FFC
3,256,718 UART: [art] PUB.Y = E5246DE8F2925BBABD308908E9C9A952AD7873412AF03A18479DE398CED758BECD8DA69649B24DC6F9C51A8A77E7355B
3,263,677 UART: [art] SIG.R = 58AE6D753ABEBE8086DC73F064BE11D83A0DB08D1955590ABC85CB487DF5889B735BBAC0EEFFA17FC0E1E2F1FD3CF67E
3,270,469 UART: [art] SIG.S = 059BD85DB133062E7F70F2FA6F6D664EF0EAC84D6E123C391124573A64B4CCE56B8A492327D724183CFA95A4EFD36C43
3,294,836 UART: Caliptra RT
3,295,181 UART: [state] CFI Enabled
3,402,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,685 UART: [rt]cmd =0x44504543, len=96
3,469,893 >>> mbox cmd response data (56 bytes)
3,469,894 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,499,389 UART: [rt]cmd =0x54514754, len=24
3,501,335 >>> mbox cmd response: failed
3,501,335 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,530,823 UART: [rt]cmd =0x54514754, len=24
3,533,047 >>> mbox cmd response data (8 bytes)
3,533,048 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,563,061 UART: [rt]cmd =0x44504543, len=96
3,600,170 >>> mbox cmd response data (56 bytes)
3,600,171 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,629,586 UART: [rt]cmd =0x47544744, len=8
3,632,188 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
86,041 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
892,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,925 UART: [kat] ++
897,077 UART: [kat] sha1
901,281 UART: [kat] SHA2-256
903,221 UART: [kat] SHA2-384
906,084 UART: [kat] SHA2-512-ACC
907,985 UART: [kat] ECC-384
917,272 UART: [kat] HMAC-384Kdf
921,856 UART: [kat] LMS
1,170,184 UART: [kat] --
1,171,301 UART: [cold-reset] ++
1,171,629 UART: [fht] FHT @ 0x50003400
1,174,484 UART: [idev] ++
1,174,652 UART: [idev] CDI.KEYID = 6
1,175,012 UART: [idev] SUBJECT.KEYID = 7
1,175,436 UART: [idev] UDS.KEYID = 0
1,175,781 ready_for_fw is high
1,175,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,827 UART: [idev] Sha1 KeyId Algorithm
1,208,215 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,674 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,215,461 UART: [ldev] Erasing FE.KEYID = 1
1,241,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,395 UART: [ldev] --
1,280,676 UART: [fwproc] Wait for Commands...
1,281,394 UART: [fwproc] Recv command 0x46574c44
1,282,122 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,514 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,471 >>> mbox cmd response: success
2,771,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,659 UART: [afmc] ++
2,772,827 UART: [afmc] CDI.KEYID = 6
2,773,189 UART: [afmc] SUBJECT.KEYID = 7
2,773,614 UART: [afmc] AUTHORITY.KEYID = 5
2,808,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,179 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,860 UART: [afmc] --
2,851,888 UART: [cold-reset] --
2,852,856 UART: [state] Locking Datavault
2,854,003 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,607 UART: [state] Locking ICCM
2,855,073 UART: [exit] Launching FMC @ 0x40000130
2,860,402 UART:
2,860,418 UART: Running Caliptra FMC ...
2,860,826 UART:
2,860,880 UART: [state] CFI Enabled
2,871,309 UART: [fht] FMC Alias Private Key: 7
2,978,842 UART: [art] Extend RT PCRs Done
2,979,270 UART: [art] Lock RT PCRs Done
2,980,370 UART: [art] Populate DV Done
2,988,531 UART: [fht] FMC Alias Private Key: 7
2,989,581 UART: [art] Derive CDI
2,989,861 UART: [art] Store in in slot 0x4
3,075,828 UART: [art] Derive Key Pair
3,076,188 UART: [art] Store priv key in slot 0x5
3,089,400 UART: [art] Derive Key Pair - Done
3,104,571 UART: [art] Signing Cert with AUTHO
3,105,051 UART: RITY.KEYID = 7
3,120,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,058 UART: [art] PUB.X = 3DA12A6A4045FF3EBFD3243DFB6668FA9DE36B1661644103A32417CCEF506555D130C7902CA8095D4F43C6B9C1D8E904
3,127,825 UART: [art] PUB.Y = DB5D3613BE434C810DF6CE5735D4911DBD60B4FFFB6ECB121E62D1E7B6AF47DAC6B2E861CC886C20B9836DBD90A1E0AC
3,134,798 UART: [art] SIG.R = 36F48F61F9F3A1F91F4055D82C6D85236B4BE5C2C37B1323181D7BB3365D7F6E4EB446E729EBD2FDDABD469AA405F812
3,141,577 UART: [art] SIG.S = 4F240752955D0D679C201BD04CA8C216A7872F222FC9688BD204E215A46A79EF4BD241DE3852335DC33CD9CF57C6BE31
3,166,269 UART: Caliptra RT
3,166,522 UART: [state] CFI Enabled
3,274,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,409 UART: [rt]cmd =0x44504543, len=96
3,342,337 >>> mbox cmd response data (56 bytes)
3,342,338 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,909 UART: [rt]cmd =0x54514754, len=24
3,373,771 >>> mbox cmd response: failed
3,373,771 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,041 UART: [rt]cmd =0x54514754, len=24
3,405,229 >>> mbox cmd response data (8 bytes)
3,405,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,317 UART: [rt]cmd =0x44504543, len=96
3,471,810 >>> mbox cmd response data (56 bytes)
3,471,811 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,298 UART: [rt]cmd =0x47544744, len=8
3,503,824 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,213 ready_for_fw is high
1,060,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,176 >>> mbox cmd response: success
2,625,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,687,110 UART:
2,687,126 UART: Running Caliptra FMC ...
2,687,534 UART:
2,687,588 UART: [state] CFI Enabled
2,698,081 UART: [fht] FMC Alias Private Key: 7
2,806,090 UART: [art] Extend RT PCRs Done
2,806,518 UART: [art] Lock RT PCRs Done
2,808,012 UART: [art] Populate DV Done
2,816,381 UART: [fht] FMC Alias Private Key: 7
2,817,557 UART: [art] Derive CDI
2,817,837 UART: [art] Store in in slot 0x4
2,903,806 UART: [art] Derive Key Pair
2,904,166 UART: [art] Store priv key in slot 0x5
2,917,056 UART: [art] Derive Key Pair - Done
2,931,737 UART: [art] Signing Cert with AUTHO
2,932,217 UART: RITY.KEYID = 7
2,947,395 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,160 UART: [art] PUB.X = 9DE78FD7D86468C83F5F180E438EFB502FD3CEC9D9DCAAFD5945D05D36CD90BB57FA20FC1F773DD0F373B5AA35853308
2,954,944 UART: [art] PUB.Y = E26D98212686223B1BC51D5FB6E4BEA934636DFD9E70611657D260321FE36BD550F23D7A4E78692B51D5A8869A130D81
2,961,889 UART: [art] SIG.R = AFD351857A66688100C010BC7D4DC115D6267D3BDA3AD1D7FDA7EE2CDAD75B606E6D502D6E032E314AF7E325883E9CFC
2,968,652 UART: [art] SIG.S = CC462A79F8ADF154058B8FDDF7C8D3E58DFB5D2152CBA41F2764927E7B9F88F22B141067F9E3925E6A9ADEEFEC6922D6
2,992,008 UART: Caliptra RT
2,992,261 UART: [state] CFI Enabled
3,099,665 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,605 UART: [rt]cmd =0x44504543, len=96
3,167,239 >>> mbox cmd response data (56 bytes)
3,167,240 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,196,603 UART: [rt]cmd =0x54514754, len=24
3,198,509 >>> mbox cmd response: failed
3,198,509 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,157 UART: [rt]cmd =0x54514754, len=24
3,230,297 >>> mbox cmd response data (8 bytes)
3,230,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,251 UART: [rt]cmd =0x44504543, len=96
3,297,386 >>> mbox cmd response data (56 bytes)
3,297,387 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,870 UART: [rt]cmd =0x47544744, len=8
3,329,674 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
893,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,640 UART: [kat] ++
897,792 UART: [kat] sha1
902,072 UART: [kat] SHA2-256
904,012 UART: [kat] SHA2-384
906,651 UART: [kat] SHA2-512-ACC
908,552 UART: [kat] ECC-384
918,311 UART: [kat] HMAC-384Kdf
922,931 UART: [kat] LMS
1,171,259 UART: [kat] --
1,172,372 UART: [cold-reset] ++
1,172,934 UART: [fht] FHT @ 0x50003400
1,175,539 UART: [idev] ++
1,175,707 UART: [idev] CDI.KEYID = 6
1,176,067 UART: [idev] SUBJECT.KEYID = 7
1,176,491 UART: [idev] UDS.KEYID = 0
1,176,836 ready_for_fw is high
1,176,836 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,821 UART: [idev] Erasing UDS.KEYID = 0
1,202,298 UART: [idev] Sha1 KeyId Algorithm
1,210,652 UART: [idev] --
1,211,636 UART: [ldev] ++
1,211,804 UART: [ldev] CDI.KEYID = 6
1,212,167 UART: [ldev] SUBJECT.KEYID = 5
1,212,593 UART: [ldev] AUTHORITY.KEYID = 7
1,213,056 UART: [ldev] FE.KEYID = 1
1,218,572 UART: [ldev] Erasing FE.KEYID = 1
1,245,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,798 UART: [ldev] --
1,284,101 UART: [fwproc] Wait for Commands...
1,284,875 UART: [fwproc] Recv command 0x46574c44
1,285,603 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,165 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,926 >>> mbox cmd response: success
2,772,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,774,154 UART: [afmc] ++
2,774,322 UART: [afmc] CDI.KEYID = 6
2,774,684 UART: [afmc] SUBJECT.KEYID = 7
2,775,109 UART: [afmc] AUTHORITY.KEYID = 5
2,811,122 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,311 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,039 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,924 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,643 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,489 UART: [afmc] --
2,854,519 UART: [cold-reset] --
2,855,527 UART: [state] Locking Datavault
2,856,696 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,300 UART: [state] Locking ICCM
2,857,728 UART: [exit] Launching FMC @ 0x40000130
2,863,057 UART:
2,863,073 UART: Running Caliptra FMC ...
2,863,481 UART:
2,863,624 UART: [state] CFI Enabled
2,874,037 UART: [fht] FMC Alias Private Key: 7
2,981,678 UART: [art] Extend RT PCRs Done
2,982,106 UART: [art] Lock RT PCRs Done
2,983,846 UART: [art] Populate DV Done
2,992,017 UART: [fht] FMC Alias Private Key: 7
2,992,991 UART: [art] Derive CDI
2,993,271 UART: [art] Store in in slot 0x4
3,079,002 UART: [art] Derive Key Pair
3,079,362 UART: [art] Store priv key in slot 0x5
3,092,392 UART: [art] Derive Key Pair - Done
3,107,241 UART: [art] Signing Cert with AUTHO
3,107,721 UART: RITY.KEYID = 7
3,123,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,810 UART: [art] PUB.X = 59461D01B1A7FB371234C0C4269AAE0C2E33D128ECF7F26299D91128344308BBE87123932F0ED743B169B5DDA0EC6019
3,130,568 UART: [art] PUB.Y = 3BEF170A42988731B6906C1381A748F22EE50BD19F3377BAF43A14F4CECB5961BAE7CF1AE69830FACE30AE93EB386B44
3,137,526 UART: [art] SIG.R = 034B63D834B910E9981F748E21A6A6495F628409E88860853314EB2A7049C767C22050C1CE927583B48E5A390F804CBE
3,144,275 UART: [art] SIG.S = E4D4B52469354BD4919B8F9536875BD3AE8333C229223B2E28ABDB5EDE2203F31830BCB2FD3943A78C0848865CE7AAC1
3,167,944 UART: Caliptra RT
3,168,289 UART: [state] CFI Enabled
3,276,186 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,138 UART: [rt]cmd =0x44504543, len=96
3,343,256 >>> mbox cmd response data (56 bytes)
3,343,257 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,372,672 UART: [rt]cmd =0x54514754, len=24
3,374,714 >>> mbox cmd response: failed
3,374,714 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,404,164 UART: [rt]cmd =0x54514754, len=24
3,406,230 >>> mbox cmd response data (8 bytes)
3,406,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,436,182 UART: [rt]cmd =0x44504543, len=96
3,472,425 >>> mbox cmd response data (56 bytes)
3,472,426 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,853 UART: [rt]cmd =0x47544744, len=8
3,504,269 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,956 ready_for_fw is high
1,060,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,609 >>> mbox cmd response: success
2,623,609 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,686,233 UART:
2,686,249 UART: Running Caliptra FMC ...
2,686,657 UART:
2,686,800 UART: [state] CFI Enabled
2,697,445 UART: [fht] FMC Alias Private Key: 7
2,805,054 UART: [art] Extend RT PCRs Done
2,805,482 UART: [art] Lock RT PCRs Done
2,807,138 UART: [art] Populate DV Done
2,815,061 UART: [fht] FMC Alias Private Key: 7
2,816,115 UART: [art] Derive CDI
2,816,395 UART: [art] Store in in slot 0x4
2,901,854 UART: [art] Derive Key Pair
2,902,214 UART: [art] Store priv key in slot 0x5
2,915,138 UART: [art] Derive Key Pair - Done
2,930,248 UART: [art] Signing Cert with AUTHO
2,930,728 UART: RITY.KEYID = 7
2,946,052 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,817 UART: [art] PUB.X = DD9331CE0BDA0E2DDD6276AA36413A1D3F4189C8EDEC1B38DE27376A8659AB1753E63963DD522E23ED7E712477089DD0
2,953,588 UART: [art] PUB.Y = C6529D9974CE5771D03F49C060391F269A5B1CF8E8F1424D0EE8F9022D4A695E44FC26450A0C47F118520E77698F9B36
2,960,519 UART: [art] SIG.R = 13FE8498997788E10D89868B5ED76061328C0C956E1CC320DF080A5F9DCBF5FFB18DDEBC07C6DE7FBB90ABD1DA56C4B7
2,967,294 UART: [art] SIG.S = 9A0A4C88550E4DD0B8F854224D78B15A1C1E728A0D0470304E8E77AFAAEF64D22DA28EDEE03F406C7AAE6D9178F7A33F
2,991,247 UART: Caliptra RT
2,991,592 UART: [state] CFI Enabled
3,100,345 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,491 UART: [rt]cmd =0x44504543, len=96
3,167,939 >>> mbox cmd response data (56 bytes)
3,167,940 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,135 UART: [rt]cmd =0x54514754, len=24
3,198,819 >>> mbox cmd response: failed
3,198,819 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,433 UART: [rt]cmd =0x54514754, len=24
3,230,651 >>> mbox cmd response data (8 bytes)
3,230,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,639 UART: [rt]cmd =0x44504543, len=96
3,297,524 >>> mbox cmd response data (56 bytes)
3,297,525 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,327,008 UART: [rt]cmd =0x47544744, len=8
3,329,562 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,678 UART: [state] LifecycleState = Unprovisioned
86,333 UART: [state] DebugLocked = No
86,921 UART: [state] WD Timer not started. Device not locked for debugging
88,096 UART: [kat] SHA2-256
891,646 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,775 UART: [kat] ++
895,927 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,892 UART: [kat] SHA2-512-ACC
906,793 UART: [kat] ECC-384
916,634 UART: [kat] HMAC-384Kdf
921,320 UART: [kat] LMS
1,169,632 UART: [kat] --
1,170,609 UART: [cold-reset] ++
1,171,173 UART: [fht] FHT @ 0x50003400
1,173,841 UART: [idev] ++
1,174,009 UART: [idev] CDI.KEYID = 6
1,174,370 UART: [idev] SUBJECT.KEYID = 7
1,174,795 UART: [idev] UDS.KEYID = 0
1,175,141 ready_for_fw is high
1,175,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,731 UART: [idev] Erasing UDS.KEYID = 0
1,200,051 UART: [idev] Sha1 KeyId Algorithm
1,208,887 UART: [idev] --
1,210,100 UART: [ldev] ++
1,210,268 UART: [ldev] CDI.KEYID = 6
1,210,632 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,682 UART: [ldev] Erasing FE.KEYID = 1
1,242,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,336 UART: [ldev] --
1,281,646 UART: [fwproc] Wait for Commands...
1,282,225 UART: [fwproc] Recv command 0x46574c44
1,282,958 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,964 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,041 >>> mbox cmd response: success
2,772,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,773,264 UART: [afmc] ++
2,773,432 UART: [afmc] CDI.KEYID = 6
2,773,795 UART: [afmc] SUBJECT.KEYID = 7
2,774,221 UART: [afmc] AUTHORITY.KEYID = 5
2,809,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,349 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,078 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,961 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,680 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,573 UART: [afmc] --
2,852,601 UART: [cold-reset] --
2,853,779 UART: [state] Locking Datavault
2,854,834 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,438 UART: [state] Locking ICCM
2,855,906 UART: [exit] Launching FMC @ 0x40000130
2,861,235 UART:
2,861,251 UART: Running Caliptra FMC ...
2,861,659 UART:
2,861,713 UART: [state] CFI Enabled
2,872,068 UART: [fht] FMC Alias Private Key: 7
2,979,861 UART: [art] Extend RT PCRs Done
2,980,289 UART: [art] Lock RT PCRs Done
2,982,053 UART: [art] Populate DV Done
2,990,292 UART: [fht] FMC Alias Private Key: 7
2,991,242 UART: [art] Derive CDI
2,991,522 UART: [art] Store in in slot 0x4
3,077,019 UART: [art] Derive Key Pair
3,077,379 UART: [art] Store priv key in slot 0x5
3,091,147 UART: [art] Derive Key Pair - Done
3,105,922 UART: [art] Signing Cert with AUTHO
3,106,402 UART: RITY.KEYID = 7
3,121,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,081 UART: [art] PUB.X = C5D663335DC8742E26BEE149710D9C9B2B73E30F118944D163DAE8F239E99C287FAD695A4355A7E9814FFED5CF81E60A
3,128,850 UART: [art] PUB.Y = AB5A12A21F61FE8D2CF175C12DE0FA6421FA463999B09AA52748CDDE64512C1287A7C99EBD84B66F0CF3EA5BB2881BD3
3,135,815 UART: [art] SIG.R = 230A126F141528A92CBC989FE1EB23D3E6938917B75EB06AF3E6F19714D8E95713164352170A07E69C1B80F1FECA495B
3,142,576 UART: [art] SIG.S = 741F88378775531258BF8A7714D3941743124BCAE2FCF2464BAE2490607A7707B845461C94DD81D5A8FF1109DFFB2672
3,166,131 UART: Caliptra RT
3,166,384 UART: [state] CFI Enabled
3,273,753 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,971 UART: [rt]cmd =0x44504543, len=96
3,342,017 >>> mbox cmd response data (56 bytes)
3,342,018 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,693 UART: [rt]cmd =0x54514754, len=24
3,373,473 >>> mbox cmd response: failed
3,373,473 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,129 UART: [rt]cmd =0x54514754, len=24
3,405,415 >>> mbox cmd response data (8 bytes)
3,405,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,259 UART: [rt]cmd =0x44504543, len=96
3,471,226 >>> mbox cmd response data (56 bytes)
3,471,227 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,500,722 UART: [rt]cmd =0x47544744, len=8
3,503,388 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,498 ready_for_fw is high
1,056,498 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,939 >>> mbox cmd response: success
2,622,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,685,715 UART:
2,685,731 UART: Running Caliptra FMC ...
2,686,139 UART:
2,686,193 UART: [state] CFI Enabled
2,697,020 UART: [fht] FMC Alias Private Key: 7
2,805,085 UART: [art] Extend RT PCRs Done
2,805,513 UART: [art] Lock RT PCRs Done
2,806,883 UART: [art] Populate DV Done
2,815,150 UART: [fht] FMC Alias Private Key: 7
2,816,194 UART: [art] Derive CDI
2,816,474 UART: [art] Store in in slot 0x4
2,902,353 UART: [art] Derive Key Pair
2,902,713 UART: [art] Store priv key in slot 0x5
2,916,633 UART: [art] Derive Key Pair - Done
2,931,491 UART: [art] Signing Cert with AUTHO
2,931,971 UART: RITY.KEYID = 7
2,947,071 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,836 UART: [art] PUB.X = B8D5C34D5C93B4FCD262AD0C4DB0CE712F392EED574C6E5FE8E32315F949F5054BE0DB4419F621918801B34A00A06B96
2,954,585 UART: [art] PUB.Y = 2839753BDC249E0B6BF802116BD8D858F638B5D477BEC54FB3ABE65A88B52829AB2DF18751364967B57A83509059E5EE
2,961,531 UART: [art] SIG.R = 828D529F85C49328A562AC0F4046D2293D74385572ACC3FE91F10C1EB70D21C540478C2C5A472683B011DA9692F4763B
2,968,286 UART: [art] SIG.S = 4773F613202D06431C8B8200C55B582B43018ADDED59479622EBF4B6CDE2260994C0DCA92F07B24844711DFF9B8B8994
2,992,209 UART: Caliptra RT
2,992,462 UART: [state] CFI Enabled
3,100,693 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,055 UART: [rt]cmd =0x44504543, len=96
3,168,137 >>> mbox cmd response data (56 bytes)
3,168,138 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,197,513 UART: [rt]cmd =0x54514754, len=24
3,199,335 >>> mbox cmd response: failed
3,199,335 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,228,857 UART: [rt]cmd =0x54514754, len=24
3,230,875 >>> mbox cmd response data (8 bytes)
3,230,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,260,629 UART: [rt]cmd =0x44504543, len=96
3,296,976 >>> mbox cmd response data (56 bytes)
3,296,977 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,326,312 UART: [rt]cmd =0x47544744, len=8
3,328,654 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,481 UART: [kat] HMAC-384Kdf
921,055 UART: [kat] LMS
1,169,367 UART: [kat] --
1,170,444 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,174,778 ready_for_fw is high
1,174,778 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,916 UART: [idev] Sha1 KeyId Algorithm
1,208,798 UART: [idev] --
1,209,813 UART: [ldev] ++
1,209,981 UART: [ldev] CDI.KEYID = 6
1,210,345 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,243,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,331 UART: [fwproc] Wait for Commands...
1,283,132 UART: [fwproc] Recv command 0x46574c44
1,283,865 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,602 >>> mbox cmd response: success
2,771,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,772,625 UART: [afmc] ++
2,772,793 UART: [afmc] CDI.KEYID = 6
2,773,156 UART: [afmc] SUBJECT.KEYID = 7
2,773,582 UART: [afmc] AUTHORITY.KEYID = 5
2,809,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,744 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,473 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,356 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,075 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,804 UART: [afmc] --
2,852,834 UART: [cold-reset] --
2,853,812 UART: [state] Locking Datavault
2,854,943 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,547 UART: [state] Locking ICCM
2,855,975 UART: [exit] Launching FMC @ 0x40000130
2,861,304 UART:
2,861,320 UART: Running Caliptra FMC ...
2,861,728 UART:
2,861,871 UART: [state] CFI Enabled
2,872,704 UART: [fht] FMC Alias Private Key: 7
2,980,297 UART: [art] Extend RT PCRs Done
2,980,725 UART: [art] Lock RT PCRs Done
2,982,507 UART: [art] Populate DV Done
2,990,774 UART: [fht] FMC Alias Private Key: 7
2,991,846 UART: [art] Derive CDI
2,992,126 UART: [art] Store in in slot 0x4
3,077,905 UART: [art] Derive Key Pair
3,078,265 UART: [art] Store priv key in slot 0x5
3,091,655 UART: [art] Derive Key Pair - Done
3,106,283 UART: [art] Signing Cert with AUTHO
3,106,763 UART: RITY.KEYID = 7
3,121,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,726 UART: [art] PUB.X = 53BB2A2AF84D02FEC9DEE8241523714D004D93E28B0819BA01AE3F2215CEF66984BDA49E5A973D05D763AF32483A858E
3,129,470 UART: [art] PUB.Y = E4412E3271CAA8D408EFE5D46990F28AC01C3C5BC615A6701F8CE8B1AD532A36E6B4C3E5581CCF6BF36EB1D749A2FABD
3,136,439 UART: [art] SIG.R = A14364E43332160D7094CBD3F95B998E46991102C9516BED502DC00AB891B53066CB7264BE5AEC3ADAABDD83E998D8AD
3,143,210 UART: [art] SIG.S = 21C12101564BDADAAF668AFC8C963AF34A9C76DB075BEF4426EC340966A35BE9941387B46BF72961951544E799CC043A
3,166,521 UART: Caliptra RT
3,166,866 UART: [state] CFI Enabled
3,273,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,003 UART: [rt]cmd =0x44504543, len=96
3,342,113 >>> mbox cmd response data (56 bytes)
3,342,114 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,371,807 UART: [rt]cmd =0x54514754, len=24
3,373,759 >>> mbox cmd response: failed
3,373,759 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,403,121 UART: [rt]cmd =0x54514754, len=24
3,405,303 >>> mbox cmd response data (8 bytes)
3,405,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,327 UART: [rt]cmd =0x44504543, len=96
3,471,976 >>> mbox cmd response data (56 bytes)
3,471,977 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,501,474 UART: [rt]cmd =0x47544744, len=8
3,504,130 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,343 ready_for_fw is high
1,057,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,434 >>> mbox cmd response: success
2,621,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,683,068 UART:
2,683,084 UART: Running Caliptra FMC ...
2,683,492 UART:
2,683,635 UART: [state] CFI Enabled
2,694,484 UART: [fht] FMC Alias Private Key: 7
2,802,877 UART: [art] Extend RT PCRs Done
2,803,305 UART: [art] Lock RT PCRs Done
2,804,933 UART: [art] Populate DV Done
2,813,016 UART: [fht] FMC Alias Private Key: 7
2,814,046 UART: [art] Derive CDI
2,814,326 UART: [art] Store in in slot 0x4
2,900,243 UART: [art] Derive Key Pair
2,900,603 UART: [art] Store priv key in slot 0x5
2,913,265 UART: [art] Derive Key Pair - Done
2,927,882 UART: [art] Signing Cert with AUTHO
2,928,362 UART: RITY.KEYID = 7
2,943,814 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,579 UART: [art] PUB.X = C9B9431CC26C2D206C3A6CE9D745A54F014F8CD46BCBA52D6749873864B7CFD642B8A30121779CA14459EA3382F9BDB8
2,951,351 UART: [art] PUB.Y = F646A77F8A246FC065C3BACEF14A726344829F4A9CB580B827695A11D11DF3302DFF50E1BD4168440826EEE11A3F09E0
2,958,301 UART: [art] SIG.R = A4E2C1A12740187FE5CCF017CDD482C20A6A21C321F6BD01BE53DEF046C6F015E9B983115B353644C14C1AB264FE0934
2,965,070 UART: [art] SIG.S = 7D8DCED1A45F81FEA8F50EA1620733A6308D80DA66264C2E089029F1AE8E4EE93F6ECC9EF13FBE43C4AE4F11A309C653
2,989,209 UART: Caliptra RT
2,989,554 UART: [state] CFI Enabled
3,097,103 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,051 UART: [rt]cmd =0x44504543, len=96
3,164,587 >>> mbox cmd response data (56 bytes)
3,164,588 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,194,059 UART: [rt]cmd =0x54514754, len=24
3,196,165 >>> mbox cmd response: failed
3,196,165 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,225,559 UART: [rt]cmd =0x54514754, len=24
3,227,851 >>> mbox cmd response data (8 bytes)
3,227,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,257,755 UART: [rt]cmd =0x44504543, len=96
3,294,862 >>> mbox cmd response data (56 bytes)
3,294,863 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,324,086 UART: [rt]cmd =0x47544744, len=8
3,326,454 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,022 UART:
192,401 UART: Running Caliptra ROM ...
193,543 UART:
193,689 UART: [state] CFI Enabled
266,522 UART: [state] LifecycleState = Unprovisioned
268,508 UART: [state] DebugLocked = No
270,695 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,199 UART: [kat] SHA2-256
444,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,457 UART: [kat] ++
455,899 UART: [kat] sha1
467,189 UART: [kat] SHA2-256
469,914 UART: [kat] SHA2-384
474,547 UART: [kat] SHA2-512-ACC
476,903 UART: [kat] ECC-384
2,769,291 UART: [kat] HMAC-384Kdf
2,801,842 UART: [kat] LMS
3,992,180 UART: [kat] --
3,997,446 UART: [cold-reset] ++
3,998,812 UART: [fht] Storing FHT @ 0x50003400
4,011,072 UART: [idev] ++
4,011,700 UART: [idev] CDI.KEYID = 6
4,012,601 UART: [idev] SUBJECT.KEYID = 7
4,013,838 UART: [idev] UDS.KEYID = 0
4,014,860 ready_for_fw is high
4,015,274 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,114,276 UART: [idev] Erasing UDS.KEYID = 0
7,348,622 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,590 UART: [idev] --
7,375,116 UART: [ldev] ++
7,375,769 UART: [ldev] CDI.KEYID = 6
7,376,652 UART: [ldev] SUBJECT.KEYID = 5
7,377,914 UART: [ldev] AUTHORITY.KEYID = 7
7,379,135 UART: [ldev] FE.KEYID = 1
7,423,580 UART: [ldev] Erasing FE.KEYID = 1
10,757,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,487 UART: [ldev] --
13,136,986 UART: [fwproc] Waiting for Commands...
13,138,627 UART: [fwproc] Received command 0x46574c44
13,140,868 UART: [fwproc] Received Image of size 78576 bytes
16,766,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,844,060 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,912,973 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,106,583 >>> mbox cmd response: success
17,107,068 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,110,489 UART: [afmc] ++
17,111,067 UART: [afmc] CDI.KEYID = 6
17,112,087 UART: [afmc] SUBJECT.KEYID = 7
17,113,243 UART: [afmc] AUTHORITY.KEYID = 5
20,472,476 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,771,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,774,148 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,788,560 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,803,428 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,817,875 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,839,912 UART: [afmc] --
22,844,472 UART: [cold-reset] --
22,848,330 UART: [state] Locking Datavault
22,853,732 UART: [state] Locking PCR0, PCR1 and PCR31
22,855,469 UART: [state] Locking ICCM
22,857,747 UART: [exit] Launching FMC @ 0x40000130
22,866,133 UART:
22,866,366 UART: Running Caliptra FMC ...
22,867,383 UART:
22,867,526 UART: [state] CFI Enabled
22,932,762 UART: [fht] FMC Alias Private Key: 7
25,270,888 UART: [art] Extend RT PCRs Done
25,272,116 UART: [art] Lock RT PCRs Done
25,273,706 UART: [art] Populate DV Done
25,279,380 UART: [fht] FMC Alias Private Key: 7
25,280,861 UART: [art] Derive CDI
25,281,592 UART: [art] Store in in slot 0x4
25,339,950 UART: [art] Derive Key Pair
25,340,986 UART: [art] Store priv key in slot 0x5
28,633,093 UART: [art] Derive Key Pair - Done
28,646,300 UART: [art] Signing Cert with AUTHO
28,647,594 UART: RITY.KEYID = 7
30,934,338 UART: [art] Erasing AUTHORITY.KEYID = 7
30,935,837 UART: [art] PUB.X = C49981A5461FE821FAC25BEB6F9C0B85E5CB5987FA8A45113E550446539F685F325B55E622BD585193AD3C9667958B7F
30,943,077 UART: [art] PUB.Y = BC4A7362B232134D1821C75A9D827D9663D5BCEB5DDCAD9AB64958DC9B6BA0E4979B5C22A1D795F1D7EB4601DC31706D
30,950,355 UART: [art] SIG.R = E76E66365D720335C36A80DD62BD445D9DE8E77C907CE5FB52D6E4D643E4C00468BFF6A779AC11B98646781BD1C2F3B7
30,957,729 UART: [art] SIG.S = 01A4126D41B56567D91233D05BA06E6EA88502CBC136EFE7FDD56227EFAF2E2D14FA9A8DABCE44524F312787DA03FACE
32,263,178 UART: mbox::rt_entry...
32,264,113 UART: ____ _ _ _ ____ _____
32,266,034 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,268,033 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,269,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,271,877 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,273,793 UART: |_|
32,274,619 UART:
32,388,052 UART: [rt] Runtime listening for mailbox commands...
32,390,063 >>> mbox cmd response data (0 bytes)
34,451,085 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,595,553 UART:
34,595,941 UART: Running Caliptra ROM ...
34,596,985 UART:
34,597,133 UART: [state] CFI Enabled
34,658,910 UART: [state] LifecycleState = Unprovisioned
34,660,899 UART: [state] DebugLocked = No
34,662,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,666,332 UART: [kat] SHA2-256
34,836,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,846,524 UART: [kat] ++
34,847,003 UART: [kat] sha1
34,857,566 UART: [kat] SHA2-256
34,860,249 UART: [kat] SHA2-384
34,864,767 UART: [kat] SHA2-512-ACC
34,867,158 UART: [kat] ECC-384
37,161,509 UART: [kat] HMAC-384Kdf
37,192,788 UART: [kat] LMS
38,383,100 UART: [kat] --
38,385,478 UART: [update-reset] ++
42,511,077 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,514,909 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,896,170 >>> mbox cmd response: success
42,900,704 UART: [update-reset] Copying MAN_2 To MAN_1
42,919,277 UART: [update-reset Success] --
42,923,627 UART: [state] Locking Datavault
42,928,442 UART: [state] Locking PCR0, PCR1 and PCR31
42,930,177 UART: [state] Locking ICCM
42,931,374 UART: [exit] Launching FMC @ 0x40000130
42,939,829 UART:
42,940,069 UART: Running Caliptra FMC ...
42,941,165 UART:
42,941,315 UART: [state] CFI Enabled
43,047,307 UART: [art] Extend RT PCRs Done
43,048,504 UART: [art] Lock RT PCRs Done
43,050,066 UART: [art] Populate DV Done
43,055,614 UART: [fht] FMC Alias Private Key: 7
43,057,194 UART: [art] Derive CDI
43,058,018 UART: [art] Store in in slot 0x4
43,115,919 UART: [art] Derive Key Pair
43,116,909 UART: [art] Store priv key in slot 0x5
46,409,803 UART: [art] Derive Key Pair - Done
46,422,371 UART: [art] Signing Cert with AUTHO
46,423,710 UART: RITY.KEYID = 7
48,710,790 UART: [art] Erasing AUTHORITY.KEYID = 7
48,712,305 UART: [art] PUB.X = 31C4D697A9E0DD2605CD239B517820D5B1428D10C295BEA767456603ADA5742B63491DFB12FB8E38959B814844895930
48,719,538 UART: [art] PUB.Y = 8E1203B36DC243CDC8C41E42F9EC7F8CFB5E0F72048902BA5493BF81F3EC09100BBC76BE3B5D10E99941E0EFB362709E
48,726,809 UART: [art] SIG.R = 63FAF13E7D680405F246E63BDA42684EF10F5F7A57B8C013B83EA5DBC47919D35264569946F53AE48B27963405ABC506
48,734,180 UART: [art] SIG.S = 71CB0DA13BBDE24600DE3CDEE2EFA6BF97011CCD0523193723ACC21D25A9F1CAA8AEF69F717B7924287DA99DD8E232DF
50,039,519 UART: Caliptra RT
50,040,235 UART: [state] CFI Enabled
50,369,180 UART: [rt] RT failed reset flow
50,370,368 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,782,766 ready_for_fw is high
3,783,157 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,138,990 >>> mbox cmd response: success
17,139,723 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,842,713 UART:
22,843,097 UART: Running Caliptra FMC ...
22,844,254 UART:
22,844,412 UART: [state] CFI Enabled
22,908,910 UART: [fht] FMC Alias Private Key: 7
25,246,420 UART: [art] Extend RT PCRs Done
25,247,647 UART: [art] Lock RT PCRs Done
25,249,145 UART: [art] Populate DV Done
25,254,506 UART: [fht] FMC Alias Private Key: 7
25,256,162 UART: [art] Derive CDI
25,256,980 UART: [art] Store in in slot 0x4
25,317,661 UART: [art] Derive Key Pair
25,318,658 UART: [art] Store priv key in slot 0x5
28,611,246 UART: [art] Derive Key Pair - Done
28,623,958 UART: [art] Signing Cert with AUTHO
28,625,278 UART: RITY.KEYID = 7
30,913,175 UART: [art] Erasing AUTHORITY.KEYID = 7
30,914,684 UART: [art] PUB.X = 7A2F1852673C07258988BF72D13C487B29FD6170EA4CD9A6C81DDB1A52AE97CD3B38F7D9E80BDAD28F3EB51647ADFE6B
30,921,992 UART: [art] PUB.Y = FE933D5119C1B3F80B9582208FB58D15370DABDA9E894E8F7BA74AB37710A02B199A2A007FEF92219352172C97F373FB
30,929,219 UART: [art] SIG.R = 1A0C9EB889BF688BDD0AECB9EF395A6D0EC0E671E790F7F61EA793E98BC95F132321DDDD22A00DF1A7A8E514662B6F0A
30,936,636 UART: [art] SIG.S = A3421EEF11775992EC6339C438E27AF051734DDE2F96644FC5B40D531EC201C97D0F759BD85AEFD27A200C55B51448A5
32,241,424 UART: mbox::rt_entry...
32,242,386 UART: ____ _ _ _ ____ _____
32,244,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,246,362 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,248,329 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,250,287 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,252,212 UART: |_|
32,253,015 UART:
32,366,353 UART: [rt] Runtime listening for mailbox commands...
32,368,352 >>> mbox cmd response data (0 bytes)
34,430,200 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,172,692 >>> mbox cmd response: success
43,207,422 UART:
43,207,735 UART: Running Caliptra FMC ...
43,208,849 UART:
43,209,009 UART: [state] CFI Enabled
43,312,758 UART: [art] Extend RT PCRs Done
43,313,948 UART: [art] Lock RT PCRs Done
43,315,347 UART: [art] Populate DV Done
43,321,014 UART: [fht] FMC Alias Private Key: 7
43,322,705 UART: [art] Derive CDI
43,323,509 UART: [art] Store in in slot 0x4
43,381,140 UART: [art] Derive Key Pair
43,382,176 UART: [art] Store priv key in slot 0x5
46,676,037 UART: [art] Derive Key Pair - Done
46,688,845 UART: [art] Signing Cert with AUTHO
46,690,154 UART: RITY.KEYID = 7
48,976,767 UART: [art] Erasing AUTHORITY.KEYID = 7
48,978,271 UART: [art] PUB.X = A8D796E9AB55EE48739BA44E2F536AD615D87A7B9C5A01845A44B4A9FB0A8A291B22F4A676DD282E2A40BDFBB1A1EC48
48,985,547 UART: [art] PUB.Y = 4B61B81D440181CE8E1F3C2415261E8F2E3234B824EBAA5A18332784DA4BFA359FCD3B79112A48FBE0D79921C089C58A
48,992,750 UART: [art] SIG.R = 063C7461BD9C740C519BFDB020974FCB5419EE98943A31A25D9C6ACFC9E4E3AD90BA422EE08062DC17741219266A0D03
49,000,156 UART: [art] SIG.S = 173E25882DB126CB5AE0131684C84CB9AFFDB93434212FCC6CD0A2510147B9692CF5338B781E06BBC72BFB02A1792D36
50,305,817 UART: Caliptra RT
50,306,512 UART: [state] CFI Enabled
50,642,308 UART: [rt] RT failed reset flow
50,643,517 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,480 UART:
192,863 UART: Running Caliptra ROM ...
193,998 UART:
603,613 UART: [state] CFI Enabled
616,137 UART: [state] LifecycleState = Unprovisioned
618,072 UART: [state] DebugLocked = No
620,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,377 UART: [kat] SHA2-256
796,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,653 UART: [kat] ++
807,095 UART: [kat] sha1
818,707 UART: [kat] SHA2-256
821,399 UART: [kat] SHA2-384
826,470 UART: [kat] SHA2-512-ACC
828,835 UART: [kat] ECC-384
3,111,671 UART: [kat] HMAC-384Kdf
3,123,042 UART: [kat] LMS
4,313,157 UART: [kat] --
4,318,251 UART: [cold-reset] ++
4,319,846 UART: [fht] Storing FHT @ 0x50003400
4,330,053 UART: [idev] ++
4,330,698 UART: [idev] CDI.KEYID = 6
4,331,608 UART: [idev] SUBJECT.KEYID = 7
4,332,857 UART: [idev] UDS.KEYID = 0
4,333,916 ready_for_fw is high
4,334,119 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,433,024 UART: [idev] Erasing UDS.KEYID = 0
7,616,847 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,739 UART: [idev] --
7,644,642 UART: [ldev] ++
7,645,209 UART: [ldev] CDI.KEYID = 6
7,646,180 UART: [ldev] SUBJECT.KEYID = 5
7,647,393 UART: [ldev] AUTHORITY.KEYID = 7
7,648,622 UART: [ldev] FE.KEYID = 1
7,658,675 UART: [ldev] Erasing FE.KEYID = 1
10,946,899 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,488 UART: [ldev] --
13,309,867 UART: [fwproc] Waiting for Commands...
13,312,227 UART: [fwproc] Received command 0x46574c44
13,314,409 UART: [fwproc] Received Image of size 78576 bytes
16,933,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,002,500 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,071,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,263,675 >>> mbox cmd response: success
17,264,167 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,268,244 UART: [afmc] ++
17,268,827 UART: [afmc] CDI.KEYID = 6
17,269,774 UART: [afmc] SUBJECT.KEYID = 7
17,271,044 UART: [afmc] AUTHORITY.KEYID = 5
20,588,042 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,881,731 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,884,043 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,898,475 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,913,238 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,927,665 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,949,322 UART: [afmc] --
22,953,024 UART: [cold-reset] --
22,956,676 UART: [state] Locking Datavault
22,961,921 UART: [state] Locking PCR0, PCR1 and PCR31
22,963,682 UART: [state] Locking ICCM
22,965,946 UART: [exit] Launching FMC @ 0x40000130
22,974,289 UART:
22,974,526 UART: Running Caliptra FMC ...
22,975,626 UART:
22,975,783 UART: [state] CFI Enabled
22,983,893 UART: [fht] FMC Alias Private Key: 7
25,314,682 UART: [art] Extend RT PCRs Done
25,315,897 UART: [art] Lock RT PCRs Done
25,317,516 UART: [art] Populate DV Done
25,323,041 UART: [fht] FMC Alias Private Key: 7
25,324,743 UART: [art] Derive CDI
25,325,476 UART: [art] Store in in slot 0x4
25,368,552 UART: [art] Derive Key Pair
25,369,554 UART: [art] Store priv key in slot 0x5
28,611,409 UART: [art] Derive Key Pair - Done
28,624,244 UART: [art] Signing Cert with AUTHO
28,625,549 UART: RITY.KEYID = 7
30,904,634 UART: [art] Erasing AUTHORITY.KEYID = 7
30,906,143 UART: [art] PUB.X = AA3ABD19058B4354ABE8D6D40AA15E66B4F0CB6AF695BCBCED659691B533728B0B7B86C5C452F6560035A86573B6AA48
30,913,396 UART: [art] PUB.Y = 403ECCFB56DD19444AEE42756CA48922AFBDD4185D0D75A6708B4E31D22F36B6472369503EE057C928505A20CF8FAC10
30,920,654 UART: [art] SIG.R = F5B4662BC6BF552DA094207407E1A709C02D7F28F857A1B727300B4DEDDB90B89D6239FFA53E40AFA2CC7096AA509004
30,928,052 UART: [art] SIG.S = E3574D0D81C2132F4D71E693424968F2A40D7D94695F6DF4504AB288636D992D790FC7FE0B8F75C6407031AD6F9AD55B
32,232,746 UART: mbox::rt_entry...
32,233,691 UART: ____ _ _ _ ____ _____
32,235,689 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,237,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,239,626 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,241,554 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,243,483 UART: |_|
32,244,319 UART:
32,357,681 UART: [rt] Runtime listening for mailbox commands...
32,359,709 >>> mbox cmd response data (0 bytes)
34,489,887 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,633,820 UART:
34,634,215 UART: Running Caliptra ROM ...
34,635,355 UART:
34,635,541 UART: [state] CFI Enabled
34,647,757 UART: [state] LifecycleState = Unprovisioned
34,649,649 UART: [state] DebugLocked = No
34,652,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,656,624 UART: [kat] SHA2-256
34,826,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,836,883 UART: [kat] ++
34,837,371 UART: [kat] sha1
34,848,803 UART: [kat] SHA2-256
34,851,501 UART: [kat] SHA2-384
34,856,624 UART: [kat] SHA2-512-ACC
34,858,971 UART: [kat] ECC-384
37,142,312 UART: [kat] HMAC-384Kdf
37,153,414 UART: [kat] LMS
38,343,461 UART: [kat] --
38,348,382 UART: [update-reset] ++
42,485,134 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,488,047 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,869,332 >>> mbox cmd response: success
42,873,934 UART: [update-reset] Copying MAN_2 To MAN_1
42,893,260 UART: [update-reset Success] --
42,897,962 UART: [state] Locking Datavault
42,900,879 UART: [state] Locking PCR0, PCR1 and PCR31
42,902,643 UART: [state] Locking ICCM
42,905,285 UART: [exit] Launching FMC @ 0x40000130
42,913,682 UART:
42,913,938 UART: Running Caliptra FMC ...
42,915,043 UART:
42,915,209 UART: [state] CFI Enabled
42,959,384 UART: [art] Extend RT PCRs Done
42,960,531 UART: [art] Lock RT PCRs Done
42,962,085 UART: [art] Populate DV Done
42,967,709 UART: [fht] FMC Alias Private Key: 7
42,969,305 UART: [art] Derive CDI
42,970,121 UART: [art] Store in in slot 0x4
43,012,602 UART: [art] Derive Key Pair
43,013,657 UART: [art] Store priv key in slot 0x5
46,255,175 UART: [art] Derive Key Pair - Done
46,267,846 UART: [art] Signing Cert with AUTHO
46,269,189 UART: RITY.KEYID = 7
48,548,800 UART: [art] Erasing AUTHORITY.KEYID = 7
48,550,315 UART: [art] PUB.X = F0D291FE30F9152E50BED81641FB039B0DBCCC6EB6B5E96010D2F4391491120D5B90D944634621A8009FE13FAE0346FC
48,557,596 UART: [art] PUB.Y = 3727D1473E41AA24F3A5316B1967AE18D8233982FBEB082683C13615D776B99BA3DA64B320164F47EF9E6BFC267A424A
48,564,838 UART: [art] SIG.R = 07912F0568FB3EFE5117B94CA0C84C84130010D6C8B0DFA333AABEBB68ECFD7B24A4C955C75654203870221C56EC2E7B
48,572,173 UART: [art] SIG.S = 78EA7AA86C682D950C09993792C224EF816BE5CF4302F88C6D3BA710C5C68B606725C5B8438AF72734E8E0D180D59F9A
49,877,123 UART: Caliptra RT
49,877,832 UART: [state] CFI Enabled
50,165,293 UART: [rt] RT failed reset flow
50,166,489 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
4,130,566 ready_for_fw is high
4,131,090 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,349,200 >>> mbox cmd response: success
17,349,873 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
22,985,715 UART:
22,986,112 UART: Running Caliptra FMC ...
22,987,248 UART:
22,987,414 UART: [state] CFI Enabled
22,995,081 UART: [fht] FMC Alias Private Key: 7
25,325,313 UART: [art] Extend RT PCRs Done
25,326,538 UART: [art] Lock RT PCRs Done
25,328,194 UART: [art] Populate DV Done
25,333,609 UART: [fht] FMC Alias Private Key: 7
25,335,148 UART: [art] Derive CDI
25,335,882 UART: [art] Store in in slot 0x4
25,378,442 UART: [art] Derive Key Pair
25,379,481 UART: [art] Store priv key in slot 0x5
28,621,697 UART: [art] Derive Key Pair - Done
28,634,688 UART: [art] Signing Cert with AUTHO
28,636,024 UART: RITY.KEYID = 7
30,915,726 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,225 UART: [art] PUB.X = AF63C69B1BF266CF8900548ABFC3F720CD9A08C31D0D50BD1EB427B44AE5BB204230A71D649E164A125B8AB6AF4EF34A
30,924,480 UART: [art] PUB.Y = 0912C6C08A7CC32651B2CED1062AC06E684EAC70FC443DB4AFE58C849BB98F2CED005DCC4D0086BE30BC721A33FBADA6
30,931,717 UART: [art] SIG.R = C5EF1DE2C832FDFC6E131860A168929F05B31FF174CB79D47D1E42F62FBDDF76DD9454555FF2B6DE308C1F5855437933
30,939,120 UART: [art] SIG.S = 33A8359E19E6F1D4B0FCF7729D3E115C28D6B49F8C3D33B2A0C2448F5F419DD887821143106331FD013F707C2AEF278C
32,244,113 UART: mbox::rt_entry...
32,245,080 UART: ____ _ _ _ ____ _____
32,247,010 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,249,028 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,250,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,252,852 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,254,754 UART: |_|
32,255,562 UART:
32,369,616 UART: [rt] Runtime listening for mailbox commands...
32,371,614 >>> mbox cmd response data (0 bytes)
34,500,264 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,147,602 >>> mbox cmd response: success
43,183,475 UART:
43,183,792 UART: Running Caliptra FMC ...
43,184,849 UART:
43,185,003 UART: [state] CFI Enabled
43,229,240 UART: [art] Extend RT PCRs Done
43,230,397 UART: [art] Lock RT PCRs Done
43,232,031 UART: [art] Populate DV Done
43,237,550 UART: [fht] FMC Alias Private Key: 7
43,239,196 UART: [art] Derive CDI
43,240,020 UART: [art] Store in in slot 0x4
43,282,577 UART: [art] Derive Key Pair
43,283,619 UART: [art] Store priv key in slot 0x5
46,525,962 UART: [art] Derive Key Pair - Done
46,538,970 UART: [art] Signing Cert with AUTHO
46,540,269 UART: RITY.KEYID = 7
48,819,948 UART: [art] Erasing AUTHORITY.KEYID = 7
48,821,456 UART: [art] PUB.X = 55AD08386AD7D91E2277F2602972ECF4FDBE6CEE63C9DDAE12F5137A3EA4D14E3882CBF8CD64529BB574A4F4BB3F2038
48,828,720 UART: [art] PUB.Y = E1BB4D4E359FCA9404C319B1FC8CB5BB8233989B3352F86BD5D445EDFB5824E07C50AFEE27F8931CC949A2530B0BD605
48,836,005 UART: [art] SIG.R = 55A68BD33FFA0EBB45B9D47C39B16B39A20E0508C0B62324D843F830525FE475DAF36BE0673DDD274525BABBAC029F68
48,843,343 UART: [art] SIG.S = 44F75666DB0C73F8C47944CA243C80E728289AA7E7CA865CB2F495143087A90D96C701A038B237899D536212C4B5763D
50,148,258 UART: Caliptra RT
50,148,960 UART: [state] CFI Enabled
50,437,293 UART: [rt] RT failed reset flow
50,438,482 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,026 UART:
192,410 UART: Running Caliptra ROM ...
193,554 UART:
193,707 UART: [state] CFI Enabled
266,617 UART: [state] LifecycleState = Unprovisioned
268,483 UART: [state] DebugLocked = No
270,863 UART: [state] WD Timer not started. Device not locked for debugging
273,881 UART: [kat] SHA2-256
452,992 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,592 UART: [kat] ++
465,041 UART: [kat] sha1
475,633 UART: [kat] SHA2-256
478,642 UART: [kat] SHA2-384
483,287 UART: [kat] SHA2-512-ACC
486,293 UART: [kat] ECC-384
2,947,610 UART: [kat] HMAC-384Kdf
2,969,718 UART: [kat] LMS
3,499,186 UART: [kat] --
3,503,463 UART: [cold-reset] ++
3,505,464 UART: [fht] FHT @ 0x50003400
3,515,731 UART: [idev] ++
3,516,291 UART: [idev] CDI.KEYID = 6
3,517,176 UART: [idev] SUBJECT.KEYID = 7
3,518,421 UART: [idev] UDS.KEYID = 0
3,519,463 ready_for_fw is high
3,519,654 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,618,553 UART: [idev] Erasing UDS.KEYID = 0
6,024,201 UART: [idev] Sha1 KeyId Algorithm
6,047,366 UART: [idev] --
6,049,985 UART: [ldev] ++
6,050,570 UART: [ldev] CDI.KEYID = 6
6,051,475 UART: [ldev] SUBJECT.KEYID = 5
6,052,613 UART: [ldev] AUTHORITY.KEYID = 7
6,053,905 UART: [ldev] FE.KEYID = 1
6,088,995 UART: [ldev] Erasing FE.KEYID = 1
8,594,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,953 UART: [ldev] --
10,403,242 UART: [fwproc] Wait for Commands...
10,405,066 UART: [fwproc] Recv command 0x46574c44
10,407,108 UART: [fwproc] Recv'd Img size: 78532 bytes
13,370,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,443,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,512,604 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,705,046 >>> mbox cmd response: success
13,705,549 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,709,827 UART: [afmc] ++
13,710,408 UART: [afmc] CDI.KEYID = 6
13,711,481 UART: [afmc] SUBJECT.KEYID = 7
13,712,625 UART: [afmc] AUTHORITY.KEYID = 5
16,241,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,966,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,968,656 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,984,456 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,000,454 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,016,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,039,312 UART: [afmc] --
18,043,725 UART: [cold-reset] --
18,045,599 UART: [state] Locking Datavault
18,050,471 UART: [state] Locking PCR0, PCR1 and PCR31
18,052,140 UART: [state] Locking ICCM
18,054,385 UART: [exit] Launching FMC @ 0x40000130
18,062,808 UART:
18,063,050 UART: Running Caliptra FMC ...
18,064,083 UART:
18,064,237 UART: [state] CFI Enabled
18,124,422 UART: [fht] FMC Alias Private Key: 7
19,888,572 UART: [art] Extend RT PCRs Done
19,889,787 UART: [art] Lock RT PCRs Done
19,891,554 UART: [art] Populate DV Done
19,896,908 UART: [fht] FMC Alias Private Key: 7
19,898,662 UART: [art] Derive CDI
19,899,399 UART: [art] Store in in slot 0x4
19,957,519 UART: [art] Derive Key Pair
19,958,561 UART: [art] Store priv key in slot 0x5
22,421,251 UART: [art] Derive Key Pair - Done
22,434,232 UART: [art] Signing Cert with AUTHO
22,435,574 UART: RITY.KEYID = 7
24,147,329 UART: [art] Erasing AUTHORITY.KEYID = 7
24,148,834 UART: [art] PUB.X = 9777324BD0140AF4C72E3D8BF06A74E00D2BEC9592F252820F5408A690144C3F6E67A75A5DD9DC7E14D24EB5EC9C144E
24,156,092 UART: [art] PUB.Y = 719B3EB495DB4AB6D92501CD98183F63E1627D6B305E2252EE272D52E878F1C9C199EBD923BCBF09419180F10B40007B
24,163,346 UART: [art] SIG.R = 0824815CA190F23D4923555E9E1CE000A2F2A31C8D57BF126497DB2F8F4CE23ABF3C18633FD448AEBA10A2FA8CC17C5E
24,170,703 UART: [art] SIG.S = CEC2C5ECADDD7D137FE9880357C3F78D48E511B5AA459D88857AAF09F874BF16F12347BD1DFB11CBB41555D088D48DA2
25,149,300 UART: mbox::rt_entry...
25,150,265 UART: ____ _ _ _ ____ _____
25,152,439 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,154,452 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,156,386 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,158,316 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,160,242 UART: |_|
25,161,078 UART:
25,274,352 UART: [rt] Runtime listening for mailbox commands...
25,276,368 >>> mbox cmd response data (0 bytes)
27,333,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,477,649 UART:
27,478,025 UART: Running Caliptra ROM ...
27,479,163 UART:
27,479,342 UART: [state] CFI Enabled
27,537,219 UART: [state] LifecycleState = Unprovisioned
27,539,058 UART: [state] DebugLocked = No
27,541,581 UART: [state] WD Timer not started. Device not locked for debugging
27,544,524 UART: [kat] SHA2-256
27,723,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,735,246 UART: [kat] ++
27,735,791 UART: [kat] sha1
27,746,038 UART: [kat] SHA2-256
27,749,055 UART: [kat] SHA2-384
27,753,644 UART: [kat] SHA2-512-ACC
27,756,598 UART: [kat] ECC-384
30,218,027 UART: [kat] HMAC-384Kdf
30,242,416 UART: [kat] LMS
30,771,875 UART: [kat] --
30,775,706 UART: [update-reset] ++
34,202,845 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,205,590 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,587,970 >>> mbox cmd response: success
34,592,956 UART: [update-reset] Copying MAN_2 To MAN_1
34,612,179 UART: [update-reset Success] --
34,616,534 UART: [state] Locking Datavault
34,619,037 UART: [state] Locking PCR0, PCR1 and PCR31
34,620,693 UART: [state] Locking ICCM
34,623,302 UART: [exit] Launching FMC @ 0x40000130
34,631,755 UART:
34,631,999 UART: Running Caliptra FMC ...
34,633,351 UART:
34,633,508 UART: [state] CFI Enabled
34,732,841 UART: [art] Extend RT PCRs Done
34,734,044 UART: [art] Lock RT PCRs Done
34,735,354 UART: [art] Populate DV Done
34,741,089 UART: [fht] FMC Alias Private Key: 7
34,742,759 UART: [art] Derive CDI
34,743,573 UART: [art] Store in in slot 0x4
34,801,472 UART: [art] Derive Key Pair
34,802,523 UART: [art] Store priv key in slot 0x5
37,265,190 UART: [art] Derive Key Pair - Done
37,278,029 UART: [art] Signing Cert with AUTHO
37,279,348 UART: RITY.KEYID = 7
38,990,594 UART: [art] Erasing AUTHORITY.KEYID = 7
38,992,241 UART: [art] PUB.X = 860439E4A9685E8422CF6EEAB08B3074CAEC3706AF90A9101524BFF1F959BFF8504255953ECD299A79740259D1486580
38,999,335 UART: [art] PUB.Y = 36A0078BD30E1FC209E5AA6C0628B149285B72A8DAED8E846A5A1D5B94575C63040150C247AB2035DD6A36907BE62290
39,006,571 UART: [art] SIG.R = 27F27D4EAE5749C8C1A75F939DB482E99FEDB65CDA883B6E6BC566E442B67556A3D70EB54856EF9A111D1EA6D0CDF953
39,013,997 UART: [art] SIG.S = 1FE286A2E1CBCACFED336C6EF15D9F1CC4B4F6CB7A6D9273121C1F956513285B83F64CEA27EDD106577667B757DA8EC1
39,993,266 UART: Caliptra RT
39,993,984 UART: [state] CFI Enabled
40,329,649 UART: [rt] RT failed reset flow
40,330,850 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,382,251 ready_for_fw is high
3,382,842 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,506,427 >>> mbox cmd response: success
13,507,065 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,789,225 UART:
17,789,638 UART: Running Caliptra FMC ...
17,790,778 UART:
17,790,959 UART: [state] CFI Enabled
17,858,778 UART: [fht] FMC Alias Private Key: 7
19,623,312 UART: [art] Extend RT PCRs Done
19,624,530 UART: [art] Lock RT PCRs Done
19,626,424 UART: [art] Populate DV Done
19,631,737 UART: [fht] FMC Alias Private Key: 7
19,633,279 UART: [art] Derive CDI
19,634,040 UART: [art] Store in in slot 0x4
19,691,387 UART: [art] Derive Key Pair
19,692,389 UART: [art] Store priv key in slot 0x5
22,155,292 UART: [art] Derive Key Pair - Done
22,168,073 UART: [art] Signing Cert with AUTHO
22,169,382 UART: RITY.KEYID = 7
23,880,505 UART: [art] Erasing AUTHORITY.KEYID = 7
23,882,011 UART: [art] PUB.X = BC5177558EB5A576520D2F5E63E5DAF45D0E05D33ACA43DDFD38CAAFCEB20B46F1080672AC2D0270AFB05F898C4C1E38
23,889,313 UART: [art] PUB.Y = F38CCFFB710EE7654FF29A27737C7CF83E48CCC2CEB9185FECD90BE14AAC067DED6ECB231F3444837C1A9FAAD956992D
23,896,606 UART: [art] SIG.R = 2961A2FBBBF45434D6FE6582D83DC4C9A4A1421BFF046BE0A26E7D996A0737F63C84C3AA75FD6B04E2E7C4CFB0378AC4
23,904,052 UART: [art] SIG.S = 9B95031DE041E5A4C9B22B1883A9F6FE9F9EC84FB654CED7C9DB8A02B537609AD157727B7C241890D497FDD8CF456366
24,882,623 UART: mbox::rt_entry...
24,883,569 UART: ____ _ _ _ ____ _____
24,885,496 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,887,502 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,889,361 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,891,320 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,893,176 UART: |_|
24,894,059 UART:
25,007,260 UART: [rt] Runtime listening for mailbox commands...
25,009,285 >>> mbox cmd response data (0 bytes)
27,069,072 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,170,333 >>> mbox cmd response: success
34,206,157 UART:
34,206,501 UART: Running Caliptra FMC ...
34,207,547 UART:
34,207,700 UART: [state] CFI Enabled
34,296,801 UART: [art] Extend RT PCRs Done
34,297,997 UART: [art] Lock RT PCRs Done
34,299,214 UART: [art] Populate DV Done
34,304,463 UART: [fht] FMC Alias Private Key: 7
34,305,944 UART: [art] Derive CDI
34,306,677 UART: [art] Store in in slot 0x4
34,365,452 UART: [art] Derive Key Pair
34,366,492 UART: [art] Store priv key in slot 0x5
36,829,806 UART: [art] Derive Key Pair - Done
36,842,697 UART: [art] Signing Cert with AUTHO
36,844,016 UART: RITY.KEYID = 7
38,556,726 UART: [art] Erasing AUTHORITY.KEYID = 7
38,558,242 UART: [art] PUB.X = 2B421E11451E8F5E6ECDD677298150F18575CC88E47D3628721280D3826321797FA5517F3ABD4BBD92A18AE06A6BFC55
38,565,489 UART: [art] PUB.Y = 5ADCBC676FBEE57628BBD87F14943E269C7B85ECFFF400380235D9E12DE93CD527CA015EAF719395DFB59ED8140F7170
38,572,762 UART: [art] SIG.R = 483EB534F21AACE5D3C2C24EDB2B79581AD3C4942C7A3510942EA839D118805DC0C905ACD053077FD227B39FA90C889B
38,580,171 UART: [art] SIG.S = 824C8E2A0709DD10A414122D3A397FA18824F6BDE03D4765389ED14DBF0D65FABBB215D39E9F1168010C29D982ED7049
39,559,124 UART: Caliptra RT
39,559,809 UART: [state] CFI Enabled
39,894,035 UART: [rt] RT failed reset flow
39,895,243 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,723 writing to cptra_bootfsm_go
192,993 UART:
193,362 UART: Running Caliptra ROM ...
194,457 UART:
604,013 UART: [state] CFI Enabled
618,870 UART: [state] LifecycleState = Unprovisioned
620,738 UART: [state] DebugLocked = No
622,537 UART: [state] WD Timer not started. Device not locked for debugging
626,157 UART: [kat] SHA2-256
805,334 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,901 UART: [kat] ++
817,351 UART: [kat] sha1
828,576 UART: [kat] SHA2-256
831,658 UART: [kat] SHA2-384
838,993 UART: [kat] SHA2-512-ACC
841,941 UART: [kat] ECC-384
3,284,999 UART: [kat] HMAC-384Kdf
3,297,962 UART: [kat] LMS
3,827,460 UART: [kat] --
3,833,157 UART: [cold-reset] ++
3,835,370 UART: [fht] FHT @ 0x50003400
3,845,281 UART: [idev] ++
3,846,043 UART: [idev] CDI.KEYID = 6
3,846,967 UART: [idev] SUBJECT.KEYID = 7
3,848,095 UART: [idev] UDS.KEYID = 0
3,849,081 ready_for_fw is high
3,849,282 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,947,969 UART: [idev] Erasing UDS.KEYID = 0
6,319,780 UART: [idev] Sha1 KeyId Algorithm
6,342,236 UART: [idev] --
6,346,038 UART: [ldev] ++
6,346,612 UART: [ldev] CDI.KEYID = 6
6,347,521 UART: [ldev] SUBJECT.KEYID = 5
6,348,678 UART: [ldev] AUTHORITY.KEYID = 7
6,349,963 UART: [ldev] FE.KEYID = 1
6,359,258 UART: [ldev] Erasing FE.KEYID = 1
8,834,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,539 UART: [ldev] --
10,624,558 UART: [fwproc] Wait for Commands...
10,627,189 UART: [fwproc] Recv command 0x46574c44
10,629,276 UART: [fwproc] Recv'd Img size: 78532 bytes
13,596,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,670,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,739,441 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,932,026 >>> mbox cmd response: success
13,932,531 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,936,671 UART: [afmc] ++
13,937,267 UART: [afmc] CDI.KEYID = 6
13,938,185 UART: [afmc] SUBJECT.KEYID = 7
13,939,346 UART: [afmc] AUTHORITY.KEYID = 5
16,436,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,157,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,159,368 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,175,133 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,191,138 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,207,024 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,230,543 UART: [afmc] --
18,233,924 UART: [cold-reset] --
18,239,077 UART: [state] Locking Datavault
18,243,082 UART: [state] Locking PCR0, PCR1 and PCR31
18,244,783 UART: [state] Locking ICCM
18,246,457 UART: [exit] Launching FMC @ 0x40000130
18,254,871 UART:
18,255,110 UART: Running Caliptra FMC ...
18,256,213 UART:
18,256,376 UART: [state] CFI Enabled
18,264,534 UART: [fht] FMC Alias Private Key: 7
20,021,497 UART: [art] Extend RT PCRs Done
20,022,743 UART: [art] Lock RT PCRs Done
20,024,215 UART: [art] Populate DV Done
20,029,521 UART: [fht] FMC Alias Private Key: 7
20,031,172 UART: [art] Derive CDI
20,031,989 UART: [art] Store in in slot 0x4
20,074,613 UART: [art] Derive Key Pair
20,075,693 UART: [art] Store priv key in slot 0x5
22,502,855 UART: [art] Derive Key Pair - Done
22,515,959 UART: [art] Signing Cert with AUTHO
22,517,255 UART: RITY.KEYID = 7
24,222,905 UART: [art] Erasing AUTHORITY.KEYID = 7
24,224,406 UART: [art] PUB.X = EAA2A5B173D5A8F442D1737DED664699277B54DC1E99A374E10F81E88702306CDC794F4EA882C8F89E03C7EBF27FC73A
24,231,656 UART: [art] PUB.Y = E2E05DAE5FE221FEA54583343B22EF7FAF591DB0CDD796C77A045B9741F3A4CA2C8A7E6C927B737A67F124D27B7C14BB
24,238,943 UART: [art] SIG.R = C5326F51B68BADB4ECDFF2D969C407333EEC11E0F0844B2AF71F4B41EF86B8F9380448CB78EAFF2689244D3059561973
24,246,386 UART: [art] SIG.S = 7079E3718A4729254298E7D51945938AC1D211A6DF0CC740EED8EB0B03421BDF582B1FDE2F00F27B661CD28D6F8DECF2
25,224,461 UART: mbox::rt_entry...
25,225,439 UART: ____ _ _ _ ____ _____
25,227,370 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,229,388 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,231,323 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,233,253 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,235,177 UART: |_|
25,236,008 UART:
25,349,572 UART: [rt] Runtime listening for mailbox commands...
25,351,570 >>> mbox cmd response data (0 bytes)
27,407,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,551,758 UART:
27,552,144 UART: Running Caliptra ROM ...
27,553,195 UART:
27,553,345 UART: [state] CFI Enabled
27,564,703 UART: [state] LifecycleState = Unprovisioned
27,566,548 UART: [state] DebugLocked = No
27,567,956 UART: [state] WD Timer not started. Device not locked for debugging
27,571,420 UART: [kat] SHA2-256
27,750,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,762,196 UART: [kat] ++
27,762,649 UART: [kat] sha1
27,773,918 UART: [kat] SHA2-256
27,776,975 UART: [kat] SHA2-384
27,781,776 UART: [kat] SHA2-512-ACC
27,784,722 UART: [kat] ECC-384
30,226,513 UART: [kat] HMAC-384Kdf
30,238,979 UART: [kat] LMS
30,768,504 UART: [kat] --
30,773,466 UART: [update-reset] ++
34,197,123 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,199,694 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,581,938 >>> mbox cmd response: success
34,586,429 UART: [update-reset] Copying MAN_2 To MAN_1
34,605,052 UART: [update-reset Success] --
34,608,550 UART: [state] Locking Datavault
34,611,318 UART: [state] Locking PCR0, PCR1 and PCR31
34,612,963 UART: [state] Locking ICCM
34,614,817 UART: [exit] Launching FMC @ 0x40000130
34,623,230 UART:
34,623,470 UART: Running Caliptra FMC ...
34,624,874 UART:
34,625,039 UART: [state] CFI Enabled
34,669,612 UART: [art] Extend RT PCRs Done
34,670,809 UART: [art] Lock RT PCRs Done
34,671,995 UART: [art] Populate DV Done
34,677,354 UART: [fht] FMC Alias Private Key: 7
34,678,888 UART: [art] Derive CDI
34,679,704 UART: [art] Store in in slot 0x4
34,722,405 UART: [art] Derive Key Pair
34,723,407 UART: [art] Store priv key in slot 0x5
37,149,908 UART: [art] Derive Key Pair - Done
37,162,917 UART: [art] Signing Cert with AUTHO
37,164,232 UART: RITY.KEYID = 7
38,869,367 UART: [art] Erasing AUTHORITY.KEYID = 7
38,870,896 UART: [art] PUB.X = C96C9C6C037891CD09FF0578FA337F9990C526483AD112553DEA4A51DB23186CC798C64CCB0BD13D4CB73D24BDB3E3F4
38,878,158 UART: [art] PUB.Y = 666569644DF806515F59545D61CCF8CB60CEEEB2587B510E330FDA4B40023A72312E9D763A43C3EFBFDB62AB1307A132
38,885,413 UART: [art] SIG.R = 67BC13D79AB25323033E01796DCD5AD7CA5B4B45BA6DDF89462353B0AFB927FD4F62CBFA25077719ED60C437A762080A
38,892,809 UART: [art] SIG.S = B978412B12BCBD2AD1D3494AB79EE94FB00E03775B8622D154AA27465E353BF253B0DA7D015B13467B07E80DB6263F03
39,872,547 UART: Caliptra RT
39,873,263 UART: [state] CFI Enabled
40,162,245 UART: [rt] RT failed reset flow
40,163,560 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,810 writing to cptra_bootfsm_go
3,696,028 ready_for_fw is high
3,696,607 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,710,743 >>> mbox cmd response: success
13,711,341 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
17,958,415 UART:
17,958,807 UART: Running Caliptra FMC ...
17,959,943 UART:
17,960,107 UART: [state] CFI Enabled
17,967,861 UART: [fht] FMC Alias Private Key: 7
19,725,212 UART: [art] Extend RT PCRs Done
19,726,426 UART: [art] Lock RT PCRs Done
19,728,271 UART: [art] Populate DV Done
19,733,846 UART: [fht] FMC Alias Private Key: 7
19,735,440 UART: [art] Derive CDI
19,736,258 UART: [art] Store in in slot 0x4
19,778,529 UART: [art] Derive Key Pair
19,779,530 UART: [art] Store priv key in slot 0x5
22,206,564 UART: [art] Derive Key Pair - Done
22,219,776 UART: [art] Signing Cert with AUTHO
22,221,071 UART: RITY.KEYID = 7
23,926,645 UART: [art] Erasing AUTHORITY.KEYID = 7
23,928,146 UART: [art] PUB.X = 642A7FEC3EFBB80C531BF3036F65096784230F3866BB512C5B7655B0FB9CFC6C6EABA2D245A54EB413D0C385C57C901F
23,935,393 UART: [art] PUB.Y = E61154A67E9403C5836C217D76C01151E5BBA8A525082F825430B1F9EE2DC7F7BAEE832A39C267FF54F440C5028E9AA9
23,942,683 UART: [art] SIG.R = F6100E4F7ECAA068F6F9AD83D907EA64EDCB62D6E3CFB335B7A4291817071119672C8A2E4307FEFD39FFF9A7CB40C9D9
23,950,091 UART: [art] SIG.S = DF31F376057CA200A62E5E877518EA858A16FD886D870F39E38463FB28AF4354E2A845206C42370D32F6B9EFFF215B7B
24,928,580 UART: mbox::rt_entry...
24,929,549 UART: ____ _ _ _ ____ _____
24,931,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,933,541 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,935,475 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,937,441 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,939,302 UART: |_|
24,940,106 UART:
25,052,852 UART: [rt] Runtime listening for mailbox commands...
25,054,862 >>> mbox cmd response data (0 bytes)
27,107,683 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,155,373 >>> mbox cmd response: success
34,189,535 UART:
34,189,850 UART: Running Caliptra FMC ...
34,190,978 UART:
34,191,148 UART: [state] CFI Enabled
34,235,398 UART: [art] Extend RT PCRs Done
34,236,584 UART: [art] Lock RT PCRs Done
34,237,825 UART: [art] Populate DV Done
34,243,290 UART: [fht] FMC Alias Private Key: 7
34,244,989 UART: [art] Derive CDI
34,245,807 UART: [art] Store in in slot 0x4
34,288,257 UART: [art] Derive Key Pair
34,289,296 UART: [art] Store priv key in slot 0x5
36,715,542 UART: [art] Derive Key Pair - Done
36,728,613 UART: [art] Signing Cert with AUTHO
36,729,918 UART: RITY.KEYID = 7
38,434,937 UART: [art] Erasing AUTHORITY.KEYID = 7
38,436,448 UART: [art] PUB.X = FBAB140F0CFB4BE7A9D8DDDCBAC7D159F8920BFA9FA0B1513E148EF3B573C536F99DAA171A0D5F8959F821618B1D8314
38,443,758 UART: [art] PUB.Y = 9D798B1165EB74A49BC4227E1C70CF97A50D59D2C3002E5723625CEEE1D64AA2AB9E47099FA4014C759981471FF68D43
38,450,984 UART: [art] SIG.R = 6C5C36BD12C6420851F5634A6DA55DD855E3EB625711009A9659D849F4215F58CC10772C52981B7AACEC0A25C18C1541
38,458,319 UART: [art] SIG.S = 035885A6DE38A428049E7CB02E3B695B705DA1ED84DF85A1DB74D27F5AF713EF272665CD421CC597C5CEFD7C1144DB55
39,437,324 UART: Caliptra RT
39,438,024 UART: [state] CFI Enabled
39,723,046 UART: [rt] RT failed reset flow
39,724,394 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,091 UART:
192,460 UART: Running Caliptra ROM ...
193,560 UART:
193,705 UART: [state] CFI Enabled
259,348 UART: [state] LifecycleState = Unprovisioned
261,779 UART: [state] DebugLocked = No
263,376 UART: [state] WD Timer not started. Device not locked for debugging
267,206 UART: [kat] SHA2-256
457,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,897 UART: [kat] ++
468,346 UART: [kat] sha1
480,562 UART: [kat] SHA2-256
483,570 UART: [kat] SHA2-384
489,771 UART: [kat] SHA2-512-ACC
492,348 UART: [kat] ECC-384
2,949,499 UART: [kat] HMAC-384Kdf
2,971,411 UART: [kat] LMS
3,503,182 UART: [kat] --
3,508,668 UART: [cold-reset] ++
3,511,165 UART: [fht] FHT @ 0x50003400
3,521,997 UART: [idev] ++
3,522,698 UART: [idev] CDI.KEYID = 6
3,523,653 UART: [idev] SUBJECT.KEYID = 7
3,524,822 UART: [idev] UDS.KEYID = 0
3,525,722 ready_for_fw is high
3,525,916 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,624,827 UART: [idev] Erasing UDS.KEYID = 0
6,028,563 UART: [idev] Sha1 KeyId Algorithm
6,050,059 UART: [idev] --
6,055,433 UART: [ldev] ++
6,056,126 UART: [ldev] CDI.KEYID = 6
6,057,019 UART: [ldev] SUBJECT.KEYID = 5
6,058,255 UART: [ldev] AUTHORITY.KEYID = 7
6,059,439 UART: [ldev] FE.KEYID = 1
6,098,660 UART: [ldev] Erasing FE.KEYID = 1
8,605,889 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,536 UART: [ldev] --
10,412,853 UART: [fwproc] Wait for Commands...
10,414,685 UART: [fwproc] Recv command 0x46574c44
10,416,937 UART: [fwproc] Recv'd Img size: 78532 bytes
13,417,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,497,043 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,613,209 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,940,146 >>> mbox cmd response: success
13,940,638 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
13,944,488 UART: [afmc] ++
13,945,193 UART: [afmc] CDI.KEYID = 6
13,946,334 UART: [afmc] SUBJECT.KEYID = 7
13,947,837 UART: [afmc] AUTHORITY.KEYID = 5
16,492,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,234,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,236,568 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,251,769 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,266,904 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,281,968 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,305,578 UART: [afmc] --
18,308,746 UART: [cold-reset] --
18,312,234 UART: [state] Locking Datavault
18,317,275 UART: [state] Locking PCR0, PCR1 and PCR31
18,319,416 UART: [state] Locking ICCM
18,320,867 UART: [exit] Launching FMC @ 0x40000130
18,329,546 UART:
18,329,779 UART: Running Caliptra FMC ...
18,330,805 UART:
18,330,953 UART: [state] CFI Enabled
18,391,612 UART: [fht] FMC Alias Private Key: 7
20,155,387 UART: [art] Extend RT PCRs Done
20,156,613 UART: [art] Lock RT PCRs Done
20,158,649 UART: [art] Populate DV Done
20,164,118 UART: [fht] FMC Alias Private Key: 7
20,165,669 UART: [art] Derive CDI
20,166,434 UART: [art] Store in in slot 0x4
20,224,424 UART: [art] Derive Key Pair
20,225,464 UART: [art] Store priv key in slot 0x5
22,688,255 UART: [art] Derive Key Pair - Done
22,700,983 UART: [art] Signing Cert with AUTHO
22,702,300 UART: RITY.KEYID = 7
24,414,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,666 UART: [art] PUB.X = 943866BC1D255F231D3A86685B40AEE020B46130482030D51BA6F4870445CEC5C4673A026ADF8084B39A60A4AAE16A10
24,422,950 UART: [art] PUB.Y = 542BA9D4A1206E3FB1A2EA4D709CF7BDC69913E52E4EDE6E89AD6BD8BD64E2BE4A107F8A70BE384430B56ED53C101968
24,430,202 UART: [art] SIG.R = 3556C3837D53435B0145FE49661B4223DB579D61F6E07DAB8E64666497DBB6C5AA7A58C31B33386CBE443DC6FC4A3A47
24,437,646 UART: [art] SIG.S = EF188D22870C2F525CA6EF6A8D6298815D9B0A67D42CAC104F1B0A5DE6D0894EDF71A00033CE3FA4E549E5E30459C254
25,416,196 UART: mbox::rt_entry...
25,417,148 UART: ____ _ _ _ ____ _____
25,419,078 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,421,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,423,029 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,424,964 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,426,894 UART: |_|
25,427,731 UART:
25,540,424 UART: [rt] Runtime listening for mailbox commands...
25,542,426 >>> mbox cmd response data (0 bytes)
27,603,948 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,748,357 UART:
27,748,724 UART: Running Caliptra ROM ...
27,749,785 UART:
27,749,940 UART: [state] CFI Enabled
27,824,974 UART: [state] LifecycleState = Unprovisioned
27,827,025 UART: [state] DebugLocked = No
27,829,075 UART: [state] WD Timer not started. Device not locked for debugging
27,832,907 UART: [kat] SHA2-256
28,022,790 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,033,549 UART: [kat] ++
28,034,044 UART: [kat] sha1
28,046,834 UART: [kat] SHA2-256
28,049,853 UART: [kat] SHA2-384
28,055,494 UART: [kat] SHA2-512-ACC
28,058,075 UART: [kat] ECC-384
30,509,515 UART: [kat] HMAC-384Kdf
30,534,483 UART: [kat] LMS
31,066,076 UART: [kat] --
31,069,584 UART: [update-reset] ++
34,525,628 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,528,961 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,135,525 >>> mbox cmd response: success
35,140,185 UART: [update-reset] Copying MAN_2 To MAN_1
35,175,040 UART: [update-reset Success] --
35,179,491 UART: [state] Locking Datavault
35,182,890 UART: [state] Locking PCR0, PCR1 and PCR31
35,185,061 UART: [state] Locking ICCM
35,187,715 UART: [exit] Launching FMC @ 0x40000130
35,196,409 UART:
35,196,645 UART: Running Caliptra FMC ...
35,197,925 UART:
35,198,093 UART: [state] CFI Enabled
35,303,473 UART: [art] Extend RT PCRs Done
35,304,673 UART: [art] Lock RT PCRs Done
35,306,156 UART: [art] Populate DV Done
35,311,619 UART: [fht] FMC Alias Private Key: 7
35,313,266 UART: [art] Derive CDI
35,314,101 UART: [art] Store in in slot 0x4
35,372,419 UART: [art] Derive Key Pair
35,373,460 UART: [art] Store priv key in slot 0x5
37,836,722 UART: [art] Derive Key Pair - Done
37,849,185 UART: [art] Signing Cert with AUTHO
37,850,494 UART: RITY.KEYID = 7
39,562,055 UART: [art] Erasing AUTHORITY.KEYID = 7
39,563,565 UART: [art] PUB.X = 9799B387EDE40946C892755D011EFEA6AEA123994579EEDC19AADAD9A1CBA286E979684101459426FA0CC77F77839E12
39,570,841 UART: [art] PUB.Y = 177D480B6CF6B1888E964867E3191CE30E7C4AB58E24B5FE3B2D1D9F23B69D440DB976DE75532E4C10540BBC632D48C5
39,578,095 UART: [art] SIG.R = 3E87E012E083070EE925589B0B747A37A86D2E55DB03B6B3D8D195137910B8CC9A918C2988F7BF9D4D90777AC9A78026
39,585,468 UART: [art] SIG.S = D4AAAC5C99BF4C738E2094AB215E052EC5E83269803593B954A00D8B34B322F60CF6C7EFC2441EBA626D0D3EAF8B6CC3
40,564,052 UART: Caliptra RT
40,564,772 UART: [state] CFI Enabled
40,903,471 UART: [rt] RT failed reset flow
40,904,666 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,437,968 ready_for_fw is high
3,438,368 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,941,631 >>> mbox cmd response: success
13,942,562 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,221,014 UART:
18,221,431 UART: Running Caliptra FMC ...
18,222,543 UART:
18,222,697 UART: [state] CFI Enabled
18,289,187 UART: [fht] FMC Alias Private Key: 7
20,052,852 UART: [art] Extend RT PCRs Done
20,054,083 UART: [art] Lock RT PCRs Done
20,055,932 UART: [art] Populate DV Done
20,061,141 UART: [fht] FMC Alias Private Key: 7
20,062,738 UART: [art] Derive CDI
20,063,556 UART: [art] Store in in slot 0x4
20,120,902 UART: [art] Derive Key Pair
20,121,938 UART: [art] Store priv key in slot 0x5
22,585,494 UART: [art] Derive Key Pair - Done
22,598,855 UART: [art] Signing Cert with AUTHO
22,600,187 UART: RITY.KEYID = 7
24,310,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,312,314 UART: [art] PUB.X = D43C7A3D18BB1D206D187F5AED900AB9D47751715F729B9DE1F358D6979B3625BD0F5DA0DB5D4AE5B1FE7F6F10CBAB98
24,319,569 UART: [art] PUB.Y = 123D6E55B567CA18ACE26C735CD69A59370775B6CAE9C6FE0BBED75E3CA7F34DB7231ED117CF2D7AFDE7D075FE771306
24,326,864 UART: [art] SIG.R = 1AB0858EADD060620AA3C92D8379A0497B44F9D43120F6C8359B8633DB103527A1CECC7171C8562938085860DF36AD25
24,334,275 UART: [art] SIG.S = 8A354868934691896A09DF7E0072180DEFEF04220445C25759A41A40CE54AB892F89CEDCAFD3E5A5A8A2983DE7A6B474
25,312,472 UART: mbox::rt_entry...
25,313,424 UART: ____ _ _ _ ____ _____
25,315,411 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,317,415 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,319,352 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,321,322 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,323,179 UART: |_|
25,324,003 UART:
25,437,895 UART: [rt] Runtime listening for mailbox commands...
25,439,902 >>> mbox cmd response data (0 bytes)
27,497,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,305,179 >>> mbox cmd response: success
35,340,236 UART:
35,340,582 UART: Running Caliptra FMC ...
35,341,630 UART:
35,341,782 UART: [state] CFI Enabled
35,429,529 UART: [art] Extend RT PCRs Done
35,430,718 UART: [art] Lock RT PCRs Done
35,432,096 UART: [art] Populate DV Done
35,437,460 UART: [fht] FMC Alias Private Key: 7
35,439,162 UART: [art] Derive CDI
35,439,901 UART: [art] Store in in slot 0x4
35,498,450 UART: [art] Derive Key Pair
35,499,491 UART: [art] Store priv key in slot 0x5
37,962,786 UART: [art] Derive Key Pair - Done
37,975,999 UART: [art] Signing Cert with AUTHO
37,977,305 UART: RITY.KEYID = 7
39,688,401 UART: [art] Erasing AUTHORITY.KEYID = 7
39,689,903 UART: [art] PUB.X = E4C5D2951B2EA4BB8CD33CA017A56A045DB064C6EFC110972990656B829666708E3AE3DB89B6D160F7863CE50066772F
39,697,143 UART: [art] PUB.Y = 65C9CAEE9740C9F06D4BE78B0E834004ADA79014B2E1E6CB0DED637FA5D886E44FCBEF4EA25B60B8037FC134326310A3
39,704,419 UART: [art] SIG.R = 749CBEC1D5F5E30D1374911419B2ECACE8547194CC215D38BE6B643306BBF47279303CB73A7E081A95F588EF764680AC
39,711,826 UART: [art] SIG.S = 7B64CB7F93B4A3D5177B482D3FEF74BE5254FB5F6B5C0C3D56916364FA6F758E55AC65129B6B3C48188CE16BA5C5E297
40,691,010 UART: Caliptra RT
40,691,727 UART: [state] CFI Enabled
41,029,453 UART: [rt] RT failed reset flow
41,030,673 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,630 writing to cptra_bootfsm_go
192,767 UART:
193,140 UART: Running Caliptra ROM ...
194,266 UART:
603,953 UART: [state] CFI Enabled
616,427 UART: [state] LifecycleState = Unprovisioned
618,797 UART: [state] DebugLocked = No
620,824 UART: [state] WD Timer not started. Device not locked for debugging
626,222 UART: [kat] SHA2-256
816,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,897 UART: [kat] ++
827,344 UART: [kat] sha1
838,290 UART: [kat] SHA2-256
841,320 UART: [kat] SHA2-384
846,540 UART: [kat] SHA2-512-ACC
849,192 UART: [kat] ECC-384
3,291,369 UART: [kat] HMAC-384Kdf
3,304,307 UART: [kat] LMS
3,836,123 UART: [kat] --
3,839,129 UART: [cold-reset] ++
3,840,564 UART: [fht] FHT @ 0x50003400
3,851,846 UART: [idev] ++
3,852,521 UART: [idev] CDI.KEYID = 6
3,853,558 UART: [idev] SUBJECT.KEYID = 7
3,854,660 UART: [idev] UDS.KEYID = 0
3,855,588 ready_for_fw is high
3,855,789 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,954,482 UART: [idev] Erasing UDS.KEYID = 0
6,334,341 UART: [idev] Sha1 KeyId Algorithm
6,355,586 UART: [idev] --
6,360,386 UART: [ldev] ++
6,361,060 UART: [ldev] CDI.KEYID = 6
6,361,944 UART: [ldev] SUBJECT.KEYID = 5
6,363,154 UART: [ldev] AUTHORITY.KEYID = 7
6,364,392 UART: [ldev] FE.KEYID = 1
6,375,286 UART: [ldev] Erasing FE.KEYID = 1
8,854,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,712 UART: [ldev] --
10,646,025 UART: [fwproc] Wait for Commands...
10,648,290 UART: [fwproc] Recv command 0x46574c44
10,650,603 UART: [fwproc] Recv'd Img size: 78532 bytes
13,651,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,728,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,844,426 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,171,863 >>> mbox cmd response: success
14,172,348 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
14,176,373 UART: [afmc] ++
14,177,079 UART: [afmc] CDI.KEYID = 6
14,178,193 UART: [afmc] SUBJECT.KEYID = 7
14,179,738 UART: [afmc] AUTHORITY.KEYID = 5
16,680,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,404,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,406,473 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,421,676 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,436,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,451,796 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,475,715 UART: [afmc] --
18,480,078 UART: [cold-reset] --
18,483,081 UART: [state] Locking Datavault
18,488,761 UART: [state] Locking PCR0, PCR1 and PCR31
18,491,104 UART: [state] Locking ICCM
18,492,312 UART: [exit] Launching FMC @ 0x40000130
18,500,988 UART:
18,501,223 UART: Running Caliptra FMC ...
18,502,252 UART:
18,502,398 UART: [state] CFI Enabled
18,510,499 UART: [fht] FMC Alias Private Key: 7
20,267,234 UART: [art] Extend RT PCRs Done
20,268,455 UART: [art] Lock RT PCRs Done
20,269,993 UART: [art] Populate DV Done
20,275,510 UART: [fht] FMC Alias Private Key: 7
20,277,209 UART: [art] Derive CDI
20,277,946 UART: [art] Store in in slot 0x4
20,320,341 UART: [art] Derive Key Pair
20,321,344 UART: [art] Store priv key in slot 0x5
22,747,548 UART: [art] Derive Key Pair - Done
22,760,500 UART: [art] Signing Cert with AUTHO
22,761,800 UART: RITY.KEYID = 7
24,467,232 UART: [art] Erasing AUTHORITY.KEYID = 7
24,468,737 UART: [art] PUB.X = 4CE0E0632AB4130DD39BC45C30A5138A94783BB6AE9502E3D8A809B8135C3BF433639A77A8CA4ED42CF741996C4FFDDD
24,475,975 UART: [art] PUB.Y = 489810A1982AB73EF3AE5881528D706D7E327B15709494E39454EFAD47A2B59CE97598F671755419E36A9D611618135E
24,483,202 UART: [art] SIG.R = AABA2040BFEA190648DBB679D845A758CF5731A92EE639EFC8E1C5AEFD806402C4905B3DE2875766E4BE9FCA470035CA
24,490,601 UART: [art] SIG.S = 0A09F72A81AAAE52E52EBD223046293F5170EA91EAAD87A890F76FD92B5552F69FF797B7FF20F356F898B25BB507B8FF
25,469,103 UART: mbox::rt_entry...
25,470,069 UART: ____ _ _ _ ____ _____
25,472,008 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,474,025 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,475,960 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,477,890 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,479,835 UART: |_|
25,480,671 UART:
25,594,933 UART: [rt] Runtime listening for mailbox commands...
25,596,935 >>> mbox cmd response data (0 bytes)
27,657,011 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,801,387 UART:
27,801,752 UART: Running Caliptra ROM ...
27,802,811 UART:
27,803,022 UART: [state] CFI Enabled
27,814,977 UART: [state] LifecycleState = Unprovisioned
27,816,830 UART: [state] DebugLocked = No
27,818,403 UART: [state] WD Timer not started. Device not locked for debugging
27,822,217 UART: [kat] SHA2-256
28,012,102 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,022,854 UART: [kat] ++
28,023,371 UART: [kat] sha1
28,034,969 UART: [kat] SHA2-256
28,038,000 UART: [kat] SHA2-384
28,044,644 UART: [kat] SHA2-512-ACC
28,047,266 UART: [kat] ECC-384
30,489,290 UART: [kat] HMAC-384Kdf
30,502,771 UART: [kat] LMS
31,034,383 UART: [kat] --
31,038,480 UART: [update-reset] ++
34,496,764 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,499,761 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,106,368 >>> mbox cmd response: success
35,111,035 UART: [update-reset] Copying MAN_2 To MAN_1
35,144,979 UART: [update-reset Success] --
35,148,844 UART: [state] Locking Datavault
35,151,591 UART: [state] Locking PCR0, PCR1 and PCR31
35,153,751 UART: [state] Locking ICCM
35,156,718 UART: [exit] Launching FMC @ 0x40000130
35,165,403 UART:
35,165,647 UART: Running Caliptra FMC ...
35,166,910 UART:
35,167,068 UART: [state] CFI Enabled
35,211,190 UART: [art] Extend RT PCRs Done
35,212,405 UART: [art] Lock RT PCRs Done
35,213,545 UART: [art] Populate DV Done
35,219,117 UART: [fht] FMC Alias Private Key: 7
35,220,653 UART: [art] Derive CDI
35,221,470 UART: [art] Store in in slot 0x4
35,263,955 UART: [art] Derive Key Pair
35,264,956 UART: [art] Store priv key in slot 0x5
37,691,360 UART: [art] Derive Key Pair - Done
37,704,417 UART: [art] Signing Cert with AUTHO
37,705,731 UART: RITY.KEYID = 7
39,411,103 UART: [art] Erasing AUTHORITY.KEYID = 7
39,412,608 UART: [art] PUB.X = 0B9D7BE6270BC6C9DA6E43F627E71D371BDE83E730E058BBAA729CDB0544AEBB8078A62E69FCD519A5FE50A17650E142
39,419,848 UART: [art] PUB.Y = F5B88F4A2DCB6E22FC169854E02E00BCC47E492C51825988E115EC8EBD9457A10DD9E82BE7E67E6BDE729E2323761756
39,427,123 UART: [art] SIG.R = 3C4AD4B520797427E9747D9CFA44BADCCD182F9307C2DE81CE83D1EBA5356072782E08015946854B67FE9948C4640042
39,434,428 UART: [art] SIG.S = 81E18BED1384227911F0A42988C4F00586506ACA897D1C20E9B8872611765222A5E64B65CCD1A27EAAA840F15C0B5885
40,413,242 UART: Caliptra RT
40,413,977 UART: [state] CFI Enabled
40,705,644 UART: [rt] RT failed reset flow
40,706,839 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,562 writing to cptra_bootfsm_go
3,758,653 ready_for_fw is high
3,759,058 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,197,471 >>> mbox cmd response: success
14,198,030 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
18,454,714 UART:
18,455,104 UART: Running Caliptra FMC ...
18,456,243 UART:
18,456,402 UART: [state] CFI Enabled
18,464,246 UART: [fht] FMC Alias Private Key: 7
20,222,115 UART: [art] Extend RT PCRs Done
20,223,337 UART: [art] Lock RT PCRs Done
20,225,123 UART: [art] Populate DV Done
20,230,431 UART: [fht] FMC Alias Private Key: 7
20,232,078 UART: [art] Derive CDI
20,232,900 UART: [art] Store in in slot 0x4
20,275,399 UART: [art] Derive Key Pair
20,276,444 UART: [art] Store priv key in slot 0x5
22,702,316 UART: [art] Derive Key Pair - Done
22,715,438 UART: [art] Signing Cert with AUTHO
22,716,738 UART: RITY.KEYID = 7
24,421,741 UART: [art] Erasing AUTHORITY.KEYID = 7
24,423,228 UART: [art] PUB.X = A00E272C013DD3A8642D79A19D8FE83B5E2B3E32ACEA0FF7A56404545DDCD1B9F3E221132A9226CB5AC1E6955025834F
24,430,541 UART: [art] PUB.Y = 937882DE508C5F49CC56021EF987492D73FA893656631B0ED2701EE25133856AFADEE8C46245F0336D429B7F6ACF788C
24,437,775 UART: [art] SIG.R = B30DD7268D6C0F61A856D5308763D891A306EAD6F01CC83776A6E212F82C6FF2D86C15B91A705E42C5D57D65C986FE75
24,445,171 UART: [art] SIG.S = CD00D2FE7C82CD70529CD23C398E2C6F73C4F8C00DE6718718043273FFDE91C4A5212D36610FC703D675C55C38BABF72
25,423,356 UART: mbox::rt_entry...
25,424,332 UART: ____ _ _ _ ____ _____
25,426,323 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,428,333 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,430,262 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,432,232 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,434,166 UART: |_|
25,435,152 UART:
25,548,162 UART: [rt] Runtime listening for mailbox commands...
25,550,176 >>> mbox cmd response data (0 bytes)
27,607,620 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,327,614 >>> mbox cmd response: success
35,363,558 UART:
35,363,908 UART: Running Caliptra FMC ...
35,364,950 UART:
35,365,104 UART: [state] CFI Enabled
35,408,753 UART: [art] Extend RT PCRs Done
35,409,904 UART: [art] Lock RT PCRs Done
35,411,409 UART: [art] Populate DV Done
35,417,035 UART: [fht] FMC Alias Private Key: 7
35,418,737 UART: [art] Derive CDI
35,419,547 UART: [art] Store in in slot 0x4
35,462,258 UART: [art] Derive Key Pair
35,463,302 UART: [art] Store priv key in slot 0x5
37,890,234 UART: [art] Derive Key Pair - Done
37,903,307 UART: [art] Signing Cert with AUTHO
37,904,609 UART: RITY.KEYID = 7
39,609,799 UART: [art] Erasing AUTHORITY.KEYID = 7
39,611,307 UART: [art] PUB.X = B3CCBDDF90B9DE9C12AAF9949DA375AB6229A8D7A621E045C9F29D618ABC15EF6825DBAC5F95905C8F5C728DB9268F7C
39,618,592 UART: [art] PUB.Y = CDD8625CA46FA566417C6E77ACF023099734F245BBE3080A3D23D06FEE37013F33475B495298CA63932472C8746C55EE
39,625,853 UART: [art] SIG.R = 8E9AA98C47527C957A873ACFEBAA62F387EA4F42454C7F18C0BC02D2271C5B5047D53E365510F3C47F992855905E958D
39,633,229 UART: [art] SIG.S = F74C96076B0162E0DB0EDB09EB7CCD6692439C56B268523172C70877E86AE8FC2E610368F2AC5EEA3BC365C7CF079585
40,612,206 UART: Caliptra RT
40,612,913 UART: [state] CFI Enabled
40,897,069 UART: [rt] RT failed reset flow
40,898,297 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,291 UART: [kat] SHA2-256
892,229 UART: [kat] SHA2-384
895,090 UART: [kat] SHA2-512-ACC
896,991 UART: [kat] ECC-384
902,590 UART: [kat] HMAC-384Kdf
907,194 UART: [kat] LMS
1,475,390 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,887 UART: [fht] Storing FHT @ 0x50003400
1,479,656 UART: [idev] ++
1,479,824 UART: [idev] CDI.KEYID = 6
1,480,184 UART: [idev] SUBJECT.KEYID = 7
1,480,608 UART: [idev] UDS.KEYID = 0
1,480,953 ready_for_fw is high
1,480,953 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,488,570 UART: [idev] Erasing UDS.KEYID = 0
1,505,292 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,142 UART: [idev] --
1,515,143 UART: [ldev] ++
1,515,311 UART: [ldev] CDI.KEYID = 6
1,515,674 UART: [ldev] SUBJECT.KEYID = 5
1,516,100 UART: [ldev] AUTHORITY.KEYID = 7
1,516,563 UART: [ldev] FE.KEYID = 1
1,521,813 UART: [ldev] Erasing FE.KEYID = 1
1,547,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,738 UART: [ldev] --
1,586,239 UART: [fwproc] Waiting for Commands...
1,586,974 UART: [fwproc] Received command 0x46574c44
1,587,765 UART: [fwproc] Received Image of size 78532 bytes
2,474,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,501,779 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,613,184 >>> mbox cmd response: success
2,613,184 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,614,244 UART: [afmc] ++
2,614,412 UART: [afmc] CDI.KEYID = 6
2,614,774 UART: [afmc] SUBJECT.KEYID = 7
2,615,199 UART: [afmc] AUTHORITY.KEYID = 5
2,650,166 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,252 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,667,032 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,672,760 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,678,645 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,335 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,376 UART: [afmc] --
2,693,310 UART: [cold-reset] --
2,694,158 UART: [state] Locking Datavault
2,695,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,695,917 UART: [state] Locking ICCM
2,696,575 UART: [exit] Launching FMC @ 0x40000130
2,701,904 UART:
2,701,920 UART: Running Caliptra FMC ...
2,702,328 UART:
2,702,382 UART: [state] CFI Enabled
2,713,261 UART: [fht] FMC Alias Private Key: 7
2,821,454 UART: [art] Extend RT PCRs Done
2,821,882 UART: [art] Lock RT PCRs Done
2,823,468 UART: [art] Populate DV Done
2,831,781 UART: [fht] FMC Alias Private Key: 7
2,832,877 UART: [art] Derive CDI
2,833,157 UART: [art] Store in in slot 0x4
2,918,636 UART: [art] Derive Key Pair
2,918,996 UART: [art] Store priv key in slot 0x5
2,932,460 UART: [art] Derive Key Pair - Done
2,946,991 UART: [art] Signing Cert with AUTHO
2,947,471 UART: RITY.KEYID = 7
2,962,723 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,488 UART: [art] PUB.X = 754512B1F0D9C4B4D2752346B935C117A72DFAFEF398586F551F0AEFED8717A0602E652A42E087EE73DFB8B0B51E4E2B
2,970,265 UART: [art] PUB.Y = FDB2DE9A16C1C26568685AE507DCE997F4E5545405258E748C22BF66615368A83B6C4384FB679EB4A44A61B721865406
2,977,202 UART: [art] SIG.R = 244D2F4B860A270B191C60CF136B4FC4ADADE23D0D876F64181594143449F8276613C59ABB2CD685E18CEF4B1E71A802
2,983,964 UART: [art] SIG.S = A4458A0C96C2ADE3D8DC31D81EFB379473D3C568BFAE5C02BA418BEC0AA41376B37412A2DCEF61F5DFFD0BB3B5587405
3,007,524 UART: mbox::rt_entry...
3,007,896 UART: ____ _ _ _ ____ _____
3,008,680 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,480 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,248 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,016 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,784 UART: |_|
3,012,096 UART:
3,119,732 UART: [rt] Runtime listening for mailbox commands...
3,120,666 >>> mbox cmd response data (0 bytes)
3,120,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,120,781 UART:
3,120,797 UART: Running Caliptra ROM ...
3,121,205 UART:
3,121,259 UART: [state] CFI Enabled
3,123,871 UART: [state] LifecycleState = Unprovisioned
3,124,526 UART: [state] DebugLocked = No
3,125,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,126,811 UART: [kat] SHA2-256
3,920,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,924,857 UART: [kat] ++
3,925,009 UART: [kat] sha1
3,929,315 UART: [kat] SHA2-256
3,931,253 UART: [kat] SHA2-384
3,933,918 UART: [kat] SHA2-512-ACC
3,935,818 UART: [kat] ECC-384
3,941,445 UART: [kat] HMAC-384Kdf
3,945,997 UART: [kat] LMS
4,514,193 UART: [kat] --
4,514,844 UART: [update-reset] ++
5,847,694 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,848,848 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
5,998,478 >>> mbox cmd response: success
5,998,763 UART: [update-reset] Copying MAN_2 To MAN_1
6,006,777 UART: [update-reset Success] --
6,007,762 UART: [state] Locking Datavault
6,008,672 UART: [state] Locking PCR0, PCR1 and PCR31
6,009,276 UART: [state] Locking ICCM
6,009,750 UART: [exit] Launching FMC @ 0x40000130
6,015,079 UART:
6,015,095 UART: Running Caliptra FMC ...
6,015,503 UART:
6,015,557 UART: [state] CFI Enabled
6,105,454 UART: [art] Extend RT PCRs Done
6,105,882 UART: [art] Lock RT PCRs Done
6,107,335 UART: [art] Populate DV Done
6,115,424 UART: [fht] FMC Alias Private Key: 7
6,116,502 UART: [art] Derive CDI
6,116,782 UART: [art] Store in in slot 0x4
6,202,961 UART: [art] Derive Key Pair
6,203,321 UART: [art] Store priv key in slot 0x5
6,216,289 UART: [art] Derive Key Pair - Done
6,231,128 UART: [art] Signing Cert with AUTHO
6,231,608 UART: RITY.KEYID = 7
6,246,782 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,547 UART: [art] PUB.X = 8891045381CCDFACB1682D0E1AF999E0979DB4489D7F531A75A4D9A231D4D3F2536A35C134C42FF78BDF2A1442AD72CF
6,254,321 UART: [art] PUB.Y = 4DFCFF0EAD4719D8A506D99A44C32C9BF195F23C805C9CF3B76F23250265DF76B47D93C1253067D12D0CF61C955D1076
6,261,265 UART: [art] SIG.R = C8A8EEEFF9E2B92B184B11BE2E9F70689C0CFAA8E38AB13AC9BA724BFBD224F8B75C1EF51099BD2AB72CE5286816230F
6,268,053 UART: [art] SIG.S = 918AE624FC207B9B82F862CF7BADC72D8E4C8C7826E14FB643F18D7B412F2E1F96277F74B90175435D4DA8775AF7ECF9
6,291,967 UART: Caliptra RT
6,292,220 UART: [state] CFI Enabled
6,575,387 UART: [rt] RT failed reset flow
6,575,818 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,039 ready_for_fw is high
1,363,039 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,462,592 >>> mbox cmd response: success
2,462,592 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,523,270 UART:
2,523,286 UART: Running Caliptra FMC ...
2,523,694 UART:
2,523,748 UART: [state] CFI Enabled
2,533,947 UART: [fht] FMC Alias Private Key: 7
2,641,972 UART: [art] Extend RT PCRs Done
2,642,400 UART: [art] Lock RT PCRs Done
2,644,010 UART: [art] Populate DV Done
2,652,235 UART: [fht] FMC Alias Private Key: 7
2,653,239 UART: [art] Derive CDI
2,653,519 UART: [art] Store in in slot 0x4
2,738,888 UART: [art] Derive Key Pair
2,739,248 UART: [art] Store priv key in slot 0x5
2,752,538 UART: [art] Derive Key Pair - Done
2,767,591 UART: [art] Signing Cert with AUTHO
2,768,071 UART: RITY.KEYID = 7
2,783,433 UART: [art] Erasing AUTHORITY.KEYID = 7
2,784,198 UART: [art] PUB.X = 1AD3BE74AF41DC0833962A25667C140EE8492D6E268E00E5B65400E9E2EB1444F8EAA406764ECD1AF36D55293C7B5382
2,790,919 UART: [art] PUB.Y = F7FB11A656B32D1E1A17DC00532BA2F093316BF1E9376CCA6D379EB6F9BDD2741146C5F07E1A349EBFC8729D810CF3BC
2,797,860 UART: [art] SIG.R = 692B5F8A9927B1A9185348E02DBDC1313C41A23E334158078EFE2412F6C60293E1354A5106D014BE34A1FB8B961B06F7
2,804,614 UART: [art] SIG.S = EC5274031F6EE7F19FA8F1D10404D104C4E81BABD4654ABD6130FB22231F16E659BD4191CE3B79F1698F581B3D5083D1
2,827,807 UART: mbox::rt_entry...
2,828,179 UART: ____ _ _ _ ____ _____
2,828,963 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,829,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,830,531 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,831,299 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,832,067 UART: |_|
2,832,379 UART:
2,939,033 UART: [rt] Runtime listening for mailbox commands...
2,939,967 >>> mbox cmd response data (0 bytes)
2,939,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,698,663 >>> mbox cmd response: success
5,712,286 UART:
5,712,302 UART: Running Caliptra FMC ...
5,712,710 UART:
5,712,764 UART: [state] CFI Enabled
5,801,723 UART: [art] Extend RT PCRs Done
5,802,151 UART: [art] Lock RT PCRs Done
5,803,366 UART: [art] Populate DV Done
5,811,591 UART: [fht] FMC Alias Private Key: 7
5,812,679 UART: [art] Derive CDI
5,812,959 UART: [art] Store in in slot 0x4
5,898,632 UART: [art] Derive Key Pair
5,898,992 UART: [art] Store priv key in slot 0x5
5,911,958 UART: [art] Derive Key Pair - Done
5,926,783 UART: [art] Signing Cert with AUTHO
5,927,263 UART: RITY.KEYID = 7
5,942,237 UART: [art] Erasing AUTHORITY.KEYID = 7
5,943,002 UART: [art] PUB.X = C1598EFB34B154B928BEADEF94A111E11CE9E1B30DD901501DC71149926F05312B1DB7986A36D2235AAA45E6F7784CF1
5,949,771 UART: [art] PUB.Y = C49D16F6A91D10B84E456A2D2FE829317E884FBA44E5EA756AA7A85338980C84D45C22E7D87992A1409A144D2D5868B5
5,956,718 UART: [art] SIG.R = 0522122315912FE4B5C044150ABC4A10DE703ABB6CE17E2EC61676738CD23618823D0BB8CA089F7827429DE6120B3113
5,963,469 UART: [art] SIG.S = 2F1FFCF52A26093D59DE28AD2EFB3124DC22FBFAAB4D405238A43ADD768ABF210FD6F25064A5D88D3136007A20E210A1
5,987,060 UART: Caliptra RT
5,987,313 UART: [state] CFI Enabled
6,269,684 UART: [rt] RT failed reset flow
6,270,115 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,030 UART: [kat] SHA2-256
881,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,076 UART: [kat] ++
886,228 UART: [kat] sha1
890,322 UART: [kat] SHA2-256
892,260 UART: [kat] SHA2-384
894,803 UART: [kat] SHA2-512-ACC
896,704 UART: [kat] ECC-384
902,383 UART: [kat] HMAC-384Kdf
906,949 UART: [kat] LMS
1,475,145 UART: [kat] --
1,476,224 UART: [cold-reset] ++
1,476,772 UART: [fht] Storing FHT @ 0x50003400
1,479,373 UART: [idev] ++
1,479,541 UART: [idev] CDI.KEYID = 6
1,479,901 UART: [idev] SUBJECT.KEYID = 7
1,480,325 UART: [idev] UDS.KEYID = 0
1,480,670 ready_for_fw is high
1,480,670 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,488,319 UART: [idev] Erasing UDS.KEYID = 0
1,505,347 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,993 UART: [idev] --
1,514,924 UART: [ldev] ++
1,515,092 UART: [ldev] CDI.KEYID = 6
1,515,455 UART: [ldev] SUBJECT.KEYID = 5
1,515,881 UART: [ldev] AUTHORITY.KEYID = 7
1,516,344 UART: [ldev] FE.KEYID = 1
1,522,024 UART: [ldev] Erasing FE.KEYID = 1
1,547,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,339 UART: [ldev] --
1,586,782 UART: [fwproc] Waiting for Commands...
1,587,527 UART: [fwproc] Received command 0x46574c44
1,588,318 UART: [fwproc] Received Image of size 78532 bytes
2,475,426 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,336 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,688 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,613,773 >>> mbox cmd response: success
2,613,773 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,614,837 UART: [afmc] ++
2,615,005 UART: [afmc] CDI.KEYID = 6
2,615,367 UART: [afmc] SUBJECT.KEYID = 7
2,615,792 UART: [afmc] AUTHORITY.KEYID = 5
2,651,379 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,595 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,323 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,208 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,898 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,725 UART: [afmc] --
2,694,631 UART: [cold-reset] --
2,695,415 UART: [state] Locking Datavault
2,696,578 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,182 UART: [state] Locking ICCM
2,697,618 UART: [exit] Launching FMC @ 0x40000130
2,702,947 UART:
2,702,963 UART: Running Caliptra FMC ...
2,703,371 UART:
2,703,514 UART: [state] CFI Enabled
2,714,287 UART: [fht] FMC Alias Private Key: 7
2,822,324 UART: [art] Extend RT PCRs Done
2,822,752 UART: [art] Lock RT PCRs Done
2,824,488 UART: [art] Populate DV Done
2,832,685 UART: [fht] FMC Alias Private Key: 7
2,833,745 UART: [art] Derive CDI
2,834,025 UART: [art] Store in in slot 0x4
2,919,612 UART: [art] Derive Key Pair
2,919,972 UART: [art] Store priv key in slot 0x5
2,932,932 UART: [art] Derive Key Pair - Done
2,947,561 UART: [art] Signing Cert with AUTHO
2,948,041 UART: RITY.KEYID = 7
2,963,189 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,954 UART: [art] PUB.X = 6A37CAB63ED9C58C0B86E5DCD3E09C425129E1876AD085DD04C1DF8F951D4BAEB0D8C117F372A4B571D8BDC91B07E1B4
2,970,735 UART: [art] PUB.Y = 16D7246E4C29BD968731758A3C99DEDC8A3E3E20CB75856D8517B71DEEBAE5AC3158A014A826793C73B2AADF2C3C8474
2,977,695 UART: [art] SIG.R = 2DFE21A290FE51324E691478C1179B405C9FE9222B6FA66BEEC578F8814906BA5C11E3C0D8F24866E14797D53C48F889
2,984,462 UART: [art] SIG.S = 3284F3F658600C938022F2059E76EB76B86071B68DD4631BB7F1280A5F2DE0DDF7E4CBBFF34696A15B0758B8CDBD2E36
3,007,947 UART: mbox::rt_entry...
3,008,319 UART: ____ _ _ _ ____ _____
3,009,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,207 UART: |_|
3,012,519 UART:
3,120,452 UART: [rt] Runtime listening for mailbox commands...
3,121,386 >>> mbox cmd response data (0 bytes)
3,121,387 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,121,501 UART:
3,121,517 UART: Running Caliptra ROM ...
3,121,925 UART:
3,122,066 UART: [state] CFI Enabled
3,125,208 UART: [state] LifecycleState = Unprovisioned
3,125,863 UART: [state] DebugLocked = No
3,126,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,128,198 UART: [kat] SHA2-256
3,922,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,926,244 UART: [kat] ++
3,926,396 UART: [kat] sha1
3,930,458 UART: [kat] SHA2-256
3,932,396 UART: [kat] SHA2-384
3,935,141 UART: [kat] SHA2-512-ACC
3,937,041 UART: [kat] ECC-384
3,942,668 UART: [kat] HMAC-384Kdf
3,947,368 UART: [kat] LMS
4,515,564 UART: [kat] --
4,516,587 UART: [update-reset] ++
5,850,213 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,851,445 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,001,075 >>> mbox cmd response: success
6,001,408 UART: [update-reset] Copying MAN_2 To MAN_1
6,009,422 UART: [update-reset Success] --
6,010,307 UART: [state] Locking Datavault
6,011,265 UART: [state] Locking PCR0, PCR1 and PCR31
6,011,869 UART: [state] Locking ICCM
6,012,349 UART: [exit] Launching FMC @ 0x40000130
6,017,678 UART:
6,017,694 UART: Running Caliptra FMC ...
6,018,102 UART:
6,018,245 UART: [state] CFI Enabled
6,107,456 UART: [art] Extend RT PCRs Done
6,107,884 UART: [art] Lock RT PCRs Done
6,109,261 UART: [art] Populate DV Done
6,117,360 UART: [fht] FMC Alias Private Key: 7
6,118,346 UART: [art] Derive CDI
6,118,626 UART: [art] Store in in slot 0x4
6,204,397 UART: [art] Derive Key Pair
6,204,757 UART: [art] Store priv key in slot 0x5
6,218,219 UART: [art] Derive Key Pair - Done
6,232,714 UART: [art] Signing Cert with AUTHO
6,233,194 UART: RITY.KEYID = 7
6,248,728 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,493 UART: [art] PUB.X = 03C613609B60FAAD2C228ACB28C9FEAC0095F35D39297DC47FD885FEEBA513FB6045ECD2766046E6E0DE09753A38D824
6,256,247 UART: [art] PUB.Y = 52A54ECBCD61DC46929819DAB5E283ADFC9DDF4E19E08F32B03274460EDAA98A89AE277756291E2C86A66D85D3BF7F95
6,263,208 UART: [art] SIG.R = FC90E53A9D20EF00F71A878038AF0E9DCB8FF6C4EFA04049BE6A76484239AB07B7737E370D26E55BAF7E5A5487BFA670
6,269,961 UART: [art] SIG.S = 1FE35BCC988E423A646F630E910EF339F0C09D0F4398B9BD446A6EF0C3943A720E0A79B5878F6D4A8EDE0427559F9959
6,293,730 UART: Caliptra RT
6,294,075 UART: [state] CFI Enabled
6,574,385 UART: [rt] RT failed reset flow
6,574,816 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,366 ready_for_fw is high
1,363,366 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,465,271 >>> mbox cmd response: success
2,465,271 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,526,131 UART:
2,526,147 UART: Running Caliptra FMC ...
2,526,555 UART:
2,526,698 UART: [state] CFI Enabled
2,537,493 UART: [fht] FMC Alias Private Key: 7
2,646,102 UART: [art] Extend RT PCRs Done
2,646,530 UART: [art] Lock RT PCRs Done
2,647,820 UART: [art] Populate DV Done
2,655,999 UART: [fht] FMC Alias Private Key: 7
2,657,139 UART: [art] Derive CDI
2,657,419 UART: [art] Store in in slot 0x4
2,743,052 UART: [art] Derive Key Pair
2,743,412 UART: [art] Store priv key in slot 0x5
2,757,476 UART: [art] Derive Key Pair - Done
2,772,097 UART: [art] Signing Cert with AUTHO
2,772,577 UART: RITY.KEYID = 7
2,787,623 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,388 UART: [art] PUB.X = F0207AB929443F8F6004C6AA154FF2547F6F8AE65CE0381EBDA9ADEE7D63F2E764F60F5681A8F77C8E6CE6ED36081FBA
2,795,167 UART: [art] PUB.Y = 8D40095896137D2CC17E7327091021957571599C429DDC7214B1E36382D15A704BE3FD4DBE7330C34496DAFB517C1946
2,802,101 UART: [art] SIG.R = 99A6F98996E4313EFA3AF8C496896C0CF3835AF3D0C44424A586EA238AC2CEFC58CE89CD6E5D96616CEE536E648FDCE0
2,808,884 UART: [art] SIG.S = D6DAC282DD84F6623D8FEDC05B1EE05940127A45958014462299FBD834C1D3625261FF506B8E6BAE0E30153EAC510203
2,832,978 UART: mbox::rt_entry...
2,833,350 UART: ____ _ _ _ ____ _____
2,834,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,934 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,702 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,470 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,238 UART: |_|
2,837,550 UART:
2,944,919 UART: [rt] Runtime listening for mailbox commands...
2,945,853 >>> mbox cmd response data (0 bytes)
2,945,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,706,422 >>> mbox cmd response: success
5,720,039 UART:
5,720,055 UART: Running Caliptra FMC ...
5,720,463 UART:
5,720,606 UART: [state] CFI Enabled
5,809,171 UART: [art] Extend RT PCRs Done
5,809,599 UART: [art] Lock RT PCRs Done
5,810,840 UART: [art] Populate DV Done
5,819,257 UART: [fht] FMC Alias Private Key: 7
5,820,239 UART: [art] Derive CDI
5,820,519 UART: [art] Store in in slot 0x4
5,905,852 UART: [art] Derive Key Pair
5,906,212 UART: [art] Store priv key in slot 0x5
5,919,396 UART: [art] Derive Key Pair - Done
5,934,104 UART: [art] Signing Cert with AUTHO
5,934,584 UART: RITY.KEYID = 7
5,949,486 UART: [art] Erasing AUTHORITY.KEYID = 7
5,950,251 UART: [art] PUB.X = 9F593B1B6BF276E722375D1D0DF159E60342F2A77D7C8D3381739B9A7D8B01C46EDFFDB9689B5A59F7EC2CF9ECD2CC11
5,957,028 UART: [art] PUB.Y = 936561BE99E7682EEA46640E2AD2198FE4B6B1280A890F1F49593A579D9B0C15B18BFAD7AF8ACC79194B1EB86EAB6F56
5,963,978 UART: [art] SIG.R = CF8EDCF0795001F148C36B84B1D0CD00589A48CDE21797C69DF1EE0DCC2A467E7A01BA9A17029FC4E39D652581E92225
5,970,724 UART: [art] SIG.S = BAF8575E7A84CE730652E9C8338895C84BFC01257A21020788D619F2851540D97ABBD6DE811620BAF7473B2BD78F4B41
5,994,475 UART: Caliptra RT
5,994,820 UART: [state] CFI Enabled
6,273,883 UART: [rt] RT failed reset flow
6,274,314 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,781 UART: [kat] SHA2-256
903,721 UART: [kat] SHA2-384
906,360 UART: [kat] SHA2-512-ACC
908,261 UART: [kat] ECC-384
917,922 UART: [kat] HMAC-384Kdf
922,718 UART: [kat] LMS
1,171,046 UART: [kat] --
1,172,023 UART: [cold-reset] ++
1,172,587 UART: [fht] FHT @ 0x50003400
1,175,304 UART: [idev] ++
1,175,472 UART: [idev] CDI.KEYID = 6
1,175,832 UART: [idev] SUBJECT.KEYID = 7
1,176,256 UART: [idev] UDS.KEYID = 0
1,176,601 ready_for_fw is high
1,176,601 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,201,105 UART: [idev] Sha1 KeyId Algorithm
1,209,733 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,374 UART: [ldev] SUBJECT.KEYID = 5
1,211,800 UART: [ldev] AUTHORITY.KEYID = 7
1,212,263 UART: [ldev] FE.KEYID = 1
1,217,357 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,347 UART: [ldev] --
1,282,670 UART: [fwproc] Wait for Commands...
1,283,490 UART: [fwproc] Recv command 0x46574c44
1,284,218 UART: [fwproc] Recv'd Img size: 78532 bytes
2,171,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,774 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,310,903 >>> mbox cmd response: success
2,310,903 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,312,123 UART: [afmc] ++
2,312,291 UART: [afmc] CDI.KEYID = 6
2,312,653 UART: [afmc] SUBJECT.KEYID = 7
2,313,078 UART: [afmc] AUTHORITY.KEYID = 5
2,348,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,444 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,172 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,057 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,776 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,638 UART: [afmc] --
2,391,604 UART: [cold-reset] --
2,392,392 UART: [state] Locking Datavault
2,393,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,249 UART: [state] Locking ICCM
2,394,849 UART: [exit] Launching FMC @ 0x40000130
2,400,178 UART:
2,400,194 UART: Running Caliptra FMC ...
2,400,602 UART:
2,400,656 UART: [state] CFI Enabled
2,411,049 UART: [fht] FMC Alias Private Key: 7
2,518,918 UART: [art] Extend RT PCRs Done
2,519,346 UART: [art] Lock RT PCRs Done
2,520,832 UART: [art] Populate DV Done
2,528,973 UART: [fht] FMC Alias Private Key: 7
2,530,113 UART: [art] Derive CDI
2,530,393 UART: [art] Store in in slot 0x4
2,616,260 UART: [art] Derive Key Pair
2,616,620 UART: [art] Store priv key in slot 0x5
2,629,984 UART: [art] Derive Key Pair - Done
2,644,725 UART: [art] Signing Cert with AUTHO
2,645,205 UART: RITY.KEYID = 7
2,660,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,914 UART: [art] PUB.X = FF92DA5D55CF6888A4AFA690E63FD3429368EDCC6CD54B5DDD78ED40B31EC7411D47E6283FBCD9852155FD00483CFB38
2,667,680 UART: [art] PUB.Y = 3981C8A96B411BBB15F365CF2E466CA4E6D604ABD0D2ACA23DA4B3A1EC63158B57C441FC103EDB3587831B0366D8C475
2,674,636 UART: [art] SIG.R = 70D7E8E17564BD9241B2244890A2DD2BA324EF875BC3A403E1DD2CC11FD0BACE25C1C00458343D3D591C1B97562E4E64
2,681,408 UART: [art] SIG.S = 22DE275D95DA792CFAA4E55ADAC45C521316B2D0EBB65D2FA68C6029983594C03CBCED562A736432104BA7FD0FF257EE
2,705,740 UART: mbox::rt_entry...
2,706,112 UART: ____ _ _ _ ____ _____
2,706,896 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,696 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,464 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,232 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,000 UART: |_|
2,710,312 UART:
2,815,944 UART: [rt] Runtime listening for mailbox commands...
2,816,878 >>> mbox cmd response data (0 bytes)
2,816,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,816,990 UART:
2,817,006 UART: Running Caliptra ROM ...
2,817,414 UART:
2,817,469 UART: [state] CFI Enabled
2,820,339 UART: [state] LifecycleState = Unprovisioned
2,820,994 UART: [state] DebugLocked = No
2,821,540 UART: [state] WD Timer not started. Device not locked for debugging
2,822,832 UART: [kat] SHA2-256
3,628,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,632,607 UART: [kat] ++
3,632,759 UART: [kat] sha1
3,637,189 UART: [kat] SHA2-256
3,639,129 UART: [kat] SHA2-384
3,641,756 UART: [kat] SHA2-512-ACC
3,643,656 UART: [kat] ECC-384
3,653,459 UART: [kat] HMAC-384Kdf
3,658,041 UART: [kat] LMS
3,906,369 UART: [kat] --
3,907,037 UART: [update-reset] ++
5,218,441 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,588 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,369,166 >>> mbox cmd response: success
5,369,309 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,323 UART: [update-reset Success] --
5,378,354 UART: [state] Locking Datavault
5,379,136 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,740 UART: [state] Locking ICCM
5,380,192 UART: [exit] Launching FMC @ 0x40000130
5,385,521 UART:
5,385,537 UART: Running Caliptra FMC ...
5,385,945 UART:
5,385,999 UART: [state] CFI Enabled
5,474,878 UART: [art] Extend RT PCRs Done
5,475,306 UART: [art] Lock RT PCRs Done
5,476,665 UART: [art] Populate DV Done
5,484,958 UART: [fht] FMC Alias Private Key: 7
5,486,034 UART: [art] Derive CDI
5,486,314 UART: [art] Store in in slot 0x4
5,571,833 UART: [art] Derive Key Pair
5,572,193 UART: [art] Store priv key in slot 0x5
5,585,251 UART: [art] Derive Key Pair - Done
5,600,009 UART: [art] Signing Cert with AUTHO
5,600,489 UART: RITY.KEYID = 7
5,615,333 UART: [art] Erasing AUTHORITY.KEYID = 7
5,616,098 UART: [art] PUB.X = 523E8BA684A10E2FB6E68770AB10A831B5658A2B11B107D0573E3949242873611A373E01030376AEC858B86CFE1F0791
5,622,842 UART: [art] PUB.Y = 8E71004DD4F7B23994573AAAF25029538C3459FC7BE9D02AF76CA9124B90D6FD5A18AC23990223FD17C3A42EE2D6DEC4
5,629,777 UART: [art] SIG.R = 178A7337E0369DA65A8526BD294EE2D13EB32606802D002DEBA835D92CEF7C2DE882B8F549E855DBF0F51B481E028BC6
5,636,527 UART: [art] SIG.S = 5449F88064564BA3FD7B255EBBC84937BD42A7800A46BBA154E40DDE9B71D602E69C2882967FF2708DAE4CA0428D0924
5,660,354 UART: Caliptra RT
5,660,607 UART: [state] CFI Enabled
5,939,959 UART: [rt] RT failed reset flow
5,940,390 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,771 ready_for_fw is high
1,059,771 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,161,746 >>> mbox cmd response: success
2,161,746 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,223,676 UART:
2,223,692 UART: Running Caliptra FMC ...
2,224,100 UART:
2,224,154 UART: [state] CFI Enabled
2,234,367 UART: [fht] FMC Alias Private Key: 7
2,342,634 UART: [art] Extend RT PCRs Done
2,343,062 UART: [art] Lock RT PCRs Done
2,344,688 UART: [art] Populate DV Done
2,353,007 UART: [fht] FMC Alias Private Key: 7
2,353,947 UART: [art] Derive CDI
2,354,227 UART: [art] Store in in slot 0x4
2,439,744 UART: [art] Derive Key Pair
2,440,104 UART: [art] Store priv key in slot 0x5
2,453,352 UART: [art] Derive Key Pair - Done
2,468,167 UART: [art] Signing Cert with AUTHO
2,468,647 UART: RITY.KEYID = 7
2,484,079 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,844 UART: [art] PUB.X = 604813EB09A5E7E4865B9DCC79BDFB5B25756D62DD443027FB9F18D1642AC4D671B7C08B22EED282E89D7E6086A32D8A
2,491,621 UART: [art] PUB.Y = 88AFCD44A33BC17B39D0020F9C7ADDB7EBEBB097AE1A9F38E438E29741D13F4E0417CCC9C931F3F47064FB536F48FED6
2,498,582 UART: [art] SIG.R = 33219C3EA2D9B9CA2553456362E6AEA8ABD29819578DD3B27CB12174E4D21F20F954182925020BEF3F7EFF8A90212AEB
2,505,352 UART: [art] SIG.S = DDCE9C2D38DB002ED0F4397B05AD65AF0C826F6C15A28629AA749F88889E3B7953B2264EA42721B0D7306595B5DDA47E
2,529,057 UART: mbox::rt_entry...
2,529,429 UART: ____ _ _ _ ____ _____
2,530,213 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,013 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,781 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,549 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,317 UART: |_|
2,533,629 UART:
2,639,529 UART: [rt] Runtime listening for mailbox commands...
2,640,463 >>> mbox cmd response data (0 bytes)
2,640,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,076,518 >>> mbox cmd response: success
5,089,910 UART:
5,089,926 UART: Running Caliptra FMC ...
5,090,334 UART:
5,090,388 UART: [state] CFI Enabled
5,179,827 UART: [art] Extend RT PCRs Done
5,180,255 UART: [art] Lock RT PCRs Done
5,181,474 UART: [art] Populate DV Done
5,189,825 UART: [fht] FMC Alias Private Key: 7
5,190,899 UART: [art] Derive CDI
5,191,179 UART: [art] Store in in slot 0x4
5,277,222 UART: [art] Derive Key Pair
5,277,582 UART: [art] Store priv key in slot 0x5
5,290,740 UART: [art] Derive Key Pair - Done
5,305,621 UART: [art] Signing Cert with AUTHO
5,306,101 UART: RITY.KEYID = 7
5,321,601 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,366 UART: [art] PUB.X = B17A7AA46CF56D1B6E14F96BD70D8A4D516AB8498FB6AA1135391D12E48BB81B1B296D8C072510E6832C727D5B79B91E
5,329,138 UART: [art] PUB.Y = 71B96193A832463B594EF0342C705E08B265A1CB769DBB2DE212001B58A2167C5C510D7FF6A570D084355DE189023116
5,336,049 UART: [art] SIG.R = 2D5DCFB18AD37F54EB582A386FDAA7576D29B30483C4459E0DD4ABFEC3FFE984D006177A49C0A1831CAD50970D5EB788
5,342,823 UART: [art] SIG.S = 5B986BCB24BAC179BEDB3642848CD711FD24DC5FA70C0CF6A2D9CD8480C1A8B140769EE14B45051C5E903D9A3420241B
5,367,277 UART: Caliptra RT
5,367,530 UART: [state] CFI Enabled
5,651,490 UART: [rt] RT failed reset flow
5,651,921 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
893,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,886 UART: [kat] ++
898,038 UART: [kat] sha1
902,290 UART: [kat] SHA2-256
904,230 UART: [kat] SHA2-384
906,801 UART: [kat] SHA2-512-ACC
908,702 UART: [kat] ECC-384
918,221 UART: [kat] HMAC-384Kdf
922,823 UART: [kat] LMS
1,171,151 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,764 UART: [fht] FHT @ 0x50003400
1,175,383 UART: [idev] ++
1,175,551 UART: [idev] CDI.KEYID = 6
1,175,911 UART: [idev] SUBJECT.KEYID = 7
1,176,335 UART: [idev] UDS.KEYID = 0
1,176,680 ready_for_fw is high
1,176,680 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,335 UART: [idev] Erasing UDS.KEYID = 0
1,201,496 UART: [idev] Sha1 KeyId Algorithm
1,209,980 UART: [idev] --
1,211,002 UART: [ldev] ++
1,211,170 UART: [ldev] CDI.KEYID = 6
1,211,533 UART: [ldev] SUBJECT.KEYID = 5
1,211,959 UART: [ldev] AUTHORITY.KEYID = 7
1,212,422 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,462 UART: [ldev] --
1,283,891 UART: [fwproc] Wait for Commands...
1,284,607 UART: [fwproc] Recv command 0x46574c44
1,285,335 UART: [fwproc] Recv'd Img size: 78532 bytes
2,172,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,643 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,947 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,311,108 >>> mbox cmd response: success
2,311,108 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,312,138 UART: [afmc] ++
2,312,306 UART: [afmc] CDI.KEYID = 6
2,312,668 UART: [afmc] SUBJECT.KEYID = 7
2,313,093 UART: [afmc] AUTHORITY.KEYID = 5
2,348,194 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,393 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,121 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,006 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,725 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,649 UART: [afmc] --
2,391,603 UART: [cold-reset] --
2,392,267 UART: [state] Locking Datavault
2,393,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,322 UART: [state] Locking ICCM
2,394,764 UART: [exit] Launching FMC @ 0x40000130
2,400,093 UART:
2,400,109 UART: Running Caliptra FMC ...
2,400,517 UART:
2,400,660 UART: [state] CFI Enabled
2,411,239 UART: [fht] FMC Alias Private Key: 7
2,518,988 UART: [art] Extend RT PCRs Done
2,519,416 UART: [art] Lock RT PCRs Done
2,521,208 UART: [art] Populate DV Done
2,529,367 UART: [fht] FMC Alias Private Key: 7
2,530,445 UART: [art] Derive CDI
2,530,725 UART: [art] Store in in slot 0x4
2,616,330 UART: [art] Derive Key Pair
2,616,690 UART: [art] Store priv key in slot 0x5
2,630,408 UART: [art] Derive Key Pair - Done
2,645,030 UART: [art] Signing Cert with AUTHO
2,645,510 UART: RITY.KEYID = 7
2,660,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,393 UART: [art] PUB.X = 50E1D96E723914BD752E17C21DBC32F89A0F12BD9F9C6417697DF8FF1696BA748E6B0AA43A8E529281A987A3E7DA6492
2,668,163 UART: [art] PUB.Y = C3C9302C8EDDCE60C5DC4A8F4FEAA0A5180964F24FB0DA74609AC6283E990C2A0B6726499D53460A2F5EB8C13BF14650
2,675,113 UART: [art] SIG.R = 8C25906B480C7D63A8371A0EC85DB0AB3AE010E8C55368C68687312B577FE6587E2AC1018B357DE619CA74887E960CB2
2,681,871 UART: [art] SIG.S = E4BF9BF30C81F401759AC3F80C924CEE7F245A20C83E891F2B459A2B8E70C64224BDEC6DD61A9865319CB34426107D7A
2,705,519 UART: mbox::rt_entry...
2,705,891 UART: ____ _ _ _ ____ _____
2,706,675 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,475 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,243 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,011 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,779 UART: |_|
2,710,091 UART:
2,816,578 UART: [rt] Runtime listening for mailbox commands...
2,817,512 >>> mbox cmd response data (0 bytes)
2,817,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,817,624 UART:
2,817,640 UART: Running Caliptra ROM ...
2,818,048 UART:
2,818,190 UART: [state] CFI Enabled
2,821,168 UART: [state] LifecycleState = Unprovisioned
2,821,823 UART: [state] DebugLocked = No
2,822,505 UART: [state] WD Timer not started. Device not locked for debugging
2,823,783 UART: [kat] SHA2-256
3,629,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,633,558 UART: [kat] ++
3,633,710 UART: [kat] sha1
3,638,078 UART: [kat] SHA2-256
3,640,018 UART: [kat] SHA2-384
3,642,743 UART: [kat] SHA2-512-ACC
3,644,643 UART: [kat] ECC-384
3,654,494 UART: [kat] HMAC-384Kdf
3,658,950 UART: [kat] LMS
3,907,278 UART: [kat] --
3,908,086 UART: [update-reset] ++
5,218,786 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,219,847 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,369,425 >>> mbox cmd response: success
5,369,660 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,674 UART: [update-reset Success] --
5,378,745 UART: [state] Locking Datavault
5,379,569 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,173 UART: [state] Locking ICCM
5,380,611 UART: [exit] Launching FMC @ 0x40000130
5,385,940 UART:
5,385,956 UART: Running Caliptra FMC ...
5,386,364 UART:
5,386,507 UART: [state] CFI Enabled
5,475,882 UART: [art] Extend RT PCRs Done
5,476,310 UART: [art] Lock RT PCRs Done
5,477,797 UART: [art] Populate DV Done
5,485,832 UART: [fht] FMC Alias Private Key: 7
5,486,904 UART: [art] Derive CDI
5,487,184 UART: [art] Store in in slot 0x4
5,573,041 UART: [art] Derive Key Pair
5,573,401 UART: [art] Store priv key in slot 0x5
5,586,737 UART: [art] Derive Key Pair - Done
5,601,208 UART: [art] Signing Cert with AUTHO
5,601,688 UART: RITY.KEYID = 7
5,617,104 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,869 UART: [art] PUB.X = 3054BB36F9674A86CBE522D1B2D2F2E269DA798CDED7531CD0D7FD3EB824F5236A38DF47CF82CF2599133945284FB145
5,624,647 UART: [art] PUB.Y = 3671A0A1B878999956F8A7E7A6AAB1741123F618F3BCE4B739B3408866FC6595996FC7B2964D48DA8EB2E0DFEE134EAA
5,631,605 UART: [art] SIG.R = DF9322BB6D2835D431B30B1E221572244419FFDF4D3F960B0BBA3C2BF80817F8B79BC69E52C2C84D9D3859022F899F27
5,638,364 UART: [art] SIG.S = 1A3E3EA5D91C7D1FDFEE88CF46AD3F90B8644CFABDF1C007C92C7DEC11CD95F062D25575F959BB66CCDA910900675205
5,661,492 UART: Caliptra RT
5,661,837 UART: [state] CFI Enabled
5,941,475 UART: [rt] RT failed reset flow
5,941,906 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,504 ready_for_fw is high
1,061,504 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,163,215 >>> mbox cmd response: success
2,163,215 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,225,299 UART:
2,225,315 UART: Running Caliptra FMC ...
2,225,723 UART:
2,225,866 UART: [state] CFI Enabled
2,236,383 UART: [fht] FMC Alias Private Key: 7
2,344,256 UART: [art] Extend RT PCRs Done
2,344,684 UART: [art] Lock RT PCRs Done
2,346,320 UART: [art] Populate DV Done
2,354,675 UART: [fht] FMC Alias Private Key: 7
2,355,773 UART: [art] Derive CDI
2,356,053 UART: [art] Store in in slot 0x4
2,441,784 UART: [art] Derive Key Pair
2,442,144 UART: [art] Store priv key in slot 0x5
2,455,360 UART: [art] Derive Key Pair - Done
2,470,300 UART: [art] Signing Cert with AUTHO
2,470,780 UART: RITY.KEYID = 7
2,485,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,597 UART: [art] PUB.X = 39EA043C2D8541D46AB70DC12619747B72FC49ECBBC3C2D14CB0469795AC6ECFA5258F66BAE0C7F66EFA422A38005947
2,493,351 UART: [art] PUB.Y = 8D04B758CBF7CE65D683323DC151C84845C7F5FDA90CF72FBF8C9BE8123F8DAF0A1B76792C4F349E7DAB728DAE753B98
2,500,310 UART: [art] SIG.R = 8DA73F69B78A18BB94BD6B4B8E5536302F0781496E12AF0EE7F6C218D22212AC10E735FE941A4B9A2DE792F877E654E1
2,507,080 UART: [art] SIG.S = 248E190EA2198C88997C1F3D877BBA3F91FCC31D0DEA8966C2A7AE6E8A285E1FA59BFAB986F6783E442BDEB6E3F868C1
2,530,723 UART: mbox::rt_entry...
2,531,095 UART: ____ _ _ _ ____ _____
2,531,879 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,679 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,533,447 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,534,215 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,983 UART: |_|
2,535,295 UART:
2,641,687 UART: [rt] Runtime listening for mailbox commands...
2,642,621 >>> mbox cmd response data (0 bytes)
2,642,622 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,078,885 >>> mbox cmd response: success
5,092,237 UART:
5,092,253 UART: Running Caliptra FMC ...
5,092,661 UART:
5,092,804 UART: [state] CFI Enabled
5,182,413 UART: [art] Extend RT PCRs Done
5,182,841 UART: [art] Lock RT PCRs Done
5,184,302 UART: [art] Populate DV Done
5,192,543 UART: [fht] FMC Alias Private Key: 7
5,193,691 UART: [art] Derive CDI
5,193,971 UART: [art] Store in in slot 0x4
5,279,480 UART: [art] Derive Key Pair
5,279,840 UART: [art] Store priv key in slot 0x5
5,292,860 UART: [art] Derive Key Pair - Done
5,307,784 UART: [art] Signing Cert with AUTHO
5,308,264 UART: RITY.KEYID = 7
5,323,228 UART: [art] Erasing AUTHORITY.KEYID = 7
5,323,993 UART: [art] PUB.X = 6D77774F14FA190C80D2F62F38DD1A4F8FEC295185037CE3FF8D5862D5742E3CD985BADC8EEB8463F7BD53A221D2549F
5,330,769 UART: [art] PUB.Y = 47764B290E10B40EFF0D451EEC80BA8D01F58F7F970535B1220CE35F6E25767D70F41F843CB4C90002CA8302D532F24E
5,337,675 UART: [art] SIG.R = 7E5F81988320DDEA9F3D28629BF3E3075C04CDCC089E32609A60242773300E3D84B8370B3861768E00C37BA315A74081
5,344,400 UART: [art] SIG.S = 12449F611749854CACF956E79FCB61180A0EA35DD8F126E7D745FE1AAB78E01DD41F1BA46CC6E6D8D5F319FBB685FBF6
5,368,407 UART: Caliptra RT
5,368,752 UART: [state] CFI Enabled
5,647,494 UART: [rt] RT failed reset flow
5,647,925 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,133 UART: [kat] ++
895,285 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,060 UART: [kat] SHA2-512-ACC
905,961 UART: [kat] ECC-384
915,404 UART: [kat] HMAC-384Kdf
920,038 UART: [kat] LMS
1,168,350 UART: [kat] --
1,169,459 UART: [cold-reset] ++
1,170,003 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,173,999 ready_for_fw is high
1,173,999 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,198,777 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,202 UART: [ldev] Erasing FE.KEYID = 1
1,241,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,462 UART: [ldev] --
1,280,954 UART: [fwproc] Wait for Commands...
1,281,565 UART: [fwproc] Recv command 0x46574c44
1,282,298 UART: [fwproc] Recv'd Img size: 78532 bytes
2,168,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,224,541 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,306,573 >>> mbox cmd response: success
2,306,573 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,307,794 UART: [afmc] ++
2,307,962 UART: [afmc] CDI.KEYID = 6
2,308,325 UART: [afmc] SUBJECT.KEYID = 7
2,308,751 UART: [afmc] AUTHORITY.KEYID = 5
2,344,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,360,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,361,319 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,372,931 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,378,650 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,386,581 UART: [afmc] --
2,387,503 UART: [cold-reset] --
2,388,085 UART: [state] Locking Datavault
2,389,106 UART: [state] Locking PCR0, PCR1 and PCR31
2,389,710 UART: [state] Locking ICCM
2,390,322 UART: [exit] Launching FMC @ 0x40000130
2,395,651 UART:
2,395,667 UART: Running Caliptra FMC ...
2,396,075 UART:
2,396,129 UART: [state] CFI Enabled
2,406,580 UART: [fht] FMC Alias Private Key: 7
2,515,089 UART: [art] Extend RT PCRs Done
2,515,517 UART: [art] Lock RT PCRs Done
2,516,961 UART: [art] Populate DV Done
2,524,970 UART: [fht] FMC Alias Private Key: 7
2,526,136 UART: [art] Derive CDI
2,526,416 UART: [art] Store in in slot 0x4
2,611,665 UART: [art] Derive Key Pair
2,612,025 UART: [art] Store priv key in slot 0x5
2,625,671 UART: [art] Derive Key Pair - Done
2,640,453 UART: [art] Signing Cert with AUTHO
2,640,933 UART: RITY.KEYID = 7
2,656,099 UART: [art] Erasing AUTHORITY.KEYID = 7
2,656,864 UART: [art] PUB.X = ECE4511E84D0830433FF4F5821C7C01CB52250BAF5C2A180C300AF30E35FE22CE71292AAF03366C1DE7F37A8852D590A
2,663,614 UART: [art] PUB.Y = 202D2879FD62C1A54396224A0DBDBD4F49557CED9AA4B0416F9E6709166EA29359E14D865087A1B21B8B671BDC53F17B
2,670,562 UART: [art] SIG.R = D312BE495435FFEAD4921ACC8D1B3475B7DB73ED8CF8D112FC37A3D65F9003466EEBB4C6922CCB979A1CC838404D12A4
2,677,345 UART: [art] SIG.S = EAB9ACC6DCC83D39DB5F3F97C666AF866F78511464AE9A489FC80183F2C06C8D6D0607A09A0092888847FAE27534EE2F
2,701,167 UART: mbox::rt_entry...
2,701,539 UART: ____ _ _ _ ____ _____
2,702,323 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,703,123 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,703,891 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,704,659 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,705,427 UART: |_|
2,705,739 UART:
2,812,826 UART: [rt] Runtime listening for mailbox commands...
2,813,760 >>> mbox cmd response data (0 bytes)
2,813,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,813,872 UART:
2,813,888 UART: Running Caliptra ROM ...
2,814,296 UART:
2,814,351 UART: [state] CFI Enabled
2,817,097 UART: [state] LifecycleState = Unprovisioned
2,817,752 UART: [state] DebugLocked = No
2,818,352 UART: [state] WD Timer not started. Device not locked for debugging
2,819,686 UART: [kat] SHA2-256
3,623,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,627,365 UART: [kat] ++
3,627,517 UART: [kat] sha1
3,631,873 UART: [kat] SHA2-256
3,633,813 UART: [kat] SHA2-384
3,636,646 UART: [kat] SHA2-512-ACC
3,638,546 UART: [kat] ECC-384
3,648,165 UART: [kat] HMAC-384Kdf
3,652,513 UART: [kat] LMS
3,900,825 UART: [kat] --
3,901,885 UART: [update-reset] ++
5,211,466 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,212,441 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,362,019 >>> mbox cmd response: success
5,362,134 UART: [update-reset] Copying MAN_2 To MAN_1
5,370,148 UART: [update-reset Success] --
5,370,837 UART: [state] Locking Datavault
5,371,745 UART: [state] Locking PCR0, PCR1 and PCR31
5,372,349 UART: [state] Locking ICCM
5,372,815 UART: [exit] Launching FMC @ 0x40000130
5,378,144 UART:
5,378,160 UART: Running Caliptra FMC ...
5,378,568 UART:
5,378,622 UART: [state] CFI Enabled
5,467,553 UART: [art] Extend RT PCRs Done
5,467,981 UART: [art] Lock RT PCRs Done
5,469,200 UART: [art] Populate DV Done
5,477,525 UART: [fht] FMC Alias Private Key: 7
5,478,597 UART: [art] Derive CDI
5,478,877 UART: [art] Store in in slot 0x4
5,564,726 UART: [art] Derive Key Pair
5,565,086 UART: [art] Store priv key in slot 0x5
5,578,570 UART: [art] Derive Key Pair - Done
5,593,190 UART: [art] Signing Cert with AUTHO
5,593,670 UART: RITY.KEYID = 7
5,608,536 UART: [art] Erasing AUTHORITY.KEYID = 7
5,609,301 UART: [art] PUB.X = 2E07B164CCE9DAAA37DDF2CC6D53D362AA82B58D72C92463E9EF9EE7AC42DE3F88E5B87531A86640E7C9F71C5ECE3F82
5,616,090 UART: [art] PUB.Y = CEE1F8BC4E2FE8DC9C3EBD78D545A3F834D604008F1872AF01DCABFBD138832F85220C05F151D195418305D7AFA4B4F6
5,623,019 UART: [art] SIG.R = FEFF5AF0EE006E99619BA68626D967896E5FECDC4C9D4770D0DAF0834D10AC423A428194446CC439917B3F9B467B7C6A
5,629,777 UART: [art] SIG.S = 8C39E82DCEF0DBAF87E5E509FAA3EE5A6362601FF6E2D09920E0654555B40635671B76484951C18E5BB816B9E111CFD5
5,653,234 UART: Caliptra RT
5,653,487 UART: [state] CFI Enabled
5,930,604 UART: [rt] RT failed reset flow
5,931,035 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,436 ready_for_fw is high
1,055,436 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,158,535 >>> mbox cmd response: success
2,158,535 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,220,647 UART:
2,220,663 UART: Running Caliptra FMC ...
2,221,071 UART:
2,221,125 UART: [state] CFI Enabled
2,231,962 UART: [fht] FMC Alias Private Key: 7
2,339,681 UART: [art] Extend RT PCRs Done
2,340,109 UART: [art] Lock RT PCRs Done
2,341,727 UART: [art] Populate DV Done
2,350,218 UART: [fht] FMC Alias Private Key: 7
2,351,290 UART: [art] Derive CDI
2,351,570 UART: [art] Store in in slot 0x4
2,437,295 UART: [art] Derive Key Pair
2,437,655 UART: [art] Store priv key in slot 0x5
2,450,601 UART: [art] Derive Key Pair - Done
2,465,707 UART: [art] Signing Cert with AUTHO
2,466,187 UART: RITY.KEYID = 7
2,481,133 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,898 UART: [art] PUB.X = 79F0B5239001A4804B5FF7F81BC5E11FE2ED095E40757EDD84EF22F70E672A33EB3C0C6B74E80A2A5DC1AF9E249AC13D
2,488,669 UART: [art] PUB.Y = 6FE7D1E9471FBD8CBB2B5A9C5189EC0290913092323D8FDA8822F4F80322C8D933989CB1EC056C1D6AE2B109F4AC5542
2,495,615 UART: [art] SIG.R = 0CB83D478377177707963F2E5BEF1EEAA8829FC7CEFFEE530E85C0ACD0F0B79C883BED34F0AC1F99D2537DE086A4CE76
2,502,396 UART: [art] SIG.S = 85163825AF0BFC2B5048BD194573F7184372C332A55D94C0E13C8D47592530CF14CFCE53B706C8DAFAA6580EFC9841D8
2,525,832 UART: mbox::rt_entry...
2,526,204 UART: ____ _ _ _ ____ _____
2,526,988 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,788 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,556 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,092 UART: |_|
2,530,404 UART:
2,636,808 UART: [rt] Runtime listening for mailbox commands...
2,637,742 >>> mbox cmd response data (0 bytes)
2,637,743 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,068,326 >>> mbox cmd response: success
5,081,650 UART:
5,081,666 UART: Running Caliptra FMC ...
5,082,074 UART:
5,082,128 UART: [state] CFI Enabled
5,170,759 UART: [art] Extend RT PCRs Done
5,171,187 UART: [art] Lock RT PCRs Done
5,172,418 UART: [art] Populate DV Done
5,180,691 UART: [fht] FMC Alias Private Key: 7
5,181,623 UART: [art] Derive CDI
5,181,903 UART: [art] Store in in slot 0x4
5,267,814 UART: [art] Derive Key Pair
5,268,174 UART: [art] Store priv key in slot 0x5
5,281,340 UART: [art] Derive Key Pair - Done
5,295,844 UART: [art] Signing Cert with AUTHO
5,296,324 UART: RITY.KEYID = 7
5,311,390 UART: [art] Erasing AUTHORITY.KEYID = 7
5,312,155 UART: [art] PUB.X = 5BB84AE97DA71AFE88C8204466272C59FA8D76CFD85CEC4B6A205B70E40495DE110B47863E0895344C7BC9213C375808
5,318,915 UART: [art] PUB.Y = 9726AFD78D219D13B2298F47587D64A79358E613E4761B2B36593AA0F540FAE87E9752B89D5ADB9651722672088DE1A5
5,325,856 UART: [art] SIG.R = EFDA4C0C4A4DE5A54389614F640F596EC1197AF970476860E31879BC34809AE11276CE327EDF33D97E6DD53A441108EF
5,332,621 UART: [art] SIG.S = 5AF7B0CE1889A8C1B3F8473BB2BA7FA3B227E589B630BFC57CC62759612338C662A93CD6F1EF1BACACACCEBB14C66E58
5,356,470 UART: Caliptra RT
5,356,723 UART: [state] CFI Enabled
5,638,617 UART: [rt] RT failed reset flow
5,639,048 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,969 UART: [state] LifecycleState = Unprovisioned
85,624 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,320 UART: [kat] ++
895,472 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
915,771 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,678 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,762 UART: [idev] ++
1,172,930 UART: [idev] CDI.KEYID = 6
1,173,291 UART: [idev] SUBJECT.KEYID = 7
1,173,716 UART: [idev] UDS.KEYID = 0
1,174,062 ready_for_fw is high
1,174,062 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,386 UART: [idev] Erasing UDS.KEYID = 0
1,198,970 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,208,913 UART: [ldev] ++
1,209,081 UART: [ldev] CDI.KEYID = 6
1,209,445 UART: [ldev] SUBJECT.KEYID = 5
1,209,872 UART: [ldev] AUTHORITY.KEYID = 7
1,210,335 UART: [ldev] FE.KEYID = 1
1,215,259 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,729 UART: [ldev] --
1,281,097 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 78532 bytes
2,169,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,657 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,966 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,308,110 >>> mbox cmd response: success
2,308,110 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,309,239 UART: [afmc] ++
2,309,407 UART: [afmc] CDI.KEYID = 6
2,309,770 UART: [afmc] SUBJECT.KEYID = 7
2,310,196 UART: [afmc] AUTHORITY.KEYID = 5
2,345,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,098 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,710 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,429 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,144 UART: [afmc] --
2,389,276 UART: [cold-reset] --
2,389,908 UART: [state] Locking Datavault
2,391,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,833 UART: [state] Locking ICCM
2,392,379 UART: [exit] Launching FMC @ 0x40000130
2,397,708 UART:
2,397,724 UART: Running Caliptra FMC ...
2,398,132 UART:
2,398,275 UART: [state] CFI Enabled
2,408,874 UART: [fht] FMC Alias Private Key: 7
2,517,245 UART: [art] Extend RT PCRs Done
2,517,673 UART: [art] Lock RT PCRs Done
2,519,303 UART: [art] Populate DV Done
2,527,598 UART: [fht] FMC Alias Private Key: 7
2,528,736 UART: [art] Derive CDI
2,529,016 UART: [art] Store in in slot 0x4
2,614,963 UART: [art] Derive Key Pair
2,615,323 UART: [art] Store priv key in slot 0x5
2,628,957 UART: [art] Derive Key Pair - Done
2,643,787 UART: [art] Signing Cert with AUTHO
2,644,267 UART: RITY.KEYID = 7
2,659,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,450 UART: [art] PUB.X = CCB3429DC084FB577DF3C10118DA7192210064A48C23B65A03934CCFBB984824F67A3B571AA32664FC7696ED55007FCE
2,667,174 UART: [art] PUB.Y = D85D821B62CA0D26F2F960296E9263F0F84CD191B8EE3585E3B121849DFD46C26D51A5CEA1BB6806F2482DE7990087A1
2,674,100 UART: [art] SIG.R = 6892EBB903CDD7C926CC794D3FA900F3CA56E883DDC53F8FB6CEDBBB415BAAA7DA4116E8509262642218A9BD54625EA9
2,680,863 UART: [art] SIG.S = 9CAF4633859A40E5482DC01E65885FC6CB229CF2F0CAA7B7B7C6F308D2A99C33460E91CC4D7289EDE9ACAEFC73DBA356
2,704,744 UART: mbox::rt_entry...
2,705,116 UART: ____ _ _ _ ____ _____
2,705,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,706,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,707,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,004 UART: |_|
2,709,316 UART:
2,816,072 UART: [rt] Runtime listening for mailbox commands...
2,817,006 >>> mbox cmd response data (0 bytes)
2,817,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,817,118 UART:
2,817,134 UART: Running Caliptra ROM ...
2,817,542 UART:
2,817,684 UART: [state] CFI Enabled
2,820,534 UART: [state] LifecycleState = Unprovisioned
2,821,189 UART: [state] DebugLocked = No
2,821,921 UART: [state] WD Timer not started. Device not locked for debugging
2,823,281 UART: [kat] SHA2-256
3,626,831 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,630,960 UART: [kat] ++
3,631,112 UART: [kat] sha1
3,635,258 UART: [kat] SHA2-256
3,637,198 UART: [kat] SHA2-384
3,640,029 UART: [kat] SHA2-512-ACC
3,641,929 UART: [kat] ECC-384
3,651,566 UART: [kat] HMAC-384Kdf
3,656,250 UART: [kat] LMS
3,904,562 UART: [kat] --
3,905,540 UART: [update-reset] ++
5,215,711 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,216,876 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,366,454 >>> mbox cmd response: success
5,366,755 UART: [update-reset] Copying MAN_2 To MAN_1
5,374,769 UART: [update-reset Success] --
5,375,792 UART: [state] Locking Datavault
5,376,600 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,204 UART: [state] Locking ICCM
5,377,858 UART: [exit] Launching FMC @ 0x40000130
5,383,187 UART:
5,383,203 UART: Running Caliptra FMC ...
5,383,611 UART:
5,383,754 UART: [state] CFI Enabled
5,472,817 UART: [art] Extend RT PCRs Done
5,473,245 UART: [art] Lock RT PCRs Done
5,474,722 UART: [art] Populate DV Done
5,483,057 UART: [fht] FMC Alias Private Key: 7
5,483,987 UART: [art] Derive CDI
5,484,267 UART: [art] Store in in slot 0x4
5,569,830 UART: [art] Derive Key Pair
5,570,190 UART: [art] Store priv key in slot 0x5
5,583,208 UART: [art] Derive Key Pair - Done
5,597,788 UART: [art] Signing Cert with AUTHO
5,598,268 UART: RITY.KEYID = 7
5,613,398 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,163 UART: [art] PUB.X = FFCDF8EDE23F89DB9D6C621554706A7F1AC032436F73631933357560451753801994880105D50BE6A7CF592D641223BA
5,620,916 UART: [art] PUB.Y = E2C9FC58D2A513CC2284455246C85A40DDDE7A4C255559FE5EA8A4FBE35F431DC1654CF81E1B0ED2F54E0216A6108931
5,627,870 UART: [art] SIG.R = 24AC5B466FEEDCB75325327B42EFEB373EB5C1EC8BBBD53FE7E0E55914FED79644F91E398D3B8A1178F4284AA12DA598
5,634,658 UART: [art] SIG.S = 15C119B42AF59C353DA3363E1F581621EA63281A5533A46375FB753D3191BB2AD3A8CF03D4B1528983C0F1FAE8DB4BB4
5,658,460 UART: Caliptra RT
5,658,805 UART: [state] CFI Enabled
5,942,321 UART: [rt] RT failed reset flow
5,942,752 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,821 ready_for_fw is high
1,056,821 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,158,898 >>> mbox cmd response: success
2,158,898 <<< Executing mbox cmd 0x90000000 (24 bytes) from SoC
2,221,676 UART:
2,221,692 UART: Running Caliptra FMC ...
2,222,100 UART:
2,222,243 UART: [state] CFI Enabled
2,232,832 UART: [fht] FMC Alias Private Key: 7
2,341,689 UART: [art] Extend RT PCRs Done
2,342,117 UART: [art] Lock RT PCRs Done
2,343,439 UART: [art] Populate DV Done
2,351,626 UART: [fht] FMC Alias Private Key: 7
2,352,564 UART: [art] Derive CDI
2,352,844 UART: [art] Store in in slot 0x4
2,438,347 UART: [art] Derive Key Pair
2,438,707 UART: [art] Store priv key in slot 0x5
2,451,971 UART: [art] Derive Key Pair - Done
2,466,789 UART: [art] Signing Cert with AUTHO
2,467,269 UART: RITY.KEYID = 7
2,482,277 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,042 UART: [art] PUB.X = BA0DA370BBCB820AB5AED58DC8908E44A847A8DC7440630DCC8D58C17E8CBD8826AEC7B335E303F6C87354CA146C469A
2,489,818 UART: [art] PUB.Y = 7655976858D7C24AABB2701C9132797ED53F0C03B1434233CCD8D1F56CEE68F9177180CFA2535DB6B8F03115066FC5DB
2,496,761 UART: [art] SIG.R = C1B5DCDDA52E55890C65574B0CDB427786C7535225E497B0D64F03AF9D98940C5FD84AAD4580A250E446B79AEE06BF83
2,503,524 UART: [art] SIG.S = 9D4B7806BAFFC574F8827A12E2D12A9CAC1E50DACB93717A229D99C7C679C7A089E760C894A904708E968BF97F88C367
2,527,291 UART: mbox::rt_entry...
2,527,663 UART: ____ _ _ _ ____ _____
2,528,447 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,247 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,015 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,530,783 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,551 UART: |_|
2,531,863 UART:
2,638,782 UART: [rt] Runtime listening for mailbox commands...
2,639,716 >>> mbox cmd response data (0 bytes)
2,639,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,071,135 >>> mbox cmd response: success
5,084,809 UART:
5,084,825 UART: Running Caliptra FMC ...
5,085,233 UART:
5,085,376 UART: [state] CFI Enabled
5,174,295 UART: [art] Extend RT PCRs Done
5,174,723 UART: [art] Lock RT PCRs Done
5,176,090 UART: [art] Populate DV Done
5,184,131 UART: [fht] FMC Alias Private Key: 7
5,185,275 UART: [art] Derive CDI
5,185,555 UART: [art] Store in in slot 0x4
5,271,880 UART: [art] Derive Key Pair
5,272,240 UART: [art] Store priv key in slot 0x5
5,285,914 UART: [art] Derive Key Pair - Done
5,300,868 UART: [art] Signing Cert with AUTHO
5,301,348 UART: RITY.KEYID = 7
5,316,412 UART: [art] Erasing AUTHORITY.KEYID = 7
5,317,177 UART: [art] PUB.X = 1FC811B5C70EACB9EF8D52C641901A3B148D465EC79D96021DB4059E632610D5CF1C4D7FE0AA3E0EC3302B769717097F
5,323,940 UART: [art] PUB.Y = 849134885261E8C3A781F2AD43F2C0194DC44A99819FA51B9EF3202ACB66BB549D94B7156AA53786778F95E44F59863E
5,330,886 UART: [art] SIG.R = FDF9713285C5B0B469E6225F1DF3EAA0FEC29DF448D688A159B1AD1707574DF5379F7AEAF44E22893C53EABFEEBF4655
5,337,671 UART: [art] SIG.S = 6DA9359231A8F06D8EC5B9DF14892A939966A0F54047116799EF29108EC3F77707BA95339F0BE6C46E295D7FD29D700C
5,361,519 UART: Caliptra RT
5,361,864 UART: [state] CFI Enabled
5,641,490 UART: [rt] RT failed reset flow
5,641,921 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,180 UART:
192,537 UART: Running Caliptra ROM ...
193,700 UART:
193,853 UART: [state] CFI Enabled
262,824 UART: [state] LifecycleState = Unprovisioned
264,804 UART: [state] DebugLocked = No
267,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,500 UART: [kat] SHA2-256
441,194 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,697 UART: [kat] ++
452,221 UART: [kat] sha1
462,800 UART: [kat] SHA2-256
465,526 UART: [kat] SHA2-384
471,369 UART: [kat] SHA2-512-ACC
473,726 UART: [kat] ECC-384
2,769,509 UART: [kat] HMAC-384Kdf
2,800,170 UART: [kat] LMS
3,990,436 UART: [kat] --
3,993,786 UART: [cold-reset] ++
3,995,424 UART: [fht] Storing FHT @ 0x50003400
4,006,525 UART: [idev] ++
4,007,093 UART: [idev] CDI.KEYID = 6
4,007,981 UART: [idev] SUBJECT.KEYID = 7
4,009,297 UART: [idev] UDS.KEYID = 0
4,010,363 ready_for_fw is high
4,010,593 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,109,591 UART: [idev] Erasing UDS.KEYID = 0
7,344,587 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,240 UART: [idev] --
7,371,094 UART: [ldev] ++
7,371,667 UART: [ldev] CDI.KEYID = 6
7,372,625 UART: [ldev] SUBJECT.KEYID = 5
7,373,826 UART: [ldev] AUTHORITY.KEYID = 7
7,375,101 UART: [ldev] FE.KEYID = 1
7,421,710 UART: [ldev] Erasing FE.KEYID = 1
10,754,583 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,553 UART: [ldev] --
13,136,931 UART: [fwproc] Waiting for Commands...
13,138,587 UART: [fwproc] Received command 0x46574c44
13,140,764 UART: [fwproc] Received Image of size 78576 bytes
16,757,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,834,351 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,903,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,096,743 >>> mbox cmd response: success
17,097,248 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,100,460 UART: [afmc] ++
17,101,090 UART: [afmc] CDI.KEYID = 6
17,102,002 UART: [afmc] SUBJECT.KEYID = 7
17,103,211 UART: [afmc] AUTHORITY.KEYID = 5
20,471,692 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,773,396 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,775,704 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,790,134 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,804,939 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,819,380 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,840,654 UART: [afmc] --
22,845,221 UART: [cold-reset] --
22,849,883 UART: [state] Locking Datavault
22,854,636 UART: [state] Locking PCR0, PCR1 and PCR31
22,856,380 UART: [state] Locking ICCM
22,857,603 UART: [exit] Launching FMC @ 0x40000130
22,866,043 UART:
22,866,271 UART: Running Caliptra FMC ...
22,867,366 UART:
22,867,515 UART: [state] CFI Enabled
22,932,162 UART: [fht] FMC Alias Private Key: 7
25,270,894 UART: [art] Extend RT PCRs Done
25,272,114 UART: [art] Lock RT PCRs Done
25,273,483 UART: [art] Populate DV Done
25,278,824 UART: [fht] FMC Alias Private Key: 7
25,280,264 UART: [art] Derive CDI
25,281,006 UART: [art] Store in in slot 0x4
25,341,264 UART: [art] Derive Key Pair
25,342,267 UART: [art] Store priv key in slot 0x5
28,635,584 UART: [art] Derive Key Pair - Done
28,648,421 UART: [art] Signing Cert with AUTHO
28,649,758 UART: RITY.KEYID = 7
30,937,507 UART: [art] Erasing AUTHORITY.KEYID = 7
30,939,025 UART: [art] PUB.X = 1EE4C1706BF70FF28917DD23531520109B4AE7FB94D24BA27C09D83584D09B683D23D8D8A2265646896DEFA9BFD34D74
30,946,227 UART: [art] PUB.Y = ACA05548362F9339FE5C9E78C302AADD6873A0BC20B18D4658186A6F125CE53AAD899B9988EC11F617E2A12E45D143BD
30,953,494 UART: [art] SIG.R = AB57169F3BCC568492CADF099C115F47D9BE4D30FDB7D5CDA9DD7BFAF5B068ECD348C414D5C6CE03FE4964D67EEF5B27
30,960,943 UART: [art] SIG.S = FCFD32EBE1D9B2EF8B09F1BC605C719AF7DAD640BCB066235263E63206080FBD90FC26C50051268928AD9AF85AE0A034
32,265,376 UART: mbox::rt_entry...
32,266,336 UART: ____ _ _ _ ____ _____
32,268,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,270,386 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,272,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,274,230 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,276,152 UART: |_|
32,276,993 UART:
32,389,643 UART: [rt] Runtime listening for mailbox commands...
32,391,871 >>> mbox cmd response data (0 bytes)
34,456,068 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,600,031 UART:
34,600,409 UART: Running Caliptra ROM ...
34,601,536 UART:
34,601,717 UART: [state] CFI Enabled
34,671,338 UART: [state] LifecycleState = Unprovisioned
34,673,278 UART: [state] DebugLocked = No
34,674,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,679,191 UART: [kat] SHA2-256
34,848,911 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,859,389 UART: [kat] ++
34,859,839 UART: [kat] sha1
34,870,719 UART: [kat] SHA2-256
34,873,396 UART: [kat] SHA2-384
34,878,732 UART: [kat] SHA2-512-ACC
34,881,127 UART: [kat] ECC-384
37,177,307 UART: [kat] HMAC-384Kdf
37,207,690 UART: [kat] LMS
38,398,028 UART: [kat] --
38,401,543 UART: [update-reset] ++
42,541,489 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,545,453 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,926,736 >>> mbox cmd response: success
42,931,211 UART: [update-reset] Copying MAN_2 To MAN_1
42,950,453 UART: [update-reset Success] --
42,954,595 UART: [state] Locking Datavault
42,956,869 UART: [state] Locking PCR0, PCR1 and PCR31
42,959,064 UART: [state] Locking ICCM
42,959,985 UART: [exit] Launching FMC @ 0x40000130
42,968,110 UART:
42,968,361 UART: Running Caliptra FMC ...
42,969,453 UART:
42,969,612 UART: [state] CFI Enabled
43,064,834 UART: [art] Extend RT PCRs Done
43,066,020 UART: [art] Lock RT PCRs Done
43,067,416 UART: [art] Populate DV Done
43,073,089 UART: [fht] FMC Alias Private Key: 7
43,074,728 UART: [art] Derive CDI
43,075,532 UART: [art] Store in in slot 0x4
43,134,032 UART: [art] Derive Key Pair
43,135,059 UART: [art] Store priv key in slot 0x5
46,428,604 UART: [art] Derive Key Pair - Done
46,441,699 UART: [art] Signing Cert with AUTHO
46,442,990 UART: RITY.KEYID = 7
48,730,475 UART: [art] Erasing AUTHORITY.KEYID = 7
48,731,979 UART: [art] PUB.X = 560EFF476854B96FA65F217FF65CE0680620D5325B9A35A5B049387D6A6CE7C79358EFC227A9A52B859857E9E3F92FC5
48,739,252 UART: [art] PUB.Y = F3DD4EF7C78ECB43E1055D410DB999FC35B2F17550876C70CBEFE3224F871AD17FB325EB9811A35B33DFA28AAFA753F2
48,746,513 UART: [art] SIG.R = 0BDB0455BD51CD248C7AA6CBB1E6B5437DE40990F7C72F592D3B2404A174AF02A5CB4720973EAFC97B1AFE312F0C7D67
48,753,896 UART: [art] SIG.S = AD1252A61EFFBCCFD549A368DCA8E991FDE04E50E55FCD683844D0E0DAE20DF86620E248F0A448BE6E4F883753385A8D
50,059,417 UART: Caliptra RT
50,060,116 UART: [state] CFI Enabled
50,387,274 UART: [rt] RT failed reset flow
50,388,486 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,784,725 ready_for_fw is high
3,785,326 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,129,724 >>> mbox cmd response: success
17,130,299 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,821,608 UART:
22,821,983 UART: Running Caliptra FMC ...
22,823,186 UART:
22,823,350 UART: [state] CFI Enabled
22,891,931 UART: [fht] FMC Alias Private Key: 7
25,230,063 UART: [art] Extend RT PCRs Done
25,231,344 UART: [art] Lock RT PCRs Done
25,233,215 UART: [art] Populate DV Done
25,238,793 UART: [fht] FMC Alias Private Key: 7
25,240,490 UART: [art] Derive CDI
25,241,223 UART: [art] Store in in slot 0x4
25,300,735 UART: [art] Derive Key Pair
25,301,773 UART: [art] Store priv key in slot 0x5
28,594,667 UART: [art] Derive Key Pair - Done
28,607,626 UART: [art] Signing Cert with AUTHO
28,608,935 UART: RITY.KEYID = 7
30,896,517 UART: [art] Erasing AUTHORITY.KEYID = 7
30,898,028 UART: [art] PUB.X = FA939C7F15214B79DA7FA26BEFB8F73F411AA7891A446AA9AA5AF318A079D052290168FD781E83BF30464F4E78CB4114
30,905,278 UART: [art] PUB.Y = D124B6DB076222FBA0BE54255D7A003646375F2770CDE2050DAE22EBEA5B6C8AD0131D3D75662AE4B993A3933F170F1C
30,912,523 UART: [art] SIG.R = BE37B8C2F3EE4E09C3F5B7AE63E942EDE3ABAB306BBFC239943E15B9FC8ECE11B1E457A7738DB7AC8CE1FB388DD54E3D
30,919,964 UART: [art] SIG.S = 75AF4C9C8BE80A906AB2D3D679D836955EFA5DAA35F74081E478CA0DABAB0B822A8A3F9A0110FA486DA2BF8B442A7F94
32,224,626 UART: mbox::rt_entry...
32,225,593 UART: ____ _ _ _ ____ _____
32,227,582 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,229,580 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,231,499 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,233,454 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,235,305 UART: |_|
32,236,180 UART:
32,350,140 UART: [rt] Runtime listening for mailbox commands...
32,352,341 >>> mbox cmd response data (0 bytes)
34,409,030 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,151,800 >>> mbox cmd response: success
43,188,147 UART:
43,188,459 UART: Running Caliptra FMC ...
43,189,575 UART:
43,189,735 UART: [state] CFI Enabled
43,295,547 UART: [art] Extend RT PCRs Done
43,296,731 UART: [art] Lock RT PCRs Done
43,298,184 UART: [art] Populate DV Done
43,303,803 UART: [fht] FMC Alias Private Key: 7
43,305,335 UART: [art] Derive CDI
43,306,110 UART: [art] Store in in slot 0x4
43,364,763 UART: [art] Derive Key Pair
43,365,801 UART: [art] Store priv key in slot 0x5
46,658,450 UART: [art] Derive Key Pair - Done
46,671,400 UART: [art] Signing Cert with AUTHO
46,672,695 UART: RITY.KEYID = 7
48,959,370 UART: [art] Erasing AUTHORITY.KEYID = 7
48,960,873 UART: [art] PUB.X = 90A19B15DF7CC28A1A40DE72B0C9F9060BB93244A263764B297812CC0059CA05BD577CEE84AFFE81448202F4B6B18761
48,968,120 UART: [art] PUB.Y = CC1FCE61FF19F088AE90D510F4475497AC55958F4C670AD462A77F1717ABDE8C345022DDD710A47ED34E0B30409B299A
48,975,329 UART: [art] SIG.R = 7E79088FE6F7ECD128DBD6C02CBCE0671B19812FEE623ECD590B4C8EB01405D8A9BCE481C64EE366D88572AA9A6CFB72
48,982,743 UART: [art] SIG.S = D51F8270E65EF9B4C0515D7D50DE044FAE5FD0C04F2FBEF0858D43C58B887A047949CBFBE61AAC9336E9F6424EE5D1F0
50,288,046 UART: Caliptra RT
50,288,759 UART: [state] CFI Enabled
50,619,755 UART: [rt] RT failed reset flow
50,620,945 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
192,513 UART:
192,869 UART: Running Caliptra ROM ...
193,983 UART:
603,592 UART: [state] CFI Enabled
617,784 UART: [state] LifecycleState = Unprovisioned
619,702 UART: [state] DebugLocked = No
622,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,464 UART: [kat] SHA2-256
797,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,747 UART: [kat] ++
808,195 UART: [kat] sha1
819,280 UART: [kat] SHA2-256
822,016 UART: [kat] SHA2-384
827,732 UART: [kat] SHA2-512-ACC
830,101 UART: [kat] ECC-384
3,114,055 UART: [kat] HMAC-384Kdf
3,126,807 UART: [kat] LMS
4,316,864 UART: [kat] --
4,320,950 UART: [cold-reset] ++
4,321,959 UART: [fht] Storing FHT @ 0x50003400
4,334,008 UART: [idev] ++
4,334,574 UART: [idev] CDI.KEYID = 6
4,335,499 UART: [idev] SUBJECT.KEYID = 7
4,336,742 UART: [idev] UDS.KEYID = 0
4,337,763 ready_for_fw is high
4,337,986 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,436,799 UART: [idev] Erasing UDS.KEYID = 0
7,625,276 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,351 UART: [idev] --
7,650,180 UART: [ldev] ++
7,650,750 UART: [ldev] CDI.KEYID = 6
7,651,691 UART: [ldev] SUBJECT.KEYID = 5
7,653,170 UART: [ldev] AUTHORITY.KEYID = 7
7,654,280 UART: [ldev] FE.KEYID = 1
7,664,973 UART: [ldev] Erasing FE.KEYID = 1
10,954,313 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,827 UART: [ldev] --
13,314,830 UART: [fwproc] Waiting for Commands...
13,316,763 UART: [fwproc] Received command 0x46574c44
13,318,942 UART: [fwproc] Received Image of size 78576 bytes
16,944,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,023,839 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,092,744 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,285,575 >>> mbox cmd response: success
17,286,814 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,290,507 UART: [afmc] ++
17,291,201 UART: [afmc] CDI.KEYID = 6
17,292,140 UART: [afmc] SUBJECT.KEYID = 7
17,293,185 UART: [afmc] AUTHORITY.KEYID = 5
20,607,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,902,794 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,905,051 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,919,439 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,934,288 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,948,723 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,971,111 UART: [afmc] --
22,975,515 UART: [cold-reset] --
22,978,717 UART: [state] Locking Datavault
22,982,413 UART: [state] Locking PCR0, PCR1 and PCR31
22,984,174 UART: [state] Locking ICCM
22,986,585 UART: [exit] Launching FMC @ 0x40000130
22,994,985 UART:
22,995,236 UART: Running Caliptra FMC ...
22,996,338 UART:
22,996,508 UART: [state] CFI Enabled
23,004,339 UART: [fht] FMC Alias Private Key: 7
25,335,144 UART: [art] Extend RT PCRs Done
25,336,375 UART: [art] Lock RT PCRs Done
25,337,705 UART: [art] Populate DV Done
25,343,011 UART: [fht] FMC Alias Private Key: 7
25,344,715 UART: [art] Derive CDI
25,345,528 UART: [art] Store in in slot 0x4
25,388,117 UART: [art] Derive Key Pair
25,389,116 UART: [art] Store priv key in slot 0x5
28,631,438 UART: [art] Derive Key Pair - Done
28,644,216 UART: [art] Signing Cert with AUTHO
28,645,518 UART: RITY.KEYID = 7
30,924,512 UART: [art] Erasing AUTHORITY.KEYID = 7
30,926,047 UART: [art] PUB.X = 85E98703B211C87E0DA03D78268424E9BA3022C9A98A3B7F2347DA05F6081E94AC1407E25AE2E58B0524C9F4BD1959E9
30,933,461 UART: [art] PUB.Y = EE4472C992A74350610E280AAAF3B7A8EC23FA770D31BB6AF66D83D0339CB63FA2197AF48BDC4949347FB3C3EDA468A9
30,940,557 UART: [art] SIG.R = E4D8E7C2B2DAE82AD25570342FA6D46C2170888936ED19E7C49436CB707311F8C29AF3821F42384EB0181B280524B984
30,947,902 UART: [art] SIG.S = 9C5C54E9218BD52BBC8F1EE260D177771882582CC0A30B59A91BED39F483048614D9A317AAF65461470861B51E20BEEB
32,252,725 UART: mbox::rt_entry...
32,253,693 UART: ____ _ _ _ ____ _____
32,255,682 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,257,692 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,259,624 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,261,554 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,263,485 UART: |_|
32,264,335 UART:
32,377,254 UART: [rt] Runtime listening for mailbox commands...
32,379,432 >>> mbox cmd response data (0 bytes)
34,510,341 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,654,304 UART:
34,654,676 UART: Running Caliptra ROM ...
34,655,731 UART:
34,655,942 UART: [state] CFI Enabled
34,669,839 UART: [state] LifecycleState = Unprovisioned
34,671,737 UART: [state] DebugLocked = No
34,674,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,679,664 UART: [kat] SHA2-256
34,849,381 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,859,932 UART: [kat] ++
34,860,393 UART: [kat] sha1
34,872,543 UART: [kat] SHA2-256
34,875,234 UART: [kat] SHA2-384
34,880,678 UART: [kat] SHA2-512-ACC
34,883,024 UART: [kat] ECC-384
37,167,968 UART: [kat] HMAC-384Kdf
37,179,543 UART: [kat] LMS
38,369,572 UART: [kat] --
38,373,622 UART: [update-reset] ++
42,508,669 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,511,586 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,892,912 >>> mbox cmd response: success
42,897,390 UART: [update-reset] Copying MAN_2 To MAN_1
42,915,823 UART: [update-reset Success] --
42,919,000 UART: [state] Locking Datavault
42,923,448 UART: [state] Locking PCR0, PCR1 and PCR31
42,925,173 UART: [state] Locking ICCM
42,927,272 UART: [exit] Launching FMC @ 0x40000130
42,935,662 UART:
42,935,946 UART: Running Caliptra FMC ...
42,937,056 UART:
42,937,224 UART: [state] CFI Enabled
42,981,561 UART: [art] Extend RT PCRs Done
42,982,698 UART: [art] Lock RT PCRs Done
42,984,037 UART: [art] Populate DV Done
42,989,439 UART: [fht] FMC Alias Private Key: 7
42,991,036 UART: [art] Derive CDI
42,991,855 UART: [art] Store in in slot 0x4
43,034,758 UART: [art] Derive Key Pair
43,035,829 UART: [art] Store priv key in slot 0x5
46,278,120 UART: [art] Derive Key Pair - Done
46,291,284 UART: [art] Signing Cert with AUTHO
46,292,622 UART: RITY.KEYID = 7
48,571,792 UART: [art] Erasing AUTHORITY.KEYID = 7
48,573,303 UART: [art] PUB.X = DB8CEA66CD0C87B5E6878A0A5D85C6972BED1862B74F957DEA00E20B9E7E77AC4D4A7CC2C4AD36F6D340E49836FD4A88
48,580,577 UART: [art] PUB.Y = DA8F87D175D333BC15AEE3A4DADC6BC9FEB2219CC87F50CFC7457DE540DA52D4B8D94987095059387944BDE0FF26C90B
48,587,871 UART: [art] SIG.R = 4561B82D7B8345FBADAFE6BF29DCA166FE0742FF59C6E9ADE81B2761935EF5B2F1EA9D8CA1CE978502FDB975F6008BA2
48,595,287 UART: [art] SIG.S = FB9CD4874EB8D5D283E9F9C2BD00DDCBDB5FFE28757DA9D42478C00039F827EDCA57EC7BBD98A9B6750189A0FCBD490C
49,900,286 UART: Caliptra RT
49,900,985 UART: [state] CFI Enabled
50,188,649 UART: [rt] RT failed reset flow
50,189,837 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,125,513 ready_for_fw is high
4,125,887 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,340,953 >>> mbox cmd response: success
17,341,516 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
22,983,241 UART:
22,983,632 UART: Running Caliptra FMC ...
22,984,737 UART:
22,984,892 UART: [state] CFI Enabled
22,992,850 UART: [fht] FMC Alias Private Key: 7
25,322,979 UART: [art] Extend RT PCRs Done
25,324,207 UART: [art] Lock RT PCRs Done
25,326,236 UART: [art] Populate DV Done
25,331,860 UART: [fht] FMC Alias Private Key: 7
25,333,540 UART: [art] Derive CDI
25,334,285 UART: [art] Store in in slot 0x4
25,377,208 UART: [art] Derive Key Pair
25,378,247 UART: [art] Store priv key in slot 0x5
28,620,749 UART: [art] Derive Key Pair - Done
28,633,746 UART: [art] Signing Cert with AUTHO
28,635,047 UART: RITY.KEYID = 7
30,914,094 UART: [art] Erasing AUTHORITY.KEYID = 7
30,915,660 UART: [art] PUB.X = 8AADD2D519DB5C0431E068EA29DE5BDFBA70836911D2969322C71B64A0E84B3AEADCB776E52BB52B803B7D826069D163
30,922,870 UART: [art] PUB.Y = E9B96A3CB3D9FF973876D6B85C55E2619C5D6F5360CB7E9F8C577BED93A543B393038C9BF7AA12E8B443C27F183FA9D7
30,930,132 UART: [art] SIG.R = 65F193E3CBEFDA88B6C515EF548434D72FBFE9D6195A722C7E517BAE457DFC294A1B97F41315EB4296A0FCBACF32C294
30,937,529 UART: [art] SIG.S = EB0A8414A37CAD1FAE518991EAE1DA7AB841E6E79CDFBD1EBC4EF9B176B833F22A375437ABD3136A306645E08FA4F7AA
32,242,140 UART: mbox::rt_entry...
32,243,090 UART: ____ _ _ _ ____ _____
32,245,069 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,247,082 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,249,046 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,251,029 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,252,890 UART: |_|
32,253,692 UART:
32,366,896 UART: [rt] Runtime listening for mailbox commands...
32,369,081 >>> mbox cmd response data (0 bytes)
34,494,838 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,136,921 >>> mbox cmd response: success
43,174,372 UART:
43,174,690 UART: Running Caliptra FMC ...
43,175,819 UART:
43,175,985 UART: [state] CFI Enabled
43,220,420 UART: [art] Extend RT PCRs Done
43,221,618 UART: [art] Lock RT PCRs Done
43,223,022 UART: [art] Populate DV Done
43,228,705 UART: [fht] FMC Alias Private Key: 7
43,230,402 UART: [art] Derive CDI
43,231,220 UART: [art] Store in in slot 0x4
43,273,924 UART: [art] Derive Key Pair
43,274,926 UART: [art] Store priv key in slot 0x5
46,516,713 UART: [art] Derive Key Pair - Done
46,529,657 UART: [art] Signing Cert with AUTHO
46,530,957 UART: RITY.KEYID = 7
48,810,819 UART: [art] Erasing AUTHORITY.KEYID = 7
48,812,327 UART: [art] PUB.X = 81CA9D58021AFD3DD2DE7BA5203FC4A2DC716F42F072D9837025FF2565593E0DEB9A4D01907AD6DEE3E223086D246759
48,819,542 UART: [art] PUB.Y = FE71CCE068918725C377FDDEA9A4ECADD0D5AB8560B9229A454B5BCD23ED3F187ADAB50AF5A61B6307EFC53B7541DA89
48,826,837 UART: [art] SIG.R = 9D51DBFCF556AB53E5A196F3D80F75FA7673A5B0C80AF38F65659EA87C17FE9482D27AB5090AB1DA9EB3325A719F42A8
48,834,192 UART: [art] SIG.S = 97AE0B8FF05EC4686FE8CF67446579545319D2657A8DF01AB5C79908174A58FCF151A5778B7C5DAD1F0D22186BA3A1A0
50,139,193 UART: Caliptra RT
50,139,918 UART: [state] CFI Enabled
50,427,274 UART: [rt] RT failed reset flow
50,428,472 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,290 UART:
192,643 UART: Running Caliptra ROM ...
193,824 UART:
193,979 UART: [state] CFI Enabled
262,568 UART: [state] LifecycleState = Unprovisioned
264,481 UART: [state] DebugLocked = No
266,900 UART: [state] WD Timer not started. Device not locked for debugging
270,933 UART: [kat] SHA2-256
450,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,607 UART: [kat] ++
462,140 UART: [kat] sha1
474,328 UART: [kat] SHA2-256
477,371 UART: [kat] SHA2-384
482,938 UART: [kat] SHA2-512-ACC
485,884 UART: [kat] ECC-384
2,946,925 UART: [kat] HMAC-384Kdf
2,971,202 UART: [kat] LMS
3,500,638 UART: [kat] --
3,506,265 UART: [cold-reset] ++
3,508,053 UART: [fht] FHT @ 0x50003400
3,518,013 UART: [idev] ++
3,518,644 UART: [idev] CDI.KEYID = 6
3,519,537 UART: [idev] SUBJECT.KEYID = 7
3,520,725 UART: [idev] UDS.KEYID = 0
3,521,650 ready_for_fw is high
3,521,841 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,620,730 UART: [idev] Erasing UDS.KEYID = 0
6,025,044 UART: [idev] Sha1 KeyId Algorithm
6,048,051 UART: [idev] --
6,052,538 UART: [ldev] ++
6,053,114 UART: [ldev] CDI.KEYID = 6
6,054,040 UART: [ldev] SUBJECT.KEYID = 5
6,055,223 UART: [ldev] AUTHORITY.KEYID = 7
6,056,461 UART: [ldev] FE.KEYID = 1
6,083,711 UART: [ldev] Erasing FE.KEYID = 1
8,585,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,374,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,887 UART: [ldev] --
10,399,057 UART: [fwproc] Wait for Commands...
10,401,926 UART: [fwproc] Recv command 0x46574c44
10,403,969 UART: [fwproc] Recv'd Img size: 78532 bytes
13,369,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,442,770 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,511,564 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,704,144 >>> mbox cmd response: success
13,704,684 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,709,250 UART: [afmc] ++
13,709,833 UART: [afmc] CDI.KEYID = 6
13,710,741 UART: [afmc] SUBJECT.KEYID = 7
13,711,954 UART: [afmc] AUTHORITY.KEYID = 5
16,256,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,980,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,982,615 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,998,445 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,014,410 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,030,276 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,053,137 UART: [afmc] --
18,056,135 UART: [cold-reset] --
18,060,698 UART: [state] Locking Datavault
18,065,461 UART: [state] Locking PCR0, PCR1 and PCR31
18,067,106 UART: [state] Locking ICCM
18,069,177 UART: [exit] Launching FMC @ 0x40000130
18,077,611 UART:
18,077,929 UART: Running Caliptra FMC ...
18,079,050 UART:
18,079,217 UART: [state] CFI Enabled
18,138,579 UART: [fht] FMC Alias Private Key: 7
19,902,417 UART: [art] Extend RT PCRs Done
19,903,614 UART: [art] Lock RT PCRs Done
19,905,426 UART: [art] Populate DV Done
19,910,833 UART: [fht] FMC Alias Private Key: 7
19,912,350 UART: [art] Derive CDI
19,913,095 UART: [art] Store in in slot 0x4
19,970,925 UART: [art] Derive Key Pair
19,971,930 UART: [art] Store priv key in slot 0x5
22,434,334 UART: [art] Derive Key Pair - Done
22,447,278 UART: [art] Signing Cert with AUTHO
22,448,605 UART: RITY.KEYID = 7
24,160,883 UART: [art] Erasing AUTHORITY.KEYID = 7
24,162,380 UART: [art] PUB.X = 0567FEDD78C548B26ECAECFBF928ED0CEFDE1C7BB2C8313C68E150165CD40D1F127CCB29C85187F51607AA101CE7B718
24,169,637 UART: [art] PUB.Y = 8BB3B26A38CB825D40EEC0A9832AF4D28F81CC62262CA16E0F9500770D465AD3B22DA53D465D747FF3611883C1D7374E
24,176,938 UART: [art] SIG.R = 656205B2128E63712BD3A19883DAEEC8181456385174026DA41CAEB2AB78F263C1D8CCF8D9D7B7550DA92AD0F4E4E697
24,184,282 UART: [art] SIG.S = 19760716B898EF45542ADDE4A2DD0959546CB056546C47846053752552655D791029349D636E0F916F8145B0AB6793F4
25,162,386 UART: mbox::rt_entry...
25,163,360 UART: ____ _ _ _ ____ _____
25,165,294 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,167,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,169,239 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,171,166 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,173,094 UART: |_|
25,173,906 UART:
25,286,295 UART: [rt] Runtime listening for mailbox commands...
25,288,514 >>> mbox cmd response data (0 bytes)
27,344,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,488,680 UART:
27,489,059 UART: Running Caliptra ROM ...
27,490,203 UART:
27,490,375 UART: [state] CFI Enabled
27,550,945 UART: [state] LifecycleState = Unprovisioned
27,552,832 UART: [state] DebugLocked = No
27,555,302 UART: [state] WD Timer not started. Device not locked for debugging
27,559,107 UART: [kat] SHA2-256
27,738,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,749,778 UART: [kat] ++
27,750,314 UART: [kat] sha1
27,761,977 UART: [kat] SHA2-256
27,765,026 UART: [kat] SHA2-384
27,771,509 UART: [kat] SHA2-512-ACC
27,774,454 UART: [kat] ECC-384
30,236,439 UART: [kat] HMAC-384Kdf
30,258,948 UART: [kat] LMS
30,788,403 UART: [kat] --
30,794,181 UART: [update-reset] ++
34,227,430 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,230,320 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,612,642 >>> mbox cmd response: success
34,617,194 UART: [update-reset] Copying MAN_2 To MAN_1
34,635,481 UART: [update-reset Success] --
34,642,040 UART: [state] Locking Datavault
34,645,155 UART: [state] Locking PCR0, PCR1 and PCR31
34,646,812 UART: [state] Locking ICCM
34,648,562 UART: [exit] Launching FMC @ 0x40000130
34,656,961 UART:
34,657,198 UART: Running Caliptra FMC ...
34,658,548 UART:
34,658,704 UART: [state] CFI Enabled
34,748,296 UART: [art] Extend RT PCRs Done
34,749,518 UART: [art] Lock RT PCRs Done
34,751,114 UART: [art] Populate DV Done
34,756,738 UART: [fht] FMC Alias Private Key: 7
34,758,383 UART: [art] Derive CDI
34,759,216 UART: [art] Store in in slot 0x4
34,817,392 UART: [art] Derive Key Pair
34,818,442 UART: [art] Store priv key in slot 0x5
37,281,207 UART: [art] Derive Key Pair - Done
37,294,529 UART: [art] Signing Cert with AUTHO
37,295,833 UART: RITY.KEYID = 7
39,006,821 UART: [art] Erasing AUTHORITY.KEYID = 7
39,008,333 UART: [art] PUB.X = 75D2C133FCFF6AC1A0CC1A1A761B07389B67752BCE6D8178AF2BC56852947B1BD2F7C61BEC295F04DA956F65425CF419
39,015,591 UART: [art] PUB.Y = 0C01C74BF153DF4EC526F85C32A013A73B9B2C8A40E1FE7029CC52896FBCF5A42CBBB2703C5F4BD4A442BAEBA70B31E2
39,022,883 UART: [art] SIG.R = 1F9645E79CCD5C8AC82134129A7AD5A9D6ECD3D7235FDDA75CAF72C883836F3438A10B5AF7C432CC67823AA7920DFBD4
39,030,299 UART: [art] SIG.S = F35EEAE6DE38F68A232798F7E038F918C92E206E2FAC1DD573C0E01D8A9490599BA5B362B8311AB5D1D8E9B81B81EE5C
40,009,581 UART: Caliptra RT
40,010,282 UART: [state] CFI Enabled
40,344,740 UART: [rt] RT failed reset flow
40,345,932 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,380,678 ready_for_fw is high
3,381,289 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,512,710 >>> mbox cmd response: success
13,513,769 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,797,647 UART:
17,798,138 UART: Running Caliptra FMC ...
17,799,455 UART:
17,799,626 UART: [state] CFI Enabled
17,867,650 UART: [fht] FMC Alias Private Key: 7
19,631,699 UART: [art] Extend RT PCRs Done
19,632,921 UART: [art] Lock RT PCRs Done
19,634,390 UART: [art] Populate DV Done
19,639,809 UART: [fht] FMC Alias Private Key: 7
19,641,396 UART: [art] Derive CDI
19,642,165 UART: [art] Store in in slot 0x4
19,699,669 UART: [art] Derive Key Pair
19,700,661 UART: [art] Store priv key in slot 0x5
22,163,798 UART: [art] Derive Key Pair - Done
22,176,316 UART: [art] Signing Cert with AUTHO
22,177,627 UART: RITY.KEYID = 7
23,889,299 UART: [art] Erasing AUTHORITY.KEYID = 7
23,890,823 UART: [art] PUB.X = 5A67D3AD78B9B89014AB5940475D248BA7C2F697A68B78B70566CB92FA004A46ADE6D5EF7CA2B75E82E58EDA20800AB7
23,898,071 UART: [art] PUB.Y = 178E23C228803BA39C3FB68EACCEF781F9DEA06B8FBC3FD9C07C5552D2C1F9CD5B92C161A53AE2AEAA0C11F867FA7D7B
23,905,359 UART: [art] SIG.R = 43FB956733BFAD074267E63D2B6B0780C473D042E755E1F6735FB8CF448347FEEA21606F70B90F13705E9AEF2D0DDB9E
23,912,742 UART: [art] SIG.S = EAA0A3D153699A0D2C8B80DF5ABEFB4D6E88D013567D522DEB6F07BA0AFD50FC21165D167285D6A87C961FB7DE18570E
24,891,227 UART: mbox::rt_entry...
24,892,193 UART: ____ _ _ _ ____ _____
24,894,183 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,896,189 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,898,118 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,900,081 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,902,021 UART: |_|
24,903,024 UART:
25,014,953 UART: [rt] Runtime listening for mailbox commands...
25,017,126 >>> mbox cmd response data (0 bytes)
27,072,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,195,080 >>> mbox cmd response: success
34,229,794 UART:
34,230,128 UART: Running Caliptra FMC ...
34,231,260 UART:
34,231,433 UART: [state] CFI Enabled
34,326,855 UART: [art] Extend RT PCRs Done
34,328,039 UART: [art] Lock RT PCRs Done
34,329,336 UART: [art] Populate DV Done
34,334,913 UART: [fht] FMC Alias Private Key: 7
34,336,612 UART: [art] Derive CDI
34,337,430 UART: [art] Store in in slot 0x4
34,395,835 UART: [art] Derive Key Pair
34,396,886 UART: [art] Store priv key in slot 0x5
36,859,682 UART: [art] Derive Key Pair - Done
36,872,644 UART: [art] Signing Cert with AUTHO
36,873,953 UART: RITY.KEYID = 7
38,586,367 UART: [art] Erasing AUTHORITY.KEYID = 7
38,587,875 UART: [art] PUB.X = 37EFBA3C187B0FDA488EC040BB9E3683394F0EF3984C755887F85F0DE7B34E942BB7DFA754C175E6A6355F30DB33CF40
38,595,150 UART: [art] PUB.Y = 17CC5A27D33087B6C4F08498743BD94C228F9238FE2CB7A1A3BCFDB8D999C3FF67E1E63360C767CC8E5726EE0BD15B5A
38,602,440 UART: [art] SIG.R = 96BED66A1E66F61D2151DC7DE27BD1F048E6586B142AD8073932934E10CD966B206C1A1A096DF2E487DC161B0462321E
38,609,813 UART: [art] SIG.S = 4F61A714DB7B53F9ED605034C3726F214A0AE8533474620134D84A4E5869F06CD24E0CEAE49CCE32722BD6B0A5048210
39,588,376 UART: Caliptra RT
39,589,085 UART: [state] CFI Enabled
39,923,405 UART: [rt] RT failed reset flow
39,924,611 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,822 writing to cptra_bootfsm_go
204,216 UART:
204,579 UART: Running Caliptra ROM ...
205,768 UART:
615,235 UART: [state] CFI Enabled
629,892 UART: [state] LifecycleState = Unprovisioned
631,788 UART: [state] DebugLocked = No
633,603 UART: [state] WD Timer not started. Device not locked for debugging
637,278 UART: [kat] SHA2-256
816,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
827,930 UART: [kat] ++
828,459 UART: [kat] sha1
839,407 UART: [kat] SHA2-256
842,419 UART: [kat] SHA2-384
848,337 UART: [kat] SHA2-512-ACC
851,270 UART: [kat] ECC-384
3,295,685 UART: [kat] HMAC-384Kdf
3,308,872 UART: [kat] LMS
3,838,372 UART: [kat] --
3,843,657 UART: [cold-reset] ++
3,844,691 UART: [fht] FHT @ 0x50003400
3,855,308 UART: [idev] ++
3,855,889 UART: [idev] CDI.KEYID = 6
3,856,768 UART: [idev] SUBJECT.KEYID = 7
3,858,013 UART: [idev] UDS.KEYID = 0
3,858,914 ready_for_fw is high
3,859,112 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,957,822 UART: [idev] Erasing UDS.KEYID = 0
6,331,413 UART: [idev] Sha1 KeyId Algorithm
6,352,723 UART: [idev] --
6,356,763 UART: [ldev] ++
6,357,326 UART: [ldev] CDI.KEYID = 6
6,358,215 UART: [ldev] SUBJECT.KEYID = 5
6,359,425 UART: [ldev] AUTHORITY.KEYID = 7
6,360,662 UART: [ldev] FE.KEYID = 1
6,371,171 UART: [ldev] Erasing FE.KEYID = 1
8,842,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,149 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,607,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,143 UART: [ldev] --
10,633,566 UART: [fwproc] Wait for Commands...
10,635,072 UART: [fwproc] Recv command 0x46574c44
10,637,111 UART: [fwproc] Recv'd Img size: 78532 bytes
13,600,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,673,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,742,132 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,934,617 >>> mbox cmd response: success
13,935,131 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,938,461 UART: [afmc] ++
13,939,044 UART: [afmc] CDI.KEYID = 6
13,939,931 UART: [afmc] SUBJECT.KEYID = 7
13,941,038 UART: [afmc] AUTHORITY.KEYID = 5
16,436,358 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,155,064 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,156,926 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,172,687 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,188,741 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,204,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,226,754 UART: [afmc] --
18,231,050 UART: [cold-reset] --
18,233,777 UART: [state] Locking Datavault
18,238,106 UART: [state] Locking PCR0, PCR1 and PCR31
18,239,747 UART: [state] Locking ICCM
18,242,167 UART: [exit] Launching FMC @ 0x40000130
18,250,546 UART:
18,250,789 UART: Running Caliptra FMC ...
18,251,890 UART:
18,252,045 UART: [state] CFI Enabled
18,260,303 UART: [fht] FMC Alias Private Key: 7
20,017,363 UART: [art] Extend RT PCRs Done
20,018,590 UART: [art] Lock RT PCRs Done
20,020,324 UART: [art] Populate DV Done
20,025,904 UART: [fht] FMC Alias Private Key: 7
20,027,446 UART: [art] Derive CDI
20,028,264 UART: [art] Store in in slot 0x4
20,071,154 UART: [art] Derive Key Pair
20,072,238 UART: [art] Store priv key in slot 0x5
22,498,545 UART: [art] Derive Key Pair - Done
22,511,548 UART: [art] Signing Cert with AUTHO
22,512,854 UART: RITY.KEYID = 7
24,218,039 UART: [art] Erasing AUTHORITY.KEYID = 7
24,219,539 UART: [art] PUB.X = 798A4F729F5B2000BE01521153EB554DECF16272AEED30AD40A0363CDE89731B1ABA9B44598F9E4B55B05EFB47FE9F94
24,226,796 UART: [art] PUB.Y = FAB055B2885DE4BBC80C26F8674565FC327743EB160B21E71EFF809B620216616BE12A771965F2162162A871B67CA5CB
24,234,083 UART: [art] SIG.R = 28BA90130407D28B863465936C5B86765806EDBD550F59E712B8B5492572FDEB15F7EB9D690C1CDD83C5175FDF58BE20
24,241,439 UART: [art] SIG.S = 8310AFB57DBC9E91A36FDEBEC863E16644CB2CB3B912CB8F2DE7E92F9DB1AEB437CC27327440551FDCA93404727F614B
25,220,087 UART: mbox::rt_entry...
25,221,040 UART: ____ _ _ _ ____ _____
25,222,972 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,224,983 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,226,915 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,228,846 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,230,774 UART: |_|
25,231,659 UART:
25,343,821 UART: [rt] Runtime listening for mailbox commands...
25,345,980 >>> mbox cmd response data (0 bytes)
27,398,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,542,832 UART:
27,543,194 UART: Running Caliptra ROM ...
27,544,331 UART:
27,544,499 UART: [state] CFI Enabled
27,560,061 UART: [state] LifecycleState = Unprovisioned
27,561,906 UART: [state] DebugLocked = No
27,563,230 UART: [state] WD Timer not started. Device not locked for debugging
27,566,647 UART: [kat] SHA2-256
27,745,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,757,391 UART: [kat] ++
27,757,927 UART: [kat] sha1
27,768,536 UART: [kat] SHA2-256
27,771,588 UART: [kat] SHA2-384
27,778,075 UART: [kat] SHA2-512-ACC
27,780,989 UART: [kat] ECC-384
30,222,732 UART: [kat] HMAC-384Kdf
30,236,577 UART: [kat] LMS
30,766,084 UART: [kat] --
30,770,457 UART: [update-reset] ++
34,199,743 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,203,534 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,585,912 >>> mbox cmd response: success
34,590,641 UART: [update-reset] Copying MAN_2 To MAN_1
34,609,539 UART: [update-reset Success] --
34,615,089 UART: [state] Locking Datavault
34,617,322 UART: [state] Locking PCR0, PCR1 and PCR31
34,618,985 UART: [state] Locking ICCM
34,620,226 UART: [exit] Launching FMC @ 0x40000130
34,628,625 UART:
34,628,868 UART: Running Caliptra FMC ...
34,630,316 UART:
34,630,502 UART: [state] CFI Enabled
34,674,752 UART: [art] Extend RT PCRs Done
34,675,954 UART: [art] Lock RT PCRs Done
34,677,197 UART: [art] Populate DV Done
34,682,556 UART: [fht] FMC Alias Private Key: 7
34,684,201 UART: [art] Derive CDI
34,685,018 UART: [art] Store in in slot 0x4
34,727,098 UART: [art] Derive Key Pair
34,728,153 UART: [art] Store priv key in slot 0x5
37,155,462 UART: [art] Derive Key Pair - Done
37,168,300 UART: [art] Signing Cert with AUTHO
37,169,626 UART: RITY.KEYID = 7
38,874,577 UART: [art] Erasing AUTHORITY.KEYID = 7
38,876,086 UART: [art] PUB.X = 61F0F0C6FF48EA929BA5A97F518BF736B791B3C798423EBED352F71D3B0A190CBC1B1A84EA18FFD42C3F38CF5DCC2CA4
38,883,358 UART: [art] PUB.Y = 0C4361BBCEE7A50D23CA96A982F596762DF982E989C9CA3823E9AC542B247DCDCA3183C2C589D234782F94C31DBE8447
38,890,635 UART: [art] SIG.R = D220B2B8C946EE8B0F9623AE89A6595D28FE08167A1564002B514903427876A80A6015B00BEEB660EEB16CD5B1BEED06
38,897,982 UART: [art] SIG.S = 25F54CF2D7373711C5EFD7BC90EACC09ABC79CB0A3CAD319C00CFCA4AC897174CF0F373B083F95CE70C6B6EBF00265CC
39,876,600 UART: Caliptra RT
39,877,302 UART: [state] CFI Enabled
40,168,306 UART: [rt] RT failed reset flow
40,169,637 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,706 writing to cptra_bootfsm_go
3,700,624 ready_for_fw is high
3,701,002 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,715,910 >>> mbox cmd response: success
13,716,572 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
17,960,515 UART:
17,960,913 UART: Running Caliptra FMC ...
17,962,078 UART:
17,962,248 UART: [state] CFI Enabled
17,969,980 UART: [fht] FMC Alias Private Key: 7
19,727,302 UART: [art] Extend RT PCRs Done
19,728,530 UART: [art] Lock RT PCRs Done
19,730,392 UART: [art] Populate DV Done
19,735,969 UART: [fht] FMC Alias Private Key: 7
19,737,613 UART: [art] Derive CDI
19,738,351 UART: [art] Store in in slot 0x4
19,780,728 UART: [art] Derive Key Pair
19,781,767 UART: [art] Store priv key in slot 0x5
22,208,174 UART: [art] Derive Key Pair - Done
22,221,545 UART: [art] Signing Cert with AUTHO
22,222,852 UART: RITY.KEYID = 7
23,928,048 UART: [art] Erasing AUTHORITY.KEYID = 7
23,929,554 UART: [art] PUB.X = 869D1307DD10EFEA089397AF2F2AEDC937215A70A154039FB6FA2B371DBA675DC7ADD6F2189E5CF99C59A1F6E7BD656C
23,936,825 UART: [art] PUB.Y = 7D765F888392BB3209AAE82F325CA5E8403CE17B78BB701C1A2FAFA5B3045F3763AEAB780C074DC318E1C4DDF8E282BA
23,944,061 UART: [art] SIG.R = ADD5FECC17B875217AB6BF5307DFE9140687477788F144835269E89CD045BC816B331CDA81FDBE1C782658B434E101A8
23,951,463 UART: [art] SIG.S = A7EE92E6883AA6265F62310A5B3FAEEB25DB2B63F6399AAA699B86AB640AA3D8E39C8C29364B89E17C7E64A9F2D8FC62
24,929,327 UART: mbox::rt_entry...
24,930,281 UART: ____ _ _ _ ____ _____
24,932,207 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,934,207 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,936,060 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,938,019 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,939,877 UART: |_|
24,940,758 UART:
25,054,502 UART: [rt] Runtime listening for mailbox commands...
25,056,731 >>> mbox cmd response data (0 bytes)
27,107,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,159,130 >>> mbox cmd response: success
34,192,025 UART:
34,192,342 UART: Running Caliptra FMC ...
34,193,389 UART:
34,193,546 UART: [state] CFI Enabled
34,237,406 UART: [art] Extend RT PCRs Done
34,238,593 UART: [art] Lock RT PCRs Done
34,240,131 UART: [art] Populate DV Done
34,245,648 UART: [fht] FMC Alias Private Key: 7
34,247,294 UART: [art] Derive CDI
34,248,031 UART: [art] Store in in slot 0x4
34,290,574 UART: [art] Derive Key Pair
34,291,572 UART: [art] Store priv key in slot 0x5
36,718,572 UART: [art] Derive Key Pair - Done
36,731,487 UART: [art] Signing Cert with AUTHO
36,732,795 UART: RITY.KEYID = 7
38,438,130 UART: [art] Erasing AUTHORITY.KEYID = 7
38,439,638 UART: [art] PUB.X = CDA6418915A9DE154E1F60B1441B513BF951F9A96FCC87FAAFEA4BAB75C709B9C0A2244FE5E7EE7C640B3F88292CA065
38,446,939 UART: [art] PUB.Y = D0987959E79DF9A37BA4CCAB7CFBE375843CBF2255D2E373FD3167B52569A06B900F532257961CF8ECCF94D019AABF76
38,454,166 UART: [art] SIG.R = 41302151D3E5EAB3F2487288C68B6F180BCBA9FD43753CC827FDF9297EFBC2C1759EA827131AF1F980207A8883A36988
38,461,557 UART: [art] SIG.S = 5A42FF10075A101B396DFB7E73496C7AD522EA3C030112DCC03F3E4EB6FBA15B8EFD99DC09627FBCAD397916F1EF03FE
39,440,811 UART: Caliptra RT
39,441,496 UART: [state] CFI Enabled
39,725,208 UART: [rt] RT failed reset flow
39,726,404 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,027 UART:
192,391 UART: Running Caliptra ROM ...
193,578 UART:
193,735 UART: [state] CFI Enabled
263,536 UART: [state] LifecycleState = Unprovisioned
265,949 UART: [state] DebugLocked = No
268,337 UART: [state] WD Timer not started. Device not locked for debugging
272,101 UART: [kat] SHA2-256
461,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,513 UART: [kat] ++
473,160 UART: [kat] sha1
484,043 UART: [kat] SHA2-256
487,060 UART: [kat] SHA2-384
492,065 UART: [kat] SHA2-512-ACC
494,654 UART: [kat] ECC-384
2,948,059 UART: [kat] HMAC-384Kdf
2,972,089 UART: [kat] LMS
3,503,819 UART: [kat] --
3,508,191 UART: [cold-reset] ++
3,510,335 UART: [fht] FHT @ 0x50003400
3,522,607 UART: [idev] ++
3,523,319 UART: [idev] CDI.KEYID = 6
3,524,207 UART: [idev] SUBJECT.KEYID = 7
3,525,448 UART: [idev] UDS.KEYID = 0
3,526,375 ready_for_fw is high
3,526,575 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,625,469 UART: [idev] Erasing UDS.KEYID = 0
6,026,910 UART: [idev] Sha1 KeyId Algorithm
6,050,497 UART: [idev] --
6,053,984 UART: [ldev] ++
6,054,675 UART: [ldev] CDI.KEYID = 6
6,055,593 UART: [ldev] SUBJECT.KEYID = 5
6,056,755 UART: [ldev] AUTHORITY.KEYID = 7
6,057,990 UART: [ldev] FE.KEYID = 1
6,098,827 UART: [ldev] Erasing FE.KEYID = 1
8,601,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,596 UART: [ldev] --
10,411,644 UART: [fwproc] Wait for Commands...
10,413,684 UART: [fwproc] Recv command 0x46574c44
10,415,947 UART: [fwproc] Recv'd Img size: 78532 bytes
13,427,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,503,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,620,048 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,947,011 >>> mbox cmd response: success
13,947,529 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
13,950,734 UART: [afmc] ++
13,951,433 UART: [afmc] CDI.KEYID = 6
13,952,684 UART: [afmc] SUBJECT.KEYID = 7
13,954,147 UART: [afmc] AUTHORITY.KEYID = 5
16,492,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,233,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,235,566 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,250,701 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,265,842 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,280,862 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,303,353 UART: [afmc] --
18,307,342 UART: [cold-reset] --
18,312,130 UART: [state] Locking Datavault
18,318,357 UART: [state] Locking PCR0, PCR1 and PCR31
18,320,497 UART: [state] Locking ICCM
18,321,878 UART: [exit] Launching FMC @ 0x40000130
18,330,551 UART:
18,330,781 UART: Running Caliptra FMC ...
18,331,818 UART:
18,331,987 UART: [state] CFI Enabled
18,390,263 UART: [fht] FMC Alias Private Key: 7
20,154,697 UART: [art] Extend RT PCRs Done
20,155,917 UART: [art] Lock RT PCRs Done
20,157,412 UART: [art] Populate DV Done
20,162,720 UART: [fht] FMC Alias Private Key: 7
20,164,366 UART: [art] Derive CDI
20,165,180 UART: [art] Store in in slot 0x4
20,223,230 UART: [art] Derive Key Pair
20,224,263 UART: [art] Store priv key in slot 0x5
22,687,780 UART: [art] Derive Key Pair - Done
22,700,830 UART: [art] Signing Cert with AUTHO
22,702,126 UART: RITY.KEYID = 7
24,413,054 UART: [art] Erasing AUTHORITY.KEYID = 7
24,414,555 UART: [art] PUB.X = 02B4C6525DBD3378ECFA640C96506A030AE7DB61004797AFDFF8733B80AFEDDCF0F3C22B72B9B6DBD6B671E01619A846
24,421,818 UART: [art] PUB.Y = ED89D279DBC1668DFA6380B48CBF204A3179B7530C546E85059F941B68B0262CC385AB411E8AD68C5EC58A6C54C165CF
24,429,086 UART: [art] SIG.R = 4289E6C19694281AF2AB68CD29E13DFA44F1FDE610352FFB2F1802F8B6C9EFA17B43505BF52908FA06A9A74899AA334E
24,436,444 UART: [art] SIG.S = D0ED065DECEDE8101AF48F38B1056A874C8962910B85C22E944A885C5BD9787C6C3633C8FDC292C6C31B7DB5CF041982
25,414,950 UART: mbox::rt_entry...
25,415,901 UART: ____ _ _ _ ____ _____
25,417,827 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,419,840 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,421,772 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,423,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,425,637 UART: |_|
25,426,521 UART:
25,539,652 UART: [rt] Runtime listening for mailbox commands...
25,541,864 >>> mbox cmd response data (0 bytes)
27,599,463 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,743,937 UART:
27,744,301 UART: Running Caliptra ROM ...
27,745,437 UART:
27,745,604 UART: [state] CFI Enabled
27,820,047 UART: [state] LifecycleState = Unprovisioned
27,822,105 UART: [state] DebugLocked = No
27,823,818 UART: [state] WD Timer not started. Device not locked for debugging
27,828,474 UART: [kat] SHA2-256
28,018,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,029,118 UART: [kat] ++
28,029,659 UART: [kat] sha1
28,042,716 UART: [kat] SHA2-256
28,045,744 UART: [kat] SHA2-384
28,050,992 UART: [kat] SHA2-512-ACC
28,053,592 UART: [kat] ECC-384
30,505,610 UART: [kat] HMAC-384Kdf
30,527,626 UART: [kat] LMS
31,059,226 UART: [kat] --
31,063,217 UART: [update-reset] ++
34,524,364 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,526,763 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,133,362 >>> mbox cmd response: success
35,138,006 UART: [update-reset] Copying MAN_2 To MAN_1
35,171,272 UART: [update-reset Success] --
35,175,615 UART: [state] Locking Datavault
35,179,401 UART: [state] Locking PCR0, PCR1 and PCR31
35,181,569 UART: [state] Locking ICCM
35,184,435 UART: [exit] Launching FMC @ 0x40000130
35,193,075 UART:
35,193,317 UART: Running Caliptra FMC ...
35,194,564 UART:
35,194,735 UART: [state] CFI Enabled
35,293,601 UART: [art] Extend RT PCRs Done
35,294,798 UART: [art] Lock RT PCRs Done
35,296,311 UART: [art] Populate DV Done
35,301,667 UART: [fht] FMC Alias Private Key: 7
35,303,254 UART: [art] Derive CDI
35,304,069 UART: [art] Store in in slot 0x4
35,362,665 UART: [art] Derive Key Pair
35,363,713 UART: [art] Store priv key in slot 0x5
37,826,234 UART: [art] Derive Key Pair - Done
37,839,520 UART: [art] Signing Cert with AUTHO
37,840,821 UART: RITY.KEYID = 7
39,551,610 UART: [art] Erasing AUTHORITY.KEYID = 7
39,553,114 UART: [art] PUB.X = 6C648F476CBF97AC69A5FEAC9D39479A62C24DE5AA3A993E0ABC9249763F94151E766925642E3F59FE1AD245AB60864C
39,560,388 UART: [art] PUB.Y = C095A10F65F23664B9D870B42D5B404E1A0512F2F9848C941294AB1ADAB6759348CC11A1176051DC12E869617C085276
39,567,615 UART: [art] SIG.R = BE93B3BC4DA32365989661F1BAEAF6F17BE9D6E05EE15CAF076BDE4C8173B336D5A9ADBB0123B21B3D355E23819CE667
39,575,049 UART: [art] SIG.S = 214D34A1BDFB7549A398A56023FF894360786A13918941A7A3F8A9B818F1CE7CF07D7E638F941965791331904BDC8C43
40,553,433 UART: Caliptra RT
40,554,131 UART: [state] CFI Enabled
40,886,411 UART: [rt] RT failed reset flow
40,887,626 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,431,774 ready_for_fw is high
3,432,342 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,985,586 >>> mbox cmd response: success
13,986,210 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,268,479 UART:
18,268,871 UART: Running Caliptra FMC ...
18,269,972 UART:
18,270,126 UART: [state] CFI Enabled
18,339,839 UART: [fht] FMC Alias Private Key: 7
20,104,074 UART: [art] Extend RT PCRs Done
20,105,303 UART: [art] Lock RT PCRs Done
20,107,012 UART: [art] Populate DV Done
20,112,489 UART: [fht] FMC Alias Private Key: 7
20,114,082 UART: [art] Derive CDI
20,114,827 UART: [art] Store in in slot 0x4
20,172,013 UART: [art] Derive Key Pair
20,173,047 UART: [art] Store priv key in slot 0x5
22,636,109 UART: [art] Derive Key Pair - Done
22,649,064 UART: [art] Signing Cert with AUTHO
22,650,377 UART: RITY.KEYID = 7
24,361,118 UART: [art] Erasing AUTHORITY.KEYID = 7
24,362,604 UART: [art] PUB.X = D2B0DD997143E4C255246C7CEB6C8BF73A88FA57BD16CD37F406CED7EFDF87FC0EB18108187BB56ADE0C7BB73D821DC9
24,369,898 UART: [art] PUB.Y = FACCB022D801BD7D784143C9B0AAE7481826B03D89F110955FD69C2E7E842ADD7C0455B13ADBCBCBE775473ACC579C84
24,377,183 UART: [art] SIG.R = B1027F6830B43660445CBBC893331AFF46D37272E8B83A5C81D06B6441E41D563C118C56C3D55CFD2E946FBC35F9BE48
24,384,596 UART: [art] SIG.S = A64DFF05F7A9D26A08240BF90F0995B46CA884AC58090EF9AAD2104A60B62836C8C88AC48F94843FB5E832DDEBFB8DE6
25,362,920 UART: mbox::rt_entry...
25,363,900 UART: ____ _ _ _ ____ _____
25,365,892 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,367,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,369,832 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,371,788 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,373,719 UART: |_|
25,374,529 UART:
25,487,936 UART: [rt] Runtime listening for mailbox commands...
25,490,105 >>> mbox cmd response data (0 bytes)
27,544,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,352,495 >>> mbox cmd response: success
35,389,334 UART:
35,389,647 UART: Running Caliptra FMC ...
35,390,771 UART:
35,390,939 UART: [state] CFI Enabled
35,477,602 UART: [art] Extend RT PCRs Done
35,478,789 UART: [art] Lock RT PCRs Done
35,480,200 UART: [art] Populate DV Done
35,485,395 UART: [fht] FMC Alias Private Key: 7
35,486,990 UART: [art] Derive CDI
35,487,804 UART: [art] Store in in slot 0x4
35,547,055 UART: [art] Derive Key Pair
35,548,097 UART: [art] Store priv key in slot 0x5
38,010,353 UART: [art] Derive Key Pair - Done
38,023,250 UART: [art] Signing Cert with AUTHO
38,024,560 UART: RITY.KEYID = 7
39,736,285 UART: [art] Erasing AUTHORITY.KEYID = 7
39,737,794 UART: [art] PUB.X = 01008EE15573FDF38C8A4C1F0924BF752CEC669183AC7FC3A91EBA255045F478895DFF09075EC5947F49E765344E39FE
39,745,075 UART: [art] PUB.Y = A95FB5F87B2B7DED3F2D50AADB9EC1031B615C37C487F03B2EB0EA215E8BD5D92CAB5175D6C410C9901265C83202A2F7
39,752,336 UART: [art] SIG.R = 652FFC5C224DA8B60C4CEC98ABDD8251D06481C0D5498471253E340B034D14D60B42B87D2CCE06F68F69D8C8A295DB26
39,759,766 UART: [art] SIG.S = 0371AF656FA3814C50127CAECB3204A20870B6032484177A684512DB4590DC84E4179410055653E076E66A08A4261CE5
40,738,494 UART: Caliptra RT
40,739,195 UART: [state] CFI Enabled
41,073,523 UART: [rt] RT failed reset flow
41,074,755 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,771 writing to cptra_bootfsm_go
192,853 UART:
193,230 UART: Running Caliptra ROM ...
194,371 UART:
604,215 UART: [state] CFI Enabled
616,995 UART: [state] LifecycleState = Unprovisioned
619,327 UART: [state] DebugLocked = No
621,987 UART: [state] WD Timer not started. Device not locked for debugging
626,951 UART: [kat] SHA2-256
816,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,566 UART: [kat] ++
828,174 UART: [kat] sha1
839,199 UART: [kat] SHA2-256
842,205 UART: [kat] SHA2-384
846,986 UART: [kat] SHA2-512-ACC
849,636 UART: [kat] ECC-384
3,291,714 UART: [kat] HMAC-384Kdf
3,304,724 UART: [kat] LMS
3,836,516 UART: [kat] --
3,841,074 UART: [cold-reset] ++
3,842,655 UART: [fht] FHT @ 0x50003400
3,853,017 UART: [idev] ++
3,853,661 UART: [idev] CDI.KEYID = 6
3,854,615 UART: [idev] SUBJECT.KEYID = 7
3,855,857 UART: [idev] UDS.KEYID = 0
3,856,754 ready_for_fw is high
3,856,941 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,955,630 UART: [idev] Erasing UDS.KEYID = 0
6,331,018 UART: [idev] Sha1 KeyId Algorithm
6,353,651 UART: [idev] --
6,356,886 UART: [ldev] ++
6,357,567 UART: [ldev] CDI.KEYID = 6
6,358,447 UART: [ldev] SUBJECT.KEYID = 5
6,359,657 UART: [ldev] AUTHORITY.KEYID = 7
6,360,883 UART: [ldev] FE.KEYID = 1
6,371,853 UART: [ldev] Erasing FE.KEYID = 1
8,848,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,268 UART: [ldev] --
10,641,187 UART: [fwproc] Wait for Commands...
10,643,228 UART: [fwproc] Recv command 0x46574c44
10,645,534 UART: [fwproc] Recv'd Img size: 78532 bytes
13,648,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,733,797 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,849,947 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,177,003 >>> mbox cmd response: success
14,177,494 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
14,181,602 UART: [afmc] ++
14,182,304 UART: [afmc] CDI.KEYID = 6
14,183,409 UART: [afmc] SUBJECT.KEYID = 7
14,184,970 UART: [afmc] AUTHORITY.KEYID = 5
16,691,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,413,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,415,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,430,307 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,445,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,460,506 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,484,619 UART: [afmc] --
18,487,517 UART: [cold-reset] --
18,491,980 UART: [state] Locking Datavault
18,495,392 UART: [state] Locking PCR0, PCR1 and PCR31
18,497,584 UART: [state] Locking ICCM
18,500,091 UART: [exit] Launching FMC @ 0x40000130
18,508,762 UART:
18,508,997 UART: Running Caliptra FMC ...
18,510,022 UART:
18,510,190 UART: [state] CFI Enabled
18,518,266 UART: [fht] FMC Alias Private Key: 7
20,274,856 UART: [art] Extend RT PCRs Done
20,276,078 UART: [art] Lock RT PCRs Done
20,277,630 UART: [art] Populate DV Done
20,282,992 UART: [fht] FMC Alias Private Key: 7
20,284,699 UART: [art] Derive CDI
20,285,519 UART: [art] Store in in slot 0x4
20,328,173 UART: [art] Derive Key Pair
20,329,209 UART: [art] Store priv key in slot 0x5
22,756,308 UART: [art] Derive Key Pair - Done
22,769,419 UART: [art] Signing Cert with AUTHO
22,770,723 UART: RITY.KEYID = 7
24,476,232 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,716 UART: [art] PUB.X = 73E47E7BC9EB48BB83935949A899E907421F1FF12F3846B404F4C3CD0550EC8EFCA35A03C05E751089502FD7D0EB3272
24,485,056 UART: [art] PUB.Y = 5278FA95E7E8E92B49B02F5FD76C2EA5FDB970B558123FC1994C5011DF75E6D030CEA7A9C34CA6421473BFC862D96C90
24,492,313 UART: [art] SIG.R = EFEAE2AC1C7F6BB9DAE474007FA49DD4352048D60D14590C232C84426C959F09EA9343B46A19FC665203D4A4805E4030
24,499,660 UART: [art] SIG.S = EA4BE6CB0094F82E0D34BDC0D599030A5424E4FD32A023A025A33EEE95EFF54F74607F359CE743621189AF35D269F1EE
25,478,936 UART: mbox::rt_entry...
25,479,905 UART: ____ _ _ _ ____ _____
25,481,894 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,483,897 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,485,825 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,487,752 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,489,675 UART: |_|
25,490,482 UART:
25,603,086 UART: [rt] Runtime listening for mailbox commands...
25,605,306 >>> mbox cmd response data (0 bytes)
27,658,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,802,593 UART:
27,802,964 UART: Running Caliptra ROM ...
27,804,101 UART:
27,804,271 UART: [state] CFI Enabled
27,818,229 UART: [state] LifecycleState = Unprovisioned
27,820,161 UART: [state] DebugLocked = No
27,822,251 UART: [state] WD Timer not started. Device not locked for debugging
27,826,801 UART: [kat] SHA2-256
28,016,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,027,444 UART: [kat] ++
28,028,043 UART: [kat] sha1
28,039,648 UART: [kat] SHA2-256
28,042,685 UART: [kat] SHA2-384
28,049,350 UART: [kat] SHA2-512-ACC
28,051,928 UART: [kat] ECC-384
30,494,971 UART: [kat] HMAC-384Kdf
30,509,060 UART: [kat] LMS
31,040,635 UART: [kat] --
31,045,782 UART: [update-reset] ++
34,496,818 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,500,588 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,107,161 >>> mbox cmd response: success
35,111,762 UART: [update-reset] Copying MAN_2 To MAN_1
35,146,319 UART: [update-reset Success] --
35,152,414 UART: [state] Locking Datavault
35,155,915 UART: [state] Locking PCR0, PCR1 and PCR31
35,158,115 UART: [state] Locking ICCM
35,160,303 UART: [exit] Launching FMC @ 0x40000130
35,168,978 UART:
35,169,213 UART: Running Caliptra FMC ...
35,170,467 UART:
35,170,632 UART: [state] CFI Enabled
35,214,559 UART: [art] Extend RT PCRs Done
35,215,773 UART: [art] Lock RT PCRs Done
35,217,265 UART: [art] Populate DV Done
35,222,676 UART: [fht] FMC Alias Private Key: 7
35,224,266 UART: [art] Derive CDI
35,225,078 UART: [art] Store in in slot 0x4
35,267,502 UART: [art] Derive Key Pair
35,268,548 UART: [art] Store priv key in slot 0x5
37,694,753 UART: [art] Derive Key Pair - Done
37,707,828 UART: [art] Signing Cert with AUTHO
37,709,137 UART: RITY.KEYID = 7
39,414,696 UART: [art] Erasing AUTHORITY.KEYID = 7
39,416,199 UART: [art] PUB.X = 394450FE69F97EC1DD6EB7FC9532A820D2C06DC2D53ED4B6E9D3347C5F62AFFD7088ECF279E57A9EF05E823050B6A513
39,423,493 UART: [art] PUB.Y = CF58338061D83339B1157B3A1B2ADA9724E989595523FE4B6BD8BA1F235730EB4A8ED8BA7B99F85997E87E00C483F154
39,430,727 UART: [art] SIG.R = 241E372ADD2141CCC9332174308C9C49C5B0FE0A85DF73B9F65633E7389B393B9CE08032D3151EA64C05D34AE28743DE
39,438,116 UART: [art] SIG.S = 35AE7922F33C6AED12CFDC506EE7E1F6975BCCD898139F782AAE2C09C4560C3743EBD5D7CEA291B65476506043BD943F
40,416,859 UART: Caliptra RT
40,417,563 UART: [state] CFI Enabled
40,705,214 UART: [rt] RT failed reset flow
40,706,409 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
3,760,937 ready_for_fw is high
3,761,360 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,192,301 >>> mbox cmd response: success
14,193,026 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
18,446,009 UART:
18,446,417 UART: Running Caliptra FMC ...
18,447,625 UART:
18,447,803 UART: [state] CFI Enabled
18,455,751 UART: [fht] FMC Alias Private Key: 7
20,212,318 UART: [art] Extend RT PCRs Done
20,213,533 UART: [art] Lock RT PCRs Done
20,215,488 UART: [art] Populate DV Done
20,220,912 UART: [fht] FMC Alias Private Key: 7
20,222,670 UART: [art] Derive CDI
20,223,492 UART: [art] Store in in slot 0x4
20,265,647 UART: [art] Derive Key Pair
20,266,695 UART: [art] Store priv key in slot 0x5
22,693,303 UART: [art] Derive Key Pair - Done
22,706,738 UART: [art] Signing Cert with AUTHO
22,708,040 UART: RITY.KEYID = 7
24,413,707 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,196 UART: [art] PUB.X = BD1498768C77C309307B95BCAD1E550171E0A28B6FED873321C82FF64BEC4321AF5BF06E763A953F19AB36B9FBF44364
24,422,507 UART: [art] PUB.Y = C0D97572EC85BFF8BFEE55E0E2F2DFEF51D14E916E56E3651D4F2EBA1E50F0706131990CDB5507FAC0790A3FE324FFFF
24,429,798 UART: [art] SIG.R = 271D398D21CB59E51F6DEBBA9DAA920CA8F433154EB00EF283DDB3CEA33E0F92AD04DE87BD69CFE41E22AE18F415A077
24,437,188 UART: [art] SIG.S = E8C6C06975BD6C99A3FFA32EBFB1B04818225CA3EDB0618C823B644A38068778620F4935DA84FAAECE29447E59C0E232
25,415,499 UART: mbox::rt_entry...
25,416,473 UART: ____ _ _ _ ____ _____
25,418,409 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,420,419 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,422,274 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,424,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,426,120 UART: |_|
25,426,953 UART:
25,540,326 UART: [rt] Runtime listening for mailbox commands...
25,542,556 >>> mbox cmd response data (0 bytes)
27,595,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,324,388 >>> mbox cmd response: success
35,358,100 UART:
35,358,422 UART: Running Caliptra FMC ...
35,359,542 UART:
35,359,709 UART: [state] CFI Enabled
35,404,072 UART: [art] Extend RT PCRs Done
35,405,265 UART: [art] Lock RT PCRs Done
35,406,677 UART: [art] Populate DV Done
35,412,145 UART: [fht] FMC Alias Private Key: 7
35,413,843 UART: [art] Derive CDI
35,414,660 UART: [art] Store in in slot 0x4
35,457,215 UART: [art] Derive Key Pair
35,458,256 UART: [art] Store priv key in slot 0x5
37,885,331 UART: [art] Derive Key Pair - Done
37,897,869 UART: [art] Signing Cert with AUTHO
37,899,183 UART: RITY.KEYID = 7
39,604,354 UART: [art] Erasing AUTHORITY.KEYID = 7
39,605,862 UART: [art] PUB.X = 926786B81A8C2D2D085C2C283EFB5BACEC22C83E94242F856391053EFDD44A1AB01BD5D3649893527EE402490A2B28E8
39,613,111 UART: [art] PUB.Y = 516F8017D8DB0239FD4A0B637AE2FB7D69ECFF4DE4EF6B8630000B9B7B4B01196830044C04475ECEACCD213D5ABF47DB
39,620,387 UART: [art] SIG.R = 9D03D207578045BC7BACF07A21843EF8583DD15C2444CFD03933E888013F4B0758B55E2B6D0B771E88BBCEBC61001522
39,627,735 UART: [art] SIG.S = C836AB973095D5FCB6EBADAA41A9B51C164B6E138567B0726FAB95A2618749D2EF7DF55F71BC1F9591AF2736065B42A2
40,606,704 UART: Caliptra RT
40,607,410 UART: [state] CFI Enabled
40,891,729 UART: [rt] RT failed reset flow
40,892,922 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,797 UART: [kat] SHA2-256
881,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,843 UART: [kat] ++
885,995 UART: [kat] sha1
890,079 UART: [kat] SHA2-256
892,017 UART: [kat] SHA2-384
894,844 UART: [kat] SHA2-512-ACC
896,745 UART: [kat] ECC-384
902,200 UART: [kat] HMAC-384Kdf
906,862 UART: [kat] LMS
1,475,058 UART: [kat] --
1,475,955 UART: [cold-reset] ++
1,476,467 UART: [fht] Storing FHT @ 0x50003400
1,479,370 UART: [idev] ++
1,479,538 UART: [idev] CDI.KEYID = 6
1,479,898 UART: [idev] SUBJECT.KEYID = 7
1,480,322 UART: [idev] UDS.KEYID = 0
1,480,667 ready_for_fw is high
1,480,667 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,488,394 UART: [idev] Erasing UDS.KEYID = 0
1,504,338 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,896 UART: [idev] --
1,514,031 UART: [ldev] ++
1,514,199 UART: [ldev] CDI.KEYID = 6
1,514,562 UART: [ldev] SUBJECT.KEYID = 5
1,514,988 UART: [ldev] AUTHORITY.KEYID = 7
1,515,451 UART: [ldev] FE.KEYID = 1
1,520,635 UART: [ldev] Erasing FE.KEYID = 1
1,546,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,088 UART: [ldev] --
1,585,527 UART: [fwproc] Waiting for Commands...
1,586,394 UART: [fwproc] Received command 0x46574c44
1,587,185 UART: [fwproc] Received Image of size 78532 bytes
2,475,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,549 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,901 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,614,138 >>> mbox cmd response: success
2,614,138 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,615,260 UART: [afmc] ++
2,615,428 UART: [afmc] CDI.KEYID = 6
2,615,790 UART: [afmc] SUBJECT.KEYID = 7
2,616,215 UART: [afmc] AUTHORITY.KEYID = 5
2,651,500 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,644 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,372 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,257 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,947 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,650 UART: [afmc] --
2,694,578 UART: [cold-reset] --
2,695,446 UART: [state] Locking Datavault
2,696,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,401 UART: [state] Locking ICCM
2,698,057 UART: [exit] Launching FMC @ 0x40000130
2,703,386 UART:
2,703,402 UART: Running Caliptra FMC ...
2,703,810 UART:
2,703,864 UART: [state] CFI Enabled
2,714,281 UART: [fht] FMC Alias Private Key: 7
2,822,482 UART: [art] Extend RT PCRs Done
2,822,910 UART: [art] Lock RT PCRs Done
2,824,564 UART: [art] Populate DV Done
2,832,919 UART: [fht] FMC Alias Private Key: 7
2,833,985 UART: [art] Derive CDI
2,834,265 UART: [art] Store in in slot 0x4
2,919,922 UART: [art] Derive Key Pair
2,920,282 UART: [art] Store priv key in slot 0x5
2,933,914 UART: [art] Derive Key Pair - Done
2,948,773 UART: [art] Signing Cert with AUTHO
2,949,253 UART: RITY.KEYID = 7
2,964,535 UART: [art] Erasing AUTHORITY.KEYID = 7
2,965,300 UART: [art] PUB.X = 6D83AF14DF4B306383A2817B440BE289308A4EF8B6CEBD47A870E8E83320CB5D604DE038F01298BDAEB59DF69B33789F
2,972,077 UART: [art] PUB.Y = C19EAE794047B1ACF2BDCA161A6F442164CA5584581335BF3C168C6FDD69B289E9E5C951623ECA869A038608C8519C9F
2,979,027 UART: [art] SIG.R = DE1900561672072F9FA33CEF0C5BFCE0F972441637358E73C8D8A6C3730EA80707E4D4268210B44A9A2814C69B618BDC
2,985,760 UART: [art] SIG.S = 3280DFA8B9F129E4F0C6B10883DB0758DF69654205B7A5267FDA3F39BE28A761C576CAE507F60788A71664AEBB2E6589
3,009,136 UART: mbox::rt_entry...
3,009,508 UART: ____ _ _ _ ____ _____
3,010,292 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,092 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,860 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,628 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,396 UART: |_|
3,013,708 UART:
3,121,162 UART: [rt] Runtime listening for mailbox commands...
3,122,313 >>> mbox cmd response data (0 bytes)
3,122,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,122,429 UART:
3,122,445 UART: Running Caliptra ROM ...
3,122,853 UART:
3,122,907 UART: [state] CFI Enabled
3,125,703 UART: [state] LifecycleState = Unprovisioned
3,126,358 UART: [state] DebugLocked = No
3,126,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,128,407 UART: [kat] SHA2-256
3,922,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,926,453 UART: [kat] ++
3,926,605 UART: [kat] sha1
3,930,987 UART: [kat] SHA2-256
3,932,925 UART: [kat] SHA2-384
3,935,576 UART: [kat] SHA2-512-ACC
3,937,476 UART: [kat] ECC-384
3,943,465 UART: [kat] HMAC-384Kdf
3,948,085 UART: [kat] LMS
4,516,281 UART: [kat] --
4,517,120 UART: [update-reset] ++
5,850,232 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,851,272 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,000,902 >>> mbox cmd response: success
6,001,255 UART: [update-reset] Copying MAN_2 To MAN_1
6,009,269 UART: [update-reset Success] --
6,010,178 UART: [state] Locking Datavault
6,010,978 UART: [state] Locking PCR0, PCR1 and PCR31
6,011,582 UART: [state] Locking ICCM
6,012,024 UART: [exit] Launching FMC @ 0x40000130
6,017,353 UART:
6,017,369 UART: Running Caliptra FMC ...
6,017,777 UART:
6,017,831 UART: [state] CFI Enabled
6,106,840 UART: [art] Extend RT PCRs Done
6,107,268 UART: [art] Lock RT PCRs Done
6,108,511 UART: [art] Populate DV Done
6,116,524 UART: [fht] FMC Alias Private Key: 7
6,117,482 UART: [art] Derive CDI
6,117,762 UART: [art] Store in in slot 0x4
6,203,557 UART: [art] Derive Key Pair
6,203,917 UART: [art] Store priv key in slot 0x5
6,216,925 UART: [art] Derive Key Pair - Done
6,231,495 UART: [art] Signing Cert with AUTHO
6,231,975 UART: RITY.KEYID = 7
6,247,141 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,906 UART: [art] PUB.X = 7D5689621A27D2D71708D2F0A46C6354A41D1D62DC3F2C8B8F781BC9881639B745BE8BAF6C7C0B3443F19D8048A2E531
6,254,672 UART: [art] PUB.Y = 57AA988397EE6905BDF140B45936F1C08B7D7B1369D4D260129B455F75AAB9FE1C9378DEB4CA54E2D1F8FFC8BB1BED4A
6,261,637 UART: [art] SIG.R = 0C8171F7D4670E7CEEB6DFD5F16A916CEB58033D9B14FCE8B9AA790982483FAC1EB3B70BD073F9312086E57F4A7317E2
6,268,404 UART: [art] SIG.S = FD3B68EA4CD48FD70EBE19BF7E43FB2F8E977B024AD4B53BDF9FE48FD661BE2F4671B9F23E8EC66D59AB779CE29C15BB
6,291,741 UART: Caliptra RT
6,291,994 UART: [state] CFI Enabled
6,570,536 UART: [rt] RT failed reset flow
6,570,967 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,523 ready_for_fw is high
1,362,523 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,463,528 >>> mbox cmd response: success
2,463,528 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,525,294 UART:
2,525,310 UART: Running Caliptra FMC ...
2,525,718 UART:
2,525,772 UART: [state] CFI Enabled
2,536,291 UART: [fht] FMC Alias Private Key: 7
2,644,126 UART: [art] Extend RT PCRs Done
2,644,554 UART: [art] Lock RT PCRs Done
2,645,984 UART: [art] Populate DV Done
2,654,005 UART: [fht] FMC Alias Private Key: 7
2,655,053 UART: [art] Derive CDI
2,655,333 UART: [art] Store in in slot 0x4
2,740,800 UART: [art] Derive Key Pair
2,741,160 UART: [art] Store priv key in slot 0x5
2,754,626 UART: [art] Derive Key Pair - Done
2,769,445 UART: [art] Signing Cert with AUTHO
2,769,925 UART: RITY.KEYID = 7
2,785,045 UART: [art] Erasing AUTHORITY.KEYID = 7
2,785,810 UART: [art] PUB.X = 804206B19AE4B1CB96D1AA3FBD07CDFF0824C7BA520E17250562ED4B66C76D09537FA56F6FB372718E14B545C5D14FA8
2,792,572 UART: [art] PUB.Y = 2C43C89AED9F707083938B4723C671CC4031E5720C46C8A675DE9D3A257208820C869F7D5111C6AE9E0E587B00DDCF1E
2,799,490 UART: [art] SIG.R = 1E7EA6E0422ADC828A04F3B6E0B1688397E182796562AECFDB4016AA9CB3B3A69A4E427AE3A825AC0884C1A0D573D662
2,806,264 UART: [art] SIG.S = FB34DC9A72803A229C112B797798DCB27BFDDDB27419605EF78559A4DA13E99BA4D4BB64E501895EF0640A67F298E6ED
2,829,801 UART: mbox::rt_entry...
2,830,173 UART: ____ _ _ _ ____ _____
2,830,957 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,757 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,832,525 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,293 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,834,061 UART: |_|
2,834,373 UART:
2,941,297 UART: [rt] Runtime listening for mailbox commands...
2,942,448 >>> mbox cmd response data (0 bytes)
2,942,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,702,117 >>> mbox cmd response: success
5,715,436 UART:
5,715,452 UART: Running Caliptra FMC ...
5,715,860 UART:
5,715,914 UART: [state] CFI Enabled
5,804,423 UART: [art] Extend RT PCRs Done
5,804,851 UART: [art] Lock RT PCRs Done
5,806,224 UART: [art] Populate DV Done
5,814,299 UART: [fht] FMC Alias Private Key: 7
5,815,405 UART: [art] Derive CDI
5,815,685 UART: [art] Store in in slot 0x4
5,901,270 UART: [art] Derive Key Pair
5,901,630 UART: [art] Store priv key in slot 0x5
5,914,850 UART: [art] Derive Key Pair - Done
5,929,529 UART: [art] Signing Cert with AUTHO
5,930,009 UART: RITY.KEYID = 7
5,945,165 UART: [art] Erasing AUTHORITY.KEYID = 7
5,945,930 UART: [art] PUB.X = 22B28B3252BC1139E3995FC0A7656B18F75656078D3B1FBD78D6795ADDCB05170CC2963B2C9836E2A34E115C0C1BF217
5,952,690 UART: [art] PUB.Y = 13CAF44FA93F7D26768885E048CF2717C2795B449C8432E0BEC1CB5D49E384C4E2D5F46C707FA70837E0829718124E29
5,959,635 UART: [art] SIG.R = 51F823769586C449C9ADEB7E02027709E7CED1EFBD41FDB490B6497A1F45B4CFC6F3F451B76C9CB5F020E88FA7E64764
5,966,408 UART: [art] SIG.S = D3287FB38D075B97F47104256E058B048C9D0B60F107BA38C77CC73ACF30251A59E64E99D2AC55FB42B6633A121D14FF
5,989,273 UART: Caliptra RT
5,989,526 UART: [state] CFI Enabled
6,266,098 UART: [rt] RT failed reset flow
6,266,529 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,834 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
891,032 UART: [kat] SHA2-256
892,970 UART: [kat] SHA2-384
895,693 UART: [kat] SHA2-512-ACC
897,594 UART: [kat] ECC-384
903,551 UART: [kat] HMAC-384Kdf
908,329 UART: [kat] LMS
1,476,525 UART: [kat] --
1,477,058 UART: [cold-reset] ++
1,477,638 UART: [fht] Storing FHT @ 0x50003400
1,480,235 UART: [idev] ++
1,480,403 UART: [idev] CDI.KEYID = 6
1,480,763 UART: [idev] SUBJECT.KEYID = 7
1,481,187 UART: [idev] UDS.KEYID = 0
1,481,532 ready_for_fw is high
1,481,532 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,489,029 UART: [idev] Erasing UDS.KEYID = 0
1,505,523 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,087 UART: [idev] --
1,515,090 UART: [ldev] ++
1,515,258 UART: [ldev] CDI.KEYID = 6
1,515,621 UART: [ldev] SUBJECT.KEYID = 5
1,516,047 UART: [ldev] AUTHORITY.KEYID = 7
1,516,510 UART: [ldev] FE.KEYID = 1
1,521,834 UART: [ldev] Erasing FE.KEYID = 1
1,547,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,683 UART: [ldev] --
1,586,972 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 78532 bytes
2,475,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,646 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,614,245 >>> mbox cmd response: success
2,614,245 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,615,459 UART: [afmc] ++
2,615,627 UART: [afmc] CDI.KEYID = 6
2,615,989 UART: [afmc] SUBJECT.KEYID = 7
2,616,414 UART: [afmc] AUTHORITY.KEYID = 5
2,652,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,013 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,898 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,588 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,585 UART: [afmc] --
2,695,587 UART: [cold-reset] --
2,696,555 UART: [state] Locking Datavault
2,697,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,356 UART: [state] Locking ICCM
2,698,810 UART: [exit] Launching FMC @ 0x40000130
2,704,139 UART:
2,704,155 UART: Running Caliptra FMC ...
2,704,563 UART:
2,704,706 UART: [state] CFI Enabled
2,715,159 UART: [fht] FMC Alias Private Key: 7
2,822,940 UART: [art] Extend RT PCRs Done
2,823,368 UART: [art] Lock RT PCRs Done
2,824,800 UART: [art] Populate DV Done
2,833,021 UART: [fht] FMC Alias Private Key: 7
2,833,987 UART: [art] Derive CDI
2,834,267 UART: [art] Store in in slot 0x4
2,919,892 UART: [art] Derive Key Pair
2,920,252 UART: [art] Store priv key in slot 0x5
2,933,630 UART: [art] Derive Key Pair - Done
2,948,039 UART: [art] Signing Cert with AUTHO
2,948,519 UART: RITY.KEYID = 7
2,963,439 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,204 UART: [art] PUB.X = F0B8CCCECAB39B629AEB72B79F7C7505EC5D9D4E847635D23F3862E60BD319D48C29F102FDAD093BCFDAD00D9C813BEC
2,970,985 UART: [art] PUB.Y = 3026F2DFB1433FA2E42177ACF05743611326A5FF2456C33D41A2CA7719C8B7CEBB0B714A088C6B05CAB68EDED6592CB7
2,977,938 UART: [art] SIG.R = A7776A4286A21527BC42445FD2B160BEDC4CDA0F6E7DF63A20EB8450353C667B78E2789504A2709C0D360B7E81F5CC9C
2,984,702 UART: [art] SIG.S = 7E4183C210CE9793FA48ADF4D1D4BE8A792640C7BD596EDD1F5F622D0376BBBF0000B5F4F5935A4E1BE016AF8CA79263
3,008,134 UART: mbox::rt_entry...
3,008,506 UART: ____ _ _ _ ____ _____
3,009,290 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,090 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,858 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,394 UART: |_|
3,012,706 UART:
3,120,082 UART: [rt] Runtime listening for mailbox commands...
3,121,233 >>> mbox cmd response data (0 bytes)
3,121,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,121,349 UART:
3,121,365 UART: Running Caliptra ROM ...
3,121,773 UART:
3,121,914 UART: [state] CFI Enabled
3,124,674 UART: [state] LifecycleState = Unprovisioned
3,125,329 UART: [state] DebugLocked = No
3,125,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,127,528 UART: [kat] SHA2-256
3,921,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,925,574 UART: [kat] ++
3,925,726 UART: [kat] sha1
3,929,862 UART: [kat] SHA2-256
3,931,800 UART: [kat] SHA2-384
3,934,561 UART: [kat] SHA2-512-ACC
3,936,461 UART: [kat] ECC-384
3,942,230 UART: [kat] HMAC-384Kdf
3,947,024 UART: [kat] LMS
4,515,220 UART: [kat] --
4,516,177 UART: [update-reset] ++
5,848,821 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,849,875 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
5,999,505 >>> mbox cmd response: success
5,999,716 UART: [update-reset] Copying MAN_2 To MAN_1
6,007,730 UART: [update-reset Success] --
6,008,777 UART: [state] Locking Datavault
6,009,415 UART: [state] Locking PCR0, PCR1 and PCR31
6,010,019 UART: [state] Locking ICCM
6,010,483 UART: [exit] Launching FMC @ 0x40000130
6,015,812 UART:
6,015,828 UART: Running Caliptra FMC ...
6,016,236 UART:
6,016,379 UART: [state] CFI Enabled
6,105,512 UART: [art] Extend RT PCRs Done
6,105,940 UART: [art] Lock RT PCRs Done
6,107,165 UART: [art] Populate DV Done
6,115,474 UART: [fht] FMC Alias Private Key: 7
6,116,450 UART: [art] Derive CDI
6,116,730 UART: [art] Store in in slot 0x4
6,202,557 UART: [art] Derive Key Pair
6,202,917 UART: [art] Store priv key in slot 0x5
6,216,517 UART: [art] Derive Key Pair - Done
6,231,336 UART: [art] Signing Cert with AUTHO
6,231,816 UART: RITY.KEYID = 7
6,246,988 UART: [art] Erasing AUTHORITY.KEYID = 7
6,247,753 UART: [art] PUB.X = 65A635C79DBA904F2455AE3DC6D02342F752B1B70E4DADB10FA45B445E545FBB5F9D350266BA32D88C8267E88D277B30
6,254,522 UART: [art] PUB.Y = 88DDBCFF2286D5103AAFC9CE131AAEA8490BB75106AD1B4BC1EB332587DF0B1A4BA4D6CF1C549B6B02631CCDAEDB901E
6,261,490 UART: [art] SIG.R = 1810A0E86FC3D23D4EED6721849EF37C5B4C142D87F4B162A942D0B2F9E44D362EA2039E14B618D6A99EA40987BDA86C
6,268,262 UART: [art] SIG.S = 1BD0051D36778796E555C90BE60AB4A1BBC1F992F399F0FEA3E0E4D1C8C0FBAFDB1C18965DF018850079DF026C6E4321
6,291,651 UART: Caliptra RT
6,291,996 UART: [state] CFI Enabled
6,568,355 UART: [rt] RT failed reset flow
6,568,786 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,280 ready_for_fw is high
1,362,280 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,463,167 >>> mbox cmd response: success
2,463,167 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,525,471 UART:
2,525,487 UART: Running Caliptra FMC ...
2,525,895 UART:
2,526,038 UART: [state] CFI Enabled
2,536,857 UART: [fht] FMC Alias Private Key: 7
2,644,710 UART: [art] Extend RT PCRs Done
2,645,138 UART: [art] Lock RT PCRs Done
2,646,794 UART: [art] Populate DV Done
2,655,089 UART: [fht] FMC Alias Private Key: 7
2,656,259 UART: [art] Derive CDI
2,656,539 UART: [art] Store in in slot 0x4
2,741,866 UART: [art] Derive Key Pair
2,742,226 UART: [art] Store priv key in slot 0x5
2,755,620 UART: [art] Derive Key Pair - Done
2,770,288 UART: [art] Signing Cert with AUTHO
2,770,768 UART: RITY.KEYID = 7
2,786,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,937 UART: [art] PUB.X = 57678CFED3E345D4DEB310C7087A9B8CAA844DDE2657C64B94B85EB07A6D589E9E32ED1F25527C52575C32E1F6A19CAF
2,793,718 UART: [art] PUB.Y = C1CA84EBB2823BCCBB14035F5B90DC581533C331BAD113C155770A5DA1F9DE3DA66BAE4D54A3C9FA995B579BE30E92AD
2,800,681 UART: [art] SIG.R = 9B816910FC0D8F85EE47AF6685FC0D7D71C252F11A245881C96798CB0150CDFBA6366B279361664EB6384F8F85FE76F2
2,807,444 UART: [art] SIG.S = 1863536D6C6FDD2BC1DB2868D5009F69A781E0E78063B305668D5E0DD96F8BC17CC47C3C58573A30BAC8E730277606D2
2,831,376 UART: mbox::rt_entry...
2,831,748 UART: ____ _ _ _ ____ _____
2,832,532 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,332 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,834,100 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,868 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,636 UART: |_|
2,835,948 UART:
2,942,176 UART: [rt] Runtime listening for mailbox commands...
2,943,327 >>> mbox cmd response data (0 bytes)
2,943,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,702,415 >>> mbox cmd response: success
5,716,122 UART:
5,716,138 UART: Running Caliptra FMC ...
5,716,546 UART:
5,716,689 UART: [state] CFI Enabled
5,805,442 UART: [art] Extend RT PCRs Done
5,805,870 UART: [art] Lock RT PCRs Done
5,807,139 UART: [art] Populate DV Done
5,815,680 UART: [fht] FMC Alias Private Key: 7
5,816,698 UART: [art] Derive CDI
5,816,978 UART: [art] Store in in slot 0x4
5,902,425 UART: [art] Derive Key Pair
5,902,785 UART: [art] Store priv key in slot 0x5
5,915,823 UART: [art] Derive Key Pair - Done
5,930,593 UART: [art] Signing Cert with AUTHO
5,931,073 UART: RITY.KEYID = 7
5,946,467 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,232 UART: [art] PUB.X = F2C8FE1D617A823263833844FB197112FC67FAB30B7540ACE79D21C03846BDF4621F2DF94CF9198FCD6124A66403026E
5,953,995 UART: [art] PUB.Y = 37261699EE9FB55F669891DD426D1F59BCAB7E20D675F6C698A18985E7D7483B61F7655B4A30EBF0342A190621EFDDCE
5,960,948 UART: [art] SIG.R = A2F1DA986F2319AF0B15DDF6DB8D0A98E18CF4766CFC6A63614021593D6C0A5F1EA7B026EFB82D65C21C92DB21EB064A
5,967,724 UART: [art] SIG.S = 34F08D4D1CF16C1AC81621ACFE650CB34C630D2C06FE1D8083C407BD9BFAEDC7F6472E9845953954E55BB8258A3D55B5
5,990,975 UART: Caliptra RT
5,991,320 UART: [state] CFI Enabled
6,269,916 UART: [rt] RT failed reset flow
6,270,347 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
893,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,507 UART: [kat] ++
897,659 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,552 UART: [kat] SHA2-512-ACC
908,453 UART: [kat] ECC-384
918,326 UART: [kat] HMAC-384Kdf
923,084 UART: [kat] LMS
1,171,412 UART: [kat] --
1,172,227 UART: [cold-reset] ++
1,172,769 UART: [fht] FHT @ 0x50003400
1,175,632 UART: [idev] ++
1,175,800 UART: [idev] CDI.KEYID = 6
1,176,160 UART: [idev] SUBJECT.KEYID = 7
1,176,584 UART: [idev] UDS.KEYID = 0
1,176,929 ready_for_fw is high
1,176,929 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,742 UART: [idev] Erasing UDS.KEYID = 0
1,201,977 UART: [idev] Sha1 KeyId Algorithm
1,210,597 UART: [idev] --
1,211,589 UART: [ldev] ++
1,211,757 UART: [ldev] CDI.KEYID = 6
1,212,120 UART: [ldev] SUBJECT.KEYID = 5
1,212,546 UART: [ldev] AUTHORITY.KEYID = 7
1,213,009 UART: [ldev] FE.KEYID = 1
1,217,881 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,531 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,430 UART: [fwproc] Recv'd Img size: 78532 bytes
2,170,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,690 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,994 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,309,125 >>> mbox cmd response: success
2,309,125 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,310,249 UART: [afmc] ++
2,310,417 UART: [afmc] CDI.KEYID = 6
2,310,779 UART: [afmc] SUBJECT.KEYID = 7
2,311,204 UART: [afmc] AUTHORITY.KEYID = 5
2,346,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,336 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,064 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,949 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,668 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,558 UART: [afmc] --
2,390,552 UART: [cold-reset] --
2,391,578 UART: [state] Locking Datavault
2,392,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,341 UART: [state] Locking ICCM
2,393,803 UART: [exit] Launching FMC @ 0x40000130
2,399,132 UART:
2,399,148 UART: Running Caliptra FMC ...
2,399,556 UART:
2,399,610 UART: [state] CFI Enabled
2,410,335 UART: [fht] FMC Alias Private Key: 7
2,518,466 UART: [art] Extend RT PCRs Done
2,518,894 UART: [art] Lock RT PCRs Done
2,520,508 UART: [art] Populate DV Done
2,528,783 UART: [fht] FMC Alias Private Key: 7
2,529,927 UART: [art] Derive CDI
2,530,207 UART: [art] Store in in slot 0x4
2,615,734 UART: [art] Derive Key Pair
2,616,094 UART: [art] Store priv key in slot 0x5
2,629,538 UART: [art] Derive Key Pair - Done
2,644,467 UART: [art] Signing Cert with AUTHO
2,644,947 UART: RITY.KEYID = 7
2,660,385 UART: [art] Erasing AUTHORITY.KEYID = 7
2,661,150 UART: [art] PUB.X = 389CCD41181F3F23426BA4330A48483A6CFC2C45AC730718BD4F9AD747E82E52DEDC7250BA5F3307D5173A59CF845C25
2,667,917 UART: [art] PUB.Y = 75EED6CF41179F5FC747BC18589DF613CFA98F839C47427682CFE714060042D83CB516EEC67317434CD7DD6F571EC91C
2,674,848 UART: [art] SIG.R = 2C5CDFFFD5D4AFAE2EE614E5E9CED71E6290A3BF1AC063191FD12E381C048707BEE5F376BC02EEED832ECF32E984C708
2,681,632 UART: [art] SIG.S = 882B9F503442AC0B4660DC147E07127E12EA3CE6FD22162A82FF9B415E509D55228F23EFEE155FDC396C694D95DFB926
2,705,629 UART: mbox::rt_entry...
2,706,001 UART: ____ _ _ _ ____ _____
2,706,785 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,353 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,889 UART: |_|
2,710,201 UART:
2,817,087 UART: [rt] Runtime listening for mailbox commands...
2,818,238 >>> mbox cmd response data (0 bytes)
2,818,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,818,351 UART:
2,818,367 UART: Running Caliptra ROM ...
2,818,775 UART:
2,818,830 UART: [state] CFI Enabled
2,821,804 UART: [state] LifecycleState = Unprovisioned
2,822,459 UART: [state] DebugLocked = No
2,823,131 UART: [state] WD Timer not started. Device not locked for debugging
2,824,411 UART: [kat] SHA2-256
3,630,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,634,186 UART: [kat] ++
3,634,338 UART: [kat] sha1
3,638,468 UART: [kat] SHA2-256
3,640,408 UART: [kat] SHA2-384
3,642,915 UART: [kat] SHA2-512-ACC
3,644,815 UART: [kat] ECC-384
3,654,812 UART: [kat] HMAC-384Kdf
3,659,566 UART: [kat] LMS
3,907,894 UART: [kat] --
3,908,666 UART: [update-reset] ++
5,219,504 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,220,517 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,370,095 >>> mbox cmd response: success
5,370,368 UART: [update-reset] Copying MAN_2 To MAN_1
5,378,382 UART: [update-reset Success] --
5,379,365 UART: [state] Locking Datavault
5,380,217 UART: [state] Locking PCR0, PCR1 and PCR31
5,380,821 UART: [state] Locking ICCM
5,381,379 UART: [exit] Launching FMC @ 0x40000130
5,386,708 UART:
5,386,724 UART: Running Caliptra FMC ...
5,387,132 UART:
5,387,186 UART: [state] CFI Enabled
5,475,829 UART: [art] Extend RT PCRs Done
5,476,257 UART: [art] Lock RT PCRs Done
5,477,460 UART: [art] Populate DV Done
5,485,515 UART: [fht] FMC Alias Private Key: 7
5,486,519 UART: [art] Derive CDI
5,486,799 UART: [art] Store in in slot 0x4
5,572,652 UART: [art] Derive Key Pair
5,573,012 UART: [art] Store priv key in slot 0x5
5,586,128 UART: [art] Derive Key Pair - Done
5,601,065 UART: [art] Signing Cert with AUTHO
5,601,545 UART: RITY.KEYID = 7
5,617,003 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,768 UART: [art] PUB.X = A7E35C752B7CDB9FA1F521213DC68E732F7C05F6B58ABA3ADA878CB4B85D370C9BB296CD431E1FB0B5AEA6419780151E
5,624,550 UART: [art] PUB.Y = 72D34E29D2AFF69A157952C288E5AC4DEE4B71B3B613BE7B7CC2EBCB48250AE8FAE9E9F413133EE3328F69D494617DEB
5,631,515 UART: [art] SIG.R = 39063B3281475CEA6E3A38C41EBE3E18D78D625CD3CC28040390D3DA1AC7B81D645D4C7A7A839B6AD7818B57A2251328
5,638,280 UART: [art] SIG.S = 32018E39B2965CDB70BCE6B31389C736FA3F26C450E4294B5448137F75884B9FCE5682E35F0FE67A662E80530E537FD8
5,661,874 UART: Caliptra RT
5,662,127 UART: [state] CFI Enabled
5,939,785 UART: [rt] RT failed reset flow
5,940,216 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,115 ready_for_fw is high
1,061,115 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,162,826 >>> mbox cmd response: success
2,162,826 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,224,862 UART:
2,224,878 UART: Running Caliptra FMC ...
2,225,286 UART:
2,225,340 UART: [state] CFI Enabled
2,235,307 UART: [fht] FMC Alias Private Key: 7
2,342,870 UART: [art] Extend RT PCRs Done
2,343,298 UART: [art] Lock RT PCRs Done
2,344,806 UART: [art] Populate DV Done
2,353,145 UART: [fht] FMC Alias Private Key: 7
2,354,115 UART: [art] Derive CDI
2,354,395 UART: [art] Store in in slot 0x4
2,439,852 UART: [art] Derive Key Pair
2,440,212 UART: [art] Store priv key in slot 0x5
2,453,548 UART: [art] Derive Key Pair - Done
2,468,150 UART: [art] Signing Cert with AUTHO
2,468,630 UART: RITY.KEYID = 7
2,483,784 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,549 UART: [art] PUB.X = 5AE95160B9DE366CE1902DE4BD5F980E718C1700BDBCEA19BF76C17CBF709CF34DB6F653571FBF3BBC599ED0D159FF3B
2,491,318 UART: [art] PUB.Y = 9D0CF12F2018E7E706ED82C55B1B480F886D5E3BA24BB00A0C528308BD2AAA5D4542A0699B1CF7306E36B8330C649D95
2,498,253 UART: [art] SIG.R = 4CC030845ED8CC822E34303F4C8F028B16D6A6FAD85D683023568DFCD7267CBA53243F1498D98EA4F82A1CACD94002D2
2,505,025 UART: [art] SIG.S = DF4FF21984991C15404989C1D4C3C05C3A657B6B1EB9609D31F44216448D9E714E064D44E78FCEA449D8C9B03CFFCB36
2,528,283 UART: mbox::rt_entry...
2,528,655 UART: ____ _ _ _ ____ _____
2,529,439 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,239 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,007 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,775 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,543 UART: |_|
2,532,855 UART:
2,640,525 UART: [rt] Runtime listening for mailbox commands...
2,641,676 >>> mbox cmd response data (0 bytes)
2,641,677 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,076,778 >>> mbox cmd response: success
5,089,956 UART:
5,089,972 UART: Running Caliptra FMC ...
5,090,380 UART:
5,090,434 UART: [state] CFI Enabled
5,179,841 UART: [art] Extend RT PCRs Done
5,180,269 UART: [art] Lock RT PCRs Done
5,181,770 UART: [art] Populate DV Done
5,189,983 UART: [fht] FMC Alias Private Key: 7
5,191,053 UART: [art] Derive CDI
5,191,333 UART: [art] Store in in slot 0x4
5,276,558 UART: [art] Derive Key Pair
5,276,918 UART: [art] Store priv key in slot 0x5
5,289,804 UART: [art] Derive Key Pair - Done
5,304,463 UART: [art] Signing Cert with AUTHO
5,304,943 UART: RITY.KEYID = 7
5,320,631 UART: [art] Erasing AUTHORITY.KEYID = 7
5,321,396 UART: [art] PUB.X = 996412173684348F2BF400291C407B4DAB201AE4CF2533F7161F4EEBEB8A166D020616E4EF3EC9AAE87408F2C263DC57
5,328,139 UART: [art] PUB.Y = 49E7FD2454D47CDEA9F142F8EC0C9735A124F38D56338553835655CF835866ADD2D9CC74BDF9B908A80E4CB51095468F
5,335,084 UART: [art] SIG.R = 7D65D29B85399826F69A1163E995B083B9E996BC0BD0509FF6ACBFF981BC5D81FCF8889462EF7BF9F2E7CC8723F19A6C
5,341,863 UART: [art] SIG.S = AD242959B60821171846E461A557275D96F0559FE3B65E96DAE49A28080789109B2E68CCB205217572F42B9F51FF4BFC
5,365,422 UART: Caliptra RT
5,365,675 UART: [state] CFI Enabled
5,648,205 UART: [rt] RT failed reset flow
5,648,636 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
893,369 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,494 UART: [kat] ++
897,646 UART: [kat] sha1
902,056 UART: [kat] SHA2-256
903,996 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
923,057 UART: [kat] LMS
1,171,385 UART: [kat] --
1,172,214 UART: [cold-reset] ++
1,172,700 UART: [fht] FHT @ 0x50003400
1,175,335 UART: [idev] ++
1,175,503 UART: [idev] CDI.KEYID = 6
1,175,863 UART: [idev] SUBJECT.KEYID = 7
1,176,287 UART: [idev] UDS.KEYID = 0
1,176,632 ready_for_fw is high
1,176,632 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,021 UART: [idev] Erasing UDS.KEYID = 0
1,200,924 UART: [idev] Sha1 KeyId Algorithm
1,209,524 UART: [idev] --
1,210,620 UART: [ldev] ++
1,210,788 UART: [ldev] CDI.KEYID = 6
1,211,151 UART: [ldev] SUBJECT.KEYID = 5
1,211,577 UART: [ldev] AUTHORITY.KEYID = 7
1,212,040 UART: [ldev] FE.KEYID = 1
1,217,426 UART: [ldev] Erasing FE.KEYID = 1
1,244,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,780 UART: [ldev] --
1,284,173 UART: [fwproc] Wait for Commands...
1,284,781 UART: [fwproc] Recv command 0x46574c44
1,285,509 UART: [fwproc] Recv'd Img size: 78532 bytes
2,173,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,201,065 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,369 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,312,564 >>> mbox cmd response: success
2,312,564 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,313,666 UART: [afmc] ++
2,313,834 UART: [afmc] CDI.KEYID = 6
2,314,196 UART: [afmc] SUBJECT.KEYID = 7
2,314,621 UART: [afmc] AUTHORITY.KEYID = 5
2,350,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,367,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,367,865 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,373,593 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,379,478 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,385,197 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,392,863 UART: [afmc] --
2,393,765 UART: [cold-reset] --
2,394,419 UART: [state] Locking Datavault
2,395,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,396,322 UART: [state] Locking ICCM
2,396,898 UART: [exit] Launching FMC @ 0x40000130
2,402,227 UART:
2,402,243 UART: Running Caliptra FMC ...
2,402,651 UART:
2,402,794 UART: [state] CFI Enabled
2,413,445 UART: [fht] FMC Alias Private Key: 7
2,521,266 UART: [art] Extend RT PCRs Done
2,521,694 UART: [art] Lock RT PCRs Done
2,523,274 UART: [art] Populate DV Done
2,531,481 UART: [fht] FMC Alias Private Key: 7
2,532,457 UART: [art] Derive CDI
2,532,737 UART: [art] Store in in slot 0x4
2,618,498 UART: [art] Derive Key Pair
2,618,858 UART: [art] Store priv key in slot 0x5
2,631,992 UART: [art] Derive Key Pair - Done
2,646,845 UART: [art] Signing Cert with AUTHO
2,647,325 UART: RITY.KEYID = 7
2,662,489 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,254 UART: [art] PUB.X = E7DF3B12F609C4E93EF13D240BBB5448F13B1A8F8EA90DADB874445E8FEEBA147970E75D3F9E33909A3AF98FCCF59DF9
2,670,037 UART: [art] PUB.Y = 740DF1FE21FDA416642B41C385D76D0B21726DE9F80C9B82D2B3AB19187408D8DD9889A8EF5F0D59770F26494BC9A6E9
2,676,975 UART: [art] SIG.R = FA9806743508273FD4DEA458E97F1754E0F22E2126D25BE4BBA55E2B1B8777F13F7EDB025F137A1A5F811F6EDF2A677E
2,683,746 UART: [art] SIG.S = 8C5449D640DDB25BB8685A3C8671347A8FB40505EF234AE4E04A08B7360FD43717511573D86F0D6B360F35FE2BD43F2B
2,707,563 UART: mbox::rt_entry...
2,707,935 UART: ____ _ _ _ ____ _____
2,708,719 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,519 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,287 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,055 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,823 UART: |_|
2,712,135 UART:
2,819,112 UART: [rt] Runtime listening for mailbox commands...
2,820,263 >>> mbox cmd response data (0 bytes)
2,820,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,820,376 UART:
2,820,392 UART: Running Caliptra ROM ...
2,820,800 UART:
2,820,942 UART: [state] CFI Enabled
2,823,564 UART: [state] LifecycleState = Unprovisioned
2,824,219 UART: [state] DebugLocked = No
2,824,903 UART: [state] WD Timer not started. Device not locked for debugging
2,826,111 UART: [kat] SHA2-256
3,631,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,635,886 UART: [kat] ++
3,636,038 UART: [kat] sha1
3,640,246 UART: [kat] SHA2-256
3,642,186 UART: [kat] SHA2-384
3,645,039 UART: [kat] SHA2-512-ACC
3,646,939 UART: [kat] ECC-384
3,656,912 UART: [kat] HMAC-384Kdf
3,661,690 UART: [kat] LMS
3,910,018 UART: [kat] --
3,910,864 UART: [update-reset] ++
5,222,262 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,223,329 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,372,907 >>> mbox cmd response: success
5,373,204 UART: [update-reset] Copying MAN_2 To MAN_1
5,381,218 UART: [update-reset Success] --
5,382,343 UART: [state] Locking Datavault
5,383,229 UART: [state] Locking PCR0, PCR1 and PCR31
5,383,833 UART: [state] Locking ICCM
5,384,453 UART: [exit] Launching FMC @ 0x40000130
5,389,782 UART:
5,389,798 UART: Running Caliptra FMC ...
5,390,206 UART:
5,390,349 UART: [state] CFI Enabled
5,479,200 UART: [art] Extend RT PCRs Done
5,479,628 UART: [art] Lock RT PCRs Done
5,480,999 UART: [art] Populate DV Done
5,489,382 UART: [fht] FMC Alias Private Key: 7
5,490,492 UART: [art] Derive CDI
5,490,772 UART: [art] Store in in slot 0x4
5,576,991 UART: [art] Derive Key Pair
5,577,351 UART: [art] Store priv key in slot 0x5
5,590,693 UART: [art] Derive Key Pair - Done
5,605,616 UART: [art] Signing Cert with AUTHO
5,606,096 UART: RITY.KEYID = 7
5,621,168 UART: [art] Erasing AUTHORITY.KEYID = 7
5,621,933 UART: [art] PUB.X = AB560E84EA723BBDA6359C6372662F83D8A9049B866D96E2A53FDD80171BBD046D833C40EF770E27C4A9669231F34DA5
5,628,695 UART: [art] PUB.Y = 3AC96DC5A483BE552534FC1C611063B029490A0481163138687F4E729D0BCD8986D949F9A6F556C35A3B5D8F0FA09434
5,635,629 UART: [art] SIG.R = E650E7602720457FBA6DE3ED6729929D4D05930947438C2EC16ED0CE73E49D5B0A0E7EBD4B19477673DAECE6A7DD248B
5,642,397 UART: [art] SIG.S = 607BFE273C34C4A46B1EDAABCFFF059EBBACD50EF9E1284FC9D1555DB36F02DBEE9D2F8065A54BDEEF21C7EAEEC6D1CD
5,666,035 UART: Caliptra RT
5,666,380 UART: [state] CFI Enabled
5,952,484 UART: [rt] RT failed reset flow
5,952,915 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,104 ready_for_fw is high
1,061,104 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,164,559 >>> mbox cmd response: success
2,164,559 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,227,193 UART:
2,227,209 UART: Running Caliptra FMC ...
2,227,617 UART:
2,227,760 UART: [state] CFI Enabled
2,238,185 UART: [fht] FMC Alias Private Key: 7
2,346,384 UART: [art] Extend RT PCRs Done
2,346,812 UART: [art] Lock RT PCRs Done
2,348,538 UART: [art] Populate DV Done
2,356,585 UART: [fht] FMC Alias Private Key: 7
2,357,621 UART: [art] Derive CDI
2,357,901 UART: [art] Store in in slot 0x4
2,443,490 UART: [art] Derive Key Pair
2,443,850 UART: [art] Store priv key in slot 0x5
2,456,916 UART: [art] Derive Key Pair - Done
2,471,631 UART: [art] Signing Cert with AUTHO
2,472,111 UART: RITY.KEYID = 7
2,487,337 UART: [art] Erasing AUTHORITY.KEYID = 7
2,488,102 UART: [art] PUB.X = A60599C121F708FAF9708BD5412722355ED96035264434FE6CC3C588F89377A961848823C3E6E9393CD1942D94C8DCEA
2,494,860 UART: [art] PUB.Y = 87B75983F6C63316F14B989C0A24687D17FCF306D87B286BF08C0ADF2C465983C32F9E1B0C4F5202F66E5B29FBD4F976
2,501,799 UART: [art] SIG.R = 564BEB0809F5040C5BF8589174A936FABED4C3539D2FB39881980B2C88A3042F12032F7A8636C0CEC816B9FAD88D13B0
2,508,552 UART: [art] SIG.S = 5A2A6FC2B4AD4B6AE3531E43506C60E35DA2142FA4D99C4DF04237BC80CCF6B0EB367DC4337EBB009DCF2A8061421204
2,532,612 UART: mbox::rt_entry...
2,532,984 UART: ____ _ _ _ ____ _____
2,533,768 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,534,568 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,535,336 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,536,104 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,536,872 UART: |_|
2,537,184 UART:
2,644,650 UART: [rt] Runtime listening for mailbox commands...
2,645,801 >>> mbox cmd response data (0 bytes)
2,645,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,081,836 >>> mbox cmd response: success
5,095,122 UART:
5,095,138 UART: Running Caliptra FMC ...
5,095,546 UART:
5,095,689 UART: [state] CFI Enabled
5,184,968 UART: [art] Extend RT PCRs Done
5,185,396 UART: [art] Lock RT PCRs Done
5,186,809 UART: [art] Populate DV Done
5,194,918 UART: [fht] FMC Alias Private Key: 7
5,195,940 UART: [art] Derive CDI
5,196,220 UART: [art] Store in in slot 0x4
5,281,921 UART: [art] Derive Key Pair
5,282,281 UART: [art] Store priv key in slot 0x5
5,295,461 UART: [art] Derive Key Pair - Done
5,310,304 UART: [art] Signing Cert with AUTHO
5,310,784 UART: RITY.KEYID = 7
5,325,726 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,491 UART: [art] PUB.X = B1CF2F8FBF469A0D7184AE622B011E24BF66578B7F0E3FFF12614FEE7E832A28204AA2E16C063BFCE2C34DAD4180616F
5,333,265 UART: [art] PUB.Y = 8C2D803D53793482579D67E37C56DCA004808FDB9C5EB008294A703A273016796A9CD4B25323C9DCA606A2CCEA1286B8
5,340,206 UART: [art] SIG.R = 6E50494A234F38D07775B28D2B049D47F56E1BB844D4E7DEDC701B9C9A0B7F9D87B9EE67E56AFF6F122BF833425A8387
5,346,978 UART: [art] SIG.S = 1E8FE98951BA1B31FE82D05352AB093ED52DEEA8FBF559B9FA7F6C9EC8214D91B5D9F0A177DCB9A631819495EBFFBE49
5,370,604 UART: Caliptra RT
5,370,949 UART: [state] CFI Enabled
5,652,471 UART: [rt] RT failed reset flow
5,652,902 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,146 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,177 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 ready_for_fw is high
1,174,201 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,829 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,946 UART: [ldev] ++
1,209,114 UART: [ldev] CDI.KEYID = 6
1,209,478 UART: [ldev] SUBJECT.KEYID = 5
1,209,905 UART: [ldev] AUTHORITY.KEYID = 7
1,210,368 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,598 UART: [ldev] --
1,280,948 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 78532 bytes
2,168,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,604 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,224,913 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,306,971 >>> mbox cmd response: success
2,306,971 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,308,038 UART: [afmc] ++
2,308,206 UART: [afmc] CDI.KEYID = 6
2,308,569 UART: [afmc] SUBJECT.KEYID = 7
2,308,995 UART: [afmc] AUTHORITY.KEYID = 5
2,343,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,360,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,360,819 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,366,548 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,372,431 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,378,150 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,385,979 UART: [afmc] --
2,386,937 UART: [cold-reset] --
2,387,857 UART: [state] Locking Datavault
2,389,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,389,662 UART: [state] Locking ICCM
2,390,238 UART: [exit] Launching FMC @ 0x40000130
2,395,567 UART:
2,395,583 UART: Running Caliptra FMC ...
2,395,991 UART:
2,396,045 UART: [state] CFI Enabled
2,406,720 UART: [fht] FMC Alias Private Key: 7
2,514,485 UART: [art] Extend RT PCRs Done
2,514,913 UART: [art] Lock RT PCRs Done
2,516,439 UART: [art] Populate DV Done
2,524,766 UART: [fht] FMC Alias Private Key: 7
2,525,788 UART: [art] Derive CDI
2,526,068 UART: [art] Store in in slot 0x4
2,611,997 UART: [art] Derive Key Pair
2,612,357 UART: [art] Store priv key in slot 0x5
2,625,217 UART: [art] Derive Key Pair - Done
2,640,370 UART: [art] Signing Cert with AUTHO
2,640,850 UART: RITY.KEYID = 7
2,656,084 UART: [art] Erasing AUTHORITY.KEYID = 7
2,656,849 UART: [art] PUB.X = 1F66140B65777A2265645392CA9E57FC0457CBB2DF04CD9275FD1A7DD18FFFCDD660FBB5A6955EAA4AAF53AFF1186CFE
2,663,632 UART: [art] PUB.Y = 61046EC0654813B36FF16FD26B91095D990D931B5B952D2BD0A954EC9595FCAA6824F8A652EBBB325453BE5FA7A0C251
2,670,579 UART: [art] SIG.R = AAB51A2CBA8572D746F7E1C24DB92C970992CBF897A9D3854F36DF375A7881724228C26C267C60893E84FCAD451DD670
2,677,350 UART: [art] SIG.S = 8004B0E1F9EB11FB25CA9611BD821A000EB196F08D0E70150F03F314612C4B2A15F7542B3B2F453E889A1976A48990E2
2,700,892 UART: mbox::rt_entry...
2,701,264 UART: ____ _ _ _ ____ _____
2,702,048 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,702,848 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,703,616 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,704,384 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,705,152 UART: |_|
2,705,464 UART:
2,811,879 UART: [rt] Runtime listening for mailbox commands...
2,813,030 >>> mbox cmd response data (0 bytes)
2,813,031 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,813,143 UART:
2,813,159 UART: Running Caliptra ROM ...
2,813,567 UART:
2,813,622 UART: [state] CFI Enabled
2,816,476 UART: [state] LifecycleState = Unprovisioned
2,817,131 UART: [state] DebugLocked = No
2,817,711 UART: [state] WD Timer not started. Device not locked for debugging
2,819,013 UART: [kat] SHA2-256
3,622,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,626,692 UART: [kat] ++
3,626,844 UART: [kat] sha1
3,630,968 UART: [kat] SHA2-256
3,632,908 UART: [kat] SHA2-384
3,635,659 UART: [kat] SHA2-512-ACC
3,637,559 UART: [kat] ECC-384
3,646,680 UART: [kat] HMAC-384Kdf
3,651,464 UART: [kat] LMS
3,899,776 UART: [kat] --
3,900,636 UART: [update-reset] ++
5,212,389 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,213,540 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,363,118 >>> mbox cmd response: success
5,363,283 UART: [update-reset] Copying MAN_2 To MAN_1
5,371,297 UART: [update-reset Success] --
5,372,182 UART: [state] Locking Datavault
5,372,934 UART: [state] Locking PCR0, PCR1 and PCR31
5,373,538 UART: [state] Locking ICCM
5,374,002 UART: [exit] Launching FMC @ 0x40000130
5,379,331 UART:
5,379,347 UART: Running Caliptra FMC ...
5,379,755 UART:
5,379,809 UART: [state] CFI Enabled
5,468,708 UART: [art] Extend RT PCRs Done
5,469,136 UART: [art] Lock RT PCRs Done
5,470,449 UART: [art] Populate DV Done
5,478,808 UART: [fht] FMC Alias Private Key: 7
5,479,884 UART: [art] Derive CDI
5,480,164 UART: [art] Store in in slot 0x4
5,565,575 UART: [art] Derive Key Pair
5,565,935 UART: [art] Store priv key in slot 0x5
5,578,941 UART: [art] Derive Key Pair - Done
5,593,855 UART: [art] Signing Cert with AUTHO
5,594,335 UART: RITY.KEYID = 7
5,609,561 UART: [art] Erasing AUTHORITY.KEYID = 7
5,610,326 UART: [art] PUB.X = 39BF13684A737AB5296DA4E395EE8BE12A3E3ED73A884A32323A3AB9A1F3B80AEC53E6A9B917A0BBEF7217171513F8FA
5,617,107 UART: [art] PUB.Y = 806970F9B4A03D5DBB223F932B8E253AB7E99FD2AF1D36BF82EC4CB032FAAC791AA7370CE60569AA8F7BE5CA351926A5
5,624,069 UART: [art] SIG.R = 5BA014AD3CE5819D941468EADEA669D117CB701F672EFE46B4EB00812524A7B95F9C8A086334C1D50AF79874C125BD51
5,630,817 UART: [art] SIG.S = 66194D6D5DD90F44E71125DBEF99CFAB76D8A2519F3B076326E1F63037FCA11E4FD9F9DD57D12E3E11D77E34E7C54255
5,654,990 UART: Caliptra RT
5,655,243 UART: [state] CFI Enabled
5,936,025 UART: [rt] RT failed reset flow
5,936,456 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,094 ready_for_fw is high
1,056,094 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,158,237 >>> mbox cmd response: success
2,158,237 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,220,195 UART:
2,220,211 UART: Running Caliptra FMC ...
2,220,619 UART:
2,220,673 UART: [state] CFI Enabled
2,231,142 UART: [fht] FMC Alias Private Key: 7
2,338,069 UART: [art] Extend RT PCRs Done
2,338,497 UART: [art] Lock RT PCRs Done
2,339,863 UART: [art] Populate DV Done
2,348,120 UART: [fht] FMC Alias Private Key: 7
2,349,176 UART: [art] Derive CDI
2,349,456 UART: [art] Store in in slot 0x4
2,435,275 UART: [art] Derive Key Pair
2,435,635 UART: [art] Store priv key in slot 0x5
2,448,789 UART: [art] Derive Key Pair - Done
2,463,637 UART: [art] Signing Cert with AUTHO
2,464,117 UART: RITY.KEYID = 7
2,479,307 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,072 UART: [art] PUB.X = 6C197851B7F5CA328F791BF091909A93917D3C1F73875032CBAB57C4EF11C5C0EB0ABDFA056885D993BA5640943120A4
2,486,838 UART: [art] PUB.Y = EE6D82F28961A213A7938160921E2CF8D17FAAD656634E25C439985B4224749489969E634B1D53B772B8142AAF6938EA
2,493,780 UART: [art] SIG.R = 98F754B3BFD5F822899B43F76884F551DE425DA2B2BAB6FCC7863BF1080232F2B2635A0FAD1F9EEFE5C79C320746D473
2,500,548 UART: [art] SIG.S = 8C37ED67D5B8EA94BED38CF147EB96519472640CE60E0ACC2B3B7FDAB4D598D3C9D79A10384D1D77456D64BBEBE4A072
2,524,060 UART: mbox::rt_entry...
2,524,432 UART: ____ _ _ _ ____ _____
2,525,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,016 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,526,784 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,527,552 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,320 UART: |_|
2,528,632 UART:
2,635,575 UART: [rt] Runtime listening for mailbox commands...
2,636,726 >>> mbox cmd response data (0 bytes)
2,636,727 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,068,249 >>> mbox cmd response: success
5,081,849 UART:
5,081,865 UART: Running Caliptra FMC ...
5,082,273 UART:
5,082,327 UART: [state] CFI Enabled
5,171,892 UART: [art] Extend RT PCRs Done
5,172,320 UART: [art] Lock RT PCRs Done
5,173,553 UART: [art] Populate DV Done
5,181,484 UART: [fht] FMC Alias Private Key: 7
5,182,414 UART: [art] Derive CDI
5,182,694 UART: [art] Store in in slot 0x4
5,268,109 UART: [art] Derive Key Pair
5,268,469 UART: [art] Store priv key in slot 0x5
5,281,365 UART: [art] Derive Key Pair - Done
5,296,221 UART: [art] Signing Cert with AUTHO
5,296,701 UART: RITY.KEYID = 7
5,312,015 UART: [art] Erasing AUTHORITY.KEYID = 7
5,312,780 UART: [art] PUB.X = 91F50248D8EE4BAC8C689B6855967E307CD1BB2EC43B66B340C75C5C51C29E7C1FCFB33863DE65A3138C83D1366D7A94
5,319,555 UART: [art] PUB.Y = D6B624F3CCA1019F507F05A4CD8A31BC7AE86B4706369D76093D2DB64206D377A3F7810788FE8C814970D87FC97D3FB3
5,326,491 UART: [art] SIG.R = 4E0AD8E715DDC891C0FF5C0458CDCDCBC10AEA28C2B245A8C53A8DAA0F5B5B71A9C1C810BCA3CF9AFE8E0CEBC98F0831
5,333,279 UART: [art] SIG.S = CB314899388D594C66B6B7AD7C18ADDBA9DA23CF4BE6363485C5C769F8B0EE99A03C4EC20F2D9E26487FCF16DE523EFC
5,356,817 UART: Caliptra RT
5,357,070 UART: [state] CFI Enabled
5,639,076 UART: [rt] RT failed reset flow
5,639,507 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,892 UART: [kat] ++
896,044 UART: [kat] sha1
900,336 UART: [kat] SHA2-256
902,276 UART: [kat] SHA2-384
905,197 UART: [kat] SHA2-512-ACC
907,098 UART: [kat] ECC-384
917,463 UART: [kat] HMAC-384Kdf
922,197 UART: [kat] LMS
1,170,509 UART: [kat] --
1,171,194 UART: [cold-reset] ++
1,171,600 UART: [fht] FHT @ 0x50003400
1,174,298 UART: [idev] ++
1,174,466 UART: [idev] CDI.KEYID = 6
1,174,827 UART: [idev] SUBJECT.KEYID = 7
1,175,252 UART: [idev] UDS.KEYID = 0
1,175,598 ready_for_fw is high
1,175,598 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,986 UART: [idev] Erasing UDS.KEYID = 0
1,200,006 UART: [idev] Sha1 KeyId Algorithm
1,208,790 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,229 UART: [ldev] --
1,282,611 UART: [fwproc] Wait for Commands...
1,283,318 UART: [fwproc] Recv command 0x46574c44
1,284,051 UART: [fwproc] Recv'd Img size: 78532 bytes
2,170,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,552 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,309,726 >>> mbox cmd response: success
2,309,726 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,310,927 UART: [afmc] ++
2,311,095 UART: [afmc] CDI.KEYID = 6
2,311,458 UART: [afmc] SUBJECT.KEYID = 7
2,311,884 UART: [afmc] AUTHORITY.KEYID = 5
2,347,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,022 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,634 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,353 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,174 UART: [afmc] --
2,391,064 UART: [cold-reset] --
2,391,956 UART: [state] Locking Datavault
2,392,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,477 UART: [state] Locking ICCM
2,393,897 UART: [exit] Launching FMC @ 0x40000130
2,399,226 UART:
2,399,242 UART: Running Caliptra FMC ...
2,399,650 UART:
2,399,793 UART: [state] CFI Enabled
2,410,466 UART: [fht] FMC Alias Private Key: 7
2,518,315 UART: [art] Extend RT PCRs Done
2,518,743 UART: [art] Lock RT PCRs Done
2,520,083 UART: [art] Populate DV Done
2,528,150 UART: [fht] FMC Alias Private Key: 7
2,529,138 UART: [art] Derive CDI
2,529,418 UART: [art] Store in in slot 0x4
2,615,415 UART: [art] Derive Key Pair
2,615,775 UART: [art] Store priv key in slot 0x5
2,628,647 UART: [art] Derive Key Pair - Done
2,643,251 UART: [art] Signing Cert with AUTHO
2,643,731 UART: RITY.KEYID = 7
2,658,869 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,634 UART: [art] PUB.X = C62A07CF487203E0787D3857638F599471B0D898F7658B11E289BDEB0CFB59A6B96B1EAF316FCFE34884660B99010AC1
2,666,388 UART: [art] PUB.Y = D8DAC7DAFAC4D101488D3CED8E3E2C3F3D9952BE805A5E0D39ABE0A3D61C47CD3550E5A19382B2BFF3ED375F806B16A1
2,673,356 UART: [art] SIG.R = 5DBF3F104D8F440F76BB3A7AC767BD9CF9B9C3DC9596A073E448073799DD32C9573D6E577BF1BB0FF4D80241E4E61647
2,680,124 UART: [art] SIG.S = EAFC7DF450D7944F5440790EB42BB95616B7184576D6CF64D103323A95B9F580D18B80CFC2E35A469BF32BB604C8FE64
2,703,844 UART: mbox::rt_entry...
2,704,216 UART: ____ _ _ _ ____ _____
2,705,000 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,800 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,568 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,336 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,104 UART: |_|
2,708,416 UART:
2,814,824 UART: [rt] Runtime listening for mailbox commands...
2,815,975 >>> mbox cmd response data (0 bytes)
2,815,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,816,088 UART:
2,816,104 UART: Running Caliptra ROM ...
2,816,512 UART:
2,816,654 UART: [state] CFI Enabled
2,819,424 UART: [state] LifecycleState = Unprovisioned
2,820,079 UART: [state] DebugLocked = No
2,820,595 UART: [state] WD Timer not started. Device not locked for debugging
2,821,761 UART: [kat] SHA2-256
3,625,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,629,440 UART: [kat] ++
3,629,592 UART: [kat] sha1
3,633,674 UART: [kat] SHA2-256
3,635,614 UART: [kat] SHA2-384
3,638,341 UART: [kat] SHA2-512-ACC
3,640,241 UART: [kat] ECC-384
3,650,036 UART: [kat] HMAC-384Kdf
3,654,600 UART: [kat] LMS
3,902,912 UART: [kat] --
3,903,894 UART: [update-reset] ++
5,214,883 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,215,872 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,365,450 >>> mbox cmd response: success
5,365,595 UART: [update-reset] Copying MAN_2 To MAN_1
5,373,609 UART: [update-reset Success] --
5,374,466 UART: [state] Locking Datavault
5,375,320 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,924 UART: [state] Locking ICCM
5,376,392 UART: [exit] Launching FMC @ 0x40000130
5,381,721 UART:
5,381,737 UART: Running Caliptra FMC ...
5,382,145 UART:
5,382,288 UART: [state] CFI Enabled
5,471,333 UART: [art] Extend RT PCRs Done
5,471,761 UART: [art] Lock RT PCRs Done
5,472,806 UART: [art] Populate DV Done
5,481,001 UART: [fht] FMC Alias Private Key: 7
5,482,165 UART: [art] Derive CDI
5,482,445 UART: [art] Store in in slot 0x4
5,568,176 UART: [art] Derive Key Pair
5,568,536 UART: [art] Store priv key in slot 0x5
5,581,818 UART: [art] Derive Key Pair - Done
5,596,777 UART: [art] Signing Cert with AUTHO
5,597,257 UART: RITY.KEYID = 7
5,612,381 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,146 UART: [art] PUB.X = 547F9D6D736AA1C73B5C073549C69D698DD0EF85836919DB36D963C3CA38C8C4CEF4BFAC2F77C74BB0C3D0729B99053A
5,619,922 UART: [art] PUB.Y = 5F6357E5EF3921C53836567EFA94F8CE4447BAC1C88B8BB2FEFE2960246BCE9880E7550F2FAC4A92885AEBF58C8AC8B3
5,626,885 UART: [art] SIG.R = BBD86D2D29BEE25508101399F6B95651C095D7FA48817DE4405146E340729D98EC661184CAF6D9CC409936969A3567DA
5,633,648 UART: [art] SIG.S = 784F7B3A07DAC217D55AD86872B7FE7E2AD815FD4702E781AD0684176098220986A98D945393FA1D000B12DEBC77FC2C
5,657,470 UART: Caliptra RT
5,657,815 UART: [state] CFI Enabled
5,939,421 UART: [rt] RT failed reset flow
5,939,852 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,741 ready_for_fw is high
1,056,741 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,161,268 >>> mbox cmd response: success
2,161,268 <<< Executing mbox cmd 0x80000000 (96 bytes) from SoC
2,223,378 UART:
2,223,394 UART: Running Caliptra FMC ...
2,223,802 UART:
2,223,945 UART: [state] CFI Enabled
2,234,440 UART: [fht] FMC Alias Private Key: 7
2,341,643 UART: [art] Extend RT PCRs Done
2,342,071 UART: [art] Lock RT PCRs Done
2,343,869 UART: [art] Populate DV Done
2,351,996 UART: [fht] FMC Alias Private Key: 7
2,353,174 UART: [art] Derive CDI
2,353,454 UART: [art] Store in in slot 0x4
2,438,977 UART: [art] Derive Key Pair
2,439,337 UART: [art] Store priv key in slot 0x5
2,452,311 UART: [art] Derive Key Pair - Done
2,467,201 UART: [art] Signing Cert with AUTHO
2,467,681 UART: RITY.KEYID = 7
2,482,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,526 UART: [art] PUB.X = 3C4CDB63DF020A5B35E56CB008C534FA6A4786238717757C613B5A8FB21C6A021CB51370D9E2E5B990FDB98D0BE30E31
2,490,286 UART: [art] PUB.Y = 3905C0959DD637698A6FE7CD27669BB44634CBE153460BAA2205B71349C52757B529F05F74D938336C23B011DEC376D9
2,497,221 UART: [art] SIG.R = F9B35F232801A3B3E8DD66CCDC65B3F0D8A11834A808128CC00AA9FBFCB724B49D3350B84C52004D5F7A58B564B72578
2,503,968 UART: [art] SIG.S = 5DB920A6C96A10749D156678A7D805C1B29B2986B674700055E7FADFF9A2866BE4672C312C97857D613F2BC7E34423BE
2,527,842 UART: mbox::rt_entry...
2,528,214 UART: ____ _ _ _ ____ _____
2,528,998 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,798 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,566 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,334 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,102 UART: |_|
2,532,414 UART:
2,638,322 UART: [rt] Runtime listening for mailbox commands...
2,639,473 >>> mbox cmd response data (0 bytes)
2,639,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,070,921 >>> mbox cmd response: success
5,084,237 UART:
5,084,253 UART: Running Caliptra FMC ...
5,084,661 UART:
5,084,804 UART: [state] CFI Enabled
5,173,749 UART: [art] Extend RT PCRs Done
5,174,177 UART: [art] Lock RT PCRs Done
5,175,324 UART: [art] Populate DV Done
5,183,375 UART: [fht] FMC Alias Private Key: 7
5,184,427 UART: [art] Derive CDI
5,184,707 UART: [art] Store in in slot 0x4
5,270,174 UART: [art] Derive Key Pair
5,270,534 UART: [art] Store priv key in slot 0x5
5,284,070 UART: [art] Derive Key Pair - Done
5,299,195 UART: [art] Signing Cert with AUTHO
5,299,675 UART: RITY.KEYID = 7
5,314,769 UART: [art] Erasing AUTHORITY.KEYID = 7
5,315,534 UART: [art] PUB.X = 1CD62D1585CB57FC5D3CFF03AEFC1E68E6ABA0A2A97A975392B493AB5DA48533A5C7559BBFF2E1D0203CDCFE617E3AF6
5,322,327 UART: [art] PUB.Y = 839556A0F50D741A1C6312CFEDA85BA07398E0DE75B9F4E2143FC953F71ADD49761728DA5E879BAAA58CEBBF7930AFF3
5,329,290 UART: [art] SIG.R = 7E3B8885C5DD72295FF32E54025C21FD95D40B774DCD164A1B56B986BF213938387FB092DFB13F59AABA3CBD120240ED
5,336,061 UART: [art] SIG.S = 39E30059251F3FF44C8D53C632BFB370DE66BA9082684BCBC86347F8E3F52C9055C08BB2B38BB30DBFB8FF972D552EC8
5,360,153 UART: Caliptra RT
5,360,498 UART: [state] CFI Enabled
5,640,304 UART: [rt] RT failed reset flow
5,640,735 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,110 UART:
192,477 UART: Running Caliptra ROM ...
193,642 UART:
193,793 UART: [state] CFI Enabled
267,401 UART: [state] LifecycleState = Unprovisioned
269,408 UART: [state] DebugLocked = No
270,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,020 UART: [kat] SHA2-256
444,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,195 UART: [kat] ++
455,634 UART: [kat] sha1
466,288 UART: [kat] SHA2-256
468,999 UART: [kat] SHA2-384
474,905 UART: [kat] SHA2-512-ACC
477,259 UART: [kat] ECC-384
2,770,586 UART: [kat] HMAC-384Kdf
2,800,580 UART: [kat] LMS
3,990,901 UART: [kat] --
3,994,631 UART: [cold-reset] ++
3,995,931 UART: [fht] Storing FHT @ 0x50003400
4,007,120 UART: [idev] ++
4,007,686 UART: [idev] CDI.KEYID = 6
4,008,714 UART: [idev] SUBJECT.KEYID = 7
4,009,882 UART: [idev] UDS.KEYID = 0
4,010,914 ready_for_fw is high
4,011,106 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,110,203 UART: [idev] Erasing UDS.KEYID = 0
7,349,117 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,886 UART: [idev] --
7,375,144 UART: [ldev] ++
7,375,710 UART: [ldev] CDI.KEYID = 6
7,376,741 UART: [ldev] SUBJECT.KEYID = 5
7,377,840 UART: [ldev] AUTHORITY.KEYID = 7
7,379,117 UART: [ldev] FE.KEYID = 1
7,424,561 UART: [ldev] Erasing FE.KEYID = 1
10,756,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,956 UART: [ldev] --
13,116,724 UART: [fwproc] Waiting for Commands...
13,119,237 UART: [fwproc] Received command 0x46574c44
13,121,412 UART: [fwproc] Received Image of size 78576 bytes
16,744,853 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,816,651 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,885,553 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,079,244 >>> mbox cmd response: success
17,079,736 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,083,268 UART: [afmc] ++
17,083,852 UART: [afmc] CDI.KEYID = 6
17,084,819 UART: [afmc] SUBJECT.KEYID = 7
17,086,036 UART: [afmc] AUTHORITY.KEYID = 5
20,454,826 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,756,433 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,758,693 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,773,103 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,787,928 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,802,409 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,822,876 UART: [afmc] --
22,827,167 UART: [cold-reset] --
22,829,676 UART: [state] Locking Datavault
22,834,039 UART: [state] Locking PCR0, PCR1 and PCR31
22,835,812 UART: [state] Locking ICCM
22,837,557 UART: [exit] Launching FMC @ 0x40000130
22,845,941 UART:
22,846,167 UART: Running Caliptra FMC ...
22,847,186 UART:
22,847,326 UART: [state] CFI Enabled
22,916,403 UART: [fht] FMC Alias Private Key: 7
25,254,740 UART: [art] Extend RT PCRs Done
25,255,963 UART: [art] Lock RT PCRs Done
25,257,661 UART: [art] Populate DV Done
25,263,062 UART: [fht] FMC Alias Private Key: 7
25,264,702 UART: [art] Derive CDI
25,265,434 UART: [art] Store in in slot 0x4
25,325,111 UART: [art] Derive Key Pair
25,326,147 UART: [art] Store priv key in slot 0x5
28,618,849 UART: [art] Derive Key Pair - Done
28,631,645 UART: [art] Signing Cert with AUTHO
28,632,942 UART: RITY.KEYID = 7
30,921,125 UART: [art] Erasing AUTHORITY.KEYID = 7
30,922,629 UART: [art] PUB.X = C60F7E8A2670EA6B1DD82E0134B73C7DF270D0A242CB263D73DB4A4A2CE9E6338899B8556393B603E422C8B1A8D05AD2
30,929,877 UART: [art] PUB.Y = 76D2D27DF8AEA3C94D8700EAEC7BCF1B4649845239759C0BEB4B7B484AD724BD2B84BA7267C2E7D46AF4A31A162A43B8
30,937,141 UART: [art] SIG.R = ACD75872E124A302571E8566801A7D82E237D8828DE1AD6A69C0DE2E60BB174FDC1B884BDA15BBB082CF3CB78745FC7B
30,944,526 UART: [art] SIG.S = BE892343F52B2FE8291E6B8C8C07BEE3889940B137EC376F446A6A2C7469042FAC5C9179A1E64B3C17C5889E594FCC46
32,248,936 UART: mbox::rt_entry...
32,249,875 UART: ____ _ _ _ ____ _____
32,251,796 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,253,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,255,644 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,257,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,259,436 UART: |_|
32,260,325 UART:
32,373,289 UART: [rt] Runtime listening for mailbox commands...
32,379,169 >>> mbox cmd response data (3272 bytes)
32,394,729 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,428,114 >>> mbox cmd response data (0 bytes)
34,488,463 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,633,241 UART:
34,633,626 UART: Running Caliptra ROM ...
34,634,676 UART:
34,634,823 UART: [state] CFI Enabled
34,699,137 UART: [state] LifecycleState = Unprovisioned
34,701,077 UART: [state] DebugLocked = No
34,703,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,708,108 UART: [kat] SHA2-256
34,877,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,888,294 UART: [kat] ++
34,888,789 UART: [kat] sha1
34,900,472 UART: [kat] SHA2-256
34,903,164 UART: [kat] SHA2-384
34,908,871 UART: [kat] SHA2-512-ACC
34,911,267 UART: [kat] ECC-384
37,199,910 UART: [kat] HMAC-384Kdf
37,210,950 UART: [kat] LMS
38,401,281 UART: [kat] --
38,406,575 UART: [update-reset] ++
42,533,431 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,537,572 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,918,818 >>> mbox cmd response: success
42,923,415 UART: [update-reset] Copying MAN_2 To MAN_1
42,942,201 UART: [update-reset Success] --
42,946,014 UART: [state] Locking Datavault
42,948,403 UART: [state] Locking PCR0, PCR1 and PCR31
42,950,155 UART: [state] Locking ICCM
42,952,329 UART: [exit] Launching FMC @ 0x40000130
42,960,773 UART:
42,961,007 UART: Running Caliptra FMC ...
42,962,106 UART:
42,962,259 UART: [state] CFI Enabled
43,048,549 UART: [art] Extend RT PCRs Done
43,049,740 UART: [art] Lock RT PCRs Done
43,050,995 UART: [art] Populate DV Done
43,056,347 UART: [fht] FMC Alias Private Key: 7
43,057,931 UART: [art] Derive CDI
43,058,755 UART: [art] Store in in slot 0x4
43,117,663 UART: [art] Derive Key Pair
43,118,709 UART: [art] Store priv key in slot 0x5
46,411,138 UART: [art] Derive Key Pair - Done
46,424,083 UART: [art] Signing Cert with AUTHO
46,425,387 UART: RITY.KEYID = 7
48,714,587 UART: [art] Erasing AUTHORITY.KEYID = 7
48,716,096 UART: [art] PUB.X = CBF351AE06B96E3C843366209433B487A5AE62F43381974528A82D5A7198B3FF27988C558D9316438E7BA5F12BEAFF1C
48,723,310 UART: [art] PUB.Y = 8F690A1BF58188A93E54D7FF45072AD9E094A2F9407A21BDBC1A26D96FF43A15E710B9C8F16F6BD04C6D1F73C1DFB7D3
48,730,588 UART: [art] SIG.R = B90A19BE96157AF30EE72A1DF3AA250DEF881A9A3583A780F278FFC442BAA28E95A5327D16589C8D8F28C4711A19E827
48,737,947 UART: [art] SIG.S = B24516DE4B5691DF1974CC83CBD33B41915D309E8AF8CAE706FB4D27AF0AB3AD648604DD6694C096CC5869A027093C69
50,043,847 UART: Caliptra RT
50,044,609 UART: [state] CFI Enabled
53,667,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,668,070 UART: [rt] RT listening for mailbox commands...
53,699,617 UART: [rt]cmd =0x494e464f, len=4
53,703,990 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,786,370 ready_for_fw is high
3,786,778 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,157,064 >>> mbox cmd response: success
17,157,595 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,845,827 UART:
22,846,236 UART: Running Caliptra FMC ...
22,847,366 UART:
22,847,520 UART: [state] CFI Enabled
22,911,905 UART: [fht] FMC Alias Private Key: 7
25,250,269 UART: [art] Extend RT PCRs Done
25,251,487 UART: [art] Lock RT PCRs Done
25,252,946 UART: [art] Populate DV Done
25,258,470 UART: [fht] FMC Alias Private Key: 7
25,260,091 UART: [art] Derive CDI
25,260,902 UART: [art] Store in in slot 0x4
25,320,562 UART: [art] Derive Key Pair
25,321,555 UART: [art] Store priv key in slot 0x5
28,614,468 UART: [art] Derive Key Pair - Done
28,627,519 UART: [art] Signing Cert with AUTHO
28,628,813 UART: RITY.KEYID = 7
30,916,240 UART: [art] Erasing AUTHORITY.KEYID = 7
30,917,762 UART: [art] PUB.X = 06A5945639B0FBAD06390DA889364FA3697AD0F5B3028D6B2BD50BFB57049934EF549A925D6A0A35A63732D1922BCF79
30,924,961 UART: [art] PUB.Y = 16603F9F5A0CC8B9DF1971878631FE22B6F60D429ACFAF04562067457737831DDE0CACA8E658587C7A653405F8F9B617
30,932,235 UART: [art] SIG.R = 30F2C041A7F50288749A3F386D76BDEA5F4497CF71E5D02F54E22236978CFF933D05C117F5F896B3A35D81D805511332
30,939,558 UART: [art] SIG.S = A986C8CFE42F87E6A5007B4DD0DB886A256801B1208AEEAF6EFFC85706AD90B187ECFAC27728EF2FFD7487AAE01A3354
32,244,470 UART: mbox::rt_entry...
32,245,438 UART: ____ _ _ _ ____ _____
32,247,542 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,249,539 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,251,386 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,253,338 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,255,210 UART: |_|
32,256,035 UART:
32,369,826 UART: [rt] Runtime listening for mailbox commands...
32,375,652 >>> mbox cmd response data (3272 bytes)
32,391,251 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,424,632 >>> mbox cmd response data (0 bytes)
34,484,096 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,210,680 >>> mbox cmd response: success
43,246,195 UART:
43,246,503 UART: Running Caliptra FMC ...
43,247,613 UART:
43,247,961 UART: [state] CFI Enabled
43,337,073 UART: [art] Extend RT PCRs Done
43,338,255 UART: [art] Lock RT PCRs Done
43,339,706 UART: [art] Populate DV Done
43,345,269 UART: [fht] FMC Alias Private Key: 7
43,346,960 UART: [art] Derive CDI
43,347,766 UART: [art] Store in in slot 0x4
43,406,113 UART: [art] Derive Key Pair
43,407,099 UART: [art] Store priv key in slot 0x5
46,700,060 UART: [art] Derive Key Pair - Done
46,712,785 UART: [art] Signing Cert with AUTHO
46,714,122 UART: RITY.KEYID = 7
49,001,418 UART: [art] Erasing AUTHORITY.KEYID = 7
49,002,929 UART: [art] PUB.X = D5A6C1BC950F145D16C1883CA53C02967F597567ACB33EF87A7F9410100F647D3BC24AF5CA8174AB5BA64B7B656F203C
49,010,227 UART: [art] PUB.Y = A5A7F9B67B064557A2E118FE8A1265D0D4A0D1ACB7330479E697475E3CB721030783C8B6A3E5732BDE33DEBAD6FE0351
49,017,438 UART: [art] SIG.R = 31124EE6C57971FA1373CC727346818E7E628C31A71FE9D9BE30F555CBEB202A9CF007A2B85061B0905EBC06B7209CAB
49,024,796 UART: [art] SIG.S = 96BA7952F377D4099B1BE2844B5B5F12CCD5DA46B4FA526AC6DC33E19E5ED1BD6790E385A96A37FF3768EE27E99A5979
50,330,380 UART: Caliptra RT
50,331,098 UART: [state] CFI Enabled
53,972,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,974,036 UART: [rt] RT listening for mailbox commands...
54,005,601 UART: [rt]cmd =0x494e464f, len=4
54,010,047 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,384 UART:
192,817 UART: Running Caliptra ROM ...
193,955 UART:
603,450 UART: [state] CFI Enabled
613,563 UART: [state] LifecycleState = Unprovisioned
615,523 UART: [state] DebugLocked = No
618,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,683 UART: [kat] SHA2-256
793,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,975 UART: [kat] ++
804,424 UART: [kat] sha1
815,722 UART: [kat] SHA2-256
818,371 UART: [kat] SHA2-384
823,366 UART: [kat] SHA2-512-ACC
825,734 UART: [kat] ECC-384
3,107,944 UART: [kat] HMAC-384Kdf
3,120,677 UART: [kat] LMS
4,310,807 UART: [kat] --
4,315,464 UART: [cold-reset] ++
4,316,639 UART: [fht] Storing FHT @ 0x50003400
4,327,351 UART: [idev] ++
4,328,000 UART: [idev] CDI.KEYID = 6
4,328,894 UART: [idev] SUBJECT.KEYID = 7
4,330,141 UART: [idev] UDS.KEYID = 0
4,331,105 ready_for_fw is high
4,331,307 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,430,119 UART: [idev] Erasing UDS.KEYID = 0
7,618,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,078 UART: [idev] --
7,642,047 UART: [ldev] ++
7,642,620 UART: [ldev] CDI.KEYID = 6
7,643,535 UART: [ldev] SUBJECT.KEYID = 5
7,644,747 UART: [ldev] AUTHORITY.KEYID = 7
7,646,030 UART: [ldev] FE.KEYID = 1
7,658,835 UART: [ldev] Erasing FE.KEYID = 1
10,944,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,414 UART: [ldev] --
13,303,569 UART: [fwproc] Waiting for Commands...
13,305,766 UART: [fwproc] Received command 0x46574c44
13,307,954 UART: [fwproc] Received Image of size 78576 bytes
16,931,893 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,005,544 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,074,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,267,498 >>> mbox cmd response: success
17,267,984 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,271,499 UART: [afmc] ++
17,272,081 UART: [afmc] CDI.KEYID = 6
17,273,120 UART: [afmc] SUBJECT.KEYID = 7
17,274,284 UART: [afmc] AUTHORITY.KEYID = 5
20,591,585 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,884,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,887,173 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,901,590 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,916,413 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,930,864 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,953,039 UART: [afmc] --
22,957,380 UART: [cold-reset] --
22,963,350 UART: [state] Locking Datavault
22,969,374 UART: [state] Locking PCR0, PCR1 and PCR31
22,971,126 UART: [state] Locking ICCM
22,973,764 UART: [exit] Launching FMC @ 0x40000130
22,982,102 UART:
22,982,336 UART: Running Caliptra FMC ...
22,983,427 UART:
22,983,591 UART: [state] CFI Enabled
22,991,475 UART: [fht] FMC Alias Private Key: 7
25,322,510 UART: [art] Extend RT PCRs Done
25,323,735 UART: [art] Lock RT PCRs Done
25,325,065 UART: [art] Populate DV Done
25,330,648 UART: [fht] FMC Alias Private Key: 7
25,332,215 UART: [art] Derive CDI
25,332,977 UART: [art] Store in in slot 0x4
25,375,466 UART: [art] Derive Key Pair
25,376,509 UART: [art] Store priv key in slot 0x5
28,618,554 UART: [art] Derive Key Pair - Done
28,631,544 UART: [art] Signing Cert with AUTHO
28,632,881 UART: RITY.KEYID = 7
30,912,097 UART: [art] Erasing AUTHORITY.KEYID = 7
30,913,614 UART: [art] PUB.X = 657BBA60CA61CFCB32D6363F381BC2D8F19C877244B52DB9E5B57373016D9826A92137C6D7BA7FDB6FBFB9EBD91BA5E3
30,920,892 UART: [art] PUB.Y = 2F0A209D2076C68CFD9111811D35E47EB39577E294C21A009B63765AC465B3D26056D987EFA5AACB68C85361E70D88A0
30,928,080 UART: [art] SIG.R = 509772E4BF66ABDD62D8CDA23458A849359A64A69FED20D78F17DAF71FBA2E4CE6E05DBF73428DC4EF387C9656D8B53F
30,935,488 UART: [art] SIG.S = C4EFDDD62FF9041FDF01CE4B75E6BC428D6A80D6FE7BA035E8EB837C179765AC2143ED31B76782C156F483885B16C75A
32,240,235 UART: mbox::rt_entry...
32,241,181 UART: ____ _ _ _ ____ _____
32,243,166 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,245,174 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,247,110 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,249,043 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,250,904 UART: |_|
32,251,707 UART:
32,365,322 UART: [rt] Runtime listening for mailbox commands...
32,371,166 >>> mbox cmd response data (3272 bytes)
32,386,941 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,420,363 >>> mbox cmd response data (0 bytes)
34,548,430 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,692,307 UART:
34,692,717 UART: Running Caliptra ROM ...
34,693,770 UART:
34,693,938 UART: [state] CFI Enabled
34,710,343 UART: [state] LifecycleState = Unprovisioned
34,712,277 UART: [state] DebugLocked = No
34,713,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,717,966 UART: [kat] SHA2-256
34,887,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,898,188 UART: [kat] ++
34,898,752 UART: [kat] sha1
34,909,321 UART: [kat] SHA2-256
34,912,018 UART: [kat] SHA2-384
34,917,318 UART: [kat] SHA2-512-ACC
34,919,673 UART: [kat] ECC-384
37,200,922 UART: [kat] HMAC-384Kdf
37,211,918 UART: [kat] LMS
38,401,964 UART: [kat] --
38,406,457 UART: [update-reset] ++
42,544,884 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,548,200 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,929,530 >>> mbox cmd response: success
42,934,292 UART: [update-reset] Copying MAN_2 To MAN_1
42,953,800 UART: [update-reset Success] --
42,960,307 UART: [state] Locking Datavault
42,964,218 UART: [state] Locking PCR0, PCR1 and PCR31
42,965,938 UART: [state] Locking ICCM
42,968,629 UART: [exit] Launching FMC @ 0x40000130
42,977,082 UART:
42,977,324 UART: Running Caliptra FMC ...
42,978,425 UART:
42,978,589 UART: [state] CFI Enabled
43,022,602 UART: [art] Extend RT PCRs Done
43,023,750 UART: [art] Lock RT PCRs Done
43,025,307 UART: [art] Populate DV Done
43,030,757 UART: [fht] FMC Alias Private Key: 7
43,032,466 UART: [art] Derive CDI
43,033,285 UART: [art] Store in in slot 0x4
43,076,168 UART: [art] Derive Key Pair
43,077,224 UART: [art] Store priv key in slot 0x5
46,319,278 UART: [art] Derive Key Pair - Done
46,332,516 UART: [art] Signing Cert with AUTHO
46,333,826 UART: RITY.KEYID = 7
48,613,010 UART: [art] Erasing AUTHORITY.KEYID = 7
48,614,528 UART: [art] PUB.X = CD362BDA59336BB40613D829B382BFC7951A6E1001112B2B970672DB24F83A8361BF242E8D40244CA440BCD6C5577B7D
48,621,781 UART: [art] PUB.Y = 9139FBB2ED3F47ACE29F1AF1D276B88AE857B8BCAA6A598746A71CE5F1263F8F0D2FCC91665BCEBB76786C5FE4F4DB02
48,629,057 UART: [art] SIG.R = A9AFD922B1F2F98D5879C2201BD28A31C82F2E2C3017C608A25AA5C18F775E2E3315E22464BD13301A2205B231BF80C0
48,636,417 UART: [art] SIG.S = 1E72727157F946C2C05D333474CEAB5B1CA88D99A66584DB2CF787EFF2EFB65E784B038C6268DFB809C562C124E8D101
49,941,323 UART: Caliptra RT
49,942,031 UART: [state] CFI Enabled
53,466,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,467,722 UART: [rt] RT listening for mailbox commands...
53,499,276 UART: [rt]cmd =0x494e464f, len=4
53,503,549 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,131,326 ready_for_fw is high
4,131,709 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,343,463 >>> mbox cmd response: success
17,344,230 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,985,857 UART:
22,986,248 UART: Running Caliptra FMC ...
22,987,392 UART:
22,987,556 UART: [state] CFI Enabled
22,995,508 UART: [fht] FMC Alias Private Key: 7
25,327,038 UART: [art] Extend RT PCRs Done
25,328,266 UART: [art] Lock RT PCRs Done
25,330,002 UART: [art] Populate DV Done
25,335,607 UART: [fht] FMC Alias Private Key: 7
25,337,094 UART: [art] Derive CDI
25,337,863 UART: [art] Store in in slot 0x4
25,380,515 UART: [art] Derive Key Pair
25,381,556 UART: [art] Store priv key in slot 0x5
28,623,656 UART: [art] Derive Key Pair - Done
28,636,775 UART: [art] Signing Cert with AUTHO
28,638,085 UART: RITY.KEYID = 7
30,917,906 UART: [art] Erasing AUTHORITY.KEYID = 7
30,919,415 UART: [art] PUB.X = 4DF63A28E677549F0665E3BCA8B8604E08A974C01D04DA92B3E9379D5BDD4E6C9B6C2AA6960FCA974A221EFB6D9436D1
30,926,670 UART: [art] PUB.Y = 14B5E6BE1E9F1113800E5E06B93BB4B1673DB3B59813E2B97BB8D4DD5992C388AC792565EE7BB512742AD1E5D8DED6E0
30,933,911 UART: [art] SIG.R = 7AFF2193E2B0E858F34510933709C8392B1A6CD78B42571182FF44B49CDDD2E2FFD327465755E6945A7B50947AEE75AF
30,941,321 UART: [art] SIG.S = 4CE7899634ABD542812A7CF381DFEABA6DB9B4F1788BEC37A9E048CBE73FE07E5DEB07D9B700DAFC6E0FE5516850E59F
32,246,851 UART: mbox::rt_entry...
32,247,813 UART: ____ _ _ _ ____ _____
32,249,740 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,766 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,253,629 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,255,589 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,257,476 UART: |_|
32,258,361 UART:
32,372,340 UART: [rt] Runtime listening for mailbox commands...
32,378,198 >>> mbox cmd response data (3272 bytes)
32,393,835 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,427,252 >>> mbox cmd response data (0 bytes)
34,554,408 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,194,332 >>> mbox cmd response: success
43,228,343 UART:
43,228,698 UART: Running Caliptra FMC ...
43,229,752 UART:
43,229,902 UART: [state] CFI Enabled
43,273,766 UART: [art] Extend RT PCRs Done
43,274,922 UART: [art] Lock RT PCRs Done
43,276,268 UART: [art] Populate DV Done
43,281,622 UART: [fht] FMC Alias Private Key: 7
43,283,349 UART: [art] Derive CDI
43,284,334 UART: [art] Store in in slot 0x4
43,326,543 UART: [art] Derive Key Pair
43,327,557 UART: [art] Store priv key in slot 0x5
46,569,542 UART: [art] Derive Key Pair - Done
46,582,349 UART: [art] Signing Cert with AUTHO
46,583,763 UART: RITY.KEYID = 7
48,863,070 UART: [art] Erasing AUTHORITY.KEYID = 7
48,864,589 UART: [art] PUB.X = E44DEA7306100C6D0D6F212087F5FEE94ED32B7A55E25A597CCE50FCE4A4DFFCA2D599CE9D9B373B8F2879DD7ED3143F
48,871,879 UART: [art] PUB.Y = FDF2A3444AE38DB2B533B1AF7AD70CAAB8D989D9DF68935E6CBDB671C995A67977260E5E5C4DD6656417D36D2F8B5B7F
48,879,123 UART: [art] SIG.R = ADFA0AB8FA6CF96897724BA86AD7D05A18302146D4F0B9F650669D2D27F37B673EC1076637BAD47B054385933C6B0A49
48,886,534 UART: [art] SIG.S = D44BB7F3FF79A5A5A2C80E276C3A6225A16A47678342974D65E4A66A6F9D745986DD39F21270E6FD8A3C1370DACEA1A6
50,191,202 UART: Caliptra RT
50,191,903 UART: [state] CFI Enabled
53,713,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,714,697 UART: [rt] RT listening for mailbox commands...
53,746,014 UART: [rt]cmd =0x494e464f, len=4
53,750,464 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,033 UART:
192,406 UART: Running Caliptra ROM ...
193,508 UART:
193,651 UART: [state] CFI Enabled
261,405 UART: [state] LifecycleState = Unprovisioned
263,232 UART: [state] DebugLocked = No
264,966 UART: [state] WD Timer not started. Device not locked for debugging
268,529 UART: [kat] SHA2-256
447,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,194 UART: [kat] ++
459,647 UART: [kat] sha1
471,582 UART: [kat] SHA2-256
474,587 UART: [kat] SHA2-384
480,087 UART: [kat] SHA2-512-ACC
483,028 UART: [kat] ECC-384
2,948,719 UART: [kat] HMAC-384Kdf
2,970,268 UART: [kat] LMS
3,499,690 UART: [kat] --
3,505,457 UART: [cold-reset] ++
3,507,462 UART: [fht] FHT @ 0x50003400
3,519,146 UART: [idev] ++
3,519,716 UART: [idev] CDI.KEYID = 6
3,520,645 UART: [idev] SUBJECT.KEYID = 7
3,521,838 UART: [idev] UDS.KEYID = 0
3,522,770 ready_for_fw is high
3,522,984 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,621,967 UART: [idev] Erasing UDS.KEYID = 0
6,025,400 UART: [idev] Sha1 KeyId Algorithm
6,048,682 UART: [idev] --
6,051,898 UART: [ldev] ++
6,052,479 UART: [ldev] CDI.KEYID = 6
6,053,396 UART: [ldev] SUBJECT.KEYID = 5
6,054,558 UART: [ldev] AUTHORITY.KEYID = 7
6,055,793 UART: [ldev] FE.KEYID = 1
6,098,896 UART: [ldev] Erasing FE.KEYID = 1
8,599,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,260 UART: [ldev] --
10,391,286 UART: [fwproc] Wait for Commands...
10,393,812 UART: [fwproc] Recv command 0x46574c44
10,395,914 UART: [fwproc] Recv'd Img size: 78532 bytes
13,364,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,439,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,508,250 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,700,372 >>> mbox cmd response: success
13,700,870 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,704,720 UART: [afmc] ++
13,705,314 UART: [afmc] CDI.KEYID = 6
13,706,196 UART: [afmc] SUBJECT.KEYID = 7
13,707,408 UART: [afmc] AUTHORITY.KEYID = 5
16,249,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,974,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,976,224 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,992,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,008,032 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,023,912 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,047,228 UART: [afmc] --
18,051,639 UART: [cold-reset] --
18,056,527 UART: [state] Locking Datavault
18,062,593 UART: [state] Locking PCR0, PCR1 and PCR31
18,064,245 UART: [state] Locking ICCM
18,065,644 UART: [exit] Launching FMC @ 0x40000130
18,074,045 UART:
18,074,293 UART: Running Caliptra FMC ...
18,075,402 UART:
18,075,563 UART: [state] CFI Enabled
18,131,422 UART: [fht] FMC Alias Private Key: 7
19,895,766 UART: [art] Extend RT PCRs Done
19,897,000 UART: [art] Lock RT PCRs Done
19,898,250 UART: [art] Populate DV Done
19,903,726 UART: [fht] FMC Alias Private Key: 7
19,905,213 UART: [art] Derive CDI
19,905,974 UART: [art] Store in in slot 0x4
19,964,323 UART: [art] Derive Key Pair
19,965,373 UART: [art] Store priv key in slot 0x5
22,428,288 UART: [art] Derive Key Pair - Done
22,441,040 UART: [art] Signing Cert with AUTHO
22,442,383 UART: RITY.KEYID = 7
24,153,458 UART: [art] Erasing AUTHORITY.KEYID = 7
24,154,960 UART: [art] PUB.X = 9EB5AEC1197C6D93109510EA8BC34B5767C11D5885C7193B7AE83A803436DBF4E0D991C1DB818BC1E89BD406DACC22B5
24,162,225 UART: [art] PUB.Y = 7BE750FBA249B3846314AF739ED5686849F95DF204B7295A9D843A00B328E1D3157A1D96CCF373BB83547FFBB3CA4840
24,169,466 UART: [art] SIG.R = 06A79EC035274C7F843A26353C1F2C64BFFF33597CD2C751ABB95AB351918332374E0D9C7375774D1E044EAF7B272400
24,176,877 UART: [art] SIG.S = 752A4307FE632315A5E4B526426F017F1317E1AB332F3816C0E4DAFBCAA3E54CE4BB2CB52536EB232DD5FFD2EA8845F2
25,155,291 UART: mbox::rt_entry...
25,156,265 UART: ____ _ _ _ ____ _____
25,158,196 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,160,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,162,052 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,163,976 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,165,860 UART: |_|
25,166,742 UART:
25,280,146 UART: [rt] Runtime listening for mailbox commands...
25,285,988 >>> mbox cmd response data (3272 bytes)
25,301,605 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,335,000 >>> mbox cmd response data (0 bytes)
27,399,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,544,442 UART:
27,544,813 UART: Running Caliptra ROM ...
27,545,866 UART:
27,546,021 UART: [state] CFI Enabled
27,608,841 UART: [state] LifecycleState = Unprovisioned
27,610,729 UART: [state] DebugLocked = No
27,612,848 UART: [state] WD Timer not started. Device not locked for debugging
27,616,160 UART: [kat] SHA2-256
27,795,287 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,806,864 UART: [kat] ++
27,807,326 UART: [kat] sha1
27,817,456 UART: [kat] SHA2-256
27,820,464 UART: [kat] SHA2-384
27,827,960 UART: [kat] SHA2-512-ACC
27,830,926 UART: [kat] ECC-384
30,291,267 UART: [kat] HMAC-384Kdf
30,311,703 UART: [kat] LMS
30,841,205 UART: [kat] --
30,843,358 UART: [update-reset] ++
34,274,935 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,278,447 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,660,776 >>> mbox cmd response: success
34,665,370 UART: [update-reset] Copying MAN_2 To MAN_1
34,684,132 UART: [update-reset Success] --
34,689,231 UART: [state] Locking Datavault
34,692,867 UART: [state] Locking PCR0, PCR1 and PCR31
34,694,540 UART: [state] Locking ICCM
34,696,454 UART: [exit] Launching FMC @ 0x40000130
34,704,912 UART:
34,705,156 UART: Running Caliptra FMC ...
34,706,575 UART:
34,706,744 UART: [state] CFI Enabled
34,801,718 UART: [art] Extend RT PCRs Done
34,802,915 UART: [art] Lock RT PCRs Done
34,804,315 UART: [art] Populate DV Done
34,809,840 UART: [fht] FMC Alias Private Key: 7
34,811,429 UART: [art] Derive CDI
34,812,240 UART: [art] Store in in slot 0x4
34,870,924 UART: [art] Derive Key Pair
34,871,982 UART: [art] Store priv key in slot 0x5
37,334,582 UART: [art] Derive Key Pair - Done
37,347,694 UART: [art] Signing Cert with AUTHO
37,349,020 UART: RITY.KEYID = 7
39,059,902 UART: [art] Erasing AUTHORITY.KEYID = 7
39,061,410 UART: [art] PUB.X = E6A1C29BB454BA951FCD73ADF1EBF047935EB73A98C90FD6D8206C3C77B46F6D397FC8136FD8F25CE253B63973523C59
39,068,732 UART: [art] PUB.Y = 1FEA15744DEF4DE70A20B54074016EAA76B158E6804326EA25AA5AA33CDBB8CBAD56389490F95536BC41437C34CD09C0
39,076,000 UART: [art] SIG.R = F517FAD6306989097AC3DFFEBBFBAD93F816FA42464022CC2ED7253D4E6E4D05A9A119A6140E98304587E795A5EF73EE
39,083,380 UART: [art] SIG.S = C0697CEDEBF64C5CC7E0718D81874393E456130E23504A05E95F2D01F0B141C25CC63F4A763CCB038759A948AF9A61B5
40,061,756 UART: Caliptra RT
40,062,472 UART: [state] CFI Enabled
42,857,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,858,955 UART: [rt] RT listening for mailbox commands...
42,890,186 UART: [rt]cmd =0x494e464f, len=4
42,894,352 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,379,270 ready_for_fw is high
3,379,672 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,499,846 >>> mbox cmd response: success
13,500,452 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,792,173 UART:
17,792,548 UART: Running Caliptra FMC ...
17,793,639 UART:
17,793,794 UART: [state] CFI Enabled
17,858,450 UART: [fht] FMC Alias Private Key: 7
19,621,859 UART: [art] Extend RT PCRs Done
19,623,059 UART: [art] Lock RT PCRs Done
19,624,884 UART: [art] Populate DV Done
19,630,299 UART: [fht] FMC Alias Private Key: 7
19,632,007 UART: [art] Derive CDI
19,632,844 UART: [art] Store in in slot 0x4
19,691,107 UART: [art] Derive Key Pair
19,692,107 UART: [art] Store priv key in slot 0x5
22,155,030 UART: [art] Derive Key Pair - Done
22,167,758 UART: [art] Signing Cert with AUTHO
22,169,056 UART: RITY.KEYID = 7
23,881,109 UART: [art] Erasing AUTHORITY.KEYID = 7
23,882,617 UART: [art] PUB.X = 4BD99FE67C228A181779498A85F15A520F98BA14EFADC8565E9F1FD6FDD30F9AD0C3C77278F7CCA6E581F1C40269C22D
23,889,919 UART: [art] PUB.Y = EADA13B106FA6112DBF9498700080A4BDAA7BBAD8B36F164EA7FBB7DD93E3AD26ADABFE2D7BED9C6E0FF404E2BDD6F47
23,897,195 UART: [art] SIG.R = 4ACFAE3F355FB93358D53DBA9FA9C2A296B635F8EA7D01D85F42130357BD383764DA3633D5A58B737D348A1DF6AEDBD5
23,904,580 UART: [art] SIG.S = 2536C28FB258D227783253D8989A19917BF870E0F4514189AF7DA2E58A0D0825AFBBD87FBEBCE7CCD0892DC2F1E54C51
24,882,856 UART: mbox::rt_entry...
24,883,796 UART: ____ _ _ _ ____ _____
24,885,772 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,887,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,889,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,891,532 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,893,465 UART: |_|
24,894,275 UART:
25,007,642 UART: [rt] Runtime listening for mailbox commands...
25,013,505 >>> mbox cmd response data (3272 bytes)
25,029,065 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,062,506 >>> mbox cmd response data (0 bytes)
27,121,185 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,253,835 >>> mbox cmd response: success
34,289,146 UART:
34,289,488 UART: Running Caliptra FMC ...
34,290,623 UART:
34,290,800 UART: [state] CFI Enabled
34,386,008 UART: [art] Extend RT PCRs Done
34,387,202 UART: [art] Lock RT PCRs Done
34,388,791 UART: [art] Populate DV Done
34,394,421 UART: [fht] FMC Alias Private Key: 7
34,396,115 UART: [art] Derive CDI
34,396,929 UART: [art] Store in in slot 0x4
34,454,328 UART: [art] Derive Key Pair
34,455,359 UART: [art] Store priv key in slot 0x5
36,918,309 UART: [art] Derive Key Pair - Done
36,931,363 UART: [art] Signing Cert with AUTHO
36,932,666 UART: RITY.KEYID = 7
38,644,134 UART: [art] Erasing AUTHORITY.KEYID = 7
38,645,642 UART: [art] PUB.X = 9A9235D9A8EF9FF2A92C12742F039D2D729219F54EC84F53D3FBCD7EC7C98E28BB8A29C2F2A6F731A4CE6FA82CE7C9AD
38,652,931 UART: [art] PUB.Y = B51EFAA30629CB328B2D439D4FBB62C48E964608D9F59E6754FD8A281E92C3E376BB93952E4EF01A9008FF465895AF8B
38,660,204 UART: [art] SIG.R = 49324769EC9500415D64802F2D5CBE993C906DD459F50B78AB8C7BF580D02AC0AEE34B8BFEEE603016B13090CA50E1A3
38,667,615 UART: [art] SIG.S = 428D2F84B603078BD81FDEF42B0006AB52210B19A5FBE21EBF881066DEB146627D287382542518032C416E5869DC88F7
39,646,492 UART: Caliptra RT
39,647,186 UART: [state] CFI Enabled
42,464,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,466,102 UART: [rt] RT listening for mailbox commands...
42,497,543 UART: [rt]cmd =0x494e464f, len=4
42,502,036 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,689 writing to cptra_bootfsm_go
192,992 UART:
193,345 UART: Running Caliptra ROM ...
194,517 UART:
604,039 UART: [state] CFI Enabled
614,086 UART: [state] LifecycleState = Unprovisioned
615,891 UART: [state] DebugLocked = No
618,205 UART: [state] WD Timer not started. Device not locked for debugging
622,307 UART: [kat] SHA2-256
801,383 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,966 UART: [kat] ++
813,500 UART: [kat] sha1
824,597 UART: [kat] SHA2-256
827,606 UART: [kat] SHA2-384
834,452 UART: [kat] SHA2-512-ACC
837,462 UART: [kat] ECC-384
3,280,154 UART: [kat] HMAC-384Kdf
3,291,163 UART: [kat] LMS
3,820,615 UART: [kat] --
3,824,837 UART: [cold-reset] ++
3,827,283 UART: [fht] FHT @ 0x50003400
3,837,414 UART: [idev] ++
3,837,989 UART: [idev] CDI.KEYID = 6
3,839,055 UART: [idev] SUBJECT.KEYID = 7
3,840,180 UART: [idev] UDS.KEYID = 0
3,841,086 ready_for_fw is high
3,841,286 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,940,047 UART: [idev] Erasing UDS.KEYID = 0
6,307,644 UART: [idev] Sha1 KeyId Algorithm
6,329,508 UART: [idev] --
6,334,015 UART: [ldev] ++
6,334,600 UART: [ldev] CDI.KEYID = 6
6,335,486 UART: [ldev] SUBJECT.KEYID = 5
6,336,700 UART: [ldev] AUTHORITY.KEYID = 7
6,337,929 UART: [ldev] FE.KEYID = 1
6,349,577 UART: [ldev] Erasing FE.KEYID = 1
8,827,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,243 UART: [ldev] --
10,618,070 UART: [fwproc] Wait for Commands...
10,621,241 UART: [fwproc] Recv command 0x46574c44
10,623,279 UART: [fwproc] Recv'd Img size: 78532 bytes
13,586,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,658,476 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,727,269 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,920,313 >>> mbox cmd response: success
13,920,788 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,925,221 UART: [afmc] ++
13,925,827 UART: [afmc] CDI.KEYID = 6
13,926,764 UART: [afmc] SUBJECT.KEYID = 7
13,927,928 UART: [afmc] AUTHORITY.KEYID = 5
16,423,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,145,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,147,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,163,455 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,179,464 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,195,343 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,219,038 UART: [afmc] --
18,222,365 UART: [cold-reset] --
18,227,308 UART: [state] Locking Datavault
18,231,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,233,058 UART: [state] Locking ICCM
18,235,857 UART: [exit] Launching FMC @ 0x40000130
18,244,264 UART:
18,244,571 UART: Running Caliptra FMC ...
18,245,706 UART:
18,245,872 UART: [state] CFI Enabled
18,253,684 UART: [fht] FMC Alias Private Key: 7
20,010,130 UART: [art] Extend RT PCRs Done
20,011,338 UART: [art] Lock RT PCRs Done
20,012,958 UART: [art] Populate DV Done
20,018,317 UART: [fht] FMC Alias Private Key: 7
20,019,801 UART: [art] Derive CDI
20,020,564 UART: [art] Store in in slot 0x4
20,063,083 UART: [art] Derive Key Pair
20,064,261 UART: [art] Store priv key in slot 0x5
22,490,710 UART: [art] Derive Key Pair - Done
22,503,869 UART: [art] Signing Cert with AUTHO
22,505,174 UART: RITY.KEYID = 7
24,210,455 UART: [art] Erasing AUTHORITY.KEYID = 7
24,211,934 UART: [art] PUB.X = 596AFEE4BA6FAA3E459FEAA0F0EA004DAB42A1319367686E0D87ABEC0B634940B29DB187A815FF1366854A1D1A7B3A2D
24,219,196 UART: [art] PUB.Y = 20D757CD5DA3FEDCD1E1D0EEB4C17585E712635185B573FBE69A6FAE90A055606313A8A647F5D75B619E9D985557FD50
24,226,484 UART: [art] SIG.R = 2995E5F36B330FC43599D3AE31810991C1122CE0C33EBA9F83BCFAA8E8295B32C495D04DE559A2960A0CD275F23F79B2
24,233,882 UART: [art] SIG.S = 7F449677530BD2FEE80F426C0A595B4AD7CD96BF03C422027E117CF232D5E0B6C6ADC04D3BF6B5E44D8E68A4012398AD
25,212,463 UART: mbox::rt_entry...
25,213,425 UART: ____ _ _ _ ____ _____
25,215,356 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,217,359 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,219,213 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,221,134 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,222,988 UART: |_|
25,223,867 UART:
25,337,046 UART: [rt] Runtime listening for mailbox commands...
25,342,891 >>> mbox cmd response data (3272 bytes)
25,358,386 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,392,024 >>> mbox cmd response data (0 bytes)
27,451,219 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,595,539 UART:
27,595,907 UART: Running Caliptra ROM ...
27,596,959 UART:
27,597,111 UART: [state] CFI Enabled
27,606,542 UART: [state] LifecycleState = Unprovisioned
27,608,414 UART: [state] DebugLocked = No
27,610,635 UART: [state] WD Timer not started. Device not locked for debugging
27,613,720 UART: [kat] SHA2-256
27,792,878 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,804,457 UART: [kat] ++
27,804,932 UART: [kat] sha1
27,815,550 UART: [kat] SHA2-256
27,818,579 UART: [kat] SHA2-384
27,824,946 UART: [kat] SHA2-512-ACC
27,827,888 UART: [kat] ECC-384
30,272,199 UART: [kat] HMAC-384Kdf
30,284,800 UART: [kat] LMS
30,814,305 UART: [kat] --
30,818,966 UART: [update-reset] ++
34,237,414 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,241,399 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,623,687 >>> mbox cmd response: success
34,628,275 UART: [update-reset] Copying MAN_2 To MAN_1
34,646,643 UART: [update-reset Success] --
34,650,233 UART: [state] Locking Datavault
34,653,014 UART: [state] Locking PCR0, PCR1 and PCR31
34,654,668 UART: [state] Locking ICCM
34,656,178 UART: [exit] Launching FMC @ 0x40000130
34,664,576 UART:
34,664,822 UART: Running Caliptra FMC ...
34,666,245 UART:
34,666,409 UART: [state] CFI Enabled
34,709,615 UART: [art] Extend RT PCRs Done
34,710,761 UART: [art] Lock RT PCRs Done
34,712,483 UART: [art] Populate DV Done
34,717,886 UART: [fht] FMC Alias Private Key: 7
34,719,452 UART: [art] Derive CDI
34,720,201 UART: [art] Store in in slot 0x4
34,762,926 UART: [art] Derive Key Pair
34,763,935 UART: [art] Store priv key in slot 0x5
37,191,163 UART: [art] Derive Key Pair - Done
37,204,383 UART: [art] Signing Cert with AUTHO
37,205,725 UART: RITY.KEYID = 7
38,911,806 UART: [art] Erasing AUTHORITY.KEYID = 7
38,913,298 UART: [art] PUB.X = F85BDF50E045C215555E238AF6FD9BB498C9A10C8B76F14EC9628CB87EB8E8874F6AC74FF2958F323E6EA4649658EBD2
38,920,552 UART: [art] PUB.Y = 6F1ED3BE62211E28A53934852C69EEB002BD8891C3F45C8569C45F7B8F8B3F15DE3189C0CA3A66F2156E64FA1DDA967C
38,927,854 UART: [art] SIG.R = E4FAFA45E0D5A3B8635807D57134EBC6EA5CB939B95816C7C10BD0B6E6A18FE7D2B8996AC599777A415C390D37A290C3
38,935,247 UART: [art] SIG.S = 6932A10EAFBDD23B87578BDBBDFA5ACA04CA640744BB058F67D723A410EA8B9390B414B4608EC38195D1C260ABEBDE16
39,913,773 UART: Caliptra RT
39,914,495 UART: [state] CFI Enabled
42,619,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,620,839 UART: [rt] RT listening for mailbox commands...
42,652,019 UART: [rt]cmd =0x494e464f, len=4
42,656,494 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,786 writing to cptra_bootfsm_go
3,694,540 ready_for_fw is high
3,694,956 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,699,465 >>> mbox cmd response: success
13,700,211 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,951,840 UART:
17,952,253 UART: Running Caliptra FMC ...
17,953,402 UART:
17,953,566 UART: [state] CFI Enabled
17,961,469 UART: [fht] FMC Alias Private Key: 7
19,717,878 UART: [art] Extend RT PCRs Done
19,719,381 UART: [art] Lock RT PCRs Done
19,720,501 UART: [art] Populate DV Done
19,725,929 UART: [fht] FMC Alias Private Key: 7
19,727,581 UART: [art] Derive CDI
19,728,423 UART: [art] Store in in slot 0x4
19,770,984 UART: [art] Derive Key Pair
19,771,985 UART: [art] Store priv key in slot 0x5
22,198,821 UART: [art] Derive Key Pair - Done
22,211,811 UART: [art] Signing Cert with AUTHO
22,213,124 UART: RITY.KEYID = 7
23,918,799 UART: [art] Erasing AUTHORITY.KEYID = 7
23,920,301 UART: [art] PUB.X = 2C711ED82B49E5F69F8AA110518288E7F36160ABFF032556AA2349D9DE37CED3B44DD942CAF8809A9B1AF1CE73EA4C6F
23,927,553 UART: [art] PUB.Y = BBE535BEA7086B4768B6DD9300A1C4BCBAF8CAD9188515AAC8EE05BF38B296AC019A6BAB9FE088D08980D8E7CD8FE2FB
23,934,849 UART: [art] SIG.R = 6F1C24E7AE930CBBE72705B59AB5D15FE86ADBC2E815BC789E57617BF6988F57D8992938D8FA26E6A2C47FD3A295C1DE
23,942,250 UART: [art] SIG.S = D7D9629E9DCC98499E46930BE1F381D628FC6A79DDCC78454113BC806EC400F35E19DD6FB863BBB2575AE0889996EB71
24,921,059 UART: mbox::rt_entry...
24,922,031 UART: ____ _ _ _ ____ _____
24,924,018 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,926,026 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,927,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,929,955 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,931,890 UART: |_|
24,932,743 UART:
25,046,305 UART: [rt] Runtime listening for mailbox commands...
25,052,157 >>> mbox cmd response data (3272 bytes)
25,067,916 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,101,582 >>> mbox cmd response data (0 bytes)
27,158,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,198,690 >>> mbox cmd response: success
34,233,092 UART:
34,233,414 UART: Running Caliptra FMC ...
34,234,536 UART:
34,234,727 UART: [state] CFI Enabled
34,278,453 UART: [art] Extend RT PCRs Done
34,279,650 UART: [art] Lock RT PCRs Done
34,280,954 UART: [art] Populate DV Done
34,286,691 UART: [fht] FMC Alias Private Key: 7
34,288,339 UART: [art] Derive CDI
34,289,151 UART: [art] Store in in slot 0x4
34,331,749 UART: [art] Derive Key Pair
34,332,754 UART: [art] Store priv key in slot 0x5
36,759,624 UART: [art] Derive Key Pair - Done
36,772,197 UART: [art] Signing Cert with AUTHO
36,773,512 UART: RITY.KEYID = 7
38,478,730 UART: [art] Erasing AUTHORITY.KEYID = 7
38,480,226 UART: [art] PUB.X = 8F73C926FFBE24F6B21886562B9E44233341478264B8E68A66452DFC8BBA03C10D630B7CF181444A8F8B2D51D46812EF
38,487,485 UART: [art] PUB.Y = 3DA97C014E55FB79E236B422BC2A1FFA94F8BF5B18F50DFD5B91557D6746C18DBBB97DB236C14CA0F2CBA0647C90714D
38,494,771 UART: [art] SIG.R = 5D73366F4722641949999D91875267C0D2B76E1E99673D4701997530694E7254DA16EDA21D2AB2CC3B8155CFDC3326A1
38,502,129 UART: [art] SIG.S = 59F3AB2DC352FBDE9A99F312D6CE01853F9ECAB5EE9778274D3713307E4C7BCF483F387610D8D32E2023A5A4CB2665BC
39,480,627 UART: Caliptra RT
39,481,339 UART: [state] CFI Enabled
42,186,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,188,227 UART: [rt] RT listening for mailbox commands...
42,219,615 UART: [rt]cmd =0x494e464f, len=4
42,223,868 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,097 UART:
192,482 UART: Running Caliptra ROM ...
193,660 UART:
193,817 UART: [state] CFI Enabled
266,855 UART: [state] LifecycleState = Unprovisioned
269,289 UART: [state] DebugLocked = No
271,324 UART: [state] WD Timer not started. Device not locked for debugging
276,437 UART: [kat] SHA2-256
466,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,113 UART: [kat] ++
477,566 UART: [kat] sha1
487,946 UART: [kat] SHA2-256
490,973 UART: [kat] SHA2-384
497,459 UART: [kat] SHA2-512-ACC
500,053 UART: [kat] ECC-384
2,949,394 UART: [kat] HMAC-384Kdf
2,972,227 UART: [kat] LMS
3,503,981 UART: [kat] --
3,508,971 UART: [cold-reset] ++
3,511,329 UART: [fht] FHT @ 0x50003400
3,524,081 UART: [idev] ++
3,524,801 UART: [idev] CDI.KEYID = 6
3,525,754 UART: [idev] SUBJECT.KEYID = 7
3,526,924 UART: [idev] UDS.KEYID = 0
3,527,825 ready_for_fw is high
3,528,045 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,627,042 UART: [idev] Erasing UDS.KEYID = 0
6,028,907 UART: [idev] Sha1 KeyId Algorithm
6,050,493 UART: [idev] --
6,055,962 UART: [ldev] ++
6,056,688 UART: [ldev] CDI.KEYID = 6
6,057,587 UART: [ldev] SUBJECT.KEYID = 5
6,058,706 UART: [ldev] AUTHORITY.KEYID = 7
6,060,001 UART: [ldev] FE.KEYID = 1
6,099,793 UART: [ldev] Erasing FE.KEYID = 1
8,603,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,092 UART: [ldev] --
10,412,065 UART: [fwproc] Wait for Commands...
10,415,077 UART: [fwproc] Recv command 0x46574c44
10,417,331 UART: [fwproc] Recv'd Img size: 78532 bytes
13,426,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,502,919 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,619,072 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,947,389 >>> mbox cmd response: success
13,947,869 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,951,195 UART: [afmc] ++
13,951,902 UART: [afmc] CDI.KEYID = 6
13,953,148 UART: [afmc] SUBJECT.KEYID = 7
13,954,585 UART: [afmc] AUTHORITY.KEYID = 5
16,489,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,213,893 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,215,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,231,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,246,119 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,261,133 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,286,464 UART: [afmc] --
18,289,544 UART: [cold-reset] --
18,293,511 UART: [state] Locking Datavault
18,298,478 UART: [state] Locking PCR0, PCR1 and PCR31
18,300,687 UART: [state] Locking ICCM
18,303,494 UART: [exit] Launching FMC @ 0x40000130
18,312,116 UART:
18,312,350 UART: Running Caliptra FMC ...
18,313,451 UART:
18,313,606 UART: [state] CFI Enabled
18,368,906 UART: [fht] FMC Alias Private Key: 7
20,133,378 UART: [art] Extend RT PCRs Done
20,134,601 UART: [art] Lock RT PCRs Done
20,136,448 UART: [art] Populate DV Done
20,141,695 UART: [fht] FMC Alias Private Key: 7
20,143,337 UART: [art] Derive CDI
20,144,147 UART: [art] Store in in slot 0x4
20,202,038 UART: [art] Derive Key Pair
20,203,045 UART: [art] Store priv key in slot 0x5
22,665,588 UART: [art] Derive Key Pair - Done
22,678,476 UART: [art] Signing Cert with AUTHO
22,679,777 UART: RITY.KEYID = 7
24,390,967 UART: [art] Erasing AUTHORITY.KEYID = 7
24,392,480 UART: [art] PUB.X = 57AC91B23F1F07AE98D2BDC6D6417975E062FC30E6E34CD08787AE5049E23B283582E54BEA099F127EECA166C1592806
24,399,740 UART: [art] PUB.Y = BDD3FD566F48DBAAA8D80155E5DA964483AE87615519EB4C62655FA0D631AE15DE51872E1D112D7A748ECB6671F01C32
24,406,988 UART: [art] SIG.R = 8FEBB69CB7963332C10D11B4ABD03752C178B33632DA9289CE5B7A2EDB88983367C0FDCB2E8E605E4B225711A0808082
24,414,396 UART: [art] SIG.S = A9A2436A8DB34511A785C7D36107696FED52A2FD4F7FD323BECB3DBFBA4821A19438149F360D42B0590154D96B092013
25,392,779 UART: mbox::rt_entry...
25,393,750 UART: ____ _ _ _ ____ _____
25,395,735 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,397,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,399,675 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,401,603 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,403,551 UART: |_|
25,404,387 UART:
25,517,445 UART: [rt] Runtime listening for mailbox commands...
25,523,248 >>> mbox cmd response data (3272 bytes)
25,538,948 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,572,523 >>> mbox cmd response data (0 bytes)
27,638,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,783,343 UART:
27,783,739 UART: Running Caliptra ROM ...
27,784,837 UART:
27,785,025 UART: [state] CFI Enabled
27,846,095 UART: [state] LifecycleState = Unprovisioned
27,848,202 UART: [state] DebugLocked = No
27,849,972 UART: [state] WD Timer not started. Device not locked for debugging
27,854,720 UART: [kat] SHA2-256
28,044,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,055,348 UART: [kat] ++
28,055,835 UART: [kat] sha1
28,067,054 UART: [kat] SHA2-256
28,070,034 UART: [kat] SHA2-384
28,077,436 UART: [kat] SHA2-512-ACC
28,080,021 UART: [kat] ECC-384
30,529,154 UART: [kat] HMAC-384Kdf
30,550,858 UART: [kat] LMS
31,082,398 UART: [kat] --
31,086,063 UART: [update-reset] ++
34,534,489 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,537,981 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,144,554 >>> mbox cmd response: success
35,149,201 UART: [update-reset] Copying MAN_2 To MAN_1
35,183,999 UART: [update-reset Success] --
35,188,069 UART: [state] Locking Datavault
35,192,220 UART: [state] Locking PCR0, PCR1 and PCR31
35,194,383 UART: [state] Locking ICCM
35,196,900 UART: [exit] Launching FMC @ 0x40000130
35,205,584 UART:
35,205,823 UART: Running Caliptra FMC ...
35,206,918 UART:
35,207,088 UART: [state] CFI Enabled
35,297,076 UART: [art] Extend RT PCRs Done
35,298,272 UART: [art] Lock RT PCRs Done
35,300,078 UART: [art] Populate DV Done
35,305,917 UART: [fht] FMC Alias Private Key: 7
35,307,612 UART: [art] Derive CDI
35,308,355 UART: [art] Store in in slot 0x4
35,366,342 UART: [art] Derive Key Pair
35,367,388 UART: [art] Store priv key in slot 0x5
37,830,003 UART: [art] Derive Key Pair - Done
37,842,849 UART: [art] Signing Cert with AUTHO
37,844,153 UART: RITY.KEYID = 7
39,555,376 UART: [art] Erasing AUTHORITY.KEYID = 7
39,556,863 UART: [art] PUB.X = 74B8F8800A8DE33FAA5B1AFC65E5A5FA48DB0D342DFA159EE3267EE2664DE03BA4F7E9FA38A937C77BE96C03F3CB5F70
39,564,186 UART: [art] PUB.Y = 8F75AF7E2616875E0A14943EC67443BA07307E6289E7B4F17901AC70F6006BBDE06BC0F4B58C7D8A318763CCDA0E04D4
39,571,400 UART: [art] SIG.R = 5559A3826E5DB356CAB6F58CC07D2864DF8BC728ADEDBE06784D9E9896DF093556B8C012D69C5C919C59F3B16FB4DC36
39,578,873 UART: [art] SIG.S = 857D72D7543A23983A0D47AE3FE4C9FAB80A841D0C3778C4655CD4E1DBC03D06ED29F522A6628E09CCFFE0E182F5CE83
40,557,278 UART: Caliptra RT
40,557,987 UART: [state] CFI Enabled
43,354,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,356,163 UART: [rt] RT listening for mailbox commands...
43,387,658 UART: [rt]cmd =0x494e464f, len=4
43,392,095 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,438,074 ready_for_fw is high
3,438,465 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,968,521 >>> mbox cmd response: success
13,969,055 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,254,472 UART:
18,254,872 UART: Running Caliptra FMC ...
18,255,969 UART:
18,256,124 UART: [state] CFI Enabled
18,322,991 UART: [fht] FMC Alias Private Key: 7
20,086,922 UART: [art] Extend RT PCRs Done
20,088,173 UART: [art] Lock RT PCRs Done
20,089,831 UART: [art] Populate DV Done
20,095,363 UART: [fht] FMC Alias Private Key: 7
20,097,075 UART: [art] Derive CDI
20,097,819 UART: [art] Store in in slot 0x4
20,155,493 UART: [art] Derive Key Pair
20,156,536 UART: [art] Store priv key in slot 0x5
22,619,815 UART: [art] Derive Key Pair - Done
22,632,868 UART: [art] Signing Cert with AUTHO
22,634,171 UART: RITY.KEYID = 7
24,345,952 UART: [art] Erasing AUTHORITY.KEYID = 7
24,347,454 UART: [art] PUB.X = 6F534AD9D71F6E4D31F7DAD831F777715624E9AD5BCD1D503E5655A8A75CC2580DFAFBE7DA33046331F994F80F5358BA
24,354,762 UART: [art] PUB.Y = 3774A035B5B764812BA93D7A270D934927B717CED07563F09EE8E073DE8CE0509327002EA15AEB1719490B622682ACC4
24,361,998 UART: [art] SIG.R = 92419817612B0CACBF57AD47D773BC155B9C9DAA7CD661999BA31B8596A9FC2B9D5E1A412A60603D76103201653A12BB
24,369,339 UART: [art] SIG.S = 57871213D1C3A71EEF10198C4C24D42F015ADC27F9CB53A1EB35182FAAA82EA0192233DF5C474DB8BE56E2C40ED95726
25,347,673 UART: mbox::rt_entry...
25,348,645 UART: ____ _ _ _ ____ _____
25,350,542 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,352,542 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,354,592 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,356,555 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,358,412 UART: |_|
25,359,239 UART:
25,472,903 UART: [rt] Runtime listening for mailbox commands...
25,478,757 >>> mbox cmd response data (3272 bytes)
25,494,524 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,528,028 >>> mbox cmd response data (0 bytes)
27,588,573 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,408,583 >>> mbox cmd response: success
35,442,136 UART:
35,442,472 UART: Running Caliptra FMC ...
35,443,521 UART:
35,443,674 UART: [state] CFI Enabled
35,531,782 UART: [art] Extend RT PCRs Done
35,532,964 UART: [art] Lock RT PCRs Done
35,534,515 UART: [art] Populate DV Done
35,539,976 UART: [fht] FMC Alias Private Key: 7
35,541,513 UART: [art] Derive CDI
35,542,248 UART: [art] Store in in slot 0x4
35,601,338 UART: [art] Derive Key Pair
35,602,377 UART: [art] Store priv key in slot 0x5
38,065,579 UART: [art] Derive Key Pair - Done
38,078,317 UART: [art] Signing Cert with AUTHO
38,079,625 UART: RITY.KEYID = 7
39,790,487 UART: [art] Erasing AUTHORITY.KEYID = 7
39,791,995 UART: [art] PUB.X = DC1F9D5C12E6534E872C50B2640AEA4DE88794B1265C48ADE21122D7209DF2D53D01F88B820BFE87205E14256173C3A0
39,799,226 UART: [art] PUB.Y = 1BE6DD3390E2CDD28EB7C7E6902499D509603081CE3B043C80435E05573F8475F2B2BD9F13E23F5B3405E2D6093F41FF
39,806,503 UART: [art] SIG.R = 3A14EEE791A7BC11BE0A85F0D26532FE8159DF9AC2473A6940EF6331069DD9284E18209C8A1B40F1C39891C52C9F4E2E
39,813,881 UART: [art] SIG.S = 4F6D07504AD7C0530E6C1A421826D0933F7AF8D21F008239F78E1F80DADB25B19C90A2CEFBD46C83ED697A963A98949D
40,793,076 UART: Caliptra RT
40,793,792 UART: [state] CFI Enabled
43,609,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,611,507 UART: [rt] RT listening for mailbox commands...
43,642,874 UART: [rt]cmd =0x494e464f, len=4
43,647,207 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,678 writing to cptra_bootfsm_go
192,804 UART:
193,174 UART: Running Caliptra ROM ...
194,308 UART:
604,027 UART: [state] CFI Enabled
617,689 UART: [state] LifecycleState = Unprovisioned
620,060 UART: [state] DebugLocked = No
621,951 UART: [state] WD Timer not started. Device not locked for debugging
625,841 UART: [kat] SHA2-256
815,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,529 UART: [kat] ++
826,971 UART: [kat] sha1
838,628 UART: [kat] SHA2-256
841,633 UART: [kat] SHA2-384
848,118 UART: [kat] SHA2-512-ACC
850,708 UART: [kat] ECC-384
3,292,230 UART: [kat] HMAC-384Kdf
3,305,301 UART: [kat] LMS
3,837,160 UART: [kat] --
3,843,067 UART: [cold-reset] ++
3,844,362 UART: [fht] FHT @ 0x50003400
3,855,496 UART: [idev] ++
3,856,237 UART: [idev] CDI.KEYID = 6
3,857,151 UART: [idev] SUBJECT.KEYID = 7
3,858,397 UART: [idev] UDS.KEYID = 0
3,859,587 ready_for_fw is high
3,859,800 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,958,559 UART: [idev] Erasing UDS.KEYID = 0
6,331,309 UART: [idev] Sha1 KeyId Algorithm
6,354,609 UART: [idev] --
6,360,581 UART: [ldev] ++
6,361,267 UART: [ldev] CDI.KEYID = 6
6,362,201 UART: [ldev] SUBJECT.KEYID = 5
6,363,363 UART: [ldev] AUTHORITY.KEYID = 7
6,364,594 UART: [ldev] FE.KEYID = 1
6,374,053 UART: [ldev] Erasing FE.KEYID = 1
8,853,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,072 UART: [ldev] --
10,646,935 UART: [fwproc] Wait for Commands...
10,649,675 UART: [fwproc] Recv command 0x46574c44
10,651,932 UART: [fwproc] Recv'd Img size: 78532 bytes
13,657,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,734,685 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,850,838 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,178,265 >>> mbox cmd response: success
14,178,745 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,182,075 UART: [afmc] ++
14,182,782 UART: [afmc] CDI.KEYID = 6
14,183,946 UART: [afmc] SUBJECT.KEYID = 7
14,185,501 UART: [afmc] AUTHORITY.KEYID = 5
16,688,455 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,408,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,410,907 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,426,113 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,441,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,456,271 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,480,728 UART: [afmc] --
18,485,125 UART: [cold-reset] --
18,488,723 UART: [state] Locking Datavault
18,494,580 UART: [state] Locking PCR0, PCR1 and PCR31
18,496,772 UART: [state] Locking ICCM
18,498,370 UART: [exit] Launching FMC @ 0x40000130
18,507,045 UART:
18,507,290 UART: Running Caliptra FMC ...
18,508,318 UART:
18,508,465 UART: [state] CFI Enabled
18,516,325 UART: [fht] FMC Alias Private Key: 7
20,273,105 UART: [art] Extend RT PCRs Done
20,274,336 UART: [art] Lock RT PCRs Done
20,276,005 UART: [art] Populate DV Done
20,281,477 UART: [fht] FMC Alias Private Key: 7
20,283,175 UART: [art] Derive CDI
20,283,912 UART: [art] Store in in slot 0x4
20,326,336 UART: [art] Derive Key Pair
20,327,336 UART: [art] Store priv key in slot 0x5
22,754,144 UART: [art] Derive Key Pair - Done
22,767,096 UART: [art] Signing Cert with AUTHO
22,768,406 UART: RITY.KEYID = 7
24,473,718 UART: [art] Erasing AUTHORITY.KEYID = 7
24,475,222 UART: [art] PUB.X = D0FD5B644D075F9700B2AA06CDC86EDABEA7441828AF2F0BFE9B08FE58B66BBDEDA677F49DB05AE32E385AC5AE687346
24,482,525 UART: [art] PUB.Y = 3B20581FE9F79E55290D33A49859F60823D2A527D1C036CC79917F5F4C0E99C33D487482A1E41EDE396F64FCB738E3FE
24,489,759 UART: [art] SIG.R = ECD111736305D9A6320A0A8E5002B7F853FEF6AE2EEBF060B687CBB42812655B85ABC1A96BC0D8C165D0552EC22B117B
24,497,184 UART: [art] SIG.S = 73F7BEE904A1CA49D4621941E237208420045A2B16A34D24FF02A48640A31ADBE93ACD86DD83BCB085C279CFFA8D66D8
25,475,450 UART: mbox::rt_entry...
25,476,404 UART: ____ _ _ _ ____ _____
25,478,387 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,480,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,482,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,484,248 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,486,178 UART: |_|
25,486,990 UART:
25,600,222 UART: [rt] Runtime listening for mailbox commands...
25,606,084 >>> mbox cmd response data (3272 bytes)
25,621,783 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,655,257 >>> mbox cmd response data (0 bytes)
27,713,186 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,857,562 UART:
27,857,929 UART: Running Caliptra ROM ...
27,859,025 UART:
27,859,190 UART: [state] CFI Enabled
27,874,276 UART: [state] LifecycleState = Unprovisioned
27,876,163 UART: [state] DebugLocked = No
27,878,542 UART: [state] WD Timer not started. Device not locked for debugging
27,883,173 UART: [kat] SHA2-256
28,073,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,083,821 UART: [kat] ++
28,084,416 UART: [kat] sha1
28,094,887 UART: [kat] SHA2-256
28,097,956 UART: [kat] SHA2-384
28,103,518 UART: [kat] SHA2-512-ACC
28,106,090 UART: [kat] ECC-384
30,547,325 UART: [kat] HMAC-384Kdf
30,560,442 UART: [kat] LMS
31,092,067 UART: [kat] --
31,097,418 UART: [update-reset] ++
34,552,352 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,555,785 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,162,335 >>> mbox cmd response: success
35,166,905 UART: [update-reset] Copying MAN_2 To MAN_1
35,201,572 UART: [update-reset Success] --
35,205,621 UART: [state] Locking Datavault
35,210,454 UART: [state] Locking PCR0, PCR1 and PCR31
35,212,652 UART: [state] Locking ICCM
35,215,062 UART: [exit] Launching FMC @ 0x40000130
35,223,708 UART:
35,223,956 UART: Running Caliptra FMC ...
35,225,130 UART:
35,225,293 UART: [state] CFI Enabled
35,269,042 UART: [art] Extend RT PCRs Done
35,270,191 UART: [art] Lock RT PCRs Done
35,271,604 UART: [art] Populate DV Done
35,277,276 UART: [fht] FMC Alias Private Key: 7
35,278,922 UART: [art] Derive CDI
35,279,733 UART: [art] Store in in slot 0x4
35,322,424 UART: [art] Derive Key Pair
35,323,473 UART: [art] Store priv key in slot 0x5
37,750,529 UART: [art] Derive Key Pair - Done
37,763,164 UART: [art] Signing Cert with AUTHO
37,764,477 UART: RITY.KEYID = 7
39,469,552 UART: [art] Erasing AUTHORITY.KEYID = 7
39,471,060 UART: [art] PUB.X = 7FC187E03C6EB065A7D54A8A6DE3F90C01C5D95443FCF7E753473F86000240A05FDC3F90D1B60C3FFE50993E2A9804DF
39,478,319 UART: [art] PUB.Y = FC3643EDB8119B80BD5929BD7EB175CD5E79119CE4C04E7556999B23E033F9EA98B6D98C19BF854C7E987FB63624AC55
39,485,601 UART: [art] SIG.R = BD4C95DC39F72E9C382D7A5FAF771CE6F522963D67B189D4119922B66A65E6B0FC21418BC5946C9E1FA920AA8A455CB4
39,492,940 UART: [art] SIG.S = 368702E6F1FA9CA414F86B0DE68DCCCFE465696290919438CD4A6FAE397D5C43479AD1A439629A26E304B055EBF299CA
40,471,560 UART: Caliptra RT
40,472,261 UART: [state] CFI Enabled
43,175,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,176,808 UART: [rt] RT listening for mailbox commands...
43,208,479 UART: [rt]cmd =0x494e464f, len=4
43,212,971 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,928 writing to cptra_bootfsm_go
3,761,016 ready_for_fw is high
3,761,614 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,190,226 >>> mbox cmd response: success
14,190,863 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,443,309 UART:
18,443,706 UART: Running Caliptra FMC ...
18,444,831 UART:
18,444,997 UART: [state] CFI Enabled
18,453,008 UART: [fht] FMC Alias Private Key: 7
20,209,998 UART: [art] Extend RT PCRs Done
20,211,209 UART: [art] Lock RT PCRs Done
20,213,123 UART: [art] Populate DV Done
20,218,291 UART: [fht] FMC Alias Private Key: 7
20,219,994 UART: [art] Derive CDI
20,220,736 UART: [art] Store in in slot 0x4
20,262,744 UART: [art] Derive Key Pair
20,263,787 UART: [art] Store priv key in slot 0x5
22,690,573 UART: [art] Derive Key Pair - Done
22,703,787 UART: [art] Signing Cert with AUTHO
22,705,086 UART: RITY.KEYID = 7
24,411,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,511 UART: [art] PUB.X = C2EC7A0683322186EF573B70C9A5115618F0FB70DE528784466209468A4E90599BB48AC0BAB2C409B92F853FC02AA603
24,419,805 UART: [art] PUB.Y = 4BF22A829EE42C97F03C1D4CC2971C699A92BE0696ADD9B788E68B5C6FF6A3A576F3AB967FEE394DDFB008BED984AF83
24,427,106 UART: [art] SIG.R = F1B313DD1D41085514ACE34846B9CB8A23890DAD10E39B792427C49A3478569A2A0F5860305A59147EB10858E74E1642
24,434,460 UART: [art] SIG.S = BA277ADC096247BF9AFD17B367ED5D87DD221E90BD79A71747D4B66315CF6F0498E6B8957E3428FDCA67FFAF79AE8D1B
25,412,968 UART: mbox::rt_entry...
25,413,938 UART: ____ _ _ _ ____ _____
25,415,928 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,417,943 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,419,874 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,421,839 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,423,772 UART: |_|
25,424,584 UART:
25,537,789 UART: [rt] Runtime listening for mailbox commands...
25,543,624 >>> mbox cmd response data (3272 bytes)
25,559,444 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,592,895 >>> mbox cmd response data (0 bytes)
27,650,455 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,372,176 >>> mbox cmd response: success
35,408,451 UART:
35,408,793 UART: Running Caliptra FMC ...
35,409,848 UART:
35,410,001 UART: [state] CFI Enabled
35,453,820 UART: [art] Extend RT PCRs Done
35,454,967 UART: [art] Lock RT PCRs Done
35,456,245 UART: [art] Populate DV Done
35,461,652 UART: [fht] FMC Alias Private Key: 7
35,463,238 UART: [art] Derive CDI
35,463,981 UART: [art] Store in in slot 0x4
35,506,486 UART: [art] Derive Key Pair
35,507,484 UART: [art] Store priv key in slot 0x5
37,934,278 UART: [art] Derive Key Pair - Done
37,947,319 UART: [art] Signing Cert with AUTHO
37,948,645 UART: RITY.KEYID = 7
39,653,963 UART: [art] Erasing AUTHORITY.KEYID = 7
39,655,478 UART: [art] PUB.X = 1CDB9B7D6D577D71D1562E9E936C91541273B522103B385347D25E24B40115506ED79166C2ED7675F3031BFC6F325E16
39,662,730 UART: [art] PUB.Y = B0D9EA21D3F4C0567CBFC4D5024599E3339913697F4DA95EC288FD6C9AF050F7C23F13706B032B0CE8A8C5D30D9ADC9B
39,670,010 UART: [art] SIG.R = 22FBB311898395630CD64D8F5C467D0949558C048A49D94DD83DF40A3887296835CF2A1C9C85FAF646C8F9C172C3DAFD
39,677,403 UART: [art] SIG.S = 59A75543F8B8D919F549292BD6B924649D81A7C4A89BEAE98DED35B610789D20321D2B2DB20256625D9119026B8FAF12
40,656,320 UART: Caliptra RT
40,657,024 UART: [state] CFI Enabled
43,362,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,363,731 UART: [rt] RT listening for mailbox commands...
43,395,197 UART: [rt]cmd =0x494e464f, len=4
43,399,527 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,243 UART: [kat] SHA2-256
892,181 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
901,818 UART: [kat] HMAC-384Kdf
906,376 UART: [kat] LMS
1,474,572 UART: [kat] --
1,475,361 UART: [cold-reset] ++
1,475,853 UART: [fht] Storing FHT @ 0x50003400
1,478,466 UART: [idev] ++
1,478,634 UART: [idev] CDI.KEYID = 6
1,478,994 UART: [idev] SUBJECT.KEYID = 7
1,479,418 UART: [idev] UDS.KEYID = 0
1,479,763 ready_for_fw is high
1,479,763 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,487,364 UART: [idev] Erasing UDS.KEYID = 0
1,503,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,270 UART: [idev] --
1,513,357 UART: [ldev] ++
1,513,525 UART: [ldev] CDI.KEYID = 6
1,513,888 UART: [ldev] SUBJECT.KEYID = 5
1,514,314 UART: [ldev] AUTHORITY.KEYID = 7
1,514,777 UART: [ldev] FE.KEYID = 1
1,519,961 UART: [ldev] Erasing FE.KEYID = 1
1,545,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,646 UART: [ldev] --
1,584,087 UART: [fwproc] Waiting for Commands...
1,584,706 UART: [fwproc] Received command 0x46574c44
1,585,497 UART: [fwproc] Received Image of size 78532 bytes
2,474,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,501,203 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,530,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,612,736 >>> mbox cmd response: success
2,612,736 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,613,854 UART: [afmc] ++
2,614,022 UART: [afmc] CDI.KEYID = 6
2,614,384 UART: [afmc] SUBJECT.KEYID = 7
2,614,809 UART: [afmc] AUTHORITY.KEYID = 5
2,649,812 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,440 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,667,220 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,672,948 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,678,833 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,523 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,340 UART: [afmc] --
2,693,264 UART: [cold-reset] --
2,694,258 UART: [state] Locking Datavault
2,695,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,113 UART: [state] Locking ICCM
2,696,643 UART: [exit] Launching FMC @ 0x40000130
2,701,972 UART:
2,701,988 UART: Running Caliptra FMC ...
2,702,396 UART:
2,702,450 UART: [state] CFI Enabled
2,712,713 UART: [fht] FMC Alias Private Key: 7
2,820,888 UART: [art] Extend RT PCRs Done
2,821,316 UART: [art] Lock RT PCRs Done
2,822,922 UART: [art] Populate DV Done
2,830,949 UART: [fht] FMC Alias Private Key: 7
2,832,019 UART: [art] Derive CDI
2,832,299 UART: [art] Store in in slot 0x4
2,918,010 UART: [art] Derive Key Pair
2,918,370 UART: [art] Store priv key in slot 0x5
2,931,926 UART: [art] Derive Key Pair - Done
2,946,637 UART: [art] Signing Cert with AUTHO
2,947,117 UART: RITY.KEYID = 7
2,962,011 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,776 UART: [art] PUB.X = 7DA5C1EA012E11016C51C0071DA92240805340CB3AE48A226087F2105D34DE7437CAF8A1866B8EF12F9E31530CAA6370
2,969,534 UART: [art] PUB.Y = 48EA6E885DA94B069F0C3D2AD2C7CDA4C431400CCC1726E29DD7F3F9977CBD3A3728790BDC2C51829F815CA8F0AA05B3
2,976,485 UART: [art] SIG.R = 38ADC786F41CF9C9C975E6948FDF262BFBE071D95F2A59C6055CC0BF1DFEA48D96AFD0EC84B668F1DC24901D6BC99BBF
2,983,278 UART: [art] SIG.S = 5CE30A8EE111C1C3CC06EC650BFDCB2097FC5BF15D1D10EEC268D2E1EFB48F0BAEA155168FA6D1B4499A55B94F5243C5
3,006,813 UART: mbox::rt_entry...
3,007,185 UART: ____ _ _ _ ____ _____
3,007,969 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,008,769 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,009,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,305 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,073 UART: |_|
3,011,385 UART:
3,118,628 UART: [rt] Runtime listening for mailbox commands...
3,123,596 >>> mbox cmd response data (3272 bytes)
3,123,597 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,146,683 >>> mbox cmd response data (0 bytes)
3,146,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,146,804 UART:
3,146,820 UART: Running Caliptra ROM ...
3,147,228 UART:
3,147,282 UART: [state] CFI Enabled
3,150,066 UART: [state] LifecycleState = Unprovisioned
3,150,721 UART: [state] DebugLocked = No
3,151,363 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,152,872 UART: [kat] SHA2-256
3,946,803 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,950,918 UART: [kat] ++
3,951,070 UART: [kat] sha1
3,955,352 UART: [kat] SHA2-256
3,957,290 UART: [kat] SHA2-384
3,960,057 UART: [kat] SHA2-512-ACC
3,961,957 UART: [kat] ECC-384
3,967,506 UART: [kat] HMAC-384Kdf
3,972,046 UART: [kat] LMS
4,540,242 UART: [kat] --
4,541,097 UART: [update-reset] ++
5,874,361 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,875,519 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,025,149 >>> mbox cmd response: success
6,025,390 UART: [update-reset] Copying MAN_2 To MAN_1
6,033,404 UART: [update-reset Success] --
6,034,267 UART: [state] Locking Datavault
6,035,181 UART: [state] Locking PCR0, PCR1 and PCR31
6,035,785 UART: [state] Locking ICCM
6,036,213 UART: [exit] Launching FMC @ 0x40000130
6,041,542 UART:
6,041,558 UART: Running Caliptra FMC ...
6,041,966 UART:
6,042,020 UART: [state] CFI Enabled
6,130,727 UART: [art] Extend RT PCRs Done
6,131,155 UART: [art] Lock RT PCRs Done
6,132,564 UART: [art] Populate DV Done
6,140,735 UART: [fht] FMC Alias Private Key: 7
6,141,685 UART: [art] Derive CDI
6,141,965 UART: [art] Store in in slot 0x4
6,227,920 UART: [art] Derive Key Pair
6,228,280 UART: [art] Store priv key in slot 0x5
6,241,582 UART: [art] Derive Key Pair - Done
6,256,762 UART: [art] Signing Cert with AUTHO
6,257,242 UART: RITY.KEYID = 7
6,272,186 UART: [art] Erasing AUTHORITY.KEYID = 7
6,272,951 UART: [art] PUB.X = 08636F562E04B16B23CC9978E29DE6239DD1AC391514C1DE6866CD69BC2C05AFA6C01F10C2FA6C1A93E9F621916E1ECB
6,279,724 UART: [art] PUB.Y = 56D418DED9777BC4DB035BD49E585BDC2B0015BAC9A493460B9FE32826D9B3298A5491BF5496700F0E9EFB5BE9E99551
6,286,648 UART: [art] SIG.R = 6F9D62D2F794D6877CC2C0E007A937CB3E748FDD2FE3B53FC9DD348B5B1C8AFB7094DBB602EF179312E1B6F7E04F68D8
6,293,430 UART: [art] SIG.S = F692EFF57B5FA3A78FA825D64C36B6518C16DFAA31C08AF59A8435E57F78618C52F2FEE501A714B88B7693B780B5D109
6,317,497 UART: Caliptra RT
6,317,750 UART: [state] CFI Enabled
6,604,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,605,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,636,214 UART: [rt]cmd =0x494e464f, len=4
6,639,951 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,749 ready_for_fw is high
1,362,749 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,464,780 >>> mbox cmd response: success
2,464,780 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,526,742 UART:
2,526,758 UART: Running Caliptra FMC ...
2,527,166 UART:
2,527,220 UART: [state] CFI Enabled
2,537,793 UART: [fht] FMC Alias Private Key: 7
2,645,908 UART: [art] Extend RT PCRs Done
2,646,336 UART: [art] Lock RT PCRs Done
2,647,912 UART: [art] Populate DV Done
2,656,041 UART: [fht] FMC Alias Private Key: 7
2,656,971 UART: [art] Derive CDI
2,657,251 UART: [art] Store in in slot 0x4
2,743,064 UART: [art] Derive Key Pair
2,743,424 UART: [art] Store priv key in slot 0x5
2,756,302 UART: [art] Derive Key Pair - Done
2,771,151 UART: [art] Signing Cert with AUTHO
2,771,631 UART: RITY.KEYID = 7
2,787,017 UART: [art] Erasing AUTHORITY.KEYID = 7
2,787,782 UART: [art] PUB.X = 5069B5394A44C1C1029BCFCBE793D7359322382A45D6C420056F1AD09B3A63EB8BB7934E323E94C439BF3C688868A55F
2,794,546 UART: [art] PUB.Y = 927E50CD90B5C1A5A57D4215CE9E54D8E49C3634C965EEDE4FFE39DA4FD83801FAC5E212C6CB91A5B2B8A25B2F1795EA
2,801,513 UART: [art] SIG.R = FED2B5E0DA085D37187C0F5F5A6EA31F0D8FE1FFB05FC722501A198D44F5B48547DCB007F9E2D5F052883168E132DFC0
2,808,285 UART: [art] SIG.S = 846401F3CC4240BFBDA902DC47B307C724FAF1428860981A3F4D926BE10EECC70100BD4AE476688E858AF78BAE0C243F
2,832,378 UART: mbox::rt_entry...
2,832,750 UART: ____ _ _ _ ____ _____
2,833,534 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,334 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,102 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,835,870 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,836,638 UART: |_|
2,836,950 UART:
2,943,957 UART: [rt] Runtime listening for mailbox commands...
2,948,925 >>> mbox cmd response data (3272 bytes)
2,948,926 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,972,012 >>> mbox cmd response data (0 bytes)
2,972,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,731,416 >>> mbox cmd response: success
5,744,973 UART:
5,744,989 UART: Running Caliptra FMC ...
5,745,397 UART:
5,745,451 UART: [state] CFI Enabled
5,834,606 UART: [art] Extend RT PCRs Done
5,835,034 UART: [art] Lock RT PCRs Done
5,836,307 UART: [art] Populate DV Done
5,844,552 UART: [fht] FMC Alias Private Key: 7
5,845,550 UART: [art] Derive CDI
5,845,830 UART: [art] Store in in slot 0x4
5,931,235 UART: [art] Derive Key Pair
5,931,595 UART: [art] Store priv key in slot 0x5
5,944,201 UART: [art] Derive Key Pair - Done
5,959,284 UART: [art] Signing Cert with AUTHO
5,959,764 UART: RITY.KEYID = 7
5,975,108 UART: [art] Erasing AUTHORITY.KEYID = 7
5,975,873 UART: [art] PUB.X = 4EFA09B0303DCF177E7E54485985964972EAB9236FF53C4208DBFC7C6E5FEE89BFE3A25A35668A929F2637FBCB0B5F35
5,982,646 UART: [art] PUB.Y = F5FB2A31174CFF965B4457EE44FA7608D16647619CC864A686CEB98DAB1A986E1E288F75235F68923992F15C2228D818
5,989,591 UART: [art] SIG.R = 8CD6D48C6B6C6B5CCDE5521D735418E783DE1ACC144F5585CACC8CCAA6346C7BBE89EE18B743DE48CBAF62DF24609632
5,996,383 UART: [art] SIG.S = F51638F60F1CAEEA4A3E40A07953FF3A3E7119E7149F588CE1668A833E5F50F88B886B7388F89AFE80F2AEE8CA624B8E
6,020,015 UART: Caliptra RT
6,020,268 UART: [state] CFI Enabled
6,310,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,311,697 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,342,211 UART: [rt]cmd =0x494e464f, len=4
6,345,930 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,330 UART: [kat] SHA2-256
882,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,376 UART: [kat] ++
886,528 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,129 UART: [kat] SHA2-512-ACC
897,030 UART: [kat] ECC-384
902,731 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,588 UART: [cold-reset] ++
1,477,064 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 ready_for_fw is high
1,481,310 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,489,093 UART: [idev] Erasing UDS.KEYID = 0
1,506,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,765 UART: [idev] --
1,515,664 UART: [ldev] ++
1,515,832 UART: [ldev] CDI.KEYID = 6
1,516,195 UART: [ldev] SUBJECT.KEYID = 5
1,516,621 UART: [ldev] AUTHORITY.KEYID = 7
1,517,084 UART: [ldev] FE.KEYID = 1
1,522,502 UART: [ldev] Erasing FE.KEYID = 1
1,548,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,921 UART: [ldev] --
1,587,412 UART: [fwproc] Waiting for Commands...
1,588,101 UART: [fwproc] Received command 0x46574c44
1,588,892 UART: [fwproc] Received Image of size 78532 bytes
2,475,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,284 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,613,881 >>> mbox cmd response: success
2,613,881 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,615,103 UART: [afmc] ++
2,615,271 UART: [afmc] CDI.KEYID = 6
2,615,633 UART: [afmc] SUBJECT.KEYID = 7
2,616,058 UART: [afmc] AUTHORITY.KEYID = 5
2,651,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,915 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,308 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,998 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,693,709 UART: [afmc] --
2,694,671 UART: [cold-reset] --
2,695,615 UART: [state] Locking Datavault
2,696,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,428 UART: [state] Locking ICCM
2,698,048 UART: [exit] Launching FMC @ 0x40000130
2,703,377 UART:
2,703,393 UART: Running Caliptra FMC ...
2,703,801 UART:
2,703,944 UART: [state] CFI Enabled
2,714,259 UART: [fht] FMC Alias Private Key: 7
2,822,268 UART: [art] Extend RT PCRs Done
2,822,696 UART: [art] Lock RT PCRs Done
2,824,274 UART: [art] Populate DV Done
2,832,733 UART: [fht] FMC Alias Private Key: 7
2,833,667 UART: [art] Derive CDI
2,833,947 UART: [art] Store in in slot 0x4
2,919,462 UART: [art] Derive Key Pair
2,919,822 UART: [art] Store priv key in slot 0x5
2,933,318 UART: [art] Derive Key Pair - Done
2,948,174 UART: [art] Signing Cert with AUTHO
2,948,654 UART: RITY.KEYID = 7
2,964,012 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,777 UART: [art] PUB.X = A4472287BB0CA6697AA02DBAD5E9474BA575B1D7370936F458EFA3B1C80989E1E25AB3B96FDAF05951A6C4B4F68DBA7A
2,971,554 UART: [art] PUB.Y = 8F52E8EF2DA9D73D9FE85D64DA444F178E8EA2049C3285B42ABA2A7096A44F07E99720BE5D9F1DA10DEB326DC1E7450C
2,978,508 UART: [art] SIG.R = 78D86CCC5A2EF1EC7CD75F022FEC86194A3C6CDBA5E0CC650977969002CD6E7AA4A47D65FD09C21BD8745D91D5316CCE
2,985,286 UART: [art] SIG.S = DBAF5F0F927CA55EC846FF67275D760D41F36277DEBEDB9520BC6C719970D0D4EBF851C2EE802D688C82CA37E17DDDA5
3,008,377 UART: mbox::rt_entry...
3,008,749 UART: ____ _ _ _ ____ _____
3,009,533 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,333 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,101 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,869 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,637 UART: |_|
3,012,949 UART:
3,121,465 UART: [rt] Runtime listening for mailbox commands...
3,126,433 >>> mbox cmd response data (3272 bytes)
3,126,434 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,149,520 >>> mbox cmd response data (0 bytes)
3,149,521 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,149,641 UART:
3,149,657 UART: Running Caliptra ROM ...
3,150,065 UART:
3,150,206 UART: [state] CFI Enabled
3,152,884 UART: [state] LifecycleState = Unprovisioned
3,153,539 UART: [state] DebugLocked = No
3,154,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,155,696 UART: [kat] SHA2-256
3,949,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,953,742 UART: [kat] ++
3,953,894 UART: [kat] sha1
3,957,904 UART: [kat] SHA2-256
3,959,842 UART: [kat] SHA2-384
3,962,669 UART: [kat] SHA2-512-ACC
3,964,569 UART: [kat] ECC-384
3,970,148 UART: [kat] HMAC-384Kdf
3,974,654 UART: [kat] LMS
4,542,850 UART: [kat] --
4,543,859 UART: [update-reset] ++
5,877,209 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,878,449 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,028,079 >>> mbox cmd response: success
6,028,240 UART: [update-reset] Copying MAN_2 To MAN_1
6,036,254 UART: [update-reset Success] --
6,037,359 UART: [state] Locking Datavault
6,038,099 UART: [state] Locking PCR0, PCR1 and PCR31
6,038,703 UART: [state] Locking ICCM
6,039,181 UART: [exit] Launching FMC @ 0x40000130
6,044,510 UART:
6,044,526 UART: Running Caliptra FMC ...
6,044,934 UART:
6,045,077 UART: [state] CFI Enabled
6,134,422 UART: [art] Extend RT PCRs Done
6,134,850 UART: [art] Lock RT PCRs Done
6,135,955 UART: [art] Populate DV Done
6,143,904 UART: [fht] FMC Alias Private Key: 7
6,145,006 UART: [art] Derive CDI
6,145,286 UART: [art] Store in in slot 0x4
6,230,593 UART: [art] Derive Key Pair
6,230,953 UART: [art] Store priv key in slot 0x5
6,244,247 UART: [art] Derive Key Pair - Done
6,259,221 UART: [art] Signing Cert with AUTHO
6,259,701 UART: RITY.KEYID = 7
6,274,825 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,590 UART: [art] PUB.X = 3E66FF9BC4BAFC56AB9C5CC2946C3CA05B18C795DDB65E17CB531BE4652FA06047DB870C5AD7F1789C885E5AF8E01F77
6,282,377 UART: [art] PUB.Y = 005004FF7BC2E3C500BC5D60E1FF2A3464848A3B9314730E54A16912C8374A0512358D43DB290D935A9DD5BFC120E7D6
6,289,271 UART: [art] SIG.R = 5A05463DD9862C289E0F1CBCA9DAF77554A06224A6C1CB4402FF214968B9FA6EFE72817CEA5710DDDB775DA8B6AB7675
6,296,046 UART: [art] SIG.S = 6DAF9347A29459F5FFDF27891C5B0CE3F3901FE01CB2E1B3449FD9D1B79288E0B7EC58574EE39D903E32278097E5E8C4
6,319,356 UART: Caliptra RT
6,319,701 UART: [state] CFI Enabled
6,608,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,609,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,640,506 UART: [rt]cmd =0x494e464f, len=4
6,644,245 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,324 ready_for_fw is high
1,363,324 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,466,491 >>> mbox cmd response: success
2,466,491 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,527,981 UART:
2,527,997 UART: Running Caliptra FMC ...
2,528,405 UART:
2,528,548 UART: [state] CFI Enabled
2,539,635 UART: [fht] FMC Alias Private Key: 7
2,647,742 UART: [art] Extend RT PCRs Done
2,648,170 UART: [art] Lock RT PCRs Done
2,649,604 UART: [art] Populate DV Done
2,658,017 UART: [fht] FMC Alias Private Key: 7
2,659,149 UART: [art] Derive CDI
2,659,429 UART: [art] Store in in slot 0x4
2,745,164 UART: [art] Derive Key Pair
2,745,524 UART: [art] Store priv key in slot 0x5
2,758,652 UART: [art] Derive Key Pair - Done
2,773,532 UART: [art] Signing Cert with AUTHO
2,774,012 UART: RITY.KEYID = 7
2,788,740 UART: [art] Erasing AUTHORITY.KEYID = 7
2,789,505 UART: [art] PUB.X = 2D144C7CDEE9FA8065DA354FF31B83F714453AC01856E24E4E9ECC436BAAAAF27ADFEAA8E7FF502EB3F9B320D8DD8860
2,796,301 UART: [art] PUB.Y = 6F59D486234F81F9A7917953ACE3F9AA99A6D6596C0DD459D7427B2AF60A09F10EFC4388107773F1D42A970AD349F688
2,803,236 UART: [art] SIG.R = 49B91763EA443D8655C5BB163A8AF01FF0CAC8EF2B8076DD3934EEC44B3859F48D0B483ED7E29EF1613476A37195856C
2,810,009 UART: [art] SIG.S = 9D8881B3A5F2DFB8E09E77B6689F907A40F601B3D983E9D3C0CB2EA3458ECD5023CFF9A9470F1F6E770369FA0A0D9733
2,833,399 UART: mbox::rt_entry...
2,833,771 UART: ____ _ _ _ ____ _____
2,834,555 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,835,355 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,836,123 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,891 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,659 UART: |_|
2,837,971 UART:
2,945,129 UART: [rt] Runtime listening for mailbox commands...
2,950,097 >>> mbox cmd response data (3272 bytes)
2,950,098 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,973,184 >>> mbox cmd response data (0 bytes)
2,973,185 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,733,685 >>> mbox cmd response: success
5,747,510 UART:
5,747,526 UART: Running Caliptra FMC ...
5,747,934 UART:
5,748,077 UART: [state] CFI Enabled
5,837,452 UART: [art] Extend RT PCRs Done
5,837,880 UART: [art] Lock RT PCRs Done
5,839,085 UART: [art] Populate DV Done
5,847,262 UART: [fht] FMC Alias Private Key: 7
5,848,286 UART: [art] Derive CDI
5,848,566 UART: [art] Store in in slot 0x4
5,934,487 UART: [art] Derive Key Pair
5,934,847 UART: [art] Store priv key in slot 0x5
5,947,971 UART: [art] Derive Key Pair - Done
5,962,794 UART: [art] Signing Cert with AUTHO
5,963,274 UART: RITY.KEYID = 7
5,978,658 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,423 UART: [art] PUB.X = 7E23B344D6A7B75AF59585D0F6D6C934A31D178172D1FD30FEFCCE3A6718F6BF60D5E1568FC5F1ECBAF40E9D8C2CB5EE
5,986,214 UART: [art] PUB.Y = 6AC860855DC55F90EFF3D5298E6D7DA5B15F1ADBAA7393D8D201F04DFAE6A0856A38111A9D8FB3446B4DD37D30F36735
5,993,175 UART: [art] SIG.R = FF2BBC2D74500E9FFEA368F5CFF052CA50ABAF599058FF028C3300F8B18AA2ED78126B2312FA9E85976CD0DEF40632EB
5,999,934 UART: [art] SIG.S = 9F455EC9A4011B0E4141FBC1B81353C2B060ACEE066DF3A2EC62C55B2FCB1FF7BEFA0F596DA6B3894D4BC9761ACA9978
6,024,151 UART: Caliptra RT
6,024,496 UART: [state] CFI Enabled
6,311,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,312,535 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,343,133 UART: [rt]cmd =0x494e464f, len=4
6,346,954 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
893,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,125 UART: [kat] ++
897,277 UART: [kat] sha1
901,749 UART: [kat] SHA2-256
903,689 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
918,382 UART: [kat] HMAC-384Kdf
922,870 UART: [kat] LMS
1,171,198 UART: [kat] --
1,171,749 UART: [cold-reset] ++
1,172,329 UART: [fht] FHT @ 0x50003400
1,175,130 UART: [idev] ++
1,175,298 UART: [idev] CDI.KEYID = 6
1,175,658 UART: [idev] SUBJECT.KEYID = 7
1,176,082 UART: [idev] UDS.KEYID = 0
1,176,427 ready_for_fw is high
1,176,427 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,666 UART: [idev] Erasing UDS.KEYID = 0
1,201,319 UART: [idev] Sha1 KeyId Algorithm
1,209,827 UART: [idev] --
1,210,979 UART: [ldev] ++
1,211,147 UART: [ldev] CDI.KEYID = 6
1,211,510 UART: [ldev] SUBJECT.KEYID = 5
1,211,936 UART: [ldev] AUTHORITY.KEYID = 7
1,212,399 UART: [ldev] FE.KEYID = 1
1,217,547 UART: [ldev] Erasing FE.KEYID = 1
1,243,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,551 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,590 UART: [fwproc] Recv command 0x46574c44
1,284,318 UART: [fwproc] Recv'd Img size: 78532 bytes
2,172,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,228,426 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,310,651 >>> mbox cmd response: success
2,310,651 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,775 UART: [afmc] ++
2,311,943 UART: [afmc] CDI.KEYID = 6
2,312,305 UART: [afmc] SUBJECT.KEYID = 7
2,312,730 UART: [afmc] AUTHORITY.KEYID = 5
2,347,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,364,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,998 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,726 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,376,611 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,382,330 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,390,052 UART: [afmc] --
2,391,008 UART: [cold-reset] --
2,391,902 UART: [state] Locking Datavault
2,393,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,639 UART: [state] Locking ICCM
2,394,253 UART: [exit] Launching FMC @ 0x40000130
2,399,582 UART:
2,399,598 UART: Running Caliptra FMC ...
2,400,006 UART:
2,400,060 UART: [state] CFI Enabled
2,410,547 UART: [fht] FMC Alias Private Key: 7
2,518,306 UART: [art] Extend RT PCRs Done
2,518,734 UART: [art] Lock RT PCRs Done
2,520,364 UART: [art] Populate DV Done
2,528,703 UART: [fht] FMC Alias Private Key: 7
2,529,863 UART: [art] Derive CDI
2,530,143 UART: [art] Store in in slot 0x4
2,615,626 UART: [art] Derive Key Pair
2,615,986 UART: [art] Store priv key in slot 0x5
2,629,260 UART: [art] Derive Key Pair - Done
2,644,192 UART: [art] Signing Cert with AUTHO
2,644,672 UART: RITY.KEYID = 7
2,660,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,875 UART: [art] PUB.X = CEC1DCDD8E7DC1B8F911D804DC67F9936FFC7D871F2DBB96DF915AAB236F2D04E6EB8A9B14759726D7DBE4020389C564
2,667,653 UART: [art] PUB.Y = 39C5F9DC667A4E0CD1C68E45B0CFD45014CBEE2EEDBC8DF3DC92D5C7820D39AA982DD536C559916C7DBFFCC9FFF04B50
2,674,627 UART: [art] SIG.R = AC6196A82B8F98BC632F0905129E40F630B2506D71553F3CA502B31B172FFDE31991D0DA1E1719942631DD241802D58C
2,681,381 UART: [art] SIG.S = C45B7D937BA88161973224D41496EE7BB2B9AFB8FA5DA77E222841DD31940041EA49D6594904EE8A6D55EF039FE08ABD
2,705,328 UART: mbox::rt_entry...
2,705,700 UART: ____ _ _ _ ____ _____
2,706,484 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,284 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,052 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,820 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,588 UART: |_|
2,709,900 UART:
2,816,187 UART: [rt] Runtime listening for mailbox commands...
2,821,155 >>> mbox cmd response data (3272 bytes)
2,821,156 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,242 >>> mbox cmd response data (0 bytes)
2,844,243 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,844,360 UART:
2,844,376 UART: Running Caliptra ROM ...
2,844,784 UART:
2,844,839 UART: [state] CFI Enabled
2,846,959 UART: [state] LifecycleState = Unprovisioned
2,847,614 UART: [state] DebugLocked = No
2,848,156 UART: [state] WD Timer not started. Device not locked for debugging
2,849,434 UART: [kat] SHA2-256
3,655,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,659,209 UART: [kat] ++
3,659,361 UART: [kat] sha1
3,663,749 UART: [kat] SHA2-256
3,665,689 UART: [kat] SHA2-384
3,668,460 UART: [kat] SHA2-512-ACC
3,670,360 UART: [kat] ECC-384
3,680,229 UART: [kat] HMAC-384Kdf
3,684,983 UART: [kat] LMS
3,933,311 UART: [kat] --
3,933,885 UART: [update-reset] ++
5,245,437 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,246,490 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,396,068 >>> mbox cmd response: success
5,396,295 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,309 UART: [update-reset Success] --
5,405,328 UART: [state] Locking Datavault
5,405,942 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,546 UART: [state] Locking ICCM
5,406,998 UART: [exit] Launching FMC @ 0x40000130
5,412,327 UART:
5,412,343 UART: Running Caliptra FMC ...
5,412,751 UART:
5,412,805 UART: [state] CFI Enabled
5,501,418 UART: [art] Extend RT PCRs Done
5,501,846 UART: [art] Lock RT PCRs Done
5,503,223 UART: [art] Populate DV Done
5,511,634 UART: [fht] FMC Alias Private Key: 7
5,512,626 UART: [art] Derive CDI
5,512,906 UART: [art] Store in in slot 0x4
5,598,595 UART: [art] Derive Key Pair
5,598,955 UART: [art] Store priv key in slot 0x5
5,611,679 UART: [art] Derive Key Pair - Done
5,626,480 UART: [art] Signing Cert with AUTHO
5,626,960 UART: RITY.KEYID = 7
5,642,380 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,145 UART: [art] PUB.X = 7CD599B43D40FCA57AB3F5B1707728969F5D27E38FCA0BBD18B1708EDA89FF215E3992E37BB9DA784E816502B46EB605
5,649,916 UART: [art] PUB.Y = E1BA205B6B921719320F73CCE9AE90111118F11371D817D42CADE60ECD4284ED3C7D582A2981911387E07A176E78F296
5,656,858 UART: [art] SIG.R = A76D5539EFF405CCDBB2B29DABD6226CF7718678BCE060F951CAF03B61D147ECB7E8AF4847AAEAE05650955E759FE398
5,663,643 UART: [art] SIG.S = 67C5B2079947D3D67BAAED629B81D24C22723148EBC2DAB184B656F6EDD601F7F1E18E0BD9A21D025C82C2663F6CF26F
5,687,574 UART: Caliptra RT
5,687,827 UART: [state] CFI Enabled
5,975,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,976,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,925 UART: [rt]cmd =0x494e464f, len=4
6,010,832 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,251 ready_for_fw is high
1,060,251 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,161,882 >>> mbox cmd response: success
2,161,882 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,224,156 UART:
2,224,172 UART: Running Caliptra FMC ...
2,224,580 UART:
2,224,634 UART: [state] CFI Enabled
2,235,165 UART: [fht] FMC Alias Private Key: 7
2,342,618 UART: [art] Extend RT PCRs Done
2,343,046 UART: [art] Lock RT PCRs Done
2,344,650 UART: [art] Populate DV Done
2,352,853 UART: [fht] FMC Alias Private Key: 7
2,353,925 UART: [art] Derive CDI
2,354,205 UART: [art] Store in in slot 0x4
2,439,750 UART: [art] Derive Key Pair
2,440,110 UART: [art] Store priv key in slot 0x5
2,453,638 UART: [art] Derive Key Pair - Done
2,468,167 UART: [art] Signing Cert with AUTHO
2,468,647 UART: RITY.KEYID = 7
2,483,981 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,746 UART: [art] PUB.X = 49581CC5103B3FC25581A09BAA270C03CAC32C2D3C2E3F511599CB39B22B3867BC28216D02B7121038855729C07943D0
2,491,501 UART: [art] PUB.Y = 0275298EC5A7EBEC9FBF812CA75565A918CF72809DDD22839CFF03F1BE2705A5C297DFAEEA7550B7D4D27E51FB16FD06
2,498,457 UART: [art] SIG.R = D9FD13E930614E559DBFF04B921FAED8CE2CA5BB423F0833CEAB36D966AE77E4AA8EF48B1044B8694F938F6178EB56C3
2,505,242 UART: [art] SIG.S = 7CC30649A8C6EC4CC4014B227E467B97A919E8745AAD34B7CB80D0BD6BD071402EB734A7119082B4F04672C1789C02E4
2,529,098 UART: mbox::rt_entry...
2,529,470 UART: ____ _ _ _ ____ _____
2,530,254 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,054 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,822 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,590 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,358 UART: |_|
2,533,670 UART:
2,640,330 UART: [rt] Runtime listening for mailbox commands...
2,645,298 >>> mbox cmd response data (3272 bytes)
2,645,299 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,385 >>> mbox cmd response data (0 bytes)
2,668,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,104,860 >>> mbox cmd response: success
5,117,972 UART:
5,117,988 UART: Running Caliptra FMC ...
5,118,396 UART:
5,118,450 UART: [state] CFI Enabled
5,207,491 UART: [art] Extend RT PCRs Done
5,207,919 UART: [art] Lock RT PCRs Done
5,209,226 UART: [art] Populate DV Done
5,217,699 UART: [fht] FMC Alias Private Key: 7
5,218,773 UART: [art] Derive CDI
5,219,053 UART: [art] Store in in slot 0x4
5,304,610 UART: [art] Derive Key Pair
5,304,970 UART: [art] Store priv key in slot 0x5
5,318,632 UART: [art] Derive Key Pair - Done
5,333,261 UART: [art] Signing Cert with AUTHO
5,333,741 UART: RITY.KEYID = 7
5,349,025 UART: [art] Erasing AUTHORITY.KEYID = 7
5,349,790 UART: [art] PUB.X = BE05C449A42731A0B62A8D9EE59E1760FA2869C5F8EFFE7E4F954A8C0D0503AB0370A762597B7CB9C448F2BBCF73EFEC
5,356,563 UART: [art] PUB.Y = 7D1A9272FD0EBEFA70F76556FC3C2C81A77DA36597C9556DF032C29539840C749CFD895E131E7AC4DEA943A9ECFF3807
5,363,516 UART: [art] SIG.R = 3A6340025A73D93EE0B5717B8A5F23F3090D7CCA9ADFD0EE70A36FFD1C1F3185FFDCE70548C0D50F16C40D0DF2695B60
5,370,281 UART: [art] SIG.S = B02C8F1AD0B2FF5308ACF37D3B241365F1C64625A64699E83B60CF348676886D1D3BEEAB6901B40DAF0881399A44BCC4
5,394,016 UART: Caliptra RT
5,394,269 UART: [state] CFI Enabled
5,682,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,683,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,713,773 UART: [rt]cmd =0x494e464f, len=4
5,717,384 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,744 UART: [kat] SHA2-256
903,684 UART: [kat] SHA2-384
906,405 UART: [kat] SHA2-512-ACC
908,306 UART: [kat] ECC-384
918,245 UART: [kat] HMAC-384Kdf
922,969 UART: [kat] LMS
1,171,297 UART: [kat] --
1,172,170 UART: [cold-reset] ++
1,172,662 UART: [fht] FHT @ 0x50003400
1,175,435 UART: [idev] ++
1,175,603 UART: [idev] CDI.KEYID = 6
1,175,963 UART: [idev] SUBJECT.KEYID = 7
1,176,387 UART: [idev] UDS.KEYID = 0
1,176,732 ready_for_fw is high
1,176,732 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,255 UART: [idev] Erasing UDS.KEYID = 0
1,201,332 UART: [idev] Sha1 KeyId Algorithm
1,209,686 UART: [idev] --
1,210,596 UART: [ldev] ++
1,210,764 UART: [ldev] CDI.KEYID = 6
1,211,127 UART: [ldev] SUBJECT.KEYID = 5
1,211,553 UART: [ldev] AUTHORITY.KEYID = 7
1,212,016 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,243,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,750 UART: [ldev] --
1,283,037 UART: [fwproc] Wait for Commands...
1,283,657 UART: [fwproc] Recv command 0x46574c44
1,284,385 UART: [fwproc] Recv'd Img size: 78532 bytes
2,172,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,107 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,311,192 >>> mbox cmd response: success
2,311,192 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,246 UART: [afmc] ++
2,312,414 UART: [afmc] CDI.KEYID = 6
2,312,776 UART: [afmc] SUBJECT.KEYID = 7
2,313,201 UART: [afmc] AUTHORITY.KEYID = 5
2,349,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,366,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,394 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,384,113 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,901 UART: [afmc] --
2,392,995 UART: [cold-reset] --
2,393,655 UART: [state] Locking Datavault
2,394,974 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,578 UART: [state] Locking ICCM
2,396,164 UART: [exit] Launching FMC @ 0x40000130
2,401,493 UART:
2,401,509 UART: Running Caliptra FMC ...
2,401,917 UART:
2,402,060 UART: [state] CFI Enabled
2,412,823 UART: [fht] FMC Alias Private Key: 7
2,521,018 UART: [art] Extend RT PCRs Done
2,521,446 UART: [art] Lock RT PCRs Done
2,522,874 UART: [art] Populate DV Done
2,530,993 UART: [fht] FMC Alias Private Key: 7
2,532,045 UART: [art] Derive CDI
2,532,325 UART: [art] Store in in slot 0x4
2,618,160 UART: [art] Derive Key Pair
2,618,520 UART: [art] Store priv key in slot 0x5
2,631,932 UART: [art] Derive Key Pair - Done
2,646,870 UART: [art] Signing Cert with AUTHO
2,647,350 UART: RITY.KEYID = 7
2,662,400 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,165 UART: [art] PUB.X = F259B7A7D6B5F3F6DFB334576E6D739ACA34706863162EE42966A48ACC318FA118B93DD1B5002D04C8D84388D5939E05
2,669,909 UART: [art] PUB.Y = D21EB2E3F77490BEF9444A4F9FEE06DF693FAA7CA4AAE00358091AF11370C006FCF29416124A5ADFD44573B8E6D4E418
2,676,861 UART: [art] SIG.R = 1F6978AB34CFC6087FD60F445CB12E479A113516C9ED26CD05547C739EE60DE0B712C0E8C6F901F955428B7C473D6F4C
2,683,622 UART: [art] SIG.S = 51C52BB6696AEB6DE02AD7667B17635456521BA8B5A04536EDB9CF14AF11C47DAF35B57D391CAAAE7072C90011B8A6D6
2,707,327 UART: mbox::rt_entry...
2,707,699 UART: ____ _ _ _ ____ _____
2,708,483 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,283 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,051 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,819 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,587 UART: |_|
2,711,899 UART:
2,817,991 UART: [rt] Runtime listening for mailbox commands...
2,822,959 >>> mbox cmd response data (3272 bytes)
2,822,960 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,046 >>> mbox cmd response data (0 bytes)
2,846,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,846,164 UART:
2,846,180 UART: Running Caliptra ROM ...
2,846,588 UART:
2,846,730 UART: [state] CFI Enabled
2,849,324 UART: [state] LifecycleState = Unprovisioned
2,849,979 UART: [state] DebugLocked = No
2,850,615 UART: [state] WD Timer not started. Device not locked for debugging
2,851,903 UART: [kat] SHA2-256
3,657,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,661,678 UART: [kat] ++
3,661,830 UART: [kat] sha1
3,665,854 UART: [kat] SHA2-256
3,667,794 UART: [kat] SHA2-384
3,670,495 UART: [kat] SHA2-512-ACC
3,672,395 UART: [kat] ECC-384
3,682,424 UART: [kat] HMAC-384Kdf
3,686,962 UART: [kat] LMS
3,935,290 UART: [kat] --
3,936,114 UART: [update-reset] ++
5,245,800 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,246,819 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,396,397 >>> mbox cmd response: success
5,396,544 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,558 UART: [update-reset Success] --
5,405,501 UART: [state] Locking Datavault
5,406,485 UART: [state] Locking PCR0, PCR1 and PCR31
5,407,089 UART: [state] Locking ICCM
5,407,719 UART: [exit] Launching FMC @ 0x40000130
5,413,048 UART:
5,413,064 UART: Running Caliptra FMC ...
5,413,472 UART:
5,413,615 UART: [state] CFI Enabled
5,503,246 UART: [art] Extend RT PCRs Done
5,503,674 UART: [art] Lock RT PCRs Done
5,505,203 UART: [art] Populate DV Done
5,513,456 UART: [fht] FMC Alias Private Key: 7
5,514,566 UART: [art] Derive CDI
5,514,846 UART: [art] Store in in slot 0x4
5,600,541 UART: [art] Derive Key Pair
5,600,901 UART: [art] Store priv key in slot 0x5
5,613,847 UART: [art] Derive Key Pair - Done
5,628,626 UART: [art] Signing Cert with AUTHO
5,629,106 UART: RITY.KEYID = 7
5,644,322 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,087 UART: [art] PUB.X = CF2B6BB39F2EEB2E6F0ED9D7654339C61A389966E07EC08C9EA410F0C87A08857228BA3FB9235F966A0913767430687D
5,651,850 UART: [art] PUB.Y = A80658DAD5239DB3A22383496B5B9D63175291BCFC16A3C066B604697457293399518962364CB6F2142951140843D6B4
5,658,773 UART: [art] SIG.R = 29C243B1C1E67CC1B51CE4931A9DEB042245C0238EA41DE3EE55ADB1BBDEDDCE95B9EBBBE14DBF177DFF4E4391E875B0
5,665,570 UART: [art] SIG.S = 763989F01390B0815D0FF0EA67FAAAF5DEDE3EAE6F2A207C1C7DBA7B54BAB7DB02B459C8458802BD1865B568DF09969A
5,689,425 UART: Caliptra RT
5,689,770 UART: [state] CFI Enabled
5,975,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,976,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,314 UART: [rt]cmd =0x494e464f, len=4
6,011,065 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,636 ready_for_fw is high
1,060,636 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,162,723 >>> mbox cmd response: success
2,162,723 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,225,359 UART:
2,225,375 UART: Running Caliptra FMC ...
2,225,783 UART:
2,225,926 UART: [state] CFI Enabled
2,236,747 UART: [fht] FMC Alias Private Key: 7
2,345,222 UART: [art] Extend RT PCRs Done
2,345,650 UART: [art] Lock RT PCRs Done
2,347,142 UART: [art] Populate DV Done
2,355,285 UART: [fht] FMC Alias Private Key: 7
2,356,231 UART: [art] Derive CDI
2,356,511 UART: [art] Store in in slot 0x4
2,441,758 UART: [art] Derive Key Pair
2,442,118 UART: [art] Store priv key in slot 0x5
2,454,814 UART: [art] Derive Key Pair - Done
2,469,456 UART: [art] Signing Cert with AUTHO
2,469,936 UART: RITY.KEYID = 7
2,485,466 UART: [art] Erasing AUTHORITY.KEYID = 7
2,486,231 UART: [art] PUB.X = 2BB1DBCFF3177B4EB3B4B457E2C768AD4A8E8C756339A94DB227F17C2ABD2DBED05FF140DF5B927DD47B19955FA59B48
2,493,023 UART: [art] PUB.Y = ED634B41B6DDC12CCD763D6D584A4578274F0A07373FEB02B2357D8F8A4EA9924E744B061B2781E0B7FCBAA1637D06AB
2,499,970 UART: [art] SIG.R = 4F598F19B46A93836ABD1E4BE47EB7A3EBA1702DE7EF7B1120085A7E6D694B327FA5B73D058BFBACBC1B36623F85E51C
2,506,752 UART: [art] SIG.S = 68D5B8DAEEA1B49DC20947555C98DE2080F6928A3366153D0F9DE9B4CE367BA8036E66D6F886549DD181527D4CAB96CE
2,530,172 UART: mbox::rt_entry...
2,530,544 UART: ____ _ _ _ ____ _____
2,531,328 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,532,128 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,532,896 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,533,664 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,534,432 UART: |_|
2,534,744 UART:
2,640,664 UART: [rt] Runtime listening for mailbox commands...
2,645,632 >>> mbox cmd response data (3272 bytes)
2,645,633 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,719 >>> mbox cmd response data (0 bytes)
2,668,720 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,104,843 >>> mbox cmd response: success
5,118,305 UART:
5,118,321 UART: Running Caliptra FMC ...
5,118,729 UART:
5,118,872 UART: [state] CFI Enabled
5,208,083 UART: [art] Extend RT PCRs Done
5,208,511 UART: [art] Lock RT PCRs Done
5,209,734 UART: [art] Populate DV Done
5,218,175 UART: [fht] FMC Alias Private Key: 7
5,219,173 UART: [art] Derive CDI
5,219,453 UART: [art] Store in in slot 0x4
5,305,310 UART: [art] Derive Key Pair
5,305,670 UART: [art] Store priv key in slot 0x5
5,319,260 UART: [art] Derive Key Pair - Done
5,334,006 UART: [art] Signing Cert with AUTHO
5,334,486 UART: RITY.KEYID = 7
5,349,734 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,499 UART: [art] PUB.X = F106B0ED0899D76CA1F8E87DE6DD6FD81E56A2D993933B8EE03C6CDB498E5E502AC6EA8A313273CC7517096C240920F7
5,357,267 UART: [art] PUB.Y = 8A26773353965126203CB17B028C858C4B4D8F350949892502620C9D82187A88811546B07AFFEEE41D7811193B895A91
5,364,187 UART: [art] SIG.R = AC66691C2E52E30C20D511AD68130EC529BE5AB6ACB5890CF18709ADD6F8015EA51695DB0EACA3DBE4616B09B4EA62C3
5,370,954 UART: [art] SIG.S = E66A0CDA0C5D0B35A8389940F7A5728D2705EC23A8F7E8F5BA35A67A2EE3021038961D68BB34D4C8248CB6DEAB3B14D6
5,394,354 UART: Caliptra RT
5,394,699 UART: [state] CFI Enabled
5,682,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,683,994 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,714,638 UART: [rt]cmd =0x494e464f, len=4
5,718,511 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,448 UART: [kat] LMS
1,168,760 UART: [kat] --
1,169,431 UART: [cold-reset] ++
1,169,875 UART: [fht] FHT @ 0x50003400
1,172,543 UART: [idev] ++
1,172,711 UART: [idev] CDI.KEYID = 6
1,173,072 UART: [idev] SUBJECT.KEYID = 7
1,173,497 UART: [idev] UDS.KEYID = 0
1,173,843 ready_for_fw is high
1,173,843 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,198,357 UART: [idev] Sha1 KeyId Algorithm
1,207,309 UART: [idev] --
1,208,510 UART: [ldev] ++
1,208,678 UART: [ldev] CDI.KEYID = 6
1,209,042 UART: [ldev] SUBJECT.KEYID = 5
1,209,469 UART: [ldev] AUTHORITY.KEYID = 7
1,209,932 UART: [ldev] FE.KEYID = 1
1,214,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,704 UART: [ldev] --
1,280,200 UART: [fwproc] Wait for Commands...
1,280,911 UART: [fwproc] Recv command 0x46574c44
1,281,644 UART: [fwproc] Recv'd Img size: 78532 bytes
2,168,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,240 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,549 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,307,719 >>> mbox cmd response: success
2,307,719 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,308,810 UART: [afmc] ++
2,308,978 UART: [afmc] CDI.KEYID = 6
2,309,341 UART: [afmc] SUBJECT.KEYID = 7
2,309,767 UART: [afmc] AUTHORITY.KEYID = 5
2,345,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,697 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,426 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,309 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,028 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,827 UART: [afmc] --
2,388,711 UART: [cold-reset] --
2,389,517 UART: [state] Locking Datavault
2,390,652 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,256 UART: [state] Locking ICCM
2,391,806 UART: [exit] Launching FMC @ 0x40000130
2,397,135 UART:
2,397,151 UART: Running Caliptra FMC ...
2,397,559 UART:
2,397,613 UART: [state] CFI Enabled
2,407,612 UART: [fht] FMC Alias Private Key: 7
2,515,687 UART: [art] Extend RT PCRs Done
2,516,115 UART: [art] Lock RT PCRs Done
2,517,779 UART: [art] Populate DV Done
2,526,084 UART: [fht] FMC Alias Private Key: 7
2,527,258 UART: [art] Derive CDI
2,527,538 UART: [art] Store in in slot 0x4
2,612,997 UART: [art] Derive Key Pair
2,613,357 UART: [art] Store priv key in slot 0x5
2,626,155 UART: [art] Derive Key Pair - Done
2,640,893 UART: [art] Signing Cert with AUTHO
2,641,373 UART: RITY.KEYID = 7
2,656,263 UART: [art] Erasing AUTHORITY.KEYID = 7
2,657,028 UART: [art] PUB.X = 602BBC03A4E4051C32695D514128FA1E0F995E9C0076E8BEDF90EC266E442F9D959F1918E74AC2077305693AE1598F1D
2,663,761 UART: [art] PUB.Y = CF127E4FA6F5F6057F501E5A49BA3BE6BF33A20A96C8DAD6D01FD87713D2393A5B5A86609D62C75703E1CE1D5F8771F9
2,670,714 UART: [art] SIG.R = 95D38BB40D55BE894CAD510834C41384FF21D1C4178CB0115813F10566E1F81E45CBE969B6103927F830CF1CD5EB044D
2,677,474 UART: [art] SIG.S = 468F21684B9BD78855A4650418D68854F02C6784AABEA51342194894851A1E8B79891D83B8722A857620459874A254FD
2,701,890 UART: mbox::rt_entry...
2,702,262 UART: ____ _ _ _ ____ _____
2,703,046 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,703,846 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,704,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,705,382 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,150 UART: |_|
2,706,462 UART:
2,812,218 UART: [rt] Runtime listening for mailbox commands...
2,817,186 >>> mbox cmd response data (3272 bytes)
2,817,187 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,840,273 >>> mbox cmd response data (0 bytes)
2,840,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,840,391 UART:
2,840,407 UART: Running Caliptra ROM ...
2,840,815 UART:
2,840,870 UART: [state] CFI Enabled
2,843,952 UART: [state] LifecycleState = Unprovisioned
2,844,607 UART: [state] DebugLocked = No
2,845,313 UART: [state] WD Timer not started. Device not locked for debugging
2,846,605 UART: [kat] SHA2-256
3,650,155 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,284 UART: [kat] ++
3,654,436 UART: [kat] sha1
3,658,620 UART: [kat] SHA2-256
3,660,560 UART: [kat] SHA2-384
3,663,409 UART: [kat] SHA2-512-ACC
3,665,309 UART: [kat] ECC-384
3,675,196 UART: [kat] HMAC-384Kdf
3,679,802 UART: [kat] LMS
3,928,114 UART: [kat] --
3,928,950 UART: [update-reset] ++
5,240,117 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,241,296 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,390,874 >>> mbox cmd response: success
5,391,221 UART: [update-reset] Copying MAN_2 To MAN_1
5,399,235 UART: [update-reset Success] --
5,400,308 UART: [state] Locking Datavault
5,400,976 UART: [state] Locking PCR0, PCR1 and PCR31
5,401,580 UART: [state] Locking ICCM
5,402,206 UART: [exit] Launching FMC @ 0x40000130
5,407,535 UART:
5,407,551 UART: Running Caliptra FMC ...
5,407,959 UART:
5,408,013 UART: [state] CFI Enabled
5,496,774 UART: [art] Extend RT PCRs Done
5,497,202 UART: [art] Lock RT PCRs Done
5,498,287 UART: [art] Populate DV Done
5,506,720 UART: [fht] FMC Alias Private Key: 7
5,507,652 UART: [art] Derive CDI
5,507,932 UART: [art] Store in in slot 0x4
5,593,491 UART: [art] Derive Key Pair
5,593,851 UART: [art] Store priv key in slot 0x5
5,607,145 UART: [art] Derive Key Pair - Done
5,621,954 UART: [art] Signing Cert with AUTHO
5,622,434 UART: RITY.KEYID = 7
5,637,328 UART: [art] Erasing AUTHORITY.KEYID = 7
5,638,093 UART: [art] PUB.X = D6C0AA35710BD7EC7DFE2D01DDD6D88C256F4B27DC3A00949A079C5EAED14153FC5A49123F9793BB8095CC5E457A3E51
5,644,848 UART: [art] PUB.Y = A187FDCC288CACA0ABF9D654EDCB51BF71246281F47D5F1B3EF0BA587DADBDC58462FC165EA7674C402F4D75329C1582
5,651,818 UART: [art] SIG.R = B2A6ABB55069B6CC5E3D25A3E396C59F6F5EC0F94CEF0615A546CF34D556A76686841FCD09070C2E05B231377544945B
5,658,577 UART: [art] SIG.S = B24D3A7377C7CD019C34E82CB40DCED24A8CCFB15819C090D06B9B2A8F31DF9439804DBFFC412B33DD790D98CC29F59C
5,682,167 UART: Caliptra RT
5,682,420 UART: [state] CFI Enabled
5,966,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,968,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,998,867 UART: [rt]cmd =0x494e464f, len=4
6,002,662 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,090 ready_for_fw is high
1,056,090 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,157,697 >>> mbox cmd response: success
2,157,697 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,101 UART:
2,220,117 UART: Running Caliptra FMC ...
2,220,525 UART:
2,220,579 UART: [state] CFI Enabled
2,231,142 UART: [fht] FMC Alias Private Key: 7
2,338,837 UART: [art] Extend RT PCRs Done
2,339,265 UART: [art] Lock RT PCRs Done
2,340,953 UART: [art] Populate DV Done
2,349,292 UART: [fht] FMC Alias Private Key: 7
2,350,420 UART: [art] Derive CDI
2,350,700 UART: [art] Store in in slot 0x4
2,436,687 UART: [art] Derive Key Pair
2,437,047 UART: [art] Store priv key in slot 0x5
2,450,049 UART: [art] Derive Key Pair - Done
2,465,076 UART: [art] Signing Cert with AUTHO
2,465,556 UART: RITY.KEYID = 7
2,480,976 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,741 UART: [art] PUB.X = AA064398334A5C903E59DAC0BD76C669B350B03737CDAFC2C75B39AE7CA4F7ED05F7098125A41BF91BA25EDDC017AB4B
2,488,520 UART: [art] PUB.Y = EDB866B2A6EE06068142854121A614C7CDDE38D7447A1BA720683080D93AEDB989C43548A7D78A1165F1BB61B45C2BE9
2,495,468 UART: [art] SIG.R = 2F17C47A1F157E7674DF421A26C8FEF4AAC9449FA590B702A67CE9E13C87705D0BBE90EEDF226C74376DDBC4D4E77908
2,502,243 UART: [art] SIG.S = 526FE727822819553EAF547F004BA107878FEEDE83133F4A8B226E94A7E582D177666DDD2270E40A7A64317F71987019
2,525,792 UART: mbox::rt_entry...
2,526,164 UART: ____ _ _ _ ____ _____
2,526,948 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,527,748 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,516 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,284 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,052 UART: |_|
2,530,364 UART:
2,635,700 UART: [rt] Runtime listening for mailbox commands...
2,640,668 >>> mbox cmd response data (3272 bytes)
2,640,669 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,663,755 >>> mbox cmd response data (0 bytes)
2,663,756 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,094,537 >>> mbox cmd response: success
5,108,069 UART:
5,108,085 UART: Running Caliptra FMC ...
5,108,493 UART:
5,108,547 UART: [state] CFI Enabled
5,197,856 UART: [art] Extend RT PCRs Done
5,198,284 UART: [art] Lock RT PCRs Done
5,199,753 UART: [art] Populate DV Done
5,208,108 UART: [fht] FMC Alias Private Key: 7
5,209,204 UART: [art] Derive CDI
5,209,484 UART: [art] Store in in slot 0x4
5,295,447 UART: [art] Derive Key Pair
5,295,807 UART: [art] Store priv key in slot 0x5
5,308,847 UART: [art] Derive Key Pair - Done
5,323,473 UART: [art] Signing Cert with AUTHO
5,323,953 UART: RITY.KEYID = 7
5,338,461 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,226 UART: [art] PUB.X = E6A4F1CC19D4323B9AE20A89C26F1C341C714AD46CF71901D4C77D205D7521F522368E4AEAE6C1EC8924100AAA566254
5,345,993 UART: [art] PUB.Y = 6CA027B58132FAE7A46440237747BA0F7028AB29D1FD909D098ABBAD7BE70493EA893B86BFC417971324B436914170A9
5,352,934 UART: [art] SIG.R = 754FA4730C864789D429450011A9B6272A2FC0B07B5E2F0A384A05D8A56C9B5F872CA5B40DBF33AD13CAB2C3B99E3521
5,359,676 UART: [art] SIG.S = 3D4E682B98E95CD2627B5F9CECCA9C73FBC1EA3E85EAFFDBB515C431FBCF198BC091CB1A92811910CC20FA312EF9C38F
5,383,351 UART: Caliptra RT
5,383,604 UART: [state] CFI Enabled
5,670,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,671,876 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,702,668 UART: [rt]cmd =0x494e464f, len=4
5,706,385 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
891,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,642 UART: [kat] ++
895,794 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,833 UART: [kat] SHA2-512-ACC
906,734 UART: [kat] ECC-384
916,673 UART: [kat] HMAC-384Kdf
921,273 UART: [kat] LMS
1,169,585 UART: [kat] --
1,170,426 UART: [cold-reset] ++
1,170,856 UART: [fht] FHT @ 0x50003400
1,173,566 UART: [idev] ++
1,173,734 UART: [idev] CDI.KEYID = 6
1,174,095 UART: [idev] SUBJECT.KEYID = 7
1,174,520 UART: [idev] UDS.KEYID = 0
1,174,866 ready_for_fw is high
1,174,866 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,098 UART: [idev] Erasing UDS.KEYID = 0
1,198,894 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,547 UART: [ldev] SUBJECT.KEYID = 5
1,209,974 UART: [ldev] AUTHORITY.KEYID = 7
1,210,437 UART: [ldev] FE.KEYID = 1
1,215,799 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,452 UART: [fwproc] Recv command 0x46574c44
1,283,185 UART: [fwproc] Recv'd Img size: 78532 bytes
2,170,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,693 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,002 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,308,176 >>> mbox cmd response: success
2,308,176 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,309,227 UART: [afmc] ++
2,309,395 UART: [afmc] CDI.KEYID = 6
2,309,758 UART: [afmc] SUBJECT.KEYID = 7
2,310,184 UART: [afmc] AUTHORITY.KEYID = 5
2,345,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,376 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,988 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,707 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,624 UART: [afmc] --
2,389,556 UART: [cold-reset] --
2,390,406 UART: [state] Locking Datavault
2,391,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,283 UART: [state] Locking ICCM
2,392,703 UART: [exit] Launching FMC @ 0x40000130
2,398,032 UART:
2,398,048 UART: Running Caliptra FMC ...
2,398,456 UART:
2,398,599 UART: [state] CFI Enabled
2,409,000 UART: [fht] FMC Alias Private Key: 7
2,517,357 UART: [art] Extend RT PCRs Done
2,517,785 UART: [art] Lock RT PCRs Done
2,519,383 UART: [art] Populate DV Done
2,527,648 UART: [fht] FMC Alias Private Key: 7
2,528,724 UART: [art] Derive CDI
2,529,004 UART: [art] Store in in slot 0x4
2,614,647 UART: [art] Derive Key Pair
2,615,007 UART: [art] Store priv key in slot 0x5
2,627,933 UART: [art] Derive Key Pair - Done
2,642,846 UART: [art] Signing Cert with AUTHO
2,643,326 UART: RITY.KEYID = 7
2,658,654 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,419 UART: [art] PUB.X = F622A8823CC98DBFFA603528AEBB78BF0772AA6682CA9F0A200FB6D1FBD485A059208F209D448611CD46A58723528CCE
2,666,190 UART: [art] PUB.Y = C012A4A62FAFE49687DB9CF11005A07F907F4D7A682ACFE034E84840B64BC2B5C593F9421DB14037ECC152CFF9D5B09B
2,673,151 UART: [art] SIG.R = 1365B6ABE5217EE38DA1EAF433969A6211EB13C19C4879683FB3EC193144EC745E04E306FF997C24C7B2E0CAA968AA16
2,679,923 UART: [art] SIG.S = 7E41736920472355456084DB75F076AEF14FFF36536DEE67D4AA7680ED1CEDF3968F1EFB41DF1267527BBC990B852A8E
2,703,873 UART: mbox::rt_entry...
2,704,245 UART: ____ _ _ _ ____ _____
2,705,029 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,829 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,708,133 UART: |_|
2,708,445 UART:
2,814,303 UART: [rt] Runtime listening for mailbox commands...
2,819,271 >>> mbox cmd response data (3272 bytes)
2,819,272 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,842,358 >>> mbox cmd response data (0 bytes)
2,842,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,842,476 UART:
2,842,492 UART: Running Caliptra ROM ...
2,842,900 UART:
2,843,042 UART: [state] CFI Enabled
2,845,560 UART: [state] LifecycleState = Unprovisioned
2,846,215 UART: [state] DebugLocked = No
2,846,775 UART: [state] WD Timer not started. Device not locked for debugging
2,848,079 UART: [kat] SHA2-256
3,651,629 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,758 UART: [kat] ++
3,655,910 UART: [kat] sha1
3,660,168 UART: [kat] SHA2-256
3,662,108 UART: [kat] SHA2-384
3,664,841 UART: [kat] SHA2-512-ACC
3,666,741 UART: [kat] ECC-384
3,676,862 UART: [kat] HMAC-384Kdf
3,681,442 UART: [kat] LMS
3,929,754 UART: [kat] --
3,930,482 UART: [update-reset] ++
5,240,965 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,242,088 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,391,666 >>> mbox cmd response: success
5,391,823 UART: [update-reset] Copying MAN_2 To MAN_1
5,399,837 UART: [update-reset Success] --
5,400,852 UART: [state] Locking Datavault
5,401,586 UART: [state] Locking PCR0, PCR1 and PCR31
5,402,190 UART: [state] Locking ICCM
5,402,862 UART: [exit] Launching FMC @ 0x40000130
5,408,191 UART:
5,408,207 UART: Running Caliptra FMC ...
5,408,615 UART:
5,408,758 UART: [state] CFI Enabled
5,497,785 UART: [art] Extend RT PCRs Done
5,498,213 UART: [art] Lock RT PCRs Done
5,499,326 UART: [art] Populate DV Done
5,507,457 UART: [fht] FMC Alias Private Key: 7
5,508,547 UART: [art] Derive CDI
5,508,827 UART: [art] Store in in slot 0x4
5,594,158 UART: [art] Derive Key Pair
5,594,518 UART: [art] Store priv key in slot 0x5
5,607,358 UART: [art] Derive Key Pair - Done
5,622,113 UART: [art] Signing Cert with AUTHO
5,622,593 UART: RITY.KEYID = 7
5,638,059 UART: [art] Erasing AUTHORITY.KEYID = 7
5,638,824 UART: [art] PUB.X = 3C464C6506FD652DEB45A8DF78D55AE56FF1A8FFFE538755585A88F206E5357151BF4923985E2862D0F670FCAE9C35BC
5,645,596 UART: [art] PUB.Y = 79FAC7025846E7A8208208D6DCBF78817D2BCED18A1F6004B8BD011CFA1FD5283DB8829AD24EF9F058AFB93EF4B99E8B
5,652,552 UART: [art] SIG.R = A47E2F68BEC09DC2E84B0B2BDEFCA154CBEC37242A85E1196DE26E25F646835DAAA23927D9F054E54D16A67C72D1C342
5,659,335 UART: [art] SIG.S = 05AA31DCE0A2380F56E1916D9690A9F28FB06B8E82DE9024FFE052633B4C57F311783C63DEA4CB546FC02132E3EDD55F
5,682,680 UART: Caliptra RT
5,683,025 UART: [state] CFI Enabled
5,970,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,972,207 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,002,585 UART: [rt]cmd =0x494e464f, len=4
6,006,114 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,743 ready_for_fw is high
1,055,743 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,158,448 >>> mbox cmd response: success
2,158,448 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,564 UART:
2,220,580 UART: Running Caliptra FMC ...
2,220,988 UART:
2,221,131 UART: [state] CFI Enabled
2,231,570 UART: [fht] FMC Alias Private Key: 7
2,339,635 UART: [art] Extend RT PCRs Done
2,340,063 UART: [art] Lock RT PCRs Done
2,341,379 UART: [art] Populate DV Done
2,349,698 UART: [fht] FMC Alias Private Key: 7
2,350,782 UART: [art] Derive CDI
2,351,062 UART: [art] Store in in slot 0x4
2,437,033 UART: [art] Derive Key Pair
2,437,393 UART: [art] Store priv key in slot 0x5
2,450,519 UART: [art] Derive Key Pair - Done
2,465,482 UART: [art] Signing Cert with AUTHO
2,465,962 UART: RITY.KEYID = 7
2,481,576 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,341 UART: [art] PUB.X = AF581C3FD1872C274B99666B7939F11EB09CD9A6A1C2D733B3EBAF0FD48FE23307AED738E029B281F67C09B1745F5B8A
2,489,114 UART: [art] PUB.Y = 1BAFBFD1B4C9E1CD399E3D68E64E3B625643A9833391D8B25DC98A3A6AD62B03483F9BEE0D1971BB603C5FC22AC944A6
2,496,074 UART: [art] SIG.R = C476ACCFE3D188AEEF9AF803CD8207F7B4EF4ADCC39E47CFEA8DE1E0E93D4000D4B4A8D5411504B515D593383DE5DD56
2,502,837 UART: [art] SIG.S = 66742F06D7B9BA3EAF1E0324C0D98D5069ECF505554049CDDEA9222238C412CCC20DB98AFE57CF9B3BAAE04B0153D55D
2,526,111 UART: mbox::rt_entry...
2,526,483 UART: ____ _ _ _ ____ _____
2,527,267 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,067 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,835 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,603 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,371 UART: |_|
2,530,683 UART:
2,637,207 UART: [rt] Runtime listening for mailbox commands...
2,642,175 >>> mbox cmd response data (3272 bytes)
2,642,176 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,665,262 >>> mbox cmd response data (0 bytes)
2,665,263 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,096,843 >>> mbox cmd response: success
5,110,491 UART:
5,110,507 UART: Running Caliptra FMC ...
5,110,915 UART:
5,111,058 UART: [state] CFI Enabled
5,199,863 UART: [art] Extend RT PCRs Done
5,200,291 UART: [art] Lock RT PCRs Done
5,201,514 UART: [art] Populate DV Done
5,209,925 UART: [fht] FMC Alias Private Key: 7
5,210,979 UART: [art] Derive CDI
5,211,259 UART: [art] Store in in slot 0x4
5,296,846 UART: [art] Derive Key Pair
5,297,206 UART: [art] Store priv key in slot 0x5
5,310,666 UART: [art] Derive Key Pair - Done
5,325,260 UART: [art] Signing Cert with AUTHO
5,325,740 UART: RITY.KEYID = 7
5,340,980 UART: [art] Erasing AUTHORITY.KEYID = 7
5,341,745 UART: [art] PUB.X = 0A27F4D36822F3CA2D07655BAEF182BD9172CA62AD0CD2A64D5ED367EC2810B273E8FD29DAC12A379F94168AE8DADEB5
5,348,526 UART: [art] PUB.Y = 0A9256632B36A79A3024F4949D31C3DABF41637ED1A682CD42FDA64FADD5AC509F0DAB400AB812C62E18698C59EBF1FD
5,355,483 UART: [art] SIG.R = D80658A6CDD1B0CD6892E744021681FA4CF4A1C7A7284B9BDFFE1B2713DE44C13CAC094A2413D8B9E0BB17A7DF3DDC12
5,362,264 UART: [art] SIG.S = D28D2D29F985F07D2F5503313809CAE1C9660279A893C557254B791604F9EA209827C7991F18BE8F965CE5FFCE04F04E
5,385,896 UART: Caliptra RT
5,386,241 UART: [state] CFI Enabled
5,675,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,676,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,707,562 UART: [rt]cmd =0x494e464f, len=4
5,711,193 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
191,969 UART:
192,333 UART: Running Caliptra ROM ...
193,456 UART:
193,599 UART: [state] CFI Enabled
265,060 UART: [state] LifecycleState = Unprovisioned
266,991 UART: [state] DebugLocked = No
269,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,667 UART: [kat] SHA2-256
444,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,879 UART: [kat] ++
455,350 UART: [kat] sha1
466,152 UART: [kat] SHA2-256
468,867 UART: [kat] SHA2-384
474,210 UART: [kat] SHA2-512-ACC
476,509 UART: [kat] ECC-384
2,768,037 UART: [kat] HMAC-384Kdf
2,801,008 UART: [kat] LMS
3,991,302 UART: [kat] --
3,994,944 UART: [cold-reset] ++
3,996,382 UART: [fht] Storing FHT @ 0x50003400
4,009,069 UART: [idev] ++
4,009,635 UART: [idev] CDI.KEYID = 6
4,010,659 UART: [idev] SUBJECT.KEYID = 7
4,011,832 UART: [idev] UDS.KEYID = 0
4,012,907 ready_for_fw is high
4,013,127 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,112,304 UART: [idev] Erasing UDS.KEYID = 0
7,346,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,137 UART: [idev] --
7,372,343 UART: [ldev] ++
7,372,911 UART: [ldev] CDI.KEYID = 6
7,373,924 UART: [ldev] SUBJECT.KEYID = 5
7,375,079 UART: [ldev] AUTHORITY.KEYID = 7
7,376,309 UART: [ldev] FE.KEYID = 1
7,422,597 UART: [ldev] Erasing FE.KEYID = 1
10,755,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,672 UART: [ldev] --
13,136,716 UART: [fwproc] Waiting for Commands...
13,139,397 UART: [fwproc] Received command 0x46574c44
13,141,577 UART: [fwproc] Received Image of size 78576 bytes
16,757,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,827,913 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,896,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,089,059 >>> mbox cmd response: success
17,089,530 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,093,014 UART: [afmc] ++
17,093,600 UART: [afmc] CDI.KEYID = 6
17,094,615 UART: [afmc] SUBJECT.KEYID = 7
17,095,770 UART: [afmc] AUTHORITY.KEYID = 5
20,451,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,753,453 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,755,720 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,770,138 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,784,954 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,799,377 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,820,655 UART: [afmc] --
22,825,106 UART: [cold-reset] --
22,829,480 UART: [state] Locking Datavault
22,836,250 UART: [state] Locking PCR0, PCR1 and PCR31
22,837,958 UART: [state] Locking ICCM
22,839,972 UART: [exit] Launching FMC @ 0x40000130
22,848,354 UART:
22,848,579 UART: Running Caliptra FMC ...
22,849,611 UART:
22,849,753 UART: [state] CFI Enabled
22,911,699 UART: [fht] FMC Alias Private Key: 7
25,249,376 UART: [art] Extend RT PCRs Done
25,250,597 UART: [art] Lock RT PCRs Done
25,252,371 UART: [art] Populate DV Done
25,257,559 UART: [fht] FMC Alias Private Key: 7
25,259,119 UART: [art] Derive CDI
25,259,846 UART: [art] Store in in slot 0x4
25,319,175 UART: [art] Derive Key Pair
25,320,206 UART: [art] Store priv key in slot 0x5
28,612,438 UART: [art] Derive Key Pair - Done
28,625,697 UART: [art] Signing Cert with AUTHO
28,626,996 UART: RITY.KEYID = 7
30,914,483 UART: [art] Erasing AUTHORITY.KEYID = 7
30,915,980 UART: [art] PUB.X = B69CF91FFA6B5804243A302FF1DE1520294A881BD13FB45A251150FCB8F2C88599CD5205337A64EA2613E48A35071681
30,923,212 UART: [art] PUB.Y = 500A9660382BFA85F53A4538C5EAD77BACEFC28D9622B55C0473EDDCF52D7ECEA7CA0174B0685B5EF4A0706587A9F77D
30,930,466 UART: [art] SIG.R = 5451F8353B0C547E1B6E60CB8E12EF8D412A1B3F43675FB2B06F2003E4196A472F66B118E24B043CC098B4504CDA0DD4
30,937,855 UART: [art] SIG.S = CAEF5B02A1ECE2F3DB1140EC29AB7F778EB5D0986926A706153B6C9315A39C6555DEE93185214929B499006E2ED00336
32,242,577 UART: mbox::rt_entry...
32,243,533 UART: ____ _ _ _ ____ _____
32,245,475 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,247,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,249,412 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,251,331 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,253,247 UART: |_|
32,254,074 UART:
32,367,111 UART: [rt] Runtime listening for mailbox commands...
32,373,012 >>> mbox cmd response data (3272 bytes)
32,388,505 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,421,881 >>> mbox cmd response data (0 bytes)
34,482,198 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,626,129 UART:
34,626,512 UART: Running Caliptra ROM ...
34,627,651 UART:
34,627,813 UART: [state] CFI Enabled
34,689,133 UART: [state] LifecycleState = Unprovisioned
34,691,070 UART: [state] DebugLocked = No
34,692,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,698,040 UART: [kat] SHA2-256
34,867,726 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,878,229 UART: [kat] ++
34,878,680 UART: [kat] sha1
34,889,452 UART: [kat] SHA2-256
34,892,141 UART: [kat] SHA2-384
34,896,931 UART: [kat] SHA2-512-ACC
34,899,320 UART: [kat] ECC-384
37,192,884 UART: [kat] HMAC-384Kdf
37,225,194 UART: [kat] LMS
38,415,539 UART: [kat] --
38,419,056 UART: [update-reset] ++
42,557,695 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,562,179 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,943,485 >>> mbox cmd response: success
42,948,058 UART: [update-reset] Copying MAN_2 To MAN_1
42,966,207 UART: [update-reset Success] --
42,969,265 UART: [state] Locking Datavault
42,972,465 UART: [state] Locking PCR0, PCR1 and PCR31
42,974,224 UART: [state] Locking ICCM
42,975,685 UART: [exit] Launching FMC @ 0x40000130
42,984,117 UART:
42,984,406 UART: Running Caliptra FMC ...
42,985,509 UART:
42,985,670 UART: [state] CFI Enabled
43,084,408 UART: [art] Extend RT PCRs Done
43,085,595 UART: [art] Lock RT PCRs Done
43,087,002 UART: [art] Populate DV Done
43,092,379 UART: [fht] FMC Alias Private Key: 7
43,094,071 UART: [art] Derive CDI
43,094,881 UART: [art] Store in in slot 0x4
43,153,112 UART: [art] Derive Key Pair
43,154,148 UART: [art] Store priv key in slot 0x5
46,447,389 UART: [art] Derive Key Pair - Done
46,460,613 UART: [art] Signing Cert with AUTHO
46,461,912 UART: RITY.KEYID = 7
48,748,219 UART: [art] Erasing AUTHORITY.KEYID = 7
48,749,725 UART: [art] PUB.X = 0027945C8377891A2CB018A6DE41572F1E3D6AB3621B831E9F0306819460DED429570263810787FD90328F8A8C93D14D
48,756,945 UART: [art] PUB.Y = 56FC3909688B8584C49A1B5088A5778C05A5A7E7870F481F4F53F8606F8392F1238BFFB03BA53688EBBAD8C6D67F398A
48,764,194 UART: [art] SIG.R = 74D785B98906B4D1B47B71A9014DCD725B383AD8F1CC15B584E4BD568E72D5CA834E886C2177D0172A1EC603F732346C
48,771,617 UART: [art] SIG.S = 896B36D14DEE1CBEE57BA0782BAC411187876103A6F2A4BFC61B27846337EB90EE06B0BE9C58C6606E10BCE12E3EAD5F
50,077,353 UART: Caliptra RT
50,078,053 UART: [state] CFI Enabled
53,505,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,507,339 UART: [rt] RT listening for mailbox commands...
53,538,886 UART: [rt]cmd =0x494e464f, len=4
53,543,161 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,781,899 ready_for_fw is high
3,782,484 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,098,323 >>> mbox cmd response: success
17,098,947 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,795,244 UART:
22,795,625 UART: Running Caliptra FMC ...
22,796,722 UART:
22,796,872 UART: [state] CFI Enabled
22,846,893 UART: [fht] FMC Alias Private Key: 7
25,185,022 UART: [art] Extend RT PCRs Done
25,186,251 UART: [art] Lock RT PCRs Done
25,188,059 UART: [art] Populate DV Done
25,193,473 UART: [fht] FMC Alias Private Key: 7
25,195,007 UART: [art] Derive CDI
25,195,823 UART: [art] Store in in slot 0x4
25,256,938 UART: [art] Derive Key Pair
25,257,970 UART: [art] Store priv key in slot 0x5
28,550,394 UART: [art] Derive Key Pair - Done
28,563,170 UART: [art] Signing Cert with AUTHO
28,564,488 UART: RITY.KEYID = 7
30,852,027 UART: [art] Erasing AUTHORITY.KEYID = 7
30,853,549 UART: [art] PUB.X = 75EC55FB050619C93107AB6613137EE8E94C4B6A15894DEE37E7F0D277A658342EDCF176B9856AB17E2DEEF984D61954
30,860,766 UART: [art] PUB.Y = 2B4CA5461C3C2ED87F2B172DB2C07E08597D7B958FA98D5B97861D19E4EF6506566D975F8BCC72509AAA23B78340E396
30,868,006 UART: [art] SIG.R = 34E8D3301AD934FE4DA69AD79ADFCF88627A90412CEB6C1B2035119219C7DEA08A317202F11A0597A9AD0A6AB95A63F5
30,875,358 UART: [art] SIG.S = 2D3460E7297384783599FD7A6D7F1C8E61777407B03D5B9C697F3E79739DE779ADEEEFB5D922C9961FCDF03556AF5AC3
32,180,100 UART: mbox::rt_entry...
32,181,046 UART: ____ _ _ _ ____ _____
32,182,970 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,184,971 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,186,818 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,188,778 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,190,629 UART: |_|
32,191,502 UART:
32,304,818 UART: [rt] Runtime listening for mailbox commands...
32,310,672 >>> mbox cmd response data (3272 bytes)
32,326,418 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,359,799 >>> mbox cmd response data (0 bytes)
34,419,506 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,146,811 >>> mbox cmd response: success
43,182,768 UART:
43,183,107 UART: Running Caliptra FMC ...
43,184,227 UART:
43,184,387 UART: [state] CFI Enabled
43,274,991 UART: [art] Extend RT PCRs Done
43,276,175 UART: [art] Lock RT PCRs Done
43,277,301 UART: [art] Populate DV Done
43,282,921 UART: [fht] FMC Alias Private Key: 7
43,284,579 UART: [art] Derive CDI
43,285,392 UART: [art] Store in in slot 0x4
43,344,556 UART: [art] Derive Key Pair
43,345,613 UART: [art] Store priv key in slot 0x5
46,637,935 UART: [art] Derive Key Pair - Done
46,651,032 UART: [art] Signing Cert with AUTHO
46,652,338 UART: RITY.KEYID = 7
48,940,889 UART: [art] Erasing AUTHORITY.KEYID = 7
48,942,394 UART: [art] PUB.X = 594D7763647BD874CCF6B08EA782DED25E812A178BF2BA55F638B65463845F1202798538125F02D70AE0E7C34B961EBC
48,949,654 UART: [art] PUB.Y = E2247D5B08977E5D6BA9778D21541121589DA7AAF67C588F8D30F361D9812E38B72172984A225D58868427FBBC485669
48,956,884 UART: [art] SIG.R = 435A0492142EEA23B81424F44C67846869259AB19BA357E45FE6B06A25072EA7241269673247C4744D6D6EF069FB59C2
48,964,231 UART: [art] SIG.S = 9CFA896BE4E288160EBC76D85A8EBE508CA61388ACAFC55B43B1D6B90A69542960FF7F1DFE3D907AC9216342AEAB703F
50,269,489 UART: Caliptra RT
50,270,201 UART: [state] CFI Enabled
53,678,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,679,858 UART: [rt] RT listening for mailbox commands...
53,711,300 UART: [rt]cmd =0x494e464f, len=4
53,715,741 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,478 UART:
192,843 UART: Running Caliptra ROM ...
194,135 UART:
603,673 UART: [state] CFI Enabled
617,323 UART: [state] LifecycleState = Unprovisioned
619,262 UART: [state] DebugLocked = No
621,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,802 UART: [kat] SHA2-256
796,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,054 UART: [kat] ++
807,512 UART: [kat] sha1
818,333 UART: [kat] SHA2-256
821,060 UART: [kat] SHA2-384
825,915 UART: [kat] SHA2-512-ACC
828,284 UART: [kat] ECC-384
3,111,299 UART: [kat] HMAC-384Kdf
3,123,469 UART: [kat] LMS
4,313,559 UART: [kat] --
4,319,187 UART: [cold-reset] ++
4,320,340 UART: [fht] Storing FHT @ 0x50003400
4,333,599 UART: [idev] ++
4,334,162 UART: [idev] CDI.KEYID = 6
4,335,046 UART: [idev] SUBJECT.KEYID = 7
4,336,292 UART: [idev] UDS.KEYID = 0
4,337,341 ready_for_fw is high
4,337,556 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,436,391 UART: [idev] Erasing UDS.KEYID = 0
7,628,339 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,966 UART: [idev] --
7,654,614 UART: [ldev] ++
7,655,192 UART: [ldev] CDI.KEYID = 6
7,656,160 UART: [ldev] SUBJECT.KEYID = 5
7,657,376 UART: [ldev] AUTHORITY.KEYID = 7
7,658,608 UART: [ldev] FE.KEYID = 1
7,668,875 UART: [ldev] Erasing FE.KEYID = 1
10,954,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,616 UART: [ldev] --
13,312,591 UART: [fwproc] Waiting for Commands...
13,315,016 UART: [fwproc] Received command 0x46574c44
13,317,223 UART: [fwproc] Received Image of size 78576 bytes
16,937,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,005,399 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,074,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,266,514 >>> mbox cmd response: success
17,267,005 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,271,177 UART: [afmc] ++
17,271,777 UART: [afmc] CDI.KEYID = 6
17,272,664 UART: [afmc] SUBJECT.KEYID = 7
17,273,937 UART: [afmc] AUTHORITY.KEYID = 5
20,586,125 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,883,191 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,885,450 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,899,834 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,914,685 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,929,146 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,951,527 UART: [afmc] --
22,954,742 UART: [cold-reset] --
22,958,600 UART: [state] Locking Datavault
22,963,146 UART: [state] Locking PCR0, PCR1 and PCR31
22,964,899 UART: [state] Locking ICCM
22,967,511 UART: [exit] Launching FMC @ 0x40000130
22,975,902 UART:
22,976,137 UART: Running Caliptra FMC ...
22,977,175 UART:
22,977,327 UART: [state] CFI Enabled
22,985,478 UART: [fht] FMC Alias Private Key: 7
25,315,988 UART: [art] Extend RT PCRs Done
25,317,215 UART: [art] Lock RT PCRs Done
25,318,669 UART: [art] Populate DV Done
25,324,089 UART: [fht] FMC Alias Private Key: 7
25,325,746 UART: [art] Derive CDI
25,326,582 UART: [art] Store in in slot 0x4
25,369,346 UART: [art] Derive Key Pair
25,370,345 UART: [art] Store priv key in slot 0x5
28,612,558 UART: [art] Derive Key Pair - Done
28,625,521 UART: [art] Signing Cert with AUTHO
28,626,832 UART: RITY.KEYID = 7
30,906,125 UART: [art] Erasing AUTHORITY.KEYID = 7
30,907,631 UART: [art] PUB.X = 400684992E530F76EB696869F6EB7D8EA1EA92CC7014043047AB0F301CC66D5CFFB408B4692573C441ECE7376A414F0E
30,914,883 UART: [art] PUB.Y = E61B94124ECF5A44953BED4C8301493D456A7BA12B4374E608705568A29B358D082CF7E6BDB6A1FF2D0336D46C82F431
30,922,123 UART: [art] SIG.R = B419F5CAE76372A36F1BCFCE0DD83A3BB8237FE74DBD76C13218A01885C4F78591A429CFE42A29713A3E82AE10DBB4C1
30,929,535 UART: [art] SIG.S = 22F0EE88FFFE0C4FA45D3499D5954BA387395F73F97E8BB921760FFCF7D43DB20E746F31FBBAD35B8A4BC085208556E5
32,233,157 UART: mbox::rt_entry...
32,234,096 UART: ____ _ _ _ ____ _____
32,236,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,238,029 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,239,893 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,241,837 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,243,769 UART: |_|
32,244,608 UART:
32,358,768 UART: [rt] Runtime listening for mailbox commands...
32,364,631 >>> mbox cmd response data (3272 bytes)
32,380,295 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,413,693 >>> mbox cmd response data (0 bytes)
34,539,938 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,684,078 UART:
34,684,468 UART: Running Caliptra ROM ...
34,685,628 UART:
34,685,803 UART: [state] CFI Enabled
34,699,709 UART: [state] LifecycleState = Unprovisioned
34,701,589 UART: [state] DebugLocked = No
34,703,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,708,695 UART: [kat] SHA2-256
34,878,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,888,941 UART: [kat] ++
34,889,397 UART: [kat] sha1
34,899,849 UART: [kat] SHA2-256
34,902,543 UART: [kat] SHA2-384
34,907,400 UART: [kat] SHA2-512-ACC
34,909,747 UART: [kat] ECC-384
37,193,558 UART: [kat] HMAC-384Kdf
37,205,630 UART: [kat] LMS
38,395,717 UART: [kat] --
38,400,403 UART: [update-reset] ++
42,532,522 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,536,462 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,917,733 >>> mbox cmd response: success
42,922,379 UART: [update-reset] Copying MAN_2 To MAN_1
42,941,011 UART: [update-reset Success] --
42,946,072 UART: [state] Locking Datavault
42,949,665 UART: [state] Locking PCR0, PCR1 and PCR31
42,951,377 UART: [state] Locking ICCM
42,952,680 UART: [exit] Launching FMC @ 0x40000130
42,961,076 UART:
42,961,313 UART: Running Caliptra FMC ...
42,962,432 UART:
42,962,595 UART: [state] CFI Enabled
43,006,187 UART: [art] Extend RT PCRs Done
43,007,390 UART: [art] Lock RT PCRs Done
43,008,744 UART: [art] Populate DV Done
43,014,211 UART: [fht] FMC Alias Private Key: 7
43,015,859 UART: [art] Derive CDI
43,016,674 UART: [art] Store in in slot 0x4
43,059,167 UART: [art] Derive Key Pair
43,060,172 UART: [art] Store priv key in slot 0x5
46,302,508 UART: [art] Derive Key Pair - Done
46,315,570 UART: [art] Signing Cert with AUTHO
46,316,878 UART: RITY.KEYID = 7
48,596,349 UART: [art] Erasing AUTHORITY.KEYID = 7
48,598,016 UART: [art] PUB.X = 1DF0F0F64C0CA0C8E151910F211984D41254DAF53214CCB12A952B0B54C0E5CEAE31F70274BF5813922F13A2E223769F
48,605,130 UART: [art] PUB.Y = B650480D3BB11953B61A4D32473E8C793F108BB3F5E6DB1505C5F9ACACBDD55547FAD3524DFDCCEBC274FD612EAF0F1E
48,612,398 UART: [art] SIG.R = CB413AE1B5EC99C56873EABF2EECDF6421C2B64E860EA9919AEAD65CBADDD28BAE108FCAC43FEDBB6507B5867A045027
48,619,797 UART: [art] SIG.S = B276E6EDBAF76A895D69BF608923B7F7952674300422B44F52CE5B0E748C1E0DA31750A4E8727D04D1180F63A56DB6AD
49,925,092 UART: Caliptra RT
49,925,814 UART: [state] CFI Enabled
53,222,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,224,036 UART: [rt] RT listening for mailbox commands...
53,255,643 UART: [rt]cmd =0x494e464f, len=4
53,259,956 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,120,904 ready_for_fw is high
4,121,624 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,344,528 >>> mbox cmd response: success
17,345,153 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,986,496 UART:
22,986,888 UART: Running Caliptra FMC ...
22,988,020 UART:
22,988,188 UART: [state] CFI Enabled
22,996,135 UART: [fht] FMC Alias Private Key: 7
25,327,664 UART: [art] Extend RT PCRs Done
25,328,903 UART: [art] Lock RT PCRs Done
25,330,397 UART: [art] Populate DV Done
25,335,931 UART: [fht] FMC Alias Private Key: 7
25,337,416 UART: [art] Derive CDI
25,338,180 UART: [art] Store in in slot 0x4
25,380,771 UART: [art] Derive Key Pair
25,381,768 UART: [art] Store priv key in slot 0x5
28,624,037 UART: [art] Derive Key Pair - Done
28,636,763 UART: [art] Signing Cert with AUTHO
28,638,085 UART: RITY.KEYID = 7
30,917,432 UART: [art] Erasing AUTHORITY.KEYID = 7
30,918,938 UART: [art] PUB.X = 1C47FC2238686164DCF42E410D84E37F7B64AB745296213F0D29A3379D341721C7E32079AA61B1AE912CB1D2ECC8F11D
30,926,169 UART: [art] PUB.Y = 09656924BDFCCFDD8C7CD4E9A65EABEF7DE157E437384B0FC561DBC81E991688C836C7B67D049292320619F6392665E3
30,933,416 UART: [art] SIG.R = 6005054330B50B7707211DB48A50287F3E4F32EED1F61DFF55EA7F67682880B29A5894A558C02D94171C15DCFEAE81FC
30,940,762 UART: [art] SIG.S = FC7EB05607FB175BAB786A6B3C5561E62F4F3C93C5AFCECB0D01183436F841320CECBF77BB7BAE95F30A2A3AA9FDBF80
32,246,094 UART: mbox::rt_entry...
32,247,069 UART: ____ _ _ _ ____ _____
32,249,002 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,251,014 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,252,876 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,254,836 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,256,722 UART: |_|
32,257,610 UART:
32,370,556 UART: [rt] Runtime listening for mailbox commands...
32,376,411 >>> mbox cmd response data (3272 bytes)
32,392,127 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,425,516 >>> mbox cmd response data (0 bytes)
34,553,990 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,208,820 >>> mbox cmd response: success
43,242,376 UART:
43,242,727 UART: Running Caliptra FMC ...
43,243,775 UART:
43,243,928 UART: [state] CFI Enabled
43,288,441 UART: [art] Extend RT PCRs Done
43,289,597 UART: [art] Lock RT PCRs Done
43,291,237 UART: [art] Populate DV Done
43,296,805 UART: [fht] FMC Alias Private Key: 7
43,298,523 UART: [art] Derive CDI
43,299,264 UART: [art] Store in in slot 0x4
43,341,922 UART: [art] Derive Key Pair
43,342,956 UART: [art] Store priv key in slot 0x5
46,585,232 UART: [art] Derive Key Pair - Done
46,598,017 UART: [art] Signing Cert with AUTHO
46,599,333 UART: RITY.KEYID = 7
48,878,440 UART: [art] Erasing AUTHORITY.KEYID = 7
48,879,953 UART: [art] PUB.X = 9454A890E98A4C9DAFDDF16E614685194F11B2C8D188561DFAA3AFDC0331FD19F85A89F8F6687185A418A8783A32F68A
48,887,158 UART: [art] PUB.Y = E01FA239001FABA314197A00148F55B32F239DD6A493ECF40DEEF8F2C992F665A6F1B8CACFA3811FD9E30173BB0AFE44
48,894,445 UART: [art] SIG.R = 34323702C3A67C7B60FE1407B8CC1E30BDDC97150ABB048C82D6481F4B5D1D0756550DC585DC0B797569CF1469C6AE27
48,901,789 UART: [art] SIG.S = E76409D26126CAFA0120940BA4C746C8CD7CDA14F9A87E9467128F19A9EED9540276A54C811E2BA4F0310A4BF8BEBDDE
50,207,132 UART: Caliptra RT
50,207,840 UART: [state] CFI Enabled
53,504,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,505,532 UART: [rt] RT listening for mailbox commands...
53,537,103 UART: [rt]cmd =0x494e464f, len=4
53,541,440 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
191,961 UART:
192,336 UART: Running Caliptra ROM ...
193,435 UART:
193,578 UART: [state] CFI Enabled
265,048 UART: [state] LifecycleState = Unprovisioned
266,960 UART: [state] DebugLocked = No
268,494 UART: [state] WD Timer not started. Device not locked for debugging
272,967 UART: [kat] SHA2-256
452,143 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,678 UART: [kat] ++
464,210 UART: [kat] sha1
475,091 UART: [kat] SHA2-256
478,106 UART: [kat] SHA2-384
483,667 UART: [kat] SHA2-512-ACC
486,682 UART: [kat] ECC-384
2,948,593 UART: [kat] HMAC-384Kdf
2,971,703 UART: [kat] LMS
3,501,144 UART: [kat] --
3,506,628 UART: [cold-reset] ++
3,508,129 UART: [fht] FHT @ 0x50003400
3,519,412 UART: [idev] ++
3,519,977 UART: [idev] CDI.KEYID = 6
3,521,009 UART: [idev] SUBJECT.KEYID = 7
3,522,118 UART: [idev] UDS.KEYID = 0
3,523,065 ready_for_fw is high
3,523,266 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,622,323 UART: [idev] Erasing UDS.KEYID = 0
6,023,804 UART: [idev] Sha1 KeyId Algorithm
6,045,197 UART: [idev] --
6,049,146 UART: [ldev] ++
6,049,720 UART: [ldev] CDI.KEYID = 6
6,050,632 UART: [ldev] SUBJECT.KEYID = 5
6,051,792 UART: [ldev] AUTHORITY.KEYID = 7
6,053,082 UART: [ldev] FE.KEYID = 1
6,099,546 UART: [ldev] Erasing FE.KEYID = 1
8,604,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,912 UART: [ldev] --
10,414,480 UART: [fwproc] Wait for Commands...
10,416,581 UART: [fwproc] Recv command 0x46574c44
10,418,686 UART: [fwproc] Recv'd Img size: 78532 bytes
13,386,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,457,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,526,523 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,718,347 >>> mbox cmd response: success
13,718,917 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,722,411 UART: [afmc] ++
13,723,001 UART: [afmc] CDI.KEYID = 6
13,723,894 UART: [afmc] SUBJECT.KEYID = 7
13,725,030 UART: [afmc] AUTHORITY.KEYID = 5
16,251,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,975,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,977,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,993,183 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,009,178 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,025,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,047,018 UART: [afmc] --
18,050,996 UART: [cold-reset] --
18,054,644 UART: [state] Locking Datavault
18,061,462 UART: [state] Locking PCR0, PCR1 and PCR31
18,063,113 UART: [state] Locking ICCM
18,065,560 UART: [exit] Launching FMC @ 0x40000130
18,073,960 UART:
18,074,196 UART: Running Caliptra FMC ...
18,075,299 UART:
18,075,479 UART: [state] CFI Enabled
18,133,980 UART: [fht] FMC Alias Private Key: 7
19,898,045 UART: [art] Extend RT PCRs Done
19,899,270 UART: [art] Lock RT PCRs Done
19,901,055 UART: [art] Populate DV Done
19,906,208 UART: [fht] FMC Alias Private Key: 7
19,907,798 UART: [art] Derive CDI
19,908,611 UART: [art] Store in in slot 0x4
19,966,012 UART: [art] Derive Key Pair
19,967,057 UART: [art] Store priv key in slot 0x5
22,430,124 UART: [art] Derive Key Pair - Done
22,443,304 UART: [art] Signing Cert with AUTHO
22,444,621 UART: RITY.KEYID = 7
24,156,042 UART: [art] Erasing AUTHORITY.KEYID = 7
24,157,552 UART: [art] PUB.X = EDB9273CF804C780EB2345E8B2E8BBF69BB3734E4DA98AFF6E449F5AB8D68B5E3E2ABA32B2420406BFD35911A6D3FCD2
24,164,827 UART: [art] PUB.Y = 323B276DB1E77612D321539502963E3E5210B2B00F591AF5B1DFD94A45034F267A623368266E36FC4326B93605FFC77E
24,172,099 UART: [art] SIG.R = E12DBC4ECCA4AF5D88D712FB9CAEC5FA0C4259C5E2B28817564ADCC05A24930629CFD0E77C6EBE92F5F1C0580EEB3F91
24,179,556 UART: [art] SIG.S = 9436AC3FD6BDAE05CF103771786DF34C71027C3E6C078CFB10C37E34652522BEFF2DB97231DD6355C752F62FC3435057
25,158,621 UART: mbox::rt_entry...
25,159,589 UART: ____ _ _ _ ____ _____
25,161,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,163,587 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,165,526 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,167,454 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,169,383 UART: |_|
25,170,193 UART:
25,283,469 UART: [rt] Runtime listening for mailbox commands...
25,289,314 >>> mbox cmd response data (3272 bytes)
25,305,436 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,338,914 >>> mbox cmd response data (0 bytes)
27,408,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,553,219 UART:
27,553,589 UART: Running Caliptra ROM ...
27,554,644 UART:
27,554,796 UART: [state] CFI Enabled
27,631,676 UART: [state] LifecycleState = Unprovisioned
27,633,561 UART: [state] DebugLocked = No
27,635,035 UART: [state] WD Timer not started. Device not locked for debugging
27,638,023 UART: [kat] SHA2-256
27,817,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,828,722 UART: [kat] ++
27,829,182 UART: [kat] sha1
27,840,789 UART: [kat] SHA2-256
27,843,801 UART: [kat] SHA2-384
27,848,711 UART: [kat] SHA2-512-ACC
27,851,657 UART: [kat] ECC-384
30,314,276 UART: [kat] HMAC-384Kdf
30,338,500 UART: [kat] LMS
30,867,929 UART: [kat] --
30,871,429 UART: [update-reset] ++
34,303,083 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,305,984 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,688,329 >>> mbox cmd response: success
34,692,788 UART: [update-reset] Copying MAN_2 To MAN_1
34,711,157 UART: [update-reset Success] --
34,715,634 UART: [state] Locking Datavault
34,719,109 UART: [state] Locking PCR0, PCR1 and PCR31
34,720,758 UART: [state] Locking ICCM
34,723,237 UART: [exit] Launching FMC @ 0x40000130
34,731,640 UART:
34,731,880 UART: Running Caliptra FMC ...
34,733,904 UART:
34,734,089 UART: [state] CFI Enabled
34,828,236 UART: [art] Extend RT PCRs Done
34,829,436 UART: [art] Lock RT PCRs Done
34,830,843 UART: [art] Populate DV Done
34,836,085 UART: [fht] FMC Alias Private Key: 7
34,837,789 UART: [art] Derive CDI
34,838,601 UART: [art] Store in in slot 0x4
34,897,189 UART: [art] Derive Key Pair
34,898,250 UART: [art] Store priv key in slot 0x5
37,360,854 UART: [art] Derive Key Pair - Done
37,373,858 UART: [art] Signing Cert with AUTHO
37,375,196 UART: RITY.KEYID = 7
39,086,413 UART: [art] Erasing AUTHORITY.KEYID = 7
39,087,913 UART: [art] PUB.X = 44564CD0A505E9EF1ECCAA876EFEDF66D834028BCE2C8A922E744BCE5BBAA704F7DC24FB3B6E2F806DCB0A6737F5A88F
39,095,231 UART: [art] PUB.Y = 3D2AB677CEF9BEA940CB3D1E622C57F3135E43D8AB143143AE4E4ED63583F0F3EFBEB50C1516E5843C07672905C49AC7
39,102,469 UART: [art] SIG.R = 6C69634007AF657609906A67C5F99FCB4707072F4A90E689F5BF6BC1F022356DE9B173B870AB7D89A0B7E700B18D8922
39,109,859 UART: [art] SIG.S = C7C65EC695346706B6B3BE32333D54417DFEFC7BC7EF3CD96808C33F388DE2DC94F6F2CA6366938D875F4730263824F0
40,088,870 UART: Caliptra RT
40,089,590 UART: [state] CFI Enabled
42,671,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,673,271 UART: [rt] RT listening for mailbox commands...
42,704,554 UART: [rt]cmd =0x494e464f, len=4
42,708,998 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,359,965 ready_for_fw is high
3,360,552 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,504,352 >>> mbox cmd response: success
13,505,020 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,792,913 UART:
17,793,323 UART: Running Caliptra FMC ...
17,794,466 UART:
17,794,626 UART: [state] CFI Enabled
17,857,366 UART: [fht] FMC Alias Private Key: 7
19,621,393 UART: [art] Extend RT PCRs Done
19,622,620 UART: [art] Lock RT PCRs Done
19,624,301 UART: [art] Populate DV Done
19,629,548 UART: [fht] FMC Alias Private Key: 7
19,631,043 UART: [art] Derive CDI
19,631,808 UART: [art] Store in in slot 0x4
19,689,696 UART: [art] Derive Key Pair
19,690,737 UART: [art] Store priv key in slot 0x5
22,153,812 UART: [art] Derive Key Pair - Done
22,166,698 UART: [art] Signing Cert with AUTHO
22,168,033 UART: RITY.KEYID = 7
23,879,060 UART: [art] Erasing AUTHORITY.KEYID = 7
23,880,590 UART: [art] PUB.X = A2E68625658038621416893B588884E6B5A13EFD0974E4437FE7D91BDA238C774C082BFF6CC7C4BB7573A7F1AF716C36
23,887,843 UART: [art] PUB.Y = 681832FFB66ACD2AECCB57E60C071C7BB329FC7DDCD380272D67CB6DBAEE7817217B2BC2F708764BBC556B05F04199CB
23,895,127 UART: [art] SIG.R = A08F48380E7D9E89E9F57D2BB97F3A7F99F4DAE4671960439E8E8BDFE85AF4C917301B2501EC16DF2A453389487E7FC5
23,902,517 UART: [art] SIG.S = CB8FC33543CE316226D27E0859C07637A96F107F68E97C74B3C30D8FED5AF2C28245514160BAC14558BAC14D16F5347C
24,881,722 UART: mbox::rt_entry...
24,882,711 UART: ____ _ _ _ ____ _____
24,884,887 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,886,909 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,888,845 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,890,814 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,892,748 UART: |_|
24,893,585 UART:
25,005,357 UART: [rt] Runtime listening for mailbox commands...
25,011,221 >>> mbox cmd response data (3272 bytes)
25,026,902 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,060,312 >>> mbox cmd response data (0 bytes)
27,119,698 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,251,327 >>> mbox cmd response: success
34,287,620 UART:
34,287,945 UART: Running Caliptra FMC ...
34,289,067 UART:
34,289,260 UART: [state] CFI Enabled
34,379,284 UART: [art] Extend RT PCRs Done
34,380,474 UART: [art] Lock RT PCRs Done
34,381,829 UART: [art] Populate DV Done
34,387,504 UART: [fht] FMC Alias Private Key: 7
34,389,148 UART: [art] Derive CDI
34,389,958 UART: [art] Store in in slot 0x4
34,447,865 UART: [art] Derive Key Pair
34,448,905 UART: [art] Store priv key in slot 0x5
36,911,391 UART: [art] Derive Key Pair - Done
36,924,125 UART: [art] Signing Cert with AUTHO
36,925,430 UART: RITY.KEYID = 7
38,637,317 UART: [art] Erasing AUTHORITY.KEYID = 7
38,638,812 UART: [art] PUB.X = BE269953612976ACDBB583B46823A9CF1FF2D871B3266688127AE439D3A13D62165C4DE90047E5CBF7A5883EC81B40EA
38,646,113 UART: [art] PUB.Y = 17B8FE380794B9FA9444007313B074671C0B8C78D2C95131CA9A8E3616DE7F80CC1F88A912CF17AE341B20BA38288BAB
38,653,355 UART: [art] SIG.R = 586F353FFB4EAA5F817905045169420B8FC85658444AF0D11294593A63C841F0B5DFEF6F99FAE56DAB31B5D4C4D2A85F
38,660,740 UART: [art] SIG.S = A14738C9CC9815FBC134EF8A38922E2B8E7C91475A183141EE7FF3A5A62A0DCB32B139CC2D989579EF6A48105E9AF831
39,639,494 UART: Caliptra RT
39,640,188 UART: [state] CFI Enabled
42,223,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,225,066 UART: [rt] RT listening for mailbox commands...
42,256,099 UART: [rt]cmd =0x494e464f, len=4
42,260,360 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
193,068 UART:
193,436 UART: Running Caliptra ROM ...
194,636 UART:
604,345 UART: [state] CFI Enabled
620,350 UART: [state] LifecycleState = Unprovisioned
622,281 UART: [state] DebugLocked = No
624,514 UART: [state] WD Timer not started. Device not locked for debugging
627,699 UART: [kat] SHA2-256
806,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,447 UART: [kat] ++
818,894 UART: [kat] sha1
829,482 UART: [kat] SHA2-256
832,560 UART: [kat] SHA2-384
839,825 UART: [kat] SHA2-512-ACC
842,768 UART: [kat] ECC-384
3,286,506 UART: [kat] HMAC-384Kdf
3,300,090 UART: [kat] LMS
3,829,560 UART: [kat] --
3,833,356 UART: [cold-reset] ++
3,834,222 UART: [fht] FHT @ 0x50003400
3,844,696 UART: [idev] ++
3,845,259 UART: [idev] CDI.KEYID = 6
3,846,182 UART: [idev] SUBJECT.KEYID = 7
3,847,352 UART: [idev] UDS.KEYID = 0
3,848,398 ready_for_fw is high
3,848,597 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,947,272 UART: [idev] Erasing UDS.KEYID = 0
6,321,679 UART: [idev] Sha1 KeyId Algorithm
6,343,315 UART: [idev] --
6,346,435 UART: [ldev] ++
6,346,999 UART: [ldev] CDI.KEYID = 6
6,347,914 UART: [ldev] SUBJECT.KEYID = 5
6,349,123 UART: [ldev] AUTHORITY.KEYID = 7
6,350,352 UART: [ldev] FE.KEYID = 1
6,360,585 UART: [ldev] Erasing FE.KEYID = 1
8,835,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,208 UART: [ldev] --
10,627,454 UART: [fwproc] Wait for Commands...
10,629,499 UART: [fwproc] Recv command 0x46574c44
10,631,600 UART: [fwproc] Recv'd Img size: 78532 bytes
13,589,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,661,740 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,730,483 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,922,979 >>> mbox cmd response: success
13,923,459 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,927,040 UART: [afmc] ++
13,927,647 UART: [afmc] CDI.KEYID = 6
13,928,559 UART: [afmc] SUBJECT.KEYID = 7
13,929,719 UART: [afmc] AUTHORITY.KEYID = 5
16,436,181 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,157,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,159,108 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,174,834 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,190,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,206,722 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,230,891 UART: [afmc] --
18,234,765 UART: [cold-reset] --
18,239,273 UART: [state] Locking Datavault
18,244,839 UART: [state] Locking PCR0, PCR1 and PCR31
18,246,495 UART: [state] Locking ICCM
18,248,323 UART: [exit] Launching FMC @ 0x40000130
18,256,720 UART:
18,256,972 UART: Running Caliptra FMC ...
18,258,078 UART:
18,258,245 UART: [state] CFI Enabled
18,266,430 UART: [fht] FMC Alias Private Key: 7
20,023,582 UART: [art] Extend RT PCRs Done
20,024,812 UART: [art] Lock RT PCRs Done
20,026,606 UART: [art] Populate DV Done
20,032,132 UART: [fht] FMC Alias Private Key: 7
20,033,620 UART: [art] Derive CDI
20,034,384 UART: [art] Store in in slot 0x4
20,077,147 UART: [art] Derive Key Pair
20,078,306 UART: [art] Store priv key in slot 0x5
22,505,043 UART: [art] Derive Key Pair - Done
22,517,736 UART: [art] Signing Cert with AUTHO
22,519,043 UART: RITY.KEYID = 7
24,224,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,225,946 UART: [art] PUB.X = B4A4935A6EA1432E272E591984DB7C563F3711B94EA0ABBC1A34C13B4CC3B5DDA332C02A056850D34C2E8D6A5815DC1C
24,233,207 UART: [art] PUB.Y = 4E8872DA7B9F3716ED3EE191991CBB8D493F7C06DDBD0F1F966D669A6EB8A3FF7FD92FABCA207AE1EDDA15D41B7AA6DD
24,240,500 UART: [art] SIG.R = 0FDF7D0E05D74CBBFF48EBA0AD9207C9B5DCE051E3418D25800854BF4693382B79D8FDF023CBA1BBB2A0F3B98748C3D3
24,247,899 UART: [art] SIG.S = C4DFB36D3859314C8C4F33E9F08F1F311D0B2FEE30E59E273416E84292864ECADC892B8E10394F8C2E3E7101A549DDBC
25,226,973 UART: mbox::rt_entry...
25,227,949 UART: ____ _ _ _ ____ _____
25,229,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,231,885 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,233,738 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,235,658 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,237,702 UART: |_|
25,238,513 UART:
25,352,150 UART: [rt] Runtime listening for mailbox commands...
25,358,004 >>> mbox cmd response data (3272 bytes)
25,373,795 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,407,251 >>> mbox cmd response data (0 bytes)
27,468,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,613,349 UART:
27,613,704 UART: Running Caliptra ROM ...
27,614,762 UART:
27,614,912 UART: [state] CFI Enabled
27,627,890 UART: [state] LifecycleState = Unprovisioned
27,629,732 UART: [state] DebugLocked = No
27,632,113 UART: [state] WD Timer not started. Device not locked for debugging
27,636,171 UART: [kat] SHA2-256
27,815,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,826,952 UART: [kat] ++
27,827,413 UART: [kat] sha1
27,838,300 UART: [kat] SHA2-256
27,841,314 UART: [kat] SHA2-384
27,848,056 UART: [kat] SHA2-512-ACC
27,851,011 UART: [kat] ECC-384
30,293,343 UART: [kat] HMAC-384Kdf
30,306,750 UART: [kat] LMS
30,836,257 UART: [kat] --
30,842,019 UART: [update-reset] ++
34,274,163 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,277,978 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,660,279 >>> mbox cmd response: success
34,664,716 UART: [update-reset] Copying MAN_2 To MAN_1
34,684,178 UART: [update-reset Success] --
34,689,609 UART: [state] Locking Datavault
34,694,215 UART: [state] Locking PCR0, PCR1 and PCR31
34,695,915 UART: [state] Locking ICCM
34,697,689 UART: [exit] Launching FMC @ 0x40000130
34,706,147 UART:
34,706,438 UART: Running Caliptra FMC ...
34,707,819 UART:
34,707,981 UART: [state] CFI Enabled
34,751,547 UART: [art] Extend RT PCRs Done
34,752,716 UART: [art] Lock RT PCRs Done
34,754,226 UART: [art] Populate DV Done
34,759,962 UART: [fht] FMC Alias Private Key: 7
34,761,495 UART: [art] Derive CDI
34,762,329 UART: [art] Store in in slot 0x4
34,805,026 UART: [art] Derive Key Pair
34,806,077 UART: [art] Store priv key in slot 0x5
37,232,994 UART: [art] Derive Key Pair - Done
37,246,268 UART: [art] Signing Cert with AUTHO
37,247,579 UART: RITY.KEYID = 7
38,952,946 UART: [art] Erasing AUTHORITY.KEYID = 7
38,954,454 UART: [art] PUB.X = B65357B45362B58CDF23CB2D643E75ECB28B3CEA74EB87013ABDEE845F74CFD651B7795CA3BB8CCC7A7CD003AC1C5470
38,961,769 UART: [art] PUB.Y = 7F3AC53F60F9F0D71DFA392907C7D7F5A29BE5F2559AD867AAD1BF67953E402D7A0354AC4FCE428EFFD7D6CE25E918B9
38,969,024 UART: [art] SIG.R = 30DCCD28A5A0831E940034D1E540B40F7661140B4249A9D4209A95DA4ADD725DC3B744E85330888C2940797838823C86
38,976,374 UART: [art] SIG.S = A7134E4C070E2C0FAB2B1C1CD607528F221A1E7DDDF3781E8F934759C61FACBFB88591617D7463B354F3321306CC2EEA
39,955,876 UART: Caliptra RT
39,956,608 UART: [state] CFI Enabled
42,438,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,439,391 UART: [rt] RT listening for mailbox commands...
42,470,668 UART: [rt]cmd =0x494e464f, len=4
42,475,044 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
3,693,416 ready_for_fw is high
3,694,022 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,686,599 >>> mbox cmd response: success
13,687,247 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,938,678 UART:
17,939,066 UART: Running Caliptra FMC ...
17,940,263 UART:
17,940,443 UART: [state] CFI Enabled
17,947,845 UART: [fht] FMC Alias Private Key: 7
19,705,097 UART: [art] Extend RT PCRs Done
19,706,326 UART: [art] Lock RT PCRs Done
19,708,065 UART: [art] Populate DV Done
19,713,696 UART: [fht] FMC Alias Private Key: 7
19,715,293 UART: [art] Derive CDI
19,716,108 UART: [art] Store in in slot 0x4
19,759,257 UART: [art] Derive Key Pair
19,760,300 UART: [art] Store priv key in slot 0x5
22,186,611 UART: [art] Derive Key Pair - Done
22,199,121 UART: [art] Signing Cert with AUTHO
22,200,448 UART: RITY.KEYID = 7
23,906,023 UART: [art] Erasing AUTHORITY.KEYID = 7
23,907,539 UART: [art] PUB.X = 9FDB9B1597A2D92356827DA3FF671474CAD12F4EC568D6CBAC8FEC6788731335DA86E6F2B2B708B5C9257D2B1E92DF88
23,914,839 UART: [art] PUB.Y = 585CCEDC26CAEDDBBDD6ADF0219D8192A1CB742663FEE72032C0D32E88E76039B6DA10671013E6634F178E51FD1DED6F
23,922,081 UART: [art] SIG.R = 29ACDFBE9CDDEDBEB88A306E6EBD2F4F6E4FE520372EAAFF226D842E4962F3E743FBCB58A89300A72783E1891A9FA004
23,929,481 UART: [art] SIG.S = 7A9C4AD6D2B91F0F9D06B078F923BCFC516E95FC6EAED5B6D3E0696B0E52160A02617A322C8C72E8B3100C59DFF0344D
24,908,668 UART: mbox::rt_entry...
24,909,609 UART: ____ _ _ _ ____ _____
24,911,543 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,913,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,915,407 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,917,363 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,919,407 UART: |_|
24,920,218 UART:
25,033,582 UART: [rt] Runtime listening for mailbox commands...
25,039,398 >>> mbox cmd response data (3272 bytes)
25,055,013 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,088,423 >>> mbox cmd response data (0 bytes)
27,145,614 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,193,156 >>> mbox cmd response: success
34,228,180 UART:
34,228,537 UART: Running Caliptra FMC ...
34,229,671 UART:
34,229,836 UART: [state] CFI Enabled
34,273,603 UART: [art] Extend RT PCRs Done
34,274,757 UART: [art] Lock RT PCRs Done
34,276,210 UART: [art] Populate DV Done
34,281,671 UART: [fht] FMC Alias Private Key: 7
34,283,288 UART: [art] Derive CDI
34,284,333 UART: [art] Store in in slot 0x4
34,326,897 UART: [art] Derive Key Pair
34,327,903 UART: [art] Store priv key in slot 0x5
36,754,899 UART: [art] Derive Key Pair - Done
36,768,152 UART: [art] Signing Cert with AUTHO
36,769,485 UART: RITY.KEYID = 7
38,474,743 UART: [art] Erasing AUTHORITY.KEYID = 7
38,476,255 UART: [art] PUB.X = 7CD77B2A1BBBC60E90D73F4979C5B5914F75EF03A06873DF386088C2DC72020851F3D6B5EC50F7B9239EEB174BC9A2DD
38,483,502 UART: [art] PUB.Y = 061ACB71E75EC9D440FB3A3AB2289B9A78062225E92CB0B61D7C9443047E5C4B2F2A73646D5D03DE409A41BAAC91C9F7
38,490,790 UART: [art] SIG.R = 32453A6F25AF53F9751A0846B4C93A806BE26C6938894E96F04AFA528275924E35A33E700A122F006059B4E7770029C0
38,498,129 UART: [art] SIG.S = 155A3D5B345865FAF9920650538132B914D9895E525E6244CE27AD336FF815B10002B85CF96B390E0BD97EF77EFD7932
39,477,079 UART: Caliptra RT
39,477,770 UART: [state] CFI Enabled
41,958,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,959,973 UART: [rt] RT listening for mailbox commands...
41,991,294 UART: [rt]cmd =0x494e464f, len=4
41,995,446 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,175 UART:
192,543 UART: Running Caliptra ROM ...
193,733 UART:
193,887 UART: [state] CFI Enabled
265,193 UART: [state] LifecycleState = Unprovisioned
267,597 UART: [state] DebugLocked = No
269,486 UART: [state] WD Timer not started. Device not locked for debugging
274,457 UART: [kat] SHA2-256
464,309 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,142 UART: [kat] ++
475,621 UART: [kat] sha1
487,490 UART: [kat] SHA2-256
490,507 UART: [kat] SHA2-384
496,144 UART: [kat] SHA2-512-ACC
498,727 UART: [kat] ECC-384
2,948,218 UART: [kat] HMAC-384Kdf
2,972,983 UART: [kat] LMS
3,504,783 UART: [kat] --
3,508,305 UART: [cold-reset] ++
3,510,598 UART: [fht] FHT @ 0x50003400
3,521,788 UART: [idev] ++
3,522,492 UART: [idev] CDI.KEYID = 6
3,523,527 UART: [idev] SUBJECT.KEYID = 7
3,524,627 UART: [idev] UDS.KEYID = 0
3,525,555 ready_for_fw is high
3,525,765 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,624,652 UART: [idev] Erasing UDS.KEYID = 0
6,029,152 UART: [idev] Sha1 KeyId Algorithm
6,051,390 UART: [idev] --
6,056,664 UART: [ldev] ++
6,057,357 UART: [ldev] CDI.KEYID = 6
6,058,279 UART: [ldev] SUBJECT.KEYID = 5
6,059,462 UART: [ldev] AUTHORITY.KEYID = 7
6,060,643 UART: [ldev] FE.KEYID = 1
6,100,511 UART: [ldev] Erasing FE.KEYID = 1
8,604,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,102 UART: [ldev] --
10,413,364 UART: [fwproc] Wait for Commands...
10,416,210 UART: [fwproc] Recv command 0x46574c44
10,418,516 UART: [fwproc] Recv'd Img size: 78532 bytes
13,425,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,499,407 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,615,560 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,942,828 >>> mbox cmd response: success
13,943,379 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,946,465 UART: [afmc] ++
13,947,171 UART: [afmc] CDI.KEYID = 6
13,948,417 UART: [afmc] SUBJECT.KEYID = 7
13,949,851 UART: [afmc] AUTHORITY.KEYID = 5
16,488,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,211,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,213,231 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,228,424 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,243,543 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,258,559 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,282,179 UART: [afmc] --
18,285,773 UART: [cold-reset] --
18,289,371 UART: [state] Locking Datavault
18,295,640 UART: [state] Locking PCR0, PCR1 and PCR31
18,297,847 UART: [state] Locking ICCM
18,299,755 UART: [exit] Launching FMC @ 0x40000130
18,308,389 UART:
18,308,624 UART: Running Caliptra FMC ...
18,309,724 UART:
18,309,893 UART: [state] CFI Enabled
18,370,687 UART: [fht] FMC Alias Private Key: 7
20,134,869 UART: [art] Extend RT PCRs Done
20,136,108 UART: [art] Lock RT PCRs Done
20,137,684 UART: [art] Populate DV Done
20,143,320 UART: [fht] FMC Alias Private Key: 7
20,145,020 UART: [art] Derive CDI
20,145,840 UART: [art] Store in in slot 0x4
20,204,097 UART: [art] Derive Key Pair
20,205,100 UART: [art] Store priv key in slot 0x5
22,668,058 UART: [art] Derive Key Pair - Done
22,681,114 UART: [art] Signing Cert with AUTHO
22,682,445 UART: RITY.KEYID = 7
24,393,884 UART: [art] Erasing AUTHORITY.KEYID = 7
24,395,389 UART: [art] PUB.X = CA24E8F2F44067139A92FC612C172E14FA6146B333F3E7A0F218FDF3F249BD548587D2449B656F27F7F6C9EAFF61147A
24,402,652 UART: [art] PUB.Y = 75C5B08AA99C57D28C1738BA38A34ED615DDED036C281CC1F571932C33B4D995A9F7197237CFF2DEEE0BE5FFD9159FA2
24,409,901 UART: [art] SIG.R = DE0E8A860614D7AF0CBA0CCCEA41C0AE48131CE3ABF66D8D357E8BBAFA7C62D3885646F8B1AD7EA40D07ABDB202C87BD
24,417,366 UART: [art] SIG.S = 83E5B70F0396917A7AE30FC15ACEE54753F89EC04EB617495ED2DBF451064EC7EF94CA62CCDA9E2E448D0321381F0593
25,396,340 UART: mbox::rt_entry...
25,397,290 UART: ____ _ _ _ ____ _____
25,399,271 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,401,276 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,403,207 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,405,138 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,407,064 UART: |_|
25,407,903 UART:
25,521,805 UART: [rt] Runtime listening for mailbox commands...
25,527,649 >>> mbox cmd response data (3272 bytes)
25,543,486 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,576,891 >>> mbox cmd response data (0 bytes)
27,637,502 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,781,949 UART:
27,782,340 UART: Running Caliptra ROM ...
27,783,390 UART:
27,783,544 UART: [state] CFI Enabled
27,848,973 UART: [state] LifecycleState = Unprovisioned
27,851,082 UART: [state] DebugLocked = No
27,853,910 UART: [state] WD Timer not started. Device not locked for debugging
27,858,345 UART: [kat] SHA2-256
28,048,215 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,058,963 UART: [kat] ++
28,059,427 UART: [kat] sha1
28,071,025 UART: [kat] SHA2-256
28,073,999 UART: [kat] SHA2-384
28,080,802 UART: [kat] SHA2-512-ACC
28,083,388 UART: [kat] ECC-384
30,533,225 UART: [kat] HMAC-384Kdf
30,554,819 UART: [kat] LMS
31,086,389 UART: [kat] --
31,090,486 UART: [update-reset] ++
34,544,507 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,548,644 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,155,247 >>> mbox cmd response: success
35,159,862 UART: [update-reset] Copying MAN_2 To MAN_1
35,194,414 UART: [update-reset Success] --
35,199,133 UART: [state] Locking Datavault
35,203,441 UART: [state] Locking PCR0, PCR1 and PCR31
35,205,604 UART: [state] Locking ICCM
35,207,743 UART: [exit] Launching FMC @ 0x40000130
35,216,385 UART:
35,216,629 UART: Running Caliptra FMC ...
35,217,715 UART:
35,217,867 UART: [state] CFI Enabled
35,325,546 UART: [art] Extend RT PCRs Done
35,326,740 UART: [art] Lock RT PCRs Done
35,328,089 UART: [art] Populate DV Done
35,333,671 UART: [fht] FMC Alias Private Key: 7
35,335,417 UART: [art] Derive CDI
35,336,244 UART: [art] Store in in slot 0x4
35,393,838 UART: [art] Derive Key Pair
35,394,844 UART: [art] Store priv key in slot 0x5
37,859,422 UART: [art] Derive Key Pair - Done
37,872,375 UART: [art] Signing Cert with AUTHO
37,873,676 UART: RITY.KEYID = 7
39,584,906 UART: [art] Erasing AUTHORITY.KEYID = 7
39,586,435 UART: [art] PUB.X = DA351FDA76020AA97E990C179EA77EE59E7372F4BA7E11A0B23DD7398103E5251C34B179C4655B3B85607AC29F64E454
39,593,658 UART: [art] PUB.Y = CDA8716C74DADDC83CA9EFF2E91A79D71F459B08A82DE4A46048A46E61FA0E9B9E037E49927BA7D5CB2584A4C6B34631
39,600,926 UART: [art] SIG.R = 8B3D57E4A63BDB2EB5ACF313266CBA0377A90AB44DECA48B80877C0DDDF26F712DA9F47C5A6B4806C89B6DFEDE8B039A
39,608,349 UART: [art] SIG.S = 8762B1455122AB43639EEE6BB5A0054B6451679815C9F761E8384FE930BB9AF0A4B9D1C34BB220CA19092347ADCCD2C4
40,587,106 UART: Caliptra RT
40,587,813 UART: [state] CFI Enabled
43,169,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,171,233 UART: [rt] RT listening for mailbox commands...
43,202,693 UART: [rt]cmd =0x494e464f, len=4
43,206,864 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,406,254 ready_for_fw is high
3,406,821 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,935,814 >>> mbox cmd response: success
13,936,494 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,245,147 UART:
18,245,546 UART: Running Caliptra FMC ...
18,246,686 UART:
18,246,849 UART: [state] CFI Enabled
18,315,247 UART: [fht] FMC Alias Private Key: 7
20,078,829 UART: [art] Extend RT PCRs Done
20,080,057 UART: [art] Lock RT PCRs Done
20,081,526 UART: [art] Populate DV Done
20,086,785 UART: [fht] FMC Alias Private Key: 7
20,088,440 UART: [art] Derive CDI
20,089,264 UART: [art] Store in in slot 0x4
20,147,700 UART: [art] Derive Key Pair
20,148,740 UART: [art] Store priv key in slot 0x5
22,611,676 UART: [art] Derive Key Pair - Done
22,624,685 UART: [art] Signing Cert with AUTHO
22,625,988 UART: RITY.KEYID = 7
24,338,043 UART: [art] Erasing AUTHORITY.KEYID = 7
24,339,550 UART: [art] PUB.X = CA4E8F201221CE9FD290ABD85C1210DB945E025A61388D215273798119059355A3B78F451FC0D28C16C678D35CB53ECB
24,346,797 UART: [art] PUB.Y = 14D0CBE9568EA7F94CCFF0B535B3B85567D002593B1366F522C8E15B87333DED6B51A8273E1A652EF5A4997B54ECF2FE
24,354,031 UART: [art] SIG.R = B7FC81183795CE6D052D6B817F312C68A55735D191BB5E465C8AA8007DCF231B930F02376816AAF42C592A138D233450
24,361,463 UART: [art] SIG.S = E1EAEC5EAD815599B48F0EEDDD9A8119A57C3537E749EDDD8E4B7B4AEDF4ED7A65EE2C470D6F2D15ACE93D0D9D39AE05
25,339,569 UART: mbox::rt_entry...
25,340,523 UART: ____ _ _ _ ____ _____
25,342,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,344,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,346,441 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,348,421 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,350,356 UART: |_|
25,351,164 UART:
25,464,989 UART: [rt] Runtime listening for mailbox commands...
25,470,805 >>> mbox cmd response data (3272 bytes)
25,486,605 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,520,073 >>> mbox cmd response data (0 bytes)
27,580,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,390,901 >>> mbox cmd response: success
35,427,007 UART:
35,427,366 UART: Running Caliptra FMC ...
35,428,424 UART:
35,428,579 UART: [state] CFI Enabled
35,522,887 UART: [art] Extend RT PCRs Done
35,524,075 UART: [art] Lock RT PCRs Done
35,525,456 UART: [art] Populate DV Done
35,530,834 UART: [fht] FMC Alias Private Key: 7
35,532,541 UART: [art] Derive CDI
35,533,280 UART: [art] Store in in slot 0x4
35,591,186 UART: [art] Derive Key Pair
35,592,224 UART: [art] Store priv key in slot 0x5
38,055,080 UART: [art] Derive Key Pair - Done
38,068,139 UART: [art] Signing Cert with AUTHO
38,069,443 UART: RITY.KEYID = 7
39,780,712 UART: [art] Erasing AUTHORITY.KEYID = 7
39,782,224 UART: [art] PUB.X = AA9692C320592BDA99F6E1E989459E6812FF3D20F7B809BE3C85AB11E295553C0FFDD97ED591F59D405B6F03C06033D6
39,789,519 UART: [art] PUB.Y = 4FAF1878E872D21D26065AE2962E411438448B3E0ED62D2ED82BFDD9F65D75148103B9C64637AFAA35183A8DD6A4E670
39,796,771 UART: [art] SIG.R = 99A700CE03383D37E828A10131C75264D618CEA5563CCEBC2171132D70D4E1A98CFE4AAE0BFEF744C6E494840B196216
39,804,110 UART: [art] SIG.S = 2545EC752677542F988D9BC99E1B179C6FECCB92A7AAC8775A7CAFCF1E923DBE4EBFB9477E7A08549C34F271122A3A3C
40,782,679 UART: Caliptra RT
40,783,391 UART: [state] CFI Enabled
43,365,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,366,983 UART: [rt] RT listening for mailbox commands...
43,398,302 UART: [rt]cmd =0x494e464f, len=4
43,402,564 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,761 writing to cptra_bootfsm_go
192,901 UART:
193,258 UART: Running Caliptra ROM ...
194,382 UART:
604,232 UART: [state] CFI Enabled
617,259 UART: [state] LifecycleState = Unprovisioned
619,285 UART: [state] DebugLocked = No
621,596 UART: [state] WD Timer not started. Device not locked for debugging
626,140 UART: [kat] SHA2-256
816,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,817 UART: [kat] ++
827,420 UART: [kat] sha1
839,318 UART: [kat] SHA2-256
842,296 UART: [kat] SHA2-384
847,294 UART: [kat] SHA2-512-ACC
849,876 UART: [kat] ECC-384
3,290,486 UART: [kat] HMAC-384Kdf
3,303,429 UART: [kat] LMS
3,835,262 UART: [kat] --
3,840,985 UART: [cold-reset] ++
3,842,703 UART: [fht] FHT @ 0x50003400
3,855,237 UART: [idev] ++
3,855,968 UART: [idev] CDI.KEYID = 6
3,856,931 UART: [idev] SUBJECT.KEYID = 7
3,858,104 UART: [idev] UDS.KEYID = 0
3,859,033 ready_for_fw is high
3,859,228 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,958,087 UART: [idev] Erasing UDS.KEYID = 0
6,334,407 UART: [idev] Sha1 KeyId Algorithm
6,358,270 UART: [idev] --
6,361,965 UART: [ldev] ++
6,362,704 UART: [ldev] CDI.KEYID = 6
6,363,616 UART: [ldev] SUBJECT.KEYID = 5
6,364,770 UART: [ldev] AUTHORITY.KEYID = 7
6,366,001 UART: [ldev] FE.KEYID = 1
6,378,918 UART: [ldev] Erasing FE.KEYID = 1
8,855,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,667 UART: [ldev] --
10,646,308 UART: [fwproc] Wait for Commands...
10,648,732 UART: [fwproc] Recv command 0x46574c44
10,650,984 UART: [fwproc] Recv'd Img size: 78532 bytes
13,653,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,730,584 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,846,784 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,174,538 >>> mbox cmd response: success
14,175,053 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,179,125 UART: [afmc] ++
14,179,821 UART: [afmc] CDI.KEYID = 6
14,181,056 UART: [afmc] SUBJECT.KEYID = 7
14,182,489 UART: [afmc] AUTHORITY.KEYID = 5
16,685,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,406,882 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,408,853 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,424,025 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,439,184 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,454,194 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,478,955 UART: [afmc] --
18,482,170 UART: [cold-reset] --
18,485,755 UART: [state] Locking Datavault
18,491,504 UART: [state] Locking PCR0, PCR1 and PCR31
18,493,704 UART: [state] Locking ICCM
18,495,269 UART: [exit] Launching FMC @ 0x40000130
18,503,945 UART:
18,504,178 UART: Running Caliptra FMC ...
18,505,279 UART:
18,505,440 UART: [state] CFI Enabled
18,513,133 UART: [fht] FMC Alias Private Key: 7
20,269,946 UART: [art] Extend RT PCRs Done
20,271,168 UART: [art] Lock RT PCRs Done
20,273,278 UART: [art] Populate DV Done
20,278,915 UART: [fht] FMC Alias Private Key: 7
20,280,601 UART: [art] Derive CDI
20,281,423 UART: [art] Store in in slot 0x4
20,324,080 UART: [art] Derive Key Pair
20,325,082 UART: [art] Store priv key in slot 0x5
22,751,779 UART: [art] Derive Key Pair - Done
22,764,772 UART: [art] Signing Cert with AUTHO
22,766,100 UART: RITY.KEYID = 7
24,471,806 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,304 UART: [art] PUB.X = 8872963B3649C267315A3BB3DB344380490A39EF71AA4DB2D08BD699A54B0F84EDFE220CF0B47088AD924B8D85B29AD6
24,480,596 UART: [art] PUB.Y = 558E3336A8DA1A014F81F92578C6BCA27004B57D37CC9F034D6F808781B63539364BF0EF9CAA3D52E11979FBF09A28E8
24,487,820 UART: [art] SIG.R = 5A30350828408D1E42A2F33D1627E38CF8543C5282425F21AC78B0E88E8E8EB7B904F620CFE03BED4100533FA133E8FC
24,495,223 UART: [art] SIG.S = 45D604566CEB55E3D602EF18619AF41AC61CAF6904C56960230B024DC3467D11ABFC238ED14DF76F59B39696E31A2E89
25,473,597 UART: mbox::rt_entry...
25,474,564 UART: ____ _ _ _ ____ _____
25,476,491 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,478,694 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,480,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,482,564 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,484,493 UART: |_|
25,485,305 UART:
25,597,243 UART: [rt] Runtime listening for mailbox commands...
25,603,088 >>> mbox cmd response data (3272 bytes)
25,618,785 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,652,209 >>> mbox cmd response data (0 bytes)
27,712,825 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,857,227 UART:
27,857,605 UART: Running Caliptra ROM ...
27,858,682 UART:
27,858,842 UART: [state] CFI Enabled
27,875,492 UART: [state] LifecycleState = Unprovisioned
27,877,613 UART: [state] DebugLocked = No
27,879,879 UART: [state] WD Timer not started. Device not locked for debugging
27,884,825 UART: [kat] SHA2-256
28,074,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,085,471 UART: [kat] ++
28,086,070 UART: [kat] sha1
28,097,293 UART: [kat] SHA2-256
28,100,284 UART: [kat] SHA2-384
28,106,497 UART: [kat] SHA2-512-ACC
28,109,120 UART: [kat] ECC-384
30,550,532 UART: [kat] HMAC-384Kdf
30,563,415 UART: [kat] LMS
31,095,033 UART: [kat] --
31,099,191 UART: [update-reset] ++
34,560,758 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,564,135 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,170,719 >>> mbox cmd response: success
35,175,396 UART: [update-reset] Copying MAN_2 To MAN_1
35,209,848 UART: [update-reset Success] --
35,215,262 UART: [state] Locking Datavault
35,219,874 UART: [state] Locking PCR0, PCR1 and PCR31
35,222,017 UART: [state] Locking ICCM
35,224,152 UART: [exit] Launching FMC @ 0x40000130
35,232,838 UART:
35,233,073 UART: Running Caliptra FMC ...
35,234,162 UART:
35,234,313 UART: [state] CFI Enabled
35,278,819 UART: [art] Extend RT PCRs Done
35,280,011 UART: [art] Lock RT PCRs Done
35,281,451 UART: [art] Populate DV Done
35,286,595 UART: [fht] FMC Alias Private Key: 7
35,288,242 UART: [art] Derive CDI
35,289,067 UART: [art] Store in in slot 0x4
35,331,647 UART: [art] Derive Key Pair
35,332,689 UART: [art] Store priv key in slot 0x5
37,759,512 UART: [art] Derive Key Pair - Done
37,772,249 UART: [art] Signing Cert with AUTHO
37,773,557 UART: RITY.KEYID = 7
39,478,980 UART: [art] Erasing AUTHORITY.KEYID = 7
39,480,486 UART: [art] PUB.X = E164BB31034820D39027CCCF3E80A104AEDF1762F12612C1C4D85693692847DBCFC71D00EF297A29EA2D0779530DBC85
39,487,744 UART: [art] PUB.Y = 5791B65E6186B5CBC215C3BE04C48ECF9068E11852E800A8C4A7CB11E6B95D2158E3C6EA1118C87AFF90C23532C24A01
39,494,972 UART: [art] SIG.R = 038AFFE5DD096F739784E0027153E6C1CB67F41DCD4DD95A3FFC87969B7CA72E91441CE52787A22D600C0D63B576E79C
39,502,358 UART: [art] SIG.S = 8D11493D29DE95DCB0BED909DADCB091558BEB45810A06E65886F813CD19E6A007935262795498794DD2E0231656693D
40,481,719 UART: Caliptra RT
40,482,423 UART: [state] CFI Enabled
42,963,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,965,186 UART: [rt] RT listening for mailbox commands...
42,996,470 UART: [rt]cmd =0x494e464f, len=4
43,000,746 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,681 writing to cptra_bootfsm_go
3,757,061 ready_for_fw is high
3,757,480 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,200,160 >>> mbox cmd response: success
14,200,867 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,449,374 UART:
18,449,774 UART: Running Caliptra FMC ...
18,450,884 UART:
18,451,044 UART: [state] CFI Enabled
18,459,169 UART: [fht] FMC Alias Private Key: 7
20,215,488 UART: [art] Extend RT PCRs Done
20,216,707 UART: [art] Lock RT PCRs Done
20,218,518 UART: [art] Populate DV Done
20,224,099 UART: [fht] FMC Alias Private Key: 7
20,225,804 UART: [art] Derive CDI
20,226,636 UART: [art] Store in in slot 0x4
20,269,164 UART: [art] Derive Key Pair
20,270,197 UART: [art] Store priv key in slot 0x5
22,696,944 UART: [art] Derive Key Pair - Done
22,709,772 UART: [art] Signing Cert with AUTHO
22,711,076 UART: RITY.KEYID = 7
24,416,443 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,942 UART: [art] PUB.X = FB713C35A8DC795F759A6B3DF3953F8FAB0D4E177EDB82479CBBB6228BF260A34A170D001C75262A78D842FC8385F451
24,425,231 UART: [art] PUB.Y = 11A16E8EBACC1F9BE83D65BB29E0B14D908BC653DD50CE99B53CC5F6679936371405205137AD238AFD7725F7EC698699
24,432,463 UART: [art] SIG.R = 95E36B38B65F298D55A9CD9FDF2ED720E07496A6178D30F70D3ED53A537574A065608B5AA5BA131264EC31C2CD9C81CD
24,439,849 UART: [art] SIG.S = 384BCE54BF7A82FA02CBA885D442CC4D7AEBE3E035536084734688C1D8EEAD00D4AD12DF8CC1E86C5DAAF89BC9AE38C4
25,417,658 UART: mbox::rt_entry...
25,418,627 UART: ____ _ _ _ ____ _____
25,420,565 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,422,571 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,424,425 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,426,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,428,295 UART: |_|
25,429,127 UART:
25,541,828 UART: [rt] Runtime listening for mailbox commands...
25,547,659 >>> mbox cmd response data (3272 bytes)
25,563,323 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,596,762 >>> mbox cmd response data (0 bytes)
27,654,371 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,383,661 >>> mbox cmd response: success
35,417,391 UART:
35,417,702 UART: Running Caliptra FMC ...
35,418,748 UART:
35,418,921 UART: [state] CFI Enabled
35,463,062 UART: [art] Extend RT PCRs Done
35,464,256 UART: [art] Lock RT PCRs Done
35,465,575 UART: [art] Populate DV Done
35,471,210 UART: [fht] FMC Alias Private Key: 7
35,472,692 UART: [art] Derive CDI
35,473,432 UART: [art] Store in in slot 0x4
35,516,454 UART: [art] Derive Key Pair
35,517,447 UART: [art] Store priv key in slot 0x5
37,944,001 UART: [art] Derive Key Pair - Done
37,956,903 UART: [art] Signing Cert with AUTHO
37,958,217 UART: RITY.KEYID = 7
39,663,667 UART: [art] Erasing AUTHORITY.KEYID = 7
39,665,170 UART: [art] PUB.X = BC70ACBA58B2E262ED0B32C42F2B04C2071ED00F0C43F1D1FCB4E5133E70C4AC3459E829FE472C21DAE03C088FB4D44F
39,672,477 UART: [art] PUB.Y = 3DB0ACDE008E6859AA7E77A1C848AE98D4659437340280EF88163896B71BE4A7B2BFD22B352034D4CAEBAB8809A11F16
39,679,707 UART: [art] SIG.R = 6BC8FE1059FDC7AF1CE806FD36B0FC1BAA8806560C97C9BC7B49C258C32ACBB0E828F27000E9EC2AC1C48A0DFCCCD556
39,687,114 UART: [art] SIG.S = 1B27ED883E87DE00AA5443CDA0808C565C2A13C9A26514CDC9439C65735F20954023AC0F9BB245CE3180BA2E7ECC9CCB
40,665,580 UART: Caliptra RT
40,666,280 UART: [state] CFI Enabled
43,147,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,149,124 UART: [rt] RT listening for mailbox commands...
43,180,645 UART: [rt]cmd =0x494e464f, len=4
43,184,870 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
895,180 UART: [kat] SHA2-512-ACC
897,081 UART: [kat] ECC-384
902,766 UART: [kat] HMAC-384Kdf
907,364 UART: [kat] LMS
1,475,560 UART: [kat] --
1,476,683 UART: [cold-reset] ++
1,477,263 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 ready_for_fw is high
1,481,263 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,488,682 UART: [idev] Erasing UDS.KEYID = 0
1,504,976 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,596 UART: [idev] --
1,514,575 UART: [ldev] ++
1,514,743 UART: [ldev] CDI.KEYID = 6
1,515,106 UART: [ldev] SUBJECT.KEYID = 5
1,515,532 UART: [ldev] AUTHORITY.KEYID = 7
1,515,995 UART: [ldev] FE.KEYID = 1
1,521,033 UART: [ldev] Erasing FE.KEYID = 1
1,545,824 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,760 UART: [ldev] --
1,585,275 UART: [fwproc] Waiting for Commands...
1,585,932 UART: [fwproc] Received command 0x46574c44
1,586,723 UART: [fwproc] Received Image of size 78532 bytes
2,474,625 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,502,233 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,531,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,613,754 >>> mbox cmd response: success
2,613,754 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,614,980 UART: [afmc] ++
2,615,148 UART: [afmc] CDI.KEYID = 6
2,615,510 UART: [afmc] SUBJECT.KEYID = 7
2,615,935 UART: [afmc] AUTHORITY.KEYID = 5
2,650,530 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,666,854 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,667,634 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,673,362 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,679,247 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,684,937 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,692,872 UART: [afmc] --
2,693,756 UART: [cold-reset] --
2,694,634 UART: [state] Locking Datavault
2,695,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,696,059 UART: [state] Locking ICCM
2,696,501 UART: [exit] Launching FMC @ 0x40000130
2,701,830 UART:
2,701,846 UART: Running Caliptra FMC ...
2,702,254 UART:
2,702,308 UART: [state] CFI Enabled
2,712,591 UART: [fht] FMC Alias Private Key: 7
2,820,562 UART: [art] Extend RT PCRs Done
2,820,990 UART: [art] Lock RT PCRs Done
2,822,950 UART: [art] Populate DV Done
2,831,121 UART: [fht] FMC Alias Private Key: 7
2,832,301 UART: [art] Derive CDI
2,832,581 UART: [art] Store in in slot 0x4
2,918,192 UART: [art] Derive Key Pair
2,918,552 UART: [art] Store priv key in slot 0x5
2,931,966 UART: [art] Derive Key Pair - Done
2,946,644 UART: [art] Signing Cert with AUTHO
2,947,124 UART: RITY.KEYID = 7
2,962,496 UART: [art] Erasing AUTHORITY.KEYID = 7
2,963,261 UART: [art] PUB.X = 444D13CD2D940590C59A85C6A6331AF2368BEAFD3FDADDC8AD37D6BDB1CB445329F790E25191ED4BE53F0720787C4881
2,970,037 UART: [art] PUB.Y = 218C56EF97A6597D1BAF9CEF747B2816DDD8E28A6ACE352F057F7D5CEEBB5DCFE600DEE345358292B66F4CFFFA8D4A80
2,976,988 UART: [art] SIG.R = 6E62F3F84D5531344ED02AA79719F1172F2845F2FDB05E22E21DBEC8BE5AA936C65174A636AE6DA418059E1CECD157B6
2,983,765 UART: [art] SIG.S = 9084993038CD1591AD099860F7AA2A4FF1EB1EA760B2510886E14336FFA719DCBC58026B85F02282D4180AD6FFD672D3
3,007,874 UART: mbox::rt_entry...
3,008,246 UART: ____ _ _ _ ____ _____
3,009,030 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,009,830 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,010,598 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,366 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,134 UART: |_|
3,012,446 UART:
3,119,120 UART: [rt] Runtime listening for mailbox commands...
3,124,088 >>> mbox cmd response data (3272 bytes)
3,124,089 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,175 >>> mbox cmd response data (0 bytes)
3,147,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,147,296 UART:
3,147,312 UART: Running Caliptra ROM ...
3,147,720 UART:
3,147,774 UART: [state] CFI Enabled
3,150,824 UART: [state] LifecycleState = Unprovisioned
3,151,479 UART: [state] DebugLocked = No
3,152,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,153,698 UART: [kat] SHA2-256
3,947,629 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,951,744 UART: [kat] ++
3,951,896 UART: [kat] sha1
3,956,244 UART: [kat] SHA2-256
3,958,182 UART: [kat] SHA2-384
3,960,987 UART: [kat] SHA2-512-ACC
3,962,887 UART: [kat] ECC-384
3,968,674 UART: [kat] HMAC-384Kdf
3,973,262 UART: [kat] LMS
4,541,458 UART: [kat] --
4,542,365 UART: [update-reset] ++
5,873,711 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,874,937 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,024,567 >>> mbox cmd response: success
6,024,790 UART: [update-reset] Copying MAN_2 To MAN_1
6,032,804 UART: [update-reset Success] --
6,034,087 UART: [state] Locking Datavault
6,034,879 UART: [state] Locking PCR0, PCR1 and PCR31
6,035,483 UART: [state] Locking ICCM
6,035,999 UART: [exit] Launching FMC @ 0x40000130
6,041,328 UART:
6,041,344 UART: Running Caliptra FMC ...
6,041,752 UART:
6,041,806 UART: [state] CFI Enabled
6,131,177 UART: [art] Extend RT PCRs Done
6,131,605 UART: [art] Lock RT PCRs Done
6,132,814 UART: [art] Populate DV Done
6,141,085 UART: [fht] FMC Alias Private Key: 7
6,142,227 UART: [art] Derive CDI
6,142,507 UART: [art] Store in in slot 0x4
6,228,168 UART: [art] Derive Key Pair
6,228,528 UART: [art] Store priv key in slot 0x5
6,241,932 UART: [art] Derive Key Pair - Done
6,256,375 UART: [art] Signing Cert with AUTHO
6,256,855 UART: RITY.KEYID = 7
6,272,087 UART: [art] Erasing AUTHORITY.KEYID = 7
6,272,852 UART: [art] PUB.X = DDB2A2ACBCD3403780F652A9F4205F5E9BB1CD3659B59539DA0892B761E7EBBC8353F83E831A4520947DEE905C504051
6,279,625 UART: [art] PUB.Y = 617DE3C833D7F1378C2A39F07F0BE186C227DDA41F9F3A0E6047B5064253829FE3C01C32EC482761F5E28C5A78C3137C
6,286,568 UART: [art] SIG.R = D66066270B6FC60834B6C8422F4435871AE535BC6D64D4085382DAC83A47591694FD3D2293874E8C0EC264CA7106C584
6,293,315 UART: [art] SIG.S = 7C207FF4E189950ADECCA6ACA3941ED6C2E009A611852C21A4EAA68B444DEE16DBC2FB444C4830DE62FBDB821DD77D08
6,317,401 UART: Caliptra RT
6,317,654 UART: [state] CFI Enabled
6,385,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,386,368 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,416,808 UART: [rt]cmd =0x494e464f, len=4
6,420,467 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,351 ready_for_fw is high
1,362,351 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,463,386 >>> mbox cmd response: success
2,463,386 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,524,188 UART:
2,524,204 UART: Running Caliptra FMC ...
2,524,612 UART:
2,524,666 UART: [state] CFI Enabled
2,535,377 UART: [fht] FMC Alias Private Key: 7
2,643,500 UART: [art] Extend RT PCRs Done
2,643,928 UART: [art] Lock RT PCRs Done
2,645,494 UART: [art] Populate DV Done
2,653,659 UART: [fht] FMC Alias Private Key: 7
2,654,801 UART: [art] Derive CDI
2,655,081 UART: [art] Store in in slot 0x4
2,740,908 UART: [art] Derive Key Pair
2,741,268 UART: [art] Store priv key in slot 0x5
2,754,288 UART: [art] Derive Key Pair - Done
2,769,321 UART: [art] Signing Cert with AUTHO
2,769,801 UART: RITY.KEYID = 7
2,785,347 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,112 UART: [art] PUB.X = 2DC5037112811D92B49F4ED88F3A5F9F49B3DF20348FD21BB23882B3C517E762EF608681D040DF1D78E4AD8E240B2220
2,792,878 UART: [art] PUB.Y = A205069CAAD5FB03CDF4DA5B0D90996785B43640AFAA80425728E4194AF7F3618E0C01D64E3097CABD29805582E325DA
2,799,816 UART: [art] SIG.R = 37C7191F97CC7422D465B1BC162816E41F985D1E99C9A79E6BD41C8EFD08A8413F2B639D97439DF33868B5C1CC7D5736
2,806,585 UART: [art] SIG.S = A854C300A7ADE5CF860FDB3A9E994C086A40EA3A937A2633D9526A4FECE61408755C4E1E004EB00E5F993B1B5A99447D
2,829,884 UART: mbox::rt_entry...
2,830,256 UART: ____ _ _ _ ____ _____
2,831,040 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,840 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,832,608 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,833,376 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,834,144 UART: |_|
2,834,456 UART:
2,942,584 UART: [rt] Runtime listening for mailbox commands...
2,947,552 >>> mbox cmd response data (3272 bytes)
2,947,553 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,970,639 >>> mbox cmd response data (0 bytes)
2,970,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,730,293 >>> mbox cmd response: success
5,743,324 UART:
5,743,340 UART: Running Caliptra FMC ...
5,743,748 UART:
5,743,802 UART: [state] CFI Enabled
5,833,403 UART: [art] Extend RT PCRs Done
5,833,831 UART: [art] Lock RT PCRs Done
5,835,026 UART: [art] Populate DV Done
5,842,953 UART: [fht] FMC Alias Private Key: 7
5,844,047 UART: [art] Derive CDI
5,844,327 UART: [art] Store in in slot 0x4
5,930,316 UART: [art] Derive Key Pair
5,930,676 UART: [art] Store priv key in slot 0x5
5,943,444 UART: [art] Derive Key Pair - Done
5,958,412 UART: [art] Signing Cert with AUTHO
5,958,892 UART: RITY.KEYID = 7
5,974,502 UART: [art] Erasing AUTHORITY.KEYID = 7
5,975,267 UART: [art] PUB.X = 570525F7A4250F71BAAB8E077D2B903599AA4FC86C6B718014D6D6FFC57CF0C7C5B5245C00F7ECC5E4EED61738A3FF21
5,982,020 UART: [art] PUB.Y = DC09C8E35A584D48113461DB91B873DA690F117174A307E6972349ABDFDC09EED891BD0D643817D80C5BFC0487C6F69E
5,988,955 UART: [art] SIG.R = 579F2BD11A586E92551A60EFE8F6E31973B4C8C47AA37A203F6FD5F23957F64367CC395089EE2C2A07A3BB4BCE5D3954
5,995,730 UART: [art] SIG.S = 2FC16175CEE1A79127D10E342F4D1EBF1BA45E15AB39CC7E0EAD02DF02A366A67CB3755C55ED8D5AAE7A44D12531EF79
6,019,131 UART: Caliptra RT
6,019,384 UART: [state] CFI Enabled
6,086,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,087,759 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,118,569 UART: [rt]cmd =0x494e464f, len=4
6,122,338 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,292 UART: [kat] SHA2-256
882,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,338 UART: [kat] ++
886,490 UART: [kat] sha1
890,898 UART: [kat] SHA2-256
892,836 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,477,026 UART: [cold-reset] ++
1,477,586 UART: [fht] Storing FHT @ 0x50003400
1,480,395 UART: [idev] ++
1,480,563 UART: [idev] CDI.KEYID = 6
1,480,923 UART: [idev] SUBJECT.KEYID = 7
1,481,347 UART: [idev] UDS.KEYID = 0
1,481,692 ready_for_fw is high
1,481,692 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,489,433 UART: [idev] Erasing UDS.KEYID = 0
1,505,983 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,593 UART: [idev] --
1,515,716 UART: [ldev] ++
1,515,884 UART: [ldev] CDI.KEYID = 6
1,516,247 UART: [ldev] SUBJECT.KEYID = 5
1,516,673 UART: [ldev] AUTHORITY.KEYID = 7
1,517,136 UART: [ldev] FE.KEYID = 1
1,522,234 UART: [ldev] Erasing FE.KEYID = 1
1,547,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,959 UART: [ldev] --
1,587,350 UART: [fwproc] Waiting for Commands...
1,587,973 UART: [fwproc] Received command 0x46574c44
1,588,764 UART: [fwproc] Received Image of size 78532 bytes
2,476,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,624 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,532,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,615,229 >>> mbox cmd response: success
2,615,229 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,243 UART: [afmc] ++
2,616,411 UART: [afmc] CDI.KEYID = 6
2,616,773 UART: [afmc] SUBJECT.KEYID = 7
2,617,198 UART: [afmc] AUTHORITY.KEYID = 5
2,651,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,667,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,668,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,674,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,680,270 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,685,960 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,009 UART: [afmc] --
2,695,039 UART: [cold-reset] --
2,695,897 UART: [state] Locking Datavault
2,697,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,697,926 UART: [state] Locking ICCM
2,698,534 UART: [exit] Launching FMC @ 0x40000130
2,703,863 UART:
2,703,879 UART: Running Caliptra FMC ...
2,704,287 UART:
2,704,430 UART: [state] CFI Enabled
2,715,147 UART: [fht] FMC Alias Private Key: 7
2,822,884 UART: [art] Extend RT PCRs Done
2,823,312 UART: [art] Lock RT PCRs Done
2,824,584 UART: [art] Populate DV Done
2,832,667 UART: [fht] FMC Alias Private Key: 7
2,833,699 UART: [art] Derive CDI
2,833,979 UART: [art] Store in in slot 0x4
2,919,810 UART: [art] Derive Key Pair
2,920,170 UART: [art] Store priv key in slot 0x5
2,933,490 UART: [art] Derive Key Pair - Done
2,948,378 UART: [art] Signing Cert with AUTHO
2,948,858 UART: RITY.KEYID = 7
2,963,924 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,689 UART: [art] PUB.X = 5D3F0942E5183B6CEF21554A41CE90EDA0C7DA5F0B087449DDE41367B9273ED27EE8CB5D1406C2FBC3C4F0920486A358
2,971,454 UART: [art] PUB.Y = F171C5C0AE79F361A241FE8B2F40DAF6E4DB563E46E47AE0BF3D63583BB09B8223CF3F8F73A8A26037CD0619623AF7AF
2,978,417 UART: [art] SIG.R = FC3172478B8C2575CE926CD54B6540C36E53AAD08DE7C9D2EDCC3559D42508391CC18FEB777993FAF88F9858414E8929
2,985,188 UART: [art] SIG.S = F73110657A78D1E17880D2CAE72EE23F2D58A0006AC6227AC58B2754F998CCD4295DC4FD4F8A19F4E62C61DF06A8CDA5
3,008,422 UART: mbox::rt_entry...
3,008,794 UART: ____ _ _ _ ____ _____
3,009,578 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,010,378 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,011,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,011,914 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,012,682 UART: |_|
3,012,994 UART:
3,119,093 UART: [rt] Runtime listening for mailbox commands...
3,124,061 >>> mbox cmd response data (3272 bytes)
3,124,062 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,148 >>> mbox cmd response data (0 bytes)
3,147,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,147,269 UART:
3,147,285 UART: Running Caliptra ROM ...
3,147,693 UART:
3,147,834 UART: [state] CFI Enabled
3,150,738 UART: [state] LifecycleState = Unprovisioned
3,151,393 UART: [state] DebugLocked = No
3,152,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,153,630 UART: [kat] SHA2-256
3,947,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,951,676 UART: [kat] ++
3,951,828 UART: [kat] sha1
3,956,148 UART: [kat] SHA2-256
3,958,086 UART: [kat] SHA2-384
3,960,811 UART: [kat] SHA2-512-ACC
3,962,711 UART: [kat] ECC-384
3,968,052 UART: [kat] HMAC-384Kdf
3,972,602 UART: [kat] LMS
4,540,798 UART: [kat] --
4,541,619 UART: [update-reset] ++
5,875,245 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,876,483 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,026,113 >>> mbox cmd response: success
6,026,380 UART: [update-reset] Copying MAN_2 To MAN_1
6,034,394 UART: [update-reset Success] --
6,035,177 UART: [state] Locking Datavault
6,035,935 UART: [state] Locking PCR0, PCR1 and PCR31
6,036,539 UART: [state] Locking ICCM
6,036,981 UART: [exit] Launching FMC @ 0x40000130
6,042,310 UART:
6,042,326 UART: Running Caliptra FMC ...
6,042,734 UART:
6,042,877 UART: [state] CFI Enabled
6,131,978 UART: [art] Extend RT PCRs Done
6,132,406 UART: [art] Lock RT PCRs Done
6,133,575 UART: [art] Populate DV Done
6,141,694 UART: [fht] FMC Alias Private Key: 7
6,142,842 UART: [art] Derive CDI
6,143,122 UART: [art] Store in in slot 0x4
6,228,865 UART: [art] Derive Key Pair
6,229,225 UART: [art] Store priv key in slot 0x5
6,243,263 UART: [art] Derive Key Pair - Done
6,257,867 UART: [art] Signing Cert with AUTHO
6,258,347 UART: RITY.KEYID = 7
6,273,067 UART: [art] Erasing AUTHORITY.KEYID = 7
6,273,832 UART: [art] PUB.X = 1903BC70EC81D41ED6812C7BDC9C43CB559C768233500FB07DBB46969E4E100D10CC2F542D2CB6C09FD813657B9120EA
6,280,601 UART: [art] PUB.Y = 47A961237900473C6F31212289364B9DA9F06B0B45B4B5525DA7BA259A0B1551FAEED30631FBF14821F39B610DF18D83
6,287,515 UART: [art] SIG.R = 1A195BDFDBCC6A5B21B6B0B570D65E63E2783EB46730ABFAB8711F69723EA8496A51D5AE653FB5B8E2F6A1CE8BA99A1A
6,294,307 UART: [art] SIG.S = 7DB0167FFB6A7AE66AF6D067F0736A927EDEFAA1297A9FE7BB3AF764138CA0F768BE926E1745D67236B131CEA199BBAA
6,317,618 UART: Caliptra RT
6,317,963 UART: [state] CFI Enabled
6,384,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,386,308 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,416,934 UART: [rt]cmd =0x494e464f, len=4
6,420,761 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,604 ready_for_fw is high
1,362,604 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,462,501 >>> mbox cmd response: success
2,462,501 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,524,555 UART:
2,524,571 UART: Running Caliptra FMC ...
2,524,979 UART:
2,525,122 UART: [state] CFI Enabled
2,535,893 UART: [fht] FMC Alias Private Key: 7
2,644,390 UART: [art] Extend RT PCRs Done
2,644,818 UART: [art] Lock RT PCRs Done
2,645,950 UART: [art] Populate DV Done
2,654,173 UART: [fht] FMC Alias Private Key: 7
2,655,333 UART: [art] Derive CDI
2,655,613 UART: [art] Store in in slot 0x4
2,741,112 UART: [art] Derive Key Pair
2,741,472 UART: [art] Store priv key in slot 0x5
2,755,298 UART: [art] Derive Key Pair - Done
2,769,859 UART: [art] Signing Cert with AUTHO
2,770,339 UART: RITY.KEYID = 7
2,785,663 UART: [art] Erasing AUTHORITY.KEYID = 7
2,786,428 UART: [art] PUB.X = 6EB7683E975B4A801820D32F222452660F3F7BF775687F002DDEDE7CAF6F9AE2808D0CE3CBA3018130953C98EA9A6F20
2,793,173 UART: [art] PUB.Y = 3BFB0E8DC7E023CB502C90AA843D863B74FFB108144BEA1378BB8C37253F9E155665CF716B8287EE58A8DA806EE1AD58
2,800,129 UART: [art] SIG.R = 0B4940DA57329AC6FF1A315DBF0FC326F3BAFC24A3631391AA382D7C5A3824E3FE1C027DA6910540BBA4C302D8774E8F
2,806,896 UART: [art] SIG.S = BBCD1EA6376CCBF9AB4BC5230E3D2DD9F10920D92F55DA961F5897ECD0579DE8A93F89C340EB5B82A65785E275C8826F
2,831,073 UART: mbox::rt_entry...
2,831,445 UART: ____ _ _ _ ____ _____
2,832,229 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,833,029 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,833,797 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,834,565 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,835,333 UART: |_|
2,835,645 UART:
2,943,047 UART: [rt] Runtime listening for mailbox commands...
2,948,015 >>> mbox cmd response data (3272 bytes)
2,948,016 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,102 >>> mbox cmd response data (0 bytes)
2,971,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,729,719 >>> mbox cmd response: success
5,742,924 UART:
5,742,940 UART: Running Caliptra FMC ...
5,743,348 UART:
5,743,491 UART: [state] CFI Enabled
5,832,508 UART: [art] Extend RT PCRs Done
5,832,936 UART: [art] Lock RT PCRs Done
5,834,251 UART: [art] Populate DV Done
5,842,522 UART: [fht] FMC Alias Private Key: 7
5,843,532 UART: [art] Derive CDI
5,843,812 UART: [art] Store in in slot 0x4
5,929,687 UART: [art] Derive Key Pair
5,930,047 UART: [art] Store priv key in slot 0x5
5,943,255 UART: [art] Derive Key Pair - Done
5,957,946 UART: [art] Signing Cert with AUTHO
5,958,426 UART: RITY.KEYID = 7
5,973,284 UART: [art] Erasing AUTHORITY.KEYID = 7
5,974,049 UART: [art] PUB.X = 8AC0AF3C6A47CEA21CB92B1512FCD70531CDC1CC84935EBC3ACDA5C767BC087872FD4DFDA214B16BB54DFEA43B42844F
5,980,841 UART: [art] PUB.Y = C9094942CBA7EDCC456E272A3E5343C64E75F4B4D126ADA5E9E11F973537C159972C2BABF648BE733AA3E67C2D08D973
5,987,795 UART: [art] SIG.R = DFBBAD2257FFEE42BAF59F8B3FDDC910529B1EE3F722BE3EE56297BAAEB0B660AEB562E62CD42578747E1BC13EA04211
5,994,591 UART: [art] SIG.S = B4F5DAC219210873C08A6DE8C98520BE38AB9D7C706509C008A29E3031B30F6609B60F5F80705CBC2DC6C1662624532C
6,018,128 UART: Caliptra RT
6,018,473 UART: [state] CFI Enabled
6,084,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,086,430 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,116,832 UART: [rt]cmd =0x494e464f, len=4
6,120,465 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,809 UART: [state] WD Timer not started. Device not locked for debugging
88,154 UART: [kat] SHA2-256
893,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,929 UART: [kat] ++
898,081 UART: [kat] sha1
902,393 UART: [kat] SHA2-256
904,333 UART: [kat] SHA2-384
906,908 UART: [kat] SHA2-512-ACC
908,809 UART: [kat] ECC-384
918,616 UART: [kat] HMAC-384Kdf
923,278 UART: [kat] LMS
1,171,606 UART: [kat] --
1,172,441 UART: [cold-reset] ++
1,172,921 UART: [fht] FHT @ 0x50003400
1,175,414 UART: [idev] ++
1,175,582 UART: [idev] CDI.KEYID = 6
1,175,942 UART: [idev] SUBJECT.KEYID = 7
1,176,366 UART: [idev] UDS.KEYID = 0
1,176,711 ready_for_fw is high
1,176,711 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,256 UART: [idev] Erasing UDS.KEYID = 0
1,201,937 UART: [idev] Sha1 KeyId Algorithm
1,210,307 UART: [idev] --
1,211,225 UART: [ldev] ++
1,211,393 UART: [ldev] CDI.KEYID = 6
1,211,756 UART: [ldev] SUBJECT.KEYID = 5
1,212,182 UART: [ldev] AUTHORITY.KEYID = 7
1,212,645 UART: [ldev] FE.KEYID = 1
1,217,493 UART: [ldev] Erasing FE.KEYID = 1
1,244,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,811 UART: [ldev] --
1,283,148 UART: [fwproc] Wait for Commands...
1,283,960 UART: [fwproc] Recv command 0x46574c44
1,284,688 UART: [fwproc] Recv'd Img size: 78532 bytes
2,170,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,162 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,309,279 >>> mbox cmd response: success
2,309,279 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,310,507 UART: [afmc] ++
2,310,675 UART: [afmc] CDI.KEYID = 6
2,311,037 UART: [afmc] SUBJECT.KEYID = 7
2,311,462 UART: [afmc] AUTHORITY.KEYID = 5
2,346,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,054 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,369,782 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,667 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,386 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,362 UART: [afmc] --
2,390,262 UART: [cold-reset] --
2,391,102 UART: [state] Locking Datavault
2,392,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,789 UART: [state] Locking ICCM
2,393,409 UART: [exit] Launching FMC @ 0x40000130
2,398,738 UART:
2,398,754 UART: Running Caliptra FMC ...
2,399,162 UART:
2,399,216 UART: [state] CFI Enabled
2,409,905 UART: [fht] FMC Alias Private Key: 7
2,517,258 UART: [art] Extend RT PCRs Done
2,517,686 UART: [art] Lock RT PCRs Done
2,519,254 UART: [art] Populate DV Done
2,527,579 UART: [fht] FMC Alias Private Key: 7
2,528,693 UART: [art] Derive CDI
2,528,973 UART: [art] Store in in slot 0x4
2,614,496 UART: [art] Derive Key Pair
2,614,856 UART: [art] Store priv key in slot 0x5
2,627,692 UART: [art] Derive Key Pair - Done
2,642,283 UART: [art] Signing Cert with AUTHO
2,642,763 UART: RITY.KEYID = 7
2,658,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,659,236 UART: [art] PUB.X = 9012DB063E801F8392A01E98D251E3E09AF7D7C52C29847E03197CE5A9B7E45A8AA05912C2DF6EBA85D59E012D6E1117
2,666,001 UART: [art] PUB.Y = 493CD55EFBC1A95594D9E832C4256F6EBB05F217D655B20E176C7829FD81EF4B0FAB04506106C4C1ADE8CF163E0F2803
2,672,940 UART: [art] SIG.R = FCBA16A2CF2099A4DD689915A5F1E73753DF3922F7323D6FD9F731D978D77A429BF56FEC4E7091E95BB196ECFFDF1754
2,679,724 UART: [art] SIG.S = 2FDE8C267AA5B682162845B9EEFD7E7D13EAA19A3530689DB2AB3239B5B37C840F3260DED4EEE78ACD3EBEFE57635943
2,703,580 UART: mbox::rt_entry...
2,703,952 UART: ____ _ _ _ ____ _____
2,704,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,536 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,304 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,707,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,840 UART: |_|
2,708,152 UART:
2,814,242 UART: [rt] Runtime listening for mailbox commands...
2,819,210 >>> mbox cmd response data (3272 bytes)
2,819,211 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,842,297 >>> mbox cmd response data (0 bytes)
2,842,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,842,415 UART:
2,842,431 UART: Running Caliptra ROM ...
2,842,839 UART:
2,842,894 UART: [state] CFI Enabled
2,845,916 UART: [state] LifecycleState = Unprovisioned
2,846,571 UART: [state] DebugLocked = No
2,847,145 UART: [state] WD Timer not started. Device not locked for debugging
2,848,289 UART: [kat] SHA2-256
3,653,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,658,064 UART: [kat] ++
3,658,216 UART: [kat] sha1
3,662,542 UART: [kat] SHA2-256
3,664,482 UART: [kat] SHA2-384
3,667,417 UART: [kat] SHA2-512-ACC
3,669,317 UART: [kat] ECC-384
3,679,326 UART: [kat] HMAC-384Kdf
3,683,728 UART: [kat] LMS
3,932,056 UART: [kat] --
3,933,082 UART: [update-reset] ++
5,245,054 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,246,093 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,395,671 >>> mbox cmd response: success
5,395,996 UART: [update-reset] Copying MAN_2 To MAN_1
5,404,010 UART: [update-reset Success] --
5,404,709 UART: [state] Locking Datavault
5,405,607 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,211 UART: [state] Locking ICCM
5,406,837 UART: [exit] Launching FMC @ 0x40000130
5,412,166 UART:
5,412,182 UART: Running Caliptra FMC ...
5,412,590 UART:
5,412,644 UART: [state] CFI Enabled
5,501,993 UART: [art] Extend RT PCRs Done
5,502,421 UART: [art] Lock RT PCRs Done
5,503,982 UART: [art] Populate DV Done
5,512,301 UART: [fht] FMC Alias Private Key: 7
5,513,235 UART: [art] Derive CDI
5,513,515 UART: [art] Store in in slot 0x4
5,599,034 UART: [art] Derive Key Pair
5,599,394 UART: [art] Store priv key in slot 0x5
5,612,200 UART: [art] Derive Key Pair - Done
5,626,962 UART: [art] Signing Cert with AUTHO
5,627,442 UART: RITY.KEYID = 7
5,643,018 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,783 UART: [art] PUB.X = CFD8319FDECEEDA20793E7FF234A8F0CFD87B2418A7D0EA221A40DB33C2DA57A87341221AFEE4DCA93D44622CE1F42AA
5,650,567 UART: [art] PUB.Y = 519747B7389FA3DC09D3ADADC04A5913546F73F73CDD05AB0CD3BAC959D5FEF4286DBAC79EE3B81E8B067E8675DBC6D9
5,657,527 UART: [art] SIG.R = 21669E512E96FDAF38CD78D250322E97390A3808D3FD26C2BF32A28A9C42AD0A0416B25D7481A55E3114025D372CE667
5,664,280 UART: [art] SIG.S = DF8EE9993C38AB762A93AFA86E1A51F86F89D5BF90DDDDC418F66004C11CD18BDC5DA3FF5BFD3C2659B206E81297133E
5,688,495 UART: Caliptra RT
5,688,748 UART: [state] CFI Enabled
5,754,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,756,208 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,786,714 UART: [rt]cmd =0x494e464f, len=4
5,790,599 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,597 ready_for_fw is high
1,059,597 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,160,712 >>> mbox cmd response: success
2,160,712 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,222,890 UART:
2,222,906 UART: Running Caliptra FMC ...
2,223,314 UART:
2,223,368 UART: [state] CFI Enabled
2,233,733 UART: [fht] FMC Alias Private Key: 7
2,341,268 UART: [art] Extend RT PCRs Done
2,341,696 UART: [art] Lock RT PCRs Done
2,343,258 UART: [art] Populate DV Done
2,351,731 UART: [fht] FMC Alias Private Key: 7
2,352,747 UART: [art] Derive CDI
2,353,027 UART: [art] Store in in slot 0x4
2,438,906 UART: [art] Derive Key Pair
2,439,266 UART: [art] Store priv key in slot 0x5
2,452,506 UART: [art] Derive Key Pair - Done
2,467,379 UART: [art] Signing Cert with AUTHO
2,467,859 UART: RITY.KEYID = 7
2,482,841 UART: [art] Erasing AUTHORITY.KEYID = 7
2,483,606 UART: [art] PUB.X = F59D2733DC424096602D82890BE3F29E36BC5C1A019C09882E4298B11BE10A9C08E176124DF64EB51B71495D21D59150
2,490,355 UART: [art] PUB.Y = 0DBAEABCDDED56BE965B29FD10E050DEF0A4D66373A5E2AC3E57DFE1E49F861E2F20B8E4224A85AEBEAE398A8BCA7DD1
2,497,338 UART: [art] SIG.R = 96615A0619CDABC03D3121F7D38ABF734FD5834D3DCC9F678D99412E93B9A21E8FB247C62C31680F80BE84E85866B1AE
2,504,110 UART: [art] SIG.S = F6291755569DC19C9905C33CBE14E4112CA237E0369D52133B1555889F8D19C9E5A02F224EF0AB83CCE811525C6EFE38
2,528,070 UART: mbox::rt_entry...
2,528,442 UART: ____ _ _ _ ____ _____
2,529,226 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,026 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,794 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,330 UART: |_|
2,532,642 UART:
2,638,831 UART: [rt] Runtime listening for mailbox commands...
2,643,799 >>> mbox cmd response data (3272 bytes)
2,643,800 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,666,886 >>> mbox cmd response data (0 bytes)
2,666,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,100,805 >>> mbox cmd response: success
5,114,493 UART:
5,114,509 UART: Running Caliptra FMC ...
5,114,917 UART:
5,114,971 UART: [state] CFI Enabled
5,204,150 UART: [art] Extend RT PCRs Done
5,204,578 UART: [art] Lock RT PCRs Done
5,205,551 UART: [art] Populate DV Done
5,213,556 UART: [fht] FMC Alias Private Key: 7
5,214,556 UART: [art] Derive CDI
5,214,836 UART: [art] Store in in slot 0x4
5,300,267 UART: [art] Derive Key Pair
5,300,627 UART: [art] Store priv key in slot 0x5
5,313,745 UART: [art] Derive Key Pair - Done
5,328,347 UART: [art] Signing Cert with AUTHO
5,328,827 UART: RITY.KEYID = 7
5,343,669 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,434 UART: [art] PUB.X = B6B1CA927BA8C9469412F295C52B344081DC2EB5AB28FF6C187E968937426964703CC365629A1A59A0DC835DA9E1F965
5,351,204 UART: [art] PUB.Y = C213AED84226FCB4B0003702A9542C622CB1337891EF9B584AA15E1E204FB41A04B872931CDBB3D82C00E9EC094DD5CB
5,358,111 UART: [art] SIG.R = 9FA83866BDB818159B01FE18BC85D36B8A1A6A4B69AB93119D406E086E9F1DC41A1C48D2811E5A5E9F6DD63E647121B2
5,364,883 UART: [art] SIG.S = D13CE07211D293E9B36958B3F0456274A25D0171B7122B17EF8865DEA4251A2AA824C4D993EE38C284E41A06D9990543
5,388,591 UART: Caliptra RT
5,388,844 UART: [state] CFI Enabled
5,453,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,455,165 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,485,769 UART: [rt]cmd =0x494e464f, len=4
5,489,626 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
893,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,342 UART: [kat] ++
897,494 UART: [kat] sha1
901,614 UART: [kat] SHA2-256
903,554 UART: [kat] SHA2-384
906,423 UART: [kat] SHA2-512-ACC
908,324 UART: [kat] ECC-384
918,429 UART: [kat] HMAC-384Kdf
923,059 UART: [kat] LMS
1,171,387 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,364 UART: [fht] FHT @ 0x50003400
1,174,995 UART: [idev] ++
1,175,163 UART: [idev] CDI.KEYID = 6
1,175,523 UART: [idev] SUBJECT.KEYID = 7
1,175,947 UART: [idev] UDS.KEYID = 0
1,176,292 ready_for_fw is high
1,176,292 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,184,217 UART: [idev] Erasing UDS.KEYID = 0
1,201,472 UART: [idev] Sha1 KeyId Algorithm
1,209,780 UART: [idev] --
1,210,676 UART: [ldev] ++
1,210,844 UART: [ldev] CDI.KEYID = 6
1,211,207 UART: [ldev] SUBJECT.KEYID = 5
1,211,633 UART: [ldev] AUTHORITY.KEYID = 7
1,212,096 UART: [ldev] FE.KEYID = 1
1,217,480 UART: [ldev] Erasing FE.KEYID = 1
1,243,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,946 UART: [ldev] --
1,283,429 UART: [fwproc] Wait for Commands...
1,284,189 UART: [fwproc] Recv command 0x46574c44
1,284,917 UART: [fwproc] Recv'd Img size: 78532 bytes
2,172,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,199,995 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,229,299 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,311,386 >>> mbox cmd response: success
2,311,386 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,312,510 UART: [afmc] ++
2,312,678 UART: [afmc] CDI.KEYID = 6
2,313,040 UART: [afmc] SUBJECT.KEYID = 7
2,313,465 UART: [afmc] AUTHORITY.KEYID = 5
2,348,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,365,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,371,663 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,377,548 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,267 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,029 UART: [afmc] --
2,392,151 UART: [cold-reset] --
2,392,967 UART: [state] Locking Datavault
2,394,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,394,838 UART: [state] Locking ICCM
2,395,468 UART: [exit] Launching FMC @ 0x40000130
2,400,797 UART:
2,400,813 UART: Running Caliptra FMC ...
2,401,221 UART:
2,401,364 UART: [state] CFI Enabled
2,412,045 UART: [fht] FMC Alias Private Key: 7
2,519,714 UART: [art] Extend RT PCRs Done
2,520,142 UART: [art] Lock RT PCRs Done
2,521,788 UART: [art] Populate DV Done
2,530,155 UART: [fht] FMC Alias Private Key: 7
2,531,147 UART: [art] Derive CDI
2,531,427 UART: [art] Store in in slot 0x4
2,617,000 UART: [art] Derive Key Pair
2,617,360 UART: [art] Store priv key in slot 0x5
2,630,810 UART: [art] Derive Key Pair - Done
2,645,862 UART: [art] Signing Cert with AUTHO
2,646,342 UART: RITY.KEYID = 7
2,661,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,599 UART: [art] PUB.X = 12DE446D3B3E9A26E970C360D9002AC2CDCC04242671083542AD92AAEE6930079BBAFBA5ED28F48F3246C67F35E451FF
2,669,348 UART: [art] PUB.Y = 4FC7C8D57AC57AB12005C3A921E0907B659099BA3C50664BF63D765D2A9D18321388854058F956375183A6B24A23A7A5
2,676,287 UART: [art] SIG.R = 3823866C510DDE97FF92D43709AD2291C5EFC0CA359FB44213E7903DECFB1A43FC2F3080B05104B88B80AF4CF9F30AF0
2,683,057 UART: [art] SIG.S = 6952A115BDF327E920D91730A47E9047BE5CACEC712CAC47A566F3286C7A4A3AAF6DAD58FCD8F6460CA2F790C27977BC
2,706,943 UART: mbox::rt_entry...
2,707,315 UART: ____ _ _ _ ____ _____
2,708,099 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,710,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,203 UART: |_|
2,711,515 UART:
2,816,881 UART: [rt] Runtime listening for mailbox commands...
2,821,849 >>> mbox cmd response data (3272 bytes)
2,821,850 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,844,936 >>> mbox cmd response data (0 bytes)
2,844,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,845,054 UART:
2,845,070 UART: Running Caliptra ROM ...
2,845,478 UART:
2,845,620 UART: [state] CFI Enabled
2,848,430 UART: [state] LifecycleState = Unprovisioned
2,849,085 UART: [state] DebugLocked = No
2,849,739 UART: [state] WD Timer not started. Device not locked for debugging
2,851,007 UART: [kat] SHA2-256
3,656,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,660,782 UART: [kat] ++
3,660,934 UART: [kat] sha1
3,665,236 UART: [kat] SHA2-256
3,667,176 UART: [kat] SHA2-384
3,669,919 UART: [kat] SHA2-512-ACC
3,671,819 UART: [kat] ECC-384
3,681,936 UART: [kat] HMAC-384Kdf
3,686,488 UART: [kat] LMS
3,934,816 UART: [kat] --
3,935,860 UART: [update-reset] ++
5,247,252 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,329 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,397,907 >>> mbox cmd response: success
5,398,088 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,102 UART: [update-reset Success] --
5,407,107 UART: [state] Locking Datavault
5,407,753 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,357 UART: [state] Locking ICCM
5,408,929 UART: [exit] Launching FMC @ 0x40000130
5,414,258 UART:
5,414,274 UART: Running Caliptra FMC ...
5,414,682 UART:
5,414,825 UART: [state] CFI Enabled
5,504,220 UART: [art] Extend RT PCRs Done
5,504,648 UART: [art] Lock RT PCRs Done
5,506,093 UART: [art] Populate DV Done
5,514,240 UART: [fht] FMC Alias Private Key: 7
5,515,276 UART: [art] Derive CDI
5,515,556 UART: [art] Store in in slot 0x4
5,601,399 UART: [art] Derive Key Pair
5,601,759 UART: [art] Store priv key in slot 0x5
5,615,091 UART: [art] Derive Key Pair - Done
5,629,906 UART: [art] Signing Cert with AUTHO
5,630,386 UART: RITY.KEYID = 7
5,645,422 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,187 UART: [art] PUB.X = EB52B938C4E9D6211451546066A677423B9C097C7E4373E7C85FF1C4EADC9A80E50CFAB187884F340693B7083FBEBEE1
5,652,951 UART: [art] PUB.Y = 13A28915F54CFF4F52E61031061A890D25C9138436AD93DE1AF7B697BC3FEAD3E337A5BE4232B7FF0ED71493A7F20E7D
5,659,899 UART: [art] SIG.R = B97912D93C5CF043823E44CC8E9F6F28A39DA47A587183B262337AAEC99DC62F570BFFF931D031DF51D1A59870676BA4
5,666,672 UART: [art] SIG.S = D7B2BA1E1D9552741717B34E5D1156FF03311C006458874AA16BF058C8E06A30E079171E4DB5789E51292297221F571F
5,690,520 UART: Caliptra RT
5,690,865 UART: [state] CFI Enabled
5,756,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,758,030 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,788,376 UART: [rt]cmd =0x494e464f, len=4
5,792,201 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,794 ready_for_fw is high
1,059,794 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,161,343 >>> mbox cmd response: success
2,161,343 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,437 UART:
2,223,453 UART: Running Caliptra FMC ...
2,223,861 UART:
2,224,004 UART: [state] CFI Enabled
2,234,551 UART: [fht] FMC Alias Private Key: 7
2,342,080 UART: [art] Extend RT PCRs Done
2,342,508 UART: [art] Lock RT PCRs Done
2,344,456 UART: [art] Populate DV Done
2,352,631 UART: [fht] FMC Alias Private Key: 7
2,353,735 UART: [art] Derive CDI
2,354,015 UART: [art] Store in in slot 0x4
2,439,764 UART: [art] Derive Key Pair
2,440,124 UART: [art] Store priv key in slot 0x5
2,453,128 UART: [art] Derive Key Pair - Done
2,467,950 UART: [art] Signing Cert with AUTHO
2,468,430 UART: RITY.KEYID = 7
2,483,394 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,159 UART: [art] PUB.X = 05755BF534BCBAD9AA1E69E9F4F9433C3D54E45CE3DAD2CD8DD4182F18BFC17B674DF59FF7F4C2FEC94705796D8BDB11
2,490,947 UART: [art] PUB.Y = F24238FF11B4A932F13E467D7750F74EFE1625603454A52CECD961B9F27763EF521B622D451BED11C04B0ADFBA59AD4C
2,497,904 UART: [art] SIG.R = FCF9673A7B7BA84C902F68EB1AD69FB4000512367FB9A749227F23A8DBC8063BF6D964A54B1319C2F458CD37CBEE3A67
2,504,658 UART: [art] SIG.S = 08CF53722471D4BD1C1E1AF012740414908C83A6EA4404BE0A58CA34C885114497C982621DA90D56CB1E255F059665C6
2,529,095 UART: mbox::rt_entry...
2,529,467 UART: ____ _ _ _ ____ _____
2,530,251 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,051 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,587 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,355 UART: |_|
2,533,667 UART:
2,640,665 UART: [rt] Runtime listening for mailbox commands...
2,645,633 >>> mbox cmd response data (3272 bytes)
2,645,634 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,720 >>> mbox cmd response data (0 bytes)
2,668,721 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,104,284 >>> mbox cmd response: success
5,117,332 UART:
5,117,348 UART: Running Caliptra FMC ...
5,117,756 UART:
5,117,899 UART: [state] CFI Enabled
5,207,304 UART: [art] Extend RT PCRs Done
5,207,732 UART: [art] Lock RT PCRs Done
5,209,085 UART: [art] Populate DV Done
5,217,294 UART: [fht] FMC Alias Private Key: 7
5,218,324 UART: [art] Derive CDI
5,218,604 UART: [art] Store in in slot 0x4
5,304,493 UART: [art] Derive Key Pair
5,304,853 UART: [art] Store priv key in slot 0x5
5,318,533 UART: [art] Derive Key Pair - Done
5,333,375 UART: [art] Signing Cert with AUTHO
5,333,855 UART: RITY.KEYID = 7
5,349,321 UART: [art] Erasing AUTHORITY.KEYID = 7
5,350,086 UART: [art] PUB.X = F8568C72F2E35CE135097FD57CE81DA430C1392F351C61F9DFD56265B017F4556404D4C915E8EF5CF950A1C462F29E00
5,356,830 UART: [art] PUB.Y = 44CA8E396CD1B43B19CADF2C35A7E5C855428A9C489C9E940D757C2FDCB3F05DEFACD22797F4CD567D7D21822072CE62
5,363,793 UART: [art] SIG.R = BC86DBA15C70A596111F0C99C6F0BB1A8FF7135730AB1B11379DA824997E205D3E426B10959644F2BE62EE7306300BEF
5,370,558 UART: [art] SIG.S = ABD37F26E6A2932E49B7BE32AEC33E8C13F4DB574F2A649E377628F0230E046179CD03005A9AD243856DC308C113DFEB
5,394,173 UART: Caliptra RT
5,394,518 UART: [state] CFI Enabled
5,461,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,462,679 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,493,265 UART: [rt]cmd =0x494e464f, len=4
5,496,964 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,450 UART: [kat] SHA2-512-ACC
906,351 UART: [kat] ECC-384
916,514 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,515 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,174,989 ready_for_fw is high
1,174,989 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,407 UART: [idev] Sha1 KeyId Algorithm
1,208,389 UART: [idev] --
1,209,546 UART: [ldev] ++
1,209,714 UART: [ldev] CDI.KEYID = 6
1,210,078 UART: [ldev] SUBJECT.KEYID = 5
1,210,505 UART: [ldev] AUTHORITY.KEYID = 7
1,210,968 UART: [ldev] FE.KEYID = 1
1,216,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,562 UART: [ldev] --
1,280,988 UART: [fwproc] Wait for Commands...
1,281,663 UART: [fwproc] Recv command 0x46574c44
1,282,396 UART: [fwproc] Recv'd Img size: 78532 bytes
2,168,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,195,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,261 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,307,395 >>> mbox cmd response: success
2,307,395 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,308,462 UART: [afmc] ++
2,308,630 UART: [afmc] CDI.KEYID = 6
2,308,993 UART: [afmc] SUBJECT.KEYID = 7
2,309,419 UART: [afmc] AUTHORITY.KEYID = 5
2,344,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,360,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,361,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,478 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,361 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,379,080 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,069 UART: [afmc] --
2,388,013 UART: [cold-reset] --
2,388,819 UART: [state] Locking Datavault
2,390,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,390,606 UART: [state] Locking ICCM
2,391,026 UART: [exit] Launching FMC @ 0x40000130
2,396,355 UART:
2,396,371 UART: Running Caliptra FMC ...
2,396,779 UART:
2,396,833 UART: [state] CFI Enabled
2,407,592 UART: [fht] FMC Alias Private Key: 7
2,515,283 UART: [art] Extend RT PCRs Done
2,515,711 UART: [art] Lock RT PCRs Done
2,516,855 UART: [art] Populate DV Done
2,524,890 UART: [fht] FMC Alias Private Key: 7
2,525,860 UART: [art] Derive CDI
2,526,140 UART: [art] Store in in slot 0x4
2,611,691 UART: [art] Derive Key Pair
2,612,051 UART: [art] Store priv key in slot 0x5
2,625,155 UART: [art] Derive Key Pair - Done
2,639,921 UART: [art] Signing Cert with AUTHO
2,640,401 UART: RITY.KEYID = 7
2,655,303 UART: [art] Erasing AUTHORITY.KEYID = 7
2,656,068 UART: [art] PUB.X = E78E6795305CD339A210320C672552E64714FB5DC570DBD2A86E7F508E2A92F57E6164E5E2B88E796B36A2578670AB53
2,662,831 UART: [art] PUB.Y = B5F6F7EEF665E921953C84507FBF0912CD9C14AE34800C979637C84FF9971CAE53B15FC9E07BE9EAD897E9479C887A1D
2,669,785 UART: [art] SIG.R = 4C8F47EB012E8D0D18FD84749F1BFB4BD5F5EB4B206D39F1791F10C143D281B56EEEB3B087AE9384A64F6807117957BE
2,676,556 UART: [art] SIG.S = B78CDD3BE5B6A1198D3D56A0E182F497EE2FFDB80B798AC85D02AB2F0629847ED84BC4D77455B82E1F2B72D39AE187ED
2,700,194 UART: mbox::rt_entry...
2,700,566 UART: ____ _ _ _ ____ _____
2,701,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,702,150 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,702,918 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,703,686 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,704,454 UART: |_|
2,704,766 UART:
2,811,648 UART: [rt] Runtime listening for mailbox commands...
2,816,616 >>> mbox cmd response data (3272 bytes)
2,816,617 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,839,703 >>> mbox cmd response data (0 bytes)
2,839,704 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,839,821 UART:
2,839,837 UART: Running Caliptra ROM ...
2,840,245 UART:
2,840,300 UART: [state] CFI Enabled
2,842,630 UART: [state] LifecycleState = Unprovisioned
2,843,285 UART: [state] DebugLocked = No
2,843,777 UART: [state] WD Timer not started. Device not locked for debugging
2,844,959 UART: [kat] SHA2-256
3,648,509 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,638 UART: [kat] ++
3,652,790 UART: [kat] sha1
3,657,070 UART: [kat] SHA2-256
3,659,010 UART: [kat] SHA2-384
3,661,925 UART: [kat] SHA2-512-ACC
3,663,825 UART: [kat] ECC-384
3,673,402 UART: [kat] HMAC-384Kdf
3,677,860 UART: [kat] LMS
3,926,172 UART: [kat] --
3,926,916 UART: [update-reset] ++
5,237,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,238,444 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,388,022 >>> mbox cmd response: success
5,388,193 UART: [update-reset] Copying MAN_2 To MAN_1
5,396,207 UART: [update-reset Success] --
5,397,250 UART: [state] Locking Datavault
5,397,930 UART: [state] Locking PCR0, PCR1 and PCR31
5,398,534 UART: [state] Locking ICCM
5,399,146 UART: [exit] Launching FMC @ 0x40000130
5,404,475 UART:
5,404,491 UART: Running Caliptra FMC ...
5,404,899 UART:
5,404,953 UART: [state] CFI Enabled
5,494,010 UART: [art] Extend RT PCRs Done
5,494,438 UART: [art] Lock RT PCRs Done
5,495,869 UART: [art] Populate DV Done
5,504,226 UART: [fht] FMC Alias Private Key: 7
5,505,222 UART: [art] Derive CDI
5,505,502 UART: [art] Store in in slot 0x4
5,591,503 UART: [art] Derive Key Pair
5,591,863 UART: [art] Store priv key in slot 0x5
5,604,907 UART: [art] Derive Key Pair - Done
5,619,892 UART: [art] Signing Cert with AUTHO
5,620,372 UART: RITY.KEYID = 7
5,635,562 UART: [art] Erasing AUTHORITY.KEYID = 7
5,636,327 UART: [art] PUB.X = FD00257A3B70ACFDE469872815EEC61675C1AD5081E49662B7B8EF1DC9DFAC411BF37E336EA2568CCAE440E6C2390859
5,643,084 UART: [art] PUB.Y = DAF13DE34FE82B75932B10F964C216A071F109A68125EED2A5B896156F81744288B69DEEAF23BB0C8D6CC053ED2DB887
5,650,038 UART: [art] SIG.R = 3068A237E54881D09A003045C960CCDB1A2B5EACF4202D391B314362845ED9743DFC85FE82CAB59159331C53D39EF6BF
5,656,790 UART: [art] SIG.S = 6F47FBFB6AAB1D03D46DE439152F06710D8939FE7AC980066E8B04870F3A0DC24A71FBE11A6C1B4EEC26C44435A127AA
5,680,650 UART: Caliptra RT
5,680,903 UART: [state] CFI Enabled
5,746,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,748,069 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,778,711 UART: [rt]cmd =0x494e464f, len=4
5,782,194 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,830 ready_for_fw is high
1,055,830 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,158,121 >>> mbox cmd response: success
2,158,121 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,221,215 UART:
2,221,231 UART: Running Caliptra FMC ...
2,221,639 UART:
2,221,693 UART: [state] CFI Enabled
2,232,498 UART: [fht] FMC Alias Private Key: 7
2,340,481 UART: [art] Extend RT PCRs Done
2,340,909 UART: [art] Lock RT PCRs Done
2,342,111 UART: [art] Populate DV Done
2,350,460 UART: [fht] FMC Alias Private Key: 7
2,351,404 UART: [art] Derive CDI
2,351,684 UART: [art] Store in in slot 0x4
2,437,445 UART: [art] Derive Key Pair
2,437,805 UART: [art] Store priv key in slot 0x5
2,450,949 UART: [art] Derive Key Pair - Done
2,465,314 UART: [art] Signing Cert with AUTHO
2,465,794 UART: RITY.KEYID = 7
2,480,934 UART: [art] Erasing AUTHORITY.KEYID = 7
2,481,699 UART: [art] PUB.X = 965559E5FBB3BECF6FC8426DEF57AFC0323C26D0CEBF1602A4441C3AA72B9778BCBB4FED667B7FDE7EFD708EEAD0837A
2,488,496 UART: [art] PUB.Y = 1F96713A3387424C0ACB1286D0F064A0E97D3E86C478600A9557408CEA2F9D5D6E1437F6030BB09642A86B57831236F0
2,495,426 UART: [art] SIG.R = E21811C74F382EEB716AD862B0755AC34E74A0A033842D06BF155EBA8B8709E4D5C7C1806FA1DB4640B2C87D11CEA41B
2,502,200 UART: [art] SIG.S = 1EF08B9EE5BA576A2BA8FD50117EA2096EE7F6C7F1B45B5124DC877503258112F2D4E902E7203154612C7F923F1A41CF
2,526,060 UART: mbox::rt_entry...
2,526,432 UART: ____ _ _ _ ____ _____
2,527,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,528,016 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,528,784 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,529,552 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,530,320 UART: |_|
2,530,632 UART:
2,636,930 UART: [rt] Runtime listening for mailbox commands...
2,641,898 >>> mbox cmd response data (3272 bytes)
2,641,899 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,664,985 >>> mbox cmd response data (0 bytes)
2,664,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,095,475 >>> mbox cmd response: success
5,108,555 UART:
5,108,571 UART: Running Caliptra FMC ...
5,108,979 UART:
5,109,033 UART: [state] CFI Enabled
5,197,790 UART: [art] Extend RT PCRs Done
5,198,218 UART: [art] Lock RT PCRs Done
5,199,437 UART: [art] Populate DV Done
5,207,694 UART: [fht] FMC Alias Private Key: 7
5,208,788 UART: [art] Derive CDI
5,209,068 UART: [art] Store in in slot 0x4
5,294,825 UART: [art] Derive Key Pair
5,295,185 UART: [art] Store priv key in slot 0x5
5,308,273 UART: [art] Derive Key Pair - Done
5,323,086 UART: [art] Signing Cert with AUTHO
5,323,566 UART: RITY.KEYID = 7
5,338,934 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,699 UART: [art] PUB.X = 5C009BD93CF52FDBA08B618C84FC6A23B463347FF92AB37CCB44EDF160B2C5613089AF2A3640C2361C19D04F60A12857
5,346,455 UART: [art] PUB.Y = BAA288739A8B24D2F8B3AF4041B59A7E010DF36365881226AA6CBEB064B55AF80EB73293F13AAECA8901A9FB2D03FB49
5,353,404 UART: [art] SIG.R = F97B9D6B57728F6A24FE516EE0C4EA8566C3E457C7A2EB8E856672C3C4C20AB72A5C99B7885432501B193EFA0E4226AF
5,360,176 UART: [art] SIG.S = 16B08DDA443A9DDE1B2563AA645B8F55B2FEC8DACE32302AF92D45283F7876AB4BFC6A961E5EF0BFA56875FA68E250E7
5,383,983 UART: Caliptra RT
5,384,236 UART: [state] CFI Enabled
5,449,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,451,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,481,610 UART: [rt]cmd =0x494e464f, len=4
5,485,301 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,207 UART: [kat] SHA2-256
891,757 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,886 UART: [kat] ++
896,038 UART: [kat] sha1
900,264 UART: [kat] SHA2-256
902,204 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,661 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,578 UART: [cold-reset] ++
1,171,088 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,451 UART: [idev] SUBJECT.KEYID = 7
1,174,876 UART: [idev] UDS.KEYID = 0
1,175,222 ready_for_fw is high
1,175,222 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,082 UART: [idev] Sha1 KeyId Algorithm
1,208,990 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,611 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,805 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,463 UART: [fwproc] Wait for Commands...
1,283,268 UART: [fwproc] Recv command 0x46574c44
1,284,001 UART: [fwproc] Recv'd Img size: 78532 bytes
2,171,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,198,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,227,608 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,309,804 >>> mbox cmd response: success
2,309,804 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,311,009 UART: [afmc] ++
2,311,177 UART: [afmc] CDI.KEYID = 6
2,311,540 UART: [afmc] SUBJECT.KEYID = 7
2,311,966 UART: [afmc] AUTHORITY.KEYID = 5
2,347,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,363,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,364,292 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,370,021 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,375,904 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,381,623 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,389,422 UART: [afmc] --
2,390,542 UART: [cold-reset] --
2,391,524 UART: [state] Locking Datavault
2,392,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,393,335 UART: [state] Locking ICCM
2,393,877 UART: [exit] Launching FMC @ 0x40000130
2,399,206 UART:
2,399,222 UART: Running Caliptra FMC ...
2,399,630 UART:
2,399,773 UART: [state] CFI Enabled
2,410,594 UART: [fht] FMC Alias Private Key: 7
2,518,857 UART: [art] Extend RT PCRs Done
2,519,285 UART: [art] Lock RT PCRs Done
2,520,767 UART: [art] Populate DV Done
2,529,220 UART: [fht] FMC Alias Private Key: 7
2,530,250 UART: [art] Derive CDI
2,530,530 UART: [art] Store in in slot 0x4
2,616,605 UART: [art] Derive Key Pair
2,616,965 UART: [art] Store priv key in slot 0x5
2,631,143 UART: [art] Derive Key Pair - Done
2,645,642 UART: [art] Signing Cert with AUTHO
2,646,122 UART: RITY.KEYID = 7
2,661,492 UART: [art] Erasing AUTHORITY.KEYID = 7
2,662,257 UART: [art] PUB.X = 5B97281B55653AA22B0FC42CB42922E21C0DC342EF09351F27A1C8DE9E5F0061899526779DE235C667ACBA3E4368FC58
2,668,998 UART: [art] PUB.Y = 7668B18BC5BBB741A97B3CE33B4A40C4738930120F6811974F6109AE63C52AF6BD3261A7DDC984F51C5C925E2912D005
2,675,939 UART: [art] SIG.R = 9B0E3555DAADC1EC35CBB4EFB428E89ECE2E8031E4E0BA755503E63EF60AEA23B7677CC118D89FD455DA71F964A4AB1A
2,682,724 UART: [art] SIG.S = 7F98C2B07935E379AE4BC92B34B046E64533A3867F7DA04192953C2B1C6C4AD95B0064A6A6EA0839A3593BF83F49F30A
2,706,411 UART: mbox::rt_entry...
2,706,783 UART: ____ _ _ _ ____ _____
2,707,567 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,708,367 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,709,135 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,709,903 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,710,671 UART: |_|
2,710,983 UART:
2,817,239 UART: [rt] Runtime listening for mailbox commands...
2,822,207 >>> mbox cmd response data (3272 bytes)
2,822,208 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,294 >>> mbox cmd response data (0 bytes)
2,845,295 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,845,412 UART:
2,845,428 UART: Running Caliptra ROM ...
2,845,836 UART:
2,845,978 UART: [state] CFI Enabled
2,848,946 UART: [state] LifecycleState = Unprovisioned
2,849,601 UART: [state] DebugLocked = No
2,850,193 UART: [state] WD Timer not started. Device not locked for debugging
2,851,437 UART: [kat] SHA2-256
3,654,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,116 UART: [kat] ++
3,659,268 UART: [kat] sha1
3,663,586 UART: [kat] SHA2-256
3,665,526 UART: [kat] SHA2-384
3,668,049 UART: [kat] SHA2-512-ACC
3,669,949 UART: [kat] ECC-384
3,679,724 UART: [kat] HMAC-384Kdf
3,684,284 UART: [kat] LMS
3,932,596 UART: [kat] --
3,933,392 UART: [update-reset] ++
5,244,781 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,245,954 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,395,532 >>> mbox cmd response: success
5,395,819 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,833 UART: [update-reset Success] --
5,405,046 UART: [state] Locking Datavault
5,406,054 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,658 UART: [state] Locking ICCM
5,407,144 UART: [exit] Launching FMC @ 0x40000130
5,412,473 UART:
5,412,489 UART: Running Caliptra FMC ...
5,412,897 UART:
5,413,040 UART: [state] CFI Enabled
5,502,663 UART: [art] Extend RT PCRs Done
5,503,091 UART: [art] Lock RT PCRs Done
5,503,980 UART: [art] Populate DV Done
5,512,185 UART: [fht] FMC Alias Private Key: 7
5,513,269 UART: [art] Derive CDI
5,513,549 UART: [art] Store in in slot 0x4
5,599,554 UART: [art] Derive Key Pair
5,599,914 UART: [art] Store priv key in slot 0x5
5,613,382 UART: [art] Derive Key Pair - Done
5,627,811 UART: [art] Signing Cert with AUTHO
5,628,291 UART: RITY.KEYID = 7
5,643,287 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,052 UART: [art] PUB.X = 11BC0E7E316A34ED3CB3D1F2AF0B51A4581ABAC3737A4FD3CBFDB3DAD20B37949EFF6552D9E41C153C4F0B02F6F9B5C6
5,650,833 UART: [art] PUB.Y = 9B43ABAD50AA9A8E459F4701F5080AF598D265DAE46A2C981F86DEDD2A3C2E22E9EB12E253A42E93451CDD0D6516A380
5,657,785 UART: [art] SIG.R = 10591E91175BA8DC91C95994B7054924B918ED395B7BD15BCE8D10693402C18379A1926BE2A6BC1CAE21784A15FD3C9B
5,664,551 UART: [art] SIG.S = A231152BDC3E5837A8245135F835812D36601621FE117F115AA490B6D4C812FBCEDEE339DECA0F0AD465A37501B097BD
5,687,915 UART: Caliptra RT
5,688,260 UART: [state] CFI Enabled
5,753,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,755,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,785,812 UART: [rt]cmd =0x494e464f, len=4
5,789,439 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,253 ready_for_fw is high
1,056,253 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,160,438 >>> mbox cmd response: success
2,160,438 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,222,314 UART:
2,222,330 UART: Running Caliptra FMC ...
2,222,738 UART:
2,222,881 UART: [state] CFI Enabled
2,233,612 UART: [fht] FMC Alias Private Key: 7
2,341,429 UART: [art] Extend RT PCRs Done
2,341,857 UART: [art] Lock RT PCRs Done
2,343,637 UART: [art] Populate DV Done
2,352,000 UART: [fht] FMC Alias Private Key: 7
2,353,114 UART: [art] Derive CDI
2,353,394 UART: [art] Store in in slot 0x4
2,438,929 UART: [art] Derive Key Pair
2,439,289 UART: [art] Store priv key in slot 0x5
2,453,121 UART: [art] Derive Key Pair - Done
2,467,803 UART: [art] Signing Cert with AUTHO
2,468,283 UART: RITY.KEYID = 7
2,483,523 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,288 UART: [art] PUB.X = A4B2FC34E625ED405439FF7D8060BCD0E0E14744B0683EC88B317A64B8BF75284BAE37CBAECB0BD857F66BE450B6FB6A
2,491,075 UART: [art] PUB.Y = 9ACABCA255D137F6A74ECCAF30872CB65BBF49E8644D27AEE4D43162E5AAEDD9992554CAB3105AAD0AD717FF8C1C0F8C
2,498,047 UART: [art] SIG.R = 71D6D4A70B3AA671975ED6799AEC5D9568FEA913125DC682B8E9A6EABCD67B96E7C0F4E34110AF0F98938E33C19B595D
2,504,823 UART: [art] SIG.S = 607A2195F42DECA0D8F913375599D9285CD1F8E101CFC14F2B9B023736835A682890E699C3C4486C7DFFB7C03B009EFE
2,528,480 UART: mbox::rt_entry...
2,528,852 UART: ____ _ _ _ ____ _____
2,529,636 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,530,436 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,204 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,972 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,532,740 UART: |_|
2,533,052 UART:
2,640,062 UART: [rt] Runtime listening for mailbox commands...
2,645,030 >>> mbox cmd response data (3272 bytes)
2,645,031 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,668,117 >>> mbox cmd response data (0 bytes)
2,668,118 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,099,242 >>> mbox cmd response: success
5,112,374 UART:
5,112,390 UART: Running Caliptra FMC ...
5,112,798 UART:
5,112,941 UART: [state] CFI Enabled
5,202,166 UART: [art] Extend RT PCRs Done
5,202,594 UART: [art] Lock RT PCRs Done
5,203,875 UART: [art] Populate DV Done
5,212,140 UART: [fht] FMC Alias Private Key: 7
5,213,084 UART: [art] Derive CDI
5,213,364 UART: [art] Store in in slot 0x4
5,299,075 UART: [art] Derive Key Pair
5,299,435 UART: [art] Store priv key in slot 0x5
5,312,895 UART: [art] Derive Key Pair - Done
5,327,598 UART: [art] Signing Cert with AUTHO
5,328,078 UART: RITY.KEYID = 7
5,343,452 UART: [art] Erasing AUTHORITY.KEYID = 7
5,344,217 UART: [art] PUB.X = C5217AF193EC11946C18F21111E12FF6F06059FE8E84713F5D46EE239D3F33CDE73A9F4A049F64733C3F40DC87DF5586
5,350,988 UART: [art] PUB.Y = B17A379136B585A78019FF3A691520C8603B3613286EEBF92A1DB7B921FD894F8DF0EE04B58B9E970CEF653271B29613
5,357,932 UART: [art] SIG.R = 489D5DA61C5AAF26421495876492310CCF8C68FCA22A0C221A2FDA8CDA29DDEB7489E66DC72E830527299AD398B6A868
5,364,701 UART: [art] SIG.S = 8D58FB164EEC35FC40C4F59B55F5BD50BA1963B26933F4D56BDE3493A6C396E8E6E2AE1B80A1A322709A60117A2BCC6B
5,388,926 UART: Caliptra RT
5,389,271 UART: [state] CFI Enabled
5,455,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,456,653 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,486,831 UART: [rt]cmd =0x494e464f, len=4
5,490,690 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
191,941 UART:
192,294 UART: Running Caliptra ROM ...
193,423 UART:
193,563 UART: [state] CFI Enabled
265,504 UART: [state] LifecycleState = Unprovisioned
267,474 UART: [state] DebugLocked = No
269,640 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,146 UART: [kat] SHA2-256
444,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,316 UART: [kat] ++
455,829 UART: [kat] sha1
466,766 UART: [kat] SHA2-256
469,481 UART: [kat] SHA2-384
473,775 UART: [kat] SHA2-512-ACC
476,132 UART: [kat] ECC-384
2,768,375 UART: [kat] HMAC-384Kdf
2,792,765 UART: [kat] LMS
3,983,029 UART: [kat] --
3,988,468 UART: [cold-reset] ++
3,990,541 UART: [fht] Storing FHT @ 0x50003400
4,002,863 UART: [idev] ++
4,003,433 UART: [idev] CDI.KEYID = 6
4,004,462 UART: [idev] SUBJECT.KEYID = 7
4,005,632 UART: [idev] UDS.KEYID = 0
4,006,663 ready_for_fw is high
4,006,864 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,105,970 UART: [idev] Erasing UDS.KEYID = 0
7,339,479 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,358 UART: [idev] --
7,365,257 UART: [ldev] ++
7,365,821 UART: [ldev] CDI.KEYID = 6
7,366,831 UART: [ldev] SUBJECT.KEYID = 5
7,367,978 UART: [ldev] AUTHORITY.KEYID = 7
7,369,251 UART: [ldev] FE.KEYID = 1
7,413,174 UART: [ldev] Erasing FE.KEYID = 1
10,746,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,041 UART: [ldev] --
13,104,542 UART: [fwproc] Waiting for Commands...
13,106,800 UART: [fwproc] Received command 0x46574c44
13,109,027 UART: [fwproc] Received Image of size 78576 bytes
16,724,653 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,800,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
16,869,099 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,062,404 >>> mbox cmd response: success
17,062,890 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,066,704 UART: [afmc] ++
17,067,333 UART: [afmc] CDI.KEYID = 6
17,068,233 UART: [afmc] SUBJECT.KEYID = 7
17,069,503 UART: [afmc] AUTHORITY.KEYID = 5
20,439,719 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,743,320 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,745,629 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,760,025 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,774,797 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,789,223 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,809,928 UART: [afmc] --
22,813,082 UART: [cold-reset] --
22,817,666 UART: [state] Locking Datavault
22,821,499 UART: [state] Locking PCR0, PCR1 and PCR31
22,823,203 UART: [state] Locking ICCM
22,826,056 UART: [exit] Launching FMC @ 0x40000130
22,834,440 UART:
22,834,688 UART: Running Caliptra FMC ...
22,835,783 UART:
22,835,949 UART: [state] CFI Enabled
22,901,674 UART: [fht] FMC Alias Private Key: 7
25,239,729 UART: [art] Extend RT PCRs Done
25,240,948 UART: [art] Lock RT PCRs Done
25,242,602 UART: [art] Populate DV Done
25,248,163 UART: [fht] FMC Alias Private Key: 7
25,249,851 UART: [art] Derive CDI
25,250,581 UART: [art] Store in in slot 0x4
25,310,772 UART: [art] Derive Key Pair
25,311,824 UART: [art] Store priv key in slot 0x5
28,604,415 UART: [art] Derive Key Pair - Done
28,617,513 UART: [art] Signing Cert with AUTHO
28,618,806 UART: RITY.KEYID = 7
30,905,774 UART: [art] Erasing AUTHORITY.KEYID = 7
30,907,282 UART: [art] PUB.X = C58A033F42E35242B15E0AB71CFBF3AE4277C3A346FA6A3F2E423AA20CCD721F90587E6F496143E75F75A6DFD15C75CE
30,914,540 UART: [art] PUB.Y = 95E0BEAEAA13501FEA78EE7156195E903AEA2A4798DD6BA7435ADF7D1300E9C063ED04A1952315AED45D71F89B85F067
30,921,756 UART: [art] SIG.R = C669DD633A5FF163F48FD424B67BEF7552B4C99CD4DA85E545404DE6015DF3DB4688518FD8F3DC04146228C8C96A0CB7
30,929,178 UART: [art] SIG.S = 473A5D14FFEC416C2CAA5A2B0C47BE12FFCDCC7F972E1443E6680655A0437695F6E871BF78EA5AAA5FD5E4ECA8AD44B9
32,234,152 UART: mbox::rt_entry...
32,235,095 UART: ____ _ _ _ ____ _____
32,236,999 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,239,005 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,240,933 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,242,855 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,244,818 UART: |_|
32,245,638 UART:
32,358,835 UART: [rt] Runtime listening for mailbox commands...
32,364,647 >>> mbox cmd response data (3272 bytes)
32,380,218 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,413,613 >>> mbox cmd response data (0 bytes)
34,475,177 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,619,251 UART:
34,619,640 UART: Running Caliptra ROM ...
34,620,687 UART:
34,620,836 UART: [state] CFI Enabled
34,681,630 UART: [state] LifecycleState = Unprovisioned
34,683,557 UART: [state] DebugLocked = No
34,685,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,690,667 UART: [kat] SHA2-256
34,860,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,870,874 UART: [kat] ++
34,871,325 UART: [kat] sha1
34,883,127 UART: [kat] SHA2-256
34,885,817 UART: [kat] SHA2-384
34,891,796 UART: [kat] SHA2-512-ACC
34,894,150 UART: [kat] ECC-384
37,182,557 UART: [kat] HMAC-384Kdf
37,213,685 UART: [kat] LMS
38,404,028 UART: [kat] --
38,409,262 UART: [update-reset] ++
42,539,380 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,543,062 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,924,366 >>> mbox cmd response: success
42,929,012 UART: [update-reset] Copying MAN_2 To MAN_1
42,948,015 UART: [update-reset Success] --
42,951,833 UART: [state] Locking Datavault
42,954,815 UART: [state] Locking PCR0, PCR1 and PCR31
42,956,587 UART: [state] Locking ICCM
42,958,362 UART: [exit] Launching FMC @ 0x40000130
42,966,816 UART:
42,967,055 UART: Running Caliptra FMC ...
42,968,154 UART:
42,968,304 UART: [state] CFI Enabled
43,070,199 UART: [art] Extend RT PCRs Done
43,071,408 UART: [art] Lock RT PCRs Done
43,072,814 UART: [art] Populate DV Done
43,078,493 UART: [fht] FMC Alias Private Key: 7
43,080,184 UART: [art] Derive CDI
43,080,991 UART: [art] Store in in slot 0x4
43,139,422 UART: [art] Derive Key Pair
43,140,413 UART: [art] Store priv key in slot 0x5
46,432,541 UART: [art] Derive Key Pair - Done
46,445,178 UART: [art] Signing Cert with AUTHO
46,446,482 UART: RITY.KEYID = 7
48,733,792 UART: [art] Erasing AUTHORITY.KEYID = 7
48,735,302 UART: [art] PUB.X = 2DDD7CB2B65971D4368040D4852B1599864B08161443F7DFAFC56FDE50027D615BE1A4F57CFB2150A2E8BE400E455275
48,742,512 UART: [art] PUB.Y = F0F7C18D53DD5A51E5663003BC90A0674F9209223B1202DB0E6B3BCE98E739888C94763954714EF2B736E685F7128D9A
48,749,774 UART: [art] SIG.R = 0CC44BA570C1DDFF01A98F1C919C79639AFCC0D5B274029B632EFBE59F7111EBD1EE09D3BA339408CFF10B78EC4D52FA
48,757,149 UART: [art] SIG.S = 051FA4644BC20E105DFCFEA6545E9342ADAFAA37B5A00940DFFD7930399CCBD7218CC333CC3949E3C65C25A56F101878
50,062,022 UART: Caliptra RT
50,062,743 UART: [state] CFI Enabled
53,768,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,769,920 UART: [rt] RT listening for mailbox commands...
53,801,153 UART: [rt]cmd =0x494e464f, len=4
53,805,581 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,781,580 ready_for_fw is high
3,781,954 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,131,834 >>> mbox cmd response: success
17,132,616 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,821,017 UART:
22,821,399 UART: Running Caliptra FMC ...
22,822,504 UART:
22,822,654 UART: [state] CFI Enabled
22,888,871 UART: [fht] FMC Alias Private Key: 7
25,226,829 UART: [art] Extend RT PCRs Done
25,228,077 UART: [art] Lock RT PCRs Done
25,229,357 UART: [art] Populate DV Done
25,234,944 UART: [fht] FMC Alias Private Key: 7
25,236,645 UART: [art] Derive CDI
25,237,455 UART: [art] Store in in slot 0x4
25,297,398 UART: [art] Derive Key Pair
25,298,480 UART: [art] Store priv key in slot 0x5
28,591,411 UART: [art] Derive Key Pair - Done
28,604,291 UART: [art] Signing Cert with AUTHO
28,605,623 UART: RITY.KEYID = 7
30,893,889 UART: [art] Erasing AUTHORITY.KEYID = 7
30,895,395 UART: [art] PUB.X = 5B9F81D58B54720F2B3BB98417F255DA847E61ED68C70E5A870946B3DFEFB7FDF4F436638399D3B43839CA9E52E1558C
30,902,649 UART: [art] PUB.Y = A74E12F0B4470AB1E82979DC11C3534C78CC0C9A31451B89D425A1DB86F5EA1571FAE114141FF66DCEC89EA01156AFCD
30,909,903 UART: [art] SIG.R = A43BBD353DF47DD895656480894D0281853950FE2CD38DFFF34980AC22F39035509B5CB9829A4598477587BCD748D2D7
30,917,282 UART: [art] SIG.S = BC252BDA718921B98810BAA530F44958E160DB687B2D9F62A5ED43A1D9E13C29EB535557D0B500FB5BBEBD24E1CD745C
32,221,960 UART: mbox::rt_entry...
32,222,920 UART: ____ _ _ _ ____ _____
32,224,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,226,897 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,228,820 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,230,791 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,232,721 UART: |_|
32,233,545 UART:
32,347,369 UART: [rt] Runtime listening for mailbox commands...
32,353,205 >>> mbox cmd response data (3272 bytes)
32,369,116 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,402,529 >>> mbox cmd response data (0 bytes)
34,461,098 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,170,808 >>> mbox cmd response: success
43,204,332 UART:
43,204,631 UART: Running Caliptra FMC ...
43,205,662 UART:
43,205,807 UART: [state] CFI Enabled
43,298,035 UART: [art] Extend RT PCRs Done
43,299,250 UART: [art] Lock RT PCRs Done
43,300,745 UART: [art] Populate DV Done
43,306,151 UART: [fht] FMC Alias Private Key: 7
43,307,790 UART: [art] Derive CDI
43,308,519 UART: [art] Store in in slot 0x4
43,367,283 UART: [art] Derive Key Pair
43,368,319 UART: [art] Store priv key in slot 0x5
46,660,773 UART: [art] Derive Key Pair - Done
46,673,508 UART: [art] Signing Cert with AUTHO
46,674,806 UART: RITY.KEYID = 7
48,962,648 UART: [art] Erasing AUTHORITY.KEYID = 7
48,964,204 UART: [art] PUB.X = 29680BB09B6150354DB72DAE95E7F30827CACD5D567C67247B10E02CB1FB11B4646FDAF51A9BFEAFE1E2F0F3083A0C20
48,971,410 UART: [art] PUB.Y = 95A7EBFB59FBBBE5E74788225A3E62A0487D6018260FE55E0250B06B6B73D452639E4D2F4CC173AA8AAACBD04E0BC043
48,978,652 UART: [art] SIG.R = 70F81A34E56BE6273C3B6C48A7DF6EADB8F71A4E3EAFEF68A4C2E86EFF67F0300743F6BA986C74EF3751D4E3E081D278
48,986,013 UART: [art] SIG.S = 34EB8D8D0581556D05769028EECE84765CD6294F1B6CDBC962733DBD62D8F7E77F8DBBEFE20B82B1356F39D9FA181FA5
50,291,683 UART: Caliptra RT
50,292,420 UART: [state] CFI Enabled
54,018,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,019,547 UART: [rt] RT listening for mailbox commands...
54,050,739 UART: [rt]cmd =0x494e464f, len=4
54,055,065 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,753 UART:
193,120 UART: Running Caliptra ROM ...
194,219 UART:
603,947 UART: [state] CFI Enabled
617,676 UART: [state] LifecycleState = Unprovisioned
619,614 UART: [state] DebugLocked = No
621,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,578 UART: [kat] SHA2-256
795,308 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,834 UART: [kat] ++
806,306 UART: [kat] sha1
817,911 UART: [kat] SHA2-256
820,669 UART: [kat] SHA2-384
827,159 UART: [kat] SHA2-512-ACC
829,528 UART: [kat] ECC-384
3,114,800 UART: [kat] HMAC-384Kdf
3,125,611 UART: [kat] LMS
4,315,733 UART: [kat] --
4,319,904 UART: [cold-reset] ++
4,321,722 UART: [fht] Storing FHT @ 0x50003400
4,331,784 UART: [idev] ++
4,332,553 UART: [idev] CDI.KEYID = 6
4,333,468 UART: [idev] SUBJECT.KEYID = 7
4,334,575 UART: [idev] UDS.KEYID = 0
4,335,632 ready_for_fw is high
4,335,844 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,434,603 UART: [idev] Erasing UDS.KEYID = 0
7,624,799 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,832 UART: [idev] --
7,650,742 UART: [ldev] ++
7,651,308 UART: [ldev] CDI.KEYID = 6
7,652,271 UART: [ldev] SUBJECT.KEYID = 5
7,653,483 UART: [ldev] AUTHORITY.KEYID = 7
7,654,712 UART: [ldev] FE.KEYID = 1
7,666,274 UART: [ldev] Erasing FE.KEYID = 1
10,955,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,474 UART: [ldev] --
13,317,664 UART: [fwproc] Waiting for Commands...
13,320,786 UART: [fwproc] Received command 0x46574c44
13,322,966 UART: [fwproc] Received Image of size 78576 bytes
16,939,639 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,016,123 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,084,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 53872
17,277,246 >>> mbox cmd response: success
17,277,725 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,282,081 UART: [afmc] ++
17,282,740 UART: [afmc] CDI.KEYID = 6
17,283,675 UART: [afmc] SUBJECT.KEYID = 7
17,284,896 UART: [afmc] AUTHORITY.KEYID = 5
20,597,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,892,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,895,168 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
22,909,562 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
22,924,421 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
22,938,839 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
22,960,490 UART: [afmc] --
22,964,355 UART: [cold-reset] --
22,968,815 UART: [state] Locking Datavault
22,972,456 UART: [state] Locking PCR0, PCR1 and PCR31
22,974,249 UART: [state] Locking ICCM
22,975,384 UART: [exit] Launching FMC @ 0x40000130
22,983,784 UART:
22,984,019 UART: Running Caliptra FMC ...
22,985,145 UART:
22,985,313 UART: [state] CFI Enabled
22,993,259 UART: [fht] FMC Alias Private Key: 7
25,324,523 UART: [art] Extend RT PCRs Done
25,325,825 UART: [art] Lock RT PCRs Done
25,327,485 UART: [art] Populate DV Done
25,332,960 UART: [fht] FMC Alias Private Key: 7
25,334,450 UART: [art] Derive CDI
25,335,216 UART: [art] Store in in slot 0x4
25,377,763 UART: [art] Derive Key Pair
25,378,807 UART: [art] Store priv key in slot 0x5
28,620,919 UART: [art] Derive Key Pair - Done
28,633,867 UART: [art] Signing Cert with AUTHO
28,635,185 UART: RITY.KEYID = 7
30,914,715 UART: [art] Erasing AUTHORITY.KEYID = 7
30,916,218 UART: [art] PUB.X = 316FC5B7E061D5E2E40F09B1029B304ACAF691BD3A9F1B4AE03A7A18C993832EE0A5933109C2A46D4706343EE9D64E1A
30,923,497 UART: [art] PUB.Y = 5AFB0BD1D824F9943CC8658F78C579B88E66EC7746DFA9F8DE4672D0CBC97FB4F525EDC1FF325E4B8D66497B4377B167
30,930,726 UART: [art] SIG.R = 5F3B1EB01869DC9D125C0BBE3DE3F6C25BD004A3DE8D4BF338FDF463505C2D21796B792906226F7840B05627B591B0E8
30,938,139 UART: [art] SIG.S = 033571ED21E14E042DED712E1A92812763B68A677E5F013DF7F0916347F2558B9B5115CFA8CC9488F897590C11CD895D
32,242,804 UART: mbox::rt_entry...
32,243,769 UART: ____ _ _ _ ____ _____
32,245,757 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,247,763 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,249,699 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,251,628 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,253,687 UART: |_|
32,254,529 UART:
32,367,520 UART: [rt] Runtime listening for mailbox commands...
32,373,374 >>> mbox cmd response data (3272 bytes)
32,389,199 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,422,626 >>> mbox cmd response data (0 bytes)
34,549,985 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,694,023 UART:
34,694,394 UART: Running Caliptra ROM ...
34,695,448 UART:
34,695,658 UART: [state] CFI Enabled
34,708,803 UART: [state] LifecycleState = Unprovisioned
34,710,699 UART: [state] DebugLocked = No
34,712,190 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,717,299 UART: [kat] SHA2-256
34,887,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,897,599 UART: [kat] ++
34,898,162 UART: [kat] sha1
34,908,787 UART: [kat] SHA2-256
34,911,473 UART: [kat] SHA2-384
34,917,837 UART: [kat] SHA2-512-ACC
34,920,251 UART: [kat] ECC-384
37,203,852 UART: [kat] HMAC-384Kdf
37,217,301 UART: [kat] LMS
38,407,346 UART: [kat] --
38,410,334 UART: [update-reset] ++
42,552,248 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,556,047 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
42,937,336 >>> mbox cmd response: success
42,942,032 UART: [update-reset] Copying MAN_2 To MAN_1
42,960,558 UART: [update-reset Success] --
42,964,760 UART: [state] Locking Datavault
42,968,068 UART: [state] Locking PCR0, PCR1 and PCR31
42,969,842 UART: [state] Locking ICCM
42,972,294 UART: [exit] Launching FMC @ 0x40000130
42,980,722 UART:
42,980,973 UART: Running Caliptra FMC ...
42,982,084 UART:
42,982,249 UART: [state] CFI Enabled
43,026,478 UART: [art] Extend RT PCRs Done
43,027,632 UART: [art] Lock RT PCRs Done
43,028,920 UART: [art] Populate DV Done
43,034,381 UART: [fht] FMC Alias Private Key: 7
43,035,977 UART: [art] Derive CDI
43,036,792 UART: [art] Store in in slot 0x4
43,079,174 UART: [art] Derive Key Pair
43,080,219 UART: [art] Store priv key in slot 0x5
46,322,696 UART: [art] Derive Key Pair - Done
46,335,637 UART: [art] Signing Cert with AUTHO
46,336,975 UART: RITY.KEYID = 7
48,616,866 UART: [art] Erasing AUTHORITY.KEYID = 7
48,618,375 UART: [art] PUB.X = C218B5526B739BAAB46C3287222A73654290C0C045D755264884399523C5CBEB4FC9F41202D90773C040614CFA555D4A
48,625,579 UART: [art] PUB.Y = 839316D99AC39792449E17585A2446E7FE845EED55F9D958295A41225D89493125DD05C4117D93FDC7729BC69DC254C1
48,632,809 UART: [art] SIG.R = 6465CC875906738FC14B463F6EB4F2B18D3C026311B6CEDB5FB379384D31391ACB8DC0F89F61E82539531EF8103E228C
48,640,148 UART: [art] SIG.S = ADEC3007D499CF184BF3845C6BE56B697F92A239F3745416A95092CFABD3E3C682A2C89060A7082236161C018D4F3734
49,945,468 UART: Caliptra RT
49,946,188 UART: [state] CFI Enabled
53,534,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,536,525 UART: [rt] RT listening for mailbox commands...
53,567,863 UART: [rt]cmd =0x494e464f, len=4
53,572,242 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,121,718 ready_for_fw is high
4,122,532 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
17,344,143 >>> mbox cmd response: success
17,344,803 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,981,115 UART:
22,981,510 UART: Running Caliptra FMC ...
22,982,714 UART:
22,982,887 UART: [state] CFI Enabled
22,990,995 UART: [fht] FMC Alias Private Key: 7
25,321,692 UART: [art] Extend RT PCRs Done
25,322,919 UART: [art] Lock RT PCRs Done
25,324,489 UART: [art] Populate DV Done
25,329,909 UART: [fht] FMC Alias Private Key: 7
25,331,377 UART: [art] Derive CDI
25,332,144 UART: [art] Store in in slot 0x4
25,374,847 UART: [art] Derive Key Pair
25,375,851 UART: [art] Store priv key in slot 0x5
28,618,573 UART: [art] Derive Key Pair - Done
28,631,166 UART: [art] Signing Cert with AUTHO
28,632,471 UART: RITY.KEYID = 7
30,911,900 UART: [art] Erasing AUTHORITY.KEYID = 7
30,913,398 UART: [art] PUB.X = F4765682C9A758CEEB2CC855D17C1081582D8AB50F502AF9D58BE33D37849BC17717D1B3D0E0D126420D55CC1E857591
30,920,663 UART: [art] PUB.Y = F8304F5153FF2A52085A6E799529B6EB51C582E3F72E2EFEF30C047404F9B3F223A4D6DF315E2E95982A49A0F6CF80E3
30,927,915 UART: [art] SIG.R = 4E36446108DBCFEBEF1AA34C0CB4D5637F7BBD77EA67F1933E4108B65AF255D987A4B6F5F4A0CFDB83584C1EABB5C212
30,935,296 UART: [art] SIG.S = 5E50E159FBC13C0381206FBE9047693D201217EBEA2B1F1207084AFA438907405B8A68123FFE9C3999DBF2CA8B3C4E30
32,239,718 UART: mbox::rt_entry...
32,240,675 UART: ____ _ _ _ ____ _____
32,242,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,244,601 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,246,462 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,248,422 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,250,479 UART: |_|
32,251,292 UART:
32,365,171 UART: [rt] Runtime listening for mailbox commands...
32,371,033 >>> mbox cmd response data (3272 bytes)
32,386,792 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
32,420,175 >>> mbox cmd response data (0 bytes)
34,547,211 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
43,197,809 >>> mbox cmd response: success
43,231,953 UART:
43,232,268 UART: Running Caliptra FMC ...
43,233,324 UART:
43,233,489 UART: [state] CFI Enabled
43,277,207 UART: [art] Extend RT PCRs Done
43,278,404 UART: [art] Lock RT PCRs Done
43,279,645 UART: [art] Populate DV Done
43,285,132 UART: [fht] FMC Alias Private Key: 7
43,286,725 UART: [art] Derive CDI
43,287,537 UART: [art] Store in in slot 0x4
43,330,406 UART: [art] Derive Key Pair
43,331,445 UART: [art] Store priv key in slot 0x5
46,573,725 UART: [art] Derive Key Pair - Done
46,586,893 UART: [art] Signing Cert with AUTHO
46,588,205 UART: RITY.KEYID = 7
48,867,641 UART: [art] Erasing AUTHORITY.KEYID = 7
48,869,155 UART: [art] PUB.X = EBB6D996F8A6CEEF7C3DAE64C2C4B2F75329EEC5C35A39FA4C9C391DB6945097DB9DFF8A5BCDBC796D399486865FF5F4
48,876,475 UART: [art] PUB.Y = AF3B04C66F70A50B69B945F01D8CC41289BAA08E780BB1F610CA323BE6DC4A976E8ED4B544803754E11D48F5F6E3283B
48,883,711 UART: [art] SIG.R = A777925038E428FBD1B75B370CB34B0E42A081568B55E3B234C783766344F3F11FCAE85E7AF4B2F18DE1D62B29CFE333
48,891,051 UART: [art] SIG.S = 26859C891BEA43C806F1A50C6D9D163B4244E9FE5F924814E018DC56CF85495F171A45DF9A192834C1A8C3186FB15F57
50,196,177 UART: Caliptra RT
50,196,869 UART: [state] CFI Enabled
53,783,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,784,544 UART: [rt] RT listening for mailbox commands...
53,815,947 UART: [rt]cmd =0x494e464f, len=4
53,820,310 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,013 UART:
192,386 UART: Running Caliptra ROM ...
193,486 UART:
193,650 UART: [state] CFI Enabled
264,543 UART: [state] LifecycleState = Unprovisioned
266,459 UART: [state] DebugLocked = No
269,185 UART: [state] WD Timer not started. Device not locked for debugging
273,006 UART: [kat] SHA2-256
452,127 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,726 UART: [kat] ++
464,263 UART: [kat] sha1
474,858 UART: [kat] SHA2-256
477,861 UART: [kat] SHA2-384
483,350 UART: [kat] SHA2-512-ACC
486,284 UART: [kat] ECC-384
2,949,421 UART: [kat] HMAC-384Kdf
2,965,276 UART: [kat] LMS
3,494,743 UART: [kat] --
3,496,950 UART: [cold-reset] ++
3,499,472 UART: [fht] FHT @ 0x50003400
3,511,161 UART: [idev] ++
3,511,726 UART: [idev] CDI.KEYID = 6
3,512,634 UART: [idev] SUBJECT.KEYID = 7
3,513,879 UART: [idev] UDS.KEYID = 0
3,514,810 ready_for_fw is high
3,515,024 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,614,036 UART: [idev] Erasing UDS.KEYID = 0
6,017,032 UART: [idev] Sha1 KeyId Algorithm
6,039,775 UART: [idev] --
6,042,686 UART: [ldev] ++
6,043,258 UART: [ldev] CDI.KEYID = 6
6,044,172 UART: [ldev] SUBJECT.KEYID = 5
6,045,333 UART: [ldev] AUTHORITY.KEYID = 7
6,046,568 UART: [ldev] FE.KEYID = 1
6,072,287 UART: [ldev] Erasing FE.KEYID = 1
8,577,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,310,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,326,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,342,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,378,528 UART: [ldev] --
10,383,794 UART: [fwproc] Wait for Commands...
10,385,463 UART: [fwproc] Recv command 0x46574c44
10,387,563 UART: [fwproc] Recv'd Img size: 78532 bytes
13,355,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,433,574 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,502,358 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,695,005 >>> mbox cmd response: success
13,695,489 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,698,512 UART: [afmc] ++
13,699,124 UART: [afmc] CDI.KEYID = 6
13,700,060 UART: [afmc] SUBJECT.KEYID = 7
13,701,177 UART: [afmc] AUTHORITY.KEYID = 5
16,223,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,948,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,949,919 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
17,965,723 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
17,981,724 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
17,997,607 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,021,261 UART: [afmc] --
18,025,606 UART: [cold-reset] --
18,028,510 UART: [state] Locking Datavault
18,036,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,038,167 UART: [state] Locking ICCM
18,039,591 UART: [exit] Launching FMC @ 0x40000130
18,047,993 UART:
18,048,225 UART: Running Caliptra FMC ...
18,049,270 UART:
18,049,421 UART: [state] CFI Enabled
18,105,439 UART: [fht] FMC Alias Private Key: 7
19,869,870 UART: [art] Extend RT PCRs Done
19,871,082 UART: [art] Lock RT PCRs Done
19,872,635 UART: [art] Populate DV Done
19,877,775 UART: [fht] FMC Alias Private Key: 7
19,879,313 UART: [art] Derive CDI
19,880,048 UART: [art] Store in in slot 0x4
19,938,345 UART: [art] Derive Key Pair
19,939,396 UART: [art] Store priv key in slot 0x5
22,402,591 UART: [art] Derive Key Pair - Done
22,415,694 UART: [art] Signing Cert with AUTHO
22,417,287 UART: RITY.KEYID = 7
24,128,120 UART: [art] Erasing AUTHORITY.KEYID = 7
24,129,623 UART: [art] PUB.X = 2B95F11E5CE12D14CAE5B230CADEC7B9A360FF3771DF57F7125483B8C6F3D7054090BAE8DDD3C93DA1C8408A7D81FE68
24,136,903 UART: [art] PUB.Y = DAE24577DA95739860A51A882C9219A10183CBA2663253C2B81454CD0689D189356C9063B430B51CD52D7B5616D2E2CB
24,144,159 UART: [art] SIG.R = 04BE5565201C1E6EBBE4E614B62BC219051C4D0B8CAE52C76C5CB797B2FD19E05824882EBBA7B718AA9ABCBD66CA5214
24,151,566 UART: [art] SIG.S = DF964B58DEFD5730096863F5B296C24FCD7E7139329E8868FBD487AEE969E248923777342E0B6AC65EC3F17637998CD0
25,130,569 UART: mbox::rt_entry...
25,131,520 UART: ____ _ _ _ ____ _____
25,133,505 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,135,510 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,138,053 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,140,006 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,141,942 UART: |_|
25,142,777 UART:
25,254,579 UART: [rt] Runtime listening for mailbox commands...
25,260,437 >>> mbox cmd response data (3272 bytes)
25,276,183 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,309,604 >>> mbox cmd response data (0 bytes)
27,371,800 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,516,384 UART:
27,516,781 UART: Running Caliptra ROM ...
27,517,924 UART:
27,518,099 UART: [state] CFI Enabled
27,582,348 UART: [state] LifecycleState = Unprovisioned
27,584,232 UART: [state] DebugLocked = No
27,586,541 UART: [state] WD Timer not started. Device not locked for debugging
27,590,718 UART: [kat] SHA2-256
27,769,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,781,422 UART: [kat] ++
27,781,999 UART: [kat] sha1
27,792,904 UART: [kat] SHA2-256
27,795,926 UART: [kat] SHA2-384
27,802,130 UART: [kat] SHA2-512-ACC
27,805,072 UART: [kat] ECC-384
30,265,289 UART: [kat] HMAC-384Kdf
30,288,167 UART: [kat] LMS
30,817,597 UART: [kat] --
30,823,152 UART: [update-reset] ++
34,245,332 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,249,413 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,631,751 >>> mbox cmd response: success
34,636,278 UART: [update-reset] Copying MAN_2 To MAN_1
34,655,238 UART: [update-reset Success] --
34,658,285 UART: [state] Locking Datavault
34,661,246 UART: [state] Locking PCR0, PCR1 and PCR31
34,662,900 UART: [state] Locking ICCM
34,664,353 UART: [exit] Launching FMC @ 0x40000130
34,672,757 UART:
34,673,003 UART: Running Caliptra FMC ...
34,674,449 UART:
34,674,616 UART: [state] CFI Enabled
34,780,112 UART: [art] Extend RT PCRs Done
34,781,296 UART: [art] Lock RT PCRs Done
34,782,642 UART: [art] Populate DV Done
34,788,212 UART: [fht] FMC Alias Private Key: 7
34,789,800 UART: [art] Derive CDI
34,790,612 UART: [art] Store in in slot 0x4
34,848,997 UART: [art] Derive Key Pair
34,850,059 UART: [art] Store priv key in slot 0x5
37,312,996 UART: [art] Derive Key Pair - Done
37,326,117 UART: [art] Signing Cert with AUTHO
37,327,420 UART: RITY.KEYID = 7
39,039,016 UART: [art] Erasing AUTHORITY.KEYID = 7
39,040,533 UART: [art] PUB.X = 0B17D64546D30DABF47EFD79D1F734005818FEC0EE933EDDBFD5F6D9EAFE79B2F266E4F4CFA87CC5E8C5C8AB64446E37
39,047,794 UART: [art] PUB.Y = 6F5C6C3EE4076FC77F47A2EDFE858C602AAE4C0A2CBFD2945F254743AA26E630620E393593181B8A287E2DA7C84FC98A
39,055,040 UART: [art] SIG.R = 94C68239A9E2449CD9FBFB52BCB990A9561D65351DA01FDDCB59F9A981B697F6E3E9921A1D1AACE2109ADBAEFDED750C
39,062,503 UART: [art] SIG.S = FD0FB2BA6A6DE00ED8878F0727B9933FA790CFE9A7FD7F062F5588113D43C6625A79F665C33275EB0CE985BB7BCEB8CE
40,041,226 UART: Caliptra RT
40,041,947 UART: [state] CFI Enabled
42,923,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,924,692 UART: [rt] RT listening for mailbox commands...
42,956,122 UART: [rt]cmd =0x494e464f, len=4
42,960,294 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,381,472 ready_for_fw is high
3,381,871 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,499,298 >>> mbox cmd response: success
13,499,852 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,792,173 UART:
17,792,560 UART: Running Caliptra FMC ...
17,793,689 UART:
17,793,849 UART: [state] CFI Enabled
17,856,603 UART: [fht] FMC Alias Private Key: 7
19,620,257 UART: [art] Extend RT PCRs Done
19,621,481 UART: [art] Lock RT PCRs Done
19,622,876 UART: [art] Populate DV Done
19,628,240 UART: [fht] FMC Alias Private Key: 7
19,629,838 UART: [art] Derive CDI
19,630,576 UART: [art] Store in in slot 0x4
19,689,826 UART: [art] Derive Key Pair
19,690,871 UART: [art] Store priv key in slot 0x5
22,153,770 UART: [art] Derive Key Pair - Done
22,166,498 UART: [art] Signing Cert with AUTHO
22,167,805 UART: RITY.KEYID = 7
23,879,238 UART: [art] Erasing AUTHORITY.KEYID = 7
23,880,753 UART: [art] PUB.X = 5B5F1FF83B15DBF5567D02658C7626B121D1BEFA7EA1554C5DF5DD222F41FABBEDA9E2C1D2FDE26372AFA753AA8DB2E6
23,887,999 UART: [art] PUB.Y = CEFB80B8922EA02CF5F67B0DEB1943014DE8C8BFD7DF822A6982DA6188BA4BD294621E2171AB61E42D9F9E250ECF51F3
23,895,292 UART: [art] SIG.R = 2365F7078459C42F189C12922311D421A0F65FE46D6679EEF7F7812344D69754B1302203D37909BC039E698670A10CE9
23,902,679 UART: [art] SIG.S = FF741832A3F4733299930570DF6487316B25AFD70784BCB018348B5889C3B79C1DC347DCF11F2FF536AF1BB718124024
24,881,443 UART: mbox::rt_entry...
24,882,386 UART: ____ _ _ _ ____ _____
24,884,313 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,886,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,888,261 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,890,221 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,892,174 UART: |_|
24,893,011 UART:
25,006,243 UART: [rt] Runtime listening for mailbox commands...
25,012,108 >>> mbox cmd response data (3272 bytes)
25,027,951 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,061,408 >>> mbox cmd response data (0 bytes)
27,122,486 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,251,032 >>> mbox cmd response: success
34,285,787 UART:
34,286,101 UART: Running Caliptra FMC ...
34,287,150 UART:
34,287,302 UART: [state] CFI Enabled
34,380,281 UART: [art] Extend RT PCRs Done
34,381,487 UART: [art] Lock RT PCRs Done
34,382,922 UART: [art] Populate DV Done
34,388,017 UART: [fht] FMC Alias Private Key: 7
34,389,663 UART: [art] Derive CDI
34,390,403 UART: [art] Store in in slot 0x4
34,449,125 UART: [art] Derive Key Pair
34,450,125 UART: [art] Store priv key in slot 0x5
36,912,987 UART: [art] Derive Key Pair - Done
36,925,718 UART: [art] Signing Cert with AUTHO
36,927,027 UART: RITY.KEYID = 7
38,639,086 UART: [art] Erasing AUTHORITY.KEYID = 7
38,640,601 UART: [art] PUB.X = 64F89B124B6ECE07A03D6651D135A21DC8070196863B4684DB2A0E7E044EF5C6FE81C0E1983D0513C419B954C3EC14F9
38,647,896 UART: [art] PUB.Y = 2A90D9188633F4A48724B547A3DAACFDEF78675A62BEFF0FE456FD0D138EEF98F2EBA49F4693203ED3CE8BB24268A7C9
38,655,171 UART: [art] SIG.R = E3E8709596DDBDEB34A5022E3F3CE3C48D3466E3464558B9CFEFD0CD6F7EAD58FAC3F50DAEF08B3E88C9D818030650E7
38,662,554 UART: [art] SIG.S = 30392B2D7377EA418CB61953E72E23915A7F414F4C2E4A193A8081F0AB63A3FAD34EDF0AC7A76D0B8836403251DC32F3
39,641,556 UART: Caliptra RT
39,642,249 UART: [state] CFI Enabled
42,522,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,523,695 UART: [rt] RT listening for mailbox commands...
42,554,832 UART: [rt]cmd =0x494e464f, len=4
42,558,932 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,905 writing to cptra_bootfsm_go
193,025 UART:
193,394 UART: Running Caliptra ROM ...
194,484 UART:
604,054 UART: [state] CFI Enabled
616,515 UART: [state] LifecycleState = Unprovisioned
618,327 UART: [state] DebugLocked = No
620,021 UART: [state] WD Timer not started. Device not locked for debugging
623,825 UART: [kat] SHA2-256
802,937 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,455 UART: [kat] ++
814,984 UART: [kat] sha1
826,288 UART: [kat] SHA2-256
829,296 UART: [kat] SHA2-384
836,139 UART: [kat] SHA2-512-ACC
839,073 UART: [kat] ECC-384
3,284,022 UART: [kat] HMAC-384Kdf
3,297,532 UART: [kat] LMS
3,826,984 UART: [kat] --
3,830,931 UART: [cold-reset] ++
3,832,012 UART: [fht] FHT @ 0x50003400
3,842,842 UART: [idev] ++
3,843,401 UART: [idev] CDI.KEYID = 6
3,844,287 UART: [idev] SUBJECT.KEYID = 7
3,845,501 UART: [idev] UDS.KEYID = 0
3,846,402 ready_for_fw is high
3,846,618 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,945,377 UART: [idev] Erasing UDS.KEYID = 0
6,321,529 UART: [idev] Sha1 KeyId Algorithm
6,344,269 UART: [idev] --
6,349,018 UART: [ldev] ++
6,349,586 UART: [ldev] CDI.KEYID = 6
6,350,473 UART: [ldev] SUBJECT.KEYID = 5
6,351,685 UART: [ldev] AUTHORITY.KEYID = 7
6,352,867 UART: [ldev] FE.KEYID = 1
6,365,240 UART: [ldev] Erasing FE.KEYID = 1
8,837,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,675 UART: [ldev] --
10,628,493 UART: [fwproc] Wait for Commands...
10,630,161 UART: [fwproc] Recv command 0x46574c44
10,632,255 UART: [fwproc] Recv'd Img size: 78532 bytes
13,595,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,672,578 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,741,371 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,934,884 >>> mbox cmd response: success
13,935,369 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,939,396 UART: [afmc] ++
13,939,986 UART: [afmc] CDI.KEYID = 6
13,940,873 UART: [afmc] SUBJECT.KEYID = 7
13,941,978 UART: [afmc] AUTHORITY.KEYID = 5
16,435,836 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,154,860 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,156,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,172,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,188,587 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,204,420 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,226,935 UART: [afmc] --
18,231,354 UART: [cold-reset] --
18,234,843 UART: [state] Locking Datavault
18,238,902 UART: [state] Locking PCR0, PCR1 and PCR31
18,240,600 UART: [state] Locking ICCM
18,242,372 UART: [exit] Launching FMC @ 0x40000130
18,250,822 UART:
18,251,059 UART: Running Caliptra FMC ...
18,252,165 UART:
18,252,324 UART: [state] CFI Enabled
18,260,218 UART: [fht] FMC Alias Private Key: 7
20,016,758 UART: [art] Extend RT PCRs Done
20,017,984 UART: [art] Lock RT PCRs Done
20,019,993 UART: [art] Populate DV Done
20,025,410 UART: [fht] FMC Alias Private Key: 7
20,026,951 UART: [art] Derive CDI
20,027,769 UART: [art] Store in in slot 0x4
20,069,970 UART: [art] Derive Key Pair
20,071,208 UART: [art] Store priv key in slot 0x5
22,497,769 UART: [art] Derive Key Pair - Done
22,510,673 UART: [art] Signing Cert with AUTHO
22,511,982 UART: RITY.KEYID = 7
24,217,208 UART: [art] Erasing AUTHORITY.KEYID = 7
24,218,689 UART: [art] PUB.X = 8B9FA03B0D7504079C9E2450BAF43E86B3CC8FD1777099AC02C177435EA89F41A84F81E51E0D5233746613D37424348F
24,225,985 UART: [art] PUB.Y = D46E035BDE71ED1518F4E6919323AA1FDEBA46708EF6348A0017E08194A863F84FAD6B42B2CD17CA893BFC76D83FFBD2
24,233,238 UART: [art] SIG.R = 064C8CB66242A47256DDDF6CFAB83A9BE7955E88AF610085F224EE675E85BEDC73A53877FC9E9764A36978E8F0C9AD6A
24,240,643 UART: [art] SIG.S = 1185CA2F2556249C92102960E64E0F42D7CBCA6F75C54652D9834A09CBA65BD9DF432EF10F701B58D0990F87947224EC
25,219,419 UART: mbox::rt_entry...
25,220,414 UART: ____ _ _ _ ____ _____
25,222,411 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,224,420 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,226,352 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,228,284 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,230,217 UART: |_|
25,231,023 UART:
25,344,921 UART: [rt] Runtime listening for mailbox commands...
25,350,726 >>> mbox cmd response data (3272 bytes)
25,366,478 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,399,927 >>> mbox cmd response data (0 bytes)
27,457,997 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,602,479 UART:
27,602,860 UART: Running Caliptra ROM ...
27,603,917 UART:
27,604,071 UART: [state] CFI Enabled
27,617,378 UART: [state] LifecycleState = Unprovisioned
27,619,270 UART: [state] DebugLocked = No
27,620,467 UART: [state] WD Timer not started. Device not locked for debugging
27,623,449 UART: [kat] SHA2-256
27,802,632 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,814,215 UART: [kat] ++
27,814,670 UART: [kat] sha1
27,825,879 UART: [kat] SHA2-256
27,828,880 UART: [kat] SHA2-384
27,833,742 UART: [kat] SHA2-512-ACC
27,836,704 UART: [kat] ECC-384
30,276,579 UART: [kat] HMAC-384Kdf
30,289,725 UART: [kat] LMS
30,819,243 UART: [kat] --
30,822,773 UART: [update-reset] ++
34,253,365 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,256,248 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
34,638,593 >>> mbox cmd response: success
34,643,046 UART: [update-reset] Copying MAN_2 To MAN_1
34,662,281 UART: [update-reset Success] --
34,667,614 UART: [state] Locking Datavault
34,671,083 UART: [state] Locking PCR0, PCR1 and PCR31
34,672,751 UART: [state] Locking ICCM
34,674,047 UART: [exit] Launching FMC @ 0x40000130
34,682,502 UART:
34,682,736 UART: Running Caliptra FMC ...
34,684,118 UART:
34,684,284 UART: [state] CFI Enabled
34,728,374 UART: [art] Extend RT PCRs Done
34,729,569 UART: [art] Lock RT PCRs Done
34,731,023 UART: [art] Populate DV Done
34,736,540 UART: [fht] FMC Alias Private Key: 7
34,738,189 UART: [art] Derive CDI
34,739,006 UART: [art] Store in in slot 0x4
34,781,387 UART: [art] Derive Key Pair
34,782,463 UART: [art] Store priv key in slot 0x5
37,209,601 UART: [art] Derive Key Pair - Done
37,222,605 UART: [art] Signing Cert with AUTHO
37,224,052 UART: RITY.KEYID = 7
38,929,111 UART: [art] Erasing AUTHORITY.KEYID = 7
38,930,617 UART: [art] PUB.X = 7D8D1B62C5635AF33008F5CE8EBBDAF96BAD812D900A4D13C4495796CD581918A849F68C8DB3A86503440C60CA2F9C45
38,937,861 UART: [art] PUB.Y = DC423A1BD2284AAE49B4CD5BB8A1642013B9B7975591107EDF38A953B24328A046971910CD789EE3F9B0B59ED5466B48
38,945,157 UART: [art] SIG.R = A1D2237E8066787A3E1269069B673E8F326BD15D5ADDAEF1367C2E1A97999FD8E4EA13AA482BF2042747B74709AFE7E5
38,952,525 UART: [art] SIG.S = 79DF58BD80B0D498514AA2BD17E212D40DD57C5E478DCE40A608A4903F6375224486FADCB9D11A91845A898D79B9232A
39,930,741 UART: Caliptra RT
39,931,449 UART: [state] CFI Enabled
42,709,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,711,495 UART: [rt] RT listening for mailbox commands...
42,742,619 UART: [rt]cmd =0x494e464f, len=4
42,746,896 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,178 writing to cptra_bootfsm_go
3,699,462 ready_for_fw is high
3,699,858 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,699,333 >>> mbox cmd response: success
13,700,144 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,951,002 UART:
17,951,408 UART: Running Caliptra FMC ...
17,952,550 UART:
17,952,711 UART: [state] CFI Enabled
17,960,488 UART: [fht] FMC Alias Private Key: 7
19,717,405 UART: [art] Extend RT PCRs Done
19,718,627 UART: [art] Lock RT PCRs Done
19,720,202 UART: [art] Populate DV Done
19,725,676 UART: [fht] FMC Alias Private Key: 7
19,727,225 UART: [art] Derive CDI
19,728,042 UART: [art] Store in in slot 0x4
19,770,809 UART: [art] Derive Key Pair
19,771,848 UART: [art] Store priv key in slot 0x5
22,198,461 UART: [art] Derive Key Pair - Done
22,211,087 UART: [art] Signing Cert with AUTHO
22,212,390 UART: RITY.KEYID = 7
23,917,664 UART: [art] Erasing AUTHORITY.KEYID = 7
23,919,173 UART: [art] PUB.X = 24358F352AE93166841D89FBF5919481F820DD5A4C357D5925078CB18A6B723D5ECAC8CF9425AD9BA0E62B2CEBBEDEB1
23,926,474 UART: [art] PUB.Y = B8C8BD17A1AA7352C699C7F4E3EF71E679116EC69FDCB81369E83C93AC2957D9E45AFBD2F928218B08478290ACBF2F93
23,933,709 UART: [art] SIG.R = 0731BFA62C8578406AC4836E154B682C7FF23E0A789525C70136F645488A9F5E1A7C6C34D3AB3F38C642E146574EC43D
23,941,109 UART: [art] SIG.S = C4E2FB7988C730C7EA080FB87557D9AD0508B921E74D262C0EA5FBB860F7F7F64C05FAF936FD11A99B43CD8BE940D111
24,919,798 UART: mbox::rt_entry...
24,920,770 UART: ____ _ _ _ ____ _____
24,922,703 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
24,924,720 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
24,926,656 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
24,928,613 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
24,930,543 UART: |_|
24,931,380 UART:
25,044,827 UART: [rt] Runtime listening for mailbox commands...
25,050,683 >>> mbox cmd response data (3272 bytes)
25,066,403 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,099,806 >>> mbox cmd response data (0 bytes)
27,160,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
34,206,041 >>> mbox cmd response: success
34,239,091 UART:
34,239,433 UART: Running Caliptra FMC ...
34,240,483 UART:
34,240,638 UART: [state] CFI Enabled
34,284,822 UART: [art] Extend RT PCRs Done
34,285,972 UART: [art] Lock RT PCRs Done
34,287,201 UART: [art] Populate DV Done
34,292,832 UART: [fht] FMC Alias Private Key: 7
34,294,534 UART: [art] Derive CDI
34,295,273 UART: [art] Store in in slot 0x4
34,337,763 UART: [art] Derive Key Pair
34,338,810 UART: [art] Store priv key in slot 0x5
36,765,668 UART: [art] Derive Key Pair - Done
36,778,947 UART: [art] Signing Cert with AUTHO
36,780,301 UART: RITY.KEYID = 7
38,485,146 UART: [art] Erasing AUTHORITY.KEYID = 7
38,486,642 UART: [art] PUB.X = 79CEC70FDC3CF9B7E50A84C088A157C58388E75C93DEBB76B7075725C72E802A7AE81F42CFEF564BC6A2A80BCE289550
38,493,941 UART: [art] PUB.Y = 4A6F36E61219985FE39967FC66A5FD7C8B9A529AEFF85701379B27CDC00335135CE4DB5C9FACEDA8EC0884A5CA1F64CB
38,501,169 UART: [art] SIG.R = DC34EE43DE9EF63F8DCAD044A98B4D40CDB49CB016B72FB24E8A38B12ACE6F171ED551FBC2305C037E286E417D85632B
38,508,617 UART: [art] SIG.S = 4BD7C7D567ACDDA3669CCDA815547FB0D87EB1CE8EF770AACC25BF39F22AD7491F10E53E1643A4097C43BB27D3760AA0
39,487,701 UART: Caliptra RT
39,488,413 UART: [state] CFI Enabled
42,261,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,263,092 UART: [rt] RT listening for mailbox commands...
42,294,432 UART: [rt]cmd =0x494e464f, len=4
42,298,898 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,207 UART:
192,570 UART: Running Caliptra ROM ...
193,771 UART:
193,924 UART: [state] CFI Enabled
259,189 UART: [state] LifecycleState = Unprovisioned
261,524 UART: [state] DebugLocked = No
263,910 UART: [state] WD Timer not started. Device not locked for debugging
267,984 UART: [kat] SHA2-256
457,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,579 UART: [kat] ++
469,031 UART: [kat] sha1
480,249 UART: [kat] SHA2-256
483,263 UART: [kat] SHA2-384
489,682 UART: [kat] SHA2-512-ACC
492,264 UART: [kat] ECC-384
2,947,310 UART: [kat] HMAC-384Kdf
2,971,202 UART: [kat] LMS
3,503,010 UART: [kat] --
3,507,786 UART: [cold-reset] ++
3,509,429 UART: [fht] FHT @ 0x50003400
3,520,835 UART: [idev] ++
3,521,547 UART: [idev] CDI.KEYID = 6
3,522,479 UART: [idev] SUBJECT.KEYID = 7
3,523,674 UART: [idev] UDS.KEYID = 0
3,524,604 ready_for_fw is high
3,524,793 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,624,038 UART: [idev] Erasing UDS.KEYID = 0
6,026,288 UART: [idev] Sha1 KeyId Algorithm
6,049,145 UART: [idev] --
6,053,253 UART: [ldev] ++
6,053,941 UART: [ldev] CDI.KEYID = 6
6,054,856 UART: [ldev] SUBJECT.KEYID = 5
6,056,021 UART: [ldev] AUTHORITY.KEYID = 7
6,057,261 UART: [ldev] FE.KEYID = 1
6,099,305 UART: [ldev] Erasing FE.KEYID = 1
8,606,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,039 UART: [ldev] --
10,410,768 UART: [fwproc] Wait for Commands...
10,413,077 UART: [fwproc] Recv command 0x46574c44
10,415,393 UART: [fwproc] Recv'd Img size: 78532 bytes
13,416,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,496,907 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,613,036 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,939,998 >>> mbox cmd response: success
13,940,468 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,944,246 UART: [afmc] ++
13,944,946 UART: [afmc] CDI.KEYID = 6
13,946,194 UART: [afmc] SUBJECT.KEYID = 7
13,947,638 UART: [afmc] AUTHORITY.KEYID = 5
16,485,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,209,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,211,804 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,227,006 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,242,130 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,257,112 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,279,310 UART: [afmc] --
18,282,693 UART: [cold-reset] --
18,288,180 UART: [state] Locking Datavault
18,295,325 UART: [state] Locking PCR0, PCR1 and PCR31
18,297,521 UART: [state] Locking ICCM
18,299,346 UART: [exit] Launching FMC @ 0x40000130
18,308,047 UART:
18,308,293 UART: Running Caliptra FMC ...
18,309,334 UART:
18,309,480 UART: [state] CFI Enabled
18,365,976 UART: [fht] FMC Alias Private Key: 7
20,129,843 UART: [art] Extend RT PCRs Done
20,131,067 UART: [art] Lock RT PCRs Done
20,132,674 UART: [art] Populate DV Done
20,137,873 UART: [fht] FMC Alias Private Key: 7
20,139,497 UART: [art] Derive CDI
20,140,239 UART: [art] Store in in slot 0x4
20,198,650 UART: [art] Derive Key Pair
20,199,650 UART: [art] Store priv key in slot 0x5
22,663,097 UART: [art] Derive Key Pair - Done
22,676,043 UART: [art] Signing Cert with AUTHO
22,677,348 UART: RITY.KEYID = 7
24,388,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,389,682 UART: [art] PUB.X = 2A3B0E39BF0103F945D6A89C7F5F4A0036B222C2FE21CE0631E96232A0C5329985A11F998A414072DF154D3E3E973725
24,396,892 UART: [art] PUB.Y = 9340B990EB49E3932A3DEC5922EAE4CA6211C28A00F6873ACA925A8976F33657C8A0C358D32A104B45527CC39CD16818
24,404,155 UART: [art] SIG.R = DD9CABF11DFD59A536AC13E29FFB6FA832F36369076D40ECEB51D18EFCFEA82B84805B3CBEF469E994D7018FC679DA60
24,411,565 UART: [art] SIG.S = 1B0730F8B6F970E81D4EE1B5209AE75A999905E4A66569673335434E9D6F1B43B24647B907CAF665520C8648DBDFA36B
25,390,559 UART: mbox::rt_entry...
25,391,528 UART: ____ _ _ _ ____ _____
25,393,509 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,395,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,397,441 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,399,369 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,401,223 UART: |_|
25,402,026 UART:
25,515,282 UART: [rt] Runtime listening for mailbox commands...
25,521,082 >>> mbox cmd response data (3272 bytes)
25,536,811 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,570,251 >>> mbox cmd response data (0 bytes)
27,632,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,777,226 UART:
27,777,598 UART: Running Caliptra ROM ...
27,778,654 UART:
27,778,806 UART: [state] CFI Enabled
27,841,052 UART: [state] LifecycleState = Unprovisioned
27,843,160 UART: [state] DebugLocked = No
27,845,170 UART: [state] WD Timer not started. Device not locked for debugging
27,850,453 UART: [kat] SHA2-256
28,040,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,051,075 UART: [kat] ++
28,051,569 UART: [kat] sha1
28,061,539 UART: [kat] SHA2-256
28,064,558 UART: [kat] SHA2-384
28,070,347 UART: [kat] SHA2-512-ACC
28,072,945 UART: [kat] ECC-384
30,524,662 UART: [kat] HMAC-384Kdf
30,549,323 UART: [kat] LMS
31,080,921 UART: [kat] --
31,083,038 UART: [update-reset] ++
34,538,125 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,540,781 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,147,349 >>> mbox cmd response: success
35,152,038 UART: [update-reset] Copying MAN_2 To MAN_1
35,185,685 UART: [update-reset Success] --
35,191,107 UART: [state] Locking Datavault
35,194,505 UART: [state] Locking PCR0, PCR1 and PCR31
35,196,691 UART: [state] Locking ICCM
35,198,640 UART: [exit] Launching FMC @ 0x40000130
35,207,282 UART:
35,207,526 UART: Running Caliptra FMC ...
35,208,625 UART:
35,208,779 UART: [state] CFI Enabled
35,296,278 UART: [art] Extend RT PCRs Done
35,297,472 UART: [art] Lock RT PCRs Done
35,299,027 UART: [art] Populate DV Done
35,304,600 UART: [fht] FMC Alias Private Key: 7
35,306,139 UART: [art] Derive CDI
35,306,907 UART: [art] Store in in slot 0x4
35,365,493 UART: [art] Derive Key Pair
35,366,536 UART: [art] Store priv key in slot 0x5
37,829,514 UART: [art] Derive Key Pair - Done
37,842,516 UART: [art] Signing Cert with AUTHO
37,843,834 UART: RITY.KEYID = 7
39,554,895 UART: [art] Erasing AUTHORITY.KEYID = 7
39,556,401 UART: [art] PUB.X = D086135480B399050350EEEAC602BD6FAC5C70376D134DF9ABC3BBEE3783F1505597DA73A77AD849B22DA0E6950D3797
39,563,673 UART: [art] PUB.Y = B880A25CB53B29953646EA1D8740AFE4372B872E901B8F96D527A8E0E7734A56B3023D0E82C1FBCBC6E034E37E86C352
39,570,928 UART: [art] SIG.R = 99120EE621451BEA76000ADC78070E2C69D6B60F24924630DD941637221FB759CF8B233756861B9D258A3DB712447008
39,578,250 UART: [art] SIG.S = 654CBBA91CD0776B7631EE6DF0BE847C466EAF6A086C6D491B5C917B12AA7D4BD6FB06C1A68832EB826E75040008F726
40,557,649 UART: Caliptra RT
40,558,350 UART: [state] CFI Enabled
43,438,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,439,783 UART: [rt] RT listening for mailbox commands...
43,471,285 UART: [rt]cmd =0x494e464f, len=4
43,475,718 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,440,620 ready_for_fw is high
3,441,004 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
13,984,235 >>> mbox cmd response: success
13,985,007 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,279,613 UART:
18,279,992 UART: Running Caliptra FMC ...
18,281,093 UART:
18,281,249 UART: [state] CFI Enabled
18,345,345 UART: [fht] FMC Alias Private Key: 7
20,109,039 UART: [art] Extend RT PCRs Done
20,110,265 UART: [art] Lock RT PCRs Done
20,112,133 UART: [art] Populate DV Done
20,117,716 UART: [fht] FMC Alias Private Key: 7
20,119,263 UART: [art] Derive CDI
20,120,083 UART: [art] Store in in slot 0x4
20,178,885 UART: [art] Derive Key Pair
20,179,885 UART: [art] Store priv key in slot 0x5
22,642,876 UART: [art] Derive Key Pair - Done
22,656,088 UART: [art] Signing Cert with AUTHO
22,657,396 UART: RITY.KEYID = 7
24,368,562 UART: [art] Erasing AUTHORITY.KEYID = 7
24,370,068 UART: [art] PUB.X = EA8784037E8B58970680491124D55F4F944F9FB427ED7EEB66BBCA35C701B96B3B87AF8FF447EA1633E58FA57698447F
24,377,321 UART: [art] PUB.Y = 3E74A9B3086C27F78C09758F2BD0C85E5A6D7E63DE6207C2687A2B49E86FF4BE52C2A55A5ABBBA9D584B56B1478EEF01
24,384,596 UART: [art] SIG.R = A15B517A967AEF610EAB471B72385771E0ED245F3F63A1956C1F7646EEFC78D59DD17D7D2EF49FB1987F6A6E30EA2D58
24,392,002 UART: [art] SIG.S = A0CDB82374CA9B08FDD3473576A1C24CD774112628B7841F98A420C3B5475F781C08E793B2E013D3FC64CF1275732DD9
25,370,332 UART: mbox::rt_entry...
25,371,310 UART: ____ _ _ _ ____ _____
25,373,250 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,375,254 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,377,187 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,379,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,381,081 UART: |_|
25,382,085 UART:
25,494,901 UART: [rt] Runtime listening for mailbox commands...
25,500,701 >>> mbox cmd response data (3272 bytes)
25,516,448 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,549,859 >>> mbox cmd response data (0 bytes)
27,609,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,422,986 >>> mbox cmd response: success
35,457,944 UART:
35,458,268 UART: Running Caliptra FMC ...
35,459,394 UART:
35,459,568 UART: [state] CFI Enabled
35,554,689 UART: [art] Extend RT PCRs Done
35,555,889 UART: [art] Lock RT PCRs Done
35,557,296 UART: [art] Populate DV Done
35,562,757 UART: [fht] FMC Alias Private Key: 7
35,564,450 UART: [art] Derive CDI
35,565,261 UART: [art] Store in in slot 0x4
35,624,278 UART: [art] Derive Key Pair
35,625,316 UART: [art] Store priv key in slot 0x5
38,088,519 UART: [art] Derive Key Pair - Done
38,101,540 UART: [art] Signing Cert with AUTHO
38,102,849 UART: RITY.KEYID = 7
39,814,412 UART: [art] Erasing AUTHORITY.KEYID = 7
39,815,918 UART: [art] PUB.X = 2CDE5A4B9BEE0345438CF9CB9D30B12E254CCA117CF51A953AC2F4CAE4E41B8DB4A47B7B63E6EC4A800A43BA12BE45BE
39,823,258 UART: [art] PUB.Y = A631D1B46C0E733B7EFE9DD32FC4CD57E9EB5E43C40AAED5A9173AAD9B9B1ECAD09571C66C824A025474D5ABFC3D5365
39,830,530 UART: [art] SIG.R = 32BC267A4D24C3AE7B65CD8BF7E0A7119F28D5C8BC07E631C4CBC07E5B68429A7999C12F33B0728BD0015849FE21FB34
39,837,962 UART: [art] SIG.S = 8F71FBF74AA89E52855E75BDF8223A4DE0F0123EA249BBEACB04637D5C85E13B1FFA38F1469B5674805350939EF6284E
40,817,057 UART: Caliptra RT
40,817,775 UART: [state] CFI Enabled
43,698,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,700,316 UART: [rt] RT listening for mailbox commands...
43,731,607 UART: [rt]cmd =0x494e464f, len=4
43,736,139 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
193,130 UART:
193,501 UART: Running Caliptra ROM ...
194,592 UART:
604,365 UART: [state] CFI Enabled
617,617 UART: [state] LifecycleState = Unprovisioned
619,987 UART: [state] DebugLocked = No
621,943 UART: [state] WD Timer not started. Device not locked for debugging
627,039 UART: [kat] SHA2-256
816,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,677 UART: [kat] ++
828,280 UART: [kat] sha1
838,619 UART: [kat] SHA2-256
841,663 UART: [kat] SHA2-384
847,303 UART: [kat] SHA2-512-ACC
849,884 UART: [kat] ECC-384
3,292,968 UART: [kat] HMAC-384Kdf
3,305,205 UART: [kat] LMS
3,837,015 UART: [kat] --
3,841,829 UART: [cold-reset] ++
3,844,261 UART: [fht] FHT @ 0x50003400
3,856,446 UART: [idev] ++
3,857,151 UART: [idev] CDI.KEYID = 6
3,858,033 UART: [idev] SUBJECT.KEYID = 7
3,859,242 UART: [idev] UDS.KEYID = 0
3,860,215 ready_for_fw is high
3,860,416 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,959,317 UART: [idev] Erasing UDS.KEYID = 0
6,335,051 UART: [idev] Sha1 KeyId Algorithm
6,358,582 UART: [idev] --
6,363,408 UART: [ldev] ++
6,364,094 UART: [ldev] CDI.KEYID = 6
6,365,004 UART: [ldev] SUBJECT.KEYID = 5
6,366,228 UART: [ldev] AUTHORITY.KEYID = 7
6,367,356 UART: [ldev] FE.KEYID = 1
6,377,996 UART: [ldev] Erasing FE.KEYID = 1
8,855,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,906 UART: [ldev] --
10,646,928 UART: [fwproc] Wait for Commands...
10,649,071 UART: [fwproc] Recv command 0x46574c44
10,651,330 UART: [fwproc] Recv'd Img size: 78532 bytes
13,656,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,732,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,848,965 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
14,176,891 >>> mbox cmd response: success
14,177,399 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,180,933 UART: [afmc] ++
14,181,626 UART: [afmc] CDI.KEYID = 6
14,182,871 UART: [afmc] SUBJECT.KEYID = 7
14,184,311 UART: [afmc] AUTHORITY.KEYID = 5
16,687,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,409,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,411,787 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,427,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,442,153 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,457,163 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,480,413 UART: [afmc] --
18,483,634 UART: [cold-reset] --
18,487,392 UART: [state] Locking Datavault
18,493,670 UART: [state] Locking PCR0, PCR1 and PCR31
18,495,880 UART: [state] Locking ICCM
18,497,262 UART: [exit] Launching FMC @ 0x40000130
18,505,943 UART:
18,506,180 UART: Running Caliptra FMC ...
18,507,205 UART:
18,507,352 UART: [state] CFI Enabled
18,515,292 UART: [fht] FMC Alias Private Key: 7
20,271,236 UART: [art] Extend RT PCRs Done
20,272,579 UART: [art] Lock RT PCRs Done
20,274,394 UART: [art] Populate DV Done
20,279,859 UART: [fht] FMC Alias Private Key: 7
20,281,456 UART: [art] Derive CDI
20,282,203 UART: [art] Store in in slot 0x4
20,324,801 UART: [art] Derive Key Pair
20,325,801 UART: [art] Store priv key in slot 0x5
22,752,525 UART: [art] Derive Key Pair - Done
22,765,101 UART: [art] Signing Cert with AUTHO
22,766,414 UART: RITY.KEYID = 7
24,471,521 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,028 UART: [art] PUB.X = 4E2F1B64B9F6E801390703007A3908D69E5EAF90B7E2F055E52CD2DEA4DB2DE5E0AA441D97C8A847767D1C179A74CF3B
24,480,280 UART: [art] PUB.Y = BE539743B3FFE3A35BC3872957FFAE290975555B4837E9A09546F29926D00A9C4E15141B22A478FCD6EC76BCF3ABE03E
24,487,509 UART: [art] SIG.R = F4D3C6DBCD5DDEC5BB09E991179557C1E81D327D29A34FA6CEDE83400DFBCA12B7430FEF90026F704E014D417B0405F0
24,494,897 UART: [art] SIG.S = B1C1D09880FA45035D78DC7EFA14D3B0D4D2D3DBB7520EE2E1D1627E6D31D68A363C03A0B735347BEF931C2D90B21421
25,473,133 UART: mbox::rt_entry...
25,474,092 UART: ____ _ _ _ ____ _____
25,476,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,478,083 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,480,015 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,481,953 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,483,882 UART: |_|
25,484,714 UART:
25,598,271 UART: [rt] Runtime listening for mailbox commands...
25,604,081 >>> mbox cmd response data (3272 bytes)
25,619,885 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,653,313 >>> mbox cmd response data (0 bytes)
27,714,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,858,988 UART:
27,859,367 UART: Running Caliptra ROM ...
27,860,418 UART:
27,860,630 UART: [state] CFI Enabled
27,875,305 UART: [state] LifecycleState = Unprovisioned
27,877,239 UART: [state] DebugLocked = No
27,880,023 UART: [state] WD Timer not started. Device not locked for debugging
27,885,352 UART: [kat] SHA2-256
28,075,235 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,085,972 UART: [kat] ++
28,086,485 UART: [kat] sha1
28,097,645 UART: [kat] SHA2-256
28,100,665 UART: [kat] SHA2-384
28,105,842 UART: [kat] SHA2-512-ACC
28,108,415 UART: [kat] ECC-384
30,552,427 UART: [kat] HMAC-384Kdf
30,564,548 UART: [kat] LMS
31,096,154 UART: [kat] --
31,099,171 UART: [update-reset] ++
34,550,941 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,554,526 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
35,161,104 >>> mbox cmd response: success
35,165,721 UART: [update-reset] Copying MAN_2 To MAN_1
35,199,905 UART: [update-reset Success] --
35,204,765 UART: [state] Locking Datavault
35,208,352 UART: [state] Locking PCR0, PCR1 and PCR31
35,210,547 UART: [state] Locking ICCM
35,213,240 UART: [exit] Launching FMC @ 0x40000130
35,221,919 UART:
35,222,150 UART: Running Caliptra FMC ...
35,223,235 UART:
35,223,386 UART: [state] CFI Enabled
35,267,789 UART: [art] Extend RT PCRs Done
35,268,979 UART: [art] Lock RT PCRs Done
35,270,586 UART: [art] Populate DV Done
35,276,271 UART: [fht] FMC Alias Private Key: 7
35,277,980 UART: [art] Derive CDI
35,278,719 UART: [art] Store in in slot 0x4
35,321,562 UART: [art] Derive Key Pair
35,322,608 UART: [art] Store priv key in slot 0x5
37,749,536 UART: [art] Derive Key Pair - Done
37,762,159 UART: [art] Signing Cert with AUTHO
37,763,460 UART: RITY.KEYID = 7
39,468,914 UART: [art] Erasing AUTHORITY.KEYID = 7
39,470,416 UART: [art] PUB.X = 71ED005BBF30C6892994F82BFB462544A571114BCE0FD6AA78E11A8D94B5E5D84DF7386A25FBF5479E18C5FE5CF1B2EF
39,477,685 UART: [art] PUB.Y = B4DF3155B3256B1D7BA6BBFFC36E629E936A762E4B607660511C3AD169D392C732DFF1F1D93CC33BA7CF9771D7B038BA
39,484,975 UART: [art] SIG.R = 4F78AADD49EACE501AD031ABF88B2F2FEA6FA2A17F6464CA45110E73BBC721B8F809F8C54E9351803649B7CA03627011
39,492,373 UART: [art] SIG.S = 19683A55AD0DBEDF0A086E8191A577A02F94848E52CBC47FC0AF7F5B268FE8E8F3FE213C0C3F50799FFA4FCFC38BEC6F
40,470,944 UART: Caliptra RT
40,471,673 UART: [state] CFI Enabled
43,243,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,245,314 UART: [rt] RT listening for mailbox commands...
43,276,709 UART: [rt]cmd =0x494e464f, len=4
43,281,041 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,944 writing to cptra_bootfsm_go
3,759,944 ready_for_fw is high
3,760,325 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
14,192,891 >>> mbox cmd response: success
14,193,484 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,440,898 UART:
18,441,290 UART: Running Caliptra FMC ...
18,442,404 UART:
18,442,560 UART: [state] CFI Enabled
18,450,577 UART: [fht] FMC Alias Private Key: 7
20,208,099 UART: [art] Extend RT PCRs Done
20,209,321 UART: [art] Lock RT PCRs Done
20,210,974 UART: [art] Populate DV Done
20,216,504 UART: [fht] FMC Alias Private Key: 7
20,218,053 UART: [art] Derive CDI
20,218,838 UART: [art] Store in in slot 0x4
20,261,744 UART: [art] Derive Key Pair
20,262,818 UART: [art] Store priv key in slot 0x5
22,689,817 UART: [art] Derive Key Pair - Done
22,703,245 UART: [art] Signing Cert with AUTHO
22,704,546 UART: RITY.KEYID = 7
24,410,046 UART: [art] Erasing AUTHORITY.KEYID = 7
24,411,560 UART: [art] PUB.X = 751DF026E7DC8F00CF711F25B41831687B39EBA6EFB4430BB863B02A50BBF9BAEE02124E31A99147A410EDAD6F2C9CE9
24,418,806 UART: [art] PUB.Y = 9B38E6B7886DE1183FD1F9E1A5460A5624C5971F8E7B330C3A587F963360593EE2E18ECD3D5543BFA38DD2CE0B7650D5
24,426,093 UART: [art] SIG.R = E7641DC1F8D77D8528C4A22E377C26C0DA0287DB7D7B495116AC0E3992651D2D118B0EFB572B16718866CAE90AE1606B
24,433,438 UART: [art] SIG.S = 173EA40328754C7718FE54EB1F6A7ACEBB64EA459A9BA2E2A4F545B79E1BD118DD4D96F1B7A09AAE766C9450F45CB585
25,411,667 UART: mbox::rt_entry...
25,412,625 UART: ____ _ _ _ ____ _____
25,414,613 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,416,620 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,418,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,420,544 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,422,592 UART: |_|
25,423,404 UART:
25,537,418 UART: [rt] Runtime listening for mailbox commands...
25,543,276 >>> mbox cmd response data (3272 bytes)
25,558,990 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
25,592,398 >>> mbox cmd response data (0 bytes)
27,655,338 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
35,390,941 >>> mbox cmd response: success
35,424,842 UART:
35,425,151 UART: Running Caliptra FMC ...
35,426,193 UART:
35,426,364 UART: [state] CFI Enabled
35,470,032 UART: [art] Extend RT PCRs Done
35,471,227 UART: [art] Lock RT PCRs Done
35,472,877 UART: [art] Populate DV Done
35,478,390 UART: [fht] FMC Alias Private Key: 7
35,479,978 UART: [art] Derive CDI
35,480,721 UART: [art] Store in in slot 0x4
35,523,478 UART: [art] Derive Key Pair
35,524,515 UART: [art] Store priv key in slot 0x5
37,951,556 UART: [art] Derive Key Pair - Done
37,964,656 UART: [art] Signing Cert with AUTHO
37,965,962 UART: RITY.KEYID = 7
39,671,009 UART: [art] Erasing AUTHORITY.KEYID = 7
39,672,516 UART: [art] PUB.X = 09FD30F3E87111F6F51D2FCF1EDACEF7D857706325817923FFB51E776F213F4F5278680D83D14E218E19B538F8AACE86
39,679,784 UART: [art] PUB.Y = B2B0DA5C4F4B03B6EE7857087BF439A56F3195A6D248D2B1BCA266732E1D74914AAD8A361CE697385B8EC565085836BB
39,687,021 UART: [art] SIG.R = 148B7565E6AC5EE1D758ACF5C9E1D8A5CC736DDCBE64B57BD309D4A04CF98DE579ACB63F337D4050E7AE8C2CA5AFF79E
39,694,445 UART: [art] SIG.S = E62847204093C7A9C749AA703F15099065FB9F276B595749D09ED6AA45529789CAE37F4C5BF000A85FCF6DD81491B1A9
40,673,509 UART: Caliptra RT
40,674,215 UART: [state] CFI Enabled
43,450,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,451,774 UART: [rt] RT listening for mailbox commands...
43,483,300 UART: [rt]cmd =0x494e464f, len=4
43,487,484 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,673 UART: [kat] SHA2-256
892,611 UART: [kat] SHA2-384
895,498 UART: [kat] SHA2-512-ACC
897,399 UART: [kat] ECC-384
902,986 UART: [kat] HMAC-384Kdf
907,516 UART: [kat] LMS
1,475,712 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,949 UART: [fht] Storing FHT @ 0x50003400
1,479,942 UART: [idev] ++
1,480,110 UART: [idev] CDI.KEYID = 6
1,480,470 UART: [idev] SUBJECT.KEYID = 7
1,480,894 UART: [idev] UDS.KEYID = 0
1,481,239 ready_for_fw is high
1,481,239 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,489,114 UART: [idev] Erasing UDS.KEYID = 0
1,505,760 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,336 UART: [idev] --
1,515,311 UART: [ldev] ++
1,515,479 UART: [ldev] CDI.KEYID = 6
1,515,842 UART: [ldev] SUBJECT.KEYID = 5
1,516,268 UART: [ldev] AUTHORITY.KEYID = 7
1,516,731 UART: [ldev] FE.KEYID = 1
1,521,611 UART: [ldev] Erasing FE.KEYID = 1
1,546,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,998 UART: [ldev] --
1,585,377 UART: [fwproc] Waiting for Commands...
1,586,128 UART: [fwproc] Received command 0x46574c44
1,586,919 UART: [fwproc] Received Image of size 78532 bytes
2,474,105 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,500,655 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,530,007 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,612,098 >>> mbox cmd response: success
2,612,098 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,613,322 UART: [afmc] ++
2,613,490 UART: [afmc] CDI.KEYID = 6
2,613,852 UART: [afmc] SUBJECT.KEYID = 7
2,614,277 UART: [afmc] AUTHORITY.KEYID = 5
2,649,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,665,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,666,228 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,671,956 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,677,841 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,683,531 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,691,458 UART: [afmc] --
2,692,470 UART: [cold-reset] --
2,693,374 UART: [state] Locking Datavault
2,694,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,695,017 UART: [state] Locking ICCM
2,695,617 UART: [exit] Launching FMC @ 0x40000130
2,700,946 UART:
2,700,962 UART: Running Caliptra FMC ...
2,701,370 UART:
2,701,424 UART: [state] CFI Enabled
2,712,117 UART: [fht] FMC Alias Private Key: 7
2,820,202 UART: [art] Extend RT PCRs Done
2,820,630 UART: [art] Lock RT PCRs Done
2,822,138 UART: [art] Populate DV Done
2,830,293 UART: [fht] FMC Alias Private Key: 7
2,831,405 UART: [art] Derive CDI
2,831,685 UART: [art] Store in in slot 0x4
2,917,610 UART: [art] Derive Key Pair
2,917,970 UART: [art] Store priv key in slot 0x5
2,931,452 UART: [art] Derive Key Pair - Done
2,946,104 UART: [art] Signing Cert with AUTHO
2,946,584 UART: RITY.KEYID = 7
2,961,872 UART: [art] Erasing AUTHORITY.KEYID = 7
2,962,637 UART: [art] PUB.X = 9E9069B40CF5AB5B92E5D480F0827ABA35F75646775E2F6F0194023D6A4E9025F781A83F903D75B094D26F6BEE7BB6F0
2,969,402 UART: [art] PUB.Y = D93C355A445D11F9F23599F300CDE17211174E476AEA8C900841C1F80922EDA4D66A5672B1E006265258C62C0F87F24D
2,976,314 UART: [art] SIG.R = 013509F52BD973F842567C560D474CAA50A3E96EF9BA96EB32AACC7F76C97CF8A8ABC022F10CCD54C5F24FD04DC809B1
2,983,087 UART: [art] SIG.S = 4C4F948716B2C40EC9D179DBD9426EC1FF91F45071194A41A75D1DFB3D058533F2CE5237BDB9B22236F5A8DC34EC173D
3,006,992 UART: mbox::rt_entry...
3,007,364 UART: ____ _ _ _ ____ _____
3,008,148 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,008,948 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,009,716 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,010,484 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,011,252 UART: |_|
3,011,564 UART:
3,119,373 UART: [rt] Runtime listening for mailbox commands...
3,124,341 >>> mbox cmd response data (3272 bytes)
3,124,342 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,147,428 >>> mbox cmd response data (0 bytes)
3,147,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,147,549 UART:
3,147,565 UART: Running Caliptra ROM ...
3,147,973 UART:
3,148,027 UART: [state] CFI Enabled
3,150,753 UART: [state] LifecycleState = Unprovisioned
3,151,408 UART: [state] DebugLocked = No
3,152,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,153,747 UART: [kat] SHA2-256
3,947,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,951,793 UART: [kat] ++
3,951,945 UART: [kat] sha1
3,956,139 UART: [kat] SHA2-256
3,958,077 UART: [kat] SHA2-384
3,960,806 UART: [kat] SHA2-512-ACC
3,962,706 UART: [kat] ECC-384
3,968,509 UART: [kat] HMAC-384Kdf
3,973,177 UART: [kat] LMS
4,541,373 UART: [kat] --
4,542,358 UART: [update-reset] ++
5,875,664 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,876,900 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,026,530 >>> mbox cmd response: success
6,026,861 UART: [update-reset] Copying MAN_2 To MAN_1
6,034,875 UART: [update-reset Success] --
6,035,882 UART: [state] Locking Datavault
6,036,766 UART: [state] Locking PCR0, PCR1 and PCR31
6,037,370 UART: [state] Locking ICCM
6,037,838 UART: [exit] Launching FMC @ 0x40000130
6,043,167 UART:
6,043,183 UART: Running Caliptra FMC ...
6,043,591 UART:
6,043,645 UART: [state] CFI Enabled
6,132,916 UART: [art] Extend RT PCRs Done
6,133,344 UART: [art] Lock RT PCRs Done
6,134,531 UART: [art] Populate DV Done
6,142,814 UART: [fht] FMC Alias Private Key: 7
6,143,784 UART: [art] Derive CDI
6,144,064 UART: [art] Store in in slot 0x4
6,229,919 UART: [art] Derive Key Pair
6,230,279 UART: [art] Store priv key in slot 0x5
6,243,891 UART: [art] Derive Key Pair - Done
6,258,546 UART: [art] Signing Cert with AUTHO
6,259,026 UART: RITY.KEYID = 7
6,274,398 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,163 UART: [art] PUB.X = D4D5CD67E52201C4F1CBD11A443CA18AAB69A3A7C2C6B8F42393773CBA7FCB2D150B2AE9B5110F47D97FC410B88E751C
6,281,942 UART: [art] PUB.Y = EB49E016A65AAEB6EB56851E678A049C87F0A83E9DC4C2192B07E7E5179014B1D8B2971E07AA836D495AFE2C9B2CA0E3
6,288,895 UART: [art] SIG.R = 5924BF788E82EC7DB797D788B63FB9A52E54522CD00DC8915FCF2DEC76C4AA86E6C7C4C0ECE8624762F3763D5F41038B
6,295,671 UART: [art] SIG.S = CCC730929ECCCF327E72CA10147FD46C12CE3C4B33F3055A7CDFCEE650EAEFE46DC91D6E3D793DFE6BEABF074B9A44F5
6,319,778 UART: Caliptra RT
6,320,031 UART: [state] CFI Enabled
6,616,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,618,060 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,648,492 UART: [rt]cmd =0x494e464f, len=4
6,652,119 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,383 ready_for_fw is high
1,362,383 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,462,340 >>> mbox cmd response: success
2,462,340 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,523,466 UART:
2,523,482 UART: Running Caliptra FMC ...
2,523,890 UART:
2,523,944 UART: [state] CFI Enabled
2,534,261 UART: [fht] FMC Alias Private Key: 7
2,642,284 UART: [art] Extend RT PCRs Done
2,642,712 UART: [art] Lock RT PCRs Done
2,644,220 UART: [art] Populate DV Done
2,652,509 UART: [fht] FMC Alias Private Key: 7
2,653,561 UART: [art] Derive CDI
2,653,841 UART: [art] Store in in slot 0x4
2,739,386 UART: [art] Derive Key Pair
2,739,746 UART: [art] Store priv key in slot 0x5
2,753,440 UART: [art] Derive Key Pair - Done
2,768,457 UART: [art] Signing Cert with AUTHO
2,768,937 UART: RITY.KEYID = 7
2,784,351 UART: [art] Erasing AUTHORITY.KEYID = 7
2,785,116 UART: [art] PUB.X = 98DC42AB3710A439512144646F3E070931699FC3423B7FF8BA78285C5CB0A7683B027D96172E18F9DBDEFC6B416B7F5B
2,791,879 UART: [art] PUB.Y = 410538E43EC51933490CC958E546A6AB64756C76BFCD3E05CFC9D36C9AF8BD0A75A5DAB72B3ADE480E97A7FEEBFE4812
2,798,834 UART: [art] SIG.R = 4BC94206B5D5E3A23D0FAB74B8D83F9C69440073790EDDA520FBF77539C0C8A39B40D9BB29D083190B7BE48477685ACA
2,805,578 UART: [art] SIG.S = 96E13DF45EECEB329EE77C514B1F908A31AB10518C9660263E7B1A8DC7CF1C3FFA1812646139D69EC08EE38600DC06E2
2,829,124 UART: mbox::rt_entry...
2,829,496 UART: ____ _ _ _ ____ _____
2,830,280 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,831,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,831,848 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,832,616 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,833,384 UART: |_|
2,833,696 UART:
2,940,678 UART: [rt] Runtime listening for mailbox commands...
2,945,646 >>> mbox cmd response data (3272 bytes)
2,945,647 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,968,733 >>> mbox cmd response data (0 bytes)
2,968,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,729,913 >>> mbox cmd response: success
5,743,260 UART:
5,743,276 UART: Running Caliptra FMC ...
5,743,684 UART:
5,743,738 UART: [state] CFI Enabled
5,832,683 UART: [art] Extend RT PCRs Done
5,833,111 UART: [art] Lock RT PCRs Done
5,834,212 UART: [art] Populate DV Done
5,842,575 UART: [fht] FMC Alias Private Key: 7
5,843,673 UART: [art] Derive CDI
5,843,953 UART: [art] Store in in slot 0x4
5,929,460 UART: [art] Derive Key Pair
5,929,820 UART: [art] Store priv key in slot 0x5
5,942,388 UART: [art] Derive Key Pair - Done
5,957,170 UART: [art] Signing Cert with AUTHO
5,957,650 UART: RITY.KEYID = 7
5,973,230 UART: [art] Erasing AUTHORITY.KEYID = 7
5,973,995 UART: [art] PUB.X = 98C49951EE252527C0692DBCD6FCCC219F24AC350CD4C022D88DD2C37B411B3E3FD9EA6F2A3666C2DDA96D092D852CE7
5,980,775 UART: [art] PUB.Y = 62B3EAE6E3ABD73CC7FD2E47896AB3032575FE6370A1C5E77855BF2AD113CEAEDE73FC068C07F68DBE58B637CBEFA850
5,987,740 UART: [art] SIG.R = 9F26387279B190246F830059FC71B9377008841BAA7E7E6EAEBFE2A5C5B82D6C7BB0762A4D31159CF9FC4882D3CD1802
5,994,486 UART: [art] SIG.S = E79A79F5478DF10682BF612890BCF24E515C0AA043F344C5E26E500B7F03D635A71A2F93128E16464E30DEA98B1798B7
6,018,433 UART: Caliptra RT
6,018,686 UART: [state] CFI Enabled
6,310,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,311,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,342,784 UART: [rt]cmd =0x494e464f, len=4
6,346,585 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,938 UART: [kat] SHA2-256
881,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,984 UART: [kat] ++
886,136 UART: [kat] sha1
890,458 UART: [kat] SHA2-256
892,396 UART: [kat] SHA2-384
895,087 UART: [kat] SHA2-512-ACC
896,988 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,440 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,671 UART: [idev] ++
1,479,839 UART: [idev] CDI.KEYID = 6
1,480,199 UART: [idev] SUBJECT.KEYID = 7
1,480,623 UART: [idev] UDS.KEYID = 0
1,480,968 ready_for_fw is high
1,480,968 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,488,563 UART: [idev] Erasing UDS.KEYID = 0
1,504,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,391 UART: [idev] --
1,514,640 UART: [ldev] ++
1,514,808 UART: [ldev] CDI.KEYID = 6
1,515,171 UART: [ldev] SUBJECT.KEYID = 5
1,515,597 UART: [ldev] AUTHORITY.KEYID = 7
1,516,060 UART: [ldev] FE.KEYID = 1
1,521,310 UART: [ldev] Erasing FE.KEYID = 1
1,547,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,879 UART: [ldev] --
1,586,154 UART: [fwproc] Waiting for Commands...
1,586,937 UART: [fwproc] Received command 0x46574c44
1,587,728 UART: [fwproc] Received Image of size 78532 bytes
2,476,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,503,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,533,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 53848
2,615,277 >>> mbox cmd response: success
2,615,277 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,616,347 UART: [afmc] ++
2,616,515 UART: [afmc] CDI.KEYID = 6
2,616,877 UART: [afmc] SUBJECT.KEYID = 7
2,617,302 UART: [afmc] AUTHORITY.KEYID = 5
2,652,285 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,668,677 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,669,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,675,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,681,070 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
2,686,760 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
2,694,669 UART: [afmc] --
2,695,761 UART: [cold-reset] --
2,696,531 UART: [state] Locking Datavault
2,697,622 UART: [state] Locking PCR0, PCR1 and PCR31
2,698,226 UART: [state] Locking ICCM
2,698,704 UART: [exit] Launching FMC @ 0x40000130
2,704,033 UART:
2,704,049 UART: Running Caliptra FMC ...
2,704,457 UART:
2,704,600 UART: [state] CFI Enabled
2,715,155 UART: [fht] FMC Alias Private Key: 7
2,823,362 UART: [art] Extend RT PCRs Done
2,823,790 UART: [art] Lock RT PCRs Done
2,825,306 UART: [art] Populate DV Done
2,833,235 UART: [fht] FMC Alias Private Key: 7
2,834,309 UART: [art] Derive CDI
2,834,589 UART: [art] Store in in slot 0x4
2,920,492 UART: [art] Derive Key Pair
2,920,852 UART: [art] Store priv key in slot 0x5
2,934,360 UART: [art] Derive Key Pair - Done
2,948,952 UART: [art] Signing Cert with AUTHO
2,949,432 UART: RITY.KEYID = 7
2,964,158 UART: [art] Erasing AUTHORITY.KEYID = 7
2,964,923 UART: [art] PUB.X = 32694AFEE4D1942D556B5EDC73FA937EBFE5C63142683165AFFF2A5B99B1D2D4DA34A2E34C3781F68F450D29D3273548
2,971,698 UART: [art] PUB.Y = 48B7A6B17877B5AD6A01E0724EC29FA75AD394B388A91D835B48268C0757F32D0666605504D779AD66D14E8B7DA76CAF
2,978,638 UART: [art] SIG.R = 24C0CBA78F2688640FC4C469C9812503185749BB38E66481CCE8A453300600A6F04677C3470B3266D0F700A65AF12CE0
2,985,344 UART: [art] SIG.S = 42CF3EDEF18F4900DD9F2AC3703E0CC4319D7C731E02F8A0E338270273C303A930DAC79592D77F62CED2EF8120622AF1
3,009,377 UART: mbox::rt_entry...
3,009,749 UART: ____ _ _ _ ____ _____
3,010,533 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,011,333 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,012,101 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,012,869 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,013,637 UART: |_|
3,013,949 UART:
3,121,866 UART: [rt] Runtime listening for mailbox commands...
3,126,834 >>> mbox cmd response data (3272 bytes)
3,126,835 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
3,149,921 >>> mbox cmd response data (0 bytes)
3,149,922 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,150,042 UART:
3,150,058 UART: Running Caliptra ROM ...
3,150,466 UART:
3,150,607 UART: [state] CFI Enabled
3,153,497 UART: [state] LifecycleState = Unprovisioned
3,154,152 UART: [state] DebugLocked = No
3,154,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,156,579 UART: [kat] SHA2-256
3,950,510 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,954,625 UART: [kat] ++
3,954,777 UART: [kat] sha1
3,958,945 UART: [kat] SHA2-256
3,960,883 UART: [kat] SHA2-384
3,963,544 UART: [kat] SHA2-512-ACC
3,965,444 UART: [kat] ECC-384
3,971,045 UART: [kat] HMAC-384Kdf
3,975,713 UART: [kat] LMS
4,543,909 UART: [kat] --
4,544,630 UART: [update-reset] ++
5,878,202 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,879,382 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
6,029,012 >>> mbox cmd response: success
6,029,365 UART: [update-reset] Copying MAN_2 To MAN_1
6,037,379 UART: [update-reset Success] --
6,038,436 UART: [state] Locking Datavault
6,039,082 UART: [state] Locking PCR0, PCR1 and PCR31
6,039,686 UART: [state] Locking ICCM
6,040,322 UART: [exit] Launching FMC @ 0x40000130
6,045,651 UART:
6,045,667 UART: Running Caliptra FMC ...
6,046,075 UART:
6,046,218 UART: [state] CFI Enabled
6,135,459 UART: [art] Extend RT PCRs Done
6,135,887 UART: [art] Lock RT PCRs Done
6,137,220 UART: [art] Populate DV Done
6,145,471 UART: [fht] FMC Alias Private Key: 7
6,146,449 UART: [art] Derive CDI
6,146,729 UART: [art] Store in in slot 0x4
6,232,344 UART: [art] Derive Key Pair
6,232,704 UART: [art] Store priv key in slot 0x5
6,245,696 UART: [art] Derive Key Pair - Done
6,260,218 UART: [art] Signing Cert with AUTHO
6,260,698 UART: RITY.KEYID = 7
6,275,882 UART: [art] Erasing AUTHORITY.KEYID = 7
6,276,647 UART: [art] PUB.X = BEAB7CFAA6EA8AAD9B107F35112D505480C24A8E14AF6853C661F00597518FE99426A3411B6F01D5C5DEFBC7011EDDBA
6,283,426 UART: [art] PUB.Y = 4263009A9E76BACCAEFAA7E450128113FA1DB6259F0E3BE56DB2BE6BC5367E74BBD9D8BAF4E7D7C0D51E1B604251D4C6
6,290,373 UART: [art] SIG.R = 69E1C80EBFF42C8D50B819316F0F0581F9E21F3C6F8917C17C33DB3D3C8DF82EDF4A74289E73D14C6ED4398B7FDF9D66
6,297,148 UART: [art] SIG.S = 084944AF4CA95158D64E043EC8775A25C4FA12BBFF514A0B31C78D881E994A9E513D930DE782B4EFD89026907157E896
6,321,129 UART: Caliptra RT
6,321,474 UART: [state] CFI Enabled
6,615,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,616,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,647,226 UART: [rt]cmd =0x494e464f, len=4
6,650,981 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,868 ready_for_fw is high
1,362,868 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,465,169 >>> mbox cmd response: success
2,465,169 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,526,717 UART:
2,526,733 UART: Running Caliptra FMC ...
2,527,141 UART:
2,527,284 UART: [state] CFI Enabled
2,537,939 UART: [fht] FMC Alias Private Key: 7
2,645,778 UART: [art] Extend RT PCRs Done
2,646,206 UART: [art] Lock RT PCRs Done
2,647,964 UART: [art] Populate DV Done
2,656,151 UART: [fht] FMC Alias Private Key: 7
2,657,139 UART: [art] Derive CDI
2,657,419 UART: [art] Store in in slot 0x4
2,742,886 UART: [art] Derive Key Pair
2,743,246 UART: [art] Store priv key in slot 0x5
2,756,490 UART: [art] Derive Key Pair - Done
2,771,452 UART: [art] Signing Cert with AUTHO
2,771,932 UART: RITY.KEYID = 7
2,787,656 UART: [art] Erasing AUTHORITY.KEYID = 7
2,788,421 UART: [art] PUB.X = D10E7E7674FAAC40F7787D94D90D9DE2AF4D7EFF0E1C674FAAD134008813A5AFCAE01E3F880CECE6682E62DDFE61E820
2,795,181 UART: [art] PUB.Y = C529040E8A42AE6E5A042C514A27CF31E8ABD5FBE9EF81EF2C9A0D0C8019F24C1531B36075884D18EE96899246CD322B
2,802,124 UART: [art] SIG.R = 1C6AE3531D5285395556B7674A57D48D0A8EF58BD11D76BD960CD4F5BA4ADAD79B8B9318C1396936580D39B344F182FA
2,808,889 UART: [art] SIG.S = E6A6E6685306F43FC36243C4FCC1894D176A51C86776F7D485E9D0A2461C970C0443570A9C84AE4B164DC7531A7F4E8B
2,832,804 UART: mbox::rt_entry...
2,833,176 UART: ____ _ _ _ ____ _____
2,833,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,834,760 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,835,528 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,836,296 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,837,064 UART: |_|
2,837,376 UART:
2,943,942 UART: [rt] Runtime listening for mailbox commands...
2,948,910 >>> mbox cmd response data (3272 bytes)
2,948,911 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,971,997 >>> mbox cmd response data (0 bytes)
2,971,998 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,731,884 >>> mbox cmd response: success
5,745,171 UART:
5,745,187 UART: Running Caliptra FMC ...
5,745,595 UART:
5,745,738 UART: [state] CFI Enabled
5,834,691 UART: [art] Extend RT PCRs Done
5,835,119 UART: [art] Lock RT PCRs Done
5,836,234 UART: [art] Populate DV Done
5,844,411 UART: [fht] FMC Alias Private Key: 7
5,845,341 UART: [art] Derive CDI
5,845,621 UART: [art] Store in in slot 0x4
5,931,608 UART: [art] Derive Key Pair
5,931,968 UART: [art] Store priv key in slot 0x5
5,945,462 UART: [art] Derive Key Pair - Done
5,960,104 UART: [art] Signing Cert with AUTHO
5,960,584 UART: RITY.KEYID = 7
5,975,822 UART: [art] Erasing AUTHORITY.KEYID = 7
5,976,587 UART: [art] PUB.X = B3F3F70277B9B2D6ECC8A5FCC45ECBA358ED7675BBC704D294281B6AF28F439F7AB6A9EC18BB9C1293043A8727E8109A
5,983,364 UART: [art] PUB.Y = 5FD05DD1CBAF4722B5913E0B3AE987D97991B27174AE73299700BB8628786DBDB802A04A180BDAB26F2EF8E105B94A2E
5,990,290 UART: [art] SIG.R = 3CEF53C12A701BE6AA6581F5B8F210A58FC0193006BC03DA5B0D82231F14101DEDFCCC3B986C678B346D5DC38BBA72BC
5,997,069 UART: [art] SIG.S = 26C681D0B330329B53C35DA654C2258D470D2C487024C77CD65F7F1FC915CF02429BA8642B501DF7498ACAC73C08E9E4
6,020,667 UART: Caliptra RT
6,021,012 UART: [state] CFI Enabled
6,318,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,319,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,349,988 UART: [rt]cmd =0x494e464f, len=4
6,353,473 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
893,044 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,169 UART: [kat] ++
897,321 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,284 UART: [kat] SHA2-512-ACC
908,185 UART: [kat] ECC-384
917,758 UART: [kat] HMAC-384Kdf
922,292 UART: [kat] LMS
1,170,620 UART: [kat] --
1,171,343 UART: [cold-reset] ++
1,171,769 UART: [fht] FHT @ 0x50003400
1,174,396 UART: [idev] ++
1,174,564 UART: [idev] CDI.KEYID = 6
1,174,924 UART: [idev] SUBJECT.KEYID = 7
1,175,348 UART: [idev] UDS.KEYID = 0
1,175,693 ready_for_fw is high
1,175,693 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,183,410 UART: [idev] Erasing UDS.KEYID = 0
1,200,707 UART: [idev] Sha1 KeyId Algorithm
1,209,197 UART: [idev] --
1,210,229 UART: [ldev] ++
1,210,397 UART: [ldev] CDI.KEYID = 6
1,210,760 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,243,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,279 UART: [ldev] --
1,282,628 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 78532 bytes
2,171,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,197,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,226,980 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,309,009 >>> mbox cmd response: success
2,309,009 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,310,143 UART: [afmc] ++
2,310,311 UART: [afmc] CDI.KEYID = 6
2,310,673 UART: [afmc] SUBJECT.KEYID = 7
2,311,098 UART: [afmc] AUTHORITY.KEYID = 5
2,346,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,162 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,890 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,775 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,494 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,196 UART: [afmc] --
2,389,184 UART: [cold-reset] --
2,390,110 UART: [state] Locking Datavault
2,391,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,831 UART: [state] Locking ICCM
2,392,359 UART: [exit] Launching FMC @ 0x40000130
2,397,688 UART:
2,397,704 UART: Running Caliptra FMC ...
2,398,112 UART:
2,398,166 UART: [state] CFI Enabled
2,408,823 UART: [fht] FMC Alias Private Key: 7
2,516,734 UART: [art] Extend RT PCRs Done
2,517,162 UART: [art] Lock RT PCRs Done
2,518,854 UART: [art] Populate DV Done
2,527,089 UART: [fht] FMC Alias Private Key: 7
2,528,093 UART: [art] Derive CDI
2,528,373 UART: [art] Store in in slot 0x4
2,614,146 UART: [art] Derive Key Pair
2,614,506 UART: [art] Store priv key in slot 0x5
2,628,152 UART: [art] Derive Key Pair - Done
2,642,773 UART: [art] Signing Cert with AUTHO
2,643,253 UART: RITY.KEYID = 7
2,658,149 UART: [art] Erasing AUTHORITY.KEYID = 7
2,658,914 UART: [art] PUB.X = DB02716DADB318A627986FE3A19C7777473880DEEAC2D82366B4D216EE6F8E2E81015A0B530D0E99DAA9A55CDDA7F452
2,665,681 UART: [art] PUB.Y = 9BFE76CE3DF6D939E5F6C453D3F8D826D76C4D84F06A8B7B1ECCC11BA277A2A084F0616DBC4362D343F0554C3D3EFFD9
2,672,651 UART: [art] SIG.R = 094A03DBC4857C7F4B62CAD274E2B90C049B089C195522C9B6580EBF661CC7B532388AFBDF6CB03E28729FFF919152C2
2,679,411 UART: [art] SIG.S = B937FD4A7B63D420DED2A07F080F99FB582FAAF0BEA6D7A8D65AD393A8D4D52B51D9E6EA2A46991BE45A24ED502BE558
2,703,408 UART: mbox::rt_entry...
2,703,780 UART: ____ _ _ _ ____ _____
2,704,564 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,705,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,706,132 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,706,900 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,707,668 UART: |_|
2,707,980 UART:
2,813,958 UART: [rt] Runtime listening for mailbox commands...
2,818,926 >>> mbox cmd response data (3272 bytes)
2,818,927 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,842,013 >>> mbox cmd response data (0 bytes)
2,842,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,842,131 UART:
2,842,147 UART: Running Caliptra ROM ...
2,842,555 UART:
2,842,610 UART: [state] CFI Enabled
2,845,474 UART: [state] LifecycleState = Unprovisioned
2,846,129 UART: [state] DebugLocked = No
2,846,843 UART: [state] WD Timer not started. Device not locked for debugging
2,848,077 UART: [kat] SHA2-256
3,653,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,657,852 UART: [kat] ++
3,658,004 UART: [kat] sha1
3,662,320 UART: [kat] SHA2-256
3,664,260 UART: [kat] SHA2-384
3,666,997 UART: [kat] SHA2-512-ACC
3,668,897 UART: [kat] ECC-384
3,678,538 UART: [kat] HMAC-384Kdf
3,683,020 UART: [kat] LMS
3,931,348 UART: [kat] --
3,932,016 UART: [update-reset] ++
5,243,706 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,244,831 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,394,409 >>> mbox cmd response: success
5,394,560 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,574 UART: [update-reset Success] --
5,403,431 UART: [state] Locking Datavault
5,404,349 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,953 UART: [state] Locking ICCM
5,405,625 UART: [exit] Launching FMC @ 0x40000130
5,410,954 UART:
5,410,970 UART: Running Caliptra FMC ...
5,411,378 UART:
5,411,432 UART: [state] CFI Enabled
5,500,501 UART: [art] Extend RT PCRs Done
5,500,929 UART: [art] Lock RT PCRs Done
5,502,298 UART: [art] Populate DV Done
5,510,515 UART: [fht] FMC Alias Private Key: 7
5,511,507 UART: [art] Derive CDI
5,511,787 UART: [art] Store in in slot 0x4
5,597,110 UART: [art] Derive Key Pair
5,597,470 UART: [art] Store priv key in slot 0x5
5,610,286 UART: [art] Derive Key Pair - Done
5,624,773 UART: [art] Signing Cert with AUTHO
5,625,253 UART: RITY.KEYID = 7
5,640,149 UART: [art] Erasing AUTHORITY.KEYID = 7
5,640,914 UART: [art] PUB.X = 1DE1CCD37C1F1E65B37514316403C287F27426D33408EB1AC6D7CE187BDBE317F7C3A0142CD7F9D9E73E18B71BE70AF1
5,647,687 UART: [art] PUB.Y = 230893536F767C1412AFCF896941B04740ACC5E8BCD8BB17D55D540400C2526823EA143F6490D0D4D2DD5129C172F015
5,654,605 UART: [art] SIG.R = A868D6945BB9C6D32D357288AF7BB31CD685934C5AA021589CC522DF3AFEED13DC9E8CAE788437DDB560371F1FAEB98F
5,661,393 UART: [art] SIG.S = CC13B7AFAE882B8637CC5FC5DADAFF68FEF92C6C52D78A5735245EE6913D2F1A653E6E34C2926DD696D0F7A8AFCAFB30
5,684,972 UART: Caliptra RT
5,685,225 UART: [state] CFI Enabled
5,979,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,981,431 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,012,127 UART: [rt]cmd =0x494e464f, len=4
6,015,940 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,483 ready_for_fw is high
1,059,483 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,162,274 >>> mbox cmd response: success
2,162,274 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,223,858 UART:
2,223,874 UART: Running Caliptra FMC ...
2,224,282 UART:
2,224,336 UART: [state] CFI Enabled
2,234,783 UART: [fht] FMC Alias Private Key: 7
2,342,558 UART: [art] Extend RT PCRs Done
2,342,986 UART: [art] Lock RT PCRs Done
2,344,486 UART: [art] Populate DV Done
2,352,945 UART: [fht] FMC Alias Private Key: 7
2,353,939 UART: [art] Derive CDI
2,354,219 UART: [art] Store in in slot 0x4
2,440,178 UART: [art] Derive Key Pair
2,440,538 UART: [art] Store priv key in slot 0x5
2,453,728 UART: [art] Derive Key Pair - Done
2,468,468 UART: [art] Signing Cert with AUTHO
2,468,948 UART: RITY.KEYID = 7
2,484,020 UART: [art] Erasing AUTHORITY.KEYID = 7
2,484,785 UART: [art] PUB.X = 9D34FDA29FCCA687127C6F29F75F0D077F627A2B4FD1D39004EC83ADDC408E02DDEB11B2F10345D356A3AC84B6E5701E
2,491,556 UART: [art] PUB.Y = 1C4EE9007A34DD0A22570C9CEF93889026101DE55B6F2EEC39663AAD9521BF22A6358F8AE082F1A385CE99E149AC7517
2,498,484 UART: [art] SIG.R = 3CE5437137D408F341D3C105C326674C84DB42FC19BF237E1FD91C3DE855DD92241508CA1D18DFC6CDFB304BE4B80A43
2,505,252 UART: [art] SIG.S = 48B36CC95E220796C271B2DE51C25334CCD60B4AA102A26D107942D9A70A65CE77A346C09B95196131EF5168260B9BE6
2,529,048 UART: mbox::rt_entry...
2,529,420 UART: ____ _ _ _ ____ _____
2,530,204 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,531,004 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,531,772 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,532,540 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,533,308 UART: |_|
2,533,620 UART:
2,639,626 UART: [rt] Runtime listening for mailbox commands...
2,644,594 >>> mbox cmd response data (3272 bytes)
2,644,595 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,667,681 >>> mbox cmd response data (0 bytes)
2,667,682 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,102,488 >>> mbox cmd response: success
5,116,048 UART:
5,116,064 UART: Running Caliptra FMC ...
5,116,472 UART:
5,116,526 UART: [state] CFI Enabled
5,205,729 UART: [art] Extend RT PCRs Done
5,206,157 UART: [art] Lock RT PCRs Done
5,207,326 UART: [art] Populate DV Done
5,215,489 UART: [fht] FMC Alias Private Key: 7
5,216,449 UART: [art] Derive CDI
5,216,729 UART: [art] Store in in slot 0x4
5,302,270 UART: [art] Derive Key Pair
5,302,630 UART: [art] Store priv key in slot 0x5
5,315,820 UART: [art] Derive Key Pair - Done
5,330,584 UART: [art] Signing Cert with AUTHO
5,331,064 UART: RITY.KEYID = 7
5,346,556 UART: [art] Erasing AUTHORITY.KEYID = 7
5,347,321 UART: [art] PUB.X = 8019CB88AF91F7FA801C0A9D8B515788F6C68767F13BB95CD7A1B4DA819008FCCE2347D9029ED027A8B1989D2909EB73
5,354,085 UART: [art] PUB.Y = D6D7237F9EA75EAECB164725B103E20F214AC0C2D14AC166371936FA8F20133F102DE464B3AD709B846E8011A1A4AB5D
5,361,037 UART: [art] SIG.R = 6D858E966AC655C4DEFA80C0B0518A5D661139E52E50D35A10AB2847C528A9887EB01B0076933D729ABEFE13EFFE4E64
5,367,793 UART: [art] SIG.S = B5DE1BBB9A4300EA4FD5F5B04D35DFA7296B221C2015F7F9B6B58E2979241261CBE62F955A09A8B3F47FC7D85599C825
5,391,511 UART: Caliptra RT
5,391,764 UART: [state] CFI Enabled
5,691,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,692,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,723,203 UART: [rt]cmd =0x494e464f, len=4
5,726,884 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,354 UART: [kat] SHA2-256
904,294 UART: [kat] SHA2-384
907,117 UART: [kat] SHA2-512-ACC
909,018 UART: [kat] ECC-384
918,997 UART: [kat] HMAC-384Kdf
923,701 UART: [kat] LMS
1,172,029 UART: [kat] --
1,172,892 UART: [cold-reset] ++
1,173,306 UART: [fht] FHT @ 0x50003400
1,176,067 UART: [idev] ++
1,176,235 UART: [idev] CDI.KEYID = 6
1,176,595 UART: [idev] SUBJECT.KEYID = 7
1,177,019 UART: [idev] UDS.KEYID = 0
1,177,364 ready_for_fw is high
1,177,364 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,185,449 UART: [idev] Erasing UDS.KEYID = 0
1,202,942 UART: [idev] Sha1 KeyId Algorithm
1,211,344 UART: [idev] --
1,212,356 UART: [ldev] ++
1,212,524 UART: [ldev] CDI.KEYID = 6
1,212,887 UART: [ldev] SUBJECT.KEYID = 5
1,213,313 UART: [ldev] AUTHORITY.KEYID = 7
1,213,776 UART: [ldev] FE.KEYID = 1
1,219,066 UART: [ldev] Erasing FE.KEYID = 1
1,245,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,132 UART: [ldev] --
1,284,409 UART: [fwproc] Wait for Commands...
1,285,095 UART: [fwproc] Recv command 0x46574c44
1,285,823 UART: [fwproc] Recv'd Img size: 78532 bytes
2,173,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,200,955 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,230,259 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,312,408 >>> mbox cmd response: success
2,312,408 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,313,626 UART: [afmc] ++
2,313,794 UART: [afmc] CDI.KEYID = 6
2,314,156 UART: [afmc] SUBJECT.KEYID = 7
2,314,581 UART: [afmc] AUTHORITY.KEYID = 5
2,349,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,365,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,366,601 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,372,329 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,378,214 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,383,933 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,391,807 UART: [afmc] --
2,392,933 UART: [cold-reset] --
2,393,787 UART: [state] Locking Datavault
2,394,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,395,584 UART: [state] Locking ICCM
2,396,012 UART: [exit] Launching FMC @ 0x40000130
2,401,341 UART:
2,401,357 UART: Running Caliptra FMC ...
2,401,765 UART:
2,401,908 UART: [state] CFI Enabled
2,412,617 UART: [fht] FMC Alias Private Key: 7
2,520,936 UART: [art] Extend RT PCRs Done
2,521,364 UART: [art] Lock RT PCRs Done
2,522,882 UART: [art] Populate DV Done
2,531,195 UART: [fht] FMC Alias Private Key: 7
2,532,153 UART: [art] Derive CDI
2,532,433 UART: [art] Store in in slot 0x4
2,618,208 UART: [art] Derive Key Pair
2,618,568 UART: [art] Store priv key in slot 0x5
2,632,200 UART: [art] Derive Key Pair - Done
2,646,711 UART: [art] Signing Cert with AUTHO
2,647,191 UART: RITY.KEYID = 7
2,662,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,663,386 UART: [art] PUB.X = 0E3D3283E5961BF0F47F7C2E9409CA52A9CE4ABE660AC7096A6D5CA5F6BB8B23AE6DF6C37B796B8BCA7FD1D4A56667BE
2,670,168 UART: [art] PUB.Y = A64D86368577F2CDC1000EC22D3507913615B4179D98F93C92D5A80C147D859DADC184D472B2EDAF657C323C46C98DFB
2,677,091 UART: [art] SIG.R = 6ED74A74EC0A187FE5D48C1BD6AD257DA649B56099D2FE80364E98F541A7683B8A8B94BE1C1B3BD7461FFEC0D429FB4A
2,683,876 UART: [art] SIG.S = E3843095622C2066C388049CA3D74E58FC7BD4E0929B4D6BE6B082D57EDEC5FE6E61E1E9E343358C2583F8C52D133297
2,707,544 UART: mbox::rt_entry...
2,707,916 UART: ____ _ _ _ ____ _____
2,708,700 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,709,500 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,710,268 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,711,036 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,711,804 UART: |_|
2,712,116 UART:
2,818,862 UART: [rt] Runtime listening for mailbox commands...
2,823,830 >>> mbox cmd response data (3272 bytes)
2,823,831 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,846,917 >>> mbox cmd response data (0 bytes)
2,846,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,847,035 UART:
2,847,051 UART: Running Caliptra ROM ...
2,847,459 UART:
2,847,601 UART: [state] CFI Enabled
2,849,949 UART: [state] LifecycleState = Unprovisioned
2,850,604 UART: [state] DebugLocked = No
2,851,180 UART: [state] WD Timer not started. Device not locked for debugging
2,852,398 UART: [kat] SHA2-256
3,658,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,662,173 UART: [kat] ++
3,662,325 UART: [kat] sha1
3,666,567 UART: [kat] SHA2-256
3,668,507 UART: [kat] SHA2-384
3,671,168 UART: [kat] SHA2-512-ACC
3,673,068 UART: [kat] ECC-384
3,682,917 UART: [kat] HMAC-384Kdf
3,687,391 UART: [kat] LMS
3,935,719 UART: [kat] --
3,936,373 UART: [update-reset] ++
5,247,443 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,248,524 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,398,102 >>> mbox cmd response: success
5,398,417 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,431 UART: [update-reset Success] --
5,407,408 UART: [state] Locking Datavault
5,408,080 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,684 UART: [state] Locking ICCM
5,409,312 UART: [exit] Launching FMC @ 0x40000130
5,414,641 UART:
5,414,657 UART: Running Caliptra FMC ...
5,415,065 UART:
5,415,208 UART: [state] CFI Enabled
5,504,087 UART: [art] Extend RT PCRs Done
5,504,515 UART: [art] Lock RT PCRs Done
5,505,898 UART: [art] Populate DV Done
5,513,985 UART: [fht] FMC Alias Private Key: 7
5,515,049 UART: [art] Derive CDI
5,515,329 UART: [art] Store in in slot 0x4
5,601,290 UART: [art] Derive Key Pair
5,601,650 UART: [art] Store priv key in slot 0x5
5,615,074 UART: [art] Derive Key Pair - Done
5,629,763 UART: [art] Signing Cert with AUTHO
5,630,243 UART: RITY.KEYID = 7
5,644,925 UART: [art] Erasing AUTHORITY.KEYID = 7
5,645,690 UART: [art] PUB.X = 15C6B019EE54DF929A55238F73DA23A6EB8DF680FFF84777372FD9219CE3C80EAD3BA69C492EB1DC682164189A4241CE
5,652,467 UART: [art] PUB.Y = 76D426DEE783E990E80A342817980EAED260704E78C016F79E5DD0AB0913A1A7F23EAC97CC61F7C73D2493E8308A5731
5,659,410 UART: [art] SIG.R = EC4A749C694FA48CDDDF2B40DFF02E8CBCE9EACC618A997762CB67BB8E1B7C0C0734F2145193D62E917AFE808BC11AD8
5,666,198 UART: [art] SIG.S = 6C4932E28C102FFC35EE4637301E30B6B04168D847A4922AD724649803AE6215ADC4E75AC2BDE469AC5FE52BEBCC739C
5,690,066 UART: Caliptra RT
5,690,411 UART: [state] CFI Enabled
5,989,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,991,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,021,638 UART: [rt]cmd =0x494e464f, len=4
6,025,391 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 ready_for_fw is high
1,060,734 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,165,965 >>> mbox cmd response: success
2,165,965 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,228,359 UART:
2,228,375 UART: Running Caliptra FMC ...
2,228,783 UART:
2,228,926 UART: [state] CFI Enabled
2,239,381 UART: [fht] FMC Alias Private Key: 7
2,347,944 UART: [art] Extend RT PCRs Done
2,348,372 UART: [art] Lock RT PCRs Done
2,349,892 UART: [art] Populate DV Done
2,357,869 UART: [fht] FMC Alias Private Key: 7
2,359,007 UART: [art] Derive CDI
2,359,287 UART: [art] Store in in slot 0x4
2,444,836 UART: [art] Derive Key Pair
2,445,196 UART: [art] Store priv key in slot 0x5
2,458,438 UART: [art] Derive Key Pair - Done
2,473,270 UART: [art] Signing Cert with AUTHO
2,473,750 UART: RITY.KEYID = 7
2,489,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,489,881 UART: [art] PUB.X = D5683A2104CCF779F02A70624B8BACE2B46D5CA969C156F4F23F141C02F4B708D4E1D9619D9F0CD2CC24C68DB2F5A849
2,496,651 UART: [art] PUB.Y = 22E6D6861FEC511C0A632999FDC23A87726E13843BBCEC4504A145FB1848B80096FE09467E28A09979AD0229563E2890
2,503,561 UART: [art] SIG.R = A71648FC1AE7C8B41A35C2E0EFCFAE2C80623F08D8D00C001EF1EF803EEF550A65190C7BA3F8B735A340DD88CCC18A0C
2,510,316 UART: [art] SIG.S = 2E874E2EE717BFA4C67FCAEFBD4D51C4B683DC59D3B7DC42B116FA60ED99B3E2A3E25A83DEFD906253E542CABB83BECE
2,533,947 UART: mbox::rt_entry...
2,534,319 UART: ____ _ _ _ ____ _____
2,535,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,535,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,536,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,537,439 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,538,207 UART: |_|
2,538,519 UART:
2,645,681 UART: [rt] Runtime listening for mailbox commands...
2,650,649 >>> mbox cmd response data (3272 bytes)
2,650,650 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,673,736 >>> mbox cmd response data (0 bytes)
2,673,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,109,846 >>> mbox cmd response: success
5,123,386 UART:
5,123,402 UART: Running Caliptra FMC ...
5,123,810 UART:
5,123,953 UART: [state] CFI Enabled
5,213,098 UART: [art] Extend RT PCRs Done
5,213,526 UART: [art] Lock RT PCRs Done
5,214,803 UART: [art] Populate DV Done
5,223,064 UART: [fht] FMC Alias Private Key: 7
5,224,088 UART: [art] Derive CDI
5,224,368 UART: [art] Store in in slot 0x4
5,310,089 UART: [art] Derive Key Pair
5,310,449 UART: [art] Store priv key in slot 0x5
5,324,181 UART: [art] Derive Key Pair - Done
5,338,849 UART: [art] Signing Cert with AUTHO
5,339,329 UART: RITY.KEYID = 7
5,354,501 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,266 UART: [art] PUB.X = 6B842AA747EC815A9EC717AECF8F53A336E0D3B7C04EBC4FC05EE8050CA00B91F452A26321AADFF9C4E32F616A9885B2
5,362,045 UART: [art] PUB.Y = 74A370D8547AAF505E5EB201DB321C68E357E7F03263F2172DB2CFE29FF7A741A8E2580F51EF21F4D3317719D746F065
5,368,991 UART: [art] SIG.R = 0B545885344A06BE7237A20002C010C908DC34B3655934DD036301D84400846049EECDD1F2F9E41E85EEFEAFF08F4B15
5,375,699 UART: [art] SIG.S = 57AD3090DE2C558B4A11D2DF0918E789359AB3BC3217872D2D9A36087617859AAA6B761B8C011D5732C3BEDEEACD3257
5,399,309 UART: Caliptra RT
5,399,654 UART: [state] CFI Enabled
5,694,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,695,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,726,265 UART: [rt]cmd =0x494e464f, len=4
5,730,012 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
85,995 UART: [state] WD Timer not started. Device not locked for debugging
87,120 UART: [kat] SHA2-256
890,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,799 UART: [kat] ++
894,951 UART: [kat] sha1
899,323 UART: [kat] SHA2-256
901,263 UART: [kat] SHA2-384
904,012 UART: [kat] SHA2-512-ACC
905,913 UART: [kat] ECC-384
915,552 UART: [kat] HMAC-384Kdf
920,006 UART: [kat] LMS
1,168,318 UART: [kat] --
1,169,295 UART: [cold-reset] ++
1,169,683 UART: [fht] FHT @ 0x50003400
1,172,331 UART: [idev] ++
1,172,499 UART: [idev] CDI.KEYID = 6
1,172,860 UART: [idev] SUBJECT.KEYID = 7
1,173,285 UART: [idev] UDS.KEYID = 0
1,173,631 ready_for_fw is high
1,173,631 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,545 UART: [idev] Erasing UDS.KEYID = 0
1,198,625 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,688 UART: [ldev] ++
1,208,856 UART: [ldev] CDI.KEYID = 6
1,209,220 UART: [ldev] SUBJECT.KEYID = 5
1,209,647 UART: [ldev] AUTHORITY.KEYID = 7
1,210,110 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,178 UART: [ldev] --
1,280,454 UART: [fwproc] Wait for Commands...
1,281,049 UART: [fwproc] Recv command 0x46574c44
1,281,782 UART: [fwproc] Recv'd Img size: 78532 bytes
2,169,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,875 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,308,113 >>> mbox cmd response: success
2,308,113 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,309,224 UART: [afmc] ++
2,309,392 UART: [afmc] CDI.KEYID = 6
2,309,755 UART: [afmc] SUBJECT.KEYID = 7
2,310,181 UART: [afmc] AUTHORITY.KEYID = 5
2,345,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,361,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,362,221 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,367,950 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,373,833 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,379,552 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,387,185 UART: [afmc] --
2,388,147 UART: [cold-reset] --
2,388,911 UART: [state] Locking Datavault
2,390,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,390,842 UART: [state] Locking ICCM
2,391,444 UART: [exit] Launching FMC @ 0x40000130
2,396,773 UART:
2,396,789 UART: Running Caliptra FMC ...
2,397,197 UART:
2,397,251 UART: [state] CFI Enabled
2,407,468 UART: [fht] FMC Alias Private Key: 7
2,516,217 UART: [art] Extend RT PCRs Done
2,516,645 UART: [art] Lock RT PCRs Done
2,518,081 UART: [art] Populate DV Done
2,526,406 UART: [fht] FMC Alias Private Key: 7
2,527,472 UART: [art] Derive CDI
2,527,752 UART: [art] Store in in slot 0x4
2,613,241 UART: [art] Derive Key Pair
2,613,601 UART: [art] Store priv key in slot 0x5
2,626,681 UART: [art] Derive Key Pair - Done
2,641,238 UART: [art] Signing Cert with AUTHO
2,641,718 UART: RITY.KEYID = 7
2,657,036 UART: [art] Erasing AUTHORITY.KEYID = 7
2,657,801 UART: [art] PUB.X = AD2A3E0788BCCC6BF8C46F26D55A57A70E1EDA0FCB501F143879D02A062E161AA71C3862376D237CF4D26517F8C3E6B9
2,664,571 UART: [art] PUB.Y = 8E98A7A69B8B4F40FE74CF3A101ADCEC438F9FC8A86D106E9A96E8183F5B4AF5CA438C4F1ABF9B8EE5F20229F6C32CB8
2,671,542 UART: [art] SIG.R = 370F075B276973A930EFEFC60256B958A4DD7394D00A0D4893AB822F67FA89B29D9EA814713B1530674616FF54304DFF
2,678,295 UART: [art] SIG.S = D4C16DDFA506ABB5493432CEC63B520262E7CF6FA73651902F6C4DCE3336253C96C6070B04340075CBE814A4222B1556
2,701,943 UART: mbox::rt_entry...
2,702,315 UART: ____ _ _ _ ____ _____
2,703,099 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,703,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,704,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,705,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,706,203 UART: |_|
2,706,515 UART:
2,814,115 UART: [rt] Runtime listening for mailbox commands...
2,819,083 >>> mbox cmd response data (3272 bytes)
2,819,084 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,842,170 >>> mbox cmd response data (0 bytes)
2,842,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,842,288 UART:
2,842,304 UART: Running Caliptra ROM ...
2,842,712 UART:
2,842,767 UART: [state] CFI Enabled
2,845,709 UART: [state] LifecycleState = Unprovisioned
2,846,364 UART: [state] DebugLocked = No
2,847,080 UART: [state] WD Timer not started. Device not locked for debugging
2,848,186 UART: [kat] SHA2-256
3,651,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,865 UART: [kat] ++
3,656,017 UART: [kat] sha1
3,660,067 UART: [kat] SHA2-256
3,662,007 UART: [kat] SHA2-384
3,664,698 UART: [kat] SHA2-512-ACC
3,666,598 UART: [kat] ECC-384
3,676,311 UART: [kat] HMAC-384Kdf
3,680,979 UART: [kat] LMS
3,929,291 UART: [kat] --
3,930,131 UART: [update-reset] ++
5,241,248 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,242,295 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,391,873 >>> mbox cmd response: success
5,392,048 UART: [update-reset] Copying MAN_2 To MAN_1
5,400,062 UART: [update-reset Success] --
5,400,987 UART: [state] Locking Datavault
5,401,779 UART: [state] Locking PCR0, PCR1 and PCR31
5,402,383 UART: [state] Locking ICCM
5,402,903 UART: [exit] Launching FMC @ 0x40000130
5,408,232 UART:
5,408,248 UART: Running Caliptra FMC ...
5,408,656 UART:
5,408,710 UART: [state] CFI Enabled
5,497,469 UART: [art] Extend RT PCRs Done
5,497,897 UART: [art] Lock RT PCRs Done
5,499,066 UART: [art] Populate DV Done
5,507,147 UART: [fht] FMC Alias Private Key: 7
5,508,185 UART: [art] Derive CDI
5,508,465 UART: [art] Store in in slot 0x4
5,593,614 UART: [art] Derive Key Pair
5,593,974 UART: [art] Store priv key in slot 0x5
5,607,782 UART: [art] Derive Key Pair - Done
5,622,694 UART: [art] Signing Cert with AUTHO
5,623,174 UART: RITY.KEYID = 7
5,638,514 UART: [art] Erasing AUTHORITY.KEYID = 7
5,639,279 UART: [art] PUB.X = 5AF2EE3A0F2CB81842ABE850CBC7FA77794D7CD97D4899C171D08CABFB15C7035FE61BC9F25057FCEF137A2531BB1D32
5,646,063 UART: [art] PUB.Y = F898F651C526D4AC9347E5EB3690AE44E761F88B7CE0B20ABBD8957F938220BDE7511C41981096F5D82727EDCEE6F803
5,653,013 UART: [art] SIG.R = 8DC968C4FEED6E4F5BF7AA19AE8935728BC0DF6B7BDC7F7850D0ED3C3AECF22ADE0C223659815F5AD83899D8253A6EA9
5,659,804 UART: [art] SIG.S = 62A5C2B88DDF5D650E02B0032F8C137289D838DF458EFFA75B922B02832C1AA152201F0640964AAA34C1567B5A96DB8D
5,684,480 UART: Caliptra RT
5,684,733 UART: [state] CFI Enabled
5,978,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,980,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,824 UART: [rt]cmd =0x494e464f, len=4
6,014,497 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,076 ready_for_fw is high
1,056,076 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,157,405 >>> mbox cmd response: success
2,157,405 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,219,217 UART:
2,219,233 UART: Running Caliptra FMC ...
2,219,641 UART:
2,219,695 UART: [state] CFI Enabled
2,230,042 UART: [fht] FMC Alias Private Key: 7
2,338,177 UART: [art] Extend RT PCRs Done
2,338,605 UART: [art] Lock RT PCRs Done
2,340,447 UART: [art] Populate DV Done
2,348,572 UART: [fht] FMC Alias Private Key: 7
2,349,586 UART: [art] Derive CDI
2,349,866 UART: [art] Store in in slot 0x4
2,435,309 UART: [art] Derive Key Pair
2,435,669 UART: [art] Store priv key in slot 0x5
2,449,321 UART: [art] Derive Key Pair - Done
2,463,902 UART: [art] Signing Cert with AUTHO
2,464,382 UART: RITY.KEYID = 7
2,479,570 UART: [art] Erasing AUTHORITY.KEYID = 7
2,480,335 UART: [art] PUB.X = 095906365BF1EE809BF7903C138B49E5719ED74558DEDB88695F54AC2B3AA5839B6711715E1E9A07C9746E7F962ED010
2,487,094 UART: [art] PUB.Y = 65CA542194A296474C4A8B1FB6865DF773EB49301F1BC7C7ED3E0803193AB5FBF143809F92A25F5BE9D834E87B5D1270
2,494,042 UART: [art] SIG.R = 801EF29392DC5EDF2500BD9F43A91C66EC1ABB5A20DB18B45B8E65CB68EFCEA8B2BA67CD17D524F8778DC8209D1410F1
2,500,810 UART: [art] SIG.S = 1441DAE27A2EFAE5D9335D8E4FFD23830262C332C584C522CA8188B9F59CB5FF6991F0BD54DB1D79FDE024091F41EC83
2,524,375 UART: mbox::rt_entry...
2,524,747 UART: ____ _ _ _ ____ _____
2,525,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,526,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,527,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,527,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,528,635 UART: |_|
2,528,947 UART:
2,636,083 UART: [rt] Runtime listening for mailbox commands...
2,641,051 >>> mbox cmd response data (3272 bytes)
2,641,052 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,664,138 >>> mbox cmd response data (0 bytes)
2,664,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,093,862 >>> mbox cmd response: success
5,107,140 UART:
5,107,156 UART: Running Caliptra FMC ...
5,107,564 UART:
5,107,618 UART: [state] CFI Enabled
5,196,359 UART: [art] Extend RT PCRs Done
5,196,787 UART: [art] Lock RT PCRs Done
5,198,086 UART: [art] Populate DV Done
5,206,235 UART: [fht] FMC Alias Private Key: 7
5,207,275 UART: [art] Derive CDI
5,207,555 UART: [art] Store in in slot 0x4
5,293,340 UART: [art] Derive Key Pair
5,293,700 UART: [art] Store priv key in slot 0x5
5,306,450 UART: [art] Derive Key Pair - Done
5,321,299 UART: [art] Signing Cert with AUTHO
5,321,779 UART: RITY.KEYID = 7
5,337,153 UART: [art] Erasing AUTHORITY.KEYID = 7
5,337,918 UART: [art] PUB.X = ABE112F08D12A86DF8551B0C9CB310A8FD4728370AB4317ACD1C9FF9648CE21EC17231A5BC434F4B72FBFFFFB39DF0EC
5,344,706 UART: [art] PUB.Y = 5C5DE17237A0003B3D58CAD8FC5D1F2F33475C3470B73AAA149AE0265A8CCB172C81BA758406D51B0F3EE6C611BBF078
5,351,640 UART: [art] SIG.R = 64E96A87C96738D0EC413AC435BDAB57C5454D7E36A5266B48F6DACD7079BEE68706E65607CB76D026960E39C7009BE8
5,358,383 UART: [art] SIG.S = 04E6B7E1AC4A75C560EEFB6EDEFFEBCE5781464C3D8EA3D324CA666BAD5A2ABE0E21070DFABD3C11986ACADA21E7E7CE
5,382,600 UART: Caliptra RT
5,382,853 UART: [state] CFI Enabled
5,676,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,678,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,708,284 UART: [rt]cmd =0x494e464f, len=4
5,712,159 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,773 UART: [state] LifecycleState = Unprovisioned
86,428 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,123 UART: [kat] SHA2-256
891,673 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
921,077 UART: [kat] LMS
1,169,389 UART: [kat] --
1,170,208 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,346 UART: [idev] ++
1,173,514 UART: [idev] CDI.KEYID = 6
1,173,875 UART: [idev] SUBJECT.KEYID = 7
1,174,300 UART: [idev] UDS.KEYID = 0
1,174,646 ready_for_fw is high
1,174,646 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,207,992 UART: [idev] --
1,208,917 UART: [ldev] ++
1,209,085 UART: [ldev] CDI.KEYID = 6
1,209,449 UART: [ldev] SUBJECT.KEYID = 5
1,209,876 UART: [ldev] AUTHORITY.KEYID = 7
1,210,339 UART: [ldev] FE.KEYID = 1
1,215,597 UART: [ldev] Erasing FE.KEYID = 1
1,241,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,673 UART: [ldev] --
1,281,105 UART: [fwproc] Wait for Commands...
1,281,694 UART: [fwproc] Recv command 0x46574c44
1,282,427 UART: [fwproc] Recv'd Img size: 78532 bytes
2,169,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,196,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,225,386 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,307,434 >>> mbox cmd response: success
2,307,434 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,308,663 UART: [afmc] ++
2,308,831 UART: [afmc] CDI.KEYID = 6
2,309,194 UART: [afmc] SUBJECT.KEYID = 7
2,309,620 UART: [afmc] AUTHORITY.KEYID = 5
2,345,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,362,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,363,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,368,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,374,662 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,380,381 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,388,198 UART: [afmc] --
2,389,260 UART: [cold-reset] --
2,390,088 UART: [state] Locking Datavault
2,391,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,391,869 UART: [state] Locking ICCM
2,392,425 UART: [exit] Launching FMC @ 0x40000130
2,397,754 UART:
2,397,770 UART: Running Caliptra FMC ...
2,398,178 UART:
2,398,321 UART: [state] CFI Enabled
2,409,016 UART: [fht] FMC Alias Private Key: 7
2,517,929 UART: [art] Extend RT PCRs Done
2,518,357 UART: [art] Lock RT PCRs Done
2,520,031 UART: [art] Populate DV Done
2,528,294 UART: [fht] FMC Alias Private Key: 7
2,529,462 UART: [art] Derive CDI
2,529,742 UART: [art] Store in in slot 0x4
2,615,029 UART: [art] Derive Key Pair
2,615,389 UART: [art] Store priv key in slot 0x5
2,629,311 UART: [art] Derive Key Pair - Done
2,644,007 UART: [art] Signing Cert with AUTHO
2,644,487 UART: RITY.KEYID = 7
2,660,107 UART: [art] Erasing AUTHORITY.KEYID = 7
2,660,872 UART: [art] PUB.X = 272C08AB526F96725F47615B76AD2853599D0A11C043E42A502B5F6D84E2F142716D3D1551B8612AD7F10795A19B5540
2,667,623 UART: [art] PUB.Y = 118558E75779702F9E36080A2BC42836123172BED4C76B2822ADBC927962208943033348E21C5D97EE9C200B924E277E
2,674,547 UART: [art] SIG.R = 26BFAE68493C7F9D4CFEF3D41EB7C48EEE8A2EABC4DF8AB84CC2605433703FD15A45DFC7CD2F758D2598BD165A606D2A
2,681,343 UART: [art] SIG.S = 3A47AF05FFEB2A8A810C35FC650304C8CB8111CF714F9F91C95889B941EA8206321EAFFB270CC23859497E1A42E591CF
2,705,480 UART: mbox::rt_entry...
2,705,852 UART: ____ _ _ _ ____ _____
2,706,636 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,707,436 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,708,204 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,708,972 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,709,740 UART: |_|
2,710,052 UART:
2,817,722 UART: [rt] Runtime listening for mailbox commands...
2,822,690 >>> mbox cmd response data (3272 bytes)
2,822,691 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,845,777 >>> mbox cmd response data (0 bytes)
2,845,778 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,845,895 UART:
2,845,911 UART: Running Caliptra ROM ...
2,846,319 UART:
2,846,461 UART: [state] CFI Enabled
2,849,139 UART: [state] LifecycleState = Unprovisioned
2,849,794 UART: [state] DebugLocked = No
2,850,358 UART: [state] WD Timer not started. Device not locked for debugging
2,851,718 UART: [kat] SHA2-256
3,655,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,659,397 UART: [kat] ++
3,659,549 UART: [kat] sha1
3,663,821 UART: [kat] SHA2-256
3,665,761 UART: [kat] SHA2-384
3,668,428 UART: [kat] SHA2-512-ACC
3,670,328 UART: [kat] ECC-384
3,679,973 UART: [kat] HMAC-384Kdf
3,684,759 UART: [kat] LMS
3,933,071 UART: [kat] --
3,933,905 UART: [update-reset] ++
5,244,964 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,246,005 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
5,395,583 >>> mbox cmd response: success
5,395,880 UART: [update-reset] Copying MAN_2 To MAN_1
5,403,894 UART: [update-reset Success] --
5,404,829 UART: [state] Locking Datavault
5,405,531 UART: [state] Locking PCR0, PCR1 and PCR31
5,406,135 UART: [state] Locking ICCM
5,406,585 UART: [exit] Launching FMC @ 0x40000130
5,411,914 UART:
5,411,930 UART: Running Caliptra FMC ...
5,412,338 UART:
5,412,481 UART: [state] CFI Enabled
5,501,596 UART: [art] Extend RT PCRs Done
5,502,024 UART: [art] Lock RT PCRs Done
5,502,959 UART: [art] Populate DV Done
5,511,186 UART: [fht] FMC Alias Private Key: 7
5,512,258 UART: [art] Derive CDI
5,512,538 UART: [art] Store in in slot 0x4
5,598,433 UART: [art] Derive Key Pair
5,598,793 UART: [art] Store priv key in slot 0x5
5,611,819 UART: [art] Derive Key Pair - Done
5,626,779 UART: [art] Signing Cert with AUTHO
5,627,259 UART: RITY.KEYID = 7
5,642,741 UART: [art] Erasing AUTHORITY.KEYID = 7
5,643,506 UART: [art] PUB.X = 1910055E107C21D93D2A6B99BF2F24E31C5B5881877DF16DF60D49BD541B79EA7704E8F328719C9D043821FE92DF2680
5,650,262 UART: [art] PUB.Y = 77AC7FFAE0AB43AAEC1574DD966E11A76DAADF28C6DC16A12492D7EC51BC4B9E765C3235CF8AFFB5D1628060CDA41892
5,657,236 UART: [art] SIG.R = 778EF3A1253D4F985E0D80A688BF214006F307F8AEC20F4FA1A18EE9F12A7B230F9A32FDD44A989017D4AEE7AAFE2DD0
5,664,009 UART: [art] SIG.S = F115EA48F7227AAAE98B0D55A62FE4E4B32B2A06FFF0587A69A2EE9740829A6AA921EF26BD3F033AAB97E95FA067731A
5,688,021 UART: Caliptra RT
5,688,366 UART: [state] CFI Enabled
5,984,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,986,417 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,016,743 UART: [rt]cmd =0x494e464f, len=4
6,020,670 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,269 ready_for_fw is high
1,057,269 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
2,159,076 >>> mbox cmd response: success
2,159,076 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,220,914 UART:
2,220,930 UART: Running Caliptra FMC ...
2,221,338 UART:
2,221,481 UART: [state] CFI Enabled
2,232,232 UART: [fht] FMC Alias Private Key: 7
2,340,077 UART: [art] Extend RT PCRs Done
2,340,505 UART: [art] Lock RT PCRs Done
2,342,261 UART: [art] Populate DV Done
2,350,568 UART: [fht] FMC Alias Private Key: 7
2,351,598 UART: [art] Derive CDI
2,351,878 UART: [art] Store in in slot 0x4
2,437,613 UART: [art] Derive Key Pair
2,437,973 UART: [art] Store priv key in slot 0x5
2,451,579 UART: [art] Derive Key Pair - Done
2,466,738 UART: [art] Signing Cert with AUTHO
2,467,218 UART: RITY.KEYID = 7
2,482,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,969 UART: [art] PUB.X = 9FAB7468045ADAEBEBC4A25C20DECABF2697DF912B834FE00E5278927C5C9BBAE9A1FB473253B5705B9EE22074C40421
2,489,746 UART: [art] PUB.Y = 2C49C01F6BF9A5364AA73F30E6AE080790450E2C74D827121502005E670B610C9E5CD4C1B65AA795F91D1A586E835FC3
2,496,656 UART: [art] SIG.R = A42B065B104D5C196C2CBE732C89F659B94840EFB74B5D69DB604DD7B0D932DB1806ED95868141D2DE7471998A741888
2,503,420 UART: [art] SIG.S = 1CAAB36E04E692D1C4182C90E28C6FDCE84482059F9DB8761D54B854129EF29D2158FB294711C47E21CDB08437B8632E
2,527,593 UART: mbox::rt_entry...
2,527,965 UART: ____ _ _ _ ____ _____
2,528,749 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,529,549 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,530,317 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,531,085 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,531,853 UART: |_|
2,532,165 UART:
2,637,663 UART: [rt] Runtime listening for mailbox commands...
2,642,631 >>> mbox cmd response data (3272 bytes)
2,642,632 <<< Executing mbox cmd 0xb0000000 (3272 bytes) from SoC
2,665,718 >>> mbox cmd response data (0 bytes)
2,665,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,095,641 >>> mbox cmd response: success
5,108,785 UART:
5,108,801 UART: Running Caliptra FMC ...
5,109,209 UART:
5,109,352 UART: [state] CFI Enabled
5,198,113 UART: [art] Extend RT PCRs Done
5,198,541 UART: [art] Lock RT PCRs Done
5,200,060 UART: [art] Populate DV Done
5,208,373 UART: [fht] FMC Alias Private Key: 7
5,209,515 UART: [art] Derive CDI
5,209,795 UART: [art] Store in in slot 0x4
5,295,526 UART: [art] Derive Key Pair
5,295,886 UART: [art] Store priv key in slot 0x5
5,309,244 UART: [art] Derive Key Pair - Done
5,324,056 UART: [art] Signing Cert with AUTHO
5,324,536 UART: RITY.KEYID = 7
5,340,010 UART: [art] Erasing AUTHORITY.KEYID = 7
5,340,775 UART: [art] PUB.X = 3CB71916AEB9D55D38BF8ECA9944F6AAF0A71EEFA4AB5FC822E343DDBD27AA28D4F867918939AD1026A453A9D34CC072
5,347,565 UART: [art] PUB.Y = 1F40833EB52DB26F5BE3D1EC7B7AD8358034C8927DB994DCA16BBC121F97E92CCD79A6F32AAE7950F3289A5487616F17
5,354,525 UART: [art] SIG.R = 9DC8EB7DA1328EAF0381513E5C858F491B3CE5E373C7CEBC68E709ADA6988F981BFF2D79C797630A1124858A923030CE
5,361,294 UART: [art] SIG.S = E0965AA00CDF9F8B979B776BABE12560236D7148DDD1264E8E8C73EA862BC2243708B5B0502754F9B74D2839B38FCD27
5,384,665 UART: Caliptra RT
5,385,010 UART: [state] CFI Enabled
5,681,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,682,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,712,756 UART: [rt]cmd =0x494e464f, len=4
5,716,483 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,127 UART:
192,494 UART: Running Caliptra ROM ...
193,672 UART:
193,823 UART: [state] CFI Enabled
261,644 UART: [state] LifecycleState = Unprovisioned
263,635 UART: [state] DebugLocked = No
265,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,230 UART: [kat] SHA2-256
439,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,459 UART: [kat] ++
450,945 UART: [kat] sha1
461,320 UART: [kat] SHA2-256
464,045 UART: [kat] SHA2-384
471,098 UART: [kat] SHA2-512-ACC
473,461 UART: [kat] ECC-384
2,767,180 UART: [kat] HMAC-384Kdf
2,780,984 UART: [kat] LMS
3,971,238 UART: [kat] --
3,976,530 UART: [cold-reset] ++
3,978,103 UART: [fht] Storing FHT @ 0x50003400
3,989,650 UART: [idev] ++
3,990,291 UART: [idev] CDI.KEYID = 6
3,991,196 UART: [idev] SUBJECT.KEYID = 7
3,992,434 UART: [idev] UDS.KEYID = 0
3,993,475 ready_for_fw is high
3,993,690 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,136,868 UART: [idev] Erasing UDS.KEYID = 0
7,327,634 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,754 UART: [idev] --
7,354,061 UART: [ldev] ++
7,354,827 UART: [ldev] CDI.KEYID = 6
7,355,742 UART: [ldev] SUBJECT.KEYID = 5
7,356,846 UART: [ldev] AUTHORITY.KEYID = 7
7,358,070 UART: [ldev] FE.KEYID = 1
7,402,741 UART: [ldev] Erasing FE.KEYID = 1
10,732,100 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,446 UART: [ldev] --
13,092,479 UART: [fwproc] Waiting for Commands...
13,095,812 UART: [fwproc] Received command 0x46574c44
13,097,986 UART: [fwproc] Received Image of size 113844 bytes
17,142,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,218,393 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,287,294 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,602,906 >>> mbox cmd response: success
17,606,501 UART: [afmc] ++
17,607,089 UART: [afmc] CDI.KEYID = 6
17,608,072 UART: [afmc] SUBJECT.KEYID = 7
17,609,288 UART: [afmc] AUTHORITY.KEYID = 5
20,965,882 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,264,819 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,267,129 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,281,558 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,296,339 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,310,787 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,330,528 UART: [afmc] --
23,333,628 UART: [cold-reset] --
23,336,078 UART: [state] Locking Datavault
23,340,840 UART: [state] Locking PCR0, PCR1 and PCR31
23,342,598 UART: [state] Locking ICCM
23,345,176 UART: [exit] Launching FMC @ 0x40000130
23,353,518 UART:
23,353,746 UART: Running Caliptra FMC ...
23,355,050 UART:
23,355,227 UART: [state] CFI Enabled
23,423,897 UART: [fht] FMC Alias Private Key: 7
25,762,633 UART: [art] Extend RT PCRs Done
25,763,850 UART: [art] Lock RT PCRs Done
25,765,682 UART: [art] Populate DV Done
25,770,870 UART: [fht] FMC Alias Private Key: 7
25,772,429 UART: [art] Derive CDI
25,773,238 UART: [art] Store in in slot 0x4
25,832,279 UART: [art] Derive Key Pair
25,833,272 UART: [art] Store priv key in slot 0x5
29,125,651 UART: [art] Derive Key Pair - Done
29,138,707 UART: [art] Signing Cert with AUTHO
29,140,011 UART: RITY.KEYID = 7
31,426,186 UART: [art] Erasing AUTHORITY.KEYID = 7
31,427,696 UART: [art] PUB.X = 6E5563DEB67955D23A116D673630A8A2BF984D6613AD9549B37BE650351A7272F675D0C37DD948EA5E32E05160318916
31,434,990 UART: [art] PUB.Y = 5DEACE25DAB7B3EC9E0C12A805FA3AD2F05C73CEEC434E4FD42DEA451D21476B02BB70ADCF5A3DBFEFB00CE3E639BE28
31,442,201 UART: [art] SIG.R = 8DD45E0DD17AAC35A3BD5FBD8F5C8DA698073BD528D3171A5896EB08B212021287481149070A60552034D5EBCD11C701
31,449,567 UART: [art] SIG.S = 7FC2EAC1EC80DF027173C424145CA571E01395B384E11E71B67E85A1EDEBA1B45FEE014DFF2DCE0BB45A376D493613D8
32,755,011 UART: Caliptra RT
32,755,727 UART: [state] CFI Enabled
32,916,789 UART: [rt] RT listening for mailbox commands...
32,919,197 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,949,579 UART: [rt]cmd =0x50435252, len=8
32,951,767 >>> mbox cmd response data (8 bytes)
35,004,180 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,104,742 UART:
35,105,109 UART: Running Caliptra ROM ...
35,106,228 UART:
35,106,394 UART: [state] CFI Enabled
35,180,081 UART: [state] LifecycleState = Unprovisioned
35,182,020 UART: [state] DebugLocked = No
35,184,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,189,919 UART: [kat] SHA2-256
35,359,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,370,112 UART: [kat] ++
35,370,567 UART: [kat] sha1
35,380,781 UART: [kat] SHA2-256
35,383,471 UART: [kat] SHA2-384
35,389,504 UART: [kat] SHA2-512-ACC
35,391,898 UART: [kat] ECC-384
37,684,370 UART: [kat] HMAC-384Kdf
37,717,123 UART: [kat] LMS
38,907,438 UART: [kat] --
38,912,306 UART: [update-reset] ++
42,615,470 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,618,919 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,876,790 >>> mbox cmd response: success
42,877,204 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,877,500 UART: [update-reset] Copying MAN_2 To MAN_1
42,899,453 UART: [update-reset Success] --
42,903,648 UART: [state] Locking Datavault
42,907,326 UART: [state] Locking PCR0, PCR1 and PCR31
42,909,071 UART: [state] Locking ICCM
42,910,948 UART: [exit] Launching FMC @ 0x40000130
42,919,360 UART:
42,919,586 UART: Running Caliptra FMC ...
42,920,682 UART:
42,920,828 UART: [state] CFI Enabled
43,019,494 UART: [art] Extend RT PCRs Done
43,020,677 UART: [art] Lock RT PCRs Done
43,022,020 UART: [art] Populate DV Done
43,027,534 UART: [fht] FMC Alias Private Key: 7
43,029,220 UART: [art] Derive CDI
43,030,044 UART: [art] Store in in slot 0x4
43,088,202 UART: [art] Derive Key Pair
43,089,242 UART: [art] Store priv key in slot 0x5
46,382,255 UART: [art] Derive Key Pair - Done
46,395,131 UART: [art] Signing Cert with AUTHO
46,396,467 UART: RITY.KEYID = 7
48,684,325 UART: [art] Erasing AUTHORITY.KEYID = 7
48,685,840 UART: [art] PUB.X = 45C63D8DE4750F2B679E334255BD94F4652CF3B36C942E344098D84981ACB01C51034A05DAF83D72E34F5D0DCC3621F5
48,693,075 UART: [art] PUB.Y = 7BEE170BC6EF24F8CF2A2BA869D332AD94CB7A6BEFF604DE6C72034F23446A2DA85D76BF9B15A6E905C853D4C6B2A863
48,700,310 UART: [art] SIG.R = C2F89A85A12FF7BBFBA648426415DD757A2B8ED6BD4FE2E77E3A35F73BA229C6D57C73968F0656E2691ED9B2832849C4
48,707,682 UART: [art] SIG.S = 1685EC6ACE0726CC505D1BF8CD5DD918BC472BBF9FE1851C9D56971B94323C81702D5B473A5105FD459073DBFE66B60C
50,012,528 UART: mbox::rt_entry...
50,013,495 UART: ____ _ _ _ ____ _____
50,015,424 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,017,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,019,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,021,197 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,023,047 UART: |_|
50,023,925 UART:
50,305,952 UART: [rt] Runtime listening for mailbox commands...
50,307,958 >>> mbox cmd response data (128 bytes)
52,363,973 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,463,751 UART:
52,464,087 UART: Running Caliptra ROM ...
52,465,215 UART:
52,465,382 UART: [state] CFI Enabled
52,526,231 UART: [state] LifecycleState = Unprovisioned
52,528,155 UART: [state] DebugLocked = No
52,531,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,535,693 UART: [kat] SHA2-256
52,705,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,715,876 UART: [kat] ++
52,716,337 UART: [kat] sha1
52,726,841 UART: [kat] SHA2-256
52,729,532 UART: [kat] SHA2-384
52,736,537 UART: [kat] SHA2-512-ACC
52,738,875 UART: [kat] ECC-384
55,025,860 UART: [kat] HMAC-384Kdf
55,036,267 UART: [kat] LMS
56,226,634 UART: [kat] --
56,231,129 UART: [update-reset] ++
59,935,912 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,940,172 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
60,198,017 >>> mbox cmd response: success
60,198,411 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,198,855 UART: [update-reset] Copying MAN_2 To MAN_1
60,221,290 UART: [update-reset Success] --
60,227,420 UART: [state] Locking Datavault
60,231,595 UART: [state] Locking PCR0, PCR1 and PCR31
60,233,340 UART: [state] Locking ICCM
60,234,670 UART: [exit] Launching FMC @ 0x40000130
60,243,123 UART:
60,243,358 UART: Running Caliptra FMC ...
60,244,457 UART:
60,244,605 UART: [state] CFI Enabled
60,337,705 UART: [art] Extend RT PCRs Done
60,338,880 UART: [art] Lock RT PCRs Done
60,340,385 UART: [art] Populate DV Done
60,345,675 UART: [fht] FMC Alias Private Key: 7
60,347,418 UART: [art] Derive CDI
60,348,219 UART: [art] Store in in slot 0x4
60,406,920 UART: [art] Derive Key Pair
60,407,949 UART: [art] Store priv key in slot 0x5
63,700,706 UART: [art] Derive Key Pair - Done
63,713,865 UART: [art] Signing Cert with AUTHO
63,715,163 UART: RITY.KEYID = 7
66,002,060 UART: [art] Erasing AUTHORITY.KEYID = 7
66,003,570 UART: [art] PUB.X = 3C3AA02559B817D27BAFC73653743B4902C46BFC6FCEE110C0E1CAA7875D6268BF1B83E851C74120BF683B4CA067BE89
66,010,816 UART: [art] PUB.Y = F8CEE1D2BD6BF7F8A98E4FEF69ABC5FDDF57C5AE2E9E4E183D730042F63B69A4B40A69727048CC6C365382C0B26BEE33
66,018,109 UART: [art] SIG.R = E05191ADDB401E74713D9758204289F5F7D00995DBDF0D83C8F4FE1DF55786532FCF10A547C5C52601DE9B516C9FBCD9
66,025,493 UART: [art] SIG.S = 4D0C76FAE2A5866BA2B27BBAD19B321ED761F44E3AFB11988EEFACEA079932A8E5B24A74B98C35BC3E46C89B2EAC9A77
67,330,225 UART: mbox::rt_entry...
67,331,172 UART: ____ _ _ _ ____ _____
67,333,146 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,335,142 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,337,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,338,995 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,340,915 UART: |_|
67,341,715 UART:
67,622,279 UART: [rt] Runtime listening for mailbox commands...
67,624,282 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,804,803 ready_for_fw is high
3,805,225 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,890,278 >>> mbox cmd response: success
23,587,410 UART:
23,587,802 UART: Running Caliptra FMC ...
23,588,991 UART:
23,589,152 UART: [state] CFI Enabled
23,653,933 UART: [fht] FMC Alias Private Key: 7
25,991,967 UART: [art] Extend RT PCRs Done
25,993,231 UART: [art] Lock RT PCRs Done
25,994,776 UART: [art] Populate DV Done
26,000,185 UART: [fht] FMC Alias Private Key: 7
26,001,748 UART: [art] Derive CDI
26,002,486 UART: [art] Store in in slot 0x4
26,062,743 UART: [art] Derive Key Pair
26,063,783 UART: [art] Store priv key in slot 0x5
29,356,492 UART: [art] Derive Key Pair - Done
29,369,698 UART: [art] Signing Cert with AUTHO
29,371,026 UART: RITY.KEYID = 7
31,658,438 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,947 UART: [art] PUB.X = AF7C4BC49EF8D823673B0FEEE63683DBE394753C831FEE2314F278AE9C9CA1B561C9612C44A0B64A5D6E866244BF5E44
31,667,212 UART: [art] PUB.Y = C75F08C507CA938BC200AE345E889D7DE1714A55E78640CA20FFBAC1CB8FB29116C28BA17BF70C73FB1FC6177711A1AF
31,674,462 UART: [art] SIG.R = 7F6C328CB83AD770FEA0F6B049F778A260FA8629E14971C82E1B75736EC705E602B980FD51F54A095127B4A7F6B79903
31,681,804 UART: [art] SIG.S = 8D0D4B2D2881C6C5947A3337BBE579C98223B64FD980C84DBC10FC1CCDA6AB7EB833494F36E22FAC0E8D20695C5F0801
32,987,244 UART: Caliptra RT
32,987,956 UART: [state] CFI Enabled
33,148,735 UART: [rt] RT listening for mailbox commands...
33,151,011 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,181,596 UART: [rt]cmd =0x50435252, len=8
33,183,526 >>> mbox cmd response data (8 bytes)
35,238,600 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,191,720 >>> mbox cmd response: success
43,192,222 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,226,118 UART:
43,226,445 UART: Running Caliptra FMC ...
43,227,567 UART:
43,227,728 UART: [state] CFI Enabled
43,331,908 UART: [art] Extend RT PCRs Done
43,333,091 UART: [art] Lock RT PCRs Done
43,334,544 UART: [art] Populate DV Done
43,340,140 UART: [fht] FMC Alias Private Key: 7
43,341,650 UART: [art] Derive CDI
43,342,378 UART: [art] Store in in slot 0x4
43,401,379 UART: [art] Derive Key Pair
43,402,445 UART: [art] Store priv key in slot 0x5
46,694,904 UART: [art] Derive Key Pair - Done
46,708,010 UART: [art] Signing Cert with AUTHO
46,709,317 UART: RITY.KEYID = 7
48,996,751 UART: [art] Erasing AUTHORITY.KEYID = 7
48,998,254 UART: [art] PUB.X = 791EAFE4F3EF82DB5142D03452D105C6F2246F1B196BB2FEFDD62F804111B7338E987FB9BF4A48278F4C30C72D16417B
49,005,502 UART: [art] PUB.Y = 6832B87A897E6C5DC05AA8486A19714CC27E9E24C23A4330976E01032C5D3CD4DFF728F73E0A21D04C5F050D78461F22
49,012,720 UART: [art] SIG.R = A2AE4765E846C300203B4853BEDE9389D89171EB5E575699C6315C01648BA1E51D4ECA8C5C264A12D118769E5429A982
49,020,095 UART: [art] SIG.S = 8A7463007949DFCE16168BFB9B4FCAB47CF6C1BF0B37A92F078B78B5DD4EC723BDE79E8B2FFDFEDFECEADBC6549E297A
50,324,678 UART: mbox::rt_entry...
50,325,627 UART: ____ _ _ _ ____ _____
50,327,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,329,570 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,331,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,333,339 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,335,186 UART: |_|
50,336,059 UART:
50,625,152 UART: [rt] Runtime listening for mailbox commands...
50,627,232 >>> mbox cmd response data (128 bytes)
52,676,941 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
60,637,134 >>> mbox cmd response: success
60,637,653 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,670,307 UART:
60,670,636 UART: Running Caliptra FMC ...
60,671,696 UART:
60,671,847 UART: [state] CFI Enabled
60,777,703 UART: [art] Extend RT PCRs Done
60,778,888 UART: [art] Lock RT PCRs Done
60,780,306 UART: [art] Populate DV Done
60,785,771 UART: [fht] FMC Alias Private Key: 7
60,787,353 UART: [art] Derive CDI
60,788,101 UART: [art] Store in in slot 0x4
60,846,512 UART: [art] Derive Key Pair
60,847,545 UART: [art] Store priv key in slot 0x5
64,140,671 UART: [art] Derive Key Pair - Done
64,153,725 UART: [art] Signing Cert with AUTHO
64,155,031 UART: RITY.KEYID = 7
66,442,534 UART: [art] Erasing AUTHORITY.KEYID = 7
66,444,788 UART: [art] PUB.X = 9D1FB36B539C6F4A90094FADB6E8CBFC2A09ED7B86D4DEDC63A23C60915A3A32FE83D0B9926F844C5BD8F1C202A9B3D5
66,451,336 UART: [art] PUB.Y = B55B7DF415573B4F78A548D5A00D5F7DD4E87517FF71BA028FEB3DFA082AAD547B20E33092251E833810C43167546958
66,458,574 UART: [art] SIG.R = 7227FDB9CDC74570AE1258C083D819F7998595CB82B7C9D8FD3A35BE86BEABAB140940F0C5365A58F4EE236FCB75F180
66,465,967 UART: [art] SIG.S = C3E6A978606512245050FC3DE0272C9392C15DE30772AC0102A5AA57EC27B772C9C0AFD6A1240B7E314814401020E38E
67,771,115 UART: mbox::rt_entry...
67,772,203 UART: ____ _ _ _ ____ _____
67,774,103 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,776,106 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,778,096 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,780,032 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,781,887 UART: |_|
67,782,687 UART:
68,068,269 UART: [rt] Runtime listening for mailbox commands...
68,070,285 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
192,581 UART:
192,946 UART: Running Caliptra ROM ...
194,047 UART:
603,651 UART: [state] CFI Enabled
618,950 UART: [state] LifecycleState = Unprovisioned
620,895 UART: [state] DebugLocked = No
622,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,192 UART: [kat] SHA2-256
797,919 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,449 UART: [kat] ++
808,900 UART: [kat] sha1
820,269 UART: [kat] SHA2-256
822,995 UART: [kat] SHA2-384
829,199 UART: [kat] SHA2-512-ACC
831,568 UART: [kat] ECC-384
3,116,099 UART: [kat] HMAC-384Kdf
3,127,769 UART: [kat] LMS
4,317,853 UART: [kat] --
4,323,552 UART: [cold-reset] ++
4,326,051 UART: [fht] Storing FHT @ 0x50003400
4,338,384 UART: [idev] ++
4,338,945 UART: [idev] CDI.KEYID = 6
4,339,828 UART: [idev] SUBJECT.KEYID = 7
4,341,143 UART: [idev] UDS.KEYID = 0
4,342,182 ready_for_fw is high
4,342,420 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,479 UART: [idev] Erasing UDS.KEYID = 0
7,634,762 UART: [idev] Using Sha1 for KeyId Algorithm
7,656,822 UART: [idev] --
7,661,096 UART: [ldev] ++
7,661,677 UART: [ldev] CDI.KEYID = 6
7,662,697 UART: [ldev] SUBJECT.KEYID = 5
7,663,934 UART: [ldev] AUTHORITY.KEYID = 7
7,665,125 UART: [ldev] FE.KEYID = 1
7,674,745 UART: [ldev] Erasing FE.KEYID = 1
10,959,638 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,925 UART: [ldev] --
13,320,857 UART: [fwproc] Waiting for Commands...
13,324,193 UART: [fwproc] Received command 0x46574c44
13,326,378 UART: [fwproc] Received Image of size 113844 bytes
17,371,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,446,714 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,515,632 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,831,722 >>> mbox cmd response: success
17,835,033 UART: [afmc] ++
17,835,635 UART: [afmc] CDI.KEYID = 6
17,836,580 UART: [afmc] SUBJECT.KEYID = 7
17,837,798 UART: [afmc] AUTHORITY.KEYID = 5
21,152,508 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,444,065 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,326 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,701 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,570 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,012 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,512,364 UART: [afmc] --
23,515,482 UART: [cold-reset] --
23,519,505 UART: [state] Locking Datavault
23,525,072 UART: [state] Locking PCR0, PCR1 and PCR31
23,526,782 UART: [state] Locking ICCM
23,528,148 UART: [exit] Launching FMC @ 0x40000130
23,536,485 UART:
23,536,719 UART: Running Caliptra FMC ...
23,537,817 UART:
23,537,976 UART: [state] CFI Enabled
23,546,021 UART: [fht] FMC Alias Private Key: 7
25,876,586 UART: [art] Extend RT PCRs Done
25,877,808 UART: [art] Lock RT PCRs Done
25,879,623 UART: [art] Populate DV Done
25,885,199 UART: [fht] FMC Alias Private Key: 7
25,886,922 UART: [art] Derive CDI
25,887,742 UART: [art] Store in in slot 0x4
25,930,568 UART: [art] Derive Key Pair
25,931,630 UART: [art] Store priv key in slot 0x5
29,173,096 UART: [art] Derive Key Pair - Done
29,185,652 UART: [art] Signing Cert with AUTHO
29,186,979 UART: RITY.KEYID = 7
31,466,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,467,897 UART: [art] PUB.X = C93E2B985CC243E72FF7427E9797A4E3605E72C8FA493B85335CB0228A57C35E699656E423B2F1E18D850D72EB2C56AE
31,475,100 UART: [art] PUB.Y = E4F95CF14C4C1F89FF5EE1E44F4F3600E1237DE7FB2C890D28B8D2359397EA2A40040DE6110E7255144CFF21F890A67A
31,482,353 UART: [art] SIG.R = A934E53FA7518FBBBF9F4D8779C7A2B19BB3D3AB99066BF9B5C27DF12C75A4FD58D0611096EBCB28E5DEC3E5F9D8C80A
31,489,753 UART: [art] SIG.S = EF7B59435F7ADBE5C8A4C898AEDFB32A19F062F822C5BCA260A6A70D4DDB1C270091478B7A188F46A2D84148CD85F728
32,794,658 UART: Caliptra RT
32,795,368 UART: [state] CFI Enabled
32,912,811 UART: [rt] RT listening for mailbox commands...
32,915,161 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
32,945,681 UART: [rt]cmd =0x50435252, len=8
32,947,843 >>> mbox cmd response data (8 bytes)
35,069,463 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,170,087 UART:
35,170,445 UART: Running Caliptra ROM ...
35,171,581 UART:
35,171,755 UART: [state] CFI Enabled
35,183,405 UART: [state] LifecycleState = Unprovisioned
35,185,224 UART: [state] DebugLocked = No
35,187,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,192,984 UART: [kat] SHA2-256
35,362,667 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,373,246 UART: [kat] ++
35,373,792 UART: [kat] sha1
35,384,096 UART: [kat] SHA2-256
35,386,797 UART: [kat] SHA2-384
35,392,297 UART: [kat] SHA2-512-ACC
35,394,707 UART: [kat] ECC-384
37,677,394 UART: [kat] HMAC-384Kdf
37,688,326 UART: [kat] LMS
38,878,365 UART: [kat] --
38,884,475 UART: [update-reset] ++
42,600,008 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,602,994 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,860,839 >>> mbox cmd response: success
42,861,266 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,862,644 UART: [update-reset] Copying MAN_2 To MAN_1
42,885,072 UART: [update-reset Success] --
42,888,684 UART: [state] Locking Datavault
42,891,187 UART: [state] Locking PCR0, PCR1 and PCR31
42,892,889 UART: [state] Locking ICCM
42,895,637 UART: [exit] Launching FMC @ 0x40000130
42,904,037 UART:
42,904,276 UART: Running Caliptra FMC ...
42,905,374 UART:
42,905,534 UART: [state] CFI Enabled
42,949,712 UART: [art] Extend RT PCRs Done
42,950,922 UART: [art] Lock RT PCRs Done
42,952,542 UART: [art] Populate DV Done
42,958,061 UART: [fht] FMC Alias Private Key: 7
42,959,666 UART: [art] Derive CDI
42,960,486 UART: [art] Store in in slot 0x4
43,002,757 UART: [art] Derive Key Pair
43,003,765 UART: [art] Store priv key in slot 0x5
46,246,023 UART: [art] Derive Key Pair - Done
46,258,695 UART: [art] Signing Cert with AUTHO
46,259,994 UART: RITY.KEYID = 7
48,539,357 UART: [art] Erasing AUTHORITY.KEYID = 7
48,540,865 UART: [art] PUB.X = 442346CEF157366A824369545590D5FA9F5EC0AF6C35B3B20BE1FBAA1B00702A9C700D85EA444B4BCDD6A44BD72D3B8D
48,548,160 UART: [art] PUB.Y = AEC0EC73D8DFB5EC230F1C77E2322BD79CDDB0BF7B34D3C850D9A9B1767F6CFB60C562D136865C03625502CCFDD786EA
48,555,411 UART: [art] SIG.R = F4DC70E979B028609E76B39D6FC56613EA041EAABC5F0842FA194C411CBFE5828310337313C7E5C6088E30180ABA1CBF
48,562,774 UART: [art] SIG.S = 7EF5E013554DA7C2095D935C4A13914CF92800932DC3B6B52842EEEC684E6A3269901A1D1D408A5491EB446804BA24EC
49,867,658 UART: mbox::rt_entry...
49,868,641 UART: ____ _ _ _ ____ _____
49,870,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,872,588 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,874,450 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,876,373 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,878,256 UART: |_|
49,879,143 UART:
50,165,064 UART: [rt] Runtime listening for mailbox commands...
50,167,076 >>> mbox cmd response data (128 bytes)
52,285,061 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,384,939 UART:
52,385,310 UART: Running Caliptra ROM ...
52,386,369 UART:
52,386,579 UART: [state] CFI Enabled
52,400,481 UART: [state] LifecycleState = Unprovisioned
52,402,371 UART: [state] DebugLocked = No
52,404,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,410,527 UART: [kat] SHA2-256
52,580,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,590,752 UART: [kat] ++
52,591,295 UART: [kat] sha1
52,602,735 UART: [kat] SHA2-256
52,605,420 UART: [kat] SHA2-384
52,611,458 UART: [kat] SHA2-512-ACC
52,613,863 UART: [kat] ECC-384
54,897,402 UART: [kat] HMAC-384Kdf
54,910,716 UART: [kat] LMS
56,100,787 UART: [kat] --
56,106,958 UART: [update-reset] ++
59,818,339 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,821,247 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
60,079,074 >>> mbox cmd response: success
60,079,461 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,079,744 UART: [update-reset] Copying MAN_2 To MAN_1
60,102,025 UART: [update-reset Success] --
60,106,927 UART: [state] Locking Datavault
60,109,153 UART: [state] Locking PCR0, PCR1 and PCR31
60,110,913 UART: [state] Locking ICCM
60,112,579 UART: [exit] Launching FMC @ 0x40000130
60,121,025 UART:
60,121,266 UART: Running Caliptra FMC ...
60,122,368 UART:
60,122,527 UART: [state] CFI Enabled
60,166,481 UART: [art] Extend RT PCRs Done
60,167,656 UART: [art] Lock RT PCRs Done
60,169,042 UART: [art] Populate DV Done
60,174,455 UART: [fht] FMC Alias Private Key: 7
60,175,991 UART: [art] Derive CDI
60,176,728 UART: [art] Store in in slot 0x4
60,219,352 UART: [art] Derive Key Pair
60,220,470 UART: [art] Store priv key in slot 0x5
63,462,818 UART: [art] Derive Key Pair - Done
63,475,788 UART: [art] Signing Cert with AUTHO
63,477,087 UART: RITY.KEYID = 7
65,756,203 UART: [art] Erasing AUTHORITY.KEYID = 7
65,757,714 UART: [art] PUB.X = B67124135A792C29DDAD71CE121D1699D76D3A9614B3F1CD4C0F0ED4BFF0849F4A8028287BF28CDBEF879C78905BC284
65,764,977 UART: [art] PUB.Y = E54B317D592D0FEDB061170C2954D1EA9B622BFDB154D021DE54B90D086E31266CD1A97DC50B5C44136D9156F881E3CB
65,772,204 UART: [art] SIG.R = D867E7993F90BC18EC0A378343C1E7888454D9EF50F3FBD92BDD75BB8B3EB8E21BD208D674317ECF6A5220C481C8658F
65,779,609 UART: [art] SIG.S = 100258FF48ECD8D29944999988172BBB9AAD1B3982A1CC3CA5AEA8B50B345348ADC54B9084E87F7E4DF58399D5A93338
67,083,489 UART: mbox::rt_entry...
67,084,445 UART: ____ _ _ _ ____ _____
67,086,372 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,088,382 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,090,292 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,092,220 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,094,104 UART: |_|
67,094,935 UART:
67,381,122 UART: [rt] Runtime listening for mailbox commands...
67,383,137 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
4,129,657 ready_for_fw is high
4,130,068 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,078,284 >>> mbox cmd response: success
23,715,650 UART:
23,716,102 UART: Running Caliptra FMC ...
23,717,257 UART:
23,717,420 UART: [state] CFI Enabled
23,725,337 UART: [fht] FMC Alias Private Key: 7
26,056,461 UART: [art] Extend RT PCRs Done
26,057,694 UART: [art] Lock RT PCRs Done
26,059,434 UART: [art] Populate DV Done
26,064,899 UART: [fht] FMC Alias Private Key: 7
26,066,500 UART: [art] Derive CDI
26,067,344 UART: [art] Store in in slot 0x4
26,109,894 UART: [art] Derive Key Pair
26,110,936 UART: [art] Store priv key in slot 0x5
29,353,565 UART: [art] Derive Key Pair - Done
29,366,212 UART: [art] Signing Cert with AUTHO
29,367,516 UART: RITY.KEYID = 7
31,647,332 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,839 UART: [art] PUB.X = E0D746E1B9C9E82FE57AED8F544067066BF1FD84F25AC6B4E896E6A67397F5277D847800FBAAA8153B81B57144B47B03
31,656,098 UART: [art] PUB.Y = FEE97BF76C867B288ABE5EA30E1951371C48833BBF632C0D96ED064063CC9D8551F08283751761DD22758D3C9B519DD8
31,663,308 UART: [art] SIG.R = C7D8F64F7899E337AA7A1F07D384D1D373F15AF5F0C2C57D8F36522C088DFCE79C3129287E9740A34C581FD5CAF89F8F
31,670,721 UART: [art] SIG.S = 7582DABD401BAAD9CC934310974CFEB3861F8399FD514AA1694F3A1C1639B7CA02D3D140D334B729E8C85756A9B0E929
32,976,341 UART: Caliptra RT
32,977,047 UART: [state] CFI Enabled
33,095,360 UART: [rt] RT listening for mailbox commands...
33,097,673 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,127,997 UART: [rt]cmd =0x50435252, len=8
33,129,879 >>> mbox cmd response data (8 bytes)
35,249,096 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,151,842 >>> mbox cmd response: success
43,152,401 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,184,837 UART:
43,185,135 UART: Running Caliptra FMC ...
43,186,171 UART:
43,186,323 UART: [state] CFI Enabled
43,230,302 UART: [art] Extend RT PCRs Done
43,231,492 UART: [art] Lock RT PCRs Done
43,232,853 UART: [art] Populate DV Done
43,238,438 UART: [fht] FMC Alias Private Key: 7
43,239,967 UART: [art] Derive CDI
43,240,702 UART: [art] Store in in slot 0x4
43,283,562 UART: [art] Derive Key Pair
43,284,564 UART: [art] Store priv key in slot 0x5
46,527,293 UART: [art] Derive Key Pair - Done
46,539,814 UART: [art] Signing Cert with AUTHO
46,541,117 UART: RITY.KEYID = 7
48,820,662 UART: [art] Erasing AUTHORITY.KEYID = 7
48,822,208 UART: [art] PUB.X = F3B53D2269D5FCA62E628EB86CFBF0883DFC5B968141E15418F29FD97E321F8F4C9AEF60F2494F64F1FB42983F2B8CFB
48,829,413 UART: [art] PUB.Y = CF380F23395BB6DBA8FC4549A8901B13CF36D5B488438C23F291E74E67F4096028A8AF16B7768F6AB968452E337540D9
48,836,655 UART: [art] SIG.R = 8D17E6A03BE214B5BFF939EC16C9B165DF2A9C05E4F495340609654049D36B559F69E40CA330CB7EA7C7B651BD6CD551
48,844,054 UART: [art] SIG.S = 3C6B678A921D81FF9C2EB71DD673858EF197047DB36AE06672970102823BEF99A2B015B098BCE3EF44C0A73A4A24E494
50,149,303 UART: mbox::rt_entry...
50,150,267 UART: ____ _ _ _ ____ _____
50,152,251 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,154,261 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,156,217 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,158,153 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,160,084 UART: |_|
50,160,899 UART:
50,450,675 UART: [rt] Runtime listening for mailbox commands...
50,452,749 >>> mbox cmd response data (128 bytes)
52,571,396 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
60,458,915 >>> mbox cmd response: success
60,459,436 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,494,583 UART:
60,494,912 UART: Running Caliptra FMC ...
60,496,046 UART:
60,496,237 UART: [state] CFI Enabled
60,539,555 UART: [art] Extend RT PCRs Done
60,540,702 UART: [art] Lock RT PCRs Done
60,542,315 UART: [art] Populate DV Done
60,547,991 UART: [fht] FMC Alias Private Key: 7
60,549,585 UART: [art] Derive CDI
60,550,401 UART: [art] Store in in slot 0x4
60,592,943 UART: [art] Derive Key Pair
60,593,988 UART: [art] Store priv key in slot 0x5
63,836,042 UART: [art] Derive Key Pair - Done
63,849,100 UART: [art] Signing Cert with AUTHO
63,850,410 UART: RITY.KEYID = 7
66,129,713 UART: [art] Erasing AUTHORITY.KEYID = 7
66,131,224 UART: [art] PUB.X = BF5BE9DA312F00C910626AC472C3C2450132FA30214CCB6B8B13B6D24EFFC37EC55131816C57C9305E0882F2FF57B421
66,138,489 UART: [art] PUB.Y = A1C845B3C9050FB047F1C32E8852314133972208A8750E4FE7AC917324E37CE6BD96083CE53B3785526BF7C4366F02DA
66,145,728 UART: [art] SIG.R = 566FDBBCEB2FE91EFB50F90A00062C058795CD15A33A944A9432A983872EA4620315383DDCD410421CD7184119F6ACED
66,153,091 UART: [art] SIG.S = AD67859D5D35B9784C783B2FF6143F33140630B5DA6CBDD44945ECDB14DFAD093E51BD03FEBF1D86157881E92B59E147
67,457,675 UART: mbox::rt_entry...
67,458,640 UART: ____ _ _ _ ____ _____
67,460,544 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,462,620 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,464,574 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,466,429 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,468,354 UART: |_|
67,469,163 UART:
67,754,739 UART: [rt] Runtime listening for mailbox commands...
67,756,743 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,148 UART:
192,534 UART: Running Caliptra ROM ...
193,720 UART:
193,870 UART: [state] CFI Enabled
263,538 UART: [state] LifecycleState = Unprovisioned
265,455 UART: [state] DebugLocked = No
267,704 UART: [state] WD Timer not started. Device not locked for debugging
272,036 UART: [kat] SHA2-256
451,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,717 UART: [kat] ++
463,248 UART: [kat] sha1
473,277 UART: [kat] SHA2-256
476,277 UART: [kat] SHA2-384
482,964 UART: [kat] SHA2-512-ACC
485,915 UART: [kat] ECC-384
2,948,983 UART: [kat] HMAC-384Kdf
2,971,188 UART: [kat] LMS
3,500,626 UART: [kat] --
3,505,129 UART: [cold-reset] ++
3,507,700 UART: [fht] FHT @ 0x50003400
3,519,261 UART: [idev] ++
3,519,861 UART: [idev] CDI.KEYID = 6
3,520,750 UART: [idev] SUBJECT.KEYID = 7
3,522,000 UART: [idev] UDS.KEYID = 0
3,522,944 ready_for_fw is high
3,523,130 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,558 UART: [idev] Erasing UDS.KEYID = 0
6,026,255 UART: [idev] Sha1 KeyId Algorithm
6,050,352 UART: [idev] --
6,053,326 UART: [ldev] ++
6,053,901 UART: [ldev] CDI.KEYID = 6
6,054,793 UART: [ldev] SUBJECT.KEYID = 5
6,056,013 UART: [ldev] AUTHORITY.KEYID = 7
6,057,275 UART: [ldev] FE.KEYID = 1
6,098,709 UART: [ldev] Erasing FE.KEYID = 1
8,602,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,272 UART: [ldev] --
10,411,090 UART: [fwproc] Wait for Commands...
10,412,866 UART: [fwproc] Recv command 0x46574c44
10,414,957 UART: [fwproc] Recv'd Img size: 114168 bytes
13,818,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,926 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,713 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,279,698 >>> mbox cmd response: success
14,284,136 UART: [afmc] ++
14,284,748 UART: [afmc] CDI.KEYID = 6
14,285,681 UART: [afmc] SUBJECT.KEYID = 7
14,286,789 UART: [afmc] AUTHORITY.KEYID = 5
16,827,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,911 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,704 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,732 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,584 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,684 UART: [afmc] --
18,629,201 UART: [cold-reset] --
18,633,657 UART: [state] Locking Datavault
18,638,047 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,739 UART: [state] Locking ICCM
18,641,682 UART: [exit] Launching FMC @ 0x40000130
18,650,093 UART:
18,650,349 UART: Running Caliptra FMC ...
18,651,456 UART:
18,651,618 UART: [state] CFI Enabled
18,709,335 UART: [fht] FMC Alias Private Key: 7
20,474,073 UART: [art] Extend RT PCRs Done
20,475,300 UART: [art] Lock RT PCRs Done
20,476,606 UART: [art] Populate DV Done
20,481,849 UART: [fht] FMC Alias Private Key: 7
20,483,289 UART: [art] Derive CDI
20,484,029 UART: [art] Store in in slot 0x4
20,541,657 UART: [art] Derive Key Pair
20,542,659 UART: [art] Store priv key in slot 0x5
23,005,837 UART: [art] Derive Key Pair - Done
23,018,954 UART: [art] Signing Cert with AUTHO
23,020,259 UART: RITY.KEYID = 7
24,731,107 UART: [art] Erasing AUTHORITY.KEYID = 7
24,732,635 UART: [art] PUB.X = 6B26AF0F031C8F60EB52FBCFD77DA707E044DDA4224010CAB8660078A87F3B09C68A0DD93ED0D7D5E6163163FF2DE5EF
24,739,837 UART: [art] PUB.Y = 5CEC5F1FB0A3A685D0AE15D66F778EFB15F4AADBB0CF6F6E733261917F941DCCF0BD73B158567B6910E3C1B166500CB6
24,747,137 UART: [art] SIG.R = D7BD69AC33C1AF24C4E1DB29F2BD52C222159F2BAC95A98C0CFE7FF6BCB76E0B55A4E17D56BF59D5A8FCFBA28384355C
24,754,536 UART: [art] SIG.S = F9FAB6FBBE3CA94615B2EB535FB2C9B3B56111913BBF7869EBA905A918D73D00630A3E0AE620D1FA5E7BE9E4AC3238BE
25,732,986 UART: Caliptra RT
25,733,687 UART: [state] CFI Enabled
25,897,938 UART: [rt] RT listening for mailbox commands...
25,900,283 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,930,862 UART: [rt]cmd =0x50435252, len=8
25,932,931 >>> mbox cmd response data (8 bytes)
27,986,159 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,086,585 UART:
28,086,981 UART: Running Caliptra ROM ...
28,088,124 UART:
28,088,297 UART: [state] CFI Enabled
28,163,508 UART: [state] LifecycleState = Unprovisioned
28,165,388 UART: [state] DebugLocked = No
28,167,104 UART: [state] WD Timer not started. Device not locked for debugging
28,171,012 UART: [kat] SHA2-256
28,350,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,361,676 UART: [kat] ++
28,362,218 UART: [kat] sha1
28,372,844 UART: [kat] SHA2-256
28,375,917 UART: [kat] SHA2-384
28,382,226 UART: [kat] SHA2-512-ACC
28,385,168 UART: [kat] ECC-384
30,846,160 UART: [kat] HMAC-384Kdf
30,867,798 UART: [kat] LMS
31,397,237 UART: [kat] --
31,402,850 UART: [update-reset] ++
34,387,242 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,390,357 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,647,960 >>> mbox cmd response: success
34,648,354 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,649,612 UART: [update-reset] Copying MAN_2 To MAN_1
34,671,942 UART: [update-reset Success] --
34,674,342 UART: [state] Locking Datavault
34,678,301 UART: [state] Locking PCR0, PCR1 and PCR31
34,680,001 UART: [state] Locking ICCM
34,682,540 UART: [exit] Launching FMC @ 0x40000130
34,690,942 UART:
34,691,178 UART: Running Caliptra FMC ...
34,692,279 UART:
34,692,446 UART: [state] CFI Enabled
34,782,184 UART: [art] Extend RT PCRs Done
34,783,361 UART: [art] Lock RT PCRs Done
34,784,653 UART: [art] Populate DV Done
34,790,064 UART: [fht] FMC Alias Private Key: 7
34,791,771 UART: [art] Derive CDI
34,792,590 UART: [art] Store in in slot 0x4
34,851,447 UART: [art] Derive Key Pair
34,852,486 UART: [art] Store priv key in slot 0x5
37,315,334 UART: [art] Derive Key Pair - Done
37,328,495 UART: [art] Signing Cert with AUTHO
37,329,802 UART: RITY.KEYID = 7
39,041,043 UART: [art] Erasing AUTHORITY.KEYID = 7
39,042,554 UART: [art] PUB.X = ADE999D793494E57446F48D0C491663525E70AD2B9F5C541E706D480AE31CFED7FE7060B193C9E0CC23CB29F3A00F858
39,049,778 UART: [art] PUB.Y = 9A9BEBD06B91ED0DF67ED3DC4B333823871ED6242D816BA3FCEC84E09025EC3EA7D9E93DEAD48578FBE7511217023261
39,057,087 UART: [art] SIG.R = 4FE00849C11E787BDFC10826F26EB61124C66CB806EC5B038AFC8DAD6EB1C794ADEB5F2AB69BE062210C682E4CF4E879
39,064,445 UART: [art] SIG.S = 9300917FAB009DBC990EF0480A4469AF475FF10780F4BCA807DC3DE1DBB90AAE52B7C861016F6046D5DD09897443CE16
40,042,854 UART: mbox::rt_entry...
40,043,812 UART: ____ _ _ _ ____ _____
40,045,721 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,047,728 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,049,616 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,051,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,053,401 UART: |_|
40,054,283 UART:
40,339,228 UART: [rt] Runtime listening for mailbox commands...
40,341,231 >>> mbox cmd response data (128 bytes)
42,391,999 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,492,235 UART:
42,492,640 UART: Running Caliptra ROM ...
42,493,779 UART:
42,493,955 UART: [state] CFI Enabled
42,557,558 UART: [state] LifecycleState = Unprovisioned
42,559,276 UART: [state] DebugLocked = No
42,561,097 UART: [state] WD Timer not started. Device not locked for debugging
42,564,904 UART: [kat] SHA2-256
42,743,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,755,608 UART: [kat] ++
42,756,150 UART: [kat] sha1
42,767,852 UART: [kat] SHA2-256
42,770,872 UART: [kat] SHA2-384
42,777,341 UART: [kat] SHA2-512-ACC
42,780,283 UART: [kat] ECC-384
45,236,881 UART: [kat] HMAC-384Kdf
45,258,277 UART: [kat] LMS
45,787,706 UART: [kat] --
45,793,047 UART: [update-reset] ++
48,783,919 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,787,892 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,045,455 >>> mbox cmd response: success
49,045,894 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,046,203 UART: [update-reset] Copying MAN_2 To MAN_1
49,068,429 UART: [update-reset Success] --
49,071,528 UART: [state] Locking Datavault
49,075,061 UART: [state] Locking PCR0, PCR1 and PCR31
49,076,714 UART: [state] Locking ICCM
49,079,320 UART: [exit] Launching FMC @ 0x40000130
49,087,720 UART:
49,087,957 UART: Running Caliptra FMC ...
49,089,060 UART:
49,089,223 UART: [state] CFI Enabled
49,194,961 UART: [art] Extend RT PCRs Done
49,196,148 UART: [art] Lock RT PCRs Done
49,197,444 UART: [art] Populate DV Done
49,202,921 UART: [fht] FMC Alias Private Key: 7
49,204,625 UART: [art] Derive CDI
49,205,443 UART: [art] Store in in slot 0x4
49,263,694 UART: [art] Derive Key Pair
49,264,689 UART: [art] Store priv key in slot 0x5
51,727,919 UART: [art] Derive Key Pair - Done
51,740,763 UART: [art] Signing Cert with AUTHO
51,742,077 UART: RITY.KEYID = 7
53,453,721 UART: [art] Erasing AUTHORITY.KEYID = 7
53,455,231 UART: [art] PUB.X = 90489C58555FFC9587B45BEEE544B501B000F429987289BAF290348DFD20116AA9CBA1B3C27D8E84D29EFF1326905F78
53,462,440 UART: [art] PUB.Y = F168136B2B16BC814182BB651AF9BF0EB1616204FC239027054140F19558719013B032D82E45EB10725D6DC2C24BE418
53,469,690 UART: [art] SIG.R = CC8E9483FC72ABAA4D5487BE337432D0650949DC332A3492235043FB4B614C293F0B0665CABBA6114BFE12B47E308063
53,477,108 UART: [art] SIG.S = 6522351A12ADFF6A6209CA3633E4C3798DB32F5C96E5CE75127E593EACF70CB1B7E23A1199E08AE860B979573104C26C
54,455,835 UART: mbox::rt_entry...
54,456,775 UART: ____ _ _ _ ____ _____
54,458,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,460,771 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,462,705 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,464,639 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,466,565 UART: |_|
54,467,372 UART:
54,748,597 UART: [rt] Runtime listening for mailbox commands...
54,750,603 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,361,601 ready_for_fw is high
3,362,229 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,078,763 >>> mbox cmd response: success
18,366,781 UART:
18,367,192 UART: Running Caliptra FMC ...
18,368,346 UART:
18,368,513 UART: [state] CFI Enabled
18,433,169 UART: [fht] FMC Alias Private Key: 7
20,196,651 UART: [art] Extend RT PCRs Done
20,197,871 UART: [art] Lock RT PCRs Done
20,199,122 UART: [art] Populate DV Done
20,204,479 UART: [fht] FMC Alias Private Key: 7
20,205,969 UART: [art] Derive CDI
20,206,916 UART: [art] Store in in slot 0x4
20,265,409 UART: [art] Derive Key Pair
20,266,411 UART: [art] Store priv key in slot 0x5
22,730,071 UART: [art] Derive Key Pair - Done
22,743,079 UART: [art] Signing Cert with AUTHO
22,744,384 UART: RITY.KEYID = 7
24,455,864 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,383 UART: [art] PUB.X = 3C70328AFE06B9987A67FBA11BA7D3978CA92BD4E7229D880D2AB2AF8CD819AAB4032EC7FBB38DE7C5A90C630BB1E604
24,464,633 UART: [art] PUB.Y = DCC23EC9F6CEFA04AF13A70CD9D7CC68B06151ABE55D7F4C103F0AAE3A384C1BB975CE0D95E8DCB40BC2E91049D79D8E
24,471,948 UART: [art] SIG.R = CBEC31FFF6CDF215B53D093E1F3E54661B9F3D5D262EFF68C3CD95B363EBACA7312B23D643D37524E8E5A5EBA9194BEE
24,479,323 UART: [art] SIG.S = B67A18C7AADC37313A4A95AB17FF60938601E2779C4D6CE30C24EDA4DCA012A5DB68C2B74833DB31CD64547AFC8C2D6A
25,458,674 UART: Caliptra RT
25,459,421 UART: [state] CFI Enabled
25,624,606 UART: [rt] RT listening for mailbox commands...
25,626,989 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,657,465 UART: [rt]cmd =0x50435252, len=8
25,659,430 >>> mbox cmd response data (8 bytes)
27,709,929 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,199,415 >>> mbox cmd response: success
34,199,944 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,234,752 UART:
34,235,084 UART: Running Caliptra FMC ...
34,236,221 UART:
34,236,382 UART: [state] CFI Enabled
34,340,085 UART: [art] Extend RT PCRs Done
34,341,270 UART: [art] Lock RT PCRs Done
34,342,450 UART: [art] Populate DV Done
34,348,190 UART: [fht] FMC Alias Private Key: 7
34,349,840 UART: [art] Derive CDI
34,350,651 UART: [art] Store in in slot 0x4
34,408,747 UART: [art] Derive Key Pair
34,409,787 UART: [art] Store priv key in slot 0x5
36,872,836 UART: [art] Derive Key Pair - Done
36,885,522 UART: [art] Signing Cert with AUTHO
36,886,832 UART: RITY.KEYID = 7
38,598,108 UART: [art] Erasing AUTHORITY.KEYID = 7
38,599,647 UART: [art] PUB.X = 06ED3465B48378E15608F390EA4B537DD7C3EC9F29C15F44CF98EAEA9018070E78B59D3F35AE1A0F206750B7F4F4A0C2
38,607,059 UART: [art] PUB.Y = 0F33C95546A53E2B43378232C836A4E897D196E5ECC6A082CF639A17BF89A455A4B90017C5E5C3D9D614AC007439040E
38,614,039 UART: [art] SIG.R = 3511341196C8ED989E1E419C5FCF28DCC857A93036A2DDF707CC961A8F9C51A78A4293673B50E39360FC6EADB2AD4D76
38,621,488 UART: [art] SIG.S = 12A87CE420A049DAF761682A3D253A398DF57386DE91BF37737296505A230A28F64D978C41129AFB6E4B77E63E7D6BB5
39,599,467 UART: mbox::rt_entry...
39,600,405 UART: ____ _ _ _ ____ _____
39,602,385 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,604,392 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,606,324 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,608,257 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,610,112 UART: |_|
39,610,913 UART:
39,898,452 UART: [rt] Runtime listening for mailbox commands...
39,900,507 >>> mbox cmd response data (128 bytes)
41,949,726 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
48,449,077 >>> mbox cmd response: success
48,449,595 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,484,135 UART:
48,484,433 UART: Running Caliptra FMC ...
48,485,556 UART:
48,485,721 UART: [state] CFI Enabled
48,586,414 UART: [art] Extend RT PCRs Done
48,587,630 UART: [art] Lock RT PCRs Done
48,589,150 UART: [art] Populate DV Done
48,594,664 UART: [fht] FMC Alias Private Key: 7
48,596,254 UART: [art] Derive CDI
48,597,066 UART: [art] Store in in slot 0x4
48,655,452 UART: [art] Derive Key Pair
48,656,519 UART: [art] Store priv key in slot 0x5
51,119,041 UART: [art] Derive Key Pair - Done
51,131,823 UART: [art] Signing Cert with AUTHO
51,133,128 UART: RITY.KEYID = 7
52,844,587 UART: [art] Erasing AUTHORITY.KEYID = 7
52,846,116 UART: [art] PUB.X = 153715228AAF4F9F6F82B07D7AC56C512FA190426C58C5DE7F1EBD34331204E1F4D222A290907594A37F385068D96453
52,853,346 UART: [art] PUB.Y = 58110A57460AFF95C31E6093686DD23B23D7FB644F02A5BA45130CF9B08DDD97CD114D8D9D88BF01AB3845A1DD2C3CFF
52,860,586 UART: [art] SIG.R = D88B17C5435746E1BD9F23A877666EEAF32830035AE5056F6892D30D31F82BB2493CA68618E53491FCEE775FC345C7E4
52,867,973 UART: [art] SIG.S = 03DEF0161197FB22A5923741967DB067A22C59109BA05AA359DF07566739EE61F1CF53230A387A636F079C22F2560AA6
53,846,577 UART: mbox::rt_entry...
53,847,521 UART: ____ _ _ _ ____ _____
53,849,505 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,851,506 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,853,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,855,371 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,857,301 UART: |_|
53,858,131 UART:
54,146,482 UART: [rt] Runtime listening for mailbox commands...
54,148,487 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,784 writing to cptra_bootfsm_go
194,074 UART:
194,448 UART: Running Caliptra ROM ...
195,638 UART:
605,126 UART: [state] CFI Enabled
617,576 UART: [state] LifecycleState = Unprovisioned
619,440 UART: [state] DebugLocked = No
621,952 UART: [state] WD Timer not started. Device not locked for debugging
625,199 UART: [kat] SHA2-256
804,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,839 UART: [kat] ++
816,284 UART: [kat] sha1
828,713 UART: [kat] SHA2-256
831,716 UART: [kat] SHA2-384
839,049 UART: [kat] SHA2-512-ACC
841,985 UART: [kat] ECC-384
3,283,586 UART: [kat] HMAC-384Kdf
3,295,492 UART: [kat] LMS
3,824,992 UART: [kat] --
3,827,498 UART: [cold-reset] ++
3,829,854 UART: [fht] FHT @ 0x50003400
3,841,639 UART: [idev] ++
3,842,238 UART: [idev] CDI.KEYID = 6
3,843,155 UART: [idev] SUBJECT.KEYID = 7
3,844,259 UART: [idev] UDS.KEYID = 0
3,845,305 ready_for_fw is high
3,845,508 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,737 UART: [idev] Erasing UDS.KEYID = 0
6,320,070 UART: [idev] Sha1 KeyId Algorithm
6,344,026 UART: [idev] --
6,347,054 UART: [ldev] ++
6,347,629 UART: [ldev] CDI.KEYID = 6
6,348,546 UART: [ldev] SUBJECT.KEYID = 5
6,349,724 UART: [ldev] AUTHORITY.KEYID = 7
6,350,953 UART: [ldev] FE.KEYID = 1
6,363,002 UART: [ldev] Erasing FE.KEYID = 1
8,836,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,573 UART: [ldev] --
10,628,828 UART: [fwproc] Wait for Commands...
10,630,917 UART: [fwproc] Recv command 0x46574c44
10,633,006 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,258 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,051 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,487,902 >>> mbox cmd response: success
14,493,048 UART: [afmc] ++
14,493,649 UART: [afmc] CDI.KEYID = 6
14,494,561 UART: [afmc] SUBJECT.KEYID = 7
14,495,718 UART: [afmc] AUTHORITY.KEYID = 5
16,996,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,464 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,284 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,141 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,240 UART: [afmc] --
18,793,940 UART: [cold-reset] --
18,797,310 UART: [state] Locking Datavault
18,804,822 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,509 UART: [state] Locking ICCM
18,808,180 UART: [exit] Launching FMC @ 0x40000130
18,816,598 UART:
18,816,836 UART: Running Caliptra FMC ...
18,817,944 UART:
18,818,107 UART: [state] CFI Enabled
18,826,205 UART: [fht] FMC Alias Private Key: 7
20,582,597 UART: [art] Extend RT PCRs Done
20,583,821 UART: [art] Lock RT PCRs Done
20,585,582 UART: [art] Populate DV Done
20,591,218 UART: [fht] FMC Alias Private Key: 7
20,592,757 UART: [art] Derive CDI
20,593,568 UART: [art] Store in in slot 0x4
20,636,698 UART: [art] Derive Key Pair
20,637,701 UART: [art] Store priv key in slot 0x5
23,064,831 UART: [art] Derive Key Pair - Done
23,077,938 UART: [art] Signing Cert with AUTHO
23,079,238 UART: RITY.KEYID = 7
24,784,442 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,944 UART: [art] PUB.X = 07B79FF9B6F56D1292EE5DD656E783D01C62A636AD3671F8602400A65AB926A8D5EE84DFD00DDF03964DD538F32766AA
24,793,199 UART: [art] PUB.Y = 75A3291AB62E59D31DCC6336CDD578C0722433F4906986A87726E6CD43F5ED55EE1784854BBC78B79A506434A06889EF
24,800,492 UART: [art] SIG.R = 74452067AC720C25F888EB6D601A6640B00EB07B2606712789E7DA4CFCD6767D7927A224B60531C433A56BD424A78D31
24,807,845 UART: [art] SIG.S = 651851C3EAFCE8EEDE7020F3CF7DAA4631220493315D2746BD39DD52DA6C044F4730DD897899C626B025934516525959
25,786,059 UART: Caliptra RT
25,786,756 UART: [state] CFI Enabled
25,904,501 UART: [rt] RT listening for mailbox commands...
25,906,875 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,937,207 UART: [rt]cmd =0x50435252, len=8
25,939,041 >>> mbox cmd response data (8 bytes)
27,989,207 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,090,580 UART:
28,090,961 UART: Running Caliptra ROM ...
28,092,026 UART:
28,092,186 UART: [state] CFI Enabled
28,102,736 UART: [state] LifecycleState = Unprovisioned
28,104,626 UART: [state] DebugLocked = No
28,106,089 UART: [state] WD Timer not started. Device not locked for debugging
28,110,365 UART: [kat] SHA2-256
28,289,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,301,161 UART: [kat] ++
28,301,614 UART: [kat] sha1
28,313,903 UART: [kat] SHA2-256
28,316,916 UART: [kat] SHA2-384
28,323,057 UART: [kat] SHA2-512-ACC
28,326,034 UART: [kat] ECC-384
30,764,314 UART: [kat] HMAC-384Kdf
30,777,486 UART: [kat] LMS
31,307,005 UART: [kat] --
31,312,348 UART: [update-reset] ++
34,300,212 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,304,247 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,561,834 >>> mbox cmd response: success
34,562,265 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,562,560 UART: [update-reset] Copying MAN_2 To MAN_1
34,584,724 UART: [update-reset Success] --
34,588,799 UART: [state] Locking Datavault
34,592,964 UART: [state] Locking PCR0, PCR1 and PCR31
34,594,607 UART: [state] Locking ICCM
34,597,218 UART: [exit] Launching FMC @ 0x40000130
34,605,665 UART:
34,605,901 UART: Running Caliptra FMC ...
34,607,002 UART:
34,607,186 UART: [state] CFI Enabled
34,650,890 UART: [art] Extend RT PCRs Done
34,652,070 UART: [art] Lock RT PCRs Done
34,653,611 UART: [art] Populate DV Done
34,659,235 UART: [fht] FMC Alias Private Key: 7
34,660,836 UART: [art] Derive CDI
34,661,649 UART: [art] Store in in slot 0x4
34,704,348 UART: [art] Derive Key Pair
34,705,348 UART: [art] Store priv key in slot 0x5
37,131,939 UART: [art] Derive Key Pair - Done
37,145,057 UART: [art] Signing Cert with AUTHO
37,146,354 UART: RITY.KEYID = 7
38,851,777 UART: [art] Erasing AUTHORITY.KEYID = 7
38,853,284 UART: [art] PUB.X = 461FEB8980BB45EAA4869C5B7B503B47E911B9D84A18F92349E9C26F6BF3EA27DEE47E8805FBCAF1AA3F616C97FE9207
38,860,590 UART: [art] PUB.Y = 31ADB77BFD912DCFDBFE83304101D3C9E2C1DC0B2E0C4B2138F0DD8832C0DA300A97115C32C2F0F45B08ECDE9FB5C993
38,867,881 UART: [art] SIG.R = 95BCC2B9E609F2B8B97E169E0538CB4CED46F954FF8AF5A7E7EF3604E0A0A48C732D15F63827F7B6E708B2E71017F124
38,875,305 UART: [art] SIG.S = F0B0E8F26C5CE07B5066FCD6E48BF1D4AD069D20D30D17951A73A19CC84591956B61558A87E399C9CBE4FCCA026792B8
39,853,661 UART: mbox::rt_entry...
39,854,606 UART: ____ _ _ _ ____ _____
39,856,529 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,858,534 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,860,387 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,862,309 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,864,187 UART: |_|
39,865,016 UART:
40,150,419 UART: [rt] Runtime listening for mailbox commands...
40,152,620 >>> mbox cmd response data (128 bytes)
42,204,567 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,304,431 UART:
42,304,812 UART: Running Caliptra ROM ...
42,305,867 UART:
42,306,022 UART: [state] CFI Enabled
42,320,087 UART: [state] LifecycleState = Unprovisioned
42,322,021 UART: [state] DebugLocked = No
42,324,844 UART: [state] WD Timer not started. Device not locked for debugging
42,328,579 UART: [kat] SHA2-256
42,507,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,519,337 UART: [kat] ++
42,519,794 UART: [kat] sha1
42,530,461 UART: [kat] SHA2-256
42,533,479 UART: [kat] SHA2-384
42,539,082 UART: [kat] SHA2-512-ACC
42,542,024 UART: [kat] ECC-384
44,981,173 UART: [kat] HMAC-384Kdf
44,994,719 UART: [kat] LMS
45,524,269 UART: [kat] --
45,528,151 UART: [update-reset] ++
48,518,318 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,522,175 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
48,779,778 >>> mbox cmd response: success
48,780,146 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,781,244 UART: [update-reset] Copying MAN_2 To MAN_1
48,803,578 UART: [update-reset Success] --
48,808,379 UART: [state] Locking Datavault
48,811,851 UART: [state] Locking PCR0, PCR1 and PCR31
48,813,562 UART: [state] Locking ICCM
48,815,730 UART: [exit] Launching FMC @ 0x40000130
48,824,179 UART:
48,824,414 UART: Running Caliptra FMC ...
48,825,515 UART:
48,825,694 UART: [state] CFI Enabled
48,869,169 UART: [art] Extend RT PCRs Done
48,870,305 UART: [art] Lock RT PCRs Done
48,871,802 UART: [art] Populate DV Done
48,877,367 UART: [fht] FMC Alias Private Key: 7
48,878,963 UART: [art] Derive CDI
48,879,775 UART: [art] Store in in slot 0x4
48,922,061 UART: [art] Derive Key Pair
48,923,126 UART: [art] Store priv key in slot 0x5
51,350,312 UART: [art] Derive Key Pair - Done
51,363,564 UART: [art] Signing Cert with AUTHO
51,364,892 UART: RITY.KEYID = 7
53,070,425 UART: [art] Erasing AUTHORITY.KEYID = 7
53,071,932 UART: [art] PUB.X = FA7238EFA619238C8A5D04DFA0567A17CA8B1A85059D40310BE75CE1307094E66711F05303F51BD5BEF26BA99BEADEBA
53,079,185 UART: [art] PUB.Y = 65D2101D17880EFBE152963AF2306F34D2CAA131EF120BC48EB04ACA60ED7F340E3A1C63F674CB92CF880B152F521CE2
53,086,481 UART: [art] SIG.R = D74CA0ADC73FDB1300078C7EA0361F80C09BD7F6DA44D58745C09504D6BC9259545669D180E86B918B1A4F024779BC4E
53,093,904 UART: [art] SIG.S = E357FBC9075B99CB4813DDFB2406CC77DC7318B0DCAE5993BFDAB6816BC50CDB70D646C4E28F83ED0079AE939E03483A
54,072,387 UART: mbox::rt_entry...
54,073,323 UART: ____ _ _ _ ____ _____
54,075,298 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,077,311 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,079,244 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,081,173 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,083,303 UART: |_|
54,084,158 UART:
54,368,107 UART: [rt] Runtime listening for mailbox commands...
54,370,105 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,683 writing to cptra_bootfsm_go
3,697,753 ready_for_fw is high
3,698,337 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,275,256 >>> mbox cmd response: success
18,534,475 UART:
18,534,880 UART: Running Caliptra FMC ...
18,536,024 UART:
18,536,191 UART: [state] CFI Enabled
18,543,928 UART: [fht] FMC Alias Private Key: 7
20,301,811 UART: [art] Extend RT PCRs Done
20,303,040 UART: [art] Lock RT PCRs Done
20,304,625 UART: [art] Populate DV Done
20,310,040 UART: [fht] FMC Alias Private Key: 7
20,311,683 UART: [art] Derive CDI
20,312,458 UART: [art] Store in in slot 0x4
20,355,133 UART: [art] Derive Key Pair
20,356,140 UART: [art] Store priv key in slot 0x5
22,782,686 UART: [art] Derive Key Pair - Done
22,795,397 UART: [art] Signing Cert with AUTHO
22,796,732 UART: RITY.KEYID = 7
24,502,338 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,842 UART: [art] PUB.X = 50A83E1CDD1B5D44600CE09AC382246486926DC31BAE9381DB0ED2E771E614B35023F92CD589CDF83BDAC05DC9588174
24,511,142 UART: [art] PUB.Y = 85DB16915290B169A1805D0D015786A2C544AF4273E3FB092F205AFCC2937A15D202689F558B5241878DBF3091E179DA
24,518,348 UART: [art] SIG.R = F6EC072F170C338CB0E2C790247D63A8804D59E0CBA2BFA0FBD37C318434D436A8453EE5472795D6E1ED10ED4392BC6F
24,525,756 UART: [art] SIG.S = C00DD64F88110FE19F4A9AA6B659C12903BF7A21B13DFFEBDB7435D3E3D3ACF1C7EB384BA528F83E7BE40B0CE3E49C12
25,504,673 UART: Caliptra RT
25,505,377 UART: [state] CFI Enabled
25,621,718 UART: [rt] RT listening for mailbox commands...
25,624,035 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,654,470 UART: [rt]cmd =0x50435252, len=8
25,656,655 >>> mbox cmd response data (8 bytes)
27,708,164 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,138,248 >>> mbox cmd response: success
34,138,913 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,170,517 UART:
34,170,843 UART: Running Caliptra FMC ...
34,171,974 UART:
34,172,141 UART: [state] CFI Enabled
34,215,942 UART: [art] Extend RT PCRs Done
34,217,092 UART: [art] Lock RT PCRs Done
34,218,452 UART: [art] Populate DV Done
34,223,862 UART: [fht] FMC Alias Private Key: 7
34,225,559 UART: [art] Derive CDI
34,226,393 UART: [art] Store in in slot 0x4
34,268,457 UART: [art] Derive Key Pair
34,269,500 UART: [art] Store priv key in slot 0x5
36,696,697 UART: [art] Derive Key Pair - Done
36,709,706 UART: [art] Signing Cert with AUTHO
36,711,018 UART: RITY.KEYID = 7
38,416,127 UART: [art] Erasing AUTHORITY.KEYID = 7
38,417,635 UART: [art] PUB.X = FE79A04DA337A2B58489D672E89F23791D28B6D091F7BD1CBDED3D22C802C7CEC8706792D8E595EA4D07987EA193DB23
38,424,946 UART: [art] PUB.Y = 0CD01D5B2C4E46CB2B8A6AC8BA1DFB5576E2D3EC581B4810B66E81D6CD8BD4658233D116F8BF721D9ADF5E0B1309135F
38,432,173 UART: [art] SIG.R = 6B838A05EF504651C63D9A5BFAFD97D145DEB2E2BF747C3832DB129E07F4E34E001ADE9E21BF917C6E2DBD965A296EBB
38,439,565 UART: [art] SIG.S = 556B61219667ECF1BFBAABD4F6880E5D03C34D8F7EBFD820A12E326CF0B0C3EDC4315E31B9F1751E5CCECB7C3F5B4B25
39,418,114 UART: mbox::rt_entry...
39,419,052 UART: ____ _ _ _ ____ _____
39,421,036 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,423,042 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,424,977 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,426,925 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,428,859 UART: |_|
39,429,671 UART:
39,715,822 UART: [rt] Runtime listening for mailbox commands...
39,717,853 >>> mbox cmd response data (128 bytes)
41,766,185 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
48,201,340 >>> mbox cmd response: success
48,201,820 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,237,124 UART:
48,237,451 UART: Running Caliptra FMC ...
48,238,578 UART:
48,238,739 UART: [state] CFI Enabled
48,283,102 UART: [art] Extend RT PCRs Done
48,284,256 UART: [art] Lock RT PCRs Done
48,285,757 UART: [art] Populate DV Done
48,291,056 UART: [fht] FMC Alias Private Key: 7
48,292,704 UART: [art] Derive CDI
48,293,522 UART: [art] Store in in slot 0x4
48,336,354 UART: [art] Derive Key Pair
48,337,386 UART: [art] Store priv key in slot 0x5
50,763,388 UART: [art] Derive Key Pair - Done
50,776,563 UART: [art] Signing Cert with AUTHO
50,777,869 UART: RITY.KEYID = 7
52,483,345 UART: [art] Erasing AUTHORITY.KEYID = 7
52,484,838 UART: [art] PUB.X = ACA44C153BE11AF1EACF079BBD8B90E591974455A4F8240B38173E66F03518AB50AE45A3DBB7373D609A9C21BDE085E2
52,492,137 UART: [art] PUB.Y = 0E02BBB27867978BFE39544E9CB6B968822146C1B1F3C66F3CC44013D17D8E18AC4160CFFE98CD68BC470432E1131A99
52,499,431 UART: [art] SIG.R = 58E5B8055A276FF3F0E8B3122A173B4A63EDEB20432D0CFA9C5FAA0093BADAB960CEA1171D27527136FE22FC8F1AFD72
52,506,820 UART: [art] SIG.S = ECD24D307DFFE2991E30D43B5622FBB1A4EFE146DDB2168214579C8551EAA863B7811B6C0FF3F64FB125FC31B78922B4
53,485,027 UART: mbox::rt_entry...
53,485,993 UART: ____ _ _ _ ____ _____
53,487,922 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,489,933 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,491,865 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,493,796 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,495,724 UART: |_|
53,496,532 UART:
53,782,478 UART: [rt] Runtime listening for mailbox commands...
53,784,490 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,035 UART:
192,416 UART: Running Caliptra ROM ...
193,577 UART:
193,724 UART: [state] CFI Enabled
264,101 UART: [state] LifecycleState = Unprovisioned
266,446 UART: [state] DebugLocked = No
268,982 UART: [state] WD Timer not started. Device not locked for debugging
273,895 UART: [kat] SHA2-256
463,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,561 UART: [kat] ++
475,008 UART: [kat] sha1
485,815 UART: [kat] SHA2-256
488,827 UART: [kat] SHA2-384
494,034 UART: [kat] SHA2-512-ACC
496,628 UART: [kat] ECC-384
2,948,120 UART: [kat] HMAC-384Kdf
2,971,085 UART: [kat] LMS
3,502,841 UART: [kat] --
3,506,985 UART: [cold-reset] ++
3,509,633 UART: [fht] FHT @ 0x50003400
3,521,203 UART: [idev] ++
3,521,919 UART: [idev] CDI.KEYID = 6
3,522,801 UART: [idev] SUBJECT.KEYID = 7
3,524,047 UART: [idev] UDS.KEYID = 0
3,524,951 ready_for_fw is high
3,525,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,749 UART: [idev] Erasing UDS.KEYID = 0
6,028,292 UART: [idev] Sha1 KeyId Algorithm
6,051,226 UART: [idev] --
6,056,659 UART: [ldev] ++
6,057,351 UART: [ldev] CDI.KEYID = 6
6,058,242 UART: [ldev] SUBJECT.KEYID = 5
6,059,458 UART: [ldev] AUTHORITY.KEYID = 7
6,060,699 UART: [ldev] FE.KEYID = 1
6,100,224 UART: [ldev] Erasing FE.KEYID = 1
8,605,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,604 UART: [ldev] --
10,413,463 UART: [fwproc] Wait for Commands...
10,415,776 UART: [fwproc] Recv command 0x46574c44
10,418,036 UART: [fwproc] Recv'd Img size: 114168 bytes
13,863,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,547 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,008 >>> mbox cmd response: success
14,601,705 UART: [afmc] ++
14,602,417 UART: [afmc] CDI.KEYID = 6
14,603,817 UART: [afmc] SUBJECT.KEYID = 7
14,604,964 UART: [afmc] AUTHORITY.KEYID = 5
17,149,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,164 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,339 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,445 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,482 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,603 UART: [afmc] --
18,951,046 UART: [cold-reset] --
18,956,436 UART: [state] Locking Datavault
18,962,458 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,618 UART: [state] Locking ICCM
18,967,426 UART: [exit] Launching FMC @ 0x40000130
18,976,067 UART:
18,976,305 UART: Running Caliptra FMC ...
18,977,405 UART:
18,977,563 UART: [state] CFI Enabled
19,032,158 UART: [fht] FMC Alias Private Key: 7
20,796,545 UART: [art] Extend RT PCRs Done
20,797,766 UART: [art] Lock RT PCRs Done
20,799,154 UART: [art] Populate DV Done
20,804,568 UART: [fht] FMC Alias Private Key: 7
20,806,103 UART: [art] Derive CDI
20,806,869 UART: [art] Store in in slot 0x4
20,865,541 UART: [art] Derive Key Pair
20,866,580 UART: [art] Store priv key in slot 0x5
23,329,622 UART: [art] Derive Key Pair - Done
23,342,621 UART: [art] Signing Cert with AUTHO
23,343,924 UART: RITY.KEYID = 7
25,055,666 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,174 UART: [art] PUB.X = 56D7A6C43ABCFC8A9266FE6DA1C0298061877E643C29537C78EB15C4C63B3CEE7D229F196AEA3591B912CC668C5EC843
25,064,448 UART: [art] PUB.Y = EC97B6E4FAAA1FCE64E96EAE861B4D54709D82091B39818B4476B4A9BDE98C253C955422AB8D43E1C52967D03F73BA30
25,071,762 UART: [art] SIG.R = C076F87DF520EB259A8DBFC71C6F6F601EE1024B7D1580CB7CA38BFFDFB0142B29797AE24BA79245E43A7A0C46B7DF82
25,079,157 UART: [art] SIG.S = 79EE6CBBBED1A57D0D5D492319AA2E9F21E128785CD36974E879DD899CC171986905F78416AE8C36C8005C79820277D2
26,057,989 UART: Caliptra RT
26,058,755 UART: [state] CFI Enabled
26,224,814 UART: [rt] RT listening for mailbox commands...
26,227,212 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,257,766 UART: [rt]cmd =0x50435252, len=8
26,259,905 >>> mbox cmd response data (8 bytes)
28,316,285 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,416,815 UART:
28,417,179 UART: Running Caliptra ROM ...
28,418,234 UART:
28,418,384 UART: [state] CFI Enabled
28,489,446 UART: [state] LifecycleState = Unprovisioned
28,491,496 UART: [state] DebugLocked = No
28,493,075 UART: [state] WD Timer not started. Device not locked for debugging
28,496,906 UART: [kat] SHA2-256
28,686,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,697,509 UART: [kat] ++
28,697,969 UART: [kat] sha1
28,710,858 UART: [kat] SHA2-256
28,713,882 UART: [kat] SHA2-384
28,720,198 UART: [kat] SHA2-512-ACC
28,722,771 UART: [kat] ECC-384
31,173,933 UART: [kat] HMAC-384Kdf
31,195,616 UART: [kat] LMS
31,727,173 UART: [kat] --
31,731,281 UART: [update-reset] ++
34,750,890 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,754,193 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,146,913 >>> mbox cmd response: success
35,147,306 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,148,833 UART: [update-reset] Copying MAN_2 To MAN_1
35,186,415 UART: [update-reset Success] --
35,189,387 UART: [state] Locking Datavault
35,192,709 UART: [state] Locking PCR0, PCR1 and PCR31
35,194,856 UART: [state] Locking ICCM
35,196,418 UART: [exit] Launching FMC @ 0x40000130
35,205,039 UART:
35,205,288 UART: Running Caliptra FMC ...
35,206,341 UART:
35,206,492 UART: [state] CFI Enabled
35,302,457 UART: [art] Extend RT PCRs Done
35,303,639 UART: [art] Lock RT PCRs Done
35,305,151 UART: [art] Populate DV Done
35,310,847 UART: [fht] FMC Alias Private Key: 7
35,312,493 UART: [art] Derive CDI
35,313,309 UART: [art] Store in in slot 0x4
35,371,456 UART: [art] Derive Key Pair
35,372,494 UART: [art] Store priv key in slot 0x5
37,834,973 UART: [art] Derive Key Pair - Done
37,848,081 UART: [art] Signing Cert with AUTHO
37,849,393 UART: RITY.KEYID = 7
39,560,023 UART: [art] Erasing AUTHORITY.KEYID = 7
39,561,529 UART: [art] PUB.X = 948030227B53AC1D7C644A284BE52158C783D0F0E1AC5719EABDC74A580CD1D6A84AAF6B866A230416C50AD557BAF8D8
39,568,874 UART: [art] PUB.Y = EA76D25F862A7544E15E7EC0F05A29399F4C6FD00514C74001BDC2BE54EFC54B7BD5FC89FE8AAA6C36F1392C18C1DFCF
39,576,133 UART: [art] SIG.R = D861B8C1ED97C498ED8351C848E7C75ECF22D395E7E9BA02E45E3FFE54A5F4B30CF4038888E05CE8C4F9FDE8C87CF214
39,583,546 UART: [art] SIG.S = B8AD8A8CAA64B34E0FB52F94ADCE34160C1B8D1486FAFD0813157A79AC29D9893D042AF6851717121A88FF3A0B0B19DE
40,561,608 UART: mbox::rt_entry...
40,562,578 UART: ____ _ _ _ ____ _____
40,564,563 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,566,587 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,568,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,570,448 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,572,376 UART: |_|
40,573,184 UART:
40,855,987 UART: [rt] Runtime listening for mailbox commands...
40,857,995 >>> mbox cmd response data (128 bytes)
42,908,937 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
43,008,751 UART:
43,009,150 UART: Running Caliptra ROM ...
43,010,292 UART:
43,010,465 UART: [state] CFI Enabled
43,073,961 UART: [state] LifecycleState = Unprovisioned
43,076,036 UART: [state] DebugLocked = No
43,077,476 UART: [state] WD Timer not started. Device not locked for debugging
43,082,869 UART: [kat] SHA2-256
43,272,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,283,526 UART: [kat] ++
43,284,069 UART: [kat] sha1
43,295,831 UART: [kat] SHA2-256
43,298,849 UART: [kat] SHA2-384
43,305,381 UART: [kat] SHA2-512-ACC
43,307,957 UART: [kat] ECC-384
45,759,948 UART: [kat] HMAC-384Kdf
45,782,391 UART: [kat] LMS
46,313,989 UART: [kat] --
46,317,828 UART: [update-reset] ++
49,336,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,339,771 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,732,517 >>> mbox cmd response: success
49,732,938 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,733,825 UART: [update-reset] Copying MAN_2 To MAN_1
49,771,409 UART: [update-reset Success] --
49,776,399 UART: [state] Locking Datavault
49,779,773 UART: [state] Locking PCR0, PCR1 and PCR31
49,781,918 UART: [state] Locking ICCM
49,783,370 UART: [exit] Launching FMC @ 0x40000130
49,792,045 UART:
49,792,283 UART: Running Caliptra FMC ...
49,793,382 UART:
49,793,538 UART: [state] CFI Enabled
49,891,616 UART: [art] Extend RT PCRs Done
49,892,806 UART: [art] Lock RT PCRs Done
49,894,318 UART: [art] Populate DV Done
49,899,744 UART: [fht] FMC Alias Private Key: 7
49,901,334 UART: [art] Derive CDI
49,902,099 UART: [art] Store in in slot 0x4
49,960,311 UART: [art] Derive Key Pair
49,961,311 UART: [art] Store priv key in slot 0x5
52,423,926 UART: [art] Derive Key Pair - Done
52,436,816 UART: [art] Signing Cert with AUTHO
52,438,118 UART: RITY.KEYID = 7
54,149,901 UART: [art] Erasing AUTHORITY.KEYID = 7
54,151,405 UART: [art] PUB.X = 52D1200541F13D4402C69BEE226AF2C98CA92067028E5E103F3E77CB8638F8E25AE0DE796BEB2B44E97C6B6907CDAD2D
54,158,672 UART: [art] PUB.Y = F8038E7A4B0DDEF6A5949A91D9D05CDE615B3B00B398B329104B9B91584353D334D098109721D941A3FE69064728DDE6
54,165,871 UART: [art] SIG.R = 116167A03B3AB7F4EAAC4457E18DAE29159D13967D047C2362B58E581478CFE3B562CD1D50ECDBC9604B234C55A200FC
54,173,279 UART: [art] SIG.S = B6435EDCB61E789254C5CB10409E73BCF7B1C7DC1F2FABC4D31CD28C91271EBA22F424F74427D93F7B5BA658716EED9A
55,151,497 UART: mbox::rt_entry...
55,152,466 UART: ____ _ _ _ ____ _____
55,154,458 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,156,490 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,158,431 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,160,372 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,162,228 UART: |_|
55,163,031 UART:
55,451,356 UART: [rt] Runtime listening for mailbox commands...
55,453,364 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,439,147 ready_for_fw is high
3,439,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,731,303 >>> mbox cmd response: success
19,047,679 UART:
19,048,088 UART: Running Caliptra FMC ...
19,049,285 UART:
19,049,468 UART: [state] CFI Enabled
19,113,909 UART: [fht] FMC Alias Private Key: 7
20,877,784 UART: [art] Extend RT PCRs Done
20,879,010 UART: [art] Lock RT PCRs Done
20,880,805 UART: [art] Populate DV Done
20,886,275 UART: [fht] FMC Alias Private Key: 7
20,887,875 UART: [art] Derive CDI
20,888,690 UART: [art] Store in in slot 0x4
20,946,763 UART: [art] Derive Key Pair
20,947,796 UART: [art] Store priv key in slot 0x5
23,410,560 UART: [art] Derive Key Pair - Done
23,423,931 UART: [art] Signing Cert with AUTHO
23,425,255 UART: RITY.KEYID = 7
25,135,898 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,411 UART: [art] PUB.X = F8E6C81D30CF8DCCD09E88FBEB41FC0CF3DDB88F9907891D148BBB1705AD124A33C30CA14D73FC158DCE2F12A41FE6A9
25,144,710 UART: [art] PUB.Y = 62044E4851ABD5424E6927B98E244563AE87897997297C871CFA553DF7A646EE4216DB76E088668C3DF1F5341ECBAAC3
25,151,988 UART: [art] SIG.R = BEACEA94111146F6874D0211C29F51C7E2527C827B35F0C840BC20CC6A651404E8A3183C87F3FC59304AC79E20D8B765
25,159,315 UART: [art] SIG.S = 301BA7775B5603C5F45D1928046796544D7C49B5EE6972B870190039B7F0953DE2D60FFC511459A284E29822084AB4AC
26,138,826 UART: Caliptra RT
26,139,518 UART: [state] CFI Enabled
26,303,439 UART: [rt] RT listening for mailbox commands...
26,305,741 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,336,471 UART: [rt]cmd =0x50435252, len=8
26,338,579 >>> mbox cmd response data (8 bytes)
28,391,361 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,407,894 >>> mbox cmd response: success
35,408,447 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,444,071 UART:
35,444,454 UART: Running Caliptra FMC ...
35,445,533 UART:
35,445,689 UART: [state] CFI Enabled
35,551,356 UART: [art] Extend RT PCRs Done
35,552,545 UART: [art] Lock RT PCRs Done
35,553,730 UART: [art] Populate DV Done
35,558,882 UART: [fht] FMC Alias Private Key: 7
35,560,421 UART: [art] Derive CDI
35,561,235 UART: [art] Store in in slot 0x4
35,620,679 UART: [art] Derive Key Pair
35,621,719 UART: [art] Store priv key in slot 0x5
38,084,432 UART: [art] Derive Key Pair - Done
38,097,305 UART: [art] Signing Cert with AUTHO
38,098,623 UART: RITY.KEYID = 7
39,809,728 UART: [art] Erasing AUTHORITY.KEYID = 7
39,811,233 UART: [art] PUB.X = 2C063E6C6D9FE31B2EC097D3D20030117F012969711A38277FA0D49DB3B371EAAD0A47DC0B86F68C10090B96523C5D2B
39,818,466 UART: [art] PUB.Y = 1387F8F27317240DF86FC7C7231F6BAB0AB62C5B7A636616AB643AF0A8E66CE73509E4ADA9CF90F98B8ED9B0593DFE6B
39,825,751 UART: [art] SIG.R = 73E2A27050EDFADBA53EA6F4D828B4E5FF05C698FB8ECB86D0DE1BA5B6B1FCBBF888F969401859CEE2AD07A0DF37D5A0
39,833,224 UART: [art] SIG.S = BF0B0CC8A08808BAA3B81995047365F20059FBFA5964744917AD1EA12CBF4D29F5CA95275714973954DB4CA1DC671247
40,811,342 UART: mbox::rt_entry...
40,812,283 UART: ____ _ _ _ ____ _____
40,814,261 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,816,268 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,818,197 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,820,133 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,822,061 UART: |_|
40,822,875 UART:
41,107,692 UART: [rt] Runtime listening for mailbox commands...
41,109,767 >>> mbox cmd response data (128 bytes)
43,163,535 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
50,166,681 >>> mbox cmd response: success
50,167,134 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,199,126 UART:
50,199,418 UART: Running Caliptra FMC ...
50,200,534 UART:
50,200,692 UART: [state] CFI Enabled
50,289,230 UART: [art] Extend RT PCRs Done
50,290,417 UART: [art] Lock RT PCRs Done
50,291,656 UART: [art] Populate DV Done
50,297,282 UART: [fht] FMC Alias Private Key: 7
50,298,892 UART: [art] Derive CDI
50,299,711 UART: [art] Store in in slot 0x4
50,358,783 UART: [art] Derive Key Pair
50,359,823 UART: [art] Store priv key in slot 0x5
52,822,442 UART: [art] Derive Key Pair - Done
52,835,331 UART: [art] Signing Cert with AUTHO
52,836,632 UART: RITY.KEYID = 7
54,547,483 UART: [art] Erasing AUTHORITY.KEYID = 7
54,548,987 UART: [art] PUB.X = 3F22213C615439DE19761BF82CD65B847A86FC4BF8E61FE09C075E7C53D2809A671033140E88BD23BDD276110E6E2BAF
54,556,280 UART: [art] PUB.Y = C59954A1A5678EFB7526946677A4FF44B456A5F1179CBA2BAB1E39AA2373E43587058129497714953F6EB5DFF5538882
54,563,509 UART: [art] SIG.R = E64A2EE7154BBD631E254E6F013033D793240E4F4D850C68A262F2F4BAC4B0986741EE213F6A0954A797E85FE40145D3
54,570,891 UART: [art] SIG.S = 30A232D8D8A5CF07C727595C88D8D54E98A5A28C145B826AE3B1BEBE0663E532EE2BBDC74A2A6A796477147B013A5699
55,549,201 UART: mbox::rt_entry...
55,550,157 UART: ____ _ _ _ ____ _____
55,552,140 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,554,070 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,556,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,557,906 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,559,829 UART: |_|
55,560,638 UART:
55,845,335 UART: [rt] Runtime listening for mailbox commands...
55,847,372 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,717 writing to cptra_bootfsm_go
192,823 UART:
193,193 UART: Running Caliptra ROM ...
194,336 UART:
604,065 UART: [state] CFI Enabled
616,954 UART: [state] LifecycleState = Unprovisioned
619,317 UART: [state] DebugLocked = No
622,043 UART: [state] WD Timer not started. Device not locked for debugging
625,730 UART: [kat] SHA2-256
815,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,149 UART: [kat] ++
826,698 UART: [kat] sha1
838,003 UART: [kat] SHA2-256
841,025 UART: [kat] SHA2-384
847,191 UART: [kat] SHA2-512-ACC
849,809 UART: [kat] ECC-384
3,289,913 UART: [kat] HMAC-384Kdf
3,304,562 UART: [kat] LMS
3,836,331 UART: [kat] --
3,842,262 UART: [cold-reset] ++
3,843,986 UART: [fht] FHT @ 0x50003400
3,856,312 UART: [idev] ++
3,857,018 UART: [idev] CDI.KEYID = 6
3,858,055 UART: [idev] SUBJECT.KEYID = 7
3,859,160 UART: [idev] UDS.KEYID = 0
3,860,087 ready_for_fw is high
3,860,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,727 UART: [idev] Erasing UDS.KEYID = 0
6,335,584 UART: [idev] Sha1 KeyId Algorithm
6,357,693 UART: [idev] --
6,363,356 UART: [ldev] ++
6,364,067 UART: [ldev] CDI.KEYID = 6
6,364,989 UART: [ldev] SUBJECT.KEYID = 5
6,366,150 UART: [ldev] AUTHORITY.KEYID = 7
6,367,379 UART: [ldev] FE.KEYID = 1
6,378,702 UART: [ldev] Erasing FE.KEYID = 1
8,854,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,578 UART: [ldev] --
10,642,371 UART: [fwproc] Wait for Commands...
10,645,605 UART: [fwproc] Recv command 0x46574c44
10,647,864 UART: [fwproc] Recv'd Img size: 114168 bytes
14,092,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,831,560 >>> mbox cmd response: success
14,835,424 UART: [afmc] ++
14,836,131 UART: [afmc] CDI.KEYID = 6
14,837,316 UART: [afmc] SUBJECT.KEYID = 7
14,838,804 UART: [afmc] AUTHORITY.KEYID = 5
17,349,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,070,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,072,810 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,023 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,144 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,217 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,412 UART: [afmc] --
19,144,572 UART: [cold-reset] --
19,148,973 UART: [state] Locking Datavault
19,154,922 UART: [state] Locking PCR0, PCR1 and PCR31
19,157,114 UART: [state] Locking ICCM
19,160,073 UART: [exit] Launching FMC @ 0x40000130
19,168,756 UART:
19,169,031 UART: Running Caliptra FMC ...
19,170,143 UART:
19,170,322 UART: [state] CFI Enabled
19,178,645 UART: [fht] FMC Alias Private Key: 7
20,936,164 UART: [art] Extend RT PCRs Done
20,937,384 UART: [art] Lock RT PCRs Done
20,938,958 UART: [art] Populate DV Done
20,944,372 UART: [fht] FMC Alias Private Key: 7
20,945,816 UART: [art] Derive CDI
20,946,580 UART: [art] Store in in slot 0x4
20,988,956 UART: [art] Derive Key Pair
20,989,953 UART: [art] Store priv key in slot 0x5
23,416,666 UART: [art] Derive Key Pair - Done
23,430,154 UART: [art] Signing Cert with AUTHO
23,431,461 UART: RITY.KEYID = 7
25,136,685 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,188 UART: [art] PUB.X = 8EB3C3D5453F840AE6A032AB811C49F890BB38C246E687BA609A158CFCBD85197D88A52D6BA88364466CA280C8BA75B4
25,145,436 UART: [art] PUB.Y = 0D912AFF20DA9345A666DB964E2D1109BFAF540714B0716126D7DAB7AD39A77B2BCA0402DDD344793D334E2F1A172DF4
25,152,720 UART: [art] SIG.R = 1428F9564BA576F12E6DAFF93A37B5D07AC622B8AE832F0C3046D6879F7714D51B847F5771E4A8ACAFF44E02FF2D5635
25,160,111 UART: [art] SIG.S = 00FD7F49E3499A09C2A610FFFEE842E727D9D026606ECFE3F9AC1E1272E307DC9D7C84C803484D65675FFA80C0BF4CA9
26,138,712 UART: Caliptra RT
26,139,399 UART: [state] CFI Enabled
26,257,483 UART: [rt] RT listening for mailbox commands...
26,259,819 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,290,300 UART: [rt]cmd =0x50435252, len=8
26,292,298 >>> mbox cmd response data (8 bytes)
28,344,406 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,445,418 UART:
28,445,787 UART: Running Caliptra ROM ...
28,446,862 UART:
28,447,028 UART: [state] CFI Enabled
28,460,285 UART: [state] LifecycleState = Unprovisioned
28,462,183 UART: [state] DebugLocked = No
28,464,864 UART: [state] WD Timer not started. Device not locked for debugging
28,469,592 UART: [kat] SHA2-256
28,659,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,670,267 UART: [kat] ++
28,670,863 UART: [kat] sha1
28,681,979 UART: [kat] SHA2-256
28,685,037 UART: [kat] SHA2-384
28,690,493 UART: [kat] SHA2-512-ACC
28,693,114 UART: [kat] ECC-384
31,133,216 UART: [kat] HMAC-384Kdf
31,144,747 UART: [kat] LMS
31,676,388 UART: [kat] --
31,682,314 UART: [update-reset] ++
34,700,659 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,703,229 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,095,999 >>> mbox cmd response: success
35,096,393 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,097,932 UART: [update-reset] Copying MAN_2 To MAN_1
35,135,502 UART: [update-reset Success] --
35,140,516 UART: [state] Locking Datavault
35,143,613 UART: [state] Locking PCR0, PCR1 and PCR31
35,145,755 UART: [state] Locking ICCM
35,148,266 UART: [exit] Launching FMC @ 0x40000130
35,156,937 UART:
35,157,167 UART: Running Caliptra FMC ...
35,158,192 UART:
35,158,339 UART: [state] CFI Enabled
35,202,903 UART: [art] Extend RT PCRs Done
35,204,087 UART: [art] Lock RT PCRs Done
35,205,572 UART: [art] Populate DV Done
35,210,981 UART: [fht] FMC Alias Private Key: 7
35,212,634 UART: [art] Derive CDI
35,213,446 UART: [art] Store in in slot 0x4
35,256,090 UART: [art] Derive Key Pair
35,257,125 UART: [art] Store priv key in slot 0x5
37,683,726 UART: [art] Derive Key Pair - Done
37,696,778 UART: [art] Signing Cert with AUTHO
37,698,076 UART: RITY.KEYID = 7
39,403,500 UART: [art] Erasing AUTHORITY.KEYID = 7
39,405,004 UART: [art] PUB.X = 892879849897931A45C7203C596CEA371000D59EAC5D4AACE0AE79688817D557D97AE380B654FB5A2FCA79BA70AC4F17
39,412,196 UART: [art] PUB.Y = 7AB68DA561CA2F8201CE672569F509087FDF0CB4464DA1E49FA1F26E0F093BEE07C0CFE31D9CE83A63F4323EA7CDA70E
39,419,533 UART: [art] SIG.R = D46BB6F15A21E002102EAF61676DDD51ED6AA2F78E157A6472888C2E395ADAA912A4B49A1EB493F3A41E98FEB932E2D6
39,426,927 UART: [art] SIG.S = 259960E29200D7F765BCE5C34A974C1C4767034E596ECB2DBBA7D2388FCE97ED320D2E74EE14A89E2D498CB10434DF97
40,404,870 UART: mbox::rt_entry...
40,405,820 UART: ____ _ _ _ ____ _____
40,407,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,409,753 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,411,689 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,413,621 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,415,549 UART: |_|
40,416,390 UART:
40,699,590 UART: [rt] Runtime listening for mailbox commands...
40,701,599 >>> mbox cmd response data (128 bytes)
42,751,474 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,851,304 UART:
42,851,678 UART: Running Caliptra ROM ...
42,852,755 UART:
42,852,922 UART: [state] CFI Enabled
42,865,147 UART: [state] LifecycleState = Unprovisioned
42,867,043 UART: [state] DebugLocked = No
42,869,513 UART: [state] WD Timer not started. Device not locked for debugging
42,874,185 UART: [kat] SHA2-256
43,064,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,074,829 UART: [kat] ++
43,075,376 UART: [kat] sha1
43,087,755 UART: [kat] SHA2-256
43,090,768 UART: [kat] SHA2-384
43,096,660 UART: [kat] SHA2-512-ACC
43,099,244 UART: [kat] ECC-384
45,542,519 UART: [kat] HMAC-384Kdf
45,555,186 UART: [kat] LMS
46,086,793 UART: [kat] --
46,089,971 UART: [update-reset] ++
49,104,529 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,107,212 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,499,953 >>> mbox cmd response: success
49,500,358 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,500,646 UART: [update-reset] Copying MAN_2 To MAN_1
49,537,948 UART: [update-reset Success] --
49,541,448 UART: [state] Locking Datavault
49,544,926 UART: [state] Locking PCR0, PCR1 and PCR31
49,547,115 UART: [state] Locking ICCM
49,548,490 UART: [exit] Launching FMC @ 0x40000130
49,557,157 UART:
49,557,406 UART: Running Caliptra FMC ...
49,558,509 UART:
49,558,667 UART: [state] CFI Enabled
49,602,802 UART: [art] Extend RT PCRs Done
49,603,985 UART: [art] Lock RT PCRs Done
49,605,413 UART: [art] Populate DV Done
49,610,868 UART: [fht] FMC Alias Private Key: 7
49,612,456 UART: [art] Derive CDI
49,613,272 UART: [art] Store in in slot 0x4
49,655,860 UART: [art] Derive Key Pair
49,656,899 UART: [art] Store priv key in slot 0x5
52,083,560 UART: [art] Derive Key Pair - Done
52,096,394 UART: [art] Signing Cert with AUTHO
52,097,696 UART: RITY.KEYID = 7
53,803,116 UART: [art] Erasing AUTHORITY.KEYID = 7
53,804,634 UART: [art] PUB.X = 391D8BB516FCCAA19E897323B3EE2C6E6F045D287F8EBEB545E9A1234C741A5ED7BB5125E20A2575B59D7C7C09EC64BD
53,811,889 UART: [art] PUB.Y = 4B84760AA49B1C890EFED9B865A4F226DF11DEC0B10D412B0C1A91A449D1C3BC9DA878F1320A8EB58FC2C46DBCAD5B50
53,819,177 UART: [art] SIG.R = 8656E25FF29ADDD265487485FA3481D94DDEEA3137A93F38B28E4292400E62AE2ED655112CA551276686837DB2565FA2
53,826,567 UART: [art] SIG.S = 26ED13DF496949059DF0521B122E719F7BB85CE51D97C88FDC3947598F61667EC7BD5D6EED979C205F79BB7DA28AF406
54,805,212 UART: mbox::rt_entry...
54,806,160 UART: ____ _ _ _ ____ _____
54,808,137 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,810,140 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,812,065 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,813,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,815,922 UART: |_|
54,816,760 UART:
55,099,820 UART: [rt] Runtime listening for mailbox commands...
55,101,829 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,627 writing to cptra_bootfsm_go
3,750,464 ready_for_fw is high
3,751,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,956,003 >>> mbox cmd response: success
19,216,297 UART:
19,216,727 UART: Running Caliptra FMC ...
19,217,848 UART:
19,218,014 UART: [state] CFI Enabled
19,225,497 UART: [fht] FMC Alias Private Key: 7
20,982,680 UART: [art] Extend RT PCRs Done
20,983,909 UART: [art] Lock RT PCRs Done
20,985,811 UART: [art] Populate DV Done
20,991,082 UART: [fht] FMC Alias Private Key: 7
20,992,772 UART: [art] Derive CDI
20,993,597 UART: [art] Store in in slot 0x4
21,036,195 UART: [art] Derive Key Pair
21,037,200 UART: [art] Store priv key in slot 0x5
23,464,100 UART: [art] Derive Key Pair - Done
23,476,885 UART: [art] Signing Cert with AUTHO
23,478,215 UART: RITY.KEYID = 7
25,183,773 UART: [art] Erasing AUTHORITY.KEYID = 7
25,185,280 UART: [art] PUB.X = 6473AF8850F5E9C491017A8C4675BD138A44E04221E6310E5AF295E62664497D83EFF66ABAB1E9BF6075652B976B2246
25,192,542 UART: [art] PUB.Y = E8555E03BA926C5FF17C281A735F6B40A2CF0E3C277C87D8AFF69ECD9A71423DBBA17740B2247F59831189B9B7F09E26
25,199,828 UART: [art] SIG.R = 7081D0C6FC2B8A1F25B3AE0D91671687CDEFD07D22E0B2C32590A73EEF3CD880A7FD8391A72C8CDEA3226AAC589EC142
25,207,222 UART: [art] SIG.S = 89A3D3E1BD6A71FDB87C41B4623276B106BC189D8BED7B32F76EF288305FA3CF08E56E702056CBD7D0BA2E3A08CF446B
26,185,762 UART: Caliptra RT
26,186,458 UART: [state] CFI Enabled
26,303,705 UART: [rt] RT listening for mailbox commands...
26,306,073 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,336,249 UART: [rt]cmd =0x50435252, len=8
26,337,972 >>> mbox cmd response data (8 bytes)
28,394,688 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,318,671 >>> mbox cmd response: success
35,319,230 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,356,326 UART:
35,356,631 UART: Running Caliptra FMC ...
35,357,702 UART:
35,357,858 UART: [state] CFI Enabled
35,402,052 UART: [art] Extend RT PCRs Done
35,403,249 UART: [art] Lock RT PCRs Done
35,404,761 UART: [art] Populate DV Done
35,410,071 UART: [fht] FMC Alias Private Key: 7
35,411,719 UART: [art] Derive CDI
35,412,531 UART: [art] Store in in slot 0x4
35,454,910 UART: [art] Derive Key Pair
35,455,911 UART: [art] Store priv key in slot 0x5
37,882,939 UART: [art] Derive Key Pair - Done
37,895,852 UART: [art] Signing Cert with AUTHO
37,897,158 UART: RITY.KEYID = 7
39,603,036 UART: [art] Erasing AUTHORITY.KEYID = 7
39,604,564 UART: [art] PUB.X = 54508FB62D6C24C9EC6282640FF7E27CCBC2C74AC422D9DCDDC9D5BAD1EBEA946F494BB83FE0B22E4F9CC3C5B1865645
39,611,867 UART: [art] PUB.Y = 70B0C55F4FD6819265B21828FF2D56D2CBADF42B674C359E96F111FEB0BDCD57125651B029F3CF514A376048C584CB48
39,619,098 UART: [art] SIG.R = 1A4AE492C97B96B251DD8824F97F0F4056A6DDCF7ED876B2779BAFAB2CFF982BC8216825FE0F7CCE8668CC1842815E93
39,626,488 UART: [art] SIG.S = 51B9A38F9DD2122156ECE4C90F7CECBA8153B635940FFCB071321B2E09D913BC27D6C9A36B0A4359AE9200334AE73729
40,605,202 UART: mbox::rt_entry...
40,606,174 UART: ____ _ _ _ ____ _____
40,608,156 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,610,163 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,612,092 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,614,024 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,615,960 UART: |_|
40,616,952 UART:
40,904,327 UART: [rt] Runtime listening for mailbox commands...
40,906,413 >>> mbox cmd response data (128 bytes)
42,961,139 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
49,876,551 >>> mbox cmd response: success
49,877,135 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,909,522 UART:
49,909,822 UART: Running Caliptra FMC ...
49,910,858 UART:
49,911,015 UART: [state] CFI Enabled
49,955,378 UART: [art] Extend RT PCRs Done
49,956,570 UART: [art] Lock RT PCRs Done
49,957,679 UART: [art] Populate DV Done
49,963,035 UART: [fht] FMC Alias Private Key: 7
49,964,736 UART: [art] Derive CDI
49,965,477 UART: [art] Store in in slot 0x4
50,008,126 UART: [art] Derive Key Pair
50,009,153 UART: [art] Store priv key in slot 0x5
52,435,161 UART: [art] Derive Key Pair - Done
52,448,212 UART: [art] Signing Cert with AUTHO
52,449,524 UART: RITY.KEYID = 7
54,155,054 UART: [art] Erasing AUTHORITY.KEYID = 7
54,156,565 UART: [art] PUB.X = 64A3B7486CB0D7D784AD92B3F192923DCA002FF0D7D9DC569B79EB64FF89D7B54795568DB780443ECAD322DD7526231E
54,163,819 UART: [art] PUB.Y = A9732827786EA03B313A202F30E6410E560496A70C1EEA656E62C9EB5EA268546D87BDD2394E7C568B284A5506E972D5
54,171,048 UART: [art] SIG.R = A9696C914A262C695F090C30BAC5205E920323BCED74D07B5437670DA565FAEB8FDD47FC25A6CEF708F0054D6E2C83D9
54,178,436 UART: [art] SIG.S = 10A77D9DE9BB26A63BB65D36525016AC45A21CA73907567E441BEE1878E7769D762A05DE0A5751FF805BF430D44D43E2
55,156,926 UART: mbox::rt_entry...
55,157,880 UART: ____ _ _ _ ____ _____
55,159,815 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,161,825 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,163,755 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,165,685 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,167,617 UART: |_|
55,168,468 UART:
55,460,020 UART: [rt] Runtime listening for mailbox commands...
55,462,029 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,995 UART: [kat] SHA2-256
881,926 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,041 UART: [kat] ++
886,193 UART: [kat] sha1
890,455 UART: [kat] SHA2-256
892,393 UART: [kat] SHA2-384
895,184 UART: [kat] SHA2-512-ACC
897,085 UART: [kat] ECC-384
902,824 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,243 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,540 UART: [idev] ++
1,479,708 UART: [idev] CDI.KEYID = 6
1,480,068 UART: [idev] SUBJECT.KEYID = 7
1,480,492 UART: [idev] UDS.KEYID = 0
1,480,837 ready_for_fw is high
1,480,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,662 UART: [idev] Erasing UDS.KEYID = 0
1,505,230 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,363 UART: [ldev] Erasing FE.KEYID = 1
1,546,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,548 UART: [ldev] --
1,585,863 UART: [fwproc] Waiting for Commands...
1,586,696 UART: [fwproc] Received command 0x46574c44
1,587,487 UART: [fwproc] Received Image of size 114168 bytes
2,884,067 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,887 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,239 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,970 >>> mbox cmd response: success
3,078,218 UART: [afmc] ++
3,078,386 UART: [afmc] CDI.KEYID = 6
3,078,748 UART: [afmc] SUBJECT.KEYID = 7
3,079,173 UART: [afmc] AUTHORITY.KEYID = 5
3,114,322 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,374 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,102 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,987 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,677 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,372 UART: [afmc] --
3,157,294 UART: [cold-reset] --
3,158,036 UART: [state] Locking Datavault
3,159,299 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,903 UART: [state] Locking ICCM
3,160,479 UART: [exit] Launching FMC @ 0x40000130
3,165,808 UART:
3,165,824 UART: Running Caliptra FMC ...
3,166,232 UART:
3,166,286 UART: [state] CFI Enabled
3,176,943 UART: [fht] FMC Alias Private Key: 7
3,284,758 UART: [art] Extend RT PCRs Done
3,285,186 UART: [art] Lock RT PCRs Done
3,286,718 UART: [art] Populate DV Done
3,294,775 UART: [fht] FMC Alias Private Key: 7
3,295,897 UART: [art] Derive CDI
3,296,177 UART: [art] Store in in slot 0x4
3,382,154 UART: [art] Derive Key Pair
3,382,514 UART: [art] Store priv key in slot 0x5
3,395,908 UART: [art] Derive Key Pair - Done
3,410,480 UART: [art] Signing Cert with AUTHO
3,410,960 UART: RITY.KEYID = 7
3,425,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,749 UART: [art] PUB.X = 951E5A668C29D6DD1CBBA67C540BC9EE001EF39D39C4F747D127A780E1EC290D755FE74E5B32182D006C91FAA6C611CC
3,433,483 UART: [art] PUB.Y = F5EF31DDFB54074D5A806363C3289DE7CFFE2721262B90E5266F0D39A26F178345713D173660A58964830BDA358ACDAB
3,440,426 UART: [art] SIG.R = 57FEC95910FFD24D77F9621B2790B5EACD103AB965B4D76787A6A93CCB5099347FFC269955163E70A60E2AF5153B55B7
3,447,197 UART: [art] SIG.S = E3C95FC030213DA11BEB6FC4F15ACC5BA72B3C25482DA0911BF2695995832630B26FA26B4B4D58757CEE59697165C74C
3,471,300 UART: Caliptra RT
3,471,553 UART: [state] CFI Enabled
3,580,422 UART: [rt] RT listening for mailbox commands...
3,581,092 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,100 UART: [rt]cmd =0x50435252, len=8
3,612,390 >>> mbox cmd response data (8 bytes)
3,612,391 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,107 UART:
3,613,123 UART: Running Caliptra ROM ...
3,613,531 UART:
3,613,585 UART: [state] CFI Enabled
3,616,459 UART: [state] LifecycleState = Unprovisioned
3,617,114 UART: [state] DebugLocked = No
3,617,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,435 UART: [kat] SHA2-256
4,413,366 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,481 UART: [kat] ++
4,417,633 UART: [kat] sha1
4,422,051 UART: [kat] SHA2-256
4,423,989 UART: [kat] SHA2-384
4,426,722 UART: [kat] SHA2-512-ACC
4,428,622 UART: [kat] ECC-384
4,434,273 UART: [kat] HMAC-384Kdf
4,438,767 UART: [kat] LMS
5,006,963 UART: [kat] --
5,007,742 UART: [update-reset] ++
5,931,692 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,932,888 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,029,064 >>> mbox cmd response: success
6,029,064 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,029,243 UART: [update-reset] Copying MAN_2 To MAN_1
6,037,257 UART: [update-reset Success] --
6,038,180 UART: [state] Locking Datavault
6,038,968 UART: [state] Locking PCR0, PCR1 and PCR31
6,039,572 UART: [state] Locking ICCM
6,040,064 UART: [exit] Launching FMC @ 0x40000130
6,045,393 UART:
6,045,409 UART: Running Caliptra FMC ...
6,045,817 UART:
6,045,871 UART: [state] CFI Enabled
6,134,858 UART: [art] Extend RT PCRs Done
6,135,286 UART: [art] Lock RT PCRs Done
6,136,421 UART: [art] Populate DV Done
6,144,544 UART: [fht] FMC Alias Private Key: 7
6,145,638 UART: [art] Derive CDI
6,145,918 UART: [art] Store in in slot 0x4
6,231,493 UART: [art] Derive Key Pair
6,231,853 UART: [art] Store priv key in slot 0x5
6,244,977 UART: [art] Derive Key Pair - Done
6,259,856 UART: [art] Signing Cert with AUTHO
6,260,336 UART: RITY.KEYID = 7
6,275,152 UART: [art] Erasing AUTHORITY.KEYID = 7
6,275,917 UART: [art] PUB.X = E6526B304A8FF41ABB6F40F431D80570179C6CF2FFF048FA8E9F1D0C7A086421AE55066883517CF2331632600802B551
6,282,665 UART: [art] PUB.Y = 83429F8886A868278119C79C3463DF17E2BC87F1FA01099FB462B5CF6FEED29F6F0B8D19CC6D36C11C0AE30AC4102A4F
6,289,610 UART: [art] SIG.R = 5B3BC2A4E73CFB5B29B836BD3396809EB0ACB2B9D411FF4D1B67FA2E24F68B5BCD50D394D799D9E94D39E6281855A69F
6,296,396 UART: [art] SIG.S = 4677DF42E3B77EFCECFF5FA5336BD93CF75B13D27DD8ACD0AE6BD177A2345BDDFF134D071AF4CBCA5E0C67CFB7F2CEAB
6,320,361 UART: mbox::rt_entry...
6,320,733 UART: ____ _ _ _ ____ _____
6,321,517 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,322,317 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,323,085 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,323,853 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,324,621 UART: |_|
6,324,933 UART:
6,605,368 UART: [rt] Runtime listening for mailbox commands...
6,606,415 >>> mbox cmd response data (128 bytes)
6,606,416 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
6,606,530 UART:
6,606,546 UART: Running Caliptra ROM ...
6,606,954 UART:
6,607,008 UART: [state] CFI Enabled
6,609,416 UART: [state] LifecycleState = Unprovisioned
6,610,071 UART: [state] DebugLocked = No
6,610,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,612,328 UART: [kat] SHA2-256
7,406,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,410,374 UART: [kat] ++
7,410,526 UART: [kat] sha1
7,414,768 UART: [kat] SHA2-256
7,416,706 UART: [kat] SHA2-384
7,419,293 UART: [kat] SHA2-512-ACC
7,421,193 UART: [kat] ECC-384
7,426,724 UART: [kat] HMAC-384Kdf
7,431,226 UART: [kat] LMS
7,999,422 UART: [kat] --
8,000,379 UART: [update-reset] ++
8,923,803 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,924,925 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
9,021,101 >>> mbox cmd response: success
9,021,101 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,021,256 UART: [update-reset] Copying MAN_2 To MAN_1
9,029,270 UART: [update-reset Success] --
9,030,143 UART: [state] Locking Datavault
9,030,957 UART: [state] Locking PCR0, PCR1 and PCR31
9,031,561 UART: [state] Locking ICCM
9,032,035 UART: [exit] Launching FMC @ 0x40000130
9,037,364 UART:
9,037,380 UART: Running Caliptra FMC ...
9,037,788 UART:
9,037,842 UART: [state] CFI Enabled
9,126,691 UART: [art] Extend RT PCRs Done
9,127,119 UART: [art] Lock RT PCRs Done
9,128,372 UART: [art] Populate DV Done
9,136,471 UART: [fht] FMC Alias Private Key: 7
9,137,587 UART: [art] Derive CDI
9,137,867 UART: [art] Store in in slot 0x4
9,223,408 UART: [art] Derive Key Pair
9,223,768 UART: [art] Store priv key in slot 0x5
9,237,292 UART: [art] Derive Key Pair - Done
9,252,023 UART: [art] Signing Cert with AUTHO
9,252,503 UART: RITY.KEYID = 7
9,267,983 UART: [art] Erasing AUTHORITY.KEYID = 7
9,268,748 UART: [art] PUB.X = 5F5B3FA6DEB364E3152861F6AFB1EE19D7CC5320438690571BB48946A99BBDF28A36FB939964729D2B91A0643B51A0A4
9,275,522 UART: [art] PUB.Y = 91C7ED38ED19E43F46D884FF475C334F39EC9EAB8C7E9D25E61ADA93379B73B1DBEC15FDD0F4109ED34065FE26BB2E8C
9,282,494 UART: [art] SIG.R = 6C0885DB1431F8ABD74C98589F530C7CA74ECD1D813435B12C71FB8A9FDC8E7A496A10E678EDB473474144A85501E22A
9,289,261 UART: [art] SIG.S = 26C11AB2D04EBD70ADAC14B37D66B64AC737AFB657080A40AD1EE2494FC61CFC0820038094F587B1914B24C91B3CC565
9,313,466 UART: mbox::rt_entry...
9,313,838 UART: ____ _ _ _ ____ _____
9,314,622 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,315,422 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,316,190 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,316,958 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,317,726 UART: |_|
9,318,038 UART:
9,598,873 UART: [rt] Runtime listening for mailbox commands...
9,599,920 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 ready_for_fw is high
1,362,535 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,160 >>> mbox cmd response: success
2,985,652 UART:
2,985,668 UART: Running Caliptra FMC ...
2,986,076 UART:
2,986,130 UART: [state] CFI Enabled
2,996,469 UART: [fht] FMC Alias Private Key: 7
3,104,090 UART: [art] Extend RT PCRs Done
3,104,518 UART: [art] Lock RT PCRs Done
3,105,862 UART: [art] Populate DV Done
3,114,083 UART: [fht] FMC Alias Private Key: 7
3,115,237 UART: [art] Derive CDI
3,115,517 UART: [art] Store in in slot 0x4
3,201,094 UART: [art] Derive Key Pair
3,201,454 UART: [art] Store priv key in slot 0x5
3,214,948 UART: [art] Derive Key Pair - Done
3,229,661 UART: [art] Signing Cert with AUTHO
3,230,141 UART: RITY.KEYID = 7
3,245,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,048 UART: [art] PUB.X = 49DD5E510D9BF2A19D5AB6B05E0A04195E1FEE26AFD4AFC547FA39A7A2D093D8C931F30F4B0648C2E9A2D46AEA7F0868
3,252,820 UART: [art] PUB.Y = 02AB9968ED21879C16DC865BD14D5FD8DFEA68C10CD56351CF979A57EB5A87F4A959BFA5A9631ADF425D27A3E6F8FFC6
3,259,784 UART: [art] SIG.R = F76ECA1551E7D55D74FE3BCC12A922E0038BDF5B3602AF7AF7A7C10EC68CA50EF629A3369AC5D350E425F5E6424C0843
3,266,553 UART: [art] SIG.S = D3F08F0C2DE0B8ABBCFE0CE9DF11C7AEA0776D67608D3B0F248F80737F1080DFCB35A9EB3F906E87550793ABF6A899B7
3,290,712 UART: Caliptra RT
3,290,965 UART: [state] CFI Enabled
3,398,603 UART: [rt] RT listening for mailbox commands...
3,399,273 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,067 UART: [rt]cmd =0x50435252, len=8
3,430,515 >>> mbox cmd response data (8 bytes)
3,430,516 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,729,335 >>> mbox cmd response: success
5,729,335 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,742,628 UART:
5,742,644 UART: Running Caliptra FMC ...
5,743,052 UART:
5,743,106 UART: [state] CFI Enabled
5,832,137 UART: [art] Extend RT PCRs Done
5,832,565 UART: [art] Lock RT PCRs Done
5,833,454 UART: [art] Populate DV Done
5,841,593 UART: [fht] FMC Alias Private Key: 7
5,842,719 UART: [art] Derive CDI
5,842,999 UART: [art] Store in in slot 0x4
5,928,826 UART: [art] Derive Key Pair
5,929,186 UART: [art] Store priv key in slot 0x5
5,942,764 UART: [art] Derive Key Pair - Done
5,957,746 UART: [art] Signing Cert with AUTHO
5,958,226 UART: RITY.KEYID = 7
5,973,394 UART: [art] Erasing AUTHORITY.KEYID = 7
5,974,159 UART: [art] PUB.X = 5D8478694DAE5552EDCCAE86B362C2A29D94524AECE868AD35892C9FB70D9F4EBF4C83DB683BB4C47F8C7939FDC1D107
5,980,941 UART: [art] PUB.Y = 772CBAF5CCF7B5770071B397F0641E736816E89F0D19D3424FFD9B25CB2501018FAAF4B6027652166DAFC160EE4ECBA1
5,987,867 UART: [art] SIG.R = 5A721F169023A971FD53A824022EA6F8F9CC8179DEAAA337D59D61BBCE4F297F8B4B3E1C93680D51EE37D1B458FCD5B6
5,994,645 UART: [art] SIG.S = EA20A330F7C116B4C2DE79441D03EF7DBC83C941D1BC847C9845F3966C95E89FA401770320D48E92EB590EE8FCFDA4E0
6,018,194 UART: mbox::rt_entry...
6,018,566 UART: ____ _ _ _ ____ _____
6,019,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,020,150 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,020,918 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,021,686 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,022,454 UART: |_|
6,022,766 UART:
6,307,878 UART: [rt] Runtime listening for mailbox commands...
6,308,925 >>> mbox cmd response data (128 bytes)
6,308,926 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,606,671 >>> mbox cmd response: success
8,606,671 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,619,914 UART:
8,619,930 UART: Running Caliptra FMC ...
8,620,338 UART:
8,620,392 UART: [state] CFI Enabled
8,709,349 UART: [art] Extend RT PCRs Done
8,709,777 UART: [art] Lock RT PCRs Done
8,710,818 UART: [art] Populate DV Done
8,719,095 UART: [fht] FMC Alias Private Key: 7
8,720,079 UART: [art] Derive CDI
8,720,359 UART: [art] Store in in slot 0x4
8,806,120 UART: [art] Derive Key Pair
8,806,480 UART: [art] Store priv key in slot 0x5
8,819,298 UART: [art] Derive Key Pair - Done
8,833,848 UART: [art] Signing Cert with AUTHO
8,834,328 UART: RITY.KEYID = 7
8,849,246 UART: [art] Erasing AUTHORITY.KEYID = 7
8,850,011 UART: [art] PUB.X = 1BDF765805567020077F5B6F8F674CC7E0E25A66FE8617164BD8B81D55CC85A4BE230E01B597E3FE8869B1017152AC07
8,856,763 UART: [art] PUB.Y = D43B30D3A3408953F326C308B29AE84F59BD5B2811A54901E2625BF9AFA5AF5E2E14791B3A6176F9CE63D905A75106CF
8,863,705 UART: [art] SIG.R = 0FA036595B1FF1142467B7C573D3C6F9613BED68639A27804D297F93255CDD2578657BCD9D1DF095A174E1999AC0CCD0
8,870,474 UART: [art] SIG.S = 85294DE67C0FCD90901C34CEF1A9AF47937EA8B678E4E233010BC2F3BE589AA5E1F8CBA4FCA4169AAD9450A278F7A2AA
8,894,294 UART: mbox::rt_entry...
8,894,666 UART: ____ _ _ _ ____ _____
8,895,450 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,896,250 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,897,018 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,897,786 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,898,554 UART: |_|
8,898,866 UART:
9,178,990 UART: [rt] Runtime listening for mailbox commands...
9,180,037 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,966 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,512 UART: [kat] SHA2-256
882,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,558 UART: [kat] ++
886,710 UART: [kat] sha1
890,962 UART: [kat] SHA2-256
892,900 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,115 UART: [kat] HMAC-384Kdf
907,867 UART: [kat] LMS
1,476,063 UART: [kat] --
1,476,956 UART: [cold-reset] ++
1,477,494 UART: [fht] Storing FHT @ 0x50003400
1,480,389 UART: [idev] ++
1,480,557 UART: [idev] CDI.KEYID = 6
1,480,917 UART: [idev] SUBJECT.KEYID = 7
1,481,341 UART: [idev] UDS.KEYID = 0
1,481,686 ready_for_fw is high
1,481,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,287 UART: [idev] Erasing UDS.KEYID = 0
1,506,101 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,661 UART: [idev] --
1,515,766 UART: [ldev] ++
1,515,934 UART: [ldev] CDI.KEYID = 6
1,516,297 UART: [ldev] SUBJECT.KEYID = 5
1,516,723 UART: [ldev] AUTHORITY.KEYID = 7
1,517,186 UART: [ldev] FE.KEYID = 1
1,522,550 UART: [ldev] Erasing FE.KEYID = 1
1,547,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,001 UART: [ldev] --
1,587,444 UART: [fwproc] Waiting for Commands...
1,588,149 UART: [fwproc] Received command 0x46574c44
1,588,940 UART: [fwproc] Received Image of size 114168 bytes
2,884,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,068 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,420 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,105 >>> mbox cmd response: success
3,078,329 UART: [afmc] ++
3,078,497 UART: [afmc] CDI.KEYID = 6
3,078,859 UART: [afmc] SUBJECT.KEYID = 7
3,079,284 UART: [afmc] AUTHORITY.KEYID = 5
3,114,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,671 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,451 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,179 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,064 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,754 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,695 UART: [afmc] --
3,157,775 UART: [cold-reset] --
3,158,671 UART: [state] Locking Datavault
3,160,072 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,676 UART: [state] Locking ICCM
3,161,104 UART: [exit] Launching FMC @ 0x40000130
3,166,433 UART:
3,166,449 UART: Running Caliptra FMC ...
3,166,857 UART:
3,167,000 UART: [state] CFI Enabled
3,177,835 UART: [fht] FMC Alias Private Key: 7
3,285,636 UART: [art] Extend RT PCRs Done
3,286,064 UART: [art] Lock RT PCRs Done
3,287,380 UART: [art] Populate DV Done
3,295,607 UART: [fht] FMC Alias Private Key: 7
3,296,773 UART: [art] Derive CDI
3,297,053 UART: [art] Store in in slot 0x4
3,382,652 UART: [art] Derive Key Pair
3,383,012 UART: [art] Store priv key in slot 0x5
3,396,210 UART: [art] Derive Key Pair - Done
3,411,146 UART: [art] Signing Cert with AUTHO
3,411,626 UART: RITY.KEYID = 7
3,427,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,097 UART: [art] PUB.X = BA540B26373F6A23B9896B4D2BACFE074E43FAEB1C38D7233F45BE1D763C81A3B0DB3CDE289041D5DD7841BB0B01A083
3,434,871 UART: [art] PUB.Y = 6092DA219DB3945C02097148F36C7094F5F2FB4BD53AFF0880DCA14E543D1626B688A7EC9A3F340724D0B86E9A42CE77
3,441,813 UART: [art] SIG.R = E902EA275E3794F214201F3C61C156F8D9B157830A021588E2DEE2FB32881E3ECA903319A1B7BF040E1FC908311DFBB0
3,448,569 UART: [art] SIG.S = 03FFC439ED051E17BB308A13B63A62D82523696AA871A43867CB707F546818E52A62E9156A0C5DFFDEC5B9AED1109624
3,472,549 UART: Caliptra RT
3,472,894 UART: [state] CFI Enabled
3,580,405 UART: [rt] RT listening for mailbox commands...
3,581,075 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,871 UART: [rt]cmd =0x50435252, len=8
3,612,489 >>> mbox cmd response data (8 bytes)
3,612,490 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,298 UART:
3,613,314 UART: Running Caliptra ROM ...
3,613,722 UART:
3,613,863 UART: [state] CFI Enabled
3,616,961 UART: [state] LifecycleState = Unprovisioned
3,617,616 UART: [state] DebugLocked = No
3,618,226 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,619,763 UART: [kat] SHA2-256
4,413,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,417,809 UART: [kat] ++
4,417,961 UART: [kat] sha1
4,422,205 UART: [kat] SHA2-256
4,424,143 UART: [kat] SHA2-384
4,427,002 UART: [kat] SHA2-512-ACC
4,428,902 UART: [kat] ECC-384
4,434,365 UART: [kat] HMAC-384Kdf
4,439,071 UART: [kat] LMS
5,007,267 UART: [kat] --
5,008,426 UART: [update-reset] ++
5,933,916 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,935,064 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,031,240 >>> mbox cmd response: success
6,031,240 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,031,457 UART: [update-reset] Copying MAN_2 To MAN_1
6,039,471 UART: [update-reset Success] --
6,040,538 UART: [state] Locking Datavault
6,041,442 UART: [state] Locking PCR0, PCR1 and PCR31
6,042,046 UART: [state] Locking ICCM
6,042,522 UART: [exit] Launching FMC @ 0x40000130
6,047,851 UART:
6,047,867 UART: Running Caliptra FMC ...
6,048,275 UART:
6,048,418 UART: [state] CFI Enabled
6,136,915 UART: [art] Extend RT PCRs Done
6,137,343 UART: [art] Lock RT PCRs Done
6,138,628 UART: [art] Populate DV Done
6,146,615 UART: [fht] FMC Alias Private Key: 7
6,147,757 UART: [art] Derive CDI
6,148,037 UART: [art] Store in in slot 0x4
6,233,968 UART: [art] Derive Key Pair
6,234,328 UART: [art] Store priv key in slot 0x5
6,247,446 UART: [art] Derive Key Pair - Done
6,261,861 UART: [art] Signing Cert with AUTHO
6,262,341 UART: RITY.KEYID = 7
6,277,429 UART: [art] Erasing AUTHORITY.KEYID = 7
6,278,194 UART: [art] PUB.X = 6D7185C8A1114CF1B41C8307E9383310B3A0B134E0F7192055061EE45BC13654E555F0C3A79FB707093F0B9D03042BF4
6,284,937 UART: [art] PUB.Y = 1FD0E388097457AC2065D6B151335D15C1F7C22D836DBD840D682E9F4690F428021866000A5584DEA3CDF4398410A11B
6,291,847 UART: [art] SIG.R = C67A815079637B346F7824A49E8AEF4A5C3D902BD82BE66A6652B647AFB2D4D6EDA222654C9251D3EB9665CAA44C5B5A
6,298,627 UART: [art] SIG.S = E3B568CF5875293418BAEFA72D81726680D56DAF7C952CE68F5F310E30224201E2F6A0AF5DC1EF66B653465F6D026B14
6,322,401 UART: mbox::rt_entry...
6,322,773 UART: ____ _ _ _ ____ _____
6,323,557 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,324,357 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,325,125 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,325,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,326,661 UART: |_|
6,326,973 UART:
6,606,522 UART: [rt] Runtime listening for mailbox commands...
6,607,569 >>> mbox cmd response data (128 bytes)
6,607,570 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
6,607,684 UART:
6,607,700 UART: Running Caliptra ROM ...
6,608,108 UART:
6,608,249 UART: [state] CFI Enabled
6,611,109 UART: [state] LifecycleState = Unprovisioned
6,611,764 UART: [state] DebugLocked = No
6,612,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,614,023 UART: [kat] SHA2-256
7,407,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,412,069 UART: [kat] ++
7,412,221 UART: [kat] sha1
7,416,239 UART: [kat] SHA2-256
7,418,177 UART: [kat] SHA2-384
7,420,942 UART: [kat] SHA2-512-ACC
7,422,842 UART: [kat] ECC-384
7,428,523 UART: [kat] HMAC-384Kdf
7,433,023 UART: [kat] LMS
8,001,219 UART: [kat] --
8,001,890 UART: [update-reset] ++
8,925,970 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,927,236 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
9,023,412 >>> mbox cmd response: success
9,023,412 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,023,721 UART: [update-reset] Copying MAN_2 To MAN_1
9,031,735 UART: [update-reset Success] --
9,032,796 UART: [state] Locking Datavault
9,033,416 UART: [state] Locking PCR0, PCR1 and PCR31
9,034,020 UART: [state] Locking ICCM
9,034,680 UART: [exit] Launching FMC @ 0x40000130
9,040,009 UART:
9,040,025 UART: Running Caliptra FMC ...
9,040,433 UART:
9,040,576 UART: [state] CFI Enabled
9,129,131 UART: [art] Extend RT PCRs Done
9,129,559 UART: [art] Lock RT PCRs Done
9,130,692 UART: [art] Populate DV Done
9,138,869 UART: [fht] FMC Alias Private Key: 7
9,139,845 UART: [art] Derive CDI
9,140,125 UART: [art] Store in in slot 0x4
9,225,942 UART: [art] Derive Key Pair
9,226,302 UART: [art] Store priv key in slot 0x5
9,239,516 UART: [art] Derive Key Pair - Done
9,254,400 UART: [art] Signing Cert with AUTHO
9,254,880 UART: RITY.KEYID = 7
9,270,534 UART: [art] Erasing AUTHORITY.KEYID = 7
9,271,299 UART: [art] PUB.X = 3FFCF637D5B79062416099B49BC2C97BEA2FAEF92223CBCFBB3BB2F612D8B8A48C5799C4B766F3D87A270503A346CFBB
9,278,081 UART: [art] PUB.Y = A1503B11F70E90D7A803A9504ECDBD58A7E023171DCAEA400545CA4C701AB905F9DD06584B6ABC7056F2B4436D5A9E6F
9,285,028 UART: [art] SIG.R = 921C1CDA948C6FCFF6C1ACC0D969EF921CB399C0C3C4429E47211E93BFBABD82F4872D230924D1A444FCB9F1EABB28AE
9,291,819 UART: [art] SIG.S = C7D8703106938C46A6816E49516076D7A7C276A1E374D6844A585ED4FACF00668FFA654B159DC9C1C8B3D116C537FD4B
9,315,405 UART: mbox::rt_entry...
9,315,777 UART: ____ _ _ _ ____ _____
9,316,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,317,361 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,318,129 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,318,897 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,319,665 UART: |_|
9,319,977 UART:
9,601,370 UART: [rt] Runtime listening for mailbox commands...
9,602,417 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,380 ready_for_fw is high
1,363,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,569 >>> mbox cmd response: success
2,989,487 UART:
2,989,503 UART: Running Caliptra FMC ...
2,989,911 UART:
2,990,054 UART: [state] CFI Enabled
3,000,435 UART: [fht] FMC Alias Private Key: 7
3,108,696 UART: [art] Extend RT PCRs Done
3,109,124 UART: [art] Lock RT PCRs Done
3,110,412 UART: [art] Populate DV Done
3,118,463 UART: [fht] FMC Alias Private Key: 7
3,119,585 UART: [art] Derive CDI
3,119,865 UART: [art] Store in in slot 0x4
3,205,928 UART: [art] Derive Key Pair
3,206,288 UART: [art] Store priv key in slot 0x5
3,219,998 UART: [art] Derive Key Pair - Done
3,234,572 UART: [art] Signing Cert with AUTHO
3,235,052 UART: RITY.KEYID = 7
3,250,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,249 UART: [art] PUB.X = 01F5105AA5C7DA15CA8423DCA17495A3FB34EF1D313736FDA73F0EEB6E97EFBFE9CED89CE6A4772EFE79B50362EDDA0B
3,258,035 UART: [art] PUB.Y = EEF6696E856B20AF6743B9649639CC23B4887CCCBB8E3BE2BC76C3B0B62A8695B4AF5F4F7BC9C20C1116409EF1F9AEFF
3,265,002 UART: [art] SIG.R = BEB70DD008BECBBFED0C569C635C75FDBE802E95A4DA040F8972D94F313320FCB666C4BC47717B5F9EA5E66A010D56F8
3,271,771 UART: [art] SIG.S = D02E72A4A3ABB212D312951353009107982B0BB670D15946482929DF0CB656054D9A30AB5B018EC3F5350A193C606083
3,296,046 UART: Caliptra RT
3,296,391 UART: [state] CFI Enabled
3,405,527 UART: [rt] RT listening for mailbox commands...
3,406,197 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,855 UART: [rt]cmd =0x50435252, len=8
3,437,561 >>> mbox cmd response data (8 bytes)
3,437,562 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,737,136 >>> mbox cmd response: success
5,737,136 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,750,603 UART:
5,750,619 UART: Running Caliptra FMC ...
5,751,027 UART:
5,751,170 UART: [state] CFI Enabled
5,840,595 UART: [art] Extend RT PCRs Done
5,841,023 UART: [art] Lock RT PCRs Done
5,842,628 UART: [art] Populate DV Done
5,850,997 UART: [fht] FMC Alias Private Key: 7
5,852,009 UART: [art] Derive CDI
5,852,289 UART: [art] Store in in slot 0x4
5,937,938 UART: [art] Derive Key Pair
5,938,298 UART: [art] Store priv key in slot 0x5
5,951,746 UART: [art] Derive Key Pair - Done
5,966,714 UART: [art] Signing Cert with AUTHO
5,967,194 UART: RITY.KEYID = 7
5,982,528 UART: [art] Erasing AUTHORITY.KEYID = 7
5,983,293 UART: [art] PUB.X = AF02849EB35D93E0C2D041312D4A2C10AA8C66A16314AEC90AD923910E4ACA95EACDC75FA93A74B70CCB8957EE5715E6
5,990,067 UART: [art] PUB.Y = 8B76789BC7859A408018055506E10D284FFCF11D6A79FBFF9091DA449E222E1B87B61D7573FF4B20CD54733433F5DACC
5,997,012 UART: [art] SIG.R = 147798D631FDC0D602D126F96674ACE6F53312643B42619C0E3065713B36A57375E8C844610483C7F460711C026E1E48
6,003,754 UART: [art] SIG.S = 6800C26039491F007FCAD3B5D6C6B8041CDB9402D3B0524FBA4933236E2E2D619EEE9B70C79BF33A93BF91D481C7913C
6,027,065 UART: mbox::rt_entry...
6,027,437 UART: ____ _ _ _ ____ _____
6,028,221 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,029,021 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,029,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,030,557 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,031,325 UART: |_|
6,031,637 UART:
6,310,992 UART: [rt] Runtime listening for mailbox commands...
6,312,039 >>> mbox cmd response data (128 bytes)
6,312,040 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,608,680 >>> mbox cmd response: success
8,608,680 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,622,267 UART:
8,622,283 UART: Running Caliptra FMC ...
8,622,691 UART:
8,622,834 UART: [state] CFI Enabled
8,711,425 UART: [art] Extend RT PCRs Done
8,711,853 UART: [art] Lock RT PCRs Done
8,713,176 UART: [art] Populate DV Done
8,721,647 UART: [fht] FMC Alias Private Key: 7
8,722,667 UART: [art] Derive CDI
8,722,947 UART: [art] Store in in slot 0x4
8,808,366 UART: [art] Derive Key Pair
8,808,726 UART: [art] Store priv key in slot 0x5
8,822,240 UART: [art] Derive Key Pair - Done
8,837,450 UART: [art] Signing Cert with AUTHO
8,837,930 UART: RITY.KEYID = 7
8,852,776 UART: [art] Erasing AUTHORITY.KEYID = 7
8,853,541 UART: [art] PUB.X = 8168DDCB8B608FD94318B3D27166BFACF8FB566E9A3A9B0C231E202524C554588FD54AD08E2DBD99AC96D3355059D81E
8,860,318 UART: [art] PUB.Y = C3588F49A01B4AB8BE9A4601DE7CBBED7B3C486511DB0135CE50F35CFC688E30B6CC259409040E0222AD58623922C034
8,867,256 UART: [art] SIG.R = 9B60DE6D99F02BC60462757A5EF711080DE5D076781DD589DF7765DDFCD5671BCFB478DDD3A433D621C2C82044D927DF
8,874,027 UART: [art] SIG.S = E64B95A5A8599C95109F17ED660BD46E234F2D368B4D0006DE109EC7D27867A852495AF133B0F21436CED71C704B5C3B
8,897,626 UART: mbox::rt_entry...
8,897,998 UART: ____ _ _ _ ____ _____
8,898,782 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,899,582 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,900,350 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,901,118 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,901,886 UART: |_|
8,902,198 UART:
9,184,905 UART: [rt] Runtime listening for mailbox commands...
9,185,952 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,558 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
893,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,841 UART: [kat] ++
897,993 UART: [kat] sha1
902,467 UART: [kat] SHA2-256
904,407 UART: [kat] SHA2-384
906,964 UART: [kat] SHA2-512-ACC
908,865 UART: [kat] ECC-384
918,618 UART: [kat] HMAC-384Kdf
923,036 UART: [kat] LMS
1,171,364 UART: [kat] --
1,172,371 UART: [cold-reset] ++
1,172,703 UART: [fht] FHT @ 0x50003400
1,175,302 UART: [idev] ++
1,175,470 UART: [idev] CDI.KEYID = 6
1,175,830 UART: [idev] SUBJECT.KEYID = 7
1,176,254 UART: [idev] UDS.KEYID = 0
1,176,599 ready_for_fw is high
1,176,599 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,184 UART: [idev] Erasing UDS.KEYID = 0
1,201,165 UART: [idev] Sha1 KeyId Algorithm
1,209,605 UART: [idev] --
1,210,867 UART: [ldev] ++
1,211,035 UART: [ldev] CDI.KEYID = 6
1,211,398 UART: [ldev] SUBJECT.KEYID = 5
1,211,824 UART: [ldev] AUTHORITY.KEYID = 7
1,212,287 UART: [ldev] FE.KEYID = 1
1,217,527 UART: [ldev] Erasing FE.KEYID = 1
1,244,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,035 UART: [ldev] --
1,283,402 UART: [fwproc] Wait for Commands...
1,283,998 UART: [fwproc] Recv command 0x46574c44
1,284,726 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,084 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,633 >>> mbox cmd response: success
2,774,805 UART: [afmc] ++
2,774,973 UART: [afmc] CDI.KEYID = 6
2,775,335 UART: [afmc] SUBJECT.KEYID = 7
2,775,760 UART: [afmc] AUTHORITY.KEYID = 5
2,811,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,050 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,778 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,663 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,382 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,316 UART: [afmc] --
2,854,324 UART: [cold-reset] --
2,855,380 UART: [state] Locking Datavault
2,856,581 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,185 UART: [state] Locking ICCM
2,857,699 UART: [exit] Launching FMC @ 0x40000130
2,863,028 UART:
2,863,044 UART: Running Caliptra FMC ...
2,863,452 UART:
2,863,506 UART: [state] CFI Enabled
2,874,287 UART: [fht] FMC Alias Private Key: 7
2,982,754 UART: [art] Extend RT PCRs Done
2,983,182 UART: [art] Lock RT PCRs Done
2,984,882 UART: [art] Populate DV Done
2,993,037 UART: [fht] FMC Alias Private Key: 7
2,994,097 UART: [art] Derive CDI
2,994,377 UART: [art] Store in in slot 0x4
3,079,920 UART: [art] Derive Key Pair
3,080,280 UART: [art] Store priv key in slot 0x5
3,093,478 UART: [art] Derive Key Pair - Done
3,108,056 UART: [art] Signing Cert with AUTHO
3,108,536 UART: RITY.KEYID = 7
3,123,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,291 UART: [art] PUB.X = 778E419695928459E28B45CCE92D522D0359462950018AE708C87B59331C6E2085449311AAD3FDEBFD293FFCE3F2E0A6
3,131,050 UART: [art] PUB.Y = B6512499597F025226511790E42E96E96485C6B0DF78C5746064D9AF89B48C53A551CAB60CF30CABF553701C0DB094AD
3,137,986 UART: [art] SIG.R = 6D8E1656A148FCFF15F7E32FC2531081E1A59F216F55E872D497F3F3B38158461AA94A71574D4C5A1BB3074B58F20414
3,144,748 UART: [art] SIG.S = 87E06D5EF27C20696C211549407531854B39344156CD591B9A81A2E073716AD95E6C7A6D7B68455C1C3E8D7B4846CC49
3,167,993 UART: Caliptra RT
3,168,246 UART: [state] CFI Enabled
3,276,653 UART: [rt] RT listening for mailbox commands...
3,277,323 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,329 UART: [rt]cmd =0x50435252, len=8
3,309,091 >>> mbox cmd response data (8 bytes)
3,309,092 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,013 UART:
3,310,029 UART: Running Caliptra ROM ...
3,310,437 UART:
3,310,492 UART: [state] CFI Enabled
3,313,298 UART: [state] LifecycleState = Unprovisioned
3,313,953 UART: [state] DebugLocked = No
3,314,473 UART: [state] WD Timer not started. Device not locked for debugging
3,315,621 UART: [kat] SHA2-256
4,121,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,125,396 UART: [kat] ++
4,125,548 UART: [kat] sha1
4,129,922 UART: [kat] SHA2-256
4,131,862 UART: [kat] SHA2-384
4,134,717 UART: [kat] SHA2-512-ACC
4,136,617 UART: [kat] ECC-384
4,146,476 UART: [kat] HMAC-384Kdf
4,150,904 UART: [kat] LMS
4,399,232 UART: [kat] --
4,400,108 UART: [update-reset] ++
5,302,758 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,965 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,400,089 >>> mbox cmd response: success
5,400,089 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,400,234 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,248 UART: [update-reset Success] --
5,409,161 UART: [state] Locking Datavault
5,410,189 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,793 UART: [state] Locking ICCM
5,411,333 UART: [exit] Launching FMC @ 0x40000130
5,416,662 UART:
5,416,678 UART: Running Caliptra FMC ...
5,417,086 UART:
5,417,140 UART: [state] CFI Enabled
5,506,663 UART: [art] Extend RT PCRs Done
5,507,091 UART: [art] Lock RT PCRs Done
5,508,550 UART: [art] Populate DV Done
5,516,579 UART: [fht] FMC Alias Private Key: 7
5,517,617 UART: [art] Derive CDI
5,517,897 UART: [art] Store in in slot 0x4
5,603,304 UART: [art] Derive Key Pair
5,603,664 UART: [art] Store priv key in slot 0x5
5,616,804 UART: [art] Derive Key Pair - Done
5,631,806 UART: [art] Signing Cert with AUTHO
5,632,286 UART: RITY.KEYID = 7
5,647,340 UART: [art] Erasing AUTHORITY.KEYID = 7
5,648,105 UART: [art] PUB.X = 61EBD3EA7532A21A022D03634E87A728FC5D82ACC39EE85978CD4FEA3925F921CADABA9538A427CD0C737270C9DD980F
5,654,877 UART: [art] PUB.Y = B0ABC1BB6952B548E00C2A8AEFDB3F04DD317977096B9084171720A78CAA5F59D82566FEF0BDBC066D8166C1BC1CBE41
5,661,831 UART: [art] SIG.R = A25B4B04E8B54D6A4EFD5299F7C5D5461CCBD768E57AA25F3599AC2F36D2DDA6D9DB9198C263AC119C1BBCEF1754002C
5,668,596 UART: [art] SIG.S = EC76AEA5A7CC21F8D940185360AC6FAFB56AF587F830CA28C2620E498E92C3F219FDFF708DDC4E2820102C3988A37A45
5,691,972 UART: mbox::rt_entry...
5,692,344 UART: ____ _ _ _ ____ _____
5,693,128 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,928 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,696 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,695,464 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,696,232 UART: |_|
5,696,544 UART:
5,977,891 UART: [rt] Runtime listening for mailbox commands...
5,978,938 >>> mbox cmd response data (128 bytes)
5,978,939 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,979,050 UART:
5,979,066 UART: Running Caliptra ROM ...
5,979,474 UART:
5,979,529 UART: [state] CFI Enabled
5,982,049 UART: [state] LifecycleState = Unprovisioned
5,982,704 UART: [state] DebugLocked = No
5,983,418 UART: [state] WD Timer not started. Device not locked for debugging
5,984,610 UART: [kat] SHA2-256
6,790,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,794,385 UART: [kat] ++
6,794,537 UART: [kat] sha1
6,798,811 UART: [kat] SHA2-256
6,800,751 UART: [kat] SHA2-384
6,803,454 UART: [kat] SHA2-512-ACC
6,805,354 UART: [kat] ECC-384
6,815,117 UART: [kat] HMAC-384Kdf
6,819,793 UART: [kat] LMS
7,068,121 UART: [kat] --
7,069,029 UART: [update-reset] ++
7,968,887 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,969,978 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,066,102 >>> mbox cmd response: success
8,066,102 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,066,449 UART: [update-reset] Copying MAN_2 To MAN_1
8,074,463 UART: [update-reset Success] --
8,075,588 UART: [state] Locking Datavault
8,076,236 UART: [state] Locking PCR0, PCR1 and PCR31
8,076,840 UART: [state] Locking ICCM
8,077,452 UART: [exit] Launching FMC @ 0x40000130
8,082,781 UART:
8,082,797 UART: Running Caliptra FMC ...
8,083,205 UART:
8,083,259 UART: [state] CFI Enabled
8,172,014 UART: [art] Extend RT PCRs Done
8,172,442 UART: [art] Lock RT PCRs Done
8,173,885 UART: [art] Populate DV Done
8,182,052 UART: [fht] FMC Alias Private Key: 7
8,183,078 UART: [art] Derive CDI
8,183,358 UART: [art] Store in in slot 0x4
8,269,123 UART: [art] Derive Key Pair
8,269,483 UART: [art] Store priv key in slot 0x5
8,283,235 UART: [art] Derive Key Pair - Done
8,297,708 UART: [art] Signing Cert with AUTHO
8,298,188 UART: RITY.KEYID = 7
8,313,532 UART: [art] Erasing AUTHORITY.KEYID = 7
8,314,297 UART: [art] PUB.X = 5610660C87F437E00CD3E839A5EB1F13D2E8F807B1BD0291F5FF1B8AD24932F3BA763DB5B9CD5FE3859B334F91365272
8,321,061 UART: [art] PUB.Y = BF86B6333853CC264E9E844F54B049975562BB6A79CF7E400C4576C780D4630210C417362E91D16964F4CD0B1D5E40D9
8,327,996 UART: [art] SIG.R = E209A7DC96E05CA065FA731791FF0955FE7C95FAE83131E750CA1FB6FD375C0C98C76D25698D796F3BA3BD0157AAC948
8,334,766 UART: [art] SIG.S = 8DF4CBD3A8B6F7568ECF12F2FF49E2FF08233CEA743D82D7E39A34BF8C9D872312C0649625FE370A06528C9E36C38215
8,358,536 UART: mbox::rt_entry...
8,358,908 UART: ____ _ _ _ ____ _____
8,359,692 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,360,492 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,361,260 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,362,028 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,362,796 UART: |_|
8,363,108 UART:
8,644,345 UART: [rt] Runtime listening for mailbox commands...
8,645,392 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,779 ready_for_fw is high
1,060,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,684 >>> mbox cmd response: success
2,687,074 UART:
2,687,090 UART: Running Caliptra FMC ...
2,687,498 UART:
2,687,552 UART: [state] CFI Enabled
2,698,299 UART: [fht] FMC Alias Private Key: 7
2,806,506 UART: [art] Extend RT PCRs Done
2,806,934 UART: [art] Lock RT PCRs Done
2,808,764 UART: [art] Populate DV Done
2,816,969 UART: [fht] FMC Alias Private Key: 7
2,817,927 UART: [art] Derive CDI
2,818,207 UART: [art] Store in in slot 0x4
2,903,602 UART: [art] Derive Key Pair
2,903,962 UART: [art] Store priv key in slot 0x5
2,917,722 UART: [art] Derive Key Pair - Done
2,932,050 UART: [art] Signing Cert with AUTHO
2,932,530 UART: RITY.KEYID = 7
2,947,578 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,343 UART: [art] PUB.X = 76ED1516A0832DF1181378834080715B1B923F83DA8C78277C323EC3B43B81C06B98C10BCD241C904EA5DB10E153F5EB
2,955,110 UART: [art] PUB.Y = 9999B8B66BEA7CDF9DE56F2C6D4A7C4E3A1BDF35218EA82A3904D9C2A32E9F95F14F5FD1D375BAC6445C91C4C0669057
2,962,073 UART: [art] SIG.R = 736174F1A83C05A96B75F0AFBE583B801620240008277DD1DA04AD67741EDF90FE64493425B163A01CD4E451FA5292A8
2,968,810 UART: [art] SIG.S = 86BA220A049B60D2D317CC729ED1E88D7A5B730DA6CB8EDE147B3921B95AFBCF97745785997990F622482402C822D8F8
2,992,587 UART: Caliptra RT
2,992,840 UART: [state] CFI Enabled
3,101,027 UART: [rt] RT listening for mailbox commands...
3,101,697 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,821 UART: [rt]cmd =0x50435252, len=8
3,133,589 >>> mbox cmd response data (8 bytes)
3,133,590 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,107,620 >>> mbox cmd response: success
5,107,620 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,121,138 UART:
5,121,154 UART: Running Caliptra FMC ...
5,121,562 UART:
5,121,616 UART: [state] CFI Enabled
5,210,565 UART: [art] Extend RT PCRs Done
5,210,993 UART: [art] Lock RT PCRs Done
5,212,558 UART: [art] Populate DV Done
5,220,949 UART: [fht] FMC Alias Private Key: 7
5,221,945 UART: [art] Derive CDI
5,222,225 UART: [art] Store in in slot 0x4
5,307,690 UART: [art] Derive Key Pair
5,308,050 UART: [art] Store priv key in slot 0x5
5,321,302 UART: [art] Derive Key Pair - Done
5,336,353 UART: [art] Signing Cert with AUTHO
5,336,833 UART: RITY.KEYID = 7
5,352,031 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,796 UART: [art] PUB.X = EDD8D0287E65EEEC8BBE0F9CA625420944632A7EDEFD64CF50454877638515D9F730598763DFC638C03A350D75811419
5,359,557 UART: [art] PUB.Y = 5E3774BFBB11966548007375E8018297E9CAF4C0131832808B1F0F0291E015E05F38BEDD643552C89D24E0D7F43A791B
5,366,470 UART: [art] SIG.R = 6817188C6D700B9D1EA3B5C33956BEA6EABD40D827C230B0246CAE1C0D7492E4C9C609CDA7A87678CEF905441CB60249
5,373,233 UART: [art] SIG.S = 643B34F0633AB6BEF769086AC8586433A02E03B594E75094D8B7A2E185A853B78EE68A894800D1CE8030B11ED9548CB3
5,397,276 UART: mbox::rt_entry...
5,397,648 UART: ____ _ _ _ ____ _____
5,398,432 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,399,232 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,400,000 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,400,768 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,401,536 UART: |_|
5,401,848 UART:
5,679,822 UART: [rt] Runtime listening for mailbox commands...
5,680,869 >>> mbox cmd response data (128 bytes)
5,680,870 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,652,658 >>> mbox cmd response: success
7,652,658 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,666,354 UART:
7,666,370 UART: Running Caliptra FMC ...
7,666,778 UART:
7,666,832 UART: [state] CFI Enabled
7,755,605 UART: [art] Extend RT PCRs Done
7,756,033 UART: [art] Lock RT PCRs Done
7,757,368 UART: [art] Populate DV Done
7,765,823 UART: [fht] FMC Alias Private Key: 7
7,766,969 UART: [art] Derive CDI
7,767,249 UART: [art] Store in in slot 0x4
7,853,132 UART: [art] Derive Key Pair
7,853,492 UART: [art] Store priv key in slot 0x5
7,866,214 UART: [art] Derive Key Pair - Done
7,881,074 UART: [art] Signing Cert with AUTHO
7,881,554 UART: RITY.KEYID = 7
7,896,928 UART: [art] Erasing AUTHORITY.KEYID = 7
7,897,693 UART: [art] PUB.X = 0BAC9133D63F1BE9F5D09764A2B8705CF8D0E41DFE1E79083D949DB75436B805A9A27DDFEC79260BD87428842BA3C937
7,904,459 UART: [art] PUB.Y = E4B193186745BA380B500E23F180A2630928F4E0B6A99E56D4456D6A7BEE51D6B4160B072B1104C51D4D7A7495D02F74
7,911,387 UART: [art] SIG.R = FBF2A95A99F98D7C65362AEAD16459AC15293139FF60379466FC2F4CE6D283EFED20DAB4B97D178AE4252A59036CE81C
7,918,166 UART: [art] SIG.S = 0329CEF128F8B1E9F386C92072507C8EE84F01F5C1BF9F30D212EFA572924BAA891D11E4395C4D6399E7879E50A760CF
7,941,671 UART: mbox::rt_entry...
7,942,043 UART: ____ _ _ _ ____ _____
7,942,827 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,943,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,944,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,945,163 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,945,931 UART: |_|
7,946,243 UART:
8,228,397 UART: [rt] Runtime listening for mailbox commands...
8,229,444 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
893,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,636 UART: [kat] ++
897,788 UART: [kat] sha1
902,042 UART: [kat] SHA2-256
903,982 UART: [kat] SHA2-384
906,891 UART: [kat] SHA2-512-ACC
908,792 UART: [kat] ECC-384
918,717 UART: [kat] HMAC-384Kdf
923,263 UART: [kat] LMS
1,171,591 UART: [kat] --
1,172,572 UART: [cold-reset] ++
1,172,944 UART: [fht] FHT @ 0x50003400
1,175,759 UART: [idev] ++
1,175,927 UART: [idev] CDI.KEYID = 6
1,176,287 UART: [idev] SUBJECT.KEYID = 7
1,176,711 UART: [idev] UDS.KEYID = 0
1,177,056 ready_for_fw is high
1,177,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,089 UART: [idev] Erasing UDS.KEYID = 0
1,202,446 UART: [idev] Sha1 KeyId Algorithm
1,210,978 UART: [idev] --
1,212,050 UART: [ldev] ++
1,212,218 UART: [ldev] CDI.KEYID = 6
1,212,581 UART: [ldev] SUBJECT.KEYID = 5
1,213,007 UART: [ldev] AUTHORITY.KEYID = 7
1,213,470 UART: [ldev] FE.KEYID = 1
1,218,878 UART: [ldev] Erasing FE.KEYID = 1
1,245,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,920 UART: [ldev] --
1,284,395 UART: [fwproc] Wait for Commands...
1,285,125 UART: [fwproc] Recv command 0x46574c44
1,285,853 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,341 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,004 >>> mbox cmd response: success
2,775,050 UART: [afmc] ++
2,775,218 UART: [afmc] CDI.KEYID = 6
2,775,580 UART: [afmc] SUBJECT.KEYID = 7
2,776,005 UART: [afmc] AUTHORITY.KEYID = 5
2,811,500 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,207 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,683 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,568 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,287 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,073 UART: [afmc] --
2,855,075 UART: [cold-reset] --
2,856,043 UART: [state] Locking Datavault
2,857,104 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,708 UART: [state] Locking ICCM
2,858,256 UART: [exit] Launching FMC @ 0x40000130
2,863,585 UART:
2,863,601 UART: Running Caliptra FMC ...
2,864,009 UART:
2,864,152 UART: [state] CFI Enabled
2,874,747 UART: [fht] FMC Alias Private Key: 7
2,982,730 UART: [art] Extend RT PCRs Done
2,983,158 UART: [art] Lock RT PCRs Done
2,984,536 UART: [art] Populate DV Done
2,992,947 UART: [fht] FMC Alias Private Key: 7
2,993,959 UART: [art] Derive CDI
2,994,239 UART: [art] Store in in slot 0x4
3,079,740 UART: [art] Derive Key Pair
3,080,100 UART: [art] Store priv key in slot 0x5
3,093,628 UART: [art] Derive Key Pair - Done
3,108,842 UART: [art] Signing Cert with AUTHO
3,109,322 UART: RITY.KEYID = 7
3,124,708 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,473 UART: [art] PUB.X = 6330D0B26A554D569344B84D6FD79B90E5D79736BF37A3025C6FBA530752F78E21B61AAB26D088A3F72D23DDFD11082F
3,132,238 UART: [art] PUB.Y = A05F97CCF978D1AB26C32312E4E3049F9F512C6D9C8C4704E5E0060B5409C81758F30E557644D51D9A0DBB96B76DEFBB
3,139,175 UART: [art] SIG.R = 61A5680DFF71F70420D2F022E521A635F9BDEFFDD96CC747405A4F0CEE1C5045782794EA4EDCA3E3C044139EAB0577E9
3,145,945 UART: [art] SIG.S = B1A9EBDCED444475FE307652A1528980719EFE165B495574E1C82798A5444C295B3EEEA59983FD7D6E4349C9835D706B
3,169,870 UART: Caliptra RT
3,170,215 UART: [state] CFI Enabled
3,277,956 UART: [rt] RT listening for mailbox commands...
3,278,626 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,438 UART: [rt]cmd =0x50435252, len=8
3,309,918 >>> mbox cmd response data (8 bytes)
3,309,919 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,310,650 UART:
3,310,666 UART: Running Caliptra ROM ...
3,311,074 UART:
3,311,216 UART: [state] CFI Enabled
3,313,804 UART: [state] LifecycleState = Unprovisioned
3,314,459 UART: [state] DebugLocked = No
3,315,019 UART: [state] WD Timer not started. Device not locked for debugging
3,316,225 UART: [kat] SHA2-256
4,121,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,126,000 UART: [kat] ++
4,126,152 UART: [kat] sha1
4,130,394 UART: [kat] SHA2-256
4,132,334 UART: [kat] SHA2-384
4,134,981 UART: [kat] SHA2-512-ACC
4,136,881 UART: [kat] ECC-384
4,146,986 UART: [kat] HMAC-384Kdf
4,151,714 UART: [kat] LMS
4,400,042 UART: [kat] --
4,400,680 UART: [update-reset] ++
5,302,754 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,303,757 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,399,881 >>> mbox cmd response: success
5,399,881 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,400,212 UART: [update-reset] Copying MAN_2 To MAN_1
5,408,226 UART: [update-reset Success] --
5,409,287 UART: [state] Locking Datavault
5,410,065 UART: [state] Locking PCR0, PCR1 and PCR31
5,410,669 UART: [state] Locking ICCM
5,411,215 UART: [exit] Launching FMC @ 0x40000130
5,416,544 UART:
5,416,560 UART: Running Caliptra FMC ...
5,416,968 UART:
5,417,111 UART: [state] CFI Enabled
5,506,226 UART: [art] Extend RT PCRs Done
5,506,654 UART: [art] Lock RT PCRs Done
5,507,849 UART: [art] Populate DV Done
5,515,964 UART: [fht] FMC Alias Private Key: 7
5,517,080 UART: [art] Derive CDI
5,517,360 UART: [art] Store in in slot 0x4
5,602,865 UART: [art] Derive Key Pair
5,603,225 UART: [art] Store priv key in slot 0x5
5,616,577 UART: [art] Derive Key Pair - Done
5,631,147 UART: [art] Signing Cert with AUTHO
5,631,627 UART: RITY.KEYID = 7
5,646,941 UART: [art] Erasing AUTHORITY.KEYID = 7
5,647,706 UART: [art] PUB.X = 497F96C9433FD69237EA04F557367BEA686D4F196071380B2DC952E500BC0B6CE3B611C19F53BACE70F5B646A2F57F79
5,654,449 UART: [art] PUB.Y = 7A72A64E86086A55A64F5912B68477CE555D7B15C8C1B85F320E7B9B342526D2CCE32E68FA9D49DFAE0072E19DCB6CC4
5,661,381 UART: [art] SIG.R = 3B8A65EFF6C13702D79FD670CE5DD2B0731B08159763D5C9CC92C36684DD1AA50414EECE1348467A06777825423DA6AA
5,668,143 UART: [art] SIG.S = 1BD6A140D0E6C44A14CF4B2D299BF3A6BFD4E022C4CFB0855DA151A959F3C547F43E39B59947058005ACEF9A0E5BF1E2
5,691,675 UART: mbox::rt_entry...
5,692,047 UART: ____ _ _ _ ____ _____
5,692,831 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,693,631 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,694,399 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,695,167 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,935 UART: |_|
5,696,247 UART:
5,978,799 UART: [rt] Runtime listening for mailbox commands...
5,979,846 >>> mbox cmd response data (128 bytes)
5,979,847 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,979,958 UART:
5,979,974 UART: Running Caliptra ROM ...
5,980,382 UART:
5,980,524 UART: [state] CFI Enabled
5,983,314 UART: [state] LifecycleState = Unprovisioned
5,983,969 UART: [state] DebugLocked = No
5,984,639 UART: [state] WD Timer not started. Device not locked for debugging
5,985,747 UART: [kat] SHA2-256
6,791,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,795,522 UART: [kat] ++
6,795,674 UART: [kat] sha1
6,799,822 UART: [kat] SHA2-256
6,801,762 UART: [kat] SHA2-384
6,804,593 UART: [kat] SHA2-512-ACC
6,806,493 UART: [kat] ECC-384
6,816,334 UART: [kat] HMAC-384Kdf
6,821,122 UART: [kat] LMS
7,069,450 UART: [kat] --
7,070,266 UART: [update-reset] ++
7,971,874 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,972,897 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,069,021 >>> mbox cmd response: success
8,069,021 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,069,200 UART: [update-reset] Copying MAN_2 To MAN_1
8,077,214 UART: [update-reset Success] --
8,078,267 UART: [state] Locking Datavault
8,079,203 UART: [state] Locking PCR0, PCR1 and PCR31
8,079,807 UART: [state] Locking ICCM
8,080,467 UART: [exit] Launching FMC @ 0x40000130
8,085,796 UART:
8,085,812 UART: Running Caliptra FMC ...
8,086,220 UART:
8,086,363 UART: [state] CFI Enabled
8,175,406 UART: [art] Extend RT PCRs Done
8,175,834 UART: [art] Lock RT PCRs Done
8,177,129 UART: [art] Populate DV Done
8,185,404 UART: [fht] FMC Alias Private Key: 7
8,186,474 UART: [art] Derive CDI
8,186,754 UART: [art] Store in in slot 0x4
8,272,587 UART: [art] Derive Key Pair
8,272,947 UART: [art] Store priv key in slot 0x5
8,285,955 UART: [art] Derive Key Pair - Done
8,300,778 UART: [art] Signing Cert with AUTHO
8,301,258 UART: RITY.KEYID = 7
8,316,924 UART: [art] Erasing AUTHORITY.KEYID = 7
8,317,689 UART: [art] PUB.X = 59D917499D543001F101767BCCCCA373704FA7A4DA0032859AF754B574FBE68C2CD9B7C9294847CAAEAC975380806492
8,324,431 UART: [art] PUB.Y = 972D5E781B77E6656CB9CAB98A0F285E607B7CF4500BA956024D61E803E0BAE60542B9A5A935DCF37C9D8C6B1B2840EE
8,331,376 UART: [art] SIG.R = 273D7316DE5B23947B8400A1F74772D387C07D9F86B8412F479A9FADD328E5F837F42624C65BBE762136A73FB0804D8C
8,338,122 UART: [art] SIG.S = 84EA9F24F576730856EE6325164BAD0232969FE80F49383F7D133BD522924C14A90659C16B1DD3D2BB57C57878B8BDA3
8,361,539 UART: mbox::rt_entry...
8,361,911 UART: ____ _ _ _ ____ _____
8,362,695 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,363,495 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,364,263 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,365,031 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,365,799 UART: |_|
8,366,111 UART:
8,650,409 UART: [rt] Runtime listening for mailbox commands...
8,651,456 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,336 ready_for_fw is high
1,060,336 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,141 >>> mbox cmd response: success
2,687,757 UART:
2,687,773 UART: Running Caliptra FMC ...
2,688,181 UART:
2,688,324 UART: [state] CFI Enabled
2,699,451 UART: [fht] FMC Alias Private Key: 7
2,807,414 UART: [art] Extend RT PCRs Done
2,807,842 UART: [art] Lock RT PCRs Done
2,809,478 UART: [art] Populate DV Done
2,817,763 UART: [fht] FMC Alias Private Key: 7
2,818,731 UART: [art] Derive CDI
2,819,011 UART: [art] Store in in slot 0x4
2,904,548 UART: [art] Derive Key Pair
2,904,908 UART: [art] Store priv key in slot 0x5
2,918,150 UART: [art] Derive Key Pair - Done
2,933,343 UART: [art] Signing Cert with AUTHO
2,933,823 UART: RITY.KEYID = 7
2,949,389 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,154 UART: [art] PUB.X = 8A10B8081B519BCC71239C42609E66A9C1D32763C11E016CF633C77F77BFDCA893F4A9B0F1A999B815E50B4F214255CA
2,956,919 UART: [art] PUB.Y = 9931684A525A0044054CACEB893290BB35114090CA8911799629B344A11940484AFB31041195DA6E4F1E32F2961EB572
2,963,827 UART: [art] SIG.R = 8EB15D0F73FDA131414DA5E91C45E23DB2F62E93B336FF4047B19F820BAE62D55A1410EC2360AE751DCEDFA44A9052DB
2,970,607 UART: [art] SIG.S = B833161AE56D61D958E8FF3A0F6B068D3936FED9E470D6CF864889FFE437EC55602720F3F6E12C2BCEFCC744245592B8
2,994,748 UART: Caliptra RT
2,995,093 UART: [state] CFI Enabled
3,103,055 UART: [rt] RT listening for mailbox commands...
3,103,725 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,449 UART: [rt]cmd =0x50435252, len=8
3,135,149 >>> mbox cmd response data (8 bytes)
3,135,150 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,108,403 >>> mbox cmd response: success
5,108,403 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,121,687 UART:
5,121,703 UART: Running Caliptra FMC ...
5,122,111 UART:
5,122,254 UART: [state] CFI Enabled
5,211,749 UART: [art] Extend RT PCRs Done
5,212,177 UART: [art] Lock RT PCRs Done
5,213,324 UART: [art] Populate DV Done
5,221,627 UART: [fht] FMC Alias Private Key: 7
5,222,725 UART: [art] Derive CDI
5,223,005 UART: [art] Store in in slot 0x4
5,308,472 UART: [art] Derive Key Pair
5,308,832 UART: [art] Store priv key in slot 0x5
5,322,208 UART: [art] Derive Key Pair - Done
5,337,069 UART: [art] Signing Cert with AUTHO
5,337,549 UART: RITY.KEYID = 7
5,352,501 UART: [art] Erasing AUTHORITY.KEYID = 7
5,353,266 UART: [art] PUB.X = CF5E5B071C4F7BD2AED24D4DAA0849B4179A6DE3DFE10F2203B1A92FF1AB8EA99789709EB2FDA9BA98D47FB816B50241
5,360,043 UART: [art] PUB.Y = E0ED33FE177D20BA37E263489D555D8877FEB2BBCD02A6F70903F68663D08EF2BB1E8C58243EF3520FD76761A044A428
5,366,987 UART: [art] SIG.R = 846C58ACA50F347A906994ED0A9E03F97F1BC6F8BF20F8EABC369552AA409B034D28901F12549ABEDD85BFF15533F9CC
5,373,759 UART: [art] SIG.S = 003ED0EEA86E51A8BC669EB23F682323DC4A53BC9D5F61351C5AF3E8FA51318533049561E2855F4D0519292248DDE748
5,398,006 UART: mbox::rt_entry...
5,398,378 UART: ____ _ _ _ ____ _____
5,399,162 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,399,962 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,400,730 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,401,498 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,402,266 UART: |_|
5,402,578 UART:
5,678,855 UART: [rt] Runtime listening for mailbox commands...
5,679,902 >>> mbox cmd response data (128 bytes)
5,679,903 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,652,428 >>> mbox cmd response: success
7,652,428 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,665,810 UART:
7,665,826 UART: Running Caliptra FMC ...
7,666,234 UART:
7,666,377 UART: [state] CFI Enabled
7,756,062 UART: [art] Extend RT PCRs Done
7,756,490 UART: [art] Lock RT PCRs Done
7,757,579 UART: [art] Populate DV Done
7,765,994 UART: [fht] FMC Alias Private Key: 7
7,767,028 UART: [art] Derive CDI
7,767,308 UART: [art] Store in in slot 0x4
7,853,343 UART: [art] Derive Key Pair
7,853,703 UART: [art] Store priv key in slot 0x5
7,867,201 UART: [art] Derive Key Pair - Done
7,881,786 UART: [art] Signing Cert with AUTHO
7,882,266 UART: RITY.KEYID = 7
7,897,820 UART: [art] Erasing AUTHORITY.KEYID = 7
7,898,585 UART: [art] PUB.X = F5932EEBE2E124762EA7CAC01676980DD1266F1D7B8F9DAE0553DEBABCD061669BA6B8F9C15B0956F24FD7B3D081B748
7,905,362 UART: [art] PUB.Y = F2C78FE59BF5FD612CFF29539B73F518F195341CEAB46EBAD0A6AC941AFC3917581BB546E75894EA019F85F6B2157C90
7,912,321 UART: [art] SIG.R = 4F3F451132847E5F7226D19D69F0A5C1919A9BD6F5AD1831CB9E9D96A9FE17EDDC28486FC31C154A15DAFD25A104A43C
7,919,100 UART: [art] SIG.S = 0C2A8BF74C873270A37B64741175217F6912F4C3AF16373D3A78CAADE051B9A57B67EF3B88CBE16AC573B180C69D95D7
7,942,070 UART: mbox::rt_entry...
7,942,442 UART: ____ _ _ _ ____ _____
7,943,226 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,944,026 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,944,794 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,945,562 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,946,330 UART: |_|
7,946,642 UART:
8,227,096 UART: [rt] Runtime listening for mailbox commands...
8,228,143 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,228 UART: [kat] SHA2-256
890,778 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,907 UART: [kat] ++
895,059 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
903,772 UART: [kat] SHA2-512-ACC
905,673 UART: [kat] ECC-384
915,222 UART: [kat] HMAC-384Kdf
919,728 UART: [kat] LMS
1,168,040 UART: [kat] --
1,168,881 UART: [cold-reset] ++
1,169,245 UART: [fht] FHT @ 0x50003400
1,172,075 UART: [idev] ++
1,172,243 UART: [idev] CDI.KEYID = 6
1,172,604 UART: [idev] SUBJECT.KEYID = 7
1,173,029 UART: [idev] UDS.KEYID = 0
1,173,375 ready_for_fw is high
1,173,375 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,129 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,251 UART: [idev] --
1,208,310 UART: [ldev] ++
1,208,478 UART: [ldev] CDI.KEYID = 6
1,208,842 UART: [ldev] SUBJECT.KEYID = 5
1,209,269 UART: [ldev] AUTHORITY.KEYID = 7
1,209,732 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,814 UART: [fwproc] Wait for Commands...
1,281,531 UART: [fwproc] Recv command 0x46574c44
1,282,264 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,801 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,425 >>> mbox cmd response: success
2,771,694 UART: [afmc] ++
2,771,862 UART: [afmc] CDI.KEYID = 6
2,772,225 UART: [afmc] SUBJECT.KEYID = 7
2,772,651 UART: [afmc] AUTHORITY.KEYID = 5
2,808,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,737 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,466 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,349 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,068 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,851 UART: [afmc] --
2,851,819 UART: [cold-reset] --
2,852,607 UART: [state] Locking Datavault
2,853,966 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,570 UART: [state] Locking ICCM
2,855,140 UART: [exit] Launching FMC @ 0x40000130
2,860,469 UART:
2,860,485 UART: Running Caliptra FMC ...
2,860,893 UART:
2,860,947 UART: [state] CFI Enabled
2,871,520 UART: [fht] FMC Alias Private Key: 7
2,980,009 UART: [art] Extend RT PCRs Done
2,980,437 UART: [art] Lock RT PCRs Done
2,982,137 UART: [art] Populate DV Done
2,990,358 UART: [fht] FMC Alias Private Key: 7
2,991,502 UART: [art] Derive CDI
2,991,782 UART: [art] Store in in slot 0x4
3,077,125 UART: [art] Derive Key Pair
3,077,485 UART: [art] Store priv key in slot 0x5
3,090,939 UART: [art] Derive Key Pair - Done
3,105,764 UART: [art] Signing Cert with AUTHO
3,106,244 UART: RITY.KEYID = 7
3,121,766 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,531 UART: [art] PUB.X = 55CB99AC277DD47C30B10552FFE00DCE2F26D4B90D5A320B14366D1E2096B65CE689AA3FC98F619C593E5A5679B05434
3,129,295 UART: [art] PUB.Y = D1F4015E01A450A0BBACD820C06BCFFA491B80E513246DD91B599DB760DCF71167B2AB494CA14D2E27BF5119E3F1AB1B
3,136,257 UART: [art] SIG.R = 65ED87C399EAB35CF0E0C94CACA4203E18BDDEE4966D7F5D2FC5F369008E91284812FEE63E003EDFA262576ABDE91C7C
3,143,003 UART: [art] SIG.S = AE951CD4C5F9121B631AC1DC4D8E720491C7529FF6A9023531AABA6DEAB512BA9EA11381B8AB1A03E6D4B40495A41EB0
3,167,110 UART: Caliptra RT
3,167,363 UART: [state] CFI Enabled
3,274,658 UART: [rt] RT listening for mailbox commands...
3,275,328 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,084 UART: [rt]cmd =0x50435252, len=8
3,306,712 >>> mbox cmd response data (8 bytes)
3,306,713 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,546 UART:
3,307,562 UART: Running Caliptra ROM ...
3,307,970 UART:
3,308,025 UART: [state] CFI Enabled
3,310,815 UART: [state] LifecycleState = Unprovisioned
3,311,470 UART: [state] DebugLocked = No
3,311,994 UART: [state] WD Timer not started. Device not locked for debugging
3,313,148 UART: [kat] SHA2-256
4,116,698 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,827 UART: [kat] ++
4,120,979 UART: [kat] sha1
4,125,159 UART: [kat] SHA2-256
4,127,099 UART: [kat] SHA2-384
4,129,888 UART: [kat] SHA2-512-ACC
4,131,788 UART: [kat] ECC-384
4,141,793 UART: [kat] HMAC-384Kdf
4,146,399 UART: [kat] LMS
4,394,711 UART: [kat] --
4,395,675 UART: [update-reset] ++
5,297,434 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,298,605 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,394,729 >>> mbox cmd response: success
5,394,729 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,394,836 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,850 UART: [update-reset Success] --
5,403,943 UART: [state] Locking Datavault
5,404,671 UART: [state] Locking PCR0, PCR1 and PCR31
5,405,275 UART: [state] Locking ICCM
5,405,713 UART: [exit] Launching FMC @ 0x40000130
5,411,042 UART:
5,411,058 UART: Running Caliptra FMC ...
5,411,466 UART:
5,411,520 UART: [state] CFI Enabled
5,500,551 UART: [art] Extend RT PCRs Done
5,500,979 UART: [art] Lock RT PCRs Done
5,502,148 UART: [art] Populate DV Done
5,510,617 UART: [fht] FMC Alias Private Key: 7
5,511,777 UART: [art] Derive CDI
5,512,057 UART: [art] Store in in slot 0x4
5,598,122 UART: [art] Derive Key Pair
5,598,482 UART: [art] Store priv key in slot 0x5
5,611,498 UART: [art] Derive Key Pair - Done
5,626,327 UART: [art] Signing Cert with AUTHO
5,626,807 UART: RITY.KEYID = 7
5,641,681 UART: [art] Erasing AUTHORITY.KEYID = 7
5,642,446 UART: [art] PUB.X = BDCCE9B0A07745C9A810EF65EEB13064C45785DD1EE1CD490BAD1CC02307CAFD7EA97841EC3AF2816E6EDFD2F6449610
5,649,232 UART: [art] PUB.Y = 820DC591E3CB36248704DC9B45BA044B708EFFE2A7D172885BED7124F9A5CE304618E6A7E7873B6C25444CC3E0217673
5,656,175 UART: [art] SIG.R = D1F28CE25888A72F787DC915C0894227585A287F4172353898FE5C1A7980A4D24D4E6FA03CC4AE90F3E69B546C10E3DA
5,662,947 UART: [art] SIG.S = 0EDCD53ECE2AC26278713F7D64FF34BAEF88C0225C193A1509413B43DC405571F9C9872A2486D6D9625E3710E4D98AED
5,686,744 UART: mbox::rt_entry...
5,687,116 UART: ____ _ _ _ ____ _____
5,687,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,688,700 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,689,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,690,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,691,004 UART: |_|
5,691,316 UART:
5,974,724 UART: [rt] Runtime listening for mailbox commands...
5,975,771 >>> mbox cmd response data (128 bytes)
5,975,772 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,975,883 UART:
5,975,899 UART: Running Caliptra ROM ...
5,976,307 UART:
5,976,362 UART: [state] CFI Enabled
5,978,902 UART: [state] LifecycleState = Unprovisioned
5,979,557 UART: [state] DebugLocked = No
5,980,141 UART: [state] WD Timer not started. Device not locked for debugging
5,981,259 UART: [kat] SHA2-256
6,784,809 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,788,938 UART: [kat] ++
6,789,090 UART: [kat] sha1
6,793,298 UART: [kat] SHA2-256
6,795,238 UART: [kat] SHA2-384
6,798,181 UART: [kat] SHA2-512-ACC
6,800,081 UART: [kat] ECC-384
6,809,708 UART: [kat] HMAC-384Kdf
6,814,186 UART: [kat] LMS
7,062,498 UART: [kat] --
7,063,420 UART: [update-reset] ++
7,964,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,965,602 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,061,726 >>> mbox cmd response: success
8,061,726 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,061,929 UART: [update-reset] Copying MAN_2 To MAN_1
8,069,943 UART: [update-reset Success] --
8,070,718 UART: [state] Locking Datavault
8,071,566 UART: [state] Locking PCR0, PCR1 and PCR31
8,072,170 UART: [state] Locking ICCM
8,072,636 UART: [exit] Launching FMC @ 0x40000130
8,077,965 UART:
8,077,981 UART: Running Caliptra FMC ...
8,078,389 UART:
8,078,443 UART: [state] CFI Enabled
8,167,846 UART: [art] Extend RT PCRs Done
8,168,274 UART: [art] Lock RT PCRs Done
8,169,399 UART: [art] Populate DV Done
8,177,714 UART: [fht] FMC Alias Private Key: 7
8,178,874 UART: [art] Derive CDI
8,179,154 UART: [art] Store in in slot 0x4
8,264,673 UART: [art] Derive Key Pair
8,265,033 UART: [art] Store priv key in slot 0x5
8,277,833 UART: [art] Derive Key Pair - Done
8,292,240 UART: [art] Signing Cert with AUTHO
8,292,720 UART: RITY.KEYID = 7
8,307,908 UART: [art] Erasing AUTHORITY.KEYID = 7
8,308,673 UART: [art] PUB.X = E326679BAAEF2E1D4E5C75609CE26BE5292A94899035B2857BC5C8F7128B264E47D2F04FE78F401A85C1A469627888B5
8,315,443 UART: [art] PUB.Y = BEC0B65C7181B68D254BBF61097726E3C3D7B85D4106F64AEB382083F7AF97AC87BD983C47C48C87BD155ED63F6A3805
8,322,392 UART: [art] SIG.R = 24B0A0986AB44F11B3E2A9E86F1ECEAB700EE45567D78176897A47B857189F29235C40F73A23F95A67CDC3FF96149883
8,329,159 UART: [art] SIG.S = E1D54A0C9267CE632B00B7A141E5EA78DEDFF14C501FDB7BE14FB828479018246EDA93B54871BE8AC5F562393BA6643A
8,353,117 UART: mbox::rt_entry...
8,353,489 UART: ____ _ _ _ ____ _____
8,354,273 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,355,073 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,355,841 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,356,609 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,357,377 UART: |_|
8,357,689 UART:
8,638,263 UART: [rt] Runtime listening for mailbox commands...
8,639,310 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,962 ready_for_fw is high
1,055,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,867 >>> mbox cmd response: success
2,682,673 UART:
2,682,689 UART: Running Caliptra FMC ...
2,683,097 UART:
2,683,151 UART: [state] CFI Enabled
2,693,508 UART: [fht] FMC Alias Private Key: 7
2,801,491 UART: [art] Extend RT PCRs Done
2,801,919 UART: [art] Lock RT PCRs Done
2,803,153 UART: [art] Populate DV Done
2,811,048 UART: [fht] FMC Alias Private Key: 7
2,812,004 UART: [art] Derive CDI
2,812,284 UART: [art] Store in in slot 0x4
2,897,773 UART: [art] Derive Key Pair
2,898,133 UART: [art] Store priv key in slot 0x5
2,911,563 UART: [art] Derive Key Pair - Done
2,926,287 UART: [art] Signing Cert with AUTHO
2,926,767 UART: RITY.KEYID = 7
2,941,671 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,436 UART: [art] PUB.X = 399D2E80BED7A395CBFF80F79B0572265D821806F1B1E153E0E21568B91A11F42FE241ADF7C17A49994E9F052E1054C6
2,949,199 UART: [art] PUB.Y = 2F3BCBD5409D1FC5A5A395150F08A79F7CC342F183B53D76F515685FFF06DDDB145D53545D196DB685554B068AB84279
2,956,141 UART: [art] SIG.R = 96A035FA2DDFCDF68182B7843FAF336FBAF346A03439E92F1904347A76602B51B7923156192C8BCEB2425A6695C21FB6
2,962,910 UART: [art] SIG.S = 2AEE82F5AAAE23BBE922EEAD505EC568B0A6ECA3FD38AE80C7865410AA667E39A6E9439D61DD50D2A8B5598735E2AD83
2,986,303 UART: Caliptra RT
2,986,556 UART: [state] CFI Enabled
3,094,639 UART: [rt] RT listening for mailbox commands...
3,095,309 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,077 UART: [rt]cmd =0x50435252, len=8
3,126,657 >>> mbox cmd response data (8 bytes)
3,126,658 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,096,015 >>> mbox cmd response: success
5,096,015 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,109,449 UART:
5,109,465 UART: Running Caliptra FMC ...
5,109,873 UART:
5,109,927 UART: [state] CFI Enabled
5,198,316 UART: [art] Extend RT PCRs Done
5,198,744 UART: [art] Lock RT PCRs Done
5,199,907 UART: [art] Populate DV Done
5,208,036 UART: [fht] FMC Alias Private Key: 7
5,209,186 UART: [art] Derive CDI
5,209,466 UART: [art] Store in in slot 0x4
5,295,093 UART: [art] Derive Key Pair
5,295,453 UART: [art] Store priv key in slot 0x5
5,308,559 UART: [art] Derive Key Pair - Done
5,323,359 UART: [art] Signing Cert with AUTHO
5,323,839 UART: RITY.KEYID = 7
5,338,995 UART: [art] Erasing AUTHORITY.KEYID = 7
5,339,760 UART: [art] PUB.X = EE5A2BDDB6B2A984F23CCBB9037EBA955A35238434FE7D3BD2123BA32A62B4829A113B7A0806F9DEE15C4F3ED50031C9
5,346,515 UART: [art] PUB.Y = 921CC6B6D0A82E867DEB451E9BB982790850E868FCA55FF1E5A733CE1F834A85F4AD5AD853F878D4F2C6CC8FB3575138
5,353,474 UART: [art] SIG.R = 37D7889AEF8004E919615B8A9F645387ED0C7B469B2D880B5A4031FF46B1CAD84CCCE720821322FBCA8ADA3E00C05127
5,360,221 UART: [art] SIG.S = 827C2494EDFF6001B041FFBD1E648283F30A5F822CA54547AA80C9E53E4E09F81D51DDF881E8F16A3C19DA5FECDCE325
5,383,739 UART: mbox::rt_entry...
5,384,111 UART: ____ _ _ _ ____ _____
5,384,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,385,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,386,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,387,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,387,999 UART: |_|
5,388,311 UART:
5,668,589 UART: [rt] Runtime listening for mailbox commands...
5,669,636 >>> mbox cmd response data (128 bytes)
5,669,637 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,637,370 >>> mbox cmd response: success
7,637,370 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,650,452 UART:
7,650,468 UART: Running Caliptra FMC ...
7,650,876 UART:
7,650,930 UART: [state] CFI Enabled
7,740,011 UART: [art] Extend RT PCRs Done
7,740,439 UART: [art] Lock RT PCRs Done
7,741,628 UART: [art] Populate DV Done
7,749,719 UART: [fht] FMC Alias Private Key: 7
7,750,883 UART: [art] Derive CDI
7,751,163 UART: [art] Store in in slot 0x4
7,837,228 UART: [art] Derive Key Pair
7,837,588 UART: [art] Store priv key in slot 0x5
7,850,990 UART: [art] Derive Key Pair - Done
7,865,817 UART: [art] Signing Cert with AUTHO
7,866,297 UART: RITY.KEYID = 7
7,881,251 UART: [art] Erasing AUTHORITY.KEYID = 7
7,882,016 UART: [art] PUB.X = 1408B821DFF1A5FB102CD803B02667D39A493CB04B0C9F7BE6D251CCA339839067FFF44D9A64B1CC563C1A7F0D45B11E
7,888,786 UART: [art] PUB.Y = 5DA5A66A3282340FEB21352FAD24D1493EC31C1C94276610203D45B092A547ACDE99E434103D07AE0EE08AAFFC20ED92
7,895,735 UART: [art] SIG.R = E84C8F18889C25ACE8BFD9F38605734B38CF26E581E18F8098EBBA1AE97F8F201A173DDBBDC3CB661CB11B4D667E0A25
7,902,517 UART: [art] SIG.S = F2A453F6F96DD24AC4DC08C25D08B7007DF6EB6EFF1BA6717F8BA4843481B2AFF2C7237013B3A0140E5CD38F991A2175
7,925,927 UART: mbox::rt_entry...
7,926,299 UART: ____ _ _ _ ____ _____
7,927,083 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,927,883 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,928,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,929,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,930,187 UART: |_|
7,930,499 UART:
8,208,934 UART: [rt] Runtime listening for mailbox commands...
8,209,981 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Unprovisioned
85,878 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,932 UART: [kat] SHA2-256
901,872 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,534 UART: [fht] FHT @ 0x50003400
1,173,336 UART: [idev] ++
1,173,504 UART: [idev] CDI.KEYID = 6
1,173,865 UART: [idev] SUBJECT.KEYID = 7
1,174,290 UART: [idev] UDS.KEYID = 0
1,174,636 ready_for_fw is high
1,174,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,626 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,978 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,365 UART: [ldev] --
1,281,823 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,217 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,149 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,458 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,936 >>> mbox cmd response: success
2,772,995 UART: [afmc] ++
2,773,163 UART: [afmc] CDI.KEYID = 6
2,773,526 UART: [afmc] SUBJECT.KEYID = 7
2,773,952 UART: [afmc] AUTHORITY.KEYID = 5
2,809,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,254 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,973 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,726 UART: [afmc] --
2,852,854 UART: [cold-reset] --
2,853,762 UART: [state] Locking Datavault
2,854,937 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,541 UART: [state] Locking ICCM
2,856,127 UART: [exit] Launching FMC @ 0x40000130
2,861,456 UART:
2,861,472 UART: Running Caliptra FMC ...
2,861,880 UART:
2,862,023 UART: [state] CFI Enabled
2,872,672 UART: [fht] FMC Alias Private Key: 7
2,981,349 UART: [art] Extend RT PCRs Done
2,981,777 UART: [art] Lock RT PCRs Done
2,983,333 UART: [art] Populate DV Done
2,991,620 UART: [fht] FMC Alias Private Key: 7
2,992,764 UART: [art] Derive CDI
2,993,044 UART: [art] Store in in slot 0x4
3,078,461 UART: [art] Derive Key Pair
3,078,821 UART: [art] Store priv key in slot 0x5
3,091,773 UART: [art] Derive Key Pair - Done
3,106,104 UART: [art] Signing Cert with AUTHO
3,106,584 UART: RITY.KEYID = 7
3,122,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,793 UART: [art] PUB.X = 9B3EC6FA59C8B60408F28F2B98003861BCB62F9463AA1F2550F7A2FABD2DF4CCC972BAC2E9A299CBF40B7AA63F28DEA3
3,129,556 UART: [art] PUB.Y = 4D20867AD18F0986846B378C7F0FE31A7F0FE7C41D1D31B979060B0699169907E800EBC4E726522A6B2A7D51B39F5C9C
3,136,463 UART: [art] SIG.R = 60D1CFB988F75038E59CD7F12C02F6DA5200907EADA58D607AEE8CE9D8FAF0AB10367680C177B6CE6ACD5D231CF62408
3,143,221 UART: [art] SIG.S = 3A5EBE2A1AE8244EDFDCD129EC9C214EECCFC48499E36139AF6A213C46B17930A3A9038120011EF30B4F3858C104084E
3,167,367 UART: Caliptra RT
3,167,712 UART: [state] CFI Enabled
3,276,115 UART: [rt] RT listening for mailbox commands...
3,276,785 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,763 UART: [rt]cmd =0x50435252, len=8
3,308,545 >>> mbox cmd response data (8 bytes)
3,308,546 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,333 UART:
3,309,349 UART: Running Caliptra ROM ...
3,309,757 UART:
3,309,899 UART: [state] CFI Enabled
3,312,693 UART: [state] LifecycleState = Unprovisioned
3,313,348 UART: [state] DebugLocked = No
3,313,886 UART: [state] WD Timer not started. Device not locked for debugging
3,315,104 UART: [kat] SHA2-256
4,118,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,122,783 UART: [kat] ++
4,122,935 UART: [kat] sha1
4,127,357 UART: [kat] SHA2-256
4,129,297 UART: [kat] SHA2-384
4,132,048 UART: [kat] SHA2-512-ACC
4,133,948 UART: [kat] ECC-384
4,143,387 UART: [kat] HMAC-384Kdf
4,148,119 UART: [kat] LMS
4,396,431 UART: [kat] --
4,397,391 UART: [update-reset] ++
5,300,264 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,301,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,397,555 >>> mbox cmd response: success
5,397,555 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,397,872 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,886 UART: [update-reset Success] --
5,406,811 UART: [state] Locking Datavault
5,407,649 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,253 UART: [state] Locking ICCM
5,408,819 UART: [exit] Launching FMC @ 0x40000130
5,414,148 UART:
5,414,164 UART: Running Caliptra FMC ...
5,414,572 UART:
5,414,715 UART: [state] CFI Enabled
5,503,896 UART: [art] Extend RT PCRs Done
5,504,324 UART: [art] Lock RT PCRs Done
5,505,353 UART: [art] Populate DV Done
5,513,756 UART: [fht] FMC Alias Private Key: 7
5,514,826 UART: [art] Derive CDI
5,515,106 UART: [art] Store in in slot 0x4
5,600,821 UART: [art] Derive Key Pair
5,601,181 UART: [art] Store priv key in slot 0x5
5,613,725 UART: [art] Derive Key Pair - Done
5,628,654 UART: [art] Signing Cert with AUTHO
5,629,134 UART: RITY.KEYID = 7
5,644,060 UART: [art] Erasing AUTHORITY.KEYID = 7
5,644,825 UART: [art] PUB.X = C700BAFE2CBBEAAF037A43C5C6114525CD2B6138550E202187A304DA88261842AB1ABCD439F09552251FCC3452ABE128
5,651,572 UART: [art] PUB.Y = 4BF6EE148E5BDD4C30657EF04401AA09E4FCECAED2CA94446D4E80316058565844E2AC459BF2A79C88D2C276A76190EA
5,658,528 UART: [art] SIG.R = C197ACD872A677404A6193F94212AC26CA299FBCA37A2E0A003A46FE51480AC7A2814D8AA8E286AEDD63846ACE1DBB36
5,665,284 UART: [art] SIG.S = 0A0F711F1C4B5DA43C500CBC131616B0B2CA8E2B7C70974B7775FC76410EEA5DD9252B03A46A6774AE5AEC84752AB39B
5,689,292 UART: mbox::rt_entry...
5,689,664 UART: ____ _ _ _ ____ _____
5,690,448 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,691,248 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,692,016 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,692,784 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,693,552 UART: |_|
5,693,864 UART:
5,974,342 UART: [rt] Runtime listening for mailbox commands...
5,975,389 >>> mbox cmd response data (128 bytes)
5,975,390 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,975,501 UART:
5,975,517 UART: Running Caliptra ROM ...
5,975,925 UART:
5,976,067 UART: [state] CFI Enabled
5,979,161 UART: [state] LifecycleState = Unprovisioned
5,979,816 UART: [state] DebugLocked = No
5,980,508 UART: [state] WD Timer not started. Device not locked for debugging
5,981,810 UART: [kat] SHA2-256
6,785,360 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,789,489 UART: [kat] ++
6,789,641 UART: [kat] sha1
6,793,819 UART: [kat] SHA2-256
6,795,759 UART: [kat] SHA2-384
6,798,572 UART: [kat] SHA2-512-ACC
6,800,472 UART: [kat] ECC-384
6,809,935 UART: [kat] HMAC-384Kdf
6,814,651 UART: [kat] LMS
7,062,963 UART: [kat] --
7,063,725 UART: [update-reset] ++
7,965,238 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,966,423 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,062,547 >>> mbox cmd response: success
8,062,547 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,062,722 UART: [update-reset] Copying MAN_2 To MAN_1
8,070,736 UART: [update-reset Success] --
8,071,717 UART: [state] Locking Datavault
8,072,709 UART: [state] Locking PCR0, PCR1 and PCR31
8,073,313 UART: [state] Locking ICCM
8,073,837 UART: [exit] Launching FMC @ 0x40000130
8,079,166 UART:
8,079,182 UART: Running Caliptra FMC ...
8,079,590 UART:
8,079,733 UART: [state] CFI Enabled
8,168,880 UART: [art] Extend RT PCRs Done
8,169,308 UART: [art] Lock RT PCRs Done
8,170,525 UART: [art] Populate DV Done
8,178,630 UART: [fht] FMC Alias Private Key: 7
8,179,678 UART: [art] Derive CDI
8,179,958 UART: [art] Store in in slot 0x4
8,266,077 UART: [art] Derive Key Pair
8,266,437 UART: [art] Store priv key in slot 0x5
8,279,937 UART: [art] Derive Key Pair - Done
8,294,870 UART: [art] Signing Cert with AUTHO
8,295,350 UART: RITY.KEYID = 7
8,310,430 UART: [art] Erasing AUTHORITY.KEYID = 7
8,311,195 UART: [art] PUB.X = AE676300D454407C7A93006F3AEF065FE8AA3C4E86E01C3F4F63D676BD11262949D7B06C78B8E88AB1BEEFEDC8D89249
8,317,930 UART: [art] PUB.Y = 9014AAE4BA8FCDCE65D01A883482DDD58530019C212FE50572D70C7360E9584433145585C7A338600FC62B8395F3464A
8,324,862 UART: [art] SIG.R = 3D766BCACC91469CA58C0A5C8552C5458A91ECB838B8D8B222B3EE14F2DDCB1B06495A49A162996F7FD2458D8E0A1313
8,331,633 UART: [art] SIG.S = DA213899E7578126A86561EC29950892164FDCECEFBD2145841AD51B7494138A6E86510F2800AA7A0A9895FB34996FB5
8,355,337 UART: mbox::rt_entry...
8,355,709 UART: ____ _ _ _ ____ _____
8,356,493 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,357,293 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,358,061 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,358,829 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,359,597 UART: |_|
8,359,909 UART:
8,645,203 UART: [rt] Runtime listening for mailbox commands...
8,646,250 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,069 ready_for_fw is high
1,056,069 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,780 >>> mbox cmd response: success
2,684,414 UART:
2,684,430 UART: Running Caliptra FMC ...
2,684,838 UART:
2,684,981 UART: [state] CFI Enabled
2,695,740 UART: [fht] FMC Alias Private Key: 7
2,804,089 UART: [art] Extend RT PCRs Done
2,804,517 UART: [art] Lock RT PCRs Done
2,806,477 UART: [art] Populate DV Done
2,814,480 UART: [fht] FMC Alias Private Key: 7
2,815,562 UART: [art] Derive CDI
2,815,842 UART: [art] Store in in slot 0x4
2,901,585 UART: [art] Derive Key Pair
2,901,945 UART: [art] Store priv key in slot 0x5
2,915,801 UART: [art] Derive Key Pair - Done
2,930,614 UART: [art] Signing Cert with AUTHO
2,931,094 UART: RITY.KEYID = 7
2,946,500 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,265 UART: [art] PUB.X = 49B12B4D1BFCD9FDBA0B6A99475149D6E25A7C7791279B4AC59D1ACFBADEE00595B29CBDD29586B70E10A25D967F5185
2,954,042 UART: [art] PUB.Y = B31D42B6755D2310706BC9718EA8D22E027EE070ECAB159DDC210015C5CA219E3A370B30EE6D17435182D3BD39EC0F1D
2,960,969 UART: [art] SIG.R = 220AA37DB781E192BF694731D99A7D136A61CD3CA94D9836ED068F6D7A346B0B3D86BBB3994EDEC782890E429B5F96C9
2,967,735 UART: [art] SIG.S = FA78C4290E57F4483347186A508304A245DED237014F9FF89417756C3163A35045FD9C1D2B3A9DC029C603BE2ABE94A2
2,991,562 UART: Caliptra RT
2,991,907 UART: [state] CFI Enabled
3,100,168 UART: [rt] RT listening for mailbox commands...
3,100,838 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,326 UART: [rt]cmd =0x50435252, len=8
3,132,006 >>> mbox cmd response data (8 bytes)
3,132,007 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,100,967 >>> mbox cmd response: success
5,100,967 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,114,355 UART:
5,114,371 UART: Running Caliptra FMC ...
5,114,779 UART:
5,114,922 UART: [state] CFI Enabled
5,203,715 UART: [art] Extend RT PCRs Done
5,204,143 UART: [art] Lock RT PCRs Done
5,205,346 UART: [art] Populate DV Done
5,213,507 UART: [fht] FMC Alias Private Key: 7
5,214,637 UART: [art] Derive CDI
5,214,917 UART: [art] Store in in slot 0x4
5,300,402 UART: [art] Derive Key Pair
5,300,762 UART: [art] Store priv key in slot 0x5
5,314,680 UART: [art] Derive Key Pair - Done
5,329,361 UART: [art] Signing Cert with AUTHO
5,329,841 UART: RITY.KEYID = 7
5,345,539 UART: [art] Erasing AUTHORITY.KEYID = 7
5,346,304 UART: [art] PUB.X = 9D428F99ECA3F5D920D326F010431437AA98130F9DCEC11718F0FDDC3E7D1E5967949D2E9E2A209BEAA829EA4724E0D1
5,353,081 UART: [art] PUB.Y = 5D9972F939C7D0F22C5F13D660866F5A365574FCB7E5CC055C2D7EB01F5E93DE4C131609B9AFA2CEBBD6C04BD9C74415
5,360,039 UART: [art] SIG.R = FA82F7A46F9E93ABC54263A8905E9D95C849AC4189F21BCA0FA025E4CEF1FCB779C091A69345EA64A411EF584868AA0B
5,366,817 UART: [art] SIG.S = BDAC247AF02BAA6A73791F0BEA7E566BD8E6AE0E511ACA481DC2D93F41EF3346A23EA18838732FDC5461E95AC140AFE9
5,390,582 UART: mbox::rt_entry...
5,390,954 UART: ____ _ _ _ ____ _____
5,391,738 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,392,538 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,393,306 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,394,074 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,394,842 UART: |_|
5,395,154 UART:
5,678,859 UART: [rt] Runtime listening for mailbox commands...
5,679,906 >>> mbox cmd response data (128 bytes)
5,679,907 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,648,839 >>> mbox cmd response: success
7,648,839 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,662,147 UART:
7,662,163 UART: Running Caliptra FMC ...
7,662,571 UART:
7,662,714 UART: [state] CFI Enabled
7,751,961 UART: [art] Extend RT PCRs Done
7,752,389 UART: [art] Lock RT PCRs Done
7,753,730 UART: [art] Populate DV Done
7,761,821 UART: [fht] FMC Alias Private Key: 7
7,762,851 UART: [art] Derive CDI
7,763,131 UART: [art] Store in in slot 0x4
7,848,490 UART: [art] Derive Key Pair
7,848,850 UART: [art] Store priv key in slot 0x5
7,861,960 UART: [art] Derive Key Pair - Done
7,876,628 UART: [art] Signing Cert with AUTHO
7,877,108 UART: RITY.KEYID = 7
7,892,710 UART: [art] Erasing AUTHORITY.KEYID = 7
7,893,475 UART: [art] PUB.X = 8808CEFBF90067BA27B4A024F26098A6E89F91B6C1BBB835E75FC41BA72C436B207AF843413BEB43494DE8822303C065
7,900,221 UART: [art] PUB.Y = 8FEB5AD80CF4B6A4D591FC50F93BFCFF056F9D55B9289A649C29F3CF0A4C70F09D8424DF48BE5FFED22B75AC8F5A3660
7,907,186 UART: [art] SIG.R = 1622E53B745792E74686CF24249974F82081427F0B1404256D9751A16E3E12BF827C9A167559388FD7CAF5B85170945B
7,913,934 UART: [art] SIG.S = 20F1CA264614F3793AF87DD601B65B85D062E830B68ABE0D69DC7984552215FCFA5997DFBEB0C21596F67940D7791D51
7,937,731 UART: mbox::rt_entry...
7,938,103 UART: ____ _ _ _ ____ _____
7,938,887 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,939,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,940,455 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,941,223 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,941,991 UART: |_|
7,942,303 UART:
8,228,655 UART: [rt] Runtime listening for mailbox commands...
8,229,702 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,214 UART:
192,565 UART: Running Caliptra ROM ...
193,749 UART:
193,898 UART: [state] CFI Enabled
261,786 UART: [state] LifecycleState = Unprovisioned
263,775 UART: [state] DebugLocked = No
265,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,495 UART: [kat] SHA2-256
441,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,701 UART: [kat] ++
452,142 UART: [kat] sha1
461,731 UART: [kat] SHA2-256
464,439 UART: [kat] SHA2-384
469,923 UART: [kat] SHA2-512-ACC
472,311 UART: [kat] ECC-384
2,765,896 UART: [kat] HMAC-384Kdf
2,798,751 UART: [kat] LMS
3,989,072 UART: [kat] --
3,992,839 UART: [cold-reset] ++
3,994,017 UART: [fht] Storing FHT @ 0x50003400
4,005,927 UART: [idev] ++
4,006,490 UART: [idev] CDI.KEYID = 6
4,007,546 UART: [idev] SUBJECT.KEYID = 7
4,008,648 UART: [idev] UDS.KEYID = 0
4,009,630 ready_for_fw is high
4,009,818 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,152,974 UART: [idev] Erasing UDS.KEYID = 0
7,345,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,050 UART: [idev] --
7,370,175 UART: [ldev] ++
7,370,755 UART: [ldev] CDI.KEYID = 6
7,371,734 UART: [ldev] SUBJECT.KEYID = 5
7,372,944 UART: [ldev] AUTHORITY.KEYID = 7
7,374,207 UART: [ldev] FE.KEYID = 1
7,419,824 UART: [ldev] Erasing FE.KEYID = 1
10,753,469 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,500 UART: [ldev] --
13,133,602 UART: [fwproc] Waiting for Commands...
13,136,257 UART: [fwproc] Received command 0x46574c44
13,138,490 UART: [fwproc] Received Image of size 113844 bytes
17,189,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,268,117 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,337,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,653,220 >>> mbox cmd response: success
17,658,287 UART: [afmc] ++
17,658,887 UART: [afmc] CDI.KEYID = 6
17,659,797 UART: [afmc] SUBJECT.KEYID = 7
17,661,006 UART: [afmc] AUTHORITY.KEYID = 5
21,030,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,345,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,347,998 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,362,478 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,377,239 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,391,670 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,412,609 UART: [afmc] --
23,417,169 UART: [cold-reset] --
23,421,238 UART: [state] Locking Datavault
23,427,452 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,205 UART: [state] Locking ICCM
23,432,004 UART: [exit] Launching FMC @ 0x40000130
23,440,046 UART:
23,440,287 UART: Running Caliptra FMC ...
23,441,311 UART:
23,441,458 UART: [state] CFI Enabled
23,505,758 UART: [fht] FMC Alias Private Key: 7
25,844,265 UART: [art] Extend RT PCRs Done
25,845,487 UART: [art] Lock RT PCRs Done
25,846,968 UART: [art] Populate DV Done
25,852,425 UART: [fht] FMC Alias Private Key: 7
25,853,954 UART: [art] Derive CDI
25,854,688 UART: [art] Store in in slot 0x4
25,912,633 UART: [art] Derive Key Pair
25,913,671 UART: [art] Store priv key in slot 0x5
29,205,965 UART: [art] Derive Key Pair - Done
29,218,953 UART: [art] Signing Cert with AUTHO
29,220,267 UART: RITY.KEYID = 7
31,507,860 UART: [art] Erasing AUTHORITY.KEYID = 7
31,509,367 UART: [art] PUB.X = 34C4D8451E26C297CFB2345F7C62212146458B1128B571412158B04BCAFF742967A952727CB886FB44C99C2F119D5DE8
31,516,603 UART: [art] PUB.Y = 624A3A5849107522B7A429F7C814EC155073A0C920C1B54000F400286DBA7EAA994F9BACB9AEFDABB978E3C0464F5F64
31,523,801 UART: [art] SIG.R = 2A158319AD5DE8126F0DF679C45698C44A49B039A63BF03D417CD833F00912241673393607E92FA92B66A5072E0EAF8B
31,531,163 UART: [art] SIG.S = ABBFBBE69FC980B264D037908AB4841AF1544D63E368CEB0DCB5FDC086AFADC33B5C947A46900BF7FEA4473DA21B8AE3
32,835,876 UART: Caliptra RT
32,836,590 UART: [state] CFI Enabled
32,998,580 UART: [rt] RT listening for mailbox commands...
35,053,123 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,154,188 UART:
35,154,542 UART: Running Caliptra ROM ...
35,155,689 UART:
35,155,857 UART: [state] CFI Enabled
35,218,783 UART: [state] LifecycleState = Unprovisioned
35,220,724 UART: [state] DebugLocked = No
35,223,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,228,289 UART: [kat] SHA2-256
35,398,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,408,520 UART: [kat] ++
35,409,059 UART: [kat] sha1
35,421,570 UART: [kat] SHA2-256
35,424,249 UART: [kat] SHA2-384
35,430,074 UART: [kat] SHA2-512-ACC
35,432,486 UART: [kat] ECC-384
37,723,112 UART: [kat] HMAC-384Kdf
37,755,691 UART: [kat] LMS
38,946,070 UART: [kat] --
38,950,215 UART: [update-reset] ++
42,667,929 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,672,021 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,929,859 >>> mbox cmd response: success
42,930,256 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,931,732 UART: [update-reset] Copying MAN_2 To MAN_1
42,954,178 UART: [update-reset Success] --
42,957,589 UART: [state] Locking Datavault
42,960,794 UART: [state] Locking PCR0, PCR1 and PCR31
42,962,520 UART: [state] Locking ICCM
42,964,961 UART: [exit] Launching FMC @ 0x40000130
42,973,398 UART:
42,973,623 UART: Running Caliptra FMC ...
42,974,716 UART:
42,974,868 UART: [state] CFI Enabled
43,077,791 UART: [art] Extend RT PCRs Done
43,078,989 UART: [art] Lock RT PCRs Done
43,080,302 UART: [art] Populate DV Done
43,085,379 UART: [fht] FMC Alias Private Key: 7
43,087,025 UART: [art] Derive CDI
43,087,839 UART: [art] Store in in slot 0x4
43,146,942 UART: [art] Derive Key Pair
43,147,980 UART: [art] Store priv key in slot 0x5
46,440,598 UART: [art] Derive Key Pair - Done
46,453,971 UART: [art] Signing Cert with AUTHO
46,455,263 UART: RITY.KEYID = 7
48,741,610 UART: [art] Erasing AUTHORITY.KEYID = 7
48,743,112 UART: [art] PUB.X = D21793E8578CDF7A1D658C895BB0309C951E6F6F6AA3F33B34F33A04952F75BCBE37D72529570314E261D6A96DDD30F6
48,750,357 UART: [art] PUB.Y = 29DCAA990B86CA9E88C3D42DD9CB84CB7E3B18DE39F9D5CF0BA20C505D7C5E32EC12E9A7A19495B05FE6A2FBE9488FBD
48,757,629 UART: [art] SIG.R = EE77F7B9E7C51ED21059BE72B7514E916FA6A0CED085B9664C2BC4F3801AE028EDA09C69668B18E5F86D108052A38134
48,764,983 UART: [art] SIG.S = EB790889E6190EDD5FCC4A1B3AC90BBFB9B2D428B0857E89140B9BC9A766C76559CF202E60A1E919A3E9146A4020F844
50,070,239 UART: mbox::rt_entry...
50,071,211 UART: ____ _ _ _ ____ _____
50,073,890 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,075,835 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,077,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,079,650 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,081,575 UART: |_|
50,082,377 UART:
50,368,282 UART: [rt] Runtime listening for mailbox commands...
50,370,449 >>> mbox cmd response data (48 bytes)
50,371,032 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,371,466 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,792,754 ready_for_fw is high
3,793,699 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,878,093 >>> mbox cmd response: success
23,572,212 UART:
23,572,607 UART: Running Caliptra FMC ...
23,573,713 UART:
23,573,857 UART: [state] CFI Enabled
23,642,678 UART: [fht] FMC Alias Private Key: 7
25,980,383 UART: [art] Extend RT PCRs Done
25,981,611 UART: [art] Lock RT PCRs Done
25,982,903 UART: [art] Populate DV Done
25,988,484 UART: [fht] FMC Alias Private Key: 7
25,990,152 UART: [art] Derive CDI
25,990,882 UART: [art] Store in in slot 0x4
26,051,045 UART: [art] Derive Key Pair
26,052,089 UART: [art] Store priv key in slot 0x5
29,344,541 UART: [art] Derive Key Pair - Done
29,357,478 UART: [art] Signing Cert with AUTHO
29,358,787 UART: RITY.KEYID = 7
31,646,907 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,418 UART: [art] PUB.X = DA490236B3874D73A7AC02B723A18EFCFFD409114E11FD8A879A108C7B807A803CF2D788E486C79619766B1FE8F34B2E
31,655,694 UART: [art] PUB.Y = 99A9809E3DB760D30737D030B525B5981360B30BF2978693DAB2E3C1CE0FE4BAA7EF14906E024D9835F300BF8E0DCEC8
31,662,905 UART: [art] SIG.R = C993BB304915CD9F3369EF349DE3D4A0B60D1C554ED71AC9241B8036A6C0E197EDD27A66BA0C91580F38E188E2800811
31,670,270 UART: [art] SIG.S = 2C33FE0F921695D1EA700E1DD1433AAC86C205848E2E34F089A392878FEEF365534104B162D698EE2ECD500A692C21DE
32,976,001 UART: Caliptra RT
32,976,709 UART: [state] CFI Enabled
33,136,982 UART: [rt] RT listening for mailbox commands...
35,187,296 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,172,085 >>> mbox cmd response: success
43,172,591 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,208,257 UART:
43,208,532 UART: Running Caliptra FMC ...
43,209,560 UART:
43,209,704 UART: [state] CFI Enabled
43,304,676 UART: [art] Extend RT PCRs Done
43,305,874 UART: [art] Lock RT PCRs Done
43,307,514 UART: [art] Populate DV Done
43,313,173 UART: [fht] FMC Alias Private Key: 7
43,314,887 UART: [art] Derive CDI
43,315,619 UART: [art] Store in in slot 0x4
43,372,791 UART: [art] Derive Key Pair
43,373,788 UART: [art] Store priv key in slot 0x5
46,667,397 UART: [art] Derive Key Pair - Done
46,680,850 UART: [art] Signing Cert with AUTHO
46,682,158 UART: RITY.KEYID = 7
48,969,099 UART: [art] Erasing AUTHORITY.KEYID = 7
48,970,608 UART: [art] PUB.X = 2E6BD89AD1920C6461740C9C7F9FEA409FE1EEBBB21F2109AEC298B1B510D8E6994D6FFC6AD2CFA8CEAE1A311B288A08
48,977,912 UART: [art] PUB.Y = 962B9EB2AE0A0470FC1685B3FC2689610948FF3D81C3D6935E32CA07DAD1FD3B9C9298E5F55D717ACAA8F8B332CD03A1
48,985,160 UART: [art] SIG.R = 10F31A89DEC81344B699D4E506B96224ECD8DF9BA81916B4925F33932C20A9D443161D6F3690E63058957FEC0DCBE7DD
48,992,537 UART: [art] SIG.S = 54F7E7E7B1CDF4874C526CB69781555B7622FE929557EB1E76E3E9003125ADB6F09A2D533EC94CBF43372A81462368D6
50,297,436 UART: mbox::rt_entry...
50,298,408 UART: ____ _ _ _ ____ _____
50,300,516 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,302,513 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,304,381 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,306,313 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,308,237 UART: |_|
50,309,034 UART:
50,593,640 UART: [rt] Runtime listening for mailbox commands...
50,595,802 >>> mbox cmd response data (48 bytes)
50,596,409 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,596,836 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,458 UART:
192,816 UART: Running Caliptra ROM ...
194,021 UART:
603,453 UART: [state] CFI Enabled
618,060 UART: [state] LifecycleState = Unprovisioned
619,938 UART: [state] DebugLocked = No
621,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,642 UART: [kat] SHA2-256
796,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,853 UART: [kat] ++
807,332 UART: [kat] sha1
816,930 UART: [kat] SHA2-256
819,581 UART: [kat] SHA2-384
826,420 UART: [kat] SHA2-512-ACC
828,725 UART: [kat] ECC-384
3,113,205 UART: [kat] HMAC-384Kdf
3,125,452 UART: [kat] LMS
4,315,545 UART: [kat] --
4,320,373 UART: [cold-reset] ++
4,322,740 UART: [fht] Storing FHT @ 0x50003400
4,334,429 UART: [idev] ++
4,335,004 UART: [idev] CDI.KEYID = 6
4,336,045 UART: [idev] SUBJECT.KEYID = 7
4,337,233 UART: [idev] UDS.KEYID = 0
4,338,316 ready_for_fw is high
4,338,531 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,554 UART: [idev] Erasing UDS.KEYID = 0
7,626,833 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,154 UART: [idev] --
7,652,148 UART: [ldev] ++
7,652,773 UART: [ldev] CDI.KEYID = 6
7,653,698 UART: [ldev] SUBJECT.KEYID = 5
7,654,828 UART: [ldev] AUTHORITY.KEYID = 7
7,656,163 UART: [ldev] FE.KEYID = 1
7,667,783 UART: [ldev] Erasing FE.KEYID = 1
10,956,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,007 UART: [ldev] --
13,316,790 UART: [fwproc] Waiting for Commands...
13,318,666 UART: [fwproc] Received command 0x46574c44
13,320,848 UART: [fwproc] Received Image of size 113844 bytes
17,371,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,447,619 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,516,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,832,565 >>> mbox cmd response: success
17,836,350 UART: [afmc] ++
17,836,943 UART: [afmc] CDI.KEYID = 6
17,837,934 UART: [afmc] SUBJECT.KEYID = 7
17,839,104 UART: [afmc] AUTHORITY.KEYID = 5
21,156,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,450,510 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,452,762 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,467,134 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,482,000 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,496,430 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,190 UART: [afmc] --
23,523,392 UART: [cold-reset] --
23,525,526 UART: [state] Locking Datavault
23,531,102 UART: [state] Locking PCR0, PCR1 and PCR31
23,532,818 UART: [state] Locking ICCM
23,535,402 UART: [exit] Launching FMC @ 0x40000130
23,543,808 UART:
23,544,049 UART: Running Caliptra FMC ...
23,545,174 UART:
23,545,334 UART: [state] CFI Enabled
23,553,327 UART: [fht] FMC Alias Private Key: 7
25,883,782 UART: [art] Extend RT PCRs Done
25,884,997 UART: [art] Lock RT PCRs Done
25,886,724 UART: [art] Populate DV Done
25,892,193 UART: [fht] FMC Alias Private Key: 7
25,893,812 UART: [art] Derive CDI
25,894,626 UART: [art] Store in in slot 0x4
25,937,276 UART: [art] Derive Key Pair
25,938,317 UART: [art] Store priv key in slot 0x5
29,179,898 UART: [art] Derive Key Pair - Done
29,193,314 UART: [art] Signing Cert with AUTHO
29,194,640 UART: RITY.KEYID = 7
31,474,282 UART: [art] Erasing AUTHORITY.KEYID = 7
31,475,781 UART: [art] PUB.X = 4463C16E63436170E232C6583FCF13A9129FF183403C82A183DFE2254906C6B92DB987E53301214984AA2814C10F704A
31,483,003 UART: [art] PUB.Y = 54FB5331F61831F49FDB99D2060F235EBCA02E432B1A218ACE2E0FAFC1F3CB1B002A9F1E171D868226E85CAD32D9F553
31,490,259 UART: [art] SIG.R = 2DF0F50AF2031BD4196DB785D87D62B6BBF4FAAA7451FAEAA91EDA909D59CBCEC70CF67ABC941776567F96887A4B5B85
31,497,622 UART: [art] SIG.S = 251C8C10CF22E7398FB60626192E3D46B6C6F1269B52E113F27D2F3DC3ED014DA944108450E1FD97964F41A17F9F8D35
32,802,422 UART: Caliptra RT
32,803,131 UART: [state] CFI Enabled
32,920,790 UART: [rt] RT listening for mailbox commands...
35,040,908 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,141,710 UART:
35,142,080 UART: Running Caliptra ROM ...
35,143,136 UART:
35,143,346 UART: [state] CFI Enabled
35,159,200 UART: [state] LifecycleState = Unprovisioned
35,161,170 UART: [state] DebugLocked = No
35,163,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,168,496 UART: [kat] SHA2-256
35,338,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,348,776 UART: [kat] ++
35,349,269 UART: [kat] sha1
35,359,569 UART: [kat] SHA2-256
35,362,255 UART: [kat] SHA2-384
35,368,290 UART: [kat] SHA2-512-ACC
35,370,648 UART: [kat] ECC-384
37,654,300 UART: [kat] HMAC-384Kdf
37,665,627 UART: [kat] LMS
38,855,684 UART: [kat] --
38,859,911 UART: [update-reset] ++
42,569,433 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,572,778 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,830,639 >>> mbox cmd response: success
42,831,025 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,831,382 UART: [update-reset] Copying MAN_2 To MAN_1
42,853,766 UART: [update-reset Success] --
42,859,625 UART: [state] Locking Datavault
42,862,767 UART: [state] Locking PCR0, PCR1 and PCR31
42,864,523 UART: [state] Locking ICCM
42,866,139 UART: [exit] Launching FMC @ 0x40000130
42,874,520 UART:
42,874,774 UART: Running Caliptra FMC ...
42,875,908 UART:
42,876,070 UART: [state] CFI Enabled
42,920,248 UART: [art] Extend RT PCRs Done
42,921,396 UART: [art] Lock RT PCRs Done
42,922,792 UART: [art] Populate DV Done
42,928,520 UART: [fht] FMC Alias Private Key: 7
42,930,237 UART: [art] Derive CDI
42,931,050 UART: [art] Store in in slot 0x4
42,973,753 UART: [art] Derive Key Pair
42,974,792 UART: [art] Store priv key in slot 0x5
46,216,641 UART: [art] Derive Key Pair - Done
46,229,629 UART: [art] Signing Cert with AUTHO
46,230,959 UART: RITY.KEYID = 7
48,509,911 UART: [art] Erasing AUTHORITY.KEYID = 7
48,511,421 UART: [art] PUB.X = 76E815447E5A6D78AC4A0603FC45C513AD691693EFD6E51A55170D096414082677B6A4F3848AC2B95BA4F0EA2D538F8F
48,518,685 UART: [art] PUB.Y = 285BA06F343C94A5B00900AABBACAD2C9F03C5446C07F46418B9EA7E96B1EA933187CEDFC4837AE7D7E32D1148BAF8D7
48,525,927 UART: [art] SIG.R = EB7BE8EA155CE95B2E7F1F67E7B206C3EB9319C6523EC3769494F500053774B2779A936A21BCFEBDE02691D016E2642B
48,533,276 UART: [art] SIG.S = C8EC9518672BF4FA53BBA5E83868B449FE51A33D97E37C26346286A847021652F3AF067F53C45179E52DFF060E814D36
49,838,348 UART: mbox::rt_entry...
49,839,303 UART: ____ _ _ _ ____ _____
49,841,230 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,843,240 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,845,196 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,847,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,849,062 UART: |_|
49,849,901 UART:
50,136,447 UART: [rt] Runtime listening for mailbox commands...
50,138,614 >>> mbox cmd response data (48 bytes)
50,139,182 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,139,607 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
4,128,327 ready_for_fw is high
4,128,726 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,066,103 >>> mbox cmd response: success
23,707,063 UART:
23,707,460 UART: Running Caliptra FMC ...
23,708,611 UART:
23,708,778 UART: [state] CFI Enabled
23,716,628 UART: [fht] FMC Alias Private Key: 7
26,047,512 UART: [art] Extend RT PCRs Done
26,048,738 UART: [art] Lock RT PCRs Done
26,050,639 UART: [art] Populate DV Done
26,056,273 UART: [fht] FMC Alias Private Key: 7
26,057,813 UART: [art] Derive CDI
26,058,553 UART: [art] Store in in slot 0x4
26,101,037 UART: [art] Derive Key Pair
26,102,046 UART: [art] Store priv key in slot 0x5
29,344,078 UART: [art] Derive Key Pair - Done
29,356,760 UART: [art] Signing Cert with AUTHO
29,358,066 UART: RITY.KEYID = 7
31,637,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,801 UART: [art] PUB.X = 11C55C353B32C212DD88F2A1A6CF8AD120C51E86A2CF40A999C0D12B4A59AB10177573E89AA7448938BF1DA23F670922
31,646,040 UART: [art] PUB.Y = 870D68E0047FCF3C1A9748693DEA541B8FC7F85011084219B83F7F335150A6549C6DD904114BDF2CF4A4C03B68ABBFA3
31,653,297 UART: [art] SIG.R = B83864E7EB37FF693F900D657DC7316876ABD91EF69CFFDF1B11EA4D794BFE1C96698E7A54B1C4F8BC28E56B0070BB31
31,660,646 UART: [art] SIG.S = 161A1552EB60FB86EA99EB0CF9C6D1BF88D1F87AC3A2CC9B228C972F43A2FC07894773312DE85ADD1EEA8B16ED4777F0
32,966,095 UART: Caliptra RT
32,966,813 UART: [state] CFI Enabled
33,083,985 UART: [rt] RT listening for mailbox commands...
35,205,098 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,108,195 >>> mbox cmd response: success
43,108,753 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,142,435 UART:
43,142,721 UART: Running Caliptra FMC ...
43,143,844 UART:
43,144,004 UART: [state] CFI Enabled
43,188,097 UART: [art] Extend RT PCRs Done
43,189,293 UART: [art] Lock RT PCRs Done
43,190,805 UART: [art] Populate DV Done
43,196,587 UART: [fht] FMC Alias Private Key: 7
43,198,081 UART: [art] Derive CDI
43,198,852 UART: [art] Store in in slot 0x4
43,241,671 UART: [art] Derive Key Pair
43,242,709 UART: [art] Store priv key in slot 0x5
46,484,302 UART: [art] Derive Key Pair - Done
46,496,992 UART: [art] Signing Cert with AUTHO
46,498,323 UART: RITY.KEYID = 7
48,778,105 UART: [art] Erasing AUTHORITY.KEYID = 7
48,779,610 UART: [art] PUB.X = ED054550A7E256E398528B2C7EA698DFE843AF7C2531B27C30F86B91B56AE7E7B155FB1838EB9301895772F38F56A59B
48,786,813 UART: [art] PUB.Y = DB128EFC624F7C6AC680F7F3D3B20C882E87957CABFA98268292866FC949A07F9B4AC24FDF72AA39042F81D3F6F101EB
48,794,102 UART: [art] SIG.R = 79A8ACCACDF9AA243A17E9998262ACB58CE8C986D44DBF8F55BDB8AEE3FEA5916F27B9497820BFAA6AC6CFDB5BE0C50D
48,801,512 UART: [art] SIG.S = 96A43AE29ADBA42EA321D55DA704864CE813E983D9138EED9BC31049388CA5DC98A6C6B59795FE2B0704841C050D7DDD
50,106,387 UART: mbox::rt_entry...
50,107,365 UART: ____ _ _ _ ____ _____
50,109,354 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,111,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,113,295 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,115,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,117,293 UART: |_|
50,118,199 UART:
50,404,854 UART: [rt] Runtime listening for mailbox commands...
50,406,999 >>> mbox cmd response data (48 bytes)
50,407,591 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,408,024 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,151 UART:
192,521 UART: Running Caliptra ROM ...
193,630 UART:
193,774 UART: [state] CFI Enabled
264,128 UART: [state] LifecycleState = Unprovisioned
265,972 UART: [state] DebugLocked = No
268,569 UART: [state] WD Timer not started. Device not locked for debugging
272,746 UART: [kat] SHA2-256
451,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,420 UART: [kat] ++
463,870 UART: [kat] sha1
475,519 UART: [kat] SHA2-256
478,520 UART: [kat] SHA2-384
484,512 UART: [kat] SHA2-512-ACC
487,456 UART: [kat] ECC-384
2,946,904 UART: [kat] HMAC-384Kdf
2,973,058 UART: [kat] LMS
3,502,503 UART: [kat] --
3,505,738 UART: [cold-reset] ++
3,506,961 UART: [fht] FHT @ 0x50003400
3,517,873 UART: [idev] ++
3,518,435 UART: [idev] CDI.KEYID = 6
3,519,359 UART: [idev] SUBJECT.KEYID = 7
3,520,530 UART: [idev] UDS.KEYID = 0
3,521,473 ready_for_fw is high
3,521,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,302 UART: [idev] Erasing UDS.KEYID = 0
6,028,046 UART: [idev] Sha1 KeyId Algorithm
6,051,224 UART: [idev] --
6,053,821 UART: [ldev] ++
6,054,400 UART: [ldev] CDI.KEYID = 6
6,055,313 UART: [ldev] SUBJECT.KEYID = 5
6,056,474 UART: [ldev] AUTHORITY.KEYID = 7
6,057,711 UART: [ldev] FE.KEYID = 1
6,100,940 UART: [ldev] Erasing FE.KEYID = 1
8,602,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,853 UART: [ldev] --
10,413,394 UART: [fwproc] Wait for Commands...
10,415,166 UART: [fwproc] Recv command 0x46574c44
10,417,258 UART: [fwproc] Recv'd Img size: 114168 bytes
13,809,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,752 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,271,755 >>> mbox cmd response: success
14,276,012 UART: [afmc] ++
14,276,612 UART: [afmc] CDI.KEYID = 6
14,277,526 UART: [afmc] SUBJECT.KEYID = 7
14,278,690 UART: [afmc] AUTHORITY.KEYID = 5
16,807,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,117 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,876 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,911 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,803 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,666 UART: [afmc] --
18,609,213 UART: [cold-reset] --
18,612,802 UART: [state] Locking Datavault
18,615,781 UART: [state] Locking PCR0, PCR1 and PCR31
18,617,432 UART: [state] Locking ICCM
18,618,827 UART: [exit] Launching FMC @ 0x40000130
18,627,230 UART:
18,627,471 UART: Running Caliptra FMC ...
18,628,574 UART:
18,628,732 UART: [state] CFI Enabled
18,690,933 UART: [fht] FMC Alias Private Key: 7
20,455,175 UART: [art] Extend RT PCRs Done
20,456,391 UART: [art] Lock RT PCRs Done
20,457,744 UART: [art] Populate DV Done
20,463,346 UART: [fht] FMC Alias Private Key: 7
20,464,883 UART: [art] Derive CDI
20,465,700 UART: [art] Store in in slot 0x4
20,523,833 UART: [art] Derive Key Pair
20,524,867 UART: [art] Store priv key in slot 0x5
22,987,935 UART: [art] Derive Key Pair - Done
23,000,927 UART: [art] Signing Cert with AUTHO
23,002,232 UART: RITY.KEYID = 7
24,712,605 UART: [art] Erasing AUTHORITY.KEYID = 7
24,714,105 UART: [art] PUB.X = 35CC74AA4DC992E4345685880C577E2B29C28001E33DB8865DF556ACCEA971FBD0A64216DABE68BAFCABFDB5B19982D1
24,721,358 UART: [art] PUB.Y = E9D522867FC9BFB86C21C2BE65327A544DEFE28E0FE55CEB7D3FAFDF7632764AD226921E6E6C15263C032A692B6F1579
24,728,666 UART: [art] SIG.R = C32F0BCA1E0DAAFC46FE28E9C09E10DDB93C1649A888E287995911918084D34699397465733ADD6E572DE518A3B750C6
24,736,046 UART: [art] SIG.S = 0CED6AF9149B7D8D22C025837D2D5F9FAF811136CC9222B2007070BF791493161495AB896F624E2B13A009504A7B8DBA
25,714,744 UART: Caliptra RT
25,715,441 UART: [state] CFI Enabled
25,881,102 UART: [rt] RT listening for mailbox commands...
27,932,490 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,033,746 UART:
28,034,124 UART: Running Caliptra ROM ...
28,035,268 UART:
28,035,445 UART: [state] CFI Enabled
28,101,852 UART: [state] LifecycleState = Unprovisioned
28,103,732 UART: [state] DebugLocked = No
28,104,962 UART: [state] WD Timer not started. Device not locked for debugging
28,108,760 UART: [kat] SHA2-256
28,287,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,299,436 UART: [kat] ++
28,299,979 UART: [kat] sha1
28,310,793 UART: [kat] SHA2-256
28,313,801 UART: [kat] SHA2-384
28,320,972 UART: [kat] SHA2-512-ACC
28,323,910 UART: [kat] ECC-384
30,788,882 UART: [kat] HMAC-384Kdf
30,812,792 UART: [kat] LMS
31,342,261 UART: [kat] --
31,345,711 UART: [update-reset] ++
34,334,860 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,338,356 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,595,963 >>> mbox cmd response: success
34,596,378 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,597,270 UART: [update-reset] Copying MAN_2 To MAN_1
34,619,558 UART: [update-reset Success] --
34,624,821 UART: [state] Locking Datavault
34,628,944 UART: [state] Locking PCR0, PCR1 and PCR31
34,630,667 UART: [state] Locking ICCM
34,632,996 UART: [exit] Launching FMC @ 0x40000130
34,641,392 UART:
34,641,627 UART: Running Caliptra FMC ...
34,642,731 UART:
34,642,888 UART: [state] CFI Enabled
34,747,689 UART: [art] Extend RT PCRs Done
34,748,894 UART: [art] Lock RT PCRs Done
34,750,198 UART: [art] Populate DV Done
34,755,607 UART: [fht] FMC Alias Private Key: 7
34,757,250 UART: [art] Derive CDI
34,758,062 UART: [art] Store in in slot 0x4
34,817,025 UART: [art] Derive Key Pair
34,818,028 UART: [art] Store priv key in slot 0x5
37,280,727 UART: [art] Derive Key Pair - Done
37,293,711 UART: [art] Signing Cert with AUTHO
37,295,045 UART: RITY.KEYID = 7
39,006,385 UART: [art] Erasing AUTHORITY.KEYID = 7
39,007,897 UART: [art] PUB.X = 98085FEF93EDB40D43B637253EEDD4F9EC7D0EBDAFE0E9EDF186BFA72B28A718B43D0D02222DCAED7F22C0645C4527AB
39,015,226 UART: [art] PUB.Y = C3F78E1022333ADABBF884FE52701683BFB2E94CB56672E91B89F8051A064DAF1958B79904191C15D7FFB3A882CC10D9
39,022,482 UART: [art] SIG.R = 83166CFC0A90A043D85314CF3BAB0B6F0E6DE3A8668079E6C8A4B56E8C4AFA05694D61148B67FB6C7E17D8AE1AFB61EF
39,029,898 UART: [art] SIG.S = E0CEDBFA48591C1C533C5CF850E5E0978D74E9EA08D003614633A49BF76661AC882D72A8A32F310CFF7D66D8E0779338
40,007,716 UART: mbox::rt_entry...
40,008,679 UART: ____ _ _ _ ____ _____
40,010,669 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,012,677 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,014,615 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,016,550 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,018,477 UART: |_|
40,019,289 UART:
40,305,307 UART: [rt] Runtime listening for mailbox commands...
40,307,480 >>> mbox cmd response data (48 bytes)
40,308,092 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,308,610 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,360,805 ready_for_fw is high
3,361,227 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,061,484 >>> mbox cmd response: success
18,344,205 UART:
18,344,617 UART: Running Caliptra FMC ...
18,345,751 UART:
18,345,918 UART: [state] CFI Enabled
18,410,385 UART: [fht] FMC Alias Private Key: 7
20,174,647 UART: [art] Extend RT PCRs Done
20,175,877 UART: [art] Lock RT PCRs Done
20,177,320 UART: [art] Populate DV Done
20,182,679 UART: [fht] FMC Alias Private Key: 7
20,184,330 UART: [art] Derive CDI
20,185,150 UART: [art] Store in in slot 0x4
20,243,330 UART: [art] Derive Key Pair
20,244,371 UART: [art] Store priv key in slot 0x5
22,707,880 UART: [art] Derive Key Pair - Done
22,720,398 UART: [art] Signing Cert with AUTHO
22,721,713 UART: RITY.KEYID = 7
24,432,853 UART: [art] Erasing AUTHORITY.KEYID = 7
24,434,367 UART: [art] PUB.X = 6BE51CC160BF55001B0BEAF0B9864F95EF0C8C561062F5A78FB4ED6BC094E94214E09C9942716D1C863C9435DB02114F
24,441,604 UART: [art] PUB.Y = 2A9EBCE14A465D6EBA8E2937423C088990E898E54A229CEDE78AF9DD5D1E521D10F86F1A644465821EC165FFCE3D62B2
24,448,844 UART: [art] SIG.R = 70E8845120F3B9060D355250579F46343CAA334CB31D4A8B3C064734CC9231F96ED42677BF0C115FF3C2AB4694D11363
24,456,235 UART: [art] SIG.S = 2D3789B6E863ECC3B55A7DDD13F9971CB52297ECE109311CAD055D0F04E78128483877D16A7B024C0489019204424909
25,435,381 UART: Caliptra RT
25,436,100 UART: [state] CFI Enabled
25,599,710 UART: [rt] RT listening for mailbox commands...
27,652,616 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,181,373 >>> mbox cmd response: success
34,181,820 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,213,664 UART:
34,214,016 UART: Running Caliptra FMC ...
34,215,155 UART:
34,215,322 UART: [state] CFI Enabled
34,314,005 UART: [art] Extend RT PCRs Done
34,315,194 UART: [art] Lock RT PCRs Done
34,316,383 UART: [art] Populate DV Done
34,321,897 UART: [fht] FMC Alias Private Key: 7
34,323,492 UART: [art] Derive CDI
34,324,306 UART: [art] Store in in slot 0x4
34,383,072 UART: [art] Derive Key Pair
34,384,108 UART: [art] Store priv key in slot 0x5
36,847,187 UART: [art] Derive Key Pair - Done
36,860,197 UART: [art] Signing Cert with AUTHO
36,861,504 UART: RITY.KEYID = 7
38,573,578 UART: [art] Erasing AUTHORITY.KEYID = 7
38,575,089 UART: [art] PUB.X = 540A84CF780277CDCA8A5C4C66DA154CD0F71B6527FEFAB3A53C0C4A016ADE28B95DE12F840C8AD1A778E0E6AB292DD7
38,582,408 UART: [art] PUB.Y = 40804E5F10A2593DA1BBBF792CAF5AD91BE6AC0EDB590E1942914E37A4DD06CF4B08FBEEE5E598A11C7C555CA904C4EC
38,589,686 UART: [art] SIG.R = D604734E12421E96F6445113795336C178D5EFCDD10528E477300BAF164F484E1C4D0FB7F7FF09B844D94A2420D521B2
38,597,076 UART: [art] SIG.S = B60E27F2CE35A35783D265F002084F4DF68DF82137987A7730254FB1A1A4F2F9D8A25C08B26933774DF8EF4B36438D38
39,575,579 UART: mbox::rt_entry...
39,576,521 UART: ____ _ _ _ ____ _____
39,578,449 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,580,453 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,582,312 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,584,235 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,586,161 UART: |_|
39,586,969 UART:
39,871,793 UART: [rt] Runtime listening for mailbox commands...
39,873,963 >>> mbox cmd response data (48 bytes)
39,874,529 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,874,998 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,692 writing to cptra_bootfsm_go
194,850 UART:
195,236 UART: Running Caliptra ROM ...
196,333 UART:
605,904 UART: [state] CFI Enabled
620,778 UART: [state] LifecycleState = Unprovisioned
622,573 UART: [state] DebugLocked = No
625,116 UART: [state] WD Timer not started. Device not locked for debugging
629,725 UART: [kat] SHA2-256
808,826 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,409 UART: [kat] ++
820,946 UART: [kat] sha1
832,393 UART: [kat] SHA2-256
835,403 UART: [kat] SHA2-384
842,250 UART: [kat] SHA2-512-ACC
845,184 UART: [kat] ECC-384
3,285,354 UART: [kat] HMAC-384Kdf
3,297,749 UART: [kat] LMS
3,827,196 UART: [kat] --
3,832,351 UART: [cold-reset] ++
3,833,720 UART: [fht] FHT @ 0x50003400
3,845,003 UART: [idev] ++
3,845,613 UART: [idev] CDI.KEYID = 6
3,846,523 UART: [idev] SUBJECT.KEYID = 7
3,847,573 UART: [idev] UDS.KEYID = 0
3,848,563 ready_for_fw is high
3,848,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,011 UART: [idev] Erasing UDS.KEYID = 0
6,322,263 UART: [idev] Sha1 KeyId Algorithm
6,344,165 UART: [idev] --
6,347,128 UART: [ldev] ++
6,347,699 UART: [ldev] CDI.KEYID = 6
6,348,608 UART: [ldev] SUBJECT.KEYID = 5
6,349,766 UART: [ldev] AUTHORITY.KEYID = 7
6,350,996 UART: [ldev] FE.KEYID = 1
6,363,371 UART: [ldev] Erasing FE.KEYID = 1
8,832,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,519 UART: [ldev] --
10,623,512 UART: [fwproc] Wait for Commands...
10,626,142 UART: [fwproc] Recv command 0x46574c44
10,628,243 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,299 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,085 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,488,357 >>> mbox cmd response: success
14,492,573 UART: [afmc] ++
14,493,163 UART: [afmc] CDI.KEYID = 6
14,494,079 UART: [afmc] SUBJECT.KEYID = 7
14,495,241 UART: [afmc] AUTHORITY.KEYID = 5
16,995,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,717,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,719,267 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,087 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,766,933 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,914 UART: [afmc] --
18,794,217 UART: [cold-reset] --
18,798,180 UART: [state] Locking Datavault
18,804,454 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,187 UART: [state] Locking ICCM
18,807,209 UART: [exit] Launching FMC @ 0x40000130
18,815,606 UART:
18,815,843 UART: Running Caliptra FMC ...
18,816,946 UART:
18,817,103 UART: [state] CFI Enabled
18,825,150 UART: [fht] FMC Alias Private Key: 7
20,581,863 UART: [art] Extend RT PCRs Done
20,583,104 UART: [art] Lock RT PCRs Done
20,584,809 UART: [art] Populate DV Done
20,590,382 UART: [fht] FMC Alias Private Key: 7
20,592,086 UART: [art] Derive CDI
20,592,906 UART: [art] Store in in slot 0x4
20,635,767 UART: [art] Derive Key Pair
20,636,769 UART: [art] Store priv key in slot 0x5
23,063,295 UART: [art] Derive Key Pair - Done
23,076,560 UART: [art] Signing Cert with AUTHO
23,077,863 UART: RITY.KEYID = 7
24,783,476 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,981 UART: [art] PUB.X = 97CF56C8D192E06F67BE748D2E790AB646F815D9565319604626184D46BBA3FE4C6EC3B0E0A98AFE30DFF21F327337A3
24,792,236 UART: [art] PUB.Y = 6279E14B7D95C5F7E7B6275B9A06217DC1D4E76564C3981561ACD776D800914D51B092C944CD8F078EA5E747130D9129
24,799,471 UART: [art] SIG.R = 321C1C8B4376829426BE660CF58DA204C42F0B79903F0DE12A102C83247F12BEED4E5F53233CFCCD0790251420E8303D
24,806,920 UART: [art] SIG.S = A63B40A4549633D7B3730FC1A14FEC80EE80A8CA59530EC54FB1D21D07C737594A2064A9C0D42475638AA95C3B679D21
25,786,050 UART: Caliptra RT
25,786,767 UART: [state] CFI Enabled
25,903,344 UART: [rt] RT listening for mailbox commands...
27,955,864 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,056,891 UART:
28,057,254 UART: Running Caliptra ROM ...
28,058,386 UART:
28,058,556 UART: [state] CFI Enabled
28,071,852 UART: [state] LifecycleState = Unprovisioned
28,073,685 UART: [state] DebugLocked = No
28,075,605 UART: [state] WD Timer not started. Device not locked for debugging
28,079,574 UART: [kat] SHA2-256
28,258,726 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,270,276 UART: [kat] ++
28,270,822 UART: [kat] sha1
28,281,987 UART: [kat] SHA2-256
28,284,996 UART: [kat] SHA2-384
28,292,648 UART: [kat] SHA2-512-ACC
28,295,586 UART: [kat] ECC-384
30,739,263 UART: [kat] HMAC-384Kdf
30,751,674 UART: [kat] LMS
31,281,163 UART: [kat] --
31,285,506 UART: [update-reset] ++
34,277,177 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,280,278 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,537,912 >>> mbox cmd response: success
34,538,289 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,539,273 UART: [update-reset] Copying MAN_2 To MAN_1
34,561,600 UART: [update-reset Success] --
34,565,154 UART: [state] Locking Datavault
34,569,039 UART: [state] Locking PCR0, PCR1 and PCR31
34,570,745 UART: [state] Locking ICCM
34,572,681 UART: [exit] Launching FMC @ 0x40000130
34,581,128 UART:
34,581,373 UART: Running Caliptra FMC ...
34,582,477 UART:
34,582,635 UART: [state] CFI Enabled
34,626,701 UART: [art] Extend RT PCRs Done
34,627,845 UART: [art] Lock RT PCRs Done
34,629,345 UART: [art] Populate DV Done
34,634,642 UART: [fht] FMC Alias Private Key: 7
34,636,337 UART: [art] Derive CDI
34,637,149 UART: [art] Store in in slot 0x4
34,679,686 UART: [art] Derive Key Pair
34,680,725 UART: [art] Store priv key in slot 0x5
37,107,474 UART: [art] Derive Key Pair - Done
37,120,301 UART: [art] Signing Cert with AUTHO
37,121,609 UART: RITY.KEYID = 7
38,827,538 UART: [art] Erasing AUTHORITY.KEYID = 7
38,829,064 UART: [art] PUB.X = DF67AF4948D40A90C76F462ABD3DC947A265DD547485247E0CF994820894F0375D9B0F8C00302A11C2897E8C851BF3FC
38,836,279 UART: [art] PUB.Y = 2C9FC92D885C00ECEB421D0930DD5FCDB43C13F249E13C4A47DB19EAACD960A4E2DF283F093B8500D158D7D36B4E67BD
38,843,521 UART: [art] SIG.R = 9E8BBBE19FFDBAF0DF9F3C0D56CBC8AA4A230505210B6AF141B73626E8DCC3D976365B391EB7015C97ADB58777C8BF37
38,850,914 UART: [art] SIG.S = B02EF19793AE17D1C63CAD17C1C1BF6012AA5CA8F591A5A2A5C8D64FD8F44EDBE5192AD52A9A1F3A9EC051A962318DA6
39,829,135 UART: mbox::rt_entry...
39,830,105 UART: ____ _ _ _ ____ _____
39,832,031 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,834,043 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,835,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,837,907 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,839,836 UART: |_|
39,840,667 UART:
40,129,696 UART: [rt] Runtime listening for mailbox commands...
40,131,874 >>> mbox cmd response data (48 bytes)
40,132,491 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,132,944 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,832 writing to cptra_bootfsm_go
3,694,332 ready_for_fw is high
3,694,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,257,925 >>> mbox cmd response: success
18,504,160 UART:
18,504,570 UART: Running Caliptra FMC ...
18,505,685 UART:
18,505,844 UART: [state] CFI Enabled
18,514,129 UART: [fht] FMC Alias Private Key: 7
20,271,282 UART: [art] Extend RT PCRs Done
20,272,508 UART: [art] Lock RT PCRs Done
20,274,158 UART: [art] Populate DV Done
20,279,844 UART: [fht] FMC Alias Private Key: 7
20,281,329 UART: [art] Derive CDI
20,282,069 UART: [art] Store in in slot 0x4
20,324,501 UART: [art] Derive Key Pair
20,325,502 UART: [art] Store priv key in slot 0x5
22,752,420 UART: [art] Derive Key Pair - Done
22,765,419 UART: [art] Signing Cert with AUTHO
22,766,722 UART: RITY.KEYID = 7
24,472,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,473,786 UART: [art] PUB.X = 68900F59E55435941DD864B84B5B333D915F988B3F0821583AFDBA68B55751ED4CCB10F2843FA32C5625B66253C87F87
24,481,037 UART: [art] PUB.Y = 579FC6A6FA1EBFFE739451A015296D64CED96C944BC3E7B7BDC398B5DF0F39D80091164DFB4B4C2393677FC9E7C511EF
24,488,257 UART: [art] SIG.R = 8C2ED1104C00D8564E6C6E74B4535E81A3A7BC1E1D5EA756CB2D92052F89F630C77DD12113AA50FEBA0F9AD7070F07CE
24,495,659 UART: [art] SIG.S = AB182262AA249037936FBB7A2179F7CB4C35BE915B2FA7D262C04FD44701DBEC3EF83C9EA85EB4C2E40FD3B2D631C2CA
25,474,704 UART: Caliptra RT
25,475,409 UART: [state] CFI Enabled
25,592,798 UART: [rt] RT listening for mailbox commands...
27,643,276 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,069,618 >>> mbox cmd response: success
34,070,110 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,105,950 UART:
34,106,258 UART: Running Caliptra FMC ...
34,107,295 UART:
34,107,450 UART: [state] CFI Enabled
34,151,433 UART: [art] Extend RT PCRs Done
34,152,596 UART: [art] Lock RT PCRs Done
34,154,077 UART: [art] Populate DV Done
34,159,485 UART: [fht] FMC Alias Private Key: 7
34,160,970 UART: [art] Derive CDI
34,161,710 UART: [art] Store in in slot 0x4
34,204,428 UART: [art] Derive Key Pair
34,205,493 UART: [art] Store priv key in slot 0x5
36,632,278 UART: [art] Derive Key Pair - Done
36,645,766 UART: [art] Signing Cert with AUTHO
36,647,067 UART: RITY.KEYID = 7
38,352,514 UART: [art] Erasing AUTHORITY.KEYID = 7
38,354,019 UART: [art] PUB.X = 440B9DFE3F2C43884F04A164F4B6EF39F0D9192AF7444B1A6B66AD70510A33FD4C20AEC899EEA5CB1B2B7DAFDBC7F323
38,361,285 UART: [art] PUB.Y = A0910B6A1D7C4E6D4B8C9C528496813B27689734B18BE9B659B97F5E8BF15A889BB83581ADE0465377BBF660BB5A0702
38,368,520 UART: [art] SIG.R = 49E038B5635A4E9B9126A4D99B433018EB1877EF28D83D3408CC4E3511A72F85BCB16F106C277B06FD644F99A814114A
38,375,909 UART: [art] SIG.S = 4873AC0FC3EB0A302075934CC4D8FCDDD87D55BCC46FB2F069651B1E34397E9574271883E89F03BAD32C58E1A9917C05
39,354,905 UART: mbox::rt_entry...
39,355,851 UART: ____ _ _ _ ____ _____
39,357,779 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,359,786 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,361,643 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,363,570 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,365,424 UART: |_|
39,366,303 UART:
39,651,335 UART: [rt] Runtime listening for mailbox commands...
39,653,480 >>> mbox cmd response data (48 bytes)
39,654,050 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
39,654,482 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,103 UART:
192,475 UART: Running Caliptra ROM ...
193,578 UART:
193,721 UART: [state] CFI Enabled
259,602 UART: [state] LifecycleState = Unprovisioned
261,963 UART: [state] DebugLocked = No
264,770 UART: [state] WD Timer not started. Device not locked for debugging
269,037 UART: [kat] SHA2-256
458,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,672 UART: [kat] ++
470,119 UART: [kat] sha1
480,993 UART: [kat] SHA2-256
484,010 UART: [kat] SHA2-384
489,723 UART: [kat] SHA2-512-ACC
492,306 UART: [kat] ECC-384
2,960,248 UART: [kat] HMAC-384Kdf
2,984,267 UART: [kat] LMS
3,516,015 UART: [kat] --
3,520,439 UART: [cold-reset] ++
3,522,580 UART: [fht] FHT @ 0x50003400
3,533,982 UART: [idev] ++
3,534,688 UART: [idev] CDI.KEYID = 6
3,535,642 UART: [idev] SUBJECT.KEYID = 7
3,536,885 UART: [idev] UDS.KEYID = 0
3,537,806 ready_for_fw is high
3,538,000 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,681,575 UART: [idev] Erasing UDS.KEYID = 0
6,038,134 UART: [idev] Sha1 KeyId Algorithm
6,062,214 UART: [idev] --
6,068,402 UART: [ldev] ++
6,069,094 UART: [ldev] CDI.KEYID = 6
6,070,014 UART: [ldev] SUBJECT.KEYID = 5
6,071,180 UART: [ldev] AUTHORITY.KEYID = 7
6,072,368 UART: [ldev] FE.KEYID = 1
6,113,281 UART: [ldev] Erasing FE.KEYID = 1
8,618,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,479 UART: [ldev] --
10,427,640 UART: [fwproc] Wait for Commands...
10,429,679 UART: [fwproc] Recv command 0x46574c44
10,431,988 UART: [fwproc] Recv'd Img size: 114168 bytes
13,877,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,841 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,006 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,609,168 >>> mbox cmd response: success
14,612,615 UART: [afmc] ++
14,613,334 UART: [afmc] CDI.KEYID = 6
14,614,536 UART: [afmc] SUBJECT.KEYID = 7
14,615,962 UART: [afmc] AUTHORITY.KEYID = 5
17,164,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,908,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,910,897 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,926,058 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,941,220 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,956,242 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,979,039 UART: [afmc] --
18,982,966 UART: [cold-reset] --
18,987,436 UART: [state] Locking Datavault
18,991,618 UART: [state] Locking PCR0, PCR1 and PCR31
18,993,786 UART: [state] Locking ICCM
18,996,167 UART: [exit] Launching FMC @ 0x40000130
19,004,809 UART:
19,005,051 UART: Running Caliptra FMC ...
19,006,161 UART:
19,006,330 UART: [state] CFI Enabled
19,064,548 UART: [fht] FMC Alias Private Key: 7
20,828,663 UART: [art] Extend RT PCRs Done
20,829,870 UART: [art] Lock RT PCRs Done
20,831,521 UART: [art] Populate DV Done
20,836,522 UART: [fht] FMC Alias Private Key: 7
20,838,232 UART: [art] Derive CDI
20,839,055 UART: [art] Store in in slot 0x4
20,896,965 UART: [art] Derive Key Pair
20,898,009 UART: [art] Store priv key in slot 0x5
23,361,284 UART: [art] Derive Key Pair - Done
23,374,063 UART: [art] Signing Cert with AUTHO
23,375,373 UART: RITY.KEYID = 7
25,086,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,087,975 UART: [art] PUB.X = 07832C8AE10269D67333BB905A30645CD428BCCC1CF394A807C6619729D380A8211E4CD9480B5DDE2297762404FD4939
25,095,330 UART: [art] PUB.Y = FBCEDD64E10C722AAB3E846AAAE8DCADD0DE87DE447E02FEDCBB303D55ACE28D9C2483CE2E05D30EEAD33484DF9F71BC
25,102,506 UART: [art] SIG.R = 14560851DD7C5312AF23F859B4CAB6E9A2D5255CB47CF5CD9406D0EDE72C9A083CD4C438A39FABBDA59713EB454AA188
25,109,932 UART: [art] SIG.S = C8C81A49EB7BEA5EE1C8372AF7AEA6CA696FAD00580C3E31229FF010188404A741C04E6B36A8534500606CA4EEF0C220
26,088,577 UART: Caliptra RT
26,089,292 UART: [state] CFI Enabled
26,253,019 UART: [rt] RT listening for mailbox commands...
28,307,122 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,408,177 UART:
28,408,534 UART: Running Caliptra ROM ...
28,409,616 UART:
28,409,779 UART: [state] CFI Enabled
28,470,689 UART: [state] LifecycleState = Unprovisioned
28,472,740 UART: [state] DebugLocked = No
28,474,292 UART: [state] WD Timer not started. Device not locked for debugging
28,478,872 UART: [kat] SHA2-256
28,668,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,679,466 UART: [kat] ++
28,679,949 UART: [kat] sha1
28,692,482 UART: [kat] SHA2-256
28,695,455 UART: [kat] SHA2-384
28,701,809 UART: [kat] SHA2-512-ACC
28,704,396 UART: [kat] ECC-384
31,159,491 UART: [kat] HMAC-384Kdf
31,182,084 UART: [kat] LMS
31,713,662 UART: [kat] --
31,718,377 UART: [update-reset] ++
34,741,735 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,744,731 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,137,449 >>> mbox cmd response: success
35,137,868 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,138,492 UART: [update-reset] Copying MAN_2 To MAN_1
35,176,077 UART: [update-reset Success] --
35,178,624 UART: [state] Locking Datavault
35,182,006 UART: [state] Locking PCR0, PCR1 and PCR31
35,184,238 UART: [state] Locking ICCM
35,185,946 UART: [exit] Launching FMC @ 0x40000130
35,194,625 UART:
35,194,858 UART: Running Caliptra FMC ...
35,195,962 UART:
35,196,120 UART: [state] CFI Enabled
35,287,553 UART: [art] Extend RT PCRs Done
35,288,739 UART: [art] Lock RT PCRs Done
35,290,086 UART: [art] Populate DV Done
35,295,229 UART: [fht] FMC Alias Private Key: 7
35,296,874 UART: [art] Derive CDI
35,297,689 UART: [art] Store in in slot 0x4
35,356,645 UART: [art] Derive Key Pair
35,357,686 UART: [art] Store priv key in slot 0x5
37,820,656 UART: [art] Derive Key Pair - Done
37,833,406 UART: [art] Signing Cert with AUTHO
37,834,734 UART: RITY.KEYID = 7
39,545,699 UART: [art] Erasing AUTHORITY.KEYID = 7
39,547,190 UART: [art] PUB.X = 038835B3764D248CEACA5A64617850258710F1E7A14E73205659AE168CAE9D2BA580B02285659A0530DBB479AC89D648
39,554,402 UART: [art] PUB.Y = 2E6F1013905E9EC38CC3F2414E6A4D7E94AA5B88FBD6134726A58A0124237A7A896413D3D2CD2D123B34B1CDB8A56F06
39,561,703 UART: [art] SIG.R = 53C34363257E880DDC9FCD9F56980C171927EC578F30945777693ED4D59D3A4F5988EBDA6CAB454EA7DA621F29EFD88D
39,569,071 UART: [art] SIG.S = BE40EE84702EFE1186E3E6673D081EF60E86D514A06581AC7953B8EEF2F63D4723EBFAE1F2595B4E790E57ABF9648018
40,547,596 UART: mbox::rt_entry...
40,548,563 UART: ____ _ _ _ ____ _____
40,550,498 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,552,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,554,368 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,556,297 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,558,186 UART: |_|
40,559,070 UART:
40,844,986 UART: [rt] Runtime listening for mailbox commands...
40,847,107 >>> mbox cmd response data (48 bytes)
40,847,713 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,848,138 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,438,913 ready_for_fw is high
3,439,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,734,542 >>> mbox cmd response: success
19,023,741 UART:
19,024,159 UART: Running Caliptra FMC ...
19,025,302 UART:
19,025,471 UART: [state] CFI Enabled
19,092,726 UART: [fht] FMC Alias Private Key: 7
20,856,894 UART: [art] Extend RT PCRs Done
20,858,122 UART: [art] Lock RT PCRs Done
20,859,600 UART: [art] Populate DV Done
20,864,907 UART: [fht] FMC Alias Private Key: 7
20,866,500 UART: [art] Derive CDI
20,867,314 UART: [art] Store in in slot 0x4
20,925,930 UART: [art] Derive Key Pair
20,926,972 UART: [art] Store priv key in slot 0x5
23,389,421 UART: [art] Derive Key Pair - Done
23,402,087 UART: [art] Signing Cert with AUTHO
23,403,401 UART: RITY.KEYID = 7
25,116,144 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,680 UART: [art] PUB.X = 8669038CD428065084F34BB3CA503E7F7DC4CFD73BCDC497EFB9FAAD21E2DC280A863287059D639A85B863D5AF2C8816
25,124,921 UART: [art] PUB.Y = EB18C16E12FA5569BEF8F303225320FE333AE4A4F71998F4B037E396E49C8D5A4689A3AD1CE10895FEA1732283072361
25,132,178 UART: [art] SIG.R = 01DD11326A962F7C6AA136338AC36E186A2FABF4CB1145CFFDF8DDD8DCA3483BCC2512FA1473946BEB47B0D00BB2DA0F
25,139,571 UART: [art] SIG.S = C1BAC3429C517E261152B4077695A3084165FCC0E8AA93D8D4D0D4D5967D39F51AB4D51DF78BBD074C71B890BBABD04E
26,118,565 UART: Caliptra RT
26,119,257 UART: [state] CFI Enabled
26,285,399 UART: [rt] RT listening for mailbox commands...
28,337,430 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,347,302 >>> mbox cmd response: success
35,347,878 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,381,028 UART:
35,381,363 UART: Running Caliptra FMC ...
35,382,514 UART:
35,382,680 UART: [state] CFI Enabled
35,468,287 UART: [art] Extend RT PCRs Done
35,469,476 UART: [art] Lock RT PCRs Done
35,470,929 UART: [art] Populate DV Done
35,476,231 UART: [fht] FMC Alias Private Key: 7
35,477,717 UART: [art] Derive CDI
35,478,485 UART: [art] Store in in slot 0x4
35,537,878 UART: [art] Derive Key Pair
35,538,920 UART: [art] Store priv key in slot 0x5
38,001,542 UART: [art] Derive Key Pair - Done
38,014,714 UART: [art] Signing Cert with AUTHO
38,016,029 UART: RITY.KEYID = 7
39,726,809 UART: [art] Erasing AUTHORITY.KEYID = 7
39,728,322 UART: [art] PUB.X = 930E70E1363D15A1AAC393F200D64EA8149FBA117CA7E2650F737A5B42CFDF960C97E376D7A98D9634A84D534539C407
39,735,573 UART: [art] PUB.Y = 49ACFF2204DFF68ADF768933C241C0E9E84470EEE385A2A006C973CE586181C2DFEC5278A270280213521BB7A58547E9
39,742,815 UART: [art] SIG.R = 32BC955EE6780884ED9C9AC7A7975205FAEDEDCA3B4B02FC34ACDAE8B9AEB80C72CE21F4BEC332C1FA1C8AA1DBCEB73E
39,750,258 UART: [art] SIG.S = 831EA662F2DAA059D30A8316D2B1882EAAF2FD0984271E0431C9A0F2845AE3B403A4806A3E0F41710A050167F0DA8B05
40,728,962 UART: mbox::rt_entry...
40,729,929 UART: ____ _ _ _ ____ _____
40,731,859 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,733,864 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,735,724 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,737,643 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,739,523 UART: |_|
40,740,406 UART:
41,022,911 UART: [rt] Runtime listening for mailbox commands...
41,025,086 >>> mbox cmd response data (48 bytes)
41,025,676 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,026,105 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,800 writing to cptra_bootfsm_go
192,921 UART:
193,288 UART: Running Caliptra ROM ...
194,384 UART:
604,039 UART: [state] CFI Enabled
618,552 UART: [state] LifecycleState = Unprovisioned
620,943 UART: [state] DebugLocked = No
622,760 UART: [state] WD Timer not started. Device not locked for debugging
627,859 UART: [kat] SHA2-256
817,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,517 UART: [kat] ++
829,122 UART: [kat] sha1
841,214 UART: [kat] SHA2-256
844,227 UART: [kat] SHA2-384
849,798 UART: [kat] SHA2-512-ACC
852,377 UART: [kat] ECC-384
3,295,472 UART: [kat] HMAC-384Kdf
3,307,984 UART: [kat] LMS
3,839,787 UART: [kat] --
3,842,647 UART: [cold-reset] ++
3,845,068 UART: [fht] FHT @ 0x50003400
3,855,831 UART: [idev] ++
3,856,557 UART: [idev] CDI.KEYID = 6
3,857,594 UART: [idev] SUBJECT.KEYID = 7
3,858,699 UART: [idev] UDS.KEYID = 0
3,859,626 ready_for_fw is high
3,859,814 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,626 UART: [idev] Erasing UDS.KEYID = 0
6,338,238 UART: [idev] Sha1 KeyId Algorithm
6,360,170 UART: [idev] --
6,364,166 UART: [ldev] ++
6,364,846 UART: [ldev] CDI.KEYID = 6
6,365,758 UART: [ldev] SUBJECT.KEYID = 5
6,366,973 UART: [ldev] AUTHORITY.KEYID = 7
6,368,152 UART: [ldev] FE.KEYID = 1
6,379,233 UART: [ldev] Erasing FE.KEYID = 1
8,859,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,828 UART: [ldev] --
10,650,560 UART: [fwproc] Wait for Commands...
10,653,195 UART: [fwproc] Recv command 0x46574c44
10,655,507 UART: [fwproc] Recv'd Img size: 114168 bytes
14,093,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,289,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,830,524 >>> mbox cmd response: success
14,835,403 UART: [afmc] ++
14,836,113 UART: [afmc] CDI.KEYID = 6
14,837,358 UART: [afmc] SUBJECT.KEYID = 7
14,838,793 UART: [afmc] AUTHORITY.KEYID = 5
17,342,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,121 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,261 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,409 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,453 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,137,393 UART: [afmc] --
19,141,095 UART: [cold-reset] --
19,144,906 UART: [state] Locking Datavault
19,147,402 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,601 UART: [state] Locking ICCM
19,151,972 UART: [exit] Launching FMC @ 0x40000130
19,160,646 UART:
19,160,881 UART: Running Caliptra FMC ...
19,161,983 UART:
19,162,145 UART: [state] CFI Enabled
19,169,975 UART: [fht] FMC Alias Private Key: 7
20,926,710 UART: [art] Extend RT PCRs Done
20,927,931 UART: [art] Lock RT PCRs Done
20,929,472 UART: [art] Populate DV Done
20,934,943 UART: [fht] FMC Alias Private Key: 7
20,936,693 UART: [art] Derive CDI
20,937,435 UART: [art] Store in in slot 0x4
20,979,920 UART: [art] Derive Key Pair
20,980,955 UART: [art] Store priv key in slot 0x5
23,407,089 UART: [art] Derive Key Pair - Done
23,420,083 UART: [art] Signing Cert with AUTHO
23,421,383 UART: RITY.KEYID = 7
25,126,761 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,269 UART: [art] PUB.X = D99B9C7FC6637DB8325B9349C803038C8FEE86343BD5FC9D8680559F75D0BC02E67F5172AE1B8FCB3F5C98FD7B43E383
25,135,573 UART: [art] PUB.Y = 47E679197C27A442D36E8C32B9A974D1F21958C16823F8EBA41AB88B8A681EA92C1C84B0485346D85493F7F7A0BFFEEF
25,142,795 UART: [art] SIG.R = AFC7E884EBCDB067D24EA4C99D6AF61ACE15891ED952E5683598051E33B8126B28B1D8AABFDB12B1B732C55C07188822
25,150,244 UART: [art] SIG.S = A3C7429F72ED9D370FF55D60024D06C431314B408F02059D5541B4B37938B7FB30BFD29309E8CCC591EBEA2EE66F056A
26,129,112 UART: Caliptra RT
26,129,803 UART: [state] CFI Enabled
26,246,542 UART: [rt] RT listening for mailbox commands...
28,296,729 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,397,626 UART:
28,398,007 UART: Running Caliptra ROM ...
28,399,062 UART:
28,399,277 UART: [state] CFI Enabled
28,413,072 UART: [state] LifecycleState = Unprovisioned
28,414,914 UART: [state] DebugLocked = No
28,417,494 UART: [state] WD Timer not started. Device not locked for debugging
28,422,661 UART: [kat] SHA2-256
28,612,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,623,330 UART: [kat] ++
28,623,811 UART: [kat] sha1
28,634,706 UART: [kat] SHA2-256
28,637,712 UART: [kat] SHA2-384
28,642,410 UART: [kat] SHA2-512-ACC
28,645,037 UART: [kat] ECC-384
31,089,169 UART: [kat] HMAC-384Kdf
31,103,517 UART: [kat] LMS
31,635,141 UART: [kat] --
31,638,423 UART: [update-reset] ++
34,660,611 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,663,826 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,056,601 >>> mbox cmd response: success
35,056,991 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,057,281 UART: [update-reset] Copying MAN_2 To MAN_1
35,094,491 UART: [update-reset Success] --
35,100,413 UART: [state] Locking Datavault
35,104,097 UART: [state] Locking PCR0, PCR1 and PCR31
35,106,292 UART: [state] Locking ICCM
35,107,725 UART: [exit] Launching FMC @ 0x40000130
35,116,404 UART:
35,116,676 UART: Running Caliptra FMC ...
35,117,710 UART:
35,117,862 UART: [state] CFI Enabled
35,162,150 UART: [art] Extend RT PCRs Done
35,163,295 UART: [art] Lock RT PCRs Done
35,164,986 UART: [art] Populate DV Done
35,170,604 UART: [fht] FMC Alias Private Key: 7
35,172,146 UART: [art] Derive CDI
35,172,882 UART: [art] Store in in slot 0x4
35,215,870 UART: [art] Derive Key Pair
35,216,951 UART: [art] Store priv key in slot 0x5
37,643,312 UART: [art] Derive Key Pair - Done
37,656,243 UART: [art] Signing Cert with AUTHO
37,657,546 UART: RITY.KEYID = 7
39,363,076 UART: [art] Erasing AUTHORITY.KEYID = 7
39,364,576 UART: [art] PUB.X = E4F51B222B44437F12D705D8D698E87AD333BD8CB0E7EC7BF0497C64395250AE61F7B18518E97B8D7935EBE8FD2175DB
39,371,874 UART: [art] PUB.Y = C8EB1655847FA9764BCA76E53BD9C93F07B5E4F073E9159D011871119A7D03AAEED9556A15AB33F66959D323DCCA9150
39,379,103 UART: [art] SIG.R = 137ADF2D3D49BC3542A89BA87149D91742533A189F31D74DBEE128F2B1BE1DBB20B9FDE68C8F92687DF1BBA5D77CD7A0
39,386,558 UART: [art] SIG.S = C449331A36F5D3507F6524A9BCC827D9C954396B08B0EEBA8736ED186AFB4E9CC44AFE417649C5C8A3B988FFACF2C267
40,365,289 UART: mbox::rt_entry...
40,366,260 UART: ____ _ _ _ ____ _____
40,368,193 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,370,200 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,372,137 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,374,075 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,376,011 UART: |_|
40,376,931 UART:
40,664,957 UART: [rt] Runtime listening for mailbox commands...
40,667,131 >>> mbox cmd response data (48 bytes)
40,667,714 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,668,247 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,580 writing to cptra_bootfsm_go
3,756,651 ready_for_fw is high
3,757,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,955,821 >>> mbox cmd response: success
19,207,962 UART:
19,208,355 UART: Running Caliptra FMC ...
19,209,471 UART:
19,209,625 UART: [state] CFI Enabled
19,218,245 UART: [fht] FMC Alias Private Key: 7
20,975,763 UART: [art] Extend RT PCRs Done
20,977,030 UART: [art] Lock RT PCRs Done
20,978,737 UART: [art] Populate DV Done
20,984,250 UART: [fht] FMC Alias Private Key: 7
20,985,808 UART: [art] Derive CDI
20,986,583 UART: [art] Store in in slot 0x4
21,029,071 UART: [art] Derive Key Pair
21,030,072 UART: [art] Store priv key in slot 0x5
23,456,712 UART: [art] Derive Key Pair - Done
23,469,732 UART: [art] Signing Cert with AUTHO
23,471,049 UART: RITY.KEYID = 7
25,176,592 UART: [art] Erasing AUTHORITY.KEYID = 7
25,178,092 UART: [art] PUB.X = 7DB3FD48CAEE118ECC627CAE3865C5C1E0BEDD5C191503DBF1C3A4B3F1A35BF1B3184B7BD6D6FFAEAECA6D0B0382E076
25,185,394 UART: [art] PUB.Y = 386154F473E72374099820C86C435853655979BAF20ECD7A7FC3C76492346D4A5B83AFF125AD6317558227271EC2C1E5
25,192,626 UART: [art] SIG.R = BF37CA289C5753015DD6343DFD40B0DFC376CBE8A636880C50A173E67DF03BB9F9B4F2258D3D15C5A250A4544CC4DFE0
25,200,019 UART: [art] SIG.S = 0FB2787F872CD82F83331FF05096568E2FFCCCBF78D4B0AC6DF24D517262ABCF3AC43ABAEE742E8A3DD14AB601FB9EC1
26,178,983 UART: Caliptra RT
26,179,716 UART: [state] CFI Enabled
26,296,720 UART: [rt] RT listening for mailbox commands...
28,347,574 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,257,665 >>> mbox cmd response: success
35,258,156 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,293,077 UART:
35,293,380 UART: Running Caliptra FMC ...
35,294,508 UART:
35,294,671 UART: [state] CFI Enabled
35,338,652 UART: [art] Extend RT PCRs Done
35,339,838 UART: [art] Lock RT PCRs Done
35,341,169 UART: [art] Populate DV Done
35,346,667 UART: [fht] FMC Alias Private Key: 7
35,348,219 UART: [art] Derive CDI
35,348,991 UART: [art] Store in in slot 0x4
35,391,628 UART: [art] Derive Key Pair
35,392,670 UART: [art] Store priv key in slot 0x5
37,819,151 UART: [art] Derive Key Pair - Done
37,832,219 UART: [art] Signing Cert with AUTHO
37,833,529 UART: RITY.KEYID = 7
39,538,734 UART: [art] Erasing AUTHORITY.KEYID = 7
39,540,240 UART: [art] PUB.X = 43E1A5FA6FF4E30BB6C14887898EA4176D76DA06619AC5F298C8703C86F0FB05D5255CC04BC5657017E3760C725BEB45
39,547,489 UART: [art] PUB.Y = 1B17DA3B4E54A8D1036AFC56ADD3B78C8E935D1E69E479353330392786B2F57E2BB64C9989F3114EB6FED8EDA5A74653
39,554,773 UART: [art] SIG.R = 80CDB2898BFC07B267E72DC2835580A8A9A3F8A90E00700E0838A88F9995A96FDE00479A6B0015D1D7B95282E324BB4F
39,562,105 UART: [art] SIG.S = F2AB41CB70F886FB4C33FF077E8AEB9CBA7E64C5DBBCB219311618F219C48CC3E32D74364F919FE251705341B04CC9DB
40,540,477 UART: mbox::rt_entry...
40,541,428 UART: ____ _ _ _ ____ _____
40,543,411 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,545,568 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,547,507 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,549,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,551,362 UART: |_|
40,552,172 UART:
40,836,495 UART: [rt] Runtime listening for mailbox commands...
40,838,656 >>> mbox cmd response data (48 bytes)
40,839,243 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,839,679 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,549 UART: [kat] SHA2-256
881,480 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,595 UART: [kat] ++
885,747 UART: [kat] sha1
889,995 UART: [kat] SHA2-256
891,933 UART: [kat] SHA2-384
894,682 UART: [kat] SHA2-512-ACC
896,583 UART: [kat] ECC-384
901,966 UART: [kat] HMAC-384Kdf
906,390 UART: [kat] LMS
1,474,586 UART: [kat] --
1,475,597 UART: [cold-reset] ++
1,475,933 UART: [fht] Storing FHT @ 0x50003400
1,478,816 UART: [idev] ++
1,478,984 UART: [idev] CDI.KEYID = 6
1,479,344 UART: [idev] SUBJECT.KEYID = 7
1,479,768 UART: [idev] UDS.KEYID = 0
1,480,113 ready_for_fw is high
1,480,113 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,638 UART: [idev] Erasing UDS.KEYID = 0
1,504,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,768 UART: [idev] --
1,513,673 UART: [ldev] ++
1,513,841 UART: [ldev] CDI.KEYID = 6
1,514,204 UART: [ldev] SUBJECT.KEYID = 5
1,514,630 UART: [ldev] AUTHORITY.KEYID = 7
1,515,093 UART: [ldev] FE.KEYID = 1
1,520,297 UART: [ldev] Erasing FE.KEYID = 1
1,545,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,096 UART: [ldev] --
1,585,561 UART: [fwproc] Waiting for Commands...
1,586,194 UART: [fwproc] Received command 0x46574c44
1,586,985 UART: [fwproc] Received Image of size 114168 bytes
2,882,863 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,429 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,781 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,506 >>> mbox cmd response: success
3,076,742 UART: [afmc] ++
3,076,910 UART: [afmc] CDI.KEYID = 6
3,077,272 UART: [afmc] SUBJECT.KEYID = 7
3,077,697 UART: [afmc] AUTHORITY.KEYID = 5
3,112,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,890 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,670 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,283 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,973 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,902 UART: [afmc] --
3,155,798 UART: [cold-reset] --
3,156,402 UART: [state] Locking Datavault
3,157,869 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,473 UART: [state] Locking ICCM
3,158,995 UART: [exit] Launching FMC @ 0x40000130
3,164,324 UART:
3,164,340 UART: Running Caliptra FMC ...
3,164,748 UART:
3,164,802 UART: [state] CFI Enabled
3,175,163 UART: [fht] FMC Alias Private Key: 7
3,282,652 UART: [art] Extend RT PCRs Done
3,283,080 UART: [art] Lock RT PCRs Done
3,284,708 UART: [art] Populate DV Done
3,292,907 UART: [fht] FMC Alias Private Key: 7
3,294,079 UART: [art] Derive CDI
3,294,359 UART: [art] Store in in slot 0x4
3,380,116 UART: [art] Derive Key Pair
3,380,476 UART: [art] Store priv key in slot 0x5
3,393,058 UART: [art] Derive Key Pair - Done
3,407,771 UART: [art] Signing Cert with AUTHO
3,408,251 UART: RITY.KEYID = 7
3,423,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,860 UART: [art] PUB.X = BA9A4BD445E58BDC3CDA34E33AE35A29DB086597AF165FEBA277C3564F0DC6F1987131FFCFE5A133E009B70929FFDAE1
3,430,640 UART: [art] PUB.Y = 1082B75B674F613CCB8C1006EDBE57A074698F79FBC3EFE293002C05E92847FBB6511E3CB7D665A3FCD45B8EC077C4CD
3,437,576 UART: [art] SIG.R = A2B57E47D75E91095C2267992BABD91A5EA3F1BFD7F1DA398D93DFB11E3231D596FCCFFF5C93DAF84545398A994837F2
3,444,357 UART: [art] SIG.S = ECE1640E1448C81ACDEBA6BCE0CC6DD4E21760957F2199A9A45439260710D6094D52E4A976AF87BFFD06CA3656649902
3,468,529 UART: Caliptra RT
3,468,782 UART: [state] CFI Enabled
3,576,890 UART: [rt] RT listening for mailbox commands...
3,577,560 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,829 UART:
3,578,845 UART: Running Caliptra ROM ...
3,579,253 UART:
3,579,307 UART: [state] CFI Enabled
3,581,779 UART: [state] LifecycleState = Unprovisioned
3,582,434 UART: [state] DebugLocked = No
3,583,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,584,815 UART: [kat] SHA2-256
4,378,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,382,861 UART: [kat] ++
4,383,013 UART: [kat] sha1
4,387,277 UART: [kat] SHA2-256
4,389,215 UART: [kat] SHA2-384
4,392,138 UART: [kat] SHA2-512-ACC
4,394,038 UART: [kat] ECC-384
4,399,321 UART: [kat] HMAC-384Kdf
4,403,717 UART: [kat] LMS
4,971,913 UART: [kat] --
4,973,098 UART: [update-reset] ++
5,898,244 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,899,460 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
5,995,636 >>> mbox cmd response: success
5,995,636 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,995,943 UART: [update-reset] Copying MAN_2 To MAN_1
6,003,957 UART: [update-reset Success] --
6,004,870 UART: [state] Locking Datavault
6,005,522 UART: [state] Locking PCR0, PCR1 and PCR31
6,006,126 UART: [state] Locking ICCM
6,006,708 UART: [exit] Launching FMC @ 0x40000130
6,012,037 UART:
6,012,053 UART: Running Caliptra FMC ...
6,012,461 UART:
6,012,515 UART: [state] CFI Enabled
6,102,034 UART: [art] Extend RT PCRs Done
6,102,462 UART: [art] Lock RT PCRs Done
6,103,661 UART: [art] Populate DV Done
6,111,824 UART: [fht] FMC Alias Private Key: 7
6,112,956 UART: [art] Derive CDI
6,113,236 UART: [art] Store in in slot 0x4
6,198,377 UART: [art] Derive Key Pair
6,198,737 UART: [art] Store priv key in slot 0x5
6,211,781 UART: [art] Derive Key Pair - Done
6,226,274 UART: [art] Signing Cert with AUTHO
6,226,754 UART: RITY.KEYID = 7
6,241,902 UART: [art] Erasing AUTHORITY.KEYID = 7
6,242,667 UART: [art] PUB.X = A846BDBCCEBA076E0C0394E3ED37AD80C86E9030EFD1E5BC8625F2FE7905CBFBE3606B4164184FEA6AEE027B69C37B47
6,249,444 UART: [art] PUB.Y = 6C3E499FC36902E8734F94177CAF15F3412457DFDB6DB6294F071EDE5864325A21AFC5FFB22406AC6385D1481335C9B4
6,256,387 UART: [art] SIG.R = 3886C4852494ACF0737C2F4748B59F8ACB68399DA2061286E95A932D7461650D216482F63BD8F10979D4714B3BE76211
6,263,136 UART: [art] SIG.S = 2AFEAF7358562FBF0857FF8F84AB2EF77D20E9994724744CC11F9AE8739B5D44B60A6A8F06D1D2670B2F2730D5F4F91E
6,287,143 UART: mbox::rt_entry...
6,287,515 UART: ____ _ _ _ ____ _____
6,288,299 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,289,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,289,867 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,290,635 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,291,403 UART: |_|
6,291,715 UART:
6,570,432 UART: [rt] Runtime listening for mailbox commands...
6,571,622 >>> mbox cmd response data (48 bytes)
6,571,623 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,571,731 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,993 ready_for_fw is high
1,361,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,284 >>> mbox cmd response: success
2,987,724 UART:
2,987,740 UART: Running Caliptra FMC ...
2,988,148 UART:
2,988,202 UART: [state] CFI Enabled
2,998,329 UART: [fht] FMC Alias Private Key: 7
3,105,424 UART: [art] Extend RT PCRs Done
3,105,852 UART: [art] Lock RT PCRs Done
3,107,304 UART: [art] Populate DV Done
3,115,755 UART: [fht] FMC Alias Private Key: 7
3,116,757 UART: [art] Derive CDI
3,117,037 UART: [art] Store in in slot 0x4
3,203,006 UART: [art] Derive Key Pair
3,203,366 UART: [art] Store priv key in slot 0x5
3,217,248 UART: [art] Derive Key Pair - Done
3,232,091 UART: [art] Signing Cert with AUTHO
3,232,571 UART: RITY.KEYID = 7
3,248,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,786 UART: [art] PUB.X = 11A4CDA3949298C111B993FEE136790DF3F47390E2A01F7563D3310537455D997A4AD69560ED1A01C1331BA545C0C89C
3,255,543 UART: [art] PUB.Y = 3039E7067921BEC7061A8E8FCA540E9D12B5B6A3D3AC003E35F9ECD404F0590D999AE77B52D7D4C8D0A0464542C7F4C9
3,262,464 UART: [art] SIG.R = BFF401272A786C0AD392906C9F7879E101B3DBCA23E32EB82BB218EE4E06DFE45A629E7E682B3D2591B9DABAACF1A29B
3,269,242 UART: [art] SIG.S = 0FAA86ECB3D6D52495FA24448687916CDE671E2CDDCA7ADA5FB54582C8DA7664DFEA5CC4015A6031785139D77B650A88
3,293,652 UART: Caliptra RT
3,293,905 UART: [state] CFI Enabled
3,402,928 UART: [rt] RT listening for mailbox commands...
3,403,598 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,702,306 >>> mbox cmd response: success
5,702,306 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,715,575 UART:
5,715,591 UART: Running Caliptra FMC ...
5,715,999 UART:
5,716,053 UART: [state] CFI Enabled
5,804,808 UART: [art] Extend RT PCRs Done
5,805,236 UART: [art] Lock RT PCRs Done
5,806,397 UART: [art] Populate DV Done
5,814,372 UART: [fht] FMC Alias Private Key: 7
5,815,534 UART: [art] Derive CDI
5,815,814 UART: [art] Store in in slot 0x4
5,901,355 UART: [art] Derive Key Pair
5,901,715 UART: [art] Store priv key in slot 0x5
5,915,109 UART: [art] Derive Key Pair - Done
5,929,638 UART: [art] Signing Cert with AUTHO
5,930,118 UART: RITY.KEYID = 7
5,944,818 UART: [art] Erasing AUTHORITY.KEYID = 7
5,945,583 UART: [art] PUB.X = 3CD56671FABD4F0704320C8299E8F99B87F534C4A9888446937681E26B688AF870C364BBB3D660BD9AB04665854C6843
5,952,338 UART: [art] PUB.Y = FF86DB218F697FF39B4E2C4AB01C9119DE2AD89CBD2E2FDD2B5393BCEADB7BC567B1E302C9B3D96C903CCB2AA32EE8EA
5,959,319 UART: [art] SIG.R = 9B8F3AA672282F3D90548307BE7F7C296285AFAB9140855B8323785AA2AC4E4350991703F4ECBC41903EEC282992C77F
5,966,081 UART: [art] SIG.S = 8411842A693C17A9FC7A1F903C4709449BD6E9B7E8EA2D65178AF34F20567F858C48816C9E7A839C2B89E5A461FECDB0
5,990,161 UART: mbox::rt_entry...
5,990,533 UART: ____ _ _ _ ____ _____
5,991,317 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,992,117 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,992,885 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,993,653 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,994,421 UART: |_|
5,994,733 UART:
6,274,976 UART: [rt] Runtime listening for mailbox commands...
6,276,166 >>> mbox cmd response data (48 bytes)
6,276,167 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,276,275 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,156 UART: [kat] SHA2-256
882,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,202 UART: [kat] ++
886,354 UART: [kat] sha1
890,626 UART: [kat] SHA2-256
892,564 UART: [kat] SHA2-384
895,255 UART: [kat] SHA2-512-ACC
897,156 UART: [kat] ECC-384
902,643 UART: [kat] HMAC-384Kdf
907,381 UART: [kat] LMS
1,475,577 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,950 UART: [fht] Storing FHT @ 0x50003400
1,479,817 UART: [idev] ++
1,479,985 UART: [idev] CDI.KEYID = 6
1,480,345 UART: [idev] SUBJECT.KEYID = 7
1,480,769 UART: [idev] UDS.KEYID = 0
1,481,114 ready_for_fw is high
1,481,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,799 UART: [idev] Erasing UDS.KEYID = 0
1,505,861 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,497 UART: [idev] --
1,515,398 UART: [ldev] ++
1,515,566 UART: [ldev] CDI.KEYID = 6
1,515,929 UART: [ldev] SUBJECT.KEYID = 5
1,516,355 UART: [ldev] AUTHORITY.KEYID = 7
1,516,818 UART: [ldev] FE.KEYID = 1
1,521,978 UART: [ldev] Erasing FE.KEYID = 1
1,547,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,241 UART: [ldev] --
1,586,674 UART: [fwproc] Waiting for Commands...
1,587,347 UART: [fwproc] Received command 0x46574c44
1,588,138 UART: [fwproc] Received Image of size 114168 bytes
2,884,990 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,436 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,788 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,397 >>> mbox cmd response: success
3,078,439 UART: [afmc] ++
3,078,607 UART: [afmc] CDI.KEYID = 6
3,078,969 UART: [afmc] SUBJECT.KEYID = 7
3,079,394 UART: [afmc] AUTHORITY.KEYID = 5
3,114,721 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,209 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,602 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,292 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,297 UART: [afmc] --
3,158,413 UART: [cold-reset] --
3,159,139 UART: [state] Locking Datavault
3,160,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,752 UART: [state] Locking ICCM
3,161,296 UART: [exit] Launching FMC @ 0x40000130
3,166,625 UART:
3,166,641 UART: Running Caliptra FMC ...
3,167,049 UART:
3,167,192 UART: [state] CFI Enabled
3,178,001 UART: [fht] FMC Alias Private Key: 7
3,286,132 UART: [art] Extend RT PCRs Done
3,286,560 UART: [art] Lock RT PCRs Done
3,288,042 UART: [art] Populate DV Done
3,296,051 UART: [fht] FMC Alias Private Key: 7
3,297,035 UART: [art] Derive CDI
3,297,315 UART: [art] Store in in slot 0x4
3,383,078 UART: [art] Derive Key Pair
3,383,438 UART: [art] Store priv key in slot 0x5
3,396,506 UART: [art] Derive Key Pair - Done
3,411,325 UART: [art] Signing Cert with AUTHO
3,411,805 UART: RITY.KEYID = 7
3,426,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,740 UART: [art] PUB.X = B0049B7D798A79F56642CEAE986D69265FD8FBCFC84BB6103521B0FAE579DFE05A006852BE3E86475FC971D56001AEDF
3,434,494 UART: [art] PUB.Y = 110FF42A83B7366D7FFDE7420201B72911F0B4E1A9DB0CA4B4C593AC16F9D19B50C96B9B3F3280758CA9C531BFC49078
3,441,440 UART: [art] SIG.R = 379C5FDA86174ACBCF05E624E157ED1E03CA894533013879A9727864D1AF9BD2B1A0A80970A6D1E50EFE3D01B32DAECB
3,448,206 UART: [art] SIG.S = 1544DE38CEB85951E08BB0FD1A9E48C34AB7B210C5813A64A77F08AFB642BBFF60FD74753874A4DA9F7AEB9C72ECE2A7
3,471,942 UART: Caliptra RT
3,472,287 UART: [state] CFI Enabled
3,582,071 UART: [rt] RT listening for mailbox commands...
3,582,741 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,130 UART:
3,584,146 UART: Running Caliptra ROM ...
3,584,554 UART:
3,584,695 UART: [state] CFI Enabled
3,588,065 UART: [state] LifecycleState = Unprovisioned
3,588,720 UART: [state] DebugLocked = No
3,589,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,797 UART: [kat] SHA2-256
4,384,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,843 UART: [kat] ++
4,388,995 UART: [kat] sha1
4,393,339 UART: [kat] SHA2-256
4,395,277 UART: [kat] SHA2-384
4,398,056 UART: [kat] SHA2-512-ACC
4,399,956 UART: [kat] ECC-384
4,405,775 UART: [kat] HMAC-384Kdf
4,410,519 UART: [kat] LMS
4,978,715 UART: [kat] --
4,979,592 UART: [update-reset] ++
5,903,968 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,905,212 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,001,388 >>> mbox cmd response: success
6,001,388 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,001,507 UART: [update-reset] Copying MAN_2 To MAN_1
6,009,521 UART: [update-reset Success] --
6,010,432 UART: [state] Locking Datavault
6,011,272 UART: [state] Locking PCR0, PCR1 and PCR31
6,011,876 UART: [state] Locking ICCM
6,012,318 UART: [exit] Launching FMC @ 0x40000130
6,017,647 UART:
6,017,663 UART: Running Caliptra FMC ...
6,018,071 UART:
6,018,214 UART: [state] CFI Enabled
6,107,305 UART: [art] Extend RT PCRs Done
6,107,733 UART: [art] Lock RT PCRs Done
6,109,016 UART: [art] Populate DV Done
6,117,511 UART: [fht] FMC Alias Private Key: 7
6,118,479 UART: [art] Derive CDI
6,118,759 UART: [art] Store in in slot 0x4
6,204,504 UART: [art] Derive Key Pair
6,204,864 UART: [art] Store priv key in slot 0x5
6,218,470 UART: [art] Derive Key Pair - Done
6,233,617 UART: [art] Signing Cert with AUTHO
6,234,097 UART: RITY.KEYID = 7
6,249,513 UART: [art] Erasing AUTHORITY.KEYID = 7
6,250,278 UART: [art] PUB.X = 1FF2FB16CD8533AD160962242B02954F697FDC9AFA83ADFD18BCE20A21734E1533F8371F6A11D16D6349EEFD188E3008
6,257,044 UART: [art] PUB.Y = E2F137412564F55FD72F7617D879AE8E01E3FC4020C55743664511212FB62914C5CA0A131FBC01FB0233F91684317970
6,263,972 UART: [art] SIG.R = 84B03D01C19622520110012447E661F00618E333EA928F8833F72FEB07B5C380FB66B865F931190E53E59D9F4D3C4B17
6,270,714 UART: [art] SIG.S = F666CF72B97FB3641EA724402763A238E7686A5DD69C5F373800AE9D9CA22D3ACFBE08E395A04746B012FF5EB31ACD4F
6,294,254 UART: mbox::rt_entry...
6,294,626 UART: ____ _ _ _ ____ _____
6,295,410 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,296,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,296,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,297,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,298,514 UART: |_|
6,298,826 UART:
6,578,063 UART: [rt] Runtime listening for mailbox commands...
6,579,253 >>> mbox cmd response data (48 bytes)
6,579,254 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,579,362 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,222 ready_for_fw is high
1,363,222 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,257 >>> mbox cmd response: success
2,990,135 UART:
2,990,151 UART: Running Caliptra FMC ...
2,990,559 UART:
2,990,702 UART: [state] CFI Enabled
3,001,611 UART: [fht] FMC Alias Private Key: 7
3,109,192 UART: [art] Extend RT PCRs Done
3,109,620 UART: [art] Lock RT PCRs Done
3,111,206 UART: [art] Populate DV Done
3,119,399 UART: [fht] FMC Alias Private Key: 7
3,120,421 UART: [art] Derive CDI
3,120,701 UART: [art] Store in in slot 0x4
3,206,134 UART: [art] Derive Key Pair
3,206,494 UART: [art] Store priv key in slot 0x5
3,219,526 UART: [art] Derive Key Pair - Done
3,234,500 UART: [art] Signing Cert with AUTHO
3,234,980 UART: RITY.KEYID = 7
3,250,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,347 UART: [art] PUB.X = E16B6EF7343DDE051C7FCE4016C445B73E7623C1EB55C59A8C22F180E758AB71F531388238B06A2BD6C784CC7911E423
3,258,118 UART: [art] PUB.Y = 24E800F29308D46C1C1366087DF1DF83CF42C977FEC191973A315E7B62C02DD99276AD7F13458F2AE0ABED4389CD49C4
3,265,046 UART: [art] SIG.R = 13791D8CFEE1E38A7E8BAC83E1BBD7BA9D389953DECC1BF9898C2479D68229C41A04ACCE5D6946ED9BD323BF5895CE71
3,271,833 UART: [art] SIG.S = 15359FD55C92AB9C7A0C520FE3A9E55FCB29C8915899898B0F99C76440D1F093A4112378C563B78D807F6E7F0CC28886
3,295,460 UART: Caliptra RT
3,295,805 UART: [state] CFI Enabled
3,403,889 UART: [rt] RT listening for mailbox commands...
3,404,559 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,704,222 >>> mbox cmd response: success
5,704,222 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,717,853 UART:
5,717,869 UART: Running Caliptra FMC ...
5,718,277 UART:
5,718,420 UART: [state] CFI Enabled
5,807,201 UART: [art] Extend RT PCRs Done
5,807,629 UART: [art] Lock RT PCRs Done
5,808,710 UART: [art] Populate DV Done
5,817,111 UART: [fht] FMC Alias Private Key: 7
5,818,125 UART: [art] Derive CDI
5,818,405 UART: [art] Store in in slot 0x4
5,904,484 UART: [art] Derive Key Pair
5,904,844 UART: [art] Store priv key in slot 0x5
5,918,440 UART: [art] Derive Key Pair - Done
5,933,162 UART: [art] Signing Cert with AUTHO
5,933,642 UART: RITY.KEYID = 7
5,948,550 UART: [art] Erasing AUTHORITY.KEYID = 7
5,949,315 UART: [art] PUB.X = B0143A707913BAC2C42D4E8216F26818F6F062414BC90239053D46E975CBEAD36B90602B1FE7B681053F86502725C90F
5,956,067 UART: [art] PUB.Y = F5B1FF6F7291A4DB1E05BB8E6EC6B96F0E371E953C97368A27AD68557387268E119CA77D681922C15BB47CFD7FADA25C
5,963,023 UART: [art] SIG.R = 62835E14795B1DF58A6268A040C636C5F42C9AE02898D916715E6F545CEB5282F7D652E095A63731945FEC384AEDB184
5,969,789 UART: [art] SIG.S = 11862303DE88F81970D78D17771B2B420A83E5742903016B3DE83A64112328614E65FBD708B57CB226C44644BE336A43
5,992,461 UART: mbox::rt_entry...
5,992,833 UART: ____ _ _ _ ____ _____
5,993,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,994,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,995,185 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,995,953 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,996,721 UART: |_|
5,997,033 UART:
6,281,354 UART: [rt] Runtime listening for mailbox commands...
6,282,544 >>> mbox cmd response data (48 bytes)
6,282,545 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,282,653 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,464 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
893,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,599 UART: [kat] ++
897,751 UART: [kat] sha1
901,915 UART: [kat] SHA2-256
903,855 UART: [kat] SHA2-384
906,590 UART: [kat] SHA2-512-ACC
908,491 UART: [kat] ECC-384
918,474 UART: [kat] HMAC-384Kdf
922,950 UART: [kat] LMS
1,171,278 UART: [kat] --
1,172,331 UART: [cold-reset] ++
1,172,727 UART: [fht] FHT @ 0x50003400
1,175,418 UART: [idev] ++
1,175,586 UART: [idev] CDI.KEYID = 6
1,175,946 UART: [idev] SUBJECT.KEYID = 7
1,176,370 UART: [idev] UDS.KEYID = 0
1,176,715 ready_for_fw is high
1,176,715 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,304 UART: [idev] Erasing UDS.KEYID = 0
1,201,515 UART: [idev] Sha1 KeyId Algorithm
1,209,925 UART: [idev] --
1,210,953 UART: [ldev] ++
1,211,121 UART: [ldev] CDI.KEYID = 6
1,211,484 UART: [ldev] SUBJECT.KEYID = 5
1,211,910 UART: [ldev] AUTHORITY.KEYID = 7
1,212,373 UART: [ldev] FE.KEYID = 1
1,217,867 UART: [ldev] Erasing FE.KEYID = 1
1,244,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,119 UART: [ldev] --
1,283,620 UART: [fwproc] Wait for Commands...
1,284,248 UART: [fwproc] Recv command 0x46574c44
1,284,976 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,703 >>> mbox cmd response: success
2,775,847 UART: [afmc] ++
2,776,015 UART: [afmc] CDI.KEYID = 6
2,776,377 UART: [afmc] SUBJECT.KEYID = 7
2,776,802 UART: [afmc] AUTHORITY.KEYID = 5
2,812,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,448 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,835,176 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,841,061 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,780 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,764 UART: [afmc] --
2,855,872 UART: [cold-reset] --
2,856,732 UART: [state] Locking Datavault
2,857,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,858,425 UART: [state] Locking ICCM
2,858,917 UART: [exit] Launching FMC @ 0x40000130
2,864,246 UART:
2,864,262 UART: Running Caliptra FMC ...
2,864,670 UART:
2,864,724 UART: [state] CFI Enabled
2,875,095 UART: [fht] FMC Alias Private Key: 7
2,982,522 UART: [art] Extend RT PCRs Done
2,982,950 UART: [art] Lock RT PCRs Done
2,984,594 UART: [art] Populate DV Done
2,993,007 UART: [fht] FMC Alias Private Key: 7
2,994,003 UART: [art] Derive CDI
2,994,283 UART: [art] Store in in slot 0x4
3,079,710 UART: [art] Derive Key Pair
3,080,070 UART: [art] Store priv key in slot 0x5
3,093,586 UART: [art] Derive Key Pair - Done
3,108,412 UART: [art] Signing Cert with AUTHO
3,108,892 UART: RITY.KEYID = 7
3,124,112 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,877 UART: [art] PUB.X = 50CE0D5057E4FCEED3064ECFEF2175F3F8C1F3BC9A05E9FB900031BBB0363070E6B56AD0535DFFDF4B2FB2F8039FB461
3,131,635 UART: [art] PUB.Y = 39F0D7409FE86DB52EE8BAB9E060F1DFAE62C622A9E88B312A1FC8E179F5EF5F23EDC3A292D19B709B60A57FAF84FCD9
3,138,609 UART: [art] SIG.R = 1536C0C807BF5541FA271C42882345E1598F65CBA5398FF5D2F0367B9A4AB939974B2D2F03E03D3E1A0E388D7BB4CE67
3,145,374 UART: [art] SIG.S = B95C4A6215716E8E9639367FF0E9146A0205DCAB77C7CF573B245EA567AFF380D41CC02DB3465EC2631A094EC4900976
3,169,431 UART: Caliptra RT
3,169,684 UART: [state] CFI Enabled
3,278,247 UART: [rt] RT listening for mailbox commands...
3,278,917 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,280,273 UART:
3,280,289 UART: Running Caliptra ROM ...
3,280,697 UART:
3,280,752 UART: [state] CFI Enabled
3,283,628 UART: [state] LifecycleState = Unprovisioned
3,284,283 UART: [state] DebugLocked = No
3,284,853 UART: [state] WD Timer not started. Device not locked for debugging
3,286,191 UART: [kat] SHA2-256
4,091,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,966 UART: [kat] ++
4,096,118 UART: [kat] sha1
4,100,552 UART: [kat] SHA2-256
4,102,492 UART: [kat] SHA2-384
4,105,165 UART: [kat] SHA2-512-ACC
4,107,065 UART: [kat] ECC-384
4,116,590 UART: [kat] HMAC-384Kdf
4,121,250 UART: [kat] LMS
4,369,578 UART: [kat] --
4,370,308 UART: [update-reset] ++
5,271,900 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,272,933 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,369,057 >>> mbox cmd response: success
5,369,057 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,369,410 UART: [update-reset] Copying MAN_2 To MAN_1
5,377,424 UART: [update-reset Success] --
5,378,305 UART: [state] Locking Datavault
5,378,911 UART: [state] Locking PCR0, PCR1 and PCR31
5,379,515 UART: [state] Locking ICCM
5,380,115 UART: [exit] Launching FMC @ 0x40000130
5,385,444 UART:
5,385,460 UART: Running Caliptra FMC ...
5,385,868 UART:
5,385,922 UART: [state] CFI Enabled
5,475,211 UART: [art] Extend RT PCRs Done
5,475,639 UART: [art] Lock RT PCRs Done
5,476,982 UART: [art] Populate DV Done
5,485,359 UART: [fht] FMC Alias Private Key: 7
5,486,517 UART: [art] Derive CDI
5,486,797 UART: [art] Store in in slot 0x4
5,572,612 UART: [art] Derive Key Pair
5,572,972 UART: [art] Store priv key in slot 0x5
5,585,702 UART: [art] Derive Key Pair - Done
5,600,435 UART: [art] Signing Cert with AUTHO
5,600,915 UART: RITY.KEYID = 7
5,616,359 UART: [art] Erasing AUTHORITY.KEYID = 7
5,617,124 UART: [art] PUB.X = 43EFE7CA6E0DFC652BB5FE5BA0F05895F5D22040322F91808E6DD699F46B362C38E7EF685A5547933216AE929C8102C8
5,623,892 UART: [art] PUB.Y = FDAF26CA94217A244105101358EBB1059BE7D96407E9950DEF1F98DE761925B095B08CD3464697E301721CCF1420D910
5,630,823 UART: [art] SIG.R = D026A00C9B03F6478A8E63D3988185AFF0C68008C57D66205AB04A62A847B3B3958CA9396E67183BFF7C14BBBAACCF9C
5,637,594 UART: [art] SIG.S = 3CC212B1274EB5D804ADD8418055EE9341B092BECB1B44B46E766E6D8CBBFC09CC9C6ADAE3C2278C882D7019AD37A8F5
5,661,857 UART: mbox::rt_entry...
5,662,229 UART: ____ _ _ _ ____ _____
5,663,013 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,663,813 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,664,581 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,665,349 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,666,117 UART: |_|
5,666,429 UART:
5,947,455 UART: [rt] Runtime listening for mailbox commands...
5,948,645 >>> mbox cmd response data (48 bytes)
5,948,646 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,948,754 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,459 ready_for_fw is high
1,060,459 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,268 >>> mbox cmd response: success
2,685,260 UART:
2,685,276 UART: Running Caliptra FMC ...
2,685,684 UART:
2,685,738 UART: [state] CFI Enabled
2,696,301 UART: [fht] FMC Alias Private Key: 7
2,803,804 UART: [art] Extend RT PCRs Done
2,804,232 UART: [art] Lock RT PCRs Done
2,805,704 UART: [art] Populate DV Done
2,813,957 UART: [fht] FMC Alias Private Key: 7
2,814,901 UART: [art] Derive CDI
2,815,181 UART: [art] Store in in slot 0x4
2,900,834 UART: [art] Derive Key Pair
2,901,194 UART: [art] Store priv key in slot 0x5
2,914,652 UART: [art] Derive Key Pair - Done
2,929,402 UART: [art] Signing Cert with AUTHO
2,929,882 UART: RITY.KEYID = 7
2,945,312 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,077 UART: [art] PUB.X = C65FB673DADF9E5F675CEAB702C15D8313A2B51A5E4D3094807A01C6247592533B55B2684E5CA3E4C27AA185B5D96AEF
2,952,851 UART: [art] PUB.Y = 5A24E58713D64D67A54F8347FBDC881DB34D99FEB0CCED6B48B7DFBFC8236EACC0C78DD56FA7A537BC366CE45DEC0D63
2,959,826 UART: [art] SIG.R = 7692DF8F7A9F3BB1D67896662674FF212D77FD266E0225D9C1417BA1AF15DE11B825630BF4486D73EA74756E59D8B266
2,966,590 UART: [art] SIG.S = B06F699D2529006AF59692CB24CDDDFC21E9B9EC02CCE261A69E61FD7A21D30C324355F0DAA32F95268CF5B037C3F321
2,990,773 UART: Caliptra RT
2,991,026 UART: [state] CFI Enabled
3,098,135 UART: [rt] RT listening for mailbox commands...
3,098,805 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,073,712 >>> mbox cmd response: success
5,073,712 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,087,062 UART:
5,087,078 UART: Running Caliptra FMC ...
5,087,486 UART:
5,087,540 UART: [state] CFI Enabled
5,176,817 UART: [art] Extend RT PCRs Done
5,177,245 UART: [art] Lock RT PCRs Done
5,178,334 UART: [art] Populate DV Done
5,186,335 UART: [fht] FMC Alias Private Key: 7
5,187,441 UART: [art] Derive CDI
5,187,721 UART: [art] Store in in slot 0x4
5,272,928 UART: [art] Derive Key Pair
5,273,288 UART: [art] Store priv key in slot 0x5
5,286,232 UART: [art] Derive Key Pair - Done
5,300,940 UART: [art] Signing Cert with AUTHO
5,301,420 UART: RITY.KEYID = 7
5,317,026 UART: [art] Erasing AUTHORITY.KEYID = 7
5,317,791 UART: [art] PUB.X = DCE8ABB2BB44108F294A15005E5AEE64DF1EAB4F0F2B43341D05C36CC11EF797AE587C5A572DFAEC41706E7D374EF212
5,324,553 UART: [art] PUB.Y = 09CFD978782BB099A8C2FC127828D746435E3C5E31F39138FA276F494592C48F534287EB06942BBF3B194A03B29685D1
5,331,488 UART: [art] SIG.R = 9A6B8DE87177219435E9C4DE6ACF1B9B321407B8D497E22C3876F8C066E4F518B0F6C00F9456A4B203600CC0DAD3A2E9
5,338,252 UART: [art] SIG.S = 29D65B7124E89ACDEC5E1C9D1F12D84DD3FF3FC4205EA586299FFF601023E2F7D61B734FA1018468F496AC59817019F9
5,361,552 UART: mbox::rt_entry...
5,361,924 UART: ____ _ _ _ ____ _____
5,362,708 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,363,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,364,276 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,365,044 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,365,812 UART: |_|
5,366,124 UART:
5,647,370 UART: [rt] Runtime listening for mailbox commands...
5,648,560 >>> mbox cmd response data (48 bytes)
5,648,561 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,648,669 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
893,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,928 UART: [kat] ++
898,080 UART: [kat] sha1
902,288 UART: [kat] SHA2-256
904,228 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,499 UART: [kat] HMAC-384Kdf
923,111 UART: [kat] LMS
1,171,439 UART: [kat] --
1,172,164 UART: [cold-reset] ++
1,172,586 UART: [fht] FHT @ 0x50003400
1,175,287 UART: [idev] ++
1,175,455 UART: [idev] CDI.KEYID = 6
1,175,815 UART: [idev] SUBJECT.KEYID = 7
1,176,239 UART: [idev] UDS.KEYID = 0
1,176,584 ready_for_fw is high
1,176,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,961 UART: [idev] Erasing UDS.KEYID = 0
1,200,882 UART: [idev] Sha1 KeyId Algorithm
1,209,222 UART: [idev] --
1,210,160 UART: [ldev] ++
1,210,328 UART: [ldev] CDI.KEYID = 6
1,210,691 UART: [ldev] SUBJECT.KEYID = 5
1,211,117 UART: [ldev] AUTHORITY.KEYID = 7
1,211,580 UART: [ldev] FE.KEYID = 1
1,217,188 UART: [ldev] Erasing FE.KEYID = 1
1,243,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,978 UART: [ldev] --
1,283,395 UART: [fwproc] Wait for Commands...
1,284,043 UART: [fwproc] Recv command 0x46574c44
1,284,771 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,983 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,654 >>> mbox cmd response: success
2,773,678 UART: [afmc] ++
2,773,846 UART: [afmc] CDI.KEYID = 6
2,774,208 UART: [afmc] SUBJECT.KEYID = 7
2,774,633 UART: [afmc] AUTHORITY.KEYID = 5
2,810,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,007 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,735 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,095 UART: [afmc] --
2,853,989 UART: [cold-reset] --
2,854,871 UART: [state] Locking Datavault
2,856,184 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,788 UART: [state] Locking ICCM
2,857,266 UART: [exit] Launching FMC @ 0x40000130
2,862,595 UART:
2,862,611 UART: Running Caliptra FMC ...
2,863,019 UART:
2,863,162 UART: [state] CFI Enabled
2,873,837 UART: [fht] FMC Alias Private Key: 7
2,982,526 UART: [art] Extend RT PCRs Done
2,982,954 UART: [art] Lock RT PCRs Done
2,984,140 UART: [art] Populate DV Done
2,992,687 UART: [fht] FMC Alias Private Key: 7
2,993,797 UART: [art] Derive CDI
2,994,077 UART: [art] Store in in slot 0x4
3,079,938 UART: [art] Derive Key Pair
3,080,298 UART: [art] Store priv key in slot 0x5
3,093,288 UART: [art] Derive Key Pair - Done
3,108,222 UART: [art] Signing Cert with AUTHO
3,108,702 UART: RITY.KEYID = 7
3,123,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,515 UART: [art] PUB.X = CB571FFA491B86B6D6E3A0311ED1335586BA58E00070EBFAAE899A4A6438A543BFCF7ED6DD45890DAB15D11A36CA2B41
3,131,278 UART: [art] PUB.Y = C4B42279603843D9F32C592B76EED2BE40DC4E6FAF6DFD6628760A332A7A50EF138FD8F66CB031C137B5CF8A9D353F24
3,138,237 UART: [art] SIG.R = DE8A47161C3872AA6F6CE0842C3FC53031BB0D99FC79D15540C470842F9752755DF5DCBA7FF4D69604968017A86A2FBA
3,145,007 UART: [art] SIG.S = 2ADAADF6DE1F3CD4FF954AEDA17F6AFADC2CA9626A2ACAD44BC6E5A175D4B3F6D39D726D701DDA161F074A9466EA4581
3,169,429 UART: Caliptra RT
3,169,774 UART: [state] CFI Enabled
3,277,009 UART: [rt] RT listening for mailbox commands...
3,277,679 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,783 UART:
3,278,799 UART: Running Caliptra ROM ...
3,279,207 UART:
3,279,349 UART: [state] CFI Enabled
3,282,125 UART: [state] LifecycleState = Unprovisioned
3,282,780 UART: [state] DebugLocked = No
3,283,342 UART: [state] WD Timer not started. Device not locked for debugging
3,284,558 UART: [kat] SHA2-256
4,090,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,094,333 UART: [kat] ++
4,094,485 UART: [kat] sha1
4,098,747 UART: [kat] SHA2-256
4,100,687 UART: [kat] SHA2-384
4,103,268 UART: [kat] SHA2-512-ACC
4,105,168 UART: [kat] ECC-384
4,114,469 UART: [kat] HMAC-384Kdf
4,119,003 UART: [kat] LMS
4,367,331 UART: [kat] --
4,368,143 UART: [update-reset] ++
5,269,493 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,270,548 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,366,672 >>> mbox cmd response: success
5,366,672 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,367,021 UART: [update-reset] Copying MAN_2 To MAN_1
5,375,035 UART: [update-reset Success] --
5,376,016 UART: [state] Locking Datavault
5,376,874 UART: [state] Locking PCR0, PCR1 and PCR31
5,377,478 UART: [state] Locking ICCM
5,378,054 UART: [exit] Launching FMC @ 0x40000130
5,383,383 UART:
5,383,399 UART: Running Caliptra FMC ...
5,383,807 UART:
5,383,950 UART: [state] CFI Enabled
5,473,041 UART: [art] Extend RT PCRs Done
5,473,469 UART: [art] Lock RT PCRs Done
5,474,662 UART: [art] Populate DV Done
5,482,857 UART: [fht] FMC Alias Private Key: 7
5,483,829 UART: [art] Derive CDI
5,484,109 UART: [art] Store in in slot 0x4
5,569,436 UART: [art] Derive Key Pair
5,569,796 UART: [art] Store priv key in slot 0x5
5,583,204 UART: [art] Derive Key Pair - Done
5,597,823 UART: [art] Signing Cert with AUTHO
5,598,303 UART: RITY.KEYID = 7
5,613,591 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,356 UART: [art] PUB.X = DD6B19811973C325FC49614823A6C4BD01DCD2367A17AC5151E2E27C0B9B927A85F7B726D7C5FF7E1D9244681EF95C99
5,621,124 UART: [art] PUB.Y = CE35CCC9200FA96941594AB103ABFEE8060D4A94EA37D07B8F17C2A32E1E7DE2E3656AB119C685691899F5925F53D907
5,628,065 UART: [art] SIG.R = E973BD4A0DDB45E97748841BD2EB2A2BF2C25D205E4E2DBBBDC5C162C809992CF56446BCD4DA005E41A621BBF05EAC38
5,634,829 UART: [art] SIG.S = 08E88AAA540A3BA24D5D86356CE3264A87BCB29682B5A4C9C2BC82A41323091C816793118129B60DD9FD47E46118FC4E
5,658,438 UART: mbox::rt_entry...
5,658,810 UART: ____ _ _ _ ____ _____
5,659,594 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,660,394 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,661,162 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,661,930 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,662,698 UART: |_|
5,663,010 UART:
5,945,456 UART: [rt] Runtime listening for mailbox commands...
5,946,646 >>> mbox cmd response data (48 bytes)
5,946,647 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,946,755 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,366 ready_for_fw is high
1,061,366 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,891 >>> mbox cmd response: success
2,689,147 UART:
2,689,163 UART: Running Caliptra FMC ...
2,689,571 UART:
2,689,714 UART: [state] CFI Enabled
2,700,511 UART: [fht] FMC Alias Private Key: 7
2,809,456 UART: [art] Extend RT PCRs Done
2,809,884 UART: [art] Lock RT PCRs Done
2,811,474 UART: [art] Populate DV Done
2,819,505 UART: [fht] FMC Alias Private Key: 7
2,820,507 UART: [art] Derive CDI
2,820,787 UART: [art] Store in in slot 0x4
2,906,206 UART: [art] Derive Key Pair
2,906,566 UART: [art] Store priv key in slot 0x5
2,919,676 UART: [art] Derive Key Pair - Done
2,934,436 UART: [art] Signing Cert with AUTHO
2,934,916 UART: RITY.KEYID = 7
2,950,310 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,075 UART: [art] PUB.X = B2C49391C880D9FD43429B4F95358E4BED2BCDF4356C211478A1305844BDA16A7B4BD79349734AAF6F68CDC788F8244D
2,957,851 UART: [art] PUB.Y = 96D6020FA4FCEB8591B2285F6425C01A1221DBD8CDEA0E85AD7BFC99F36117E4A9CF31258AB10E75462E55D329B4FFE5
2,964,803 UART: [art] SIG.R = 5515B74B221FB9420862F082F5A78281DE2CC900B8009AB063915FEEF8124757086809C460BD5B8120366FB5AAB61E7B
2,971,516 UART: [art] SIG.S = 645195831ABF479BD04F282EF9F3FBAB0FA4E748D241695E3029B6478BB8FEE440B133D933A106BE6328006FD37DFB53
2,995,247 UART: Caliptra RT
2,995,592 UART: [state] CFI Enabled
3,103,327 UART: [rt] RT listening for mailbox commands...
3,103,997 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,077,711 >>> mbox cmd response: success
5,077,711 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,091,027 UART:
5,091,043 UART: Running Caliptra FMC ...
5,091,451 UART:
5,091,594 UART: [state] CFI Enabled
5,181,495 UART: [art] Extend RT PCRs Done
5,181,923 UART: [art] Lock RT PCRs Done
5,183,034 UART: [art] Populate DV Done
5,191,293 UART: [fht] FMC Alias Private Key: 7
5,192,247 UART: [art] Derive CDI
5,192,527 UART: [art] Store in in slot 0x4
5,278,276 UART: [art] Derive Key Pair
5,278,636 UART: [art] Store priv key in slot 0x5
5,291,708 UART: [art] Derive Key Pair - Done
5,306,469 UART: [art] Signing Cert with AUTHO
5,306,949 UART: RITY.KEYID = 7
5,322,105 UART: [art] Erasing AUTHORITY.KEYID = 7
5,322,870 UART: [art] PUB.X = AB044EC1B6EA8EE3747763EA7DFA5CD7E0A0E32BE8294C92D82B36F29D2B5D90596EE4AFE4937FCABF5C23DCD9F59DC2
5,329,665 UART: [art] PUB.Y = 792D1D78B732087FF6B8B4755A6970814A02360E79716CF34563219EA9F16A2B9940A4D2BEE18E57F0D822069ADCC879
5,336,599 UART: [art] SIG.R = C8839099343BF874FAE705D74B549079C72076B532F6FA529425418275AD6B56BCFB9B5FE52C34D7487AE20E849A4002
5,343,356 UART: [art] SIG.S = 0B26E16A6C08FB40CD3A263CD36D1FCD0F8365C7751C39A8F8A9D77CB82D59A96C91A97A732833E5D40B7020F654D660
5,367,319 UART: mbox::rt_entry...
5,367,691 UART: ____ _ _ _ ____ _____
5,368,475 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,369,275 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,370,043 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,370,811 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,371,579 UART: |_|
5,371,891 UART:
5,654,479 UART: [rt] Runtime listening for mailbox commands...
5,655,669 >>> mbox cmd response data (48 bytes)
5,655,670 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,655,778 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,627 UART: [kat] SHA2-256
901,567 UART: [kat] SHA2-384
904,190 UART: [kat] SHA2-512-ACC
906,091 UART: [kat] ECC-384
915,812 UART: [kat] HMAC-384Kdf
920,496 UART: [kat] LMS
1,168,808 UART: [kat] --
1,169,785 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,174,339 ready_for_fw is high
1,174,339 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,511 UART: [idev] --
1,208,768 UART: [ldev] ++
1,208,936 UART: [ldev] CDI.KEYID = 6
1,209,300 UART: [ldev] SUBJECT.KEYID = 5
1,209,727 UART: [ldev] AUTHORITY.KEYID = 7
1,210,190 UART: [ldev] FE.KEYID = 1
1,215,514 UART: [ldev] Erasing FE.KEYID = 1
1,242,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,400 UART: [ldev] --
1,281,878 UART: [fwproc] Wait for Commands...
1,282,655 UART: [fwproc] Recv command 0x46574c44
1,283,388 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,985 >>> mbox cmd response: success
2,772,010 UART: [afmc] ++
2,772,178 UART: [afmc] CDI.KEYID = 6
2,772,541 UART: [afmc] SUBJECT.KEYID = 7
2,772,967 UART: [afmc] AUTHORITY.KEYID = 5
2,809,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,303 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,032 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,915 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,634 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,521 UART: [afmc] --
2,852,611 UART: [cold-reset] --
2,853,533 UART: [state] Locking Datavault
2,854,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,418 UART: [state] Locking ICCM
2,855,960 UART: [exit] Launching FMC @ 0x40000130
2,861,289 UART:
2,861,305 UART: Running Caliptra FMC ...
2,861,713 UART:
2,861,767 UART: [state] CFI Enabled
2,872,374 UART: [fht] FMC Alias Private Key: 7
2,979,755 UART: [art] Extend RT PCRs Done
2,980,183 UART: [art] Lock RT PCRs Done
2,981,715 UART: [art] Populate DV Done
2,989,816 UART: [fht] FMC Alias Private Key: 7
2,990,840 UART: [art] Derive CDI
2,991,120 UART: [art] Store in in slot 0x4
3,076,523 UART: [art] Derive Key Pair
3,076,883 UART: [art] Store priv key in slot 0x5
3,090,281 UART: [art] Derive Key Pair - Done
3,104,871 UART: [art] Signing Cert with AUTHO
3,105,351 UART: RITY.KEYID = 7
3,120,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,322 UART: [art] PUB.X = EDD7E1FB490B5C78DA30FD2D655B48BD4D808EA0DA00CA6D12D9978799C338851E71E32DBB114ED895906F496E753855
3,128,075 UART: [art] PUB.Y = 9C1A42B460D6D59D5209B1995D5BC37DA20F51A63892D2311BDAB179C0A1D4847AB5338BCDF25A2045C359F813ED9D74
3,135,025 UART: [art] SIG.R = EECCDA9DEFB2D033C075337B35F878924F2A1FF85E4875DD587D4575D76B0C5FBE6EA5A3F568BEBE680C6DE3787A9A08
3,141,806 UART: [art] SIG.S = 8ACD78CA74A41E1B047564EEB480174AD7AB18501D24A00E55FB15E1DDB580349D33AC12B7C53E2040FB02653EB8F2F7
3,165,402 UART: Caliptra RT
3,165,655 UART: [state] CFI Enabled
3,272,959 UART: [rt] RT listening for mailbox commands...
3,273,629 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,274,875 UART:
3,274,891 UART: Running Caliptra ROM ...
3,275,299 UART:
3,275,354 UART: [state] CFI Enabled
3,277,968 UART: [state] LifecycleState = Unprovisioned
3,278,623 UART: [state] DebugLocked = No
3,279,207 UART: [state] WD Timer not started. Device not locked for debugging
3,280,489 UART: [kat] SHA2-256
4,084,039 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,168 UART: [kat] ++
4,088,320 UART: [kat] sha1
4,092,528 UART: [kat] SHA2-256
4,094,468 UART: [kat] SHA2-384
4,097,241 UART: [kat] SHA2-512-ACC
4,099,141 UART: [kat] ECC-384
4,108,868 UART: [kat] HMAC-384Kdf
4,113,342 UART: [kat] LMS
4,361,654 UART: [kat] --
4,362,630 UART: [update-reset] ++
5,263,951 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,265,138 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,361,262 >>> mbox cmd response: success
5,361,262 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,361,405 UART: [update-reset] Copying MAN_2 To MAN_1
5,369,419 UART: [update-reset Success] --
5,370,326 UART: [state] Locking Datavault
5,371,122 UART: [state] Locking PCR0, PCR1 and PCR31
5,371,726 UART: [state] Locking ICCM
5,372,180 UART: [exit] Launching FMC @ 0x40000130
5,377,509 UART:
5,377,525 UART: Running Caliptra FMC ...
5,377,933 UART:
5,377,987 UART: [state] CFI Enabled
5,466,444 UART: [art] Extend RT PCRs Done
5,466,872 UART: [art] Lock RT PCRs Done
5,468,303 UART: [art] Populate DV Done
5,476,490 UART: [fht] FMC Alias Private Key: 7
5,477,458 UART: [art] Derive CDI
5,477,738 UART: [art] Store in in slot 0x4
5,563,425 UART: [art] Derive Key Pair
5,563,785 UART: [art] Store priv key in slot 0x5
5,577,115 UART: [art] Derive Key Pair - Done
5,592,250 UART: [art] Signing Cert with AUTHO
5,592,730 UART: RITY.KEYID = 7
5,608,096 UART: [art] Erasing AUTHORITY.KEYID = 7
5,608,861 UART: [art] PUB.X = F9806A92D55FAE8DE6E4A7DD471E5A852EC6A334FEBC2339D13B6503043D76C53E4B508E89B5F98696F56F520AC95C78
5,615,630 UART: [art] PUB.Y = 8F3F3C469E21F8E3596A5707B01C92A1E8DCFFA613EFC8319F1BC076997765BFFA4F78B24CAD80700211B0A32975E2B8
5,622,582 UART: [art] SIG.R = D41179E89DFD54D5F6C77DD5F31A1A5C1BCB03573A613FAB22CB12DA0355EB3CB89F7EEFCE0F67F15CD9246EB1705B46
5,629,365 UART: [art] SIG.S = 167EFA0D65939DEBB83884C9C59C336D2F067699807D747B85269A794C664E19F2E6D78498FF46CE34485321667482CC
5,652,520 UART: mbox::rt_entry...
5,652,892 UART: ____ _ _ _ ____ _____
5,653,676 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,654,476 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,655,244 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,656,012 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,656,780 UART: |_|
5,657,092 UART:
5,934,686 UART: [rt] Runtime listening for mailbox commands...
5,935,876 >>> mbox cmd response data (48 bytes)
5,935,877 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,935,985 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,078 ready_for_fw is high
1,057,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,275 >>> mbox cmd response: success
2,683,909 UART:
2,683,925 UART: Running Caliptra FMC ...
2,684,333 UART:
2,684,387 UART: [state] CFI Enabled
2,694,704 UART: [fht] FMC Alias Private Key: 7
2,801,977 UART: [art] Extend RT PCRs Done
2,802,405 UART: [art] Lock RT PCRs Done
2,803,711 UART: [art] Populate DV Done
2,811,950 UART: [fht] FMC Alias Private Key: 7
2,813,066 UART: [art] Derive CDI
2,813,346 UART: [art] Store in in slot 0x4
2,898,677 UART: [art] Derive Key Pair
2,899,037 UART: [art] Store priv key in slot 0x5
2,912,089 UART: [art] Derive Key Pair - Done
2,926,717 UART: [art] Signing Cert with AUTHO
2,927,197 UART: RITY.KEYID = 7
2,942,515 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,280 UART: [art] PUB.X = 3585B0679F66C53FE352BC43137741A9A7C72F136C09201038D6CC853EF1BEAD1B7B4E075FF56D15092D28F8BC7362AE
2,950,045 UART: [art] PUB.Y = 8DC742111A82646A342D70313D7CD7225F0CF4D6EF00D4A4ABC5DE73756064951085FFD5401DA5F7B8A6CB571AAFFA2B
2,956,982 UART: [art] SIG.R = 486AF20D5B236F4597D86CEB5F501CCE12935B4DEB6F3C1F04D6AB55932BAC62062F9482D34FFF45E58EB752C0F6D078
2,963,755 UART: [art] SIG.S = F0C3958BB99C338D8778DEE6663ECB378A6ED30F9F821654C3D1F291B925C63C8E66F716BB93C2639571E1E59451F6D0
2,987,483 UART: Caliptra RT
2,987,736 UART: [state] CFI Enabled
3,095,863 UART: [rt] RT listening for mailbox commands...
3,096,533 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,065,461 >>> mbox cmd response: success
5,065,461 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,078,721 UART:
5,078,737 UART: Running Caliptra FMC ...
5,079,145 UART:
5,079,199 UART: [state] CFI Enabled
5,168,254 UART: [art] Extend RT PCRs Done
5,168,682 UART: [art] Lock RT PCRs Done
5,169,649 UART: [art] Populate DV Done
5,177,966 UART: [fht] FMC Alias Private Key: 7
5,178,902 UART: [art] Derive CDI
5,179,182 UART: [art] Store in in slot 0x4
5,264,843 UART: [art] Derive Key Pair
5,265,203 UART: [art] Store priv key in slot 0x5
5,278,265 UART: [art] Derive Key Pair - Done
5,293,043 UART: [art] Signing Cert with AUTHO
5,293,523 UART: RITY.KEYID = 7
5,308,663 UART: [art] Erasing AUTHORITY.KEYID = 7
5,309,428 UART: [art] PUB.X = D0353D6C738A64E7F6855B55685BCC2D0D0B118D6CD0223E0EB14DA0CCC9CE983FC51265C7026523A1C87CA375D82A37
5,316,194 UART: [art] PUB.Y = 23F0D1B5D199D2920A4BD2E0EFC6EF20598F79F2661343F9060297D1C704117D87A0DED328587FEA9941EE652F32063D
5,323,129 UART: [art] SIG.R = 390C92E868962A8DDAA058E3A93E22EED05BE762D3F93F81D4E66017524FC5776693E5396530AA2BADA8B2FAF23990B0
5,329,902 UART: [art] SIG.S = 06667F010CE1698C1455FC57575CA39DDC0677A6014BEF931E4B302CE37DD1B49AFE6361A81A9888740D62C0D7450736
5,354,088 UART: mbox::rt_entry...
5,354,460 UART: ____ _ _ _ ____ _____
5,355,244 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,356,044 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,356,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,357,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,358,348 UART: |_|
5,358,660 UART:
5,641,442 UART: [rt] Runtime listening for mailbox commands...
5,642,632 >>> mbox cmd response data (48 bytes)
5,642,633 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,642,741 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
891,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,230 UART: [kat] ++
895,382 UART: [kat] sha1
899,634 UART: [kat] SHA2-256
901,574 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,175 UART: [kat] LMS
1,169,487 UART: [kat] --
1,170,366 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,364 UART: [idev] ++
1,173,532 UART: [idev] CDI.KEYID = 6
1,173,893 UART: [idev] SUBJECT.KEYID = 7
1,174,318 UART: [idev] UDS.KEYID = 0
1,174,664 ready_for_fw is high
1,174,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,986 UART: [idev] Erasing UDS.KEYID = 0
1,198,900 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,859 UART: [ldev] Erasing FE.KEYID = 1
1,242,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,945 UART: [ldev] --
1,281,291 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,206 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,824 >>> mbox cmd response: success
2,771,897 UART: [afmc] ++
2,772,065 UART: [afmc] CDI.KEYID = 6
2,772,428 UART: [afmc] SUBJECT.KEYID = 7
2,772,854 UART: [afmc] AUTHORITY.KEYID = 5
2,808,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,642 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,371 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,254 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,973 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,772 UART: [afmc] --
2,851,800 UART: [cold-reset] --
2,852,798 UART: [state] Locking Datavault
2,854,095 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,699 UART: [state] Locking ICCM
2,855,335 UART: [exit] Launching FMC @ 0x40000130
2,860,664 UART:
2,860,680 UART: Running Caliptra FMC ...
2,861,088 UART:
2,861,231 UART: [state] CFI Enabled
2,871,976 UART: [fht] FMC Alias Private Key: 7
2,979,365 UART: [art] Extend RT PCRs Done
2,979,793 UART: [art] Lock RT PCRs Done
2,981,233 UART: [art] Populate DV Done
2,989,538 UART: [fht] FMC Alias Private Key: 7
2,990,616 UART: [art] Derive CDI
2,990,896 UART: [art] Store in in slot 0x4
3,076,809 UART: [art] Derive Key Pair
3,077,169 UART: [art] Store priv key in slot 0x5
3,089,757 UART: [art] Derive Key Pair - Done
3,104,222 UART: [art] Signing Cert with AUTHO
3,104,702 UART: RITY.KEYID = 7
3,119,928 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,693 UART: [art] PUB.X = 002685BB5E46658A66CF33B18C2BCB3D53CBD020F7B7B96F50A0F9F36AFC66DD065C2946D45FBD9EEAFCC44AAAC57F74
3,127,462 UART: [art] PUB.Y = CDBAFDAC6DF60CBC10DBBEA8271B9C136B767AAEB3838288D06D7E70538AA99FAA3CA937141F8A3A43C3563A790C6431
3,134,426 UART: [art] SIG.R = 5343D558DC23F3411013CC232486586069749354F636C2AE8FF7F728BD38ECBC37AD1CA3EAFF3D180ED961463A1E2E60
3,141,197 UART: [art] SIG.S = 089A43DB32A4FC28F2E19211F256F0C2460A93E61987122BEF407235E46A6946B043978347A17F0376834EA906C1F903
3,164,823 UART: Caliptra RT
3,165,168 UART: [state] CFI Enabled
3,274,279 UART: [rt] RT listening for mailbox commands...
3,274,949 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,941 UART:
3,275,957 UART: Running Caliptra ROM ...
3,276,365 UART:
3,276,507 UART: [state] CFI Enabled
3,279,539 UART: [state] LifecycleState = Unprovisioned
3,280,194 UART: [state] DebugLocked = No
3,280,840 UART: [state] WD Timer not started. Device not locked for debugging
3,282,182 UART: [kat] SHA2-256
4,085,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,861 UART: [kat] ++
4,090,013 UART: [kat] sha1
4,094,179 UART: [kat] SHA2-256
4,096,119 UART: [kat] SHA2-384
4,098,960 UART: [kat] SHA2-512-ACC
4,100,860 UART: [kat] ECC-384
4,110,709 UART: [kat] HMAC-384Kdf
4,115,097 UART: [kat] LMS
4,363,409 UART: [kat] --
4,364,141 UART: [update-reset] ++
5,267,312 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,268,503 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,364,627 >>> mbox cmd response: success
5,364,627 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,364,856 UART: [update-reset] Copying MAN_2 To MAN_1
5,372,870 UART: [update-reset Success] --
5,373,861 UART: [state] Locking Datavault
5,374,561 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,165 UART: [state] Locking ICCM
5,375,789 UART: [exit] Launching FMC @ 0x40000130
5,381,118 UART:
5,381,134 UART: Running Caliptra FMC ...
5,381,542 UART:
5,381,685 UART: [state] CFI Enabled
5,470,742 UART: [art] Extend RT PCRs Done
5,471,170 UART: [art] Lock RT PCRs Done
5,472,731 UART: [art] Populate DV Done
5,480,846 UART: [fht] FMC Alias Private Key: 7
5,481,824 UART: [art] Derive CDI
5,482,104 UART: [art] Store in in slot 0x4
5,568,361 UART: [art] Derive Key Pair
5,568,721 UART: [art] Store priv key in slot 0x5
5,581,695 UART: [art] Derive Key Pair - Done
5,596,142 UART: [art] Signing Cert with AUTHO
5,596,622 UART: RITY.KEYID = 7
5,611,702 UART: [art] Erasing AUTHORITY.KEYID = 7
5,612,467 UART: [art] PUB.X = F4A1120643285479DDABCF0787AAE6C746E650651062F32EB6ACC0389030E8CD7BEBDF4C3531D80318A9A6105A8C5661
5,619,232 UART: [art] PUB.Y = DB2D76D86040914D34CB44949B84B14EA3EA7EFB36E6D3738EBF93B1A0DE550939A3426228D7F1C3C5070349311DD7A5
5,626,177 UART: [art] SIG.R = 3F35E5A2372573A6958C4FA157D93303FE30ED88C173F5F683735B0F4439F61931A5CF3DAAFD5DC06A6F196AD7A6C739
5,632,947 UART: [art] SIG.S = 40F9C105722A4FF4D8D737D413F17469DE79F6F174B3972211C636B8D81419C69AA2BAD3739F1CA396DAF1BFDD7014BD
5,656,305 UART: mbox::rt_entry...
5,656,677 UART: ____ _ _ _ ____ _____
5,657,461 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,658,261 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,659,029 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,659,797 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,660,565 UART: |_|
5,660,877 UART:
5,940,015 UART: [rt] Runtime listening for mailbox commands...
5,941,205 >>> mbox cmd response data (48 bytes)
5,941,206 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,941,314 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,615 ready_for_fw is high
1,055,615 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,368 >>> mbox cmd response: success
2,682,862 UART:
2,682,878 UART: Running Caliptra FMC ...
2,683,286 UART:
2,683,429 UART: [state] CFI Enabled
2,694,108 UART: [fht] FMC Alias Private Key: 7
2,801,899 UART: [art] Extend RT PCRs Done
2,802,327 UART: [art] Lock RT PCRs Done
2,803,721 UART: [art] Populate DV Done
2,811,908 UART: [fht] FMC Alias Private Key: 7
2,812,892 UART: [art] Derive CDI
2,813,172 UART: [art] Store in in slot 0x4
2,898,937 UART: [art] Derive Key Pair
2,899,297 UART: [art] Store priv key in slot 0x5
2,912,841 UART: [art] Derive Key Pair - Done
2,927,854 UART: [art] Signing Cert with AUTHO
2,928,334 UART: RITY.KEYID = 7
2,943,826 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,591 UART: [art] PUB.X = F41AAEB6A0C5AB2CE08F815FFA14864C8B77BDFF56BDC78979C0CA0CE1B8220F3D3B5E74504660CF7466741384C52A94
2,951,369 UART: [art] PUB.Y = 798452EA1C7ECB89C33BE8CB865FA9EB46504D6ED996249132B5FD6C94C586305CCD8EF243797C4303DDCCA64031F962
2,958,324 UART: [art] SIG.R = 297BE426F68838FB009306886094A1322C3AC8026D750B88938202F0E3FEC8A26EDC9C3C45F902FAC35124CC04959DC9
2,965,052 UART: [art] SIG.S = 19C24DAADD0124FD122E4E53A62CBB23F43F33A50842D05D8617CC48C6538F1DAA3FD4467CD0BF95D50D1527D5DFE7CB
2,988,832 UART: Caliptra RT
2,989,177 UART: [state] CFI Enabled
3,097,468 UART: [rt] RT listening for mailbox commands...
3,098,138 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,068,803 >>> mbox cmd response: success
5,068,803 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,082,181 UART:
5,082,197 UART: Running Caliptra FMC ...
5,082,605 UART:
5,082,748 UART: [state] CFI Enabled
5,171,655 UART: [art] Extend RT PCRs Done
5,172,083 UART: [art] Lock RT PCRs Done
5,173,116 UART: [art] Populate DV Done
5,181,511 UART: [fht] FMC Alias Private Key: 7
5,182,445 UART: [art] Derive CDI
5,182,725 UART: [art] Store in in slot 0x4
5,268,140 UART: [art] Derive Key Pair
5,268,500 UART: [art] Store priv key in slot 0x5
5,281,744 UART: [art] Derive Key Pair - Done
5,296,559 UART: [art] Signing Cert with AUTHO
5,297,039 UART: RITY.KEYID = 7
5,312,231 UART: [art] Erasing AUTHORITY.KEYID = 7
5,312,996 UART: [art] PUB.X = 0E25C81EC2EC147189F99BC63592F6A0CAB15DA5A0D77FFEFADFFBAFECAED62BBC13D6553FD76035CCB93CE21E2FCFA3
5,319,801 UART: [art] PUB.Y = C497C62259EDAD5E505E1F996AF72E65CA7AA76DD5D479445673DADC9A6FF157C5D05214F9DE1A5DC45A11F55784A331
5,326,763 UART: [art] SIG.R = 26EA15163A5330D9A2572581191714BE0108E8CBD4F50D2805CD119A9B1DD23F1E02F1010226E7CAD7CA0A35EC11A6A9
5,333,513 UART: [art] SIG.S = 38D95749CF9B38884946041C4874944B2FE7768DA8501A7A6900158A457D5892E56727F552A8507B50F8CAD67B607866
5,357,619 UART: mbox::rt_entry...
5,357,991 UART: ____ _ _ _ ____ _____
5,358,775 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,359,575 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,360,343 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,361,111 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,361,879 UART: |_|
5,362,191 UART:
5,640,749 UART: [rt] Runtime listening for mailbox commands...
5,641,939 >>> mbox cmd response data (48 bytes)
5,641,940 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,642,048 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,102 UART:
192,462 UART: Running Caliptra ROM ...
193,664 UART:
193,817 UART: [state] CFI Enabled
264,950 UART: [state] LifecycleState = Unprovisioned
266,884 UART: [state] DebugLocked = No
269,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,629 UART: [kat] SHA2-256
444,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,898 UART: [kat] ++
455,423 UART: [kat] sha1
466,229 UART: [kat] SHA2-256
468,875 UART: [kat] SHA2-384
475,713 UART: [kat] SHA2-512-ACC
478,071 UART: [kat] ECC-384
2,770,064 UART: [kat] HMAC-384Kdf
2,801,695 UART: [kat] LMS
3,991,997 UART: [kat] --
3,996,467 UART: [cold-reset] ++
3,998,754 UART: [fht] Storing FHT @ 0x50003400
4,010,580 UART: [idev] ++
4,011,151 UART: [idev] CDI.KEYID = 6
4,012,180 UART: [idev] SUBJECT.KEYID = 7
4,013,348 UART: [idev] UDS.KEYID = 0
4,014,381 ready_for_fw is high
4,014,579 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,770 UART: [idev] Erasing UDS.KEYID = 0
7,349,818 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,912 UART: [idev] --
7,377,391 UART: [ldev] ++
7,377,960 UART: [ldev] CDI.KEYID = 6
7,378,922 UART: [ldev] SUBJECT.KEYID = 5
7,380,123 UART: [ldev] AUTHORITY.KEYID = 7
7,381,396 UART: [ldev] FE.KEYID = 1
7,424,129 UART: [ldev] Erasing FE.KEYID = 1
10,760,958 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,932 UART: [ldev] --
13,138,327 UART: [fwproc] Waiting for Commands...
13,141,495 UART: [fwproc] Received command 0x46574c44
13,143,668 UART: [fwproc] Received Image of size 113844 bytes
17,195,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,994 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,656,604 >>> mbox cmd response: success
17,660,540 UART: [afmc] ++
17,661,139 UART: [afmc] CDI.KEYID = 6
17,662,063 UART: [afmc] SUBJECT.KEYID = 7
17,663,279 UART: [afmc] AUTHORITY.KEYID = 5
21,031,756 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,733 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,347,136 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,362,010 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,448 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,642 UART: [afmc] --
23,399,782 UART: [cold-reset] --
23,403,642 UART: [state] Locking Datavault
23,407,103 UART: [state] Locking PCR0, PCR1 and PCR31
23,408,863 UART: [state] Locking ICCM
23,411,168 UART: [exit] Launching FMC @ 0x40000130
23,419,565 UART:
23,419,796 UART: Running Caliptra FMC ...
23,420,909 UART:
23,421,065 UART: [state] CFI Enabled
23,491,060 UART: [fht] FMC Alias Private Key: 7
25,829,277 UART: [art] Extend RT PCRs Done
25,830,496 UART: [art] Lock RT PCRs Done
25,832,278 UART: [art] Populate DV Done
25,837,633 UART: [fht] FMC Alias Private Key: 7
25,839,111 UART: [art] Derive CDI
25,839,866 UART: [art] Store in in slot 0x4
25,899,342 UART: [art] Derive Key Pair
25,900,372 UART: [art] Store priv key in slot 0x5
29,193,368 UART: [art] Derive Key Pair - Done
29,206,231 UART: [art] Signing Cert with AUTHO
29,207,528 UART: RITY.KEYID = 7
31,494,466 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,965 UART: [art] PUB.X = 3140A06CA6D52E4B7CBC50F1F096B850A8D516FB7C0148CE0F1B85E290094560ABC8ACA4A6BB048EE0BC04D19012CC97
31,503,257 UART: [art] PUB.Y = 57F98587E917706A05D9CCCFF92CF7AB9326F84FDAE0EDECBED65F8A6227282F9FC3DCF1E301C348CB2B672161A0CECE
31,510,511 UART: [art] SIG.R = C093D531744782247BC712F62E5FC32D92F5B373ABE818D4F5D8113054765080697E36FBCB422D57642ADC65C3954738
31,517,866 UART: [art] SIG.S = 6CE59FE012A640B286A65C38FEE6C3A30BC9B0A1E0D2DB8DD436FA7B097F71146FDAB942C1EF95B68382EE99A8211F12
32,822,953 UART: Caliptra RT
32,823,652 UART: [state] CFI Enabled
32,985,711 UART: [rt] RT listening for mailbox commands...
32,988,107 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,018,708 UART: [rt]cmd =0x54514754, len=24
33,021,177 >>> mbox cmd response data (8 bytes)
35,071,240 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,171,938 UART:
35,172,316 UART: Running Caliptra ROM ...
35,173,376 UART:
35,173,533 UART: [state] CFI Enabled
35,248,919 UART: [state] LifecycleState = Unprovisioned
35,250,917 UART: [state] DebugLocked = No
35,252,763 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,257,508 UART: [kat] SHA2-256
35,427,220 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,437,712 UART: [kat] ++
35,438,175 UART: [kat] sha1
35,448,362 UART: [kat] SHA2-256
35,451,050 UART: [kat] SHA2-384
35,457,683 UART: [kat] SHA2-512-ACC
35,460,026 UART: [kat] ECC-384
37,754,355 UART: [kat] HMAC-384Kdf
37,786,301 UART: [kat] LMS
38,976,590 UART: [kat] --
38,982,486 UART: [update-reset] ++
42,681,532 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,685,841 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,943,723 >>> mbox cmd response: success
42,944,107 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,945,638 UART: [update-reset] Copying MAN_2 To MAN_1
42,968,076 UART: [update-reset Success] --
42,971,442 UART: [state] Locking Datavault
42,973,606 UART: [state] Locking PCR0, PCR1 and PCR31
42,975,352 UART: [state] Locking ICCM
42,977,447 UART: [exit] Launching FMC @ 0x40000130
42,985,888 UART:
42,986,114 UART: Running Caliptra FMC ...
42,987,206 UART:
42,987,354 UART: [state] CFI Enabled
43,086,327 UART: [art] Extend RT PCRs Done
43,087,541 UART: [art] Lock RT PCRs Done
43,088,943 UART: [art] Populate DV Done
43,094,292 UART: [fht] FMC Alias Private Key: 7
43,096,033 UART: [art] Derive CDI
43,096,844 UART: [art] Store in in slot 0x4
43,155,044 UART: [art] Derive Key Pair
43,156,074 UART: [art] Store priv key in slot 0x5
46,448,770 UART: [art] Derive Key Pair - Done
46,461,616 UART: [art] Signing Cert with AUTHO
46,462,922 UART: RITY.KEYID = 7
48,749,696 UART: [art] Erasing AUTHORITY.KEYID = 7
48,751,212 UART: [art] PUB.X = AFCC7F5DECB1A3B839FCE695970FA3A0A0C49F54A28E32C852B2DFB34AF1C8E6DC0D21BD42E39A02092DE333BC4A2A00
48,758,490 UART: [art] PUB.Y = AC2C5AAD63F911D98DBFAD762F09328F16AA9539C7C3AB5A31D063FF1BB4E2B7FF5C903A5379E267D4291A30290D14FE
48,765,764 UART: [art] SIG.R = A7998E0641CA752526890BB9F498613C7772562E752C5535CEDBE8F1EE3FC0DD45DCFF300C53CE1C86685975C8E8A4C7
48,773,146 UART: [art] SIG.S = 123A384376442F0A32C3D5A617A01B66EDC71E6742902CBACD05A0F5751141C31786650006203326B2379158AB1A145E
50,078,077 UART: mbox::rt_entry...
50,079,069 UART: ____ _ _ _ ____ _____
50,081,049 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,083,063 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,084,914 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,086,833 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,088,712 UART: |_|
50,089,589 UART:
50,378,737 UART: [rt] Runtime listening for mailbox commands...
50,380,851 >>> mbox cmd response data (120 bytes)
52,426,878 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,526,717 UART:
52,527,071 UART: Running Caliptra ROM ...
52,528,183 UART:
52,528,343 UART: [state] CFI Enabled
52,590,176 UART: [state] LifecycleState = Unprovisioned
52,592,211 UART: [state] DebugLocked = No
52,594,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,599,991 UART: [kat] SHA2-256
52,769,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,780,227 UART: [kat] ++
52,780,704 UART: [kat] sha1
52,791,315 UART: [kat] SHA2-256
52,794,001 UART: [kat] SHA2-384
52,798,905 UART: [kat] SHA2-512-ACC
52,801,301 UART: [kat] ECC-384
55,088,826 UART: [kat] HMAC-384Kdf
55,101,919 UART: [kat] LMS
56,292,247 UART: [kat] --
56,298,116 UART: [update-reset] ++
60,000,293 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,004,296 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
60,262,131 >>> mbox cmd response: success
60,262,528 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,262,823 UART: [update-reset] Copying MAN_2 To MAN_1
60,285,042 UART: [update-reset Success] --
60,289,974 UART: [state] Locking Datavault
60,292,687 UART: [state] Locking PCR0, PCR1 and PCR31
60,294,448 UART: [state] Locking ICCM
60,295,778 UART: [exit] Launching FMC @ 0x40000130
60,304,221 UART:
60,304,449 UART: Running Caliptra FMC ...
60,305,542 UART:
60,305,695 UART: [state] CFI Enabled
60,403,872 UART: [art] Extend RT PCRs Done
60,405,069 UART: [art] Lock RT PCRs Done
60,406,256 UART: [art] Populate DV Done
60,411,824 UART: [fht] FMC Alias Private Key: 7
60,413,516 UART: [art] Derive CDI
60,414,320 UART: [art] Store in in slot 0x4
60,472,850 UART: [art] Derive Key Pair
60,473,886 UART: [art] Store priv key in slot 0x5
63,766,568 UART: [art] Derive Key Pair - Done
63,779,671 UART: [art] Signing Cert with AUTHO
63,780,971 UART: RITY.KEYID = 7
66,067,849 UART: [art] Erasing AUTHORITY.KEYID = 7
66,069,370 UART: [art] PUB.X = 2FC3240298BA298EEEDDE57AC42453148D867CE930656D70A3D0E74C06DAD73814918DEBD96B19DF7D63B606558EE22E
66,076,612 UART: [art] PUB.Y = 65E97DE0EF24518C7C13478D2EA2CF4BD26E0C3D7771AC42E4CA7ADE1B6DFFF948FC3A7D91E18038669D889E64F5E4C7
66,083,877 UART: [art] SIG.R = F7422F5DFB15F4DC8E167DDE4257FE055D6892CDA3635C76B39075EF18C5B11AF40A137D334C12909C648EF5AE31CE9C
66,091,267 UART: [art] SIG.S = 07C2DA7060E05E6E7D94DD816F7681DF8A9F198FFC5751DFA014BC57CAB76369BB5356DBCBA0D55DFD4265ECCD00C98F
67,395,974 UART: mbox::rt_entry...
67,396,960 UART: ____ _ _ _ ____ _____
67,398,894 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,400,896 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,402,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,404,739 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,406,660 UART: |_|
67,407,642 UART:
67,693,931 UART: [rt] Runtime listening for mailbox commands...
67,696,048 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,782,688 ready_for_fw is high
3,783,171 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,857,147 >>> mbox cmd response: success
23,560,576 UART:
23,560,965 UART: Running Caliptra FMC ...
23,562,077 UART:
23,562,232 UART: [state] CFI Enabled
23,626,027 UART: [fht] FMC Alias Private Key: 7
25,964,464 UART: [art] Extend RT PCRs Done
25,965,682 UART: [art] Lock RT PCRs Done
25,967,514 UART: [art] Populate DV Done
25,972,920 UART: [fht] FMC Alias Private Key: 7
25,974,560 UART: [art] Derive CDI
25,975,365 UART: [art] Store in in slot 0x4
26,034,542 UART: [art] Derive Key Pair
26,035,611 UART: [art] Store priv key in slot 0x5
29,330,943 UART: [art] Derive Key Pair - Done
29,343,949 UART: [art] Signing Cert with AUTHO
29,345,264 UART: RITY.KEYID = 7
31,631,810 UART: [art] Erasing AUTHORITY.KEYID = 7
31,633,319 UART: [art] PUB.X = 5FA8B28CCF86FF71246A0FC6BA21E2661684758B3EF41A5C488DDF51B6D9DA8038CD389EA26DE2D26FD3D1DB3DF90F03
31,640,592 UART: [art] PUB.Y = AE3D40E6ED85EE7036F179281FED36231E10142AF03B4087F8532E2EA317CAC33EF2332D954BB7068086D7EA61418328
31,647,806 UART: [art] SIG.R = 3B533845E799A9394F004A4AC2188AECBAE972C04A7772A0B3AEA3E3A8F7954FE58DD745F518219717865C7C1D9E2F9B
31,655,216 UART: [art] SIG.S = 74AA55F7F9AA37ED8C58965CC2998D86972D12ABF3741D0F3786109F6813C4AB5278A893CC7F557469A31F8397B700F4
32,960,267 UART: Caliptra RT
32,960,976 UART: [state] CFI Enabled
33,141,360 UART: [rt] RT listening for mailbox commands...
33,143,722 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,174,106 UART: [rt]cmd =0x54514754, len=24
33,176,982 >>> mbox cmd response data (8 bytes)
35,230,909 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,207,206 >>> mbox cmd response: success
43,207,704 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,242,394 UART:
43,242,690 UART: Running Caliptra FMC ...
43,243,797 UART:
43,243,947 UART: [state] CFI Enabled
43,347,288 UART: [art] Extend RT PCRs Done
43,348,472 UART: [art] Lock RT PCRs Done
43,349,879 UART: [art] Populate DV Done
43,355,296 UART: [fht] FMC Alias Private Key: 7
43,356,891 UART: [art] Derive CDI
43,357,625 UART: [art] Store in in slot 0x4
43,416,639 UART: [art] Derive Key Pair
43,417,676 UART: [art] Store priv key in slot 0x5
46,709,887 UART: [art] Derive Key Pair - Done
46,722,975 UART: [art] Signing Cert with AUTHO
46,724,268 UART: RITY.KEYID = 7
49,011,909 UART: [art] Erasing AUTHORITY.KEYID = 7
49,013,416 UART: [art] PUB.X = 187E47DDC58B5842167745E4EFAEF9EB2BB81FDDD361CDC1BDC99DBA697C5D3C41C0C6ACCE6944D5616A2394BEDB9539
49,020,691 UART: [art] PUB.Y = 32A3FE3A8BBE16F860E650B2BBD5FF1912885628AD8B18E13DAD6133A9CF827C261B1B10D7E57216CAC52EA048DF77F8
49,027,942 UART: [art] SIG.R = 4DBD0FBE0D164C4071A268F10CC389949F0D0670019AA74C7D3DA2672DA5B9E1EE2260C5D8E1F499D44EA7B56F731D82
49,035,336 UART: [art] SIG.S = B747925EE39A060CE5AB7D7144C5A7BCEDFB70CC2E627B2541FC2F9AC950A345BE61AED26549364E142240D9D9AA2BC1
50,339,600 UART: mbox::rt_entry...
50,340,550 UART: ____ _ _ _ ____ _____
50,342,528 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,344,522 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,346,367 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,348,281 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,350,127 UART: |_|
50,350,947 UART:
50,635,693 UART: [rt] Runtime listening for mailbox commands...
50,637,862 >>> mbox cmd response data (120 bytes)
52,684,886 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
60,650,249 >>> mbox cmd response: success
60,650,797 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,684,642 UART:
60,684,933 UART: Running Caliptra FMC ...
60,686,045 UART:
60,686,202 UART: [state] CFI Enabled
60,775,278 UART: [art] Extend RT PCRs Done
60,776,465 UART: [art] Lock RT PCRs Done
60,777,811 UART: [art] Populate DV Done
60,783,429 UART: [fht] FMC Alias Private Key: 7
60,785,148 UART: [art] Derive CDI
60,785,956 UART: [art] Store in in slot 0x4
60,844,697 UART: [art] Derive Key Pair
60,845,736 UART: [art] Store priv key in slot 0x5
64,138,106 UART: [art] Derive Key Pair - Done
64,151,645 UART: [art] Signing Cert with AUTHO
64,152,938 UART: RITY.KEYID = 7
66,439,845 UART: [art] Erasing AUTHORITY.KEYID = 7
66,441,355 UART: [art] PUB.X = 4353F960E37944311853375C704FD4D66D12E941007D2D3AE4573CCAE0BA41DDF79D0169C4D81C056B33E8658CC0622C
66,448,564 UART: [art] PUB.Y = 98D1A571BB72AE2B3705E114EA94B23B027167E9F819F5E9DC1958D5138B56EAA615F28D2F172734E7C5A16383DE04F3
66,455,844 UART: [art] SIG.R = 1F29C3A00A9AD703CA5124C4842E6F6CB65B8901E049C7AE04B34E7B3E6C990EB9391AD730EC447BCCB104E7C7BD0F1F
66,463,227 UART: [art] SIG.S = BC71A833D0BD9DA4D5A27D53E15777488D32AA50768BDEDF653FDA88D61FBE406DEE15D865BBEDB93A8F9F5949435B40
67,768,090 UART: mbox::rt_entry...
67,769,060 UART: ____ _ _ _ ____ _____
67,770,991 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,772,990 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,774,857 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,776,777 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,778,653 UART: |_|
67,779,526 UART:
68,064,016 UART: [rt] Runtime listening for mailbox commands...
68,066,135 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,461 UART:
192,831 UART: Running Caliptra ROM ...
193,965 UART:
603,798 UART: [state] CFI Enabled
620,940 UART: [state] LifecycleState = Unprovisioned
622,881 UART: [state] DebugLocked = No
625,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,758 UART: [kat] SHA2-256
800,508 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,025 UART: [kat] ++
811,536 UART: [kat] sha1
822,010 UART: [kat] SHA2-256
824,749 UART: [kat] SHA2-384
829,490 UART: [kat] SHA2-512-ACC
831,902 UART: [kat] ECC-384
3,117,562 UART: [kat] HMAC-384Kdf
3,129,238 UART: [kat] LMS
4,319,348 UART: [kat] --
4,324,651 UART: [cold-reset] ++
4,326,304 UART: [fht] Storing FHT @ 0x50003400
4,337,639 UART: [idev] ++
4,338,216 UART: [idev] CDI.KEYID = 6
4,339,284 UART: [idev] SUBJECT.KEYID = 7
4,340,388 UART: [idev] UDS.KEYID = 0
4,341,432 ready_for_fw is high
4,341,641 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,626 UART: [idev] Erasing UDS.KEYID = 0
7,628,853 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,802 UART: [idev] --
7,653,962 UART: [ldev] ++
7,654,584 UART: [ldev] CDI.KEYID = 6
7,655,467 UART: [ldev] SUBJECT.KEYID = 5
7,656,733 UART: [ldev] AUTHORITY.KEYID = 7
7,657,966 UART: [ldev] FE.KEYID = 1
7,669,587 UART: [ldev] Erasing FE.KEYID = 1
10,959,399 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,112 UART: [ldev] --
13,319,303 UART: [fwproc] Waiting for Commands...
13,321,312 UART: [fwproc] Received command 0x46574c44
13,323,504 UART: [fwproc] Received Image of size 113844 bytes
17,376,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,843,094 >>> mbox cmd response: success
17,847,850 UART: [afmc] ++
17,848,445 UART: [afmc] CDI.KEYID = 6
17,849,355 UART: [afmc] SUBJECT.KEYID = 7
17,850,626 UART: [afmc] AUTHORITY.KEYID = 5
21,167,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,837 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,464,090 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,530 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,493,307 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,742 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,529,442 UART: [afmc] --
23,532,774 UART: [cold-reset] --
23,536,699 UART: [state] Locking Datavault
23,540,540 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,293 UART: [state] Locking ICCM
23,544,138 UART: [exit] Launching FMC @ 0x40000130
23,552,506 UART:
23,552,786 UART: Running Caliptra FMC ...
23,553,894 UART:
23,554,072 UART: [state] CFI Enabled
23,561,789 UART: [fht] FMC Alias Private Key: 7
25,893,023 UART: [art] Extend RT PCRs Done
25,894,247 UART: [art] Lock RT PCRs Done
25,895,923 UART: [art] Populate DV Done
25,901,231 UART: [fht] FMC Alias Private Key: 7
25,902,986 UART: [art] Derive CDI
25,903,831 UART: [art] Store in in slot 0x4
25,946,378 UART: [art] Derive Key Pair
25,947,578 UART: [art] Store priv key in slot 0x5
29,189,240 UART: [art] Derive Key Pair - Done
29,202,350 UART: [art] Signing Cert with AUTHO
29,203,681 UART: RITY.KEYID = 7
31,483,380 UART: [art] Erasing AUTHORITY.KEYID = 7
31,484,882 UART: [art] PUB.X = 4422B3233D2496E8E5E6FA94F5698438331B6AEEAA2FE5564A53CA8F39E1BF1B443252FFF1AE5755A43F3151CD18A45C
31,492,138 UART: [art] PUB.Y = 0CFF3C6C419176DA566BB79875A9E43B43B99666597ECD6809DA0E14D0BE1B2178835C4B6C9C700FE98E4FE43F7CC71F
31,499,389 UART: [art] SIG.R = 14182FCCBCB6B7F11811D2F42007DEE56FD1215555E85FB3C9D39E397A65672204D271268FF67D3813C65C4CEDEAA0DB
31,506,740 UART: [art] SIG.S = 26BBE333270BB80C8AF61F492ADC9469E6240E83D2B700611168D78AA004A15DD1CAC9DE751CE2ABA17420CE62979403
32,812,386 UART: Caliptra RT
32,813,094 UART: [state] CFI Enabled
32,930,458 UART: [rt] RT listening for mailbox commands...
32,932,727 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
32,963,130 UART: [rt]cmd =0x54514754, len=24
32,965,582 >>> mbox cmd response data (8 bytes)
35,085,300 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
35,185,736 UART:
35,186,103 UART: Running Caliptra ROM ...
35,187,234 UART:
35,187,403 UART: [state] CFI Enabled
35,205,616 UART: [state] LifecycleState = Unprovisioned
35,207,503 UART: [state] DebugLocked = No
35,209,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,215,337 UART: [kat] SHA2-256
35,385,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,395,577 UART: [kat] ++
35,396,056 UART: [kat] sha1
35,407,266 UART: [kat] SHA2-256
35,409,952 UART: [kat] SHA2-384
35,416,641 UART: [kat] SHA2-512-ACC
35,418,993 UART: [kat] ECC-384
37,703,773 UART: [kat] HMAC-384Kdf
37,714,653 UART: [kat] LMS
38,904,751 UART: [kat] --
38,910,788 UART: [update-reset] ++
42,624,456 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,628,715 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
42,886,598 >>> mbox cmd response: success
42,886,999 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,887,993 UART: [update-reset] Copying MAN_2 To MAN_1
42,910,438 UART: [update-reset Success] --
42,915,418 UART: [state] Locking Datavault
42,919,130 UART: [state] Locking PCR0, PCR1 and PCR31
42,920,887 UART: [state] Locking ICCM
42,922,463 UART: [exit] Launching FMC @ 0x40000130
42,930,867 UART:
42,931,103 UART: Running Caliptra FMC ...
42,932,201 UART:
42,932,359 UART: [state] CFI Enabled
42,976,804 UART: [art] Extend RT PCRs Done
42,977,948 UART: [art] Lock RT PCRs Done
42,979,395 UART: [art] Populate DV Done
42,984,645 UART: [fht] FMC Alias Private Key: 7
42,986,232 UART: [art] Derive CDI
42,987,316 UART: [art] Store in in slot 0x4
43,030,144 UART: [art] Derive Key Pair
43,031,172 UART: [art] Store priv key in slot 0x5
46,273,490 UART: [art] Derive Key Pair - Done
46,286,410 UART: [art] Signing Cert with AUTHO
46,287,713 UART: RITY.KEYID = 7
48,567,448 UART: [art] Erasing AUTHORITY.KEYID = 7
48,568,989 UART: [art] PUB.X = 0161B4A3E4C6813A393865E6C821EAB1E72028B9400E469FB3695082D1D76595618592C0E5EBEB140E103ADD0D364681
48,576,195 UART: [art] PUB.Y = 313F383446D516C736C004AE4BEFC4C427EEC48BC271B302FB4E1821CCD8408F92109DB29778FC807C3741D531E82E8E
48,583,439 UART: [art] SIG.R = CBB89E80FAA1785B10E56C6D690B40DE8DF0F673580D3EE5E14AE5514601944C162C82BC294C7FF12741FB826921B155
48,590,830 UART: [art] SIG.S = 2A034171F13CF070086E24149037C703DB0123AA51E44796B55875D1B01B093F7F89C0E479D719CFB0EDC9A229C9B0D0
49,895,692 UART: mbox::rt_entry...
49,896,647 UART: ____ _ _ _ ____ _____
49,898,634 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,900,642 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,902,619 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,904,555 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,906,411 UART: |_|
49,907,217 UART:
50,193,876 UART: [rt] Runtime listening for mailbox commands...
50,196,008 >>> mbox cmd response data (120 bytes)
52,313,285 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
52,413,032 UART:
52,413,412 UART: Running Caliptra ROM ...
52,414,496 UART:
52,414,662 UART: [state] CFI Enabled
52,430,838 UART: [state] LifecycleState = Unprovisioned
52,432,766 UART: [state] DebugLocked = No
52,435,234 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,439,967 UART: [kat] SHA2-256
52,609,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,620,210 UART: [kat] ++
52,620,730 UART: [kat] sha1
52,632,269 UART: [kat] SHA2-256
52,634,963 UART: [kat] SHA2-384
52,641,920 UART: [kat] SHA2-512-ACC
52,644,321 UART: [kat] ECC-384
54,929,172 UART: [kat] HMAC-384Kdf
54,940,317 UART: [kat] LMS
56,130,364 UART: [kat] --
56,136,165 UART: [update-reset] ++
59,837,464 UART: [update-reset] Image verified using Vendor ECC Key Index 0
59,841,934 UART: [update-reset] Loading Runtime at address 0x40005000 len 53872
60,099,822 >>> mbox cmd response: success
60,100,208 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,100,491 UART: [update-reset] Copying MAN_2 To MAN_1
60,122,705 UART: [update-reset Success] --
60,125,791 UART: [state] Locking Datavault
60,128,744 UART: [state] Locking PCR0, PCR1 and PCR31
60,130,499 UART: [state] Locking ICCM
60,131,921 UART: [exit] Launching FMC @ 0x40000130
60,140,363 UART:
60,140,598 UART: Running Caliptra FMC ...
60,141,697 UART:
60,141,856 UART: [state] CFI Enabled
60,186,182 UART: [art] Extend RT PCRs Done
60,187,550 UART: [art] Lock RT PCRs Done
60,188,963 UART: [art] Populate DV Done
60,194,255 UART: [fht] FMC Alias Private Key: 7
60,195,755 UART: [art] Derive CDI
60,196,514 UART: [art] Store in in slot 0x4
60,239,232 UART: [art] Derive Key Pair
60,240,234 UART: [art] Store priv key in slot 0x5
63,482,504 UART: [art] Derive Key Pair - Done
63,495,473 UART: [art] Signing Cert with AUTHO
63,496,781 UART: RITY.KEYID = 7
65,775,726 UART: [art] Erasing AUTHORITY.KEYID = 7
65,777,228 UART: [art] PUB.X = 36326F3B0E87E70ABBB8C1DE5FC3CFC15C82CA10EBC945A95ADB1721AF2F5B72254D0B875284FCB77630DB263A1AC346
65,784,487 UART: [art] PUB.Y = 327C1BD3A7E1692E551F03BF9438F2C1E6302D0216627C11D791B16C3DAA585B0E5359ECF50DC5DC072292D62EEE615A
65,791,757 UART: [art] SIG.R = 579955C01400420D374EC9F712798FCEF67056F9142B3ADCD4FB246F9730C01FE5054F7030BC13D0BA4BA85612DE5839
65,799,109 UART: [art] SIG.S = AF3C607FE1D1C83D81DF7F3AA7CBFEAC388B18D66FF8A484316FA9C5E9D40A02715C94E56AD26E5EA5A054F46C1C62DE
67,104,177 UART: mbox::rt_entry...
67,105,134 UART: ____ _ _ _ ____ _____
67,107,061 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,109,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,111,014 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,112,945 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,114,875 UART: |_|
67,115,687 UART:
67,400,925 UART: [rt] Runtime listening for mailbox commands...
67,403,065 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
4,125,505 ready_for_fw is high
4,126,011 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,064,638 >>> mbox cmd response: success
23,707,208 UART:
23,707,593 UART: Running Caliptra FMC ...
23,708,730 UART:
23,708,898 UART: [state] CFI Enabled
23,717,009 UART: [fht] FMC Alias Private Key: 7
26,047,767 UART: [art] Extend RT PCRs Done
26,049,012 UART: [art] Lock RT PCRs Done
26,050,700 UART: [art] Populate DV Done
26,056,007 UART: [fht] FMC Alias Private Key: 7
26,057,501 UART: [art] Derive CDI
26,058,334 UART: [art] Store in in slot 0x4
26,100,720 UART: [art] Derive Key Pair
26,101,759 UART: [art] Store priv key in slot 0x5
29,344,145 UART: [art] Derive Key Pair - Done
29,356,869 UART: [art] Signing Cert with AUTHO
29,358,172 UART: RITY.KEYID = 7
31,637,587 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,090 UART: [art] PUB.X = 8D8F8877B14E6A30E3B1ECE1D54AD3FFFA9F8D31C3DC285BF601FD562E1C1E905F2A64D48FE30041259B2329C2C58FCE
31,646,341 UART: [art] PUB.Y = 3E7ACEC36BF7BE1A9B5DF81AAD91445956CDCF266902A2339D1BE5AD594D8D0075E10695C7FD38E0E4FDE0663F405F71
31,653,596 UART: [art] SIG.R = 04AC3F87BBEA693DEC91A8FB8B8E93F8F4669A9B7987B91CDA3A5F4A2ADAAD367945E6D84A00736A31522250A4E10931
31,660,934 UART: [art] SIG.S = BE97F837F749E283739C3D50AC279F17A9DC3FD81CFCF4C417B322C4165DC93A0F81EFC659AE4B98CA4418EE1520A4AE
32,966,997 UART: Caliptra RT
32,967,724 UART: [state] CFI Enabled
33,085,493 UART: [rt] RT listening for mailbox commands...
33,087,815 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,118,425 UART: [rt]cmd =0x54514754, len=24
33,121,109 >>> mbox cmd response data (8 bytes)
35,246,870 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
43,134,142 >>> mbox cmd response: success
43,134,623 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,169,436 UART:
43,169,726 UART: Running Caliptra FMC ...
43,170,797 UART:
43,170,951 UART: [state] CFI Enabled
43,215,061 UART: [art] Extend RT PCRs Done
43,216,258 UART: [art] Lock RT PCRs Done
43,217,632 UART: [art] Populate DV Done
43,223,104 UART: [fht] FMC Alias Private Key: 7
43,224,763 UART: [art] Derive CDI
43,225,541 UART: [art] Store in in slot 0x4
43,267,648 UART: [art] Derive Key Pair
43,268,697 UART: [art] Store priv key in slot 0x5
46,510,894 UART: [art] Derive Key Pair - Done
46,523,993 UART: [art] Signing Cert with AUTHO
46,525,298 UART: RITY.KEYID = 7
48,804,607 UART: [art] Erasing AUTHORITY.KEYID = 7
48,806,112 UART: [art] PUB.X = C004F72B0E471BF9BBD2BB158163187ECB45E6D1216FB613B522FECF6382FC7B878539509F6623A3C3A2889097BAA0AA
48,813,372 UART: [art] PUB.Y = BA67A197892834B587FA6D950D0D58884E8649A5CDA33A88CB1D04A5AF10C3DDC0B4DF886F25346C12D17A8B2077E647
48,820,603 UART: [art] SIG.R = D80CF83AA3F490D8D766C8028C6FDB3D7DE00E06803E3EFEE75603C04357A23DA151E4A63226194CA2F1C90AA1217FE2
48,827,997 UART: [art] SIG.S = 0B8FFFEC065352C8E4635005C50CE9EE7499BAD56FA807D2EB3F99D43D3B757F144FC365DE4C5757CD102078FA136B10
50,132,756 UART: mbox::rt_entry...
50,133,707 UART: ____ _ _ _ ____ _____
50,135,686 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,137,691 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,139,622 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,141,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,143,675 UART: |_|
50,144,495 UART:
50,432,542 UART: [rt] Runtime listening for mailbox commands...
50,434,692 >>> mbox cmd response data (120 bytes)
52,550,388 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
60,437,890 >>> mbox cmd response: success
60,439,158 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,474,257 UART:
60,474,735 UART: Running Caliptra FMC ...
60,475,852 UART:
60,476,031 UART: [state] CFI Enabled
60,519,976 UART: [art] Extend RT PCRs Done
60,521,188 UART: [art] Lock RT PCRs Done
60,522,577 UART: [art] Populate DV Done
60,528,064 UART: [fht] FMC Alias Private Key: 7
60,529,837 UART: [art] Derive CDI
60,530,587 UART: [art] Store in in slot 0x4
60,573,505 UART: [art] Derive Key Pair
60,574,913 UART: [art] Store priv key in slot 0x5
63,816,758 UART: [art] Derive Key Pair - Done
63,829,865 UART: [art] Signing Cert with AUTHO
63,831,197 UART: RITY.KEYID = 7
66,110,551 UART: [art] Erasing AUTHORITY.KEYID = 7
66,112,066 UART: [art] PUB.X = 2D4B9EFF70FB8FB8CF528E0371724E35CE9252A6FCF893ADC5FEF861749F790E459CF1596B42EBB4D5DE7823C8C060FA
66,119,351 UART: [art] PUB.Y = ADDF2B3A812F0019221C8DE3409EC8F316BBD6929D69EE20798B0FE81E15FB3B6524BEAF6C2C975FCF94EC91FD8EDABD
66,126,651 UART: [art] SIG.R = 9F8677FCDC1BD9E67AE7FC204D06906972F6C2EBB00F9F4F9224A2493D549FA634BBF4320CC7E0B1537D1BEA24839CF4
66,134,047 UART: [art] SIG.S = 29EB8C0B6F80B4090E6331E142AEF347BDCF99A2D459A0FA54D4DD60FE873D256D14D1EC29FD9B0470FA5AE0BC814608
67,439,185 UART: mbox::rt_entry...
67,440,151 UART: ____ _ _ _ ____ _____
67,442,137 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,444,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,446,073 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,448,005 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,449,939 UART: |_|
67,450,779 UART:
67,737,168 UART: [rt] Runtime listening for mailbox commands...
67,739,286 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 3.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,087 UART:
192,475 UART: Running Caliptra ROM ...
193,619 UART:
193,768 UART: [state] CFI Enabled
263,211 UART: [state] LifecycleState = Unprovisioned
265,116 UART: [state] DebugLocked = No
267,856 UART: [state] WD Timer not started. Device not locked for debugging
272,253 UART: [kat] SHA2-256
451,368 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,948 UART: [kat] ++
463,490 UART: [kat] sha1
475,151 UART: [kat] SHA2-256
478,152 UART: [kat] SHA2-384
485,387 UART: [kat] SHA2-512-ACC
488,366 UART: [kat] ECC-384
2,947,924 UART: [kat] HMAC-384Kdf
2,972,180 UART: [kat] LMS
3,501,627 UART: [kat] --
3,504,765 UART: [cold-reset] ++
3,506,128 UART: [fht] FHT @ 0x50003400
3,518,244 UART: [idev] ++
3,518,817 UART: [idev] CDI.KEYID = 6
3,519,852 UART: [idev] SUBJECT.KEYID = 7
3,520,954 UART: [idev] UDS.KEYID = 0
3,521,881 ready_for_fw is high
3,522,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,686 UART: [idev] Erasing UDS.KEYID = 0
6,028,280 UART: [idev] Sha1 KeyId Algorithm
6,052,706 UART: [idev] --
6,057,033 UART: [ldev] ++
6,057,616 UART: [ldev] CDI.KEYID = 6
6,058,538 UART: [ldev] SUBJECT.KEYID = 5
6,059,698 UART: [ldev] AUTHORITY.KEYID = 7
6,060,989 UART: [ldev] FE.KEYID = 1
6,100,158 UART: [ldev] Erasing FE.KEYID = 1
8,603,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,712 UART: [ldev] --
10,414,930 UART: [fwproc] Wait for Commands...
10,416,546 UART: [fwproc] Recv command 0x46574c44
10,418,638 UART: [fwproc] Recv'd Img size: 114168 bytes
13,822,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,468 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,962,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,279,774 >>> mbox cmd response: success
14,284,186 UART: [afmc] ++
14,284,785 UART: [afmc] CDI.KEYID = 6
14,285,677 UART: [afmc] SUBJECT.KEYID = 7
14,286,786 UART: [afmc] AUTHORITY.KEYID = 5
16,828,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,898 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,543 UART: [afmc] --
18,629,514 UART: [cold-reset] --
18,632,511 UART: [state] Locking Datavault
18,638,466 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,120 UART: [state] Locking ICCM
18,642,220 UART: [exit] Launching FMC @ 0x40000130
18,650,598 UART:
18,650,865 UART: Running Caliptra FMC ...
18,651,972 UART:
18,652,133 UART: [state] CFI Enabled
18,708,757 UART: [fht] FMC Alias Private Key: 7
20,472,571 UART: [art] Extend RT PCRs Done
20,473,791 UART: [art] Lock RT PCRs Done
20,475,230 UART: [art] Populate DV Done
20,480,533 UART: [fht] FMC Alias Private Key: 7
20,482,193 UART: [art] Derive CDI
20,483,014 UART: [art] Store in in slot 0x4
20,540,757 UART: [art] Derive Key Pair
20,541,799 UART: [art] Store priv key in slot 0x5
23,004,296 UART: [art] Derive Key Pair - Done
23,016,921 UART: [art] Signing Cert with AUTHO
23,018,230 UART: RITY.KEYID = 7
24,729,389 UART: [art] Erasing AUTHORITY.KEYID = 7
24,730,893 UART: [art] PUB.X = 42E2961A059B183044D6D5494C64FBEFC8ED79E826F52434A51CFD97677C0B9E5CE41CF798E5EC72925B105AB7CA0680
24,738,142 UART: [art] PUB.Y = FF5728D4E248B0304417DC19CF835CC05F120CD8BBC0E1F8BA2898400A97AD438F6186B4FD0A3840A1BEFACF01F3D3F3
24,745,385 UART: [art] SIG.R = 342345CE2D08A366EDB4EF5F04646000EF141AAAF525E827B4F0B849375FA23083B468AF1A886442BD60DAE9FF327C92
24,752,794 UART: [art] SIG.S = F03BDAC0977482A0B7FF18DEA10AF96829BBDAD30A0EF7A825925DCAF3CF56B445EE78C8A6D5E62CBD7194E7F9E744B8
25,732,344 UART: Caliptra RT
25,733,055 UART: [state] CFI Enabled
25,897,451 UART: [rt] RT listening for mailbox commands...
25,899,855 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,930,437 UART: [rt]cmd =0x54514754, len=24
25,932,754 >>> mbox cmd response data (8 bytes)
27,993,088 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,093,716 UART:
28,094,090 UART: Running Caliptra ROM ...
28,095,145 UART:
28,095,300 UART: [state] CFI Enabled
28,157,559 UART: [state] LifecycleState = Unprovisioned
28,159,467 UART: [state] DebugLocked = No
28,162,322 UART: [state] WD Timer not started. Device not locked for debugging
28,166,007 UART: [kat] SHA2-256
28,345,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,356,702 UART: [kat] ++
28,357,250 UART: [kat] sha1
28,368,096 UART: [kat] SHA2-256
28,371,117 UART: [kat] SHA2-384
28,377,588 UART: [kat] SHA2-512-ACC
28,380,525 UART: [kat] ECC-384
30,844,961 UART: [kat] HMAC-384Kdf
30,869,040 UART: [kat] LMS
31,398,484 UART: [kat] --
31,402,484 UART: [update-reset] ++
34,397,424 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,400,860 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,658,489 >>> mbox cmd response: success
34,658,888 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,659,180 UART: [update-reset] Copying MAN_2 To MAN_1
34,681,042 UART: [update-reset Success] --
34,686,328 UART: [state] Locking Datavault
34,687,962 UART: [state] Locking PCR0, PCR1 and PCR31
34,689,606 UART: [state] Locking ICCM
34,691,855 UART: [exit] Launching FMC @ 0x40000130
34,700,313 UART:
34,700,548 UART: Running Caliptra FMC ...
34,701,582 UART:
34,701,730 UART: [state] CFI Enabled
34,803,763 UART: [art] Extend RT PCRs Done
34,805,205 UART: [art] Lock RT PCRs Done
34,806,427 UART: [art] Populate DV Done
34,811,948 UART: [fht] FMC Alias Private Key: 7
34,813,589 UART: [art] Derive CDI
34,814,328 UART: [art] Store in in slot 0x4
34,873,716 UART: [art] Derive Key Pair
34,874,716 UART: [art] Store priv key in slot 0x5
37,338,026 UART: [art] Derive Key Pair - Done
37,351,141 UART: [art] Signing Cert with AUTHO
37,352,451 UART: RITY.KEYID = 7
39,064,470 UART: [art] Erasing AUTHORITY.KEYID = 7
39,065,979 UART: [art] PUB.X = 5BC902EA2B8086A5567A7CA9B0D71A39698D37B65D088F95C85591F799E87C8BF27BF954F5C2CDEAC5CA1C282DA81613
39,073,256 UART: [art] PUB.Y = 1DE4C87C03979B7097CE16A2133A184A8261FE9E20A723C4A0D68912EE35CC877848F6C5BD6A1398546F6E09F41FC9C5
39,080,513 UART: [art] SIG.R = D5641149464F89A8C96E0BFFD6A7D3AFFD6E1DDB6E03D8DEBFF6C393FD61F820CDAB9ADEC7A20072F2A1A80137287DBD
39,087,878 UART: [art] SIG.S = A1C110DBF2741F4C84A278A5DFB1C815411DB1503C8E0BBA80470201335FC6E59F081951C9E53CCEADCBA3D43F7F26BC
40,065,737 UART: mbox::rt_entry...
40,066,703 UART: ____ _ _ _ ____ _____
40,068,693 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,070,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,072,653 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,074,596 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,076,458 UART: |_|
40,077,268 UART:
40,361,745 UART: [rt] Runtime listening for mailbox commands...
40,363,860 >>> mbox cmd response data (120 bytes)
42,418,306 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,517,932 UART:
42,518,276 UART: Running Caliptra ROM ...
42,519,346 UART:
42,519,501 UART: [state] CFI Enabled
42,585,704 UART: [state] LifecycleState = Unprovisioned
42,587,585 UART: [state] DebugLocked = No
42,589,709 UART: [state] WD Timer not started. Device not locked for debugging
42,593,835 UART: [kat] SHA2-256
42,772,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,784,563 UART: [kat] ++
42,785,021 UART: [kat] sha1
42,796,128 UART: [kat] SHA2-256
42,799,158 UART: [kat] SHA2-384
42,804,501 UART: [kat] SHA2-512-ACC
42,807,427 UART: [kat] ECC-384
45,268,048 UART: [kat] HMAC-384Kdf
45,290,220 UART: [kat] LMS
45,819,642 UART: [kat] --
45,824,926 UART: [update-reset] ++
48,818,962 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,821,753 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,079,380 >>> mbox cmd response: success
49,079,761 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,081,346 UART: [update-reset] Copying MAN_2 To MAN_1
49,103,636 UART: [update-reset Success] --
49,107,026 UART: [state] Locking Datavault
49,108,882 UART: [state] Locking PCR0, PCR1 and PCR31
49,110,529 UART: [state] Locking ICCM
49,111,575 UART: [exit] Launching FMC @ 0x40000130
49,119,975 UART:
49,120,206 UART: Running Caliptra FMC ...
49,121,308 UART:
49,121,467 UART: [state] CFI Enabled
49,227,460 UART: [art] Extend RT PCRs Done
49,228,683 UART: [art] Lock RT PCRs Done
49,230,152 UART: [art] Populate DV Done
49,235,779 UART: [fht] FMC Alias Private Key: 7
49,237,321 UART: [art] Derive CDI
49,238,138 UART: [art] Store in in slot 0x4
49,296,302 UART: [art] Derive Key Pair
49,297,340 UART: [art] Store priv key in slot 0x5
51,760,275 UART: [art] Derive Key Pair - Done
51,773,296 UART: [art] Signing Cert with AUTHO
51,774,625 UART: RITY.KEYID = 7
53,486,075 UART: [art] Erasing AUTHORITY.KEYID = 7
53,487,587 UART: [art] PUB.X = 9749AC25E555D77A56C71C36E5E34D3E1E28E381E673C3EE8F7AAF5F742C90CDB45B1A55D53F2F58772913B59727EC8C
53,494,863 UART: [art] PUB.Y = E29FAC8311ABE52BED39B2E694388D5D0DB625E1EC298EB50FD5224537484CEA25FE8D4422DE0EAB6DD6E7BD53E8C07A
53,502,114 UART: [art] SIG.R = 7CECD7727D755F61823E6BFC27601A5F12146A704E88681F425D89D325567B865930E87653250D93827DD1518539AB36
53,509,478 UART: [art] SIG.S = 5EBCCEDEA97D0B470CED4720015A427DC216D17571C58EBCC9998A652FB167A0E90354D3204DB5F96E87DF44EE8EF0A4
54,487,817 UART: mbox::rt_entry...
54,488,780 UART: ____ _ _ _ ____ _____
54,490,716 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,492,727 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,494,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,496,589 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,498,513 UART: |_|
54,499,511 UART:
54,787,296 UART: [rt] Runtime listening for mailbox commands...
54,789,426 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,383,246 ready_for_fw is high
3,383,616 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,080,753 >>> mbox cmd response: success
18,365,363 UART:
18,365,780 UART: Running Caliptra FMC ...
18,366,919 UART:
18,367,077 UART: [state] CFI Enabled
18,432,226 UART: [fht] FMC Alias Private Key: 7
20,196,219 UART: [art] Extend RT PCRs Done
20,197,436 UART: [art] Lock RT PCRs Done
20,198,980 UART: [art] Populate DV Done
20,204,443 UART: [fht] FMC Alias Private Key: 7
20,206,035 UART: [art] Derive CDI
20,206,873 UART: [art] Store in in slot 0x4
20,265,116 UART: [art] Derive Key Pair
20,266,159 UART: [art] Store priv key in slot 0x5
22,728,715 UART: [art] Derive Key Pair - Done
22,741,507 UART: [art] Signing Cert with AUTHO
22,742,810 UART: RITY.KEYID = 7
24,454,937 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,424 UART: [art] PUB.X = 5C093C5B71F50F2B0A222424F7DAC8488D45B1059AD833A60D64C9B80F495D6998F11B8A73EB2D2DB83B48144EEAA3FE
24,463,711 UART: [art] PUB.Y = AE4D78F56853C5E98DE0A815D9F5CA4D51D3AEA620D0218A0371D76F2FD2A2EA47B59B6630AC1C5E77C4069FC01D602F
24,470,966 UART: [art] SIG.R = 71C1A861244CC9666FEBCBBC1CE398A5F27A244FB1082FEDC2DFE432629FFE9E2FA0017549812319459FB50AAC745E0B
24,478,404 UART: [art] SIG.S = 03084345E6F808D23DC067C17DD61D5880AF0D3E36A9DF5E952B4BEFA95B5C3A797678F4419771E2080F0CD05D3CFE7C
25,457,376 UART: Caliptra RT
25,458,092 UART: [state] CFI Enabled
25,624,939 UART: [rt] RT listening for mailbox commands...
25,627,344 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,657,952 UART: [rt]cmd =0x54514754, len=24
25,660,504 >>> mbox cmd response data (8 bytes)
27,711,534 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,224,456 >>> mbox cmd response: success
34,224,959 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,258,161 UART:
34,258,488 UART: Running Caliptra FMC ...
34,259,615 UART:
34,259,778 UART: [state] CFI Enabled
34,362,355 UART: [art] Extend RT PCRs Done
34,363,541 UART: [art] Lock RT PCRs Done
34,364,883 UART: [art] Populate DV Done
34,370,346 UART: [fht] FMC Alias Private Key: 7
34,372,008 UART: [art] Derive CDI
34,372,829 UART: [art] Store in in slot 0x4
34,431,302 UART: [art] Derive Key Pair
34,432,339 UART: [art] Store priv key in slot 0x5
36,894,766 UART: [art] Derive Key Pair - Done
36,907,603 UART: [art] Signing Cert with AUTHO
36,908,910 UART: RITY.KEYID = 7
38,620,399 UART: [art] Erasing AUTHORITY.KEYID = 7
38,621,936 UART: [art] PUB.X = FC2B91F0476F33CE5D5ABA2631A362502E84A4FCD3934156E91A27965C7CF360126516D1F0D51523F4175D93BE2CABEE
38,629,203 UART: [art] PUB.Y = B9DA0A135ADA8093A8E1A282A90117B732BC02E8F2435E3006F3895231244DA84BB526FDE55119B6948D16445A1D290F
38,636,437 UART: [art] SIG.R = 07149772477A7CB578C0962CECB6B741807B3C01DF787AC3918E61849F7AD1C711E8996F092ECA24A165D251FF4B7031
38,643,975 UART: [art] SIG.S = CD0594E2DB6723D8ECCEFFA8B18299FF0756FDF8598AE6D9303F614A82EECA3A2C4B919BA1538333D1F07C7D42C18CB5
39,622,202 UART: mbox::rt_entry...
39,623,161 UART: ____ _ _ _ ____ _____
39,625,145 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,627,162 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,629,110 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,631,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,632,899 UART: |_|
39,633,700 UART:
39,920,346 UART: [rt] Runtime listening for mailbox commands...
39,922,521 >>> mbox cmd response data (120 bytes)
41,968,270 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
48,459,894 >>> mbox cmd response: success
48,460,411 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,492,637 UART:
48,492,961 UART: Running Caliptra FMC ...
48,494,088 UART:
48,494,277 UART: [state] CFI Enabled
48,587,774 UART: [art] Extend RT PCRs Done
48,588,956 UART: [art] Lock RT PCRs Done
48,590,465 UART: [art] Populate DV Done
48,595,762 UART: [fht] FMC Alias Private Key: 7
48,597,404 UART: [art] Derive CDI
48,598,212 UART: [art] Store in in slot 0x4
48,656,415 UART: [art] Derive Key Pair
48,657,451 UART: [art] Store priv key in slot 0x5
51,120,462 UART: [art] Derive Key Pair - Done
51,133,278 UART: [art] Signing Cert with AUTHO
51,134,609 UART: RITY.KEYID = 7
52,846,030 UART: [art] Erasing AUTHORITY.KEYID = 7
52,847,549 UART: [art] PUB.X = 9B9A18D1B39BEE0BC2984DCB24AEBFFE9868AD00C35CB71B308FF9D98657F02F0AADF5A65120D198ADCFBD73D55C10A4
52,854,804 UART: [art] PUB.Y = 2CE2347EB36114BC424A89CB67DA8773EB04614F88CDFC2ED25703260EDDC0F10B1C3761C219C08141E18DEF1BC6F5EF
52,862,093 UART: [art] SIG.R = 890D47C54B66CAE2ECD8EE2586DEA1BC9C60F3DCDC7291B1CD1486A8DD30AAB8F56217B5D58AB5D1274EA289517E7243
52,869,508 UART: [art] SIG.S = 4F2ACE731DD201A32CC4077B01D30A743E2C972DDF308CD0AF1C659C2F8B496C3947B7F05FD815D5B0215B8502744DB9
53,847,642 UART: mbox::rt_entry...
53,848,608 UART: ____ _ _ _ ____ _____
53,850,588 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,852,590 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,854,516 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,856,444 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,858,369 UART: |_|
53,859,225 UART:
54,141,900 UART: [rt] Runtime listening for mailbox commands...
54,144,019 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
193,065 UART:
193,431 UART: Running Caliptra ROM ...
194,635 UART:
604,016 UART: [state] CFI Enabled
619,740 UART: [state] LifecycleState = Unprovisioned
621,544 UART: [state] DebugLocked = No
624,517 UART: [state] WD Timer not started. Device not locked for debugging
627,735 UART: [kat] SHA2-256
806,893 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,477 UART: [kat] ++
818,921 UART: [kat] sha1
830,093 UART: [kat] SHA2-256
833,113 UART: [kat] SHA2-384
839,884 UART: [kat] SHA2-512-ACC
842,826 UART: [kat] ECC-384
3,285,442 UART: [kat] HMAC-384Kdf
3,297,111 UART: [kat] LMS
3,826,599 UART: [kat] --
3,829,612 UART: [cold-reset] ++
3,830,974 UART: [fht] FHT @ 0x50003400
3,840,961 UART: [idev] ++
3,841,535 UART: [idev] CDI.KEYID = 6
3,842,446 UART: [idev] SUBJECT.KEYID = 7
3,843,620 UART: [idev] UDS.KEYID = 0
3,844,662 ready_for_fw is high
3,844,860 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,262 UART: [idev] Erasing UDS.KEYID = 0
6,312,876 UART: [idev] Sha1 KeyId Algorithm
6,336,966 UART: [idev] --
6,339,606 UART: [ldev] ++
6,340,175 UART: [ldev] CDI.KEYID = 6
6,341,090 UART: [ldev] SUBJECT.KEYID = 5
6,342,302 UART: [ldev] AUTHORITY.KEYID = 7
6,343,527 UART: [ldev] FE.KEYID = 1
6,352,225 UART: [ldev] Erasing FE.KEYID = 1
8,828,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,724 UART: [ldev] --
10,619,170 UART: [fwproc] Wait for Commands...
10,622,339 UART: [fwproc] Recv command 0x46574c44
10,624,431 UART: [fwproc] Recv'd Img size: 114168 bytes
14,020,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,094,788 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,163,585 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,839 >>> mbox cmd response: success
14,485,856 UART: [afmc] ++
14,486,456 UART: [afmc] CDI.KEYID = 6
14,487,342 UART: [afmc] SUBJECT.KEYID = 7
14,488,440 UART: [afmc] AUTHORITY.KEYID = 5
16,989,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,497 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,410 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,727,194 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,743,186 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,759,065 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,780,540 UART: [afmc] --
18,784,618 UART: [cold-reset] --
18,788,901 UART: [state] Locking Datavault
18,792,111 UART: [state] Locking PCR0, PCR1 and PCR31
18,793,811 UART: [state] Locking ICCM
18,795,581 UART: [exit] Launching FMC @ 0x40000130
18,804,028 UART:
18,804,265 UART: Running Caliptra FMC ...
18,805,362 UART:
18,805,520 UART: [state] CFI Enabled
18,813,511 UART: [fht] FMC Alias Private Key: 7
20,570,666 UART: [art] Extend RT PCRs Done
20,571,886 UART: [art] Lock RT PCRs Done
20,573,629 UART: [art] Populate DV Done
20,579,146 UART: [fht] FMC Alias Private Key: 7
20,580,678 UART: [art] Derive CDI
20,581,414 UART: [art] Store in in slot 0x4
20,623,920 UART: [art] Derive Key Pair
20,624,963 UART: [art] Store priv key in slot 0x5
23,052,149 UART: [art] Derive Key Pair - Done
23,064,981 UART: [art] Signing Cert with AUTHO
23,066,285 UART: RITY.KEYID = 7
24,771,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,772,713 UART: [art] PUB.X = B418B04014606A51935DBD22C0AAED70BDB22B4D2CDA95C670C25A726D9DFB3D28D71A5755916D4E4C2891C2D752CBBD
24,779,967 UART: [art] PUB.Y = 7192D2C396E99872E44DE51D88DC02EC5D34B95D0F15A9E292B3732BE8BD96C3888289D9765663723E1189BE96EE8B15
24,787,212 UART: [art] SIG.R = 7FAF60CC0B4BBAEC17E873D769E62D457F0BA98E2A66F6C68F5282E175E9B9E3D0686B26FEA4060AAF69ED751D940F03
24,794,616 UART: [art] SIG.S = E19CC491CE7CEE947A8566A19D2416665EAEF2C99AB22577A28FEA1E0B85192EAABB9BFC8CB344194E99688BE02669A9
25,774,230 UART: Caliptra RT
25,774,929 UART: [state] CFI Enabled
25,893,226 UART: [rt] RT listening for mailbox commands...
25,895,602 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,925,715 UART: [rt]cmd =0x54514754, len=24
25,928,456 >>> mbox cmd response data (8 bytes)
27,978,598 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,079,057 UART:
28,079,451 UART: Running Caliptra ROM ...
28,080,588 UART:
28,080,766 UART: [state] CFI Enabled
28,094,276 UART: [state] LifecycleState = Unprovisioned
28,096,107 UART: [state] DebugLocked = No
28,097,813 UART: [state] WD Timer not started. Device not locked for debugging
28,102,256 UART: [kat] SHA2-256
28,281,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
28,292,965 UART: [kat] ++
28,293,511 UART: [kat] sha1
28,304,696 UART: [kat] SHA2-256
28,307,693 UART: [kat] SHA2-384
28,313,247 UART: [kat] SHA2-512-ACC
28,316,197 UART: [kat] ECC-384
30,758,198 UART: [kat] HMAC-384Kdf
30,770,480 UART: [kat] LMS
31,299,973 UART: [kat] --
31,304,086 UART: [update-reset] ++
34,294,088 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,297,994 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
34,555,596 >>> mbox cmd response: success
34,555,960 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,556,248 UART: [update-reset] Copying MAN_2 To MAN_1
34,578,406 UART: [update-reset Success] --
34,582,374 UART: [state] Locking Datavault
34,585,465 UART: [state] Locking PCR0, PCR1 and PCR31
34,587,130 UART: [state] Locking ICCM
34,588,499 UART: [exit] Launching FMC @ 0x40000130
34,596,941 UART:
34,597,174 UART: Running Caliptra FMC ...
34,598,197 UART:
34,598,342 UART: [state] CFI Enabled
34,642,728 UART: [art] Extend RT PCRs Done
34,643,907 UART: [art] Lock RT PCRs Done
34,645,496 UART: [art] Populate DV Done
34,650,792 UART: [fht] FMC Alias Private Key: 7
34,652,436 UART: [art] Derive CDI
34,653,249 UART: [art] Store in in slot 0x4
34,695,950 UART: [art] Derive Key Pair
34,696,948 UART: [art] Store priv key in slot 0x5
37,123,966 UART: [art] Derive Key Pair - Done
37,137,242 UART: [art] Signing Cert with AUTHO
37,138,558 UART: RITY.KEYID = 7
38,843,854 UART: [art] Erasing AUTHORITY.KEYID = 7
38,845,357 UART: [art] PUB.X = 1D2F63E5E1641266C0503994BDC305B45CA9225B44E1CD0FF06AF219CD67CFCE7D3EACE96A9FC54F0A53DF53D7522681
38,852,617 UART: [art] PUB.Y = 448FC27F1802159FE078ED4966D8CBCB2741A8DBE1877B2001664C5E4C2B03FD9C31C64E913ACDB4BA0FCBFBC15F1C17
38,859,918 UART: [art] SIG.R = F2CCFE7E55D62A22EADAD9D96F00B1AF705F58F4696D74DF1C8EA20051BCC21638A88B286A0588901E60DC69FDCDC0B1
38,867,293 UART: [art] SIG.S = 3AD71FBCD9C0613082644F64C25EB23CBA8A851097D59AF05980F25001A995AF345BAEC3BF51C7CDC5E767077C66BA3E
39,845,992 UART: mbox::rt_entry...
39,846,965 UART: ____ _ _ _ ____ _____
39,848,952 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,850,960 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,852,891 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,854,820 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,856,746 UART: |_|
39,857,575 UART:
40,140,609 UART: [rt] Runtime listening for mailbox commands...
40,142,763 >>> mbox cmd response data (120 bytes)
42,193,149 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,292,849 UART:
42,293,204 UART: Running Caliptra ROM ...
42,294,338 UART:
42,294,505 UART: [state] CFI Enabled
42,309,162 UART: [state] LifecycleState = Unprovisioned
42,311,046 UART: [state] DebugLocked = No
42,312,550 UART: [state] WD Timer not started. Device not locked for debugging
42,316,622 UART: [kat] SHA2-256
42,495,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
42,507,393 UART: [kat] ++
42,507,931 UART: [kat] sha1
42,519,923 UART: [kat] SHA2-256
42,522,992 UART: [kat] SHA2-384
42,529,033 UART: [kat] SHA2-512-ACC
42,531,984 UART: [kat] ECC-384
44,973,197 UART: [kat] HMAC-384Kdf
44,986,126 UART: [kat] LMS
45,515,628 UART: [kat] --
45,520,132 UART: [update-reset] ++
48,515,546 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,518,707 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
48,776,310 >>> mbox cmd response: success
48,776,678 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,777,826 UART: [update-reset] Copying MAN_2 To MAN_1
48,800,215 UART: [update-reset Success] --
48,804,589 UART: [state] Locking Datavault
48,807,899 UART: [state] Locking PCR0, PCR1 and PCR31
48,809,616 UART: [state] Locking ICCM
48,810,800 UART: [exit] Launching FMC @ 0x40000130
48,819,250 UART:
48,819,482 UART: Running Caliptra FMC ...
48,820,581 UART:
48,820,741 UART: [state] CFI Enabled
48,865,239 UART: [art] Extend RT PCRs Done
48,866,411 UART: [art] Lock RT PCRs Done
48,868,082 UART: [art] Populate DV Done
48,873,762 UART: [fht] FMC Alias Private Key: 7
48,875,242 UART: [art] Derive CDI
48,876,054 UART: [art] Store in in slot 0x4
48,918,915 UART: [art] Derive Key Pair
48,919,911 UART: [art] Store priv key in slot 0x5
51,347,063 UART: [art] Derive Key Pair - Done
51,360,443 UART: [art] Signing Cert with AUTHO
51,361,770 UART: RITY.KEYID = 7
53,067,477 UART: [art] Erasing AUTHORITY.KEYID = 7
53,068,992 UART: [art] PUB.X = E7C7A1E41DF1DE611938761DA1B5CFD6FF8C230C51D29ED3E33938721521921C25A105AADE43B83F4CC47FBCA619D343
53,076,250 UART: [art] PUB.Y = 4ABD56677915E0EBB056D0B23A3D17575E769C5A704405B18377F6E73C4E0A58986545549FF67D7CB6BAD89BC3D685FC
53,083,501 UART: [art] SIG.R = 24CDEA09155BC63AE58CC27315C3CC44868E340F1D2FF3DD61E9040B9F744FCE16EB2B7C035A17B11262E7F3A1EEC0D5
53,090,898 UART: [art] SIG.S = 53B512E09E38DD2CD62387C63F6D1E0D6DD5261EE0283AFE8838C60928FE412737D45A5252F5C0738F280DC7E26E5DA6
54,069,497 UART: mbox::rt_entry...
54,070,476 UART: ____ _ _ _ ____ _____
54,072,466 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,074,470 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,076,407 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,078,339 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,080,195 UART: |_|
54,081,077 UART:
54,364,928 UART: [rt] Runtime listening for mailbox commands...
54,367,044 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,710 writing to cptra_bootfsm_go
3,694,996 ready_for_fw is high
3,695,539 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,201 >>> mbox cmd response: success
18,511,888 UART:
18,512,304 UART: Running Caliptra FMC ...
18,513,509 UART:
18,513,683 UART: [state] CFI Enabled
18,521,399 UART: [fht] FMC Alias Private Key: 7
20,278,016 UART: [art] Extend RT PCRs Done
20,279,240 UART: [art] Lock RT PCRs Done
20,280,865 UART: [art] Populate DV Done
20,286,220 UART: [fht] FMC Alias Private Key: 7
20,287,838 UART: [art] Derive CDI
20,288,664 UART: [art] Store in in slot 0x4
20,331,372 UART: [art] Derive Key Pair
20,332,376 UART: [art] Store priv key in slot 0x5
22,759,089 UART: [art] Derive Key Pair - Done
22,772,155 UART: [art] Signing Cert with AUTHO
22,773,461 UART: RITY.KEYID = 7
24,478,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,401 UART: [art] PUB.X = C5C3688855A67A0A8827A2C4100CAB18B3DD987A17681AF6341259E170510E49E4AF426538B1FB27ABF227785A59F043
24,487,696 UART: [art] PUB.Y = 7FFF465CEB4698AE7C418AA5F5646B422A9CFC2DBEF1D687E926F2FC2F72F3D998A133194170CE6A84816D15952D03CC
24,494,958 UART: [art] SIG.R = 90049E1A91AAA6E9C0FA581550DE2F0E1D85CD32B69A8A4ADFABA8E6D37273EE2C1E9550D150647BDA3731DFFC23FB36
24,502,410 UART: [art] SIG.S = C4426D3DB4653AF7D98E35DC5DAE59ADCDF16E2AD7FAAF7D44502656349034F6CC0B141C5FFF831379B48D3F90E9A14E
25,480,935 UART: Caliptra RT
25,481,651 UART: [state] CFI Enabled
25,598,389 UART: [rt] RT listening for mailbox commands...
25,600,636 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,631,344 UART: [rt]cmd =0x54514754, len=24
25,633,690 >>> mbox cmd response data (8 bytes)
27,684,888 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
34,117,725 >>> mbox cmd response: success
34,118,198 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,156,352 UART:
34,156,649 UART: Running Caliptra FMC ...
34,157,687 UART:
34,157,837 UART: [state] CFI Enabled
34,201,477 UART: [art] Extend RT PCRs Done
34,202,662 UART: [art] Lock RT PCRs Done
34,204,407 UART: [art] Populate DV Done
34,209,948 UART: [fht] FMC Alias Private Key: 7
34,211,489 UART: [art] Derive CDI
34,212,221 UART: [art] Store in in slot 0x4
34,255,031 UART: [art] Derive Key Pair
34,256,037 UART: [art] Store priv key in slot 0x5
36,682,185 UART: [art] Derive Key Pair - Done
36,694,973 UART: [art] Signing Cert with AUTHO
36,696,275 UART: RITY.KEYID = 7
38,401,832 UART: [art] Erasing AUTHORITY.KEYID = 7
38,403,346 UART: [art] PUB.X = 8F417A697D8355C686EB2CEA024299FC0124079ED7033CE1A9F47D9AFF0E506A7CD59C716C371B3ED86F8538E1AFF7A1
38,410,593 UART: [art] PUB.Y = 254226E5E1C2C8DF2C95FFC7BA3841980B522E2C2BADCB337182BFEB3AB59DE7B13BB8061F80B13E169598AC5F37DD0E
38,417,882 UART: [art] SIG.R = ADE80691C092AD9C7CB845E1122DB1C023BBB4FC63D93D89A067510C4C9FE8743D42F73C528E21489608A2E8BD53F69D
38,425,275 UART: [art] SIG.S = 42E2666A77908580E1E9EBF27E5D7DD7D6748DB7658BBC89A1559DF8CE15EBC37F645481E04A0011EC72C00C5372473F
39,403,939 UART: mbox::rt_entry...
39,404,900 UART: ____ _ _ _ ____ _____
39,406,882 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,408,906 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,410,840 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,412,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,414,702 UART: |_|
39,415,512 UART:
39,698,601 UART: [rt] Runtime listening for mailbox commands...
39,700,752 >>> mbox cmd response data (120 bytes)
41,746,560 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
48,180,383 >>> mbox cmd response: success
48,180,907 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,215,444 UART:
48,215,767 UART: Running Caliptra FMC ...
48,216,829 UART:
48,216,981 UART: [state] CFI Enabled
48,261,169 UART: [art] Extend RT PCRs Done
48,262,315 UART: [art] Lock RT PCRs Done
48,263,952 UART: [art] Populate DV Done
48,269,410 UART: [fht] FMC Alias Private Key: 7
48,271,110 UART: [art] Derive CDI
48,271,851 UART: [art] Store in in slot 0x4
48,314,345 UART: [art] Derive Key Pair
48,315,380 UART: [art] Store priv key in slot 0x5
50,742,072 UART: [art] Derive Key Pair - Done
50,755,019 UART: [art] Signing Cert with AUTHO
50,756,328 UART: RITY.KEYID = 7
52,461,777 UART: [art] Erasing AUTHORITY.KEYID = 7
52,463,280 UART: [art] PUB.X = 2CB4B683105913B39A6A248D9B8E65F72599CEFE4DFF019D8DC803FBC8F0830F353E43C555BC9C4E21D9B45D29786C8A
52,470,537 UART: [art] PUB.Y = A40EDFDB977ACA9D96117C8257FE714C4EC4B011F57BC38B1FFE78DF64C51BFD83B10A3DCBF744200626CA38A9505DDA
52,477,844 UART: [art] SIG.R = 176A6CAEDC4EF27ACC3FA7B8058CB5D984E6D2E8BB54972DEBAE53F9728053452BB0947DAF6FB653015E0D330CD0325C
52,485,235 UART: [art] SIG.S = D06E862CE2D046998E096C13098910A8C202D51BE99C79C76EC3023ADD2C455106D1CE17D758411B3AB7880B1B520906
53,463,991 UART: mbox::rt_entry...
53,464,932 UART: ____ _ _ _ ____ _____
53,466,863 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
53,468,874 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
53,470,805 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
53,472,738 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
53,474,670 UART: |_|
53,475,509 UART:
53,761,634 UART: [rt] Runtime listening for mailbox commands...
53,763,801 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
191,986 UART:
192,372 UART: Running Caliptra ROM ...
193,475 UART:
193,618 UART: [state] CFI Enabled
262,081 UART: [state] LifecycleState = Unprovisioned
264,436 UART: [state] DebugLocked = No
266,951 UART: [state] WD Timer not started. Device not locked for debugging
271,643 UART: [kat] SHA2-256
461,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,285 UART: [kat] ++
472,730 UART: [kat] sha1
484,454 UART: [kat] SHA2-256
487,530 UART: [kat] SHA2-384
494,016 UART: [kat] SHA2-512-ACC
496,626 UART: [kat] ECC-384
2,947,199 UART: [kat] HMAC-384Kdf
2,970,794 UART: [kat] LMS
3,502,614 UART: [kat] --
3,506,966 UART: [cold-reset] ++
3,508,681 UART: [fht] FHT @ 0x50003400
3,520,080 UART: [idev] ++
3,520,725 UART: [idev] CDI.KEYID = 6
3,521,681 UART: [idev] SUBJECT.KEYID = 7
3,522,924 UART: [idev] UDS.KEYID = 0
3,523,823 ready_for_fw is high
3,524,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,695 UART: [idev] Erasing UDS.KEYID = 0
6,027,495 UART: [idev] Sha1 KeyId Algorithm
6,050,747 UART: [idev] --
6,054,267 UART: [ldev] ++
6,054,973 UART: [ldev] CDI.KEYID = 6
6,055,896 UART: [ldev] SUBJECT.KEYID = 5
6,057,011 UART: [ldev] AUTHORITY.KEYID = 7
6,058,249 UART: [ldev] FE.KEYID = 1
6,091,052 UART: [ldev] Erasing FE.KEYID = 1
8,601,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,289 UART: [ldev] --
10,404,333 UART: [fwproc] Wait for Commands...
10,407,287 UART: [fwproc] Recv command 0x46574c44
10,409,593 UART: [fwproc] Recv'd Img size: 114168 bytes
13,848,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,336 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,042,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,584,301 >>> mbox cmd response: success
14,588,527 UART: [afmc] ++
14,589,240 UART: [afmc] CDI.KEYID = 6
14,590,354 UART: [afmc] SUBJECT.KEYID = 7
14,591,907 UART: [afmc] AUTHORITY.KEYID = 5
17,119,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,841,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,843,735 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,858,894 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,874,047 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,889,035 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,912,894 UART: [afmc] --
18,915,964 UART: [cold-reset] --
18,920,808 UART: [state] Locking Datavault
18,926,824 UART: [state] Locking PCR0, PCR1 and PCR31
18,929,008 UART: [state] Locking ICCM
18,930,827 UART: [exit] Launching FMC @ 0x40000130
18,939,468 UART:
18,939,704 UART: Running Caliptra FMC ...
18,940,804 UART:
18,940,964 UART: [state] CFI Enabled
18,997,176 UART: [fht] FMC Alias Private Key: 7
20,761,127 UART: [art] Extend RT PCRs Done
20,762,337 UART: [art] Lock RT PCRs Done
20,763,938 UART: [art] Populate DV Done
20,769,506 UART: [fht] FMC Alias Private Key: 7
20,771,044 UART: [art] Derive CDI
20,771,785 UART: [art] Store in in slot 0x4
20,829,412 UART: [art] Derive Key Pair
20,830,451 UART: [art] Store priv key in slot 0x5
23,293,426 UART: [art] Derive Key Pair - Done
23,306,164 UART: [art] Signing Cert with AUTHO
23,307,493 UART: RITY.KEYID = 7
25,018,852 UART: [art] Erasing AUTHORITY.KEYID = 7
25,020,378 UART: [art] PUB.X = 232539175FCBDE4BDE694E28B6F15D2ABB3A9742B905C0C573F1D9E55F949E2913F0013F15E2905A0F6D718ECDC96BC6
25,027,596 UART: [art] PUB.Y = 45FC5CBA5985D6026688289F51F2E4782488DB5D98C46991850BA15398C173BDDD92B2E972C9D014ACDEC6A8CDF49B0B
25,034,866 UART: [art] SIG.R = 218A444459EFC5655763FF96C753152323AB1FE0E9CAFA891F9552F63BBF13B25698BDE8E0E13FED8A8CB80F46A55AEA
25,042,288 UART: [art] SIG.S = 4A78E3D6C0BE75A8B841C17B6D89D7F072547A1214DBE3B78746E846555198B9A39B386893B75F1C9BF4728C249B66CE
26,020,957 UART: Caliptra RT
26,021,674 UART: [state] CFI Enabled
26,186,092 UART: [rt] RT listening for mailbox commands...
26,188,450 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,218,844 UART: [rt]cmd =0x54514754, len=24
26,221,413 >>> mbox cmd response data (8 bytes)
28,273,908 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,374,366 UART:
28,374,726 UART: Running Caliptra ROM ...
28,375,785 UART:
28,375,935 UART: [state] CFI Enabled
28,447,418 UART: [state] LifecycleState = Unprovisioned
28,449,467 UART: [state] DebugLocked = No
28,451,915 UART: [state] WD Timer not started. Device not locked for debugging
28,456,926 UART: [kat] SHA2-256
28,646,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,657,586 UART: [kat] ++
28,658,047 UART: [kat] sha1
28,668,400 UART: [kat] SHA2-256
28,671,402 UART: [kat] SHA2-384
28,677,510 UART: [kat] SHA2-512-ACC
28,680,098 UART: [kat] ECC-384
31,132,952 UART: [kat] HMAC-384Kdf
31,157,488 UART: [kat] LMS
31,689,030 UART: [kat] --
31,693,397 UART: [update-reset] ++
34,709,701 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,713,248 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,105,964 >>> mbox cmd response: success
35,106,349 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,106,625 UART: [update-reset] Copying MAN_2 To MAN_1
35,143,938 UART: [update-reset Success] --
35,146,587 UART: [state] Locking Datavault
35,150,779 UART: [state] Locking PCR0, PCR1 and PCR31
35,152,982 UART: [state] Locking ICCM
35,154,902 UART: [exit] Launching FMC @ 0x40000130
35,163,576 UART:
35,163,837 UART: Running Caliptra FMC ...
35,164,938 UART:
35,165,098 UART: [state] CFI Enabled
35,262,096 UART: [art] Extend RT PCRs Done
35,263,309 UART: [art] Lock RT PCRs Done
35,264,657 UART: [art] Populate DV Done
35,270,228 UART: [fht] FMC Alias Private Key: 7
35,271,819 UART: [art] Derive CDI
35,272,632 UART: [art] Store in in slot 0x4
35,331,484 UART: [art] Derive Key Pair
35,332,522 UART: [art] Store priv key in slot 0x5
37,795,333 UART: [art] Derive Key Pair - Done
37,808,547 UART: [art] Signing Cert with AUTHO
37,809,860 UART: RITY.KEYID = 7
39,521,348 UART: [art] Erasing AUTHORITY.KEYID = 7
39,522,860 UART: [art] PUB.X = 2356FD2C1C652C4E17E83B6B28C354C6C68644B54DC99AA02B1973953A2EB7B9C55AF7F6317A1803848C6A022F49E8FA
39,530,160 UART: [art] PUB.Y = B04480AE516F731F412960261F03B41A1E4AD40EDBE8D1E83DA989F2CCFB4AB868C17C7CBE1883E458CAEC4A5B0D6EE2
39,537,418 UART: [art] SIG.R = FF2294F159C841CC06F86D041386722460B878FE21A106F8A66A1BE00F711794B20738863FF3345330B7237D7F5C51E4
39,544,770 UART: [art] SIG.S = 94101C8E1A99A94E26D05EA92D30C1C3F3BD480D0C255B2D580C8A081A997845151A18412792BF19E4FF7034704C9C28
40,523,616 UART: mbox::rt_entry...
40,524,581 UART: ____ _ _ _ ____ _____
40,526,570 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,528,590 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,530,522 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,532,451 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,534,377 UART: |_|
40,535,188 UART:
40,819,897 UART: [rt] Runtime listening for mailbox commands...
40,822,018 >>> mbox cmd response data (120 bytes)
42,883,178 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,982,895 UART:
42,983,437 UART: Running Caliptra ROM ...
42,984,585 UART:
42,984,763 UART: [state] CFI Enabled
43,060,704 UART: [state] LifecycleState = Unprovisioned
43,062,722 UART: [state] DebugLocked = No
43,064,641 UART: [state] WD Timer not started. Device not locked for debugging
43,069,999 UART: [kat] SHA2-256
43,259,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,270,659 UART: [kat] ++
43,271,200 UART: [kat] sha1
43,282,748 UART: [kat] SHA2-256
43,285,773 UART: [kat] SHA2-384
43,291,662 UART: [kat] SHA2-512-ACC
43,294,256 UART: [kat] ECC-384
45,744,529 UART: [kat] HMAC-384Kdf
45,768,114 UART: [kat] LMS
46,299,683 UART: [kat] --
46,302,776 UART: [update-reset] ++
49,323,179 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,326,145 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,718,864 >>> mbox cmd response: success
49,719,240 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,720,772 UART: [update-reset] Copying MAN_2 To MAN_1
49,758,296 UART: [update-reset Success] --
49,762,698 UART: [state] Locking Datavault
49,767,316 UART: [state] Locking PCR0, PCR1 and PCR31
49,769,461 UART: [state] Locking ICCM
49,771,567 UART: [exit] Launching FMC @ 0x40000130
49,780,204 UART:
49,780,467 UART: Running Caliptra FMC ...
49,781,498 UART:
49,781,646 UART: [state] CFI Enabled
49,873,550 UART: [art] Extend RT PCRs Done
49,874,747 UART: [art] Lock RT PCRs Done
49,876,346 UART: [art] Populate DV Done
49,882,021 UART: [fht] FMC Alias Private Key: 7
49,883,622 UART: [art] Derive CDI
49,884,361 UART: [art] Store in in slot 0x4
49,942,288 UART: [art] Derive Key Pair
49,943,451 UART: [art] Store priv key in slot 0x5
52,406,506 UART: [art] Derive Key Pair - Done
52,419,605 UART: [art] Signing Cert with AUTHO
52,420,915 UART: RITY.KEYID = 7
54,131,650 UART: [art] Erasing AUTHORITY.KEYID = 7
54,133,156 UART: [art] PUB.X = D19CAFD695869E992CE113977190D88CDE0C7536D72279084E69742779922EB5BE15DBA5CFCC45199ABF40BBECB2B120
54,140,400 UART: [art] PUB.Y = 72B6836C5181C4347AE367BC513135A8B9E4B346A6AD0A4ED357CBD64C5AE5FC07E6C156D5AD84368B0E398BE1AB3EFA
54,147,653 UART: [art] SIG.R = B345397B593AD77A2BD5624589B957B3EE2473A1D53C01FC9375DD3BA41C97E6B79B64F18B1B12397137C63CC181EBBE
54,155,069 UART: [art] SIG.S = AF585ADA3E2450AA600C92CC62188D1D39307F2AEF6B73318C8B2E1A7784FDA4CCFBE4ED91A5A33A8A77BB44BDCB7D44
55,133,761 UART: mbox::rt_entry...
55,134,730 UART: ____ _ _ _ ____ _____
55,136,723 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,138,735 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,140,666 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,142,595 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,144,727 UART: |_|
55,145,545 UART:
55,426,915 UART: [rt] Runtime listening for mailbox commands...
55,429,028 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,440,528 ready_for_fw is high
3,440,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,755,408 >>> mbox cmd response: success
19,047,326 UART:
19,047,721 UART: Running Caliptra FMC ...
19,048,917 UART:
19,049,094 UART: [state] CFI Enabled
19,113,409 UART: [fht] FMC Alias Private Key: 7
20,877,472 UART: [art] Extend RT PCRs Done
20,878,698 UART: [art] Lock RT PCRs Done
20,880,493 UART: [art] Populate DV Done
20,885,745 UART: [fht] FMC Alias Private Key: 7
20,887,297 UART: [art] Derive CDI
20,888,116 UART: [art] Store in in slot 0x4
20,945,758 UART: [art] Derive Key Pair
20,946,805 UART: [art] Store priv key in slot 0x5
23,410,333 UART: [art] Derive Key Pair - Done
23,423,283 UART: [art] Signing Cert with AUTHO
23,424,592 UART: RITY.KEYID = 7
25,135,863 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,511 UART: [art] PUB.X = 9A1AF62DD630B5808B29EABA7F7B28625DD53C930B3B09233AAD2B015DF72F80EF801E76CB219CEF89716E91001A83B4
25,144,649 UART: [art] PUB.Y = 781ECCBAF04FEC67674F8648642FE427AD178C99297C6392CA0BD3C3A1F959ECF9A40500809924D2C504D498921A4040
25,151,864 UART: [art] SIG.R = 985F4BDE7A326E7276E24A666808416AE5948A1E6F552DBCD2B4ABFD5D1C540A501FDF29015A0DC234FC1254D5F09D3B
25,159,244 UART: [art] SIG.S = A4CDB73E1E85DC7DA771F91CCB64C9A0EB9AC192706E3DD8D817B63FFF3330FF2B886C611F77E99EA9199A16D003C487
26,138,352 UART: Caliptra RT
26,139,070 UART: [state] CFI Enabled
26,303,009 UART: [rt] RT listening for mailbox commands...
26,305,215 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,335,733 UART: [rt]cmd =0x54514754, len=24
26,338,363 >>> mbox cmd response data (8 bytes)
28,389,006 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,378,659 >>> mbox cmd response: success
35,379,294 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,413,950 UART:
35,414,246 UART: Running Caliptra FMC ...
35,415,368 UART:
35,415,553 UART: [state] CFI Enabled
35,506,589 UART: [art] Extend RT PCRs Done
35,507,775 UART: [art] Lock RT PCRs Done
35,509,411 UART: [art] Populate DV Done
35,515,150 UART: [fht] FMC Alias Private Key: 7
35,516,850 UART: [art] Derive CDI
35,517,660 UART: [art] Store in in slot 0x4
35,575,328 UART: [art] Derive Key Pair
35,576,369 UART: [art] Store priv key in slot 0x5
38,038,946 UART: [art] Derive Key Pair - Done
38,052,113 UART: [art] Signing Cert with AUTHO
38,053,420 UART: RITY.KEYID = 7
39,764,153 UART: [art] Erasing AUTHORITY.KEYID = 7
39,765,640 UART: [art] PUB.X = A163D7DEBCA981944AFC5ACB69112E51C14CE2272881C1CAB1F6772B942C4E6C29B3BFC64D32E724EEDB3F92FED2BEEE
39,772,994 UART: [art] PUB.Y = 689A93FBDC4A4ED155E89CF1A1419E2EC5F37F2B368C69DF166D6C1F31D506C77E8242E55AF3EAAEC2FD7BC8E767AB06
39,780,255 UART: [art] SIG.R = F9DCB878F9FCA775B67F794533CE120CBC86F8DDE285FD02BBEBEE2508844EC434EA8CC385E97E4A06C16A38097E82C4
39,787,673 UART: [art] SIG.S = 2D86808F7546DAC507B2E6A76D5FCD1A7C734BDFA0AEFEB46E93AD276BA995B4FF1D204C7E9057CFA6359CAD13E5C7D9
40,766,667 UART: mbox::rt_entry...
40,767,631 UART: ____ _ _ _ ____ _____
40,769,585 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,771,591 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,773,453 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,775,378 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,777,263 UART: |_|
40,778,146 UART:
41,058,335 UART: [rt] Runtime listening for mailbox commands...
41,060,461 >>> mbox cmd response data (120 bytes)
43,108,839 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
50,114,621 >>> mbox cmd response: success
50,115,156 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,150,238 UART:
50,150,543 UART: Running Caliptra FMC ...
50,151,667 UART:
50,151,823 UART: [state] CFI Enabled
50,241,487 UART: [art] Extend RT PCRs Done
50,242,678 UART: [art] Lock RT PCRs Done
50,243,815 UART: [art] Populate DV Done
50,249,064 UART: [fht] FMC Alias Private Key: 7
50,250,657 UART: [art] Derive CDI
50,251,468 UART: [art] Store in in slot 0x4
50,310,351 UART: [art] Derive Key Pair
50,311,385 UART: [art] Store priv key in slot 0x5
52,774,370 UART: [art] Derive Key Pair - Done
52,787,547 UART: [art] Signing Cert with AUTHO
52,788,874 UART: RITY.KEYID = 7
54,499,543 UART: [art] Erasing AUTHORITY.KEYID = 7
54,501,027 UART: [art] PUB.X = D414A860E4045E404B6BCC01A741126DC3467116785499A02A3D44F9EC6A3D2F544E0FE83B98EE9B665F312F2026A8FC
54,508,327 UART: [art] PUB.Y = 3F23F803923FB882C621836B93D0CD212414E54FE82D8DF5DEE35549FE80914A20D522F4564DDD977E846232802C305D
54,515,540 UART: [art] SIG.R = DF7C1547CF0863403B74F985CF82201559D8C8DA9B8FB79426FA8A482C495574B7A527E5761217EB27DEFBBAC1EBCEE3
54,522,984 UART: [art] SIG.S = 194890360B0163AE1277CF6C31C8805F771DDF7ED6532658BF45FF4D450B4E90BAF87F177DDC5A3C077E854A3D6FB083
55,501,870 UART: mbox::rt_entry...
55,502,839 UART: ____ _ _ _ ____ _____
55,504,825 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,506,756 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,508,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,510,537 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,512,459 UART: |_|
55,513,264 UART:
55,800,786 UART: [rt] Runtime listening for mailbox commands...
55,802,906 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,708 writing to cptra_bootfsm_go
193,003 UART:
193,374 UART: Running Caliptra ROM ...
194,482 UART:
604,115 UART: [state] CFI Enabled
618,500 UART: [state] LifecycleState = Unprovisioned
620,906 UART: [state] DebugLocked = No
622,786 UART: [state] WD Timer not started. Device not locked for debugging
628,103 UART: [kat] SHA2-256
817,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,794 UART: [kat] ++
829,315 UART: [kat] sha1
840,612 UART: [kat] SHA2-256
843,618 UART: [kat] SHA2-384
848,897 UART: [kat] SHA2-512-ACC
851,478 UART: [kat] ECC-384
3,293,929 UART: [kat] HMAC-384Kdf
3,307,530 UART: [kat] LMS
3,839,379 UART: [kat] --
3,842,116 UART: [cold-reset] ++
3,843,906 UART: [fht] FHT @ 0x50003400
3,855,805 UART: [idev] ++
3,856,511 UART: [idev] CDI.KEYID = 6
3,857,545 UART: [idev] SUBJECT.KEYID = 7
3,858,649 UART: [idev] UDS.KEYID = 0
3,859,574 ready_for_fw is high
3,859,764 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,145 UART: [idev] Erasing UDS.KEYID = 0
6,337,676 UART: [idev] Sha1 KeyId Algorithm
6,360,390 UART: [idev] --
6,366,700 UART: [ldev] ++
6,367,380 UART: [ldev] CDI.KEYID = 6
6,368,264 UART: [ldev] SUBJECT.KEYID = 5
6,369,495 UART: [ldev] AUTHORITY.KEYID = 7
6,370,674 UART: [ldev] FE.KEYID = 1
6,381,134 UART: [ldev] Erasing FE.KEYID = 1
8,860,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,148 UART: [ldev] --
10,653,058 UART: [fwproc] Wait for Commands...
10,655,369 UART: [fwproc] Recv command 0x46574c44
10,657,618 UART: [fwproc] Recv'd Img size: 114168 bytes
14,099,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,177,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,293,508 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,835,489 >>> mbox cmd response: success
14,839,535 UART: [afmc] ++
14,840,249 UART: [afmc] CDI.KEYID = 6
14,841,435 UART: [afmc] SUBJECT.KEYID = 7
14,842,868 UART: [afmc] AUTHORITY.KEYID = 5
17,346,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,068,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,070,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,085,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,100,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,115,410 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,198 UART: [afmc] --
19,142,204 UART: [cold-reset] --
19,145,802 UART: [state] Locking Datavault
19,150,999 UART: [state] Locking PCR0, PCR1 and PCR31
19,153,192 UART: [state] Locking ICCM
19,155,887 UART: [exit] Launching FMC @ 0x40000130
19,164,537 UART:
19,164,773 UART: Running Caliptra FMC ...
19,165,875 UART:
19,166,037 UART: [state] CFI Enabled
19,174,144 UART: [fht] FMC Alias Private Key: 7
20,930,666 UART: [art] Extend RT PCRs Done
20,931,881 UART: [art] Lock RT PCRs Done
20,933,341 UART: [art] Populate DV Done
20,938,570 UART: [fht] FMC Alias Private Key: 7
20,940,118 UART: [art] Derive CDI
20,940,937 UART: [art] Store in in slot 0x4
20,983,856 UART: [art] Derive Key Pair
20,984,857 UART: [art] Store priv key in slot 0x5
23,411,444 UART: [art] Derive Key Pair - Done
23,424,329 UART: [art] Signing Cert with AUTHO
23,425,655 UART: RITY.KEYID = 7
25,131,260 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,766 UART: [art] PUB.X = 90FD7003E66FF381F07206DB8C9C3CDE6C688EA0399C6FFBD399456FAA0FD796FA4792C9241A441D9DD62632286F3E08
25,140,066 UART: [art] PUB.Y = 44F35BE49C94734029A9F22FEF1BEA208CA36EFA0F931305A3A8EFE2F0E163D97D96F47C44630126DBDB72FB1DA82FF2
25,147,302 UART: [art] SIG.R = 0EFFE2CA6A9E817A1D4059F80B3F56DC9F94661B291466A755794022DE33331DD32423707FA054ABE429048BCB424D3D
25,154,705 UART: [art] SIG.S = 3AB67DDF6802262A4A4A4C305CBEDFF495590FB4DDADC71AB9802732D3A49E767F07CE6041FDA9E5BC47A277190FA13B
26,133,390 UART: Caliptra RT
26,134,080 UART: [state] CFI Enabled
26,251,250 UART: [rt] RT listening for mailbox commands...
26,253,611 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,284,046 UART: [rt]cmd =0x54514754, len=24
26,286,710 >>> mbox cmd response data (8 bytes)
28,337,208 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
28,437,993 UART:
28,438,366 UART: Running Caliptra ROM ...
28,439,422 UART:
28,439,631 UART: [state] CFI Enabled
28,454,244 UART: [state] LifecycleState = Unprovisioned
28,456,153 UART: [state] DebugLocked = No
28,459,085 UART: [state] WD Timer not started. Device not locked for debugging
28,463,166 UART: [kat] SHA2-256
28,653,069 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,663,824 UART: [kat] ++
28,664,419 UART: [kat] sha1
28,676,449 UART: [kat] SHA2-256
28,679,459 UART: [kat] SHA2-384
28,685,229 UART: [kat] SHA2-512-ACC
28,687,795 UART: [kat] ECC-384
31,131,082 UART: [kat] HMAC-384Kdf
31,143,123 UART: [kat] LMS
31,674,742 UART: [kat] --
31,678,879 UART: [update-reset] ++
34,707,246 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,711,129 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
35,103,895 >>> mbox cmd response: success
35,104,315 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,104,611 UART: [update-reset] Copying MAN_2 To MAN_1
35,141,800 UART: [update-reset Success] --
35,146,418 UART: [state] Locking Datavault
35,149,457 UART: [state] Locking PCR0, PCR1 and PCR31
35,151,598 UART: [state] Locking ICCM
35,153,377 UART: [exit] Launching FMC @ 0x40000130
35,161,995 UART:
35,162,238 UART: Running Caliptra FMC ...
35,163,340 UART:
35,163,517 UART: [state] CFI Enabled
35,207,867 UART: [art] Extend RT PCRs Done
35,209,050 UART: [art] Lock RT PCRs Done
35,210,732 UART: [art] Populate DV Done
35,216,032 UART: [fht] FMC Alias Private Key: 7
35,217,573 UART: [art] Derive CDI
35,218,387 UART: [art] Store in in slot 0x4
35,261,253 UART: [art] Derive Key Pair
35,262,291 UART: [art] Store priv key in slot 0x5
37,688,935 UART: [art] Derive Key Pair - Done
37,701,769 UART: [art] Signing Cert with AUTHO
37,703,077 UART: RITY.KEYID = 7
39,408,310 UART: [art] Erasing AUTHORITY.KEYID = 7
39,409,810 UART: [art] PUB.X = B907EF4B45246E8AC41DCCD2D7BCB6971CCEF5409996F64C0D5492DDB1F47E746A979C6D93DCA710557BECF4E1B0CE87
39,417,135 UART: [art] PUB.Y = CCCC25EF18867BF464417AC96F323DF6C0D3FC6844202CB541FB80DC5D1466A11F978685EC70AC1023D76BB503A643B9
39,424,374 UART: [art] SIG.R = 9029BCD63B244AC4F913900CA373BA43D33581287853BA1ED0F9B4E61C52544CB1D2D84C3A610ACCD49A3A05E47C1D00
39,431,732 UART: [art] SIG.S = 8FD79E52FF00BDC0C01C9A6A61E6018B91A2689502F4622FC2C6505BE9D0F0C37B74F92D576F0C3D699639484BFF4CDC
40,409,939 UART: mbox::rt_entry...
40,410,889 UART: ____ _ _ _ ____ _____
40,412,873 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,414,877 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,416,809 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,418,742 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,420,594 UART: |_|
40,421,395 UART:
40,707,133 UART: [rt] Runtime listening for mailbox commands...
40,709,303 >>> mbox cmd response data (120 bytes)
42,757,864 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
42,857,701 UART:
42,858,056 UART: Running Caliptra ROM ...
42,859,110 UART:
42,859,319 UART: [state] CFI Enabled
42,874,351 UART: [state] LifecycleState = Unprovisioned
42,876,188 UART: [state] DebugLocked = No
42,878,032 UART: [state] WD Timer not started. Device not locked for debugging
42,883,298 UART: [kat] SHA2-256
43,073,180 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,083,963 UART: [kat] ++
43,084,430 UART: [kat] sha1
43,095,770 UART: [kat] SHA2-256
43,098,780 UART: [kat] SHA2-384
43,105,480 UART: [kat] SHA2-512-ACC
43,108,061 UART: [kat] ECC-384
45,548,692 UART: [kat] HMAC-384Kdf
45,561,746 UART: [kat] LMS
46,093,326 UART: [kat] --
46,096,874 UART: [update-reset] ++
49,121,329 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,124,483 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
49,517,252 >>> mbox cmd response: success
49,517,643 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,518,408 UART: [update-reset] Copying MAN_2 To MAN_1
49,555,980 UART: [update-reset Success] --
49,560,972 UART: [state] Locking Datavault
49,563,313 UART: [state] Locking PCR0, PCR1 and PCR31
49,565,455 UART: [state] Locking ICCM
49,568,042 UART: [exit] Launching FMC @ 0x40000130
49,576,727 UART:
49,577,002 UART: Running Caliptra FMC ...
49,578,115 UART:
49,578,296 UART: [state] CFI Enabled
49,622,745 UART: [art] Extend RT PCRs Done
49,623,891 UART: [art] Lock RT PCRs Done
49,625,126 UART: [art] Populate DV Done
49,630,420 UART: [fht] FMC Alias Private Key: 7
49,632,020 UART: [art] Derive CDI
49,632,836 UART: [art] Store in in slot 0x4
49,675,318 UART: [art] Derive Key Pair
49,676,355 UART: [art] Store priv key in slot 0x5
52,102,991 UART: [art] Derive Key Pair - Done
52,115,818 UART: [art] Signing Cert with AUTHO
52,117,116 UART: RITY.KEYID = 7
53,822,581 UART: [art] Erasing AUTHORITY.KEYID = 7
53,824,091 UART: [art] PUB.X = 0BBB1C87D4C58618E1C8C00A2364C48A47DF8A829D0605DB5FC741C05EB0078E88BD464885422FC0EDC538C21F413F53
53,831,342 UART: [art] PUB.Y = BBA85F6ACB4123498CE95C4158945459AF7597358B2CCC88D0D45F03D6D16BA4914B0A7AD4B0930A28FA0CB0400DF564
53,838,574 UART: [art] SIG.R = 0485784C598CBCFD1F27E6B310D4E5AEBF44E0FA5C9548672EF48DC8ED9F8B530AF198E3BEDC1D63113348C7D49735B2
53,845,991 UART: [art] SIG.S = 234EDF536EF785D924A2DE15FA7C52001D8C6AFFA706BD76C4CFDF900613AF50ACC062C9E273D8B0792DBFF27A94815B
54,824,083 UART: mbox::rt_entry...
54,825,037 UART: ____ _ _ _ ____ _____
54,826,970 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,828,975 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,830,831 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,832,754 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,834,799 UART: |_|
54,835,609 UART:
55,120,967 UART: [rt] Runtime listening for mailbox commands...
55,123,081 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,719 writing to cptra_bootfsm_go
3,757,903 ready_for_fw is high
3,758,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,954,577 >>> mbox cmd response: success
19,208,498 UART:
19,208,895 UART: Running Caliptra FMC ...
19,209,994 UART:
19,210,148 UART: [state] CFI Enabled
19,218,112 UART: [fht] FMC Alias Private Key: 7
20,974,626 UART: [art] Extend RT PCRs Done
20,975,857 UART: [art] Lock RT PCRs Done
20,977,459 UART: [art] Populate DV Done
20,983,037 UART: [fht] FMC Alias Private Key: 7
20,984,633 UART: [art] Derive CDI
20,985,374 UART: [art] Store in in slot 0x4
21,028,233 UART: [art] Derive Key Pair
21,029,235 UART: [art] Store priv key in slot 0x5
23,456,057 UART: [art] Derive Key Pair - Done
23,469,000 UART: [art] Signing Cert with AUTHO
23,470,303 UART: RITY.KEYID = 7
25,175,729 UART: [art] Erasing AUTHORITY.KEYID = 7
25,177,238 UART: [art] PUB.X = 20C39D896254440E15B462E477159149207D7D237A251B63EEE8EC6EC61950B02C3D679778FE4BE155EF03575BCE1615
25,184,478 UART: [art] PUB.Y = CD701F6D0CA85A4C6B81B4F581C728905050CA8A1A82B0BB65118EFF77205DF098D18EACE999DFB96F8EB3854AB5C549
25,191,764 UART: [art] SIG.R = D113DF349B55EC9012A8B835FD4DDE28873CDD0DD66DC3FAB2BB93C905695CF2EB9D7C0E5C4579B8E491EE35A04759DC
25,199,248 UART: [art] SIG.S = 11A0FFE7E7F39CB9730F4B5949AA6C0627EC288F1AD6F3C2B0228B225B5EDA58E28C9CBCCDBA956DF7B115C64DAD44FB
26,178,070 UART: Caliptra RT
26,178,763 UART: [state] CFI Enabled
26,297,174 UART: [rt] RT listening for mailbox commands...
26,299,454 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,330,028 UART: [rt]cmd =0x54514754, len=24
26,332,496 >>> mbox cmd response data (8 bytes)
28,381,542 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
35,291,239 >>> mbox cmd response: success
35,291,802 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,327,205 UART:
35,327,492 UART: Running Caliptra FMC ...
35,328,574 UART:
35,328,755 UART: [state] CFI Enabled
35,372,739 UART: [art] Extend RT PCRs Done
35,373,956 UART: [art] Lock RT PCRs Done
35,375,459 UART: [art] Populate DV Done
35,380,766 UART: [fht] FMC Alias Private Key: 7
35,382,411 UART: [art] Derive CDI
35,383,225 UART: [art] Store in in slot 0x4
35,425,707 UART: [art] Derive Key Pair
35,426,706 UART: [art] Store priv key in slot 0x5
37,853,652 UART: [art] Derive Key Pair - Done
37,866,593 UART: [art] Signing Cert with AUTHO
37,867,894 UART: RITY.KEYID = 7
39,573,220 UART: [art] Erasing AUTHORITY.KEYID = 7
39,574,720 UART: [art] PUB.X = B0BA512BB4E73E3083736687277D71789DABAD3727683AC2257C7E7D1634AC47FA1D8B5880516DD1A777199624DA0E02
39,581,972 UART: [art] PUB.Y = 6AE4A246C2E2E6DAA343600635FD39E0CD38CAF7F28F0DB36699DCA8D9A703B1DED543F11C659BCD1E4AF09C27F93C01
39,589,256 UART: [art] SIG.R = DE831E8BA8272916CFDC40755285341CF5BD8E721074821EB5351C605E01386E3989F3F0D876B5F873E0AC18FA901D9F
39,596,704 UART: [art] SIG.S = 5F4AC610621222A504B27CB725C88315DB7BE8A66C2B5ECDA82A4ECE712A368C5EF40B6A31BF4BE0777572661315CC9C
40,574,772 UART: mbox::rt_entry...
40,575,736 UART: ____ _ _ _ ____ _____
40,577,719 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,579,726 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,581,657 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,583,593 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,585,525 UART: |_|
40,586,358 UART:
40,870,319 UART: [rt] Runtime listening for mailbox commands...
40,872,441 >>> mbox cmd response data (120 bytes)
42,919,107 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
49,844,830 >>> mbox cmd response: success
49,845,333 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,881,812 UART:
49,882,106 UART: Running Caliptra FMC ...
49,883,229 UART:
49,883,392 UART: [state] CFI Enabled
49,927,568 UART: [art] Extend RT PCRs Done
49,928,819 UART: [art] Lock RT PCRs Done
49,930,534 UART: [art] Populate DV Done
49,935,730 UART: [fht] FMC Alias Private Key: 7
49,937,381 UART: [art] Derive CDI
49,938,124 UART: [art] Store in in slot 0x4
49,981,099 UART: [art] Derive Key Pair
49,982,104 UART: [art] Store priv key in slot 0x5
52,408,422 UART: [art] Derive Key Pair - Done
52,421,579 UART: [art] Signing Cert with AUTHO
52,422,895 UART: RITY.KEYID = 7
54,128,382 UART: [art] Erasing AUTHORITY.KEYID = 7
54,129,885 UART: [art] PUB.X = 1C6B51A7CBAF0849D612DEF6E6418B71F83DDB0F553D0B3D6C22DFF16DA02C4FF977918FCA89D9E9E28A59A80CD56A44
54,137,191 UART: [art] PUB.Y = C452DCF5121C9FCD1B3EC9E484B1D2D6934298842A18E4E265577273625FC904037AF9D2CD6D975A6432D3D1C5567EB5
54,144,473 UART: [art] SIG.R = C0B058A7DBE648B4CE992F433592D926751E11ED94EA617BC839671DA460FF7DAE2B9880890297817BA40F93F159C50B
54,151,806 UART: [art] SIG.S = F5ED2B9AFEDA040EECDF60B2D86120EB312AAC5E1550C7B4CA5408D85917A7360E5959B8921F19C280202DDEC5202D7B
55,129,976 UART: mbox::rt_entry...
55,130,946 UART: ____ _ _ _ ____ _____
55,132,933 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,134,903 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,136,834 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,138,688 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,140,611 UART: |_|
55,141,417 UART:
55,429,318 UART: [rt] Runtime listening for mailbox commands...
55,431,437 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,189 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,783 UART: [kat] SHA2-256
881,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,829 UART: [kat] ++
885,981 UART: [kat] sha1
890,233 UART: [kat] SHA2-256
892,171 UART: [kat] SHA2-384
894,952 UART: [kat] SHA2-512-ACC
896,853 UART: [kat] ECC-384
902,392 UART: [kat] HMAC-384Kdf
906,848 UART: [kat] LMS
1,475,044 UART: [kat] --
1,475,915 UART: [cold-reset] ++
1,476,441 UART: [fht] Storing FHT @ 0x50003400
1,479,180 UART: [idev] ++
1,479,348 UART: [idev] CDI.KEYID = 6
1,479,708 UART: [idev] SUBJECT.KEYID = 7
1,480,132 UART: [idev] UDS.KEYID = 0
1,480,477 ready_for_fw is high
1,480,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,062 UART: [idev] Erasing UDS.KEYID = 0
1,504,260 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,000 UART: [idev] --
1,513,997 UART: [ldev] ++
1,514,165 UART: [ldev] CDI.KEYID = 6
1,514,528 UART: [ldev] SUBJECT.KEYID = 5
1,514,954 UART: [ldev] AUTHORITY.KEYID = 7
1,515,417 UART: [ldev] FE.KEYID = 1
1,520,697 UART: [ldev] Erasing FE.KEYID = 1
1,546,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,264 UART: [ldev] --
1,585,711 UART: [fwproc] Waiting for Commands...
1,586,486 UART: [fwproc] Received command 0x46574c44
1,587,277 UART: [fwproc] Received Image of size 114168 bytes
2,885,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,145 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,176 >>> mbox cmd response: success
3,078,280 UART: [afmc] ++
3,078,448 UART: [afmc] CDI.KEYID = 6
3,078,810 UART: [afmc] SUBJECT.KEYID = 7
3,079,235 UART: [afmc] AUTHORITY.KEYID = 5
3,113,600 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,706 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,486 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,214 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,099 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,789 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,660 UART: [afmc] --
3,156,696 UART: [cold-reset] --
3,157,456 UART: [state] Locking Datavault
3,158,629 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,233 UART: [state] Locking ICCM
3,159,807 UART: [exit] Launching FMC @ 0x40000130
3,165,136 UART:
3,165,152 UART: Running Caliptra FMC ...
3,165,560 UART:
3,165,614 UART: [state] CFI Enabled
3,176,115 UART: [fht] FMC Alias Private Key: 7
3,284,210 UART: [art] Extend RT PCRs Done
3,284,638 UART: [art] Lock RT PCRs Done
3,285,958 UART: [art] Populate DV Done
3,294,073 UART: [fht] FMC Alias Private Key: 7
3,295,155 UART: [art] Derive CDI
3,295,435 UART: [art] Store in in slot 0x4
3,381,056 UART: [art] Derive Key Pair
3,381,416 UART: [art] Store priv key in slot 0x5
3,394,372 UART: [art] Derive Key Pair - Done
3,409,003 UART: [art] Signing Cert with AUTHO
3,409,483 UART: RITY.KEYID = 7
3,424,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,324 UART: [art] PUB.X = AE88239E5DE351C858E9F6EDB38CD24817677092F16565874D591E1DDBC0B979478DA33D865237634A449B0ED5F85243
3,432,087 UART: [art] PUB.Y = 8B1CBB24320F14A6C29023FD5C75EB4A8996E1AC727A33B3E329E6ABDC6B54D69C7E74F8B0A974821FABAACD8F9424FA
3,439,054 UART: [art] SIG.R = 216D85B64E9A11379591ED7AB4AA935700BD3032B114FF173439E5524721F04786BC092AE9CB86BBE0113EE3FF1341B1
3,445,799 UART: [art] SIG.S = CC957657DD4E8D47A8843B08CA228226D4E5AC7E89B0DED8AB6C195E480D05323430A396D796F0D7D227CD7F5DFB8100
3,469,921 UART: Caliptra RT
3,470,174 UART: [state] CFI Enabled
3,578,445 UART: [rt] RT listening for mailbox commands...
3,579,115 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,249 UART: [rt]cmd =0x54514754, len=24
3,611,596 >>> mbox cmd response data (8 bytes)
3,611,597 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,211 UART:
3,612,227 UART: Running Caliptra ROM ...
3,612,635 UART:
3,612,689 UART: [state] CFI Enabled
3,614,901 UART: [state] LifecycleState = Unprovisioned
3,615,556 UART: [state] DebugLocked = No
3,616,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,617,853 UART: [kat] SHA2-256
4,411,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,415,899 UART: [kat] ++
4,416,051 UART: [kat] sha1
4,420,501 UART: [kat] SHA2-256
4,422,439 UART: [kat] SHA2-384
4,425,208 UART: [kat] SHA2-512-ACC
4,427,108 UART: [kat] ECC-384
4,432,635 UART: [kat] HMAC-384Kdf
4,437,273 UART: [kat] LMS
5,005,469 UART: [kat] --
5,006,434 UART: [update-reset] ++
5,930,188 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,931,326 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,027,502 >>> mbox cmd response: success
6,027,502 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,027,607 UART: [update-reset] Copying MAN_2 To MAN_1
6,035,621 UART: [update-reset Success] --
6,036,648 UART: [state] Locking Datavault
6,037,526 UART: [state] Locking PCR0, PCR1 and PCR31
6,038,130 UART: [state] Locking ICCM
6,038,638 UART: [exit] Launching FMC @ 0x40000130
6,043,967 UART:
6,043,983 UART: Running Caliptra FMC ...
6,044,391 UART:
6,044,445 UART: [state] CFI Enabled
6,133,254 UART: [art] Extend RT PCRs Done
6,133,682 UART: [art] Lock RT PCRs Done
6,134,825 UART: [art] Populate DV Done
6,143,090 UART: [fht] FMC Alias Private Key: 7
6,144,246 UART: [art] Derive CDI
6,144,526 UART: [art] Store in in slot 0x4
6,229,893 UART: [art] Derive Key Pair
6,230,253 UART: [art] Store priv key in slot 0x5
6,242,565 UART: [art] Derive Key Pair - Done
6,257,516 UART: [art] Signing Cert with AUTHO
6,257,996 UART: RITY.KEYID = 7
6,273,348 UART: [art] Erasing AUTHORITY.KEYID = 7
6,274,113 UART: [art] PUB.X = 481DB96C0FC18EC7BA3D8254045B36A22EDBFD910B6DE1F1B4EC93B1FA3A974AB09DFA26ED633286DAA5F640BCCB14E4
6,280,900 UART: [art] PUB.Y = ECE7E8826E1FA0D0FD3CB458A4E10944A5C03A400A8E1E6DE77448C15EFA463333622BAA05DEB415E754EA1F8DBE2418
6,287,857 UART: [art] SIG.R = D04AD547E1072680BC641BC04B9A4925005E90DF706BC7F667896B61D66488C461C7AB4B8B95DF17F5060D0985CBDAB4
6,294,597 UART: [art] SIG.S = 8F5B0D0D6F3DDC30F89BBB91B3D914F575467A0F9E8E558851AA21B4E2BD8209002C08EB805337D9F1F4C37F94A502A2
6,317,834 UART: mbox::rt_entry...
6,318,206 UART: ____ _ _ _ ____ _____
6,318,990 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,319,790 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,320,558 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,321,326 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,322,094 UART: |_|
6,322,406 UART:
6,602,463 UART: [rt] Runtime listening for mailbox commands...
6,603,700 >>> mbox cmd response data (120 bytes)
6,603,701 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
6,603,815 UART:
6,603,831 UART: Running Caliptra ROM ...
6,604,239 UART:
6,604,293 UART: [state] CFI Enabled
6,606,879 UART: [state] LifecycleState = Unprovisioned
6,607,534 UART: [state] DebugLocked = No
6,608,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,609,785 UART: [kat] SHA2-256
7,403,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,407,831 UART: [kat] ++
7,407,983 UART: [kat] sha1
7,412,075 UART: [kat] SHA2-256
7,414,013 UART: [kat] SHA2-384
7,416,748 UART: [kat] SHA2-512-ACC
7,418,648 UART: [kat] ECC-384
7,424,169 UART: [kat] HMAC-384Kdf
7,428,731 UART: [kat] LMS
7,996,927 UART: [kat] --
7,997,924 UART: [update-reset] ++
8,921,800 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,923,018 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
9,019,194 >>> mbox cmd response: success
9,019,194 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,019,305 UART: [update-reset] Copying MAN_2 To MAN_1
9,027,319 UART: [update-reset Success] --
9,028,132 UART: [state] Locking Datavault
9,029,064 UART: [state] Locking PCR0, PCR1 and PCR31
9,029,668 UART: [state] Locking ICCM
9,030,264 UART: [exit] Launching FMC @ 0x40000130
9,035,593 UART:
9,035,609 UART: Running Caliptra FMC ...
9,036,017 UART:
9,036,071 UART: [state] CFI Enabled
9,125,194 UART: [art] Extend RT PCRs Done
9,125,622 UART: [art] Lock RT PCRs Done
9,126,839 UART: [art] Populate DV Done
9,135,282 UART: [fht] FMC Alias Private Key: 7
9,136,412 UART: [art] Derive CDI
9,136,692 UART: [art] Store in in slot 0x4
9,222,285 UART: [art] Derive Key Pair
9,222,645 UART: [art] Store priv key in slot 0x5
9,235,555 UART: [art] Derive Key Pair - Done
9,250,326 UART: [art] Signing Cert with AUTHO
9,250,806 UART: RITY.KEYID = 7
9,265,810 UART: [art] Erasing AUTHORITY.KEYID = 7
9,266,575 UART: [art] PUB.X = 2DCCF1DAB431802EE58D0B0E831F36A3642BE2ACC14E9AD73CB65E774ECBE77489CE25438956E8D45046B1A81A18FEED
9,273,357 UART: [art] PUB.Y = 2C2A610C872917184CA260E2661639F4C64BCD05C388F0E0005A60679E2F4497E99DECFF94B36B67DF9174B458407084
9,280,273 UART: [art] SIG.R = 2DAC8B749C154642866A16F694F9F06D96AEA5375299E24C13E074AD26BBDF7A2D36C36D30F677687164F936EBD65438
9,287,043 UART: [art] SIG.S = 9433C7B55563156A8B2BCDC63FEE1A5119036EF1068FADDDE3EF65A917BDB26D0E2BF581C4773B73C1E85CEABF2DC992
9,310,527 UART: mbox::rt_entry...
9,310,899 UART: ____ _ _ _ ____ _____
9,311,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,312,483 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,313,251 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,314,019 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,314,787 UART: |_|
9,315,099 UART:
9,595,723 UART: [rt] Runtime listening for mailbox commands...
9,596,960 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,571 ready_for_fw is high
1,362,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,682 >>> mbox cmd response: success
2,987,962 UART:
2,987,978 UART: Running Caliptra FMC ...
2,988,386 UART:
2,988,440 UART: [state] CFI Enabled
2,999,013 UART: [fht] FMC Alias Private Key: 7
3,107,112 UART: [art] Extend RT PCRs Done
3,107,540 UART: [art] Lock RT PCRs Done
3,108,970 UART: [art] Populate DV Done
3,117,581 UART: [fht] FMC Alias Private Key: 7
3,118,665 UART: [art] Derive CDI
3,118,945 UART: [art] Store in in slot 0x4
3,204,852 UART: [art] Derive Key Pair
3,205,212 UART: [art] Store priv key in slot 0x5
3,218,434 UART: [art] Derive Key Pair - Done
3,232,940 UART: [art] Signing Cert with AUTHO
3,233,420 UART: RITY.KEYID = 7
3,248,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,717 UART: [art] PUB.X = A44D0226FB70F786DBAC20BEB733B768F3BAE40ACB299F3FFEF27DF92E4F2D274B21A1C1ECA5DCA212A990AC202C25CC
3,256,509 UART: [art] PUB.Y = 8394603AB4981D5BB979C4440546F11208A8382EA0C7F175BDBE6B85303A1CC470BBB505C75DAE8FEBB6C1BDF2AF4CCA
3,263,468 UART: [art] SIG.R = 23D5880624C77542774B35995FC17B43357AE70FA0BC1CC75D02FB50D1A35A0B7AF95A456F9AC0EAE7D457B349819B01
3,270,227 UART: [art] SIG.S = C3B7959103B089CF6FFBD05D7E573CCABE14C5B29760F11C9AE75CEB7F6E45575088A9453BECDBC5780491A49584651F
3,294,332 UART: Caliptra RT
3,294,585 UART: [state] CFI Enabled
3,402,194 UART: [rt] RT listening for mailbox commands...
3,402,864 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,810 UART: [rt]cmd =0x54514754, len=24
3,434,927 >>> mbox cmd response data (8 bytes)
3,434,928 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,733,695 >>> mbox cmd response: success
5,733,695 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,746,890 UART:
5,746,906 UART: Running Caliptra FMC ...
5,747,314 UART:
5,747,368 UART: [state] CFI Enabled
5,836,241 UART: [art] Extend RT PCRs Done
5,836,669 UART: [art] Lock RT PCRs Done
5,838,180 UART: [art] Populate DV Done
5,846,531 UART: [fht] FMC Alias Private Key: 7
5,847,577 UART: [art] Derive CDI
5,847,857 UART: [art] Store in in slot 0x4
5,933,234 UART: [art] Derive Key Pair
5,933,594 UART: [art] Store priv key in slot 0x5
5,947,024 UART: [art] Derive Key Pair - Done
5,961,538 UART: [art] Signing Cert with AUTHO
5,962,018 UART: RITY.KEYID = 7
5,977,474 UART: [art] Erasing AUTHORITY.KEYID = 7
5,978,239 UART: [art] PUB.X = 5D30E2ABA76B652055003E3C190628BA69A1945B34BE18F622677B041208607C1F473D9ACB72F752C598FA04B379A652
5,984,969 UART: [art] PUB.Y = AC5ACDF3976EDB0AA2F3AC9C3DF60C5BCA20FB7AAC0566BDF4104121F8352D33E5E89D4E8B0228AF8F5CEDECEAC3120A
5,991,938 UART: [art] SIG.R = 0AC2C892FA384BA3F6385645CFC8F5F6D399CC39A7110A8F5B0FBB330713B42DCA22DCAA4C8D14DDD0AF0980635F43A1
5,998,711 UART: [art] SIG.S = 9DB0D60572592E1DAF367532D4B49127096D02CBFBF5EBF51B687E34DAEA402321E6D3D6720D934AB1DC9F12DF5244AF
6,022,260 UART: mbox::rt_entry...
6,022,632 UART: ____ _ _ _ ____ _____
6,023,416 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,024,216 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,024,984 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,025,752 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,026,520 UART: |_|
6,026,832 UART:
6,306,766 UART: [rt] Runtime listening for mailbox commands...
6,308,003 >>> mbox cmd response data (120 bytes)
6,308,004 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,604,097 >>> mbox cmd response: success
8,604,097 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,617,466 UART:
8,617,482 UART: Running Caliptra FMC ...
8,617,890 UART:
8,617,944 UART: [state] CFI Enabled
8,706,881 UART: [art] Extend RT PCRs Done
8,707,309 UART: [art] Lock RT PCRs Done
8,708,578 UART: [art] Populate DV Done
8,716,969 UART: [fht] FMC Alias Private Key: 7
8,718,145 UART: [art] Derive CDI
8,718,425 UART: [art] Store in in slot 0x4
8,803,806 UART: [art] Derive Key Pair
8,804,166 UART: [art] Store priv key in slot 0x5
8,817,318 UART: [art] Derive Key Pair - Done
8,831,937 UART: [art] Signing Cert with AUTHO
8,832,417 UART: RITY.KEYID = 7
8,847,897 UART: [art] Erasing AUTHORITY.KEYID = 7
8,848,662 UART: [art] PUB.X = 528B1EE3A2D4B24EB4445DB86AA9B3BE061508983655382C31E9B3DA32A0FE50EB16D9D901E75071FEF8E739F6710BB2
8,855,428 UART: [art] PUB.Y = B0CC4479F543A361EAA55E8DEF5E75464246C980FAF0AEFA4395124A0A2BA165374D713C0ACD5E00EE5E5F19692D8747
8,862,360 UART: [art] SIG.R = 01A04C161E772E7EA5370247937DF953383EE65A6DD39E29D127721AC96946A901145F2B1D2FB104C861D56FBEDBF495
8,869,118 UART: [art] SIG.S = DD39F245DCA47A9BA4DD52D4180ECAD2C0A1D2A8519EFCB918B1A09A4740DB7994D3FE83DABA5BD5B1E0382F69DA1FEA
8,892,596 UART: mbox::rt_entry...
8,892,968 UART: ____ _ _ _ ____ _____
8,893,752 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,894,552 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,895,320 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,896,088 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,896,856 UART: |_|
8,897,168 UART:
9,181,364 UART: [rt] Runtime listening for mailbox commands...
9,182,601 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,776 UART: [kat] SHA2-256
892,714 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
902,949 UART: [kat] HMAC-384Kdf
907,785 UART: [kat] LMS
1,475,981 UART: [kat] --
1,476,746 UART: [cold-reset] ++
1,477,266 UART: [fht] Storing FHT @ 0x50003400
1,479,997 UART: [idev] ++
1,480,165 UART: [idev] CDI.KEYID = 6
1,480,525 UART: [idev] SUBJECT.KEYID = 7
1,480,949 UART: [idev] UDS.KEYID = 0
1,481,294 ready_for_fw is high
1,481,294 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,077 UART: [idev] Erasing UDS.KEYID = 0
1,506,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,929 UART: [idev] --
1,515,874 UART: [ldev] ++
1,516,042 UART: [ldev] CDI.KEYID = 6
1,516,405 UART: [ldev] SUBJECT.KEYID = 5
1,516,831 UART: [ldev] AUTHORITY.KEYID = 7
1,517,294 UART: [ldev] FE.KEYID = 1
1,523,000 UART: [ldev] Erasing FE.KEYID = 1
1,548,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,377 UART: [ldev] --
1,587,858 UART: [fwproc] Waiting for Commands...
1,588,641 UART: [fwproc] Received command 0x46574c44
1,589,432 UART: [fwproc] Received Image of size 114168 bytes
2,886,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,772 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,943,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,615 >>> mbox cmd response: success
3,079,777 UART: [afmc] ++
3,079,945 UART: [afmc] CDI.KEYID = 6
3,080,307 UART: [afmc] SUBJECT.KEYID = 7
3,080,732 UART: [afmc] AUTHORITY.KEYID = 5
3,116,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,563 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,133,343 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,139,071 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,956 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,646 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,731 UART: [afmc] --
3,159,641 UART: [cold-reset] --
3,160,197 UART: [state] Locking Datavault
3,161,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,978 UART: [state] Locking ICCM
3,162,440 UART: [exit] Launching FMC @ 0x40000130
3,167,769 UART:
3,167,785 UART: Running Caliptra FMC ...
3,168,193 UART:
3,168,336 UART: [state] CFI Enabled
3,178,827 UART: [fht] FMC Alias Private Key: 7
3,286,338 UART: [art] Extend RT PCRs Done
3,286,766 UART: [art] Lock RT PCRs Done
3,288,388 UART: [art] Populate DV Done
3,296,819 UART: [fht] FMC Alias Private Key: 7
3,297,889 UART: [art] Derive CDI
3,298,169 UART: [art] Store in in slot 0x4
3,384,062 UART: [art] Derive Key Pair
3,384,422 UART: [art] Store priv key in slot 0x5
3,397,870 UART: [art] Derive Key Pair - Done
3,412,700 UART: [art] Signing Cert with AUTHO
3,413,180 UART: RITY.KEYID = 7
3,428,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,315 UART: [art] PUB.X = 3D695A05A62D5300C87502DB3C7347F93FC844DF42F4B206BFEAED9E2227110FABFC1D4DECF5D990467D26E793461A4A
3,436,063 UART: [art] PUB.Y = D1D197015F6E949B3C38E34F959E48C068552E410214F277ED40830482BB3B779E2004DB3051E79FEA5D4B581DE1DBA5
3,443,001 UART: [art] SIG.R = BDA2D3944C6E01C7869FDEDBD070DAE4B5A47FABBA797074F11CB13980E5ABAB1BB6EACE6908DBE7CB92F2EB98BCCE26
3,449,801 UART: [art] SIG.S = BA74986CC8C4A2CB76E8D298336343696B01E3BFB6CE0470CC90AC845F5F407C9B0953F75D0C5BFC3EDDE5E84942011A
3,474,185 UART: Caliptra RT
3,474,530 UART: [state] CFI Enabled
3,583,218 UART: [rt] RT listening for mailbox commands...
3,583,888 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,613,828 UART: [rt]cmd =0x54514754, len=24
3,615,781 >>> mbox cmd response data (8 bytes)
3,615,782 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,616,352 UART:
3,616,368 UART: Running Caliptra ROM ...
3,616,776 UART:
3,616,917 UART: [state] CFI Enabled
3,619,705 UART: [state] LifecycleState = Unprovisioned
3,620,360 UART: [state] DebugLocked = No
3,621,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,622,797 UART: [kat] SHA2-256
4,416,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,420,843 UART: [kat] ++
4,420,995 UART: [kat] sha1
4,425,295 UART: [kat] SHA2-256
4,427,233 UART: [kat] SHA2-384
4,429,906 UART: [kat] SHA2-512-ACC
4,431,806 UART: [kat] ECC-384
4,437,611 UART: [kat] HMAC-384Kdf
4,442,287 UART: [kat] LMS
5,010,483 UART: [kat] --
5,011,320 UART: [update-reset] ++
5,935,672 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,936,870 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
6,033,046 >>> mbox cmd response: success
6,033,046 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,033,343 UART: [update-reset] Copying MAN_2 To MAN_1
6,041,357 UART: [update-reset Success] --
6,042,164 UART: [state] Locking Datavault
6,043,056 UART: [state] Locking PCR0, PCR1 and PCR31
6,043,660 UART: [state] Locking ICCM
6,044,112 UART: [exit] Launching FMC @ 0x40000130
6,049,441 UART:
6,049,457 UART: Running Caliptra FMC ...
6,049,865 UART:
6,050,008 UART: [state] CFI Enabled
6,138,977 UART: [art] Extend RT PCRs Done
6,139,405 UART: [art] Lock RT PCRs Done
6,140,812 UART: [art] Populate DV Done
6,149,027 UART: [fht] FMC Alias Private Key: 7
6,149,983 UART: [art] Derive CDI
6,150,263 UART: [art] Store in in slot 0x4
6,235,760 UART: [art] Derive Key Pair
6,236,120 UART: [art] Store priv key in slot 0x5
6,249,882 UART: [art] Derive Key Pair - Done
6,264,610 UART: [art] Signing Cert with AUTHO
6,265,090 UART: RITY.KEYID = 7
6,280,352 UART: [art] Erasing AUTHORITY.KEYID = 7
6,281,117 UART: [art] PUB.X = 78A121159768329B8D873BE524CF0E0B15CF8328BB9CBA3A1E05E96B0A1CE299CC938FE403F5760C0D2DCF475F6A51D1
6,287,876 UART: [art] PUB.Y = 3D8AFBEEB5966CAC12D93FF4FE4F1A3ABAE0C7CBF24461C64461E8605AEAF6421B196D011BC618260A05AE4C42CE628A
6,294,839 UART: [art] SIG.R = 12D0BCB291212B0055964DC104A763501DE4F13D823562326750776B063DF6D9BBA288F8E54E00857C4C80583D947E0E
6,301,548 UART: [art] SIG.S = 90478F2F4BBE62A5E4AE8D4EF0ABD33518EF780986B15348A7FD69597CC9F982AC7399D8C2D4772588B07982A5CF3712
6,325,866 UART: mbox::rt_entry...
6,326,238 UART: ____ _ _ _ ____ _____
6,327,022 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,327,822 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,328,590 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,329,358 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,330,126 UART: |_|
6,330,438 UART:
6,612,200 UART: [rt] Runtime listening for mailbox commands...
6,613,437 >>> mbox cmd response data (120 bytes)
6,613,438 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
6,613,552 UART:
6,613,568 UART: Running Caliptra ROM ...
6,613,976 UART:
6,614,117 UART: [state] CFI Enabled
6,616,803 UART: [state] LifecycleState = Unprovisioned
6,617,458 UART: [state] DebugLocked = No
6,617,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,619,605 UART: [kat] SHA2-256
7,413,536 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,417,651 UART: [kat] ++
7,417,803 UART: [kat] sha1
7,421,869 UART: [kat] SHA2-256
7,423,807 UART: [kat] SHA2-384
7,426,432 UART: [kat] SHA2-512-ACC
7,428,332 UART: [kat] ECC-384
7,434,067 UART: [kat] HMAC-384Kdf
7,438,633 UART: [kat] LMS
8,006,829 UART: [kat] --
8,007,604 UART: [update-reset] ++
8,931,788 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,933,038 UART: [update-reset] Loading Runtime at address 0x40005000 len 53848
9,029,214 >>> mbox cmd response: success
9,029,214 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,029,433 UART: [update-reset] Copying MAN_2 To MAN_1
9,037,447 UART: [update-reset Success] --
9,038,672 UART: [state] Locking Datavault
9,039,446 UART: [state] Locking PCR0, PCR1 and PCR31
9,040,050 UART: [state] Locking ICCM
9,040,664 UART: [exit] Launching FMC @ 0x40000130
9,045,993 UART:
9,046,009 UART: Running Caliptra FMC ...
9,046,417 UART:
9,046,560 UART: [state] CFI Enabled
9,135,877 UART: [art] Extend RT PCRs Done
9,136,305 UART: [art] Lock RT PCRs Done
9,137,580 UART: [art] Populate DV Done
9,145,677 UART: [fht] FMC Alias Private Key: 7
9,146,745 UART: [art] Derive CDI
9,147,025 UART: [art] Store in in slot 0x4
9,232,764 UART: [art] Derive Key Pair
9,233,124 UART: [art] Store priv key in slot 0x5
9,246,466 UART: [art] Derive Key Pair - Done
9,261,085 UART: [art] Signing Cert with AUTHO
9,261,565 UART: RITY.KEYID = 7
9,277,067 UART: [art] Erasing AUTHORITY.KEYID = 7
9,277,832 UART: [art] PUB.X = 1733CD03747B7EEA759B33F4F0C0B5EDB2801094C8886D1AF41CB85706C53E27FDE71143FC928B5CE6A05EFBC0C25327
9,284,606 UART: [art] PUB.Y = 0C8574A1BD8C952CB07567CA410F23D31F68001C580BC278E767D2399C5F61C90DD165446F6D172BDE8DA230611462DF
9,291,522 UART: [art] SIG.R = 5004410D66DD9830DE00F8799D1B5F8FCD4234BE073A5E3CAC1DAEC5FA955D2BB3CEE347F7511C08EFEE3EFD535299BC
9,298,280 UART: [art] SIG.S = B1CFE973F6A8364AD8CB23242508EE33F086EB5E56D2D3F890A796D78B79EC09C11384A0BEBBF4898C84CF6E95364902
9,322,058 UART: mbox::rt_entry...
9,322,430 UART: ____ _ _ _ ____ _____
9,323,214 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,324,014 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,324,782 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,325,550 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,326,318 UART: |_|
9,326,630 UART:
9,605,602 UART: [rt] Runtime listening for mailbox commands...
9,606,839 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 ready_for_fw is high
1,363,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,979 >>> mbox cmd response: success
2,987,139 UART:
2,987,155 UART: Running Caliptra FMC ...
2,987,563 UART:
2,987,706 UART: [state] CFI Enabled
2,998,339 UART: [fht] FMC Alias Private Key: 7
3,106,574 UART: [art] Extend RT PCRs Done
3,107,002 UART: [art] Lock RT PCRs Done
3,108,574 UART: [art] Populate DV Done
3,116,777 UART: [fht] FMC Alias Private Key: 7
3,117,751 UART: [art] Derive CDI
3,118,031 UART: [art] Store in in slot 0x4
3,203,878 UART: [art] Derive Key Pair
3,204,238 UART: [art] Store priv key in slot 0x5
3,217,254 UART: [art] Derive Key Pair - Done
3,232,376 UART: [art] Signing Cert with AUTHO
3,232,856 UART: RITY.KEYID = 7
3,248,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,965 UART: [art] PUB.X = 73D01D8C0D615BCE6E401C49ACA5CE1E11DB8596F31D238084FE2B655541BA156C4D3A610408062677B8EB7D20B88FA0
3,255,729 UART: [art] PUB.Y = 6F3D8B84FF7E455E90E3F7C0919CDD4E1418B12D8B8A32FF246D4A9D028AEC07AD0B057D1A5B0ABAB531A0A4A9308ABC
3,262,686 UART: [art] SIG.R = A9779F75D05ED94F334C47DB582EC9E4BA1C80A7222DA116BD7A525EDA6C8A7B8D6FAFDA47EABD8264238FDE82454AD0
3,269,478 UART: [art] SIG.S = E7C766699338925DE9DF602A9DE72B751230F14E3C576AC573857EDC62F71F94BA6CF840D476B27CA49B121E4FDFD942
3,293,351 UART: Caliptra RT
3,293,696 UART: [state] CFI Enabled
3,401,664 UART: [rt] RT listening for mailbox commands...
3,402,334 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,458 UART: [rt]cmd =0x54514754, len=24
3,434,433 >>> mbox cmd response data (8 bytes)
3,434,434 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,734,454 >>> mbox cmd response: success
5,734,454 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,747,673 UART:
5,747,689 UART: Running Caliptra FMC ...
5,748,097 UART:
5,748,240 UART: [state] CFI Enabled
5,837,501 UART: [art] Extend RT PCRs Done
5,837,929 UART: [art] Lock RT PCRs Done
5,838,944 UART: [art] Populate DV Done
5,847,263 UART: [fht] FMC Alias Private Key: 7
5,848,361 UART: [art] Derive CDI
5,848,641 UART: [art] Store in in slot 0x4
5,933,888 UART: [art] Derive Key Pair
5,934,248 UART: [art] Store priv key in slot 0x5
5,948,126 UART: [art] Derive Key Pair - Done
5,962,879 UART: [art] Signing Cert with AUTHO
5,963,359 UART: RITY.KEYID = 7
5,978,779 UART: [art] Erasing AUTHORITY.KEYID = 7
5,979,544 UART: [art] PUB.X = 7CFF23554059B62B32A9490101B234758C20AB28164A962B911A50AE1E3928826298590429247EB26376651E9FE1190B
5,986,284 UART: [art] PUB.Y = F568A987E5CB27B8FAB0C79B072FAA0E70CF35CDCFE518B961394B6630CB87CD54EECFCC73CD68149A7852EAD48EFB82
5,993,252 UART: [art] SIG.R = 69C4DEA2583ACD5A301DF5DEA1B4AB08A2F78EDDDDFEDC648C25F19B934750AC83279FC334A2C55D6A300A1E4296DC10
6,000,038 UART: [art] SIG.S = 8ADA827F5DA1670CC92047B4079E4D96449E37B9AA51A38AF474C051E7DFC22BFCB02F421A31D1D8F07E37EA9C2EF55F
6,023,727 UART: mbox::rt_entry...
6,024,099 UART: ____ _ _ _ ____ _____
6,024,883 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,025,683 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,026,451 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,027,219 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,027,987 UART: |_|
6,028,299 UART:
6,310,953 UART: [rt] Runtime listening for mailbox commands...
6,312,190 >>> mbox cmd response data (120 bytes)
6,312,191 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
8,610,201 >>> mbox cmd response: success
8,610,201 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,623,774 UART:
8,623,790 UART: Running Caliptra FMC ...
8,624,198 UART:
8,624,341 UART: [state] CFI Enabled
8,713,702 UART: [art] Extend RT PCRs Done
8,714,130 UART: [art] Lock RT PCRs Done
8,715,569 UART: [art] Populate DV Done
8,723,684 UART: [fht] FMC Alias Private Key: 7
8,724,634 UART: [art] Derive CDI
8,724,914 UART: [art] Store in in slot 0x4
8,810,771 UART: [art] Derive Key Pair
8,811,131 UART: [art] Store priv key in slot 0x5
8,824,897 UART: [art] Derive Key Pair - Done
8,839,668 UART: [art] Signing Cert with AUTHO
8,840,148 UART: RITY.KEYID = 7
8,854,730 UART: [art] Erasing AUTHORITY.KEYID = 7
8,855,495 UART: [art] PUB.X = 69F26DFF83E6E687124DB610DAF8778BDBD142AE1F5241039C4F5C9C98661900C38EB51298A3C5CBD5455DAB67D87A05
8,862,245 UART: [art] PUB.Y = 07C5E6AE7DE6CF2CCF76FC4469ED6CAB1076FEDF699D5CBBD023AEA034728FBDD508993491FE5CB235857B4E9D8F8CCC
8,869,217 UART: [art] SIG.R = 9C86EFAA85868D074AE589AD880BD5364676D6902E878F7DB51C66EBF316649334DB95F3EFABA51FCBD098368E4FE8CC
8,875,995 UART: [art] SIG.S = 0022A51CE1100E2F062BEDC1B2686AB15CA823D22592451522AB899845879ED000984329EFBA378796AF6053AA01C792
8,899,833 UART: mbox::rt_entry...
8,900,205 UART: ____ _ _ _ ____ _____
8,900,989 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,901,789 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,902,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,903,325 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,904,093 UART: |_|
8,904,405 UART:
9,188,009 UART: [rt] Runtime listening for mailbox commands...
9,189,246 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
893,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,251 UART: [kat] ++
897,403 UART: [kat] sha1
901,479 UART: [kat] SHA2-256
903,419 UART: [kat] SHA2-384
906,184 UART: [kat] SHA2-512-ACC
908,085 UART: [kat] ECC-384
917,512 UART: [kat] HMAC-384Kdf
921,952 UART: [kat] LMS
1,170,280 UART: [kat] --
1,171,377 UART: [cold-reset] ++
1,171,791 UART: [fht] FHT @ 0x50003400
1,174,466 UART: [idev] ++
1,174,634 UART: [idev] CDI.KEYID = 6
1,174,994 UART: [idev] SUBJECT.KEYID = 7
1,175,418 UART: [idev] UDS.KEYID = 0
1,175,763 ready_for_fw is high
1,175,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,150 UART: [idev] Erasing UDS.KEYID = 0
1,199,999 UART: [idev] Sha1 KeyId Algorithm
1,208,549 UART: [idev] --
1,209,609 UART: [ldev] ++
1,209,777 UART: [ldev] CDI.KEYID = 6
1,210,140 UART: [ldev] SUBJECT.KEYID = 5
1,210,566 UART: [ldev] AUTHORITY.KEYID = 7
1,211,029 UART: [ldev] FE.KEYID = 1
1,215,843 UART: [ldev] Erasing FE.KEYID = 1
1,241,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,861 UART: [ldev] --
1,281,238 UART: [fwproc] Wait for Commands...
1,281,834 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,302 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,843 >>> mbox cmd response: success
2,771,893 UART: [afmc] ++
2,772,061 UART: [afmc] CDI.KEYID = 6
2,772,423 UART: [afmc] SUBJECT.KEYID = 7
2,772,848 UART: [afmc] AUTHORITY.KEYID = 5
2,808,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,888 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,616 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,501 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,220 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,252 UART: [afmc] --
2,852,356 UART: [cold-reset] --
2,853,294 UART: [state] Locking Datavault
2,854,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,189 UART: [state] Locking ICCM
2,855,837 UART: [exit] Launching FMC @ 0x40000130
2,861,166 UART:
2,861,182 UART: Running Caliptra FMC ...
2,861,590 UART:
2,861,644 UART: [state] CFI Enabled
2,871,737 UART: [fht] FMC Alias Private Key: 7
2,979,438 UART: [art] Extend RT PCRs Done
2,979,866 UART: [art] Lock RT PCRs Done
2,981,310 UART: [art] Populate DV Done
2,989,599 UART: [fht] FMC Alias Private Key: 7
2,990,655 UART: [art] Derive CDI
2,990,935 UART: [art] Store in in slot 0x4
3,076,810 UART: [art] Derive Key Pair
3,077,170 UART: [art] Store priv key in slot 0x5
3,089,812 UART: [art] Derive Key Pair - Done
3,104,551 UART: [art] Signing Cert with AUTHO
3,105,031 UART: RITY.KEYID = 7
3,119,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,694 UART: [art] PUB.X = 1D663DF6507C8CFA735153E8794DD45DDEF2767A2E647A4DBC50948EFF2EAB1AF6FBF2DFF41D60D0E2376631581167B0
3,127,478 UART: [art] PUB.Y = 4720C7CA0F46A6F24AF4F220E53A853469A9C3AC9E727CD2FB27B0416156A302A065D224FDCAD58BB30A2CA1A0BB4748
3,134,431 UART: [art] SIG.R = C31F6850918E5E6C51E3C8469AD3C5FC57EAFDDEAEFDA15D305DBB755B6F2FB69FD33BA684E1909AF6795CAB9FD05813
3,141,225 UART: [art] SIG.S = 844EA96ED217F067B9A73EED11CB1CC9E77D5878B767766114957A52798003E363A4C514202A16BB0FE37970E8778141
3,165,378 UART: Caliptra RT
3,165,631 UART: [state] CFI Enabled
3,272,389 UART: [rt] RT listening for mailbox commands...
3,273,059 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,153 UART: [rt]cmd =0x54514754, len=24
3,305,294 >>> mbox cmd response data (8 bytes)
3,305,295 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,896 UART:
3,305,912 UART: Running Caliptra ROM ...
3,306,320 UART:
3,306,375 UART: [state] CFI Enabled
3,308,309 UART: [state] LifecycleState = Unprovisioned
3,308,964 UART: [state] DebugLocked = No
3,309,674 UART: [state] WD Timer not started. Device not locked for debugging
3,311,018 UART: [kat] SHA2-256
4,116,668 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,120,793 UART: [kat] ++
4,120,945 UART: [kat] sha1
4,125,059 UART: [kat] SHA2-256
4,126,999 UART: [kat] SHA2-384
4,129,754 UART: [kat] SHA2-512-ACC
4,131,654 UART: [kat] ECC-384
4,141,209 UART: [kat] HMAC-384Kdf
4,145,691 UART: [kat] LMS
4,394,019 UART: [kat] --
4,394,773 UART: [update-reset] ++
5,296,857 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,297,996 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,394,120 >>> mbox cmd response: success
5,394,120 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,394,299 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,313 UART: [update-reset Success] --
5,403,192 UART: [state] Locking Datavault
5,404,132 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,736 UART: [state] Locking ICCM
5,405,340 UART: [exit] Launching FMC @ 0x40000130
5,410,669 UART:
5,410,685 UART: Running Caliptra FMC ...
5,411,093 UART:
5,411,147 UART: [state] CFI Enabled
5,499,822 UART: [art] Extend RT PCRs Done
5,500,250 UART: [art] Lock RT PCRs Done
5,501,593 UART: [art] Populate DV Done
5,510,060 UART: [fht] FMC Alias Private Key: 7
5,511,018 UART: [art] Derive CDI
5,511,298 UART: [art] Store in in slot 0x4
5,596,793 UART: [art] Derive Key Pair
5,597,153 UART: [art] Store priv key in slot 0x5
5,610,607 UART: [art] Derive Key Pair - Done
5,625,067 UART: [art] Signing Cert with AUTHO
5,625,547 UART: RITY.KEYID = 7
5,641,029 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,794 UART: [art] PUB.X = A8A4834F1FE063AAF0F04ACDD38DC1A140683AE8759E6A3716D97751C4ABDB0BB9ACD99B6936C366D16A72D615B51636
5,648,573 UART: [art] PUB.Y = 7573C77FAE4E8E73305AB42F63FCB2BC86D82C20FB2DA9D0E5C6A867BAD001F28E5735098337F20A4B5FF63EFB9DF24F
5,655,532 UART: [art] SIG.R = 558B5A4D45677B3A15C8A3DC41D2888BB7C523BBFB21E49507CAED265249CDC344C41A42F0A166967605BBA65D56DD19
5,662,304 UART: [art] SIG.S = 9ABC025BFA2376CD107472DF0DEBE7BABBCCA01CBC7BCE4504F1AA965C888A497892856163ACE604DD34A6D8F67E38A3
5,685,857 UART: mbox::rt_entry...
5,686,229 UART: ____ _ _ _ ____ _____
5,687,013 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,687,813 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,688,581 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,689,349 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,690,117 UART: |_|
5,690,429 UART:
5,971,165 UART: [rt] Runtime listening for mailbox commands...
5,972,402 >>> mbox cmd response data (120 bytes)
5,972,403 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,972,514 UART:
5,972,530 UART: Running Caliptra ROM ...
5,972,938 UART:
5,972,993 UART: [state] CFI Enabled
5,975,711 UART: [state] LifecycleState = Unprovisioned
5,976,366 UART: [state] DebugLocked = No
5,977,008 UART: [state] WD Timer not started. Device not locked for debugging
5,978,264 UART: [kat] SHA2-256
6,783,914 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,788,039 UART: [kat] ++
6,788,191 UART: [kat] sha1
6,792,523 UART: [kat] SHA2-256
6,794,463 UART: [kat] SHA2-384
6,797,358 UART: [kat] SHA2-512-ACC
6,799,258 UART: [kat] ECC-384
6,808,839 UART: [kat] HMAC-384Kdf
6,813,435 UART: [kat] LMS
7,061,763 UART: [kat] --
7,062,367 UART: [update-reset] ++
7,964,557 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,965,694 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,061,818 >>> mbox cmd response: success
8,061,818 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,062,151 UART: [update-reset] Copying MAN_2 To MAN_1
8,070,165 UART: [update-reset Success] --
8,071,260 UART: [state] Locking Datavault
8,071,928 UART: [state] Locking PCR0, PCR1 and PCR31
8,072,532 UART: [state] Locking ICCM
8,073,046 UART: [exit] Launching FMC @ 0x40000130
8,078,375 UART:
8,078,391 UART: Running Caliptra FMC ...
8,078,799 UART:
8,078,853 UART: [state] CFI Enabled
8,167,720 UART: [art] Extend RT PCRs Done
8,168,148 UART: [art] Lock RT PCRs Done
8,169,569 UART: [art] Populate DV Done
8,177,836 UART: [fht] FMC Alias Private Key: 7
8,178,792 UART: [art] Derive CDI
8,179,072 UART: [art] Store in in slot 0x4
8,264,475 UART: [art] Derive Key Pair
8,264,835 UART: [art] Store priv key in slot 0x5
8,278,263 UART: [art] Derive Key Pair - Done
8,292,961 UART: [art] Signing Cert with AUTHO
8,293,441 UART: RITY.KEYID = 7
8,308,251 UART: [art] Erasing AUTHORITY.KEYID = 7
8,309,016 UART: [art] PUB.X = D4760F2CE824C8B2F1CFE418C57BC6B8D98FBE97E6EAAD1C26ACA20250BA2593801BFC99801FFF63C00E7D1ABAFD0031
8,315,779 UART: [art] PUB.Y = 568528EFEB883DA7A7B3177301C01A800CA12C3CE62D2FE4E9510874F5D8C69E5FA2A47DCADFBAEE5104ADE2D8C88322
8,322,735 UART: [art] SIG.R = B1E5B5FD6843212DD1666D5811E0F9F511EAFF0DBFF86675F93511EF3DF820790359B3DD5B3220F2115DCDB95D6062FC
8,329,509 UART: [art] SIG.S = 4223136EF3D1E7AFA899318F7ED0508C0E92EF9CA3B8A2EF8D718EE0DB34B70772D34572637112B0BBFFCF15D8237F99
8,353,324 UART: mbox::rt_entry...
8,353,696 UART: ____ _ _ _ ____ _____
8,354,480 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,355,280 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,356,048 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,356,816 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,357,584 UART: |_|
8,357,896 UART:
8,637,288 UART: [rt] Runtime listening for mailbox commands...
8,638,525 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,319 ready_for_fw is high
1,060,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,912 >>> mbox cmd response: success
2,686,270 UART:
2,686,286 UART: Running Caliptra FMC ...
2,686,694 UART:
2,686,748 UART: [state] CFI Enabled
2,697,035 UART: [fht] FMC Alias Private Key: 7
2,805,312 UART: [art] Extend RT PCRs Done
2,805,740 UART: [art] Lock RT PCRs Done
2,807,536 UART: [art] Populate DV Done
2,815,735 UART: [fht] FMC Alias Private Key: 7
2,816,865 UART: [art] Derive CDI
2,817,145 UART: [art] Store in in slot 0x4
2,902,988 UART: [art] Derive Key Pair
2,903,348 UART: [art] Store priv key in slot 0x5
2,916,584 UART: [art] Derive Key Pair - Done
2,931,306 UART: [art] Signing Cert with AUTHO
2,931,786 UART: RITY.KEYID = 7
2,947,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,837 UART: [art] PUB.X = 001284575910EAE55882D173C2E270A352CE7B0A2D28B4C55AF324947272B59E47008E9469F25141274B1F4DA7FF748F
2,954,552 UART: [art] PUB.Y = BA9F0ADE053BAEB2A8746E7C660A3E925620D617DC2B49A52FA534100F01BE3059FF9510F8B04EA39351E1E49A303D34
2,961,495 UART: [art] SIG.R = B7DFB557B67C5C9BEDE1B747C27C5666B8BAB6CD7042C34738B0476716BDEA180932BCA9DDEA37D0686AF1A127E70C22
2,968,275 UART: [art] SIG.S = A12F9BD9FA52ADC6E80C5329C0D8EDECF91B1BE07155F67048A6113B6EC6E6210462158D9482AE9981B536D17ED783FD
2,992,182 UART: Caliptra RT
2,992,435 UART: [state] CFI Enabled
3,100,485 UART: [rt] RT listening for mailbox commands...
3,101,155 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,007 UART: [rt]cmd =0x54514754, len=24
3,133,206 >>> mbox cmd response data (8 bytes)
3,133,207 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,107,127 >>> mbox cmd response: success
5,107,127 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,120,463 UART:
5,120,479 UART: Running Caliptra FMC ...
5,120,887 UART:
5,120,941 UART: [state] CFI Enabled
5,210,290 UART: [art] Extend RT PCRs Done
5,210,718 UART: [art] Lock RT PCRs Done
5,212,081 UART: [art] Populate DV Done
5,220,336 UART: [fht] FMC Alias Private Key: 7
5,221,400 UART: [art] Derive CDI
5,221,680 UART: [art] Store in in slot 0x4
5,307,689 UART: [art] Derive Key Pair
5,308,049 UART: [art] Store priv key in slot 0x5
5,320,697 UART: [art] Derive Key Pair - Done
5,335,370 UART: [art] Signing Cert with AUTHO
5,335,850 UART: RITY.KEYID = 7
5,351,496 UART: [art] Erasing AUTHORITY.KEYID = 7
5,352,261 UART: [art] PUB.X = 9D2863334B23C6C0B0D9227AFB3434E0EFF88FAAE49548488C1A65865B0F49A3BF7701C0CD7967C184F7215EC3BEB9F8
5,359,033 UART: [art] PUB.Y = 06576628E4CEC74FBB73F584D0E24D9BBC18606CC5D2B44456C54B0B1D108ED960E59DF99BEAC8B19148CE61B0CF2058
5,365,989 UART: [art] SIG.R = B1498E7C2A70EE711CAD0F6D2EB3CC48825B6595A924241B16BFA459F064C1D3429EDEC3DBB6F26CD9705ED65A1886DE
5,372,772 UART: [art] SIG.S = 1E42F615A9CB1089DA454AEC1F502D60E43698620550F5E74AC21202A03F28B075CA99E9466032636C75D59E545F88A0
5,396,701 UART: mbox::rt_entry...
5,397,073 UART: ____ _ _ _ ____ _____
5,397,857 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,398,657 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,399,425 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,400,193 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,400,961 UART: |_|
5,401,273 UART:
5,683,753 UART: [rt] Runtime listening for mailbox commands...
5,684,990 >>> mbox cmd response data (120 bytes)
5,684,991 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,659,601 >>> mbox cmd response: success
7,659,601 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,673,135 UART:
7,673,151 UART: Running Caliptra FMC ...
7,673,559 UART:
7,673,613 UART: [state] CFI Enabled
7,762,688 UART: [art] Extend RT PCRs Done
7,763,116 UART: [art] Lock RT PCRs Done
7,764,345 UART: [art] Populate DV Done
7,772,632 UART: [fht] FMC Alias Private Key: 7
7,773,678 UART: [art] Derive CDI
7,773,958 UART: [art] Store in in slot 0x4
7,859,605 UART: [art] Derive Key Pair
7,859,965 UART: [art] Store priv key in slot 0x5
7,873,019 UART: [art] Derive Key Pair - Done
7,887,742 UART: [art] Signing Cert with AUTHO
7,888,222 UART: RITY.KEYID = 7
7,903,622 UART: [art] Erasing AUTHORITY.KEYID = 7
7,904,387 UART: [art] PUB.X = 606DC04ECC870E37CBC59FE96C75DB23AB3A8C045C9B7D64AE3A9DD594BCD594FE12B1D506613FDFF2949EDD5119ABE2
7,911,172 UART: [art] PUB.Y = A224D3388723F2C3335A7458DC08A11EBA6D18C17A5FB5D24DBED52A01E094EBCDA416CD3F3D61F2609F82BFF339B42B
7,918,132 UART: [art] SIG.R = 0B30AF78A60B979EE4F28B182D1982B9EB58B2B9F7B2D7C206AF802D33D7325AE4361C5A68ED2E53944CD5ED13DA2B50
7,924,905 UART: [art] SIG.S = 29434121887D8AA11F3D0388BA9A20294EB683696403ABF2A059811BF8C51EC79E3AFB9E959F2E134753CC542033FA89
7,948,650 UART: mbox::rt_entry...
7,949,022 UART: ____ _ _ _ ____ _____
7,949,806 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,950,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,951,374 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,952,142 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,952,910 UART: |_|
7,953,222 UART:
8,231,216 UART: [rt] Runtime listening for mailbox commands...
8,232,453 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
902,172 UART: [kat] SHA2-256
904,112 UART: [kat] SHA2-384
906,791 UART: [kat] SHA2-512-ACC
908,692 UART: [kat] ECC-384
918,321 UART: [kat] HMAC-384Kdf
923,121 UART: [kat] LMS
1,171,449 UART: [kat] --
1,172,160 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 ready_for_fw is high
1,176,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,979 UART: [idev] Erasing UDS.KEYID = 0
1,201,234 UART: [idev] Sha1 KeyId Algorithm
1,209,564 UART: [idev] --
1,210,618 UART: [ldev] ++
1,210,786 UART: [ldev] CDI.KEYID = 6
1,211,149 UART: [ldev] SUBJECT.KEYID = 5
1,211,575 UART: [ldev] AUTHORITY.KEYID = 7
1,212,038 UART: [ldev] FE.KEYID = 1
1,217,040 UART: [ldev] Erasing FE.KEYID = 1
1,243,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,480 UART: [ldev] --
1,282,799 UART: [fwproc] Wait for Commands...
1,283,421 UART: [fwproc] Recv command 0x46574c44
1,284,149 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,375 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,679 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,358 >>> mbox cmd response: success
2,774,414 UART: [afmc] ++
2,774,582 UART: [afmc] CDI.KEYID = 6
2,774,944 UART: [afmc] SUBJECT.KEYID = 7
2,775,369 UART: [afmc] AUTHORITY.KEYID = 5
2,811,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,629 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,377 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,105 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,990 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,709 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,455 UART: [afmc] --
2,854,569 UART: [cold-reset] --
2,855,543 UART: [state] Locking Datavault
2,856,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,212 UART: [state] Locking ICCM
2,857,800 UART: [exit] Launching FMC @ 0x40000130
2,863,129 UART:
2,863,145 UART: Running Caliptra FMC ...
2,863,553 UART:
2,863,696 UART: [state] CFI Enabled
2,874,299 UART: [fht] FMC Alias Private Key: 7
2,982,158 UART: [art] Extend RT PCRs Done
2,982,586 UART: [art] Lock RT PCRs Done
2,984,114 UART: [art] Populate DV Done
2,992,355 UART: [fht] FMC Alias Private Key: 7
2,993,291 UART: [art] Derive CDI
2,993,571 UART: [art] Store in in slot 0x4
3,079,422 UART: [art] Derive Key Pair
3,079,782 UART: [art] Store priv key in slot 0x5
3,092,960 UART: [art] Derive Key Pair - Done
3,107,653 UART: [art] Signing Cert with AUTHO
3,108,133 UART: RITY.KEYID = 7
3,123,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,920 UART: [art] PUB.X = E5067B24107AD571F9A9EAF802DD07F9E574F4E9F85E46589D8F2E1CB2E1AC5408AA31E36B415A11907FBB93BF36127C
3,130,688 UART: [art] PUB.Y = 94C88223B4A189D6C827F8338086D4E12C5EA7223520F75F941BE0A9EA8FD5DA052A7CF8F250E417AC526732E74732E5
3,137,635 UART: [art] SIG.R = D64115FCAC9BC3EFB1280FA06D57D10E4B264C7D64E6356E2589409CB2ED39E53C81FC5529F5A58DA7311D32FA535B79
3,144,409 UART: [art] SIG.S = 2C7ADA823AA2A6347F967ABB292B3E72883D7597120127247C3A98990BBC11D3E5317154D89D080DDE065E5DA9DE1070
3,168,307 UART: Caliptra RT
3,168,652 UART: [state] CFI Enabled
3,275,519 UART: [rt] RT listening for mailbox commands...
3,276,189 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,835 UART: [rt]cmd =0x54514754, len=24
3,307,672 >>> mbox cmd response data (8 bytes)
3,307,673 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,308,436 UART:
3,308,452 UART: Running Caliptra ROM ...
3,308,860 UART:
3,309,002 UART: [state] CFI Enabled
3,311,782 UART: [state] LifecycleState = Unprovisioned
3,312,437 UART: [state] DebugLocked = No
3,312,969 UART: [state] WD Timer not started. Device not locked for debugging
3,314,211 UART: [kat] SHA2-256
4,119,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,123,986 UART: [kat] ++
4,124,138 UART: [kat] sha1
4,128,336 UART: [kat] SHA2-256
4,130,276 UART: [kat] SHA2-384
4,133,103 UART: [kat] SHA2-512-ACC
4,135,003 UART: [kat] ECC-384
4,144,798 UART: [kat] HMAC-384Kdf
4,149,602 UART: [kat] LMS
4,397,930 UART: [kat] --
4,398,754 UART: [update-reset] ++
5,300,606 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,301,731 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,397,855 >>> mbox cmd response: success
5,397,855 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,398,206 UART: [update-reset] Copying MAN_2 To MAN_1
5,406,220 UART: [update-reset Success] --
5,407,317 UART: [state] Locking Datavault
5,408,099 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,703 UART: [state] Locking ICCM
5,409,355 UART: [exit] Launching FMC @ 0x40000130
5,414,684 UART:
5,414,700 UART: Running Caliptra FMC ...
5,415,108 UART:
5,415,251 UART: [state] CFI Enabled
5,504,200 UART: [art] Extend RT PCRs Done
5,504,628 UART: [art] Lock RT PCRs Done
5,505,893 UART: [art] Populate DV Done
5,514,232 UART: [fht] FMC Alias Private Key: 7
5,515,404 UART: [art] Derive CDI
5,515,684 UART: [art] Store in in slot 0x4
5,601,273 UART: [art] Derive Key Pair
5,601,633 UART: [art] Store priv key in slot 0x5
5,615,119 UART: [art] Derive Key Pair - Done
5,630,068 UART: [art] Signing Cert with AUTHO
5,630,548 UART: RITY.KEYID = 7
5,645,684 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,449 UART: [art] PUB.X = 2FBE0A742B23F135517A3E8CC7D876ECA23E8C2D2DED04327AB293FCECCFB67F687239B9758FADACEE3C674D135AE825
5,653,235 UART: [art] PUB.Y = D58116EBF043F8EC4E19095398F16B123D20532687E50179A39FB600711E6B8102C62C075E20ADE3B1B2E486440EB01B
5,660,144 UART: [art] SIG.R = F17255AB6179F949AF8E55DAA427D1FCE194DEF167FE7C40AA509DC084E54DA494B3C3744ECCA28A7F4573328D09AB74
5,666,925 UART: [art] SIG.S = C0E944A49891E6B14744E226D60F1229EA27942B2937814D017B563A69B12662D283BFE855CFCAAD306637C0D138366F
5,690,312 UART: mbox::rt_entry...
5,690,684 UART: ____ _ _ _ ____ _____
5,691,468 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,268 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,693,804 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,694,572 UART: |_|
5,694,884 UART:
5,976,999 UART: [rt] Runtime listening for mailbox commands...
5,978,236 >>> mbox cmd response data (120 bytes)
5,978,237 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,978,348 UART:
5,978,364 UART: Running Caliptra ROM ...
5,978,772 UART:
5,978,914 UART: [state] CFI Enabled
5,981,900 UART: [state] LifecycleState = Unprovisioned
5,982,555 UART: [state] DebugLocked = No
5,983,143 UART: [state] WD Timer not started. Device not locked for debugging
5,984,441 UART: [kat] SHA2-256
6,790,091 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,794,216 UART: [kat] ++
6,794,368 UART: [kat] sha1
6,798,526 UART: [kat] SHA2-256
6,800,466 UART: [kat] SHA2-384
6,803,305 UART: [kat] SHA2-512-ACC
6,805,205 UART: [kat] ECC-384
6,814,770 UART: [kat] HMAC-384Kdf
6,819,392 UART: [kat] LMS
7,067,720 UART: [kat] --
7,068,588 UART: [update-reset] ++
7,969,646 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,970,789 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,066,913 >>> mbox cmd response: success
8,066,913 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,067,250 UART: [update-reset] Copying MAN_2 To MAN_1
8,075,264 UART: [update-reset Success] --
8,076,429 UART: [state] Locking Datavault
8,077,225 UART: [state] Locking PCR0, PCR1 and PCR31
8,077,829 UART: [state] Locking ICCM
8,078,259 UART: [exit] Launching FMC @ 0x40000130
8,083,588 UART:
8,083,604 UART: Running Caliptra FMC ...
8,084,012 UART:
8,084,155 UART: [state] CFI Enabled
8,173,572 UART: [art] Extend RT PCRs Done
8,174,000 UART: [art] Lock RT PCRs Done
8,175,595 UART: [art] Populate DV Done
8,183,784 UART: [fht] FMC Alias Private Key: 7
8,184,960 UART: [art] Derive CDI
8,185,240 UART: [art] Store in in slot 0x4
8,271,433 UART: [art] Derive Key Pair
8,271,793 UART: [art] Store priv key in slot 0x5
8,284,801 UART: [art] Derive Key Pair - Done
8,299,496 UART: [art] Signing Cert with AUTHO
8,299,976 UART: RITY.KEYID = 7
8,315,300 UART: [art] Erasing AUTHORITY.KEYID = 7
8,316,065 UART: [art] PUB.X = FA96CBF82633A8F8DB0103647928A4D6683F5F36318197F23B9A5816DD02240F38371D5E24CFCCEAEA58DACC246FA61E
8,322,833 UART: [art] PUB.Y = D78A20E0BD753F95A1E87460EDD59FDDBCD062A427B8702A624FC2411D66EA58C36C722983DE82AD2AF82975DC4A365D
8,329,795 UART: [art] SIG.R = B8362CA9090D6EAE26B3F9E4BFECAD337D898B4BA0444E03F013E1455ACA38D41230A66036EC797F863375030D1FD958
8,336,556 UART: [art] SIG.S = 67A8FFEDA84E1838CFA0FC34075BB5709F758C39425D74B35C4094D6CE9578BE2F466EFBB5A3EED6F09BC1E51C03E753
8,360,735 UART: mbox::rt_entry...
8,361,107 UART: ____ _ _ _ ____ _____
8,361,891 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,362,691 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,363,459 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,364,227 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,364,995 UART: |_|
8,365,307 UART:
8,646,485 UART: [rt] Runtime listening for mailbox commands...
8,647,722 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,520 ready_for_fw is high
1,060,520 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,449 >>> mbox cmd response: success
2,688,571 UART:
2,688,587 UART: Running Caliptra FMC ...
2,688,995 UART:
2,689,138 UART: [state] CFI Enabled
2,700,017 UART: [fht] FMC Alias Private Key: 7
2,808,558 UART: [art] Extend RT PCRs Done
2,808,986 UART: [art] Lock RT PCRs Done
2,810,696 UART: [art] Populate DV Done
2,818,817 UART: [fht] FMC Alias Private Key: 7
2,819,749 UART: [art] Derive CDI
2,820,029 UART: [art] Store in in slot 0x4
2,905,812 UART: [art] Derive Key Pair
2,906,172 UART: [art] Store priv key in slot 0x5
2,919,744 UART: [art] Derive Key Pair - Done
2,934,335 UART: [art] Signing Cert with AUTHO
2,934,815 UART: RITY.KEYID = 7
2,949,979 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,744 UART: [art] PUB.X = 1B5F3F8CE60802FDAE529419903B8CE9EAA448CB02CFD31C85BC0FA1E2CE4F6CF851B0071A46827C23FE0FDDF7FEDFDF
2,957,526 UART: [art] PUB.Y = F1485B822D939229FA84E518ADD43FF5C236EDFD5CDE9AAD9E3B158D6D5D8F8C6B428B35684AA93EBA6A12AB01EB3D45
2,964,495 UART: [art] SIG.R = 84D70AD481D31B958F8826594E2ABE8102591A4EBFF4C690410455803389866AF1F714FCA5116C4FADFBD907AF7CC3E1
2,971,259 UART: [art] SIG.S = 4E5C1D0149D15A7642AB8903C248E9921EC87B15D9F899A47727DDC191E619B653849E4D64FE6CA9FBA44AE6668DAEB9
2,995,090 UART: Caliptra RT
2,995,435 UART: [state] CFI Enabled
3,103,156 UART: [rt] RT listening for mailbox commands...
3,103,826 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,133,496 UART: [rt]cmd =0x54514754, len=24
3,135,487 >>> mbox cmd response data (8 bytes)
3,135,488 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,109,643 >>> mbox cmd response: success
5,109,643 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,123,077 UART:
5,123,093 UART: Running Caliptra FMC ...
5,123,501 UART:
5,123,644 UART: [state] CFI Enabled
5,212,623 UART: [art] Extend RT PCRs Done
5,213,051 UART: [art] Lock RT PCRs Done
5,214,142 UART: [art] Populate DV Done
5,222,699 UART: [fht] FMC Alias Private Key: 7
5,223,881 UART: [art] Derive CDI
5,224,161 UART: [art] Store in in slot 0x4
5,310,022 UART: [art] Derive Key Pair
5,310,382 UART: [art] Store priv key in slot 0x5
5,323,790 UART: [art] Derive Key Pair - Done
5,338,909 UART: [art] Signing Cert with AUTHO
5,339,389 UART: RITY.KEYID = 7
5,354,651 UART: [art] Erasing AUTHORITY.KEYID = 7
5,355,416 UART: [art] PUB.X = 03D3C2AECC8B877783E241FD805AC1C648B8B51DC732EB332CF06B9028897D161F265904099EBD4029B977729DC970ED
5,362,179 UART: [art] PUB.Y = 0DFFC629EDBCD319B3F57352D4C02B5AA8D26D9B837665CC1BA306FD3F10262851A74BDF8ACD879329AE213EFB6E247C
5,369,141 UART: [art] SIG.R = 4B132D8044F5245C79A765635499029BBB3BAD23C10DDACD8E4DCE141EFF538C035C3FBD7D5F6C4EB9356681C7DE326E
5,375,916 UART: [art] SIG.S = D64D6021AABFDD8D534CCC493EE1A17FE51C5C127F1420E095DCF020BDC2185B8C1A482BBBF85D96186363DC70F516C5
5,399,429 UART: mbox::rt_entry...
5,399,801 UART: ____ _ _ _ ____ _____
5,400,585 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,401,385 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,402,153 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,402,921 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,403,689 UART: |_|
5,404,001 UART:
5,681,473 UART: [rt] Runtime listening for mailbox commands...
5,682,710 >>> mbox cmd response data (120 bytes)
5,682,711 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,655,622 >>> mbox cmd response: success
7,655,622 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,669,244 UART:
7,669,260 UART: Running Caliptra FMC ...
7,669,668 UART:
7,669,811 UART: [state] CFI Enabled
7,758,982 UART: [art] Extend RT PCRs Done
7,759,410 UART: [art] Lock RT PCRs Done
7,760,847 UART: [art] Populate DV Done
7,768,976 UART: [fht] FMC Alias Private Key: 7
7,770,060 UART: [art] Derive CDI
7,770,340 UART: [art] Store in in slot 0x4
7,855,905 UART: [art] Derive Key Pair
7,856,265 UART: [art] Store priv key in slot 0x5
7,869,587 UART: [art] Derive Key Pair - Done
7,884,298 UART: [art] Signing Cert with AUTHO
7,884,778 UART: RITY.KEYID = 7
7,899,846 UART: [art] Erasing AUTHORITY.KEYID = 7
7,900,611 UART: [art] PUB.X = A5ED4374B3FF3CC2FCB68B1CD03B039A72429FE6BF4EABC0650201CE580DDECB43058B05123906CD00DEBBDBAB9328B4
7,907,362 UART: [art] PUB.Y = 6DEC0B5C1CAA5CF73580AAF9AB5538C588C2DADCC766E38791EEA2953D02C9675AF9100C8F879F7722D2267D291EBD2E
7,914,319 UART: [art] SIG.R = DA3ABC45188C832E15F42234E9BE008808C3E0403CF836431C3C8F030C1E89E7ACE2392090BD15B5F3FB2FA5C7BEA038
7,921,068 UART: [art] SIG.S = 1576219B1505F9F8B27B1EC0E8AC6101FCB655E2AD7CCC9B75D2654C102C0429462ACA5658120E1FC6727D5BFF219ADF
7,944,077 UART: mbox::rt_entry...
7,944,449 UART: ____ _ _ _ ____ _____
7,945,233 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,946,033 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,946,801 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,947,569 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,948,337 UART: |_|
7,948,649 UART:
8,230,403 UART: [rt] Runtime listening for mailbox commands...
8,231,640 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
915,758 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,173,027 UART: [idev] ++
1,173,195 UART: [idev] CDI.KEYID = 6
1,173,556 UART: [idev] SUBJECT.KEYID = 7
1,173,981 UART: [idev] UDS.KEYID = 0
1,174,327 ready_for_fw is high
1,174,327 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,831 UART: [idev] Sha1 KeyId Algorithm
1,207,571 UART: [idev] --
1,208,554 UART: [ldev] ++
1,208,722 UART: [ldev] CDI.KEYID = 6
1,209,086 UART: [ldev] SUBJECT.KEYID = 5
1,209,513 UART: [ldev] AUTHORITY.KEYID = 7
1,209,976 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,812 UART: [ldev] --
1,280,294 UART: [fwproc] Wait for Commands...
1,281,087 UART: [fwproc] Recv command 0x46574c44
1,281,820 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,846 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,775 >>> mbox cmd response: success
2,771,836 UART: [afmc] ++
2,772,004 UART: [afmc] CDI.KEYID = 6
2,772,367 UART: [afmc] SUBJECT.KEYID = 7
2,772,793 UART: [afmc] AUTHORITY.KEYID = 5
2,807,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,824,877 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,606 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,489 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,208 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,189 UART: [afmc] --
2,851,081 UART: [cold-reset] --
2,851,941 UART: [state] Locking Datavault
2,853,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,786 UART: [state] Locking ICCM
2,854,388 UART: [exit] Launching FMC @ 0x40000130
2,859,717 UART:
2,859,733 UART: Running Caliptra FMC ...
2,860,141 UART:
2,860,195 UART: [state] CFI Enabled
2,870,702 UART: [fht] FMC Alias Private Key: 7
2,979,243 UART: [art] Extend RT PCRs Done
2,979,671 UART: [art] Lock RT PCRs Done
2,981,129 UART: [art] Populate DV Done
2,989,158 UART: [fht] FMC Alias Private Key: 7
2,990,192 UART: [art] Derive CDI
2,990,472 UART: [art] Store in in slot 0x4
3,076,133 UART: [art] Derive Key Pair
3,076,493 UART: [art] Store priv key in slot 0x5
3,089,713 UART: [art] Derive Key Pair - Done
3,104,811 UART: [art] Signing Cert with AUTHO
3,105,291 UART: RITY.KEYID = 7
3,120,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,504 UART: [art] PUB.X = 2E954249214EEADD1F16CA2FC5A0A043BA7DF1008F562EB4E6E90150CB4ED1EA711FCD5B91903C0F8A896DC4B07B09DD
3,128,263 UART: [art] PUB.Y = 3FB97FA3EB73A1A239F315F0B815CFD22989D17F043D82D1314919E91F7F9FA311D7AF5824DFC7DAF35E6C118E30559C
3,135,220 UART: [art] SIG.R = 7B6E2062923C416CD07D2A60D6B790AB8EA23C20EA33B8F271E367F419C73931C6C73330F7C702E292666881B1915059
3,141,979 UART: [art] SIG.S = 210DED47432D816DD23E0BEE4D7C51884CE32107FAA256CBA03245F7EF9590D05D02DD69C1011E68BD08239CA14C543D
3,165,838 UART: Caliptra RT
3,166,091 UART: [state] CFI Enabled
3,273,906 UART: [rt] RT listening for mailbox commands...
3,274,576 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,670 UART: [rt]cmd =0x54514754, len=24
3,306,849 >>> mbox cmd response data (8 bytes)
3,306,850 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,507 UART:
3,307,523 UART: Running Caliptra ROM ...
3,307,931 UART:
3,307,986 UART: [state] CFI Enabled
3,310,498 UART: [state] LifecycleState = Unprovisioned
3,311,153 UART: [state] DebugLocked = No
3,311,851 UART: [state] WD Timer not started. Device not locked for debugging
3,313,167 UART: [kat] SHA2-256
4,116,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,120,846 UART: [kat] ++
4,120,998 UART: [kat] sha1
4,125,240 UART: [kat] SHA2-256
4,127,180 UART: [kat] SHA2-384
4,129,875 UART: [kat] SHA2-512-ACC
4,131,775 UART: [kat] ECC-384
4,141,056 UART: [kat] HMAC-384Kdf
4,145,676 UART: [kat] LMS
4,393,988 UART: [kat] --
4,394,932 UART: [update-reset] ++
5,296,777 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,297,966 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,394,090 >>> mbox cmd response: success
5,394,090 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,394,305 UART: [update-reset] Copying MAN_2 To MAN_1
5,402,319 UART: [update-reset Success] --
5,403,186 UART: [state] Locking Datavault
5,403,896 UART: [state] Locking PCR0, PCR1 and PCR31
5,404,500 UART: [state] Locking ICCM
5,405,130 UART: [exit] Launching FMC @ 0x40000130
5,410,459 UART:
5,410,475 UART: Running Caliptra FMC ...
5,410,883 UART:
5,410,937 UART: [state] CFI Enabled
5,499,922 UART: [art] Extend RT PCRs Done
5,500,350 UART: [art] Lock RT PCRs Done
5,501,799 UART: [art] Populate DV Done
5,510,184 UART: [fht] FMC Alias Private Key: 7
5,511,178 UART: [art] Derive CDI
5,511,458 UART: [art] Store in in slot 0x4
5,597,135 UART: [art] Derive Key Pair
5,597,495 UART: [art] Store priv key in slot 0x5
5,610,487 UART: [art] Derive Key Pair - Done
5,625,276 UART: [art] Signing Cert with AUTHO
5,625,756 UART: RITY.KEYID = 7
5,640,796 UART: [art] Erasing AUTHORITY.KEYID = 7
5,641,561 UART: [art] PUB.X = 9997FB3493AFAEADEBF63DE82EB7C5C1210961866AA2FEC886052418ACF574E046D863EEF506A114335A04BB5F791078
5,648,327 UART: [art] PUB.Y = 94BD2CA8785805E4161721AB75D0DE418591675114D600B02799BBE5983F0FCA4FE50C9EF3E65FD5AB90AA952C03195B
5,655,247 UART: [art] SIG.R = 4BFFC757F952C24546115852D3CD93B38E1B4F372E59380DA28F817A0466D615D90166E698243D87845CA614871DDD9A
5,662,002 UART: [art] SIG.S = AB0DE012A92DD4C905C8A1F2DF858F7D48204E53C24841C2515F20C01B6A49A5EC7957D63C7537769CE3B4E8886F2075
5,685,569 UART: mbox::rt_entry...
5,685,941 UART: ____ _ _ _ ____ _____
5,686,725 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,687,525 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,688,293 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,689,061 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,689,829 UART: |_|
5,690,141 UART:
5,965,409 UART: [rt] Runtime listening for mailbox commands...
5,966,646 >>> mbox cmd response data (120 bytes)
5,966,647 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,966,758 UART:
5,966,774 UART: Running Caliptra ROM ...
5,967,182 UART:
5,967,237 UART: [state] CFI Enabled
5,969,977 UART: [state] LifecycleState = Unprovisioned
5,970,632 UART: [state] DebugLocked = No
5,971,248 UART: [state] WD Timer not started. Device not locked for debugging
5,972,542 UART: [kat] SHA2-256
6,776,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,780,221 UART: [kat] ++
6,780,373 UART: [kat] sha1
6,784,477 UART: [kat] SHA2-256
6,786,417 UART: [kat] SHA2-384
6,789,394 UART: [kat] SHA2-512-ACC
6,791,294 UART: [kat] ECC-384
6,801,097 UART: [kat] HMAC-384Kdf
6,805,699 UART: [kat] LMS
7,054,011 UART: [kat] --
7,054,875 UART: [update-reset] ++
7,956,996 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,958,147 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,054,271 >>> mbox cmd response: success
8,054,271 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,054,492 UART: [update-reset] Copying MAN_2 To MAN_1
8,062,506 UART: [update-reset Success] --
8,063,423 UART: [state] Locking Datavault
8,064,411 UART: [state] Locking PCR0, PCR1 and PCR31
8,065,015 UART: [state] Locking ICCM
8,065,443 UART: [exit] Launching FMC @ 0x40000130
8,070,772 UART:
8,070,788 UART: Running Caliptra FMC ...
8,071,196 UART:
8,071,250 UART: [state] CFI Enabled
8,160,441 UART: [art] Extend RT PCRs Done
8,160,869 UART: [art] Lock RT PCRs Done
8,161,970 UART: [art] Populate DV Done
8,170,351 UART: [fht] FMC Alias Private Key: 7
8,171,449 UART: [art] Derive CDI
8,171,729 UART: [art] Store in in slot 0x4
8,257,204 UART: [art] Derive Key Pair
8,257,564 UART: [art] Store priv key in slot 0x5
8,270,394 UART: [art] Derive Key Pair - Done
8,285,279 UART: [art] Signing Cert with AUTHO
8,285,759 UART: RITY.KEYID = 7
8,300,889 UART: [art] Erasing AUTHORITY.KEYID = 7
8,301,654 UART: [art] PUB.X = 44832765E8092166CE8F2049A0B8298DBE402B1135E5CB00A7BF4C12FEC93735E13B8011D9FCBEEA2EB8ABB190747083
8,308,405 UART: [art] PUB.Y = 04F60BA5D45C941E4EED66408D1A04B81104E0758B62FC2CE70F2803E85A2A8C5D1ACBD29BE46F723452FC945AFB0C68
8,315,346 UART: [art] SIG.R = 973FFF55CA56E557BC10F51E3464D66438D6083138ECE5F10CD681791D96170539AB70A9A97340216457286208A73857
8,322,090 UART: [art] SIG.S = 86B924D0B6127F446FE634F45C4E1F61C6399BC196679FE4556770F84C0E640F24B3706E198A6F7BC2C5B2F0CECD0E3A
8,345,034 UART: mbox::rt_entry...
8,345,406 UART: ____ _ _ _ ____ _____
8,346,190 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,346,990 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,347,758 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,348,526 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,349,294 UART: |_|
8,349,606 UART:
8,632,017 UART: [rt] Runtime listening for mailbox commands...
8,633,254 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,776 ready_for_fw is high
1,055,776 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,601 >>> mbox cmd response: success
2,683,339 UART:
2,683,355 UART: Running Caliptra FMC ...
2,683,763 UART:
2,683,817 UART: [state] CFI Enabled
2,694,166 UART: [fht] FMC Alias Private Key: 7
2,802,733 UART: [art] Extend RT PCRs Done
2,803,161 UART: [art] Lock RT PCRs Done
2,804,723 UART: [art] Populate DV Done
2,813,114 UART: [fht] FMC Alias Private Key: 7
2,814,168 UART: [art] Derive CDI
2,814,448 UART: [art] Store in in slot 0x4
2,899,623 UART: [art] Derive Key Pair
2,899,983 UART: [art] Store priv key in slot 0x5
2,913,365 UART: [art] Derive Key Pair - Done
2,928,032 UART: [art] Signing Cert with AUTHO
2,928,512 UART: RITY.KEYID = 7
2,944,066 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,831 UART: [art] PUB.X = 30257BF38F7F25029E90DAFB6A0F755D14CB9FF66BCD1AA54FD53219F74E0189E025D48093506EA1D0D3C8C8A82F0D97
2,951,599 UART: [art] PUB.Y = 2D6067B202A7A095F15957C50EB7F494E1EA396E0379D6858E9272DB67EEFF38413EB5E8EA0F73254401E37620C33B1C
2,958,534 UART: [art] SIG.R = 263CAC8BE55F74B11BCAFD98224D0BE5BF5E902D4C5CE1A38162A1CA73A87E989F8E5611B3118A93CE69920DDED72514
2,965,312 UART: [art] SIG.S = A8CDC6FC9CF8FDF61172303E18A84C117DFDBEF33FD6049B92B1E9850BADC4FFF8462096BFF0E9D65E99F67F2DDD5C02
2,988,864 UART: Caliptra RT
2,989,117 UART: [state] CFI Enabled
3,097,082 UART: [rt] RT listening for mailbox commands...
3,097,752 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,644 UART: [rt]cmd =0x54514754, len=24
3,129,793 >>> mbox cmd response data (8 bytes)
3,129,794 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,097,929 >>> mbox cmd response: success
5,097,929 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,111,449 UART:
5,111,465 UART: Running Caliptra FMC ...
5,111,873 UART:
5,111,927 UART: [state] CFI Enabled
5,200,712 UART: [art] Extend RT PCRs Done
5,201,140 UART: [art] Lock RT PCRs Done
5,202,615 UART: [art] Populate DV Done
5,210,824 UART: [fht] FMC Alias Private Key: 7
5,211,854 UART: [art] Derive CDI
5,212,134 UART: [art] Store in in slot 0x4
5,297,495 UART: [art] Derive Key Pair
5,297,855 UART: [art] Store priv key in slot 0x5
5,310,899 UART: [art] Derive Key Pair - Done
5,325,874 UART: [art] Signing Cert with AUTHO
5,326,354 UART: RITY.KEYID = 7
5,341,694 UART: [art] Erasing AUTHORITY.KEYID = 7
5,342,459 UART: [art] PUB.X = 60795553C0E8EDC1B8D6386002521AFDC37508583EC3EDE5A8F7E467591CA419F5C95F4A8A7F4FE2F98EDEFEDF276683
5,349,235 UART: [art] PUB.Y = 1AA90A598AF1FC549AF2C09A7160FD3FF444E0454B0AFCBEDF36513138ACF71E44E54EDB03196F0494F77F2F45D7CEF8
5,356,191 UART: [art] SIG.R = FF7CE8B48ACB77CFD36B3ED930D98DEECD62687188EA8A60A1F66FE485C6872B3492E4A83B363019B51A36F373890135
5,362,966 UART: [art] SIG.S = 343F73660FFD49EF37211A25703E0AF84D44DB96EC6F6A055A93AAC6310C26D6B9CFBC0D1A6E46829B583D8AF7A2C872
5,386,814 UART: mbox::rt_entry...
5,387,186 UART: ____ _ _ _ ____ _____
5,387,970 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,388,770 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,389,538 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,390,306 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,391,074 UART: |_|
5,391,386 UART:
5,671,676 UART: [rt] Runtime listening for mailbox commands...
5,672,913 >>> mbox cmd response data (120 bytes)
5,672,914 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,641,283 >>> mbox cmd response: success
7,641,283 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,654,819 UART:
7,654,835 UART: Running Caliptra FMC ...
7,655,243 UART:
7,655,297 UART: [state] CFI Enabled
7,744,512 UART: [art] Extend RT PCRs Done
7,744,940 UART: [art] Lock RT PCRs Done
7,746,163 UART: [art] Populate DV Done
7,754,418 UART: [fht] FMC Alias Private Key: 7
7,755,424 UART: [art] Derive CDI
7,755,704 UART: [art] Store in in slot 0x4
7,841,557 UART: [art] Derive Key Pair
7,841,917 UART: [art] Store priv key in slot 0x5
7,855,479 UART: [art] Derive Key Pair - Done
7,870,186 UART: [art] Signing Cert with AUTHO
7,870,666 UART: RITY.KEYID = 7
7,885,862 UART: [art] Erasing AUTHORITY.KEYID = 7
7,886,627 UART: [art] PUB.X = 2AF195AD139B7FC9AD887F5F01FDA9304A3D31F7D6A42B67AAD2A595468BA244B879B44C1F5308627EBD239DCB4EC2B8
7,893,407 UART: [art] PUB.Y = 83D29AC574ABE566F2FBC8C0280D1E48EC0909E008C62BFABB435367942598DFB6F104B4061815171C780496FCCA94A6
7,900,340 UART: [art] SIG.R = C0900289A5052F39792C2F9A8519A4C050BF24D7B543D43381629C756257129EA4A173A9B3893C1E337AADB995F1253A
7,907,096 UART: [art] SIG.S = B46ECB14A8A9E2EF961EA61BE9EB82C6AFC6149847848F418985AB230B355ED061308CAA6940B6A88CA29EE7C76E3D48
7,930,562 UART: mbox::rt_entry...
7,930,934 UART: ____ _ _ _ ____ _____
7,931,718 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,932,518 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,933,286 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,934,054 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,934,822 UART: |_|
7,935,134 UART:
8,213,883 UART: [rt] Runtime listening for mailbox commands...
8,215,120 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
891,743 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,872 UART: [kat] ++
896,024 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
905,049 UART: [kat] SHA2-512-ACC
906,950 UART: [kat] ECC-384
916,913 UART: [kat] HMAC-384Kdf
921,571 UART: [kat] LMS
1,169,883 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,214 UART: [fht] FHT @ 0x50003400
1,173,956 UART: [idev] ++
1,174,124 UART: [idev] CDI.KEYID = 6
1,174,485 UART: [idev] SUBJECT.KEYID = 7
1,174,910 UART: [idev] UDS.KEYID = 0
1,175,256 ready_for_fw is high
1,175,256 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,592 UART: [idev] --
1,209,729 UART: [ldev] ++
1,209,897 UART: [ldev] CDI.KEYID = 6
1,210,261 UART: [ldev] SUBJECT.KEYID = 5
1,210,688 UART: [ldev] AUTHORITY.KEYID = 7
1,211,151 UART: [ldev] FE.KEYID = 1
1,216,623 UART: [ldev] Erasing FE.KEYID = 1
1,243,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,087 UART: [ldev] --
1,282,583 UART: [fwproc] Wait for Commands...
1,283,292 UART: [fwproc] Recv command 0x46574c44
1,284,025 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,434 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,898 >>> mbox cmd response: success
2,773,013 UART: [afmc] ++
2,773,181 UART: [afmc] CDI.KEYID = 6
2,773,544 UART: [afmc] SUBJECT.KEYID = 7
2,773,970 UART: [afmc] AUTHORITY.KEYID = 5
2,809,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,396 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,125 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,008 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,727 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,626 UART: [afmc] --
2,853,654 UART: [cold-reset] --
2,854,536 UART: [state] Locking Datavault
2,855,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,381 UART: [state] Locking ICCM
2,857,047 UART: [exit] Launching FMC @ 0x40000130
2,862,376 UART:
2,862,392 UART: Running Caliptra FMC ...
2,862,800 UART:
2,862,943 UART: [state] CFI Enabled
2,873,558 UART: [fht] FMC Alias Private Key: 7
2,981,095 UART: [art] Extend RT PCRs Done
2,981,523 UART: [art] Lock RT PCRs Done
2,982,753 UART: [art] Populate DV Done
2,991,068 UART: [fht] FMC Alias Private Key: 7
2,992,050 UART: [art] Derive CDI
2,992,330 UART: [art] Store in in slot 0x4
3,078,263 UART: [art] Derive Key Pair
3,078,623 UART: [art] Store priv key in slot 0x5
3,092,239 UART: [art] Derive Key Pair - Done
3,107,100 UART: [art] Signing Cert with AUTHO
3,107,580 UART: RITY.KEYID = 7
3,123,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,771 UART: [art] PUB.X = 6C9C3D468884CB534C9AD7ADCB0E2839B6DABD185167E35AD7A875ABC40DC599C1397404A8B465121638DFFE31B61DED
3,130,546 UART: [art] PUB.Y = B5F73EEA5827511D06A32C4F0201476A212E828078AC42B2C140B2B7515CF9529DC4AE39C7691EA4D7EDDFF247CD6240
3,137,493 UART: [art] SIG.R = 24960B08E18DFF8C3E87CAD52904605A7706AA882952CC8AF4817F4C49842FD6FE6D0E8AD943FBF623F71E8BF745A3A8
3,144,258 UART: [art] SIG.S = 8E31CADF529BC2CFD978134D520F10E0F5506710103942CD534CE239C388F9E2A1E9EBBE3606BAFEC8C51AFAACCC21C5
3,168,173 UART: Caliptra RT
3,168,518 UART: [state] CFI Enabled
3,276,619 UART: [rt] RT listening for mailbox commands...
3,277,289 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,207 UART: [rt]cmd =0x54514754, len=24
3,309,374 >>> mbox cmd response data (8 bytes)
3,309,375 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,930 UART:
3,309,946 UART: Running Caliptra ROM ...
3,310,354 UART:
3,310,496 UART: [state] CFI Enabled
3,313,042 UART: [state] LifecycleState = Unprovisioned
3,313,697 UART: [state] DebugLocked = No
3,314,413 UART: [state] WD Timer not started. Device not locked for debugging
3,315,649 UART: [kat] SHA2-256
4,119,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,123,328 UART: [kat] ++
4,123,480 UART: [kat] sha1
4,127,746 UART: [kat] SHA2-256
4,129,686 UART: [kat] SHA2-384
4,132,565 UART: [kat] SHA2-512-ACC
4,134,465 UART: [kat] ECC-384
4,144,420 UART: [kat] HMAC-384Kdf
4,148,862 UART: [kat] LMS
4,397,174 UART: [kat] --
4,397,856 UART: [update-reset] ++
5,299,995 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,301,194 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
5,397,318 >>> mbox cmd response: success
5,397,318 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,397,605 UART: [update-reset] Copying MAN_2 To MAN_1
5,405,619 UART: [update-reset Success] --
5,406,726 UART: [state] Locking Datavault
5,407,582 UART: [state] Locking PCR0, PCR1 and PCR31
5,408,186 UART: [state] Locking ICCM
5,408,810 UART: [exit] Launching FMC @ 0x40000130
5,414,139 UART:
5,414,155 UART: Running Caliptra FMC ...
5,414,563 UART:
5,414,706 UART: [state] CFI Enabled
5,503,865 UART: [art] Extend RT PCRs Done
5,504,293 UART: [art] Lock RT PCRs Done
5,505,610 UART: [art] Populate DV Done
5,513,971 UART: [fht] FMC Alias Private Key: 7
5,515,135 UART: [art] Derive CDI
5,515,415 UART: [art] Store in in slot 0x4
5,601,088 UART: [art] Derive Key Pair
5,601,448 UART: [art] Store priv key in slot 0x5
5,614,294 UART: [art] Derive Key Pair - Done
5,629,552 UART: [art] Signing Cert with AUTHO
5,630,032 UART: RITY.KEYID = 7
5,645,650 UART: [art] Erasing AUTHORITY.KEYID = 7
5,646,415 UART: [art] PUB.X = F6078173DE08B84A311B928165CEA30588680092F59D12DC7EB34818131D3B7CA5F833D21E1891C1902B7B1BC8BDD1C7
5,653,154 UART: [art] PUB.Y = 7E472DBF1BDEA04206D73B7317839D4CD634AEFE213DBD01341476C9A6732C08CD5230AE8A35F7113BA42494647B57C6
5,660,099 UART: [art] SIG.R = 8C5BD43103E43EEEBC0D324CEA1BE1CCB6B29859DD5FF37C5531744A4F351856EDE441CEAF58A768B5CEE4F3E8B73F96
5,666,885 UART: [art] SIG.S = 22B974EC23079537AC412D11296598FF1D3AE17A74BF4537961C076456DEF7ED4062D22399ECC92B51CF321CE80FDACE
5,690,971 UART: mbox::rt_entry...
5,691,343 UART: ____ _ _ _ ____ _____
5,692,127 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,692,927 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,693,695 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,694,463 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,695,231 UART: |_|
5,695,543 UART:
5,976,867 UART: [rt] Runtime listening for mailbox commands...
5,978,104 >>> mbox cmd response data (120 bytes)
5,978,105 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
5,978,216 UART:
5,978,232 UART: Running Caliptra ROM ...
5,978,640 UART:
5,978,782 UART: [state] CFI Enabled
5,981,610 UART: [state] LifecycleState = Unprovisioned
5,982,265 UART: [state] DebugLocked = No
5,982,935 UART: [state] WD Timer not started. Device not locked for debugging
5,984,237 UART: [kat] SHA2-256
6,787,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,791,916 UART: [kat] ++
6,792,068 UART: [kat] sha1
6,796,360 UART: [kat] SHA2-256
6,798,300 UART: [kat] SHA2-384
6,801,211 UART: [kat] SHA2-512-ACC
6,803,111 UART: [kat] ECC-384
6,812,922 UART: [kat] HMAC-384Kdf
6,817,376 UART: [kat] LMS
7,065,688 UART: [kat] --
7,066,114 UART: [update-reset] ++
7,966,519 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,967,712 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53848
8,063,836 >>> mbox cmd response: success
8,063,836 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,063,955 UART: [update-reset] Copying MAN_2 To MAN_1
8,071,969 UART: [update-reset Success] --
8,073,080 UART: [state] Locking Datavault
8,074,094 UART: [state] Locking PCR0, PCR1 and PCR31
8,074,698 UART: [state] Locking ICCM
8,075,212 UART: [exit] Launching FMC @ 0x40000130
8,080,541 UART:
8,080,557 UART: Running Caliptra FMC ...
8,080,965 UART:
8,081,108 UART: [state] CFI Enabled
8,171,081 UART: [art] Extend RT PCRs Done
8,171,509 UART: [art] Lock RT PCRs Done
8,172,890 UART: [art] Populate DV Done
8,181,109 UART: [fht] FMC Alias Private Key: 7
8,182,097 UART: [art] Derive CDI
8,182,377 UART: [art] Store in in slot 0x4
8,268,608 UART: [art] Derive Key Pair
8,268,968 UART: [art] Store priv key in slot 0x5
8,282,282 UART: [art] Derive Key Pair - Done
8,297,258 UART: [art] Signing Cert with AUTHO
8,297,738 UART: RITY.KEYID = 7
8,312,736 UART: [art] Erasing AUTHORITY.KEYID = 7
8,313,501 UART: [art] PUB.X = FA7404B4EB2E63ABEA9786C0309189C0A3DDC9CF2B38BD86D18C5486524EC8BCF56A437561E33F6FC7D2DD1FC9D49C55
8,320,286 UART: [art] PUB.Y = F11E6FCAD71D2E365886BDA1D67B8D5D64BEFAE80A86B47591E2A619F6F97FDFE5361C8D8926B7FA0458CD0E8DD0236A
8,327,247 UART: [art] SIG.R = 2B283A803A019BAC293DEBA2BDFE29B02C4F32EBC852D6D2A03E9E62578C984F271D1A51A4B99B80BA78A077E8FB31AB
8,334,032 UART: [art] SIG.S = 38C54CDE4C269CD8EC3E706577C83C01E80DCD5CF15EA0AD3D013E429F8125120BE245690149AA2A26CCC8A6D18ADD4F
8,357,428 UART: mbox::rt_entry...
8,357,800 UART: ____ _ _ _ ____ _____
8,358,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,359,384 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,360,152 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,360,920 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,361,688 UART: |_|
8,362,000 UART:
8,642,104 UART: [rt] Runtime listening for mailbox commands...
8,643,341 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,789 ready_for_fw is high
1,056,789 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,716 >>> mbox cmd response: success
2,684,260 UART:
2,684,276 UART: Running Caliptra FMC ...
2,684,684 UART:
2,684,827 UART: [state] CFI Enabled
2,695,470 UART: [fht] FMC Alias Private Key: 7
2,802,805 UART: [art] Extend RT PCRs Done
2,803,233 UART: [art] Lock RT PCRs Done
2,804,857 UART: [art] Populate DV Done
2,812,846 UART: [fht] FMC Alias Private Key: 7
2,813,898 UART: [art] Derive CDI
2,814,178 UART: [art] Store in in slot 0x4
2,900,207 UART: [art] Derive Key Pair
2,900,567 UART: [art] Store priv key in slot 0x5
2,913,409 UART: [art] Derive Key Pair - Done
2,928,272 UART: [art] Signing Cert with AUTHO
2,928,752 UART: RITY.KEYID = 7
2,944,370 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,135 UART: [art] PUB.X = 8C498CE826543053DE425047A0FE3E3C36A874D6677B0D24142F0895F465F1336A20E8399ECC88F2DCB9FDF6F2FCC545
2,951,903 UART: [art] PUB.Y = DF9047D438A4EF3AB7DC7FD10DDE0242CE7116DDD6218F711B5DF085F5BAA3E4E299B2701493FC11D4B97B7CCB9CE220
2,958,867 UART: [art] SIG.R = 4B2BED87C8C9F9710E5030BFC9ADEB3A0A055BDD0025A2C03EA35C26B3C45930185983FDEA0376E48CE76FF4467188A7
2,965,615 UART: [art] SIG.S = 640C1F39DF06613046BE6B5F35FFAC7C41AD588B4011979D0A08FA802E3AA7B38657478C04E93CA76A183D2F989BB2EF
2,989,281 UART: Caliptra RT
2,989,626 UART: [state] CFI Enabled
3,097,353 UART: [rt] RT listening for mailbox commands...
3,098,023 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,128,037 UART: [rt]cmd =0x54514754, len=24
3,130,006 >>> mbox cmd response data (8 bytes)
3,130,007 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,099,303 >>> mbox cmd response: success
5,099,303 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,112,673 UART:
5,112,689 UART: Running Caliptra FMC ...
5,113,097 UART:
5,113,240 UART: [state] CFI Enabled
5,202,407 UART: [art] Extend RT PCRs Done
5,202,835 UART: [art] Lock RT PCRs Done
5,204,030 UART: [art] Populate DV Done
5,212,571 UART: [fht] FMC Alias Private Key: 7
5,213,685 UART: [art] Derive CDI
5,213,965 UART: [art] Store in in slot 0x4
5,300,010 UART: [art] Derive Key Pair
5,300,370 UART: [art] Store priv key in slot 0x5
5,313,710 UART: [art] Derive Key Pair - Done
5,328,974 UART: [art] Signing Cert with AUTHO
5,329,454 UART: RITY.KEYID = 7
5,344,448 UART: [art] Erasing AUTHORITY.KEYID = 7
5,345,213 UART: [art] PUB.X = 70E91D6AF497FB79C2EE7D340B9A74C0A07554A4D6864D09B31750EAB6DD6D5A1572619DDF087EF3C1FEFC354A28C3FA
5,351,990 UART: [art] PUB.Y = E370C687E4515B63C2DD448FE82BB2EE35FE0C4B2599EEE60015A3CF5E9AA279CB9C49D9CD87AA5B4B880D8C92C5CE71
5,358,932 UART: [art] SIG.R = 073F73D2D4525171F1CE395694CE45CA10FBC54041A9906C27B785B48E0F35195626D16C26757FD72EF3C32166320A54
5,365,685 UART: [art] SIG.S = CEF721D93E9BDC2CFB251F33143F7CAF4C635F0169AF8D4EAD21234259BA0F86789E583B57A500B070C77303132899D5
5,389,737 UART: mbox::rt_entry...
5,390,109 UART: ____ _ _ _ ____ _____
5,390,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,391,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,392,461 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,393,229 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,393,997 UART: |_|
5,394,309 UART:
5,671,281 UART: [rt] Runtime listening for mailbox commands...
5,672,518 >>> mbox cmd response data (120 bytes)
5,672,519 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
7,639,949 >>> mbox cmd response: success
7,639,949 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,653,107 UART:
7,653,123 UART: Running Caliptra FMC ...
7,653,531 UART:
7,653,674 UART: [state] CFI Enabled
7,743,045 UART: [art] Extend RT PCRs Done
7,743,473 UART: [art] Lock RT PCRs Done
7,744,808 UART: [art] Populate DV Done
7,752,977 UART: [fht] FMC Alias Private Key: 7
7,753,969 UART: [art] Derive CDI
7,754,249 UART: [art] Store in in slot 0x4
7,840,078 UART: [art] Derive Key Pair
7,840,438 UART: [art] Store priv key in slot 0x5
7,854,474 UART: [art] Derive Key Pair - Done
7,868,776 UART: [art] Signing Cert with AUTHO
7,869,256 UART: RITY.KEYID = 7
7,884,256 UART: [art] Erasing AUTHORITY.KEYID = 7
7,885,021 UART: [art] PUB.X = 66EEDE077305647E8D97278045FCA2B9FF32AAA8F79F4400F37AA01EF0C9E62FF5EA0D51C5B36F71D53C9C8B2707C13B
7,891,771 UART: [art] PUB.Y = 3C912DCD5EE6ABCECC21F99856FFFC0E7393B0752B63E187F03E03E8F48E8E6725059045ABD9C435BD24EB2C4CC428CA
7,898,730 UART: [art] SIG.R = 21979296709E2FD49F2510E81A0F1E1A17CE4970356AB630BF6C308BA4BE56C5BFAB2858450742CE9365A4E72AD2E73A
7,905,498 UART: [art] SIG.S = AD9D6E009F0F069D13C921ED7A26246A52E407D44AE9B66AB24A0568163DA837A54A1E2B055944D1A9217A67169D7A5C
7,928,942 UART: mbox::rt_entry...
7,929,314 UART: ____ _ _ _ ____ _____
7,930,098 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
7,930,898 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
7,931,666 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
7,932,434 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
7,933,202 UART: |_|
7,933,514 UART:
8,216,664 UART: [rt] Runtime listening for mailbox commands...
8,217,901 >>> mbox cmd response data (120 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
191,656 UART:
192,028 UART: Running Caliptra ROM ...
193,197 UART:
193,344 UART: [state] CFI Enabled
261,071 UART: [state] LifecycleState = Production
263,297 UART: [state] DebugLocked = Yes
265,433 UART: [state] Starting the WD Timer 40000000 cycles
270,608 UART: [kat] SHA2-256
452,592 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,065 UART: [kat] ++
464,669 UART: [kat] sha1
474,675 UART: [kat] SHA2-256
477,728 UART: [kat] SHA2-384
483,506 UART: [kat] SHA2-512-ACC
486,082 UART: [kat] ECC-384
3,776,641 UART: [kat] HMAC-384Kdf
3,801,028 UART: [kat] LMS
4,874,242 UART: [kat] --
4,879,132 UART: [cold-reset] ++
4,881,271 UART: [fht] FHT @ 0x50003400
4,892,169 UART: [idev] ++
4,892,804 UART: [idev] CDI.KEYID = 6
4,894,044 UART: [idev] SUBJECT.KEYID = 7
4,895,162 UART: [idev] UDS.KEYID = 0
4,896,080 ready_for_fw is high
4,896,292 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,995,292 UART: [idev] Erasing UDS.KEYID = 0
8,244,046 UART: [idev] Sha1 KeyId Algorithm
8,265,186 UART: [idev] --
8,270,197 UART: [ldev] ++
8,270,769 UART: [ldev] CDI.KEYID = 6
8,271,894 UART: [ldev] SUBJECT.KEYID = 5
8,273,098 UART: [ldev] AUTHORITY.KEYID = 7
8,274,322 UART: [ldev] FE.KEYID = 1
8,317,868 UART: [ldev] Erasing FE.KEYID = 1
11,653,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,962,998 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,979,309 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,995,320 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,011,459 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,031,690 UART: [ldev] --
14,035,978 UART: [fwproc] Wait for Commands...
14,038,019 UART: [fwproc] Recv command 0x46574c44
14,040,321 UART: [fwproc] Recv'd Img size: 78576 bytes
17,707,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,785,327 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,854,043 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,046,656 >>> mbox cmd response: success
18,051,383 UART: [afmc] ++
18,051,995 UART: [afmc] CDI.KEYID = 6
18,053,130 UART: [afmc] SUBJECT.KEYID = 7
18,054,289 UART: [afmc] AUTHORITY.KEYID = 5
21,408,810 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,707,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,710,178 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,726,210 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,742,309 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,758,393 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,779,843 UART: [afmc] --
23,783,522 UART: [cold-reset] --
23,788,514 UART: [state] Locking Datavault
23,794,949 UART: [state] Locking PCR0, PCR1 and PCR31
23,796,589 UART: [state] Locking ICCM
23,798,948 UART: [exit] Launching FMC @ 0x40000130
23,807,655 UART:
23,807,891 UART: Running Caliptra FMC ...
23,808,990 UART:
23,809,148 UART: [state] CFI Enabled
23,866,546 UART: [fht] FMC Alias Private Key: 7
26,204,865 UART: [art] Extend RT PCRs Done
26,206,106 UART: [art] Lock RT PCRs Done
26,207,833 UART: [art] Populate DV Done
26,213,407 UART: [fht] FMC Alias Private Key: 7
26,214,990 UART: [art] Derive CDI
26,215,792 UART: [art] Store in in slot 0x4
26,274,456 UART: [art] Derive Key Pair
26,275,492 UART: [art] Store priv key in slot 0x5
29,567,777 UART: [art] Derive Key Pair - Done
29,580,659 UART: [art] Signing Cert with AUTHO
29,581,958 UART: RITY.KEYID = 7
31,869,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,871,134 UART: [art] PUB.X = BA24D95F540EAE6D633F41D6C6566DD0083F124B0BE87BAD9A8EB0DDE08444F1CC12AADFB950A14865E27BC8E449E805
31,878,437 UART: [art] PUB.Y = E8B1766E58967E5CA0DCF1AB897B721CB0323AA13705473FE1EDD6F7B85420DE17B367715CD9FE8A958F046070F0A574
31,885,671 UART: [art] SIG.R = 29278AAA049DAE8BD001CAEA3606B3D53922C7BA5E1D59D78E958832EF2F555E3B74C0ECF9C2D7E8F409BB2976D8EE79
31,893,054 UART: [art] SIG.S = B892B430CF795E59250A204A9A72BBFEB24F639CD98B25A31A23A1F03FC384D5445F275048F92B472E3FAF6A18700B2B
33,197,693 UART: mbox::rt_entry...
33,198,671 UART: ____ _ _ _ ____ _____
33,200,679 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,202,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,204,619 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,206,542 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,208,463 UART: |_|
33,209,266 UART:
33,321,301 UART: [rt] Runtime listening for mailbox commands...
33,323,304 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,323,796 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,002 UART:
1,169 UART: Running Caliptra ROM ...
2,180 UART:
2,316 UART: [state] CFI Enabled
59,927 UART: [state] LifecycleState = Production
61,692 UART: [state] DebugLocked = Yes
64,745 UART: [state] Starting the WD Timer 40000000 cycles
70,283 UART: [kat] SHA2-256
252,226 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
263,762 UART: [kat] ++
264,263 UART: [kat] sha1
274,511 UART: [kat] SHA2-256
277,531 UART: [kat] SHA2-384
283,579 UART: [kat] SHA2-512-ACC
286,184 UART: [kat] ECC-384
3,568,848 UART: [kat] HMAC-384Kdf
3,596,954 UART: [kat] LMS
4,670,176 UART: [kat] --
4,673,959 UART: [warm-reset] ++
4,679,130 UART: [warm-reset] --
4,682,662 UART: [state] Locking Datavault
4,685,261 UART: [state] Locking PCR0, PCR1 and PCR31
4,687,460 UART: [state] Locking ICCM
4,688,945 UART: [exit] Launching FMC @ 0x40000130
4,697,598 UART:
4,697,828 UART: Running Caliptra FMC ...
4,698,851 UART:
4,698,993 UART: [state] CFI Enabled
4,760,931 UART: [aliasrt :skip pcr extension
4,762,219 UART: [art] Extend RT PCRs Done
4,763,279 UART: [art] Lock RT PCRs Done
4,764,512 UART: [art] Populate DV Done
4,770,132 UART: [fht] FMC Alias Private Key: 7
4,771,658 UART: [art] Derive CDI
4,772,389 UART: [art] Store in in slot 0x4
4,829,543 UART: [art] Derive Key Pair
4,830,768 UART: [art] Store priv key in slot 0x5
8,122,966 UART: [art] Derive Key Pair - Done
8,135,927 UART: [art] Signing Cert with AUTHO
8,137,233 UART: RITY.KEYID = 7
10,423,715 UART: [art] Erasing AUTHORITY.KEYID = 7
10,425,225 UART: [art] PUB.X = BA24D95F540EAE6D633F41D6C6566DD0083F124B0BE87BAD9A8EB0DDE08444F1CC12AADFB950A14865E27BC8E449E805
10,432,511 UART: [art] PUB.Y = E8B1766E58967E5CA0DCF1AB897B721CB0323AA13705473FE1EDD6F7B85420DE17B367715CD9FE8A958F046070F0A574
10,439,717 UART: [art] SIG.R = 29278AAA049DAE8BD001CAEA3606B3D53922C7BA5E1D59D78E958832EF2F555E3B74C0ECF9C2D7E8F409BB2976D8EE79
10,447,085 UART: [art] SIG.S = B892B430CF795E59250A204A9A72BBFEB24F639CD98B25A31A23A1F03FC384D5445F275048F92B472E3FAF6A18700B2B
11,751,338 UART: mbox::rt_entry...
11,752,310 UART: ____ _ _ _ ____ _____
11,754,241 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,756,242 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,758,092 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,760,012 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,761,934 UART: |_|
11,762,735 UART:
12,050,695 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
191,587 UART:
191,966 UART: Running Caliptra ROM ...
193,081 UART:
193,231 UART: [state] CFI Enabled
265,540 UART: [state] LifecycleState = Production
267,760 UART: [state] DebugLocked = Yes
270,111 UART: [state] Starting the WD Timer 40000000 cycles
274,989 UART: [kat] SHA2-256
456,944 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
468,491 UART: [kat] ++
469,106 UART: [kat] sha1
480,799 UART: [kat] SHA2-256
483,805 UART: [kat] SHA2-384
488,295 UART: [kat] SHA2-512-ACC
490,941 UART: [kat] ECC-384
3,774,777 UART: [kat] HMAC-384Kdf
3,801,973 UART: [kat] LMS
4,875,135 UART: [kat] --
4,880,078 UART: [cold-reset] ++
4,882,872 UART: [fht] FHT @ 0x50003400
4,894,624 UART: [idev] ++
4,895,252 UART: [idev] CDI.KEYID = 6
4,896,483 UART: [idev] SUBJECT.KEYID = 7
4,897,707 UART: [idev] UDS.KEYID = 0
4,898,606 ready_for_fw is high
4,898,818 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,997,858 UART: [idev] Erasing UDS.KEYID = 0
8,243,162 UART: [idev] Sha1 KeyId Algorithm
8,265,351 UART: [idev] --
8,269,755 UART: [ldev] ++
8,270,330 UART: [ldev] CDI.KEYID = 6
8,271,559 UART: [ldev] SUBJECT.KEYID = 5
8,272,661 UART: [ldev] AUTHORITY.KEYID = 7
8,273,833 UART: [ldev] FE.KEYID = 1
8,318,193 UART: [ldev] Erasing FE.KEYID = 1
11,652,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,578 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,982,886 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,998,911 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,015,022 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,037,077 UART: [ldev] --
14,041,861 UART: [fwproc] Wait for Commands...
14,043,762 UART: [fwproc] Recv command 0x46574c44
14,046,069 UART: [fwproc] Recv'd Img size: 78576 bytes
17,704,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,778,749 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,847,502 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,039,373 >>> mbox cmd response: success
18,043,713 UART: [afmc] ++
18,044,320 UART: [afmc] CDI.KEYID = 6
18,045,428 UART: [afmc] SUBJECT.KEYID = 7
18,046,642 UART: [afmc] AUTHORITY.KEYID = 5
21,415,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,714,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,717,270 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,733,273 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,749,352 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,765,431 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,787,840 UART: [afmc] --
23,791,310 UART: [cold-reset] --
23,796,516 UART: [state] Locking Datavault
23,802,519 UART: [state] Locking PCR0, PCR1 and PCR31
23,804,160 UART: [state] Locking ICCM
23,805,654 UART: [exit] Launching FMC @ 0x40000130
23,814,318 UART:
23,814,543 UART: Running Caliptra FMC ...
23,815,562 UART:
23,815,703 UART: [state] CFI Enabled
23,874,818 UART: [fht] FMC Alias Private Key: 7
26,213,120 UART: [art] Extend RT PCRs Done
26,214,345 UART: [art] Lock RT PCRs Done
26,216,050 UART: [art] Populate DV Done
26,221,455 UART: [fht] FMC Alias Private Key: 7
26,223,036 UART: [art] Derive CDI
26,223,790 UART: [art] Store in in slot 0x4
26,283,958 UART: [art] Derive Key Pair
26,284,988 UART: [art] Store priv key in slot 0x5
29,577,860 UART: [art] Derive Key Pair - Done
29,590,796 UART: [art] Signing Cert with AUTHO
29,592,123 UART: RITY.KEYID = 7
31,880,032 UART: [art] Erasing AUTHORITY.KEYID = 7
31,881,538 UART: [art] PUB.X = CC75A1FB8630EE088F89CC9ECF4D4CBFDB02B73BCA678C05A9F6C072A1AB9AFA943CE9E3E4D506B5503BCC57091AAA9D
31,888,839 UART: [art] PUB.Y = E468EA85AFE0AD1ECB88321EC68C04FC132EAAA0A4EAE4E422B3011C99F3748E05EC224A03F3C89EDF84143F023480DD
31,896,070 UART: [art] SIG.R = 3B730865515F3A001EB45333979583F7BEF0808310376641FC296E36C8C2F01D96A7CED856D4F475823142F77FA9962E
31,903,405 UART: [art] SIG.S = 2F9626CF918D25A402F3529F7C8790B19202D1AE9FF14CF88090905CB87A02F7A8D6E009980146E78A26FB0B91B0018E
33,208,160 UART: mbox::rt_entry...
33,209,114 UART: ____ _ _ _ ____ _____
33,211,100 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,213,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,215,027 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,217,134 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,219,103 UART: |_|
33,219,915 UART:
33,332,004 UART: [rt] Runtime listening for mailbox commands...
33,334,013 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,334,505 >>> mbox cmd response data (0 bytes)
Initializing fuses
987 UART:
1,167 UART: Running Caliptra ROM ...
2,206 UART:
2,341 UART: [state] CFI Enabled
56,454 UART: [state] LifecycleState = Production
58,224 UART: [state] DebugLocked = Yes
60,639 UART: [state] Starting the WD Timer 40000000 cycles
66,116 UART: [kat] SHA2-256
248,095 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
259,603 UART: [kat] ++
260,131 UART: [kat] sha1
270,680 UART: [kat] SHA2-256
273,728 UART: [kat] SHA2-384
281,054 UART: [kat] SHA2-512-ACC
283,656 UART: [kat] ECC-384
3,571,882 UART: [kat] HMAC-384Kdf
3,598,908 UART: [kat] LMS
4,672,067 UART: [kat] --
4,677,701 UART: [warm-reset] ++
4,682,291 UART: [warm-reset] --
4,684,891 UART: [state] Locking Datavault
4,688,628 UART: [state] Locking PCR0, PCR1 and PCR31
4,690,812 UART: [state] Locking ICCM
4,692,467 UART: [exit] Launching FMC @ 0x40000130
4,701,129 UART:
4,701,383 UART: Running Caliptra FMC ...
4,702,481 UART:
4,702,640 UART: [state] CFI Enabled
4,763,760 UART: [aliasrt :skip pcr extension
4,765,044 UART: [art] Extend RT PCRs Done
4,766,187 UART: [art] Lock RT PCRs Done
4,767,629 UART: [art] Populate DV Done
4,773,296 UART: [fht] FMC Alias Private Key: 7
4,774,880 UART: [art] Derive CDI
4,775,687 UART: [art] Store in in slot 0x4
4,832,353 UART: [art] Derive Key Pair
4,833,358 UART: [art] Store priv key in slot 0x5
8,125,996 UART: [art] Derive Key Pair - Done
8,138,772 UART: [art] Signing Cert with AUTHO
8,140,074 UART: RITY.KEYID = 7
10,428,022 UART: [art] Erasing AUTHORITY.KEYID = 7
10,429,550 UART: [art] PUB.X = CC75A1FB8630EE088F89CC9ECF4D4CBFDB02B73BCA678C05A9F6C072A1AB9AFA943CE9E3E4D506B5503BCC57091AAA9D
10,436,804 UART: [art] PUB.Y = E468EA85AFE0AD1ECB88321EC68C04FC132EAAA0A4EAE4E422B3011C99F3748E05EC224A03F3C89EDF84143F023480DD
10,444,078 UART: [art] SIG.R = 3B730865515F3A001EB45333979583F7BEF0808310376641FC296E36C8C2F01D96A7CED856D4F475823142F77FA9962E
10,451,423 UART: [art] SIG.S = 2F9626CF918D25A402F3529F7C8790B19202D1AE9FF14CF88090905CB87A02F7A8D6E009980146E78A26FB0B91B0018E
11,755,931 UART: mbox::rt_entry...
11,756,897 UART: ____ _ _ _ ____ _____
11,758,819 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,760,815 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,762,663 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,764,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,766,453 UART: |_|
11,767,274 UART:
12,051,297 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
191,970 UART:
192,332 UART: Running Caliptra ROM ...
193,463 UART:
602,992 UART: [state] CFI Enabled
615,325 UART: [state] LifecycleState = Production
617,591 UART: [state] DebugLocked = Yes
620,005 UART: [state] Starting the WD Timer 40000000 cycles
625,819 UART: [kat] SHA2-256
807,763 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,299 UART: [kat] ++
819,898 UART: [kat] sha1
831,382 UART: [kat] SHA2-256
834,386 UART: [kat] SHA2-384
840,939 UART: [kat] SHA2-512-ACC
843,526 UART: [kat] ECC-384
4,097,475 UART: [kat] HMAC-384Kdf
4,109,060 UART: [kat] LMS
5,182,234 UART: [kat] --
5,186,250 UART: [cold-reset] ++
5,187,831 UART: [fht] FHT @ 0x50003400
5,198,524 UART: [idev] ++
5,199,237 UART: [idev] CDI.KEYID = 6
5,200,409 UART: [idev] SUBJECT.KEYID = 7
5,201,878 UART: [idev] UDS.KEYID = 0
5,203,140 ready_for_fw is high
5,203,344 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
5,302,091 UART: [idev] Erasing UDS.KEYID = 0
8,487,075 UART: [idev] Sha1 KeyId Algorithm
8,509,202 UART: [idev] --
8,513,412 UART: [ldev] ++
8,513,988 UART: [ldev] CDI.KEYID = 6
8,515,192 UART: [ldev] SUBJECT.KEYID = 5
8,516,354 UART: [ldev] AUTHORITY.KEYID = 7
8,517,583 UART: [ldev] FE.KEYID = 1
8,528,444 UART: [ldev] Erasing FE.KEYID = 1
11,819,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,112,290 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,128,610 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,144,619 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,160,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,181,525 UART: [ldev] --
14,186,680 UART: [fwproc] Wait for Commands...
14,189,149 UART: [fwproc] Recv command 0x46574c44
14,191,455 UART: [fwproc] Recv'd Img size: 78576 bytes
17,859,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,935,115 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,003,902 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,196,552 >>> mbox cmd response: success
18,201,041 UART: [afmc] ++
18,201,671 UART: [afmc] CDI.KEYID = 6
18,202,865 UART: [afmc] SUBJECT.KEYID = 7
18,203,974 UART: [afmc] AUTHORITY.KEYID = 5
21,522,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,816,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,818,548 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,834,571 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,850,679 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,866,725 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,890,152 UART: [afmc] --
23,893,136 UART: [cold-reset] --
23,897,490 UART: [state] Locking Datavault
23,902,852 UART: [state] Locking PCR0, PCR1 and PCR31
23,904,534 UART: [state] Locking ICCM
23,906,604 UART: [exit] Launching FMC @ 0x40000130
23,915,269 UART:
23,915,505 UART: Running Caliptra FMC ...
23,916,609 UART:
23,916,786 UART: [state] CFI Enabled
23,925,121 UART: [fht] FMC Alias Private Key: 7
26,256,244 UART: [art] Extend RT PCRs Done
26,257,464 UART: [art] Lock RT PCRs Done
26,259,249 UART: [art] Populate DV Done
26,264,446 UART: [fht] FMC Alias Private Key: 7
26,266,040 UART: [art] Derive CDI
26,266,855 UART: [art] Store in in slot 0x4
26,309,096 UART: [art] Derive Key Pair
26,310,135 UART: [art] Store priv key in slot 0x5
29,552,430 UART: [art] Derive Key Pair - Done
29,565,362 UART: [art] Signing Cert with AUTHO
29,566,680 UART: RITY.KEYID = 7
31,845,455 UART: [art] Erasing AUTHORITY.KEYID = 7
31,846,959 UART: [art] PUB.X = 79378310087FBFFE680CD82F604A4BB09187AC10BA9E45FEA14A2D0CCB165B7B46393D64805114708CE17DEB4D1F247E
31,854,217 UART: [art] PUB.Y = 676E4205AF8ABE5F4E3A794AEB43E940958C8AEEDA167CB707C4E2173FDCDC0151F7E0D60E9446EEDF25589FFB78BBEF
31,861,452 UART: [art] SIG.R = 1E1E51EB02E17B9FD762E54351F0D827BB4CCB9A83D690AC19E97F0A63D6F8226E1292C87F8968CFA12E4CF31579AB86
31,868,849 UART: [art] SIG.S = EEA8759032D39392058D0F29BE873F0434E745C87AD138B43CFF924BCC3F7110C939C3F8A67A9019688DBDBBD97D49D6
33,173,680 UART: mbox::rt_entry...
33,174,644 UART: ____ _ _ _ ____ _____
33,176,630 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,178,638 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,180,572 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,182,631 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,184,528 UART: |_|
33,185,334 UART:
33,298,392 UART: [rt] Runtime listening for mailbox commands...
33,300,401 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,300,923 >>> mbox cmd response data (0 bytes)
Initializing fuses
977 UART:
1,224 UART: Running Caliptra ROM ...
2,336 UART:
7,232,522 UART: [state] CFI Enabled
7,248,296 UART: [state] LifecycleState = Production
7,250,073 UART: [state] DebugLocked = Yes
7,252,828 UART: [state] Starting the WD Timer 40000000 cycles
7,258,220 UART: [kat] SHA2-256
7,440,215 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,451,734 UART: [kat] ++
7,452,248 UART: [kat] sha1
7,462,167 UART: [kat] SHA2-256
7,465,183 UART: [kat] SHA2-384
7,469,658 UART: [kat] SHA2-512-ACC
7,472,247 UART: [kat] ECC-384
10,726,946 UART: [kat] HMAC-384Kdf
10,738,093 UART: [kat] LMS
11,811,248 UART: [kat] --
11,816,121 UART: [warm-reset] ++
11,820,388 UART: [warm-reset] --
11,824,789 UART: [state] Locking Datavault
11,827,549 UART: [state] Locking PCR0, PCR1 and PCR31
11,829,740 UART: [state] Locking ICCM
11,831,506 UART: [exit] Launching FMC @ 0x40000130
11,840,177 UART:
11,840,411 UART: Running Caliptra FMC ...
11,841,513 UART:
11,841,671 UART: [state] CFI Enabled
11,843,616 UART: [aliasrt :skip pcr extension
11,844,860 UART: [art] Extend RT PCRs Done
11,846,015 UART: [art] Lock RT PCRs Done
11,847,194 UART: [art] Populate DV Done
11,852,434 UART: [fht] FMC Alias Private Key: 7
11,853,970 UART: [art] Derive CDI
11,854,796 UART: [art] Store in in slot 0x4
11,897,603 UART: [art] Derive Key Pair
11,898,655 UART: [art] Store priv key in slot 0x5
15,140,976 UART: [art] Derive Key Pair - Done
15,153,834 UART: [art] Signing Cert with AUTHO
15,155,133 UART: RITY.KEYID = 7
17,434,456 UART: [art] Erasing AUTHORITY.KEYID = 7
17,435,960 UART: [art] PUB.X = 79378310087FBFFE680CD82F604A4BB09187AC10BA9E45FEA14A2D0CCB165B7B46393D64805114708CE17DEB4D1F247E
17,443,169 UART: [art] PUB.Y = 676E4205AF8ABE5F4E3A794AEB43E940958C8AEEDA167CB707C4E2173FDCDC0151F7E0D60E9446EEDF25589FFB78BBEF
17,450,477 UART: [art] SIG.R = 1E1E51EB02E17B9FD762E54351F0D827BB4CCB9A83D690AC19E97F0A63D6F8226E1292C87F8968CFA12E4CF31579AB86
17,457,872 UART: [art] SIG.S = EEA8759032D39392058D0F29BE873F0434E745C87AD138B43CFF924BCC3F7110C939C3F8A67A9019688DBDBBD97D49D6
18,762,290 UART: mbox::rt_entry...
18,763,258 UART: ____ _ _ _ ____ _____
18,765,245 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,767,253 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,769,197 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,771,136 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,772,993 UART: |_|
18,773,798 UART:
19,056,942 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
191,965 UART:
192,338 UART: Running Caliptra ROM ...
193,425 UART:
603,201 UART: [state] CFI Enabled
617,137 UART: [state] LifecycleState = Production
619,326 UART: [state] DebugLocked = Yes
621,236 UART: [state] Starting the WD Timer 40000000 cycles
625,823 UART: [kat] SHA2-256
807,808 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,355 UART: [kat] ++
819,877 UART: [kat] sha1
830,585 UART: [kat] SHA2-256
833,607 UART: [kat] SHA2-384
839,532 UART: [kat] SHA2-512-ACC
842,119 UART: [kat] ECC-384
4,098,267 UART: [kat] HMAC-384Kdf
4,109,750 UART: [kat] LMS
5,182,884 UART: [kat] --
5,185,687 UART: [cold-reset] ++
5,186,851 UART: [fht] FHT @ 0x50003400
5,198,611 UART: [idev] ++
5,199,258 UART: [idev] CDI.KEYID = 6
5,200,506 UART: [idev] SUBJECT.KEYID = 7
5,201,964 UART: [idev] UDS.KEYID = 0
5,203,155 ready_for_fw is high
5,203,390 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
5,302,377 UART: [idev] Erasing UDS.KEYID = 0
8,492,554 UART: [idev] Sha1 KeyId Algorithm
8,515,599 UART: [idev] --
8,519,543 UART: [ldev] ++
8,520,113 UART: [ldev] CDI.KEYID = 6
8,521,294 UART: [ldev] SUBJECT.KEYID = 5
8,522,455 UART: [ldev] AUTHORITY.KEYID = 7
8,523,684 UART: [ldev] FE.KEYID = 1
8,533,147 UART: [ldev] Erasing FE.KEYID = 1
11,822,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,115,622 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,131,949 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,147,985 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,164,043 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,184,634 UART: [ldev] --
14,189,638 UART: [fwproc] Wait for Commands...
14,192,734 UART: [fwproc] Recv command 0x46574c44
14,195,064 UART: [fwproc] Recv'd Img size: 78576 bytes
17,861,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,935,471 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,004,218 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,196,174 >>> mbox cmd response: success
18,200,886 UART: [afmc] ++
18,201,505 UART: [afmc] CDI.KEYID = 6
18,202,701 UART: [afmc] SUBJECT.KEYID = 7
18,203,806 UART: [afmc] AUTHORITY.KEYID = 5
21,522,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,815,823 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,818,159 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,834,119 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,850,252 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,866,295 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,888,223 UART: [afmc] --
23,891,556 UART: [cold-reset] --
23,895,804 UART: [state] Locking Datavault
23,902,304 UART: [state] Locking PCR0, PCR1 and PCR31
23,904,000 UART: [state] Locking ICCM
23,906,265 UART: [exit] Launching FMC @ 0x40000130
23,914,932 UART:
23,915,167 UART: Running Caliptra FMC ...
23,916,276 UART:
23,916,440 UART: [state] CFI Enabled
23,924,867 UART: [fht] FMC Alias Private Key: 7
26,256,017 UART: [art] Extend RT PCRs Done
26,257,252 UART: [art] Lock RT PCRs Done
26,258,937 UART: [art] Populate DV Done
26,264,569 UART: [fht] FMC Alias Private Key: 7
26,266,105 UART: [art] Derive CDI
26,266,922 UART: [art] Store in in slot 0x4
26,309,485 UART: [art] Derive Key Pair
26,310,488 UART: [art] Store priv key in slot 0x5
29,551,815 UART: [art] Derive Key Pair - Done
29,564,977 UART: [art] Signing Cert with AUTHO
29,566,287 UART: RITY.KEYID = 7
31,845,450 UART: [art] Erasing AUTHORITY.KEYID = 7
31,847,081 UART: [art] PUB.X = 39893A0B8D753446D3FB0118BF788432ED80E524066070FAE3720C0063D31173D91F98C9D5FFAFE806C5D3FA87AD1287
31,854,176 UART: [art] PUB.Y = 4471E21BBFF5ECCDC3924D6634C606EAFDDEB896AE918316B682822CA5D1219AD95C55801CD3772ED1FDF808A7F11CD3
31,861,469 UART: [art] SIG.R = 5DD8759E2A71D013025F264380DC6197D928F3D608578F25B8DDFF3A1828CAB79E066190AF74BE415CCCBC2EDC3DA4AA
31,868,871 UART: [art] SIG.S = CA728B7E392E4733447FFAE200787DFBB76058C67E1AC4F9771B00078EDE5F33CFDD90012BEB9285A9679E5DB1DBD6DF
33,173,514 UART: mbox::rt_entry...
33,174,467 UART: ____ _ _ _ ____ _____
33,176,451 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,178,453 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,180,382 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,182,312 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,184,261 UART: |_|
33,185,100 UART:
33,297,847 UART: [rt] Runtime listening for mailbox commands...
33,299,893 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
33,300,409 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,003 UART:
1,168 UART: Running Caliptra ROM ...
2,286 UART:
7,231,579 UART: [state] CFI Enabled
7,247,722 UART: [state] LifecycleState = Production
7,249,471 UART: [state] DebugLocked = Yes
7,251,760 UART: [state] Starting the WD Timer 40000000 cycles
7,256,928 UART: [kat] SHA2-256
7,438,935 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,450,459 UART: [kat] ++
7,451,079 UART: [kat] sha1
7,462,414 UART: [kat] SHA2-256
7,465,438 UART: [kat] SHA2-384
7,471,537 UART: [kat] SHA2-512-ACC
7,474,157 UART: [kat] ECC-384
10,726,760 UART: [kat] HMAC-384Kdf
10,738,931 UART: [kat] LMS
11,812,088 UART: [kat] --
11,816,627 UART: [warm-reset] ++
11,821,475 UART: [warm-reset] --
11,826,220 UART: [state] Locking Datavault
11,829,892 UART: [state] Locking PCR0, PCR1 and PCR31
11,832,030 UART: [state] Locking ICCM
11,834,078 UART: [exit] Launching FMC @ 0x40000130
11,842,752 UART:
11,843,000 UART: Running Caliptra FMC ...
11,844,128 UART:
11,844,291 UART: [state] CFI Enabled
11,846,249 UART: [aliasrt :skip pcr extension
11,847,496 UART: [art] Extend RT PCRs Done
11,848,635 UART: [art] Lock RT PCRs Done
11,850,085 UART: [art] Populate DV Done
11,855,550 UART: [fht] FMC Alias Private Key: 7
11,857,085 UART: [art] Derive CDI
11,857,903 UART: [art] Store in in slot 0x4
11,900,110 UART: [art] Derive Key Pair
11,901,122 UART: [art] Store priv key in slot 0x5
15,143,215 UART: [art] Derive Key Pair - Done
15,156,220 UART: [art] Signing Cert with AUTHO
15,157,533 UART: RITY.KEYID = 7
17,436,835 UART: [art] Erasing AUTHORITY.KEYID = 7
17,438,349 UART: [art] PUB.X = 39893A0B8D753446D3FB0118BF788432ED80E524066070FAE3720C0063D31173D91F98C9D5FFAFE806C5D3FA87AD1287
17,445,573 UART: [art] PUB.Y = 4471E21BBFF5ECCDC3924D6634C606EAFDDEB896AE918316B682822CA5D1219AD95C55801CD3772ED1FDF808A7F11CD3
17,452,817 UART: [art] SIG.R = 5DD8759E2A71D013025F264380DC6197D928F3D608578F25B8DDFF3A1828CAB79E066190AF74BE415CCCBC2EDC3DA4AA
17,460,229 UART: [art] SIG.S = CA728B7E392E4733447FFAE200787DFBB76058C67E1AC4F9771B00078EDE5F33CFDD90012BEB9285A9679E5DB1DBD6DF
18,765,351 UART: mbox::rt_entry...
18,766,320 UART: ____ _ _ _ ____ _____
18,768,313 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,770,322 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,772,260 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,774,203 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,776,058 UART: |_|
18,776,889 UART:
19,063,132 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
191,492 UART:
191,877 UART: Running Caliptra ROM ...
192,967 UART:
193,111 UART: [state] CFI Enabled
266,416 UART: [state] LifecycleState = Production
268,136 UART: [state] DebugLocked = Yes
269,778 UART: [state] Starting the WD Timer 40000000 cycles
273,886 UART: [kat] SHA2-256
453,092 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,660 UART: [kat] ++
465,212 UART: [kat] sha1
477,329 UART: [kat] SHA2-256
480,407 UART: [kat] SHA2-384
486,890 UART: [kat] SHA2-512-ACC
489,846 UART: [kat] ECC-384
2,950,272 UART: [kat] HMAC-384Kdf
2,973,032 UART: [kat] LMS
3,502,515 UART: [kat] --
3,508,031 UART: [cold-reset] ++
3,509,901 UART: [fht] FHT @ 0x50003400
3,521,024 UART: [idev] ++
3,521,591 UART: [idev] CDI.KEYID = 6
3,522,589 UART: [idev] SUBJECT.KEYID = 7
3,523,704 UART: [idev] UDS.KEYID = 0
3,524,689 ready_for_fw is high
3,524,891 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,624,019 UART: [idev] Erasing UDS.KEYID = 0
6,027,288 UART: [idev] Sha1 KeyId Algorithm
6,050,130 UART: [idev] --
6,053,703 UART: [ldev] ++
6,054,277 UART: [ldev] CDI.KEYID = 6
6,055,193 UART: [ldev] SUBJECT.KEYID = 5
6,056,358 UART: [ldev] AUTHORITY.KEYID = 7
6,057,599 UART: [ldev] FE.KEYID = 1
6,101,358 UART: [ldev] Erasing FE.KEYID = 1
8,605,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,195 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,184 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,004 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,968 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,930 UART: [ldev] --
10,416,312 UART: [fwproc] Wait for Commands...
10,419,514 UART: [fwproc] Recv command 0x46574c44
10,421,611 UART: [fwproc] Recv'd Img size: 78532 bytes
13,412,188 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,485,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,554,769 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,748,220 >>> mbox cmd response: success
13,752,645 UART: [afmc] ++
13,753,265 UART: [afmc] CDI.KEYID = 6
13,754,182 UART: [afmc] SUBJECT.KEYID = 7
13,755,346 UART: [afmc] AUTHORITY.KEYID = 5
16,294,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,018,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,020,685 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,036,690 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,052,515 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,068,265 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,090,801 UART: [afmc] --
18,093,990 UART: [cold-reset] --
18,097,323 UART: [state] Locking Datavault
18,102,474 UART: [state] Locking PCR0, PCR1 and PCR31
18,104,128 UART: [state] Locking ICCM
18,105,471 UART: [exit] Launching FMC @ 0x40000130
18,113,870 UART:
18,114,109 UART: Running Caliptra FMC ...
18,115,209 UART:
18,115,363 UART: [state] CFI Enabled
18,176,883 UART: [fht] FMC Alias Private Key: 7
19,940,682 UART: [art] Extend RT PCRs Done
19,941,901 UART: [art] Lock RT PCRs Done
19,943,361 UART: [art] Populate DV Done
19,948,934 UART: [fht] FMC Alias Private Key: 7
19,950,578 UART: [art] Derive CDI
19,951,410 UART: [art] Store in in slot 0x4
20,009,766 UART: [art] Derive Key Pair
20,010,808 UART: [art] Store priv key in slot 0x5
22,473,458 UART: [art] Derive Key Pair - Done
22,486,460 UART: [art] Signing Cert with AUTHO
22,487,775 UART: RITY.KEYID = 7
24,200,008 UART: [art] Erasing AUTHORITY.KEYID = 7
24,201,520 UART: [art] PUB.X = E76DA7966E7D13CDAC66DAFE05F1BBB9452FF254B8FB7A1D1DA1AB2C04C06674478F83DEB8D5E23EF18B277C25335862
24,208,787 UART: [art] PUB.Y = 8714D7CA1AB48A590FEDEE09B339A4080B2D79AD5DB39165AAD16E1723F7F7F0EEF623DC12C171A355961CBEC8CD0F28
24,216,092 UART: [art] SIG.R = 7615BFE41E9FFA40412D1A72D10A1F68BCA6ABCD94C0943613CF5CE3AC137692622262428A13389C1D27121AF29668BB
24,223,516 UART: [art] SIG.S = 55A438823F51B843B7F2397D27E3D9C91BCFF0D2161B0BFEDD363A323C77BD1FD5B3F360584678E8A7C7058DDEF38873
25,201,512 UART: mbox::rt_entry...
25,202,466 UART: ____ _ _ _ ____ _____
25,204,449 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,206,456 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,388 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,540 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,483 UART: |_|
25,213,325 UART:
25,326,067 UART: [rt] Runtime listening for mailbox commands...
25,328,075 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,328,582 >>> mbox cmd response data (0 bytes)
Initializing fuses
984 UART:
1,232 UART: Running Caliptra ROM ...
2,339 UART:
2,492 UART: [state] CFI Enabled
63,374 UART: [state] LifecycleState = Production
65,084 UART: [state] DebugLocked = Yes
66,614 UART: [state] Starting the WD Timer 40000000 cycles
71,669 UART: [kat] SHA2-256
250,791 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
262,381 UART: [kat] ++
262,922 UART: [kat] sha1
274,235 UART: [kat] SHA2-256
277,293 UART: [kat] SHA2-384
282,939 UART: [kat] SHA2-512-ACC
285,906 UART: [kat] ECC-384
2,748,361 UART: [kat] HMAC-384Kdf
2,771,819 UART: [kat] LMS
3,301,326 UART: [kat] --
3,308,042 UART: [warm-reset] ++
3,311,547 UART: [warm-reset] --
3,316,872 UART: [state] Locking Datavault
3,320,082 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,825 UART: [state] Locking ICCM
3,323,744 UART: [exit] Launching FMC @ 0x40000130
3,332,142 UART:
3,332,399 UART: Running Caliptra FMC ...
3,333,430 UART:
3,333,578 UART: [state] CFI Enabled
3,380,652 UART: [aliasrt :skip pcr extension
3,381,907 UART: [art] Extend RT PCRs Done
3,382,974 UART: [art] Lock RT PCRs Done
3,384,311 UART: [art] Populate DV Done
3,389,827 UART: [fht] FMC Alias Private Key: 7
3,391,522 UART: [art] Derive CDI
3,392,337 UART: [art] Store in in slot 0x4
3,448,872 UART: [art] Derive Key Pair
3,449,919 UART: [art] Store priv key in slot 0x5
5,912,883 UART: [art] Derive Key Pair - Done
5,925,930 UART: [art] Signing Cert with AUTHO
5,927,236 UART: RITY.KEYID = 7
7,638,682 UART: [art] Erasing AUTHORITY.KEYID = 7
7,640,225 UART: [art] PUB.X = E76DA7966E7D13CDAC66DAFE05F1BBB9452FF254B8FB7A1D1DA1AB2C04C06674478F83DEB8D5E23EF18B277C25335862
7,647,521 UART: [art] PUB.Y = 8714D7CA1AB48A590FEDEE09B339A4080B2D79AD5DB39165AAD16E1723F7F7F0EEF623DC12C171A355961CBEC8CD0F28
7,654,779 UART: [art] SIG.R = 7615BFE41E9FFA40412D1A72D10A1F68BCA6ABCD94C0943613CF5CE3AC137692622262428A13389C1D27121AF29668BB
7,662,191 UART: [art] SIG.S = 55A438823F51B843B7F2397D27E3D9C91BCFF0D2161B0BFEDD363A323C77BD1FD5B3F360584678E8A7C7058DDEF38873
8,640,500 UART: mbox::rt_entry...
8,641,445 UART: ____ _ _ _ ____ _____
8,643,379 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,645,380 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,647,235 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,649,161 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,042 UART: |_|
8,651,873 UART:
8,936,695 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
191,563 UART:
191,967 UART: Running Caliptra ROM ...
193,133 UART:
193,288 UART: [state] CFI Enabled
261,405 UART: [state] LifecycleState = Production
263,204 UART: [state] DebugLocked = Yes
265,489 UART: [state] Starting the WD Timer 40000000 cycles
270,787 UART: [kat] SHA2-256
449,918 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,463 UART: [kat] ++
461,996 UART: [kat] sha1
474,322 UART: [kat] SHA2-256
477,342 UART: [kat] SHA2-384
484,609 UART: [kat] SHA2-512-ACC
487,714 UART: [kat] ECC-384
2,947,893 UART: [kat] HMAC-384Kdf
2,972,882 UART: [kat] LMS
3,502,369 UART: [kat] --
3,506,865 UART: [cold-reset] ++
3,509,080 UART: [fht] FHT @ 0x50003400
3,520,206 UART: [idev] ++
3,520,769 UART: [idev] CDI.KEYID = 6
3,521,722 UART: [idev] SUBJECT.KEYID = 7
3,522,897 UART: [idev] UDS.KEYID = 0
3,523,871 ready_for_fw is high
3,524,064 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,623,094 UART: [idev] Erasing UDS.KEYID = 0
6,028,036 UART: [idev] Sha1 KeyId Algorithm
6,051,187 UART: [idev] --
6,055,619 UART: [ldev] ++
6,056,198 UART: [ldev] CDI.KEYID = 6
6,057,085 UART: [ldev] SUBJECT.KEYID = 5
6,058,303 UART: [ldev] AUTHORITY.KEYID = 7
6,059,559 UART: [ldev] FE.KEYID = 1
6,101,200 UART: [ldev] Erasing FE.KEYID = 1
8,603,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,660 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,703 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,527 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,456 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,822 UART: [ldev] --
10,414,646 UART: [fwproc] Wait for Commands...
10,416,428 UART: [fwproc] Recv command 0x46574c44
10,418,523 UART: [fwproc] Recv'd Img size: 78532 bytes
13,420,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,497,887 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,566,684 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,759,867 >>> mbox cmd response: success
13,764,871 UART: [afmc] ++
13,765,517 UART: [afmc] CDI.KEYID = 6
13,766,443 UART: [afmc] SUBJECT.KEYID = 7
13,767,487 UART: [afmc] AUTHORITY.KEYID = 5
16,294,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,020,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,021,940 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,037,925 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,053,791 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,069,551 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,093,679 UART: [afmc] --
18,097,450 UART: [cold-reset] --
18,102,401 UART: [state] Locking Datavault
18,107,700 UART: [state] Locking PCR0, PCR1 and PCR31
18,109,395 UART: [state] Locking ICCM
18,111,679 UART: [exit] Launching FMC @ 0x40000130
18,120,070 UART:
18,120,325 UART: Running Caliptra FMC ...
18,121,352 UART:
18,121,497 UART: [state] CFI Enabled
18,178,130 UART: [fht] FMC Alias Private Key: 7
19,942,252 UART: [art] Extend RT PCRs Done
19,943,469 UART: [art] Lock RT PCRs Done
19,945,391 UART: [art] Populate DV Done
19,950,848 UART: [fht] FMC Alias Private Key: 7
19,952,393 UART: [art] Derive CDI
19,953,131 UART: [art] Store in in slot 0x4
20,010,530 UART: [art] Derive Key Pair
20,011,585 UART: [art] Store priv key in slot 0x5
22,474,763 UART: [art] Derive Key Pair - Done
22,487,959 UART: [art] Signing Cert with AUTHO
22,489,311 UART: RITY.KEYID = 7
24,200,196 UART: [art] Erasing AUTHORITY.KEYID = 7
24,201,716 UART: [art] PUB.X = 5C81C65477966612C0BD4C8CDBEE6AFA3B5ED27DB0F63B99454EC6D16ADED7E09E160DD3DB1AE416E4EE77394D6FCB6F
24,208,962 UART: [art] PUB.Y = 63923BA815779A5A65AE2A5DCCFE16C08483CEA03C166A56BC534D212DD84A776625DD0437C99FA636DF8F1642A625FF
24,216,252 UART: [art] SIG.R = 352727CC62DFC7BF38660F44DC70D75E8A2997EA0080ECF0549161E97AFEE691341C6469A1D26A9D35A0488C421ECD7E
24,223,580 UART: [art] SIG.S = E52E874E8F58D1440A0D30E68314F47D6015F59CCC967E1114E592CCB894C4FAFA4EC2C42EA10B05C4E2B6FCB808309D
25,201,625 UART: mbox::rt_entry...
25,202,579 UART: ____ _ _ _ ____ _____
25,204,559 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,206,560 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,688 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,627 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,483 UART: |_|
25,213,284 UART:
25,325,654 UART: [rt] Runtime listening for mailbox commands...
25,327,659 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,328,165 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,004 UART:
1,207 UART: Running Caliptra ROM ...
2,248 UART:
2,393 UART: [state] CFI Enabled
65,072 UART: [state] LifecycleState = Production
66,837 UART: [state] DebugLocked = Yes
69,630 UART: [state] Starting the WD Timer 40000000 cycles
73,698 UART: [kat] SHA2-256
252,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,423 UART: [kat] ++
264,872 UART: [kat] sha1
275,796 UART: [kat] SHA2-256
278,796 UART: [kat] SHA2-384
285,233 UART: [kat] SHA2-512-ACC
288,181 UART: [kat] ECC-384
2,746,490 UART: [kat] HMAC-384Kdf
2,762,086 UART: [kat] LMS
3,291,562 UART: [kat] --
3,295,762 UART: [warm-reset] ++
3,298,336 UART: [warm-reset] --
3,301,501 UART: [state] Locking Datavault
3,305,023 UART: [state] Locking PCR0, PCR1 and PCR31
3,306,768 UART: [state] Locking ICCM
3,309,027 UART: [exit] Launching FMC @ 0x40000130
3,317,436 UART:
3,317,674 UART: Running Caliptra FMC ...
3,318,778 UART:
3,318,937 UART: [state] CFI Enabled
3,373,635 UART: [aliasrt :skip pcr extension
3,374,895 UART: [art] Extend RT PCRs Done
3,376,032 UART: [art] Lock RT PCRs Done
3,377,265 UART: [art] Populate DV Done
3,382,905 UART: [fht] FMC Alias Private Key: 7
3,384,389 UART: [art] Derive CDI
3,385,153 UART: [art] Store in in slot 0x4
3,442,406 UART: [art] Derive Key Pair
3,443,450 UART: [art] Store priv key in slot 0x5
5,906,639 UART: [art] Derive Key Pair - Done
5,919,687 UART: [art] Signing Cert with AUTHO
5,920,985 UART: RITY.KEYID = 7
7,632,321 UART: [art] Erasing AUTHORITY.KEYID = 7
7,633,832 UART: [art] PUB.X = 5C81C65477966612C0BD4C8CDBEE6AFA3B5ED27DB0F63B99454EC6D16ADED7E09E160DD3DB1AE416E4EE77394D6FCB6F
7,641,120 UART: [art] PUB.Y = 63923BA815779A5A65AE2A5DCCFE16C08483CEA03C166A56BC534D212DD84A776625DD0437C99FA636DF8F1642A625FF
7,648,385 UART: [art] SIG.R = 352727CC62DFC7BF38660F44DC70D75E8A2997EA0080ECF0549161E97AFEE691341C6469A1D26A9D35A0488C421ECD7E
7,655,737 UART: [art] SIG.S = E52E874E8F58D1440A0D30E68314F47D6015F59CCC967E1114E592CCB894C4FAFA4EC2C42EA10B05C4E2B6FCB808309D
8,634,574 UART: mbox::rt_entry...
8,635,518 UART: ____ _ _ _ ____ _____
8,637,497 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,639,523 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,641,456 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,643,390 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,645,320 UART: |_|
8,646,158 UART:
8,932,288 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,714 writing to cptra_bootfsm_go
192,324 UART:
192,699 UART: Running Caliptra ROM ...
193,786 UART:
603,692 UART: [state] CFI Enabled
619,046 UART: [state] LifecycleState = Production
620,799 UART: [state] DebugLocked = Yes
623,063 UART: [state] Starting the WD Timer 40000000 cycles
628,103 UART: [kat] SHA2-256
807,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,820 UART: [kat] ++
819,263 UART: [kat] sha1
829,602 UART: [kat] SHA2-256
832,616 UART: [kat] SHA2-384
839,884 UART: [kat] SHA2-512-ACC
842,823 UART: [kat] ECC-384
3,286,226 UART: [kat] HMAC-384Kdf
3,298,370 UART: [kat] LMS
3,827,905 UART: [kat] --
3,831,639 UART: [cold-reset] ++
3,833,496 UART: [fht] FHT @ 0x50003400
3,843,836 UART: [idev] ++
3,844,404 UART: [idev] CDI.KEYID = 6
3,845,389 UART: [idev] SUBJECT.KEYID = 7
3,846,672 UART: [idev] UDS.KEYID = 0
3,847,578 ready_for_fw is high
3,847,798 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,946,600 UART: [idev] Erasing UDS.KEYID = 0
6,318,662 UART: [idev] Sha1 KeyId Algorithm
6,341,593 UART: [idev] --
6,345,129 UART: [ldev] ++
6,345,703 UART: [ldev] CDI.KEYID = 6
6,346,620 UART: [ldev] SUBJECT.KEYID = 5
6,347,836 UART: [ldev] AUTHORITY.KEYID = 7
6,349,067 UART: [ldev] FE.KEYID = 1
6,357,120 UART: [ldev] Erasing FE.KEYID = 1
8,830,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,747 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,763 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,581 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,542 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,317 UART: [ldev] --
10,624,308 UART: [fwproc] Wait for Commands...
10,626,289 UART: [fwproc] Recv command 0x46574c44
10,628,379 UART: [fwproc] Recv'd Img size: 78532 bytes
13,621,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,695,828 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,764,624 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,956,495 >>> mbox cmd response: success
13,961,417 UART: [afmc] ++
13,962,027 UART: [afmc] CDI.KEYID = 6
13,962,945 UART: [afmc] SUBJECT.KEYID = 7
13,964,103 UART: [afmc] AUTHORITY.KEYID = 5
16,461,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,179,232 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,181,081 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,197,111 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,212,954 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,228,673 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,250,147 UART: [afmc] --
18,254,718 UART: [cold-reset] --
18,258,313 UART: [state] Locking Datavault
18,263,828 UART: [state] Locking PCR0, PCR1 and PCR31
18,265,527 UART: [state] Locking ICCM
18,266,867 UART: [exit] Launching FMC @ 0x40000130
18,275,261 UART:
18,275,497 UART: Running Caliptra FMC ...
18,276,601 UART:
18,276,774 UART: [state] CFI Enabled
18,284,929 UART: [fht] FMC Alias Private Key: 7
20,042,090 UART: [art] Extend RT PCRs Done
20,043,321 UART: [art] Lock RT PCRs Done
20,044,964 UART: [art] Populate DV Done
20,050,599 UART: [fht] FMC Alias Private Key: 7
20,052,190 UART: [art] Derive CDI
20,053,008 UART: [art] Store in in slot 0x4
20,095,596 UART: [art] Derive Key Pair
20,096,731 UART: [art] Store priv key in slot 0x5
22,523,005 UART: [art] Derive Key Pair - Done
22,535,950 UART: [art] Signing Cert with AUTHO
22,537,259 UART: RITY.KEYID = 7
24,242,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,244,234 UART: [art] PUB.X = 3FF6E4E398A1E47487BA5F3AE3723CBD6D3CB3D80F4EDED9F4D7D09C5FE05FE2C873B52BBD190D8010C0FE996AC33F98
24,251,525 UART: [art] PUB.Y = E5BA3C5196F93D0F73A6F52F9A37AC6C010C5776A7CCE3EE3AB720D22F78F598C83EDC6635B4CDC01E62C80806BEF6C5
24,258,778 UART: [art] SIG.R = 07BEC38D3F3AE228F57D894BEB99E2DAFAEDFDCFE823D9781ECA90633E430D97A00592FF9B6A94713B7222651DA5DE1D
24,266,181 UART: [art] SIG.S = BC87CA308C0ED2F13A6807706F40ED9A13959E4A086EFF781CC3CB723FE8E79F84DF7BA365F39F68216D19644BAA880E
25,245,349 UART: mbox::rt_entry...
25,246,298 UART: ____ _ _ _ ____ _____
25,248,296 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,250,258 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,252,188 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,254,073 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,256,002 UART: |_|
25,256,816 UART:
25,369,301 UART: [rt] Runtime listening for mailbox commands...
25,371,310 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,371,804 >>> mbox cmd response data (0 bytes)
Initializing fuses
993 UART:
1,171 UART: Running Caliptra ROM ...
2,216 UART:
15,159,862 UART: [state] CFI Enabled
15,177,197 UART: [state] LifecycleState = Production
15,178,957 UART: [state] DebugLocked = Yes
15,180,773 UART: [state] Starting the WD Timer 40000000 cycles
15,185,936 UART: [kat] SHA2-256
15,365,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,376,624 UART: [kat] ++
15,377,162 UART: [kat] sha1
15,387,246 UART: [kat] SHA2-256
15,390,257 UART: [kat] SHA2-384
15,395,108 UART: [kat] SHA2-512-ACC
15,398,043 UART: [kat] ECC-384
17,838,950 UART: [kat] HMAC-384Kdf
17,852,901 UART: [kat] LMS
18,382,403 UART: [kat] --
18,388,550 UART: [warm-reset] ++
18,392,797 UART: [warm-reset] --
18,397,366 UART: [state] Locking Datavault
18,401,082 UART: [state] Locking PCR0, PCR1 and PCR31
18,402,754 UART: [state] Locking ICCM
18,405,179 UART: [exit] Launching FMC @ 0x40000130
18,413,573 UART:
18,413,811 UART: Running Caliptra FMC ...
18,414,914 UART:
18,415,072 UART: [state] CFI Enabled
18,416,855 UART: [aliasrt :skip pcr extension
18,418,100 UART: [art] Extend RT PCRs Done
18,419,235 UART: [art] Lock RT PCRs Done
18,420,409 UART: [art] Populate DV Done
18,426,142 UART: [fht] FMC Alias Private Key: 7
18,427,689 UART: [art] Derive CDI
18,428,424 UART: [art] Store in in slot 0x4
18,471,331 UART: [art] Derive Key Pair
18,472,342 UART: [art] Store priv key in slot 0x5
20,899,154 UART: [art] Derive Key Pair - Done
20,912,441 UART: [art] Signing Cert with AUTHO
20,913,746 UART: RITY.KEYID = 7
22,619,308 UART: [art] Erasing AUTHORITY.KEYID = 7
22,620,816 UART: [art] PUB.X = 3FF6E4E398A1E47487BA5F3AE3723CBD6D3CB3D80F4EDED9F4D7D09C5FE05FE2C873B52BBD190D8010C0FE996AC33F98
22,628,070 UART: [art] PUB.Y = E5BA3C5196F93D0F73A6F52F9A37AC6C010C5776A7CCE3EE3AB720D22F78F598C83EDC6635B4CDC01E62C80806BEF6C5
22,635,347 UART: [art] SIG.R = 07BEC38D3F3AE228F57D894BEB99E2DAFAEDFDCFE823D9781ECA90633E430D97A00592FF9B6A94713B7222651DA5DE1D
22,642,804 UART: [art] SIG.S = BC87CA308C0ED2F13A6807706F40ED9A13959E4A086EFF781CC3CB723FE8E79F84DF7BA365F39F68216D19644BAA880E
23,621,500 UART: mbox::rt_entry...
23,622,465 UART: ____ _ _ _ ____ _____
23,624,392 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,626,396 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,628,322 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,630,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,632,176 UART: |_|
23,633,008 UART:
23,919,607 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
192,199 UART:
192,560 UART: Running Caliptra ROM ...
193,742 UART:
603,358 UART: [state] CFI Enabled
615,099 UART: [state] LifecycleState = Production
616,859 UART: [state] DebugLocked = Yes
618,276 UART: [state] Starting the WD Timer 40000000 cycles
624,000 UART: [kat] SHA2-256
803,180 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,742 UART: [kat] ++
815,273 UART: [kat] sha1
827,245 UART: [kat] SHA2-256
830,260 UART: [kat] SHA2-384
836,479 UART: [kat] SHA2-512-ACC
839,383 UART: [kat] ECC-384
3,280,215 UART: [kat] HMAC-384Kdf
3,291,251 UART: [kat] LMS
3,820,773 UART: [kat] --
3,825,612 UART: [cold-reset] ++
3,827,687 UART: [fht] FHT @ 0x50003400
3,837,955 UART: [idev] ++
3,838,516 UART: [idev] CDI.KEYID = 6
3,839,429 UART: [idev] SUBJECT.KEYID = 7
3,840,603 UART: [idev] UDS.KEYID = 0
3,841,572 ready_for_fw is high
3,841,780 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,940,463 UART: [idev] Erasing UDS.KEYID = 0
6,317,371 UART: [idev] Sha1 KeyId Algorithm
6,341,991 UART: [idev] --
6,347,069 UART: [ldev] ++
6,347,643 UART: [ldev] CDI.KEYID = 6
6,348,553 UART: [ldev] SUBJECT.KEYID = 5
6,349,711 UART: [ldev] AUTHORITY.KEYID = 7
6,350,996 UART: [ldev] FE.KEYID = 1
6,360,782 UART: [ldev] Erasing FE.KEYID = 1
8,836,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,814 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,568,794 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,584,609 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,600,603 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,620,413 UART: [ldev] --
10,624,296 UART: [fwproc] Wait for Commands...
10,626,879 UART: [fwproc] Recv command 0x46574c44
10,628,972 UART: [fwproc] Recv'd Img size: 78532 bytes
13,624,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,701,013 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,769,798 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,962,227 >>> mbox cmd response: success
13,965,951 UART: [afmc] ++
13,966,622 UART: [afmc] CDI.KEYID = 6
13,967,520 UART: [afmc] SUBJECT.KEYID = 7
13,968,752 UART: [afmc] AUTHORITY.KEYID = 5
16,468,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,190,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,192,213 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,208,204 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,224,078 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,239,810 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,262,589 UART: [afmc] --
18,265,512 UART: [cold-reset] --
18,268,240 UART: [state] Locking Datavault
18,274,673 UART: [state] Locking PCR0, PCR1 and PCR31
18,276,466 UART: [state] Locking ICCM
18,278,873 UART: [exit] Launching FMC @ 0x40000130
18,287,332 UART:
18,287,570 UART: Running Caliptra FMC ...
18,288,669 UART:
18,288,827 UART: [state] CFI Enabled
18,297,201 UART: [fht] FMC Alias Private Key: 7
20,053,923 UART: [art] Extend RT PCRs Done
20,055,150 UART: [art] Lock RT PCRs Done
20,056,871 UART: [art] Populate DV Done
20,062,341 UART: [fht] FMC Alias Private Key: 7
20,063,778 UART: [art] Derive CDI
20,064,561 UART: [art] Store in in slot 0x4
20,107,229 UART: [art] Derive Key Pair
20,108,323 UART: [art] Store priv key in slot 0x5
22,534,793 UART: [art] Derive Key Pair - Done
22,547,855 UART: [art] Signing Cert with AUTHO
22,549,153 UART: RITY.KEYID = 7
24,254,626 UART: [art] Erasing AUTHORITY.KEYID = 7
24,256,129 UART: [art] PUB.X = 007F1DAA54E4FD336E841395A80FBE094326A27C198AB16E8DB1146806B4BFE1DA467B892F05F1068F7F227995E35874
24,263,377 UART: [art] PUB.Y = 4A493659B624E9D0202B6672BA0A440E306A88C4AD1333E0A4EAEC423C26A81B06869CF4977701144CB8B22F74E6AE0C
24,270,608 UART: [art] SIG.R = 332D02299EBB8E6A8D9AE9CBB13CF0ABA5997F4C113BF61A50382348FBCF5D7F0E6479B2C3BD8475061888FBEDBACD58
24,278,080 UART: [art] SIG.S = 6348950CBE2CA91E410683CE5A49C21EA37B9D4295C206ADDE3D7C7C47B2F19967DC720C39D7F97BC1F9B984BBA68A00
25,256,450 UART: mbox::rt_entry...
25,257,412 UART: ____ _ _ _ ____ _____
25,259,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,261,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,263,220 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,265,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,267,026 UART: |_|
25,267,915 UART:
25,381,095 UART: [rt] Runtime listening for mailbox commands...
25,383,104 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,383,611 >>> mbox cmd response data (0 bytes)
Initializing fuses
997 UART:
1,176 UART: Running Caliptra ROM ...
2,222 UART:
15,150,603 UART: [state] CFI Enabled
15,162,644 UART: [state] LifecycleState = Production
15,164,347 UART: [state] DebugLocked = Yes
15,166,093 UART: [state] Starting the WD Timer 40000000 cycles
15,170,876 UART: [kat] SHA2-256
15,350,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,361,581 UART: [kat] ++
15,362,039 UART: [kat] sha1
15,374,001 UART: [kat] SHA2-256
15,377,065 UART: [kat] SHA2-384
15,384,575 UART: [kat] SHA2-512-ACC
15,387,521 UART: [kat] ECC-384
17,829,720 UART: [kat] HMAC-384Kdf
17,843,023 UART: [kat] LMS
18,372,509 UART: [kat] --
18,375,545 UART: [warm-reset] ++
18,379,426 UART: [warm-reset] --
18,383,993 UART: [state] Locking Datavault
18,387,026 UART: [state] Locking PCR0, PCR1 and PCR31
18,388,677 UART: [state] Locking ICCM
18,389,857 UART: [exit] Launching FMC @ 0x40000130
18,398,276 UART:
18,398,522 UART: Running Caliptra FMC ...
18,399,625 UART:
18,399,784 UART: [state] CFI Enabled
18,401,568 UART: [aliasrt :skip pcr extension
18,402,814 UART: [art] Extend RT PCRs Done
18,403,948 UART: [art] Lock RT PCRs Done
18,405,391 UART: [art] Populate DV Done
18,411,114 UART: [fht] FMC Alias Private Key: 7
18,412,816 UART: [art] Derive CDI
18,413,614 UART: [art] Store in in slot 0x4
18,455,986 UART: [art] Derive Key Pair
18,457,000 UART: [art] Store priv key in slot 0x5
20,884,169 UART: [art] Derive Key Pair - Done
20,897,314 UART: [art] Signing Cert with AUTHO
20,898,653 UART: RITY.KEYID = 7
22,603,395 UART: [art] Erasing AUTHORITY.KEYID = 7
22,604,899 UART: [art] PUB.X = 007F1DAA54E4FD336E841395A80FBE094326A27C198AB16E8DB1146806B4BFE1DA467B892F05F1068F7F227995E35874
22,612,151 UART: [art] PUB.Y = 4A493659B624E9D0202B6672BA0A440E306A88C4AD1333E0A4EAEC423C26A81B06869CF4977701144CB8B22F74E6AE0C
22,619,386 UART: [art] SIG.R = 332D02299EBB8E6A8D9AE9CBB13CF0ABA5997F4C113BF61A50382348FBCF5D7F0E6479B2C3BD8475061888FBEDBACD58
22,626,774 UART: [art] SIG.S = 6348950CBE2CA91E410683CE5A49C21EA37B9D4295C206ADDE3D7C7C47B2F19967DC720C39D7F97BC1F9B984BBA68A00
23,605,156 UART: mbox::rt_entry...
23,606,097 UART: ____ _ _ _ ____ _____
23,608,082 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,610,090 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,612,020 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,614,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,616,081 UART: |_|
23,616,916 UART:
23,899,879 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
191,537 UART:
191,915 UART: Running Caliptra ROM ...
193,035 UART:
193,187 UART: [state] CFI Enabled
262,734 UART: [state] LifecycleState = Production
264,464 UART: [state] DebugLocked = Yes
267,243 UART: [state] Starting the WD Timer 40000000 cycles
272,419 UART: [kat] SHA2-256
451,610 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,186 UART: [kat] ++
463,717 UART: [kat] sha1
475,759 UART: [kat] SHA2-256
478,841 UART: [kat] SHA2-384
485,113 UART: [kat] SHA2-512-ACC
488,047 UART: [kat] ECC-384
2,949,807 UART: [kat] HMAC-384Kdf
2,971,851 UART: [kat] LMS
3,501,326 UART: [kat] --
3,506,310 UART: [cold-reset] ++
3,507,672 UART: [fht] FHT @ 0x50003400
3,518,433 UART: [idev] ++
3,518,997 UART: [idev] CDI.KEYID = 6
3,520,025 UART: [idev] SUBJECT.KEYID = 7
3,521,130 UART: [idev] UDS.KEYID = 0
3,522,059 ready_for_fw is high
3,522,275 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,621,647 UART: [idev] Erasing UDS.KEYID = 0
6,028,913 UART: [idev] Sha1 KeyId Algorithm
6,051,214 UART: [idev] --
6,053,978 UART: [ldev] ++
6,054,554 UART: [ldev] CDI.KEYID = 6
6,055,469 UART: [ldev] SUBJECT.KEYID = 5
6,056,636 UART: [ldev] AUTHORITY.KEYID = 7
6,057,872 UART: [ldev] FE.KEYID = 1
6,100,442 UART: [ldev] Erasing FE.KEYID = 1
8,605,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,427 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,420 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,238 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,152 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,409,819 UART: [ldev] --
10,413,533 UART: [fwproc] Wait for Commands...
10,415,576 UART: [fwproc] Recv command 0x46574c44
10,417,670 UART: [fwproc] Recv'd Img size: 78532 bytes
13,408,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,479,579 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,548,311 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,741,316 >>> mbox cmd response: success
13,745,479 UART: [afmc] ++
13,746,102 UART: [afmc] CDI.KEYID = 6
13,747,015 UART: [afmc] SUBJECT.KEYID = 7
13,748,125 UART: [afmc] AUTHORITY.KEYID = 5
16,271,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,998,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,000,216 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,016,227 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,032,067 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,047,858 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,069,524 UART: [afmc] --
18,073,957 UART: [cold-reset] --
18,077,824 UART: [state] Locking Datavault
18,083,125 UART: [state] Locking PCR0, PCR1 and PCR31
18,084,769 UART: [state] Locking ICCM
18,087,169 UART: [exit] Launching FMC @ 0x40000130
18,095,566 UART:
18,095,800 UART: Running Caliptra FMC ...
18,096,829 UART:
18,096,978 UART: [state] CFI Enabled
18,156,429 UART: [fht] FMC Alias Private Key: 7
19,920,788 UART: [art] Extend RT PCRs Done
19,922,005 UART: [art] Lock RT PCRs Done
19,923,613 UART: [art] Populate DV Done
19,929,191 UART: [fht] FMC Alias Private Key: 7
19,930,698 UART: [art] Derive CDI
19,931,462 UART: [art] Store in in slot 0x4
19,989,787 UART: [art] Derive Key Pair
19,990,840 UART: [art] Store priv key in slot 0x5
22,453,830 UART: [art] Derive Key Pair - Done
22,466,935 UART: [art] Signing Cert with AUTHO
22,468,245 UART: RITY.KEYID = 7
24,179,953 UART: [art] Erasing AUTHORITY.KEYID = 7
24,181,603 UART: [art] PUB.X = DED6E4B8BFD8F7EECAB821756B3B6D622AD665ED829D73F87513EFD649CA18E718FB734C893F17D7A48031E1F23E8F8B
24,188,712 UART: [art] PUB.Y = 6D76CD8DD6D0BCBCD24A857E1A9424F33FF815D85EDE74B9B7DE88FD4BCF6A3831916D7B0DDE530B7F5C5548FEEE168F
24,196,066 UART: [art] SIG.R = 4F23AE6A6C77BCBE5D21271D4F418DAED9C51D3D561CEBA0325A8168BB9E0EF6F72977AB863EF32E5210F79101D1BE99
24,203,445 UART: [art] SIG.S = AFAAE1B2CCEB13A4B14829D9BF75AD8F78148F5EC014356461E258FFD22228CAED9E7778543CD21269E2E0FE9187E1E0
25,180,966 UART: mbox::rt_entry...
25,181,937 UART: ____ _ _ _ ____ _____
25,183,841 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,185,856 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,187,806 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,189,739 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,191,668 UART: |_|
25,192,502 UART:
25,305,216 UART: [rt] Runtime listening for mailbox commands...
25,307,227 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,307,731 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,045 UART:
1,238 UART: Running Caliptra ROM ...
2,354 UART:
2,508 UART: [state] CFI Enabled
66,953 UART: [state] LifecycleState = Production
68,675 UART: [state] DebugLocked = Yes
70,514 UART: [state] Starting the WD Timer 40000000 cycles
75,887 UART: [kat] SHA2-256
255,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,558 UART: [kat] ++
267,088 UART: [kat] sha1
276,730 UART: [kat] SHA2-256
279,791 UART: [kat] SHA2-384
284,791 UART: [kat] SHA2-512-ACC
287,720 UART: [kat] ECC-384
2,747,012 UART: [kat] HMAC-384Kdf
2,771,339 UART: [kat] LMS
3,300,841 UART: [kat] --
3,303,826 UART: [warm-reset] ++
3,306,032 UART: [warm-reset] --
3,308,927 UART: [state] Locking Datavault
3,311,960 UART: [state] Locking PCR0, PCR1 and PCR31
3,313,609 UART: [state] Locking ICCM
3,315,275 UART: [exit] Launching FMC @ 0x40000130
3,323,751 UART:
3,323,990 UART: Running Caliptra FMC ...
3,325,096 UART:
3,325,263 UART: [state] CFI Enabled
3,381,214 UART: [aliasrt :skip pcr extension
3,382,500 UART: [art] Extend RT PCRs Done
3,383,646 UART: [art] Lock RT PCRs Done
3,385,042 UART: [art] Populate DV Done
3,390,828 UART: [fht] FMC Alias Private Key: 7
3,392,472 UART: [art] Derive CDI
3,393,285 UART: [art] Store in in slot 0x4
3,450,045 UART: [art] Derive Key Pair
3,451,093 UART: [art] Store priv key in slot 0x5
5,913,953 UART: [art] Derive Key Pair - Done
5,927,440 UART: [art] Signing Cert with AUTHO
5,928,751 UART: RITY.KEYID = 7
7,640,804 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,322 UART: [art] PUB.X = DED6E4B8BFD8F7EECAB821756B3B6D622AD665ED829D73F87513EFD649CA18E718FB734C893F17D7A48031E1F23E8F8B
7,649,595 UART: [art] PUB.Y = 6D76CD8DD6D0BCBCD24A857E1A9424F33FF815D85EDE74B9B7DE88FD4BCF6A3831916D7B0DDE530B7F5C5548FEEE168F
7,656,895 UART: [art] SIG.R = 4F23AE6A6C77BCBE5D21271D4F418DAED9C51D3D561CEBA0325A8168BB9E0EF6F72977AB863EF32E5210F79101D1BE99
7,664,308 UART: [art] SIG.S = AFAAE1B2CCEB13A4B14829D9BF75AD8F78148F5EC014356461E258FFD22228CAED9E7778543CD21269E2E0FE9187E1E0
8,642,142 UART: mbox::rt_entry...
8,643,090 UART: ____ _ _ _ ____ _____
8,645,082 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,647,090 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,649,023 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,650,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,652,889 UART: |_|
8,653,698 UART:
8,937,805 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
191,662 UART:
192,039 UART: Running Caliptra ROM ...
193,215 UART:
193,369 UART: [state] CFI Enabled
261,586 UART: [state] LifecycleState = Production
263,382 UART: [state] DebugLocked = Yes
265,804 UART: [state] Starting the WD Timer 40000000 cycles
269,899 UART: [kat] SHA2-256
449,015 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,594 UART: [kat] ++
461,129 UART: [kat] sha1
472,036 UART: [kat] SHA2-256
475,053 UART: [kat] SHA2-384
482,322 UART: [kat] SHA2-512-ACC
485,258 UART: [kat] ECC-384
2,949,319 UART: [kat] HMAC-384Kdf
2,969,523 UART: [kat] LMS
3,498,999 UART: [kat] --
3,503,424 UART: [cold-reset] ++
3,504,431 UART: [fht] FHT @ 0x50003400
3,514,623 UART: [idev] ++
3,515,186 UART: [idev] CDI.KEYID = 6
3,516,067 UART: [idev] SUBJECT.KEYID = 7
3,517,311 UART: [idev] UDS.KEYID = 0
3,518,211 ready_for_fw is high
3,518,420 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,617,452 UART: [idev] Erasing UDS.KEYID = 0
6,022,999 UART: [idev] Sha1 KeyId Algorithm
6,046,249 UART: [idev] --
6,050,009 UART: [ldev] ++
6,050,603 UART: [ldev] CDI.KEYID = 6
6,051,492 UART: [ldev] SUBJECT.KEYID = 5
6,052,595 UART: [ldev] AUTHORITY.KEYID = 7
6,053,939 UART: [ldev] FE.KEYID = 1
6,097,698 UART: [ldev] Erasing FE.KEYID = 1
8,605,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,392 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,354,382 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,370,211 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,164 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,405,101 UART: [ldev] --
10,409,791 UART: [fwproc] Wait for Commands...
10,412,264 UART: [fwproc] Recv command 0x46574c44
10,414,358 UART: [fwproc] Recv'd Img size: 78532 bytes
13,409,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,477,858 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,546,673 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,739,537 >>> mbox cmd response: success
13,743,070 UART: [afmc] ++
13,743,689 UART: [afmc] CDI.KEYID = 6
13,744,572 UART: [afmc] SUBJECT.KEYID = 7
13,745,788 UART: [afmc] AUTHORITY.KEYID = 5
16,269,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,995,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,997,198 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,013,184 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,029,048 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,044,857 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,067,257 UART: [afmc] --
18,070,406 UART: [cold-reset] --
18,075,026 UART: [state] Locking Datavault
18,080,438 UART: [state] Locking PCR0, PCR1 and PCR31
18,082,085 UART: [state] Locking ICCM
18,083,645 UART: [exit] Launching FMC @ 0x40000130
18,092,039 UART:
18,092,289 UART: Running Caliptra FMC ...
18,093,391 UART:
18,093,551 UART: [state] CFI Enabled
18,151,916 UART: [fht] FMC Alias Private Key: 7
19,915,727 UART: [art] Extend RT PCRs Done
19,916,945 UART: [art] Lock RT PCRs Done
19,918,541 UART: [art] Populate DV Done
19,924,052 UART: [fht] FMC Alias Private Key: 7
19,925,664 UART: [art] Derive CDI
19,926,405 UART: [art] Store in in slot 0x4
19,984,475 UART: [art] Derive Key Pair
19,985,517 UART: [art] Store priv key in slot 0x5
22,448,354 UART: [art] Derive Key Pair - Done
22,461,446 UART: [art] Signing Cert with AUTHO
22,462,745 UART: RITY.KEYID = 7
24,174,083 UART: [art] Erasing AUTHORITY.KEYID = 7
24,175,598 UART: [art] PUB.X = BEEE46EBE5953A6AF9EDC7EB68977FDAAF5D82C7B95439FF909E25136809E0B7334A2CB37A1802BAA49899FC9606B71D
24,182,903 UART: [art] PUB.Y = B419C8D69DF69BE45F3464E0470B4EBEAAF54601DFAB799757710FEB129B2FBF4B012A7698F855F458E955038D0D9A52
24,190,179 UART: [art] SIG.R = 4DD15EF21D4F52627F55CE89E1AB84A6D1079F777D2610100F9074A5038D8B94602E2BB4F077D20AF6BDC3B133B889E5
24,197,565 UART: [art] SIG.S = 50E1C40FD021EF51DCDAEA2098F9823A4370637469A66A25CB71767DE4019EB20A6F2DB2CADCFF6A9399ABC5528D249E
25,176,182 UART: mbox::rt_entry...
25,177,132 UART: ____ _ _ _ ____ _____
25,179,061 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,181,072 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,183,027 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,184,961 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,186,887 UART: |_|
25,187,694 UART:
25,300,542 UART: [rt] Runtime listening for mailbox commands...
25,302,595 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,303,104 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,072 UART:
1,324 UART: Running Caliptra ROM ...
2,340 UART:
2,483 UART: [state] CFI Enabled
60,487 UART: [state] LifecycleState = Production
62,245 UART: [state] DebugLocked = Yes
65,118 UART: [state] Starting the WD Timer 40000000 cycles
70,649 UART: [kat] SHA2-256
249,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
261,366 UART: [kat] ++
261,954 UART: [kat] sha1
273,546 UART: [kat] SHA2-256
276,560 UART: [kat] SHA2-384
283,024 UART: [kat] SHA2-512-ACC
285,959 UART: [kat] ECC-384
2,745,010 UART: [kat] HMAC-384Kdf
2,767,660 UART: [kat] LMS
3,297,158 UART: [kat] --
3,301,355 UART: [warm-reset] ++
3,306,389 UART: [warm-reset] --
3,311,289 UART: [state] Locking Datavault
3,315,469 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,120 UART: [state] Locking ICCM
3,319,330 UART: [exit] Launching FMC @ 0x40000130
3,327,796 UART:
3,328,033 UART: Running Caliptra FMC ...
3,329,139 UART:
3,329,295 UART: [state] CFI Enabled
3,377,609 UART: [aliasrt :skip pcr extension
3,378,861 UART: [art] Extend RT PCRs Done
3,379,999 UART: [art] Lock RT PCRs Done
3,381,264 UART: [art] Populate DV Done
3,386,733 UART: [fht] FMC Alias Private Key: 7
3,388,431 UART: [art] Derive CDI
3,389,247 UART: [art] Store in in slot 0x4
3,446,242 UART: [art] Derive Key Pair
3,447,258 UART: [art] Store priv key in slot 0x5
5,909,884 UART: [art] Derive Key Pair - Done
5,922,885 UART: [art] Signing Cert with AUTHO
5,924,196 UART: RITY.KEYID = 7
7,635,077 UART: [art] Erasing AUTHORITY.KEYID = 7
7,636,591 UART: [art] PUB.X = BEEE46EBE5953A6AF9EDC7EB68977FDAAF5D82C7B95439FF909E25136809E0B7334A2CB37A1802BAA49899FC9606B71D
7,643,849 UART: [art] PUB.Y = B419C8D69DF69BE45F3464E0470B4EBEAAF54601DFAB799757710FEB129B2FBF4B012A7698F855F458E955038D0D9A52
7,651,143 UART: [art] SIG.R = 4DD15EF21D4F52627F55CE89E1AB84A6D1079F777D2610100F9074A5038D8B94602E2BB4F077D20AF6BDC3B133B889E5
7,658,492 UART: [art] SIG.S = 50E1C40FD021EF51DCDAEA2098F9823A4370637469A66A25CB71767DE4019EB20A6F2DB2CADCFF6A9399ABC5528D249E
8,637,085 UART: mbox::rt_entry...
8,638,049 UART: ____ _ _ _ ____ _____
8,640,040 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,641,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,643,929 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,645,787 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,647,709 UART: |_|
8,648,519 UART:
8,932,707 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,604 writing to cptra_bootfsm_go
192,257 UART:
192,628 UART: Running Caliptra ROM ...
193,751 UART:
603,430 UART: [state] CFI Enabled
616,971 UART: [state] LifecycleState = Production
618,760 UART: [state] DebugLocked = Yes
620,689 UART: [state] Starting the WD Timer 40000000 cycles
625,601 UART: [kat] SHA2-256
804,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,338 UART: [kat] ++
816,876 UART: [kat] sha1
828,781 UART: [kat] SHA2-256
831,864 UART: [kat] SHA2-384
837,290 UART: [kat] SHA2-512-ACC
840,235 UART: [kat] ECC-384
3,281,144 UART: [kat] HMAC-384Kdf
3,293,953 UART: [kat] LMS
3,823,500 UART: [kat] --
3,828,140 UART: [cold-reset] ++
3,829,506 UART: [fht] FHT @ 0x50003400
3,840,486 UART: [idev] ++
3,841,060 UART: [idev] CDI.KEYID = 6
3,841,950 UART: [idev] SUBJECT.KEYID = 7
3,843,139 UART: [idev] UDS.KEYID = 0
3,844,105 ready_for_fw is high
3,844,292 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,942,996 UART: [idev] Erasing UDS.KEYID = 0
6,314,403 UART: [idev] Sha1 KeyId Algorithm
6,336,344 UART: [idev] --
6,341,205 UART: [ldev] ++
6,341,781 UART: [ldev] CDI.KEYID = 6
6,342,699 UART: [ldev] SUBJECT.KEYID = 5
6,343,912 UART: [ldev] AUTHORITY.KEYID = 7
6,345,144 UART: [ldev] FE.KEYID = 1
6,356,439 UART: [ldev] Erasing FE.KEYID = 1
8,827,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,126 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,560,120 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,575,939 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,591,943 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,612,168 UART: [ldev] --
10,617,338 UART: [fwproc] Wait for Commands...
10,619,811 UART: [fwproc] Recv command 0x46574c44
10,621,901 UART: [fwproc] Recv'd Img size: 78532 bytes
13,618,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,694,097 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,762,845 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,955,116 >>> mbox cmd response: success
13,959,742 UART: [afmc] ++
13,960,356 UART: [afmc] CDI.KEYID = 6
13,961,275 UART: [afmc] SUBJECT.KEYID = 7
13,962,441 UART: [afmc] AUTHORITY.KEYID = 5
16,457,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,177,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,179,424 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,195,426 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,211,286 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,227,003 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,250,001 UART: [afmc] --
18,254,394 UART: [cold-reset] --
18,257,824 UART: [state] Locking Datavault
18,265,668 UART: [state] Locking PCR0, PCR1 and PCR31
18,267,320 UART: [state] Locking ICCM
18,268,717 UART: [exit] Launching FMC @ 0x40000130
18,277,118 UART:
18,277,359 UART: Running Caliptra FMC ...
18,278,459 UART:
18,278,626 UART: [state] CFI Enabled
18,287,115 UART: [fht] FMC Alias Private Key: 7
20,044,318 UART: [art] Extend RT PCRs Done
20,045,684 UART: [art] Lock RT PCRs Done
20,046,960 UART: [art] Populate DV Done
20,052,490 UART: [fht] FMC Alias Private Key: 7
20,054,050 UART: [art] Derive CDI
20,054,817 UART: [art] Store in in slot 0x4
20,097,332 UART: [art] Derive Key Pair
20,098,439 UART: [art] Store priv key in slot 0x5
22,525,742 UART: [art] Derive Key Pair - Done
22,538,737 UART: [art] Signing Cert with AUTHO
22,540,038 UART: RITY.KEYID = 7
24,245,045 UART: [art] Erasing AUTHORITY.KEYID = 7
24,246,549 UART: [art] PUB.X = 54BFCA6AB2376E117EA3F61C3466E78DA49E6661E683B10C2830B9F8E9B6A1DFF0E92E781A83131D59F24880255EA1EB
24,253,853 UART: [art] PUB.Y = D50B6C89BEF30408BD01E3CAB413EF08898A3DBA5D88253145C08032908B5469600FFC58E42AAC5D05D5769FF6D7075E
24,261,092 UART: [art] SIG.R = 2B621F5FB279E314FD1D63882C77C6BC8DD801EEBC32334E1001A4F1D50A9FFEC1D42F768BE7364C2375235F45D07EA8
24,268,486 UART: [art] SIG.S = 2A5AD28D84048E46C8D08877F5E5CD86CB5404F8F13E18B8D9D398FEB555E8A7537759D67D269FD8FD76B8BBC024632B
25,247,399 UART: mbox::rt_entry...
25,248,348 UART: ____ _ _ _ ____ _____
25,250,302 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,252,320 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,254,261 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,256,193 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,258,124 UART: |_|
25,258,937 UART:
25,371,733 UART: [rt] Runtime listening for mailbox commands...
25,373,739 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,374,239 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,060 UART:
1,228 UART: Running Caliptra ROM ...
2,250 UART:
15,150,414 UART: [state] CFI Enabled
15,164,188 UART: [state] LifecycleState = Production
15,165,882 UART: [state] DebugLocked = Yes
15,167,276 UART: [state] Starting the WD Timer 40000000 cycles
15,171,860 UART: [kat] SHA2-256
15,351,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,362,575 UART: [kat] ++
15,363,118 UART: [kat] sha1
15,374,549 UART: [kat] SHA2-256
15,377,568 UART: [kat] SHA2-384
15,383,553 UART: [kat] SHA2-512-ACC
15,386,500 UART: [kat] ECC-384
17,826,948 UART: [kat] HMAC-384Kdf
17,841,218 UART: [kat] LMS
18,370,767 UART: [kat] --
18,376,864 UART: [warm-reset] ++
18,380,788 UART: [warm-reset] --
18,384,325 UART: [state] Locking Datavault
18,387,247 UART: [state] Locking PCR0, PCR1 and PCR31
18,388,968 UART: [state] Locking ICCM
18,391,719 UART: [exit] Launching FMC @ 0x40000130
18,400,117 UART:
18,400,358 UART: Running Caliptra FMC ...
18,401,464 UART:
18,401,621 UART: [state] CFI Enabled
18,403,511 UART: [aliasrt :skip pcr extension
18,404,759 UART: [art] Extend RT PCRs Done
18,405,898 UART: [art] Lock RT PCRs Done
18,407,293 UART: [art] Populate DV Done
18,412,758 UART: [fht] FMC Alias Private Key: 7
18,414,248 UART: [art] Derive CDI
18,415,015 UART: [art] Store in in slot 0x4
18,457,988 UART: [art] Derive Key Pair
18,459,038 UART: [art] Store priv key in slot 0x5
20,886,249 UART: [art] Derive Key Pair - Done
20,899,210 UART: [art] Signing Cert with AUTHO
20,900,513 UART: RITY.KEYID = 7
22,605,874 UART: [art] Erasing AUTHORITY.KEYID = 7
22,607,384 UART: [art] PUB.X = 54BFCA6AB2376E117EA3F61C3466E78DA49E6661E683B10C2830B9F8E9B6A1DFF0E92E781A83131D59F24880255EA1EB
22,614,628 UART: [art] PUB.Y = D50B6C89BEF30408BD01E3CAB413EF08898A3DBA5D88253145C08032908B5469600FFC58E42AAC5D05D5769FF6D7075E
22,621,908 UART: [art] SIG.R = 2B621F5FB279E314FD1D63882C77C6BC8DD801EEBC32334E1001A4F1D50A9FFEC1D42F768BE7364C2375235F45D07EA8
22,629,305 UART: [art] SIG.S = 2A5AD28D84048E46C8D08877F5E5CD86CB5404F8F13E18B8D9D398FEB555E8A7537759D67D269FD8FD76B8BBC024632B
23,607,405 UART: mbox::rt_entry...
23,608,373 UART: ____ _ _ _ ____ _____
23,610,365 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,612,386 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,614,323 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,616,264 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,618,199 UART: |_|
23,619,012 UART:
23,900,598 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
192,246 UART:
192,614 UART: Running Caliptra ROM ...
193,782 UART:
603,489 UART: [state] CFI Enabled
617,667 UART: [state] LifecycleState = Production
619,364 UART: [state] DebugLocked = Yes
621,285 UART: [state] Starting the WD Timer 40000000 cycles
626,084 UART: [kat] SHA2-256
805,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,793 UART: [kat] ++
817,237 UART: [kat] sha1
828,276 UART: [kat] SHA2-256
831,291 UART: [kat] SHA2-384
837,709 UART: [kat] SHA2-512-ACC
840,717 UART: [kat] ECC-384
3,282,607 UART: [kat] HMAC-384Kdf
3,294,842 UART: [kat] LMS
3,824,337 UART: [kat] --
3,828,470 UART: [cold-reset] ++
3,829,608 UART: [fht] FHT @ 0x50003400
3,841,749 UART: [idev] ++
3,842,325 UART: [idev] CDI.KEYID = 6
3,843,283 UART: [idev] SUBJECT.KEYID = 7
3,844,455 UART: [idev] UDS.KEYID = 0
3,845,387 ready_for_fw is high
3,845,603 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,944,352 UART: [idev] Erasing UDS.KEYID = 0
6,317,647 UART: [idev] Sha1 KeyId Algorithm
6,340,695 UART: [idev] --
6,345,172 UART: [ldev] ++
6,345,744 UART: [ldev] CDI.KEYID = 6
6,346,659 UART: [ldev] SUBJECT.KEYID = 5
6,347,818 UART: [ldev] AUTHORITY.KEYID = 7
6,349,102 UART: [ldev] FE.KEYID = 1
6,359,589 UART: [ldev] Erasing FE.KEYID = 1
8,832,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,440 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,248 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,163 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,619,575 UART: [ldev] --
10,624,996 UART: [fwproc] Wait for Commands...
10,627,447 UART: [fwproc] Recv command 0x46574c44
10,629,556 UART: [fwproc] Recv'd Img size: 78532 bytes
13,631,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,713,576 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,782,367 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,974,956 >>> mbox cmd response: success
13,978,632 UART: [afmc] ++
13,979,243 UART: [afmc] CDI.KEYID = 6
13,980,155 UART: [afmc] SUBJECT.KEYID = 7
13,981,319 UART: [afmc] AUTHORITY.KEYID = 5
16,478,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,201,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,203,306 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,219,297 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,235,142 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,250,851 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,274,154 UART: [afmc] --
18,278,867 UART: [cold-reset] --
18,281,322 UART: [state] Locking Datavault
18,285,597 UART: [state] Locking PCR0, PCR1 and PCR31
18,287,294 UART: [state] Locking ICCM
18,289,123 UART: [exit] Launching FMC @ 0x40000130
18,297,530 UART:
18,297,770 UART: Running Caliptra FMC ...
18,298,868 UART:
18,299,033 UART: [state] CFI Enabled
18,307,331 UART: [fht] FMC Alias Private Key: 7
20,064,009 UART: [art] Extend RT PCRs Done
20,065,484 UART: [art] Lock RT PCRs Done
20,067,190 UART: [art] Populate DV Done
20,072,881 UART: [fht] FMC Alias Private Key: 7
20,074,499 UART: [art] Derive CDI
20,075,267 UART: [art] Store in in slot 0x4
20,117,989 UART: [art] Derive Key Pair
20,118,987 UART: [art] Store priv key in slot 0x5
22,546,125 UART: [art] Derive Key Pair - Done
22,558,961 UART: [art] Signing Cert with AUTHO
22,560,267 UART: RITY.KEYID = 7
24,265,493 UART: [art] Erasing AUTHORITY.KEYID = 7
24,266,967 UART: [art] PUB.X = 53ACCC54B579ABFA205FE0C2D9ACF5D6BDA71CDB72AAFF1B7470BBA713DAA0D41DA9955389FD1EC0680E96D5189C55D4
24,274,317 UART: [art] PUB.Y = A1B9516964A6CC87C3C16DAEC1DE7770A2140F6CD95720E8B8D734C8F32B10E85449611AF3888AB4E4BE1866D896319B
24,281,598 UART: [art] SIG.R = 7925EF57E3667E9485164A4F0650B34AD48749FB07B26AD2E3030A058B0EC080F4EE49B55B1C2D4B605BADA057CB4F13
24,289,017 UART: [art] SIG.S = EDB020F2A8E5311DC4A1E5C34E4ED7A72396D4CFE374C0BD97F330BCC2564AF53BED6F81F15C34BD0361C08615FE60D8
25,268,269 UART: mbox::rt_entry...
25,269,234 UART: ____ _ _ _ ____ _____
25,271,168 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,273,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,275,034 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,276,962 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,278,817 UART: |_|
25,279,644 UART:
25,393,139 UART: [rt] Runtime listening for mailbox commands...
25,395,153 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,395,662 >>> mbox cmd response data (0 bytes)
Initializing fuses
985 UART:
1,166 UART: Running Caliptra ROM ...
2,211 UART:
15,136,267 UART: [state] CFI Enabled
15,149,690 UART: [state] LifecycleState = Production
15,151,256 UART: [state] DebugLocked = Yes
15,153,712 UART: [state] Starting the WD Timer 40000000 cycles
15,158,446 UART: [kat] SHA2-256
15,337,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,349,159 UART: [kat] ++
15,349,710 UART: [kat] sha1
15,360,445 UART: [kat] SHA2-256
15,363,459 UART: [kat] SHA2-384
15,369,606 UART: [kat] SHA2-512-ACC
15,372,602 UART: [kat] ECC-384
17,816,559 UART: [kat] HMAC-384Kdf
17,828,293 UART: [kat] LMS
18,357,834 UART: [kat] --
18,362,487 UART: [warm-reset] ++
18,367,457 UART: [warm-reset] --
18,370,915 UART: [state] Locking Datavault
18,374,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,375,824 UART: [state] Locking ICCM
18,377,626 UART: [exit] Launching FMC @ 0x40000130
18,386,077 UART:
18,386,312 UART: Running Caliptra FMC ...
18,387,417 UART:
18,387,576 UART: [state] CFI Enabled
18,389,743 UART: [aliasrt :skip pcr extension
18,390,987 UART: [art] Extend RT PCRs Done
18,392,121 UART: [art] Lock RT PCRs Done
18,393,354 UART: [art] Populate DV Done
18,398,704 UART: [fht] FMC Alias Private Key: 7
18,400,188 UART: [art] Derive CDI
18,400,953 UART: [art] Store in in slot 0x4
18,443,593 UART: [art] Derive Key Pair
18,444,636 UART: [art] Store priv key in slot 0x5
20,870,973 UART: [art] Derive Key Pair - Done
20,884,238 UART: [art] Signing Cert with AUTHO
20,885,535 UART: RITY.KEYID = 7
22,591,093 UART: [art] Erasing AUTHORITY.KEYID = 7
22,592,596 UART: [art] PUB.X = 53ACCC54B579ABFA205FE0C2D9ACF5D6BDA71CDB72AAFF1B7470BBA713DAA0D41DA9955389FD1EC0680E96D5189C55D4
22,599,902 UART: [art] PUB.Y = A1B9516964A6CC87C3C16DAEC1DE7770A2140F6CD95720E8B8D734C8F32B10E85449611AF3888AB4E4BE1866D896319B
22,607,196 UART: [art] SIG.R = 7925EF57E3667E9485164A4F0650B34AD48749FB07B26AD2E3030A058B0EC080F4EE49B55B1C2D4B605BADA057CB4F13
22,614,546 UART: [art] SIG.S = EDB020F2A8E5311DC4A1E5C34E4ED7A72396D4CFE374C0BD97F330BCC2564AF53BED6F81F15C34BD0361C08615FE60D8
23,593,300 UART: mbox::rt_entry...
23,594,238 UART: ____ _ _ _ ____ _____
23,596,245 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,598,211 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,600,139 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,601,992 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,603,938 UART: |_|
23,604,756 UART:
23,888,502 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Production
85,725 UART: [state] DebugLocked = Yes
86,271 UART: [state] Starting the WD Timer 40000000 cycles
87,976 UART: [kat] SHA2-256
891,526 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,382 UART: [kat] HMAC-384Kdf
921,150 UART: [kat] LMS
1,169,462 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,668 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,057 UART: [idev] Erasing UDS.KEYID = 0
1,198,766 UART: [idev] Sha1 KeyId Algorithm
1,207,785 UART: [idev] --
1,208,750 UART: [ldev] ++
1,208,918 UART: [ldev] CDI.KEYID = 6
1,209,282 UART: [ldev] SUBJECT.KEYID = 5
1,209,709 UART: [ldev] AUTHORITY.KEYID = 7
1,210,172 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,401 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,095 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,965 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,671 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,887 UART: [ldev] --
1,281,269 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,741 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,554 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,863 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,056 >>> mbox cmd response: success
2,335,220 UART: [afmc] ++
2,335,388 UART: [afmc] CDI.KEYID = 6
2,335,751 UART: [afmc] SUBJECT.KEYID = 7
2,336,177 UART: [afmc] AUTHORITY.KEYID = 5
2,371,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,886 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,637 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,356 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,249 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,956 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,833 UART: [afmc] --
2,414,726 UART: [cold-reset] --
2,415,472 UART: [state] Locking Datavault
2,416,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,195 UART: [state] Locking ICCM
2,417,863 UART: [exit] Launching FMC @ 0x40000130
2,423,192 UART:
2,423,208 UART: Running Caliptra FMC ...
2,423,616 UART:
2,423,670 UART: [state] CFI Enabled
2,433,781 UART: [fht] FMC Alias Private Key: 7
2,541,934 UART: [art] Extend RT PCRs Done
2,542,362 UART: [art] Lock RT PCRs Done
2,543,910 UART: [art] Populate DV Done
2,552,122 UART: [fht] FMC Alias Private Key: 7
2,553,274 UART: [art] Derive CDI
2,553,554 UART: [art] Store in in slot 0x4
2,639,271 UART: [art] Derive Key Pair
2,639,631 UART: [art] Store priv key in slot 0x5
2,652,813 UART: [art] Derive Key Pair - Done
2,667,156 UART: [art] Signing Cert with AUTHO
2,667,636 UART: RITY.KEYID = 7
2,682,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,597 UART: [art] PUB.X = 833C2F1AEC3CC230EC949D3930531C6693584E3D9CF2EDE24D3D566AC3C43A83E6514165C47745822BA897F916691ABF
2,690,369 UART: [art] PUB.Y = 586B51E31B191EAE1DE25DA12D70B7CF06E73512711BEBFED14741391F86723878FAEDA76CC66FD9F095EF93D516D37C
2,697,328 UART: [art] SIG.R = DCF0552AAA1A3106E17DE4113367D7583D7638A7DB5E5E631C5FDF78B7C572DFC14202A9128054BEBB2F3B6034D7FDE2
2,704,104 UART: [art] SIG.S = FB35C50C65A94C6D22C6FAB53AD41CAA6DB1331DD09D23E5F15AAD46E9E1C9BAC5DD4382651485CA4647FEA2A06A04A9
2,727,139 UART: mbox::rt_entry...
2,727,511 UART: ____ _ _ _ ____ _____
2,728,295 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,095 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,729,863 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,730,631 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,399 UART: |_|
2,731,711 UART:
2,838,401 UART: [rt] Runtime listening for mailbox commands...
2,839,163 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,839,278 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,372 UART:
2,839,388 UART: Running Caliptra ROM ...
2,839,796 UART:
2,839,851 UART: [state] CFI Enabled
2,842,472 UART: [state] LifecycleState = Production
2,843,080 UART: [state] DebugLocked = Yes
2,843,618 UART: [state] Starting the WD Timer 40000000 cycles
2,845,157 UART: [kat] SHA2-256
3,648,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,836 UART: [kat] ++
3,652,988 UART: [kat] sha1
3,657,414 UART: [kat] SHA2-256
3,659,354 UART: [kat] SHA2-384
3,662,081 UART: [kat] SHA2-512-ACC
3,663,982 UART: [kat] ECC-384
3,673,369 UART: [kat] HMAC-384Kdf
3,677,899 UART: [kat] LMS
3,926,211 UART: [kat] --
3,927,033 UART: [warm-reset] ++
3,928,028 UART: [warm-reset] --
3,928,769 UART: [state] Locking Datavault
3,929,387 UART: [state] Locking PCR0, PCR1 and PCR31
3,929,991 UART: [state] Locking ICCM
3,930,517 UART: [exit] Launching FMC @ 0x40000130
3,935,846 UART:
3,935,862 UART: Running Caliptra FMC ...
3,936,270 UART:
3,936,324 UART: [state] CFI Enabled
3,937,833 UART: [aliasrt :skip pcr extension
3,938,306 UART: [art] Extend RT PCRs Done
3,938,734 UART: [art] Lock RT PCRs Done
3,939,765 UART: [art] Populate DV Done
3,948,027 UART: [fht] FMC Alias Private Key: 7
3,949,083 UART: [art] Derive CDI
3,949,363 UART: [art] Store in in slot 0x4
4,035,162 UART: [art] Derive Key Pair
4,035,522 UART: [art] Store priv key in slot 0x5
4,048,612 UART: [art] Derive Key Pair - Done
4,063,329 UART: [art] Signing Cert with AUTHO
4,063,809 UART: RITY.KEYID = 7
4,079,211 UART: [art] Erasing AUTHORITY.KEYID = 7
4,079,976 UART: [art] PUB.X = 833C2F1AEC3CC230EC949D3930531C6693584E3D9CF2EDE24D3D566AC3C43A83E6514165C47745822BA897F916691ABF
4,086,748 UART: [art] PUB.Y = 586B51E31B191EAE1DE25DA12D70B7CF06E73512711BEBFED14741391F86723878FAEDA76CC66FD9F095EF93D516D37C
4,093,707 UART: [art] SIG.R = DCF0552AAA1A3106E17DE4113367D7583D7638A7DB5E5E631C5FDF78B7C572DFC14202A9128054BEBB2F3B6034D7FDE2
4,100,483 UART: [art] SIG.S = FB35C50C65A94C6D22C6FAB53AD41CAA6DB1331DD09D23E5F15AAD46E9E1C9BAC5DD4382651485CA4647FEA2A06A04A9
4,123,790 UART: mbox::rt_entry...
4,124,162 UART: ____ _ _ _ ____ _____
4,124,946 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,746 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,126,514 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,127,282 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,050 UART: |_|
4,128,362 UART:
4,410,050 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Production
85,829 UART: [state] DebugLocked = Yes
86,349 UART: [state] Starting the WD Timer 40000000 cycles
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,460 UART: [kat] SHA2-512-ACC
906,361 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,769 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,173,098 UART: [idev] ++
1,173,266 UART: [idev] CDI.KEYID = 6
1,173,627 UART: [idev] SUBJECT.KEYID = 7
1,174,052 UART: [idev] UDS.KEYID = 0
1,174,398 ready_for_fw is high
1,174,398 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,304 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,209,030 UART: [ldev] ++
1,209,198 UART: [ldev] CDI.KEYID = 6
1,209,562 UART: [ldev] SUBJECT.KEYID = 5
1,209,989 UART: [ldev] AUTHORITY.KEYID = 7
1,210,452 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,953 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,823 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,529 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,549 UART: [ldev] --
1,280,931 UART: [fwproc] Wait for Commands...
1,281,702 UART: [fwproc] Recv command 0x46574c44
1,282,435 UART: [fwproc] Recv'd Img size: 78532 bytes
2,193,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,220,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,677 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,331,812 >>> mbox cmd response: success
2,333,018 UART: [afmc] ++
2,333,186 UART: [afmc] CDI.KEYID = 6
2,333,549 UART: [afmc] SUBJECT.KEYID = 7
2,333,975 UART: [afmc] AUTHORITY.KEYID = 5
2,369,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,386,841 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,560 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,453 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,160 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,049 UART: [afmc] --
2,412,980 UART: [cold-reset] --
2,413,686 UART: [state] Locking Datavault
2,414,791 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,395 UART: [state] Locking ICCM
2,415,825 UART: [exit] Launching FMC @ 0x40000130
2,421,154 UART:
2,421,170 UART: Running Caliptra FMC ...
2,421,578 UART:
2,421,632 UART: [state] CFI Enabled
2,431,655 UART: [fht] FMC Alias Private Key: 7
2,539,616 UART: [art] Extend RT PCRs Done
2,540,044 UART: [art] Lock RT PCRs Done
2,541,388 UART: [art] Populate DV Done
2,549,528 UART: [fht] FMC Alias Private Key: 7
2,550,518 UART: [art] Derive CDI
2,550,798 UART: [art] Store in in slot 0x4
2,636,849 UART: [art] Derive Key Pair
2,637,209 UART: [art] Store priv key in slot 0x5
2,650,523 UART: [art] Derive Key Pair - Done
2,665,211 UART: [art] Signing Cert with AUTHO
2,665,691 UART: RITY.KEYID = 7
2,681,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,830 UART: [art] PUB.X = E59D78C4D27CD5067416E9922FF8FC94F5FF6968B8681A3D3ADEAF755EC2C8489357D7B015D0EC0325F58F4F229A28FF
2,688,604 UART: [art] PUB.Y = B25704A799AE7D0E67C4CBCCCF0BCDF221F3A46A08B184349797167BE4DCCCCCD774EBE940DB2EC21DEC9633A65D74D7
2,695,566 UART: [art] SIG.R = F40F7D7627BFD6B46217F24BDB0CCA1C30E64A2713EF30BB81BB55B9A18F87B931EF46670A3237095633A3E8DE681729
2,702,330 UART: [art] SIG.S = D5448035FDE76C75C89F1BAB88C9992FEA43A867EEEA860D6F2F9FB9EA5A9358D741BD304BE122D223A5068C3569613C
2,726,115 UART: mbox::rt_entry...
2,726,487 UART: ____ _ _ _ ____ _____
2,727,271 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,728,071 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,728,839 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,729,607 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,730,375 UART: |_|
2,730,687 UART:
2,837,981 UART: [rt] Runtime listening for mailbox commands...
2,838,743 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,838,858 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,838,952 UART:
2,838,968 UART: Running Caliptra ROM ...
2,839,376 UART:
2,839,431 UART: [state] CFI Enabled
2,841,930 UART: [state] LifecycleState = Production
2,842,538 UART: [state] DebugLocked = Yes
2,843,166 UART: [state] Starting the WD Timer 40000000 cycles
2,844,761 UART: [kat] SHA2-256
3,648,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,440 UART: [kat] ++
3,652,592 UART: [kat] sha1
3,656,720 UART: [kat] SHA2-256
3,658,660 UART: [kat] SHA2-384
3,661,295 UART: [kat] SHA2-512-ACC
3,663,196 UART: [kat] ECC-384
3,672,757 UART: [kat] HMAC-384Kdf
3,677,319 UART: [kat] LMS
3,925,631 UART: [kat] --
3,926,805 UART: [warm-reset] ++
3,927,352 UART: [warm-reset] --
3,927,989 UART: [state] Locking Datavault
3,928,831 UART: [state] Locking PCR0, PCR1 and PCR31
3,929,435 UART: [state] Locking ICCM
3,930,007 UART: [exit] Launching FMC @ 0x40000130
3,935,336 UART:
3,935,352 UART: Running Caliptra FMC ...
3,935,760 UART:
3,935,814 UART: [state] CFI Enabled
3,936,869 UART: [aliasrt :skip pcr extension
3,937,342 UART: [art] Extend RT PCRs Done
3,937,770 UART: [art] Lock RT PCRs Done
3,939,157 UART: [art] Populate DV Done
3,947,279 UART: [fht] FMC Alias Private Key: 7
3,948,411 UART: [art] Derive CDI
3,948,691 UART: [art] Store in in slot 0x4
4,034,588 UART: [art] Derive Key Pair
4,034,948 UART: [art] Store priv key in slot 0x5
4,048,520 UART: [art] Derive Key Pair - Done
4,063,734 UART: [art] Signing Cert with AUTHO
4,064,214 UART: RITY.KEYID = 7
4,079,716 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,481 UART: [art] PUB.X = E59D78C4D27CD5067416E9922FF8FC94F5FF6968B8681A3D3ADEAF755EC2C8489357D7B015D0EC0325F58F4F229A28FF
4,087,255 UART: [art] PUB.Y = B25704A799AE7D0E67C4CBCCCF0BCDF221F3A46A08B184349797167BE4DCCCCCD774EBE940DB2EC21DEC9633A65D74D7
4,094,217 UART: [art] SIG.R = F40F7D7627BFD6B46217F24BDB0CCA1C30E64A2713EF30BB81BB55B9A18F87B931EF46670A3237095633A3E8DE681729
4,100,981 UART: [art] SIG.S = D5448035FDE76C75C89F1BAB88C9992FEA43A867EEEA860D6F2F9FB9EA5A9358D741BD304BE122D223A5068C3569613C
4,124,572 UART: mbox::rt_entry...
4,124,944 UART: ____ _ _ _ ____ _____
4,125,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,528 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,296 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,064 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,832 UART: |_|
4,129,144 UART:
4,410,332 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Production
86,004 UART: [state] DebugLocked = Yes
86,666 UART: [state] Starting the WD Timer 40000000 cycles
88,341 UART: [kat] SHA2-256
891,891 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,020 UART: [kat] ++
896,172 UART: [kat] sha1
900,422 UART: [kat] SHA2-256
902,362 UART: [kat] SHA2-384
905,201 UART: [kat] SHA2-512-ACC
907,102 UART: [kat] ECC-384
916,927 UART: [kat] HMAC-384Kdf
921,727 UART: [kat] LMS
1,170,039 UART: [kat] --
1,171,042 UART: [cold-reset] ++
1,171,587 UART: [fht] FHT @ 0x50003400
1,174,257 UART: [idev] ++
1,174,425 UART: [idev] CDI.KEYID = 6
1,174,786 UART: [idev] SUBJECT.KEYID = 7
1,175,211 UART: [idev] UDS.KEYID = 0
1,175,557 ready_for_fw is high
1,175,557 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,183,276 UART: [idev] Erasing UDS.KEYID = 0
1,200,209 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,209,979 UART: [ldev] ++
1,210,147 UART: [ldev] CDI.KEYID = 6
1,210,511 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,959 UART: [ldev] Erasing FE.KEYID = 1
1,242,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,136 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,830 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,700 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,406 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,710 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,875 UART: [fwproc] Recv command 0x46574c44
1,283,608 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,145 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,454 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,332,557 >>> mbox cmd response: success
2,333,801 UART: [afmc] ++
2,333,969 UART: [afmc] CDI.KEYID = 6
2,334,332 UART: [afmc] SUBJECT.KEYID = 7
2,334,758 UART: [afmc] AUTHORITY.KEYID = 5
2,370,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,088 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,807 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,700 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,407 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,124 UART: [afmc] --
2,414,129 UART: [cold-reset] --
2,415,007 UART: [state] Locking Datavault
2,416,128 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,732 UART: [state] Locking ICCM
2,417,226 UART: [exit] Launching FMC @ 0x40000130
2,422,555 UART:
2,422,571 UART: Running Caliptra FMC ...
2,422,979 UART:
2,423,122 UART: [state] CFI Enabled
2,433,641 UART: [fht] FMC Alias Private Key: 7
2,541,070 UART: [art] Extend RT PCRs Done
2,541,498 UART: [art] Lock RT PCRs Done
2,542,854 UART: [art] Populate DV Done
2,550,956 UART: [fht] FMC Alias Private Key: 7
2,552,068 UART: [art] Derive CDI
2,552,348 UART: [art] Store in in slot 0x4
2,638,085 UART: [art] Derive Key Pair
2,638,445 UART: [art] Store priv key in slot 0x5
2,652,379 UART: [art] Derive Key Pair - Done
2,667,234 UART: [art] Signing Cert with AUTHO
2,667,714 UART: RITY.KEYID = 7
2,682,846 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,611 UART: [art] PUB.X = 4DDAB36C9EE9BB272B716EE70D3EDBF3F2EFAAD9C400F7ADAEF18479A8DD1D64AEAF9BD58C6295C03E3BA9EE04943697
2,690,385 UART: [art] PUB.Y = 217AA72EB6DA7D0D671A9DDDE82E58C148095419B2DB9D360D35165EC56DD84C0F71545CFC87709E1B98E6956A3BABAC
2,697,337 UART: [art] SIG.R = 53DB283F6EBB75DAAA0B7A717E1A71777EB02405B3CC6F778075B981C3E909081DC68CDDA139E1DF1D123F3F8B587097
2,704,105 UART: [art] SIG.S = CDB7A3F322A9AAA8739947BA5109C9DA6E25A98B9B9D806DE646C7B0A1EF3B4CE3251AD578273943D67D82046350DDAA
2,727,580 UART: mbox::rt_entry...
2,727,952 UART: ____ _ _ _ ____ _____
2,728,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,536 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,304 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,840 UART: |_|
2,732,152 UART:
2,839,568 UART: [rt] Runtime listening for mailbox commands...
2,840,330 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,840,445 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,539 UART:
2,840,555 UART: Running Caliptra ROM ...
2,840,963 UART:
2,841,105 UART: [state] CFI Enabled
2,844,232 UART: [state] LifecycleState = Production
2,844,840 UART: [state] DebugLocked = Yes
2,845,410 UART: [state] Starting the WD Timer 40000000 cycles
2,847,057 UART: [kat] SHA2-256
3,650,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,654,736 UART: [kat] ++
3,654,888 UART: [kat] sha1
3,659,340 UART: [kat] SHA2-256
3,661,280 UART: [kat] SHA2-384
3,664,027 UART: [kat] SHA2-512-ACC
3,665,928 UART: [kat] ECC-384
3,675,649 UART: [kat] HMAC-384Kdf
3,680,271 UART: [kat] LMS
3,928,583 UART: [kat] --
3,929,313 UART: [warm-reset] ++
3,930,106 UART: [warm-reset] --
3,930,847 UART: [state] Locking Datavault
3,931,781 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,385 UART: [state] Locking ICCM
3,932,943 UART: [exit] Launching FMC @ 0x40000130
3,938,272 UART:
3,938,288 UART: Running Caliptra FMC ...
3,938,696 UART:
3,938,839 UART: [state] CFI Enabled
3,940,294 UART: [aliasrt :skip pcr extension
3,940,767 UART: [art] Extend RT PCRs Done
3,941,195 UART: [art] Lock RT PCRs Done
3,942,308 UART: [art] Populate DV Done
3,950,430 UART: [fht] FMC Alias Private Key: 7
3,951,446 UART: [art] Derive CDI
3,951,726 UART: [art] Store in in slot 0x4
4,037,293 UART: [art] Derive Key Pair
4,037,653 UART: [art] Store priv key in slot 0x5
4,051,039 UART: [art] Derive Key Pair - Done
4,066,230 UART: [art] Signing Cert with AUTHO
4,066,710 UART: RITY.KEYID = 7
4,081,890 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,655 UART: [art] PUB.X = 4DDAB36C9EE9BB272B716EE70D3EDBF3F2EFAAD9C400F7ADAEF18479A8DD1D64AEAF9BD58C6295C03E3BA9EE04943697
4,089,429 UART: [art] PUB.Y = 217AA72EB6DA7D0D671A9DDDE82E58C148095419B2DB9D360D35165EC56DD84C0F71545CFC87709E1B98E6956A3BABAC
4,096,381 UART: [art] SIG.R = 53DB283F6EBB75DAAA0B7A717E1A71777EB02405B3CC6F778075B981C3E909081DC68CDDA139E1DF1D123F3F8B587097
4,103,149 UART: [art] SIG.S = CDB7A3F322A9AAA8739947BA5109C9DA6E25A98B9B9D806DE646C7B0A1EF3B4CE3251AD578273943D67D82046350DDAA
4,126,996 UART: mbox::rt_entry...
4,127,368 UART: ____ _ _ _ ____ _____
4,128,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,952 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,720 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,488 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,256 UART: |_|
4,131,568 UART:
4,412,752 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Production
85,932 UART: [state] DebugLocked = Yes
86,666 UART: [state] Starting the WD Timer 40000000 cycles
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,854 UART: [kat] ++
896,006 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,957 UART: [kat] HMAC-384Kdf
921,497 UART: [kat] LMS
1,169,809 UART: [kat] --
1,170,866 UART: [cold-reset] ++
1,171,227 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,175,101 ready_for_fw is high
1,175,101 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,652 UART: [idev] Erasing UDS.KEYID = 0
1,200,039 UART: [idev] Sha1 KeyId Algorithm
1,208,698 UART: [idev] --
1,209,749 UART: [ldev] ++
1,209,917 UART: [ldev] CDI.KEYID = 6
1,210,281 UART: [ldev] SUBJECT.KEYID = 5
1,210,708 UART: [ldev] AUTHORITY.KEYID = 7
1,211,171 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,132 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,002 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,708 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,818 UART: [ldev] --
1,282,144 UART: [fwproc] Wait for Commands...
1,282,893 UART: [fwproc] Recv command 0x46574c44
1,283,626 UART: [fwproc] Recv'd Img size: 78532 bytes
2,196,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,293 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,602 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,685 >>> mbox cmd response: success
2,335,747 UART: [afmc] ++
2,335,915 UART: [afmc] CDI.KEYID = 6
2,336,278 UART: [afmc] SUBJECT.KEYID = 7
2,336,704 UART: [afmc] AUTHORITY.KEYID = 5
2,372,449 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,828 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,547 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,440 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,147 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,415,006 UART: [afmc] --
2,415,921 UART: [cold-reset] --
2,417,003 UART: [state] Locking Datavault
2,417,832 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,436 UART: [state] Locking ICCM
2,419,058 UART: [exit] Launching FMC @ 0x40000130
2,424,387 UART:
2,424,403 UART: Running Caliptra FMC ...
2,424,811 UART:
2,424,954 UART: [state] CFI Enabled
2,435,111 UART: [fht] FMC Alias Private Key: 7
2,542,760 UART: [art] Extend RT PCRs Done
2,543,188 UART: [art] Lock RT PCRs Done
2,544,492 UART: [art] Populate DV Done
2,552,390 UART: [fht] FMC Alias Private Key: 7
2,553,506 UART: [art] Derive CDI
2,553,786 UART: [art] Store in in slot 0x4
2,639,605 UART: [art] Derive Key Pair
2,639,965 UART: [art] Store priv key in slot 0x5
2,653,745 UART: [art] Derive Key Pair - Done
2,668,434 UART: [art] Signing Cert with AUTHO
2,668,914 UART: RITY.KEYID = 7
2,684,100 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,865 UART: [art] PUB.X = 0AFF5E0DF0443AA5A6EE3AB15C25A99416AFAC7CF04AFA291BBD842CE9D0AB4970354F7AC1B71D957305B4B21563BADA
2,691,650 UART: [art] PUB.Y = 69B377DC7A6D578D87A4352D482373E9E356A7AB9A662CB7CEFD43DA319E39D97CBE3C4D27F588E1BB2CD0DD10D63BB9
2,698,618 UART: [art] SIG.R = 2F2839B2906BAA2FAFDC5390E5DF82FDF3F203E8DDD8A24FC6966989472902B933ED12E7FB714C26E56051A8614C103E
2,705,390 UART: [art] SIG.S = 33A25EB470703736C248F757007C064DCA18A51D4EC819DBB099FF76ACEE530509EF6B67EB8B98ECA87B466C35198F9D
2,729,434 UART: mbox::rt_entry...
2,729,806 UART: ____ _ _ _ ____ _____
2,730,590 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,390 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,158 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,926 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,694 UART: |_|
2,734,006 UART:
2,840,955 UART: [rt] Runtime listening for mailbox commands...
2,841,717 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,841,832 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,926 UART:
2,841,942 UART: Running Caliptra ROM ...
2,842,350 UART:
2,842,492 UART: [state] CFI Enabled
2,845,683 UART: [state] LifecycleState = Production
2,846,291 UART: [state] DebugLocked = Yes
2,846,867 UART: [state] Starting the WD Timer 40000000 cycles
2,848,354 UART: [kat] SHA2-256
3,651,904 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,033 UART: [kat] ++
3,656,185 UART: [kat] sha1
3,660,449 UART: [kat] SHA2-256
3,662,389 UART: [kat] SHA2-384
3,665,214 UART: [kat] SHA2-512-ACC
3,667,115 UART: [kat] ECC-384
3,677,256 UART: [kat] HMAC-384Kdf
3,681,950 UART: [kat] LMS
3,930,262 UART: [kat] --
3,930,960 UART: [warm-reset] ++
3,931,949 UART: [warm-reset] --
3,932,940 UART: [state] Locking Datavault
3,933,900 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,504 UART: [state] Locking ICCM
3,935,154 UART: [exit] Launching FMC @ 0x40000130
3,940,483 UART:
3,940,499 UART: Running Caliptra FMC ...
3,940,907 UART:
3,941,050 UART: [state] CFI Enabled
3,942,467 UART: [aliasrt :skip pcr extension
3,942,940 UART: [art] Extend RT PCRs Done
3,943,368 UART: [art] Lock RT PCRs Done
3,944,637 UART: [art] Populate DV Done
3,952,697 UART: [fht] FMC Alias Private Key: 7
3,953,699 UART: [art] Derive CDI
3,953,979 UART: [art] Store in in slot 0x4
4,039,860 UART: [art] Derive Key Pair
4,040,220 UART: [art] Store priv key in slot 0x5
4,054,104 UART: [art] Derive Key Pair - Done
4,068,915 UART: [art] Signing Cert with AUTHO
4,069,395 UART: RITY.KEYID = 7
4,084,791 UART: [art] Erasing AUTHORITY.KEYID = 7
4,085,556 UART: [art] PUB.X = 0AFF5E0DF0443AA5A6EE3AB15C25A99416AFAC7CF04AFA291BBD842CE9D0AB4970354F7AC1B71D957305B4B21563BADA
4,092,341 UART: [art] PUB.Y = 69B377DC7A6D578D87A4352D482373E9E356A7AB9A662CB7CEFD43DA319E39D97CBE3C4D27F588E1BB2CD0DD10D63BB9
4,099,309 UART: [art] SIG.R = 2F2839B2906BAA2FAFDC5390E5DF82FDF3F203E8DDD8A24FC6966989472902B933ED12E7FB714C26E56051A8614C103E
4,106,081 UART: [art] SIG.S = 33A25EB470703736C248F757007C064DCA18A51D4EC819DBB099FF76ACEE530509EF6B67EB8B98ECA87B466C35198F9D
4,129,657 UART: mbox::rt_entry...
4,130,029 UART: ____ _ _ _ ____ _____
4,130,813 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,131,613 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,132,381 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,133,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,917 UART: |_|
4,134,229 UART:
4,411,538 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Production
86,149 UART: [state] DebugLocked = Yes
86,751 UART: [state] Starting the WD Timer 40000000 cycles
88,370 UART: [kat] SHA2-256
891,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,049 UART: [kat] ++
896,201 UART: [kat] sha1
900,629 UART: [kat] SHA2-256
902,569 UART: [kat] SHA2-384
905,140 UART: [kat] SHA2-512-ACC
907,041 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,173,996 ready_for_fw is high
1,173,996 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,389 UART: [idev] Erasing UDS.KEYID = 0
1,198,466 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,318 UART: [ldev] ++
1,208,486 UART: [ldev] CDI.KEYID = 6
1,208,850 UART: [ldev] SUBJECT.KEYID = 5
1,209,277 UART: [ldev] AUTHORITY.KEYID = 7
1,209,740 UART: [ldev] FE.KEYID = 1
1,214,796 UART: [ldev] Erasing FE.KEYID = 1
1,240,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,473 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,167 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,037 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,743 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,739 UART: [ldev] --
1,280,017 UART: [fwproc] Wait for Commands...
1,280,694 UART: [fwproc] Recv command 0x46574c44
1,281,427 UART: [fwproc] Recv'd Img size: 78532 bytes
2,193,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,884 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,193 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,333,204 >>> mbox cmd response: success
2,334,442 UART: [afmc] ++
2,334,610 UART: [afmc] CDI.KEYID = 6
2,334,973 UART: [afmc] SUBJECT.KEYID = 7
2,335,399 UART: [afmc] AUTHORITY.KEYID = 5
2,370,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,157 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,876 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,769 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,476 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,235 UART: [afmc] --
2,414,302 UART: [cold-reset] --
2,415,208 UART: [state] Locking Datavault
2,416,361 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,965 UART: [state] Locking ICCM
2,417,531 UART: [exit] Launching FMC @ 0x40000130
2,422,860 UART:
2,422,876 UART: Running Caliptra FMC ...
2,423,284 UART:
2,423,338 UART: [state] CFI Enabled
2,433,781 UART: [fht] FMC Alias Private Key: 7
2,541,136 UART: [art] Extend RT PCRs Done
2,541,564 UART: [art] Lock RT PCRs Done
2,543,380 UART: [art] Populate DV Done
2,551,834 UART: [fht] FMC Alias Private Key: 7
2,552,854 UART: [art] Derive CDI
2,553,134 UART: [art] Store in in slot 0x4
2,638,929 UART: [art] Derive Key Pair
2,639,289 UART: [art] Store priv key in slot 0x5
2,652,809 UART: [art] Derive Key Pair - Done
2,667,356 UART: [art] Signing Cert with AUTHO
2,667,836 UART: RITY.KEYID = 7
2,682,988 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,753 UART: [art] PUB.X = E0A30E48B38725B52B96B633E6124A93C77086603A0EB3BFDE612660815E224C791DB57BA573911AD483ECB47E9887F8
2,690,515 UART: [art] PUB.Y = EB5A7A45805AFC0D3B7AB0162D30CA848A3363A03976A729BF54CA49F2591514A81D82155E811AAD31D40900A95655DF
2,697,439 UART: [art] SIG.R = 6BEA9FED34C2D4D3A4339934B75DD2994F81D0AF55E8291B9FCBD20970AE8DBFECF2E5C2DF82631D58E5DD42FD35691B
2,704,228 UART: [art] SIG.S = 1F899E8558C0B3FC3AE09C948C089DB1B2C7CF7748677C2DA75F09E605FDAB81C5E698BB95100DC3FB0BF3BC2FEB3891
2,728,156 UART: mbox::rt_entry...
2,728,528 UART: ____ _ _ _ ____ _____
2,729,312 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,112 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,880 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,416 UART: |_|
2,732,728 UART:
2,838,597 UART: [rt] Runtime listening for mailbox commands...
2,839,359 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,839,474 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,568 UART:
2,839,584 UART: Running Caliptra ROM ...
2,839,992 UART:
2,840,047 UART: [state] CFI Enabled
2,843,082 UART: [state] LifecycleState = Production
2,843,690 UART: [state] DebugLocked = Yes
2,844,290 UART: [state] Starting the WD Timer 40000000 cycles
2,845,801 UART: [kat] SHA2-256
3,649,351 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,480 UART: [kat] ++
3,653,632 UART: [kat] sha1
3,657,814 UART: [kat] SHA2-256
3,659,754 UART: [kat] SHA2-384
3,662,429 UART: [kat] SHA2-512-ACC
3,664,330 UART: [kat] ECC-384
3,674,023 UART: [kat] HMAC-384Kdf
3,678,681 UART: [kat] LMS
3,926,993 UART: [kat] --
3,928,063 UART: [warm-reset] ++
3,929,040 UART: [warm-reset] --
3,929,967 UART: [state] Locking Datavault
3,930,757 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,361 UART: [state] Locking ICCM
3,931,895 UART: [exit] Launching FMC @ 0x40000130
3,937,224 UART:
3,937,240 UART: Running Caliptra FMC ...
3,937,648 UART:
3,937,702 UART: [state] CFI Enabled
3,938,859 UART: [aliasrt :skip pcr extension
3,939,332 UART: [art] Extend RT PCRs Done
3,939,760 UART: [art] Lock RT PCRs Done
3,940,853 UART: [art] Populate DV Done
3,949,217 UART: [fht] FMC Alias Private Key: 7
3,950,267 UART: [art] Derive CDI
3,950,547 UART: [art] Store in in slot 0x4
4,036,038 UART: [art] Derive Key Pair
4,036,398 UART: [art] Store priv key in slot 0x5
4,049,812 UART: [art] Derive Key Pair - Done
4,064,405 UART: [art] Signing Cert with AUTHO
4,064,885 UART: RITY.KEYID = 7
4,080,259 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,024 UART: [art] PUB.X = E0A30E48B38725B52B96B633E6124A93C77086603A0EB3BFDE612660815E224C791DB57BA573911AD483ECB47E9887F8
4,087,786 UART: [art] PUB.Y = EB5A7A45805AFC0D3B7AB0162D30CA848A3363A03976A729BF54CA49F2591514A81D82155E811AAD31D40900A95655DF
4,094,710 UART: [art] SIG.R = 6BEA9FED34C2D4D3A4339934B75DD2994F81D0AF55E8291B9FCBD20970AE8DBFECF2E5C2DF82631D58E5DD42FD35691B
4,101,499 UART: [art] SIG.S = 1F899E8558C0B3FC3AE09C948C089DB1B2C7CF7748677C2DA75F09E605FDAB81C5E698BB95100DC3FB0BF3BC2FEB3891
4,124,833 UART: mbox::rt_entry...
4,125,205 UART: ____ _ _ _ ____ _____
4,125,989 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,789 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,325 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,093 UART: |_|
4,129,405 UART:
4,411,606 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Production
85,793 UART: [state] DebugLocked = Yes
86,393 UART: [state] Starting the WD Timer 40000000 cycles
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,812 UART: [kat] SHA2-512-ACC
906,713 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,844 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,174,864 ready_for_fw is high
1,174,864 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,287 UART: [idev] Erasing UDS.KEYID = 0
1,199,138 UART: [idev] Sha1 KeyId Algorithm
1,208,079 UART: [idev] --
1,209,004 UART: [ldev] ++
1,209,172 UART: [ldev] CDI.KEYID = 6
1,209,536 UART: [ldev] SUBJECT.KEYID = 5
1,209,963 UART: [ldev] AUTHORITY.KEYID = 7
1,210,426 UART: [ldev] FE.KEYID = 1
1,215,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,973 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,843 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,549 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,541 UART: [ldev] --
1,281,039 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,399 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,537 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,332,630 >>> mbox cmd response: success
2,333,766 UART: [afmc] ++
2,333,934 UART: [afmc] CDI.KEYID = 6
2,334,297 UART: [afmc] SUBJECT.KEYID = 7
2,334,723 UART: [afmc] AUTHORITY.KEYID = 5
2,369,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,385,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,386,725 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,444 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,337 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,044 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,411,911 UART: [afmc] --
2,412,804 UART: [cold-reset] --
2,413,634 UART: [state] Locking Datavault
2,414,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,339 UART: [state] Locking ICCM
2,415,901 UART: [exit] Launching FMC @ 0x40000130
2,421,230 UART:
2,421,246 UART: Running Caliptra FMC ...
2,421,654 UART:
2,421,708 UART: [state] CFI Enabled
2,431,719 UART: [fht] FMC Alias Private Key: 7
2,539,300 UART: [art] Extend RT PCRs Done
2,539,728 UART: [art] Lock RT PCRs Done
2,541,204 UART: [art] Populate DV Done
2,549,272 UART: [fht] FMC Alias Private Key: 7
2,550,286 UART: [art] Derive CDI
2,550,566 UART: [art] Store in in slot 0x4
2,636,173 UART: [art] Derive Key Pair
2,636,533 UART: [art] Store priv key in slot 0x5
2,649,379 UART: [art] Derive Key Pair - Done
2,664,085 UART: [art] Signing Cert with AUTHO
2,664,565 UART: RITY.KEYID = 7
2,679,535 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,300 UART: [art] PUB.X = FED2A6F6369294B9D93C6C2846AED920836EF93FD0D26A3D1D6EB017FAA0C84CE73176755C6415F0AD32F9A970C20A93
2,687,077 UART: [art] PUB.Y = 63B8440ACC766CAA253EA41601468752C464CFB514BDFE148EE6E38E551519E0F1B6F4055C754449E9B3B976B06ED95C
2,694,022 UART: [art] SIG.R = 0D94D55C7CA25947D9EA29A48994137C9F3C0CF24E1F779BF0FD5E47AEAA94DFB5E60F05D57AF8653298C1828C05FFFD
2,700,793 UART: [art] SIG.S = 32D592191BF3AE61E98618D3CAA88FF2542002121A1DEBDBF6B9207393786726C79B5F0D949F619391F401B1F205FA35
2,724,732 UART: mbox::rt_entry...
2,725,104 UART: ____ _ _ _ ____ _____
2,725,888 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,726,688 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,727,456 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,728,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,728,992 UART: |_|
2,729,304 UART:
2,834,711 UART: [rt] Runtime listening for mailbox commands...
2,835,473 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,835,588 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,835,682 UART:
2,835,698 UART: Running Caliptra ROM ...
2,836,106 UART:
2,836,161 UART: [state] CFI Enabled
2,838,734 UART: [state] LifecycleState = Production
2,839,342 UART: [state] DebugLocked = Yes
2,840,022 UART: [state] Starting the WD Timer 40000000 cycles
2,841,553 UART: [kat] SHA2-256
3,645,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,649,232 UART: [kat] ++
3,649,384 UART: [kat] sha1
3,653,708 UART: [kat] SHA2-256
3,655,648 UART: [kat] SHA2-384
3,658,417 UART: [kat] SHA2-512-ACC
3,660,318 UART: [kat] ECC-384
3,669,745 UART: [kat] HMAC-384Kdf
3,674,333 UART: [kat] LMS
3,922,645 UART: [kat] --
3,923,467 UART: [warm-reset] ++
3,924,592 UART: [warm-reset] --
3,925,389 UART: [state] Locking Datavault
3,926,183 UART: [state] Locking PCR0, PCR1 and PCR31
3,926,787 UART: [state] Locking ICCM
3,927,375 UART: [exit] Launching FMC @ 0x40000130
3,932,704 UART:
3,932,720 UART: Running Caliptra FMC ...
3,933,128 UART:
3,933,182 UART: [state] CFI Enabled
3,934,463 UART: [aliasrt :skip pcr extension
3,934,936 UART: [art] Extend RT PCRs Done
3,935,364 UART: [art] Lock RT PCRs Done
3,936,581 UART: [art] Populate DV Done
3,944,619 UART: [fht] FMC Alias Private Key: 7
3,945,585 UART: [art] Derive CDI
3,945,865 UART: [art] Store in in slot 0x4
4,031,162 UART: [art] Derive Key Pair
4,031,522 UART: [art] Store priv key in slot 0x5
4,045,046 UART: [art] Derive Key Pair - Done
4,059,814 UART: [art] Signing Cert with AUTHO
4,060,294 UART: RITY.KEYID = 7
4,075,406 UART: [art] Erasing AUTHORITY.KEYID = 7
4,076,171 UART: [art] PUB.X = FED2A6F6369294B9D93C6C2846AED920836EF93FD0D26A3D1D6EB017FAA0C84CE73176755C6415F0AD32F9A970C20A93
4,082,948 UART: [art] PUB.Y = 63B8440ACC766CAA253EA41601468752C464CFB514BDFE148EE6E38E551519E0F1B6F4055C754449E9B3B976B06ED95C
4,089,893 UART: [art] SIG.R = 0D94D55C7CA25947D9EA29A48994137C9F3C0CF24E1F779BF0FD5E47AEAA94DFB5E60F05D57AF8653298C1828C05FFFD
4,096,664 UART: [art] SIG.S = 32D592191BF3AE61E98618D3CAA88FF2542002121A1DEBDBF6B9207393786726C79B5F0D949F619391F401B1F205FA35
4,120,287 UART: mbox::rt_entry...
4,120,659 UART: ____ _ _ _ ____ _____
4,121,443 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,122,243 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,123,011 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,123,779 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,124,547 UART: |_|
4,124,859 UART:
4,406,702 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Production
86,094 UART: [state] DebugLocked = Yes
86,716 UART: [state] Starting the WD Timer 40000000 cycles
88,333 UART: [kat] SHA2-256
891,883 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,012 UART: [kat] ++
896,164 UART: [kat] sha1
900,454 UART: [kat] SHA2-256
902,394 UART: [kat] SHA2-384
905,149 UART: [kat] SHA2-512-ACC
907,050 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,641 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,174,473 ready_for_fw is high
1,174,473 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,260 UART: [idev] Erasing UDS.KEYID = 0
1,200,001 UART: [idev] Sha1 KeyId Algorithm
1,208,904 UART: [idev] --
1,210,015 UART: [ldev] ++
1,210,183 UART: [ldev] CDI.KEYID = 6
1,210,547 UART: [ldev] SUBJECT.KEYID = 5
1,210,974 UART: [ldev] AUTHORITY.KEYID = 7
1,211,437 UART: [ldev] FE.KEYID = 1
1,216,873 UART: [ldev] Erasing FE.KEYID = 1
1,243,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,896 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,590 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,460 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,166 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,246 UART: [ldev] --
1,282,574 UART: [fwproc] Wait for Commands...
1,283,181 UART: [fwproc] Recv command 0x46574c44
1,283,914 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,899 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,208 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,453 >>> mbox cmd response: success
2,335,511 UART: [afmc] ++
2,335,679 UART: [afmc] CDI.KEYID = 6
2,336,042 UART: [afmc] SUBJECT.KEYID = 7
2,336,468 UART: [afmc] AUTHORITY.KEYID = 5
2,372,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,554 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,273 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,166 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,873 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,742 UART: [afmc] --
2,415,633 UART: [cold-reset] --
2,416,385 UART: [state] Locking Datavault
2,417,462 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,066 UART: [state] Locking ICCM
2,418,588 UART: [exit] Launching FMC @ 0x40000130
2,423,917 UART:
2,423,933 UART: Running Caliptra FMC ...
2,424,341 UART:
2,424,484 UART: [state] CFI Enabled
2,434,987 UART: [fht] FMC Alias Private Key: 7
2,542,704 UART: [art] Extend RT PCRs Done
2,543,132 UART: [art] Lock RT PCRs Done
2,544,600 UART: [art] Populate DV Done
2,552,682 UART: [fht] FMC Alias Private Key: 7
2,553,642 UART: [art] Derive CDI
2,553,922 UART: [art] Store in in slot 0x4
2,639,379 UART: [art] Derive Key Pair
2,639,739 UART: [art] Store priv key in slot 0x5
2,652,713 UART: [art] Derive Key Pair - Done
2,667,646 UART: [art] Signing Cert with AUTHO
2,668,126 UART: RITY.KEYID = 7
2,683,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,083 UART: [art] PUB.X = 09D98D4F31A800354DFCEA7EE9BA240A45BB264DD8DE829407E70D6553ADE5E51C818C397F5E416161A1E42B20CCF10B
2,690,828 UART: [art] PUB.Y = 580102F20795C9EC6F7A594A04B9F93FC408F0830C1FB5855A7A5C8CBF48CCE2C68BD44C1F33E3C067691156D119FB0B
2,697,765 UART: [art] SIG.R = 65BC283D08991BCC863D2889B77E29E9D2A5F1713AAA3E7D40970CD2CEF316B05A8E841808686C208BDE98689F44A1B4
2,704,530 UART: [art] SIG.S = 3A11953AA56BF91A7C4321C886F3C136A73E193EEED21EABBC05D853E6008C01FD202D895E23FBD6BCAE6E2CD3A4C2CD
2,728,809 UART: mbox::rt_entry...
2,729,181 UART: ____ _ _ _ ____ _____
2,729,965 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,765 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,533 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,301 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,069 UART: |_|
2,733,381 UART:
2,841,388 UART: [rt] Runtime listening for mailbox commands...
2,842,150 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,842,265 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,359 UART:
2,842,375 UART: Running Caliptra ROM ...
2,842,783 UART:
2,842,925 UART: [state] CFI Enabled
2,845,762 UART: [state] LifecycleState = Production
2,846,370 UART: [state] DebugLocked = Yes
2,846,962 UART: [state] Starting the WD Timer 40000000 cycles
2,848,647 UART: [kat] SHA2-256
3,652,197 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,326 UART: [kat] ++
3,656,478 UART: [kat] sha1
3,660,804 UART: [kat] SHA2-256
3,662,744 UART: [kat] SHA2-384
3,665,423 UART: [kat] SHA2-512-ACC
3,667,324 UART: [kat] ECC-384
3,677,007 UART: [kat] HMAC-384Kdf
3,681,579 UART: [kat] LMS
3,929,891 UART: [kat] --
3,930,721 UART: [warm-reset] ++
3,931,526 UART: [warm-reset] --
3,932,517 UART: [state] Locking Datavault
3,933,223 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,827 UART: [state] Locking ICCM
3,934,443 UART: [exit] Launching FMC @ 0x40000130
3,939,772 UART:
3,939,788 UART: Running Caliptra FMC ...
3,940,196 UART:
3,940,339 UART: [state] CFI Enabled
3,941,836 UART: [aliasrt :skip pcr extension
3,942,309 UART: [art] Extend RT PCRs Done
3,942,737 UART: [art] Lock RT PCRs Done
3,944,054 UART: [art] Populate DV Done
3,952,426 UART: [fht] FMC Alias Private Key: 7
3,953,462 UART: [art] Derive CDI
3,953,742 UART: [art] Store in in slot 0x4
4,039,391 UART: [art] Derive Key Pair
4,039,751 UART: [art] Store priv key in slot 0x5
4,053,141 UART: [art] Derive Key Pair - Done
4,068,062 UART: [art] Signing Cert with AUTHO
4,068,542 UART: RITY.KEYID = 7
4,083,702 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,467 UART: [art] PUB.X = 09D98D4F31A800354DFCEA7EE9BA240A45BB264DD8DE829407E70D6553ADE5E51C818C397F5E416161A1E42B20CCF10B
4,091,212 UART: [art] PUB.Y = 580102F20795C9EC6F7A594A04B9F93FC408F0830C1FB5855A7A5C8CBF48CCE2C68BD44C1F33E3C067691156D119FB0B
4,098,149 UART: [art] SIG.R = 65BC283D08991BCC863D2889B77E29E9D2A5F1713AAA3E7D40970CD2CEF316B05A8E841808686C208BDE98689F44A1B4
4,104,914 UART: [art] SIG.S = 3A11953AA56BF91A7C4321C886F3C136A73E193EEED21EABBC05D853E6008C01FD202D895E23FBD6BCAE6E2CD3A4C2CD
4,127,911 UART: mbox::rt_entry...
4,128,283 UART: ____ _ _ _ ____ _____
4,129,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,171 UART: |_|
4,132,483 UART:
4,415,542 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Production
86,226 UART: [state] DebugLocked = Yes
86,802 UART: [state] Starting the WD Timer 40000000 cycles
88,475 UART: [kat] SHA2-256
892,025 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,154 UART: [kat] ++
896,306 UART: [kat] sha1
900,588 UART: [kat] SHA2-256
902,528 UART: [kat] SHA2-384
905,335 UART: [kat] SHA2-512-ACC
907,236 UART: [kat] ECC-384
916,845 UART: [kat] HMAC-384Kdf
921,565 UART: [kat] LMS
1,169,877 UART: [kat] --
1,170,620 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,721 UART: [idev] ++
1,173,889 UART: [idev] CDI.KEYID = 6
1,174,250 UART: [idev] SUBJECT.KEYID = 7
1,174,675 UART: [idev] UDS.KEYID = 0
1,175,021 ready_for_fw is high
1,175,021 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,207,914 UART: [idev] --
1,208,961 UART: [ldev] ++
1,209,129 UART: [ldev] CDI.KEYID = 6
1,209,493 UART: [ldev] SUBJECT.KEYID = 5
1,209,920 UART: [ldev] AUTHORITY.KEYID = 7
1,210,383 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,241,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,508 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,202 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,072 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,778 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,894 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,281,897 UART: [fwproc] Recv command 0x46574c44
1,282,630 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,933 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,242 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,333,479 >>> mbox cmd response: success
2,334,565 UART: [afmc] ++
2,334,733 UART: [afmc] CDI.KEYID = 6
2,335,096 UART: [afmc] SUBJECT.KEYID = 7
2,335,522 UART: [afmc] AUTHORITY.KEYID = 5
2,371,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,390 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,109 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,002 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,709 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,562 UART: [afmc] --
2,414,521 UART: [cold-reset] --
2,415,235 UART: [state] Locking Datavault
2,416,278 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,882 UART: [state] Locking ICCM
2,417,334 UART: [exit] Launching FMC @ 0x40000130
2,422,663 UART:
2,422,679 UART: Running Caliptra FMC ...
2,423,087 UART:
2,423,230 UART: [state] CFI Enabled
2,433,855 UART: [fht] FMC Alias Private Key: 7
2,542,156 UART: [art] Extend RT PCRs Done
2,542,584 UART: [art] Lock RT PCRs Done
2,543,950 UART: [art] Populate DV Done
2,552,174 UART: [fht] FMC Alias Private Key: 7
2,553,128 UART: [art] Derive CDI
2,553,408 UART: [art] Store in in slot 0x4
2,638,721 UART: [art] Derive Key Pair
2,639,081 UART: [art] Store priv key in slot 0x5
2,651,937 UART: [art] Derive Key Pair - Done
2,666,440 UART: [art] Signing Cert with AUTHO
2,666,920 UART: RITY.KEYID = 7
2,681,734 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,499 UART: [art] PUB.X = F75D33954F7BD50950CB30FCC7774A783E5000928B44A973645BD46F9020864EFEA80E1A297330F15F8AF3A03BA7A541
2,689,241 UART: [art] PUB.Y = 3928C95C05E2BAA4F5875516348EF1D5450919AD038F55DB12D9E317C4C839A8E81EF0542B8E89B72E8FDD0A1C93678C
2,696,183 UART: [art] SIG.R = D6572C0F647C2C323F05E68DE8DAD72223D20B5E159A4270AB0C2EA3425E4D0C86D13D8F7F7CDA27175FED3FFE1DC8EA
2,702,958 UART: [art] SIG.S = 39617D051249127D1C4B8208878F7F5846C4EA2037F347CC0906AD0E105928303270BEFDBE33C019F2449A0184087AE7
2,726,640 UART: mbox::rt_entry...
2,727,012 UART: ____ _ _ _ ____ _____
2,727,796 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,728,596 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,729,364 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,730,132 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,730,900 UART: |_|
2,731,212 UART:
2,837,688 UART: [rt] Runtime listening for mailbox commands...
2,838,450 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,838,565 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,838,659 UART:
2,838,675 UART: Running Caliptra ROM ...
2,839,083 UART:
2,839,225 UART: [state] CFI Enabled
2,842,072 UART: [state] LifecycleState = Production
2,842,680 UART: [state] DebugLocked = Yes
2,843,254 UART: [state] Starting the WD Timer 40000000 cycles
2,844,845 UART: [kat] SHA2-256
3,648,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,524 UART: [kat] ++
3,652,676 UART: [kat] sha1
3,656,938 UART: [kat] SHA2-256
3,658,878 UART: [kat] SHA2-384
3,661,645 UART: [kat] SHA2-512-ACC
3,663,546 UART: [kat] ECC-384
3,673,341 UART: [kat] HMAC-384Kdf
3,678,001 UART: [kat] LMS
3,926,313 UART: [kat] --
3,927,001 UART: [warm-reset] ++
3,927,664 UART: [warm-reset] --
3,928,511 UART: [state] Locking Datavault
3,929,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,929,829 UART: [state] Locking ICCM
3,930,491 UART: [exit] Launching FMC @ 0x40000130
3,935,820 UART:
3,935,836 UART: Running Caliptra FMC ...
3,936,244 UART:
3,936,387 UART: [state] CFI Enabled
3,937,796 UART: [aliasrt :skip pcr extension
3,938,269 UART: [art] Extend RT PCRs Done
3,938,697 UART: [art] Lock RT PCRs Done
3,940,044 UART: [art] Populate DV Done
3,948,336 UART: [fht] FMC Alias Private Key: 7
3,949,394 UART: [art] Derive CDI
3,949,674 UART: [art] Store in in slot 0x4
4,035,123 UART: [art] Derive Key Pair
4,035,483 UART: [art] Store priv key in slot 0x5
4,048,213 UART: [art] Derive Key Pair - Done
4,062,984 UART: [art] Signing Cert with AUTHO
4,063,464 UART: RITY.KEYID = 7
4,078,606 UART: [art] Erasing AUTHORITY.KEYID = 7
4,079,371 UART: [art] PUB.X = F75D33954F7BD50950CB30FCC7774A783E5000928B44A973645BD46F9020864EFEA80E1A297330F15F8AF3A03BA7A541
4,086,113 UART: [art] PUB.Y = 3928C95C05E2BAA4F5875516348EF1D5450919AD038F55DB12D9E317C4C839A8E81EF0542B8E89B72E8FDD0A1C93678C
4,093,055 UART: [art] SIG.R = D6572C0F647C2C323F05E68DE8DAD72223D20B5E159A4270AB0C2EA3425E4D0C86D13D8F7F7CDA27175FED3FFE1DC8EA
4,099,830 UART: [art] SIG.S = 39617D051249127D1C4B8208878F7F5846C4EA2037F347CC0906AD0E105928303270BEFDBE33C019F2449A0184087AE7
4,123,060 UART: mbox::rt_entry...
4,123,432 UART: ____ _ _ _ ____ _____
4,124,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,016 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,125,784 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,552 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,320 UART: |_|
4,127,632 UART:
4,406,182 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,837 UART: [state] LifecycleState = Production
85,445 UART: [state] DebugLocked = Yes
86,071 UART: [state] Starting the WD Timer 40000000 cycles
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,076 UART: [kat] SHA2-512-ACC
905,977 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,188 UART: [kat] LMS
1,168,500 UART: [kat] --
1,169,309 UART: [cold-reset] ++
1,169,676 UART: [fht] FHT @ 0x50003400
1,172,236 UART: [idev] ++
1,172,404 UART: [idev] CDI.KEYID = 6
1,172,765 UART: [idev] SUBJECT.KEYID = 7
1,173,190 UART: [idev] UDS.KEYID = 0
1,173,536 ready_for_fw is high
1,173,536 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,167 UART: [idev] Erasing UDS.KEYID = 0
1,197,574 UART: [idev] Sha1 KeyId Algorithm
1,206,399 UART: [idev] --
1,207,252 UART: [ldev] ++
1,207,420 UART: [ldev] CDI.KEYID = 6
1,207,784 UART: [ldev] SUBJECT.KEYID = 5
1,208,211 UART: [ldev] AUTHORITY.KEYID = 7
1,208,674 UART: [ldev] FE.KEYID = 1
1,213,824 UART: [ldev] Erasing FE.KEYID = 1
1,240,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,127 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,821 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,691 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,397 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,525 UART: [ldev] --
1,279,869 UART: [fwproc] Wait for Commands...
1,280,568 UART: [fwproc] Recv command 0x46574c44
1,281,301 UART: [fwproc] Recv'd Img size: 78532 bytes
2,193,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,220,016 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,325 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,331,488 >>> mbox cmd response: success
2,332,524 UART: [afmc] ++
2,332,692 UART: [afmc] CDI.KEYID = 6
2,333,055 UART: [afmc] SUBJECT.KEYID = 7
2,333,481 UART: [afmc] AUTHORITY.KEYID = 5
2,368,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,384,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,385,665 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,391,384 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,397,277 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,402,984 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,410,699 UART: [afmc] --
2,411,592 UART: [cold-reset] --
2,412,424 UART: [state] Locking Datavault
2,413,653 UART: [state] Locking PCR0, PCR1 and PCR31
2,414,257 UART: [state] Locking ICCM
2,414,851 UART: [exit] Launching FMC @ 0x40000130
2,420,180 UART:
2,420,196 UART: Running Caliptra FMC ...
2,420,604 UART:
2,420,658 UART: [state] CFI Enabled
2,431,359 UART: [fht] FMC Alias Private Key: 7
2,538,872 UART: [art] Extend RT PCRs Done
2,539,300 UART: [art] Lock RT PCRs Done
2,541,162 UART: [art] Populate DV Done
2,549,618 UART: [fht] FMC Alias Private Key: 7
2,550,560 UART: [art] Derive CDI
2,550,840 UART: [art] Store in in slot 0x4
2,636,355 UART: [art] Derive Key Pair
2,636,715 UART: [art] Store priv key in slot 0x5
2,649,473 UART: [art] Derive Key Pair - Done
2,664,469 UART: [art] Signing Cert with AUTHO
2,664,949 UART: RITY.KEYID = 7
2,680,173 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,938 UART: [art] PUB.X = 1F3C2781B0B54B5C8BB57DA55EC0161923BD5A3FAD51DC1929849713F72A7C7E7946C1E039C1E1265AB9BED1E7BED2FE
2,687,724 UART: [art] PUB.Y = 39446785CE36314D9EC16BBCAB3E4BEABD1C14C781257F98DB3C2A152DB198108A63C73D0272B92D677DFE896E7CE66C
2,694,683 UART: [art] SIG.R = 1E63F87FD34510EC5111395A02D21885B7A9F99DAC430B120E3032DE9D6E7F6378AB6F737C4C35F8306AF5A407634BD5
2,701,443 UART: [art] SIG.S = E9E5FF1723AD7B174FBBAC849823FFF30073F19F2F8CE64ECCED52A392A0655CB96C90DD53B711A6D2218CF2CF113CE5
2,725,298 UART: mbox::rt_entry...
2,725,670 UART: ____ _ _ _ ____ _____
2,726,454 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,727,254 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,728,022 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,728,790 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,729,558 UART: |_|
2,729,870 UART:
2,835,762 UART: [rt] Runtime listening for mailbox commands...
2,836,524 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,836,639 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,836,733 UART:
2,836,749 UART: Running Caliptra ROM ...
2,837,157 UART:
2,837,212 UART: [state] CFI Enabled
2,839,807 UART: [state] LifecycleState = Production
2,840,415 UART: [state] DebugLocked = Yes
2,841,177 UART: [state] Starting the WD Timer 40000000 cycles
2,842,714 UART: [kat] SHA2-256
3,646,264 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,650,393 UART: [kat] ++
3,650,545 UART: [kat] sha1
3,654,579 UART: [kat] SHA2-256
3,656,519 UART: [kat] SHA2-384
3,659,336 UART: [kat] SHA2-512-ACC
3,661,237 UART: [kat] ECC-384
3,670,786 UART: [kat] HMAC-384Kdf
3,675,392 UART: [kat] LMS
3,923,704 UART: [kat] --
3,924,602 UART: [warm-reset] ++
3,925,411 UART: [warm-reset] --
3,926,306 UART: [state] Locking Datavault
3,927,058 UART: [state] Locking PCR0, PCR1 and PCR31
3,927,662 UART: [state] Locking ICCM
3,928,238 UART: [exit] Launching FMC @ 0x40000130
3,933,567 UART:
3,933,583 UART: Running Caliptra FMC ...
3,933,991 UART:
3,934,045 UART: [state] CFI Enabled
3,935,408 UART: [aliasrt :skip pcr extension
3,935,881 UART: [art] Extend RT PCRs Done
3,936,309 UART: [art] Lock RT PCRs Done
3,937,586 UART: [art] Populate DV Done
3,945,720 UART: [fht] FMC Alias Private Key: 7
3,946,880 UART: [art] Derive CDI
3,947,160 UART: [art] Store in in slot 0x4
4,032,519 UART: [art] Derive Key Pair
4,032,879 UART: [art] Store priv key in slot 0x5
4,046,351 UART: [art] Derive Key Pair - Done
4,061,141 UART: [art] Signing Cert with AUTHO
4,061,621 UART: RITY.KEYID = 7
4,076,921 UART: [art] Erasing AUTHORITY.KEYID = 7
4,077,686 UART: [art] PUB.X = 1F3C2781B0B54B5C8BB57DA55EC0161923BD5A3FAD51DC1929849713F72A7C7E7946C1E039C1E1265AB9BED1E7BED2FE
4,084,472 UART: [art] PUB.Y = 39446785CE36314D9EC16BBCAB3E4BEABD1C14C781257F98DB3C2A152DB198108A63C73D0272B92D677DFE896E7CE66C
4,091,431 UART: [art] SIG.R = 1E63F87FD34510EC5111395A02D21885B7A9F99DAC430B120E3032DE9D6E7F6378AB6F737C4C35F8306AF5A407634BD5
4,098,191 UART: [art] SIG.S = E9E5FF1723AD7B174FBBAC849823FFF30073F19F2F8CE64ECCED52A392A0655CB96C90DD53B711A6D2218CF2CF113CE5
4,122,270 UART: mbox::rt_entry...
4,122,642 UART: ____ _ _ _ ____ _____
4,123,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,124,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,124,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,125,762 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,126,530 UART: |_|
4,126,842 UART:
4,410,258 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Production
85,713 UART: [state] DebugLocked = Yes
86,445 UART: [state] Starting the WD Timer 40000000 cycles
88,000 UART: [kat] SHA2-256
891,550 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,784 UART: [kat] SHA2-512-ACC
906,685 UART: [kat] ECC-384
916,422 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,215 UART: [cold-reset] ++
1,170,780 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 ready_for_fw is high
1,174,594 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,444 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,594 UART: [ldev] Erasing FE.KEYID = 1
1,242,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,859 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,553 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,423 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,129 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,347 UART: [ldev] --
1,281,805 UART: [fwproc] Wait for Commands...
1,282,542 UART: [fwproc] Recv command 0x46574c44
1,283,275 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,953 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,168 >>> mbox cmd response: success
2,335,278 UART: [afmc] ++
2,335,446 UART: [afmc] CDI.KEYID = 6
2,335,809 UART: [afmc] SUBJECT.KEYID = 7
2,336,235 UART: [afmc] AUTHORITY.KEYID = 5
2,371,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,345 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,064 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,957 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,664 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,415 UART: [afmc] --
2,414,362 UART: [cold-reset] --
2,415,374 UART: [state] Locking Datavault
2,416,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,163 UART: [state] Locking ICCM
2,417,643 UART: [exit] Launching FMC @ 0x40000130
2,422,972 UART:
2,422,988 UART: Running Caliptra FMC ...
2,423,396 UART:
2,423,450 UART: [state] CFI Enabled
2,433,795 UART: [fht] FMC Alias Private Key: 7
2,541,180 UART: [art] Extend RT PCRs Done
2,541,608 UART: [art] Lock RT PCRs Done
2,543,094 UART: [art] Populate DV Done
2,551,350 UART: [fht] FMC Alias Private Key: 7
2,552,308 UART: [art] Derive CDI
2,552,588 UART: [art] Store in in slot 0x4
2,638,429 UART: [art] Derive Key Pair
2,638,789 UART: [art] Store priv key in slot 0x5
2,651,993 UART: [art] Derive Key Pair - Done
2,666,655 UART: [art] Signing Cert with AUTHO
2,667,135 UART: RITY.KEYID = 7
2,682,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,048 UART: [art] PUB.X = 12A5A7113DC870D4B7BD2BB1DA9EF26227E8A1501452B5EBADD674D20DD15E9698FEF3F99F9E6C960EB4F027DE068488
2,689,823 UART: [art] PUB.Y = 304F049FC6D115B6270B02060932719456160904D25B8885B32A46E1D4F36E943489BA5A0695BB4B173FF7A239468FB3
2,696,737 UART: [art] SIG.R = 3BE3F0A26EBF3869306FD54D26B427B17E2522BE22831DAF9054AEBA4A13203A6F1927081796D86B5B74ED6FE1CA5BE4
2,703,514 UART: [art] SIG.S = 4214394FA20CF65FBA773F5B1D7C93DD72E68A4C1685CAEAF6475C87A77D2BC999FD2DD37483D9E0C9029D09BCF20DF8
2,726,813 UART: mbox::rt_entry...
2,727,185 UART: ____ _ _ _ ____ _____
2,727,969 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,728,769 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,729,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,730,305 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,073 UART: |_|
2,731,385 UART:
2,838,360 UART: [rt] Runtime listening for mailbox commands...
2,839,122 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,839,237 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,331 UART:
2,839,347 UART: Running Caliptra ROM ...
2,839,755 UART:
2,839,810 UART: [state] CFI Enabled
2,842,069 UART: [state] LifecycleState = Production
2,842,677 UART: [state] DebugLocked = Yes
2,843,395 UART: [state] Starting the WD Timer 40000000 cycles
2,844,864 UART: [kat] SHA2-256
3,648,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,543 UART: [kat] ++
3,652,695 UART: [kat] sha1
3,656,855 UART: [kat] SHA2-256
3,658,795 UART: [kat] SHA2-384
3,661,682 UART: [kat] SHA2-512-ACC
3,663,583 UART: [kat] ECC-384
3,673,334 UART: [kat] HMAC-384Kdf
3,677,922 UART: [kat] LMS
3,926,234 UART: [kat] --
3,927,394 UART: [warm-reset] ++
3,928,215 UART: [warm-reset] --
3,929,022 UART: [state] Locking Datavault
3,929,764 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,368 UART: [state] Locking ICCM
3,930,814 UART: [exit] Launching FMC @ 0x40000130
3,936,143 UART:
3,936,159 UART: Running Caliptra FMC ...
3,936,567 UART:
3,936,621 UART: [state] CFI Enabled
3,937,864 UART: [aliasrt :skip pcr extension
3,938,337 UART: [art] Extend RT PCRs Done
3,938,765 UART: [art] Lock RT PCRs Done
3,940,334 UART: [art] Populate DV Done
3,948,780 UART: [fht] FMC Alias Private Key: 7
3,949,922 UART: [art] Derive CDI
3,950,202 UART: [art] Store in in slot 0x4
4,035,967 UART: [art] Derive Key Pair
4,036,327 UART: [art] Store priv key in slot 0x5
4,049,449 UART: [art] Derive Key Pair - Done
4,064,183 UART: [art] Signing Cert with AUTHO
4,064,663 UART: RITY.KEYID = 7
4,079,971 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,736 UART: [art] PUB.X = 12A5A7113DC870D4B7BD2BB1DA9EF26227E8A1501452B5EBADD674D20DD15E9698FEF3F99F9E6C960EB4F027DE068488
4,087,511 UART: [art] PUB.Y = 304F049FC6D115B6270B02060932719456160904D25B8885B32A46E1D4F36E943489BA5A0695BB4B173FF7A239468FB3
4,094,425 UART: [art] SIG.R = 3BE3F0A26EBF3869306FD54D26B427B17E2522BE22831DAF9054AEBA4A13203A6F1927081796D86B5B74ED6FE1CA5BE4
4,101,202 UART: [art] SIG.S = 4214394FA20CF65FBA773F5B1D7C93DD72E68A4C1685CAEAF6475C87A77D2BC999FD2DD37483D9E0C9029D09BCF20DF8
4,124,345 UART: mbox::rt_entry...
4,124,717 UART: ____ _ _ _ ____ _____
4,125,501 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,301 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,069 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,127,837 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,605 UART: |_|
4,128,917 UART:
4,408,600 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Production
86,030 UART: [state] DebugLocked = Yes
86,780 UART: [state] Starting the WD Timer 40000000 cycles
88,317 UART: [kat] SHA2-256
891,867 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,996 UART: [kat] ++
896,148 UART: [kat] sha1
900,368 UART: [kat] SHA2-256
902,308 UART: [kat] SHA2-384
905,005 UART: [kat] SHA2-512-ACC
906,906 UART: [kat] ECC-384
916,781 UART: [kat] HMAC-384Kdf
921,389 UART: [kat] LMS
1,169,701 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,729 UART: [fht] FHT @ 0x50003400
1,173,499 UART: [idev] ++
1,173,667 UART: [idev] CDI.KEYID = 6
1,174,028 UART: [idev] SUBJECT.KEYID = 7
1,174,453 UART: [idev] UDS.KEYID = 0
1,174,799 ready_for_fw is high
1,174,799 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,660 UART: [idev] Erasing UDS.KEYID = 0
1,199,947 UART: [idev] Sha1 KeyId Algorithm
1,208,850 UART: [idev] --
1,210,015 UART: [ldev] ++
1,210,183 UART: [ldev] CDI.KEYID = 6
1,210,547 UART: [ldev] SUBJECT.KEYID = 5
1,210,974 UART: [ldev] AUTHORITY.KEYID = 7
1,211,437 UART: [ldev] FE.KEYID = 1
1,216,845 UART: [ldev] Erasing FE.KEYID = 1
1,243,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,176 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,870 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,740 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,446 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,326 UART: [ldev] --
1,282,742 UART: [fwproc] Wait for Commands...
1,283,317 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,859 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,168 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,333,313 >>> mbox cmd response: success
2,334,575 UART: [afmc] ++
2,334,743 UART: [afmc] CDI.KEYID = 6
2,335,106 UART: [afmc] SUBJECT.KEYID = 7
2,335,532 UART: [afmc] AUTHORITY.KEYID = 5
2,370,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,488 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,207 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,100 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,807 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,582 UART: [afmc] --
2,413,581 UART: [cold-reset] --
2,414,343 UART: [state] Locking Datavault
2,415,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,048 UART: [state] Locking ICCM
2,416,522 UART: [exit] Launching FMC @ 0x40000130
2,421,851 UART:
2,421,867 UART: Running Caliptra FMC ...
2,422,275 UART:
2,422,418 UART: [state] CFI Enabled
2,433,047 UART: [fht] FMC Alias Private Key: 7
2,540,522 UART: [art] Extend RT PCRs Done
2,540,950 UART: [art] Lock RT PCRs Done
2,542,338 UART: [art] Populate DV Done
2,550,716 UART: [fht] FMC Alias Private Key: 7
2,551,758 UART: [art] Derive CDI
2,552,038 UART: [art] Store in in slot 0x4
2,637,549 UART: [art] Derive Key Pair
2,637,909 UART: [art] Store priv key in slot 0x5
2,651,603 UART: [art] Derive Key Pair - Done
2,666,639 UART: [art] Signing Cert with AUTHO
2,667,119 UART: RITY.KEYID = 7
2,681,875 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,640 UART: [art] PUB.X = 7619EE8DE2D3C5719E4829078F5FF525633BBB5189682FF9B0E9EE8F2E4EC17BB43807B527D74B00BE9195335704A9D3
2,689,381 UART: [art] PUB.Y = 38849BCAB4C882133BDFA7DAD560828840A59AECE33B6BE208E7C7641A0FD15B2A4E4CF67FB55F8B92F0EB0A37626093
2,696,336 UART: [art] SIG.R = 77C7640514B30EE17A73CC15E3718B29E0CF1D4AE05BAE412E9AA645504BA94B7495A2DC2D91400FA35A0F43BF5705BF
2,703,101 UART: [art] SIG.S = 8A94243C42208B6EFFFF6786A377724613E51F6947597C12D43A2C445CE3BAB3E3CA0118E73D54E98C92378D07FD0F28
2,726,885 UART: mbox::rt_entry...
2,727,257 UART: ____ _ _ _ ____ _____
2,728,041 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,728,841 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,729,609 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,730,377 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,145 UART: |_|
2,731,457 UART:
2,837,527 UART: [rt] Runtime listening for mailbox commands...
2,838,289 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,838,404 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,838,498 UART:
2,838,514 UART: Running Caliptra ROM ...
2,838,922 UART:
2,839,064 UART: [state] CFI Enabled
2,841,465 UART: [state] LifecycleState = Production
2,842,073 UART: [state] DebugLocked = Yes
2,842,731 UART: [state] Starting the WD Timer 40000000 cycles
2,844,340 UART: [kat] SHA2-256
3,647,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,652,019 UART: [kat] ++
3,652,171 UART: [kat] sha1
3,656,305 UART: [kat] SHA2-256
3,658,245 UART: [kat] SHA2-384
3,661,028 UART: [kat] SHA2-512-ACC
3,662,929 UART: [kat] ECC-384
3,672,752 UART: [kat] HMAC-384Kdf
3,677,452 UART: [kat] LMS
3,925,764 UART: [kat] --
3,926,642 UART: [warm-reset] ++
3,927,797 UART: [warm-reset] --
3,928,770 UART: [state] Locking Datavault
3,929,392 UART: [state] Locking PCR0, PCR1 and PCR31
3,929,996 UART: [state] Locking ICCM
3,930,488 UART: [exit] Launching FMC @ 0x40000130
3,935,817 UART:
3,935,833 UART: Running Caliptra FMC ...
3,936,241 UART:
3,936,384 UART: [state] CFI Enabled
3,937,793 UART: [aliasrt :skip pcr extension
3,938,266 UART: [art] Extend RT PCRs Done
3,938,694 UART: [art] Lock RT PCRs Done
3,939,823 UART: [art] Populate DV Done
3,948,215 UART: [fht] FMC Alias Private Key: 7
3,949,351 UART: [art] Derive CDI
3,949,631 UART: [art] Store in in slot 0x4
4,035,548 UART: [art] Derive Key Pair
4,035,908 UART: [art] Store priv key in slot 0x5
4,049,440 UART: [art] Derive Key Pair - Done
4,064,386 UART: [art] Signing Cert with AUTHO
4,064,866 UART: RITY.KEYID = 7
4,079,714 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,479 UART: [art] PUB.X = 7619EE8DE2D3C5719E4829078F5FF525633BBB5189682FF9B0E9EE8F2E4EC17BB43807B527D74B00BE9195335704A9D3
4,087,220 UART: [art] PUB.Y = 38849BCAB4C882133BDFA7DAD560828840A59AECE33B6BE208E7C7641A0FD15B2A4E4CF67FB55F8B92F0EB0A37626093
4,094,175 UART: [art] SIG.R = 77C7640514B30EE17A73CC15E3718B29E0CF1D4AE05BAE412E9AA645504BA94B7495A2DC2D91400FA35A0F43BF5705BF
4,100,940 UART: [art] SIG.S = 8A94243C42208B6EFFFF6786A377724613E51F6947597C12D43A2C445CE3BAB3E3CA0118E73D54E98C92378D07FD0F28
4,125,270 UART: mbox::rt_entry...
4,125,642 UART: ____ _ _ _ ____ _____
4,126,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,762 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,530 UART: |_|
4,129,842 UART:
4,413,958 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Production
85,852 UART: [state] DebugLocked = Yes
86,382 UART: [state] Starting the WD Timer 40000000 cycles
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,169 UART: [idev] ++
1,173,337 UART: [idev] CDI.KEYID = 6
1,173,698 UART: [idev] SUBJECT.KEYID = 7
1,174,123 UART: [idev] UDS.KEYID = 0
1,174,469 ready_for_fw is high
1,174,469 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,038 UART: [idev] Erasing UDS.KEYID = 0
1,199,507 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,366 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,236 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,942 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,918 UART: [ldev] --
1,281,288 UART: [fwproc] Wait for Commands...
1,282,019 UART: [fwproc] Recv command 0x46574c44
1,282,752 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,681 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,332,928 >>> mbox cmd response: success
2,334,024 UART: [afmc] ++
2,334,192 UART: [afmc] CDI.KEYID = 6
2,334,555 UART: [afmc] SUBJECT.KEYID = 7
2,334,981 UART: [afmc] AUTHORITY.KEYID = 5
2,370,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,412 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,163 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,882 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,775 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,482 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,499 UART: [afmc] --
2,414,514 UART: [cold-reset] --
2,415,420 UART: [state] Locking Datavault
2,416,543 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,147 UART: [state] Locking ICCM
2,417,679 UART: [exit] Launching FMC @ 0x40000130
2,423,008 UART:
2,423,024 UART: Running Caliptra FMC ...
2,423,432 UART:
2,423,575 UART: [state] CFI Enabled
2,434,376 UART: [fht] FMC Alias Private Key: 7
2,541,965 UART: [art] Extend RT PCRs Done
2,542,393 UART: [art] Lock RT PCRs Done
2,544,087 UART: [art] Populate DV Done
2,552,119 UART: [fht] FMC Alias Private Key: 7
2,553,275 UART: [art] Derive CDI
2,553,555 UART: [art] Store in in slot 0x4
2,639,394 UART: [art] Derive Key Pair
2,639,754 UART: [art] Store priv key in slot 0x5
2,652,842 UART: [art] Derive Key Pair - Done
2,667,573 UART: [art] Signing Cert with AUTHO
2,668,053 UART: RITY.KEYID = 7
2,683,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,214 UART: [art] PUB.X = 2A3449C443125CB4868B1A835BFD4A28DC8F6DC62BF0D25F4F39D426C545EBBAD854280C42BC80AA0EE3A35BD2706736
2,690,990 UART: [art] PUB.Y = 9F208061AE9814D3210A63A4BF96FF3763E072E5410CAAD7BBDE0C2A4D5D09212BD85576238FEC4781D0F6EDE5048AFB
2,697,937 UART: [art] SIG.R = B99D0658E2F45E8A552E409462B7BD29B0B3582D86007CC1B53CE95398C4609EEF9DD66682D3A8F6B2995B930DC5DCCC
2,704,687 UART: [art] SIG.S = 2075ACFABCBC740D59D2FA8D3C40986F2B38CA8DA4B17943B02DF2F27BFAE956EAA43209F0D3F7B35F363A5252C74565
2,728,686 UART: mbox::rt_entry...
2,729,058 UART: ____ _ _ _ ____ _____
2,729,842 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,642 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,410 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,178 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,946 UART: |_|
2,733,258 UART:
2,838,916 UART: [rt] Runtime listening for mailbox commands...
2,839,678 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,839,793 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,887 UART:
2,839,903 UART: Running Caliptra ROM ...
2,840,311 UART:
2,840,453 UART: [state] CFI Enabled
2,843,356 UART: [state] LifecycleState = Production
2,843,964 UART: [state] DebugLocked = Yes
2,844,602 UART: [state] Starting the WD Timer 40000000 cycles
2,846,107 UART: [kat] SHA2-256
3,649,657 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,786 UART: [kat] ++
3,653,938 UART: [kat] sha1
3,658,284 UART: [kat] SHA2-256
3,660,224 UART: [kat] SHA2-384
3,662,965 UART: [kat] SHA2-512-ACC
3,664,866 UART: [kat] ECC-384
3,674,421 UART: [kat] HMAC-384Kdf
3,678,911 UART: [kat] LMS
3,927,223 UART: [kat] --
3,928,019 UART: [warm-reset] ++
3,928,804 UART: [warm-reset] --
3,929,615 UART: [state] Locking Datavault
3,930,191 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,795 UART: [state] Locking ICCM
3,931,263 UART: [exit] Launching FMC @ 0x40000130
3,936,592 UART:
3,936,608 UART: Running Caliptra FMC ...
3,937,016 UART:
3,937,159 UART: [state] CFI Enabled
3,938,734 UART: [aliasrt :skip pcr extension
3,939,207 UART: [art] Extend RT PCRs Done
3,939,635 UART: [art] Lock RT PCRs Done
3,940,908 UART: [art] Populate DV Done
3,949,082 UART: [fht] FMC Alias Private Key: 7
3,950,026 UART: [art] Derive CDI
3,950,306 UART: [art] Store in in slot 0x4
4,036,427 UART: [art] Derive Key Pair
4,036,787 UART: [art] Store priv key in slot 0x5
4,050,919 UART: [art] Derive Key Pair - Done
4,065,906 UART: [art] Signing Cert with AUTHO
4,066,386 UART: RITY.KEYID = 7
4,081,516 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,281 UART: [art] PUB.X = 2A3449C443125CB4868B1A835BFD4A28DC8F6DC62BF0D25F4F39D426C545EBBAD854280C42BC80AA0EE3A35BD2706736
4,089,057 UART: [art] PUB.Y = 9F208061AE9814D3210A63A4BF96FF3763E072E5410CAAD7BBDE0C2A4D5D09212BD85576238FEC4781D0F6EDE5048AFB
4,096,004 UART: [art] SIG.R = B99D0658E2F45E8A552E409462B7BD29B0B3582D86007CC1B53CE95398C4609EEF9DD66682D3A8F6B2995B930DC5DCCC
4,102,754 UART: [art] SIG.S = 2075ACFABCBC740D59D2FA8D3C40986F2B38CA8DA4B17943B02DF2F27BFAE956EAA43209F0D3F7B35F363A5252C74565
4,126,223 UART: mbox::rt_entry...
4,126,595 UART: ____ _ _ _ ____ _____
4,127,379 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,179 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,947 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,715 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,483 UART: |_|
4,130,795 UART:
4,411,773 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,533 UART:
191,907 UART: Running Caliptra ROM ...
192,989 UART:
193,126 UART: [state] CFI Enabled
268,301 UART: [state] LifecycleState = Production
270,522 UART: [state] DebugLocked = Yes
273,141 UART: [state] Starting the WD Timer 40000000 cycles
277,876 UART: [kat] SHA2-256
459,819 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
471,359 UART: [kat] ++
471,893 UART: [kat] sha1
481,011 UART: [kat] SHA2-256
484,016 UART: [kat] SHA2-384
488,942 UART: [kat] SHA2-512-ACC
491,517 UART: [kat] ECC-384
3,778,561 UART: [kat] HMAC-384Kdf
3,803,307 UART: [kat] LMS
4,876,452 UART: [kat] --
4,880,820 UART: [cold-reset] ++
4,882,894 UART: [fht] FHT @ 0x50003400
4,894,433 UART: [idev] ++
4,895,067 UART: [idev] CDI.KEYID = 6
4,896,313 UART: [idev] SUBJECT.KEYID = 7
4,897,334 UART: [idev] UDS.KEYID = 0
4,898,388 ready_for_fw is high
4,898,564 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,041,771 UART: [idev] Erasing UDS.KEYID = 0
8,243,572 UART: [idev] Sha1 KeyId Algorithm
8,266,589 UART: [idev] --
8,270,400 UART: [ldev] ++
8,270,975 UART: [ldev] CDI.KEYID = 6
8,272,199 UART: [ldev] SUBJECT.KEYID = 5
8,273,346 UART: [ldev] AUTHORITY.KEYID = 7
8,274,566 UART: [ldev] FE.KEYID = 1
8,320,477 UART: [ldev] Erasing FE.KEYID = 1
11,655,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,688 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,982,990 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,999,013 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,015,109 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,036,506 UART: [ldev] --
14,041,715 UART: [fwproc] Wait for Commands...
14,044,417 UART: [fwproc] Recv command 0x46574c44
14,046,723 UART: [fwproc] Recv'd Img size: 113844 bytes
18,150,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,227,061 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,295,806 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,611,533 >>> mbox cmd response: success
18,616,248 UART: [afmc] ++
18,616,855 UART: [afmc] CDI.KEYID = 6
18,618,044 UART: [afmc] SUBJECT.KEYID = 7
18,619,127 UART: [afmc] AUTHORITY.KEYID = 5
21,993,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,310,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,313,005 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,328,970 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,345,112 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,361,198 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,383,484 UART: [afmc] --
24,387,386 UART: [cold-reset] --
24,392,054 UART: [state] Locking Datavault
24,397,572 UART: [state] Locking PCR0, PCR1 and PCR31
24,399,209 UART: [state] Locking ICCM
24,400,541 UART: [exit] Launching FMC @ 0x40000130
24,409,199 UART:
24,409,431 UART: Running Caliptra FMC ...
24,410,473 UART:
24,410,621 UART: [state] CFI Enabled
24,471,785 UART: [fht] FMC Alias Private Key: 7
26,809,452 UART: [art] Extend RT PCRs Done
26,810,691 UART: [art] Lock RT PCRs Done
26,812,449 UART: [art] Populate DV Done
26,817,852 UART: [fht] FMC Alias Private Key: 7
26,819,380 UART: [art] Derive CDI
26,820,128 UART: [art] Store in in slot 0x4
26,879,985 UART: [art] Derive Key Pair
26,881,048 UART: [art] Store priv key in slot 0x5
30,173,502 UART: [art] Derive Key Pair - Done
30,186,591 UART: [art] Signing Cert with AUTHO
30,187,923 UART: RITY.KEYID = 7
32,475,783 UART: [art] Erasing AUTHORITY.KEYID = 7
32,477,285 UART: [art] PUB.X = E13A024123BAA5F6C622A4183087737C99523E1F5AC6CC430B025776D7D923240769F2D366EC166DDB21B4BC80BF3B5B
32,484,496 UART: [art] PUB.Y = DD78F01B1AE414F7B0D6AEDC2E401EC0DD309F8745D4396923141D34D7DE479F523689EF05A9CC86D08DB7589FAB7DCC
32,491,810 UART: [art] SIG.R = FA4241900B4EE652905BC5C323AC11D3B5DE7309F06CD45DEADA287C65ADA1BA4E25F6B85DE64B21B8F87A45339329E5
32,499,199 UART: [art] SIG.S = D04C3226BA50443FE594D06DD04CA6FAC5148CCDD0E3CE399288F60C4078F03F4F20C8A63D859B50A352100FDF8167EC
33,805,017 UART: Caliptra RT
33,805,725 UART: [state] CFI Enabled
33,966,941 UART: [rt] RT listening for mailbox commands...
Initializing fuses
994 UART:
1,263 UART: Running Caliptra ROM ...
2,367 UART:
2,520 UART: [state] CFI Enabled
63,603 UART: [state] LifecycleState = Production
65,405 UART: [state] DebugLocked = Yes
67,729 UART: [state] Starting the WD Timer 40000000 cycles
72,827 UART: [kat] SHA2-256
254,816 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
266,297 UART: [kat] ++
266,871 UART: [kat] sha1
277,643 UART: [kat] SHA2-256
280,634 UART: [kat] SHA2-384
287,084 UART: [kat] SHA2-512-ACC
289,736 UART: [kat] ECC-384
3,567,708 UART: [kat] HMAC-384Kdf
3,593,441 UART: [kat] LMS
4,666,600 UART: [kat] --
4,671,618 UART: [warm-reset] ++
4,677,487 UART: [warm-reset] --
4,682,101 UART: [state] Locking Datavault
4,684,862 UART: [state] Locking PCR0, PCR1 and PCR31
4,686,987 UART: [state] Locking ICCM
4,688,480 UART: [exit] Launching FMC @ 0x40000130
4,697,250 UART:
4,697,582 UART: Running Caliptra FMC ...
4,698,642 UART:
4,698,791 UART: [state] CFI Enabled
4,758,394 UART: [aliasrt :skip pcr extension
4,759,646 UART: [art] Extend RT PCRs Done
4,760,800 UART: [art] Lock RT PCRs Done
4,762,096 UART: [art] Populate DV Done
4,767,659 UART: [fht] FMC Alias Private Key: 7
4,769,321 UART: [art] Derive CDI
4,770,131 UART: [art] Store in in slot 0x4
4,826,783 UART: [art] Derive Key Pair
4,827,817 UART: [art] Store priv key in slot 0x5
8,120,651 UART: [art] Derive Key Pair - Done
8,133,757 UART: [art] Signing Cert with AUTHO
8,135,056 UART: RITY.KEYID = 7
10,422,104 UART: [art] Erasing AUTHORITY.KEYID = 7
10,423,599 UART: [art] PUB.X = E13A024123BAA5F6C622A4183087737C99523E1F5AC6CC430B025776D7D923240769F2D366EC166DDB21B4BC80BF3B5B
10,430,851 UART: [art] PUB.Y = DD78F01B1AE414F7B0D6AEDC2E401EC0DD309F8745D4396923141D34D7DE479F523689EF05A9CC86D08DB7589FAB7DCC
10,438,098 UART: [art] SIG.R = FA4241900B4EE652905BC5C323AC11D3B5DE7309F06CD45DEADA287C65ADA1BA4E25F6B85DE64B21B8F87A45339329E5
10,445,466 UART: [art] SIG.S = D04C3226BA50443FE594D06DD04CA6FAC5148CCDD0E3CE399288F60C4078F03F4F20C8A63D859B50A352100FDF8167EC
11,750,052 UART: Caliptra RT
11,750,774 UART: [state] CFI Enabled
12,083,269 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
191,503 UART:
191,855 UART: Running Caliptra ROM ...
192,924 UART:
193,059 UART: [state] CFI Enabled
262,645 UART: [state] LifecycleState = Production
264,930 UART: [state] DebugLocked = Yes
266,433 UART: [state] Starting the WD Timer 40000000 cycles
271,802 UART: [kat] SHA2-256
453,757 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
465,304 UART: [kat] ++
465,819 UART: [kat] sha1
476,499 UART: [kat] SHA2-256
479,510 UART: [kat] SHA2-384
485,919 UART: [kat] SHA2-512-ACC
488,490 UART: [kat] ECC-384
3,775,853 UART: [kat] HMAC-384Kdf
3,804,439 UART: [kat] LMS
4,877,614 UART: [kat] --
4,882,599 UART: [cold-reset] ++
4,883,954 UART: [fht] FHT @ 0x50003400
4,894,928 UART: [idev] ++
4,895,557 UART: [idev] CDI.KEYID = 6
4,896,815 UART: [idev] SUBJECT.KEYID = 7
4,897,914 UART: [idev] UDS.KEYID = 0
4,898,881 ready_for_fw is high
4,899,070 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,042,435 UART: [idev] Erasing UDS.KEYID = 0
8,245,052 UART: [idev] Sha1 KeyId Algorithm
8,267,385 UART: [idev] --
8,272,512 UART: [ldev] ++
8,273,079 UART: [ldev] CDI.KEYID = 6
8,274,303 UART: [ldev] SUBJECT.KEYID = 5
8,275,452 UART: [ldev] AUTHORITY.KEYID = 7
8,276,674 UART: [ldev] FE.KEYID = 1
8,320,581 UART: [ldev] Erasing FE.KEYID = 1
11,656,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,966,069 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,982,346 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,998,394 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,014,499 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,036,131 UART: [ldev] --
14,041,170 UART: [fwproc] Wait for Commands...
14,043,857 UART: [fwproc] Recv command 0x46574c44
14,046,159 UART: [fwproc] Recv'd Img size: 113844 bytes
18,143,243 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,222,852 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,291,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,607,146 >>> mbox cmd response: success
18,610,999 UART: [afmc] ++
18,611,682 UART: [afmc] CDI.KEYID = 6
18,612,817 UART: [afmc] SUBJECT.KEYID = 7
18,613,914 UART: [afmc] AUTHORITY.KEYID = 5
21,972,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,271,001 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,273,316 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,289,267 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,305,393 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,321,438 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,344,172 UART: [afmc] --
24,347,422 UART: [cold-reset] --
24,352,948 UART: [state] Locking Datavault
24,357,265 UART: [state] Locking PCR0, PCR1 and PCR31
24,358,951 UART: [state] Locking ICCM
24,361,477 UART: [exit] Launching FMC @ 0x40000130
24,370,292 UART:
24,370,557 UART: Running Caliptra FMC ...
24,371,591 UART:
24,371,733 UART: [state] CFI Enabled
24,431,349 UART: [fht] FMC Alias Private Key: 7
26,768,950 UART: [art] Extend RT PCRs Done
26,770,314 UART: [art] Lock RT PCRs Done
26,772,109 UART: [art] Populate DV Done
26,777,409 UART: [fht] FMC Alias Private Key: 7
26,778,940 UART: [art] Derive CDI
26,779,742 UART: [art] Store in in slot 0x4
26,831,681 UART: [art] Derive Key Pair
26,832,668 UART: [art] Store priv key in slot 0x5
30,105,542 UART: [art] Derive Key Pair - Done
30,118,636 UART: [art] Signing Cert with AUTHO
30,119,928 UART: RITY.KEYID = 7
32,407,162 UART: [art] Erasing AUTHORITY.KEYID = 7
32,408,667 UART: [art] PUB.X = BA9A306E770877084E155FF576803F329F8443AD43CB06920B603AD5049EBAA6033EF3AE9E3BF328A823FF4077F909C5
32,415,922 UART: [art] PUB.Y = E590B83BAB02F88EAD964016FDE97CCEC86D098A411D39922F8C2B41005EBEBD418E5C8D9D479EF086EF73B97EF1C2DA
32,423,200 UART: [art] SIG.R = 6D07981549B45F476E0FAF37293C8C0BE336D18EC2D89CA1CF36A219F7CEF1FFDEE315691698D88DDA06C586D6862763
32,430,531 UART: [art] SIG.S = CF76EC38ABBBA436012BFD0A46154DCA616CC603AF330A6B1EAD5BA0FDF7BF54A67847D91914F728B3FEA49578E027E2
33,735,283 UART: Caliptra RT
33,735,995 UART: [state] CFI Enabled
33,897,135 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,000 UART:
1,268 UART: Running Caliptra ROM ...
2,378 UART:
2,523 UART: [state] CFI Enabled
65,188 UART: [state] LifecycleState = Production
66,893 UART: [state] DebugLocked = Yes
68,595 UART: [state] Starting the WD Timer 40000000 cycles
74,590 UART: [kat] SHA2-256
256,575 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
268,086 UART: [kat] ++
268,585 UART: [kat] sha1
278,107 UART: [kat] SHA2-256
281,161 UART: [kat] SHA2-384
286,771 UART: [kat] SHA2-512-ACC
289,371 UART: [kat] ECC-384
3,574,615 UART: [kat] HMAC-384Kdf
3,602,227 UART: [kat] LMS
4,675,370 UART: [kat] --
4,679,649 UART: [warm-reset] ++
4,684,280 UART: [warm-reset] --
4,688,247 UART: [state] Locking Datavault
4,692,893 UART: [state] Locking PCR0, PCR1 and PCR31
4,695,071 UART: [state] Locking ICCM
4,697,808 UART: [exit] Launching FMC @ 0x40000130
4,706,471 UART:
4,706,700 UART: Running Caliptra FMC ...
4,707,724 UART:
4,707,864 UART: [state] CFI Enabled
4,766,230 UART: [aliasrt :skip pcr extension
4,767,541 UART: [art] Extend RT PCRs Done
4,768,681 UART: [art] Lock RT PCRs Done
4,769,852 UART: [art] Populate DV Done
4,775,417 UART: [fht] FMC Alias Private Key: 7
4,776,938 UART: [art] Derive CDI
4,777,668 UART: [art] Store in in slot 0x4
4,834,533 UART: [art] Derive Key Pair
4,835,566 UART: [art] Store priv key in slot 0x5
8,128,603 UART: [art] Derive Key Pair - Done
8,141,338 UART: [art] Signing Cert with AUTHO
8,142,646 UART: RITY.KEYID = 7
10,430,128 UART: [art] Erasing AUTHORITY.KEYID = 7
10,431,632 UART: [art] PUB.X = BA9A306E770877084E155FF576803F329F8443AD43CB06920B603AD5049EBAA6033EF3AE9E3BF328A823FF4077F909C5
10,438,890 UART: [art] PUB.Y = E590B83BAB02F88EAD964016FDE97CCEC86D098A411D39922F8C2B41005EBEBD418E5C8D9D479EF086EF73B97EF1C2DA
10,446,123 UART: [art] SIG.R = 6D07981549B45F476E0FAF37293C8C0BE336D18EC2D89CA1CF36A219F7CEF1FFDEE315691698D88DDA06C586D6862763
10,453,509 UART: [art] SIG.S = CF76EC38ABBBA436012BFD0A46154DCA616CC603AF330A6B1EAD5BA0FDF7BF54A67847D91914F728B3FEA49578E027E2
11,758,815 UART: Caliptra RT
11,759,526 UART: [state] CFI Enabled
12,091,715 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
191,821 UART:
192,214 UART: Running Caliptra ROM ...
193,392 UART:
603,123 UART: [state] CFI Enabled
616,146 UART: [state] LifecycleState = Production
618,365 UART: [state] DebugLocked = Yes
621,285 UART: [state] Starting the WD Timer 40000000 cycles
627,167 UART: [kat] SHA2-256
809,187 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
820,730 UART: [kat] ++
821,262 UART: [kat] sha1
833,023 UART: [kat] SHA2-256
836,044 UART: [kat] SHA2-384
842,033 UART: [kat] SHA2-512-ACC
844,697 UART: [kat] ECC-384
4,098,621 UART: [kat] HMAC-384Kdf
4,111,486 UART: [kat] LMS
5,184,636 UART: [kat] --
5,189,069 UART: [cold-reset] ++
5,190,165 UART: [fht] FHT @ 0x50003400
5,202,494 UART: [idev] ++
5,203,136 UART: [idev] CDI.KEYID = 6
5,204,308 UART: [idev] SUBJECT.KEYID = 7
5,205,844 UART: [idev] UDS.KEYID = 0
5,206,957 ready_for_fw is high
5,207,163 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,350,229 UART: [idev] Erasing UDS.KEYID = 0
8,496,375 UART: [idev] Sha1 KeyId Algorithm
8,519,758 UART: [idev] --
8,522,596 UART: [ldev] ++
8,523,183 UART: [ldev] CDI.KEYID = 6
8,524,364 UART: [ldev] SUBJECT.KEYID = 5
8,525,526 UART: [ldev] AUTHORITY.KEYID = 7
8,526,772 UART: [ldev] FE.KEYID = 1
8,537,830 UART: [ldev] Erasing FE.KEYID = 1
11,829,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,123,937 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,140,245 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,156,278 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,172,340 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,193,754 UART: [ldev] --
14,198,275 UART: [fwproc] Wait for Commands...
14,201,126 UART: [fwproc] Recv command 0x46574c44
14,203,379 UART: [fwproc] Recv'd Img size: 113844 bytes
18,303,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,379,447 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,448,191 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,764,185 >>> mbox cmd response: success
18,768,757 UART: [afmc] ++
18,769,396 UART: [afmc] CDI.KEYID = 6
18,770,536 UART: [afmc] SUBJECT.KEYID = 7
18,771,700 UART: [afmc] AUTHORITY.KEYID = 5
22,090,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,381,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,383,778 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,399,776 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,415,869 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,431,993 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,455,701 UART: [afmc] --
24,458,901 UART: [cold-reset] --
24,462,225 UART: [state] Locking Datavault
24,468,495 UART: [state] Locking PCR0, PCR1 and PCR31
24,470,137 UART: [state] Locking ICCM
24,471,742 UART: [exit] Launching FMC @ 0x40000130
24,480,408 UART:
24,480,662 UART: Running Caliptra FMC ...
24,481,778 UART:
24,481,943 UART: [state] CFI Enabled
24,489,893 UART: [fht] FMC Alias Private Key: 7
26,820,223 UART: [art] Extend RT PCRs Done
26,821,445 UART: [art] Lock RT PCRs Done
26,823,209 UART: [art] Populate DV Done
26,828,887 UART: [fht] FMC Alias Private Key: 7
26,830,344 UART: [art] Derive CDI
26,831,276 UART: [art] Store in in slot 0x4
26,874,033 UART: [art] Derive Key Pair
26,875,039 UART: [art] Store priv key in slot 0x5
30,117,740 UART: [art] Derive Key Pair - Done
30,130,813 UART: [art] Signing Cert with AUTHO
30,132,120 UART: RITY.KEYID = 7
32,411,600 UART: [art] Erasing AUTHORITY.KEYID = 7
32,413,123 UART: [art] PUB.X = 28DFDFC4869E3695086DC9DF528FA3549BAB4B0056F3165A88C091BDC44B28EE38A33EC1D3FD1E11DEF6F781030B2F8D
32,420,347 UART: [art] PUB.Y = A230184AE4F613D40D116E84BEC075EA243F7BFB75E8575743C596AA89540D563C21A95A337921B785EBC21F8786CE49
32,427,588 UART: [art] SIG.R = 4499E2F827D3DD55D03ABAAF227348936AA8FF001A87A044729123F06FE5CBA81DB9C03DE203CD43868239045F85D6E1
32,434,939 UART: [art] SIG.S = 003E53428B5C4D64BA5F4A013EBFBF182A45E9691B18100477D8A0C301AECA1C3788EBCC8FB55FD01A5E8935CAAE9781
33,740,514 UART: Caliptra RT
33,741,225 UART: [state] CFI Enabled
33,857,042 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,185 UART:
1,416 UART: Running Caliptra ROM ...
2,466 UART:
6,667,825 UART: [state] CFI Enabled
6,685,257 UART: [state] LifecycleState = Production
6,687,014 UART: [state] DebugLocked = Yes
6,690,117 UART: [state] Starting the WD Timer 40000000 cycles
6,695,553 UART: [kat] SHA2-256
6,877,592 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,889,095 UART: [kat] ++
6,889,693 UART: [kat] sha1
6,899,613 UART: [kat] SHA2-256
6,902,636 UART: [kat] SHA2-384
6,909,216 UART: [kat] SHA2-512-ACC
6,911,834 UART: [kat] ECC-384
10,168,988 UART: [kat] HMAC-384Kdf
10,181,940 UART: [kat] LMS
11,255,084 UART: [kat] --
11,258,454 UART: [warm-reset] ++
11,263,316 UART: [warm-reset] --
11,267,566 UART: [state] Locking Datavault
11,272,331 UART: [state] Locking PCR0, PCR1 and PCR31
11,274,460 UART: [state] Locking ICCM
11,277,427 UART: [exit] Launching FMC @ 0x40000130
11,286,074 UART:
11,286,353 UART: Running Caliptra FMC ...
11,287,386 UART:
11,287,535 UART: [state] CFI Enabled
11,289,375 UART: [aliasrt :skip pcr extension
11,290,619 UART: [art] Extend RT PCRs Done
11,291,682 UART: [art] Lock RT PCRs Done
11,292,855 UART: [art] Populate DV Done
11,298,369 UART: [fht] FMC Alias Private Key: 7
11,299,956 UART: [art] Derive CDI
11,300,766 UART: [art] Store in in slot 0x4
11,343,464 UART: [art] Derive Key Pair
11,344,465 UART: [art] Store priv key in slot 0x5
14,586,622 UART: [art] Derive Key Pair - Done
14,599,295 UART: [art] Signing Cert with AUTHO
14,600,599 UART: RITY.KEYID = 7
16,879,718 UART: [art] Erasing AUTHORITY.KEYID = 7
16,881,360 UART: [art] PUB.X = 28DFDFC4869E3695086DC9DF528FA3549BAB4B0056F3165A88C091BDC44B28EE38A33EC1D3FD1E11DEF6F781030B2F8D
16,888,460 UART: [art] PUB.Y = A230184AE4F613D40D116E84BEC075EA243F7BFB75E8575743C596AA89540D563C21A95A337921B785EBC21F8786CE49
16,895,705 UART: [art] SIG.R = 4499E2F827D3DD55D03ABAAF227348936AA8FF001A87A044729123F06FE5CBA81DB9C03DE203CD43868239045F85D6E1
16,903,068 UART: [art] SIG.S = 003E53428B5C4D64BA5F4A013EBFBF182A45E9691B18100477D8A0C301AECA1C3788EBCC8FB55FD01A5E8935CAAE9781
18,208,761 UART: Caliptra RT
18,209,473 UART: [state] CFI Enabled
18,497,304 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
191,846 UART:
192,220 UART: Running Caliptra ROM ...
193,403 UART:
603,195 UART: [state] CFI Enabled
618,977 UART: [state] LifecycleState = Production
621,143 UART: [state] DebugLocked = Yes
623,127 UART: [state] Starting the WD Timer 40000000 cycles
628,790 UART: [kat] SHA2-256
810,785 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
822,319 UART: [kat] ++
822,798 UART: [kat] sha1
832,348 UART: [kat] SHA2-256
835,425 UART: [kat] SHA2-384
841,379 UART: [kat] SHA2-512-ACC
844,035 UART: [kat] ECC-384
4,099,748 UART: [kat] HMAC-384Kdf
4,111,047 UART: [kat] LMS
5,184,224 UART: [kat] --
5,187,523 UART: [cold-reset] ++
5,188,962 UART: [fht] FHT @ 0x50003400
5,200,573 UART: [idev] ++
5,201,291 UART: [idev] CDI.KEYID = 6
5,202,473 UART: [idev] SUBJECT.KEYID = 7
5,203,937 UART: [idev] UDS.KEYID = 0
5,205,051 ready_for_fw is high
5,205,247 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
5,348,228 UART: [idev] Erasing UDS.KEYID = 0
8,496,573 UART: [idev] Sha1 KeyId Algorithm
8,518,982 UART: [idev] --
8,522,966 UART: [ldev] ++
8,523,546 UART: [ldev] CDI.KEYID = 6
8,524,786 UART: [ldev] SUBJECT.KEYID = 5
8,525,944 UART: [ldev] AUTHORITY.KEYID = 7
8,527,167 UART: [ldev] FE.KEYID = 1
8,539,811 UART: [ldev] Erasing FE.KEYID = 1
11,835,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,126,531 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,142,841 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,158,872 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,174,955 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,194,726 UART: [ldev] --
14,200,058 UART: [fwproc] Wait for Commands...
14,202,100 UART: [fwproc] Recv command 0x46574c44
14,204,404 UART: [fwproc] Recv'd Img size: 113844 bytes
18,303,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
18,382,281 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,451,022 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
18,768,042 >>> mbox cmd response: success
18,772,707 UART: [afmc] ++
18,773,323 UART: [afmc] CDI.KEYID = 6
18,774,462 UART: [afmc] SUBJECT.KEYID = 7
18,775,623 UART: [afmc] AUTHORITY.KEYID = 5
22,092,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
24,387,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
24,389,829 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
24,405,827 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
24,421,915 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
24,437,969 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
24,460,446 UART: [afmc] --
24,464,240 UART: [cold-reset] --
24,467,131 UART: [state] Locking Datavault
24,471,693 UART: [state] Locking PCR0, PCR1 and PCR31
24,473,402 UART: [state] Locking ICCM
24,475,657 UART: [exit] Launching FMC @ 0x40000130
24,484,325 UART:
24,484,558 UART: Running Caliptra FMC ...
24,485,659 UART:
24,485,825 UART: [state] CFI Enabled
24,494,195 UART: [fht] FMC Alias Private Key: 7
26,825,268 UART: [art] Extend RT PCRs Done
26,826,480 UART: [art] Lock RT PCRs Done
26,828,105 UART: [art] Populate DV Done
26,833,349 UART: [fht] FMC Alias Private Key: 7
26,834,938 UART: [art] Derive CDI
26,835,753 UART: [art] Store in in slot 0x4
26,877,969 UART: [art] Derive Key Pair
26,878,974 UART: [art] Store priv key in slot 0x5
30,121,057 UART: [art] Derive Key Pair - Done
30,134,063 UART: [art] Signing Cert with AUTHO
30,135,375 UART: RITY.KEYID = 7
32,414,783 UART: [art] Erasing AUTHORITY.KEYID = 7
32,416,283 UART: [art] PUB.X = AE91AE8B9C7B9B29BE5A4E8268007E2297D812E793154F2A05CC22738CA76C5E1B1693890ED2AB209B5D33DD7662BD4A
32,423,563 UART: [art] PUB.Y = BCFD63566D6F8BCD4ECD3E34A66AF6893D4B427FDB00C3E2522F420A229B712E3133C73F31FCB7F31A82892DE40E05AD
32,430,761 UART: [art] SIG.R = 823F5E61C640D0F0F2BB129BAE5F20DB4EF1AF16BEB20C913CE906E7F269B0C7A1B395D496C9432850939D13EDBAE303
32,438,158 UART: [art] SIG.S = 58F6BE226780DE9C56F39DAF4C3A34E2C9136F9266C9FB2CF2A875F79412BC8C49418A63AEE3D9D7D268A9537442D44B
33,743,455 UART: Caliptra RT
33,744,161 UART: [state] CFI Enabled
33,860,686 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,012 UART:
1,275 UART: Running Caliptra ROM ...
2,305 UART:
6,666,859 UART: [state] CFI Enabled
6,680,964 UART: [state] LifecycleState = Production
6,682,718 UART: [state] DebugLocked = Yes
6,684,109 UART: [state] Starting the WD Timer 40000000 cycles
6,689,442 UART: [kat] SHA2-256
6,871,381 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
6,882,923 UART: [kat] ++
6,883,445 UART: [kat] sha1
6,895,254 UART: [kat] SHA2-256
6,898,323 UART: [kat] SHA2-384
6,903,979 UART: [kat] SHA2-512-ACC
6,906,607 UART: [kat] ECC-384
10,160,642 UART: [kat] HMAC-384Kdf
10,172,115 UART: [kat] LMS
11,245,289 UART: [kat] --
11,249,451 UART: [warm-reset] ++
11,255,866 UART: [warm-reset] --
11,260,072 UART: [state] Locking Datavault
11,262,787 UART: [state] Locking PCR0, PCR1 and PCR31
11,264,931 UART: [state] Locking ICCM
11,267,280 UART: [exit] Launching FMC @ 0x40000130
11,275,941 UART:
11,276,173 UART: Running Caliptra FMC ...
11,277,195 UART:
11,277,341 UART: [state] CFI Enabled
11,279,504 UART: [aliasrt :skip pcr extension
11,280,785 UART: [art] Extend RT PCRs Done
11,281,848 UART: [art] Lock RT PCRs Done
11,282,916 UART: [art] Populate DV Done
11,288,727 UART: [fht] FMC Alias Private Key: 7
11,290,397 UART: [art] Derive CDI
11,291,136 UART: [art] Store in in slot 0x4
11,333,892 UART: [art] Derive Key Pair
11,334,911 UART: [art] Store priv key in slot 0x5
14,576,660 UART: [art] Derive Key Pair - Done
14,589,647 UART: [art] Signing Cert with AUTHO
14,590,950 UART: RITY.KEYID = 7
16,870,820 UART: [art] Erasing AUTHORITY.KEYID = 7
16,872,336 UART: [art] PUB.X = AE91AE8B9C7B9B29BE5A4E8268007E2297D812E793154F2A05CC22738CA76C5E1B1693890ED2AB209B5D33DD7662BD4A
16,879,679 UART: [art] PUB.Y = BCFD63566D6F8BCD4ECD3E34A66AF6893D4B427FDB00C3E2522F420A229B712E3133C73F31FCB7F31A82892DE40E05AD
16,886,834 UART: [art] SIG.R = 823F5E61C640D0F0F2BB129BAE5F20DB4EF1AF16BEB20C913CE906E7F269B0C7A1B395D496C9432850939D13EDBAE303
16,894,235 UART: [art] SIG.S = 58F6BE226780DE9C56F39DAF4C3A34E2C9136F9266C9FB2CF2A875F79412BC8C49418A63AEE3D9D7D268A9537442D44B
18,199,293 UART: Caliptra RT
18,200,001 UART: [state] CFI Enabled
18,489,052 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
191,583 UART:
191,966 UART: Running Caliptra ROM ...
193,101 UART:
193,251 UART: [state] CFI Enabled
265,652 UART: [state] LifecycleState = Production
267,376 UART: [state] DebugLocked = Yes
269,661 UART: [state] Starting the WD Timer 40000000 cycles
274,042 UART: [kat] SHA2-256
453,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,794 UART: [kat] ++
465,326 UART: [kat] sha1
476,161 UART: [kat] SHA2-256
479,163 UART: [kat] SHA2-384
485,360 UART: [kat] SHA2-512-ACC
488,304 UART: [kat] ECC-384
2,949,115 UART: [kat] HMAC-384Kdf
2,971,681 UART: [kat] LMS
3,501,158 UART: [kat] --
3,504,869 UART: [cold-reset] ++
3,507,088 UART: [fht] FHT @ 0x50003400
3,516,855 UART: [idev] ++
3,517,418 UART: [idev] CDI.KEYID = 6
3,518,309 UART: [idev] SUBJECT.KEYID = 7
3,519,436 UART: [idev] UDS.KEYID = 0
3,520,426 ready_for_fw is high
3,520,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,285 UART: [idev] Erasing UDS.KEYID = 0
6,027,893 UART: [idev] Sha1 KeyId Algorithm
6,051,434 UART: [idev] --
6,056,165 UART: [ldev] ++
6,056,745 UART: [ldev] CDI.KEYID = 6
6,057,687 UART: [ldev] SUBJECT.KEYID = 5
6,058,854 UART: [ldev] AUTHORITY.KEYID = 7
6,060,085 UART: [ldev] FE.KEYID = 1
6,098,768 UART: [ldev] Erasing FE.KEYID = 1
8,601,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,760 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,744 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,591 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,537 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,406,473 UART: [ldev] --
10,410,219 UART: [fwproc] Wait for Commands...
10,411,985 UART: [fwproc] Recv command 0x46574c44
10,414,077 UART: [fwproc] Recv'd Img size: 114168 bytes
13,846,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,991,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,309,395 >>> mbox cmd response: success
14,313,312 UART: [afmc] ++
14,313,933 UART: [afmc] CDI.KEYID = 6
14,314,850 UART: [afmc] SUBJECT.KEYID = 7
14,315,957 UART: [afmc] AUTHORITY.KEYID = 5
16,848,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,625 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,591,557 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,607,454 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,623,152 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,645,820 UART: [afmc] --
18,649,994 UART: [cold-reset] --
18,653,476 UART: [state] Locking Datavault
18,657,753 UART: [state] Locking PCR0, PCR1 and PCR31
18,659,398 UART: [state] Locking ICCM
18,661,620 UART: [exit] Launching FMC @ 0x40000130
18,670,017 UART:
18,670,263 UART: Running Caliptra FMC ...
18,671,368 UART:
18,671,523 UART: [state] CFI Enabled
18,732,262 UART: [fht] FMC Alias Private Key: 7
20,495,806 UART: [art] Extend RT PCRs Done
20,497,028 UART: [art] Lock RT PCRs Done
20,498,545 UART: [art] Populate DV Done
20,504,015 UART: [fht] FMC Alias Private Key: 7
20,505,609 UART: [art] Derive CDI
20,506,422 UART: [art] Store in in slot 0x4
20,564,508 UART: [art] Derive Key Pair
20,565,551 UART: [art] Store priv key in slot 0x5
23,028,565 UART: [art] Derive Key Pair - Done
23,041,509 UART: [art] Signing Cert with AUTHO
23,042,837 UART: RITY.KEYID = 7
24,755,295 UART: [art] Erasing AUTHORITY.KEYID = 7
24,756,795 UART: [art] PUB.X = B0D4DD231A0633AAD4F8A4062706B03E3A4727B85704834830F415B97AD5C85792303C1A568BF4DC459FB9599F113E0E
24,764,083 UART: [art] PUB.Y = DFEDFCE4725A9F4BC1AF22FBD2E8F3B85DBB228683CE8F454A2A5F910DB7151B3B4DCF1BB156A208DD9255AB442EB916
24,771,362 UART: [art] SIG.R = 2339BB86984AA7ABDF697018BA28FFFE85B1D943875F7679AA53E91DB713D47E360E96C7876EB46D26F98A3DEB98BB19
24,778,769 UART: [art] SIG.S = 06400519237EC87EF91DA8F6D2A8B8AFD24257A7A3CB9F8402E65BF4AAF733B874B53921C9280AC1D96FD67B45430A51
25,757,998 UART: Caliptra RT
25,758,697 UART: [state] CFI Enabled
25,923,598 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,005 UART:
1,172 UART: Running Caliptra ROM ...
2,220 UART:
2,362 UART: [state] CFI Enabled
63,225 UART: [state] LifecycleState = Production
64,990 UART: [state] DebugLocked = Yes
66,943 UART: [state] Starting the WD Timer 40000000 cycles
72,324 UART: [kat] SHA2-256
251,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,047 UART: [kat] ++
263,579 UART: [kat] sha1
274,788 UART: [kat] SHA2-256
277,855 UART: [kat] SHA2-384
283,863 UART: [kat] SHA2-512-ACC
286,802 UART: [kat] ECC-384
2,751,025 UART: [kat] HMAC-384Kdf
2,771,349 UART: [kat] LMS
3,300,825 UART: [kat] --
3,304,618 UART: [warm-reset] ++
3,308,980 UART: [warm-reset] --
3,311,007 UART: [state] Locking Datavault
3,314,166 UART: [state] Locking PCR0, PCR1 and PCR31
3,315,834 UART: [state] Locking ICCM
3,318,003 UART: [exit] Launching FMC @ 0x40000130
3,326,426 UART:
3,326,666 UART: Running Caliptra FMC ...
3,327,693 UART:
3,327,840 UART: [state] CFI Enabled
3,381,289 UART: [aliasrt :skip pcr extension
3,382,541 UART: [art] Extend RT PCRs Done
3,383,606 UART: [art] Lock RT PCRs Done
3,384,833 UART: [art] Populate DV Done
3,390,402 UART: [fht] FMC Alias Private Key: 7
3,392,043 UART: [art] Derive CDI
3,392,858 UART: [art] Store in in slot 0x4
3,449,846 UART: [art] Derive Key Pair
3,450,892 UART: [art] Store priv key in slot 0x5
5,914,243 UART: [art] Derive Key Pair - Done
5,927,091 UART: [art] Signing Cert with AUTHO
5,928,391 UART: RITY.KEYID = 7
7,640,513 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,019 UART: [art] PUB.X = B0D4DD231A0633AAD4F8A4062706B03E3A4727B85704834830F415B97AD5C85792303C1A568BF4DC459FB9599F113E0E
7,649,279 UART: [art] PUB.Y = DFEDFCE4725A9F4BC1AF22FBD2E8F3B85DBB228683CE8F454A2A5F910DB7151B3B4DCF1BB156A208DD9255AB442EB916
7,656,595 UART: [art] SIG.R = 2339BB86984AA7ABDF697018BA28FFFE85B1D943875F7679AA53E91DB713D47E360E96C7876EB46D26F98A3DEB98BB19
7,663,943 UART: [art] SIG.S = 06400519237EC87EF91DA8F6D2A8B8AFD24257A7A3CB9F8402E65BF4AAF733B874B53921C9280AC1D96FD67B45430A51
8,643,262 UART: Caliptra RT
8,643,999 UART: [state] CFI Enabled
8,976,947 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
191,538 UART:
191,918 UART: Running Caliptra ROM ...
193,005 UART:
193,158 UART: [state] CFI Enabled
265,469 UART: [state] LifecycleState = Production
267,259 UART: [state] DebugLocked = Yes
268,985 UART: [state] Starting the WD Timer 40000000 cycles
273,730 UART: [kat] SHA2-256
452,885 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,440 UART: [kat] ++
464,976 UART: [kat] sha1
475,669 UART: [kat] SHA2-256
478,745 UART: [kat] SHA2-384
484,466 UART: [kat] SHA2-512-ACC
487,403 UART: [kat] ECC-384
2,948,603 UART: [kat] HMAC-384Kdf
2,971,453 UART: [kat] LMS
3,500,919 UART: [kat] --
3,505,654 UART: [cold-reset] ++
3,507,377 UART: [fht] FHT @ 0x50003400
3,519,138 UART: [idev] ++
3,519,702 UART: [idev] CDI.KEYID = 6
3,520,588 UART: [idev] SUBJECT.KEYID = 7
3,521,759 UART: [idev] UDS.KEYID = 0
3,522,807 ready_for_fw is high
3,523,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,614 UART: [idev] Erasing UDS.KEYID = 0
6,026,078 UART: [idev] Sha1 KeyId Algorithm
6,050,243 UART: [idev] --
6,054,994 UART: [ldev] ++
6,055,582 UART: [ldev] CDI.KEYID = 6
6,056,499 UART: [ldev] SUBJECT.KEYID = 5
6,057,659 UART: [ldev] AUTHORITY.KEYID = 7
6,058,892 UART: [ldev] FE.KEYID = 1
6,098,605 UART: [ldev] Erasing FE.KEYID = 1
8,602,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,558 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,539 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,376 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,311 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,195 UART: [ldev] --
10,412,163 UART: [fwproc] Wait for Commands...
10,414,147 UART: [fwproc] Recv command 0x46574c44
10,416,239 UART: [fwproc] Recv'd Img size: 114168 bytes
13,848,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,006 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,985,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,302,859 >>> mbox cmd response: success
14,306,913 UART: [afmc] ++
14,307,524 UART: [afmc] CDI.KEYID = 6
14,308,440 UART: [afmc] SUBJECT.KEYID = 7
14,309,597 UART: [afmc] AUTHORITY.KEYID = 5
16,851,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,540 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,592,498 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,608,343 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,624,115 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,647,122 UART: [afmc] --
18,650,968 UART: [cold-reset] --
18,654,509 UART: [state] Locking Datavault
18,659,393 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,041 UART: [state] Locking ICCM
18,662,762 UART: [exit] Launching FMC @ 0x40000130
18,671,162 UART:
18,671,400 UART: Running Caliptra FMC ...
18,672,500 UART:
18,672,663 UART: [state] CFI Enabled
18,734,378 UART: [fht] FMC Alias Private Key: 7
20,498,289 UART: [art] Extend RT PCRs Done
20,499,514 UART: [art] Lock RT PCRs Done
20,501,086 UART: [art] Populate DV Done
20,506,825 UART: [fht] FMC Alias Private Key: 7
20,508,376 UART: [art] Derive CDI
20,509,193 UART: [art] Store in in slot 0x4
20,566,995 UART: [art] Derive Key Pair
20,568,034 UART: [art] Store priv key in slot 0x5
23,031,743 UART: [art] Derive Key Pair - Done
23,044,532 UART: [art] Signing Cert with AUTHO
23,045,849 UART: RITY.KEYID = 7
24,757,416 UART: [art] Erasing AUTHORITY.KEYID = 7
24,758,921 UART: [art] PUB.X = 09AC94E1D9FD61B77B792380210F6FA3741A297E1D2D2C33D5DB7E54AC7E2A3AF79A5FB43433CC9E8F349A6A577961C4
24,766,225 UART: [art] PUB.Y = F0455379FB973B0A2851DC4A95844CED3B7321880DD60AEFF7C449482D68D3DEAE3D698DF76D5E730BDA381CBACB6ACB
24,773,484 UART: [art] SIG.R = 10FCD43ED41D58109A5C838FF8C3D02634316245AD37D6DE223136D7EAB28CFBA0871E254C46A65248B919829BF7CBB2
24,780,884 UART: [art] SIG.S = 80FBD64D7033EDA4311804A75FE205119562F755BFAB4A3CCB000E4A1206FFB11D389FB77EAA4BBB936A5DCBD50612CE
25,760,047 UART: Caliptra RT
25,760,773 UART: [state] CFI Enabled
25,923,300 UART: [rt] RT listening for mailbox commands...
Initializing fuses
990 UART:
1,140 UART: Running Caliptra ROM ...
2,186 UART:
2,331 UART: [state] CFI Enabled
66,388 UART: [state] LifecycleState = Production
68,155 UART: [state] DebugLocked = Yes
71,006 UART: [state] Starting the WD Timer 40000000 cycles
76,006 UART: [kat] SHA2-256
255,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,737 UART: [kat] ++
267,190 UART: [kat] sha1
276,826 UART: [kat] SHA2-256
279,883 UART: [kat] SHA2-384
285,861 UART: [kat] SHA2-512-ACC
288,841 UART: [kat] ECC-384
2,749,679 UART: [kat] HMAC-384Kdf
2,774,747 UART: [kat] LMS
3,304,209 UART: [kat] --
3,308,029 UART: [warm-reset] ++
3,311,857 UART: [warm-reset] --
3,314,228 UART: [state] Locking Datavault
3,318,400 UART: [state] Locking PCR0, PCR1 and PCR31
3,320,047 UART: [state] Locking ICCM
3,322,139 UART: [exit] Launching FMC @ 0x40000130
3,330,577 UART:
3,330,836 UART: Running Caliptra FMC ...
3,331,942 UART:
3,332,103 UART: [state] CFI Enabled
3,383,538 UART: [aliasrt :skip pcr extension
3,384,781 UART: [art] Extend RT PCRs Done
3,385,920 UART: [art] Lock RT PCRs Done
3,387,152 UART: [art] Populate DV Done
3,392,613 UART: [fht] FMC Alias Private Key: 7
3,394,153 UART: [art] Derive CDI
3,394,971 UART: [art] Store in in slot 0x4
3,452,690 UART: [art] Derive Key Pair
3,453,920 UART: [art] Store priv key in slot 0x5
5,917,037 UART: [art] Derive Key Pair - Done
5,930,027 UART: [art] Signing Cert with AUTHO
5,931,348 UART: RITY.KEYID = 7
7,643,797 UART: [art] Erasing AUTHORITY.KEYID = 7
7,645,316 UART: [art] PUB.X = 09AC94E1D9FD61B77B792380210F6FA3741A297E1D2D2C33D5DB7E54AC7E2A3AF79A5FB43433CC9E8F349A6A577961C4
7,652,588 UART: [art] PUB.Y = F0455379FB973B0A2851DC4A95844CED3B7321880DD60AEFF7C449482D68D3DEAE3D698DF76D5E730BDA381CBACB6ACB
7,659,837 UART: [art] SIG.R = 10FCD43ED41D58109A5C838FF8C3D02634316245AD37D6DE223136D7EAB28CFBA0871E254C46A65248B919829BF7CBB2
7,667,235 UART: [art] SIG.S = 80FBD64D7033EDA4311804A75FE205119562F755BFAB4A3CCB000E4A1206FFB11D389FB77EAA4BBB936A5DCBD50612CE
8,646,195 UART: Caliptra RT
8,646,913 UART: [state] CFI Enabled
8,977,293 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,723 writing to cptra_bootfsm_go
192,342 UART:
192,711 UART: Running Caliptra ROM ...
193,895 UART:
603,476 UART: [state] CFI Enabled
616,154 UART: [state] LifecycleState = Production
617,870 UART: [state] DebugLocked = Yes
620,843 UART: [state] Starting the WD Timer 40000000 cycles
625,599 UART: [kat] SHA2-256
804,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,383 UART: [kat] ++
816,906 UART: [kat] sha1
827,596 UART: [kat] SHA2-256
830,598 UART: [kat] SHA2-384
837,606 UART: [kat] SHA2-512-ACC
840,617 UART: [kat] ECC-384
3,284,196 UART: [kat] HMAC-384Kdf
3,297,566 UART: [kat] LMS
3,827,042 UART: [kat] --
3,831,626 UART: [cold-reset] ++
3,833,069 UART: [fht] FHT @ 0x50003400
3,844,771 UART: [idev] ++
3,845,334 UART: [idev] CDI.KEYID = 6
3,846,244 UART: [idev] SUBJECT.KEYID = 7
3,847,418 UART: [idev] UDS.KEYID = 0
3,848,462 ready_for_fw is high
3,848,661 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,043 UART: [idev] Erasing UDS.KEYID = 0
6,323,943 UART: [idev] Sha1 KeyId Algorithm
6,347,571 UART: [idev] --
6,351,100 UART: [ldev] ++
6,351,686 UART: [ldev] CDI.KEYID = 6
6,352,575 UART: [ldev] SUBJECT.KEYID = 5
6,353,748 UART: [ldev] AUTHORITY.KEYID = 7
6,355,033 UART: [ldev] FE.KEYID = 1
6,364,154 UART: [ldev] Erasing FE.KEYID = 1
8,841,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,558,469 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,574,455 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,590,273 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,606,254 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,626,530 UART: [ldev] --
10,631,864 UART: [fwproc] Wait for Commands...
10,633,851 UART: [fwproc] Recv command 0x46574c44
10,635,939 UART: [fwproc] Recv'd Img size: 114168 bytes
14,066,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,353 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,216,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,532,773 >>> mbox cmd response: success
14,536,803 UART: [afmc] ++
14,537,416 UART: [afmc] CDI.KEYID = 6
14,538,334 UART: [afmc] SUBJECT.KEYID = 7
14,539,494 UART: [afmc] AUTHORITY.KEYID = 5
17,038,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,761,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,763,062 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,779,039 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,794,869 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,810,590 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,833,760 UART: [afmc] --
18,837,060 UART: [cold-reset] --
18,839,791 UART: [state] Locking Datavault
18,845,166 UART: [state] Locking PCR0, PCR1 and PCR31
18,846,875 UART: [state] Locking ICCM
18,848,220 UART: [exit] Launching FMC @ 0x40000130
18,856,612 UART:
18,856,859 UART: Running Caliptra FMC ...
18,858,007 UART:
18,858,186 UART: [state] CFI Enabled
18,866,132 UART: [fht] FMC Alias Private Key: 7
20,622,611 UART: [art] Extend RT PCRs Done
20,623,833 UART: [art] Lock RT PCRs Done
20,625,594 UART: [art] Populate DV Done
20,630,898 UART: [fht] FMC Alias Private Key: 7
20,632,600 UART: [art] Derive CDI
20,633,336 UART: [art] Store in in slot 0x4
20,676,089 UART: [art] Derive Key Pair
20,677,091 UART: [art] Store priv key in slot 0x5
23,103,355 UART: [art] Derive Key Pair - Done
23,116,484 UART: [art] Signing Cert with AUTHO
23,117,783 UART: RITY.KEYID = 7
24,823,533 UART: [art] Erasing AUTHORITY.KEYID = 7
24,825,039 UART: [art] PUB.X = 47600BEE39F0CA343831D4B268A07F9A7094D62BF6686E1A70EB1AD932E66EE28185304059C9EA70308BA86B9374D77E
24,832,296 UART: [art] PUB.Y = F297C92742298B9DBCB015B967625372C6B3FFDB5C688AFF08242F36A6F60E84086A2DBF2989DF3AE0B3BF922A0A1FCB
24,839,593 UART: [art] SIG.R = 7E8DF329984C0500FECFA938A653676446EB4BDBD945103630985EFEBE25F0281FD1056153BFFC403C6B6220FD293C0F
24,846,948 UART: [art] SIG.S = E7CFD982EDA24DC66907C2BFAA55C172BD9F0584830FBA7760FE0035A5B575F677D6E4EC5FB130EDD43122176D00197D
25,825,827 UART: Caliptra RT
25,826,525 UART: [state] CFI Enabled
25,944,882 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,072 UART:
1,330 UART: Running Caliptra ROM ...
2,385 UART:
14,573,470 UART: [state] CFI Enabled
14,585,593 UART: [state] LifecycleState = Production
14,587,372 UART: [state] DebugLocked = Yes
14,590,020 UART: [state] Starting the WD Timer 40000000 cycles
14,594,867 UART: [kat] SHA2-256
14,774,005 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,785,592 UART: [kat] ++
14,786,132 UART: [kat] sha1
14,796,593 UART: [kat] SHA2-256
14,799,606 UART: [kat] SHA2-384
14,805,967 UART: [kat] SHA2-512-ACC
14,808,908 UART: [kat] ECC-384
17,250,862 UART: [kat] HMAC-384Kdf
17,263,465 UART: [kat] LMS
17,793,003 UART: [kat] --
17,798,798 UART: [warm-reset] ++
17,802,944 UART: [warm-reset] --
17,808,338 UART: [state] Locking Datavault
17,812,017 UART: [state] Locking PCR0, PCR1 and PCR31
17,813,668 UART: [state] Locking ICCM
17,815,900 UART: [exit] Launching FMC @ 0x40000130
17,824,344 UART:
17,824,579 UART: Running Caliptra FMC ...
17,825,606 UART:
17,825,755 UART: [state] CFI Enabled
17,827,701 UART: [aliasrt :skip pcr extension
17,828,940 UART: [art] Extend RT PCRs Done
17,830,003 UART: [art] Lock RT PCRs Done
17,831,447 UART: [art] Populate DV Done
17,836,745 UART: [fht] FMC Alias Private Key: 7
17,838,221 UART: [art] Derive CDI
17,838,957 UART: [art] Store in in slot 0x4
17,881,872 UART: [art] Derive Key Pair
17,882,930 UART: [art] Store priv key in slot 0x5
20,310,088 UART: [art] Derive Key Pair - Done
20,323,190 UART: [art] Signing Cert with AUTHO
20,324,490 UART: RITY.KEYID = 7
22,029,959 UART: [art] Erasing AUTHORITY.KEYID = 7
22,031,485 UART: [art] PUB.X = 47600BEE39F0CA343831D4B268A07F9A7094D62BF6686E1A70EB1AD932E66EE28185304059C9EA70308BA86B9374D77E
22,038,760 UART: [art] PUB.Y = F297C92742298B9DBCB015B967625372C6B3FFDB5C688AFF08242F36A6F60E84086A2DBF2989DF3AE0B3BF922A0A1FCB
22,045,993 UART: [art] SIG.R = 7E8DF329984C0500FECFA938A653676446EB4BDBD945103630985EFEBE25F0281FD1056153BFFC403C6B6220FD293C0F
22,053,399 UART: [art] SIG.S = E7CFD982EDA24DC66907C2BFAA55C172BD9F0584830FBA7760FE0035A5B575F677D6E4EC5FB130EDD43122176D00197D
23,032,046 UART: Caliptra RT
23,032,746 UART: [state] CFI Enabled
23,321,122 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,620 writing to cptra_bootfsm_go
192,267 UART:
192,637 UART: Running Caliptra ROM ...
193,822 UART:
603,347 UART: [state] CFI Enabled
614,450 UART: [state] LifecycleState = Production
616,217 UART: [state] DebugLocked = Yes
618,207 UART: [state] Starting the WD Timer 40000000 cycles
622,448 UART: [kat] SHA2-256
801,606 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,176 UART: [kat] ++
813,625 UART: [kat] sha1
824,736 UART: [kat] SHA2-256
827,751 UART: [kat] SHA2-384
832,478 UART: [kat] SHA2-512-ACC
835,434 UART: [kat] ECC-384
3,275,868 UART: [kat] HMAC-384Kdf
3,288,804 UART: [kat] LMS
3,818,332 UART: [kat] --
3,823,952 UART: [cold-reset] ++
3,825,170 UART: [fht] FHT @ 0x50003400
3,835,859 UART: [idev] ++
3,836,431 UART: [idev] CDI.KEYID = 6
3,837,342 UART: [idev] SUBJECT.KEYID = 7
3,838,516 UART: [idev] UDS.KEYID = 0
3,839,443 ready_for_fw is high
3,839,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,982,996 UART: [idev] Erasing UDS.KEYID = 0
6,309,955 UART: [idev] Sha1 KeyId Algorithm
6,333,156 UART: [idev] --
6,335,593 UART: [ldev] ++
6,336,188 UART: [ldev] CDI.KEYID = 6
6,337,154 UART: [ldev] SUBJECT.KEYID = 5
6,338,257 UART: [ldev] AUTHORITY.KEYID = 7
6,339,485 UART: [ldev] FE.KEYID = 1
6,350,496 UART: [ldev] Erasing FE.KEYID = 1
8,825,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,351 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,559,345 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,575,163 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,591,111 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,610,484 UART: [ldev] --
10,614,516 UART: [fwproc] Wait for Commands...
10,617,582 UART: [fwproc] Recv command 0x46574c44
10,619,716 UART: [fwproc] Recv'd Img size: 114168 bytes
14,054,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,126,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,195,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,512,794 >>> mbox cmd response: success
14,516,661 UART: [afmc] ++
14,517,271 UART: [afmc] CDI.KEYID = 6
14,518,162 UART: [afmc] SUBJECT.KEYID = 7
14,519,376 UART: [afmc] AUTHORITY.KEYID = 5
17,019,275 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,739,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,741,626 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,757,615 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,773,490 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,789,199 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,812,998 UART: [afmc] --
18,817,064 UART: [cold-reset] --
18,820,391 UART: [state] Locking Datavault
18,824,161 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,837 UART: [state] Locking ICCM
18,828,347 UART: [exit] Launching FMC @ 0x40000130
18,836,755 UART:
18,836,993 UART: Running Caliptra FMC ...
18,838,095 UART:
18,838,260 UART: [state] CFI Enabled
18,846,309 UART: [fht] FMC Alias Private Key: 7
20,603,043 UART: [art] Extend RT PCRs Done
20,604,265 UART: [art] Lock RT PCRs Done
20,605,791 UART: [art] Populate DV Done
20,611,097 UART: [fht] FMC Alias Private Key: 7
20,612,747 UART: [art] Derive CDI
20,613,561 UART: [art] Store in in slot 0x4
20,656,427 UART: [art] Derive Key Pair
20,657,429 UART: [art] Store priv key in slot 0x5
23,083,689 UART: [art] Derive Key Pair - Done
23,096,759 UART: [art] Signing Cert with AUTHO
23,098,068 UART: RITY.KEYID = 7
24,803,727 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,231 UART: [art] PUB.X = 1B2DF45BBB2DD446806572A50D037217DCE2C0FA6DCC9B56672C3AA5450A28182B5FC8C45B9BD6B25DE0812A817BF3C1
24,812,472 UART: [art] PUB.Y = DC3E72AE2F9643F7C02ED1105C363558250756CA459334C2512428E5550B0123B746ED3B9C91E2038C725D072E8357DC
24,819,753 UART: [art] SIG.R = A511707487DB1841230B45C07CE993D5B4F12D0387E0B919CF576165FC597A3DBF5B04BBBE26ED9E8A964D54B452F140
24,827,123 UART: [art] SIG.S = C096E310A33324A93C0F95027C32494748F9F0BE8DED2E2D97583C004B3BF578AA148093F4DFE420C0CBE129C236CB05
25,806,140 UART: Caliptra RT
25,806,853 UART: [state] CFI Enabled
25,925,705 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,053 UART:
1,217 UART: Running Caliptra ROM ...
2,330 UART:
14,602,140 UART: [state] CFI Enabled
14,613,854 UART: [state] LifecycleState = Production
14,615,572 UART: [state] DebugLocked = Yes
14,616,920 UART: [state] Starting the WD Timer 40000000 cycles
14,621,761 UART: [kat] SHA2-256
14,800,907 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,812,453 UART: [kat] ++
14,812,909 UART: [kat] sha1
14,823,205 UART: [kat] SHA2-256
14,826,265 UART: [kat] SHA2-384
14,832,527 UART: [kat] SHA2-512-ACC
14,835,471 UART: [kat] ECC-384
17,278,078 UART: [kat] HMAC-384Kdf
17,290,690 UART: [kat] LMS
17,820,243 UART: [kat] --
17,827,364 UART: [warm-reset] ++
17,831,068 UART: [warm-reset] --
17,833,521 UART: [state] Locking Datavault
17,837,380 UART: [state] Locking PCR0, PCR1 and PCR31
17,839,035 UART: [state] Locking ICCM
17,840,783 UART: [exit] Launching FMC @ 0x40000130
17,849,234 UART:
17,849,465 UART: Running Caliptra FMC ...
17,850,509 UART:
17,850,659 UART: [state] CFI Enabled
17,852,550 UART: [aliasrt :skip pcr extension
17,853,795 UART: [art] Extend RT PCRs Done
17,855,049 UART: [art] Lock RT PCRs Done
17,856,135 UART: [art] Populate DV Done
17,861,845 UART: [fht] FMC Alias Private Key: 7
17,863,376 UART: [art] Derive CDI
17,864,145 UART: [art] Store in in slot 0x4
17,906,903 UART: [art] Derive Key Pair
17,907,902 UART: [art] Store priv key in slot 0x5
20,334,630 UART: [art] Derive Key Pair - Done
20,347,138 UART: [art] Signing Cert with AUTHO
20,348,434 UART: RITY.KEYID = 7
22,053,595 UART: [art] Erasing AUTHORITY.KEYID = 7
22,055,105 UART: [art] PUB.X = 1B2DF45BBB2DD446806572A50D037217DCE2C0FA6DCC9B56672C3AA5450A28182B5FC8C45B9BD6B25DE0812A817BF3C1
22,062,418 UART: [art] PUB.Y = DC3E72AE2F9643F7C02ED1105C363558250756CA459334C2512428E5550B0123B746ED3B9C91E2038C725D072E8357DC
22,069,648 UART: [art] SIG.R = A511707487DB1841230B45C07CE993D5B4F12D0387E0B919CF576165FC597A3DBF5B04BBBE26ED9E8A964D54B452F140
22,076,997 UART: [art] SIG.S = C096E310A33324A93C0F95027C32494748F9F0BE8DED2E2D97583C004B3BF578AA148093F4DFE420C0CBE129C236CB05
23,055,863 UART: Caliptra RT
23,056,573 UART: [state] CFI Enabled
23,345,706 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
191,627 UART:
191,992 UART: Running Caliptra ROM ...
193,194 UART:
193,352 UART: [state] CFI Enabled
264,972 UART: [state] LifecycleState = Production
266,727 UART: [state] DebugLocked = Yes
268,094 UART: [state] Starting the WD Timer 40000000 cycles
272,850 UART: [kat] SHA2-256
452,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,581 UART: [kat] ++
464,140 UART: [kat] sha1
476,343 UART: [kat] SHA2-256
479,334 UART: [kat] SHA2-384
486,969 UART: [kat] SHA2-512-ACC
489,908 UART: [kat] ECC-384
2,948,035 UART: [kat] HMAC-384Kdf
2,963,614 UART: [kat] LMS
3,493,110 UART: [kat] --
3,499,167 UART: [cold-reset] ++
3,501,032 UART: [fht] FHT @ 0x50003400
3,511,391 UART: [idev] ++
3,511,995 UART: [idev] CDI.KEYID = 6
3,512,921 UART: [idev] SUBJECT.KEYID = 7
3,514,026 UART: [idev] UDS.KEYID = 0
3,515,075 ready_for_fw is high
3,515,276 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,658,762 UART: [idev] Erasing UDS.KEYID = 0
6,020,457 UART: [idev] Sha1 KeyId Algorithm
6,043,457 UART: [idev] --
6,047,724 UART: [ldev] ++
6,048,297 UART: [ldev] CDI.KEYID = 6
6,049,184 UART: [ldev] SUBJECT.KEYID = 5
6,050,398 UART: [ldev] AUTHORITY.KEYID = 7
6,051,635 UART: [ldev] FE.KEYID = 1
6,092,556 UART: [ldev] Erasing FE.KEYID = 1
8,594,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,259 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,349,279 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,365,097 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,380,991 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,402,993 UART: [ldev] --
10,407,570 UART: [fwproc] Wait for Commands...
10,409,958 UART: [fwproc] Recv command 0x46574c44
10,412,053 UART: [fwproc] Recv'd Img size: 114168 bytes
13,846,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,309 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,985,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,302,124 >>> mbox cmd response: success
14,305,609 UART: [afmc] ++
14,306,218 UART: [afmc] CDI.KEYID = 6
14,307,303 UART: [afmc] SUBJECT.KEYID = 7
14,308,425 UART: [afmc] AUTHORITY.KEYID = 5
16,842,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,566,657 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,568,543 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,584,550 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,600,377 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,616,103 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,639,476 UART: [afmc] --
18,642,854 UART: [cold-reset] --
18,646,610 UART: [state] Locking Datavault
18,651,799 UART: [state] Locking PCR0, PCR1 and PCR31
18,653,450 UART: [state] Locking ICCM
18,655,581 UART: [exit] Launching FMC @ 0x40000130
18,663,982 UART:
18,664,217 UART: Running Caliptra FMC ...
18,665,320 UART:
18,665,479 UART: [state] CFI Enabled
18,725,303 UART: [fht] FMC Alias Private Key: 7
20,488,871 UART: [art] Extend RT PCRs Done
20,490,090 UART: [art] Lock RT PCRs Done
20,491,908 UART: [art] Populate DV Done
20,497,265 UART: [fht] FMC Alias Private Key: 7
20,498,962 UART: [art] Derive CDI
20,499,792 UART: [art] Store in in slot 0x4
20,557,802 UART: [art] Derive Key Pair
20,558,839 UART: [art] Store priv key in slot 0x5
23,022,124 UART: [art] Derive Key Pair - Done
23,034,838 UART: [art] Signing Cert with AUTHO
23,036,172 UART: RITY.KEYID = 7
24,747,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,749,378 UART: [art] PUB.X = 1628F7A4D56DFA6A00BF19D51CF4E88DD0BF792753C121305F83B03584E86F69E649F2A7FB139B9CF6942DD243AB6342
24,756,650 UART: [art] PUB.Y = BA42682356DF6AF97D9A60CDC8B8D3E5997E82B823942F7A26F1D283D47D8B3299607717C55CBF975577CD3E4F26446B
24,763,909 UART: [art] SIG.R = 901B46C9E91638112A510830881EEA702DA427A207DE66AC20DFFBB9826C029A3DB37B5C76749A4C9F732EDE57B80122
24,771,261 UART: [art] SIG.S = 523C319C5E940C0513496EC248AE75E6A761F0D765E85EA8AA0BE098B9924D02B6EE8D7896CDFDE3C5E133E3EDF19E62
25,749,649 UART: Caliptra RT
25,750,360 UART: [state] CFI Enabled
25,917,158 UART: [rt] RT listening for mailbox commands...
Initializing fuses
996 UART:
1,264 UART: Running Caliptra ROM ...
2,369 UART:
2,525 UART: [state] CFI Enabled
65,768 UART: [state] LifecycleState = Production
67,489 UART: [state] DebugLocked = Yes
69,797 UART: [state] Starting the WD Timer 40000000 cycles
74,800 UART: [kat] SHA2-256
253,943 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
265,520 UART: [kat] ++
265,967 UART: [kat] sha1
277,703 UART: [kat] SHA2-256
280,763 UART: [kat] SHA2-384
287,166 UART: [kat] SHA2-512-ACC
290,109 UART: [kat] ECC-384
2,749,907 UART: [kat] HMAC-384Kdf
2,771,045 UART: [kat] LMS
3,300,530 UART: [kat] --
3,306,032 UART: [warm-reset] ++
3,311,691 UART: [warm-reset] --
3,316,913 UART: [state] Locking Datavault
3,320,172 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,822 UART: [state] Locking ICCM
3,322,896 UART: [exit] Launching FMC @ 0x40000130
3,331,348 UART:
3,331,589 UART: Running Caliptra FMC ...
3,332,690 UART:
3,332,851 UART: [state] CFI Enabled
3,381,702 UART: [aliasrt :skip pcr extension
3,382,997 UART: [art] Extend RT PCRs Done
3,384,151 UART: [art] Lock RT PCRs Done
3,385,221 UART: [art] Populate DV Done
3,390,578 UART: [fht] FMC Alias Private Key: 7
3,392,244 UART: [art] Derive CDI
3,393,062 UART: [art] Store in in slot 0x4
3,450,215 UART: [art] Derive Key Pair
3,451,282 UART: [art] Store priv key in slot 0x5
5,914,110 UART: [art] Derive Key Pair - Done
5,927,332 UART: [art] Signing Cert with AUTHO
5,928,634 UART: RITY.KEYID = 7
7,640,187 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,694 UART: [art] PUB.X = 1628F7A4D56DFA6A00BF19D51CF4E88DD0BF792753C121305F83B03584E86F69E649F2A7FB139B9CF6942DD243AB6342
7,648,941 UART: [art] PUB.Y = BA42682356DF6AF97D9A60CDC8B8D3E5997E82B823942F7A26F1D283D47D8B3299607717C55CBF975577CD3E4F26446B
7,656,195 UART: [art] SIG.R = 901B46C9E91638112A510830881EEA702DA427A207DE66AC20DFFBB9826C029A3DB37B5C76749A4C9F732EDE57B80122
7,663,550 UART: [art] SIG.S = 523C319C5E940C0513496EC248AE75E6A761F0D765E85EA8AA0BE098B9924D02B6EE8D7896CDFDE3C5E133E3EDF19E62
8,641,794 UART: Caliptra RT
8,642,484 UART: [state] CFI Enabled
8,977,229 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
191,501 UART:
191,873 UART: Running Caliptra ROM ...
192,974 UART:
193,119 UART: [state] CFI Enabled
265,169 UART: [state] LifecycleState = Production
267,072 UART: [state] DebugLocked = Yes
269,705 UART: [state] Starting the WD Timer 40000000 cycles
273,951 UART: [kat] SHA2-256
453,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,686 UART: [kat] ++
465,133 UART: [kat] sha1
476,879 UART: [kat] SHA2-256
479,885 UART: [kat] SHA2-384
486,158 UART: [kat] SHA2-512-ACC
489,102 UART: [kat] ECC-384
2,947,391 UART: [kat] HMAC-384Kdf
2,970,664 UART: [kat] LMS
3,500,109 UART: [kat] --
3,505,378 UART: [cold-reset] ++
3,506,386 UART: [fht] FHT @ 0x50003400
3,517,931 UART: [idev] ++
3,518,493 UART: [idev] CDI.KEYID = 6
3,519,407 UART: [idev] SUBJECT.KEYID = 7
3,520,579 UART: [idev] UDS.KEYID = 0
3,521,628 ready_for_fw is high
3,521,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,544 UART: [idev] Erasing UDS.KEYID = 0
6,027,994 UART: [idev] Sha1 KeyId Algorithm
6,051,745 UART: [idev] --
6,056,817 UART: [ldev] ++
6,057,392 UART: [ldev] CDI.KEYID = 6
6,058,319 UART: [ldev] SUBJECT.KEYID = 5
6,059,484 UART: [ldev] AUTHORITY.KEYID = 7
6,060,715 UART: [ldev] FE.KEYID = 1
6,099,422 UART: [ldev] Erasing FE.KEYID = 1
8,605,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,521 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,569 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,335 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,311 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,782 UART: [ldev] --
10,415,904 UART: [fwproc] Wait for Commands...
10,418,486 UART: [fwproc] Recv command 0x46574c44
10,420,576 UART: [fwproc] Recv'd Img size: 114168 bytes
13,851,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,785 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,989,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,306,606 >>> mbox cmd response: success
14,310,670 UART: [afmc] ++
14,311,282 UART: [afmc] CDI.KEYID = 6
14,312,217 UART: [afmc] SUBJECT.KEYID = 7
14,313,319 UART: [afmc] AUTHORITY.KEYID = 5
16,854,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,415 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,611,434 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,627,273 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,643,032 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,666,020 UART: [afmc] --
18,669,863 UART: [cold-reset] --
18,672,384 UART: [state] Locking Datavault
18,676,498 UART: [state] Locking PCR0, PCR1 and PCR31
18,678,194 UART: [state] Locking ICCM
18,679,725 UART: [exit] Launching FMC @ 0x40000130
18,688,111 UART:
18,688,352 UART: Running Caliptra FMC ...
18,689,376 UART:
18,689,521 UART: [state] CFI Enabled
18,753,346 UART: [fht] FMC Alias Private Key: 7
20,516,962 UART: [art] Extend RT PCRs Done
20,518,184 UART: [art] Lock RT PCRs Done
20,520,102 UART: [art] Populate DV Done
20,525,299 UART: [fht] FMC Alias Private Key: 7
20,527,009 UART: [art] Derive CDI
20,527,755 UART: [art] Store in in slot 0x4
20,586,378 UART: [art] Derive Key Pair
20,587,444 UART: [art] Store priv key in slot 0x5
23,049,710 UART: [art] Derive Key Pair - Done
23,063,088 UART: [art] Signing Cert with AUTHO
23,064,391 UART: RITY.KEYID = 7
24,774,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,463 UART: [art] PUB.X = 9FCDC7E90681010CA0C2FBCC2B1733259C742C05887DA2085D149A1712786D216C67F03029FB6FE7159722C4B0711C63
24,783,690 UART: [art] PUB.Y = 6CF3602A8F56A7DD8460F0C540C93199C3FE702EE89D2748171BD45D4C7BA00274FA6798BE3F5C06ECA46EF8308A6D62
24,790,978 UART: [art] SIG.R = EBA9DEDD4EE0092507544BDCEFF21924CA2E7E3A527F743323D56E9CC4A0130AA9BFA2D25E3FC2AD1856BBA4ED5C5A38
24,798,411 UART: [art] SIG.S = 04D0FDE52DAF967E5637EEA8F7D7F22D17CFC5423F861BA37313F8FC9269E860245BAA0C8C1A2B095FDF8E74430928D1
25,776,968 UART: Caliptra RT
25,777,673 UART: [state] CFI Enabled
25,940,930 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,082 UART:
1,343 UART: Running Caliptra ROM ...
2,446 UART:
2,599 UART: [state] CFI Enabled
66,563 UART: [state] LifecycleState = Production
68,293 UART: [state] DebugLocked = Yes
70,407 UART: [state] Starting the WD Timer 40000000 cycles
75,563 UART: [kat] SHA2-256
254,724 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
266,315 UART: [kat] ++
266,760 UART: [kat] sha1
278,982 UART: [kat] SHA2-256
281,988 UART: [kat] SHA2-384
288,986 UART: [kat] SHA2-512-ACC
291,914 UART: [kat] ECC-384
2,752,086 UART: [kat] HMAC-384Kdf
2,772,378 UART: [kat] LMS
3,301,836 UART: [kat] --
3,306,548 UART: [warm-reset] ++
3,313,553 UART: [warm-reset] --
3,319,420 UART: [state] Locking Datavault
3,323,910 UART: [state] Locking PCR0, PCR1 and PCR31
3,325,555 UART: [state] Locking ICCM
3,327,164 UART: [exit] Launching FMC @ 0x40000130
3,335,613 UART:
3,335,859 UART: Running Caliptra FMC ...
3,336,966 UART:
3,337,127 UART: [state] CFI Enabled
3,382,511 UART: [aliasrt :skip pcr extension
3,383,806 UART: [art] Extend RT PCRs Done
3,384,955 UART: [art] Lock RT PCRs Done
3,386,240 UART: [art] Populate DV Done
3,391,664 UART: [fht] FMC Alias Private Key: 7
3,393,309 UART: [art] Derive CDI
3,394,126 UART: [art] Store in in slot 0x4
3,451,052 UART: [art] Derive Key Pair
3,452,101 UART: [art] Store priv key in slot 0x5
5,915,252 UART: [art] Derive Key Pair - Done
5,928,722 UART: [art] Signing Cert with AUTHO
5,930,051 UART: RITY.KEYID = 7
7,641,041 UART: [art] Erasing AUTHORITY.KEYID = 7
7,642,549 UART: [art] PUB.X = 9FCDC7E90681010CA0C2FBCC2B1733259C742C05887DA2085D149A1712786D216C67F03029FB6FE7159722C4B0711C63
7,649,788 UART: [art] PUB.Y = 6CF3602A8F56A7DD8460F0C540C93199C3FE702EE89D2748171BD45D4C7BA00274FA6798BE3F5C06ECA46EF8308A6D62
7,657,031 UART: [art] SIG.R = EBA9DEDD4EE0092507544BDCEFF21924CA2E7E3A527F743323D56E9CC4A0130AA9BFA2D25E3FC2AD1856BBA4ED5C5A38
7,664,482 UART: [art] SIG.S = 04D0FDE52DAF967E5637EEA8F7D7F22D17CFC5423F861BA37313F8FC9269E860245BAA0C8C1A2B095FDF8E74430928D1
8,643,160 UART: Caliptra RT
8,643,981 UART: [state] CFI Enabled
8,978,075 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,767 writing to cptra_bootfsm_go
192,389 UART:
192,759 UART: Running Caliptra ROM ...
193,895 UART:
603,523 UART: [state] CFI Enabled
614,475 UART: [state] LifecycleState = Production
616,162 UART: [state] DebugLocked = Yes
617,433 UART: [state] Starting the WD Timer 40000000 cycles
622,740 UART: [kat] SHA2-256
801,858 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,485 UART: [kat] ++
813,934 UART: [kat] sha1
824,754 UART: [kat] SHA2-256
827,844 UART: [kat] SHA2-384
833,425 UART: [kat] SHA2-512-ACC
836,388 UART: [kat] ECC-384
3,275,522 UART: [kat] HMAC-384Kdf
3,286,699 UART: [kat] LMS
3,816,164 UART: [kat] --
3,820,659 UART: [cold-reset] ++
3,821,952 UART: [fht] FHT @ 0x50003400
3,832,927 UART: [idev] ++
3,833,498 UART: [idev] CDI.KEYID = 6
3,834,408 UART: [idev] SUBJECT.KEYID = 7
3,835,581 UART: [idev] UDS.KEYID = 0
3,836,505 ready_for_fw is high
3,836,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,980,110 UART: [idev] Erasing UDS.KEYID = 0
6,306,495 UART: [idev] Sha1 KeyId Algorithm
6,329,219 UART: [idev] --
6,334,127 UART: [ldev] ++
6,334,694 UART: [ldev] CDI.KEYID = 6
6,335,578 UART: [ldev] SUBJECT.KEYID = 5
6,336,787 UART: [ldev] AUTHORITY.KEYID = 7
6,338,019 UART: [ldev] FE.KEYID = 1
6,350,047 UART: [ldev] Erasing FE.KEYID = 1
8,825,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,002 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,560,990 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,576,858 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,592,828 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,612,639 UART: [ldev] --
10,617,274 UART: [fwproc] Wait for Commands...
10,619,479 UART: [fwproc] Recv command 0x46574c44
10,621,529 UART: [fwproc] Recv'd Img size: 114168 bytes
14,055,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,126,172 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,194,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,512,403 >>> mbox cmd response: success
14,515,766 UART: [afmc] ++
14,516,380 UART: [afmc] CDI.KEYID = 6
14,517,264 UART: [afmc] SUBJECT.KEYID = 7
14,518,482 UART: [afmc] AUTHORITY.KEYID = 5
17,020,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,741,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,743,747 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,759,768 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,775,588 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,791,329 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,814,429 UART: [afmc] --
18,818,597 UART: [cold-reset] --
18,820,296 UART: [state] Locking Datavault
18,825,491 UART: [state] Locking PCR0, PCR1 and PCR31
18,827,136 UART: [state] Locking ICCM
18,829,829 UART: [exit] Launching FMC @ 0x40000130
18,838,211 UART:
18,838,456 UART: Running Caliptra FMC ...
18,839,562 UART:
18,839,722 UART: [state] CFI Enabled
18,847,716 UART: [fht] FMC Alias Private Key: 7
20,604,246 UART: [art] Extend RT PCRs Done
20,605,449 UART: [art] Lock RT PCRs Done
20,607,317 UART: [art] Populate DV Done
20,612,783 UART: [fht] FMC Alias Private Key: 7
20,614,390 UART: [art] Derive CDI
20,615,209 UART: [art] Store in in slot 0x4
20,658,078 UART: [art] Derive Key Pair
20,659,083 UART: [art] Store priv key in slot 0x5
23,085,931 UART: [art] Derive Key Pair - Done
23,099,048 UART: [art] Signing Cert with AUTHO
23,100,363 UART: RITY.KEYID = 7
24,806,022 UART: [art] Erasing AUTHORITY.KEYID = 7
24,807,511 UART: [art] PUB.X = E56F167E458750B98DCC01EEE5D0B66E5E07A4ACEE65CE676994A04BBB9A3764AA4FA06BDC9F17A6AD81D7997F8F6848
24,814,808 UART: [art] PUB.Y = DFD8104D9BF5C1A4A5911AA7B7E32195E0D050A439B384986D215A410243E27507427E5FF98EE5CF17C05C19A1A033C3
24,822,098 UART: [art] SIG.R = 0D8D76CF69AC134C0CFCDADCCF1B9BE281B88220761DF29CBF203B01C9E1DA831FF19E009518A2C12F43A7478D9929D5
24,829,436 UART: [art] SIG.S = 46462EBBBBE2E3E6AC2D8E1A0CDF271678E1AB59C8DF64FC7AA31C3BA603C33D5939330AAA5D97AE4D080B541B3161A1
25,808,495 UART: Caliptra RT
25,809,212 UART: [state] CFI Enabled
25,925,415 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,035 UART:
1,301 UART: Running Caliptra ROM ...
2,331 UART:
14,598,245 UART: [state] CFI Enabled
14,616,751 UART: [state] LifecycleState = Production
14,618,495 UART: [state] DebugLocked = Yes
14,620,347 UART: [state] Starting the WD Timer 40000000 cycles
14,626,047 UART: [kat] SHA2-256
14,805,230 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,816,791 UART: [kat] ++
14,817,326 UART: [kat] sha1
14,828,594 UART: [kat] SHA2-256
14,831,597 UART: [kat] SHA2-384
14,839,263 UART: [kat] SHA2-512-ACC
14,842,206 UART: [kat] ECC-384
17,283,302 UART: [kat] HMAC-384Kdf
17,296,855 UART: [kat] LMS
17,826,394 UART: [kat] --
17,828,839 UART: [warm-reset] ++
17,832,388 UART: [warm-reset] --
17,836,246 UART: [state] Locking Datavault
17,839,333 UART: [state] Locking PCR0, PCR1 and PCR31
17,841,030 UART: [state] Locking ICCM
17,843,242 UART: [exit] Launching FMC @ 0x40000130
17,851,698 UART:
17,851,941 UART: Running Caliptra FMC ...
17,853,042 UART:
17,853,206 UART: [state] CFI Enabled
17,854,939 UART: [aliasrt :skip pcr extension
17,856,185 UART: [art] Extend RT PCRs Done
17,857,324 UART: [art] Lock RT PCRs Done
17,858,663 UART: [art] Populate DV Done
17,863,983 UART: [fht] FMC Alias Private Key: 7
17,865,721 UART: [art] Derive CDI
17,866,542 UART: [art] Store in in slot 0x4
17,909,404 UART: [art] Derive Key Pair
17,910,404 UART: [art] Store priv key in slot 0x5
20,337,109 UART: [art] Derive Key Pair - Done
20,349,905 UART: [art] Signing Cert with AUTHO
20,351,232 UART: RITY.KEYID = 7
22,057,294 UART: [art] Erasing AUTHORITY.KEYID = 7
22,058,795 UART: [art] PUB.X = E56F167E458750B98DCC01EEE5D0B66E5E07A4ACEE65CE676994A04BBB9A3764AA4FA06BDC9F17A6AD81D7997F8F6848
22,066,102 UART: [art] PUB.Y = DFD8104D9BF5C1A4A5911AA7B7E32195E0D050A439B384986D215A410243E27507427E5FF98EE5CF17C05C19A1A033C3
22,073,328 UART: [art] SIG.R = 0D8D76CF69AC134C0CFCDADCCF1B9BE281B88220761DF29CBF203B01C9E1DA831FF19E009518A2C12F43A7478D9929D5
22,080,717 UART: [art] SIG.S = 46462EBBBBE2E3E6AC2D8E1A0CDF271678E1AB59C8DF64FC7AA31C3BA603C33D5939330AAA5D97AE4D080B541B3161A1
23,059,348 UART: Caliptra RT
23,060,037 UART: [state] CFI Enabled
23,343,604 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,705 writing to cptra_bootfsm_go
192,351 UART:
192,722 UART: Running Caliptra ROM ...
193,856 UART:
603,636 UART: [state] CFI Enabled
617,056 UART: [state] LifecycleState = Production
618,857 UART: [state] DebugLocked = Yes
620,713 UART: [state] Starting the WD Timer 40000000 cycles
626,315 UART: [kat] SHA2-256
805,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,016 UART: [kat] ++
817,551 UART: [kat] sha1
830,021 UART: [kat] SHA2-256
833,030 UART: [kat] SHA2-384
837,531 UART: [kat] SHA2-512-ACC
840,466 UART: [kat] ECC-384
3,281,920 UART: [kat] HMAC-384Kdf
3,294,599 UART: [kat] LMS
3,824,126 UART: [kat] --
3,827,416 UART: [cold-reset] ++
3,829,489 UART: [fht] FHT @ 0x50003400
3,840,911 UART: [idev] ++
3,841,490 UART: [idev] CDI.KEYID = 6
3,842,413 UART: [idev] SUBJECT.KEYID = 7
3,843,596 UART: [idev] UDS.KEYID = 0
3,844,645 ready_for_fw is high
3,844,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,310 UART: [idev] Erasing UDS.KEYID = 0
6,313,444 UART: [idev] Sha1 KeyId Algorithm
6,337,410 UART: [idev] --
6,341,351 UART: [ldev] ++
6,341,920 UART: [ldev] CDI.KEYID = 6
6,342,831 UART: [ldev] SUBJECT.KEYID = 5
6,343,989 UART: [ldev] AUTHORITY.KEYID = 7
6,345,276 UART: [ldev] FE.KEYID = 1
6,354,141 UART: [ldev] Erasing FE.KEYID = 1
8,823,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,352 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,559,384 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,575,200 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,591,142 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,609,919 UART: [ldev] --
10,614,324 UART: [fwproc] Wait for Commands...
10,616,671 UART: [fwproc] Recv command 0x46574c44
10,618,722 UART: [fwproc] Recv'd Img size: 114168 bytes
14,047,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,120,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,189,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,506,817 >>> mbox cmd response: success
14,511,077 UART: [afmc] ++
14,511,693 UART: [afmc] CDI.KEYID = 6
14,512,606 UART: [afmc] SUBJECT.KEYID = 7
14,513,714 UART: [afmc] AUTHORITY.KEYID = 5
17,016,329 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,737,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,739,251 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,755,230 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,771,099 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,786,831 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,810,860 UART: [afmc] --
18,814,440 UART: [cold-reset] --
18,819,062 UART: [state] Locking Datavault
18,824,153 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,799 UART: [state] Locking ICCM
18,827,954 UART: [exit] Launching FMC @ 0x40000130
18,836,361 UART:
18,836,599 UART: Running Caliptra FMC ...
18,837,704 UART:
18,837,864 UART: [state] CFI Enabled
18,846,474 UART: [fht] FMC Alias Private Key: 7
20,603,200 UART: [art] Extend RT PCRs Done
20,604,425 UART: [art] Lock RT PCRs Done
20,605,833 UART: [art] Populate DV Done
20,610,982 UART: [fht] FMC Alias Private Key: 7
20,612,419 UART: [art] Derive CDI
20,613,352 UART: [art] Store in in slot 0x4
20,655,748 UART: [art] Derive Key Pair
20,656,754 UART: [art] Store priv key in slot 0x5
23,083,858 UART: [art] Derive Key Pair - Done
23,096,748 UART: [art] Signing Cert with AUTHO
23,098,080 UART: RITY.KEYID = 7
24,803,687 UART: [art] Erasing AUTHORITY.KEYID = 7
24,805,194 UART: [art] PUB.X = BEEE9783648299BD36BE3C6F433BDB216749932B177920C9412CF3E9FE5224DD8AE8483DDA6F18F442E67B096721CF94
24,812,431 UART: [art] PUB.Y = 84C01E4DF0A8AC7C71D8C11AB33F42E4A9E817F2E691639B3D6BFEECDD833F46024280B9FB644A7850814F98C7CC81FD
24,819,706 UART: [art] SIG.R = AAE557E7CA423CA36CEF2DF9BC7B7DD96187390850BF22DE7A1C2AA97FAA54CA2450BB1E8DC662AD541189F816B14321
24,827,117 UART: [art] SIG.S = 4BF0E147DF86F0CBC404EF4F89F828D682CD7D4BB3FCF80D887628E02BC52B109AA664315BFACC42AAEF7D8B9110CCA4
25,805,882 UART: Caliptra RT
25,806,594 UART: [state] CFI Enabled
25,924,220 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,006 UART:
1,277 UART: Running Caliptra ROM ...
2,381 UART:
14,601,552 UART: [state] CFI Enabled
14,617,265 UART: [state] LifecycleState = Production
14,618,991 UART: [state] DebugLocked = Yes
14,621,613 UART: [state] Starting the WD Timer 40000000 cycles
14,626,348 UART: [kat] SHA2-256
14,805,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,817,073 UART: [kat] ++
14,817,618 UART: [kat] sha1
14,829,449 UART: [kat] SHA2-256
14,832,461 UART: [kat] SHA2-384
14,838,607 UART: [kat] SHA2-512-ACC
14,841,553 UART: [kat] ECC-384
17,281,288 UART: [kat] HMAC-384Kdf
17,292,701 UART: [kat] LMS
17,822,243 UART: [kat] --
17,826,825 UART: [warm-reset] ++
17,831,020 UART: [warm-reset] --
17,835,858 UART: [state] Locking Datavault
17,837,931 UART: [state] Locking PCR0, PCR1 and PCR31
17,839,631 UART: [state] Locking ICCM
17,842,302 UART: [exit] Launching FMC @ 0x40000130
17,850,700 UART:
17,850,934 UART: Running Caliptra FMC ...
17,851,974 UART:
17,852,143 UART: [state] CFI Enabled
17,854,045 UART: [aliasrt :skip pcr extension
17,855,289 UART: [art] Extend RT PCRs Done
17,856,354 UART: [art] Lock RT PCRs Done
17,857,798 UART: [art] Populate DV Done
17,863,046 UART: [fht] FMC Alias Private Key: 7
17,864,687 UART: [art] Derive CDI
17,865,425 UART: [art] Store in in slot 0x4
17,908,180 UART: [art] Derive Key Pair
17,909,218 UART: [art] Store priv key in slot 0x5
20,335,862 UART: [art] Derive Key Pair - Done
20,348,863 UART: [art] Signing Cert with AUTHO
20,350,165 UART: RITY.KEYID = 7
22,055,601 UART: [art] Erasing AUTHORITY.KEYID = 7
22,057,100 UART: [art] PUB.X = BEEE9783648299BD36BE3C6F433BDB216749932B177920C9412CF3E9FE5224DD8AE8483DDA6F18F442E67B096721CF94
22,064,348 UART: [art] PUB.Y = 84C01E4DF0A8AC7C71D8C11AB33F42E4A9E817F2E691639B3D6BFEECDD833F46024280B9FB644A7850814F98C7CC81FD
22,071,610 UART: [art] SIG.R = AAE557E7CA423CA36CEF2DF9BC7B7DD96187390850BF22DE7A1C2AA97FAA54CA2450BB1E8DC662AD541189F816B14321
22,079,078 UART: [art] SIG.S = 4BF0E147DF86F0CBC404EF4F89F828D682CD7D4BB3FCF80D887628E02BC52B109AA664315BFACC42AAEF7D8B9110CCA4
23,057,812 UART: Caliptra RT
23,058,517 UART: [state] CFI Enabled
23,347,461 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Production
86,287 UART: [state] DebugLocked = Yes
86,801 UART: [state] Starting the WD Timer 40000000 cycles
88,388 UART: [kat] SHA2-256
891,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,067 UART: [kat] ++
896,219 UART: [kat] sha1
900,461 UART: [kat] SHA2-256
902,401 UART: [kat] SHA2-384
905,132 UART: [kat] SHA2-512-ACC
907,033 UART: [kat] ECC-384
916,900 UART: [kat] HMAC-384Kdf
921,420 UART: [kat] LMS
1,169,732 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,170,948 UART: [fht] FHT @ 0x50003400
1,173,536 UART: [idev] ++
1,173,704 UART: [idev] CDI.KEYID = 6
1,174,065 UART: [idev] SUBJECT.KEYID = 7
1,174,490 UART: [idev] UDS.KEYID = 0
1,174,836 ready_for_fw is high
1,174,836 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,509 UART: [idev] Erasing UDS.KEYID = 0
1,199,308 UART: [idev] Sha1 KeyId Algorithm
1,208,229 UART: [idev] --
1,209,522 UART: [ldev] ++
1,209,690 UART: [ldev] CDI.KEYID = 6
1,210,054 UART: [ldev] SUBJECT.KEYID = 5
1,210,481 UART: [ldev] AUTHORITY.KEYID = 7
1,210,944 UART: [ldev] FE.KEYID = 1
1,215,848 UART: [ldev] Erasing FE.KEYID = 1
1,242,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,787 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,481 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,351 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,057 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,093 UART: [ldev] --
1,281,361 UART: [fwproc] Wait for Commands...
1,282,100 UART: [fwproc] Recv command 0x46574c44
1,282,833 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,671 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,292 >>> mbox cmd response: success
2,797,448 UART: [afmc] ++
2,797,616 UART: [afmc] CDI.KEYID = 6
2,797,979 UART: [afmc] SUBJECT.KEYID = 7
2,798,405 UART: [afmc] AUTHORITY.KEYID = 5
2,833,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,478 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,229 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,948 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,841 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,548 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,423 UART: [afmc] --
2,877,326 UART: [cold-reset] --
2,878,258 UART: [state] Locking Datavault
2,879,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,191 UART: [state] Locking ICCM
2,880,653 UART: [exit] Launching FMC @ 0x40000130
2,885,982 UART:
2,885,998 UART: Running Caliptra FMC ...
2,886,406 UART:
2,886,460 UART: [state] CFI Enabled
2,896,567 UART: [fht] FMC Alias Private Key: 7
3,004,164 UART: [art] Extend RT PCRs Done
3,004,592 UART: [art] Lock RT PCRs Done
3,005,838 UART: [art] Populate DV Done
3,014,008 UART: [fht] FMC Alias Private Key: 7
3,015,122 UART: [art] Derive CDI
3,015,402 UART: [art] Store in in slot 0x4
3,101,093 UART: [art] Derive Key Pair
3,101,453 UART: [art] Store priv key in slot 0x5
3,115,085 UART: [art] Derive Key Pair - Done
3,129,666 UART: [art] Signing Cert with AUTHO
3,130,146 UART: RITY.KEYID = 7
3,145,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,939 UART: [art] PUB.X = 90417A2FDC582120CB6CE1E66CF9067B7820690DDB3524039F4C0E0C8D64CBF834D20959BD4046140DC5F32673811B17
3,152,686 UART: [art] PUB.Y = 5ABBA3614945D6573AE3949C82354B25F31EB2A82C07A1794D958BDDEFCA253EF31F2CFB4146C37072D99055B45C1E26
3,159,639 UART: [art] SIG.R = 47D4ED0B2656A738EC3ED148AC27B3A4E4563FD6C0C90AAD62FA072EA2CED78A887922C2BA793D3573B2F7A8AF50AED5
3,166,420 UART: [art] SIG.S = E58943BEA5E7A52591B951E915D5DA56CE9B4BEE62D91450F8FA78751CFF4BEB883870599C618F93EAC3CF8F98CE3DC9
3,189,895 UART: Caliptra RT
3,190,148 UART: [state] CFI Enabled
3,298,353 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,109 UART:
3,299,125 UART: Running Caliptra ROM ...
3,299,533 UART:
3,299,588 UART: [state] CFI Enabled
3,302,225 UART: [state] LifecycleState = Production
3,302,833 UART: [state] DebugLocked = Yes
3,303,365 UART: [state] Starting the WD Timer 40000000 cycles
3,305,046 UART: [kat] SHA2-256
4,108,596 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,725 UART: [kat] ++
4,112,877 UART: [kat] sha1
4,117,023 UART: [kat] SHA2-256
4,118,963 UART: [kat] SHA2-384
4,121,468 UART: [kat] SHA2-512-ACC
4,123,369 UART: [kat] ECC-384
4,133,066 UART: [kat] HMAC-384Kdf
4,137,626 UART: [kat] LMS
4,385,938 UART: [kat] --
4,386,928 UART: [warm-reset] ++
4,387,665 UART: [warm-reset] --
4,388,604 UART: [state] Locking Datavault
4,389,572 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,176 UART: [state] Locking ICCM
4,390,816 UART: [exit] Launching FMC @ 0x40000130
4,396,145 UART:
4,396,161 UART: Running Caliptra FMC ...
4,396,569 UART:
4,396,623 UART: [state] CFI Enabled
4,397,686 UART: [aliasrt :skip pcr extension
4,398,159 UART: [art] Extend RT PCRs Done
4,398,587 UART: [art] Lock RT PCRs Done
4,399,854 UART: [art] Populate DV Done
4,408,224 UART: [fht] FMC Alias Private Key: 7
4,409,382 UART: [art] Derive CDI
4,409,662 UART: [art] Store in in slot 0x4
4,495,611 UART: [art] Derive Key Pair
4,495,971 UART: [art] Store priv key in slot 0x5
4,509,613 UART: [art] Derive Key Pair - Done
4,524,220 UART: [art] Signing Cert with AUTHO
4,524,700 UART: RITY.KEYID = 7
4,539,748 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,513 UART: [art] PUB.X = 90417A2FDC582120CB6CE1E66CF9067B7820690DDB3524039F4C0E0C8D64CBF834D20959BD4046140DC5F32673811B17
4,547,260 UART: [art] PUB.Y = 5ABBA3614945D6573AE3949C82354B25F31EB2A82C07A1794D958BDDEFCA253EF31F2CFB4146C37072D99055B45C1E26
4,554,213 UART: [art] SIG.R = 47D4ED0B2656A738EC3ED148AC27B3A4E4563FD6C0C90AAD62FA072EA2CED78A887922C2BA793D3573B2F7A8AF50AED5
4,560,994 UART: [art] SIG.S = E58943BEA5E7A52591B951E915D5DA56CE9B4BEE62D91450F8FA78751CFF4BEB883870599C618F93EAC3CF8F98CE3DC9
4,585,087 UART: Caliptra RT
4,585,340 UART: [state] CFI Enabled
4,866,167 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Production
85,985 UART: [state] DebugLocked = Yes
86,575 UART: [state] Starting the WD Timer 40000000 cycles
88,266 UART: [kat] SHA2-256
891,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,945 UART: [kat] ++
896,097 UART: [kat] sha1
900,305 UART: [kat] SHA2-256
902,245 UART: [kat] SHA2-384
904,852 UART: [kat] SHA2-512-ACC
906,753 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,598 UART: [fht] FHT @ 0x50003400
1,173,226 UART: [idev] ++
1,173,394 UART: [idev] CDI.KEYID = 6
1,173,755 UART: [idev] SUBJECT.KEYID = 7
1,174,180 UART: [idev] UDS.KEYID = 0
1,174,526 ready_for_fw is high
1,174,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,867 UART: [idev] Erasing UDS.KEYID = 0
1,199,076 UART: [idev] Sha1 KeyId Algorithm
1,207,925 UART: [idev] --
1,208,930 UART: [ldev] ++
1,209,098 UART: [ldev] CDI.KEYID = 6
1,209,462 UART: [ldev] SUBJECT.KEYID = 5
1,209,889 UART: [ldev] AUTHORITY.KEYID = 7
1,210,352 UART: [ldev] FE.KEYID = 1
1,215,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,653 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,347 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,217 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,923 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,999 UART: [ldev] --
1,281,493 UART: [fwproc] Wait for Commands...
1,282,092 UART: [fwproc] Recv command 0x46574c44
1,282,825 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,486 >>> mbox cmd response: success
2,796,640 UART: [afmc] ++
2,796,808 UART: [afmc] CDI.KEYID = 6
2,797,171 UART: [afmc] SUBJECT.KEYID = 7
2,797,597 UART: [afmc] AUTHORITY.KEYID = 5
2,832,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,933 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,855,652 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,545 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,252 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,189 UART: [afmc] --
2,876,258 UART: [cold-reset] --
2,877,164 UART: [state] Locking Datavault
2,878,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,878,969 UART: [state] Locking ICCM
2,879,607 UART: [exit] Launching FMC @ 0x40000130
2,884,936 UART:
2,884,952 UART: Running Caliptra FMC ...
2,885,360 UART:
2,885,414 UART: [state] CFI Enabled
2,895,879 UART: [fht] FMC Alias Private Key: 7
3,003,878 UART: [art] Extend RT PCRs Done
3,004,306 UART: [art] Lock RT PCRs Done
3,005,960 UART: [art] Populate DV Done
3,014,328 UART: [fht] FMC Alias Private Key: 7
3,015,290 UART: [art] Derive CDI
3,015,570 UART: [art] Store in in slot 0x4
3,101,335 UART: [art] Derive Key Pair
3,101,695 UART: [art] Store priv key in slot 0x5
3,114,621 UART: [art] Derive Key Pair - Done
3,129,581 UART: [art] Signing Cert with AUTHO
3,130,061 UART: RITY.KEYID = 7
3,145,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,856 UART: [art] PUB.X = 44B21690C652F541F039847466BFA0E5FFB04986D6AD321C3D9CF1DA419B81BA1FE1B944C83BB891357AE1A548C33CCF
3,152,636 UART: [art] PUB.Y = 594F8468D31E889BB985E75B22EA533F952423B3219716E0A3DD0E64D2C2155DC43B07977C71EB67A40A0434DF470EF5
3,159,569 UART: [art] SIG.R = D1550ED94C355BFB3064A074AF09C5CC52D9436CE33C5A029C8781FD4B269B13CA684E99D4307C5E385163A90608231F
3,166,324 UART: [art] SIG.S = 6F5D4C163430D360D43DFC4575D5DD70BE8D6218CC8EE8CF8FC09CD83E7906E3B9E715911F2990E9AF8A79DA50281156
3,190,346 UART: Caliptra RT
3,190,599 UART: [state] CFI Enabled
3,298,278 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,034 UART:
3,299,050 UART: Running Caliptra ROM ...
3,299,458 UART:
3,299,513 UART: [state] CFI Enabled
3,302,066 UART: [state] LifecycleState = Production
3,302,674 UART: [state] DebugLocked = Yes
3,303,236 UART: [state] Starting the WD Timer 40000000 cycles
3,304,785 UART: [kat] SHA2-256
4,108,335 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,464 UART: [kat] ++
4,112,616 UART: [kat] sha1
4,116,818 UART: [kat] SHA2-256
4,118,758 UART: [kat] SHA2-384
4,121,451 UART: [kat] SHA2-512-ACC
4,123,352 UART: [kat] ECC-384
4,133,073 UART: [kat] HMAC-384Kdf
4,137,833 UART: [kat] LMS
4,386,145 UART: [kat] --
4,386,911 UART: [warm-reset] ++
4,387,582 UART: [warm-reset] --
4,388,487 UART: [state] Locking Datavault
4,389,267 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,871 UART: [state] Locking ICCM
4,390,471 UART: [exit] Launching FMC @ 0x40000130
4,395,800 UART:
4,395,816 UART: Running Caliptra FMC ...
4,396,224 UART:
4,396,278 UART: [state] CFI Enabled
4,397,399 UART: [aliasrt :skip pcr extension
4,397,872 UART: [art] Extend RT PCRs Done
4,398,300 UART: [art] Lock RT PCRs Done
4,399,611 UART: [art] Populate DV Done
4,407,961 UART: [fht] FMC Alias Private Key: 7
4,409,043 UART: [art] Derive CDI
4,409,323 UART: [art] Store in in slot 0x4
4,494,688 UART: [art] Derive Key Pair
4,495,048 UART: [art] Store priv key in slot 0x5
4,507,858 UART: [art] Derive Key Pair - Done
4,522,640 UART: [art] Signing Cert with AUTHO
4,523,120 UART: RITY.KEYID = 7
4,538,438 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,203 UART: [art] PUB.X = 44B21690C652F541F039847466BFA0E5FFB04986D6AD321C3D9CF1DA419B81BA1FE1B944C83BB891357AE1A548C33CCF
4,545,983 UART: [art] PUB.Y = 594F8468D31E889BB985E75B22EA533F952423B3219716E0A3DD0E64D2C2155DC43B07977C71EB67A40A0434DF470EF5
4,552,916 UART: [art] SIG.R = D1550ED94C355BFB3064A074AF09C5CC52D9436CE33C5A029C8781FD4B269B13CA684E99D4307C5E385163A90608231F
4,559,671 UART: [art] SIG.S = 6F5D4C163430D360D43DFC4575D5DD70BE8D6218CC8EE8CF8FC09CD83E7906E3B9E715911F2990E9AF8A79DA50281156
4,582,761 UART: Caliptra RT
4,583,014 UART: [state] CFI Enabled
4,865,953 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Production
86,046 UART: [state] DebugLocked = Yes
86,568 UART: [state] Starting the WD Timer 40000000 cycles
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,415 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,149 UART: [fht] FHT @ 0x50003400
1,173,785 UART: [idev] ++
1,173,953 UART: [idev] CDI.KEYID = 6
1,174,314 UART: [idev] SUBJECT.KEYID = 7
1,174,739 UART: [idev] UDS.KEYID = 0
1,175,085 ready_for_fw is high
1,175,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,973 UART: [idev] Sha1 KeyId Algorithm
1,208,910 UART: [idev] --
1,209,977 UART: [ldev] ++
1,210,145 UART: [ldev] CDI.KEYID = 6
1,210,509 UART: [ldev] SUBJECT.KEYID = 5
1,210,936 UART: [ldev] AUTHORITY.KEYID = 7
1,211,399 UART: [ldev] FE.KEYID = 1
1,216,845 UART: [ldev] Erasing FE.KEYID = 1
1,243,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,910 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,604 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,474 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,180 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,246 UART: [ldev] --
1,282,646 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,060 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,518 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,743 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,509 >>> mbox cmd response: success
2,796,729 UART: [afmc] ++
2,796,897 UART: [afmc] CDI.KEYID = 6
2,797,260 UART: [afmc] SUBJECT.KEYID = 7
2,797,686 UART: [afmc] AUTHORITY.KEYID = 5
2,833,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,476 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,195 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,088 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,795 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,480 UART: [afmc] --
2,876,409 UART: [cold-reset] --
2,877,331 UART: [state] Locking Datavault
2,878,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,038 UART: [state] Locking ICCM
2,879,616 UART: [exit] Launching FMC @ 0x40000130
2,884,945 UART:
2,884,961 UART: Running Caliptra FMC ...
2,885,369 UART:
2,885,512 UART: [state] CFI Enabled
2,895,973 UART: [fht] FMC Alias Private Key: 7
3,004,358 UART: [art] Extend RT PCRs Done
3,004,786 UART: [art] Lock RT PCRs Done
3,006,652 UART: [art] Populate DV Done
3,015,084 UART: [fht] FMC Alias Private Key: 7
3,016,212 UART: [art] Derive CDI
3,016,492 UART: [art] Store in in slot 0x4
3,102,013 UART: [art] Derive Key Pair
3,102,373 UART: [art] Store priv key in slot 0x5
3,115,329 UART: [art] Derive Key Pair - Done
3,130,159 UART: [art] Signing Cert with AUTHO
3,130,639 UART: RITY.KEYID = 7
3,145,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,502 UART: [art] PUB.X = E5AC1D20AA74311E73EAB4F954430E8248214E9F5611F51D5AA4248B52171FDC6C6C36C145134967C4208E99AA794DA1
3,153,269 UART: [art] PUB.Y = 4371F0DBB10A35F0278024A4F11DFC28BE40D80C0381D690F3D789952F57531C5E22F584F09561C21ED754257280B62B
3,160,204 UART: [art] SIG.R = 9173CFFCB099B691FACF558E8FBFFABAB3F9CD03886828F567197F45E7AAED4AD0A74614AAC5DAB275C75C614D6F8EF5
3,166,997 UART: [art] SIG.S = 14F15DB4578B3A33200C04180D28A290652C0A990DB3D1E2C273BB9597BD159B4F3599D8CE954D5A0F99F7E130625F2F
3,191,230 UART: Caliptra RT
3,191,575 UART: [state] CFI Enabled
3,300,274 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,030 UART:
3,301,046 UART: Running Caliptra ROM ...
3,301,454 UART:
3,301,596 UART: [state] CFI Enabled
3,304,343 UART: [state] LifecycleState = Production
3,304,951 UART: [state] DebugLocked = Yes
3,305,563 UART: [state] Starting the WD Timer 40000000 cycles
3,307,098 UART: [kat] SHA2-256
4,110,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,114,777 UART: [kat] ++
4,114,929 UART: [kat] sha1
4,119,053 UART: [kat] SHA2-256
4,120,993 UART: [kat] SHA2-384
4,123,748 UART: [kat] SHA2-512-ACC
4,125,649 UART: [kat] ECC-384
4,135,204 UART: [kat] HMAC-384Kdf
4,139,980 UART: [kat] LMS
4,388,292 UART: [kat] --
4,389,276 UART: [warm-reset] ++
4,390,081 UART: [warm-reset] --
4,390,876 UART: [state] Locking Datavault
4,391,652 UART: [state] Locking PCR0, PCR1 and PCR31
4,392,256 UART: [state] Locking ICCM
4,392,764 UART: [exit] Launching FMC @ 0x40000130
4,398,093 UART:
4,398,109 UART: Running Caliptra FMC ...
4,398,517 UART:
4,398,660 UART: [state] CFI Enabled
4,400,037 UART: [aliasrt :skip pcr extension
4,400,510 UART: [art] Extend RT PCRs Done
4,400,938 UART: [art] Lock RT PCRs Done
4,402,107 UART: [art] Populate DV Done
4,410,425 UART: [fht] FMC Alias Private Key: 7
4,411,571 UART: [art] Derive CDI
4,411,851 UART: [art] Store in in slot 0x4
4,497,430 UART: [art] Derive Key Pair
4,497,790 UART: [art] Store priv key in slot 0x5
4,511,540 UART: [art] Derive Key Pair - Done
4,526,434 UART: [art] Signing Cert with AUTHO
4,526,914 UART: RITY.KEYID = 7
4,541,530 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,295 UART: [art] PUB.X = E5AC1D20AA74311E73EAB4F954430E8248214E9F5611F51D5AA4248B52171FDC6C6C36C145134967C4208E99AA794DA1
4,549,062 UART: [art] PUB.Y = 4371F0DBB10A35F0278024A4F11DFC28BE40D80C0381D690F3D789952F57531C5E22F584F09561C21ED754257280B62B
4,555,997 UART: [art] SIG.R = 9173CFFCB099B691FACF558E8FBFFABAB3F9CD03886828F567197F45E7AAED4AD0A74614AAC5DAB275C75C614D6F8EF5
4,562,790 UART: [art] SIG.S = 14F15DB4578B3A33200C04180D28A290652C0A990DB3D1E2C273BB9597BD159B4F3599D8CE954D5A0F99F7E130625F2F
4,586,647 UART: Caliptra RT
4,586,992 UART: [state] CFI Enabled
4,866,291 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,656 UART: [state] LifecycleState = Production
86,264 UART: [state] DebugLocked = Yes
86,888 UART: [state] Starting the WD Timer 40000000 cycles
88,597 UART: [kat] SHA2-256
892,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,276 UART: [kat] ++
896,428 UART: [kat] sha1
900,576 UART: [kat] SHA2-256
902,516 UART: [kat] SHA2-384
905,125 UART: [kat] SHA2-512-ACC
907,026 UART: [kat] ECC-384
916,631 UART: [kat] HMAC-384Kdf
921,367 UART: [kat] LMS
1,169,679 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,825 UART: [fht] FHT @ 0x50003400
1,173,487 UART: [idev] ++
1,173,655 UART: [idev] CDI.KEYID = 6
1,174,016 UART: [idev] SUBJECT.KEYID = 7
1,174,441 UART: [idev] UDS.KEYID = 0
1,174,787 ready_for_fw is high
1,174,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,577 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,449 UART: [ldev] ++
1,209,617 UART: [ldev] CDI.KEYID = 6
1,209,981 UART: [ldev] SUBJECT.KEYID = 5
1,210,408 UART: [ldev] AUTHORITY.KEYID = 7
1,210,871 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,242,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,662 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,532 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,238 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,404 UART: [ldev] --
1,281,802 UART: [fwproc] Wait for Commands...
1,282,507 UART: [fwproc] Recv command 0x46574c44
1,283,240 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,229 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,538 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,053 >>> mbox cmd response: success
2,797,299 UART: [afmc] ++
2,797,467 UART: [afmc] CDI.KEYID = 6
2,797,830 UART: [afmc] SUBJECT.KEYID = 7
2,798,256 UART: [afmc] AUTHORITY.KEYID = 5
2,834,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,634 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,353 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,246 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,953 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,838 UART: [afmc] --
2,877,725 UART: [cold-reset] --
2,878,639 UART: [state] Locking Datavault
2,879,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,306 UART: [state] Locking ICCM
2,880,788 UART: [exit] Launching FMC @ 0x40000130
2,886,117 UART:
2,886,133 UART: Running Caliptra FMC ...
2,886,541 UART:
2,886,684 UART: [state] CFI Enabled
2,897,161 UART: [fht] FMC Alias Private Key: 7
3,005,350 UART: [art] Extend RT PCRs Done
3,005,778 UART: [art] Lock RT PCRs Done
3,007,246 UART: [art] Populate DV Done
3,015,408 UART: [fht] FMC Alias Private Key: 7
3,016,418 UART: [art] Derive CDI
3,016,698 UART: [art] Store in in slot 0x4
3,102,473 UART: [art] Derive Key Pair
3,102,833 UART: [art] Store priv key in slot 0x5
3,116,377 UART: [art] Derive Key Pair - Done
3,131,112 UART: [art] Signing Cert with AUTHO
3,131,592 UART: RITY.KEYID = 7
3,147,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,148,027 UART: [art] PUB.X = 6D5571E9E8161FC8BD64E2ED1CB0EE4FC9E5819E4C257A43F88B9B484B752A2C9836F96DEF77AE11C394166DA2BA6073
3,154,809 UART: [art] PUB.Y = BB6DAF1E8BC1DC81275DF9A01B962F922FE81082C3DAE725CEB0698BD615CCBAEAEB1A0A86098950338D023333B606B7
3,161,763 UART: [art] SIG.R = 7A8FBF8348A453C1EC8A01EF04A5C181DB926FDBF6FFB838217F1C1C57F0CC9CDC109B890C9866C72E9D7BA43125EC66
3,168,542 UART: [art] SIG.S = 449637AC6D273F365D3109A2341AD85F33012238E3134178592F87C11A37CFB0B92A728EDF7FAC67B9E5D2DE59307824
3,192,415 UART: Caliptra RT
3,192,760 UART: [state] CFI Enabled
3,300,762 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,518 UART:
3,301,534 UART: Running Caliptra ROM ...
3,301,942 UART:
3,302,084 UART: [state] CFI Enabled
3,305,119 UART: [state] LifecycleState = Production
3,305,727 UART: [state] DebugLocked = Yes
3,306,399 UART: [state] Starting the WD Timer 40000000 cycles
3,307,982 UART: [kat] SHA2-256
4,111,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,661 UART: [kat] ++
4,115,813 UART: [kat] sha1
4,119,875 UART: [kat] SHA2-256
4,121,815 UART: [kat] SHA2-384
4,124,530 UART: [kat] SHA2-512-ACC
4,126,431 UART: [kat] ECC-384
4,136,450 UART: [kat] HMAC-384Kdf
4,141,072 UART: [kat] LMS
4,389,384 UART: [kat] --
4,390,392 UART: [warm-reset] ++
4,391,343 UART: [warm-reset] --
4,392,014 UART: [state] Locking Datavault
4,392,852 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,456 UART: [state] Locking ICCM
4,393,984 UART: [exit] Launching FMC @ 0x40000130
4,399,313 UART:
4,399,329 UART: Running Caliptra FMC ...
4,399,737 UART:
4,399,880 UART: [state] CFI Enabled
4,401,303 UART: [aliasrt :skip pcr extension
4,401,776 UART: [art] Extend RT PCRs Done
4,402,204 UART: [art] Lock RT PCRs Done
4,403,361 UART: [art] Populate DV Done
4,411,343 UART: [fht] FMC Alias Private Key: 7
4,412,381 UART: [art] Derive CDI
4,412,661 UART: [art] Store in in slot 0x4
4,498,504 UART: [art] Derive Key Pair
4,498,864 UART: [art] Store priv key in slot 0x5
4,511,918 UART: [art] Derive Key Pair - Done
4,526,587 UART: [art] Signing Cert with AUTHO
4,527,067 UART: RITY.KEYID = 7
4,542,231 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,996 UART: [art] PUB.X = 6D5571E9E8161FC8BD64E2ED1CB0EE4FC9E5819E4C257A43F88B9B484B752A2C9836F96DEF77AE11C394166DA2BA6073
4,549,778 UART: [art] PUB.Y = BB6DAF1E8BC1DC81275DF9A01B962F922FE81082C3DAE725CEB0698BD615CCBAEAEB1A0A86098950338D023333B606B7
4,556,732 UART: [art] SIG.R = 7A8FBF8348A453C1EC8A01EF04A5C181DB926FDBF6FFB838217F1C1C57F0CC9CDC109B890C9866C72E9D7BA43125EC66
4,563,511 UART: [art] SIG.S = 449637AC6D273F365D3109A2341AD85F33012238E3134178592F87C11A37CFB0B92A728EDF7FAC67B9E5D2DE59307824
4,587,698 UART: Caliptra RT
4,588,043 UART: [state] CFI Enabled
4,869,495 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Production
85,917 UART: [state] DebugLocked = Yes
86,547 UART: [state] Starting the WD Timer 40000000 cycles
88,164 UART: [kat] SHA2-256
891,714 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,843 UART: [kat] ++
895,995 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,880 UART: [kat] SHA2-512-ACC
906,781 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,104 UART: [kat] LMS
1,169,416 UART: [kat] --
1,170,393 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,456 UART: [idev] ++
1,173,624 UART: [idev] CDI.KEYID = 6
1,173,985 UART: [idev] SUBJECT.KEYID = 7
1,174,410 UART: [idev] UDS.KEYID = 0
1,174,756 ready_for_fw is high
1,174,756 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,127 UART: [idev] Erasing UDS.KEYID = 0
1,199,404 UART: [idev] Sha1 KeyId Algorithm
1,208,283 UART: [idev] --
1,209,302 UART: [ldev] ++
1,209,470 UART: [ldev] CDI.KEYID = 6
1,209,834 UART: [ldev] SUBJECT.KEYID = 5
1,210,261 UART: [ldev] AUTHORITY.KEYID = 7
1,210,724 UART: [ldev] FE.KEYID = 1
1,215,874 UART: [ldev] Erasing FE.KEYID = 1
1,241,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,845 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,715 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,421 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,599 UART: [ldev] --
1,281,105 UART: [fwproc] Wait for Commands...
1,281,686 UART: [fwproc] Recv command 0x46574c44
1,282,419 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,794,844 >>> mbox cmd response: success
2,795,980 UART: [afmc] ++
2,796,148 UART: [afmc] CDI.KEYID = 6
2,796,511 UART: [afmc] SUBJECT.KEYID = 7
2,796,937 UART: [afmc] AUTHORITY.KEYID = 5
2,832,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,546 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,297 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,016 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,861,909 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,616 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,491 UART: [afmc] --
2,876,444 UART: [cold-reset] --
2,877,314 UART: [state] Locking Datavault
2,878,641 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,245 UART: [state] Locking ICCM
2,879,723 UART: [exit] Launching FMC @ 0x40000130
2,885,052 UART:
2,885,068 UART: Running Caliptra FMC ...
2,885,476 UART:
2,885,530 UART: [state] CFI Enabled
2,896,377 UART: [fht] FMC Alias Private Key: 7
3,003,836 UART: [art] Extend RT PCRs Done
3,004,264 UART: [art] Lock RT PCRs Done
3,005,500 UART: [art] Populate DV Done
3,013,678 UART: [fht] FMC Alias Private Key: 7
3,014,766 UART: [art] Derive CDI
3,015,046 UART: [art] Store in in slot 0x4
3,100,615 UART: [art] Derive Key Pair
3,100,975 UART: [art] Store priv key in slot 0x5
3,114,345 UART: [art] Derive Key Pair - Done
3,128,996 UART: [art] Signing Cert with AUTHO
3,129,476 UART: RITY.KEYID = 7
3,144,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,041 UART: [art] PUB.X = F8DCCC19202131750B6FCB44AF2B0CF8CC61D7415E7372EA4D2DF5A87CED41057D70D03AF966DF86E741EE82DFB45409
3,151,815 UART: [art] PUB.Y = 11445CE31A3444FDD9FE082BD50CFA50B5496BF6A2E2B00E6F3ACA16AA2A99C51B09E2E95821A6E65EA1F54B245637FC
3,158,769 UART: [art] SIG.R = 57EFCF3C9FC6A9C46AA93A3F6D209580F5F353684BB30B31B811B4B3749929D0FE5816343205573661554AE12869AAC3
3,165,531 UART: [art] SIG.S = 85762BA7FDCC8634411F000A5437DC3D3036F9E795B0A36F7B50DBEC7C39CBEEABBEC55A2DD53A38BC33043B84F47E0B
3,188,647 UART: Caliptra RT
3,188,900 UART: [state] CFI Enabled
3,296,747 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,297,503 UART:
3,297,519 UART: Running Caliptra ROM ...
3,297,927 UART:
3,297,982 UART: [state] CFI Enabled
3,300,449 UART: [state] LifecycleState = Production
3,301,057 UART: [state] DebugLocked = Yes
3,301,701 UART: [state] Starting the WD Timer 40000000 cycles
3,303,378 UART: [kat] SHA2-256
4,106,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,111,057 UART: [kat] ++
4,111,209 UART: [kat] sha1
4,115,463 UART: [kat] SHA2-256
4,117,403 UART: [kat] SHA2-384
4,119,944 UART: [kat] SHA2-512-ACC
4,121,845 UART: [kat] ECC-384
4,131,200 UART: [kat] HMAC-384Kdf
4,135,894 UART: [kat] LMS
4,384,206 UART: [kat] --
4,385,116 UART: [warm-reset] ++
4,386,051 UART: [warm-reset] --
4,386,814 UART: [state] Locking Datavault
4,387,580 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,184 UART: [state] Locking ICCM
4,388,714 UART: [exit] Launching FMC @ 0x40000130
4,394,043 UART:
4,394,059 UART: Running Caliptra FMC ...
4,394,467 UART:
4,394,521 UART: [state] CFI Enabled
4,395,642 UART: [aliasrt :skip pcr extension
4,396,115 UART: [art] Extend RT PCRs Done
4,396,543 UART: [art] Lock RT PCRs Done
4,397,824 UART: [art] Populate DV Done
4,406,206 UART: [fht] FMC Alias Private Key: 7
4,407,300 UART: [art] Derive CDI
4,407,580 UART: [art] Store in in slot 0x4
4,493,347 UART: [art] Derive Key Pair
4,493,707 UART: [art] Store priv key in slot 0x5
4,506,879 UART: [art] Derive Key Pair - Done
4,521,838 UART: [art] Signing Cert with AUTHO
4,522,318 UART: RITY.KEYID = 7
4,537,366 UART: [art] Erasing AUTHORITY.KEYID = 7
4,538,131 UART: [art] PUB.X = F8DCCC19202131750B6FCB44AF2B0CF8CC61D7415E7372EA4D2DF5A87CED41057D70D03AF966DF86E741EE82DFB45409
4,544,905 UART: [art] PUB.Y = 11445CE31A3444FDD9FE082BD50CFA50B5496BF6A2E2B00E6F3ACA16AA2A99C51B09E2E95821A6E65EA1F54B245637FC
4,551,859 UART: [art] SIG.R = 57EFCF3C9FC6A9C46AA93A3F6D209580F5F353684BB30B31B811B4B3749929D0FE5816343205573661554AE12869AAC3
4,558,621 UART: [art] SIG.S = 85762BA7FDCC8634411F000A5437DC3D3036F9E795B0A36F7B50DBEC7C39CBEEABBEC55A2DD53A38BC33043B84F47E0B
4,582,709 UART: Caliptra RT
4,582,962 UART: [state] CFI Enabled
4,866,387 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Production
85,947 UART: [state] DebugLocked = Yes
86,491 UART: [state] Starting the WD Timer 40000000 cycles
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,788 UART: [kat] HMAC-384Kdf
921,320 UART: [kat] LMS
1,169,632 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,508 UART: [idev] ++
1,173,676 UART: [idev] CDI.KEYID = 6
1,174,037 UART: [idev] SUBJECT.KEYID = 7
1,174,462 UART: [idev] UDS.KEYID = 0
1,174,808 ready_for_fw is high
1,174,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,154 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,208,928 UART: [ldev] ++
1,209,096 UART: [ldev] CDI.KEYID = 6
1,209,460 UART: [ldev] SUBJECT.KEYID = 5
1,209,887 UART: [ldev] AUTHORITY.KEYID = 7
1,210,350 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,717 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,411 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,281 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,987 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,925 UART: [ldev] --
1,280,203 UART: [fwproc] Wait for Commands...
1,280,882 UART: [fwproc] Recv command 0x46574c44
1,281,615 UART: [fwproc] Recv'd Img size: 114168 bytes
2,601,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,794,114 >>> mbox cmd response: success
2,795,140 UART: [afmc] ++
2,795,308 UART: [afmc] CDI.KEYID = 6
2,795,671 UART: [afmc] SUBJECT.KEYID = 7
2,796,097 UART: [afmc] AUTHORITY.KEYID = 5
2,831,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,847,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,848,595 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,854,314 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,860,207 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,865,914 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,873,655 UART: [afmc] --
2,874,742 UART: [cold-reset] --
2,875,628 UART: [state] Locking Datavault
2,876,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,877,505 UART: [state] Locking ICCM
2,878,015 UART: [exit] Launching FMC @ 0x40000130
2,883,344 UART:
2,883,360 UART: Running Caliptra FMC ...
2,883,768 UART:
2,883,822 UART: [state] CFI Enabled
2,894,421 UART: [fht] FMC Alias Private Key: 7
3,002,556 UART: [art] Extend RT PCRs Done
3,002,984 UART: [art] Lock RT PCRs Done
3,004,504 UART: [art] Populate DV Done
3,012,900 UART: [fht] FMC Alias Private Key: 7
3,013,870 UART: [art] Derive CDI
3,014,150 UART: [art] Store in in slot 0x4
3,099,627 UART: [art] Derive Key Pair
3,099,987 UART: [art] Store priv key in slot 0x5
3,113,161 UART: [art] Derive Key Pair - Done
3,127,717 UART: [art] Signing Cert with AUTHO
3,128,197 UART: RITY.KEYID = 7
3,143,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,820 UART: [art] PUB.X = 0E72EDE80212E24D5B748207D3FAED7E37D7C86962D6F1FBDAEA12E37C231B1C2FD1E28D591E7C0CEA8FF610632EC6FC
3,150,600 UART: [art] PUB.Y = A3C941C9B6B48D8321E8678DE463DD12275373A9D9191818B5442A4131771008AB6C31DB0ACE74F269F966C91BB65287
3,157,538 UART: [art] SIG.R = CE9125307A47124D986F864B45F13E97F2A4DE0EF18B082583CF25E2FE3E068EA4B15844EB4358B42E955C19111A0167
3,164,294 UART: [art] SIG.S = 92BE17394394DFE6ECBD74FEA44FCC293157B372A0CAF07B2F95E935EFABDCAAAE1332AA1C567E06F1C44D67140C307E
3,188,113 UART: Caliptra RT
3,188,366 UART: [state] CFI Enabled
3,296,079 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,296,835 UART:
3,296,851 UART: Running Caliptra ROM ...
3,297,259 UART:
3,297,314 UART: [state] CFI Enabled
3,299,859 UART: [state] LifecycleState = Production
3,300,467 UART: [state] DebugLocked = Yes
3,301,189 UART: [state] Starting the WD Timer 40000000 cycles
3,302,720 UART: [kat] SHA2-256
4,106,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,110,399 UART: [kat] ++
4,110,551 UART: [kat] sha1
4,114,805 UART: [kat] SHA2-256
4,116,745 UART: [kat] SHA2-384
4,119,566 UART: [kat] SHA2-512-ACC
4,121,467 UART: [kat] ECC-384
4,131,142 UART: [kat] HMAC-384Kdf
4,135,824 UART: [kat] LMS
4,384,136 UART: [kat] --
4,384,928 UART: [warm-reset] ++
4,385,765 UART: [warm-reset] --
4,386,626 UART: [state] Locking Datavault
4,387,418 UART: [state] Locking PCR0, PCR1 and PCR31
4,388,022 UART: [state] Locking ICCM
4,388,662 UART: [exit] Launching FMC @ 0x40000130
4,393,991 UART:
4,394,007 UART: Running Caliptra FMC ...
4,394,415 UART:
4,394,469 UART: [state] CFI Enabled
4,395,734 UART: [aliasrt :skip pcr extension
4,396,207 UART: [art] Extend RT PCRs Done
4,396,635 UART: [art] Lock RT PCRs Done
4,397,800 UART: [art] Populate DV Done
4,406,028 UART: [fht] FMC Alias Private Key: 7
4,407,080 UART: [art] Derive CDI
4,407,360 UART: [art] Store in in slot 0x4
4,493,437 UART: [art] Derive Key Pair
4,493,797 UART: [art] Store priv key in slot 0x5
4,506,779 UART: [art] Derive Key Pair - Done
4,521,437 UART: [art] Signing Cert with AUTHO
4,521,917 UART: RITY.KEYID = 7
4,536,977 UART: [art] Erasing AUTHORITY.KEYID = 7
4,537,742 UART: [art] PUB.X = 0E72EDE80212E24D5B748207D3FAED7E37D7C86962D6F1FBDAEA12E37C231B1C2FD1E28D591E7C0CEA8FF610632EC6FC
4,544,522 UART: [art] PUB.Y = A3C941C9B6B48D8321E8678DE463DD12275373A9D9191818B5442A4131771008AB6C31DB0ACE74F269F966C91BB65287
4,551,460 UART: [art] SIG.R = CE9125307A47124D986F864B45F13E97F2A4DE0EF18B082583CF25E2FE3E068EA4B15844EB4358B42E955C19111A0167
4,558,216 UART: [art] SIG.S = 92BE17394394DFE6ECBD74FEA44FCC293157B372A0CAF07B2F95E935EFABDCAAAE1332AA1C567E06F1C44D67140C307E
4,581,513 UART: Caliptra RT
4,581,766 UART: [state] CFI Enabled
4,862,185 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Production
85,910 UART: [state] DebugLocked = Yes
86,592 UART: [state] Starting the WD Timer 40000000 cycles
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,372 UART: [kat] SHA2-256
902,312 UART: [kat] SHA2-384
904,931 UART: [kat] SHA2-512-ACC
906,832 UART: [kat] ECC-384
916,563 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,253 UART: [idev] ++
1,173,421 UART: [idev] CDI.KEYID = 6
1,173,782 UART: [idev] SUBJECT.KEYID = 7
1,174,207 UART: [idev] UDS.KEYID = 0
1,174,553 ready_for_fw is high
1,174,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,083 UART: [idev] Sha1 KeyId Algorithm
1,207,862 UART: [idev] --
1,209,021 UART: [ldev] ++
1,209,189 UART: [ldev] CDI.KEYID = 6
1,209,553 UART: [ldev] SUBJECT.KEYID = 5
1,209,980 UART: [ldev] AUTHORITY.KEYID = 7
1,210,443 UART: [ldev] FE.KEYID = 1
1,215,875 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,970 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,840 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,546 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,424 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,557 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,207 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,047 >>> mbox cmd response: success
2,797,113 UART: [afmc] ++
2,797,281 UART: [afmc] CDI.KEYID = 6
2,797,644 UART: [afmc] SUBJECT.KEYID = 7
2,798,070 UART: [afmc] AUTHORITY.KEYID = 5
2,833,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,987 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,738 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,457 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,350 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,057 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,730 UART: [afmc] --
2,876,643 UART: [cold-reset] --
2,877,373 UART: [state] Locking Datavault
2,878,692 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,296 UART: [state] Locking ICCM
2,879,822 UART: [exit] Launching FMC @ 0x40000130
2,885,151 UART:
2,885,167 UART: Running Caliptra FMC ...
2,885,575 UART:
2,885,718 UART: [state] CFI Enabled
2,896,317 UART: [fht] FMC Alias Private Key: 7
3,003,962 UART: [art] Extend RT PCRs Done
3,004,390 UART: [art] Lock RT PCRs Done
3,005,820 UART: [art] Populate DV Done
3,014,130 UART: [fht] FMC Alias Private Key: 7
3,015,272 UART: [art] Derive CDI
3,015,552 UART: [art] Store in in slot 0x4
3,101,237 UART: [art] Derive Key Pair
3,101,597 UART: [art] Store priv key in slot 0x5
3,114,519 UART: [art] Derive Key Pair - Done
3,129,149 UART: [art] Signing Cert with AUTHO
3,129,629 UART: RITY.KEYID = 7
3,145,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,960 UART: [art] PUB.X = 199BB11A3BB27F299512798B55E186BDA4EECC7FDE35C9683216CB29F35747B475322651E58BB256B2A4664E7E013BA9
3,152,729 UART: [art] PUB.Y = 825F6FD0D6D33B84FA7E4EE4647DEAFACD2159729E84C00CE96C63E76F84CD0E9784FF44C1C5083995A2E2F2BC16CD12
3,159,686 UART: [art] SIG.R = CEA489F9AAA3235162FB122989D6DB53B5C236F2D5F7813A75D841061C85358D6A5D24EE7E22EAA0E2AF3D28FBF4D651
3,166,465 UART: [art] SIG.S = BA01B97D8D033592D8394DE756B507A1612761BFB4724FC30FDD8DE0078B934EB8864969DE704FC2BB284F233DF5E0F9
3,190,029 UART: Caliptra RT
3,190,374 UART: [state] CFI Enabled
3,297,817 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,298,573 UART:
3,298,589 UART: Running Caliptra ROM ...
3,298,997 UART:
3,299,139 UART: [state] CFI Enabled
3,302,128 UART: [state] LifecycleState = Production
3,302,736 UART: [state] DebugLocked = Yes
3,303,244 UART: [state] Starting the WD Timer 40000000 cycles
3,304,839 UART: [kat] SHA2-256
4,108,389 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,518 UART: [kat] ++
4,112,670 UART: [kat] sha1
4,116,982 UART: [kat] SHA2-256
4,118,922 UART: [kat] SHA2-384
4,121,883 UART: [kat] SHA2-512-ACC
4,123,784 UART: [kat] ECC-384
4,133,713 UART: [kat] HMAC-384Kdf
4,138,195 UART: [kat] LMS
4,386,507 UART: [kat] --
4,387,391 UART: [warm-reset] ++
4,388,304 UART: [warm-reset] --
4,389,469 UART: [state] Locking Datavault
4,390,451 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,055 UART: [state] Locking ICCM
4,391,577 UART: [exit] Launching FMC @ 0x40000130
4,396,906 UART:
4,396,922 UART: Running Caliptra FMC ...
4,397,330 UART:
4,397,473 UART: [state] CFI Enabled
4,398,924 UART: [aliasrt :skip pcr extension
4,399,397 UART: [art] Extend RT PCRs Done
4,399,825 UART: [art] Lock RT PCRs Done
4,401,306 UART: [art] Populate DV Done
4,409,262 UART: [fht] FMC Alias Private Key: 7
4,410,376 UART: [art] Derive CDI
4,410,656 UART: [art] Store in in slot 0x4
4,496,161 UART: [art] Derive Key Pair
4,496,521 UART: [art] Store priv key in slot 0x5
4,509,275 UART: [art] Derive Key Pair - Done
4,524,237 UART: [art] Signing Cert with AUTHO
4,524,717 UART: RITY.KEYID = 7
4,539,945 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,710 UART: [art] PUB.X = 199BB11A3BB27F299512798B55E186BDA4EECC7FDE35C9683216CB29F35747B475322651E58BB256B2A4664E7E013BA9
4,547,479 UART: [art] PUB.Y = 825F6FD0D6D33B84FA7E4EE4647DEAFACD2159729E84C00CE96C63E76F84CD0E9784FF44C1C5083995A2E2F2BC16CD12
4,554,436 UART: [art] SIG.R = CEA489F9AAA3235162FB122989D6DB53B5C236F2D5F7813A75D841061C85358D6A5D24EE7E22EAA0E2AF3D28FBF4D651
4,561,215 UART: [art] SIG.S = BA01B97D8D033592D8394DE756B507A1612761BFB4724FC30FDD8DE0078B934EB8864969DE704FC2BB284F233DF5E0F9
4,585,339 UART: Caliptra RT
4,585,684 UART: [state] CFI Enabled
4,870,189 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,642 UART: [state] LifecycleState = Production
86,250 UART: [state] DebugLocked = Yes
86,762 UART: [state] Starting the WD Timer 40000000 cycles
88,377 UART: [kat] SHA2-256
891,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,056 UART: [kat] ++
896,208 UART: [kat] sha1
900,398 UART: [kat] SHA2-256
902,338 UART: [kat] SHA2-384
905,231 UART: [kat] SHA2-512-ACC
907,132 UART: [kat] ECC-384
917,223 UART: [kat] HMAC-384Kdf
921,775 UART: [kat] LMS
1,170,087 UART: [kat] --
1,171,102 UART: [cold-reset] ++
1,171,517 UART: [fht] FHT @ 0x50003400
1,174,029 UART: [idev] ++
1,174,197 UART: [idev] CDI.KEYID = 6
1,174,558 UART: [idev] SUBJECT.KEYID = 7
1,174,983 UART: [idev] UDS.KEYID = 0
1,175,329 ready_for_fw is high
1,175,329 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,200,025 UART: [idev] Sha1 KeyId Algorithm
1,209,058 UART: [idev] --
1,210,095 UART: [ldev] ++
1,210,263 UART: [ldev] CDI.KEYID = 6
1,210,627 UART: [ldev] SUBJECT.KEYID = 5
1,211,054 UART: [ldev] AUTHORITY.KEYID = 7
1,211,517 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,838 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,532 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,402 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,108 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,236 UART: [ldev] --
1,282,538 UART: [fwproc] Wait for Commands...
1,283,139 UART: [fwproc] Recv command 0x46574c44
1,283,872 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,799 >>> mbox cmd response: success
2,797,899 UART: [afmc] ++
2,798,067 UART: [afmc] CDI.KEYID = 6
2,798,430 UART: [afmc] SUBJECT.KEYID = 7
2,798,856 UART: [afmc] AUTHORITY.KEYID = 5
2,834,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,850,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,512 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,231 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,124 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,868,831 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,586 UART: [afmc] --
2,877,627 UART: [cold-reset] --
2,878,565 UART: [state] Locking Datavault
2,879,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,476 UART: [state] Locking ICCM
2,881,046 UART: [exit] Launching FMC @ 0x40000130
2,886,375 UART:
2,886,391 UART: Running Caliptra FMC ...
2,886,799 UART:
2,886,942 UART: [state] CFI Enabled
2,897,333 UART: [fht] FMC Alias Private Key: 7
3,005,560 UART: [art] Extend RT PCRs Done
3,005,988 UART: [art] Lock RT PCRs Done
3,007,546 UART: [art] Populate DV Done
3,015,688 UART: [fht] FMC Alias Private Key: 7
3,016,802 UART: [art] Derive CDI
3,017,082 UART: [art] Store in in slot 0x4
3,102,717 UART: [art] Derive Key Pair
3,103,077 UART: [art] Store priv key in slot 0x5
3,116,121 UART: [art] Derive Key Pair - Done
3,131,135 UART: [art] Signing Cert with AUTHO
3,131,615 UART: RITY.KEYID = 7
3,146,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,380 UART: [art] PUB.X = 465EAEB90490EE649276717EFF0C60F8724296B6A1892B5117E1451741E4CF924018611C4C96DB6AC5336CF8A65EEAE4
3,154,144 UART: [art] PUB.Y = 6DED1B6D6E96839BE839C0BC118AE7267C2E97E79106442B671C0FC3CCA422DF5E94F490428748E095B000FDDC15B605
3,161,069 UART: [art] SIG.R = E4D77CBC47B781C5F79624325E38947C08B84628446FF5A1E0B46A704DC55B848C3DA8E94D96E1A1CE3B64FE0D8EE43B
3,167,843 UART: [art] SIG.S = EA164ADE7A4A09F7513691ECF8E5FBC8CAB1F0292AF2A1A8AE5F27D8EF4F0E6CC96565D5A418D7C90A499739ADAD2427
3,192,271 UART: Caliptra RT
3,192,616 UART: [state] CFI Enabled
3,300,407 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,301,163 UART:
3,301,179 UART: Running Caliptra ROM ...
3,301,587 UART:
3,301,729 UART: [state] CFI Enabled
3,304,690 UART: [state] LifecycleState = Production
3,305,298 UART: [state] DebugLocked = Yes
3,305,972 UART: [state] Starting the WD Timer 40000000 cycles
3,307,473 UART: [kat] SHA2-256
4,111,023 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,115,152 UART: [kat] ++
4,115,304 UART: [kat] sha1
4,119,304 UART: [kat] SHA2-256
4,121,244 UART: [kat] SHA2-384
4,123,993 UART: [kat] SHA2-512-ACC
4,125,894 UART: [kat] ECC-384
4,135,593 UART: [kat] HMAC-384Kdf
4,140,321 UART: [kat] LMS
4,388,633 UART: [kat] --
4,389,793 UART: [warm-reset] ++
4,390,966 UART: [warm-reset] --
4,391,793 UART: [state] Locking Datavault
4,392,481 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,085 UART: [state] Locking ICCM
4,393,695 UART: [exit] Launching FMC @ 0x40000130
4,399,024 UART:
4,399,040 UART: Running Caliptra FMC ...
4,399,448 UART:
4,399,591 UART: [state] CFI Enabled
4,400,812 UART: [aliasrt :skip pcr extension
4,401,285 UART: [art] Extend RT PCRs Done
4,401,713 UART: [art] Lock RT PCRs Done
4,402,872 UART: [art] Populate DV Done
4,411,116 UART: [fht] FMC Alias Private Key: 7
4,412,186 UART: [art] Derive CDI
4,412,466 UART: [art] Store in in slot 0x4
4,498,241 UART: [art] Derive Key Pair
4,498,601 UART: [art] Store priv key in slot 0x5
4,511,879 UART: [art] Derive Key Pair - Done
4,526,535 UART: [art] Signing Cert with AUTHO
4,527,015 UART: RITY.KEYID = 7
4,542,299 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,064 UART: [art] PUB.X = 465EAEB90490EE649276717EFF0C60F8724296B6A1892B5117E1451741E4CF924018611C4C96DB6AC5336CF8A65EEAE4
4,549,828 UART: [art] PUB.Y = 6DED1B6D6E96839BE839C0BC118AE7267C2E97E79106442B671C0FC3CCA422DF5E94F490428748E095B000FDDC15B605
4,556,753 UART: [art] SIG.R = E4D77CBC47B781C5F79624325E38947C08B84628446FF5A1E0B46A704DC55B848C3DA8E94D96E1A1CE3B64FE0D8EE43B
4,563,527 UART: [art] SIG.S = EA164ADE7A4A09F7513691ECF8E5FBC8CAB1F0292AF2A1A8AE5F27D8EF4F0E6CC96565D5A418D7C90A499739ADAD2427
4,587,619 UART: Caliptra RT
4,587,964 UART: [state] CFI Enabled
4,868,547 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Production
85,645 UART: [state] DebugLocked = Yes
86,365 UART: [state] Starting the WD Timer 40000000 cycles
88,050 UART: [kat] SHA2-256
891,600 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,729 UART: [kat] ++
895,881 UART: [kat] sha1
900,161 UART: [kat] SHA2-256
902,101 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,750 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,609 UART: [cold-reset] ++
1,171,056 UART: [fht] FHT @ 0x50003400
1,173,628 UART: [idev] ++
1,173,796 UART: [idev] CDI.KEYID = 6
1,174,157 UART: [idev] SUBJECT.KEYID = 7
1,174,582 UART: [idev] UDS.KEYID = 0
1,174,928 ready_for_fw is high
1,174,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,654 UART: [idev] Sha1 KeyId Algorithm
1,208,421 UART: [idev] --
1,209,600 UART: [ldev] ++
1,209,768 UART: [ldev] CDI.KEYID = 6
1,210,132 UART: [ldev] SUBJECT.KEYID = 5
1,210,559 UART: [ldev] AUTHORITY.KEYID = 7
1,211,022 UART: [ldev] FE.KEYID = 1
1,216,250 UART: [ldev] Erasing FE.KEYID = 1
1,242,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,431 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,125 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,995 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,701 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,769 UART: [ldev] --
1,281,129 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,629,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,658,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,794,184 >>> mbox cmd response: success
2,795,438 UART: [afmc] ++
2,795,606 UART: [afmc] CDI.KEYID = 6
2,795,969 UART: [afmc] SUBJECT.KEYID = 7
2,796,395 UART: [afmc] AUTHORITY.KEYID = 5
2,831,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,848,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,849,001 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,854,720 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,860,613 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,866,320 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,874,081 UART: [afmc] --
2,875,098 UART: [cold-reset] --
2,875,820 UART: [state] Locking Datavault
2,877,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,877,649 UART: [state] Locking ICCM
2,878,319 UART: [exit] Launching FMC @ 0x40000130
2,883,648 UART:
2,883,664 UART: Running Caliptra FMC ...
2,884,072 UART:
2,884,126 UART: [state] CFI Enabled
2,894,451 UART: [fht] FMC Alias Private Key: 7
3,001,608 UART: [art] Extend RT PCRs Done
3,002,036 UART: [art] Lock RT PCRs Done
3,003,780 UART: [art] Populate DV Done
3,011,962 UART: [fht] FMC Alias Private Key: 7
3,013,052 UART: [art] Derive CDI
3,013,332 UART: [art] Store in in slot 0x4
3,098,979 UART: [art] Derive Key Pair
3,099,339 UART: [art] Store priv key in slot 0x5
3,112,653 UART: [art] Derive Key Pair - Done
3,127,669 UART: [art] Signing Cert with AUTHO
3,128,149 UART: RITY.KEYID = 7
3,143,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,143,952 UART: [art] PUB.X = 7EB9DF4DD9526E6C7703D40FAFCD00B5559EC6ED78DC2A5BF70BD5576AFDB33150EBB90511DDF2BA01B2CA1383853564
3,150,705 UART: [art] PUB.Y = A5721666746046B01CD04E675A94D270870E1EDD32D8E4911CD0D1A972B1CFCEB05ACBD7296FBE8DC96ADAF506E6552B
3,157,663 UART: [art] SIG.R = 98A3EC52C8626AB5D8A7B4BCD2BE559A18B59BF85CC77AB53B97CF29F029DF127417219C911FED160EA5282F1E3440CE
3,164,444 UART: [art] SIG.S = 92456773A8E6C4E541ECBECF1947F675671FF8C3A12E3720DF32C2A5C6DA2AA8BE254B1F1EB18B964F6A396A3ABDB56B
3,188,347 UART: Caliptra RT
3,188,600 UART: [state] CFI Enabled
3,294,981 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,295,737 UART:
3,295,753 UART: Running Caliptra ROM ...
3,296,161 UART:
3,296,216 UART: [state] CFI Enabled
3,298,659 UART: [state] LifecycleState = Production
3,299,267 UART: [state] DebugLocked = Yes
3,299,911 UART: [state] Starting the WD Timer 40000000 cycles
3,301,624 UART: [kat] SHA2-256
4,105,174 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,109,303 UART: [kat] ++
4,109,455 UART: [kat] sha1
4,113,591 UART: [kat] SHA2-256
4,115,531 UART: [kat] SHA2-384
4,118,388 UART: [kat] SHA2-512-ACC
4,120,289 UART: [kat] ECC-384
4,129,768 UART: [kat] HMAC-384Kdf
4,134,320 UART: [kat] LMS
4,382,632 UART: [kat] --
4,383,246 UART: [warm-reset] ++
4,383,989 UART: [warm-reset] --
4,384,608 UART: [state] Locking Datavault
4,385,408 UART: [state] Locking PCR0, PCR1 and PCR31
4,386,012 UART: [state] Locking ICCM
4,386,666 UART: [exit] Launching FMC @ 0x40000130
4,391,995 UART:
4,392,011 UART: Running Caliptra FMC ...
4,392,419 UART:
4,392,473 UART: [state] CFI Enabled
4,393,614 UART: [aliasrt :skip pcr extension
4,394,087 UART: [art] Extend RT PCRs Done
4,394,515 UART: [art] Lock RT PCRs Done
4,395,542 UART: [art] Populate DV Done
4,403,770 UART: [fht] FMC Alias Private Key: 7
4,404,918 UART: [art] Derive CDI
4,405,198 UART: [art] Store in in slot 0x4
4,490,385 UART: [art] Derive Key Pair
4,490,745 UART: [art] Store priv key in slot 0x5
4,503,457 UART: [art] Derive Key Pair - Done
4,518,251 UART: [art] Signing Cert with AUTHO
4,518,731 UART: RITY.KEYID = 7
4,534,027 UART: [art] Erasing AUTHORITY.KEYID = 7
4,534,792 UART: [art] PUB.X = 7EB9DF4DD9526E6C7703D40FAFCD00B5559EC6ED78DC2A5BF70BD5576AFDB33150EBB90511DDF2BA01B2CA1383853564
4,541,545 UART: [art] PUB.Y = A5721666746046B01CD04E675A94D270870E1EDD32D8E4911CD0D1A972B1CFCEB05ACBD7296FBE8DC96ADAF506E6552B
4,548,503 UART: [art] SIG.R = 98A3EC52C8626AB5D8A7B4BCD2BE559A18B59BF85CC77AB53B97CF29F029DF127417219C911FED160EA5282F1E3440CE
4,555,284 UART: [art] SIG.S = 92456773A8E6C4E541ECBECF1947F675671FF8C3A12E3720DF32C2A5C6DA2AA8BE254B1F1EB18B964F6A396A3ABDB56B
4,579,393 UART: Caliptra RT
4,579,646 UART: [state] CFI Enabled
4,861,503 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Production
85,613 UART: [state] DebugLocked = Yes
86,311 UART: [state] Starting the WD Timer 40000000 cycles
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,170,101 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,520 UART: [idev] ++
1,173,688 UART: [idev] CDI.KEYID = 6
1,174,049 UART: [idev] SUBJECT.KEYID = 7
1,174,474 UART: [idev] UDS.KEYID = 0
1,174,820 ready_for_fw is high
1,174,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,523 UART: [idev] Erasing UDS.KEYID = 0
1,199,848 UART: [idev] Sha1 KeyId Algorithm
1,208,755 UART: [idev] --
1,209,906 UART: [ldev] ++
1,210,074 UART: [ldev] CDI.KEYID = 6
1,210,438 UART: [ldev] SUBJECT.KEYID = 5
1,210,865 UART: [ldev] AUTHORITY.KEYID = 7
1,211,328 UART: [ldev] FE.KEYID = 1
1,216,796 UART: [ldev] Erasing FE.KEYID = 1
1,242,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,327 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,021 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,891 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,597 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,657 UART: [ldev] --
1,281,047 UART: [fwproc] Wait for Commands...
1,281,642 UART: [fwproc] Recv command 0x46574c44
1,282,375 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,924 >>> mbox cmd response: success
2,797,002 UART: [afmc] ++
2,797,170 UART: [afmc] CDI.KEYID = 6
2,797,533 UART: [afmc] SUBJECT.KEYID = 7
2,797,959 UART: [afmc] AUTHORITY.KEYID = 5
2,833,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,419 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,138 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,031 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,738 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,513 UART: [afmc] --
2,876,512 UART: [cold-reset] --
2,877,320 UART: [state] Locking Datavault
2,878,495 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,099 UART: [state] Locking ICCM
2,879,551 UART: [exit] Launching FMC @ 0x40000130
2,884,880 UART:
2,884,896 UART: Running Caliptra FMC ...
2,885,304 UART:
2,885,358 UART: [state] CFI Enabled
2,896,099 UART: [fht] FMC Alias Private Key: 7
3,003,896 UART: [art] Extend RT PCRs Done
3,004,324 UART: [art] Lock RT PCRs Done
3,005,950 UART: [art] Populate DV Done
3,014,090 UART: [fht] FMC Alias Private Key: 7
3,015,148 UART: [art] Derive CDI
3,015,428 UART: [art] Store in in slot 0x4
3,100,825 UART: [art] Derive Key Pair
3,101,185 UART: [art] Store priv key in slot 0x5
3,114,159 UART: [art] Derive Key Pair - Done
3,129,068 UART: [art] Signing Cert with AUTHO
3,129,548 UART: RITY.KEYID = 7
3,144,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,145,539 UART: [art] PUB.X = C8CB455B30DA9F420CF58645C18112744013D0DADCE5D3B95EC3345E517BE6599CDEF0F53F01765244787243671B93A9
3,152,303 UART: [art] PUB.Y = DFE5BE0E4EB462E5725438512F718C42C2940AC572C1B279F0DC55F498C493206FA227258F54279B01A4E88B2A6BD342
3,159,244 UART: [art] SIG.R = 63FCDF02404F3B6C5C78D432DC6E6BCA5E0234B89D9C7FC2E3DCAF41229127CFA5B138767B1F7DC0BD61578A6276D000
3,166,000 UART: [art] SIG.S = EEA966FD63374A4E2E6CE198196F74E8ECB09A7182D61ADA7B2F9513A1DD54A19D9D39ADE6E5E21A4D5495DECF75FA16
3,189,819 UART: Caliptra RT
3,190,072 UART: [state] CFI Enabled
3,298,385 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,141 UART:
3,299,157 UART: Running Caliptra ROM ...
3,299,565 UART:
3,299,620 UART: [state] CFI Enabled
3,302,303 UART: [state] LifecycleState = Production
3,302,911 UART: [state] DebugLocked = Yes
3,303,545 UART: [state] Starting the WD Timer 40000000 cycles
3,305,250 UART: [kat] SHA2-256
4,108,800 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,929 UART: [kat] ++
4,113,081 UART: [kat] sha1
4,117,289 UART: [kat] SHA2-256
4,119,229 UART: [kat] SHA2-384
4,121,832 UART: [kat] SHA2-512-ACC
4,123,733 UART: [kat] ECC-384
4,133,352 UART: [kat] HMAC-384Kdf
4,138,040 UART: [kat] LMS
4,386,352 UART: [kat] --
4,387,110 UART: [warm-reset] ++
4,388,041 UART: [warm-reset] --
4,388,742 UART: [state] Locking Datavault
4,389,394 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,998 UART: [state] Locking ICCM
4,390,486 UART: [exit] Launching FMC @ 0x40000130
4,395,815 UART:
4,395,831 UART: Running Caliptra FMC ...
4,396,239 UART:
4,396,293 UART: [state] CFI Enabled
4,397,350 UART: [aliasrt :skip pcr extension
4,397,823 UART: [art] Extend RT PCRs Done
4,398,251 UART: [art] Lock RT PCRs Done
4,399,422 UART: [art] Populate DV Done
4,407,626 UART: [fht] FMC Alias Private Key: 7
4,408,740 UART: [art] Derive CDI
4,409,020 UART: [art] Store in in slot 0x4
4,494,621 UART: [art] Derive Key Pair
4,494,981 UART: [art] Store priv key in slot 0x5
4,508,945 UART: [art] Derive Key Pair - Done
4,523,756 UART: [art] Signing Cert with AUTHO
4,524,236 UART: RITY.KEYID = 7
4,539,430 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,195 UART: [art] PUB.X = C8CB455B30DA9F420CF58645C18112744013D0DADCE5D3B95EC3345E517BE6599CDEF0F53F01765244787243671B93A9
4,546,959 UART: [art] PUB.Y = DFE5BE0E4EB462E5725438512F718C42C2940AC572C1B279F0DC55F498C493206FA227258F54279B01A4E88B2A6BD342
4,553,900 UART: [art] SIG.R = 63FCDF02404F3B6C5C78D432DC6E6BCA5E0234B89D9C7FC2E3DCAF41229127CFA5B138767B1F7DC0BD61578A6276D000
4,560,656 UART: [art] SIG.S = EEA966FD63374A4E2E6CE198196F74E8ECB09A7182D61ADA7B2F9513A1DD54A19D9D39ADE6E5E21A4D5495DECF75FA16
4,584,693 UART: Caliptra RT
4,584,946 UART: [state] CFI Enabled
4,868,903 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Production
85,932 UART: [state] DebugLocked = Yes
86,444 UART: [state] Starting the WD Timer 40000000 cycles
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,586 UART: [kat] ++
895,738 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,231 UART: [idev] ++
1,173,399 UART: [idev] CDI.KEYID = 6
1,173,760 UART: [idev] SUBJECT.KEYID = 7
1,174,185 UART: [idev] UDS.KEYID = 0
1,174,531 ready_for_fw is high
1,174,531 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,199,395 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,123 UART: [ldev] ++
1,209,291 UART: [ldev] CDI.KEYID = 6
1,209,655 UART: [ldev] SUBJECT.KEYID = 5
1,210,082 UART: [ldev] AUTHORITY.KEYID = 7
1,210,545 UART: [ldev] FE.KEYID = 1
1,215,667 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,074 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,768 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,638 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,344 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,368 UART: [ldev] --
1,281,710 UART: [fwproc] Wait for Commands...
1,282,353 UART: [fwproc] Recv command 0x46574c44
1,283,086 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,801 >>> mbox cmd response: success
2,796,913 UART: [afmc] ++
2,797,081 UART: [afmc] CDI.KEYID = 6
2,797,444 UART: [afmc] SUBJECT.KEYID = 7
2,797,870 UART: [afmc] AUTHORITY.KEYID = 5
2,833,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,670 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,389 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,282 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,989 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,900 UART: [afmc] --
2,876,835 UART: [cold-reset] --
2,877,867 UART: [state] Locking Datavault
2,879,102 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,706 UART: [state] Locking ICCM
2,880,292 UART: [exit] Launching FMC @ 0x40000130
2,885,621 UART:
2,885,637 UART: Running Caliptra FMC ...
2,886,045 UART:
2,886,188 UART: [state] CFI Enabled
2,896,693 UART: [fht] FMC Alias Private Key: 7
3,004,280 UART: [art] Extend RT PCRs Done
3,004,708 UART: [art] Lock RT PCRs Done
3,006,250 UART: [art] Populate DV Done
3,014,350 UART: [fht] FMC Alias Private Key: 7
3,015,368 UART: [art] Derive CDI
3,015,648 UART: [art] Store in in slot 0x4
3,101,459 UART: [art] Derive Key Pair
3,101,819 UART: [art] Store priv key in slot 0x5
3,115,347 UART: [art] Derive Key Pair - Done
3,130,242 UART: [art] Signing Cert with AUTHO
3,130,722 UART: RITY.KEYID = 7
3,145,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,551 UART: [art] PUB.X = CF912C5505634535D6173AAD58DFE583A5B50C93B1CB75F73F426015C2080E5739FCB2C95755A92473DF3825D689AD55
3,153,307 UART: [art] PUB.Y = B8E846CAE743AD0F609917F6F4CE1CD49CDAB87CAB0F2C19BFB5104D001B082E6AD76337121FFF9F9C556BAC85F669F5
3,160,246 UART: [art] SIG.R = 28871730A8226FF455D1287E50A84FB80CEBBD7945AFDCC1D56D29BCB0CACAFDC4BE5B0FE4443934694A773212CD5461
3,167,024 UART: [art] SIG.S = 8926CFEDF6D63D57BD7525326EA3D5822B29417F0550434D843EB76E0BBE5A2838E17F8458BB7480CDC80DAD43DA417E
3,190,358 UART: Caliptra RT
3,190,703 UART: [state] CFI Enabled
3,298,518 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,274 UART:
3,299,290 UART: Running Caliptra ROM ...
3,299,698 UART:
3,299,840 UART: [state] CFI Enabled
3,303,045 UART: [state] LifecycleState = Production
3,303,653 UART: [state] DebugLocked = Yes
3,304,163 UART: [state] Starting the WD Timer 40000000 cycles
3,305,824 UART: [kat] SHA2-256
4,109,374 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,503 UART: [kat] ++
4,113,655 UART: [kat] sha1
4,118,003 UART: [kat] SHA2-256
4,119,943 UART: [kat] SHA2-384
4,122,798 UART: [kat] SHA2-512-ACC
4,124,699 UART: [kat] ECC-384
4,134,462 UART: [kat] HMAC-384Kdf
4,138,966 UART: [kat] LMS
4,387,278 UART: [kat] --
4,388,088 UART: [warm-reset] ++
4,388,899 UART: [warm-reset] --
4,389,778 UART: [state] Locking Datavault
4,390,696 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,300 UART: [state] Locking ICCM
4,391,876 UART: [exit] Launching FMC @ 0x40000130
4,397,205 UART:
4,397,221 UART: Running Caliptra FMC ...
4,397,629 UART:
4,397,772 UART: [state] CFI Enabled
4,399,291 UART: [aliasrt :skip pcr extension
4,399,764 UART: [art] Extend RT PCRs Done
4,400,192 UART: [art] Lock RT PCRs Done
4,401,385 UART: [art] Populate DV Done
4,409,629 UART: [fht] FMC Alias Private Key: 7
4,410,653 UART: [art] Derive CDI
4,410,933 UART: [art] Store in in slot 0x4
4,496,444 UART: [art] Derive Key Pair
4,496,804 UART: [art] Store priv key in slot 0x5
4,509,820 UART: [art] Derive Key Pair - Done
4,524,377 UART: [art] Signing Cert with AUTHO
4,524,857 UART: RITY.KEYID = 7
4,540,031 UART: [art] Erasing AUTHORITY.KEYID = 7
4,540,796 UART: [art] PUB.X = CF912C5505634535D6173AAD58DFE583A5B50C93B1CB75F73F426015C2080E5739FCB2C95755A92473DF3825D689AD55
4,547,552 UART: [art] PUB.Y = B8E846CAE743AD0F609917F6F4CE1CD49CDAB87CAB0F2C19BFB5104D001B082E6AD76337121FFF9F9C556BAC85F669F5
4,554,491 UART: [art] SIG.R = 28871730A8226FF455D1287E50A84FB80CEBBD7945AFDCC1D56D29BCB0CACAFDC4BE5B0FE4443934694A773212CD5461
4,561,269 UART: [art] SIG.S = 8926CFEDF6D63D57BD7525326EA3D5822B29417F0550434D843EB76E0BBE5A2838E17F8458BB7480CDC80DAD43DA417E
4,585,029 UART: Caliptra RT
4,585,374 UART: [state] CFI Enabled
4,865,289 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,508 UART: [state] LifecycleState = Production
86,116 UART: [state] DebugLocked = Yes
86,744 UART: [state] Starting the WD Timer 40000000 cycles
88,245 UART: [kat] SHA2-256
891,795 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,924 UART: [kat] ++
896,076 UART: [kat] sha1
900,420 UART: [kat] SHA2-256
902,360 UART: [kat] SHA2-384
905,063 UART: [kat] SHA2-512-ACC
906,964 UART: [kat] ECC-384
916,955 UART: [kat] HMAC-384Kdf
921,665 UART: [kat] LMS
1,169,977 UART: [kat] --
1,170,896 UART: [cold-reset] ++
1,171,261 UART: [fht] FHT @ 0x50003400
1,174,089 UART: [idev] ++
1,174,257 UART: [idev] CDI.KEYID = 6
1,174,618 UART: [idev] SUBJECT.KEYID = 7
1,175,043 UART: [idev] UDS.KEYID = 0
1,175,389 ready_for_fw is high
1,175,389 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,062 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,525 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,691 UART: [ldev] Erasing FE.KEYID = 1
1,241,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,922 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,616 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,486 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,192 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,270 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,571 UART: [fwproc] Recv command 0x46574c44
1,282,304 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,155 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,464 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,933 >>> mbox cmd response: success
2,797,067 UART: [afmc] ++
2,797,235 UART: [afmc] CDI.KEYID = 6
2,797,598 UART: [afmc] SUBJECT.KEYID = 7
2,798,024 UART: [afmc] AUTHORITY.KEYID = 5
2,833,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,849,745 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,850,496 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,856,215 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,862,108 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,867,815 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,875,610 UART: [afmc] --
2,876,601 UART: [cold-reset] --
2,877,547 UART: [state] Locking Datavault
2,878,898 UART: [state] Locking PCR0, PCR1 and PCR31
2,879,502 UART: [state] Locking ICCM
2,880,066 UART: [exit] Launching FMC @ 0x40000130
2,885,395 UART:
2,885,411 UART: Running Caliptra FMC ...
2,885,819 UART:
2,885,962 UART: [state] CFI Enabled
2,896,577 UART: [fht] FMC Alias Private Key: 7
3,004,860 UART: [art] Extend RT PCRs Done
3,005,288 UART: [art] Lock RT PCRs Done
3,006,736 UART: [art] Populate DV Done
3,015,052 UART: [fht] FMC Alias Private Key: 7
3,016,140 UART: [art] Derive CDI
3,016,420 UART: [art] Store in in slot 0x4
3,102,035 UART: [art] Derive Key Pair
3,102,395 UART: [art] Store priv key in slot 0x5
3,115,287 UART: [art] Derive Key Pair - Done
3,130,122 UART: [art] Signing Cert with AUTHO
3,130,602 UART: RITY.KEYID = 7
3,146,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,967 UART: [art] PUB.X = 5FD67F697CAF76256E29F57AA52B95947E6241694735A3C0A8DF9B8F983216B6B4D28357B306FE09DA9D52F4D624443E
3,153,731 UART: [art] PUB.Y = BB2ABF8F6A47296AC2ABF0116A993DD707B32AC02AA38CC18DCB0E01009FEBBD7D3A3A82AC6C308BADA6590F306E3B78
3,160,673 UART: [art] SIG.R = E7A74644D982194B5ECA7759F04EF450F757EB8A9FA70413CB15CD48A8B113B332AD39AEA84F1792B01975D8A34039EB
3,167,446 UART: [art] SIG.S = E9E5E4409F6D8FEE36123226FF0E4A01FD83A4896FC69E1B77E07A6FC85FBF29C071D7B44D84B90DA032F513DD7C9089
3,190,960 UART: Caliptra RT
3,191,305 UART: [state] CFI Enabled
3,298,690 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,446 UART:
3,299,462 UART: Running Caliptra ROM ...
3,299,870 UART:
3,300,012 UART: [state] CFI Enabled
3,302,187 UART: [state] LifecycleState = Production
3,302,795 UART: [state] DebugLocked = Yes
3,303,331 UART: [state] Starting the WD Timer 40000000 cycles
3,304,982 UART: [kat] SHA2-256
4,108,532 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,112,661 UART: [kat] ++
4,112,813 UART: [kat] sha1
4,116,939 UART: [kat] SHA2-256
4,118,879 UART: [kat] SHA2-384
4,121,650 UART: [kat] SHA2-512-ACC
4,123,551 UART: [kat] ECC-384
4,133,626 UART: [kat] HMAC-384Kdf
4,138,292 UART: [kat] LMS
4,386,604 UART: [kat] --
4,387,552 UART: [warm-reset] ++
4,388,353 UART: [warm-reset] --
4,389,118 UART: [state] Locking Datavault
4,390,038 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,642 UART: [state] Locking ICCM
4,391,082 UART: [exit] Launching FMC @ 0x40000130
4,396,411 UART:
4,396,427 UART: Running Caliptra FMC ...
4,396,835 UART:
4,396,978 UART: [state] CFI Enabled
4,398,555 UART: [aliasrt :skip pcr extension
4,399,028 UART: [art] Extend RT PCRs Done
4,399,456 UART: [art] Lock RT PCRs Done
4,400,569 UART: [art] Populate DV Done
4,408,637 UART: [fht] FMC Alias Private Key: 7
4,409,785 UART: [art] Derive CDI
4,410,065 UART: [art] Store in in slot 0x4
4,495,816 UART: [art] Derive Key Pair
4,496,176 UART: [art] Store priv key in slot 0x5
4,509,310 UART: [art] Derive Key Pair - Done
4,524,019 UART: [art] Signing Cert with AUTHO
4,524,499 UART: RITY.KEYID = 7
4,539,217 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,982 UART: [art] PUB.X = 5FD67F697CAF76256E29F57AA52B95947E6241694735A3C0A8DF9B8F983216B6B4D28357B306FE09DA9D52F4D624443E
4,546,746 UART: [art] PUB.Y = BB2ABF8F6A47296AC2ABF0116A993DD707B32AC02AA38CC18DCB0E01009FEBBD7D3A3A82AC6C308BADA6590F306E3B78
4,553,688 UART: [art] SIG.R = E7A74644D982194B5ECA7759F04EF450F757EB8A9FA70413CB15CD48A8B113B332AD39AEA84F1792B01975D8A34039EB
4,560,461 UART: [art] SIG.S = E9E5E4409F6D8FEE36123226FF0E4A01FD83A4896FC69E1B77E07A6FC85FBF29C071D7B44D84B90DA032F513DD7C9089
4,584,191 UART: Caliptra RT
4,584,536 UART: [state] CFI Enabled
4,869,307 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
191,579 UART:
191,952 UART: Running Caliptra ROM ...
193,123 UART:
193,278 UART: [state] CFI Enabled
266,510 UART: [state] LifecycleState = Production
268,724 UART: [state] DebugLocked = Yes
271,493 UART: [state] Starting the WD Timer 40000000 cycles
277,428 UART: [kat] SHA2-256
459,400 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
470,908 UART: [kat] ++
471,355 UART: [kat] sha1
481,973 UART: [kat] SHA2-256
484,976 UART: [kat] SHA2-384
490,250 UART: [kat] SHA2-512-ACC
492,894 UART: [kat] ECC-384
3,777,579 UART: [kat] HMAC-384Kdf
3,801,738 UART: [kat] LMS
4,874,901 UART: [kat] --
4,880,103 UART: [cold-reset] ++
4,882,896 UART: [fht] FHT @ 0x50003400
4,895,364 UART: [idev] ++
4,896,065 UART: [idev] CDI.KEYID = 6
4,897,234 UART: [idev] SUBJECT.KEYID = 7
4,898,402 UART: [idev] UDS.KEYID = 0
4,899,324 ready_for_fw is high
4,899,547 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,998,764 UART: [idev] Erasing UDS.KEYID = 0
8,246,399 UART: [idev] Sha1 KeyId Algorithm
8,269,060 UART: [idev] --
8,273,155 UART: [ldev] ++
8,273,771 UART: [ldev] CDI.KEYID = 6
8,274,894 UART: [ldev] SUBJECT.KEYID = 5
8,276,120 UART: [ldev] AUTHORITY.KEYID = 7
8,277,296 UART: [ldev] FE.KEYID = 1
8,318,956 UART: [ldev] Erasing FE.KEYID = 1
11,651,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,943,878 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,960,205 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,976,231 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,992,345 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,011,115 UART: [ldev] --
14,014,913 UART: [fwproc] Wait for Commands...
14,017,325 UART: [fwproc] Recv command 0x46574c44
14,019,640 UART: [fwproc] Recv'd Img size: 78576 bytes
17,679,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,751,298 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,820,040 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,013,231 >>> mbox cmd response: success
18,016,522 UART: [afmc] ++
18,017,135 UART: [afmc] CDI.KEYID = 6
18,018,281 UART: [afmc] SUBJECT.KEYID = 7
18,019,443 UART: [afmc] AUTHORITY.KEYID = 5
21,392,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,689,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,692,012 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,707,971 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,724,133 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,740,189 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,762,931 UART: [afmc] --
23,767,311 UART: [cold-reset] --
23,771,817 UART: [state] Locking Datavault
23,777,286 UART: [state] Locking PCR0, PCR1 and PCR31
23,778,980 UART: [state] Locking ICCM
23,780,911 UART: [exit] Launching FMC @ 0x40000130
23,789,542 UART:
23,789,774 UART: Running Caliptra FMC ...
23,790,799 UART:
23,790,940 UART: [state] CFI Enabled
23,849,630 UART: [fht] FMC Alias Private Key: 7
26,187,629 UART: [art] Extend RT PCRs Done
26,188,851 UART: [art] Lock RT PCRs Done
26,190,388 UART: [art] Populate DV Done
26,195,844 UART: [fht] FMC Alias Private Key: 7
26,197,371 UART: [art] Derive CDI
26,198,097 UART: [art] Store in in slot 0x4
26,257,996 UART: [art] Derive Key Pair
26,259,027 UART: [art] Store priv key in slot 0x5
29,551,777 UART: [art] Derive Key Pair - Done
29,564,724 UART: [art] Signing Cert with AUTHO
29,566,093 UART: RITY.KEYID = 7
31,853,999 UART: [art] Erasing AUTHORITY.KEYID = 7
31,855,502 UART: [art] PUB.X = EFEAD1E9438BE0059A49121AC164C479F213EF8ED830D5C0F7B86DD0260C377B55BCB8883F235889422841C1E2F0C518
31,862,756 UART: [art] PUB.Y = 958A8D9643783C246FDC64CF06B29EAA43A61A0F6C55420D7F2C96699F401479CE407FDFCF4CE97397753B06FA675628
31,869,993 UART: [art] SIG.R = EAB4731F450C833E020B4B0885CC337836E18E48952F7FDFB3B4BD1CBDF31B74B77AC47D5450D06DF11ECF8BEF5764E4
31,877,379 UART: [art] SIG.S = 84D306557FEF0D30BFA6ADC0EFEDA2D6C0492CDD42E51DA3DFE87057B6A573CD9FE1E1AE7A9FA66730B0CD3FD1FD8C25
33,181,952 UART: mbox::rt_entry...
33,182,899 UART: ____ _ _ _ ____ _____
33,184,826 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,186,820 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,188,738 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,190,657 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,192,577 UART: |_|
33,193,377 UART:
33,306,330 UART: [rt] Runtime listening for mailbox commands...
33,308,332 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,309,053 >>> mbox cmd response data (0 bytes)
Initializing fuses
997 UART:
1,244 UART: Running Caliptra ROM ...
2,341 UART:
2,490 UART: [state] CFI Enabled
59,735 UART: [state] LifecycleState = Production
61,496 UART: [state] DebugLocked = Yes
63,825 UART: [state] Starting the WD Timer 40000000 cycles
70,027 UART: [kat] SHA2-256
251,962 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
263,474 UART: [kat] ++
263,973 UART: [kat] sha1
274,363 UART: [kat] SHA2-256
277,369 UART: [kat] SHA2-384
283,012 UART: [kat] SHA2-512-ACC
285,621 UART: [kat] ECC-384
3,568,715 UART: [kat] HMAC-384Kdf
3,594,830 UART: [kat] LMS
4,667,999 UART: [kat] --
4,671,321 UART: [warm-reset] ++
4,677,527 UART: [warm-reset] --
4,682,422 UART: [state] Locking Datavault
4,685,949 UART: [state] Locking PCR0, PCR1 and PCR31
4,688,094 UART: [state] Locking ICCM
4,689,687 UART: [exit] Launching FMC @ 0x40000130
4,698,343 UART:
4,698,581 UART: Running Caliptra FMC ...
4,699,630 UART:
4,699,779 UART: [state] CFI Enabled
4,759,541 UART: [aliasrt :skip pcr extension
4,760,826 UART: [art] Extend RT PCRs Done
4,761,990 UART: [art] Lock RT PCRs Done
4,763,126 UART: [art] Populate DV Done
4,768,501 UART: [fht] FMC Alias Private Key: 7
4,770,168 UART: [art] Derive CDI
4,770,975 UART: [art] Store in in slot 0x4
4,828,081 UART: [art] Derive Key Pair
4,829,134 UART: [art] Store priv key in slot 0x5
8,121,850 UART: [art] Derive Key Pair - Done
8,134,773 UART: [art] Signing Cert with AUTHO
8,136,073 UART: RITY.KEYID = 7
10,422,753 UART: [art] Erasing AUTHORITY.KEYID = 7
10,424,264 UART: [art] PUB.X = EFEAD1E9438BE0059A49121AC164C479F213EF8ED830D5C0F7B86DD0260C377B55BCB8883F235889422841C1E2F0C518
10,431,498 UART: [art] PUB.Y = 958A8D9643783C246FDC64CF06B29EAA43A61A0F6C55420D7F2C96699F401479CE407FDFCF4CE97397753B06FA675628
10,438,711 UART: [art] SIG.R = EAB4731F450C833E020B4B0885CC337836E18E48952F7FDFB3B4BD1CBDF31B74B77AC47D5450D06DF11ECF8BEF5764E4
10,446,098 UART: [art] SIG.S = 84D306557FEF0D30BFA6ADC0EFEDA2D6C0492CDD42E51DA3DFE87057B6A573CD9FE1E1AE7A9FA66730B0CD3FD1FD8C25
11,750,864 UART: mbox::rt_entry...
11,751,835 UART: ____ _ _ _ ____ _____
11,753,837 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,755,842 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,757,808 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,759,733 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,761,654 UART: |_|
11,762,456 UART:
15,351,537 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,544 UART:
191,900 UART: Running Caliptra ROM ...
193,004 UART:
193,153 UART: [state] CFI Enabled
262,713 UART: [state] LifecycleState = Production
264,938 UART: [state] DebugLocked = Yes
267,568 UART: [state] Starting the WD Timer 40000000 cycles
272,877 UART: [kat] SHA2-256
454,850 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
466,336 UART: [kat] ++
466,958 UART: [kat] sha1
478,309 UART: [kat] SHA2-256
481,320 UART: [kat] SHA2-384
486,313 UART: [kat] SHA2-512-ACC
488,976 UART: [kat] ECC-384
3,774,180 UART: [kat] HMAC-384Kdf
3,801,899 UART: [kat] LMS
4,875,080 UART: [kat] --
4,877,397 UART: [cold-reset] ++
4,879,120 UART: [fht] FHT @ 0x50003400
4,891,445 UART: [idev] ++
4,892,082 UART: [idev] CDI.KEYID = 6
4,893,326 UART: [idev] SUBJECT.KEYID = 7
4,894,428 UART: [idev] UDS.KEYID = 0
4,895,396 ready_for_fw is high
4,895,583 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
4,994,542 UART: [idev] Erasing UDS.KEYID = 0
8,242,052 UART: [idev] Sha1 KeyId Algorithm
8,263,816 UART: [idev] --
8,267,581 UART: [ldev] ++
8,268,140 UART: [ldev] CDI.KEYID = 6
8,269,361 UART: [ldev] SUBJECT.KEYID = 5
8,270,510 UART: [ldev] AUTHORITY.KEYID = 7
8,271,730 UART: [ldev] FE.KEYID = 1
8,317,351 UART: [ldev] Erasing FE.KEYID = 1
11,650,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
13,941,490 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,957,806 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,973,790 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,989,927 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,010,745 UART: [ldev] --
14,016,223 UART: [fwproc] Wait for Commands...
14,018,979 UART: [fwproc] Recv command 0x46574c44
14,021,286 UART: [fwproc] Recv'd Img size: 78576 bytes
17,686,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,760,892 UART: [fwproc] Load FMC at address 0x40000000 len 18820
17,829,631 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,023,139 >>> mbox cmd response: success
18,028,003 UART: [afmc] ++
18,028,613 UART: [afmc] CDI.KEYID = 6
18,029,670 UART: [afmc] SUBJECT.KEYID = 7
18,030,881 UART: [afmc] AUTHORITY.KEYID = 5
21,393,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,693,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,695,517 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,711,460 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,727,600 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,743,671 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,765,799 UART: [afmc] --
23,770,029 UART: [cold-reset] --
23,774,808 UART: [state] Locking Datavault
23,782,260 UART: [state] Locking PCR0, PCR1 and PCR31
23,783,962 UART: [state] Locking ICCM
23,786,893 UART: [exit] Launching FMC @ 0x40000130
23,795,604 UART:
23,795,829 UART: Running Caliptra FMC ...
23,796,848 UART:
23,796,992 UART: [state] CFI Enabled
23,852,538 UART: [fht] FMC Alias Private Key: 7
26,189,723 UART: [art] Extend RT PCRs Done
26,190,975 UART: [art] Lock RT PCRs Done
26,192,526 UART: [art] Populate DV Done
26,198,097 UART: [fht] FMC Alias Private Key: 7
26,199,572 UART: [art] Derive CDI
26,200,324 UART: [art] Store in in slot 0x4
26,261,259 UART: [art] Derive Key Pair
26,262,298 UART: [art] Store priv key in slot 0x5
29,555,341 UART: [art] Derive Key Pair - Done
29,568,327 UART: [art] Signing Cert with AUTHO
29,569,655 UART: RITY.KEYID = 7
31,857,634 UART: [art] Erasing AUTHORITY.KEYID = 7
31,859,142 UART: [art] PUB.X = FE78291D450998461670DB4FF7B8095441E248713C572D22C6310919440CA24E607E4E46D44D935657CEAAB7E7BEE5B9
31,866,330 UART: [art] PUB.Y = 020037EE5662F9CA01F8747D1E46314B3672E0FB25D5B7940DBE5D605B472346B4914175D362BFF05E434FDA92F60B3F
31,873,609 UART: [art] SIG.R = A69424A466EE7A597D480B4F47A23C848BDD7E5DBDFB12EEC08BD5592283D3D79872E291667A3004CD15405FDAA5A59D
31,881,015 UART: [art] SIG.S = C780B0DAAA9534D9D63ED40F56995631514DB55E073391D577592FC46F34CE5BC8DE8DEAEF45622A0493B4FF8029DE24
33,185,888 UART: mbox::rt_entry...
33,186,852 UART: ____ _ _ _ ____ _____
33,188,957 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,190,958 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,192,806 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,194,744 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,196,666 UART: |_|
33,197,649 UART:
33,311,271 UART: [rt] Runtime listening for mailbox commands...
33,313,292 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,314,062 >>> mbox cmd response data (0 bytes)
Initializing fuses
996 UART:
1,238 UART: Running Caliptra ROM ...
2,335 UART:
2,480 UART: [state] CFI Enabled
82,039 UART: [state] LifecycleState = Production
83,804 UART: [state] DebugLocked = Yes
85,216 UART: [state] Starting the WD Timer 40000000 cycles
90,333 UART: [kat] SHA2-256
272,305 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
283,841 UART: [kat] ++
284,342 UART: [kat] sha1
296,512 UART: [kat] SHA2-256
299,567 UART: [kat] SHA2-384
306,349 UART: [kat] SHA2-512-ACC
308,968 UART: [kat] ECC-384
3,590,444 UART: [kat] HMAC-384Kdf
3,616,439 UART: [kat] LMS
4,689,592 UART: [kat] --
4,694,521 UART: [warm-reset] ++
4,701,048 UART: [warm-reset] --
4,706,532 UART: [state] Locking Datavault
4,709,573 UART: [state] Locking PCR0, PCR1 and PCR31
4,711,723 UART: [state] Locking ICCM
4,714,393 UART: [exit] Launching FMC @ 0x40000130
4,723,064 UART:
4,723,313 UART: Running Caliptra FMC ...
4,724,336 UART:
4,724,478 UART: [state] CFI Enabled
4,780,404 UART: [aliasrt :skip pcr extension
4,781,693 UART: [art] Extend RT PCRs Done
4,782,757 UART: [art] Lock RT PCRs Done
4,784,358 UART: [art] Populate DV Done
4,789,918 UART: [fht] FMC Alias Private Key: 7
4,791,443 UART: [art] Derive CDI
4,792,175 UART: [art] Store in in slot 0x4
4,849,359 UART: [art] Derive Key Pair
4,850,409 UART: [art] Store priv key in slot 0x5
8,142,543 UART: [art] Derive Key Pair - Done
8,155,649 UART: [art] Signing Cert with AUTHO
8,156,950 UART: RITY.KEYID = 7
10,443,568 UART: [art] Erasing AUTHORITY.KEYID = 7
10,445,090 UART: [art] PUB.X = FE78291D450998461670DB4FF7B8095441E248713C572D22C6310919440CA24E607E4E46D44D935657CEAAB7E7BEE5B9
10,452,274 UART: [art] PUB.Y = 020037EE5662F9CA01F8747D1E46314B3672E0FB25D5B7940DBE5D605B472346B4914175D362BFF05E434FDA92F60B3F
10,459,530 UART: [art] SIG.R = A69424A466EE7A597D480B4F47A23C848BDD7E5DBDFB12EEC08BD5592283D3D79872E291667A3004CD15405FDAA5A59D
10,466,892 UART: [art] SIG.S = C780B0DAAA9534D9D63ED40F56995631514DB55E073391D577592FC46F34CE5BC8DE8DEAEF45622A0493B4FF8029DE24
11,771,400 UART: mbox::rt_entry...
11,772,334 UART: ____ _ _ _ ____ _____
11,774,407 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,776,433 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,778,367 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,780,289 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,782,208 UART: |_|
11,783,007 UART:
15,371,480 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
191,929 UART:
192,307 UART: Running Caliptra ROM ...
193,474 UART:
602,887 UART: [state] CFI Enabled
620,890 UART: [state] LifecycleState = Production
623,108 UART: [state] DebugLocked = Yes
625,387 UART: [state] Starting the WD Timer 40000000 cycles
630,128 UART: [kat] SHA2-256
812,170 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
823,660 UART: [kat] ++
824,181 UART: [kat] sha1
834,663 UART: [kat] SHA2-256
837,750 UART: [kat] SHA2-384
843,524 UART: [kat] SHA2-512-ACC
846,102 UART: [kat] ECC-384
4,103,537 UART: [kat] HMAC-384Kdf
4,116,849 UART: [kat] LMS
5,190,022 UART: [kat] --
5,195,883 UART: [cold-reset] ++
5,198,530 UART: [fht] FHT @ 0x50003400
5,211,425 UART: [idev] ++
5,212,140 UART: [idev] CDI.KEYID = 6
5,213,398 UART: [idev] SUBJECT.KEYID = 7
5,214,794 UART: [idev] UDS.KEYID = 0
5,216,004 ready_for_fw is high
5,216,208 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
5,314,990 UART: [idev] Erasing UDS.KEYID = 0
8,506,208 UART: [idev] Sha1 KeyId Algorithm
8,528,343 UART: [idev] --
8,532,285 UART: [ldev] ++
8,532,893 UART: [ldev] CDI.KEYID = 6
8,534,134 UART: [ldev] SUBJECT.KEYID = 5
8,535,242 UART: [ldev] AUTHORITY.KEYID = 7
8,536,470 UART: [ldev] FE.KEYID = 1
8,547,347 UART: [ldev] Erasing FE.KEYID = 1
11,843,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,134,303 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,150,605 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,166,630 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,182,680 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,203,363 UART: [ldev] --
14,207,982 UART: [fwproc] Wait for Commands...
14,209,698 UART: [fwproc] Recv command 0x46574c44
14,212,055 UART: [fwproc] Recv'd Img size: 78576 bytes
17,874,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,949,493 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,018,219 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,210,313 >>> mbox cmd response: success
18,214,670 UART: [afmc] ++
18,215,310 UART: [afmc] CDI.KEYID = 6
18,216,505 UART: [afmc] SUBJECT.KEYID = 7
18,217,613 UART: [afmc] AUTHORITY.KEYID = 5
21,534,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,831,700 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,833,998 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,849,995 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,866,111 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,882,156 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,904,768 UART: [afmc] --
23,908,739 UART: [cold-reset] --
23,913,736 UART: [state] Locking Datavault
23,919,576 UART: [state] Locking PCR0, PCR1 and PCR31
23,921,230 UART: [state] Locking ICCM
23,924,300 UART: [exit] Launching FMC @ 0x40000130
23,932,971 UART:
23,933,208 UART: Running Caliptra FMC ...
23,934,234 UART:
23,934,382 UART: [state] CFI Enabled
23,942,376 UART: [fht] FMC Alias Private Key: 7
26,272,826 UART: [art] Extend RT PCRs Done
26,274,048 UART: [art] Lock RT PCRs Done
26,275,893 UART: [art] Populate DV Done
26,281,539 UART: [fht] FMC Alias Private Key: 7
26,283,186 UART: [art] Derive CDI
26,284,004 UART: [art] Store in in slot 0x4
26,326,236 UART: [art] Derive Key Pair
26,327,295 UART: [art] Store priv key in slot 0x5
29,569,032 UART: [art] Derive Key Pair - Done
29,582,458 UART: [art] Signing Cert with AUTHO
29,583,796 UART: RITY.KEYID = 7
31,863,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,865,131 UART: [art] PUB.X = 5187C8B207E84C398B21A85BCE96B584AD7DAC135D93579715F175D9BDF5B0D08E7A4D82A31C5E1005E0D261B1907B0F
31,872,391 UART: [art] PUB.Y = D0267A643036F3D579D1908AEEFC6256C772831EBE9098D3B81D02612433C35F10F7A8731EEDF092667C74014415E30A
31,879,628 UART: [art] SIG.R = 4E120AB4DEE867C6B365241DA611EE84AE79FB8FCBD8696491E6487FE5F7A2E4E8F4D7CC12A856693AA2DBE991169A28
31,886,964 UART: [art] SIG.S = C9F2ECF4EF5B0B780EDA083405A777138E0D16106A503531534763D6B7559AA221977D746426EFE462FE25C6ADFC98B4
33,191,696 UART: mbox::rt_entry...
33,192,657 UART: ____ _ _ _ ____ _____
33,194,645 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,196,672 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,198,603 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,200,534 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,202,466 UART: |_|
33,203,303 UART:
33,314,752 UART: [rt] Runtime listening for mailbox commands...
33,316,760 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,317,539 >>> mbox cmd response data (0 bytes)
Initializing fuses
988 UART:
1,230 UART: Running Caliptra ROM ...
2,334 UART:
7,210,117 UART: [state] CFI Enabled
7,221,285 UART: [state] LifecycleState = Production
7,223,001 UART: [state] DebugLocked = Yes
7,224,492 UART: [state] Starting the WD Timer 40000000 cycles
7,230,720 UART: [kat] SHA2-256
7,412,669 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,424,192 UART: [kat] ++
7,424,709 UART: [kat] sha1
7,435,274 UART: [kat] SHA2-256
7,438,350 UART: [kat] SHA2-384
7,444,394 UART: [kat] SHA2-512-ACC
7,447,024 UART: [kat] ECC-384
10,701,269 UART: [kat] HMAC-384Kdf
10,713,605 UART: [kat] LMS
11,786,806 UART: [kat] --
11,791,841 UART: [warm-reset] ++
11,796,268 UART: [warm-reset] --
11,801,162 UART: [state] Locking Datavault
11,806,093 UART: [state] Locking PCR0, PCR1 and PCR31
11,808,235 UART: [state] Locking ICCM
11,809,976 UART: [exit] Launching FMC @ 0x40000130
11,818,642 UART:
11,818,880 UART: Running Caliptra FMC ...
11,819,980 UART:
11,820,139 UART: [state] CFI Enabled
11,822,193 UART: [aliasrt :skip pcr extension
11,823,438 UART: [art] Extend RT PCRs Done
11,824,575 UART: [art] Lock RT PCRs Done
11,825,858 UART: [art] Populate DV Done
11,831,368 UART: [fht] FMC Alias Private Key: 7
11,832,953 UART: [art] Derive CDI
11,833,767 UART: [art] Store in in slot 0x4
11,876,725 UART: [art] Derive Key Pair
11,877,770 UART: [art] Store priv key in slot 0x5
15,120,471 UART: [art] Derive Key Pair - Done
15,133,299 UART: [art] Signing Cert with AUTHO
15,134,647 UART: RITY.KEYID = 7
17,413,889 UART: [art] Erasing AUTHORITY.KEYID = 7
17,415,392 UART: [art] PUB.X = 5187C8B207E84C398B21A85BCE96B584AD7DAC135D93579715F175D9BDF5B0D08E7A4D82A31C5E1005E0D261B1907B0F
17,422,602 UART: [art] PUB.Y = D0267A643036F3D579D1908AEEFC6256C772831EBE9098D3B81D02612433C35F10F7A8731EEDF092667C74014415E30A
17,429,845 UART: [art] SIG.R = 4E120AB4DEE867C6B365241DA611EE84AE79FB8FCBD8696491E6487FE5F7A2E4E8F4D7CC12A856693AA2DBE991169A28
17,437,255 UART: [art] SIG.S = C9F2ECF4EF5B0B780EDA083405A777138E0D16106A503531534763D6B7559AA221977D746426EFE462FE25C6ADFC98B4
18,741,929 UART: mbox::rt_entry...
18,742,917 UART: ____ _ _ _ ____ _____
18,744,909 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,746,915 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,748,888 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,750,819 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,752,747 UART: |_|
18,753,588 UART:
22,279,635 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8576a88b0d970c1eed80b42488e856970fb8945f77c5f8ae68c87993d0d38cd89bd4643fc524fced5a5c17cad9caa734",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
191,872 UART:
192,239 UART: Running Caliptra ROM ...
193,410 UART:
602,924 UART: [state] CFI Enabled
613,905 UART: [state] LifecycleState = Production
616,104 UART: [state] DebugLocked = Yes
617,813 UART: [state] Starting the WD Timer 40000000 cycles
622,479 UART: [kat] SHA2-256
804,408 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
815,953 UART: [kat] ++
816,553 UART: [kat] sha1
826,685 UART: [kat] SHA2-256
829,718 UART: [kat] SHA2-384
834,715 UART: [kat] SHA2-512-ACC
837,296 UART: [kat] ECC-384
4,090,203 UART: [kat] HMAC-384Kdf
4,102,890 UART: [kat] LMS
5,176,014 UART: [kat] --
5,180,985 UART: [cold-reset] ++
5,183,147 UART: [fht] FHT @ 0x50003400
5,194,631 UART: [idev] ++
5,195,407 UART: [idev] CDI.KEYID = 6
5,196,525 UART: [idev] SUBJECT.KEYID = 7
5,197,990 UART: [idev] UDS.KEYID = 0
5,199,188 ready_for_fw is high
5,199,411 <<< Executing mbox cmd 0x46574c44 (78576 bytes) from SoC
5,298,227 UART: [idev] Erasing UDS.KEYID = 0
8,490,698 UART: [idev] Sha1 KeyId Algorithm
8,512,412 UART: [idev] --
8,515,874 UART: [ldev] ++
8,516,456 UART: [ldev] CDI.KEYID = 6
8,517,645 UART: [ldev] SUBJECT.KEYID = 5
8,518,813 UART: [ldev] AUTHORITY.KEYID = 7
8,520,051 UART: [ldev] FE.KEYID = 1
8,531,136 UART: [ldev] Erasing FE.KEYID = 1
11,823,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
14,116,522 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
14,132,889 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
14,148,875 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
14,164,984 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
14,185,764 UART: [ldev] --
14,190,597 UART: [fwproc] Wait for Commands...
14,193,391 UART: [fwproc] Recv command 0x46574c44
14,195,703 UART: [fwproc] Recv'd Img size: 78576 bytes
17,856,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
17,936,450 UART: [fwproc] Load FMC at address 0x40000000 len 18820
18,005,201 UART: [fwproc] Load Runtime at address 0x40005000 len 53872
18,198,341 >>> mbox cmd response: success
18,201,780 UART: [afmc] ++
18,202,398 UART: [afmc] CDI.KEYID = 6
18,203,541 UART: [afmc] SUBJECT.KEYID = 7
18,204,704 UART: [afmc] AUTHORITY.KEYID = 5
21,523,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
23,819,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
23,821,977 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,838,015 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,854,125 UART: [afmc] SIG.R = 93B06FA6763867EE56BF52F4660906053613AE7BD7044BD1ADF46693E4A4ACC430F426CF41C667ADAA151BF1C7CA06EC
23,870,164 UART: [afmc] SIG.S = E3C80AE5EA117BC9B7DCFAB73B4464436BAFC2D8F149DA6AC31A647CC5D2FBB8B9BD53144CF1C677B6D82B33B290157E
23,892,953 UART: [afmc] --
23,897,082 UART: [cold-reset] --
23,901,131 UART: [state] Locking Datavault
23,906,600 UART: [state] Locking PCR0, PCR1 and PCR31
23,908,302 UART: [state] Locking ICCM
23,910,991 UART: [exit] Launching FMC @ 0x40000130
23,919,663 UART:
23,919,942 UART: Running Caliptra FMC ...
23,921,051 UART:
23,921,224 UART: [state] CFI Enabled
23,928,786 UART: [fht] FMC Alias Private Key: 7
26,260,204 UART: [art] Extend RT PCRs Done
26,261,421 UART: [art] Lock RT PCRs Done
26,263,156 UART: [art] Populate DV Done
26,268,404 UART: [fht] FMC Alias Private Key: 7
26,269,889 UART: [art] Derive CDI
26,270,656 UART: [art] Store in in slot 0x4
26,313,355 UART: [art] Derive Key Pair
26,314,373 UART: [art] Store priv key in slot 0x5
29,556,339 UART: [art] Derive Key Pair - Done
29,569,707 UART: [art] Signing Cert with AUTHO
29,571,019 UART: RITY.KEYID = 7
31,850,939 UART: [art] Erasing AUTHORITY.KEYID = 7
31,852,472 UART: [art] PUB.X = 682BB978F7778F674DCBB0A6DFB5B432BF20816EA003287DFF49E06DC454D637ED759388EC326A9B6F3C7F54871B88E0
31,859,731 UART: [art] PUB.Y = B42DDF2671179FEAFF06383370E106B241D51C46FE234DF5B6074333B15E719EC7E241D64F268C9AF2D5248F10A00620
31,866,968 UART: [art] SIG.R = B95C017B071BE739CD328C4F2A667304D94ECE8C8CB2038CA08F8EE62139667AB738C12C32C8A3265518C78D877BC501
31,874,303 UART: [art] SIG.S = B37DECD83AC01CC09E94B72B0BE47B54288F744BC9CABBB362C309DFAEDA72E33169D2D5A23C515494E3508D24F917A9
33,179,163 UART: mbox::rt_entry...
33,180,112 UART: ____ _ _ _ ____ _____
33,182,096 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
33,184,110 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
33,186,046 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
33,187,985 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
33,189,885 UART: |_|
33,190,728 UART:
33,303,503 UART: [rt] Runtime listening for mailbox commands...
33,305,516 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
33,306,287 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,007 UART:
1,269 UART: Running Caliptra ROM ...
2,378 UART:
7,211,783 UART: [state] CFI Enabled
7,223,343 UART: [state] LifecycleState = Production
7,225,066 UART: [state] DebugLocked = Yes
7,226,930 UART: [state] Starting the WD Timer 40000000 cycles
7,232,751 UART: [kat] SHA2-256
7,414,744 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
7,426,227 UART: [kat] ++
7,426,751 UART: [kat] sha1
7,436,525 UART: [kat] SHA2-256
7,439,547 UART: [kat] SHA2-384
7,445,858 UART: [kat] SHA2-512-ACC
7,448,434 UART: [kat] ECC-384
10,703,981 UART: [kat] HMAC-384Kdf
10,716,809 UART: [kat] LMS
11,789,956 UART: [kat] --
11,793,361 UART: [warm-reset] ++
11,797,998 UART: [warm-reset] --
11,802,502 UART: [state] Locking Datavault
11,805,913 UART: [state] Locking PCR0, PCR1 and PCR31
11,808,099 UART: [state] Locking ICCM
11,810,946 UART: [exit] Launching FMC @ 0x40000130
11,819,631 UART:
11,819,871 UART: Running Caliptra FMC ...
11,820,974 UART:
11,821,153 UART: [state] CFI Enabled
11,823,102 UART: [aliasrt :skip pcr extension
11,824,350 UART: [art] Extend RT PCRs Done
11,825,487 UART: [art] Lock RT PCRs Done
11,826,664 UART: [art] Populate DV Done
11,832,252 UART: [fht] FMC Alias Private Key: 7
11,833,842 UART: [art] Derive CDI
11,834,654 UART: [art] Store in in slot 0x4
11,877,663 UART: [art] Derive Key Pair
11,878,682 UART: [art] Store priv key in slot 0x5
15,120,541 UART: [art] Derive Key Pair - Done
15,133,914 UART: [art] Signing Cert with AUTHO
15,135,217 UART: RITY.KEYID = 7
17,414,582 UART: [art] Erasing AUTHORITY.KEYID = 7
17,416,081 UART: [art] PUB.X = 682BB978F7778F674DCBB0A6DFB5B432BF20816EA003287DFF49E06DC454D637ED759388EC326A9B6F3C7F54871B88E0
17,423,338 UART: [art] PUB.Y = B42DDF2671179FEAFF06383370E106B241D51C46FE234DF5B6074333B15E719EC7E241D64F268C9AF2D5248F10A00620
17,430,550 UART: [art] SIG.R = B95C017B071BE739CD328C4F2A667304D94ECE8C8CB2038CA08F8EE62139667AB738C12C32C8A3265518C78D877BC501
17,437,905 UART: [art] SIG.S = B37DECD83AC01CC09E94B72B0BE47B54288F744BC9CABBB362C309DFAEDA72E33169D2D5A23C515494E3508D24F917A9
18,742,893 UART: mbox::rt_entry...
18,743,862 UART: ____ _ _ _ ____ _____
18,745,795 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,747,803 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,749,663 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,751,599 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,753,531 UART: |_|
18,754,345 UART:
22,285,890 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
191,704 UART:
192,079 UART: Running Caliptra ROM ...
193,253 UART:
193,409 UART: [state] CFI Enabled
260,976 UART: [state] LifecycleState = Production
262,711 UART: [state] DebugLocked = Yes
265,206 UART: [state] Starting the WD Timer 40000000 cycles
270,727 UART: [kat] SHA2-256
449,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,494 UART: [kat] ++
462,026 UART: [kat] sha1
473,296 UART: [kat] SHA2-256
476,321 UART: [kat] SHA2-384
483,837 UART: [kat] SHA2-512-ACC
486,854 UART: [kat] ECC-384
2,950,562 UART: [kat] HMAC-384Kdf
2,971,054 UART: [kat] LMS
3,500,525 UART: [kat] --
3,504,589 UART: [cold-reset] ++
3,506,590 UART: [fht] FHT @ 0x50003400
3,516,942 UART: [idev] ++
3,517,540 UART: [idev] CDI.KEYID = 6
3,518,467 UART: [idev] SUBJECT.KEYID = 7
3,519,573 UART: [idev] UDS.KEYID = 0
3,520,621 ready_for_fw is high
3,520,819 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,619,733 UART: [idev] Erasing UDS.KEYID = 0
6,027,986 UART: [idev] Sha1 KeyId Algorithm
6,051,779 UART: [idev] --
6,055,027 UART: [ldev] ++
6,055,604 UART: [ldev] CDI.KEYID = 6
6,056,488 UART: [ldev] SUBJECT.KEYID = 5
6,057,702 UART: [ldev] AUTHORITY.KEYID = 7
6,059,013 UART: [ldev] FE.KEYID = 1
6,101,577 UART: [ldev] Erasing FE.KEYID = 1
8,604,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,324 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,310 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,119 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,068 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,410,474 UART: [ldev] --
10,414,664 UART: [fwproc] Wait for Commands...
10,416,383 UART: [fwproc] Recv command 0x46574c44
10,418,479 UART: [fwproc] Recv'd Img size: 78532 bytes
13,411,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,479,908 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,548,710 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,740,755 >>> mbox cmd response: success
13,745,053 UART: [afmc] ++
13,745,694 UART: [afmc] CDI.KEYID = 6
13,746,615 UART: [afmc] SUBJECT.KEYID = 7
13,747,777 UART: [afmc] AUTHORITY.KEYID = 5
16,274,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,998,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,999,905 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,015,901 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,031,765 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,047,506 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,071,296 UART: [afmc] --
18,075,031 UART: [cold-reset] --
18,078,306 UART: [state] Locking Datavault
18,084,648 UART: [state] Locking PCR0, PCR1 and PCR31
18,086,296 UART: [state] Locking ICCM
18,087,964 UART: [exit] Launching FMC @ 0x40000130
18,096,364 UART:
18,096,627 UART: Running Caliptra FMC ...
18,097,736 UART:
18,097,901 UART: [state] CFI Enabled
18,158,868 UART: [fht] FMC Alias Private Key: 7
19,923,215 UART: [art] Extend RT PCRs Done
19,924,430 UART: [art] Lock RT PCRs Done
19,926,191 UART: [art] Populate DV Done
19,931,493 UART: [fht] FMC Alias Private Key: 7
19,933,190 UART: [art] Derive CDI
19,934,007 UART: [art] Store in in slot 0x4
19,991,426 UART: [art] Derive Key Pair
19,992,421 UART: [art] Store priv key in slot 0x5
22,455,133 UART: [art] Derive Key Pair - Done
22,467,912 UART: [art] Signing Cert with AUTHO
22,469,215 UART: RITY.KEYID = 7
24,180,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,182,170 UART: [art] PUB.X = 54C408F86A666869A032C0DB79447B69ADA8A5C3FEA8AAF6D61A66F05114969F2EA881E791DC5B4433F8F0BE507939F8
24,189,383 UART: [art] PUB.Y = FA25DB7A274DFB644AA22A8EE61C95FD7D9E5CC52A9019BD8C6F2E1056558123CD84AF72C04BBFB8378D06FCFC0B34A2
24,196,699 UART: [art] SIG.R = 738BAB7E5640E968AA84943B435CB9A6997BDC32A6309E15EE9E0A2D23833C522CA1FAB15A5B736B4C91FEE19FDDF013
24,204,112 UART: [art] SIG.S = 2426BF53C8F760E91BF81D91352E1AB4C2AA1C12424E98CDAD3EFA9EE661B8E6EB1B0FB657BF5E7BE46BDC058CC85116
25,182,673 UART: mbox::rt_entry...
25,183,643 UART: ____ _ _ _ ____ _____
25,185,628 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,187,635 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,189,565 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,191,503 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,193,435 UART: |_|
25,194,244 UART:
25,307,774 UART: [rt] Runtime listening for mailbox commands...
25,309,795 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,310,517 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,023 UART:
1,288 UART: Running Caliptra ROM ...
2,390 UART:
2,547 UART: [state] CFI Enabled
65,270 UART: [state] LifecycleState = Production
66,977 UART: [state] DebugLocked = Yes
68,530 UART: [state] Starting the WD Timer 40000000 cycles
73,749 UART: [kat] SHA2-256
252,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
264,484 UART: [kat] ++
264,927 UART: [kat] sha1
275,805 UART: [kat] SHA2-256
278,869 UART: [kat] SHA2-384
285,868 UART: [kat] SHA2-512-ACC
288,842 UART: [kat] ECC-384
2,747,426 UART: [kat] HMAC-384Kdf
2,769,222 UART: [kat] LMS
3,298,716 UART: [kat] --
3,304,917 UART: [warm-reset] ++
3,309,601 UART: [warm-reset] --
3,312,275 UART: [state] Locking Datavault
3,315,364 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,016 UART: [state] Locking ICCM
3,319,170 UART: [exit] Launching FMC @ 0x40000130
3,327,640 UART:
3,327,939 UART: Running Caliptra FMC ...
3,329,056 UART:
3,329,221 UART: [state] CFI Enabled
3,379,427 UART: [aliasrt :skip pcr extension
3,380,685 UART: [art] Extend RT PCRs Done
3,381,825 UART: [art] Lock RT PCRs Done
3,382,893 UART: [art] Populate DV Done
3,388,371 UART: [fht] FMC Alias Private Key: 7
3,390,125 UART: [art] Derive CDI
3,390,939 UART: [art] Store in in slot 0x4
3,448,102 UART: [art] Derive Key Pair
3,449,161 UART: [art] Store priv key in slot 0x5
5,911,481 UART: [art] Derive Key Pair - Done
5,924,583 UART: [art] Signing Cert with AUTHO
5,925,885 UART: RITY.KEYID = 7
7,637,977 UART: [art] Erasing AUTHORITY.KEYID = 7
7,639,485 UART: [art] PUB.X = 54C408F86A666869A032C0DB79447B69ADA8A5C3FEA8AAF6D61A66F05114969F2EA881E791DC5B4433F8F0BE507939F8
7,646,771 UART: [art] PUB.Y = FA25DB7A274DFB644AA22A8EE61C95FD7D9E5CC52A9019BD8C6F2E1056558123CD84AF72C04BBFB8378D06FCFC0B34A2
7,654,027 UART: [art] SIG.R = 738BAB7E5640E968AA84943B435CB9A6997BDC32A6309E15EE9E0A2D23833C522CA1FAB15A5B736B4C91FEE19FDDF013
7,661,434 UART: [art] SIG.S = 2426BF53C8F760E91BF81D91352E1AB4C2AA1C12424E98CDAD3EFA9EE661B8E6EB1B0FB657BF5E7BE46BDC058CC85116
8,639,749 UART: mbox::rt_entry...
8,640,692 UART: ____ _ _ _ ____ _____
8,642,673 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,646,641 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,648,580 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,650,516 UART: |_|
8,651,320 UART:
11,417,059 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
191,595 UART:
191,970 UART: Running Caliptra ROM ...
193,144 UART:
193,306 UART: [state] CFI Enabled
266,102 UART: [state] LifecycleState = Production
267,822 UART: [state] DebugLocked = Yes
270,202 UART: [state] Starting the WD Timer 40000000 cycles
275,222 UART: [kat] SHA2-256
454,342 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,955 UART: [kat] ++
466,486 UART: [kat] sha1
477,818 UART: [kat] SHA2-256
480,839 UART: [kat] SHA2-384
488,034 UART: [kat] SHA2-512-ACC
490,990 UART: [kat] ECC-384
2,948,038 UART: [kat] HMAC-384Kdf
2,971,888 UART: [kat] LMS
3,501,384 UART: [kat] --
3,504,976 UART: [cold-reset] ++
3,506,128 UART: [fht] FHT @ 0x50003400
3,515,685 UART: [idev] ++
3,516,306 UART: [idev] CDI.KEYID = 6
3,517,204 UART: [idev] SUBJECT.KEYID = 7
3,518,329 UART: [idev] UDS.KEYID = 0
3,519,322 ready_for_fw is high
3,519,531 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,618,652 UART: [idev] Erasing UDS.KEYID = 0
6,024,438 UART: [idev] Sha1 KeyId Algorithm
6,047,691 UART: [idev] --
6,052,352 UART: [ldev] ++
6,052,933 UART: [ldev] CDI.KEYID = 6
6,053,845 UART: [ldev] SUBJECT.KEYID = 5
6,055,010 UART: [ldev] AUTHORITY.KEYID = 7
6,056,303 UART: [ldev] FE.KEYID = 1
6,099,418 UART: [ldev] Erasing FE.KEYID = 1
8,604,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,615 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,603 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,374,416 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,390,376 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,411,851 UART: [ldev] --
10,417,153 UART: [fwproc] Wait for Commands...
10,419,203 UART: [fwproc] Recv command 0x46574c44
10,421,306 UART: [fwproc] Recv'd Img size: 78532 bytes
13,416,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,491,357 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,560,161 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,752,259 >>> mbox cmd response: success
13,756,827 UART: [afmc] ++
13,757,451 UART: [afmc] CDI.KEYID = 6
13,758,365 UART: [afmc] SUBJECT.KEYID = 7
13,759,527 UART: [afmc] AUTHORITY.KEYID = 5
16,294,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,019,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,021,468 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,037,425 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,053,333 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,069,028 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,092,940 UART: [afmc] --
18,097,303 UART: [cold-reset] --
18,100,935 UART: [state] Locking Datavault
18,107,747 UART: [state] Locking PCR0, PCR1 and PCR31
18,109,445 UART: [state] Locking ICCM
18,111,972 UART: [exit] Launching FMC @ 0x40000130
18,120,419 UART:
18,120,662 UART: Running Caliptra FMC ...
18,121,762 UART:
18,121,922 UART: [state] CFI Enabled
18,177,092 UART: [fht] FMC Alias Private Key: 7
19,940,870 UART: [art] Extend RT PCRs Done
19,942,095 UART: [art] Lock RT PCRs Done
19,943,807 UART: [art] Populate DV Done
19,949,166 UART: [fht] FMC Alias Private Key: 7
19,950,650 UART: [art] Derive CDI
19,951,417 UART: [art] Store in in slot 0x4
20,009,425 UART: [art] Derive Key Pair
20,010,483 UART: [art] Store priv key in slot 0x5
22,473,460 UART: [art] Derive Key Pair - Done
22,486,528 UART: [art] Signing Cert with AUTHO
22,487,839 UART: RITY.KEYID = 7
24,200,089 UART: [art] Erasing AUTHORITY.KEYID = 7
24,201,597 UART: [art] PUB.X = 61861F7F55C9378763C67B4107076BF715DAEC3DB9A666C23E9C57E705A161D4FB494AC4156EB241DA8E92D949255F16
24,208,841 UART: [art] PUB.Y = 0C17582D478A759FB4F4196A4787E35ECE79A9F4312934629016E94CCFC6F7477D0943A6AEB83235CA563F03E3583470
24,216,064 UART: [art] SIG.R = 633E81240669585753C00FE9F5F1F912733D02F2CF01DAFB45E5CBC204CA8EF5F9D94564F970DA46F4A72A72E480A4A4
24,223,456 UART: [art] SIG.S = BC2CF9CE6616B1FC87807C28AC13BB67901D6093A20169E31B532112BB96101F4F00BA28D688A0D02195EF764C8261B5
25,201,920 UART: mbox::rt_entry...
25,202,880 UART: ____ _ _ _ ____ _____
25,204,863 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,206,866 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,208,795 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,210,925 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,212,866 UART: |_|
25,213,694 UART:
25,327,089 UART: [rt] Runtime listening for mailbox commands...
25,329,106 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,329,883 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,047 UART:
1,317 UART: Running Caliptra ROM ...
2,420 UART:
2,573 UART: [state] CFI Enabled
63,332 UART: [state] LifecycleState = Production
65,104 UART: [state] DebugLocked = Yes
67,166 UART: [state] Starting the WD Timer 40000000 cycles
72,328 UART: [kat] SHA2-256
251,508 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,031 UART: [kat] ++
263,566 UART: [kat] sha1
274,632 UART: [kat] SHA2-256
277,637 UART: [kat] SHA2-384
283,181 UART: [kat] SHA2-512-ACC
286,150 UART: [kat] ECC-384
2,747,959 UART: [kat] HMAC-384Kdf
2,769,884 UART: [kat] LMS
3,299,391 UART: [kat] --
3,302,673 UART: [warm-reset] ++
3,307,791 UART: [warm-reset] --
3,310,791 UART: [state] Locking Datavault
3,312,959 UART: [state] Locking PCR0, PCR1 and PCR31
3,314,671 UART: [state] Locking ICCM
3,316,713 UART: [exit] Launching FMC @ 0x40000130
3,325,113 UART:
3,325,390 UART: Running Caliptra FMC ...
3,326,497 UART:
3,326,679 UART: [state] CFI Enabled
3,378,450 UART: [aliasrt :skip pcr extension
3,379,706 UART: [art] Extend RT PCRs Done
3,380,847 UART: [art] Lock RT PCRs Done
3,382,244 UART: [art] Populate DV Done
3,387,708 UART: [fht] FMC Alias Private Key: 7
3,389,407 UART: [art] Derive CDI
3,390,220 UART: [art] Store in in slot 0x4
3,447,195 UART: [art] Derive Key Pair
3,448,236 UART: [art] Store priv key in slot 0x5
5,911,142 UART: [art] Derive Key Pair - Done
5,924,084 UART: [art] Signing Cert with AUTHO
5,925,395 UART: RITY.KEYID = 7
7,637,278 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,795 UART: [art] PUB.X = 61861F7F55C9378763C67B4107076BF715DAEC3DB9A666C23E9C57E705A161D4FB494AC4156EB241DA8E92D949255F16
7,646,060 UART: [art] PUB.Y = 0C17582D478A759FB4F4196A4787E35ECE79A9F4312934629016E94CCFC6F7477D0943A6AEB83235CA563F03E3583470
7,653,257 UART: [art] SIG.R = 633E81240669585753C00FE9F5F1F912733D02F2CF01DAFB45E5CBC204CA8EF5F9D94564F970DA46F4A72A72E480A4A4
7,660,646 UART: [art] SIG.S = BC2CF9CE6616B1FC87807C28AC13BB67901D6093A20169E31B532112BB96101F4F00BA28D688A0D02195EF764C8261B5
8,639,222 UART: mbox::rt_entry...
8,640,164 UART: ____ _ _ _ ____ _____
8,642,095 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,644,099 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,961 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,888 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,776 UART: |_|
8,650,604 UART:
11,415,943 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,681 writing to cptra_bootfsm_go
192,316 UART:
192,685 UART: Running Caliptra ROM ...
193,761 UART:
603,604 UART: [state] CFI Enabled
622,112 UART: [state] LifecycleState = Production
623,822 UART: [state] DebugLocked = Yes
626,675 UART: [state] Starting the WD Timer 40000000 cycles
630,998 UART: [kat] SHA2-256
810,102 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
821,668 UART: [kat] ++
822,117 UART: [kat] sha1
833,157 UART: [kat] SHA2-256
836,185 UART: [kat] SHA2-384
843,098 UART: [kat] SHA2-512-ACC
846,113 UART: [kat] ECC-384
3,289,837 UART: [kat] HMAC-384Kdf
3,302,292 UART: [kat] LMS
3,831,806 UART: [kat] --
3,837,218 UART: [cold-reset] ++
3,838,799 UART: [fht] FHT @ 0x50003400
3,850,701 UART: [idev] ++
3,851,266 UART: [idev] CDI.KEYID = 6
3,852,261 UART: [idev] SUBJECT.KEYID = 7
3,853,355 UART: [idev] UDS.KEYID = 0
3,854,406 ready_for_fw is high
3,854,614 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,953,310 UART: [idev] Erasing UDS.KEYID = 0
6,322,612 UART: [idev] Sha1 KeyId Algorithm
6,345,762 UART: [idev] --
6,349,541 UART: [ldev] ++
6,350,107 UART: [ldev] CDI.KEYID = 6
6,350,992 UART: [ldev] SUBJECT.KEYID = 5
6,352,255 UART: [ldev] AUTHORITY.KEYID = 7
6,353,486 UART: [ldev] FE.KEYID = 1
6,362,646 UART: [ldev] Erasing FE.KEYID = 1
8,832,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,042 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,562,034 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,577,859 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,593,772 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,613,893 UART: [ldev] --
10,617,682 UART: [fwproc] Wait for Commands...
10,619,674 UART: [fwproc] Recv command 0x46574c44
10,621,764 UART: [fwproc] Recv'd Img size: 78532 bytes
13,617,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,689,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,758,374 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,950,167 >>> mbox cmd response: success
13,954,005 UART: [afmc] ++
13,954,623 UART: [afmc] CDI.KEYID = 6
13,955,513 UART: [afmc] SUBJECT.KEYID = 7
13,956,679 UART: [afmc] AUTHORITY.KEYID = 5
16,453,280 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,175,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,177,216 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,193,169 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,209,052 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,224,758 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,247,551 UART: [afmc] --
18,250,701 UART: [cold-reset] --
18,253,289 UART: [state] Locking Datavault
18,256,750 UART: [state] Locking PCR0, PCR1 and PCR31
18,258,446 UART: [state] Locking ICCM
18,260,600 UART: [exit] Launching FMC @ 0x40000130
18,269,050 UART:
18,269,293 UART: Running Caliptra FMC ...
18,270,395 UART:
18,270,556 UART: [state] CFI Enabled
18,278,979 UART: [fht] FMC Alias Private Key: 7
20,035,604 UART: [art] Extend RT PCRs Done
20,036,835 UART: [art] Lock RT PCRs Done
20,038,136 UART: [art] Populate DV Done
20,043,556 UART: [fht] FMC Alias Private Key: 7
20,045,203 UART: [art] Derive CDI
20,046,019 UART: [art] Store in in slot 0x4
20,088,088 UART: [art] Derive Key Pair
20,089,284 UART: [art] Store priv key in slot 0x5
22,516,110 UART: [art] Derive Key Pair - Done
22,529,758 UART: [art] Signing Cert with AUTHO
22,531,242 UART: RITY.KEYID = 7
24,236,525 UART: [art] Erasing AUTHORITY.KEYID = 7
24,238,026 UART: [art] PUB.X = 67861FEEABBC0694FCDDD2426A4F07968BFBDFE56A6DD584EFCC93924CB001053047D87B4D236400C213CB7ED6CFB940
24,245,354 UART: [art] PUB.Y = 8E2303F64056E17DDF236E4AF68AD3C788E0472384F6A3497222F07FB5DFFE66034232A2EB829152752DEC7883CABDD0
24,252,603 UART: [art] SIG.R = 932837C3AA71B39FBD7C044AF6DE9666EBEFB72A43C8D881FF760C89BC7851A1B4AC35F3588A7EC71F69DEFF078DBF7D
24,260,004 UART: [art] SIG.S = 6077DA88F770CDD5A1E926C267A01523CF9F3FC1B4FB3F3092CE5345EC70ED889D628DA2BA7B00E97315D2534C29A47D
25,237,637 UART: mbox::rt_entry...
25,238,599 UART: ____ _ _ _ ____ _____
25,240,585 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,242,591 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,244,521 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,246,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,248,305 UART: |_|
25,249,193 UART:
25,362,403 UART: [rt] Runtime listening for mailbox commands...
25,364,420 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,365,197 >>> mbox cmd response data (0 bytes)
Initializing fuses
987 UART:
1,240 UART: Running Caliptra ROM ...
2,293 UART:
15,168,021 UART: [state] CFI Enabled
15,183,860 UART: [state] LifecycleState = Production
15,185,606 UART: [state] DebugLocked = Yes
15,188,239 UART: [state] Starting the WD Timer 40000000 cycles
15,193,186 UART: [kat] SHA2-256
15,372,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,383,921 UART: [kat] ++
15,384,377 UART: [kat] sha1
15,394,636 UART: [kat] SHA2-256
15,397,704 UART: [kat] SHA2-384
15,404,877 UART: [kat] SHA2-512-ACC
15,407,750 UART: [kat] ECC-384
17,848,776 UART: [kat] HMAC-384Kdf
17,860,521 UART: [kat] LMS
18,390,030 UART: [kat] --
18,392,625 UART: [warm-reset] ++
18,398,169 UART: [warm-reset] --
18,401,594 UART: [state] Locking Datavault
18,403,650 UART: [state] Locking PCR0, PCR1 and PCR31
18,405,292 UART: [state] Locking ICCM
18,406,878 UART: [exit] Launching FMC @ 0x40000130
18,415,269 UART:
18,415,504 UART: Running Caliptra FMC ...
18,416,527 UART:
18,416,693 UART: [state] CFI Enabled
18,418,643 UART: [aliasrt :skip pcr extension
18,419,885 UART: [art] Extend RT PCRs Done
18,420,943 UART: [art] Lock RT PCRs Done
18,422,055 UART: [art] Populate DV Done
18,427,731 UART: [fht] FMC Alias Private Key: 7
18,429,206 UART: [art] Derive CDI
18,429,940 UART: [art] Store in in slot 0x4
18,472,851 UART: [art] Derive Key Pair
18,473,902 UART: [art] Store priv key in slot 0x5
20,900,988 UART: [art] Derive Key Pair - Done
20,913,770 UART: [art] Signing Cert with AUTHO
20,915,071 UART: RITY.KEYID = 7
22,620,711 UART: [art] Erasing AUTHORITY.KEYID = 7
22,622,216 UART: [art] PUB.X = 67861FEEABBC0694FCDDD2426A4F07968BFBDFE56A6DD584EFCC93924CB001053047D87B4D236400C213CB7ED6CFB940
22,629,528 UART: [art] PUB.Y = 8E2303F64056E17DDF236E4AF68AD3C788E0472384F6A3497222F07FB5DFFE66034232A2EB829152752DEC7883CABDD0
22,636,791 UART: [art] SIG.R = 932837C3AA71B39FBD7C044AF6DE9666EBEFB72A43C8D881FF760C89BC7851A1B4AC35F3588A7EC71F69DEFF078DBF7D
22,644,191 UART: [art] SIG.S = 6077DA88F770CDD5A1E926C267A01523CF9F3FC1B4FB3F3092CE5345EC70ED889D628DA2BA7B00E97315D2534C29A47D
23,622,004 UART: mbox::rt_entry...
23,622,970 UART: ____ _ _ _ ____ _____
23,624,897 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,626,901 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,628,755 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,630,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,632,531 UART: |_|
23,633,413 UART:
26,350,866 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,753 writing to cptra_bootfsm_go
192,396 UART:
192,763 UART: Running Caliptra ROM ...
193,855 UART:
603,460 UART: [state] CFI Enabled
614,797 UART: [state] LifecycleState = Production
616,484 UART: [state] DebugLocked = Yes
618,961 UART: [state] Starting the WD Timer 40000000 cycles
624,276 UART: [kat] SHA2-256
803,458 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,987 UART: [kat] ++
815,437 UART: [kat] sha1
827,680 UART: [kat] SHA2-256
830,760 UART: [kat] SHA2-384
838,096 UART: [kat] SHA2-512-ACC
841,046 UART: [kat] ECC-384
3,284,069 UART: [kat] HMAC-384Kdf
3,296,434 UART: [kat] LMS
3,825,935 UART: [kat] --
3,829,628 UART: [cold-reset] ++
3,830,772 UART: [fht] FHT @ 0x50003400
3,841,966 UART: [idev] ++
3,842,530 UART: [idev] CDI.KEYID = 6
3,843,666 UART: [idev] SUBJECT.KEYID = 7
3,844,790 UART: [idev] UDS.KEYID = 0
3,845,725 ready_for_fw is high
3,845,953 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,944,844 UART: [idev] Erasing UDS.KEYID = 0
6,315,611 UART: [idev] Sha1 KeyId Algorithm
6,338,719 UART: [idev] --
6,342,199 UART: [ldev] ++
6,342,772 UART: [ldev] CDI.KEYID = 6
6,343,680 UART: [ldev] SUBJECT.KEYID = 5
6,344,840 UART: [ldev] AUTHORITY.KEYID = 7
6,346,126 UART: [ldev] FE.KEYID = 1
6,356,501 UART: [ldev] Erasing FE.KEYID = 1
8,832,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,588 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,566,563 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,582,385 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,598,374 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,618,663 UART: [ldev] --
10,624,036 UART: [fwproc] Wait for Commands...
10,626,722 UART: [fwproc] Recv command 0x46574c44
10,628,814 UART: [fwproc] Recv'd Img size: 78532 bytes
13,627,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,705,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,774,383 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,967,663 >>> mbox cmd response: success
13,972,670 UART: [afmc] ++
13,973,278 UART: [afmc] CDI.KEYID = 6
13,974,196 UART: [afmc] SUBJECT.KEYID = 7
13,975,358 UART: [afmc] AUTHORITY.KEYID = 5
16,473,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,194,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,196,857 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,212,814 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,228,687 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,244,389 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,267,533 UART: [afmc] --
18,270,958 UART: [cold-reset] --
18,273,749 UART: [state] Locking Datavault
18,279,421 UART: [state] Locking PCR0, PCR1 and PCR31
18,281,067 UART: [state] Locking ICCM
18,283,307 UART: [exit] Launching FMC @ 0x40000130
18,291,758 UART:
18,291,989 UART: Running Caliptra FMC ...
18,293,036 UART:
18,293,192 UART: [state] CFI Enabled
18,301,511 UART: [fht] FMC Alias Private Key: 7
20,058,422 UART: [art] Extend RT PCRs Done
20,059,654 UART: [art] Lock RT PCRs Done
20,061,299 UART: [art] Populate DV Done
20,066,700 UART: [fht] FMC Alias Private Key: 7
20,068,247 UART: [art] Derive CDI
20,069,017 UART: [art] Store in in slot 0x4
20,111,709 UART: [art] Derive Key Pair
20,112,740 UART: [art] Store priv key in slot 0x5
22,539,254 UART: [art] Derive Key Pair - Done
22,551,763 UART: [art] Signing Cert with AUTHO
22,553,061 UART: RITY.KEYID = 7
24,258,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,259,900 UART: [art] PUB.X = BC8AFDDB2A966405F467C3B50CAB4BCCCB2805319DC4C8FDBCBF8E9190B93C75A4A7B2FCBBB3E09FACF5C448DD652A7B
24,267,255 UART: [art] PUB.Y = 654F18E8FEBD8185DB9D97ACF307B68364F5DEF6B6C197DBBD4C8B17C9DDBD9EFFC74D0FD8B8187BB010DD967AABF23B
24,274,541 UART: [art] SIG.R = D3004B809732E22CC2E705CF5EEDDA8E2DDB19B8EA051ABCFD843E82E64E2D4B62447BBFFAF2C116558CF69DB7841320
24,281,939 UART: [art] SIG.S = C5D80453FEA9BD8AD1346FE5EDC5C9AE3126304364FF4423C6235945D3EC30778B4DA25A9CA63CABDD2B6D69F4089F93
25,260,274 UART: mbox::rt_entry...
25,261,223 UART: ____ _ _ _ ____ _____
25,263,227 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,265,239 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,267,170 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,269,096 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,271,024 UART: |_|
25,271,863 UART:
25,384,938 UART: [rt] Runtime listening for mailbox commands...
25,386,973 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,387,752 >>> mbox cmd response data (0 bytes)
Initializing fuses
997 UART:
1,236 UART: Running Caliptra ROM ...
2,341 UART:
15,146,446 UART: [state] CFI Enabled
15,158,711 UART: [state] LifecycleState = Production
15,160,462 UART: [state] DebugLocked = Yes
15,162,341 UART: [state] Starting the WD Timer 40000000 cycles
15,167,848 UART: [kat] SHA2-256
15,346,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,358,535 UART: [kat] ++
15,358,994 UART: [kat] sha1
15,370,096 UART: [kat] SHA2-256
15,373,109 UART: [kat] SHA2-384
15,378,012 UART: [kat] SHA2-512-ACC
15,380,954 UART: [kat] ECC-384
17,824,925 UART: [kat] HMAC-384Kdf
17,836,226 UART: [kat] LMS
18,365,784 UART: [kat] --
18,369,775 UART: [warm-reset] ++
18,374,890 UART: [warm-reset] --
18,379,029 UART: [state] Locking Datavault
18,382,663 UART: [state] Locking PCR0, PCR1 and PCR31
18,384,327 UART: [state] Locking ICCM
18,385,560 UART: [exit] Launching FMC @ 0x40000130
18,393,998 UART:
18,394,253 UART: Running Caliptra FMC ...
18,395,358 UART:
18,395,517 UART: [state] CFI Enabled
18,397,576 UART: [aliasrt :skip pcr extension
18,398,819 UART: [art] Extend RT PCRs Done
18,399,956 UART: [art] Lock RT PCRs Done
18,401,454 UART: [art] Populate DV Done
18,407,179 UART: [fht] FMC Alias Private Key: 7
18,408,714 UART: [art] Derive CDI
18,409,526 UART: [art] Store in in slot 0x4
18,452,446 UART: [art] Derive Key Pair
18,453,457 UART: [art] Store priv key in slot 0x5
20,880,368 UART: [art] Derive Key Pair - Done
20,893,489 UART: [art] Signing Cert with AUTHO
20,894,800 UART: RITY.KEYID = 7
22,600,459 UART: [art] Erasing AUTHORITY.KEYID = 7
22,601,950 UART: [art] PUB.X = BC8AFDDB2A966405F467C3B50CAB4BCCCB2805319DC4C8FDBCBF8E9190B93C75A4A7B2FCBBB3E09FACF5C448DD652A7B
22,609,311 UART: [art] PUB.Y = 654F18E8FEBD8185DB9D97ACF307B68364F5DEF6B6C197DBBD4C8B17C9DDBD9EFFC74D0FD8B8187BB010DD967AABF23B
22,616,597 UART: [art] SIG.R = D3004B809732E22CC2E705CF5EEDDA8E2DDB19B8EA051ABCFD843E82E64E2D4B62447BBFFAF2C116558CF69DB7841320
22,623,984 UART: [art] SIG.S = C5D80453FEA9BD8AD1346FE5EDC5C9AE3126304364FF4423C6235945D3EC30778B4DA25A9CA63CABDD2B6D69F4089F93
23,602,571 UART: mbox::rt_entry...
23,603,886 UART: ____ _ _ _ ____ _____
23,605,801 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,607,814 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,609,671 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,611,597 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,613,450 UART: |_|
23,614,255 UART:
26,327,933 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
191,582 UART:
191,963 UART: Running Caliptra ROM ...
193,045 UART:
193,190 UART: [state] CFI Enabled
265,291 UART: [state] LifecycleState = Production
267,093 UART: [state] DebugLocked = Yes
269,936 UART: [state] Starting the WD Timer 40000000 cycles
274,750 UART: [kat] SHA2-256
453,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,478 UART: [kat] ++
465,922 UART: [kat] sha1
476,822 UART: [kat] SHA2-256
479,907 UART: [kat] SHA2-384
485,068 UART: [kat] SHA2-512-ACC
488,012 UART: [kat] ECC-384
2,950,349 UART: [kat] HMAC-384Kdf
2,971,821 UART: [kat] LMS
3,501,363 UART: [kat] --
3,505,501 UART: [cold-reset] ++
3,506,791 UART: [fht] FHT @ 0x50003400
3,517,411 UART: [idev] ++
3,517,967 UART: [idev] CDI.KEYID = 6
3,518,849 UART: [idev] SUBJECT.KEYID = 7
3,520,085 UART: [idev] UDS.KEYID = 0
3,520,989 ready_for_fw is high
3,521,181 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,620,110 UART: [idev] Erasing UDS.KEYID = 0
6,024,281 UART: [idev] Sha1 KeyId Algorithm
6,047,815 UART: [idev] --
6,051,296 UART: [ldev] ++
6,051,868 UART: [ldev] CDI.KEYID = 6
6,052,756 UART: [ldev] SUBJECT.KEYID = 5
6,053,971 UART: [ldev] AUTHORITY.KEYID = 7
6,055,206 UART: [ldev] FE.KEYID = 1
6,100,340 UART: [ldev] Erasing FE.KEYID = 1
8,600,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,225 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,335,254 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,351,056 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,367,028 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,386,123 UART: [ldev] --
10,390,522 UART: [fwproc] Wait for Commands...
10,392,182 UART: [fwproc] Recv command 0x46574c44
10,394,278 UART: [fwproc] Recv'd Img size: 78532 bytes
13,389,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,464,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,532,975 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,725,553 >>> mbox cmd response: success
13,729,158 UART: [afmc] ++
13,729,767 UART: [afmc] CDI.KEYID = 6
13,730,657 UART: [afmc] SUBJECT.KEYID = 7
13,731,761 UART: [afmc] AUTHORITY.KEYID = 5
16,272,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,996,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,998,577 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,014,565 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,030,421 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,046,153 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,068,768 UART: [afmc] --
18,072,994 UART: [cold-reset] --
18,076,428 UART: [state] Locking Datavault
18,083,094 UART: [state] Locking PCR0, PCR1 and PCR31
18,084,755 UART: [state] Locking ICCM
18,086,721 UART: [exit] Launching FMC @ 0x40000130
18,095,119 UART:
18,095,354 UART: Running Caliptra FMC ...
18,096,384 UART:
18,096,534 UART: [state] CFI Enabled
18,153,752 UART: [fht] FMC Alias Private Key: 7
19,917,126 UART: [art] Extend RT PCRs Done
19,918,346 UART: [art] Lock RT PCRs Done
19,920,138 UART: [art] Populate DV Done
19,925,658 UART: [fht] FMC Alias Private Key: 7
19,927,199 UART: [art] Derive CDI
19,928,013 UART: [art] Store in in slot 0x4
19,986,179 UART: [art] Derive Key Pair
19,987,233 UART: [art] Store priv key in slot 0x5
22,450,137 UART: [art] Derive Key Pair - Done
22,462,862 UART: [art] Signing Cert with AUTHO
22,464,159 UART: RITY.KEYID = 7
24,175,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,177,287 UART: [art] PUB.X = 1B0CEB5813088F16B0CB06C86556E0271898239C65717B1303E7C66429606F2E4F36B66748038E5C57C251FFB8F32969
24,184,521 UART: [art] PUB.Y = AB385A7A86CC28373470CCFD6C3F5AD99606A2BB70E1E74DFA68B15D0ED112B416180AF2D3D6A08E0348E95DFB0A8D99
24,191,792 UART: [art] SIG.R = D831DFA1ECBF61B2AA5CA4E84B6143A0A742E9288710D535224457D03A525B94AAD5ED82161C44538806ADE7778FD8E5
24,199,153 UART: [art] SIG.S = A8B426BDA1EC0F715E4C3E6548E4896150955473E590A6F40B857A82F26EBE83096CB67797F6DBF332758CFAFCAFD38B
25,177,917 UART: mbox::rt_entry...
25,178,913 UART: ____ _ _ _ ____ _____
25,180,852 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,182,864 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,184,724 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,186,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,188,503 UART: |_|
25,189,384 UART:
25,302,820 UART: [rt] Runtime listening for mailbox commands...
25,304,833 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,305,607 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,034 UART:
1,299 UART: Running Caliptra ROM ...
2,319 UART:
2,461 UART: [state] CFI Enabled
63,993 UART: [state] LifecycleState = Production
65,718 UART: [state] DebugLocked = Yes
67,757 UART: [state] Starting the WD Timer 40000000 cycles
72,918 UART: [kat] SHA2-256
252,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
263,621 UART: [kat] ++
264,067 UART: [kat] sha1
273,756 UART: [kat] SHA2-256
276,774 UART: [kat] SHA2-384
284,103 UART: [kat] SHA2-512-ACC
287,088 UART: [kat] ECC-384
2,744,961 UART: [kat] HMAC-384Kdf
2,768,798 UART: [kat] LMS
3,298,306 UART: [kat] --
3,302,999 UART: [warm-reset] ++
3,309,031 UART: [warm-reset] --
3,312,838 UART: [state] Locking Datavault
3,315,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,317,467 UART: [state] Locking ICCM
3,319,752 UART: [exit] Launching FMC @ 0x40000130
3,328,201 UART:
3,328,441 UART: Running Caliptra FMC ...
3,329,470 UART:
3,329,620 UART: [state] CFI Enabled
3,378,055 UART: [aliasrt :skip pcr extension
3,379,342 UART: [art] Extend RT PCRs Done
3,380,412 UART: [art] Lock RT PCRs Done
3,381,807 UART: [art] Populate DV Done
3,387,272 UART: [fht] FMC Alias Private Key: 7
3,388,860 UART: [art] Derive CDI
3,389,605 UART: [art] Store in in slot 0x4
3,446,552 UART: [art] Derive Key Pair
3,447,596 UART: [art] Store priv key in slot 0x5
5,911,312 UART: [art] Derive Key Pair - Done
5,924,411 UART: [art] Signing Cert with AUTHO
5,925,745 UART: RITY.KEYID = 7
7,637,222 UART: [art] Erasing AUTHORITY.KEYID = 7
7,638,726 UART: [art] PUB.X = 1B0CEB5813088F16B0CB06C86556E0271898239C65717B1303E7C66429606F2E4F36B66748038E5C57C251FFB8F32969
7,645,937 UART: [art] PUB.Y = AB385A7A86CC28373470CCFD6C3F5AD99606A2BB70E1E74DFA68B15D0ED112B416180AF2D3D6A08E0348E95DFB0A8D99
7,653,250 UART: [art] SIG.R = D831DFA1ECBF61B2AA5CA4E84B6143A0A742E9288710D535224457D03A525B94AAD5ED82161C44538806ADE7778FD8E5
7,660,632 UART: [art] SIG.S = A8B426BDA1EC0F715E4C3E6548E4896150955473E590A6F40B857A82F26EBE83096CB67797F6DBF332758CFAFCAFD38B
8,638,794 UART: mbox::rt_entry...
8,639,761 UART: ____ _ _ _ ____ _____
8,641,751 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,759 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,645,690 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,647,623 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,649,480 UART: |_|
8,650,282 UART:
11,414,557 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
191,673 UART:
192,058 UART: Running Caliptra ROM ...
193,231 UART:
193,382 UART: [state] CFI Enabled
262,909 UART: [state] LifecycleState = Production
264,636 UART: [state] DebugLocked = Yes
266,702 UART: [state] Starting the WD Timer 40000000 cycles
270,873 UART: [kat] SHA2-256
449,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,552 UART: [kat] ++
462,087 UART: [kat] sha1
471,934 UART: [kat] SHA2-256
474,951 UART: [kat] SHA2-384
481,865 UART: [kat] SHA2-512-ACC
484,872 UART: [kat] ECC-384
2,949,091 UART: [kat] HMAC-384Kdf
2,971,708 UART: [kat] LMS
3,501,185 UART: [kat] --
3,505,676 UART: [cold-reset] ++
3,506,612 UART: [fht] FHT @ 0x50003400
3,517,721 UART: [idev] ++
3,518,287 UART: [idev] CDI.KEYID = 6
3,519,196 UART: [idev] SUBJECT.KEYID = 7
3,520,371 UART: [idev] UDS.KEYID = 0
3,521,315 ready_for_fw is high
3,521,520 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,621,316 UART: [idev] Erasing UDS.KEYID = 0
6,024,820 UART: [idev] Sha1 KeyId Algorithm
6,049,380 UART: [idev] --
6,052,853 UART: [ldev] ++
6,053,626 UART: [ldev] CDI.KEYID = 6
6,054,527 UART: [ldev] SUBJECT.KEYID = 5
6,055,585 UART: [ldev] AUTHORITY.KEYID = 7
6,056,763 UART: [ldev] FE.KEYID = 1
6,087,432 UART: [ldev] Erasing FE.KEYID = 1
8,594,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,090 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,344,080 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,359,951 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,375,880 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,395,927 UART: [ldev] --
10,401,251 UART: [fwproc] Wait for Commands...
10,404,323 UART: [fwproc] Recv command 0x46574c44
10,406,411 UART: [fwproc] Recv'd Img size: 78532 bytes
13,404,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,483,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,551,975 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,744,893 >>> mbox cmd response: success
13,749,915 UART: [afmc] ++
13,750,535 UART: [afmc] CDI.KEYID = 6
13,751,425 UART: [afmc] SUBJECT.KEYID = 7
13,752,523 UART: [afmc] AUTHORITY.KEYID = 5
16,279,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,007,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,009,510 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,025,481 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,041,328 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,057,083 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,079,490 UART: [afmc] --
18,082,696 UART: [cold-reset] --
18,086,348 UART: [state] Locking Datavault
18,093,548 UART: [state] Locking PCR0, PCR1 and PCR31
18,095,195 UART: [state] Locking ICCM
18,096,915 UART: [exit] Launching FMC @ 0x40000130
18,105,312 UART:
18,105,550 UART: Running Caliptra FMC ...
18,106,646 UART:
18,106,808 UART: [state] CFI Enabled
18,165,284 UART: [fht] FMC Alias Private Key: 7
19,929,421 UART: [art] Extend RT PCRs Done
19,930,638 UART: [art] Lock RT PCRs Done
19,932,505 UART: [art] Populate DV Done
19,937,945 UART: [fht] FMC Alias Private Key: 7
19,939,655 UART: [art] Derive CDI
19,940,471 UART: [art] Store in in slot 0x4
19,998,261 UART: [art] Derive Key Pair
19,999,313 UART: [art] Store priv key in slot 0x5
22,462,275 UART: [art] Derive Key Pair - Done
22,475,431 UART: [art] Signing Cert with AUTHO
22,476,734 UART: RITY.KEYID = 7
24,188,173 UART: [art] Erasing AUTHORITY.KEYID = 7
24,189,695 UART: [art] PUB.X = 01A9482E3CF0C54009D58F1530EAA332A64855340D480E23D3D638B49286A008A718441EFC5B7D31D5AD63BCD198A4B2
24,196,935 UART: [art] PUB.Y = 25B1C0BBDD107E54D7CA2A40200C8135ACA47586C8586485FAED3431B289EAD1C1DA243FF538A5E82E98DA0A097860A2
24,204,214 UART: [art] SIG.R = 80F500EFBBDF2671F0FC5FA6456B1FDD202B1E53BFB1798672E3736C7C0999C3AFCB53E98F401E0DE0D7DDE92C0025EF
24,211,602 UART: [art] SIG.S = CCD71972B832A747004CBEA722DD231B23784252A173D07C6B40EE055BEF7419FBFE5C6F674BD1D82BCB36B4085E2011
25,190,337 UART: mbox::rt_entry...
25,191,291 UART: ____ _ _ _ ____ _____
25,193,271 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,195,218 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,197,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,199,000 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,200,932 UART: |_|
25,201,741 UART:
25,316,315 UART: [rt] Runtime listening for mailbox commands...
25,318,320 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,319,038 >>> mbox cmd response data (0 bytes)
Initializing fuses
983 UART:
1,233 UART: Running Caliptra ROM ...
2,466 UART:
2,619 UART: [state] CFI Enabled
57,172 UART: [state] LifecycleState = Production
58,879 UART: [state] DebugLocked = Yes
61,132 UART: [state] Starting the WD Timer 40000000 cycles
66,532 UART: [kat] SHA2-256
245,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
257,283 UART: [kat] ++
257,737 UART: [kat] sha1
267,695 UART: [kat] SHA2-256
270,695 UART: [kat] SHA2-384
277,750 UART: [kat] SHA2-512-ACC
280,690 UART: [kat] ECC-384
2,743,064 UART: [kat] HMAC-384Kdf
2,766,050 UART: [kat] LMS
3,295,516 UART: [kat] --
3,300,372 UART: [warm-reset] ++
3,305,809 UART: [warm-reset] --
3,309,781 UART: [state] Locking Datavault
3,313,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,314,786 UART: [state] Locking ICCM
3,315,931 UART: [exit] Launching FMC @ 0x40000130
3,324,388 UART:
3,324,625 UART: Running Caliptra FMC ...
3,325,727 UART:
3,325,891 UART: [state] CFI Enabled
3,375,340 UART: [aliasrt :skip pcr extension
3,376,625 UART: [art] Extend RT PCRs Done
3,377,775 UART: [art] Lock RT PCRs Done
3,379,015 UART: [art] Populate DV Done
3,384,643 UART: [fht] FMC Alias Private Key: 7
3,386,125 UART: [art] Derive CDI
3,386,941 UART: [art] Store in in slot 0x4
3,444,018 UART: [art] Derive Key Pair
3,445,036 UART: [art] Store priv key in slot 0x5
5,908,215 UART: [art] Derive Key Pair - Done
5,921,480 UART: [art] Signing Cert with AUTHO
5,922,805 UART: RITY.KEYID = 7
7,634,245 UART: [art] Erasing AUTHORITY.KEYID = 7
7,635,753 UART: [art] PUB.X = 01A9482E3CF0C54009D58F1530EAA332A64855340D480E23D3D638B49286A008A718441EFC5B7D31D5AD63BCD198A4B2
7,642,980 UART: [art] PUB.Y = 25B1C0BBDD107E54D7CA2A40200C8135ACA47586C8586485FAED3431B289EAD1C1DA243FF538A5E82E98DA0A097860A2
7,650,253 UART: [art] SIG.R = 80F500EFBBDF2671F0FC5FA6456B1FDD202B1E53BFB1798672E3736C7C0999C3AFCB53E98F401E0DE0D7DDE92C0025EF
7,657,643 UART: [art] SIG.S = CCD71972B832A747004CBEA722DD231B23784252A173D07C6B40EE055BEF7419FBFE5C6F674BD1D82BCB36B4085E2011
8,636,545 UART: mbox::rt_entry...
8,637,510 UART: ____ _ _ _ ____ _____
8,639,442 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,641,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,643,310 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,645,237 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,647,290 UART: |_|
8,648,105 UART:
11,411,484 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
192,335 UART:
192,723 UART: Running Caliptra ROM ...
193,844 UART:
603,453 UART: [state] CFI Enabled
619,616 UART: [state] LifecycleState = Production
621,307 UART: [state] DebugLocked = Yes
623,228 UART: [state] Starting the WD Timer 40000000 cycles
628,541 UART: [kat] SHA2-256
807,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,279 UART: [kat] ++
819,746 UART: [kat] sha1
830,533 UART: [kat] SHA2-256
833,586 UART: [kat] SHA2-384
839,725 UART: [kat] SHA2-512-ACC
842,661 UART: [kat] ECC-384
3,281,790 UART: [kat] HMAC-384Kdf
3,294,777 UART: [kat] LMS
3,824,338 UART: [kat] --
3,829,678 UART: [cold-reset] ++
3,831,465 UART: [fht] FHT @ 0x50003400
3,843,647 UART: [idev] ++
3,844,213 UART: [idev] CDI.KEYID = 6
3,845,129 UART: [idev] SUBJECT.KEYID = 7
3,846,298 UART: [idev] UDS.KEYID = 0
3,847,296 ready_for_fw is high
3,847,503 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,946,492 UART: [idev] Erasing UDS.KEYID = 0
6,317,223 UART: [idev] Sha1 KeyId Algorithm
6,339,810 UART: [idev] --
6,342,830 UART: [ldev] ++
6,343,397 UART: [ldev] CDI.KEYID = 6
6,344,476 UART: [ldev] SUBJECT.KEYID = 5
6,345,719 UART: [ldev] AUTHORITY.KEYID = 7
6,346,903 UART: [ldev] FE.KEYID = 1
6,356,982 UART: [ldev] Erasing FE.KEYID = 1
8,835,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,717 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,698 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,541 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,601,454 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,622,434 UART: [ldev] --
10,627,638 UART: [fwproc] Wait for Commands...
10,629,961 UART: [fwproc] Recv command 0x46574c44
10,632,052 UART: [fwproc] Recv'd Img size: 78532 bytes
13,624,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,696,108 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,764,925 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,958,064 >>> mbox cmd response: success
13,961,607 UART: [afmc] ++
13,962,220 UART: [afmc] CDI.KEYID = 6
13,963,136 UART: [afmc] SUBJECT.KEYID = 7
13,964,296 UART: [afmc] AUTHORITY.KEYID = 5
16,460,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,179,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,181,735 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,197,736 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,213,567 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,229,313 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,253,722 UART: [afmc] --
18,258,115 UART: [cold-reset] --
18,262,038 UART: [state] Locking Datavault
18,268,207 UART: [state] Locking PCR0, PCR1 and PCR31
18,269,886 UART: [state] Locking ICCM
18,271,020 UART: [exit] Launching FMC @ 0x40000130
18,279,429 UART:
18,279,665 UART: Running Caliptra FMC ...
18,280,716 UART:
18,280,870 UART: [state] CFI Enabled
18,289,077 UART: [fht] FMC Alias Private Key: 7
20,045,888 UART: [art] Extend RT PCRs Done
20,047,121 UART: [art] Lock RT PCRs Done
20,048,853 UART: [art] Populate DV Done
20,054,238 UART: [fht] FMC Alias Private Key: 7
20,055,929 UART: [art] Derive CDI
20,056,718 UART: [art] Store in in slot 0x4
20,099,245 UART: [art] Derive Key Pair
20,100,248 UART: [art] Store priv key in slot 0x5
22,527,431 UART: [art] Derive Key Pair - Done
22,540,586 UART: [art] Signing Cert with AUTHO
22,541,886 UART: RITY.KEYID = 7
24,247,176 UART: [art] Erasing AUTHORITY.KEYID = 7
24,248,683 UART: [art] PUB.X = 0B32048347AD23D0E8704083FDEBF46BEB6A940F745FAC94CB974DB33B63A95097E4902C7FA4418B0D69A7EE0F3E1FEE
24,255,982 UART: [art] PUB.Y = 54195B6B7682A1BB187E259098B09CB1CF56C95FE6107FDB25E6C0C4F7710B754D0A3CFB08013774ED2DA8FE57C1B7FB
24,263,208 UART: [art] SIG.R = 00E544B3218DB68564B946EA785DED1E3CD43B3F2B8AD5E561E6A2F924AF15313A0B9A6B307F736A65070B5F8C985D8D
24,270,639 UART: [art] SIG.S = A4BDF76E65468D8F81A534EB12C2C7D40A9BA12624F17435812E45C1634A5B8279AEC1E291D445F79CDCE007C0F81403
25,249,047 UART: mbox::rt_entry...
25,250,000 UART: ____ _ _ _ ____ _____
25,251,934 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,253,937 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,255,867 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,257,815 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,259,744 UART: |_|
25,260,557 UART:
25,372,224 UART: [rt] Runtime listening for mailbox commands...
25,374,233 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,375,001 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,041 UART:
1,300 UART: Running Caliptra ROM ...
2,407 UART:
15,138,094 UART: [state] CFI Enabled
15,151,329 UART: [state] LifecycleState = Production
15,153,082 UART: [state] DebugLocked = Yes
15,155,426 UART: [state] Starting the WD Timer 40000000 cycles
15,160,698 UART: [kat] SHA2-256
15,339,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,351,411 UART: [kat] ++
15,351,959 UART: [kat] sha1
15,363,557 UART: [kat] SHA2-256
15,366,579 UART: [kat] SHA2-384
15,371,971 UART: [kat] SHA2-512-ACC
15,374,893 UART: [kat] ECC-384
17,818,162 UART: [kat] HMAC-384Kdf
17,831,624 UART: [kat] LMS
18,361,120 UART: [kat] --
18,365,696 UART: [warm-reset] ++
18,370,268 UART: [warm-reset] --
18,375,644 UART: [state] Locking Datavault
18,378,355 UART: [state] Locking PCR0, PCR1 and PCR31
18,380,008 UART: [state] Locking ICCM
18,381,572 UART: [exit] Launching FMC @ 0x40000130
18,389,972 UART:
18,390,230 UART: Running Caliptra FMC ...
18,391,332 UART:
18,391,494 UART: [state] CFI Enabled
18,393,276 UART: [aliasrt :skip pcr extension
18,394,518 UART: [art] Extend RT PCRs Done
18,395,659 UART: [art] Lock RT PCRs Done
18,396,724 UART: [art] Populate DV Done
18,402,125 UART: [fht] FMC Alias Private Key: 7
18,403,828 UART: [art] Derive CDI
18,404,638 UART: [art] Store in in slot 0x4
18,447,281 UART: [art] Derive Key Pair
18,448,326 UART: [art] Store priv key in slot 0x5
20,875,949 UART: [art] Derive Key Pair - Done
20,888,957 UART: [art] Signing Cert with AUTHO
20,890,288 UART: RITY.KEYID = 7
22,595,653 UART: [art] Erasing AUTHORITY.KEYID = 7
22,597,184 UART: [art] PUB.X = 0B32048347AD23D0E8704083FDEBF46BEB6A940F745FAC94CB974DB33B63A95097E4902C7FA4418B0D69A7EE0F3E1FEE
22,604,434 UART: [art] PUB.Y = 54195B6B7682A1BB187E259098B09CB1CF56C95FE6107FDB25E6C0C4F7710B754D0A3CFB08013774ED2DA8FE57C1B7FB
22,611,719 UART: [art] SIG.R = 00E544B3218DB68564B946EA785DED1E3CD43B3F2B8AD5E561E6A2F924AF15313A0B9A6B307F736A65070B5F8C985D8D
22,619,118 UART: [art] SIG.S = A4BDF76E65468D8F81A534EB12C2C7D40A9BA12624F17435812E45C1634A5B8279AEC1E291D445F79CDCE007C0F81403
23,597,748 UART: mbox::rt_entry...
23,598,713 UART: ____ _ _ _ ____ _____
23,600,640 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,602,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,604,507 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,606,434 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,608,480 UART: |_|
23,609,343 UART:
26,322,319 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,652 writing to cptra_bootfsm_go
192,315 UART:
192,691 UART: Running Caliptra ROM ...
193,809 UART:
603,380 UART: [state] CFI Enabled
617,116 UART: [state] LifecycleState = Production
618,873 UART: [state] DebugLocked = Yes
620,143 UART: [state] Starting the WD Timer 40000000 cycles
625,163 UART: [kat] SHA2-256
804,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,822 UART: [kat] ++
816,274 UART: [kat] sha1
827,459 UART: [kat] SHA2-256
830,471 UART: [kat] SHA2-384
836,531 UART: [kat] SHA2-512-ACC
839,537 UART: [kat] ECC-384
3,280,288 UART: [kat] HMAC-384Kdf
3,292,889 UART: [kat] LMS
3,822,415 UART: [kat] --
3,825,068 UART: [cold-reset] ++
3,826,795 UART: [fht] FHT @ 0x50003400
3,837,067 UART: [idev] ++
3,837,635 UART: [idev] CDI.KEYID = 6
3,838,547 UART: [idev] SUBJECT.KEYID = 7
3,839,724 UART: [idev] UDS.KEYID = 0
3,840,652 ready_for_fw is high
3,840,871 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
3,939,573 UART: [idev] Erasing UDS.KEYID = 0
6,307,886 UART: [idev] Sha1 KeyId Algorithm
6,331,851 UART: [idev] --
6,335,954 UART: [ldev] ++
6,336,522 UART: [ldev] CDI.KEYID = 6
6,337,458 UART: [ldev] SUBJECT.KEYID = 5
6,338,670 UART: [ldev] AUTHORITY.KEYID = 7
6,339,903 UART: [ldev] FE.KEYID = 1
6,350,202 UART: [ldev] Erasing FE.KEYID = 1
8,824,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,539,957 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,555,942 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,571,747 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,587,703 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,608,992 UART: [ldev] --
10,614,172 UART: [fwproc] Wait for Commands...
10,615,834 UART: [fwproc] Recv command 0x46574c44
10,617,935 UART: [fwproc] Recv'd Img size: 78532 bytes
13,612,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,688,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,757,613 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
13,950,632 >>> mbox cmd response: success
13,954,658 UART: [afmc] ++
13,955,282 UART: [afmc] CDI.KEYID = 6
13,956,203 UART: [afmc] SUBJECT.KEYID = 7
13,957,313 UART: [afmc] AUTHORITY.KEYID = 5
16,457,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,181,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,183,144 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,199,133 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,214,979 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,230,701 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,254,011 UART: [afmc] --
18,257,560 UART: [cold-reset] --
18,261,533 UART: [state] Locking Datavault
18,266,294 UART: [state] Locking PCR0, PCR1 and PCR31
18,267,940 UART: [state] Locking ICCM
18,268,907 UART: [exit] Launching FMC @ 0x40000130
18,277,358 UART:
18,277,604 UART: Running Caliptra FMC ...
18,278,706 UART:
18,278,868 UART: [state] CFI Enabled
18,287,141 UART: [fht] FMC Alias Private Key: 7
20,044,414 UART: [art] Extend RT PCRs Done
20,045,637 UART: [art] Lock RT PCRs Done
20,047,628 UART: [art] Populate DV Done
20,053,093 UART: [fht] FMC Alias Private Key: 7
20,054,706 UART: [art] Derive CDI
20,055,526 UART: [art] Store in in slot 0x4
20,098,470 UART: [art] Derive Key Pair
20,099,575 UART: [art] Store priv key in slot 0x5
22,525,902 UART: [art] Derive Key Pair - Done
22,538,784 UART: [art] Signing Cert with AUTHO
22,540,088 UART: RITY.KEYID = 7
24,245,653 UART: [art] Erasing AUTHORITY.KEYID = 7
24,247,160 UART: [art] PUB.X = 5949E52831ADF9CD357432AABAB93580E72D6F6170BB2249F6A73983FD1EB9DC0E6FBF45E948ACA5FC9B3B00B61E74AF
24,254,402 UART: [art] PUB.Y = 775944028FEF6332831A1955DF4FD84A272124BE2738122B2212E68AAECC5145AD08670A43DA3143B0464BF8681BDD78
24,261,689 UART: [art] SIG.R = DA0BC90AD787E85BD977425E66332F8DBF96DC86A923E93CCBF8E492FC251DE66A055B30995D57527DD68ABFFD90A5AF
24,269,082 UART: [art] SIG.S = 68A6CE2E8694E3449C67638F75242D851BC1AD1D9B872D7755B460FB9603F16B867CC7B5ECCAADAA262BBB8B79A8A07B
25,247,565 UART: mbox::rt_entry...
25,248,517 UART: ____ _ _ _ ____ _____
25,250,504 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,252,509 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,254,460 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,256,390 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,258,328 UART: |_|
25,259,134 UART:
25,372,799 UART: [rt] Runtime listening for mailbox commands...
25,374,809 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,375,600 >>> mbox cmd response data (0 bytes)
Initializing fuses
1,012 UART:
1,270 UART: Running Caliptra ROM ...
2,375 UART:
15,151,349 UART: [state] CFI Enabled
15,166,104 UART: [state] LifecycleState = Production
15,167,850 UART: [state] DebugLocked = Yes
15,169,327 UART: [state] Starting the WD Timer 40000000 cycles
15,174,554 UART: [kat] SHA2-256
15,353,716 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
15,365,263 UART: [kat] ++
15,365,720 UART: [kat] sha1
15,375,634 UART: [kat] SHA2-256
15,378,699 UART: [kat] SHA2-384
15,385,543 UART: [kat] SHA2-512-ACC
15,388,522 UART: [kat] ECC-384
17,831,787 UART: [kat] HMAC-384Kdf
17,844,652 UART: [kat] LMS
18,374,132 UART: [kat] --
18,379,087 UART: [warm-reset] ++
18,384,804 UART: [warm-reset] --
18,388,242 UART: [state] Locking Datavault
18,390,956 UART: [state] Locking PCR0, PCR1 and PCR31
18,392,659 UART: [state] Locking ICCM
18,395,190 UART: [exit] Launching FMC @ 0x40000130
18,403,606 UART:
18,403,854 UART: Running Caliptra FMC ...
18,404,962 UART:
18,405,128 UART: [state] CFI Enabled
18,407,296 UART: [aliasrt :skip pcr extension
18,408,547 UART: [art] Extend RT PCRs Done
18,409,686 UART: [art] Lock RT PCRs Done
18,410,921 UART: [art] Populate DV Done
18,416,328 UART: [fht] FMC Alias Private Key: 7
18,417,866 UART: [art] Derive CDI
18,418,685 UART: [art] Store in in slot 0x4
18,461,421 UART: [art] Derive Key Pair
18,462,465 UART: [art] Store priv key in slot 0x5
20,889,141 UART: [art] Derive Key Pair - Done
20,902,080 UART: [art] Signing Cert with AUTHO
20,903,387 UART: RITY.KEYID = 7
22,608,300 UART: [art] Erasing AUTHORITY.KEYID = 7
22,609,802 UART: [art] PUB.X = 5949E52831ADF9CD357432AABAB93580E72D6F6170BB2249F6A73983FD1EB9DC0E6FBF45E948ACA5FC9B3B00B61E74AF
22,617,053 UART: [art] PUB.Y = 775944028FEF6332831A1955DF4FD84A272124BE2738122B2212E68AAECC5145AD08670A43DA3143B0464BF8681BDD78
22,624,291 UART: [art] SIG.R = DA0BC90AD787E85BD977425E66332F8DBF96DC86A923E93CCBF8E492FC251DE66A055B30995D57527DD68ABFFD90A5AF
22,631,732 UART: [art] SIG.S = 68A6CE2E8694E3449C67638F75242D851BC1AD1D9B872D7755B460FB9603F16B867CC7B5ECCAADAA262BBB8B79A8A07B
23,610,183 UART: mbox::rt_entry...
23,611,139 UART: ____ _ _ _ ____ _____
23,613,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,615,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,616,933 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,618,861 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,620,751 UART: |_|
23,621,583 UART:
26,331,948 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 143 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Production
85,895 UART: [state] DebugLocked = Yes
86,653 UART: [state] Starting the WD Timer 40000000 cycles
88,280 UART: [kat] SHA2-256
891,830 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,959 UART: [kat] ++
896,111 UART: [kat] sha1
900,347 UART: [kat] SHA2-256
902,287 UART: [kat] SHA2-384
905,038 UART: [kat] SHA2-512-ACC
906,939 UART: [kat] ECC-384
916,634 UART: [kat] HMAC-384Kdf
921,082 UART: [kat] LMS
1,169,394 UART: [kat] --
1,170,175 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,144 UART: [idev] Sha1 KeyId Algorithm
1,208,061 UART: [idev] --
1,208,962 UART: [ldev] ++
1,209,130 UART: [ldev] CDI.KEYID = 6
1,209,494 UART: [ldev] SUBJECT.KEYID = 5
1,209,921 UART: [ldev] AUTHORITY.KEYID = 7
1,210,384 UART: [ldev] FE.KEYID = 1
1,215,630 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,079 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,675 UART: [ldev] --
1,281,151 UART: [fwproc] Wait for Commands...
1,281,862 UART: [fwproc] Recv command 0x46574c44
1,282,595 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,767 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,332,866 >>> mbox cmd response: success
2,333,894 UART: [afmc] ++
2,334,062 UART: [afmc] CDI.KEYID = 6
2,334,425 UART: [afmc] SUBJECT.KEYID = 7
2,334,851 UART: [afmc] AUTHORITY.KEYID = 5
2,370,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,239 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,958 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,851 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,558 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,359 UART: [afmc] --
2,413,382 UART: [cold-reset] --
2,414,188 UART: [state] Locking Datavault
2,415,649 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,253 UART: [state] Locking ICCM
2,416,723 UART: [exit] Launching FMC @ 0x40000130
2,422,052 UART:
2,422,068 UART: Running Caliptra FMC ...
2,422,476 UART:
2,422,530 UART: [state] CFI Enabled
2,432,971 UART: [fht] FMC Alias Private Key: 7
2,540,618 UART: [art] Extend RT PCRs Done
2,541,046 UART: [art] Lock RT PCRs Done
2,542,842 UART: [art] Populate DV Done
2,551,092 UART: [fht] FMC Alias Private Key: 7
2,552,136 UART: [art] Derive CDI
2,552,416 UART: [art] Store in in slot 0x4
2,638,017 UART: [art] Derive Key Pair
2,638,377 UART: [art] Store priv key in slot 0x5
2,651,187 UART: [art] Derive Key Pair - Done
2,666,176 UART: [art] Signing Cert with AUTHO
2,666,656 UART: RITY.KEYID = 7
2,681,820 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,585 UART: [art] PUB.X = 25CAB2DAC0474C10F931CADDFB483A1267440F09F0B75D48FDB0379AA64C56FD53C83CEDAC78D750417F443632096DEB
2,689,360 UART: [art] PUB.Y = CC184C8CAD99E3ECEFAF84B87C2A290050102919B338B95AD569656AFC1D369279EF6E339AC6995968A796FB8D8B9A0E
2,696,295 UART: [art] SIG.R = 31E566C65ABF8A570A5E1A5CF825BBC84DDB06A0201452EF72C8D61074F41787C82A19F86771849CEC9DF802FF5B9757
2,703,062 UART: [art] SIG.S = 8D421A0D8071971192329C910349F15FFB9DA3DCFFBA81AB218344EB23EE546002CA98CABA611DDED2DCEB8E3F712247
2,727,212 UART: mbox::rt_entry...
2,727,584 UART: ____ _ _ _ ____ _____
2,728,368 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,168 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,729,936 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,730,704 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,472 UART: |_|
2,731,784 UART:
2,838,976 UART: [rt] Runtime listening for mailbox commands...
2,839,738 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,958 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,052 UART:
2,840,068 UART: Running Caliptra ROM ...
2,840,476 UART:
2,840,531 UART: [state] CFI Enabled
2,843,396 UART: [state] LifecycleState = Production
2,844,004 UART: [state] DebugLocked = Yes
2,844,748 UART: [state] Starting the WD Timer 40000000 cycles
2,846,299 UART: [kat] SHA2-256
3,649,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,978 UART: [kat] ++
3,654,130 UART: [kat] sha1
3,658,370 UART: [kat] SHA2-256
3,660,310 UART: [kat] SHA2-384
3,663,129 UART: [kat] SHA2-512-ACC
3,665,030 UART: [kat] ECC-384
3,674,961 UART: [kat] HMAC-384Kdf
3,679,599 UART: [kat] LMS
3,927,911 UART: [kat] --
3,928,933 UART: [warm-reset] ++
3,929,882 UART: [warm-reset] --
3,930,563 UART: [state] Locking Datavault
3,931,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,121 UART: [state] Locking ICCM
3,932,639 UART: [exit] Launching FMC @ 0x40000130
3,937,968 UART:
3,937,984 UART: Running Caliptra FMC ...
3,938,392 UART:
3,938,446 UART: [state] CFI Enabled
3,939,761 UART: [aliasrt :skip pcr extension
3,940,234 UART: [art] Extend RT PCRs Done
3,940,662 UART: [art] Lock RT PCRs Done
3,941,985 UART: [art] Populate DV Done
3,950,099 UART: [fht] FMC Alias Private Key: 7
3,951,041 UART: [art] Derive CDI
3,951,321 UART: [art] Store in in slot 0x4
4,036,578 UART: [art] Derive Key Pair
4,036,938 UART: [art] Store priv key in slot 0x5
4,050,170 UART: [art] Derive Key Pair - Done
4,065,011 UART: [art] Signing Cert with AUTHO
4,065,491 UART: RITY.KEYID = 7
4,081,023 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,788 UART: [art] PUB.X = 25CAB2DAC0474C10F931CADDFB483A1267440F09F0B75D48FDB0379AA64C56FD53C83CEDAC78D750417F443632096DEB
4,088,563 UART: [art] PUB.Y = CC184C8CAD99E3ECEFAF84B87C2A290050102919B338B95AD569656AFC1D369279EF6E339AC6995968A796FB8D8B9A0E
4,095,498 UART: [art] SIG.R = 31E566C65ABF8A570A5E1A5CF825BBC84DDB06A0201452EF72C8D61074F41787C82A19F86771849CEC9DF802FF5B9757
4,102,265 UART: [art] SIG.S = 8D421A0D8071971192329C910349F15FFB9DA3DCFFBA81AB218344EB23EE546002CA98CABA611DDED2DCEB8E3F712247
4,125,955 UART: mbox::rt_entry...
4,126,327 UART: ____ _ _ _ ____ _____
4,127,111 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,679 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,447 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,130,215 UART: |_|
4,130,527 UART:
4,427,067 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Production
85,557 UART: [state] DebugLocked = Yes
86,131 UART: [state] Starting the WD Timer 40000000 cycles
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
915,724 UART: [kat] HMAC-384Kdf
920,224 UART: [kat] LMS
1,168,536 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,976 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,174,102 ready_for_fw is high
1,174,102 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,197,824 UART: [idev] Sha1 KeyId Algorithm
1,206,945 UART: [idev] --
1,208,072 UART: [ldev] ++
1,208,240 UART: [ldev] CDI.KEYID = 6
1,208,604 UART: [ldev] SUBJECT.KEYID = 5
1,209,031 UART: [ldev] AUTHORITY.KEYID = 7
1,209,494 UART: [ldev] FE.KEYID = 1
1,214,572 UART: [ldev] Erasing FE.KEYID = 1
1,240,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,219 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,259,913 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,265,783 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,489 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,483 UART: [ldev] --
1,279,937 UART: [fwproc] Wait for Commands...
1,280,654 UART: [fwproc] Recv command 0x46574c44
1,281,387 UART: [fwproc] Recv'd Img size: 78532 bytes
2,192,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,220,219 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,249,528 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,331,725 >>> mbox cmd response: success
2,332,799 UART: [afmc] ++
2,332,967 UART: [afmc] CDI.KEYID = 6
2,333,330 UART: [afmc] SUBJECT.KEYID = 7
2,333,756 UART: [afmc] AUTHORITY.KEYID = 5
2,369,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,052 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,392,771 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,398,664 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,371 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,214 UART: [afmc] --
2,413,301 UART: [cold-reset] --
2,414,073 UART: [state] Locking Datavault
2,415,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,415,912 UART: [state] Locking ICCM
2,416,342 UART: [exit] Launching FMC @ 0x40000130
2,421,671 UART:
2,421,687 UART: Running Caliptra FMC ...
2,422,095 UART:
2,422,149 UART: [state] CFI Enabled
2,432,402 UART: [fht] FMC Alias Private Key: 7
2,539,903 UART: [art] Extend RT PCRs Done
2,540,331 UART: [art] Lock RT PCRs Done
2,541,845 UART: [art] Populate DV Done
2,550,137 UART: [fht] FMC Alias Private Key: 7
2,551,175 UART: [art] Derive CDI
2,551,455 UART: [art] Store in in slot 0x4
2,637,290 UART: [art] Derive Key Pair
2,637,650 UART: [art] Store priv key in slot 0x5
2,650,236 UART: [art] Derive Key Pair - Done
2,664,986 UART: [art] Signing Cert with AUTHO
2,665,466 UART: RITY.KEYID = 7
2,680,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,681,309 UART: [art] PUB.X = DCF9DF1AFDBFCD8BDA74ED75971160FA68CC422295CDBFA520FD8C084DAF5043364CAF57EAC5A5F08B45C3DAAD9C2303
2,688,105 UART: [art] PUB.Y = 4630193AFED87B7F8FDDAFB8BF1E5495B5639ABB4DDE1680348307389CD5449CED95461377F1560A35CB7A24AFE1AB7B
2,695,063 UART: [art] SIG.R = 4DCD2F2D2B616A87162C0C95897BD920C72F1B2C656ED873E743816A2CDEC8D42AC27F0961B8BACC1DDA0E8412956EB7
2,701,838 UART: [art] SIG.S = A0A015CF3E663AC8F9924239A372A41D5F76F37CD9405AF5CA6612F7A37DD60420EA79C25276A8C9664A1328F02D0A80
2,725,555 UART: mbox::rt_entry...
2,725,927 UART: ____ _ _ _ ____ _____
2,726,711 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,727,511 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,728,279 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,729,047 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,729,815 UART: |_|
2,730,127 UART:
2,837,251 UART: [rt] Runtime listening for mailbox commands...
2,838,013 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,838,233 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,838,327 UART:
2,838,343 UART: Running Caliptra ROM ...
2,838,751 UART:
2,838,806 UART: [state] CFI Enabled
2,841,271 UART: [state] LifecycleState = Production
2,841,879 UART: [state] DebugLocked = Yes
2,842,531 UART: [state] Starting the WD Timer 40000000 cycles
2,844,226 UART: [kat] SHA2-256
3,647,776 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,651,905 UART: [kat] ++
3,652,057 UART: [kat] sha1
3,656,299 UART: [kat] SHA2-256
3,658,239 UART: [kat] SHA2-384
3,660,826 UART: [kat] SHA2-512-ACC
3,662,727 UART: [kat] ECC-384
3,672,498 UART: [kat] HMAC-384Kdf
3,677,220 UART: [kat] LMS
3,925,532 UART: [kat] --
3,926,528 UART: [warm-reset] ++
3,926,995 UART: [warm-reset] --
3,927,874 UART: [state] Locking Datavault
3,928,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,929,418 UART: [state] Locking ICCM
3,929,924 UART: [exit] Launching FMC @ 0x40000130
3,935,253 UART:
3,935,269 UART: Running Caliptra FMC ...
3,935,677 UART:
3,935,731 UART: [state] CFI Enabled
3,937,030 UART: [aliasrt :skip pcr extension
3,937,503 UART: [art] Extend RT PCRs Done
3,937,931 UART: [art] Lock RT PCRs Done
3,939,006 UART: [art] Populate DV Done
3,947,206 UART: [fht] FMC Alias Private Key: 7
3,948,134 UART: [art] Derive CDI
3,948,414 UART: [art] Store in in slot 0x4
4,033,971 UART: [art] Derive Key Pair
4,034,331 UART: [art] Store priv key in slot 0x5
4,047,521 UART: [art] Derive Key Pair - Done
4,062,351 UART: [art] Signing Cert with AUTHO
4,062,831 UART: RITY.KEYID = 7
4,077,855 UART: [art] Erasing AUTHORITY.KEYID = 7
4,078,620 UART: [art] PUB.X = DCF9DF1AFDBFCD8BDA74ED75971160FA68CC422295CDBFA520FD8C084DAF5043364CAF57EAC5A5F08B45C3DAAD9C2303
4,085,416 UART: [art] PUB.Y = 4630193AFED87B7F8FDDAFB8BF1E5495B5639ABB4DDE1680348307389CD5449CED95461377F1560A35CB7A24AFE1AB7B
4,092,374 UART: [art] SIG.R = 4DCD2F2D2B616A87162C0C95897BD920C72F1B2C656ED873E743816A2CDEC8D42AC27F0961B8BACC1DDA0E8412956EB7
4,099,149 UART: [art] SIG.S = A0A015CF3E663AC8F9924239A372A41D5F76F37CD9405AF5CA6612F7A37DD60420EA79C25276A8C9664A1328F02D0A80
4,123,182 UART: mbox::rt_entry...
4,123,554 UART: ____ _ _ _ ____ _____
4,124,338 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,125,138 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,125,906 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,126,674 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,127,442 UART: |_|
4,127,754 UART:
4,423,972 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Production
86,106 UART: [state] DebugLocked = Yes
86,736 UART: [state] Starting the WD Timer 40000000 cycles
88,285 UART: [kat] SHA2-256
891,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,964 UART: [kat] ++
896,116 UART: [kat] sha1
900,494 UART: [kat] SHA2-256
902,434 UART: [kat] SHA2-384
905,139 UART: [kat] SHA2-512-ACC
907,040 UART: [kat] ECC-384
917,293 UART: [kat] HMAC-384Kdf
921,861 UART: [kat] LMS
1,170,173 UART: [kat] --
1,171,044 UART: [cold-reset] ++
1,171,617 UART: [fht] FHT @ 0x50003400
1,174,185 UART: [idev] ++
1,174,353 UART: [idev] CDI.KEYID = 6
1,174,714 UART: [idev] SUBJECT.KEYID = 7
1,175,139 UART: [idev] UDS.KEYID = 0
1,175,485 ready_for_fw is high
1,175,485 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,183,514 UART: [idev] Erasing UDS.KEYID = 0
1,200,969 UART: [idev] Sha1 KeyId Algorithm
1,209,696 UART: [idev] --
1,210,713 UART: [ldev] ++
1,210,881 UART: [ldev] CDI.KEYID = 6
1,211,245 UART: [ldev] SUBJECT.KEYID = 5
1,211,672 UART: [ldev] AUTHORITY.KEYID = 7
1,212,135 UART: [ldev] FE.KEYID = 1
1,217,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,620 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,314 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,184 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,890 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,992 UART: [ldev] --
1,282,372 UART: [fwproc] Wait for Commands...
1,283,177 UART: [fwproc] Recv command 0x46574c44
1,283,910 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,987 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,296 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,333,371 >>> mbox cmd response: success
2,334,555 UART: [afmc] ++
2,334,723 UART: [afmc] CDI.KEYID = 6
2,335,086 UART: [afmc] SUBJECT.KEYID = 7
2,335,512 UART: [afmc] AUTHORITY.KEYID = 5
2,371,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,387,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,618 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,337 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,230 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,405,937 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,413,902 UART: [afmc] --
2,414,807 UART: [cold-reset] --
2,415,469 UART: [state] Locking Datavault
2,416,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,168 UART: [state] Locking ICCM
2,417,804 UART: [exit] Launching FMC @ 0x40000130
2,423,133 UART:
2,423,149 UART: Running Caliptra FMC ...
2,423,557 UART:
2,423,700 UART: [state] CFI Enabled
2,434,277 UART: [fht] FMC Alias Private Key: 7
2,542,134 UART: [art] Extend RT PCRs Done
2,542,562 UART: [art] Lock RT PCRs Done
2,543,942 UART: [art] Populate DV Done
2,552,104 UART: [fht] FMC Alias Private Key: 7
2,553,144 UART: [art] Derive CDI
2,553,424 UART: [art] Store in in slot 0x4
2,639,135 UART: [art] Derive Key Pair
2,639,495 UART: [art] Store priv key in slot 0x5
2,653,105 UART: [art] Derive Key Pair - Done
2,668,294 UART: [art] Signing Cert with AUTHO
2,668,774 UART: RITY.KEYID = 7
2,683,816 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,581 UART: [art] PUB.X = 61FC3D50208A482140F82B224B863D9B94C770219C3F4DDB0D3360DF19ADE034BC42BFB6DB7C938519BD5B61F606DC03
2,691,350 UART: [art] PUB.Y = 3806E885838ACB4F317E7F72A5B902F5F09D2E98B639B8B30D718F5DE0CD327E6AA336AEBA9A6CC533E69C5BC3659C49
2,698,303 UART: [art] SIG.R = 2A10F31088B037B2798DC55E367DE168720A6BBB74358584597CA737EBCE4494E7EAD77FAFFA99435F4D13E19EE39151
2,705,074 UART: [art] SIG.S = 3B61492631AED995813E53890930C4468BC9BC53D92E9046A0993876E93E0EE5A5F3486EB7A038716400E1EBD3499387
2,729,207 UART: mbox::rt_entry...
2,729,579 UART: ____ _ _ _ ____ _____
2,730,363 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,163 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,931 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,699 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,467 UART: |_|
2,733,779 UART:
2,840,306 UART: [rt] Runtime listening for mailbox commands...
2,841,068 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,288 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,382 UART:
2,841,398 UART: Running Caliptra ROM ...
2,841,806 UART:
2,841,948 UART: [state] CFI Enabled
2,844,767 UART: [state] LifecycleState = Production
2,845,375 UART: [state] DebugLocked = Yes
2,845,999 UART: [state] Starting the WD Timer 40000000 cycles
2,847,470 UART: [kat] SHA2-256
3,651,020 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,149 UART: [kat] ++
3,655,301 UART: [kat] sha1
3,659,449 UART: [kat] SHA2-256
3,661,389 UART: [kat] SHA2-384
3,664,276 UART: [kat] SHA2-512-ACC
3,666,177 UART: [kat] ECC-384
3,676,308 UART: [kat] HMAC-384Kdf
3,680,950 UART: [kat] LMS
3,929,262 UART: [kat] --
3,930,154 UART: [warm-reset] ++
3,930,925 UART: [warm-reset] --
3,931,840 UART: [state] Locking Datavault
3,932,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,354 UART: [state] Locking ICCM
3,934,002 UART: [exit] Launching FMC @ 0x40000130
3,939,331 UART:
3,939,347 UART: Running Caliptra FMC ...
3,939,755 UART:
3,939,898 UART: [state] CFI Enabled
3,941,305 UART: [aliasrt :skip pcr extension
3,941,778 UART: [art] Extend RT PCRs Done
3,942,206 UART: [art] Lock RT PCRs Done
3,943,635 UART: [art] Populate DV Done
3,951,749 UART: [fht] FMC Alias Private Key: 7
3,952,801 UART: [art] Derive CDI
3,953,081 UART: [art] Store in in slot 0x4
4,039,230 UART: [art] Derive Key Pair
4,039,590 UART: [art] Store priv key in slot 0x5
4,053,636 UART: [art] Derive Key Pair - Done
4,067,959 UART: [art] Signing Cert with AUTHO
4,068,439 UART: RITY.KEYID = 7
4,083,431 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,196 UART: [art] PUB.X = 61FC3D50208A482140F82B224B863D9B94C770219C3F4DDB0D3360DF19ADE034BC42BFB6DB7C938519BD5B61F606DC03
4,090,965 UART: [art] PUB.Y = 3806E885838ACB4F317E7F72A5B902F5F09D2E98B639B8B30D718F5DE0CD327E6AA336AEBA9A6CC533E69C5BC3659C49
4,097,918 UART: [art] SIG.R = 2A10F31088B037B2798DC55E367DE168720A6BBB74358584597CA737EBCE4494E7EAD77FAFFA99435F4D13E19EE39151
4,104,689 UART: [art] SIG.S = 3B61492631AED995813E53890930C4468BC9BC53D92E9046A0993876E93E0EE5A5F3486EB7A038716400E1EBD3499387
4,127,906 UART: mbox::rt_entry...
4,128,278 UART: ____ _ _ _ ____ _____
4,129,062 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,862 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,630 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,398 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,166 UART: |_|
4,132,478 UART:
4,428,207 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,610 UART: [state] LifecycleState = Production
86,218 UART: [state] DebugLocked = Yes
86,870 UART: [state] Starting the WD Timer 40000000 cycles
88,551 UART: [kat] SHA2-256
892,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,230 UART: [kat] ++
896,382 UART: [kat] sha1
900,774 UART: [kat] SHA2-256
902,714 UART: [kat] SHA2-384
905,475 UART: [kat] SHA2-512-ACC
907,376 UART: [kat] ECC-384
917,357 UART: [kat] HMAC-384Kdf
921,939 UART: [kat] LMS
1,170,251 UART: [kat] --
1,171,076 UART: [cold-reset] ++
1,171,549 UART: [fht] FHT @ 0x50003400
1,174,187 UART: [idev] ++
1,174,355 UART: [idev] CDI.KEYID = 6
1,174,716 UART: [idev] SUBJECT.KEYID = 7
1,175,141 UART: [idev] UDS.KEYID = 0
1,175,487 ready_for_fw is high
1,175,487 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,183,338 UART: [idev] Erasing UDS.KEYID = 0
1,200,693 UART: [idev] Sha1 KeyId Algorithm
1,209,662 UART: [idev] --
1,210,631 UART: [ldev] ++
1,210,799 UART: [ldev] CDI.KEYID = 6
1,211,163 UART: [ldev] SUBJECT.KEYID = 5
1,211,590 UART: [ldev] AUTHORITY.KEYID = 7
1,212,053 UART: [ldev] FE.KEYID = 1
1,217,155 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,034 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,728 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,598 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,304 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,432 UART: [ldev] --
1,282,902 UART: [fwproc] Wait for Commands...
1,283,473 UART: [fwproc] Recv command 0x46574c44
1,284,206 UART: [fwproc] Recv'd Img size: 78532 bytes
2,196,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,062 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,157 >>> mbox cmd response: success
2,335,255 UART: [afmc] ++
2,335,423 UART: [afmc] CDI.KEYID = 6
2,335,786 UART: [afmc] SUBJECT.KEYID = 7
2,336,212 UART: [afmc] AUTHORITY.KEYID = 5
2,371,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,188 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,907 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,800 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,507 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,518 UART: [afmc] --
2,415,427 UART: [cold-reset] --
2,416,279 UART: [state] Locking Datavault
2,417,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,102 UART: [state] Locking ICCM
2,418,754 UART: [exit] Launching FMC @ 0x40000130
2,424,083 UART:
2,424,099 UART: Running Caliptra FMC ...
2,424,507 UART:
2,424,650 UART: [state] CFI Enabled
2,435,401 UART: [fht] FMC Alias Private Key: 7
2,543,492 UART: [art] Extend RT PCRs Done
2,543,920 UART: [art] Lock RT PCRs Done
2,545,304 UART: [art] Populate DV Done
2,553,418 UART: [fht] FMC Alias Private Key: 7
2,554,366 UART: [art] Derive CDI
2,554,646 UART: [art] Store in in slot 0x4
2,640,447 UART: [art] Derive Key Pair
2,640,807 UART: [art] Store priv key in slot 0x5
2,654,983 UART: [art] Derive Key Pair - Done
2,669,903 UART: [art] Signing Cert with AUTHO
2,670,383 UART: RITY.KEYID = 7
2,685,823 UART: [art] Erasing AUTHORITY.KEYID = 7
2,686,588 UART: [art] PUB.X = 321F52C986EF88D328FF4BF975998A38C84A4A8427C4C96C3B1984A02EF1B43BBA22E963980E53EFB244FA6821D49457
2,693,357 UART: [art] PUB.Y = 2A6CFADF8196EA4756B36AEA9C3451204A6DE7A357DB74DAD1DCE4FA1CCF2163C3FEC4D02FDD4FE03CD8EEDA30844EDB
2,700,343 UART: [art] SIG.R = 9A92F2BE5211D5590AB7DEC7AEF8BDA67C4DE5691B3D9D850308B96EC44DFC0386729EB12F4262B4917A93CF6F91884A
2,707,113 UART: [art] SIG.S = 5794E487ACF48C6DDA467D7410591BA8B9D562CDB0458FE4F2A50B5F1037282390EF725F94737F53734B1FD5F21D9905
2,730,168 UART: mbox::rt_entry...
2,730,540 UART: ____ _ _ _ ____ _____
2,731,324 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,732,124 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,892 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,660 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,428 UART: |_|
2,734,740 UART:
2,842,420 UART: [rt] Runtime listening for mailbox commands...
2,843,182 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,843,402 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,843,496 UART:
2,843,512 UART: Running Caliptra ROM ...
2,843,920 UART:
2,844,062 UART: [state] CFI Enabled
2,846,523 UART: [state] LifecycleState = Production
2,847,131 UART: [state] DebugLocked = Yes
2,847,769 UART: [state] Starting the WD Timer 40000000 cycles
2,849,372 UART: [kat] SHA2-256
3,652,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,657,051 UART: [kat] ++
3,657,203 UART: [kat] sha1
3,661,425 UART: [kat] SHA2-256
3,663,365 UART: [kat] SHA2-384
3,666,032 UART: [kat] SHA2-512-ACC
3,667,933 UART: [kat] ECC-384
3,677,798 UART: [kat] HMAC-384Kdf
3,682,402 UART: [kat] LMS
3,930,714 UART: [kat] --
3,931,512 UART: [warm-reset] ++
3,932,369 UART: [warm-reset] --
3,933,404 UART: [state] Locking Datavault
3,934,244 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,848 UART: [state] Locking ICCM
3,935,370 UART: [exit] Launching FMC @ 0x40000130
3,940,699 UART:
3,940,715 UART: Running Caliptra FMC ...
3,941,123 UART:
3,941,266 UART: [state] CFI Enabled
3,942,719 UART: [aliasrt :skip pcr extension
3,943,192 UART: [art] Extend RT PCRs Done
3,943,620 UART: [art] Lock RT PCRs Done
3,944,979 UART: [art] Populate DV Done
3,952,931 UART: [fht] FMC Alias Private Key: 7
3,953,961 UART: [art] Derive CDI
3,954,241 UART: [art] Store in in slot 0x4
4,039,888 UART: [art] Derive Key Pair
4,040,248 UART: [art] Store priv key in slot 0x5
4,053,764 UART: [art] Derive Key Pair - Done
4,068,330 UART: [art] Signing Cert with AUTHO
4,068,810 UART: RITY.KEYID = 7
4,084,076 UART: [art] Erasing AUTHORITY.KEYID = 7
4,084,841 UART: [art] PUB.X = 321F52C986EF88D328FF4BF975998A38C84A4A8427C4C96C3B1984A02EF1B43BBA22E963980E53EFB244FA6821D49457
4,091,610 UART: [art] PUB.Y = 2A6CFADF8196EA4756B36AEA9C3451204A6DE7A357DB74DAD1DCE4FA1CCF2163C3FEC4D02FDD4FE03CD8EEDA30844EDB
4,098,596 UART: [art] SIG.R = 9A92F2BE5211D5590AB7DEC7AEF8BDA67C4DE5691B3D9D850308B96EC44DFC0386729EB12F4262B4917A93CF6F91884A
4,105,366 UART: [art] SIG.S = 5794E487ACF48C6DDA467D7410591BA8B9D562CDB0458FE4F2A50B5F1037282390EF725F94737F53734B1FD5F21D9905
4,128,775 UART: mbox::rt_entry...
4,129,147 UART: ____ _ _ _ ____ _____
4,129,931 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,130,731 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,131,499 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,132,267 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,133,035 UART: |_|
4,133,347 UART:
4,427,439 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Production
85,929 UART: [state] DebugLocked = Yes
86,583 UART: [state] Starting the WD Timer 40000000 cycles
88,298 UART: [kat] SHA2-256
891,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,977 UART: [kat] ++
896,129 UART: [kat] sha1
900,381 UART: [kat] SHA2-256
902,321 UART: [kat] SHA2-384
905,050 UART: [kat] SHA2-512-ACC
906,951 UART: [kat] ECC-384
916,918 UART: [kat] HMAC-384Kdf
921,402 UART: [kat] LMS
1,169,714 UART: [kat] --
1,170,883 UART: [cold-reset] ++
1,171,208 UART: [fht] FHT @ 0x50003400
1,173,778 UART: [idev] ++
1,173,946 UART: [idev] CDI.KEYID = 6
1,174,307 UART: [idev] SUBJECT.KEYID = 7
1,174,732 UART: [idev] UDS.KEYID = 0
1,175,078 ready_for_fw is high
1,175,078 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,635 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,207,943 UART: [idev] --
1,208,952 UART: [ldev] ++
1,209,120 UART: [ldev] CDI.KEYID = 6
1,209,484 UART: [ldev] SUBJECT.KEYID = 5
1,209,911 UART: [ldev] AUTHORITY.KEYID = 7
1,210,374 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,242,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,733 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,603 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,309 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,525 UART: [ldev] --
1,280,937 UART: [fwproc] Wait for Commands...
1,281,542 UART: [fwproc] Recv command 0x46574c44
1,282,275 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,991 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,118 >>> mbox cmd response: success
2,335,274 UART: [afmc] ++
2,335,442 UART: [afmc] CDI.KEYID = 6
2,335,805 UART: [afmc] SUBJECT.KEYID = 7
2,336,231 UART: [afmc] AUTHORITY.KEYID = 5
2,371,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,069 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,788 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,681 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,388 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,121 UART: [afmc] --
2,415,016 UART: [cold-reset] --
2,415,802 UART: [state] Locking Datavault
2,417,083 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,687 UART: [state] Locking ICCM
2,418,147 UART: [exit] Launching FMC @ 0x40000130
2,423,476 UART:
2,423,492 UART: Running Caliptra FMC ...
2,423,900 UART:
2,423,954 UART: [state] CFI Enabled
2,434,575 UART: [fht] FMC Alias Private Key: 7
2,542,296 UART: [art] Extend RT PCRs Done
2,542,724 UART: [art] Lock RT PCRs Done
2,544,064 UART: [art] Populate DV Done
2,552,046 UART: [fht] FMC Alias Private Key: 7
2,553,002 UART: [art] Derive CDI
2,553,282 UART: [art] Store in in slot 0x4
2,639,171 UART: [art] Derive Key Pair
2,639,531 UART: [art] Store priv key in slot 0x5
2,652,689 UART: [art] Derive Key Pair - Done
2,667,403 UART: [art] Signing Cert with AUTHO
2,667,883 UART: RITY.KEYID = 7
2,683,215 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,980 UART: [art] PUB.X = 64C7BE2BDC128DF113F2F0AE161283BD2E6CF69230AF8147B346783E8F0733CA26252D0AA6CDFEF4DBE9525F2AAAA757
2,690,762 UART: [art] PUB.Y = 2DBBCF6815A05BB5935B19FFD50D40D78B36D87E0569B2BED49EC95AA39605A9B9EF58B4AC8F62D17112B7CF8C7BF1CA
2,697,725 UART: [art] SIG.R = 1D03218F774BD59660AE63C0846878D902DB7392162E079613AD51B1B693CF0429BF23740EF3CAC5ED6195E06930C53E
2,704,476 UART: [art] SIG.S = 8E3959BB25F15FF1CF899252E7F7D364BAB6D21AE16E20BE2A8AF1B4DC7FE94B8FD62B67D9C5002E4E0E33DBFC439E73
2,727,642 UART: mbox::rt_entry...
2,728,014 UART: ____ _ _ _ ____ _____
2,728,798 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,598 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,366 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,134 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,731,902 UART: |_|
2,732,214 UART:
2,838,646 UART: [rt] Runtime listening for mailbox commands...
2,839,408 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,628 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,722 UART:
2,839,738 UART: Running Caliptra ROM ...
2,840,146 UART:
2,840,201 UART: [state] CFI Enabled
2,842,686 UART: [state] LifecycleState = Production
2,843,294 UART: [state] DebugLocked = Yes
2,843,828 UART: [state] Starting the WD Timer 40000000 cycles
2,845,519 UART: [kat] SHA2-256
3,649,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,198 UART: [kat] ++
3,653,350 UART: [kat] sha1
3,657,698 UART: [kat] SHA2-256
3,659,638 UART: [kat] SHA2-384
3,662,467 UART: [kat] SHA2-512-ACC
3,664,368 UART: [kat] ECC-384
3,674,055 UART: [kat] HMAC-384Kdf
3,678,759 UART: [kat] LMS
3,927,071 UART: [kat] --
3,928,191 UART: [warm-reset] ++
3,929,250 UART: [warm-reset] --
3,929,969 UART: [state] Locking Datavault
3,930,831 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,435 UART: [state] Locking ICCM
3,932,023 UART: [exit] Launching FMC @ 0x40000130
3,937,352 UART:
3,937,368 UART: Running Caliptra FMC ...
3,937,776 UART:
3,937,830 UART: [state] CFI Enabled
3,939,111 UART: [aliasrt :skip pcr extension
3,939,584 UART: [art] Extend RT PCRs Done
3,940,012 UART: [art] Lock RT PCRs Done
3,941,109 UART: [art] Populate DV Done
3,949,241 UART: [fht] FMC Alias Private Key: 7
3,950,187 UART: [art] Derive CDI
3,950,467 UART: [art] Store in in slot 0x4
4,035,782 UART: [art] Derive Key Pair
4,036,142 UART: [art] Store priv key in slot 0x5
4,049,836 UART: [art] Derive Key Pair - Done
4,064,714 UART: [art] Signing Cert with AUTHO
4,065,194 UART: RITY.KEYID = 7
4,080,492 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,257 UART: [art] PUB.X = 64C7BE2BDC128DF113F2F0AE161283BD2E6CF69230AF8147B346783E8F0733CA26252D0AA6CDFEF4DBE9525F2AAAA757
4,088,039 UART: [art] PUB.Y = 2DBBCF6815A05BB5935B19FFD50D40D78B36D87E0569B2BED49EC95AA39605A9B9EF58B4AC8F62D17112B7CF8C7BF1CA
4,095,002 UART: [art] SIG.R = 1D03218F774BD59660AE63C0846878D902DB7392162E079613AD51B1B693CF0429BF23740EF3CAC5ED6195E06930C53E
4,101,753 UART: [art] SIG.S = 8E3959BB25F15FF1CF899252E7F7D364BAB6D21AE16E20BE2A8AF1B4DC7FE94B8FD62B67D9C5002E4E0E33DBFC439E73
4,125,053 UART: mbox::rt_entry...
4,125,425 UART: ____ _ _ _ ____ _____
4,126,209 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,009 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,777 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,313 UART: |_|
4,129,625 UART:
4,426,995 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Production
85,797 UART: [state] DebugLocked = Yes
86,437 UART: [state] Starting the WD Timer 40000000 cycles
88,098 UART: [kat] SHA2-256
891,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,163 UART: [kat] SHA2-256
902,103 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,514 UART: [fht] FHT @ 0x50003400
1,173,154 UART: [idev] ++
1,173,322 UART: [idev] CDI.KEYID = 6
1,173,683 UART: [idev] SUBJECT.KEYID = 7
1,174,108 UART: [idev] UDS.KEYID = 0
1,174,454 ready_for_fw is high
1,174,454 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,199,412 UART: [idev] Sha1 KeyId Algorithm
1,208,359 UART: [idev] --
1,209,350 UART: [ldev] ++
1,209,518 UART: [ldev] CDI.KEYID = 6
1,209,882 UART: [ldev] SUBJECT.KEYID = 5
1,210,309 UART: [ldev] AUTHORITY.KEYID = 7
1,210,772 UART: [ldev] FE.KEYID = 1
1,216,106 UART: [ldev] Erasing FE.KEYID = 1
1,242,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,303 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,997 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,867 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,573 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,487 UART: [ldev] --
1,281,837 UART: [fwproc] Wait for Commands...
1,282,452 UART: [fwproc] Recv command 0x46574c44
1,283,185 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,197 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,221,626 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,250,935 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,333,024 >>> mbox cmd response: success
2,334,140 UART: [afmc] ++
2,334,308 UART: [afmc] CDI.KEYID = 6
2,334,671 UART: [afmc] SUBJECT.KEYID = 7
2,335,097 UART: [afmc] AUTHORITY.KEYID = 5
2,370,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,386,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,387,655 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,393,374 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,399,267 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,404,974 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,412,713 UART: [afmc] --
2,413,844 UART: [cold-reset] --
2,414,912 UART: [state] Locking Datavault
2,416,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,416,735 UART: [state] Locking ICCM
2,417,315 UART: [exit] Launching FMC @ 0x40000130
2,422,644 UART:
2,422,660 UART: Running Caliptra FMC ...
2,423,068 UART:
2,423,122 UART: [state] CFI Enabled
2,433,307 UART: [fht] FMC Alias Private Key: 7
2,541,566 UART: [art] Extend RT PCRs Done
2,541,994 UART: [art] Lock RT PCRs Done
2,543,576 UART: [art] Populate DV Done
2,551,626 UART: [fht] FMC Alias Private Key: 7
2,552,680 UART: [art] Derive CDI
2,552,960 UART: [art] Store in in slot 0x4
2,638,377 UART: [art] Derive Key Pair
2,638,737 UART: [art] Store priv key in slot 0x5
2,651,923 UART: [art] Derive Key Pair - Done
2,666,860 UART: [art] Signing Cert with AUTHO
2,667,340 UART: RITY.KEYID = 7
2,682,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,517 UART: [art] PUB.X = CE23B7813BAF286D0E3B52ECC379E0F6471A790E4DFF7427B5DCF0A30CC1AB38F7BEF0E52ED97070388DC73786EF5AED
2,690,300 UART: [art] PUB.Y = 1C69860832847968BD83ED7AA0AD42C21634046230E4D17DF4BF8030A7DDB0A34CD17C42DA61ED222F5CD6C8AB43ADD0
2,697,256 UART: [art] SIG.R = AA545A9CB6D8088D66F2191D6F8235533D37142BDDF37A681704BEA8FDDE4F191B141F1A3CC929FF36E67947BD26F66C
2,704,030 UART: [art] SIG.S = 3DE96102D98354D9F954D2816B6ABD8A72913DA4B420F32A7373C945FA3D1F134219DA8801D8D21A8F3C5F9FEB3D97A1
2,727,963 UART: mbox::rt_entry...
2,728,335 UART: ____ _ _ _ ____ _____
2,729,119 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,919 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,687 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,455 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,223 UART: |_|
2,732,535 UART:
2,838,957 UART: [rt] Runtime listening for mailbox commands...
2,839,719 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,939 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,033 UART:
2,840,049 UART: Running Caliptra ROM ...
2,840,457 UART:
2,840,512 UART: [state] CFI Enabled
2,843,101 UART: [state] LifecycleState = Production
2,843,709 UART: [state] DebugLocked = Yes
2,844,403 UART: [state] Starting the WD Timer 40000000 cycles
2,845,932 UART: [kat] SHA2-256
3,649,482 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,611 UART: [kat] ++
3,653,763 UART: [kat] sha1
3,657,889 UART: [kat] SHA2-256
3,659,829 UART: [kat] SHA2-384
3,662,512 UART: [kat] SHA2-512-ACC
3,664,413 UART: [kat] ECC-384
3,673,786 UART: [kat] HMAC-384Kdf
3,678,484 UART: [kat] LMS
3,926,796 UART: [kat] --
3,927,754 UART: [warm-reset] ++
3,928,797 UART: [warm-reset] --
3,929,636 UART: [state] Locking Datavault
3,930,392 UART: [state] Locking PCR0, PCR1 and PCR31
3,930,996 UART: [state] Locking ICCM
3,931,666 UART: [exit] Launching FMC @ 0x40000130
3,936,995 UART:
3,937,011 UART: Running Caliptra FMC ...
3,937,419 UART:
3,937,473 UART: [state] CFI Enabled
3,938,678 UART: [aliasrt :skip pcr extension
3,939,151 UART: [art] Extend RT PCRs Done
3,939,579 UART: [art] Lock RT PCRs Done
3,940,612 UART: [art] Populate DV Done
3,948,768 UART: [fht] FMC Alias Private Key: 7
3,949,922 UART: [art] Derive CDI
3,950,202 UART: [art] Store in in slot 0x4
4,036,069 UART: [art] Derive Key Pair
4,036,429 UART: [art] Store priv key in slot 0x5
4,049,439 UART: [art] Derive Key Pair - Done
4,064,358 UART: [art] Signing Cert with AUTHO
4,064,838 UART: RITY.KEYID = 7
4,079,786 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,551 UART: [art] PUB.X = CE23B7813BAF286D0E3B52ECC379E0F6471A790E4DFF7427B5DCF0A30CC1AB38F7BEF0E52ED97070388DC73786EF5AED
4,087,334 UART: [art] PUB.Y = 1C69860832847968BD83ED7AA0AD42C21634046230E4D17DF4BF8030A7DDB0A34CD17C42DA61ED222F5CD6C8AB43ADD0
4,094,290 UART: [art] SIG.R = AA545A9CB6D8088D66F2191D6F8235533D37142BDDF37A681704BEA8FDDE4F191B141F1A3CC929FF36E67947BD26F66C
4,101,064 UART: [art] SIG.S = 3DE96102D98354D9F954D2816B6ABD8A72913DA4B420F32A7373C945FA3D1F134219DA8801D8D21A8F3C5F9FEB3D97A1
4,124,103 UART: mbox::rt_entry...
4,124,475 UART: ____ _ _ _ ____ _____
4,125,259 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,059 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,126,827 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,127,595 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,128,363 UART: |_|
4,128,675 UART:
4,426,553 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Production
85,808 UART: [state] DebugLocked = Yes
86,468 UART: [state] Starting the WD Timer 40000000 cycles
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,721 UART: [kat] HMAC-384Kdf
921,397 UART: [kat] LMS
1,169,709 UART: [kat] --
1,170,500 UART: [cold-reset] ++
1,170,865 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,174,687 ready_for_fw is high
1,174,687 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,724 UART: [idev] Erasing UDS.KEYID = 0
1,199,981 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,209,853 UART: [ldev] ++
1,210,021 UART: [ldev] CDI.KEYID = 6
1,210,385 UART: [ldev] SUBJECT.KEYID = 5
1,210,812 UART: [ldev] AUTHORITY.KEYID = 7
1,211,275 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,938 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,808 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,514 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,706 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,553 UART: [fwproc] Recv command 0x46574c44
1,283,286 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,552 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,609 >>> mbox cmd response: success
2,335,787 UART: [afmc] ++
2,335,955 UART: [afmc] CDI.KEYID = 6
2,336,318 UART: [afmc] SUBJECT.KEYID = 7
2,336,744 UART: [afmc] AUTHORITY.KEYID = 5
2,372,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,389,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,890 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,609 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,401,502 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,407,209 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,934 UART: [afmc] --
2,415,903 UART: [cold-reset] --
2,417,023 UART: [state] Locking Datavault
2,418,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,796 UART: [state] Locking ICCM
2,419,306 UART: [exit] Launching FMC @ 0x40000130
2,424,635 UART:
2,424,651 UART: Running Caliptra FMC ...
2,425,059 UART:
2,425,202 UART: [state] CFI Enabled
2,435,975 UART: [fht] FMC Alias Private Key: 7
2,543,688 UART: [art] Extend RT PCRs Done
2,544,116 UART: [art] Lock RT PCRs Done
2,545,754 UART: [art] Populate DV Done
2,554,022 UART: [fht] FMC Alias Private Key: 7
2,555,122 UART: [art] Derive CDI
2,555,402 UART: [art] Store in in slot 0x4
2,641,245 UART: [art] Derive Key Pair
2,641,605 UART: [art] Store priv key in slot 0x5
2,654,773 UART: [art] Derive Key Pair - Done
2,669,909 UART: [art] Signing Cert with AUTHO
2,670,389 UART: RITY.KEYID = 7
2,685,221 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,986 UART: [art] PUB.X = EAC9CCEA8F6D948D4C4CD9A0134D294915E89B386F27AEBB60F6C793F717F257A664E0CA1C7672D590921F735AAF2C1D
2,692,770 UART: [art] PUB.Y = 7E326B4C7152D254861F95E10975086C54AE96ED0157ACE42C1778F22F70424919F5D71A053A7D1AFEEA67909DF894FB
2,699,708 UART: [art] SIG.R = 110EEF8AAF4EF7647A9A8E735652CF27E3D821E3852A10DDD7E8F492151E6CA7A06D06F88C3C11FAB3C74AB14DD87C54
2,706,488 UART: [art] SIG.S = 8617C005925848BCE218B30ABAA21F5BBB5061675B2A433DE4ED381A293B0D7E458F72DEC25780B8DCEA945E69EF19E8
2,729,988 UART: mbox::rt_entry...
2,730,360 UART: ____ _ _ _ ____ _____
2,731,144 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,731,944 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,732,712 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,733,480 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,734,248 UART: |_|
2,734,560 UART:
2,841,138 UART: [rt] Runtime listening for mailbox commands...
2,841,900 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,842,120 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,842,214 UART:
2,842,230 UART: Running Caliptra ROM ...
2,842,638 UART:
2,842,780 UART: [state] CFI Enabled
2,845,765 UART: [state] LifecycleState = Production
2,846,373 UART: [state] DebugLocked = Yes
2,846,975 UART: [state] Starting the WD Timer 40000000 cycles
2,848,668 UART: [kat] SHA2-256
3,652,218 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,656,347 UART: [kat] ++
3,656,499 UART: [kat] sha1
3,660,855 UART: [kat] SHA2-256
3,662,795 UART: [kat] SHA2-384
3,665,368 UART: [kat] SHA2-512-ACC
3,667,269 UART: [kat] ECC-384
3,677,184 UART: [kat] HMAC-384Kdf
3,681,970 UART: [kat] LMS
3,930,282 UART: [kat] --
3,931,106 UART: [warm-reset] ++
3,932,071 UART: [warm-reset] --
3,932,964 UART: [state] Locking Datavault
3,933,796 UART: [state] Locking PCR0, PCR1 and PCR31
3,934,400 UART: [state] Locking ICCM
3,934,892 UART: [exit] Launching FMC @ 0x40000130
3,940,221 UART:
3,940,237 UART: Running Caliptra FMC ...
3,940,645 UART:
3,940,788 UART: [state] CFI Enabled
3,942,053 UART: [aliasrt :skip pcr extension
3,942,526 UART: [art] Extend RT PCRs Done
3,942,954 UART: [art] Lock RT PCRs Done
3,944,199 UART: [art] Populate DV Done
3,952,269 UART: [fht] FMC Alias Private Key: 7
3,953,281 UART: [art] Derive CDI
3,953,561 UART: [art] Store in in slot 0x4
4,039,162 UART: [art] Derive Key Pair
4,039,522 UART: [art] Store priv key in slot 0x5
4,052,538 UART: [art] Derive Key Pair - Done
4,067,156 UART: [art] Signing Cert with AUTHO
4,067,636 UART: RITY.KEYID = 7
4,082,470 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,235 UART: [art] PUB.X = EAC9CCEA8F6D948D4C4CD9A0134D294915E89B386F27AEBB60F6C793F717F257A664E0CA1C7672D590921F735AAF2C1D
4,090,019 UART: [art] PUB.Y = 7E326B4C7152D254861F95E10975086C54AE96ED0157ACE42C1778F22F70424919F5D71A053A7D1AFEEA67909DF894FB
4,096,957 UART: [art] SIG.R = 110EEF8AAF4EF7647A9A8E735652CF27E3D821E3852A10DDD7E8F492151E6CA7A06D06F88C3C11FAB3C74AB14DD87C54
4,103,737 UART: [art] SIG.S = 8617C005925848BCE218B30ABAA21F5BBB5061675B2A433DE4ED381A293B0D7E458F72DEC25780B8DCEA945E69EF19E8
4,127,759 UART: mbox::rt_entry...
4,128,131 UART: ____ _ _ _ ____ _____
4,128,915 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,715 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,130,483 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,131,251 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,132,019 UART: |_|
4,132,331 UART:
4,426,409 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Production
86,238 UART: [state] DebugLocked = Yes
86,758 UART: [state] Starting the WD Timer 40000000 cycles
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,916 UART: [kat] ++
896,068 UART: [kat] sha1
900,466 UART: [kat] SHA2-256
902,406 UART: [kat] SHA2-384
905,275 UART: [kat] SHA2-512-ACC
907,176 UART: [kat] ECC-384
916,895 UART: [kat] HMAC-384Kdf
921,541 UART: [kat] LMS
1,169,853 UART: [kat] --
1,170,476 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,477 UART: [idev] ++
1,173,645 UART: [idev] CDI.KEYID = 6
1,174,006 UART: [idev] SUBJECT.KEYID = 7
1,174,431 UART: [idev] UDS.KEYID = 0
1,174,777 ready_for_fw is high
1,174,777 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,748 UART: [idev] Erasing UDS.KEYID = 0
1,200,007 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,817 UART: [ldev] ++
1,209,985 UART: [ldev] CDI.KEYID = 6
1,210,349 UART: [ldev] SUBJECT.KEYID = 5
1,210,776 UART: [ldev] AUTHORITY.KEYID = 7
1,211,239 UART: [ldev] FE.KEYID = 1
1,216,741 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,584 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,278 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,148 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,854 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,772 UART: [ldev] --
1,282,138 UART: [fwproc] Wait for Commands...
1,282,843 UART: [fwproc] Recv command 0x46574c44
1,283,576 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,805 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,114 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,321 >>> mbox cmd response: success
2,335,419 UART: [afmc] ++
2,335,587 UART: [afmc] CDI.KEYID = 6
2,335,950 UART: [afmc] SUBJECT.KEYID = 7
2,336,376 UART: [afmc] AUTHORITY.KEYID = 5
2,371,735 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,814 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,533 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,426 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,133 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,052 UART: [afmc] --
2,415,013 UART: [cold-reset] --
2,415,793 UART: [state] Locking Datavault
2,416,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,420 UART: [state] Locking ICCM
2,418,040 UART: [exit] Launching FMC @ 0x40000130
2,423,369 UART:
2,423,385 UART: Running Caliptra FMC ...
2,423,793 UART:
2,423,936 UART: [state] CFI Enabled
2,434,501 UART: [fht] FMC Alias Private Key: 7
2,542,534 UART: [art] Extend RT PCRs Done
2,542,962 UART: [art] Lock RT PCRs Done
2,544,394 UART: [art] Populate DV Done
2,552,660 UART: [fht] FMC Alias Private Key: 7
2,553,718 UART: [art] Derive CDI
2,553,998 UART: [art] Store in in slot 0x4
2,639,569 UART: [art] Derive Key Pair
2,639,929 UART: [art] Store priv key in slot 0x5
2,653,429 UART: [art] Derive Key Pair - Done
2,667,818 UART: [art] Signing Cert with AUTHO
2,668,298 UART: RITY.KEYID = 7
2,683,330 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,095 UART: [art] PUB.X = F84F9279E947CE3F37149F3E90D0A419A4CE4598DA2D2663780C1C6EDB244BE71EDD099765348F60A7719555BB238F59
2,690,859 UART: [art] PUB.Y = 777D193E08366BF7A0CA77DB507CBA47AE56B4F1AC5BF70FBFA726DF128B429936ECE49802B3566DB6C6C20DF648C6BC
2,697,815 UART: [art] SIG.R = 028519DA4570647C61861F669E9869B80E8FF8A7D60A7E1F3B201D63A44261C183CFE75A5EBB3886181C19BC9EE1849D
2,704,576 UART: [art] SIG.S = 7B6D865413700D888BB1FC9260FBE1A9B52AA6B9F85E758BC5089C4B58CFEF7C63909C48C166F1F57E819F43AFEB1314
2,728,053 UART: mbox::rt_entry...
2,728,425 UART: ____ _ _ _ ____ _____
2,729,209 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,009 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,777 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,545 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,313 UART: |_|
2,732,625 UART:
2,838,842 UART: [rt] Runtime listening for mailbox commands...
2,839,604 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,839,824 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,839,918 UART:
2,839,934 UART: Running Caliptra ROM ...
2,840,342 UART:
2,840,484 UART: [state] CFI Enabled
2,843,227 UART: [state] LifecycleState = Production
2,843,835 UART: [state] DebugLocked = Yes
2,844,573 UART: [state] Starting the WD Timer 40000000 cycles
2,846,290 UART: [kat] SHA2-256
3,649,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,969 UART: [kat] ++
3,654,121 UART: [kat] sha1
3,658,403 UART: [kat] SHA2-256
3,660,343 UART: [kat] SHA2-384
3,663,114 UART: [kat] SHA2-512-ACC
3,665,015 UART: [kat] ECC-384
3,674,554 UART: [kat] HMAC-384Kdf
3,679,064 UART: [kat] LMS
3,927,376 UART: [kat] --
3,928,358 UART: [warm-reset] ++
3,929,401 UART: [warm-reset] --
3,930,350 UART: [state] Locking Datavault
3,931,152 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,756 UART: [state] Locking ICCM
3,932,264 UART: [exit] Launching FMC @ 0x40000130
3,937,593 UART:
3,937,609 UART: Running Caliptra FMC ...
3,938,017 UART:
3,938,160 UART: [state] CFI Enabled
3,939,391 UART: [aliasrt :skip pcr extension
3,939,864 UART: [art] Extend RT PCRs Done
3,940,292 UART: [art] Lock RT PCRs Done
3,941,659 UART: [art] Populate DV Done
3,949,779 UART: [fht] FMC Alias Private Key: 7
3,950,779 UART: [art] Derive CDI
3,951,059 UART: [art] Store in in slot 0x4
4,036,802 UART: [art] Derive Key Pair
4,037,162 UART: [art] Store priv key in slot 0x5
4,050,324 UART: [art] Derive Key Pair - Done
4,065,173 UART: [art] Signing Cert with AUTHO
4,065,653 UART: RITY.KEYID = 7
4,080,831 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,596 UART: [art] PUB.X = F84F9279E947CE3F37149F3E90D0A419A4CE4598DA2D2663780C1C6EDB244BE71EDD099765348F60A7719555BB238F59
4,088,360 UART: [art] PUB.Y = 777D193E08366BF7A0CA77DB507CBA47AE56B4F1AC5BF70FBFA726DF128B429936ECE49802B3566DB6C6C20DF648C6BC
4,095,316 UART: [art] SIG.R = 028519DA4570647C61861F669E9869B80E8FF8A7D60A7E1F3B201D63A44261C183CFE75A5EBB3886181C19BC9EE1849D
4,102,077 UART: [art] SIG.S = 7B6D865413700D888BB1FC9260FBE1A9B52AA6B9F85E758BC5089C4B58CFEF7C63909C48C166F1F57E819F43AFEB1314
4,125,652 UART: mbox::rt_entry...
4,126,024 UART: ____ _ _ _ ____ _____
4,126,808 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,608 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,376 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,912 UART: |_|
4,130,224 UART:
4,430,087 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Production
85,617 UART: [state] DebugLocked = Yes
86,167 UART: [state] Starting the WD Timer 40000000 cycles
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,754 UART: [kat] LMS
1,169,066 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,208 UART: [idev] ++
1,173,376 UART: [idev] CDI.KEYID = 6
1,173,737 UART: [idev] SUBJECT.KEYID = 7
1,174,162 UART: [idev] UDS.KEYID = 0
1,174,508 ready_for_fw is high
1,174,508 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,233 UART: [idev] Erasing UDS.KEYID = 0
1,198,868 UART: [idev] Sha1 KeyId Algorithm
1,207,969 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,241,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,905 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,599 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,469 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,175 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,331 UART: [ldev] --
1,280,841 UART: [fwproc] Wait for Commands...
1,281,572 UART: [fwproc] Recv command 0x46574c44
1,282,305 UART: [fwproc] Recv'd Img size: 78532 bytes
2,194,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,628 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,937 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,172 >>> mbox cmd response: success
2,335,216 UART: [afmc] ++
2,335,384 UART: [afmc] CDI.KEYID = 6
2,335,747 UART: [afmc] SUBJECT.KEYID = 7
2,336,173 UART: [afmc] AUTHORITY.KEYID = 5
2,371,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,626 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,377 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,096 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,989 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,696 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,525 UART: [afmc] --
2,415,584 UART: [cold-reset] --
2,416,188 UART: [state] Locking Datavault
2,417,315 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,919 UART: [state] Locking ICCM
2,418,359 UART: [exit] Launching FMC @ 0x40000130
2,423,688 UART:
2,423,704 UART: Running Caliptra FMC ...
2,424,112 UART:
2,424,166 UART: [state] CFI Enabled
2,434,573 UART: [fht] FMC Alias Private Key: 7
2,541,706 UART: [art] Extend RT PCRs Done
2,542,134 UART: [art] Lock RT PCRs Done
2,543,560 UART: [art] Populate DV Done
2,551,954 UART: [fht] FMC Alias Private Key: 7
2,553,088 UART: [art] Derive CDI
2,553,368 UART: [art] Store in in slot 0x4
2,638,847 UART: [art] Derive Key Pair
2,639,207 UART: [art] Store priv key in slot 0x5
2,652,283 UART: [art] Derive Key Pair - Done
2,667,253 UART: [art] Signing Cert with AUTHO
2,667,733 UART: RITY.KEYID = 7
2,682,923 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,688 UART: [art] PUB.X = 91ED4FE232CE038AF805D14C92E6AA5408008A2B9F3ADE9994D78A162CD2E4E3EEFBD11C75D68AC2DADFE5BDFA9A31C1
2,690,455 UART: [art] PUB.Y = FD03F3EDF4A7A8900EF053136BEF94C90395E81394359B96E9D87E7AC3E329680DD225D9E443BEF2C1801C8D392DEDB9
2,697,403 UART: [art] SIG.R = FC3637ECC37AEDDD34F68528924914D115ADEF16956944F73B6A5AC788C61893DA885C593A82F50A51DF25BFF6D9E636
2,704,178 UART: [art] SIG.S = A097E53863503A4A8DFAB0593BECA7514708C81FB5CB8A9DBB8464C043CB94AF0C4671E0D7209CFECB9ADB3D67B7DA32
2,727,779 UART: mbox::rt_entry...
2,728,151 UART: ____ _ _ _ ____ _____
2,728,935 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,729,735 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,730,503 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,731,271 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,732,039 UART: |_|
2,732,351 UART:
2,839,173 UART: [rt] Runtime listening for mailbox commands...
2,839,935 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,155 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,249 UART:
2,840,265 UART: Running Caliptra ROM ...
2,840,673 UART:
2,840,728 UART: [state] CFI Enabled
2,843,321 UART: [state] LifecycleState = Production
2,843,929 UART: [state] DebugLocked = Yes
2,844,465 UART: [state] Starting the WD Timer 40000000 cycles
2,846,180 UART: [kat] SHA2-256
3,649,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,859 UART: [kat] ++
3,654,011 UART: [kat] sha1
3,658,065 UART: [kat] SHA2-256
3,660,005 UART: [kat] SHA2-384
3,662,880 UART: [kat] SHA2-512-ACC
3,664,781 UART: [kat] ECC-384
3,674,618 UART: [kat] HMAC-384Kdf
3,679,136 UART: [kat] LMS
3,927,448 UART: [kat] --
3,928,202 UART: [warm-reset] ++
3,929,403 UART: [warm-reset] --
3,930,408 UART: [state] Locking Datavault
3,931,416 UART: [state] Locking PCR0, PCR1 and PCR31
3,932,020 UART: [state] Locking ICCM
3,932,572 UART: [exit] Launching FMC @ 0x40000130
3,937,901 UART:
3,937,917 UART: Running Caliptra FMC ...
3,938,325 UART:
3,938,379 UART: [state] CFI Enabled
3,939,776 UART: [aliasrt :skip pcr extension
3,940,249 UART: [art] Extend RT PCRs Done
3,940,677 UART: [art] Lock RT PCRs Done
3,941,860 UART: [art] Populate DV Done
3,950,106 UART: [fht] FMC Alias Private Key: 7
3,951,162 UART: [art] Derive CDI
3,951,442 UART: [art] Store in in slot 0x4
4,036,683 UART: [art] Derive Key Pair
4,037,043 UART: [art] Store priv key in slot 0x5
4,049,875 UART: [art] Derive Key Pair - Done
4,064,525 UART: [art] Signing Cert with AUTHO
4,065,005 UART: RITY.KEYID = 7
4,080,163 UART: [art] Erasing AUTHORITY.KEYID = 7
4,080,928 UART: [art] PUB.X = 91ED4FE232CE038AF805D14C92E6AA5408008A2B9F3ADE9994D78A162CD2E4E3EEFBD11C75D68AC2DADFE5BDFA9A31C1
4,087,695 UART: [art] PUB.Y = FD03F3EDF4A7A8900EF053136BEF94C90395E81394359B96E9D87E7AC3E329680DD225D9E443BEF2C1801C8D392DEDB9
4,094,643 UART: [art] SIG.R = FC3637ECC37AEDDD34F68528924914D115ADEF16956944F73B6A5AC788C61893DA885C593A82F50A51DF25BFF6D9E636
4,101,418 UART: [art] SIG.S = A097E53863503A4A8DFAB0593BECA7514708C81FB5CB8A9DBB8464C043CB94AF0C4671E0D7209CFECB9ADB3D67B7DA32
4,125,037 UART: mbox::rt_entry...
4,125,409 UART: ____ _ _ _ ____ _____
4,126,193 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,126,993 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,127,761 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,128,529 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,297 UART: |_|
4,129,609 UART:
4,423,795 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Production
85,661 UART: [state] DebugLocked = Yes
86,253 UART: [state] Starting the WD Timer 40000000 cycles
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,800 UART: [kat] LMS
1,169,112 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
1,174,870 ready_for_fw is high
1,174,870 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,253 UART: [idev] Erasing UDS.KEYID = 0
1,199,034 UART: [idev] Sha1 KeyId Algorithm
1,207,919 UART: [idev] --
1,209,080 UART: [ldev] ++
1,209,248 UART: [ldev] CDI.KEYID = 6
1,209,612 UART: [ldev] SUBJECT.KEYID = 5
1,210,039 UART: [ldev] AUTHORITY.KEYID = 7
1,210,502 UART: [ldev] FE.KEYID = 1
1,215,804 UART: [ldev] Erasing FE.KEYID = 1
1,242,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,669 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,363 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,233 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,939 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,143 UART: [ldev] --
1,281,557 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,111 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,370 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,679 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,333,824 >>> mbox cmd response: success
2,334,924 UART: [afmc] ++
2,335,092 UART: [afmc] CDI.KEYID = 6
2,335,455 UART: [afmc] SUBJECT.KEYID = 7
2,335,881 UART: [afmc] AUTHORITY.KEYID = 5
2,371,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,388,895 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,614 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,507 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,214 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,157 UART: [afmc] --
2,415,052 UART: [cold-reset] --
2,415,954 UART: [state] Locking Datavault
2,417,153 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,757 UART: [state] Locking ICCM
2,418,323 UART: [exit] Launching FMC @ 0x40000130
2,423,652 UART:
2,423,668 UART: Running Caliptra FMC ...
2,424,076 UART:
2,424,130 UART: [state] CFI Enabled
2,434,477 UART: [fht] FMC Alias Private Key: 7
2,542,138 UART: [art] Extend RT PCRs Done
2,542,566 UART: [art] Lock RT PCRs Done
2,544,074 UART: [art] Populate DV Done
2,552,360 UART: [fht] FMC Alias Private Key: 7
2,553,534 UART: [art] Derive CDI
2,553,814 UART: [art] Store in in slot 0x4
2,639,477 UART: [art] Derive Key Pair
2,639,837 UART: [art] Store priv key in slot 0x5
2,653,093 UART: [art] Derive Key Pair - Done
2,667,653 UART: [art] Signing Cert with AUTHO
2,668,133 UART: RITY.KEYID = 7
2,682,945 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,710 UART: [art] PUB.X = 0ABC8D52C5D4401D51EB2488D2801F77A7446581598DB5059296D56331C0C97326CE15BB7EDD93F49120B7BD5CBD7025
2,690,474 UART: [art] PUB.Y = AF359573B0732F4589133AC8CA1018EC6F31A1E814E3E542FD894ABBD4205C57E3497EE3F1345E88B247E465AC043D77
2,697,423 UART: [art] SIG.R = C027A826F3F001C583D683A8FD5FB49A9283AB01B1DB7C57B6CEC0E6CCA868A4A3111468BF0AD8F03D589AE25F969043
2,704,196 UART: [art] SIG.S = 88B6ABF9E7FFA4193621F5146D009070F95D587AC03FA057CEBF559EDF4C4B25DA41122F9F410008FE34C58DE3F9960E
2,728,769 UART: mbox::rt_entry...
2,729,141 UART: ____ _ _ _ ____ _____
2,729,925 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,725 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,493 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,261 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,029 UART: |_|
2,733,341 UART:
2,839,179 UART: [rt] Runtime listening for mailbox commands...
2,839,941 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,161 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,255 UART:
2,840,271 UART: Running Caliptra ROM ...
2,840,679 UART:
2,840,734 UART: [state] CFI Enabled
2,842,925 UART: [state] LifecycleState = Production
2,843,533 UART: [state] DebugLocked = Yes
2,844,235 UART: [state] Starting the WD Timer 40000000 cycles
2,845,828 UART: [kat] SHA2-256
3,649,378 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,507 UART: [kat] ++
3,653,659 UART: [kat] sha1
3,657,879 UART: [kat] SHA2-256
3,659,819 UART: [kat] SHA2-384
3,662,518 UART: [kat] SHA2-512-ACC
3,664,419 UART: [kat] ECC-384
3,674,390 UART: [kat] HMAC-384Kdf
3,679,038 UART: [kat] LMS
3,927,350 UART: [kat] --
3,928,330 UART: [warm-reset] ++
3,929,401 UART: [warm-reset] --
3,930,372 UART: [state] Locking Datavault
3,931,374 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,978 UART: [state] Locking ICCM
3,932,632 UART: [exit] Launching FMC @ 0x40000130
3,937,961 UART:
3,937,977 UART: Running Caliptra FMC ...
3,938,385 UART:
3,938,439 UART: [state] CFI Enabled
3,939,792 UART: [aliasrt :skip pcr extension
3,940,265 UART: [art] Extend RT PCRs Done
3,940,693 UART: [art] Lock RT PCRs Done
3,941,852 UART: [art] Populate DV Done
3,949,976 UART: [fht] FMC Alias Private Key: 7
3,951,068 UART: [art] Derive CDI
3,951,348 UART: [art] Store in in slot 0x4
4,036,919 UART: [art] Derive Key Pair
4,037,279 UART: [art] Store priv key in slot 0x5
4,050,215 UART: [art] Derive Key Pair - Done
4,064,887 UART: [art] Signing Cert with AUTHO
4,065,367 UART: RITY.KEYID = 7
4,080,671 UART: [art] Erasing AUTHORITY.KEYID = 7
4,081,436 UART: [art] PUB.X = 0ABC8D52C5D4401D51EB2488D2801F77A7446581598DB5059296D56331C0C97326CE15BB7EDD93F49120B7BD5CBD7025
4,088,200 UART: [art] PUB.Y = AF359573B0732F4589133AC8CA1018EC6F31A1E814E3E542FD894ABBD4205C57E3497EE3F1345E88B247E465AC043D77
4,095,149 UART: [art] SIG.R = C027A826F3F001C583D683A8FD5FB49A9283AB01B1DB7C57B6CEC0E6CCA868A4A3111468BF0AD8F03D589AE25F969043
4,101,922 UART: [art] SIG.S = 88B6ABF9E7FFA4193621F5146D009070F95D587AC03FA057CEBF559EDF4C4B25DA41122F9F410008FE34C58DE3F9960E
4,125,653 UART: mbox::rt_entry...
4,126,025 UART: ____ _ _ _ ____ _____
4,126,809 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,127,609 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,128,377 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,129,145 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,129,913 UART: |_|
4,130,225 UART:
4,428,947 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Production
86,184 UART: [state] DebugLocked = Yes
86,730 UART: [state] Starting the WD Timer 40000000 cycles
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,042 UART: [kat] ++
896,194 UART: [kat] sha1
900,344 UART: [kat] SHA2-256
902,284 UART: [kat] SHA2-384
905,097 UART: [kat] SHA2-512-ACC
906,998 UART: [kat] ECC-384
916,553 UART: [kat] HMAC-384Kdf
921,071 UART: [kat] LMS
1,169,383 UART: [kat] --
1,170,124 UART: [cold-reset] ++
1,170,639 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,174,483 ready_for_fw is high
1,174,483 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,338 UART: [idev] Erasing UDS.KEYID = 0
1,199,735 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,453 UART: [ldev] SUBJECT.KEYID = 5
1,210,880 UART: [ldev] AUTHORITY.KEYID = 7
1,211,343 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,243,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,746 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,440 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,310 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,016 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,246 UART: [ldev] --
1,282,706 UART: [fwproc] Wait for Commands...
1,283,353 UART: [fwproc] Recv command 0x46574c44
1,284,086 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,223,051 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,252,360 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,334,367 >>> mbox cmd response: success
2,335,417 UART: [afmc] ++
2,335,585 UART: [afmc] CDI.KEYID = 6
2,335,948 UART: [afmc] SUBJECT.KEYID = 7
2,336,374 UART: [afmc] AUTHORITY.KEYID = 5
2,372,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,348 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,395,067 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,960 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,667 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,558 UART: [afmc] --
2,415,653 UART: [cold-reset] --
2,416,545 UART: [state] Locking Datavault
2,417,732 UART: [state] Locking PCR0, PCR1 and PCR31
2,418,336 UART: [state] Locking ICCM
2,418,818 UART: [exit] Launching FMC @ 0x40000130
2,424,147 UART:
2,424,163 UART: Running Caliptra FMC ...
2,424,571 UART:
2,424,714 UART: [state] CFI Enabled
2,435,457 UART: [fht] FMC Alias Private Key: 7
2,543,368 UART: [art] Extend RT PCRs Done
2,543,796 UART: [art] Lock RT PCRs Done
2,545,028 UART: [art] Populate DV Done
2,553,196 UART: [fht] FMC Alias Private Key: 7
2,554,158 UART: [art] Derive CDI
2,554,438 UART: [art] Store in in slot 0x4
2,640,201 UART: [art] Derive Key Pair
2,640,561 UART: [art] Store priv key in slot 0x5
2,653,713 UART: [art] Derive Key Pair - Done
2,668,727 UART: [art] Signing Cert with AUTHO
2,669,207 UART: RITY.KEYID = 7
2,683,991 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,756 UART: [art] PUB.X = 1292087B2B8B9A46CE61125DEA58355B552A994437B78CC90EF3CA75CC1443FCA012FC4B6EF53CD3502C004D72DBA237
2,691,506 UART: [art] PUB.Y = E9AEF328EDD488D5923996D40C6FCE84BA14BDD8D7C337A028A972ED43BCFFD686250048A7EFA5B8572CD7800187EFA5
2,698,444 UART: [art] SIG.R = 7DA835E15197F6F4E0AABA6B629BA13E79F82DCEA07D483A040FA25A9D774E707A6D91AB3B8313515F30A605A8944A55
2,705,213 UART: [art] SIG.S = 7CAE39CBA87EC9298A2FDEB1BB5DB5BCE0C135080ACED1BAAC4DEB0846D80EC212E6567634DB0A796C032D37A68A3872
2,728,788 UART: mbox::rt_entry...
2,729,160 UART: ____ _ _ _ ____ _____
2,729,944 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,744 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,512 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,280 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,048 UART: |_|
2,733,360 UART:
2,840,553 UART: [rt] Runtime listening for mailbox commands...
2,841,315 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,841,535 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,841,629 UART:
2,841,645 UART: Running Caliptra ROM ...
2,842,053 UART:
2,842,195 UART: [state] CFI Enabled
2,845,088 UART: [state] LifecycleState = Production
2,845,696 UART: [state] DebugLocked = Yes
2,846,444 UART: [state] Starting the WD Timer 40000000 cycles
2,848,121 UART: [kat] SHA2-256
3,651,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,655,800 UART: [kat] ++
3,655,952 UART: [kat] sha1
3,660,150 UART: [kat] SHA2-256
3,662,090 UART: [kat] SHA2-384
3,664,801 UART: [kat] SHA2-512-ACC
3,666,702 UART: [kat] ECC-384
3,676,681 UART: [kat] HMAC-384Kdf
3,681,239 UART: [kat] LMS
3,929,551 UART: [kat] --
3,930,573 UART: [warm-reset] ++
3,931,320 UART: [warm-reset] --
3,932,217 UART: [state] Locking Datavault
3,933,113 UART: [state] Locking PCR0, PCR1 and PCR31
3,933,717 UART: [state] Locking ICCM
3,934,149 UART: [exit] Launching FMC @ 0x40000130
3,939,478 UART:
3,939,494 UART: Running Caliptra FMC ...
3,939,902 UART:
3,940,045 UART: [state] CFI Enabled
3,941,206 UART: [aliasrt :skip pcr extension
3,941,679 UART: [art] Extend RT PCRs Done
3,942,107 UART: [art] Lock RT PCRs Done
3,943,608 UART: [art] Populate DV Done
3,951,816 UART: [fht] FMC Alias Private Key: 7
3,952,872 UART: [art] Derive CDI
3,953,152 UART: [art] Store in in slot 0x4
4,038,999 UART: [art] Derive Key Pair
4,039,359 UART: [art] Store priv key in slot 0x5
4,052,335 UART: [art] Derive Key Pair - Done
4,066,825 UART: [art] Signing Cert with AUTHO
4,067,305 UART: RITY.KEYID = 7
4,082,779 UART: [art] Erasing AUTHORITY.KEYID = 7
4,083,544 UART: [art] PUB.X = 1292087B2B8B9A46CE61125DEA58355B552A994437B78CC90EF3CA75CC1443FCA012FC4B6EF53CD3502C004D72DBA237
4,090,294 UART: [art] PUB.Y = E9AEF328EDD488D5923996D40C6FCE84BA14BDD8D7C337A028A972ED43BCFFD686250048A7EFA5B8572CD7800187EFA5
4,097,232 UART: [art] SIG.R = 7DA835E15197F6F4E0AABA6B629BA13E79F82DCEA07D483A040FA25A9D774E707A6D91AB3B8313515F30A605A8944A55
4,104,001 UART: [art] SIG.S = 7CAE39CBA87EC9298A2FDEB1BB5DB5BCE0C135080ACED1BAAC4DEB0846D80EC212E6567634DB0A796C032D37A68A3872
4,126,998 UART: mbox::rt_entry...
4,127,370 UART: ____ _ _ _ ____ _____
4,128,154 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,128,954 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,722 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,490 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,258 UART: |_|
4,131,570 UART:
4,427,493 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Production
85,904 UART: [state] DebugLocked = Yes
86,542 UART: [state] Starting the WD Timer 40000000 cycles
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,112 UART: [kat] SHA2-256
902,052 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,967 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,174,835 ready_for_fw is high
1,174,835 <<< Executing mbox cmd 0x46574c44 (78532 bytes) from SoC
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,199,995 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,943 UART: [ldev] ++
1,210,111 UART: [ldev] CDI.KEYID = 6
1,210,475 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,324 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,018 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,888 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,594 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,720 UART: [ldev] --
1,282,232 UART: [fwproc] Wait for Commands...
1,282,947 UART: [fwproc] Recv command 0x46574c44
1,283,680 UART: [fwproc] Recv'd Img size: 78532 bytes
2,195,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,222,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,251,802 UART: [fwproc] Load Runtime at address 0x40005000 len 53848
2,333,991 >>> mbox cmd response: success
2,335,101 UART: [afmc] ++
2,335,269 UART: [afmc] CDI.KEYID = 6
2,335,632 UART: [afmc] SUBJECT.KEYID = 7
2,336,058 UART: [afmc] AUTHORITY.KEYID = 5
2,372,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,388,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,389,102 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,394,821 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,400,714 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,406,421 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,414,452 UART: [afmc] --
2,415,363 UART: [cold-reset] --
2,416,293 UART: [state] Locking Datavault
2,417,310 UART: [state] Locking PCR0, PCR1 and PCR31
2,417,914 UART: [state] Locking ICCM
2,418,436 UART: [exit] Launching FMC @ 0x40000130
2,423,765 UART:
2,423,781 UART: Running Caliptra FMC ...
2,424,189 UART:
2,424,332 UART: [state] CFI Enabled
2,434,717 UART: [fht] FMC Alias Private Key: 7
2,542,564 UART: [art] Extend RT PCRs Done
2,542,992 UART: [art] Lock RT PCRs Done
2,544,484 UART: [art] Populate DV Done
2,552,866 UART: [fht] FMC Alias Private Key: 7
2,553,882 UART: [art] Derive CDI
2,554,162 UART: [art] Store in in slot 0x4
2,640,153 UART: [art] Derive Key Pair
2,640,513 UART: [art] Store priv key in slot 0x5
2,653,613 UART: [art] Derive Key Pair - Done
2,668,126 UART: [art] Signing Cert with AUTHO
2,668,606 UART: RITY.KEYID = 7
2,684,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,805 UART: [art] PUB.X = CF25BE17F13D49AAEE637DBFEF478D3B5CF6CFC6CC366FC9A64341C26620C97F1FC5CB8B2C0A4EE6091A4F2F105A8EA1
2,691,597 UART: [art] PUB.Y = E2CFCE685BE0239A0C8070866FA5FF5AE50BBA89A07B0E48847A7495B61E5854BA4B683A363D412CB96EFCB1797C546C
2,698,550 UART: [art] SIG.R = 710A4CEA7B956FB33A7F5EFEE1A63C98BFB2F52F760DD92BBD4746487D1AFC2EA6948A62288A275366DAF9A8876D0E63
2,705,327 UART: [art] SIG.S = 850EFA4A0AC1F6CB08782167AC988CC3E4E16CD268481DE76EE53FD0B4D724A5F02F8E9765C97535A2DB56179CAF6725
2,728,937 UART: mbox::rt_entry...
2,729,309 UART: ____ _ _ _ ____ _____
2,730,093 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,730,893 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,731,661 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,732,429 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,733,197 UART: |_|
2,733,509 UART:
2,839,119 UART: [rt] Runtime listening for mailbox commands...
2,839,881 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,840,101 >>> mbox cmd response data (0 bytes)
Initializing fuses
2,840,195 UART:
2,840,211 UART: Running Caliptra ROM ...
2,840,619 UART:
2,840,761 UART: [state] CFI Enabled
2,843,304 UART: [state] LifecycleState = Production
2,843,912 UART: [state] DebugLocked = Yes
2,844,624 UART: [state] Starting the WD Timer 40000000 cycles
2,846,299 UART: [kat] SHA2-256
3,649,849 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
3,653,978 UART: [kat] ++
3,654,130 UART: [kat] sha1
3,658,374 UART: [kat] SHA2-256
3,660,314 UART: [kat] SHA2-384
3,662,981 UART: [kat] SHA2-512-ACC
3,664,882 UART: [kat] ECC-384
3,674,815 UART: [kat] HMAC-384Kdf
3,679,427 UART: [kat] LMS
3,927,739 UART: [kat] --
3,928,951 UART: [warm-reset] ++
3,929,706 UART: [warm-reset] --
3,930,503 UART: [state] Locking Datavault
3,931,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,931,941 UART: [state] Locking ICCM
3,932,529 UART: [exit] Launching FMC @ 0x40000130
3,937,858 UART:
3,937,874 UART: Running Caliptra FMC ...
3,938,282 UART:
3,938,425 UART: [state] CFI Enabled
3,939,946 UART: [aliasrt :skip pcr extension
3,940,419 UART: [art] Extend RT PCRs Done
3,940,847 UART: [art] Lock RT PCRs Done
3,942,108 UART: [art] Populate DV Done
3,950,230 UART: [fht] FMC Alias Private Key: 7
3,951,338 UART: [art] Derive CDI
3,951,618 UART: [art] Store in in slot 0x4
4,037,059 UART: [art] Derive Key Pair
4,037,419 UART: [art] Store priv key in slot 0x5
4,050,925 UART: [art] Derive Key Pair - Done
4,065,724 UART: [art] Signing Cert with AUTHO
4,066,204 UART: RITY.KEYID = 7
4,081,800 UART: [art] Erasing AUTHORITY.KEYID = 7
4,082,565 UART: [art] PUB.X = CF25BE17F13D49AAEE637DBFEF478D3B5CF6CFC6CC366FC9A64341C26620C97F1FC5CB8B2C0A4EE6091A4F2F105A8EA1
4,089,357 UART: [art] PUB.Y = E2CFCE685BE0239A0C8070866FA5FF5AE50BBA89A07B0E48847A7495B61E5854BA4B683A363D412CB96EFCB1797C546C
4,096,310 UART: [art] SIG.R = 710A4CEA7B956FB33A7F5EFEE1A63C98BFB2F52F760DD92BBD4746487D1AFC2EA6948A62288A275366DAF9A8876D0E63
4,103,087 UART: [art] SIG.S = 850EFA4A0AC1F6CB08782167AC988CC3E4E16CD268481DE76EE53FD0B4D724A5F02F8E9765C97535A2DB56179CAF6725
4,127,119 UART: mbox::rt_entry...
4,127,491 UART: ____ _ _ _ ____ _____
4,128,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,129,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,129,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,130,611 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,131,379 UART: |_|
4,131,691 UART:
4,431,601 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 141 filtered out; finished in 1.44s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,982 writing to cptra_bootfsm_go
193,056 UART:
193,418 UART: Running Caliptra ROM ...
194,679 UART:
194,828 UART: [state] CFI Enabled
262,799 UART: [state] LifecycleState = Unprovisioned
265,185 UART: [state] DebugLocked = No
267,499 UART: [state] WD Timer not started. Device not locked for debugging
272,312 UART: [fake-rom-cold-reset] ++
275,386 ready_for_fw is high
275,681 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
400,287 UART: [fht] FHT @ 0x50003400
401,393 UART: [fwproc] Wait for Commands...
402,684 UART: [fwproc] Recv command 0x46574c44
404,338 UART: [fwproc] Recv'd Img size: 99120 bytes
1,666,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,736,087 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,766,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
2,350,756 >>> mbox cmd response: success
2,356,780 UART: [fake-rom-cold-reset] --
2,360,833 UART: [state] Locking Datavault
2,365,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,367,931 UART: [state] Locking ICCM
2,369,844 UART: [exit] Launching FMC @ 0x40000130
2,378,743 UART:
2,378,978 UART: Running Caliptra FMC ...
2,380,098 UART:
2,380,259 UART: [state] CFI Enabled
2,431,987 UART: Caliptra RT
2,432,662 UART: [state] CFI Enabled
2,602,214 UART: [rt] RT listening for mailbox commands...
2,604,388 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,633,998 UART: [rt]cmd =0x4c444556, len=4
2,645,112 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,048,448 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,078,442 UART: [rt]cmd =0x43455246, len=4
3,091,274 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,839 writing to cptra_bootfsm_go
193,006 UART:
193,378 UART: Running Caliptra ROM ...
194,651 UART:
194,806 UART: [state] CFI Enabled
261,615 UART: [state] LifecycleState = Unprovisioned
264,072 UART: [state] DebugLocked = No
266,672 UART: [state] WD Timer not started. Device not locked for debugging
272,332 UART: [fake-rom-cold-reset] ++
275,359 ready_for_fw is high
275,615 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
400,178 UART: [fht] FHT @ 0x50003400
401,275 UART: [fwproc] Wait for Commands...
402,560 UART: [fwproc] Recv command 0x46574c44
403,990 UART: [fwproc] Recv'd Img size: 99120 bytes
1,667,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,746,386 UART: [fwproc] Load FMC at address 0x40000000 len 4096
1,776,482 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
2,360,977 >>> mbox cmd response: success
2,367,055 UART: [fake-rom-cold-reset] --
2,371,124 UART: [state] Locking Datavault
2,377,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,379,202 UART: [state] Locking ICCM
2,381,519 UART: [exit] Launching FMC @ 0x40000130
2,390,309 UART:
2,390,593 UART: Running Caliptra FMC ...
2,391,626 UART:
2,391,776 UART: [state] CFI Enabled
2,451,068 UART: Caliptra RT
2,451,711 UART: [state] CFI Enabled
2,619,718 UART: [rt] RT listening for mailbox commands...
2,621,984 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,651,892 UART: [rt]cmd =0x4c444556, len=4
2,662,851 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,066,086 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,095,726 UART: [rt]cmd =0x43455246, len=4
3,108,381 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,491 UART:
192,867 UART: Running Caliptra ROM ...
194,064 UART:
603,921 UART: [state] CFI Enabled
618,879 UART: [state] LifecycleState = Unprovisioned
621,295 UART: [state] DebugLocked = No
624,305 UART: [state] WD Timer not started. Device not locked for debugging
630,805 UART: [fake-rom-cold-reset] ++
633,913 ready_for_fw is high
634,173 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
758,579 UART: [fht] FHT @ 0x50003400
759,664 UART: [fwproc] Wait for Commands...
760,942 UART: [fwproc] Recv command 0x46574c44
762,376 UART: [fwproc] Recv'd Img size: 99120 bytes
2,033,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,106,990 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,137,092 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
2,720,869 >>> mbox cmd response: success
2,726,907 UART: [fake-rom-cold-reset] --
2,730,697 UART: [state] Locking Datavault
2,737,922 UART: [state] Locking PCR0, PCR1 and PCR31
2,740,108 UART: [state] Locking ICCM
2,743,100 UART: [exit] Launching FMC @ 0x40000130
2,751,924 UART:
2,752,154 UART: Running Caliptra FMC ...
2,753,175 UART:
2,753,320 UART: [state] CFI Enabled
2,757,376 UART: Caliptra RT
2,758,058 UART: [state] CFI Enabled
2,867,137 UART: [rt] RT listening for mailbox commands...
2,869,331 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,899,043 UART: [rt]cmd =0x4c444556, len=4
2,910,296 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,314,375 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,344,207 UART: [rt]cmd =0x43455246, len=4
3,356,705 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d0cd6a514240d6c3362307048e93e7f40c6de8000b391b0a0666d48b5948a1a736c1df9aa0f86fed0bd14ecd8bf34a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,642 UART:
192,999 UART: Running Caliptra ROM ...
194,250 UART:
604,079 UART: [state] CFI Enabled
618,697 UART: [state] LifecycleState = Unprovisioned
621,054 UART: [state] DebugLocked = No
624,288 UART: [state] WD Timer not started. Device not locked for debugging
629,810 UART: [fake-rom-cold-reset] ++
632,902 ready_for_fw is high
633,155 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
757,727 UART: [fht] FHT @ 0x50003400
758,821 UART: [fwproc] Wait for Commands...
760,110 UART: [fwproc] Recv command 0x46574c44
761,651 UART: [fwproc] Recv'd Img size: 99120 bytes
2,030,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,102,370 UART: [fwproc] Load FMC at address 0x40000000 len 4096
2,132,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89140
2,716,486 >>> mbox cmd response: success
2,722,560 UART: [fake-rom-cold-reset] --
2,725,053 UART: [state] Locking Datavault
2,730,234 UART: [state] Locking PCR0, PCR1 and PCR31
2,732,374 UART: [state] Locking ICCM
2,734,419 UART: [exit] Launching FMC @ 0x40000130
2,743,192 UART:
2,743,427 UART: Running Caliptra FMC ...
2,744,531 UART:
2,744,709 UART: [state] CFI Enabled
2,748,493 UART: Caliptra RT
2,749,180 UART: [state] CFI Enabled
2,858,821 UART: [rt] RT listening for mailbox commands...
2,861,027 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,890,763 UART: [rt]cmd =0x4c444556, len=4
2,901,880 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,306,589 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,336,452 UART: [rt]cmd =0x43455246, len=4
3,349,191 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,725 writing to cptra_bootfsm_go
192,852 UART:
193,278 UART: Running Caliptra ROM ...
194,382 UART:
194,522 UART: [state] CFI Enabled
262,974 UART: [state] LifecycleState = Unprovisioned
264,681 UART: [state] DebugLocked = No
266,128 UART: [state] WD Timer not started. Device not locked for debugging
270,942 UART: [fake-rom-cold-reset] ++
273,323 ready_for_fw is high
273,643 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
398,541 UART: [fht] FHT @ 0x50003400
399,634 UART: [fwproc] Wait for Commands...
400,919 UART: [fwproc] Recv command 0x46574c44
402,326 UART: [fwproc] Recv'd Img size: 99468 bytes
1,695,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,763,462 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,780,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,097,854 >>> mbox cmd response: success
2,103,693 UART: [fake-rom-cold-reset] --
2,106,344 UART: [state] Locking Datavault
2,110,241 UART: [state] Locking PCR0, PCR1 and PCR31
2,111,776 UART: [state] Locking ICCM
2,113,933 UART: [exit] Launching FMC @ 0x40000130
2,122,184 UART:
2,122,431 UART: Running Caliptra FMC ...
2,123,536 UART:
2,123,697 UART: [state] CFI Enabled
2,176,326 UART: Caliptra RT
2,176,959 UART: [state] CFI Enabled
2,346,983 UART: [rt] RT listening for mailbox commands...
2,349,153 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,378,891 UART: [rt]cmd =0x4c444556, len=4
2,389,905 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,793,719 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,823,450 UART: [rt]cmd =0x43455246, len=4
2,836,012 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
192,995 UART:
193,369 UART: Running Caliptra ROM ...
194,461 UART:
194,597 UART: [state] CFI Enabled
266,619 UART: [state] LifecycleState = Unprovisioned
268,371 UART: [state] DebugLocked = No
270,388 UART: [state] WD Timer not started. Device not locked for debugging
275,067 UART: [fake-rom-cold-reset] ++
277,411 ready_for_fw is high
277,671 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
402,713 UART: [fht] FHT @ 0x50003400
403,816 UART: [fwproc] Wait for Commands...
405,106 UART: [fwproc] Recv command 0x46574c44
406,524 UART: [fwproc] Recv'd Img size: 99468 bytes
1,708,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,778,060 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,795,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,112,353 >>> mbox cmd response: success
2,118,185 UART: [fake-rom-cold-reset] --
2,121,747 UART: [state] Locking Datavault
2,126,474 UART: [state] Locking PCR0, PCR1 and PCR31
2,128,069 UART: [state] Locking ICCM
2,130,239 UART: [exit] Launching FMC @ 0x40000130
2,138,521 UART:
2,138,775 UART: Running Caliptra FMC ...
2,139,875 UART:
2,140,034 UART: [state] CFI Enabled
2,197,774 UART: Caliptra RT
2,198,458 UART: [state] CFI Enabled
2,366,868 UART: [rt] RT listening for mailbox commands...
2,369,024 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,398,747 UART: [rt]cmd =0x4c444556, len=4
2,409,815 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,813,939 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,843,840 UART: [rt]cmd =0x43455246, len=4
2,856,566 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,230 writing to cptra_bootfsm_go
193,466 UART:
193,847 UART: Running Caliptra ROM ...
194,942 UART:
604,299 UART: [state] CFI Enabled
620,875 UART: [state] LifecycleState = Unprovisioned
622,585 UART: [state] DebugLocked = No
624,165 UART: [state] WD Timer not started. Device not locked for debugging
629,269 UART: [fake-rom-cold-reset] ++
631,658 ready_for_fw is high
631,838 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
756,788 UART: [fht] FHT @ 0x50003400
757,878 UART: [fwproc] Wait for Commands...
759,079 UART: [fwproc] Recv command 0x46574c44
760,496 UART: [fwproc] Recv'd Img size: 99468 bytes
2,052,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,121,723 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,138,787 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,455,214 >>> mbox cmd response: success
2,461,051 UART: [fake-rom-cold-reset] --
2,464,025 UART: [state] Locking Datavault
2,469,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,470,979 UART: [state] Locking ICCM
2,473,293 UART: [exit] Launching FMC @ 0x40000130
2,481,535 UART:
2,481,771 UART: Running Caliptra FMC ...
2,482,871 UART:
2,483,026 UART: [state] CFI Enabled
2,486,975 UART: Caliptra RT
2,487,611 UART: [state] CFI Enabled
2,597,204 UART: [rt] RT listening for mailbox commands...
2,599,375 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,628,975 UART: [rt]cmd =0x4c444556, len=4
2,640,075 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,043,671 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,073,478 UART: [rt]cmd =0x43455246, len=4
3,086,188 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,318 writing to cptra_bootfsm_go
193,511 UART:
193,889 UART: Running Caliptra ROM ...
195,073 UART:
604,494 UART: [state] CFI Enabled
618,497 UART: [state] LifecycleState = Unprovisioned
620,250 UART: [state] DebugLocked = No
622,354 UART: [state] WD Timer not started. Device not locked for debugging
625,818 UART: [fake-rom-cold-reset] ++
628,138 ready_for_fw is high
628,400 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
753,239 UART: [fht] FHT @ 0x50003400
754,334 UART: [fwproc] Wait for Commands...
755,536 UART: [fwproc] Recv command 0x46574c44
756,950 UART: [fwproc] Recv'd Img size: 99468 bytes
2,058,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,133,621 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,150,654 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,467,079 >>> mbox cmd response: success
2,472,929 UART: [fake-rom-cold-reset] --
2,475,684 UART: [state] Locking Datavault
2,481,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,482,859 UART: [state] Locking ICCM
2,485,025 UART: [exit] Launching FMC @ 0x40000130
2,493,263 UART:
2,493,497 UART: Running Caliptra FMC ...
2,494,595 UART:
2,494,751 UART: [state] CFI Enabled
2,498,584 UART: Caliptra RT
2,499,270 UART: [state] CFI Enabled
2,609,134 UART: [rt] RT listening for mailbox commands...
2,611,335 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,641,256 UART: [rt]cmd =0x4c444556, len=4
2,652,130 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,055,030 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,084,985 UART: [rt]cmd =0x43455246, len=4
3,097,680 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,889 writing to cptra_bootfsm_go
193,053 UART:
193,422 UART: Running Caliptra ROM ...
194,608 UART:
194,758 UART: [state] CFI Enabled
263,455 UART: [state] LifecycleState = Unprovisioned
265,285 UART: [state] DebugLocked = No
267,884 UART: [state] WD Timer not started. Device not locked for debugging
272,420 UART: [fake-rom-cold-reset] ++
274,739 ready_for_fw is high
274,999 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
400,041 UART: [fht] FHT @ 0x50003400
401,157 UART: [fwproc] Wait for Commands...
402,365 UART: [fwproc] Recv command 0x46574c44
403,773 UART: [fwproc] Recv'd Img size: 99468 bytes
1,704,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,779,667 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,796,658 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,113,715 >>> mbox cmd response: success
2,119,593 UART: [fake-rom-cold-reset] --
2,122,089 UART: [state] Locking Datavault
2,126,576 UART: [state] Locking PCR0, PCR1 and PCR31
2,128,170 UART: [state] Locking ICCM
2,129,683 UART: [exit] Launching FMC @ 0x40000130
2,137,915 UART:
2,138,152 UART: Running Caliptra FMC ...
2,139,255 UART:
2,139,415 UART: [state] CFI Enabled
2,195,311 UART: Caliptra RT
2,195,994 UART: [state] CFI Enabled
2,364,856 UART: [rt] RT listening for mailbox commands...
2,367,036 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,396,785 UART: [rt]cmd =0x4c444556, len=4
2,407,863 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,812,724 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,842,456 UART: [rt]cmd =0x43455246, len=4
2,855,360 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,727 writing to cptra_bootfsm_go
192,941 UART:
193,345 UART: Running Caliptra ROM ...
194,484 UART:
194,647 UART: [state] CFI Enabled
264,991 UART: [state] LifecycleState = Unprovisioned
266,759 UART: [state] DebugLocked = No
268,424 UART: [state] WD Timer not started. Device not locked for debugging
272,601 UART: [fake-rom-cold-reset] ++
274,927 ready_for_fw is high
275,193 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
400,527 UART: [fht] FHT @ 0x50003400
401,671 UART: [fwproc] Wait for Commands...
402,971 UART: [fwproc] Recv command 0x46574c44
404,384 UART: [fwproc] Recv'd Img size: 99468 bytes
1,704,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,774,606 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,791,589 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,108,895 >>> mbox cmd response: success
2,114,763 UART: [fake-rom-cold-reset] --
2,118,385 UART: [state] Locking Datavault
2,123,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,124,817 UART: [state] Locking ICCM
2,126,751 UART: [exit] Launching FMC @ 0x40000130
2,135,039 UART:
2,135,291 UART: Running Caliptra FMC ...
2,136,394 UART:
2,136,550 UART: [state] CFI Enabled
2,195,964 UART: Caliptra RT
2,196,639 UART: [state] CFI Enabled
2,365,925 UART: [rt] RT listening for mailbox commands...
2,368,093 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,397,870 UART: [rt]cmd =0x4c444556, len=4
2,408,951 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
2,813,038 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,842,788 UART: [rt]cmd =0x43455246, len=4
2,855,435 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,369 writing to cptra_bootfsm_go
193,677 UART:
194,052 UART: Running Caliptra ROM ...
195,251 UART:
604,755 UART: [state] CFI Enabled
619,212 UART: [state] LifecycleState = Unprovisioned
620,923 UART: [state] DebugLocked = No
623,146 UART: [state] WD Timer not started. Device not locked for debugging
628,909 UART: [fake-rom-cold-reset] ++
631,226 ready_for_fw is high
631,416 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
756,255 UART: [fht] FHT @ 0x50003400
757,347 UART: [fwproc] Wait for Commands...
758,546 UART: [fwproc] Recv command 0x46574c44
759,955 UART: [fwproc] Recv'd Img size: 99468 bytes
2,053,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,127,782 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,144,822 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,461,085 >>> mbox cmd response: success
2,466,947 UART: [fake-rom-cold-reset] --
2,468,952 UART: [state] Locking Datavault
2,473,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,475,158 UART: [state] Locking ICCM
2,476,636 UART: [exit] Launching FMC @ 0x40000130
2,484,883 UART:
2,485,117 UART: Running Caliptra FMC ...
2,486,151 UART:
2,486,296 UART: [state] CFI Enabled
2,490,133 UART: Caliptra RT
2,490,765 UART: [state] CFI Enabled
2,601,246 UART: [rt] RT listening for mailbox commands...
2,603,403 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,633,241 UART: [rt]cmd =0x4c444556, len=4
2,644,463 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,047,449 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,077,185 UART: [rt]cmd =0x43455246, len=4
3,090,011 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "38a98b199e978024d3db757f50dad4e043d87e35275c7f64b97539d953d93335d06103ceeb9c47d6272ce194515014e1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,369 writing to cptra_bootfsm_go
193,599 UART:
193,987 UART: Running Caliptra ROM ...
195,091 UART:
604,828 UART: [state] CFI Enabled
617,294 UART: [state] LifecycleState = Unprovisioned
619,011 UART: [state] DebugLocked = No
620,325 UART: [state] WD Timer not started. Device not locked for debugging
625,993 UART: [fake-rom-cold-reset] ++
628,308 ready_for_fw is high
628,566 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
753,562 UART: [fht] FHT @ 0x50003400
754,682 UART: [fwproc] Wait for Commands...
755,968 UART: [fwproc] Recv command 0x46574c44
757,378 UART: [fwproc] Recv'd Img size: 99468 bytes
2,053,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,127,969 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,144,978 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,462,317 >>> mbox cmd response: success
2,468,120 UART: [fake-rom-cold-reset] --
2,470,282 UART: [state] Locking Datavault
2,473,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,475,455 UART: [state] Locking ICCM
2,477,036 UART: [exit] Launching FMC @ 0x40000130
2,485,326 UART:
2,485,562 UART: Running Caliptra FMC ...
2,486,662 UART:
2,486,820 UART: [state] CFI Enabled
2,490,730 UART: Caliptra RT
2,491,414 UART: [state] CFI Enabled
2,600,616 UART: [rt] RT listening for mailbox commands...
2,602,916 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,632,643 UART: [rt]cmd =0x4c444556, len=4
2,643,755 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,047,812 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,077,651 UART: [rt]cmd =0x43455246, len=4
3,090,346 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,072 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [fake-rom-cold-reset] ++
88,382 ready_for_fw is high
88,382 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,604 UART: [fht] FHT @ 0x50003400
91,973 UART: [fwproc] Wait for Commands...
92,660 UART: [fwproc] Recv command 0x46574c44
93,388 UART: [fwproc] Recv'd Img size: 99468 bytes
1,216,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,055 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,283 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,386,881 >>> mbox cmd response: success
1,388,039 UART: [fake-rom-cold-reset] --
1,388,763 UART: [state] Locking Datavault
1,389,842 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,446 UART: [state] Locking ICCM
1,390,902 UART: [exit] Launching FMC @ 0x40000130
1,396,224 UART:
1,396,240 UART: Running Caliptra FMC ...
1,396,648 UART:
1,396,702 UART: [state] CFI Enabled
1,399,565 UART: Caliptra RT
1,399,818 UART: [state] CFI Enabled
1,499,793 UART: [rt] RT listening for mailbox commands...
1,500,463 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,351 UART: [rt]cmd =0x4c444556, len=4
1,540,892 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,893 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,400 UART: [rt]cmd =0x43455246, len=4
1,582,675 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [fake-rom-cold-reset] ++
88,506 ready_for_fw is high
88,506 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,636 UART: [fht] FHT @ 0x50003400
91,905 UART: [fwproc] Wait for Commands...
92,688 UART: [fwproc] Recv command 0x46574c44
93,416 UART: [fwproc] Recv'd Img size: 99468 bytes
1,216,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,289 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,386,043 >>> mbox cmd response: success
1,387,201 UART: [fake-rom-cold-reset] --
1,388,157 UART: [state] Locking Datavault
1,389,416 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,020 UART: [state] Locking ICCM
1,390,498 UART: [exit] Launching FMC @ 0x40000130
1,395,820 UART:
1,395,836 UART: Running Caliptra FMC ...
1,396,244 UART:
1,396,298 UART: [state] CFI Enabled
1,398,823 UART: Caliptra RT
1,399,076 UART: [state] CFI Enabled
1,499,589 UART: [rt] RT listening for mailbox commands...
1,500,259 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,045 UART: [rt]cmd =0x4c444556, len=4
1,540,556 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,557 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,684 UART: [rt]cmd =0x43455246, len=4
1,581,775 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,429 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [fake-rom-cold-reset] ++
88,941 ready_for_fw is high
88,941 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
89,125 UART: [fht] FHT @ 0x50003400
92,396 UART: [fwproc] Wait for Commands...
93,185 UART: [fwproc] Recv command 0x46574c44
93,913 UART: [fwproc] Recv'd Img size: 99468 bytes
1,216,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,242,990 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,218 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,385,916 >>> mbox cmd response: success
1,387,074 UART: [fake-rom-cold-reset] --
1,387,846 UART: [state] Locking Datavault
1,388,943 UART: [state] Locking PCR0, PCR1 and PCR31
1,389,547 UART: [state] Locking ICCM
1,390,191 UART: [exit] Launching FMC @ 0x40000130
1,395,513 UART:
1,395,529 UART: Running Caliptra FMC ...
1,395,937 UART:
1,396,078 UART: [state] CFI Enabled
1,398,914 UART: Caliptra RT
1,399,259 UART: [state] CFI Enabled
1,499,910 UART: [rt] RT listening for mailbox commands...
1,500,580 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,268 UART: [rt]cmd =0x4c444556, len=4
1,540,631 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,632 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,993 UART: [rt]cmd =0x43455246, len=4
1,582,214 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Unprovisioned
85,548 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,413 UART: [fake-rom-cold-reset] ++
88,341 ready_for_fw is high
88,341 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,431 UART: [fht] FHT @ 0x50003400
91,774 UART: [fwproc] Wait for Commands...
92,389 UART: [fwproc] Recv command 0x46574c44
93,117 UART: [fwproc] Recv'd Img size: 99468 bytes
1,215,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,241,744 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,248,972 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,384,540 >>> mbox cmd response: success
1,385,698 UART: [fake-rom-cold-reset] --
1,386,428 UART: [state] Locking Datavault
1,387,727 UART: [state] Locking PCR0, PCR1 and PCR31
1,388,331 UART: [state] Locking ICCM
1,388,855 UART: [exit] Launching FMC @ 0x40000130
1,394,177 UART:
1,394,193 UART: Running Caliptra FMC ...
1,394,601 UART:
1,394,742 UART: [state] CFI Enabled
1,397,560 UART: Caliptra RT
1,397,905 UART: [state] CFI Enabled
1,497,836 UART: [rt] RT listening for mailbox commands...
1,498,506 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,527,906 UART: [rt]cmd =0x4c444556, len=4
1,538,385 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,538,386 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,567,803 UART: [rt]cmd =0x43455246, len=4
1,579,746 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,232 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [fake-rom-cold-reset] ++
88,466 ready_for_fw is high
88,466 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,722 UART: [fht] FHT @ 0x50003400
92,055 UART: [fwproc] Wait for Commands...
92,860 UART: [fwproc] Recv command 0x46574c44
93,588 UART: [fwproc] Recv'd Img size: 99468 bytes
1,215,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,242,365 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,249,593 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,385,229 >>> mbox cmd response: success
1,386,387 UART: [fake-rom-cold-reset] --
1,387,351 UART: [state] Locking Datavault
1,388,404 UART: [state] Locking PCR0, PCR1 and PCR31
1,389,008 UART: [state] Locking ICCM
1,389,552 UART: [exit] Launching FMC @ 0x40000130
1,394,874 UART:
1,394,890 UART: Running Caliptra FMC ...
1,395,298 UART:
1,395,352 UART: [state] CFI Enabled
1,398,045 UART: Caliptra RT
1,398,298 UART: [state] CFI Enabled
1,497,425 UART: [rt] RT listening for mailbox commands...
1,498,095 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,527,797 UART: [rt]cmd =0x4c444556, len=4
1,538,300 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,538,301 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,567,690 UART: [rt]cmd =0x43455246, len=4
1,579,845 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [fake-rom-cold-reset] ++
88,646 ready_for_fw is high
88,646 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,740 UART: [fht] FHT @ 0x50003400
92,193 UART: [fwproc] Wait for Commands...
92,940 UART: [fwproc] Recv command 0x46574c44
93,668 UART: [fwproc] Recv'd Img size: 99468 bytes
1,216,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,244,225 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,453 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,387,035 >>> mbox cmd response: success
1,388,193 UART: [fake-rom-cold-reset] --
1,389,189 UART: [state] Locking Datavault
1,390,456 UART: [state] Locking PCR0, PCR1 and PCR31
1,391,060 UART: [state] Locking ICCM
1,391,554 UART: [exit] Launching FMC @ 0x40000130
1,396,876 UART:
1,396,892 UART: Running Caliptra FMC ...
1,397,300 UART:
1,397,354 UART: [state] CFI Enabled
1,400,045 UART: Caliptra RT
1,400,298 UART: [state] CFI Enabled
1,499,929 UART: [rt] RT listening for mailbox commands...
1,500,599 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,249 UART: [rt]cmd =0x4c444556, len=4
1,540,540 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,541 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,826 UART: [rt]cmd =0x43455246, len=4
1,581,943 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [fake-rom-cold-reset] ++
89,067 ready_for_fw is high
89,067 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
89,379 UART: [fht] FHT @ 0x50003400
92,684 UART: [fwproc] Wait for Commands...
93,325 UART: [fwproc] Recv command 0x46574c44
94,053 UART: [fwproc] Recv'd Img size: 99468 bytes
1,217,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,702 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,386,568 >>> mbox cmd response: success
1,387,726 UART: [fake-rom-cold-reset] --
1,388,406 UART: [state] Locking Datavault
1,389,603 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,207 UART: [state] Locking ICCM
1,390,855 UART: [exit] Launching FMC @ 0x40000130
1,396,177 UART:
1,396,193 UART: Running Caliptra FMC ...
1,396,601 UART:
1,396,742 UART: [state] CFI Enabled
1,399,706 UART: Caliptra RT
1,400,051 UART: [state] CFI Enabled
1,500,478 UART: [rt] RT listening for mailbox commands...
1,501,148 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,530,610 UART: [rt]cmd =0x4c444556, len=4
1,541,055 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,541,056 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,570,399 UART: [rt]cmd =0x43455246, len=4
1,582,396 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,723 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [fake-rom-cold-reset] ++
88,999 ready_for_fw is high
88,999 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
89,229 UART: [fht] FHT @ 0x50003400
92,454 UART: [fwproc] Wait for Commands...
93,279 UART: [fwproc] Recv command 0x46574c44
94,007 UART: [fwproc] Recv'd Img size: 99468 bytes
1,216,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,322 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,386,084 >>> mbox cmd response: success
1,387,242 UART: [fake-rom-cold-reset] --
1,387,904 UART: [state] Locking Datavault
1,389,095 UART: [state] Locking PCR0, PCR1 and PCR31
1,389,699 UART: [state] Locking ICCM
1,390,141 UART: [exit] Launching FMC @ 0x40000130
1,395,463 UART:
1,395,479 UART: Running Caliptra FMC ...
1,395,887 UART:
1,396,028 UART: [state] CFI Enabled
1,398,856 UART: Caliptra RT
1,399,201 UART: [state] CFI Enabled
1,499,182 UART: [rt] RT listening for mailbox commands...
1,499,852 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,658 UART: [rt]cmd =0x4c444556, len=4
1,540,197 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,198 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,605 UART: [rt]cmd =0x43455246, len=4
1,581,658 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [fake-rom-cold-reset] ++
88,850 ready_for_fw is high
88,850 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,964 UART: [fht] FHT @ 0x50003400
92,227 UART: [fwproc] Wait for Commands...
92,916 UART: [fwproc] Recv command 0x46574c44
93,644 UART: [fwproc] Recv'd Img size: 99468 bytes
1,215,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,242,307 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,249,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,385,225 >>> mbox cmd response: success
1,386,383 UART: [fake-rom-cold-reset] --
1,387,213 UART: [state] Locking Datavault
1,388,308 UART: [state] Locking PCR0, PCR1 and PCR31
1,388,912 UART: [state] Locking ICCM
1,389,416 UART: [exit] Launching FMC @ 0x40000130
1,394,738 UART:
1,394,754 UART: Running Caliptra FMC ...
1,395,162 UART:
1,395,216 UART: [state] CFI Enabled
1,397,725 UART: Caliptra RT
1,397,978 UART: [state] CFI Enabled
1,498,017 UART: [rt] RT listening for mailbox commands...
1,498,687 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,528,675 UART: [rt]cmd =0x4c444556, len=4
1,539,222 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,539,223 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,568,734 UART: [rt]cmd =0x43455246, len=4
1,580,981 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [fake-rom-cold-reset] ++
88,728 ready_for_fw is high
88,728 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,920 UART: [fht] FHT @ 0x50003400
92,227 UART: [fwproc] Wait for Commands...
92,984 UART: [fwproc] Recv command 0x46574c44
93,712 UART: [fwproc] Recv'd Img size: 99468 bytes
1,216,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,673 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,901 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,386,347 >>> mbox cmd response: success
1,387,505 UART: [fake-rom-cold-reset] --
1,388,469 UART: [state] Locking Datavault
1,389,452 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,056 UART: [state] Locking ICCM
1,390,488 UART: [exit] Launching FMC @ 0x40000130
1,395,810 UART:
1,395,826 UART: Running Caliptra FMC ...
1,396,234 UART:
1,396,288 UART: [state] CFI Enabled
1,398,939 UART: Caliptra RT
1,399,192 UART: [state] CFI Enabled
1,498,823 UART: [rt] RT listening for mailbox commands...
1,499,493 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,243 UART: [rt]cmd =0x4c444556, len=4
1,539,836 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,539,837 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,400 UART: [rt]cmd =0x43455246, len=4
1,581,373 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
84,567 UART: [state] LifecycleState = Unprovisioned
85,226 UART: [state] DebugLocked = No
85,941 UART: [state] WD Timer not started. Device not locked for debugging
87,405 UART: [fake-rom-cold-reset] ++
88,333 ready_for_fw is high
88,333 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
88,491 UART: [fht] FHT @ 0x50003400
91,888 UART: [fwproc] Wait for Commands...
92,691 UART: [fwproc] Recv command 0x46574c44
93,419 UART: [fwproc] Recv'd Img size: 99468 bytes
1,215,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,025 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,250,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,385,715 >>> mbox cmd response: success
1,386,873 UART: [fake-rom-cold-reset] --
1,387,785 UART: [state] Locking Datavault
1,389,064 UART: [state] Locking PCR0, PCR1 and PCR31
1,389,668 UART: [state] Locking ICCM
1,390,128 UART: [exit] Launching FMC @ 0x40000130
1,395,450 UART:
1,395,466 UART: Running Caliptra FMC ...
1,395,874 UART:
1,396,015 UART: [state] CFI Enabled
1,399,021 UART: Caliptra RT
1,399,366 UART: [state] CFI Enabled
1,498,897 UART: [rt] RT listening for mailbox commands...
1,499,567 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,529,553 UART: [rt]cmd =0x4c444556, len=4
1,540,028 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,540,029 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,569,382 UART: [rt]cmd =0x43455246, len=4
1,581,653 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4dc4ed0025ef6aaa34f1b64184e9bf629c7dba0ef8a60049964e378e4b4d4bbd6bdfb4e8c68480559346cd099d661d3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [fake-rom-cold-reset] ++
89,013 ready_for_fw is high
89,013 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
89,275 UART: [fht] FHT @ 0x50003400
92,696 UART: [fwproc] Wait for Commands...
93,413 UART: [fwproc] Recv command 0x46574c44
94,141 UART: [fwproc] Recv'd Img size: 99468 bytes
1,216,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,243,904 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,251,132 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
1,386,754 >>> mbox cmd response: success
1,387,912 UART: [fake-rom-cold-reset] --
1,388,834 UART: [state] Locking Datavault
1,390,021 UART: [state] Locking PCR0, PCR1 and PCR31
1,390,625 UART: [state] Locking ICCM
1,391,137 UART: [exit] Launching FMC @ 0x40000130
1,396,459 UART:
1,396,475 UART: Running Caliptra FMC ...
1,396,883 UART:
1,397,024 UART: [state] CFI Enabled
1,399,812 UART: Caliptra RT
1,400,157 UART: [state] CFI Enabled
1,501,278 UART: [rt] RT listening for mailbox commands...
1,501,948 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,531,668 UART: [rt]cmd =0x4c444556, len=4
1,542,267 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,542,268 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
1,571,703 UART: [rt]cmd =0x43455246, len=4
1,583,806 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,329 UART:
192,731 UART: Running Caliptra ROM ...
193,909 UART:
194,061 UART: [state] CFI Enabled
264,080 UART: [state] LifecycleState = Production
265,862 UART: [state] DebugLocked = No
268,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,255 UART: [kat] SHA2-256
442,984 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,500 UART: [kat] ++
453,942 UART: [kat] sha1
465,166 UART: [kat] SHA2-256
467,888 UART: [kat] SHA2-384
473,021 UART: [kat] SHA2-512-ACC
475,388 UART: [kat] ECC-384
2,766,883 UART: [kat] HMAC-384Kdf
2,780,039 UART: [kat] LMS
3,970,311 UART: [kat] --
3,976,012 UART: [cold-reset] ++
3,978,224 UART: [fht] Storing FHT @ 0x50003400
3,990,905 UART: [idev] ++
3,991,473 UART: [idev] CDI.KEYID = 6
3,992,422 UART: [idev] SUBJECT.KEYID = 7
3,993,662 UART: [idev] UDS.KEYID = 0
3,994,608 ready_for_fw is high
3,994,792 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,137,954 UART: [idev] Erasing UDS.KEYID = 0
7,327,393 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,606 UART: [idev] --
7,353,623 UART: [ldev] ++
7,354,188 UART: [ldev] CDI.KEYID = 6
7,355,168 UART: [ldev] SUBJECT.KEYID = 5
7,356,376 UART: [ldev] AUTHORITY.KEYID = 7
7,357,665 UART: [ldev] FE.KEYID = 1
7,403,130 UART: [ldev] Erasing FE.KEYID = 1
10,737,218 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,633 UART: [ldev] --
13,117,739 UART: [fwproc] Waiting for Commands...
13,120,751 UART: [fwproc] Received command 0x46574c44
13,122,981 UART: [fwproc] Received Image of size 113844 bytes
22,188,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,266,588 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,335,500 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,650,959 >>> mbox cmd response: success
22,655,507 UART: [afmc] ++
22,656,134 UART: [afmc] CDI.KEYID = 6
22,657,117 UART: [afmc] SUBJECT.KEYID = 7
22,658,444 UART: [afmc] AUTHORITY.KEYID = 5
26,020,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,319,526 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,321,830 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,336,432 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,351,172 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,365,617 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,386,804 UART: [afmc] --
28,389,929 UART: [cold-reset] --
28,394,642 UART: [state] Locking Datavault
28,399,537 UART: [state] Locking PCR0, PCR1 and PCR31
28,401,272 UART: [state] Locking ICCM
28,404,017 UART: [exit] Launching FMC @ 0x40000130
28,412,387 UART:
28,412,653 UART: Running Caliptra FMC ...
28,413,781 UART:
28,413,940 UART: [state] CFI Enabled
28,481,277 UART: [fht] FMC Alias Private Key: 7
30,818,948 UART: [art] Extend RT PCRs Done
30,820,207 UART: [art] Lock RT PCRs Done
30,822,028 UART: [art] Populate DV Done
30,827,359 UART: [fht] FMC Alias Private Key: 7
30,829,060 UART: [art] Derive CDI
30,829,915 UART: [art] Store in in slot 0x4
30,889,810 UART: [art] Derive Key Pair
30,890,888 UART: [art] Store priv key in slot 0x5
34,183,555 UART: [art] Derive Key Pair - Done
34,196,663 UART: [art] Signing Cert with AUTHO
34,198,004 UART: RITY.KEYID = 7
36,485,775 UART: [art] Erasing AUTHORITY.KEYID = 7
36,487,354 UART: [art] PUB.X = 9DAEA43EA1521FE9965E607A997AFBCAD765E37B8953BE8CF7F398963E360924E1E3A7DF7BEF2E4F1D47EB9F803BF00C
36,494,625 UART: [art] PUB.Y = 61D1BB84D0B08954AA8A027BB444B30A79ECE9F7E5B8A9B06B206DE96E8ABE76B0B2F5A46BCEEDCFF01A22EBF5B42716
36,501,892 UART: [art] SIG.R = B0075E9D3BEE0A3D720FA44A5D91A3C1DB38EC9E7102F0B1CCB6DCBE24D9A0903F647F792014B398ED94B978FD4D141A
36,509,233 UART: [art] SIG.S = 4CB7CCD94F3545529A002B97287D64AB783FC7C0EBD3E80D5CE5B95D5D8A95AB16902B357968FDD567670678AF019443
37,814,995 UART: Caliptra RT
37,815,725 UART: [state] CFI Enabled
37,977,913 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,807,340 ready_for_fw is high
3,807,732 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,898,340 >>> mbox cmd response: success
27,579,555 UART:
27,579,949 UART: Running Caliptra FMC ...
27,581,083 UART:
27,581,249 UART: [state] CFI Enabled
27,650,459 UART: [fht] FMC Alias Private Key: 7
29,987,316 UART: [art] Extend RT PCRs Done
29,988,616 UART: [art] Lock RT PCRs Done
29,990,430 UART: [art] Populate DV Done
29,996,065 UART: [fht] FMC Alias Private Key: 7
29,997,625 UART: [art] Derive CDI
29,998,478 UART: [art] Store in in slot 0x4
30,058,369 UART: [art] Derive Key Pair
30,059,481 UART: [art] Store priv key in slot 0x5
33,352,383 UART: [art] Derive Key Pair - Done
33,365,289 UART: [art] Signing Cert with AUTHO
33,366,836 UART: RITY.KEYID = 7
35,652,660 UART: [art] Erasing AUTHORITY.KEYID = 7
35,654,217 UART: [art] PUB.X = 0EB5E6551570B09F529265D003404136DE9C1286E7B7B55A48B612369EB16CAB3E7A99449F79BA80239ECAF9886E09B6
35,661,408 UART: [art] PUB.Y = 7D0178D402EAD698A40F718E161D665492EC9B2CD328E4BD96160872A0E3AED9881550DE8AD682435614016FA6B3EC11
35,668,598 UART: [art] SIG.R = 1E5D5BC5A99F36BB05B468264DA215FB6E4661A8BD16CFE28AA1F5D8F5DBEC7AFDF74CAF1076C4E83004514F6372C32B
35,676,011 UART: [art] SIG.S = CD7E56420A60340C23AA94E6487DF63FB421655C44D3CA1C6B837092A6673F0FE5008FA55EA78C5310E0651CBB06A1E8
36,981,076 UART: Caliptra RT
36,981,819 UART: [state] CFI Enabled
37,143,984 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,462 UART:
192,836 UART: Running Caliptra ROM ...
194,001 UART:
603,648 UART: [state] CFI Enabled
616,881 UART: [state] LifecycleState = Production
618,688 UART: [state] DebugLocked = No
620,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,837 UART: [kat] SHA2-256
795,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,134 UART: [kat] ++
806,614 UART: [kat] sha1
819,211 UART: [kat] SHA2-256
821,902 UART: [kat] SHA2-384
827,751 UART: [kat] SHA2-512-ACC
830,125 UART: [kat] ECC-384
3,113,046 UART: [kat] HMAC-384Kdf
3,125,636 UART: [kat] LMS
4,315,747 UART: [kat] --
4,321,614 UART: [cold-reset] ++
4,323,904 UART: [fht] Storing FHT @ 0x50003400
4,334,809 UART: [idev] ++
4,335,376 UART: [idev] CDI.KEYID = 6
4,336,405 UART: [idev] SUBJECT.KEYID = 7
4,337,578 UART: [idev] UDS.KEYID = 0
4,338,785 ready_for_fw is high
4,339,002 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,924 UART: [idev] Erasing UDS.KEYID = 0
7,621,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,339 UART: [idev] --
7,646,414 UART: [ldev] ++
7,646,980 UART: [ldev] CDI.KEYID = 6
7,647,940 UART: [ldev] SUBJECT.KEYID = 5
7,649,148 UART: [ldev] AUTHORITY.KEYID = 7
7,650,393 UART: [ldev] FE.KEYID = 1
7,661,790 UART: [ldev] Erasing FE.KEYID = 1
10,952,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,923 UART: [ldev] --
13,311,528 UART: [fwproc] Waiting for Commands...
13,314,486 UART: [fwproc] Received command 0x46574c44
13,316,667 UART: [fwproc] Received Image of size 113844 bytes
21,908,308 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,983,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,052,262 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,368,318 >>> mbox cmd response: success
22,371,789 UART: [afmc] ++
22,372,426 UART: [afmc] CDI.KEYID = 6
22,373,335 UART: [afmc] SUBJECT.KEYID = 7
22,374,673 UART: [afmc] AUTHORITY.KEYID = 5
25,691,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,986,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,988,475 UART: [afmc] PUB.X = 5348D258DE77EF97F637AF69C21E68ACD6AF0C3F87E456B42EFD178DE46AC5C6BEE0231BC08A8C6FC4B952CC39F73A2A
28,003,111 UART: [afmc] PUB.Y = BCC845DEC9D5D652A78CC24F1E69F3EDBCC4E95D7A4708F662379DFAB92294A7E1F1880D8FDBABDA66164BAE4BC962EE
28,018,028 UART: [afmc] SIG.R = 6A0C2E7504B5CFA05081287A9C14EDB8A8C399FDE244DE866717A9AE00799D5565090397AB4DD4D8F8580529AC54AEF8
28,032,286 UART: [afmc] SIG.S = D626E0867A2A659B92DB66847BA60944DF7F20034E039E932616F92B8D8CB3EB9D4B433B717B369420F3B415311147FE
28,052,443 UART: [afmc] --
28,056,768 UART: [cold-reset] --
28,060,863 UART: [state] Locking Datavault
28,065,946 UART: [state] Locking PCR0, PCR1 and PCR31
28,067,682 UART: [state] Locking ICCM
28,068,958 UART: [exit] Launching FMC @ 0x40000130
28,077,332 UART:
28,077,600 UART: Running Caliptra FMC ...
28,078,737 UART:
28,078,896 UART: [state] CFI Enabled
28,087,094 UART: [fht] FMC Alias Private Key: 7
30,418,129 UART: [art] Extend RT PCRs Done
30,419,393 UART: [art] Lock RT PCRs Done
30,420,903 UART: [art] Populate DV Done
30,426,645 UART: [fht] FMC Alias Private Key: 7
30,428,346 UART: [art] Derive CDI
30,429,200 UART: [art] Store in in slot 0x4
30,471,978 UART: [art] Derive Key Pair
30,473,020 UART: [art] Store priv key in slot 0x5
33,715,148 UART: [art] Derive Key Pair - Done
33,728,255 UART: [art] Signing Cert with AUTHO
33,729,596 UART: RITY.KEYID = 7
36,009,026 UART: [art] Erasing AUTHORITY.KEYID = 7
36,010,609 UART: [art] PUB.X = A1866F326EBBEFDD369792B96587106211C72B382EB256E1FD45651349B9DAF426A57F50B05D718C2271C210013F94E1
36,017,795 UART: [art] PUB.Y = F3D713E96875684EFC5667EA275A8E4D7B012607C758552A1C87EBD2969AD739674D2B9EB5B2BF224F9428F269AB68E0
36,025,029 UART: [art] SIG.R = F1537D0B5A8A01E28F439029BC6507ECFC3D249B6E3642C22FF62258A05E3CF1BAD7E34DE116C5452668BDDF4D9580B7
36,032,444 UART: [art] SIG.S = 219CD1830906E128B8987D4365CB453E23E8833E3D757490B659BD6201F75B48B677F3085E80094FA600B22EF2632345
37,337,207 UART: Caliptra RT
37,337,937 UART: [state] CFI Enabled
37,455,753 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,126,023 ready_for_fw is high
4,126,430 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,069,686 >>> mbox cmd response: success
27,710,264 UART:
27,710,748 UART: Running Caliptra FMC ...
27,711,870 UART:
27,712,024 UART: [state] CFI Enabled
27,719,685 UART: [fht] FMC Alias Private Key: 7
30,050,342 UART: [art] Extend RT PCRs Done
30,051,661 UART: [art] Lock RT PCRs Done
30,053,232 UART: [art] Populate DV Done
30,058,766 UART: [fht] FMC Alias Private Key: 7
30,060,375 UART: [art] Derive CDI
30,061,230 UART: [art] Store in in slot 0x4
30,103,810 UART: [art] Derive Key Pair
30,104,845 UART: [art] Store priv key in slot 0x5
33,346,885 UART: [art] Derive Key Pair - Done
33,360,150 UART: [art] Signing Cert with AUTHO
33,361,509 UART: RITY.KEYID = 7
35,640,555 UART: [art] Erasing AUTHORITY.KEYID = 7
35,642,150 UART: [art] PUB.X = 354E6C0E27C692F569FD27ED2DD5313B50BD82DFDF639EB30708B14CD177774BBF29F01A317A84F771C64981F6A16932
35,649,343 UART: [art] PUB.Y = 9E43B64DE10BEDE778371D2557BC3BA1707E034AE8D966BF1E9513300B4769463435A66DB713E59E3E599BE6D9886CAA
35,656,597 UART: [art] SIG.R = B2A54DE1906FC58550BF4C8596EB97C215EA9274F11A9467E62C3362D25E9D351C8790208268DD9C09B12E9F2E4F924C
35,663,932 UART: [art] SIG.S = CC28CA8EDBFD56AB54A52CF39007A924D4BA11478155D7ED23A0A4DB4FD4BED7CFFC5C10ACC92DA06E654536489CAAA2
36,969,003 UART: Caliptra RT
36,969,722 UART: [state] CFI Enabled
37,087,500 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,468 UART:
192,828 UART: Running Caliptra ROM ...
194,024 UART:
194,183 UART: [state] CFI Enabled
261,587 UART: [state] LifecycleState = Production
263,394 UART: [state] DebugLocked = No
266,127 UART: [state] WD Timer not started. Device not locked for debugging
270,666 UART: [kat] SHA2-256
449,813 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,395 UART: [kat] ++
461,923 UART: [kat] sha1
471,767 UART: [kat] SHA2-256
474,793 UART: [kat] SHA2-384
481,920 UART: [kat] SHA2-512-ACC
484,857 UART: [kat] ECC-384
2,947,767 UART: [kat] HMAC-384Kdf
2,971,801 UART: [kat] LMS
3,501,252 UART: [kat] --
3,506,118 UART: [cold-reset] ++
3,508,578 UART: [fht] FHT @ 0x50003400
3,520,125 UART: [idev] ++
3,520,719 UART: [idev] CDI.KEYID = 6
3,521,603 UART: [idev] SUBJECT.KEYID = 7
3,522,845 UART: [idev] UDS.KEYID = 0
3,523,772 ready_for_fw is high
3,523,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,525 UART: [idev] Erasing UDS.KEYID = 0
6,024,168 UART: [idev] Sha1 KeyId Algorithm
6,047,193 UART: [idev] --
6,051,835 UART: [ldev] ++
6,052,400 UART: [ldev] CDI.KEYID = 6
6,053,307 UART: [ldev] SUBJECT.KEYID = 5
6,054,466 UART: [ldev] AUTHORITY.KEYID = 7
6,055,751 UART: [ldev] FE.KEYID = 1
6,101,087 UART: [ldev] Erasing FE.KEYID = 1
8,602,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,343 UART: [ldev] --
10,394,183 UART: [fwproc] Wait for Commands...
10,396,065 UART: [fwproc] Recv command 0x46574c44
10,398,154 UART: [fwproc] Recv'd Img size: 114168 bytes
15,013,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,087,178 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,155,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,472,533 >>> mbox cmd response: success
15,477,090 UART: [afmc] ++
15,477,703 UART: [afmc] CDI.KEYID = 6
15,478,633 UART: [afmc] SUBJECT.KEYID = 7
15,479,783 UART: [afmc] AUTHORITY.KEYID = 5
18,025,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,747,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,749,130 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,765,193 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,781,184 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,797,094 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,819,233 UART: [afmc] --
19,822,246 UART: [cold-reset] --
19,825,890 UART: [state] Locking Datavault
19,832,351 UART: [state] Locking PCR0, PCR1 and PCR31
19,834,027 UART: [state] Locking ICCM
19,835,907 UART: [exit] Launching FMC @ 0x40000130
19,844,385 UART:
19,844,634 UART: Running Caliptra FMC ...
19,845,768 UART:
19,845,926 UART: [state] CFI Enabled
19,907,089 UART: [fht] FMC Alias Private Key: 7
21,671,204 UART: [art] Extend RT PCRs Done
21,672,464 UART: [art] Lock RT PCRs Done
21,674,094 UART: [art] Populate DV Done
21,679,529 UART: [fht] FMC Alias Private Key: 7
21,681,146 UART: [art] Derive CDI
21,682,006 UART: [art] Store in in slot 0x4
21,738,837 UART: [art] Derive Key Pair
21,739,881 UART: [art] Store priv key in slot 0x5
24,203,073 UART: [art] Derive Key Pair - Done
24,215,872 UART: [art] Signing Cert with AUTHO
24,217,213 UART: RITY.KEYID = 7
25,928,028 UART: [art] Erasing AUTHORITY.KEYID = 7
25,929,592 UART: [art] PUB.X = B11D07747D0B2C91239AB4726C7F6806E219F8355FF8BC6085F7A2BEDB7C9E792221E936C597DB2C707BF942CCC393BA
25,936,819 UART: [art] PUB.Y = D182893E5C809F3F9E7AA4C3EC8F0ABC84054F3B8CB61452CDE0BA56BDC13FC27196061EAEB148DF0DB1D46842B1C5E7
25,944,101 UART: [art] SIG.R = EFC5FCB15DF5B255E506BD8D087CFC63A9BDFE5137C8463570333333A4FC1A30D591669808E6E30C800449A9EDDFCEC2
25,951,560 UART: [art] SIG.S = A26860EBF5F8D4D41BBD914FBB47904A4BF51F903340364B49DFB1BD874A8CD6809270F0C107D259C7AE6A2CDA5D0FA1
26,930,190 UART: Caliptra RT
26,930,927 UART: [state] CFI Enabled
27,096,002 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
3,363,698 ready_for_fw is high
3,364,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,091,965 >>> mbox cmd response: success
19,368,341 UART:
19,368,721 UART: Running Caliptra FMC ...
19,369,831 UART:
19,369,981 UART: [state] CFI Enabled
19,437,382 UART: [fht] FMC Alias Private Key: 7
21,201,071 UART: [art] Extend RT PCRs Done
21,202,342 UART: [art] Lock RT PCRs Done
21,203,943 UART: [art] Populate DV Done
21,209,729 UART: [fht] FMC Alias Private Key: 7
21,211,383 UART: [art] Derive CDI
21,212,151 UART: [art] Store in in slot 0x4
21,269,763 UART: [art] Derive Key Pair
21,270,803 UART: [art] Store priv key in slot 0x5
23,733,402 UART: [art] Derive Key Pair - Done
23,746,724 UART: [art] Signing Cert with AUTHO
23,748,063 UART: RITY.KEYID = 7
25,458,725 UART: [art] Erasing AUTHORITY.KEYID = 7
25,460,283 UART: [art] PUB.X = 9150454AF71E2B143BFE9D815B1298FB250597B47490490A2EB8F13A59EB220A886A8785E27487B4C425F731516E6039
25,467,483 UART: [art] PUB.Y = 443C64D05076D02D530F92148A032CB00C93F3333C6A8B007CAA2B65E5473712B81DED27BDB45BD326CC00BF30A8FB2A
25,474,750 UART: [art] SIG.R = 075B57367A79A65F8BDF507B6434BD99EDB306EEEE04AED261DA720C3CEA56CAF676D1EF295FFBF945E900A88B253B6A
25,482,100 UART: [art] SIG.S = AD614AD2AFDD153DB5139EEB920589771C8F7679E6800FC6F283366A391B083FDD1CD185766A9931CB6584080B749540
26,460,862 UART: Caliptra RT
26,461,598 UART: [state] CFI Enabled
26,626,356 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,821 writing to cptra_bootfsm_go
192,943 UART:
193,322 UART: Running Caliptra ROM ...
194,517 UART:
604,293 UART: [state] CFI Enabled
614,822 UART: [state] LifecycleState = Production
616,580 UART: [state] DebugLocked = No
618,324 UART: [state] WD Timer not started. Device not locked for debugging
622,572 UART: [kat] SHA2-256
801,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,242 UART: [kat] ++
813,772 UART: [kat] sha1
824,581 UART: [kat] SHA2-256
827,660 UART: [kat] SHA2-384
833,574 UART: [kat] SHA2-512-ACC
836,575 UART: [kat] ECC-384
3,279,769 UART: [kat] HMAC-384Kdf
3,292,859 UART: [kat] LMS
3,822,338 UART: [kat] --
3,827,197 UART: [cold-reset] ++
3,828,416 UART: [fht] FHT @ 0x50003400
3,839,531 UART: [idev] ++
3,840,091 UART: [idev] CDI.KEYID = 6
3,841,237 UART: [idev] SUBJECT.KEYID = 7
3,842,346 UART: [idev] UDS.KEYID = 0
3,843,271 ready_for_fw is high
3,843,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,937 UART: [idev] Erasing UDS.KEYID = 0
6,314,972 UART: [idev] Sha1 KeyId Algorithm
6,338,477 UART: [idev] --
6,343,338 UART: [ldev] ++
6,343,910 UART: [ldev] CDI.KEYID = 6
6,344,818 UART: [ldev] SUBJECT.KEYID = 5
6,345,999 UART: [ldev] AUTHORITY.KEYID = 7
6,347,225 UART: [ldev] FE.KEYID = 1
6,358,249 UART: [ldev] Erasing FE.KEYID = 1
8,831,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,277 UART: [ldev] --
10,622,153 UART: [fwproc] Wait for Commands...
10,624,998 UART: [fwproc] Recv command 0x46574c44
10,627,033 UART: [fwproc] Recv'd Img size: 114168 bytes
15,223,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,302,938 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,371,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,688,836 >>> mbox cmd response: success
15,693,668 UART: [afmc] ++
15,694,280 UART: [afmc] CDI.KEYID = 6
15,695,217 UART: [afmc] SUBJECT.KEYID = 7
15,696,374 UART: [afmc] AUTHORITY.KEYID = 5
18,193,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,914,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,916,264 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
19,932,334 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
19,948,315 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
19,964,221 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
19,985,564 UART: [afmc] --
19,989,517 UART: [cold-reset] --
19,993,375 UART: [state] Locking Datavault
19,998,213 UART: [state] Locking PCR0, PCR1 and PCR31
19,999,880 UART: [state] Locking ICCM
20,001,184 UART: [exit] Launching FMC @ 0x40000130
20,009,617 UART:
20,009,879 UART: Running Caliptra FMC ...
20,011,020 UART:
20,011,182 UART: [state] CFI Enabled
20,018,981 UART: [fht] FMC Alias Private Key: 7
21,775,756 UART: [art] Extend RT PCRs Done
21,777,015 UART: [art] Lock RT PCRs Done
21,778,320 UART: [art] Populate DV Done
21,783,800 UART: [fht] FMC Alias Private Key: 7
21,785,350 UART: [art] Derive CDI
21,786,199 UART: [art] Store in in slot 0x4
21,828,743 UART: [art] Derive Key Pair
21,829,832 UART: [art] Store priv key in slot 0x5
24,256,735 UART: [art] Derive Key Pair - Done
24,269,481 UART: [art] Signing Cert with AUTHO
24,270,829 UART: RITY.KEYID = 7
25,976,353 UART: [art] Erasing AUTHORITY.KEYID = 7
25,977,916 UART: [art] PUB.X = E2B2D6BCF44E6BE0754AD96D5AAAE32392C951DA1D3FE755E058EA3CAC7A14DC3AC4740D2A82DD0125327705B97097E2
25,985,192 UART: [art] PUB.Y = 3CCE353B2F3CC30D6B14CC77C6A72943ECC278D821208E589D39620275A9D267C361DF33383AECA627C0265958218A7E
25,992,396 UART: [art] SIG.R = 32DD9BABBFEC460299B3F6FA581D56BA3FDEFAA56B57CC6121E71881CA8CF06E5D2E191B7D5263AED5EDBB908EDF8213
25,999,825 UART: [art] SIG.S = 49AB5B7EE12616AC702A6CE0591580552E41ABC2B9E871383D8B261BDE615A53B8D5BBDA3A5264DA536385A3E23308B6
26,979,113 UART: Caliptra RT
26,979,831 UART: [state] CFI Enabled
27,096,773 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,999 writing to cptra_bootfsm_go
3,696,012 ready_for_fw is high
3,696,394 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,283,778 >>> mbox cmd response: success
19,540,120 UART:
19,540,501 UART: Running Caliptra FMC ...
19,541,727 UART:
19,541,909 UART: [state] CFI Enabled
19,549,811 UART: [fht] FMC Alias Private Key: 7
21,306,681 UART: [art] Extend RT PCRs Done
21,307,955 UART: [art] Lock RT PCRs Done
21,309,222 UART: [art] Populate DV Done
21,314,540 UART: [fht] FMC Alias Private Key: 7
21,316,054 UART: [art] Derive CDI
21,316,914 UART: [art] Store in in slot 0x4
21,359,885 UART: [art] Derive Key Pair
21,360,965 UART: [art] Store priv key in slot 0x5
23,787,237 UART: [art] Derive Key Pair - Done
23,800,082 UART: [art] Signing Cert with AUTHO
23,801,424 UART: RITY.KEYID = 7
25,506,960 UART: [art] Erasing AUTHORITY.KEYID = 7
25,508,536 UART: [art] PUB.X = 16A3AD1FA27F87BAE3C78568B9D1801DAB049B602DDA0CED3EF1C540DD8F1D4792A3637DDE2470D9FCEC0304D86ACC13
25,515,818 UART: [art] PUB.Y = 3E6AF5FF92F55A82698B815275BF240104D84D5352A419ABE85687363DDA57FAF7FC5AD6FDAB4CFD5D3F50DDABD4A4EF
25,523,047 UART: [art] SIG.R = E37FAEAC2FE503D2A276F88FA16FBE8B10906D77836A53E2AB5B9571EC08A41D28B1EE015F45CD184171A001469E67D3
25,530,549 UART: [art] SIG.S = 4435A13960EBF86710FDC87A0D0DB69780AA9FB768F797D17BDBA33289E35B081535730B171742FD5E3AA598A1135E41
26,509,266 UART: Caliptra RT
26,509,988 UART: [state] CFI Enabled
26,628,378 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,408 UART:
192,775 UART: Running Caliptra ROM ...
193,959 UART:
194,125 UART: [state] CFI Enabled
266,513 UART: [state] LifecycleState = Production
268,743 UART: [state] DebugLocked = No
271,271 UART: [state] WD Timer not started. Device not locked for debugging
275,481 UART: [kat] SHA2-256
465,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,829 UART: [kat] ++
476,302 UART: [kat] sha1
488,241 UART: [kat] SHA2-256
491,247 UART: [kat] SHA2-384
496,529 UART: [kat] SHA2-512-ACC
499,107 UART: [kat] ECC-384
2,949,573 UART: [kat] HMAC-384Kdf
2,971,461 UART: [kat] LMS
3,503,210 UART: [kat] --
3,508,432 UART: [cold-reset] ++
3,509,386 UART: [fht] FHT @ 0x50003400
3,519,943 UART: [idev] ++
3,520,573 UART: [idev] CDI.KEYID = 6
3,521,551 UART: [idev] SUBJECT.KEYID = 7
3,522,801 UART: [idev] UDS.KEYID = 0
3,523,720 ready_for_fw is high
3,523,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,602 UART: [idev] Erasing UDS.KEYID = 0
6,028,148 UART: [idev] Sha1 KeyId Algorithm
6,052,194 UART: [idev] --
6,058,761 UART: [ldev] ++
6,059,449 UART: [ldev] CDI.KEYID = 6
6,060,359 UART: [ldev] SUBJECT.KEYID = 5
6,061,573 UART: [ldev] AUTHORITY.KEYID = 7
6,062,749 UART: [ldev] FE.KEYID = 1
6,101,103 UART: [ldev] Erasing FE.KEYID = 1
8,608,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,122 UART: [ldev] --
10,413,868 UART: [fwproc] Wait for Commands...
10,415,475 UART: [fwproc] Recv command 0x46574c44
10,417,779 UART: [fwproc] Recv'd Img size: 114168 bytes
15,076,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,158,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,274,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,815,786 >>> mbox cmd response: success
15,819,723 UART: [afmc] ++
15,820,538 UART: [afmc] CDI.KEYID = 6
15,821,559 UART: [afmc] SUBJECT.KEYID = 7
15,823,109 UART: [afmc] AUTHORITY.KEYID = 5
18,364,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,089,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,091,860 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,107,118 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,122,280 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,137,270 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,160,496 UART: [afmc] --
20,163,460 UART: [cold-reset] --
20,167,346 UART: [state] Locking Datavault
20,173,413 UART: [state] Locking PCR0, PCR1 and PCR31
20,175,609 UART: [state] Locking ICCM
20,177,641 UART: [exit] Launching FMC @ 0x40000130
20,186,282 UART:
20,186,535 UART: Running Caliptra FMC ...
20,187,680 UART:
20,187,858 UART: [state] CFI Enabled
20,246,032 UART: [fht] FMC Alias Private Key: 7
22,010,001 UART: [art] Extend RT PCRs Done
22,011,255 UART: [art] Lock RT PCRs Done
22,012,951 UART: [art] Populate DV Done
22,018,232 UART: [fht] FMC Alias Private Key: 7
22,019,896 UART: [art] Derive CDI
22,020,667 UART: [art] Store in in slot 0x4
22,078,891 UART: [art] Derive Key Pair
22,079,991 UART: [art] Store priv key in slot 0x5
24,543,041 UART: [art] Derive Key Pair - Done
24,555,999 UART: [art] Signing Cert with AUTHO
24,557,346 UART: RITY.KEYID = 7
26,268,997 UART: [art] Erasing AUTHORITY.KEYID = 7
26,270,556 UART: [art] PUB.X = 376CC910F07EAC709FA7A849E8F57A7F397482E3A3848A1A6C6BFF002984A3B7063865F6EA819101FA4AA8F18C698A96
26,277,829 UART: [art] PUB.Y = 84B41C939D29A4203D49E204E0C8C3C312EB21B72B6E870800590E778C27DDDCA0F8D18AC86DE20A891DB79451D50669
26,285,007 UART: [art] SIG.R = 9F6877AFBF9405EB03A7224239A6B25517A275101BE0A6AAF925CB5DD84F63B7EC254CDC2177DAD642B8211C96B78129
26,292,393 UART: [art] SIG.S = F9B14C9D2B131BC3F5BB1DA9EF2963DF5417C9DC2F79CEE057C59BE7EBE803D137418A9967D3586F5F75D81575AF6CB6
27,271,782 UART: Caliptra RT
27,272,499 UART: [state] CFI Enabled
27,437,549 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,108 writing to cptra_bootfsm_go
3,436,334 ready_for_fw is high
3,436,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,868,145 >>> mbox cmd response: success
20,177,487 UART:
20,177,881 UART: Running Caliptra FMC ...
20,179,034 UART:
20,179,202 UART: [state] CFI Enabled
20,243,592 UART: [fht] FMC Alias Private Key: 7
22,006,904 UART: [art] Extend RT PCRs Done
22,008,175 UART: [art] Lock RT PCRs Done
22,009,806 UART: [art] Populate DV Done
22,015,178 UART: [fht] FMC Alias Private Key: 7
22,016,841 UART: [art] Derive CDI
22,017,701 UART: [art] Store in in slot 0x4
22,075,448 UART: [art] Derive Key Pair
22,076,497 UART: [art] Store priv key in slot 0x5
24,539,270 UART: [art] Derive Key Pair - Done
24,552,232 UART: [art] Signing Cert with AUTHO
24,553,582 UART: RITY.KEYID = 7
26,264,656 UART: [art] Erasing AUTHORITY.KEYID = 7
26,266,219 UART: [art] PUB.X = 1A12B505FBA3990CB4C29B2F15AB2AE4F2915B79AF185B491979B4704D006EFF799415E31369935335DEAB36A7E7E989
26,273,419 UART: [art] PUB.Y = 59AD1CA0BEC31DB6B6D80B008381FDDB559443CBB13117096AD35AE3964E6892BCE26416280DFB17B5A43527E924E1F1
26,280,601 UART: [art] SIG.R = 24D645A4D1D171A69A57EF3351A42199A491694D2443B7DB7E1F3C8853DE3970DDC3C8EEB3CCCE482D57C7C46C13A4BE
26,288,033 UART: [art] SIG.S = 61052037591F765A7EDE7447FA91056115739F9EA1C6DA62B5F16996D0168907D2DB5C1CCC9F3F2839E6F4F23335AE08
27,267,337 UART: Caliptra RT
27,268,060 UART: [state] CFI Enabled
27,431,151 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.97s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,589 writing to cptra_bootfsm_go
192,820 UART:
193,208 UART: Running Caliptra ROM ...
194,519 UART:
603,968 UART: [state] CFI Enabled
617,216 UART: [state] LifecycleState = Production
619,406 UART: [state] DebugLocked = No
621,215 UART: [state] WD Timer not started. Device not locked for debugging
625,670 UART: [kat] SHA2-256
815,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,345 UART: [kat] ++
826,944 UART: [kat] sha1
838,608 UART: [kat] SHA2-256
841,609 UART: [kat] SHA2-384
847,730 UART: [kat] SHA2-512-ACC
850,302 UART: [kat] ECC-384
3,294,364 UART: [kat] HMAC-384Kdf
3,307,226 UART: [kat] LMS
3,839,069 UART: [kat] --
3,843,076 UART: [cold-reset] ++
3,845,083 UART: [fht] FHT @ 0x50003400
3,856,536 UART: [idev] ++
3,857,180 UART: [idev] CDI.KEYID = 6
3,858,211 UART: [idev] SUBJECT.KEYID = 7
3,859,381 UART: [idev] UDS.KEYID = 0
3,860,327 ready_for_fw is high
3,860,518 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,741 UART: [idev] Erasing UDS.KEYID = 0
6,340,549 UART: [idev] Sha1 KeyId Algorithm
6,363,889 UART: [idev] --
6,367,664 UART: [ldev] ++
6,368,397 UART: [ldev] CDI.KEYID = 6
6,369,304 UART: [ldev] SUBJECT.KEYID = 5
6,370,460 UART: [ldev] AUTHORITY.KEYID = 7
6,371,691 UART: [ldev] FE.KEYID = 1
6,383,628 UART: [ldev] Erasing FE.KEYID = 1
8,864,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,142 UART: [ldev] --
10,655,500 UART: [fwproc] Wait for Commands...
10,657,160 UART: [fwproc] Recv command 0x46574c44
10,659,466 UART: [fwproc] Recv'd Img size: 114168 bytes
15,310,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,393,322 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,509,476 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,051,311 >>> mbox cmd response: success
16,054,663 UART: [afmc] ++
16,055,471 UART: [afmc] CDI.KEYID = 6
16,056,574 UART: [afmc] SUBJECT.KEYID = 7
16,058,034 UART: [afmc] AUTHORITY.KEYID = 5
18,560,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,281,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,283,843 UART: [afmc] PUB.X = 56CD53051C5F5AE087A753347E173F231271CC0E10C75340DC8CA31C310F531A13B8B5DC81BA9A606BD7DCCF4522A09B
20,299,071 UART: [afmc] PUB.Y = A7F11BFBCD5DED51A958EED274F13F7D74BC68F6EDF39CB01706729F2BB199EA14734ED87EAE31BEA556B1CB7514EB52
20,314,243 UART: [afmc] SIG.R = F48091A4F97EB87F2EE9C2623A63A9AB8B1B6574E9D7213FF402EBA0E69524057E81E59B768773050695E0445AF10103
20,329,243 UART: [afmc] SIG.S = D6E7FC4B5B28B6ECDA336DB0702CA0187FC2FA41A0E17BD09DC26D734EBF248D84C3A1BE438C1D3E2C3E5A73DE5A055B
20,353,569 UART: [afmc] --
20,357,400 UART: [cold-reset] --
20,361,181 UART: [state] Locking Datavault
20,367,713 UART: [state] Locking PCR0, PCR1 and PCR31
20,369,918 UART: [state] Locking ICCM
20,372,505 UART: [exit] Launching FMC @ 0x40000130
20,381,197 UART:
20,381,443 UART: Running Caliptra FMC ...
20,382,590 UART:
20,382,749 UART: [state] CFI Enabled
20,390,712 UART: [fht] FMC Alias Private Key: 7
22,147,679 UART: [art] Extend RT PCRs Done
22,148,940 UART: [art] Lock RT PCRs Done
22,150,464 UART: [art] Populate DV Done
22,155,604 UART: [fht] FMC Alias Private Key: 7
22,157,162 UART: [art] Derive CDI
22,158,011 UART: [art] Store in in slot 0x4
22,200,702 UART: [art] Derive Key Pair
22,201,783 UART: [art] Store priv key in slot 0x5
24,628,145 UART: [art] Derive Key Pair - Done
24,641,046 UART: [art] Signing Cert with AUTHO
24,642,390 UART: RITY.KEYID = 7
26,347,436 UART: [art] Erasing AUTHORITY.KEYID = 7
26,348,992 UART: [art] PUB.X = 7433494C0E1583BDDC283EA3DFC371041E91B00BD500CF4F1FE4CFD9225052FE85DE74F4E9D683C6996633C57F2F7A1F
26,356,220 UART: [art] PUB.Y = B9011C013869B93B78D575A5885066180F81F46D9BF9E480F1468DD6314C9B8CAEA80AFA80BDE580C7DE1D030A141428
26,363,460 UART: [art] SIG.R = B4FBFE1D1E8F026EAD9F65A0C2D0442624CCEC29E5AEE7A6BF363FAEEB811D730913DE007CAD8E8C0F0CB3F2427D0D86
26,370,866 UART: [art] SIG.S = 415882CF3A5A647BA331E46AB7B832C81F8652A5FCDFD7B69C35F1E4156624BF6DF053BA4BCCC2B922C15417DDF7E3F5
27,349,367 UART: Caliptra RT
27,350,087 UART: [state] CFI Enabled
27,467,300 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 5.97s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,728 writing to cptra_bootfsm_go
3,756,553 ready_for_fw is high
3,756,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,114,318 >>> mbox cmd response: success
20,360,238 UART:
20,360,622 UART: Running Caliptra FMC ...
20,361,829 UART:
20,361,998 UART: [state] CFI Enabled
20,369,942 UART: [fht] FMC Alias Private Key: 7
22,126,549 UART: [art] Extend RT PCRs Done
22,127,816 UART: [art] Lock RT PCRs Done
22,129,176 UART: [art] Populate DV Done
22,134,753 UART: [fht] FMC Alias Private Key: 7
22,136,306 UART: [art] Derive CDI
22,137,156 UART: [art] Store in in slot 0x4
22,180,124 UART: [art] Derive Key Pair
22,181,206 UART: [art] Store priv key in slot 0x5
24,608,060 UART: [art] Derive Key Pair - Done
24,620,768 UART: [art] Signing Cert with AUTHO
24,622,105 UART: RITY.KEYID = 7
26,327,022 UART: [art] Erasing AUTHORITY.KEYID = 7
26,328,569 UART: [art] PUB.X = 19318AD4634AE6873D8D89DD6AA589B249EFA926134F2CE7BB42A94123C74332C52B23A8956BB8C77866E577601AC011
26,335,776 UART: [art] PUB.Y = B962D507E00B4154E53B0C3E783018122DBDDD297E1DC5B5E20926AA54A8C38BAA66A54CA92241939D1AC0A7FA2219C2
26,343,055 UART: [art] SIG.R = 74E3CA7FB5C683F983F5D2C848B248337023C228E6C334D2D3582738B96EF10C926585F7F003200ABA57458BC89095E5
26,350,415 UART: [art] SIG.S = F2FC63A80185C56A842E3E00C8D7003F524681B02FD6C4DF43D2736959596F3FA8BF8CE393078B0D5F38E13E790A3174
27,329,191 UART: Caliptra RT
27,329,928 UART: [state] CFI Enabled
27,447,190 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,992 writing to cptra_bootfsm_go
192,613 UART:
193,660 UART: Running Caliptra ROM ...
194,876 UART:
195,017 UART: [state] CFI Enabled
262,409 UART: [state] LifecycleState = Unprovisioned
264,512 UART: [state] DebugLocked = Yes
267,061 UART: [state] Starting the Watchdog Timer 40000000 cycles
271,512 UART: [kat] SHA2-256
441,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,857 UART: [kat] ++
452,421 UART: [kat] sha1
462,653 UART: [kat] SHA2-256
465,387 UART: [kat] SHA2-384
471,902 UART: [kat] SHA2-512-ACC
474,240 UART: [kat] ECC-384
2,768,108 UART: [kat] HMAC-384Kdf
2,781,228 UART: [kat] LMS
3,971,499 UART: [kat] --
3,974,428 UART: [cold-reset] ++
3,977,130 UART: [fht] Storing FHT @ 0x50003400
3,988,689 UART: [idev] ++
3,989,263 UART: [idev] CDI.KEYID = 6
3,990,280 UART: [idev] SUBJECT.KEYID = 7
3,991,439 UART: [idev] UDS.KEYID = 0
4,016,537 UART: [idev] Erasing UDS.KEYID = 0
7,327,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,532 UART: [idev] CSR upload requested
7,354,722 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,660,114 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,674,678 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,689,439 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,703,755 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,726,682 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,898 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
9,299 writing to cptra_bootfsm_go
197,933 UART:
199,147 UART: Running Caliptra ROM ...
200,426 UART:
609,003 UART: [state] CFI Enabled
623,375 UART: [state] LifecycleState = Unprovisioned
625,353 UART: [state] DebugLocked = Yes
627,456 UART: [state] Starting the Watchdog Timer 40000000 cycles
632,563 UART: [kat] SHA2-256
802,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
812,832 UART: [kat] ++
813,440 UART: [kat] sha1
822,652 UART: [kat] SHA2-256
825,352 UART: [kat] SHA2-384
830,622 UART: [kat] SHA2-512-ACC
833,012 UART: [kat] ECC-384
3,118,977 UART: [kat] HMAC-384Kdf
3,131,410 UART: [kat] LMS
4,321,539 UART: [kat] --
4,327,725 UART: [cold-reset] ++
4,329,671 UART: [fht] Storing FHT @ 0x50003400
4,341,963 UART: [idev] ++
4,342,589 UART: [idev] CDI.KEYID = 6
4,343,508 UART: [idev] SUBJECT.KEYID = 7
4,344,727 UART: [idev] UDS.KEYID = 0
4,361,084 UART: [idev] Erasing UDS.KEYID = 0
7,633,349 UART: [idev] Using Sha1 for KeyId Algorithm
7,655,067 UART: [idev] CSR upload requested
7,660,287 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,950,633 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,965,217 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,979,932 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,994,236 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,017,246 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,623 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,930 writing to cptra_bootfsm_go
192,535 UART:
193,467 UART: Running Caliptra ROM ...
194,681 UART:
194,889 UART: [state] CFI Enabled
260,776 UART: [state] LifecycleState = Unprovisioned
262,978 UART: [state] DebugLocked = Yes
265,100 UART: [state] Starting the WD Timer 40000000 cycles
269,562 UART: [kat] SHA2-256
448,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,313 UART: [kat] ++
460,874 UART: [kat] sha1
471,856 UART: [kat] SHA2-256
474,878 UART: [kat] SHA2-384
482,114 UART: [kat] SHA2-512-ACC
485,061 UART: [kat] ECC-384
2,946,080 UART: [kat] HMAC-384Kdf
2,969,478 UART: [kat] LMS
3,498,949 UART: [kat] --
3,502,751 UART: [cold-reset] ++
3,503,823 UART: [fht] FHT @ 0x50003400
3,515,396 UART: [idev] ++
3,515,955 UART: [idev] CDI.KEYID = 6
3,516,923 UART: [idev] SUBJECT.KEYID = 7
3,518,081 UART: [idev] UDS.KEYID = 0
3,541,995 UART: [idev] Erasing UDS.KEYID = 0
6,023,615 UART: [idev] Sha1 KeyId Algorithm
6,045,185 UART: [idev] CSR upload begun
6,049,902 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,769,566 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,785,690 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,801,539 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,817,417 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,841,382 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,839 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,018 writing to cptra_bootfsm_go
192,642 UART:
193,774 UART: Running Caliptra ROM ...
194,983 UART:
603,653 UART: [state] CFI Enabled
617,966 UART: [state] LifecycleState = Unprovisioned
619,822 UART: [state] DebugLocked = Yes
621,834 UART: [state] Starting the WD Timer 40000000 cycles
626,464 UART: [kat] SHA2-256
805,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,170 UART: [kat] ++
817,748 UART: [kat] sha1
830,200 UART: [kat] SHA2-256
833,235 UART: [kat] SHA2-384
839,590 UART: [kat] SHA2-512-ACC
842,586 UART: [kat] ECC-384
3,286,966 UART: [kat] HMAC-384Kdf
3,298,871 UART: [kat] LMS
3,828,357 UART: [kat] --
3,832,763 UART: [cold-reset] ++
3,834,759 UART: [fht] FHT @ 0x50003400
3,845,788 UART: [idev] ++
3,846,357 UART: [idev] CDI.KEYID = 6
3,847,274 UART: [idev] SUBJECT.KEYID = 7
3,848,431 UART: [idev] UDS.KEYID = 0
3,863,051 UART: [idev] Erasing UDS.KEYID = 0
6,322,010 UART: [idev] Sha1 KeyId Algorithm
6,344,041 UART: [idev] CSR upload begun
6,348,762 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,065,574 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,081,684 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,097,578 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,113,347 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,137,380 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,116 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,908 writing to cptra_bootfsm_go
192,542 UART:
193,804 UART: Running Caliptra ROM ...
195,013 UART:
195,182 UART: [state] CFI Enabled
266,726 UART: [state] LifecycleState = Unprovisioned
269,558 UART: [state] DebugLocked = Yes
270,716 UART: [state] Starting the WD Timer 40000000 cycles
276,202 UART: [kat] SHA2-256
466,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,852 UART: [kat] ++
477,446 UART: [kat] sha1
489,289 UART: [kat] SHA2-256
492,304 UART: [kat] SHA2-384
498,728 UART: [kat] SHA2-512-ACC
501,301 UART: [kat] ECC-384
2,949,218 UART: [kat] HMAC-384Kdf
2,972,776 UART: [kat] LMS
3,504,525 UART: [kat] --
3,507,987 UART: [cold-reset] ++
3,509,437 UART: [fht] FHT @ 0x50003400
3,520,693 UART: [idev] ++
3,521,372 UART: [idev] CDI.KEYID = 6
3,522,393 UART: [idev] SUBJECT.KEYID = 7
3,523,493 UART: [idev] UDS.KEYID = 0
3,544,930 UART: [idev] Erasing UDS.KEYID = 0
6,029,475 UART: [idev] Sha1 KeyId Algorithm
6,050,261 UART: [idev] CSR upload begun
6,055,335 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,784,331 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,799,532 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,814,636 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,829,637 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,854,754 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,860 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,951 writing to cptra_bootfsm_go
192,558 UART:
193,644 UART: Running Caliptra ROM ...
194,834 UART:
603,698 UART: [state] CFI Enabled
618,150 UART: [state] LifecycleState = Unprovisioned
620,632 UART: [state] DebugLocked = Yes
622,774 UART: [state] Starting the WD Timer 40000000 cycles
628,117 UART: [kat] SHA2-256
818,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,802 UART: [kat] ++
829,355 UART: [kat] sha1
841,533 UART: [kat] SHA2-256
844,546 UART: [kat] SHA2-384
850,574 UART: [kat] SHA2-512-ACC
853,180 UART: [kat] ECC-384
3,294,990 UART: [kat] HMAC-384Kdf
3,308,806 UART: [kat] LMS
3,840,639 UART: [kat] --
3,845,246 UART: [cold-reset] ++
3,847,777 UART: [fht] FHT @ 0x50003400
3,857,831 UART: [idev] ++
3,858,501 UART: [idev] CDI.KEYID = 6
3,859,514 UART: [idev] SUBJECT.KEYID = 7
3,860,668 UART: [idev] UDS.KEYID = 0
3,875,563 UART: [idev] Erasing UDS.KEYID = 0
6,336,194 UART: [idev] Sha1 KeyId Algorithm
6,357,484 UART: [idev] CSR upload begun
6,362,582 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,080,180 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,095,376 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,110,435 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,125,403 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,150,565 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,207 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = Yes
86,505 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,775 UART: [kat] SHA2-256
892,713 UART: [kat] SHA2-384
895,490 UART: [kat] SHA2-512-ACC
897,391 UART: [kat] ECC-384
902,910 UART: [kat] HMAC-384Kdf
907,284 UART: [kat] LMS
1,475,480 UART: [kat] --
1,476,287 UART: [cold-reset] ++
1,476,712 UART: [fht] Storing FHT @ 0x50003400
1,479,571 UART: [idev] ++
1,479,739 UART: [idev] CDI.KEYID = 6
1,480,099 UART: [idev] SUBJECT.KEYID = 7
1,480,523 UART: [idev] UDS.KEYID = 0
1,488,942 UART: [idev] Erasing UDS.KEYID = 0
1,505,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,721 UART: [idev] CSR upload requested
1,515,567 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,518 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,230 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,132 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,543,836 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,371 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = Yes
86,796 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
891,032 UART: [kat] SHA2-256
892,970 UART: [kat] SHA2-384
895,653 UART: [kat] SHA2-512-ACC
897,554 UART: [kat] ECC-384
903,217 UART: [kat] HMAC-384Kdf
907,833 UART: [kat] LMS
1,476,029 UART: [kat] --
1,476,966 UART: [cold-reset] ++
1,477,383 UART: [fht] Storing FHT @ 0x50003400
1,479,996 UART: [idev] ++
1,480,164 UART: [idev] CDI.KEYID = 6
1,480,524 UART: [idev] SUBJECT.KEYID = 7
1,480,948 UART: [idev] UDS.KEYID = 0
1,489,157 UART: [idev] Erasing UDS.KEYID = 0
1,506,174 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,570 UART: [idev] CSR upload requested
1,516,416 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,527,171 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,883 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,785 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,544,489 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,553,024 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = Yes
86,639 UART: [state] Starting the WD Timer 40000000 cycles
88,330 UART: [kat] SHA2-256
893,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,105 UART: [kat] ++
898,257 UART: [kat] sha1
902,483 UART: [kat] SHA2-256
904,423 UART: [kat] SHA2-384
907,132 UART: [kat] SHA2-512-ACC
909,033 UART: [kat] ECC-384
918,870 UART: [kat] HMAC-384Kdf
923,420 UART: [kat] LMS
1,171,748 UART: [kat] --
1,172,803 UART: [cold-reset] ++
1,173,268 UART: [fht] FHT @ 0x50003400
1,176,025 UART: [idev] ++
1,176,193 UART: [idev] CDI.KEYID = 6
1,176,553 UART: [idev] SUBJECT.KEYID = 7
1,176,977 UART: [idev] UDS.KEYID = 0
1,184,790 UART: [idev] Erasing UDS.KEYID = 0
1,201,846 UART: [idev] Sha1 KeyId Algorithm
1,210,099 UART: [idev] CSR upload begun
1,211,880 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,560 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,272 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,174 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,878 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,413 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,624 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = Yes
87,022 UART: [state] Starting the WD Timer 40000000 cycles
88,717 UART: [kat] SHA2-256
894,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,492 UART: [kat] ++
898,644 UART: [kat] sha1
902,766 UART: [kat] SHA2-256
904,706 UART: [kat] SHA2-384
907,513 UART: [kat] SHA2-512-ACC
909,414 UART: [kat] ECC-384
919,265 UART: [kat] HMAC-384Kdf
923,883 UART: [kat] LMS
1,172,211 UART: [kat] --
1,173,314 UART: [cold-reset] ++
1,173,857 UART: [fht] FHT @ 0x50003400
1,176,300 UART: [idev] ++
1,176,468 UART: [idev] CDI.KEYID = 6
1,176,828 UART: [idev] SUBJECT.KEYID = 7
1,177,252 UART: [idev] UDS.KEYID = 0
1,185,703 UART: [idev] Erasing UDS.KEYID = 0
1,203,099 UART: [idev] Sha1 KeyId Algorithm
1,211,392 UART: [idev] CSR upload begun
1,213,173 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,223,617 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,229,329 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,235,231 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,240,935 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,249,470 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,025 UART: [state] DebugLocked = Yes
86,775 UART: [state] Starting the WD Timer 40000000 cycles
88,360 UART: [kat] SHA2-256
891,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,039 UART: [kat] ++
896,191 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,346 UART: [kat] SHA2-512-ACC
907,247 UART: [kat] ECC-384
916,876 UART: [kat] HMAC-384Kdf
921,302 UART: [kat] LMS
1,169,614 UART: [kat] --
1,170,497 UART: [cold-reset] ++
1,171,072 UART: [fht] FHT @ 0x50003400
1,173,794 UART: [idev] ++
1,173,962 UART: [idev] CDI.KEYID = 6
1,174,323 UART: [idev] SUBJECT.KEYID = 7
1,174,748 UART: [idev] UDS.KEYID = 0
1,182,631 UART: [idev] Erasing UDS.KEYID = 0
1,199,486 UART: [idev] Sha1 KeyId Algorithm
1,207,831 UART: [idev] CSR upload begun
1,209,610 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,285 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,998 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,903 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,608 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,152 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = Yes
86,558 UART: [state] Starting the WD Timer 40000000 cycles
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,166 UART: [kat] SHA2-256
902,106 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,345 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,555 UART: [fht] FHT @ 0x50003400
1,173,153 UART: [idev] ++
1,173,321 UART: [idev] CDI.KEYID = 6
1,173,682 UART: [idev] SUBJECT.KEYID = 7
1,174,107 UART: [idev] UDS.KEYID = 0
1,181,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,379 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] CSR upload begun
1,209,653 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,236 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,949 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,854 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,559 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,246,103 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
Truncated 5084 bytes from beginning
F379BC3E68375B99C2B4B984AD2DD9D0A92978A0AB
36,498,265 UART: [art] SIG.S = 8101A1AC709A5C59BC063C852F9DAC9BA33DD0BD137FBBF8AA8067420A639FD28CC14F2F749600045D7DE6A53E6F4178
37,803,294 UART: Caliptra RT
37,804,027 UART: [state] CFI Enabled
37,964,417 UART: [rt] RT listening for mailbox commands...
38,116,256 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,561,184 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,993,368 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [64, 35, 67, 6a, a7, f2, 11, fb, 36, f7, 77, 9b, e4, f0, c8, 1d, af, b7, c9, d4, 8c, b5, d7, 8a, 93, 0d, 60, 8b, 18, b8, 87, 53, f0, a9, 20, 1c, c4, 37, 58, 88, a4, 3c, 5f, 25, de, 79, b3, 76]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:b8:db:13:98:e5:9b:c6:e3:bf:1a:44:a1:0e:9c:76:b9:89:d1:09
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=01B8DB1398E59BC6E3BF1A44A10E9C76B989D10996E8EF2392BD3A62345DC019
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:42:15:11:27:39:0b:c7:bc:68:f5:5c:ca:79:c7:
2e:50:6b:d9:70:2d:68:3a:5d:43:68:0c:1c:e2:60:
78:a1:b9:6d:fd:b7:c1:f3:c6:1d:d5:54:56:6b:05:
36:46:75:7e:eb:38:6b:b2:6a:8b:7b:06:bc:7d:06:
85:16:2d:30:a4:6f:00:63:df:75:60:7b:e6:6d:82:
63:80:24:16:29:61:54:d3:d2:7f:c2:54:18:03:4b:
e1:b5:46:f0:9d:05:92
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0jg5d.....w.6.............`.S.... ...X7.%_<.v.y...RT_INFO
X509v3 Subject Key Identifier:
01:B8:DB:13:98:E5:9B:C6:E3:BF:1A:44:A1:0E:9C:76:B9:89:D1:09
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:b2:93:02:be:48:8c:16:bc:2f:75:ee:c9:9f:
27:d1:f7:d0:3a:85:60:d1:a5:81:6a:51:6e:7f:f3:79:bc:3e:
68:37:5b:99:c2:b4:b9:84:ad:2d:d9:d0:a9:29:78:a0:ab:02:
31:00:81:01:a1:ac:70:9a:5c:59:bc:06:3c:85:2f:9d:ac:9b:
a3:3d:d0:bd:13:7f:bb:f8:aa:80:67:42:0a:63:9f:d2:8c:c1:
4f:2f:74:96:00:04:5d:7d:e6:a5:3e:6f:41:78
41,449,814 <<< Executing mbox cmd 0x46574c44 (112072 bytes) from SoC
41,592,195 UART:
41,592,571 UART: Running Caliptra ROM ...
41,593,628 UART:
41,593,780 UART: [state] CFI Enabled
41,660,018 UART: [state] LifecycleState = Production
41,661,862 UART: [state] DebugLocked = Yes
41,664,827 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,670,851 UART: [kat] SHA2-256
41,840,588 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,851,065 UART: [kat] ++
41,851,522 UART: [kat] sha1
41,863,700 UART: [kat] SHA2-256
41,866,395 UART: [kat] SHA2-384
41,872,168 UART: [kat] SHA2-512-ACC
41,874,579 UART: [kat] ECC-384
44,161,274 UART: [kat] HMAC-384Kdf
44,192,672 UART: [kat] LMS
45,383,018 UART: [kat] --
45,386,985 UART: [update-reset] ++
54,366,448 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,370,577 UART: [update-reset] Loading Runtime at address 0x40005000 len 87368
54,745,671 >>> mbox cmd response: success
54,746,340 UART: [update-reset] Copying MAN_2 To MAN_1
54,768,760 UART: [update-reset Success] --
54,772,733 UART: [state] Locking Datavault
54,775,511 UART: [state] Locking PCR0, PCR1 and PCR31
54,777,270 UART: [state] Locking ICCM
54,778,662 UART: [exit] Launching FMC @ 0x40000130
54,787,057 UART:
54,787,301 UART: Running Caliptra FMC ...
54,788,401 UART:
54,788,557 UART: [state] CFI Enabled
54,892,572 UART: [art] Extend RT PCRs Done
54,893,754 UART: [art] Lock RT PCRs Done
54,895,211 UART: [art] Populate DV Done
54,900,612 UART: [fht] FMC Alias Private Key: 7
54,902,304 UART: [art] Derive CDI
54,903,109 UART: [art] Store in in slot 0x4
54,961,930 UART: [art] Derive Key Pair
54,962,990 UART: [art] Store priv key in slot 0x5
58,255,603 UART: [art] Derive Key Pair - Done
58,268,448 UART: [art] Signing Cert with AUTHO
58,269,752 UART: RITY.KEYID = 7
60,557,657 UART: [art] Erasing AUTHORITY.KEYID = 7
60,559,169 UART: [art] PUB.X = D830AA05522BA54ADE734933DD8C928BB03D85F2E18F62E9D0FCB6D594DDE104C34C02AAA2A3DBEF64F3735CCC8C2A49
60,566,464 UART: [art] PUB.Y = 87A98B005F8A3C737E7BFBA2B17922A9B413883458256224E69EECE9F56BDB4584561079B19B379F82623F1099F61FA5
60,573,651 UART: [art] SIG.R = E073CBF0AC151D4326B3176BA333653DA4E61AACACDD610936C39FA5196E110B95A7F8FF1E013383A9F14B0DC02E0420
60,581,051 UART: [art] SIG.S = 2B055376E86E512B380485FBAE9F720F57C6DA276293DBCDED01E52D81B4A1A0D440632A139C4374AC5747F91E9F217D
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7e:19:96:66:1c:c2:b0:c6:b2:bf:f5:b9:5d:1f:ff:a4:3b:f7:7d:0c
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7A1996661CC2B0C6B2BFF5B95D1FFFA43BF77D0CCBBD683D970B5A262DD59E83
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d8:30:aa:05:52:2b:a5:4a:de:73:49:33:dd:8c:
92:8b:b0:3d:85:f2:e1:8f:62:e9:d0:fc:b6:d5:94:
dd:e1:04:c3:4c:02:aa:a2:a3:db:ef:64:f3:73:5c:
cc:8c:2a:49:87:a9:8b:00:5f:8a:3c:73:7e:7b:fb:
a2:b1:79:22:a9:b4:13:88:34:58:25:62:24:e6:9e:
ec:e9:f5:6b:db:45:84:56:10:79:b1:9b:37:9f:82:
62:3f:10:99:f6:1f:a5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0V.B.+o.R....g....6ss....)..:.xvD....-!..M.b..f....RT_INFO
X509v3 Subject Key Identifier:
7A:19:96:66:1C:C2:B0:C6:B2:BF:F5:B9:5D:1F:FF:A4:3B:F7:7D:0C
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e0:73:cb:f0:ac:15:1d:43:26:b3:17:6b:a3:
33:65:3d:a4:e6:1a:ac:ac:dd:61:09:36:c3:9f:a5:19:6e:11:
0b:95:a7:f8:ff:1e:01:33:83:a9:f1:4b:0d:c0:2e:04:20:02:
30:2b:05:53:76:e8:6e:51:2b:38:04:85:fb:ae:9f:72:0f:57:
c6:da:27:62:93:db:cd:ed:01:e5:2d:81:b4:a1:a0:d4:40:63:
2a:13:9c:43:74:ac:57:47:f9:1e:9f:21:7d
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.25s
Truncated 561 bytes from beginning
eady_for_fw is high
3,787,108 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,936,458 >>> mbox cmd response: success
27,616,954 UART:
27,617,374 UART: Running Caliptra FMC ...
27,618,504 UART:
27,618,666 UART: [state] CFI Enabled
27,688,516 UART: [fht] FMC Alias Private Key: 7
30,026,273 UART: [art] Extend RT PCRs Done
30,027,533 UART: [art] Lock RT PCRs Done
30,029,326 UART: [art] Populate DV Done
30,034,791 UART: [fht] FMC Alias Private Key: 7
30,036,502 UART: [art] Derive CDI
30,037,326 UART: [art] Store in in slot 0x4
30,096,355 UART: [art] Derive Key Pair
30,097,401 UART: [art] Store priv key in slot 0x5
33,389,674 UART: [art] Derive Key Pair - Done
33,402,678 UART: [art] Signing Cert with AUTHO
33,403,983 UART: RITY.KEYID = 7
35,691,637 UART: [art] Erasing AUTHORITY.KEYID = 7
35,693,141 UART: [art] PUB.X = 48C125FF8F25BCC72A867B1ECB76FC1C5A06D673CC35F257E257FC2BC544DBD652F26ACA8E5A923D8096D7A407E86EFC
35,700,454 UART: [art] PUB.Y = 52610463B55C936DAA47091F7825E7E5F244E74E744F4727DAD7004006A3B6CCFFEC7266F82CC07002FCECBFE09A332A
35,707,657 UART: [art] SIG.R = 6092D6C5AC25647C41DBA9FEE35163EC2C02BD21751CBAF053F1A0C51FA892EF318F2EE5CEB1BD7567568961B59975A0
35,715,108 UART: [art] SIG.S = 804F2DE869C3BD27693FD423ECEA537E2359E4C079A67AA391DA0D4F05981F786E435A8CDA9D8D74F1E803663E882564
37,020,101 UART: Caliptra RT
37,020,835 UART: [state] CFI Enabled
37,181,574 UART: [rt] RT listening for mailbox commands...
37,213,044 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,658,558 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,093,300 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [64, 35, 67, 6a, a7, f2, 11, fb, 36, f7, 77, 9b, e4, f0, c8, 1d, af, b7, c9, d4, 8c, b5, d7, 8a, 93, 0d, 60, 8b, 18, b8, 87, 53, f0, a9, 20, 1c, c4, 37, 58, 88, a4, 3c, 5f, 25, de, 79, b3, 76]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:72:a2:ad:07:60:b1:4b:0d:29:ca:94:64:17:18:ae:15:da:23:db
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E872A2AD0760B14B0D29CA94641718AE15DA23DB235C908E3CF1DE2AC0090E44
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:48:c1:25:ff:8f:25:bc:c7:2a:86:7b:1e:cb:76:
fc:1c:5a:06:d6:73:cc:35:f2:57:e2:57:fc:2b:c5:
44:db:d6:52:f2:6a:ca:8e:5a:92:3d:80:96:d7:a4:
07:e8:6e:fc:52:61:04:63:b5:5c:93:6d:aa:47:09:
1f:78:25:e7:e5:f2:44:e7:4e:74:4f:47:27:da:d7:
00:40:06:a3:b6:cc:ff:ec:72:66:f8:2c:c0:70:02:
fc:ec:bf:e0:9a:33:2a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0jg5d.....w.6.............`.S.... ...X7.%_<.v.y...RT_INFO
X509v3 Subject Key Identifier:
E8:72:A2:AD:07:60:B1:4B:0D:29:CA:94:64:17:18:AE:15:DA:23:DB
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:60:92:d6:c5:ac:25:64:7c:41:db:a9:fe:e3:51:
63:ec:2c:02:bd:21:75:1c:ba:f0:53:f1:a0:c5:1f:a8:92:ef:
31:8f:2e:e5:ce:b1:bd:75:67:56:89:61:b5:99:75:a0:02:31:
00:80:4f:2d:e8:69:c3:bd:27:69:3f:d4:23:ec:ea:53:7e:23:
59:e4:c0:79:a6:7a:a3:91:da:0d:4f:05:98:1f:78:6e:43:5a:
8c:da:9d:8d:74:f1:e8:03:66:3e:88:25:64
40,550,780 <<< Executing mbox cmd 0x46574c44 (112072 bytes) from SoC
53,396,923 >>> mbox cmd response: success
53,430,979 UART:
53,431,305 UART: Running Caliptra FMC ...
53,432,523 UART:
53,432,689 UART: [state] CFI Enabled
53,520,530 UART: [art] Extend RT PCRs Done
53,521,728 UART: [art] Lock RT PCRs Done
53,523,401 UART: [art] Populate DV Done
53,529,186 UART: [fht] FMC Alias Private Key: 7
53,530,766 UART: [art] Derive CDI
53,531,514 UART: [art] Store in in slot 0x4
53,589,826 UART: [art] Derive Key Pair
53,590,829 UART: [art] Store priv key in slot 0x5
56,883,206 UART: [art] Derive Key Pair - Done
56,896,149 UART: [art] Signing Cert with AUTHO
56,897,484 UART: RITY.KEYID = 7
59,185,234 UART: [art] Erasing AUTHORITY.KEYID = 7
59,186,748 UART: [art] PUB.X = D09FCB84A9B947090D95EF720EA4D4CBCA94FCEBAFDB3356DBD2E87EC3E42D5DF8DB5419785088E9C116BA88B7A86CBC
59,194,055 UART: [art] PUB.Y = 638661FCB6F198B3AB439D79C4E8548B04C65277F3D7B563C6851E44C12499CAADC009075295572C1E31181F0897FC75
59,201,236 UART: [art] SIG.R = 775DBC3637D42030BFA756DDAD9D9473DF731B95F346345C7FCB063C1EC3557337166A716E49AA46F6940905CE5F41FD
59,208,635 UART: [art] SIG.S = 937BB35B425E9472CE8DDEF893ABDB0578A66F8668D7976E7265E164771FF6547ED560142E6B5B9E6499AF06328612D3
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
15:22:3e:9f:c1:0c:f7:7f:63:09:20:68:ce:c7:76:ac:20:51:77:1d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=91223E9FC10CF77F63092068CEC776AC2051771DF91C079BCB095DD390193436
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:9f:cb:84:a9:b9:47:09:0d:95:ef:72:0e:a4:
d4:cb:ca:94:fc:eb:af:db:33:56:db:d2:e8:7e:c3:
e4:2d:5d:f8:db:54:19:78:50:88:e9:c1:16:ba:88:
b7:a8:6c:bc:63:86:61:fc:b6:f1:98:b3:ab:43:9d:
79:c4:e8:54:8b:04:c6:52:77:f3:d7:b5:63:c6:85:
1e:44:c1:24:99:ca:ad:c0:09:07:52:95:57:2c:1e:
31:18:1f:08:97:fc:75
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0V.B.+o.R....g....6ss....)..:.xvD....-!..M.b..f....RT_INFO
X509v3 Subject Key Identifier:
91:22:3E:9F:C1:0C:F7:7F:63:09:20:68:CE:C7:76:AC:20:51:77:1D
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:77:5d:bc:36:37:d4:20:30:bf:a7:56:dd:ad:9d:
94:73:df:73:1b:95:f3:46:34:5c:7f:cb:06:3c:1e:c3:55:73:
37:16:6a:71:6e:49:aa:46:f6:94:09:05:ce:5f:41:fd:02:31:
00:93:7b:b3:5b:42:5e:94:72:ce:8d:de:f8:93:ab:db:05:78:
a6:6f:86:68:d7:97:6e:72:65:e1:64:77:1f:f6:54:7e:d5:60:
14:2e:6b:5b:9e:64:99:af:06:32:86:12:d3
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.18s
Truncated 5084 bytes from beginning
FFD8BBFF50439C971FABCABEF77FA22E757B116742
35,860,654 UART: [art] SIG.S = CB77375F9A2E935B942CB18E5DAFA82E4500ED62E2AE641A7EFF90B37C79B00E928D31EE569A04239E8343ECCCE61941
37,165,773 UART: Caliptra RT
37,166,503 UART: [state] CFI Enabled
37,283,402 UART: [rt] RT listening for mailbox commands...
37,437,425 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,883,172 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,316,783 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [64, 35, 67, 6a, a7, f2, 11, fb, 36, f7, 77, 9b, e4, f0, c8, 1d, af, b7, c9, d4, 8c, b5, d7, 8a, 93, 0d, 60, 8b, 18, b8, 87, 53, f0, a9, 20, 1c, c4, 37, 58, 88, a4, 3c, 5f, 25, de, 79, b3, 76]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
07:87:1e:76:2d:f1:d1:81:1d:eb:04:18:cd:96:4f:ea:4c:c8:8d:d0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=03871E762DF1D1811DEB0418CD964FEA4CC88DD073BE3C31847BF40A1E0CD151
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:86:e8:0c:4e:28:8e:69:00:18:17:f7:36:36:80:
cf:63:38:1e:04:df:19:15:ea:77:18:68:32:f4:ff:
75:d1:e0:e0:52:f6:74:b9:39:d1:59:25:12:9e:7d:
f7:cd:8e:d2:13:bf:31:5b:06:40:31:f5:5f:da:33:
3e:be:01:b7:1c:4b:fa:55:4e:e2:84:86:5c:81:97:
7a:34:64:ca:3c:d5:5e:48:f4:12:84:f0:7b:1d:7a:
b8:6d:81:fa:af:e9:0d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0jg5d.....w.6.............`.S.... ...X7.%_<.v.y...RT_INFO
X509v3 Subject Key Identifier:
03:87:1E:76:2D:F1:D1:81:1D:EB:04:18:CD:96:4F:EA:4C:C8:8D:D0
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:b3:aa:b7:9e:da:d8:38:67:5c:c2:b9:9b:f5:
06:a5:90:51:75:c4:03:92:fa:aa:41:1b:12:da:ff:d8:bb:ff:
50:43:9c:97:1f:ab:ca:be:f7:7f:a2:2e:75:7b:11:67:42:02:
31:00:cb:77:37:5f:9a:2e:93:5b:94:2c:b1:8e:5d:af:a8:2e:
45:00:ed:62:e2:ae:64:1a:7e:ff:90:b3:7c:79:b0:0e:92:8d:
31:ee:56:9a:04:23:9e:83:43:ec:cc:e6:19:41
40,776,780 <<< Executing mbox cmd 0x46574c44 (112072 bytes) from SoC
40,919,375 UART:
40,919,802 UART: Running Caliptra ROM ...
40,920,855 UART:
40,921,003 UART: [state] CFI Enabled
40,936,868 UART: [state] LifecycleState = Production
40,938,662 UART: [state] DebugLocked = Yes
40,940,669 UART: [state] Starting the Watchdog Timer 40000000 cycles
40,946,426 UART: [kat] SHA2-256
41,116,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,126,682 UART: [kat] ++
41,127,168 UART: [kat] sha1
41,137,080 UART: [kat] SHA2-256
41,139,773 UART: [kat] SHA2-384
41,144,349 UART: [kat] SHA2-512-ACC
41,146,754 UART: [kat] ECC-384
43,431,489 UART: [kat] HMAC-384Kdf
43,443,598 UART: [kat] LMS
44,633,677 UART: [kat] --
44,637,417 UART: [update-reset] ++
53,606,238 UART: [update-reset] Image verified using Vendor ECC Key Index 0
53,609,890 UART: [update-reset] Loading Runtime at address 0x40005000 len 87368
53,984,971 >>> mbox cmd response: success
53,985,974 UART: [update-reset] Copying MAN_2 To MAN_1
54,008,398 UART: [update-reset Success] --
54,011,270 UART: [state] Locking Datavault
54,014,857 UART: [state] Locking PCR0, PCR1 and PCR31
54,016,614 UART: [state] Locking ICCM
54,018,765 UART: [exit] Launching FMC @ 0x40000130
54,027,157 UART:
54,027,393 UART: Running Caliptra FMC ...
54,028,498 UART:
54,028,673 UART: [state] CFI Enabled
54,072,971 UART: [art] Extend RT PCRs Done
54,074,117 UART: [art] Lock RT PCRs Done
54,075,779 UART: [art] Populate DV Done
54,081,136 UART: [fht] FMC Alias Private Key: 7
54,082,841 UART: [art] Derive CDI
54,083,674 UART: [art] Store in in slot 0x4
54,126,544 UART: [art] Derive Key Pair
54,127,540 UART: [art] Store priv key in slot 0x5
57,369,793 UART: [art] Derive Key Pair - Done
57,382,634 UART: [art] Signing Cert with AUTHO
57,383,934 UART: RITY.KEYID = 7
59,663,659 UART: [art] Erasing AUTHORITY.KEYID = 7
59,665,163 UART: [art] PUB.X = 601CBCE5829635F18930D0F5212F908B8599E8C247AB2BBD106CD9A16842C802CB75949427BA21ED9F005C216FBE4059
59,672,362 UART: [art] PUB.Y = 208BA34BDB29DA53025432EDB00B7EB17211B7B5A2A154E35239C9D118F90474D79BD62E2E23EE09D65CB1352D24C26A
59,679,628 UART: [art] SIG.R = DBBCF1762D0B1242A316859D7575F94907424ACA461A5DFDE3A1C37636543BA151A599FE5D257C5AB897869F7C997126
59,687,037 UART: [art] SIG.S = 281B480E1D63883514E6C2AB4049674714F1D5B0042858816BF802EF587A8EA7669CAF246845ABC108D885019340C1DF
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
56:e8:72:46:15:1d:e1:90:04:5e:df:19:32:b5:ef:f3:a6:a1:4a:55
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=56E87246151DE190045EDF1932B5EFF3A6A14A5584F1730B57C3C438636F80D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:60:1c:bc:e5:82:96:35:f1:89:30:d0:f5:21:2f:
90:8b:85:99:e8:c2:47:ab:2b:bd:10:6c:d9:a1:68:
42:c8:02:cb:75:94:94:27:ba:21:ed:9f:00:5c:21:
6f:be:40:59:20:8b:a3:4b:db:29:da:53:02:54:32:
ed:b0:0b:7e:b1:72:11:b7:b5:a2:a1:54:e3:52:39:
c9:d1:18:f9:04:74:d7:9b:d6:2e:2e:23:ee:09:d6:
5c:b1:35:2d:24:c2:6a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0V.B.+o.R....g....6ss....)..:.xvD....-!..M.b..f....RT_INFO
X509v3 Subject Key Identifier:
56:E8:72:46:15:1D:E1:90:04:5E:DF:19:32:B5:EF:F3:A6:A1:4A:55
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:db:bc:f1:76:2d:0b:12:42:a3:16:85:9d:75:
75:f9:49:07:42:4a:ca:46:1a:5d:fd:e3:a1:c3:76:36:54:3b:
a1:51:a5:99:fe:5d:25:7c:5a:b8:97:86:9f:7c:99:71:26:02:
30:28:1b:48:0e:1d:63:88:35:14:e6:c2:ab:40:49:67:47:14:
f1:d5:b0:04:28:58:81:6b:f8:02:ef:58:7a:8e:a7:66:9c:af:
24:68:45:ab:c1:08:d8:85:01:93:40:c1:df
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.20s
Truncated 558 bytes from beginning
3 ready_for_fw is high
4,133,992 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,298,717 >>> mbox cmd response: success
27,934,412 UART:
27,934,797 UART: Running Caliptra FMC ...
27,935,946 UART:
27,936,104 UART: [state] CFI Enabled
27,943,770 UART: [fht] FMC Alias Private Key: 7
30,274,504 UART: [art] Extend RT PCRs Done
30,275,735 UART: [art] Lock RT PCRs Done
30,277,330 UART: [art] Populate DV Done
30,283,002 UART: [fht] FMC Alias Private Key: 7
30,284,594 UART: [art] Derive CDI
30,285,328 UART: [art] Store in in slot 0x4
30,327,916 UART: [art] Derive Key Pair
30,328,951 UART: [art] Store priv key in slot 0x5
33,571,386 UART: [art] Derive Key Pair - Done
33,583,959 UART: [art] Signing Cert with AUTHO
33,585,260 UART: RITY.KEYID = 7
35,864,761 UART: [art] Erasing AUTHORITY.KEYID = 7
35,866,267 UART: [art] PUB.X = 8EB843DF5EB2353EE85DFA02F0D3FFFF105CAD9763F0A906C9FE73F8B288F16BF76331C381B4337897C554B39B79739F
35,873,513 UART: [art] PUB.Y = D03E9A30A23271F0D86C9DD813CA663B721A53B35A9E9E8B1D9A9326AED9B2DBB6A1BB596914DECB22E5BB0D6276EEAF
35,880,778 UART: [art] SIG.R = 70089BE9A000312648669E07057B37EC6DB4CD3D8E3C7A752D393993EFE4F9701A21A56868C03CBA2D8F76CFCAFCC2FA
35,888,171 UART: [art] SIG.S = 16C676820E71B54E082B5FF7C9BA541D9D4C14C4F2995B19A259784E73641DC37458F8F00DCCBE435305CF31F3A0EC3D
37,193,849 UART: Caliptra RT
37,194,546 UART: [state] CFI Enabled
37,312,559 UART: [rt] RT listening for mailbox commands...
37,343,701 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,790,737 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:2f:2b:42:fb:86:ae:4f:5e:7c:b9:d0:26:2c:46:b0:65:56:bd:a0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:73:35:49:78:4e:49:80:79:bf:d4:50:e8:65:
e6:bf:9c:db:ee:c8:f3:93:63:76:9a:16:33:4b:92:
34:c4:e4:cc:e3:48:ca:ae:15:c2:c1:d9:c0:07:ea:
d3:dc:da:71:67:60:27:43:36:df:40:88:bc:61:ca:
dd:7d:67:d5:3f:88:0d:47:8a:fc:43:83:26:1c:c3:
96:37:fd:4c:aa:dc:94:72:74:46:cd:97:71:b9:bc:
85:8c:40:34:f8:2e:b6
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0...gB....~.{....%.'......b .Qd..b.C....!_.@vW7m...FMC_INFO
X509v3 Subject Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:52:5f:f1:18:42:80:19:4b:c9:b5:b5:d3:1b:fa:
63:a6:1c:cf:fc:43:f9:2b:e3:46:f6:4d:ea:94:be:f5:35:85:
9f:ca:89:eb:e5:a6:0c:b4:47:26:17:12:a5:f3:86:f5:02:30:
59:2e:8c:b3:dc:19:ad:54:66:e5:c0:38:8c:c6:12:87:ff:4c:
2b:09:ee:bc:bd:94:68:37:61:32:f4:fe:67:35:d4:f7:1d:8b:
67:23:e9:5c:02:c9:b1:80:00:5a:b2:bb
38,225,455 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [64, 35, 67, 6a, a7, f2, 11, fb, 36, f7, 77, 9b, e4, f0, c8, 1d, af, b7, c9, d4, 8c, b5, d7, 8a, 93, 0d, 60, 8b, 18, b8, 87, 53, f0, a9, 20, 1c, c4, 37, 58, 88, a4, 3c, 5f, 25, de, 79, b3, 76]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:4a:1e:c4:2f:c5:c9:7d:35:16:31:12:55:75:2c:8a:ed:ce:61:43
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EC4A1EC42FC5C97D3516311255752C8AEDCE6143C68C2E055A0437D1D8565342
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8e:b8:43:df:5e:b2:35:3e:e8:5d:fa:02:f0:d3:
ff:ff:10:5c:ad:97:63:f0:a9:06:c9:fe:73:f8:b2:
88:f1:6b:f7:63:31:c3:81:b4:33:78:97:c5:54:b3:
9b:79:73:9f:d0:3e:9a:30:a2:32:71:f0:d8:6c:9d:
d8:13:ca:66:3b:72:1a:53:b3:5a:9e:9e:8b:1d:9a:
93:26:ae:d9:b2:db:b6:a1:bb:59:69:14:de:cb:22:
e5:bb:0d:62:76:ee:af
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0jg5d.....w.6.............`.S.... ...X7.%_<.v.y...RT_INFO
X509v3 Subject Key Identifier:
EC:4A:1E:C4:2F:C5:C9:7D:35:16:31:12:55:75:2C:8A:ED:CE:61:43
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:70:08:9b:e9:a0:00:31:26:48:66:9e:07:05:7b:
37:ec:6d:b4:cd:3d:8e:3c:7a:75:2d:39:39:93:ef:e4:f9:70:
1a:21:a5:68:68:c0:3c:ba:2d:8f:76:cf:ca:fc:c2:fa:02:30:
16:c6:76:82:0e:71:b5:4e:08:2b:5f:f7:c9:ba:54:1d:9d:4c:
14:c4:f2:99:5b:19:a2:59:78:4e:73:64:1d:c3:74:58:f8:f0:
0d:cc:be:43:53:05:cf:31:f3:a0:ec:3d
40,690,032 <<< Executing mbox cmd 0x46574c44 (112072 bytes) from SoC
53,448,617 >>> mbox cmd response: success
53,482,404 UART:
53,482,728 UART: Running Caliptra FMC ...
53,483,947 UART:
53,484,135 UART: [state] CFI Enabled
53,528,311 UART: [art] Extend RT PCRs Done
53,529,507 UART: [art] Lock RT PCRs Done
53,530,910 UART: [art] Populate DV Done
53,536,423 UART: [fht] FMC Alias Private Key: 7
53,537,963 UART: [art] Derive CDI
53,538,774 UART: [art] Store in in slot 0x4
53,581,362 UART: [art] Derive Key Pair
53,582,355 UART: [art] Store priv key in slot 0x5
56,823,828 UART: [art] Derive Key Pair - Done
56,836,897 UART: [art] Signing Cert with AUTHO
56,838,202 UART: RITY.KEYID = 7
59,117,591 UART: [art] Erasing AUTHORITY.KEYID = 7
59,119,100 UART: [art] PUB.X = 4F3618FFADC62D80E4CDD6A8E37933D952EA5821F6C6113FB31CB2A28444D03388E7311C3BE25E6E9F519FDF1E585544
59,126,347 UART: [art] PUB.Y = A1D25A739F860E1904EF8E082FE17F0E20481A5C710AA523E1D5DD49B13C9890C2BB364CC3D68C7DC635B673E6E74BA4
59,133,636 UART: [art] SIG.R = 2C2149007E36BCAE3ACD017C20034CB87A3547D92C14A787D6B64B0832447DDFD99218965D9B38B6503E247D29F14589
59,140,984 UART: [art] SIG.S = 945066480AC4F26EAD4F97A5D402EBE48EA5707993C0CB42A6F3FF7FFC11AAB13157B0E5ECC982696EBEA352DBADD106
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:28:29:76:44:78:2f:c7:bf:8a:65:fa:bb:11:0e:ca:3f:e0:38:1b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=C02F2B42FB86AE4F5E7CB9D0262C46B06556BDA00C4951543A7E682DC2FEC1F6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DA28297644782FC7BF8A65FABB110ECA3FE0381BE60F475A0CD2866AA1E749F5
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4f:36:18:ff:ad:c6:2d:80:e4:cd:d6:a8:e3:79:
33:d9:52:ea:58:21:f6:c6:11:3f:b3:1c:b2:a2:84:
44:d0:33:88:e7:31:1c:3b:e2:5e:6e:9f:51:9f:df:
1e:58:55:44:a1:d2:5a:73:9f:86:0e:19:04:ef:8e:
08:2f:e1:7f:0e:20:48:1a:5c:71:0a:a5:23:e1:d5:
dd:49:b1:3c:98:90:c2:bb:36:4c:c3:d6:8c:7d:c6:
35:b6:73:e6:e7:4b:a4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0V.B.+o.R....g....6ss....)..:.xvD....-!..M.b..f....RT_INFO
X509v3 Subject Key Identifier:
DA:28:29:76:44:78:2F:C7:BF:8A:65:FA:BB:11:0E:CA:3F:E0:38:1B
X509v3 Authority Key Identifier:
C0:2F:2B:42:FB:86:AE:4F:5E:7C:B9:D0:26:2C:46:B0:65:56:BD:A0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:2c:21:49:00:7e:36:bc:ae:3a:cd:01:7c:20:03:
4c:b8:7a:35:47:d9:2c:14:a7:87:d6:b6:4b:08:32:44:7d:df:
d9:92:18:96:5d:9b:38:b6:50:3e:24:7d:29:f1:45:89:02:31:
00:94:50:66:48:0a:c4:f2:6e:ad:4f:97:a5:d4:02:eb:e4:8e:
a5:70:79:93:c0:cb:42:a6:f3:ff:7f:fc:11:aa:b1:31:57:b0:
e5:ec:c9:82:69:6e:be:a3:52:db:ad:d1:06
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.17s
Truncated 4982 bytes from beginning
8F3908B3A556F4902142F1D4FE6746D6CAE694E6A1933E178A7467E3BD2CD9B4FA23549F27F39BD60B447EB4
25,974,289 UART: [art] SIG.S = 9939A8D81DA2F8815CD03577929F7D5FDB696550FC59B354FCC8A9E2E50A66074E1E473AE6B15631BF0DD6BCF24F000B
26,953,011 UART: Caliptra RT
26,953,755 UART: [state] CFI Enabled
27,118,309 UART: [rt] RT listening for mailbox commands...
27,271,467 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,717,479 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,152,063 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4c:fd:3c:a9:24:3e:bb:83:16:d6:e5:75:41:18:71:cf:eb:0f:9b:77
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=CCFD3CA9243EBB8316D6E575411871CFEB0F9B775114C46DDE31F4B57EE141BF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b5:cd:86:9d:3e:85:d6:77:16:bc:6b:76:fa:ab:
70:ce:d5:b0:06:28:09:92:f4:36:02:a9:8e:79:f8:
35:ff:bb:e0:b7:fd:bb:b4:85:c8:83:34:8a:32:52:
bd:8f:b4:8c:f3:4a:ba:b1:36:f0:7f:dc:42:dc:e9:
12:c2:a9:ff:82:6d:f5:f5:16:87:2f:b2:5b:0d:23:
85:32:43:0f:80:05:1e:15:06:7a:12:75:28:c8:d6:
63:66:00:40:64:1d:d1
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
CC:FD:3C:A9:24:3E:BB:83:16:D6:E5:75:41:18:71:CF:EB:0F:9B:77
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:cf:b2:26:d2:8f:39:08:b3:a5:56:f4:90:21:
42:f1:d4:fe:67:46:d6:ca:e6:94:e6:a1:93:3e:17:8a:74:67:
e3:bd:2c:d9:b4:fa:23:54:9f:27:f3:9b:d6:0b:44:7e:b4:02:
31:00:99:39:a8:d8:1d:a2:f8:81:5c:d0:35:77:92:9f:7d:5f:
db:69:65:50:fc:59:b3:54:fc:c8:a9:e2:e5:0a:66:07:4e:1e:
47:3a:e6:b1:56:31:bf:0d:d6:bc:f2:4f:00:0b
30,611,178 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
30,754,052 UART:
30,754,441 UART: Running Caliptra ROM ...
30,755,518 UART:
30,755,701 UART: [state] CFI Enabled
30,810,019 UART: [state] LifecycleState = Production
30,811,747 UART: [state] DebugLocked = Yes
30,814,734 UART: [state] Starting the WD Timer 40000000 cycles
30,819,521 UART: [kat] SHA2-256
30,998,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
31,010,264 UART: [kat] ++
31,010,826 UART: [kat] sha1
31,020,537 UART: [kat] SHA2-256
31,023,551 UART: [kat] SHA2-384
31,030,347 UART: [kat] SHA2-512-ACC
31,033,296 UART: [kat] ECC-384
33,497,786 UART: [kat] HMAC-384Kdf
33,519,739 UART: [kat] LMS
34,049,226 UART: [kat] --
34,054,673 UART: [update-reset] ++
38,657,714 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,661,971 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
39,038,134 >>> mbox cmd response: success
39,039,259 UART: [update-reset] Copying MAN_2 To MAN_1
39,061,562 UART: [update-reset Success] --
39,065,588 UART: [state] Locking Datavault
39,069,540 UART: [state] Locking PCR0, PCR1 and PCR31
39,071,238 UART: [state] Locking ICCM
39,073,965 UART: [exit] Launching FMC @ 0x40000130
39,082,419 UART:
39,082,650 UART: Running Caliptra FMC ...
39,083,885 UART:
39,084,051 UART: [state] CFI Enabled
39,183,341 UART: [art] Extend RT PCRs Done
39,184,526 UART: [art] Lock RT PCRs Done
39,185,985 UART: [art] Populate DV Done
39,191,584 UART: [fht] FMC Alias Private Key: 7
39,193,072 UART: [art] Derive CDI
39,193,885 UART: [art] Store in in slot 0x4
39,252,854 UART: [art] Derive Key Pair
39,253,892 UART: [art] Store priv key in slot 0x5
41,716,850 UART: [art] Derive Key Pair - Done
41,730,182 UART: [art] Signing Cert with AUTHO
41,731,523 UART: RITY.KEYID = 7
43,442,373 UART: [art] Erasing AUTHORITY.KEYID = 7
43,443,880 UART: [art] PUB.X = F031E209D4FF0AE65D1ED1161581EF12A2170EDAB9CC3DD748B501763ED278D5382BA8BD20E3FD717E91A8142FB9B468
43,451,154 UART: [art] PUB.Y = 3FA3EC79597C04FBE386DF4DCB7507106F6FB8646B9D075124F12A688297E7F12D51BF7D110766540EBB6D6076E4B612
43,458,404 UART: [art] SIG.R = C57F168EA3F6DC1DF925430316AA50280A5A55CD91F3A3E8C50691F3F94DACF7FC97EFA147CBE4A078E57013A15BE13A
43,465,814 UART: [art] SIG.S = D30716544D828B776E381C1AD31DC23FBD855113AEBBCC897103DE8EC06BFECA48627467CFDDDBCCB52EA516BF4CF10D
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
44:03:41:9a:7d:94:d8:38:31:61:bc:ce:1b:9f:5f:35:5a:97:33:d5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C003419A7D94D8383161BCCE1B9F5F355A9733D5CFFA2F91334B51731571923F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f0:31:e2:09:d4:ff:0a:e6:5d:1e:d1:16:15:81:
ef:12:a2:17:0e:da:b9:cc:3d:d7:48:b5:01:76:3e:
d2:78:d5:38:2b:a8:bd:20:e3:fd:71:7e:91:a8:14:
2f:b9:b4:68:3f:a3:ec:79:59:7c:04:fb:e3:86:df:
4d:cb:75:07:10:6f:6f:b8:64:6b:9d:07:51:24:f1:
2a:68:82:97:e7:f1:2d:51:bf:7d:11:07:66:54:0e:
bb:6d:60:76:e4:b6:12
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
C0:03:41:9A:7D:94:D8:38:31:61:BC:CE:1B:9F:5F:35:5A:97:33:D5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:c5:7f:16:8e:a3:f6:dc:1d:f9:25:43:03:16:
aa:50:28:0a:5a:55:cd:91:f3:a3:e8:c5:06:91:f3:f9:4d:ac:
f7:fc:97:ef:a1:47:cb:e4:a0:78:e5:70:13:a1:5b:e1:3a:02:
31:00:d3:07:16:54:4d:82:8b:77:6e:38:1c:1a:d3:1d:c2:3f:
bd:85:51:13:ae:bb:cc:89:71:03:de:8e:c0:6b:fe:ca:48:62:
74:67:cf:dd:db:cc:b5:2e:a5:16:bf:4c:f1:0d
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.38s
Truncated 523 bytes from beginning
ting to cptra_bootfsm_go
3,376,427 ready_for_fw is high
3,377,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,064,245 >>> mbox cmd response: success
19,357,862 UART:
19,358,265 UART: Running Caliptra FMC ...
19,359,480 UART:
19,359,671 UART: [state] CFI Enabled
19,422,940 UART: [fht] FMC Alias Private Key: 7
21,186,796 UART: [art] Extend RT PCRs Done
21,188,018 UART: [art] Lock RT PCRs Done
21,189,548 UART: [art] Populate DV Done
21,194,850 UART: [fht] FMC Alias Private Key: 7
21,196,387 UART: [art] Derive CDI
21,197,198 UART: [art] Store in in slot 0x4
21,255,840 UART: [art] Derive Key Pair
21,256,875 UART: [art] Store priv key in slot 0x5
23,719,928 UART: [art] Derive Key Pair - Done
23,732,718 UART: [art] Signing Cert with AUTHO
23,734,017 UART: RITY.KEYID = 7
25,445,477 UART: [art] Erasing AUTHORITY.KEYID = 7
25,447,012 UART: [art] PUB.X = 2F5FE08EAC4D44BC39455E100970F81990E67A7AC0324BB1699CEC7AEDA80A61FFA536BB62041F2E6DC2949398E4D532
25,454,270 UART: [art] PUB.Y = 5C835E46CAF76E5F1D70A03ABE7BD4717BA33CF160B5C39B825E551973C56DDEB5EB700FD7EE5026722C51EC67C7F080
25,461,570 UART: [art] SIG.R = 03689BDE6F99CC95D048E6C5747632890E211782B75087930AF58D1BB16D4A08BC08A89BAAE550EC615D234AF3C70226
25,468,973 UART: [art] SIG.S = 093D1E5081972DE1AD89B98704F88E9D29E6629514B5C8C379E5832E6AE5649DFF1498C77C264A3A19E8A84C72AD6C7D
26,447,584 UART: Caliptra RT
26,448,275 UART: [state] CFI Enabled
26,613,577 UART: [rt] RT listening for mailbox commands...
26,644,939 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,090,357 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,525,232 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:d7:42:b9:fa:ff:7c:9c:a1:33:ab:b9:29:ad:9c:1b:63:f9:f7:64
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=74D742B9FAFF7C9CA133ABB929AD9C1B63F9F76414C8C50671A095291630699E
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2f:5f:e0:8e:ac:4d:44:bc:39:45:5e:10:09:70:
f8:19:90:e6:7a:7a:c0:32:4b:b1:69:9c:ec:7a:ed:
a8:0a:61:ff:a5:36:bb:62:04:1f:2e:6d:c2:94:93:
98:e4:d5:32:5c:83:5e:46:ca:f7:6e:5f:1d:70:a0:
3a:be:7b:d4:71:7b:a3:3c:f1:60:b5:c3:9b:82:5e:
55:19:73:c5:6d:de:b5:eb:70:0f:d7:ee:50:26:72:
2c:51:ec:67:c7:f0:80
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
74:D7:42:B9:FA:FF:7C:9C:A1:33:AB:B9:29:AD:9C:1B:63:F9:F7:64
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:03:68:9b:de:6f:99:cc:95:d0:48:e6:c5:74:76:
32:89:0e:21:17:82:b7:50:87:93:0a:f5:8d:1b:b1:6d:4a:08:
bc:08:a8:9b:aa:e5:50:ec:61:5d:23:4a:f3:c7:02:26:02:30:
09:3d:1e:50:81:97:2d:e1:ad:89:b9:87:04:f8:8e:9d:29:e6:
62:95:14:b5:c8:c3:79:e5:83:2e:6a:e5:64:9d:ff:14:98:c7:
7c:26:4a:3a:19:e8:a8:4c:72:ad:6c:7d
29,987,194 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
38,092,808 >>> mbox cmd response: success
38,129,543 UART:
38,129,907 UART: Running Caliptra FMC ...
38,131,052 UART:
38,131,210 UART: [state] CFI Enabled
38,230,884 UART: [art] Extend RT PCRs Done
38,232,077 UART: [art] Lock RT PCRs Done
38,233,457 UART: [art] Populate DV Done
38,239,001 UART: [fht] FMC Alias Private Key: 7
38,240,761 UART: [art] Derive CDI
38,241,493 UART: [art] Store in in slot 0x4
38,300,184 UART: [art] Derive Key Pair
38,301,223 UART: [art] Store priv key in slot 0x5
40,764,137 UART: [art] Derive Key Pair - Done
40,776,931 UART: [art] Signing Cert with AUTHO
40,778,234 UART: RITY.KEYID = 7
42,490,737 UART: [art] Erasing AUTHORITY.KEYID = 7
42,492,250 UART: [art] PUB.X = C24439F24C0EA851151EA40D189D4713F45538A3A9FA500AA118009704E46DF2C8EBC9AF3A479ED80D198D5A8157FC68
42,499,528 UART: [art] PUB.Y = 5878B97ED3C3C46E2679E5C6C364406FA22948B80CBA6EB26742BF23CFE0478362AAF0B950B6099D8F599C7F5BECAB5D
42,506,778 UART: [art] SIG.R = FB1A61831B811D8C089CA1E2FEB8C97AC0C175618F15663EA4BBBEA3F6E22568FACF86616610256A3FCE757504DA66C5
42,514,128 UART: [art] SIG.S = 0A6247A9E076F7BBDCDC68D73308D288873C9CFC10B3FC593E5895D1D680D32FE4878E63F4C9583B478A8A94C53D8149
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6d:7f:02:22:6e:a2:e6:ef:67:42:3f:31:5a:6f:00:21:03:88:16:f3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=697F02226EA2E6EF67423F315A6F0021038816F3056F8B5368164F9F8926129A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c2:44:39:f2:4c:0e:a8:51:15:1e:a4:0d:18:9d:
47:13:f4:55:38:a3:a9:fa:50:0a:a1:18:00:97:04:
e4:6d:f2:c8:eb:c9:af:3a:47:9e:d8:0d:19:8d:5a:
81:57:fc:68:58:78:b9:7e:d3:c3:c4:6e:26:79:e5:
c6:c3:64:40:6f:a2:29:48:b8:0c:ba:6e:b2:67:42:
bf:23:cf:e0:47:83:62:aa:f0:b9:50:b6:09:9d:8f:
59:9c:7f:5b:ec:ab:5d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
69:7F:02:22:6E:A2:E6:EF:67:42:3F:31:5A:6F:00:21:03:88:16:F3
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:fb:1a:61:83:1b:81:1d:8c:08:9c:a1:e2:fe:
b8:c9:7a:c0:c1:75:61:8f:15:66:3e:a4:bb:be:a3:f6:e2:25:
68:fa:cf:86:61:66:10:25:6a:3f:ce:75:75:04:da:66:c5:02:
30:0a:62:47:a9:e0:76:f7:bb:dc:dc:68:d7:33:08:d2:88:87:
3c:9c:fc:10:b3:fc:59:3e:58:95:d1:d6:80:d3:2f:e4:87:8e:
63:f4:c9:58:3b:47:8a:8a:94:c5:3d:81:49
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
Truncated 4973 bytes from beginning
602FD1C759EF1F552DAB71ACD0AC23B1C49D8144B3635A9AC697FECE13F5A4369FB93E40C17AD8AA534D9BD83D819D6B
26,034,077 UART: [art] SIG.S = 2D8C7A4FF5EC1650D2AFEBD433B6561DE6C0A0684CAEF198A8140640F7A71A523B1F75631E0BB6FB2B3A465AD99EA421
27,013,266 UART: Caliptra RT
27,013,988 UART: [state] CFI Enabled
27,131,040 UART: [rt] RT listening for mailbox commands...
27,284,832 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,729,385 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,163,734 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
46:a7:bf:b1:fc:ef:dc:2a:46:67:27:58:6f:ef:03:34:cc:2b:9d:a4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=42A7BFB1FCEFDC2A466727586FEF0334CC2B9DA4E65AF09F7000CA0CF93B5F08
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:07:86:05:9c:14:31:d0:ed:e4:83:e1:81:d9:11:
96:2b:35:3b:6f:85:08:1d:64:be:19:da:ca:ff:11:
c9:9c:4f:27:cd:06:af:13:77:87:92:f2:f4:3a:35:
90:9d:cc:92:6a:d3:0c:48:fe:18:f7:f8:a8:ed:e8:
82:79:ee:ba:14:57:80:a8:39:2b:72:e4:2a:40:b8:
34:06:e4:0d:c2:2c:e9:9d:a3:63:bd:f1:08:83:f2:
91:fd:e1:3e:04:9b:86
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
42:A7:BF:B1:FC:EF:DC:2A:46:67:27:58:6F:EF:03:34:CC:2B:9D:A4
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:60:2f:d1:c7:59:ef:1f:55:2d:ab:71:ac:d0:ac:
23:b1:c4:9d:81:44:b3:63:5a:9a:c6:97:fe:ce:13:f5:a4:36:
9f:b9:3e:40:c1:7a:d8:aa:53:4d:9b:d8:3d:81:9d:6b:02:30:
2d:8c:7a:4f:f5:ec:16:50:d2:af:eb:d4:33:b6:56:1d:e6:c0:
a0:68:4c:ae:f1:98:a8:14:06:40:f7:a7:1a:52:3b:1f:75:63:
1e:0b:b6:fb:2b:3a:46:5a:d9:9e:a4:21
30,623,581 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
30,766,595 UART:
30,767,014 UART: Running Caliptra ROM ...
30,768,068 UART:
30,768,229 UART: [state] CFI Enabled
30,780,937 UART: [state] LifecycleState = Production
30,782,678 UART: [state] DebugLocked = Yes
30,785,392 UART: [state] Starting the WD Timer 40000000 cycles
30,789,851 UART: [kat] SHA2-256
30,969,063 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
30,980,623 UART: [kat] ++
30,981,167 UART: [kat] sha1
30,993,298 UART: [kat] SHA2-256
30,996,304 UART: [kat] SHA2-384
31,002,661 UART: [kat] SHA2-512-ACC
31,005,611 UART: [kat] ECC-384
33,448,983 UART: [kat] HMAC-384Kdf
33,461,287 UART: [kat] LMS
33,990,803 UART: [kat] --
33,996,041 UART: [update-reset] ++
38,594,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,598,357 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
38,974,471 >>> mbox cmd response: success
38,975,992 UART: [update-reset] Copying MAN_2 To MAN_1
38,998,338 UART: [update-reset Success] --
39,000,572 UART: [state] Locking Datavault
39,002,862 UART: [state] Locking PCR0, PCR1 and PCR31
39,004,566 UART: [state] Locking ICCM
39,006,561 UART: [exit] Launching FMC @ 0x40000130
39,015,015 UART:
39,015,266 UART: Running Caliptra FMC ...
39,016,372 UART:
39,016,535 UART: [state] CFI Enabled
39,060,777 UART: [art] Extend RT PCRs Done
39,061,981 UART: [art] Lock RT PCRs Done
39,063,386 UART: [art] Populate DV Done
39,068,848 UART: [fht] FMC Alias Private Key: 7
39,070,491 UART: [art] Derive CDI
39,071,307 UART: [art] Store in in slot 0x4
39,114,172 UART: [art] Derive Key Pair
39,115,211 UART: [art] Store priv key in slot 0x5
41,542,687 UART: [art] Derive Key Pair - Done
41,555,748 UART: [art] Signing Cert with AUTHO
41,557,055 UART: RITY.KEYID = 7
43,262,470 UART: [art] Erasing AUTHORITY.KEYID = 7
43,263,990 UART: [art] PUB.X = FB41CF9BBCA92F94F8F4B4153078BBB1CF4E6FFE2DCA9D4F291E09A27F041843A78B7D93BCCE40E4ED2F8E1D134F7A03
43,271,305 UART: [art] PUB.Y = 6F8813E8B105AEBC187B43FBED5524C863FA05E8329F8D4BF8F9492E6FECEB9AE4FF38B1FA6CC8C1CA0845777BFB9555
43,278,589 UART: [art] SIG.R = 10EE5B111E6A50D1A25F4B92204A259BDF873716FAD8692FB016A3172C26AAE1F004DF3416D70B2EEB8A200AD80AC5C1
43,285,993 UART: [art] SIG.S = 978A20EAF1ED0D904887FC115AD143D1B6829C4AF05BF824475EA90756F623D2AC2A48B87731E607D240B82078993AB8
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
35:a9:1b:d1:30:73:8e:71:63:74:6d:a0:5f:fe:c9:d3:bc:3b:0d:4a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=31A91BD130738E7163746DA05FFEC9D3BC3B0D4A276781851BC9E1FE696D5516
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fb:41:cf:9b:bc:a9:2f:94:f8:f4:b4:15:30:78:
bb:b1:cf:4e:6f:fe:2d:ca:9d:4f:29:1e:09:a2:7f:
04:18:43:a7:8b:7d:93:bc:ce:40:e4:ed:2f:8e:1d:
13:4f:7a:03:6f:88:13:e8:b1:05:ae:bc:18:7b:43:
fb:ed:55:24:c8:63:fa:05:e8:32:9f:8d:4b:f8:f9:
49:2e:6f:ec:eb:9a:e4:ff:38:b1:fa:6c:c8:c1:ca:
08:45:77:7b:fb:95:55
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
31:A9:1B:D1:30:73:8E:71:63:74:6D:A0:5F:FE:C9:D3:BC:3B:0D:4A
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:10:ee:5b:11:1e:6a:50:d1:a2:5f:4b:92:20:4a:
25:9b:df:87:37:16:fa:d8:69:2f:b0:16:a3:17:2c:26:aa:e1:
f0:04:df:34:16:d7:0b:2e:eb:8a:20:0a:d8:0a:c5:c1:02:31:
00:97:8a:20:ea:f1:ed:0d:90:48:87:fc:11:5a:d1:43:d1:b6:
82:9c:4a:f0:5b:f8:24:47:5e:a9:07:56:f6:23:d2:ac:2a:48:
b8:77:31:e6:07:d2:40:b8:20:78:99:3a:b8
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.36s
Truncated 523 bytes from beginning
ting to cptra_bootfsm_go
3,696,983 ready_for_fw is high
3,697,600 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,285,805 >>> mbox cmd response: success
19,530,783 UART:
19,531,185 UART: Running Caliptra FMC ...
19,532,345 UART:
19,532,509 UART: [state] CFI Enabled
19,540,580 UART: [fht] FMC Alias Private Key: 7
21,297,317 UART: [art] Extend RT PCRs Done
21,298,541 UART: [art] Lock RT PCRs Done
21,300,188 UART: [art] Populate DV Done
21,305,659 UART: [fht] FMC Alias Private Key: 7
21,307,307 UART: [art] Derive CDI
21,308,042 UART: [art] Store in in slot 0x4
21,350,161 UART: [art] Derive Key Pair
21,351,205 UART: [art] Store priv key in slot 0x5
23,777,371 UART: [art] Derive Key Pair - Done
23,790,395 UART: [art] Signing Cert with AUTHO
23,791,699 UART: RITY.KEYID = 7
25,497,110 UART: [art] Erasing AUTHORITY.KEYID = 7
25,498,621 UART: [art] PUB.X = CF62ECEF94665C6941DB590D9DC5D9D11BF69FF695ED361DF5F6A23B8179DC82389299500866B9AA6594D29D7C0081B7
25,505,828 UART: [art] PUB.Y = 0E7E7D94516A8B42E4EA33FDEBFF41E5E62DADA983705A5841348BDABA90D2A7513C532E9CF21B353AC2B84C249DFE0D
25,513,150 UART: [art] SIG.R = D136E05AB7C2F0CD693A28916D77648D66EAEBECC3AA14458A59964C73D708F6FBA59E4CE75FF8BFEB98F97D196FF80D
25,520,571 UART: [art] SIG.S = 57DB49CD87227B1A745EBB7A6D3455182192529CAF25B20089F1BBF32EEBEA47FC931DF9B772F88DB1AC408628BC55AD
26,499,286 UART: Caliptra RT
26,500,004 UART: [state] CFI Enabled
26,616,289 UART: [rt] RT listening for mailbox commands...
26,647,598 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,091,333 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
27,526,442 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:90:65:c8:39:70:a0:60:a9:d6:cf:97:43:a9:0e:2d:39:7e:b2:ce
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BF9065C83970A060A9D6CF9743A90E2D397EB2CEE4CE353016D5C4C985A34853
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cf:62:ec:ef:94:66:5c:69:41:db:59:0d:9d:c5:
d9:d1:1b:f6:9f:f6:95:ed:36:1d:f5:f6:a2:3b:81:
79:dc:82:38:92:99:50:08:66:b9:aa:65:94:d2:9d:
7c:00:81:b7:0e:7e:7d:94:51:6a:8b:42:e4:ea:33:
fd:eb:ff:41:e5:e6:2d:ad:a9:83:70:5a:58:41:34:
8b:da:ba:90:d2:a7:51:3c:53:2e:9c:f2:1b:35:3a:
c2:b8:4c:24:9d:fe:0d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
BF:90:65:C8:39:70:A0:60:A9:D6:CF:97:43:A9:0E:2D:39:7E:B2:CE
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d1:36:e0:5a:b7:c2:f0:cd:69:3a:28:91:6d:
77:64:8d:66:ea:eb:ec:c3:aa:14:45:8a:59:96:4c:73:d7:08:
f6:fb:a5:9e:4c:e7:5f:f8:bf:eb:98:f9:7d:19:6f:f8:0d:02:
30:57:db:49:cd:87:22:7b:1a:74:5e:bb:7a:6d:34:55:18:21:
92:52:9c:af:25:b2:00:89:f1:bb:f3:2e:eb:ea:47:fc:93:1d:
f9:b7:72:f8:8d:b1:ac:40:86:28:bc:55:ad
29,984,280 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
38,018,531 >>> mbox cmd response: success
38,053,661 UART:
38,054,025 UART: Running Caliptra FMC ...
38,055,244 UART:
38,055,422 UART: [state] CFI Enabled
38,099,341 UART: [art] Extend RT PCRs Done
38,100,492 UART: [art] Lock RT PCRs Done
38,101,944 UART: [art] Populate DV Done
38,107,355 UART: [fht] FMC Alias Private Key: 7
38,108,946 UART: [art] Derive CDI
38,109,758 UART: [art] Store in in slot 0x4
38,152,440 UART: [art] Derive Key Pair
38,153,489 UART: [art] Store priv key in slot 0x5
40,580,103 UART: [art] Derive Key Pair - Done
40,593,116 UART: [art] Signing Cert with AUTHO
40,594,428 UART: RITY.KEYID = 7
42,299,834 UART: [art] Erasing AUTHORITY.KEYID = 7
42,301,346 UART: [art] PUB.X = 7A2C72E74A10E1B96B6F66E82EF27FEFB31647E3AA2D031DB726137EB17C6936ED80FABA91829534791F99003EF94D1C
42,308,554 UART: [art] PUB.Y = 9E6B63FE437C9428584C91C1DDD92F92FF378CE22BF5AAD61620A47626F8B48790FB3A4505B7A57898329C637FB9172F
42,315,802 UART: [art] SIG.R = 38D3A6FE2FB65F4091793D610EB5AD907D965BD0C283B52FA439CB9C66AC36DBA21006844B33DD1C3586AD3916B5F04F
42,323,209 UART: [art] SIG.S = 2FC0C4AFBEFF6558702813AD76428D9BD8C7158DD102E04C5C65D4EED63A3FBDCC0DE7B7D85805C9E214F3FD33E05E40
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6d:a7:eb:90:a0:57:74:40:a1:0f:be:69:0a:5c:e8:80:6e:49:a9:d0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=69A7EB90A0577440A10FBE690A5CE8806E49A9D0A0012B0BB82B414A83D2C06A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:7a:2c:72:e7:4a:10:e1:b9:6b:6f:66:e8:2e:f2:
7f:ef:b3:16:47:e3:aa:2d:03:1d:b7:26:13:7e:b1:
7c:69:36:ed:80:fa:ba:91:82:95:34:79:1f:99:00:
3e:f9:4d:1c:9e:6b:63:fe:43:7c:94:28:58:4c:91:
c1:dd:d9:2f:92:ff:37:8c:e2:2b:f5:aa:d6:16:20:
a4:76:26:f8:b4:87:90:fb:3a:45:05:b7:a5:78:98:
32:9c:63:7f:b9:17:2f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
69:A7:EB:90:A0:57:74:40:A1:0F:BE:69:0A:5C:E8:80:6E:49:A9:D0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:38:d3:a6:fe:2f:b6:5f:40:91:79:3d:61:0e:b5:
ad:90:7d:96:5b:d0:c2:83:b5:2f:a4:39:cb:9c:66:ac:36:db:
a2:10:06:84:4b:33:dd:1c:35:86:ad:39:16:b5:f0:4f:02:30:
2f:c0:c4:af:be:ff:65:58:70:28:13:ad:76:42:8d:9b:d8:c7:
15:8d:d1:02:e0:4c:5c:65:d4:ee:d6:3a:3f:bd:cc:0d:e7:b7:
d8:58:05:c9:e2:14:f3:fd:33:e0:5e:40
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
Truncated 4976 bytes from beginning
53F4E76E22D51B322199DD528C786F603FF1872AC1F59A8713CC7EE904C67317FD363693580CE00E2874C322E85601
26,313,598 UART: [art] SIG.S = 9F84BC96461B61D27F6EB0B414999C25DB38D347A315161A44D51F3F9237AAAF8EC552C9CB86327790F2EC6DC10F300F
27,292,054 UART: Caliptra RT
27,292,798 UART: [state] CFI Enabled
27,458,119 UART: [rt] RT listening for mailbox commands...
27,610,723 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,055,472 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,491,721 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:d6:90:e1:bd:68:09:c3:b3:86:b9:46:12:78:09:95:e2:df:86:c4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1FD690E1BD6809C3B386B94612780995E2DF86C42B313B09F944686A324AE757
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:62:c2:ab:ec:f3:f1:ec:68:90:ec:6e:cb:59:fb:
5a:84:03:d1:4e:c7:65:0a:c5:37:a4:34:f0:7f:57:
a1:33:a2:e4:1a:85:13:f9:66:56:3d:79:fe:8e:ae:
cb:e6:d8:ff:6e:82:68:eb:68:c4:10:57:a2:af:94:
10:2e:ee:93:e0:ec:09:88:b8:c6:0d:df:a5:1c:97:
36:3b:36:da:ec:45:f1:ad:27:7e:00:e1:0d:a1:71:
0c:46:3e:cc:ad:a8:49
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
1F:D6:90:E1:BD:68:09:C3:B3:86:B9:46:12:78:09:95:E2:DF:86:C4
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:2f:53:f4:e7:6e:22:d5:1b:32:21:99:dd:52:8c:
78:6f:60:3f:f1:87:2a:c1:f5:9a:87:13:cc:7e:e9:04:c6:73:
17:fd:36:36:93:58:0c:e0:0e:28:74:c3:22:e8:56:01:02:31:
00:9f:84:bc:96:46:1b:61:d2:7f:6e:b0:b4:14:99:9c:25:db:
38:d3:47:a3:15:16:1a:44:d5:1f:3f:92:37:aa:af:8e:c5:52:
c9:cb:86:32:77:90:f2:ec:6d:c1:0f:30:0f
30,951,093 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
31,094,246 UART:
31,094,664 UART: Running Caliptra ROM ...
31,095,806 UART:
31,095,977 UART: [state] CFI Enabled
31,155,256 UART: [state] LifecycleState = Production
31,157,187 UART: [state] DebugLocked = Yes
31,159,637 UART: [state] Starting the WD Timer 40000000 cycles
31,165,279 UART: [kat] SHA2-256
31,355,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,365,879 UART: [kat] ++
31,366,480 UART: [kat] sha1
31,378,092 UART: [kat] SHA2-256
31,381,109 UART: [kat] SHA2-384
31,387,073 UART: [kat] SHA2-512-ACC
31,389,648 UART: [kat] ECC-384
33,836,824 UART: [kat] HMAC-384Kdf
33,861,580 UART: [kat] LMS
34,393,160 UART: [kat] --
34,397,575 UART: [update-reset] ++
39,026,596 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,029,135 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
39,624,977 >>> mbox cmd response: success
39,626,336 UART: [update-reset] Copying MAN_2 To MAN_1
39,663,922 UART: [update-reset Success] --
39,669,340 UART: [state] Locking Datavault
39,673,087 UART: [state] Locking PCR0, PCR1 and PCR31
39,675,233 UART: [state] Locking ICCM
39,676,662 UART: [exit] Launching FMC @ 0x40000130
39,685,333 UART:
39,685,582 UART: Running Caliptra FMC ...
39,686,605 UART:
39,686,752 UART: [state] CFI Enabled
39,780,246 UART: [art] Extend RT PCRs Done
39,781,450 UART: [art] Lock RT PCRs Done
39,782,771 UART: [art] Populate DV Done
39,788,396 UART: [fht] FMC Alias Private Key: 7
39,789,929 UART: [art] Derive CDI
39,790,658 UART: [art] Store in in slot 0x4
39,849,550 UART: [art] Derive Key Pair
39,850,544 UART: [art] Store priv key in slot 0x5
42,313,228 UART: [art] Derive Key Pair - Done
42,326,256 UART: [art] Signing Cert with AUTHO
42,327,549 UART: RITY.KEYID = 7
44,039,066 UART: [art] Erasing AUTHORITY.KEYID = 7
44,040,575 UART: [art] PUB.X = 436BD22F6BB495CF1E2D07F1FA42CD4E1E21D24EB81EB1285EB8ED5D5C98434085DF01FBA572B462165873A605C2B894
44,047,901 UART: [art] PUB.Y = 507F0592F71516ED28E80D14DC8FBA409C0887C718DC06558A1472CBC1EB4657278F43E024A10A520646402FA0F68FA4
44,055,085 UART: [art] SIG.R = 1DA786EBD1AE5F059AC6E8AA619336F49EB25F4A050030C438C3F456BFD4C9D6016ABB38F11EAA355456032C790B9518
44,062,480 UART: [art] SIG.S = 977270ABC65C5D424FB7087CB6D046CD0F6B8F30BC212D795EFD5DB62670E9106494E32955C7C68C60856D365B1F6A2C
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3d:12:49:97:ce:7b:3b:d4:d7:21:fc:69:e4:86:19:d3:49:24:22:cd
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B9124997CE7B3BD4D721FC69E48619D3492422CDE3CA204BE3D50CBF9D88C847
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:43:6b:d2:2f:6b:b4:95:cf:1e:2d:07:f1:fa:42:
cd:4e:1e:21:d2:4e:b8:1e:b1:28:5e:b8:ed:5d:5c:
98:43:40:85:df:01:fb:a5:72:b4:62:16:58:73:a6:
05:c2:b8:94:50:7f:05:92:f7:15:16:ed:28:e8:0d:
14:dc:8f:ba:40:9c:08:87:c7:18:dc:06:55:8a:14:
72:cb:c1:eb:46:57:27:8f:43:e0:24:a1:0a:52:06:
46:40:2f:a0:f6:8f:a4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
B9:12:49:97:CE:7B:3B:D4:D7:21:FC:69:E4:86:19:D3:49:24:22:CD
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:1d:a7:86:eb:d1:ae:5f:05:9a:c6:e8:aa:61:93:
36:f4:9e:b2:5f:4a:05:00:30:c4:38:c3:f4:56:bf:d4:c9:d6:
01:6a:bb:38:f1:1e:aa:35:54:56:03:2c:79:0b:95:18:02:31:
00:97:72:70:ab:c6:5c:5d:42:4f:b7:08:7c:b6:d0:46:cd:0f:
6b:8f:30:bc:21:2d:79:5e:fd:5d:b6:26:70:e9:10:64:94:e3:
29:55:c7:c6:8c:60:85:6d:36:5b:1f:6a:2c
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.40s
Truncated 520 bytes from beginning
writing to cptra_bootfsm_go
3,439,492 ready_for_fw is high
3,439,943 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,909,765 >>> mbox cmd response: success
20,206,327 UART:
20,206,727 UART: Running Caliptra FMC ...
20,207,891 UART:
20,208,053 UART: [state] CFI Enabled
20,270,763 UART: [fht] FMC Alias Private Key: 7
22,033,918 UART: [art] Extend RT PCRs Done
22,035,139 UART: [art] Lock RT PCRs Done
22,037,011 UART: [art] Populate DV Done
22,042,475 UART: [fht] FMC Alias Private Key: 7
22,043,929 UART: [art] Derive CDI
22,044,858 UART: [art] Store in in slot 0x4
22,103,179 UART: [art] Derive Key Pair
22,104,174 UART: [art] Store priv key in slot 0x5
24,567,345 UART: [art] Derive Key Pair - Done
24,580,343 UART: [art] Signing Cert with AUTHO
24,581,647 UART: RITY.KEYID = 7
26,292,468 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,976 UART: [art] PUB.X = 56A293C80CE340801976D21F7364FA19256DFFE49720C8096CC3AC1897FD6ADDE36D025346B0A03D3F8B375DFF84BE72
26,301,228 UART: [art] PUB.Y = D5C2E93E2CA4D704E0BDBDCA2EEF43169561648223FFEF75B18DE084B35B9F9B621B854B8A40E5E7CB2457E40D2786A5
26,308,541 UART: [art] SIG.R = 6D1587F0896E606CABE01ECEDE084D59DB91032D2B756766BA969D6E418B0A36306A31B022EC7A56934CBB114F4F2F90
26,315,932 UART: [art] SIG.S = 42A951B35A888C0ED897308731A5C6A8E16120A39E25977748CFC6EB1379189360264F5347DDAA8DB6092CB0C7B90991
27,295,330 UART: Caliptra RT
27,296,048 UART: [state] CFI Enabled
27,461,701 UART: [rt] RT listening for mailbox commands...
27,493,354 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,938,811 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,378,367 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:c3:31:fb:c8:ec:80:14:62:b0:3e:b2:ba:9e:c5:28:88:fc:7f:e4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=74C331FBC8EC801462B03EB2BA9EC52888FC7FE43A3099AC0C14E4FBB2D00ADB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:56:a2:93:c8:0c:e3:40:80:19:76:d2:1f:73:64:
fa:19:25:6d:ff:e4:97:20:c8:09:6c:c3:ac:18:97:
fd:6a:dd:e3:6d:02:53:46:b0:a0:3d:3f:8b:37:5d:
ff:84:be:72:d5:c2:e9:3e:2c:a4:d7:04:e0:bd:bd:
ca:2e:ef:43:16:95:61:64:82:23:ff:ef:75:b1:8d:
e0:84:b3:5b:9f:9b:62:1b:85:4b:8a:40:e5:e7:cb:
24:57:e4:0d:27:86:a5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
74:C3:31:FB:C8:EC:80:14:62:B0:3E:B2:BA:9E:C5:28:88:FC:7F:E4
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:6d:15:87:f0:89:6e:60:6c:ab:e0:1e:ce:de:08:
4d:59:db:91:03:2d:2b:75:67:66:ba:96:9d:6e:41:8b:0a:36:
30:6a:31:b0:22:ec:7a:56:93:4c:bb:11:4f:4f:2f:90:02:30:
42:a9:51:b3:5a:88:8c:0e:d8:97:30:87:31:a5:c6:a8:e1:61:
20:a3:9e:25:97:77:48:cf:c6:eb:13:79:18:93:60:26:4f:53:
47:dd:aa:8d:b6:09:2c:b0:c7:b9:09:91
30,837,194 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
39,758,769 >>> mbox cmd response: success
39,795,125 UART:
39,795,452 UART: Running Caliptra FMC ...
39,796,662 UART:
39,796,826 UART: [state] CFI Enabled
39,890,576 UART: [art] Extend RT PCRs Done
39,891,790 UART: [art] Lock RT PCRs Done
39,893,254 UART: [art] Populate DV Done
39,898,876 UART: [fht] FMC Alias Private Key: 7
39,900,514 UART: [art] Derive CDI
39,901,321 UART: [art] Store in in slot 0x4
39,959,998 UART: [art] Derive Key Pair
39,961,028 UART: [art] Store priv key in slot 0x5
42,424,131 UART: [art] Derive Key Pair - Done
42,437,355 UART: [art] Signing Cert with AUTHO
42,438,875 UART: RITY.KEYID = 7
44,148,724 UART: [art] Erasing AUTHORITY.KEYID = 7
44,150,244 UART: [art] PUB.X = FB4D0D4911F43AE40445330D850656C7AB2DEF57407D179FE70791BC67F9EC37A17C6B07B5418CAC056E106382A170B7
44,157,499 UART: [art] PUB.Y = 3F45464A191F622083A33D061E2394BAA119366D4B1E0A42545ED7E8BCBE8F1C89BBC99BFAD24E8E58B0905FF5F9FB58
44,164,780 UART: [art] SIG.R = 125244E9DF1DC657701DBA9280300359F7E211887929F8C29E246FA890E94B14EF7F891B44C8462E0BD55355D6B71595
44,172,119 UART: [art] SIG.S = 6C6C8910582ED7B1F7A40FA5290682EA9FF0E0CFB1BAD905580A2C7407E2A64EBA5F2266C09B53FD335C6AD29674D977
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:d4:4c:a7:43:56:7a:74:38:ac:6e:c2:39:12:ca:91:aa:a5:a7:b9
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A8D44CA743567A7438AC6EC23912CA91AAA5A7B93280ECBEFECC95999B181BDA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fb:4d:0d:49:11:f4:3a:e4:04:45:33:0d:85:06:
56:c7:ab:2d:ef:57:40:7d:17:9f:e7:07:91:bc:67:
f9:ec:37:a1:7c:6b:07:b5:41:8c:ac:05:6e:10:63:
82:a1:70:b7:3f:45:46:4a:19:1f:62:20:83:a3:3d:
06:1e:23:94:ba:a1:19:36:6d:4b:1e:0a:42:54:5e:
d7:e8:bc:be:8f:1c:89:bb:c9:9b:fa:d2:4e:8e:58:
b0:90:5f:f5:f9:fb:58
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
A8:D4:4C:A7:43:56:7A:74:38:AC:6E:C2:39:12:CA:91:AA:A5:A7:B9
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:12:52:44:e9:df:1d:c6:57:70:1d:ba:92:80:30:
03:59:f7:e2:11:88:79:29:f8:c2:9e:24:6f:a8:90:e9:4b:14:
ef:7f:89:1b:44:c8:46:2e:0b:d5:53:55:d6:b7:15:95:02:30:
6c:6c:89:10:58:2e:d7:b1:f7:a4:0f:a5:29:06:82:ea:9f:f0:
e0:cf:b1:ba:d9:05:58:0a:2c:74:07:e2:a6:4e:ba:5f:22:66:
c0:9b:53:fd:33:5c:6a:d2:96:74:d9:77
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.41s
Truncated 4979 bytes from beginning
7FAC420A0A2C7E26BAC79CF1757057D32A460D01B1F887D11D763D211821D2A49E7402D72B1058E7C20D0D52F0D
26,392,111 UART: [art] SIG.S = A96E49CEE9C4E2BEF07E00EDD1995CCE0F71637B7C7B1857C2195FCA97110EBC6EF5C7DFDC61CDF147761132B76F1D29
27,371,075 UART: Caliptra RT
27,371,823 UART: [state] CFI Enabled
27,489,292 UART: [rt] RT listening for mailbox commands...
27,640,536 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,086,011 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,520,452 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:07:06:83:ab:b6:2b:73:a3:82:81:ef:41:88:20:58:9d:2e:5f:e4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=19070683ABB62B73A38281EF418820589D2E5FE4B685CEA5293BDD6D1CB392AD
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a0:a1:9a:65:67:6c:88:f6:bd:32:24:96:64:4c:
c2:96:24:85:f1:dc:0d:b9:1e:33:24:e3:8b:90:5a:
2f:56:a7:ad:95:24:65:40:dc:56:12:7c:10:b5:43:
3e:74:9d:09:12:0d:b8:cf:be:68:dc:a9:68:05:89:
1f:7f:68:bb:e3:a5:a3:eb:bb:39:9b:15:93:35:8a:
aa:0d:7e:a5:15:96:2d:5f:41:d6:8f:04:bc:85:12:
52:1b:db:66:d2:fd:83
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
19:07:06:83:AB:B6:2B:73:A3:82:81:EF:41:88:20:58:9D:2E:5F:E4
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:45:6a:47:fa:c4:20:a0:a2:c7:e2:6b:ac:79:cf:
17:57:05:7d:32:a4:60:d0:1b:1f:88:7d:11:d7:63:d2:11:82:
1d:2a:49:e7:40:2d:72:b1:05:8e:7c:20:d0:d5:2f:0d:02:31:
00:a9:6e:49:ce:e9:c4:e2:be:f0:7e:00:ed:d1:99:5c:ce:0f:
71:63:7b:7c:7b:18:57:c2:19:5f:ca:97:11:0e:bc:6e:f5:c7:
df:dc:61:cd:f1:47:76:11:32:b7:6f:1d:29
30,982,207 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
31,125,064 UART:
31,125,464 UART: Running Caliptra ROM ...
31,126,512 UART:
31,126,666 UART: [state] CFI Enabled
31,138,842 UART: [state] LifecycleState = Production
31,140,627 UART: [state] DebugLocked = Yes
31,141,940 UART: [state] Starting the WD Timer 40000000 cycles
31,147,281 UART: [kat] SHA2-256
31,337,136 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,348,027 UART: [kat] ++
31,348,548 UART: [kat] sha1
31,359,327 UART: [kat] SHA2-256
31,362,315 UART: [kat] SHA2-384
31,368,262 UART: [kat] SHA2-512-ACC
31,370,836 UART: [kat] ECC-384
33,811,342 UART: [kat] HMAC-384Kdf
33,823,704 UART: [kat] LMS
34,355,314 UART: [kat] --
34,360,281 UART: [update-reset] ++
39,001,630 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,004,804 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
39,600,744 >>> mbox cmd response: success
39,602,384 UART: [update-reset] Copying MAN_2 To MAN_1
39,639,964 UART: [update-reset Success] --
39,643,504 UART: [state] Locking Datavault
39,646,435 UART: [state] Locking PCR0, PCR1 and PCR31
39,648,635 UART: [state] Locking ICCM
39,649,925 UART: [exit] Launching FMC @ 0x40000130
39,658,567 UART:
39,658,804 UART: Running Caliptra FMC ...
39,659,824 UART:
39,659,970 UART: [state] CFI Enabled
39,704,316 UART: [art] Extend RT PCRs Done
39,705,505 UART: [art] Lock RT PCRs Done
39,706,928 UART: [art] Populate DV Done
39,712,659 UART: [fht] FMC Alias Private Key: 7
39,714,353 UART: [art] Derive CDI
39,715,164 UART: [art] Store in in slot 0x4
39,757,954 UART: [art] Derive Key Pair
39,759,003 UART: [art] Store priv key in slot 0x5
42,185,139 UART: [art] Derive Key Pair - Done
42,198,065 UART: [art] Signing Cert with AUTHO
42,199,366 UART: RITY.KEYID = 7
43,904,494 UART: [art] Erasing AUTHORITY.KEYID = 7
43,906,019 UART: [art] PUB.X = 3475002A3F6888C0E4ECFF05DFF9DAF7A1A29D013314B5349F6A7699575EFC4BAB2A0B6B3885F8F823694942DED2167F
43,913,277 UART: [art] PUB.Y = 68EB8D6F2359568D7D62A84123AE377509B17FA95C359BE60F3CFEFC7283900E17F0A67F9E0A90095B8AACBC5598507B
43,920,515 UART: [art] SIG.R = F4413A0FA256BDE825E342A4C7CA310A3A30D0C534527E754F98B36574B467341A8FFD7157167A030F3E353B3F3CBAD3
43,927,917 UART: [art] SIG.S = F05AB2C06C4970F36E73EC37C5B850EA0013C6FE41224795FFBC40A278C4836BED10ABAEB850D8DB9D517D3A7AA11702
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:a9:b1:d8:a3:98:6f:c9:90:51:cf:16:c7:06:7f:ce:4e:63:59:68
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=49A9B1D8A3986FC99051CF16C7067FCE4E635968FFCE36CABC5A7D3DC5D61BAE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:34:75:00:2a:3f:68:88:c0:e4:ec:ff:05:df:f9:
da:f7:a1:a2:9d:01:33:14:b5:34:9f:6a:76:99:57:
5e:fc:4b:ab:2a:0b:6b:38:85:f8:f8:23:69:49:42:
de:d2:16:7f:68:eb:8d:6f:23:59:56:8d:7d:62:a8:
41:23:ae:37:75:09:b1:7f:a9:5c:35:9b:e6:0f:3c:
fe:fc:72:83:90:0e:17:f0:a6:7f:9e:0a:90:09:5b:
8a:ac:bc:55:98:50:7b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
49:A9:B1:D8:A3:98:6F:C9:90:51:CF:16:C7:06:7F:CE:4E:63:59:68
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:f4:41:3a:0f:a2:56:bd:e8:25:e3:42:a4:c7:
ca:31:0a:3a:30:d0:c5:34:52:7e:75:4f:98:b3:65:74:b4:67:
34:1a:8f:fd:71:57:16:7a:03:0f:3e:35:3b:3f:3c:ba:d3:02:
31:00:f0:5a:b2:c0:6c:49:70:f3:6e:73:ec:37:c5:b8:50:ea:
00:13:c6:fe:41:22:47:95:ff:bc:40:a2:78:c4:83:6b:ed:10:
ab:ae:b8:50:d8:db:9d:51:7d:3a:7a:a1:17:02
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.39s
Truncated 526 bytes from beginning
g to cptra_bootfsm_go
3,754,347 ready_for_fw is high
3,754,766 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,102,090 >>> mbox cmd response: success
20,354,530 UART:
20,355,111 UART: Running Caliptra FMC ...
20,356,238 UART:
20,356,395 UART: [state] CFI Enabled
20,364,044 UART: [fht] FMC Alias Private Key: 7
22,120,959 UART: [art] Extend RT PCRs Done
22,122,190 UART: [art] Lock RT PCRs Done
22,123,792 UART: [art] Populate DV Done
22,129,140 UART: [fht] FMC Alias Private Key: 7
22,130,841 UART: [art] Derive CDI
22,131,651 UART: [art] Store in in slot 0x4
22,174,510 UART: [art] Derive Key Pair
22,175,547 UART: [art] Store priv key in slot 0x5
24,602,471 UART: [art] Derive Key Pair - Done
24,615,081 UART: [art] Signing Cert with AUTHO
24,616,417 UART: RITY.KEYID = 7
26,322,191 UART: [art] Erasing AUTHORITY.KEYID = 7
26,323,697 UART: [art] PUB.X = 650E113690FB5DA0787BC58A37D85914E78B809F5ACCB8634AD4AC4196117079C7ECD61E283691665A236C429620D4A8
26,330,938 UART: [art] PUB.Y = E0E85FD5A617CDEC24674827FBD083F026F9A22C4A640B42773F97306E6903A7F1F163D1BFF1CE3AD39885524BD9E692
26,338,194 UART: [art] SIG.R = 2D21CF630BA1AD6170820D2B9A43754BF954813263F27418ED00BD29755CA779D1DC30967A877E6EEE225005BE4388A3
26,345,603 UART: [art] SIG.S = 395D8C79D12E9AD90DFB821E6F90F49C648FFE96576CF0BCC272435B464D7EBFAC6AA7C71488FB60C902F1C8CC07FA29
27,324,189 UART: Caliptra RT
27,324,887 UART: [state] CFI Enabled
27,442,217 UART: [rt] RT listening for mailbox commands...
27,473,584 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,918,720 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
28,353,991 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5f:70:2a:76:24:a2:22:59:d7:49:32:d3:7e:a3:b8:43:30:ac:5c:6d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DF702A7624A22259D74932D37EA3B84330AC5C6D264FC39EBBA378CC817A7B9B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:65:0e:11:36:90:fb:5d:a0:78:7b:c5:8a:37:d8:
59:14:e7:8b:80:9f:5a:cc:b8:63:4a:d4:ac:41:96:
11:70:79:c7:ec:d6:1e:28:36:91:66:5a:23:6c:42:
96:20:d4:a8:e0:e8:5f:d5:a6:17:cd:ec:24:67:48:
27:fb:d0:83:f0:26:f9:a2:2c:4a:64:0b:42:77:3f:
97:30:6e:69:03:a7:f1:f1:63:d1:bf:f1:ce:3a:d3:
98:85:52:4b:d9:e6:92
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
DF:70:2A:76:24:A2:22:59:D7:49:32:D3:7E:A3:B8:43:30:AC:5C:6D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:2d:21:cf:63:0b:a1:ad:61:70:82:0d:2b:9a:43:
75:4b:f9:54:81:32:63:f2:74:18:ed:00:bd:29:75:5c:a7:79:
d1:dc:30:96:7a:87:7e:6e:ee:22:50:05:be:43:88:a3:02:30:
39:5d:8c:79:d1:2e:9a:d9:0d:fb:82:1e:6f:90:f4:9c:64:8f:
fe:96:57:6c:f0:bc:c2:72:43:5b:46:4d:7e:bf:ac:6a:a7:c7:
14:88:fb:60:c9:02:f1:c8:cc:07:fa:29
30,814,124 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
39,628,265 >>> mbox cmd response: success
39,663,758 UART:
39,664,109 UART: Running Caliptra FMC ...
39,665,239 UART:
39,665,392 UART: [state] CFI Enabled
39,709,373 UART: [art] Extend RT PCRs Done
39,710,523 UART: [art] Lock RT PCRs Done
39,711,940 UART: [art] Populate DV Done
39,717,452 UART: [fht] FMC Alias Private Key: 7
39,719,149 UART: [art] Derive CDI
39,719,882 UART: [art] Store in in slot 0x4
39,762,597 UART: [art] Derive Key Pair
39,763,660 UART: [art] Store priv key in slot 0x5
42,189,947 UART: [art] Derive Key Pair - Done
42,203,119 UART: [art] Signing Cert with AUTHO
42,204,437 UART: RITY.KEYID = 7
43,910,006 UART: [art] Erasing AUTHORITY.KEYID = 7
43,911,521 UART: [art] PUB.X = E58823173E8115640BE898E0183B753EAE6132BE2019E315A021CAC16211637F44C5A4C8816AFF28E07689BCB91CB161
43,918,769 UART: [art] PUB.Y = 18FA613C91F9DDEDCFB80D9A14AD9EAE85B44E7F1A533F590CE16F014C531A86454BC2CD07007C57711FE0C5E5A2918A
43,926,043 UART: [art] SIG.R = A442CF3E368C5E49D39E9731C031223B5972A2D6C8652457232F3D31B4D13EA191CE8516E66C6F462188D9175C9E91F9
43,933,378 UART: [art] SIG.S = FBBBDCEEFC1E2FE2B873542E79AFA7DE34AB383FA3C773F55071D5FB47D35EB3CF92BD9CCC90A97FBED8870F314EC927
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:0b:e8:ef:70:51:cb:c8:cc:d6:08:f5:46:15:dd:86:4b:cf:04:e6
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=840BE8EF7051CBC8CCD608F54615DD864BCF04E6087FAF92ADEC4D0F31F7AAFC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e5:88:23:17:3e:81:15:64:0b:e8:98:e0:18:3b:
75:3e:ae:61:32:be:20:19:e3:15:a0:21:ca:c1:62:
11:63:7f:44:c5:a4:c8:81:6a:ff:28:e0:76:89:bc:
b9:1c:b1:61:18:fa:61:3c:91:f9:dd:ed:cf:b8:0d:
9a:14:ad:9e:ae:85:b4:4e:7f:1a:53:3f:59:0c:e1:
6f:01:4c:53:1a:86:45:4b:c2:cd:07:00:7c:57:71:
1f:e0:c5:e5:a2:91:8a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
84:0B:E8:EF:70:51:CB:C8:CC:D6:08:F5:46:15:DD:86:4B:CF:04:E6
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a4:42:cf:3e:36:8c:5e:49:d3:9e:97:31:c0:
31:22:3b:59:72:a2:d6:c8:65:24:57:23:2f:3d:31:b4:d1:3e:
a1:91:ce:85:16:e6:6c:6f:46:21:88:d9:17:5c:9e:91:f9:02:
31:00:fb:bb:dc:ee:fc:1e:2f:e2:b8:73:54:2e:79:af:a7:de:
34:ab:38:3f:a3:c7:73:f5:50:71:d5:fb:47:d3:5e:b3:cf:92:
bd:9c:cc:90:a9:7f:be:d8:87:0f:31:4e:c9:27
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.39s
Truncated 5400 bytes from beginning
=0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,873,360 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,915,041 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
56:33:1d:5b:76:f8:35:f2:a6:98:26:70:f5:ba:90:e1:cb:0c:ed:52
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D2331D5B76F835F2A6982670F5BA90E1CB0CED5205ED30FBB2090E850DA74558
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:33:d5:d2:a3:f6:fc:46:25:f3:6b:1a:29:1c:d2:
18:58:a1:aa:1e:c2:8e:fb:9f:d1:f6:51:9f:85:85:
24:a6:81:4d:a6:9b:4f:93:34:a3:e5:7b:ae:a9:07:
25:62:bb:3c:49:74:61:46:b4:67:2b:8c:4c:f8:89:
3e:55:0e:37:ec:2c:31:4b:ad:34:e7:65:ba:85:0b:
27:08:ae:cf:cc:2c:bb:a2:d9:f8:9b:99:5c:e0:bf:
7b:53:93:c9:ba:7a:c2
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
D2:33:1D:5B:76:F8:35:F2:A6:98:26:70:F5:BA:90:E1:CB:0C:ED:52
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5a:e5:43:44:21:82:5e:a7:14:f0:62:9f:ff:fe:
49:93:d8:c2:5c:bd:79:65:01:b0:db:36:88:8d:48:26:2d:3a:
d7:7f:f4:98:b0:0c:63:c5:0d:20:5d:3c:c4:fe:64:fa:02:31:
00:e7:47:d5:23:fb:e9:4f:6e:7e:6d:a8:4e:9d:a6:85:f7:08:
ec:c0:66:20:b4:5a:d0:77:23:bd:76:02:2a:ed:8b:8b:bb:dd:
40:85:5d:4b:e3:53:92:d1:61:ca:a4:c2:66
5,925,897 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,926,722 UART:
5,926,738 UART: Running Caliptra ROM ...
5,927,146 UART:
5,927,200 UART: [state] CFI Enabled
5,929,953 UART: [state] LifecycleState = Production
5,930,561 UART: [state] DebugLocked = Yes
5,931,183 UART: [state] Starting the Watchdog Timer 40000000 cycles
5,932,880 UART: [kat] SHA2-256
6,726,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,730,926 UART: [kat] ++
6,731,078 UART: [kat] sha1
6,735,310 UART: [kat] SHA2-256
6,737,248 UART: [kat] SHA2-384
6,739,775 UART: [kat] SHA2-512-ACC
6,741,675 UART: [kat] ECC-384
6,747,504 UART: [kat] HMAC-384Kdf
6,752,022 UART: [kat] LMS
7,320,218 UART: [kat] --
7,321,235 UART: [update-reset] ++
10,818,228 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,819,316 UART: [update-reset] Loading Runtime at address 0x40005000 len 87712
10,966,288 >>> mbox cmd response: success
10,966,492 UART: [update-reset] Copying MAN_2 To MAN_1
10,974,504 UART: [update-reset Success] --
10,975,681 UART: [state] Locking Datavault
10,976,445 UART: [state] Locking PCR0, PCR1 and PCR31
10,977,049 UART: [state] Locking ICCM
10,977,691 UART: [exit] Launching FMC @ 0x40000130
10,983,020 UART:
10,983,036 UART: Running Caliptra FMC ...
10,983,444 UART:
10,983,498 UART: [state] CFI Enabled
11,072,419 UART: [art] Extend RT PCRs Done
11,072,847 UART: [art] Lock RT PCRs Done
11,074,134 UART: [art] Populate DV Done
11,082,356 UART: [fht] FMC Alias Private Key: 7
11,083,346 UART: [art] Derive CDI
11,083,626 UART: [art] Store in in slot 0x4
11,169,065 UART: [art] Derive Key Pair
11,169,425 UART: [art] Store priv key in slot 0x5
11,182,949 UART: [art] Derive Key Pair - Done
11,197,789 UART: [art] Signing Cert with AUTHO
11,198,269 UART: RITY.KEYID = 7
11,213,497 UART: [art] Erasing AUTHORITY.KEYID = 7
11,214,262 UART: [art] PUB.X = 5A883D659B9CFC5703509E406477CF98314A337F1C7F0D9750DECC5112B9E4D8496CCA84C2471D6AC9739F3EEBFD06E8
11,221,031 UART: [art] PUB.Y = 5C810B77890154EF5319FE659526774ED02768B3EFFB8690670D38C5B0CB96F63B69DCAC73E2474E17670430129588CD
11,227,963 UART: [art] SIG.R = 4EF32E774A73B08CF14CDEC31C86A077335C2E3E257294917711C5333E49A6D3B05294ADC873949E01355921CE5DAF85
11,234,728 UART: [art] SIG.S = 5DC9685FB1E3210A3230F4BA1559DE86553AD6B0D1D16C7F950F0131F393A917ABF7A201CFC4389C0831722A0313D9B4
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5d:67:3b:84:58:50:1e:f1:f2:79:64:97:05:5c:14:a4:bb:b2:78:4d
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=DD673B8458501EF1F2796497055C14A4BBB2784D0469626D773824BDD6B60EAE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5a:88:3d:65:9b:9c:fc:57:03:50:9e:40:64:77:
cf:98:31:4a:33:7f:1c:7f:0d:97:50:de:cc:51:12:
b9:e4:d8:49:6c:ca:84:c2:47:1d:6a:c9:73:9f:3e:
eb:fd:06:e8:5c:81:0b:77:89:01:54:ef:53:19:fe:
65:95:26:77:4e:d0:27:68:b3:ef:fb:86:90:67:0d:
38:c5:b0:cb:96:f6:3b:69:dc:ac:73:e2:47:4e:17:
67:04:30:12:95:88:cd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
DD:67:3B:84:58:50:1E:F1:F2:79:64:97:05:5C:14:A4:BB:B2:78:4D
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:4e:f3:2e:77:4a:73:b0:8c:f1:4c:de:c3:1c:86:
a0:77:33:5c:2e:3e:25:72:94:91:77:11:c5:33:3e:49:a6:d3:
b0:52:94:ad:c8:73:94:9e:01:35:59:21:ce:5d:af:85:02:30:
5d:c9:68:5f:b1:e3:21:0a:32:30:f4:ba:15:59:de:86:55:3a:
d6:b0:d1:d1:6c:7f:95:0f:01:31:f3:93:a9:17:ab:f7:a2:01:
cf:c4:38:9c:08:31:72:2a:03:13:d9:b4
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.84s
Truncated 880 bytes from beginning
ne
5,257,296 UART: [art] Populate DV Done
5,265,588 UART: [fht] FMC Alias Private Key: 7
5,266,736 UART: [art] Derive CDI
5,267,016 UART: [art] Store in in slot 0x4
5,352,471 UART: [art] Derive Key Pair
5,352,831 UART: [art] Store priv key in slot 0x5
5,366,151 UART: [art] Derive Key Pair - Done
5,381,031 UART: [art] Signing Cert with AUTHO
5,381,511 UART: RITY.KEYID = 7
5,396,473 UART: [art] Erasing AUTHORITY.KEYID = 7
5,397,238 UART: [art] PUB.X = D82D5B35C528D4B1BCF901DAC81CA28C0C02104C477F9BB85EEAC61AF6C3C77FD1269D2E03B13CD1FBC5A4D5D7A57A7B
5,404,022 UART: [art] PUB.Y = 214899B74891E7829B858B6A2632FE9D4937E043B31A6562F337C2A347A957BAF6AF5DB8B2F756BB0557FD6DF2916ABE
5,410,973 UART: [art] SIG.R = 335E683A86A06460EDEDC47D00AAE879989DC8D18C689B3AC3F6AC4644286A32E6DDCA4EFD8F500289D25F17457C7949
5,417,726 UART: [art] SIG.S = 77AE8B369DA54EA8D3094270E0764AB9EA9D54FE0B2BA1BBD7463E16ABD59B4606D380A6CD2ED31F8EBB3605ED275CD4
5,441,661 UART: Caliptra RT
5,441,914 UART: [state] CFI Enabled
5,550,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,581,003 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,620,622 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,662,633 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
66:40:bc:ef:95:24:55:9c:1a:6f:24:31:84:14:9e:e8:3e:a8:44:c5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6240BCEF9524559C1A6F243184149EE83EA844C51E16898F38E7C34C9D391763
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d8:2d:5b:35:c5:28:d4:b1:bc:f9:01:da:c8:1c:
a2:8c:0c:02:10:4c:47:7f:9b:b8:5e:ea:c6:1a:f6:
c3:c7:7f:d1:26:9d:2e:03:b1:3c:d1:fb:c5:a4:d5:
d7:a5:7a:7b:21:48:99:b7:48:91:e7:82:9b:85:8b:
6a:26:32:fe:9d:49:37:e0:43:b3:1a:65:62:f3:37:
c2:a3:47:a9:57:ba:f6:af:5d:b8:b2:f7:56:bb:05:
57:fd:6d:f2:91:6a:be
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
62:40:BC:EF:95:24:55:9C:1A:6F:24:31:84:14:9E:E8:3E:A8:44:C5
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:33:5e:68:3a:86:a0:64:60:ed:ed:c4:7d:00:aa:
e8:79:98:9d:c8:d1:8c:68:9b:3a:c3:f6:ac:46:44:28:6a:32:
e6:dd:ca:4e:fd:8f:50:02:89:d2:5f:17:45:7c:79:49:02:30:
77:ae:8b:36:9d:a5:4e:a8:d3:09:42:70:e0:76:4a:b9:ea:9d:
54:fe:0b:2b:a1:bb:d7:46:3e:16:ab:d5:9b:46:06:d3:80:a6:
cd:2e:d3:1f:8e:bb:36:05:ed:27:5c:d4
5,673,521 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,747,634 >>> mbox cmd response: success
10,760,982 UART:
10,760,998 UART: Running Caliptra FMC ...
10,761,406 UART:
10,761,460 UART: [state] CFI Enabled
10,850,347 UART: [art] Extend RT PCRs Done
10,850,775 UART: [art] Lock RT PCRs Done
10,851,936 UART: [art] Populate DV Done
10,859,906 UART: [fht] FMC Alias Private Key: 7
10,860,942 UART: [art] Derive CDI
10,861,222 UART: [art] Store in in slot 0x4
10,946,543 UART: [art] Derive Key Pair
10,946,903 UART: [art] Store priv key in slot 0x5
10,960,311 UART: [art] Derive Key Pair - Done
10,975,184 UART: [art] Signing Cert with AUTHO
10,975,664 UART: RITY.KEYID = 7
10,990,636 UART: [art] Erasing AUTHORITY.KEYID = 7
10,991,401 UART: [art] PUB.X = 3753E8D7CEDD749400BEC9AC594C0BF5878DDC3C0007DE45E9390D3987A5F6486D96188392172049448306643B01F641
10,998,104 UART: [art] PUB.Y = 1FEF954B544A557AEC53128D76580E94DFF954A3BAAE9D03AEF4AA7370CC0BAC3128E926A0D9A2D7F4D1DA76ED2E8243
11,005,065 UART: [art] SIG.R = 87B3CA08DFAA2B0E145D89A53AFE3D640A6903D82D7C8B63613028A46C03BAEF3623E292EF980D25D82BCADC6037B2CF
11,011,833 UART: [art] SIG.S = 29D1E5718B57766209AC6855BAFBDA87F8F10B647B5897A0AF70491DBE4B42E987C2F5484E857AD65EE0D781BD26D926
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7f:0b:19:04:e6:43:86:d4:2e:94:9f:8d:dd:c0:fc:bc:74:80:72:52
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=FF0B1904E64386D42E949F8DDDC0FCBC74807252F8BC626B8C760613A04E0D32
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:37:53:e8:d7:ce:dd:74:94:00:be:c9:ac:59:4c:
0b:f5:87:8d:dc:3c:00:07:de:45:e9:39:0d:39:87:
a5:f6:48:6d:96:18:83:92:17:20:49:44:83:06:64:
3b:01:f6:41:1f:ef:95:4b:54:4a:55:7a:ec:53:12:
8d:76:58:0e:94:df:f9:54:a3:ba:ae:9d:03:ae:f4:
aa:73:70:cc:0b:ac:31:28:e9:26:a0:d9:a2:d7:f4:
d1:da:76:ed:2e:82:43
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
FF:0B:19:04:E6:43:86:D4:2E:94:9F:8D:DD:C0:FC:BC:74:80:72:52
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:87:b3:ca:08:df:aa:2b:0e:14:5d:89:a5:3a:
fe:3d:64:0a:69:03:d8:2d:7c:8b:63:61:30:28:a4:6c:03:ba:
ef:36:23:e2:92:ef:98:0d:25:d8:2b:ca:dc:60:37:b2:cf:02:
30:29:d1:e5:71:8b:57:76:62:09:ac:68:55:ba:fb:da:87:f8:
f1:0b:64:7b:58:97:a0:af:70:49:1d:be:4b:42:e9:87:c2:f5:
48:4e:85:7a:d6:5e:e0:d7:81:bd:26:d9:26
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.56s
Truncated 5403 bytes from beginning
4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,139,170 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,181,019 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
67:69:4d:09:54:97:99:45:7c:70:53:a0:2c:cf:a5:31:ce:06:13:ff
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E7694D09549799457C7053A02CCFA531CE0613FFC7D911440FB90AB6320EA567
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4e:18:91:6b:20:f3:07:cd:35:fd:ac:79:5e:a6:
47:a6:b8:ad:c2:6a:ec:f4:e6:0f:f5:b2:33:58:15:
bd:59:76:87:87:e5:df:1b:49:63:6d:3d:a2:5d:51:
40:de:18:71:c6:49:71:1c:29:9e:cf:f5:97:35:fe:
c3:5c:34:56:d9:07:a7:f5:d4:c2:cf:93:91:20:ff:
cc:fc:15:4e:47:c2:38:da:28:b7:18:45:1d:5f:c8:
2e:2c:d2:a0:72:ea:80
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
E7:69:4D:09:54:97:99:45:7C:70:53:A0:2C:CF:A5:31:CE:06:13:FF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e1:ed:3d:e3:73:e5:8e:b5:1e:f2:58:75:20:
40:63:cd:ec:18:1a:66:66:d0:0f:02:d2:13:a3:40:4e:b5:4b:
09:8b:8a:f8:61:2a:70:89:7e:a2:f1:d9:f0:5f:62:51:0b:02:
30:78:aa:fb:d5:05:16:e5:e3:6d:dc:15:57:f6:a0:32:46:44:
4b:33:9d:2b:66:d5:a1:7f:83:25:0a:18:15:65:8d:20:a3:b8:
ae:e5:a4:23:39:2c:4d:d9:82:e5:45:68:73
6,192,047 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,192,514 UART:
6,192,530 UART: Running Caliptra ROM ...
6,192,938 UART:
6,193,079 UART: [state] CFI Enabled
6,195,410 UART: [state] LifecycleState = Production
6,196,018 UART: [state] DebugLocked = Yes
6,196,692 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,198,319 UART: [kat] SHA2-256
6,992,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,996,365 UART: [kat] ++
6,996,517 UART: [kat] sha1
7,000,721 UART: [kat] SHA2-256
7,002,659 UART: [kat] SHA2-384
7,005,364 UART: [kat] SHA2-512-ACC
7,007,264 UART: [kat] ECC-384
7,013,105 UART: [kat] HMAC-384Kdf
7,017,701 UART: [kat] LMS
7,585,897 UART: [kat] --
7,586,832 UART: [update-reset] ++
11,159,201 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,160,325 UART: [update-reset] Loading Runtime at address 0x40005000 len 87712
11,307,297 >>> mbox cmd response: success
11,307,581 UART: [update-reset] Copying MAN_2 To MAN_1
11,315,593 UART: [update-reset Success] --
11,316,796 UART: [state] Locking Datavault
11,317,424 UART: [state] Locking PCR0, PCR1 and PCR31
11,318,028 UART: [state] Locking ICCM
11,318,608 UART: [exit] Launching FMC @ 0x40000130
11,323,937 UART:
11,323,953 UART: Running Caliptra FMC ...
11,324,361 UART:
11,324,504 UART: [state] CFI Enabled
11,413,659 UART: [art] Extend RT PCRs Done
11,414,087 UART: [art] Lock RT PCRs Done
11,415,564 UART: [art] Populate DV Done
11,423,948 UART: [fht] FMC Alias Private Key: 7
11,424,962 UART: [art] Derive CDI
11,425,242 UART: [art] Store in in slot 0x4
11,511,081 UART: [art] Derive Key Pair
11,511,441 UART: [art] Store priv key in slot 0x5
11,524,695 UART: [art] Derive Key Pair - Done
11,539,614 UART: [art] Signing Cert with AUTHO
11,540,094 UART: RITY.KEYID = 7
11,555,402 UART: [art] Erasing AUTHORITY.KEYID = 7
11,556,167 UART: [art] PUB.X = 3D840B73230B0E58476AD00166B659630E4C315F5B64F03F88FD11363F55DFE2C0197118D16DC775C9142991051E2A7B
11,562,911 UART: [art] PUB.Y = 89BFF44FCC49491F82B6050DDD1BA96F4938E9842466F25CC41CC832C95EB1BCB5051F9449C789D54E298323E480EFE0
11,569,858 UART: [art] SIG.R = 8314D0F1D3F6666DB761BBF9BC7C67889B81E833DFA081D456653560C6108257BE3A962CFC520ED2D4769EA900CAE856
11,576,607 UART: [art] SIG.S = 5CDD32A3D0793F38A1B6FC1B2031F2AD33D29B3B3A74784E6D0FACA721C71A7283BCD0481C3C1A962BC0D763B90BD4B0
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:25:16:7b:37:b7:5b:11:d2:13:2e:56:af:5d:a3:90:0e:7a:83:47
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3F25167B37B75B11D2132E56AF5DA3900E7A83473FAF983CF89A8636B807F3B8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:3d:84:0b:73:23:0b:0e:58:47:6a:d0:01:66:b6:
59:63:0e:4c:31:5f:5b:64:f0:3f:88:fd:11:36:3f:
55:df:e2:c0:19:71:18:d1:6d:c7:75:c9:14:29:91:
05:1e:2a:7b:89:bf:f4:4f:cc:49:49:1f:82:b6:05:
0d:dd:1b:a9:6f:49:38:e9:84:24:66:f2:5c:c4:1c:
c8:32:c9:5e:b1:bc:b5:05:1f:94:49:c7:89:d5:4e:
29:83:23:e4:80:ef:e0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
3F:25:16:7B:37:B7:5B:11:D2:13:2E:56:AF:5D:A3:90:0E:7A:83:47
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:83:14:d0:f1:d3:f6:66:6d:b7:61:bb:f9:bc:
7c:67:88:9b:81:e8:33:df:a0:81:d4:56:65:35:60:c6:10:82:
57:be:3a:96:2c:fc:52:0e:d2:d4:76:9e:a9:00:ca:e8:56:02:
30:5c:dd:32:a3:d0:79:3f:38:a1:b6:fc:1b:20:31:f2:ad:33:
d2:9b:3b:3a:74:78:4e:6d:0f:ac:a7:21:c7:1a:72:83:bc:d0:
48:1c:3c:1a:96:2b:c0:d7:63:b9:0b:d4:b0
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.88s
Truncated 877 bytes from beginning
Done
5,483,072 UART: [art] Populate DV Done
5,491,368 UART: [fht] FMC Alias Private Key: 7
5,492,434 UART: [art] Derive CDI
5,492,714 UART: [art] Store in in slot 0x4
5,578,263 UART: [art] Derive Key Pair
5,578,623 UART: [art] Store priv key in slot 0x5
5,591,729 UART: [art] Derive Key Pair - Done
5,606,644 UART: [art] Signing Cert with AUTHO
5,607,124 UART: RITY.KEYID = 7
5,622,312 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,077 UART: [art] PUB.X = A4A66FD324AC24FACAB79CFB143AE6022CB27A94213C63E5F5414ED43CF725D8E286D96CAA5716874A590EBECAC69AFC
5,629,863 UART: [art] PUB.Y = CBB8B12BF16F910FCCB1918275A2DE7715919213985B06AAA1390A064A1FC63518DE63A3A5BA9049B21F769C908614D3
5,636,803 UART: [art] SIG.R = 35A0CD7011DD65AE2787E146DD582B452F340C189F1469009DF7ED93D954A71570BB7A9698728A663698623757A344B6
5,643,538 UART: [art] SIG.S = 3663DC2EFB71E281F6409648342086078D9D5BB788DE96F074292AB56B1AF16362890C133574E9C54A827CA53DCF017B
5,667,726 UART: Caliptra RT
5,668,071 UART: [state] CFI Enabled
5,775,891 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,806,250 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,845,603 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:22:17:87:9d:01:0e:ff:8e:89:34:b3:59:a8:6a:
94:4e:ff:a2:15:08:93:56:5e:8a:66:0e:fd:27:64:88:ba:a1:
26:91:a7:e7:a3:f4:4e:3e:29:bc:8f:da:5c:17:e6:f8:02:31:
00:be:ff:8e:17:5e:52:74:15:bc:67:33:d1:6a:1e:be:13:3e:
95:fb:16:06:27:f1:08:2e:6b:99:e7:96:59:8a:a5:b6:c8:71:
99:6c:cf:48:a8:27:4d:4d:35:d2:e5:b9:bd
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,887,264 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7f:10:d6:b9:01:78:a4:25:85:a1:bc:9c:c6:7d:92:91:c2:50:0e:ff
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=FF10D6B90178A42585A1BC9CC67D9291C2500EFF15928837B96AADD2EB570CEE
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a4:a6:6f:d3:24:ac:24:fa:ca:b7:9c:fb:14:3a:
e6:02:2c:b2:7a:94:21:3c:63:e5:f5:41:4e:d4:3c:
f7:25:d8:e2:86:d9:6c:aa:57:16:87:4a:59:0e:be:
ca:c6:9a:fc:cb:b8:b1:2b:f1:6f:91:0f:cc:b1:91:
82:75:a2:de:77:15:91:92:13:98:5b:06:aa:a1:39:
0a:06:4a:1f:c6:35:18:de:63:a3:a5:ba:90:49:b2:
1f:76:9c:90:86:14:d3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
FF:10:D6:B9:01:78:A4:25:85:A1:BC:9C:C6:7D:92:91:C2:50:0E:FF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:35:a0:cd:70:11:dd:65:ae:27:87:e1:46:dd:58:
2b:45:2f:34:0c:18:9f:14:69:00:9d:f7:ed:93:d9:54:a7:15:
70:bb:7a:96:98:72:8a:66:36:98:62:37:57:a3:44:b6:02:30:
36:63:dc:2e:fb:71:e2:81:f6:40:96:48:34:20:86:07:8d:9d:
5b:b7:88:de:96:f0:74:29:2a:b5:6b:1a:f1:63:62:89:0c:13:
35:74:e9:c5:4a:82:7c:a5:3d:cf:01:7b
5,897,974 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
10,973,152 >>> mbox cmd response: success
10,986,690 UART:
10,986,706 UART: Running Caliptra FMC ...
10,987,114 UART:
10,987,257 UART: [state] CFI Enabled
11,076,684 UART: [art] Extend RT PCRs Done
11,077,112 UART: [art] Lock RT PCRs Done
11,077,997 UART: [art] Populate DV Done
11,086,321 UART: [fht] FMC Alias Private Key: 7
11,087,355 UART: [art] Derive CDI
11,087,635 UART: [art] Store in in slot 0x4
11,173,286 UART: [art] Derive Key Pair
11,173,646 UART: [art] Store priv key in slot 0x5
11,186,488 UART: [art] Derive Key Pair - Done
11,201,372 UART: [art] Signing Cert with AUTHO
11,201,852 UART: RITY.KEYID = 7
11,217,438 UART: [art] Erasing AUTHORITY.KEYID = 7
11,218,203 UART: [art] PUB.X = 2B373577D1F5CC847AF5AACC480EF3927646062CCD96D7C61023477D0DE0705CDA943FFF63D5826C0C1551D70CDD10A5
11,224,966 UART: [art] PUB.Y = BB519A729C248787BD358EB7A0D4E7239EC18B6083C8237C9B40DE11D15A0C0485EF778653AF856402F9529CA7A91E91
11,231,907 UART: [art] SIG.R = 2D71D06A5646BD2902463D43460EE118763668D6B49E2281902A195E0389FBC76E9AFE0846ECD8AB9CB27054BE30DA7E
11,238,667 UART: [art] SIG.S = 009DC91F371864AD54C946D17B7CDC83E21978B5795E2D67E8B4A571C10B51362F0C3731755637A9EC0C1F7412918ABA
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:fd:e6:42:0e:68:66:12:ff:b3:19:8f:1c:97:e8:ef:e6:3b:bd:2b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B2FDE6420E686612FFB3198F1C97E8EFE63BBD2B32152D377CD89C10ACAA2E9A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2b:37:35:77:d1:f5:cc:84:7a:f5:aa:cc:48:0e:
f3:92:76:46:06:2c:cd:96:d7:c6:10:23:47:7d:0d:
e0:70:5c:da:94:3f:ff:63:d5:82:6c:0c:15:51:d7:
0c:dd:10:a5:bb:51:9a:72:9c:24:87:87:bd:35:8e:
b7:a0:d4:e7:23:9e:c1:8b:60:83:c8:23:7c:9b:40:
de:11:d1:5a:0c:04:85:ef:77:86:53:af:85:64:02:
f9:52:9c:a7:a9:1e:91
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
B2:FD:E6:42:0E:68:66:12:FF:B3:19:8F:1C:97:E8:EF:E6:3B:BD:2B
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:2d:71:d0:6a:56:46:bd:29:02:46:3d:43:46:0e:
e1:18:76:36:68:d6:b4:9e:22:81:90:2a:19:5e:03:89:fb:c7:
6e:9a:fe:08:46:ec:d8:ab:9c:b2:70:54:be:30:da:7e:02:30:
00:9d:c9:1f:37:18:64:ad:54:c9:46:d1:7b:7c:dc:83:e2:19:
78:b5:79:5e:2d:67:e8:b4:a5:71:c1:0b:51:36:2f:0c:37:31:
75:56:37:a9:ec:0c:1f:74:12:91:8a:ba
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.17s
Truncated 5300 bytes from beginning
next_pc=40005400
3,876,231 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,915,968 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,957,217 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6d:46:4c:67:39:80:16:bf:0c:78:b3:31:43:b2:2f:3b:ad:6c:ca:4f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=ED464C67398016BF0C78B33143B22F3BAD6CCA4F1CFF68E7EA597B5A54F3F2C8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:92:7c:f5:c9:c4:12:71:f1:f6:12:d8:a8:0d:de:
b0:bf:17:8d:57:d5:44:70:e1:ea:e8:0b:c8:22:e8:
71:91:a9:02:a2:f9:88:b8:0d:ba:be:fb:ec:26:ac:
f0:1e:ad:aa:f2:6a:ec:a1:40:ae:c8:76:8b:ba:25:
27:e2:b9:2e:59:27:58:2e:a7:0e:66:a9:41:1a:b4:
12:51:0a:1f:cb:e1:ce:1a:22:06:00:63:4e:2d:6a:
3b:23:29:10:9c:bb:0f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
ED:46:4C:67:39:80:16:BF:0C:78:B3:31:43:B2:2F:3B:AD:6C:CA:4F
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:be:e5:f5:03:e4:98:89:95:3e:5b:ef:7f:7b:
9e:c5:df:94:89:75:a5:3d:b3:ff:a7:7f:72:7f:0d:1a:2c:11:
a6:d6:5c:ed:9e:4f:22:e4:20:cc:4a:b9:0c:75:ce:b0:24:02:
31:00:e8:44:c9:89:59:e9:ec:01:73:0d:29:9b:c9:cc:18:e1:
28:8b:fa:bf:e7:7b:ad:23:fc:c2:dc:43:4c:1e:6f:2f:1a:1e:
cd:c7:b0:60:f5:15:0c:7e:61:a9:c1:d5:a2:64
3,967,914 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,968,548 UART:
3,968,564 UART: Running Caliptra ROM ...
3,968,972 UART:
3,969,027 UART: [state] CFI Enabled
3,971,888 UART: [state] LifecycleState = Production
3,972,496 UART: [state] DebugLocked = Yes
3,973,070 UART: [state] Starting the WD Timer 40000000 cycles
3,974,776 UART: [kat] SHA2-256
4,780,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,784,551 UART: [kat] ++
4,784,703 UART: [kat] sha1
4,789,137 UART: [kat] SHA2-256
4,791,077 UART: [kat] SHA2-384
4,793,848 UART: [kat] SHA2-512-ACC
4,795,748 UART: [kat] ECC-384
4,805,067 UART: [kat] HMAC-384Kdf
4,809,481 UART: [kat] LMS
5,057,809 UART: [kat] --
5,058,517 UART: [update-reset] ++
6,919,507 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,920,604 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
7,067,524 >>> mbox cmd response: success
7,067,866 UART: [update-reset] Copying MAN_2 To MAN_1
7,075,878 UART: [update-reset Success] --
7,076,911 UART: [state] Locking Datavault
7,077,681 UART: [state] Locking PCR0, PCR1 and PCR31
7,078,285 UART: [state] Locking ICCM
7,078,895 UART: [exit] Launching FMC @ 0x40000130
7,084,224 UART:
7,084,240 UART: Running Caliptra FMC ...
7,084,648 UART:
7,084,702 UART: [state] CFI Enabled
7,173,701 UART: [art] Extend RT PCRs Done
7,174,129 UART: [art] Lock RT PCRs Done
7,175,510 UART: [art] Populate DV Done
7,183,960 UART: [fht] FMC Alias Private Key: 7
7,184,944 UART: [art] Derive CDI
7,185,224 UART: [art] Store in in slot 0x4
7,270,807 UART: [art] Derive Key Pair
7,271,167 UART: [art] Store priv key in slot 0x5
7,284,475 UART: [art] Derive Key Pair - Done
7,299,414 UART: [art] Signing Cert with AUTHO
7,299,894 UART: RITY.KEYID = 7
7,315,570 UART: [art] Erasing AUTHORITY.KEYID = 7
7,316,335 UART: [art] PUB.X = 0D8763CC8A5BEBEEA701994955443C914DEEDD616E740138F2D6F9A737235A9C06ED8C9856C7D5D3E1A5A9757BC1D2CB
7,323,105 UART: [art] PUB.Y = 455C0E836C7B0BEFBE4001544E9C4A97ED50703F135BDC9BA4EA3117942394DB205059D98B02BA2FB4901A7C7E6200E8
7,330,027 UART: [art] SIG.R = 6BBE1A52B20FE95BAA8B74747FA67295C8DCF287737C29C56AD96EB70A9C43A97854070699A75F2765486543C3DE90B1
7,336,787 UART: [art] SIG.S = 94ED35FB8F4B219F93F1A87C8E1AC49CA3D1FC1C4BBE0036917BE8AB1E8A2C9B03B9B84CF354CAAEDAE59A339913185B
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:78:9c:6b:6c:ec:cc:00:65:f0:e3:6b:58:3b:2a:6f:fc:9e:ca:0e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C3789C6B6CECCC0065F0E36B583B2A6FFC9ECA0E50843573D3696B313CC2B378
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0d:87:63:cc:8a:5b:eb:ee:a7:01:99:49:55:44:
3c:91:4d:ee:dd:61:6e:74:01:38:f2:d6:f9:a7:37:
23:5a:9c:06:ed:8c:98:56:c7:d5:d3:e1:a5:a9:75:
7b:c1:d2:cb:45:5c:0e:83:6c:7b:0b:ef:be:40:01:
54:4e:9c:4a:97:ed:50:70:3f:13:5b:dc:9b:a4:ea:
31:17:94:23:94:db:20:50:59:d9:8b:02:ba:2f:b4:
90:1a:7c:7e:62:00:e8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
C3:78:9C:6B:6C:EC:CC:00:65:F0:E3:6B:58:3B:2A:6F:FC:9E:CA:0E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:6b:be:1a:52:b2:0f:e9:5b:aa:8b:74:74:7f:a6:
72:95:c8:dc:f2:87:73:7c:29:c5:6a:d9:6e:b7:0a:9c:43:a9:
78:54:07:06:99:a7:5f:27:65:48:65:43:c3:de:90:b1:02:31:
00:94:ed:35:fb:8f:4b:21:9f:93:f1:a8:7c:8e:1a:c4:9c:a3:
d1:fc:1c:4b:be:00:36:91:7b:e8:ab:1e:8a:2c:9b:03:b9:b8:
4c:f3:54:ca:ae:da:e5:9a:33:99:13:18:5b
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
Truncated 847 bytes from beginning
0,758 UART: [art] Lock RT PCRs Done
3,382,126 UART: [art] Populate DV Done
3,390,260 UART: [fht] FMC Alias Private Key: 7
3,391,288 UART: [art] Derive CDI
3,391,568 UART: [art] Store in in slot 0x4
3,477,427 UART: [art] Derive Key Pair
3,477,787 UART: [art] Store priv key in slot 0x5
3,490,897 UART: [art] Derive Key Pair - Done
3,505,432 UART: [art] Signing Cert with AUTHO
3,505,912 UART: RITY.KEYID = 7
3,521,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,521,785 UART: [art] PUB.X = 39D5DB39AA3B5F4DD608A132FCB0F809DD97395C03F010C1FCB35F773EE1601C7A65D2155FA738E79DC303B6E5AF297A
3,528,557 UART: [art] PUB.Y = 3534ECF3DA1A0BE7F6055C52BD15CBE666B2D2A27C3CA2A7460BA18592052DAB32D1829E1E2D558DEC388DF60FA59FDB
3,535,512 UART: [art] SIG.R = D6861B6DAAA98D393247255F37AE56583EAFF83AA08522557167D1356EA91CD594AF2288A0A561C652C960F27B8B6DFF
3,542,286 UART: [art] SIG.S = F3C0A4808C09708AC6F54A620BB6C83FC3024544F1F04ECFD7B7911E99CE8CDE55EA98187162AD55979FE7BAA628F843
3,566,178 UART: Caliptra RT
3,566,431 UART: [state] CFI Enabled
3,674,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,704,441 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,744,052 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,785,647 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:31:e8:e3:b7:37:ff:a8:fe:eb:74:9b:3b:d4:03:d7:31:3c:33:d0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B231E8E3B737FFA8FEEB749B3BD403D7313C33D05771C70921811FB5D18E82E1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:39:d5:db:39:aa:3b:5f:4d:d6:08:a1:32:fc:b0:
f8:09:dd:97:39:5c:03:f0:10:c1:fc:b3:5f:77:3e:
e1:60:1c:7a:65:d2:15:5f:a7:38:e7:9d:c3:03:b6:
e5:af:29:7a:35:34:ec:f3:da:1a:0b:e7:f6:05:5c:
52:bd:15:cb:e6:66:b2:d2:a2:7c:3c:a2:a7:46:0b:
a1:85:92:05:2d:ab:32:d1:82:9e:1e:2d:55:8d:ec:
38:8d:f6:0f:a5:9f:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
B2:31:E8:E3:B7:37:FF:A8:FE:EB:74:9B:3B:D4:03:D7:31:3C:33:D0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d6:86:1b:6d:aa:a9:8d:39:32:47:25:5f:37:
ae:56:58:3e:af:f8:3a:a0:85:22:55:71:67:d1:35:6e:a9:1c:
d5:94:af:22:88:a0:a5:61:c6:52:c9:60:f2:7b:8b:6d:ff:02:
31:00:f3:c0:a4:80:8c:09:70:8a:c6:f5:4a:62:0b:b6:c8:3f:
c3:02:45:44:f1:f0:4e:cf:d7:b7:91:1e:99:ce:8c:de:55:ea:
98:18:71:62:ad:55:97:9f:e7:ba:a6:28:f8:43
3,796,414 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,778,333 >>> mbox cmd response: success
6,791,960 UART:
6,791,976 UART: Running Caliptra FMC ...
6,792,384 UART:
6,792,438 UART: [state] CFI Enabled
6,881,273 UART: [art] Extend RT PCRs Done
6,881,701 UART: [art] Lock RT PCRs Done
6,882,866 UART: [art] Populate DV Done
6,891,146 UART: [fht] FMC Alias Private Key: 7
6,892,098 UART: [art] Derive CDI
6,892,378 UART: [art] Store in in slot 0x4
6,978,125 UART: [art] Derive Key Pair
6,978,485 UART: [art] Store priv key in slot 0x5
6,992,051 UART: [art] Derive Key Pair - Done
7,006,823 UART: [art] Signing Cert with AUTHO
7,007,303 UART: RITY.KEYID = 7
7,022,275 UART: [art] Erasing AUTHORITY.KEYID = 7
7,023,040 UART: [art] PUB.X = 1786F75960F68D255545678811411D0C0A065607C6AB8A8B8D0FCD873BF1B2BFCF6A8113FB8E4CF7EF9FADB65D0501DC
7,029,801 UART: [art] PUB.Y = 0BBDD6DD6227CEFF37A1BA261020901A564D380139B1786CC83F08DF610C60BB6CC22597B51EB91EABB6C40BEE707C6D
7,036,752 UART: [art] SIG.R = 7F26C50E482F3ECD186B6E087580EF584156A31886198F822A328738669F4594468A5BAADB7F371A33B81F17B99B3DD0
7,043,512 UART: [art] SIG.S = 29D25537001D76CBB01E670BA2C75D1283FFBA7DD89A8FAB5C4AA7E4DA9DD1FB2E22606E753A37FB8EE21F166992C6AA
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0c:7f:33:af:9d:49:65:74:4c:ea:3a:37:7d:cd:3a:f8:c8:72:2f:35
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0C7F33AF9D4965744CEA3A377DCD3AF8C8722F35FC43E489D706AE2D840C5519
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:17:86:f7:59:60:f6:8d:25:55:45:67:88:11:41:
1d:0c:0a:06:56:07:c6:ab:8a:8b:8d:0f:cd:87:3b:
f1:b2:bf:cf:6a:81:13:fb:8e:4c:f7:ef:9f:ad:b6:
5d:05:01:dc:0b:bd:d6:dd:62:27:ce:ff:37:a1:ba:
26:10:20:90:1a:56:4d:38:01:39:b1:78:6c:c8:3f:
08:df:61:0c:60:bb:6c:c2:25:97:b5:1e:b9:1e:ab:
b6:c4:0b:ee:70:7c:6d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
0C:7F:33:AF:9D:49:65:74:4C:EA:3A:37:7D:CD:3A:F8:C8:72:2F:35
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7f:26:c5:0e:48:2f:3e:cd:18:6b:6e:08:75:80:
ef:58:41:56:a3:18:86:19:8f:82:2a:32:87:38:66:9f:45:94:
46:8a:5b:aa:db:7f:37:1a:33:b8:1f:17:b9:9b:3d:d0:02:30:
29:d2:55:37:00:1d:76:cb:b0:1e:67:0b:a2:c7:5d:12:83:ff:
ba:7d:d8:9a:8f:ab:5c:4a:a7:e4:da:9d:d1:fb:2e:22:60:6e:
75:3a:37:fb:8e:e2:1f:16:69:92:c6:aa
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
Truncated 5297 bytes from beginning
=0, next_pc=40005400
3,868,441 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,908,340 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,949,895 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:c2:a0:85:ac:39:06:e1:37:61:c9:26:60:1e:17:28:05:59:20:cf
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F4C2A085AC3906E13761C926601E1728055920CF1CEAF263640732F87E97A870
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c9:83:28:cc:7e:fc:4c:1b:7d:f3:8a:9e:61:31:
9c:ba:71:c8:43:3d:f0:84:c7:e5:c4:17:ce:e6:32:
ae:fa:c7:38:3b:90:0f:43:e2:91:7a:fd:f0:bc:36:
48:48:27:65:1f:06:85:e2:e0:71:4e:26:d9:be:e7:
3e:82:b6:64:4d:2f:62:c4:b5:ad:37:d6:c6:9a:4d:
a8:63:09:e5:d4:c5:c3:08:39:d1:f9:c1:2f:6d:5b:
03:b8:d7:51:c2:cb:f3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
F4:C2:A0:85:AC:39:06:E1:37:61:C9:26:60:1E:17:28:05:59:20:CF
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:55:dd:35:24:bd:46:97:c2:a8:2c:ba:4f:b4:fe:
97:20:0e:8e:42:80:8a:24:4b:b6:58:88:94:5c:f7:36:b6:de:
51:3a:9d:9b:89:4a:fc:7d:a1:3a:07:66:30:c6:22:4d:02:30:
60:94:5f:bb:c3:01:9b:18:07:7f:81:9d:aa:0d:da:fc:18:1d:
9f:bb:e9:74:fa:38:9f:3c:1d:de:b9:08:a9:02:62:6c:14:49:
cd:3e:74:ff:60:2f:53:c9:61:d2:f7:61
3,960,699 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,961,441 UART:
3,961,457 UART: Running Caliptra ROM ...
3,961,865 UART:
3,962,007 UART: [state] CFI Enabled
3,965,192 UART: [state] LifecycleState = Production
3,965,800 UART: [state] DebugLocked = Yes
3,966,550 UART: [state] Starting the WD Timer 40000000 cycles
3,968,034 UART: [kat] SHA2-256
4,773,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,777,809 UART: [kat] ++
4,777,961 UART: [kat] sha1
4,782,339 UART: [kat] SHA2-256
4,784,279 UART: [kat] SHA2-384
4,787,150 UART: [kat] SHA2-512-ACC
4,789,050 UART: [kat] ECC-384
4,798,699 UART: [kat] HMAC-384Kdf
4,803,169 UART: [kat] LMS
5,051,497 UART: [kat] --
5,052,557 UART: [update-reset] ++
6,910,266 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,911,431 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
7,058,351 >>> mbox cmd response: success
7,058,453 UART: [update-reset] Copying MAN_2 To MAN_1
7,066,465 UART: [update-reset Success] --
7,067,472 UART: [state] Locking Datavault
7,068,274 UART: [state] Locking PCR0, PCR1 and PCR31
7,068,878 UART: [state] Locking ICCM
7,069,404 UART: [exit] Launching FMC @ 0x40000130
7,074,733 UART:
7,074,749 UART: Running Caliptra FMC ...
7,075,157 UART:
7,075,300 UART: [state] CFI Enabled
7,164,437 UART: [art] Extend RT PCRs Done
7,164,865 UART: [art] Lock RT PCRs Done
7,166,192 UART: [art] Populate DV Done
7,174,562 UART: [fht] FMC Alias Private Key: 7
7,175,656 UART: [art] Derive CDI
7,175,936 UART: [art] Store in in slot 0x4
7,261,721 UART: [art] Derive Key Pair
7,262,081 UART: [art] Store priv key in slot 0x5
7,274,953 UART: [art] Derive Key Pair - Done
7,289,905 UART: [art] Signing Cert with AUTHO
7,290,385 UART: RITY.KEYID = 7
7,305,597 UART: [art] Erasing AUTHORITY.KEYID = 7
7,306,362 UART: [art] PUB.X = 1823EC4F1CFF2FF4E1AC94CFFF13EAED9EE31F319708B93348752543DA7C7F74BB7143F4BD103A0BEC1A9C3CA59673C4
7,313,146 UART: [art] PUB.Y = 4E8B486EA8314B06A805E3BD93EB0B61A2770E912B7CC04A6574A36F07012B6564315AA5F629DFCB52C1007D789393E2
7,320,056 UART: [art] SIG.R = B518D742ADE3B66FC7D5E7DCE4E77FC2D4ED503D81AA42F96CB4782B935B6D0F45FEBCA421B39F598E0DD5170257186B
7,326,835 UART: [art] SIG.S = 95BF23788E90965C16F05657E6C448F4BDDA63657C328AB77CC0CF26585F551A955DB45941D7B32407B10A49DB63CB83
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:f5:87:14:d0:f5:a3:cf:f9:f8:80:c7:f8:5d:7a:30:48:f2:8a:9e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9EF58714D0F5A3CFF9F880C7F85D7A3048F28A9E2692C10B9AE843586C25055C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:18:23:ec:4f:1c:ff:2f:f4:e1:ac:94:cf:ff:13:
ea:ed:9e:e3:1f:31:97:08:b9:33:48:75:25:43:da:
7c:7f:74:bb:71:43:f4:bd:10:3a:0b:ec:1a:9c:3c:
a5:96:73:c4:4e:8b:48:6e:a8:31:4b:06:a8:05:e3:
bd:93:eb:0b:61:a2:77:0e:91:2b:7c:c0:4a:65:74:
a3:6f:07:01:2b:65:64:31:5a:a5:f6:29:df:cb:52:
c1:00:7d:78:93:93:e2
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
9E:F5:87:14:D0:F5:A3:CF:F9:F8:80:C7:F8:5D:7A:30:48:F2:8A:9E
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:b5:18:d7:42:ad:e3:b6:6f:c7:d5:e7:dc:e4:
e7:7f:c2:d4:ed:50:3d:81:aa:42:f9:6c:b4:78:2b:93:5b:6d:
0f:45:fe:bc:a4:21:b3:9f:59:8e:0d:d5:17:02:57:18:6b:02:
31:00:95:bf:23:78:8e:90:96:5c:16:f0:56:57:e6:c4:48:f4:
bd:da:63:65:7c:32:8a:b7:7c:c0:cf:26:58:5f:55:1a:95:5d:
b4:59:41:d7:b3:24:07:b1:0a:49:db:63:cb:83
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 850 bytes from beginning
17 UART: [art] Lock RT PCRs Done
3,374,881 UART: [art] Populate DV Done
3,382,955 UART: [fht] FMC Alias Private Key: 7
3,383,921 UART: [art] Derive CDI
3,384,201 UART: [art] Store in in slot 0x4
3,469,330 UART: [art] Derive Key Pair
3,469,690 UART: [art] Store priv key in slot 0x5
3,483,082 UART: [art] Derive Key Pair - Done
3,497,710 UART: [art] Signing Cert with AUTHO
3,498,190 UART: RITY.KEYID = 7
3,513,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,514,643 UART: [art] PUB.X = BB597028536D11F7DC70F70057DC716465B72E81EA947ED6748C4048BB66651E5480F6D4E8150BF28B7DBD335A57FB0E
3,521,387 UART: [art] PUB.Y = CC14E431339E962C1AB607FA64DEF24E6A62EE8ABA47D21047AD8B75040A2EC62CC07FA25AEF904B933838FE85ED0526
3,528,339 UART: [art] SIG.R = 9F1360F130C8F3907368558D238AE221BFF79F1C81610EA0B7C2EB056066DF6477AD10F7434142CD1ED2D5A055780A5C
3,535,100 UART: [art] SIG.S = 42B6B0A5BDD724B48EFF60C1ECAE184E0256A59A5F1E56209FF4397AF96C2B6C9364F23058A2AE20284DA5AC534CD288
3,559,054 UART: Caliptra RT
3,559,399 UART: [state] CFI Enabled
3,666,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,577 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,282 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,763 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:69:0a:52:c5:75:50:e0:ca:05:0f:fe:87:e0:45:45:b5:19:f4:54
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=81690A52C57550E0CA050FFE87E04545B519F4546D42F097A99947A5A260D6A4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:bb:59:70:28:53:6d:11:f7:dc:70:f7:00:57:dc:
71:64:65:b7:2e:81:ea:94:7e:d6:74:8c:40:48:bb:
66:65:1e:54:80:f6:d4:e8:15:0b:f2:8b:7d:bd:33:
5a:57:fb:0e:cc:14:e4:31:33:9e:96:2c:1a:b6:07:
fa:64:de:f2:4e:6a:62:ee:8a:ba:47:d2:10:47:ad:
8b:75:04:0a:2e:c6:2c:c0:7f:a2:5a:ef:90:4b:93:
38:38:fe:85:ed:05:26
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
81:69:0A:52:C5:75:50:E0:CA:05:0F:FE:87:E0:45:45:B5:19:F4:54
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:9f:13:60:f1:30:c8:f3:90:73:68:55:8d:23:
8a:e2:21:bf:f7:9f:1c:81:61:0e:a0:b7:c2:eb:05:60:66:df:
64:77:ad:10:f7:43:41:42:cd:1e:d2:d5:a0:55:78:0a:5c:02:
30:42:b6:b0:a5:bd:d7:24:b4:8e:ff:60:c1:ec:ae:18:4e:02:
56:a5:9a:5f:1e:56:20:9f:f4:39:7a:f9:6c:2b:6c:93:64:f2:
30:58:a2:ae:20:28:4d:a5:ac:53:4c:d2:88
3,789,775 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,774,794 >>> mbox cmd response: success
6,788,183 UART:
6,788,199 UART: Running Caliptra FMC ...
6,788,607 UART:
6,788,750 UART: [state] CFI Enabled
6,878,379 UART: [art] Extend RT PCRs Done
6,878,807 UART: [art] Lock RT PCRs Done
6,880,178 UART: [art] Populate DV Done
6,888,448 UART: [fht] FMC Alias Private Key: 7
6,889,376 UART: [art] Derive CDI
6,889,656 UART: [art] Store in in slot 0x4
6,975,281 UART: [art] Derive Key Pair
6,975,641 UART: [art] Store priv key in slot 0x5
6,989,151 UART: [art] Derive Key Pair - Done
7,004,179 UART: [art] Signing Cert with AUTHO
7,004,659 UART: RITY.KEYID = 7
7,019,897 UART: [art] Erasing AUTHORITY.KEYID = 7
7,020,662 UART: [art] PUB.X = 8A347EDCF5569F56E4BC1DDD0577AE5FB1F4E01B636217E768691DB8FD7C989DB873B0649D74CBA9E1CAACFF819070F0
7,027,447 UART: [art] PUB.Y = 6F79AFF2875F56EF5D122DC9740E14484855D4AB01C86986A4DA363A032327BC3154059749F3E7C6EB9A37DCE2B19A22
7,034,387 UART: [art] SIG.R = A6E97E133838FA4C725C080858343BA61D5DD1F4386BE18E5268A0F05A6514B30563FC95C03BB0C104E771DE295437D4
7,041,143 UART: [art] SIG.S = D385A80EA3442A414FD8A2E628FDC12583FC2A42A4B5262694E090345B3F1E2B63D806F4411BB1183FEA7F8C0F3333C1
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:6a:db:a5:10:6a:e0:1d:26:2b:1b:ff:c9:2f:80:5f:dc:bd:49:e7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=746ADBA5106AE01D262B1BFFC92F805FDCBD49E7EEAAED76A5940C7C09D8BBC4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8a:34:7e:dc:f5:56:9f:56:e4:bc:1d:dd:05:77:
ae:5f:b1:f4:e0:1b:63:62:17:e7:68:69:1d:b8:fd:
7c:98:9d:b8:73:b0:64:9d:74:cb:a9:e1:ca:ac:ff:
81:90:70:f0:6f:79:af:f2:87:5f:56:ef:5d:12:2d:
c9:74:0e:14:48:48:55:d4:ab:01:c8:69:86:a4:da:
36:3a:03:23:27:bc:31:54:05:97:49:f3:e7:c6:eb:
9a:37:dc:e2:b1:9a:22
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
74:6A:DB:A5:10:6A:E0:1D:26:2B:1B:FF:C9:2F:80:5F:DC:BD:49:E7
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a6:e9:7e:13:38:38:fa:4c:72:5c:08:08:58:
34:3b:a6:1d:5d:d1:f4:38:6b:e1:8e:52:68:a0:f0:5a:65:14:
b3:05:63:fc:95:c0:3b:b0:c1:04:e7:71:de:29:54:37:d4:02:
31:00:d3:85:a8:0e:a3:44:2a:41:4f:d8:a2:e6:28:fd:c1:25:
83:fc:2a:42:a4:b5:26:26:94:e0:90:34:5b:3f:1e:2b:63:d8:
06:f4:41:1b:b1:18:3f:ea:7f:8c:0f:33:33:c1
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
Truncated 5291 bytes from beginning
mtval=0, next_pc=40005400
3,870,869 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,910,534 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,952,163 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5d:a3:93:f0:9b:ba:01:f6:5a:0c:29:df:d4:df:69:5e:a0:3b:c9:c2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D9A393F09BBA01F65A0C29DFD4DF695EA03BC9C29EF4378B0837B96F0AB6EF88
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b4:c3:f8:67:6f:8b:6b:40:e0:e9:91:84:98:af:
41:55:21:74:cf:90:67:37:2c:d2:40:5d:bf:b4:3f:
de:e7:11:1e:97:d0:03:4d:2e:e4:2f:9d:17:ba:ae:
09:a2:fc:34:c4:38:2b:90:3a:d6:bd:bb:9a:8f:8a:
77:cc:a0:1b:78:eb:6c:35:2a:f6:65:53:bc:9c:4b:
57:c4:08:4e:99:7a:64:19:75:2c:e5:8b:c6:01:04:
3b:27:ec:4a:c6:35:d9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
D9:A3:93:F0:9B:BA:01:F6:5A:0C:29:DF:D4:DF:69:5E:A0:3B:C9:C2
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:03:4d:b4:26:93:64:98:6a:0c:f5:21:87:a8:63:
7f:69:e4:16:24:f8:37:0d:7e:ba:c5:5f:96:61:f4:e4:1e:c0:
cb:b0:af:a9:c3:6b:3e:f8:fc:fc:e2:0b:9d:8e:39:17:02:30:
0c:8d:e3:fe:70:fe:e7:46:45:ce:3b:c1:f7:53:1b:23:93:4e:
89:5e:fc:23:bc:49:25:f9:cb:f7:ef:60:dc:96:eb:a6:05:e6:
00:e0:c5:6f:30:f9:b0:06:8c:1e:77:4e
3,963,045 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,963,825 UART:
3,963,841 UART: Running Caliptra ROM ...
3,964,249 UART:
3,964,304 UART: [state] CFI Enabled
3,966,981 UART: [state] LifecycleState = Production
3,967,589 UART: [state] DebugLocked = Yes
3,968,205 UART: [state] Starting the WD Timer 40000000 cycles
3,969,845 UART: [kat] SHA2-256
4,773,395 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,777,524 UART: [kat] ++
4,777,676 UART: [kat] sha1
4,781,910 UART: [kat] SHA2-256
4,783,850 UART: [kat] SHA2-384
4,786,457 UART: [kat] SHA2-512-ACC
4,788,357 UART: [kat] ECC-384
4,798,204 UART: [kat] HMAC-384Kdf
4,802,954 UART: [kat] LMS
5,051,266 UART: [kat] --
5,052,176 UART: [update-reset] ++
6,913,334 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,914,399 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
7,061,319 >>> mbox cmd response: success
7,061,463 UART: [update-reset] Copying MAN_2 To MAN_1
7,069,475 UART: [update-reset Success] --
7,070,676 UART: [state] Locking Datavault
7,071,558 UART: [state] Locking PCR0, PCR1 and PCR31
7,072,162 UART: [state] Locking ICCM
7,072,656 UART: [exit] Launching FMC @ 0x40000130
7,077,985 UART:
7,078,001 UART: Running Caliptra FMC ...
7,078,409 UART:
7,078,463 UART: [state] CFI Enabled
7,167,686 UART: [art] Extend RT PCRs Done
7,168,114 UART: [art] Lock RT PCRs Done
7,169,463 UART: [art] Populate DV Done
7,177,655 UART: [fht] FMC Alias Private Key: 7
7,178,781 UART: [art] Derive CDI
7,179,061 UART: [art] Store in in slot 0x4
7,264,844 UART: [art] Derive Key Pair
7,265,204 UART: [art] Store priv key in slot 0x5
7,277,944 UART: [art] Derive Key Pair - Done
7,292,911 UART: [art] Signing Cert with AUTHO
7,293,391 UART: RITY.KEYID = 7
7,308,765 UART: [art] Erasing AUTHORITY.KEYID = 7
7,309,530 UART: [art] PUB.X = 84B536425043E6D9BE0719AAF688888B78868150459D8FE0A8967415C57696E3937205F71BE89BDB4B29878A118B544B
7,316,282 UART: [art] PUB.Y = 0F8F9EC5F19DBF9E02C031E075EB4CA4E6EF97300871FD5D70DFD3E7C46089F9DD9154756DF2E87998FC2B04599BB1B9
7,323,234 UART: [art] SIG.R = 38044525AE277531C5310049936E204167D65C5B4B62D808BC29D4746433B437695D5E0EBFD0A8399782EA94DC65CDAB
7,329,967 UART: [art] SIG.S = 1388374F558C9FDAFD501F51B5C55AA2D4387613F7D33B71BCB6168E4493A8B3AD67165E96129D12853EF4982BB002DB
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:be:e8:ac:bf:50:db:e5:f6:ec:64:83:dc:dd:a7:79:4e:4e:ba:13
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1ABEE8ACBF50DBE5F6EC6483DCDDA7794E4EBA13506B5B4DFB9896439FB9423F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:b5:36:42:50:43:e6:d9:be:07:19:aa:f6:88:
88:8b:78:86:81:50:45:9d:8f:e0:a8:96:74:15:c5:
76:96:e3:93:72:05:f7:1b:e8:9b:db:4b:29:87:8a:
11:8b:54:4b:0f:8f:9e:c5:f1:9d:bf:9e:02:c0:31:
e0:75:eb:4c:a4:e6:ef:97:30:08:71:fd:5d:70:df:
d3:e7:c4:60:89:f9:dd:91:54:75:6d:f2:e8:79:98:
fc:2b:04:59:9b:b1:b9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
1A:BE:E8:AC:BF:50:DB:E5:F6:EC:64:83:DC:DD:A7:79:4E:4E:BA:13
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:38:04:45:25:ae:27:75:31:c5:31:00:49:93:6e:
20:41:67:d6:5c:5b:4b:62:d8:08:bc:29:d4:74:64:33:b4:37:
69:5d:5e:0e:bf:d0:a8:39:97:82:ea:94:dc:65:cd:ab:02:30:
13:88:37:4f:55:8c:9f:da:fd:50:1f:51:b5:c5:5a:a2:d4:38:
76:13:f7:d3:3b:71:bc:b6:16:8e:44:93:a8:b3:ad:67:16:5e:
96:12:9d:12:85:3e:f4:98:2b:b0:02:db
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 841 bytes from beginning
3,369,478 UART: [art] Lock RT PCRs Done
3,370,952 UART: [art] Populate DV Done
3,379,234 UART: [fht] FMC Alias Private Key: 7
3,380,220 UART: [art] Derive CDI
3,380,500 UART: [art] Store in in slot 0x4
3,466,617 UART: [art] Derive Key Pair
3,466,977 UART: [art] Store priv key in slot 0x5
3,480,161 UART: [art] Derive Key Pair - Done
3,494,966 UART: [art] Signing Cert with AUTHO
3,495,446 UART: RITY.KEYID = 7
3,510,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,511,301 UART: [art] PUB.X = 26059DE033730208284D0B97201EE33324F9AE31303F1FE8C570D6B6E398E6247415AE82DDBDBCFB000C44EB3CBE1035
3,518,038 UART: [art] PUB.Y = 785F2B7BEFF7E78C0F002F7E7E533410C1B91E63D3EC88E55B91CEACCC03228B10AEC602CAA1437ECCDD70DD455ED83A
3,524,981 UART: [art] SIG.R = 1CC9B07E1B66BD934DF44D1EDD0DBC2B611DFF3839B46215E64C1E9561A2CAFB961A7CFEF78F187B207F0333AD799721
3,531,761 UART: [art] SIG.S = 097FA504A75936A92EB7D5609F1E3F617BF85DDA14B78A4CDC375686ABA2A2DA5A61DBDCAAB4B055B3EF220AB7B2D520
3,555,193 UART: Caliptra RT
3,555,446 UART: [state] CFI Enabled
3,663,456 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,694,109 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,733,854 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,775,147 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:49:4d:a6:a9:a5:75:02:5c:24:f7:3a:7d:bb:e0:d8:86:67:ee:b0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EB494DA6A9A575025C24F73A7DBBE0D88667EEB0925A53B26212FE387DC13B2D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:26:05:9d:e0:33:73:02:08:28:4d:0b:97:20:1e:
e3:33:24:f9:ae:31:30:3f:1f:e8:c5:70:d6:b6:e3:
98:e6:24:74:15:ae:82:dd:bd:bc:fb:00:0c:44:eb:
3c:be:10:35:78:5f:2b:7b:ef:f7:e7:8c:0f:00:2f:
7e:7e:53:34:10:c1:b9:1e:63:d3:ec:88:e5:5b:91:
ce:ac:cc:03:22:8b:10:ae:c6:02:ca:a1:43:7e:cc:
dd:70:dd:45:5e:d8:3a
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
EB:49:4D:A6:A9:A5:75:02:5C:24:F7:3A:7D:BB:E0:D8:86:67:EE:B0
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:1c:c9:b0:7e:1b:66:bd:93:4d:f4:4d:1e:dd:0d:
bc:2b:61:1d:ff:38:39:b4:62:15:e6:4c:1e:95:61:a2:ca:fb:
96:1a:7c:fe:f7:8f:18:7b:20:7f:03:33:ad:79:97:21:02:30:
09:7f:a5:04:a7:59:36:a9:2e:b7:d5:60:9f:1e:3f:61:7b:f8:
5d:da:14:b7:8a:4c:dc:37:56:86:ab:a2:a2:da:5a:61:db:dc:
aa:b4:b0:55:b3:ef:22:0a:b7:b2:d5:20
3,785,997 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,756,270 >>> mbox cmd response: success
6,769,783 UART:
6,769,799 UART: Running Caliptra FMC ...
6,770,207 UART:
6,770,261 UART: [state] CFI Enabled
6,859,576 UART: [art] Extend RT PCRs Done
6,860,004 UART: [art] Lock RT PCRs Done
6,861,389 UART: [art] Populate DV Done
6,869,433 UART: [fht] FMC Alias Private Key: 7
6,870,407 UART: [art] Derive CDI
6,870,687 UART: [art] Store in in slot 0x4
6,956,378 UART: [art] Derive Key Pair
6,956,738 UART: [art] Store priv key in slot 0x5
6,970,090 UART: [art] Derive Key Pair - Done
6,984,627 UART: [art] Signing Cert with AUTHO
6,985,107 UART: RITY.KEYID = 7
7,000,149 UART: [art] Erasing AUTHORITY.KEYID = 7
7,000,914 UART: [art] PUB.X = E9ADAE609A0B878225F4FAD9FA1DD4569CCCB1C0D99325E7F12BBA3222D7CE494BA4028E9C0A40D2C734AFD5E14BF5D2
7,007,699 UART: [art] PUB.Y = 5630A065D5282E58D9729FFEA52AD57256B6E790BD2844DB62CC7D5DBBE16D06AE3B906BA03DD82AE629DFEE9D471D73
7,014,662 UART: [art] SIG.R = 3C5B62C7D1208F538BB8AA3AF10A5ABBFB09190EAF414AF6AB518621CE2815C7C56BE11E75931B9038FC012C77D1E555
7,021,432 UART: [art] SIG.S = 1272ACE3AA195664CA9943392B8B08590E85F31123B728234D2FCD110B27CD41FEB53E70461F0FCE90B5F3269C8DAE00
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
46:16:e4:39:29:2d:1a:e8:57:88:c6:b8:c4:05:d3:d5:af:4d:25:ce
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C216E439292D1AE85788C6B8C405D3D5AF4D25CED8B2729BF65AD8D3320ABB63
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e9:ad:ae:60:9a:0b:87:82:25:f4:fa:d9:fa:1d:
d4:56:9c:cc:b1:c0:d9:93:25:e7:f1:2b:ba:32:22:
d7:ce:49:4b:a4:02:8e:9c:0a:40:d2:c7:34:af:d5:
e1:4b:f5:d2:56:30:a0:65:d5:28:2e:58:d9:72:9f:
fe:a5:2a:d5:72:56:b6:e7:90:bd:28:44:db:62:cc:
7d:5d:bb:e1:6d:06:ae:3b:90:6b:a0:3d:d8:2a:e6:
29:df:ee:9d:47:1d:73
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
C2:16:E4:39:29:2D:1A:E8:57:88:C6:B8:C4:05:D3:D5:AF:4D:25:CE
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:3c:5b:62:c7:d1:20:8f:53:8b:b8:aa:3a:f1:0a:
5a:bb:fb:09:19:0e:af:41:4a:f6:ab:51:86:21:ce:28:15:c7:
c5:6b:e1:1e:75:93:1b:90:38:fc:01:2c:77:d1:e5:55:02:30:
12:72:ac:e3:aa:19:56:64:ca:99:43:39:2b:8b:08:59:0e:85:
f3:11:23:b7:28:23:4d:2f:cd:11:0b:27:cd:41:fe:b5:3e:70:
46:1f:0f:ce:90:b5:f3:26:9c:8d:ae:00
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
Truncated 5297 bytes from beginning
=0, next_pc=40005400
3,878,521 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,918,212 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,959,717 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:36:8b:74:9e:24:17:a2:d4:c5:d5:b6:69:1b:e8:45:24:21:f5:61
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B3368B749E2417A2D4C5D5B6691BE8452421F56104E9F66D9587C9BD922C793F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e6:8c:c2:28:b0:7b:a8:f7:45:22:70:5b:89:ff:
83:ab:61:b0:13:a9:75:d0:92:71:db:97:a5:3b:e3:
26:27:89:69:05:ff:e4:34:0a:f1:cf:0e:74:a3:e6:
4c:05:5f:f4:94:74:7b:17:fd:87:4a:23:56:65:f7:
8c:da:58:f5:d4:df:4b:ef:57:8d:b8:1f:9b:4d:6b:
73:84:78:1e:94:43:70:0a:e3:0c:43:0d:f3:61:48:
28:8a:55:cf:1f:e1:9c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
B3:36:8B:74:9E:24:17:A2:D4:C5:D5:B6:69:1B:E8:45:24:21:F5:61
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:a4:2b:d2:12:5f:c4:3d:24:f2:d8:7f:91:90:
0a:4d:05:2d:fe:1a:45:69:3c:28:83:c4:12:a4:b1:1e:81:db:
17:fa:ae:84:33:07:05:f7:54:8e:09:19:cc:ea:60:41:8b:02:
30:18:f0:13:a8:90:c7:a1:74:f2:76:d2:a6:41:c1:4e:bf:79:
be:2c:b3:c4:71:62:79:15:d5:9d:6f:34:2b:09:21:26:7e:c7:
49:2c:15:82:6b:1c:e4:3b:83:ee:5c:8f:4e
3,970,505 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,971,165 UART:
3,971,181 UART: Running Caliptra ROM ...
3,971,589 UART:
3,971,731 UART: [state] CFI Enabled
3,974,630 UART: [state] LifecycleState = Production
3,975,238 UART: [state] DebugLocked = Yes
3,975,840 UART: [state] Starting the WD Timer 40000000 cycles
3,977,512 UART: [kat] SHA2-256
4,781,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,785,191 UART: [kat] ++
4,785,343 UART: [kat] sha1
4,789,595 UART: [kat] SHA2-256
4,791,535 UART: [kat] SHA2-384
4,794,404 UART: [kat] SHA2-512-ACC
4,796,304 UART: [kat] ECC-384
4,806,245 UART: [kat] HMAC-384Kdf
4,810,653 UART: [kat] LMS
5,058,965 UART: [kat] --
5,059,879 UART: [update-reset] ++
6,911,845 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,912,804 UART: [update-reset] Loading Runtime at addr 0x40005000 len 87712
7,059,724 >>> mbox cmd response: success
7,060,002 UART: [update-reset] Copying MAN_2 To MAN_1
7,068,014 UART: [update-reset Success] --
7,069,067 UART: [state] Locking Datavault
7,069,927 UART: [state] Locking PCR0, PCR1 and PCR31
7,070,531 UART: [state] Locking ICCM
7,071,019 UART: [exit] Launching FMC @ 0x40000130
7,076,348 UART:
7,076,364 UART: Running Caliptra FMC ...
7,076,772 UART:
7,076,915 UART: [state] CFI Enabled
7,165,798 UART: [art] Extend RT PCRs Done
7,166,226 UART: [art] Lock RT PCRs Done
7,167,481 UART: [art] Populate DV Done
7,175,735 UART: [fht] FMC Alias Private Key: 7
7,176,835 UART: [art] Derive CDI
7,177,115 UART: [art] Store in in slot 0x4
7,262,992 UART: [art] Derive Key Pair
7,263,352 UART: [art] Store priv key in slot 0x5
7,276,424 UART: [art] Derive Key Pair - Done
7,291,508 UART: [art] Signing Cert with AUTHO
7,291,988 UART: RITY.KEYID = 7
7,307,020 UART: [art] Erasing AUTHORITY.KEYID = 7
7,307,785 UART: [art] PUB.X = FFF006CD7F092D62461A1FA272E4FD7570AA820B002FAB604370E0A00B5F64B49AA194F6FE67D0C78A0EB85DE6BF6DE7
7,314,536 UART: [art] PUB.Y = 6EE10BAC06156647B799D81391BDEDC6112B6CC8B1E2DAF15AC0BD3E9BD4D5D49C7F1E2E9FD5CAA697B36C17DA2A5F39
7,321,506 UART: [art] SIG.R = B81563284CE5B0839B023FE2A6BB9DCC79BCCA638B6E5F69D6770AA7B8D84C8CC2A8450E505EB45178F4B1A0502ABBB7
7,328,283 UART: [art] SIG.S = 6484FAC6D9CD1CD2B745D843D7FA15633E8BC8684C4F128744AE826E48ECE1DCAB29D5B73374BCFB7EB9F594127893D1
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:a6:f2:dc:ee:9e:c7:44:2f:8e:10:2c:99:aa:7c:ca:32:08:57:68
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=FDA6F2DCEE9EC7442F8E102C99AA7CCA32085768BA1E6160918EB99FC5F4EC78
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ff:f0:06:cd:7f:09:2d:62:46:1a:1f:a2:72:e4:
fd:75:70:aa:82:0b:00:2f:ab:60:43:70:e0:a0:0b:
5f:64:b4:9a:a1:94:f6:fe:67:d0:c7:8a:0e:b8:5d:
e6:bf:6d:e7:6e:e1:0b:ac:06:15:66:47:b7:99:d8:
13:91:bd:ed:c6:11:2b:6c:c8:b1:e2:da:f1:5a:c0:
bd:3e:9b:d4:d5:d4:9c:7f:1e:2e:9f:d5:ca:a6:97:
b3:6c:17:da:2a:5f:39
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
FD:A6:F2:DC:EE:9E:C7:44:2F:8E:10:2C:99:AA:7C:CA:32:08:57:68
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b8:15:63:28:4c:e5:b0:83:9b:02:3f:e2:a6:
bb:9d:cc:79:bc:ca:63:8b:6e:5f:69:d6:77:0a:a7:b8:d8:4c:
8c:c2:a8:45:0e:50:5e:b4:51:78:f4:b1:a0:50:2a:bb:b7:02:
30:64:84:fa:c6:d9:cd:1c:d2:b7:45:d8:43:d7:fa:15:63:3e:
8b:c8:68:4c:4f:12:87:44:ae:82:6e:48:ec:e1:dc:ab:29:d5:
b7:33:74:bc:fb:7e:b9:f5:94:12:78:93:d1
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.20s
Truncated 853 bytes from beginning
UART: [art] Lock RT PCRs Done
3,373,648 UART: [art] Populate DV Done
3,381,714 UART: [fht] FMC Alias Private Key: 7
3,382,822 UART: [art] Derive CDI
3,383,102 UART: [art] Store in in slot 0x4
3,469,063 UART: [art] Derive Key Pair
3,469,423 UART: [art] Store priv key in slot 0x5
3,483,047 UART: [art] Derive Key Pair - Done
3,497,817 UART: [art] Signing Cert with AUTHO
3,498,297 UART: RITY.KEYID = 7
3,513,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,514,004 UART: [art] PUB.X = E738FA396734D24A83F3D5D8C8584F18EB63E0127BD344F1308C60993B602C8F6A917BE74FE8CC7AAD1D0584B6F21503
3,520,772 UART: [art] PUB.Y = E8D0395C6552EC3CDA481D2E5A454C5BEA6F67DADFA0FDDCFC20F2070AE0030DB00A9E5C7FABDA9DCF1ED7D12FE173FC
3,527,745 UART: [art] SIG.R = D681F41308BF6E79CB6FF5F94EE299C59F5B24C699F3D5CD53378A8FDE4D79B8589201CBF245E0698DAB4876E9CF4C18
3,534,521 UART: [art] SIG.S = CE9C9153639A8769DCA7777E839CC852F2DCC62C99593FEBC15A1EDB56D7E99AFC55D6DFC7F61D24C5B08B6C9C5B8FA0
3,558,264 UART: Caliptra RT
3,558,609 UART: [state] CFI Enabled
3,666,836 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,697,161 UART: [rt]cmd =0x4c444556, len=4
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,737,162 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:f4:bf:35:43:23:19:bb:dd:6e:5c:13:ed:cf:91:53:07:ce:a2:69
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:80:a1:3f:7d:5a:83:c5:58:52:f0:3c:5a:d4:d6:
18:64:49:57:4a:07:b6:69:5b:03:73:df:b1:a6:95:
2e:f2:04:14:9b:de:fe:fb:c6:be:ef:b9:92:f5:36:
e3:50:ad:fd:1d:fc:69:fe:52:d0:60:1a:ca:39:48:
61:2d:b1:2b:ed:a7:ea:2b:18:35:b1:aa:df:a0:a4:
d3:a4:2e:4c:f4:79:8c:06:91:0f:57:de:86:42:84:
7a:b2:86:b2:4e:47:b5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0E...fT.N..5..s......v#pN....6$.....0..y.(...=Lx..FMC_INFO
X509v3 Subject Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:07:e3:de:cb:52:2f:f1:1d:25:69:62:fa:4d:40:
b4:2f:f5:31:d7:53:09:c5:22:f0:d4:2e:af:0d:7a:81:ec:2e:
85:b2:c8:48:11:2f:4b:bb:52:e3:33:66:83:b2:d2:70:02:30:
2f:f3:7b:66:7e:5d:fc:ee:7e:ba:87:18:d9:ca:d7:31:7d:d6:
7b:07:bc:86:92:34:43:2a:b7:01:aa:81:5e:39:fa:cc:5b:33:
81:44:87:23:f8:2b:ad:1b:8d:e2:77:6c
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,778,781 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [0b, ef, 13, b4, 8b, 09, 19, ff, 42, ff, ba, 1e, d7, 27, fc, ad, b5, 75, 1d, c8, 3b, 74, a2, 0d, 75, 90, 1a, 4c, be, 7a, 5d, 91, 60, a9, 00, 25, 80, 0f, b9, 2c, da, 6c, 78, 00, 03, 8b, 90, 5f]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
54:aa:06:11:27:26:b9:46:f8:dd:12:d1:05:15:d0:e3:80:ce:1d:63
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=54AA06112726B946F8DD12D10515D0E380CE1D6382D71AC645C70F94E1C7C706
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e7:38:fa:39:67:34:d2:4a:83:f3:d5:d8:c8:58:
4f:18:eb:63:e0:12:7b:d3:44:f1:30:8c:60:99:3b:
60:2c:8f:6a:91:7b:e7:4f:e8:cc:7a:ad:1d:05:84:
b6:f2:15:03:e8:d0:39:5c:65:52:ec:3c:da:48:1d:
2e:5a:45:4c:5b:ea:6f:67:da:df:a0:fd:dc:fc:20:
f2:07:0a:e0:03:0d:b0:0a:9e:5c:7f:ab:da:9d:cf:
1e:d7:d1:2f:e1:73:fc
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0...........B..'...u..t;L..u.]z.%..`,....xl._.....RT_INFO
X509v3 Subject Key Identifier:
54:AA:06:11:27:26:B9:46:F8:DD:12:D1:05:15:D0:E3:80:CE:1D:63
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:d6:81:f4:13:08:bf:6e:79:cb:6f:f5:f9:4e:
e2:99:c5:9f:5b:24:c6:99:f3:d5:cd:53:37:8a:8f:de:4d:79:
b8:58:92:01:cb:f2:45:e0:69:8d:ab:48:76:e9:cf:4c:18:02:
31:00:ce:9c:91:53:63:9a:87:69:dc:a7:77:7e:83:9c:c8:52:
f2:dc:c6:2c:99:59:3f:eb:c1:5a:1e:db:56:d7:e9:9a:fc:55:
d6:df:c7:f6:1d:24:c5:b0:8b:6c:9c:5b:8f:a0
3,789,580 <<< Executing mbox cmd 0x46574c44 (112396 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,758,992 >>> mbox cmd response: success
6,772,335 UART:
6,772,351 UART: Running Caliptra FMC ...
6,772,759 UART:
6,772,902 UART: [state] CFI Enabled
6,861,731 UART: [art] Extend RT PCRs Done
6,862,159 UART: [art] Lock RT PCRs Done
6,863,476 UART: [art] Populate DV Done
6,871,766 UART: [fht] FMC Alias Private Key: 7
6,872,710 UART: [art] Derive CDI
6,872,990 UART: [art] Store in in slot 0x4
6,958,509 UART: [art] Derive Key Pair
6,958,869 UART: [art] Store priv key in slot 0x5
6,972,051 UART: [art] Derive Key Pair - Done
6,986,927 UART: [art] Signing Cert with AUTHO
6,987,407 UART: RITY.KEYID = 7
7,002,931 UART: [art] Erasing AUTHORITY.KEYID = 7
7,003,696 UART: [art] PUB.X = 19EC23B4541901D1447863B6E8FFE6891598A2E8D644AC72615D5183CAA2373902E9EEB3AAD3108C1955C5ED95B878EA
7,010,462 UART: [art] PUB.Y = 0BB68B5DEAAD0A8D8BA7DCE1F3FE4230E68DEC28716BA8AE590289035D20FE5B7FD15FB6974B15F0722ACAC176113C67
7,017,420 UART: [art] SIG.R = B066DFC9D76457D99FAEA5A54AACEFF1DAD0931D1CCCC12B30F4993243A3129FBE80FAF9FD9BB5A6F2519BECC4FDF653
7,024,222 UART: [art] SIG.S = C905E12136E34C4536A292E9C4B6D52756B773C796BDAFF43DA1D231DB55A8919B3927CBB45B170373767773D733F2B3
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:32:48:5c:9b:7a:d2:e1:e8:fe:f6:b5:3b:b2:ee:e4:2e:80:dd:3a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=F4F4BF35432319BBDD6E5C13EDCF915307CEA2695BAFCE295BE47D5AFE073E41
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8432485C9B7AD2E1E8FEF6B53BB2EEE42E80DD3AB0AD05CDA056B6763C2FE17F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:19:ec:23:b4:54:19:01:d1:44:78:63:b6:e8:ff:
e6:89:15:98:a2:e8:d6:44:ac:72:61:5d:51:83:ca:
a2:37:39:02:e9:ee:b3:aa:d3:10:8c:19:55:c5:ed:
95:b8:78:ea:0b:b6:8b:5d:ea:ad:0a:8d:8b:a7:dc:
e1:f3:fe:42:30:e6:8d:ec:28:71:6b:a8:ae:59:02:
89:03:5d:20:fe:5b:7f:d1:5f:b6:97:4b:15:f0:72:
2a:ca:c1:76:11:3c:67
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0.3....o..
.OK.?.B..G....^.3s....d.U...hb';l...Z..RT_INFO
X509v3 Subject Key Identifier:
84:32:48:5C:9B:7A:D2:E1:E8:FE:F6:B5:3B:B2:EE:E4:2E:80:DD:3A
X509v3 Authority Key Identifier:
F4:F4:BF:35:43:23:19:BB:DD:6E:5C:13:ED:CF:91:53:07:CE:A2:69
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:b0:66:df:c9:d7:64:57:d9:9f:ae:a5:a5:4a:
ac:ef:f1:da:d0:93:1d:1c:cc:c1:2b:30:f4:99:32:43:a3:12:
9f:be:80:fa:f9:fd:9b:b5:a6:f2:51:9b:ec:c4:fd:f6:53:02:
31:00:c9:05:e1:21:36:e3:4c:45:36:a2:92:e9:c4:b6:d5:27:
56:b7:73:c7:96:bd:af:f4:3d:a1:d2:31:db:55:a8:91:9b:39:
27:cb:b4:5b:17:03:73:76:77:73:d7:33:f2:b3
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,521 UART:
192,884 UART: Running Caliptra ROM ...
194,053 UART:
194,239 UART: [state] CFI Enabled
263,586 UART: [state] LifecycleState = Unprovisioned
265,555 UART: [state] DebugLocked = No
267,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,443 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
419,651 UART: [kat] SHA2-256
441,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,391 UART: [kat] ++
452,889 UART: [kat] sha1
463,013 UART: [kat] SHA2-256
465,709 UART: [kat] SHA2-384
470,771 UART: [kat] SHA2-512-ACC
473,160 UART: [kat] ECC-384
2,768,871 UART: [kat] HMAC-384Kdf
2,801,588 UART: [kat] LMS
3,991,894 UART: [kat] --
3,995,103 UART: [cold-reset] ++
3,997,039 UART: [fht] Storing FHT @ 0x50003400
4,007,657 UART: [idev] ++
4,008,273 UART: [idev] CDI.KEYID = 6
4,009,166 UART: [idev] SUBJECT.KEYID = 7
4,010,383 UART: [idev] UDS.KEYID = 0
4,035,991 UART: [idev] Erasing UDS.KEYID = 0
7,345,474 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,748 UART: [idev] --
7,373,065 UART: [ldev] ++
7,373,636 UART: [ldev] CDI.KEYID = 6
7,374,598 UART: [ldev] SUBJECT.KEYID = 5
7,375,805 UART: [ldev] AUTHORITY.KEYID = 7
7,377,087 UART: [ldev] FE.KEYID = 1
7,424,355 UART: [ldev] Erasing FE.KEYID = 1
10,754,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,114 UART: [ldev] --
13,132,085 UART: [fwproc] Waiting for Commands...
13,135,423 UART: [fwproc] Received command 0x46574c44
13,137,604 UART: [fwproc] Received Image of size 113844 bytes
17,180,636 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,156 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,325,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,641,601 >>> mbox cmd response: success
17,646,370 UART: [afmc] ++
17,646,951 UART: [afmc] CDI.KEYID = 6
17,647,912 UART: [afmc] SUBJECT.KEYID = 7
17,649,147 UART: [afmc] AUTHORITY.KEYID = 5
21,020,073 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,094 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,365 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,340,763 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,355,605 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,027 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,392,845 UART: [afmc] --
23,396,703 UART: [cold-reset] --
23,399,588 UART: [state] Locking Datavault
23,403,375 UART: [state] Locking PCR0, PCR1 and PCR31
23,405,128 UART: [state] Locking ICCM
23,407,147 UART: [exit] Launching FMC @ 0x40000130
23,415,492 UART:
23,415,771 UART: Running Caliptra FMC ...
23,416,879 UART:
23,417,053 UART: [state] CFI Enabled
23,481,852 UART: [fht] FMC Alias Private Key: 7
25,820,056 UART: [art] Extend RT PCRs Done
25,821,269 UART: [art] Lock RT PCRs Done
25,822,859 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
191,797 UART:
192,152 UART: Running Caliptra ROM ...
193,321 UART:
193,472 UART: [state] CFI Enabled
261,403 UART: [state] LifecycleState = Unprovisioned
263,393 UART: [state] DebugLocked = Yes
265,173 UART: [state] Starting the Watchdog Timer 25551804 cycles
270,472 UART: [kat] SHA2-256
440,174 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,659 UART: [kat] ++
451,231 UART: [kat] sha1
461,324 UART: [kat] SHA2-256
463,970 UART: [kat] SHA2-384
469,102 UART: [kat] SHA2-512-ACC
471,463 UART: [kat] ECC-384
2,765,274 UART: [kat] HMAC-384Kdf
2,797,129 UART: [kat] LMS
3,987,370 UART: [kat] --
3,990,609 UART: [cold-reset] ++
3,992,537 UART: [fht] Storing FHT @ 0x50003400
4,003,113 UART: [idev] ++
4,003,722 UART: [idev] CDI.KEYID = 6
4,004,644 UART: [idev] SUBJECT.KEYID = 7
4,005,893 UART: [idev] UDS.KEYID = 0
4,006,946 ready_for_fw is high
4,007,143 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,150,170 UART: [idev] Erasing UDS.KEYID = 0
7,341,640 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,900 UART: [idev] --
7,369,191 UART: [ldev] ++
7,369,765 UART: [ldev] CDI.KEYID = 6
7,370,722 UART: [ldev] SUBJECT.KEYID = 5
7,371,931 UART: [ldev] AUTHORITY.KEYID = 7
7,373,206 UART: [ldev] FE.KEYID = 1
7,420,173 UART: [ldev] Erasing FE.KEYID = 1
10,750,533 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,530 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,060,068 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,074,705 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,089,057 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,108,643 UART: [ldev] --
13,112,606 UART: [fwproc] Waiting for Commands...
13,115,944 UART: [fwproc] Received command 0x46574c44
13,118,313 UART: [fwproc] Received Image of size 113844 bytes
17,161,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,236,675 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,305,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,622,131 >>> mbox cmd response: success
17,626,894 UART: [afmc] ++
17,627,533 UART: [afmc] CDI.KEYID = 6
17,628,610 UART: [afmc] SUBJECT.KEYID = 7
17,629,718 UART: [afmc] AUTHORITY.KEYID = 5
20,983,800 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,896 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,304,423 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,319,199 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,333,482 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,356,407 UART: [afmc] --
23,360,231 UART: [cold-reset] --
23,363,164 UART: [state] Locking Datavault
23,366,959 UART: [state] Locking PCR0, PCR1 and PCR31
23,368,684 UART: [state] Locking ICCM
23,370,649 UART: [exit] Launching FMC @ 0x40000130
23,379,044 UART:
23,379,283 UART: Running Caliptra FMC ...
23,380,380 UART:
23,380,538 UART: [state] CFI Enabled
23,446,142 UART: [fht] FMC Alias Private Key: 7
25,784,223 UART: [art] Extend RT PCRs Done
25,785,490 UART: [art] Lock RT PCRs Done
25,787,089 UART: [art] Populate DV Done
25,792,507 UART: [fht] FMC Alias Private Key: 7
25,794,094 UART: [art] Derive CDI
25,794,837 UART: [art] Store in in slot 0x4
25,821,113 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002970error_internal_intr_r=00000040
25,824,595 UART: WDT Expired
25,825,149 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
269,427 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,861,320 >>> mbox cmd response: success
23,567,436 UART:
23,567,931 UART: Running Caliptra FMC ...
23,569,050 UART:
23,569,211 UART: [state] CFI Enabled
23,635,475 UART: [fht] FMC Alias Private Key: 7
25,973,494 UART: [art] Extend RT PCRs Done
25,974,719 UART: [art] Lock RT PCRs Done
25,976,315 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,863 writing to cptra_bootfsm_go
3,800,792 ready_for_fw is high
3,801,244 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,860,211 >>> mbox cmd response: success
23,565,287 UART:
23,565,676 UART: Running Caliptra FMC ...
23,566,818 UART:
23,566,974 UART: [state] CFI Enabled
23,634,522 UART: [fht] FMC Alias Private Key: 7
25,972,546 UART: [art] Extend RT PCRs Done
25,973,778 UART: [art] Lock RT PCRs Done
25,975,105 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400016B6error_internal_intr_r=00000040
25,978,656 UART: WDT Expired
25,979,213 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,471 UART:
192,835 UART: Running Caliptra ROM ...
194,009 UART:
603,447 UART: [state] CFI Enabled
620,830 UART: [state] LifecycleState = Unprovisioned
622,768 UART: [state] DebugLocked = No
625,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
634,967 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
778,004 UART: [kat] SHA2-256
800,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,945 UART: [kat] ++
811,477 UART: [kat] sha1
822,089 UART: [kat] SHA2-256
824,769 UART: [kat] SHA2-384
830,359 UART: [kat] SHA2-512-ACC
832,701 UART: [kat] ECC-384
3,118,081 UART: [kat] HMAC-384Kdf
3,130,111 UART: [kat] LMS
4,320,229 UART: [kat] --
4,324,249 UART: [cold-reset] ++
4,325,802 UART: [fht] Storing FHT @ 0x50003400
4,336,685 UART: [idev] ++
4,337,310 UART: [idev] CDI.KEYID = 6
4,338,218 UART: [idev] SUBJECT.KEYID = 7
4,339,478 UART: [idev] UDS.KEYID = 0
4,355,209 UART: [idev] Erasing UDS.KEYID = 0
7,628,186 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,020 UART: [idev] --
7,654,185 UART: [ldev] ++
7,654,754 UART: [ldev] CDI.KEYID = 6
7,655,722 UART: [ldev] SUBJECT.KEYID = 5
7,656,935 UART: [ldev] AUTHORITY.KEYID = 7
7,658,214 UART: [ldev] FE.KEYID = 1
7,670,059 UART: [ldev] Erasing FE.KEYID = 1
10,956,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,186 UART: [ldev] --
13,316,333 UART: [fwproc] Waiting for Commands...
13,318,803 UART: [fwproc] Received command 0x46574c44
13,320,978 UART: [fwproc] Received Image of size 113844 bytes
17,359,430 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,432,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,782 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,819,010 >>> mbox cmd response: success
17,823,869 UART: [afmc] ++
17,824,475 UART: [afmc] CDI.KEYID = 6
17,825,390 UART: [afmc] SUBJECT.KEYID = 7
17,826,603 UART: [afmc] AUTHORITY.KEYID = 5
21,143,844 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,463 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,768 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,455,095 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,952 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,484,423 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,506,295 UART: [afmc] --
23,509,708 UART: [cold-reset] --
23,514,275 UART: [state] Locking Datavault
23,519,512 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,264 UART: [state] Locking ICCM
23,523,607 UART: [exit] Launching FMC @ 0x40000130
23,531,995 UART:
23,532,229 UART: Running Caliptra FMC ...
23,533,323 UART:
23,533,476 UART: [state] CFI Enabled
23,541,698 UART: [fht] FMC Alias Private Key: 7
25,872,568 UART: [art] Extend RT PCRs Done
25,873,787 UART: [art] Lock RT PCRs Done
25,875,327 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,013 UART:
192,366 UART: Running Caliptra ROM ...
193,534 UART:
603,372 UART: [state] CFI Enabled
620,724 UART: [state] LifecycleState = Unprovisioned
622,730 UART: [state] DebugLocked = Yes
625,649 UART: [state] Starting the Watchdog Timer 25245823 cycles
631,020 UART: [kat] SHA2-256
800,754 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,291 UART: [kat] ++
811,813 UART: [kat] sha1
822,472 UART: [kat] SHA2-256
825,195 UART: [kat] SHA2-384
830,752 UART: [kat] SHA2-512-ACC
833,116 UART: [kat] ECC-384
3,118,516 UART: [kat] HMAC-384Kdf
3,130,547 UART: [kat] LMS
4,320,638 UART: [kat] --
4,324,652 UART: [cold-reset] ++
4,326,244 UART: [fht] Storing FHT @ 0x50003400
4,337,109 UART: [idev] ++
4,337,672 UART: [idev] CDI.KEYID = 6
4,338,700 UART: [idev] SUBJECT.KEYID = 7
4,339,866 UART: [idev] UDS.KEYID = 0
4,340,857 ready_for_fw is high
4,341,054 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,030 UART: [idev] Erasing UDS.KEYID = 0
7,628,600 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,473 UART: [idev] --
7,654,622 UART: [ldev] ++
7,655,185 UART: [ldev] CDI.KEYID = 6
7,656,149 UART: [ldev] SUBJECT.KEYID = 5
7,657,371 UART: [ldev] AUTHORITY.KEYID = 7
7,658,657 UART: [ldev] FE.KEYID = 1
7,670,524 UART: [ldev] Erasing FE.KEYID = 1
10,957,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,464 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,973 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,653 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,293,032 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,311,374 UART: [ldev] --
13,316,525 UART: [fwproc] Waiting for Commands...
13,318,987 UART: [fwproc] Received command 0x46574c44
13,321,162 UART: [fwproc] Received Image of size 113844 bytes
17,359,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,433,048 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,501,960 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,819,176 >>> mbox cmd response: success
17,824,054 UART: [afmc] ++
17,824,677 UART: [afmc] CDI.KEYID = 6
17,825,591 UART: [afmc] SUBJECT.KEYID = 7
17,826,807 UART: [afmc] AUTHORITY.KEYID = 5
21,144,154 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,438,780 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,441,080 UART: [afmc] PUB.X = 11A9D987A8612B9A1E6CF332FEAA44682CEC1A8997B78C2C894D3037B573BDDF0ED0421E939753382648BFB0DDF5ED68
23,455,619 UART: [afmc] PUB.Y = 6A09E7024ED0376A9DEB2A80F1C6253B4C261F9CF4DAF02D838FE7C16A02E91E43C4DE0E42A02F28C6766A7F38F19B8F
23,470,417 UART: [afmc] SIG.R = 9FC17C871FD5D2A0EC7A3D3EE39653E088E649393624126F616BBA05333DA8363D3806D8FB54EFAAC6E0108F91DA7002
23,484,722 UART: [afmc] SIG.S = 4BF7A07E9CA28D2B285EADBC82C90784D59A357DAEABD5018ABF36A9030EB929903FF1FF786503001F0B621D4217F977
23,506,732 UART: [afmc] --
23,510,095 UART: [cold-reset] --
23,514,668 UART: [state] Locking Datavault
23,519,870 UART: [state] Locking PCR0, PCR1 and PCR31
23,521,620 UART: [state] Locking ICCM
23,523,962 UART: [exit] Launching FMC @ 0x40000130
23,532,379 UART:
23,532,616 UART: Running Caliptra FMC ...
23,533,717 UART:
23,533,881 UART: [state] CFI Enabled
23,542,090 UART: [fht] FMC Alias Private Key: 7
25,872,975 UART: [art] Extend RT PCRs Done
25,874,255 UART: [art] Lock RT PCRs Done
25,875,632 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E4error_internal_intr_r=00000040
25,879,111 UART: WDT Expired
25,879,667 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
625,855 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,055,227 >>> mbox cmd response: success
23,700,385 UART:
23,700,846 UART: Running Caliptra FMC ...
23,701,967 UART:
23,702,127 UART: [state] CFI Enabled
23,710,116 UART: [fht] FMC Alias Private Key: 7
26,040,907 UART: [art] Extend RT PCRs Done
26,042,144 UART: [art] Lock RT PCRs Done
26,043,690 UART: [art] Populate DV Done
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
4,131,541 ready_for_fw is high
4,132,004 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,055,512 >>> mbox cmd response: success
23,700,667 UART:
23,701,060 UART: Running Caliptra FMC ...
23,702,212 UART:
23,702,370 UART: [state] CFI Enabled
23,710,426 UART: [fht] FMC Alias Private Key: 7
26,041,185 UART: [art] Extend RT PCRs Done
26,042,425 UART: [art] Lock RT PCRs Done
26,044,056 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D0error_internal_intr_r=00000040
26,047,594 UART: WDT Expired
26,048,150 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,513 UART:
192,911 UART: Running Caliptra ROM ...
193,994 UART:
194,133 UART: [state] CFI Enabled
263,037 UART: [state] LifecycleState = Unprovisioned
264,940 UART: [state] DebugLocked = No
266,563 UART: [state] WD Timer not started. Device not locked for debugging
274,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
418,222 UART: [kat] SHA2-256
449,452 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,039 UART: [kat] ++
461,566 UART: [kat] sha1
471,691 UART: [kat] SHA2-256
474,749 UART: [kat] SHA2-384
480,124 UART: [kat] SHA2-512-ACC
483,112 UART: [kat] ECC-384
2,948,117 UART: [kat] HMAC-384Kdf
2,971,160 UART: [kat] LMS
3,500,622 UART: [kat] --
3,504,872 UART: [cold-reset] ++
3,506,696 UART: [fht] FHT @ 0x50003400
3,518,328 UART: [idev] ++
3,518,890 UART: [idev] CDI.KEYID = 6
3,519,826 UART: [idev] SUBJECT.KEYID = 7
3,521,034 UART: [idev] UDS.KEYID = 0
3,542,774 UART: [idev] Erasing UDS.KEYID = 0
6,024,775 UART: [idev] Sha1 KeyId Algorithm
6,046,876 UART: [idev] --
6,052,109 UART: [ldev] ++
6,052,674 UART: [ldev] CDI.KEYID = 6
6,053,587 UART: [ldev] SUBJECT.KEYID = 5
6,054,745 UART: [ldev] AUTHORITY.KEYID = 7
6,056,047 UART: [ldev] FE.KEYID = 1
6,099,044 UART: [ldev] Erasing FE.KEYID = 1
8,599,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,828 UART: [ldev] --
10,412,167 UART: [fwproc] Wait for Commands...
10,414,427 UART: [fwproc] Recv command 0x46574c44
10,416,541 UART: [fwproc] Recv'd Img size: 114168 bytes
13,811,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,109 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,269,950 >>> mbox cmd response: success
14,274,379 UART: [afmc] ++
14,274,976 UART: [afmc] CDI.KEYID = 6
14,275,888 UART: [afmc] SUBJECT.KEYID = 7
14,277,044 UART: [afmc] AUTHORITY.KEYID = 5
16,807,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,527,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,529,635 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,545,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,561,432 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,577,358 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,599,484 UART: [afmc] --
18,603,727 UART: [cold-reset] --
18,608,069 UART: [state] Locking Datavault
18,613,430 UART: [state] Locking PCR0, PCR1 and PCR31
18,615,070 UART: [state] Locking ICCM
18,616,084 UART: [exit] Launching FMC @ 0x40000130
18,624,477 UART:
18,624,735 UART: Running Caliptra FMC ...
18,625,838 UART:
18,625,992 UART: [state] CFI Enabled
18,687,486 UART: [fht] FMC Alias Private Key: 7
20,451,005 UART: [art] Extend RT PCRs Done
20,452,238 UART: [art] Lock RT PCRs Done
20,454,127 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
191,591 UART:
191,956 UART: Running Caliptra ROM ...
193,044 UART:
193,190 UART: [state] CFI Enabled
261,350 UART: [state] LifecycleState = Unprovisioned
263,281 UART: [state] DebugLocked = Yes
264,975 UART: [state] Starting the WD Timer 20184921 cycles
269,924 UART: [kat] SHA2-256
449,065 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,593 UART: [kat] ++
461,181 UART: [kat] sha1
471,278 UART: [kat] SHA2-256
474,296 UART: [kat] SHA2-384
479,713 UART: [kat] SHA2-512-ACC
482,718 UART: [kat] ECC-384
2,946,390 UART: [kat] HMAC-384Kdf
2,969,799 UART: [kat] LMS
3,499,260 UART: [kat] --
3,503,554 UART: [cold-reset] ++
3,505,409 UART: [fht] FHT @ 0x50003400
3,517,016 UART: [idev] ++
3,517,584 UART: [idev] CDI.KEYID = 6
3,518,510 UART: [idev] SUBJECT.KEYID = 7
3,519,683 UART: [idev] UDS.KEYID = 0
3,520,726 ready_for_fw is high
3,520,923 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,549 UART: [idev] Erasing UDS.KEYID = 0
6,024,010 UART: [idev] Sha1 KeyId Algorithm
6,046,101 UART: [idev] --
6,051,312 UART: [ldev] ++
6,051,896 UART: [ldev] CDI.KEYID = 6
6,052,807 UART: [ldev] SUBJECT.KEYID = 5
6,054,019 UART: [ldev] AUTHORITY.KEYID = 7
6,055,259 UART: [ldev] FE.KEYID = 1
6,098,738 UART: [ldev] Erasing FE.KEYID = 1
8,599,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,109 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,335,151 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,350,940 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,366,945 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,387,179 UART: [ldev] --
10,391,469 UART: [fwproc] Wait for Commands...
10,393,784 UART: [fwproc] Recv command 0x46574c44
10,395,874 UART: [fwproc] Recv'd Img size: 114168 bytes
13,790,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,863,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,932,428 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,249,278 >>> mbox cmd response: success
14,253,713 UART: [afmc] ++
14,254,302 UART: [afmc] CDI.KEYID = 6
14,255,214 UART: [afmc] SUBJECT.KEYID = 7
14,256,374 UART: [afmc] AUTHORITY.KEYID = 5
16,788,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,508,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,510,320 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,526,518 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,542,351 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,558,124 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,580,430 UART: [afmc] --
18,584,650 UART: [cold-reset] --
18,588,996 UART: [state] Locking Datavault
18,594,356 UART: [state] Locking PCR0, PCR1 and PCR31
18,595,996 UART: [state] Locking ICCM
18,597,213 UART: [exit] Launching FMC @ 0x40000130
18,605,443 UART:
18,605,681 UART: Running Caliptra FMC ...
18,606,714 UART:
18,606,860 UART: [state] CFI Enabled
18,669,062 UART: [fht] FMC Alias Private Key: 7
20,432,649 UART: [art] Extend RT PCRs Done
20,433,893 UART: [art] Lock RT PCRs Done
20,435,737 UART: [art] Populate DV Done
20,441,207 UART: [fht] FMC Alias Private Key: 7
20,442,734 UART: [art] Derive CDI
20,443,499 UART: [art] Store in in slot 0x4
20,453,689 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400029BCerror_internal_intr_r=00000040
20,457,182 UART: WDT Expired
20,457,737 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
268,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,037,251 >>> mbox cmd response: success
18,323,183 UART:
18,323,619 UART: Running Caliptra FMC ...
18,324,745 UART:
18,324,912 UART: [state] CFI Enabled
18,392,863 UART: [fht] FMC Alias Private Key: 7
20,156,387 UART: [art] Extend RT PCRs Done
20,157,618 UART: [art] Lock RT PCRs Done
20,159,467 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,368,565 ready_for_fw is high
3,368,975 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,043,977 >>> mbox cmd response: success
18,326,688 UART:
18,327,085 UART: Running Caliptra FMC ...
18,328,182 UART:
18,328,333 UART: [state] CFI Enabled
18,396,479 UART: [fht] FMC Alias Private Key: 7
20,160,000 UART: [art] Extend RT PCRs Done
20,161,219 UART: [art] Lock RT PCRs Done
20,163,028 UART: [art] Populate DV Done
20,168,493 UART: [fht] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028C2error_internal_intr_r=00000040
20,172,253 UART: WDT Expired
20,172,848 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,685 writing to cptra_bootfsm_go
192,908 UART:
193,310 UART: Running Caliptra ROM ...
194,471 UART:
603,863 UART: [state] CFI Enabled
620,676 UART: [state] LifecycleState = Unprovisioned
622,574 UART: [state] DebugLocked = No
625,409 UART: [state] WD Timer not started. Device not locked for debugging
633,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
777,170 UART: [kat] SHA2-256
808,347 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,895 UART: [kat] ++
820,420 UART: [kat] sha1
831,150 UART: [kat] SHA2-256
834,149 UART: [kat] SHA2-384
839,974 UART: [kat] SHA2-512-ACC
842,959 UART: [kat] ECC-384
3,285,398 UART: [kat] HMAC-384Kdf
3,298,130 UART: [kat] LMS
3,827,582 UART: [kat] --
3,831,679 UART: [cold-reset] ++
3,833,177 UART: [fht] FHT @ 0x50003400
3,845,451 UART: [idev] ++
3,846,019 UART: [idev] CDI.KEYID = 6
3,846,993 UART: [idev] SUBJECT.KEYID = 7
3,848,153 UART: [idev] UDS.KEYID = 0
3,862,072 UART: [idev] Erasing UDS.KEYID = 0
6,321,273 UART: [idev] Sha1 KeyId Algorithm
6,344,634 UART: [idev] --
6,349,023 UART: [ldev] ++
6,349,638 UART: [ldev] CDI.KEYID = 6
6,350,712 UART: [ldev] SUBJECT.KEYID = 5
6,351,816 UART: [ldev] AUTHORITY.KEYID = 7
6,353,009 UART: [ldev] FE.KEYID = 1
6,363,607 UART: [ldev] Erasing FE.KEYID = 1
8,834,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,474 UART: [ldev] --
10,625,629 UART: [fwproc] Wait for Commands...
10,627,183 UART: [fwproc] Recv command 0x46574c44
10,629,277 UART: [fwproc] Recv'd Img size: 114168 bytes
14,019,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,092,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,161,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,478,582 >>> mbox cmd response: success
14,482,047 UART: [afmc] ++
14,482,654 UART: [afmc] CDI.KEYID = 6
14,483,566 UART: [afmc] SUBJECT.KEYID = 7
14,484,726 UART: [afmc] AUTHORITY.KEYID = 5
16,987,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,618 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,355 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,404 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,276 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,271 UART: [afmc] --
18,784,162 UART: [cold-reset] --
18,789,369 UART: [state] Locking Datavault
18,795,744 UART: [state] Locking PCR0, PCR1 and PCR31
18,797,444 UART: [state] Locking ICCM
18,798,782 UART: [exit] Launching FMC @ 0x40000130
18,807,234 UART:
18,807,488 UART: Running Caliptra FMC ...
18,808,587 UART:
18,808,750 UART: [state] CFI Enabled
18,816,793 UART: [fht] FMC Alias Private Key: 7
20,573,104 UART: [art] Extend RT PCRs Done
20,574,325 UART: [art] Lock RT PCRs Done
20,575,946 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
191,964 UART:
192,333 UART: Running Caliptra ROM ...
193,440 UART:
603,251 UART: [state] CFI Enabled
620,071 UART: [state] LifecycleState = Unprovisioned
621,967 UART: [state] DebugLocked = Yes
624,823 UART: [state] Starting the WD Timer 19947860 cycles
629,832 UART: [kat] SHA2-256
809,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,558 UART: [kat] ++
821,123 UART: [kat] sha1
831,737 UART: [kat] SHA2-256
834,788 UART: [kat] SHA2-384
840,638 UART: [kat] SHA2-512-ACC
843,573 UART: [kat] ECC-384
3,286,021 UART: [kat] HMAC-384Kdf
3,298,701 UART: [kat] LMS
3,828,286 UART: [kat] --
3,832,355 UART: [cold-reset] ++
3,833,858 UART: [fht] FHT @ 0x50003400
3,846,116 UART: [idev] ++
3,846,677 UART: [idev] CDI.KEYID = 6
3,847,677 UART: [idev] SUBJECT.KEYID = 7
3,848,783 UART: [idev] UDS.KEYID = 0
3,849,825 ready_for_fw is high
3,850,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,993,426 UART: [idev] Erasing UDS.KEYID = 0
6,321,972 UART: [idev] Sha1 KeyId Algorithm
6,345,328 UART: [idev] --
6,349,729 UART: [ldev] ++
6,350,308 UART: [ldev] CDI.KEYID = 6
6,351,215 UART: [ldev] SUBJECT.KEYID = 5
6,352,428 UART: [ldev] AUTHORITY.KEYID = 7
6,353,657 UART: [ldev] FE.KEYID = 1
6,364,296 UART: [ldev] Erasing FE.KEYID = 1
8,835,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,549 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,569,546 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,585,353 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,601,337 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,621,342 UART: [ldev] --
10,626,492 UART: [fwproc] Wait for Commands...
10,628,037 UART: [fwproc] Recv command 0x46574c44
10,630,134 UART: [fwproc] Recv'd Img size: 114168 bytes
14,020,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,423 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,479,517 >>> mbox cmd response: success
14,482,961 UART: [afmc] ++
14,483,565 UART: [afmc] CDI.KEYID = 6
14,484,475 UART: [afmc] SUBJECT.KEYID = 7
14,485,634 UART: [afmc] AUTHORITY.KEYID = 5
16,988,852 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,432 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,727,590 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,743,461 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,759,227 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,782,331 UART: [afmc] --
18,785,215 UART: [cold-reset] --
18,790,425 UART: [state] Locking Datavault
18,796,855 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,498 UART: [state] Locking ICCM
18,799,887 UART: [exit] Launching FMC @ 0x40000130
18,808,289 UART:
18,808,522 UART: Running Caliptra FMC ...
18,809,620 UART:
18,809,780 UART: [state] CFI Enabled
18,817,876 UART: [fht] FMC Alias Private Key: 7
20,574,243 UART: [art] Extend RT PCRs Done
20,575,483 UART: [art] Lock RT PCRs Done
20,576,509 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,579,993 UART: WDT Expired
20,580,546 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,732 writing to cptra_bootfsm_go
626,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,260,951 >>> mbox cmd response: success
18,514,903 UART:
18,515,314 UART: Running Caliptra FMC ...
18,516,448 UART:
18,516,613 UART: [state] CFI Enabled
18,524,510 UART: [fht] FMC Alias Private Key: 7
20,280,811 UART: [art] Extend RT PCRs Done
20,282,084 UART: [art] Lock RT PCRs Done
20,283,683 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
3,701,826 ready_for_fw is high
3,702,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,339 >>> mbox cmd response: success
18,515,386 UART:
18,515,785 UART: Running Caliptra FMC ...
18,516,922 UART:
18,517,074 UART: [state] CFI Enabled
18,524,943 UART: [fht] FMC Alias Private Key: 7
20,281,332 UART: [art] Extend RT PCRs Done
20,282,582 UART: [art] Lock RT PCRs Done
20,283,860 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,287,404 UART: WDT Expired
20,287,985 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,470 UART:
192,846 UART: Running Caliptra ROM ...
193,975 UART:
194,115 UART: [state] CFI Enabled
263,746 UART: [state] LifecycleState = Unprovisioned
266,121 UART: [state] DebugLocked = No
267,790 UART: [state] WD Timer not started. Device not locked for debugging
276,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
420,515 UART: [kat] SHA2-256
462,323 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,071 UART: [kat] ++
473,534 UART: [kat] sha1
484,140 UART: [kat] SHA2-256
487,141 UART: [kat] SHA2-384
492,413 UART: [kat] SHA2-512-ACC
494,964 UART: [kat] ECC-384
2,948,185 UART: [kat] HMAC-384Kdf
2,971,742 UART: [kat] LMS
3,503,510 UART: [kat] --
3,507,822 UART: [cold-reset] ++
3,509,702 UART: [fht] FHT @ 0x50003400
3,521,880 UART: [idev] ++
3,522,563 UART: [idev] CDI.KEYID = 6
3,523,525 UART: [idev] SUBJECT.KEYID = 7
3,524,683 UART: [idev] UDS.KEYID = 0
3,543,735 UART: [idev] Erasing UDS.KEYID = 0
6,027,769 UART: [idev] Sha1 KeyId Algorithm
6,049,284 UART: [idev] --
6,055,440 UART: [ldev] ++
6,056,120 UART: [ldev] CDI.KEYID = 6
6,057,184 UART: [ldev] SUBJECT.KEYID = 5
6,058,288 UART: [ldev] AUTHORITY.KEYID = 7
6,059,459 UART: [ldev] FE.KEYID = 1
6,100,523 UART: [ldev] Erasing FE.KEYID = 1
8,611,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,350,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,366,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,381,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,396,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,417,227 UART: [ldev] --
10,422,383 UART: [fwproc] Wait for Commands...
10,424,639 UART: [fwproc] Recv command 0x46574c44
10,426,956 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,017 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,196 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,082 >>> mbox cmd response: success
14,605,325 UART: [afmc] ++
14,606,020 UART: [afmc] CDI.KEYID = 6
14,607,189 UART: [afmc] SUBJECT.KEYID = 7
14,608,725 UART: [afmc] AUTHORITY.KEYID = 5
17,139,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,880,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,881,912 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,897,111 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,912,246 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,927,338 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,950,432 UART: [afmc] --
18,954,455 UART: [cold-reset] --
18,959,087 UART: [state] Locking Datavault
18,964,775 UART: [state] Locking PCR0, PCR1 and PCR31
18,966,920 UART: [state] Locking ICCM
18,968,172 UART: [exit] Launching FMC @ 0x40000130
18,976,519 UART:
18,976,748 UART: Running Caliptra FMC ...
18,977,772 UART:
18,977,917 UART: [state] CFI Enabled
19,038,871 UART: [fht] FMC Alias Private Key: 7
20,802,506 UART: [art] Extend RT PCRs Done
20,803,762 UART: [art] Lock RT PCRs Done
20,805,575 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
191,605 UART:
191,960 UART: Running Caliptra ROM ...
193,168 UART:
193,327 UART: [state] CFI Enabled
261,039 UART: [state] LifecycleState = Unprovisioned
263,439 UART: [state] DebugLocked = Yes
265,223 UART: [state] Starting the WD Timer 20534277 cycles
270,532 UART: [kat] SHA2-256
460,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,190 UART: [kat] ++
471,823 UART: [kat] sha1
482,273 UART: [kat] SHA2-256
485,348 UART: [kat] SHA2-384
490,551 UART: [kat] SHA2-512-ACC
493,126 UART: [kat] ECC-384
2,945,261 UART: [kat] HMAC-384Kdf
2,968,858 UART: [kat] LMS
3,500,653 UART: [kat] --
3,504,951 UART: [cold-reset] ++
3,506,880 UART: [fht] FHT @ 0x50003400
3,518,986 UART: [idev] ++
3,519,697 UART: [idev] CDI.KEYID = 6
3,520,687 UART: [idev] SUBJECT.KEYID = 7
3,521,858 UART: [idev] UDS.KEYID = 0
3,522,780 ready_for_fw is high
3,522,967 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,560 UART: [idev] Erasing UDS.KEYID = 0
6,025,880 UART: [idev] Sha1 KeyId Algorithm
6,047,491 UART: [idev] --
6,053,699 UART: [ldev] ++
6,054,433 UART: [ldev] CDI.KEYID = 6
6,055,507 UART: [ldev] SUBJECT.KEYID = 5
6,056,614 UART: [ldev] AUTHORITY.KEYID = 7
6,057,787 UART: [ldev] FE.KEYID = 1
6,097,944 UART: [ldev] Erasing FE.KEYID = 1
8,601,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,619 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,355,793 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,370,898 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,385,852 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,406,837 UART: [ldev] --
10,411,987 UART: [fwproc] Wait for Commands...
10,414,405 UART: [fwproc] Recv command 0x46574c44
10,416,220 UART: [fwproc] Recv'd Img size: 114168 bytes
13,854,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,049,469 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,590,391 >>> mbox cmd response: success
14,594,647 UART: [afmc] ++
14,595,360 UART: [afmc] CDI.KEYID = 6
14,596,491 UART: [afmc] SUBJECT.KEYID = 7
14,597,983 UART: [afmc] AUTHORITY.KEYID = 5
17,130,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,849,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,851,538 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
18,866,637 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
18,881,709 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
18,896,775 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
18,919,918 UART: [afmc] --
18,923,908 UART: [cold-reset] --
18,928,362 UART: [state] Locking Datavault
18,934,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,936,193 UART: [state] Locking ICCM
18,937,481 UART: [exit] Launching FMC @ 0x40000130
18,945,822 UART:
18,946,052 UART: Running Caliptra FMC ...
18,947,172 UART:
18,947,331 UART: [state] CFI Enabled
19,008,943 UART: [fht] FMC Alias Private Key: 7
20,772,550 UART: [art] Extend RT PCRs Done
20,773,776 UART: [art] Lock RT PCRs Done
20,775,672 UART: [art] Populate DV Done
20,781,135 UART: [fht] FMC Alias Private Key: 7
20,782,665 UART: [art] Derive CDI
20,783,478 UART: [art] Store in in slot 0x4
20,803,714 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000314Cerror_internal_intr_r=00000040
20,807,195 UART: WDT Expired
20,807,750 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
269,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,704,833 >>> mbox cmd response: success
18,983,714 UART:
18,984,139 UART: Running Caliptra FMC ...
18,985,461 UART:
18,985,627 UART: [state] CFI Enabled
19,054,549 UART: [fht] FMC Alias Private Key: 7
20,818,055 UART: [art] Extend RT PCRs Done
20,819,303 UART: [art] Lock RT PCRs Done
20,821,148 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,436,232 ready_for_fw is high
3,436,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,722,878 >>> mbox cmd response: success
19,000,277 UART:
19,000,689 UART: Running Caliptra FMC ...
19,001,844 UART:
19,002,005 UART: [state] CFI Enabled
19,070,659 UART: [fht] FMC Alias Private Key: 7
20,819,835 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000310Eerror_internal_intr_r=00000040
20,823,471 UART: WDT Expired
20,824,042 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
192,985 UART:
193,341 UART: Running Caliptra ROM ...
194,513 UART:
604,253 UART: [state] CFI Enabled
621,192 UART: [state] LifecycleState = Unprovisioned
623,561 UART: [state] DebugLocked = No
626,410 UART: [state] WD Timer not started. Device not locked for debugging
635,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
778,845 UART: [kat] SHA2-256
820,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,769 UART: [kat] ++
832,358 UART: [kat] sha1
843,420 UART: [kat] SHA2-256
846,441 UART: [kat] SHA2-384
852,147 UART: [kat] SHA2-512-ACC
854,703 UART: [kat] ECC-384
3,297,516 UART: [kat] HMAC-384Kdf
3,310,755 UART: [kat] LMS
3,842,540 UART: [kat] --
3,846,746 UART: [cold-reset] ++
3,848,244 UART: [fht] FHT @ 0x50003400
3,861,062 UART: [idev] ++
3,861,749 UART: [idev] CDI.KEYID = 6
3,862,911 UART: [idev] SUBJECT.KEYID = 7
3,863,945 UART: [idev] UDS.KEYID = 0
3,878,369 UART: [idev] Erasing UDS.KEYID = 0
6,341,336 UART: [idev] Sha1 KeyId Algorithm
6,364,143 UART: [idev] --
6,369,446 UART: [ldev] ++
6,370,126 UART: [ldev] CDI.KEYID = 6
6,371,050 UART: [ldev] SUBJECT.KEYID = 5
6,372,208 UART: [ldev] AUTHORITY.KEYID = 7
6,373,435 UART: [ldev] FE.KEYID = 1
6,384,468 UART: [ldev] Erasing FE.KEYID = 1
8,860,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,410 UART: [ldev] --
10,651,374 UART: [fwproc] Wait for Commands...
10,652,918 UART: [fwproc] Recv command 0x46574c44
10,655,187 UART: [fwproc] Recv'd Img size: 114168 bytes
14,089,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,582 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,825,792 >>> mbox cmd response: success
14,829,035 UART: [afmc] ++
14,829,742 UART: [afmc] CDI.KEYID = 6
14,830,854 UART: [afmc] SUBJECT.KEYID = 7
14,832,393 UART: [afmc] AUTHORITY.KEYID = 5
17,339,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,559 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,078,744 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,093,866 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,108,894 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,132,858 UART: [afmc] --
19,135,538 UART: [cold-reset] --
19,141,028 UART: [state] Locking Datavault
19,147,761 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,957 UART: [state] Locking ICCM
19,151,626 UART: [exit] Launching FMC @ 0x40000130
19,160,246 UART:
19,160,477 UART: Running Caliptra FMC ...
19,161,577 UART:
19,161,731 UART: [state] CFI Enabled
19,169,838 UART: [fht] FMC Alias Private Key: 7
20,926,203 UART: [art] Extend RT PCRs Done
20,927,436 UART: [art] Lock RT PCRs Done
20,929,060 UART: [art] Populate DV Done
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
191,887 UART:
192,242 UART: Running Caliptra ROM ...
193,361 UART:
603,238 UART: [state] CFI Enabled
620,167 UART: [state] LifecycleState = Unprovisioned
622,534 UART: [state] DebugLocked = Yes
625,515 UART: [state] Starting the WD Timer 20299085 cycles
630,892 UART: [kat] SHA2-256
820,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,600 UART: [kat] ++
832,249 UART: [kat] sha1
843,312 UART: [kat] SHA2-256
846,290 UART: [kat] SHA2-384
851,931 UART: [kat] SHA2-512-ACC
854,515 UART: [kat] ECC-384
3,297,375 UART: [kat] HMAC-384Kdf
3,310,604 UART: [kat] LMS
3,842,408 UART: [kat] --
3,846,547 UART: [cold-reset] ++
3,848,118 UART: [fht] FHT @ 0x50003400
3,860,872 UART: [idev] ++
3,861,573 UART: [idev] CDI.KEYID = 6
3,862,599 UART: [idev] SUBJECT.KEYID = 7
3,863,769 UART: [idev] UDS.KEYID = 0
3,864,690 ready_for_fw is high
3,864,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,008,288 UART: [idev] Erasing UDS.KEYID = 0
6,341,167 UART: [idev] Sha1 KeyId Algorithm
6,364,018 UART: [idev] --
6,369,450 UART: [ldev] ++
6,370,140 UART: [ldev] CDI.KEYID = 6
6,371,047 UART: [ldev] SUBJECT.KEYID = 5
6,372,205 UART: [ldev] AUTHORITY.KEYID = 7
6,373,433 UART: [ldev] FE.KEYID = 1
6,384,455 UART: [ldev] Erasing FE.KEYID = 1
8,860,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,331 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,517 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,598 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,622 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,288 UART: [ldev] --
10,651,273 UART: [fwproc] Wait for Commands...
10,652,825 UART: [fwproc] Recv command 0x46574c44
10,654,751 UART: [fwproc] Recv'd Img size: 114168 bytes
14,089,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,167,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,284,148 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,825,330 >>> mbox cmd response: success
14,828,560 UART: [afmc] ++
14,829,263 UART: [afmc] CDI.KEYID = 6
14,830,426 UART: [afmc] SUBJECT.KEYID = 7
14,831,967 UART: [afmc] AUTHORITY.KEYID = 5
17,339,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,061,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,063,138 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
19,078,269 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
19,093,375 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
19,108,349 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
19,132,320 UART: [afmc] --
19,135,025 UART: [cold-reset] --
19,140,289 UART: [state] Locking Datavault
19,147,061 UART: [state] Locking PCR0, PCR1 and PCR31
19,149,201 UART: [state] Locking ICCM
19,150,864 UART: [exit] Launching FMC @ 0x40000130
19,159,534 UART:
19,159,775 UART: Running Caliptra FMC ...
19,160,872 UART:
19,161,025 UART: [state] CFI Enabled
19,169,075 UART: [fht] FMC Alias Private Key: 7
20,925,453 UART: [art] Extend RT PCRs Done
20,926,668 UART: [art] Lock RT PCRs Done
20,928,320 UART: [art] PopulaFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028C2error_internal_intr_r=00000040
20,932,286 UART: WDT Expired
20,932,863 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,605 writing to cptra_bootfsm_go
625,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,945,495 >>> mbox cmd response: success
19,202,638 UART:
19,203,051 UART: Running Caliptra FMC ...
19,204,195 UART:
19,204,359 UART: [state] CFI Enabled
19,212,246 UART: [fht] FMC Alias Private Key: 7
20,968,559 UART: [art] Extend RT PCRs Done
20,969,793 UART: [art] Lock RT PCRs Done
20,971,366 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,760,944 ready_for_fw is high
3,761,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,945,461 >>> mbox cmd response: success
19,202,656 UART:
19,203,065 UART: Running Caliptra FMC ...
19,204,227 UART:
19,204,386 UART: [state] CFI Enabled
19,212,319 UART: [fht] FMC Alias Private Key: 7
20,968,609 UART: [art] Extend RT PCRs Done
20,969,839 UART: [art] Lock RT PCRs Done
20,971,408 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400026E2error_internal_intr_r=00000040
20,974,960 UART: WDT Expired
20,975,517 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114168 bytes
2,882,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,486 >>> mbox cmd response: success
3,075,706 UART: [afmc] ++
3,075,874 UART: [afmc] CDI.KEYID = 6
3,076,236 UART: [afmc] SUBJECT.KEYID = 7
3,076,661 UART: [afmc] AUTHORITY.KEYID = 5
3,111,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,011 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,701 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,788 UART: [afmc] --
3,154,796 UART: [cold-reset] --
3,155,490 UART: [state] Locking Datavault
3,156,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,047 UART: [state] Locking ICCM
3,157,603 UART: [exit] Launching FMC @ 0x40000130
3,162,932 UART:
3,162,948 UART: Running Caliptra FMC ...
3,163,356 UART:
3,163,410 UART: [state] CFI Enabled
3,173,775 UART: [fht] FMC Alias Private Key: 7
3,281,700 UART: [art] Extend RT PCRs Done
3,282,128 UART: [art] Lock RT PCRs Done
3,283,616 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3196119 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114168 bytes
2,882,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,443 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,445 >>> mbox cmd response: success
3,075,662 UART: [afmc] ++
3,075,830 UART: [afmc] CDI.KEYID = 6
3,076,192 UART: [afmc] SUBJECT.KEYID = 7
3,076,617 UART: [afmc] AUTHORITY.KEYID = 5
3,111,022 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,350 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,134,061 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,139,961 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,145,690 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,153,764 UART: [afmc] --
3,154,771 UART: [cold-reset] --
3,155,465 UART: [state] Locking Datavault
3,156,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,022 UART: [state] Locking ICCM
3,157,578 UART: [exit] Launching FMC @ 0x40000130
3,162,907 UART:
3,162,923 UART: Running Caliptra FMC ...
3,163,331 UART:
3,163,385 UART: [state] CFI Enabled
3,173,751 UART: [fht] FMC Alias Private Key: 7
3,281,686 UART: [art] Extend RT PCRs Done
3,282,114 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,283,602 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
3,285,936 UART: WDT Expired
3,286,145 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,122 >>> mbox cmd response: success
2,985,210 UART:
2,985,226 UART: Running Caliptra FMC ...
2,985,634 UART:
2,985,688 UART: [state] CFI Enabled
2,996,053 UART: [fht] FMC Alias Private Key: 7
3,103,978 UART: [art] Extend RT PCRs Done
3,104,406 UART: [art] Lock RT PCRs Done
3,105,894 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,369 >>> mbox cmd response: success
2,985,446 UART:
2,985,462 UART: Running Caliptra FMC ...
2,985,870 UART:
2,985,924 UART: [state] CFI Enabled
2,996,290 UART: [fht] FMC Alias Private Key: 7
3,104,225 UART: [art] Extend RT PCRs Done
3,104,653 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,106,141 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028F0error_internal_intr_r=00000040
3,108,458 UART: WDT Expired
3,108,667 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114168 bytes
2,883,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,645 >>> mbox cmd response: success
3,076,877 UART: [afmc] ++
3,077,045 UART: [afmc] CDI.KEYID = 6
3,077,407 UART: [afmc] SUBJECT.KEYID = 7
3,077,832 UART: [afmc] AUTHORITY.KEYID = 5
3,113,401 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,134 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,824 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,781 UART: [afmc] --
3,156,721 UART: [cold-reset] --
3,157,657 UART: [state] Locking Datavault
3,158,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,418 UART: [state] Locking ICCM
3,160,024 UART: [exit] Launching FMC @ 0x40000130
3,165,353 UART:
3,165,369 UART: Running Caliptra FMC ...
3,165,777 UART:
3,165,920 UART: [state] CFI Enabled
3,176,547 UART: [fht] FMC Alias Private Key: 7
3,284,296 UART: [art] Extend RT PCRs Done
3,284,724 UART: [art] Lock RT PCRs Done
3,286,026 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3197540 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114168 bytes
2,883,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,508 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,604 >>> mbox cmd response: success
3,076,833 UART: [afmc] ++
3,077,001 UART: [afmc] CDI.KEYID = 6
3,077,363 UART: [afmc] SUBJECT.KEYID = 7
3,077,788 UART: [afmc] AUTHORITY.KEYID = 5
3,113,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,693 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,473 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,136,184 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,142,084 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,813 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,757 UART: [afmc] --
3,156,696 UART: [cold-reset] --
3,157,632 UART: [state] Locking Datavault
3,158,789 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,393 UART: [state] Locking ICCM
3,159,999 UART: [exit] Launching FMC @ 0x40000130
3,165,328 UART:
3,165,344 UART: Running Caliptra FMC ...
3,165,752 UART:
3,165,895 UART: [state] CFI Enabled
3,176,523 UART: [fht] FMC Alias Private Key: 7
3,284,282 UART: [art] Extend RT PCRs Done
3,284,710 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,286,012 UART: [art] PopuFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
3,288,336 UART: WDT Expired
3,288,545 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,281 >>> mbox cmd response: success
2,987,631 UART:
2,987,647 UART: Running Caliptra FMC ...
2,988,055 UART:
2,988,198 UART: [state] CFI Enabled
2,998,825 UART: [fht] FMC Alias Private Key: 7
3,106,574 UART: [art] Extend RT PCRs Done
3,107,002 UART: [art] Lock RT PCRs Done
3,108,304 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,528 >>> mbox cmd response: success
2,987,867 UART:
2,987,883 UART: Running Caliptra FMC ...
2,988,291 UART:
2,988,434 UART: [state] CFI Enabled
2,999,062 UART: [fht] FMC Alias Private Key: 7
3,106,821 UART: [art] Extend RT PCRs Done
3,107,249 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,108,551 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D6error_internal_intr_r=00000040
3,110,860 UART: WDT Expired
3,111,069 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,715 >>> mbox cmd response: success
2,771,871 UART: [afmc] ++
2,772,039 UART: [afmc] CDI.KEYID = 6
2,772,401 UART: [afmc] SUBJECT.KEYID = 7
2,772,826 UART: [afmc] AUTHORITY.KEYID = 5
2,808,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,617 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,336 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,086 UART: [afmc] --
2,851,158 UART: [cold-reset] --
2,852,078 UART: [state] Locking Datavault
2,853,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,873 UART: [state] Locking ICCM
2,854,293 UART: [exit] Launching FMC @ 0x40000130
2,859,622 UART:
2,859,638 UART: Running Caliptra FMC ...
2,860,046 UART:
2,860,100 UART: [state] CFI Enabled
2,870,685 UART: [fht] FMC Alias Private Key: 7
2,978,026 UART: [art] Extend RT PCRs Done
2,978,454 UART: [art] Lock RT PCRs Done
2,980,186 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2893058 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,946 >>> mbox cmd response: success
2,772,099 UART: [afmc] ++
2,772,267 UART: [afmc] CDI.KEYID = 6
2,772,629 UART: [afmc] SUBJECT.KEYID = 7
2,773,054 UART: [afmc] AUTHORITY.KEYID = 5
2,808,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,228 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,939 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,839 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,536 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,271 UART: [afmc] --
2,851,342 UART: [cold-reset] --
2,852,262 UART: [state] Locking Datavault
2,853,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,057 UART: [state] Locking ICCM
2,854,477 UART: [exit] Launching FMC @ 0x40000130
2,859,806 UART:
2,859,822 UART: Running Caliptra FMC ...
2,860,230 UART:
2,860,284 UART: [state] CFI Enabled
2,870,870 UART: [fht] FMC Alias Private Key: 7
2,978,221 UART: [art] Extend RT PCRs Done
2,978,649 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,980,381 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,982,775 UART: WDT Expired
2,982,984 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,696 >>> mbox cmd response: success
2,684,266 UART:
2,684,282 UART: Running Caliptra FMC ...
2,684,690 UART:
2,684,744 UART: [state] CFI Enabled
2,695,329 UART: [fht] FMC Alias Private Key: 7
2,802,670 UART: [art] Extend RT PCRs Done
2,803,098 UART: [art] Lock RT PCRs Done
2,804,830 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,943 >>> mbox cmd response: success
2,684,502 UART:
2,684,518 UART: Running Caliptra FMC ...
2,684,926 UART:
2,684,980 UART: [state] CFI Enabled
2,695,566 UART: [fht] FMC Alias Private Key: 7
2,802,917 UART: [art] Extend RT PCRs Done
2,803,345 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,805,077 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,807,395 UART: WDT Expired
2,807,604 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,096 >>> mbox cmd response: success
2,773,112 UART: [afmc] ++
2,773,280 UART: [afmc] CDI.KEYID = 6
2,773,642 UART: [afmc] SUBJECT.KEYID = 7
2,774,067 UART: [afmc] AUTHORITY.KEYID = 5
2,810,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,038 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,623 UART: [afmc] --
2,853,501 UART: [cold-reset] --
2,854,545 UART: [state] Locking Datavault
2,855,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,492 UART: [state] Locking ICCM
2,856,966 UART: [exit] Launching FMC @ 0x40000130
2,862,295 UART:
2,862,311 UART: Running Caliptra FMC ...
2,862,719 UART:
2,862,862 UART: [state] CFI Enabled
2,873,791 UART: [fht] FMC Alias Private Key: 7
2,982,500 UART: [art] Extend RT PCRs Done
2,982,928 UART: [art] Lock RT PCRs Done
2,984,536 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2896419 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,327 >>> mbox cmd response: success
2,773,340 UART: [afmc] ++
2,773,508 UART: [afmc] CDI.KEYID = 6
2,773,870 UART: [afmc] SUBJECT.KEYID = 7
2,774,295 UART: [afmc] AUTHORITY.KEYID = 5
2,810,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,649 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,360 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,260 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,957 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,808 UART: [afmc] --
2,853,685 UART: [cold-reset] --
2,854,729 UART: [state] Locking Datavault
2,856,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,676 UART: [state] Locking ICCM
2,857,150 UART: [exit] Launching FMC @ 0x40000130
2,862,479 UART:
2,862,495 UART: Running Caliptra FMC ...
2,862,903 UART:
2,863,046 UART: [state] CFI Enabled
2,873,976 UART: [fht] FMC Alias Private Key: 7
2,982,695 UART: [art] Extend RT PCRs Done
2,983,123 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,984,731 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,987,119 UART: WDT Expired
2,987,328 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,077 >>> mbox cmd response: success
2,686,939 UART:
2,686,955 UART: Running Caliptra FMC ...
2,687,363 UART:
2,687,506 UART: [state] CFI Enabled
2,698,435 UART: [fht] FMC Alias Private Key: 7
2,807,144 UART: [art] Extend RT PCRs Done
2,807,572 UART: [art] Lock RT PCRs Done
2,809,180 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,324 >>> mbox cmd response: success
2,687,175 UART:
2,687,191 UART: Running Caliptra FMC ...
2,687,599 UART:
2,687,742 UART: [state] CFI Enabled
2,698,672 UART: [fht] FMC Alias Private Key: 7
2,807,391 UART: [art] Extend RT PCRs Done
2,807,819 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,809,427 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,811,735 UART: WDT Expired
2,811,944 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,815 >>> mbox cmd response: success
2,769,978 UART: [afmc] ++
2,770,146 UART: [afmc] CDI.KEYID = 6
2,770,509 UART: [afmc] SUBJECT.KEYID = 7
2,770,935 UART: [afmc] AUTHORITY.KEYID = 5
2,806,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,866 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,223 UART: [afmc] --
2,849,295 UART: [cold-reset] --
2,850,215 UART: [state] Locking Datavault
2,851,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,010 UART: [state] Locking ICCM
2,852,430 UART: [exit] Launching FMC @ 0x40000130
2,857,759 UART:
2,857,775 UART: Running Caliptra FMC ...
2,858,183 UART:
2,858,237 UART: [state] CFI Enabled
2,868,822 UART: [fht] FMC Alias Private Key: 7
2,976,163 UART: [art] Extend RT PCRs Done
2,976,591 UART: [art] Lock RT PCRs Done
2,978,323 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2891225 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,046 >>> mbox cmd response: success
2,770,206 UART: [afmc] ++
2,770,374 UART: [afmc] CDI.KEYID = 6
2,770,737 UART: [afmc] SUBJECT.KEYID = 7
2,771,163 UART: [afmc] AUTHORITY.KEYID = 5
2,806,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,361 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,829,073 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,834,971 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,840,668 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,848,408 UART: [afmc] --
2,849,479 UART: [cold-reset] --
2,850,399 UART: [state] Locking Datavault
2,851,590 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,194 UART: [state] Locking ICCM
2,852,614 UART: [exit] Launching FMC @ 0x40000130
2,857,943 UART:
2,857,959 UART: Running Caliptra FMC ...
2,858,367 UART:
2,858,421 UART: [state] CFI Enabled
2,869,007 UART: [fht] FMC Alias Private Key: 7
2,976,358 UART: [art] Extend RT PCRs Done
2,976,786 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,978,518 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028E8error_internal_intr_r=00000040
2,980,912 UART: WDT Expired
2,981,121 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,681 >>> mbox cmd response: success
2,680,281 UART:
2,680,297 UART: Running Caliptra FMC ...
2,680,705 UART:
2,680,759 UART: [state] CFI Enabled
2,691,344 UART: [fht] FMC Alias Private Key: 7
2,798,685 UART: [art] Extend RT PCRs Done
2,799,113 UART: [art] Lock RT PCRs Done
2,800,845 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,928 >>> mbox cmd response: success
2,680,517 UART:
2,680,533 UART: Running Caliptra FMC ...
2,680,941 UART:
2,680,995 UART: [state] CFI Enabled
2,691,581 UART: [fht] FMC Alias Private Key: 7
2,798,932 UART: [art] Extend RT PCRs Done
2,799,360 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,801,092 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028EEerror_internal_intr_r=00000040
2,803,410 UART: WDT Expired
2,803,619 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,196 >>> mbox cmd response: success
2,771,219 UART: [afmc] ++
2,771,387 UART: [afmc] CDI.KEYID = 6
2,771,750 UART: [afmc] SUBJECT.KEYID = 7
2,772,176 UART: [afmc] AUTHORITY.KEYID = 5
2,808,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,807 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,558 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,170 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,889 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,760 UART: [afmc] --
2,851,638 UART: [cold-reset] --
2,852,682 UART: [state] Locking Datavault
2,854,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,629 UART: [state] Locking ICCM
2,855,103 UART: [exit] Launching FMC @ 0x40000130
2,860,432 UART:
2,860,448 UART: Running Caliptra FMC ...
2,860,856 UART:
2,860,999 UART: [state] CFI Enabled
2,871,928 UART: [fht] FMC Alias Private Key: 7
2,980,637 UART: [art] Extend RT PCRs Done
2,981,065 UART: [art] Lock RT PCRs Done
2,982,673 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2894586 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,427 >>> mbox cmd response: success
2,771,447 UART: [afmc] ++
2,771,615 UART: [afmc] CDI.KEYID = 6
2,771,978 UART: [afmc] SUBJECT.KEYID = 7
2,772,404 UART: [afmc] AUTHORITY.KEYID = 5
2,808,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,782 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,831,494 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,837,392 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,843,089 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,945 UART: [afmc] --
2,851,822 UART: [cold-reset] --
2,852,866 UART: [state] Locking Datavault
2,854,209 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,813 UART: [state] Locking ICCM
2,855,287 UART: [exit] Launching FMC @ 0x40000130
2,860,616 UART:
2,860,632 UART: Running Caliptra FMC ...
2,861,040 UART:
2,861,183 UART: [state] CFI Enabled
2,872,113 UART: [fht] FMC Alias Private Key: 7
2,980,832 UART: [art] Extend RT PCRs Done
2,981,260 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,982,868 UART: [art] PopulateFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028CAerror_internal_intr_r=00000040
2,985,256 UART: WDT Expired
2,985,465 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,062 >>> mbox cmd response: success
2,682,954 UART:
2,682,970 UART: Running Caliptra FMC ...
2,683,378 UART:
2,683,521 UART: [state] CFI Enabled
2,694,450 UART: [fht] FMC Alias Private Key: 7
2,803,159 UART: [art] Extend RT PCRs Done
2,803,587 UART: [art] Lock RT PCRs Done
2,805,195 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,309 >>> mbox cmd response: success
2,683,190 UART:
2,683,206 UART: Running Caliptra FMC ...
2,683,614 UART:
2,683,757 UART: [state] CFI Enabled
2,694,687 UART: [fht] FMC Alias Private Key: 7
2,803,406 UART: [art] Extend RT PCRs Done
2,803,834 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,805,442 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400028D2error_internal_intr_r=00000040
2,807,750 UART: WDT Expired
2,807,959 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.82s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 114168 bytes
2,882,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,483 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,835 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,486 >>> mbox cmd response: success
3,075,706 UART: [afmc] ++
3,075,874 UART: [afmc] CDI.KEYID = 6
3,076,236 UART: [afmc] SUBJECT.KEYID = 7
3,076,661 UART: [afmc] AUTHORITY.KEYID = 5
3,111,070 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,618 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,398 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,126 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,140,011 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,701 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,788 UART: [afmc] --
3,154,796 UART: [cold-reset] --
3,155,490 UART: [state] Locking Datavault
3,156,443 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,047 UART: [state] Locking ICCM
3,157,603 UART: [exit] Launching FMC @ 0x40000130
3,162,932 UART:
3,162,948 UART: Running Caliptra FMC ...
3,163,356 UART:
3,163,410 UART: [state] CFI Enabled
3,173,775 UART: [fht] FMC Alias Private Key: 7
3,281,700 UART: [art] Extend RT PCRs Done
3,282,128 UART: [art] Lock RT PCRs Done
3,283,616 UART: [art] Populate DV Done
3,291,835 UART: [fht] FMC Alias Private Key: 7
3,292,859 UART: [art] Derive CDI
3,293,139 UART: [art] Store in in slot 0x4
3,378,328 UART: [art] Derive Key Pair
3,378,688 UART: [art] Store priv key in slot 0x5
3,391,792 UART: [art] Derive Key Pair - Done
3,406,378 UART: [art] Signing Cert with AUTHO
3,406,858 UART: RITY.KEYID = 7
3,422,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,029 UART: [art] PUB.X = 49F6C42B570109E91B8EE6E944CBB8108C7AD8A2B006CA3727D449A1345CE06DA58B825541EDD30D46E93FFD697595C5
3,429,793 UART: [art] PUB.Y = 6AB3B727C0C398FBF047B69E21D1646EFFFA996CE9641CC318FB3FA7DEF290515A7A40228355DECECF4E48A593E75CA7
3,436,761 UART: [art] SIG.R = 40503DF12EB05CDEC3272BD1842C4B54D1DF9BF1D2062E65CE9DD3E9B4A16D8A14389F509A73844C1A8608B010968C96
3,443,531 UART: [art] SIG.S = D5D6807564CE2B4AAFCCB55D2AE024F8E3730A5D1D0787382298D327F713A8C598E9488D2C0834DD9C8F9F187D693191
3,467,845 UART: Caliptra RT
3,468,098 UART: [state] CFI Enabled
3,575,949 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3483760 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 114168 bytes
2,882,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,443 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,445 >>> mbox cmd response: success
3,075,662 UART: [afmc] ++
3,075,830 UART: [afmc] CDI.KEYID = 6
3,076,192 UART: [afmc] SUBJECT.KEYID = 7
3,076,617 UART: [afmc] AUTHORITY.KEYID = 5
3,111,022 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,570 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,350 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,134,061 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,139,961 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,145,690 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,153,764 UART: [afmc] --
3,154,771 UART: [cold-reset] --
3,155,465 UART: [state] Locking Datavault
3,156,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,022 UART: [state] Locking ICCM
3,157,578 UART: [exit] Launching FMC @ 0x40000130
3,162,907 UART:
3,162,923 UART: Running Caliptra FMC ...
3,163,331 UART:
3,163,385 UART: [state] CFI Enabled
3,173,751 UART: [fht] FMC Alias Private Key: 7
3,281,686 UART: [art] Extend RT PCRs Done
3,282,114 UART: [art] Lock RT PCRs Done
3,283,602 UART: [art] Populate DV Done
3,291,821 UART: [fht] FMC Alias Private Key: 7
3,292,845 UART: [art] Derive CDI
3,293,125 UART: [art] Store in in slot 0x4
3,378,312 UART: [art] Derive Key Pair
3,378,672 UART: [art] Store priv key in slot 0x5
3,391,776 UART: [art] Derive Key Pair - Done
3,406,357 UART: [art] Signing Cert with AUTHO
3,406,837 UART: RITY.KEYID = 7
3,422,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,008 UART: [art] PUB.X = 6A698777251793DCAA7F75B3193561DD7AA2E32332B85514CCA5FB680746B79FD42BFB34E4A5EA0626DF7ACF4E136CAB
3,429,784 UART: [art] PUB.Y = 3B05E588EFF79BB40F2663486042590E20395A6F8FDC51F2AF96930F63A9BF76DB8FAE43200085C3047DD64A49537F11
3,436,697 UART: [art] SIG.R = BBA01AF650F5C017509F2E59C8568E4BC809A7EBDB988B5E34AAAF22AE0B0FE0265650E15BE9A54C77D36820859E2DBA
3,443,474 UART: [art] SIG.S = 3DDD698B2AB0EE7EA786EAD821E11F5EB04034E346196B986FCA15A22212E0768D943826DFB76C53198A50F354D06234
3,467,795 UART: Caliptra RT
3,468,048 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,571,480 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DA0 ra=0x40007056 error_internal_intr_r=00000040
3,573,922 UART: [rt] WDT Expired
3,574,209 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,122 >>> mbox cmd response: success
2,985,210 UART:
2,985,226 UART: Running Caliptra FMC ...
2,985,634 UART:
2,985,688 UART: [state] CFI Enabled
2,996,053 UART: [fht] FMC Alias Private Key: 7
3,103,978 UART: [art] Extend RT PCRs Done
3,104,406 UART: [art] Lock RT PCRs Done
3,105,894 UART: [art] Populate DV Done
3,114,113 UART: [fht] FMC Alias Private Key: 7
3,115,137 UART: [art] Derive CDI
3,115,417 UART: [art] Store in in slot 0x4
3,200,606 UART: [art] Derive Key Pair
3,200,966 UART: [art] Store priv key in slot 0x5
3,214,070 UART: [art] Derive Key Pair - Done
3,228,662 UART: [art] Signing Cert with AUTHO
3,229,142 UART: RITY.KEYID = 7
3,244,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,313 UART: [art] PUB.X = 594B0C02D0AEAAD21AA79C1B11564F630505DBDE8C540DDE58FC73DD6B87ECCB8489D976612AEACA5F2303177E28585D
3,252,081 UART: [art] PUB.Y = E070D14DDEF29B7FAA3084A2F61BDE734AA9E45F6FDAAF5EB3FAFC0A05D8F5BBEC2F7BD2F2B7D56135B4F6ACD7DD7D9F
3,259,067 UART: [art] SIG.R = 80393603BF000A54C9CE05E297D024D4DD6084B6623A6F26B7E7C3D773672A259E218CE6C0353D516C35F3EDF393BB88
3,265,806 UART: [art] SIG.S = C0402B23A5AB5D596CCFF7A3B740FD042D10656A0CB56F9F32FEFDB5ADF50FC9FC3C6CCAEE2F081FABD4BB023DE174AF
3,290,148 UART: Caliptra RT
3,290,401 UART: [state] CFI Enabled
3,398,201 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,369 >>> mbox cmd response: success
2,985,446 UART:
2,985,462 UART: Running Caliptra FMC ...
2,985,870 UART:
2,985,924 UART: [state] CFI Enabled
2,996,290 UART: [fht] FMC Alias Private Key: 7
3,104,225 UART: [art] Extend RT PCRs Done
3,104,653 UART: [art] Lock RT PCRs Done
3,106,141 UART: [art] Populate DV Done
3,114,360 UART: [fht] FMC Alias Private Key: 7
3,115,384 UART: [art] Derive CDI
3,115,664 UART: [art] Store in in slot 0x4
3,200,851 UART: [art] Derive Key Pair
3,201,211 UART: [art] Store priv key in slot 0x5
3,214,315 UART: [art] Derive Key Pair - Done
3,228,895 UART: [art] Signing Cert with AUTHO
3,229,375 UART: RITY.KEYID = 7
3,244,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,245,546 UART: [art] PUB.X = C56CBE86AB1D08B29C1048E44B473BAB6A437860C1548E5594F91499D1C27D3739DE2570B04127106D2606BB518B024C
3,252,303 UART: [art] PUB.Y = 21A3207C1E77CCDF336145FB49728FE8C6E937A2E62708D94B54D32950079E7343CD16A2150962D0A79572A36143939D
3,259,234 UART: [art] SIG.R = 45ABAD2395F1565149337FB770D3F7AAE20F5A8808D5E2B77FA7E7DF2FAF44383923FFE58D52CB4F6F0E5D3DB1B0C9AC
3,266,015 UART: [art] SIG.S = D1C80776E47D7318504B4020980805C7652ABEC48A14884012021F70BDD293128967642C86D0CCDA90F1028385428E50
3,290,303 UART: Caliptra RT
3,290,556 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,393,978 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D98 ra=0x40007056 error_internal_intr_r=00000040
3,396,418 UART: [rt] WDT Expired
3,396,705 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 114168 bytes
2,883,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,645 >>> mbox cmd response: success
3,076,877 UART: [afmc] ++
3,077,045 UART: [afmc] CDI.KEYID = 6
3,077,407 UART: [afmc] SUBJECT.KEYID = 7
3,077,832 UART: [afmc] AUTHORITY.KEYID = 5
3,113,401 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,521 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,249 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,134 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,824 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,781 UART: [afmc] --
3,156,721 UART: [cold-reset] --
3,157,657 UART: [state] Locking Datavault
3,158,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,418 UART: [state] Locking ICCM
3,160,024 UART: [exit] Launching FMC @ 0x40000130
3,165,353 UART:
3,165,369 UART: Running Caliptra FMC ...
3,165,777 UART:
3,165,920 UART: [state] CFI Enabled
3,176,547 UART: [fht] FMC Alias Private Key: 7
3,284,296 UART: [art] Extend RT PCRs Done
3,284,724 UART: [art] Lock RT PCRs Done
3,286,026 UART: [art] Populate DV Done
3,294,265 UART: [fht] FMC Alias Private Key: 7
3,295,279 UART: [art] Derive CDI
3,295,559 UART: [art] Store in in slot 0x4
3,381,324 UART: [art] Derive Key Pair
3,381,684 UART: [art] Store priv key in slot 0x5
3,394,902 UART: [art] Derive Key Pair - Done
3,409,703 UART: [art] Signing Cert with AUTHO
3,410,183 UART: RITY.KEYID = 7
3,425,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,338 UART: [art] PUB.X = D6C3DA34BD8348B3F8E66E1F822A583C9AEF2ECF1B1D46E4F1985F590A747CDCDB8102D7357C29FB97DD92F7C1283823
3,433,116 UART: [art] PUB.Y = F3E8FDCD588F97D17EB19B845D5E4EAE471FCF9662378DD002CB6BFF71A187C086983DC06413B7211125052DC21132AD
3,440,068 UART: [art] SIG.R = 3023BB2D7AADBA479CE49B61E909FB0268A7C421AC55321F11389934EF1CCF1BFCAF4115AAE1689C7C7909DEDAE32453
3,446,845 UART: [art] SIG.S = B044DDDEC54752A88E9062F2B43B07546D8D15763A6CA65F9D5022DD2F0D5A2CB7CCE5E57DF84B2768F4BA75A157C4AD
3,470,482 UART: Caliptra RT
3,470,827 UART: [state] CFI Enabled
3,579,530 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3486352 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 114168 bytes
2,883,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,508 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,604 >>> mbox cmd response: success
3,076,833 UART: [afmc] ++
3,077,001 UART: [afmc] CDI.KEYID = 6
3,077,363 UART: [afmc] SUBJECT.KEYID = 7
3,077,788 UART: [afmc] AUTHORITY.KEYID = 5
3,113,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,693 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,473 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
3,136,184 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
3,142,084 UART: [afmc] SIG.R = EA1CCA9F91BEF68C823E1EE21695C0EBFF7FAAF2A8D2ED78DADE97EAD177B2948F83DA14C29F80FAE44CA2CC99A9613C
3,147,813 UART: [afmc] SIG.S = 315AD209275C3BC1A8053020B97E2A76F3B520BF6DA787A714C3D1634A7847274DE0EEC8F217499345C2C536EBB6A264
3,155,757 UART: [afmc] --
3,156,696 UART: [cold-reset] --
3,157,632 UART: [state] Locking Datavault
3,158,789 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,393 UART: [state] Locking ICCM
3,159,999 UART: [exit] Launching FMC @ 0x40000130
3,165,328 UART:
3,165,344 UART: Running Caliptra FMC ...
3,165,752 UART:
3,165,895 UART: [state] CFI Enabled
3,176,523 UART: [fht] FMC Alias Private Key: 7
3,284,282 UART: [art] Extend RT PCRs Done
3,284,710 UART: [art] Lock RT PCRs Done
3,286,012 UART: [art] Populate DV Done
3,294,251 UART: [fht] FMC Alias Private Key: 7
3,295,265 UART: [art] Derive CDI
3,295,545 UART: [art] Store in in slot 0x4
3,381,308 UART: [art] Derive Key Pair
3,381,668 UART: [art] Store priv key in slot 0x5
3,394,886 UART: [art] Derive Key Pair - Done
3,409,685 UART: [art] Signing Cert with AUTHO
3,410,165 UART: RITY.KEYID = 7
3,425,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,320 UART: [art] PUB.X = 1077B41B5A2C17C4A1E81136A68515F5F5375C2414ED7B785CE6C699C6969A9B731D4EE56292EEE0C630CB9FDF3A3378
3,433,094 UART: [art] PUB.Y = CE94B1FE85D596D2DAAF6CB399B6919E8ADE5968428C18C025A0E9F9A214AB7508388C02B3EB194677F449110996FB58
3,440,039 UART: [art] SIG.R = 5DAAF50C6F1EA1B253C31E8BA587E84F4A077A87E65C0EA17D5F4C39DBB07EF38F25D3699799153CFDC003CF2311B156
3,446,811 UART: [art] SIG.S = 758407E31FEC87315681D43300F46AC8A6C2D4AC5F7ED2416478601A45A8C32D1AB9AE1FDFE6DDF7E94B6B06A20D6DA1
3,470,419 UART: Caliptra RT
3,470,764 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,575,053 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D98 ra=0x40007056 error_internal_intr_r=00000040
3,577,493 UART: [rt] WDT Expired
3,577,780 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,281 >>> mbox cmd response: success
2,987,631 UART:
2,987,647 UART: Running Caliptra FMC ...
2,988,055 UART:
2,988,198 UART: [state] CFI Enabled
2,998,825 UART: [fht] FMC Alias Private Key: 7
3,106,574 UART: [art] Extend RT PCRs Done
3,107,002 UART: [art] Lock RT PCRs Done
3,108,304 UART: [art] Populate DV Done
3,116,543 UART: [fht] FMC Alias Private Key: 7
3,117,557 UART: [art] Derive CDI
3,117,837 UART: [art] Store in in slot 0x4
3,203,602 UART: [art] Derive Key Pair
3,203,962 UART: [art] Store priv key in slot 0x5
3,217,180 UART: [art] Derive Key Pair - Done
3,231,980 UART: [art] Signing Cert with AUTHO
3,232,460 UART: RITY.KEYID = 7
3,247,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,615 UART: [art] PUB.X = ED0528042C656DA9AED29A9F7C68089D336C47B4A46447A2397AD74EC00DEE73682A9E6333244AF579A09EF90EAFA37D
3,255,378 UART: [art] PUB.Y = 79EF9771375859724A324B6FE9589F5D5FB3571C587F5B41A27497FFF4388B5164023E593EFA1CC75A433073CC85D664
3,262,319 UART: [art] SIG.R = 9C657390937A360F2A05D4868057F293FFAE36891DD0008746A386722EDA326E7F71C7A5C636E19C53826AF279DA6147
3,269,053 UART: [art] SIG.S = C0F176B77FE371994EB0CE07656655140E4C5F9EF6D35334DB6FA73BA5650E7C949AFA968B1F889436CB53796E12EFAD
3,292,679 UART: Caliptra RT
3,293,024 UART: [state] CFI Enabled
3,401,676 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,528 >>> mbox cmd response: success
2,987,867 UART:
2,987,883 UART: Running Caliptra FMC ...
2,988,291 UART:
2,988,434 UART: [state] CFI Enabled
2,999,062 UART: [fht] FMC Alias Private Key: 7
3,106,821 UART: [art] Extend RT PCRs Done
3,107,249 UART: [art] Lock RT PCRs Done
3,108,551 UART: [art] Populate DV Done
3,116,790 UART: [fht] FMC Alias Private Key: 7
3,117,804 UART: [art] Derive CDI
3,118,084 UART: [art] Store in in slot 0x4
3,203,847 UART: [art] Derive Key Pair
3,204,207 UART: [art] Store priv key in slot 0x5
3,217,425 UART: [art] Derive Key Pair - Done
3,232,220 UART: [art] Signing Cert with AUTHO
3,232,700 UART: RITY.KEYID = 7
3,248,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,855 UART: [art] PUB.X = C3D43E10F9F5D499B88FB926B5F90F81861D0663B08729774E0595E5F1D4085A7222127AB92D9FB28B6A085B696A0A3B
3,255,605 UART: [art] PUB.Y = AE5700AA9FEB7A1CFEA008B3049A174CDD9BD91506B38F5CF3D5A4014312A6AEC2744BB9AD6EB915783A3C1F3ADFE4B4
3,262,545 UART: [art] SIG.R = 902505DCB88209A822205CEF55A0CF1B22F85EF0BD35BD60303F807FC3A4B271B1A9D0F806122D6823A9D300B1793B51
3,269,286 UART: [art] SIG.S = 19B04A5A68AC75CC68E12FB1A50584A755E704AF21A88092A214DD95035214DCFFF6FDCA67307C95F46C8C705671E7CB
3,292,910 UART: Caliptra RT
3,293,255 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,397,445 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D9E ra=0x40007056 error_internal_intr_r=00000040
3,399,887 UART: [rt] WDT Expired
3,400,174 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,920 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,224 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,715 >>> mbox cmd response: success
2,771,871 UART: [afmc] ++
2,772,039 UART: [afmc] CDI.KEYID = 6
2,772,401 UART: [afmc] SUBJECT.KEYID = 7
2,772,826 UART: [afmc] AUTHORITY.KEYID = 5
2,808,193 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,830,732 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,617 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,336 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,086 UART: [afmc] --
2,851,158 UART: [cold-reset] --
2,852,078 UART: [state] Locking Datavault
2,853,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,873 UART: [state] Locking ICCM
2,854,293 UART: [exit] Launching FMC @ 0x40000130
2,859,622 UART:
2,859,638 UART: Running Caliptra FMC ...
2,860,046 UART:
2,860,100 UART: [state] CFI Enabled
2,870,685 UART: [fht] FMC Alias Private Key: 7
2,978,026 UART: [art] Extend RT PCRs Done
2,978,454 UART: [art] Lock RT PCRs Done
2,980,186 UART: [art] Populate DV Done
2,988,465 UART: [fht] FMC Alias Private Key: 7
2,989,457 UART: [art] Derive CDI
2,989,737 UART: [art] Store in in slot 0x4
3,074,808 UART: [art] Derive Key Pair
3,075,168 UART: [art] Store priv key in slot 0x5
3,088,794 UART: [art] Derive Key Pair - Done
3,103,781 UART: [art] Signing Cert with AUTHO
3,104,261 UART: RITY.KEYID = 7
3,119,449 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,214 UART: [art] PUB.X = FA7FC1955E6964E52E33AE7EDF634492904EF086C59F6A6CD7FB7B64DD06FEA86012EBE82BE0058669DA093710B73DFA
3,126,989 UART: [art] PUB.Y = C8C791775934BE03976FC0827D636D0117497F408A48FFFFAEE5B2D74612DF94E64F74FDF6D5471E518C8F3488785A21
3,133,933 UART: [art] SIG.R = CA4F0A76B6B88804C8F3C10996394DC58159F84414EE394FD4BE55119BB85A4FE5585E7004A7C1F236948F5BC4D05372
3,140,691 UART: [art] SIG.S = A8EFC89EB2C701173A81A77EA78F2F9B41E689D4BBC9D8978D90E43286427A1073127C8533C75071630C019332F4D993
3,164,247 UART: Caliptra RT
3,164,500 UART: [state] CFI Enabled
3,272,236 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3180416 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,456 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,946 >>> mbox cmd response: success
2,772,099 UART: [afmc] ++
2,772,267 UART: [afmc] CDI.KEYID = 6
2,772,629 UART: [afmc] SUBJECT.KEYID = 7
2,773,054 UART: [afmc] AUTHORITY.KEYID = 5
2,808,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,228 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,830,939 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,836,839 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,842,536 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,271 UART: [afmc] --
2,851,342 UART: [cold-reset] --
2,852,262 UART: [state] Locking Datavault
2,853,453 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,057 UART: [state] Locking ICCM
2,854,477 UART: [exit] Launching FMC @ 0x40000130
2,859,806 UART:
2,859,822 UART: Running Caliptra FMC ...
2,860,230 UART:
2,860,284 UART: [state] CFI Enabled
2,870,870 UART: [fht] FMC Alias Private Key: 7
2,978,221 UART: [art] Extend RT PCRs Done
2,978,649 UART: [art] Lock RT PCRs Done
2,980,381 UART: [art] Populate DV Done
2,988,660 UART: [fht] FMC Alias Private Key: 7
2,989,652 UART: [art] Derive CDI
2,989,932 UART: [art] Store in in slot 0x4
3,075,001 UART: [art] Derive Key Pair
3,075,361 UART: [art] Store priv key in slot 0x5
3,088,987 UART: [art] Derive Key Pair - Done
3,103,973 UART: [art] Signing Cert with AUTHO
3,104,453 UART: RITY.KEYID = 7
3,119,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,406 UART: [art] PUB.X = F767190E8BE07EC28878F65F2F9E6C7CE7BA01C910AFEE2D399E7C40104471C88D998ED177A07817DDAAF267F844C3BA
3,127,182 UART: [art] PUB.Y = 13141DCEF3BC7A0387EB1430714E1FFD65A0AC45BB8880A1861EE551C8C8B6E1C80EACEBA0ABBE14F88A95CC6D3E541B
3,134,150 UART: [art] SIG.R = 0B2E2FFAF92CA6C8136B127349D1D5AC62716F179FB2AD1243F27322FB791309A628A174E836CE075809190851527814
3,140,897 UART: [art] SIG.S = E5148485C8B18A112EA047DC2C6DF5E63D57077317E7D8DF40CFF90368387B32C63CD7DC040E6829F19428ACF0FDF8F2
3,164,462 UART: Caliptra RT
3,164,715 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,268,038 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D98 ra=0x40007056 error_internal_intr_r=00000040
3,270,478 UART: [rt] WDT Expired
3,270,765 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,696 >>> mbox cmd response: success
2,684,266 UART:
2,684,282 UART: Running Caliptra FMC ...
2,684,690 UART:
2,684,744 UART: [state] CFI Enabled
2,695,329 UART: [fht] FMC Alias Private Key: 7
2,802,670 UART: [art] Extend RT PCRs Done
2,803,098 UART: [art] Lock RT PCRs Done
2,804,830 UART: [art] Populate DV Done
2,813,109 UART: [fht] FMC Alias Private Key: 7
2,814,101 UART: [art] Derive CDI
2,814,381 UART: [art] Store in in slot 0x4
2,899,452 UART: [art] Derive Key Pair
2,899,812 UART: [art] Store priv key in slot 0x5
2,913,438 UART: [art] Derive Key Pair - Done
2,928,429 UART: [art] Signing Cert with AUTHO
2,928,909 UART: RITY.KEYID = 7
2,944,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,862 UART: [art] PUB.X = 51A967082F78E3EC6269BFFF53B878361EEE428A0F8DBF34DF384E6D317816DEA4AF62C29EA6397EE5817EDC6DEFFFD9
2,951,646 UART: [art] PUB.Y = ECBB02AA3BA2E58EA201E0EDC3627D3952AE9856DDEA596D3D22545FD8F6EB0FEF8664C5632C90FBC83BB787E0A97766
2,958,607 UART: [art] SIG.R = F8DA974B8790933E89EE06E1400C925499665C7ADD768DCA3C7FDCD9019D9B86A99819C34E3F13D239B3135AF5078FBF
2,965,371 UART: [art] SIG.S = DF8BF22E70159C102C14D2B632ABA04D0835C1C60E28879830227DD3C5B52D4A0400074F3A2979571805055D44146ED3
2,988,894 UART: Caliptra RT
2,989,147 UART: [state] CFI Enabled
3,096,883 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,943 >>> mbox cmd response: success
2,684,502 UART:
2,684,518 UART: Running Caliptra FMC ...
2,684,926 UART:
2,684,980 UART: [state] CFI Enabled
2,695,566 UART: [fht] FMC Alias Private Key: 7
2,802,917 UART: [art] Extend RT PCRs Done
2,803,345 UART: [art] Lock RT PCRs Done
2,805,077 UART: [art] Populate DV Done
2,813,356 UART: [fht] FMC Alias Private Key: 7
2,814,348 UART: [art] Derive CDI
2,814,628 UART: [art] Store in in slot 0x4
2,899,697 UART: [art] Derive Key Pair
2,900,057 UART: [art] Store priv key in slot 0x5
2,913,683 UART: [art] Derive Key Pair - Done
2,928,667 UART: [art] Signing Cert with AUTHO
2,929,147 UART: RITY.KEYID = 7
2,944,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,100 UART: [art] PUB.X = AD4A33B75C46D56C3F86E3A6B286E062AEFBE95FC6D2CB0B1F083D046EAA986DE6C20946D16217F49E84A0369081DCC9
2,951,872 UART: [art] PUB.Y = 42278CD972877BD42D7C7D545711A5475DBF4875DA5D81FAF4E0AC87A426243C0BF5DF77C0D10C9B1E83C88B059DFEE7
2,958,825 UART: [art] SIG.R = F7288B045916694623B43A9B0F94EF594EDEC5A158F58E12B108CA53AC002FAA48C447C90BFC45EEA0AE0A629DA366E9
2,965,570 UART: [art] SIG.S = 1B9C18493D65641685A46C2667606E69434C09DF4D84EE3147FEBD589EDED80E40D3C53C7F8EF6193528D6BA14AAA05D
2,989,139 UART: Caliptra RT
2,989,392 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,092,659 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D9E ra=0x40007056 error_internal_intr_r=00000040
3,095,101 UART: [rt] WDT Expired
3,095,388 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,565 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,096 >>> mbox cmd response: success
2,773,112 UART: [afmc] ++
2,773,280 UART: [afmc] CDI.KEYID = 6
2,773,642 UART: [afmc] SUBJECT.KEYID = 7
2,774,067 UART: [afmc] AUTHORITY.KEYID = 5
2,810,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,425 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,153 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,038 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,757 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,623 UART: [afmc] --
2,853,501 UART: [cold-reset] --
2,854,545 UART: [state] Locking Datavault
2,855,888 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,492 UART: [state] Locking ICCM
2,856,966 UART: [exit] Launching FMC @ 0x40000130
2,862,295 UART:
2,862,311 UART: Running Caliptra FMC ...
2,862,719 UART:
2,862,862 UART: [state] CFI Enabled
2,873,791 UART: [fht] FMC Alias Private Key: 7
2,982,500 UART: [art] Extend RT PCRs Done
2,982,928 UART: [art] Lock RT PCRs Done
2,984,536 UART: [art] Populate DV Done
2,992,611 UART: [fht] FMC Alias Private Key: 7
2,993,551 UART: [art] Derive CDI
2,993,831 UART: [art] Store in in slot 0x4
3,079,412 UART: [art] Derive Key Pair
3,079,772 UART: [art] Store priv key in slot 0x5
3,093,078 UART: [art] Derive Key Pair - Done
3,107,950 UART: [art] Signing Cert with AUTHO
3,108,430 UART: RITY.KEYID = 7
3,123,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,397 UART: [art] PUB.X = 618EE839B80C3EA4C45EBBC4A52798F4DD283218DF4BE852B3E72131386B606EA8FAA275B317AF2C36EB0117089A5BAF
3,131,170 UART: [art] PUB.Y = 69A688C930E77AAE5B757D1BF53BBD6738771AB0CF51BBA031420050999CE5C88A673E394C069E6E0D30916AEAF9E8F4
3,138,100 UART: [art] SIG.R = 3496318554DDD268B7726E63D97F5DBA37DC79CE373BA451E69177A5CE6676C3642C3427B383C25A480842F29BCEB214
3,144,865 UART: [art] SIG.S = E89D1016A03995DA3D6EB192012DA179D4E56FD514DD1962E75BF9C1671365D477723963A128DA8BF934D033291C0C64
3,169,154 UART: Caliptra RT
3,169,499 UART: [state] CFI Enabled
3,277,474 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3184665 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,327 >>> mbox cmd response: success
2,773,340 UART: [afmc] ++
2,773,508 UART: [afmc] CDI.KEYID = 6
2,773,870 UART: [afmc] SUBJECT.KEYID = 7
2,774,295 UART: [afmc] AUTHORITY.KEYID = 5
2,810,410 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,901 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,649 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,833,360 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,839,260 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,844,957 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,852,808 UART: [afmc] --
2,853,685 UART: [cold-reset] --
2,854,729 UART: [state] Locking Datavault
2,856,072 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,676 UART: [state] Locking ICCM
2,857,150 UART: [exit] Launching FMC @ 0x40000130
2,862,479 UART:
2,862,495 UART: Running Caliptra FMC ...
2,862,903 UART:
2,863,046 UART: [state] CFI Enabled
2,873,976 UART: [fht] FMC Alias Private Key: 7
2,982,695 UART: [art] Extend RT PCRs Done
2,983,123 UART: [art] Lock RT PCRs Done
2,984,731 UART: [art] Populate DV Done
2,992,806 UART: [fht] FMC Alias Private Key: 7
2,993,746 UART: [art] Derive CDI
2,994,026 UART: [art] Store in in slot 0x4
3,079,605 UART: [art] Derive Key Pair
3,079,965 UART: [art] Store priv key in slot 0x5
3,093,271 UART: [art] Derive Key Pair - Done
3,108,137 UART: [art] Signing Cert with AUTHO
3,108,617 UART: RITY.KEYID = 7
3,123,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,584 UART: [art] PUB.X = 188BE486186E2DD8722675923759AFDF9BBDA15949D409CAE0AF65C80E26DDA8541321A481818202A93463E64019002B
3,131,317 UART: [art] PUB.Y = 6A5D44122E5167B86A86612AE02FDC2E04776A4BB7612AF2CCE857AE794C858780028C4F08D633DEC3088A70B76CCF68
3,138,259 UART: [art] SIG.R = 8DE47C77BBF43DD876B7BD471C373AD8191C571BD231D430B9D4DB41833A1E3B54A5758483A7ABC98C8ADF3A51904935
3,145,037 UART: [art] SIG.S = F7038BBDC04B5B4BCD346EC347C767C30C14C1C1408CB7BCA0945B8535D15E9D42F1E21687AD775350BBC8961877EC63
3,169,336 UART: Caliptra RT
3,169,681 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,273,268 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DA2 ra=0x40007056 error_internal_intr_r=00000040
3,275,710 UART: [rt] WDT Expired
3,275,997 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,077 >>> mbox cmd response: success
2,686,939 UART:
2,686,955 UART: Running Caliptra FMC ...
2,687,363 UART:
2,687,506 UART: [state] CFI Enabled
2,698,435 UART: [fht] FMC Alias Private Key: 7
2,807,144 UART: [art] Extend RT PCRs Done
2,807,572 UART: [art] Lock RT PCRs Done
2,809,180 UART: [art] Populate DV Done
2,817,255 UART: [fht] FMC Alias Private Key: 7
2,818,195 UART: [art] Derive CDI
2,818,475 UART: [art] Store in in slot 0x4
2,904,056 UART: [art] Derive Key Pair
2,904,416 UART: [art] Store priv key in slot 0x5
2,917,722 UART: [art] Derive Key Pair - Done
2,932,592 UART: [art] Signing Cert with AUTHO
2,933,072 UART: RITY.KEYID = 7
2,948,274 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,039 UART: [art] PUB.X = DBA783C6A1B1AEB6E53AE8E4811002192B5AD26B4D305053239FE0EB1E159408F584FED8D7150E2A53ACB3AA6D4CD027
2,955,814 UART: [art] PUB.Y = B61A6776305DA8D820315363E9BDD68DD34F5EB13175AEFD774FB1C59F54EB7D3FE5443FF266E47EA2C7710C83E102A1
2,962,768 UART: [art] SIG.R = 0D24601004CDF2E4C0AB58DB91685D6B0430F9614A9C40E5C5EC30C69ECAEF707429FCEB417AEB1D9F93F19C4CC948D5
2,969,545 UART: [art] SIG.S = 4F64046ACBE59A0F58E45E26059F5C2507614B681F3D1112667872C62507D30F39D675D94BF2870C8EC133F31FC0A887
2,993,817 UART: Caliptra RT
2,994,162 UART: [state] CFI Enabled
3,102,119 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,324 >>> mbox cmd response: success
2,687,175 UART:
2,687,191 UART: Running Caliptra FMC ...
2,687,599 UART:
2,687,742 UART: [state] CFI Enabled
2,698,672 UART: [fht] FMC Alias Private Key: 7
2,807,391 UART: [art] Extend RT PCRs Done
2,807,819 UART: [art] Lock RT PCRs Done
2,809,427 UART: [art] Populate DV Done
2,817,502 UART: [fht] FMC Alias Private Key: 7
2,818,442 UART: [art] Derive CDI
2,818,722 UART: [art] Store in in slot 0x4
2,904,301 UART: [art] Derive Key Pair
2,904,661 UART: [art] Store priv key in slot 0x5
2,917,967 UART: [art] Derive Key Pair - Done
2,932,832 UART: [art] Signing Cert with AUTHO
2,933,312 UART: RITY.KEYID = 7
2,948,514 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,279 UART: [art] PUB.X = 4EEEEFBCF2E8BF394B3E2DFF00123B5CB07C46936431387131888F1254F16BB6A5E83EF43671A8F62F0BAFD854D61E5E
2,956,038 UART: [art] PUB.Y = DD31161C112B9E29DE2F543E6DC62281144C9D0751D40773D63D4CF8A8415B9F9A33B2B60D2B78F582A8F62EE9AA9BE0
2,962,987 UART: [art] SIG.R = AB8C41FA9D118A612641A3AA33039000233497328453D4EFF45C231CAE432A053F1202C6E91FD824B4C5A27969FBAA53
2,969,726 UART: [art] SIG.S = 5187E604113B5562702324510C37702279F880365128741F050B0F8780AEBB37A17DA07D2C398345C1354DBE46985964
2,993,986 UART: Caliptra RT
2,994,331 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,097,887 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019D98 ra=0x40007056 error_internal_intr_r=00000040
3,100,327 UART: [rt] WDT Expired
3,100,614 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,423 UART: [kat] SHA2-256
901,363 UART: [kat] SHA2-384
904,004 UART: [kat] SHA2-512-ACC
905,905 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,080 UART: [kat] LMS
1,168,392 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,725 UART: [fht] FHT @ 0x50003400
1,172,473 UART: [idev] ++
1,172,641 UART: [idev] CDI.KEYID = 6
1,173,002 UART: [idev] SUBJECT.KEYID = 7
1,173,427 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,291 UART: [idev] Sha1 KeyId Algorithm
1,207,043 UART: [idev] --
1,208,270 UART: [ldev] ++
1,208,438 UART: [ldev] CDI.KEYID = 6
1,208,802 UART: [ldev] SUBJECT.KEYID = 5
1,209,229 UART: [ldev] AUTHORITY.KEYID = 7
1,209,692 UART: [ldev] FE.KEYID = 1
1,214,950 UART: [ldev] Erasing FE.KEYID = 1
1,240,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,852 UART: [ldev] --
1,280,198 UART: [fwproc] Wait for Commands...
1,280,887 UART: [fwproc] Recv command 0x46574c44
1,281,620 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,815 >>> mbox cmd response: success
2,769,978 UART: [afmc] ++
2,770,146 UART: [afmc] CDI.KEYID = 6
2,770,509 UART: [afmc] SUBJECT.KEYID = 7
2,770,935 UART: [afmc] AUTHORITY.KEYID = 5
2,806,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,386 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,137 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,828,866 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,834,749 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,840,468 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,223 UART: [afmc] --
2,849,295 UART: [cold-reset] --
2,850,215 UART: [state] Locking Datavault
2,851,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,010 UART: [state] Locking ICCM
2,852,430 UART: [exit] Launching FMC @ 0x40000130
2,857,759 UART:
2,857,775 UART: Running Caliptra FMC ...
2,858,183 UART:
2,858,237 UART: [state] CFI Enabled
2,868,822 UART: [fht] FMC Alias Private Key: 7
2,976,163 UART: [art] Extend RT PCRs Done
2,976,591 UART: [art] Lock RT PCRs Done
2,978,323 UART: [art] Populate DV Done
2,986,602 UART: [fht] FMC Alias Private Key: 7
2,987,594 UART: [art] Derive CDI
2,987,874 UART: [art] Store in in slot 0x4
3,072,945 UART: [art] Derive Key Pair
3,073,305 UART: [art] Store priv key in slot 0x5
3,086,931 UART: [art] Derive Key Pair - Done
3,101,916 UART: [art] Signing Cert with AUTHO
3,102,396 UART: RITY.KEYID = 7
3,117,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,349 UART: [art] PUB.X = E9D6DEF28FE1A5FAF5C282CEEE2B55190A40D2A3F5D1F61173D887E08E41C5E6B98407FBBD5CC4257EA3B2D6F47A5CB1
3,125,137 UART: [art] PUB.Y = 27B5F1AAA78A0BECB4988A5F26FE358838333FD020CC7DE4481BD4477B45B8559EFBB028806B1B8B0AEAD00319B47596
3,132,088 UART: [art] SIG.R = E4F692F1B23BD6C462AE72805A45BBCCBFEC4E910EEAF04CA7BC291A2B80F64210E98E3BFBE50B41F6F4775453DD1659
3,138,872 UART: [art] SIG.S = 749E1EFA963AC881AA4E455DD553031022CED4D556900D3E829E6902F9F4CEF866000996A04D07333B82726045EF8C54
3,162,402 UART: Caliptra RT
3,162,655 UART: [state] CFI Enabled
3,270,374 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3178584 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,711 UART: [kat] SHA2-256
901,651 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,541 UART: [cold-reset] ++
1,170,012 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 ready_for_fw is high
1,174,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,232 UART: [ldev] Erasing FE.KEYID = 1
1,241,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,757 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,451 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,027 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,091 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,242 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,551 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,046 >>> mbox cmd response: success
2,770,206 UART: [afmc] ++
2,770,374 UART: [afmc] CDI.KEYID = 6
2,770,737 UART: [afmc] SUBJECT.KEYID = 7
2,771,163 UART: [afmc] AUTHORITY.KEYID = 5
2,806,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,361 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,829,073 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,834,971 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,840,668 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,848,408 UART: [afmc] --
2,849,479 UART: [cold-reset] --
2,850,399 UART: [state] Locking Datavault
2,851,590 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,194 UART: [state] Locking ICCM
2,852,614 UART: [exit] Launching FMC @ 0x40000130
2,857,943 UART:
2,857,959 UART: Running Caliptra FMC ...
2,858,367 UART:
2,858,421 UART: [state] CFI Enabled
2,869,007 UART: [fht] FMC Alias Private Key: 7
2,976,358 UART: [art] Extend RT PCRs Done
2,976,786 UART: [art] Lock RT PCRs Done
2,978,518 UART: [art] Populate DV Done
2,986,797 UART: [fht] FMC Alias Private Key: 7
2,987,789 UART: [art] Derive CDI
2,988,069 UART: [art] Store in in slot 0x4
3,073,138 UART: [art] Derive Key Pair
3,073,498 UART: [art] Store priv key in slot 0x5
3,087,124 UART: [art] Derive Key Pair - Done
3,102,106 UART: [art] Signing Cert with AUTHO
3,102,586 UART: RITY.KEYID = 7
3,117,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,539 UART: [art] PUB.X = 017C854B3F76C8D2D0AAA18ADE29915BD57EB70BD9526B30807762DCDD285EBA64BB58C5745E9EC7BAD2D2F2921B0147
3,125,314 UART: [art] PUB.Y = FBB0DAEA1C6A91C76F2D8EAB947EE32B39A72F5C5BA34FE193097F755917FE18E51AB0094566C029F73D9D6CCCEAE39F
3,132,280 UART: [art] SIG.R = 571A9B410A4BDB6B16CB20729283ACAAE3CA59DFFE54ADAFB357159F95B2A7592A9F7ADB45D40B96E3B37926FF7363DC
3,139,064 UART: [art] SIG.S = AFCFF368AD11C116193DC79568E708459DB107F50CCA8884FE4788AFD7013BBCD3F260BC17C40F2915DB815DFAC1ADA1
3,162,636 UART: Caliptra RT
3,162,889 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,266,176 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DA2 ra=0x40007056 error_internal_intr_r=00000040
3,268,618 UART: [rt] WDT Expired
3,268,905 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,681 >>> mbox cmd response: success
2,680,281 UART:
2,680,297 UART: Running Caliptra FMC ...
2,680,705 UART:
2,680,759 UART: [state] CFI Enabled
2,691,344 UART: [fht] FMC Alias Private Key: 7
2,798,685 UART: [art] Extend RT PCRs Done
2,799,113 UART: [art] Lock RT PCRs Done
2,800,845 UART: [art] Populate DV Done
2,809,124 UART: [fht] FMC Alias Private Key: 7
2,810,116 UART: [art] Derive CDI
2,810,396 UART: [art] Store in in slot 0x4
2,895,467 UART: [art] Derive Key Pair
2,895,827 UART: [art] Store priv key in slot 0x5
2,909,453 UART: [art] Derive Key Pair - Done
2,924,441 UART: [art] Signing Cert with AUTHO
2,924,921 UART: RITY.KEYID = 7
2,940,109 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,874 UART: [art] PUB.X = 5192164D9E57A169D1F988602295CA38638E6F5B9C026D531535B01FFDE30073709615654CDC585EA1BBDC6A8E61BA3F
2,947,619 UART: [art] PUB.Y = 2A0ACFDF30B9E6BCE4FFB15CB3F3BE44D4A297EE8A9A8BB6BF9586868B512CB037C00BE01DB4E19DDA05DA839E193A70
2,954,588 UART: [art] SIG.R = 87C89BAF44B9471A35B29D5E3CDE8396EC7DBB125BECC5B03BE541A22F7312292C4CC51AC998C5FDE0495F10EB699AE3
2,961,376 UART: [art] SIG.S = 92125DF0EFBEC449DB5D4A8ADFEF75CA402BF1639C394E6E359A0071E6D92B4A960085BBEFF6A12EBDEA6079AA6B353F
2,984,927 UART: Caliptra RT
2,985,180 UART: [state] CFI Enabled
3,092,916 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,845 ready_for_fw is high
1,055,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,928 >>> mbox cmd response: success
2,680,517 UART:
2,680,533 UART: Running Caliptra FMC ...
2,680,941 UART:
2,680,995 UART: [state] CFI Enabled
2,691,581 UART: [fht] FMC Alias Private Key: 7
2,798,932 UART: [art] Extend RT PCRs Done
2,799,360 UART: [art] Lock RT PCRs Done
2,801,092 UART: [art] Populate DV Done
2,809,371 UART: [fht] FMC Alias Private Key: 7
2,810,363 UART: [art] Derive CDI
2,810,643 UART: [art] Store in in slot 0x4
2,895,712 UART: [art] Derive Key Pair
2,896,072 UART: [art] Store priv key in slot 0x5
2,909,698 UART: [art] Derive Key Pair - Done
2,924,685 UART: [art] Signing Cert with AUTHO
2,925,165 UART: RITY.KEYID = 7
2,940,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,118 UART: [art] PUB.X = 29B0E0D191D88BA9E69D1991060049BAD0FD1435FF1BEB398E990AA5C96DD8B274A29101DA0A6E05F46B36A6B0607677
2,947,857 UART: [art] PUB.Y = 9C85F7302D45F453A6CFDF1D0E886472CDB725D873E81463F80608DA68A41AFCA86776709E12C7424AF34EC91FF8F630
2,954,802 UART: [art] SIG.R = 3AF31D3EC28AD9185D7D54AAB8AE857B4DC2EF7B2727DE45CF5994BE2C8E54A24F09B0BD449994D10C7BB92A41D65B51
2,961,584 UART: [art] SIG.S = 52A7421B91A4C8E95E04E9DFCB315070B99BFAFF90C296EAAB4DBDDE00B98BF6F4F2C1E15E7AAB03DFD77C6747F88705
2,985,146 UART: Caliptra RT
2,985,399 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,088,692 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DA0 ra=0x40007056 error_internal_intr_r=00000040
3,091,134 UART: [rt] WDT Expired
3,091,421 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,150 UART: [kat] ++
896,302 UART: [kat] sha1
900,488 UART: [kat] SHA2-256
902,428 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,941 UART: [kat] HMAC-384Kdf
921,591 UART: [kat] LMS
1,169,903 UART: [kat] --
1,170,740 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,174,002 UART: [idev] ++
1,174,170 UART: [idev] CDI.KEYID = 6
1,174,531 UART: [idev] SUBJECT.KEYID = 7
1,174,956 UART: [idev] UDS.KEYID = 0
1,182,670 UART: [idev] Erasing UDS.KEYID = 0
1,200,152 UART: [idev] Sha1 KeyId Algorithm
1,209,086 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,725 UART: [ldev] SUBJECT.KEYID = 5
1,211,152 UART: [ldev] AUTHORITY.KEYID = 7
1,211,615 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,358 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,667 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,203 >>> mbox cmd response: success
2,771,226 UART: [afmc] ++
2,771,394 UART: [afmc] CDI.KEYID = 6
2,771,757 UART: [afmc] SUBJECT.KEYID = 7
2,772,183 UART: [afmc] AUTHORITY.KEYID = 5
2,808,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,565 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,294 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,177 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,767 UART: [afmc] --
2,851,645 UART: [cold-reset] --
2,852,689 UART: [state] Locking Datavault
2,854,032 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,636 UART: [state] Locking ICCM
2,855,110 UART: [exit] Launching FMC @ 0x40000130
2,860,439 UART:
2,860,455 UART: Running Caliptra FMC ...
2,860,863 UART:
2,861,006 UART: [state] CFI Enabled
2,871,935 UART: [fht] FMC Alias Private Key: 7
2,980,644 UART: [art] Extend RT PCRs Done
2,981,072 UART: [art] Lock RT PCRs Done
2,982,680 UART: [art] Populate DV Done
2,990,755 UART: [fht] FMC Alias Private Key: 7
2,991,695 UART: [art] Derive CDI
2,991,975 UART: [art] Store in in slot 0x4
3,077,556 UART: [art] Derive Key Pair
3,077,916 UART: [art] Store priv key in slot 0x5
3,091,222 UART: [art] Derive Key Pair - Done
3,106,087 UART: [art] Signing Cert with AUTHO
3,106,567 UART: RITY.KEYID = 7
3,121,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,534 UART: [art] PUB.X = 77C4A2E779EAB847D4E7802AA717637450162BB93E38B5BCD816852EF3EF12BE11FADA9F65D93B5FEC1FFC2603326E38
3,129,313 UART: [art] PUB.Y = 2FA3DE542B0B772F04CF27A6DE09074D0024CF21A686CFF4BFC1833450CC60C7D486548CE8D763FE418C9F5099B342E3
3,136,237 UART: [art] SIG.R = 02C28432058DEBF16B94FA26255D6C477F1F258611C449F13A30FCF99CF68B686F9EE52792E2243C700F7A8250694CFB
3,142,998 UART: [art] SIG.S = 261FE4C3A932D102FD8C151F70DB1C389DD8653B4F01450DC8D162E58C22025ED0B51C811AFF10EBD93E2A658889208C
3,167,291 UART: Caliptra RT
3,167,636 UART: [state] CFI Enabled
3,275,593 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3182814 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,438 UART: [kat] ++
896,590 UART: [kat] sha1
900,776 UART: [kat] SHA2-256
902,716 UART: [kat] SHA2-384
905,421 UART: [kat] SHA2-512-ACC
907,322 UART: [kat] ECC-384
917,229 UART: [kat] HMAC-384Kdf
921,879 UART: [kat] LMS
1,170,191 UART: [kat] --
1,171,028 UART: [cold-reset] ++
1,171,447 UART: [fht] FHT @ 0x50003400
1,174,289 UART: [idev] ++
1,174,457 UART: [idev] CDI.KEYID = 6
1,174,818 UART: [idev] SUBJECT.KEYID = 7
1,175,243 UART: [idev] UDS.KEYID = 0
1,175,589 ready_for_fw is high
1,175,589 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,437 UART: [idev] Sha1 KeyId Algorithm
1,209,370 UART: [idev] --
1,210,475 UART: [ldev] ++
1,210,643 UART: [ldev] CDI.KEYID = 6
1,211,007 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,742 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,436 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,306 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,012 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,040 UART: [ldev] --
1,282,504 UART: [fwproc] Wait for Commands...
1,283,089 UART: [fwproc] Recv command 0x46574c44
1,283,822 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,892 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,427 >>> mbox cmd response: success
2,771,447 UART: [afmc] ++
2,771,615 UART: [afmc] CDI.KEYID = 6
2,771,978 UART: [afmc] SUBJECT.KEYID = 7
2,772,404 UART: [afmc] AUTHORITY.KEYID = 5
2,808,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,782 UART: [afmc] PUB.X = 7C2BEA2E45DE0259E95704E0F22A5FF05CA7D678C8044370A2CFA9BF65285A45D2AB608541542E213BE2BDECE0C273D5
2,831,494 UART: [afmc] PUB.Y = ECFCECE775F7B6AD7045DB34E644660FAA7EFD55B4D093C47EE3AB68A626DD769366873CEC0430AC8A62C2DC3CEDBA24
2,837,392 UART: [afmc] SIG.R = 6E1D22E3568156F6BC3BD9E6C0F9FA236BB4261DED2B82089E01B2180CEAAA6C6610468A0469988370760DC89C489214
2,843,089 UART: [afmc] SIG.S = C79115B5D258660E52140D01F0AA028BCFF5631B96E322518A270575D2E258CDC180F92095947999791FEDA4887765C8
2,850,945 UART: [afmc] --
2,851,822 UART: [cold-reset] --
2,852,866 UART: [state] Locking Datavault
2,854,209 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,813 UART: [state] Locking ICCM
2,855,287 UART: [exit] Launching FMC @ 0x40000130
2,860,616 UART:
2,860,632 UART: Running Caliptra FMC ...
2,861,040 UART:
2,861,183 UART: [state] CFI Enabled
2,872,113 UART: [fht] FMC Alias Private Key: 7
2,980,832 UART: [art] Extend RT PCRs Done
2,981,260 UART: [art] Lock RT PCRs Done
2,982,868 UART: [art] Populate DV Done
2,990,943 UART: [fht] FMC Alias Private Key: 7
2,991,883 UART: [art] Derive CDI
2,992,163 UART: [art] Store in in slot 0x4
3,077,742 UART: [art] Derive Key Pair
3,078,102 UART: [art] Store priv key in slot 0x5
3,091,408 UART: [art] Derive Key Pair - Done
3,106,277 UART: [art] Signing Cert with AUTHO
3,106,757 UART: RITY.KEYID = 7
3,121,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,724 UART: [art] PUB.X = 30F478886E5AA74FFDC870384FC63CEC82D182F85DDCDC12595E16BCE6968E1AE8D0B1194CDA93ED1650599EDABC3724
3,129,510 UART: [art] PUB.Y = E08406245E5441869BF707567B6708A9C56C406B93FC81D8D362CB63E9A3363E25240C9E3CBD6F962E064028656C714F
3,136,437 UART: [art] SIG.R = 3F3FDC25B24382600540B7928D86FB68BD14977666456DD4A3DF841351B1423C0C351A97B723BAD8BB4E23C0CCD365DE
3,143,205 UART: [art] SIG.S = 7C6B6317D9810E17121388EA29AE75FD6E82AA2B678CADD4A67BB2CE258C5CA6CE4CC1A1B69FE16BE8221507A0D02E60
3,167,512 UART: Caliptra RT
3,167,857 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,271,387 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DA2 ra=0x40007056 error_internal_intr_r=00000040
3,273,829 UART: [rt] WDT Expired
3,274,116 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,062 >>> mbox cmd response: success
2,682,954 UART:
2,682,970 UART: Running Caliptra FMC ...
2,683,378 UART:
2,683,521 UART: [state] CFI Enabled
2,694,450 UART: [fht] FMC Alias Private Key: 7
2,803,159 UART: [art] Extend RT PCRs Done
2,803,587 UART: [art] Lock RT PCRs Done
2,805,195 UART: [art] Populate DV Done
2,813,270 UART: [fht] FMC Alias Private Key: 7
2,814,210 UART: [art] Derive CDI
2,814,490 UART: [art] Store in in slot 0x4
2,900,071 UART: [art] Derive Key Pair
2,900,431 UART: [art] Store priv key in slot 0x5
2,913,737 UART: [art] Derive Key Pair - Done
2,928,608 UART: [art] Signing Cert with AUTHO
2,929,088 UART: RITY.KEYID = 7
2,944,290 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,055 UART: [art] PUB.X = 69832154B4251D16CDB8E06EA60021135BA97B747E057DD13AE216FB63EA614F2AB55F289613C28161D14E72A7308B9A
2,951,798 UART: [art] PUB.Y = 2C604E28D75B3F57599A38682E0B7C626540A3C62FA414371729398C154AF08556387F5E56690DD39D4E39C3680090B4
2,958,706 UART: [art] SIG.R = CF46EDA4D3C1959F7518AD4A36F9CA5722905945654AB5E3E5A83693981DCDDD9B61B20F0BB00C81354814067A8C21C5
2,965,468 UART: [art] SIG.S = 72AEC6AD0C732058AAEB8F66EC0ACE9866E32320AE9F9945965100DC69DB65DAC7197F284FDB94A44E660993A88A3E50
2,989,746 UART: Caliptra RT
2,990,091 UART: [state] CFI Enabled
3,097,998 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,374 ready_for_fw is high
1,057,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,309 >>> mbox cmd response: success
2,683,190 UART:
2,683,206 UART: Running Caliptra FMC ...
2,683,614 UART:
2,683,757 UART: [state] CFI Enabled
2,694,687 UART: [fht] FMC Alias Private Key: 7
2,803,406 UART: [art] Extend RT PCRs Done
2,803,834 UART: [art] Lock RT PCRs Done
2,805,442 UART: [art] Populate DV Done
2,813,517 UART: [fht] FMC Alias Private Key: 7
2,814,457 UART: [art] Derive CDI
2,814,737 UART: [art] Store in in slot 0x4
2,900,316 UART: [art] Derive Key Pair
2,900,676 UART: [art] Store priv key in slot 0x5
2,913,982 UART: [art] Derive Key Pair - Done
2,928,850 UART: [art] Signing Cert with AUTHO
2,929,330 UART: RITY.KEYID = 7
2,944,532 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,297 UART: [art] PUB.X = 75198D9BD65654DCC1D9D74411D42078B255DEFEF80F48B448AD5EC541974AA203390CFCCFCBBD86AE3D14DA29500624
2,952,067 UART: [art] PUB.Y = BE04519ABCEA8A79F68F58638F9DDE403FA6C8B62936D5B9B63A5A7A79D19808CFF5CB7DBB803ABFEC4748A573711431
2,959,027 UART: [art] SIG.R = 92BF4402FC1EB7342AA1137B2D4EFB6794A34882D1CA8C7824CD5604B960225D0576EE976FA1E5C7EEE540F6B3EF1D88
2,965,798 UART: [art] SIG.S = F0CA3D23E4788E6AAE2DC06C6FBAB4FA8DDD3009DD042A1B131E76E4F9B922884C62342C618EA6E439F719C66E3ECDE9
2,990,109 UART: Caliptra RT
2,990,454 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005440
3,093,766 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40019DA2 ra=0x40007056 error_internal_intr_r=00000040
3,096,208 UART: [rt] WDT Expired
3,096,495 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
891,588 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,717 UART: [kat] ++
895,869 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,185 UART: [cold-reset] ++
1,170,639 UART: [fht] FHT @ 0x50003400
1,173,331 UART: [idev] ++
1,173,499 UART: [idev] CDI.KEYID = 6
1,173,860 UART: [idev] SUBJECT.KEYID = 7
1,174,285 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
915,841 UART: [kat] HMAC-384Kdf
920,489 UART: [kat] LMS
1,168,801 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,698 UART: [idev] ++
1,172,866 UART: [idev] CDI.KEYID = 6
1,173,227 UART: [idev] SUBJECT.KEYID = 7
1,173,652 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
915,544 UART: [kat] HMAC-384Kdf
920,106 UART: [kat] LMS
1,168,418 UART: [kat] --
1,169,337 UART: [cold-reset] ++
1,169,771 UART: [fht] FHT @ 0x50003400
1,172,475 UART: [idev] ++
1,172,643 UART: [idev] CDI.KEYID = 6
1,173,004 UART: [idev] SUBJECT.KEYID = 7
1,173,429 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,817 UART: [kat] SHA2-256
891,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,484 UART: [idev] ++
1,173,652 UART: [idev] CDI.KEYID = 6
1,174,013 UART: [idev] SUBJECT.KEYID = 7
1,174,438 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,730 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,031 UART: [kat] ++
895,183 UART: [kat] sha1
899,421 UART: [kat] SHA2-256
901,361 UART: [kat] SHA2-384
904,124 UART: [kat] SHA2-512-ACC
906,025 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,561 UART: [cold-reset] ++
1,170,071 UART: [fht] FHT @ 0x50003400
1,172,875 UART: [idev] ++
1,173,043 UART: [idev] CDI.KEYID = 6
1,173,404 UART: [idev] SUBJECT.KEYID = 7
1,173,829 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3792 , 3792
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,354 UART: [kat] ++
895,506 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
915,815 UART: [kat] HMAC-384Kdf
920,503 UART: [kat] LMS
1,168,815 UART: [kat] --
1,170,052 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3947 , 3947
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
192,020 UART:
192,377 UART: Running Caliptra ROM ...
193,473 UART:
193,608 UART: [state] CFI Enabled
265,501 UART: [state] LifecycleState = Production
267,294 UART: [state] DebugLocked = Yes
269,288 UART: [state] Starting the Watchdog Timer 40000000 cycles
275,444 UART: [kat] SHA2-256
445,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,653 UART: [kat] ++
456,208 UART: [kat] sha1
467,297 UART: [kat] SHA2-256
469,942 UART: [kat] SHA2-384
476,726 UART: [kat] SHA2-512-ACC
479,140 UART: [kat] ECC-384
2,768,390 UART: [kat] HMAC-384Kdf
2,779,862 UART: [kat] LMS
3,970,199 UART: [kat] --
3,975,634 UART: [cold-reset] ++
3,976,999 UART: [fht] Storing FHT @ 0x50003400
3,987,485 UART: [idev] ++
3,988,119 UART: [idev] CDI.KEYID = 6
3,989,027 UART: [idev] SUBJECT.KEYID = 7
3,990,272 UART: [idev] UDS.KEYID = 0
3,991,319 ready_for_fw is high
3,991,543 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,748 UART: [idev] Erasing UDS.KEYID = 0
7,328,401 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,488 UART: [idev] --
7,354,187 UART: [ldev] ++
7,354,788 UART: [ldev] CDI.KEYID = 6
7,355,714 UART: [ldev] SUBJECT.KEYID = 5
7,356,924 UART: [ldev] AUTHORITY.KEYID = 7
7,358,151 UART: [ldev] FE.KEYID = 1
7,405,198 UART: [ldev] Erasing FE.KEYID = 1
10,740,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,841 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,068,330 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,083,008 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,097,355 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,116,405 UART: [ldev] --
13,121,456 UART: [fwproc] Waiting for Commands...
13,123,776 UART: [fwproc] Received command 0x46574c44
13,125,951 UART: [fwproc] Received Image of size 113844 bytes
17,209,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,285,140 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,354,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,670,426 >>> mbox cmd response: success
17,674,100 UART: [afmc] ++
17,674,717 UART: [afmc] CDI.KEYID = 6
17,675,626 UART: [afmc] SUBJECT.KEYID = 7
17,676,842 UART: [afmc] AUTHORITY.KEYID = 5
21,036,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,337,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,339,771 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,354,422 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,369,113 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,383,470 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,404,560 UART: [afmc] --
23,408,748 UART: [cold-reset] --
23,413,038 UART: [state] Locking Datavault
23,417,688 UART: [state] Locking PCR0, PCR1 and PCR31
23,419,438 UART: [state] Locking ICCM
23,421,963 UART: [exit] Launching FMC @ 0x40000130
23,430,355 UART:
23,430,590 UART: Running Caliptra FMC ...
23,431,688 UART:
23,431,844 UART: [state] CFI Enabled
23,496,598 UART: [fht] FMC Alias Private Key: 7
25,834,485 UART: [art] Extend RT PCRs Done
25,835,715 UART: [art] Lock RT PCRs Done
25,837,238 UART: [art] Populate DV Done
25,842,543 UART: [fht] FMC Alias Private Key: 7
25,844,206 UART: [art] Derive CDI
25,845,018 UART: [art] Store in in slot 0x4
25,905,411 UART: [art] Derive Key Pair
25,906,406 UART: [art] Store priv key in slot 0x5
29,199,105 UART: [art] Derive Key Pair - Done
29,212,007 UART: [art] Signing Cert with AUTHO
29,213,314 UART: RITY.KEYID = 7
31,501,013 UART: [art] Erasing AUTHORITY.KEYID = 7
31,502,533 UART: [art] PUB.X = 27F90CDEBE29C9690F949086328CBE186FE0336E6D2AE2D56D2400130E9428F4738521D84D79F04D7BA501C52F461E58
31,509,721 UART: [art] PUB.Y = 9E707A81C6DBC9F882802E304A5C60D9FB4FBA28A6B1E594DA852C8FF3E38F0CD9384189E8EFDF2DF1BE35E50608EE05
31,516,989 UART: [art] SIG.R = 45761492B73F42F8F053541514C9F46492C43882AC24022546E30038BFCB2A4A96ECB5E139848D33191BD8858814918A
31,524,347 UART: [art] SIG.S = 2599D2DE665B0384A4C7AA5246B326841FD0D5B7CB76E7FD1417B0DB6F0FF74893F583703789251CEE46E31D14551270
32,829,932 UART: Caliptra RT
32,830,636 UART: [state] CFI Enabled
32,990,483 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,033 UART:
1,203 UART: Running Caliptra ROM ...
2,251 UART:
2,397 UART: [state] CFI Enabled
67,717 UART: [state] LifecycleState = Production
69,479 UART: [state] DebugLocked = Yes
71,299 UART: [state] Starting the Watchdog Timer 40000000 cycles
75,804 UART: [kat] SHA2-256
245,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
256,020 UART: [kat] ++
256,539 UART: [kat] sha1
267,299 UART: [kat] SHA2-256
270,026 UART: [kat] SHA2-384
275,031 UART: [kat] SHA2-512-ACC
277,420 UART: [kat] ECC-384
2,568,634 UART: [kat] HMAC-384Kdf
2,580,397 UART: [kat] LMS
3,770,720 UART: [kat] --
3,773,789 UART: [warm-reset] ++
3,778,145 UART: [warm-reset] --
3,782,110 UART: [state] Locking Datavault
3,785,573 UART: [state] Locking PCR0, PCR1 and PCR31
3,787,326 UART: [state] Locking ICCM
3,788,798 UART: [exit] Launching FMC @ 0x40000130
3,797,184 UART:
3,797,414 UART: Running Caliptra FMC ...
3,798,431 UART:
3,798,576 UART: [state] CFI Enabled
3,852,021 UART: [aliasrt :skip pcr extension
3,853,317 UART: [art] Extend RT PCRs Done
3,854,381 UART: [art] Lock RT PCRs Done
3,855,557 UART: [art] Populate DV Done
3,861,035 UART: [fht] FMC Alias Private Key: 7
3,862,739 UART: [art] Derive CDI
3,863,548 UART: [art] Store in in slot 0x4
3,920,470 UART: [art] Derive Key Pair
3,921,515 UART: [art] Store priv key in slot 0x5
7,214,696 UART: [art] Derive Key Pair - Done
7,227,753 UART: [art] Signing Cert with AUTHO
7,229,057 UART: RITY.KEYID = 7
9,515,676 UART: [art] Erasing AUTHORITY.KEYID = 7
9,517,187 UART: [art] PUB.X = 27F90CDEBE29C9690F949086328CBE186FE0336E6D2AE2D56D2400130E9428F4738521D84D79F04D7BA501C52F461E58
9,524,441 UART: [art] PUB.Y = 9E707A81C6DBC9F882802E304A5C60D9FB4FBA28A6B1E594DA852C8FF3E38F0CD9384189E8EFDF2DF1BE35E50608EE05
9,531,677 UART: [art] SIG.R = 45761492B73F42F8F053541514C9F46492C43882AC24022546E30038BFCB2A4A96ECB5E139848D33191BD8858814918A
9,539,025 UART: [art] SIG.S = 2599D2DE665B0384A4C7AA5246B326841FD0D5B7CB76E7FD1417B0DB6F0FF74893F583703789251CEE46E31D14551270
10,844,340 UART: Caliptra RT
10,845,049 UART: [state] CFI Enabled
11,176,273 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
3,782,822 ready_for_fw is high
3,783,250 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,906,155 >>> mbox cmd response: success
23,612,384 UART:
23,612,792 UART: Running Caliptra FMC ...
23,613,929 UART:
23,614,093 UART: [state] CFI Enabled
23,679,496 UART: [fht] FMC Alias Private Key: 7
26,018,099 UART: [art] Extend RT PCRs Done
26,019,323 UART: [art] Lock RT PCRs Done
26,021,273 UART: [art] Populate DV Done
26,026,635 UART: [fht] FMC Alias Private Key: 7
26,028,117 UART: [art] Derive CDI
26,028,898 UART: [art] Store in in slot 0x4
26,088,377 UART: [art] Derive Key Pair
26,089,414 UART: [art] Store priv key in slot 0x5
29,382,570 UART: [art] Derive Key Pair - Done
29,395,792 UART: [art] Signing Cert with AUTHO
29,397,094 UART: RITY.KEYID = 7
31,684,930 UART: [art] Erasing AUTHORITY.KEYID = 7
31,686,441 UART: [art] PUB.X = BC98ABAC07472F50CD068814F4BA445160B1FC14BC78798E5EDF4E607799D9B2E7F73F10A91961359D913C9E281C8418
31,693,683 UART: [art] PUB.Y = 161CFDC21770EBCCFFCCD1EF1358685196442600A923F9C6D66752D6B4C5AC94192078BB5A3D1B5C8AF6D1FEA39358EB
31,700,895 UART: [art] SIG.R = 8C24493295BF5869F637A5CFC549C62F12FCACA6E6ECD90F8F4A4EDB20A266D1BD738DECD00D8E553A810ADA708D8740
31,708,313 UART: [art] SIG.S = 28F0423019CF3D01EAD19E7AB3A7B6A2CAB5D351D19DFD6CA0428A8EC2FEFE0DF9FC52682A634F3FD0ED0EB494AA89F7
33,013,576 UART: Caliptra RT
33,014,283 UART: [state] CFI Enabled
33,175,497 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,589,220 UART:
3,589,567 UART: Running Caliptra FMC ...
3,590,606 UART:
3,590,755 UART: [state] CFI Enabled
3,637,773 UART: [aliasrt :skip pcr extension
3,639,072 UART: [art] Extend RT PCRs Done
3,640,143 UART: [art] Lock RT PCRs Done
3,641,290 UART: [art] Populate DV Done
3,646,726 UART: [fht] FMC Alias Private Key: 7
3,648,309 UART: [art] Derive CDI
3,649,041 UART: [art] Store in in slot 0x4
3,706,185 UART: [art] Derive Key Pair
3,707,226 UART: [art] Store priv key in slot 0x5
7,000,279 UART: [art] Derive Key Pair - Done
7,013,182 UART: [art] Signing Cert with AUTHO
7,014,532 UART: RITY.KEYID = 7
9,301,616 UART: [art] Erasing AUTHORITY.KEYID = 7
9,303,140 UART: [art] PUB.X = BC98ABAC07472F50CD068814F4BA445160B1FC14BC78798E5EDF4E607799D9B2E7F73F10A91961359D913C9E281C8418
9,310,388 UART: [art] PUB.Y = 161CFDC21770EBCCFFCCD1EF1358685196442600A923F9C6D66752D6B4C5AC94192078BB5A3D1B5C8AF6D1FEA39358EB
9,317,617 UART: [art] SIG.R = 8C24493295BF5869F637A5CFC549C62F12FCACA6E6ECD90F8F4A4EDB20A266D1BD738DECD00D8E553A810ADA708D8740
9,325,020 UART: [art] SIG.S = 28F0423019CF3D01EAD19E7AB3A7B6A2CAB5D351D19DFD6CA0428A8EC2FEFE0DF9FC52682A634F3FD0ED0EB494AA89F7
10,630,386 UART: Caliptra RT
10,631,082 UART: [state] CFI Enabled
10,962,361 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,156 writing to cptra_bootfsm_go
192,759 UART:
193,147 UART: Running Caliptra ROM ...
194,227 UART:
603,853 UART: [state] CFI Enabled
618,162 UART: [state] LifecycleState = Production
619,906 UART: [state] DebugLocked = Yes
622,665 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,114 UART: [kat] SHA2-256
796,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,485 UART: [kat] ++
807,947 UART: [kat] sha1
819,525 UART: [kat] SHA2-256
822,241 UART: [kat] SHA2-384
826,660 UART: [kat] SHA2-512-ACC
829,027 UART: [kat] ECC-384
3,112,453 UART: [kat] HMAC-384Kdf
3,124,777 UART: [kat] LMS
4,314,914 UART: [kat] --
4,319,702 UART: [cold-reset] ++
4,321,468 UART: [fht] Storing FHT @ 0x50003400
4,333,526 UART: [idev] ++
4,334,160 UART: [idev] CDI.KEYID = 6
4,335,225 UART: [idev] SUBJECT.KEYID = 7
4,336,329 UART: [idev] UDS.KEYID = 0
4,337,259 ready_for_fw is high
4,337,452 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,449 UART: [idev] Erasing UDS.KEYID = 0
7,627,923 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,637 UART: [idev] --
7,652,391 UART: [ldev] ++
7,652,954 UART: [ldev] CDI.KEYID = 6
7,653,912 UART: [ldev] SUBJECT.KEYID = 5
7,655,121 UART: [ldev] AUTHORITY.KEYID = 7
7,656,416 UART: [ldev] FE.KEYID = 1
7,668,031 UART: [ldev] Erasing FE.KEYID = 1
10,956,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,042 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,261,582 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,276,256 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,290,622 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,309,292 UART: [ldev] --
13,314,660 UART: [fwproc] Waiting for Commands...
13,316,857 UART: [fwproc] Received command 0x46574c44
13,319,032 UART: [fwproc] Received Image of size 113844 bytes
17,399,178 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,482,104 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,551,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,868,223 >>> mbox cmd response: success
17,872,743 UART: [afmc] ++
17,873,348 UART: [afmc] CDI.KEYID = 6
17,874,260 UART: [afmc] SUBJECT.KEYID = 7
17,875,469 UART: [afmc] AUTHORITY.KEYID = 5
21,184,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,478,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,480,665 UART: [afmc] PUB.X = 2EBD1F44E8356E76AA5B4B571EDDB0592DED681BCDBDE56A7B3B7451C268150E6091D9EC3D26AB8AA130635DFA27850B
23,495,346 UART: [afmc] PUB.Y = 871291E1A912A3FB43B82229D0D9FBABBDA46E06AF4BD7B9331196E34E99B01D0E8E11D7A2DCAFCF0166329526026B11
23,510,068 UART: [afmc] SIG.R = EC6891EB1A3F96540781A31816199D571A083C15DF9C4DF0C1E48A104C3935824ECED7C806B580AE3D0F3A19B3E3967B
23,524,472 UART: [afmc] SIG.S = 74A950705B0FDD287AED868A70BC469716DDBE28F41792C5E4E1BEEA41D9B1D1DCCD41BBACE162F0BE4C90875AE15673
23,546,205 UART: [afmc] --
23,550,607 UART: [cold-reset] --
23,555,595 UART: [state] Locking Datavault
23,561,161 UART: [state] Locking PCR0, PCR1 and PCR31
23,562,917 UART: [state] Locking ICCM
23,564,683 UART: [exit] Launching FMC @ 0x40000130
23,573,075 UART:
23,573,332 UART: Running Caliptra FMC ...
23,574,433 UART:
23,574,588 UART: [state] CFI Enabled
23,582,988 UART: [fht] FMC Alias Private Key: 7
25,913,759 UART: [art] Extend RT PCRs Done
25,914,983 UART: [art] Lock RT PCRs Done
25,916,712 UART: [art] Populate DV Done
25,922,168 UART: [fht] FMC Alias Private Key: 7
25,923,634 UART: [art] Derive CDI
25,924,555 UART: [art] Store in in slot 0x4
25,967,475 UART: [art] Derive Key Pair
25,968,471 UART: [art] Store priv key in slot 0x5
29,210,594 UART: [art] Derive Key Pair - Done
29,223,706 UART: [art] Signing Cert with AUTHO
29,225,003 UART: RITY.KEYID = 7
31,504,516 UART: [art] Erasing AUTHORITY.KEYID = 7
31,506,034 UART: [art] PUB.X = 7608905ACDADB524C6339DFF6803616238E0F7AF17A00A0D49A967CAE43557A080FDAD9B5C2F1098A643E3F3BCC6C62D
31,513,265 UART: [art] PUB.Y = F2F1AD3413B0AF9F36BDA304DEC76456105E5B210E582F214BF732B163931A0CD62B1A72D00FDF06EF914F6D046EE0F3
31,520,643 UART: [art] SIG.R = 6CA93B038DC12A39116F0A485056429EDEFEA0CEB7BB97A89AD4E786EE654E73DBAA016D19E74404120A2A5D0DB30536
31,527,933 UART: [art] SIG.S = 0C792B0F86D566DF21E24387C4991B1F9EDEA8D27BF7AB3DA78D934E64AFA2122673A3ECCC1701D096EB7D6A664AFAD5
32,832,792 UART: Caliptra RT
32,833,483 UART: [state] CFI Enabled
32,951,723 UART: [rt] RT listening for mailbox commands...
Initializing fuses
993 UART:
1,239 UART: Running Caliptra ROM ...
2,340 UART:
7,588,214 UART: [state] CFI Enabled
7,600,749 UART: [state] LifecycleState = Production
7,602,548 UART: [state] DebugLocked = Yes
7,604,856 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,610,269 UART: [kat] SHA2-256
7,780,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,790,558 UART: [kat] ++
7,791,014 UART: [kat] sha1
7,802,172 UART: [kat] SHA2-256
7,804,861 UART: [kat] SHA2-384
7,810,683 UART: [kat] SHA2-512-ACC
7,813,080 UART: [kat] ECC-384
10,096,438 UART: [kat] HMAC-384Kdf
10,109,472 UART: [kat] LMS
11,299,540 UART: [kat] --
11,304,189 UART: [warm-reset] ++
11,310,003 UART: [warm-reset] --
11,314,351 UART: [state] Locking Datavault
11,318,889 UART: [state] Locking PCR0, PCR1 and PCR31
11,320,634 UART: [state] Locking ICCM
11,322,506 UART: [exit] Launching FMC @ 0x40000130
11,330,860 UART:
11,331,100 UART: Running Caliptra FMC ...
11,332,198 UART:
11,332,352 UART: [state] CFI Enabled
11,334,451 UART: [aliasrt :skip pcr extension
11,335,688 UART: [art] Extend RT PCRs Done
11,336,815 UART: [art] Lock RT PCRs Done
11,338,198 UART: [art] Populate DV Done
11,343,755 UART: [fht] FMC Alias Private Key: 7
11,345,392 UART: [art] Derive CDI
11,346,196 UART: [art] Store in in slot 0x4
11,388,627 UART: [art] Derive Key Pair
11,389,659 UART: [art] Store priv key in slot 0x5
14,631,399 UART: [art] Derive Key Pair - Done
14,644,352 UART: [art] Signing Cert with AUTHO
14,645,662 UART: RITY.KEYID = 7
16,925,047 UART: [art] Erasing AUTHORITY.KEYID = 7
16,926,549 UART: [art] PUB.X = 7608905ACDADB524C6339DFF6803616238E0F7AF17A00A0D49A967CAE43557A080FDAD9B5C2F1098A643E3F3BCC6C62D
16,933,777 UART: [art] PUB.Y = F2F1AD3413B0AF9F36BDA304DEC76456105E5B210E582F214BF732B163931A0CD62B1A72D00FDF06EF914F6D046EE0F3
16,941,036 UART: [art] SIG.R = 6CA93B038DC12A39116F0A485056429EDEFEA0CEB7BB97A89AD4E786EE654E73DBAA016D19E74404120A2A5D0DB30536
16,948,409 UART: [art] SIG.S = 0C792B0F86D566DF21E24387C4991B1F9EDEA8D27BF7AB3DA78D934E64AFA2122673A3ECCC1701D096EB7D6A664AFAD5
18,253,421 UART: Caliptra RT
18,254,107 UART: [state] CFI Enabled
18,546,458 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
4,127,251 ready_for_fw is high
4,127,815 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,105,205 >>> mbox cmd response: success
23,750,408 UART:
23,750,826 UART: Running Caliptra FMC ...
23,751,949 UART:
23,752,109 UART: [state] CFI Enabled
23,759,719 UART: [fht] FMC Alias Private Key: 7
26,089,992 UART: [art] Extend RT PCRs Done
26,091,237 UART: [art] Lock RT PCRs Done
26,092,701 UART: [art] Populate DV Done
26,098,162 UART: [fht] FMC Alias Private Key: 7
26,099,699 UART: [art] Derive CDI
26,100,459 UART: [art] Store in in slot 0x4
26,143,370 UART: [art] Derive Key Pair
26,144,405 UART: [art] Store priv key in slot 0x5
29,386,377 UART: [art] Derive Key Pair - Done
29,399,428 UART: [art] Signing Cert with AUTHO
29,400,730 UART: RITY.KEYID = 7
31,680,100 UART: [art] Erasing AUTHORITY.KEYID = 7
31,681,624 UART: [art] PUB.X = 9E93DD89094E26464C4FD9FD2D736AFC94D18DDD9483B5036934886552EEF42589E25661EC4A30977EAC9332B0408B55
31,688,794 UART: [art] PUB.Y = C5BA951D77545C67C8D99B161DE5FC8F165119BF70429F7FBFF51B0530ADCFF2C8FDE3C9880A127DD76CCA367DAC7D6B
31,696,056 UART: [art] SIG.R = 0687200E114302A0977289F7DB72DF007706ED72F80C864B932C58C2F4F0B5D8A95D74C612368F1D392431A190707D66
31,703,424 UART: [art] SIG.S = 66474E05739418DB70440591B1BCB1122C31DAAFB8A85CB2A8B60012A19E52169C7D6710CC0576E23F13140E388F5CCF
33,008,609 UART: Caliptra RT
33,009,323 UART: [state] CFI Enabled
33,126,329 UART: [rt] RT listening for mailbox commands...
Initializing fuses
10,940,826 UART:
10,941,161 UART: Running Caliptra FMC ...
10,942,245 UART:
10,942,397 UART: [state] CFI Enabled
10,944,299 UART: [aliasrt :skip pcr extension
10,945,549 UART: [art] Extend RT PCRs Done
10,946,683 UART: [art] Lock RT PCRs Done
10,947,847 UART: [art] Populate DV Done
10,953,312 UART: [fht] FMC Alias Private Key: 7
10,954,844 UART: [art] Derive CDI
10,955,647 UART: [art] Store in in slot 0x4
10,998,356 UART: [art] Derive Key Pair
10,999,393 UART: [art] Store priv key in slot 0x5
14,240,881 UART: [art] Derive Key Pair - Done
14,253,827 UART: [art] Signing Cert with AUTHO
14,255,124 UART: RITY.KEYID = 7
16,534,636 UART: [art] Erasing AUTHORITY.KEYID = 7
16,536,144 UART: [art] PUB.X = 9E93DD89094E26464C4FD9FD2D736AFC94D18DDD9483B5036934886552EEF42589E25661EC4A30977EAC9332B0408B55
16,543,326 UART: [art] PUB.Y = C5BA951D77545C67C8D99B161DE5FC8F165119BF70429F7FBFF51B0530ADCFF2C8FDE3C9880A127DD76CCA367DAC7D6B
16,550,627 UART: [art] SIG.R = 0687200E114302A0977289F7DB72DF007706ED72F80C864B932C58C2F4F0B5D8A95D74C612368F1D392431A190707D66
16,557,925 UART: [art] SIG.S = 66474E05739418DB70440591B1BCB1122C31DAAFB8A85CB2A8B60012A19E52169C7D6710CC0576E23F13140E388F5CCF
17,863,122 UART: Caliptra RT
17,863,814 UART: [state] CFI Enabled
18,151,610 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,397 writing to cptra_bootfsm_go
193,000 UART:
193,397 UART: Running Caliptra ROM ...
194,593 UART:
194,762 UART: [state] CFI Enabled
264,012 UART: [state] LifecycleState = Production
265,749 UART: [state] DebugLocked = Yes
268,236 UART: [state] Starting the WD Timer 40000000 cycles
273,399 UART: [kat] SHA2-256
452,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,111 UART: [kat] ++
464,554 UART: [kat] sha1
476,508 UART: [kat] SHA2-256
479,519 UART: [kat] SHA2-384
486,744 UART: [kat] SHA2-512-ACC
489,718 UART: [kat] ECC-384
2,947,897 UART: [kat] HMAC-384Kdf
2,972,547 UART: [kat] LMS
3,502,029 UART: [kat] --
3,505,386 UART: [cold-reset] ++
3,506,266 UART: [fht] FHT @ 0x50003400
3,516,031 UART: [idev] ++
3,516,607 UART: [idev] CDI.KEYID = 6
3,517,522 UART: [idev] SUBJECT.KEYID = 7
3,518,696 UART: [idev] UDS.KEYID = 0
3,519,741 ready_for_fw is high
3,519,950 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,616 UART: [idev] Erasing UDS.KEYID = 0
6,025,306 UART: [idev] Sha1 KeyId Algorithm
6,048,746 UART: [idev] --
6,053,005 UART: [ldev] ++
6,053,577 UART: [ldev] CDI.KEYID = 6
6,054,464 UART: [ldev] SUBJECT.KEYID = 5
6,055,679 UART: [ldev] AUTHORITY.KEYID = 7
6,056,909 UART: [ldev] FE.KEYID = 1
6,100,636 UART: [ldev] Erasing FE.KEYID = 1
8,603,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,119 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,126 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,899 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,838 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,836 UART: [ldev] --
10,413,320 UART: [fwproc] Wait for Commands...
10,416,179 UART: [fwproc] Recv command 0x46574c44
10,418,268 UART: [fwproc] Recv'd Img size: 114168 bytes
13,853,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,996,830 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,313,404 >>> mbox cmd response: success
14,317,611 UART: [afmc] ++
14,318,194 UART: [afmc] CDI.KEYID = 6
14,319,079 UART: [afmc] SUBJECT.KEYID = 7
14,320,321 UART: [afmc] AUTHORITY.KEYID = 5
16,853,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,282 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,185 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,593,136 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,609,015 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,624,728 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,647,710 UART: [afmc] --
18,652,323 UART: [cold-reset] --
18,655,930 UART: [state] Locking Datavault
18,663,011 UART: [state] Locking PCR0, PCR1 and PCR31
18,664,656 UART: [state] Locking ICCM
18,666,939 UART: [exit] Launching FMC @ 0x40000130
18,675,388 UART:
18,675,629 UART: Running Caliptra FMC ...
18,676,731 UART:
18,676,906 UART: [state] CFI Enabled
18,734,578 UART: [fht] FMC Alias Private Key: 7
20,498,625 UART: [art] Extend RT PCRs Done
20,499,846 UART: [art] Lock RT PCRs Done
20,501,550 UART: [art] Populate DV Done
20,506,797 UART: [fht] FMC Alias Private Key: 7
20,508,435 UART: [art] Derive CDI
20,509,166 UART: [art] Store in in slot 0x4
20,567,231 UART: [art] Derive Key Pair
20,568,275 UART: [art] Store priv key in slot 0x5
23,031,082 UART: [art] Derive Key Pair - Done
23,043,671 UART: [art] Signing Cert with AUTHO
23,045,010 UART: RITY.KEYID = 7
24,757,670 UART: [art] Erasing AUTHORITY.KEYID = 7
24,759,152 UART: [art] PUB.X = B71157936562F2B98B1B5D67AD883B99FC3755F59B3849DBE82C947C746031BC9BB68EB2AF8A555E7664B95A4F5701E8
24,766,413 UART: [art] PUB.Y = 3BF064543A6D20808713668AD81ADA277A801A14EA129A6A25613F15B32014A62DDBF259C5988CE3A2C77D56B2236DC2
24,773,679 UART: [art] SIG.R = E84934C9F0C02D69FDC11530E651001D543F98535A96917F3E01B2B2316ADD5FAC339BDA27A1A2D816B88363F5C9A7FB
24,781,044 UART: [art] SIG.S = 4BB0E34F523AD49C11B935345F4C61AD86E7664E3DA58C451C31F25354F870572DB1CAB88DB6736EDAC6F119B94CFCA0
25,760,021 UART: Caliptra RT
25,760,735 UART: [state] CFI Enabled
25,925,968 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,051 UART:
1,308 UART: Running Caliptra ROM ...
2,413 UART:
2,581 UART: [state] CFI Enabled
67,771 UART: [state] LifecycleState = Production
69,490 UART: [state] DebugLocked = Yes
72,189 UART: [state] Starting the WD Timer 40000000 cycles
77,559 UART: [kat] SHA2-256
256,687 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
268,295 UART: [kat] ++
268,839 UART: [kat] sha1
279,505 UART: [kat] SHA2-256
282,516 UART: [kat] SHA2-384
288,440 UART: [kat] SHA2-512-ACC
291,374 UART: [kat] ECC-384
2,748,732 UART: [kat] HMAC-384Kdf
2,772,250 UART: [kat] LMS
3,301,744 UART: [kat] --
3,308,336 UART: [warm-reset] ++
3,313,670 UART: [warm-reset] --
3,319,369 UART: [state] Locking Datavault
3,322,023 UART: [state] Locking PCR0, PCR1 and PCR31
3,323,674 UART: [state] Locking ICCM
3,326,250 UART: [exit] Launching FMC @ 0x40000130
3,334,702 UART:
3,334,934 UART: Running Caliptra FMC ...
3,336,060 UART:
3,336,226 UART: [state] CFI Enabled
3,382,942 UART: [aliasrt :skip pcr extension
3,384,238 UART: [art] Extend RT PCRs Done
3,385,386 UART: [art] Lock RT PCRs Done
3,386,516 UART: [art] Populate DV Done
3,392,302 UART: [fht] FMC Alias Private Key: 7
3,393,893 UART: [art] Derive CDI
3,394,706 UART: [art] Store in in slot 0x4
3,451,801 UART: [art] Derive Key Pair
3,452,844 UART: [art] Store priv key in slot 0x5
5,915,468 UART: [art] Derive Key Pair - Done
5,928,572 UART: [art] Signing Cert with AUTHO
5,929,874 UART: RITY.KEYID = 7
7,641,972 UART: [art] Erasing AUTHORITY.KEYID = 7
7,643,484 UART: [art] PUB.X = B71157936562F2B98B1B5D67AD883B99FC3755F59B3849DBE82C947C746031BC9BB68EB2AF8A555E7664B95A4F5701E8
7,650,759 UART: [art] PUB.Y = 3BF064543A6D20808713668AD81ADA277A801A14EA129A6A25613F15B32014A62DDBF259C5988CE3A2C77D56B2236DC2
7,657,968 UART: [art] SIG.R = E84934C9F0C02D69FDC11530E651001D543F98535A96917F3E01B2B2316ADD5FAC339BDA27A1A2D816B88363F5C9A7FB
7,665,330 UART: [art] SIG.S = 4BB0E34F523AD49C11B935345F4C61AD86E7664E3DA58C451C31F25354F870572DB1CAB88DB6736EDAC6F119B94CFCA0
8,643,995 UART: Caliptra RT
8,644,695 UART: [state] CFI Enabled
8,985,648 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,362,299 ready_for_fw is high
3,362,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,085,074 >>> mbox cmd response: success
18,364,772 UART:
18,365,173 UART: Running Caliptra FMC ...
18,366,318 UART:
18,366,473 UART: [state] CFI Enabled
18,435,650 UART: [fht] FMC Alias Private Key: 7
20,200,060 UART: [art] Extend RT PCRs Done
20,201,286 UART: [art] Lock RT PCRs Done
20,202,964 UART: [art] Populate DV Done
20,208,439 UART: [fht] FMC Alias Private Key: 7
20,209,919 UART: [art] Derive CDI
20,210,678 UART: [art] Store in in slot 0x4
20,268,417 UART: [art] Derive Key Pair
20,269,450 UART: [art] Store priv key in slot 0x5
22,732,322 UART: [art] Derive Key Pair - Done
22,745,201 UART: [art] Signing Cert with AUTHO
22,746,553 UART: RITY.KEYID = 7
24,458,653 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,160 UART: [art] PUB.X = 8973A5656AB5D60D66E2A85A4AE84B741437BB8EE78412CB2DC4C9A1F82D75C52B7DB28ACE6383DA7F9F13AE773B9294
24,467,467 UART: [art] PUB.Y = ED3E09DD62491113779109AF74C72C2BE8601FC989346A3FB7519F51959163804BCE501BC5836F90A36E6B4F44AC014C
24,474,707 UART: [art] SIG.R = 3619FC215547C12DEB87456B804F146EACE9C464D20EBC16AE410C0BD5C3BBD0EC2A80874186820081C882210EFD2F3B
24,482,100 UART: [art] SIG.S = 53DED768DEA3E64A109ADA93B2F8074EEC32FAD583DF330431E85D6257E0B530EE9DDEFF25969579C98AD68E6F338CA8
25,460,719 UART: Caliptra RT
25,461,432 UART: [state] CFI Enabled
25,627,102 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,190,265 UART:
3,190,632 UART: Running Caliptra FMC ...
3,191,671 UART:
3,191,816 UART: [state] CFI Enabled
3,254,821 UART: [aliasrt :skip pcr extension
3,256,082 UART: [art] Extend RT PCRs Done
3,257,189 UART: [art] Lock RT PCRs Done
3,258,354 UART: [art] Populate DV Done
3,263,873 UART: [fht] FMC Alias Private Key: 7
3,265,567 UART: [art] Derive CDI
3,266,379 UART: [art] Store in in slot 0x4
3,323,883 UART: [art] Derive Key Pair
3,324,929 UART: [art] Store priv key in slot 0x5
5,787,628 UART: [art] Derive Key Pair - Done
5,800,626 UART: [art] Signing Cert with AUTHO
5,801,924 UART: RITY.KEYID = 7
7,513,310 UART: [art] Erasing AUTHORITY.KEYID = 7
7,514,807 UART: [art] PUB.X = 8973A5656AB5D60D66E2A85A4AE84B741437BB8EE78412CB2DC4C9A1F82D75C52B7DB28ACE6383DA7F9F13AE773B9294
7,522,111 UART: [art] PUB.Y = ED3E09DD62491113779109AF74C72C2BE8601FC989346A3FB7519F51959163804BCE501BC5836F90A36E6B4F44AC014C
7,529,350 UART: [art] SIG.R = 3619FC215547C12DEB87456B804F146EACE9C464D20EBC16AE410C0BD5C3BBD0EC2A80874186820081C882210EFD2F3B
7,536,747 UART: [art] SIG.S = 53DED768DEA3E64A109ADA93B2F8074EEC32FAD583DF330431E85D6257E0B530EE9DDEFF25969579C98AD68E6F338CA8
8,515,721 UART: Caliptra RT
8,516,449 UART: [state] CFI Enabled
8,849,137 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
192,261 UART:
192,649 UART: Running Caliptra ROM ...
193,843 UART:
603,516 UART: [state] CFI Enabled
618,879 UART: [state] LifecycleState = Production
620,562 UART: [state] DebugLocked = Yes
622,405 UART: [state] Starting the WD Timer 40000000 cycles
627,072 UART: [kat] SHA2-256
806,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,836 UART: [kat] ++
818,477 UART: [kat] sha1
829,898 UART: [kat] SHA2-256
832,883 UART: [kat] SHA2-384
838,663 UART: [kat] SHA2-512-ACC
841,595 UART: [kat] ECC-384
3,278,604 UART: [kat] HMAC-384Kdf
3,291,559 UART: [kat] LMS
3,821,093 UART: [kat] --
3,825,309 UART: [cold-reset] ++
3,826,318 UART: [fht] FHT @ 0x50003400
3,837,429 UART: [idev] ++
3,837,984 UART: [idev] CDI.KEYID = 6
3,838,933 UART: [idev] SUBJECT.KEYID = 7
3,840,102 UART: [idev] UDS.KEYID = 0
3,841,068 ready_for_fw is high
3,841,269 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,056 UART: [idev] Erasing UDS.KEYID = 0
6,314,700 UART: [idev] Sha1 KeyId Algorithm
6,339,228 UART: [idev] --
6,342,764 UART: [ldev] ++
6,343,338 UART: [ldev] CDI.KEYID = 6
6,344,217 UART: [ldev] SUBJECT.KEYID = 5
6,345,423 UART: [ldev] AUTHORITY.KEYID = 7
6,346,707 UART: [ldev] FE.KEYID = 1
6,356,562 UART: [ldev] Erasing FE.KEYID = 1
8,830,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,664 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,562,670 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,578,458 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,594,408 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,614,367 UART: [ldev] --
10,618,866 UART: [fwproc] Wait for Commands...
10,621,549 UART: [fwproc] Recv command 0x46574c44
10,623,654 UART: [fwproc] Recv'd Img size: 114168 bytes
14,055,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,124,739 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,193,537 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,511,629 >>> mbox cmd response: success
14,516,349 UART: [afmc] ++
14,516,940 UART: [afmc] CDI.KEYID = 6
14,517,823 UART: [afmc] SUBJECT.KEYID = 7
14,518,978 UART: [afmc] AUTHORITY.KEYID = 5
17,016,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,738,694 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,754,641 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,770,513 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,786,236 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,810,152 UART: [afmc] --
18,814,124 UART: [cold-reset] --
18,817,939 UART: [state] Locking Datavault
18,822,747 UART: [state] Locking PCR0, PCR1 and PCR31
18,824,400 UART: [state] Locking ICCM
18,825,796 UART: [exit] Launching FMC @ 0x40000130
18,834,191 UART:
18,834,423 UART: Running Caliptra FMC ...
18,835,522 UART:
18,835,679 UART: [state] CFI Enabled
18,843,888 UART: [fht] FMC Alias Private Key: 7
20,601,512 UART: [art] Extend RT PCRs Done
20,602,735 UART: [art] Lock RT PCRs Done
20,604,272 UART: [art] Populate DV Done
20,609,682 UART: [fht] FMC Alias Private Key: 7
20,611,324 UART: [art] Derive CDI
20,612,055 UART: [art] Store in in slot 0x4
20,654,456 UART: [art] Derive Key Pair
20,655,455 UART: [art] Store priv key in slot 0x5
23,082,526 UART: [art] Derive Key Pair - Done
23,095,738 UART: [art] Signing Cert with AUTHO
23,097,043 UART: RITY.KEYID = 7
24,801,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,427 UART: [art] PUB.X = 71CE2FA23067066BE498F707F9E49F1CF4F06DDFAB37CC66E622ED8EDC89486858F06C32A842F3C1F3A918B4EF76A688
24,810,679 UART: [art] PUB.Y = A1E8B3C51C08C8ED8D9987E2850E7B140278C20B8B2457F7DB896F865204592EE205DF2F716B1558DBEFCDBD4B83761B
24,817,962 UART: [art] SIG.R = BC451945F230E7333A5442C94C8404083DB225EBA625FBCC715B5A72115F8BABF9787432B571F02F605C6D74F7D1FD02
24,825,311 UART: [art] SIG.S = 2E4C0EB0FD97EDCC32175E39D691DEAD5C2AB52B3ABA6B435D0779AD4BDA951B8D406EEBD3B7B19DC51505FA972E69F9
25,804,432 UART: Caliptra RT
25,805,134 UART: [state] CFI Enabled
25,922,950 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,053 UART:
1,309 UART: Running Caliptra ROM ...
2,429 UART:
14,607,117 UART: [state] CFI Enabled
14,620,899 UART: [state] LifecycleState = Production
14,622,652 UART: [state] DebugLocked = Yes
14,625,447 UART: [state] Starting the WD Timer 40000000 cycles
14,631,087 UART: [kat] SHA2-256
14,810,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,821,827 UART: [kat] ++
14,822,286 UART: [kat] sha1
14,833,169 UART: [kat] SHA2-256
14,836,184 UART: [kat] SHA2-384
14,840,658 UART: [kat] SHA2-512-ACC
14,843,596 UART: [kat] ECC-384
17,284,249 UART: [kat] HMAC-384Kdf
17,295,496 UART: [kat] LMS
17,825,072 UART: [kat] --
17,830,833 UART: [warm-reset] ++
17,835,361 UART: [warm-reset] --
17,838,951 UART: [state] Locking Datavault
17,843,606 UART: [state] Locking PCR0, PCR1 and PCR31
17,845,253 UART: [state] Locking ICCM
17,847,999 UART: [exit] Launching FMC @ 0x40000130
17,856,449 UART:
17,856,727 UART: Running Caliptra FMC ...
17,857,833 UART:
17,857,988 UART: [state] CFI Enabled
17,859,986 UART: [aliasrt :skip pcr extension
17,861,232 UART: [art] Extend RT PCRs Done
17,862,365 UART: [art] Lock RT PCRs Done
17,863,532 UART: [art] Populate DV Done
17,869,041 UART: [fht] FMC Alias Private Key: 7
17,870,581 UART: [art] Derive CDI
17,871,413 UART: [art] Store in in slot 0x4
17,914,006 UART: [art] Derive Key Pair
17,915,007 UART: [art] Store priv key in slot 0x5
20,341,719 UART: [art] Derive Key Pair - Done
20,354,948 UART: [art] Signing Cert with AUTHO
20,356,249 UART: RITY.KEYID = 7
22,061,577 UART: [art] Erasing AUTHORITY.KEYID = 7
22,063,089 UART: [art] PUB.X = 71CE2FA23067066BE498F707F9E49F1CF4F06DDFAB37CC66E622ED8EDC89486858F06C32A842F3C1F3A918B4EF76A688
22,070,352 UART: [art] PUB.Y = A1E8B3C51C08C8ED8D9987E2850E7B140278C20B8B2457F7DB896F865204592EE205DF2F716B1558DBEFCDBD4B83761B
22,077,603 UART: [art] SIG.R = BC451945F230E7333A5442C94C8404083DB225EBA625FBCC715B5A72115F8BABF9787432B571F02F605C6D74F7D1FD02
22,085,005 UART: [art] SIG.S = 2E4C0EB0FD97EDCC32175E39D691DEAD5C2AB52B3ABA6B435D0779AD4BDA951B8D406EEBD3B7B19DC51505FA972E69F9
23,063,710 UART: Caliptra RT
23,064,407 UART: [state] CFI Enabled
23,354,621 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,677 writing to cptra_bootfsm_go
3,694,198 ready_for_fw is high
3,694,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,296,304 >>> mbox cmd response: success
18,547,454 UART:
18,547,834 UART: Running Caliptra FMC ...
18,548,934 UART:
18,549,081 UART: [state] CFI Enabled
18,556,429 UART: [fht] FMC Alias Private Key: 7
20,313,046 UART: [art] Extend RT PCRs Done
20,314,288 UART: [art] Lock RT PCRs Done
20,316,064 UART: [art] Populate DV Done
20,321,544 UART: [fht] FMC Alias Private Key: 7
20,323,030 UART: [art] Derive CDI
20,323,792 UART: [art] Store in in slot 0x4
20,366,492 UART: [art] Derive Key Pair
20,367,488 UART: [art] Store priv key in slot 0x5
22,794,208 UART: [art] Derive Key Pair - Done
22,806,826 UART: [art] Signing Cert with AUTHO
22,808,131 UART: RITY.KEYID = 7
24,513,624 UART: [art] Erasing AUTHORITY.KEYID = 7
24,515,136 UART: [art] PUB.X = 8106409D9E69330FE30C94AC359FB382621BCCD53C1C4E40AD84A1AE3E69E23D84E7D9828EF30D3A40F47815EC9589EE
24,522,393 UART: [art] PUB.Y = 433F26C05BE3D87022AA466671355017D42B28A7F3E868ADECB9AE5548CB4790E555053EA0A7E135DE58CC30CF92000F
24,529,621 UART: [art] SIG.R = AF7D12F4C0BE4BF34DB1DE7B574028F85D86B70281D623482B37F296624F1E512878FBB275BAF2DA86FFCC6CDF42842B
24,537,036 UART: [art] SIG.S = FD9B9DDD553D4AA71A01218F06A6C1FE5F7C0FBB7A27A2D22130B5B794ACBAB275AE653DFEC30C9A5C6368B490AC0B8B
25,515,479 UART: Caliptra RT
25,516,185 UART: [state] CFI Enabled
25,634,351 UART: [rt] RT listening for mailbox commands...
Initializing fuses
18,001,114 UART:
18,001,507 UART: Running Caliptra FMC ...
18,002,555 UART:
18,002,706 UART: [state] CFI Enabled
18,004,402 UART: [aliasrt :skip pcr extension
18,005,656 UART: [art] Extend RT PCRs Done
18,006,796 UART: [art] Lock RT PCRs Done
18,008,052 UART: [art] Populate DV Done
18,013,898 UART: [fht] FMC Alias Private Key: 7
18,015,435 UART: [art] Derive CDI
18,016,406 UART: [art] Store in in slot 0x4
18,059,287 UART: [art] Derive Key Pair
18,060,296 UART: [art] Store priv key in slot 0x5
20,486,570 UART: [art] Derive Key Pair - Done
20,499,649 UART: [art] Signing Cert with AUTHO
20,500,981 UART: RITY.KEYID = 7
22,205,999 UART: [art] Erasing AUTHORITY.KEYID = 7
22,207,501 UART: [art] PUB.X = 8106409D9E69330FE30C94AC359FB382621BCCD53C1C4E40AD84A1AE3E69E23D84E7D9828EF30D3A40F47815EC9589EE
22,214,754 UART: [art] PUB.Y = 433F26C05BE3D87022AA466671355017D42B28A7F3E868ADECB9AE5548CB4790E555053EA0A7E135DE58CC30CF92000F
22,221,988 UART: [art] SIG.R = AF7D12F4C0BE4BF34DB1DE7B574028F85D86B70281D623482B37F296624F1E512878FBB275BAF2DA86FFCC6CDF42842B
22,229,389 UART: [art] SIG.S = FD9B9DDD553D4AA71A01218F06A6C1FE5F7C0FBB7A27A2D22130B5B794ACBAB275AE653DFEC30C9A5C6368B490AC0B8B
23,208,626 UART: Caliptra RT
23,209,318 UART: [state] CFI Enabled
23,493,098 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,070 UART:
192,455 UART: Running Caliptra ROM ...
193,577 UART:
193,723 UART: [state] CFI Enabled
264,289 UART: [state] LifecycleState = Production
266,533 UART: [state] DebugLocked = Yes
268,039 UART: [state] Starting the WD Timer 40000000 cycles
272,564 UART: [kat] SHA2-256
462,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,214 UART: [kat] ++
473,688 UART: [kat] sha1
484,117 UART: [kat] SHA2-256
487,100 UART: [kat] SHA2-384
494,232 UART: [kat] SHA2-512-ACC
496,833 UART: [kat] ECC-384
2,948,592 UART: [kat] HMAC-384Kdf
2,971,091 UART: [kat] LMS
3,502,850 UART: [kat] --
3,506,850 UART: [cold-reset] ++
3,508,716 UART: [fht] FHT @ 0x50003400
3,520,990 UART: [idev] ++
3,521,735 UART: [idev] CDI.KEYID = 6
3,522,647 UART: [idev] SUBJECT.KEYID = 7
3,523,823 UART: [idev] UDS.KEYID = 0
3,524,745 ready_for_fw is high
3,524,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,398 UART: [idev] Erasing UDS.KEYID = 0
6,028,503 UART: [idev] Sha1 KeyId Algorithm
6,052,440 UART: [idev] --
6,056,820 UART: [ldev] ++
6,057,518 UART: [ldev] CDI.KEYID = 6
6,058,432 UART: [ldev] SUBJECT.KEYID = 5
6,059,591 UART: [ldev] AUTHORITY.KEYID = 7
6,060,823 UART: [ldev] FE.KEYID = 1
6,101,609 UART: [ldev] Erasing FE.KEYID = 1
8,606,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,144 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,358,348 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,419 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,388,378 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,808 UART: [ldev] --
10,413,651 UART: [fwproc] Wait for Commands...
10,416,661 UART: [fwproc] Recv command 0x46574c44
10,418,588 UART: [fwproc] Recv'd Img size: 114168 bytes
13,903,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,979,414 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,095,598 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,637,313 >>> mbox cmd response: success
14,640,998 UART: [afmc] ++
14,641,707 UART: [afmc] CDI.KEYID = 6
14,642,901 UART: [afmc] SUBJECT.KEYID = 7
14,644,339 UART: [afmc] AUTHORITY.KEYID = 5
17,172,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,235 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
18,914,481 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
18,929,665 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
18,944,633 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
18,968,548 UART: [afmc] --
18,971,813 UART: [cold-reset] --
18,975,298 UART: [state] Locking Datavault
18,982,063 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,235 UART: [state] Locking ICCM
18,986,336 UART: [exit] Launching FMC @ 0x40000130
18,995,007 UART:
18,995,244 UART: Running Caliptra FMC ...
18,996,345 UART:
18,996,504 UART: [state] CFI Enabled
19,054,709 UART: [fht] FMC Alias Private Key: 7
20,818,944 UART: [art] Extend RT PCRs Done
20,820,171 UART: [art] Lock RT PCRs Done
20,822,087 UART: [art] Populate DV Done
20,827,392 UART: [fht] FMC Alias Private Key: 7
20,828,932 UART: [art] Derive CDI
20,829,663 UART: [art] Store in in slot 0x4
20,887,887 UART: [art] Derive Key Pair
20,888,926 UART: [art] Store priv key in slot 0x5
23,351,872 UART: [art] Derive Key Pair - Done
23,365,099 UART: [art] Signing Cert with AUTHO
23,366,438 UART: RITY.KEYID = 7
25,077,638 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,151 UART: [art] PUB.X = 43ADA0A886C67F1241362460D708E3CB26957BD1A3323361746757F3FE90C36C14BFB860E1BB1A6AB5AFBFDB24E1D7B7
25,086,429 UART: [art] PUB.Y = ECA44FACAC5203DBDC5B2F01375FE3BABDEFCEAAFFBFB1BF990CB7924616E3BA7EC98087E2F12B5D3E1D0B0475C9225D
25,093,729 UART: [art] SIG.R = AB1B263F56717F69601B7D81A8AB5C130835CF603E1C8D4B02FD0FBC0654D8BFA089833B46820C352B849AE6DFC3230A
25,101,131 UART: [art] SIG.S = CD29190F46B5330241A54B2318D38CE07706CA3604AEBF7F6C5C86ACD1077024EA9AB8CD8C52F101063AF69E26A247F0
26,079,625 UART: Caliptra RT
26,080,569 UART: [state] CFI Enabled
26,246,867 UART: [rt] RT listening for mailbox commands...
Initializing fuses
1,007 UART:
1,185 UART: Running Caliptra ROM ...
2,203 UART:
2,348 UART: [state] CFI Enabled
66,949 UART: [state] LifecycleState = Production
68,900 UART: [state] DebugLocked = Yes
71,170 UART: [state] Starting the WD Timer 40000000 cycles
76,025 UART: [kat] SHA2-256
265,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
276,616 UART: [kat] ++
277,124 UART: [kat] sha1
288,976 UART: [kat] SHA2-256
291,982 UART: [kat] SHA2-384
297,041 UART: [kat] SHA2-512-ACC
299,655 UART: [kat] ECC-384
2,747,952 UART: [kat] HMAC-384Kdf
2,774,335 UART: [kat] LMS
3,305,901 UART: [kat] --
3,308,417 UART: [warm-reset] ++
3,313,704 UART: [warm-reset] --
3,315,245 UART: [state] Locking Datavault
3,319,008 UART: [state] Locking PCR0, PCR1 and PCR31
3,320,660 UART: [state] Locking ICCM
3,322,203 UART: [exit] Launching FMC @ 0x40000130
3,330,881 UART:
3,331,117 UART: Running Caliptra FMC ...
3,332,218 UART:
3,332,374 UART: [state] CFI Enabled
3,383,604 UART: [aliasrt :skip pcr extension
3,384,899 UART: [art] Extend RT PCRs Done
3,385,966 UART: [art] Lock RT PCRs Done
3,387,198 UART: [art] Populate DV Done
3,392,498 UART: [fht] FMC Alias Private Key: 7
3,393,978 UART: [art] Derive CDI
3,394,737 UART: [art] Store in in slot 0x4
3,452,311 UART: [art] Derive Key Pair
3,453,357 UART: [art] Store priv key in slot 0x5
5,916,258 UART: [art] Derive Key Pair - Done
5,929,201 UART: [art] Signing Cert with AUTHO
5,930,510 UART: RITY.KEYID = 7
7,641,739 UART: [art] Erasing AUTHORITY.KEYID = 7
7,643,248 UART: [art] PUB.X = 43ADA0A886C67F1241362460D708E3CB26957BD1A3323361746757F3FE90C36C14BFB860E1BB1A6AB5AFBFDB24E1D7B7
7,650,493 UART: [art] PUB.Y = ECA44FACAC5203DBDC5B2F01375FE3BABDEFCEAAFFBFB1BF990CB7924616E3BA7EC98087E2F12B5D3E1D0B0475C9225D
7,657,797 UART: [art] SIG.R = AB1B263F56717F69601B7D81A8AB5C130835CF603E1C8D4B02FD0FBC0654D8BFA089833B46820C352B849AE6DFC3230A
7,665,157 UART: [art] SIG.S = CD29190F46B5330241A54B2318D38CE07706CA3604AEBF7F6C5C86ACD1077024EA9AB8CD8C52F101063AF69E26A247F0
8,644,616 UART: Caliptra RT
8,645,322 UART: [state] CFI Enabled
8,982,168 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,441,292 ready_for_fw is high
3,441,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,778,076 >>> mbox cmd response: success
19,071,245 UART:
19,071,736 UART: Running Caliptra FMC ...
19,072,856 UART:
19,073,024 UART: [state] CFI Enabled
19,140,769 UART: [fht] FMC Alias Private Key: 7
20,905,163 UART: [art] Extend RT PCRs Done
20,906,385 UART: [art] Lock RT PCRs Done
20,908,232 UART: [art] Populate DV Done
20,913,928 UART: [fht] FMC Alias Private Key: 7
20,915,578 UART: [art] Derive CDI
20,916,390 UART: [art] Store in in slot 0x4
20,974,085 UART: [art] Derive Key Pair
20,975,131 UART: [art] Store priv key in slot 0x5
23,437,982 UART: [art] Derive Key Pair - Done
23,450,829 UART: [art] Signing Cert with AUTHO
23,452,135 UART: RITY.KEYID = 7
25,163,840 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,344 UART: [art] PUB.X = 80522126CA22566ADA701EC959EA87BB4B9FF5310102E50835BA0434B6A5F37C5BD4C976F1CF797DAD3945F02B367E93
25,172,591 UART: [art] PUB.Y = 2F822A570406F3AE1FA23299FC78BDAFF29C8FA26FD8336B0009F084662728741C04871FFF4712C2ACBF86EC9F12FBF1
25,179,832 UART: [art] SIG.R = 20BF5FD8F28173C6BFCB5BA39A6769D521BFD5FDFA50E3C60D5D610BC20605BC5335855FEE09CBF86CF5E49BAFBFA5B2
25,187,279 UART: [art] SIG.S = 724FE1931FFF357BBF06D10D9F592E2F247E400F24DD9860F00915B85B1CD8E1F4F09410379FCF5CC935B48AA6556750
26,165,810 UART: Caliptra RT
26,166,523 UART: [state] CFI Enabled
26,332,921 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,244,087 UART:
3,244,417 UART: Running Caliptra FMC ...
3,245,460 UART:
3,245,611 UART: [state] CFI Enabled
3,296,205 UART: [aliasrt :skip pcr extension
3,297,463 UART: [art] Extend RT PCRs Done
3,298,525 UART: [art] Lock RT PCRs Done
3,299,687 UART: [art] Populate DV Done
3,304,814 UART: [fht] FMC Alias Private Key: 7
3,306,392 UART: [art] Derive CDI
3,307,134 UART: [art] Store in in slot 0x4
3,365,035 UART: [art] Derive Key Pair
3,366,035 UART: [art] Store priv key in slot 0x5
5,829,086 UART: [art] Derive Key Pair - Done
5,842,246 UART: [art] Signing Cert with AUTHO
5,843,550 UART: RITY.KEYID = 7
7,554,788 UART: [art] Erasing AUTHORITY.KEYID = 7
7,556,526 UART: [art] PUB.X = 80522126CA22566ADA701EC959EA87BB4B9FF5310102E50835BA0434B6A5F37C5BD4C976F1CF797DAD3945F02B367E93
7,563,574 UART: [art] PUB.Y = 2F822A570406F3AE1FA23299FC78BDAFF29C8FA26FD8336B0009F084662728741C04871FFF4712C2ACBF86EC9F12FBF1
7,570,804 UART: [art] SIG.R = 20BF5FD8F28173C6BFCB5BA39A6769D521BFD5FDFA50E3C60D5D610BC20605BC5335855FEE09CBF86CF5E49BAFBFA5B2
7,578,255 UART: [art] SIG.S = 724FE1931FFF357BBF06D10D9F592E2F247E400F24DD9860F00915B85B1CD8E1F4F09410379FCF5CC935B48AA6556750
8,556,897 UART: Caliptra RT
8,557,591 UART: [state] CFI Enabled
8,907,618 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
192,165 UART:
192,546 UART: Running Caliptra ROM ...
193,731 UART:
603,493 UART: [state] CFI Enabled
617,752 UART: [state] LifecycleState = Production
619,961 UART: [state] DebugLocked = Yes
621,667 UART: [state] Starting the WD Timer 40000000 cycles
626,341 UART: [kat] SHA2-256
816,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,027 UART: [kat] ++
827,557 UART: [kat] sha1
838,107 UART: [kat] SHA2-256
841,125 UART: [kat] SHA2-384
846,615 UART: [kat] SHA2-512-ACC
849,196 UART: [kat] ECC-384
3,291,331 UART: [kat] HMAC-384Kdf
3,304,852 UART: [kat] LMS
3,836,717 UART: [kat] --
3,841,219 UART: [cold-reset] ++
3,842,863 UART: [fht] FHT @ 0x50003400
3,854,619 UART: [idev] ++
3,855,327 UART: [idev] CDI.KEYID = 6
3,856,235 UART: [idev] SUBJECT.KEYID = 7
3,857,486 UART: [idev] UDS.KEYID = 0
3,858,407 ready_for_fw is high
3,858,633 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,326 UART: [idev] Erasing UDS.KEYID = 0
6,332,232 UART: [idev] Sha1 KeyId Algorithm
6,354,739 UART: [idev] --
6,359,697 UART: [ldev] ++
6,360,373 UART: [ldev] CDI.KEYID = 6
6,361,405 UART: [ldev] SUBJECT.KEYID = 5
6,362,506 UART: [ldev] AUTHORITY.KEYID = 7
6,363,677 UART: [ldev] FE.KEYID = 1
6,376,106 UART: [ldev] Erasing FE.KEYID = 1
8,852,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,566 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,585,744 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,600,852 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,615,858 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,636,532 UART: [ldev] --
10,641,187 UART: [fwproc] Wait for Commands...
10,644,260 UART: [fwproc] Recv command 0x46574c44
10,646,238 UART: [fwproc] Recv'd Img size: 114168 bytes
14,128,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,204,720 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,320,868 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,862,930 >>> mbox cmd response: success
14,867,650 UART: [afmc] ++
14,868,352 UART: [afmc] CDI.KEYID = 6
14,869,594 UART: [afmc] SUBJECT.KEYID = 7
14,871,027 UART: [afmc] AUTHORITY.KEYID = 5
17,377,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,099,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,101,684 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
19,116,916 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
19,132,126 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
19,147,062 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
19,171,292 UART: [afmc] --
19,175,397 UART: [cold-reset] --
19,179,156 UART: [state] Locking Datavault
19,183,491 UART: [state] Locking PCR0, PCR1 and PCR31
19,185,635 UART: [state] Locking ICCM
19,187,487 UART: [exit] Launching FMC @ 0x40000130
19,196,110 UART:
19,196,341 UART: Running Caliptra FMC ...
19,197,439 UART:
19,197,602 UART: [state] CFI Enabled
19,205,870 UART: [fht] FMC Alias Private Key: 7
20,962,855 UART: [art] Extend RT PCRs Done
20,964,078 UART: [art] Lock RT PCRs Done
20,965,668 UART: [art] Populate DV Done
20,971,243 UART: [fht] FMC Alias Private Key: 7
20,972,889 UART: [art] Derive CDI
20,973,702 UART: [art] Store in in slot 0x4
21,016,136 UART: [art] Derive Key Pair
21,017,175 UART: [art] Store priv key in slot 0x5
23,444,115 UART: [art] Derive Key Pair - Done
23,456,896 UART: [art] Signing Cert with AUTHO
23,458,209 UART: RITY.KEYID = 7
25,163,636 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,148 UART: [art] PUB.X = 42100BA46F658BEB20866438676992F171DF8533DBBD107EB4806AF948BC4E47C192C05EF65D1475CBDD22DC4DA5173A
25,172,420 UART: [art] PUB.Y = E2F1F7EE699325AFF23B9D6851457F47061860DECA707F40B49CC594C10BBE0E1865EF3F15EA90F18E4353DE25BF1523
25,179,661 UART: [art] SIG.R = 843E0B01E4A2729B5AE6C07D2DB08B84AF571A265DB3B2A80C7EFE10126702421CD64C61BD248E83599454A43CC820A8
25,187,047 UART: [art] SIG.S = 1C12AF81D627F09E6D8F4EA6593A5C52FFA1273894C55DAF813EAD0DF864E3C61217786CDB7DFE070F88405ED65F7492
26,165,771 UART: Caliptra RT
26,166,479 UART: [state] CFI Enabled
26,283,050 UART: [rt] RT listening for mailbox commands...
Initializing fuses
990 UART:
1,140 UART: Running Caliptra ROM ...
2,183 UART:
14,250,176 UART: [state] CFI Enabled
14,264,828 UART: [state] LifecycleState = Production
14,266,580 UART: [state] DebugLocked = Yes
14,269,588 UART: [state] Starting the WD Timer 40000000 cycles
14,274,980 UART: [kat] SHA2-256
14,464,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,475,730 UART: [kat] ++
14,476,269 UART: [kat] sha1
14,487,597 UART: [kat] SHA2-256
14,490,612 UART: [kat] SHA2-384
14,496,829 UART: [kat] SHA2-512-ACC
14,499,400 UART: [kat] ECC-384
16,941,533 UART: [kat] HMAC-384Kdf
16,954,631 UART: [kat] LMS
17,486,247 UART: [kat] --
17,491,533 UART: [warm-reset] ++
17,496,163 UART: [warm-reset] --
17,499,807 UART: [state] Locking Datavault
17,504,042 UART: [state] Locking PCR0, PCR1 and PCR31
17,505,765 UART: [state] Locking ICCM
17,508,516 UART: [exit] Launching FMC @ 0x40000130
17,517,136 UART:
17,517,368 UART: Running Caliptra FMC ...
17,518,466 UART:
17,518,621 UART: [state] CFI Enabled
17,520,778 UART: [aliasrt :skip pcr extension
17,522,019 UART: [art] Extend RT PCRs Done
17,523,156 UART: [art] Lock RT PCRs Done
17,524,219 UART: [art] Populate DV Done
17,529,571 UART: [fht] FMC Alias Private Key: 7
17,531,257 UART: [art] Derive CDI
17,532,072 UART: [art] Store in in slot 0x4
17,574,772 UART: [art] Derive Key Pair
17,575,774 UART: [art] Store priv key in slot 0x5
20,002,260 UART: [art] Derive Key Pair - Done
20,015,065 UART: [art] Signing Cert with AUTHO
20,016,411 UART: RITY.KEYID = 7
21,722,474 UART: [art] Erasing AUTHORITY.KEYID = 7
21,723,981 UART: [art] PUB.X = 42100BA46F658BEB20866438676992F171DF8533DBBD107EB4806AF948BC4E47C192C05EF65D1475CBDD22DC4DA5173A
21,731,219 UART: [art] PUB.Y = E2F1F7EE699325AFF23B9D6851457F47061860DECA707F40B49CC594C10BBE0E1865EF3F15EA90F18E4353DE25BF1523
21,738,519 UART: [art] SIG.R = 843E0B01E4A2729B5AE6C07D2DB08B84AF571A265DB3B2A80C7EFE10126702421CD64C61BD248E83599454A43CC820A8
21,745,911 UART: [art] SIG.S = 1C12AF81D627F09E6D8F4EA6593A5C52FFA1273894C55DAF813EAD0DF864E3C61217786CDB7DFE070F88405ED65F7492
22,724,698 UART: Caliptra RT
22,725,415 UART: [state] CFI Enabled
23,013,691 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,629 writing to cptra_bootfsm_go
3,760,387 ready_for_fw is high
3,760,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,000,193 >>> mbox cmd response: success
19,263,311 UART:
19,263,711 UART: Running Caliptra FMC ...
19,264,942 UART:
19,265,107 UART: [state] CFI Enabled
19,273,048 UART: [fht] FMC Alias Private Key: 7
21,029,873 UART: [art] Extend RT PCRs Done
21,031,097 UART: [art] Lock RT PCRs Done
21,033,057 UART: [art] Populate DV Done
21,038,433 UART: [fht] FMC Alias Private Key: 7
21,039,926 UART: [art] Derive CDI
21,040,689 UART: [art] Store in in slot 0x4
21,083,231 UART: [art] Derive Key Pair
21,084,233 UART: [art] Store priv key in slot 0x5
23,510,929 UART: [art] Derive Key Pair - Done
23,523,619 UART: [art] Signing Cert with AUTHO
23,524,922 UART: RITY.KEYID = 7
25,230,375 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,895 UART: [art] PUB.X = 39688517B1DEC5B16ED5CABA3DE5965F514720499A4AC38EEC04CF0C11C2124CECB2D0460F6AC131A8C8AE14588E6063
25,239,167 UART: [art] PUB.Y = 417514CAE9B360F8C5429D8CFD0A9DE81BB439ADF20DCE6733D3F9B35F2D437BDC8B4DF3E994D25AEDB3F63B08358485
25,246,454 UART: [art] SIG.R = B6497EE207B7D65FB2C55A69D83A7AE57B5AC44295A5A9BFB68A6F5265F8DD0380418BF3BB34BC8C0AF4C61363D8900D
25,253,851 UART: [art] SIG.S = 45C88775DE8E9D22CE7D6E15C3523630B3390FF2EB444CDE34188519AF2D1DC5CB4FB19416658D73B0DA410132F93848
26,232,852 UART: Caliptra RT
26,233,547 UART: [state] CFI Enabled
26,350,688 UART: [rt] RT listening for mailbox commands...
Initializing fuses
17,333,118 UART:
17,333,476 UART: Running Caliptra FMC ...
17,334,514 UART:
17,334,670 UART: [state] CFI Enabled
17,336,463 UART: [aliasrt :skip pcr extension
17,337,714 UART: [art] Extend RT PCRs Done
17,338,849 UART: [art] Lock RT PCRs Done
17,340,057 UART: [art] Populate DV Done
17,345,741 UART: [fht] FMC Alias Private Key: 7
17,347,458 UART: [art] Derive CDI
17,348,274 UART: [art] Store in in slot 0x4
17,391,101 UART: [art] Derive Key Pair
17,392,144 UART: [art] Store priv key in slot 0x5
19,819,227 UART: [art] Derive Key Pair - Done
19,832,333 UART: [art] Signing Cert with AUTHO
19,833,647 UART: RITY.KEYID = 7
21,538,972 UART: [art] Erasing AUTHORITY.KEYID = 7
21,540,478 UART: [art] PUB.X = 39688517B1DEC5B16ED5CABA3DE5965F514720499A4AC38EEC04CF0C11C2124CECB2D0460F6AC131A8C8AE14588E6063
21,547,804 UART: [art] PUB.Y = 417514CAE9B360F8C5429D8CFD0A9DE81BB439ADF20DCE6733D3F9B35F2D437BDC8B4DF3E994D25AEDB3F63B08358485
21,555,051 UART: [art] SIG.R = B6497EE207B7D65FB2C55A69D83A7AE57B5AC44295A5A9BFB68A6F5265F8DD0380418BF3BB34BC8C0AF4C61363D8900D
21,562,447 UART: [art] SIG.S = 45C88775DE8E9D22CE7D6E15C3523630B3390FF2EB444CDE34188519AF2D1DC5CB4FB19416658D73B0DA410132F93848
22,541,505 UART: Caliptra RT
22,542,200 UART: [state] CFI Enabled
22,830,077 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Production
85,527 UART: [state] DebugLocked = Yes
86,257 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,390 UART: [kat] SHA2-512-ACC
897,291 UART: [kat] ECC-384
903,128 UART: [kat] HMAC-384Kdf
907,728 UART: [kat] LMS
1,475,924 UART: [kat] --
1,476,779 UART: [cold-reset] ++
1,477,104 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 ready_for_fw is high
1,481,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,630 UART: [idev] Erasing UDS.KEYID = 0
1,505,109 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,800 UART: [idev] --
1,514,775 UART: [ldev] ++
1,514,943 UART: [ldev] CDI.KEYID = 6
1,515,306 UART: [ldev] SUBJECT.KEYID = 5
1,515,732 UART: [ldev] AUTHORITY.KEYID = 7
1,516,195 UART: [ldev] FE.KEYID = 1
1,521,269 UART: [ldev] Erasing FE.KEYID = 1
1,547,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,025 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,719 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,591 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,297 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,425 UART: [ldev] --
1,586,870 UART: [fwproc] Waiting for Commands...
1,587,611 UART: [fwproc] Received command 0x46574c44
1,588,402 UART: [fwproc] Received Image of size 114168 bytes
2,909,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,936,695 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,966,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,101,651 >>> mbox cmd response: success
3,102,844 UART: [afmc] ++
3,103,012 UART: [afmc] CDI.KEYID = 6
3,103,374 UART: [afmc] SUBJECT.KEYID = 7
3,103,799 UART: [afmc] AUTHORITY.KEYID = 5
3,139,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,155,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,156,148 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,161,866 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,167,761 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,173,472 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,181,178 UART: [afmc] --
3,182,303 UART: [cold-reset] --
3,183,249 UART: [state] Locking Datavault
3,184,422 UART: [state] Locking PCR0, PCR1 and PCR31
3,185,026 UART: [state] Locking ICCM
3,185,630 UART: [exit] Launching FMC @ 0x40000130
3,190,959 UART:
3,190,975 UART: Running Caliptra FMC ...
3,191,383 UART:
3,191,437 UART: [state] CFI Enabled
3,201,826 UART: [fht] FMC Alias Private Key: 7
3,309,987 UART: [art] Extend RT PCRs Done
3,310,415 UART: [art] Lock RT PCRs Done
3,312,287 UART: [art] Populate DV Done
3,320,459 UART: [fht] FMC Alias Private Key: 7
3,321,631 UART: [art] Derive CDI
3,321,911 UART: [art] Store in in slot 0x4
3,407,528 UART: [art] Derive Key Pair
3,407,888 UART: [art] Store priv key in slot 0x5
3,420,552 UART: [art] Derive Key Pair - Done
3,435,836 UART: [art] Signing Cert with AUTHO
3,436,316 UART: RITY.KEYID = 7
3,451,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,452,225 UART: [art] PUB.X = 38D571E0B10C1677640187FA5B3C65357A65737AC789D0681FF09F6B703FAC5F82668C062FCCEEEB14E6FF98EF163C08
3,458,989 UART: [art] PUB.Y = 0A4ED97AF154F1B11A3B98A161F171498A8F8546D3DA317FD71E8A9104A14B3D56EE91CFFF580317A432FB3FA3084AA3
3,465,937 UART: [art] SIG.R = A9BCA6A86B8508998141DAC2B4B81554E496189827122AFD8F3E651306F834C857C8A0E1141E2C7A14E20A2D33F61D02
3,472,693 UART: [art] SIG.S = 30740C3527A22BF8AD48DA6AB8AB111AE13C3EC4D44304F3146B4EAD223B25DA07601D539483E7726895E429A8271AA7
3,496,927 UART: Caliptra RT
3,497,180 UART: [state] CFI Enabled
3,605,335 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,606,094 UART:
3,606,110 UART: Running Caliptra ROM ...
3,606,518 UART:
3,606,572 UART: [state] CFI Enabled
3,609,373 UART: [state] LifecycleState = Production
3,609,981 UART: [state] DebugLocked = Yes
3,610,669 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,612,353 UART: [kat] SHA2-256
4,406,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,410,399 UART: [kat] ++
4,410,551 UART: [kat] sha1
4,414,721 UART: [kat] SHA2-256
4,416,659 UART: [kat] SHA2-384
4,419,448 UART: [kat] SHA2-512-ACC
4,421,349 UART: [kat] ECC-384
4,426,954 UART: [kat] HMAC-384Kdf
4,431,682 UART: [kat] LMS
4,999,878 UART: [kat] --
5,000,618 UART: [warm-reset] ++
5,001,501 UART: [warm-reset] --
5,002,306 UART: [state] Locking Datavault
5,003,026 UART: [state] Locking PCR0, PCR1 and PCR31
5,003,630 UART: [state] Locking ICCM
5,004,242 UART: [exit] Launching FMC @ 0x40000130
5,009,571 UART:
5,009,587 UART: Running Caliptra FMC ...
5,009,995 UART:
5,010,049 UART: [state] CFI Enabled
5,011,392 UART: [aliasrt :skip pcr extension
5,011,865 UART: [art] Extend RT PCRs Done
5,012,293 UART: [art] Lock RT PCRs Done
5,013,640 UART: [art] Populate DV Done
5,021,958 UART: [fht] FMC Alias Private Key: 7
5,023,024 UART: [art] Derive CDI
5,023,304 UART: [art] Store in in slot 0x4
5,109,289 UART: [art] Derive Key Pair
5,109,649 UART: [art] Store priv key in slot 0x5
5,122,639 UART: [art] Derive Key Pair - Done
5,137,909 UART: [art] Signing Cert with AUTHO
5,138,389 UART: RITY.KEYID = 7
5,153,455 UART: [art] Erasing AUTHORITY.KEYID = 7
5,154,220 UART: [art] PUB.X = 38D571E0B10C1677640187FA5B3C65357A65737AC789D0681FF09F6B703FAC5F82668C062FCCEEEB14E6FF98EF163C08
5,160,984 UART: [art] PUB.Y = 0A4ED97AF154F1B11A3B98A161F171498A8F8546D3DA317FD71E8A9104A14B3D56EE91CFFF580317A432FB3FA3084AA3
5,167,932 UART: [art] SIG.R = A9BCA6A86B8508998141DAC2B4B81554E496189827122AFD8F3E651306F834C857C8A0E1141E2C7A14E20A2D33F61D02
5,174,688 UART: [art] SIG.S = 30740C3527A22BF8AD48DA6AB8AB111AE13C3EC4D44304F3146B4EAD223B25DA07601D539483E7726895E429A8271AA7
5,197,822 UART: Caliptra RT
5,198,075 UART: [state] CFI Enabled
5,480,660 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,082 ready_for_fw is high
1,363,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,950,975 >>> mbox cmd response: success
3,013,022 UART:
3,013,038 UART: Running Caliptra FMC ...
3,013,446 UART:
3,013,500 UART: [state] CFI Enabled
3,023,977 UART: [fht] FMC Alias Private Key: 7
3,131,562 UART: [art] Extend RT PCRs Done
3,131,990 UART: [art] Lock RT PCRs Done
3,133,538 UART: [art] Populate DV Done
3,141,688 UART: [fht] FMC Alias Private Key: 7
3,142,828 UART: [art] Derive CDI
3,143,108 UART: [art] Store in in slot 0x4
3,228,847 UART: [art] Derive Key Pair
3,229,207 UART: [art] Store priv key in slot 0x5
3,242,577 UART: [art] Derive Key Pair - Done
3,257,050 UART: [art] Signing Cert with AUTHO
3,257,530 UART: RITY.KEYID = 7
3,272,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,273,569 UART: [art] PUB.X = D52F3ECE1EB36C388C18CBA3B40E527CEF270BCE1B48F6D2EEB823E7D462821DBAEE076D8DE9758F73AAE91208C984E0
3,280,349 UART: [art] PUB.Y = 8D679A5E329124FFE0436AA55E653D19655AC65939003C896A748FE2E01C482E3AD66D8FAD4819791BC8CD77C5A6C0AD
3,287,283 UART: [art] SIG.R = A09058BAB010990E29872C8B11E948C16C331DB500AB22A5C39810A677B172E28D5E8287D54FDE3848B8F6FBCE96FF19
3,294,032 UART: [art] SIG.S = EA3B4F8386EBA4CB27F6FB385D32717F58C580CE1EE359190AAC41A5C54C8AB56ED70A208DBA1857845CBEBA041174D1
3,317,996 UART: Caliptra RT
3,318,249 UART: [state] CFI Enabled
3,427,083 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,712,897 UART:
4,712,913 UART: Running Caliptra FMC ...
4,713,321 UART:
4,713,375 UART: [state] CFI Enabled
4,714,574 UART: [aliasrt :skip pcr extension
4,715,047 UART: [art] Extend RT PCRs Done
4,715,475 UART: [art] Lock RT PCRs Done
4,716,900 UART: [art] Populate DV Done
4,725,312 UART: [fht] FMC Alias Private Key: 7
4,726,270 UART: [art] Derive CDI
4,726,550 UART: [art] Store in in slot 0x4
4,811,909 UART: [art] Derive Key Pair
4,812,269 UART: [art] Store priv key in slot 0x5
4,825,203 UART: [art] Derive Key Pair - Done
4,839,874 UART: [art] Signing Cert with AUTHO
4,840,354 UART: RITY.KEYID = 7
4,855,672 UART: [art] Erasing AUTHORITY.KEYID = 7
4,856,437 UART: [art] PUB.X = D52F3ECE1EB36C388C18CBA3B40E527CEF270BCE1B48F6D2EEB823E7D462821DBAEE076D8DE9758F73AAE91208C984E0
4,863,217 UART: [art] PUB.Y = 8D679A5E329124FFE0436AA55E653D19655AC65939003C896A748FE2E01C482E3AD66D8FAD4819791BC8CD77C5A6C0AD
4,870,151 UART: [art] SIG.R = A09058BAB010990E29872C8B11E948C16C331DB500AB22A5C39810A677B172E28D5E8287D54FDE3848B8F6FBCE96FF19
4,876,900 UART: [art] SIG.S = EA3B4F8386EBA4CB27F6FB385D32717F58C580CE1EE359190AAC41A5C54C8AB56ED70A208DBA1857845CBEBA041174D1
4,900,354 UART: Caliptra RT
4,900,607 UART: [state] CFI Enabled
5,184,339 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Production
86,034 UART: [state] DebugLocked = Yes
86,692 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,250 UART: [kat] SHA2-256
882,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,296 UART: [kat] ++
886,448 UART: [kat] sha1
890,634 UART: [kat] SHA2-256
892,572 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,667 UART: [kat] HMAC-384Kdf
907,293 UART: [kat] LMS
1,475,489 UART: [kat] --
1,476,364 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,562 UART: [idev] ++
1,479,730 UART: [idev] CDI.KEYID = 6
1,480,090 UART: [idev] SUBJECT.KEYID = 7
1,480,514 UART: [idev] UDS.KEYID = 0
1,480,859 ready_for_fw is high
1,480,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,661 UART: [idev] Erasing UDS.KEYID = 0
1,505,904 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,559 UART: [idev] --
1,515,608 UART: [ldev] ++
1,515,776 UART: [ldev] CDI.KEYID = 6
1,516,139 UART: [ldev] SUBJECT.KEYID = 5
1,516,565 UART: [ldev] AUTHORITY.KEYID = 7
1,517,028 UART: [ldev] FE.KEYID = 1
1,522,344 UART: [ldev] Erasing FE.KEYID = 1
1,548,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,334 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,028 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,900 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,606 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,698 UART: [ldev] --
1,586,993 UART: [fwproc] Waiting for Commands...
1,587,648 UART: [fwproc] Received command 0x46574c44
1,588,439 UART: [fwproc] Received Image of size 114168 bytes
2,910,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,937,776 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,967,128 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,102,866 >>> mbox cmd response: success
3,103,915 UART: [afmc] ++
3,104,083 UART: [afmc] CDI.KEYID = 6
3,104,445 UART: [afmc] SUBJECT.KEYID = 7
3,104,870 UART: [afmc] AUTHORITY.KEYID = 5
3,139,457 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,155,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,156,721 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
3,162,439 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
3,168,334 UART: [afmc] SIG.R = 623EC468580E48F9442F3A98505805ACC48D8CCEA3B375213C8A5074ABC3A5C2FDCB24A111F0C9A172DA0CBE859EBB4A
3,174,045 UART: [afmc] SIG.S = DBE39B3C6863A87345434C51DDFD4D2E4CF8AF80FC96FA343F8F9745848E06704092BB663A7D1981CA09695E7F15145A
3,181,803 UART: [afmc] --
3,182,818 UART: [cold-reset] --
3,183,648 UART: [state] Locking Datavault
3,184,887 UART: [state] Locking PCR0, PCR1 and PCR31
3,185,491 UART: [state] Locking ICCM
3,185,951 UART: [exit] Launching FMC @ 0x40000130
3,191,280 UART:
3,191,296 UART: Running Caliptra FMC ...
3,191,704 UART:
3,191,847 UART: [state] CFI Enabled
3,202,094 UART: [fht] FMC Alias Private Key: 7
3,309,597 UART: [art] Extend RT PCRs Done
3,310,025 UART: [art] Lock RT PCRs Done
3,311,597 UART: [art] Populate DV Done
3,319,815 UART: [fht] FMC Alias Private Key: 7
3,320,771 UART: [art] Derive CDI
3,321,051 UART: [art] Store in in slot 0x4
3,406,618 UART: [art] Derive Key Pair
3,406,978 UART: [art] Store priv key in slot 0x5
3,420,378 UART: [art] Derive Key Pair - Done
3,435,357 UART: [art] Signing Cert with AUTHO
3,435,837 UART: RITY.KEYID = 7
3,450,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,451,726 UART: [art] PUB.X = 8820FF92A96F93C6E5E4847605FDEC181CC73BAAEBAF6800CCD92DBFA82584F45945C62A4C495D819355C06C9D474E20
3,458,481 UART: [art] PUB.Y = 93FCF10E7F1633A8871BE219FA9B679606578033727CAE6E3B788ECE8C393331F850A95925E504C9768FC308BC0BDF4A
3,465,418 UART: [art] SIG.R = 8251B945528688510DE599D5327D73AB83C5D0E30BAAA6FD1B84905819BFAC51673D94172D2A27913C7CA53D3C111EE4
3,472,182 UART: [art] SIG.S = AA39D100959E231FCD30CD400835ADA46F09379715A2051625087BA9470CAAFFD7F11DA8D96BB0ECC1AA85CDF56A9119
3,495,912 UART: Caliptra RT
3,496,257 UART: [state] CFI Enabled
3,603,627 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,604,386 UART:
3,604,402 UART: Running Caliptra ROM ...
3,604,810 UART:
3,604,951 UART: [state] CFI Enabled
3,608,088 UART: [state] LifecycleState = Production
3,608,696 UART: [state] DebugLocked = Yes
3,609,332 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,611,052 UART: [kat] SHA2-256
4,404,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,409,098 UART: [kat] ++
4,409,250 UART: [kat] sha1
4,413,474 UART: [kat] SHA2-256
4,415,412 UART: [kat] SHA2-384
4,418,253 UART: [kat] SHA2-512-ACC
4,420,154 UART: [kat] ECC-384
4,425,831 UART: [kat] HMAC-384Kdf
4,430,417 UART: [kat] LMS
4,998,613 UART: [kat] --
4,999,581 UART: [warm-reset] ++
5,000,376 UART: [warm-reset] --
5,001,055 UART: [state] Locking Datavault
5,001,957 UART: [state] Locking PCR0, PCR1 and PCR31
5,002,561 UART: [state] Locking ICCM
5,003,183 UART: [exit] Launching FMC @ 0x40000130
5,008,512 UART:
5,008,528 UART: Running Caliptra FMC ...
5,008,936 UART:
5,009,079 UART: [state] CFI Enabled
5,010,390 UART: [aliasrt :skip pcr extension
5,010,863 UART: [art] Extend RT PCRs Done
5,011,291 UART: [art] Lock RT PCRs Done
5,012,492 UART: [art] Populate DV Done
5,020,738 UART: [fht] FMC Alias Private Key: 7
5,021,666 UART: [art] Derive CDI
5,021,946 UART: [art] Store in in slot 0x4
5,107,249 UART: [art] Derive Key Pair
5,107,609 UART: [art] Store priv key in slot 0x5
5,121,157 UART: [art] Derive Key Pair - Done
5,136,098 UART: [art] Signing Cert with AUTHO
5,136,578 UART: RITY.KEYID = 7
5,151,824 UART: [art] Erasing AUTHORITY.KEYID = 7
5,152,589 UART: [art] PUB.X = 8820FF92A96F93C6E5E4847605FDEC181CC73BAAEBAF6800CCD92DBFA82584F45945C62A4C495D819355C06C9D474E20
5,159,344 UART: [art] PUB.Y = 93FCF10E7F1633A8871BE219FA9B679606578033727CAE6E3B788ECE8C393331F850A95925E504C9768FC308BC0BDF4A
5,166,281 UART: [art] SIG.R = 8251B945528688510DE599D5327D73AB83C5D0E30BAAA6FD1B84905819BFAC51673D94172D2A27913C7CA53D3C111EE4
5,173,045 UART: [art] SIG.S = AA39D100959E231FCD30CD400835ADA46F09379715A2051625087BA9470CAAFFD7F11DA8D96BB0ECC1AA85CDF56A9119
5,196,387 UART: Caliptra RT
5,196,732 UART: [state] CFI Enabled
5,480,214 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,235 ready_for_fw is high
1,363,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,951,054 >>> mbox cmd response: success
3,012,601 UART:
3,012,617 UART: Running Caliptra FMC ...
3,013,025 UART:
3,013,168 UART: [state] CFI Enabled
3,023,561 UART: [fht] FMC Alias Private Key: 7
3,131,944 UART: [art] Extend RT PCRs Done
3,132,372 UART: [art] Lock RT PCRs Done
3,134,048 UART: [art] Populate DV Done
3,142,592 UART: [fht] FMC Alias Private Key: 7
3,143,538 UART: [art] Derive CDI
3,143,818 UART: [art] Store in in slot 0x4
3,229,381 UART: [art] Derive Key Pair
3,229,741 UART: [art] Store priv key in slot 0x5
3,243,115 UART: [art] Derive Key Pair - Done
3,257,616 UART: [art] Signing Cert with AUTHO
3,258,096 UART: RITY.KEYID = 7
3,273,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,274,735 UART: [art] PUB.X = 94C3CAEF361D955212E9508FCD5EACC67D408E9EE04298A5012A00E38F981759CEAF26E1E440519A081147C8B2B88502
3,281,476 UART: [art] PUB.Y = F4FE74AC4971FE1192DFF923825C7E286DC317FB73F4B9F56060A1953C061BDC23429A66C4D95E6B210DA71CC71854F8
3,288,426 UART: [art] SIG.R = D63A8FEE593E2CC853A68A7BC61C78726BB0FF64781023BEA3C2CA151EAEE2BA79119167BAF646A42772D7D9BE8D3DFA
3,295,216 UART: [art] SIG.S = 01E4D37035B66729A1755BC19B94CA14B9B847542FCCD945DB8D4CAA2121089B2DDD6972298C68701140CE5B27B49012
3,318,751 UART: Caliptra RT
3,319,096 UART: [state] CFI Enabled
3,427,141 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,713,424 UART:
4,713,440 UART: Running Caliptra FMC ...
4,713,848 UART:
4,713,991 UART: [state] CFI Enabled
4,715,356 UART: [aliasrt :skip pcr extension
4,715,829 UART: [art] Extend RT PCRs Done
4,716,257 UART: [art] Lock RT PCRs Done
4,717,388 UART: [art] Populate DV Done
4,725,398 UART: [fht] FMC Alias Private Key: 7
4,726,494 UART: [art] Derive CDI
4,726,774 UART: [art] Store in in slot 0x4
4,812,655 UART: [art] Derive Key Pair
4,813,015 UART: [art] Store priv key in slot 0x5
4,826,161 UART: [art] Derive Key Pair - Done
4,840,808 UART: [art] Signing Cert with AUTHO
4,841,288 UART: RITY.KEYID = 7
4,856,242 UART: [art] Erasing AUTHORITY.KEYID = 7
4,857,007 UART: [art] PUB.X = 94C3CAEF361D955212E9508FCD5EACC67D408E9EE04298A5012A00E38F981759CEAF26E1E440519A081147C8B2B88502
4,863,748 UART: [art] PUB.Y = F4FE74AC4971FE1192DFF923825C7E286DC317FB73F4B9F56060A1953C061BDC23429A66C4D95E6B210DA71CC71854F8
4,870,698 UART: [art] SIG.R = D63A8FEE593E2CC853A68A7BC61C78726BB0FF64781023BEA3C2CA151EAEE2BA79119167BAF646A42772D7D9BE8D3DFA
4,877,488 UART: [art] SIG.S = 01E4D37035B66729A1755BC19B94CA14B9B847542FCCD945DB8D4CAA2121089B2DDD6972298C68701140CE5B27B49012
4,901,089 UART: Caliptra RT
4,901,434 UART: [state] CFI Enabled
5,182,085 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,789 UART: [state] LifecycleState = Production
85,397 UART: [state] DebugLocked = Yes
86,119 UART: [state] Starting the WD Timer 40000000 cycles
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
901,923 UART: [kat] SHA2-256
903,863 UART: [kat] SHA2-384
906,390 UART: [kat] SHA2-512-ACC
908,291 UART: [kat] ECC-384
917,928 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,171,675 UART: [cold-reset] ++
1,172,034 UART: [fht] FHT @ 0x50003400
1,174,727 UART: [idev] ++
1,174,895 UART: [idev] CDI.KEYID = 6
1,175,255 UART: [idev] SUBJECT.KEYID = 7
1,175,679 UART: [idev] UDS.KEYID = 0
1,176,024 ready_for_fw is high
1,176,024 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,200,884 UART: [idev] Sha1 KeyId Algorithm
1,209,535 UART: [idev] --
1,210,485 UART: [ldev] ++
1,210,653 UART: [ldev] CDI.KEYID = 6
1,211,016 UART: [ldev] SUBJECT.KEYID = 5
1,211,442 UART: [ldev] AUTHORITY.KEYID = 7
1,211,905 UART: [ldev] FE.KEYID = 1
1,217,377 UART: [ldev] Erasing FE.KEYID = 1
1,243,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,091 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,785 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,657 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,363 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,386 UART: [ldev] --
1,282,707 UART: [fwproc] Wait for Commands...
1,283,309 UART: [fwproc] Recv command 0x46574c44
1,284,037 UART: [fwproc] Recv'd Img size: 114168 bytes
2,606,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,622 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,799,200 >>> mbox cmd response: success
2,800,221 UART: [afmc] ++
2,800,389 UART: [afmc] CDI.KEYID = 6
2,800,751 UART: [afmc] SUBJECT.KEYID = 7
2,801,176 UART: [afmc] AUTHORITY.KEYID = 5
2,835,717 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,852,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,853,154 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,858,872 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,864,767 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,870,474 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,878,248 UART: [afmc] --
2,879,253 UART: [cold-reset] --
2,880,001 UART: [state] Locking Datavault
2,881,172 UART: [state] Locking PCR0, PCR1 and PCR31
2,881,776 UART: [state] Locking ICCM
2,882,278 UART: [exit] Launching FMC @ 0x40000130
2,887,607 UART:
2,887,623 UART: Running Caliptra FMC ...
2,888,031 UART:
2,888,085 UART: [state] CFI Enabled
2,898,386 UART: [fht] FMC Alias Private Key: 7
3,005,805 UART: [art] Extend RT PCRs Done
3,006,233 UART: [art] Lock RT PCRs Done
3,007,665 UART: [art] Populate DV Done
3,015,681 UART: [fht] FMC Alias Private Key: 7
3,016,661 UART: [art] Derive CDI
3,016,941 UART: [art] Store in in slot 0x4
3,102,142 UART: [art] Derive Key Pair
3,102,502 UART: [art] Store priv key in slot 0x5
3,115,562 UART: [art] Derive Key Pair - Done
3,130,549 UART: [art] Signing Cert with AUTHO
3,131,029 UART: RITY.KEYID = 7
3,146,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,052 UART: [art] PUB.X = 1E40040970412B9267FBDDB5ACC80E1DF065D85478F8941F11F19EFDC3EE5D73B525388BEABD24F09FBD0F630F486F37
3,153,819 UART: [art] PUB.Y = 5517600E135365333EB6F4EDD495222AE58A6F8DBC4BCC333899863AD53A92AD2A8EAAF4EFB0CC88182EA270C061D5AA
3,160,780 UART: [art] SIG.R = 532EAE28EEE65C67DB01A7EAFA0BCC9FA40A07988EABFBCB1A2D1766D92F8C85CEA7F0B8B20CAA9842EA68937B9B88F0
3,167,565 UART: [art] SIG.S = 8381DFF116FD3FD9EBFF872EC647C553C8540FB5CCFB2496351948D5CBFDE5D077C08306F2B1F571B0FCFC42B76DC152
3,191,562 UART: Caliptra RT
3,191,815 UART: [state] CFI Enabled
3,300,162 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,918 UART:
3,300,934 UART: Running Caliptra ROM ...
3,301,342 UART:
3,301,397 UART: [state] CFI Enabled
3,303,674 UART: [state] LifecycleState = Production
3,304,282 UART: [state] DebugLocked = Yes
3,304,934 UART: [state] Starting the WD Timer 40000000 cycles
3,306,501 UART: [kat] SHA2-256
4,112,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,116,276 UART: [kat] ++
4,116,428 UART: [kat] sha1
4,120,794 UART: [kat] SHA2-256
4,122,734 UART: [kat] SHA2-384
4,125,403 UART: [kat] SHA2-512-ACC
4,127,304 UART: [kat] ECC-384
4,137,025 UART: [kat] HMAC-384Kdf
4,141,729 UART: [kat] LMS
4,390,057 UART: [kat] --
4,390,843 UART: [warm-reset] ++
4,391,666 UART: [warm-reset] --
4,392,359 UART: [state] Locking Datavault
4,393,141 UART: [state] Locking PCR0, PCR1 and PCR31
4,393,745 UART: [state] Locking ICCM
4,394,235 UART: [exit] Launching FMC @ 0x40000130
4,399,564 UART:
4,399,580 UART: Running Caliptra FMC ...
4,399,988 UART:
4,400,042 UART: [state] CFI Enabled
4,401,175 UART: [aliasrt :skip pcr extension
4,401,648 UART: [art] Extend RT PCRs Done
4,402,076 UART: [art] Lock RT PCRs Done
4,403,165 UART: [art] Populate DV Done
4,411,237 UART: [fht] FMC Alias Private Key: 7
4,412,227 UART: [art] Derive CDI
4,412,507 UART: [art] Store in in slot 0x4
4,498,572 UART: [art] Derive Key Pair
4,498,932 UART: [art] Store priv key in slot 0x5
4,512,026 UART: [art] Derive Key Pair - Done
4,526,609 UART: [art] Signing Cert with AUTHO
4,527,089 UART: RITY.KEYID = 7
4,542,639 UART: [art] Erasing AUTHORITY.KEYID = 7
4,543,404 UART: [art] PUB.X = 1E40040970412B9267FBDDB5ACC80E1DF065D85478F8941F11F19EFDC3EE5D73B525388BEABD24F09FBD0F630F486F37
4,550,171 UART: [art] PUB.Y = 5517600E135365333EB6F4EDD495222AE58A6F8DBC4BCC333899863AD53A92AD2A8EAAF4EFB0CC88182EA270C061D5AA
4,557,132 UART: [art] SIG.R = 532EAE28EEE65C67DB01A7EAFA0BCC9FA40A07988EABFBCB1A2D1766D92F8C85CEA7F0B8B20CAA9842EA68937B9B88F0
4,563,917 UART: [art] SIG.S = 8381DFF116FD3FD9EBFF872EC647C553C8540FB5CCFB2496351948D5CBFDE5D077C08306F2B1F571B0FCFC42B76DC152
4,587,574 UART: Caliptra RT
4,587,827 UART: [state] CFI Enabled
4,869,886 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,854 ready_for_fw is high
1,059,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,649,357 >>> mbox cmd response: success
2,711,128 UART:
2,711,144 UART: Running Caliptra FMC ...
2,711,552 UART:
2,711,606 UART: [state] CFI Enabled
2,722,107 UART: [fht] FMC Alias Private Key: 7
2,830,260 UART: [art] Extend RT PCRs Done
2,830,688 UART: [art] Lock RT PCRs Done
2,832,236 UART: [art] Populate DV Done
2,840,264 UART: [fht] FMC Alias Private Key: 7
2,841,410 UART: [art] Derive CDI
2,841,690 UART: [art] Store in in slot 0x4
2,927,057 UART: [art] Derive Key Pair
2,927,417 UART: [art] Store priv key in slot 0x5
2,940,509 UART: [art] Derive Key Pair - Done
2,955,019 UART: [art] Signing Cert with AUTHO
2,955,499 UART: RITY.KEYID = 7
2,970,765 UART: [art] Erasing AUTHORITY.KEYID = 7
2,971,530 UART: [art] PUB.X = A0D4844D0BBA164CD7ADB4BB333405D1532C4B6FAEA0667EF75C9F4E59DB3D8B578E55AC7D51FAF8FB707ACF07316670
2,978,311 UART: [art] PUB.Y = FCB3D13891E7A5A381A1BC0D4E3DBEADBFE15078AD60040810D915D5A948921D231BEB8ED9CD1E01C6912F5ADFD75662
2,985,267 UART: [art] SIG.R = 15EEF0A58998275040CB03B3C7040F0FF0997CC1490932FF2B8B2BC91DEDEB147091F875A3A5A9F516C9C713C7CEADDE
2,992,036 UART: [art] SIG.S = A3FE95F8286CE33C661FD30E7D81F9AD10EA4DD3843B5C4C08F9670D304A9A98E1B02CB17ABED7862DBF24478F7B532E
3,015,654 UART: Caliptra RT
3,015,907 UART: [state] CFI Enabled
3,123,576 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,106,798 UART:
4,106,814 UART: Running Caliptra FMC ...
4,107,222 UART:
4,107,276 UART: [state] CFI Enabled
4,108,505 UART: [aliasrt :skip pcr extension
4,108,978 UART: [art] Extend RT PCRs Done
4,109,406 UART: [art] Lock RT PCRs Done
4,110,579 UART: [art] Populate DV Done
4,118,779 UART: [fht] FMC Alias Private Key: 7
4,119,941 UART: [art] Derive CDI
4,120,221 UART: [art] Store in in slot 0x4
4,206,098 UART: [art] Derive Key Pair
4,206,458 UART: [art] Store priv key in slot 0x5
4,219,218 UART: [art] Derive Key Pair - Done
4,234,004 UART: [art] Signing Cert with AUTHO
4,234,484 UART: RITY.KEYID = 7
4,249,532 UART: [art] Erasing AUTHORITY.KEYID = 7
4,250,297 UART: [art] PUB.X = A0D4844D0BBA164CD7ADB4BB333405D1532C4B6FAEA0667EF75C9F4E59DB3D8B578E55AC7D51FAF8FB707ACF07316670
4,257,078 UART: [art] PUB.Y = FCB3D13891E7A5A381A1BC0D4E3DBEADBFE15078AD60040810D915D5A948921D231BEB8ED9CD1E01C6912F5ADFD75662
4,264,034 UART: [art] SIG.R = 15EEF0A58998275040CB03B3C7040F0FF0997CC1490932FF2B8B2BC91DEDEB147091F875A3A5A9F516C9C713C7CEADDE
4,270,803 UART: [art] SIG.S = A3FE95F8286CE33C661FD30E7D81F9AD10EA4DD3843B5C4C08F9670D304A9A98E1B02CB17ABED7862DBF24478F7B532E
4,294,653 UART: Caliptra RT
4,294,906 UART: [state] CFI Enabled
4,579,591 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,904 UART: [state] LifecycleState = Production
86,512 UART: [state] DebugLocked = Yes
87,060 UART: [state] Starting the WD Timer 40000000 cycles
88,665 UART: [kat] SHA2-256
894,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,440 UART: [kat] ++
898,592 UART: [kat] sha1
902,890 UART: [kat] SHA2-256
904,830 UART: [kat] SHA2-384
907,721 UART: [kat] SHA2-512-ACC
909,622 UART: [kat] ECC-384
919,381 UART: [kat] HMAC-384Kdf
924,075 UART: [kat] LMS
1,172,403 UART: [kat] --
1,173,170 UART: [cold-reset] ++
1,173,501 UART: [fht] FHT @ 0x50003400
1,176,120 UART: [idev] ++
1,176,288 UART: [idev] CDI.KEYID = 6
1,176,648 UART: [idev] SUBJECT.KEYID = 7
1,177,072 UART: [idev] UDS.KEYID = 0
1,177,417 ready_for_fw is high
1,177,417 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,675 UART: [idev] Erasing UDS.KEYID = 0
1,203,647 UART: [idev] Sha1 KeyId Algorithm
1,212,104 UART: [idev] --
1,213,146 UART: [ldev] ++
1,213,314 UART: [ldev] CDI.KEYID = 6
1,213,677 UART: [ldev] SUBJECT.KEYID = 5
1,214,103 UART: [ldev] AUTHORITY.KEYID = 7
1,214,566 UART: [ldev] FE.KEYID = 1
1,219,916 UART: [ldev] Erasing FE.KEYID = 1
1,246,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,260,310 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,266,004 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,271,876 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,277,582 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,284,815 UART: [ldev] --
1,286,214 UART: [fwproc] Wait for Commands...
1,286,818 UART: [fwproc] Recv command 0x46574c44
1,287,546 UART: [fwproc] Recv'd Img size: 114168 bytes
2,608,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,635,711 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,015 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,800,589 >>> mbox cmd response: success
2,801,732 UART: [afmc] ++
2,801,900 UART: [afmc] CDI.KEYID = 6
2,802,262 UART: [afmc] SUBJECT.KEYID = 7
2,802,687 UART: [afmc] AUTHORITY.KEYID = 5
2,838,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,854,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,855,633 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,861,351 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,867,246 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,872,953 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,880,695 UART: [afmc] --
2,881,580 UART: [cold-reset] --
2,882,606 UART: [state] Locking Datavault
2,883,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,884,227 UART: [state] Locking ICCM
2,884,779 UART: [exit] Launching FMC @ 0x40000130
2,890,108 UART:
2,890,124 UART: Running Caliptra FMC ...
2,890,532 UART:
2,890,675 UART: [state] CFI Enabled
2,901,122 UART: [fht] FMC Alias Private Key: 7
3,009,715 UART: [art] Extend RT PCRs Done
3,010,143 UART: [art] Lock RT PCRs Done
3,011,531 UART: [art] Populate DV Done
3,019,751 UART: [fht] FMC Alias Private Key: 7
3,020,893 UART: [art] Derive CDI
3,021,173 UART: [art] Store in in slot 0x4
3,107,196 UART: [art] Derive Key Pair
3,107,556 UART: [art] Store priv key in slot 0x5
3,120,660 UART: [art] Derive Key Pair - Done
3,135,257 UART: [art] Signing Cert with AUTHO
3,135,737 UART: RITY.KEYID = 7
3,150,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,151,762 UART: [art] PUB.X = 35B4CF0781A1AE73950DCD185407318BD9B4E1B1D99A9745489A969F02DA8C36E197861585B05DB8EA32E8182C3763CB
3,158,520 UART: [art] PUB.Y = B6C434D6D42CA96AE9FD231C001FA3FF70061A50F6C23E391035D18761A8C464C741DFE624F14552D1558C8B91F96B54
3,165,447 UART: [art] SIG.R = FD9B55AC2A20C4BE3EE2186F9D89B3A061F463762553F6FD1DF66C45D1964BD5FEC2D9E6934026E3C9F3A32C952A35E0
3,172,229 UART: [art] SIG.S = 14F7B303911661EB980B218729652C59815C8DA39EB2B2BFD624334A11F4B7634F78AFB3712EB8E7534C36D7287AE954
3,195,766 UART: Caliptra RT
3,196,111 UART: [state] CFI Enabled
3,303,498 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,304,254 UART:
3,304,270 UART: Running Caliptra ROM ...
3,304,678 UART:
3,304,820 UART: [state] CFI Enabled
3,307,667 UART: [state] LifecycleState = Production
3,308,275 UART: [state] DebugLocked = Yes
3,308,995 UART: [state] Starting the WD Timer 40000000 cycles
3,310,632 UART: [kat] SHA2-256
4,116,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,120,407 UART: [kat] ++
4,120,559 UART: [kat] sha1
4,124,701 UART: [kat] SHA2-256
4,126,641 UART: [kat] SHA2-384
4,129,316 UART: [kat] SHA2-512-ACC
4,131,217 UART: [kat] ECC-384
4,141,164 UART: [kat] HMAC-384Kdf
4,145,802 UART: [kat] LMS
4,394,130 UART: [kat] --
4,395,050 UART: [warm-reset] ++
4,395,949 UART: [warm-reset] --
4,396,776 UART: [state] Locking Datavault
4,397,672 UART: [state] Locking PCR0, PCR1 and PCR31
4,398,276 UART: [state] Locking ICCM
4,398,880 UART: [exit] Launching FMC @ 0x40000130
4,404,209 UART:
4,404,225 UART: Running Caliptra FMC ...
4,404,633 UART:
4,404,776 UART: [state] CFI Enabled
4,406,323 UART: [aliasrt :skip pcr extension
4,406,796 UART: [art] Extend RT PCRs Done
4,407,224 UART: [art] Lock RT PCRs Done
4,408,625 UART: [art] Populate DV Done
4,416,853 UART: [fht] FMC Alias Private Key: 7
4,417,881 UART: [art] Derive CDI
4,418,161 UART: [art] Store in in slot 0x4
4,503,866 UART: [art] Derive Key Pair
4,504,226 UART: [art] Store priv key in slot 0x5
4,517,754 UART: [art] Derive Key Pair - Done
4,532,477 UART: [art] Signing Cert with AUTHO
4,532,957 UART: RITY.KEYID = 7
4,548,409 UART: [art] Erasing AUTHORITY.KEYID = 7
4,549,174 UART: [art] PUB.X = 35B4CF0781A1AE73950DCD185407318BD9B4E1B1D99A9745489A969F02DA8C36E197861585B05DB8EA32E8182C3763CB
4,555,932 UART: [art] PUB.Y = B6C434D6D42CA96AE9FD231C001FA3FF70061A50F6C23E391035D18761A8C464C741DFE624F14552D1558C8B91F96B54
4,562,859 UART: [art] SIG.R = FD9B55AC2A20C4BE3EE2186F9D89B3A061F463762553F6FD1DF66C45D1964BD5FEC2D9E6934026E3C9F3A32C952A35E0
4,569,641 UART: [art] SIG.S = 14F7B303911661EB980B218729652C59815C8DA39EB2B2BFD624334A11F4B7634F78AFB3712EB8E7534C36D7287AE954
4,593,168 UART: Caliptra RT
4,593,513 UART: [state] CFI Enabled
4,874,882 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,889 ready_for_fw is high
1,060,889 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,651,288 >>> mbox cmd response: success
2,712,839 UART:
2,712,855 UART: Running Caliptra FMC ...
2,713,263 UART:
2,713,406 UART: [state] CFI Enabled
2,724,141 UART: [fht] FMC Alias Private Key: 7
2,832,064 UART: [art] Extend RT PCRs Done
2,832,492 UART: [art] Lock RT PCRs Done
2,834,364 UART: [art] Populate DV Done
2,842,504 UART: [fht] FMC Alias Private Key: 7
2,843,522 UART: [art] Derive CDI
2,843,802 UART: [art] Store in in slot 0x4
2,928,989 UART: [art] Derive Key Pair
2,929,349 UART: [art] Store priv key in slot 0x5
2,942,595 UART: [art] Derive Key Pair - Done
2,957,266 UART: [art] Signing Cert with AUTHO
2,957,746 UART: RITY.KEYID = 7
2,972,514 UART: [art] Erasing AUTHORITY.KEYID = 7
2,973,279 UART: [art] PUB.X = 5B86B303FEA1C8084EB0FF1D9480C1429785524FDFFB6863EACCF69B0A5BCC925FDF14D6BE817DD357094ED1420492C5
2,980,048 UART: [art] PUB.Y = BCF215B41ACD08511C3BABCA14A56EBBB3A6F775C35A4DB834CF1E9A04B9C3FABAA41B9A29D502E511E4C3F0F856959B
2,987,015 UART: [art] SIG.R = 956479D08BAFB1611BDD9A34AC56E77EFEF48461A51179247A5295B54EF2D027EDA274DBC3E3F0CAD0F3B802C6D90C31
2,993,793 UART: [art] SIG.S = 1D57FC0D12956F703A0AB405787333D172C2AEA15F9ADE2BB239881642D0D62A00512043CDA2139E02394BA8687EF293
3,017,056 UART: Caliptra RT
3,017,401 UART: [state] CFI Enabled
3,124,716 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,108,495 UART:
4,108,511 UART: Running Caliptra FMC ...
4,108,919 UART:
4,109,062 UART: [state] CFI Enabled
4,110,299 UART: [aliasrt :skip pcr extension
4,110,772 UART: [art] Extend RT PCRs Done
4,111,200 UART: [art] Lock RT PCRs Done
4,112,341 UART: [art] Populate DV Done
4,120,709 UART: [fht] FMC Alias Private Key: 7
4,121,683 UART: [art] Derive CDI
4,121,963 UART: [art] Store in in slot 0x4
4,207,738 UART: [art] Derive Key Pair
4,208,098 UART: [art] Store priv key in slot 0x5
4,221,026 UART: [art] Derive Key Pair - Done
4,235,991 UART: [art] Signing Cert with AUTHO
4,236,471 UART: RITY.KEYID = 7
4,251,455 UART: [art] Erasing AUTHORITY.KEYID = 7
4,252,220 UART: [art] PUB.X = 5B86B303FEA1C8084EB0FF1D9480C1429785524FDFFB6863EACCF69B0A5BCC925FDF14D6BE817DD357094ED1420492C5
4,258,989 UART: [art] PUB.Y = BCF215B41ACD08511C3BABCA14A56EBBB3A6F775C35A4DB834CF1E9A04B9C3FABAA41B9A29D502E511E4C3F0F856959B
4,265,956 UART: [art] SIG.R = 956479D08BAFB1611BDD9A34AC56E77EFEF48461A51179247A5295B54EF2D027EDA274DBC3E3F0CAD0F3B802C6D90C31
4,272,734 UART: [art] SIG.S = 1D57FC0D12956F703A0AB405787333D172C2AEA15F9ADE2BB239881642D0D62A00512043CDA2139E02394BA8687EF293
4,296,205 UART: Caliptra RT
4,296,550 UART: [state] CFI Enabled
4,578,519 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Production
85,781 UART: [state] DebugLocked = Yes
86,391 UART: [state] Starting the WD Timer 40000000 cycles
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,364 UART: [kat] SHA2-512-ACC
906,265 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,895 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,172,752 UART: [idev] ++
1,172,920 UART: [idev] CDI.KEYID = 6
1,173,281 UART: [idev] SUBJECT.KEYID = 7
1,173,706 UART: [idev] UDS.KEYID = 0
1,174,052 ready_for_fw is high
1,174,052 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,969 UART: [idev] Erasing UDS.KEYID = 0
1,199,256 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,731 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,601 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,307 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,427 UART: [ldev] --
1,281,717 UART: [fwproc] Wait for Commands...
1,282,386 UART: [fwproc] Recv command 0x46574c44
1,283,119 UART: [fwproc] Recv'd Img size: 114168 bytes
2,604,517 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,631,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,660,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,796,480 >>> mbox cmd response: success
2,797,710 UART: [afmc] ++
2,797,878 UART: [afmc] CDI.KEYID = 6
2,798,241 UART: [afmc] SUBJECT.KEYID = 7
2,798,667 UART: [afmc] AUTHORITY.KEYID = 5
2,834,546 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,146 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,851,897 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,616 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,509 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,216 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,876,987 UART: [afmc] --
2,877,958 UART: [cold-reset] --
2,878,900 UART: [state] Locking Datavault
2,880,041 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,645 UART: [state] Locking ICCM
2,881,125 UART: [exit] Launching FMC @ 0x40000130
2,886,454 UART:
2,886,470 UART: Running Caliptra FMC ...
2,886,878 UART:
2,886,932 UART: [state] CFI Enabled
2,897,377 UART: [fht] FMC Alias Private Key: 7
3,005,580 UART: [art] Extend RT PCRs Done
3,006,008 UART: [art] Lock RT PCRs Done
3,007,660 UART: [art] Populate DV Done
3,015,970 UART: [fht] FMC Alias Private Key: 7
3,016,914 UART: [art] Derive CDI
3,017,194 UART: [art] Store in in slot 0x4
3,102,879 UART: [art] Derive Key Pair
3,103,239 UART: [art] Store priv key in slot 0x5
3,116,319 UART: [art] Derive Key Pair - Done
3,130,872 UART: [art] Signing Cert with AUTHO
3,131,352 UART: RITY.KEYID = 7
3,146,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,147,249 UART: [art] PUB.X = B9F7AE8D3112ABAE8747D35E646C1962E1288D7FF2979A6B5170EB5372BDD66250636B38E93D39CA1594AB97D573E251
3,154,021 UART: [art] PUB.Y = 380D6332E5162A1162370250F5E6EB60283D00AE76311D43DEF80CEF494F8AB8E8C3A5C632CC487F9F6562D4234948C4
3,160,938 UART: [art] SIG.R = BB245065424F9180B6D61F095C0A5B29BD3A09902064A5758C7A2B75EDA7B430BBF3A2F535EC8216C6F621BE60B822B5
3,167,703 UART: [art] SIG.S = 5FC8ED0ED259A7A9556C3979295F43454CAEB6232843CA634756AEDA1224D69526A7A21D90C5E872367499B69A0E1E98
3,191,684 UART: Caliptra RT
3,191,937 UART: [state] CFI Enabled
3,298,680 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,299,436 UART:
3,299,452 UART: Running Caliptra ROM ...
3,299,860 UART:
3,299,915 UART: [state] CFI Enabled
3,302,598 UART: [state] LifecycleState = Production
3,303,206 UART: [state] DebugLocked = Yes
3,303,926 UART: [state] Starting the WD Timer 40000000 cycles
3,305,541 UART: [kat] SHA2-256
4,109,091 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,220 UART: [kat] ++
4,113,372 UART: [kat] sha1
4,117,742 UART: [kat] SHA2-256
4,119,682 UART: [kat] SHA2-384
4,122,405 UART: [kat] SHA2-512-ACC
4,124,306 UART: [kat] ECC-384
4,133,507 UART: [kat] HMAC-384Kdf
4,137,969 UART: [kat] LMS
4,386,281 UART: [kat] --
4,387,135 UART: [warm-reset] ++
4,388,118 UART: [warm-reset] --
4,388,855 UART: [state] Locking Datavault
4,389,723 UART: [state] Locking PCR0, PCR1 and PCR31
4,390,327 UART: [state] Locking ICCM
4,390,987 UART: [exit] Launching FMC @ 0x40000130
4,396,316 UART:
4,396,332 UART: Running Caliptra FMC ...
4,396,740 UART:
4,396,794 UART: [state] CFI Enabled
4,398,037 UART: [aliasrt :skip pcr extension
4,398,510 UART: [art] Extend RT PCRs Done
4,398,938 UART: [art] Lock RT PCRs Done
4,399,985 UART: [art] Populate DV Done
4,408,257 UART: [fht] FMC Alias Private Key: 7
4,409,303 UART: [art] Derive CDI
4,409,583 UART: [art] Store in in slot 0x4
4,494,628 UART: [art] Derive Key Pair
4,494,988 UART: [art] Store priv key in slot 0x5
4,508,084 UART: [art] Derive Key Pair - Done
4,522,899 UART: [art] Signing Cert with AUTHO
4,523,379 UART: RITY.KEYID = 7
4,538,459 UART: [art] Erasing AUTHORITY.KEYID = 7
4,539,224 UART: [art] PUB.X = B9F7AE8D3112ABAE8747D35E646C1962E1288D7FF2979A6B5170EB5372BDD66250636B38E93D39CA1594AB97D573E251
4,545,996 UART: [art] PUB.Y = 380D6332E5162A1162370250F5E6EB60283D00AE76311D43DEF80CEF494F8AB8E8C3A5C632CC487F9F6562D4234948C4
4,552,913 UART: [art] SIG.R = BB245065424F9180B6D61F095C0A5B29BD3A09902064A5758C7A2B75EDA7B430BBF3A2F535EC8216C6F621BE60B822B5
4,559,678 UART: [art] SIG.S = 5FC8ED0ED259A7A9556C3979295F43454CAEB6232843CA634756AEDA1224D69526A7A21D90C5E872367499B69A0E1E98
4,583,805 UART: Caliptra RT
4,584,058 UART: [state] CFI Enabled
4,866,367 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,647 ready_for_fw is high
1,056,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,647,886 >>> mbox cmd response: success
2,710,015 UART:
2,710,031 UART: Running Caliptra FMC ...
2,710,439 UART:
2,710,493 UART: [state] CFI Enabled
2,720,822 UART: [fht] FMC Alias Private Key: 7
2,828,925 UART: [art] Extend RT PCRs Done
2,829,353 UART: [art] Lock RT PCRs Done
2,830,799 UART: [art] Populate DV Done
2,839,035 UART: [fht] FMC Alias Private Key: 7
2,840,123 UART: [art] Derive CDI
2,840,403 UART: [art] Store in in slot 0x4
2,926,470 UART: [art] Derive Key Pair
2,926,830 UART: [art] Store priv key in slot 0x5
2,940,368 UART: [art] Derive Key Pair - Done
2,954,996 UART: [art] Signing Cert with AUTHO
2,955,476 UART: RITY.KEYID = 7
2,970,846 UART: [art] Erasing AUTHORITY.KEYID = 7
2,971,611 UART: [art] PUB.X = 0B4A8FDDBFC4B33167A6A895450A37D1F60F8186FF9E606FD685E8328E74545B2DA9C9B57F2ACEADAE6C7D48EF6F9589
2,978,390 UART: [art] PUB.Y = FDE1BE0439042BF97F66B69C36BA2CF25F54E9D96C813C9470E8ABDD193F488454015C125A5B612D39AB10D96F8B1126
2,985,337 UART: [art] SIG.R = 243B197BD2287BC532238C49C78D25C680C5A05EAC3E35E01915D8BA6C7DE4454B1942DF0AD0CEAC616F3F418654088B
2,992,107 UART: [art] SIG.S = 50BBFDA1468A48848B97079E9BB51430854BB9AF1591E361FC70DA43A3B97ACE40E625B8674790BB8A786C96913CB2F0
3,015,987 UART: Caliptra RT
3,016,240 UART: [state] CFI Enabled
3,123,286 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,101,932 UART:
4,101,948 UART: Running Caliptra FMC ...
4,102,356 UART:
4,102,410 UART: [state] CFI Enabled
4,103,477 UART: [aliasrt :skip pcr extension
4,103,950 UART: [art] Extend RT PCRs Done
4,104,378 UART: [art] Lock RT PCRs Done
4,105,669 UART: [art] Populate DV Done
4,113,937 UART: [fht] FMC Alias Private Key: 7
4,115,051 UART: [art] Derive CDI
4,115,331 UART: [art] Store in in slot 0x4
4,200,764 UART: [art] Derive Key Pair
4,201,124 UART: [art] Store priv key in slot 0x5
4,214,030 UART: [art] Derive Key Pair - Done
4,228,580 UART: [art] Signing Cert with AUTHO
4,229,060 UART: RITY.KEYID = 7
4,244,552 UART: [art] Erasing AUTHORITY.KEYID = 7
4,245,317 UART: [art] PUB.X = 0B4A8FDDBFC4B33167A6A895450A37D1F60F8186FF9E606FD685E8328E74545B2DA9C9B57F2ACEADAE6C7D48EF6F9589
4,252,096 UART: [art] PUB.Y = FDE1BE0439042BF97F66B69C36BA2CF25F54E9D96C813C9470E8ABDD193F488454015C125A5B612D39AB10D96F8B1126
4,259,043 UART: [art] SIG.R = 243B197BD2287BC532238C49C78D25C680C5A05EAC3E35E01915D8BA6C7DE4454B1942DF0AD0CEAC616F3F418654088B
4,265,813 UART: [art] SIG.S = 50BBFDA1468A48848B97079E9BB51430854BB9AF1591E361FC70DA43A3B97ACE40E625B8674790BB8A786C96913CB2F0
4,289,393 UART: Caliptra RT
4,289,646 UART: [state] CFI Enabled
4,573,600 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Production
85,576 UART: [state] DebugLocked = Yes
86,222 UART: [state] Starting the WD Timer 40000000 cycles
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,426 UART: [kat] ++
895,578 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,705 UART: [kat] SHA2-512-ACC
906,606 UART: [kat] ECC-384
916,641 UART: [kat] HMAC-384Kdf
921,185 UART: [kat] LMS
1,169,497 UART: [kat] --
1,170,398 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,174,727 ready_for_fw is high
1,174,727 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,294 UART: [idev] Erasing UDS.KEYID = 0
1,199,755 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,711 UART: [ldev] ++
1,209,879 UART: [ldev] CDI.KEYID = 6
1,210,243 UART: [ldev] SUBJECT.KEYID = 5
1,210,670 UART: [ldev] AUTHORITY.KEYID = 7
1,211,133 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,243,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,318 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,012 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,882 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,588 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,510 UART: [ldev] --
1,282,828 UART: [fwproc] Wait for Commands...
1,283,463 UART: [fwproc] Recv command 0x46574c44
1,284,196 UART: [fwproc] Recv'd Img size: 114168 bytes
2,605,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,632,671 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,661,980 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,797,521 >>> mbox cmd response: success
2,798,597 UART: [afmc] ++
2,798,765 UART: [afmc] CDI.KEYID = 6
2,799,128 UART: [afmc] SUBJECT.KEYID = 7
2,799,554 UART: [afmc] AUTHORITY.KEYID = 5
2,835,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,851,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,852,202 UART: [afmc] PUB.X = F68D4FF029BD9C454A97882E5DCDBD8AE5515930158821BC3C39A7184EAFFE3D9F0B262D6EFA93A914F4CFB80EAF1B39
2,857,921 UART: [afmc] PUB.Y = 59F974D7CA60A92484EBBF82192B7A0DBD05EF2006C83740439DACA3FF42342DD35B8E3ECCDE1E818CAC6C50336FCDBE
2,863,814 UART: [afmc] SIG.R = 69A4F41882384743D4142952762463570FCED1A3B0AABA47DD690826FB664FEF5E1D5EABFE4FC07EB83E07DEB5793016
2,869,521 UART: [afmc] SIG.S = 7AC1A3B9A7B45C463ED37A9E9ED9BFC70445CA184D8302515C5F811BD96B93963088DA56B4AAD0129BACB66870C4DBD8
2,877,182 UART: [afmc] --
2,878,109 UART: [cold-reset] --
2,878,807 UART: [state] Locking Datavault
2,879,804 UART: [state] Locking PCR0, PCR1 and PCR31
2,880,408 UART: [state] Locking ICCM
2,880,996 UART: [exit] Launching FMC @ 0x40000130
2,886,325 UART:
2,886,341 UART: Running Caliptra FMC ...
2,886,749 UART:
2,886,892 UART: [state] CFI Enabled
2,897,473 UART: [fht] FMC Alias Private Key: 7
3,004,866 UART: [art] Extend RT PCRs Done
3,005,294 UART: [art] Lock RT PCRs Done
3,006,944 UART: [art] Populate DV Done
3,015,364 UART: [fht] FMC Alias Private Key: 7
3,016,512 UART: [art] Derive CDI
3,016,792 UART: [art] Store in in slot 0x4
3,101,981 UART: [art] Derive Key Pair
3,102,341 UART: [art] Store priv key in slot 0x5
3,115,583 UART: [art] Derive Key Pair - Done
3,130,397 UART: [art] Signing Cert with AUTHO
3,130,877 UART: RITY.KEYID = 7
3,145,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,146,658 UART: [art] PUB.X = 376D9884CBF784D65C8ECCD9FE139F12E65183C68AA69AA2C44D6E266D891A3D563888817DDCCB8DCC0858E6B1A6EC9C
3,153,441 UART: [art] PUB.Y = 76A9B97C2739CF49B0627C3D9597502ED535ABF1FC4C5E6789DAAB8CE1559F7181ACC2A26D2AC58192D906F984B33C65
3,160,396 UART: [art] SIG.R = D73730D12B6BD911D972D42AC415134792995E8BB6283DF32D1C585DCC7F62FF79F28F7660DC823B4E54A1E429A80A82
3,167,165 UART: [art] SIG.S = 470915E9B0F854F58C79924D8EF911AEF62487C99946B6271FF0B06F1F28308329669D3587D33E2F1E37CE7CBE6C11B1
3,191,125 UART: Caliptra RT
3,191,470 UART: [state] CFI Enabled
3,299,403 UART: [rt] RT listening for mailbox commands...
Initializing fuses
3,300,159 UART:
3,300,175 UART: Running Caliptra ROM ...
3,300,583 UART:
3,300,725 UART: [state] CFI Enabled
3,303,106 UART: [state] LifecycleState = Production
3,303,714 UART: [state] DebugLocked = Yes
3,304,352 UART: [state] Starting the WD Timer 40000000 cycles
3,305,825 UART: [kat] SHA2-256
4,109,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,113,504 UART: [kat] ++
4,113,656 UART: [kat] sha1
4,117,890 UART: [kat] SHA2-256
4,119,830 UART: [kat] SHA2-384
4,122,577 UART: [kat] SHA2-512-ACC
4,124,478 UART: [kat] ECC-384
4,134,521 UART: [kat] HMAC-384Kdf
4,138,953 UART: [kat] LMS
4,387,265 UART: [kat] --
4,388,177 UART: [warm-reset] ++
4,389,086 UART: [warm-reset] --
4,390,011 UART: [state] Locking Datavault
4,390,783 UART: [state] Locking PCR0, PCR1 and PCR31
4,391,387 UART: [state] Locking ICCM
4,391,965 UART: [exit] Launching FMC @ 0x40000130
4,397,294 UART:
4,397,310 UART: Running Caliptra FMC ...
4,397,718 UART:
4,397,861 UART: [state] CFI Enabled
4,399,336 UART: [aliasrt :skip pcr extension
4,399,809 UART: [art] Extend RT PCRs Done
4,400,237 UART: [art] Lock RT PCRs Done
4,401,390 UART: [art] Populate DV Done
4,409,678 UART: [fht] FMC Alias Private Key: 7
4,410,840 UART: [art] Derive CDI
4,411,120 UART: [art] Store in in slot 0x4
4,496,887 UART: [art] Derive Key Pair
4,497,247 UART: [art] Store priv key in slot 0x5
4,510,773 UART: [art] Derive Key Pair - Done
4,525,731 UART: [art] Signing Cert with AUTHO
4,526,211 UART: RITY.KEYID = 7
4,541,317 UART: [art] Erasing AUTHORITY.KEYID = 7
4,542,082 UART: [art] PUB.X = 376D9884CBF784D65C8ECCD9FE139F12E65183C68AA69AA2C44D6E266D891A3D563888817DDCCB8DCC0858E6B1A6EC9C
4,548,865 UART: [art] PUB.Y = 76A9B97C2739CF49B0627C3D9597502ED535ABF1FC4C5E6789DAAB8CE1559F7181ACC2A26D2AC58192D906F984B33C65
4,555,820 UART: [art] SIG.R = D73730D12B6BD911D972D42AC415134792995E8BB6283DF32D1C585DCC7F62FF79F28F7660DC823B4E54A1E429A80A82
4,562,589 UART: [art] SIG.S = 470915E9B0F854F58C79924D8EF911AEF62487C99946B6271FF0B06F1F28308329669D3587D33E2F1E37CE7CBE6C11B1
4,586,443 UART: Caliptra RT
4,586,788 UART: [state] CFI Enabled
4,870,483 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,398 ready_for_fw is high
1,056,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,389 >>> mbox cmd response: success
2,709,194 UART:
2,709,210 UART: Running Caliptra FMC ...
2,709,618 UART:
2,709,761 UART: [state] CFI Enabled
2,720,564 UART: [fht] FMC Alias Private Key: 7
2,828,181 UART: [art] Extend RT PCRs Done
2,828,609 UART: [art] Lock RT PCRs Done
2,830,381 UART: [art] Populate DV Done
2,838,857 UART: [fht] FMC Alias Private Key: 7
2,839,791 UART: [art] Derive CDI
2,840,071 UART: [art] Store in in slot 0x4
2,926,020 UART: [art] Derive Key Pair
2,926,380 UART: [art] Store priv key in slot 0x5
2,939,622 UART: [art] Derive Key Pair - Done
2,954,525 UART: [art] Signing Cert with AUTHO
2,955,005 UART: RITY.KEYID = 7
2,970,083 UART: [art] Erasing AUTHORITY.KEYID = 7
2,970,848 UART: [art] PUB.X = F19032A08E390E02FA980C2DBFA4DEF9050622A57D127ABC0179379C747600B20D89782E4B384C68DEF67EAAB8176B33
2,977,579 UART: [art] PUB.Y = B7E830C54AAD0A717264730DEABF23CC1CE066A02CC92EBAD626657E7BCBE2807E988F9C1273DB6B37A6050F83B1095C
2,984,528 UART: [art] SIG.R = 6AB8B3C668813B67ED17C9362512270E20A767310D7DEC9159DC19E1E5010CECC24525B4A4F892225EC4A0255567CC78
2,991,284 UART: [art] SIG.S = E2FD0AEB5BD201265D9719307D39F2EF956BE4218ECC4CC6101837A7AC7F9C0FB092AA3007E0554B56131CE3DFF6F35C
3,015,277 UART: Caliptra RT
3,015,622 UART: [state] CFI Enabled
3,123,689 UART: [rt] RT listening for mailbox commands...
Initializing fuses
4,102,868 UART:
4,102,884 UART: Running Caliptra FMC ...
4,103,292 UART:
4,103,435 UART: [state] CFI Enabled
4,104,792 UART: [aliasrt :skip pcr extension
4,105,265 UART: [art] Extend RT PCRs Done
4,105,693 UART: [art] Lock RT PCRs Done
4,106,872 UART: [art] Populate DV Done
4,115,132 UART: [fht] FMC Alias Private Key: 7
4,116,136 UART: [art] Derive CDI
4,116,416 UART: [art] Store in in slot 0x4
4,202,189 UART: [art] Derive Key Pair
4,202,549 UART: [art] Store priv key in slot 0x5
4,215,569 UART: [art] Derive Key Pair - Done
4,230,574 UART: [art] Signing Cert with AUTHO
4,231,054 UART: RITY.KEYID = 7
4,246,148 UART: [art] Erasing AUTHORITY.KEYID = 7
4,246,913 UART: [art] PUB.X = F19032A08E390E02FA980C2DBFA4DEF9050622A57D127ABC0179379C747600B20D89782E4B384C68DEF67EAAB8176B33
4,253,644 UART: [art] PUB.Y = B7E830C54AAD0A717264730DEABF23CC1CE066A02CC92EBAD626657E7BCBE2807E988F9C1273DB6B37A6050F83B1095C
4,260,593 UART: [art] SIG.R = 6AB8B3C668813B67ED17C9362512270E20A767310D7DEC9159DC19E1E5010CECC24525B4A4F892225EC4A0255567CC78
4,267,349 UART: [art] SIG.S = E2FD0AEB5BD201265D9719307D39F2EF956BE4218ECC4CC6101837A7AC7F9C0FB092AA3007E0554B56131CE3DFF6F35C
4,291,328 UART: Caliptra RT
4,291,673 UART: [state] CFI Enabled
4,576,628 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
192,114 UART:
192,472 UART: Running Caliptra ROM ...
193,591 UART:
193,736 UART: [state] CFI Enabled
266,650 UART: [state] LifecycleState = Production
268,484 UART: [state] DebugLocked = Yes
270,193 UART: [state] Starting the Watchdog Timer 40000000 cycles
275,625 UART: [kat] SHA2-256
445,341 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,805 UART: [kat] ++
456,355 UART: [kat] sha1
467,493 UART: [kat] SHA2-256
470,165 UART: [kat] SHA2-384
477,219 UART: [kat] SHA2-512-ACC
479,567 UART: [kat] ECC-384
2,767,397 UART: [kat] HMAC-384Kdf
2,798,901 UART: [kat] LMS
3,989,203 UART: [kat] --
3,993,695 UART: [cold-reset] ++
3,995,617 UART: [fht] Storing FHT @ 0x50003400
4,007,345 UART: [idev] ++
4,007,913 UART: [idev] CDI.KEYID = 6
4,008,999 UART: [idev] SUBJECT.KEYID = 7
4,010,113 UART: [idev] UDS.KEYID = 0
Initializing fuses
865 UART: [idev] Erasing UDS.KEYID = 0
2,227 UART:
2,393 UART: Running Caliptra ROM ...
3,495 UART:
3,646 UART: [state] CFI Enabled
74,142 UART: [state] LifecycleState = Production
75,964 UART: [state] DebugLocked = Yes
77,976 UART: [state] Starting the Watchdog Timer 40000000 cycles
83,682 UART: [kat] SHA2-256
253,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
263,911 UART: [kat] ++
264,613 UART: [kat] sha1
276,695 UART: [kat] SHA2-256
279,374 UART: [kat] SHA2-384
285,560 UART: [kat] SHA2-512-ACC
287,948 UART: [kat] ECC-384
2,579,491 UART: [kat] HMAC-384Kdf
2,610,584 UART: [kat] LMS
3,800,897 UART: [kat] --
3,803,946 UART: [warm-reset] ++
3,804,793 UART: [warm-reset] Previous Cold-Reset was not successful.
3,809,137 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
191,864 UART:
192,227 UART: Running Caliptra ROM ...
193,401 UART:
603,234 UART: [state] CFI Enabled
619,015 UART: [state] LifecycleState = Production
620,803 UART: [state] DebugLocked = Yes
622,196 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,084 UART: [kat] SHA2-256
797,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,406 UART: [kat] ++
808,871 UART: [kat] sha1
819,880 UART: [kat] SHA2-256
822,547 UART: [kat] SHA2-384
827,200 UART: [kat] SHA2-512-ACC
829,551 UART: [kat] ECC-384
3,115,147 UART: [kat] HMAC-384Kdf
3,126,695 UART: [kat] LMS
4,316,826 UART: [kat] --
4,320,187 UART: [cold-reset] ++
4,322,263 UART: [fht] Storing FHT @ 0x50003400
4,334,045 UART: [idev] ++
4,334,669 UART: [idev] CDI.KEYID = 6
4,335,592 UART: [idev] SUBJECT.KEYID = 7
4,336,843 UART: [idev] UDS.KEYID = 0
Initializing fuses
890 UART: [idev] Erasing UDS.KEYID = 0
2,272 UART:
2,439 UART: Running Caliptra ROM ...
3,536 UART:
15,980,313 UART: [state] CFI Enabled
15,994,426 UART: [state] LifecycleState = Production
15,996,244 UART: [state] DebugLocked = Yes
15,998,095 UART: [state] Starting the Watchdog Timer 40000000 cycles
16,002,765 UART: [kat] SHA2-256
16,172,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,183,093 UART: [kat] ++
16,183,633 UART: [kat] sha1
16,195,319 UART: [kat] SHA2-256
16,198,046 UART: [kat] SHA2-384
16,203,281 UART: [kat] SHA2-512-ACC
16,205,685 UART: [kat] ECC-384
18,488,967 UART: [kat] HMAC-384Kdf
18,500,325 UART: [kat] LMS
19,690,425 UART: [kat] --
19,695,817 UART: [warm-reset] ++
19,696,657 UART: [warm-reset] Previous Cold-Reset was not successful.
19,702,687 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,037 UART:
192,405 UART: Running Caliptra ROM ...
193,581 UART:
193,730 UART: [state] CFI Enabled
265,232 UART: [state] LifecycleState = Production
266,988 UART: [state] DebugLocked = Yes
268,232 UART: [state] Starting the WD Timer 40000000 cycles
273,856 UART: [kat] SHA2-256
452,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,584 UART: [kat] ++
465,110 UART: [kat] sha1
476,814 UART: [kat] SHA2-256
479,848 UART: [kat] SHA2-384
484,882 UART: [kat] SHA2-512-ACC
487,845 UART: [kat] ECC-384
2,949,921 UART: [kat] HMAC-384Kdf
2,973,770 UART: [kat] LMS
3,503,236 UART: [kat] --
3,507,343 UART: [cold-reset] ++
3,508,391 UART: [fht] FHT @ 0x50003400
3,519,421 UART: [idev] ++
3,519,988 UART: [idev] CDI.KEYID = 6
3,520,945 UART: [idev] SUBJECT.KEYID = 7
3,522,152 UART: [idev] UDS.KEYID = 0
Initializing fuses
869 UART: [idev] Erasing UDS.KEYID = 0
2,148 UART:
2,365 UART: Running Caliptra ROM ...
3,488 UART:
3,641 UART: [state] CFI Enabled
73,264 UART: [state] LifecycleState = Production
75,022 UART: [state] DebugLocked = Yes
76,795 UART: [state] Starting the WD Timer 40000000 cycles
81,902 UART: [kat] SHA2-256
261,042 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
272,603 UART: [kat] ++
273,102 UART: [kat] sha1
284,564 UART: [kat] SHA2-256
287,574 UART: [kat] SHA2-384
295,222 UART: [kat] SHA2-512-ACC
298,195 UART: [kat] ECC-384
2,756,369 UART: [kat] HMAC-384Kdf
2,779,820 UART: [kat] LMS
3,309,298 UART: [kat] --
3,314,592 UART: [warm-reset] ++
3,315,393 UART: [warm-reset] Prev Cold-Reset failed
3,318,874 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,635 writing to cptra_bootfsm_go
192,232 UART:
192,625 UART: Running Caliptra ROM ...
193,921 UART:
603,427 UART: [state] CFI Enabled
615,279 UART: [state] LifecycleState = Production
617,021 UART: [state] DebugLocked = Yes
618,979 UART: [state] Starting the WD Timer 40000000 cycles
624,400 UART: [kat] SHA2-256
803,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,097 UART: [kat] ++
815,647 UART: [kat] sha1
826,235 UART: [kat] SHA2-256
829,271 UART: [kat] SHA2-384
836,481 UART: [kat] SHA2-512-ACC
839,444 UART: [kat] ECC-384
3,279,766 UART: [kat] HMAC-384Kdf
3,292,593 UART: [kat] LMS
3,822,131 UART: [kat] --
3,826,493 UART: [cold-reset] ++
3,827,793 UART: [fht] FHT @ 0x50003400
3,838,564 UART: [idev] ++
3,839,124 UART: [idev] CDI.KEYID = 6
3,840,086 UART: [idev] SUBJECT.KEYID = 7
3,841,239 UART: [idev] UDS.KEYID = 0
Initializing fuses
895 UART: [idev] Erasing UDS.KEYID = 0
2,180 UART:
2,405 UART: Running Caliptra ROM ...
3,510 UART:
16,480,919 UART: [state] CFI Enabled
16,495,373 UART: [state] LifecycleState = Production
16,497,163 UART: [state] DebugLocked = Yes
16,499,997 UART: [state] Starting the WD Timer 40000000 cycles
16,504,621 UART: [kat] SHA2-256
16,683,749 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
16,695,335 UART: [kat] ++
16,695,876 UART: [kat] sha1
16,706,820 UART: [kat] SHA2-256
16,709,834 UART: [kat] SHA2-384
16,715,770 UART: [kat] SHA2-512-ACC
16,718,729 UART: [kat] ECC-384
19,159,861 UART: [kat] HMAC-384Kdf
19,173,322 UART: [kat] LMS
19,702,884 UART: [kat] --
19,705,921 UART: [warm-reset] ++
19,706,713 UART: [warm-reset] Prev Cold-Reset failed
19,710,650 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,675 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,047 UART:
192,411 UART: Running Caliptra ROM ...
193,586 UART:
193,738 UART: [state] CFI Enabled
260,841 UART: [state] LifecycleState = Production
263,069 UART: [state] DebugLocked = Yes
266,062 UART: [state] Starting the WD Timer 40000000 cycles
271,954 UART: [kat] SHA2-256
461,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,587 UART: [kat] ++
473,091 UART: [kat] sha1
483,327 UART: [kat] SHA2-256
486,362 UART: [kat] SHA2-384
493,073 UART: [kat] SHA2-512-ACC
495,691 UART: [kat] ECC-384
2,948,234 UART: [kat] HMAC-384Kdf
2,971,616 UART: [kat] LMS
3,503,396 UART: [kat] --
3,507,098 UART: [cold-reset] ++
3,509,684 UART: [fht] FHT @ 0x50003400
3,520,566 UART: [idev] ++
3,521,278 UART: [idev] CDI.KEYID = 6
3,522,253 UART: [idev] SUBJECT.KEYID = 7
3,523,408 UART: [idev] UDS.KEYID = 0
Initializing fuses
892 UART: [idev] Erasing UDS.KEYID = 0
2,178 UART:
2,424 UART: Running Caliptra ROM ...
3,530 UART:
3,686 UART: [state] CFI Enabled
70,956 UART: [state] LifecycleState = Production
72,793 UART: [state] DebugLocked = Yes
74,150 UART: [state] Starting the WD Timer 40000000 cycles
79,923 UART: [kat] SHA2-256
269,754 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
280,501 UART: [kat] ++
281,084 UART: [kat] sha1
292,301 UART: [kat] SHA2-256
295,309 UART: [kat] SHA2-384
302,314 UART: [kat] SHA2-512-ACC
304,890 UART: [kat] ECC-384
2,753,922 UART: [kat] HMAC-384Kdf
2,779,011 UART: [kat] LMS
3,310,593 UART: [kat] --
3,315,743 UART: [warm-reset] ++
3,316,596 UART: [warm-reset] Prev Cold-Reset failed
3,320,045 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
192,402 UART:
192,758 UART: Running Caliptra ROM ...
193,843 UART:
603,751 UART: [state] CFI Enabled
615,773 UART: [state] LifecycleState = Production
618,004 UART: [state] DebugLocked = Yes
619,513 UART: [state] Starting the WD Timer 40000000 cycles
624,520 UART: [kat] SHA2-256
814,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,240 UART: [kat] ++
825,818 UART: [kat] sha1
836,089 UART: [kat] SHA2-256
839,118 UART: [kat] SHA2-384
845,561 UART: [kat] SHA2-512-ACC
848,148 UART: [kat] ECC-384
3,289,363 UART: [kat] HMAC-384Kdf
3,301,364 UART: [kat] LMS
3,833,190 UART: [kat] --
3,838,058 UART: [cold-reset] ++
3,840,334 UART: [fht] FHT @ 0x50003400
3,850,496 UART: [idev] ++
3,851,158 UART: [idev] CDI.KEYID = 6
3,852,114 UART: [idev] SUBJECT.KEYID = 7
3,853,317 UART: [idev] UDS.KEYID = 0
Initializing fuses
877 UART: [idev] Erasing UDS.KEYID = 0
2,168 UART:
2,407 UART: Running Caliptra ROM ...
3,516 UART:
16,471,498 UART: [state] CFI Enabled
16,484,790 UART: [state] LifecycleState = Production
16,486,542 UART: [state] DebugLocked = Yes
16,489,418 UART: [state] Starting the WD Timer 40000000 cycles
16,495,353 UART: [kat] SHA2-256
16,685,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
16,696,152 UART: [kat] ++
16,696,702 UART: [kat] sha1
16,708,512 UART: [kat] SHA2-256
16,711,527 UART: [kat] SHA2-384
16,717,461 UART: [kat] SHA2-512-ACC
16,720,030 UART: [kat] ECC-384
19,158,713 UART: [kat] HMAC-384Kdf
19,171,133 UART: [kat] LMS
19,702,609 UART: [kat] --
19,708,706 UART: [warm-reset] ++
19,709,572 UART: [warm-reset] Prev Cold-Reset failed
19,712,972 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,667 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Production
85,953 UART: [state] DebugLocked = Yes
86,561 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,191 UART: [kat] SHA2-256
882,122 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,237 UART: [kat] ++
886,389 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
902,506 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,251 UART: [cold-reset] ++
1,476,624 UART: [fht] Storing FHT @ 0x50003400
1,479,473 UART: [idev] ++
1,479,641 UART: [idev] CDI.KEYID = 6
1,480,001 UART: [idev] SUBJECT.KEYID = 7
1,480,425 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,480,866 UART:
1,480,882 UART: Running Caliptra ROM ...
1,481,290 UART:
1,481,344 UART: [state] CFI Enabled
1,484,197 UART: [state] LifecycleState = Production
1,484,805 UART: [state] DebugLocked = Yes
1,485,465 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,119 UART: [kat] SHA2-256
2,281,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,165 UART: [kat] ++
2,285,317 UART: [kat] sha1
2,289,491 UART: [kat] SHA2-256
2,291,429 UART: [kat] SHA2-384
2,294,184 UART: [kat] SHA2-512-ACC
2,296,085 UART: [kat] ECC-384
2,302,078 UART: [kat] HMAC-384Kdf
2,306,712 UART: [kat] LMS
2,874,908 UART: [kat] --
2,875,442 UART: [warm-reset] ++
2,875,713 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,016 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Production
85,988 UART: [state] DebugLocked = Yes
86,572 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,254 UART: [kat] SHA2-256
882,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,300 UART: [kat] ++
886,452 UART: [kat] sha1
890,706 UART: [kat] SHA2-256
892,644 UART: [kat] SHA2-384
895,465 UART: [kat] SHA2-512-ACC
897,366 UART: [kat] ECC-384
902,695 UART: [kat] HMAC-384Kdf
907,301 UART: [kat] LMS
1,475,497 UART: [kat] --
1,476,160 UART: [cold-reset] ++
1,476,709 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,480,907 UART:
1,480,923 UART: Running Caliptra ROM ...
1,481,331 UART:
1,481,472 UART: [state] CFI Enabled
1,484,447 UART: [state] LifecycleState = Production
1,485,055 UART: [state] DebugLocked = Yes
1,485,807 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,567 UART: [kat] SHA2-256
2,281,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,613 UART: [kat] ++
2,285,765 UART: [kat] sha1
2,289,799 UART: [kat] SHA2-256
2,291,737 UART: [kat] SHA2-384
2,294,510 UART: [kat] SHA2-512-ACC
2,296,411 UART: [kat] ECC-384
2,301,910 UART: [kat] HMAC-384Kdf
2,306,638 UART: [kat] LMS
2,874,834 UART: [kat] --
2,875,838 UART: [warm-reset] ++
2,876,109 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,412 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Production
85,785 UART: [state] DebugLocked = Yes
86,295 UART: [state] Starting the WD Timer 40000000 cycles
87,918 UART: [kat] SHA2-256
893,568 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,693 UART: [kat] ++
897,845 UART: [kat] sha1
901,979 UART: [kat] SHA2-256
903,919 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
917,784 UART: [kat] HMAC-384Kdf
922,262 UART: [kat] LMS
1,170,590 UART: [kat] --
1,171,437 UART: [cold-reset] ++
1,171,960 UART: [fht] FHT @ 0x50003400
1,174,587 UART: [idev] ++
1,174,755 UART: [idev] CDI.KEYID = 6
1,175,115 UART: [idev] SUBJECT.KEYID = 7
1,175,539 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,977 UART:
1,175,993 UART: Running Caliptra ROM ...
1,176,401 UART:
1,176,456 UART: [state] CFI Enabled
1,178,777 UART: [state] LifecycleState = Production
1,179,385 UART: [state] DebugLocked = Yes
1,179,975 UART: [state] Starting the WD Timer 40000000 cycles
1,181,480 UART: [kat] SHA2-256
1,987,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,991,255 UART: [kat] ++
1,991,407 UART: [kat] sha1
1,995,561 UART: [kat] SHA2-256
1,997,501 UART: [kat] SHA2-384
2,000,176 UART: [kat] SHA2-512-ACC
2,002,077 UART: [kat] ECC-384
2,011,860 UART: [kat] HMAC-384Kdf
2,016,632 UART: [kat] LMS
2,264,960 UART: [kat] --
2,265,752 UART: [warm-reset] ++
2,266,023 UART: [warm-reset] Prev Cold-Reset failed
2,267,006 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Production
85,712 UART: [state] DebugLocked = Yes
86,340 UART: [state] Starting the WD Timer 40000000 cycles
88,011 UART: [kat] SHA2-256
893,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,786 UART: [kat] ++
897,938 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,397 UART: [kat] HMAC-384Kdf
923,079 UART: [kat] LMS
1,171,407 UART: [kat] --
1,172,232 UART: [cold-reset] ++
1,172,765 UART: [fht] FHT @ 0x50003400
1,175,350 UART: [idev] ++
1,175,518 UART: [idev] CDI.KEYID = 6
1,175,878 UART: [idev] SUBJECT.KEYID = 7
1,176,302 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,176,740 UART:
1,176,756 UART: Running Caliptra ROM ...
1,177,164 UART:
1,177,306 UART: [state] CFI Enabled
1,180,727 UART: [state] LifecycleState = Production
1,181,335 UART: [state] DebugLocked = Yes
1,181,965 UART: [state] Starting the WD Timer 40000000 cycles
1,183,580 UART: [kat] SHA2-256
1,989,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,355 UART: [kat] ++
1,993,507 UART: [kat] sha1
1,997,771 UART: [kat] SHA2-256
1,999,711 UART: [kat] SHA2-384
2,002,246 UART: [kat] SHA2-512-ACC
2,004,147 UART: [kat] ECC-384
2,013,982 UART: [kat] HMAC-384Kdf
2,018,746 UART: [kat] LMS
2,267,074 UART: [kat] --
2,268,010 UART: [warm-reset] ++
2,268,281 UART: [warm-reset] Prev Cold-Reset failed
2,269,392 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Production
85,731 UART: [state] DebugLocked = Yes
86,353 UART: [state] Starting the WD Timer 40000000 cycles
88,064 UART: [kat] SHA2-256
891,614 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,434 UART: [kat] LMS
1,168,746 UART: [kat] --
1,169,651 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,716 UART: [idev] ++
1,172,884 UART: [idev] CDI.KEYID = 6
1,173,245 UART: [idev] SUBJECT.KEYID = 7
1,173,670 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,174,109 UART:
1,174,125 UART: Running Caliptra ROM ...
1,174,533 UART:
1,174,588 UART: [state] CFI Enabled
1,177,561 UART: [state] LifecycleState = Production
1,178,169 UART: [state] DebugLocked = Yes
1,178,921 UART: [state] Starting the WD Timer 40000000 cycles
1,180,462 UART: [kat] SHA2-256
1,984,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,141 UART: [kat] ++
1,988,293 UART: [kat] sha1
1,992,449 UART: [kat] SHA2-256
1,994,389 UART: [kat] SHA2-384
1,997,114 UART: [kat] SHA2-512-ACC
1,999,015 UART: [kat] ECC-384
2,008,408 UART: [kat] HMAC-384Kdf
2,012,846 UART: [kat] LMS
2,261,158 UART: [kat] --
2,262,036 UART: [warm-reset] ++
2,262,304 UART: [warm-reset] Prev Cold-Reset failed
2,263,097 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Production
86,142 UART: [state] DebugLocked = Yes
86,818 UART: [state] Starting the WD Timer 40000000 cycles
88,345 UART: [kat] SHA2-256
891,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,024 UART: [kat] ++
896,176 UART: [kat] sha1
900,478 UART: [kat] SHA2-256
902,418 UART: [kat] SHA2-384
905,189 UART: [kat] SHA2-512-ACC
907,090 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,361 UART: [kat] LMS
1,169,673 UART: [kat] --
1,170,510 UART: [cold-reset] ++
1,171,063 UART: [fht] FHT @ 0x50003400
1,173,837 UART: [idev] ++
1,174,005 UART: [idev] CDI.KEYID = 6
1,174,366 UART: [idev] SUBJECT.KEYID = 7
1,174,791 UART: [idev] UDS.KEYID = 0
Initializing fuses
1,175,230 UART:
1,175,246 UART: Running Caliptra ROM ...
1,175,654 UART:
1,175,796 UART: [state] CFI Enabled
1,178,329 UART: [state] LifecycleState = Production
1,178,937 UART: [state] DebugLocked = Yes
1,179,509 UART: [state] Starting the WD Timer 40000000 cycles
1,181,120 UART: [kat] SHA2-256
1,984,670 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
1,988,799 UART: [kat] ++
1,988,951 UART: [kat] sha1
1,993,009 UART: [kat] SHA2-256
1,994,949 UART: [kat] SHA2-384
1,997,816 UART: [kat] SHA2-512-ACC
1,999,717 UART: [kat] ECC-384
2,009,312 UART: [kat] HMAC-384Kdf
2,013,760 UART: [kat] LMS
2,262,072 UART: [kat] --
2,262,998 UART: [warm-reset] ++
2,263,266 UART: [warm-reset] Prev Cold-Reset failed
2,264,357 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Initializing fuses
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,195 UART:
192,541 UART: Running Caliptra ROM ...
193,599 UART:
193,744 UART: [state] CFI Enabled
262,701 UART: [state] LifecycleState = Unprovisioned
264,651 UART: [state] DebugLocked = No
266,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,933 UART: [kat] SHA2-256
441,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,161 UART: [kat] ++
452,627 UART: [kat] sha1
463,874 UART: [kat] SHA2-256
466,611 UART: [kat] SHA2-384
472,434 UART: [kat] SHA2-512-ACC
474,776 UART: [kat] ECC-384
2,764,882 UART: [kat] HMAC-384Kdf
2,797,005 UART: [kat] LMS
3,987,316 UART: [kat] --
3,992,117 UART: [cold-reset] ++
3,993,834 UART: [fht] Storing FHT @ 0x50003400
4,005,851 UART: [idev] ++
4,006,488 UART: [idev] CDI.KEYID = 6
4,007,406 UART: [idev] SUBJECT.KEYID = 7
4,008,627 UART: [idev] UDS.KEYID = 0
6,584,727 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,728,635 UART: [idev] Erasing UDS.KEYID = 0
7,345,626 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,309 UART: [idev] --
7,372,953 UART: [ldev] ++
7,373,526 UART: [ldev] CDI.KEYID = 6
7,374,510 UART: [ldev] SUBJECT.KEYID = 5
7,375,674 UART: [ldev] AUTHORITY.KEYID = 7
7,376,967 UART: [ldev] FE.KEYID = 1
7,422,527 UART: [ldev] Erasing FE.KEYID = 1
10,751,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,279 UART: [ldev] --
13,129,549 UART: [fwproc] Waiting for Commands...
13,132,898 UART: [fwproc] Received command 0x46574c44
13,135,085 UART: [fwproc] Received Image of size 113844 bytes
17,175,669 UART: ROM Fatal Error: 0x000B0016
17,179,128 >>> mbox cmd response: failed
17,179,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,179,972 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,470 writing to cptra_bootfsm_go
6,390,184 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,158,460 >>> mbox cmd response: failed
17,159,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,159,675 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,414 UART:
192,797 UART: Running Caliptra ROM ...
193,899 UART:
603,593 UART: [state] CFI Enabled
618,532 UART: [state] LifecycleState = Unprovisioned
620,443 UART: [state] DebugLocked = No
623,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,576 UART: [kat] SHA2-256
797,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,905 UART: [kat] ++
808,435 UART: [kat] sha1
819,535 UART: [kat] SHA2-256
822,219 UART: [kat] SHA2-384
828,353 UART: [kat] SHA2-512-ACC
830,733 UART: [kat] ECC-384
3,114,556 UART: [kat] HMAC-384Kdf
3,126,418 UART: [kat] LMS
4,316,533 UART: [kat] --
4,321,408 UART: [cold-reset] ++
4,322,722 UART: [fht] Storing FHT @ 0x50003400
4,335,183 UART: [idev] ++
4,335,748 UART: [idev] CDI.KEYID = 6
4,336,764 UART: [idev] SUBJECT.KEYID = 7
4,337,923 UART: [idev] UDS.KEYID = 0
6,916,521 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
7,060,257 UART: [idev] Erasing UDS.KEYID = 0
7,623,194 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,099 UART: [idev] --
7,649,830 UART: [ldev] ++
7,650,411 UART: [ldev] CDI.KEYID = 6
7,651,355 UART: [ldev] SUBJECT.KEYID = 5
7,652,570 UART: [ldev] AUTHORITY.KEYID = 7
7,653,860 UART: [ldev] FE.KEYID = 1
7,663,454 UART: [ldev] Erasing FE.KEYID = 1
10,947,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,248 UART: [ldev] --
13,308,843 UART: [fwproc] Waiting for Commands...
13,311,516 UART: [fwproc] Received command 0x46574c44
13,313,761 UART: [fwproc] Received Image of size 113844 bytes
17,354,556 UART: ROM Fatal Error: 0x000B0016
17,357,967 >>> mbox cmd response: failed
17,358,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,358,680 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
6,717,039 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,334,240 >>> mbox cmd response: failed
17,334,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,335,215 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,224 UART:
192,631 UART: Running Caliptra ROM ...
193,762 UART:
193,912 UART: [state] CFI Enabled
260,526 UART: [state] LifecycleState = Unprovisioned
262,424 UART: [state] DebugLocked = No
264,891 UART: [state] WD Timer not started. Device not locked for debugging
267,843 UART: [kat] SHA2-256
446,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,533 UART: [kat] ++
459,064 UART: [kat] sha1
470,980 UART: [kat] SHA2-256
473,985 UART: [kat] SHA2-384
479,489 UART: [kat] SHA2-512-ACC
482,422 UART: [kat] ECC-384
2,948,233 UART: [kat] HMAC-384Kdf
2,970,685 UART: [kat] LMS
3,500,183 UART: [kat] --
3,504,845 UART: [cold-reset] ++
3,506,025 UART: [fht] FHT @ 0x50003400
3,517,120 UART: [idev] ++
3,517,689 UART: [idev] CDI.KEYID = 6
3,518,656 UART: [idev] SUBJECT.KEYID = 7
3,519,816 UART: [idev] UDS.KEYID = 0
6,050,568 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,195,300 UART: [idev] Erasing UDS.KEYID = 0
6,196,753 UART: [idev] Sha1 KeyId Algorithm
6,197,957 UART: [idev] --
6,198,490 UART: [ldev] ++
6,198,974 UART: [ldev] CDI.KEYID = 6
6,199,943 UART: [ldev] SUBJECT.KEYID = 5
6,201,057 UART: [ldev] AUTHORITY.KEYID = 7
6,202,257 UART: [ldev] FE.KEYID = 1
6,203,133 UART: [ldev] Erasing FE.KEYID = 1
8,604,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,630 UART: [ldev] --
10,414,546 UART: [fwproc] Wait for Commands...
10,417,461 UART: [fwproc] Recv command 0x46574c44
10,419,660 UART: [fwproc] Recv'd Img size: 114168 bytes
13,812,008 UART: ROM Fatal Error: 0x000B0016
13,815,104 >>> mbox cmd response: failed
13,815,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,815,923 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,300 writing to cptra_bootfsm_go
5,899,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,586,144 >>> mbox cmd response: failed
13,586,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,587,126 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
192,771 UART:
193,129 UART: Running Caliptra ROM ...
194,325 UART:
603,851 UART: [state] CFI Enabled
616,179 UART: [state] LifecycleState = Unprovisioned
618,047 UART: [state] DebugLocked = No
620,130 UART: [state] WD Timer not started. Device not locked for debugging
624,351 UART: [kat] SHA2-256
803,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,057 UART: [kat] ++
815,602 UART: [kat] sha1
826,865 UART: [kat] SHA2-256
829,927 UART: [kat] SHA2-384
835,648 UART: [kat] SHA2-512-ACC
838,583 UART: [kat] ECC-384
3,282,200 UART: [kat] HMAC-384Kdf
3,294,045 UART: [kat] LMS
3,823,585 UART: [kat] --
3,828,657 UART: [cold-reset] ++
3,830,212 UART: [fht] FHT @ 0x50003400
3,841,680 UART: [idev] ++
3,842,249 UART: [idev] CDI.KEYID = 6
3,843,185 UART: [idev] SUBJECT.KEYID = 7
3,844,394 UART: [idev] UDS.KEYID = 0
6,383,753 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,528,453 UART: [idev] Erasing UDS.KEYID = 0
6,529,932 UART: [idev] Sha1 KeyId Algorithm
6,531,088 UART: [idev] --
6,531,594 UART: [ldev] ++
6,532,115 UART: [ldev] CDI.KEYID = 6
6,533,050 UART: [ldev] SUBJECT.KEYID = 5
6,534,167 UART: [ldev] AUTHORITY.KEYID = 7
6,535,267 UART: [ldev] FE.KEYID = 1
6,536,147 UART: [ldev] Erasing FE.KEYID = 1
8,836,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,759 UART: [ldev] --
10,629,142 UART: [fwproc] Wait for Commands...
10,631,154 UART: [fwproc] Recv command 0x46574c44
10,633,252 UART: [fwproc] Recv'd Img size: 114168 bytes
14,032,422 UART: ROM Fatal Error: 0x000B0016
14,035,510 >>> mbox cmd response: failed
14,035,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,036,168 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,016 writing to cptra_bootfsm_go
6,233,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,826,713 >>> mbox cmd response: failed
13,827,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,827,705 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,283 UART:
192,640 UART: Running Caliptra ROM ...
193,794 UART:
193,946 UART: [state] CFI Enabled
264,816 UART: [state] LifecycleState = Unprovisioned
267,219 UART: [state] DebugLocked = No
268,929 UART: [state] WD Timer not started. Device not locked for debugging
274,365 UART: [kat] SHA2-256
464,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,024 UART: [kat] ++
475,562 UART: [kat] sha1
486,394 UART: [kat] SHA2-256
489,402 UART: [kat] SHA2-384
495,325 UART: [kat] SHA2-512-ACC
497,890 UART: [kat] ECC-384
2,947,681 UART: [kat] HMAC-384Kdf
2,971,733 UART: [kat] LMS
3,503,503 UART: [kat] --
3,508,646 UART: [cold-reset] ++
3,509,707 UART: [fht] FHT @ 0x50003400
3,521,630 UART: [idev] ++
3,522,328 UART: [idev] CDI.KEYID = 6
3,523,348 UART: [idev] SUBJECT.KEYID = 7
3,524,450 UART: [idev] UDS.KEYID = 0
6,101,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,246,010 UART: [idev] Erasing UDS.KEYID = 0
6,247,470 UART: [idev] Sha1 KeyId Algorithm
6,248,714 UART: [idev] --
6,249,209 UART: [ldev] ++
6,249,695 UART: [ldev] CDI.KEYID = 6
6,250,601 UART: [ldev] SUBJECT.KEYID = 5
6,251,664 UART: [ldev] AUTHORITY.KEYID = 7
6,252,846 UART: [ldev] FE.KEYID = 1
6,253,714 UART: [ldev] Erasing FE.KEYID = 1
8,605,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,600 UART: [ldev] --
10,416,551 UART: [fwproc] Wait for Commands...
10,418,275 UART: [fwproc] Recv command 0x46574c44
10,420,544 UART: [fwproc] Recv'd Img size: 114168 bytes
13,854,661 UART: ROM Fatal Error: 0x000B0016
13,858,351 >>> mbox cmd response: failed
13,858,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,859,113 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
6,015,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,854 >>> mbox cmd response: failed
14,270,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,271,062 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,486 UART:
192,845 UART: Running Caliptra ROM ...
193,920 UART:
603,742 UART: [state] CFI Enabled
614,809 UART: [state] LifecycleState = Unprovisioned
617,157 UART: [state] DebugLocked = No
619,233 UART: [state] WD Timer not started. Device not locked for debugging
623,645 UART: [kat] SHA2-256
813,550 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,303 UART: [kat] ++
825,019 UART: [kat] sha1
835,102 UART: [kat] SHA2-256
838,146 UART: [kat] SHA2-384
844,452 UART: [kat] SHA2-512-ACC
847,065 UART: [kat] ECC-384
3,290,805 UART: [kat] HMAC-384Kdf
3,302,932 UART: [kat] LMS
3,834,783 UART: [kat] --
3,838,067 UART: [cold-reset] ++
3,840,108 UART: [fht] FHT @ 0x50003400
3,850,659 UART: [idev] ++
3,851,339 UART: [idev] CDI.KEYID = 6
3,852,280 UART: [idev] SUBJECT.KEYID = 7
3,853,497 UART: [idev] UDS.KEYID = 0
6,436,907 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,581,025 UART: [idev] Erasing UDS.KEYID = 0
6,582,488 UART: [idev] Sha1 KeyId Algorithm
6,583,735 UART: [idev] --
6,584,231 UART: [ldev] ++
6,584,934 UART: [ldev] CDI.KEYID = 6
6,585,920 UART: [ldev] SUBJECT.KEYID = 5
6,586,949 UART: [ldev] AUTHORITY.KEYID = 7
6,588,038 UART: [ldev] FE.KEYID = 1
6,589,085 UART: [ldev] Erasing FE.KEYID = 1
8,848,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,737 UART: [ldev] --
10,637,642 UART: [fwproc] Wait for Commands...
10,639,635 UART: [fwproc] Recv command 0x46574c44
10,641,952 UART: [fwproc] Recv'd Img size: 114168 bytes
14,086,246 UART: ROM Fatal Error: 0x000B0016
14,089,914 >>> mbox cmd response: failed
14,090,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,090,706 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
6,332,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,497,221 >>> mbox cmd response: failed
14,497,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,498,262 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,155 UART: [kat] SHA2-256
882,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,201 UART: [kat] ++
886,353 UART: [kat] sha1
890,671 UART: [kat] SHA2-256
892,609 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,889 UART: [fht] Storing FHT @ 0x50003400
1,479,772 UART: [idev] ++
1,479,940 UART: [idev] CDI.KEYID = 6
1,480,300 UART: [idev] SUBJECT.KEYID = 7
1,480,724 UART: [idev] UDS.KEYID = 0
1,481,069 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,806 UART: [idev] Erasing UDS.KEYID = 0
1,505,398 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,008 UART: [idev] --
1,514,961 UART: [ldev] ++
1,515,129 UART: [ldev] CDI.KEYID = 6
1,515,492 UART: [ldev] SUBJECT.KEYID = 5
1,515,918 UART: [ldev] AUTHORITY.KEYID = 7
1,516,381 UART: [ldev] FE.KEYID = 1
1,521,637 UART: [ldev] Erasing FE.KEYID = 1
1,546,678 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,346 UART: [ldev] --
1,585,647 UART: [fwproc] Waiting for Commands...
1,586,514 UART: [fwproc] Received command 0x46574c44
1,587,305 UART: [fwproc] Received Image of size 114168 bytes
2,883,427 UART: ROM Fatal Error: 0x000B0016
2,884,584 >>> mbox cmd response: failed
2,884,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,590 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,736,079 >>> mbox cmd response: failed
2,736,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,085 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,284 UART: [kat] SHA2-256
882,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,330 UART: [kat] ++
886,482 UART: [kat] sha1
890,836 UART: [kat] SHA2-256
892,774 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
902,913 UART: [kat] HMAC-384Kdf
907,459 UART: [kat] LMS
1,475,655 UART: [kat] --
1,476,402 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,709 UART: [idev] Erasing UDS.KEYID = 0
1,504,863 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,311 UART: [idev] --
1,514,302 UART: [ldev] ++
1,514,470 UART: [ldev] CDI.KEYID = 6
1,514,833 UART: [ldev] SUBJECT.KEYID = 5
1,515,259 UART: [ldev] AUTHORITY.KEYID = 7
1,515,722 UART: [ldev] FE.KEYID = 1
1,520,998 UART: [ldev] Erasing FE.KEYID = 1
1,546,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,511 UART: [ldev] --
1,586,022 UART: [fwproc] Waiting for Commands...
1,586,681 UART: [fwproc] Received command 0x46574c44
1,587,472 UART: [fwproc] Received Image of size 114168 bytes
2,882,278 UART: ROM Fatal Error: 0x000B0016
2,883,435 >>> mbox cmd response: failed
2,883,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,441 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,737,458 >>> mbox cmd response: failed
2,737,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,464 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
893,568 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,693 UART: [kat] ++
897,845 UART: [kat] sha1
902,041 UART: [kat] SHA2-256
903,981 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,762 UART: [kat] HMAC-384Kdf
923,364 UART: [kat] LMS
1,171,692 UART: [kat] --
1,172,403 UART: [cold-reset] ++
1,172,861 UART: [fht] FHT @ 0x50003400
1,175,540 UART: [idev] ++
1,175,708 UART: [idev] CDI.KEYID = 6
1,176,068 UART: [idev] SUBJECT.KEYID = 7
1,176,492 UART: [idev] UDS.KEYID = 0
1,176,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,008 UART: [idev] Erasing UDS.KEYID = 0
1,200,997 UART: [idev] Sha1 KeyId Algorithm
1,209,583 UART: [idev] --
1,210,417 UART: [ldev] ++
1,210,585 UART: [ldev] CDI.KEYID = 6
1,210,948 UART: [ldev] SUBJECT.KEYID = 5
1,211,374 UART: [ldev] AUTHORITY.KEYID = 7
1,211,837 UART: [ldev] FE.KEYID = 1
1,217,043 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,236 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,204 UART: ROM Fatal Error: 0x000B0016
2,579,361 >>> mbox cmd response: failed
2,579,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,367 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,436,561 >>> mbox cmd response: failed
2,436,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,567 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
893,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,450 UART: [kat] ++
897,602 UART: [kat] sha1
901,772 UART: [kat] SHA2-256
903,712 UART: [kat] SHA2-384
906,469 UART: [kat] SHA2-512-ACC
908,370 UART: [kat] ECC-384
918,521 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,241 UART: [idev] Erasing UDS.KEYID = 0
1,201,406 UART: [idev] Sha1 KeyId Algorithm
1,209,996 UART: [idev] --
1,211,002 UART: [ldev] ++
1,211,170 UART: [ldev] CDI.KEYID = 6
1,211,533 UART: [ldev] SUBJECT.KEYID = 5
1,211,959 UART: [ldev] AUTHORITY.KEYID = 7
1,212,422 UART: [ldev] FE.KEYID = 1
1,217,798 UART: [ldev] Erasing FE.KEYID = 1
1,244,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,220 UART: [ldev] --
1,283,597 UART: [fwproc] Wait for Commands...
1,284,337 UART: [fwproc] Recv command 0x46574c44
1,285,065 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,797 UART: ROM Fatal Error: 0x000B0016
2,580,954 >>> mbox cmd response: failed
2,580,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,960 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,658 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,434,969 >>> mbox cmd response: failed
2,434,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,975 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,141 UART: [kat] ++
895,293 UART: [kat] sha1
899,597 UART: [kat] SHA2-256
901,537 UART: [kat] SHA2-384
904,158 UART: [kat] SHA2-512-ACC
906,059 UART: [kat] ECC-384
915,488 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,397 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,405 UART: [idev] ++
1,172,573 UART: [idev] CDI.KEYID = 6
1,172,934 UART: [idev] SUBJECT.KEYID = 7
1,173,359 UART: [idev] UDS.KEYID = 0
1,173,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,198,677 UART: [idev] Sha1 KeyId Algorithm
1,207,617 UART: [idev] --
1,208,594 UART: [ldev] ++
1,208,762 UART: [ldev] CDI.KEYID = 6
1,209,126 UART: [ldev] SUBJECT.KEYID = 5
1,209,553 UART: [ldev] AUTHORITY.KEYID = 7
1,210,016 UART: [ldev] FE.KEYID = 1
1,215,112 UART: [ldev] Erasing FE.KEYID = 1
1,241,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,796 UART: [ldev] --
1,280,126 UART: [fwproc] Wait for Commands...
1,280,807 UART: [fwproc] Recv command 0x46574c44
1,281,540 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,084 UART: ROM Fatal Error: 0x000B0016
2,578,241 >>> mbox cmd response: failed
2,578,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,247 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,414 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,428,526 >>> mbox cmd response: failed
2,428,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,428,532 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
891,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,174 UART: [kat] SHA2-256
902,114 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,423 UART: [kat] HMAC-384Kdf
921,039 UART: [kat] LMS
1,169,351 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,198,986 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,027 UART: [ldev] ++
1,209,195 UART: [ldev] CDI.KEYID = 6
1,209,559 UART: [ldev] SUBJECT.KEYID = 5
1,209,986 UART: [ldev] AUTHORITY.KEYID = 7
1,210,449 UART: [ldev] FE.KEYID = 1
1,215,427 UART: [ldev] Erasing FE.KEYID = 1
1,241,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,879 UART: [ldev] --
1,281,229 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,063 UART: ROM Fatal Error: 0x000B0016
2,579,220 >>> mbox cmd response: failed
2,579,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,226 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,791 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,907 >>> mbox cmd response: failed
2,433,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,913 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,084 UART:
192,442 UART: Running Caliptra ROM ...
193,538 UART:
193,680 UART: [state] CFI Enabled
264,837 UART: [state] LifecycleState = Production
266,698 UART: [state] DebugLocked = No
268,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,249 UART: [kat] SHA2-256
443,003 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,467 UART: [kat] ++
453,972 UART: [kat] sha1
463,982 UART: [kat] SHA2-256
466,665 UART: [kat] SHA2-384
471,995 UART: [kat] SHA2-512-ACC
474,333 UART: [kat] ECC-384
2,768,541 UART: [kat] HMAC-384Kdf
2,800,771 UART: [kat] LMS
3,991,076 UART: [kat] --
3,996,439 UART: [cold-reset] ++
3,997,947 UART: [fht] Storing FHT @ 0x50003400
4,008,677 UART: [idev] ++
4,009,296 UART: [idev] CDI.KEYID = 6
4,010,224 UART: [idev] SUBJECT.KEYID = 7
4,011,446 UART: [idev] UDS.KEYID = 0
4,014,155 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,424 UART: [idev] Erasing UDS.KEYID = 0
7,347,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,130 UART: [idev] --
7,374,801 UART: [ldev] ++
7,375,431 UART: [ldev] CDI.KEYID = 6
7,376,320 UART: [ldev] SUBJECT.KEYID = 5
7,377,599 UART: [ldev] AUTHORITY.KEYID = 7
7,378,833 UART: [ldev] FE.KEYID = 1
7,425,380 UART: [ldev] Erasing FE.KEYID = 1
10,750,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,339 UART: [ldev] --
13,130,300 UART: [fwproc] Waiting for Commands...
13,131,936 UART: [fwproc] Received command 0x46574c44
13,134,131 UART: [fwproc] Received Image of size 113844 bytes
13,232,796 UART: ROM Fatal Error: 0x000B0007
13,236,263 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,799,953 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,936,004 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,494 UART:
192,858 UART: Running Caliptra ROM ...
194,045 UART:
603,571 UART: [state] CFI Enabled
617,948 UART: [state] LifecycleState = Production
619,754 UART: [state] DebugLocked = No
622,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,075 UART: [kat] SHA2-256
797,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,407 UART: [kat] ++
808,941 UART: [kat] sha1
820,150 UART: [kat] SHA2-256
822,897 UART: [kat] SHA2-384
828,120 UART: [kat] SHA2-512-ACC
830,512 UART: [kat] ECC-384
3,112,885 UART: [kat] HMAC-384Kdf
3,125,765 UART: [kat] LMS
4,315,919 UART: [kat] --
4,320,034 UART: [cold-reset] ++
4,322,571 UART: [fht] Storing FHT @ 0x50003400
4,333,730 UART: [idev] ++
4,334,373 UART: [idev] CDI.KEYID = 6
4,335,316 UART: [idev] SUBJECT.KEYID = 7
4,336,533 UART: [idev] UDS.KEYID = 0
4,339,213 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,255 UART: [idev] Erasing UDS.KEYID = 0
7,626,002 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,514 UART: [idev] --
7,651,512 UART: [ldev] ++
7,652,086 UART: [ldev] CDI.KEYID = 6
7,652,998 UART: [ldev] SUBJECT.KEYID = 5
7,654,267 UART: [ldev] AUTHORITY.KEYID = 7
7,655,499 UART: [ldev] FE.KEYID = 1
7,666,955 UART: [ldev] Erasing FE.KEYID = 1
10,953,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,627 UART: [ldev] --
13,311,653 UART: [fwproc] Waiting for Commands...
13,313,963 UART: [fwproc] Received command 0x46574c44
13,316,155 UART: [fwproc] Received Image of size 113844 bytes
13,415,924 UART: ROM Fatal Error: 0x000B0007
13,419,443 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,130,227 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,151,507 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,126 UART:
192,497 UART: Running Caliptra ROM ...
193,624 UART:
193,765 UART: [state] CFI Enabled
262,706 UART: [state] LifecycleState = Production
264,449 UART: [state] DebugLocked = No
266,532 UART: [state] WD Timer not started. Device not locked for debugging
270,151 UART: [kat] SHA2-256
449,297 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,827 UART: [kat] ++
461,370 UART: [kat] sha1
473,225 UART: [kat] SHA2-256
476,235 UART: [kat] SHA2-384
482,589 UART: [kat] SHA2-512-ACC
485,582 UART: [kat] ECC-384
2,948,896 UART: [kat] HMAC-384Kdf
2,971,934 UART: [kat] LMS
3,501,388 UART: [kat] --
3,506,429 UART: [cold-reset] ++
3,507,880 UART: [fht] FHT @ 0x50003400
3,518,376 UART: [idev] ++
3,518,942 UART: [idev] CDI.KEYID = 6
3,519,859 UART: [idev] SUBJECT.KEYID = 7
3,521,076 UART: [idev] UDS.KEYID = 0
3,523,903 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,710 UART: [idev] Erasing UDS.KEYID = 0
6,028,106 UART: [idev] Sha1 KeyId Algorithm
6,051,714 UART: [idev] --
6,055,708 UART: [ldev] ++
6,056,284 UART: [ldev] CDI.KEYID = 6
6,057,202 UART: [ldev] SUBJECT.KEYID = 5
6,058,390 UART: [ldev] AUTHORITY.KEYID = 7
6,059,629 UART: [ldev] FE.KEYID = 1
6,102,048 UART: [ldev] Erasing FE.KEYID = 1
8,610,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,277 UART: [ldev] --
10,414,091 UART: [fwproc] Wait for Commands...
10,417,261 UART: [fwproc] Recv command 0x46574c44
10,419,367 UART: [fwproc] Recv'd Img size: 114168 bytes
10,517,545 UART: ROM Fatal Error: 0x000B0007
10,520,630 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,384,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,327,055 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,689 UART:
193,047 UART: Running Caliptra ROM ...
194,227 UART:
603,962 UART: [state] CFI Enabled
617,921 UART: [state] LifecycleState = Production
619,645 UART: [state] DebugLocked = No
622,374 UART: [state] WD Timer not started. Device not locked for debugging
626,361 UART: [kat] SHA2-256
805,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,033 UART: [kat] ++
817,575 UART: [kat] sha1
829,216 UART: [kat] SHA2-256
832,284 UART: [kat] SHA2-384
837,990 UART: [kat] SHA2-512-ACC
840,971 UART: [kat] ECC-384
3,282,579 UART: [kat] HMAC-384Kdf
3,294,423 UART: [kat] LMS
3,823,922 UART: [kat] --
3,829,663 UART: [cold-reset] ++
3,830,657 UART: [fht] FHT @ 0x50003400
3,841,260 UART: [idev] ++
3,841,826 UART: [idev] CDI.KEYID = 6
3,842,711 UART: [idev] SUBJECT.KEYID = 7
3,843,926 UART: [idev] UDS.KEYID = 0
3,846,771 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,379 UART: [idev] Erasing UDS.KEYID = 0
6,323,298 UART: [idev] Sha1 KeyId Algorithm
6,347,069 UART: [idev] --
6,351,230 UART: [ldev] ++
6,351,796 UART: [ldev] CDI.KEYID = 6
6,352,673 UART: [ldev] SUBJECT.KEYID = 5
6,353,890 UART: [ldev] AUTHORITY.KEYID = 7
6,355,179 UART: [ldev] FE.KEYID = 1
6,367,475 UART: [ldev] Erasing FE.KEYID = 1
8,840,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,559,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,575,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,590,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,658 UART: [ldev] --
10,632,018 UART: [fwproc] Wait for Commands...
10,634,557 UART: [fwproc] Recv command 0x46574c44
10,636,657 UART: [fwproc] Recv'd Img size: 114168 bytes
10,736,810 UART: ROM Fatal Error: 0x000B0007
10,739,897 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,695,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,494,694 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,089 UART:
192,474 UART: Running Caliptra ROM ...
193,562 UART:
193,704 UART: [state] CFI Enabled
265,344 UART: [state] LifecycleState = Production
267,600 UART: [state] DebugLocked = No
269,871 UART: [state] WD Timer not started. Device not locked for debugging
274,574 UART: [kat] SHA2-256
464,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,267 UART: [kat] ++
475,715 UART: [kat] sha1
486,271 UART: [kat] SHA2-256
489,296 UART: [kat] SHA2-384
495,876 UART: [kat] SHA2-512-ACC
498,436 UART: [kat] ECC-384
2,950,772 UART: [kat] HMAC-384Kdf
2,972,697 UART: [kat] LMS
3,504,438 UART: [kat] --
3,510,870 UART: [cold-reset] ++
3,512,857 UART: [fht] FHT @ 0x50003400
3,524,222 UART: [idev] ++
3,524,898 UART: [idev] CDI.KEYID = 6
3,525,875 UART: [idev] SUBJECT.KEYID = 7
3,527,035 UART: [idev] UDS.KEYID = 0
3,529,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,673,789 UART: [idev] Erasing UDS.KEYID = 0
6,030,061 UART: [idev] Sha1 KeyId Algorithm
6,051,899 UART: [idev] --
6,056,152 UART: [ldev] ++
6,056,848 UART: [ldev] CDI.KEYID = 6
6,057,762 UART: [ldev] SUBJECT.KEYID = 5
6,058,925 UART: [ldev] AUTHORITY.KEYID = 7
6,060,160 UART: [ldev] FE.KEYID = 1
6,102,324 UART: [ldev] Erasing FE.KEYID = 1
8,607,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,965 UART: [ldev] --
10,414,585 UART: [fwproc] Wait for Commands...
10,417,437 UART: [fwproc] Recv command 0x46574c44
10,419,704 UART: [fwproc] Recv'd Img size: 114168 bytes
10,548,793 UART: ROM Fatal Error: 0x000B0007
10,552,444 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,417,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,314,038 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,521 UART:
192,960 UART: Running Caliptra ROM ...
194,079 UART:
603,658 UART: [state] CFI Enabled
616,987 UART: [state] LifecycleState = Production
619,212 UART: [state] DebugLocked = No
620,483 UART: [state] WD Timer not started. Device not locked for debugging
624,773 UART: [kat] SHA2-256
814,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,444 UART: [kat] ++
825,948 UART: [kat] sha1
837,909 UART: [kat] SHA2-256
840,918 UART: [kat] SHA2-384
846,039 UART: [kat] SHA2-512-ACC
848,657 UART: [kat] ECC-384
3,288,217 UART: [kat] HMAC-384Kdf
3,300,860 UART: [kat] LMS
3,832,680 UART: [kat] --
3,834,219 UART: [cold-reset] ++
3,835,615 UART: [fht] FHT @ 0x50003400
3,847,859 UART: [idev] ++
3,848,538 UART: [idev] CDI.KEYID = 6
3,849,511 UART: [idev] SUBJECT.KEYID = 7
3,850,728 UART: [idev] UDS.KEYID = 0
3,853,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,997,993 UART: [idev] Erasing UDS.KEYID = 0
6,326,952 UART: [idev] Sha1 KeyId Algorithm
6,349,408 UART: [idev] --
6,353,130 UART: [ldev] ++
6,353,810 UART: [ldev] CDI.KEYID = 6
6,354,696 UART: [ldev] SUBJECT.KEYID = 5
6,355,910 UART: [ldev] AUTHORITY.KEYID = 7
6,357,036 UART: [ldev] FE.KEYID = 1
6,367,011 UART: [ldev] Erasing FE.KEYID = 1
8,847,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,855 UART: [ldev] --
10,640,079 UART: [fwproc] Wait for Commands...
10,641,867 UART: [fwproc] Recv command 0x46574c44
10,644,190 UART: [fwproc] Recv'd Img size: 114168 bytes
10,775,323 UART: ROM Fatal Error: 0x000B0007
10,779,005 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,755,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,581,545 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Production
85,725 UART: [state] DebugLocked = No
86,407 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,425 UART: [kat] SHA2-256
892,363 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,712 UART: [kat] HMAC-384Kdf
907,238 UART: [kat] LMS
1,475,434 UART: [kat] --
1,476,213 UART: [cold-reset] ++
1,476,727 UART: [fht] Storing FHT @ 0x50003400
1,479,458 UART: [idev] ++
1,479,626 UART: [idev] CDI.KEYID = 6
1,479,986 UART: [idev] SUBJECT.KEYID = 7
1,480,410 UART: [idev] UDS.KEYID = 0
1,480,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,326 UART: [idev] Erasing UDS.KEYID = 0
1,504,924 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,689 UART: [ldev] ++
1,514,857 UART: [ldev] CDI.KEYID = 6
1,515,220 UART: [ldev] SUBJECT.KEYID = 5
1,515,646 UART: [ldev] AUTHORITY.KEYID = 7
1,516,109 UART: [ldev] FE.KEYID = 1
1,521,143 UART: [ldev] Erasing FE.KEYID = 1
1,546,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,840 UART: [ldev] --
1,586,335 UART: [fwproc] Waiting for Commands...
1,587,152 UART: [fwproc] Received command 0x46574c44
1,587,943 UART: [fwproc] Received Image of size 114168 bytes
1,637,648 UART: ROM Fatal Error: 0x000B0007
1,638,805 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,491,198 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Production
86,006 UART: [state] DebugLocked = No
86,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,282 UART: [kat] SHA2-256
882,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,328 UART: [kat] ++
886,480 UART: [kat] sha1
890,776 UART: [kat] SHA2-256
892,714 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,855 UART: [kat] LMS
1,476,051 UART: [kat] --
1,477,108 UART: [cold-reset] ++
1,477,528 UART: [fht] Storing FHT @ 0x50003400
1,480,471 UART: [idev] ++
1,480,639 UART: [idev] CDI.KEYID = 6
1,480,999 UART: [idev] SUBJECT.KEYID = 7
1,481,423 UART: [idev] UDS.KEYID = 0
1,481,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,425 UART: [idev] Erasing UDS.KEYID = 0
1,505,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,319 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,521,978 UART: [ldev] Erasing FE.KEYID = 1
1,546,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,759 UART: [ldev] --
1,586,130 UART: [fwproc] Waiting for Commands...
1,586,833 UART: [fwproc] Received command 0x46574c44
1,587,624 UART: [fwproc] Received Image of size 114168 bytes
1,637,057 UART: ROM Fatal Error: 0x000B0007
1,638,214 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,706 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,490,665 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Production
85,741 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,901 UART: [kat] SHA2-256
903,841 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,947 UART: [cold-reset] ++
1,172,431 UART: [fht] FHT @ 0x50003400
1,175,140 UART: [idev] ++
1,175,308 UART: [idev] CDI.KEYID = 6
1,175,668 UART: [idev] SUBJECT.KEYID = 7
1,176,092 UART: [idev] UDS.KEYID = 0
1,176,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,010 UART: [idev] Erasing UDS.KEYID = 0
1,201,277 UART: [idev] Sha1 KeyId Algorithm
1,209,627 UART: [idev] --
1,210,763 UART: [ldev] ++
1,210,931 UART: [ldev] CDI.KEYID = 6
1,211,294 UART: [ldev] SUBJECT.KEYID = 5
1,211,720 UART: [ldev] AUTHORITY.KEYID = 7
1,212,183 UART: [ldev] FE.KEYID = 1
1,217,147 UART: [ldev] Erasing FE.KEYID = 1
1,243,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,353 UART: [ldev] --
1,282,854 UART: [fwproc] Wait for Commands...
1,283,510 UART: [fwproc] Recv command 0x46574c44
1,284,238 UART: [fwproc] Recv'd Img size: 114168 bytes
1,333,439 UART: ROM Fatal Error: 0x000B0007
1,334,596 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,188,411 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Production
85,958 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
901,848 UART: [kat] SHA2-256
903,788 UART: [kat] SHA2-384
906,495 UART: [kat] SHA2-512-ACC
908,396 UART: [kat] ECC-384
918,363 UART: [kat] HMAC-384Kdf
922,943 UART: [kat] LMS
1,171,271 UART: [kat] --
1,172,262 UART: [cold-reset] ++
1,172,642 UART: [fht] FHT @ 0x50003400
1,175,169 UART: [idev] ++
1,175,337 UART: [idev] CDI.KEYID = 6
1,175,697 UART: [idev] SUBJECT.KEYID = 7
1,176,121 UART: [idev] UDS.KEYID = 0
1,176,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,555 UART: [idev] Erasing UDS.KEYID = 0
1,201,342 UART: [idev] Sha1 KeyId Algorithm
1,209,932 UART: [idev] --
1,211,108 UART: [ldev] ++
1,211,276 UART: [ldev] CDI.KEYID = 6
1,211,639 UART: [ldev] SUBJECT.KEYID = 5
1,212,065 UART: [ldev] AUTHORITY.KEYID = 7
1,212,528 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,243,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,602 UART: [ldev] --
1,282,883 UART: [fwproc] Wait for Commands...
1,283,511 UART: [fwproc] Recv command 0x46574c44
1,284,239 UART: [fwproc] Recv'd Img size: 114168 bytes
1,333,652 UART: ROM Fatal Error: 0x000B0007
1,334,809 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,880 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,189,552 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,878 UART: [state] LifecycleState = Production
85,485 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
890,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,029 UART: [kat] ++
895,181 UART: [kat] sha1
899,281 UART: [kat] SHA2-256
901,221 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,668 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,647 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,174,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,911 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,760 UART: [fwproc] Wait for Commands...
1,281,399 UART: [fwproc] Recv command 0x46574c44
1,282,132 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,927 UART: ROM Fatal Error: 0x000B0007
1,332,084 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,011 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,961 UART: [state] LifecycleState = Production
86,568 UART: [state] DebugLocked = No
87,256 UART: [state] WD Timer not started. Device not locked for debugging
88,425 UART: [kat] SHA2-256
891,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,104 UART: [kat] ++
896,256 UART: [kat] sha1
900,618 UART: [kat] SHA2-256
902,558 UART: [kat] SHA2-384
905,285 UART: [kat] SHA2-512-ACC
907,186 UART: [kat] ECC-384
917,411 UART: [kat] HMAC-384Kdf
922,041 UART: [kat] LMS
1,170,353 UART: [kat] --
1,171,232 UART: [cold-reset] ++
1,171,626 UART: [fht] FHT @ 0x50003400
1,174,304 UART: [idev] ++
1,174,472 UART: [idev] CDI.KEYID = 6
1,174,833 UART: [idev] SUBJECT.KEYID = 7
1,175,258 UART: [idev] UDS.KEYID = 0
1,175,604 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,932 UART: [idev] Sha1 KeyId Algorithm
1,209,756 UART: [idev] --
1,210,799 UART: [ldev] ++
1,210,967 UART: [ldev] CDI.KEYID = 6
1,211,331 UART: [ldev] SUBJECT.KEYID = 5
1,211,758 UART: [ldev] AUTHORITY.KEYID = 7
1,212,221 UART: [ldev] FE.KEYID = 1
1,217,573 UART: [ldev] Erasing FE.KEYID = 1
1,244,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,853 UART: [ldev] --
1,284,289 UART: [fwproc] Wait for Commands...
1,284,982 UART: [fwproc] Recv command 0x46574c44
1,285,715 UART: [fwproc] Recv'd Img size: 114168 bytes
1,334,648 UART: ROM Fatal Error: 0x000B0007
1,335,805 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,750 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,140 UART:
192,516 UART: Running Caliptra ROM ...
193,658 UART:
193,808 UART: [state] CFI Enabled
264,512 UART: [state] LifecycleState = Production
266,372 UART: [state] DebugLocked = No
267,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,203 UART: [kat] SHA2-256
441,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,449 UART: [kat] ++
452,986 UART: [kat] sha1
463,057 UART: [kat] SHA2-256
465,751 UART: [kat] SHA2-384
472,806 UART: [kat] SHA2-512-ACC
475,143 UART: [kat] ECC-384
2,768,514 UART: [kat] HMAC-384Kdf
2,799,374 UART: [kat] LMS
3,989,726 UART: [kat] --
3,993,639 UART: [cold-reset] ++
3,995,850 UART: [fht] Storing FHT @ 0x50003400
4,008,250 UART: [idev] ++
4,008,885 UART: [idev] CDI.KEYID = 6
4,009,804 UART: [idev] SUBJECT.KEYID = 7
4,011,023 UART: [idev] UDS.KEYID = 0
4,013,721 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,128 UART: [idev] Erasing UDS.KEYID = 0
7,346,656 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,003 UART: [idev] --
7,373,167 UART: [ldev] ++
7,373,739 UART: [ldev] CDI.KEYID = 6
7,374,761 UART: [ldev] SUBJECT.KEYID = 5
7,375,922 UART: [ldev] AUTHORITY.KEYID = 7
7,377,159 UART: [ldev] FE.KEYID = 1
7,422,757 UART: [ldev] Erasing FE.KEYID = 1
10,759,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,252 UART: [ldev] --
13,135,490 UART: [fwproc] Waiting for Commands...
13,138,020 UART: [fwproc] Received command 0x46574c44
13,140,257 UART: [fwproc] Received Image of size 113844 bytes
13,237,987 UART: ROM Fatal Error: 0x000B0007
13,241,502 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,805,082 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,960,300 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,559 UART:
192,909 UART: Running Caliptra ROM ...
194,091 UART:
603,911 UART: [state] CFI Enabled
619,141 UART: [state] LifecycleState = Production
620,887 UART: [state] DebugLocked = No
623,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,323 UART: [kat] SHA2-256
799,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,650 UART: [kat] ++
810,098 UART: [kat] sha1
820,331 UART: [kat] SHA2-256
823,012 UART: [kat] SHA2-384
829,013 UART: [kat] SHA2-512-ACC
831,409 UART: [kat] ECC-384
3,113,384 UART: [kat] HMAC-384Kdf
3,124,868 UART: [kat] LMS
4,314,983 UART: [kat] --
4,319,714 UART: [cold-reset] ++
4,321,980 UART: [fht] Storing FHT @ 0x50003400
4,334,548 UART: [idev] ++
4,335,112 UART: [idev] CDI.KEYID = 6
4,336,046 UART: [idev] SUBJECT.KEYID = 7
4,337,316 UART: [idev] UDS.KEYID = 0
4,340,112 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,355 UART: [idev] Erasing UDS.KEYID = 0
7,621,897 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,943 UART: [idev] --
7,648,969 UART: [ldev] ++
7,649,561 UART: [ldev] CDI.KEYID = 6
7,650,581 UART: [ldev] SUBJECT.KEYID = 5
7,651,739 UART: [ldev] AUTHORITY.KEYID = 7
7,652,971 UART: [ldev] FE.KEYID = 1
7,666,910 UART: [ldev] Erasing FE.KEYID = 1
10,954,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,438 UART: [ldev] --
13,312,404 UART: [fwproc] Waiting for Commands...
13,314,714 UART: [fwproc] Received command 0x46574c44
13,316,904 UART: [fwproc] Received Image of size 113844 bytes
13,419,589 UART: ROM Fatal Error: 0x000B0007
13,423,107 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,130,819 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,171,990 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,455 UART:
192,818 UART: Running Caliptra ROM ...
194,007 UART:
194,165 UART: [state] CFI Enabled
263,666 UART: [state] LifecycleState = Production
265,424 UART: [state] DebugLocked = No
266,973 UART: [state] WD Timer not started. Device not locked for debugging
270,321 UART: [kat] SHA2-256
449,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,014 UART: [kat] ++
461,468 UART: [kat] sha1
471,858 UART: [kat] SHA2-256
474,932 UART: [kat] SHA2-384
481,652 UART: [kat] SHA2-512-ACC
484,596 UART: [kat] ECC-384
2,946,835 UART: [kat] HMAC-384Kdf
2,971,117 UART: [kat] LMS
3,500,568 UART: [kat] --
3,505,159 UART: [cold-reset] ++
3,506,716 UART: [fht] FHT @ 0x50003400
3,517,050 UART: [idev] ++
3,517,662 UART: [idev] CDI.KEYID = 6
3,518,582 UART: [idev] SUBJECT.KEYID = 7
3,519,748 UART: [idev] UDS.KEYID = 0
3,522,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,065 UART: [idev] Erasing UDS.KEYID = 0
6,032,064 UART: [idev] Sha1 KeyId Algorithm
6,055,611 UART: [idev] --
6,059,939 UART: [ldev] ++
6,060,516 UART: [ldev] CDI.KEYID = 6
6,061,429 UART: [ldev] SUBJECT.KEYID = 5
6,062,593 UART: [ldev] AUTHORITY.KEYID = 7
6,063,836 UART: [ldev] FE.KEYID = 1
6,101,749 UART: [ldev] Erasing FE.KEYID = 1
8,603,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,339,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,541 UART: [ldev] --
10,395,648 UART: [fwproc] Wait for Commands...
10,398,918 UART: [fwproc] Recv command 0x46574c44
10,400,965 UART: [fwproc] Recv'd Img size: 114168 bytes
10,497,554 UART: ROM Fatal Error: 0x000B0007
10,500,655 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,365,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,278,643 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,699 UART:
193,059 UART: Running Caliptra ROM ...
194,151 UART:
604,006 UART: [state] CFI Enabled
617,641 UART: [state] LifecycleState = Production
619,419 UART: [state] DebugLocked = No
621,686 UART: [state] WD Timer not started. Device not locked for debugging
625,030 UART: [kat] SHA2-256
804,146 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,709 UART: [kat] ++
816,161 UART: [kat] sha1
828,975 UART: [kat] SHA2-256
832,038 UART: [kat] SHA2-384
838,629 UART: [kat] SHA2-512-ACC
841,613 UART: [kat] ECC-384
3,281,891 UART: [kat] HMAC-384Kdf
3,293,976 UART: [kat] LMS
3,823,472 UART: [kat] --
3,825,894 UART: [cold-reset] ++
3,827,768 UART: [fht] FHT @ 0x50003400
3,839,592 UART: [idev] ++
3,840,165 UART: [idev] CDI.KEYID = 6
3,841,082 UART: [idev] SUBJECT.KEYID = 7
3,842,299 UART: [idev] UDS.KEYID = 0
3,844,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,075 UART: [idev] Erasing UDS.KEYID = 0
6,317,094 UART: [idev] Sha1 KeyId Algorithm
6,341,025 UART: [idev] --
6,345,294 UART: [ldev] ++
6,345,886 UART: [ldev] CDI.KEYID = 6
6,346,773 UART: [ldev] SUBJECT.KEYID = 5
6,347,990 UART: [ldev] AUTHORITY.KEYID = 7
6,349,225 UART: [ldev] FE.KEYID = 1
6,359,793 UART: [ldev] Erasing FE.KEYID = 1
8,835,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,206 UART: [ldev] --
10,628,042 UART: [fwproc] Wait for Commands...
10,629,799 UART: [fwproc] Recv command 0x46574c44
10,631,906 UART: [fwproc] Recv'd Img size: 114168 bytes
10,727,441 UART: ROM Fatal Error: 0x000B0007
10,730,579 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,702,789 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,508,797 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,088 UART:
192,476 UART: Running Caliptra ROM ...
193,612 UART:
193,758 UART: [state] CFI Enabled
266,867 UART: [state] LifecycleState = Production
269,110 UART: [state] DebugLocked = No
271,947 UART: [state] WD Timer not started. Device not locked for debugging
276,557 UART: [kat] SHA2-256
466,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,228 UART: [kat] ++
477,702 UART: [kat] sha1
488,582 UART: [kat] SHA2-256
491,625 UART: [kat] SHA2-384
499,281 UART: [kat] SHA2-512-ACC
501,903 UART: [kat] ECC-384
2,949,368 UART: [kat] HMAC-384Kdf
2,972,137 UART: [kat] LMS
3,503,865 UART: [kat] --
3,509,123 UART: [cold-reset] ++
3,510,303 UART: [fht] FHT @ 0x50003400
3,522,638 UART: [idev] ++
3,523,309 UART: [idev] CDI.KEYID = 6
3,524,254 UART: [idev] SUBJECT.KEYID = 7
3,525,463 UART: [idev] UDS.KEYID = 0
3,528,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,051 UART: [idev] Erasing UDS.KEYID = 0
6,031,036 UART: [idev] Sha1 KeyId Algorithm
6,052,387 UART: [idev] --
6,056,328 UART: [ldev] ++
6,057,024 UART: [ldev] CDI.KEYID = 6
6,057,912 UART: [ldev] SUBJECT.KEYID = 5
6,059,078 UART: [ldev] AUTHORITY.KEYID = 7
6,060,324 UART: [ldev] FE.KEYID = 1
6,100,055 UART: [ldev] Erasing FE.KEYID = 1
8,609,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,215 UART: [ldev] --
10,416,129 UART: [fwproc] Wait for Commands...
10,418,982 UART: [fwproc] Recv command 0x46574c44
10,421,249 UART: [fwproc] Recv'd Img size: 114168 bytes
10,549,979 UART: ROM Fatal Error: 0x000B0007
10,553,650 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,441,300 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,354,104 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,524 UART:
192,883 UART: Running Caliptra ROM ...
194,075 UART:
603,749 UART: [state] CFI Enabled
613,861 UART: [state] LifecycleState = Production
616,064 UART: [state] DebugLocked = No
618,255 UART: [state] WD Timer not started. Device not locked for debugging
622,727 UART: [kat] SHA2-256
812,603 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,391 UART: [kat] ++
823,896 UART: [kat] sha1
835,155 UART: [kat] SHA2-256
838,193 UART: [kat] SHA2-384
843,961 UART: [kat] SHA2-512-ACC
846,572 UART: [kat] ECC-384
3,288,944 UART: [kat] HMAC-384Kdf
3,302,856 UART: [kat] LMS
3,834,704 UART: [kat] --
3,838,209 UART: [cold-reset] ++
3,839,927 UART: [fht] FHT @ 0x50003400
3,853,124 UART: [idev] ++
3,853,807 UART: [idev] CDI.KEYID = 6
3,854,773 UART: [idev] SUBJECT.KEYID = 7
3,855,991 UART: [idev] UDS.KEYID = 0
3,858,633 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,215 UART: [idev] Erasing UDS.KEYID = 0
6,331,719 UART: [idev] Sha1 KeyId Algorithm
6,354,256 UART: [idev] --
6,359,079 UART: [ldev] ++
6,359,770 UART: [ldev] CDI.KEYID = 6
6,360,690 UART: [ldev] SUBJECT.KEYID = 5
6,361,848 UART: [ldev] AUTHORITY.KEYID = 7
6,363,080 UART: [ldev] FE.KEYID = 1
6,374,271 UART: [ldev] Erasing FE.KEYID = 1
8,854,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,375 UART: [ldev] --
10,642,438 UART: [fwproc] Wait for Commands...
10,645,412 UART: [fwproc] Recv command 0x46574c44
10,647,679 UART: [fwproc] Recv'd Img size: 114168 bytes
10,776,809 UART: ROM Fatal Error: 0x000B0007
10,780,510 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,757,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,573,318 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Production
85,859 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,507 UART: [kat] SHA2-256
892,445 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,918 UART: [kat] HMAC-384Kdf
907,658 UART: [kat] LMS
1,475,854 UART: [kat] --
1,476,827 UART: [cold-reset] ++
1,477,337 UART: [fht] Storing FHT @ 0x50003400
1,480,114 UART: [idev] ++
1,480,282 UART: [idev] CDI.KEYID = 6
1,480,642 UART: [idev] SUBJECT.KEYID = 7
1,481,066 UART: [idev] UDS.KEYID = 0
1,481,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,126 UART: [idev] Erasing UDS.KEYID = 0
1,505,902 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,462 UART: [idev] --
1,515,573 UART: [ldev] ++
1,515,741 UART: [ldev] CDI.KEYID = 6
1,516,104 UART: [ldev] SUBJECT.KEYID = 5
1,516,530 UART: [ldev] AUTHORITY.KEYID = 7
1,516,993 UART: [ldev] FE.KEYID = 1
1,522,061 UART: [ldev] Erasing FE.KEYID = 1
1,547,064 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,136 UART: [ldev] --
1,586,459 UART: [fwproc] Waiting for Commands...
1,587,110 UART: [fwproc] Received command 0x46574c44
1,587,901 UART: [fwproc] Received Image of size 114168 bytes
1,637,050 UART: ROM Fatal Error: 0x000B0007
1,638,207 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,490,746 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Production
85,548 UART: [state] DebugLocked = No
86,220 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,818 UART: [kat] SHA2-256
881,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,864 UART: [kat] ++
886,016 UART: [kat] sha1
890,272 UART: [kat] SHA2-256
892,210 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,687 UART: [kat] HMAC-384Kdf
907,349 UART: [kat] LMS
1,475,545 UART: [kat] --
1,476,410 UART: [cold-reset] ++
1,476,984 UART: [fht] Storing FHT @ 0x50003400
1,479,977 UART: [idev] ++
1,480,145 UART: [idev] CDI.KEYID = 6
1,480,505 UART: [idev] SUBJECT.KEYID = 7
1,480,929 UART: [idev] UDS.KEYID = 0
1,481,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,139 UART: [idev] Erasing UDS.KEYID = 0
1,505,815 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,449 UART: [idev] --
1,515,502 UART: [ldev] ++
1,515,670 UART: [ldev] CDI.KEYID = 6
1,516,033 UART: [ldev] SUBJECT.KEYID = 5
1,516,459 UART: [ldev] AUTHORITY.KEYID = 7
1,516,922 UART: [ldev] FE.KEYID = 1
1,522,014 UART: [ldev] Erasing FE.KEYID = 1
1,547,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,179 UART: [ldev] --
1,586,488 UART: [fwproc] Waiting for Commands...
1,587,301 UART: [fwproc] Received command 0x46574c44
1,588,092 UART: [fwproc] Received Image of size 114168 bytes
1,637,777 UART: ROM Fatal Error: 0x000B0007
1,638,934 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,076 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,491,037 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Production
86,011 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
893,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,841 UART: [kat] ++
897,993 UART: [kat] sha1
902,355 UART: [kat] SHA2-256
904,295 UART: [kat] SHA2-384
907,038 UART: [kat] SHA2-512-ACC
908,939 UART: [kat] ECC-384
918,524 UART: [kat] HMAC-384Kdf
923,232 UART: [kat] LMS
1,171,560 UART: [kat] --
1,172,599 UART: [cold-reset] ++
1,173,147 UART: [fht] FHT @ 0x50003400
1,176,054 UART: [idev] ++
1,176,222 UART: [idev] CDI.KEYID = 6
1,176,582 UART: [idev] SUBJECT.KEYID = 7
1,177,006 UART: [idev] UDS.KEYID = 0
1,177,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,934 UART: [idev] Erasing UDS.KEYID = 0
1,201,675 UART: [idev] Sha1 KeyId Algorithm
1,210,113 UART: [idev] --
1,211,247 UART: [ldev] ++
1,211,415 UART: [ldev] CDI.KEYID = 6
1,211,778 UART: [ldev] SUBJECT.KEYID = 5
1,212,204 UART: [ldev] AUTHORITY.KEYID = 7
1,212,667 UART: [ldev] FE.KEYID = 1
1,217,975 UART: [ldev] Erasing FE.KEYID = 1
1,244,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,303 UART: [ldev] --
1,283,618 UART: [fwproc] Wait for Commands...
1,284,354 UART: [fwproc] Recv command 0x46574c44
1,285,082 UART: [fwproc] Recv'd Img size: 114168 bytes
1,335,063 UART: ROM Fatal Error: 0x000B0007
1,336,220 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,405 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,188,785 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Production
86,130 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,115 UART: [kat] SHA2-256
893,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,890 UART: [kat] ++
898,042 UART: [kat] sha1
902,274 UART: [kat] SHA2-256
904,214 UART: [kat] SHA2-384
907,099 UART: [kat] SHA2-512-ACC
909,000 UART: [kat] ECC-384
918,857 UART: [kat] HMAC-384Kdf
923,553 UART: [kat] LMS
1,171,881 UART: [kat] --
1,172,830 UART: [cold-reset] ++
1,173,382 UART: [fht] FHT @ 0x50003400
1,176,037 UART: [idev] ++
1,176,205 UART: [idev] CDI.KEYID = 6
1,176,565 UART: [idev] SUBJECT.KEYID = 7
1,176,989 UART: [idev] UDS.KEYID = 0
1,177,334 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,091 UART: [idev] Erasing UDS.KEYID = 0
1,202,276 UART: [idev] Sha1 KeyId Algorithm
1,210,986 UART: [idev] --
1,212,054 UART: [ldev] ++
1,212,222 UART: [ldev] CDI.KEYID = 6
1,212,585 UART: [ldev] SUBJECT.KEYID = 5
1,213,011 UART: [ldev] AUTHORITY.KEYID = 7
1,213,474 UART: [ldev] FE.KEYID = 1
1,218,624 UART: [ldev] Erasing FE.KEYID = 1
1,244,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,684 UART: [ldev] --
1,284,073 UART: [fwproc] Wait for Commands...
1,284,777 UART: [fwproc] Recv command 0x46574c44
1,285,505 UART: [fwproc] Recv'd Img size: 114168 bytes
1,334,926 UART: ROM Fatal Error: 0x000B0007
1,336,083 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,188,514 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Production
86,001 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,972 UART: [kat] SHA2-256
891,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
900,205 UART: [kat] SHA2-256
902,145 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
921,144 UART: [kat] LMS
1,169,456 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,793 UART: [fht] FHT @ 0x50003400
1,173,595 UART: [idev] ++
1,173,763 UART: [idev] CDI.KEYID = 6
1,174,124 UART: [idev] SUBJECT.KEYID = 7
1,174,549 UART: [idev] UDS.KEYID = 0
1,174,895 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,807 UART: [idev] Erasing UDS.KEYID = 0
1,200,039 UART: [idev] Sha1 KeyId Algorithm
1,208,917 UART: [idev] --
1,209,908 UART: [ldev] ++
1,210,076 UART: [ldev] CDI.KEYID = 6
1,210,440 UART: [ldev] SUBJECT.KEYID = 5
1,210,867 UART: [ldev] AUTHORITY.KEYID = 7
1,211,330 UART: [ldev] FE.KEYID = 1
1,216,520 UART: [ldev] Erasing FE.KEYID = 1
1,243,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,002 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,271 UART: [fwproc] Recv command 0x46574c44
1,284,004 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,523 UART: ROM Fatal Error: 0x000B0007
1,333,680 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,080 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,543 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Production
85,962 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
916,211 UART: [kat] HMAC-384Kdf
920,973 UART: [kat] LMS
1,169,285 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,984 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
1,174,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,618 UART: [idev] Erasing UDS.KEYID = 0
1,199,516 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,521 UART: [ldev] ++
1,209,689 UART: [ldev] CDI.KEYID = 6
1,210,053 UART: [ldev] SUBJECT.KEYID = 5
1,210,480 UART: [ldev] AUTHORITY.KEYID = 7
1,210,943 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,242,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,282,145 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,366 UART: ROM Fatal Error: 0x000B0007
1,333,523 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,102 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,136 UART:
192,498 UART: Running Caliptra ROM ...
193,677 UART:
193,830 UART: [state] CFI Enabled
262,908 UART: [state] LifecycleState = Production
264,724 UART: [state] DebugLocked = No
266,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,394 UART: [kat] SHA2-256
441,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,576 UART: [kat] ++
452,166 UART: [kat] sha1
463,373 UART: [kat] SHA2-256
466,069 UART: [kat] SHA2-384
472,816 UART: [kat] SHA2-512-ACC
475,207 UART: [kat] ECC-384
2,766,793 UART: [kat] HMAC-384Kdf
2,779,287 UART: [kat] LMS
3,969,595 UART: [kat] --
3,972,967 UART: [cold-reset] ++
3,974,345 UART: [fht] Storing FHT @ 0x50003400
3,984,978 UART: [idev] ++
3,985,545 UART: [idev] CDI.KEYID = 6
3,986,486 UART: [idev] SUBJECT.KEYID = 7
3,987,778 UART: [idev] UDS.KEYID = 0
3,990,689 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,128 UART: [idev] Erasing UDS.KEYID = 0
7,328,618 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,014 UART: [idev] --
7,355,849 UART: [ldev] ++
7,356,430 UART: [ldev] CDI.KEYID = 6
7,357,406 UART: [ldev] SUBJECT.KEYID = 5
7,358,629 UART: [ldev] AUTHORITY.KEYID = 7
7,359,865 UART: [ldev] FE.KEYID = 1
7,403,976 UART: [ldev] Erasing FE.KEYID = 1
10,735,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,401 UART: [ldev] --
13,097,628 UART: [fwproc] Waiting for Commands...
13,100,011 UART: [fwproc] Received command 0x46574c44
13,102,206 UART: [fwproc] Received Image of size 113844 bytes
13,197,222 UART: ROM Fatal Error: 0x000B0005
13,200,744 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,800,606 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,929,024 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,489 UART:
192,840 UART: Running Caliptra ROM ...
193,981 UART:
603,756 UART: [state] CFI Enabled
617,429 UART: [state] LifecycleState = Production
619,234 UART: [state] DebugLocked = No
621,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,649 UART: [kat] SHA2-256
795,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,946 UART: [kat] ++
806,401 UART: [kat] sha1
816,791 UART: [kat] SHA2-256
819,532 UART: [kat] SHA2-384
824,540 UART: [kat] SHA2-512-ACC
826,876 UART: [kat] ECC-384
3,112,409 UART: [kat] HMAC-384Kdf
3,123,912 UART: [kat] LMS
4,314,011 UART: [kat] --
4,316,746 UART: [cold-reset] ++
4,318,038 UART: [fht] Storing FHT @ 0x50003400
4,330,392 UART: [idev] ++
4,330,958 UART: [idev] CDI.KEYID = 6
4,331,997 UART: [idev] SUBJECT.KEYID = 7
4,333,159 UART: [idev] UDS.KEYID = 0
4,336,109 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,333 UART: [idev] Erasing UDS.KEYID = 0
7,621,474 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,039 UART: [idev] --
7,647,501 UART: [ldev] ++
7,648,122 UART: [ldev] CDI.KEYID = 6
7,649,095 UART: [ldev] SUBJECT.KEYID = 5
7,650,254 UART: [ldev] AUTHORITY.KEYID = 7
7,651,534 UART: [ldev] FE.KEYID = 1
7,661,689 UART: [ldev] Erasing FE.KEYID = 1
10,949,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,336 UART: [ldev] --
13,312,653 UART: [fwproc] Waiting for Commands...
13,314,969 UART: [fwproc] Received command 0x46574c44
13,317,158 UART: [fwproc] Received Image of size 113844 bytes
13,410,446 UART: ROM Fatal Error: 0x000B0005
13,413,911 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,134,681 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,156,755 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,230 UART:
192,617 UART: Running Caliptra ROM ...
193,810 UART:
193,960 UART: [state] CFI Enabled
262,587 UART: [state] LifecycleState = Production
264,335 UART: [state] DebugLocked = No
266,201 UART: [state] WD Timer not started. Device not locked for debugging
269,272 UART: [kat] SHA2-256
448,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,928 UART: [kat] ++
460,376 UART: [kat] sha1
470,675 UART: [kat] SHA2-256
473,696 UART: [kat] SHA2-384
479,561 UART: [kat] SHA2-512-ACC
482,543 UART: [kat] ECC-384
2,926,587 UART: [kat] HMAC-384Kdf
2,950,282 UART: [kat] LMS
3,479,725 UART: [kat] --
3,482,056 UART: [cold-reset] ++
3,483,239 UART: [fht] FHT @ 0x50003400
3,494,758 UART: [idev] ++
3,495,322 UART: [idev] CDI.KEYID = 6
3,496,337 UART: [idev] SUBJECT.KEYID = 7
3,497,437 UART: [idev] UDS.KEYID = 0
3,500,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,644,039 UART: [idev] Erasing UDS.KEYID = 0
6,006,830 UART: [idev] Sha1 KeyId Algorithm
6,031,359 UART: [idev] --
6,035,306 UART: [ldev] ++
6,035,886 UART: [ldev] CDI.KEYID = 6
6,036,776 UART: [ldev] SUBJECT.KEYID = 5
6,037,877 UART: [ldev] AUTHORITY.KEYID = 7
6,039,225 UART: [ldev] FE.KEYID = 1
6,079,316 UART: [ldev] Erasing FE.KEYID = 1
8,581,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,308,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,324,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,340,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,356,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,377,445 UART: [ldev] --
10,381,896 UART: [fwproc] Wait for Commands...
10,383,557 UART: [fwproc] Recv command 0x46574c44
10,385,654 UART: [fwproc] Recv'd Img size: 114168 bytes
10,478,066 UART: ROM Fatal Error: 0x000B0005
10,481,190 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,362,325 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,272,658 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,520 UART:
192,876 UART: Running Caliptra ROM ...
193,987 UART:
603,501 UART: [state] CFI Enabled
615,625 UART: [state] LifecycleState = Production
617,348 UART: [state] DebugLocked = No
619,237 UART: [state] WD Timer not started. Device not locked for debugging
623,278 UART: [kat] SHA2-256
802,362 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,951 UART: [kat] ++
814,401 UART: [kat] sha1
824,787 UART: [kat] SHA2-256
827,796 UART: [kat] SHA2-384
832,797 UART: [kat] SHA2-512-ACC
835,783 UART: [kat] ECC-384
3,273,772 UART: [kat] HMAC-384Kdf
3,287,527 UART: [kat] LMS
3,816,984 UART: [kat] --
3,823,610 UART: [cold-reset] ++
3,824,683 UART: [fht] FHT @ 0x50003400
3,835,767 UART: [idev] ++
3,836,332 UART: [idev] CDI.KEYID = 6
3,837,242 UART: [idev] SUBJECT.KEYID = 7
3,838,468 UART: [idev] UDS.KEYID = 0
3,841,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,039 UART: [idev] Erasing UDS.KEYID = 0
6,310,017 UART: [idev] Sha1 KeyId Algorithm
6,333,778 UART: [idev] --
6,337,643 UART: [ldev] ++
6,338,221 UART: [ldev] CDI.KEYID = 6
6,339,135 UART: [ldev] SUBJECT.KEYID = 5
6,340,295 UART: [ldev] AUTHORITY.KEYID = 7
6,341,577 UART: [ldev] FE.KEYID = 1
6,351,790 UART: [ldev] Erasing FE.KEYID = 1
8,824,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,653 UART: [ldev] --
10,616,572 UART: [fwproc] Wait for Commands...
10,619,157 UART: [fwproc] Recv command 0x46574c44
10,621,253 UART: [fwproc] Recv'd Img size: 114168 bytes
10,712,277 UART: ROM Fatal Error: 0x000B0005
10,715,419 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,695,738 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,485,440 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,095 UART:
192,464 UART: Running Caliptra ROM ...
193,650 UART:
193,804 UART: [state] CFI Enabled
263,030 UART: [state] LifecycleState = Production
265,280 UART: [state] DebugLocked = No
267,096 UART: [state] WD Timer not started. Device not locked for debugging
272,091 UART: [kat] SHA2-256
461,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,761 UART: [kat] ++
473,235 UART: [kat] sha1
485,739 UART: [kat] SHA2-256
488,804 UART: [kat] SHA2-384
494,363 UART: [kat] SHA2-512-ACC
496,979 UART: [kat] ECC-384
2,949,110 UART: [kat] HMAC-384Kdf
2,973,292 UART: [kat] LMS
3,505,059 UART: [kat] --
3,508,532 UART: [cold-reset] ++
3,509,990 UART: [fht] FHT @ 0x50003400
3,521,462 UART: [idev] ++
3,522,029 UART: [idev] CDI.KEYID = 6
3,523,004 UART: [idev] SUBJECT.KEYID = 7
3,524,238 UART: [idev] UDS.KEYID = 0
3,527,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,968 UART: [idev] Erasing UDS.KEYID = 0
6,027,841 UART: [idev] Sha1 KeyId Algorithm
6,049,884 UART: [idev] --
6,055,913 UART: [ldev] ++
6,056,610 UART: [ldev] CDI.KEYID = 6
6,057,500 UART: [ldev] SUBJECT.KEYID = 5
6,058,720 UART: [ldev] AUTHORITY.KEYID = 7
6,059,902 UART: [ldev] FE.KEYID = 1
6,102,320 UART: [ldev] Erasing FE.KEYID = 1
8,609,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,277 UART: [ldev] --
10,420,360 UART: [fwproc] Wait for Commands...
10,422,729 UART: [fwproc] Recv command 0x46574c44
10,425,046 UART: [fwproc] Recv'd Img size: 114168 bytes
10,549,006 UART: ROM Fatal Error: 0x000B0005
10,552,664 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,440,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,348,663 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,525 UART:
192,879 UART: Running Caliptra ROM ...
194,079 UART:
603,646 UART: [state] CFI Enabled
617,546 UART: [state] LifecycleState = Production
619,752 UART: [state] DebugLocked = No
622,691 UART: [state] WD Timer not started. Device not locked for debugging
626,722 UART: [kat] SHA2-256
816,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,392 UART: [kat] ++
827,942 UART: [kat] sha1
840,069 UART: [kat] SHA2-256
843,082 UART: [kat] SHA2-384
848,686 UART: [kat] SHA2-512-ACC
851,305 UART: [kat] ECC-384
3,294,199 UART: [kat] HMAC-384Kdf
3,307,033 UART: [kat] LMS
3,838,874 UART: [kat] --
3,841,778 UART: [cold-reset] ++
3,843,982 UART: [fht] FHT @ 0x50003400
3,854,530 UART: [idev] ++
3,855,214 UART: [idev] CDI.KEYID = 6
3,856,232 UART: [idev] SUBJECT.KEYID = 7
3,857,360 UART: [idev] UDS.KEYID = 0
3,860,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,731 UART: [idev] Erasing UDS.KEYID = 0
6,329,684 UART: [idev] Sha1 KeyId Algorithm
6,351,921 UART: [idev] --
6,355,440 UART: [ldev] ++
6,356,127 UART: [ldev] CDI.KEYID = 6
6,357,044 UART: [ldev] SUBJECT.KEYID = 5
6,358,212 UART: [ldev] AUTHORITY.KEYID = 7
6,359,412 UART: [ldev] FE.KEYID = 1
6,370,870 UART: [ldev] Erasing FE.KEYID = 1
8,848,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,605 UART: [ldev] --
10,639,478 UART: [fwproc] Wait for Commands...
10,641,257 UART: [fwproc] Recv command 0x46574c44
10,643,534 UART: [fwproc] Recv'd Img size: 114168 bytes
10,766,532 UART: ROM Fatal Error: 0x000B0005
10,770,223 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,760,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,576,603 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Production
85,947 UART: [state] DebugLocked = No
86,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,297 UART: [kat] SHA2-256
882,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,343 UART: [kat] ++
886,495 UART: [kat] sha1
890,633 UART: [kat] SHA2-256
892,571 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
903,096 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,997 UART: [fht] Storing FHT @ 0x50003400
1,479,818 UART: [idev] ++
1,479,986 UART: [idev] CDI.KEYID = 6
1,480,346 UART: [idev] SUBJECT.KEYID = 7
1,480,770 UART: [idev] UDS.KEYID = 0
1,481,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,270 UART: [idev] Erasing UDS.KEYID = 0
1,504,830 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,464 UART: [idev] --
1,514,481 UART: [ldev] ++
1,514,649 UART: [ldev] CDI.KEYID = 6
1,515,012 UART: [ldev] SUBJECT.KEYID = 5
1,515,438 UART: [ldev] AUTHORITY.KEYID = 7
1,515,901 UART: [ldev] FE.KEYID = 1
1,521,247 UART: [ldev] Erasing FE.KEYID = 1
1,546,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,540 UART: [ldev] --
1,585,835 UART: [fwproc] Waiting for Commands...
1,586,546 UART: [fwproc] Received command 0x46574c44
1,587,337 UART: [fwproc] Received Image of size 114168 bytes
1,632,300 UART: ROM Fatal Error: 0x000B0005
1,633,457 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,485,996 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Production
85,962 UART: [state] DebugLocked = No
86,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,535 UART: [kat] SHA2-512-ACC
897,436 UART: [kat] ECC-384
903,215 UART: [kat] HMAC-384Kdf
907,907 UART: [kat] LMS
1,476,103 UART: [kat] --
1,477,166 UART: [cold-reset] ++
1,477,550 UART: [fht] Storing FHT @ 0x50003400
1,480,197 UART: [idev] ++
1,480,365 UART: [idev] CDI.KEYID = 6
1,480,725 UART: [idev] SUBJECT.KEYID = 7
1,481,149 UART: [idev] UDS.KEYID = 0
1,481,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,185 UART: [idev] Erasing UDS.KEYID = 0
1,506,231 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,903 UART: [idev] --
1,515,866 UART: [ldev] ++
1,516,034 UART: [ldev] CDI.KEYID = 6
1,516,397 UART: [ldev] SUBJECT.KEYID = 5
1,516,823 UART: [ldev] AUTHORITY.KEYID = 7
1,517,286 UART: [ldev] FE.KEYID = 1
1,522,762 UART: [ldev] Erasing FE.KEYID = 1
1,548,165 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,142 UART: [fwproc] Waiting for Commands...
1,587,801 UART: [fwproc] Received command 0x46574c44
1,588,592 UART: [fwproc] Received Image of size 114168 bytes
1,633,231 UART: ROM Fatal Error: 0x000B0005
1,634,388 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,485,789 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,294 UART: [state] LifecycleState = Production
85,901 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
893,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,585 UART: [kat] ++
897,737 UART: [kat] sha1
901,985 UART: [kat] SHA2-256
903,925 UART: [kat] SHA2-384
906,670 UART: [kat] SHA2-512-ACC
908,571 UART: [kat] ECC-384
918,080 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,383 UART: [fht] FHT @ 0x50003400
1,175,106 UART: [idev] ++
1,175,274 UART: [idev] CDI.KEYID = 6
1,175,634 UART: [idev] SUBJECT.KEYID = 7
1,176,058 UART: [idev] UDS.KEYID = 0
1,176,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,002 UART: [idev] Erasing UDS.KEYID = 0
1,200,863 UART: [idev] Sha1 KeyId Algorithm
1,209,205 UART: [idev] --
1,210,309 UART: [ldev] ++
1,210,477 UART: [ldev] CDI.KEYID = 6
1,210,840 UART: [ldev] SUBJECT.KEYID = 5
1,211,266 UART: [ldev] AUTHORITY.KEYID = 7
1,211,729 UART: [ldev] FE.KEYID = 1
1,216,937 UART: [ldev] Erasing FE.KEYID = 1
1,243,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,619 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,594 UART: [fwproc] Recv command 0x46574c44
1,284,322 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,689 UART: ROM Fatal Error: 0x000B0005
1,330,846 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,131 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Production
85,798 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
893,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,468 UART: [kat] ++
897,620 UART: [kat] sha1
901,808 UART: [kat] SHA2-256
903,748 UART: [kat] SHA2-384
906,449 UART: [kat] SHA2-512-ACC
908,350 UART: [kat] ECC-384
918,029 UART: [kat] HMAC-384Kdf
922,755 UART: [kat] LMS
1,171,083 UART: [kat] --
1,172,030 UART: [cold-reset] ++
1,172,496 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,697 UART: [idev] Erasing UDS.KEYID = 0
1,200,532 UART: [idev] Sha1 KeyId Algorithm
1,209,024 UART: [idev] --
1,210,202 UART: [ldev] ++
1,210,370 UART: [ldev] CDI.KEYID = 6
1,210,733 UART: [ldev] SUBJECT.KEYID = 5
1,211,159 UART: [ldev] AUTHORITY.KEYID = 7
1,211,622 UART: [ldev] FE.KEYID = 1
1,216,978 UART: [ldev] Erasing FE.KEYID = 1
1,243,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,744 UART: [ldev] --
1,283,249 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,591 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,620 UART: ROM Fatal Error: 0x000B0005
1,330,777 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,468 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,186,142 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Production
85,693 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: [kat] ++
895,339 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,366 UART: [kat] LMS
1,168,678 UART: [kat] --
1,169,665 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,835 UART: [idev] ++
1,173,003 UART: [idev] CDI.KEYID = 6
1,173,364 UART: [idev] SUBJECT.KEYID = 7
1,173,789 UART: [idev] UDS.KEYID = 0
1,174,135 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,685 UART: [idev] Sha1 KeyId Algorithm
1,208,673 UART: [idev] --
1,209,704 UART: [ldev] ++
1,209,872 UART: [ldev] CDI.KEYID = 6
1,210,236 UART: [ldev] SUBJECT.KEYID = 5
1,210,663 UART: [ldev] AUTHORITY.KEYID = 7
1,211,126 UART: [ldev] FE.KEYID = 1
1,216,268 UART: [ldev] Erasing FE.KEYID = 1
1,242,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,180 UART: [ldev] --
1,281,538 UART: [fwproc] Wait for Commands...
1,282,181 UART: [fwproc] Recv command 0x46574c44
1,282,914 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,251 UART: ROM Fatal Error: 0x000B0005
1,328,408 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,902 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,835 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Production
86,070 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,284 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,174,618 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,464 UART: [idev] Sha1 KeyId Algorithm
1,208,174 UART: [idev] --
1,209,205 UART: [ldev] ++
1,209,373 UART: [ldev] CDI.KEYID = 6
1,209,737 UART: [ldev] SUBJECT.KEYID = 5
1,210,164 UART: [ldev] AUTHORITY.KEYID = 7
1,210,627 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,058 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,955 UART: [ldev] --
1,281,463 UART: [fwproc] Wait for Commands...
1,282,152 UART: [fwproc] Recv command 0x46574c44
1,282,885 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,816 UART: ROM Fatal Error: 0x000B0005
1,328,973 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,672 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,118 UART:
192,473 UART: Running Caliptra ROM ...
193,572 UART:
193,730 UART: [state] CFI Enabled
264,073 UART: [state] LifecycleState = Production
265,864 UART: [state] DebugLocked = No
268,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,407 UART: [kat] SHA2-256
442,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,640 UART: [kat] ++
453,094 UART: [kat] sha1
462,897 UART: [kat] SHA2-256
465,583 UART: [kat] SHA2-384
471,558 UART: [kat] SHA2-512-ACC
473,950 UART: [kat] ECC-384
2,767,801 UART: [kat] HMAC-384Kdf
2,799,768 UART: [kat] LMS
3,990,070 UART: [kat] --
3,994,371 UART: [cold-reset] ++
3,996,435 UART: [fht] Storing FHT @ 0x50003400
4,007,483 UART: [idev] ++
4,008,060 UART: [idev] CDI.KEYID = 6
4,009,007 UART: [idev] SUBJECT.KEYID = 7
4,010,228 UART: [idev] UDS.KEYID = 0
4,013,172 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,611 UART: [idev] Erasing UDS.KEYID = 0
7,348,487 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,359 UART: [idev] --
7,373,113 UART: [ldev] ++
7,373,686 UART: [ldev] CDI.KEYID = 6
7,374,624 UART: [ldev] SUBJECT.KEYID = 5
7,375,755 UART: [ldev] AUTHORITY.KEYID = 7
7,377,151 UART: [ldev] FE.KEYID = 1
7,421,948 UART: [ldev] Erasing FE.KEYID = 1
10,758,198 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,036 UART: [ldev] --
13,137,197 UART: [fwproc] Waiting for Commands...
13,139,725 UART: [fwproc] Received command 0x46574c44
13,141,913 UART: [fwproc] Received Image of size 113844 bytes
13,236,125 UART: ROM Fatal Error: 0x000B0005
13,239,643 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,809,507 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,983,429 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,678 UART:
193,029 UART: Running Caliptra ROM ...
194,136 UART:
603,986 UART: [state] CFI Enabled
621,015 UART: [state] LifecycleState = Production
622,806 UART: [state] DebugLocked = No
624,700 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,314 UART: [kat] SHA2-256
800,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,616 UART: [kat] ++
811,067 UART: [kat] sha1
820,919 UART: [kat] SHA2-256
823,649 UART: [kat] SHA2-384
830,112 UART: [kat] SHA2-512-ACC
832,457 UART: [kat] ECC-384
3,117,299 UART: [kat] HMAC-384Kdf
3,129,738 UART: [kat] LMS
4,319,818 UART: [kat] --
4,323,949 UART: [cold-reset] ++
4,324,967 UART: [fht] Storing FHT @ 0x50003400
4,335,802 UART: [idev] ++
4,336,372 UART: [idev] CDI.KEYID = 6
4,337,347 UART: [idev] SUBJECT.KEYID = 7
4,338,583 UART: [idev] UDS.KEYID = 0
4,341,695 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,945 UART: [idev] Erasing UDS.KEYID = 0
7,629,884 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,861 UART: [idev] --
7,654,696 UART: [ldev] ++
7,655,319 UART: [ldev] CDI.KEYID = 6
7,656,244 UART: [ldev] SUBJECT.KEYID = 5
7,657,456 UART: [ldev] AUTHORITY.KEYID = 7
7,658,744 UART: [ldev] FE.KEYID = 1
7,670,910 UART: [ldev] Erasing FE.KEYID = 1
10,958,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,945 UART: [ldev] --
13,322,679 UART: [fwproc] Waiting for Commands...
13,325,318 UART: [fwproc] Received command 0x46574c44
13,327,501 UART: [fwproc] Received Image of size 113844 bytes
13,421,169 UART: ROM Fatal Error: 0x000B0005
13,424,669 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,130,000 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,158,913 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,090 UART:
192,471 UART: Running Caliptra ROM ...
193,615 UART:
193,764 UART: [state] CFI Enabled
266,098 UART: [state] LifecycleState = Production
267,857 UART: [state] DebugLocked = No
269,188 UART: [state] WD Timer not started. Device not locked for debugging
273,083 UART: [kat] SHA2-256
452,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,808 UART: [kat] ++
464,258 UART: [kat] sha1
474,861 UART: [kat] SHA2-256
477,917 UART: [kat] SHA2-384
483,161 UART: [kat] SHA2-512-ACC
486,096 UART: [kat] ECC-384
2,948,756 UART: [kat] HMAC-384Kdf
2,972,029 UART: [kat] LMS
3,501,474 UART: [kat] --
3,506,228 UART: [cold-reset] ++
3,507,623 UART: [fht] FHT @ 0x50003400
3,519,856 UART: [idev] ++
3,520,417 UART: [idev] CDI.KEYID = 6
3,521,357 UART: [idev] SUBJECT.KEYID = 7
3,522,569 UART: [idev] UDS.KEYID = 0
3,525,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,161 UART: [idev] Erasing UDS.KEYID = 0
6,042,257 UART: [idev] Sha1 KeyId Algorithm
6,064,043 UART: [idev] --
6,066,649 UART: [ldev] ++
6,067,252 UART: [ldev] CDI.KEYID = 6
6,068,175 UART: [ldev] SUBJECT.KEYID = 5
6,069,334 UART: [ldev] AUTHORITY.KEYID = 7
6,070,572 UART: [ldev] FE.KEYID = 1
6,112,444 UART: [ldev] Erasing FE.KEYID = 1
8,615,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,351,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,367,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,383,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,399,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,418,313 UART: [ldev] --
10,422,117 UART: [fwproc] Wait for Commands...
10,425,238 UART: [fwproc] Recv command 0x46574c44
10,427,332 UART: [fwproc] Recv'd Img size: 114168 bytes
10,520,750 UART: ROM Fatal Error: 0x000B0005
10,523,886 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,366,418 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,290,345 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,564 UART:
192,920 UART: Running Caliptra ROM ...
194,034 UART:
603,623 UART: [state] CFI Enabled
618,500 UART: [state] LifecycleState = Production
620,252 UART: [state] DebugLocked = No
622,928 UART: [state] WD Timer not started. Device not locked for debugging
627,266 UART: [kat] SHA2-256
806,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,957 UART: [kat] ++
818,500 UART: [kat] sha1
829,439 UART: [kat] SHA2-256
832,459 UART: [kat] SHA2-384
839,461 UART: [kat] SHA2-512-ACC
842,446 UART: [kat] ECC-384
3,282,029 UART: [kat] HMAC-384Kdf
3,295,251 UART: [kat] LMS
3,824,747 UART: [kat] --
3,830,145 UART: [cold-reset] ++
3,831,714 UART: [fht] FHT @ 0x50003400
3,842,368 UART: [idev] ++
3,842,930 UART: [idev] CDI.KEYID = 6
3,843,947 UART: [idev] SUBJECT.KEYID = 7
3,845,019 UART: [idev] UDS.KEYID = 0
3,848,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,855 UART: [idev] Erasing UDS.KEYID = 0
6,318,573 UART: [idev] Sha1 KeyId Algorithm
6,341,654 UART: [idev] --
6,346,995 UART: [ldev] ++
6,347,565 UART: [ldev] CDI.KEYID = 6
6,348,646 UART: [ldev] SUBJECT.KEYID = 5
6,349,754 UART: [ldev] AUTHORITY.KEYID = 7
6,350,931 UART: [ldev] FE.KEYID = 1
6,360,124 UART: [ldev] Erasing FE.KEYID = 1
8,834,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,239 UART: [ldev] --
10,625,118 UART: [fwproc] Wait for Commands...
10,627,490 UART: [fwproc] Recv command 0x46574c44
10,629,587 UART: [fwproc] Recv'd Img size: 114168 bytes
10,714,343 UART: ROM Fatal Error: 0x000B0005
10,717,485 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,696,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,489,614 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,047 UART:
192,436 UART: Running Caliptra ROM ...
193,572 UART:
193,719 UART: [state] CFI Enabled
265,769 UART: [state] LifecycleState = Production
268,020 UART: [state] DebugLocked = No
269,733 UART: [state] WD Timer not started. Device not locked for debugging
274,287 UART: [kat] SHA2-256
464,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,981 UART: [kat] ++
475,524 UART: [kat] sha1
488,082 UART: [kat] SHA2-256
491,092 UART: [kat] SHA2-384
497,074 UART: [kat] SHA2-512-ACC
499,648 UART: [kat] ECC-384
2,948,755 UART: [kat] HMAC-384Kdf
2,972,672 UART: [kat] LMS
3,504,465 UART: [kat] --
3,509,983 UART: [cold-reset] ++
3,511,972 UART: [fht] FHT @ 0x50003400
3,524,696 UART: [idev] ++
3,525,368 UART: [idev] CDI.KEYID = 6
3,526,308 UART: [idev] SUBJECT.KEYID = 7
3,527,573 UART: [idev] UDS.KEYID = 0
3,530,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,674,170 UART: [idev] Erasing UDS.KEYID = 0
6,046,852 UART: [idev] Sha1 KeyId Algorithm
6,069,571 UART: [idev] --
6,073,569 UART: [ldev] ++
6,074,256 UART: [ldev] CDI.KEYID = 6
6,075,145 UART: [ldev] SUBJECT.KEYID = 5
6,076,360 UART: [ldev] AUTHORITY.KEYID = 7
6,077,594 UART: [ldev] FE.KEYID = 1
6,122,756 UART: [ldev] Erasing FE.KEYID = 1
8,625,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,381,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,396,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,433,662 UART: [ldev] --
10,439,308 UART: [fwproc] Wait for Commands...
10,441,369 UART: [fwproc] Recv command 0x46574c44
10,443,637 UART: [fwproc] Recv'd Img size: 114168 bytes
10,563,049 UART: ROM Fatal Error: 0x000B0005
10,566,704 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,439,148 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,347,471 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,535 UART:
192,900 UART: Running Caliptra ROM ...
194,101 UART:
603,867 UART: [state] CFI Enabled
616,471 UART: [state] LifecycleState = Production
618,711 UART: [state] DebugLocked = No
620,956 UART: [state] WD Timer not started. Device not locked for debugging
626,308 UART: [kat] SHA2-256
816,129 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,948 UART: [kat] ++
827,538 UART: [kat] sha1
839,231 UART: [kat] SHA2-256
842,290 UART: [kat] SHA2-384
848,114 UART: [kat] SHA2-512-ACC
850,726 UART: [kat] ECC-384
3,294,405 UART: [kat] HMAC-384Kdf
3,307,883 UART: [kat] LMS
3,839,728 UART: [kat] --
3,845,377 UART: [cold-reset] ++
3,846,643 UART: [fht] FHT @ 0x50003400
3,858,284 UART: [idev] ++
3,858,977 UART: [idev] CDI.KEYID = 6
3,859,918 UART: [idev] SUBJECT.KEYID = 7
3,861,129 UART: [idev] UDS.KEYID = 0
3,864,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,760 UART: [idev] Erasing UDS.KEYID = 0
6,337,374 UART: [idev] Sha1 KeyId Algorithm
6,361,276 UART: [idev] --
6,366,407 UART: [ldev] ++
6,367,088 UART: [ldev] CDI.KEYID = 6
6,368,056 UART: [ldev] SUBJECT.KEYID = 5
6,369,220 UART: [ldev] AUTHORITY.KEYID = 7
6,370,451 UART: [ldev] FE.KEYID = 1
6,379,588 UART: [ldev] Erasing FE.KEYID = 1
8,854,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,224 UART: [ldev] --
10,648,568 UART: [fwproc] Wait for Commands...
10,650,637 UART: [fwproc] Recv command 0x46574c44
10,652,963 UART: [fwproc] Recv'd Img size: 114168 bytes
10,773,780 UART: ROM Fatal Error: 0x000B0005
10,777,466 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,756,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,563,601 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Production
85,497 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,827 UART: [kat] SHA2-256
881,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,873 UART: [kat] ++
886,025 UART: [kat] sha1
890,341 UART: [kat] SHA2-256
892,279 UART: [kat] SHA2-384
895,258 UART: [kat] SHA2-512-ACC
897,159 UART: [kat] ECC-384
902,876 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,749 UART: [cold-reset] ++
1,477,305 UART: [fht] Storing FHT @ 0x50003400
1,480,148 UART: [idev] ++
1,480,316 UART: [idev] CDI.KEYID = 6
1,480,676 UART: [idev] SUBJECT.KEYID = 7
1,481,100 UART: [idev] UDS.KEYID = 0
1,481,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,124 UART: [idev] Erasing UDS.KEYID = 0
1,505,756 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,478 UART: [idev] --
1,515,725 UART: [ldev] ++
1,515,893 UART: [ldev] CDI.KEYID = 6
1,516,256 UART: [ldev] SUBJECT.KEYID = 5
1,516,682 UART: [ldev] AUTHORITY.KEYID = 7
1,517,145 UART: [ldev] FE.KEYID = 1
1,522,171 UART: [ldev] Erasing FE.KEYID = 1
1,547,768 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,620 UART: [ldev] --
1,587,045 UART: [fwproc] Waiting for Commands...
1,587,752 UART: [fwproc] Received command 0x46574c44
1,588,543 UART: [fwproc] Received Image of size 114168 bytes
1,633,646 UART: ROM Fatal Error: 0x000B0005
1,634,803 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,486,100 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Production
86,032 UART: [state] DebugLocked = No
86,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,594 UART: [kat] SHA2-256
892,532 UART: [kat] SHA2-384
895,107 UART: [kat] SHA2-512-ACC
897,008 UART: [kat] ECC-384
902,383 UART: [kat] HMAC-384Kdf
907,021 UART: [kat] LMS
1,475,217 UART: [kat] --
1,476,218 UART: [cold-reset] ++
1,476,566 UART: [fht] Storing FHT @ 0x50003400
1,479,351 UART: [idev] ++
1,479,519 UART: [idev] CDI.KEYID = 6
1,479,879 UART: [idev] SUBJECT.KEYID = 7
1,480,303 UART: [idev] UDS.KEYID = 0
1,480,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,109 UART: [idev] Erasing UDS.KEYID = 0
1,504,783 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,301 UART: [idev] --
1,514,246 UART: [ldev] ++
1,514,414 UART: [ldev] CDI.KEYID = 6
1,514,777 UART: [ldev] SUBJECT.KEYID = 5
1,515,203 UART: [ldev] AUTHORITY.KEYID = 7
1,515,666 UART: [ldev] FE.KEYID = 1
1,521,044 UART: [ldev] Erasing FE.KEYID = 1
1,546,383 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,333 UART: [ldev] --
1,585,678 UART: [fwproc] Waiting for Commands...
1,586,491 UART: [fwproc] Received command 0x46574c44
1,587,282 UART: [fwproc] Received Image of size 114168 bytes
1,631,931 UART: ROM Fatal Error: 0x000B0005
1,633,088 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,151 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Production
85,929 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
893,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,571 UART: [kat] ++
897,723 UART: [kat] sha1
901,895 UART: [kat] SHA2-256
903,835 UART: [kat] SHA2-384
906,604 UART: [kat] SHA2-512-ACC
908,505 UART: [kat] ECC-384
918,080 UART: [kat] HMAC-384Kdf
922,748 UART: [kat] LMS
1,171,076 UART: [kat] --
1,171,919 UART: [cold-reset] ++
1,172,443 UART: [fht] FHT @ 0x50003400
1,175,250 UART: [idev] ++
1,175,418 UART: [idev] CDI.KEYID = 6
1,175,778 UART: [idev] SUBJECT.KEYID = 7
1,176,202 UART: [idev] UDS.KEYID = 0
1,176,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,448 UART: [idev] Erasing UDS.KEYID = 0
1,200,941 UART: [idev] Sha1 KeyId Algorithm
1,209,563 UART: [idev] --
1,210,521 UART: [ldev] ++
1,210,689 UART: [ldev] CDI.KEYID = 6
1,211,052 UART: [ldev] SUBJECT.KEYID = 5
1,211,478 UART: [ldev] AUTHORITY.KEYID = 7
1,211,941 UART: [ldev] FE.KEYID = 1
1,217,095 UART: [ldev] Erasing FE.KEYID = 1
1,243,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,445 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,616 UART: [fwproc] Recv command 0x46574c44
1,284,344 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,291 UART: ROM Fatal Error: 0x000B0005
1,330,448 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,017 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,475 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Production
86,070 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
893,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,630 UART: [kat] ++
897,782 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,781 UART: [kat] HMAC-384Kdf
923,375 UART: [kat] LMS
1,171,703 UART: [kat] --
1,172,490 UART: [cold-reset] ++
1,173,044 UART: [fht] FHT @ 0x50003400
1,175,735 UART: [idev] ++
1,175,903 UART: [idev] CDI.KEYID = 6
1,176,263 UART: [idev] SUBJECT.KEYID = 7
1,176,687 UART: [idev] UDS.KEYID = 0
1,177,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,957 UART: [idev] Erasing UDS.KEYID = 0
1,202,510 UART: [idev] Sha1 KeyId Algorithm
1,210,982 UART: [idev] --
1,212,142 UART: [ldev] ++
1,212,310 UART: [ldev] CDI.KEYID = 6
1,212,673 UART: [ldev] SUBJECT.KEYID = 5
1,213,099 UART: [ldev] AUTHORITY.KEYID = 7
1,213,562 UART: [ldev] FE.KEYID = 1
1,219,000 UART: [ldev] Erasing FE.KEYID = 1
1,245,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,016 UART: [ldev] --
1,284,507 UART: [fwproc] Wait for Commands...
1,285,329 UART: [fwproc] Recv command 0x46574c44
1,286,057 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,684 UART: ROM Fatal Error: 0x000B0005
1,331,841 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,058 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Production
85,505 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
890,922 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,051 UART: [kat] ++
895,203 UART: [kat] sha1
899,515 UART: [kat] SHA2-256
901,455 UART: [kat] SHA2-384
904,102 UART: [kat] SHA2-512-ACC
906,003 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,211 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,805 UART: [idev] Erasing UDS.KEYID = 0
1,198,921 UART: [idev] Sha1 KeyId Algorithm
1,207,853 UART: [idev] --
1,208,810 UART: [ldev] ++
1,208,978 UART: [ldev] CDI.KEYID = 6
1,209,342 UART: [ldev] SUBJECT.KEYID = 5
1,209,769 UART: [ldev] AUTHORITY.KEYID = 7
1,210,232 UART: [ldev] FE.KEYID = 1
1,215,466 UART: [ldev] Erasing FE.KEYID = 1
1,241,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,924 UART: [ldev] --
1,280,354 UART: [fwproc] Wait for Commands...
1,281,045 UART: [fwproc] Recv command 0x46574c44
1,281,778 UART: [fwproc] Recv'd Img size: 114168 bytes
1,326,299 UART: ROM Fatal Error: 0x000B0005
1,327,456 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,308 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,077 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Production
86,290 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
891,697 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: [kat] ++
895,978 UART: [kat] sha1
900,392 UART: [kat] SHA2-256
902,332 UART: [kat] SHA2-384
905,089 UART: [kat] SHA2-512-ACC
906,990 UART: [kat] ECC-384
916,869 UART: [kat] HMAC-384Kdf
921,535 UART: [kat] LMS
1,169,847 UART: [kat] --
1,170,734 UART: [cold-reset] ++
1,171,230 UART: [fht] FHT @ 0x50003400
1,173,872 UART: [idev] ++
1,174,040 UART: [idev] CDI.KEYID = 6
1,174,401 UART: [idev] SUBJECT.KEYID = 7
1,174,826 UART: [idev] UDS.KEYID = 0
1,175,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,886 UART: [idev] --
1,209,833 UART: [ldev] ++
1,210,001 UART: [ldev] CDI.KEYID = 6
1,210,365 UART: [ldev] SUBJECT.KEYID = 5
1,210,792 UART: [ldev] AUTHORITY.KEYID = 7
1,211,255 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,242,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,665 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,776 UART: ROM Fatal Error: 0x000B0005
1,328,933 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,811 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,092 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,112 UART:
192,469 UART: Running Caliptra ROM ...
193,686 UART:
193,838 UART: [state] CFI Enabled
264,685 UART: [state] LifecycleState = Production
266,490 UART: [state] DebugLocked = No
269,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,787 UART: [kat] SHA2-256
444,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,032 UART: [kat] ++
455,512 UART: [kat] sha1
466,923 UART: [kat] SHA2-256
469,634 UART: [kat] SHA2-384
474,537 UART: [kat] SHA2-512-ACC
476,881 UART: [kat] ECC-384
2,768,544 UART: [kat] HMAC-384Kdf
2,779,969 UART: [kat] LMS
3,970,244 UART: [kat] --
3,976,792 UART: [cold-reset] ++
3,978,407 UART: [fht] Storing FHT @ 0x50003400
3,991,610 UART: [idev] ++
3,992,238 UART: [idev] CDI.KEYID = 6
3,993,159 UART: [idev] SUBJECT.KEYID = 7
3,994,381 UART: [idev] UDS.KEYID = 0
3,999,793 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,143,218 UART: [idev] Erasing UDS.KEYID = 0
7,325,150 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,876 UART: [idev] --
7,349,991 UART: [ldev] ++
7,350,629 UART: [ldev] CDI.KEYID = 6
7,351,555 UART: [ldev] SUBJECT.KEYID = 5
7,352,771 UART: [ldev] AUTHORITY.KEYID = 7
7,354,006 UART: [ldev] FE.KEYID = 1
7,402,703 UART: [ldev] Erasing FE.KEYID = 1
10,735,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,341 UART: [ldev] --
13,097,396 UART: [fwproc] Waiting for Commands...
13,099,943 UART: [fwproc] Received command 0x46574c44
13,102,180 UART: [fwproc] Received Image of size 113844 bytes
13,161,159 UART: ROM Fatal Error: 0x000B0003
13,164,694 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
3,808,950 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,943,404 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,712 UART:
193,452 UART: Running Caliptra ROM ...
194,567 UART:
604,094 UART: [state] CFI Enabled
615,389 UART: [state] LifecycleState = Production
617,150 UART: [state] DebugLocked = No
618,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,851 UART: [kat] SHA2-256
792,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,125 UART: [kat] ++
803,605 UART: [kat] sha1
813,930 UART: [kat] SHA2-256
816,651 UART: [kat] SHA2-384
823,837 UART: [kat] SHA2-512-ACC
826,190 UART: [kat] ECC-384
3,109,573 UART: [kat] HMAC-384Kdf
3,120,273 UART: [kat] LMS
4,310,384 UART: [kat] --
4,313,851 UART: [cold-reset] ++
4,315,665 UART: [fht] Storing FHT @ 0x50003400
4,328,453 UART: [idev] ++
4,329,026 UART: [idev] CDI.KEYID = 6
4,330,013 UART: [idev] SUBJECT.KEYID = 7
4,331,235 UART: [idev] UDS.KEYID = 0
4,337,755 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,278 UART: [idev] Erasing UDS.KEYID = 0
7,617,451 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,606 UART: [idev] --
7,644,050 UART: [ldev] ++
7,644,642 UART: [ldev] CDI.KEYID = 6
7,645,789 UART: [ldev] SUBJECT.KEYID = 5
7,646,904 UART: [ldev] AUTHORITY.KEYID = 7
7,648,085 UART: [ldev] FE.KEYID = 1
7,658,209 UART: [ldev] Erasing FE.KEYID = 1
10,946,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,724 UART: [ldev] --
13,309,117 UART: [fwproc] Waiting for Commands...
13,311,188 UART: [fwproc] Received command 0x46574c44
13,313,434 UART: [fwproc] Received Image of size 113844 bytes
13,375,822 UART: ROM Fatal Error: 0x000B0003
13,379,339 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
4,137,266 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,124,486 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,622 UART:
192,994 UART: Running Caliptra ROM ...
194,205 UART:
194,356 UART: [state] CFI Enabled
262,989 UART: [state] LifecycleState = Production
264,762 UART: [state] DebugLocked = No
266,839 UART: [state] WD Timer not started. Device not locked for debugging
270,675 UART: [kat] SHA2-256
449,812 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,369 UART: [kat] ++
461,903 UART: [kat] sha1
473,765 UART: [kat] SHA2-256
476,843 UART: [kat] SHA2-384
483,180 UART: [kat] SHA2-512-ACC
486,129 UART: [kat] ECC-384
2,931,464 UART: [kat] HMAC-384Kdf
2,954,541 UART: [kat] LMS
3,483,998 UART: [kat] --
3,488,149 UART: [cold-reset] ++
3,490,186 UART: [fht] FHT @ 0x50003400
3,500,194 UART: [idev] ++
3,500,761 UART: [idev] CDI.KEYID = 6
3,501,676 UART: [idev] SUBJECT.KEYID = 7
3,502,889 UART: [idev] UDS.KEYID = 0
3,505,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,649,436 UART: [idev] Erasing UDS.KEYID = 0
6,008,050 UART: [idev] Sha1 KeyId Algorithm
6,031,563 UART: [idev] --
6,036,101 UART: [ldev] ++
6,036,672 UART: [ldev] CDI.KEYID = 6
6,037,583 UART: [ldev] SUBJECT.KEYID = 5
6,038,766 UART: [ldev] AUTHORITY.KEYID = 7
6,040,004 UART: [ldev] FE.KEYID = 1
6,083,841 UART: [ldev] Erasing FE.KEYID = 1
8,586,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,324,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,039 UART: [ldev] --
10,398,478 UART: [fwproc] Wait for Commands...
10,400,506 UART: [fwproc] Recv command 0x46574c44
10,402,619 UART: [fwproc] Recv'd Img size: 114168 bytes
10,464,017 UART: ROM Fatal Error: 0x000B0003
10,467,123 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,382,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,287,082 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,554 UART:
192,928 UART: Running Caliptra ROM ...
194,081 UART:
603,829 UART: [state] CFI Enabled
617,896 UART: [state] LifecycleState = Production
619,683 UART: [state] DebugLocked = No
621,606 UART: [state] WD Timer not started. Device not locked for debugging
625,047 UART: [kat] SHA2-256
804,182 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,764 UART: [kat] ++
816,304 UART: [kat] sha1
827,621 UART: [kat] SHA2-256
830,635 UART: [kat] SHA2-384
837,314 UART: [kat] SHA2-512-ACC
840,245 UART: [kat] ECC-384
3,280,592 UART: [kat] HMAC-384Kdf
3,292,995 UART: [kat] LMS
3,822,451 UART: [kat] --
3,825,961 UART: [cold-reset] ++
3,828,163 UART: [fht] FHT @ 0x50003400
3,839,464 UART: [idev] ++
3,840,027 UART: [idev] CDI.KEYID = 6
3,841,103 UART: [idev] SUBJECT.KEYID = 7
3,842,208 UART: [idev] UDS.KEYID = 0
3,845,069 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,718 UART: [idev] Erasing UDS.KEYID = 0
6,317,276 UART: [idev] Sha1 KeyId Algorithm
6,339,925 UART: [idev] --
6,342,836 UART: [ldev] ++
6,343,408 UART: [ldev] CDI.KEYID = 6
6,344,303 UART: [ldev] SUBJECT.KEYID = 5
6,345,460 UART: [ldev] AUTHORITY.KEYID = 7
6,346,749 UART: [ldev] FE.KEYID = 1
6,357,797 UART: [ldev] Erasing FE.KEYID = 1
8,831,995 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,031 UART: [ldev] --
10,621,500 UART: [fwproc] Wait for Commands...
10,624,431 UART: [fwproc] Recv command 0x46574c44
10,626,531 UART: [fwproc] Recv'd Img size: 114168 bytes
10,689,436 UART: ROM Fatal Error: 0x000B0003
10,692,572 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,697,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,473,105 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
192,201 UART:
192,575 UART: Running Caliptra ROM ...
193,767 UART:
193,925 UART: [state] CFI Enabled
262,634 UART: [state] LifecycleState = Production
264,891 UART: [state] DebugLocked = No
267,087 UART: [state] WD Timer not started. Device not locked for debugging
271,383 UART: [kat] SHA2-256
461,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,042 UART: [kat] ++
472,502 UART: [kat] sha1
485,343 UART: [kat] SHA2-256
488,347 UART: [kat] SHA2-384
493,423 UART: [kat] SHA2-512-ACC
495,981 UART: [kat] ECC-384
2,948,498 UART: [kat] HMAC-384Kdf
2,971,201 UART: [kat] LMS
3,502,939 UART: [kat] --
3,506,550 UART: [cold-reset] ++
3,507,942 UART: [fht] FHT @ 0x50003400
3,518,370 UART: [idev] ++
3,519,075 UART: [idev] CDI.KEYID = 6
3,520,029 UART: [idev] SUBJECT.KEYID = 7
3,521,265 UART: [idev] UDS.KEYID = 0
3,526,568 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,225 UART: [idev] Erasing UDS.KEYID = 0
6,031,856 UART: [idev] Sha1 KeyId Algorithm
6,054,848 UART: [idev] --
6,060,572 UART: [ldev] ++
6,061,254 UART: [ldev] CDI.KEYID = 6
6,062,144 UART: [ldev] SUBJECT.KEYID = 5
6,063,361 UART: [ldev] AUTHORITY.KEYID = 7
6,064,541 UART: [ldev] FE.KEYID = 1
6,102,284 UART: [ldev] Erasing FE.KEYID = 1
8,609,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,282 UART: [ldev] --
10,416,851 UART: [fwproc] Wait for Commands...
10,419,543 UART: [fwproc] Recv command 0x46574c44
10,421,808 UART: [fwproc] Recv'd Img size: 114168 bytes
10,510,652 UART: ROM Fatal Error: 0x000B0003
10,514,368 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,445,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,309,272 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,548 UART:
192,902 UART: Running Caliptra ROM ...
194,101 UART:
603,774 UART: [state] CFI Enabled
618,648 UART: [state] LifecycleState = Production
620,814 UART: [state] DebugLocked = No
623,670 UART: [state] WD Timer not started. Device not locked for debugging
628,652 UART: [kat] SHA2-256
818,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,344 UART: [kat] ++
829,870 UART: [kat] sha1
842,910 UART: [kat] SHA2-256
845,922 UART: [kat] SHA2-384
851,198 UART: [kat] SHA2-512-ACC
853,767 UART: [kat] ECC-384
3,295,682 UART: [kat] HMAC-384Kdf
3,308,631 UART: [kat] LMS
3,840,467 UART: [kat] --
3,845,371 UART: [cold-reset] ++
3,847,523 UART: [fht] FHT @ 0x50003400
3,859,098 UART: [idev] ++
3,859,787 UART: [idev] CDI.KEYID = 6
3,860,802 UART: [idev] SUBJECT.KEYID = 7
3,861,964 UART: [idev] UDS.KEYID = 0
3,867,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,011,660 UART: [idev] Erasing UDS.KEYID = 0
6,335,824 UART: [idev] Sha1 KeyId Algorithm
6,358,374 UART: [idev] --
6,363,718 UART: [ldev] ++
6,364,397 UART: [ldev] CDI.KEYID = 6
6,365,309 UART: [ldev] SUBJECT.KEYID = 5
6,366,522 UART: [ldev] AUTHORITY.KEYID = 7
6,367,712 UART: [ldev] FE.KEYID = 1
6,377,929 UART: [ldev] Erasing FE.KEYID = 1
8,854,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,758 UART: [ldev] --
10,644,400 UART: [fwproc] Wait for Commands...
10,647,346 UART: [fwproc] Recv command 0x46574c44
10,649,668 UART: [fwproc] Recv'd Img size: 114168 bytes
10,743,519 UART: ROM Fatal Error: 0x000B0003
10,747,204 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,755,548 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,524,957 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Production
86,015 UART: [state] DebugLocked = No
86,689 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,299 UART: [kat] SHA2-256
882,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,345 UART: [kat] ++
886,497 UART: [kat] sha1
890,657 UART: [kat] SHA2-256
892,595 UART: [kat] SHA2-384
895,234 UART: [kat] SHA2-512-ACC
897,135 UART: [kat] ECC-384
902,742 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,151 UART: [cold-reset] ++
1,476,641 UART: [fht] Storing FHT @ 0x50003400
1,479,496 UART: [idev] ++
1,479,664 UART: [idev] CDI.KEYID = 6
1,480,024 UART: [idev] SUBJECT.KEYID = 7
1,480,448 UART: [idev] UDS.KEYID = 0
1,480,793 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,505,812 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,400 UART: [idev] --
1,515,503 UART: [ldev] ++
1,515,671 UART: [ldev] CDI.KEYID = 6
1,516,034 UART: [ldev] SUBJECT.KEYID = 5
1,516,460 UART: [ldev] AUTHORITY.KEYID = 7
1,516,923 UART: [ldev] FE.KEYID = 1
1,522,137 UART: [ldev] Erasing FE.KEYID = 1
1,547,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,428 UART: [ldev] --
1,586,723 UART: [fwproc] Waiting for Commands...
1,587,440 UART: [fwproc] Received command 0x46574c44
1,588,231 UART: [fwproc] Received Image of size 114168 bytes
1,607,859 UART: ROM Fatal Error: 0x000B0003
1,609,016 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,461,941 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Production
85,876 UART: [state] DebugLocked = No
86,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,100 UART: [kat] SHA2-256
882,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,146 UART: [kat] ++
886,298 UART: [kat] sha1
890,656 UART: [kat] SHA2-256
892,594 UART: [kat] SHA2-384
895,409 UART: [kat] SHA2-512-ACC
897,310 UART: [kat] ECC-384
902,879 UART: [kat] HMAC-384Kdf
907,405 UART: [kat] LMS
1,475,601 UART: [kat] --
1,476,544 UART: [cold-reset] ++
1,477,086 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,829 UART: [idev] Erasing UDS.KEYID = 0
1,505,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,428 UART: [ldev] ++
1,515,596 UART: [ldev] CDI.KEYID = 6
1,515,959 UART: [ldev] SUBJECT.KEYID = 5
1,516,385 UART: [ldev] AUTHORITY.KEYID = 7
1,516,848 UART: [ldev] FE.KEYID = 1
1,522,174 UART: [ldev] Erasing FE.KEYID = 1
1,547,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,451 UART: [ldev] --
1,586,944 UART: [fwproc] Waiting for Commands...
1,587,771 UART: [fwproc] Received command 0x46574c44
1,588,562 UART: [fwproc] Received Image of size 114168 bytes
1,608,708 UART: ROM Fatal Error: 0x000B0003
1,609,865 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,462,196 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Production
85,745 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
893,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,257 UART: [kat] ++
897,409 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,290 UART: [kat] SHA2-512-ACC
908,191 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,444 UART: [kat] LMS
1,170,772 UART: [kat] --
1,171,727 UART: [cold-reset] ++
1,172,055 UART: [fht] FHT @ 0x50003400
1,174,690 UART: [idev] ++
1,174,858 UART: [idev] CDI.KEYID = 6
1,175,218 UART: [idev] SUBJECT.KEYID = 7
1,175,642 UART: [idev] UDS.KEYID = 0
1,175,987 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,718 UART: [idev] Erasing UDS.KEYID = 0
1,200,551 UART: [idev] Sha1 KeyId Algorithm
1,208,993 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,588 UART: [ldev] SUBJECT.KEYID = 5
1,211,014 UART: [ldev] AUTHORITY.KEYID = 7
1,211,477 UART: [ldev] FE.KEYID = 1
1,216,705 UART: [ldev] Erasing FE.KEYID = 1
1,242,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,747 UART: [ldev] --
1,282,018 UART: [fwproc] Wait for Commands...
1,282,714 UART: [fwproc] Recv command 0x46574c44
1,283,442 UART: [fwproc] Recv'd Img size: 114168 bytes
1,304,424 UART: ROM Fatal Error: 0x000B0003
1,305,581 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,821 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,684 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Production
86,196 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,122 UART: [kat] SHA2-256
904,062 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,583 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,236 UART: [cold-reset] ++
1,172,582 UART: [fht] FHT @ 0x50003400
1,175,347 UART: [idev] ++
1,175,515 UART: [idev] CDI.KEYID = 6
1,175,875 UART: [idev] SUBJECT.KEYID = 7
1,176,299 UART: [idev] UDS.KEYID = 0
1,176,644 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,309 UART: [idev] Erasing UDS.KEYID = 0
1,201,600 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,211,072 UART: [ldev] ++
1,211,240 UART: [ldev] CDI.KEYID = 6
1,211,603 UART: [ldev] SUBJECT.KEYID = 5
1,212,029 UART: [ldev] AUTHORITY.KEYID = 7
1,212,492 UART: [ldev] FE.KEYID = 1
1,217,764 UART: [ldev] Erasing FE.KEYID = 1
1,243,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,900 UART: [ldev] --
1,283,345 UART: [fwproc] Wait for Commands...
1,284,099 UART: [fwproc] Recv command 0x46574c44
1,284,827 UART: [fwproc] Recv'd Img size: 114168 bytes
1,304,875 UART: ROM Fatal Error: 0x000B0003
1,306,032 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,458 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,339 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Production
85,589 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,243 UART: [kat] ++
895,395 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,272 UART: [kat] SHA2-512-ACC
906,173 UART: [kat] ECC-384
916,052 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,174,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,199,483 UART: [idev] Sha1 KeyId Algorithm
1,208,367 UART: [idev] --
1,209,402 UART: [ldev] ++
1,209,570 UART: [ldev] CDI.KEYID = 6
1,209,934 UART: [ldev] SUBJECT.KEYID = 5
1,210,361 UART: [ldev] AUTHORITY.KEYID = 7
1,210,824 UART: [ldev] FE.KEYID = 1
1,216,006 UART: [ldev] Erasing FE.KEYID = 1
1,242,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,182 UART: [fwproc] Wait for Commands...
1,281,833 UART: [fwproc] Recv command 0x46574c44
1,282,566 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,609 UART: ROM Fatal Error: 0x000B0003
1,303,766 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,337 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Production
85,874 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,661 UART: [kat] SHA2-256
891,211 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,421 UART: [kat] LMS
1,168,733 UART: [kat] --
1,169,458 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,586 UART: [idev] ++
1,172,754 UART: [idev] CDI.KEYID = 6
1,173,115 UART: [idev] SUBJECT.KEYID = 7
1,173,540 UART: [idev] UDS.KEYID = 0
1,173,886 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,500 UART: [idev] Erasing UDS.KEYID = 0
1,198,532 UART: [idev] Sha1 KeyId Algorithm
1,207,320 UART: [idev] --
1,208,505 UART: [ldev] ++
1,208,673 UART: [ldev] CDI.KEYID = 6
1,209,037 UART: [ldev] SUBJECT.KEYID = 5
1,209,464 UART: [ldev] AUTHORITY.KEYID = 7
1,209,927 UART: [ldev] FE.KEYID = 1
1,214,961 UART: [ldev] Erasing FE.KEYID = 1
1,241,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,157 UART: [ldev] --
1,280,515 UART: [fwproc] Wait for Commands...
1,281,174 UART: [fwproc] Recv command 0x46574c44
1,281,907 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,346 UART: ROM Fatal Error: 0x000B0003
1,303,503 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,975 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,296 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,168 UART:
192,617 UART: Running Caliptra ROM ...
193,722 UART:
193,871 UART: [state] CFI Enabled
261,960 UART: [state] LifecycleState = Production
263,767 UART: [state] DebugLocked = No
265,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,051 UART: [kat] SHA2-256
439,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,243 UART: [kat] ++
450,854 UART: [kat] sha1
462,224 UART: [kat] SHA2-256
464,907 UART: [kat] SHA2-384
470,396 UART: [kat] SHA2-512-ACC
472,734 UART: [kat] ECC-384
2,767,436 UART: [kat] HMAC-384Kdf
2,779,427 UART: [kat] LMS
3,969,762 UART: [kat] --
3,973,621 UART: [cold-reset] ++
3,975,722 UART: [fht] Storing FHT @ 0x50003400
3,986,232 UART: [idev] ++
3,986,792 UART: [idev] CDI.KEYID = 6
3,987,731 UART: [idev] SUBJECT.KEYID = 7
3,988,998 UART: [idev] UDS.KEYID = 0
3,991,827 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,277 UART: [idev] Erasing UDS.KEYID = 0
7,325,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,190 UART: [idev] --
7,348,727 UART: [ldev] ++
7,349,294 UART: [ldev] CDI.KEYID = 6
7,350,229 UART: [ldev] SUBJECT.KEYID = 5
7,351,417 UART: [ldev] AUTHORITY.KEYID = 7
7,352,757 UART: [ldev] FE.KEYID = 1
7,380,611 UART: [ldev] Erasing FE.KEYID = 1
10,713,103 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,007,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,021,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,036,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,051,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,069,922 UART: [ldev] --
13,075,197 UART: [fwproc] Waiting for Commands...
13,077,029 UART: [fwproc] Received command 0x46574c44
13,079,240 UART: [fwproc] Received Image of size 113844 bytes
13,167,726 UART: ROM Fatal Error: 0x000B0005
13,171,191 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,787,189 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,940,281 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,541 UART:
192,926 UART: Running Caliptra ROM ...
194,423 UART:
603,865 UART: [state] CFI Enabled
618,034 UART: [state] LifecycleState = Production
619,802 UART: [state] DebugLocked = No
621,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,664 UART: [kat] SHA2-256
796,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,932 UART: [kat] ++
807,403 UART: [kat] sha1
819,578 UART: [kat] SHA2-256
822,318 UART: [kat] SHA2-384
826,671 UART: [kat] SHA2-512-ACC
829,060 UART: [kat] ECC-384
3,112,832 UART: [kat] HMAC-384Kdf
3,124,484 UART: [kat] LMS
4,314,619 UART: [kat] --
4,319,551 UART: [cold-reset] ++
4,321,006 UART: [fht] Storing FHT @ 0x50003400
4,332,219 UART: [idev] ++
4,332,833 UART: [idev] CDI.KEYID = 6
4,333,739 UART: [idev] SUBJECT.KEYID = 7
4,335,025 UART: [idev] UDS.KEYID = 0
4,337,757 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,973 UART: [idev] Erasing UDS.KEYID = 0
7,621,350 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,019 UART: [idev] --
7,646,187 UART: [ldev] ++
7,646,764 UART: [ldev] CDI.KEYID = 6
7,647,740 UART: [ldev] SUBJECT.KEYID = 5
7,648,957 UART: [ldev] AUTHORITY.KEYID = 7
7,650,191 UART: [ldev] FE.KEYID = 1
7,663,431 UART: [ldev] Erasing FE.KEYID = 1
10,948,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,138 UART: [ldev] --
13,305,325 UART: [fwproc] Waiting for Commands...
13,307,964 UART: [fwproc] Received command 0x46574c44
13,310,207 UART: [fwproc] Received Image of size 113844 bytes
13,400,602 UART: ROM Fatal Error: 0x000B0005
13,404,128 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
4,131,986 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,152,742 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,240 UART:
192,604 UART: Running Caliptra ROM ...
193,717 UART:
193,859 UART: [state] CFI Enabled
262,467 UART: [state] LifecycleState = Production
264,216 UART: [state] DebugLocked = No
265,655 UART: [state] WD Timer not started. Device not locked for debugging
269,372 UART: [kat] SHA2-256
448,495 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,092 UART: [kat] ++
460,630 UART: [kat] sha1
470,647 UART: [kat] SHA2-256
473,702 UART: [kat] SHA2-384
479,512 UART: [kat] SHA2-512-ACC
482,452 UART: [kat] ECC-384
2,926,625 UART: [kat] HMAC-384Kdf
2,950,030 UART: [kat] LMS
3,479,493 UART: [kat] --
3,483,236 UART: [cold-reset] ++
3,485,764 UART: [fht] FHT @ 0x50003400
3,497,776 UART: [idev] ++
3,498,355 UART: [idev] CDI.KEYID = 6
3,499,264 UART: [idev] SUBJECT.KEYID = 7
3,500,486 UART: [idev] UDS.KEYID = 0
3,503,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,646,893 UART: [idev] Erasing UDS.KEYID = 0
6,005,192 UART: [idev] Sha1 KeyId Algorithm
6,029,067 UART: [idev] --
6,031,672 UART: [ldev] ++
6,032,243 UART: [ldev] CDI.KEYID = 6
6,033,166 UART: [ldev] SUBJECT.KEYID = 5
6,034,327 UART: [ldev] AUTHORITY.KEYID = 7
6,035,563 UART: [ldev] FE.KEYID = 1
6,081,825 UART: [ldev] Erasing FE.KEYID = 1
8,582,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,581 UART: [ldev] --
10,376,128 UART: [fwproc] Wait for Commands...
10,377,797 UART: [fwproc] Recv command 0x46574c44
10,379,905 UART: [fwproc] Recv'd Img size: 114168 bytes
10,473,075 UART: ROM Fatal Error: 0x000B0005
10,476,157 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,362,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,254,961 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,449 UART:
192,817 UART: Running Caliptra ROM ...
193,945 UART:
603,748 UART: [state] CFI Enabled
617,705 UART: [state] LifecycleState = Production
619,417 UART: [state] DebugLocked = No
620,743 UART: [state] WD Timer not started. Device not locked for debugging
624,585 UART: [kat] SHA2-256
803,689 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,279 UART: [kat] ++
815,721 UART: [kat] sha1
826,289 UART: [kat] SHA2-256
829,294 UART: [kat] SHA2-384
835,650 UART: [kat] SHA2-512-ACC
838,637 UART: [kat] ECC-384
3,281,858 UART: [kat] HMAC-384Kdf
3,295,280 UART: [kat] LMS
3,824,789 UART: [kat] --
3,829,592 UART: [cold-reset] ++
3,831,631 UART: [fht] FHT @ 0x50003400
3,843,099 UART: [idev] ++
3,843,670 UART: [idev] CDI.KEYID = 6
3,844,685 UART: [idev] SUBJECT.KEYID = 7
3,845,783 UART: [idev] UDS.KEYID = 0
3,848,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,252 UART: [idev] Erasing UDS.KEYID = 0
6,318,299 UART: [idev] Sha1 KeyId Algorithm
6,342,087 UART: [idev] --
6,346,300 UART: [ldev] ++
6,346,872 UART: [ldev] CDI.KEYID = 6
6,347,777 UART: [ldev] SUBJECT.KEYID = 5
6,348,990 UART: [ldev] AUTHORITY.KEYID = 7
6,350,220 UART: [ldev] FE.KEYID = 1
6,360,059 UART: [ldev] Erasing FE.KEYID = 1
8,832,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,744 UART: [ldev] --
10,623,764 UART: [fwproc] Wait for Commands...
10,625,585 UART: [fwproc] Recv command 0x46574c44
10,627,630 UART: [fwproc] Recv'd Img size: 114168 bytes
10,713,186 UART: ROM Fatal Error: 0x000B0005
10,716,319 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,313 writing to cptra_bootfsm_go
3,697,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,497,436 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,000 UART:
192,368 UART: Running Caliptra ROM ...
193,552 UART:
193,709 UART: [state] CFI Enabled
264,620 UART: [state] LifecycleState = Production
266,698 UART: [state] DebugLocked = No
268,132 UART: [state] WD Timer not started. Device not locked for debugging
272,733 UART: [kat] SHA2-256
462,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,410 UART: [kat] ++
473,899 UART: [kat] sha1
484,139 UART: [kat] SHA2-256
487,148 UART: [kat] SHA2-384
493,882 UART: [kat] SHA2-512-ACC
496,494 UART: [kat] ECC-384
2,947,105 UART: [kat] HMAC-384Kdf
2,971,437 UART: [kat] LMS
3,503,185 UART: [kat] --
3,508,919 UART: [cold-reset] ++
3,510,215 UART: [fht] FHT @ 0x50003400
3,520,660 UART: [idev] ++
3,521,336 UART: [idev] CDI.KEYID = 6
3,522,352 UART: [idev] SUBJECT.KEYID = 7
3,523,457 UART: [idev] UDS.KEYID = 0
3,526,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,004 UART: [idev] Erasing UDS.KEYID = 0
6,029,682 UART: [idev] Sha1 KeyId Algorithm
6,051,414 UART: [idev] --
6,057,735 UART: [ldev] ++
6,058,420 UART: [ldev] CDI.KEYID = 6
6,059,335 UART: [ldev] SUBJECT.KEYID = 5
6,060,499 UART: [ldev] AUTHORITY.KEYID = 7
6,061,738 UART: [ldev] FE.KEYID = 1
6,102,366 UART: [ldev] Erasing FE.KEYID = 1
8,608,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,295 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,325 UART: [ldev] --
10,415,882 UART: [fwproc] Wait for Commands...
10,418,365 UART: [fwproc] Recv command 0x46574c44
10,420,689 UART: [fwproc] Recv'd Img size: 114168 bytes
10,539,863 UART: ROM Fatal Error: 0x000B0005
10,543,513 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,441,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,368,361 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,443 UART:
192,803 UART: Running Caliptra ROM ...
193,992 UART:
603,492 UART: [state] CFI Enabled
614,684 UART: [state] LifecycleState = Production
616,928 UART: [state] DebugLocked = No
618,709 UART: [state] WD Timer not started. Device not locked for debugging
624,170 UART: [kat] SHA2-256
814,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,856 UART: [kat] ++
825,365 UART: [kat] sha1
836,510 UART: [kat] SHA2-256
839,522 UART: [kat] SHA2-384
845,717 UART: [kat] SHA2-512-ACC
848,334 UART: [kat] ECC-384
3,292,034 UART: [kat] HMAC-384Kdf
3,306,453 UART: [kat] LMS
3,838,265 UART: [kat] --
3,841,574 UART: [cold-reset] ++
3,843,026 UART: [fht] FHT @ 0x50003400
3,855,899 UART: [idev] ++
3,856,573 UART: [idev] CDI.KEYID = 6
3,857,558 UART: [idev] SUBJECT.KEYID = 7
3,858,720 UART: [idev] UDS.KEYID = 0
3,861,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,964 UART: [idev] Erasing UDS.KEYID = 0
6,335,110 UART: [idev] Sha1 KeyId Algorithm
6,356,350 UART: [idev] --
6,361,865 UART: [ldev] ++
6,362,547 UART: [ldev] CDI.KEYID = 6
6,363,457 UART: [ldev] SUBJECT.KEYID = 5
6,364,674 UART: [ldev] AUTHORITY.KEYID = 7
6,365,774 UART: [ldev] FE.KEYID = 1
6,375,715 UART: [ldev] Erasing FE.KEYID = 1
8,851,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,217 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,334 UART: [ldev] --
10,643,628 UART: [fwproc] Wait for Commands...
10,646,482 UART: [fwproc] Recv command 0x46574c44
10,648,749 UART: [fwproc] Recv'd Img size: 114168 bytes
10,767,556 UART: ROM Fatal Error: 0x000B0005
10,771,222 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
3,757,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,576,669 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Production
85,895 UART: [state] DebugLocked = No
86,583 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,249 UART: [kat] SHA2-256
882,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,295 UART: [kat] ++
886,447 UART: [kat] sha1
890,643 UART: [kat] SHA2-256
892,581 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,912 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,755 UART: [fht] Storing FHT @ 0x50003400
1,479,564 UART: [idev] ++
1,479,732 UART: [idev] CDI.KEYID = 6
1,480,092 UART: [idev] SUBJECT.KEYID = 7
1,480,516 UART: [idev] UDS.KEYID = 0
1,480,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,368 UART: [idev] Erasing UDS.KEYID = 0
1,504,922 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,702 UART: [idev] --
1,514,803 UART: [ldev] ++
1,514,971 UART: [ldev] CDI.KEYID = 6
1,515,334 UART: [ldev] SUBJECT.KEYID = 5
1,515,760 UART: [ldev] AUTHORITY.KEYID = 7
1,516,223 UART: [ldev] FE.KEYID = 1
1,521,259 UART: [ldev] Erasing FE.KEYID = 1
1,546,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,980 UART: [ldev] --
1,585,411 UART: [fwproc] Waiting for Commands...
1,586,066 UART: [fwproc] Received command 0x46574c44
1,586,857 UART: [fwproc] Received Image of size 114168 bytes
1,631,800 UART: ROM Fatal Error: 0x000B0005
1,632,957 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,485,196 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Production
86,298 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,614 UART: [kat] SHA2-256
882,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,660 UART: [kat] ++
886,812 UART: [kat] sha1
891,120 UART: [kat] SHA2-256
893,058 UART: [kat] SHA2-384
895,727 UART: [kat] SHA2-512-ACC
897,628 UART: [kat] ECC-384
903,189 UART: [kat] HMAC-384Kdf
907,707 UART: [kat] LMS
1,475,903 UART: [kat] --
1,476,738 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,479,999 UART: [idev] ++
1,480,167 UART: [idev] CDI.KEYID = 6
1,480,527 UART: [idev] SUBJECT.KEYID = 7
1,480,951 UART: [idev] UDS.KEYID = 0
1,481,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,611 UART: [idev] Erasing UDS.KEYID = 0
1,504,971 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,429 UART: [idev] --
1,514,524 UART: [ldev] ++
1,514,692 UART: [ldev] CDI.KEYID = 6
1,515,055 UART: [ldev] SUBJECT.KEYID = 5
1,515,481 UART: [ldev] AUTHORITY.KEYID = 7
1,515,944 UART: [ldev] FE.KEYID = 1
1,521,246 UART: [ldev] Erasing FE.KEYID = 1
1,546,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,239 UART: [ldev] --
1,586,580 UART: [fwproc] Waiting for Commands...
1,587,195 UART: [fwproc] Received command 0x46574c44
1,587,986 UART: [fwproc] Received Image of size 114168 bytes
1,633,721 UART: ROM Fatal Error: 0x000B0005
1,634,878 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,486,335 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Production
85,893 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
893,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,617 UART: [kat] ++
897,769 UART: [kat] sha1
902,055 UART: [kat] SHA2-256
903,995 UART: [kat] SHA2-384
906,846 UART: [kat] SHA2-512-ACC
908,747 UART: [kat] ECC-384
918,196 UART: [kat] HMAC-384Kdf
922,560 UART: [kat] LMS
1,170,888 UART: [kat] --
1,171,811 UART: [cold-reset] ++
1,172,145 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,557 UART: [idev] Sha1 KeyId Algorithm
1,209,065 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,610 UART: [ldev] SUBJECT.KEYID = 5
1,211,036 UART: [ldev] AUTHORITY.KEYID = 7
1,211,499 UART: [ldev] FE.KEYID = 1
1,216,785 UART: [ldev] Erasing FE.KEYID = 1
1,243,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,297 UART: [ldev] --
1,282,656 UART: [fwproc] Wait for Commands...
1,283,394 UART: [fwproc] Recv command 0x46574c44
1,284,122 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,017 UART: ROM Fatal Error: 0x000B0005
1,330,174 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,247 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Production
85,912 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,744 UART: [kat] SHA2-256
903,684 UART: [kat] SHA2-384
906,451 UART: [kat] SHA2-512-ACC
908,352 UART: [kat] ECC-384
918,083 UART: [kat] HMAC-384Kdf
922,711 UART: [kat] LMS
1,171,039 UART: [kat] --
1,171,858 UART: [cold-reset] ++
1,172,332 UART: [fht] FHT @ 0x50003400
1,174,959 UART: [idev] ++
1,175,127 UART: [idev] CDI.KEYID = 6
1,175,487 UART: [idev] SUBJECT.KEYID = 7
1,175,911 UART: [idev] UDS.KEYID = 0
1,176,256 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,971 UART: [idev] Erasing UDS.KEYID = 0
1,200,996 UART: [idev] Sha1 KeyId Algorithm
1,209,268 UART: [idev] --
1,210,320 UART: [ldev] ++
1,210,488 UART: [ldev] CDI.KEYID = 6
1,210,851 UART: [ldev] SUBJECT.KEYID = 5
1,211,277 UART: [ldev] AUTHORITY.KEYID = 7
1,211,740 UART: [ldev] FE.KEYID = 1
1,216,782 UART: [ldev] Erasing FE.KEYID = 1
1,243,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,009 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,174 UART: [ldev] --
1,282,663 UART: [fwproc] Wait for Commands...
1,283,381 UART: [fwproc] Recv command 0x46574c44
1,284,109 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,494 UART: ROM Fatal Error: 0x000B0005
1,329,651 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,998 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,448 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,480 UART: [state] LifecycleState = Production
86,087 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,333 UART: [cold-reset] ++
1,170,701 UART: [fht] FHT @ 0x50003400
1,173,405 UART: [idev] ++
1,173,573 UART: [idev] CDI.KEYID = 6
1,173,934 UART: [idev] SUBJECT.KEYID = 7
1,174,359 UART: [idev] UDS.KEYID = 0
1,174,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,583 UART: [idev] Erasing UDS.KEYID = 0
1,199,931 UART: [idev] Sha1 KeyId Algorithm
1,208,833 UART: [idev] --
1,209,904 UART: [ldev] ++
1,210,072 UART: [ldev] CDI.KEYID = 6
1,210,436 UART: [ldev] SUBJECT.KEYID = 5
1,210,863 UART: [ldev] AUTHORITY.KEYID = 7
1,211,326 UART: [ldev] FE.KEYID = 1
1,216,492 UART: [ldev] Erasing FE.KEYID = 1
1,242,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,688 UART: [ldev] --
1,282,168 UART: [fwproc] Wait for Commands...
1,282,809 UART: [fwproc] Recv command 0x46574c44
1,283,542 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,445 UART: ROM Fatal Error: 0x000B0005
1,328,602 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,837 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Production
86,194 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,321 UART: [kat] LMS
1,169,633 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,170,900 UART: [fht] FHT @ 0x50003400
1,173,606 UART: [idev] ++
1,173,774 UART: [idev] CDI.KEYID = 6
1,174,135 UART: [idev] SUBJECT.KEYID = 7
1,174,560 UART: [idev] UDS.KEYID = 0
1,174,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,044 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,137 UART: [ldev] ++
1,210,305 UART: [ldev] CDI.KEYID = 6
1,210,669 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,244,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,297 UART: [ldev] --
1,283,667 UART: [fwproc] Wait for Commands...
1,284,264 UART: [fwproc] Recv command 0x46574c44
1,284,997 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,980 UART: ROM Fatal Error: 0x000B0005
1,331,137 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,031 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,422 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
4,874,651 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,639,625 >>> mbox cmd response: failed
16,640,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,640,796 >>> mbox cmd response: failed
16,641,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,641,382 >>> mbox cmd response: failed
Initializing fuses
2,056,941 writing to cptra_bootfsm_go
6,916,968 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,501,225 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
4,881,711 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,646,230 >>> mbox cmd response: failed
16,647,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,647,475 >>> mbox cmd response: failed
16,647,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,648,042 >>> mbox cmd response: failed
Initializing fuses
2,055,991 writing to cptra_bootfsm_go
6,914,389 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,458,873 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
5,192,496 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,810,082 >>> mbox cmd response: failed
16,810,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,811,146 >>> mbox cmd response: failed
16,811,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,811,699 >>> mbox cmd response: failed
Initializing fuses
2,057,311 writing to cptra_bootfsm_go
8,243,670 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,676,831 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
5,189,970 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,815,197 >>> mbox cmd response: failed
16,816,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,816,395 >>> mbox cmd response: failed
16,816,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,816,960 >>> mbox cmd response: failed
Initializing fuses
2,057,653 writing to cptra_bootfsm_go
8,238,521 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,671,366 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,500,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,453,740 >>> mbox cmd response: failed
12,454,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,803 >>> mbox cmd response: failed
12,455,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,375 >>> mbox cmd response: failed
Initializing fuses
2,054,446 writing to cptra_bootfsm_go
5,500,132 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,319,568 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,486,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,471,314 >>> mbox cmd response: failed
12,472,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,408 >>> mbox cmd response: failed
12,472,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,984 >>> mbox cmd response: failed
Initializing fuses
2,061,473 writing to cptra_bootfsm_go
5,494,192 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,306,562 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
3,791,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,680,041 >>> mbox cmd response: failed
12,680,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,184 >>> mbox cmd response: failed
12,681,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,681,750 >>> mbox cmd response: failed
Initializing fuses
2,058,092 writing to cptra_bootfsm_go
10,968,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,687,248 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
3,780,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,650,894 >>> mbox cmd response: failed
12,651,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,651,785 >>> mbox cmd response: failed
12,652,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,652,400 >>> mbox cmd response: failed
Initializing fuses
2,058,773 writing to cptra_bootfsm_go
10,992,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,705,686 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,444,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,439,557 >>> mbox cmd response: failed
12,440,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,440,753 >>> mbox cmd response: failed
12,441,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,441,329 >>> mbox cmd response: failed
Initializing fuses
2,063,313 writing to cptra_bootfsm_go
5,503,504 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,329,171 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,485,783 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,454,234 >>> mbox cmd response: failed
12,454,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,278 >>> mbox cmd response: failed
12,455,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,843 >>> mbox cmd response: failed
Initializing fuses
2,058,754 writing to cptra_bootfsm_go
5,487,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,315,628 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,780,102 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,639,254 >>> mbox cmd response: failed
12,639,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,640,178 >>> mbox cmd response: failed
12,640,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,640,750 >>> mbox cmd response: failed
Initializing fuses
2,055,473 writing to cptra_bootfsm_go
11,014,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,744,910 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,779,324 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,643,725 >>> mbox cmd response: failed
12,644,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,644,824 >>> mbox cmd response: failed
12,645,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,645,385 >>> mbox cmd response: failed
Initializing fuses
2,061,905 writing to cptra_bootfsm_go
10,993,080 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,692,954 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,207,956 >>> mbox cmd response: failed
1,207,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,962 >>> mbox cmd response: failed
1,207,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,968 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
86,809 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,841 UART: [kat] SHA2-256
892,779 UART: [kat] SHA2-384
895,338 UART: [kat] SHA2-512-ACC
897,239 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
906,876 UART: [kat] LMS
1,475,072 UART: [kat] --
1,476,215 UART: [cold-reset] ++
1,476,559 UART: [fht] Storing FHT @ 0x50003400
1,479,462 UART: [idev] ++
1,479,630 UART: [idev] CDI.KEYID = 6
1,479,990 UART: [idev] SUBJECT.KEYID = 7
1,480,414 UART: [idev] UDS.KEYID = 0
1,480,759 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,505,444 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,198 UART: [idev] --
1,515,005 UART: [ldev] ++
1,515,173 UART: [ldev] CDI.KEYID = 6
1,515,536 UART: [ldev] SUBJECT.KEYID = 5
1,515,962 UART: [ldev] AUTHORITY.KEYID = 7
1,516,425 UART: [ldev] FE.KEYID = 1
1,521,795 UART: [ldev] Erasing FE.KEYID = 1
1,547,134 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,150 UART: [ldev] --
1,586,427 UART: [fwproc] Waiting for Commands...
1,587,042 UART: [fwproc] Received command 0x46574c44
1,587,833 UART: [fwproc] Received Image of size 114168 bytes
2,883,808 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,666 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,651 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,363 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,207,126 >>> mbox cmd response: failed
1,207,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,132 >>> mbox cmd response: failed
1,207,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,481 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,207,467 >>> mbox cmd response: failed
1,207,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,473 >>> mbox cmd response: failed
1,207,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,342 UART: [kat] SHA2-256
882,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,388 UART: [kat] ++
886,540 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,525 UART: [kat] SHA2-512-ACC
897,426 UART: [kat] ECC-384
903,169 UART: [kat] HMAC-384Kdf
907,641 UART: [kat] LMS
1,475,837 UART: [kat] --
1,476,396 UART: [cold-reset] ++
1,476,882 UART: [fht] Storing FHT @ 0x50003400
1,479,703 UART: [idev] ++
1,479,871 UART: [idev] CDI.KEYID = 6
1,480,231 UART: [idev] SUBJECT.KEYID = 7
1,480,655 UART: [idev] UDS.KEYID = 0
1,481,000 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,823 UART: [idev] Erasing UDS.KEYID = 0
1,505,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,841 UART: [idev] --
1,514,870 UART: [ldev] ++
1,515,038 UART: [ldev] CDI.KEYID = 6
1,515,401 UART: [ldev] SUBJECT.KEYID = 5
1,515,827 UART: [ldev] AUTHORITY.KEYID = 7
1,516,290 UART: [ldev] FE.KEYID = 1
1,521,512 UART: [ldev] Erasing FE.KEYID = 1
1,546,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,373 UART: [ldev] --
1,585,644 UART: [fwproc] Waiting for Commands...
1,586,507 UART: [fwproc] Received command 0x46574c44
1,587,298 UART: [fwproc] Received Image of size 114168 bytes
2,882,405 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,523 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,522 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,698 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,206,923 >>> mbox cmd response: failed
1,206,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,929 >>> mbox cmd response: failed
1,206,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,798 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,929,132 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,209 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,206,824 >>> mbox cmd response: failed
1,206,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,830 >>> mbox cmd response: failed
1,206,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
893,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,541 UART: [kat] ++
897,693 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,592 UART: [kat] SHA2-512-ACC
908,493 UART: [kat] ECC-384
918,334 UART: [kat] HMAC-384Kdf
923,074 UART: [kat] LMS
1,171,402 UART: [kat] --
1,172,355 UART: [cold-reset] ++
1,172,925 UART: [fht] FHT @ 0x50003400
1,175,590 UART: [idev] ++
1,175,758 UART: [idev] CDI.KEYID = 6
1,176,118 UART: [idev] SUBJECT.KEYID = 7
1,176,542 UART: [idev] UDS.KEYID = 0
1,176,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,614 UART: [idev] Erasing UDS.KEYID = 0
1,201,535 UART: [idev] Sha1 KeyId Algorithm
1,210,113 UART: [idev] --
1,211,045 UART: [ldev] ++
1,211,213 UART: [ldev] CDI.KEYID = 6
1,211,576 UART: [ldev] SUBJECT.KEYID = 5
1,212,002 UART: [ldev] AUTHORITY.KEYID = 7
1,212,465 UART: [ldev] FE.KEYID = 1
1,217,373 UART: [ldev] Erasing FE.KEYID = 1
1,243,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,089 UART: [ldev] --
1,283,428 UART: [fwproc] Wait for Commands...
1,284,250 UART: [fwproc] Recv command 0x46574c44
1,284,978 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,470 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,363 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,206,748 >>> mbox cmd response: failed
1,206,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,754 >>> mbox cmd response: failed
1,206,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,677 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,209,091 >>> mbox cmd response: failed
1,209,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,097 >>> mbox cmd response: failed
1,209,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,854 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
893,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,878 UART: [kat] ++
898,030 UART: [kat] sha1
902,198 UART: [kat] SHA2-256
904,138 UART: [kat] SHA2-384
906,727 UART: [kat] SHA2-512-ACC
908,628 UART: [kat] ECC-384
918,763 UART: [kat] HMAC-384Kdf
923,367 UART: [kat] LMS
1,171,695 UART: [kat] --
1,172,698 UART: [cold-reset] ++
1,173,068 UART: [fht] FHT @ 0x50003400
1,175,803 UART: [idev] ++
1,175,971 UART: [idev] CDI.KEYID = 6
1,176,331 UART: [idev] SUBJECT.KEYID = 7
1,176,755 UART: [idev] UDS.KEYID = 0
1,177,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,513 UART: [idev] Erasing UDS.KEYID = 0
1,201,224 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,838 UART: [ldev] Erasing FE.KEYID = 1
1,243,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,770 UART: [ldev] --
1,283,219 UART: [fwproc] Wait for Commands...
1,283,885 UART: [fwproc] Recv command 0x46574c44
1,284,613 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,505 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,207,655 >>> mbox cmd response: failed
1,207,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,661 >>> mbox cmd response: failed
1,207,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,362 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,732 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,713 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,206,380 >>> mbox cmd response: failed
1,206,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,386 >>> mbox cmd response: failed
1,206,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,722 UART: [state] LifecycleState = Unprovisioned
86,377 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,038 UART: [kat] SHA2-256
891,588 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,717 UART: [kat] ++
895,869 UART: [kat] sha1
900,209 UART: [kat] SHA2-256
902,149 UART: [kat] SHA2-384
904,990 UART: [kat] SHA2-512-ACC
906,891 UART: [kat] ECC-384
916,594 UART: [kat] HMAC-384Kdf
921,056 UART: [kat] LMS
1,169,368 UART: [kat] --
1,170,169 UART: [cold-reset] ++
1,170,733 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,174,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,209 UART: [idev] Erasing UDS.KEYID = 0
1,199,169 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,912 UART: [fwproc] Wait for Commands...
1,281,631 UART: [fwproc] Recv command 0x46574c44
1,282,364 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,007 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,251 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,560 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,078 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,208,262 >>> mbox cmd response: failed
1,208,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,268 >>> mbox cmd response: failed
1,208,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,846 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,208,775 >>> mbox cmd response: failed
1,208,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,781 >>> mbox cmd response: failed
1,208,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,787 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,762 UART: [kat] SHA2-256
901,702 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
916,217 UART: [kat] HMAC-384Kdf
920,939 UART: [kat] LMS
1,169,251 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,308 UART: [idev] ++
1,173,476 UART: [idev] CDI.KEYID = 6
1,173,837 UART: [idev] SUBJECT.KEYID = 7
1,174,262 UART: [idev] UDS.KEYID = 0
1,174,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,200,012 UART: [idev] Sha1 KeyId Algorithm
1,208,938 UART: [idev] --
1,209,875 UART: [ldev] ++
1,210,043 UART: [ldev] CDI.KEYID = 6
1,210,407 UART: [ldev] SUBJECT.KEYID = 5
1,210,834 UART: [ldev] AUTHORITY.KEYID = 7
1,211,297 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,357 UART: [ldev] --
1,281,671 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,181 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,789 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,267 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,208,031 >>> mbox cmd response: failed
1,208,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,037 >>> mbox cmd response: failed
1,208,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,043 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,927 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,815 writing to cptra_bootfsm_go
193,107 UART:
193,465 UART: Running Caliptra ROM ...
194,557 UART:
194,698 UART: [state] CFI Enabled
261,173 UART: [state] LifecycleState = Unprovisioned
263,139 UART: [state] DebugLocked = No
265,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,883 UART: [kat] SHA2-256
440,637 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,121 UART: [kat] ++
451,599 UART: [kat] sha1
462,368 UART: [kat] SHA2-256
465,051 UART: [kat] SHA2-384
469,802 UART: [kat] SHA2-512-ACC
472,198 UART: [kat] ECC-384
2,767,165 UART: [kat] HMAC-384Kdf
2,799,943 UART: [kat] LMS
3,990,253 UART: [kat] --
3,995,189 UART: [cold-reset] ++
3,997,559 UART: [fht] Storing FHT @ 0x50003400
4,009,047 UART: [idev] ++
4,009,666 UART: [idev] CDI.KEYID = 6
4,010,613 UART: [idev] SUBJECT.KEYID = 7
4,011,791 UART: [idev] UDS.KEYID = 0
4,014,744 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,158,031 UART: [idev] Erasing UDS.KEYID = 0
7,344,983 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,743 UART: [idev] --
7,370,336 UART: [ldev] ++
7,370,914 UART: [ldev] CDI.KEYID = 6
7,371,885 UART: [ldev] SUBJECT.KEYID = 5
7,373,099 UART: [ldev] AUTHORITY.KEYID = 7
7,374,332 UART: [ldev] FE.KEYID = 1
7,419,969 UART: [ldev] Erasing FE.KEYID = 1
10,753,658 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,655 UART: [ldev] --
13,134,387 UART: [fwproc] Waiting for Commands...
13,136,547 UART: [fwproc] Received command 0x46574c44
13,138,734 UART: [fwproc] Received Image of size 113844 bytes
16,076,218 UART: ROM Fatal Error: 0x000B0014
16,079,668 >>> mbox cmd response: failed
16,080,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,080,341 >>> mbox cmd response: failed
16,080,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,080,905 >>> mbox cmd response: failed
Initializing fuses
2,051,702 writing to cptra_bootfsm_go
2,241,024 UART:
2,241,384 UART: Running Caliptra ROM ...
2,242,430 UART:
2,242,586 UART: [state] CFI Enabled
2,310,077 UART: [state] LifecycleState = Unprovisioned
2,311,976 UART: [state] DebugLocked = No
2,314,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,539 UART: [kat] SHA2-256
2,489,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,777 UART: [kat] ++
2,500,253 UART: [kat] sha1
2,511,141 UART: [kat] SHA2-256
2,513,843 UART: [kat] SHA2-384
2,519,620 UART: [kat] SHA2-512-ACC
2,521,969 UART: [kat] ECC-384
4,815,173 UART: [kat] HMAC-384Kdf
4,847,792 UART: [kat] LMS
6,038,063 UART: [kat] --
6,044,164 UART: [cold-reset] ++
6,045,179 UART: [fht] Storing FHT @ 0x50003400
6,056,125 UART: [idev] ++
6,056,748 UART: [idev] CDI.KEYID = 6
6,057,634 UART: [idev] SUBJECT.KEYID = 7
6,058,907 UART: [idev] UDS.KEYID = 0
6,061,581 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,205,284 UART: [idev] Erasing UDS.KEYID = 0
9,396,557 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,161 UART: [idev] --
9,422,922 UART: [ldev] ++
9,423,498 UART: [ldev] CDI.KEYID = 6
9,424,411 UART: [ldev] SUBJECT.KEYID = 5
9,425,668 UART: [ldev] AUTHORITY.KEYID = 7
9,426,926 UART: [ldev] FE.KEYID = 1
9,471,345 UART: [ldev] Erasing FE.KEYID = 1
12,801,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,125,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,637 UART: [ldev] --
15,164,168 UART: [fwproc] Waiting for Commands...
15,165,837 UART: [fwproc] Received command 0x46574c44
15,168,023 UART: [fwproc] Received Image of size 113844 bytes
19,223,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,307,590 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,376,501 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,693,161 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,807,395 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,843,966 >>> mbox cmd response: failed
15,844,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,065 >>> mbox cmd response: failed
15,845,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,635 >>> mbox cmd response: failed
Initializing fuses
2,049,928 writing to cptra_bootfsm_go
5,856,646 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,899,678 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,496 UART:
192,844 UART: Running Caliptra ROM ...
194,033 UART:
603,839 UART: [state] CFI Enabled
616,136 UART: [state] LifecycleState = Unprovisioned
618,152 UART: [state] DebugLocked = No
620,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,383 UART: [kat] SHA2-256
794,141 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,661 UART: [kat] ++
805,105 UART: [kat] sha1
815,063 UART: [kat] SHA2-256
817,745 UART: [kat] SHA2-384
823,450 UART: [kat] SHA2-512-ACC
825,813 UART: [kat] ECC-384
3,111,185 UART: [kat] HMAC-384Kdf
3,123,333 UART: [kat] LMS
4,313,405 UART: [kat] --
4,320,739 UART: [cold-reset] ++
4,323,160 UART: [fht] Storing FHT @ 0x50003400
4,334,164 UART: [idev] ++
4,334,785 UART: [idev] CDI.KEYID = 6
4,335,696 UART: [idev] SUBJECT.KEYID = 7
4,336,973 UART: [idev] UDS.KEYID = 0
4,339,789 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,966 UART: [idev] Erasing UDS.KEYID = 0
7,627,033 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,580 UART: [idev] --
7,654,084 UART: [ldev] ++
7,654,658 UART: [ldev] CDI.KEYID = 6
7,655,701 UART: [ldev] SUBJECT.KEYID = 5
7,657,066 UART: [ldev] AUTHORITY.KEYID = 7
7,658,266 UART: [ldev] FE.KEYID = 1
7,669,567 UART: [ldev] Erasing FE.KEYID = 1
10,960,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,019 UART: [ldev] --
13,320,125 UART: [fwproc] Waiting for Commands...
13,322,173 UART: [fwproc] Received command 0x46574c44
13,324,357 UART: [fwproc] Received Image of size 113844 bytes
16,263,062 UART: ROM Fatal Error: 0x000B0014
16,266,469 >>> mbox cmd response: failed
16,266,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,267,297 >>> mbox cmd response: failed
16,267,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,267,864 >>> mbox cmd response: failed
Initializing fuses
2,053,012 writing to cptra_bootfsm_go
2,242,356 UART:
2,242,725 UART: Running Caliptra ROM ...
2,243,863 UART:
4,201,240 UART: [state] CFI Enabled
4,215,561 UART: [state] LifecycleState = Unprovisioned
4,217,477 UART: [state] DebugLocked = No
4,219,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,225,328 UART: [kat] SHA2-256
4,395,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,405,610 UART: [kat] ++
4,406,119 UART: [kat] sha1
4,416,741 UART: [kat] SHA2-256
4,419,452 UART: [kat] SHA2-384
4,425,713 UART: [kat] SHA2-512-ACC
4,428,066 UART: [kat] ECC-384
6,711,082 UART: [kat] HMAC-384Kdf
6,721,527 UART: [kat] LMS
7,911,652 UART: [kat] --
7,917,286 UART: [cold-reset] ++
7,919,066 UART: [fht] Storing FHT @ 0x50003400
7,930,551 UART: [idev] ++
7,931,173 UART: [idev] CDI.KEYID = 6
7,932,057 UART: [idev] SUBJECT.KEYID = 7
7,933,327 UART: [idev] UDS.KEYID = 0
7,936,202 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,079,353 UART: [idev] Erasing UDS.KEYID = 0
11,222,629 UART: [idev] Using Sha1 for KeyId Algorithm
11,244,946 UART: [idev] --
11,249,775 UART: [ldev] ++
11,250,354 UART: [ldev] CDI.KEYID = 6
11,251,324 UART: [ldev] SUBJECT.KEYID = 5
11,252,590 UART: [ldev] AUTHORITY.KEYID = 7
11,253,765 UART: [ldev] FE.KEYID = 1
11,265,386 UART: [ldev] Erasing FE.KEYID = 1
14,547,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,842,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,856,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,871,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,885,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,904,954 UART: [ldev] --
16,909,319 UART: [fwproc] Waiting for Commands...
16,911,454 UART: [fwproc] Received command 0x46574c44
16,913,661 UART: [fwproc] Received Image of size 113844 bytes
20,960,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,034,649 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,103,549 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,419,133 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,128,720 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,023,964 >>> mbox cmd response: failed
16,024,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,022 >>> mbox cmd response: failed
16,025,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,617 >>> mbox cmd response: failed
Initializing fuses
2,048,546 writing to cptra_bootfsm_go
7,976,599 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,898,085 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,242 UART:
192,608 UART: Running Caliptra ROM ...
193,783 UART:
193,937 UART: [state] CFI Enabled
263,751 UART: [state] LifecycleState = Unprovisioned
265,670 UART: [state] DebugLocked = No
268,025 UART: [state] WD Timer not started. Device not locked for debugging
271,807 UART: [kat] SHA2-256
450,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,517 UART: [kat] ++
463,045 UART: [kat] sha1
475,151 UART: [kat] SHA2-256
478,208 UART: [kat] SHA2-384
484,569 UART: [kat] SHA2-512-ACC
487,515 UART: [kat] ECC-384
2,951,449 UART: [kat] HMAC-384Kdf
2,974,820 UART: [kat] LMS
3,504,249 UART: [kat] --
3,507,861 UART: [cold-reset] ++
3,510,284 UART: [fht] FHT @ 0x50003400
3,521,631 UART: [idev] ++
3,522,223 UART: [idev] CDI.KEYID = 6
3,523,142 UART: [idev] SUBJECT.KEYID = 7
3,524,317 UART: [idev] UDS.KEYID = 0
3,527,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,989 UART: [idev] Erasing UDS.KEYID = 0
6,030,552 UART: [idev] Sha1 KeyId Algorithm
6,054,237 UART: [idev] --
6,058,083 UART: [ldev] ++
6,058,660 UART: [ldev] CDI.KEYID = 6
6,059,577 UART: [ldev] SUBJECT.KEYID = 5
6,060,760 UART: [ldev] AUTHORITY.KEYID = 7
6,061,999 UART: [ldev] FE.KEYID = 1
6,105,119 UART: [ldev] Erasing FE.KEYID = 1
8,609,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,420 UART: [ldev] --
10,419,629 UART: [fwproc] Wait for Commands...
10,422,161 UART: [fwproc] Recv command 0x46574c44
10,424,268 UART: [fwproc] Recv'd Img size: 114168 bytes
12,716,300 UART: ROM Fatal Error: 0x000B0014
12,719,442 >>> mbox cmd response: failed
12,719,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,720,257 >>> mbox cmd response: failed
12,720,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,720,880 >>> mbox cmd response: failed
Initializing fuses
2,052,647 writing to cptra_bootfsm_go
2,242,022 UART:
2,242,369 UART: Running Caliptra ROM ...
2,243,453 UART:
2,243,614 UART: [state] CFI Enabled
2,305,147 UART: [state] LifecycleState = Unprovisioned
2,306,991 UART: [state] DebugLocked = No
2,308,970 UART: [state] WD Timer not started. Device not locked for debugging
2,312,821 UART: [kat] SHA2-256
2,491,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,480 UART: [kat] ++
2,504,033 UART: [kat] sha1
2,514,937 UART: [kat] SHA2-256
2,517,951 UART: [kat] SHA2-384
2,523,661 UART: [kat] SHA2-512-ACC
2,526,659 UART: [kat] ECC-384
4,970,583 UART: [kat] HMAC-384Kdf
4,993,773 UART: [kat] LMS
5,523,238 UART: [kat] --
5,528,540 UART: [cold-reset] ++
5,529,879 UART: [fht] FHT @ 0x50003400
5,540,483 UART: [idev] ++
5,541,048 UART: [idev] CDI.KEYID = 6
5,541,936 UART: [idev] SUBJECT.KEYID = 7
5,543,149 UART: [idev] UDS.KEYID = 0
5,545,817 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,689,598 UART: [idev] Erasing UDS.KEYID = 0
8,051,333 UART: [idev] Sha1 KeyId Algorithm
8,074,183 UART: [idev] --
8,077,780 UART: [ldev] ++
8,078,365 UART: [ldev] CDI.KEYID = 6
8,079,275 UART: [ldev] SUBJECT.KEYID = 5
8,080,441 UART: [ldev] AUTHORITY.KEYID = 7
8,081,676 UART: [ldev] FE.KEYID = 1
8,123,383 UART: [ldev] Erasing FE.KEYID = 1
10,624,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,362,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,378,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,394,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,409,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,431,895 UART: [ldev] --
12,436,460 UART: [fwproc] Wait for Commands...
12,438,144 UART: [fwproc] Recv command 0x46574c44
12,440,252 UART: [fwproc] Recv'd Img size: 114168 bytes
15,838,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,907,660 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,976,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,293,819 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,382,685 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,499,871 >>> mbox cmd response: failed
12,500,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,826 >>> mbox cmd response: failed
12,501,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,389 >>> mbox cmd response: failed
Initializing fuses
2,049,122 writing to cptra_bootfsm_go
5,431,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,116,362 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,672 UART:
193,022 UART: Running Caliptra ROM ...
194,160 UART:
603,887 UART: [state] CFI Enabled
617,520 UART: [state] LifecycleState = Unprovisioned
619,396 UART: [state] DebugLocked = No
621,173 UART: [state] WD Timer not started. Device not locked for debugging
624,102 UART: [kat] SHA2-256
803,215 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,813 UART: [kat] ++
815,259 UART: [kat] sha1
826,727 UART: [kat] SHA2-256
829,731 UART: [kat] SHA2-384
836,204 UART: [kat] SHA2-512-ACC
839,195 UART: [kat] ECC-384
3,280,623 UART: [kat] HMAC-384Kdf
3,291,698 UART: [kat] LMS
3,821,211 UART: [kat] --
3,826,437 UART: [cold-reset] ++
3,828,473 UART: [fht] FHT @ 0x50003400
3,838,064 UART: [idev] ++
3,838,638 UART: [idev] CDI.KEYID = 6
3,839,547 UART: [idev] SUBJECT.KEYID = 7
3,840,781 UART: [idev] UDS.KEYID = 0
3,843,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,187 UART: [idev] Erasing UDS.KEYID = 0
6,309,680 UART: [idev] Sha1 KeyId Algorithm
6,332,976 UART: [idev] --
6,335,782 UART: [ldev] ++
6,336,353 UART: [ldev] CDI.KEYID = 6
6,337,243 UART: [ldev] SUBJECT.KEYID = 5
6,338,372 UART: [ldev] AUTHORITY.KEYID = 7
6,339,706 UART: [ldev] FE.KEYID = 1
6,349,840 UART: [ldev] Erasing FE.KEYID = 1
8,824,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,044 UART: [ldev] --
10,616,227 UART: [fwproc] Wait for Commands...
10,619,021 UART: [fwproc] Recv command 0x46574c44
10,621,117 UART: [fwproc] Recv'd Img size: 114168 bytes
12,908,354 UART: ROM Fatal Error: 0x000B0014
12,911,466 >>> mbox cmd response: failed
12,911,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,153 >>> mbox cmd response: failed
12,912,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,912,822 >>> mbox cmd response: failed
Initializing fuses
2,050,891 writing to cptra_bootfsm_go
2,240,174 UART:
2,240,545 UART: Running Caliptra ROM ...
2,241,589 UART:
7,557,111 UART: [state] CFI Enabled
7,569,393 UART: [state] LifecycleState = Unprovisioned
7,571,256 UART: [state] DebugLocked = No
7,573,318 UART: [state] WD Timer not started. Device not locked for debugging
7,577,542 UART: [kat] SHA2-256
7,756,643 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,768,240 UART: [kat] ++
7,768,783 UART: [kat] sha1
7,780,814 UART: [kat] SHA2-256
7,783,835 UART: [kat] SHA2-384
7,789,228 UART: [kat] SHA2-512-ACC
7,792,224 UART: [kat] ECC-384
10,233,637 UART: [kat] HMAC-384Kdf
10,246,837 UART: [kat] LMS
10,776,353 UART: [kat] --
10,781,963 UART: [cold-reset] ++
10,783,783 UART: [fht] FHT @ 0x50003400
10,793,678 UART: [idev] ++
10,794,238 UART: [idev] CDI.KEYID = 6
10,795,169 UART: [idev] SUBJECT.KEYID = 7
10,796,387 UART: [idev] UDS.KEYID = 0
10,799,059 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,942,970 UART: [idev] Erasing UDS.KEYID = 0
13,269,715 UART: [idev] Sha1 KeyId Algorithm
13,291,537 UART: [idev] --
13,296,122 UART: [ldev] ++
13,296,688 UART: [ldev] CDI.KEYID = 6
13,297,564 UART: [ldev] SUBJECT.KEYID = 5
13,298,773 UART: [ldev] AUTHORITY.KEYID = 7
13,300,061 UART: [ldev] FE.KEYID = 1
13,309,463 UART: [ldev] Erasing FE.KEYID = 1
15,782,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,503,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,519,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,535,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,550,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,571,494 UART: [ldev] --
17,576,884 UART: [fwproc] Wait for Commands...
17,579,363 UART: [fwproc] Recv command 0x46574c44
17,581,463 UART: [fwproc] Recv'd Img size: 114168 bytes
20,980,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,057,164 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,125,966 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,442,893 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,697,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,693,345 >>> mbox cmd response: failed
12,693,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,327 >>> mbox cmd response: failed
12,694,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,897 >>> mbox cmd response: failed
Initializing fuses
2,047,675 writing to cptra_bootfsm_go
10,862,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,441,745 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,431 UART:
192,780 UART: Running Caliptra ROM ...
193,981 UART:
194,132 UART: [state] CFI Enabled
264,818 UART: [state] LifecycleState = Unprovisioned
267,235 UART: [state] DebugLocked = No
268,945 UART: [state] WD Timer not started. Device not locked for debugging
273,991 UART: [kat] SHA2-256
463,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,622 UART: [kat] ++
475,103 UART: [kat] sha1
487,061 UART: [kat] SHA2-256
490,083 UART: [kat] SHA2-384
495,649 UART: [kat] SHA2-512-ACC
498,210 UART: [kat] ECC-384
2,948,385 UART: [kat] HMAC-384Kdf
2,971,589 UART: [kat] LMS
3,503,364 UART: [kat] --
3,506,996 UART: [cold-reset] ++
3,509,526 UART: [fht] FHT @ 0x50003400
3,521,264 UART: [idev] ++
3,521,948 UART: [idev] CDI.KEYID = 6
3,522,919 UART: [idev] SUBJECT.KEYID = 7
3,524,020 UART: [idev] UDS.KEYID = 0
3,526,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,716 UART: [idev] Erasing UDS.KEYID = 0
6,030,131 UART: [idev] Sha1 KeyId Algorithm
6,052,196 UART: [idev] --
6,056,838 UART: [ldev] ++
6,057,522 UART: [ldev] CDI.KEYID = 6
6,058,434 UART: [ldev] SUBJECT.KEYID = 5
6,059,619 UART: [ldev] AUTHORITY.KEYID = 7
6,060,797 UART: [ldev] FE.KEYID = 1
6,101,118 UART: [ldev] Erasing FE.KEYID = 1
8,611,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,034 UART: [ldev] --
10,413,707 UART: [fwproc] Wait for Commands...
10,415,643 UART: [fwproc] Recv command 0x46574c44
10,417,962 UART: [fwproc] Recv'd Img size: 114168 bytes
12,747,179 UART: ROM Fatal Error: 0x000B0014
12,750,848 >>> mbox cmd response: failed
12,751,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,751,601 >>> mbox cmd response: failed
12,751,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,752,188 >>> mbox cmd response: failed
Initializing fuses
2,052,820 writing to cptra_bootfsm_go
2,242,143 UART:
2,242,491 UART: Running Caliptra ROM ...
2,243,538 UART:
2,243,690 UART: [state] CFI Enabled
2,318,518 UART: [state] LifecycleState = Unprovisioned
2,320,897 UART: [state] DebugLocked = No
2,322,295 UART: [state] WD Timer not started. Device not locked for debugging
2,326,177 UART: [kat] SHA2-256
2,516,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,852 UART: [kat] ++
2,527,404 UART: [kat] sha1
2,539,482 UART: [kat] SHA2-256
2,542,507 UART: [kat] SHA2-384
2,546,989 UART: [kat] SHA2-512-ACC
2,549,560 UART: [kat] ECC-384
5,000,029 UART: [kat] HMAC-384Kdf
5,024,799 UART: [kat] LMS
5,556,585 UART: [kat] --
5,561,663 UART: [cold-reset] ++
5,564,193 UART: [fht] FHT @ 0x50003400
5,574,695 UART: [idev] ++
5,575,374 UART: [idev] CDI.KEYID = 6
5,576,341 UART: [idev] SUBJECT.KEYID = 7
5,577,555 UART: [idev] UDS.KEYID = 0
5,580,091 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,723,827 UART: [idev] Erasing UDS.KEYID = 0
8,095,201 UART: [idev] Sha1 KeyId Algorithm
8,117,529 UART: [idev] --
8,122,257 UART: [ldev] ++
8,122,948 UART: [ldev] CDI.KEYID = 6
8,123,835 UART: [ldev] SUBJECT.KEYID = 5
8,125,051 UART: [ldev] AUTHORITY.KEYID = 7
8,126,232 UART: [ldev] FE.KEYID = 1
8,165,530 UART: [ldev] Erasing FE.KEYID = 1
10,675,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,409,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,424,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,439,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,454,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,475,321 UART: [ldev] --
12,480,120 UART: [fwproc] Wait for Commands...
12,483,112 UART: [fwproc] Recv command 0x46574c44
12,485,382 UART: [fwproc] Recv'd Img size: 114168 bytes
15,926,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,005,679 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,121,808 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,663,663 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,442,419 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,650,562 >>> mbox cmd response: failed
12,651,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,651,445 >>> mbox cmd response: failed
12,651,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,652,010 >>> mbox cmd response: failed
Initializing fuses
2,050,729 writing to cptra_bootfsm_go
5,464,948 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,787,211 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,549 UART:
192,906 UART: Running Caliptra ROM ...
194,093 UART:
603,667 UART: [state] CFI Enabled
616,932 UART: [state] LifecycleState = Unprovisioned
619,306 UART: [state] DebugLocked = No
620,745 UART: [state] WD Timer not started. Device not locked for debugging
624,905 UART: [kat] SHA2-256
814,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,585 UART: [kat] ++
826,121 UART: [kat] sha1
837,489 UART: [kat] SHA2-256
840,498 UART: [kat] SHA2-384
848,043 UART: [kat] SHA2-512-ACC
850,668 UART: [kat] ECC-384
3,293,766 UART: [kat] HMAC-384Kdf
3,307,597 UART: [kat] LMS
3,839,443 UART: [kat] --
3,845,343 UART: [cold-reset] ++
3,847,720 UART: [fht] FHT @ 0x50003400
3,858,724 UART: [idev] ++
3,859,402 UART: [idev] CDI.KEYID = 6
3,860,368 UART: [idev] SUBJECT.KEYID = 7
3,861,528 UART: [idev] UDS.KEYID = 0
3,864,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,963 UART: [idev] Erasing UDS.KEYID = 0
6,340,758 UART: [idev] Sha1 KeyId Algorithm
6,363,294 UART: [idev] --
6,368,750 UART: [ldev] ++
6,369,431 UART: [ldev] CDI.KEYID = 6
6,370,346 UART: [ldev] SUBJECT.KEYID = 5
6,371,507 UART: [ldev] AUTHORITY.KEYID = 7
6,372,738 UART: [ldev] FE.KEYID = 1
6,384,098 UART: [ldev] Erasing FE.KEYID = 1
8,865,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,823 UART: [ldev] --
10,657,794 UART: [fwproc] Wait for Commands...
10,659,471 UART: [fwproc] Recv command 0x46574c44
10,661,739 UART: [fwproc] Recv'd Img size: 114168 bytes
12,988,069 UART: ROM Fatal Error: 0x000B0014
12,991,746 >>> mbox cmd response: failed
12,992,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,992,501 >>> mbox cmd response: failed
12,992,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,993,058 >>> mbox cmd response: failed
Initializing fuses
2,061,044 writing to cptra_bootfsm_go
2,250,325 UART:
2,250,679 UART: Running Caliptra ROM ...
2,251,768 UART:
7,480,296 UART: [state] CFI Enabled
7,493,712 UART: [state] LifecycleState = Unprovisioned
7,496,067 UART: [state] DebugLocked = No
7,497,944 UART: [state] WD Timer not started. Device not locked for debugging
7,502,855 UART: [kat] SHA2-256
7,692,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,703,511 UART: [kat] ++
7,704,002 UART: [kat] sha1
7,715,545 UART: [kat] SHA2-256
7,718,609 UART: [kat] SHA2-384
7,723,850 UART: [kat] SHA2-512-ACC
7,726,445 UART: [kat] ECC-384
10,169,646 UART: [kat] HMAC-384Kdf
10,183,332 UART: [kat] LMS
10,715,158 UART: [kat] --
10,718,335 UART: [cold-reset] ++
10,719,887 UART: [fht] FHT @ 0x50003400
10,731,353 UART: [idev] ++
10,732,036 UART: [idev] CDI.KEYID = 6
10,733,055 UART: [idev] SUBJECT.KEYID = 7
10,734,216 UART: [idev] UDS.KEYID = 0
10,736,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,880,401 UART: [idev] Erasing UDS.KEYID = 0
13,212,957 UART: [idev] Sha1 KeyId Algorithm
13,235,653 UART: [idev] --
13,239,749 UART: [ldev] ++
13,240,445 UART: [ldev] CDI.KEYID = 6
13,241,378 UART: [ldev] SUBJECT.KEYID = 5
13,242,543 UART: [ldev] AUTHORITY.KEYID = 7
13,243,776 UART: [ldev] FE.KEYID = 1
13,256,021 UART: [ldev] Erasing FE.KEYID = 1
15,739,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,461,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,476,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,491,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,506,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,527,034 UART: [ldev] --
17,532,794 UART: [fwproc] Wait for Commands...
17,535,381 UART: [fwproc] Recv command 0x46574c44
17,537,648 UART: [fwproc] Recv'd Img size: 114168 bytes
20,980,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,058,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,174,461 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,715,410 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,761,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,880,990 >>> mbox cmd response: failed
12,881,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,881,889 >>> mbox cmd response: failed
12,882,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,882,442 >>> mbox cmd response: failed
Initializing fuses
2,054,881 writing to cptra_bootfsm_go
10,746,097 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,938,108 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,239 UART: [kat] SHA2-256
882,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,285 UART: [kat] ++
886,437 UART: [kat] sha1
890,753 UART: [kat] SHA2-256
892,691 UART: [kat] SHA2-384
895,546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
903,020 UART: [kat] HMAC-384Kdf
907,710 UART: [kat] LMS
1,475,906 UART: [kat] --
1,476,917 UART: [cold-reset] ++
1,477,303 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,754 UART: [idev] Erasing UDS.KEYID = 0
1,505,652 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,200 UART: [idev] --
1,515,063 UART: [ldev] ++
1,515,231 UART: [ldev] CDI.KEYID = 6
1,515,594 UART: [ldev] SUBJECT.KEYID = 5
1,516,020 UART: [ldev] AUTHORITY.KEYID = 7
1,516,483 UART: [ldev] FE.KEYID = 1
1,521,743 UART: [ldev] Erasing FE.KEYID = 1
1,546,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,216 UART: [ldev] --
1,585,699 UART: [fwproc] Waiting for Commands...
1,586,364 UART: [fwproc] Received command 0x46574c44
1,587,155 UART: [fwproc] Received Image of size 114168 bytes
1,853,069 UART: ROM Fatal Error: 0x000B0014
1,854,226 >>> mbox cmd response: failed
1,854,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,232 >>> mbox cmd response: failed
1,854,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,107 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,850 UART: [kat] SHA2-512-ACC
896,751 UART: [kat] ECC-384
902,510 UART: [kat] HMAC-384Kdf
907,002 UART: [kat] LMS
1,475,198 UART: [kat] --
1,476,143 UART: [cold-reset] ++
1,476,585 UART: [fht] Storing FHT @ 0x50003400
1,479,260 UART: [idev] ++
1,479,428 UART: [idev] CDI.KEYID = 6
1,479,788 UART: [idev] SUBJECT.KEYID = 7
1,480,212 UART: [idev] UDS.KEYID = 0
1,480,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,454 UART: [idev] Erasing UDS.KEYID = 0
1,505,342 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,826 UART: [idev] --
1,514,781 UART: [ldev] ++
1,514,949 UART: [ldev] CDI.KEYID = 6
1,515,312 UART: [ldev] SUBJECT.KEYID = 5
1,515,738 UART: [ldev] AUTHORITY.KEYID = 7
1,516,201 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,958 UART: [ldev] --
1,586,433 UART: [fwproc] Waiting for Commands...
1,587,088 UART: [fwproc] Received command 0x46574c44
1,587,879 UART: [fwproc] Received Image of size 114168 bytes
2,884,012 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,590 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,942 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,563 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,706,997 >>> mbox cmd response: failed
1,706,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,003 >>> mbox cmd response: failed
1,707,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,015 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,769 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,144 UART: [kat] SHA2-256
882,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,190 UART: [kat] ++
886,342 UART: [kat] sha1
890,494 UART: [kat] SHA2-256
892,432 UART: [kat] SHA2-384
895,065 UART: [kat] SHA2-512-ACC
896,966 UART: [kat] ECC-384
902,623 UART: [kat] HMAC-384Kdf
907,333 UART: [kat] LMS
1,475,529 UART: [kat] --
1,476,426 UART: [cold-reset] ++
1,477,000 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,699 UART: [idev] Erasing UDS.KEYID = 0
1,505,327 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,003 UART: [idev] --
1,514,928 UART: [ldev] ++
1,515,096 UART: [ldev] CDI.KEYID = 6
1,515,459 UART: [ldev] SUBJECT.KEYID = 5
1,515,885 UART: [ldev] AUTHORITY.KEYID = 7
1,516,348 UART: [ldev] FE.KEYID = 1
1,521,842 UART: [ldev] Erasing FE.KEYID = 1
1,547,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,183 UART: [ldev] --
1,586,502 UART: [fwproc] Waiting for Commands...
1,587,317 UART: [fwproc] Received command 0x46574c44
1,588,108 UART: [fwproc] Received Image of size 114168 bytes
1,853,450 UART: ROM Fatal Error: 0x000B0014
1,854,607 >>> mbox cmd response: failed
1,854,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,613 >>> mbox cmd response: failed
1,854,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,731 UART: [kat] SHA2-512-ACC
897,632 UART: [kat] ECC-384
903,151 UART: [kat] HMAC-384Kdf
907,711 UART: [kat] LMS
1,475,907 UART: [kat] --
1,476,766 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,131 UART: [idev] ++
1,480,299 UART: [idev] CDI.KEYID = 6
1,480,659 UART: [idev] SUBJECT.KEYID = 7
1,481,083 UART: [idev] UDS.KEYID = 0
1,481,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,695 UART: [idev] Erasing UDS.KEYID = 0
1,505,909 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,543 UART: [idev] --
1,515,464 UART: [ldev] ++
1,515,632 UART: [ldev] CDI.KEYID = 6
1,515,995 UART: [ldev] SUBJECT.KEYID = 5
1,516,421 UART: [ldev] AUTHORITY.KEYID = 7
1,516,884 UART: [ldev] FE.KEYID = 1
1,522,140 UART: [ldev] Erasing FE.KEYID = 1
1,547,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,113 UART: [ldev] --
1,586,552 UART: [fwproc] Waiting for Commands...
1,587,173 UART: [fwproc] Received command 0x46574c44
1,587,964 UART: [fwproc] Received Image of size 114168 bytes
2,884,935 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,583 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,474 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,708,486 >>> mbox cmd response: failed
1,708,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,492 >>> mbox cmd response: failed
1,708,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,874 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,246 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,417 UART: [kat] SHA2-256
903,357 UART: [kat] SHA2-384
905,968 UART: [kat] SHA2-512-ACC
907,869 UART: [kat] ECC-384
917,580 UART: [kat] HMAC-384Kdf
922,204 UART: [kat] LMS
1,170,532 UART: [kat] --
1,171,581 UART: [cold-reset] ++
1,171,977 UART: [fht] FHT @ 0x50003400
1,174,534 UART: [idev] ++
1,174,702 UART: [idev] CDI.KEYID = 6
1,175,062 UART: [idev] SUBJECT.KEYID = 7
1,175,486 UART: [idev] UDS.KEYID = 0
1,175,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,402 UART: [idev] Erasing UDS.KEYID = 0
1,200,449 UART: [idev] Sha1 KeyId Algorithm
1,208,759 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,494 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,216,501 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,282,014 UART: [fwproc] Wait for Commands...
1,282,790 UART: [fwproc] Recv command 0x46574c44
1,283,518 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,858 UART: ROM Fatal Error: 0x000B0014
1,550,015 >>> mbox cmd response: failed
1,550,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,021 >>> mbox cmd response: failed
1,550,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,550,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
893,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,423 UART: [kat] ++
897,575 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,372 UART: [kat] SHA2-512-ACC
908,273 UART: [kat] ECC-384
917,808 UART: [kat] HMAC-384Kdf
922,504 UART: [kat] LMS
1,170,832 UART: [kat] --
1,171,629 UART: [cold-reset] ++
1,172,199 UART: [fht] FHT @ 0x50003400
1,174,998 UART: [idev] ++
1,175,166 UART: [idev] CDI.KEYID = 6
1,175,526 UART: [idev] SUBJECT.KEYID = 7
1,175,950 UART: [idev] UDS.KEYID = 0
1,176,295 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,200,789 UART: [idev] Sha1 KeyId Algorithm
1,209,293 UART: [idev] --
1,210,239 UART: [ldev] ++
1,210,407 UART: [ldev] CDI.KEYID = 6
1,210,770 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,019 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,116 UART: [fwproc] Recv command 0x46574c44
1,283,844 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,477 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,036 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,405,974 >>> mbox cmd response: failed
1,405,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,980 >>> mbox cmd response: failed
1,405,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,621 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,655 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
893,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,814 UART: [kat] ++
897,966 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
907,029 UART: [kat] SHA2-512-ACC
908,930 UART: [kat] ECC-384
918,725 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,654 UART: [cold-reset] ++
1,173,018 UART: [fht] FHT @ 0x50003400
1,175,599 UART: [idev] ++
1,175,767 UART: [idev] CDI.KEYID = 6
1,176,127 UART: [idev] SUBJECT.KEYID = 7
1,176,551 UART: [idev] UDS.KEYID = 0
1,176,896 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,457 UART: [idev] Erasing UDS.KEYID = 0
1,201,608 UART: [idev] Sha1 KeyId Algorithm
1,210,052 UART: [idev] --
1,211,010 UART: [ldev] ++
1,211,178 UART: [ldev] CDI.KEYID = 6
1,211,541 UART: [ldev] SUBJECT.KEYID = 5
1,211,967 UART: [ldev] AUTHORITY.KEYID = 7
1,212,430 UART: [ldev] FE.KEYID = 1
1,217,526 UART: [ldev] Erasing FE.KEYID = 1
1,244,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,958 UART: [ldev] --
1,283,241 UART: [fwproc] Wait for Commands...
1,283,867 UART: [fwproc] Recv command 0x46574c44
1,284,595 UART: [fwproc] Recv'd Img size: 114168 bytes
1,551,327 UART: ROM Fatal Error: 0x000B0014
1,552,484 >>> mbox cmd response: failed
1,552,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,490 >>> mbox cmd response: failed
1,552,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
893,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,056 UART: [kat] ++
898,208 UART: [kat] sha1
902,490 UART: [kat] SHA2-256
904,430 UART: [kat] SHA2-384
907,261 UART: [kat] SHA2-512-ACC
909,162 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,227 UART: [kat] LMS
1,171,555 UART: [kat] --
1,172,442 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,589 UART: [idev] ++
1,175,757 UART: [idev] CDI.KEYID = 6
1,176,117 UART: [idev] SUBJECT.KEYID = 7
1,176,541 UART: [idev] UDS.KEYID = 0
1,176,886 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,769 UART: [idev] Erasing UDS.KEYID = 0
1,202,114 UART: [idev] Sha1 KeyId Algorithm
1,210,530 UART: [idev] --
1,211,622 UART: [ldev] ++
1,211,790 UART: [ldev] CDI.KEYID = 6
1,212,153 UART: [ldev] SUBJECT.KEYID = 5
1,212,579 UART: [ldev] AUTHORITY.KEYID = 7
1,213,042 UART: [ldev] FE.KEYID = 1
1,218,438 UART: [ldev] Erasing FE.KEYID = 1
1,244,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,882 UART: [ldev] --
1,284,303 UART: [fwproc] Wait for Commands...
1,285,113 UART: [fwproc] Recv command 0x46574c44
1,285,841 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,690 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,587 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,752 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,406,204 >>> mbox cmd response: failed
1,406,204 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,210 >>> mbox cmd response: failed
1,406,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,316 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,485 UART: [kat] ++
895,637 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
915,620 UART: [kat] HMAC-384Kdf
920,196 UART: [kat] LMS
1,168,508 UART: [kat] --
1,169,497 UART: [cold-reset] ++
1,169,967 UART: [fht] FHT @ 0x50003400
1,172,807 UART: [idev] ++
1,172,975 UART: [idev] CDI.KEYID = 6
1,173,336 UART: [idev] SUBJECT.KEYID = 7
1,173,761 UART: [idev] UDS.KEYID = 0
1,174,107 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,198,905 UART: [idev] Sha1 KeyId Algorithm
1,207,825 UART: [idev] --
1,208,844 UART: [ldev] ++
1,209,012 UART: [ldev] CDI.KEYID = 6
1,209,376 UART: [ldev] SUBJECT.KEYID = 5
1,209,803 UART: [ldev] AUTHORITY.KEYID = 7
1,210,266 UART: [ldev] FE.KEYID = 1
1,215,438 UART: [ldev] Erasing FE.KEYID = 1
1,241,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,666 UART: [ldev] --
1,281,118 UART: [fwproc] Wait for Commands...
1,281,693 UART: [fwproc] Recv command 0x46574c44
1,282,426 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,595 UART: ROM Fatal Error: 0x000B0014
1,549,752 >>> mbox cmd response: failed
1,549,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,758 >>> mbox cmd response: failed
1,549,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,203 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,174,521 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,199,303 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,208,954 UART: [ldev] ++
1,209,122 UART: [ldev] CDI.KEYID = 6
1,209,486 UART: [ldev] SUBJECT.KEYID = 5
1,209,913 UART: [ldev] AUTHORITY.KEYID = 7
1,210,376 UART: [ldev] FE.KEYID = 1
1,215,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,748 UART: [ldev] --
1,281,116 UART: [fwproc] Wait for Commands...
1,281,705 UART: [fwproc] Recv command 0x46574c44
1,282,438 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,877 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,186 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,876 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,339 >>> mbox cmd response: failed
1,401,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,345 >>> mbox cmd response: failed
1,401,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,868 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,780 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,736 UART: [kat] ++
895,888 UART: [kat] sha1
900,338 UART: [kat] SHA2-256
902,278 UART: [kat] SHA2-384
905,151 UART: [kat] SHA2-512-ACC
907,052 UART: [kat] ECC-384
916,983 UART: [kat] HMAC-384Kdf
921,681 UART: [kat] LMS
1,169,993 UART: [kat] --
1,170,830 UART: [cold-reset] ++
1,171,406 UART: [fht] FHT @ 0x50003400
1,174,088 UART: [idev] ++
1,174,256 UART: [idev] CDI.KEYID = 6
1,174,617 UART: [idev] SUBJECT.KEYID = 7
1,175,042 UART: [idev] UDS.KEYID = 0
1,175,388 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,194 UART: [idev] Erasing UDS.KEYID = 0
1,200,378 UART: [idev] Sha1 KeyId Algorithm
1,209,456 UART: [idev] --
1,210,679 UART: [ldev] ++
1,210,847 UART: [ldev] CDI.KEYID = 6
1,211,211 UART: [ldev] SUBJECT.KEYID = 5
1,211,638 UART: [ldev] AUTHORITY.KEYID = 7
1,212,101 UART: [ldev] FE.KEYID = 1
1,217,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,851 UART: [ldev] --
1,283,305 UART: [fwproc] Wait for Commands...
1,284,050 UART: [fwproc] Recv command 0x46574c44
1,284,783 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,962 UART: ROM Fatal Error: 0x000B0014
1,551,119 >>> mbox cmd response: failed
1,551,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,125 >>> mbox cmd response: failed
1,551,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,777 UART: [kat] SHA2-512-ACC
906,678 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,174,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,340 UART: [idev] Erasing UDS.KEYID = 0
1,198,790 UART: [idev] Sha1 KeyId Algorithm
1,207,502 UART: [idev] --
1,208,533 UART: [ldev] ++
1,208,701 UART: [ldev] CDI.KEYID = 6
1,209,065 UART: [ldev] SUBJECT.KEYID = 5
1,209,492 UART: [ldev] AUTHORITY.KEYID = 7
1,209,955 UART: [ldev] FE.KEYID = 1
1,215,165 UART: [ldev] Erasing FE.KEYID = 1
1,241,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,807 UART: [ldev] --
1,280,189 UART: [fwproc] Wait for Commands...
1,280,902 UART: [fwproc] Recv command 0x46574c44
1,281,635 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,368 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,279 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,368 >>> mbox cmd response: failed
1,401,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,374 >>> mbox cmd response: failed
1,401,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,380 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,039 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,115 UART:
192,604 UART: Running Caliptra ROM ...
193,710 UART:
193,855 UART: [state] CFI Enabled
262,763 UART: [state] LifecycleState = Unprovisioned
264,704 UART: [state] DebugLocked = No
266,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,537 UART: [kat] SHA2-256
440,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,749 UART: [kat] ++
451,190 UART: [kat] sha1
461,851 UART: [kat] SHA2-256
464,535 UART: [kat] SHA2-384
470,133 UART: [kat] SHA2-512-ACC
472,470 UART: [kat] ECC-384
2,769,834 UART: [kat] HMAC-384Kdf
2,801,357 UART: [kat] LMS
3,991,675 UART: [kat] --
3,996,834 UART: [cold-reset] ++
3,998,018 UART: [fht] Storing FHT @ 0x50003400
4,008,599 UART: [idev] ++
4,009,171 UART: [idev] CDI.KEYID = 6
4,010,193 UART: [idev] SUBJECT.KEYID = 7
4,011,377 UART: [idev] UDS.KEYID = 0
4,014,449 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,871 UART: [idev] Erasing UDS.KEYID = 0
7,349,868 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,190 UART: [idev] --
7,377,401 UART: [ldev] ++
7,377,979 UART: [ldev] CDI.KEYID = 6
7,378,947 UART: [ldev] SUBJECT.KEYID = 5
7,380,165 UART: [ldev] AUTHORITY.KEYID = 7
7,381,398 UART: [ldev] FE.KEYID = 1
7,426,234 UART: [ldev] Erasing FE.KEYID = 1
10,756,361 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,127 UART: [ldev] --
13,117,393 UART: [fwproc] Waiting for Commands...
13,120,354 UART: [fwproc] Received command 0x46574c44
13,122,547 UART: [fwproc] Received Image of size 113844 bytes
16,064,052 UART: ROM Fatal Error: 0x000B0023
16,067,505 >>> mbox cmd response: failed
16,067,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,068,257 >>> mbox cmd response: failed
16,068,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,068,821 >>> mbox cmd response: failed
Initializing fuses
2,069,439 writing to cptra_bootfsm_go
2,258,770 UART:
2,259,120 UART: Running Caliptra ROM ...
2,260,384 UART:
2,260,556 UART: [state] CFI Enabled
2,328,092 UART: [state] LifecycleState = Unprovisioned
2,330,030 UART: [state] DebugLocked = No
2,332,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,337,305 UART: [kat] SHA2-256
2,506,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,517,479 UART: [kat] ++
2,517,980 UART: [kat] sha1
2,528,657 UART: [kat] SHA2-256
2,531,354 UART: [kat] SHA2-384
2,537,828 UART: [kat] SHA2-512-ACC
2,540,180 UART: [kat] ECC-384
4,829,994 UART: [kat] HMAC-384Kdf
4,840,810 UART: [kat] LMS
6,031,111 UART: [kat] --
6,037,706 UART: [cold-reset] ++
6,039,997 UART: [fht] Storing FHT @ 0x50003400
6,051,277 UART: [idev] ++
6,051,856 UART: [idev] CDI.KEYID = 6
6,052,742 UART: [idev] SUBJECT.KEYID = 7
6,054,010 UART: [idev] UDS.KEYID = 0
6,056,351 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,199,636 UART: [idev] Erasing UDS.KEYID = 0
9,388,191 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,319 UART: [idev] --
9,413,802 UART: [ldev] ++
9,414,381 UART: [ldev] CDI.KEYID = 6
9,415,345 UART: [ldev] SUBJECT.KEYID = 5
9,416,596 UART: [ldev] AUTHORITY.KEYID = 7
9,417,850 UART: [ldev] FE.KEYID = 1
9,465,120 UART: [ldev] Erasing FE.KEYID = 1
12,798,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,103,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,118,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,132,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,147,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,165,483 UART: [ldev] --
15,170,158 UART: [fwproc] Waiting for Commands...
15,172,053 UART: [fwproc] Received command 0x46574c44
15,174,245 UART: [fwproc] Received Image of size 113844 bytes
19,230,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,308,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,377,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,694,807 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,784,433 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,825,881 >>> mbox cmd response: failed
15,826,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,799 >>> mbox cmd response: failed
15,827,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,357 >>> mbox cmd response: failed
Initializing fuses
2,054,838 writing to cptra_bootfsm_go
5,829,416 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,891,494 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,690 UART:
193,067 UART: Running Caliptra ROM ...
194,262 UART:
604,054 UART: [state] CFI Enabled
616,319 UART: [state] LifecycleState = Unprovisioned
618,259 UART: [state] DebugLocked = No
620,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,910 UART: [kat] SHA2-256
794,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,166 UART: [kat] ++
805,614 UART: [kat] sha1
817,680 UART: [kat] SHA2-256
820,424 UART: [kat] SHA2-384
826,080 UART: [kat] SHA2-512-ACC
828,424 UART: [kat] ECC-384
3,112,808 UART: [kat] HMAC-384Kdf
3,124,181 UART: [kat] LMS
4,314,297 UART: [kat] --
4,318,575 UART: [cold-reset] ++
4,320,942 UART: [fht] Storing FHT @ 0x50003400
4,333,671 UART: [idev] ++
4,334,234 UART: [idev] CDI.KEYID = 6
4,335,249 UART: [idev] SUBJECT.KEYID = 7
4,336,475 UART: [idev] UDS.KEYID = 0
4,339,263 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,469 UART: [idev] Erasing UDS.KEYID = 0
7,624,947 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,169 UART: [idev] --
7,650,650 UART: [ldev] ++
7,651,223 UART: [ldev] CDI.KEYID = 6
7,652,190 UART: [ldev] SUBJECT.KEYID = 5
7,653,404 UART: [ldev] AUTHORITY.KEYID = 7
7,654,635 UART: [ldev] FE.KEYID = 1
7,664,493 UART: [ldev] Erasing FE.KEYID = 1
10,951,117 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,031 UART: [ldev] --
13,309,220 UART: [fwproc] Waiting for Commands...
13,311,372 UART: [fwproc] Received command 0x46574c44
13,313,566 UART: [fwproc] Received Image of size 113844 bytes
16,252,087 UART: ROM Fatal Error: 0x000B0023
16,255,495 >>> mbox cmd response: failed
16,255,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,256,208 >>> mbox cmd response: failed
16,256,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,256,818 >>> mbox cmd response: failed
Initializing fuses
2,055,325 writing to cptra_bootfsm_go
2,244,646 UART:
2,245,004 UART: Running Caliptra ROM ...
2,246,153 UART:
4,198,461 UART: [state] CFI Enabled
4,212,436 UART: [state] LifecycleState = Unprovisioned
4,214,343 UART: [state] DebugLocked = No
4,217,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,222,834 UART: [kat] SHA2-256
4,392,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,403,134 UART: [kat] ++
4,403,622 UART: [kat] sha1
4,413,809 UART: [kat] SHA2-256
4,416,520 UART: [kat] SHA2-384
4,421,658 UART: [kat] SHA2-512-ACC
4,424,009 UART: [kat] ECC-384
6,708,909 UART: [kat] HMAC-384Kdf
6,720,809 UART: [kat] LMS
7,910,903 UART: [kat] --
7,915,298 UART: [cold-reset] ++
7,916,642 UART: [fht] Storing FHT @ 0x50003400
7,927,328 UART: [idev] ++
7,927,899 UART: [idev] CDI.KEYID = 6
7,928,917 UART: [idev] SUBJECT.KEYID = 7
7,930,115 UART: [idev] UDS.KEYID = 0
7,932,311 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,075,427 UART: [idev] Erasing UDS.KEYID = 0
11,220,613 UART: [idev] Using Sha1 for KeyId Algorithm
11,241,290 UART: [idev] --
11,245,842 UART: [ldev] ++
11,246,410 UART: [ldev] CDI.KEYID = 6
11,247,425 UART: [ldev] SUBJECT.KEYID = 5
11,248,629 UART: [ldev] AUTHORITY.KEYID = 7
11,249,867 UART: [ldev] FE.KEYID = 1
11,260,422 UART: [ldev] Erasing FE.KEYID = 1
14,544,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,837,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,851,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,866,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,881,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,901,452 UART: [ldev] --
16,906,604 UART: [fwproc] Waiting for Commands...
16,908,809 UART: [fwproc] Received command 0x46574c44
16,910,999 UART: [fwproc] Received Image of size 113844 bytes
20,957,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,029,550 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,098,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,414,107 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,131,883 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,046,607 >>> mbox cmd response: failed
16,047,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,047,519 >>> mbox cmd response: failed
16,047,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,048,087 >>> mbox cmd response: failed
Initializing fuses
2,054,971 writing to cptra_bootfsm_go
7,944,002 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,874,845 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,074 UART:
192,465 UART: Running Caliptra ROM ...
193,576 UART:
193,717 UART: [state] CFI Enabled
260,716 UART: [state] LifecycleState = Unprovisioned
262,600 UART: [state] DebugLocked = No
264,419 UART: [state] WD Timer not started. Device not locked for debugging
268,193 UART: [kat] SHA2-256
447,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,887 UART: [kat] ++
459,426 UART: [kat] sha1
469,011 UART: [kat] SHA2-256
472,014 UART: [kat] SHA2-384
479,020 UART: [kat] SHA2-512-ACC
482,010 UART: [kat] ECC-384
2,945,753 UART: [kat] HMAC-384Kdf
2,969,553 UART: [kat] LMS
3,499,001 UART: [kat] --
3,501,782 UART: [cold-reset] ++
3,502,646 UART: [fht] FHT @ 0x50003400
3,513,520 UART: [idev] ++
3,514,105 UART: [idev] CDI.KEYID = 6
3,515,021 UART: [idev] SUBJECT.KEYID = 7
3,516,243 UART: [idev] UDS.KEYID = 0
3,518,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,662,613 UART: [idev] Erasing UDS.KEYID = 0
6,025,128 UART: [idev] Sha1 KeyId Algorithm
6,048,543 UART: [idev] --
6,052,494 UART: [ldev] ++
6,053,067 UART: [ldev] CDI.KEYID = 6
6,053,979 UART: [ldev] SUBJECT.KEYID = 5
6,055,148 UART: [ldev] AUTHORITY.KEYID = 7
6,056,383 UART: [ldev] FE.KEYID = 1
6,096,694 UART: [ldev] Erasing FE.KEYID = 1
8,601,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,284 UART: [ldev] --
10,411,598 UART: [fwproc] Wait for Commands...
10,413,479 UART: [fwproc] Recv command 0x46574c44
10,415,621 UART: [fwproc] Recv'd Img size: 114168 bytes
12,703,746 UART: ROM Fatal Error: 0x000B0023
12,706,871 >>> mbox cmd response: failed
12,707,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,707,643 >>> mbox cmd response: failed
12,707,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,708,285 >>> mbox cmd response: failed
Initializing fuses
2,053,404 writing to cptra_bootfsm_go
2,242,768 UART:
2,243,124 UART: Running Caliptra ROM ...
2,244,257 UART:
2,244,420 UART: [state] CFI Enabled
2,309,354 UART: [state] LifecycleState = Unprovisioned
2,311,238 UART: [state] DebugLocked = No
2,312,742 UART: [state] WD Timer not started. Device not locked for debugging
2,316,060 UART: [kat] SHA2-256
2,495,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,748 UART: [kat] ++
2,507,211 UART: [kat] sha1
2,517,124 UART: [kat] SHA2-256
2,520,145 UART: [kat] SHA2-384
2,526,406 UART: [kat] SHA2-512-ACC
2,529,401 UART: [kat] ECC-384
4,993,392 UART: [kat] HMAC-384Kdf
5,017,869 UART: [kat] LMS
5,547,322 UART: [kat] --
5,552,213 UART: [cold-reset] ++
5,553,447 UART: [fht] FHT @ 0x50003400
5,565,595 UART: [idev] ++
5,566,161 UART: [idev] CDI.KEYID = 6
5,567,045 UART: [idev] SUBJECT.KEYID = 7
5,568,265 UART: [idev] UDS.KEYID = 0
5,570,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,714,179 UART: [idev] Erasing UDS.KEYID = 0
8,070,769 UART: [idev] Sha1 KeyId Algorithm
8,094,504 UART: [idev] --
8,099,583 UART: [ldev] ++
8,100,164 UART: [ldev] CDI.KEYID = 6
8,101,079 UART: [ldev] SUBJECT.KEYID = 5
8,102,241 UART: [ldev] AUTHORITY.KEYID = 7
8,103,497 UART: [ldev] FE.KEYID = 1
8,145,816 UART: [ldev] Erasing FE.KEYID = 1
10,650,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,405 UART: [ldev] --
12,459,543 UART: [fwproc] Wait for Commands...
12,462,127 UART: [fwproc] Recv command 0x46574c44
12,464,222 UART: [fwproc] Recv'd Img size: 114168 bytes
15,861,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,928,763 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,997,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,314,189 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,384,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,491,187 >>> mbox cmd response: failed
12,492,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,492,476 >>> mbox cmd response: failed
12,492,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,493,043 >>> mbox cmd response: failed
Initializing fuses
2,058,638 writing to cptra_bootfsm_go
5,439,799 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,125,590 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,581 UART:
192,959 UART: Running Caliptra ROM ...
194,084 UART:
603,550 UART: [state] CFI Enabled
620,617 UART: [state] LifecycleState = Unprovisioned
622,437 UART: [state] DebugLocked = No
624,377 UART: [state] WD Timer not started. Device not locked for debugging
628,900 UART: [kat] SHA2-256
808,043 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,635 UART: [kat] ++
820,087 UART: [kat] sha1
831,238 UART: [kat] SHA2-256
834,246 UART: [kat] SHA2-384
840,438 UART: [kat] SHA2-512-ACC
843,382 UART: [kat] ECC-384
3,283,328 UART: [kat] HMAC-384Kdf
3,296,641 UART: [kat] LMS
3,826,122 UART: [kat] --
3,830,835 UART: [cold-reset] ++
3,832,932 UART: [fht] FHT @ 0x50003400
3,843,800 UART: [idev] ++
3,844,368 UART: [idev] CDI.KEYID = 6
3,845,253 UART: [idev] SUBJECT.KEYID = 7
3,846,469 UART: [idev] UDS.KEYID = 0
3,848,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,471 UART: [idev] Erasing UDS.KEYID = 0
6,323,201 UART: [idev] Sha1 KeyId Algorithm
6,347,672 UART: [idev] --
6,351,374 UART: [ldev] ++
6,351,952 UART: [ldev] CDI.KEYID = 6
6,352,868 UART: [ldev] SUBJECT.KEYID = 5
6,354,028 UART: [ldev] AUTHORITY.KEYID = 7
6,355,265 UART: [ldev] FE.KEYID = 1
6,365,647 UART: [ldev] Erasing FE.KEYID = 1
8,836,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,788 UART: [ldev] --
10,629,457 UART: [fwproc] Wait for Commands...
10,632,385 UART: [fwproc] Recv command 0x46574c44
10,634,490 UART: [fwproc] Recv'd Img size: 114168 bytes
12,930,201 UART: ROM Fatal Error: 0x000B0023
12,933,333 >>> mbox cmd response: failed
12,933,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,124 >>> mbox cmd response: failed
12,934,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,727 >>> mbox cmd response: failed
Initializing fuses
2,054,338 writing to cptra_bootfsm_go
2,243,653 UART:
2,243,985 UART: Running Caliptra ROM ...
2,245,130 UART:
7,522,084 UART: [state] CFI Enabled
7,536,261 UART: [state] LifecycleState = Unprovisioned
7,538,130 UART: [state] DebugLocked = No
7,539,576 UART: [state] WD Timer not started. Device not locked for debugging
7,542,784 UART: [kat] SHA2-256
7,721,890 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,733,482 UART: [kat] ++
7,734,030 UART: [kat] sha1
7,746,278 UART: [kat] SHA2-256
7,749,306 UART: [kat] SHA2-384
7,755,029 UART: [kat] SHA2-512-ACC
7,757,975 UART: [kat] ECC-384
10,198,571 UART: [kat] HMAC-384Kdf
10,209,827 UART: [kat] LMS
10,739,317 UART: [kat] --
10,742,826 UART: [cold-reset] ++
10,744,111 UART: [fht] FHT @ 0x50003400
10,754,601 UART: [idev] ++
10,755,164 UART: [idev] CDI.KEYID = 6
10,756,098 UART: [idev] SUBJECT.KEYID = 7
10,757,313 UART: [idev] UDS.KEYID = 0
10,759,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,903,094 UART: [idev] Erasing UDS.KEYID = 0
13,232,634 UART: [idev] Sha1 KeyId Algorithm
13,255,531 UART: [idev] --
13,259,824 UART: [ldev] ++
13,260,407 UART: [ldev] CDI.KEYID = 6
13,261,289 UART: [ldev] SUBJECT.KEYID = 5
13,262,395 UART: [ldev] AUTHORITY.KEYID = 7
13,263,747 UART: [ldev] FE.KEYID = 1
13,274,309 UART: [ldev] Erasing FE.KEYID = 1
15,748,288 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,466,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,482,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,498,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,514,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,534,493 UART: [ldev] --
17,538,994 UART: [fwproc] Wait for Commands...
17,541,094 UART: [fwproc] Recv command 0x46574c44
17,543,141 UART: [fwproc] Recv'd Img size: 114168 bytes
20,940,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,018,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,086,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,403,320 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,699,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,692,069 >>> mbox cmd response: failed
12,692,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,692,956 >>> mbox cmd response: failed
12,693,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,693,515 >>> mbox cmd response: failed
Initializing fuses
2,053,896 writing to cptra_bootfsm_go
10,861,595 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,425,722 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,225 UART:
192,610 UART: Running Caliptra ROM ...
193,718 UART:
193,859 UART: [state] CFI Enabled
260,644 UART: [state] LifecycleState = Unprovisioned
263,062 UART: [state] DebugLocked = No
264,688 UART: [state] WD Timer not started. Device not locked for debugging
269,622 UART: [kat] SHA2-256
459,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,262 UART: [kat] ++
470,713 UART: [kat] sha1
481,487 UART: [kat] SHA2-256
484,508 UART: [kat] SHA2-384
489,737 UART: [kat] SHA2-512-ACC
492,350 UART: [kat] ECC-384
2,944,893 UART: [kat] HMAC-384Kdf
2,970,731 UART: [kat] LMS
3,502,518 UART: [kat] --
3,508,621 UART: [cold-reset] ++
3,510,878 UART: [fht] FHT @ 0x50003400
3,521,864 UART: [idev] ++
3,522,549 UART: [idev] CDI.KEYID = 6
3,523,512 UART: [idev] SUBJECT.KEYID = 7
3,524,670 UART: [idev] UDS.KEYID = 0
3,527,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,127 UART: [idev] Erasing UDS.KEYID = 0
6,028,888 UART: [idev] Sha1 KeyId Algorithm
6,050,658 UART: [idev] --
6,055,396 UART: [ldev] ++
6,056,085 UART: [ldev] CDI.KEYID = 6
6,057,003 UART: [ldev] SUBJECT.KEYID = 5
6,058,246 UART: [ldev] AUTHORITY.KEYID = 7
6,059,431 UART: [ldev] FE.KEYID = 1
6,097,737 UART: [ldev] Erasing FE.KEYID = 1
8,601,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,812 UART: [ldev] --
10,412,535 UART: [fwproc] Wait for Commands...
10,414,413 UART: [fwproc] Recv command 0x46574c44
10,416,730 UART: [fwproc] Recv'd Img size: 114168 bytes
12,734,702 UART: ROM Fatal Error: 0x000B0023
12,738,370 >>> mbox cmd response: failed
12,738,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,102 >>> mbox cmd response: failed
12,739,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,683 >>> mbox cmd response: failed
Initializing fuses
2,057,567 writing to cptra_bootfsm_go
2,246,907 UART:
2,247,251 UART: Running Caliptra ROM ...
2,248,387 UART:
2,248,548 UART: [state] CFI Enabled
2,305,164 UART: [state] LifecycleState = Unprovisioned
2,307,542 UART: [state] DebugLocked = No
2,310,038 UART: [state] WD Timer not started. Device not locked for debugging
2,314,774 UART: [kat] SHA2-256
2,504,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,421 UART: [kat] ++
2,515,904 UART: [kat] sha1
2,527,819 UART: [kat] SHA2-256
2,530,852 UART: [kat] SHA2-384
2,536,901 UART: [kat] SHA2-512-ACC
2,539,484 UART: [kat] ECC-384
4,986,311 UART: [kat] HMAC-384Kdf
5,013,135 UART: [kat] LMS
5,544,928 UART: [kat] --
5,548,920 UART: [cold-reset] ++
5,550,377 UART: [fht] FHT @ 0x50003400
5,562,723 UART: [idev] ++
5,563,396 UART: [idev] CDI.KEYID = 6
5,564,330 UART: [idev] SUBJECT.KEYID = 7
5,565,541 UART: [idev] UDS.KEYID = 0
5,567,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,711,530 UART: [idev] Erasing UDS.KEYID = 0
8,071,067 UART: [idev] Sha1 KeyId Algorithm
8,093,823 UART: [idev] --
8,098,039 UART: [ldev] ++
8,098,725 UART: [ldev] CDI.KEYID = 6
8,099,609 UART: [ldev] SUBJECT.KEYID = 5
8,100,827 UART: [ldev] AUTHORITY.KEYID = 7
8,102,070 UART: [ldev] FE.KEYID = 1
8,140,823 UART: [ldev] Erasing FE.KEYID = 1
10,646,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,831 UART: [ldev] --
12,454,888 UART: [fwproc] Wait for Commands...
12,457,905 UART: [fwproc] Recv command 0x46574c44
12,460,244 UART: [fwproc] Recv'd Img size: 114168 bytes
15,904,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,475 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,100,645 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,642,218 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,441,143 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,672,602 >>> mbox cmd response: failed
12,673,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,509 >>> mbox cmd response: failed
12,673,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,674,068 >>> mbox cmd response: failed
Initializing fuses
2,056,205 writing to cptra_bootfsm_go
5,483,111 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,761,683 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,533 UART:
192,914 UART: Running Caliptra ROM ...
194,117 UART:
603,601 UART: [state] CFI Enabled
619,093 UART: [state] LifecycleState = Unprovisioned
621,415 UART: [state] DebugLocked = No
622,685 UART: [state] WD Timer not started. Device not locked for debugging
627,164 UART: [kat] SHA2-256
817,026 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,789 UART: [kat] ++
828,375 UART: [kat] sha1
839,534 UART: [kat] SHA2-256
842,549 UART: [kat] SHA2-384
849,443 UART: [kat] SHA2-512-ACC
851,998 UART: [kat] ECC-384
3,292,236 UART: [kat] HMAC-384Kdf
3,306,120 UART: [kat] LMS
3,837,905 UART: [kat] --
3,843,217 UART: [cold-reset] ++
3,844,619 UART: [fht] FHT @ 0x50003400
3,855,922 UART: [idev] ++
3,856,643 UART: [idev] CDI.KEYID = 6
3,857,772 UART: [idev] SUBJECT.KEYID = 7
3,858,884 UART: [idev] UDS.KEYID = 0
3,861,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,928 UART: [idev] Erasing UDS.KEYID = 0
6,332,220 UART: [idev] Sha1 KeyId Algorithm
6,354,673 UART: [idev] --
6,359,369 UART: [ldev] ++
6,360,104 UART: [ldev] CDI.KEYID = 6
6,360,990 UART: [ldev] SUBJECT.KEYID = 5
6,362,203 UART: [ldev] AUTHORITY.KEYID = 7
6,363,399 UART: [ldev] FE.KEYID = 1
6,372,946 UART: [ldev] Erasing FE.KEYID = 1
8,848,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,332 UART: [ldev] --
10,641,302 UART: [fwproc] Wait for Commands...
10,642,808 UART: [fwproc] Recv command 0x46574c44
10,645,129 UART: [fwproc] Recv'd Img size: 114168 bytes
12,975,832 UART: ROM Fatal Error: 0x000B0023
12,979,459 >>> mbox cmd response: failed
12,979,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,980,210 >>> mbox cmd response: failed
12,980,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,980,789 >>> mbox cmd response: failed
Initializing fuses
2,057,374 writing to cptra_bootfsm_go
2,246,728 UART:
2,247,080 UART: Running Caliptra ROM ...
2,248,235 UART:
7,475,257 UART: [state] CFI Enabled
7,488,221 UART: [state] LifecycleState = Unprovisioned
7,490,582 UART: [state] DebugLocked = No
7,492,651 UART: [state] WD Timer not started. Device not locked for debugging
7,497,227 UART: [kat] SHA2-256
7,687,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,697,879 UART: [kat] ++
7,698,398 UART: [kat] sha1
7,709,149 UART: [kat] SHA2-256
7,712,170 UART: [kat] SHA2-384
7,717,513 UART: [kat] SHA2-512-ACC
7,720,084 UART: [kat] ECC-384
10,160,596 UART: [kat] HMAC-384Kdf
10,172,292 UART: [kat] LMS
10,704,136 UART: [kat] --
10,709,110 UART: [cold-reset] ++
10,711,594 UART: [fht] FHT @ 0x50003400
10,722,877 UART: [idev] ++
10,723,564 UART: [idev] CDI.KEYID = 6
10,724,523 UART: [idev] SUBJECT.KEYID = 7
10,725,683 UART: [idev] UDS.KEYID = 0
10,728,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,871,369 UART: [idev] Erasing UDS.KEYID = 0
13,203,444 UART: [idev] Sha1 KeyId Algorithm
13,226,275 UART: [idev] --
13,232,001 UART: [ldev] ++
13,232,684 UART: [ldev] CDI.KEYID = 6
13,233,596 UART: [ldev] SUBJECT.KEYID = 5
13,234,752 UART: [ldev] AUTHORITY.KEYID = 7
13,235,981 UART: [ldev] FE.KEYID = 1
13,248,142 UART: [ldev] Erasing FE.KEYID = 1
15,725,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,446,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,461,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,476,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,491,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,513,559 UART: [ldev] --
17,518,509 UART: [fwproc] Wait for Commands...
17,520,352 UART: [fwproc] Recv command 0x46574c44
17,522,623 UART: [fwproc] Recv'd Img size: 114168 bytes
20,969,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,050,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,166,445 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,708,446 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,758,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,866,932 >>> mbox cmd response: failed
12,867,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,867,815 >>> mbox cmd response: failed
12,868,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,868,373 >>> mbox cmd response: failed
Initializing fuses
2,073,495 writing to cptra_bootfsm_go
10,751,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,951,638 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,748 UART: [state] LifecycleState = Unprovisioned
86,403 UART: [state] DebugLocked = No
87,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,601 UART: [kat] SHA2-256
882,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,647 UART: [kat] ++
886,799 UART: [kat] sha1
891,171 UART: [kat] SHA2-256
893,109 UART: [kat] SHA2-384
895,816 UART: [kat] SHA2-512-ACC
897,717 UART: [kat] ECC-384
903,468 UART: [kat] HMAC-384Kdf
908,032 UART: [kat] LMS
1,476,228 UART: [kat] --
1,477,025 UART: [cold-reset] ++
1,477,499 UART: [fht] Storing FHT @ 0x50003400
1,480,364 UART: [idev] ++
1,480,532 UART: [idev] CDI.KEYID = 6
1,480,892 UART: [idev] SUBJECT.KEYID = 7
1,481,316 UART: [idev] UDS.KEYID = 0
1,481,661 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,224 UART: [idev] Erasing UDS.KEYID = 0
1,505,964 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,518 UART: [idev] --
1,515,683 UART: [ldev] ++
1,515,851 UART: [ldev] CDI.KEYID = 6
1,516,214 UART: [ldev] SUBJECT.KEYID = 5
1,516,640 UART: [ldev] AUTHORITY.KEYID = 7
1,517,103 UART: [ldev] FE.KEYID = 1
1,522,245 UART: [ldev] Erasing FE.KEYID = 1
1,547,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,814 UART: [ldev] --
1,587,293 UART: [fwproc] Waiting for Commands...
1,588,092 UART: [fwproc] Received command 0x46574c44
1,588,883 UART: [fwproc] Received Image of size 114168 bytes
1,855,316 UART: ROM Fatal Error: 0x000B0023
1,856,473 >>> mbox cmd response: failed
1,856,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,479 >>> mbox cmd response: failed
1,856,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,485 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,173 UART: [kat] SHA2-256
882,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,219 UART: [kat] ++
886,371 UART: [kat] sha1
890,797 UART: [kat] SHA2-256
892,735 UART: [kat] SHA2-384
895,504 UART: [kat] SHA2-512-ACC
897,405 UART: [kat] ECC-384
903,046 UART: [kat] HMAC-384Kdf
907,638 UART: [kat] LMS
1,475,834 UART: [kat] --
1,476,745 UART: [cold-reset] ++
1,477,155 UART: [fht] Storing FHT @ 0x50003400
1,479,824 UART: [idev] ++
1,479,992 UART: [idev] CDI.KEYID = 6
1,480,352 UART: [idev] SUBJECT.KEYID = 7
1,480,776 UART: [idev] UDS.KEYID = 0
1,481,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,894 UART: [idev] Erasing UDS.KEYID = 0
1,505,552 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,948 UART: [idev] --
1,514,809 UART: [ldev] ++
1,514,977 UART: [ldev] CDI.KEYID = 6
1,515,340 UART: [ldev] SUBJECT.KEYID = 5
1,515,766 UART: [ldev] AUTHORITY.KEYID = 7
1,516,229 UART: [ldev] FE.KEYID = 1
1,521,369 UART: [ldev] Erasing FE.KEYID = 1
1,547,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,252 UART: [ldev] --
1,586,729 UART: [fwproc] Waiting for Commands...
1,587,456 UART: [fwproc] Received command 0x46574c44
1,588,247 UART: [fwproc] Received Image of size 114168 bytes
2,884,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,770 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,761 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,706,522 >>> mbox cmd response: failed
1,706,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,528 >>> mbox cmd response: failed
1,706,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,029 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,300 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,822 UART: [kat] SHA2-256
881,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,868 UART: [kat] ++
886,020 UART: [kat] sha1
890,204 UART: [kat] SHA2-256
892,142 UART: [kat] SHA2-384
894,937 UART: [kat] SHA2-512-ACC
896,838 UART: [kat] ECC-384
902,271 UART: [kat] HMAC-384Kdf
906,877 UART: [kat] LMS
1,475,073 UART: [kat] --
1,475,880 UART: [cold-reset] ++
1,476,460 UART: [fht] Storing FHT @ 0x50003400
1,479,045 UART: [idev] ++
1,479,213 UART: [idev] CDI.KEYID = 6
1,479,573 UART: [idev] SUBJECT.KEYID = 7
1,479,997 UART: [idev] UDS.KEYID = 0
1,480,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,871 UART: [idev] Erasing UDS.KEYID = 0
1,504,763 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,485 UART: [idev] --
1,514,478 UART: [ldev] ++
1,514,646 UART: [ldev] CDI.KEYID = 6
1,515,009 UART: [ldev] SUBJECT.KEYID = 5
1,515,435 UART: [ldev] AUTHORITY.KEYID = 7
1,515,898 UART: [ldev] FE.KEYID = 1
1,521,172 UART: [ldev] Erasing FE.KEYID = 1
1,546,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,825 UART: [ldev] --
1,586,090 UART: [fwproc] Waiting for Commands...
1,586,795 UART: [fwproc] Received command 0x46574c44
1,587,586 UART: [fwproc] Received Image of size 114168 bytes
1,853,985 UART: ROM Fatal Error: 0x000B0023
1,855,142 >>> mbox cmd response: failed
1,855,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,148 >>> mbox cmd response: failed
1,855,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,851 UART: [kat] HMAC-384Kdf
907,447 UART: [kat] LMS
1,475,643 UART: [kat] --
1,476,726 UART: [cold-reset] ++
1,477,062 UART: [fht] Storing FHT @ 0x50003400
1,480,057 UART: [idev] ++
1,480,225 UART: [idev] CDI.KEYID = 6
1,480,585 UART: [idev] SUBJECT.KEYID = 7
1,481,009 UART: [idev] UDS.KEYID = 0
1,481,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,051 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,205 UART: [idev] --
1,515,292 UART: [ldev] ++
1,515,460 UART: [ldev] CDI.KEYID = 6
1,515,823 UART: [ldev] SUBJECT.KEYID = 5
1,516,249 UART: [ldev] AUTHORITY.KEYID = 7
1,516,712 UART: [ldev] FE.KEYID = 1
1,522,028 UART: [ldev] Erasing FE.KEYID = 1
1,547,331 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,841 UART: [ldev] --
1,587,174 UART: [fwproc] Waiting for Commands...
1,587,789 UART: [fwproc] Received command 0x46574c44
1,588,580 UART: [fwproc] Received Image of size 114168 bytes
2,884,949 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,625 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,977 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,592 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,708,197 >>> mbox cmd response: failed
1,708,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,203 >>> mbox cmd response: failed
1,708,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,708,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
902,161 UART: [kat] SHA2-256
904,101 UART: [kat] SHA2-384
906,916 UART: [kat] SHA2-512-ACC
908,817 UART: [kat] ECC-384
918,898 UART: [kat] HMAC-384Kdf
923,356 UART: [kat] LMS
1,171,684 UART: [kat] --
1,172,833 UART: [cold-reset] ++
1,173,219 UART: [fht] FHT @ 0x50003400
1,176,006 UART: [idev] ++
1,176,174 UART: [idev] CDI.KEYID = 6
1,176,534 UART: [idev] SUBJECT.KEYID = 7
1,176,958 UART: [idev] UDS.KEYID = 0
1,177,303 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,622 UART: [idev] Erasing UDS.KEYID = 0
1,201,623 UART: [idev] Sha1 KeyId Algorithm
1,210,089 UART: [idev] --
1,211,083 UART: [ldev] ++
1,211,251 UART: [ldev] CDI.KEYID = 6
1,211,614 UART: [ldev] SUBJECT.KEYID = 5
1,212,040 UART: [ldev] AUTHORITY.KEYID = 7
1,212,503 UART: [ldev] FE.KEYID = 1
1,217,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,490 UART: [fwproc] Wait for Commands...
1,283,286 UART: [fwproc] Recv command 0x46574c44
1,284,014 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,721 UART: ROM Fatal Error: 0x000B0023
1,551,878 >>> mbox cmd response: failed
1,551,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,884 >>> mbox cmd response: failed
1,551,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,646 UART: [state] LifecycleState = Unprovisioned
86,301 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
893,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,943 UART: [kat] ++
898,095 UART: [kat] sha1
902,433 UART: [kat] SHA2-256
904,373 UART: [kat] SHA2-384
906,986 UART: [kat] SHA2-512-ACC
908,887 UART: [kat] ECC-384
918,420 UART: [kat] HMAC-384Kdf
923,020 UART: [kat] LMS
1,171,348 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,683 UART: [fht] FHT @ 0x50003400
1,175,200 UART: [idev] ++
1,175,368 UART: [idev] CDI.KEYID = 6
1,175,728 UART: [idev] SUBJECT.KEYID = 7
1,176,152 UART: [idev] UDS.KEYID = 0
1,176,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,924 UART: [idev] Erasing UDS.KEYID = 0
1,201,577 UART: [idev] Sha1 KeyId Algorithm
1,209,921 UART: [idev] --
1,210,945 UART: [ldev] ++
1,211,113 UART: [ldev] CDI.KEYID = 6
1,211,476 UART: [ldev] SUBJECT.KEYID = 5
1,211,902 UART: [ldev] AUTHORITY.KEYID = 7
1,212,365 UART: [ldev] FE.KEYID = 1
1,217,555 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,923 UART: [ldev] --
1,283,220 UART: [fwproc] Wait for Commands...
1,283,960 UART: [fwproc] Recv command 0x46574c44
1,284,688 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,507 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,040 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,843 >>> mbox cmd response: failed
1,403,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,849 >>> mbox cmd response: failed
1,403,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,029 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,643 UART: [kat] HMAC-384Kdf
923,213 UART: [kat] LMS
1,171,541 UART: [kat] --
1,172,462 UART: [cold-reset] ++
1,172,862 UART: [fht] FHT @ 0x50003400
1,175,569 UART: [idev] ++
1,175,737 UART: [idev] CDI.KEYID = 6
1,176,097 UART: [idev] SUBJECT.KEYID = 7
1,176,521 UART: [idev] UDS.KEYID = 0
1,176,866 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,651 UART: [idev] Erasing UDS.KEYID = 0
1,201,384 UART: [idev] Sha1 KeyId Algorithm
1,209,812 UART: [idev] --
1,211,008 UART: [ldev] ++
1,211,176 UART: [ldev] CDI.KEYID = 6
1,211,539 UART: [ldev] SUBJECT.KEYID = 5
1,211,965 UART: [ldev] AUTHORITY.KEYID = 7
1,212,428 UART: [ldev] FE.KEYID = 1
1,217,800 UART: [ldev] Erasing FE.KEYID = 1
1,244,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,810 UART: [ldev] --
1,284,087 UART: [fwproc] Wait for Commands...
1,284,775 UART: [fwproc] Recv command 0x46574c44
1,285,503 UART: [fwproc] Recv'd Img size: 114168 bytes
1,552,038 UART: ROM Fatal Error: 0x000B0023
1,553,195 >>> mbox cmd response: failed
1,553,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,201 >>> mbox cmd response: failed
1,553,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,207 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
893,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,076 UART: [kat] ++
898,228 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
907,117 UART: [kat] SHA2-512-ACC
909,018 UART: [kat] ECC-384
918,787 UART: [kat] HMAC-384Kdf
923,583 UART: [kat] LMS
1,171,911 UART: [kat] --
1,173,084 UART: [cold-reset] ++
1,173,544 UART: [fht] FHT @ 0x50003400
1,176,161 UART: [idev] ++
1,176,329 UART: [idev] CDI.KEYID = 6
1,176,689 UART: [idev] SUBJECT.KEYID = 7
1,177,113 UART: [idev] UDS.KEYID = 0
1,177,458 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,455 UART: [idev] Erasing UDS.KEYID = 0
1,203,054 UART: [idev] Sha1 KeyId Algorithm
1,211,476 UART: [idev] --
1,212,662 UART: [ldev] ++
1,212,830 UART: [ldev] CDI.KEYID = 6
1,213,193 UART: [ldev] SUBJECT.KEYID = 5
1,213,619 UART: [ldev] AUTHORITY.KEYID = 7
1,214,082 UART: [ldev] FE.KEYID = 1
1,219,506 UART: [ldev] Erasing FE.KEYID = 1
1,246,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,240 UART: [ldev] --
1,285,639 UART: [fwproc] Wait for Commands...
1,286,267 UART: [fwproc] Recv command 0x46574c44
1,286,995 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,980 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,284 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,943 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,406,058 >>> mbox cmd response: failed
1,406,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,064 >>> mbox cmd response: failed
1,406,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,118 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,108 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,098 UART: [kat] SHA2-256
890,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,777 UART: [kat] ++
894,929 UART: [kat] sha1
899,181 UART: [kat] SHA2-256
901,121 UART: [kat] SHA2-384
903,966 UART: [kat] SHA2-512-ACC
905,867 UART: [kat] ECC-384
915,146 UART: [kat] HMAC-384Kdf
919,710 UART: [kat] LMS
1,168,022 UART: [kat] --
1,169,073 UART: [cold-reset] ++
1,169,485 UART: [fht] FHT @ 0x50003400
1,172,359 UART: [idev] ++
1,172,527 UART: [idev] CDI.KEYID = 6
1,172,888 UART: [idev] SUBJECT.KEYID = 7
1,173,313 UART: [idev] UDS.KEYID = 0
1,173,659 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,197,659 UART: [idev] Sha1 KeyId Algorithm
1,206,699 UART: [idev] --
1,207,874 UART: [ldev] ++
1,208,042 UART: [ldev] CDI.KEYID = 6
1,208,406 UART: [ldev] SUBJECT.KEYID = 5
1,208,833 UART: [ldev] AUTHORITY.KEYID = 7
1,209,296 UART: [ldev] FE.KEYID = 1
1,214,506 UART: [ldev] Erasing FE.KEYID = 1
1,240,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,006 UART: [ldev] --
1,279,290 UART: [fwproc] Wait for Commands...
1,280,065 UART: [fwproc] Recv command 0x46574c44
1,280,798 UART: [fwproc] Recv'd Img size: 114168 bytes
1,546,912 UART: ROM Fatal Error: 0x000B0023
1,548,069 >>> mbox cmd response: failed
1,548,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,075 >>> mbox cmd response: failed
1,548,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,081 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,337 UART: [kat] SHA2-256
901,277 UART: [kat] SHA2-384
904,190 UART: [kat] SHA2-512-ACC
906,091 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,248 UART: [kat] LMS
1,168,560 UART: [kat] --
1,169,711 UART: [cold-reset] ++
1,170,067 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,174,225 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,819 UART: [idev] --
1,208,918 UART: [ldev] ++
1,209,086 UART: [ldev] CDI.KEYID = 6
1,209,450 UART: [ldev] SUBJECT.KEYID = 5
1,209,877 UART: [ldev] AUTHORITY.KEYID = 7
1,210,340 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,854 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,171 UART: [fwproc] Recv command 0x46574c44
1,282,904 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,123 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,432 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,034 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,814 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,401,516 >>> mbox cmd response: failed
1,401,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,522 >>> mbox cmd response: failed
1,401,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,401,528 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,926 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
891,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,067 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,658 UART: [cold-reset] ++
1,170,098 UART: [fht] FHT @ 0x50003400
1,172,736 UART: [idev] ++
1,172,904 UART: [idev] CDI.KEYID = 6
1,173,265 UART: [idev] SUBJECT.KEYID = 7
1,173,690 UART: [idev] UDS.KEYID = 0
1,174,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,407 UART: [ldev] Erasing FE.KEYID = 1
1,243,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,819 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,932 UART: [fwproc] Recv command 0x46574c44
1,283,665 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,933 UART: ROM Fatal Error: 0x000B0023
1,551,090 >>> mbox cmd response: failed
1,551,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,096 >>> mbox cmd response: failed
1,551,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
87,116 UART: [state] WD Timer not started. Device not locked for debugging
88,297 UART: [kat] SHA2-256
891,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,976 UART: [kat] ++
896,128 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
921,099 UART: [kat] LMS
1,169,411 UART: [kat] --
1,170,432 UART: [cold-reset] ++
1,170,980 UART: [fht] FHT @ 0x50003400
1,173,646 UART: [idev] ++
1,173,814 UART: [idev] CDI.KEYID = 6
1,174,175 UART: [idev] SUBJECT.KEYID = 7
1,174,600 UART: [idev] UDS.KEYID = 0
1,174,946 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,542 UART: [idev] Erasing UDS.KEYID = 0
1,199,998 UART: [idev] Sha1 KeyId Algorithm
1,208,690 UART: [idev] --
1,209,879 UART: [ldev] ++
1,210,047 UART: [ldev] CDI.KEYID = 6
1,210,411 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,601 UART: [ldev] --
1,281,931 UART: [fwproc] Wait for Commands...
1,282,586 UART: [fwproc] Recv command 0x46574c44
1,283,319 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,548 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,857 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,391 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,403,259 >>> mbox cmd response: failed
1,403,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,265 >>> mbox cmd response: failed
1,403,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,403,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,749 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,173 UART:
192,534 UART: Running Caliptra ROM ...
193,712 UART:
193,862 UART: [state] CFI Enabled
264,528 UART: [state] LifecycleState = Unprovisioned
266,458 UART: [state] DebugLocked = No
268,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,100 UART: [kat] SHA2-256
442,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,301 UART: [kat] ++
453,751 UART: [kat] sha1
464,625 UART: [kat] SHA2-256
467,310 UART: [kat] SHA2-384
473,775 UART: [kat] SHA2-512-ACC
476,161 UART: [kat] ECC-384
2,765,461 UART: [kat] HMAC-384Kdf
2,777,753 UART: [kat] LMS
3,968,054 UART: [kat] --
3,972,769 UART: [cold-reset] ++
3,974,757 UART: [fht] Storing FHT @ 0x50003400
3,986,233 UART: [idev] ++
3,986,794 UART: [idev] CDI.KEYID = 6
3,987,729 UART: [idev] SUBJECT.KEYID = 7
3,988,992 UART: [idev] UDS.KEYID = 0
3,991,667 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,049 UART: [idev] Erasing UDS.KEYID = 0
7,321,919 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,512 UART: [idev] --
7,349,188 UART: [ldev] ++
7,349,768 UART: [ldev] CDI.KEYID = 6
7,350,714 UART: [ldev] SUBJECT.KEYID = 5
7,351,929 UART: [ldev] AUTHORITY.KEYID = 7
7,353,217 UART: [ldev] FE.KEYID = 1
7,399,809 UART: [ldev] Erasing FE.KEYID = 1
10,731,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,714 UART: [ldev] --
13,094,209 UART: [fwproc] Waiting for Commands...
13,096,971 UART: [fwproc] Received command 0x46574c44
13,099,165 UART: [fwproc] Received Image of size 113844 bytes
16,047,436 UART: ROM Fatal Error: 0x000B0024
16,050,888 >>> mbox cmd response: failed
16,051,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,051,843 >>> mbox cmd response: failed
16,052,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,052,431 >>> mbox cmd response: failed
Initializing fuses
2,065,935 writing to cptra_bootfsm_go
2,255,319 UART:
2,255,672 UART: Running Caliptra ROM ...
2,256,806 UART:
2,256,996 UART: [state] CFI Enabled
2,320,133 UART: [state] LifecycleState = Unprovisioned
2,322,070 UART: [state] DebugLocked = No
2,324,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,428 UART: [kat] SHA2-256
2,498,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,629 UART: [kat] ++
2,509,089 UART: [kat] sha1
2,520,573 UART: [kat] SHA2-256
2,523,259 UART: [kat] SHA2-384
2,528,869 UART: [kat] SHA2-512-ACC
2,531,272 UART: [kat] ECC-384
4,824,180 UART: [kat] HMAC-384Kdf
4,855,528 UART: [kat] LMS
6,045,827 UART: [kat] --
6,051,679 UART: [cold-reset] ++
6,053,146 UART: [fht] Storing FHT @ 0x50003400
6,064,532 UART: [idev] ++
6,065,098 UART: [idev] CDI.KEYID = 6
6,066,038 UART: [idev] SUBJECT.KEYID = 7
6,067,315 UART: [idev] UDS.KEYID = 0
6,069,508 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,212,712 UART: [idev] Erasing UDS.KEYID = 0
9,400,519 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,029 UART: [idev] --
9,426,596 UART: [ldev] ++
9,427,165 UART: [ldev] CDI.KEYID = 6
9,428,105 UART: [ldev] SUBJECT.KEYID = 5
9,429,351 UART: [ldev] AUTHORITY.KEYID = 7
9,430,645 UART: [ldev] FE.KEYID = 1
9,476,647 UART: [ldev] Erasing FE.KEYID = 1
12,812,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,124,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,139,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,154,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,168,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,186,703 UART: [ldev] --
15,192,072 UART: [fwproc] Waiting for Commands...
15,194,717 UART: [fwproc] Received command 0x46574c44
15,196,939 UART: [fwproc] Received Image of size 113844 bytes
19,241,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,317,946 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,386,860 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,703,105 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,786,635 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,848,173 >>> mbox cmd response: failed
15,848,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,848,974 >>> mbox cmd response: failed
15,849,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,544 >>> mbox cmd response: failed
Initializing fuses
2,062,965 writing to cptra_bootfsm_go
5,832,901 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,899,925 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,582 UART:
192,949 UART: Running Caliptra ROM ...
194,079 UART:
603,978 UART: [state] CFI Enabled
617,211 UART: [state] LifecycleState = Unprovisioned
619,148 UART: [state] DebugLocked = No
621,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,593 UART: [kat] SHA2-256
795,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,844 UART: [kat] ++
806,297 UART: [kat] sha1
816,741 UART: [kat] SHA2-256
819,471 UART: [kat] SHA2-384
826,102 UART: [kat] SHA2-512-ACC
828,489 UART: [kat] ECC-384
3,111,701 UART: [kat] HMAC-384Kdf
3,123,729 UART: [kat] LMS
4,313,840 UART: [kat] --
4,317,592 UART: [cold-reset] ++
4,319,052 UART: [fht] Storing FHT @ 0x50003400
4,329,085 UART: [idev] ++
4,329,655 UART: [idev] CDI.KEYID = 6
4,330,629 UART: [idev] SUBJECT.KEYID = 7
4,331,840 UART: [idev] UDS.KEYID = 0
4,334,836 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,998 UART: [idev] Erasing UDS.KEYID = 0
7,621,126 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,539 UART: [idev] --
7,646,078 UART: [ldev] ++
7,646,655 UART: [ldev] CDI.KEYID = 6
7,647,591 UART: [ldev] SUBJECT.KEYID = 5
7,648,773 UART: [ldev] AUTHORITY.KEYID = 7
7,650,132 UART: [ldev] FE.KEYID = 1
7,660,535 UART: [ldev] Erasing FE.KEYID = 1
10,947,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,262 UART: [ldev] --
13,307,346 UART: [fwproc] Waiting for Commands...
13,310,199 UART: [fwproc] Received command 0x46574c44
13,312,384 UART: [fwproc] Received Image of size 113844 bytes
16,256,602 UART: ROM Fatal Error: 0x000B0024
16,260,024 >>> mbox cmd response: failed
16,260,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,260,687 >>> mbox cmd response: failed
16,260,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,261,302 >>> mbox cmd response: failed
Initializing fuses
2,061,635 writing to cptra_bootfsm_go
2,251,013 UART:
2,251,370 UART: Running Caliptra ROM ...
2,252,450 UART:
4,197,940 UART: [state] CFI Enabled
4,212,908 UART: [state] LifecycleState = Unprovisioned
4,214,828 UART: [state] DebugLocked = No
4,216,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,221,763 UART: [kat] SHA2-256
4,391,490 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,402,021 UART: [kat] ++
4,402,488 UART: [kat] sha1
4,413,886 UART: [kat] SHA2-256
4,416,641 UART: [kat] SHA2-384
4,422,520 UART: [kat] SHA2-512-ACC
4,424,875 UART: [kat] ECC-384
6,710,943 UART: [kat] HMAC-384Kdf
6,722,684 UART: [kat] LMS
7,912,760 UART: [kat] --
7,919,099 UART: [cold-reset] ++
7,921,716 UART: [fht] Storing FHT @ 0x50003400
7,933,532 UART: [idev] ++
7,934,100 UART: [idev] CDI.KEYID = 6
7,935,064 UART: [idev] SUBJECT.KEYID = 7
7,936,222 UART: [idev] UDS.KEYID = 0
7,938,634 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,081,734 UART: [idev] Erasing UDS.KEYID = 0
11,223,457 UART: [idev] Using Sha1 for KeyId Algorithm
11,245,375 UART: [idev] --
11,250,401 UART: [ldev] ++
11,250,977 UART: [ldev] CDI.KEYID = 6
11,251,942 UART: [ldev] SUBJECT.KEYID = 5
11,253,208 UART: [ldev] AUTHORITY.KEYID = 7
11,254,447 UART: [ldev] FE.KEYID = 1
11,263,850 UART: [ldev] Erasing FE.KEYID = 1
14,552,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,847,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,862,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,877,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,891,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,911,556 UART: [ldev] --
16,916,988 UART: [fwproc] Waiting for Commands...
16,918,702 UART: [fwproc] Received command 0x46574c44
16,920,892 UART: [fwproc] Received Image of size 113844 bytes
20,971,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,051,013 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,119,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,437,073 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
4,133,286 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,046,591 >>> mbox cmd response: failed
16,047,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,047,487 >>> mbox cmd response: failed
16,047,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,048,065 >>> mbox cmd response: failed
Initializing fuses
2,059,138 writing to cptra_bootfsm_go
7,946,041 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,882,779 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,109 UART:
192,484 UART: Running Caliptra ROM ...
193,713 UART:
193,869 UART: [state] CFI Enabled
264,224 UART: [state] LifecycleState = Unprovisioned
266,093 UART: [state] DebugLocked = No
267,583 UART: [state] WD Timer not started. Device not locked for debugging
271,585 UART: [kat] SHA2-256
450,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,304 UART: [kat] ++
462,835 UART: [kat] sha1
474,091 UART: [kat] SHA2-256
477,107 UART: [kat] SHA2-384
483,133 UART: [kat] SHA2-512-ACC
486,065 UART: [kat] ECC-384
2,947,233 UART: [kat] HMAC-384Kdf
2,970,604 UART: [kat] LMS
3,500,049 UART: [kat] --
3,504,136 UART: [cold-reset] ++
3,506,075 UART: [fht] FHT @ 0x50003400
3,515,764 UART: [idev] ++
3,516,338 UART: [idev] CDI.KEYID = 6
3,517,305 UART: [idev] SUBJECT.KEYID = 7
3,518,468 UART: [idev] UDS.KEYID = 0
3,520,915 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,752 UART: [idev] Erasing UDS.KEYID = 0
6,023,386 UART: [idev] Sha1 KeyId Algorithm
6,045,541 UART: [idev] --
6,049,424 UART: [ldev] ++
6,050,009 UART: [ldev] CDI.KEYID = 6
6,050,924 UART: [ldev] SUBJECT.KEYID = 5
6,052,094 UART: [ldev] AUTHORITY.KEYID = 7
6,053,331 UART: [ldev] FE.KEYID = 1
6,099,088 UART: [ldev] Erasing FE.KEYID = 1
8,616,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,369,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,836 UART: [ldev] --
10,428,271 UART: [fwproc] Wait for Commands...
10,430,351 UART: [fwproc] Recv command 0x46574c44
10,432,459 UART: [fwproc] Recv'd Img size: 114168 bytes
12,723,942 UART: ROM Fatal Error: 0x000B0024
12,727,065 >>> mbox cmd response: failed
12,727,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,727,814 >>> mbox cmd response: failed
12,728,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,728,385 >>> mbox cmd response: failed
Initializing fuses
2,052,758 writing to cptra_bootfsm_go
2,242,100 UART:
2,242,452 UART: Running Caliptra ROM ...
2,243,587 UART:
2,243,760 UART: [state] CFI Enabled
2,310,761 UART: [state] LifecycleState = Unprovisioned
2,312,655 UART: [state] DebugLocked = No
2,314,541 UART: [state] WD Timer not started. Device not locked for debugging
2,318,191 UART: [kat] SHA2-256
2,497,311 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,508,910 UART: [kat] ++
2,509,457 UART: [kat] sha1
2,521,486 UART: [kat] SHA2-256
2,524,556 UART: [kat] SHA2-384
2,531,972 UART: [kat] SHA2-512-ACC
2,534,923 UART: [kat] ECC-384
4,991,224 UART: [kat] HMAC-384Kdf
5,008,382 UART: [kat] LMS
5,537,826 UART: [kat] --
5,542,639 UART: [cold-reset] ++
5,544,173 UART: [fht] FHT @ 0x50003400
5,553,975 UART: [idev] ++
5,554,543 UART: [idev] CDI.KEYID = 6
5,555,453 UART: [idev] SUBJECT.KEYID = 7
5,556,668 UART: [idev] UDS.KEYID = 0
5,558,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,702,567 UART: [idev] Erasing UDS.KEYID = 0
8,063,609 UART: [idev] Sha1 KeyId Algorithm
8,087,231 UART: [idev] --
8,091,399 UART: [ldev] ++
8,091,998 UART: [ldev] CDI.KEYID = 6
8,092,915 UART: [ldev] SUBJECT.KEYID = 5
8,094,079 UART: [ldev] AUTHORITY.KEYID = 7
8,095,317 UART: [ldev] FE.KEYID = 1
8,136,170 UART: [ldev] Erasing FE.KEYID = 1
10,639,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,391,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,407,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,423,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,884 UART: [ldev] --
12,447,607 UART: [fwproc] Wait for Commands...
12,450,359 UART: [fwproc] Recv command 0x46574c44
12,452,458 UART: [fwproc] Recv'd Img size: 114168 bytes
15,849,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,925,329 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,994,104 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,312,176 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,383,273 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,495,199 >>> mbox cmd response: failed
12,495,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,496,148 >>> mbox cmd response: failed
12,496,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,496,680 >>> mbox cmd response: failed
Initializing fuses
2,059,679 writing to cptra_bootfsm_go
5,434,592 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,136,029 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,667 UART:
193,018 UART: Running Caliptra ROM ...
194,238 UART:
603,597 UART: [state] CFI Enabled
617,700 UART: [state] LifecycleState = Unprovisioned
619,583 UART: [state] DebugLocked = No
622,498 UART: [state] WD Timer not started. Device not locked for debugging
626,752 UART: [kat] SHA2-256
805,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,483 UART: [kat] ++
817,926 UART: [kat] sha1
829,066 UART: [kat] SHA2-256
832,126 UART: [kat] SHA2-384
837,067 UART: [kat] SHA2-512-ACC
840,006 UART: [kat] ECC-384
3,282,034 UART: [kat] HMAC-384Kdf
3,295,590 UART: [kat] LMS
3,825,114 UART: [kat] --
3,828,750 UART: [cold-reset] ++
3,829,930 UART: [fht] FHT @ 0x50003400
3,840,797 UART: [idev] ++
3,841,388 UART: [idev] CDI.KEYID = 6
3,842,304 UART: [idev] SUBJECT.KEYID = 7
3,843,466 UART: [idev] UDS.KEYID = 0
3,845,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,612 UART: [idev] Erasing UDS.KEYID = 0
6,313,897 UART: [idev] Sha1 KeyId Algorithm
6,335,835 UART: [idev] --
6,340,585 UART: [ldev] ++
6,341,152 UART: [ldev] CDI.KEYID = 6
6,342,041 UART: [ldev] SUBJECT.KEYID = 5
6,343,254 UART: [ldev] AUTHORITY.KEYID = 7
6,344,540 UART: [ldev] FE.KEYID = 1
6,356,836 UART: [ldev] Erasing FE.KEYID = 1
8,831,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,701 UART: [ldev] --
10,623,166 UART: [fwproc] Wait for Commands...
10,625,370 UART: [fwproc] Recv command 0x46574c44
10,627,462 UART: [fwproc] Recv'd Img size: 114168 bytes
12,916,782 UART: ROM Fatal Error: 0x000B0024
12,919,909 >>> mbox cmd response: failed
12,920,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,920,568 >>> mbox cmd response: failed
12,920,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,244 >>> mbox cmd response: failed
Initializing fuses
2,056,105 writing to cptra_bootfsm_go
2,245,428 UART:
2,245,773 UART: Running Caliptra ROM ...
2,247,098 UART:
7,534,049 UART: [state] CFI Enabled
7,545,894 UART: [state] LifecycleState = Unprovisioned
7,547,756 UART: [state] DebugLocked = No
7,550,493 UART: [state] WD Timer not started. Device not locked for debugging
7,553,372 UART: [kat] SHA2-256
7,732,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,744,055 UART: [kat] ++
7,744,600 UART: [kat] sha1
7,754,794 UART: [kat] SHA2-256
7,757,812 UART: [kat] SHA2-384
7,764,661 UART: [kat] SHA2-512-ACC
7,767,645 UART: [kat] ECC-384
10,208,864 UART: [kat] HMAC-384Kdf
10,220,723 UART: [kat] LMS
10,750,228 UART: [kat] --
10,753,942 UART: [cold-reset] ++
10,756,358 UART: [fht] FHT @ 0x50003400
10,768,629 UART: [idev] ++
10,769,188 UART: [idev] CDI.KEYID = 6
10,770,091 UART: [idev] SUBJECT.KEYID = 7
10,771,310 UART: [idev] UDS.KEYID = 0
10,773,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,917,123 UART: [idev] Erasing UDS.KEYID = 0
13,242,094 UART: [idev] Sha1 KeyId Algorithm
13,265,649 UART: [idev] --
13,269,857 UART: [ldev] ++
13,270,424 UART: [ldev] CDI.KEYID = 6
13,271,330 UART: [ldev] SUBJECT.KEYID = 5
13,272,486 UART: [ldev] AUTHORITY.KEYID = 7
13,273,790 UART: [ldev] FE.KEYID = 1
13,285,517 UART: [ldev] Erasing FE.KEYID = 1
15,760,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,480,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,496,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,512,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,528,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,548,906 UART: [ldev] --
17,553,312 UART: [fwproc] Wait for Commands...
17,555,298 UART: [fwproc] Recv command 0x46574c44
17,557,389 UART: [fwproc] Recv'd Img size: 114168 bytes
20,960,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,033,065 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,101,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,420,040 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,698,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,703,776 >>> mbox cmd response: failed
12,704,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,704,682 >>> mbox cmd response: failed
12,704,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,245 >>> mbox cmd response: failed
Initializing fuses
2,052,540 writing to cptra_bootfsm_go
10,858,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,422,101 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,085 UART:
192,488 UART: Running Caliptra ROM ...
193,619 UART:
193,768 UART: [state] CFI Enabled
258,681 UART: [state] LifecycleState = Unprovisioned
261,062 UART: [state] DebugLocked = No
263,102 UART: [state] WD Timer not started. Device not locked for debugging
267,088 UART: [kat] SHA2-256
456,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,748 UART: [kat] ++
468,235 UART: [kat] sha1
479,167 UART: [kat] SHA2-256
482,177 UART: [kat] SHA2-384
488,699 UART: [kat] SHA2-512-ACC
491,282 UART: [kat] ECC-384
2,946,282 UART: [kat] HMAC-384Kdf
2,971,218 UART: [kat] LMS
3,502,988 UART: [kat] --
3,508,341 UART: [cold-reset] ++
3,510,763 UART: [fht] FHT @ 0x50003400
3,523,634 UART: [idev] ++
3,524,373 UART: [idev] CDI.KEYID = 6
3,525,297 UART: [idev] SUBJECT.KEYID = 7
3,526,513 UART: [idev] UDS.KEYID = 0
3,529,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,976 UART: [idev] Erasing UDS.KEYID = 0
6,033,521 UART: [idev] Sha1 KeyId Algorithm
6,056,337 UART: [idev] --
6,061,126 UART: [ldev] ++
6,061,817 UART: [ldev] CDI.KEYID = 6
6,062,729 UART: [ldev] SUBJECT.KEYID = 5
6,063,837 UART: [ldev] AUTHORITY.KEYID = 7
6,065,129 UART: [ldev] FE.KEYID = 1
6,103,084 UART: [ldev] Erasing FE.KEYID = 1
8,608,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,415,044 UART: [ldev] --
10,420,101 UART: [fwproc] Wait for Commands...
10,422,307 UART: [fwproc] Recv command 0x46574c44
10,424,625 UART: [fwproc] Recv'd Img size: 114168 bytes
12,747,991 UART: ROM Fatal Error: 0x000B0024
12,751,662 >>> mbox cmd response: failed
12,752,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,752,441 >>> mbox cmd response: failed
12,752,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,753,001 >>> mbox cmd response: failed
Initializing fuses
2,066,021 writing to cptra_bootfsm_go
2,255,325 UART:
2,255,714 UART: Running Caliptra ROM ...
2,256,760 UART:
2,256,914 UART: [state] CFI Enabled
2,330,661 UART: [state] LifecycleState = Unprovisioned
2,333,044 UART: [state] DebugLocked = No
2,334,607 UART: [state] WD Timer not started. Device not locked for debugging
2,339,627 UART: [kat] SHA2-256
2,529,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,540,261 UART: [kat] ++
2,540,754 UART: [kat] sha1
2,552,995 UART: [kat] SHA2-256
2,556,026 UART: [kat] SHA2-384
2,562,293 UART: [kat] SHA2-512-ACC
2,564,923 UART: [kat] ECC-384
5,015,429 UART: [kat] HMAC-384Kdf
5,038,414 UART: [kat] LMS
5,570,174 UART: [kat] --
5,574,978 UART: [cold-reset] ++
5,576,804 UART: [fht] FHT @ 0x50003400
5,587,680 UART: [idev] ++
5,588,354 UART: [idev] CDI.KEYID = 6
5,589,291 UART: [idev] SUBJECT.KEYID = 7
5,590,559 UART: [idev] UDS.KEYID = 0
5,592,914 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,736,755 UART: [idev] Erasing UDS.KEYID = 0
8,095,127 UART: [idev] Sha1 KeyId Algorithm
8,116,461 UART: [idev] --
8,120,172 UART: [ldev] ++
8,120,865 UART: [ldev] CDI.KEYID = 6
8,121,749 UART: [ldev] SUBJECT.KEYID = 5
8,122,967 UART: [ldev] AUTHORITY.KEYID = 7
8,124,065 UART: [ldev] FE.KEYID = 1
8,166,983 UART: [ldev] Erasing FE.KEYID = 1
10,674,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,411,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,426,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,442,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,457,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,477,873 UART: [ldev] --
12,483,895 UART: [fwproc] Wait for Commands...
12,486,280 UART: [fwproc] Recv command 0x46574c44
12,488,606 UART: [fwproc] Recv'd Img size: 114168 bytes
15,940,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,013,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,129,965 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,670,876 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,443,615 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,649,676 >>> mbox cmd response: failed
12,650,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,650,586 >>> mbox cmd response: failed
12,650,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,651,141 >>> mbox cmd response: failed
Initializing fuses
2,058,918 writing to cptra_bootfsm_go
5,487,952 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,780,161 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,504 UART:
192,855 UART: Running Caliptra ROM ...
194,068 UART:
603,538 UART: [state] CFI Enabled
619,676 UART: [state] LifecycleState = Unprovisioned
622,045 UART: [state] DebugLocked = No
624,762 UART: [state] WD Timer not started. Device not locked for debugging
629,788 UART: [kat] SHA2-256
819,614 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,417 UART: [kat] ++
830,957 UART: [kat] sha1
843,514 UART: [kat] SHA2-256
846,526 UART: [kat] SHA2-384
852,073 UART: [kat] SHA2-512-ACC
854,653 UART: [kat] ECC-384
3,298,251 UART: [kat] HMAC-384Kdf
3,311,409 UART: [kat] LMS
3,843,203 UART: [kat] --
3,847,908 UART: [cold-reset] ++
3,849,898 UART: [fht] FHT @ 0x50003400
3,861,958 UART: [idev] ++
3,862,642 UART: [idev] CDI.KEYID = 6
3,863,662 UART: [idev] SUBJECT.KEYID = 7
3,864,824 UART: [idev] UDS.KEYID = 0
3,867,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,010,825 UART: [idev] Erasing UDS.KEYID = 0
6,338,074 UART: [idev] Sha1 KeyId Algorithm
6,360,787 UART: [idev] --
6,366,408 UART: [ldev] ++
6,367,086 UART: [ldev] CDI.KEYID = 6
6,367,991 UART: [ldev] SUBJECT.KEYID = 5
6,369,208 UART: [ldev] AUTHORITY.KEYID = 7
6,370,337 UART: [ldev] FE.KEYID = 1
6,380,922 UART: [ldev] Erasing FE.KEYID = 1
8,857,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,271 UART: [ldev] --
10,646,924 UART: [fwproc] Wait for Commands...
10,649,406 UART: [fwproc] Recv command 0x46574c44
10,651,725 UART: [fwproc] Recv'd Img size: 114168 bytes
12,975,766 UART: ROM Fatal Error: 0x000B0024
12,979,390 >>> mbox cmd response: failed
12,979,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,980,055 >>> mbox cmd response: failed
12,980,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,980,744 >>> mbox cmd response: failed
Initializing fuses
2,054,389 writing to cptra_bootfsm_go
2,243,780 UART:
2,244,126 UART: Running Caliptra ROM ...
2,245,182 UART:
7,469,229 UART: [state] CFI Enabled
7,488,808 UART: [state] LifecycleState = Unprovisioned
7,491,201 UART: [state] DebugLocked = No
7,492,514 UART: [state] WD Timer not started. Device not locked for debugging
7,496,283 UART: [kat] SHA2-256
7,686,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,696,952 UART: [kat] ++
7,697,466 UART: [kat] sha1
7,707,600 UART: [kat] SHA2-256
7,710,622 UART: [kat] SHA2-384
7,715,967 UART: [kat] SHA2-512-ACC
7,718,543 UART: [kat] ECC-384
10,158,329 UART: [kat] HMAC-384Kdf
10,171,373 UART: [kat] LMS
10,703,198 UART: [kat] --
10,709,104 UART: [cold-reset] ++
10,710,933 UART: [fht] FHT @ 0x50003400
10,721,754 UART: [idev] ++
10,722,435 UART: [idev] CDI.KEYID = 6
10,723,452 UART: [idev] SUBJECT.KEYID = 7
10,724,615 UART: [idev] UDS.KEYID = 0
10,726,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,870,421 UART: [idev] Erasing UDS.KEYID = 0
13,199,119 UART: [idev] Sha1 KeyId Algorithm
13,221,129 UART: [idev] --
13,224,477 UART: [ldev] ++
13,225,043 UART: [ldev] CDI.KEYID = 6
13,225,985 UART: [ldev] SUBJECT.KEYID = 5
13,227,139 UART: [ldev] AUTHORITY.KEYID = 7
13,228,371 UART: [ldev] FE.KEYID = 1
13,239,665 UART: [ldev] Erasing FE.KEYID = 1
15,713,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,434,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,449,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,464,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,479,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,499,565 UART: [ldev] --
17,505,700 UART: [fwproc] Wait for Commands...
17,508,359 UART: [fwproc] Recv command 0x46574c44
17,510,624 UART: [fwproc] Recv'd Img size: 114168 bytes
20,950,871 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,029,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,145,338 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,686,456 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,759,967 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,873,118 >>> mbox cmd response: failed
12,873,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,874,016 >>> mbox cmd response: failed
12,874,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,874,584 >>> mbox cmd response: failed
Initializing fuses
2,062,652 writing to cptra_bootfsm_go
10,744,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,936,454 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,027 UART: [kat] SHA2-256
891,965 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
902,496 UART: [kat] HMAC-384Kdf
907,208 UART: [kat] LMS
1,475,404 UART: [kat] --
1,476,497 UART: [cold-reset] ++
1,476,853 UART: [fht] Storing FHT @ 0x50003400
1,479,746 UART: [idev] ++
1,479,914 UART: [idev] CDI.KEYID = 6
1,480,274 UART: [idev] SUBJECT.KEYID = 7
1,480,698 UART: [idev] UDS.KEYID = 0
1,481,043 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,770 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,032 UART: [idev] --
1,514,985 UART: [ldev] ++
1,515,153 UART: [ldev] CDI.KEYID = 6
1,515,516 UART: [ldev] SUBJECT.KEYID = 5
1,515,942 UART: [ldev] AUTHORITY.KEYID = 7
1,516,405 UART: [ldev] FE.KEYID = 1
1,521,299 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,474 UART: [ldev] --
1,585,917 UART: [fwproc] Waiting for Commands...
1,586,702 UART: [fwproc] Received command 0x46574c44
1,587,493 UART: [fwproc] Received Image of size 114168 bytes
1,854,779 UART: ROM Fatal Error: 0x000B0024
1,855,936 >>> mbox cmd response: failed
1,855,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,942 >>> mbox cmd response: failed
1,855,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,948 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,705 UART: [kat] SHA2-256
892,643 UART: [kat] SHA2-384
895,404 UART: [kat] SHA2-512-ACC
897,305 UART: [kat] ECC-384
903,006 UART: [kat] HMAC-384Kdf
907,402 UART: [kat] LMS
1,475,598 UART: [kat] --
1,476,589 UART: [cold-reset] ++
1,477,165 UART: [fht] Storing FHT @ 0x50003400
1,479,972 UART: [idev] ++
1,480,140 UART: [idev] CDI.KEYID = 6
1,480,500 UART: [idev] SUBJECT.KEYID = 7
1,480,924 UART: [idev] UDS.KEYID = 0
1,481,269 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,356 UART: [idev] Erasing UDS.KEYID = 0
1,505,680 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,402 UART: [idev] --
1,515,525 UART: [ldev] ++
1,515,693 UART: [ldev] CDI.KEYID = 6
1,516,056 UART: [ldev] SUBJECT.KEYID = 5
1,516,482 UART: [ldev] AUTHORITY.KEYID = 7
1,516,945 UART: [ldev] FE.KEYID = 1
1,522,241 UART: [ldev] Erasing FE.KEYID = 1
1,548,058 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,152 UART: [ldev] --
1,587,637 UART: [fwproc] Waiting for Commands...
1,588,468 UART: [fwproc] Received command 0x46574c44
1,589,259 UART: [fwproc] Received Image of size 114168 bytes
2,885,240 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,118 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,470 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,095 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,923 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,707,309 >>> mbox cmd response: failed
1,707,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,315 >>> mbox cmd response: failed
1,707,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,321 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,167 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,411 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,460 UART: [kat] SHA2-256
882,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,506 UART: [kat] ++
886,658 UART: [kat] sha1
890,832 UART: [kat] SHA2-256
892,770 UART: [kat] SHA2-384
895,557 UART: [kat] SHA2-512-ACC
897,458 UART: [kat] ECC-384
903,001 UART: [kat] HMAC-384Kdf
907,707 UART: [kat] LMS
1,475,903 UART: [kat] --
1,476,888 UART: [cold-reset] ++
1,477,374 UART: [fht] Storing FHT @ 0x50003400
1,480,089 UART: [idev] ++
1,480,257 UART: [idev] CDI.KEYID = 6
1,480,617 UART: [idev] SUBJECT.KEYID = 7
1,481,041 UART: [idev] UDS.KEYID = 0
1,481,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,393 UART: [idev] Erasing UDS.KEYID = 0
1,506,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,507 UART: [idev] --
1,516,506 UART: [ldev] ++
1,516,674 UART: [ldev] CDI.KEYID = 6
1,517,037 UART: [ldev] SUBJECT.KEYID = 5
1,517,463 UART: [ldev] AUTHORITY.KEYID = 7
1,517,926 UART: [ldev] FE.KEYID = 1
1,523,428 UART: [ldev] Erasing FE.KEYID = 1
1,549,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,387 UART: [ldev] --
1,588,892 UART: [fwproc] Waiting for Commands...
1,589,683 UART: [fwproc] Received command 0x46574c44
1,590,474 UART: [fwproc] Received Image of size 114168 bytes
1,857,788 UART: ROM Fatal Error: 0x000B0024
1,858,945 >>> mbox cmd response: failed
1,858,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,951 >>> mbox cmd response: failed
1,858,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,450 UART: [kat] SHA2-256
892,388 UART: [kat] SHA2-384
895,075 UART: [kat] SHA2-512-ACC
896,976 UART: [kat] ECC-384
902,949 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,830 UART: [cold-reset] ++
1,477,386 UART: [fht] Storing FHT @ 0x50003400
1,480,079 UART: [idev] ++
1,480,247 UART: [idev] CDI.KEYID = 6
1,480,607 UART: [idev] SUBJECT.KEYID = 7
1,481,031 UART: [idev] UDS.KEYID = 0
1,481,376 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,779 UART: [idev] Erasing UDS.KEYID = 0
1,506,549 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,323 UART: [idev] --
1,516,560 UART: [ldev] ++
1,516,728 UART: [ldev] CDI.KEYID = 6
1,517,091 UART: [ldev] SUBJECT.KEYID = 5
1,517,517 UART: [ldev] AUTHORITY.KEYID = 7
1,517,980 UART: [ldev] FE.KEYID = 1
1,523,508 UART: [ldev] Erasing FE.KEYID = 1
1,548,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,303 UART: [ldev] --
1,587,710 UART: [fwproc] Waiting for Commands...
1,588,433 UART: [fwproc] Received command 0x46574c44
1,589,224 UART: [fwproc] Received Image of size 114168 bytes
2,885,521 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,653 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,005 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,590 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,862 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,707,150 >>> mbox cmd response: failed
1,707,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,156 >>> mbox cmd response: failed
1,707,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,894 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,935 UART: [state] WD Timer not started. Device not locked for debugging
88,080 UART: [kat] SHA2-256
893,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,855 UART: [kat] ++
898,007 UART: [kat] sha1
902,475 UART: [kat] SHA2-256
904,415 UART: [kat] SHA2-384
907,036 UART: [kat] SHA2-512-ACC
908,937 UART: [kat] ECC-384
918,948 UART: [kat] HMAC-384Kdf
923,576 UART: [kat] LMS
1,171,904 UART: [kat] --
1,172,705 UART: [cold-reset] ++
1,173,133 UART: [fht] FHT @ 0x50003400
1,175,676 UART: [idev] ++
1,175,844 UART: [idev] CDI.KEYID = 6
1,176,204 UART: [idev] SUBJECT.KEYID = 7
1,176,628 UART: [idev] UDS.KEYID = 0
1,176,973 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,410 UART: [idev] Erasing UDS.KEYID = 0
1,201,893 UART: [idev] Sha1 KeyId Algorithm
1,210,497 UART: [idev] --
1,211,493 UART: [ldev] ++
1,211,661 UART: [ldev] CDI.KEYID = 6
1,212,024 UART: [ldev] SUBJECT.KEYID = 5
1,212,450 UART: [ldev] AUTHORITY.KEYID = 7
1,212,913 UART: [ldev] FE.KEYID = 1
1,218,231 UART: [ldev] Erasing FE.KEYID = 1
1,244,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,273 UART: [ldev] --
1,283,674 UART: [fwproc] Wait for Commands...
1,284,350 UART: [fwproc] Recv command 0x46574c44
1,285,078 UART: [fwproc] Recv'd Img size: 114168 bytes
1,551,008 UART: ROM Fatal Error: 0x000B0024
1,552,165 >>> mbox cmd response: failed
1,552,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,171 >>> mbox cmd response: failed
1,552,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,001 UART: [state] WD Timer not started. Device not locked for debugging
87,196 UART: [kat] SHA2-256
892,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,971 UART: [kat] ++
897,123 UART: [kat] sha1
901,435 UART: [kat] SHA2-256
903,375 UART: [kat] SHA2-384
906,184 UART: [kat] SHA2-512-ACC
908,085 UART: [kat] ECC-384
917,864 UART: [kat] HMAC-384Kdf
922,386 UART: [kat] LMS
1,170,714 UART: [kat] --
1,171,769 UART: [cold-reset] ++
1,172,203 UART: [fht] FHT @ 0x50003400
1,174,730 UART: [idev] ++
1,174,898 UART: [idev] CDI.KEYID = 6
1,175,258 UART: [idev] SUBJECT.KEYID = 7
1,175,682 UART: [idev] UDS.KEYID = 0
1,176,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,818 UART: [idev] Erasing UDS.KEYID = 0
1,200,929 UART: [idev] Sha1 KeyId Algorithm
1,209,197 UART: [idev] --
1,210,223 UART: [ldev] ++
1,210,391 UART: [ldev] CDI.KEYID = 6
1,210,754 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,216,861 UART: [ldev] Erasing FE.KEYID = 1
1,242,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,853 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,896 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,201 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,056 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,405,858 >>> mbox cmd response: failed
1,405,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,864 >>> mbox cmd response: failed
1,405,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,870 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,417 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,183 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
893,163 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,288 UART: [kat] ++
897,440 UART: [kat] sha1
901,530 UART: [kat] SHA2-256
903,470 UART: [kat] SHA2-384
906,215 UART: [kat] SHA2-512-ACC
908,116 UART: [kat] ECC-384
918,119 UART: [kat] HMAC-384Kdf
922,893 UART: [kat] LMS
1,171,221 UART: [kat] --
1,172,228 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,557 UART: [idev] ++
1,175,725 UART: [idev] CDI.KEYID = 6
1,176,085 UART: [idev] SUBJECT.KEYID = 7
1,176,509 UART: [idev] UDS.KEYID = 0
1,176,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,977 UART: [idev] Erasing UDS.KEYID = 0
1,202,490 UART: [idev] Sha1 KeyId Algorithm
1,211,004 UART: [idev] --
1,212,196 UART: [ldev] ++
1,212,364 UART: [ldev] CDI.KEYID = 6
1,212,727 UART: [ldev] SUBJECT.KEYID = 5
1,213,153 UART: [ldev] AUTHORITY.KEYID = 7
1,213,616 UART: [ldev] FE.KEYID = 1
1,219,056 UART: [ldev] Erasing FE.KEYID = 1
1,245,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,272 UART: [ldev] --
1,284,573 UART: [fwproc] Wait for Commands...
1,285,391 UART: [fwproc] Recv command 0x46574c44
1,286,119 UART: [fwproc] Recv'd Img size: 114168 bytes
1,552,365 UART: ROM Fatal Error: 0x000B0024
1,553,522 >>> mbox cmd response: failed
1,553,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,528 >>> mbox cmd response: failed
1,553,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
893,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,376 UART: [kat] ++
897,528 UART: [kat] sha1
901,826 UART: [kat] SHA2-256
903,766 UART: [kat] SHA2-384
906,551 UART: [kat] SHA2-512-ACC
908,452 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
923,049 UART: [kat] LMS
1,171,377 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,383 UART: [idev] ++
1,175,551 UART: [idev] CDI.KEYID = 6
1,175,911 UART: [idev] SUBJECT.KEYID = 7
1,176,335 UART: [idev] UDS.KEYID = 0
1,176,680 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,479 UART: [idev] Erasing UDS.KEYID = 0
1,201,234 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,210,980 UART: [ldev] ++
1,211,148 UART: [ldev] CDI.KEYID = 6
1,211,511 UART: [ldev] SUBJECT.KEYID = 5
1,211,937 UART: [ldev] AUTHORITY.KEYID = 7
1,212,400 UART: [ldev] FE.KEYID = 1
1,217,620 UART: [ldev] Erasing FE.KEYID = 1
1,243,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,526 UART: [ldev] --
1,282,893 UART: [fwproc] Wait for Commands...
1,283,601 UART: [fwproc] Recv command 0x46574c44
1,284,329 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,352 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,125 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,405,887 >>> mbox cmd response: failed
1,405,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,893 >>> mbox cmd response: failed
1,405,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,528 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,184 UART: [kat] SHA2-256
890,734 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,863 UART: [kat] ++
895,015 UART: [kat] sha1
899,267 UART: [kat] SHA2-256
901,207 UART: [kat] SHA2-384
903,894 UART: [kat] SHA2-512-ACC
905,795 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,483 UART: [cold-reset] ++
1,169,957 UART: [fht] FHT @ 0x50003400
1,172,507 UART: [idev] ++
1,172,675 UART: [idev] CDI.KEYID = 6
1,173,036 UART: [idev] SUBJECT.KEYID = 7
1,173,461 UART: [idev] UDS.KEYID = 0
1,173,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,317 UART: [idev] Erasing UDS.KEYID = 0
1,199,023 UART: [idev] Sha1 KeyId Algorithm
1,207,871 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,186 UART: [ldev] Erasing FE.KEYID = 1
1,240,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,292 UART: [ldev] --
1,279,744 UART: [fwproc] Wait for Commands...
1,280,463 UART: [fwproc] Recv command 0x46574c44
1,281,196 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,539 UART: ROM Fatal Error: 0x000B0024
1,548,696 >>> mbox cmd response: failed
1,548,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,702 >>> mbox cmd response: failed
1,548,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,027 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
890,736 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,865 UART: [kat] ++
895,017 UART: [kat] sha1
899,159 UART: [kat] SHA2-256
901,099 UART: [kat] SHA2-384
903,820 UART: [kat] SHA2-512-ACC
905,721 UART: [kat] ECC-384
915,478 UART: [kat] HMAC-384Kdf
920,042 UART: [kat] LMS
1,168,354 UART: [kat] --
1,169,209 UART: [cold-reset] ++
1,169,695 UART: [fht] FHT @ 0x50003400
1,172,387 UART: [idev] ++
1,172,555 UART: [idev] CDI.KEYID = 6
1,172,916 UART: [idev] SUBJECT.KEYID = 7
1,173,341 UART: [idev] UDS.KEYID = 0
1,173,687 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,273 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,208,036 UART: [ldev] ++
1,208,204 UART: [ldev] CDI.KEYID = 6
1,208,568 UART: [ldev] SUBJECT.KEYID = 5
1,208,995 UART: [ldev] AUTHORITY.KEYID = 7
1,209,458 UART: [ldev] FE.KEYID = 1
1,214,508 UART: [ldev] Erasing FE.KEYID = 1
1,240,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,450 UART: [ldev] --
1,279,722 UART: [fwproc] Wait for Commands...
1,280,323 UART: [fwproc] Recv command 0x46574c44
1,281,056 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,362 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,184 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,843 >>> mbox cmd response: failed
1,402,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,849 >>> mbox cmd response: failed
1,402,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,672 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,782 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
915,849 UART: [kat] HMAC-384Kdf
920,567 UART: [kat] LMS
1,168,879 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,808 UART: [idev] ++
1,172,976 UART: [idev] CDI.KEYID = 6
1,173,337 UART: [idev] SUBJECT.KEYID = 7
1,173,762 UART: [idev] UDS.KEYID = 0
1,174,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,206 UART: [idev] --
1,209,059 UART: [ldev] ++
1,209,227 UART: [ldev] CDI.KEYID = 6
1,209,591 UART: [ldev] SUBJECT.KEYID = 5
1,210,018 UART: [ldev] AUTHORITY.KEYID = 7
1,210,481 UART: [ldev] FE.KEYID = 1
1,215,467 UART: [ldev] Erasing FE.KEYID = 1
1,241,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,913 UART: [ldev] --
1,280,409 UART: [fwproc] Wait for Commands...
1,281,186 UART: [fwproc] Recv command 0x46574c44
1,281,919 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,322 UART: ROM Fatal Error: 0x000B0024
1,549,479 >>> mbox cmd response: failed
1,549,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,485 >>> mbox cmd response: failed
1,549,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
891,801 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,930 UART: [kat] ++
896,082 UART: [kat] sha1
900,464 UART: [kat] SHA2-256
902,404 UART: [kat] SHA2-384
905,199 UART: [kat] SHA2-512-ACC
907,100 UART: [kat] ECC-384
916,645 UART: [kat] HMAC-384Kdf
921,353 UART: [kat] LMS
1,169,665 UART: [kat] --
1,170,620 UART: [cold-reset] ++
1,171,120 UART: [fht] FHT @ 0x50003400
1,173,802 UART: [idev] ++
1,173,970 UART: [idev] CDI.KEYID = 6
1,174,331 UART: [idev] SUBJECT.KEYID = 7
1,174,756 UART: [idev] UDS.KEYID = 0
1,175,102 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,946 UART: [idev] Erasing UDS.KEYID = 0
1,200,132 UART: [idev] Sha1 KeyId Algorithm
1,209,002 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,385 UART: [ldev] --
1,281,781 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,676 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,985 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,595 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,589 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,772 >>> mbox cmd response: failed
1,402,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,778 >>> mbox cmd response: failed
1,402,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,105 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
192,130 UART:
192,485 UART: Running Caliptra ROM ...
193,621 UART:
193,765 UART: [state] CFI Enabled
262,926 UART: [state] LifecycleState = Unprovisioned
264,896 UART: [state] DebugLocked = No
266,709 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,943 UART: [kat] SHA2-256
440,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,189 UART: [kat] ++
451,667 UART: [kat] sha1
463,137 UART: [kat] SHA2-256
465,825 UART: [kat] SHA2-384
471,318 UART: [kat] SHA2-512-ACC
473,720 UART: [kat] ECC-384
2,766,634 UART: [kat] HMAC-384Kdf
2,797,856 UART: [kat] LMS
3,988,156 UART: [kat] --
3,990,443 UART: [cold-reset] ++
3,991,735 UART: [fht] Storing FHT @ 0x50003400
4,002,061 UART: [idev] ++
4,002,635 UART: [idev] CDI.KEYID = 6
4,003,576 UART: [idev] SUBJECT.KEYID = 7
4,004,853 UART: [idev] UDS.KEYID = 0
4,007,715 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,151,006 UART: [idev] Erasing UDS.KEYID = 0
7,344,813 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,815 UART: [idev] --
7,373,396 UART: [ldev] ++
7,373,974 UART: [ldev] CDI.KEYID = 6
7,374,940 UART: [ldev] SUBJECT.KEYID = 5
7,376,094 UART: [ldev] AUTHORITY.KEYID = 7
7,377,404 UART: [ldev] FE.KEYID = 1
7,422,293 UART: [ldev] Erasing FE.KEYID = 1
10,753,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,521 UART: [ldev] --
13,116,353 UART: [fwproc] Waiting for Commands...
13,118,234 UART: [fwproc] Received command 0x46574c44
13,120,476 UART: [fwproc] Received Image of size 113844 bytes
16,062,226 UART: ROM Fatal Error: 0x000B0021
16,065,634 >>> mbox cmd response: failed
16,066,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,066,410 >>> mbox cmd response: failed
16,066,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,066,998 >>> mbox cmd response: failed
Initializing fuses
2,058,298 writing to cptra_bootfsm_go
2,247,565 UART:
2,247,903 UART: Running Caliptra ROM ...
2,248,949 UART:
2,249,102 UART: [state] CFI Enabled
2,307,846 UART: [state] LifecycleState = Unprovisioned
2,309,836 UART: [state] DebugLocked = No
2,311,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,811 UART: [kat] SHA2-256
2,486,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,497,026 UART: [kat] ++
2,497,487 UART: [kat] sha1
2,510,026 UART: [kat] SHA2-256
2,512,718 UART: [kat] SHA2-384
2,518,659 UART: [kat] SHA2-512-ACC
2,521,013 UART: [kat] ECC-384
4,810,341 UART: [kat] HMAC-384Kdf
4,842,421 UART: [kat] LMS
6,032,706 UART: [kat] --
6,037,414 UART: [cold-reset] ++
6,038,871 UART: [fht] Storing FHT @ 0x50003400
6,051,491 UART: [idev] ++
6,052,059 UART: [idev] CDI.KEYID = 6
6,053,032 UART: [idev] SUBJECT.KEYID = 7
6,054,254 UART: [idev] UDS.KEYID = 0
6,056,429 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,199,716 UART: [idev] Erasing UDS.KEYID = 0
9,389,424 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,657 UART: [idev] --
9,414,603 UART: [ldev] ++
9,415,172 UART: [ldev] CDI.KEYID = 6
9,416,137 UART: [ldev] SUBJECT.KEYID = 5
9,417,393 UART: [ldev] AUTHORITY.KEYID = 7
9,418,633 UART: [ldev] FE.KEYID = 1
9,463,890 UART: [ldev] Erasing FE.KEYID = 1
12,799,077 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,112,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,174,696 UART: [ldev] --
15,178,556 UART: [fwproc] Waiting for Commands...
15,180,275 UART: [fwproc] Received command 0x46574c44
15,182,519 UART: [fwproc] Received Image of size 113844 bytes
19,234,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,313,327 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,382,227 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,697,698 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,807,506 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,872,829 >>> mbox cmd response: failed
15,873,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,873,712 >>> mbox cmd response: failed
15,873,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,874,275 >>> mbox cmd response: failed
Initializing fuses
2,053,586 writing to cptra_bootfsm_go
5,848,341 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,929,805 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,431 UART:
192,785 UART: Running Caliptra ROM ...
193,979 UART:
603,775 UART: [state] CFI Enabled
615,903 UART: [state] LifecycleState = Unprovisioned
617,873 UART: [state] DebugLocked = No
619,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,477 UART: [kat] SHA2-256
794,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,803 UART: [kat] ++
805,250 UART: [kat] sha1
815,638 UART: [kat] SHA2-256
818,338 UART: [kat] SHA2-384
824,142 UART: [kat] SHA2-512-ACC
826,487 UART: [kat] ECC-384
3,112,032 UART: [kat] HMAC-384Kdf
3,123,988 UART: [kat] LMS
4,314,119 UART: [kat] --
4,317,433 UART: [cold-reset] ++
4,319,803 UART: [fht] Storing FHT @ 0x50003400
4,331,180 UART: [idev] ++
4,331,764 UART: [idev] CDI.KEYID = 6
4,332,677 UART: [idev] SUBJECT.KEYID = 7
4,333,949 UART: [idev] UDS.KEYID = 0
4,336,703 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,997 UART: [idev] Erasing UDS.KEYID = 0
7,624,569 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,081 UART: [idev] --
7,651,782 UART: [ldev] ++
7,652,347 UART: [ldev] CDI.KEYID = 6
7,653,291 UART: [ldev] SUBJECT.KEYID = 5
7,654,505 UART: [ldev] AUTHORITY.KEYID = 7
7,655,792 UART: [ldev] FE.KEYID = 1
7,666,363 UART: [ldev] Erasing FE.KEYID = 1
10,955,979 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,754 UART: [ldev] --
13,318,334 UART: [fwproc] Waiting for Commands...
13,320,972 UART: [fwproc] Received command 0x46574c44
13,323,164 UART: [fwproc] Received Image of size 113844 bytes
16,264,756 UART: ROM Fatal Error: 0x000B0021
16,268,198 >>> mbox cmd response: failed
16,268,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,268,976 >>> mbox cmd response: failed
16,269,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,269,549 >>> mbox cmd response: failed
Initializing fuses
2,061,828 writing to cptra_bootfsm_go
2,251,129 UART:
2,251,479 UART: Running Caliptra ROM ...
2,252,528 UART:
4,193,472 UART: [state] CFI Enabled
4,208,112 UART: [state] LifecycleState = Unprovisioned
4,210,028 UART: [state] DebugLocked = No
4,211,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,215,790 UART: [kat] SHA2-256
4,385,540 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,396,069 UART: [kat] ++
4,396,538 UART: [kat] sha1
4,407,858 UART: [kat] SHA2-256
4,410,565 UART: [kat] SHA2-384
4,416,391 UART: [kat] SHA2-512-ACC
4,418,742 UART: [kat] ECC-384
6,702,108 UART: [kat] HMAC-384Kdf
6,713,646 UART: [kat] LMS
7,903,776 UART: [kat] --
7,907,388 UART: [cold-reset] ++
7,909,342 UART: [fht] Storing FHT @ 0x50003400
7,921,537 UART: [idev] ++
7,922,156 UART: [idev] CDI.KEYID = 6
7,923,063 UART: [idev] SUBJECT.KEYID = 7
7,924,343 UART: [idev] UDS.KEYID = 0
7,926,521 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,069,730 UART: [idev] Erasing UDS.KEYID = 0
11,211,243 UART: [idev] Using Sha1 for KeyId Algorithm
11,233,705 UART: [idev] --
11,238,023 UART: [ldev] ++
11,238,601 UART: [ldev] CDI.KEYID = 6
11,239,539 UART: [ldev] SUBJECT.KEYID = 5
11,240,797 UART: [ldev] AUTHORITY.KEYID = 7
11,242,009 UART: [ldev] FE.KEYID = 1
11,254,551 UART: [ldev] Erasing FE.KEYID = 1
14,540,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,834,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,849,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,863,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,878,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,896,980 UART: [ldev] --
16,902,351 UART: [fwproc] Waiting for Commands...
16,904,884 UART: [fwproc] Received command 0x46574c44
16,907,070 UART: [fwproc] Received Image of size 113844 bytes
20,954,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,029,898 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,098,768 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,414,541 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
4,126,167 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,036,530 >>> mbox cmd response: failed
16,037,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,037,437 >>> mbox cmd response: failed
16,037,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,038,017 >>> mbox cmd response: failed
Initializing fuses
2,057,298 writing to cptra_bootfsm_go
7,954,301 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,898,560 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
192,176 UART:
192,582 UART: Running Caliptra ROM ...
193,806 UART:
193,965 UART: [state] CFI Enabled
264,373 UART: [state] LifecycleState = Unprovisioned
266,246 UART: [state] DebugLocked = No
269,068 UART: [state] WD Timer not started. Device not locked for debugging
272,888 UART: [kat] SHA2-256
451,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,587 UART: [kat] ++
464,122 UART: [kat] sha1
476,738 UART: [kat] SHA2-256
479,746 UART: [kat] SHA2-384
486,205 UART: [kat] SHA2-512-ACC
489,193 UART: [kat] ECC-384
2,945,961 UART: [kat] HMAC-384Kdf
2,971,905 UART: [kat] LMS
3,501,344 UART: [kat] --
3,505,689 UART: [cold-reset] ++
3,508,007 UART: [fht] FHT @ 0x50003400
3,520,343 UART: [idev] ++
3,520,911 UART: [idev] CDI.KEYID = 6
3,521,879 UART: [idev] SUBJECT.KEYID = 7
3,523,039 UART: [idev] UDS.KEYID = 0
3,525,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,418 UART: [idev] Erasing UDS.KEYID = 0
6,028,781 UART: [idev] Sha1 KeyId Algorithm
6,050,925 UART: [idev] --
6,055,415 UART: [ldev] ++
6,056,005 UART: [ldev] CDI.KEYID = 6
6,056,925 UART: [ldev] SUBJECT.KEYID = 5
6,058,027 UART: [ldev] AUTHORITY.KEYID = 7
6,059,318 UART: [ldev] FE.KEYID = 1
6,100,295 UART: [ldev] Erasing FE.KEYID = 1
8,603,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,545 UART: [ldev] --
10,414,107 UART: [fwproc] Wait for Commands...
10,416,580 UART: [fwproc] Recv command 0x46574c44
10,418,679 UART: [fwproc] Recv'd Img size: 114168 bytes
12,714,775 UART: ROM Fatal Error: 0x000B0021
12,717,850 >>> mbox cmd response: failed
12,718,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,718,622 >>> mbox cmd response: failed
12,718,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,187 >>> mbox cmd response: failed
Initializing fuses
2,054,218 writing to cptra_bootfsm_go
2,243,580 UART:
2,243,928 UART: Running Caliptra ROM ...
2,245,062 UART:
2,245,235 UART: [state] CFI Enabled
2,306,173 UART: [state] LifecycleState = Unprovisioned
2,308,058 UART: [state] DebugLocked = No
2,309,347 UART: [state] WD Timer not started. Device not locked for debugging
2,313,965 UART: [kat] SHA2-256
2,493,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,662 UART: [kat] ++
2,505,208 UART: [kat] sha1
2,515,257 UART: [kat] SHA2-256
2,518,322 UART: [kat] SHA2-384
2,525,735 UART: [kat] SHA2-512-ACC
2,528,681 UART: [kat] ECC-384
4,993,376 UART: [kat] HMAC-384Kdf
5,015,547 UART: [kat] LMS
5,545,011 UART: [kat] --
5,550,161 UART: [cold-reset] ++
5,551,000 UART: [fht] FHT @ 0x50003400
5,561,398 UART: [idev] ++
5,561,971 UART: [idev] CDI.KEYID = 6
5,562,879 UART: [idev] SUBJECT.KEYID = 7
5,564,098 UART: [idev] UDS.KEYID = 0
5,566,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,710,112 UART: [idev] Erasing UDS.KEYID = 0
8,070,198 UART: [idev] Sha1 KeyId Algorithm
8,094,132 UART: [idev] --
8,097,553 UART: [ldev] ++
8,098,130 UART: [ldev] CDI.KEYID = 6
8,099,041 UART: [ldev] SUBJECT.KEYID = 5
8,100,264 UART: [ldev] AUTHORITY.KEYID = 7
8,101,492 UART: [ldev] FE.KEYID = 1
8,144,507 UART: [ldev] Erasing FE.KEYID = 1
10,649,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,678 UART: [ldev] --
12,457,436 UART: [fwproc] Wait for Commands...
12,460,457 UART: [fwproc] Recv command 0x46574c44
12,462,557 UART: [fwproc] Recv'd Img size: 114168 bytes
15,854,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,928,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,997,651 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,314,820 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,384,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,493,258 >>> mbox cmd response: failed
12,493,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,494,131 >>> mbox cmd response: failed
12,494,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,494,634 >>> mbox cmd response: failed
Initializing fuses
2,053,597 writing to cptra_bootfsm_go
5,414,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,064,242 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,403 UART:
192,774 UART: Running Caliptra ROM ...
193,924 UART:
603,379 UART: [state] CFI Enabled
620,192 UART: [state] LifecycleState = Unprovisioned
622,015 UART: [state] DebugLocked = No
624,585 UART: [state] WD Timer not started. Device not locked for debugging
628,087 UART: [kat] SHA2-256
807,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,782 UART: [kat] ++
819,360 UART: [kat] sha1
829,219 UART: [kat] SHA2-256
832,256 UART: [kat] SHA2-384
837,803 UART: [kat] SHA2-512-ACC
840,789 UART: [kat] ECC-384
3,282,175 UART: [kat] HMAC-384Kdf
3,295,764 UART: [kat] LMS
3,825,275 UART: [kat] --
3,831,381 UART: [cold-reset] ++
3,833,282 UART: [fht] FHT @ 0x50003400
3,844,482 UART: [idev] ++
3,845,047 UART: [idev] CDI.KEYID = 6
3,845,963 UART: [idev] SUBJECT.KEYID = 7
3,847,176 UART: [idev] UDS.KEYID = 0
3,849,728 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,993,429 UART: [idev] Erasing UDS.KEYID = 0
6,320,894 UART: [idev] Sha1 KeyId Algorithm
6,342,877 UART: [idev] --
6,348,136 UART: [ldev] ++
6,348,719 UART: [ldev] CDI.KEYID = 6
6,349,630 UART: [ldev] SUBJECT.KEYID = 5
6,350,792 UART: [ldev] AUTHORITY.KEYID = 7
6,352,078 UART: [ldev] FE.KEYID = 1
6,362,510 UART: [ldev] Erasing FE.KEYID = 1
8,832,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,184 UART: [ldev] --
10,626,230 UART: [fwproc] Wait for Commands...
10,628,223 UART: [fwproc] Recv command 0x46574c44
10,630,319 UART: [fwproc] Recv'd Img size: 114168 bytes
12,931,272 UART: ROM Fatal Error: 0x000B0021
12,934,398 >>> mbox cmd response: failed
12,934,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,160 >>> mbox cmd response: failed
12,935,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,720 >>> mbox cmd response: failed
Initializing fuses
2,066,619 writing to cptra_bootfsm_go
2,255,950 UART:
2,256,295 UART: Running Caliptra ROM ...
2,257,377 UART:
7,515,747 UART: [state] CFI Enabled
7,526,718 UART: [state] LifecycleState = Unprovisioned
7,528,576 UART: [state] DebugLocked = No
7,529,802 UART: [state] WD Timer not started. Device not locked for debugging
7,533,760 UART: [kat] SHA2-256
7,712,895 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,724,482 UART: [kat] ++
7,725,024 UART: [kat] sha1
7,736,414 UART: [kat] SHA2-256
7,739,427 UART: [kat] SHA2-384
7,744,668 UART: [kat] SHA2-512-ACC
7,747,629 UART: [kat] ECC-384
10,189,567 UART: [kat] HMAC-384Kdf
10,202,054 UART: [kat] LMS
10,731,553 UART: [kat] --
10,737,408 UART: [cold-reset] ++
10,739,458 UART: [fht] FHT @ 0x50003400
10,749,407 UART: [idev] ++
10,749,966 UART: [idev] CDI.KEYID = 6
10,750,879 UART: [idev] SUBJECT.KEYID = 7
10,752,094 UART: [idev] UDS.KEYID = 0
10,754,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,897,847 UART: [idev] Erasing UDS.KEYID = 0
13,224,790 UART: [idev] Sha1 KeyId Algorithm
13,247,580 UART: [idev] --
13,252,190 UART: [ldev] ++
13,252,770 UART: [ldev] CDI.KEYID = 6
13,253,696 UART: [ldev] SUBJECT.KEYID = 5
13,254,858 UART: [ldev] AUTHORITY.KEYID = 7
13,256,087 UART: [ldev] FE.KEYID = 1
13,265,436 UART: [ldev] Erasing FE.KEYID = 1
15,734,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,451,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,467,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,483,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,499,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,519,781 UART: [ldev] --
17,523,962 UART: [fwproc] Wait for Commands...
17,526,216 UART: [fwproc] Recv command 0x46574c44
17,528,307 UART: [fwproc] Recv'd Img size: 114168 bytes
20,934,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,009,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,078,770 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,396,115 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,698,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,700,180 >>> mbox cmd response: failed
12,700,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,701,081 >>> mbox cmd response: failed
12,701,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,701,665 >>> mbox cmd response: failed
Initializing fuses
2,055,206 writing to cptra_bootfsm_go
10,856,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,427,009 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,325 UART:
192,696 UART: Running Caliptra ROM ...
193,806 UART:
193,951 UART: [state] CFI Enabled
261,164 UART: [state] LifecycleState = Unprovisioned
263,531 UART: [state] DebugLocked = No
265,471 UART: [state] WD Timer not started. Device not locked for debugging
270,765 UART: [kat] SHA2-256
460,654 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,418 UART: [kat] ++
471,866 UART: [kat] sha1
483,718 UART: [kat] SHA2-256
486,739 UART: [kat] SHA2-384
493,202 UART: [kat] SHA2-512-ACC
495,762 UART: [kat] ECC-384
2,947,103 UART: [kat] HMAC-384Kdf
2,969,373 UART: [kat] LMS
3,501,136 UART: [kat] --
3,504,643 UART: [cold-reset] ++
3,505,870 UART: [fht] FHT @ 0x50003400
3,517,881 UART: [idev] ++
3,518,556 UART: [idev] CDI.KEYID = 6
3,519,489 UART: [idev] SUBJECT.KEYID = 7
3,520,699 UART: [idev] UDS.KEYID = 0
3,523,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,034 UART: [idev] Erasing UDS.KEYID = 0
6,025,781 UART: [idev] Sha1 KeyId Algorithm
6,048,116 UART: [idev] --
6,052,215 UART: [ldev] ++
6,052,910 UART: [ldev] CDI.KEYID = 6
6,053,824 UART: [ldev] SUBJECT.KEYID = 5
6,055,008 UART: [ldev] AUTHORITY.KEYID = 7
6,056,191 UART: [ldev] FE.KEYID = 1
6,097,119 UART: [ldev] Erasing FE.KEYID = 1
8,604,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,600 UART: [ldev] --
10,414,350 UART: [fwproc] Wait for Commands...
10,415,905 UART: [fwproc] Recv command 0x46574c44
10,418,171 UART: [fwproc] Recv'd Img size: 114168 bytes
12,744,165 UART: ROM Fatal Error: 0x000B0021
12,747,827 >>> mbox cmd response: failed
12,748,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,519 >>> mbox cmd response: failed
12,748,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,749,099 >>> mbox cmd response: failed
Initializing fuses
2,055,837 writing to cptra_bootfsm_go
2,245,178 UART:
2,245,528 UART: Running Caliptra ROM ...
2,246,617 UART:
2,246,777 UART: [state] CFI Enabled
2,317,918 UART: [state] LifecycleState = Unprovisioned
2,320,508 UART: [state] DebugLocked = No
2,322,827 UART: [state] WD Timer not started. Device not locked for debugging
2,327,780 UART: [kat] SHA2-256
2,517,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,459 UART: [kat] ++
2,529,021 UART: [kat] sha1
2,541,649 UART: [kat] SHA2-256
2,544,666 UART: [kat] SHA2-384
2,550,606 UART: [kat] SHA2-512-ACC
2,553,179 UART: [kat] ECC-384
5,001,625 UART: [kat] HMAC-384Kdf
5,024,892 UART: [kat] LMS
5,556,697 UART: [kat] --
5,561,337 UART: [cold-reset] ++
5,563,868 UART: [fht] FHT @ 0x50003400
5,574,849 UART: [idev] ++
5,575,522 UART: [idev] CDI.KEYID = 6
5,576,486 UART: [idev] SUBJECT.KEYID = 7
5,577,710 UART: [idev] UDS.KEYID = 0
5,579,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,723,719 UART: [idev] Erasing UDS.KEYID = 0
8,081,963 UART: [idev] Sha1 KeyId Algorithm
8,104,121 UART: [idev] --
8,109,151 UART: [ldev] ++
8,109,834 UART: [ldev] CDI.KEYID = 6
8,110,746 UART: [ldev] SUBJECT.KEYID = 5
8,111,909 UART: [ldev] AUTHORITY.KEYID = 7
8,113,142 UART: [ldev] FE.KEYID = 1
8,152,680 UART: [ldev] Erasing FE.KEYID = 1
10,658,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,143 UART: [ldev] --
12,466,215 UART: [fwproc] Wait for Commands...
12,468,318 UART: [fwproc] Recv command 0x46574c44
12,470,659 UART: [fwproc] Recv'd Img size: 114168 bytes
15,913,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,992,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,108,452 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,649,034 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,439,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,666,099 >>> mbox cmd response: failed
12,666,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,355 >>> mbox cmd response: failed
12,667,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,914 >>> mbox cmd response: failed
Initializing fuses
2,055,618 writing to cptra_bootfsm_go
5,482,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,808,640 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,632 UART:
192,983 UART: Running Caliptra ROM ...
194,088 UART:
603,732 UART: [state] CFI Enabled
619,047 UART: [state] LifecycleState = Unprovisioned
621,472 UART: [state] DebugLocked = No
623,797 UART: [state] WD Timer not started. Device not locked for debugging
628,295 UART: [kat] SHA2-256
818,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,962 UART: [kat] ++
829,464 UART: [kat] sha1
841,965 UART: [kat] SHA2-256
844,972 UART: [kat] SHA2-384
852,039 UART: [kat] SHA2-512-ACC
854,641 UART: [kat] ECC-384
3,294,148 UART: [kat] HMAC-384Kdf
3,307,085 UART: [kat] LMS
3,838,929 UART: [kat] --
3,843,959 UART: [cold-reset] ++
3,846,003 UART: [fht] FHT @ 0x50003400
3,857,967 UART: [idev] ++
3,858,659 UART: [idev] CDI.KEYID = 6
3,859,679 UART: [idev] SUBJECT.KEYID = 7
3,860,845 UART: [idev] UDS.KEYID = 0
3,863,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,858 UART: [idev] Erasing UDS.KEYID = 0
6,336,911 UART: [idev] Sha1 KeyId Algorithm
6,358,335 UART: [idev] --
6,364,112 UART: [ldev] ++
6,364,845 UART: [ldev] CDI.KEYID = 6
6,365,759 UART: [ldev] SUBJECT.KEYID = 5
6,366,918 UART: [ldev] AUTHORITY.KEYID = 7
6,368,152 UART: [ldev] FE.KEYID = 1
6,378,723 UART: [ldev] Erasing FE.KEYID = 1
8,857,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,345 UART: [ldev] --
10,650,640 UART: [fwproc] Wait for Commands...
10,652,467 UART: [fwproc] Recv command 0x46574c44
10,654,788 UART: [fwproc] Recv'd Img size: 114168 bytes
12,974,730 UART: ROM Fatal Error: 0x000B0021
12,978,348 >>> mbox cmd response: failed
12,978,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,979,078 >>> mbox cmd response: failed
12,979,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,979,604 >>> mbox cmd response: failed
Initializing fuses
2,057,412 writing to cptra_bootfsm_go
2,246,761 UART:
2,247,112 UART: Running Caliptra ROM ...
2,248,193 UART:
7,474,552 UART: [state] CFI Enabled
7,487,033 UART: [state] LifecycleState = Unprovisioned
7,489,388 UART: [state] DebugLocked = No
7,491,101 UART: [state] WD Timer not started. Device not locked for debugging
7,496,390 UART: [kat] SHA2-256
7,686,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,697,051 UART: [kat] ++
7,697,653 UART: [kat] sha1
7,709,907 UART: [kat] SHA2-256
7,712,939 UART: [kat] SHA2-384
7,717,978 UART: [kat] SHA2-512-ACC
7,720,568 UART: [kat] ECC-384
10,163,626 UART: [kat] HMAC-384Kdf
10,176,527 UART: [kat] LMS
10,708,365 UART: [kat] --
10,713,230 UART: [cold-reset] ++
10,714,785 UART: [fht] FHT @ 0x50003400
10,726,150 UART: [idev] ++
10,726,834 UART: [idev] CDI.KEYID = 6
10,727,793 UART: [idev] SUBJECT.KEYID = 7
10,729,007 UART: [idev] UDS.KEYID = 0
10,731,272 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,874,741 UART: [idev] Erasing UDS.KEYID = 0
13,205,514 UART: [idev] Sha1 KeyId Algorithm
13,227,953 UART: [idev] --
13,232,496 UART: [ldev] ++
13,233,214 UART: [ldev] CDI.KEYID = 6
13,234,104 UART: [ldev] SUBJECT.KEYID = 5
13,235,234 UART: [ldev] AUTHORITY.KEYID = 7
13,236,456 UART: [ldev] FE.KEYID = 1
13,247,372 UART: [ldev] Erasing FE.KEYID = 1
15,727,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,444,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,459,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,474,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,489,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,510,965 UART: [ldev] --
17,516,337 UART: [fwproc] Wait for Commands...
17,518,496 UART: [fwproc] Recv command 0x46574c44
17,520,763 UART: [fwproc] Recv'd Img size: 114168 bytes
20,965,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,045,971 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,162,117 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,702,904 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,756,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,868,617 >>> mbox cmd response: failed
12,869,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,869,531 >>> mbox cmd response: failed
12,869,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,870,099 >>> mbox cmd response: failed
Initializing fuses
2,059,657 writing to cptra_bootfsm_go
10,754,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,953,459 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
86,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,801 UART: [kat] SHA2-256
881,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,847 UART: [kat] ++
885,999 UART: [kat] sha1
890,265 UART: [kat] SHA2-256
892,203 UART: [kat] SHA2-384
894,748 UART: [kat] SHA2-512-ACC
896,649 UART: [kat] ECC-384
902,246 UART: [kat] HMAC-384Kdf
906,876 UART: [kat] LMS
1,475,072 UART: [kat] --
1,475,895 UART: [cold-reset] ++
1,476,377 UART: [fht] Storing FHT @ 0x50003400
1,479,100 UART: [idev] ++
1,479,268 UART: [idev] CDI.KEYID = 6
1,479,628 UART: [idev] SUBJECT.KEYID = 7
1,480,052 UART: [idev] UDS.KEYID = 0
1,480,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,966 UART: [idev] Erasing UDS.KEYID = 0
1,505,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,842 UART: [idev] --
1,514,985 UART: [ldev] ++
1,515,153 UART: [ldev] CDI.KEYID = 6
1,515,516 UART: [ldev] SUBJECT.KEYID = 5
1,515,942 UART: [ldev] AUTHORITY.KEYID = 7
1,516,405 UART: [ldev] FE.KEYID = 1
1,521,571 UART: [ldev] Erasing FE.KEYID = 1
1,547,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,474 UART: [ldev] --
1,586,943 UART: [fwproc] Waiting for Commands...
1,587,568 UART: [fwproc] Received command 0x46574c44
1,588,359 UART: [fwproc] Received Image of size 114168 bytes
1,853,711 UART: ROM Fatal Error: 0x000B0021
1,854,868 >>> mbox cmd response: failed
1,854,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,874 >>> mbox cmd response: failed
1,854,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,973 UART: [kat] SHA2-256
881,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,019 UART: [kat] ++
886,171 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,186 UART: [kat] SHA2-512-ACC
897,087 UART: [kat] ECC-384
902,764 UART: [kat] HMAC-384Kdf
907,488 UART: [kat] LMS
1,475,684 UART: [kat] --
1,476,693 UART: [cold-reset] ++
1,477,061 UART: [fht] Storing FHT @ 0x50003400
1,479,810 UART: [idev] ++
1,479,978 UART: [idev] CDI.KEYID = 6
1,480,338 UART: [idev] SUBJECT.KEYID = 7
1,480,762 UART: [idev] UDS.KEYID = 0
1,481,107 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,804 UART: [idev] Erasing UDS.KEYID = 0
1,504,902 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,498 UART: [idev] --
1,514,541 UART: [ldev] ++
1,514,709 UART: [ldev] CDI.KEYID = 6
1,515,072 UART: [ldev] SUBJECT.KEYID = 5
1,515,498 UART: [ldev] AUTHORITY.KEYID = 7
1,515,961 UART: [ldev] FE.KEYID = 1
1,521,007 UART: [ldev] Erasing FE.KEYID = 1
1,546,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,920 UART: [ldev] --
1,585,291 UART: [fwproc] Waiting for Commands...
1,586,040 UART: [fwproc] Received command 0x46574c44
1,586,831 UART: [fwproc] Received Image of size 114168 bytes
2,882,990 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,122 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,474 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,099 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,973 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,706,225 >>> mbox cmd response: failed
1,706,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,231 >>> mbox cmd response: failed
1,706,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,706,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,977 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,799 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,734 UART: [kat] SHA2-256
882,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,780 UART: [kat] ++
886,932 UART: [kat] sha1
891,278 UART: [kat] SHA2-256
893,216 UART: [kat] SHA2-384
895,895 UART: [kat] SHA2-512-ACC
897,796 UART: [kat] ECC-384
903,347 UART: [kat] HMAC-384Kdf
907,919 UART: [kat] LMS
1,476,115 UART: [kat] --
1,477,136 UART: [cold-reset] ++
1,477,590 UART: [fht] Storing FHT @ 0x50003400
1,480,259 UART: [idev] ++
1,480,427 UART: [idev] CDI.KEYID = 6
1,480,787 UART: [idev] SUBJECT.KEYID = 7
1,481,211 UART: [idev] UDS.KEYID = 0
1,481,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,313 UART: [idev] Erasing UDS.KEYID = 0
1,505,751 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,189 UART: [idev] --
1,515,210 UART: [ldev] ++
1,515,378 UART: [ldev] CDI.KEYID = 6
1,515,741 UART: [ldev] SUBJECT.KEYID = 5
1,516,167 UART: [ldev] AUTHORITY.KEYID = 7
1,516,630 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,546,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,223 UART: [ldev] --
1,585,636 UART: [fwproc] Waiting for Commands...
1,586,379 UART: [fwproc] Received command 0x46574c44
1,587,170 UART: [fwproc] Received Image of size 114168 bytes
1,854,106 UART: ROM Fatal Error: 0x000B0021
1,855,263 >>> mbox cmd response: failed
1,855,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,269 >>> mbox cmd response: failed
1,855,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,855,275 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,420 UART: [kat] SHA2-256
882,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,466 UART: [kat] ++
886,618 UART: [kat] sha1
890,814 UART: [kat] SHA2-256
892,752 UART: [kat] SHA2-384
895,531 UART: [kat] SHA2-512-ACC
897,432 UART: [kat] ECC-384
903,095 UART: [kat] HMAC-384Kdf
907,891 UART: [kat] LMS
1,476,087 UART: [kat] --
1,476,752 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,977 UART: [idev] ++
1,480,145 UART: [idev] CDI.KEYID = 6
1,480,505 UART: [idev] SUBJECT.KEYID = 7
1,480,929 UART: [idev] UDS.KEYID = 0
1,481,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,803 UART: [idev] Erasing UDS.KEYID = 0
1,505,087 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,673 UART: [idev] --
1,514,544 UART: [ldev] ++
1,514,712 UART: [ldev] CDI.KEYID = 6
1,515,075 UART: [ldev] SUBJECT.KEYID = 5
1,515,501 UART: [ldev] AUTHORITY.KEYID = 7
1,515,964 UART: [ldev] FE.KEYID = 1
1,521,022 UART: [ldev] Erasing FE.KEYID = 1
1,546,589 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,531 UART: [ldev] --
1,585,882 UART: [fwproc] Waiting for Commands...
1,586,583 UART: [fwproc] Received command 0x46574c44
1,587,374 UART: [fwproc] Received Image of size 114168 bytes
2,881,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,777 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,073,748 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,707,456 >>> mbox cmd response: failed
1,707,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,462 >>> mbox cmd response: failed
1,707,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,124 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,272 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
893,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,141 UART: [kat] ++
897,293 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,580 UART: [kat] SHA2-512-ACC
908,481 UART: [kat] ECC-384
918,392 UART: [kat] HMAC-384Kdf
922,898 UART: [kat] LMS
1,171,226 UART: [kat] --
1,172,345 UART: [cold-reset] ++
1,172,885 UART: [fht] FHT @ 0x50003400
1,175,504 UART: [idev] ++
1,175,672 UART: [idev] CDI.KEYID = 6
1,176,032 UART: [idev] SUBJECT.KEYID = 7
1,176,456 UART: [idev] UDS.KEYID = 0
1,176,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,572 UART: [idev] Erasing UDS.KEYID = 0
1,201,391 UART: [idev] Sha1 KeyId Algorithm
1,209,923 UART: [idev] --
1,210,935 UART: [ldev] ++
1,211,103 UART: [ldev] CDI.KEYID = 6
1,211,466 UART: [ldev] SUBJECT.KEYID = 5
1,211,892 UART: [ldev] AUTHORITY.KEYID = 7
1,212,355 UART: [ldev] FE.KEYID = 1
1,217,379 UART: [ldev] Erasing FE.KEYID = 1
1,243,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,560 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,892 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,130 UART: ROM Fatal Error: 0x000B0021
1,551,287 >>> mbox cmd response: failed
1,551,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,293 >>> mbox cmd response: failed
1,551,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
902,217 UART: [kat] SHA2-256
904,157 UART: [kat] SHA2-384
907,076 UART: [kat] SHA2-512-ACC
908,977 UART: [kat] ECC-384
918,502 UART: [kat] HMAC-384Kdf
923,182 UART: [kat] LMS
1,171,510 UART: [kat] --
1,172,423 UART: [cold-reset] ++
1,172,817 UART: [fht] FHT @ 0x50003400
1,175,560 UART: [idev] ++
1,175,728 UART: [idev] CDI.KEYID = 6
1,176,088 UART: [idev] SUBJECT.KEYID = 7
1,176,512 UART: [idev] UDS.KEYID = 0
1,176,857 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,794 UART: [idev] Erasing UDS.KEYID = 0
1,201,739 UART: [idev] Sha1 KeyId Algorithm
1,210,053 UART: [idev] --
1,211,283 UART: [ldev] ++
1,211,451 UART: [ldev] CDI.KEYID = 6
1,211,814 UART: [ldev] SUBJECT.KEYID = 5
1,212,240 UART: [ldev] AUTHORITY.KEYID = 7
1,212,703 UART: [ldev] FE.KEYID = 1
1,217,867 UART: [ldev] Erasing FE.KEYID = 1
1,244,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,259 UART: [ldev] --
1,283,548 UART: [fwproc] Wait for Commands...
1,284,176 UART: [fwproc] Recv command 0x46574c44
1,284,904 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,765 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,069 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,618 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,406,132 >>> mbox cmd response: failed
1,406,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,138 >>> mbox cmd response: failed
1,406,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,406,144 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,629 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,436 UART: [kat] SHA2-256
904,376 UART: [kat] SHA2-384
907,197 UART: [kat] SHA2-512-ACC
909,098 UART: [kat] ECC-384
918,915 UART: [kat] HMAC-384Kdf
923,581 UART: [kat] LMS
1,171,909 UART: [kat] --
1,173,058 UART: [cold-reset] ++
1,173,420 UART: [fht] FHT @ 0x50003400
1,176,013 UART: [idev] ++
1,176,181 UART: [idev] CDI.KEYID = 6
1,176,541 UART: [idev] SUBJECT.KEYID = 7
1,176,965 UART: [idev] UDS.KEYID = 0
1,177,310 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,763 UART: [idev] Erasing UDS.KEYID = 0
1,201,486 UART: [idev] Sha1 KeyId Algorithm
1,209,934 UART: [idev] --
1,210,892 UART: [ldev] ++
1,211,060 UART: [ldev] CDI.KEYID = 6
1,211,423 UART: [ldev] SUBJECT.KEYID = 5
1,211,849 UART: [ldev] AUTHORITY.KEYID = 7
1,212,312 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,244,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,474 UART: [ldev] --
1,283,833 UART: [fwproc] Wait for Commands...
1,284,441 UART: [fwproc] Recv command 0x46574c44
1,285,169 UART: [fwproc] Recv'd Img size: 114168 bytes
1,551,695 UART: ROM Fatal Error: 0x000B0021
1,552,852 >>> mbox cmd response: failed
1,552,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,858 >>> mbox cmd response: failed
1,552,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,552,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
893,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,968 UART: [kat] ++
898,120 UART: [kat] sha1
902,548 UART: [kat] SHA2-256
904,488 UART: [kat] SHA2-384
907,403 UART: [kat] SHA2-512-ACC
909,304 UART: [kat] ECC-384
918,983 UART: [kat] HMAC-384Kdf
923,693 UART: [kat] LMS
1,172,021 UART: [kat] --
1,173,030 UART: [cold-reset] ++
1,173,536 UART: [fht] FHT @ 0x50003400
1,176,081 UART: [idev] ++
1,176,249 UART: [idev] CDI.KEYID = 6
1,176,609 UART: [idev] SUBJECT.KEYID = 7
1,177,033 UART: [idev] UDS.KEYID = 0
1,177,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,469 UART: [idev] Erasing UDS.KEYID = 0
1,202,538 UART: [idev] Sha1 KeyId Algorithm
1,210,996 UART: [idev] --
1,212,046 UART: [ldev] ++
1,212,214 UART: [ldev] CDI.KEYID = 6
1,212,577 UART: [ldev] SUBJECT.KEYID = 5
1,213,003 UART: [ldev] AUTHORITY.KEYID = 7
1,213,466 UART: [ldev] FE.KEYID = 1
1,218,868 UART: [ldev] Erasing FE.KEYID = 1
1,245,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,644 UART: [ldev] --
1,285,135 UART: [fwproc] Wait for Commands...
1,285,789 UART: [fwproc] Recv command 0x46574c44
1,286,517 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,854 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,158 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,843 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,668 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,407,795 >>> mbox cmd response: failed
1,407,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,801 >>> mbox cmd response: failed
1,407,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,407,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,908 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,564 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,444 UART: [state] LifecycleState = Unprovisioned
86,099 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,442 UART: [kat] SHA2-512-ACC
906,343 UART: [kat] ECC-384
915,950 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,369 UART: [cold-reset] ++
1,169,845 UART: [fht] FHT @ 0x50003400
1,172,571 UART: [idev] ++
1,172,739 UART: [idev] CDI.KEYID = 6
1,173,100 UART: [idev] SUBJECT.KEYID = 7
1,173,525 UART: [idev] UDS.KEYID = 0
1,173,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,485 UART: [idev] Erasing UDS.KEYID = 0
1,198,107 UART: [idev] Sha1 KeyId Algorithm
1,207,143 UART: [idev] --
1,208,140 UART: [ldev] ++
1,208,308 UART: [ldev] CDI.KEYID = 6
1,208,672 UART: [ldev] SUBJECT.KEYID = 5
1,209,099 UART: [ldev] AUTHORITY.KEYID = 7
1,209,562 UART: [ldev] FE.KEYID = 1
1,214,534 UART: [ldev] Erasing FE.KEYID = 1
1,240,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,662 UART: [ldev] --
1,280,166 UART: [fwproc] Wait for Commands...
1,280,847 UART: [fwproc] Recv command 0x46574c44
1,281,580 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,085 UART: ROM Fatal Error: 0x000B0021
1,548,242 >>> mbox cmd response: failed
1,548,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,248 >>> mbox cmd response: failed
1,548,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,468 UART: [kat] SHA2-256
891,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,147 UART: [kat] ++
895,299 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,740 UART: [kat] LMS
1,169,052 UART: [kat] --
1,169,757 UART: [cold-reset] ++
1,170,331 UART: [fht] FHT @ 0x50003400
1,172,849 UART: [idev] ++
1,173,017 UART: [idev] CDI.KEYID = 6
1,173,378 UART: [idev] SUBJECT.KEYID = 7
1,173,803 UART: [idev] UDS.KEYID = 0
1,174,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,471 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,215,142 UART: [ldev] Erasing FE.KEYID = 1
1,241,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,392 UART: [ldev] --
1,280,908 UART: [fwproc] Wait for Commands...
1,281,687 UART: [fwproc] Recv command 0x46574c44
1,282,420 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,894 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,699 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,761 >>> mbox cmd response: failed
1,402,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,767 >>> mbox cmd response: failed
1,402,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,030 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,318 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,967 UART: [state] LifecycleState = Unprovisioned
85,622 UART: [state] DebugLocked = No
86,180 UART: [state] WD Timer not started. Device not locked for debugging
87,401 UART: [kat] SHA2-256
890,951 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
903,925 UART: [kat] SHA2-512-ACC
905,826 UART: [kat] ECC-384
915,819 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,169,900 UART: [fht] FHT @ 0x50003400
1,172,542 UART: [idev] ++
1,172,710 UART: [idev] CDI.KEYID = 6
1,173,071 UART: [idev] SUBJECT.KEYID = 7
1,173,496 UART: [idev] UDS.KEYID = 0
1,173,842 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,324 UART: [idev] Erasing UDS.KEYID = 0
1,197,988 UART: [idev] Sha1 KeyId Algorithm
1,207,084 UART: [idev] --
1,208,129 UART: [ldev] ++
1,208,297 UART: [ldev] CDI.KEYID = 6
1,208,661 UART: [ldev] SUBJECT.KEYID = 5
1,209,088 UART: [ldev] AUTHORITY.KEYID = 7
1,209,551 UART: [ldev] FE.KEYID = 1
1,214,401 UART: [ldev] Erasing FE.KEYID = 1
1,240,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,771 UART: [ldev] --
1,280,091 UART: [fwproc] Wait for Commands...
1,280,702 UART: [fwproc] Recv command 0x46574c44
1,281,435 UART: [fwproc] Recv'd Img size: 114168 bytes
1,547,630 UART: ROM Fatal Error: 0x000B0021
1,548,787 >>> mbox cmd response: failed
1,548,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,793 >>> mbox cmd response: failed
1,548,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,548,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,639 UART: [kat] LMS
1,168,951 UART: [kat] --
1,169,838 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,172,738 UART: [idev] ++
1,172,906 UART: [idev] CDI.KEYID = 6
1,173,267 UART: [idev] SUBJECT.KEYID = 7
1,173,692 UART: [idev] UDS.KEYID = 0
1,174,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,212 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,209,163 UART: [ldev] ++
1,209,331 UART: [ldev] CDI.KEYID = 6
1,209,695 UART: [ldev] SUBJECT.KEYID = 5
1,210,122 UART: [ldev] AUTHORITY.KEYID = 7
1,210,585 UART: [ldev] FE.KEYID = 1
1,215,481 UART: [ldev] Erasing FE.KEYID = 1
1,242,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,915 UART: [fwproc] Wait for Commands...
1,282,522 UART: [fwproc] Recv command 0x46574c44
1,283,255 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,054 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,363 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,009 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,251 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,404,000 >>> mbox cmd response: failed
1,404,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,006 >>> mbox cmd response: failed
1,404,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,404,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,257 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,527 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,209 UART:
192,849 UART: Running Caliptra ROM ...
194,049 UART:
194,210 UART: [state] CFI Enabled
261,006 UART: [state] LifecycleState = Unprovisioned
262,887 UART: [state] DebugLocked = No
264,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,408 UART: [kat] SHA2-256
439,100 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,620 UART: [kat] ++
450,105 UART: [kat] sha1
460,069 UART: [kat] SHA2-256
462,757 UART: [kat] SHA2-384
469,224 UART: [kat] SHA2-512-ACC
471,611 UART: [kat] ECC-384
2,765,172 UART: [kat] HMAC-384Kdf
2,796,324 UART: [kat] LMS
3,986,641 UART: [kat] --
3,989,519 UART: [cold-reset] ++
3,992,214 UART: [fht] Storing FHT @ 0x50003400
4,004,402 UART: [idev] ++
4,004,974 UART: [idev] CDI.KEYID = 6
4,005,961 UART: [idev] SUBJECT.KEYID = 7
4,007,180 UART: [idev] UDS.KEYID = 0
4,010,335 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,769 UART: [idev] Erasing UDS.KEYID = 0
7,341,848 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,938 UART: [idev] --
7,368,747 UART: [ldev] ++
7,369,320 UART: [ldev] CDI.KEYID = 6
7,370,289 UART: [ldev] SUBJECT.KEYID = 5
7,371,504 UART: [ldev] AUTHORITY.KEYID = 7
7,372,757 UART: [ldev] FE.KEYID = 1
7,399,599 UART: [ldev] Erasing FE.KEYID = 1
10,729,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,215 UART: [ldev] --
13,091,956 UART: [fwproc] Waiting for Commands...
13,094,063 UART: [fwproc] Received command 0x46574c44
13,096,255 UART: [fwproc] Received Image of size 113844 bytes
16,036,135 UART: ROM Fatal Error: 0x000B0022
16,039,538 >>> mbox cmd response: failed
16,039,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,040,294 >>> mbox cmd response: failed
16,040,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,040,880 >>> mbox cmd response: failed
Initializing fuses
2,055,116 writing to cptra_bootfsm_go
2,244,441 UART:
2,244,795 UART: Running Caliptra ROM ...
2,245,936 UART:
2,246,099 UART: [state] CFI Enabled
2,310,655 UART: [state] LifecycleState = Unprovisioned
2,312,594 UART: [state] DebugLocked = No
2,314,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,571 UART: [kat] SHA2-256
2,490,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,791 UART: [kat] ++
2,501,331 UART: [kat] sha1
2,512,303 UART: [kat] SHA2-256
2,514,999 UART: [kat] SHA2-384
2,520,878 UART: [kat] SHA2-512-ACC
2,523,233 UART: [kat] ECC-384
4,811,393 UART: [kat] HMAC-384Kdf
4,844,522 UART: [kat] LMS
6,034,793 UART: [kat] --
6,039,287 UART: [cold-reset] ++
6,041,495 UART: [fht] Storing FHT @ 0x50003400
6,052,774 UART: [idev] ++
6,053,344 UART: [idev] CDI.KEYID = 6
6,054,312 UART: [idev] SUBJECT.KEYID = 7
6,055,530 UART: [idev] UDS.KEYID = 0
6,057,812 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,201,108 UART: [idev] Erasing UDS.KEYID = 0
9,391,739 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,289 UART: [idev] --
9,417,763 UART: [ldev] ++
9,418,339 UART: [ldev] CDI.KEYID = 6
9,419,308 UART: [ldev] SUBJECT.KEYID = 5
9,420,570 UART: [ldev] AUTHORITY.KEYID = 7
9,421,820 UART: [ldev] FE.KEYID = 1
9,466,428 UART: [ldev] Erasing FE.KEYID = 1
12,799,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,157,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,256 UART: [ldev] --
15,180,763 UART: [fwproc] Waiting for Commands...
15,183,833 UART: [fwproc] Received command 0x46574c44
15,186,027 UART: [fwproc] Received Image of size 113844 bytes
19,226,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,305,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,374,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,690,757 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,785,896 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,830,923 >>> mbox cmd response: failed
15,831,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,831,889 >>> mbox cmd response: failed
15,832,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,832,480 >>> mbox cmd response: failed
Initializing fuses
2,057,707 writing to cptra_bootfsm_go
5,855,154 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,938,144 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,332 UART:
192,693 UART: Running Caliptra ROM ...
193,820 UART:
603,351 UART: [state] CFI Enabled
614,936 UART: [state] LifecycleState = Unprovisioned
616,889 UART: [state] DebugLocked = No
618,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,911 UART: [kat] SHA2-256
793,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,198 UART: [kat] ++
804,734 UART: [kat] sha1
815,942 UART: [kat] SHA2-256
818,696 UART: [kat] SHA2-384
825,108 UART: [kat] SHA2-512-ACC
827,448 UART: [kat] ECC-384
3,109,109 UART: [kat] HMAC-384Kdf
3,121,195 UART: [kat] LMS
4,311,301 UART: [kat] --
4,314,070 UART: [cold-reset] ++
4,315,472 UART: [fht] Storing FHT @ 0x50003400
4,325,610 UART: [idev] ++
4,326,182 UART: [idev] CDI.KEYID = 6
4,327,199 UART: [idev] SUBJECT.KEYID = 7
4,328,363 UART: [idev] UDS.KEYID = 0
4,331,537 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,474,762 UART: [idev] Erasing UDS.KEYID = 0
7,618,104 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,352 UART: [idev] --
7,643,479 UART: [ldev] ++
7,644,061 UART: [ldev] CDI.KEYID = 6
7,645,032 UART: [ldev] SUBJECT.KEYID = 5
7,646,247 UART: [ldev] AUTHORITY.KEYID = 7
7,647,479 UART: [ldev] FE.KEYID = 1
7,658,290 UART: [ldev] Erasing FE.KEYID = 1
10,948,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,515 UART: [ldev] --
13,305,784 UART: [fwproc] Waiting for Commands...
13,308,212 UART: [fwproc] Received command 0x46574c44
13,310,279 UART: [fwproc] Received Image of size 113844 bytes
16,250,535 UART: ROM Fatal Error: 0x000B0022
16,253,960 >>> mbox cmd response: failed
16,254,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,254,725 >>> mbox cmd response: failed
16,254,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,255,298 >>> mbox cmd response: failed
Initializing fuses
2,061,737 writing to cptra_bootfsm_go
2,251,030 UART:
2,251,390 UART: Running Caliptra ROM ...
2,252,624 UART:
4,201,327 UART: [state] CFI Enabled
4,216,988 UART: [state] LifecycleState = Unprovisioned
4,218,955 UART: [state] DebugLocked = No
4,221,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,226,017 UART: [kat] SHA2-256
4,395,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,406,285 UART: [kat] ++
4,406,746 UART: [kat] sha1
4,417,799 UART: [kat] SHA2-256
4,420,479 UART: [kat] SHA2-384
4,425,992 UART: [kat] SHA2-512-ACC
4,428,346 UART: [kat] ECC-384
6,712,904 UART: [kat] HMAC-384Kdf
6,724,391 UART: [kat] LMS
7,914,493 UART: [kat] --
7,919,644 UART: [cold-reset] ++
7,921,795 UART: [fht] Storing FHT @ 0x50003400
7,933,490 UART: [idev] ++
7,934,090 UART: [idev] CDI.KEYID = 6
7,934,979 UART: [idev] SUBJECT.KEYID = 7
7,936,273 UART: [idev] UDS.KEYID = 0
7,938,458 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,081,413 UART: [idev] Erasing UDS.KEYID = 0
11,221,802 UART: [idev] Using Sha1 for KeyId Algorithm
11,244,696 UART: [idev] --
11,248,097 UART: [ldev] ++
11,248,672 UART: [ldev] CDI.KEYID = 6
11,249,648 UART: [ldev] SUBJECT.KEYID = 5
11,250,777 UART: [ldev] AUTHORITY.KEYID = 7
11,252,126 UART: [ldev] FE.KEYID = 1
11,263,261 UART: [ldev] Erasing FE.KEYID = 1
14,552,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,846,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,860,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,875,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,890,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,908,577 UART: [ldev] --
16,913,473 UART: [fwproc] Waiting for Commands...
16,916,272 UART: [fwproc] Received command 0x46574c44
16,918,459 UART: [fwproc] Received Image of size 113844 bytes
20,967,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,042,378 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,111,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,426,997 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,127,862 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,050,597 >>> mbox cmd response: failed
16,051,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,051,511 >>> mbox cmd response: failed
16,051,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,052,077 >>> mbox cmd response: failed
Initializing fuses
2,055,747 writing to cptra_bootfsm_go
7,936,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,873,824 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,144 UART:
192,506 UART: Running Caliptra ROM ...
193,620 UART:
193,765 UART: [state] CFI Enabled
265,004 UART: [state] LifecycleState = Unprovisioned
266,874 UART: [state] DebugLocked = No
269,145 UART: [state] WD Timer not started. Device not locked for debugging
272,759 UART: [kat] SHA2-256
451,842 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,438 UART: [kat] ++
463,981 UART: [kat] sha1
475,893 UART: [kat] SHA2-256
478,931 UART: [kat] SHA2-384
486,100 UART: [kat] SHA2-512-ACC
489,034 UART: [kat] ECC-384
2,946,598 UART: [kat] HMAC-384Kdf
2,961,207 UART: [kat] LMS
3,490,681 UART: [kat] --
3,494,759 UART: [cold-reset] ++
3,496,478 UART: [fht] FHT @ 0x50003400
3,507,193 UART: [idev] ++
3,507,758 UART: [idev] CDI.KEYID = 6
3,508,666 UART: [idev] SUBJECT.KEYID = 7
3,509,838 UART: [idev] UDS.KEYID = 0
3,512,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,656,833 UART: [idev] Erasing UDS.KEYID = 0
6,016,679 UART: [idev] Sha1 KeyId Algorithm
6,039,263 UART: [idev] --
6,044,275 UART: [ldev] ++
6,044,858 UART: [ldev] CDI.KEYID = 6
6,045,745 UART: [ldev] SUBJECT.KEYID = 5
6,046,905 UART: [ldev] AUTHORITY.KEYID = 7
6,048,193 UART: [ldev] FE.KEYID = 1
6,090,441 UART: [ldev] Erasing FE.KEYID = 1
8,594,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,907 UART: [ldev] --
10,404,009 UART: [fwproc] Wait for Commands...
10,405,463 UART: [fwproc] Recv command 0x46574c44
10,407,560 UART: [fwproc] Recv'd Img size: 114168 bytes
12,696,728 UART: ROM Fatal Error: 0x000B0022
12,699,827 >>> mbox cmd response: failed
12,700,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,700,611 >>> mbox cmd response: failed
12,700,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,701,167 >>> mbox cmd response: failed
Initializing fuses
2,052,707 writing to cptra_bootfsm_go
2,242,069 UART:
2,242,434 UART: Running Caliptra ROM ...
2,243,578 UART:
2,243,751 UART: [state] CFI Enabled
2,316,195 UART: [state] LifecycleState = Unprovisioned
2,318,076 UART: [state] DebugLocked = No
2,319,581 UART: [state] WD Timer not started. Device not locked for debugging
2,323,305 UART: [kat] SHA2-256
2,502,453 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,028 UART: [kat] ++
2,514,582 UART: [kat] sha1
2,524,297 UART: [kat] SHA2-256
2,527,312 UART: [kat] SHA2-384
2,533,943 UART: [kat] SHA2-512-ACC
2,536,877 UART: [kat] ECC-384
4,998,182 UART: [kat] HMAC-384Kdf
5,022,239 UART: [kat] LMS
5,551,724 UART: [kat] --
5,555,624 UART: [cold-reset] ++
5,558,047 UART: [fht] FHT @ 0x50003400
5,567,841 UART: [idev] ++
5,568,408 UART: [idev] CDI.KEYID = 6
5,569,316 UART: [idev] SUBJECT.KEYID = 7
5,570,553 UART: [idev] UDS.KEYID = 0
5,572,835 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,716,652 UART: [idev] Erasing UDS.KEYID = 0
8,075,219 UART: [idev] Sha1 KeyId Algorithm
8,098,555 UART: [idev] --
8,102,069 UART: [ldev] ++
8,102,644 UART: [ldev] CDI.KEYID = 6
8,103,558 UART: [ldev] SUBJECT.KEYID = 5
8,104,723 UART: [ldev] AUTHORITY.KEYID = 7
8,105,955 UART: [ldev] FE.KEYID = 1
8,150,567 UART: [ldev] Erasing FE.KEYID = 1
10,652,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,389,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,059 UART: [ldev] --
12,462,506 UART: [fwproc] Wait for Commands...
12,464,507 UART: [fwproc] Recv command 0x46574c44
12,466,608 UART: [fwproc] Recv'd Img size: 114168 bytes
15,859,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,931,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,000,115 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,316,986 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,383,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,492,122 >>> mbox cmd response: failed
12,492,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,493,079 >>> mbox cmd response: failed
12,493,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,493,643 >>> mbox cmd response: failed
Initializing fuses
2,053,811 writing to cptra_bootfsm_go
5,436,984 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,142,599 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
193,234 UART:
193,588 UART: Running Caliptra ROM ...
194,700 UART:
604,152 UART: [state] CFI Enabled
615,670 UART: [state] LifecycleState = Unprovisioned
617,549 UART: [state] DebugLocked = No
619,006 UART: [state] WD Timer not started. Device not locked for debugging
623,209 UART: [kat] SHA2-256
802,288 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,866 UART: [kat] ++
814,353 UART: [kat] sha1
825,507 UART: [kat] SHA2-256
828,514 UART: [kat] SHA2-384
834,609 UART: [kat] SHA2-512-ACC
837,562 UART: [kat] ECC-384
3,277,077 UART: [kat] HMAC-384Kdf
3,288,846 UART: [kat] LMS
3,818,340 UART: [kat] --
3,824,229 UART: [cold-reset] ++
3,825,242 UART: [fht] FHT @ 0x50003400
3,835,391 UART: [idev] ++
3,835,962 UART: [idev] CDI.KEYID = 6
3,836,846 UART: [idev] SUBJECT.KEYID = 7
3,838,061 UART: [idev] UDS.KEYID = 0
3,840,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,260 UART: [idev] Erasing UDS.KEYID = 0
6,316,308 UART: [idev] Sha1 KeyId Algorithm
6,340,021 UART: [idev] --
6,344,155 UART: [ldev] ++
6,344,737 UART: [ldev] CDI.KEYID = 6
6,345,641 UART: [ldev] SUBJECT.KEYID = 5
6,346,749 UART: [ldev] AUTHORITY.KEYID = 7
6,348,039 UART: [ldev] FE.KEYID = 1
6,360,015 UART: [ldev] Erasing FE.KEYID = 1
8,834,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,854 UART: [ldev] --
10,626,362 UART: [fwproc] Wait for Commands...
10,627,975 UART: [fwproc] Recv command 0x46574c44
10,630,014 UART: [fwproc] Recv'd Img size: 114168 bytes
12,925,076 UART: ROM Fatal Error: 0x000B0022
12,928,207 >>> mbox cmd response: failed
12,928,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,928,912 >>> mbox cmd response: failed
12,929,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,510 >>> mbox cmd response: failed
Initializing fuses
2,053,699 writing to cptra_bootfsm_go
2,243,003 UART:
2,243,340 UART: Running Caliptra ROM ...
2,244,480 UART:
7,522,731 UART: [state] CFI Enabled
7,538,523 UART: [state] LifecycleState = Unprovisioned
7,540,390 UART: [state] DebugLocked = No
7,542,940 UART: [state] WD Timer not started. Device not locked for debugging
7,545,923 UART: [kat] SHA2-256
7,725,044 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,736,597 UART: [kat] ++
7,737,060 UART: [kat] sha1
7,748,544 UART: [kat] SHA2-256
7,751,570 UART: [kat] SHA2-384
7,757,836 UART: [kat] SHA2-512-ACC
7,760,779 UART: [kat] ECC-384
10,202,387 UART: [kat] HMAC-384Kdf
10,214,018 UART: [kat] LMS
10,743,498 UART: [kat] --
10,748,047 UART: [cold-reset] ++
10,749,281 UART: [fht] FHT @ 0x50003400
10,760,802 UART: [idev] ++
10,761,403 UART: [idev] CDI.KEYID = 6
10,762,293 UART: [idev] SUBJECT.KEYID = 7
10,763,505 UART: [idev] UDS.KEYID = 0
10,765,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,909,119 UART: [idev] Erasing UDS.KEYID = 0
13,238,151 UART: [idev] Sha1 KeyId Algorithm
13,260,513 UART: [idev] --
13,263,850 UART: [ldev] ++
13,264,419 UART: [ldev] CDI.KEYID = 6
13,265,301 UART: [ldev] SUBJECT.KEYID = 5
13,266,526 UART: [ldev] AUTHORITY.KEYID = 7
13,267,762 UART: [ldev] FE.KEYID = 1
13,278,254 UART: [ldev] Erasing FE.KEYID = 1
15,754,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,471,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,487,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,503,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,519,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,539,477 UART: [ldev] --
17,544,640 UART: [fwproc] Wait for Commands...
17,547,725 UART: [fwproc] Recv command 0x46574c44
17,549,822 UART: [fwproc] Recv'd Img size: 114168 bytes
20,943,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,016,331 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,085,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,402,291 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
3,694,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,687,192 >>> mbox cmd response: failed
12,688,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,547 >>> mbox cmd response: failed
12,688,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,108 >>> mbox cmd response: failed
Initializing fuses
2,057,600 writing to cptra_bootfsm_go
10,873,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,441,864 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,189 UART:
192,551 UART: Running Caliptra ROM ...
193,884 UART:
194,037 UART: [state] CFI Enabled
265,289 UART: [state] LifecycleState = Unprovisioned
267,664 UART: [state] DebugLocked = No
269,206 UART: [state] WD Timer not started. Device not locked for debugging
274,274 UART: [kat] SHA2-256
464,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,922 UART: [kat] ++
475,399 UART: [kat] sha1
488,496 UART: [kat] SHA2-256
491,559 UART: [kat] SHA2-384
497,970 UART: [kat] SHA2-512-ACC
500,560 UART: [kat] ECC-384
2,946,328 UART: [kat] HMAC-384Kdf
2,973,110 UART: [kat] LMS
3,504,872 UART: [kat] --
3,510,726 UART: [cold-reset] ++
3,512,553 UART: [fht] FHT @ 0x50003400
3,523,590 UART: [idev] ++
3,524,268 UART: [idev] CDI.KEYID = 6
3,525,231 UART: [idev] SUBJECT.KEYID = 7
3,526,447 UART: [idev] UDS.KEYID = 0
3,528,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,748 UART: [idev] Erasing UDS.KEYID = 0
6,031,091 UART: [idev] Sha1 KeyId Algorithm
6,053,867 UART: [idev] --
6,058,119 UART: [ldev] ++
6,058,816 UART: [ldev] CDI.KEYID = 6
6,059,749 UART: [ldev] SUBJECT.KEYID = 5
6,060,862 UART: [ldev] AUTHORITY.KEYID = 7
6,062,102 UART: [ldev] FE.KEYID = 1
6,102,509 UART: [ldev] Erasing FE.KEYID = 1
8,612,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,543 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,295 UART: [ldev] --
10,414,295 UART: [fwproc] Wait for Commands...
10,417,155 UART: [fwproc] Recv command 0x46574c44
10,419,420 UART: [fwproc] Recv'd Img size: 114168 bytes
12,739,000 UART: ROM Fatal Error: 0x000B0022
12,742,674 >>> mbox cmd response: failed
12,743,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,743,468 >>> mbox cmd response: failed
12,743,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,035 >>> mbox cmd response: failed
Initializing fuses
2,055,813 writing to cptra_bootfsm_go
2,245,146 UART:
2,245,493 UART: Running Caliptra ROM ...
2,246,634 UART:
2,246,803 UART: [state] CFI Enabled
2,309,958 UART: [state] LifecycleState = Unprovisioned
2,312,334 UART: [state] DebugLocked = No
2,313,564 UART: [state] WD Timer not started. Device not locked for debugging
2,317,914 UART: [kat] SHA2-256
2,507,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,578 UART: [kat] ++
2,519,036 UART: [kat] sha1
2,530,471 UART: [kat] SHA2-256
2,533,491 UART: [kat] SHA2-384
2,539,426 UART: [kat] SHA2-512-ACC
2,542,049 UART: [kat] ECC-384
4,989,409 UART: [kat] HMAC-384Kdf
5,011,314 UART: [kat] LMS
5,543,094 UART: [kat] --
5,546,140 UART: [cold-reset] ++
5,548,623 UART: [fht] FHT @ 0x50003400
5,560,035 UART: [idev] ++
5,560,727 UART: [idev] CDI.KEYID = 6
5,561,743 UART: [idev] SUBJECT.KEYID = 7
5,562,899 UART: [idev] UDS.KEYID = 0
5,565,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,709,058 UART: [idev] Erasing UDS.KEYID = 0
8,069,574 UART: [idev] Sha1 KeyId Algorithm
8,092,042 UART: [idev] --
8,096,184 UART: [ldev] ++
8,096,883 UART: [ldev] CDI.KEYID = 6
8,097,801 UART: [ldev] SUBJECT.KEYID = 5
8,098,967 UART: [ldev] AUTHORITY.KEYID = 7
8,100,201 UART: [ldev] FE.KEYID = 1
8,140,288 UART: [ldev] Erasing FE.KEYID = 1
10,650,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,315 UART: [ldev] --
12,452,253 UART: [fwproc] Wait for Commands...
12,454,803 UART: [fwproc] Recv command 0x46574c44
12,457,128 UART: [fwproc] Recv'd Img size: 114168 bytes
15,894,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,968,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,084,962 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,626,690 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,439,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,653,520 >>> mbox cmd response: failed
12,654,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,402 >>> mbox cmd response: failed
12,654,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,966 >>> mbox cmd response: failed
Initializing fuses
2,057,293 writing to cptra_bootfsm_go
5,462,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,758,576 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,634 UART:
193,007 UART: Running Caliptra ROM ...
194,219 UART:
603,919 UART: [state] CFI Enabled
618,493 UART: [state] LifecycleState = Unprovisioned
620,866 UART: [state] DebugLocked = No
622,430 UART: [state] WD Timer not started. Device not locked for debugging
627,888 UART: [kat] SHA2-256
817,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,539 UART: [kat] ++
829,040 UART: [kat] sha1
840,513 UART: [kat] SHA2-256
843,507 UART: [kat] SHA2-384
850,366 UART: [kat] SHA2-512-ACC
852,934 UART: [kat] ECC-384
3,296,077 UART: [kat] HMAC-384Kdf
3,308,272 UART: [kat] LMS
3,840,113 UART: [kat] --
3,844,326 UART: [cold-reset] ++
3,846,487 UART: [fht] FHT @ 0x50003400
3,857,957 UART: [idev] ++
3,858,633 UART: [idev] CDI.KEYID = 6
3,859,570 UART: [idev] SUBJECT.KEYID = 7
3,860,782 UART: [idev] UDS.KEYID = 0
3,863,207 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,849 UART: [idev] Erasing UDS.KEYID = 0
6,339,292 UART: [idev] Sha1 KeyId Algorithm
6,361,733 UART: [idev] --
6,365,278 UART: [ldev] ++
6,366,023 UART: [ldev] CDI.KEYID = 6
6,366,910 UART: [ldev] SUBJECT.KEYID = 5
6,368,017 UART: [ldev] AUTHORITY.KEYID = 7
6,369,311 UART: [ldev] FE.KEYID = 1
6,382,370 UART: [ldev] Erasing FE.KEYID = 1
8,859,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,425 UART: [ldev] --
10,651,855 UART: [fwproc] Wait for Commands...
10,654,778 UART: [fwproc] Recv command 0x46574c44
10,657,098 UART: [fwproc] Recv'd Img size: 114168 bytes
12,976,855 UART: ROM Fatal Error: 0x000B0022
12,980,470 >>> mbox cmd response: failed
12,980,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,147 >>> mbox cmd response: failed
12,981,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,707 >>> mbox cmd response: failed
Initializing fuses
2,054,855 writing to cptra_bootfsm_go
2,244,110 UART:
2,244,449 UART: Running Caliptra ROM ...
2,245,591 UART:
7,473,800 UART: [state] CFI Enabled
7,487,538 UART: [state] LifecycleState = Unprovisioned
7,489,581 UART: [state] DebugLocked = No
7,492,165 UART: [state] WD Timer not started. Device not locked for debugging
7,496,845 UART: [kat] SHA2-256
7,686,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,697,519 UART: [kat] ++
7,698,122 UART: [kat] sha1
7,711,176 UART: [kat] SHA2-256
7,714,200 UART: [kat] SHA2-384
7,720,084 UART: [kat] SHA2-512-ACC
7,722,658 UART: [kat] ECC-384
10,167,361 UART: [kat] HMAC-384Kdf
10,181,481 UART: [kat] LMS
10,713,341 UART: [kat] --
10,717,556 UART: [cold-reset] ++
10,719,649 UART: [fht] FHT @ 0x50003400
10,731,026 UART: [idev] ++
10,731,700 UART: [idev] CDI.KEYID = 6
10,732,634 UART: [idev] SUBJECT.KEYID = 7
10,733,874 UART: [idev] UDS.KEYID = 0
10,736,616 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,879,983 UART: [idev] Erasing UDS.KEYID = 0
13,210,762 UART: [idev] Sha1 KeyId Algorithm
13,233,085 UART: [idev] --
13,237,595 UART: [ldev] ++
13,238,344 UART: [ldev] CDI.KEYID = 6
13,239,231 UART: [ldev] SUBJECT.KEYID = 5
13,240,334 UART: [ldev] AUTHORITY.KEYID = 7
13,241,616 UART: [ldev] FE.KEYID = 1
13,253,827 UART: [ldev] Erasing FE.KEYID = 1
15,729,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,448,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,463,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,478,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,493,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,514,248 UART: [ldev] --
17,519,187 UART: [fwproc] Wait for Commands...
17,522,422 UART: [fwproc] Recv command 0x46574c44
17,524,690 UART: [fwproc] Recv'd Img size: 114168 bytes
20,971,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,051,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,167,167 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,708,065 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,762,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,869,770 >>> mbox cmd response: failed
12,870,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,870,689 >>> mbox cmd response: failed
12,870,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,871,240 >>> mbox cmd response: failed
Initializing fuses
2,056,048 writing to cptra_bootfsm_go
10,746,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,939,285 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,387 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
895,186 UART: [kat] SHA2-512-ACC
897,087 UART: [kat] ECC-384
902,552 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,475,877 UART: [cold-reset] ++
1,476,225 UART: [fht] Storing FHT @ 0x50003400
1,479,028 UART: [idev] ++
1,479,196 UART: [idev] CDI.KEYID = 6
1,479,556 UART: [idev] SUBJECT.KEYID = 7
1,479,980 UART: [idev] UDS.KEYID = 0
1,480,325 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,958 UART: [idev] Erasing UDS.KEYID = 0
1,504,460 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,196 UART: [idev] --
1,514,123 UART: [ldev] ++
1,514,291 UART: [ldev] CDI.KEYID = 6
1,514,654 UART: [ldev] SUBJECT.KEYID = 5
1,515,080 UART: [ldev] AUTHORITY.KEYID = 7
1,515,543 UART: [ldev] FE.KEYID = 1
1,520,987 UART: [ldev] Erasing FE.KEYID = 1
1,546,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,878 UART: [ldev] --
1,586,287 UART: [fwproc] Waiting for Commands...
1,586,946 UART: [fwproc] Received command 0x46574c44
1,587,737 UART: [fwproc] Received Image of size 114168 bytes
1,853,723 UART: ROM Fatal Error: 0x000B0022
1,854,880 >>> mbox cmd response: failed
1,854,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,886 >>> mbox cmd response: failed
1,854,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,892 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,657 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,291 UART: [kat] SHA2-256
882,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,337 UART: [kat] ++
886,489 UART: [kat] sha1
890,881 UART: [kat] SHA2-256
892,819 UART: [kat] SHA2-384
895,594 UART: [kat] SHA2-512-ACC
897,495 UART: [kat] ECC-384
903,156 UART: [kat] HMAC-384Kdf
907,832 UART: [kat] LMS
1,476,028 UART: [kat] --
1,477,183 UART: [cold-reset] ++
1,477,625 UART: [fht] Storing FHT @ 0x50003400
1,480,384 UART: [idev] ++
1,480,552 UART: [idev] CDI.KEYID = 6
1,480,912 UART: [idev] SUBJECT.KEYID = 7
1,481,336 UART: [idev] UDS.KEYID = 0
1,481,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,628 UART: [idev] Erasing UDS.KEYID = 0
1,506,468 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,040 UART: [idev] --
1,516,109 UART: [ldev] ++
1,516,277 UART: [ldev] CDI.KEYID = 6
1,516,640 UART: [ldev] SUBJECT.KEYID = 5
1,517,066 UART: [ldev] AUTHORITY.KEYID = 7
1,517,529 UART: [ldev] FE.KEYID = 1
1,522,437 UART: [ldev] Erasing FE.KEYID = 1
1,548,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,302 UART: [ldev] --
1,587,779 UART: [fwproc] Waiting for Commands...
1,588,594 UART: [fwproc] Received command 0x46574c44
1,589,385 UART: [fwproc] Received Image of size 114168 bytes
2,885,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,044 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,959 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,167 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,707,837 >>> mbox cmd response: failed
1,707,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,843 >>> mbox cmd response: failed
1,707,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,707,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,437 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,258 UART: [kat] SHA2-256
882,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,304 UART: [kat] ++
886,456 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,531 UART: [kat] SHA2-512-ACC
897,432 UART: [kat] ECC-384
902,857 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,566 UART: [cold-reset] ++
1,477,042 UART: [fht] Storing FHT @ 0x50003400
1,479,951 UART: [idev] ++
1,480,119 UART: [idev] CDI.KEYID = 6
1,480,479 UART: [idev] SUBJECT.KEYID = 7
1,480,903 UART: [idev] UDS.KEYID = 0
1,481,248 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,659 UART: [idev] Erasing UDS.KEYID = 0
1,505,377 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,949 UART: [idev] --
1,515,050 UART: [ldev] ++
1,515,218 UART: [ldev] CDI.KEYID = 6
1,515,581 UART: [ldev] SUBJECT.KEYID = 5
1,516,007 UART: [ldev] AUTHORITY.KEYID = 7
1,516,470 UART: [ldev] FE.KEYID = 1
1,521,710 UART: [ldev] Erasing FE.KEYID = 1
1,547,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,275 UART: [ldev] --
1,587,730 UART: [fwproc] Waiting for Commands...
1,588,377 UART: [fwproc] Received command 0x46574c44
1,589,168 UART: [fwproc] Received Image of size 114168 bytes
1,855,726 UART: ROM Fatal Error: 0x000B0022
1,856,883 >>> mbox cmd response: failed
1,856,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,889 >>> mbox cmd response: failed
1,856,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,538 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,212 UART: [kat] SHA2-256
882,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,258 UART: [kat] ++
886,410 UART: [kat] sha1
890,614 UART: [kat] SHA2-256
892,552 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
903,233 UART: [kat] HMAC-384Kdf
907,879 UART: [kat] LMS
1,476,075 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,352 UART: [fht] Storing FHT @ 0x50003400
1,480,299 UART: [idev] ++
1,480,467 UART: [idev] CDI.KEYID = 6
1,480,827 UART: [idev] SUBJECT.KEYID = 7
1,481,251 UART: [idev] UDS.KEYID = 0
1,481,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,317 UART: [idev] Erasing UDS.KEYID = 0
1,505,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,301 UART: [idev] --
1,515,428 UART: [ldev] ++
1,515,596 UART: [ldev] CDI.KEYID = 6
1,515,959 UART: [ldev] SUBJECT.KEYID = 5
1,516,385 UART: [ldev] AUTHORITY.KEYID = 7
1,516,848 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,547,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,237 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,273 UART: [fwproc] Received command 0x46574c44
1,588,064 UART: [fwproc] Received Image of size 114168 bytes
2,882,435 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,257 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,278 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,122 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,709,354 >>> mbox cmd response: failed
1,709,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,360 >>> mbox cmd response: failed
1,709,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,709,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,360 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,730 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
892,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,079 UART: [kat] ++
897,231 UART: [kat] sha1
901,411 UART: [kat] SHA2-256
903,351 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,795 UART: [cold-reset] ++
1,172,273 UART: [fht] FHT @ 0x50003400
1,174,730 UART: [idev] ++
1,174,898 UART: [idev] CDI.KEYID = 6
1,175,258 UART: [idev] SUBJECT.KEYID = 7
1,175,682 UART: [idev] UDS.KEYID = 0
1,176,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,983 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,495 UART: [ldev] ++
1,209,663 UART: [ldev] CDI.KEYID = 6
1,210,026 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,258 UART: [fwproc] Wait for Commands...
1,283,046 UART: [fwproc] Recv command 0x46574c44
1,283,774 UART: [fwproc] Recv'd Img size: 114168 bytes
1,550,658 UART: ROM Fatal Error: 0x000B0022
1,551,815 >>> mbox cmd response: failed
1,551,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,821 >>> mbox cmd response: failed
1,551,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
893,038 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,163 UART: [kat] ++
897,315 UART: [kat] sha1
901,527 UART: [kat] SHA2-256
903,467 UART: [kat] SHA2-384
906,102 UART: [kat] SHA2-512-ACC
908,003 UART: [kat] ECC-384
917,778 UART: [kat] HMAC-384Kdf
922,312 UART: [kat] LMS
1,170,640 UART: [kat] --
1,171,285 UART: [cold-reset] ++
1,171,733 UART: [fht] FHT @ 0x50003400
1,174,294 UART: [idev] ++
1,174,462 UART: [idev] CDI.KEYID = 6
1,174,822 UART: [idev] SUBJECT.KEYID = 7
1,175,246 UART: [idev] UDS.KEYID = 0
1,175,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,432 UART: [idev] Erasing UDS.KEYID = 0
1,200,341 UART: [idev] Sha1 KeyId Algorithm
1,208,901 UART: [idev] --
1,209,897 UART: [ldev] ++
1,210,065 UART: [ldev] CDI.KEYID = 6
1,210,428 UART: [ldev] SUBJECT.KEYID = 5
1,210,854 UART: [ldev] AUTHORITY.KEYID = 7
1,211,317 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,241,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,771 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,928 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,391 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,928 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,405,406 >>> mbox cmd response: failed
1,405,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,412 >>> mbox cmd response: failed
1,405,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,019 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,125 UART: [state] LifecycleState = Unprovisioned
86,780 UART: [state] DebugLocked = No
87,506 UART: [state] WD Timer not started. Device not locked for debugging
88,863 UART: [kat] SHA2-256
894,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,638 UART: [kat] ++
898,790 UART: [kat] sha1
902,992 UART: [kat] SHA2-256
904,932 UART: [kat] SHA2-384
907,681 UART: [kat] SHA2-512-ACC
909,582 UART: [kat] ECC-384
919,363 UART: [kat] HMAC-384Kdf
924,101 UART: [kat] LMS
1,172,429 UART: [kat] --
1,173,416 UART: [cold-reset] ++
1,173,914 UART: [fht] FHT @ 0x50003400
1,176,595 UART: [idev] ++
1,176,763 UART: [idev] CDI.KEYID = 6
1,177,123 UART: [idev] SUBJECT.KEYID = 7
1,177,547 UART: [idev] UDS.KEYID = 0
1,177,892 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,821 UART: [idev] Erasing UDS.KEYID = 0
1,203,140 UART: [idev] Sha1 KeyId Algorithm
1,211,454 UART: [idev] --
1,212,418 UART: [ldev] ++
1,212,586 UART: [ldev] CDI.KEYID = 6
1,212,949 UART: [ldev] SUBJECT.KEYID = 5
1,213,375 UART: [ldev] AUTHORITY.KEYID = 7
1,213,838 UART: [ldev] FE.KEYID = 1
1,219,050 UART: [ldev] Erasing FE.KEYID = 1
1,245,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,742 UART: [ldev] --
1,285,017 UART: [fwproc] Wait for Commands...
1,285,649 UART: [fwproc] Recv command 0x46574c44
1,286,377 UART: [fwproc] Recv'd Img size: 114168 bytes
1,552,001 UART: ROM Fatal Error: 0x000B0022
1,553,158 >>> mbox cmd response: failed
1,553,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,164 >>> mbox cmd response: failed
1,553,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,553,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
893,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,966 UART: [kat] ++
898,118 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,809 UART: [kat] HMAC-384Kdf
923,457 UART: [kat] LMS
1,171,785 UART: [kat] --
1,172,650 UART: [cold-reset] ++
1,173,010 UART: [fht] FHT @ 0x50003400
1,175,583 UART: [idev] ++
1,175,751 UART: [idev] CDI.KEYID = 6
1,176,111 UART: [idev] SUBJECT.KEYID = 7
1,176,535 UART: [idev] UDS.KEYID = 0
1,176,880 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,869 UART: [idev] Erasing UDS.KEYID = 0
1,202,248 UART: [idev] Sha1 KeyId Algorithm
1,210,678 UART: [idev] --
1,211,698 UART: [ldev] ++
1,211,866 UART: [ldev] CDI.KEYID = 6
1,212,229 UART: [ldev] SUBJECT.KEYID = 5
1,212,655 UART: [ldev] AUTHORITY.KEYID = 7
1,213,118 UART: [ldev] FE.KEYID = 1
1,218,390 UART: [ldev] Erasing FE.KEYID = 1
1,244,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,662 UART: [ldev] --
1,284,055 UART: [fwproc] Wait for Commands...
1,284,735 UART: [fwproc] Recv command 0x46574c44
1,285,463 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,184 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,488 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,185 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,405,701 >>> mbox cmd response: failed
1,405,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,707 >>> mbox cmd response: failed
1,405,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,405,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,602 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,428 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,581 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,174,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,208,033 UART: [idev] --
1,208,988 UART: [ldev] ++
1,209,156 UART: [ldev] CDI.KEYID = 6
1,209,520 UART: [ldev] SUBJECT.KEYID = 5
1,209,947 UART: [ldev] AUTHORITY.KEYID = 7
1,210,410 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,242,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,860 UART: [ldev] --
1,281,150 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 114168 bytes
1,548,479 UART: ROM Fatal Error: 0x000B0022
1,549,636 >>> mbox cmd response: failed
1,549,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,642 >>> mbox cmd response: failed
1,549,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,549,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,174,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,479 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,208,002 UART: [ldev] ++
1,208,170 UART: [ldev] CDI.KEYID = 6
1,208,534 UART: [ldev] SUBJECT.KEYID = 5
1,208,961 UART: [ldev] AUTHORITY.KEYID = 7
1,209,424 UART: [ldev] FE.KEYID = 1
1,214,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,474 UART: [ldev] --
1,280,806 UART: [fwproc] Wait for Commands...
1,281,429 UART: [fwproc] Recv command 0x46574c44
1,282,162 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,791 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,100 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,600 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,400,791 >>> mbox cmd response: failed
1,400,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,797 >>> mbox cmd response: failed
1,400,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,400,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,840 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,367 UART: [kat] LMS
1,169,679 UART: [kat] --
1,170,556 UART: [cold-reset] ++
1,171,000 UART: [fht] FHT @ 0x50003400
1,173,620 UART: [idev] ++
1,173,788 UART: [idev] CDI.KEYID = 6
1,174,149 UART: [idev] SUBJECT.KEYID = 7
1,174,574 UART: [idev] UDS.KEYID = 0
1,174,920 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,324 UART: [idev] Sha1 KeyId Algorithm
1,209,032 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,217,205 UART: [ldev] Erasing FE.KEYID = 1
1,243,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,209 UART: [ldev] --
1,282,705 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 114168 bytes
1,549,982 UART: ROM Fatal Error: 0x000B0022
1,551,139 >>> mbox cmd response: failed
1,551,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,145 >>> mbox cmd response: failed
1,551,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,551,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,250 UART: [kat] ++
895,402 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,235 UART: [kat] SHA2-512-ACC
906,136 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,795 UART: [kat] LMS
1,169,107 UART: [kat] --
1,169,726 UART: [cold-reset] ++
1,170,052 UART: [fht] FHT @ 0x50003400
1,172,600 UART: [idev] ++
1,172,768 UART: [idev] CDI.KEYID = 6
1,173,129 UART: [idev] SUBJECT.KEYID = 7
1,173,554 UART: [idev] UDS.KEYID = 0
1,173,900 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,384 UART: [idev] Erasing UDS.KEYID = 0
1,198,614 UART: [idev] Sha1 KeyId Algorithm
1,207,668 UART: [idev] --
1,208,729 UART: [ldev] ++
1,208,897 UART: [ldev] CDI.KEYID = 6
1,209,261 UART: [ldev] SUBJECT.KEYID = 5
1,209,688 UART: [ldev] AUTHORITY.KEYID = 7
1,210,151 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,405 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,647 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,281 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,275 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,402,292 >>> mbox cmd response: failed
1,402,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,298 >>> mbox cmd response: failed
1,402,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,402,304 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,963 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,697 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,131 UART:
192,487 UART: Running Caliptra ROM ...
193,603 UART:
193,752 UART: [state] CFI Enabled
265,060 UART: [state] LifecycleState = Unprovisioned
266,986 UART: [state] DebugLocked = No
269,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,522 UART: [kat] SHA2-256
444,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,771 UART: [kat] ++
455,220 UART: [kat] sha1
466,804 UART: [kat] SHA2-256
469,485 UART: [kat] SHA2-384
476,431 UART: [kat] SHA2-512-ACC
478,774 UART: [kat] ECC-384
2,766,109 UART: [kat] HMAC-384Kdf
2,779,705 UART: [kat] LMS
3,970,033 UART: [kat] --
3,972,446 UART: [cold-reset] ++
3,973,735 UART: [fht] Storing FHT @ 0x50003400
3,985,544 UART: [idev] ++
3,986,117 UART: [idev] CDI.KEYID = 6
3,987,083 UART: [idev] SUBJECT.KEYID = 7
3,988,300 UART: [idev] UDS.KEYID = 0
3,991,379 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,771 UART: [idev] Erasing UDS.KEYID = 0
7,322,639 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,813 UART: [idev] --
7,349,491 UART: [ldev] ++
7,350,063 UART: [ldev] CDI.KEYID = 6
7,351,035 UART: [ldev] SUBJECT.KEYID = 5
7,352,251 UART: [ldev] AUTHORITY.KEYID = 7
7,353,479 UART: [ldev] FE.KEYID = 1
7,382,110 UART: [ldev] Erasing FE.KEYID = 1
10,715,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,008,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,022,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,037,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,052,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,070,723 UART: [ldev] --
13,075,893 UART: [fwproc] Waiting for Commands...
13,079,297 UART: [fwproc] Received command 0x46574c44
13,081,494 UART: [fwproc] Received Image of size 113844 bytes
15,781,683 UART: ROM Fatal Error: 0x000B003E
15,785,113 >>> mbox cmd response: failed
15,785,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,785,901 >>> mbox cmd response: failed
15,786,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,786,468 >>> mbox cmd response: failed
Initializing fuses
2,061,384 writing to cptra_bootfsm_go
2,250,697 UART:
2,251,040 UART: Running Caliptra ROM ...
2,252,096 UART:
2,252,255 UART: [state] CFI Enabled
2,308,778 UART: [state] LifecycleState = Unprovisioned
2,310,679 UART: [state] DebugLocked = No
2,311,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,558 UART: [kat] SHA2-256
2,486,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,758 UART: [kat] ++
2,497,217 UART: [kat] sha1
2,507,942 UART: [kat] SHA2-256
2,510,634 UART: [kat] SHA2-384
2,516,104 UART: [kat] SHA2-512-ACC
2,518,477 UART: [kat] ECC-384
4,814,482 UART: [kat] HMAC-384Kdf
4,825,967 UART: [kat] LMS
6,016,262 UART: [kat] --
6,020,492 UART: [cold-reset] ++
6,022,266 UART: [fht] Storing FHT @ 0x50003400
6,033,266 UART: [idev] ++
6,033,835 UART: [idev] CDI.KEYID = 6
6,034,773 UART: [idev] SUBJECT.KEYID = 7
6,036,044 UART: [idev] UDS.KEYID = 0
6,038,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,181,613 UART: [idev] Erasing UDS.KEYID = 0
9,372,538 UART: [idev] Using Sha1 for KeyId Algorithm
9,395,332 UART: [idev] --
9,399,164 UART: [ldev] ++
9,399,756 UART: [ldev] CDI.KEYID = 6
9,400,697 UART: [ldev] SUBJECT.KEYID = 5
9,401,978 UART: [ldev] AUTHORITY.KEYID = 7
9,403,135 UART: [ldev] FE.KEYID = 1
9,447,514 UART: [ldev] Erasing FE.KEYID = 1
12,777,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,087,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,101,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,116,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,131,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,149,078 UART: [ldev] --
15,153,376 UART: [fwproc] Waiting for Commands...
15,155,099 UART: [fwproc] Received command 0x46574c44
15,157,289 UART: [fwproc] Received Image of size 113844 bytes
19,201,388 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,277,743 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,346,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,663,761 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,788,405 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,540,674 >>> mbox cmd response: failed
15,541,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,542,274 >>> mbox cmd response: failed
15,542,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,542,838 >>> mbox cmd response: failed
Initializing fuses
2,069,724 writing to cptra_bootfsm_go
5,849,690 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,910,951 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,527 UART:
192,888 UART: Running Caliptra ROM ...
194,084 UART:
603,610 UART: [state] CFI Enabled
618,759 UART: [state] LifecycleState = Unprovisioned
620,660 UART: [state] DebugLocked = No
622,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,513 UART: [kat] SHA2-256
797,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,812 UART: [kat] ++
808,259 UART: [kat] sha1
819,082 UART: [kat] SHA2-256
821,770 UART: [kat] SHA2-384
827,532 UART: [kat] SHA2-512-ACC
829,927 UART: [kat] ECC-384
3,114,182 UART: [kat] HMAC-384Kdf
3,124,845 UART: [kat] LMS
4,314,966 UART: [kat] --
4,320,300 UART: [cold-reset] ++
4,322,785 UART: [fht] Storing FHT @ 0x50003400
4,333,515 UART: [idev] ++
4,334,087 UART: [idev] CDI.KEYID = 6
4,335,113 UART: [idev] SUBJECT.KEYID = 7
4,336,273 UART: [idev] UDS.KEYID = 0
4,339,001 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,165 UART: [idev] Erasing UDS.KEYID = 0
7,622,812 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,749 UART: [idev] --
7,649,200 UART: [ldev] ++
7,649,775 UART: [ldev] CDI.KEYID = 6
7,650,718 UART: [ldev] SUBJECT.KEYID = 5
7,651,928 UART: [ldev] AUTHORITY.KEYID = 7
7,653,215 UART: [ldev] FE.KEYID = 1
7,662,646 UART: [ldev] Erasing FE.KEYID = 1
10,951,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,425 UART: [ldev] --
13,312,205 UART: [fwproc] Waiting for Commands...
13,314,193 UART: [fwproc] Received command 0x46574c44
13,316,379 UART: [fwproc] Received Image of size 113844 bytes
16,022,117 UART: ROM Fatal Error: 0x000B003E
16,025,616 >>> mbox cmd response: failed
16,026,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,362 >>> mbox cmd response: failed
16,026,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,928 >>> mbox cmd response: failed
Initializing fuses
2,062,557 writing to cptra_bootfsm_go
2,251,841 UART:
2,252,186 UART: Running Caliptra ROM ...
2,253,235 UART:
4,429,946 UART: [state] CFI Enabled
4,446,949 UART: [state] LifecycleState = Unprovisioned
4,448,856 UART: [state] DebugLocked = No
4,451,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,456,362 UART: [kat] SHA2-256
4,626,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,636,605 UART: [kat] ++
4,637,119 UART: [kat] sha1
4,647,249 UART: [kat] SHA2-256
4,649,946 UART: [kat] SHA2-384
4,657,050 UART: [kat] SHA2-512-ACC
4,659,144 UART: [kat] ECC-384
6,944,846 UART: [kat] HMAC-384Kdf
6,955,668 UART: [kat] LMS
8,145,755 UART: [kat] --
8,153,051 UART: [cold-reset] ++
8,154,501 UART: [fht] Storing FHT @ 0x50003400
8,165,447 UART: [idev] ++
8,166,018 UART: [idev] CDI.KEYID = 6
8,166,961 UART: [idev] SUBJECT.KEYID = 7
8,168,231 UART: [idev] UDS.KEYID = 0
8,170,387 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,313,386 UART: [idev] Erasing UDS.KEYID = 0
11,458,156 UART: [idev] Using Sha1 for KeyId Algorithm
11,481,164 UART: [idev] --
11,485,915 UART: [ldev] ++
11,486,508 UART: [ldev] CDI.KEYID = 6
11,487,527 UART: [ldev] SUBJECT.KEYID = 5
11,488,734 UART: [ldev] AUTHORITY.KEYID = 7
11,489,911 UART: [ldev] FE.KEYID = 1
11,500,024 UART: [ldev] Erasing FE.KEYID = 1
14,788,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,083,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,097,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,112,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,127,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,146,322 UART: [ldev] --
17,151,495 UART: [fwproc] Waiting for Commands...
17,153,435 UART: [fwproc] Received command 0x46574c44
17,155,619 UART: [fwproc] Received Image of size 113844 bytes
21,196,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,273,079 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,342,023 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,658,503 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
4,132,119 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,761,479 >>> mbox cmd response: failed
15,762,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,433 >>> mbox cmd response: failed
15,762,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,992 >>> mbox cmd response: failed
Initializing fuses
2,062,523 writing to cptra_bootfsm_go
8,241,966 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,161,711 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,266 UART:
192,696 UART: Running Caliptra ROM ...
193,872 UART:
194,014 UART: [state] CFI Enabled
263,220 UART: [state] LifecycleState = Unprovisioned
265,143 UART: [state] DebugLocked = No
267,557 UART: [state] WD Timer not started. Device not locked for debugging
270,642 UART: [kat] SHA2-256
449,764 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,339 UART: [kat] ++
461,791 UART: [kat] sha1
472,881 UART: [kat] SHA2-256
475,941 UART: [kat] SHA2-384
483,047 UART: [kat] SHA2-512-ACC
486,038 UART: [kat] ECC-384
2,947,753 UART: [kat] HMAC-384Kdf
2,970,917 UART: [kat] LMS
3,500,387 UART: [kat] --
3,504,278 UART: [cold-reset] ++
3,506,872 UART: [fht] FHT @ 0x50003400
3,517,639 UART: [idev] ++
3,518,206 UART: [idev] CDI.KEYID = 6
3,519,119 UART: [idev] SUBJECT.KEYID = 7
3,520,279 UART: [idev] UDS.KEYID = 0
3,522,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,577 UART: [idev] Erasing UDS.KEYID = 0
6,028,659 UART: [idev] Sha1 KeyId Algorithm
6,051,681 UART: [idev] --
6,055,521 UART: [ldev] ++
6,056,290 UART: [ldev] CDI.KEYID = 6
6,057,190 UART: [ldev] SUBJECT.KEYID = 5
6,058,242 UART: [ldev] AUTHORITY.KEYID = 7
6,059,421 UART: [ldev] FE.KEYID = 1
6,098,991 UART: [ldev] Erasing FE.KEYID = 1
8,603,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,493 UART: [ldev] --
10,412,893 UART: [fwproc] Wait for Commands...
10,414,842 UART: [fwproc] Recv command 0x46574c44
10,416,942 UART: [fwproc] Recv'd Img size: 114168 bytes
12,467,915 UART: ROM Fatal Error: 0x000B003E
12,471,041 >>> mbox cmd response: failed
12,471,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,695 >>> mbox cmd response: failed
12,471,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,249 >>> mbox cmd response: failed
Initializing fuses
2,060,622 writing to cptra_bootfsm_go
2,249,923 UART:
2,250,281 UART: Running Caliptra ROM ...
2,251,329 UART:
2,251,479 UART: [state] CFI Enabled
2,320,003 UART: [state] LifecycleState = Unprovisioned
2,321,893 UART: [state] DebugLocked = No
2,323,470 UART: [state] WD Timer not started. Device not locked for debugging
2,327,375 UART: [kat] SHA2-256
2,506,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,084 UART: [kat] ++
2,518,547 UART: [kat] sha1
2,529,975 UART: [kat] SHA2-256
2,533,048 UART: [kat] SHA2-384
2,537,849 UART: [kat] SHA2-512-ACC
2,540,798 UART: [kat] ECC-384
5,003,031 UART: [kat] HMAC-384Kdf
5,025,140 UART: [kat] LMS
5,554,608 UART: [kat] --
5,559,463 UART: [cold-reset] ++
5,561,125 UART: [fht] FHT @ 0x50003400
5,571,266 UART: [idev] ++
5,571,840 UART: [idev] CDI.KEYID = 6
5,572,725 UART: [idev] SUBJECT.KEYID = 7
5,573,937 UART: [idev] UDS.KEYID = 0
5,576,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,719,801 UART: [idev] Erasing UDS.KEYID = 0
8,081,438 UART: [idev] Sha1 KeyId Algorithm
8,105,269 UART: [idev] --
8,108,024 UART: [ldev] ++
8,108,598 UART: [ldev] CDI.KEYID = 6
8,109,482 UART: [ldev] SUBJECT.KEYID = 5
8,110,612 UART: [ldev] AUTHORITY.KEYID = 7
8,111,952 UART: [ldev] FE.KEYID = 1
8,155,149 UART: [ldev] Erasing FE.KEYID = 1
10,654,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,390,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,406,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,422,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,441,861 UART: [ldev] --
12,445,714 UART: [fwproc] Wait for Commands...
12,447,166 UART: [fwproc] Recv command 0x46574c44
12,449,266 UART: [fwproc] Recv'd Img size: 114168 bytes
15,846,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,919,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,988,505 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,306,190 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,382,842 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,231,145 >>> mbox cmd response: failed
12,231,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,232,025 >>> mbox cmd response: failed
12,232,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,232,588 >>> mbox cmd response: failed
Initializing fuses
2,054,580 writing to cptra_bootfsm_go
5,418,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,088,760 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
192,754 UART:
193,114 UART: Running Caliptra ROM ...
194,315 UART:
603,991 UART: [state] CFI Enabled
620,835 UART: [state] LifecycleState = Unprovisioned
622,664 UART: [state] DebugLocked = No
624,819 UART: [state] WD Timer not started. Device not locked for debugging
628,360 UART: [kat] SHA2-256
807,483 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,082 UART: [kat] ++
819,527 UART: [kat] sha1
831,316 UART: [kat] SHA2-256
834,370 UART: [kat] SHA2-384
840,016 UART: [kat] SHA2-512-ACC
842,960 UART: [kat] ECC-384
3,287,439 UART: [kat] HMAC-384Kdf
3,300,644 UART: [kat] LMS
3,830,143 UART: [kat] --
3,835,078 UART: [cold-reset] ++
3,836,548 UART: [fht] FHT @ 0x50003400
3,847,260 UART: [idev] ++
3,847,826 UART: [idev] CDI.KEYID = 6
3,848,763 UART: [idev] SUBJECT.KEYID = 7
3,849,973 UART: [idev] UDS.KEYID = 0
3,852,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,995,978 UART: [idev] Erasing UDS.KEYID = 0
6,326,148 UART: [idev] Sha1 KeyId Algorithm
6,347,490 UART: [idev] --
6,350,672 UART: [ldev] ++
6,351,242 UART: [ldev] CDI.KEYID = 6
6,352,149 UART: [ldev] SUBJECT.KEYID = 5
6,353,310 UART: [ldev] AUTHORITY.KEYID = 7
6,354,545 UART: [ldev] FE.KEYID = 1
6,364,001 UART: [ldev] Erasing FE.KEYID = 1
8,838,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,510 UART: [ldev] --
10,625,076 UART: [fwproc] Wait for Commands...
10,628,295 UART: [fwproc] Recv command 0x46574c44
10,630,400 UART: [fwproc] Recv'd Img size: 114168 bytes
12,680,982 UART: ROM Fatal Error: 0x000B003E
12,684,104 >>> mbox cmd response: failed
12,684,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,684,866 >>> mbox cmd response: failed
12,685,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,685,442 >>> mbox cmd response: failed
Initializing fuses
2,052,415 writing to cptra_bootfsm_go
2,241,728 UART:
2,242,064 UART: Running Caliptra ROM ...
2,243,202 UART:
7,772,159 UART: [state] CFI Enabled
7,784,849 UART: [state] LifecycleState = Unprovisioned
7,786,741 UART: [state] DebugLocked = No
7,788,087 UART: [state] WD Timer not started. Device not locked for debugging
7,792,271 UART: [kat] SHA2-256
7,971,379 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,982,955 UART: [kat] ++
7,983,494 UART: [kat] sha1
7,994,659 UART: [kat] SHA2-256
7,997,676 UART: [kat] SHA2-384
8,003,610 UART: [kat] SHA2-512-ACC
8,006,579 UART: [kat] ECC-384
10,449,442 UART: [kat] HMAC-384Kdf
10,461,338 UART: [kat] LMS
10,990,837 UART: [kat] --
10,996,882 UART: [cold-reset] ++
10,997,785 UART: [fht] FHT @ 0x50003400
11,008,250 UART: [idev] ++
11,008,813 UART: [idev] CDI.KEYID = 6
11,009,833 UART: [idev] SUBJECT.KEYID = 7
11,010,941 UART: [idev] UDS.KEYID = 0
11,013,191 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,156,690 UART: [idev] Erasing UDS.KEYID = 0
13,487,632 UART: [idev] Sha1 KeyId Algorithm
13,511,180 UART: [idev] --
13,516,037 UART: [ldev] ++
13,516,605 UART: [ldev] CDI.KEYID = 6
13,517,532 UART: [ldev] SUBJECT.KEYID = 5
13,518,693 UART: [ldev] AUTHORITY.KEYID = 7
13,519,977 UART: [ldev] FE.KEYID = 1
13,531,321 UART: [ldev] Erasing FE.KEYID = 1
16,005,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,722,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,738,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,754,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,770,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,790,389 UART: [ldev] --
17,795,124 UART: [fwproc] Wait for Commands...
17,797,116 UART: [fwproc] Recv command 0x46574c44
17,799,213 UART: [fwproc] Recv'd Img size: 114168 bytes
21,198,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,268,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,336,842 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,653,361 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,693,015 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,448,394 >>> mbox cmd response: failed
12,448,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,330 >>> mbox cmd response: failed
12,449,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,895 >>> mbox cmd response: failed
Initializing fuses
2,059,884 writing to cptra_bootfsm_go
11,113,089 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,688,199 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,220 UART:
192,585 UART: Running Caliptra ROM ...
193,719 UART:
193,868 UART: [state] CFI Enabled
265,078 UART: [state] LifecycleState = Unprovisioned
267,498 UART: [state] DebugLocked = No
268,987 UART: [state] WD Timer not started. Device not locked for debugging
273,310 UART: [kat] SHA2-256
463,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,937 UART: [kat] ++
474,417 UART: [kat] sha1
486,918 UART: [kat] SHA2-256
489,931 UART: [kat] SHA2-384
495,427 UART: [kat] SHA2-512-ACC
498,046 UART: [kat] ECC-384
2,945,100 UART: [kat] HMAC-384Kdf
2,970,044 UART: [kat] LMS
3,501,812 UART: [kat] --
3,505,980 UART: [cold-reset] ++
3,508,175 UART: [fht] FHT @ 0x50003400
3,518,895 UART: [idev] ++
3,519,578 UART: [idev] CDI.KEYID = 6
3,520,461 UART: [idev] SUBJECT.KEYID = 7
3,521,687 UART: [idev] UDS.KEYID = 0
3,524,248 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,169 UART: [idev] Erasing UDS.KEYID = 0
6,028,496 UART: [idev] Sha1 KeyId Algorithm
6,050,836 UART: [idev] --
6,054,385 UART: [ldev] ++
6,055,077 UART: [ldev] CDI.KEYID = 6
6,055,993 UART: [ldev] SUBJECT.KEYID = 5
6,057,156 UART: [ldev] AUTHORITY.KEYID = 7
6,058,413 UART: [ldev] FE.KEYID = 1
6,100,500 UART: [ldev] Erasing FE.KEYID = 1
8,607,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,928 UART: [ldev] --
10,416,521 UART: [fwproc] Wait for Commands...
10,418,134 UART: [fwproc] Recv command 0x46574c44
10,420,402 UART: [fwproc] Recv'd Img size: 114168 bytes
12,508,835 UART: ROM Fatal Error: 0x000B003E
12,512,496 >>> mbox cmd response: failed
12,512,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,269 >>> mbox cmd response: failed
12,513,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,513,853 >>> mbox cmd response: failed
Initializing fuses
2,055,813 writing to cptra_bootfsm_go
2,245,119 UART:
2,245,468 UART: Running Caliptra ROM ...
2,246,608 UART:
2,246,780 UART: [state] CFI Enabled
2,318,837 UART: [state] LifecycleState = Unprovisioned
2,321,213 UART: [state] DebugLocked = No
2,323,907 UART: [state] WD Timer not started. Device not locked for debugging
2,328,320 UART: [kat] SHA2-256
2,518,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,975 UART: [kat] ++
2,529,469 UART: [kat] sha1
2,540,707 UART: [kat] SHA2-256
2,543,735 UART: [kat] SHA2-384
2,549,461 UART: [kat] SHA2-512-ACC
2,552,087 UART: [kat] ECC-384
5,003,051 UART: [kat] HMAC-384Kdf
5,028,417 UART: [kat] LMS
5,560,218 UART: [kat] --
5,566,744 UART: [cold-reset] ++
5,568,677 UART: [fht] FHT @ 0x50003400
5,581,223 UART: [idev] ++
5,581,906 UART: [idev] CDI.KEYID = 6
5,582,870 UART: [idev] SUBJECT.KEYID = 7
5,584,086 UART: [idev] UDS.KEYID = 0
5,586,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,729,963 UART: [idev] Erasing UDS.KEYID = 0
8,082,246 UART: [idev] Sha1 KeyId Algorithm
8,104,367 UART: [idev] --
8,109,095 UART: [ldev] ++
8,109,789 UART: [ldev] CDI.KEYID = 6
8,110,701 UART: [ldev] SUBJECT.KEYID = 5
8,111,862 UART: [ldev] AUTHORITY.KEYID = 7
8,113,096 UART: [ldev] FE.KEYID = 1
8,156,138 UART: [ldev] Erasing FE.KEYID = 1
10,666,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,766 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,997 UART: [ldev] --
12,470,612 UART: [fwproc] Wait for Commands...
12,473,843 UART: [fwproc] Recv command 0x46574c44
12,476,110 UART: [fwproc] Recv'd Img size: 114168 bytes
15,927,766 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,999,713 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,115,851 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,658,250 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,442,841 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,305,926 >>> mbox cmd response: failed
12,306,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,306,845 >>> mbox cmd response: failed
12,307,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,401 >>> mbox cmd response: failed
Initializing fuses
2,055,739 writing to cptra_bootfsm_go
5,488,128 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,770,231 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,449 UART:
192,819 UART: Running Caliptra ROM ...
193,963 UART:
603,437 UART: [state] CFI Enabled
616,694 UART: [state] LifecycleState = Unprovisioned
619,071 UART: [state] DebugLocked = No
620,367 UART: [state] WD Timer not started. Device not locked for debugging
625,421 UART: [kat] SHA2-256
815,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,112 UART: [kat] ++
826,704 UART: [kat] sha1
837,593 UART: [kat] SHA2-256
840,574 UART: [kat] SHA2-384
846,614 UART: [kat] SHA2-512-ACC
849,180 UART: [kat] ECC-384
3,289,547 UART: [kat] HMAC-384Kdf
3,303,142 UART: [kat] LMS
3,834,949 UART: [kat] --
3,838,839 UART: [cold-reset] ++
3,840,678 UART: [fht] FHT @ 0x50003400
3,852,631 UART: [idev] ++
3,853,285 UART: [idev] CDI.KEYID = 6
3,854,200 UART: [idev] SUBJECT.KEYID = 7
3,855,421 UART: [idev] UDS.KEYID = 0
3,857,877 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,376 UART: [idev] Erasing UDS.KEYID = 0
6,335,365 UART: [idev] Sha1 KeyId Algorithm
6,356,604 UART: [idev] --
6,361,916 UART: [ldev] ++
6,362,602 UART: [ldev] CDI.KEYID = 6
6,363,516 UART: [ldev] SUBJECT.KEYID = 5
6,364,594 UART: [ldev] AUTHORITY.KEYID = 7
6,365,932 UART: [ldev] FE.KEYID = 1
6,377,931 UART: [ldev] Erasing FE.KEYID = 1
8,856,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,872 UART: [ldev] --
10,647,085 UART: [fwproc] Wait for Commands...
10,650,267 UART: [fwproc] Recv command 0x46574c44
10,652,696 UART: [fwproc] Recv'd Img size: 114168 bytes
12,740,127 UART: ROM Fatal Error: 0x000B003E
12,743,772 >>> mbox cmd response: failed
12,744,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,426 >>> mbox cmd response: failed
12,744,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,192 >>> mbox cmd response: failed
Initializing fuses
2,054,163 writing to cptra_bootfsm_go
2,243,493 UART:
2,243,856 UART: Running Caliptra ROM ...
2,244,904 UART:
7,713,549 UART: [state] CFI Enabled
7,727,769 UART: [state] LifecycleState = Unprovisioned
7,730,128 UART: [state] DebugLocked = No
7,732,786 UART: [state] WD Timer not started. Device not locked for debugging
7,737,754 UART: [kat] SHA2-256
7,927,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,938,464 UART: [kat] ++
7,939,072 UART: [kat] sha1
7,952,136 UART: [kat] SHA2-256
7,955,161 UART: [kat] SHA2-384
7,961,476 UART: [kat] SHA2-512-ACC
7,964,049 UART: [kat] ECC-384
10,408,152 UART: [kat] HMAC-384Kdf
10,422,226 UART: [kat] LMS
10,954,024 UART: [kat] --
10,958,323 UART: [cold-reset] ++
10,960,474 UART: [fht] FHT @ 0x50003400
10,971,568 UART: [idev] ++
10,972,244 UART: [idev] CDI.KEYID = 6
10,973,180 UART: [idev] SUBJECT.KEYID = 7
10,974,414 UART: [idev] UDS.KEYID = 0
10,976,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,120,223 UART: [idev] Erasing UDS.KEYID = 0
13,450,395 UART: [idev] Sha1 KeyId Algorithm
13,473,631 UART: [idev] --
13,478,588 UART: [ldev] ++
13,479,272 UART: [ldev] CDI.KEYID = 6
13,480,184 UART: [ldev] SUBJECT.KEYID = 5
13,481,340 UART: [ldev] AUTHORITY.KEYID = 7
13,482,573 UART: [ldev] FE.KEYID = 1
13,493,974 UART: [ldev] Erasing FE.KEYID = 1
15,973,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,692,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,707,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,722,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,737,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,758,393 UART: [ldev] --
17,764,049 UART: [fwproc] Wait for Commands...
17,766,046 UART: [fwproc] Recv command 0x46574c44
17,768,375 UART: [fwproc] Recv'd Img size: 114168 bytes
21,213,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,294,011 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,410,139 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,952,434 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,009 writing to cptra_bootfsm_go
3,754,670 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,514,224 >>> mbox cmd response: failed
12,514,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,213 >>> mbox cmd response: failed
12,515,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,779 >>> mbox cmd response: failed
Initializing fuses
2,055,978 writing to cptra_bootfsm_go
11,105,683 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,306,934 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,540 UART: [state] LifecycleState = Unprovisioned
86,195 UART: [state] DebugLocked = No
86,819 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,353 UART: [kat] SHA2-256
882,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,399 UART: [kat] ++
886,551 UART: [kat] sha1
890,959 UART: [kat] SHA2-256
892,897 UART: [kat] SHA2-384
895,582 UART: [kat] SHA2-512-ACC
897,483 UART: [kat] ECC-384
903,160 UART: [kat] HMAC-384Kdf
907,872 UART: [kat] LMS
1,476,068 UART: [kat] --
1,477,057 UART: [cold-reset] ++
1,477,517 UART: [fht] Storing FHT @ 0x50003400
1,480,362 UART: [idev] ++
1,480,530 UART: [idev] CDI.KEYID = 6
1,480,890 UART: [idev] SUBJECT.KEYID = 7
1,481,314 UART: [idev] UDS.KEYID = 0
1,481,659 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,234 UART: [idev] Erasing UDS.KEYID = 0
1,505,482 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,092 UART: [idev] --
1,515,053 UART: [ldev] ++
1,515,221 UART: [ldev] CDI.KEYID = 6
1,515,584 UART: [ldev] SUBJECT.KEYID = 5
1,516,010 UART: [ldev] AUTHORITY.KEYID = 7
1,516,473 UART: [ldev] FE.KEYID = 1
1,521,663 UART: [ldev] Erasing FE.KEYID = 1
1,547,254 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,162 UART: [ldev] --
1,586,445 UART: [fwproc] Waiting for Commands...
1,587,192 UART: [fwproc] Received command 0x46574c44
1,587,983 UART: [fwproc] Received Image of size 114168 bytes
1,636,361 UART: ROM Fatal Error: 0x000B003E
1,637,520 >>> mbox cmd response: failed
1,637,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,526 >>> mbox cmd response: failed
1,637,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,129 UART: [kat] SHA2-256
882,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,175 UART: [kat] ++
886,327 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,883 UART: [fht] Storing FHT @ 0x50003400
1,479,878 UART: [idev] ++
1,480,046 UART: [idev] CDI.KEYID = 6
1,480,406 UART: [idev] SUBJECT.KEYID = 7
1,480,830 UART: [idev] UDS.KEYID = 0
1,481,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,518 UART: [idev] Erasing UDS.KEYID = 0
1,505,294 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,514,977 UART: [ldev] ++
1,515,145 UART: [ldev] CDI.KEYID = 6
1,515,508 UART: [ldev] SUBJECT.KEYID = 5
1,515,934 UART: [ldev] AUTHORITY.KEYID = 7
1,516,397 UART: [ldev] FE.KEYID = 1
1,521,753 UART: [ldev] Erasing FE.KEYID = 1
1,547,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,886 UART: [ldev] --
1,587,233 UART: [fwproc] Waiting for Commands...
1,588,072 UART: [fwproc] Received command 0x46574c44
1,588,863 UART: [fwproc] Received Image of size 114168 bytes
2,885,290 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,872 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,939 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,835 >>> mbox cmd response: failed
1,487,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,841 >>> mbox cmd response: failed
1,487,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,799 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,626 UART: [kat] SHA2-256
882,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,672 UART: [kat] ++
886,824 UART: [kat] sha1
891,082 UART: [kat] SHA2-256
893,020 UART: [kat] SHA2-384
895,761 UART: [kat] SHA2-512-ACC
897,662 UART: [kat] ECC-384
903,499 UART: [kat] HMAC-384Kdf
908,053 UART: [kat] LMS
1,476,249 UART: [kat] --
1,477,158 UART: [cold-reset] ++
1,477,658 UART: [fht] Storing FHT @ 0x50003400
1,480,275 UART: [idev] ++
1,480,443 UART: [idev] CDI.KEYID = 6
1,480,803 UART: [idev] SUBJECT.KEYID = 7
1,481,227 UART: [idev] UDS.KEYID = 0
1,481,572 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,369 UART: [idev] Erasing UDS.KEYID = 0
1,506,087 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,609 UART: [idev] --
1,515,538 UART: [ldev] ++
1,515,706 UART: [ldev] CDI.KEYID = 6
1,516,069 UART: [ldev] SUBJECT.KEYID = 5
1,516,495 UART: [ldev] AUTHORITY.KEYID = 7
1,516,958 UART: [ldev] FE.KEYID = 1
1,522,084 UART: [ldev] Erasing FE.KEYID = 1
1,547,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,357 UART: [ldev] --
1,586,866 UART: [fwproc] Waiting for Commands...
1,587,709 UART: [fwproc] Received command 0x46574c44
1,588,500 UART: [fwproc] Received Image of size 114168 bytes
1,635,834 UART: ROM Fatal Error: 0x000B003E
1,636,993 >>> mbox cmd response: failed
1,636,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,999 >>> mbox cmd response: failed
1,636,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,005 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,879 UART: [state] LifecycleState = Unprovisioned
85,534 UART: [state] DebugLocked = No
86,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,808 UART: [kat] SHA2-256
881,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,854 UART: [kat] ++
886,006 UART: [kat] sha1
890,274 UART: [kat] SHA2-256
892,212 UART: [kat] SHA2-384
894,989 UART: [kat] SHA2-512-ACC
896,890 UART: [kat] ECC-384
902,345 UART: [kat] HMAC-384Kdf
907,033 UART: [kat] LMS
1,475,229 UART: [kat] --
1,476,256 UART: [cold-reset] ++
1,476,700 UART: [fht] Storing FHT @ 0x50003400
1,479,499 UART: [idev] ++
1,479,667 UART: [idev] CDI.KEYID = 6
1,480,027 UART: [idev] SUBJECT.KEYID = 7
1,480,451 UART: [idev] UDS.KEYID = 0
1,480,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,295 UART: [idev] Erasing UDS.KEYID = 0
1,505,523 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,355 UART: [idev] --
1,515,434 UART: [ldev] ++
1,515,602 UART: [ldev] CDI.KEYID = 6
1,515,965 UART: [ldev] SUBJECT.KEYID = 5
1,516,391 UART: [ldev] AUTHORITY.KEYID = 7
1,516,854 UART: [ldev] FE.KEYID = 1
1,522,180 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,979 UART: [ldev] --
1,587,494 UART: [fwproc] Waiting for Commands...
1,588,277 UART: [fwproc] Received command 0x46574c44
1,589,068 UART: [fwproc] Received Image of size 114168 bytes
2,884,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,801 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,153 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,792 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,582 >>> mbox cmd response: failed
1,488,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,588 >>> mbox cmd response: failed
1,488,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,404 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,714 UART: [state] LifecycleState = Unprovisioned
86,369 UART: [state] DebugLocked = No
87,027 UART: [state] WD Timer not started. Device not locked for debugging
88,152 UART: [kat] SHA2-256
893,802 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,927 UART: [kat] ++
898,079 UART: [kat] sha1
902,287 UART: [kat] SHA2-256
904,227 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,636 UART: [kat] LMS
1,170,964 UART: [kat] --
1,171,955 UART: [cold-reset] ++
1,172,509 UART: [fht] FHT @ 0x50003400
1,175,186 UART: [idev] ++
1,175,354 UART: [idev] CDI.KEYID = 6
1,175,714 UART: [idev] SUBJECT.KEYID = 7
1,176,138 UART: [idev] UDS.KEYID = 0
1,176,483 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,467 UART: [idev] --
1,210,461 UART: [ldev] ++
1,210,629 UART: [ldev] CDI.KEYID = 6
1,210,992 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,217,061 UART: [ldev] Erasing FE.KEYID = 1
1,243,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,537 UART: [ldev] --
1,282,040 UART: [fwproc] Wait for Commands...
1,282,802 UART: [fwproc] Recv command 0x46574c44
1,283,530 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,610 UART: ROM Fatal Error: 0x000B003E
1,331,769 >>> mbox cmd response: failed
1,331,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,775 >>> mbox cmd response: failed
1,331,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
893,648 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,773 UART: [kat] ++
897,925 UART: [kat] sha1
902,093 UART: [kat] SHA2-256
904,033 UART: [kat] SHA2-384
906,948 UART: [kat] SHA2-512-ACC
908,849 UART: [kat] ECC-384
918,518 UART: [kat] HMAC-384Kdf
922,914 UART: [kat] LMS
1,171,242 UART: [kat] --
1,172,081 UART: [cold-reset] ++
1,172,549 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,956 UART: [idev] Erasing UDS.KEYID = 0
1,200,911 UART: [idev] Sha1 KeyId Algorithm
1,209,241 UART: [idev] --
1,210,231 UART: [ldev] ++
1,210,399 UART: [ldev] CDI.KEYID = 6
1,210,762 UART: [ldev] SUBJECT.KEYID = 5
1,211,188 UART: [ldev] AUTHORITY.KEYID = 7
1,211,651 UART: [ldev] FE.KEYID = 1
1,216,591 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,865 UART: [ldev] --
1,282,220 UART: [fwproc] Wait for Commands...
1,282,912 UART: [fwproc] Recv command 0x46574c44
1,283,640 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,568 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,875 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,004 >>> mbox cmd response: failed
1,187,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,010 >>> mbox cmd response: failed
1,187,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,263 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,043 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,436 UART: [kat] SHA2-256
904,376 UART: [kat] SHA2-384
907,065 UART: [kat] SHA2-512-ACC
908,966 UART: [kat] ECC-384
918,699 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,614 UART: [cold-reset] ++
1,173,136 UART: [fht] FHT @ 0x50003400
1,175,831 UART: [idev] ++
1,175,999 UART: [idev] CDI.KEYID = 6
1,176,359 UART: [idev] SUBJECT.KEYID = 7
1,176,783 UART: [idev] UDS.KEYID = 0
1,177,128 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,155 UART: [idev] Erasing UDS.KEYID = 0
1,201,932 UART: [idev] Sha1 KeyId Algorithm
1,210,230 UART: [idev] --
1,211,374 UART: [ldev] ++
1,211,542 UART: [ldev] CDI.KEYID = 6
1,211,905 UART: [ldev] SUBJECT.KEYID = 5
1,212,331 UART: [ldev] AUTHORITY.KEYID = 7
1,212,794 UART: [ldev] FE.KEYID = 1
1,217,912 UART: [ldev] Erasing FE.KEYID = 1
1,244,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,616 UART: [ldev] --
1,284,057 UART: [fwproc] Wait for Commands...
1,284,807 UART: [fwproc] Recv command 0x46574c44
1,285,535 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,847 UART: ROM Fatal Error: 0x000B003E
1,334,006 >>> mbox cmd response: failed
1,334,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,012 >>> mbox cmd response: failed
1,334,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,900 UART: [kat] SHA2-256
903,840 UART: [kat] SHA2-384
906,725 UART: [kat] SHA2-512-ACC
908,626 UART: [kat] ECC-384
918,657 UART: [kat] HMAC-384Kdf
923,333 UART: [kat] LMS
1,171,661 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,692 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,983 UART: [idev] Erasing UDS.KEYID = 0
1,200,688 UART: [idev] Sha1 KeyId Algorithm
1,209,000 UART: [idev] --
1,210,074 UART: [ldev] ++
1,210,242 UART: [ldev] CDI.KEYID = 6
1,210,605 UART: [ldev] SUBJECT.KEYID = 5
1,211,031 UART: [ldev] AUTHORITY.KEYID = 7
1,211,494 UART: [ldev] FE.KEYID = 1
1,216,662 UART: [ldev] Erasing FE.KEYID = 1
1,243,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,144 UART: [ldev] --
1,282,521 UART: [fwproc] Wait for Commands...
1,283,163 UART: [fwproc] Recv command 0x46574c44
1,283,891 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,008 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,312 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,977 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,034 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,188,433 >>> mbox cmd response: failed
1,188,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,439 >>> mbox cmd response: failed
1,188,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,940 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,286 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,589 UART: [kat] SHA2-256
901,529 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,296 UART: [kat] LMS
1,168,608 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,170,081 UART: [fht] FHT @ 0x50003400
1,172,873 UART: [idev] ++
1,173,041 UART: [idev] CDI.KEYID = 6
1,173,402 UART: [idev] SUBJECT.KEYID = 7
1,173,827 UART: [idev] UDS.KEYID = 0
1,174,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,017 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,209,034 UART: [ldev] ++
1,209,202 UART: [ldev] CDI.KEYID = 6
1,209,566 UART: [ldev] SUBJECT.KEYID = 5
1,209,993 UART: [ldev] AUTHORITY.KEYID = 7
1,210,456 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,242,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,378 UART: [ldev] --
1,281,660 UART: [fwproc] Wait for Commands...
1,282,237 UART: [fwproc] Recv command 0x46574c44
1,282,970 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,731 UART: ROM Fatal Error: 0x000B003E
1,330,890 >>> mbox cmd response: failed
1,330,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,896 >>> mbox cmd response: failed
1,330,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,902 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,170,075 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,211 UART: [idev] ++
1,173,379 UART: [idev] CDI.KEYID = 6
1,173,740 UART: [idev] SUBJECT.KEYID = 7
1,174,165 UART: [idev] UDS.KEYID = 0
1,174,511 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,599 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,484 UART: [ldev] ++
1,208,652 UART: [ldev] CDI.KEYID = 6
1,209,016 UART: [ldev] SUBJECT.KEYID = 5
1,209,443 UART: [ldev] AUTHORITY.KEYID = 7
1,209,906 UART: [ldev] FE.KEYID = 1
1,215,304 UART: [ldev] Erasing FE.KEYID = 1
1,242,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,730 UART: [ldev] --
1,281,104 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,935 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,244 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,904 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,276 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,643 >>> mbox cmd response: failed
1,183,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,649 >>> mbox cmd response: failed
1,183,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,366 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,740 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,511 UART: [kat] SHA2-256
891,061 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,343 UART: [kat] SHA2-512-ACC
906,244 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,169,986 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,348 UART: [idev] ++
1,173,516 UART: [idev] CDI.KEYID = 6
1,173,877 UART: [idev] SUBJECT.KEYID = 7
1,174,302 UART: [idev] UDS.KEYID = 0
1,174,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,600 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,931 UART: [ldev] ++
1,210,099 UART: [ldev] CDI.KEYID = 6
1,210,463 UART: [ldev] SUBJECT.KEYID = 5
1,210,890 UART: [ldev] AUTHORITY.KEYID = 7
1,211,353 UART: [ldev] FE.KEYID = 1
1,216,689 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,739 UART: [ldev] --
1,282,119 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,465 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,812 UART: ROM Fatal Error: 0x000B003E
1,332,971 >>> mbox cmd response: failed
1,332,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,977 >>> mbox cmd response: failed
1,332,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
891,647 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,776 UART: [kat] ++
895,928 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,837 UART: [kat] SHA2-512-ACC
906,738 UART: [kat] ECC-384
916,537 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,772 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,174,778 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,128 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,215,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,282,015 UART: [fwproc] Wait for Commands...
1,282,650 UART: [fwproc] Recv command 0x46574c44
1,283,383 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,225 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,761 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,480 >>> mbox cmd response: failed
1,184,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,486 >>> mbox cmd response: failed
1,184,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,923 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,461 UART:
192,804 UART: Running Caliptra ROM ...
193,984 UART:
194,137 UART: [state] CFI Enabled
261,976 UART: [state] LifecycleState = Unprovisioned
263,970 UART: [state] DebugLocked = No
265,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,026 UART: [kat] SHA2-256
439,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,225 UART: [kat] ++
450,758 UART: [kat] sha1
461,763 UART: [kat] SHA2-256
464,464 UART: [kat] SHA2-384
470,778 UART: [kat] SHA2-512-ACC
473,171 UART: [kat] ECC-384
2,764,396 UART: [kat] HMAC-384Kdf
2,777,234 UART: [kat] LMS
3,967,548 UART: [kat] --
3,972,731 UART: [cold-reset] ++
3,973,855 UART: [fht] Storing FHT @ 0x50003400
3,985,506 UART: [idev] ++
3,986,117 UART: [idev] CDI.KEYID = 6
3,987,040 UART: [idev] SUBJECT.KEYID = 7
3,988,317 UART: [idev] UDS.KEYID = 0
3,991,117 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,344 UART: [idev] Erasing UDS.KEYID = 0
7,321,564 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,166 UART: [idev] --
7,349,967 UART: [ldev] ++
7,350,546 UART: [ldev] CDI.KEYID = 6
7,351,566 UART: [ldev] SUBJECT.KEYID = 5
7,352,729 UART: [ldev] AUTHORITY.KEYID = 7
7,353,964 UART: [ldev] FE.KEYID = 1
7,398,540 UART: [ldev] Erasing FE.KEYID = 1
10,728,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,563 UART: [ldev] --
13,094,104 UART: [fwproc] Waiting for Commands...
13,095,770 UART: [fwproc] Received command 0x46574c44
13,098,107 UART: [fwproc] Received Image of size 113844 bytes
15,793,609 UART: ROM Fatal Error: 0x000B0018
15,797,126 >>> mbox cmd response: failed
15,797,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,797,877 >>> mbox cmd response: failed
15,798,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,798,435 >>> mbox cmd response: failed
Initializing fuses
2,061,608 writing to cptra_bootfsm_go
2,250,930 UART:
2,251,279 UART: Running Caliptra ROM ...
2,252,414 UART:
2,252,576 UART: [state] CFI Enabled
2,320,095 UART: [state] LifecycleState = Unprovisioned
2,322,027 UART: [state] DebugLocked = No
2,324,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,887 UART: [kat] SHA2-256
2,499,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,123 UART: [kat] ++
2,510,584 UART: [kat] sha1
2,522,052 UART: [kat] SHA2-256
2,524,749 UART: [kat] SHA2-384
2,531,171 UART: [kat] SHA2-512-ACC
2,533,532 UART: [kat] ECC-384
4,822,817 UART: [kat] HMAC-384Kdf
4,854,711 UART: [kat] LMS
6,045,008 UART: [kat] --
6,047,733 UART: [cold-reset] ++
6,049,782 UART: [fht] Storing FHT @ 0x50003400
6,062,668 UART: [idev] ++
6,063,242 UART: [idev] CDI.KEYID = 6
6,064,263 UART: [idev] SUBJECT.KEYID = 7
6,065,445 UART: [idev] UDS.KEYID = 0
6,067,702 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,210,994 UART: [idev] Erasing UDS.KEYID = 0
9,401,569 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,951 UART: [idev] --
9,426,833 UART: [ldev] ++
9,427,408 UART: [ldev] CDI.KEYID = 6
9,428,550 UART: [ldev] SUBJECT.KEYID = 5
9,429,766 UART: [ldev] AUTHORITY.KEYID = 7
9,430,950 UART: [ldev] FE.KEYID = 1
9,477,589 UART: [ldev] Erasing FE.KEYID = 1
12,811,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,124,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,139,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,153,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,168,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,187,618 UART: [ldev] --
15,192,020 UART: [fwproc] Waiting for Commands...
15,193,744 UART: [fwproc] Received command 0x46574c44
15,195,988 UART: [fwproc] Received Image of size 113844 bytes
19,241,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,322,337 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,391,202 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,707,283 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,790,420 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,571,780 >>> mbox cmd response: failed
15,572,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,573,112 >>> mbox cmd response: failed
15,573,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,573,681 >>> mbox cmd response: failed
Initializing fuses
2,059,032 writing to cptra_bootfsm_go
5,836,619 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,924,789 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,561 UART:
192,916 UART: Running Caliptra ROM ...
194,113 UART:
603,832 UART: [state] CFI Enabled
616,418 UART: [state] LifecycleState = Unprovisioned
618,336 UART: [state] DebugLocked = No
620,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,803 UART: [kat] SHA2-256
795,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,116 UART: [kat] ++
806,566 UART: [kat] sha1
817,117 UART: [kat] SHA2-256
819,804 UART: [kat] SHA2-384
825,916 UART: [kat] SHA2-512-ACC
828,313 UART: [kat] ECC-384
3,112,380 UART: [kat] HMAC-384Kdf
3,124,227 UART: [kat] LMS
4,314,342 UART: [kat] --
4,319,966 UART: [cold-reset] ++
4,321,469 UART: [fht] Storing FHT @ 0x50003400
4,332,738 UART: [idev] ++
4,333,301 UART: [idev] CDI.KEYID = 6
4,334,184 UART: [idev] SUBJECT.KEYID = 7
4,335,451 UART: [idev] UDS.KEYID = 0
4,338,482 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,759 UART: [idev] Erasing UDS.KEYID = 0
7,629,102 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,577 UART: [idev] --
7,653,787 UART: [ldev] ++
7,654,395 UART: [ldev] CDI.KEYID = 6
7,655,289 UART: [ldev] SUBJECT.KEYID = 5
7,656,565 UART: [ldev] AUTHORITY.KEYID = 7
7,657,798 UART: [ldev] FE.KEYID = 1
7,670,034 UART: [ldev] Erasing FE.KEYID = 1
10,959,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,433 UART: [ldev] --
13,317,916 UART: [fwproc] Waiting for Commands...
13,320,397 UART: [fwproc] Received command 0x46574c44
13,322,580 UART: [fwproc] Received Image of size 113844 bytes
16,024,248 UART: ROM Fatal Error: 0x000B0018
16,027,815 >>> mbox cmd response: failed
16,028,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,563 >>> mbox cmd response: failed
16,028,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,144 >>> mbox cmd response: failed
Initializing fuses
2,057,757 writing to cptra_bootfsm_go
2,247,128 UART:
2,247,565 UART: Running Caliptra ROM ...
2,248,624 UART:
4,426,759 UART: [state] CFI Enabled
4,439,503 UART: [state] LifecycleState = Unprovisioned
4,441,422 UART: [state] DebugLocked = No
4,443,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,448,215 UART: [kat] SHA2-256
4,617,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,628,522 UART: [kat] ++
4,628,980 UART: [kat] sha1
4,639,220 UART: [kat] SHA2-256
4,641,967 UART: [kat] SHA2-384
4,646,247 UART: [kat] SHA2-512-ACC
4,648,605 UART: [kat] ECC-384
6,933,662 UART: [kat] HMAC-384Kdf
6,944,976 UART: [kat] LMS
8,135,092 UART: [kat] --
8,137,498 UART: [cold-reset] ++
8,139,810 UART: [fht] Storing FHT @ 0x50003400
8,150,430 UART: [idev] ++
8,151,060 UART: [idev] CDI.KEYID = 6
8,151,943 UART: [idev] SUBJECT.KEYID = 7
8,153,215 UART: [idev] UDS.KEYID = 0
8,155,450 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,298,551 UART: [idev] Erasing UDS.KEYID = 0
11,437,895 UART: [idev] Using Sha1 for KeyId Algorithm
11,459,182 UART: [idev] --
11,463,388 UART: [ldev] ++
11,464,015 UART: [ldev] CDI.KEYID = 6
11,464,906 UART: [ldev] SUBJECT.KEYID = 5
11,466,189 UART: [ldev] AUTHORITY.KEYID = 7
11,467,291 UART: [ldev] FE.KEYID = 1
11,477,209 UART: [ldev] Erasing FE.KEYID = 1
14,763,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,057,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,072,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,087,297 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,101,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,119,703 UART: [ldev] --
17,124,644 UART: [fwproc] Waiting for Commands...
17,127,938 UART: [fwproc] Received command 0x46574c44
17,130,179 UART: [fwproc] Received Image of size 113844 bytes
21,169,637 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,246,203 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,315,140 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,630,564 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,128,681 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,772,675 >>> mbox cmd response: failed
15,773,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,773,579 >>> mbox cmd response: failed
15,773,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,774,144 >>> mbox cmd response: failed
Initializing fuses
2,055,845 writing to cptra_bootfsm_go
8,223,269 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,156,768 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,455 UART:
192,811 UART: Running Caliptra ROM ...
194,001 UART:
194,161 UART: [state] CFI Enabled
262,490 UART: [state] LifecycleState = Unprovisioned
264,363 UART: [state] DebugLocked = No
266,671 UART: [state] WD Timer not started. Device not locked for debugging
270,118 UART: [kat] SHA2-256
449,254 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,794 UART: [kat] ++
461,330 UART: [kat] sha1
473,297 UART: [kat] SHA2-256
476,368 UART: [kat] SHA2-384
482,279 UART: [kat] SHA2-512-ACC
485,223 UART: [kat] ECC-384
2,945,788 UART: [kat] HMAC-384Kdf
2,970,495 UART: [kat] LMS
3,499,977 UART: [kat] --
3,504,855 UART: [cold-reset] ++
3,506,792 UART: [fht] FHT @ 0x50003400
3,517,399 UART: [idev] ++
3,518,005 UART: [idev] CDI.KEYID = 6
3,518,926 UART: [idev] SUBJECT.KEYID = 7
3,520,090 UART: [idev] UDS.KEYID = 0
3,522,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,158 UART: [idev] Erasing UDS.KEYID = 0
6,027,220 UART: [idev] Sha1 KeyId Algorithm
6,049,265 UART: [idev] --
6,052,724 UART: [ldev] ++
6,053,299 UART: [ldev] CDI.KEYID = 6
6,054,213 UART: [ldev] SUBJECT.KEYID = 5
6,055,372 UART: [ldev] AUTHORITY.KEYID = 7
6,056,607 UART: [ldev] FE.KEYID = 1
6,099,283 UART: [ldev] Erasing FE.KEYID = 1
8,598,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,234 UART: [ldev] --
10,389,546 UART: [fwproc] Wait for Commands...
10,391,169 UART: [fwproc] Recv command 0x46574c44
10,393,280 UART: [fwproc] Recv'd Img size: 114168 bytes
12,445,927 UART: ROM Fatal Error: 0x000B0018
12,449,082 >>> mbox cmd response: failed
12,449,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,863 >>> mbox cmd response: failed
12,450,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,476 >>> mbox cmd response: failed
Initializing fuses
2,055,861 writing to cptra_bootfsm_go
2,245,175 UART:
2,245,534 UART: Running Caliptra ROM ...
2,246,680 UART:
2,246,871 UART: [state] CFI Enabled
2,317,223 UART: [state] LifecycleState = Unprovisioned
2,319,105 UART: [state] DebugLocked = No
2,321,741 UART: [state] WD Timer not started. Device not locked for debugging
2,326,242 UART: [kat] SHA2-256
2,505,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,915 UART: [kat] ++
2,517,375 UART: [kat] sha1
2,529,015 UART: [kat] SHA2-256
2,532,030 UART: [kat] SHA2-384
2,538,882 UART: [kat] SHA2-512-ACC
2,541,827 UART: [kat] ECC-384
5,000,401 UART: [kat] HMAC-384Kdf
5,026,198 UART: [kat] LMS
5,555,650 UART: [kat] --
5,559,667 UART: [cold-reset] ++
5,561,565 UART: [fht] FHT @ 0x50003400
5,571,627 UART: [idev] ++
5,572,200 UART: [idev] CDI.KEYID = 6
5,573,268 UART: [idev] SUBJECT.KEYID = 7
5,574,373 UART: [idev] UDS.KEYID = 0
5,577,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,720,722 UART: [idev] Erasing UDS.KEYID = 0
8,080,731 UART: [idev] Sha1 KeyId Algorithm
8,103,044 UART: [idev] --
8,106,282 UART: [ldev] ++
8,106,886 UART: [ldev] CDI.KEYID = 6
8,107,805 UART: [ldev] SUBJECT.KEYID = 5
8,108,970 UART: [ldev] AUTHORITY.KEYID = 7
8,110,148 UART: [ldev] FE.KEYID = 1
8,155,597 UART: [ldev] Erasing FE.KEYID = 1
10,660,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,897 UART: [ldev] --
12,469,840 UART: [fwproc] Wait for Commands...
12,472,918 UART: [fwproc] Recv command 0x46574c44
12,475,020 UART: [fwproc] Recv'd Img size: 114168 bytes
15,867,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,946,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,015,725 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,333,447 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,386,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,282,375 >>> mbox cmd response: failed
12,282,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,283,351 >>> mbox cmd response: failed
12,283,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,283,916 >>> mbox cmd response: failed
Initializing fuses
2,054,590 writing to cptra_bootfsm_go
5,416,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,090,290 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,527 UART:
192,884 UART: Running Caliptra ROM ...
194,013 UART:
603,699 UART: [state] CFI Enabled
618,012 UART: [state] LifecycleState = Unprovisioned
619,894 UART: [state] DebugLocked = No
621,832 UART: [state] WD Timer not started. Device not locked for debugging
625,601 UART: [kat] SHA2-256
804,682 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,285 UART: [kat] ++
816,814 UART: [kat] sha1
828,994 UART: [kat] SHA2-256
831,993 UART: [kat] SHA2-384
838,076 UART: [kat] SHA2-512-ACC
841,040 UART: [kat] ECC-384
3,281,755 UART: [kat] HMAC-384Kdf
3,294,683 UART: [kat] LMS
3,824,171 UART: [kat] --
3,828,235 UART: [cold-reset] ++
3,829,262 UART: [fht] FHT @ 0x50003400
3,839,483 UART: [idev] ++
3,840,055 UART: [idev] CDI.KEYID = 6
3,840,970 UART: [idev] SUBJECT.KEYID = 7
3,842,186 UART: [idev] UDS.KEYID = 0
3,844,581 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,174 UART: [idev] Erasing UDS.KEYID = 0
6,319,445 UART: [idev] Sha1 KeyId Algorithm
6,343,168 UART: [idev] --
6,347,704 UART: [ldev] ++
6,348,274 UART: [ldev] CDI.KEYID = 6
6,349,210 UART: [ldev] SUBJECT.KEYID = 5
6,350,371 UART: [ldev] AUTHORITY.KEYID = 7
6,351,654 UART: [ldev] FE.KEYID = 1
6,362,434 UART: [ldev] Erasing FE.KEYID = 1
8,832,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,010 UART: [ldev] --
10,620,095 UART: [fwproc] Wait for Commands...
10,622,139 UART: [fwproc] Recv command 0x46574c44
10,624,179 UART: [fwproc] Recv'd Img size: 114168 bytes
12,670,386 UART: ROM Fatal Error: 0x000B0018
12,673,511 >>> mbox cmd response: failed
12,673,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,674,184 >>> mbox cmd response: failed
12,674,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,674,862 >>> mbox cmd response: failed
Initializing fuses
2,052,578 writing to cptra_bootfsm_go
2,241,937 UART:
2,242,278 UART: Running Caliptra ROM ...
2,243,379 UART:
7,778,085 UART: [state] CFI Enabled
7,790,240 UART: [state] LifecycleState = Unprovisioned
7,792,100 UART: [state] DebugLocked = No
7,793,818 UART: [state] WD Timer not started. Device not locked for debugging
7,796,922 UART: [kat] SHA2-256
7,976,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,987,612 UART: [kat] ++
7,988,073 UART: [kat] sha1
7,999,502 UART: [kat] SHA2-256
8,002,524 UART: [kat] SHA2-384
8,007,868 UART: [kat] SHA2-512-ACC
8,010,799 UART: [kat] ECC-384
10,452,065 UART: [kat] HMAC-384Kdf
10,465,322 UART: [kat] LMS
10,994,822 UART: [kat] --
10,997,687 UART: [cold-reset] ++
11,000,158 UART: [fht] FHT @ 0x50003400
11,010,383 UART: [idev] ++
11,010,950 UART: [idev] CDI.KEYID = 6
11,011,892 UART: [idev] SUBJECT.KEYID = 7
11,013,105 UART: [idev] UDS.KEYID = 0
11,015,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,158,860 UART: [idev] Erasing UDS.KEYID = 0
13,484,395 UART: [idev] Sha1 KeyId Algorithm
13,507,942 UART: [idev] --
13,510,959 UART: [ldev] ++
13,511,526 UART: [ldev] CDI.KEYID = 6
13,512,490 UART: [ldev] SUBJECT.KEYID = 5
13,513,645 UART: [ldev] AUTHORITY.KEYID = 7
13,514,872 UART: [ldev] FE.KEYID = 1
13,525,310 UART: [ldev] Erasing FE.KEYID = 1
15,996,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,716,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,732,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,748,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,763,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,784,629 UART: [ldev] --
17,788,392 UART: [fwproc] Wait for Commands...
17,790,400 UART: [fwproc] Recv command 0x46574c44
17,792,453 UART: [fwproc] Recv'd Img size: 114168 bytes
21,195,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,267,801 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,336,544 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,654,003 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,694,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,452,086 >>> mbox cmd response: failed
12,452,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,452,993 >>> mbox cmd response: failed
12,453,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,453,552 >>> mbox cmd response: failed
Initializing fuses
2,054,110 writing to cptra_bootfsm_go
11,110,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,685,217 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,194 UART:
192,583 UART: Running Caliptra ROM ...
193,695 UART:
193,833 UART: [state] CFI Enabled
263,943 UART: [state] LifecycleState = Unprovisioned
266,346 UART: [state] DebugLocked = No
267,917 UART: [state] WD Timer not started. Device not locked for debugging
272,256 UART: [kat] SHA2-256
462,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,871 UART: [kat] ++
473,320 UART: [kat] sha1
483,929 UART: [kat] SHA2-256
486,992 UART: [kat] SHA2-384
492,650 UART: [kat] SHA2-512-ACC
495,227 UART: [kat] ECC-384
2,946,581 UART: [kat] HMAC-384Kdf
2,969,948 UART: [kat] LMS
3,501,757 UART: [kat] --
3,505,655 UART: [cold-reset] ++
3,508,193 UART: [fht] FHT @ 0x50003400
3,519,072 UART: [idev] ++
3,519,751 UART: [idev] CDI.KEYID = 6
3,520,688 UART: [idev] SUBJECT.KEYID = 7
3,521,900 UART: [idev] UDS.KEYID = 0
3,524,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,222 UART: [idev] Erasing UDS.KEYID = 0
6,025,779 UART: [idev] Sha1 KeyId Algorithm
6,049,618 UART: [idev] --
6,054,727 UART: [ldev] ++
6,055,418 UART: [ldev] CDI.KEYID = 6
6,056,358 UART: [ldev] SUBJECT.KEYID = 5
6,057,521 UART: [ldev] AUTHORITY.KEYID = 7
6,058,756 UART: [ldev] FE.KEYID = 1
6,096,471 UART: [ldev] Erasing FE.KEYID = 1
8,604,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,896 UART: [ldev] --
10,411,080 UART: [fwproc] Wait for Commands...
10,413,344 UART: [fwproc] Recv command 0x46574c44
10,415,662 UART: [fwproc] Recv'd Img size: 114168 bytes
12,493,628 UART: ROM Fatal Error: 0x000B0018
12,497,248 >>> mbox cmd response: failed
12,497,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,497,931 >>> mbox cmd response: failed
12,498,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,493 >>> mbox cmd response: failed
Initializing fuses
2,056,376 writing to cptra_bootfsm_go
2,245,643 UART:
2,246,013 UART: Running Caliptra ROM ...
2,247,155 UART:
2,247,335 UART: [state] CFI Enabled
2,314,103 UART: [state] LifecycleState = Unprovisioned
2,316,477 UART: [state] DebugLocked = No
2,317,874 UART: [state] WD Timer not started. Device not locked for debugging
2,322,886 UART: [kat] SHA2-256
2,512,732 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,500 UART: [kat] ++
2,524,054 UART: [kat] sha1
2,535,766 UART: [kat] SHA2-256
2,538,792 UART: [kat] SHA2-384
2,545,164 UART: [kat] SHA2-512-ACC
2,547,786 UART: [kat] ECC-384
4,997,678 UART: [kat] HMAC-384Kdf
5,020,552 UART: [kat] LMS
5,552,314 UART: [kat] --
5,558,035 UART: [cold-reset] ++
5,560,301 UART: [fht] FHT @ 0x50003400
5,572,316 UART: [idev] ++
5,572,991 UART: [idev] CDI.KEYID = 6
5,574,013 UART: [idev] SUBJECT.KEYID = 7
5,575,177 UART: [idev] UDS.KEYID = 0
5,577,470 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,721,211 UART: [idev] Erasing UDS.KEYID = 0
8,077,646 UART: [idev] Sha1 KeyId Algorithm
8,100,235 UART: [idev] --
8,105,499 UART: [ldev] ++
8,106,191 UART: [ldev] CDI.KEYID = 6
8,107,102 UART: [ldev] SUBJECT.KEYID = 5
8,108,320 UART: [ldev] AUTHORITY.KEYID = 7
8,109,497 UART: [ldev] FE.KEYID = 1
8,148,125 UART: [ldev] Erasing FE.KEYID = 1
10,657,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,703 UART: [ldev] --
12,465,076 UART: [fwproc] Wait for Commands...
12,467,144 UART: [fwproc] Recv command 0x46574c44
12,469,467 UART: [fwproc] Recv'd Img size: 114168 bytes
15,911,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,999 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,105,153 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,646,110 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,440,759 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,340,325 >>> mbox cmd response: failed
12,340,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,341,265 >>> mbox cmd response: failed
12,341,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,341,824 >>> mbox cmd response: failed
Initializing fuses
2,055,789 writing to cptra_bootfsm_go
5,492,453 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,789,782 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
192,645 UART:
193,007 UART: Running Caliptra ROM ...
194,212 UART:
603,843 UART: [state] CFI Enabled
617,888 UART: [state] LifecycleState = Unprovisioned
620,267 UART: [state] DebugLocked = No
621,590 UART: [state] WD Timer not started. Device not locked for debugging
626,513 UART: [kat] SHA2-256
816,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,216 UART: [kat] ++
827,770 UART: [kat] sha1
839,569 UART: [kat] SHA2-256
842,615 UART: [kat] SHA2-384
848,882 UART: [kat] SHA2-512-ACC
851,499 UART: [kat] ECC-384
3,293,810 UART: [kat] HMAC-384Kdf
3,306,694 UART: [kat] LMS
3,838,543 UART: [kat] --
3,842,858 UART: [cold-reset] ++
3,843,829 UART: [fht] FHT @ 0x50003400
3,855,951 UART: [idev] ++
3,856,677 UART: [idev] CDI.KEYID = 6
3,857,612 UART: [idev] SUBJECT.KEYID = 7
3,858,825 UART: [idev] UDS.KEYID = 0
3,861,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,820 UART: [idev] Erasing UDS.KEYID = 0
6,337,341 UART: [idev] Sha1 KeyId Algorithm
6,359,999 UART: [idev] --
6,365,647 UART: [ldev] ++
6,366,335 UART: [ldev] CDI.KEYID = 6
6,367,218 UART: [ldev] SUBJECT.KEYID = 5
6,368,430 UART: [ldev] AUTHORITY.KEYID = 7
6,369,665 UART: [ldev] FE.KEYID = 1
6,379,775 UART: [ldev] Erasing FE.KEYID = 1
8,857,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,235 UART: [ldev] --
10,646,906 UART: [fwproc] Wait for Commands...
10,649,402 UART: [fwproc] Recv command 0x46574c44
10,651,670 UART: [fwproc] Recv'd Img size: 114168 bytes
12,736,079 UART: ROM Fatal Error: 0x000B0018
12,739,739 >>> mbox cmd response: failed
12,740,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,464 >>> mbox cmd response: failed
12,740,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,052 >>> mbox cmd response: failed
Initializing fuses
2,055,080 writing to cptra_bootfsm_go
2,244,388 UART:
2,244,725 UART: Running Caliptra ROM ...
2,245,869 UART:
7,711,651 UART: [state] CFI Enabled
7,721,820 UART: [state] LifecycleState = Unprovisioned
7,724,228 UART: [state] DebugLocked = No
7,726,211 UART: [state] WD Timer not started. Device not locked for debugging
7,731,109 UART: [kat] SHA2-256
7,920,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,931,796 UART: [kat] ++
7,932,393 UART: [kat] sha1
7,944,748 UART: [kat] SHA2-256
7,947,767 UART: [kat] SHA2-384
7,954,099 UART: [kat] SHA2-512-ACC
7,956,676 UART: [kat] ECC-384
10,399,840 UART: [kat] HMAC-384Kdf
10,414,077 UART: [kat] LMS
10,945,913 UART: [kat] --
10,950,902 UART: [cold-reset] ++
10,951,814 UART: [fht] FHT @ 0x50003400
10,962,251 UART: [idev] ++
10,962,990 UART: [idev] CDI.KEYID = 6
10,963,899 UART: [idev] SUBJECT.KEYID = 7
10,965,115 UART: [idev] UDS.KEYID = 0
10,967,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,110,899 UART: [idev] Erasing UDS.KEYID = 0
13,444,972 UART: [idev] Sha1 KeyId Algorithm
13,466,413 UART: [idev] --
13,471,563 UART: [ldev] ++
13,472,247 UART: [ldev] CDI.KEYID = 6
13,473,154 UART: [ldev] SUBJECT.KEYID = 5
13,474,372 UART: [ldev] AUTHORITY.KEYID = 7
13,475,553 UART: [ldev] FE.KEYID = 1
13,486,582 UART: [ldev] Erasing FE.KEYID = 1
15,963,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,682,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,698,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,713,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,728,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,750,112 UART: [ldev] --
17,755,318 UART: [fwproc] Wait for Commands...
17,758,235 UART: [fwproc] Recv command 0x46574c44
17,760,557 UART: [fwproc] Recv'd Img size: 114168 bytes
21,201,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,277,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,393,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,935,265 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,755,924 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,525,006 >>> mbox cmd response: failed
12,525,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,942 >>> mbox cmd response: failed
12,526,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,566 >>> mbox cmd response: failed
Initializing fuses
2,061,947 writing to cptra_bootfsm_go
11,095,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,295,156 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,513 UART: [kat] SHA2-256
882,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,559 UART: [kat] ++
886,711 UART: [kat] sha1
890,855 UART: [kat] SHA2-256
892,793 UART: [kat] SHA2-384
895,560 UART: [kat] SHA2-512-ACC
897,461 UART: [kat] ECC-384
903,230 UART: [kat] HMAC-384Kdf
907,802 UART: [kat] LMS
1,475,998 UART: [kat] --
1,476,641 UART: [cold-reset] ++
1,477,155 UART: [fht] Storing FHT @ 0x50003400
1,480,012 UART: [idev] ++
1,480,180 UART: [idev] CDI.KEYID = 6
1,480,540 UART: [idev] SUBJECT.KEYID = 7
1,480,964 UART: [idev] UDS.KEYID = 0
1,481,309 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,908 UART: [idev] Erasing UDS.KEYID = 0
1,505,730 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,498 UART: [idev] --
1,515,399 UART: [ldev] ++
1,515,567 UART: [ldev] CDI.KEYID = 6
1,515,930 UART: [ldev] SUBJECT.KEYID = 5
1,516,356 UART: [ldev] AUTHORITY.KEYID = 7
1,516,819 UART: [ldev] FE.KEYID = 1
1,522,127 UART: [ldev] Erasing FE.KEYID = 1
1,547,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,420 UART: [ldev] --
1,586,827 UART: [fwproc] Waiting for Commands...
1,587,446 UART: [fwproc] Received command 0x46574c44
1,588,237 UART: [fwproc] Received Image of size 114168 bytes
1,635,006 UART: ROM Fatal Error: 0x000B0018
1,636,163 >>> mbox cmd response: failed
1,636,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,169 >>> mbox cmd response: failed
1,636,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,175 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,472 UART: [kat] HMAC-384Kdf
907,152 UART: [kat] LMS
1,475,348 UART: [kat] --
1,476,073 UART: [cold-reset] ++
1,476,623 UART: [fht] Storing FHT @ 0x50003400
1,479,574 UART: [idev] ++
1,479,742 UART: [idev] CDI.KEYID = 6
1,480,102 UART: [idev] SUBJECT.KEYID = 7
1,480,526 UART: [idev] UDS.KEYID = 0
1,480,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,278 UART: [idev] Erasing UDS.KEYID = 0
1,505,000 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,450 UART: [idev] --
1,514,543 UART: [ldev] ++
1,514,711 UART: [ldev] CDI.KEYID = 6
1,515,074 UART: [ldev] SUBJECT.KEYID = 5
1,515,500 UART: [ldev] AUTHORITY.KEYID = 7
1,515,963 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,952 UART: [ldev] --
1,586,463 UART: [fwproc] Waiting for Commands...
1,587,254 UART: [fwproc] Received command 0x46574c44
1,588,045 UART: [fwproc] Received Image of size 114168 bytes
2,884,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,402 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,293 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,340 >>> mbox cmd response: failed
1,488,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,346 >>> mbox cmd response: failed
1,488,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,015 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,782 UART: [kat] SHA2-256
892,720 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
902,949 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,674 UART: [cold-reset] ++
1,477,192 UART: [fht] Storing FHT @ 0x50003400
1,480,023 UART: [idev] ++
1,480,191 UART: [idev] CDI.KEYID = 6
1,480,551 UART: [idev] SUBJECT.KEYID = 7
1,480,975 UART: [idev] UDS.KEYID = 0
1,481,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,583 UART: [idev] Erasing UDS.KEYID = 0
1,506,417 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,025 UART: [idev] --
1,515,868 UART: [ldev] ++
1,516,036 UART: [ldev] CDI.KEYID = 6
1,516,399 UART: [ldev] SUBJECT.KEYID = 5
1,516,825 UART: [ldev] AUTHORITY.KEYID = 7
1,517,288 UART: [ldev] FE.KEYID = 1
1,522,524 UART: [ldev] Erasing FE.KEYID = 1
1,548,109 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,965 UART: [ldev] --
1,587,440 UART: [fwproc] Waiting for Commands...
1,588,293 UART: [fwproc] Received command 0x46574c44
1,589,084 UART: [fwproc] Received Image of size 114168 bytes
1,636,289 UART: ROM Fatal Error: 0x000B0018
1,637,446 >>> mbox cmd response: failed
1,637,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,452 >>> mbox cmd response: failed
1,637,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,701 UART: [state] LifecycleState = Unprovisioned
86,356 UART: [state] DebugLocked = No
86,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,480 UART: [kat] SHA2-256
882,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,526 UART: [kat] ++
886,678 UART: [kat] sha1
890,930 UART: [kat] SHA2-256
892,868 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,577 UART: [kat] HMAC-384Kdf
908,141 UART: [kat] LMS
1,476,337 UART: [kat] --
1,477,220 UART: [cold-reset] ++
1,477,746 UART: [fht] Storing FHT @ 0x50003400
1,480,511 UART: [idev] ++
1,480,679 UART: [idev] CDI.KEYID = 6
1,481,039 UART: [idev] SUBJECT.KEYID = 7
1,481,463 UART: [idev] UDS.KEYID = 0
1,481,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,555 UART: [idev] Erasing UDS.KEYID = 0
1,506,245 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,887 UART: [idev] --
1,515,990 UART: [ldev] ++
1,516,158 UART: [ldev] CDI.KEYID = 6
1,516,521 UART: [ldev] SUBJECT.KEYID = 5
1,516,947 UART: [ldev] AUTHORITY.KEYID = 7
1,517,410 UART: [ldev] FE.KEYID = 1
1,522,868 UART: [ldev] Erasing FE.KEYID = 1
1,547,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,645 UART: [ldev] --
1,586,924 UART: [fwproc] Waiting for Commands...
1,587,543 UART: [fwproc] Received command 0x46574c44
1,588,334 UART: [fwproc] Received Image of size 114168 bytes
2,884,515 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,933 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,026 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,814 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,859 >>> mbox cmd response: failed
1,487,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,865 >>> mbox cmd response: failed
1,487,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,871 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,560 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
88,014 UART: [kat] SHA2-256
893,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,789 UART: [kat] ++
897,941 UART: [kat] sha1
902,287 UART: [kat] SHA2-256
904,227 UART: [kat] SHA2-384
906,852 UART: [kat] SHA2-512-ACC
908,753 UART: [kat] ECC-384
918,256 UART: [kat] HMAC-384Kdf
922,838 UART: [kat] LMS
1,171,166 UART: [kat] --
1,171,993 UART: [cold-reset] ++
1,172,417 UART: [fht] FHT @ 0x50003400
1,175,082 UART: [idev] ++
1,175,250 UART: [idev] CDI.KEYID = 6
1,175,610 UART: [idev] SUBJECT.KEYID = 7
1,176,034 UART: [idev] UDS.KEYID = 0
1,176,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,962 UART: [idev] Erasing UDS.KEYID = 0
1,200,371 UART: [idev] Sha1 KeyId Algorithm
1,208,949 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,522 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,043 UART: [ldev] --
1,281,458 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,964 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,413 UART: ROM Fatal Error: 0x000B0018
1,330,570 >>> mbox cmd response: failed
1,330,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,576 >>> mbox cmd response: failed
1,330,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
893,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,629 UART: [kat] ++
897,781 UART: [kat] sha1
901,991 UART: [kat] SHA2-256
903,931 UART: [kat] SHA2-384
906,784 UART: [kat] SHA2-512-ACC
908,685 UART: [kat] ECC-384
918,120 UART: [kat] HMAC-384Kdf
922,880 UART: [kat] LMS
1,171,208 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,597 UART: [fht] FHT @ 0x50003400
1,175,068 UART: [idev] ++
1,175,236 UART: [idev] CDI.KEYID = 6
1,175,596 UART: [idev] SUBJECT.KEYID = 7
1,176,020 UART: [idev] UDS.KEYID = 0
1,176,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,120 UART: [idev] Erasing UDS.KEYID = 0
1,200,841 UART: [idev] Sha1 KeyId Algorithm
1,209,333 UART: [idev] --
1,210,587 UART: [ldev] ++
1,210,755 UART: [ldev] CDI.KEYID = 6
1,211,118 UART: [ldev] SUBJECT.KEYID = 5
1,211,544 UART: [ldev] AUTHORITY.KEYID = 7
1,212,007 UART: [ldev] FE.KEYID = 1
1,217,351 UART: [ldev] Erasing FE.KEYID = 1
1,243,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,038 UART: [fwproc] Wait for Commands...
1,282,808 UART: [fwproc] Recv command 0x46574c44
1,283,536 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,345 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,649 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,180 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,186,345 >>> mbox cmd response: failed
1,186,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,351 >>> mbox cmd response: failed
1,186,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,377 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
893,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,476 UART: [kat] ++
897,628 UART: [kat] sha1
901,752 UART: [kat] SHA2-256
903,692 UART: [kat] SHA2-384
906,513 UART: [kat] SHA2-512-ACC
908,414 UART: [kat] ECC-384
918,091 UART: [kat] HMAC-384Kdf
922,789 UART: [kat] LMS
1,171,117 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,442 UART: [fht] FHT @ 0x50003400
1,175,169 UART: [idev] ++
1,175,337 UART: [idev] CDI.KEYID = 6
1,175,697 UART: [idev] SUBJECT.KEYID = 7
1,176,121 UART: [idev] UDS.KEYID = 0
1,176,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,215 UART: [idev] Erasing UDS.KEYID = 0
1,201,366 UART: [idev] Sha1 KeyId Algorithm
1,209,676 UART: [idev] --
1,210,800 UART: [ldev] ++
1,210,968 UART: [ldev] CDI.KEYID = 6
1,211,331 UART: [ldev] SUBJECT.KEYID = 5
1,211,757 UART: [ldev] AUTHORITY.KEYID = 7
1,212,220 UART: [ldev] FE.KEYID = 1
1,217,564 UART: [ldev] Erasing FE.KEYID = 1
1,244,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,312 UART: [ldev] --
1,283,663 UART: [fwproc] Wait for Commands...
1,284,479 UART: [fwproc] Recv command 0x46574c44
1,285,207 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,574 UART: ROM Fatal Error: 0x000B0018
1,333,731 >>> mbox cmd response: failed
1,333,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,737 >>> mbox cmd response: failed
1,333,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,045 UART: [state] LifecycleState = Unprovisioned
85,700 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,543 UART: [kat] SHA2-256
893,193 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,318 UART: [kat] ++
897,470 UART: [kat] sha1
901,648 UART: [kat] SHA2-256
903,588 UART: [kat] SHA2-384
906,453 UART: [kat] SHA2-512-ACC
908,354 UART: [kat] ECC-384
918,327 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,172,286 UART: [cold-reset] ++
1,172,852 UART: [fht] FHT @ 0x50003400
1,175,355 UART: [idev] ++
1,175,523 UART: [idev] CDI.KEYID = 6
1,175,883 UART: [idev] SUBJECT.KEYID = 7
1,176,307 UART: [idev] UDS.KEYID = 0
1,176,652 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,787 UART: [idev] Erasing UDS.KEYID = 0
1,201,620 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,210,930 UART: [ldev] ++
1,211,098 UART: [ldev] CDI.KEYID = 6
1,211,461 UART: [ldev] SUBJECT.KEYID = 5
1,211,887 UART: [ldev] AUTHORITY.KEYID = 7
1,212,350 UART: [ldev] FE.KEYID = 1
1,217,896 UART: [ldev] Erasing FE.KEYID = 1
1,243,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,872 UART: [ldev] --
1,283,297 UART: [fwproc] Wait for Commands...
1,284,007 UART: [fwproc] Recv command 0x46574c44
1,284,735 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,584 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,279 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,832 >>> mbox cmd response: failed
1,187,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,838 >>> mbox cmd response: failed
1,187,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,706 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,244 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,941 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,015 UART: [idev] ++
1,173,183 UART: [idev] CDI.KEYID = 6
1,173,544 UART: [idev] SUBJECT.KEYID = 7
1,173,969 UART: [idev] UDS.KEYID = 0
1,174,315 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,693 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,425 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,192 UART: [ldev] Erasing FE.KEYID = 1
1,241,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,652 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,768 UART: [ldev] --
1,281,132 UART: [fwproc] Wait for Commands...
1,281,797 UART: [fwproc] Recv command 0x46574c44
1,282,530 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,682 UART: ROM Fatal Error: 0x000B0018
1,330,839 >>> mbox cmd response: failed
1,330,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,845 >>> mbox cmd response: failed
1,330,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
900,017 UART: [kat] SHA2-256
901,957 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,760 UART: [kat] LMS
1,169,072 UART: [kat] --
1,169,805 UART: [cold-reset] ++
1,170,281 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,174,257 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,223 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,126 UART: [ldev] ++
1,209,294 UART: [ldev] CDI.KEYID = 6
1,209,658 UART: [ldev] SUBJECT.KEYID = 5
1,210,085 UART: [ldev] AUTHORITY.KEYID = 7
1,210,548 UART: [ldev] FE.KEYID = 1
1,215,718 UART: [ldev] Erasing FE.KEYID = 1
1,242,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,106 UART: [ldev] --
1,281,474 UART: [fwproc] Wait for Commands...
1,282,069 UART: [fwproc] Recv command 0x46574c44
1,282,802 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,411 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,720 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,282 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,870 >>> mbox cmd response: failed
1,181,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,876 >>> mbox cmd response: failed
1,181,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,882 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,922 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,864 UART: [kat] ++
896,016 UART: [kat] sha1
900,380 UART: [kat] SHA2-256
902,320 UART: [kat] SHA2-384
904,965 UART: [kat] SHA2-512-ACC
906,866 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,317 UART: [kat] LMS
1,169,629 UART: [kat] --
1,170,634 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,886 UART: [idev] ++
1,174,054 UART: [idev] CDI.KEYID = 6
1,174,415 UART: [idev] SUBJECT.KEYID = 7
1,174,840 UART: [idev] UDS.KEYID = 0
1,175,186 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,818 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,208,346 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,215,997 UART: [ldev] Erasing FE.KEYID = 1
1,242,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,365 UART: [fwproc] Wait for Commands...
1,282,134 UART: [fwproc] Recv command 0x46574c44
1,282,867 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,257 UART: ROM Fatal Error: 0x000B0018
1,331,414 >>> mbox cmd response: failed
1,331,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,420 >>> mbox cmd response: failed
1,331,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,797 UART: [kat] SHA2-512-ACC
906,698 UART: [kat] ECC-384
916,327 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,174,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,362 UART: [idev] Erasing UDS.KEYID = 0
1,198,954 UART: [idev] Sha1 KeyId Algorithm
1,207,712 UART: [idev] --
1,208,661 UART: [ldev] ++
1,208,829 UART: [ldev] CDI.KEYID = 6
1,209,193 UART: [ldev] SUBJECT.KEYID = 5
1,209,620 UART: [ldev] AUTHORITY.KEYID = 7
1,210,083 UART: [ldev] FE.KEYID = 1
1,215,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,871 UART: [fwproc] Wait for Commands...
1,282,484 UART: [fwproc] Recv command 0x46574c44
1,283,217 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,860 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,679 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,833 >>> mbox cmd response: failed
1,183,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,839 >>> mbox cmd response: failed
1,183,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,067 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,483 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,192 UART:
192,571 UART: Running Caliptra ROM ...
193,663 UART:
193,807 UART: [state] CFI Enabled
261,199 UART: [state] LifecycleState = Unprovisioned
263,133 UART: [state] DebugLocked = No
265,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,599 UART: [kat] SHA2-256
440,346 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,803 UART: [kat] ++
451,397 UART: [kat] sha1
462,387 UART: [kat] SHA2-256
465,071 UART: [kat] SHA2-384
470,187 UART: [kat] SHA2-512-ACC
472,583 UART: [kat] ECC-384
2,766,341 UART: [kat] HMAC-384Kdf
2,799,260 UART: [kat] LMS
3,989,576 UART: [kat] --
3,992,349 UART: [cold-reset] ++
3,994,244 UART: [fht] Storing FHT @ 0x50003400
4,005,239 UART: [idev] ++
4,005,812 UART: [idev] CDI.KEYID = 6
4,006,851 UART: [idev] SUBJECT.KEYID = 7
4,008,018 UART: [idev] UDS.KEYID = 0
4,010,792 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,217 UART: [idev] Erasing UDS.KEYID = 0
7,345,341 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,378 UART: [idev] --
7,370,336 UART: [ldev] ++
7,370,902 UART: [ldev] CDI.KEYID = 6
7,371,844 UART: [ldev] SUBJECT.KEYID = 5
7,373,005 UART: [ldev] AUTHORITY.KEYID = 7
7,374,293 UART: [ldev] FE.KEYID = 1
7,422,883 UART: [ldev] Erasing FE.KEYID = 1
10,753,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,384 UART: [ldev] --
13,115,432 UART: [fwproc] Waiting for Commands...
13,118,238 UART: [fwproc] Received command 0x46574c44
13,120,425 UART: [fwproc] Received Image of size 113844 bytes
15,826,621 UART: ROM Fatal Error: 0x000B0034
15,830,112 >>> mbox cmd response: failed
15,830,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,830,851 >>> mbox cmd response: failed
15,831,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,831,412 >>> mbox cmd response: failed
Initializing fuses
2,055,456 writing to cptra_bootfsm_go
2,244,786 UART:
2,245,155 UART: Running Caliptra ROM ...
2,246,297 UART:
2,246,464 UART: [state] CFI Enabled
2,311,188 UART: [state] LifecycleState = Unprovisioned
2,313,128 UART: [state] DebugLocked = No
2,315,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,672 UART: [kat] SHA2-256
2,490,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,934 UART: [kat] ++
2,501,474 UART: [kat] sha1
2,512,313 UART: [kat] SHA2-256
2,515,004 UART: [kat] SHA2-384
2,520,938 UART: [kat] SHA2-512-ACC
2,523,088 UART: [kat] ECC-384
4,812,885 UART: [kat] HMAC-384Kdf
4,844,611 UART: [kat] LMS
6,034,924 UART: [kat] --
6,038,062 UART: [cold-reset] ++
6,039,139 UART: [fht] Storing FHT @ 0x50003400
6,050,546 UART: [idev] ++
6,051,136 UART: [idev] CDI.KEYID = 6
6,052,111 UART: [idev] SUBJECT.KEYID = 7
6,053,326 UART: [idev] UDS.KEYID = 0
6,055,559 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,198,709 UART: [idev] Erasing UDS.KEYID = 0
9,391,660 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,514 UART: [idev] --
9,416,677 UART: [ldev] ++
9,417,314 UART: [ldev] CDI.KEYID = 6
9,418,226 UART: [ldev] SUBJECT.KEYID = 5
9,419,487 UART: [ldev] AUTHORITY.KEYID = 7
9,420,723 UART: [ldev] FE.KEYID = 1
9,466,761 UART: [ldev] Erasing FE.KEYID = 1
12,801,325 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,114,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,128,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,143,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,158,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,888 UART: [ldev] --
15,182,218 UART: [fwproc] Waiting for Commands...
15,185,076 UART: [fwproc] Received command 0x46574c44
15,187,262 UART: [fwproc] Received Image of size 113844 bytes
19,231,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,309,752 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,695,177 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,804,332 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,568,259 >>> mbox cmd response: failed
15,568,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,569,135 >>> mbox cmd response: failed
15,569,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,569,696 >>> mbox cmd response: failed
Initializing fuses
2,062,016 writing to cptra_bootfsm_go
5,854,695 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,943,353 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,505 UART:
192,880 UART: Running Caliptra ROM ...
194,034 UART:
603,672 UART: [state] CFI Enabled
618,961 UART: [state] LifecycleState = Unprovisioned
620,852 UART: [state] DebugLocked = No
623,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,919 UART: [kat] SHA2-256
797,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,204 UART: [kat] ++
808,791 UART: [kat] sha1
820,462 UART: [kat] SHA2-256
823,173 UART: [kat] SHA2-384
829,474 UART: [kat] SHA2-512-ACC
831,813 UART: [kat] ECC-384
3,114,653 UART: [kat] HMAC-384Kdf
3,125,882 UART: [kat] LMS
4,316,000 UART: [kat] --
4,320,155 UART: [cold-reset] ++
4,321,502 UART: [fht] Storing FHT @ 0x50003400
4,332,879 UART: [idev] ++
4,333,453 UART: [idev] CDI.KEYID = 6
4,334,565 UART: [idev] SUBJECT.KEYID = 7
4,335,688 UART: [idev] UDS.KEYID = 0
4,338,569 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,608 UART: [idev] Erasing UDS.KEYID = 0
7,627,850 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,838 UART: [idev] --
7,652,324 UART: [ldev] ++
7,652,892 UART: [ldev] CDI.KEYID = 6
7,653,861 UART: [ldev] SUBJECT.KEYID = 5
7,655,072 UART: [ldev] AUTHORITY.KEYID = 7
7,656,360 UART: [ldev] FE.KEYID = 1
7,667,600 UART: [ldev] Erasing FE.KEYID = 1
10,956,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,113 UART: [ldev] --
13,317,297 UART: [fwproc] Waiting for Commands...
13,319,391 UART: [fwproc] Received command 0x46574c44
13,321,574 UART: [fwproc] Received Image of size 113844 bytes
16,023,470 UART: ROM Fatal Error: 0x000B0034
16,026,996 >>> mbox cmd response: failed
16,027,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,822 >>> mbox cmd response: failed
16,028,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,028,391 >>> mbox cmd response: failed
Initializing fuses
2,061,752 writing to cptra_bootfsm_go
2,251,076 UART:
2,251,431 UART: Running Caliptra ROM ...
2,252,572 UART:
4,415,787 UART: [state] CFI Enabled
4,430,582 UART: [state] LifecycleState = Unprovisioned
4,432,551 UART: [state] DebugLocked = No
4,434,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,439,378 UART: [kat] SHA2-256
4,609,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,619,661 UART: [kat] ++
4,620,149 UART: [kat] sha1
4,631,199 UART: [kat] SHA2-256
4,633,933 UART: [kat] SHA2-384
4,638,435 UART: [kat] SHA2-512-ACC
4,640,841 UART: [kat] ECC-384
6,925,974 UART: [kat] HMAC-384Kdf
6,937,303 UART: [kat] LMS
8,127,476 UART: [kat] --
8,133,381 UART: [cold-reset] ++
8,134,612 UART: [fht] Storing FHT @ 0x50003400
8,144,910 UART: [idev] ++
8,145,730 UART: [idev] CDI.KEYID = 6
8,146,651 UART: [idev] SUBJECT.KEYID = 7
8,147,696 UART: [idev] UDS.KEYID = 0
8,150,070 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,293,021 UART: [idev] Erasing UDS.KEYID = 0
11,433,400 UART: [idev] Using Sha1 for KeyId Algorithm
11,455,153 UART: [idev] --
11,459,357 UART: [ldev] ++
11,460,003 UART: [ldev] CDI.KEYID = 6
11,460,918 UART: [ldev] SUBJECT.KEYID = 5
11,462,176 UART: [ldev] AUTHORITY.KEYID = 7
11,463,412 UART: [ldev] FE.KEYID = 1
11,474,163 UART: [ldev] Erasing FE.KEYID = 1
14,762,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,056,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,071,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,086,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,100,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,120,122 UART: [ldev] --
17,124,702 UART: [fwproc] Waiting for Commands...
17,127,668 UART: [fwproc] Received command 0x46574c44
17,129,851 UART: [fwproc] Received Image of size 113844 bytes
21,176,486 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,254,745 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,323,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,639,739 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,476 writing to cptra_bootfsm_go
4,131,158 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,756,923 >>> mbox cmd response: failed
15,757,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,758,225 >>> mbox cmd response: failed
15,758,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,758,792 >>> mbox cmd response: failed
Initializing fuses
2,055,493 writing to cptra_bootfsm_go
8,230,958 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,164,344 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,186 UART:
192,541 UART: Running Caliptra ROM ...
193,752 UART:
193,922 UART: [state] CFI Enabled
262,746 UART: [state] LifecycleState = Unprovisioned
264,600 UART: [state] DebugLocked = No
267,224 UART: [state] WD Timer not started. Device not locked for debugging
271,805 UART: [kat] SHA2-256
450,942 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,518 UART: [kat] ++
463,047 UART: [kat] sha1
475,174 UART: [kat] SHA2-256
478,179 UART: [kat] SHA2-384
483,724 UART: [kat] SHA2-512-ACC
486,706 UART: [kat] ECC-384
2,948,746 UART: [kat] HMAC-384Kdf
2,971,702 UART: [kat] LMS
3,501,174 UART: [kat] --
3,504,738 UART: [cold-reset] ++
3,506,420 UART: [fht] FHT @ 0x50003400
3,518,430 UART: [idev] ++
3,519,004 UART: [idev] CDI.KEYID = 6
3,519,935 UART: [idev] SUBJECT.KEYID = 7
3,521,095 UART: [idev] UDS.KEYID = 0
3,523,504 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,453 UART: [idev] Erasing UDS.KEYID = 0
6,028,269 UART: [idev] Sha1 KeyId Algorithm
6,049,786 UART: [idev] --
6,053,296 UART: [ldev] ++
6,053,865 UART: [ldev] CDI.KEYID = 6
6,054,778 UART: [ldev] SUBJECT.KEYID = 5
6,055,942 UART: [ldev] AUTHORITY.KEYID = 7
6,057,231 UART: [ldev] FE.KEYID = 1
6,100,193 UART: [ldev] Erasing FE.KEYID = 1
8,602,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,424 UART: [ldev] --
10,411,282 UART: [fwproc] Wait for Commands...
10,413,051 UART: [fwproc] Recv command 0x46574c44
10,415,362 UART: [fwproc] Recv'd Img size: 114168 bytes
12,466,001 UART: ROM Fatal Error: 0x000B0034
12,469,132 >>> mbox cmd response: failed
12,469,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,469,872 >>> mbox cmd response: failed
12,470,138 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,470,434 >>> mbox cmd response: failed
Initializing fuses
2,057,777 writing to cptra_bootfsm_go
2,247,073 UART:
2,247,423 UART: Running Caliptra ROM ...
2,248,479 UART:
2,248,633 UART: [state] CFI Enabled
2,319,042 UART: [state] LifecycleState = Unprovisioned
2,320,933 UART: [state] DebugLocked = No
2,323,572 UART: [state] WD Timer not started. Device not locked for debugging
2,327,546 UART: [kat] SHA2-256
2,506,680 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,240 UART: [kat] ++
2,518,785 UART: [kat] sha1
2,529,623 UART: [kat] SHA2-256
2,532,644 UART: [kat] SHA2-384
2,539,657 UART: [kat] SHA2-512-ACC
2,542,627 UART: [kat] ECC-384
5,002,416 UART: [kat] HMAC-384Kdf
5,027,993 UART: [kat] LMS
5,557,444 UART: [kat] --
5,561,653 UART: [cold-reset] ++
5,562,610 UART: [fht] FHT @ 0x50003400
5,573,153 UART: [idev] ++
5,573,714 UART: [idev] CDI.KEYID = 6
5,574,626 UART: [idev] SUBJECT.KEYID = 7
5,575,838 UART: [idev] UDS.KEYID = 0
5,578,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,721,947 UART: [idev] Erasing UDS.KEYID = 0
8,083,353 UART: [idev] Sha1 KeyId Algorithm
8,107,861 UART: [idev] --
8,110,328 UART: [ldev] ++
8,110,912 UART: [ldev] CDI.KEYID = 6
8,111,821 UART: [ldev] SUBJECT.KEYID = 5
8,112,935 UART: [ldev] AUTHORITY.KEYID = 7
8,114,230 UART: [ldev] FE.KEYID = 1
8,156,802 UART: [ldev] Erasing FE.KEYID = 1
10,661,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,897 UART: [ldev] --
12,470,948 UART: [fwproc] Wait for Commands...
12,473,367 UART: [fwproc] Recv command 0x46574c44
12,475,470 UART: [fwproc] Recv'd Img size: 114168 bytes
15,889,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,955,670 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,024,436 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,342,053 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,383,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,280,054 >>> mbox cmd response: failed
12,280,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,280,951 >>> mbox cmd response: failed
12,281,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,281,514 >>> mbox cmd response: failed
Initializing fuses
2,061,423 writing to cptra_bootfsm_go
5,438,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,099,075 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,651 UART:
193,032 UART: Running Caliptra ROM ...
194,187 UART:
603,882 UART: [state] CFI Enabled
616,246 UART: [state] LifecycleState = Unprovisioned
618,075 UART: [state] DebugLocked = No
620,208 UART: [state] WD Timer not started. Device not locked for debugging
624,139 UART: [kat] SHA2-256
803,280 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,873 UART: [kat] ++
815,428 UART: [kat] sha1
825,882 UART: [kat] SHA2-256
828,945 UART: [kat] SHA2-384
834,382 UART: [kat] SHA2-512-ACC
837,367 UART: [kat] ECC-384
3,276,648 UART: [kat] HMAC-384Kdf
3,290,368 UART: [kat] LMS
3,819,845 UART: [kat] --
3,825,776 UART: [cold-reset] ++
3,828,305 UART: [fht] FHT @ 0x50003400
3,841,011 UART: [idev] ++
3,841,576 UART: [idev] CDI.KEYID = 6
3,842,594 UART: [idev] SUBJECT.KEYID = 7
3,843,700 UART: [idev] UDS.KEYID = 0
3,846,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,831 UART: [idev] Erasing UDS.KEYID = 0
6,318,037 UART: [idev] Sha1 KeyId Algorithm
6,339,801 UART: [idev] --
6,344,934 UART: [ldev] ++
6,345,518 UART: [ldev] CDI.KEYID = 6
6,346,429 UART: [ldev] SUBJECT.KEYID = 5
6,347,649 UART: [ldev] AUTHORITY.KEYID = 7
6,348,883 UART: [ldev] FE.KEYID = 1
6,360,231 UART: [ldev] Erasing FE.KEYID = 1
8,836,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,744 UART: [ldev] --
10,627,654 UART: [fwproc] Wait for Commands...
10,629,697 UART: [fwproc] Recv command 0x46574c44
10,631,813 UART: [fwproc] Recv'd Img size: 114168 bytes
12,683,207 UART: ROM Fatal Error: 0x000B0034
12,686,325 >>> mbox cmd response: failed
12,686,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,686,966 >>> mbox cmd response: failed
12,687,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,687,554 >>> mbox cmd response: failed
Initializing fuses
2,054,023 writing to cptra_bootfsm_go
2,243,346 UART:
2,243,688 UART: Running Caliptra ROM ...
2,244,826 UART:
7,763,595 UART: [state] CFI Enabled
7,779,638 UART: [state] LifecycleState = Unprovisioned
7,781,563 UART: [state] DebugLocked = No
7,782,894 UART: [state] WD Timer not started. Device not locked for debugging
7,786,094 UART: [kat] SHA2-256
7,965,232 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,976,775 UART: [kat] ++
7,977,320 UART: [kat] sha1
7,987,083 UART: [kat] SHA2-256
7,990,098 UART: [kat] SHA2-384
7,996,624 UART: [kat] SHA2-512-ACC
7,999,573 UART: [kat] ECC-384
10,440,761 UART: [kat] HMAC-384Kdf
10,452,287 UART: [kat] LMS
10,981,760 UART: [kat] --
10,986,723 UART: [cold-reset] ++
10,989,191 UART: [fht] FHT @ 0x50003400
10,999,998 UART: [idev] ++
11,000,622 UART: [idev] CDI.KEYID = 6
11,001,547 UART: [idev] SUBJECT.KEYID = 7
11,002,655 UART: [idev] UDS.KEYID = 0
11,005,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,148,370 UART: [idev] Erasing UDS.KEYID = 0
13,472,071 UART: [idev] Sha1 KeyId Algorithm
13,494,808 UART: [idev] --
13,498,017 UART: [ldev] ++
13,498,598 UART: [ldev] CDI.KEYID = 6
13,499,508 UART: [ldev] SUBJECT.KEYID = 5
13,500,667 UART: [ldev] AUTHORITY.KEYID = 7
13,501,898 UART: [ldev] FE.KEYID = 1
13,513,350 UART: [ldev] Erasing FE.KEYID = 1
15,986,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,706,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,722,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,738,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,754,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,774,919 UART: [ldev] --
17,778,995 UART: [fwproc] Wait for Commands...
17,781,847 UART: [fwproc] Recv command 0x46574c44
17,783,946 UART: [fwproc] Recv'd Img size: 114168 bytes
21,188,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,256,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,325,601 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,643,696 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,702,422 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,470,199 >>> mbox cmd response: failed
12,470,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,169 >>> mbox cmd response: failed
12,471,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,753 >>> mbox cmd response: failed
Initializing fuses
2,061,728 writing to cptra_bootfsm_go
11,086,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,647,211 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,255 UART:
192,614 UART: Running Caliptra ROM ...
193,803 UART:
193,955 UART: [state] CFI Enabled
262,010 UART: [state] LifecycleState = Unprovisioned
264,372 UART: [state] DebugLocked = No
265,595 UART: [state] WD Timer not started. Device not locked for debugging
269,053 UART: [kat] SHA2-256
458,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,681 UART: [kat] ++
470,134 UART: [kat] sha1
481,323 UART: [kat] SHA2-256
484,338 UART: [kat] SHA2-384
490,336 UART: [kat] SHA2-512-ACC
492,901 UART: [kat] ECC-384
2,945,137 UART: [kat] HMAC-384Kdf
2,970,808 UART: [kat] LMS
3,502,589 UART: [kat] --
3,506,962 UART: [cold-reset] ++
3,508,141 UART: [fht] FHT @ 0x50003400
3,519,995 UART: [idev] ++
3,520,672 UART: [idev] CDI.KEYID = 6
3,521,691 UART: [idev] SUBJECT.KEYID = 7
3,522,852 UART: [idev] UDS.KEYID = 0
3,525,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,660 UART: [idev] Erasing UDS.KEYID = 0
6,029,942 UART: [idev] Sha1 KeyId Algorithm
6,052,153 UART: [idev] --
6,056,853 UART: [ldev] ++
6,057,558 UART: [ldev] CDI.KEYID = 6
6,058,646 UART: [ldev] SUBJECT.KEYID = 5
6,059,770 UART: [ldev] AUTHORITY.KEYID = 7
6,060,871 UART: [ldev] FE.KEYID = 1
6,099,355 UART: [ldev] Erasing FE.KEYID = 1
8,603,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,969 UART: [ldev] --
10,412,727 UART: [fwproc] Wait for Commands...
10,414,444 UART: [fwproc] Recv command 0x46574c44
10,416,762 UART: [fwproc] Recv'd Img size: 114168 bytes
12,499,717 UART: ROM Fatal Error: 0x000B0034
12,503,386 >>> mbox cmd response: failed
12,503,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,144 >>> mbox cmd response: failed
12,504,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,699 >>> mbox cmd response: failed
Initializing fuses
2,058,287 writing to cptra_bootfsm_go
2,247,619 UART:
2,247,970 UART: Running Caliptra ROM ...
2,249,048 UART:
2,249,205 UART: [state] CFI Enabled
2,304,115 UART: [state] LifecycleState = Unprovisioned
2,306,494 UART: [state] DebugLocked = No
2,307,837 UART: [state] WD Timer not started. Device not locked for debugging
2,312,192 UART: [kat] SHA2-256
2,502,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,512,850 UART: [kat] ++
2,513,543 UART: [kat] sha1
2,525,139 UART: [kat] SHA2-256
2,528,130 UART: [kat] SHA2-384
2,533,535 UART: [kat] SHA2-512-ACC
2,536,109 UART: [kat] ECC-384
4,988,513 UART: [kat] HMAC-384Kdf
5,021,099 UART: [kat] LMS
5,552,857 UART: [kat] --
5,556,114 UART: [cold-reset] ++
5,557,409 UART: [fht] FHT @ 0x50003400
5,568,936 UART: [idev] ++
5,569,609 UART: [idev] CDI.KEYID = 6
5,570,624 UART: [idev] SUBJECT.KEYID = 7
5,571,789 UART: [idev] UDS.KEYID = 0
5,574,272 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,718,381 UART: [idev] Erasing UDS.KEYID = 0
8,077,650 UART: [idev] Sha1 KeyId Algorithm
8,100,023 UART: [idev] --
8,104,780 UART: [ldev] ++
8,105,462 UART: [ldev] CDI.KEYID = 6
8,106,371 UART: [ldev] SUBJECT.KEYID = 5
8,107,587 UART: [ldev] AUTHORITY.KEYID = 7
8,108,761 UART: [ldev] FE.KEYID = 1
8,149,182 UART: [ldev] Erasing FE.KEYID = 1
10,653,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,282 UART: [ldev] --
12,463,037 UART: [fwproc] Wait for Commands...
12,466,067 UART: [fwproc] Recv command 0x46574c44
12,468,335 UART: [fwproc] Recv'd Img size: 114168 bytes
15,907,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,103,389 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,644,921 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,441,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,302,327 >>> mbox cmd response: failed
12,303,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,377 >>> mbox cmd response: failed
12,303,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,947 >>> mbox cmd response: failed
Initializing fuses
2,062,260 writing to cptra_bootfsm_go
5,490,243 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,783,854 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,476 UART:
192,851 UART: Running Caliptra ROM ...
193,997 UART:
603,679 UART: [state] CFI Enabled
616,323 UART: [state] LifecycleState = Unprovisioned
618,703 UART: [state] DebugLocked = No
620,567 UART: [state] WD Timer not started. Device not locked for debugging
625,388 UART: [kat] SHA2-256
815,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,023 UART: [kat] ++
826,624 UART: [kat] sha1
838,061 UART: [kat] SHA2-256
841,081 UART: [kat] SHA2-384
846,527 UART: [kat] SHA2-512-ACC
849,087 UART: [kat] ECC-384
3,290,635 UART: [kat] HMAC-384Kdf
3,302,900 UART: [kat] LMS
3,834,759 UART: [kat] --
3,839,194 UART: [cold-reset] ++
3,840,102 UART: [fht] FHT @ 0x50003400
3,850,649 UART: [idev] ++
3,851,335 UART: [idev] CDI.KEYID = 6
3,852,351 UART: [idev] SUBJECT.KEYID = 7
3,853,515 UART: [idev] UDS.KEYID = 0
3,856,015 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,999,715 UART: [idev] Erasing UDS.KEYID = 0
6,330,195 UART: [idev] Sha1 KeyId Algorithm
6,352,214 UART: [idev] --
6,356,904 UART: [ldev] ++
6,357,593 UART: [ldev] CDI.KEYID = 6
6,358,479 UART: [ldev] SUBJECT.KEYID = 5
6,359,695 UART: [ldev] AUTHORITY.KEYID = 7
6,360,929 UART: [ldev] FE.KEYID = 1
6,373,170 UART: [ldev] Erasing FE.KEYID = 1
8,852,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,465 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,909 UART: [ldev] --
10,642,749 UART: [fwproc] Wait for Commands...
10,644,584 UART: [fwproc] Recv command 0x46574c44
10,646,854 UART: [fwproc] Recv'd Img size: 114168 bytes
12,730,557 UART: ROM Fatal Error: 0x000B0034
12,734,242 >>> mbox cmd response: failed
12,734,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,734,912 >>> mbox cmd response: failed
12,735,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,519 >>> mbox cmd response: failed
Initializing fuses
2,062,005 writing to cptra_bootfsm_go
2,251,275 UART:
2,251,802 UART: Running Caliptra ROM ...
2,252,874 UART:
7,718,992 UART: [state] CFI Enabled
7,732,786 UART: [state] LifecycleState = Unprovisioned
7,735,195 UART: [state] DebugLocked = No
7,737,798 UART: [state] WD Timer not started. Device not locked for debugging
7,742,873 UART: [kat] SHA2-256
7,932,769 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,943,518 UART: [kat] ++
7,944,036 UART: [kat] sha1
7,956,496 UART: [kat] SHA2-256
7,959,520 UART: [kat] SHA2-384
7,965,893 UART: [kat] SHA2-512-ACC
7,968,464 UART: [kat] ECC-384
10,412,758 UART: [kat] HMAC-384Kdf
10,426,879 UART: [kat] LMS
10,958,696 UART: [kat] --
10,963,839 UART: [cold-reset] ++
10,965,286 UART: [fht] FHT @ 0x50003400
10,978,434 UART: [idev] ++
10,979,147 UART: [idev] CDI.KEYID = 6
10,980,166 UART: [idev] SUBJECT.KEYID = 7
10,981,290 UART: [idev] UDS.KEYID = 0
10,983,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,126,997 UART: [idev] Erasing UDS.KEYID = 0
13,458,770 UART: [idev] Sha1 KeyId Algorithm
13,481,626 UART: [idev] --
13,486,212 UART: [ldev] ++
13,486,889 UART: [ldev] CDI.KEYID = 6
13,487,781 UART: [ldev] SUBJECT.KEYID = 5
13,488,996 UART: [ldev] AUTHORITY.KEYID = 7
13,490,226 UART: [ldev] FE.KEYID = 1
13,499,009 UART: [ldev] Erasing FE.KEYID = 1
15,979,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,698,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,714,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,729,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,744,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,765,716 UART: [ldev] --
17,771,576 UART: [fwproc] Wait for Commands...
17,773,818 UART: [fwproc] Recv command 0x46574c44
17,776,098 UART: [fwproc] Recv'd Img size: 114168 bytes
21,223,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,302,555 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,418,676 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,959,784 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,755,593 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,524,538 >>> mbox cmd response: failed
12,525,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,585 >>> mbox cmd response: failed
12,525,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,176 >>> mbox cmd response: failed
Initializing fuses
2,061,141 writing to cptra_bootfsm_go
11,091,260 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,288,548 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,605 UART: [kat] SHA2-256
892,543 UART: [kat] SHA2-384
895,358 UART: [kat] SHA2-512-ACC
897,259 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,689 UART: [cold-reset] ++
1,477,251 UART: [fht] Storing FHT @ 0x50003400
1,480,090 UART: [idev] ++
1,480,258 UART: [idev] CDI.KEYID = 6
1,480,618 UART: [idev] SUBJECT.KEYID = 7
1,481,042 UART: [idev] UDS.KEYID = 0
1,481,387 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,358 UART: [idev] Erasing UDS.KEYID = 0
1,506,010 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,792 UART: [idev] --
1,515,871 UART: [ldev] ++
1,516,039 UART: [ldev] CDI.KEYID = 6
1,516,402 UART: [ldev] SUBJECT.KEYID = 5
1,516,828 UART: [ldev] AUTHORITY.KEYID = 7
1,517,291 UART: [ldev] FE.KEYID = 1
1,522,291 UART: [ldev] Erasing FE.KEYID = 1
1,547,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,098 UART: [ldev] --
1,586,461 UART: [fwproc] Waiting for Commands...
1,587,144 UART: [fwproc] Received command 0x46574c44
1,587,935 UART: [fwproc] Received Image of size 114168 bytes
1,635,168 UART: ROM Fatal Error: 0x000B0034
1,636,325 >>> mbox cmd response: failed
1,636,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,331 >>> mbox cmd response: failed
1,636,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,281 UART: [kat] SHA2-256
882,212 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,327 UART: [kat] ++
886,479 UART: [kat] sha1
890,795 UART: [kat] SHA2-256
892,733 UART: [kat] SHA2-384
895,388 UART: [kat] SHA2-512-ACC
897,289 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,288 UART: [kat] LMS
1,475,484 UART: [kat] --
1,476,571 UART: [cold-reset] ++
1,477,109 UART: [fht] Storing FHT @ 0x50003400
1,479,910 UART: [idev] ++
1,480,078 UART: [idev] CDI.KEYID = 6
1,480,438 UART: [idev] SUBJECT.KEYID = 7
1,480,862 UART: [idev] UDS.KEYID = 0
1,481,207 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,824 UART: [idev] Erasing UDS.KEYID = 0
1,505,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,888 UART: [idev] --
1,514,765 UART: [ldev] ++
1,514,933 UART: [ldev] CDI.KEYID = 6
1,515,296 UART: [ldev] SUBJECT.KEYID = 5
1,515,722 UART: [ldev] AUTHORITY.KEYID = 7
1,516,185 UART: [ldev] FE.KEYID = 1
1,521,497 UART: [ldev] Erasing FE.KEYID = 1
1,546,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,968 UART: [ldev] --
1,586,475 UART: [fwproc] Waiting for Commands...
1,587,142 UART: [fwproc] Received command 0x46574c44
1,587,933 UART: [fwproc] Received Image of size 114168 bytes
2,883,894 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,374 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,339 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,219 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,550 >>> mbox cmd response: failed
1,487,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,556 >>> mbox cmd response: failed
1,487,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,867 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,576 UART: [kat] SHA2-256
882,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,622 UART: [kat] ++
886,774 UART: [kat] sha1
890,972 UART: [kat] SHA2-256
892,910 UART: [kat] SHA2-384
895,759 UART: [kat] SHA2-512-ACC
897,660 UART: [kat] ECC-384
903,247 UART: [kat] HMAC-384Kdf
907,889 UART: [kat] LMS
1,476,085 UART: [kat] --
1,476,734 UART: [cold-reset] ++
1,477,268 UART: [fht] Storing FHT @ 0x50003400
1,479,957 UART: [idev] ++
1,480,125 UART: [idev] CDI.KEYID = 6
1,480,485 UART: [idev] SUBJECT.KEYID = 7
1,480,909 UART: [idev] UDS.KEYID = 0
1,481,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,085 UART: [idev] Erasing UDS.KEYID = 0
1,505,837 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,339 UART: [idev] --
1,515,348 UART: [ldev] ++
1,515,516 UART: [ldev] CDI.KEYID = 6
1,515,879 UART: [ldev] SUBJECT.KEYID = 5
1,516,305 UART: [ldev] AUTHORITY.KEYID = 7
1,516,768 UART: [ldev] FE.KEYID = 1
1,522,176 UART: [ldev] Erasing FE.KEYID = 1
1,547,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,755 UART: [ldev] --
1,587,156 UART: [fwproc] Waiting for Commands...
1,587,907 UART: [fwproc] Received command 0x46574c44
1,588,698 UART: [fwproc] Received Image of size 114168 bytes
1,636,391 UART: ROM Fatal Error: 0x000B0034
1,637,548 >>> mbox cmd response: failed
1,637,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,554 >>> mbox cmd response: failed
1,637,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,658 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,356 UART: [kat] SHA2-256
882,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,402 UART: [kat] ++
886,554 UART: [kat] sha1
890,766 UART: [kat] SHA2-256
892,704 UART: [kat] SHA2-384
895,445 UART: [kat] SHA2-512-ACC
897,346 UART: [kat] ECC-384
902,995 UART: [kat] HMAC-384Kdf
907,717 UART: [kat] LMS
1,475,913 UART: [kat] --
1,476,760 UART: [cold-reset] ++
1,477,154 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,843 UART: [idev] Erasing UDS.KEYID = 0
1,505,329 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,943 UART: [idev] --
1,514,996 UART: [ldev] ++
1,515,164 UART: [ldev] CDI.KEYID = 6
1,515,527 UART: [ldev] SUBJECT.KEYID = 5
1,515,953 UART: [ldev] AUTHORITY.KEYID = 7
1,516,416 UART: [ldev] FE.KEYID = 1
1,521,812 UART: [ldev] Erasing FE.KEYID = 1
1,547,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,953 UART: [ldev] --
1,586,376 UART: [fwproc] Waiting for Commands...
1,587,213 UART: [fwproc] Received command 0x46574c44
1,588,004 UART: [fwproc] Received Image of size 114168 bytes
2,884,435 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,715 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,067 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,764 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,083 >>> mbox cmd response: failed
1,489,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,089 >>> mbox cmd response: failed
1,489,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,552 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,863 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
893,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,767 UART: [kat] ++
897,919 UART: [kat] sha1
902,259 UART: [kat] SHA2-256
904,199 UART: [kat] SHA2-384
907,064 UART: [kat] SHA2-512-ACC
908,965 UART: [kat] ECC-384
918,424 UART: [kat] HMAC-384Kdf
922,868 UART: [kat] LMS
1,171,196 UART: [kat] --
1,171,975 UART: [cold-reset] ++
1,172,381 UART: [fht] FHT @ 0x50003400
1,175,108 UART: [idev] ++
1,175,276 UART: [idev] CDI.KEYID = 6
1,175,636 UART: [idev] SUBJECT.KEYID = 7
1,176,060 UART: [idev] UDS.KEYID = 0
1,176,405 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,122 UART: [idev] Erasing UDS.KEYID = 0
1,200,857 UART: [idev] Sha1 KeyId Algorithm
1,209,305 UART: [idev] --
1,210,437 UART: [ldev] ++
1,210,605 UART: [ldev] CDI.KEYID = 6
1,210,968 UART: [ldev] SUBJECT.KEYID = 5
1,211,394 UART: [ldev] AUTHORITY.KEYID = 7
1,211,857 UART: [ldev] FE.KEYID = 1
1,216,715 UART: [ldev] Erasing FE.KEYID = 1
1,243,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,669 UART: [ldev] --
1,283,130 UART: [fwproc] Wait for Commands...
1,283,806 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,851 UART: ROM Fatal Error: 0x000B0034
1,333,008 >>> mbox cmd response: failed
1,333,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,014 >>> mbox cmd response: failed
1,333,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
893,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,567 UART: [kat] ++
897,719 UART: [kat] sha1
901,945 UART: [kat] SHA2-256
903,885 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
918,504 UART: [kat] HMAC-384Kdf
922,994 UART: [kat] LMS
1,171,322 UART: [kat] --
1,172,109 UART: [cold-reset] ++
1,172,671 UART: [fht] FHT @ 0x50003400
1,175,312 UART: [idev] ++
1,175,480 UART: [idev] CDI.KEYID = 6
1,175,840 UART: [idev] SUBJECT.KEYID = 7
1,176,264 UART: [idev] UDS.KEYID = 0
1,176,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,984 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,057 UART: [ldev] ++
1,210,225 UART: [ldev] CDI.KEYID = 6
1,210,588 UART: [ldev] SUBJECT.KEYID = 5
1,211,014 UART: [ldev] AUTHORITY.KEYID = 7
1,211,477 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,641 UART: [ldev] --
1,282,960 UART: [fwproc] Wait for Commands...
1,283,742 UART: [fwproc] Recv command 0x46574c44
1,284,470 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,905 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,534 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,387 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,501 >>> mbox cmd response: failed
1,187,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,507 >>> mbox cmd response: failed
1,187,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,229 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,595 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
893,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,558 UART: [kat] ++
897,710 UART: [kat] sha1
901,982 UART: [kat] SHA2-256
903,922 UART: [kat] SHA2-384
906,547 UART: [kat] SHA2-512-ACC
908,448 UART: [kat] ECC-384
918,333 UART: [kat] HMAC-384Kdf
923,209 UART: [kat] LMS
1,171,537 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,776 UART: [fht] FHT @ 0x50003400
1,175,449 UART: [idev] ++
1,175,617 UART: [idev] CDI.KEYID = 6
1,175,977 UART: [idev] SUBJECT.KEYID = 7
1,176,401 UART: [idev] UDS.KEYID = 0
1,176,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,823 UART: [idev] Erasing UDS.KEYID = 0
1,202,092 UART: [idev] Sha1 KeyId Algorithm
1,210,380 UART: [idev] --
1,211,582 UART: [ldev] ++
1,211,750 UART: [ldev] CDI.KEYID = 6
1,212,113 UART: [ldev] SUBJECT.KEYID = 5
1,212,539 UART: [ldev] AUTHORITY.KEYID = 7
1,213,002 UART: [ldev] FE.KEYID = 1
1,218,302 UART: [ldev] Erasing FE.KEYID = 1
1,244,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,354 UART: [ldev] --
1,283,853 UART: [fwproc] Wait for Commands...
1,284,503 UART: [fwproc] Recv command 0x46574c44
1,285,231 UART: [fwproc] Recv'd Img size: 114168 bytes
1,333,554 UART: ROM Fatal Error: 0x000B0034
1,334,711 >>> mbox cmd response: failed
1,334,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,717 >>> mbox cmd response: failed
1,334,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,039 UART: [state] LifecycleState = Unprovisioned
85,694 UART: [state] DebugLocked = No
86,188 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
893,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,272 UART: [kat] ++
897,424 UART: [kat] sha1
901,528 UART: [kat] SHA2-256
903,468 UART: [kat] SHA2-384
906,167 UART: [kat] SHA2-512-ACC
908,068 UART: [kat] ECC-384
918,111 UART: [kat] HMAC-384Kdf
922,703 UART: [kat] LMS
1,171,031 UART: [kat] --
1,171,984 UART: [cold-reset] ++
1,172,540 UART: [fht] FHT @ 0x50003400
1,175,025 UART: [idev] ++
1,175,193 UART: [idev] CDI.KEYID = 6
1,175,553 UART: [idev] SUBJECT.KEYID = 7
1,175,977 UART: [idev] UDS.KEYID = 0
1,176,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,911 UART: [idev] Erasing UDS.KEYID = 0
1,201,242 UART: [idev] Sha1 KeyId Algorithm
1,209,782 UART: [idev] --
1,210,910 UART: [ldev] ++
1,211,078 UART: [ldev] CDI.KEYID = 6
1,211,441 UART: [ldev] SUBJECT.KEYID = 5
1,211,867 UART: [ldev] AUTHORITY.KEYID = 7
1,212,330 UART: [ldev] FE.KEYID = 1
1,217,528 UART: [ldev] Erasing FE.KEYID = 1
1,244,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,214 UART: [ldev] --
1,283,675 UART: [fwproc] Wait for Commands...
1,284,279 UART: [fwproc] Recv command 0x46574c44
1,285,007 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,651 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,186,809 >>> mbox cmd response: failed
1,186,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,815 >>> mbox cmd response: failed
1,186,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,784 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,250 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,658 UART: [kat] LMS
1,168,970 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,174,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,208,131 UART: [idev] --
1,209,240 UART: [ldev] ++
1,209,408 UART: [ldev] CDI.KEYID = 6
1,209,772 UART: [ldev] SUBJECT.KEYID = 5
1,210,199 UART: [ldev] AUTHORITY.KEYID = 7
1,210,662 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,272 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,422 UART: ROM Fatal Error: 0x000B0034
1,331,579 >>> mbox cmd response: failed
1,331,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,585 >>> mbox cmd response: failed
1,331,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,003 UART: [kat] ++
895,155 UART: [kat] sha1
899,377 UART: [kat] SHA2-256
901,317 UART: [kat] SHA2-384
903,970 UART: [kat] SHA2-512-ACC
905,871 UART: [kat] ECC-384
915,588 UART: [kat] HMAC-384Kdf
920,210 UART: [kat] LMS
1,168,522 UART: [kat] --
1,169,225 UART: [cold-reset] ++
1,169,733 UART: [fht] FHT @ 0x50003400
1,172,231 UART: [idev] ++
1,172,399 UART: [idev] CDI.KEYID = 6
1,172,760 UART: [idev] SUBJECT.KEYID = 7
1,173,185 UART: [idev] UDS.KEYID = 0
1,173,531 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,985 UART: [idev] Erasing UDS.KEYID = 0
1,198,131 UART: [idev] Sha1 KeyId Algorithm
1,206,997 UART: [idev] --
1,208,054 UART: [ldev] ++
1,208,222 UART: [ldev] CDI.KEYID = 6
1,208,586 UART: [ldev] SUBJECT.KEYID = 5
1,209,013 UART: [ldev] AUTHORITY.KEYID = 7
1,209,476 UART: [ldev] FE.KEYID = 1
1,214,522 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,396 UART: [ldev] --
1,280,902 UART: [fwproc] Wait for Commands...
1,281,485 UART: [fwproc] Recv command 0x46574c44
1,282,218 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,141 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,100 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,046 >>> mbox cmd response: failed
1,182,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,052 >>> mbox cmd response: failed
1,182,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,854 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,766 UART: [kat] ++
895,918 UART: [kat] sha1
900,242 UART: [kat] SHA2-256
902,182 UART: [kat] SHA2-384
904,735 UART: [kat] SHA2-512-ACC
906,636 UART: [kat] ECC-384
916,723 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,170,872 UART: [cold-reset] ++
1,171,420 UART: [fht] FHT @ 0x50003400
1,174,150 UART: [idev] ++
1,174,318 UART: [idev] CDI.KEYID = 6
1,174,679 UART: [idev] SUBJECT.KEYID = 7
1,175,104 UART: [idev] UDS.KEYID = 0
1,175,450 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,126 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,378 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,663 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,109 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,639 UART: ROM Fatal Error: 0x000B0034
1,332,796 >>> mbox cmd response: failed
1,332,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,802 >>> mbox cmd response: failed
1,332,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,759 UART: [kat] LMS
1,169,071 UART: [kat] --
1,170,128 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,266 UART: [idev] ++
1,173,434 UART: [idev] CDI.KEYID = 6
1,173,795 UART: [idev] SUBJECT.KEYID = 7
1,174,220 UART: [idev] UDS.KEYID = 0
1,174,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,442 UART: [idev] Erasing UDS.KEYID = 0
1,199,178 UART: [idev] Sha1 KeyId Algorithm
1,208,102 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,215,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,227 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,739 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,450 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,759 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,383 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,221 >>> mbox cmd response: failed
1,183,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,227 >>> mbox cmd response: failed
1,183,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,721 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,269 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,121 UART:
192,492 UART: Running Caliptra ROM ...
193,664 UART:
193,822 UART: [state] CFI Enabled
262,081 UART: [state] LifecycleState = Unprovisioned
264,016 UART: [state] DebugLocked = No
266,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,286 UART: [kat] SHA2-256
441,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,483 UART: [kat] ++
452,935 UART: [kat] sha1
463,218 UART: [kat] SHA2-256
465,906 UART: [kat] SHA2-384
471,349 UART: [kat] SHA2-512-ACC
473,691 UART: [kat] ECC-384
2,766,256 UART: [kat] HMAC-384Kdf
2,798,416 UART: [kat] LMS
3,988,706 UART: [kat] --
3,992,524 UART: [cold-reset] ++
3,994,682 UART: [fht] Storing FHT @ 0x50003400
4,006,004 UART: [idev] ++
4,006,590 UART: [idev] CDI.KEYID = 6
4,007,558 UART: [idev] SUBJECT.KEYID = 7
4,008,774 UART: [idev] UDS.KEYID = 0
4,011,539 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,929 UART: [idev] Erasing UDS.KEYID = 0
7,345,049 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,557 UART: [idev] --
7,371,527 UART: [ldev] ++
7,372,104 UART: [ldev] CDI.KEYID = 6
7,373,066 UART: [ldev] SUBJECT.KEYID = 5
7,374,288 UART: [ldev] AUTHORITY.KEYID = 7
7,375,525 UART: [ldev] FE.KEYID = 1
7,420,982 UART: [ldev] Erasing FE.KEYID = 1
10,753,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,112 UART: [ldev] --
13,134,590 UART: [fwproc] Waiting for Commands...
13,137,229 UART: [fwproc] Received command 0x46574c44
13,139,418 UART: [fwproc] Received Image of size 113844 bytes
15,847,983 UART: ROM Fatal Error: 0x000B0017
15,851,484 >>> mbox cmd response: failed
15,851,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,354 >>> mbox cmd response: failed
15,852,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,852,939 >>> mbox cmd response: failed
Initializing fuses
2,055,058 writing to cptra_bootfsm_go
2,244,361 UART:
2,244,706 UART: Running Caliptra ROM ...
2,245,848 UART:
2,246,010 UART: [state] CFI Enabled
2,304,738 UART: [state] LifecycleState = Unprovisioned
2,306,681 UART: [state] DebugLocked = No
2,309,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,954 UART: [kat] SHA2-256
2,483,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,138 UART: [kat] ++
2,494,598 UART: [kat] sha1
2,506,513 UART: [kat] SHA2-256
2,509,207 UART: [kat] SHA2-384
2,514,817 UART: [kat] SHA2-512-ACC
2,517,224 UART: [kat] ECC-384
4,806,374 UART: [kat] HMAC-384Kdf
4,837,895 UART: [kat] LMS
6,028,190 UART: [kat] --
6,032,622 UART: [cold-reset] ++
6,034,288 UART: [fht] Storing FHT @ 0x50003400
6,044,911 UART: [idev] ++
6,045,488 UART: [idev] CDI.KEYID = 6
6,046,427 UART: [idev] SUBJECT.KEYID = 7
6,047,694 UART: [idev] UDS.KEYID = 0
6,049,828 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,193,154 UART: [idev] Erasing UDS.KEYID = 0
9,382,494 UART: [idev] Using Sha1 for KeyId Algorithm
9,404,973 UART: [idev] --
9,407,952 UART: [ldev] ++
9,408,579 UART: [ldev] CDI.KEYID = 6
9,409,505 UART: [ldev] SUBJECT.KEYID = 5
9,410,768 UART: [ldev] AUTHORITY.KEYID = 7
9,412,009 UART: [ldev] FE.KEYID = 1
9,460,160 UART: [ldev] Erasing FE.KEYID = 1
12,791,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,086,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,101,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,116,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,130,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,150,262 UART: [ldev] --
15,155,312 UART: [fwproc] Waiting for Commands...
15,158,455 UART: [fwproc] Received command 0x46574c44
15,160,648 UART: [fwproc] Received Image of size 113844 bytes
19,208,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,285,293 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,354,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,671,138 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,787,754 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,563,174 >>> mbox cmd response: failed
15,563,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,564,153 >>> mbox cmd response: failed
15,564,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,564,721 >>> mbox cmd response: failed
Initializing fuses
2,055,476 writing to cptra_bootfsm_go
5,861,038 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,915,905 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,388 UART:
192,772 UART: Running Caliptra ROM ...
193,899 UART:
603,389 UART: [state] CFI Enabled
619,183 UART: [state] LifecycleState = Unprovisioned
621,071 UART: [state] DebugLocked = No
622,991 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,979 UART: [kat] SHA2-256
797,715 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,256 UART: [kat] ++
808,791 UART: [kat] sha1
820,576 UART: [kat] SHA2-256
823,292 UART: [kat] SHA2-384
829,914 UART: [kat] SHA2-512-ACC
832,303 UART: [kat] ECC-384
3,115,412 UART: [kat] HMAC-384Kdf
3,127,263 UART: [kat] LMS
4,317,393 UART: [kat] --
4,321,022 UART: [cold-reset] ++
4,323,175 UART: [fht] Storing FHT @ 0x50003400
4,334,678 UART: [idev] ++
4,335,247 UART: [idev] CDI.KEYID = 6
4,336,156 UART: [idev] SUBJECT.KEYID = 7
4,337,425 UART: [idev] UDS.KEYID = 0
4,340,168 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,081 UART: [idev] Erasing UDS.KEYID = 0
7,624,345 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,502 UART: [idev] --
7,648,749 UART: [ldev] ++
7,649,317 UART: [ldev] CDI.KEYID = 6
7,650,289 UART: [ldev] SUBJECT.KEYID = 5
7,651,448 UART: [ldev] AUTHORITY.KEYID = 7
7,652,739 UART: [ldev] FE.KEYID = 1
7,661,742 UART: [ldev] Erasing FE.KEYID = 1
10,955,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,746 UART: [ldev] --
13,315,530 UART: [fwproc] Waiting for Commands...
13,317,789 UART: [fwproc] Received command 0x46574c44
13,319,973 UART: [fwproc] Received Image of size 113844 bytes
16,022,522 UART: ROM Fatal Error: 0x000B0017
16,026,032 >>> mbox cmd response: failed
16,026,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,696 >>> mbox cmd response: failed
16,026,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,027,264 >>> mbox cmd response: failed
Initializing fuses
2,055,429 writing to cptra_bootfsm_go
2,244,731 UART:
2,245,082 UART: Running Caliptra ROM ...
2,246,133 UART:
4,428,173 UART: [state] CFI Enabled
4,444,280 UART: [state] LifecycleState = Unprovisioned
4,446,242 UART: [state] DebugLocked = No
4,448,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,454,494 UART: [kat] SHA2-256
4,624,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,634,800 UART: [kat] ++
4,635,261 UART: [kat] sha1
4,646,689 UART: [kat] SHA2-256
4,649,386 UART: [kat] SHA2-384
4,654,351 UART: [kat] SHA2-512-ACC
4,656,701 UART: [kat] ECC-384
6,941,603 UART: [kat] HMAC-384Kdf
6,953,384 UART: [kat] LMS
8,143,465 UART: [kat] --
8,147,910 UART: [cold-reset] ++
8,150,336 UART: [fht] Storing FHT @ 0x50003400
8,161,930 UART: [idev] ++
8,162,529 UART: [idev] CDI.KEYID = 6
8,163,409 UART: [idev] SUBJECT.KEYID = 7
8,164,678 UART: [idev] UDS.KEYID = 0
8,167,069 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,310,015 UART: [idev] Erasing UDS.KEYID = 0
11,454,532 UART: [idev] Using Sha1 for KeyId Algorithm
11,476,085 UART: [idev] --
11,478,787 UART: [ldev] ++
11,479,353 UART: [ldev] CDI.KEYID = 6
11,480,286 UART: [ldev] SUBJECT.KEYID = 5
11,481,534 UART: [ldev] AUTHORITY.KEYID = 7
11,482,834 UART: [ldev] FE.KEYID = 1
11,495,398 UART: [ldev] Erasing FE.KEYID = 1
14,785,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,078,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,092,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,107,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,122,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,141,836 UART: [ldev] --
17,147,480 UART: [fwproc] Waiting for Commands...
17,150,232 UART: [fwproc] Received command 0x46574c44
17,152,420 UART: [fwproc] Received Image of size 113844 bytes
21,206,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,284,366 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,353,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,670,188 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
4,125,465 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,759,148 >>> mbox cmd response: failed
15,759,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,043 >>> mbox cmd response: failed
15,760,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,612 >>> mbox cmd response: failed
Initializing fuses
2,055,879 writing to cptra_bootfsm_go
8,231,677 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,174,492 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,412 UART:
192,751 UART: Running Caliptra ROM ...
193,939 UART:
194,113 UART: [state] CFI Enabled
261,376 UART: [state] LifecycleState = Unprovisioned
263,286 UART: [state] DebugLocked = No
265,312 UART: [state] WD Timer not started. Device not locked for debugging
269,403 UART: [kat] SHA2-256
448,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,086 UART: [kat] ++
460,624 UART: [kat] sha1
472,103 UART: [kat] SHA2-256
475,104 UART: [kat] SHA2-384
480,373 UART: [kat] SHA2-512-ACC
483,336 UART: [kat] ECC-384
2,947,454 UART: [kat] HMAC-384Kdf
2,969,883 UART: [kat] LMS
3,499,300 UART: [kat] --
3,504,804 UART: [cold-reset] ++
3,505,787 UART: [fht] FHT @ 0x50003400
3,517,679 UART: [idev] ++
3,518,293 UART: [idev] CDI.KEYID = 6
3,519,180 UART: [idev] SUBJECT.KEYID = 7
3,520,406 UART: [idev] UDS.KEYID = 0
3,522,822 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,460 UART: [idev] Erasing UDS.KEYID = 0
6,023,218 UART: [idev] Sha1 KeyId Algorithm
6,047,808 UART: [idev] --
6,052,616 UART: [ldev] ++
6,053,193 UART: [ldev] CDI.KEYID = 6
6,054,105 UART: [ldev] SUBJECT.KEYID = 5
6,055,390 UART: [ldev] AUTHORITY.KEYID = 7
6,056,573 UART: [ldev] FE.KEYID = 1
6,100,861 UART: [ldev] Erasing FE.KEYID = 1
8,604,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,954 UART: [ldev] --
10,418,117 UART: [fwproc] Wait for Commands...
10,421,347 UART: [fwproc] Recv command 0x46574c44
10,423,389 UART: [fwproc] Recv'd Img size: 114168 bytes
12,478,916 UART: ROM Fatal Error: 0x000B0017
12,482,049 >>> mbox cmd response: failed
12,482,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,482,796 >>> mbox cmd response: failed
12,483,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,483,357 >>> mbox cmd response: failed
Initializing fuses
2,056,908 writing to cptra_bootfsm_go
2,246,221 UART:
2,246,567 UART: Running Caliptra ROM ...
2,247,616 UART:
2,247,764 UART: [state] CFI Enabled
2,321,227 UART: [state] LifecycleState = Unprovisioned
2,323,113 UART: [state] DebugLocked = No
2,325,212 UART: [state] WD Timer not started. Device not locked for debugging
2,328,257 UART: [kat] SHA2-256
2,507,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,949 UART: [kat] ++
2,519,406 UART: [kat] sha1
2,530,832 UART: [kat] SHA2-256
2,533,856 UART: [kat] SHA2-384
2,540,653 UART: [kat] SHA2-512-ACC
2,543,559 UART: [kat] ECC-384
5,004,074 UART: [kat] HMAC-384Kdf
5,028,027 UART: [kat] LMS
5,557,482 UART: [kat] --
5,560,934 UART: [cold-reset] ++
5,562,753 UART: [fht] FHT @ 0x50003400
5,573,247 UART: [idev] ++
5,573,818 UART: [idev] CDI.KEYID = 6
5,574,701 UART: [idev] SUBJECT.KEYID = 7
5,575,860 UART: [idev] UDS.KEYID = 0
5,578,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,721,880 UART: [idev] Erasing UDS.KEYID = 0
8,081,285 UART: [idev] Sha1 KeyId Algorithm
8,103,064 UART: [idev] --
8,108,574 UART: [ldev] ++
8,109,152 UART: [ldev] CDI.KEYID = 6
8,110,080 UART: [ldev] SUBJECT.KEYID = 5
8,111,247 UART: [ldev] AUTHORITY.KEYID = 7
8,112,487 UART: [ldev] FE.KEYID = 1
8,157,006 UART: [ldev] Erasing FE.KEYID = 1
10,659,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,721 UART: [ldev] --
12,472,717 UART: [fwproc] Wait for Commands...
12,474,592 UART: [fwproc] Recv command 0x46574c44
12,476,644 UART: [fwproc] Recv'd Img size: 114168 bytes
15,878,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,957,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,026,480 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,344,171 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
3,361,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,231,340 >>> mbox cmd response: failed
12,231,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,232,302 >>> mbox cmd response: failed
12,232,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,232,870 >>> mbox cmd response: failed
Initializing fuses
2,054,568 writing to cptra_bootfsm_go
5,418,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,100,071 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,501 writing to cptra_bootfsm_go
192,657 UART:
193,021 UART: Running Caliptra ROM ...
194,238 UART:
603,959 UART: [state] CFI Enabled
615,789 UART: [state] LifecycleState = Unprovisioned
617,643 UART: [state] DebugLocked = No
618,920 UART: [state] WD Timer not started. Device not locked for debugging
621,884 UART: [kat] SHA2-256
801,031 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,567 UART: [kat] ++
813,105 UART: [kat] sha1
825,394 UART: [kat] SHA2-256
828,458 UART: [kat] SHA2-384
834,427 UART: [kat] SHA2-512-ACC
837,407 UART: [kat] ECC-384
3,280,640 UART: [kat] HMAC-384Kdf
3,292,767 UART: [kat] LMS
3,822,288 UART: [kat] --
3,826,570 UART: [cold-reset] ++
3,829,096 UART: [fht] FHT @ 0x50003400
3,840,402 UART: [idev] ++
3,840,973 UART: [idev] CDI.KEYID = 6
3,841,854 UART: [idev] SUBJECT.KEYID = 7
3,843,065 UART: [idev] UDS.KEYID = 0
3,845,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,160 UART: [idev] Erasing UDS.KEYID = 0
6,315,977 UART: [idev] Sha1 KeyId Algorithm
6,339,805 UART: [idev] --
6,344,499 UART: [ldev] ++
6,345,071 UART: [ldev] CDI.KEYID = 6
6,345,984 UART: [ldev] SUBJECT.KEYID = 5
6,347,201 UART: [ldev] AUTHORITY.KEYID = 7
6,348,437 UART: [ldev] FE.KEYID = 1
6,358,493 UART: [ldev] Erasing FE.KEYID = 1
8,831,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,741 UART: [ldev] --
10,623,094 UART: [fwproc] Wait for Commands...
10,625,205 UART: [fwproc] Recv command 0x46574c44
10,627,306 UART: [fwproc] Recv'd Img size: 114168 bytes
12,685,083 UART: ROM Fatal Error: 0x000B0017
12,688,198 >>> mbox cmd response: failed
12,688,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,688,939 >>> mbox cmd response: failed
12,689,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,535 >>> mbox cmd response: failed
Initializing fuses
2,055,050 writing to cptra_bootfsm_go
2,244,392 UART:
2,244,727 UART: Running Caliptra ROM ...
2,246,021 UART:
7,760,491 UART: [state] CFI Enabled
7,775,507 UART: [state] LifecycleState = Unprovisioned
7,777,395 UART: [state] DebugLocked = No
7,779,059 UART: [state] WD Timer not started. Device not locked for debugging
7,782,273 UART: [kat] SHA2-256
7,961,411 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,972,948 UART: [kat] ++
7,973,408 UART: [kat] sha1
7,984,302 UART: [kat] SHA2-256
7,987,322 UART: [kat] SHA2-384
7,992,398 UART: [kat] SHA2-512-ACC
7,995,341 UART: [kat] ECC-384
10,437,374 UART: [kat] HMAC-384Kdf
10,448,461 UART: [kat] LMS
10,977,925 UART: [kat] --
10,984,029 UART: [cold-reset] ++
10,985,237 UART: [fht] FHT @ 0x50003400
10,996,275 UART: [idev] ++
10,996,839 UART: [idev] CDI.KEYID = 6
10,997,967 UART: [idev] SUBJECT.KEYID = 7
10,999,068 UART: [idev] UDS.KEYID = 0
11,001,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,145,145 UART: [idev] Erasing UDS.KEYID = 0
13,470,400 UART: [idev] Sha1 KeyId Algorithm
13,493,634 UART: [idev] --
13,497,251 UART: [ldev] ++
13,497,819 UART: [ldev] CDI.KEYID = 6
13,498,705 UART: [ldev] SUBJECT.KEYID = 5
13,499,921 UART: [ldev] AUTHORITY.KEYID = 7
13,501,158 UART: [ldev] FE.KEYID = 1
13,512,185 UART: [ldev] Erasing FE.KEYID = 1
15,985,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,701,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,717,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,733,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,749,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,770,816 UART: [ldev] --
17,774,876 UART: [fwproc] Wait for Commands...
17,776,871 UART: [fwproc] Recv command 0x46574c44
17,778,961 UART: [fwproc] Recv'd Img size: 114168 bytes
21,180,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,252,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,321,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,638,924 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,699,107 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,453,612 >>> mbox cmd response: failed
12,454,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,578 >>> mbox cmd response: failed
12,454,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,142 >>> mbox cmd response: failed
Initializing fuses
2,054,753 writing to cptra_bootfsm_go
11,102,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,678,445 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,157 UART:
192,520 UART: Running Caliptra ROM ...
193,723 UART:
193,875 UART: [state] CFI Enabled
265,905 UART: [state] LifecycleState = Unprovisioned
268,341 UART: [state] DebugLocked = No
269,623 UART: [state] WD Timer not started. Device not locked for debugging
273,325 UART: [kat] SHA2-256
463,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,986 UART: [kat] ++
474,473 UART: [kat] sha1
484,942 UART: [kat] SHA2-256
487,962 UART: [kat] SHA2-384
492,540 UART: [kat] SHA2-512-ACC
495,100 UART: [kat] ECC-384
2,946,840 UART: [kat] HMAC-384Kdf
2,968,906 UART: [kat] LMS
3,500,677 UART: [kat] --
3,505,106 UART: [cold-reset] ++
3,507,475 UART: [fht] FHT @ 0x50003400
3,519,432 UART: [idev] ++
3,520,110 UART: [idev] CDI.KEYID = 6
3,521,128 UART: [idev] SUBJECT.KEYID = 7
3,522,230 UART: [idev] UDS.KEYID = 0
3,524,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,507 UART: [idev] Erasing UDS.KEYID = 0
6,027,862 UART: [idev] Sha1 KeyId Algorithm
6,049,940 UART: [idev] --
6,055,730 UART: [ldev] ++
6,056,452 UART: [ldev] CDI.KEYID = 6
6,057,345 UART: [ldev] SUBJECT.KEYID = 5
6,058,452 UART: [ldev] AUTHORITY.KEYID = 7
6,059,859 UART: [ldev] FE.KEYID = 1
6,095,503 UART: [ldev] Erasing FE.KEYID = 1
8,600,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,625 UART: [ldev] --
10,410,327 UART: [fwproc] Wait for Commands...
10,412,966 UART: [fwproc] Recv command 0x46574c44
10,415,284 UART: [fwproc] Recv'd Img size: 114168 bytes
12,500,585 UART: ROM Fatal Error: 0x000B0017
12,504,261 >>> mbox cmd response: failed
12,504,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,504,993 >>> mbox cmd response: failed
12,505,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,553 >>> mbox cmd response: failed
Initializing fuses
2,056,616 writing to cptra_bootfsm_go
2,246,019 UART:
2,246,376 UART: Running Caliptra ROM ...
2,247,515 UART:
2,247,684 UART: [state] CFI Enabled
2,325,368 UART: [state] LifecycleState = Unprovisioned
2,327,779 UART: [state] DebugLocked = No
2,329,956 UART: [state] WD Timer not started. Device not locked for debugging
2,335,287 UART: [kat] SHA2-256
2,525,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,956 UART: [kat] ++
2,536,461 UART: [kat] sha1
2,546,489 UART: [kat] SHA2-256
2,549,510 UART: [kat] SHA2-384
2,555,015 UART: [kat] SHA2-512-ACC
2,557,596 UART: [kat] ECC-384
5,006,181 UART: [kat] HMAC-384Kdf
5,028,524 UART: [kat] LMS
5,560,321 UART: [kat] --
5,563,984 UART: [cold-reset] ++
5,566,402 UART: [fht] FHT @ 0x50003400
5,576,954 UART: [idev] ++
5,577,637 UART: [idev] CDI.KEYID = 6
5,578,623 UART: [idev] SUBJECT.KEYID = 7
5,579,782 UART: [idev] UDS.KEYID = 0
5,581,984 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,725,694 UART: [idev] Erasing UDS.KEYID = 0
8,085,171 UART: [idev] Sha1 KeyId Algorithm
8,107,805 UART: [idev] --
8,113,652 UART: [ldev] ++
8,114,373 UART: [ldev] CDI.KEYID = 6
8,115,285 UART: [ldev] SUBJECT.KEYID = 5
8,116,393 UART: [ldev] AUTHORITY.KEYID = 7
8,117,631 UART: [ldev] FE.KEYID = 1
8,156,910 UART: [ldev] Erasing FE.KEYID = 1
10,665,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,997 UART: [ldev] --
12,469,998 UART: [fwproc] Wait for Commands...
12,472,905 UART: [fwproc] Recv command 0x46574c44
12,475,175 UART: [fwproc] Recv'd Img size: 114168 bytes
15,923,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,780 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,117,961 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,659,083 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,443,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,297,663 >>> mbox cmd response: failed
12,298,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,572 >>> mbox cmd response: failed
12,298,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,133 >>> mbox cmd response: failed
Initializing fuses
2,059,142 writing to cptra_bootfsm_go
5,495,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,791,110 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,456 UART:
192,821 UART: Running Caliptra ROM ...
193,962 UART:
603,660 UART: [state] CFI Enabled
617,903 UART: [state] LifecycleState = Unprovisioned
620,268 UART: [state] DebugLocked = No
621,646 UART: [state] WD Timer not started. Device not locked for debugging
625,846 UART: [kat] SHA2-256
815,734 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,507 UART: [kat] ++
827,096 UART: [kat] sha1
837,340 UART: [kat] SHA2-256
840,409 UART: [kat] SHA2-384
846,499 UART: [kat] SHA2-512-ACC
849,116 UART: [kat] ECC-384
3,292,009 UART: [kat] HMAC-384Kdf
3,304,937 UART: [kat] LMS
3,836,770 UART: [kat] --
3,840,995 UART: [cold-reset] ++
3,842,395 UART: [fht] FHT @ 0x50003400
3,853,385 UART: [idev] ++
3,854,072 UART: [idev] CDI.KEYID = 6
3,854,990 UART: [idev] SUBJECT.KEYID = 7
3,856,230 UART: [idev] UDS.KEYID = 0
3,858,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,539 UART: [idev] Erasing UDS.KEYID = 0
6,332,049 UART: [idev] Sha1 KeyId Algorithm
6,354,215 UART: [idev] --
6,360,424 UART: [ldev] ++
6,361,105 UART: [ldev] CDI.KEYID = 6
6,362,014 UART: [ldev] SUBJECT.KEYID = 5
6,363,177 UART: [ldev] AUTHORITY.KEYID = 7
6,364,410 UART: [ldev] FE.KEYID = 1
6,375,760 UART: [ldev] Erasing FE.KEYID = 1
8,852,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,910 UART: [ldev] --
10,644,819 UART: [fwproc] Wait for Commands...
10,646,440 UART: [fwproc] Recv command 0x46574c44
10,648,713 UART: [fwproc] Recv'd Img size: 114168 bytes
12,738,554 UART: ROM Fatal Error: 0x000B0017
12,742,228 >>> mbox cmd response: failed
12,742,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,922 >>> mbox cmd response: failed
12,743,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,743,485 >>> mbox cmd response: failed
Initializing fuses
2,057,135 writing to cptra_bootfsm_go
2,246,461 UART:
2,246,811 UART: Running Caliptra ROM ...
2,247,974 UART:
7,706,173 UART: [state] CFI Enabled
7,721,540 UART: [state] LifecycleState = Unprovisioned
7,723,903 UART: [state] DebugLocked = No
7,725,941 UART: [state] WD Timer not started. Device not locked for debugging
7,731,273 UART: [kat] SHA2-256
7,921,148 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,931,948 UART: [kat] ++
7,932,547 UART: [kat] sha1
7,943,873 UART: [kat] SHA2-256
7,946,891 UART: [kat] SHA2-384
7,952,885 UART: [kat] SHA2-512-ACC
7,955,468 UART: [kat] ECC-384
10,398,652 UART: [kat] HMAC-384Kdf
10,412,614 UART: [kat] LMS
10,944,409 UART: [kat] --
10,948,380 UART: [cold-reset] ++
10,950,971 UART: [fht] FHT @ 0x50003400
10,962,817 UART: [idev] ++
10,963,493 UART: [idev] CDI.KEYID = 6
10,964,507 UART: [idev] SUBJECT.KEYID = 7
10,965,673 UART: [idev] UDS.KEYID = 0
10,968,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,111,527 UART: [idev] Erasing UDS.KEYID = 0
13,444,394 UART: [idev] Sha1 KeyId Algorithm
13,467,369 UART: [idev] --
13,472,655 UART: [ldev] ++
13,473,334 UART: [ldev] CDI.KEYID = 6
13,474,214 UART: [ldev] SUBJECT.KEYID = 5
13,475,428 UART: [ldev] AUTHORITY.KEYID = 7
13,476,661 UART: [ldev] FE.KEYID = 1
13,486,580 UART: [ldev] Erasing FE.KEYID = 1
15,965,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,686,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,701,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,716,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,732,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,752,097 UART: [ldev] --
17,757,041 UART: [fwproc] Wait for Commands...
17,759,576 UART: [fwproc] Recv command 0x46574c44
17,761,843 UART: [fwproc] Recv'd Img size: 114168 bytes
21,210,532 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,284,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,401,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,943,038 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,757,511 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,522,214 >>> mbox cmd response: failed
12,522,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,523,084 >>> mbox cmd response: failed
12,523,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,523,652 >>> mbox cmd response: failed
Initializing fuses
2,055,233 writing to cptra_bootfsm_go
11,093,209 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,274,089 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
85,973 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,655 UART: [kat] SHA2-256
881,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,701 UART: [kat] ++
885,853 UART: [kat] sha1
890,049 UART: [kat] SHA2-256
891,987 UART: [kat] SHA2-384
894,596 UART: [kat] SHA2-512-ACC
896,497 UART: [kat] ECC-384
902,032 UART: [kat] HMAC-384Kdf
906,704 UART: [kat] LMS
1,474,900 UART: [kat] --
1,475,823 UART: [cold-reset] ++
1,476,395 UART: [fht] Storing FHT @ 0x50003400
1,479,148 UART: [idev] ++
1,479,316 UART: [idev] CDI.KEYID = 6
1,479,676 UART: [idev] SUBJECT.KEYID = 7
1,480,100 UART: [idev] UDS.KEYID = 0
1,480,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,900 UART: [idev] Erasing UDS.KEYID = 0
1,504,618 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,246 UART: [idev] --
1,514,449 UART: [ldev] ++
1,514,617 UART: [ldev] CDI.KEYID = 6
1,514,980 UART: [ldev] SUBJECT.KEYID = 5
1,515,406 UART: [ldev] AUTHORITY.KEYID = 7
1,515,869 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,158 UART: [ldev] --
1,585,437 UART: [fwproc] Waiting for Commands...
1,586,300 UART: [fwproc] Received command 0x46574c44
1,587,091 UART: [fwproc] Received Image of size 114168 bytes
1,634,730 UART: ROM Fatal Error: 0x000B0017
1,635,887 >>> mbox cmd response: failed
1,635,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,893 >>> mbox cmd response: failed
1,635,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
85,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,667 UART: [kat] SHA2-256
881,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,713 UART: [kat] ++
885,865 UART: [kat] sha1
889,981 UART: [kat] SHA2-256
891,919 UART: [kat] SHA2-384
894,782 UART: [kat] SHA2-512-ACC
896,683 UART: [kat] ECC-384
902,238 UART: [kat] HMAC-384Kdf
906,950 UART: [kat] LMS
1,475,146 UART: [kat] --
1,475,815 UART: [cold-reset] ++
1,476,257 UART: [fht] Storing FHT @ 0x50003400
1,479,084 UART: [idev] ++
1,479,252 UART: [idev] CDI.KEYID = 6
1,479,612 UART: [idev] SUBJECT.KEYID = 7
1,480,036 UART: [idev] UDS.KEYID = 0
1,480,381 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,904 UART: [idev] Erasing UDS.KEYID = 0
1,504,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,036 UART: [idev] --
1,514,073 UART: [ldev] ++
1,514,241 UART: [ldev] CDI.KEYID = 6
1,514,604 UART: [ldev] SUBJECT.KEYID = 5
1,515,030 UART: [ldev] AUTHORITY.KEYID = 7
1,515,493 UART: [ldev] FE.KEYID = 1
1,520,527 UART: [ldev] Erasing FE.KEYID = 1
1,545,798 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,718 UART: [ldev] --
1,585,157 UART: [fwproc] Waiting for Commands...
1,585,960 UART: [fwproc] Received command 0x46574c44
1,586,751 UART: [fwproc] Received Image of size 114168 bytes
2,883,350 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,918 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,765 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,535 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,046 >>> mbox cmd response: failed
1,489,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,052 >>> mbox cmd response: failed
1,489,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,345 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,457 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,542 UART: [kat] SHA2-256
882,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,588 UART: [kat] ++
886,740 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
903,077 UART: [kat] HMAC-384Kdf
907,547 UART: [kat] LMS
1,475,743 UART: [kat] --
1,476,734 UART: [cold-reset] ++
1,477,182 UART: [fht] Storing FHT @ 0x50003400
1,480,057 UART: [idev] ++
1,480,225 UART: [idev] CDI.KEYID = 6
1,480,585 UART: [idev] SUBJECT.KEYID = 7
1,481,009 UART: [idev] UDS.KEYID = 0
1,481,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,855 UART: [idev] Erasing UDS.KEYID = 0
1,505,205 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,911 UART: [idev] --
1,515,130 UART: [ldev] ++
1,515,298 UART: [ldev] CDI.KEYID = 6
1,515,661 UART: [ldev] SUBJECT.KEYID = 5
1,516,087 UART: [ldev] AUTHORITY.KEYID = 7
1,516,550 UART: [ldev] FE.KEYID = 1
1,521,808 UART: [ldev] Erasing FE.KEYID = 1
1,547,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,777 UART: [ldev] --
1,587,076 UART: [fwproc] Waiting for Commands...
1,587,751 UART: [fwproc] Received command 0x46574c44
1,588,542 UART: [fwproc] Received Image of size 114168 bytes
1,635,517 UART: ROM Fatal Error: 0x000B0017
1,636,674 >>> mbox cmd response: failed
1,636,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,680 >>> mbox cmd response: failed
1,636,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,686 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Unprovisioned
86,334 UART: [state] DebugLocked = No
86,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,620 UART: [kat] SHA2-256
882,551 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,666 UART: [kat] ++
886,818 UART: [kat] sha1
891,038 UART: [kat] SHA2-256
892,976 UART: [kat] SHA2-384
895,883 UART: [kat] SHA2-512-ACC
897,784 UART: [kat] ECC-384
903,653 UART: [kat] HMAC-384Kdf
908,229 UART: [kat] LMS
1,476,425 UART: [kat] --
1,477,284 UART: [cold-reset] ++
1,477,684 UART: [fht] Storing FHT @ 0x50003400
1,480,561 UART: [idev] ++
1,480,729 UART: [idev] CDI.KEYID = 6
1,481,089 UART: [idev] SUBJECT.KEYID = 7
1,481,513 UART: [idev] UDS.KEYID = 0
1,481,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,139 UART: [idev] Erasing UDS.KEYID = 0
1,505,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,245 UART: [idev] --
1,515,180 UART: [ldev] ++
1,515,348 UART: [ldev] CDI.KEYID = 6
1,515,711 UART: [ldev] SUBJECT.KEYID = 5
1,516,137 UART: [ldev] AUTHORITY.KEYID = 7
1,516,600 UART: [ldev] FE.KEYID = 1
1,522,026 UART: [ldev] Erasing FE.KEYID = 1
1,547,741 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,937 UART: [ldev] --
1,587,222 UART: [fwproc] Waiting for Commands...
1,587,979 UART: [fwproc] Received command 0x46574c44
1,588,770 UART: [fwproc] Received Image of size 114168 bytes
2,884,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,067 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,419 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,938 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,019 >>> mbox cmd response: failed
1,489,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,025 >>> mbox cmd response: failed
1,489,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,316 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,286 UART: [kat] HMAC-384Kdf
922,760 UART: [kat] LMS
1,171,088 UART: [kat] --
1,172,141 UART: [cold-reset] ++
1,172,549 UART: [fht] FHT @ 0x50003400
1,175,112 UART: [idev] ++
1,175,280 UART: [idev] CDI.KEYID = 6
1,175,640 UART: [idev] SUBJECT.KEYID = 7
1,176,064 UART: [idev] UDS.KEYID = 0
1,176,409 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,984 UART: [idev] Erasing UDS.KEYID = 0
1,201,237 UART: [idev] Sha1 KeyId Algorithm
1,209,575 UART: [idev] --
1,210,433 UART: [ldev] ++
1,210,601 UART: [ldev] CDI.KEYID = 6
1,210,964 UART: [ldev] SUBJECT.KEYID = 5
1,211,390 UART: [ldev] AUTHORITY.KEYID = 7
1,211,853 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,243,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,073 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,283,946 UART: [fwproc] Recv command 0x46574c44
1,284,674 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,449 UART: ROM Fatal Error: 0x000B0017
1,333,606 >>> mbox cmd response: failed
1,333,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,612 >>> mbox cmd response: failed
1,333,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
893,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,653 UART: [kat] ++
897,805 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,458 UART: [kat] HMAC-384Kdf
922,890 UART: [kat] LMS
1,171,218 UART: [kat] --
1,172,155 UART: [cold-reset] ++
1,172,599 UART: [fht] FHT @ 0x50003400
1,175,066 UART: [idev] ++
1,175,234 UART: [idev] CDI.KEYID = 6
1,175,594 UART: [idev] SUBJECT.KEYID = 7
1,176,018 UART: [idev] UDS.KEYID = 0
1,176,363 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,728 UART: [idev] Erasing UDS.KEYID = 0
1,200,525 UART: [idev] Sha1 KeyId Algorithm
1,208,867 UART: [idev] --
1,210,055 UART: [ldev] ++
1,210,223 UART: [ldev] CDI.KEYID = 6
1,210,586 UART: [ldev] SUBJECT.KEYID = 5
1,211,012 UART: [ldev] AUTHORITY.KEYID = 7
1,211,475 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,860 UART: [fwproc] Wait for Commands...
1,282,654 UART: [fwproc] Recv command 0x46574c44
1,283,382 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,029 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,706 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,269 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,073 >>> mbox cmd response: failed
1,187,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,079 >>> mbox cmd response: failed
1,187,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,743 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,355 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
893,931 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,056 UART: [kat] ++
898,208 UART: [kat] sha1
902,312 UART: [kat] SHA2-256
904,252 UART: [kat] SHA2-384
907,053 UART: [kat] SHA2-512-ACC
908,954 UART: [kat] ECC-384
918,885 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,640 UART: [cold-reset] ++
1,173,026 UART: [fht] FHT @ 0x50003400
1,175,693 UART: [idev] ++
1,175,861 UART: [idev] CDI.KEYID = 6
1,176,221 UART: [idev] SUBJECT.KEYID = 7
1,176,645 UART: [idev] UDS.KEYID = 0
1,176,990 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,703 UART: [idev] Erasing UDS.KEYID = 0
1,201,484 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,211,190 UART: [ldev] ++
1,211,358 UART: [ldev] CDI.KEYID = 6
1,211,721 UART: [ldev] SUBJECT.KEYID = 5
1,212,147 UART: [ldev] AUTHORITY.KEYID = 7
1,212,610 UART: [ldev] FE.KEYID = 1
1,218,184 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,296 UART: [ldev] --
1,283,567 UART: [fwproc] Wait for Commands...
1,284,181 UART: [fwproc] Recv command 0x46574c44
1,284,909 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,410 UART: ROM Fatal Error: 0x000B0017
1,333,567 >>> mbox cmd response: failed
1,333,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,573 >>> mbox cmd response: failed
1,333,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
893,645 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,770 UART: [kat] ++
897,922 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,825 UART: [kat] SHA2-512-ACC
908,726 UART: [kat] ECC-384
918,373 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,460 UART: [cold-reset] ++
1,172,798 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,010 UART: [idev] Sha1 KeyId Algorithm
1,209,678 UART: [idev] --
1,210,818 UART: [ldev] ++
1,210,986 UART: [ldev] CDI.KEYID = 6
1,211,349 UART: [ldev] SUBJECT.KEYID = 5
1,211,775 UART: [ldev] AUTHORITY.KEYID = 7
1,212,238 UART: [ldev] FE.KEYID = 1
1,217,290 UART: [ldev] Erasing FE.KEYID = 1
1,243,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,712 UART: [ldev] --
1,283,157 UART: [fwproc] Wait for Commands...
1,283,887 UART: [fwproc] Recv command 0x46574c44
1,284,615 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,509 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,440 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,189,414 >>> mbox cmd response: failed
1,189,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,420 >>> mbox cmd response: failed
1,189,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,524 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,283 UART: [kat] ++
895,435 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,532 UART: [kat] SHA2-512-ACC
906,433 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,173,241 UART: [idev] ++
1,173,409 UART: [idev] CDI.KEYID = 6
1,173,770 UART: [idev] SUBJECT.KEYID = 7
1,174,195 UART: [idev] UDS.KEYID = 0
1,174,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,069 UART: [idev] Erasing UDS.KEYID = 0
1,199,283 UART: [idev] Sha1 KeyId Algorithm
1,208,187 UART: [idev] --
1,209,396 UART: [ldev] ++
1,209,564 UART: [ldev] CDI.KEYID = 6
1,209,928 UART: [ldev] SUBJECT.KEYID = 5
1,210,355 UART: [ldev] AUTHORITY.KEYID = 7
1,210,818 UART: [ldev] FE.KEYID = 1
1,215,832 UART: [ldev] Erasing FE.KEYID = 1
1,242,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,870 UART: [ldev] --
1,281,348 UART: [fwproc] Wait for Commands...
1,281,931 UART: [fwproc] Recv command 0x46574c44
1,282,664 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,452 UART: ROM Fatal Error: 0x000B0017
1,331,609 >>> mbox cmd response: failed
1,331,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,615 >>> mbox cmd response: failed
1,331,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,621 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
915,466 UART: [kat] HMAC-384Kdf
920,240 UART: [kat] LMS
1,168,552 UART: [kat] --
1,169,589 UART: [cold-reset] ++
1,170,117 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,240 UART: [ldev] ++
1,209,408 UART: [ldev] CDI.KEYID = 6
1,209,772 UART: [ldev] SUBJECT.KEYID = 5
1,210,199 UART: [ldev] AUTHORITY.KEYID = 7
1,210,662 UART: [ldev] FE.KEYID = 1
1,215,786 UART: [ldev] Erasing FE.KEYID = 1
1,241,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,798 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,528 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,902 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,322 >>> mbox cmd response: failed
1,184,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,328 >>> mbox cmd response: failed
1,184,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,182 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,570 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,668 UART: [kat] ++
895,820 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,863 UART: [kat] SHA2-512-ACC
906,764 UART: [kat] ECC-384
916,665 UART: [kat] HMAC-384Kdf
921,311 UART: [kat] LMS
1,169,623 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,710 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,332 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,065 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,553 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,367 UART: ROM Fatal Error: 0x000B0017
1,331,524 >>> mbox cmd response: failed
1,331,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,530 >>> mbox cmd response: failed
1,331,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,285 UART: [kat] SHA2-256
891,835 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,964 UART: [kat] ++
896,116 UART: [kat] sha1
900,442 UART: [kat] SHA2-256
902,382 UART: [kat] SHA2-384
905,173 UART: [kat] SHA2-512-ACC
907,074 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,237 UART: [kat] LMS
1,169,549 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,746 UART: [fht] FHT @ 0x50003400
1,173,446 UART: [idev] ++
1,173,614 UART: [idev] CDI.KEYID = 6
1,173,975 UART: [idev] SUBJECT.KEYID = 7
1,174,400 UART: [idev] UDS.KEYID = 0
1,174,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,778 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,745 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,035 UART: [ldev] --
1,282,401 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,895 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,650 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,959 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,661 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,613 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,577 >>> mbox cmd response: failed
1,184,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,583 >>> mbox cmd response: failed
1,184,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,023 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,085 UART:
192,464 UART: Running Caliptra ROM ...
193,597 UART:
193,744 UART: [state] CFI Enabled
262,867 UART: [state] LifecycleState = Unprovisioned
264,852 UART: [state] DebugLocked = No
266,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,612 UART: [kat] SHA2-256
441,314 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,821 UART: [kat] ++
452,269 UART: [kat] sha1
463,335 UART: [kat] SHA2-256
466,022 UART: [kat] SHA2-384
471,894 UART: [kat] SHA2-512-ACC
474,294 UART: [kat] ECC-384
2,765,505 UART: [kat] HMAC-384Kdf
2,778,021 UART: [kat] LMS
3,968,305 UART: [kat] --
3,972,107 UART: [cold-reset] ++
3,973,189 UART: [fht] Storing FHT @ 0x50003400
3,984,727 UART: [idev] ++
3,985,345 UART: [idev] CDI.KEYID = 6
3,986,268 UART: [idev] SUBJECT.KEYID = 7
3,987,543 UART: [idev] UDS.KEYID = 0
3,990,624 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,134,056 UART: [idev] Erasing UDS.KEYID = 0
7,326,087 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,952 UART: [idev] --
7,351,889 UART: [ldev] ++
7,352,512 UART: [ldev] CDI.KEYID = 6
7,353,427 UART: [ldev] SUBJECT.KEYID = 5
7,354,641 UART: [ldev] AUTHORITY.KEYID = 7
7,355,927 UART: [ldev] FE.KEYID = 1
7,400,782 UART: [ldev] Erasing FE.KEYID = 1
10,732,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,734 UART: [ldev] --
13,091,974 UART: [fwproc] Waiting for Commands...
13,095,046 UART: [fwproc] Received command 0x46574c44
13,097,238 UART: [fwproc] Received Image of size 113844 bytes
15,802,703 UART: ROM Fatal Error: 0x000B003B
15,806,207 >>> mbox cmd response: failed
15,806,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,806,965 >>> mbox cmd response: failed
15,807,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,807,521 >>> mbox cmd response: failed
Initializing fuses
2,063,924 writing to cptra_bootfsm_go
2,253,212 UART:
2,253,553 UART: Running Caliptra ROM ...
2,254,685 UART:
2,254,854 UART: [state] CFI Enabled
2,324,862 UART: [state] LifecycleState = Unprovisioned
2,326,797 UART: [state] DebugLocked = No
2,328,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,332,990 UART: [kat] SHA2-256
2,502,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,513,207 UART: [kat] ++
2,513,715 UART: [kat] sha1
2,523,793 UART: [kat] SHA2-256
2,526,451 UART: [kat] SHA2-384
2,531,631 UART: [kat] SHA2-512-ACC
2,533,992 UART: [kat] ECC-384
4,830,916 UART: [kat] HMAC-384Kdf
4,864,215 UART: [kat] LMS
6,054,481 UART: [kat] --
6,058,985 UART: [cold-reset] ++
6,060,442 UART: [fht] Storing FHT @ 0x50003400
6,072,631 UART: [idev] ++
6,073,208 UART: [idev] CDI.KEYID = 6
6,074,119 UART: [idev] SUBJECT.KEYID = 7
6,075,391 UART: [idev] UDS.KEYID = 0
6,077,594 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,220,886 UART: [idev] Erasing UDS.KEYID = 0
9,409,344 UART: [idev] Using Sha1 for KeyId Algorithm
9,431,263 UART: [idev] --
9,436,927 UART: [ldev] ++
9,437,509 UART: [ldev] CDI.KEYID = 6
9,438,477 UART: [ldev] SUBJECT.KEYID = 5
9,439,675 UART: [ldev] AUTHORITY.KEYID = 7
9,440,968 UART: [ldev] FE.KEYID = 1
9,487,153 UART: [ldev] Erasing FE.KEYID = 1
12,818,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,133,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,147,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,162,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,177,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,195,499 UART: [ldev] --
15,201,104 UART: [fwproc] Waiting for Commands...
15,204,178 UART: [fwproc] Received command 0x46574c44
15,206,365 UART: [fwproc] Received Image of size 113844 bytes
19,253,377 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,328,630 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,397,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,714,570 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,805,858 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,539,879 >>> mbox cmd response: failed
15,540,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,540,835 >>> mbox cmd response: failed
15,541,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,541,346 >>> mbox cmd response: failed
Initializing fuses
2,061,767 writing to cptra_bootfsm_go
5,860,127 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,899,744 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,674 UART:
193,083 UART: Running Caliptra ROM ...
194,210 UART:
603,780 UART: [state] CFI Enabled
620,474 UART: [state] LifecycleState = Unprovisioned
622,427 UART: [state] DebugLocked = No
624,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,606 UART: [kat] SHA2-256
798,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,911 UART: [kat] ++
809,360 UART: [kat] sha1
821,119 UART: [kat] SHA2-256
823,804 UART: [kat] SHA2-384
830,212 UART: [kat] SHA2-512-ACC
832,556 UART: [kat] ECC-384
3,117,865 UART: [kat] HMAC-384Kdf
3,129,623 UART: [kat] LMS
4,319,701 UART: [kat] --
4,327,013 UART: [cold-reset] ++
4,327,875 UART: [fht] Storing FHT @ 0x50003400
4,338,666 UART: [idev] ++
4,339,235 UART: [idev] CDI.KEYID = 6
4,340,199 UART: [idev] SUBJECT.KEYID = 7
4,341,416 UART: [idev] UDS.KEYID = 0
4,344,394 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,487,616 UART: [idev] Erasing UDS.KEYID = 0
7,629,299 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,428 UART: [idev] --
7,652,891 UART: [ldev] ++
7,653,473 UART: [ldev] CDI.KEYID = 6
7,654,443 UART: [ldev] SUBJECT.KEYID = 5
7,655,661 UART: [ldev] AUTHORITY.KEYID = 7
7,656,898 UART: [ldev] FE.KEYID = 1
7,668,784 UART: [ldev] Erasing FE.KEYID = 1
10,956,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,006 UART: [ldev] --
13,318,056 UART: [fwproc] Waiting for Commands...
13,320,247 UART: [fwproc] Received command 0x46574c44
13,322,446 UART: [fwproc] Received Image of size 113844 bytes
16,028,791 UART: ROM Fatal Error: 0x000B003B
16,032,271 >>> mbox cmd response: failed
16,032,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,053 >>> mbox cmd response: failed
16,033,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,625 >>> mbox cmd response: failed
Initializing fuses
2,064,574 writing to cptra_bootfsm_go
2,253,873 UART:
2,254,230 UART: Running Caliptra ROM ...
2,255,378 UART:
4,419,782 UART: [state] CFI Enabled
4,433,675 UART: [state] LifecycleState = Unprovisioned
4,435,636 UART: [state] DebugLocked = No
4,437,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,442,022 UART: [kat] SHA2-256
4,611,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,622,365 UART: [kat] ++
4,622,824 UART: [kat] sha1
4,634,033 UART: [kat] SHA2-256
4,636,733 UART: [kat] SHA2-384
4,641,807 UART: [kat] SHA2-512-ACC
4,644,158 UART: [kat] ECC-384
6,927,536 UART: [kat] HMAC-384Kdf
6,938,576 UART: [kat] LMS
8,128,704 UART: [kat] --
8,133,799 UART: [cold-reset] ++
8,134,932 UART: [fht] Storing FHT @ 0x50003400
8,147,222 UART: [idev] ++
8,147,787 UART: [idev] CDI.KEYID = 6
8,148,821 UART: [idev] SUBJECT.KEYID = 7
8,149,983 UART: [idev] UDS.KEYID = 0
8,152,324 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,295,425 UART: [idev] Erasing UDS.KEYID = 0
11,435,654 UART: [idev] Using Sha1 for KeyId Algorithm
11,458,489 UART: [idev] --
11,463,431 UART: [ldev] ++
11,464,004 UART: [ldev] CDI.KEYID = 6
11,464,948 UART: [ldev] SUBJECT.KEYID = 5
11,466,216 UART: [ldev] AUTHORITY.KEYID = 7
11,467,377 UART: [ldev] FE.KEYID = 1
11,478,698 UART: [ldev] Erasing FE.KEYID = 1
14,768,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,061,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,076,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,090,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,105,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,123,462 UART: [ldev] --
17,128,455 UART: [fwproc] Waiting for Commands...
17,131,565 UART: [fwproc] Received command 0x46574c44
17,133,756 UART: [fwproc] Received Image of size 113844 bytes
21,188,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,264,005 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,332,875 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,649,910 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
4,133,691 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,759,547 >>> mbox cmd response: failed
15,760,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,588 >>> mbox cmd response: failed
15,760,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,761,159 >>> mbox cmd response: failed
Initializing fuses
2,059,194 writing to cptra_bootfsm_go
8,235,041 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,156,693 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,424 UART:
192,773 UART: Running Caliptra ROM ...
193,978 UART:
194,135 UART: [state] CFI Enabled
263,977 UART: [state] LifecycleState = Unprovisioned
265,845 UART: [state] DebugLocked = No
267,121 UART: [state] WD Timer not started. Device not locked for debugging
270,843 UART: [kat] SHA2-256
450,003 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,544 UART: [kat] ++
461,997 UART: [kat] sha1
474,004 UART: [kat] SHA2-256
477,015 UART: [kat] SHA2-384
483,048 UART: [kat] SHA2-512-ACC
485,988 UART: [kat] ECC-384
2,947,393 UART: [kat] HMAC-384Kdf
2,968,917 UART: [kat] LMS
3,498,403 UART: [kat] --
3,502,744 UART: [cold-reset] ++
3,505,334 UART: [fht] FHT @ 0x50003400
3,517,938 UART: [idev] ++
3,518,504 UART: [idev] CDI.KEYID = 6
3,519,381 UART: [idev] SUBJECT.KEYID = 7
3,520,598 UART: [idev] UDS.KEYID = 0
3,523,076 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,861 UART: [idev] Erasing UDS.KEYID = 0
6,023,955 UART: [idev] Sha1 KeyId Algorithm
6,047,686 UART: [idev] --
6,051,904 UART: [ldev] ++
6,052,693 UART: [ldev] CDI.KEYID = 6
6,053,619 UART: [ldev] SUBJECT.KEYID = 5
6,054,729 UART: [ldev] AUTHORITY.KEYID = 7
6,055,907 UART: [ldev] FE.KEYID = 1
6,096,856 UART: [ldev] Erasing FE.KEYID = 1
8,604,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,026 UART: [ldev] --
10,411,825 UART: [fwproc] Wait for Commands...
10,414,034 UART: [fwproc] Recv command 0x46574c44
10,416,079 UART: [fwproc] Recv'd Img size: 114168 bytes
12,468,094 UART: ROM Fatal Error: 0x000B003B
12,471,233 >>> mbox cmd response: failed
12,471,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,471,982 >>> mbox cmd response: failed
12,472,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,472,578 >>> mbox cmd response: failed
Initializing fuses
2,053,186 writing to cptra_bootfsm_go
2,242,501 UART:
2,242,847 UART: Running Caliptra ROM ...
2,243,990 UART:
2,244,194 UART: [state] CFI Enabled
2,313,601 UART: [state] LifecycleState = Unprovisioned
2,315,480 UART: [state] DebugLocked = No
2,317,955 UART: [state] WD Timer not started. Device not locked for debugging
2,322,136 UART: [kat] SHA2-256
2,501,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,846 UART: [kat] ++
2,513,397 UART: [kat] sha1
2,524,347 UART: [kat] SHA2-256
2,527,373 UART: [kat] SHA2-384
2,532,941 UART: [kat] SHA2-512-ACC
2,535,882 UART: [kat] ECC-384
4,998,435 UART: [kat] HMAC-384Kdf
5,022,068 UART: [kat] LMS
5,551,486 UART: [kat] --
5,555,769 UART: [cold-reset] ++
5,557,670 UART: [fht] FHT @ 0x50003400
5,567,679 UART: [idev] ++
5,568,249 UART: [idev] CDI.KEYID = 6
5,569,148 UART: [idev] SUBJECT.KEYID = 7
5,570,365 UART: [idev] UDS.KEYID = 0
5,572,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,716,340 UART: [idev] Erasing UDS.KEYID = 0
8,076,372 UART: [idev] Sha1 KeyId Algorithm
8,099,600 UART: [idev] --
8,104,244 UART: [ldev] ++
8,104,809 UART: [ldev] CDI.KEYID = 6
8,105,753 UART: [ldev] SUBJECT.KEYID = 5
8,106,911 UART: [ldev] AUTHORITY.KEYID = 7
8,108,195 UART: [ldev] FE.KEYID = 1
8,150,096 UART: [ldev] Erasing FE.KEYID = 1
10,654,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,806 UART: [ldev] --
12,463,278 UART: [fwproc] Wait for Commands...
12,464,930 UART: [fwproc] Recv command 0x46574c44
12,467,036 UART: [fwproc] Recv'd Img size: 114168 bytes
15,865,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,943,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,012,151 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,330,247 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,360,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,208,921 >>> mbox cmd response: failed
12,209,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,209,784 >>> mbox cmd response: failed
12,210,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,210,354 >>> mbox cmd response: failed
Initializing fuses
2,057,373 writing to cptra_bootfsm_go
5,440,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,121,951 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
192,685 UART:
193,038 UART: Running Caliptra ROM ...
194,238 UART:
603,849 UART: [state] CFI Enabled
617,514 UART: [state] LifecycleState = Unprovisioned
619,336 UART: [state] DebugLocked = No
622,336 UART: [state] WD Timer not started. Device not locked for debugging
625,672 UART: [kat] SHA2-256
804,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,356 UART: [kat] ++
816,890 UART: [kat] sha1
827,954 UART: [kat] SHA2-256
830,960 UART: [kat] SHA2-384
836,612 UART: [kat] SHA2-512-ACC
839,547 UART: [kat] ECC-384
3,282,887 UART: [kat] HMAC-384Kdf
3,295,497 UART: [kat] LMS
3,825,002 UART: [kat] --
3,830,085 UART: [cold-reset] ++
3,830,942 UART: [fht] FHT @ 0x50003400
3,842,893 UART: [idev] ++
3,843,464 UART: [idev] CDI.KEYID = 6
3,844,385 UART: [idev] SUBJECT.KEYID = 7
3,845,546 UART: [idev] UDS.KEYID = 0
3,848,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,014 UART: [idev] Erasing UDS.KEYID = 0
6,320,467 UART: [idev] Sha1 KeyId Algorithm
6,344,101 UART: [idev] --
6,348,107 UART: [ldev] ++
6,348,678 UART: [ldev] CDI.KEYID = 6
6,349,590 UART: [ldev] SUBJECT.KEYID = 5
6,350,749 UART: [ldev] AUTHORITY.KEYID = 7
6,351,981 UART: [ldev] FE.KEYID = 1
6,363,557 UART: [ldev] Erasing FE.KEYID = 1
8,836,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,588,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,604,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,023 UART: [ldev] --
10,630,321 UART: [fwproc] Wait for Commands...
10,632,579 UART: [fwproc] Recv command 0x46574c44
10,634,676 UART: [fwproc] Recv'd Img size: 114168 bytes
12,685,389 UART: ROM Fatal Error: 0x000B003B
12,688,510 >>> mbox cmd response: failed
12,688,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,274 >>> mbox cmd response: failed
12,689,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,689,823 >>> mbox cmd response: failed
Initializing fuses
2,052,181 writing to cptra_bootfsm_go
2,241,488 UART:
2,241,821 UART: Running Caliptra ROM ...
2,242,869 UART:
7,760,140 UART: [state] CFI Enabled
7,774,838 UART: [state] LifecycleState = Unprovisioned
7,776,699 UART: [state] DebugLocked = No
7,778,702 UART: [state] WD Timer not started. Device not locked for debugging
7,781,800 UART: [kat] SHA2-256
7,960,921 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,972,486 UART: [kat] ++
7,973,031 UART: [kat] sha1
7,983,825 UART: [kat] SHA2-256
7,986,838 UART: [kat] SHA2-384
7,991,537 UART: [kat] SHA2-512-ACC
7,994,477 UART: [kat] ECC-384
10,435,181 UART: [kat] HMAC-384Kdf
10,447,189 UART: [kat] LMS
10,976,691 UART: [kat] --
10,981,060 UART: [cold-reset] ++
10,982,615 UART: [fht] FHT @ 0x50003400
10,993,377 UART: [idev] ++
10,993,944 UART: [idev] CDI.KEYID = 6
10,994,844 UART: [idev] SUBJECT.KEYID = 7
10,996,057 UART: [idev] UDS.KEYID = 0
10,998,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,141,935 UART: [idev] Erasing UDS.KEYID = 0
13,467,918 UART: [idev] Sha1 KeyId Algorithm
13,491,695 UART: [idev] --
13,496,185 UART: [ldev] ++
13,496,753 UART: [ldev] CDI.KEYID = 6
13,497,641 UART: [ldev] SUBJECT.KEYID = 5
13,498,853 UART: [ldev] AUTHORITY.KEYID = 7
13,500,081 UART: [ldev] FE.KEYID = 1
13,509,570 UART: [ldev] Erasing FE.KEYID = 1
15,979,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,697,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,713,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,729,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,744,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,764,403 UART: [ldev] --
17,769,953 UART: [fwproc] Wait for Commands...
17,771,944 UART: [fwproc] Recv command 0x46574c44
17,774,037 UART: [fwproc] Recv'd Img size: 114168 bytes
21,172,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,248,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,317,596 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,635,813 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,695,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,456,110 >>> mbox cmd response: failed
12,456,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,119 >>> mbox cmd response: failed
12,457,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,688 >>> mbox cmd response: failed
Initializing fuses
2,060,422 writing to cptra_bootfsm_go
11,105,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,684,376 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,100 UART:
192,462 UART: Running Caliptra ROM ...
193,571 UART:
193,713 UART: [state] CFI Enabled
263,897 UART: [state] LifecycleState = Unprovisioned
266,313 UART: [state] DebugLocked = No
269,235 UART: [state] WD Timer not started. Device not locked for debugging
272,990 UART: [kat] SHA2-256
462,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,591 UART: [kat] ++
474,058 UART: [kat] sha1
485,650 UART: [kat] SHA2-256
488,661 UART: [kat] SHA2-384
495,559 UART: [kat] SHA2-512-ACC
498,172 UART: [kat] ECC-384
2,948,300 UART: [kat] HMAC-384Kdf
2,968,885 UART: [kat] LMS
3,500,692 UART: [kat] --
3,505,505 UART: [cold-reset] ++
3,507,066 UART: [fht] FHT @ 0x50003400
3,519,455 UART: [idev] ++
3,520,140 UART: [idev] CDI.KEYID = 6
3,521,050 UART: [idev] SUBJECT.KEYID = 7
3,522,267 UART: [idev] UDS.KEYID = 0
3,524,694 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,549 UART: [idev] Erasing UDS.KEYID = 0
6,025,308 UART: [idev] Sha1 KeyId Algorithm
6,047,957 UART: [idev] --
6,053,476 UART: [ldev] ++
6,054,195 UART: [ldev] CDI.KEYID = 6
6,055,094 UART: [ldev] SUBJECT.KEYID = 5
6,056,203 UART: [ldev] AUTHORITY.KEYID = 7
6,057,436 UART: [ldev] FE.KEYID = 1
6,096,251 UART: [ldev] Erasing FE.KEYID = 1
8,602,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,388 UART: [ldev] --
10,411,443 UART: [fwproc] Wait for Commands...
10,413,539 UART: [fwproc] Recv command 0x46574c44
10,415,823 UART: [fwproc] Recv'd Img size: 114168 bytes
12,502,782 UART: ROM Fatal Error: 0x000B003B
12,506,448 >>> mbox cmd response: failed
12,506,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,129 >>> mbox cmd response: failed
12,507,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,774 >>> mbox cmd response: failed
Initializing fuses
2,057,485 writing to cptra_bootfsm_go
2,246,857 UART:
2,247,205 UART: Running Caliptra ROM ...
2,248,349 UART:
2,248,520 UART: [state] CFI Enabled
2,321,457 UART: [state] LifecycleState = Unprovisioned
2,323,855 UART: [state] DebugLocked = No
2,326,008 UART: [state] WD Timer not started. Device not locked for debugging
2,329,997 UART: [kat] SHA2-256
2,519,850 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,650 UART: [kat] ++
2,531,113 UART: [kat] sha1
2,543,513 UART: [kat] SHA2-256
2,546,528 UART: [kat] SHA2-384
2,553,008 UART: [kat] SHA2-512-ACC
2,555,583 UART: [kat] ECC-384
5,006,709 UART: [kat] HMAC-384Kdf
5,029,800 UART: [kat] LMS
5,561,562 UART: [kat] --
5,566,261 UART: [cold-reset] ++
5,567,172 UART: [fht] FHT @ 0x50003400
5,578,586 UART: [idev] ++
5,579,281 UART: [idev] CDI.KEYID = 6
5,580,303 UART: [idev] SUBJECT.KEYID = 7
5,581,464 UART: [idev] UDS.KEYID = 0
5,583,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,727,393 UART: [idev] Erasing UDS.KEYID = 0
8,082,312 UART: [idev] Sha1 KeyId Algorithm
8,103,817 UART: [idev] --
8,108,003 UART: [ldev] ++
8,108,585 UART: [ldev] CDI.KEYID = 6
8,109,475 UART: [ldev] SUBJECT.KEYID = 5
8,110,579 UART: [ldev] AUTHORITY.KEYID = 7
8,111,865 UART: [ldev] FE.KEYID = 1
8,157,162 UART: [ldev] Erasing FE.KEYID = 1
10,664,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,798 UART: [ldev] --
12,469,634 UART: [fwproc] Wait for Commands...
12,472,485 UART: [fwproc] Recv command 0x46574c44
12,474,801 UART: [fwproc] Recv'd Img size: 114168 bytes
15,917,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,145 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,106,288 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,648,103 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,440,229 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,301,550 >>> mbox cmd response: failed
12,302,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,416 >>> mbox cmd response: failed
12,302,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,981 >>> mbox cmd response: failed
Initializing fuses
2,056,003 writing to cptra_bootfsm_go
5,492,958 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,814,336 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,574 UART:
193,116 UART: Running Caliptra ROM ...
194,276 UART:
603,738 UART: [state] CFI Enabled
617,894 UART: [state] LifecycleState = Unprovisioned
620,226 UART: [state] DebugLocked = No
623,226 UART: [state] WD Timer not started. Device not locked for debugging
628,116 UART: [kat] SHA2-256
817,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,820 UART: [kat] ++
829,325 UART: [kat] sha1
841,125 UART: [kat] SHA2-256
844,133 UART: [kat] SHA2-384
851,359 UART: [kat] SHA2-512-ACC
853,918 UART: [kat] ECC-384
3,297,778 UART: [kat] HMAC-384Kdf
3,311,048 UART: [kat] LMS
3,842,883 UART: [kat] --
3,846,567 UART: [cold-reset] ++
3,848,608 UART: [fht] FHT @ 0x50003400
3,860,832 UART: [idev] ++
3,861,507 UART: [idev] CDI.KEYID = 6
3,862,494 UART: [idev] SUBJECT.KEYID = 7
3,863,711 UART: [idev] UDS.KEYID = 0
3,866,131 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,009,813 UART: [idev] Erasing UDS.KEYID = 0
6,338,562 UART: [idev] Sha1 KeyId Algorithm
6,361,854 UART: [idev] --
6,366,907 UART: [ldev] ++
6,367,593 UART: [ldev] CDI.KEYID = 6
6,368,503 UART: [ldev] SUBJECT.KEYID = 5
6,369,665 UART: [ldev] AUTHORITY.KEYID = 7
6,370,897 UART: [ldev] FE.KEYID = 1
6,381,294 UART: [ldev] Erasing FE.KEYID = 1
8,858,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,870 UART: [ldev] --
10,650,869 UART: [fwproc] Wait for Commands...
10,653,019 UART: [fwproc] Recv command 0x46574c44
10,655,290 UART: [fwproc] Recv'd Img size: 114168 bytes
12,732,505 UART: ROM Fatal Error: 0x000B003B
12,736,162 >>> mbox cmd response: failed
12,736,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,928 >>> mbox cmd response: failed
12,737,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,485 >>> mbox cmd response: failed
Initializing fuses
2,055,680 writing to cptra_bootfsm_go
2,245,009 UART:
2,245,355 UART: Running Caliptra ROM ...
2,246,496 UART:
7,713,895 UART: [state] CFI Enabled
7,726,220 UART: [state] LifecycleState = Unprovisioned
7,728,574 UART: [state] DebugLocked = No
7,730,775 UART: [state] WD Timer not started. Device not locked for debugging
7,735,405 UART: [kat] SHA2-256
7,925,316 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,936,095 UART: [kat] ++
7,936,618 UART: [kat] sha1
7,948,373 UART: [kat] SHA2-256
7,951,418 UART: [kat] SHA2-384
7,958,060 UART: [kat] SHA2-512-ACC
7,960,637 UART: [kat] ECC-384
10,401,403 UART: [kat] HMAC-384Kdf
10,414,708 UART: [kat] LMS
10,946,521 UART: [kat] --
10,950,356 UART: [cold-reset] ++
10,952,503 UART: [fht] FHT @ 0x50003400
10,964,457 UART: [idev] ++
10,965,140 UART: [idev] CDI.KEYID = 6
10,966,156 UART: [idev] SUBJECT.KEYID = 7
10,967,259 UART: [idev] UDS.KEYID = 0
10,969,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,113,127 UART: [idev] Erasing UDS.KEYID = 0
13,449,600 UART: [idev] Sha1 KeyId Algorithm
13,471,885 UART: [idev] --
13,476,604 UART: [ldev] ++
13,477,286 UART: [ldev] CDI.KEYID = 6
13,478,171 UART: [ldev] SUBJECT.KEYID = 5
13,479,387 UART: [ldev] AUTHORITY.KEYID = 7
13,480,616 UART: [ldev] FE.KEYID = 1
13,493,585 UART: [ldev] Erasing FE.KEYID = 1
15,973,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,694,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,710,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,725,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,740,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,761,058 UART: [ldev] --
17,766,767 UART: [fwproc] Wait for Commands...
17,769,242 UART: [fwproc] Recv command 0x46574c44
17,771,551 UART: [fwproc] Recv'd Img size: 114168 bytes
21,221,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,297,401 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,413,530 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,954,280 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
3,758,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,515,137 >>> mbox cmd response: failed
12,515,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,984 >>> mbox cmd response: failed
12,516,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,550 >>> mbox cmd response: failed
Initializing fuses
2,058,855 writing to cptra_bootfsm_go
11,098,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,301,190 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,535 UART: [kat] SHA2-256
892,473 UART: [kat] SHA2-384
895,106 UART: [kat] SHA2-512-ACC
897,007 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,435 UART: [cold-reset] ++
1,476,875 UART: [fht] Storing FHT @ 0x50003400
1,479,642 UART: [idev] ++
1,479,810 UART: [idev] CDI.KEYID = 6
1,480,170 UART: [idev] SUBJECT.KEYID = 7
1,480,594 UART: [idev] UDS.KEYID = 0
1,480,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,614 UART: [idev] Erasing UDS.KEYID = 0
1,505,072 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,520,849 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,028 UART: [ldev] --
1,585,455 UART: [fwproc] Waiting for Commands...
1,586,216 UART: [fwproc] Received command 0x46574c44
1,587,007 UART: [fwproc] Received Image of size 114168 bytes
1,634,650 UART: ROM Fatal Error: 0x000B003B
1,635,809 >>> mbox cmd response: failed
1,635,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,815 >>> mbox cmd response: failed
1,635,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,169 UART: [kat] SHA2-256
892,107 UART: [kat] SHA2-384
894,932 UART: [kat] SHA2-512-ACC
896,833 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
906,936 UART: [kat] LMS
1,475,132 UART: [kat] --
1,475,971 UART: [cold-reset] ++
1,476,419 UART: [fht] Storing FHT @ 0x50003400
1,479,174 UART: [idev] ++
1,479,342 UART: [idev] CDI.KEYID = 6
1,479,702 UART: [idev] SUBJECT.KEYID = 7
1,480,126 UART: [idev] UDS.KEYID = 0
1,480,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,560 UART: [idev] Erasing UDS.KEYID = 0
1,505,064 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,860 UART: [idev] --
1,514,901 UART: [ldev] ++
1,515,069 UART: [ldev] CDI.KEYID = 6
1,515,432 UART: [ldev] SUBJECT.KEYID = 5
1,515,858 UART: [ldev] AUTHORITY.KEYID = 7
1,516,321 UART: [ldev] FE.KEYID = 1
1,521,407 UART: [ldev] Erasing FE.KEYID = 1
1,546,650 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,832 UART: [ldev] --
1,586,317 UART: [fwproc] Waiting for Commands...
1,587,130 UART: [fwproc] Received command 0x46574c44
1,587,921 UART: [fwproc] Received Image of size 114168 bytes
2,883,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,286 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,243 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,998 >>> mbox cmd response: failed
1,489,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,004 >>> mbox cmd response: failed
1,490,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,293 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,891 UART: [state] LifecycleState = Unprovisioned
85,546 UART: [state] DebugLocked = No
86,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,640 UART: [kat] SHA2-256
881,571 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,686 UART: [kat] ++
885,838 UART: [kat] sha1
890,014 UART: [kat] SHA2-256
891,952 UART: [kat] SHA2-384
894,609 UART: [kat] SHA2-512-ACC
896,510 UART: [kat] ECC-384
902,243 UART: [kat] HMAC-384Kdf
906,889 UART: [kat] LMS
1,475,085 UART: [kat] --
1,475,646 UART: [cold-reset] ++
1,476,132 UART: [fht] Storing FHT @ 0x50003400
1,478,901 UART: [idev] ++
1,479,069 UART: [idev] CDI.KEYID = 6
1,479,429 UART: [idev] SUBJECT.KEYID = 7
1,479,853 UART: [idev] UDS.KEYID = 0
1,480,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,997 UART: [idev] Erasing UDS.KEYID = 0
1,504,993 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,489 UART: [idev] --
1,514,426 UART: [ldev] ++
1,514,594 UART: [ldev] CDI.KEYID = 6
1,514,957 UART: [ldev] SUBJECT.KEYID = 5
1,515,383 UART: [ldev] AUTHORITY.KEYID = 7
1,515,846 UART: [ldev] FE.KEYID = 1
1,520,904 UART: [ldev] Erasing FE.KEYID = 1
1,546,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,529 UART: [ldev] --
1,585,964 UART: [fwproc] Waiting for Commands...
1,586,677 UART: [fwproc] Received command 0x46574c44
1,587,468 UART: [fwproc] Received Image of size 114168 bytes
1,635,645 UART: ROM Fatal Error: 0x000B003B
1,636,804 >>> mbox cmd response: failed
1,636,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,810 >>> mbox cmd response: failed
1,636,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Unprovisioned
86,584 UART: [state] DebugLocked = No
87,238 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,774 UART: [kat] SHA2-256
882,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,820 UART: [kat] ++
886,972 UART: [kat] sha1
891,368 UART: [kat] SHA2-256
893,306 UART: [kat] SHA2-384
895,837 UART: [kat] SHA2-512-ACC
897,738 UART: [kat] ECC-384
903,435 UART: [kat] HMAC-384Kdf
908,007 UART: [kat] LMS
1,476,203 UART: [kat] --
1,477,054 UART: [cold-reset] ++
1,477,424 UART: [fht] Storing FHT @ 0x50003400
1,480,321 UART: [idev] ++
1,480,489 UART: [idev] CDI.KEYID = 6
1,480,849 UART: [idev] SUBJECT.KEYID = 7
1,481,273 UART: [idev] UDS.KEYID = 0
1,481,618 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,015 UART: [idev] Erasing UDS.KEYID = 0
1,505,465 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,081 UART: [idev] --
1,515,308 UART: [ldev] ++
1,515,476 UART: [ldev] CDI.KEYID = 6
1,515,839 UART: [ldev] SUBJECT.KEYID = 5
1,516,265 UART: [ldev] AUTHORITY.KEYID = 7
1,516,728 UART: [ldev] FE.KEYID = 1
1,521,728 UART: [ldev] Erasing FE.KEYID = 1
1,547,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,939 UART: [ldev] --
1,586,212 UART: [fwproc] Waiting for Commands...
1,586,847 UART: [fwproc] Received command 0x46574c44
1,587,638 UART: [fwproc] Received Image of size 114168 bytes
2,883,407 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,353 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,198 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,579 >>> mbox cmd response: failed
1,488,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,585 >>> mbox cmd response: failed
1,488,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,886 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,704 UART: [kat] SHA2-512-ACC
908,605 UART: [kat] ECC-384
918,222 UART: [kat] HMAC-384Kdf
922,820 UART: [kat] LMS
1,171,148 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,399 UART: [fht] FHT @ 0x50003400
1,175,142 UART: [idev] ++
1,175,310 UART: [idev] CDI.KEYID = 6
1,175,670 UART: [idev] SUBJECT.KEYID = 7
1,176,094 UART: [idev] UDS.KEYID = 0
1,176,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,186 UART: [idev] Erasing UDS.KEYID = 0
1,201,041 UART: [idev] Sha1 KeyId Algorithm
1,209,289 UART: [idev] --
1,210,333 UART: [ldev] ++
1,210,501 UART: [ldev] CDI.KEYID = 6
1,210,864 UART: [ldev] SUBJECT.KEYID = 5
1,211,290 UART: [ldev] AUTHORITY.KEYID = 7
1,211,753 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,541 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,736 UART: [fwproc] Recv command 0x46574c44
1,283,464 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,313 UART: ROM Fatal Error: 0x000B003B
1,331,472 >>> mbox cmd response: failed
1,331,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,478 >>> mbox cmd response: failed
1,331,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
893,240 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,365 UART: [kat] ++
897,517 UART: [kat] sha1
901,833 UART: [kat] SHA2-256
903,773 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
918,202 UART: [kat] HMAC-384Kdf
922,786 UART: [kat] LMS
1,171,114 UART: [kat] --
1,171,753 UART: [cold-reset] ++
1,172,251 UART: [fht] FHT @ 0x50003400
1,175,034 UART: [idev] ++
1,175,202 UART: [idev] CDI.KEYID = 6
1,175,562 UART: [idev] SUBJECT.KEYID = 7
1,175,986 UART: [idev] UDS.KEYID = 0
1,176,331 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,792 UART: [idev] Erasing UDS.KEYID = 0
1,200,809 UART: [idev] Sha1 KeyId Algorithm
1,209,291 UART: [idev] --
1,210,573 UART: [ldev] ++
1,210,741 UART: [ldev] CDI.KEYID = 6
1,211,104 UART: [ldev] SUBJECT.KEYID = 5
1,211,530 UART: [ldev] AUTHORITY.KEYID = 7
1,211,993 UART: [ldev] FE.KEYID = 1
1,217,227 UART: [ldev] Erasing FE.KEYID = 1
1,243,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,171 UART: [ldev] --
1,282,466 UART: [fwproc] Wait for Commands...
1,283,272 UART: [fwproc] Recv command 0x46574c44
1,284,000 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,024 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,013 >>> mbox cmd response: failed
1,187,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,019 >>> mbox cmd response: failed
1,187,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,360 UART: [kat] SHA2-256
904,300 UART: [kat] SHA2-384
907,095 UART: [kat] SHA2-512-ACC
908,996 UART: [kat] ECC-384
918,785 UART: [kat] HMAC-384Kdf
923,363 UART: [kat] LMS
1,171,691 UART: [kat] --
1,172,714 UART: [cold-reset] ++
1,173,202 UART: [fht] FHT @ 0x50003400
1,175,741 UART: [idev] ++
1,175,909 UART: [idev] CDI.KEYID = 6
1,176,269 UART: [idev] SUBJECT.KEYID = 7
1,176,693 UART: [idev] UDS.KEYID = 0
1,177,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,009 UART: [idev] Erasing UDS.KEYID = 0
1,202,152 UART: [idev] Sha1 KeyId Algorithm
1,210,708 UART: [idev] --
1,211,744 UART: [ldev] ++
1,211,912 UART: [ldev] CDI.KEYID = 6
1,212,275 UART: [ldev] SUBJECT.KEYID = 5
1,212,701 UART: [ldev] AUTHORITY.KEYID = 7
1,213,164 UART: [ldev] FE.KEYID = 1
1,218,424 UART: [ldev] Erasing FE.KEYID = 1
1,244,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,386 UART: [ldev] --
1,283,675 UART: [fwproc] Wait for Commands...
1,284,315 UART: [fwproc] Recv command 0x46574c44
1,285,043 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,776 UART: ROM Fatal Error: 0x000B003B
1,332,935 >>> mbox cmd response: failed
1,332,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,941 >>> mbox cmd response: failed
1,332,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
893,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,324 UART: [kat] ++
897,476 UART: [kat] sha1
901,582 UART: [kat] SHA2-256
903,522 UART: [kat] SHA2-384
906,249 UART: [kat] SHA2-512-ACC
908,150 UART: [kat] ECC-384
917,783 UART: [kat] HMAC-384Kdf
922,559 UART: [kat] LMS
1,170,887 UART: [kat] --
1,171,890 UART: [cold-reset] ++
1,172,364 UART: [fht] FHT @ 0x50003400
1,175,071 UART: [idev] ++
1,175,239 UART: [idev] CDI.KEYID = 6
1,175,599 UART: [idev] SUBJECT.KEYID = 7
1,176,023 UART: [idev] UDS.KEYID = 0
1,176,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,359 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,942 UART: [idev] --
1,211,072 UART: [ldev] ++
1,211,240 UART: [ldev] CDI.KEYID = 6
1,211,603 UART: [ldev] SUBJECT.KEYID = 5
1,212,029 UART: [ldev] AUTHORITY.KEYID = 7
1,212,492 UART: [ldev] FE.KEYID = 1
1,217,816 UART: [ldev] Erasing FE.KEYID = 1
1,244,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,136 UART: [ldev] --
1,283,527 UART: [fwproc] Wait for Commands...
1,284,221 UART: [fwproc] Recv command 0x46574c44
1,284,949 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,933 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,189,024 >>> mbox cmd response: failed
1,189,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,030 >>> mbox cmd response: failed
1,189,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,176 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,340 UART: [kat] SHA2-512-ACC
906,241 UART: [kat] ECC-384
915,854 UART: [kat] HMAC-384Kdf
920,384 UART: [kat] LMS
1,168,696 UART: [kat] --
1,169,521 UART: [cold-reset] ++
1,169,951 UART: [fht] FHT @ 0x50003400
1,172,379 UART: [idev] ++
1,172,547 UART: [idev] CDI.KEYID = 6
1,172,908 UART: [idev] SUBJECT.KEYID = 7
1,173,333 UART: [idev] UDS.KEYID = 0
1,173,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,109 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,463 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,214,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,778 UART: [ldev] --
1,281,258 UART: [fwproc] Wait for Commands...
1,281,863 UART: [fwproc] Recv command 0x46574c44
1,282,596 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,690 UART: ROM Fatal Error: 0x000B003B
1,329,849 >>> mbox cmd response: failed
1,329,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,855 >>> mbox cmd response: failed
1,329,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
891,130 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,593 UART: [kat] SHA2-256
901,533 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,241 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
1,174,079 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,237 UART: [idev] Erasing UDS.KEYID = 0
1,198,371 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,150 UART: [ldev] ++
1,208,318 UART: [ldev] CDI.KEYID = 6
1,208,682 UART: [ldev] SUBJECT.KEYID = 5
1,209,109 UART: [ldev] AUTHORITY.KEYID = 7
1,209,572 UART: [ldev] FE.KEYID = 1
1,214,548 UART: [ldev] Erasing FE.KEYID = 1
1,240,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,796 UART: [ldev] --
1,280,208 UART: [fwproc] Wait for Commands...
1,280,985 UART: [fwproc] Recv command 0x46574c44
1,281,718 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,614 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,766 >>> mbox cmd response: failed
1,182,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,772 >>> mbox cmd response: failed
1,182,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,646 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,489 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,056 UART: [idev] ++
1,173,224 UART: [idev] CDI.KEYID = 6
1,173,585 UART: [idev] SUBJECT.KEYID = 7
1,174,010 UART: [idev] UDS.KEYID = 0
1,174,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,210 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,780 UART: [idev] --
1,208,655 UART: [ldev] ++
1,208,823 UART: [ldev] CDI.KEYID = 6
1,209,187 UART: [ldev] SUBJECT.KEYID = 5
1,209,614 UART: [ldev] AUTHORITY.KEYID = 7
1,210,077 UART: [ldev] FE.KEYID = 1
1,215,241 UART: [ldev] Erasing FE.KEYID = 1
1,242,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,023 UART: [ldev] --
1,281,351 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,799 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,951 UART: ROM Fatal Error: 0x000B003B
1,332,110 >>> mbox cmd response: failed
1,332,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,116 >>> mbox cmd response: failed
1,332,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
86,966 UART: [state] WD Timer not started. Device not locked for debugging
88,293 UART: [kat] SHA2-256
891,843 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,972 UART: [kat] ++
896,124 UART: [kat] sha1
900,300 UART: [kat] SHA2-256
902,240 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,689 UART: [kat] LMS
1,169,001 UART: [kat] --
1,169,954 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,174,148 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,946 UART: [idev] Erasing UDS.KEYID = 0
1,199,322 UART: [idev] Sha1 KeyId Algorithm
1,208,260 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,241,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,749 UART: [ldev] --
1,281,029 UART: [fwproc] Wait for Commands...
1,281,838 UART: [fwproc] Recv command 0x46574c44
1,282,571 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,264 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,573 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,261 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,327 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,877 >>> mbox cmd response: failed
1,181,877 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,883 >>> mbox cmd response: failed
1,181,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,181 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,037 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,199 UART:
192,568 UART: Running Caliptra ROM ...
193,667 UART:
193,814 UART: [state] CFI Enabled
263,002 UART: [state] LifecycleState = Manufacturing
264,922 UART: [state] DebugLocked = No
267,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,965 UART: [kat] SHA2-256
441,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,163 UART: [kat] ++
452,668 UART: [kat] sha1
462,411 UART: [kat] SHA2-256
465,148 UART: [kat] SHA2-384
470,856 UART: [kat] SHA2-512-ACC
473,193 UART: [kat] ECC-384
2,767,474 UART: [kat] HMAC-384Kdf
2,798,188 UART: [kat] LMS
3,988,511 UART: [kat] --
3,992,255 UART: [cold-reset] ++
3,993,490 UART: [fht] Storing FHT @ 0x50003400
4,005,133 UART: [idev] ++
4,005,745 UART: [idev] CDI.KEYID = 6
4,006,671 UART: [idev] SUBJECT.KEYID = 7
4,007,910 UART: [idev] UDS.KEYID = 0
4,010,935 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,219 UART: [idev] Erasing UDS.KEYID = 0
7,343,603 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,352 UART: [idev] --
7,369,698 UART: [ldev] ++
7,370,274 UART: [ldev] CDI.KEYID = 6
7,371,219 UART: [ldev] SUBJECT.KEYID = 5
7,372,442 UART: [ldev] AUTHORITY.KEYID = 7
7,373,675 UART: [ldev] FE.KEYID = 1
7,420,873 UART: [ldev] Erasing FE.KEYID = 1
10,751,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,369 UART: [ldev] --
13,113,991 UART: [fwproc] Waiting for Commands...
13,115,983 UART: [fwproc] Received command 0x46574c44
13,118,173 UART: [fwproc] Received Image of size 113844 bytes
16,083,589 UART: ROM Fatal Error: 0x000B0025
16,086,969 >>> mbox cmd response: failed
16,087,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,087,700 >>> mbox cmd response: failed
16,087,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,088,305 >>> mbox cmd response: failed
Initializing fuses
2,048,413 writing to cptra_bootfsm_go
2,237,719 UART:
2,238,084 UART: Running Caliptra ROM ...
2,239,140 UART:
2,239,295 UART: [state] CFI Enabled
2,308,870 UART: [state] LifecycleState = Manufacturing
2,310,771 UART: [state] DebugLocked = No
2,313,236 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,080 UART: [kat] SHA2-256
2,487,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,274 UART: [kat] ++
2,498,772 UART: [kat] sha1
2,509,288 UART: [kat] SHA2-256
2,511,987 UART: [kat] SHA2-384
2,518,084 UART: [kat] SHA2-512-ACC
2,520,436 UART: [kat] ECC-384
4,810,488 UART: [kat] HMAC-384Kdf
4,842,705 UART: [kat] LMS
6,032,991 UART: [kat] --
6,037,926 UART: [cold-reset] ++
6,040,245 UART: [fht] Storing FHT @ 0x50003400
6,050,266 UART: [idev] ++
6,050,895 UART: [idev] CDI.KEYID = 6
6,051,808 UART: [idev] SUBJECT.KEYID = 7
6,053,025 UART: [idev] UDS.KEYID = 0
6,055,685 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,199,111 UART: [idev] Erasing UDS.KEYID = 0
9,386,694 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,972 UART: [idev] --
9,412,457 UART: [ldev] ++
9,413,028 UART: [ldev] CDI.KEYID = 6
9,413,999 UART: [ldev] SUBJECT.KEYID = 5
9,415,205 UART: [ldev] AUTHORITY.KEYID = 7
9,416,441 UART: [ldev] FE.KEYID = 1
9,444,311 UART: [ldev] Erasing FE.KEYID = 1
12,774,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,070,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,085,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,100,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,114,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,134,674 UART: [ldev] --
15,140,003 UART: [fwproc] Waiting for Commands...
15,141,678 UART: [fwproc] Received command 0x46574c44
15,143,919 UART: [fwproc] Received Image of size 113844 bytes
19,222,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,297,352 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,366,269 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,682,298 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,788,018 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,862,705 >>> mbox cmd response: failed
15,863,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,863,722 >>> mbox cmd response: failed
15,863,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,864,281 >>> mbox cmd response: failed
Initializing fuses
2,047,148 writing to cptra_bootfsm_go
5,836,813 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,930,925 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,393 UART:
192,759 UART: Running Caliptra ROM ...
193,883 UART:
603,506 UART: [state] CFI Enabled
616,975 UART: [state] LifecycleState = Manufacturing
618,890 UART: [state] DebugLocked = No
620,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,625 UART: [kat] SHA2-256
795,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,954 UART: [kat] ++
806,396 UART: [kat] sha1
818,839 UART: [kat] SHA2-256
821,555 UART: [kat] SHA2-384
828,458 UART: [kat] SHA2-512-ACC
830,858 UART: [kat] ECC-384
3,114,550 UART: [kat] HMAC-384Kdf
3,126,781 UART: [kat] LMS
4,316,905 UART: [kat] --
4,322,839 UART: [cold-reset] ++
4,324,388 UART: [fht] Storing FHT @ 0x50003400
4,335,973 UART: [idev] ++
4,336,597 UART: [idev] CDI.KEYID = 6
4,337,479 UART: [idev] SUBJECT.KEYID = 7
4,338,970 UART: [idev] UDS.KEYID = 0
4,341,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,725 UART: [idev] Erasing UDS.KEYID = 0
7,627,515 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,864 UART: [idev] --
7,653,307 UART: [ldev] ++
7,653,885 UART: [ldev] CDI.KEYID = 6
7,654,800 UART: [ldev] SUBJECT.KEYID = 5
7,656,017 UART: [ldev] AUTHORITY.KEYID = 7
7,657,311 UART: [ldev] FE.KEYID = 1
7,668,931 UART: [ldev] Erasing FE.KEYID = 1
10,957,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,785 UART: [ldev] --
13,320,276 UART: [fwproc] Waiting for Commands...
13,323,043 UART: [fwproc] Received command 0x46574c44
13,325,233 UART: [fwproc] Received Image of size 113844 bytes
16,299,395 UART: ROM Fatal Error: 0x000B0025
16,302,787 >>> mbox cmd response: failed
16,303,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,303,539 >>> mbox cmd response: failed
16,303,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,304,103 >>> mbox cmd response: failed
Initializing fuses
2,061,494 writing to cptra_bootfsm_go
2,250,846 UART:
2,251,196 UART: Running Caliptra ROM ...
2,252,339 UART:
4,165,047 UART: [state] CFI Enabled
4,181,782 UART: [state] LifecycleState = Manufacturing
4,183,742 UART: [state] DebugLocked = No
4,186,103 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,191,165 UART: [kat] SHA2-256
4,360,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,371,437 UART: [kat] ++
4,371,893 UART: [kat] sha1
4,381,696 UART: [kat] SHA2-256
4,384,383 UART: [kat] SHA2-384
4,389,992 UART: [kat] SHA2-512-ACC
4,392,394 UART: [kat] ECC-384
6,676,252 UART: [kat] HMAC-384Kdf
6,688,971 UART: [kat] LMS
7,879,072 UART: [kat] --
7,881,685 UART: [cold-reset] ++
7,882,888 UART: [fht] Storing FHT @ 0x50003400
7,895,344 UART: [idev] ++
7,895,914 UART: [idev] CDI.KEYID = 6
7,896,928 UART: [idev] SUBJECT.KEYID = 7
7,898,138 UART: [idev] UDS.KEYID = 0
7,900,714 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,043,860 UART: [idev] Erasing UDS.KEYID = 0
11,188,466 UART: [idev] Using Sha1 for KeyId Algorithm
11,210,817 UART: [idev] --
11,214,325 UART: [ldev] ++
11,214,893 UART: [ldev] CDI.KEYID = 6
11,215,911 UART: [ldev] SUBJECT.KEYID = 5
11,217,109 UART: [ldev] AUTHORITY.KEYID = 7
11,218,343 UART: [ldev] FE.KEYID = 1
11,228,936 UART: [ldev] Erasing FE.KEYID = 1
14,517,588 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,811,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,825,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,840,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,855,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,875,114 UART: [ldev] --
16,879,512 UART: [fwproc] Waiting for Commands...
16,882,852 UART: [fwproc] Received command 0x46574c44
16,885,043 UART: [fwproc] Received Image of size 113844 bytes
20,970,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,049,446 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,118,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,435,286 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,130,214 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,075,945 >>> mbox cmd response: failed
16,076,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,076,839 >>> mbox cmd response: failed
16,077,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,077,455 >>> mbox cmd response: failed
Initializing fuses
2,049,734 writing to cptra_bootfsm_go
7,918,478 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,892,334 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,053 UART:
192,424 UART: Running Caliptra ROM ...
193,615 UART:
193,769 UART: [state] CFI Enabled
263,482 UART: [state] LifecycleState = Manufacturing
265,397 UART: [state] DebugLocked = No
268,241 UART: [state] WD Timer not started. Device not locked for debugging
271,974 UART: [kat] SHA2-256
451,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,677 UART: [kat] ++
463,212 UART: [kat] sha1
473,234 UART: [kat] SHA2-256
476,288 UART: [kat] SHA2-384
482,046 UART: [kat] SHA2-512-ACC
485,048 UART: [kat] ECC-384
2,947,911 UART: [kat] HMAC-384Kdf
2,969,652 UART: [kat] LMS
3,499,132 UART: [kat] --
3,504,553 UART: [cold-reset] ++
3,507,029 UART: [fht] FHT @ 0x50003400
3,517,763 UART: [idev] ++
3,518,329 UART: [idev] CDI.KEYID = 6
3,519,213 UART: [idev] SUBJECT.KEYID = 7
3,520,425 UART: [idev] UDS.KEYID = 0
3,523,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,975 UART: [idev] Erasing UDS.KEYID = 0
6,022,382 UART: [idev] Sha1 KeyId Algorithm
6,046,336 UART: [idev] --
6,050,612 UART: [ldev] ++
6,051,189 UART: [ldev] CDI.KEYID = 6
6,052,107 UART: [ldev] SUBJECT.KEYID = 5
6,053,273 UART: [ldev] AUTHORITY.KEYID = 7
6,054,504 UART: [ldev] FE.KEYID = 1
6,098,734 UART: [ldev] Erasing FE.KEYID = 1
8,602,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,340 UART: [ldev] --
10,411,295 UART: [fwproc] Wait for Commands...
10,414,483 UART: [fwproc] Recv command 0x46574c44
10,416,528 UART: [fwproc] Recv'd Img size: 114168 bytes
12,738,579 UART: ROM Fatal Error: 0x000B0025
12,741,695 >>> mbox cmd response: failed
12,742,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,488 >>> mbox cmd response: failed
12,742,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,743,090 >>> mbox cmd response: failed
Initializing fuses
2,048,307 writing to cptra_bootfsm_go
2,237,697 UART:
2,238,043 UART: Running Caliptra ROM ...
2,239,180 UART:
2,239,349 UART: [state] CFI Enabled
2,303,484 UART: [state] LifecycleState = Manufacturing
2,305,367 UART: [state] DebugLocked = No
2,308,162 UART: [state] WD Timer not started. Device not locked for debugging
2,312,667 UART: [kat] SHA2-256
2,491,805 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,370 UART: [kat] ++
2,503,912 UART: [kat] sha1
2,514,917 UART: [kat] SHA2-256
2,517,928 UART: [kat] SHA2-384
2,522,947 UART: [kat] SHA2-512-ACC
2,525,911 UART: [kat] ECC-384
4,985,710 UART: [kat] HMAC-384Kdf
5,007,610 UART: [kat] LMS
5,537,106 UART: [kat] --
5,539,948 UART: [cold-reset] ++
5,542,378 UART: [fht] FHT @ 0x50003400
5,551,798 UART: [idev] ++
5,552,372 UART: [idev] CDI.KEYID = 6
5,553,295 UART: [idev] SUBJECT.KEYID = 7
5,554,458 UART: [idev] UDS.KEYID = 0
5,557,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,700,848 UART: [idev] Erasing UDS.KEYID = 0
8,061,484 UART: [idev] Sha1 KeyId Algorithm
8,084,283 UART: [idev] --
8,088,176 UART: [ldev] ++
8,088,753 UART: [ldev] CDI.KEYID = 6
8,089,691 UART: [ldev] SUBJECT.KEYID = 5
8,090,858 UART: [ldev] AUTHORITY.KEYID = 7
8,092,091 UART: [ldev] FE.KEYID = 1
8,136,659 UART: [ldev] Erasing FE.KEYID = 1
10,639,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,374,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,390,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,406,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,422,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,382 UART: [ldev] --
12,446,295 UART: [fwproc] Wait for Commands...
12,448,505 UART: [fwproc] Recv command 0x46574c44
12,450,606 UART: [fwproc] Recv'd Img size: 114168 bytes
15,882,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,955,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,023,931 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,341,122 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,383,259 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,530,669 >>> mbox cmd response: failed
12,531,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,531,673 >>> mbox cmd response: failed
12,531,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,532,237 >>> mbox cmd response: failed
Initializing fuses
2,045,017 writing to cptra_bootfsm_go
5,397,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,110,368 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,470 UART:
192,834 UART: Running Caliptra ROM ...
193,933 UART:
603,684 UART: [state] CFI Enabled
618,891 UART: [state] LifecycleState = Manufacturing
620,775 UART: [state] DebugLocked = No
622,067 UART: [state] WD Timer not started. Device not locked for debugging
625,572 UART: [kat] SHA2-256
804,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,260 UART: [kat] ++
816,789 UART: [kat] sha1
827,621 UART: [kat] SHA2-256
830,661 UART: [kat] SHA2-384
836,101 UART: [kat] SHA2-512-ACC
839,100 UART: [kat] ECC-384
3,279,302 UART: [kat] HMAC-384Kdf
3,293,213 UART: [kat] LMS
3,822,690 UART: [kat] --
3,824,787 UART: [cold-reset] ++
3,826,403 UART: [fht] FHT @ 0x50003400
3,839,088 UART: [idev] ++
3,839,659 UART: [idev] CDI.KEYID = 6
3,840,678 UART: [idev] SUBJECT.KEYID = 7
3,841,781 UART: [idev] UDS.KEYID = 0
3,844,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,509 UART: [idev] Erasing UDS.KEYID = 0
6,312,932 UART: [idev] Sha1 KeyId Algorithm
6,336,475 UART: [idev] --
6,341,495 UART: [ldev] ++
6,342,063 UART: [ldev] CDI.KEYID = 6
6,342,972 UART: [ldev] SUBJECT.KEYID = 5
6,344,207 UART: [ldev] AUTHORITY.KEYID = 7
6,345,438 UART: [ldev] FE.KEYID = 1
6,354,273 UART: [ldev] Erasing FE.KEYID = 1
8,827,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,486 UART: [ldev] --
10,618,161 UART: [fwproc] Wait for Commands...
10,620,960 UART: [fwproc] Recv command 0x46574c44
10,623,057 UART: [fwproc] Recv'd Img size: 114168 bytes
12,945,922 UART: ROM Fatal Error: 0x000B0025
12,949,038 >>> mbox cmd response: failed
12,949,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,949,812 >>> mbox cmd response: failed
12,950,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,950,433 >>> mbox cmd response: failed
Initializing fuses
2,049,539 writing to cptra_bootfsm_go
2,238,867 UART:
2,239,239 UART: Running Caliptra ROM ...
2,240,284 UART:
7,504,090 UART: [state] CFI Enabled
7,517,704 UART: [state] LifecycleState = Manufacturing
7,519,561 UART: [state] DebugLocked = No
7,521,487 UART: [state] WD Timer not started. Device not locked for debugging
7,524,470 UART: [kat] SHA2-256
7,703,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,715,134 UART: [kat] ++
7,715,596 UART: [kat] sha1
7,728,275 UART: [kat] SHA2-256
7,731,285 UART: [kat] SHA2-384
7,736,415 UART: [kat] SHA2-512-ACC
7,739,362 UART: [kat] ECC-384
10,181,836 UART: [kat] HMAC-384Kdf
10,194,485 UART: [kat] LMS
10,723,982 UART: [kat] --
10,728,506 UART: [cold-reset] ++
10,731,093 UART: [fht] FHT @ 0x50003400
10,742,987 UART: [idev] ++
10,743,549 UART: [idev] CDI.KEYID = 6
10,744,453 UART: [idev] SUBJECT.KEYID = 7
10,745,667 UART: [idev] UDS.KEYID = 0
10,748,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,891,992 UART: [idev] Erasing UDS.KEYID = 0
13,221,329 UART: [idev] Sha1 KeyId Algorithm
13,244,829 UART: [idev] --
13,250,150 UART: [ldev] ++
13,250,725 UART: [ldev] CDI.KEYID = 6
13,251,609 UART: [ldev] SUBJECT.KEYID = 5
13,252,822 UART: [ldev] AUTHORITY.KEYID = 7
13,254,051 UART: [ldev] FE.KEYID = 1
13,262,272 UART: [ldev] Erasing FE.KEYID = 1
15,731,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,448,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,464,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,480,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,496,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,516,426 UART: [ldev] --
17,520,984 UART: [fwproc] Wait for Commands...
17,523,326 UART: [fwproc] Recv command 0x46574c44
17,525,371 UART: [fwproc] Recv'd Img size: 114168 bytes
20,961,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,030,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,098,874 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,416,610 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,698,061 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,736,395 >>> mbox cmd response: failed
12,737,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,401 >>> mbox cmd response: failed
12,737,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,987 >>> mbox cmd response: failed
Initializing fuses
2,052,368 writing to cptra_bootfsm_go
10,821,310 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,440,767 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,374 UART:
192,750 UART: Running Caliptra ROM ...
193,854 UART:
193,997 UART: [state] CFI Enabled
262,275 UART: [state] LifecycleState = Manufacturing
264,713 UART: [state] DebugLocked = No
267,584 UART: [state] WD Timer not started. Device not locked for debugging
272,297 UART: [kat] SHA2-256
462,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,922 UART: [kat] ++
473,371 UART: [kat] sha1
484,358 UART: [kat] SHA2-256
487,371 UART: [kat] SHA2-384
493,292 UART: [kat] SHA2-512-ACC
495,871 UART: [kat] ECC-384
2,945,385 UART: [kat] HMAC-384Kdf
2,969,695 UART: [kat] LMS
3,501,499 UART: [kat] --
3,506,843 UART: [cold-reset] ++
3,508,880 UART: [fht] FHT @ 0x50003400
3,520,086 UART: [idev] ++
3,520,789 UART: [idev] CDI.KEYID = 6
3,521,761 UART: [idev] SUBJECT.KEYID = 7
3,522,980 UART: [idev] UDS.KEYID = 0
3,525,622 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,410 UART: [idev] Erasing UDS.KEYID = 0
6,026,920 UART: [idev] Sha1 KeyId Algorithm
6,051,037 UART: [idev] --
6,057,046 UART: [ldev] ++
6,057,733 UART: [ldev] CDI.KEYID = 6
6,058,623 UART: [ldev] SUBJECT.KEYID = 5
6,059,839 UART: [ldev] AUTHORITY.KEYID = 7
6,061,075 UART: [ldev] FE.KEYID = 1
6,098,773 UART: [ldev] Erasing FE.KEYID = 1
8,607,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,894 UART: [ldev] --
10,414,856 UART: [fwproc] Wait for Commands...
10,416,590 UART: [fwproc] Recv command 0x46574c44
10,418,861 UART: [fwproc] Recv'd Img size: 114168 bytes
12,784,986 UART: ROM Fatal Error: 0x000B0025
12,788,617 >>> mbox cmd response: failed
12,789,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,789,417 >>> mbox cmd response: failed
12,789,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,789,970 >>> mbox cmd response: failed
Initializing fuses
2,055,960 writing to cptra_bootfsm_go
2,245,282 UART:
2,245,629 UART: Running Caliptra ROM ...
2,246,680 UART:
2,246,829 UART: [state] CFI Enabled
2,320,361 UART: [state] LifecycleState = Manufacturing
2,322,742 UART: [state] DebugLocked = No
2,324,974 UART: [state] WD Timer not started. Device not locked for debugging
2,329,716 UART: [kat] SHA2-256
2,519,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,360 UART: [kat] ++
2,530,817 UART: [kat] sha1
2,541,978 UART: [kat] SHA2-256
2,545,008 UART: [kat] SHA2-384
2,550,416 UART: [kat] SHA2-512-ACC
2,553,047 UART: [kat] ECC-384
5,002,063 UART: [kat] HMAC-384Kdf
5,016,465 UART: [kat] LMS
5,548,252 UART: [kat] --
5,552,414 UART: [cold-reset] ++
5,554,407 UART: [fht] FHT @ 0x50003400
5,567,123 UART: [idev] ++
5,567,811 UART: [idev] CDI.KEYID = 6
5,568,830 UART: [idev] SUBJECT.KEYID = 7
5,569,995 UART: [idev] UDS.KEYID = 0
5,572,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,716,295 UART: [idev] Erasing UDS.KEYID = 0
8,074,953 UART: [idev] Sha1 KeyId Algorithm
8,096,522 UART: [idev] --
8,102,242 UART: [ldev] ++
8,102,927 UART: [ldev] CDI.KEYID = 6
8,103,823 UART: [ldev] SUBJECT.KEYID = 5
8,104,954 UART: [ldev] AUTHORITY.KEYID = 7
8,106,255 UART: [ldev] FE.KEYID = 1
8,145,943 UART: [ldev] Erasing FE.KEYID = 1
10,652,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,455 UART: [ldev] --
12,456,292 UART: [fwproc] Wait for Commands...
12,458,395 UART: [fwproc] Recv command 0x46574c44
12,460,662 UART: [fwproc] Recv'd Img size: 114168 bytes
15,939,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,017,334 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,133,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,675,616 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,443,786 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,702,226 >>> mbox cmd response: failed
12,702,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,152 >>> mbox cmd response: failed
12,703,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,770 >>> mbox cmd response: failed
Initializing fuses
2,051,676 writing to cptra_bootfsm_go
5,478,469 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,811,053 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,464 UART:
192,834 UART: Running Caliptra ROM ...
193,938 UART:
603,620 UART: [state] CFI Enabled
616,872 UART: [state] LifecycleState = Manufacturing
619,264 UART: [state] DebugLocked = No
620,811 UART: [state] WD Timer not started. Device not locked for debugging
625,912 UART: [kat] SHA2-256
815,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,607 UART: [kat] ++
827,114 UART: [kat] sha1
837,835 UART: [kat] SHA2-256
840,850 UART: [kat] SHA2-384
847,700 UART: [kat] SHA2-512-ACC
850,264 UART: [kat] ECC-384
3,288,903 UART: [kat] HMAC-384Kdf
3,300,514 UART: [kat] LMS
3,832,353 UART: [kat] --
3,836,073 UART: [cold-reset] ++
3,837,688 UART: [fht] FHT @ 0x50003400
3,849,644 UART: [idev] ++
3,850,399 UART: [idev] CDI.KEYID = 6
3,851,322 UART: [idev] SUBJECT.KEYID = 7
3,852,551 UART: [idev] UDS.KEYID = 0
3,855,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,999,124 UART: [idev] Erasing UDS.KEYID = 0
6,330,409 UART: [idev] Sha1 KeyId Algorithm
6,353,158 UART: [idev] --
6,357,295 UART: [ldev] ++
6,357,988 UART: [ldev] CDI.KEYID = 6
6,358,898 UART: [ldev] SUBJECT.KEYID = 5
6,360,060 UART: [ldev] AUTHORITY.KEYID = 7
6,361,296 UART: [ldev] FE.KEYID = 1
6,370,858 UART: [ldev] Erasing FE.KEYID = 1
8,852,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,654 UART: [ldev] --
10,645,890 UART: [fwproc] Wait for Commands...
10,648,804 UART: [fwproc] Recv command 0x46574c44
10,651,125 UART: [fwproc] Recv'd Img size: 114168 bytes
13,013,348 UART: ROM Fatal Error: 0x000B0025
13,017,027 >>> mbox cmd response: failed
13,017,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,017,782 >>> mbox cmd response: failed
13,018,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,018,343 >>> mbox cmd response: failed
Initializing fuses
2,056,129 writing to cptra_bootfsm_go
2,245,449 UART:
2,245,803 UART: Running Caliptra ROM ...
2,246,952 UART:
7,441,680 UART: [state] CFI Enabled
7,453,467 UART: [state] LifecycleState = Manufacturing
7,455,815 UART: [state] DebugLocked = No
7,457,606 UART: [state] WD Timer not started. Device not locked for debugging
7,461,476 UART: [kat] SHA2-256
7,651,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,662,155 UART: [kat] ++
7,662,671 UART: [kat] sha1
7,672,590 UART: [kat] SHA2-256
7,675,664 UART: [kat] SHA2-384
7,683,008 UART: [kat] SHA2-512-ACC
7,685,585 UART: [kat] ECC-384
10,126,697 UART: [kat] HMAC-384Kdf
10,140,229 UART: [kat] LMS
10,672,048 UART: [kat] --
10,676,408 UART: [cold-reset] ++
10,677,393 UART: [fht] FHT @ 0x50003400
10,689,137 UART: [idev] ++
10,689,867 UART: [idev] CDI.KEYID = 6
10,690,884 UART: [idev] SUBJECT.KEYID = 7
10,691,987 UART: [idev] UDS.KEYID = 0
10,694,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,838,440 UART: [idev] Erasing UDS.KEYID = 0
13,172,406 UART: [idev] Sha1 KeyId Algorithm
13,194,990 UART: [idev] --
13,200,339 UART: [ldev] ++
13,201,019 UART: [ldev] CDI.KEYID = 6
13,201,935 UART: [ldev] SUBJECT.KEYID = 5
13,203,117 UART: [ldev] AUTHORITY.KEYID = 7
13,204,349 UART: [ldev] FE.KEYID = 1
13,216,594 UART: [ldev] Erasing FE.KEYID = 1
15,694,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,414,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,429,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,444,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,459,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,481,739 UART: [ldev] --
17,487,769 UART: [fwproc] Wait for Commands...
17,489,607 UART: [fwproc] Recv command 0x46574c44
17,491,874 UART: [fwproc] Recv'd Img size: 114168 bytes
20,981,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,052,937 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,169,078 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,710,453 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,762,815 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,924,529 >>> mbox cmd response: failed
12,925,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,925,807 >>> mbox cmd response: failed
12,926,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,397 >>> mbox cmd response: failed
Initializing fuses
2,047,922 writing to cptra_bootfsm_go
10,698,644 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,934,480 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Manufacturing
85,819 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,956 UART: [kat] SHA2-512-ACC
896,857 UART: [kat] ECC-384
902,320 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,476,013 UART: [cold-reset] ++
1,476,339 UART: [fht] Storing FHT @ 0x50003400
1,479,072 UART: [idev] ++
1,479,240 UART: [idev] CDI.KEYID = 6
1,479,600 UART: [idev] SUBJECT.KEYID = 7
1,480,024 UART: [idev] UDS.KEYID = 0
1,480,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,866 UART: [idev] Erasing UDS.KEYID = 0
1,504,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,310 UART: [idev] --
1,514,195 UART: [ldev] ++
1,514,363 UART: [ldev] CDI.KEYID = 6
1,514,726 UART: [ldev] SUBJECT.KEYID = 5
1,515,152 UART: [ldev] AUTHORITY.KEYID = 7
1,515,615 UART: [ldev] FE.KEYID = 1
1,521,021 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,460 UART: [ldev] --
1,585,721 UART: [fwproc] Waiting for Commands...
1,586,498 UART: [fwproc] Received command 0x46574c44
1,587,289 UART: [fwproc] Received Image of size 114168 bytes
1,878,788 UART: ROM Fatal Error: 0x000B0025
1,879,945 >>> mbox cmd response: failed
1,879,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,951 >>> mbox cmd response: failed
1,879,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,879,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,433 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,139 UART: [kat] SHA2-256
882,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,185 UART: [kat] ++
886,337 UART: [kat] sha1
890,709 UART: [kat] SHA2-256
892,647 UART: [kat] SHA2-384
895,496 UART: [kat] SHA2-512-ACC
897,397 UART: [kat] ECC-384
903,090 UART: [kat] HMAC-384Kdf
907,648 UART: [kat] LMS
1,475,844 UART: [kat] --
1,476,617 UART: [cold-reset] ++
1,476,985 UART: [fht] Storing FHT @ 0x50003400
1,479,726 UART: [idev] ++
1,479,894 UART: [idev] CDI.KEYID = 6
1,480,254 UART: [idev] SUBJECT.KEYID = 7
1,480,678 UART: [idev] UDS.KEYID = 0
1,481,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,092 UART: [idev] Erasing UDS.KEYID = 0
1,505,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,000 UART: [idev] --
1,515,045 UART: [ldev] ++
1,515,213 UART: [ldev] CDI.KEYID = 6
1,515,576 UART: [ldev] SUBJECT.KEYID = 5
1,516,002 UART: [ldev] AUTHORITY.KEYID = 7
1,516,465 UART: [ldev] FE.KEYID = 1
1,521,625 UART: [ldev] Erasing FE.KEYID = 1
1,547,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,670 UART: [ldev] --
1,587,121 UART: [fwproc] Waiting for Commands...
1,587,954 UART: [fwproc] Received command 0x46574c44
1,588,745 UART: [fwproc] Received Image of size 114168 bytes
2,883,812 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,540 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,621 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,732,918 >>> mbox cmd response: failed
1,732,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,924 >>> mbox cmd response: failed
1,732,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,309 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,047 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Manufacturing
86,364 UART: [state] DebugLocked = No
86,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,696 UART: [kat] SHA2-256
882,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,742 UART: [kat] ++
886,894 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,319 UART: [kat] HMAC-384Kdf
907,961 UART: [kat] LMS
1,476,157 UART: [kat] --
1,477,200 UART: [cold-reset] ++
1,477,686 UART: [fht] Storing FHT @ 0x50003400
1,480,573 UART: [idev] ++
1,480,741 UART: [idev] CDI.KEYID = 6
1,481,101 UART: [idev] SUBJECT.KEYID = 7
1,481,525 UART: [idev] UDS.KEYID = 0
1,481,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,523 UART: [idev] Erasing UDS.KEYID = 0
1,505,925 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,405 UART: [idev] --
1,515,378 UART: [ldev] ++
1,515,546 UART: [ldev] CDI.KEYID = 6
1,515,909 UART: [ldev] SUBJECT.KEYID = 5
1,516,335 UART: [ldev] AUTHORITY.KEYID = 7
1,516,798 UART: [ldev] FE.KEYID = 1
1,521,986 UART: [ldev] Erasing FE.KEYID = 1
1,547,881 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,123 UART: [ldev] --
1,587,600 UART: [fwproc] Waiting for Commands...
1,588,273 UART: [fwproc] Received command 0x46574c44
1,589,064 UART: [fwproc] Received Image of size 114168 bytes
1,880,945 UART: ROM Fatal Error: 0x000B0025
1,882,102 >>> mbox cmd response: failed
1,882,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,108 >>> mbox cmd response: failed
1,882,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,200 UART: [kat] SHA2-256
882,131 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,246 UART: [kat] ++
886,398 UART: [kat] sha1
890,672 UART: [kat] SHA2-256
892,610 UART: [kat] SHA2-384
895,361 UART: [kat] SHA2-512-ACC
897,262 UART: [kat] ECC-384
903,059 UART: [kat] HMAC-384Kdf
907,623 UART: [kat] LMS
1,475,819 UART: [kat] --
1,476,804 UART: [cold-reset] ++
1,477,288 UART: [fht] Storing FHT @ 0x50003400
1,480,207 UART: [idev] ++
1,480,375 UART: [idev] CDI.KEYID = 6
1,480,735 UART: [idev] SUBJECT.KEYID = 7
1,481,159 UART: [idev] UDS.KEYID = 0
1,481,504 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,233 UART: [idev] Erasing UDS.KEYID = 0
1,506,223 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,783 UART: [idev] --
1,515,702 UART: [ldev] ++
1,515,870 UART: [ldev] CDI.KEYID = 6
1,516,233 UART: [ldev] SUBJECT.KEYID = 5
1,516,659 UART: [ldev] AUTHORITY.KEYID = 7
1,517,122 UART: [ldev] FE.KEYID = 1
1,522,446 UART: [ldev] Erasing FE.KEYID = 1
1,547,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,027 UART: [ldev] --
1,587,462 UART: [fwproc] Waiting for Commands...
1,588,191 UART: [fwproc] Received command 0x46574c44
1,588,982 UART: [fwproc] Received Image of size 114168 bytes
2,884,453 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,055 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,407 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,922 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,736 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,733,667 >>> mbox cmd response: failed
1,733,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,673 >>> mbox cmd response: failed
1,733,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,766 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Manufacturing
86,097 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
88,082 UART: [kat] SHA2-256
893,732 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,857 UART: [kat] ++
898,009 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,804 UART: [kat] SHA2-512-ACC
908,705 UART: [kat] ECC-384
918,490 UART: [kat] HMAC-384Kdf
923,030 UART: [kat] LMS
1,171,358 UART: [kat] --
1,172,085 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,175,280 UART: [idev] ++
1,175,448 UART: [idev] CDI.KEYID = 6
1,175,808 UART: [idev] SUBJECT.KEYID = 7
1,176,232 UART: [idev] UDS.KEYID = 0
1,176,577 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,736 UART: [idev] Erasing UDS.KEYID = 0
1,201,127 UART: [idev] Sha1 KeyId Algorithm
1,209,603 UART: [idev] --
1,210,677 UART: [ldev] ++
1,210,845 UART: [ldev] CDI.KEYID = 6
1,211,208 UART: [ldev] SUBJECT.KEYID = 5
1,211,634 UART: [ldev] AUTHORITY.KEYID = 7
1,212,097 UART: [ldev] FE.KEYID = 1
1,217,281 UART: [ldev] Erasing FE.KEYID = 1
1,243,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,641 UART: [ldev] --
1,282,934 UART: [fwproc] Wait for Commands...
1,283,624 UART: [fwproc] Recv command 0x46574c44
1,284,352 UART: [fwproc] Recv'd Img size: 114168 bytes
1,575,265 UART: ROM Fatal Error: 0x000B0025
1,576,422 >>> mbox cmd response: failed
1,576,422 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,428 >>> mbox cmd response: failed
1,576,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
893,378 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,503 UART: [kat] ++
897,655 UART: [kat] sha1
901,961 UART: [kat] SHA2-256
903,901 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,384 UART: [kat] HMAC-384Kdf
923,080 UART: [kat] LMS
1,171,408 UART: [kat] --
1,172,429 UART: [cold-reset] ++
1,172,793 UART: [fht] FHT @ 0x50003400
1,175,344 UART: [idev] ++
1,175,512 UART: [idev] CDI.KEYID = 6
1,175,872 UART: [idev] SUBJECT.KEYID = 7
1,176,296 UART: [idev] UDS.KEYID = 0
1,176,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,058 UART: [idev] Erasing UDS.KEYID = 0
1,201,247 UART: [idev] Sha1 KeyId Algorithm
1,209,643 UART: [idev] --
1,210,867 UART: [ldev] ++
1,211,035 UART: [ldev] CDI.KEYID = 6
1,211,398 UART: [ldev] SUBJECT.KEYID = 5
1,211,824 UART: [ldev] AUTHORITY.KEYID = 7
1,212,287 UART: [ldev] FE.KEYID = 1
1,217,245 UART: [ldev] Erasing FE.KEYID = 1
1,243,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,072 UART: [fwproc] Wait for Commands...
1,282,782 UART: [fwproc] Recv command 0x46574c44
1,283,510 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,819 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,710 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,432,505 >>> mbox cmd response: failed
1,432,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,511 >>> mbox cmd response: failed
1,432,511 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,517 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,419 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Manufacturing
86,508 UART: [state] DebugLocked = No
87,200 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
893,973 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,098 UART: [kat] ++
898,250 UART: [kat] sha1
902,436 UART: [kat] SHA2-256
904,376 UART: [kat] SHA2-384
907,243 UART: [kat] SHA2-512-ACC
909,144 UART: [kat] ECC-384
919,153 UART: [kat] HMAC-384Kdf
923,917 UART: [kat] LMS
1,172,245 UART: [kat] --
1,173,022 UART: [cold-reset] ++
1,173,382 UART: [fht] FHT @ 0x50003400
1,176,087 UART: [idev] ++
1,176,255 UART: [idev] CDI.KEYID = 6
1,176,615 UART: [idev] SUBJECT.KEYID = 7
1,177,039 UART: [idev] UDS.KEYID = 0
1,177,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,701 UART: [idev] Erasing UDS.KEYID = 0
1,202,184 UART: [idev] Sha1 KeyId Algorithm
1,210,828 UART: [idev] --
1,211,908 UART: [ldev] ++
1,212,076 UART: [ldev] CDI.KEYID = 6
1,212,439 UART: [ldev] SUBJECT.KEYID = 5
1,212,865 UART: [ldev] AUTHORITY.KEYID = 7
1,213,328 UART: [ldev] FE.KEYID = 1
1,218,668 UART: [ldev] Erasing FE.KEYID = 1
1,244,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,386 UART: [ldev] --
1,283,785 UART: [fwproc] Wait for Commands...
1,284,465 UART: [fwproc] Recv command 0x46574c44
1,285,193 UART: [fwproc] Recv'd Img size: 114168 bytes
1,575,992 UART: ROM Fatal Error: 0x000B0025
1,577,149 >>> mbox cmd response: failed
1,577,149 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,155 >>> mbox cmd response: failed
1,577,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,248 UART: [kat] SHA2-256
904,188 UART: [kat] SHA2-384
906,717 UART: [kat] SHA2-512-ACC
908,618 UART: [kat] ECC-384
918,417 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,244 UART: [cold-reset] ++
1,172,664 UART: [fht] FHT @ 0x50003400
1,175,291 UART: [idev] ++
1,175,459 UART: [idev] CDI.KEYID = 6
1,175,819 UART: [idev] SUBJECT.KEYID = 7
1,176,243 UART: [idev] UDS.KEYID = 0
1,176,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,185 UART: [idev] Erasing UDS.KEYID = 0
1,200,968 UART: [idev] Sha1 KeyId Algorithm
1,209,390 UART: [idev] --
1,210,302 UART: [ldev] ++
1,210,470 UART: [ldev] CDI.KEYID = 6
1,210,833 UART: [ldev] SUBJECT.KEYID = 5
1,211,259 UART: [ldev] AUTHORITY.KEYID = 7
1,211,722 UART: [ldev] FE.KEYID = 1
1,217,006 UART: [ldev] Erasing FE.KEYID = 1
1,243,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,292 UART: [ldev] --
1,282,607 UART: [fwproc] Wait for Commands...
1,283,311 UART: [fwproc] Recv command 0x46574c44
1,284,039 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,296 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,773 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,432,200 >>> mbox cmd response: failed
1,432,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,206 >>> mbox cmd response: failed
1,432,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,432,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,626 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,798 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Manufacturing
85,805 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,197 UART: [kat] ++
895,349 UART: [kat] sha1
899,469 UART: [kat] SHA2-256
901,409 UART: [kat] SHA2-384
904,164 UART: [kat] SHA2-512-ACC
906,065 UART: [kat] ECC-384
915,764 UART: [kat] HMAC-384Kdf
920,364 UART: [kat] LMS
1,168,676 UART: [kat] --
1,169,725 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,174,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,199,249 UART: [idev] Sha1 KeyId Algorithm
1,208,225 UART: [idev] --
1,209,444 UART: [ldev] ++
1,209,612 UART: [ldev] CDI.KEYID = 6
1,209,976 UART: [ldev] SUBJECT.KEYID = 5
1,210,403 UART: [ldev] AUTHORITY.KEYID = 7
1,210,866 UART: [ldev] FE.KEYID = 1
1,216,382 UART: [ldev] Erasing FE.KEYID = 1
1,242,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,962 UART: [ldev] --
1,282,384 UART: [fwproc] Wait for Commands...
1,283,187 UART: [fwproc] Recv command 0x46574c44
1,283,920 UART: [fwproc] Recv'd Img size: 114168 bytes
1,574,639 UART: ROM Fatal Error: 0x000B0025
1,575,796 >>> mbox cmd response: failed
1,575,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,802 >>> mbox cmd response: failed
1,575,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,575,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,512 UART: [kat] HMAC-384Kdf
921,260 UART: [kat] LMS
1,169,572 UART: [kat] --
1,170,361 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,515 UART: [idev] ++
1,173,683 UART: [idev] CDI.KEYID = 6
1,174,044 UART: [idev] SUBJECT.KEYID = 7
1,174,469 UART: [idev] UDS.KEYID = 0
1,174,815 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,553 UART: [idev] Erasing UDS.KEYID = 0
1,199,519 UART: [idev] Sha1 KeyId Algorithm
1,208,571 UART: [idev] --
1,209,606 UART: [ldev] ++
1,209,774 UART: [ldev] CDI.KEYID = 6
1,210,138 UART: [ldev] SUBJECT.KEYID = 5
1,210,565 UART: [ldev] AUTHORITY.KEYID = 7
1,211,028 UART: [ldev] FE.KEYID = 1
1,216,402 UART: [ldev] Erasing FE.KEYID = 1
1,243,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,654 UART: [ldev] --
1,281,990 UART: [fwproc] Wait for Commands...
1,282,577 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,491 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,800 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,272 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,276 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,426,627 >>> mbox cmd response: failed
1,426,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,633 >>> mbox cmd response: failed
1,426,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,639 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,340 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Manufacturing
86,014 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,355 UART: [kat] SHA2-512-ACC
906,256 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,054 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,174,602 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,504 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,524 UART: [idev] --
1,209,363 UART: [ldev] ++
1,209,531 UART: [ldev] CDI.KEYID = 6
1,209,895 UART: [ldev] SUBJECT.KEYID = 5
1,210,322 UART: [ldev] AUTHORITY.KEYID = 7
1,210,785 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,973 UART: [ldev] --
1,281,437 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,855 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,614 UART: ROM Fatal Error: 0x000B0025
1,574,771 >>> mbox cmd response: failed
1,574,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,777 >>> mbox cmd response: failed
1,574,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
891,523 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,477 UART: [kat] LMS
1,168,789 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,173,136 UART: [idev] ++
1,173,304 UART: [idev] CDI.KEYID = 6
1,173,665 UART: [idev] SUBJECT.KEYID = 7
1,174,090 UART: [idev] UDS.KEYID = 0
1,174,436 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,058 UART: [idev] Erasing UDS.KEYID = 0
1,198,672 UART: [idev] Sha1 KeyId Algorithm
1,207,476 UART: [idev] --
1,208,629 UART: [ldev] ++
1,208,797 UART: [ldev] CDI.KEYID = 6
1,209,161 UART: [ldev] SUBJECT.KEYID = 5
1,209,588 UART: [ldev] AUTHORITY.KEYID = 7
1,210,051 UART: [ldev] FE.KEYID = 1
1,215,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,597 UART: [ldev] --
1,281,059 UART: [fwproc] Wait for Commands...
1,281,634 UART: [fwproc] Recv command 0x46574c44
1,282,367 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,296 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,241 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,429,116 >>> mbox cmd response: failed
1,429,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,122 >>> mbox cmd response: failed
1,429,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,873 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,028 UART:
192,416 UART: Running Caliptra ROM ...
193,541 UART:
193,689 UART: [state] CFI Enabled
263,287 UART: [state] LifecycleState = Manufacturing
265,254 UART: [state] DebugLocked = No
266,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,837 UART: [kat] SHA2-256
441,550 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,076 UART: [kat] ++
452,556 UART: [kat] sha1
463,596 UART: [kat] SHA2-256
466,287 UART: [kat] SHA2-384
471,887 UART: [kat] SHA2-512-ACC
474,281 UART: [kat] ECC-384
2,764,916 UART: [kat] HMAC-384Kdf
2,797,620 UART: [kat] LMS
3,987,942 UART: [kat] --
3,992,265 UART: [cold-reset] ++
3,993,662 UART: [fht] Storing FHT @ 0x50003400
4,005,094 UART: [idev] ++
4,005,670 UART: [idev] CDI.KEYID = 6
4,006,693 UART: [idev] SUBJECT.KEYID = 7
4,007,858 UART: [idev] UDS.KEYID = 0
4,010,856 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,288 UART: [idev] Erasing UDS.KEYID = 0
7,347,030 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,335 UART: [idev] --
7,372,952 UART: [ldev] ++
7,373,532 UART: [ldev] CDI.KEYID = 6
7,374,444 UART: [ldev] SUBJECT.KEYID = 5
7,375,666 UART: [ldev] AUTHORITY.KEYID = 7
7,376,953 UART: [ldev] FE.KEYID = 1
7,419,763 UART: [ldev] Erasing FE.KEYID = 1
10,753,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,690 UART: [ldev] --
13,109,778 UART: [fwproc] Waiting for Commands...
13,112,526 UART: [fwproc] Received command 0x46574c44
13,114,712 UART: [fwproc] Received Image of size 113844 bytes
16,091,647 UART: ROM Fatal Error: 0x000B0027
16,095,054 >>> mbox cmd response: failed
16,095,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,095,839 >>> mbox cmd response: failed
16,096,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,096,412 >>> mbox cmd response: failed
Initializing fuses
2,049,432 writing to cptra_bootfsm_go
2,238,834 UART:
2,239,177 UART: Running Caliptra ROM ...
2,240,227 UART:
2,240,386 UART: [state] CFI Enabled
2,298,732 UART: [state] LifecycleState = Manufacturing
2,300,671 UART: [state] DebugLocked = No
2,302,717 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,307,625 UART: [kat] SHA2-256
2,477,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,487,831 UART: [kat] ++
2,488,376 UART: [kat] sha1
2,499,612 UART: [kat] SHA2-256
2,502,310 UART: [kat] SHA2-384
2,508,135 UART: [kat] SHA2-512-ACC
2,510,541 UART: [kat] ECC-384
4,802,372 UART: [kat] HMAC-384Kdf
4,834,162 UART: [kat] LMS
6,024,446 UART: [kat] --
6,029,162 UART: [cold-reset] ++
6,031,101 UART: [fht] Storing FHT @ 0x50003400
6,042,813 UART: [idev] ++
6,043,426 UART: [idev] CDI.KEYID = 6
6,044,320 UART: [idev] SUBJECT.KEYID = 7
6,045,544 UART: [idev] UDS.KEYID = 0
6,048,209 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,191,396 UART: [idev] Erasing UDS.KEYID = 0
9,379,369 UART: [idev] Using Sha1 for KeyId Algorithm
9,399,807 UART: [idev] --
9,403,938 UART: [ldev] ++
9,404,517 UART: [ldev] CDI.KEYID = 6
9,405,485 UART: [ldev] SUBJECT.KEYID = 5
9,406,681 UART: [ldev] AUTHORITY.KEYID = 7
9,407,918 UART: [ldev] FE.KEYID = 1
9,457,243 UART: [ldev] Erasing FE.KEYID = 1
12,787,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,081,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,110,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,124,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,143,600 UART: [ldev] --
15,149,029 UART: [fwproc] Waiting for Commands...
15,151,024 UART: [fwproc] Received command 0x46574c44
15,153,213 UART: [fwproc] Received Image of size 113844 bytes
19,238,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,318,607 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,387,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,704,620 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,807,119 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,904,430 >>> mbox cmd response: failed
15,905,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,905,465 >>> mbox cmd response: failed
15,905,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,906,025 >>> mbox cmd response: failed
Initializing fuses
2,045,265 writing to cptra_bootfsm_go
5,843,324 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,952,270 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,531 UART:
192,894 UART: Running Caliptra ROM ...
194,022 UART:
603,561 UART: [state] CFI Enabled
618,861 UART: [state] LifecycleState = Manufacturing
620,772 UART: [state] DebugLocked = No
622,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,196 UART: [kat] SHA2-256
796,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,494 UART: [kat] ++
807,940 UART: [kat] sha1
818,707 UART: [kat] SHA2-256
821,398 UART: [kat] SHA2-384
827,817 UART: [kat] SHA2-512-ACC
830,213 UART: [kat] ECC-384
3,113,293 UART: [kat] HMAC-384Kdf
3,125,070 UART: [kat] LMS
4,315,208 UART: [kat] --
4,318,879 UART: [cold-reset] ++
4,320,489 UART: [fht] Storing FHT @ 0x50003400
4,331,434 UART: [idev] ++
4,332,054 UART: [idev] CDI.KEYID = 6
4,332,968 UART: [idev] SUBJECT.KEYID = 7
4,334,250 UART: [idev] UDS.KEYID = 0
4,336,865 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,051 UART: [idev] Erasing UDS.KEYID = 0
7,621,757 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,254 UART: [idev] --
7,649,295 UART: [ldev] ++
7,649,871 UART: [ldev] CDI.KEYID = 6
7,650,819 UART: [ldev] SUBJECT.KEYID = 5
7,652,035 UART: [ldev] AUTHORITY.KEYID = 7
7,653,274 UART: [ldev] FE.KEYID = 1
7,663,037 UART: [ldev] Erasing FE.KEYID = 1
10,951,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,497 UART: [ldev] --
13,310,689 UART: [fwproc] Waiting for Commands...
13,312,314 UART: [fwproc] Received command 0x46574c44
13,314,552 UART: [fwproc] Received Image of size 113844 bytes
16,283,780 UART: ROM Fatal Error: 0x000B0027
16,287,203 >>> mbox cmd response: failed
16,287,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,287,986 >>> mbox cmd response: failed
16,288,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,288,548 >>> mbox cmd response: failed
Initializing fuses
2,049,361 writing to cptra_bootfsm_go
2,238,708 UART:
2,239,069 UART: Running Caliptra ROM ...
2,240,211 UART:
4,186,686 UART: [state] CFI Enabled
4,200,295 UART: [state] LifecycleState = Manufacturing
4,202,204 UART: [state] DebugLocked = No
4,204,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,209,677 UART: [kat] SHA2-256
4,379,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,389,967 UART: [kat] ++
4,390,427 UART: [kat] sha1
4,402,667 UART: [kat] SHA2-256
4,405,360 UART: [kat] SHA2-384
4,410,428 UART: [kat] SHA2-512-ACC
4,412,829 UART: [kat] ECC-384
6,696,966 UART: [kat] HMAC-384Kdf
6,708,752 UART: [kat] LMS
7,898,858 UART: [kat] --
7,902,868 UART: [cold-reset] ++
7,905,234 UART: [fht] Storing FHT @ 0x50003400
7,916,117 UART: [idev] ++
7,916,678 UART: [idev] CDI.KEYID = 6
7,917,633 UART: [idev] SUBJECT.KEYID = 7
7,918,897 UART: [idev] UDS.KEYID = 0
7,921,543 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,064,686 UART: [idev] Erasing UDS.KEYID = 0
11,202,646 UART: [idev] Using Sha1 for KeyId Algorithm
11,224,794 UART: [idev] --
11,228,082 UART: [ldev] ++
11,228,649 UART: [ldev] CDI.KEYID = 6
11,229,668 UART: [ldev] SUBJECT.KEYID = 5
11,230,856 UART: [ldev] AUTHORITY.KEYID = 7
11,232,088 UART: [ldev] FE.KEYID = 1
11,243,599 UART: [ldev] Erasing FE.KEYID = 1
14,529,757 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,824,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,838,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,853,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,868,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,887,239 UART: [ldev] --
16,892,395 UART: [fwproc] Waiting for Commands...
16,895,786 UART: [fwproc] Received command 0x46574c44
16,897,971 UART: [fwproc] Received Image of size 113844 bytes
20,979,521 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,054,461 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,123,318 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,439,102 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,130,472 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,085,373 >>> mbox cmd response: failed
16,085,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,086,271 >>> mbox cmd response: failed
16,086,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,086,849 >>> mbox cmd response: failed
Initializing fuses
2,043,764 writing to cptra_bootfsm_go
7,900,771 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,878,496 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,134 UART:
192,495 UART: Running Caliptra ROM ...
193,636 UART:
193,803 UART: [state] CFI Enabled
266,884 UART: [state] LifecycleState = Manufacturing
268,836 UART: [state] DebugLocked = No
270,665 UART: [state] WD Timer not started. Device not locked for debugging
274,930 UART: [kat] SHA2-256
454,067 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,619 UART: [kat] ++
466,099 UART: [kat] sha1
476,667 UART: [kat] SHA2-256
479,694 UART: [kat] SHA2-384
486,163 UART: [kat] SHA2-512-ACC
489,098 UART: [kat] ECC-384
2,950,092 UART: [kat] HMAC-384Kdf
2,972,149 UART: [kat] LMS
3,501,636 UART: [kat] --
3,505,688 UART: [cold-reset] ++
3,507,291 UART: [fht] FHT @ 0x50003400
3,517,740 UART: [idev] ++
3,518,312 UART: [idev] CDI.KEYID = 6
3,519,234 UART: [idev] SUBJECT.KEYID = 7
3,520,448 UART: [idev] UDS.KEYID = 0
3,523,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,192 UART: [idev] Erasing UDS.KEYID = 0
6,026,533 UART: [idev] Sha1 KeyId Algorithm
6,051,232 UART: [idev] --
6,056,692 UART: [ldev] ++
6,057,268 UART: [ldev] CDI.KEYID = 6
6,058,180 UART: [ldev] SUBJECT.KEYID = 5
6,059,397 UART: [ldev] AUTHORITY.KEYID = 7
6,060,634 UART: [ldev] FE.KEYID = 1
6,101,214 UART: [ldev] Erasing FE.KEYID = 1
8,606,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,883 UART: [ldev] --
10,415,075 UART: [fwproc] Wait for Commands...
10,418,255 UART: [fwproc] Recv command 0x46574c44
10,420,353 UART: [fwproc] Recv'd Img size: 114168 bytes
12,739,732 UART: ROM Fatal Error: 0x000B0027
12,742,858 >>> mbox cmd response: failed
12,743,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,743,624 >>> mbox cmd response: failed
12,743,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,184 >>> mbox cmd response: failed
Initializing fuses
2,060,167 writing to cptra_bootfsm_go
2,249,549 UART:
2,249,899 UART: Running Caliptra ROM ...
2,250,983 UART:
2,251,143 UART: [state] CFI Enabled
2,328,821 UART: [state] LifecycleState = Manufacturing
2,330,707 UART: [state] DebugLocked = No
2,332,210 UART: [state] WD Timer not started. Device not locked for debugging
2,335,853 UART: [kat] SHA2-256
2,515,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,526,543 UART: [kat] ++
2,527,177 UART: [kat] sha1
2,538,188 UART: [kat] SHA2-256
2,541,206 UART: [kat] SHA2-384
2,548,723 UART: [kat] SHA2-512-ACC
2,551,669 UART: [kat] ECC-384
5,009,399 UART: [kat] HMAC-384Kdf
5,034,541 UART: [kat] LMS
5,563,965 UART: [kat] --
5,569,476 UART: [cold-reset] ++
5,571,785 UART: [fht] FHT @ 0x50003400
5,582,922 UART: [idev] ++
5,583,495 UART: [idev] CDI.KEYID = 6
5,584,381 UART: [idev] SUBJECT.KEYID = 7
5,585,595 UART: [idev] UDS.KEYID = 0
5,588,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,731,874 UART: [idev] Erasing UDS.KEYID = 0
8,088,005 UART: [idev] Sha1 KeyId Algorithm
8,110,546 UART: [idev] --
8,115,516 UART: [ldev] ++
8,116,111 UART: [ldev] CDI.KEYID = 6
8,116,995 UART: [ldev] SUBJECT.KEYID = 5
8,118,157 UART: [ldev] AUTHORITY.KEYID = 7
8,119,451 UART: [ldev] FE.KEYID = 1
8,163,388 UART: [ldev] Erasing FE.KEYID = 1
10,667,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,452,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,474,457 UART: [ldev] --
12,479,243 UART: [fwproc] Wait for Commands...
12,482,155 UART: [fwproc] Recv command 0x46574c44
12,484,201 UART: [fwproc] Recv'd Img size: 114168 bytes
15,921,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,995,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,064,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,380,845 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,385,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,549,034 >>> mbox cmd response: failed
12,549,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,549,951 >>> mbox cmd response: failed
12,550,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,550,531 >>> mbox cmd response: failed
Initializing fuses
2,044,477 writing to cptra_bootfsm_go
5,402,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,117,496 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,483 UART:
192,838 UART: Running Caliptra ROM ...
194,050 UART:
603,571 UART: [state] CFI Enabled
616,340 UART: [state] LifecycleState = Manufacturing
618,227 UART: [state] DebugLocked = No
620,415 UART: [state] WD Timer not started. Device not locked for debugging
623,924 UART: [kat] SHA2-256
803,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,651 UART: [kat] ++
815,181 UART: [kat] sha1
825,578 UART: [kat] SHA2-256
828,603 UART: [kat] SHA2-384
834,258 UART: [kat] SHA2-512-ACC
837,189 UART: [kat] ECC-384
3,279,667 UART: [kat] HMAC-384Kdf
3,293,415 UART: [kat] LMS
3,822,918 UART: [kat] --
3,826,341 UART: [cold-reset] ++
3,827,832 UART: [fht] FHT @ 0x50003400
3,839,843 UART: [idev] ++
3,840,410 UART: [idev] CDI.KEYID = 6
3,841,378 UART: [idev] SUBJECT.KEYID = 7
3,842,543 UART: [idev] UDS.KEYID = 0
3,845,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,199 UART: [idev] Erasing UDS.KEYID = 0
6,311,158 UART: [idev] Sha1 KeyId Algorithm
6,333,633 UART: [idev] --
6,338,701 UART: [ldev] ++
6,339,269 UART: [ldev] CDI.KEYID = 6
6,340,178 UART: [ldev] SUBJECT.KEYID = 5
6,341,394 UART: [ldev] AUTHORITY.KEYID = 7
6,342,624 UART: [ldev] FE.KEYID = 1
6,355,375 UART: [ldev] Erasing FE.KEYID = 1
8,829,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,670 UART: [ldev] --
10,621,690 UART: [fwproc] Wait for Commands...
10,624,656 UART: [fwproc] Recv command 0x46574c44
10,626,797 UART: [fwproc] Recv'd Img size: 114168 bytes
12,948,072 UART: ROM Fatal Error: 0x000B0027
12,951,192 >>> mbox cmd response: failed
12,951,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,951,952 >>> mbox cmd response: failed
12,952,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,952,510 >>> mbox cmd response: failed
Initializing fuses
2,055,727 writing to cptra_bootfsm_go
2,245,023 UART:
2,245,359 UART: Running Caliptra ROM ...
2,246,497 UART:
7,500,700 UART: [state] CFI Enabled
7,513,967 UART: [state] LifecycleState = Manufacturing
7,515,861 UART: [state] DebugLocked = No
7,517,870 UART: [state] WD Timer not started. Device not locked for debugging
7,521,125 UART: [kat] SHA2-256
7,700,283 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,711,869 UART: [kat] ++
7,712,329 UART: [kat] sha1
7,722,511 UART: [kat] SHA2-256
7,725,542 UART: [kat] SHA2-384
7,730,991 UART: [kat] SHA2-512-ACC
7,733,933 UART: [kat] ECC-384
10,173,989 UART: [kat] HMAC-384Kdf
10,187,236 UART: [kat] LMS
10,716,706 UART: [kat] --
10,720,957 UART: [cold-reset] ++
10,721,802 UART: [fht] FHT @ 0x50003400
10,733,800 UART: [idev] ++
10,734,367 UART: [idev] CDI.KEYID = 6
10,735,248 UART: [idev] SUBJECT.KEYID = 7
10,736,459 UART: [idev] UDS.KEYID = 0
10,739,113 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,883,001 UART: [idev] Erasing UDS.KEYID = 0
13,210,142 UART: [idev] Sha1 KeyId Algorithm
13,232,989 UART: [idev] --
13,238,515 UART: [ldev] ++
13,239,082 UART: [ldev] CDI.KEYID = 6
13,240,102 UART: [ldev] SUBJECT.KEYID = 5
13,241,204 UART: [ldev] AUTHORITY.KEYID = 7
13,242,432 UART: [ldev] FE.KEYID = 1
13,252,050 UART: [ldev] Erasing FE.KEYID = 1
15,724,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,445,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,461,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,477,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,492,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,513,242 UART: [ldev] --
17,518,812 UART: [fwproc] Wait for Commands...
17,520,434 UART: [fwproc] Recv command 0x46574c44
17,522,476 UART: [fwproc] Recv'd Img size: 114168 bytes
20,949,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,027,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,095,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,412,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
14,508 writing to cptra_bootfsm_go
3,706,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,739,335 >>> mbox cmd response: failed
12,740,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,462 >>> mbox cmd response: failed
12,740,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,976 >>> mbox cmd response: failed
Initializing fuses
2,053,659 writing to cptra_bootfsm_go
10,825,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,424,772 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,095 UART:
192,476 UART: Running Caliptra ROM ...
193,674 UART:
193,828 UART: [state] CFI Enabled
263,993 UART: [state] LifecycleState = Manufacturing
266,404 UART: [state] DebugLocked = No
268,111 UART: [state] WD Timer not started. Device not locked for debugging
272,068 UART: [kat] SHA2-256
461,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,735 UART: [kat] ++
473,184 UART: [kat] sha1
485,107 UART: [kat] SHA2-256
488,121 UART: [kat] SHA2-384
494,430 UART: [kat] SHA2-512-ACC
496,999 UART: [kat] ECC-384
2,950,003 UART: [kat] HMAC-384Kdf
2,970,497 UART: [kat] LMS
3,502,264 UART: [kat] --
3,505,073 UART: [cold-reset] ++
3,507,608 UART: [fht] FHT @ 0x50003400
3,519,835 UART: [idev] ++
3,520,561 UART: [idev] CDI.KEYID = 6
3,521,527 UART: [idev] SUBJECT.KEYID = 7
3,522,687 UART: [idev] UDS.KEYID = 0
3,525,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,384 UART: [idev] Erasing UDS.KEYID = 0
6,028,158 UART: [idev] Sha1 KeyId Algorithm
6,049,827 UART: [idev] --
6,053,809 UART: [ldev] ++
6,054,579 UART: [ldev] CDI.KEYID = 6
6,055,480 UART: [ldev] SUBJECT.KEYID = 5
6,056,504 UART: [ldev] AUTHORITY.KEYID = 7
6,057,794 UART: [ldev] FE.KEYID = 1
6,099,927 UART: [ldev] Erasing FE.KEYID = 1
8,604,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,663 UART: [ldev] --
10,415,470 UART: [fwproc] Wait for Commands...
10,418,271 UART: [fwproc] Recv command 0x46574c44
10,420,588 UART: [fwproc] Recv'd Img size: 114168 bytes
12,773,411 UART: ROM Fatal Error: 0x000B0027
12,777,033 >>> mbox cmd response: failed
12,777,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,777,714 >>> mbox cmd response: failed
12,777,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,778,254 >>> mbox cmd response: failed
Initializing fuses
2,050,653 writing to cptra_bootfsm_go
2,239,935 UART:
2,240,282 UART: Running Caliptra ROM ...
2,241,332 UART:
2,241,481 UART: [state] CFI Enabled
2,297,355 UART: [state] LifecycleState = Manufacturing
2,299,754 UART: [state] DebugLocked = No
2,301,119 UART: [state] WD Timer not started. Device not locked for debugging
2,305,587 UART: [kat] SHA2-256
2,495,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,506,238 UART: [kat] ++
2,506,699 UART: [kat] sha1
2,518,292 UART: [kat] SHA2-256
2,521,316 UART: [kat] SHA2-384
2,527,475 UART: [kat] SHA2-512-ACC
2,530,049 UART: [kat] ECC-384
4,987,439 UART: [kat] HMAC-384Kdf
5,009,897 UART: [kat] LMS
5,541,666 UART: [kat] --
5,545,288 UART: [cold-reset] ++
5,546,246 UART: [fht] FHT @ 0x50003400
5,559,313 UART: [idev] ++
5,560,010 UART: [idev] CDI.KEYID = 6
5,560,952 UART: [idev] SUBJECT.KEYID = 7
5,562,134 UART: [idev] UDS.KEYID = 0
5,564,792 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,708,860 UART: [idev] Erasing UDS.KEYID = 0
8,065,447 UART: [idev] Sha1 KeyId Algorithm
8,088,203 UART: [idev] --
8,093,880 UART: [ldev] ++
8,094,567 UART: [ldev] CDI.KEYID = 6
8,095,480 UART: [ldev] SUBJECT.KEYID = 5
8,096,640 UART: [ldev] AUTHORITY.KEYID = 7
8,097,876 UART: [ldev] FE.KEYID = 1
8,136,889 UART: [ldev] Erasing FE.KEYID = 1
10,642,325 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,271 UART: [ldev] --
12,451,448 UART: [fwproc] Wait for Commands...
12,454,301 UART: [fwproc] Recv command 0x46574c44
12,456,624 UART: [fwproc] Recv'd Img size: 114168 bytes
15,931,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,014,742 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,130,859 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,671,968 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,441,783 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,703,951 >>> mbox cmd response: failed
12,704,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,704,870 >>> mbox cmd response: failed
12,705,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,705,434 >>> mbox cmd response: failed
Initializing fuses
2,046,311 writing to cptra_bootfsm_go
5,484,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,831,007 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
192,509 UART:
192,868 UART: Running Caliptra ROM ...
193,965 UART:
603,899 UART: [state] CFI Enabled
618,241 UART: [state] LifecycleState = Manufacturing
620,625 UART: [state] DebugLocked = No
622,242 UART: [state] WD Timer not started. Device not locked for debugging
626,615 UART: [kat] SHA2-256
816,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,290 UART: [kat] ++
827,810 UART: [kat] sha1
838,421 UART: [kat] SHA2-256
841,433 UART: [kat] SHA2-384
846,049 UART: [kat] SHA2-512-ACC
848,625 UART: [kat] ECC-384
3,290,601 UART: [kat] HMAC-384Kdf
3,303,901 UART: [kat] LMS
3,835,731 UART: [kat] --
3,838,610 UART: [cold-reset] ++
3,840,009 UART: [fht] FHT @ 0x50003400
3,851,108 UART: [idev] ++
3,851,790 UART: [idev] CDI.KEYID = 6
3,852,808 UART: [idev] SUBJECT.KEYID = 7
3,853,964 UART: [idev] UDS.KEYID = 0
3,856,659 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,246 UART: [idev] Erasing UDS.KEYID = 0
6,330,521 UART: [idev] Sha1 KeyId Algorithm
6,352,787 UART: [idev] --
6,356,949 UART: [ldev] ++
6,357,630 UART: [ldev] CDI.KEYID = 6
6,358,517 UART: [ldev] SUBJECT.KEYID = 5
6,359,730 UART: [ldev] AUTHORITY.KEYID = 7
6,361,127 UART: [ldev] FE.KEYID = 1
6,371,813 UART: [ldev] Erasing FE.KEYID = 1
8,849,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,986 UART: [ldev] --
10,638,928 UART: [fwproc] Wait for Commands...
10,640,375 UART: [fwproc] Recv command 0x46574c44
10,642,335 UART: [fwproc] Recv'd Img size: 114168 bytes
13,002,299 UART: ROM Fatal Error: 0x000B0027
13,005,926 >>> mbox cmd response: failed
13,006,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,006,522 >>> mbox cmd response: failed
13,006,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,007,139 >>> mbox cmd response: failed
Initializing fuses
2,055,966 writing to cptra_bootfsm_go
2,245,270 UART:
2,245,618 UART: Running Caliptra ROM ...
2,246,677 UART:
7,446,280 UART: [state] CFI Enabled
7,461,547 UART: [state] LifecycleState = Manufacturing
7,463,975 UART: [state] DebugLocked = No
7,465,750 UART: [state] WD Timer not started. Device not locked for debugging
7,470,553 UART: [kat] SHA2-256
7,660,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,671,241 UART: [kat] ++
7,671,728 UART: [kat] sha1
7,683,436 UART: [kat] SHA2-256
7,686,501 UART: [kat] SHA2-384
7,692,232 UART: [kat] SHA2-512-ACC
7,694,809 UART: [kat] ECC-384
10,136,829 UART: [kat] HMAC-384Kdf
10,150,408 UART: [kat] LMS
10,682,237 UART: [kat] --
10,688,062 UART: [cold-reset] ++
10,689,562 UART: [fht] FHT @ 0x50003400
10,700,996 UART: [idev] ++
10,701,684 UART: [idev] CDI.KEYID = 6
10,702,701 UART: [idev] SUBJECT.KEYID = 7
10,703,859 UART: [idev] UDS.KEYID = 0
10,706,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,850,011 UART: [idev] Erasing UDS.KEYID = 0
13,181,300 UART: [idev] Sha1 KeyId Algorithm
13,203,885 UART: [idev] --
13,210,008 UART: [ldev] ++
13,210,697 UART: [ldev] CDI.KEYID = 6
13,211,579 UART: [ldev] SUBJECT.KEYID = 5
13,212,790 UART: [ldev] AUTHORITY.KEYID = 7
13,214,020 UART: [ldev] FE.KEYID = 1
13,225,426 UART: [ldev] Erasing FE.KEYID = 1
15,702,120 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,421,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,436,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,451,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,466,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,488,512 UART: [ldev] --
17,494,321 UART: [fwproc] Wait for Commands...
17,497,069 UART: [fwproc] Recv command 0x46574c44
17,499,338 UART: [fwproc] Recv'd Img size: 114168 bytes
20,976,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,055,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,172,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,713,218 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
3,761,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,913,184 >>> mbox cmd response: failed
12,913,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,053 >>> mbox cmd response: failed
12,914,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,611 >>> mbox cmd response: failed
Initializing fuses
2,059,052 writing to cptra_bootfsm_go
10,704,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,958,148 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Manufacturing
86,149 UART: [state] DebugLocked = No
86,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,177 UART: [kat] SHA2-256
882,108 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,223 UART: [kat] ++
886,375 UART: [kat] sha1
890,731 UART: [kat] SHA2-256
892,669 UART: [kat] SHA2-384
895,566 UART: [kat] SHA2-512-ACC
897,467 UART: [kat] ECC-384
902,976 UART: [kat] HMAC-384Kdf
907,608 UART: [kat] LMS
1,475,804 UART: [kat] --
1,476,961 UART: [cold-reset] ++
1,477,385 UART: [fht] Storing FHT @ 0x50003400
1,480,142 UART: [idev] ++
1,480,310 UART: [idev] CDI.KEYID = 6
1,480,670 UART: [idev] SUBJECT.KEYID = 7
1,481,094 UART: [idev] UDS.KEYID = 0
1,481,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,234 UART: [idev] Erasing UDS.KEYID = 0
1,506,246 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,912 UART: [idev] --
1,515,927 UART: [ldev] ++
1,516,095 UART: [ldev] CDI.KEYID = 6
1,516,458 UART: [ldev] SUBJECT.KEYID = 5
1,516,884 UART: [ldev] AUTHORITY.KEYID = 7
1,517,347 UART: [ldev] FE.KEYID = 1
1,522,281 UART: [ldev] Erasing FE.KEYID = 1
1,548,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,326 UART: [ldev] --
1,587,731 UART: [fwproc] Waiting for Commands...
1,588,460 UART: [fwproc] Received command 0x46574c44
1,589,251 UART: [fwproc] Received Image of size 114168 bytes
1,880,476 UART: ROM Fatal Error: 0x000B0027
1,881,633 >>> mbox cmd response: failed
1,881,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,639 >>> mbox cmd response: failed
1,881,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,881,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,793 UART: [kat] SHA2-256
881,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,839 UART: [kat] ++
885,991 UART: [kat] sha1
890,309 UART: [kat] SHA2-256
892,247 UART: [kat] SHA2-384
895,002 UART: [kat] SHA2-512-ACC
896,903 UART: [kat] ECC-384
902,320 UART: [kat] HMAC-384Kdf
907,016 UART: [kat] LMS
1,475,212 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,392 UART: [idev] ++
1,479,560 UART: [idev] CDI.KEYID = 6
1,479,920 UART: [idev] SUBJECT.KEYID = 7
1,480,344 UART: [idev] UDS.KEYID = 0
1,480,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,358 UART: [idev] Erasing UDS.KEYID = 0
1,505,164 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,734 UART: [idev] --
1,514,897 UART: [ldev] ++
1,515,065 UART: [ldev] CDI.KEYID = 6
1,515,428 UART: [ldev] SUBJECT.KEYID = 5
1,515,854 UART: [ldev] AUTHORITY.KEYID = 7
1,516,317 UART: [ldev] FE.KEYID = 1
1,521,413 UART: [ldev] Erasing FE.KEYID = 1
1,546,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,646 UART: [ldev] --
1,586,093 UART: [fwproc] Waiting for Commands...
1,586,818 UART: [fwproc] Received command 0x46574c44
1,587,609 UART: [fwproc] Received Image of size 114168 bytes
2,882,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,209 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,733,980 >>> mbox cmd response: failed
1,733,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,986 >>> mbox cmd response: failed
1,733,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,733,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,521 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,547 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Manufacturing
86,048 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,688 UART: [kat] SHA2-256
892,626 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
903,009 UART: [kat] HMAC-384Kdf
907,769 UART: [kat] LMS
1,475,965 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,412 UART: [fht] Storing FHT @ 0x50003400
1,480,343 UART: [idev] ++
1,480,511 UART: [idev] CDI.KEYID = 6
1,480,871 UART: [idev] SUBJECT.KEYID = 7
1,481,295 UART: [idev] UDS.KEYID = 0
1,481,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,303 UART: [idev] Erasing UDS.KEYID = 0
1,506,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,037 UART: [idev] --
1,516,126 UART: [ldev] ++
1,516,294 UART: [ldev] CDI.KEYID = 6
1,516,657 UART: [ldev] SUBJECT.KEYID = 5
1,517,083 UART: [ldev] AUTHORITY.KEYID = 7
1,517,546 UART: [ldev] FE.KEYID = 1
1,522,768 UART: [ldev] Erasing FE.KEYID = 1
1,548,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,223 UART: [ldev] --
1,587,720 UART: [fwproc] Waiting for Commands...
1,588,511 UART: [fwproc] Received command 0x46574c44
1,589,302 UART: [fwproc] Received Image of size 114168 bytes
1,881,665 UART: ROM Fatal Error: 0x000B0027
1,882,822 >>> mbox cmd response: failed
1,882,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,828 >>> mbox cmd response: failed
1,882,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
891,038 UART: [kat] SHA2-256
892,976 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,069 UART: [kat] HMAC-384Kdf
907,805 UART: [kat] LMS
1,476,001 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,234 UART: [fht] Storing FHT @ 0x50003400
1,480,163 UART: [idev] ++
1,480,331 UART: [idev] CDI.KEYID = 6
1,480,691 UART: [idev] SUBJECT.KEYID = 7
1,481,115 UART: [idev] UDS.KEYID = 0
1,481,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,063 UART: [idev] Erasing UDS.KEYID = 0
1,505,495 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,117 UART: [idev] --
1,515,140 UART: [ldev] ++
1,515,308 UART: [ldev] CDI.KEYID = 6
1,515,671 UART: [ldev] SUBJECT.KEYID = 5
1,516,097 UART: [ldev] AUTHORITY.KEYID = 7
1,516,560 UART: [ldev] FE.KEYID = 1
1,521,666 UART: [ldev] Erasing FE.KEYID = 1
1,546,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,397 UART: [ldev] --
1,586,834 UART: [fwproc] Waiting for Commands...
1,587,687 UART: [fwproc] Received command 0x46574c44
1,588,478 UART: [fwproc] Received Image of size 114168 bytes
2,884,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,195 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,547 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,050 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,478 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,732,761 >>> mbox cmd response: failed
1,732,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,767 >>> mbox cmd response: failed
1,732,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,732,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,920 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,692 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Manufacturing
86,023 UART: [state] DebugLocked = No
86,623 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,091 UART: [kat] SHA2-256
904,031 UART: [kat] SHA2-384
906,872 UART: [kat] SHA2-512-ACC
908,773 UART: [kat] ECC-384
918,180 UART: [kat] HMAC-384Kdf
922,760 UART: [kat] LMS
1,171,088 UART: [kat] --
1,171,975 UART: [cold-reset] ++
1,172,481 UART: [fht] FHT @ 0x50003400
1,175,002 UART: [idev] ++
1,175,170 UART: [idev] CDI.KEYID = 6
1,175,530 UART: [idev] SUBJECT.KEYID = 7
1,175,954 UART: [idev] UDS.KEYID = 0
1,176,299 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,822 UART: [idev] Erasing UDS.KEYID = 0
1,201,237 UART: [idev] Sha1 KeyId Algorithm
1,209,677 UART: [idev] --
1,210,747 UART: [ldev] ++
1,210,915 UART: [ldev] CDI.KEYID = 6
1,211,278 UART: [ldev] SUBJECT.KEYID = 5
1,211,704 UART: [ldev] AUTHORITY.KEYID = 7
1,212,167 UART: [ldev] FE.KEYID = 1
1,217,137 UART: [ldev] Erasing FE.KEYID = 1
1,243,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,225 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 114168 bytes
1,577,189 UART: ROM Fatal Error: 0x000B0027
1,578,346 >>> mbox cmd response: failed
1,578,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,352 >>> mbox cmd response: failed
1,578,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,578,358 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
893,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,519 UART: [kat] ++
897,671 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,492 UART: [kat] SHA2-512-ACC
908,393 UART: [kat] ECC-384
918,302 UART: [kat] HMAC-384Kdf
922,782 UART: [kat] LMS
1,171,110 UART: [kat] --
1,171,819 UART: [cold-reset] ++
1,172,369 UART: [fht] FHT @ 0x50003400
1,175,124 UART: [idev] ++
1,175,292 UART: [idev] CDI.KEYID = 6
1,175,652 UART: [idev] SUBJECT.KEYID = 7
1,176,076 UART: [idev] UDS.KEYID = 0
1,176,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,050 UART: [idev] Erasing UDS.KEYID = 0
1,200,961 UART: [idev] Sha1 KeyId Algorithm
1,209,491 UART: [idev] --
1,210,459 UART: [ldev] ++
1,210,627 UART: [ldev] CDI.KEYID = 6
1,210,990 UART: [ldev] SUBJECT.KEYID = 5
1,211,416 UART: [ldev] AUTHORITY.KEYID = 7
1,211,879 UART: [ldev] FE.KEYID = 1
1,216,731 UART: [ldev] Erasing FE.KEYID = 1
1,243,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,353 UART: [ldev] --
1,282,652 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,042 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,320 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,459 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,431,854 >>> mbox cmd response: failed
1,431,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,860 >>> mbox cmd response: failed
1,431,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,113 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,675 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Manufacturing
86,174 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,969 UART: [kat] SHA2-512-ACC
908,870 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
923,177 UART: [kat] LMS
1,171,505 UART: [kat] --
1,172,418 UART: [cold-reset] ++
1,172,996 UART: [fht] FHT @ 0x50003400
1,175,729 UART: [idev] ++
1,175,897 UART: [idev] CDI.KEYID = 6
1,176,257 UART: [idev] SUBJECT.KEYID = 7
1,176,681 UART: [idev] UDS.KEYID = 0
1,177,026 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,631 UART: [idev] Erasing UDS.KEYID = 0
1,201,714 UART: [idev] Sha1 KeyId Algorithm
1,210,224 UART: [idev] --
1,211,514 UART: [ldev] ++
1,211,682 UART: [ldev] CDI.KEYID = 6
1,212,045 UART: [ldev] SUBJECT.KEYID = 5
1,212,471 UART: [ldev] AUTHORITY.KEYID = 7
1,212,934 UART: [ldev] FE.KEYID = 1
1,218,158 UART: [ldev] Erasing FE.KEYID = 1
1,243,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,712 UART: [ldev] --
1,283,029 UART: [fwproc] Wait for Commands...
1,283,681 UART: [fwproc] Recv command 0x46574c44
1,284,409 UART: [fwproc] Recv'd Img size: 114168 bytes
1,575,898 UART: ROM Fatal Error: 0x000B0027
1,577,055 >>> mbox cmd response: failed
1,577,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,061 >>> mbox cmd response: failed
1,577,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,577,067 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
893,427 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,552 UART: [kat] ++
897,704 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,407 UART: [kat] SHA2-512-ACC
908,308 UART: [kat] ECC-384
918,183 UART: [kat] HMAC-384Kdf
922,961 UART: [kat] LMS
1,171,289 UART: [kat] --
1,172,190 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,521 UART: [idev] Erasing UDS.KEYID = 0
1,201,174 UART: [idev] Sha1 KeyId Algorithm
1,209,422 UART: [idev] --
1,210,344 UART: [ldev] ++
1,210,512 UART: [ldev] CDI.KEYID = 6
1,210,875 UART: [ldev] SUBJECT.KEYID = 5
1,211,301 UART: [ldev] AUTHORITY.KEYID = 7
1,211,764 UART: [ldev] FE.KEYID = 1
1,216,778 UART: [ldev] Erasing FE.KEYID = 1
1,243,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,154 UART: [ldev] --
1,282,449 UART: [fwproc] Wait for Commands...
1,283,207 UART: [fwproc] Recv command 0x46574c44
1,283,935 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,996 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,953 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,700 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,431,322 >>> mbox cmd response: failed
1,431,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,328 >>> mbox cmd response: failed
1,431,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,431,334 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,080 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,814 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Manufacturing
85,611 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,005 UART: [kat] ++
895,157 UART: [kat] sha1
899,425 UART: [kat] SHA2-256
901,365 UART: [kat] SHA2-384
904,108 UART: [kat] SHA2-512-ACC
906,009 UART: [kat] ECC-384
915,448 UART: [kat] HMAC-384Kdf
920,224 UART: [kat] LMS
1,168,536 UART: [kat] --
1,169,441 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,174,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,198,823 UART: [idev] Sha1 KeyId Algorithm
1,207,827 UART: [idev] --
1,208,894 UART: [ldev] ++
1,209,062 UART: [ldev] CDI.KEYID = 6
1,209,426 UART: [ldev] SUBJECT.KEYID = 5
1,209,853 UART: [ldev] AUTHORITY.KEYID = 7
1,210,316 UART: [ldev] FE.KEYID = 1
1,215,526 UART: [ldev] Erasing FE.KEYID = 1
1,241,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,280,956 UART: [fwproc] Wait for Commands...
1,281,649 UART: [fwproc] Recv command 0x46574c44
1,282,382 UART: [fwproc] Recv'd Img size: 114168 bytes
1,573,007 UART: ROM Fatal Error: 0x000B0027
1,574,164 >>> mbox cmd response: failed
1,574,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,170 >>> mbox cmd response: failed
1,574,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,574,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
890,924 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,053 UART: [kat] ++
895,205 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
904,012 UART: [kat] SHA2-512-ACC
905,913 UART: [kat] ECC-384
915,470 UART: [kat] HMAC-384Kdf
919,804 UART: [kat] LMS
1,168,116 UART: [kat] --
1,169,099 UART: [cold-reset] ++
1,169,637 UART: [fht] FHT @ 0x50003400
1,172,359 UART: [idev] ++
1,172,527 UART: [idev] CDI.KEYID = 6
1,172,888 UART: [idev] SUBJECT.KEYID = 7
1,173,313 UART: [idev] UDS.KEYID = 0
1,173,659 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,201 UART: [idev] Erasing UDS.KEYID = 0
1,198,229 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,207,964 UART: [ldev] ++
1,208,132 UART: [ldev] CDI.KEYID = 6
1,208,496 UART: [ldev] SUBJECT.KEYID = 5
1,208,923 UART: [ldev] AUTHORITY.KEYID = 7
1,209,386 UART: [ldev] FE.KEYID = 1
1,214,580 UART: [ldev] Erasing FE.KEYID = 1
1,241,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,042 UART: [ldev] --
1,280,322 UART: [fwproc] Wait for Commands...
1,281,059 UART: [fwproc] Recv command 0x46574c44
1,281,792 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,857 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,166 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,826 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,425,411 >>> mbox cmd response: failed
1,425,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,417 >>> mbox cmd response: failed
1,425,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,425,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,204 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Manufacturing
85,938 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,777 UART: [kat] SHA2-256
891,327 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,642 UART: [kat] SHA2-256
901,582 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,235 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,200 UART: [cold-reset] ++
1,170,632 UART: [fht] FHT @ 0x50003400
1,173,290 UART: [idev] ++
1,173,458 UART: [idev] CDI.KEYID = 6
1,173,819 UART: [idev] SUBJECT.KEYID = 7
1,174,244 UART: [idev] UDS.KEYID = 0
1,174,590 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,024 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,837 UART: [ldev] ++
1,209,005 UART: [ldev] CDI.KEYID = 6
1,209,369 UART: [ldev] SUBJECT.KEYID = 5
1,209,796 UART: [ldev] AUTHORITY.KEYID = 7
1,210,259 UART: [ldev] FE.KEYID = 1
1,215,743 UART: [ldev] Erasing FE.KEYID = 1
1,242,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,282,117 UART: [fwproc] Wait for Commands...
1,282,872 UART: [fwproc] Recv command 0x46574c44
1,283,605 UART: [fwproc] Recv'd Img size: 114168 bytes
1,575,122 UART: ROM Fatal Error: 0x000B0027
1,576,279 >>> mbox cmd response: failed
1,576,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,285 >>> mbox cmd response: failed
1,576,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,576,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,724 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,610 UART: [cold-reset] ++
1,169,944 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,174,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,750 UART: [idev] Erasing UDS.KEYID = 0
1,198,966 UART: [idev] Sha1 KeyId Algorithm
1,207,836 UART: [idev] --
1,208,771 UART: [ldev] ++
1,208,939 UART: [ldev] CDI.KEYID = 6
1,209,303 UART: [ldev] SUBJECT.KEYID = 5
1,209,730 UART: [ldev] AUTHORITY.KEYID = 7
1,210,193 UART: [ldev] FE.KEYID = 1
1,215,375 UART: [ldev] Erasing FE.KEYID = 1
1,241,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,066 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,389 UART: [ldev] --
1,280,849 UART: [fwproc] Wait for Commands...
1,281,560 UART: [fwproc] Recv command 0x46574c44
1,282,293 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,886 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,195 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,789 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,946 >>> mbox cmd response: failed
1,427,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,952 >>> mbox cmd response: failed
1,427,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,123 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,168 UART:
192,535 UART: Running Caliptra ROM ...
193,661 UART:
193,807 UART: [state] CFI Enabled
263,833 UART: [state] LifecycleState = Unprovisioned
265,755 UART: [state] DebugLocked = No
267,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,822 UART: [kat] SHA2-256
441,546 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,045 UART: [kat] ++
452,524 UART: [kat] sha1
462,376 UART: [kat] SHA2-256
465,064 UART: [kat] SHA2-384
470,421 UART: [kat] SHA2-512-ACC
472,816 UART: [kat] ECC-384
2,768,542 UART: [kat] HMAC-384Kdf
2,799,640 UART: [kat] LMS
3,989,927 UART: [kat] --
3,993,850 UART: [cold-reset] ++
3,994,765 UART: [fht] Storing FHT @ 0x50003400
4,005,710 UART: [idev] ++
4,006,291 UART: [idev] CDI.KEYID = 6
4,007,223 UART: [idev] SUBJECT.KEYID = 7
4,008,441 UART: [idev] UDS.KEYID = 0
4,011,367 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,783 UART: [idev] Erasing UDS.KEYID = 0
7,345,576 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,311 UART: [idev] --
7,369,656 UART: [ldev] ++
7,370,242 UART: [ldev] CDI.KEYID = 6
7,371,181 UART: [ldev] SUBJECT.KEYID = 5
7,372,394 UART: [ldev] AUTHORITY.KEYID = 7
7,373,684 UART: [ldev] FE.KEYID = 1
7,401,016 UART: [ldev] Erasing FE.KEYID = 1
10,733,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,434 UART: [ldev] --
13,095,555 UART: [fwproc] Waiting for Commands...
13,098,796 UART: [fwproc] Received command 0x46574c44
13,100,990 UART: [fwproc] Received Image of size 113844 bytes
15,816,335 UART: ROM Fatal Error: 0x000B002F
15,819,782 >>> mbox cmd response: failed
15,820,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,820,558 >>> mbox cmd response: failed
15,820,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,821,122 >>> mbox cmd response: failed
Initializing fuses
2,057,596 writing to cptra_bootfsm_go
2,246,940 UART:
2,247,307 UART: Running Caliptra ROM ...
2,248,394 UART:
2,248,552 UART: [state] CFI Enabled
2,319,164 UART: [state] LifecycleState = Unprovisioned
2,321,099 UART: [state] DebugLocked = No
2,322,331 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,046 UART: [kat] SHA2-256
2,497,763 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,290 UART: [kat] ++
2,508,753 UART: [kat] sha1
2,519,368 UART: [kat] SHA2-256
2,522,060 UART: [kat] SHA2-384
2,527,723 UART: [kat] SHA2-512-ACC
2,530,075 UART: [kat] ECC-384
4,825,020 UART: [kat] HMAC-384Kdf
4,856,472 UART: [kat] LMS
6,046,741 UART: [kat] --
6,052,168 UART: [cold-reset] ++
6,054,700 UART: [fht] Storing FHT @ 0x50003400
6,065,483 UART: [idev] ++
6,066,050 UART: [idev] CDI.KEYID = 6
6,067,119 UART: [idev] SUBJECT.KEYID = 7
6,068,444 UART: [idev] UDS.KEYID = 0
6,070,641 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,213,791 UART: [idev] Erasing UDS.KEYID = 0
9,402,535 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,320 UART: [idev] --
9,425,644 UART: [ldev] ++
9,426,210 UART: [ldev] CDI.KEYID = 6
9,427,175 UART: [ldev] SUBJECT.KEYID = 5
9,428,567 UART: [ldev] AUTHORITY.KEYID = 7
9,429,695 UART: [ldev] FE.KEYID = 1
9,458,195 UART: [ldev] Erasing FE.KEYID = 1
12,790,737 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,098,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,113,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,146,800 UART: [ldev] --
15,152,296 UART: [fwproc] Waiting for Commands...
15,155,641 UART: [fwproc] Received command 0x46574c44
15,157,828 UART: [fwproc] Received Image of size 113844 bytes
19,211,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,289,405 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,358,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,675,082 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,811,736 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,576,222 >>> mbox cmd response: failed
15,577,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,577,332 >>> mbox cmd response: failed
15,577,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,577,899 >>> mbox cmd response: failed
Initializing fuses
2,056,509 writing to cptra_bootfsm_go
5,847,361 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,902,614 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,390 UART:
192,764 UART: Running Caliptra ROM ...
193,889 UART:
603,611 UART: [state] CFI Enabled
616,250 UART: [state] LifecycleState = Unprovisioned
618,199 UART: [state] DebugLocked = No
620,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,682 UART: [kat] SHA2-256
794,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,997 UART: [kat] ++
805,528 UART: [kat] sha1
816,579 UART: [kat] SHA2-256
819,243 UART: [kat] SHA2-384
825,549 UART: [kat] SHA2-512-ACC
827,897 UART: [kat] ECC-384
3,113,102 UART: [kat] HMAC-384Kdf
3,124,060 UART: [kat] LMS
4,314,172 UART: [kat] --
4,319,490 UART: [cold-reset] ++
4,321,536 UART: [fht] Storing FHT @ 0x50003400
4,333,357 UART: [idev] ++
4,333,964 UART: [idev] CDI.KEYID = 6
4,334,851 UART: [idev] SUBJECT.KEYID = 7
4,336,121 UART: [idev] UDS.KEYID = 0
4,338,988 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,026 UART: [idev] Erasing UDS.KEYID = 0
7,624,449 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,234 UART: [idev] --
7,649,344 UART: [ldev] ++
7,649,915 UART: [ldev] CDI.KEYID = 6
7,650,932 UART: [ldev] SUBJECT.KEYID = 5
7,652,113 UART: [ldev] AUTHORITY.KEYID = 7
7,653,345 UART: [ldev] FE.KEYID = 1
7,665,882 UART: [ldev] Erasing FE.KEYID = 1
10,952,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,028 UART: [ldev] --
13,308,982 UART: [fwproc] Waiting for Commands...
13,311,997 UART: [fwproc] Received command 0x46574c44
13,314,179 UART: [fwproc] Received Image of size 113844 bytes
16,016,962 UART: ROM Fatal Error: 0x000B002F
16,020,469 >>> mbox cmd response: failed
16,020,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,218 >>> mbox cmd response: failed
16,021,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,809 >>> mbox cmd response: failed
Initializing fuses
2,054,685 writing to cptra_bootfsm_go
2,243,996 UART:
2,244,349 UART: Running Caliptra ROM ...
2,245,487 UART:
4,449,459 UART: [state] CFI Enabled
4,466,724 UART: [state] LifecycleState = Unprovisioned
4,468,665 UART: [state] DebugLocked = No
4,471,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,475,776 UART: [kat] SHA2-256
4,645,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,656,047 UART: [kat] ++
4,656,531 UART: [kat] sha1
4,669,150 UART: [kat] SHA2-256
4,671,855 UART: [kat] SHA2-384
4,677,144 UART: [kat] SHA2-512-ACC
4,679,493 UART: [kat] ECC-384
6,964,985 UART: [kat] HMAC-384Kdf
6,976,938 UART: [kat] LMS
8,167,017 UART: [kat] --
8,170,993 UART: [cold-reset] ++
8,171,903 UART: [fht] Storing FHT @ 0x50003400
8,183,659 UART: [idev] ++
8,184,232 UART: [idev] CDI.KEYID = 6
8,185,149 UART: [idev] SUBJECT.KEYID = 7
8,186,420 UART: [idev] UDS.KEYID = 0
8,188,672 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,331,765 UART: [idev] Erasing UDS.KEYID = 0
11,477,750 UART: [idev] Using Sha1 for KeyId Algorithm
11,498,548 UART: [idev] --
11,502,703 UART: [ldev] ++
11,503,324 UART: [ldev] CDI.KEYID = 6
11,504,292 UART: [ldev] SUBJECT.KEYID = 5
11,506,087 UART: [ldev] AUTHORITY.KEYID = 7
11,507,296 UART: [ldev] FE.KEYID = 1
11,518,221 UART: [ldev] Erasing FE.KEYID = 1
14,804,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,098,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,113,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,128,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,142,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,162,410 UART: [ldev] --
17,167,789 UART: [fwproc] Waiting for Commands...
17,169,506 UART: [fwproc] Received command 0x46574c44
17,171,761 UART: [fwproc] Received Image of size 113844 bytes
21,215,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,296,780 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,365,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,682,580 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,125,128 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,753,748 >>> mbox cmd response: failed
15,754,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,754,690 >>> mbox cmd response: failed
15,754,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,755,253 >>> mbox cmd response: failed
Initializing fuses
2,056,413 writing to cptra_bootfsm_go
8,239,540 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,172,042 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,052 UART:
192,445 UART: Running Caliptra ROM ...
193,649 UART:
193,810 UART: [state] CFI Enabled
264,124 UART: [state] LifecycleState = Unprovisioned
266,001 UART: [state] DebugLocked = No
268,745 UART: [state] WD Timer not started. Device not locked for debugging
272,087 UART: [kat] SHA2-256
451,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,745 UART: [kat] ++
463,194 UART: [kat] sha1
474,553 UART: [kat] SHA2-256
477,556 UART: [kat] SHA2-384
484,233 UART: [kat] SHA2-512-ACC
487,175 UART: [kat] ECC-384
2,948,013 UART: [kat] HMAC-384Kdf
2,970,835 UART: [kat] LMS
3,500,294 UART: [kat] --
3,505,698 UART: [cold-reset] ++
3,507,910 UART: [fht] FHT @ 0x50003400
3,518,134 UART: [idev] ++
3,518,716 UART: [idev] CDI.KEYID = 6
3,519,623 UART: [idev] SUBJECT.KEYID = 7
3,520,837 UART: [idev] UDS.KEYID = 0
3,523,338 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,135 UART: [idev] Erasing UDS.KEYID = 0
6,026,510 UART: [idev] Sha1 KeyId Algorithm
6,049,863 UART: [idev] --
6,052,456 UART: [ldev] ++
6,053,032 UART: [ldev] CDI.KEYID = 6
6,053,944 UART: [ldev] SUBJECT.KEYID = 5
6,055,109 UART: [ldev] AUTHORITY.KEYID = 7
6,056,339 UART: [ldev] FE.KEYID = 1
6,099,718 UART: [ldev] Erasing FE.KEYID = 1
8,602,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,037 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,044 UART: [ldev] --
10,411,389 UART: [fwproc] Wait for Commands...
10,413,263 UART: [fwproc] Recv command 0x46574c44
10,415,278 UART: [fwproc] Recv'd Img size: 114168 bytes
12,461,747 UART: ROM Fatal Error: 0x000B002F
12,464,863 >>> mbox cmd response: failed
12,465,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,465,607 >>> mbox cmd response: failed
12,465,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,466,158 >>> mbox cmd response: failed
Initializing fuses
2,059,791 writing to cptra_bootfsm_go
2,249,128 UART:
2,249,494 UART: Running Caliptra ROM ...
2,250,540 UART:
2,250,692 UART: [state] CFI Enabled
2,322,763 UART: [state] LifecycleState = Unprovisioned
2,324,646 UART: [state] DebugLocked = No
2,326,281 UART: [state] WD Timer not started. Device not locked for debugging
2,329,108 UART: [kat] SHA2-256
2,508,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,519,800 UART: [kat] ++
2,520,260 UART: [kat] sha1
2,532,654 UART: [kat] SHA2-256
2,535,681 UART: [kat] SHA2-384
2,541,993 UART: [kat] SHA2-512-ACC
2,544,937 UART: [kat] ECC-384
5,006,475 UART: [kat] HMAC-384Kdf
5,029,321 UART: [kat] LMS
5,558,740 UART: [kat] --
5,562,998 UART: [cold-reset] ++
5,563,902 UART: [fht] FHT @ 0x50003400
5,575,635 UART: [idev] ++
5,576,207 UART: [idev] CDI.KEYID = 6
5,577,116 UART: [idev] SUBJECT.KEYID = 7
5,578,329 UART: [idev] UDS.KEYID = 0
5,580,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,724,198 UART: [idev] Erasing UDS.KEYID = 0
8,080,945 UART: [idev] Sha1 KeyId Algorithm
8,103,766 UART: [idev] --
8,109,169 UART: [ldev] ++
8,109,788 UART: [ldev] CDI.KEYID = 6
8,110,868 UART: [ldev] SUBJECT.KEYID = 5
8,111,979 UART: [ldev] AUTHORITY.KEYID = 7
8,113,180 UART: [ldev] FE.KEYID = 1
8,157,533 UART: [ldev] Erasing FE.KEYID = 1
10,664,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,128 UART: [ldev] --
12,470,963 UART: [fwproc] Wait for Commands...
12,473,557 UART: [fwproc] Recv command 0x46574c44
12,475,608 UART: [fwproc] Recv'd Img size: 114168 bytes
15,876,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,943,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,012,605 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,329,851 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,386,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,251,049 >>> mbox cmd response: failed
12,251,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,251,990 >>> mbox cmd response: failed
12,252,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,252,550 >>> mbox cmd response: failed
Initializing fuses
2,058,659 writing to cptra_bootfsm_go
5,426,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,113,252 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,462 UART:
192,827 UART: Running Caliptra ROM ...
193,943 UART:
603,642 UART: [state] CFI Enabled
614,176 UART: [state] LifecycleState = Unprovisioned
616,045 UART: [state] DebugLocked = No
618,667 UART: [state] WD Timer not started. Device not locked for debugging
621,946 UART: [kat] SHA2-256
801,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,667 UART: [kat] ++
813,206 UART: [kat] sha1
824,089 UART: [kat] SHA2-256
827,148 UART: [kat] SHA2-384
833,927 UART: [kat] SHA2-512-ACC
836,885 UART: [kat] ECC-384
3,276,615 UART: [kat] HMAC-384Kdf
3,287,652 UART: [kat] LMS
3,817,143 UART: [kat] --
3,823,157 UART: [cold-reset] ++
3,825,255 UART: [fht] FHT @ 0x50003400
3,836,124 UART: [idev] ++
3,836,694 UART: [idev] CDI.KEYID = 6
3,837,576 UART: [idev] SUBJECT.KEYID = 7
3,838,787 UART: [idev] UDS.KEYID = 0
3,841,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,984,834 UART: [idev] Erasing UDS.KEYID = 0
6,310,936 UART: [idev] Sha1 KeyId Algorithm
6,333,522 UART: [idev] --
6,337,350 UART: [ldev] ++
6,337,917 UART: [ldev] CDI.KEYID = 6
6,338,827 UART: [ldev] SUBJECT.KEYID = 5
6,340,039 UART: [ldev] AUTHORITY.KEYID = 7
6,341,270 UART: [ldev] FE.KEYID = 1
6,350,779 UART: [ldev] Erasing FE.KEYID = 1
8,823,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,879 UART: [ldev] --
10,614,948 UART: [fwproc] Wait for Commands...
10,617,879 UART: [fwproc] Recv command 0x46574c44
10,619,933 UART: [fwproc] Recv'd Img size: 114168 bytes
12,667,514 UART: ROM Fatal Error: 0x000B002F
12,670,636 >>> mbox cmd response: failed
12,671,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,671,392 >>> mbox cmd response: failed
12,671,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,181 >>> mbox cmd response: failed
Initializing fuses
2,053,049 writing to cptra_bootfsm_go
2,242,376 UART:
2,242,853 UART: Running Caliptra ROM ...
2,243,989 UART:
7,794,754 UART: [state] CFI Enabled
7,808,396 UART: [state] LifecycleState = Unprovisioned
7,810,252 UART: [state] DebugLocked = No
7,812,450 UART: [state] WD Timer not started. Device not locked for debugging
7,815,327 UART: [kat] SHA2-256
7,994,449 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,006,012 UART: [kat] ++
8,006,565 UART: [kat] sha1
8,016,549 UART: [kat] SHA2-256
8,019,559 UART: [kat] SHA2-384
8,024,413 UART: [kat] SHA2-512-ACC
8,027,367 UART: [kat] ECC-384
10,468,080 UART: [kat] HMAC-384Kdf
10,479,927 UART: [kat] LMS
11,009,451 UART: [kat] --
11,012,590 UART: [cold-reset] ++
11,014,958 UART: [fht] FHT @ 0x50003400
11,024,934 UART: [idev] ++
11,025,507 UART: [idev] CDI.KEYID = 6
11,026,418 UART: [idev] SUBJECT.KEYID = 7
11,027,577 UART: [idev] UDS.KEYID = 0
11,029,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,173,440 UART: [idev] Erasing UDS.KEYID = 0
13,501,050 UART: [idev] Sha1 KeyId Algorithm
13,523,457 UART: [idev] --
13,528,343 UART: [ldev] ++
13,528,917 UART: [ldev] CDI.KEYID = 6
13,529,831 UART: [ldev] SUBJECT.KEYID = 5
13,530,989 UART: [ldev] AUTHORITY.KEYID = 7
13,532,273 UART: [ldev] FE.KEYID = 1
13,542,595 UART: [ldev] Erasing FE.KEYID = 1
16,013,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,731,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,747,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,763,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,779,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,798,542 UART: [ldev] --
17,803,430 UART: [fwproc] Wait for Commands...
17,805,310 UART: [fwproc] Recv command 0x46574c44
17,807,353 UART: [fwproc] Recv'd Img size: 114168 bytes
21,205,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,278,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,347,265 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,664,524 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,696,511 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,456,844 >>> mbox cmd response: failed
12,457,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,772 >>> mbox cmd response: failed
12,458,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,458,338 >>> mbox cmd response: failed
Initializing fuses
2,059,418 writing to cptra_bootfsm_go
11,102,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,672,931 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,098 UART:
192,456 UART: Running Caliptra ROM ...
193,595 UART:
193,741 UART: [state] CFI Enabled
260,725 UART: [state] LifecycleState = Unprovisioned
263,145 UART: [state] DebugLocked = No
265,722 UART: [state] WD Timer not started. Device not locked for debugging
270,710 UART: [kat] SHA2-256
460,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,375 UART: [kat] ++
471,880 UART: [kat] sha1
482,441 UART: [kat] SHA2-256
485,462 UART: [kat] SHA2-384
491,826 UART: [kat] SHA2-512-ACC
494,388 UART: [kat] ECC-384
2,946,881 UART: [kat] HMAC-384Kdf
2,971,703 UART: [kat] LMS
3,503,476 UART: [kat] --
3,507,956 UART: [cold-reset] ++
3,509,832 UART: [fht] FHT @ 0x50003400
3,522,331 UART: [idev] ++
3,523,013 UART: [idev] CDI.KEYID = 6
3,523,958 UART: [idev] SUBJECT.KEYID = 7
3,525,113 UART: [idev] UDS.KEYID = 0
3,527,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,483 UART: [idev] Erasing UDS.KEYID = 0
6,028,482 UART: [idev] Sha1 KeyId Algorithm
6,051,080 UART: [idev] --
6,054,551 UART: [ldev] ++
6,055,272 UART: [ldev] CDI.KEYID = 6
6,056,194 UART: [ldev] SUBJECT.KEYID = 5
6,057,302 UART: [ldev] AUTHORITY.KEYID = 7
6,058,541 UART: [ldev] FE.KEYID = 1
6,100,293 UART: [ldev] Erasing FE.KEYID = 1
8,606,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,821 UART: [ldev] --
10,415,304 UART: [fwproc] Wait for Commands...
10,416,921 UART: [fwproc] Recv command 0x46574c44
10,419,210 UART: [fwproc] Recv'd Img size: 114168 bytes
12,500,794 UART: ROM Fatal Error: 0x000B002F
12,504,464 >>> mbox cmd response: failed
12,504,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,217 >>> mbox cmd response: failed
12,505,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,780 >>> mbox cmd response: failed
Initializing fuses
2,055,056 writing to cptra_bootfsm_go
2,244,340 UART:
2,244,680 UART: Running Caliptra ROM ...
2,245,815 UART:
2,245,984 UART: [state] CFI Enabled
2,303,521 UART: [state] LifecycleState = Unprovisioned
2,305,918 UART: [state] DebugLocked = No
2,308,180 UART: [state] WD Timer not started. Device not locked for debugging
2,312,160 UART: [kat] SHA2-256
2,502,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,512,773 UART: [kat] ++
2,513,286 UART: [kat] sha1
2,524,989 UART: [kat] SHA2-256
2,528,014 UART: [kat] SHA2-384
2,534,823 UART: [kat] SHA2-512-ACC
2,537,397 UART: [kat] ECC-384
4,988,621 UART: [kat] HMAC-384Kdf
5,013,113 UART: [kat] LMS
5,544,859 UART: [kat] --
5,551,376 UART: [cold-reset] ++
5,553,074 UART: [fht] FHT @ 0x50003400
5,564,933 UART: [idev] ++
5,565,631 UART: [idev] CDI.KEYID = 6
5,566,654 UART: [idev] SUBJECT.KEYID = 7
5,567,761 UART: [idev] UDS.KEYID = 0
5,569,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,713,691 UART: [idev] Erasing UDS.KEYID = 0
8,071,354 UART: [idev] Sha1 KeyId Algorithm
8,094,205 UART: [idev] --
8,099,233 UART: [ldev] ++
8,099,918 UART: [ldev] CDI.KEYID = 6
8,100,834 UART: [ldev] SUBJECT.KEYID = 5
8,101,995 UART: [ldev] AUTHORITY.KEYID = 7
8,103,230 UART: [ldev] FE.KEYID = 1
8,141,046 UART: [ldev] Erasing FE.KEYID = 1
10,651,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,223 UART: [ldev] --
12,455,604 UART: [fwproc] Wait for Commands...
12,457,599 UART: [fwproc] Recv command 0x46574c44
12,459,869 UART: [fwproc] Recv'd Img size: 114168 bytes
15,901,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,982,197 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,098,365 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,639,552 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
3,441,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,299,730 >>> mbox cmd response: failed
12,300,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,300,700 >>> mbox cmd response: failed
12,300,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,281 >>> mbox cmd response: failed
Initializing fuses
2,056,012 writing to cptra_bootfsm_go
5,492,862 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,783,798 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,435 UART:
192,833 UART: Running Caliptra ROM ...
194,038 UART:
603,796 UART: [state] CFI Enabled
615,644 UART: [state] LifecycleState = Unprovisioned
618,033 UART: [state] DebugLocked = No
620,010 UART: [state] WD Timer not started. Device not locked for debugging
623,873 UART: [kat] SHA2-256
813,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,530 UART: [kat] ++
825,119 UART: [kat] sha1
835,871 UART: [kat] SHA2-256
838,892 UART: [kat] SHA2-384
846,063 UART: [kat] SHA2-512-ACC
848,690 UART: [kat] ECC-384
3,290,913 UART: [kat] HMAC-384Kdf
3,304,048 UART: [kat] LMS
3,835,837 UART: [kat] --
3,840,546 UART: [cold-reset] ++
3,841,462 UART: [fht] FHT @ 0x50003400
3,854,078 UART: [idev] ++
3,854,765 UART: [idev] CDI.KEYID = 6
3,855,679 UART: [idev] SUBJECT.KEYID = 7
3,856,895 UART: [idev] UDS.KEYID = 0
3,859,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,064 UART: [idev] Erasing UDS.KEYID = 0
6,332,463 UART: [idev] Sha1 KeyId Algorithm
6,355,642 UART: [idev] --
6,361,199 UART: [ldev] ++
6,361,897 UART: [ldev] CDI.KEYID = 6
6,362,811 UART: [ldev] SUBJECT.KEYID = 5
6,363,973 UART: [ldev] AUTHORITY.KEYID = 7
6,365,211 UART: [ldev] FE.KEYID = 1
6,377,391 UART: [ldev] Erasing FE.KEYID = 1
8,857,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,758 UART: [ldev] --
10,649,348 UART: [fwproc] Wait for Commands...
10,651,502 UART: [fwproc] Recv command 0x46574c44
10,653,825 UART: [fwproc] Recv'd Img size: 114168 bytes
12,732,377 UART: ROM Fatal Error: 0x000B002F
12,736,042 >>> mbox cmd response: failed
12,736,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,801 >>> mbox cmd response: failed
12,737,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,368 >>> mbox cmd response: failed
Initializing fuses
2,055,939 writing to cptra_bootfsm_go
2,245,267 UART:
2,245,607 UART: Running Caliptra ROM ...
2,246,753 UART:
7,728,498 UART: [state] CFI Enabled
7,746,034 UART: [state] LifecycleState = Unprovisioned
7,748,397 UART: [state] DebugLocked = No
7,750,995 UART: [state] WD Timer not started. Device not locked for debugging
7,755,899 UART: [kat] SHA2-256
7,945,814 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,956,572 UART: [kat] ++
7,957,091 UART: [kat] sha1
7,969,502 UART: [kat] SHA2-256
7,972,499 UART: [kat] SHA2-384
7,979,466 UART: [kat] SHA2-512-ACC
7,982,042 UART: [kat] ECC-384
10,424,011 UART: [kat] HMAC-384Kdf
10,436,974 UART: [kat] LMS
10,968,830 UART: [kat] --
10,972,130 UART: [cold-reset] ++
10,974,114 UART: [fht] FHT @ 0x50003400
10,985,039 UART: [idev] ++
10,985,718 UART: [idev] CDI.KEYID = 6
10,986,649 UART: [idev] SUBJECT.KEYID = 7
10,987,915 UART: [idev] UDS.KEYID = 0
10,990,238 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,133,655 UART: [idev] Erasing UDS.KEYID = 0
13,460,449 UART: [idev] Sha1 KeyId Algorithm
13,483,694 UART: [idev] --
13,488,734 UART: [ldev] ++
13,489,469 UART: [ldev] CDI.KEYID = 6
13,490,351 UART: [ldev] SUBJECT.KEYID = 5
13,491,563 UART: [ldev] AUTHORITY.KEYID = 7
13,492,740 UART: [ldev] FE.KEYID = 1
13,505,899 UART: [ldev] Erasing FE.KEYID = 1
15,983,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,702,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,717,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,732,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,747,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,769,359 UART: [ldev] --
17,775,532 UART: [fwproc] Wait for Commands...
17,777,474 UART: [fwproc] Recv command 0x46574c44
17,779,801 UART: [fwproc] Recv'd Img size: 114168 bytes
21,221,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,300,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,416,531 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,957,802 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,755,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,527,724 >>> mbox cmd response: failed
12,528,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,617 >>> mbox cmd response: failed
12,528,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,185 >>> mbox cmd response: failed
Initializing fuses
2,062,235 writing to cptra_bootfsm_go
11,097,394 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,285,237 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,679 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,328 UART: [kat] SHA2-512-ACC
897,229 UART: [kat] ECC-384
902,976 UART: [kat] HMAC-384Kdf
907,502 UART: [kat] LMS
1,475,698 UART: [kat] --
1,476,313 UART: [cold-reset] ++
1,476,785 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,520 UART: [idev] Erasing UDS.KEYID = 0
1,505,446 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,906 UART: [idev] --
1,515,073 UART: [ldev] ++
1,515,241 UART: [ldev] CDI.KEYID = 6
1,515,604 UART: [ldev] SUBJECT.KEYID = 5
1,516,030 UART: [ldev] AUTHORITY.KEYID = 7
1,516,493 UART: [ldev] FE.KEYID = 1
1,521,869 UART: [ldev] Erasing FE.KEYID = 1
1,547,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,772 UART: [ldev] --
1,586,171 UART: [fwproc] Waiting for Commands...
1,587,030 UART: [fwproc] Received command 0x46574c44
1,587,821 UART: [fwproc] Received Image of size 114168 bytes
1,634,397 UART: ROM Fatal Error: 0x000B002F
1,635,556 >>> mbox cmd response: failed
1,635,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,562 >>> mbox cmd response: failed
1,635,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,843 UART: [kat] SHA2-256
881,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,889 UART: [kat] ++
886,041 UART: [kat] sha1
890,177 UART: [kat] SHA2-256
892,115 UART: [kat] SHA2-384
894,718 UART: [kat] SHA2-512-ACC
896,619 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
906,848 UART: [kat] LMS
1,475,044 UART: [kat] --
1,475,811 UART: [cold-reset] ++
1,476,191 UART: [fht] Storing FHT @ 0x50003400
1,478,986 UART: [idev] ++
1,479,154 UART: [idev] CDI.KEYID = 6
1,479,514 UART: [idev] SUBJECT.KEYID = 7
1,479,938 UART: [idev] UDS.KEYID = 0
1,480,283 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,694 UART: [idev] Erasing UDS.KEYID = 0
1,503,782 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,322 UART: [idev] --
1,513,531 UART: [ldev] ++
1,513,699 UART: [ldev] CDI.KEYID = 6
1,514,062 UART: [ldev] SUBJECT.KEYID = 5
1,514,488 UART: [ldev] AUTHORITY.KEYID = 7
1,514,951 UART: [ldev] FE.KEYID = 1
1,520,055 UART: [ldev] Erasing FE.KEYID = 1
1,545,470 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,374 UART: [ldev] --
1,584,719 UART: [fwproc] Waiting for Commands...
1,585,560 UART: [fwproc] Received command 0x46574c44
1,586,351 UART: [fwproc] Received Image of size 114168 bytes
2,881,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,434 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,786 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,489 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,165 >>> mbox cmd response: failed
1,489,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,171 >>> mbox cmd response: failed
1,489,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,177 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,355 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,800 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,322 UART: [kat] SHA2-256
882,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,368 UART: [kat] ++
886,520 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,617 UART: [kat] LMS
1,475,813 UART: [kat] --
1,476,456 UART: [cold-reset] ++
1,476,924 UART: [fht] Storing FHT @ 0x50003400
1,479,553 UART: [idev] ++
1,479,721 UART: [idev] CDI.KEYID = 6
1,480,081 UART: [idev] SUBJECT.KEYID = 7
1,480,505 UART: [idev] UDS.KEYID = 0
1,480,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,403 UART: [idev] Erasing UDS.KEYID = 0
1,505,053 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,531 UART: [idev] --
1,514,596 UART: [ldev] ++
1,514,764 UART: [ldev] CDI.KEYID = 6
1,515,127 UART: [ldev] SUBJECT.KEYID = 5
1,515,553 UART: [ldev] AUTHORITY.KEYID = 7
1,516,016 UART: [ldev] FE.KEYID = 1
1,520,946 UART: [ldev] Erasing FE.KEYID = 1
1,545,811 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,593 UART: [ldev] --
1,584,978 UART: [fwproc] Waiting for Commands...
1,585,803 UART: [fwproc] Received command 0x46574c44
1,586,594 UART: [fwproc] Received Image of size 114168 bytes
1,633,376 UART: ROM Fatal Error: 0x000B002F
1,634,535 >>> mbox cmd response: failed
1,634,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,541 >>> mbox cmd response: failed
1,634,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,093 UART: [kat] SHA2-512-ACC
896,994 UART: [kat] ECC-384
902,855 UART: [kat] HMAC-384Kdf
907,325 UART: [kat] LMS
1,475,521 UART: [kat] --
1,476,580 UART: [cold-reset] ++
1,476,920 UART: [fht] Storing FHT @ 0x50003400
1,479,811 UART: [idev] ++
1,479,979 UART: [idev] CDI.KEYID = 6
1,480,339 UART: [idev] SUBJECT.KEYID = 7
1,480,763 UART: [idev] UDS.KEYID = 0
1,481,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,453 UART: [idev] Erasing UDS.KEYID = 0
1,505,057 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,855 UART: [idev] --
1,514,810 UART: [ldev] ++
1,514,978 UART: [ldev] CDI.KEYID = 6
1,515,341 UART: [ldev] SUBJECT.KEYID = 5
1,515,767 UART: [ldev] AUTHORITY.KEYID = 7
1,516,230 UART: [ldev] FE.KEYID = 1
1,521,458 UART: [ldev] Erasing FE.KEYID = 1
1,547,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,064 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,619 UART: [ldev] --
1,586,990 UART: [fwproc] Waiting for Commands...
1,587,607 UART: [fwproc] Received command 0x46574c44
1,588,398 UART: [fwproc] Received Image of size 114168 bytes
2,884,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,259 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,611 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,326 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,232 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,070 >>> mbox cmd response: failed
1,489,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,076 >>> mbox cmd response: failed
1,489,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,532 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,728 UART: [state] LifecycleState = Unprovisioned
85,383 UART: [state] DebugLocked = No
86,027 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
892,906 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,031 UART: [kat] ++
897,183 UART: [kat] sha1
901,319 UART: [kat] SHA2-256
903,259 UART: [kat] SHA2-384
906,082 UART: [kat] SHA2-512-ACC
907,983 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,527 UART: [cold-reset] ++
1,172,105 UART: [fht] FHT @ 0x50003400
1,174,964 UART: [idev] ++
1,175,132 UART: [idev] CDI.KEYID = 6
1,175,492 UART: [idev] SUBJECT.KEYID = 7
1,175,916 UART: [idev] UDS.KEYID = 0
1,176,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,878 UART: [idev] Erasing UDS.KEYID = 0
1,200,619 UART: [idev] Sha1 KeyId Algorithm
1,209,253 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,688 UART: [ldev] SUBJECT.KEYID = 5
1,211,114 UART: [ldev] AUTHORITY.KEYID = 7
1,211,577 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,020 UART: [fwproc] Wait for Commands...
1,282,634 UART: [fwproc] Recv command 0x46574c44
1,283,362 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,082 UART: ROM Fatal Error: 0x000B002F
1,331,241 >>> mbox cmd response: failed
1,331,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,247 >>> mbox cmd response: failed
1,331,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,799 UART: [kat] SHA2-256
903,739 UART: [kat] SHA2-384
906,656 UART: [kat] SHA2-512-ACC
908,557 UART: [kat] ECC-384
918,540 UART: [kat] HMAC-384Kdf
923,056 UART: [kat] LMS
1,171,384 UART: [kat] --
1,172,165 UART: [cold-reset] ++
1,172,673 UART: [fht] FHT @ 0x50003400
1,175,282 UART: [idev] ++
1,175,450 UART: [idev] CDI.KEYID = 6
1,175,810 UART: [idev] SUBJECT.KEYID = 7
1,176,234 UART: [idev] UDS.KEYID = 0
1,176,579 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,412 UART: [idev] Erasing UDS.KEYID = 0
1,201,525 UART: [idev] Sha1 KeyId Algorithm
1,210,009 UART: [idev] --
1,211,161 UART: [ldev] ++
1,211,329 UART: [ldev] CDI.KEYID = 6
1,211,692 UART: [ldev] SUBJECT.KEYID = 5
1,212,118 UART: [ldev] AUTHORITY.KEYID = 7
1,212,581 UART: [ldev] FE.KEYID = 1
1,217,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,517 UART: [ldev] --
1,283,848 UART: [fwproc] Wait for Commands...
1,284,526 UART: [fwproc] Recv command 0x46574c44
1,285,254 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,912 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,020 >>> mbox cmd response: failed
1,187,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,026 >>> mbox cmd response: failed
1,187,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,032 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,173 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
893,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,630 UART: [kat] ++
897,782 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,603 UART: [kat] SHA2-512-ACC
908,504 UART: [kat] ECC-384
918,235 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,172,122 UART: [cold-reset] ++
1,172,498 UART: [fht] FHT @ 0x50003400
1,175,035 UART: [idev] ++
1,175,203 UART: [idev] CDI.KEYID = 6
1,175,563 UART: [idev] SUBJECT.KEYID = 7
1,175,987 UART: [idev] UDS.KEYID = 0
1,176,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,159 UART: [idev] Erasing UDS.KEYID = 0
1,201,482 UART: [idev] Sha1 KeyId Algorithm
1,210,000 UART: [idev] --
1,211,050 UART: [ldev] ++
1,211,218 UART: [ldev] CDI.KEYID = 6
1,211,581 UART: [ldev] SUBJECT.KEYID = 5
1,212,007 UART: [ldev] AUTHORITY.KEYID = 7
1,212,470 UART: [ldev] FE.KEYID = 1
1,217,660 UART: [ldev] Erasing FE.KEYID = 1
1,243,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,262 UART: [ldev] --
1,282,597 UART: [fwproc] Wait for Commands...
1,283,185 UART: [fwproc] Recv command 0x46574c44
1,283,913 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,461 UART: ROM Fatal Error: 0x000B002F
1,331,620 >>> mbox cmd response: failed
1,331,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,626 >>> mbox cmd response: failed
1,331,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,090 UART: [kat] SHA2-256
904,030 UART: [kat] SHA2-384
906,733 UART: [kat] SHA2-512-ACC
908,634 UART: [kat] ECC-384
918,543 UART: [kat] HMAC-384Kdf
923,223 UART: [kat] LMS
1,171,551 UART: [kat] --
1,172,448 UART: [cold-reset] ++
1,172,822 UART: [fht] FHT @ 0x50003400
1,175,447 UART: [idev] ++
1,175,615 UART: [idev] CDI.KEYID = 6
1,175,975 UART: [idev] SUBJECT.KEYID = 7
1,176,399 UART: [idev] UDS.KEYID = 0
1,176,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,745 UART: [idev] Erasing UDS.KEYID = 0
1,202,298 UART: [idev] Sha1 KeyId Algorithm
1,210,694 UART: [idev] --
1,211,644 UART: [ldev] ++
1,211,812 UART: [ldev] CDI.KEYID = 6
1,212,175 UART: [ldev] SUBJECT.KEYID = 5
1,212,601 UART: [ldev] AUTHORITY.KEYID = 7
1,213,064 UART: [ldev] FE.KEYID = 1
1,218,350 UART: [ldev] Erasing FE.KEYID = 1
1,244,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,634 UART: [ldev] --
1,283,901 UART: [fwproc] Wait for Commands...
1,284,483 UART: [fwproc] Recv command 0x46574c44
1,285,211 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,816 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,463 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,682 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,941 >>> mbox cmd response: failed
1,187,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,947 >>> mbox cmd response: failed
1,187,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,418 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,306 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,889 UART: [kat] SHA2-256
901,829 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,669 UART: [cold-reset] ++
1,170,131 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,174,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,715 UART: [idev] Erasing UDS.KEYID = 0
1,199,111 UART: [idev] Sha1 KeyId Algorithm
1,208,053 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,242,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,156 UART: [ldev] --
1,281,582 UART: [fwproc] Wait for Commands...
1,282,339 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,837 UART: ROM Fatal Error: 0x000B002F
1,331,996 >>> mbox cmd response: failed
1,331,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,002 >>> mbox cmd response: failed
1,332,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,159 UART: [kat] ++
895,311 UART: [kat] sha1
899,571 UART: [kat] SHA2-256
901,511 UART: [kat] SHA2-384
904,070 UART: [kat] SHA2-512-ACC
905,971 UART: [kat] ECC-384
916,010 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,174,377 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,255 UART: [idev] Erasing UDS.KEYID = 0
1,199,069 UART: [idev] Sha1 KeyId Algorithm
1,208,085 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,282 UART: [fwproc] Wait for Commands...
1,282,101 UART: [fwproc] Recv command 0x46574c44
1,282,834 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,629 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,938 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,426 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,359 >>> mbox cmd response: failed
1,184,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,365 >>> mbox cmd response: failed
1,184,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,974 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,113 UART: [kat] HMAC-384Kdf
920,705 UART: [kat] LMS
1,169,017 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,169,934 UART: [fht] FHT @ 0x50003400
1,172,510 UART: [idev] ++
1,172,678 UART: [idev] CDI.KEYID = 6
1,173,039 UART: [idev] SUBJECT.KEYID = 7
1,173,464 UART: [idev] UDS.KEYID = 0
1,173,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,650 UART: [idev] Erasing UDS.KEYID = 0
1,198,910 UART: [idev] Sha1 KeyId Algorithm
1,207,874 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,409 UART: [ldev] SUBJECT.KEYID = 5
1,209,836 UART: [ldev] AUTHORITY.KEYID = 7
1,210,299 UART: [ldev] FE.KEYID = 1
1,215,447 UART: [ldev] Erasing FE.KEYID = 1
1,241,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,015 UART: [ldev] --
1,280,443 UART: [fwproc] Wait for Commands...
1,281,070 UART: [fwproc] Recv command 0x46574c44
1,281,803 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,418 UART: ROM Fatal Error: 0x000B002F
1,329,577 >>> mbox cmd response: failed
1,329,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,583 >>> mbox cmd response: failed
1,329,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,901 UART: [state] LifecycleState = Unprovisioned
86,556 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
891,933 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,062 UART: [kat] ++
896,214 UART: [kat] sha1
900,410 UART: [kat] SHA2-256
902,350 UART: [kat] SHA2-384
905,159 UART: [kat] SHA2-512-ACC
907,060 UART: [kat] ECC-384
916,999 UART: [kat] HMAC-384Kdf
921,703 UART: [kat] LMS
1,170,015 UART: [kat] --
1,170,720 UART: [cold-reset] ++
1,171,182 UART: [fht] FHT @ 0x50003400
1,173,814 UART: [idev] ++
1,173,982 UART: [idev] CDI.KEYID = 6
1,174,343 UART: [idev] SUBJECT.KEYID = 7
1,174,768 UART: [idev] UDS.KEYID = 0
1,175,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,556 UART: [idev] Erasing UDS.KEYID = 0
1,199,948 UART: [idev] Sha1 KeyId Algorithm
1,208,686 UART: [idev] --
1,209,869 UART: [ldev] ++
1,210,037 UART: [ldev] CDI.KEYID = 6
1,210,401 UART: [ldev] SUBJECT.KEYID = 5
1,210,828 UART: [ldev] AUTHORITY.KEYID = 7
1,211,291 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,060 UART: [fwproc] Recv command 0x46574c44
1,282,793 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,034 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,343 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,983 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,079 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,296 >>> mbox cmd response: failed
1,184,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,302 >>> mbox cmd response: failed
1,184,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,308 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,867 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,238 UART:
192,602 UART: Running Caliptra ROM ...
193,700 UART:
193,849 UART: [state] CFI Enabled
264,136 UART: [state] LifecycleState = Unprovisioned
266,110 UART: [state] DebugLocked = No
268,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,624 UART: [kat] SHA2-256
443,351 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,837 UART: [kat] ++
454,424 UART: [kat] sha1
464,930 UART: [kat] SHA2-256
467,615 UART: [kat] SHA2-384
474,561 UART: [kat] SHA2-512-ACC
476,952 UART: [kat] ECC-384
2,768,027 UART: [kat] HMAC-384Kdf
2,780,491 UART: [kat] LMS
3,970,789 UART: [kat] --
3,975,809 UART: [cold-reset] ++
3,978,134 UART: [fht] Storing FHT @ 0x50003400
3,989,352 UART: [idev] ++
3,989,998 UART: [idev] CDI.KEYID = 6
3,990,927 UART: [idev] SUBJECT.KEYID = 7
3,992,140 UART: [idev] UDS.KEYID = 0
3,995,130 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,138,555 UART: [idev] Erasing UDS.KEYID = 0
7,327,212 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,840 UART: [idev] --
7,354,566 UART: [ldev] ++
7,355,141 UART: [ldev] CDI.KEYID = 6
7,356,108 UART: [ldev] SUBJECT.KEYID = 5
7,357,329 UART: [ldev] AUTHORITY.KEYID = 7
7,358,562 UART: [ldev] FE.KEYID = 1
7,403,719 UART: [ldev] Erasing FE.KEYID = 1
10,735,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,276 UART: [ldev] --
13,098,558 UART: [fwproc] Waiting for Commands...
13,101,045 UART: [fwproc] Received command 0x46574c44
13,103,241 UART: [fwproc] Received Image of size 113844 bytes
13,158,328 UART: ROM Fatal Error: 0x000B0001
13,161,805 >>> mbox cmd response: failed
13,162,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,162,565 >>> mbox cmd response: failed
13,162,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,163,122 >>> mbox cmd response: failed
Initializing fuses
2,058,068 writing to cptra_bootfsm_go
2,247,403 UART:
2,247,782 UART: Running Caliptra ROM ...
2,249,030 UART:
2,249,203 UART: [state] CFI Enabled
2,312,601 UART: [state] LifecycleState = Unprovisioned
2,314,506 UART: [state] DebugLocked = No
2,316,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,397 UART: [kat] SHA2-256
2,491,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,622 UART: [kat] ++
2,502,166 UART: [kat] sha1
2,513,442 UART: [kat] SHA2-256
2,516,135 UART: [kat] SHA2-384
2,521,309 UART: [kat] SHA2-512-ACC
2,523,667 UART: [kat] ECC-384
4,817,984 UART: [kat] HMAC-384Kdf
4,828,811 UART: [kat] LMS
6,019,126 UART: [kat] --
6,022,002 UART: [cold-reset] ++
6,023,411 UART: [fht] Storing FHT @ 0x50003400
6,034,902 UART: [idev] ++
6,035,467 UART: [idev] CDI.KEYID = 6
6,036,351 UART: [idev] SUBJECT.KEYID = 7
6,037,626 UART: [idev] UDS.KEYID = 0
6,040,157 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,183,487 UART: [idev] Erasing UDS.KEYID = 0
9,375,706 UART: [idev] Using Sha1 for KeyId Algorithm
9,397,908 UART: [idev] --
9,400,709 UART: [ldev] ++
9,401,275 UART: [ldev] CDI.KEYID = 6
9,402,243 UART: [ldev] SUBJECT.KEYID = 5
9,403,523 UART: [ldev] AUTHORITY.KEYID = 7
9,404,715 UART: [ldev] FE.KEYID = 1
9,451,041 UART: [ldev] Erasing FE.KEYID = 1
12,783,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,075,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,090,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,104,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,119,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,137,096 UART: [ldev] --
15,142,153 UART: [fwproc] Waiting for Commands...
15,145,490 UART: [fwproc] Received command 0x46574c44
15,147,675 UART: [fwproc] Received Image of size 113844 bytes
19,195,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,268,634 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,337,497 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,654,160 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,806,027 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,917,383 >>> mbox cmd response: failed
12,918,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,367 >>> mbox cmd response: failed
12,918,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,936 >>> mbox cmd response: failed
Initializing fuses
2,046,041 writing to cptra_bootfsm_go
5,838,910 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,905,504 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,518 UART:
192,870 UART: Running Caliptra ROM ...
194,002 UART:
603,875 UART: [state] CFI Enabled
616,945 UART: [state] LifecycleState = Unprovisioned
618,905 UART: [state] DebugLocked = No
620,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,299 UART: [kat] SHA2-256
795,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,603 UART: [kat] ++
806,133 UART: [kat] sha1
817,658 UART: [kat] SHA2-256
820,334 UART: [kat] SHA2-384
826,682 UART: [kat] SHA2-512-ACC
829,028 UART: [kat] ECC-384
3,115,251 UART: [kat] HMAC-384Kdf
3,126,524 UART: [kat] LMS
4,316,623 UART: [kat] --
4,320,948 UART: [cold-reset] ++
4,323,258 UART: [fht] Storing FHT @ 0x50003400
4,334,848 UART: [idev] ++
4,335,421 UART: [idev] CDI.KEYID = 6
4,336,402 UART: [idev] SUBJECT.KEYID = 7
4,337,619 UART: [idev] UDS.KEYID = 0
4,340,342 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,526 UART: [idev] Erasing UDS.KEYID = 0
7,623,053 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,898 UART: [idev] --
7,649,523 UART: [ldev] ++
7,650,133 UART: [ldev] CDI.KEYID = 6
7,651,163 UART: [ldev] SUBJECT.KEYID = 5
7,652,273 UART: [ldev] AUTHORITY.KEYID = 7
7,653,569 UART: [ldev] FE.KEYID = 1
7,666,108 UART: [ldev] Erasing FE.KEYID = 1
10,953,239 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,280 UART: [ldev] --
13,311,679 UART: [fwproc] Waiting for Commands...
13,313,562 UART: [fwproc] Received command 0x46574c44
13,315,798 UART: [fwproc] Received Image of size 113844 bytes
13,372,067 UART: ROM Fatal Error: 0x000B0001
13,375,587 >>> mbox cmd response: failed
13,375,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,376,319 >>> mbox cmd response: failed
13,376,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,376,881 >>> mbox cmd response: failed
Initializing fuses
2,049,348 writing to cptra_bootfsm_go
2,238,664 UART:
2,239,029 UART: Running Caliptra ROM ...
2,240,171 UART:
7,090,654 UART: [state] CFI Enabled
7,099,039 UART: [state] LifecycleState = Unprovisioned
7,101,015 UART: [state] DebugLocked = No
7,103,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,109,362 UART: [kat] SHA2-256
7,279,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,289,667 UART: [kat] ++
7,290,156 UART: [kat] sha1
7,301,316 UART: [kat] SHA2-256
7,304,016 UART: [kat] SHA2-384
7,309,525 UART: [kat] SHA2-512-ACC
7,311,919 UART: [kat] ECC-384
9,594,797 UART: [kat] HMAC-384Kdf
9,607,761 UART: [kat] LMS
10,797,864 UART: [kat] --
10,800,740 UART: [cold-reset] ++
10,802,192 UART: [fht] Storing FHT @ 0x50003400
10,813,130 UART: [idev] ++
10,813,703 UART: [idev] CDI.KEYID = 6
10,814,665 UART: [idev] SUBJECT.KEYID = 7
10,815,879 UART: [idev] UDS.KEYID = 0
10,818,735 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,961,883 UART: [idev] Erasing UDS.KEYID = 0
14,105,169 UART: [idev] Using Sha1 for KeyId Algorithm
14,126,973 UART: [idev] --
14,130,947 UART: [ldev] ++
14,131,524 UART: [ldev] CDI.KEYID = 6
14,132,540 UART: [ldev] SUBJECT.KEYID = 5
14,133,751 UART: [ldev] AUTHORITY.KEYID = 7
14,134,954 UART: [ldev] FE.KEYID = 1
14,146,306 UART: [ldev] Erasing FE.KEYID = 1
17,434,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,727,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,742,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,756,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,771,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,789,798 UART: [ldev] --
19,795,263 UART: [fwproc] Waiting for Commands...
19,798,400 UART: [fwproc] Received command 0x46574c44
19,800,590 UART: [fwproc] Received Image of size 113844 bytes
23,853,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,932,637 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,001,501 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,317,579 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,139,853 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,122,711 >>> mbox cmd response: failed
13,123,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,123,793 >>> mbox cmd response: failed
13,124,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,124,399 >>> mbox cmd response: failed
Initializing fuses
2,046,134 writing to cptra_bootfsm_go
10,872,678 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,809,406 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,305 UART:
192,691 UART: Running Caliptra ROM ...
193,810 UART:
193,955 UART: [state] CFI Enabled
259,528 UART: [state] LifecycleState = Unprovisioned
261,445 UART: [state] DebugLocked = No
263,391 UART: [state] WD Timer not started. Device not locked for debugging
267,979 UART: [kat] SHA2-256
447,105 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,678 UART: [kat] ++
459,221 UART: [kat] sha1
468,811 UART: [kat] SHA2-256
471,812 UART: [kat] SHA2-384
478,066 UART: [kat] SHA2-512-ACC
481,054 UART: [kat] ECC-384
2,948,689 UART: [kat] HMAC-384Kdf
2,969,679 UART: [kat] LMS
3,499,090 UART: [kat] --
3,503,844 UART: [cold-reset] ++
3,506,205 UART: [fht] FHT @ 0x50003400
3,517,017 UART: [idev] ++
3,517,585 UART: [idev] CDI.KEYID = 6
3,518,528 UART: [idev] SUBJECT.KEYID = 7
3,519,691 UART: [idev] UDS.KEYID = 0
3,522,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,387 UART: [idev] Erasing UDS.KEYID = 0
6,023,829 UART: [idev] Sha1 KeyId Algorithm
6,046,161 UART: [idev] --
6,050,429 UART: [ldev] ++
6,051,009 UART: [ldev] CDI.KEYID = 6
6,052,115 UART: [ldev] SUBJECT.KEYID = 5
6,053,230 UART: [ldev] AUTHORITY.KEYID = 7
6,054,356 UART: [ldev] FE.KEYID = 1
6,099,801 UART: [ldev] Erasing FE.KEYID = 1
8,603,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,843 UART: [ldev] --
10,413,403 UART: [fwproc] Wait for Commands...
10,415,346 UART: [fwproc] Recv command 0x46574c44
10,417,443 UART: [fwproc] Recv'd Img size: 114168 bytes
10,470,394 UART: ROM Fatal Error: 0x000B0001
10,473,478 >>> mbox cmd response: failed
10,473,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,132 >>> mbox cmd response: failed
10,474,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,692 >>> mbox cmd response: failed
Initializing fuses
2,052,295 writing to cptra_bootfsm_go
2,241,635 UART:
2,241,983 UART: Running Caliptra ROM ...
2,243,029 UART:
2,243,186 UART: [state] CFI Enabled
2,309,696 UART: [state] LifecycleState = Unprovisioned
2,311,583 UART: [state] DebugLocked = No
2,314,241 UART: [state] WD Timer not started. Device not locked for debugging
2,318,581 UART: [kat] SHA2-256
2,497,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,267 UART: [kat] ++
2,509,728 UART: [kat] sha1
2,521,638 UART: [kat] SHA2-256
2,524,660 UART: [kat] SHA2-384
2,529,891 UART: [kat] SHA2-512-ACC
2,532,892 UART: [kat] ECC-384
4,993,767 UART: [kat] HMAC-384Kdf
5,016,519 UART: [kat] LMS
5,545,932 UART: [kat] --
5,550,359 UART: [cold-reset] ++
5,551,317 UART: [fht] FHT @ 0x50003400
5,562,647 UART: [idev] ++
5,563,213 UART: [idev] CDI.KEYID = 6
5,564,097 UART: [idev] SUBJECT.KEYID = 7
5,565,311 UART: [idev] UDS.KEYID = 0
5,567,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,711,713 UART: [idev] Erasing UDS.KEYID = 0
8,070,879 UART: [idev] Sha1 KeyId Algorithm
8,094,428 UART: [idev] --
8,098,105 UART: [ldev] ++
8,098,673 UART: [ldev] CDI.KEYID = 6
8,099,641 UART: [ldev] SUBJECT.KEYID = 5
8,100,807 UART: [ldev] AUTHORITY.KEYID = 7
8,102,059 UART: [ldev] FE.KEYID = 1
8,145,390 UART: [ldev] Erasing FE.KEYID = 1
10,651,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,493 UART: [ldev] --
12,457,849 UART: [fwproc] Wait for Commands...
12,460,808 UART: [fwproc] Recv command 0x46574c44
12,462,860 UART: [fwproc] Recv'd Img size: 114168 bytes
15,862,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,004,251 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,321,246 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,356,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,230,325 >>> mbox cmd response: failed
10,230,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,231,280 >>> mbox cmd response: failed
10,231,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,231,848 >>> mbox cmd response: failed
Initializing fuses
2,049,754 writing to cptra_bootfsm_go
5,436,997 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,145,039 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,640 UART:
192,995 UART: Running Caliptra ROM ...
194,081 UART:
603,832 UART: [state] CFI Enabled
617,882 UART: [state] LifecycleState = Unprovisioned
619,762 UART: [state] DebugLocked = No
621,706 UART: [state] WD Timer not started. Device not locked for debugging
625,328 UART: [kat] SHA2-256
804,446 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,997 UART: [kat] ++
816,445 UART: [kat] sha1
827,586 UART: [kat] SHA2-256
830,629 UART: [kat] SHA2-384
836,504 UART: [kat] SHA2-512-ACC
839,495 UART: [kat] ECC-384
3,285,173 UART: [kat] HMAC-384Kdf
3,298,122 UART: [kat] LMS
3,827,598 UART: [kat] --
3,832,177 UART: [cold-reset] ++
3,834,547 UART: [fht] FHT @ 0x50003400
3,846,390 UART: [idev] ++
3,846,952 UART: [idev] CDI.KEYID = 6
3,847,871 UART: [idev] SUBJECT.KEYID = 7
3,849,029 UART: [idev] UDS.KEYID = 0
3,851,992 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,995,616 UART: [idev] Erasing UDS.KEYID = 0
6,324,773 UART: [idev] Sha1 KeyId Algorithm
6,348,007 UART: [idev] --
6,352,254 UART: [ldev] ++
6,352,840 UART: [ldev] CDI.KEYID = 6
6,353,752 UART: [ldev] SUBJECT.KEYID = 5
6,354,930 UART: [ldev] AUTHORITY.KEYID = 7
6,356,167 UART: [ldev] FE.KEYID = 1
6,368,164 UART: [ldev] Erasing FE.KEYID = 1
8,844,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,313 UART: [ldev] --
10,635,036 UART: [fwproc] Wait for Commands...
10,637,512 UART: [fwproc] Recv command 0x46574c44
10,639,602 UART: [fwproc] Recv'd Img size: 114168 bytes
10,692,473 UART: ROM Fatal Error: 0x000B0001
10,695,553 >>> mbox cmd response: failed
10,695,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,302 >>> mbox cmd response: failed
10,696,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,882 >>> mbox cmd response: failed
Initializing fuses
2,050,159 writing to cptra_bootfsm_go
2,239,513 UART:
2,239,854 UART: Running Caliptra ROM ...
2,240,992 UART:
9,765,396 UART: [state] CFI Enabled
9,779,224 UART: [state] LifecycleState = Unprovisioned
9,781,085 UART: [state] DebugLocked = No
9,783,014 UART: [state] WD Timer not started. Device not locked for debugging
9,786,340 UART: [kat] SHA2-256
9,965,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,977,065 UART: [kat] ++
9,977,533 UART: [kat] sha1
9,987,991 UART: [kat] SHA2-256
9,991,058 UART: [kat] SHA2-384
9,997,697 UART: [kat] SHA2-512-ACC
10,000,701 UART: [kat] ECC-384
12,444,740 UART: [kat] HMAC-384Kdf
12,457,350 UART: [kat] LMS
12,986,799 UART: [kat] --
12,990,787 UART: [cold-reset] ++
12,992,823 UART: [fht] FHT @ 0x50003400
13,005,040 UART: [idev] ++
13,005,610 UART: [idev] CDI.KEYID = 6
13,006,656 UART: [idev] SUBJECT.KEYID = 7
13,007,778 UART: [idev] UDS.KEYID = 0
13,010,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,154,201 UART: [idev] Erasing UDS.KEYID = 0
15,477,105 UART: [idev] Sha1 KeyId Algorithm
15,499,787 UART: [idev] --
15,504,024 UART: [ldev] ++
15,504,603 UART: [ldev] CDI.KEYID = 6
15,505,483 UART: [ldev] SUBJECT.KEYID = 5
15,506,697 UART: [ldev] AUTHORITY.KEYID = 7
15,507,985 UART: [ldev] FE.KEYID = 1
15,518,707 UART: [ldev] Erasing FE.KEYID = 1
17,992,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,711,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,727,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,743,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,759,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,779,247 UART: [ldev] --
19,783,216 UART: [fwproc] Wait for Commands...
19,786,251 UART: [fwproc] Recv command 0x46574c44
19,788,355 UART: [fwproc] Recv'd Img size: 114168 bytes
23,185,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,258,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,327,542 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,645,105 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,490 writing to cptra_bootfsm_go
3,703,278 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,471,076 >>> mbox cmd response: failed
10,471,615 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,471,953 >>> mbox cmd response: failed
10,472,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,515 >>> mbox cmd response: failed
Initializing fuses
2,046,056 writing to cptra_bootfsm_go
13,090,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,663,531 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,040 UART:
192,418 UART: Running Caliptra ROM ...
193,538 UART:
193,682 UART: [state] CFI Enabled
262,099 UART: [state] LifecycleState = Unprovisioned
264,523 UART: [state] DebugLocked = No
266,557 UART: [state] WD Timer not started. Device not locked for debugging
271,051 UART: [kat] SHA2-256
460,896 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,649 UART: [kat] ++
472,126 UART: [kat] sha1
483,331 UART: [kat] SHA2-256
486,347 UART: [kat] SHA2-384
493,843 UART: [kat] SHA2-512-ACC
496,391 UART: [kat] ECC-384
2,947,537 UART: [kat] HMAC-384Kdf
2,970,881 UART: [kat] LMS
3,502,620 UART: [kat] --
3,505,849 UART: [cold-reset] ++
3,507,249 UART: [fht] FHT @ 0x50003400
3,518,665 UART: [idev] ++
3,519,396 UART: [idev] CDI.KEYID = 6
3,520,458 UART: [idev] SUBJECT.KEYID = 7
3,521,562 UART: [idev] UDS.KEYID = 0
3,524,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,265 UART: [idev] Erasing UDS.KEYID = 0
6,025,384 UART: [idev] Sha1 KeyId Algorithm
6,047,703 UART: [idev] --
6,051,433 UART: [ldev] ++
6,052,121 UART: [ldev] CDI.KEYID = 6
6,053,038 UART: [ldev] SUBJECT.KEYID = 5
6,054,203 UART: [ldev] AUTHORITY.KEYID = 7
6,055,385 UART: [ldev] FE.KEYID = 1
6,100,324 UART: [ldev] Erasing FE.KEYID = 1
8,604,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,800 UART: [ldev] --
10,416,910 UART: [fwproc] Wait for Commands...
10,418,527 UART: [fwproc] Recv command 0x46574c44
10,420,795 UART: [fwproc] Recv'd Img size: 114168 bytes
10,504,617 UART: ROM Fatal Error: 0x000B0001
10,508,317 >>> mbox cmd response: failed
10,508,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,509,047 >>> mbox cmd response: failed
10,509,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,509,615 >>> mbox cmd response: failed
Initializing fuses
2,050,653 writing to cptra_bootfsm_go
2,239,925 UART:
2,240,391 UART: Running Caliptra ROM ...
2,241,452 UART:
2,241,607 UART: [state] CFI Enabled
2,305,470 UART: [state] LifecycleState = Unprovisioned
2,307,857 UART: [state] DebugLocked = No
2,310,447 UART: [state] WD Timer not started. Device not locked for debugging
2,315,671 UART: [kat] SHA2-256
2,505,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,307 UART: [kat] ++
2,516,795 UART: [kat] sha1
2,529,365 UART: [kat] SHA2-256
2,532,353 UART: [kat] SHA2-384
2,538,632 UART: [kat] SHA2-512-ACC
2,541,192 UART: [kat] ECC-384
4,988,445 UART: [kat] HMAC-384Kdf
5,012,781 UART: [kat] LMS
5,544,583 UART: [kat] --
5,549,343 UART: [cold-reset] ++
5,551,168 UART: [fht] FHT @ 0x50003400
5,562,902 UART: [idev] ++
5,563,635 UART: [idev] CDI.KEYID = 6
5,564,599 UART: [idev] SUBJECT.KEYID = 7
5,565,760 UART: [idev] UDS.KEYID = 0
5,568,577 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,712,274 UART: [idev] Erasing UDS.KEYID = 0
8,071,942 UART: [idev] Sha1 KeyId Algorithm
8,095,199 UART: [idev] --
8,099,170 UART: [ldev] ++
8,099,914 UART: [ldev] CDI.KEYID = 6
8,100,828 UART: [ldev] SUBJECT.KEYID = 5
8,101,986 UART: [ldev] AUTHORITY.KEYID = 7
8,103,218 UART: [ldev] FE.KEYID = 1
8,142,774 UART: [ldev] Erasing FE.KEYID = 1
10,651,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,413,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,438 UART: [ldev] --
12,456,512 UART: [fwproc] Wait for Commands...
12,458,827 UART: [fwproc] Recv command 0x46574c44
12,461,133 UART: [fwproc] Recv'd Img size: 114168 bytes
15,905,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,099,238 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,640,641 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,442,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,297,778 >>> mbox cmd response: failed
10,298,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,298,653 >>> mbox cmd response: failed
10,298,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,299,211 >>> mbox cmd response: failed
Initializing fuses
2,045,956 writing to cptra_bootfsm_go
5,471,075 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,768,229 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,434 UART:
192,807 UART: Running Caliptra ROM ...
194,006 UART:
603,623 UART: [state] CFI Enabled
617,868 UART: [state] LifecycleState = Unprovisioned
620,242 UART: [state] DebugLocked = No
621,949 UART: [state] WD Timer not started. Device not locked for debugging
626,715 UART: [kat] SHA2-256
816,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,374 UART: [kat] ++
827,909 UART: [kat] sha1
839,119 UART: [kat] SHA2-256
842,130 UART: [kat] SHA2-384
848,921 UART: [kat] SHA2-512-ACC
851,483 UART: [kat] ECC-384
3,291,435 UART: [kat] HMAC-384Kdf
3,303,674 UART: [kat] LMS
3,835,488 UART: [kat] --
3,839,678 UART: [cold-reset] ++
3,841,455 UART: [fht] FHT @ 0x50003400
3,852,381 UART: [idev] ++
3,853,109 UART: [idev] CDI.KEYID = 6
3,854,125 UART: [idev] SUBJECT.KEYID = 7
3,855,226 UART: [idev] UDS.KEYID = 0
3,858,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,936 UART: [idev] Erasing UDS.KEYID = 0
6,329,211 UART: [idev] Sha1 KeyId Algorithm
6,351,290 UART: [idev] --
6,355,897 UART: [ldev] ++
6,356,601 UART: [ldev] CDI.KEYID = 6
6,357,519 UART: [ldev] SUBJECT.KEYID = 5
6,358,685 UART: [ldev] AUTHORITY.KEYID = 7
6,359,922 UART: [ldev] FE.KEYID = 1
6,370,032 UART: [ldev] Erasing FE.KEYID = 1
8,843,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,561,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,591,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,606,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,626,532 UART: [ldev] --
10,631,261 UART: [fwproc] Wait for Commands...
10,632,903 UART: [fwproc] Recv command 0x46574c44
10,635,173 UART: [fwproc] Recv'd Img size: 114168 bytes
10,719,591 UART: ROM Fatal Error: 0x000B0001
10,723,223 >>> mbox cmd response: failed
10,723,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,723,954 >>> mbox cmd response: failed
10,724,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,724,457 >>> mbox cmd response: failed
Initializing fuses
2,050,047 writing to cptra_bootfsm_go
2,239,369 UART:
2,239,718 UART: Running Caliptra ROM ...
2,240,765 UART:
9,733,647 UART: [state] CFI Enabled
9,749,169 UART: [state] LifecycleState = Unprovisioned
9,751,588 UART: [state] DebugLocked = No
9,753,702 UART: [state] WD Timer not started. Device not locked for debugging
9,758,762 UART: [kat] SHA2-256
9,948,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,959,409 UART: [kat] ++
9,959,926 UART: [kat] sha1
9,971,682 UART: [kat] SHA2-256
9,974,706 UART: [kat] SHA2-384
9,980,538 UART: [kat] SHA2-512-ACC
9,983,163 UART: [kat] ECC-384
12,422,928 UART: [kat] HMAC-384Kdf
12,435,871 UART: [kat] LMS
12,967,719 UART: [kat] --
12,972,475 UART: [cold-reset] ++
12,974,944 UART: [fht] FHT @ 0x50003400
12,987,014 UART: [idev] ++
12,987,692 UART: [idev] CDI.KEYID = 6
12,988,629 UART: [idev] SUBJECT.KEYID = 7
12,989,839 UART: [idev] UDS.KEYID = 0
12,992,729 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,136,243 UART: [idev] Erasing UDS.KEYID = 0
15,460,639 UART: [idev] Sha1 KeyId Algorithm
15,484,630 UART: [idev] --
15,489,595 UART: [ldev] ++
15,490,278 UART: [ldev] CDI.KEYID = 6
15,491,193 UART: [ldev] SUBJECT.KEYID = 5
15,492,352 UART: [ldev] AUTHORITY.KEYID = 7
15,493,581 UART: [ldev] FE.KEYID = 1
15,504,333 UART: [ldev] Erasing FE.KEYID = 1
17,984,902 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,703,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,718,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,734,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,749,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,769,659 UART: [ldev] --
19,775,491 UART: [fwproc] Wait for Commands...
19,778,707 UART: [fwproc] Recv command 0x46574c44
19,780,980 UART: [fwproc] Recv'd Img size: 114168 bytes
23,229,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,309,327 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,425,448 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,966,458 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,752,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,524,207 >>> mbox cmd response: failed
10,524,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,065 >>> mbox cmd response: failed
10,525,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,651 >>> mbox cmd response: failed
Initializing fuses
2,053,476 writing to cptra_bootfsm_go
13,103,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,295,331 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,373 UART: [kat] SHA2-256
892,311 UART: [kat] SHA2-384
895,112 UART: [kat] SHA2-512-ACC
897,013 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,340 UART: [kat] LMS
1,475,536 UART: [kat] --
1,476,529 UART: [cold-reset] ++
1,477,105 UART: [fht] Storing FHT @ 0x50003400
1,479,924 UART: [idev] ++
1,480,092 UART: [idev] CDI.KEYID = 6
1,480,452 UART: [idev] SUBJECT.KEYID = 7
1,480,876 UART: [idev] UDS.KEYID = 0
1,481,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,518 UART: [idev] Erasing UDS.KEYID = 0
1,505,262 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,882 UART: [idev] --
1,514,909 UART: [ldev] ++
1,515,077 UART: [ldev] CDI.KEYID = 6
1,515,440 UART: [ldev] SUBJECT.KEYID = 5
1,515,866 UART: [ldev] AUTHORITY.KEYID = 7
1,516,329 UART: [ldev] FE.KEYID = 1
1,521,229 UART: [ldev] Erasing FE.KEYID = 1
1,546,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,676 UART: [ldev] --
1,585,995 UART: [fwproc] Waiting for Commands...
1,586,658 UART: [fwproc] Received command 0x46574c44
1,587,449 UART: [fwproc] Received Image of size 114168 bytes
1,606,349 UART: ROM Fatal Error: 0x000B0001
1,607,506 >>> mbox cmd response: failed
1,607,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,512 >>> mbox cmd response: failed
1,607,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,518 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,889 UART: [kat] SHA2-256
881,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,935 UART: [kat] ++
886,087 UART: [kat] sha1
890,133 UART: [kat] SHA2-256
892,071 UART: [kat] SHA2-384
894,958 UART: [kat] SHA2-512-ACC
896,859 UART: [kat] ECC-384
902,208 UART: [kat] HMAC-384Kdf
907,010 UART: [kat] LMS
1,475,206 UART: [kat] --
1,475,903 UART: [cold-reset] ++
1,476,287 UART: [fht] Storing FHT @ 0x50003400
1,478,940 UART: [idev] ++
1,479,108 UART: [idev] CDI.KEYID = 6
1,479,468 UART: [idev] SUBJECT.KEYID = 7
1,479,892 UART: [idev] UDS.KEYID = 0
1,480,237 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,088 UART: [idev] Erasing UDS.KEYID = 0
1,504,920 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,408 UART: [idev] --
1,514,423 UART: [ldev] ++
1,514,591 UART: [ldev] CDI.KEYID = 6
1,514,954 UART: [ldev] SUBJECT.KEYID = 5
1,515,380 UART: [ldev] AUTHORITY.KEYID = 7
1,515,843 UART: [ldev] FE.KEYID = 1
1,521,079 UART: [ldev] Erasing FE.KEYID = 1
1,546,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,968 UART: [ldev] --
1,586,417 UART: [fwproc] Waiting for Commands...
1,587,064 UART: [fwproc] Received command 0x46574c44
1,587,855 UART: [fwproc] Received Image of size 114168 bytes
2,883,744 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,598 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,671 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,460,745 >>> mbox cmd response: failed
1,460,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,751 >>> mbox cmd response: failed
1,460,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,215 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,346 UART: [kat] SHA2-256
893,284 UART: [kat] SHA2-384
895,999 UART: [kat] SHA2-512-ACC
897,900 UART: [kat] ECC-384
903,825 UART: [kat] HMAC-384Kdf
908,453 UART: [kat] LMS
1,476,649 UART: [kat] --
1,477,852 UART: [cold-reset] ++
1,478,268 UART: [fht] Storing FHT @ 0x50003400
1,481,031 UART: [idev] ++
1,481,199 UART: [idev] CDI.KEYID = 6
1,481,559 UART: [idev] SUBJECT.KEYID = 7
1,481,983 UART: [idev] UDS.KEYID = 0
1,482,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,490,025 UART: [idev] Erasing UDS.KEYID = 0
1,507,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,567 UART: [idev] --
1,516,782 UART: [ldev] ++
1,516,950 UART: [ldev] CDI.KEYID = 6
1,517,313 UART: [ldev] SUBJECT.KEYID = 5
1,517,739 UART: [ldev] AUTHORITY.KEYID = 7
1,518,202 UART: [ldev] FE.KEYID = 1
1,523,292 UART: [ldev] Erasing FE.KEYID = 1
1,548,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,793 UART: [ldev] --
1,588,202 UART: [fwproc] Waiting for Commands...
1,588,989 UART: [fwproc] Received command 0x46574c44
1,589,780 UART: [fwproc] Received Image of size 114168 bytes
1,609,110 UART: ROM Fatal Error: 0x000B0001
1,610,267 >>> mbox cmd response: failed
1,610,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,273 >>> mbox cmd response: failed
1,610,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,912 UART: [kat] SHA2-256
892,850 UART: [kat] SHA2-384
895,465 UART: [kat] SHA2-512-ACC
897,366 UART: [kat] ECC-384
902,945 UART: [kat] HMAC-384Kdf
907,663 UART: [kat] LMS
1,475,859 UART: [kat] --
1,476,914 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,063 UART: [idev] ++
1,480,231 UART: [idev] CDI.KEYID = 6
1,480,591 UART: [idev] SUBJECT.KEYID = 7
1,481,015 UART: [idev] UDS.KEYID = 0
1,481,360 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,229 UART: [idev] Erasing UDS.KEYID = 0
1,505,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,123 UART: [idev] --
1,515,292 UART: [ldev] ++
1,515,460 UART: [ldev] CDI.KEYID = 6
1,515,823 UART: [ldev] SUBJECT.KEYID = 5
1,516,249 UART: [ldev] AUTHORITY.KEYID = 7
1,516,712 UART: [ldev] FE.KEYID = 1
1,521,874 UART: [ldev] Erasing FE.KEYID = 1
1,547,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,052 UART: [fwproc] Waiting for Commands...
1,587,669 UART: [fwproc] Received command 0x46574c44
1,588,460 UART: [fwproc] Received Image of size 114168 bytes
2,884,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,223 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,575 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,084 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,461,794 >>> mbox cmd response: failed
1,461,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,800 >>> mbox cmd response: failed
1,461,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,818 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,585 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
893,588 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,713 UART: [kat] ++
897,865 UART: [kat] sha1
902,145 UART: [kat] SHA2-256
904,085 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,640 UART: [kat] HMAC-384Kdf
923,278 UART: [kat] LMS
1,171,606 UART: [kat] --
1,172,599 UART: [cold-reset] ++
1,172,947 UART: [fht] FHT @ 0x50003400
1,175,596 UART: [idev] ++
1,175,764 UART: [idev] CDI.KEYID = 6
1,176,124 UART: [idev] SUBJECT.KEYID = 7
1,176,548 UART: [idev] UDS.KEYID = 0
1,176,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,316 UART: [idev] Erasing UDS.KEYID = 0
1,201,211 UART: [idev] Sha1 KeyId Algorithm
1,209,653 UART: [idev] --
1,210,685 UART: [ldev] ++
1,210,853 UART: [ldev] CDI.KEYID = 6
1,211,216 UART: [ldev] SUBJECT.KEYID = 5
1,211,642 UART: [ldev] AUTHORITY.KEYID = 7
1,212,105 UART: [ldev] FE.KEYID = 1
1,217,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,445 UART: [ldev] --
1,282,814 UART: [fwproc] Wait for Commands...
1,283,436 UART: [fwproc] Recv command 0x46574c44
1,284,164 UART: [fwproc] Recv'd Img size: 114168 bytes
1,303,650 UART: ROM Fatal Error: 0x000B0001
1,304,807 >>> mbox cmd response: failed
1,304,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,813 >>> mbox cmd response: failed
1,304,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,316 UART: [kat] SHA2-256
892,966 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,091 UART: [kat] ++
897,243 UART: [kat] sha1
901,491 UART: [kat] SHA2-256
903,431 UART: [kat] SHA2-384
906,120 UART: [kat] SHA2-512-ACC
908,021 UART: [kat] ECC-384
918,082 UART: [kat] HMAC-384Kdf
922,534 UART: [kat] LMS
1,170,862 UART: [kat] --
1,171,651 UART: [cold-reset] ++
1,172,209 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,892 UART: [idev] Erasing UDS.KEYID = 0
1,201,029 UART: [idev] Sha1 KeyId Algorithm
1,209,423 UART: [idev] --
1,210,545 UART: [ldev] ++
1,210,713 UART: [ldev] CDI.KEYID = 6
1,211,076 UART: [ldev] SUBJECT.KEYID = 5
1,211,502 UART: [ldev] AUTHORITY.KEYID = 7
1,211,965 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,225 UART: [ldev] --
1,282,646 UART: [fwproc] Wait for Commands...
1,283,336 UART: [fwproc] Recv command 0x46574c44
1,284,064 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,998 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,475 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,158,822 >>> mbox cmd response: failed
1,158,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,828 >>> mbox cmd response: failed
1,158,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,223 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,699 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
902,130 UART: [kat] SHA2-256
904,070 UART: [kat] SHA2-384
906,767 UART: [kat] SHA2-512-ACC
908,668 UART: [kat] ECC-384
918,247 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,042 UART: [cold-reset] ++
1,172,480 UART: [fht] FHT @ 0x50003400
1,175,129 UART: [idev] ++
1,175,297 UART: [idev] CDI.KEYID = 6
1,175,657 UART: [idev] SUBJECT.KEYID = 7
1,176,081 UART: [idev] UDS.KEYID = 0
1,176,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,851 UART: [idev] Erasing UDS.KEYID = 0
1,200,432 UART: [idev] Sha1 KeyId Algorithm
1,208,864 UART: [idev] --
1,209,958 UART: [ldev] ++
1,210,126 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,915 UART: [ldev] AUTHORITY.KEYID = 7
1,211,378 UART: [ldev] FE.KEYID = 1
1,216,496 UART: [ldev] Erasing FE.KEYID = 1
1,242,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,458 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,523 UART: [fwproc] Recv command 0x46574c44
1,283,251 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,465 UART: ROM Fatal Error: 0x000B0001
1,303,622 >>> mbox cmd response: failed
1,303,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,628 >>> mbox cmd response: failed
1,303,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,909 UART: [kat] SHA2-256
893,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,684 UART: [kat] ++
897,836 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
906,863 UART: [kat] SHA2-512-ACC
908,764 UART: [kat] ECC-384
918,573 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,388 UART: [cold-reset] ++
1,172,964 UART: [fht] FHT @ 0x50003400
1,175,401 UART: [idev] ++
1,175,569 UART: [idev] CDI.KEYID = 6
1,175,929 UART: [idev] SUBJECT.KEYID = 7
1,176,353 UART: [idev] UDS.KEYID = 0
1,176,698 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,270 UART: [idev] Sha1 KeyId Algorithm
1,209,564 UART: [idev] --
1,210,522 UART: [ldev] ++
1,210,690 UART: [ldev] CDI.KEYID = 6
1,211,053 UART: [ldev] SUBJECT.KEYID = 5
1,211,479 UART: [ldev] AUTHORITY.KEYID = 7
1,211,942 UART: [ldev] FE.KEYID = 1
1,217,224 UART: [ldev] Erasing FE.KEYID = 1
1,243,323 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,998 UART: [ldev] --
1,282,407 UART: [fwproc] Wait for Commands...
1,282,993 UART: [fwproc] Recv command 0x46574c44
1,283,721 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,398 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,051 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,307 >>> mbox cmd response: failed
1,159,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,313 >>> mbox cmd response: failed
1,159,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,554 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,452 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
891,116 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,451 UART: [kat] SHA2-256
901,391 UART: [kat] SHA2-384
904,152 UART: [kat] SHA2-512-ACC
906,053 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,168 UART: [kat] LMS
1,168,480 UART: [kat] --
1,169,367 UART: [cold-reset] ++
1,169,909 UART: [fht] FHT @ 0x50003400
1,172,437 UART: [idev] ++
1,172,605 UART: [idev] CDI.KEYID = 6
1,172,966 UART: [idev] SUBJECT.KEYID = 7
1,173,391 UART: [idev] UDS.KEYID = 0
1,173,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,681 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,681 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,046 UART: [ldev] Erasing FE.KEYID = 1
1,241,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,510 UART: [fwproc] Wait for Commands...
1,281,285 UART: [fwproc] Recv command 0x46574c44
1,282,018 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,095 UART: ROM Fatal Error: 0x000B0001
1,302,252 >>> mbox cmd response: failed
1,302,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,258 >>> mbox cmd response: failed
1,302,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,010 UART: [kat] SHA2-512-ACC
905,911 UART: [kat] ECC-384
915,552 UART: [kat] HMAC-384Kdf
920,302 UART: [kat] LMS
1,168,614 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,172,961 UART: [idev] ++
1,173,129 UART: [idev] CDI.KEYID = 6
1,173,490 UART: [idev] SUBJECT.KEYID = 7
1,173,915 UART: [idev] UDS.KEYID = 0
1,174,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,199,041 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,215,820 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,504 UART: [ldev] --
1,280,978 UART: [fwproc] Wait for Commands...
1,281,761 UART: [fwproc] Recv command 0x46574c44
1,282,494 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,772 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,250 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,698 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,351 >>> mbox cmd response: failed
1,156,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,357 >>> mbox cmd response: failed
1,156,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,296 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,202 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,270 UART: [idev] ++
1,173,438 UART: [idev] CDI.KEYID = 6
1,173,799 UART: [idev] SUBJECT.KEYID = 7
1,174,224 UART: [idev] UDS.KEYID = 0
1,174,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,198,722 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,765 UART: [ldev] ++
1,208,933 UART: [ldev] CDI.KEYID = 6
1,209,297 UART: [ldev] SUBJECT.KEYID = 5
1,209,724 UART: [ldev] AUTHORITY.KEYID = 7
1,210,187 UART: [ldev] FE.KEYID = 1
1,215,395 UART: [ldev] Erasing FE.KEYID = 1
1,241,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,899 UART: [ldev] --
1,281,329 UART: [fwproc] Wait for Commands...
1,281,954 UART: [fwproc] Recv command 0x46574c44
1,282,687 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,278 UART: ROM Fatal Error: 0x000B0001
1,303,435 >>> mbox cmd response: failed
1,303,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,441 >>> mbox cmd response: failed
1,303,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Unprovisioned
85,746 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
915,785 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,722 UART: [idev] ++
1,172,890 UART: [idev] CDI.KEYID = 6
1,173,251 UART: [idev] SUBJECT.KEYID = 7
1,173,676 UART: [idev] UDS.KEYID = 0
1,174,022 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,966 UART: [idev] Erasing UDS.KEYID = 0
1,199,036 UART: [idev] Sha1 KeyId Algorithm
1,207,958 UART: [idev] --
1,208,869 UART: [ldev] ++
1,209,037 UART: [ldev] CDI.KEYID = 6
1,209,401 UART: [ldev] SUBJECT.KEYID = 5
1,209,828 UART: [ldev] AUTHORITY.KEYID = 7
1,210,291 UART: [ldev] FE.KEYID = 1
1,215,615 UART: [ldev] Erasing FE.KEYID = 1
1,241,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,789 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,807 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,305 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,874 >>> mbox cmd response: failed
1,156,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,880 >>> mbox cmd response: failed
1,156,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,985 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,267 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,026 UART:
192,400 UART: Running Caliptra ROM ...
193,530 UART:
193,680 UART: [state] CFI Enabled
261,760 UART: [state] LifecycleState = Unprovisioned
263,617 UART: [state] DebugLocked = No
265,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,311 UART: [kat] SHA2-256
440,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,506 UART: [kat] ++
450,980 UART: [kat] sha1
461,739 UART: [kat] SHA2-256
464,420 UART: [kat] SHA2-384
470,993 UART: [kat] SHA2-512-ACC
473,343 UART: [kat] ECC-384
2,767,781 UART: [kat] HMAC-384Kdf
2,799,725 UART: [kat] LMS
3,990,036 UART: [kat] --
3,995,345 UART: [cold-reset] ++
3,997,939 UART: [fht] Storing FHT @ 0x50003400
4,008,961 UART: [idev] ++
4,009,543 UART: [idev] CDI.KEYID = 6
4,010,464 UART: [idev] SUBJECT.KEYID = 7
4,011,686 UART: [idev] UDS.KEYID = 0
4,014,665 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,158,078 UART: [idev] Erasing UDS.KEYID = 0
7,344,760 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,559 UART: [idev] --
7,369,397 UART: [ldev] ++
7,369,971 UART: [ldev] CDI.KEYID = 6
7,370,936 UART: [ldev] SUBJECT.KEYID = 5
7,372,152 UART: [ldev] AUTHORITY.KEYID = 7
7,373,384 UART: [ldev] FE.KEYID = 1
7,420,668 UART: [ldev] Erasing FE.KEYID = 1
10,757,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,320 UART: [ldev] --
13,137,593 UART: [fwproc] Waiting for Commands...
13,139,261 UART: [fwproc] Received command 0x46574c44
13,141,454 UART: [fwproc] Received Image of size 113844 bytes
13,198,942 UART: ROM Fatal Error: 0x000B0002
13,202,446 >>> mbox cmd response: failed
13,202,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,203,190 >>> mbox cmd response: failed
13,203,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,203,752 >>> mbox cmd response: failed
Initializing fuses
2,055,956 writing to cptra_bootfsm_go
2,245,335 UART:
2,245,689 UART: Running Caliptra ROM ...
2,246,832 UART:
2,247,005 UART: [state] CFI Enabled
2,312,500 UART: [state] LifecycleState = Unprovisioned
2,314,439 UART: [state] DebugLocked = No
2,317,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,942 UART: [kat] SHA2-256
2,491,633 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,134 UART: [kat] ++
2,502,600 UART: [kat] sha1
2,512,565 UART: [kat] SHA2-256
2,515,210 UART: [kat] SHA2-384
2,520,498 UART: [kat] SHA2-512-ACC
2,522,870 UART: [kat] ECC-384
4,813,638 UART: [kat] HMAC-384Kdf
4,844,661 UART: [kat] LMS
6,034,943 UART: [kat] --
6,040,718 UART: [cold-reset] ++
6,042,863 UART: [fht] Storing FHT @ 0x50003400
6,054,562 UART: [idev] ++
6,055,135 UART: [idev] CDI.KEYID = 6
6,056,047 UART: [idev] SUBJECT.KEYID = 7
6,057,321 UART: [idev] UDS.KEYID = 0
6,059,794 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,203,508 UART: [idev] Erasing UDS.KEYID = 0
9,391,421 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,607 UART: [idev] --
9,417,875 UART: [ldev] ++
9,418,443 UART: [ldev] CDI.KEYID = 6
9,419,593 UART: [ldev] SUBJECT.KEYID = 5
9,420,812 UART: [ldev] AUTHORITY.KEYID = 7
9,421,994 UART: [ldev] FE.KEYID = 1
9,465,119 UART: [ldev] Erasing FE.KEYID = 1
12,793,022 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,152,873 UART: [ldev] --
15,158,479 UART: [fwproc] Waiting for Commands...
15,160,254 UART: [fwproc] Received command 0x46574c44
15,162,443 UART: [fwproc] Received Image of size 113844 bytes
19,206,615 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,281,713 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,350,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,666,646 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,786,761 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,892,724 >>> mbox cmd response: failed
12,893,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,893,777 >>> mbox cmd response: failed
12,894,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,894,345 >>> mbox cmd response: failed
Initializing fuses
2,045,722 writing to cptra_bootfsm_go
5,823,605 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,887,766 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,404 UART:
192,771 UART: Running Caliptra ROM ...
193,904 UART:
603,710 UART: [state] CFI Enabled
620,420 UART: [state] LifecycleState = Unprovisioned
622,339 UART: [state] DebugLocked = No
625,004 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,388 UART: [kat] SHA2-256
799,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,658 UART: [kat] ++
810,108 UART: [kat] sha1
822,063 UART: [kat] SHA2-256
824,747 UART: [kat] SHA2-384
829,970 UART: [kat] SHA2-512-ACC
832,314 UART: [kat] ECC-384
3,115,368 UART: [kat] HMAC-384Kdf
3,127,495 UART: [kat] LMS
4,317,644 UART: [kat] --
4,323,060 UART: [cold-reset] ++
4,324,299 UART: [fht] Storing FHT @ 0x50003400
4,335,852 UART: [idev] ++
4,336,469 UART: [idev] CDI.KEYID = 6
4,337,402 UART: [idev] SUBJECT.KEYID = 7
4,338,625 UART: [idev] UDS.KEYID = 0
4,341,306 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,322 UART: [idev] Erasing UDS.KEYID = 0
7,629,259 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,087 UART: [idev] --
7,653,766 UART: [ldev] ++
7,654,339 UART: [ldev] CDI.KEYID = 6
7,655,307 UART: [ldev] SUBJECT.KEYID = 5
7,656,521 UART: [ldev] AUTHORITY.KEYID = 7
7,657,758 UART: [ldev] FE.KEYID = 1
7,668,461 UART: [ldev] Erasing FE.KEYID = 1
10,960,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,571 UART: [ldev] --
13,319,814 UART: [fwproc] Waiting for Commands...
13,321,428 UART: [fwproc] Received command 0x46574c44
13,323,613 UART: [fwproc] Received Image of size 113844 bytes
13,381,659 UART: ROM Fatal Error: 0x000B0002
13,385,166 >>> mbox cmd response: failed
13,385,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,385,960 >>> mbox cmd response: failed
13,386,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,386,524 >>> mbox cmd response: failed
Initializing fuses
2,054,669 writing to cptra_bootfsm_go
2,244,033 UART:
2,244,385 UART: Running Caliptra ROM ...
2,245,434 UART:
7,087,291 UART: [state] CFI Enabled
7,101,941 UART: [state] LifecycleState = Unprovisioned
7,103,888 UART: [state] DebugLocked = No
7,105,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,111,022 UART: [kat] SHA2-256
7,280,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,291,328 UART: [kat] ++
7,291,786 UART: [kat] sha1
7,303,587 UART: [kat] SHA2-256
7,306,282 UART: [kat] SHA2-384
7,312,110 UART: [kat] SHA2-512-ACC
7,314,517 UART: [kat] ECC-384
9,598,874 UART: [kat] HMAC-384Kdf
9,611,288 UART: [kat] LMS
10,801,430 UART: [kat] --
10,805,262 UART: [cold-reset] ++
10,807,246 UART: [fht] Storing FHT @ 0x50003400
10,818,996 UART: [idev] ++
10,819,566 UART: [idev] CDI.KEYID = 6
10,820,529 UART: [idev] SUBJECT.KEYID = 7
10,821,745 UART: [idev] UDS.KEYID = 0
10,824,587 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,968,113 UART: [idev] Erasing UDS.KEYID = 0
14,108,337 UART: [idev] Using Sha1 for KeyId Algorithm
14,130,850 UART: [idev] --
14,134,779 UART: [ldev] ++
14,135,343 UART: [ldev] CDI.KEYID = 6
14,136,305 UART: [ldev] SUBJECT.KEYID = 5
14,137,563 UART: [ldev] AUTHORITY.KEYID = 7
14,138,816 UART: [ldev] FE.KEYID = 1
14,148,807 UART: [ldev] Erasing FE.KEYID = 1
17,432,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,725,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,740,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,755,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,769,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,787,180 UART: [ldev] --
19,791,746 UART: [fwproc] Waiting for Commands...
19,794,868 UART: [fwproc] Received command 0x46574c44
19,797,050 UART: [fwproc] Received Image of size 113844 bytes
23,847,512 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,919,264 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,988,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,304,813 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,627 writing to cptra_bootfsm_go
4,132,556 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,106,401 >>> mbox cmd response: failed
13,106,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,107,319 >>> mbox cmd response: failed
13,107,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,107,877 >>> mbox cmd response: failed
Initializing fuses
2,045,870 writing to cptra_bootfsm_go
10,895,100 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,832,600 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,155 UART:
192,546 UART: Running Caliptra ROM ...
193,650 UART:
193,790 UART: [state] CFI Enabled
263,958 UART: [state] LifecycleState = Unprovisioned
265,832 UART: [state] DebugLocked = No
267,166 UART: [state] WD Timer not started. Device not locked for debugging
270,250 UART: [kat] SHA2-256
449,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,939 UART: [kat] ++
461,479 UART: [kat] sha1
472,523 UART: [kat] SHA2-256
475,541 UART: [kat] SHA2-384
481,846 UART: [kat] SHA2-512-ACC
484,834 UART: [kat] ECC-384
2,948,057 UART: [kat] HMAC-384Kdf
2,971,353 UART: [kat] LMS
3,500,789 UART: [kat] --
3,504,507 UART: [cold-reset] ++
3,507,143 UART: [fht] FHT @ 0x50003400
3,518,184 UART: [idev] ++
3,518,755 UART: [idev] CDI.KEYID = 6
3,519,667 UART: [idev] SUBJECT.KEYID = 7
3,520,881 UART: [idev] UDS.KEYID = 0
3,523,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,605 UART: [idev] Erasing UDS.KEYID = 0
6,025,774 UART: [idev] Sha1 KeyId Algorithm
6,048,032 UART: [idev] --
6,051,930 UART: [ldev] ++
6,052,502 UART: [ldev] CDI.KEYID = 6
6,053,418 UART: [ldev] SUBJECT.KEYID = 5
6,054,584 UART: [ldev] AUTHORITY.KEYID = 7
6,055,844 UART: [ldev] FE.KEYID = 1
6,101,228 UART: [ldev] Erasing FE.KEYID = 1
8,606,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,374 UART: [ldev] --
10,417,297 UART: [fwproc] Wait for Commands...
10,420,475 UART: [fwproc] Recv command 0x46574c44
10,422,517 UART: [fwproc] Recv'd Img size: 114168 bytes
10,479,588 UART: ROM Fatal Error: 0x000B0002
10,482,683 >>> mbox cmd response: failed
10,483,086 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,483,412 >>> mbox cmd response: failed
10,483,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,483,999 >>> mbox cmd response: failed
Initializing fuses
2,050,322 writing to cptra_bootfsm_go
2,239,641 UART:
2,239,983 UART: Running Caliptra ROM ...
2,241,117 UART:
2,241,287 UART: [state] CFI Enabled
2,302,010 UART: [state] LifecycleState = Unprovisioned
2,303,892 UART: [state] DebugLocked = No
2,305,984 UART: [state] WD Timer not started. Device not locked for debugging
2,309,406 UART: [kat] SHA2-256
2,488,515 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,500,086 UART: [kat] ++
2,500,569 UART: [kat] sha1
2,512,596 UART: [kat] SHA2-256
2,515,616 UART: [kat] SHA2-384
2,521,335 UART: [kat] SHA2-512-ACC
2,524,335 UART: [kat] ECC-384
4,987,095 UART: [kat] HMAC-384Kdf
5,009,976 UART: [kat] LMS
5,539,441 UART: [kat] --
5,542,132 UART: [cold-reset] ++
5,544,236 UART: [fht] FHT @ 0x50003400
5,555,271 UART: [idev] ++
5,555,835 UART: [idev] CDI.KEYID = 6
5,556,746 UART: [idev] SUBJECT.KEYID = 7
5,557,960 UART: [idev] UDS.KEYID = 0
5,560,595 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,704,325 UART: [idev] Erasing UDS.KEYID = 0
8,067,688 UART: [idev] Sha1 KeyId Algorithm
8,091,463 UART: [idev] --
8,095,603 UART: [ldev] ++
8,096,185 UART: [ldev] CDI.KEYID = 6
8,097,074 UART: [ldev] SUBJECT.KEYID = 5
8,098,237 UART: [ldev] AUTHORITY.KEYID = 7
8,099,530 UART: [ldev] FE.KEYID = 1
8,138,244 UART: [ldev] Erasing FE.KEYID = 1
10,643,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,379,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,395,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,344 UART: [ldev] --
12,452,500 UART: [fwproc] Wait for Commands...
12,455,571 UART: [fwproc] Recv command 0x46574c44
12,457,689 UART: [fwproc] Recv'd Img size: 114168 bytes
15,852,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,922,755 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,991,552 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,309,197 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,037 writing to cptra_bootfsm_go
3,362,925 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,242,455 >>> mbox cmd response: failed
10,243,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,243,382 >>> mbox cmd response: failed
10,243,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,243,943 >>> mbox cmd response: failed
Initializing fuses
2,048,408 writing to cptra_bootfsm_go
5,427,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,095,207 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,583 UART:
192,953 UART: Running Caliptra ROM ...
194,137 UART:
603,725 UART: [state] CFI Enabled
618,001 UART: [state] LifecycleState = Unprovisioned
619,918 UART: [state] DebugLocked = No
622,698 UART: [state] WD Timer not started. Device not locked for debugging
626,309 UART: [kat] SHA2-256
805,419 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,965 UART: [kat] ++
817,418 UART: [kat] sha1
828,238 UART: [kat] SHA2-256
831,305 UART: [kat] SHA2-384
837,390 UART: [kat] SHA2-512-ACC
840,376 UART: [kat] ECC-384
3,280,511 UART: [kat] HMAC-384Kdf
3,291,589 UART: [kat] LMS
3,821,046 UART: [kat] --
3,826,597 UART: [cold-reset] ++
3,827,607 UART: [fht] FHT @ 0x50003400
3,838,911 UART: [idev] ++
3,839,496 UART: [idev] CDI.KEYID = 6
3,840,406 UART: [idev] SUBJECT.KEYID = 7
3,841,566 UART: [idev] UDS.KEYID = 0
3,844,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,147 UART: [idev] Erasing UDS.KEYID = 0
6,317,873 UART: [idev] Sha1 KeyId Algorithm
6,341,250 UART: [idev] --
6,345,161 UART: [ldev] ++
6,345,737 UART: [ldev] CDI.KEYID = 6
6,346,646 UART: [ldev] SUBJECT.KEYID = 5
6,347,858 UART: [ldev] AUTHORITY.KEYID = 7
6,349,091 UART: [ldev] FE.KEYID = 1
6,360,334 UART: [ldev] Erasing FE.KEYID = 1
8,835,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,885 UART: [ldev] --
10,623,557 UART: [fwproc] Wait for Commands...
10,626,734 UART: [fwproc] Recv command 0x46574c44
10,628,824 UART: [fwproc] Recv'd Img size: 114168 bytes
10,685,032 UART: ROM Fatal Error: 0x000B0002
10,688,119 >>> mbox cmd response: failed
10,688,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,688,859 >>> mbox cmd response: failed
10,689,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,689,459 >>> mbox cmd response: failed
Initializing fuses
2,054,094 writing to cptra_bootfsm_go
2,243,434 UART:
2,243,786 UART: Running Caliptra ROM ...
2,244,915 UART:
9,761,576 UART: [state] CFI Enabled
9,773,760 UART: [state] LifecycleState = Unprovisioned
9,775,623 UART: [state] DebugLocked = No
9,777,765 UART: [state] WD Timer not started. Device not locked for debugging
9,781,995 UART: [kat] SHA2-256
9,961,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,972,730 UART: [kat] ++
9,973,265 UART: [kat] sha1
9,983,785 UART: [kat] SHA2-256
9,986,793 UART: [kat] SHA2-384
9,994,178 UART: [kat] SHA2-512-ACC
9,997,172 UART: [kat] ECC-384
12,438,808 UART: [kat] HMAC-384Kdf
12,450,463 UART: [kat] LMS
12,979,963 UART: [kat] --
12,984,723 UART: [cold-reset] ++
12,986,923 UART: [fht] FHT @ 0x50003400
12,997,793 UART: [idev] ++
12,998,361 UART: [idev] CDI.KEYID = 6
12,999,469 UART: [idev] SUBJECT.KEYID = 7
13,000,594 UART: [idev] UDS.KEYID = 0
13,003,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,146,715 UART: [idev] Erasing UDS.KEYID = 0
15,473,122 UART: [idev] Sha1 KeyId Algorithm
15,496,122 UART: [idev] --
15,500,139 UART: [ldev] ++
15,500,722 UART: [ldev] CDI.KEYID = 6
15,501,606 UART: [ldev] SUBJECT.KEYID = 5
15,502,837 UART: [ldev] AUTHORITY.KEYID = 7
15,504,068 UART: [ldev] FE.KEYID = 1
15,515,739 UART: [ldev] Erasing FE.KEYID = 1
17,990,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,710,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,726,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,742,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,758,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,778,192 UART: [ldev] --
19,783,239 UART: [fwproc] Wait for Commands...
19,784,959 UART: [fwproc] Recv command 0x46574c44
19,787,057 UART: [fwproc] Recv'd Img size: 114168 bytes
23,185,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,261,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,329,799 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,646,832 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,558 writing to cptra_bootfsm_go
3,695,715 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,458,942 >>> mbox cmd response: failed
10,459,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,459,843 >>> mbox cmd response: failed
10,460,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,460,400 >>> mbox cmd response: failed
Initializing fuses
2,046,335 writing to cptra_bootfsm_go
13,095,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,667,371 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
192,094 UART:
192,461 UART: Running Caliptra ROM ...
193,663 UART:
193,816 UART: [state] CFI Enabled
261,015 UART: [state] LifecycleState = Unprovisioned
263,427 UART: [state] DebugLocked = No
265,785 UART: [state] WD Timer not started. Device not locked for debugging
269,741 UART: [kat] SHA2-256
459,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,381 UART: [kat] ++
470,833 UART: [kat] sha1
481,713 UART: [kat] SHA2-256
484,722 UART: [kat] SHA2-384
490,815 UART: [kat] SHA2-512-ACC
493,386 UART: [kat] ECC-384
2,950,195 UART: [kat] HMAC-384Kdf
2,970,722 UART: [kat] LMS
3,502,511 UART: [kat] --
3,506,705 UART: [cold-reset] ++
3,507,733 UART: [fht] FHT @ 0x50003400
3,519,335 UART: [idev] ++
3,520,017 UART: [idev] CDI.KEYID = 6
3,520,994 UART: [idev] SUBJECT.KEYID = 7
3,522,095 UART: [idev] UDS.KEYID = 0
3,524,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,593 UART: [idev] Erasing UDS.KEYID = 0
6,025,783 UART: [idev] Sha1 KeyId Algorithm
6,048,382 UART: [idev] --
6,052,199 UART: [ldev] ++
6,052,898 UART: [ldev] CDI.KEYID = 6
6,053,813 UART: [ldev] SUBJECT.KEYID = 5
6,054,978 UART: [ldev] AUTHORITY.KEYID = 7
6,056,215 UART: [ldev] FE.KEYID = 1
6,100,401 UART: [ldev] Erasing FE.KEYID = 1
8,601,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,758 UART: [ldev] --
10,392,079 UART: [fwproc] Wait for Commands...
10,394,186 UART: [fwproc] Recv command 0x46574c44
10,396,507 UART: [fwproc] Recv'd Img size: 114168 bytes
10,479,074 UART: ROM Fatal Error: 0x000B0002
10,482,763 >>> mbox cmd response: failed
10,483,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,483,435 >>> mbox cmd response: failed
10,483,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,484,000 >>> mbox cmd response: failed
Initializing fuses
2,049,959 writing to cptra_bootfsm_go
2,239,325 UART:
2,239,675 UART: Running Caliptra ROM ...
2,240,811 UART:
2,240,984 UART: [state] CFI Enabled
2,300,942 UART: [state] LifecycleState = Unprovisioned
2,303,348 UART: [state] DebugLocked = No
2,304,792 UART: [state] WD Timer not started. Device not locked for debugging
2,308,661 UART: [kat] SHA2-256
2,498,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,509,345 UART: [kat] ++
2,509,807 UART: [kat] sha1
2,521,180 UART: [kat] SHA2-256
2,524,203 UART: [kat] SHA2-384
2,530,262 UART: [kat] SHA2-512-ACC
2,532,855 UART: [kat] ECC-384
4,987,416 UART: [kat] HMAC-384Kdf
5,010,042 UART: [kat] LMS
5,541,827 UART: [kat] --
5,545,734 UART: [cold-reset] ++
5,547,839 UART: [fht] FHT @ 0x50003400
5,560,075 UART: [idev] ++
5,560,795 UART: [idev] CDI.KEYID = 6
5,561,709 UART: [idev] SUBJECT.KEYID = 7
5,562,927 UART: [idev] UDS.KEYID = 0
5,565,459 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,709,025 UART: [idev] Erasing UDS.KEYID = 0
8,068,145 UART: [idev] Sha1 KeyId Algorithm
8,089,388 UART: [idev] --
8,093,818 UART: [ldev] ++
8,094,499 UART: [ldev] CDI.KEYID = 6
8,095,420 UART: [ldev] SUBJECT.KEYID = 5
8,096,639 UART: [ldev] AUTHORITY.KEYID = 7
8,097,766 UART: [ldev] FE.KEYID = 1
8,138,558 UART: [ldev] Erasing FE.KEYID = 1
10,646,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,079 UART: [ldev] --
12,453,392 UART: [fwproc] Wait for Commands...
12,456,194 UART: [fwproc] Recv command 0x46574c44
12,458,517 UART: [fwproc] Recv'd Img size: 114168 bytes
15,916,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,992,960 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,109,091 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,650,466 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,432,253 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,293,091 >>> mbox cmd response: failed
10,293,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,293,964 >>> mbox cmd response: failed
10,294,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,294,548 >>> mbox cmd response: failed
Initializing fuses
2,048,182 writing to cptra_bootfsm_go
5,466,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,772,780 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,518 UART:
192,903 UART: Running Caliptra ROM ...
194,011 UART:
603,611 UART: [state] CFI Enabled
614,997 UART: [state] LifecycleState = Unprovisioned
617,382 UART: [state] DebugLocked = No
618,815 UART: [state] WD Timer not started. Device not locked for debugging
622,513 UART: [kat] SHA2-256
812,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,177 UART: [kat] ++
823,680 UART: [kat] sha1
835,098 UART: [kat] SHA2-256
838,112 UART: [kat] SHA2-384
844,095 UART: [kat] SHA2-512-ACC
846,710 UART: [kat] ECC-384
3,291,611 UART: [kat] HMAC-384Kdf
3,304,496 UART: [kat] LMS
3,836,284 UART: [kat] --
3,841,622 UART: [cold-reset] ++
3,842,744 UART: [fht] FHT @ 0x50003400
3,853,675 UART: [idev] ++
3,854,349 UART: [idev] CDI.KEYID = 6
3,855,288 UART: [idev] SUBJECT.KEYID = 7
3,856,577 UART: [idev] UDS.KEYID = 0
3,859,445 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,054 UART: [idev] Erasing UDS.KEYID = 0
6,335,926 UART: [idev] Sha1 KeyId Algorithm
6,357,413 UART: [idev] --
6,362,356 UART: [ldev] ++
6,363,049 UART: [ldev] CDI.KEYID = 6
6,363,936 UART: [ldev] SUBJECT.KEYID = 5
6,365,150 UART: [ldev] AUTHORITY.KEYID = 7
6,366,329 UART: [ldev] FE.KEYID = 1
6,375,764 UART: [ldev] Erasing FE.KEYID = 1
8,854,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,583 UART: [ldev] --
10,647,242 UART: [fwproc] Wait for Commands...
10,649,018 UART: [fwproc] Recv command 0x46574c44
10,651,283 UART: [fwproc] Recv'd Img size: 114168 bytes
10,735,099 UART: ROM Fatal Error: 0x000B0002
10,738,792 >>> mbox cmd response: failed
10,739,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,739,502 >>> mbox cmd response: failed
10,739,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,740,064 >>> mbox cmd response: failed
Initializing fuses
2,052,159 writing to cptra_bootfsm_go
2,241,445 UART:
2,241,827 UART: Running Caliptra ROM ...
2,242,884 UART:
9,718,844 UART: [state] CFI Enabled
9,730,702 UART: [state] LifecycleState = Unprovisioned
9,733,116 UART: [state] DebugLocked = No
9,734,477 UART: [state] WD Timer not started. Device not locked for debugging
9,739,857 UART: [kat] SHA2-256
9,929,754 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,940,552 UART: [kat] ++
9,941,069 UART: [kat] sha1
9,953,091 UART: [kat] SHA2-256
9,956,119 UART: [kat] SHA2-384
9,962,167 UART: [kat] SHA2-512-ACC
9,964,740 UART: [kat] ECC-384
12,407,299 UART: [kat] HMAC-384Kdf
12,420,182 UART: [kat] LMS
12,952,009 UART: [kat] --
12,956,672 UART: [cold-reset] ++
12,958,985 UART: [fht] FHT @ 0x50003400
12,969,294 UART: [idev] ++
12,969,985 UART: [idev] CDI.KEYID = 6
12,971,059 UART: [idev] SUBJECT.KEYID = 7
12,972,168 UART: [idev] UDS.KEYID = 0
12,974,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,118,230 UART: [idev] Erasing UDS.KEYID = 0
15,451,360 UART: [idev] Sha1 KeyId Algorithm
15,472,439 UART: [idev] --
15,476,536 UART: [ldev] ++
15,477,268 UART: [ldev] CDI.KEYID = 6
15,478,145 UART: [ldev] SUBJECT.KEYID = 5
15,479,354 UART: [ldev] AUTHORITY.KEYID = 7
15,480,592 UART: [ldev] FE.KEYID = 1
15,490,799 UART: [ldev] Erasing FE.KEYID = 1
17,969,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,691,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,706,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,722,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,737,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,757,756 UART: [ldev] --
19,762,647 UART: [fwproc] Wait for Commands...
19,764,249 UART: [fwproc] Recv command 0x46574c44
19,766,523 UART: [fwproc] Recv'd Img size: 114168 bytes
23,210,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,291,044 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,407,223 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,948,609 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,750,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,513,377 >>> mbox cmd response: failed
10,513,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,514,240 >>> mbox cmd response: failed
10,514,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,514,794 >>> mbox cmd response: failed
Initializing fuses
2,046,670 writing to cptra_bootfsm_go
13,110,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,323,618 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,651 UART: [kat] SHA2-256
892,589 UART: [kat] SHA2-384
895,298 UART: [kat] SHA2-512-ACC
897,199 UART: [kat] ECC-384
902,630 UART: [kat] HMAC-384Kdf
907,314 UART: [kat] LMS
1,475,510 UART: [kat] --
1,476,245 UART: [cold-reset] ++
1,476,705 UART: [fht] Storing FHT @ 0x50003400
1,479,320 UART: [idev] ++
1,479,488 UART: [idev] CDI.KEYID = 6
1,479,848 UART: [idev] SUBJECT.KEYID = 7
1,480,272 UART: [idev] UDS.KEYID = 0
1,480,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,886 UART: [idev] Erasing UDS.KEYID = 0
1,504,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,856 UART: [idev] --
1,514,085 UART: [ldev] ++
1,514,253 UART: [ldev] CDI.KEYID = 6
1,514,616 UART: [ldev] SUBJECT.KEYID = 5
1,515,042 UART: [ldev] AUTHORITY.KEYID = 7
1,515,505 UART: [ldev] FE.KEYID = 1
1,520,451 UART: [ldev] Erasing FE.KEYID = 1
1,545,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,794 UART: [ldev] --
1,585,287 UART: [fwproc] Waiting for Commands...
1,586,080 UART: [fwproc] Received command 0x46574c44
1,586,871 UART: [fwproc] Received Image of size 114168 bytes
1,605,866 UART: ROM Fatal Error: 0x000B0002
1,607,023 >>> mbox cmd response: failed
1,607,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,029 >>> mbox cmd response: failed
1,607,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,021 UART: [kat] SHA2-256
881,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,067 UART: [kat] ++
886,219 UART: [kat] sha1
890,569 UART: [kat] SHA2-256
892,507 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
903,082 UART: [kat] HMAC-384Kdf
907,612 UART: [kat] LMS
1,475,808 UART: [kat] --
1,476,561 UART: [cold-reset] ++
1,477,049 UART: [fht] Storing FHT @ 0x50003400
1,479,856 UART: [idev] ++
1,480,024 UART: [idev] CDI.KEYID = 6
1,480,384 UART: [idev] SUBJECT.KEYID = 7
1,480,808 UART: [idev] UDS.KEYID = 0
1,481,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,876 UART: [idev] Erasing UDS.KEYID = 0
1,505,784 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,206 UART: [idev] --
1,515,233 UART: [ldev] ++
1,515,401 UART: [ldev] CDI.KEYID = 6
1,515,764 UART: [ldev] SUBJECT.KEYID = 5
1,516,190 UART: [ldev] AUTHORITY.KEYID = 7
1,516,653 UART: [ldev] FE.KEYID = 1
1,522,001 UART: [ldev] Erasing FE.KEYID = 1
1,547,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,702 UART: [ldev] --
1,586,111 UART: [fwproc] Waiting for Commands...
1,586,738 UART: [fwproc] Received command 0x46574c44
1,587,529 UART: [fwproc] Received Image of size 114168 bytes
2,882,636 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,486 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,427 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,253 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,461,466 >>> mbox cmd response: failed
1,461,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,472 >>> mbox cmd response: failed
1,461,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,101 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
890,910 UART: [kat] SHA2-256
892,848 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,779 UART: [kat] LMS
1,475,975 UART: [kat] --
1,476,818 UART: [cold-reset] ++
1,477,300 UART: [fht] Storing FHT @ 0x50003400
1,480,071 UART: [idev] ++
1,480,239 UART: [idev] CDI.KEYID = 6
1,480,599 UART: [idev] SUBJECT.KEYID = 7
1,481,023 UART: [idev] UDS.KEYID = 0
1,481,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,929 UART: [idev] Erasing UDS.KEYID = 0
1,505,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,437 UART: [idev] --
1,515,546 UART: [ldev] ++
1,515,714 UART: [ldev] CDI.KEYID = 6
1,516,077 UART: [ldev] SUBJECT.KEYID = 5
1,516,503 UART: [ldev] AUTHORITY.KEYID = 7
1,516,966 UART: [ldev] FE.KEYID = 1
1,522,030 UART: [ldev] Erasing FE.KEYID = 1
1,547,099 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,923 UART: [ldev] --
1,586,362 UART: [fwproc] Waiting for Commands...
1,587,069 UART: [fwproc] Received command 0x46574c44
1,587,860 UART: [fwproc] Received Image of size 114168 bytes
1,607,079 UART: ROM Fatal Error: 0x000B0002
1,608,236 >>> mbox cmd response: failed
1,608,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,242 >>> mbox cmd response: failed
1,608,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,086 UART: [kat] SHA2-256
882,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,132 UART: [kat] ++
886,284 UART: [kat] sha1
890,546 UART: [kat] SHA2-256
892,484 UART: [kat] SHA2-384
895,195 UART: [kat] SHA2-512-ACC
897,096 UART: [kat] ECC-384
902,463 UART: [kat] HMAC-384Kdf
906,873 UART: [kat] LMS
1,475,069 UART: [kat] --
1,475,920 UART: [cold-reset] ++
1,476,272 UART: [fht] Storing FHT @ 0x50003400
1,479,101 UART: [idev] ++
1,479,269 UART: [idev] CDI.KEYID = 6
1,479,629 UART: [idev] SUBJECT.KEYID = 7
1,480,053 UART: [idev] UDS.KEYID = 0
1,480,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,921 UART: [idev] Erasing UDS.KEYID = 0
1,504,683 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,185 UART: [idev] --
1,514,242 UART: [ldev] ++
1,514,410 UART: [ldev] CDI.KEYID = 6
1,514,773 UART: [ldev] SUBJECT.KEYID = 5
1,515,199 UART: [ldev] AUTHORITY.KEYID = 7
1,515,662 UART: [ldev] FE.KEYID = 1
1,520,992 UART: [ldev] Erasing FE.KEYID = 1
1,546,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,267 UART: [ldev] --
1,585,726 UART: [fwproc] Waiting for Commands...
1,586,585 UART: [fwproc] Received command 0x46574c44
1,587,376 UART: [fwproc] Received Image of size 114168 bytes
2,883,401 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,889 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,241 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,854 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,460,651 >>> mbox cmd response: failed
1,460,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,657 >>> mbox cmd response: failed
1,460,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,252 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
893,348 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,473 UART: [kat] ++
897,625 UART: [kat] sha1
901,879 UART: [kat] SHA2-256
903,819 UART: [kat] SHA2-384
906,592 UART: [kat] SHA2-512-ACC
908,493 UART: [kat] ECC-384
918,064 UART: [kat] HMAC-384Kdf
922,506 UART: [kat] LMS
1,170,834 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,217 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,866 UART: [idev] Erasing UDS.KEYID = 0
1,200,729 UART: [idev] Sha1 KeyId Algorithm
1,209,205 UART: [idev] --
1,210,121 UART: [ldev] ++
1,210,289 UART: [ldev] CDI.KEYID = 6
1,210,652 UART: [ldev] SUBJECT.KEYID = 5
1,211,078 UART: [ldev] AUTHORITY.KEYID = 7
1,211,541 UART: [ldev] FE.KEYID = 1
1,216,465 UART: [ldev] Erasing FE.KEYID = 1
1,242,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,689 UART: ROM Fatal Error: 0x000B0002
1,303,846 >>> mbox cmd response: failed
1,303,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,852 >>> mbox cmd response: failed
1,303,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
892,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,123 UART: [kat] ++
897,275 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,300 UART: [kat] SHA2-512-ACC
908,201 UART: [kat] ECC-384
917,400 UART: [kat] HMAC-384Kdf
921,952 UART: [kat] LMS
1,170,280 UART: [kat] --
1,171,077 UART: [cold-reset] ++
1,171,645 UART: [fht] FHT @ 0x50003400
1,174,322 UART: [idev] ++
1,174,490 UART: [idev] CDI.KEYID = 6
1,174,850 UART: [idev] SUBJECT.KEYID = 7
1,175,274 UART: [idev] UDS.KEYID = 0
1,175,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,845 UART: [idev] Sha1 KeyId Algorithm
1,208,261 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,836 UART: [ldev] SUBJECT.KEYID = 5
1,210,262 UART: [ldev] AUTHORITY.KEYID = 7
1,210,725 UART: [ldev] FE.KEYID = 1
1,216,117 UART: [ldev] Erasing FE.KEYID = 1
1,242,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,260 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,393 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,966 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,077 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,157,861 >>> mbox cmd response: failed
1,157,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,867 >>> mbox cmd response: failed
1,157,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,521 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
893,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,658 UART: [kat] ++
897,810 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,217 UART: [kat] HMAC-384Kdf
922,859 UART: [kat] LMS
1,171,187 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,690 UART: [fht] FHT @ 0x50003400
1,175,395 UART: [idev] ++
1,175,563 UART: [idev] CDI.KEYID = 6
1,175,923 UART: [idev] SUBJECT.KEYID = 7
1,176,347 UART: [idev] UDS.KEYID = 0
1,176,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,553 UART: [idev] Erasing UDS.KEYID = 0
1,202,192 UART: [idev] Sha1 KeyId Algorithm
1,210,626 UART: [idev] --
1,211,624 UART: [ldev] ++
1,211,792 UART: [ldev] CDI.KEYID = 6
1,212,155 UART: [ldev] SUBJECT.KEYID = 5
1,212,581 UART: [ldev] AUTHORITY.KEYID = 7
1,213,044 UART: [ldev] FE.KEYID = 1
1,218,442 UART: [ldev] Erasing FE.KEYID = 1
1,244,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,796 UART: [ldev] --
1,284,289 UART: [fwproc] Wait for Commands...
1,285,001 UART: [fwproc] Recv command 0x46574c44
1,285,729 UART: [fwproc] Recv'd Img size: 114168 bytes
1,304,776 UART: ROM Fatal Error: 0x000B0002
1,305,933 >>> mbox cmd response: failed
1,305,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,939 >>> mbox cmd response: failed
1,305,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,550 UART: [state] WD Timer not started. Device not locked for debugging
87,815 UART: [kat] SHA2-256
893,465 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,590 UART: [kat] ++
897,742 UART: [kat] sha1
901,962 UART: [kat] SHA2-256
903,902 UART: [kat] SHA2-384
906,753 UART: [kat] SHA2-512-ACC
908,654 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,183 UART: [kat] LMS
1,171,511 UART: [kat] --
1,172,508 UART: [cold-reset] ++
1,173,080 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,085 UART: [idev] Erasing UDS.KEYID = 0
1,201,286 UART: [idev] Sha1 KeyId Algorithm
1,209,682 UART: [idev] --
1,210,806 UART: [ldev] ++
1,210,974 UART: [ldev] CDI.KEYID = 6
1,211,337 UART: [ldev] SUBJECT.KEYID = 5
1,211,763 UART: [ldev] AUTHORITY.KEYID = 7
1,212,226 UART: [ldev] FE.KEYID = 1
1,217,596 UART: [ldev] Erasing FE.KEYID = 1
1,244,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,690 UART: [ldev] --
1,284,139 UART: [fwproc] Wait for Commands...
1,284,773 UART: [fwproc] Recv command 0x46574c44
1,285,501 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,330 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,135 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,258 >>> mbox cmd response: failed
1,160,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,264 >>> mbox cmd response: failed
1,160,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,504 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,049 UART: [kat] ++
895,201 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
903,970 UART: [kat] SHA2-512-ACC
905,871 UART: [kat] ECC-384
915,534 UART: [kat] HMAC-384Kdf
920,068 UART: [kat] LMS
1,168,380 UART: [kat] --
1,169,307 UART: [cold-reset] ++
1,169,657 UART: [fht] FHT @ 0x50003400
1,172,481 UART: [idev] ++
1,172,649 UART: [idev] CDI.KEYID = 6
1,173,010 UART: [idev] SUBJECT.KEYID = 7
1,173,435 UART: [idev] UDS.KEYID = 0
1,173,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,937 UART: [idev] Erasing UDS.KEYID = 0
1,197,991 UART: [idev] Sha1 KeyId Algorithm
1,206,783 UART: [idev] --
1,207,794 UART: [ldev] ++
1,207,962 UART: [ldev] CDI.KEYID = 6
1,208,326 UART: [ldev] SUBJECT.KEYID = 5
1,208,753 UART: [ldev] AUTHORITY.KEYID = 7
1,209,216 UART: [ldev] FE.KEYID = 1
1,214,270 UART: [ldev] Erasing FE.KEYID = 1
1,240,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,028 UART: [ldev] --
1,280,314 UART: [fwproc] Wait for Commands...
1,281,133 UART: [fwproc] Recv command 0x46574c44
1,281,866 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,108 UART: ROM Fatal Error: 0x000B0002
1,302,265 >>> mbox cmd response: failed
1,302,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,271 >>> mbox cmd response: failed
1,302,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,917 UART: [kat] SHA2-256
901,857 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,626 UART: [kat] HMAC-384Kdf
921,196 UART: [kat] LMS
1,169,508 UART: [kat] --
1,170,519 UART: [cold-reset] ++
1,170,995 UART: [fht] FHT @ 0x50003400
1,173,639 UART: [idev] ++
1,173,807 UART: [idev] CDI.KEYID = 6
1,174,168 UART: [idev] SUBJECT.KEYID = 7
1,174,593 UART: [idev] UDS.KEYID = 0
1,174,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,437 UART: [idev] Erasing UDS.KEYID = 0
1,199,957 UART: [idev] Sha1 KeyId Algorithm
1,208,701 UART: [idev] --
1,209,678 UART: [ldev] ++
1,209,846 UART: [ldev] CDI.KEYID = 6
1,210,210 UART: [ldev] SUBJECT.KEYID = 5
1,210,637 UART: [ldev] AUTHORITY.KEYID = 7
1,211,100 UART: [ldev] FE.KEYID = 1
1,216,416 UART: [ldev] Erasing FE.KEYID = 1
1,243,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,116 UART: [ldev] --
1,282,554 UART: [fwproc] Wait for Commands...
1,283,209 UART: [fwproc] Recv command 0x46574c44
1,283,942 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,930 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,608 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,062 >>> mbox cmd response: failed
1,155,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,068 >>> mbox cmd response: failed
1,155,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,818 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
891,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
916,237 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,174,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,158 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,209,061 UART: [ldev] ++
1,209,229 UART: [ldev] CDI.KEYID = 6
1,209,593 UART: [ldev] SUBJECT.KEYID = 5
1,210,020 UART: [ldev] AUTHORITY.KEYID = 7
1,210,483 UART: [ldev] FE.KEYID = 1
1,215,917 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,975 UART: [fwproc] Wait for Commands...
1,282,694 UART: [fwproc] Recv command 0x46574c44
1,283,427 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,805 UART: ROM Fatal Error: 0x000B0002
1,303,962 >>> mbox cmd response: failed
1,303,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,968 >>> mbox cmd response: failed
1,303,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,467 UART: [kat] SHA2-512-ACC
906,368 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,170,120 UART: [cold-reset] ++
1,170,666 UART: [fht] FHT @ 0x50003400
1,173,330 UART: [idev] ++
1,173,498 UART: [idev] CDI.KEYID = 6
1,173,859 UART: [idev] SUBJECT.KEYID = 7
1,174,284 UART: [idev] UDS.KEYID = 0
1,174,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,020 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,858 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,471 UART: [ldev] Erasing FE.KEYID = 1
1,241,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,885 UART: [ldev] --
1,280,295 UART: [fwproc] Wait for Commands...
1,280,972 UART: [fwproc] Recv command 0x46574c44
1,281,705 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,047 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,155,985 >>> mbox cmd response: failed
1,155,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,991 >>> mbox cmd response: failed
1,155,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,155,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,315 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,349 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,741 writing to cptra_bootfsm_go
193,025 UART:
193,391 UART: Running Caliptra ROM ...
194,576 UART:
194,729 UART: [state] CFI Enabled
263,823 UART: [state] LifecycleState = Unprovisioned
265,719 UART: [state] DebugLocked = No
267,590 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,311 UART: [kat] SHA2-256
441,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,506 UART: [kat] ++
453,044 UART: [kat] sha1
464,627 UART: [kat] SHA2-256
467,314 UART: [kat] SHA2-384
472,858 UART: [kat] SHA2-512-ACC
475,193 UART: [kat] ECC-384
2,766,987 UART: [kat] HMAC-384Kdf
2,798,020 UART: [kat] LMS
3,988,295 UART: [kat] --
3,994,252 UART: [cold-reset] ++
3,995,329 UART: [fht] Storing FHT @ 0x50003400
4,006,558 UART: [idev] ++
4,007,177 UART: [idev] CDI.KEYID = 6
4,008,099 UART: [idev] SUBJECT.KEYID = 7
4,009,325 UART: [idev] UDS.KEYID = 0
4,012,032 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,281 UART: [idev] Erasing UDS.KEYID = 0
7,341,814 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,986 UART: [idev] --
7,365,826 UART: [ldev] ++
7,366,405 UART: [ldev] CDI.KEYID = 6
7,367,369 UART: [ldev] SUBJECT.KEYID = 5
7,368,584 UART: [ldev] AUTHORITY.KEYID = 7
7,369,871 UART: [ldev] FE.KEYID = 1
7,398,507 UART: [ldev] Erasing FE.KEYID = 1
10,728,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,209 UART: [ldev] --
13,092,458 UART: [fwproc] Waiting for Commands...
13,094,504 UART: [fwproc] Received command 0x46574c44
13,096,691 UART: [fwproc] Received Image of size 113844 bytes
14,494,829 UART: ROM Fatal Error: 0x000B0019
14,498,327 >>> mbox cmd response: failed
14,498,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,499,101 >>> mbox cmd response: failed
14,499,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,499,662 >>> mbox cmd response: failed
Initializing fuses
2,051,472 writing to cptra_bootfsm_go
2,240,790 UART:
2,241,138 UART: Running Caliptra ROM ...
2,242,221 UART:
2,242,373 UART: [state] CFI Enabled
2,313,894 UART: [state] LifecycleState = Unprovisioned
2,315,882 UART: [state] DebugLocked = No
2,318,786 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,159 UART: [kat] SHA2-256
2,492,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,297 UART: [kat] ++
2,503,843 UART: [kat] sha1
2,514,251 UART: [kat] SHA2-256
2,516,945 UART: [kat] SHA2-384
2,523,689 UART: [kat] SHA2-512-ACC
2,526,060 UART: [kat] ECC-384
4,819,431 UART: [kat] HMAC-384Kdf
4,850,499 UART: [kat] LMS
6,040,831 UART: [kat] --
6,044,137 UART: [cold-reset] ++
6,046,675 UART: [fht] Storing FHT @ 0x50003400
6,058,214 UART: [idev] ++
6,058,838 UART: [idev] CDI.KEYID = 6
6,059,907 UART: [idev] SUBJECT.KEYID = 7
6,061,220 UART: [idev] UDS.KEYID = 0
6,063,799 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,206,987 UART: [idev] Erasing UDS.KEYID = 0
9,397,357 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,358 UART: [idev] --
9,423,159 UART: [ldev] ++
9,423,769 UART: [ldev] CDI.KEYID = 6
9,424,704 UART: [ldev] SUBJECT.KEYID = 5
9,425,916 UART: [ldev] AUTHORITY.KEYID = 7
9,427,075 UART: [ldev] FE.KEYID = 1
9,471,706 UART: [ldev] Erasing FE.KEYID = 1
12,804,909 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,112,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,127,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,852 UART: [ldev] --
15,165,900 UART: [fwproc] Waiting for Commands...
15,168,322 UART: [fwproc] Received command 0x46574c44
15,170,512 UART: [fwproc] Received Image of size 113844 bytes
19,225,327 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,304,053 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,372,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,689,608 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,787,422 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,240,849 >>> mbox cmd response: failed
14,241,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,241,755 >>> mbox cmd response: failed
14,242,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,242,323 >>> mbox cmd response: failed
Initializing fuses
2,054,020 writing to cptra_bootfsm_go
5,822,953 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,900,091 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,401 UART:
192,769 UART: Running Caliptra ROM ...
193,956 UART:
603,755 UART: [state] CFI Enabled
618,294 UART: [state] LifecycleState = Unprovisioned
620,221 UART: [state] DebugLocked = No
621,867 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,665 UART: [kat] SHA2-256
797,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,928 UART: [kat] ++
808,394 UART: [kat] sha1
819,326 UART: [kat] SHA2-256
822,058 UART: [kat] SHA2-384
828,150 UART: [kat] SHA2-512-ACC
830,493 UART: [kat] ECC-384
3,114,864 UART: [kat] HMAC-384Kdf
3,127,008 UART: [kat] LMS
4,317,111 UART: [kat] --
4,322,367 UART: [cold-reset] ++
4,324,358 UART: [fht] Storing FHT @ 0x50003400
4,336,433 UART: [idev] ++
4,337,007 UART: [idev] CDI.KEYID = 6
4,338,035 UART: [idev] SUBJECT.KEYID = 7
4,339,200 UART: [idev] UDS.KEYID = 0
4,342,118 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,356 UART: [idev] Erasing UDS.KEYID = 0
7,623,589 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,852 UART: [idev] --
7,650,661 UART: [ldev] ++
7,651,233 UART: [ldev] CDI.KEYID = 6
7,652,202 UART: [ldev] SUBJECT.KEYID = 5
7,653,420 UART: [ldev] AUTHORITY.KEYID = 7
7,654,655 UART: [ldev] FE.KEYID = 1
7,665,578 UART: [ldev] Erasing FE.KEYID = 1
10,955,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,502 UART: [ldev] --
13,316,550 UART: [fwproc] Waiting for Commands...
13,318,379 UART: [fwproc] Received command 0x46574c44
13,320,585 UART: [fwproc] Received Image of size 113844 bytes
14,719,387 UART: ROM Fatal Error: 0x000B0019
14,722,887 >>> mbox cmd response: failed
14,723,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,723,586 >>> mbox cmd response: failed
14,723,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,724,271 >>> mbox cmd response: failed
Initializing fuses
2,059,281 writing to cptra_bootfsm_go
2,249,240 UART:
2,249,590 UART: Running Caliptra ROM ...
2,250,635 UART:
5,746,332 UART: [state] CFI Enabled
5,759,794 UART: [state] LifecycleState = Unprovisioned
5,761,713 UART: [state] DebugLocked = No
5,763,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,767,699 UART: [kat] SHA2-256
5,937,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,947,981 UART: [kat] ++
5,948,441 UART: [kat] sha1
5,958,787 UART: [kat] SHA2-256
5,961,479 UART: [kat] SHA2-384
5,967,466 UART: [kat] SHA2-512-ACC
5,969,815 UART: [kat] ECC-384
8,255,801 UART: [kat] HMAC-384Kdf
8,267,391 UART: [kat] LMS
9,457,487 UART: [kat] --
9,460,527 UART: [cold-reset] ++
9,461,814 UART: [fht] Storing FHT @ 0x50003400
9,472,889 UART: [idev] ++
9,473,454 UART: [idev] CDI.KEYID = 6
9,474,388 UART: [idev] SUBJECT.KEYID = 7
9,475,659 UART: [idev] UDS.KEYID = 0
9,478,367 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
9,621,495 UART: [idev] Erasing UDS.KEYID = 0
12,760,180 UART: [idev] Using Sha1 for KeyId Algorithm
12,781,285 UART: [idev] --
12,785,572 UART: [ldev] ++
12,786,204 UART: [ldev] CDI.KEYID = 6
12,787,128 UART: [ldev] SUBJECT.KEYID = 5
12,788,393 UART: [ldev] AUTHORITY.KEYID = 7
12,789,634 UART: [ldev] FE.KEYID = 1
12,800,709 UART: [ldev] Erasing FE.KEYID = 1
16,087,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,381,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,396,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,410,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,425,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,444,559 UART: [ldev] --
18,448,793 UART: [fwproc] Waiting for Commands...
18,451,483 UART: [fwproc] Received command 0x46574c44
18,453,723 UART: [fwproc] Received Image of size 113844 bytes
22,497,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,571,019 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,639,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,956,088 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
4,128,589 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,451,645 >>> mbox cmd response: failed
14,452,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,452,697 >>> mbox cmd response: failed
14,452,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,453,262 >>> mbox cmd response: failed
Initializing fuses
2,049,223 writing to cptra_bootfsm_go
9,547,632 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,474,999 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,103 UART:
192,458 UART: Running Caliptra ROM ...
193,541 UART:
193,681 UART: [state] CFI Enabled
263,138 UART: [state] LifecycleState = Unprovisioned
264,963 UART: [state] DebugLocked = No
267,126 UART: [state] WD Timer not started. Device not locked for debugging
270,795 UART: [kat] SHA2-256
449,952 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,479 UART: [kat] ++
461,930 UART: [kat] sha1
471,567 UART: [kat] SHA2-256
474,586 UART: [kat] SHA2-384
479,055 UART: [kat] SHA2-512-ACC
481,998 UART: [kat] ECC-384
2,944,953 UART: [kat] HMAC-384Kdf
2,968,768 UART: [kat] LMS
3,498,198 UART: [kat] --
3,503,790 UART: [cold-reset] ++
3,506,162 UART: [fht] FHT @ 0x50003400
3,516,443 UART: [idev] ++
3,517,007 UART: [idev] CDI.KEYID = 6
3,517,896 UART: [idev] SUBJECT.KEYID = 7
3,519,132 UART: [idev] UDS.KEYID = 0
3,522,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,869 UART: [idev] Erasing UDS.KEYID = 0
6,021,801 UART: [idev] Sha1 KeyId Algorithm
6,044,895 UART: [idev] --
6,049,686 UART: [ldev] ++
6,050,270 UART: [ldev] CDI.KEYID = 6
6,051,167 UART: [ldev] SUBJECT.KEYID = 5
6,052,385 UART: [ldev] AUTHORITY.KEYID = 7
6,053,584 UART: [ldev] FE.KEYID = 1
6,096,829 UART: [ldev] Erasing FE.KEYID = 1
8,601,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,616 UART: [ldev] --
10,408,987 UART: [fwproc] Wait for Commands...
10,410,499 UART: [fwproc] Recv command 0x46574c44
10,412,605 UART: [fwproc] Recv'd Img size: 114168 bytes
11,486,444 UART: ROM Fatal Error: 0x000B0019
11,489,519 >>> mbox cmd response: failed
11,489,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,490,228 >>> mbox cmd response: failed
11,490,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,490,819 >>> mbox cmd response: failed
Initializing fuses
2,052,963 writing to cptra_bootfsm_go
2,242,279 UART:
2,242,641 UART: Running Caliptra ROM ...
2,243,779 UART:
2,243,951 UART: [state] CFI Enabled
2,318,318 UART: [state] LifecycleState = Unprovisioned
2,320,205 UART: [state] DebugLocked = No
2,322,900 UART: [state] WD Timer not started. Device not locked for debugging
2,327,408 UART: [kat] SHA2-256
2,506,539 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,104 UART: [kat] ++
2,518,653 UART: [kat] sha1
2,529,605 UART: [kat] SHA2-256
2,532,628 UART: [kat] SHA2-384
2,539,209 UART: [kat] SHA2-512-ACC
2,542,139 UART: [kat] ECC-384
5,001,449 UART: [kat] HMAC-384Kdf
5,022,762 UART: [kat] LMS
5,552,221 UART: [kat] --
5,556,973 UART: [cold-reset] ++
5,558,153 UART: [fht] FHT @ 0x50003400
5,570,374 UART: [idev] ++
5,570,948 UART: [idev] CDI.KEYID = 6
5,571,859 UART: [idev] SUBJECT.KEYID = 7
5,573,076 UART: [idev] UDS.KEYID = 0
5,575,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,719,297 UART: [idev] Erasing UDS.KEYID = 0
8,076,964 UART: [idev] Sha1 KeyId Algorithm
8,099,558 UART: [idev] --
8,103,994 UART: [ldev] ++
8,104,576 UART: [ldev] CDI.KEYID = 6
8,105,490 UART: [ldev] SUBJECT.KEYID = 5
8,106,653 UART: [ldev] AUTHORITY.KEYID = 7
8,107,944 UART: [ldev] FE.KEYID = 1
8,152,375 UART: [ldev] Erasing FE.KEYID = 1
10,658,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,874 UART: [ldev] --
12,465,213 UART: [fwproc] Wait for Commands...
12,467,272 UART: [fwproc] Recv command 0x46574c44
12,469,371 UART: [fwproc] Recv'd Img size: 114168 bytes
15,868,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,942,316 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,134 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,328,445 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,363,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,279,510 >>> mbox cmd response: failed
11,280,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,280,417 >>> mbox cmd response: failed
11,280,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,280,980 >>> mbox cmd response: failed
Initializing fuses
2,048,502 writing to cptra_bootfsm_go
5,412,461 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,096,748 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
192,636 UART:
193,013 UART: Running Caliptra ROM ...
194,209 UART:
603,812 UART: [state] CFI Enabled
617,502 UART: [state] LifecycleState = Unprovisioned
619,330 UART: [state] DebugLocked = No
622,276 UART: [state] WD Timer not started. Device not locked for debugging
626,050 UART: [kat] SHA2-256
805,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,766 UART: [kat] ++
817,303 UART: [kat] sha1
828,565 UART: [kat] SHA2-256
831,568 UART: [kat] SHA2-384
837,807 UART: [kat] SHA2-512-ACC
840,733 UART: [kat] ECC-384
3,281,638 UART: [kat] HMAC-384Kdf
3,294,636 UART: [kat] LMS
3,824,117 UART: [kat] --
3,828,378 UART: [cold-reset] ++
3,829,393 UART: [fht] FHT @ 0x50003400
3,839,914 UART: [idev] ++
3,840,474 UART: [idev] CDI.KEYID = 6
3,841,413 UART: [idev] SUBJECT.KEYID = 7
3,842,625 UART: [idev] UDS.KEYID = 0
3,845,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,299 UART: [idev] Erasing UDS.KEYID = 0
6,315,737 UART: [idev] Sha1 KeyId Algorithm
6,338,204 UART: [idev] --
6,342,661 UART: [ldev] ++
6,343,236 UART: [ldev] CDI.KEYID = 6
6,344,147 UART: [ldev] SUBJECT.KEYID = 5
6,345,378 UART: [ldev] AUTHORITY.KEYID = 7
6,346,614 UART: [ldev] FE.KEYID = 1
6,355,154 UART: [ldev] Erasing FE.KEYID = 1
8,827,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,056 UART: [ldev] --
10,620,506 UART: [fwproc] Wait for Commands...
10,622,818 UART: [fwproc] Recv command 0x46574c44
10,624,922 UART: [fwproc] Recv'd Img size: 114168 bytes
11,700,401 UART: ROM Fatal Error: 0x000B0019
11,703,522 >>> mbox cmd response: failed
11,703,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,704,281 >>> mbox cmd response: failed
11,704,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,704,842 >>> mbox cmd response: failed
Initializing fuses
2,054,821 writing to cptra_bootfsm_go
2,244,174 UART:
2,244,530 UART: Running Caliptra ROM ...
2,245,694 UART:
8,748,668 UART: [state] CFI Enabled
8,761,592 UART: [state] LifecycleState = Unprovisioned
8,763,448 UART: [state] DebugLocked = No
8,764,755 UART: [state] WD Timer not started. Device not locked for debugging
8,769,036 UART: [kat] SHA2-256
8,948,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,959,723 UART: [kat] ++
8,960,267 UART: [kat] sha1
8,971,647 UART: [kat] SHA2-256
8,974,675 UART: [kat] SHA2-384
8,980,176 UART: [kat] SHA2-512-ACC
8,983,176 UART: [kat] ECC-384
11,427,274 UART: [kat] HMAC-384Kdf
11,439,874 UART: [kat] LMS
11,969,328 UART: [kat] --
11,971,333 UART: [cold-reset] ++
11,973,911 UART: [fht] FHT @ 0x50003400
11,984,885 UART: [idev] ++
11,985,490 UART: [idev] CDI.KEYID = 6
11,986,407 UART: [idev] SUBJECT.KEYID = 7
11,987,505 UART: [idev] UDS.KEYID = 0
11,990,598 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,133,972 UART: [idev] Erasing UDS.KEYID = 0
14,455,063 UART: [idev] Sha1 KeyId Algorithm
14,478,346 UART: [idev] --
14,482,635 UART: [ldev] ++
14,483,209 UART: [ldev] CDI.KEYID = 6
14,484,090 UART: [ldev] SUBJECT.KEYID = 5
14,485,303 UART: [ldev] AUTHORITY.KEYID = 7
14,486,536 UART: [ldev] FE.KEYID = 1
14,495,777 UART: [ldev] Erasing FE.KEYID = 1
16,967,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,684,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,700,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,716,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,732,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,752,946 UART: [ldev] --
18,757,776 UART: [fwproc] Wait for Commands...
18,759,826 UART: [fwproc] Recv command 0x46574c44
18,761,929 UART: [fwproc] Recv'd Img size: 114168 bytes
22,157,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,229,053 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,297,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,614,934 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,704,490 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,478,323 >>> mbox cmd response: failed
11,478,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,479,223 >>> mbox cmd response: failed
11,479,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,479,778 >>> mbox cmd response: failed
Initializing fuses
2,058,291 writing to cptra_bootfsm_go
12,073,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,631,373 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,183 UART:
192,534 UART: Running Caliptra ROM ...
193,719 UART:
193,876 UART: [state] CFI Enabled
262,724 UART: [state] LifecycleState = Unprovisioned
265,159 UART: [state] DebugLocked = No
267,300 UART: [state] WD Timer not started. Device not locked for debugging
272,137 UART: [kat] SHA2-256
462,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,793 UART: [kat] ++
473,272 UART: [kat] sha1
483,342 UART: [kat] SHA2-256
486,348 UART: [kat] SHA2-384
493,584 UART: [kat] SHA2-512-ACC
496,200 UART: [kat] ECC-384
2,945,231 UART: [kat] HMAC-384Kdf
2,970,055 UART: [kat] LMS
3,501,824 UART: [kat] --
3,506,576 UART: [cold-reset] ++
3,508,833 UART: [fht] FHT @ 0x50003400
3,521,272 UART: [idev] ++
3,522,003 UART: [idev] CDI.KEYID = 6
3,522,898 UART: [idev] SUBJECT.KEYID = 7
3,524,114 UART: [idev] UDS.KEYID = 0
3,526,774 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,433 UART: [idev] Erasing UDS.KEYID = 0
6,030,309 UART: [idev] Sha1 KeyId Algorithm
6,052,313 UART: [idev] --
6,057,017 UART: [ldev] ++
6,057,707 UART: [ldev] CDI.KEYID = 6
6,058,633 UART: [ldev] SUBJECT.KEYID = 5
6,059,796 UART: [ldev] AUTHORITY.KEYID = 7
6,061,034 UART: [ldev] FE.KEYID = 1
6,098,266 UART: [ldev] Erasing FE.KEYID = 1
8,603,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,455 UART: [ldev] --
10,410,191 UART: [fwproc] Wait for Commands...
10,413,205 UART: [fwproc] Recv command 0x46574c44
10,415,473 UART: [fwproc] Recv'd Img size: 114168 bytes
11,512,849 UART: ROM Fatal Error: 0x000B0019
11,516,534 >>> mbox cmd response: failed
11,516,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,517,219 >>> mbox cmd response: failed
11,517,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,517,778 >>> mbox cmd response: failed
Initializing fuses
2,054,736 writing to cptra_bootfsm_go
2,244,041 UART:
2,244,380 UART: Running Caliptra ROM ...
2,245,427 UART:
2,245,580 UART: [state] CFI Enabled
2,314,412 UART: [state] LifecycleState = Unprovisioned
2,316,754 UART: [state] DebugLocked = No
2,319,191 UART: [state] WD Timer not started. Device not locked for debugging
2,323,556 UART: [kat] SHA2-256
2,513,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,169 UART: [kat] ++
2,524,624 UART: [kat] sha1
2,535,999 UART: [kat] SHA2-256
2,539,025 UART: [kat] SHA2-384
2,544,268 UART: [kat] SHA2-512-ACC
2,546,840 UART: [kat] ECC-384
4,995,627 UART: [kat] HMAC-384Kdf
5,018,452 UART: [kat] LMS
5,550,242 UART: [kat] --
5,553,640 UART: [cold-reset] ++
5,554,930 UART: [fht] FHT @ 0x50003400
5,567,102 UART: [idev] ++
5,567,779 UART: [idev] CDI.KEYID = 6
5,568,716 UART: [idev] SUBJECT.KEYID = 7
5,569,926 UART: [idev] UDS.KEYID = 0
5,572,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,716,258 UART: [idev] Erasing UDS.KEYID = 0
8,074,511 UART: [idev] Sha1 KeyId Algorithm
8,096,077 UART: [idev] --
8,100,000 UART: [ldev] ++
8,100,696 UART: [ldev] CDI.KEYID = 6
8,101,584 UART: [ldev] SUBJECT.KEYID = 5
8,102,712 UART: [ldev] AUTHORITY.KEYID = 7
8,104,005 UART: [ldev] FE.KEYID = 1
8,147,361 UART: [ldev] Erasing FE.KEYID = 1
10,655,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,377 UART: [ldev] --
12,463,398 UART: [fwproc] Wait for Commands...
12,465,872 UART: [fwproc] Recv command 0x46574c44
12,468,143 UART: [fwproc] Recv'd Img size: 114168 bytes
15,916,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,003,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,119,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,661,343 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,433,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,312,805 >>> mbox cmd response: failed
11,313,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,313,929 >>> mbox cmd response: failed
11,314,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,314,493 >>> mbox cmd response: failed
Initializing fuses
2,060,674 writing to cptra_bootfsm_go
5,468,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,765,436 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,594 UART:
192,978 UART: Running Caliptra ROM ...
194,175 UART:
603,820 UART: [state] CFI Enabled
618,380 UART: [state] LifecycleState = Unprovisioned
620,758 UART: [state] DebugLocked = No
623,270 UART: [state] WD Timer not started. Device not locked for debugging
628,039 UART: [kat] SHA2-256
817,888 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,699 UART: [kat] ++
829,288 UART: [kat] sha1
841,523 UART: [kat] SHA2-256
844,539 UART: [kat] SHA2-384
849,331 UART: [kat] SHA2-512-ACC
851,889 UART: [kat] ECC-384
3,294,464 UART: [kat] HMAC-384Kdf
3,308,062 UART: [kat] LMS
3,839,907 UART: [kat] --
3,844,068 UART: [cold-reset] ++
3,845,442 UART: [fht] FHT @ 0x50003400
3,858,486 UART: [idev] ++
3,859,175 UART: [idev] CDI.KEYID = 6
3,860,144 UART: [idev] SUBJECT.KEYID = 7
3,861,306 UART: [idev] UDS.KEYID = 0
3,864,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,652 UART: [idev] Erasing UDS.KEYID = 0
6,335,186 UART: [idev] Sha1 KeyId Algorithm
6,357,113 UART: [idev] --
6,361,434 UART: [ldev] ++
6,362,117 UART: [ldev] CDI.KEYID = 6
6,363,087 UART: [ldev] SUBJECT.KEYID = 5
6,364,248 UART: [ldev] AUTHORITY.KEYID = 7
6,365,428 UART: [ldev] FE.KEYID = 1
6,376,076 UART: [ldev] Erasing FE.KEYID = 1
8,855,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,646 UART: [ldev] --
10,643,825 UART: [fwproc] Wait for Commands...
10,646,797 UART: [fwproc] Recv command 0x46574c44
10,649,084 UART: [fwproc] Recv'd Img size: 114168 bytes
11,757,887 UART: ROM Fatal Error: 0x000B0019
11,761,556 >>> mbox cmd response: failed
11,761,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,762,340 >>> mbox cmd response: failed
11,762,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,762,902 >>> mbox cmd response: failed
Initializing fuses
2,056,644 writing to cptra_bootfsm_go
2,246,007 UART:
2,246,377 UART: Running Caliptra ROM ...
2,247,457 UART:
8,695,443 UART: [state] CFI Enabled
8,711,726 UART: [state] LifecycleState = Unprovisioned
8,714,094 UART: [state] DebugLocked = No
8,716,188 UART: [state] WD Timer not started. Device not locked for debugging
8,720,436 UART: [kat] SHA2-256
8,910,304 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,921,106 UART: [kat] ++
8,921,579 UART: [kat] sha1
8,933,873 UART: [kat] SHA2-256
8,936,900 UART: [kat] SHA2-384
8,942,739 UART: [kat] SHA2-512-ACC
8,945,314 UART: [kat] ECC-384
11,388,080 UART: [kat] HMAC-384Kdf
11,401,889 UART: [kat] LMS
11,933,711 UART: [kat] --
11,937,184 UART: [cold-reset] ++
11,938,412 UART: [fht] FHT @ 0x50003400
11,949,179 UART: [idev] ++
11,949,864 UART: [idev] CDI.KEYID = 6
11,950,835 UART: [idev] SUBJECT.KEYID = 7
11,952,050 UART: [idev] UDS.KEYID = 0
11,954,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,098,728 UART: [idev] Erasing UDS.KEYID = 0
14,424,410 UART: [idev] Sha1 KeyId Algorithm
14,446,899 UART: [idev] --
14,451,166 UART: [ldev] ++
14,451,900 UART: [ldev] CDI.KEYID = 6
14,452,808 UART: [ldev] SUBJECT.KEYID = 5
14,453,964 UART: [ldev] AUTHORITY.KEYID = 7
14,455,191 UART: [ldev] FE.KEYID = 1
14,467,459 UART: [ldev] Erasing FE.KEYID = 1
16,944,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,663,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,678,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,693,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,709,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,730,247 UART: [ldev] --
18,734,929 UART: [fwproc] Wait for Commands...
18,736,976 UART: [fwproc] Recv command 0x46574c44
18,739,298 UART: [fwproc] Recv'd Img size: 114168 bytes
22,180,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,253,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,369,155 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,911,087 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,749,586 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,531,472 >>> mbox cmd response: failed
11,532,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,532,378 >>> mbox cmd response: failed
11,532,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,532,944 >>> mbox cmd response: failed
Initializing fuses
2,048,151 writing to cptra_bootfsm_go
12,092,122 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,293,594 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,063 UART: [kat] SHA2-256
881,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,109 UART: [kat] ++
886,261 UART: [kat] sha1
890,485 UART: [kat] SHA2-256
892,423 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,548 UART: [kat] HMAC-384Kdf
907,184 UART: [kat] LMS
1,475,380 UART: [kat] --
1,476,339 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,574 UART: [idev] ++
1,479,742 UART: [idev] CDI.KEYID = 6
1,480,102 UART: [idev] SUBJECT.KEYID = 7
1,480,526 UART: [idev] UDS.KEYID = 0
1,480,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,262 UART: [idev] Erasing UDS.KEYID = 0
1,504,666 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,430 UART: [idev] --
1,514,717 UART: [ldev] ++
1,514,885 UART: [ldev] CDI.KEYID = 6
1,515,248 UART: [ldev] SUBJECT.KEYID = 5
1,515,674 UART: [ldev] AUTHORITY.KEYID = 7
1,516,137 UART: [ldev] FE.KEYID = 1
1,521,205 UART: [ldev] Erasing FE.KEYID = 1
1,546,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,440 UART: [ldev] --
1,585,895 UART: [fwproc] Waiting for Commands...
1,586,516 UART: [fwproc] Received command 0x46574c44
1,587,307 UART: [fwproc] Received Image of size 114168 bytes
1,626,146 UART: ROM Fatal Error: 0x000B0019
1,627,303 >>> mbox cmd response: failed
1,627,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,309 >>> mbox cmd response: failed
1,627,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,621 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,096 UART: [kat] SHA2-512-ACC
896,997 UART: [kat] ECC-384
902,378 UART: [kat] HMAC-384Kdf
906,972 UART: [kat] LMS
1,475,168 UART: [kat] --
1,475,969 UART: [cold-reset] ++
1,476,339 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,546 UART: [idev] Erasing UDS.KEYID = 0
1,504,646 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,402 UART: [idev] --
1,514,433 UART: [ldev] ++
1,514,601 UART: [ldev] CDI.KEYID = 6
1,514,964 UART: [ldev] SUBJECT.KEYID = 5
1,515,390 UART: [ldev] AUTHORITY.KEYID = 7
1,515,853 UART: [ldev] FE.KEYID = 1
1,520,979 UART: [ldev] Erasing FE.KEYID = 1
1,546,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,594 UART: [ldev] --
1,585,859 UART: [fwproc] Waiting for Commands...
1,586,564 UART: [fwproc] Received command 0x46574c44
1,587,355 UART: [fwproc] Received Image of size 114168 bytes
2,883,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,964 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,057 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,465 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,480,576 >>> mbox cmd response: failed
1,480,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,582 >>> mbox cmd response: failed
1,480,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,165 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,468 UART: [kat] SHA2-256
892,406 UART: [kat] SHA2-384
895,121 UART: [kat] SHA2-512-ACC
897,022 UART: [kat] ECC-384
902,445 UART: [kat] HMAC-384Kdf
907,173 UART: [kat] LMS
1,475,369 UART: [kat] --
1,476,324 UART: [cold-reset] ++
1,476,692 UART: [fht] Storing FHT @ 0x50003400
1,479,511 UART: [idev] ++
1,479,679 UART: [idev] CDI.KEYID = 6
1,480,039 UART: [idev] SUBJECT.KEYID = 7
1,480,463 UART: [idev] UDS.KEYID = 0
1,480,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,561 UART: [idev] Erasing UDS.KEYID = 0
1,504,767 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,421 UART: [idev] --
1,514,578 UART: [ldev] ++
1,514,746 UART: [ldev] CDI.KEYID = 6
1,515,109 UART: [ldev] SUBJECT.KEYID = 5
1,515,535 UART: [ldev] AUTHORITY.KEYID = 7
1,515,998 UART: [ldev] FE.KEYID = 1
1,521,102 UART: [ldev] Erasing FE.KEYID = 1
1,546,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,629 UART: [ldev] --
1,585,908 UART: [fwproc] Waiting for Commands...
1,586,589 UART: [fwproc] Received command 0x46574c44
1,587,380 UART: [fwproc] Received Image of size 114168 bytes
1,627,351 UART: ROM Fatal Error: 0x000B0019
1,628,508 >>> mbox cmd response: failed
1,628,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,514 >>> mbox cmd response: failed
1,628,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,520 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
87,084 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,804 UART: [kat] SHA2-256
882,735 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,850 UART: [kat] ++
887,002 UART: [kat] sha1
891,194 UART: [kat] SHA2-256
893,132 UART: [kat] SHA2-384
895,929 UART: [kat] SHA2-512-ACC
897,830 UART: [kat] ECC-384
903,493 UART: [kat] HMAC-384Kdf
908,015 UART: [kat] LMS
1,476,211 UART: [kat] --
1,477,398 UART: [cold-reset] ++
1,477,946 UART: [fht] Storing FHT @ 0x50003400
1,480,641 UART: [idev] ++
1,480,809 UART: [idev] CDI.KEYID = 6
1,481,169 UART: [idev] SUBJECT.KEYID = 7
1,481,593 UART: [idev] UDS.KEYID = 0
1,481,938 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,421 UART: [idev] Erasing UDS.KEYID = 0
1,506,547 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,077 UART: [idev] --
1,516,046 UART: [ldev] ++
1,516,214 UART: [ldev] CDI.KEYID = 6
1,516,577 UART: [ldev] SUBJECT.KEYID = 5
1,517,003 UART: [ldev] AUTHORITY.KEYID = 7
1,517,466 UART: [ldev] FE.KEYID = 1
1,522,552 UART: [ldev] Erasing FE.KEYID = 1
1,547,859 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,955 UART: [ldev] --
1,587,362 UART: [fwproc] Waiting for Commands...
1,588,199 UART: [fwproc] Received command 0x46574c44
1,588,990 UART: [fwproc] Received Image of size 114168 bytes
2,885,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,239 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,306 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,620 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,479,657 >>> mbox cmd response: failed
1,479,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,663 >>> mbox cmd response: failed
1,479,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,669 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,134 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
918,120 UART: [kat] HMAC-384Kdf
922,848 UART: [kat] LMS
1,171,176 UART: [kat] --
1,171,851 UART: [cold-reset] ++
1,172,423 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,908 UART: [idev] Erasing UDS.KEYID = 0
1,201,393 UART: [idev] Sha1 KeyId Algorithm
1,209,909 UART: [idev] --
1,211,085 UART: [ldev] ++
1,211,253 UART: [ldev] CDI.KEYID = 6
1,211,616 UART: [ldev] SUBJECT.KEYID = 5
1,212,042 UART: [ldev] AUTHORITY.KEYID = 7
1,212,505 UART: [ldev] FE.KEYID = 1
1,217,521 UART: [ldev] Erasing FE.KEYID = 1
1,243,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,779 UART: [ldev] --
1,283,292 UART: [fwproc] Wait for Commands...
1,283,918 UART: [fwproc] Recv command 0x46574c44
1,284,646 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,355 UART: ROM Fatal Error: 0x000B0019
1,325,512 >>> mbox cmd response: failed
1,325,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,518 >>> mbox cmd response: failed
1,325,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,592 UART: [kat] SHA2-512-ACC
908,493 UART: [kat] ECC-384
918,308 UART: [kat] HMAC-384Kdf
923,010 UART: [kat] LMS
1,171,338 UART: [kat] --
1,172,231 UART: [cold-reset] ++
1,172,659 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,102 UART: [idev] Erasing UDS.KEYID = 0
1,201,597 UART: [idev] Sha1 KeyId Algorithm
1,210,003 UART: [idev] --
1,211,017 UART: [ldev] ++
1,211,185 UART: [ldev] CDI.KEYID = 6
1,211,548 UART: [ldev] SUBJECT.KEYID = 5
1,211,974 UART: [ldev] AUTHORITY.KEYID = 7
1,212,437 UART: [ldev] FE.KEYID = 1
1,217,653 UART: [ldev] Erasing FE.KEYID = 1
1,243,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,025 UART: [ldev] --
1,283,428 UART: [fwproc] Wait for Commands...
1,284,138 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,757 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,061 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,612 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,179 >>> mbox cmd response: failed
1,178,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,185 >>> mbox cmd response: failed
1,178,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,721 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,705 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,789 UART: [state] LifecycleState = Unprovisioned
86,444 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
893,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,966 UART: [kat] ++
898,118 UART: [kat] sha1
902,226 UART: [kat] SHA2-256
904,166 UART: [kat] SHA2-384
906,949 UART: [kat] SHA2-512-ACC
908,850 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,337 UART: [kat] LMS
1,171,665 UART: [kat] --
1,172,712 UART: [cold-reset] ++
1,173,224 UART: [fht] FHT @ 0x50003400
1,175,867 UART: [idev] ++
1,176,035 UART: [idev] CDI.KEYID = 6
1,176,395 UART: [idev] SUBJECT.KEYID = 7
1,176,819 UART: [idev] UDS.KEYID = 0
1,177,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,873 UART: [idev] Erasing UDS.KEYID = 0
1,202,216 UART: [idev] Sha1 KeyId Algorithm
1,210,792 UART: [idev] --
1,211,728 UART: [ldev] ++
1,211,896 UART: [ldev] CDI.KEYID = 6
1,212,259 UART: [ldev] SUBJECT.KEYID = 5
1,212,685 UART: [ldev] AUTHORITY.KEYID = 7
1,213,148 UART: [ldev] FE.KEYID = 1
1,218,394 UART: [ldev] Erasing FE.KEYID = 1
1,244,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,968 UART: [ldev] --
1,284,341 UART: [fwproc] Wait for Commands...
1,284,995 UART: [fwproc] Recv command 0x46574c44
1,285,723 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,316 UART: ROM Fatal Error: 0x000B0019
1,325,473 >>> mbox cmd response: failed
1,325,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,479 >>> mbox cmd response: failed
1,325,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,485 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
907,017 UART: [kat] SHA2-512-ACC
908,918 UART: [kat] ECC-384
918,551 UART: [kat] HMAC-384Kdf
923,371 UART: [kat] LMS
1,171,699 UART: [kat] --
1,172,566 UART: [cold-reset] ++
1,172,936 UART: [fht] FHT @ 0x50003400
1,175,473 UART: [idev] ++
1,175,641 UART: [idev] CDI.KEYID = 6
1,176,001 UART: [idev] SUBJECT.KEYID = 7
1,176,425 UART: [idev] UDS.KEYID = 0
1,176,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,863 UART: [idev] Erasing UDS.KEYID = 0
1,201,438 UART: [idev] Sha1 KeyId Algorithm
1,209,866 UART: [idev] --
1,210,790 UART: [ldev] ++
1,210,958 UART: [ldev] CDI.KEYID = 6
1,211,321 UART: [ldev] SUBJECT.KEYID = 5
1,211,747 UART: [ldev] AUTHORITY.KEYID = 7
1,212,210 UART: [ldev] FE.KEYID = 1
1,217,606 UART: [ldev] Erasing FE.KEYID = 1
1,243,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,532 UART: [ldev] --
1,282,945 UART: [fwproc] Wait for Commands...
1,283,525 UART: [fwproc] Recv command 0x46574c44
1,284,253 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,145 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,460 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,048 >>> mbox cmd response: failed
1,180,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,054 >>> mbox cmd response: failed
1,180,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,866 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,116 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,158 UART: [kat] SHA2-256
890,708 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,837 UART: [kat] ++
894,989 UART: [kat] sha1
899,243 UART: [kat] SHA2-256
901,183 UART: [kat] SHA2-384
903,992 UART: [kat] SHA2-512-ACC
905,893 UART: [kat] ECC-384
915,134 UART: [kat] HMAC-384Kdf
919,730 UART: [kat] LMS
1,168,042 UART: [kat] --
1,168,995 UART: [cold-reset] ++
1,169,353 UART: [fht] FHT @ 0x50003400
1,172,185 UART: [idev] ++
1,172,353 UART: [idev] CDI.KEYID = 6
1,172,714 UART: [idev] SUBJECT.KEYID = 7
1,173,139 UART: [idev] UDS.KEYID = 0
1,173,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,905 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,035 UART: [idev] --
1,208,158 UART: [ldev] ++
1,208,326 UART: [ldev] CDI.KEYID = 6
1,208,690 UART: [ldev] SUBJECT.KEYID = 5
1,209,117 UART: [ldev] AUTHORITY.KEYID = 7
1,209,580 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,240,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,368 UART: [ldev] --
1,279,674 UART: [fwproc] Wait for Commands...
1,280,423 UART: [fwproc] Recv command 0x46574c44
1,281,156 UART: [fwproc] Recv'd Img size: 114168 bytes
1,321,082 UART: ROM Fatal Error: 0x000B0019
1,322,239 >>> mbox cmd response: failed
1,322,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,245 >>> mbox cmd response: failed
1,322,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,251 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,174,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,843 UART: [idev] Erasing UDS.KEYID = 0
1,199,033 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,209,028 UART: [ldev] ++
1,209,196 UART: [ldev] CDI.KEYID = 6
1,209,560 UART: [ldev] SUBJECT.KEYID = 5
1,209,987 UART: [ldev] AUTHORITY.KEYID = 7
1,210,450 UART: [ldev] FE.KEYID = 1
1,215,502 UART: [ldev] Erasing FE.KEYID = 1
1,242,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,488 UART: [ldev] --
1,281,872 UART: [fwproc] Wait for Commands...
1,282,611 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,831 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,140 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,724 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,222 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,175,510 >>> mbox cmd response: failed
1,175,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,516 >>> mbox cmd response: failed
1,175,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,522 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
891,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,042 UART: [kat] ++
896,194 UART: [kat] sha1
900,468 UART: [kat] SHA2-256
902,408 UART: [kat] SHA2-384
905,229 UART: [kat] SHA2-512-ACC
907,130 UART: [kat] ECC-384
916,977 UART: [kat] HMAC-384Kdf
921,603 UART: [kat] LMS
1,169,915 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,171,036 UART: [fht] FHT @ 0x50003400
1,173,650 UART: [idev] ++
1,173,818 UART: [idev] CDI.KEYID = 6
1,174,179 UART: [idev] SUBJECT.KEYID = 7
1,174,604 UART: [idev] UDS.KEYID = 0
1,174,950 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,794 UART: [idev] Erasing UDS.KEYID = 0
1,200,092 UART: [idev] Sha1 KeyId Algorithm
1,208,826 UART: [idev] --
1,209,801 UART: [ldev] ++
1,209,969 UART: [ldev] CDI.KEYID = 6
1,210,333 UART: [ldev] SUBJECT.KEYID = 5
1,210,760 UART: [ldev] AUTHORITY.KEYID = 7
1,211,223 UART: [ldev] FE.KEYID = 1
1,216,355 UART: [ldev] Erasing FE.KEYID = 1
1,242,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,125 UART: [ldev] --
1,282,491 UART: [fwproc] Wait for Commands...
1,283,154 UART: [fwproc] Recv command 0x46574c44
1,283,887 UART: [fwproc] Recv'd Img size: 114168 bytes
1,323,615 UART: ROM Fatal Error: 0x000B0019
1,324,772 >>> mbox cmd response: failed
1,324,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,778 >>> mbox cmd response: failed
1,324,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,766 UART: [kat] ++
895,918 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,645 UART: [kat] HMAC-384Kdf
921,353 UART: [kat] LMS
1,169,665 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,040 UART: [fht] FHT @ 0x50003400
1,173,676 UART: [idev] ++
1,173,844 UART: [idev] CDI.KEYID = 6
1,174,205 UART: [idev] SUBJECT.KEYID = 7
1,174,630 UART: [idev] UDS.KEYID = 0
1,174,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,200,100 UART: [idev] Sha1 KeyId Algorithm
1,208,952 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,521 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,471 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,597 UART: [ldev] --
1,281,871 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,289 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,618 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,927 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,587 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,175,289 >>> mbox cmd response: failed
1,175,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,295 >>> mbox cmd response: failed
1,175,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,543 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,981 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,120 UART:
192,499 UART: Running Caliptra ROM ...
193,688 UART:
193,839 UART: [state] CFI Enabled
263,079 UART: [state] LifecycleState = Unprovisioned
265,030 UART: [state] DebugLocked = No
267,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,039 UART: [kat] SHA2-256
441,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,264 UART: [kat] ++
452,711 UART: [kat] sha1
462,644 UART: [kat] SHA2-256
465,326 UART: [kat] SHA2-384
470,761 UART: [kat] SHA2-512-ACC
473,095 UART: [kat] ECC-384
2,768,700 UART: [kat] HMAC-384Kdf
2,799,249 UART: [kat] LMS
3,989,541 UART: [kat] --
3,994,092 UART: [cold-reset] ++
3,996,035 UART: [fht] Storing FHT @ 0x50003400
4,007,522 UART: [idev] ++
4,008,130 UART: [idev] CDI.KEYID = 6
4,009,056 UART: [idev] SUBJECT.KEYID = 7
4,010,279 UART: [idev] UDS.KEYID = 0
4,012,956 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,181 UART: [idev] Erasing UDS.KEYID = 0
7,344,721 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,401 UART: [idev] --
7,372,344 UART: [ldev] ++
7,372,976 UART: [ldev] CDI.KEYID = 6
7,373,863 UART: [ldev] SUBJECT.KEYID = 5
7,375,162 UART: [ldev] AUTHORITY.KEYID = 7
7,376,398 UART: [ldev] FE.KEYID = 1
7,421,556 UART: [ldev] Erasing FE.KEYID = 1
10,755,271 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,623 UART: [ldev] --
13,136,623 UART: [fwproc] Waiting for Commands...
13,138,838 UART: [fwproc] Received command 0x46574c44
13,141,025 UART: [fwproc] Received Image of size 113844 bytes
15,830,130 UART: ROM Fatal Error: 0x000B000F
15,833,579 >>> mbox cmd response: failed
15,834,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,834,351 >>> mbox cmd response: failed
15,834,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,834,936 >>> mbox cmd response: failed
Initializing fuses
2,055,775 writing to cptra_bootfsm_go
2,245,075 UART:
2,245,441 UART: Running Caliptra ROM ...
2,246,581 UART:
2,246,745 UART: [state] CFI Enabled
2,303,586 UART: [state] LifecycleState = Unprovisioned
2,305,578 UART: [state] DebugLocked = No
2,308,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,312,750 UART: [kat] SHA2-256
2,482,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,492,978 UART: [kat] ++
2,493,476 UART: [kat] sha1
2,505,011 UART: [kat] SHA2-256
2,507,716 UART: [kat] SHA2-384
2,514,300 UART: [kat] SHA2-512-ACC
2,516,647 UART: [kat] ECC-384
4,809,104 UART: [kat] HMAC-384Kdf
4,839,313 UART: [kat] LMS
6,029,611 UART: [kat] --
6,034,470 UART: [cold-reset] ++
6,036,886 UART: [fht] Storing FHT @ 0x50003400
6,048,807 UART: [idev] ++
6,049,379 UART: [idev] CDI.KEYID = 6
6,050,344 UART: [idev] SUBJECT.KEYID = 7
6,051,565 UART: [idev] UDS.KEYID = 0
6,054,200 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,197,522 UART: [idev] Erasing UDS.KEYID = 0
9,388,247 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,548 UART: [idev] --
9,414,381 UART: [ldev] ++
9,415,007 UART: [ldev] CDI.KEYID = 6
9,415,919 UART: [ldev] SUBJECT.KEYID = 5
9,417,121 UART: [ldev] AUTHORITY.KEYID = 7
9,418,419 UART: [ldev] FE.KEYID = 1
9,465,264 UART: [ldev] Erasing FE.KEYID = 1
12,800,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,111,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,125,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,140,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,155,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,173,115 UART: [ldev] --
15,178,164 UART: [fwproc] Waiting for Commands...
15,181,525 UART: [fwproc] Received command 0x46574c44
15,183,716 UART: [fwproc] Received Image of size 113844 bytes
19,234,248 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,309,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,507 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,695,605 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,810,989 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,550,610 >>> mbox cmd response: failed
15,551,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,551,469 >>> mbox cmd response: failed
15,551,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,552,038 >>> mbox cmd response: failed
Initializing fuses
2,046,747 writing to cptra_bootfsm_go
5,813,750 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,865,164 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,535 UART:
192,902 UART: Running Caliptra ROM ...
194,084 UART:
603,844 UART: [state] CFI Enabled
616,447 UART: [state] LifecycleState = Unprovisioned
618,368 UART: [state] DebugLocked = No
620,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,088 UART: [kat] SHA2-256
794,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,319 UART: [kat] ++
805,839 UART: [kat] sha1
817,687 UART: [kat] SHA2-256
820,429 UART: [kat] SHA2-384
826,302 UART: [kat] SHA2-512-ACC
828,711 UART: [kat] ECC-384
3,113,734 UART: [kat] HMAC-384Kdf
3,125,165 UART: [kat] LMS
4,315,279 UART: [kat] --
4,319,717 UART: [cold-reset] ++
4,321,707 UART: [fht] Storing FHT @ 0x50003400
4,333,186 UART: [idev] ++
4,333,750 UART: [idev] CDI.KEYID = 6
4,334,714 UART: [idev] SUBJECT.KEYID = 7
4,335,926 UART: [idev] UDS.KEYID = 0
4,338,841 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,294 UART: [idev] Erasing UDS.KEYID = 0
7,620,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,521 UART: [idev] --
7,647,329 UART: [ldev] ++
7,647,954 UART: [ldev] CDI.KEYID = 6
7,648,893 UART: [ldev] SUBJECT.KEYID = 5
7,650,111 UART: [ldev] AUTHORITY.KEYID = 7
7,651,342 UART: [ldev] FE.KEYID = 1
7,659,504 UART: [ldev] Erasing FE.KEYID = 1
10,949,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,864 UART: [ldev] --
13,309,279 UART: [fwproc] Waiting for Commands...
13,311,283 UART: [fwproc] Received command 0x46574c44
13,313,475 UART: [fwproc] Received Image of size 113844 bytes
16,005,485 UART: ROM Fatal Error: 0x000B000F
16,008,947 >>> mbox cmd response: failed
16,009,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,009,783 >>> mbox cmd response: failed
16,010,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,010,360 >>> mbox cmd response: failed
Initializing fuses
2,056,468 writing to cptra_bootfsm_go
2,245,792 UART:
2,246,145 UART: Running Caliptra ROM ...
2,247,285 UART:
4,463,916 UART: [state] CFI Enabled
4,472,549 UART: [state] LifecycleState = Unprovisioned
4,474,463 UART: [state] DebugLocked = No
4,476,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,482,042 UART: [kat] SHA2-256
4,651,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,662,290 UART: [kat] ++
4,662,780 UART: [kat] sha1
4,674,103 UART: [kat] SHA2-256
4,676,807 UART: [kat] SHA2-384
4,682,633 UART: [kat] SHA2-512-ACC
4,684,979 UART: [kat] ECC-384
6,966,369 UART: [kat] HMAC-384Kdf
6,977,829 UART: [kat] LMS
8,167,910 UART: [kat] --
8,173,972 UART: [cold-reset] ++
8,174,967 UART: [fht] Storing FHT @ 0x50003400
8,186,581 UART: [idev] ++
8,187,205 UART: [idev] CDI.KEYID = 6
8,188,108 UART: [idev] SUBJECT.KEYID = 7
8,189,375 UART: [idev] UDS.KEYID = 0
8,192,160 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,335,253 UART: [idev] Erasing UDS.KEYID = 0
11,479,281 UART: [idev] Using Sha1 for KeyId Algorithm
11,500,393 UART: [idev] --
11,504,064 UART: [ldev] ++
11,504,688 UART: [ldev] CDI.KEYID = 6
11,505,646 UART: [ldev] SUBJECT.KEYID = 5
11,506,852 UART: [ldev] AUTHORITY.KEYID = 7
11,508,091 UART: [ldev] FE.KEYID = 1
11,519,764 UART: [ldev] Erasing FE.KEYID = 1
14,812,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,104,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,118,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,133,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,148,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,167,147 UART: [ldev] --
17,172,104 UART: [fwproc] Waiting for Commands...
17,174,803 UART: [fwproc] Received command 0x46574c44
17,176,987 UART: [fwproc] Received Image of size 113844 bytes
21,227,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,304,250 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,373,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,689,429 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,126,509 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,738,446 >>> mbox cmd response: failed
15,739,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,739,398 >>> mbox cmd response: failed
15,739,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,739,994 >>> mbox cmd response: failed
Initializing fuses
2,051,651 writing to cptra_bootfsm_go
8,259,434 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,199,528 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,260 UART:
192,625 UART: Running Caliptra ROM ...
193,810 UART:
193,979 UART: [state] CFI Enabled
265,201 UART: [state] LifecycleState = Unprovisioned
267,063 UART: [state] DebugLocked = No
268,608 UART: [state] WD Timer not started. Device not locked for debugging
272,389 UART: [kat] SHA2-256
451,474 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,062 UART: [kat] ++
463,599 UART: [kat] sha1
474,019 UART: [kat] SHA2-256
477,030 UART: [kat] SHA2-384
484,104 UART: [kat] SHA2-512-ACC
487,036 UART: [kat] ECC-384
2,949,236 UART: [kat] HMAC-384Kdf
2,971,145 UART: [kat] LMS
3,500,618 UART: [kat] --
3,507,094 UART: [cold-reset] ++
3,508,602 UART: [fht] FHT @ 0x50003400
3,519,362 UART: [idev] ++
3,519,948 UART: [idev] CDI.KEYID = 6
3,520,867 UART: [idev] SUBJECT.KEYID = 7
3,522,031 UART: [idev] UDS.KEYID = 0
3,524,727 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,344 UART: [idev] Erasing UDS.KEYID = 0
6,025,562 UART: [idev] Sha1 KeyId Algorithm
6,049,273 UART: [idev] --
6,052,999 UART: [ldev] ++
6,053,579 UART: [ldev] CDI.KEYID = 6
6,054,493 UART: [ldev] SUBJECT.KEYID = 5
6,055,653 UART: [ldev] AUTHORITY.KEYID = 7
6,056,944 UART: [ldev] FE.KEYID = 1
6,099,113 UART: [ldev] Erasing FE.KEYID = 1
8,601,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,510 UART: [ldev] --
10,413,780 UART: [fwproc] Wait for Commands...
10,416,371 UART: [fwproc] Recv command 0x46574c44
10,418,418 UART: [fwproc] Recv'd Img size: 114168 bytes
12,453,293 UART: ROM Fatal Error: 0x000B000F
12,456,414 >>> mbox cmd response: failed
12,456,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,183 >>> mbox cmd response: failed
12,457,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,457,793 >>> mbox cmd response: failed
Initializing fuses
2,052,597 writing to cptra_bootfsm_go
2,241,935 UART:
2,242,289 UART: Running Caliptra ROM ...
2,243,422 UART:
2,243,601 UART: [state] CFI Enabled
2,312,117 UART: [state] LifecycleState = Unprovisioned
2,314,005 UART: [state] DebugLocked = No
2,316,489 UART: [state] WD Timer not started. Device not locked for debugging
2,319,709 UART: [kat] SHA2-256
2,498,811 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,432 UART: [kat] ++
2,510,898 UART: [kat] sha1
2,522,328 UART: [kat] SHA2-256
2,525,351 UART: [kat] SHA2-384
2,531,668 UART: [kat] SHA2-512-ACC
2,534,644 UART: [kat] ECC-384
4,992,212 UART: [kat] HMAC-384Kdf
5,013,732 UART: [kat] LMS
5,543,196 UART: [kat] --
5,547,621 UART: [cold-reset] ++
5,548,641 UART: [fht] FHT @ 0x50003400
5,560,325 UART: [idev] ++
5,560,890 UART: [idev] CDI.KEYID = 6
5,561,850 UART: [idev] SUBJECT.KEYID = 7
5,563,011 UART: [idev] UDS.KEYID = 0
5,565,671 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,709,398 UART: [idev] Erasing UDS.KEYID = 0
8,065,132 UART: [idev] Sha1 KeyId Algorithm
8,087,926 UART: [idev] --
8,091,926 UART: [ldev] ++
8,092,535 UART: [ldev] CDI.KEYID = 6
8,093,477 UART: [ldev] SUBJECT.KEYID = 5
8,094,587 UART: [ldev] AUTHORITY.KEYID = 7
8,095,825 UART: [ldev] FE.KEYID = 1
8,142,046 UART: [ldev] Erasing FE.KEYID = 1
10,648,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,853 UART: [ldev] --
12,458,469 UART: [fwproc] Wait for Commands...
12,461,591 UART: [fwproc] Recv command 0x46574c44
12,463,689 UART: [fwproc] Recv'd Img size: 114168 bytes
15,858,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,929,398 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,998,133 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,316,060 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,383,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,223,312 >>> mbox cmd response: failed
12,223,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,224,235 >>> mbox cmd response: failed
12,224,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,224,798 >>> mbox cmd response: failed
Initializing fuses
2,055,468 writing to cptra_bootfsm_go
5,426,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,127,563 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,501 UART:
192,877 UART: Running Caliptra ROM ...
193,995 UART:
603,519 UART: [state] CFI Enabled
621,034 UART: [state] LifecycleState = Unprovisioned
622,922 UART: [state] DebugLocked = No
624,191 UART: [state] WD Timer not started. Device not locked for debugging
627,966 UART: [kat] SHA2-256
807,057 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,632 UART: [kat] ++
819,078 UART: [kat] sha1
830,170 UART: [kat] SHA2-256
833,175 UART: [kat] SHA2-384
838,016 UART: [kat] SHA2-512-ACC
840,966 UART: [kat] ECC-384
3,285,129 UART: [kat] HMAC-384Kdf
3,298,757 UART: [kat] LMS
3,828,257 UART: [kat] --
3,831,721 UART: [cold-reset] ++
3,833,168 UART: [fht] FHT @ 0x50003400
3,844,735 UART: [idev] ++
3,845,295 UART: [idev] CDI.KEYID = 6
3,846,201 UART: [idev] SUBJECT.KEYID = 7
3,847,416 UART: [idev] UDS.KEYID = 0
3,850,340 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,993,949 UART: [idev] Erasing UDS.KEYID = 0
6,313,114 UART: [idev] Sha1 KeyId Algorithm
6,336,391 UART: [idev] --
6,341,329 UART: [ldev] ++
6,341,914 UART: [ldev] CDI.KEYID = 6
6,342,844 UART: [ldev] SUBJECT.KEYID = 5
6,344,003 UART: [ldev] AUTHORITY.KEYID = 7
6,345,295 UART: [ldev] FE.KEYID = 1
6,355,297 UART: [ldev] Erasing FE.KEYID = 1
8,830,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,568 UART: [ldev] --
10,622,832 UART: [fwproc] Wait for Commands...
10,626,071 UART: [fwproc] Recv command 0x46574c44
10,628,173 UART: [fwproc] Recv'd Img size: 114168 bytes
12,663,436 UART: ROM Fatal Error: 0x000B000F
12,666,586 >>> mbox cmd response: failed
12,667,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,381 >>> mbox cmd response: failed
12,667,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,945 >>> mbox cmd response: failed
Initializing fuses
2,051,067 writing to cptra_bootfsm_go
2,240,418 UART:
2,240,808 UART: Running Caliptra ROM ...
2,241,856 UART:
7,786,903 UART: [state] CFI Enabled
7,800,150 UART: [state] LifecycleState = Unprovisioned
7,802,008 UART: [state] DebugLocked = No
7,804,883 UART: [state] WD Timer not started. Device not locked for debugging
7,808,460 UART: [kat] SHA2-256
7,987,611 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,999,193 UART: [kat] ++
7,999,656 UART: [kat] sha1
8,010,485 UART: [kat] SHA2-256
8,013,507 UART: [kat] SHA2-384
8,019,285 UART: [kat] SHA2-512-ACC
8,022,239 UART: [kat] ECC-384
10,460,572 UART: [kat] HMAC-384Kdf
10,473,609 UART: [kat] LMS
11,003,123 UART: [kat] --
11,007,495 UART: [cold-reset] ++
11,009,806 UART: [fht] FHT @ 0x50003400
11,021,595 UART: [idev] ++
11,022,166 UART: [idev] CDI.KEYID = 6
11,023,080 UART: [idev] SUBJECT.KEYID = 7
11,024,249 UART: [idev] UDS.KEYID = 0
11,027,208 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,170,569 UART: [idev] Erasing UDS.KEYID = 0
13,494,694 UART: [idev] Sha1 KeyId Algorithm
13,518,989 UART: [idev] --
13,523,980 UART: [ldev] ++
13,524,558 UART: [ldev] CDI.KEYID = 6
13,525,466 UART: [ldev] SUBJECT.KEYID = 5
13,526,624 UART: [ldev] AUTHORITY.KEYID = 7
13,527,856 UART: [ldev] FE.KEYID = 1
13,538,823 UART: [ldev] Erasing FE.KEYID = 1
16,007,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,724,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,740,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,756,714 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,772,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,793,293 UART: [ldev] --
17,797,772 UART: [fwproc] Wait for Commands...
17,799,924 UART: [fwproc] Recv command 0x46574c44
17,802,021 UART: [fwproc] Recv'd Img size: 114168 bytes
21,205,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,269,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,338,077 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,655,806 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,051 writing to cptra_bootfsm_go
3,709,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,448,460 >>> mbox cmd response: failed
12,449,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,441 >>> mbox cmd response: failed
12,449,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,022 >>> mbox cmd response: failed
Initializing fuses
2,048,442 writing to cptra_bootfsm_go
11,103,260 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,670,789 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,204 UART:
192,554 UART: Running Caliptra ROM ...
193,892 UART:
194,052 UART: [state] CFI Enabled
261,586 UART: [state] LifecycleState = Unprovisioned
263,961 UART: [state] DebugLocked = No
266,689 UART: [state] WD Timer not started. Device not locked for debugging
271,072 UART: [kat] SHA2-256
460,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,719 UART: [kat] ++
472,201 UART: [kat] sha1
485,297 UART: [kat] SHA2-256
488,311 UART: [kat] SHA2-384
493,911 UART: [kat] SHA2-512-ACC
496,478 UART: [kat] ECC-384
2,950,288 UART: [kat] HMAC-384Kdf
2,971,505 UART: [kat] LMS
3,503,259 UART: [kat] --
3,507,958 UART: [cold-reset] ++
3,508,919 UART: [fht] FHT @ 0x50003400
3,521,770 UART: [idev] ++
3,522,449 UART: [idev] CDI.KEYID = 6
3,523,391 UART: [idev] SUBJECT.KEYID = 7
3,524,603 UART: [idev] UDS.KEYID = 0
3,527,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,578 UART: [idev] Erasing UDS.KEYID = 0
6,029,308 UART: [idev] Sha1 KeyId Algorithm
6,051,143 UART: [idev] --
6,055,776 UART: [ldev] ++
6,056,470 UART: [ldev] CDI.KEYID = 6
6,057,366 UART: [ldev] SUBJECT.KEYID = 5
6,058,583 UART: [ldev] AUTHORITY.KEYID = 7
6,059,765 UART: [ldev] FE.KEYID = 1
6,099,011 UART: [ldev] Erasing FE.KEYID = 1
8,606,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,873 UART: [ldev] --
10,413,005 UART: [fwproc] Wait for Commands...
10,414,919 UART: [fwproc] Recv command 0x46574c44
10,417,187 UART: [fwproc] Recv'd Img size: 114168 bytes
12,486,962 UART: ROM Fatal Error: 0x000B000F
12,490,633 >>> mbox cmd response: failed
12,491,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,491,393 >>> mbox cmd response: failed
12,491,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,491,946 >>> mbox cmd response: failed
Initializing fuses
2,053,024 writing to cptra_bootfsm_go
2,242,340 UART:
2,242,695 UART: Running Caliptra ROM ...
2,243,743 UART:
2,243,914 UART: [state] CFI Enabled
2,317,720 UART: [state] LifecycleState = Unprovisioned
2,319,768 UART: [state] DebugLocked = No
2,321,236 UART: [state] WD Timer not started. Device not locked for debugging
2,326,462 UART: [kat] SHA2-256
2,516,307 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,106 UART: [kat] ++
2,527,564 UART: [kat] sha1
2,539,254 UART: [kat] SHA2-256
2,542,287 UART: [kat] SHA2-384
2,549,633 UART: [kat] SHA2-512-ACC
2,552,205 UART: [kat] ECC-384
5,002,900 UART: [kat] HMAC-384Kdf
5,025,937 UART: [kat] LMS
5,557,745 UART: [kat] --
5,561,389 UART: [cold-reset] ++
5,563,993 UART: [fht] FHT @ 0x50003400
5,575,518 UART: [idev] ++
5,576,202 UART: [idev] CDI.KEYID = 6
5,577,144 UART: [idev] SUBJECT.KEYID = 7
5,578,357 UART: [idev] UDS.KEYID = 0
5,580,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,725,015 UART: [idev] Erasing UDS.KEYID = 0
8,083,916 UART: [idev] Sha1 KeyId Algorithm
8,106,510 UART: [idev] --
8,111,998 UART: [ldev] ++
8,112,697 UART: [ldev] CDI.KEYID = 6
8,113,585 UART: [ldev] SUBJECT.KEYID = 5
8,114,799 UART: [ldev] AUTHORITY.KEYID = 7
8,115,986 UART: [ldev] FE.KEYID = 1
8,154,944 UART: [ldev] Erasing FE.KEYID = 1
10,664,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,124 UART: [ldev] --
12,469,303 UART: [fwproc] Wait for Commands...
12,471,398 UART: [fwproc] Recv command 0x46574c44
12,473,664 UART: [fwproc] Recv'd Img size: 114168 bytes
15,921,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,998,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,114,632 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,656,628 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,440,958 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,289,569 >>> mbox cmd response: failed
12,290,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,290,580 >>> mbox cmd response: failed
12,290,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,291,163 >>> mbox cmd response: failed
Initializing fuses
2,049,631 writing to cptra_bootfsm_go
5,480,094 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,764,260 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,381 UART:
192,755 UART: Running Caliptra ROM ...
193,947 UART:
603,442 UART: [state] CFI Enabled
617,850 UART: [state] LifecycleState = Unprovisioned
620,227 UART: [state] DebugLocked = No
621,606 UART: [state] WD Timer not started. Device not locked for debugging
626,637 UART: [kat] SHA2-256
816,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,289 UART: [kat] ++
827,878 UART: [kat] sha1
839,790 UART: [kat] SHA2-256
842,799 UART: [kat] SHA2-384
848,187 UART: [kat] SHA2-512-ACC
850,796 UART: [kat] ECC-384
3,296,239 UART: [kat] HMAC-384Kdf
3,309,367 UART: [kat] LMS
3,841,212 UART: [kat] --
3,847,742 UART: [cold-reset] ++
3,850,242 UART: [fht] FHT @ 0x50003400
3,862,425 UART: [idev] ++
3,863,166 UART: [idev] CDI.KEYID = 6
3,864,080 UART: [idev] SUBJECT.KEYID = 7
3,865,299 UART: [idev] UDS.KEYID = 0
3,868,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,011,594 UART: [idev] Erasing UDS.KEYID = 0
6,341,375 UART: [idev] Sha1 KeyId Algorithm
6,363,738 UART: [idev] --
6,368,974 UART: [ldev] ++
6,369,655 UART: [ldev] CDI.KEYID = 6
6,370,571 UART: [ldev] SUBJECT.KEYID = 5
6,371,787 UART: [ldev] AUTHORITY.KEYID = 7
6,372,984 UART: [ldev] FE.KEYID = 1
6,385,256 UART: [ldev] Erasing FE.KEYID = 1
8,862,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,794 UART: [ldev] --
10,652,400 UART: [fwproc] Wait for Commands...
10,654,029 UART: [fwproc] Recv command 0x46574c44
10,656,299 UART: [fwproc] Recv'd Img size: 114168 bytes
12,728,732 UART: ROM Fatal Error: 0x000B000F
12,732,399 >>> mbox cmd response: failed
12,732,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,187 >>> mbox cmd response: failed
12,733,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,733,769 >>> mbox cmd response: failed
Initializing fuses
2,052,614 writing to cptra_bootfsm_go
2,241,944 UART:
2,242,293 UART: Running Caliptra ROM ...
2,243,432 UART:
7,716,921 UART: [state] CFI Enabled
7,727,814 UART: [state] LifecycleState = Unprovisioned
7,730,222 UART: [state] DebugLocked = No
7,731,879 UART: [state] WD Timer not started. Device not locked for debugging
7,737,098 UART: [kat] SHA2-256
7,926,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,937,802 UART: [kat] ++
7,938,316 UART: [kat] sha1
7,948,402 UART: [kat] SHA2-256
7,951,430 UART: [kat] SHA2-384
7,958,669 UART: [kat] SHA2-512-ACC
7,961,243 UART: [kat] ECC-384
10,405,010 UART: [kat] HMAC-384Kdf
10,418,008 UART: [kat] LMS
10,949,846 UART: [kat] --
10,954,430 UART: [cold-reset] ++
10,956,091 UART: [fht] FHT @ 0x50003400
10,968,263 UART: [idev] ++
10,968,944 UART: [idev] CDI.KEYID = 6
10,969,961 UART: [idev] SUBJECT.KEYID = 7
10,971,121 UART: [idev] UDS.KEYID = 0
10,973,752 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,117,247 UART: [idev] Erasing UDS.KEYID = 0
13,443,932 UART: [idev] Sha1 KeyId Algorithm
13,465,029 UART: [idev] --
13,471,294 UART: [ldev] ++
13,472,031 UART: [ldev] CDI.KEYID = 6
13,472,942 UART: [ldev] SUBJECT.KEYID = 5
13,474,101 UART: [ldev] AUTHORITY.KEYID = 7
13,475,337 UART: [ldev] FE.KEYID = 1
13,486,956 UART: [ldev] Erasing FE.KEYID = 1
15,964,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,683,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,698,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,713,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,728,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,749,133 UART: [ldev] --
17,754,141 UART: [fwproc] Wait for Commands...
17,755,898 UART: [fwproc] Recv command 0x46574c44
17,758,245 UART: [fwproc] Recv'd Img size: 114168 bytes
21,209,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,286,317 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,402,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,944,187 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,142 writing to cptra_bootfsm_go
3,763,391 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,502,064 >>> mbox cmd response: failed
12,502,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,100 >>> mbox cmd response: failed
12,503,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,657 >>> mbox cmd response: failed
Initializing fuses
2,049,417 writing to cptra_bootfsm_go
11,122,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,323,560 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,357 UART: [kat] SHA2-256
892,295 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,248 UART: [kat] LMS
1,475,444 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,736 UART: [idev] Erasing UDS.KEYID = 0
1,505,286 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,950 UART: [idev] --
1,514,937 UART: [ldev] ++
1,515,105 UART: [ldev] CDI.KEYID = 6
1,515,468 UART: [ldev] SUBJECT.KEYID = 5
1,515,894 UART: [ldev] AUTHORITY.KEYID = 7
1,516,357 UART: [ldev] FE.KEYID = 1
1,521,221 UART: [ldev] Erasing FE.KEYID = 1
1,546,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,896 UART: [ldev] --
1,585,217 UART: [fwproc] Waiting for Commands...
1,585,842 UART: [fwproc] Received command 0x46574c44
1,586,633 UART: [fwproc] Received Image of size 114168 bytes
1,628,471 UART: ROM Fatal Error: 0x000B000F
1,629,630 >>> mbox cmd response: failed
1,629,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,636 >>> mbox cmd response: failed
1,629,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,241 UART: [kat] SHA2-256
892,179 UART: [kat] SHA2-384
894,972 UART: [kat] SHA2-512-ACC
896,873 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
907,006 UART: [kat] LMS
1,475,202 UART: [kat] --
1,476,095 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,410 UART: [idev] Erasing UDS.KEYID = 0
1,504,872 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,494 UART: [idev] --
1,514,529 UART: [ldev] ++
1,514,697 UART: [ldev] CDI.KEYID = 6
1,515,060 UART: [ldev] SUBJECT.KEYID = 5
1,515,486 UART: [ldev] AUTHORITY.KEYID = 7
1,515,949 UART: [ldev] FE.KEYID = 1
1,521,123 UART: [ldev] Erasing FE.KEYID = 1
1,545,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,614 UART: [ldev] --
1,584,937 UART: [fwproc] Waiting for Commands...
1,585,578 UART: [fwproc] Received command 0x46574c44
1,586,369 UART: [fwproc] Received Image of size 114168 bytes
2,881,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,596 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,948 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,585 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,482,081 >>> mbox cmd response: failed
1,482,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,087 >>> mbox cmd response: failed
1,482,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,093 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,377 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,829 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,869 UART: [state] LifecycleState = Unprovisioned
86,524 UART: [state] DebugLocked = No
87,074 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
891,240 UART: [kat] SHA2-256
893,178 UART: [kat] SHA2-384
896,001 UART: [kat] SHA2-512-ACC
897,902 UART: [kat] ECC-384
903,391 UART: [kat] HMAC-384Kdf
907,999 UART: [kat] LMS
1,476,195 UART: [kat] --
1,477,466 UART: [cold-reset] ++
1,477,916 UART: [fht] Storing FHT @ 0x50003400
1,480,695 UART: [idev] ++
1,480,863 UART: [idev] CDI.KEYID = 6
1,481,223 UART: [idev] SUBJECT.KEYID = 7
1,481,647 UART: [idev] UDS.KEYID = 0
1,481,992 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,673 UART: [idev] Erasing UDS.KEYID = 0
1,506,137 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,827 UART: [idev] --
1,515,894 UART: [ldev] ++
1,516,062 UART: [ldev] CDI.KEYID = 6
1,516,425 UART: [ldev] SUBJECT.KEYID = 5
1,516,851 UART: [ldev] AUTHORITY.KEYID = 7
1,517,314 UART: [ldev] FE.KEYID = 1
1,522,554 UART: [ldev] Erasing FE.KEYID = 1
1,548,213 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,255 UART: [ldev] --
1,587,546 UART: [fwproc] Waiting for Commands...
1,588,225 UART: [fwproc] Received command 0x46574c44
1,589,016 UART: [fwproc] Received Image of size 114168 bytes
1,630,820 UART: ROM Fatal Error: 0x000B000F
1,631,979 >>> mbox cmd response: failed
1,631,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,985 >>> mbox cmd response: failed
1,631,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,000 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,562 UART: [kat] SHA2-256
882,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,608 UART: [kat] ++
886,760 UART: [kat] sha1
891,126 UART: [kat] SHA2-256
893,064 UART: [kat] SHA2-384
895,721 UART: [kat] SHA2-512-ACC
897,622 UART: [kat] ECC-384
903,471 UART: [kat] HMAC-384Kdf
908,035 UART: [kat] LMS
1,476,231 UART: [kat] --
1,477,240 UART: [cold-reset] ++
1,477,662 UART: [fht] Storing FHT @ 0x50003400
1,480,317 UART: [idev] ++
1,480,485 UART: [idev] CDI.KEYID = 6
1,480,845 UART: [idev] SUBJECT.KEYID = 7
1,481,269 UART: [idev] UDS.KEYID = 0
1,481,614 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,179 UART: [idev] Erasing UDS.KEYID = 0
1,506,431 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,241 UART: [idev] --
1,516,226 UART: [ldev] ++
1,516,394 UART: [ldev] CDI.KEYID = 6
1,516,757 UART: [ldev] SUBJECT.KEYID = 5
1,517,183 UART: [ldev] AUTHORITY.KEYID = 7
1,517,646 UART: [ldev] FE.KEYID = 1
1,522,718 UART: [ldev] Erasing FE.KEYID = 1
1,547,569 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,491 UART: [ldev] --
1,586,920 UART: [fwproc] Waiting for Commands...
1,587,775 UART: [fwproc] Received command 0x46574c44
1,588,566 UART: [fwproc] Received Image of size 114168 bytes
2,884,271 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,305 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,200 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,482,604 >>> mbox cmd response: failed
1,482,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,610 >>> mbox cmd response: failed
1,482,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,442 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
893,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,661 UART: [kat] ++
897,813 UART: [kat] sha1
901,943 UART: [kat] SHA2-256
903,883 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
917,686 UART: [kat] HMAC-384Kdf
922,328 UART: [kat] LMS
1,170,656 UART: [kat] --
1,171,689 UART: [cold-reset] ++
1,172,211 UART: [fht] FHT @ 0x50003400
1,174,942 UART: [idev] ++
1,175,110 UART: [idev] CDI.KEYID = 6
1,175,470 UART: [idev] SUBJECT.KEYID = 7
1,175,894 UART: [idev] UDS.KEYID = 0
1,176,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,810 UART: [idev] Erasing UDS.KEYID = 0
1,200,253 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,210,015 UART: [ldev] ++
1,210,183 UART: [ldev] CDI.KEYID = 6
1,210,546 UART: [ldev] SUBJECT.KEYID = 5
1,210,972 UART: [ldev] AUTHORITY.KEYID = 7
1,211,435 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,619 UART: [ldev] --
1,281,998 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,326 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,802 UART: ROM Fatal Error: 0x000B000F
1,325,961 >>> mbox cmd response: failed
1,325,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,967 >>> mbox cmd response: failed
1,325,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,973 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
893,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,467 UART: [kat] ++
897,619 UART: [kat] sha1
901,953 UART: [kat] SHA2-256
903,893 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
918,688 UART: [kat] HMAC-384Kdf
923,238 UART: [kat] LMS
1,171,566 UART: [kat] --
1,172,231 UART: [cold-reset] ++
1,172,687 UART: [fht] FHT @ 0x50003400
1,175,288 UART: [idev] ++
1,175,456 UART: [idev] CDI.KEYID = 6
1,175,816 UART: [idev] SUBJECT.KEYID = 7
1,176,240 UART: [idev] UDS.KEYID = 0
1,176,585 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,300 UART: [idev] Erasing UDS.KEYID = 0
1,201,413 UART: [idev] Sha1 KeyId Algorithm
1,209,751 UART: [idev] --
1,210,639 UART: [ldev] ++
1,210,807 UART: [ldev] CDI.KEYID = 6
1,211,170 UART: [ldev] SUBJECT.KEYID = 5
1,211,596 UART: [ldev] AUTHORITY.KEYID = 7
1,212,059 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,937 UART: [ldev] --
1,283,448 UART: [fwproc] Wait for Commands...
1,284,056 UART: [fwproc] Recv command 0x46574c44
1,284,784 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,840 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,768 >>> mbox cmd response: failed
1,181,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,774 >>> mbox cmd response: failed
1,181,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,925 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
893,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,838 UART: [kat] ++
897,990 UART: [kat] sha1
902,060 UART: [kat] SHA2-256
904,000 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,533 UART: [kat] HMAC-384Kdf
923,253 UART: [kat] LMS
1,171,581 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,172,890 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,435 UART: [idev] Erasing UDS.KEYID = 0
1,201,634 UART: [idev] Sha1 KeyId Algorithm
1,210,132 UART: [idev] --
1,211,148 UART: [ldev] ++
1,211,316 UART: [ldev] CDI.KEYID = 6
1,211,679 UART: [ldev] SUBJECT.KEYID = 5
1,212,105 UART: [ldev] AUTHORITY.KEYID = 7
1,212,568 UART: [ldev] FE.KEYID = 1
1,217,608 UART: [ldev] Erasing FE.KEYID = 1
1,244,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,368 UART: [ldev] --
1,283,729 UART: [fwproc] Wait for Commands...
1,284,475 UART: [fwproc] Recv command 0x46574c44
1,285,203 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,639 UART: ROM Fatal Error: 0x000B000F
1,328,798 >>> mbox cmd response: failed
1,328,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,804 >>> mbox cmd response: failed
1,328,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
893,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,120 UART: [kat] ++
898,272 UART: [kat] sha1
902,478 UART: [kat] SHA2-256
904,418 UART: [kat] SHA2-384
907,113 UART: [kat] SHA2-512-ACC
909,014 UART: [kat] ECC-384
918,759 UART: [kat] HMAC-384Kdf
923,219 UART: [kat] LMS
1,171,547 UART: [kat] --
1,172,440 UART: [cold-reset] ++
1,172,854 UART: [fht] FHT @ 0x50003400
1,175,559 UART: [idev] ++
1,175,727 UART: [idev] CDI.KEYID = 6
1,176,087 UART: [idev] SUBJECT.KEYID = 7
1,176,511 UART: [idev] UDS.KEYID = 0
1,176,856 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,661 UART: [idev] Erasing UDS.KEYID = 0
1,201,964 UART: [idev] Sha1 KeyId Algorithm
1,210,574 UART: [idev] --
1,211,450 UART: [ldev] ++
1,211,618 UART: [ldev] CDI.KEYID = 6
1,211,981 UART: [ldev] SUBJECT.KEYID = 5
1,212,407 UART: [ldev] AUTHORITY.KEYID = 7
1,212,870 UART: [ldev] FE.KEYID = 1
1,218,096 UART: [ldev] Erasing FE.KEYID = 1
1,244,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,272 UART: [ldev] --
1,283,625 UART: [fwproc] Wait for Commands...
1,284,415 UART: [fwproc] Recv command 0x46574c44
1,285,143 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,643 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,860 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,275 >>> mbox cmd response: failed
1,183,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,281 >>> mbox cmd response: failed
1,183,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,287 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,352 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,018 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,431 UART: [kat] ++
895,583 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,170,077 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,198,865 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,162 UART: [ldev] Erasing FE.KEYID = 1
1,241,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,024 UART: [ldev] --
1,280,528 UART: [fwproc] Wait for Commands...
1,281,289 UART: [fwproc] Recv command 0x46574c44
1,282,022 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,306 UART: ROM Fatal Error: 0x000B000F
1,325,465 >>> mbox cmd response: failed
1,325,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,471 >>> mbox cmd response: failed
1,325,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,477 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,365 UART: [kat] ++
895,517 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,656 UART: [kat] HMAC-384Kdf
920,292 UART: [kat] LMS
1,168,604 UART: [kat] --
1,169,299 UART: [cold-reset] ++
1,169,669 UART: [fht] FHT @ 0x50003400
1,172,435 UART: [idev] ++
1,172,603 UART: [idev] CDI.KEYID = 6
1,172,964 UART: [idev] SUBJECT.KEYID = 7
1,173,389 UART: [idev] UDS.KEYID = 0
1,173,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,385 UART: [idev] Erasing UDS.KEYID = 0
1,198,621 UART: [idev] Sha1 KeyId Algorithm
1,207,565 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,215,004 UART: [ldev] Erasing FE.KEYID = 1
1,241,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,506 UART: [ldev] --
1,280,950 UART: [fwproc] Wait for Commands...
1,281,611 UART: [fwproc] Recv command 0x46574c44
1,282,344 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,219 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,093 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,880 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,490 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,177,186 >>> mbox cmd response: failed
1,177,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,192 >>> mbox cmd response: failed
1,177,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,776 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,692 UART: [kat] ++
895,844 UART: [kat] sha1
900,076 UART: [kat] SHA2-256
902,016 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,761 UART: [kat] LMS
1,169,073 UART: [kat] --
1,169,850 UART: [cold-reset] ++
1,170,286 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,502 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,041 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,917 UART: [ldev] --
1,281,309 UART: [fwproc] Wait for Commands...
1,281,942 UART: [fwproc] Recv command 0x46574c44
1,282,675 UART: [fwproc] Recv'd Img size: 114168 bytes
1,323,551 UART: ROM Fatal Error: 0x000B000F
1,324,710 >>> mbox cmd response: failed
1,324,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,716 >>> mbox cmd response: failed
1,324,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,075 UART: [state] LifecycleState = Unprovisioned
86,730 UART: [state] DebugLocked = No
87,302 UART: [state] WD Timer not started. Device not locked for debugging
88,435 UART: [kat] SHA2-256
891,985 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,114 UART: [kat] ++
896,266 UART: [kat] sha1
900,606 UART: [kat] SHA2-256
902,546 UART: [kat] SHA2-384
905,387 UART: [kat] SHA2-512-ACC
907,288 UART: [kat] ECC-384
916,657 UART: [kat] HMAC-384Kdf
921,301 UART: [kat] LMS
1,169,613 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,171,046 UART: [fht] FHT @ 0x50003400
1,173,692 UART: [idev] ++
1,173,860 UART: [idev] CDI.KEYID = 6
1,174,221 UART: [idev] SUBJECT.KEYID = 7
1,174,646 UART: [idev] UDS.KEYID = 0
1,174,992 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,924 UART: [idev] Erasing UDS.KEYID = 0
1,200,276 UART: [idev] Sha1 KeyId Algorithm
1,209,232 UART: [idev] --
1,210,297 UART: [ldev] ++
1,210,465 UART: [ldev] CDI.KEYID = 6
1,210,829 UART: [ldev] SUBJECT.KEYID = 5
1,211,256 UART: [ldev] AUTHORITY.KEYID = 7
1,211,719 UART: [ldev] FE.KEYID = 1
1,217,157 UART: [ldev] Erasing FE.KEYID = 1
1,243,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,035 UART: [ldev] --
1,283,341 UART: [fwproc] Wait for Commands...
1,283,978 UART: [fwproc] Recv command 0x46574c44
1,284,711 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,606 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,915 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,573 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,499 >>> mbox cmd response: failed
1,178,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,505 >>> mbox cmd response: failed
1,178,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,239 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,979 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,180 UART:
192,533 UART: Running Caliptra ROM ...
193,712 UART:
193,862 UART: [state] CFI Enabled
262,466 UART: [state] LifecycleState = Unprovisioned
264,379 UART: [state] DebugLocked = No
266,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,713 UART: [kat] SHA2-256
441,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,878 UART: [kat] ++
452,410 UART: [kat] sha1
462,480 UART: [kat] SHA2-256
465,174 UART: [kat] SHA2-384
470,732 UART: [kat] SHA2-512-ACC
473,096 UART: [kat] ECC-384
2,764,960 UART: [kat] HMAC-384Kdf
2,797,850 UART: [kat] LMS
3,988,149 UART: [kat] --
3,993,834 UART: [cold-reset] ++
3,995,232 UART: [fht] Storing FHT @ 0x50003400
4,007,852 UART: [idev] ++
4,008,428 UART: [idev] CDI.KEYID = 6
4,009,344 UART: [idev] SUBJECT.KEYID = 7
4,010,564 UART: [idev] UDS.KEYID = 0
4,013,351 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,735 UART: [idev] Erasing UDS.KEYID = 0
7,345,507 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,693 UART: [idev] --
7,372,277 UART: [ldev] ++
7,372,846 UART: [ldev] CDI.KEYID = 6
7,373,881 UART: [ldev] SUBJECT.KEYID = 5
7,375,048 UART: [ldev] AUTHORITY.KEYID = 7
7,376,283 UART: [ldev] FE.KEYID = 1
7,420,966 UART: [ldev] Erasing FE.KEYID = 1
10,752,879 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,561 UART: [ldev] --
13,116,347 UART: [fwproc] Waiting for Commands...
13,119,257 UART: [fwproc] Received command 0x46574c44
13,121,445 UART: [fwproc] Received Image of size 113844 bytes
14,525,997 UART: ROM Fatal Error: 0x000B001A
14,529,437 >>> mbox cmd response: failed
14,529,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,530,111 >>> mbox cmd response: failed
14,530,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,530,671 >>> mbox cmd response: failed
Initializing fuses
2,052,303 writing to cptra_bootfsm_go
2,241,631 UART:
2,241,979 UART: Running Caliptra ROM ...
2,243,054 UART:
2,243,215 UART: [state] CFI Enabled
2,310,216 UART: [state] LifecycleState = Unprovisioned
2,312,158 UART: [state] DebugLocked = No
2,313,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,048 UART: [kat] SHA2-256
2,488,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,252 UART: [kat] ++
2,499,795 UART: [kat] sha1
2,510,689 UART: [kat] SHA2-256
2,513,428 UART: [kat] SHA2-384
2,519,789 UART: [kat] SHA2-512-ACC
2,522,146 UART: [kat] ECC-384
4,812,302 UART: [kat] HMAC-384Kdf
4,843,276 UART: [kat] LMS
6,033,546 UART: [kat] --
6,040,211 UART: [cold-reset] ++
6,042,423 UART: [fht] Storing FHT @ 0x50003400
6,052,948 UART: [idev] ++
6,053,516 UART: [idev] CDI.KEYID = 6
6,054,485 UART: [idev] SUBJECT.KEYID = 7
6,055,708 UART: [idev] UDS.KEYID = 0
6,058,401 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,201,745 UART: [idev] Erasing UDS.KEYID = 0
9,389,142 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,932 UART: [idev] --
9,413,983 UART: [ldev] ++
9,414,555 UART: [ldev] CDI.KEYID = 6
9,415,520 UART: [ldev] SUBJECT.KEYID = 5
9,416,775 UART: [ldev] AUTHORITY.KEYID = 7
9,418,015 UART: [ldev] FE.KEYID = 1
9,446,178 UART: [ldev] Erasing FE.KEYID = 1
12,779,516 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,070,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,085,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,099,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,114,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,134,193 UART: [ldev] --
15,139,489 UART: [fwproc] Waiting for Commands...
15,141,751 UART: [fwproc] Received command 0x46574c44
15,143,942 UART: [fwproc] Received Image of size 113844 bytes
19,193,759 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,270,819 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,339,687 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,656,538 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,806,492 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,260,660 >>> mbox cmd response: failed
14,261,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,261,559 >>> mbox cmd response: failed
14,261,883 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,262,177 >>> mbox cmd response: failed
Initializing fuses
2,052,998 writing to cptra_bootfsm_go
5,824,468 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,875,984 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,518 UART:
192,879 UART: Running Caliptra ROM ...
194,026 UART:
603,840 UART: [state] CFI Enabled
617,804 UART: [state] LifecycleState = Unprovisioned
619,772 UART: [state] DebugLocked = No
622,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,850 UART: [kat] SHA2-256
796,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,111 UART: [kat] ++
807,587 UART: [kat] sha1
818,032 UART: [kat] SHA2-256
820,777 UART: [kat] SHA2-384
827,186 UART: [kat] SHA2-512-ACC
829,526 UART: [kat] ECC-384
3,113,786 UART: [kat] HMAC-384Kdf
3,126,619 UART: [kat] LMS
4,316,721 UART: [kat] --
4,321,195 UART: [cold-reset] ++
4,323,013 UART: [fht] Storing FHT @ 0x50003400
4,333,471 UART: [idev] ++
4,334,031 UART: [idev] CDI.KEYID = 6
4,334,994 UART: [idev] SUBJECT.KEYID = 7
4,336,207 UART: [idev] UDS.KEYID = 0
4,339,081 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,645 UART: [idev] Erasing UDS.KEYID = 0
7,622,780 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,747 UART: [idev] --
7,649,070 UART: [ldev] ++
7,649,691 UART: [ldev] CDI.KEYID = 6
7,650,611 UART: [ldev] SUBJECT.KEYID = 5
7,651,850 UART: [ldev] AUTHORITY.KEYID = 7
7,653,083 UART: [ldev] FE.KEYID = 1
7,664,813 UART: [ldev] Erasing FE.KEYID = 1
10,956,410 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,457 UART: [ldev] --
13,317,133 UART: [fwproc] Waiting for Commands...
13,320,092 UART: [fwproc] Received command 0x46574c44
13,322,332 UART: [fwproc] Received Image of size 113844 bytes
14,723,061 UART: ROM Fatal Error: 0x000B001A
14,726,544 >>> mbox cmd response: failed
14,726,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,727,294 >>> mbox cmd response: failed
14,727,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,727,879 >>> mbox cmd response: failed
Initializing fuses
2,053,327 writing to cptra_bootfsm_go
2,242,678 UART:
2,243,040 UART: Running Caliptra ROM ...
2,244,184 UART:
5,732,857 UART: [state] CFI Enabled
5,747,293 UART: [state] LifecycleState = Unprovisioned
5,749,198 UART: [state] DebugLocked = No
5,752,034 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,757,218 UART: [kat] SHA2-256
5,926,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,937,511 UART: [kat] ++
5,938,005 UART: [kat] sha1
5,948,250 UART: [kat] SHA2-256
5,950,956 UART: [kat] SHA2-384
5,958,241 UART: [kat] SHA2-512-ACC
5,960,573 UART: [kat] ECC-384
8,242,497 UART: [kat] HMAC-384Kdf
8,253,919 UART: [kat] LMS
9,444,033 UART: [kat] --
9,449,012 UART: [cold-reset] ++
9,451,286 UART: [fht] Storing FHT @ 0x50003400
9,463,306 UART: [idev] ++
9,463,929 UART: [idev] CDI.KEYID = 6
9,464,839 UART: [idev] SUBJECT.KEYID = 7
9,466,107 UART: [idev] UDS.KEYID = 0
9,468,908 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
9,612,019 UART: [idev] Erasing UDS.KEYID = 0
12,750,317 UART: [idev] Using Sha1 for KeyId Algorithm
12,772,111 UART: [idev] --
12,776,072 UART: [ldev] ++
12,776,650 UART: [ldev] CDI.KEYID = 6
12,777,618 UART: [ldev] SUBJECT.KEYID = 5
12,778,864 UART: [ldev] AUTHORITY.KEYID = 7
12,780,095 UART: [ldev] FE.KEYID = 1
12,792,955 UART: [ldev] Erasing FE.KEYID = 1
16,081,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,374,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,389,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,403,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,418,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,436,217 UART: [ldev] --
18,440,629 UART: [fwproc] Waiting for Commands...
18,443,432 UART: [fwproc] Received command 0x46574c44
18,445,640 UART: [fwproc] Received Image of size 113844 bytes
22,492,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,571,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,640,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,955,897 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
4,130,062 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,461,843 >>> mbox cmd response: failed
14,462,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,462,740 >>> mbox cmd response: failed
14,463,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,463,301 >>> mbox cmd response: failed
Initializing fuses
2,052,893 writing to cptra_bootfsm_go
9,533,642 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,480,330 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,214 UART:
192,595 UART: Running Caliptra ROM ...
193,771 UART:
193,924 UART: [state] CFI Enabled
262,414 UART: [state] LifecycleState = Unprovisioned
264,295 UART: [state] DebugLocked = No
265,993 UART: [state] WD Timer not started. Device not locked for debugging
270,547 UART: [kat] SHA2-256
449,621 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,223 UART: [kat] ++
461,753 UART: [kat] sha1
472,904 UART: [kat] SHA2-256
475,967 UART: [kat] SHA2-384
481,834 UART: [kat] SHA2-512-ACC
484,839 UART: [kat] ECC-384
2,947,437 UART: [kat] HMAC-384Kdf
2,972,572 UART: [kat] LMS
3,502,030 UART: [kat] --
3,508,324 UART: [cold-reset] ++
3,509,461 UART: [fht] FHT @ 0x50003400
3,520,660 UART: [idev] ++
3,521,224 UART: [idev] CDI.KEYID = 6
3,522,136 UART: [idev] SUBJECT.KEYID = 7
3,523,352 UART: [idev] UDS.KEYID = 0
3,526,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,150 UART: [idev] Erasing UDS.KEYID = 0
6,030,326 UART: [idev] Sha1 KeyId Algorithm
6,053,696 UART: [idev] --
6,057,266 UART: [ldev] ++
6,057,843 UART: [ldev] CDI.KEYID = 6
6,058,779 UART: [ldev] SUBJECT.KEYID = 5
6,059,887 UART: [ldev] AUTHORITY.KEYID = 7
6,061,179 UART: [ldev] FE.KEYID = 1
6,101,051 UART: [ldev] Erasing FE.KEYID = 1
8,599,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,467 UART: [ldev] --
10,392,095 UART: [fwproc] Wait for Commands...
10,393,981 UART: [fwproc] Recv command 0x46574c44
10,396,078 UART: [fwproc] Recv'd Img size: 114168 bytes
11,470,656 UART: ROM Fatal Error: 0x000B001A
11,473,778 >>> mbox cmd response: failed
11,474,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,474,581 >>> mbox cmd response: failed
11,474,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,475,268 >>> mbox cmd response: failed
Initializing fuses
2,052,861 writing to cptra_bootfsm_go
2,242,165 UART:
2,242,516 UART: Running Caliptra ROM ...
2,243,658 UART:
2,243,819 UART: [state] CFI Enabled
2,314,250 UART: [state] LifecycleState = Unprovisioned
2,316,290 UART: [state] DebugLocked = No
2,319,040 UART: [state] WD Timer not started. Device not locked for debugging
2,322,258 UART: [kat] SHA2-256
2,501,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,944 UART: [kat] ++
2,513,490 UART: [kat] sha1
2,524,981 UART: [kat] SHA2-256
2,528,002 UART: [kat] SHA2-384
2,533,994 UART: [kat] SHA2-512-ACC
2,536,940 UART: [kat] ECC-384
4,998,913 UART: [kat] HMAC-384Kdf
5,020,828 UART: [kat] LMS
5,550,255 UART: [kat] --
5,554,301 UART: [cold-reset] ++
5,556,828 UART: [fht] FHT @ 0x50003400
5,566,355 UART: [idev] ++
5,566,925 UART: [idev] CDI.KEYID = 6
5,567,847 UART: [idev] SUBJECT.KEYID = 7
5,569,009 UART: [idev] UDS.KEYID = 0
5,571,912 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,715,641 UART: [idev] Erasing UDS.KEYID = 0
8,076,653 UART: [idev] Sha1 KeyId Algorithm
8,099,183 UART: [idev] --
8,102,974 UART: [ldev] ++
8,103,547 UART: [ldev] CDI.KEYID = 6
8,104,436 UART: [ldev] SUBJECT.KEYID = 5
8,105,652 UART: [ldev] AUTHORITY.KEYID = 7
8,106,885 UART: [ldev] FE.KEYID = 1
8,149,889 UART: [ldev] Erasing FE.KEYID = 1
10,654,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,439,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,346 UART: [ldev] --
12,463,338 UART: [fwproc] Wait for Commands...
12,465,381 UART: [fwproc] Recv command 0x46574c44
12,467,481 UART: [fwproc] Recv'd Img size: 114168 bytes
15,865,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,852 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,322,327 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,364,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,270,557 >>> mbox cmd response: failed
11,271,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,271,757 >>> mbox cmd response: failed
11,272,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,272,323 >>> mbox cmd response: failed
Initializing fuses
2,049,188 writing to cptra_bootfsm_go
5,394,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,102,037 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,313 UART:
192,702 UART: Running Caliptra ROM ...
193,888 UART:
603,411 UART: [state] CFI Enabled
617,156 UART: [state] LifecycleState = Unprovisioned
619,038 UART: [state] DebugLocked = No
620,638 UART: [state] WD Timer not started. Device not locked for debugging
624,793 UART: [kat] SHA2-256
803,927 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,462 UART: [kat] ++
815,993 UART: [kat] sha1
826,282 UART: [kat] SHA2-256
829,296 UART: [kat] SHA2-384
835,068 UART: [kat] SHA2-512-ACC
838,009 UART: [kat] ECC-384
3,280,533 UART: [kat] HMAC-384Kdf
3,293,258 UART: [kat] LMS
3,822,732 UART: [kat] --
3,826,804 UART: [cold-reset] ++
3,827,711 UART: [fht] FHT @ 0x50003400
3,838,800 UART: [idev] ++
3,839,366 UART: [idev] CDI.KEYID = 6
3,840,275 UART: [idev] SUBJECT.KEYID = 7
3,841,499 UART: [idev] UDS.KEYID = 0
3,844,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,347 UART: [idev] Erasing UDS.KEYID = 0
6,318,884 UART: [idev] Sha1 KeyId Algorithm
6,342,173 UART: [idev] --
6,346,174 UART: [ldev] ++
6,346,751 UART: [ldev] CDI.KEYID = 6
6,347,812 UART: [ldev] SUBJECT.KEYID = 5
6,348,923 UART: [ldev] AUTHORITY.KEYID = 7
6,350,103 UART: [ldev] FE.KEYID = 1
6,359,887 UART: [ldev] Erasing FE.KEYID = 1
8,834,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,346 UART: [ldev] --
10,626,744 UART: [fwproc] Wait for Commands...
10,629,810 UART: [fwproc] Recv command 0x46574c44
10,631,908 UART: [fwproc] Recv'd Img size: 114168 bytes
11,701,532 UART: ROM Fatal Error: 0x000B001A
11,704,644 >>> mbox cmd response: failed
11,705,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,705,413 >>> mbox cmd response: failed
11,705,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,705,964 >>> mbox cmd response: failed
Initializing fuses
2,055,521 writing to cptra_bootfsm_go
2,244,859 UART:
2,245,216 UART: Running Caliptra ROM ...
2,246,351 UART:
8,754,282 UART: [state] CFI Enabled
8,767,352 UART: [state] LifecycleState = Unprovisioned
8,769,213 UART: [state] DebugLocked = No
8,770,841 UART: [state] WD Timer not started. Device not locked for debugging
8,775,287 UART: [kat] SHA2-256
8,954,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,965,993 UART: [kat] ++
8,966,554 UART: [kat] sha1
8,977,725 UART: [kat] SHA2-256
8,980,747 UART: [kat] SHA2-384
8,986,736 UART: [kat] SHA2-512-ACC
8,989,733 UART: [kat] ECC-384
11,430,864 UART: [kat] HMAC-384Kdf
11,443,671 UART: [kat] LMS
11,973,153 UART: [kat] --
11,978,918 UART: [cold-reset] ++
11,980,736 UART: [fht] FHT @ 0x50003400
11,992,144 UART: [idev] ++
11,992,703 UART: [idev] CDI.KEYID = 6
11,993,606 UART: [idev] SUBJECT.KEYID = 7
11,994,973 UART: [idev] UDS.KEYID = 0
11,997,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,141,258 UART: [idev] Erasing UDS.KEYID = 0
14,472,117 UART: [idev] Sha1 KeyId Algorithm
14,495,125 UART: [idev] --
14,498,656 UART: [ldev] ++
14,499,228 UART: [ldev] CDI.KEYID = 6
14,500,142 UART: [ldev] SUBJECT.KEYID = 5
14,501,298 UART: [ldev] AUTHORITY.KEYID = 7
14,502,588 UART: [ldev] FE.KEYID = 1
14,514,203 UART: [ldev] Erasing FE.KEYID = 1
16,988,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,706,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,722,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,737,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,753,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,773,272 UART: [ldev] --
18,777,452 UART: [fwproc] Wait for Commands...
18,780,303 UART: [fwproc] Recv command 0x46574c44
18,782,401 UART: [fwproc] Recv'd Img size: 114168 bytes
22,184,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,254,243 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,323,052 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,640,783 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
3,698,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,480,113 >>> mbox cmd response: failed
11,480,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,481,117 >>> mbox cmd response: failed
11,481,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,481,680 >>> mbox cmd response: failed
Initializing fuses
2,050,133 writing to cptra_bootfsm_go
12,089,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,664,449 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,235 UART:
192,593 UART: Running Caliptra ROM ...
193,788 UART:
193,940 UART: [state] CFI Enabled
261,941 UART: [state] LifecycleState = Unprovisioned
264,363 UART: [state] DebugLocked = No
266,828 UART: [state] WD Timer not started. Device not locked for debugging
271,428 UART: [kat] SHA2-256
461,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,055 UART: [kat] ++
472,538 UART: [kat] sha1
483,097 UART: [kat] SHA2-256
486,108 UART: [kat] SHA2-384
491,928 UART: [kat] SHA2-512-ACC
494,541 UART: [kat] ECC-384
2,947,235 UART: [kat] HMAC-384Kdf
2,969,622 UART: [kat] LMS
3,501,401 UART: [kat] --
3,506,637 UART: [cold-reset] ++
3,508,838 UART: [fht] FHT @ 0x50003400
3,520,903 UART: [idev] ++
3,521,598 UART: [idev] CDI.KEYID = 6
3,522,487 UART: [idev] SUBJECT.KEYID = 7
3,523,698 UART: [idev] UDS.KEYID = 0
3,526,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,372 UART: [idev] Erasing UDS.KEYID = 0
6,026,590 UART: [idev] Sha1 KeyId Algorithm
6,047,465 UART: [idev] --
6,051,894 UART: [ldev] ++
6,052,586 UART: [ldev] CDI.KEYID = 6
6,053,508 UART: [ldev] SUBJECT.KEYID = 5
6,054,672 UART: [ldev] AUTHORITY.KEYID = 7
6,055,907 UART: [ldev] FE.KEYID = 1
6,099,299 UART: [ldev] Erasing FE.KEYID = 1
8,601,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,836 UART: [ldev] --
10,411,227 UART: [fwproc] Wait for Commands...
10,413,652 UART: [fwproc] Recv command 0x46574c44
10,415,974 UART: [fwproc] Recv'd Img size: 114168 bytes
11,519,166 UART: ROM Fatal Error: 0x000B001A
11,522,826 >>> mbox cmd response: failed
11,523,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,523,701 >>> mbox cmd response: failed
11,524,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,524,380 >>> mbox cmd response: failed
Initializing fuses
2,056,037 writing to cptra_bootfsm_go
2,245,369 UART:
2,245,716 UART: Running Caliptra ROM ...
2,246,854 UART:
2,247,021 UART: [state] CFI Enabled
2,309,533 UART: [state] LifecycleState = Unprovisioned
2,311,911 UART: [state] DebugLocked = No
2,313,139 UART: [state] WD Timer not started. Device not locked for debugging
2,317,717 UART: [kat] SHA2-256
2,507,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,353 UART: [kat] ++
2,518,901 UART: [kat] sha1
2,530,824 UART: [kat] SHA2-256
2,533,843 UART: [kat] SHA2-384
2,540,048 UART: [kat] SHA2-512-ACC
2,542,595 UART: [kat] ECC-384
4,992,076 UART: [kat] HMAC-384Kdf
5,014,034 UART: [kat] LMS
5,545,830 UART: [kat] --
5,550,232 UART: [cold-reset] ++
5,551,144 UART: [fht] FHT @ 0x50003400
5,562,608 UART: [idev] ++
5,563,295 UART: [idev] CDI.KEYID = 6
5,564,312 UART: [idev] SUBJECT.KEYID = 7
5,565,471 UART: [idev] UDS.KEYID = 0
5,568,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,711,782 UART: [idev] Erasing UDS.KEYID = 0
8,074,162 UART: [idev] Sha1 KeyId Algorithm
8,096,048 UART: [idev] --
8,100,049 UART: [ldev] ++
8,100,736 UART: [ldev] CDI.KEYID = 6
8,101,665 UART: [ldev] SUBJECT.KEYID = 5
8,102,828 UART: [ldev] AUTHORITY.KEYID = 7
8,104,004 UART: [ldev] FE.KEYID = 1
8,142,523 UART: [ldev] Erasing FE.KEYID = 1
10,652,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,638 UART: [ldev] --
12,456,257 UART: [fwproc] Wait for Commands...
12,458,306 UART: [fwproc] Recv command 0x46574c44
12,460,572 UART: [fwproc] Recv'd Img size: 114168 bytes
15,904,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,326 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,100,444 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,641,034 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,439,164 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,321,910 >>> mbox cmd response: failed
11,322,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,322,783 >>> mbox cmd response: failed
11,323,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,323,380 >>> mbox cmd response: failed
Initializing fuses
2,049,982 writing to cptra_bootfsm_go
5,489,145 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,779,727 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,240 writing to cptra_bootfsm_go
193,359 UART:
193,737 UART: Running Caliptra ROM ...
194,828 UART:
604,510 UART: [state] CFI Enabled
618,409 UART: [state] LifecycleState = Unprovisioned
620,781 UART: [state] DebugLocked = No
623,218 UART: [state] WD Timer not started. Device not locked for debugging
627,325 UART: [kat] SHA2-256
817,253 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,013 UART: [kat] ++
828,607 UART: [kat] sha1
839,818 UART: [kat] SHA2-256
842,830 UART: [kat] SHA2-384
848,974 UART: [kat] SHA2-512-ACC
851,533 UART: [kat] ECC-384
3,294,938 UART: [kat] HMAC-384Kdf
3,308,000 UART: [kat] LMS
3,839,844 UART: [kat] --
3,844,218 UART: [cold-reset] ++
3,845,218 UART: [fht] FHT @ 0x50003400
3,857,408 UART: [idev] ++
3,858,151 UART: [idev] CDI.KEYID = 6
3,859,070 UART: [idev] SUBJECT.KEYID = 7
3,860,298 UART: [idev] UDS.KEYID = 0
3,863,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,691 UART: [idev] Erasing UDS.KEYID = 0
6,338,219 UART: [idev] Sha1 KeyId Algorithm
6,361,081 UART: [idev] --
6,365,946 UART: [ldev] ++
6,366,629 UART: [ldev] CDI.KEYID = 6
6,367,543 UART: [ldev] SUBJECT.KEYID = 5
6,368,758 UART: [ldev] AUTHORITY.KEYID = 7
6,369,932 UART: [ldev] FE.KEYID = 1
6,381,685 UART: [ldev] Erasing FE.KEYID = 1
8,860,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,084 UART: [ldev] --
10,650,986 UART: [fwproc] Wait for Commands...
10,654,131 UART: [fwproc] Recv command 0x46574c44
10,656,398 UART: [fwproc] Recv'd Img size: 114168 bytes
11,756,299 UART: ROM Fatal Error: 0x000B001A
11,759,965 >>> mbox cmd response: failed
11,760,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,760,702 >>> mbox cmd response: failed
11,760,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,761,209 >>> mbox cmd response: failed
Initializing fuses
2,052,332 writing to cptra_bootfsm_go
2,241,672 UART:
2,242,022 UART: Running Caliptra ROM ...
2,243,168 UART:
8,692,553 UART: [state] CFI Enabled
8,705,478 UART: [state] LifecycleState = Unprovisioned
8,707,839 UART: [state] DebugLocked = No
8,710,768 UART: [state] WD Timer not started. Device not locked for debugging
8,715,016 UART: [kat] SHA2-256
8,904,913 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,915,660 UART: [kat] ++
8,916,182 UART: [kat] sha1
8,927,424 UART: [kat] SHA2-256
8,930,452 UART: [kat] SHA2-384
8,936,719 UART: [kat] SHA2-512-ACC
8,939,305 UART: [kat] ECC-384
11,381,359 UART: [kat] HMAC-384Kdf
11,394,412 UART: [kat] LMS
11,926,258 UART: [kat] --
11,931,517 UART: [cold-reset] ++
11,933,894 UART: [fht] FHT @ 0x50003400
11,945,750 UART: [idev] ++
11,946,425 UART: [idev] CDI.KEYID = 6
11,947,445 UART: [idev] SUBJECT.KEYID = 7
11,948,606 UART: [idev] UDS.KEYID = 0
11,951,136 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,094,670 UART: [idev] Erasing UDS.KEYID = 0
14,422,653 UART: [idev] Sha1 KeyId Algorithm
14,444,947 UART: [idev] --
14,449,269 UART: [ldev] ++
14,449,955 UART: [ldev] CDI.KEYID = 6
14,450,865 UART: [ldev] SUBJECT.KEYID = 5
14,452,081 UART: [ldev] AUTHORITY.KEYID = 7
14,453,260 UART: [ldev] FE.KEYID = 1
14,463,912 UART: [ldev] Erasing FE.KEYID = 1
16,945,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,668,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,683,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,698,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,713,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,734,246 UART: [ldev] --
18,740,012 UART: [fwproc] Wait for Commands...
18,742,654 UART: [fwproc] Recv command 0x46574c44
18,744,919 UART: [fwproc] Recv'd Img size: 114168 bytes
22,191,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,272,837 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,389,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,929,640 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,754,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,538,830 >>> mbox cmd response: failed
11,539,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,539,781 >>> mbox cmd response: failed
11,540,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,540,372 >>> mbox cmd response: failed
Initializing fuses
2,050,220 writing to cptra_bootfsm_go
12,088,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,285,947 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,299 UART: [kat] SHA2-256
892,237 UART: [kat] SHA2-384
894,880 UART: [kat] SHA2-512-ACC
896,781 UART: [kat] ECC-384
902,234 UART: [kat] HMAC-384Kdf
906,874 UART: [kat] LMS
1,475,070 UART: [kat] --
1,475,967 UART: [cold-reset] ++
1,476,407 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,224 UART: [idev] Erasing UDS.KEYID = 0
1,504,592 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,076 UART: [idev] --
1,513,987 UART: [ldev] ++
1,514,155 UART: [ldev] CDI.KEYID = 6
1,514,518 UART: [ldev] SUBJECT.KEYID = 5
1,514,944 UART: [ldev] AUTHORITY.KEYID = 7
1,515,407 UART: [ldev] FE.KEYID = 1
1,520,533 UART: [ldev] Erasing FE.KEYID = 1
1,545,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,394 UART: [ldev] --
1,584,869 UART: [fwproc] Waiting for Commands...
1,585,668 UART: [fwproc] Received command 0x46574c44
1,586,459 UART: [fwproc] Received Image of size 114168 bytes
1,626,385 UART: ROM Fatal Error: 0x000B001A
1,627,544 >>> mbox cmd response: failed
1,627,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,550 >>> mbox cmd response: failed
1,627,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,628 UART: [state] LifecycleState = Unprovisioned
86,283 UART: [state] DebugLocked = No
86,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,467 UART: [kat] SHA2-256
882,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,513 UART: [kat] ++
886,665 UART: [kat] sha1
891,111 UART: [kat] SHA2-256
893,049 UART: [kat] SHA2-384
895,602 UART: [kat] SHA2-512-ACC
897,503 UART: [kat] ECC-384
902,902 UART: [kat] HMAC-384Kdf
907,394 UART: [kat] LMS
1,475,590 UART: [kat] --
1,476,585 UART: [cold-reset] ++
1,476,987 UART: [fht] Storing FHT @ 0x50003400
1,479,832 UART: [idev] ++
1,480,000 UART: [idev] CDI.KEYID = 6
1,480,360 UART: [idev] SUBJECT.KEYID = 7
1,480,784 UART: [idev] UDS.KEYID = 0
1,481,129 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,624 UART: [idev] Erasing UDS.KEYID = 0
1,504,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,923 UART: [ldev] Erasing FE.KEYID = 1
1,546,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,980 UART: [ldev] --
1,585,435 UART: [fwproc] Waiting for Commands...
1,586,304 UART: [fwproc] Received command 0x46574c44
1,587,095 UART: [fwproc] Received Image of size 114168 bytes
2,883,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,797 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,483 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,478,885 >>> mbox cmd response: failed
1,478,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,891 >>> mbox cmd response: failed
1,478,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,897 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,673 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,279 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,915 UART: [state] LifecycleState = Unprovisioned
86,570 UART: [state] DebugLocked = No
87,104 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,790 UART: [kat] SHA2-256
882,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,836 UART: [kat] ++
886,988 UART: [kat] sha1
891,074 UART: [kat] SHA2-256
893,012 UART: [kat] SHA2-384
895,793 UART: [kat] SHA2-512-ACC
897,694 UART: [kat] ECC-384
903,627 UART: [kat] HMAC-384Kdf
908,281 UART: [kat] LMS
1,476,477 UART: [kat] --
1,477,664 UART: [cold-reset] ++
1,478,174 UART: [fht] Storing FHT @ 0x50003400
1,480,735 UART: [idev] ++
1,480,903 UART: [idev] CDI.KEYID = 6
1,481,263 UART: [idev] SUBJECT.KEYID = 7
1,481,687 UART: [idev] UDS.KEYID = 0
1,482,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,605 UART: [idev] Erasing UDS.KEYID = 0
1,505,755 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,383 UART: [idev] --
1,515,446 UART: [ldev] ++
1,515,614 UART: [ldev] CDI.KEYID = 6
1,515,977 UART: [ldev] SUBJECT.KEYID = 5
1,516,403 UART: [ldev] AUTHORITY.KEYID = 7
1,516,866 UART: [ldev] FE.KEYID = 1
1,522,412 UART: [ldev] Erasing FE.KEYID = 1
1,548,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,371 UART: [ldev] --
1,587,778 UART: [fwproc] Waiting for Commands...
1,588,397 UART: [fwproc] Received command 0x46574c44
1,589,188 UART: [fwproc] Received Image of size 114168 bytes
1,628,438 UART: ROM Fatal Error: 0x000B001A
1,629,597 >>> mbox cmd response: failed
1,629,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,603 >>> mbox cmd response: failed
1,629,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,482 UART: [kat] SHA2-256
882,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,528 UART: [kat] ++
886,680 UART: [kat] sha1
890,890 UART: [kat] SHA2-256
892,828 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
903,165 UART: [kat] HMAC-384Kdf
907,837 UART: [kat] LMS
1,476,033 UART: [kat] --
1,476,912 UART: [cold-reset] ++
1,477,260 UART: [fht] Storing FHT @ 0x50003400
1,479,849 UART: [idev] ++
1,480,017 UART: [idev] CDI.KEYID = 6
1,480,377 UART: [idev] SUBJECT.KEYID = 7
1,480,801 UART: [idev] UDS.KEYID = 0
1,481,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,747 UART: [idev] Erasing UDS.KEYID = 0
1,505,395 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,089 UART: [idev] --
1,515,026 UART: [ldev] ++
1,515,194 UART: [ldev] CDI.KEYID = 6
1,515,557 UART: [ldev] SUBJECT.KEYID = 5
1,515,983 UART: [ldev] AUTHORITY.KEYID = 7
1,516,446 UART: [ldev] FE.KEYID = 1
1,521,838 UART: [ldev] Erasing FE.KEYID = 1
1,547,921 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,553 UART: [ldev] --
1,586,906 UART: [fwproc] Waiting for Commands...
1,587,723 UART: [fwproc] Received command 0x46574c44
1,588,514 UART: [fwproc] Received Image of size 114168 bytes
2,884,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,489 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,841 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,512 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,330 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,481,568 >>> mbox cmd response: failed
1,481,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,574 >>> mbox cmd response: failed
1,481,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,948 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,514 UART: [state] LifecycleState = Unprovisioned
86,169 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
88,072 UART: [kat] SHA2-256
893,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,847 UART: [kat] ++
897,999 UART: [kat] sha1
902,271 UART: [kat] SHA2-256
904,211 UART: [kat] SHA2-384
906,952 UART: [kat] SHA2-512-ACC
908,853 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,468 UART: [kat] LMS
1,170,796 UART: [kat] --
1,171,567 UART: [cold-reset] ++
1,172,041 UART: [fht] FHT @ 0x50003400
1,174,750 UART: [idev] ++
1,174,918 UART: [idev] CDI.KEYID = 6
1,175,278 UART: [idev] SUBJECT.KEYID = 7
1,175,702 UART: [idev] UDS.KEYID = 0
1,176,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,500 UART: [idev] Erasing UDS.KEYID = 0
1,200,953 UART: [idev] Sha1 KeyId Algorithm
1,209,505 UART: [idev] --
1,210,523 UART: [ldev] ++
1,210,691 UART: [ldev] CDI.KEYID = 6
1,211,054 UART: [ldev] SUBJECT.KEYID = 5
1,211,480 UART: [ldev] AUTHORITY.KEYID = 7
1,211,943 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,063 UART: [ldev] --
1,282,506 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,042 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,246 UART: ROM Fatal Error: 0x000B001A
1,325,405 >>> mbox cmd response: failed
1,325,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,411 >>> mbox cmd response: failed
1,325,411 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,417 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,459 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
893,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,515 UART: [kat] ++
897,667 UART: [kat] sha1
901,883 UART: [kat] SHA2-256
903,823 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,918 UART: [kat] LMS
1,171,246 UART: [kat] --
1,172,147 UART: [cold-reset] ++
1,172,691 UART: [fht] FHT @ 0x50003400
1,175,436 UART: [idev] ++
1,175,604 UART: [idev] CDI.KEYID = 6
1,175,964 UART: [idev] SUBJECT.KEYID = 7
1,176,388 UART: [idev] UDS.KEYID = 0
1,176,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,268 UART: [idev] Erasing UDS.KEYID = 0
1,201,497 UART: [idev] Sha1 KeyId Algorithm
1,209,899 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,439 UART: [ldev] Erasing FE.KEYID = 1
1,243,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,870 UART: [fwproc] Wait for Commands...
1,283,462 UART: [fwproc] Recv command 0x46574c44
1,284,190 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,589 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,893 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,454 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,177,962 >>> mbox cmd response: failed
1,177,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,968 >>> mbox cmd response: failed
1,177,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,283 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,599 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,462 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
893,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,404 UART: [kat] ++
897,556 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,351 UART: [kat] SHA2-512-ACC
908,252 UART: [kat] ECC-384
917,969 UART: [kat] HMAC-384Kdf
922,615 UART: [kat] LMS
1,170,943 UART: [kat] --
1,172,056 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,129 UART: [idev] ++
1,175,297 UART: [idev] CDI.KEYID = 6
1,175,657 UART: [idev] SUBJECT.KEYID = 7
1,176,081 UART: [idev] UDS.KEYID = 0
1,176,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,041 UART: [idev] Erasing UDS.KEYID = 0
1,201,100 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,562 UART: [ldev] Erasing FE.KEYID = 1
1,244,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,038 UART: [ldev] --
1,283,343 UART: [fwproc] Wait for Commands...
1,284,067 UART: [fwproc] Recv command 0x46574c44
1,284,795 UART: [fwproc] Recv'd Img size: 114168 bytes
1,323,571 UART: ROM Fatal Error: 0x000B001A
1,324,730 >>> mbox cmd response: failed
1,324,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,736 >>> mbox cmd response: failed
1,324,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,290 UART: [kat] SHA2-256
904,230 UART: [kat] SHA2-384
906,971 UART: [kat] SHA2-512-ACC
908,872 UART: [kat] ECC-384
918,527 UART: [kat] HMAC-384Kdf
923,163 UART: [kat] LMS
1,171,491 UART: [kat] --
1,172,212 UART: [cold-reset] ++
1,172,684 UART: [fht] FHT @ 0x50003400
1,175,367 UART: [idev] ++
1,175,535 UART: [idev] CDI.KEYID = 6
1,175,895 UART: [idev] SUBJECT.KEYID = 7
1,176,319 UART: [idev] UDS.KEYID = 0
1,176,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,043 UART: [idev] Erasing UDS.KEYID = 0
1,201,382 UART: [idev] Sha1 KeyId Algorithm
1,209,716 UART: [idev] --
1,210,650 UART: [ldev] ++
1,210,818 UART: [ldev] CDI.KEYID = 6
1,211,181 UART: [ldev] SUBJECT.KEYID = 5
1,211,607 UART: [ldev] AUTHORITY.KEYID = 7
1,212,070 UART: [ldev] FE.KEYID = 1
1,216,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,014 UART: [ldev] --
1,282,471 UART: [fwproc] Wait for Commands...
1,283,287 UART: [fwproc] Recv command 0x46574c44
1,284,015 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,866 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,335 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,288 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,553 >>> mbox cmd response: failed
1,178,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,559 >>> mbox cmd response: failed
1,178,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,202 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
891,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
915,698 UART: [kat] HMAC-384Kdf
920,154 UART: [kat] LMS
1,168,466 UART: [kat] --
1,169,235 UART: [cold-reset] ++
1,169,753 UART: [fht] FHT @ 0x50003400
1,172,517 UART: [idev] ++
1,172,685 UART: [idev] CDI.KEYID = 6
1,173,046 UART: [idev] SUBJECT.KEYID = 7
1,173,471 UART: [idev] UDS.KEYID = 0
1,173,817 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,203 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,542 UART: [ldev] --
1,282,012 UART: [fwproc] Wait for Commands...
1,282,775 UART: [fwproc] Recv command 0x46574c44
1,283,508 UART: [fwproc] Recv'd Img size: 114168 bytes
1,322,143 UART: ROM Fatal Error: 0x000B001A
1,323,302 >>> mbox cmd response: failed
1,323,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,308 >>> mbox cmd response: failed
1,323,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,994 UART: [kat] SHA2-512-ACC
906,895 UART: [kat] ECC-384
916,882 UART: [kat] HMAC-384Kdf
921,408 UART: [kat] LMS
1,169,720 UART: [kat] --
1,170,777 UART: [cold-reset] ++
1,171,327 UART: [fht] FHT @ 0x50003400
1,173,907 UART: [idev] ++
1,174,075 UART: [idev] CDI.KEYID = 6
1,174,436 UART: [idev] SUBJECT.KEYID = 7
1,174,861 UART: [idev] UDS.KEYID = 0
1,175,207 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,857 UART: [idev] Erasing UDS.KEYID = 0
1,199,369 UART: [idev] Sha1 KeyId Algorithm
1,208,331 UART: [idev] --
1,209,430 UART: [ldev] ++
1,209,598 UART: [ldev] CDI.KEYID = 6
1,209,962 UART: [ldev] SUBJECT.KEYID = 5
1,210,389 UART: [ldev] AUTHORITY.KEYID = 7
1,210,852 UART: [ldev] FE.KEYID = 1
1,216,068 UART: [ldev] Erasing FE.KEYID = 1
1,242,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,188 UART: [ldev] --
1,281,652 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,693 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,376 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,986 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,340 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,172,779 >>> mbox cmd response: failed
1,172,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,785 >>> mbox cmd response: failed
1,172,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,784 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
891,615 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
904,935 UART: [kat] SHA2-512-ACC
906,836 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,123 UART: [kat] LMS
1,169,435 UART: [kat] --
1,170,370 UART: [cold-reset] ++
1,170,786 UART: [fht] FHT @ 0x50003400
1,173,490 UART: [idev] ++
1,173,658 UART: [idev] CDI.KEYID = 6
1,174,019 UART: [idev] SUBJECT.KEYID = 7
1,174,444 UART: [idev] UDS.KEYID = 0
1,174,790 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,770 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,193 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,143 UART: [fwproc] Wait for Commands...
1,282,748 UART: [fwproc] Recv command 0x46574c44
1,283,481 UART: [fwproc] Recv'd Img size: 114168 bytes
1,323,020 UART: ROM Fatal Error: 0x000B001A
1,324,179 >>> mbox cmd response: failed
1,324,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,185 >>> mbox cmd response: failed
1,324,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
891,233 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,362 UART: [kat] ++
895,514 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,395 UART: [kat] SHA2-512-ACC
906,296 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,174,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,198,838 UART: [idev] Sha1 KeyId Algorithm
1,207,532 UART: [idev] --
1,208,449 UART: [ldev] ++
1,208,617 UART: [ldev] CDI.KEYID = 6
1,208,981 UART: [ldev] SUBJECT.KEYID = 5
1,209,408 UART: [ldev] AUTHORITY.KEYID = 7
1,209,871 UART: [ldev] FE.KEYID = 1
1,215,257 UART: [ldev] Erasing FE.KEYID = 1
1,241,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,625 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,730 UART: [fwproc] Recv command 0x46574c44
1,282,463 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,991 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,559 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,176,034 >>> mbox cmd response: failed
1,176,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,040 >>> mbox cmd response: failed
1,176,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,409 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
4,880,283 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,334,133 >>> mbox cmd response: failed
15,334,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,335,120 >>> mbox cmd response: failed
15,335,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,335,681 >>> mbox cmd response: failed
Initializing fuses
2,058,723 writing to cptra_bootfsm_go
6,921,587 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,520,289 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
4,881,910 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,334,034 >>> mbox cmd response: failed
15,334,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,335,072 >>> mbox cmd response: failed
15,335,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,335,652 >>> mbox cmd response: failed
Initializing fuses
2,054,980 writing to cptra_bootfsm_go
6,925,639 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,482,956 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
5,191,371 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,513,935 >>> mbox cmd response: failed
15,514,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,514,932 >>> mbox cmd response: failed
15,515,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,515,489 >>> mbox cmd response: failed
Initializing fuses
2,056,583 writing to cptra_bootfsm_go
9,533,704 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,961,751 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
5,187,232 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,495,566 >>> mbox cmd response: failed
15,496,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,496,488 >>> mbox cmd response: failed
15,496,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,497,091 >>> mbox cmd response: failed
Initializing fuses
2,056,098 writing to cptra_bootfsm_go
9,552,481 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,990,834 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
3,461,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,470,431 >>> mbox cmd response: failed
11,471,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,471,394 >>> mbox cmd response: failed
11,471,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,471,963 >>> mbox cmd response: failed
Initializing fuses
2,053,869 writing to cptra_bootfsm_go
5,512,860 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,321,679 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,460,199 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,461,888 >>> mbox cmd response: failed
11,462,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,463,041 >>> mbox cmd response: failed
11,463,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,463,691 >>> mbox cmd response: failed
Initializing fuses
2,058,303 writing to cptra_bootfsm_go
5,494,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,310,529 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,783,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,644,818 >>> mbox cmd response: failed
11,645,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,645,860 >>> mbox cmd response: failed
11,646,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,646,421 >>> mbox cmd response: failed
Initializing fuses
2,056,650 writing to cptra_bootfsm_go
11,995,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,702,803 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
3,785,936 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,663,849 >>> mbox cmd response: failed
11,664,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,664,983 >>> mbox cmd response: failed
11,665,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,665,569 >>> mbox cmd response: failed
Initializing fuses
2,057,429 writing to cptra_bootfsm_go
11,982,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,699,859 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,450,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,414,634 >>> mbox cmd response: failed
11,415,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,415,574 >>> mbox cmd response: failed
11,415,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,416,137 >>> mbox cmd response: failed
Initializing fuses
2,059,580 writing to cptra_bootfsm_go
5,514,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,339,193 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,441,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,449,577 >>> mbox cmd response: failed
11,450,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,450,562 >>> mbox cmd response: failed
11,450,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,451,127 >>> mbox cmd response: failed
Initializing fuses
2,056,064 writing to cptra_bootfsm_go
5,496,862 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,352,422 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,793,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,664,464 >>> mbox cmd response: failed
11,665,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,665,377 >>> mbox cmd response: failed
11,665,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,665,936 >>> mbox cmd response: failed
Initializing fuses
2,062,710 writing to cptra_bootfsm_go
11,984,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,721,620 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,779,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,644,818 >>> mbox cmd response: failed
11,645,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,645,781 >>> mbox cmd response: failed
11,646,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,646,357 >>> mbox cmd response: failed
Initializing fuses
2,055,961 writing to cptra_bootfsm_go
11,996,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,695,716 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,757 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,807 >>> mbox cmd response: failed
1,198,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,813 >>> mbox cmd response: failed
1,198,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,819 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,835 UART: [kat] SHA2-256
881,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,881 UART: [kat] ++
886,033 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
894,972 UART: [kat] SHA2-512-ACC
896,873 UART: [kat] ECC-384
902,510 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,475,907 UART: [cold-reset] ++
1,476,313 UART: [fht] Storing FHT @ 0x50003400
1,479,216 UART: [idev] ++
1,479,384 UART: [idev] CDI.KEYID = 6
1,479,744 UART: [idev] SUBJECT.KEYID = 7
1,480,168 UART: [idev] UDS.KEYID = 0
1,480,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,126 UART: [idev] Erasing UDS.KEYID = 0
1,505,454 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,134 UART: [idev] --
1,515,273 UART: [ldev] ++
1,515,441 UART: [ldev] CDI.KEYID = 6
1,515,804 UART: [ldev] SUBJECT.KEYID = 5
1,516,230 UART: [ldev] AUTHORITY.KEYID = 7
1,516,693 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,212 UART: [ldev] --
1,586,517 UART: [fwproc] Waiting for Commands...
1,587,202 UART: [fwproc] Received command 0x46574c44
1,587,993 UART: [fwproc] Received Image of size 114168 bytes
2,885,278 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,890 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,955 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,199,299 >>> mbox cmd response: failed
1,199,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,305 >>> mbox cmd response: failed
1,199,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,061 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,200,790 >>> mbox cmd response: failed
1,200,790 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,796 >>> mbox cmd response: failed
1,200,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,802 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
86,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,470 UART: [kat] SHA2-256
882,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,516 UART: [kat] ++
886,668 UART: [kat] sha1
891,054 UART: [kat] SHA2-256
892,992 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,754 UART: [cold-reset] ++
1,477,296 UART: [fht] Storing FHT @ 0x50003400
1,480,269 UART: [idev] ++
1,480,437 UART: [idev] CDI.KEYID = 6
1,480,797 UART: [idev] SUBJECT.KEYID = 7
1,481,221 UART: [idev] UDS.KEYID = 0
1,481,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,235 UART: [idev] Erasing UDS.KEYID = 0
1,505,577 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,155 UART: [idev] --
1,515,224 UART: [ldev] ++
1,515,392 UART: [ldev] CDI.KEYID = 6
1,515,755 UART: [ldev] SUBJECT.KEYID = 5
1,516,181 UART: [ldev] AUTHORITY.KEYID = 7
1,516,644 UART: [ldev] FE.KEYID = 1
1,521,578 UART: [ldev] Erasing FE.KEYID = 1
1,547,337 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,201 UART: [ldev] --
1,586,534 UART: [fwproc] Waiting for Commands...
1,587,321 UART: [fwproc] Received command 0x46574c44
1,588,112 UART: [fwproc] Received Image of size 114168 bytes
2,883,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,915 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,908 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,590 >>> mbox cmd response: failed
1,198,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,596 >>> mbox cmd response: failed
1,198,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,826 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,461 >>> mbox cmd response: failed
1,198,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,467 >>> mbox cmd response: failed
1,198,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,353 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
893,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,435 UART: [kat] ++
897,587 UART: [kat] sha1
902,011 UART: [kat] SHA2-256
903,951 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
917,784 UART: [kat] HMAC-384Kdf
922,262 UART: [kat] LMS
1,170,590 UART: [kat] --
1,171,619 UART: [cold-reset] ++
1,172,131 UART: [fht] FHT @ 0x50003400
1,174,808 UART: [idev] ++
1,174,976 UART: [idev] CDI.KEYID = 6
1,175,336 UART: [idev] SUBJECT.KEYID = 7
1,175,760 UART: [idev] UDS.KEYID = 0
1,176,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,582 UART: [idev] Erasing UDS.KEYID = 0
1,200,363 UART: [idev] Sha1 KeyId Algorithm
1,209,043 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,792 UART: [ldev] SUBJECT.KEYID = 5
1,211,218 UART: [ldev] AUTHORITY.KEYID = 7
1,211,681 UART: [ldev] FE.KEYID = 1
1,217,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,472 UART: [fwproc] Recv command 0x46574c44
1,283,200 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,315 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,619 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,312 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,195,991 >>> mbox cmd response: failed
1,195,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,997 >>> mbox cmd response: failed
1,195,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,737 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,200,694 >>> mbox cmd response: failed
1,200,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,700 >>> mbox cmd response: failed
1,200,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
893,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,540 UART: [kat] ++
897,692 UART: [kat] sha1
901,802 UART: [kat] SHA2-256
903,742 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,193 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,172,176 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,277 UART: [idev] ++
1,175,445 UART: [idev] CDI.KEYID = 6
1,175,805 UART: [idev] SUBJECT.KEYID = 7
1,176,229 UART: [idev] UDS.KEYID = 0
1,176,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,483 UART: [idev] Erasing UDS.KEYID = 0
1,202,062 UART: [idev] Sha1 KeyId Algorithm
1,210,542 UART: [idev] --
1,211,626 UART: [ldev] ++
1,211,794 UART: [ldev] CDI.KEYID = 6
1,212,157 UART: [ldev] SUBJECT.KEYID = 5
1,212,583 UART: [ldev] AUTHORITY.KEYID = 7
1,213,046 UART: [ldev] FE.KEYID = 1
1,218,294 UART: [ldev] Erasing FE.KEYID = 1
1,244,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,742 UART: [ldev] --
1,284,153 UART: [fwproc] Wait for Commands...
1,284,937 UART: [fwproc] Recv command 0x46574c44
1,285,665 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,608 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,169 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,222 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,199,352 >>> mbox cmd response: failed
1,199,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,358 >>> mbox cmd response: failed
1,199,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,480 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,386 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,191 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,631 >>> mbox cmd response: failed
1,198,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,637 >>> mbox cmd response: failed
1,198,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
88,086 UART: [kat] SHA2-256
891,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
915,672 UART: [kat] HMAC-384Kdf
920,318 UART: [kat] LMS
1,168,630 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,173,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,713 UART: [idev] Erasing UDS.KEYID = 0
1,198,785 UART: [idev] Sha1 KeyId Algorithm
1,207,529 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,172 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,280,836 UART: [fwproc] Wait for Commands...
1,281,423 UART: [fwproc] Recv command 0x46574c44
1,282,156 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,735 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,044 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,508 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,631 >>> mbox cmd response: failed
1,198,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,637 >>> mbox cmd response: failed
1,198,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,138 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,200,408 >>> mbox cmd response: failed
1,200,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,414 >>> mbox cmd response: failed
1,200,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,656 UART: [cold-reset] ++
1,171,110 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,174,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,614 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,545 UART: [ldev] --
1,282,991 UART: [fwproc] Wait for Commands...
1,283,746 UART: [fwproc] Recv command 0x46574c44
1,284,479 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,459 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,944 >>> mbox cmd response: failed
1,198,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,950 >>> mbox cmd response: failed
1,198,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,411 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
192,021 UART:
192,382 UART: Running Caliptra ROM ...
193,588 UART:
193,745 UART: [state] CFI Enabled
267,025 UART: [state] LifecycleState = Unprovisioned
268,983 UART: [state] DebugLocked = No
271,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,607 UART: [kat] SHA2-256
445,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,849 UART: [kat] ++
456,298 UART: [kat] sha1
468,150 UART: [kat] SHA2-256
470,838 UART: [kat] SHA2-384
475,519 UART: [kat] SHA2-512-ACC
477,912 UART: [kat] ECC-384
2,769,253 UART: [kat] HMAC-384Kdf
2,802,177 UART: [kat] LMS
3,992,496 UART: [kat] --
3,998,349 UART: [cold-reset] ++
3,999,419 UART: [fht] Storing FHT @ 0x50003400
4,011,949 UART: [idev] ++
4,012,520 UART: [idev] CDI.KEYID = 6
4,013,459 UART: [idev] SUBJECT.KEYID = 7
4,014,730 UART: [idev] UDS.KEYID = 0
4,017,651 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,160,909 UART: [idev] Erasing UDS.KEYID = 0
7,343,953 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,523 UART: [idev] --
7,368,027 UART: [ldev] ++
7,368,660 UART: [ldev] CDI.KEYID = 6
7,369,574 UART: [ldev] SUBJECT.KEYID = 5
7,370,792 UART: [ldev] AUTHORITY.KEYID = 7
7,372,078 UART: [ldev] FE.KEYID = 1
7,403,021 UART: [ldev] Erasing FE.KEYID = 1
10,736,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,075 UART: [ldev] --
13,118,611 UART: [fwproc] Waiting for Commands...
13,121,794 UART: [fwproc] Received command 0x46574c44
13,124,037 UART: [fwproc] Received Image of size 113844 bytes
20,635,475 UART: ROM Fatal Error: 0x000B0038
20,638,880 >>> mbox cmd response: failed
20,639,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,639,579 >>> mbox cmd response: failed
20,639,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,640,145 >>> mbox cmd response: failed
Initializing fuses
2,048,780 writing to cptra_bootfsm_go
2,238,085 UART:
2,238,458 UART: Running Caliptra ROM ...
2,239,509 UART:
2,239,670 UART: [state] CFI Enabled
2,299,273 UART: [state] LifecycleState = Unprovisioned
2,301,220 UART: [state] DebugLocked = No
2,303,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,308,705 UART: [kat] SHA2-256
2,478,393 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,488,918 UART: [kat] ++
2,489,587 UART: [kat] sha1
2,500,921 UART: [kat] SHA2-256
2,503,621 UART: [kat] SHA2-384
2,510,051 UART: [kat] SHA2-512-ACC
2,512,420 UART: [kat] ECC-384
4,801,715 UART: [kat] HMAC-384Kdf
4,813,417 UART: [kat] LMS
6,003,695 UART: [kat] --
6,006,990 UART: [cold-reset] ++
6,008,767 UART: [fht] Storing FHT @ 0x50003400
6,020,196 UART: [idev] ++
6,020,807 UART: [idev] CDI.KEYID = 6
6,021,725 UART: [idev] SUBJECT.KEYID = 7
6,022,948 UART: [idev] UDS.KEYID = 0
6,025,672 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,168,856 UART: [idev] Erasing UDS.KEYID = 0
9,362,691 UART: [idev] Using Sha1 for KeyId Algorithm
9,384,460 UART: [idev] --
9,388,017 UART: [ldev] ++
9,388,601 UART: [ldev] CDI.KEYID = 6
9,389,570 UART: [ldev] SUBJECT.KEYID = 5
9,390,898 UART: [ldev] AUTHORITY.KEYID = 7
9,392,013 UART: [ldev] FE.KEYID = 1
9,436,309 UART: [ldev] Erasing FE.KEYID = 1
12,765,847 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,064,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,078,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,093,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,108,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,127,147 UART: [ldev] --
15,131,548 UART: [fwproc] Waiting for Commands...
15,133,536 UART: [fwproc] Received command 0x46574c44
15,135,776 UART: [fwproc] Received Image of size 113844 bytes
19,184,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,263,871 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,332,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,648,548 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,807,126 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,733,336 >>> mbox cmd response: failed
19,733,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,734,277 >>> mbox cmd response: failed
19,734,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,734,855 >>> mbox cmd response: failed
Initializing fuses
2,056,538 writing to cptra_bootfsm_go
5,850,498 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,917,690 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,524 UART:
192,881 UART: Running Caliptra ROM ...
194,043 UART:
603,545 UART: [state] CFI Enabled
618,097 UART: [state] LifecycleState = Unprovisioned
620,020 UART: [state] DebugLocked = No
622,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,738 UART: [kat] SHA2-256
797,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,065 UART: [kat] ++
808,601 UART: [kat] sha1
818,457 UART: [kat] SHA2-256
821,147 UART: [kat] SHA2-384
826,905 UART: [kat] SHA2-512-ACC
829,301 UART: [kat] ECC-384
3,110,363 UART: [kat] HMAC-384Kdf
3,123,576 UART: [kat] LMS
4,313,725 UART: [kat] --
4,317,107 UART: [cold-reset] ++
4,318,068 UART: [fht] Storing FHT @ 0x50003400
4,330,744 UART: [idev] ++
4,331,307 UART: [idev] CDI.KEYID = 6
4,332,274 UART: [idev] SUBJECT.KEYID = 7
4,333,487 UART: [idev] UDS.KEYID = 0
4,336,230 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,412 UART: [idev] Erasing UDS.KEYID = 0
7,623,235 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,286 UART: [idev] --
7,650,769 UART: [ldev] ++
7,651,359 UART: [ldev] CDI.KEYID = 6
7,652,275 UART: [ldev] SUBJECT.KEYID = 5
7,653,496 UART: [ldev] AUTHORITY.KEYID = 7
7,654,789 UART: [ldev] FE.KEYID = 1
7,666,407 UART: [ldev] Erasing FE.KEYID = 1
10,953,784 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,808 UART: [ldev] --
13,315,964 UART: [fwproc] Waiting for Commands...
13,319,245 UART: [fwproc] Received command 0x46574c44
13,321,432 UART: [fwproc] Received Image of size 113844 bytes
20,520,299 UART: ROM Fatal Error: 0x000B0038
20,523,716 >>> mbox cmd response: failed
20,524,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,524,496 >>> mbox cmd response: failed
20,524,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,525,269 >>> mbox cmd response: failed
Initializing fuses
2,049,725 writing to cptra_bootfsm_go
2,239,020 UART:
2,239,360 UART: Running Caliptra ROM ...
2,240,407 UART:
2,650,211 UART: [state] CFI Enabled
2,663,091 UART: [state] LifecycleState = Unprovisioned
2,665,005 UART: [state] DebugLocked = No
2,666,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,671,476 UART: [kat] SHA2-256
2,841,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,851,792 UART: [kat] ++
2,852,251 UART: [kat] sha1
2,863,083 UART: [kat] SHA2-256
2,865,798 UART: [kat] SHA2-384
2,871,788 UART: [kat] SHA2-512-ACC
2,874,135 UART: [kat] ECC-384
5,159,285 UART: [kat] HMAC-384Kdf
5,170,718 UART: [kat] LMS
6,360,842 UART: [kat] --
6,363,604 UART: [cold-reset] ++
6,365,917 UART: [fht] Storing FHT @ 0x50003400
6,375,886 UART: [idev] ++
6,376,459 UART: [idev] CDI.KEYID = 6
6,377,478 UART: [idev] SUBJECT.KEYID = 7
6,378,637 UART: [idev] UDS.KEYID = 0
6,381,281 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,524,379 UART: [idev] Erasing UDS.KEYID = 0
9,665,086 UART: [idev] Using Sha1 for KeyId Algorithm
9,687,878 UART: [idev] --
9,691,230 UART: [ldev] ++
9,691,818 UART: [ldev] CDI.KEYID = 6
9,692,788 UART: [ldev] SUBJECT.KEYID = 5
9,693,991 UART: [ldev] AUTHORITY.KEYID = 7
9,695,235 UART: [ldev] FE.KEYID = 1
9,705,886 UART: [ldev] Erasing FE.KEYID = 1
12,991,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,282,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,297,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,312,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,326,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,344,769 UART: [ldev] --
15,349,274 UART: [fwproc] Waiting for Commands...
15,351,369 UART: [fwproc] Received command 0x46574c44
15,353,552 UART: [fwproc] Received Image of size 113844 bytes
19,402,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,478,921 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,547,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,863,622 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,128,302 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,793,810 >>> mbox cmd response: failed
19,794,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,794,867 >>> mbox cmd response: failed
19,795,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,795,374 >>> mbox cmd response: failed
Initializing fuses
2,044,172 writing to cptra_bootfsm_go
6,169,405 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,099,864 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,071 UART:
192,433 UART: Running Caliptra ROM ...
193,614 UART:
193,770 UART: [state] CFI Enabled
262,796 UART: [state] LifecycleState = Unprovisioned
264,616 UART: [state] DebugLocked = No
267,280 UART: [state] WD Timer not started. Device not locked for debugging
271,063 UART: [kat] SHA2-256
450,167 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,745 UART: [kat] ++
462,304 UART: [kat] sha1
472,652 UART: [kat] SHA2-256
475,660 UART: [kat] SHA2-384
481,152 UART: [kat] SHA2-512-ACC
484,097 UART: [kat] ECC-384
2,946,520 UART: [kat] HMAC-384Kdf
2,971,561 UART: [kat] LMS
3,501,013 UART: [kat] --
3,503,774 UART: [cold-reset] ++
3,505,222 UART: [fht] FHT @ 0x50003400
3,515,661 UART: [idev] ++
3,516,223 UART: [idev] CDI.KEYID = 6
3,517,160 UART: [idev] SUBJECT.KEYID = 7
3,518,372 UART: [idev] UDS.KEYID = 0
3,521,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,036 UART: [idev] Erasing UDS.KEYID = 0
6,027,238 UART: [idev] Sha1 KeyId Algorithm
6,050,750 UART: [idev] --
6,054,806 UART: [ldev] ++
6,055,382 UART: [ldev] CDI.KEYID = 6
6,056,275 UART: [ldev] SUBJECT.KEYID = 5
6,057,450 UART: [ldev] AUTHORITY.KEYID = 7
6,058,739 UART: [ldev] FE.KEYID = 1
6,100,982 UART: [ldev] Erasing FE.KEYID = 1
8,602,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,918 UART: [ldev] --
10,390,724 UART: [fwproc] Wait for Commands...
10,393,957 UART: [fwproc] Recv command 0x46574c44
10,396,021 UART: [fwproc] Recv'd Img size: 114168 bytes
13,589,725 UART: ROM Fatal Error: 0x000B0038
13,592,845 >>> mbox cmd response: failed
13,593,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,593,600 >>> mbox cmd response: failed
13,593,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,594,202 >>> mbox cmd response: failed
Initializing fuses
2,048,629 writing to cptra_bootfsm_go
2,237,930 UART:
2,238,273 UART: Running Caliptra ROM ...
2,239,413 UART:
2,239,596 UART: [state] CFI Enabled
2,305,703 UART: [state] LifecycleState = Unprovisioned
2,307,540 UART: [state] DebugLocked = No
2,309,258 UART: [state] WD Timer not started. Device not locked for debugging
2,312,361 UART: [kat] SHA2-256
2,491,478 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,039 UART: [kat] ++
2,503,587 UART: [kat] sha1
2,515,729 UART: [kat] SHA2-256
2,518,793 UART: [kat] SHA2-384
2,525,757 UART: [kat] SHA2-512-ACC
2,528,702 UART: [kat] ECC-384
4,989,951 UART: [kat] HMAC-384Kdf
5,012,779 UART: [kat] LMS
5,542,241 UART: [kat] --
5,545,852 UART: [cold-reset] ++
5,548,373 UART: [fht] FHT @ 0x50003400
5,559,247 UART: [idev] ++
5,559,852 UART: [idev] CDI.KEYID = 6
5,560,744 UART: [idev] SUBJECT.KEYID = 7
5,561,962 UART: [idev] UDS.KEYID = 0
5,564,549 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,708,130 UART: [idev] Erasing UDS.KEYID = 0
8,069,958 UART: [idev] Sha1 KeyId Algorithm
8,093,408 UART: [idev] --
8,098,059 UART: [ldev] ++
8,098,633 UART: [ldev] CDI.KEYID = 6
8,099,544 UART: [ldev] SUBJECT.KEYID = 5
8,100,706 UART: [ldev] AUTHORITY.KEYID = 7
8,101,996 UART: [ldev] FE.KEYID = 1
8,142,142 UART: [ldev] Erasing FE.KEYID = 1
10,643,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,858 UART: [ldev] --
12,455,859 UART: [fwproc] Wait for Commands...
12,458,822 UART: [fwproc] Recv command 0x46574c44
12,460,921 UART: [fwproc] Recv'd Img size: 114168 bytes
15,861,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,981 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,741 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,324,640 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,363,291 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,175,134 >>> mbox cmd response: failed
13,175,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,176,121 >>> mbox cmd response: failed
13,176,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,176,704 >>> mbox cmd response: failed
Initializing fuses
2,062,217 writing to cptra_bootfsm_go
5,435,138 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,093,482 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,427 UART:
192,778 UART: Running Caliptra ROM ...
193,934 UART:
603,435 UART: [state] CFI Enabled
615,278 UART: [state] LifecycleState = Unprovisioned
617,185 UART: [state] DebugLocked = No
619,510 UART: [state] WD Timer not started. Device not locked for debugging
622,985 UART: [kat] SHA2-256
802,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,661 UART: [kat] ++
814,194 UART: [kat] sha1
825,888 UART: [kat] SHA2-256
828,887 UART: [kat] SHA2-384
835,236 UART: [kat] SHA2-512-ACC
838,178 UART: [kat] ECC-384
3,279,467 UART: [kat] HMAC-384Kdf
3,292,358 UART: [kat] LMS
3,821,827 UART: [kat] --
3,825,163 UART: [cold-reset] ++
3,826,828 UART: [fht] FHT @ 0x50003400
3,838,505 UART: [idev] ++
3,839,078 UART: [idev] CDI.KEYID = 6
3,839,997 UART: [idev] SUBJECT.KEYID = 7
3,841,237 UART: [idev] UDS.KEYID = 0
3,843,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,514 UART: [idev] Erasing UDS.KEYID = 0
6,310,204 UART: [idev] Sha1 KeyId Algorithm
6,333,653 UART: [idev] --
6,336,835 UART: [ldev] ++
6,337,405 UART: [ldev] CDI.KEYID = 6
6,338,290 UART: [ldev] SUBJECT.KEYID = 5
6,339,503 UART: [ldev] AUTHORITY.KEYID = 7
6,340,796 UART: [ldev] FE.KEYID = 1
6,352,493 UART: [ldev] Erasing FE.KEYID = 1
8,824,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,219 UART: [ldev] --
10,616,170 UART: [fwproc] Wait for Commands...
10,618,064 UART: [fwproc] Recv command 0x46574c44
10,620,184 UART: [fwproc] Recv'd Img size: 114168 bytes
13,849,959 UART: ROM Fatal Error: 0x000B0038
13,853,073 >>> mbox cmd response: failed
13,853,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,853,765 >>> mbox cmd response: failed
13,854,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,854,361 >>> mbox cmd response: failed
Initializing fuses
2,052,565 writing to cptra_bootfsm_go
2,241,862 UART:
2,242,224 UART: Running Caliptra ROM ...
2,243,273 UART:
6,619,120 UART: [state] CFI Enabled
6,631,594 UART: [state] LifecycleState = Unprovisioned
6,633,452 UART: [state] DebugLocked = No
6,635,081 UART: [state] WD Timer not started. Device not locked for debugging
6,638,930 UART: [kat] SHA2-256
6,818,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,829,609 UART: [kat] ++
6,830,068 UART: [kat] sha1
6,842,249 UART: [kat] SHA2-256
6,845,258 UART: [kat] SHA2-384
6,851,580 UART: [kat] SHA2-512-ACC
6,854,526 UART: [kat] ECC-384
9,298,368 UART: [kat] HMAC-384Kdf
9,311,508 UART: [kat] LMS
9,840,986 UART: [kat] --
9,845,548 UART: [cold-reset] ++
9,848,075 UART: [fht] FHT @ 0x50003400
9,858,838 UART: [idev] ++
9,859,410 UART: [idev] CDI.KEYID = 6
9,860,325 UART: [idev] SUBJECT.KEYID = 7
9,861,538 UART: [idev] UDS.KEYID = 0
9,864,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,007,635 UART: [idev] Erasing UDS.KEYID = 0
12,335,755 UART: [idev] Sha1 KeyId Algorithm
12,357,844 UART: [idev] --
12,361,923 UART: [ldev] ++
12,362,500 UART: [ldev] CDI.KEYID = 6
12,363,407 UART: [ldev] SUBJECT.KEYID = 5
12,364,622 UART: [ldev] AUTHORITY.KEYID = 7
12,365,854 UART: [ldev] FE.KEYID = 1
12,377,218 UART: [ldev] Erasing FE.KEYID = 1
14,849,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,567,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,583,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,598,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,614,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,635,246 UART: [ldev] --
16,640,516 UART: [fwproc] Wait for Commands...
16,642,020 UART: [fwproc] Recv command 0x46574c44
16,644,069 UART: [fwproc] Recv'd Img size: 114168 bytes
20,043,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,123,372 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,192,180 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,510,269 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
3,703,949 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,428,823 >>> mbox cmd response: failed
13,429,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,429,787 >>> mbox cmd response: failed
13,430,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,430,371 >>> mbox cmd response: failed
Initializing fuses
2,046,679 writing to cptra_bootfsm_go
10,128,394 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,698,234 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,221 UART:
192,576 UART: Running Caliptra ROM ...
193,758 UART:
193,915 UART: [state] CFI Enabled
262,719 UART: [state] LifecycleState = Unprovisioned
265,150 UART: [state] DebugLocked = No
267,617 UART: [state] WD Timer not started. Device not locked for debugging
272,380 UART: [kat] SHA2-256
462,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,032 UART: [kat] ++
473,520 UART: [kat] sha1
484,779 UART: [kat] SHA2-256
487,805 UART: [kat] SHA2-384
493,254 UART: [kat] SHA2-512-ACC
495,816 UART: [kat] ECC-384
2,945,664 UART: [kat] HMAC-384Kdf
2,971,130 UART: [kat] LMS
3,502,897 UART: [kat] --
3,508,944 UART: [cold-reset] ++
3,510,826 UART: [fht] FHT @ 0x50003400
3,521,540 UART: [idev] ++
3,522,271 UART: [idev] CDI.KEYID = 6
3,523,193 UART: [idev] SUBJECT.KEYID = 7
3,524,366 UART: [idev] UDS.KEYID = 0
3,527,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,681 UART: [idev] Erasing UDS.KEYID = 0
6,025,601 UART: [idev] Sha1 KeyId Algorithm
6,048,312 UART: [idev] --
6,054,583 UART: [ldev] ++
6,055,266 UART: [ldev] CDI.KEYID = 6
6,056,162 UART: [ldev] SUBJECT.KEYID = 5
6,057,323 UART: [ldev] AUTHORITY.KEYID = 7
6,058,609 UART: [ldev] FE.KEYID = 1
6,097,679 UART: [ldev] Erasing FE.KEYID = 1
8,601,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,446 UART: [ldev] --
10,410,542 UART: [fwproc] Wait for Commands...
10,412,914 UART: [fwproc] Recv command 0x46574c44
10,415,237 UART: [fwproc] Recv'd Img size: 114168 bytes
13,644,747 UART: ROM Fatal Error: 0x000B0038
13,648,199 >>> mbox cmd response: failed
13,648,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,648,951 >>> mbox cmd response: failed
13,649,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,649,514 >>> mbox cmd response: failed
Initializing fuses
2,048,487 writing to cptra_bootfsm_go
2,237,781 UART:
2,238,130 UART: Running Caliptra ROM ...
2,239,269 UART:
2,239,443 UART: [state] CFI Enabled
2,310,643 UART: [state] LifecycleState = Unprovisioned
2,313,076 UART: [state] DebugLocked = No
2,314,360 UART: [state] WD Timer not started. Device not locked for debugging
2,318,123 UART: [kat] SHA2-256
2,507,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,558 UART: [kat] ++
2,519,107 UART: [kat] sha1
2,530,601 UART: [kat] SHA2-256
2,533,622 UART: [kat] SHA2-384
2,538,425 UART: [kat] SHA2-512-ACC
2,540,999 UART: [kat] ECC-384
4,993,928 UART: [kat] HMAC-384Kdf
5,018,476 UART: [kat] LMS
5,550,277 UART: [kat] --
5,556,585 UART: [cold-reset] ++
5,558,893 UART: [fht] FHT @ 0x50003400
5,571,764 UART: [idev] ++
5,572,444 UART: [idev] CDI.KEYID = 6
5,573,384 UART: [idev] SUBJECT.KEYID = 7
5,574,595 UART: [idev] UDS.KEYID = 0
5,577,122 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,721,212 UART: [idev] Erasing UDS.KEYID = 0
8,096,580 UART: [idev] Sha1 KeyId Algorithm
8,118,598 UART: [idev] --
8,124,842 UART: [ldev] ++
8,125,531 UART: [ldev] CDI.KEYID = 6
8,126,444 UART: [ldev] SUBJECT.KEYID = 5
8,127,626 UART: [ldev] AUTHORITY.KEYID = 7
8,128,805 UART: [ldev] FE.KEYID = 1
8,164,833 UART: [ldev] Erasing FE.KEYID = 1
10,670,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,450,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,667 UART: [ldev] --
12,478,960 UART: [fwproc] Wait for Commands...
12,480,947 UART: [fwproc] Recv command 0x46574c44
12,483,218 UART: [fwproc] Recv'd Img size: 114168 bytes
15,922,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,002,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,118,954 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,659,883 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,437,521 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,397,935 >>> mbox cmd response: failed
13,398,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,399,004 >>> mbox cmd response: failed
13,399,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,399,572 >>> mbox cmd response: failed
Initializing fuses
2,045,314 writing to cptra_bootfsm_go
5,466,423 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,758,686 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,454 UART:
192,817 UART: Running Caliptra ROM ...
194,011 UART:
603,614 UART: [state] CFI Enabled
615,248 UART: [state] LifecycleState = Unprovisioned
617,574 UART: [state] DebugLocked = No
619,926 UART: [state] WD Timer not started. Device not locked for debugging
624,468 UART: [kat] SHA2-256
814,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,144 UART: [kat] ++
825,652 UART: [kat] sha1
837,558 UART: [kat] SHA2-256
840,567 UART: [kat] SHA2-384
845,790 UART: [kat] SHA2-512-ACC
848,361 UART: [kat] ECC-384
3,292,114 UART: [kat] HMAC-384Kdf
3,304,627 UART: [kat] LMS
3,836,472 UART: [kat] --
3,841,886 UART: [cold-reset] ++
3,843,127 UART: [fht] FHT @ 0x50003400
3,853,842 UART: [idev] ++
3,854,554 UART: [idev] CDI.KEYID = 6
3,855,475 UART: [idev] SUBJECT.KEYID = 7
3,856,693 UART: [idev] UDS.KEYID = 0
3,859,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,891 UART: [idev] Erasing UDS.KEYID = 0
6,330,718 UART: [idev] Sha1 KeyId Algorithm
6,351,879 UART: [idev] --
6,356,193 UART: [ldev] ++
6,356,873 UART: [ldev] CDI.KEYID = 6
6,357,783 UART: [ldev] SUBJECT.KEYID = 5
6,358,995 UART: [ldev] AUTHORITY.KEYID = 7
6,360,170 UART: [ldev] FE.KEYID = 1
6,373,248 UART: [ldev] Erasing FE.KEYID = 1
8,849,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,580 UART: [ldev] --
10,639,250 UART: [fwproc] Wait for Commands...
10,641,267 UART: [fwproc] Recv command 0x46574c44
10,643,534 UART: [fwproc] Recv'd Img size: 114168 bytes
13,883,888 UART: ROM Fatal Error: 0x000B0038
13,887,307 >>> mbox cmd response: failed
13,887,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,888,090 >>> mbox cmd response: failed
13,888,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,888,656 >>> mbox cmd response: failed
Initializing fuses
2,049,414 writing to cptra_bootfsm_go
2,238,756 UART:
2,239,120 UART: Running Caliptra ROM ...
2,240,263 UART:
6,575,061 UART: [state] CFI Enabled
6,591,820 UART: [state] LifecycleState = Unprovisioned
6,594,181 UART: [state] DebugLocked = No
6,596,350 UART: [state] WD Timer not started. Device not locked for debugging
6,600,811 UART: [kat] SHA2-256
6,790,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,801,470 UART: [kat] ++
6,801,988 UART: [kat] sha1
6,814,156 UART: [kat] SHA2-256
6,817,189 UART: [kat] SHA2-384
6,823,021 UART: [kat] SHA2-512-ACC
6,825,646 UART: [kat] ECC-384
9,267,353 UART: [kat] HMAC-384Kdf
9,280,879 UART: [kat] LMS
9,812,699 UART: [kat] --
9,816,797 UART: [cold-reset] ++
9,819,338 UART: [fht] FHT @ 0x50003400
9,830,971 UART: [idev] ++
9,831,647 UART: [idev] CDI.KEYID = 6
9,832,666 UART: [idev] SUBJECT.KEYID = 7
9,833,824 UART: [idev] UDS.KEYID = 0
9,836,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,979,980 UART: [idev] Erasing UDS.KEYID = 0
12,306,849 UART: [idev] Sha1 KeyId Algorithm
12,328,213 UART: [idev] --
12,333,496 UART: [ldev] ++
12,334,232 UART: [ldev] CDI.KEYID = 6
12,335,119 UART: [ldev] SUBJECT.KEYID = 5
12,336,224 UART: [ldev] AUTHORITY.KEYID = 7
12,337,513 UART: [ldev] FE.KEYID = 1
12,348,463 UART: [ldev] Erasing FE.KEYID = 1
14,825,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,544,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,559,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,574,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,589,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,610,490 UART: [ldev] --
16,616,088 UART: [fwproc] Wait for Commands...
16,618,244 UART: [fwproc] Recv command 0x46574c44
16,620,565 UART: [fwproc] Recv'd Img size: 114168 bytes
20,056,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,133,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,249,958 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,791,295 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
3,755,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,604,205 >>> mbox cmd response: failed
13,604,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,605,219 >>> mbox cmd response: failed
13,605,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,605,784 >>> mbox cmd response: failed
Initializing fuses
2,048,162 writing to cptra_bootfsm_go
10,022,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,199,695 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,780 UART: [state] LifecycleState = Unprovisioned
85,435 UART: [state] DebugLocked = No
85,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,493 UART: [kat] SHA2-256
881,424 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,539 UART: [kat] ++
885,691 UART: [kat] sha1
889,815 UART: [kat] SHA2-256
891,753 UART: [kat] SHA2-384
894,558 UART: [kat] SHA2-512-ACC
896,459 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
906,902 UART: [kat] LMS
1,475,098 UART: [kat] --
1,476,221 UART: [cold-reset] ++
1,476,709 UART: [fht] Storing FHT @ 0x50003400
1,479,548 UART: [idev] ++
1,479,716 UART: [idev] CDI.KEYID = 6
1,480,076 UART: [idev] SUBJECT.KEYID = 7
1,480,500 UART: [idev] UDS.KEYID = 0
1,480,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,482 UART: [idev] Erasing UDS.KEYID = 0
1,504,736 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,326 UART: [idev] --
1,514,227 UART: [ldev] ++
1,514,395 UART: [ldev] CDI.KEYID = 6
1,514,758 UART: [ldev] SUBJECT.KEYID = 5
1,515,184 UART: [ldev] AUTHORITY.KEYID = 7
1,515,647 UART: [ldev] FE.KEYID = 1
1,520,775 UART: [ldev] Erasing FE.KEYID = 1
1,545,816 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,108 UART: [ldev] --
1,585,543 UART: [fwproc] Waiting for Commands...
1,586,252 UART: [fwproc] Received command 0x46574c44
1,587,043 UART: [fwproc] Received Image of size 114168 bytes
3,864,480 UART: ROM Fatal Error: 0x000B0038
3,865,637 >>> mbox cmd response: failed
3,865,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,643 >>> mbox cmd response: failed
3,865,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,628 UART: [state] LifecycleState = Unprovisioned
85,283 UART: [state] DebugLocked = No
85,813 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,461 UART: [kat] SHA2-256
881,392 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,507 UART: [kat] ++
885,659 UART: [kat] sha1
889,913 UART: [kat] SHA2-256
891,851 UART: [kat] SHA2-384
894,448 UART: [kat] SHA2-512-ACC
896,349 UART: [kat] ECC-384
901,828 UART: [kat] HMAC-384Kdf
906,486 UART: [kat] LMS
1,474,682 UART: [kat] --
1,475,533 UART: [cold-reset] ++
1,476,101 UART: [fht] Storing FHT @ 0x50003400
1,478,820 UART: [idev] ++
1,478,988 UART: [idev] CDI.KEYID = 6
1,479,348 UART: [idev] SUBJECT.KEYID = 7
1,479,772 UART: [idev] UDS.KEYID = 0
1,480,117 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,514 UART: [idev] Erasing UDS.KEYID = 0
1,503,968 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,378 UART: [idev] --
1,513,371 UART: [ldev] ++
1,513,539 UART: [ldev] CDI.KEYID = 6
1,513,902 UART: [ldev] SUBJECT.KEYID = 5
1,514,328 UART: [ldev] AUTHORITY.KEYID = 7
1,514,791 UART: [ldev] FE.KEYID = 1
1,519,879 UART: [ldev] Erasing FE.KEYID = 1
1,545,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,184 UART: [ldev] --
1,584,691 UART: [fwproc] Waiting for Commands...
1,585,496 UART: [fwproc] Received command 0x46574c44
1,586,287 UART: [fwproc] Received Image of size 114168 bytes
2,882,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,908,768 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,073,689 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,855 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,907,703 >>> mbox cmd response: failed
3,907,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,907,709 >>> mbox cmd response: failed
3,907,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,907,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,131 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,889 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,174 UART: [kat] SHA2-256
882,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,220 UART: [kat] ++
886,372 UART: [kat] sha1
890,638 UART: [kat] SHA2-256
892,576 UART: [kat] SHA2-384
895,143 UART: [kat] SHA2-512-ACC
897,044 UART: [kat] ECC-384
902,625 UART: [kat] HMAC-384Kdf
907,265 UART: [kat] LMS
1,475,461 UART: [kat] --
1,476,222 UART: [cold-reset] ++
1,476,756 UART: [fht] Storing FHT @ 0x50003400
1,479,449 UART: [idev] ++
1,479,617 UART: [idev] CDI.KEYID = 6
1,479,977 UART: [idev] SUBJECT.KEYID = 7
1,480,401 UART: [idev] UDS.KEYID = 0
1,480,746 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,217 UART: [idev] Erasing UDS.KEYID = 0
1,505,001 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,783 UART: [idev] --
1,514,808 UART: [ldev] ++
1,514,976 UART: [ldev] CDI.KEYID = 6
1,515,339 UART: [ldev] SUBJECT.KEYID = 5
1,515,765 UART: [ldev] AUTHORITY.KEYID = 7
1,516,228 UART: [ldev] FE.KEYID = 1
1,521,730 UART: [ldev] Erasing FE.KEYID = 1
1,546,513 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,141 UART: [ldev] --
1,585,568 UART: [fwproc] Waiting for Commands...
1,586,305 UART: [fwproc] Received command 0x46574c44
1,587,096 UART: [fwproc] Received Image of size 114168 bytes
3,864,369 UART: ROM Fatal Error: 0x000B0038
3,865,526 >>> mbox cmd response: failed
3,865,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,532 >>> mbox cmd response: failed
3,865,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,865,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,846 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,786 UART: [kat] SHA2-256
892,724 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
902,917 UART: [kat] HMAC-384Kdf
907,441 UART: [kat] LMS
1,475,637 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,346 UART: [fht] Storing FHT @ 0x50003400
1,480,035 UART: [idev] ++
1,480,203 UART: [idev] CDI.KEYID = 6
1,480,563 UART: [idev] SUBJECT.KEYID = 7
1,480,987 UART: [idev] UDS.KEYID = 0
1,481,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,777 UART: [idev] Erasing UDS.KEYID = 0
1,505,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,155 UART: [idev] --
1,515,270 UART: [ldev] ++
1,515,438 UART: [ldev] CDI.KEYID = 6
1,515,801 UART: [ldev] SUBJECT.KEYID = 5
1,516,227 UART: [ldev] AUTHORITY.KEYID = 7
1,516,690 UART: [ldev] FE.KEYID = 1
1,522,022 UART: [ldev] Erasing FE.KEYID = 1
1,547,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,491 UART: [ldev] --
1,585,902 UART: [fwproc] Waiting for Commands...
1,586,579 UART: [fwproc] Received command 0x46574c44
1,587,370 UART: [fwproc] Received Image of size 114168 bytes
2,883,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,595 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,947 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,614 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,983,458 >>> mbox cmd response: failed
3,983,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,983,464 >>> mbox cmd response: failed
3,983,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,983,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,096 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,702 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
893,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,215 UART: [kat] ++
897,367 UART: [kat] sha1
901,537 UART: [kat] SHA2-256
903,477 UART: [kat] SHA2-384
906,104 UART: [kat] SHA2-512-ACC
908,005 UART: [kat] ECC-384
917,400 UART: [kat] HMAC-384Kdf
922,130 UART: [kat] LMS
1,170,458 UART: [kat] --
1,171,403 UART: [cold-reset] ++
1,171,909 UART: [fht] FHT @ 0x50003400
1,174,318 UART: [idev] ++
1,174,486 UART: [idev] CDI.KEYID = 6
1,174,846 UART: [idev] SUBJECT.KEYID = 7
1,175,270 UART: [idev] UDS.KEYID = 0
1,175,615 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,166 UART: [idev] Erasing UDS.KEYID = 0
1,199,805 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,884 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,215,827 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,661 UART: [ldev] --
1,281,064 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x46574c44
1,282,610 UART: [fwproc] Recv'd Img size: 114168 bytes
1,858,270 UART: ROM Fatal Error: 0x000B0038
1,859,427 >>> mbox cmd response: failed
1,859,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,859,433 >>> mbox cmd response: failed
1,859,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,859,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,635 UART: [kat] SHA2-256
903,575 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,056 UART: [kat] HMAC-384Kdf
922,722 UART: [kat] LMS
1,171,050 UART: [kat] --
1,172,005 UART: [cold-reset] ++
1,172,465 UART: [fht] FHT @ 0x50003400
1,175,196 UART: [idev] ++
1,175,364 UART: [idev] CDI.KEYID = 6
1,175,724 UART: [idev] SUBJECT.KEYID = 7
1,176,148 UART: [idev] UDS.KEYID = 0
1,176,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,018 UART: [idev] Erasing UDS.KEYID = 0
1,201,315 UART: [idev] Sha1 KeyId Algorithm
1,209,765 UART: [idev] --
1,210,895 UART: [ldev] ++
1,211,063 UART: [ldev] CDI.KEYID = 6
1,211,426 UART: [ldev] SUBJECT.KEYID = 5
1,211,852 UART: [ldev] AUTHORITY.KEYID = 7
1,212,315 UART: [ldev] FE.KEYID = 1
1,217,575 UART: [ldev] Erasing FE.KEYID = 1
1,243,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,267 UART: [ldev] --
1,282,774 UART: [fwproc] Wait for Commands...
1,283,402 UART: [fwproc] Recv command 0x46574c44
1,284,130 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,068 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,730,550 >>> mbox cmd response: failed
1,730,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,730,556 >>> mbox cmd response: failed
1,730,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,730,562 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,227 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,605 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
893,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,010 UART: [kat] ++
898,162 UART: [kat] sha1
902,404 UART: [kat] SHA2-256
904,344 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,851 UART: [kat] HMAC-384Kdf
923,551 UART: [kat] LMS
1,171,879 UART: [kat] --
1,172,678 UART: [cold-reset] ++
1,173,186 UART: [fht] FHT @ 0x50003400
1,175,879 UART: [idev] ++
1,176,047 UART: [idev] CDI.KEYID = 6
1,176,407 UART: [idev] SUBJECT.KEYID = 7
1,176,831 UART: [idev] UDS.KEYID = 0
1,177,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,857 UART: [idev] Erasing UDS.KEYID = 0
1,202,168 UART: [idev] Sha1 KeyId Algorithm
1,210,588 UART: [idev] --
1,211,764 UART: [ldev] ++
1,211,932 UART: [ldev] CDI.KEYID = 6
1,212,295 UART: [ldev] SUBJECT.KEYID = 5
1,212,721 UART: [ldev] AUTHORITY.KEYID = 7
1,213,184 UART: [ldev] FE.KEYID = 1
1,218,366 UART: [ldev] Erasing FE.KEYID = 1
1,244,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,096 UART: [ldev] --
1,284,463 UART: [fwproc] Wait for Commands...
1,285,147 UART: [fwproc] Recv command 0x46574c44
1,285,875 UART: [fwproc] Recv'd Img size: 114168 bytes
1,857,687 UART: ROM Fatal Error: 0x000B0038
1,858,844 >>> mbox cmd response: failed
1,858,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,850 >>> mbox cmd response: failed
1,858,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,858,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,513 UART: [kat] SHA2-512-ACC
908,414 UART: [kat] ECC-384
918,513 UART: [kat] HMAC-384Kdf
923,149 UART: [kat] LMS
1,171,477 UART: [kat] --
1,172,222 UART: [cold-reset] ++
1,172,668 UART: [fht] FHT @ 0x50003400
1,175,253 UART: [idev] ++
1,175,421 UART: [idev] CDI.KEYID = 6
1,175,781 UART: [idev] SUBJECT.KEYID = 7
1,176,205 UART: [idev] UDS.KEYID = 0
1,176,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,321 UART: [idev] Erasing UDS.KEYID = 0
1,201,268 UART: [idev] Sha1 KeyId Algorithm
1,209,790 UART: [idev] --
1,210,840 UART: [ldev] ++
1,211,008 UART: [ldev] CDI.KEYID = 6
1,211,371 UART: [ldev] SUBJECT.KEYID = 5
1,211,797 UART: [ldev] AUTHORITY.KEYID = 7
1,212,260 UART: [ldev] FE.KEYID = 1
1,217,476 UART: [ldev] Erasing FE.KEYID = 1
1,244,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,036 UART: [ldev] --
1,283,471 UART: [fwproc] Wait for Commands...
1,284,041 UART: [fwproc] Recv command 0x46574c44
1,284,769 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,919 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,716,495 >>> mbox cmd response: failed
1,716,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,716,501 >>> mbox cmd response: failed
1,716,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,716,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,590 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,742 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,619 UART: [kat] ++
895,771 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,058 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,170,091 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,173,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,198,543 UART: [idev] Sha1 KeyId Algorithm
1,207,257 UART: [idev] --
1,208,224 UART: [ldev] ++
1,208,392 UART: [ldev] CDI.KEYID = 6
1,208,756 UART: [ldev] SUBJECT.KEYID = 5
1,209,183 UART: [ldev] AUTHORITY.KEYID = 7
1,209,646 UART: [ldev] FE.KEYID = 1
1,214,896 UART: [ldev] Erasing FE.KEYID = 1
1,240,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,430 UART: [ldev] --
1,279,806 UART: [fwproc] Wait for Commands...
1,280,401 UART: [fwproc] Recv command 0x46574c44
1,281,134 UART: [fwproc] Recv'd Img size: 114168 bytes
1,855,007 UART: ROM Fatal Error: 0x000B0038
1,856,164 >>> mbox cmd response: failed
1,856,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,170 >>> mbox cmd response: failed
1,856,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,856,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,763 UART: [kat] SHA2-256
901,703 UART: [kat] SHA2-384
904,420 UART: [kat] SHA2-512-ACC
906,321 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,670 UART: [kat] LMS
1,168,982 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,309 UART: [idev] Erasing UDS.KEYID = 0
1,199,801 UART: [idev] Sha1 KeyId Algorithm
1,208,529 UART: [idev] --
1,209,610 UART: [ldev] ++
1,209,778 UART: [ldev] CDI.KEYID = 6
1,210,142 UART: [ldev] SUBJECT.KEYID = 5
1,210,569 UART: [ldev] AUTHORITY.KEYID = 7
1,211,032 UART: [ldev] FE.KEYID = 1
1,216,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,724 UART: [ldev] --
1,281,064 UART: [fwproc] Wait for Commands...
1,281,761 UART: [fwproc] Recv command 0x46574c44
1,282,494 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,184 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,704 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,488 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,718,449 >>> mbox cmd response: failed
1,718,449 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,718,455 >>> mbox cmd response: failed
1,718,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,718,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,746 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,908 UART: [kat] ++
896,060 UART: [kat] sha1
900,402 UART: [kat] SHA2-256
902,342 UART: [kat] SHA2-384
905,305 UART: [kat] SHA2-512-ACC
907,206 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,683 UART: [kat] LMS
1,169,995 UART: [kat] --
1,171,080 UART: [cold-reset] ++
1,171,466 UART: [fht] FHT @ 0x50003400
1,174,238 UART: [idev] ++
1,174,406 UART: [idev] CDI.KEYID = 6
1,174,767 UART: [idev] SUBJECT.KEYID = 7
1,175,192 UART: [idev] UDS.KEYID = 0
1,175,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,934 UART: [idev] --
1,210,141 UART: [ldev] ++
1,210,309 UART: [ldev] CDI.KEYID = 6
1,210,673 UART: [ldev] SUBJECT.KEYID = 5
1,211,100 UART: [ldev] AUTHORITY.KEYID = 7
1,211,563 UART: [ldev] FE.KEYID = 1
1,216,847 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,581 UART: [fwproc] Wait for Commands...
1,283,346 UART: [fwproc] Recv command 0x46574c44
1,284,079 UART: [fwproc] Recv'd Img size: 114168 bytes
1,869,423 UART: ROM Fatal Error: 0x000B0038
1,870,580 >>> mbox cmd response: failed
1,870,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,586 >>> mbox cmd response: failed
1,870,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,239 UART: [kat] SHA2-512-ACC
906,140 UART: [kat] ECC-384
915,613 UART: [kat] HMAC-384Kdf
920,127 UART: [kat] LMS
1,168,439 UART: [kat] --
1,169,506 UART: [cold-reset] ++
1,169,944 UART: [fht] FHT @ 0x50003400
1,172,566 UART: [idev] ++
1,172,734 UART: [idev] CDI.KEYID = 6
1,173,095 UART: [idev] SUBJECT.KEYID = 7
1,173,520 UART: [idev] UDS.KEYID = 0
1,173,866 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,994 UART: [idev] Erasing UDS.KEYID = 0
1,198,424 UART: [idev] Sha1 KeyId Algorithm
1,207,254 UART: [idev] --
1,208,297 UART: [ldev] ++
1,208,465 UART: [ldev] CDI.KEYID = 6
1,208,829 UART: [ldev] SUBJECT.KEYID = 5
1,209,256 UART: [ldev] AUTHORITY.KEYID = 7
1,209,719 UART: [ldev] FE.KEYID = 1
1,215,023 UART: [ldev] Erasing FE.KEYID = 1
1,241,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,401 UART: [ldev] --
1,280,693 UART: [fwproc] Wait for Commands...
1,281,308 UART: [fwproc] Recv command 0x46574c44
1,282,041 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,069 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,875 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,715,156 >>> mbox cmd response: failed
1,715,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,715,162 >>> mbox cmd response: failed
1,715,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,715,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,515 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,441 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
4,879,422 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,859,271 >>> mbox cmd response: failed
18,860,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,860,418 >>> mbox cmd response: failed
18,860,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,860,984 >>> mbox cmd response: failed
Initializing fuses
2,050,862 writing to cptra_bootfsm_go
6,912,770 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,501,196 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
4,879,616 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,905,280 >>> mbox cmd response: failed
18,906,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,906,364 >>> mbox cmd response: failed
18,906,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,906,929 >>> mbox cmd response: failed
Initializing fuses
2,054,144 writing to cptra_bootfsm_go
6,916,472 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,482,418 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
5,187,949 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,978,987 >>> mbox cmd response: failed
18,979,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,980,079 >>> mbox cmd response: failed
18,980,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,980,647 >>> mbox cmd response: failed
Initializing fuses
2,056,011 writing to cptra_bootfsm_go
7,240,946 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,675,882 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
5,186,066 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,967,839 >>> mbox cmd response: failed
18,968,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,968,820 >>> mbox cmd response: failed
18,969,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,969,440 >>> mbox cmd response: failed
Initializing fuses
2,056,222 writing to cptra_bootfsm_go
7,231,397 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,652,727 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
3,480,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,965,052 >>> mbox cmd response: failed
12,965,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,966,208 >>> mbox cmd response: failed
12,966,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,966,800 >>> mbox cmd response: failed
Initializing fuses
2,049,048 writing to cptra_bootfsm_go
5,532,256 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,349,084 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,485,166 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,956,513 >>> mbox cmd response: failed
12,957,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,957,474 >>> mbox cmd response: failed
12,957,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,958,048 >>> mbox cmd response: failed
Initializing fuses
2,047,709 writing to cptra_bootfsm_go
5,482,483 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,291,922 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,777,357 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,160,384 >>> mbox cmd response: failed
13,160,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,311 >>> mbox cmd response: failed
13,161,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,870 >>> mbox cmd response: failed
Initializing fuses
2,048,822 writing to cptra_bootfsm_go
10,485,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,211,866 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,777,394 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,176,046 >>> mbox cmd response: failed
13,176,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,019 >>> mbox cmd response: failed
13,177,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,579 >>> mbox cmd response: failed
Initializing fuses
2,053,881 writing to cptra_bootfsm_go
10,482,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,199,582 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,441,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,916,109 >>> mbox cmd response: failed
12,916,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,248 >>> mbox cmd response: failed
12,917,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,917,812 >>> mbox cmd response: failed
Initializing fuses
2,052,732 writing to cptra_bootfsm_go
5,514,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,377,318 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,447,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,939,731 >>> mbox cmd response: failed
12,940,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,940,755 >>> mbox cmd response: failed
12,941,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,941,316 >>> mbox cmd response: failed
Initializing fuses
2,054,023 writing to cptra_bootfsm_go
5,495,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,315,559 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,780,495 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,159,848 >>> mbox cmd response: failed
13,160,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,808 >>> mbox cmd response: failed
13,161,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,376 >>> mbox cmd response: failed
Initializing fuses
2,054,106 writing to cptra_bootfsm_go
10,493,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,205,105 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,784,772 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,160,088 >>> mbox cmd response: failed
13,160,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,211 >>> mbox cmd response: failed
13,161,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,775 >>> mbox cmd response: failed
Initializing fuses
2,052,710 writing to cptra_bootfsm_go
10,480,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,199,301 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,195 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,461,811 >>> mbox cmd response: failed
1,461,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,817 >>> mbox cmd response: failed
1,461,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,475 UART: [kat] SHA2-256
881,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,521 UART: [kat] ++
885,673 UART: [kat] sha1
889,997 UART: [kat] SHA2-256
891,935 UART: [kat] SHA2-384
894,684 UART: [kat] SHA2-512-ACC
896,585 UART: [kat] ECC-384
902,224 UART: [kat] HMAC-384Kdf
906,848 UART: [kat] LMS
1,475,044 UART: [kat] --
1,475,865 UART: [cold-reset] ++
1,476,281 UART: [fht] Storing FHT @ 0x50003400
1,479,160 UART: [idev] ++
1,479,328 UART: [idev] CDI.KEYID = 6
1,479,688 UART: [idev] SUBJECT.KEYID = 7
1,480,112 UART: [idev] UDS.KEYID = 0
1,480,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,226 UART: [idev] Erasing UDS.KEYID = 0
1,504,786 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,592 UART: [idev] --
1,514,653 UART: [ldev] ++
1,514,821 UART: [ldev] CDI.KEYID = 6
1,515,184 UART: [ldev] SUBJECT.KEYID = 5
1,515,610 UART: [ldev] AUTHORITY.KEYID = 7
1,516,073 UART: [ldev] FE.KEYID = 1
1,521,423 UART: [ldev] Erasing FE.KEYID = 1
1,546,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,412 UART: [ldev] --
1,585,721 UART: [fwproc] Waiting for Commands...
1,586,580 UART: [fwproc] Received command 0x46574c44
1,587,371 UART: [fwproc] Received Image of size 114168 bytes
2,883,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,120 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,472 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,209 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,479,836 >>> mbox cmd response: failed
1,479,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,842 >>> mbox cmd response: failed
1,479,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,915 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,545 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,470,441 >>> mbox cmd response: failed
1,470,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,447 >>> mbox cmd response: failed
1,470,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
890,636 UART: [kat] SHA2-256
892,574 UART: [kat] SHA2-384
895,193 UART: [kat] SHA2-512-ACC
897,094 UART: [kat] ECC-384
902,671 UART: [kat] HMAC-384Kdf
907,323 UART: [kat] LMS
1,475,519 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,948 UART: [fht] Storing FHT @ 0x50003400
1,479,879 UART: [idev] ++
1,480,047 UART: [idev] CDI.KEYID = 6
1,480,407 UART: [idev] SUBJECT.KEYID = 7
1,480,831 UART: [idev] UDS.KEYID = 0
1,481,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,127 UART: [idev] Erasing UDS.KEYID = 0
1,506,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,841 UART: [idev] --
1,515,668 UART: [ldev] ++
1,515,836 UART: [ldev] CDI.KEYID = 6
1,516,199 UART: [ldev] SUBJECT.KEYID = 5
1,516,625 UART: [ldev] AUTHORITY.KEYID = 7
1,517,088 UART: [ldev] FE.KEYID = 1
1,522,424 UART: [ldev] Erasing FE.KEYID = 1
1,547,687 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,675 UART: [ldev] --
1,587,104 UART: [fwproc] Waiting for Commands...
1,587,727 UART: [fwproc] Received command 0x46574c44
1,588,518 UART: [fwproc] Received Image of size 114168 bytes
2,884,477 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,379 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,452 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,468,582 >>> mbox cmd response: failed
1,468,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,588 >>> mbox cmd response: failed
1,468,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,228 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,470,643 >>> mbox cmd response: failed
1,470,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,649 >>> mbox cmd response: failed
1,470,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,470,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,720 UART: [state] LifecycleState = Unprovisioned
86,375 UART: [state] DebugLocked = No
87,019 UART: [state] WD Timer not started. Device not locked for debugging
88,182 UART: [kat] SHA2-256
893,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,957 UART: [kat] ++
898,109 UART: [kat] sha1
902,549 UART: [kat] SHA2-256
904,489 UART: [kat] SHA2-384
907,418 UART: [kat] SHA2-512-ACC
909,319 UART: [kat] ECC-384
918,784 UART: [kat] HMAC-384Kdf
923,258 UART: [kat] LMS
1,171,586 UART: [kat] --
1,172,513 UART: [cold-reset] ++
1,172,855 UART: [fht] FHT @ 0x50003400
1,175,588 UART: [idev] ++
1,175,756 UART: [idev] CDI.KEYID = 6
1,176,116 UART: [idev] SUBJECT.KEYID = 7
1,176,540 UART: [idev] UDS.KEYID = 0
1,176,885 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,686 UART: [idev] Erasing UDS.KEYID = 0
1,201,905 UART: [idev] Sha1 KeyId Algorithm
1,210,489 UART: [idev] --
1,211,543 UART: [ldev] ++
1,211,711 UART: [ldev] CDI.KEYID = 6
1,212,074 UART: [ldev] SUBJECT.KEYID = 5
1,212,500 UART: [ldev] AUTHORITY.KEYID = 7
1,212,963 UART: [ldev] FE.KEYID = 1
1,217,897 UART: [ldev] Erasing FE.KEYID = 1
1,244,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,217 UART: [ldev] --
1,283,532 UART: [fwproc] Wait for Commands...
1,284,292 UART: [fwproc] Recv command 0x46574c44
1,285,020 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,443 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,340 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,474,745 >>> mbox cmd response: failed
1,474,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,751 >>> mbox cmd response: failed
1,474,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,715 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,245 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,458 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,466,918 >>> mbox cmd response: failed
1,466,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,924 >>> mbox cmd response: failed
1,466,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Unprovisioned
85,544 UART: [state] DebugLocked = No
86,166 UART: [state] WD Timer not started. Device not locked for debugging
87,505 UART: [kat] SHA2-256
893,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,280 UART: [kat] ++
897,432 UART: [kat] sha1
901,588 UART: [kat] SHA2-256
903,528 UART: [kat] SHA2-384
906,235 UART: [kat] SHA2-512-ACC
908,136 UART: [kat] ECC-384
917,783 UART: [kat] HMAC-384Kdf
922,537 UART: [kat] LMS
1,170,865 UART: [kat] --
1,171,932 UART: [cold-reset] ++
1,172,472 UART: [fht] FHT @ 0x50003400
1,175,161 UART: [idev] ++
1,175,329 UART: [idev] CDI.KEYID = 6
1,175,689 UART: [idev] SUBJECT.KEYID = 7
1,176,113 UART: [idev] UDS.KEYID = 0
1,176,458 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,039 UART: [idev] Erasing UDS.KEYID = 0
1,201,838 UART: [idev] Sha1 KeyId Algorithm
1,210,342 UART: [idev] --
1,211,236 UART: [ldev] ++
1,211,404 UART: [ldev] CDI.KEYID = 6
1,211,767 UART: [ldev] SUBJECT.KEYID = 5
1,212,193 UART: [ldev] AUTHORITY.KEYID = 7
1,212,656 UART: [ldev] FE.KEYID = 1
1,218,064 UART: [ldev] Erasing FE.KEYID = 1
1,244,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,448 UART: [ldev] --
1,283,799 UART: [fwproc] Wait for Commands...
1,284,403 UART: [fwproc] Recv command 0x46574c44
1,285,131 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,396 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,700 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,375 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,700 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,473,739 >>> mbox cmd response: failed
1,473,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,745 >>> mbox cmd response: failed
1,473,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,836 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,580 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,475,672 >>> mbox cmd response: failed
1,475,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,678 >>> mbox cmd response: failed
1,475,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,475,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,269 UART: [kat] ++
895,421 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
915,612 UART: [kat] HMAC-384Kdf
920,414 UART: [kat] LMS
1,168,726 UART: [kat] --
1,169,411 UART: [cold-reset] ++
1,169,953 UART: [fht] FHT @ 0x50003400
1,172,675 UART: [idev] ++
1,172,843 UART: [idev] CDI.KEYID = 6
1,173,204 UART: [idev] SUBJECT.KEYID = 7
1,173,629 UART: [idev] UDS.KEYID = 0
1,173,975 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,245 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,215,064 UART: [ldev] Erasing FE.KEYID = 1
1,241,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,934 UART: [ldev] --
1,280,232 UART: [fwproc] Wait for Commands...
1,281,007 UART: [fwproc] Recv command 0x46574c44
1,281,740 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,549 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,858 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,402 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,472,639 >>> mbox cmd response: failed
1,472,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,645 >>> mbox cmd response: failed
1,472,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,472,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,904 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,477,891 >>> mbox cmd response: failed
1,477,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,897 >>> mbox cmd response: failed
1,477,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,903 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,926 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,834 UART: [kat] ++
895,986 UART: [kat] sha1
900,376 UART: [kat] SHA2-256
902,316 UART: [kat] SHA2-384
904,825 UART: [kat] SHA2-512-ACC
906,726 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,174,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,502 UART: [idev] Erasing UDS.KEYID = 0
1,198,944 UART: [idev] Sha1 KeyId Algorithm
1,208,024 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,007 UART: [ldev] --
1,281,511 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,897 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,197 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,853 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,418 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,476,107 >>> mbox cmd response: failed
1,476,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,113 >>> mbox cmd response: failed
1,476,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,287 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
4,873,932 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,982,194 >>> mbox cmd response: failed
13,982,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,983,256 >>> mbox cmd response: failed
13,983,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,983,820 >>> mbox cmd response: failed
Initializing fuses
2,056,164 writing to cptra_bootfsm_go
6,927,190 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,473,381 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,878,365 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,993,931 >>> mbox cmd response: failed
13,994,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,994,863 >>> mbox cmd response: failed
13,995,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,995,436 >>> mbox cmd response: failed
Initializing fuses
2,055,671 writing to cptra_bootfsm_go
6,921,998 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,498,721 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,263 writing to cptra_bootfsm_go
5,190,807 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,164,008 >>> mbox cmd response: failed
14,164,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,164,962 >>> mbox cmd response: failed
14,165,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,165,516 >>> mbox cmd response: failed
Initializing fuses
2,056,389 writing to cptra_bootfsm_go
10,923,598 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,357,963 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,633 writing to cptra_bootfsm_go
5,195,929 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,167,185 >>> mbox cmd response: failed
14,167,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,168,103 >>> mbox cmd response: failed
14,168,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,168,661 >>> mbox cmd response: failed
Initializing fuses
2,056,821 writing to cptra_bootfsm_go
10,885,276 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,319,557 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,464,400 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,419,181 >>> mbox cmd response: failed
10,419,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,420,292 >>> mbox cmd response: failed
10,420,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,420,854 >>> mbox cmd response: failed
Initializing fuses
2,054,712 writing to cptra_bootfsm_go
5,484,181 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,351,671 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,473,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,438,665 >>> mbox cmd response: failed
10,439,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,439,690 >>> mbox cmd response: failed
10,439,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,440,246 >>> mbox cmd response: failed
Initializing fuses
2,060,387 writing to cptra_bootfsm_go
5,513,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,338,316 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,779,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,641,130 >>> mbox cmd response: failed
10,641,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,642,247 >>> mbox cmd response: failed
10,642,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,642,818 >>> mbox cmd response: failed
Initializing fuses
2,056,384 writing to cptra_bootfsm_go
13,013,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,736,539 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,782,123 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,625,502 >>> mbox cmd response: failed
10,626,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,626,447 >>> mbox cmd response: failed
10,626,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,626,999 >>> mbox cmd response: failed
Initializing fuses
2,057,395 writing to cptra_bootfsm_go
13,033,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,766,853 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,429,780 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,399,709 >>> mbox cmd response: failed
10,400,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,400,656 >>> mbox cmd response: failed
10,400,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,401,226 >>> mbox cmd response: failed
Initializing fuses
2,056,784 writing to cptra_bootfsm_go
5,526,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,335,724 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,465,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,406,862 >>> mbox cmd response: failed
10,407,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,407,769 >>> mbox cmd response: failed
10,408,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,408,331 >>> mbox cmd response: failed
Initializing fuses
2,055,897 writing to cptra_bootfsm_go
5,517,632 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,306,093 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,786,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,623,137 >>> mbox cmd response: failed
10,624,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,624,412 >>> mbox cmd response: failed
10,624,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,624,979 >>> mbox cmd response: failed
Initializing fuses
2,057,549 writing to cptra_bootfsm_go
13,027,759 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,763,115 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,794,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,643,173 >>> mbox cmd response: failed
10,643,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,644,092 >>> mbox cmd response: failed
10,644,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,644,650 >>> mbox cmd response: failed
Initializing fuses
2,062,163 writing to cptra_bootfsm_go
13,001,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,718,979 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,581 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,944 >>> mbox cmd response: failed
1,179,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,950 >>> mbox cmd response: failed
1,179,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,793 UART: [kat] SHA2-256
881,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,839 UART: [kat] ++
885,991 UART: [kat] sha1
890,197 UART: [kat] SHA2-256
892,135 UART: [kat] SHA2-384
894,776 UART: [kat] SHA2-512-ACC
896,677 UART: [kat] ECC-384
902,182 UART: [kat] HMAC-384Kdf
906,790 UART: [kat] LMS
1,474,986 UART: [kat] --
1,475,825 UART: [cold-reset] ++
1,476,231 UART: [fht] Storing FHT @ 0x50003400
1,479,064 UART: [idev] ++
1,479,232 UART: [idev] CDI.KEYID = 6
1,479,592 UART: [idev] SUBJECT.KEYID = 7
1,480,016 UART: [idev] UDS.KEYID = 0
1,480,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,966 UART: [idev] Erasing UDS.KEYID = 0
1,504,660 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,350 UART: [idev] --
1,514,385 UART: [ldev] ++
1,514,553 UART: [ldev] CDI.KEYID = 6
1,514,916 UART: [ldev] SUBJECT.KEYID = 5
1,515,342 UART: [ldev] AUTHORITY.KEYID = 7
1,515,805 UART: [ldev] FE.KEYID = 1
1,520,917 UART: [ldev] Erasing FE.KEYID = 1
1,546,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,090 UART: [ldev] --
1,585,497 UART: [fwproc] Waiting for Commands...
1,586,278 UART: [fwproc] Received command 0x46574c44
1,587,069 UART: [fwproc] Received Image of size 114168 bytes
2,883,962 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,034 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,386 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,935 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,572 >>> mbox cmd response: failed
1,179,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,578 >>> mbox cmd response: failed
1,179,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,915 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,728 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,919 >>> mbox cmd response: failed
1,179,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,925 >>> mbox cmd response: failed
1,179,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,830 UART: [kat] SHA2-256
892,768 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,825 UART: [kat] LMS
1,476,021 UART: [kat] --
1,477,076 UART: [cold-reset] ++
1,477,484 UART: [fht] Storing FHT @ 0x50003400
1,480,255 UART: [idev] ++
1,480,423 UART: [idev] CDI.KEYID = 6
1,480,783 UART: [idev] SUBJECT.KEYID = 7
1,481,207 UART: [idev] UDS.KEYID = 0
1,481,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,715 UART: [idev] Erasing UDS.KEYID = 0
1,506,261 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,807 UART: [idev] --
1,515,832 UART: [ldev] ++
1,516,000 UART: [ldev] CDI.KEYID = 6
1,516,363 UART: [ldev] SUBJECT.KEYID = 5
1,516,789 UART: [ldev] AUTHORITY.KEYID = 7
1,517,252 UART: [ldev] FE.KEYID = 1
1,522,378 UART: [ldev] Erasing FE.KEYID = 1
1,547,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,107 UART: [ldev] --
1,587,414 UART: [fwproc] Waiting for Commands...
1,588,063 UART: [fwproc] Received command 0x46574c44
1,588,854 UART: [fwproc] Received Image of size 114168 bytes
2,886,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,219 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,180 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,847 >>> mbox cmd response: failed
1,179,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,853 >>> mbox cmd response: failed
1,179,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,242 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,828 >>> mbox cmd response: failed
1,178,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,834 >>> mbox cmd response: failed
1,178,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
893,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,413 UART: [kat] ++
897,565 UART: [kat] sha1
901,911 UART: [kat] SHA2-256
903,851 UART: [kat] SHA2-384
906,578 UART: [kat] SHA2-512-ACC
908,479 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
923,076 UART: [kat] LMS
1,171,404 UART: [kat] --
1,172,269 UART: [cold-reset] ++
1,172,755 UART: [fht] FHT @ 0x50003400
1,175,586 UART: [idev] ++
1,175,754 UART: [idev] CDI.KEYID = 6
1,176,114 UART: [idev] SUBJECT.KEYID = 7
1,176,538 UART: [idev] UDS.KEYID = 0
1,176,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,772 UART: [idev] Erasing UDS.KEYID = 0
1,201,633 UART: [idev] Sha1 KeyId Algorithm
1,210,089 UART: [idev] --
1,211,105 UART: [ldev] ++
1,211,273 UART: [ldev] CDI.KEYID = 6
1,211,636 UART: [ldev] SUBJECT.KEYID = 5
1,212,062 UART: [ldev] AUTHORITY.KEYID = 7
1,212,525 UART: [ldev] FE.KEYID = 1
1,217,595 UART: [ldev] Erasing FE.KEYID = 1
1,243,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,165 UART: [ldev] --
1,282,428 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,896 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,286 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,448 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,177,994 >>> mbox cmd response: failed
1,177,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,000 >>> mbox cmd response: failed
1,178,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,531 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,847 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,363 >>> mbox cmd response: failed
1,180,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,369 >>> mbox cmd response: failed
1,180,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,375 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,052 UART: [state] WD Timer not started. Device not locked for debugging
88,407 UART: [kat] SHA2-256
894,057 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,182 UART: [kat] ++
898,334 UART: [kat] sha1
902,574 UART: [kat] SHA2-256
904,514 UART: [kat] SHA2-384
907,315 UART: [kat] SHA2-512-ACC
909,216 UART: [kat] ECC-384
919,051 UART: [kat] HMAC-384Kdf
923,603 UART: [kat] LMS
1,171,931 UART: [kat] --
1,172,704 UART: [cold-reset] ++
1,173,128 UART: [fht] FHT @ 0x50003400
1,175,779 UART: [idev] ++
1,175,947 UART: [idev] CDI.KEYID = 6
1,176,307 UART: [idev] SUBJECT.KEYID = 7
1,176,731 UART: [idev] UDS.KEYID = 0
1,177,076 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,503 UART: [idev] Erasing UDS.KEYID = 0
1,201,906 UART: [idev] Sha1 KeyId Algorithm
1,210,268 UART: [idev] --
1,211,472 UART: [ldev] ++
1,211,640 UART: [ldev] CDI.KEYID = 6
1,212,003 UART: [ldev] SUBJECT.KEYID = 5
1,212,429 UART: [ldev] AUTHORITY.KEYID = 7
1,212,892 UART: [ldev] FE.KEYID = 1
1,218,450 UART: [ldev] Erasing FE.KEYID = 1
1,245,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,054 UART: [ldev] --
1,284,481 UART: [fwproc] Wait for Commands...
1,285,249 UART: [fwproc] Recv command 0x46574c44
1,285,977 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,760 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,315 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,451 >>> mbox cmd response: failed
1,179,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,457 >>> mbox cmd response: failed
1,179,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,622 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,912 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,579 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,410 >>> mbox cmd response: failed
1,178,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,416 >>> mbox cmd response: failed
1,178,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Unprovisioned
86,207 UART: [state] DebugLocked = No
86,867 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
891,626 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,353 UART: [kat] SHA2-256
902,293 UART: [kat] SHA2-384
905,008 UART: [kat] SHA2-512-ACC
906,909 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,111 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,171 UART: [idev] ++
1,173,339 UART: [idev] CDI.KEYID = 6
1,173,700 UART: [idev] SUBJECT.KEYID = 7
1,174,125 UART: [idev] UDS.KEYID = 0
1,174,471 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,407 UART: [idev] Erasing UDS.KEYID = 0
1,199,555 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,215,992 UART: [ldev] Erasing FE.KEYID = 1
1,242,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,034 UART: [ldev] --
1,281,392 UART: [fwproc] Wait for Commands...
1,282,089 UART: [fwproc] Recv command 0x46574c44
1,282,822 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,726 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,315 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,177,916 >>> mbox cmd response: failed
1,177,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,922 >>> mbox cmd response: failed
1,177,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,626 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,903 >>> mbox cmd response: failed
1,179,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,909 >>> mbox cmd response: failed
1,179,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,915 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,214 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,742 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,818 UART: [idev] ++
1,172,986 UART: [idev] CDI.KEYID = 6
1,173,347 UART: [idev] SUBJECT.KEYID = 7
1,173,772 UART: [idev] UDS.KEYID = 0
1,174,118 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,772 UART: [idev] Erasing UDS.KEYID = 0
1,198,812 UART: [idev] Sha1 KeyId Algorithm
1,207,774 UART: [idev] --
1,208,829 UART: [ldev] ++
1,208,997 UART: [ldev] CDI.KEYID = 6
1,209,361 UART: [ldev] SUBJECT.KEYID = 5
1,209,788 UART: [ldev] AUTHORITY.KEYID = 7
1,210,251 UART: [ldev] FE.KEYID = 1
1,215,739 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x46574c44
1,283,139 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,694 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,716 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,703 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,181 >>> mbox cmd response: failed
1,180,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,187 >>> mbox cmd response: failed
1,180,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,537 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
191,997 UART:
192,391 UART: Running Caliptra ROM ...
193,481 UART:
193,623 UART: [state] CFI Enabled
264,968 UART: [state] LifecycleState = Unprovisioned
266,932 UART: [state] DebugLocked = No
268,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,588 UART: [kat] SHA2-256
443,320 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,830 UART: [kat] ++
454,280 UART: [kat] sha1
466,504 UART: [kat] SHA2-256
469,190 UART: [kat] SHA2-384
476,137 UART: [kat] SHA2-512-ACC
478,477 UART: [kat] ECC-384
2,766,179 UART: [kat] HMAC-384Kdf
2,780,034 UART: [kat] LMS
3,970,297 UART: [kat] --
3,974,934 UART: [cold-reset] ++
3,976,914 UART: [fht] Storing FHT @ 0x50003400
3,989,097 UART: [idev] ++
3,989,671 UART: [idev] CDI.KEYID = 6
3,990,608 UART: [idev] SUBJECT.KEYID = 7
3,991,822 UART: [idev] UDS.KEYID = 0
3,997,462 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,141,329 UART: [idev] Erasing UDS.KEYID = 0
7,328,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,392 UART: [idev] --
7,352,867 UART: [ldev] ++
7,353,440 UART: [ldev] CDI.KEYID = 6
7,354,411 UART: [ldev] SUBJECT.KEYID = 5
7,355,630 UART: [ldev] AUTHORITY.KEYID = 7
7,356,885 UART: [ldev] FE.KEYID = 1
7,402,968 UART: [ldev] Erasing FE.KEYID = 1
10,740,060 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,532 UART: [ldev] --
13,118,858 UART: [fwproc] Waiting for Commands...
13,121,660 UART: [fwproc] Received command 0x46574c44
13,123,845 UART: [fwproc] Received Image of size 113844 bytes
13,190,755 UART: ROM Fatal Error: 0x000B0007
13,194,272 >>> mbox cmd response: failed
13,194,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,195,007 >>> mbox cmd response: failed
13,195,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,195,595 >>> mbox cmd response: failed
Initializing fuses
2,052,242 writing to cptra_bootfsm_go
2,241,565 UART:
2,241,909 UART: Running Caliptra ROM ...
2,243,012 UART:
2,243,172 UART: [state] CFI Enabled
2,298,984 UART: [state] LifecycleState = Unprovisioned
2,300,927 UART: [state] DebugLocked = No
2,302,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,306,991 UART: [kat] SHA2-256
2,476,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,487,144 UART: [kat] ++
2,487,629 UART: [kat] sha1
2,499,006 UART: [kat] SHA2-256
2,501,713 UART: [kat] SHA2-384
2,508,297 UART: [kat] SHA2-512-ACC
2,510,703 UART: [kat] ECC-384
4,804,021 UART: [kat] HMAC-384Kdf
4,833,651 UART: [kat] LMS
6,023,953 UART: [kat] --
6,029,911 UART: [cold-reset] ++
6,031,092 UART: [fht] Storing FHT @ 0x50003400
6,043,607 UART: [idev] ++
6,044,186 UART: [idev] CDI.KEYID = 6
6,045,228 UART: [idev] SUBJECT.KEYID = 7
6,046,395 UART: [idev] UDS.KEYID = 0
6,048,828 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,192,162 UART: [idev] Erasing UDS.KEYID = 0
9,379,633 UART: [idev] Using Sha1 for KeyId Algorithm
9,401,170 UART: [idev] --
9,404,841 UART: [ldev] ++
9,405,409 UART: [ldev] CDI.KEYID = 6
9,406,350 UART: [ldev] SUBJECT.KEYID = 5
9,407,624 UART: [ldev] AUTHORITY.KEYID = 7
9,408,867 UART: [ldev] FE.KEYID = 1
9,434,549 UART: [ldev] Erasing FE.KEYID = 1
12,766,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,061,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,076,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,091,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,105,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,123,366 UART: [ldev] --
15,127,448 UART: [fwproc] Waiting for Commands...
15,129,708 UART: [fwproc] Received command 0x46574c44
15,131,948 UART: [fwproc] Received Image of size 113844 bytes
19,187,131 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,262,616 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,331,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,648,252 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,791,506 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,924,174 >>> mbox cmd response: failed
12,924,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,925,318 >>> mbox cmd response: failed
12,925,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,925,882 >>> mbox cmd response: failed
Initializing fuses
2,051,088 writing to cptra_bootfsm_go
5,832,555 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,918,195 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,537 UART:
192,890 UART: Running Caliptra ROM ...
193,999 UART:
603,917 UART: [state] CFI Enabled
617,295 UART: [state] LifecycleState = Unprovisioned
619,218 UART: [state] DebugLocked = No
622,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,412 UART: [kat] SHA2-256
796,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,690 UART: [kat] ++
807,222 UART: [kat] sha1
818,695 UART: [kat] SHA2-256
821,386 UART: [kat] SHA2-384
826,658 UART: [kat] SHA2-512-ACC
829,050 UART: [kat] ECC-384
3,112,222 UART: [kat] HMAC-384Kdf
3,124,108 UART: [kat] LMS
4,314,204 UART: [kat] --
4,320,752 UART: [cold-reset] ++
4,322,585 UART: [fht] Storing FHT @ 0x50003400
4,335,259 UART: [idev] ++
4,335,830 UART: [idev] CDI.KEYID = 6
4,336,847 UART: [idev] SUBJECT.KEYID = 7
4,338,006 UART: [idev] UDS.KEYID = 0
4,343,797 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,487,012 UART: [idev] Erasing UDS.KEYID = 0
7,618,245 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,749 UART: [idev] --
7,644,125 UART: [ldev] ++
7,644,698 UART: [ldev] CDI.KEYID = 6
7,645,739 UART: [ldev] SUBJECT.KEYID = 5
7,646,846 UART: [ldev] AUTHORITY.KEYID = 7
7,648,131 UART: [ldev] FE.KEYID = 1
7,659,538 UART: [ldev] Erasing FE.KEYID = 1
10,945,611 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,699 UART: [ldev] --
13,305,100 UART: [fwproc] Waiting for Commands...
13,307,363 UART: [fwproc] Received command 0x46574c44
13,309,546 UART: [fwproc] Received Image of size 113844 bytes
13,376,562 UART: ROM Fatal Error: 0x000B0007
13,380,074 >>> mbox cmd response: failed
13,380,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,380,831 >>> mbox cmd response: failed
13,381,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,381,399 >>> mbox cmd response: failed
Initializing fuses
2,058,059 writing to cptra_bootfsm_go
2,247,361 UART:
2,247,709 UART: Running Caliptra ROM ...
2,248,847 UART:
7,088,170 UART: [state] CFI Enabled
7,101,279 UART: [state] LifecycleState = Unprovisioned
7,103,195 UART: [state] DebugLocked = No
7,104,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,109,910 UART: [kat] SHA2-256
7,279,705 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,290,204 UART: [kat] ++
7,290,692 UART: [kat] sha1
7,302,880 UART: [kat] SHA2-256
7,305,573 UART: [kat] SHA2-384
7,311,934 UART: [kat] SHA2-512-ACC
7,314,294 UART: [kat] ECC-384
9,601,172 UART: [kat] HMAC-384Kdf
9,612,988 UART: [kat] LMS
10,803,080 UART: [kat] --
10,809,239 UART: [cold-reset] ++
10,811,059 UART: [fht] Storing FHT @ 0x50003400
10,823,490 UART: [idev] ++
10,824,057 UART: [idev] CDI.KEYID = 6
10,825,076 UART: [idev] SUBJECT.KEYID = 7
10,826,241 UART: [idev] UDS.KEYID = 0
10,828,979 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,972,109 UART: [idev] Erasing UDS.KEYID = 0
14,116,142 UART: [idev] Using Sha1 for KeyId Algorithm
14,138,183 UART: [idev] --
14,144,053 UART: [ldev] ++
14,144,632 UART: [ldev] CDI.KEYID = 6
14,145,571 UART: [ldev] SUBJECT.KEYID = 5
14,146,829 UART: [ldev] AUTHORITY.KEYID = 7
14,148,064 UART: [ldev] FE.KEYID = 1
14,157,497 UART: [ldev] Erasing FE.KEYID = 1
17,448,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,741,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,755,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,770,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,785,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,805,201 UART: [ldev] --
19,810,183 UART: [fwproc] Waiting for Commands...
19,811,918 UART: [fwproc] Received command 0x46574c44
19,814,109 UART: [fwproc] Received Image of size 113844 bytes
23,864,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,939,572 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,008,470 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,324,092 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
4,130,493 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,124,384 >>> mbox cmd response: failed
13,124,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,125,308 >>> mbox cmd response: failed
13,125,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,125,897 >>> mbox cmd response: failed
Initializing fuses
2,058,746 writing to cptra_bootfsm_go
10,870,109 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,803,295 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,354 UART:
192,709 UART: Running Caliptra ROM ...
193,915 UART:
194,068 UART: [state] CFI Enabled
259,713 UART: [state] LifecycleState = Unprovisioned
261,579 UART: [state] DebugLocked = No
264,318 UART: [state] WD Timer not started. Device not locked for debugging
267,225 UART: [kat] SHA2-256
446,350 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,949 UART: [kat] ++
458,488 UART: [kat] sha1
469,384 UART: [kat] SHA2-256
472,381 UART: [kat] SHA2-384
477,991 UART: [kat] SHA2-512-ACC
480,928 UART: [kat] ECC-384
2,926,975 UART: [kat] HMAC-384Kdf
2,951,087 UART: [kat] LMS
3,480,527 UART: [kat] --
3,484,791 UART: [cold-reset] ++
3,485,961 UART: [fht] FHT @ 0x50003400
3,496,095 UART: [idev] ++
3,496,672 UART: [idev] CDI.KEYID = 6
3,497,580 UART: [idev] SUBJECT.KEYID = 7
3,498,746 UART: [idev] UDS.KEYID = 0
3,501,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,645,334 UART: [idev] Erasing UDS.KEYID = 0
6,006,418 UART: [idev] Sha1 KeyId Algorithm
6,028,414 UART: [idev] --
6,032,244 UART: [ldev] ++
6,032,819 UART: [ldev] CDI.KEYID = 6
6,033,730 UART: [ldev] SUBJECT.KEYID = 5
6,034,956 UART: [ldev] AUTHORITY.KEYID = 7
6,036,121 UART: [ldev] FE.KEYID = 1
6,080,679 UART: [ldev] Erasing FE.KEYID = 1
8,581,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,031 UART: [ldev] --
10,394,129 UART: [fwproc] Wait for Commands...
10,396,452 UART: [fwproc] Recv command 0x46574c44
10,398,554 UART: [fwproc] Recv'd Img size: 114168 bytes
10,463,785 UART: ROM Fatal Error: 0x000B0007
10,466,940 >>> mbox cmd response: failed
10,467,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,467,867 >>> mbox cmd response: failed
10,468,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,468,474 >>> mbox cmd response: failed
Initializing fuses
2,055,343 writing to cptra_bootfsm_go
2,244,647 UART:
2,245,005 UART: Running Caliptra ROM ...
2,246,153 UART:
2,246,316 UART: [state] CFI Enabled
2,318,982 UART: [state] LifecycleState = Unprovisioned
2,320,867 UART: [state] DebugLocked = No
2,323,401 UART: [state] WD Timer not started. Device not locked for debugging
2,326,560 UART: [kat] SHA2-256
2,505,691 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,517,251 UART: [kat] ++
2,517,709 UART: [kat] sha1
2,529,027 UART: [kat] SHA2-256
2,532,102 UART: [kat] SHA2-384
2,537,893 UART: [kat] SHA2-512-ACC
2,540,840 UART: [kat] ECC-384
5,001,830 UART: [kat] HMAC-384Kdf
5,023,853 UART: [kat] LMS
5,553,295 UART: [kat] --
5,560,093 UART: [cold-reset] ++
5,561,217 UART: [fht] FHT @ 0x50003400
5,571,967 UART: [idev] ++
5,572,536 UART: [idev] CDI.KEYID = 6
5,573,421 UART: [idev] SUBJECT.KEYID = 7
5,574,636 UART: [idev] UDS.KEYID = 0
5,577,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,721,106 UART: [idev] Erasing UDS.KEYID = 0
8,082,497 UART: [idev] Sha1 KeyId Algorithm
8,105,301 UART: [idev] --
8,110,867 UART: [ldev] ++
8,111,459 UART: [ldev] CDI.KEYID = 6
8,112,376 UART: [ldev] SUBJECT.KEYID = 5
8,113,538 UART: [ldev] AUTHORITY.KEYID = 7
8,114,771 UART: [ldev] FE.KEYID = 1
8,150,097 UART: [ldev] Erasing FE.KEYID = 1
10,651,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,371,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,479 UART: [ldev] --
12,443,473 UART: [fwproc] Wait for Commands...
12,445,684 UART: [fwproc] Recv command 0x46574c44
12,447,791 UART: [fwproc] Recv'd Img size: 114168 bytes
15,852,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,920,212 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,988,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,307,018 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,362,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,272,851 >>> mbox cmd response: failed
10,273,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,273,777 >>> mbox cmd response: failed
10,274,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,274,340 >>> mbox cmd response: failed
Initializing fuses
2,049,800 writing to cptra_bootfsm_go
5,414,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,087,527 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,630 UART:
192,987 UART: Running Caliptra ROM ...
194,193 UART:
603,701 UART: [state] CFI Enabled
616,673 UART: [state] LifecycleState = Unprovisioned
618,544 UART: [state] DebugLocked = No
621,375 UART: [state] WD Timer not started. Device not locked for debugging
625,573 UART: [kat] SHA2-256
804,683 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,245 UART: [kat] ++
816,776 UART: [kat] sha1
827,014 UART: [kat] SHA2-256
830,077 UART: [kat] SHA2-384
836,270 UART: [kat] SHA2-512-ACC
839,201 UART: [kat] ECC-384
3,282,275 UART: [kat] HMAC-384Kdf
3,294,394 UART: [kat] LMS
3,823,853 UART: [kat] --
3,827,564 UART: [cold-reset] ++
3,828,578 UART: [fht] FHT @ 0x50003400
3,839,310 UART: [idev] ++
3,839,877 UART: [idev] CDI.KEYID = 6
3,840,790 UART: [idev] SUBJECT.KEYID = 7
3,842,042 UART: [idev] UDS.KEYID = 0
3,844,712 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,331 UART: [idev] Erasing UDS.KEYID = 0
6,311,924 UART: [idev] Sha1 KeyId Algorithm
6,335,042 UART: [idev] --
6,339,313 UART: [ldev] ++
6,339,884 UART: [ldev] CDI.KEYID = 6
6,340,793 UART: [ldev] SUBJECT.KEYID = 5
6,342,007 UART: [ldev] AUTHORITY.KEYID = 7
6,343,246 UART: [ldev] FE.KEYID = 1
6,355,839 UART: [ldev] Erasing FE.KEYID = 1
8,828,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,869 UART: [ldev] --
10,616,810 UART: [fwproc] Wait for Commands...
10,618,743 UART: [fwproc] Recv command 0x46574c44
10,620,838 UART: [fwproc] Recv'd Img size: 114168 bytes
10,683,520 UART: ROM Fatal Error: 0x000B0007
10,686,631 >>> mbox cmd response: failed
10,687,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,687,381 >>> mbox cmd response: failed
10,687,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,687,936 >>> mbox cmd response: failed
Initializing fuses
2,050,433 writing to cptra_bootfsm_go
2,239,760 UART:
2,240,103 UART: Running Caliptra ROM ...
2,241,202 UART:
9,781,409 UART: [state] CFI Enabled
9,795,551 UART: [state] LifecycleState = Unprovisioned
9,797,416 UART: [state] DebugLocked = No
9,799,074 UART: [state] WD Timer not started. Device not locked for debugging
9,802,877 UART: [kat] SHA2-256
9,981,990 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,993,614 UART: [kat] ++
9,994,090 UART: [kat] sha1
10,005,251 UART: [kat] SHA2-256
10,008,284 UART: [kat] SHA2-384
10,014,544 UART: [kat] SHA2-512-ACC
10,016,884 UART: [kat] ECC-384
12,458,915 UART: [kat] HMAC-384Kdf
12,470,887 UART: [kat] LMS
13,000,400 UART: [kat] --
13,003,152 UART: [cold-reset] ++
13,005,358 UART: [fht] FHT @ 0x50003400
13,017,527 UART: [idev] ++
13,018,089 UART: [idev] CDI.KEYID = 6
13,019,106 UART: [idev] SUBJECT.KEYID = 7
13,020,213 UART: [idev] UDS.KEYID = 0
13,023,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,166,867 UART: [idev] Erasing UDS.KEYID = 0
15,490,884 UART: [idev] Sha1 KeyId Algorithm
15,512,343 UART: [idev] --
15,516,878 UART: [ldev] ++
15,517,469 UART: [ldev] CDI.KEYID = 6
15,518,380 UART: [ldev] SUBJECT.KEYID = 5
15,519,539 UART: [ldev] AUTHORITY.KEYID = 7
15,520,768 UART: [ldev] FE.KEYID = 1
15,530,094 UART: [ldev] Erasing FE.KEYID = 1
18,000,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,721,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,737,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,753,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,769,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,789,212 UART: [ldev] --
19,793,628 UART: [fwproc] Wait for Commands...
19,795,512 UART: [fwproc] Recv command 0x46574c44
19,797,611 UART: [fwproc] Recv'd Img size: 114168 bytes
23,202,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,273,749 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,342,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,659,697 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
3,695,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,478,383 >>> mbox cmd response: failed
10,479,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,481 >>> mbox cmd response: failed
10,479,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,044 >>> mbox cmd response: failed
Initializing fuses
2,051,842 writing to cptra_bootfsm_go
13,079,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,637,179 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,163 UART:
192,524 UART: Running Caliptra ROM ...
193,722 UART:
193,870 UART: [state] CFI Enabled
261,757 UART: [state] LifecycleState = Unprovisioned
264,207 UART: [state] DebugLocked = No
266,779 UART: [state] WD Timer not started. Device not locked for debugging
272,131 UART: [kat] SHA2-256
461,999 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,796 UART: [kat] ++
473,274 UART: [kat] sha1
485,233 UART: [kat] SHA2-256
488,251 UART: [kat] SHA2-384
493,585 UART: [kat] SHA2-512-ACC
496,198 UART: [kat] ECC-384
2,947,023 UART: [kat] HMAC-384Kdf
2,970,978 UART: [kat] LMS
3,502,757 UART: [kat] --
3,509,279 UART: [cold-reset] ++
3,511,806 UART: [fht] FHT @ 0x50003400
3,522,791 UART: [idev] ++
3,523,495 UART: [idev] CDI.KEYID = 6
3,524,517 UART: [idev] SUBJECT.KEYID = 7
3,525,622 UART: [idev] UDS.KEYID = 0
3,530,903 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,674,730 UART: [idev] Erasing UDS.KEYID = 0
6,025,630 UART: [idev] Sha1 KeyId Algorithm
6,049,576 UART: [idev] --
6,054,530 UART: [ldev] ++
6,055,226 UART: [ldev] CDI.KEYID = 6
6,056,114 UART: [ldev] SUBJECT.KEYID = 5
6,057,330 UART: [ldev] AUTHORITY.KEYID = 7
6,058,508 UART: [ldev] FE.KEYID = 1
6,100,269 UART: [ldev] Erasing FE.KEYID = 1
8,609,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,910 UART: [ldev] --
10,414,498 UART: [fwproc] Wait for Commands...
10,416,157 UART: [fwproc] Recv command 0x46574c44
10,418,471 UART: [fwproc] Recv'd Img size: 114168 bytes
10,510,688 UART: ROM Fatal Error: 0x000B0007
10,514,370 >>> mbox cmd response: failed
10,514,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,515,100 >>> mbox cmd response: failed
10,515,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,515,675 >>> mbox cmd response: failed
Initializing fuses
2,052,171 writing to cptra_bootfsm_go
2,241,465 UART:
2,241,816 UART: Running Caliptra ROM ...
2,242,950 UART:
2,243,118 UART: [state] CFI Enabled
2,316,049 UART: [state] LifecycleState = Unprovisioned
2,318,483 UART: [state] DebugLocked = No
2,319,984 UART: [state] WD Timer not started. Device not locked for debugging
2,325,423 UART: [kat] SHA2-256
2,515,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,069 UART: [kat] ++
2,526,581 UART: [kat] sha1
2,538,498 UART: [kat] SHA2-256
2,541,518 UART: [kat] SHA2-384
2,546,537 UART: [kat] SHA2-512-ACC
2,549,115 UART: [kat] ECC-384
4,997,169 UART: [kat] HMAC-384Kdf
5,021,128 UART: [kat] LMS
5,552,930 UART: [kat] --
5,556,702 UART: [cold-reset] ++
5,558,035 UART: [fht] FHT @ 0x50003400
5,570,642 UART: [idev] ++
5,571,326 UART: [idev] CDI.KEYID = 6
5,572,208 UART: [idev] SUBJECT.KEYID = 7
5,573,470 UART: [idev] UDS.KEYID = 0
5,576,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,719,814 UART: [idev] Erasing UDS.KEYID = 0
8,076,829 UART: [idev] Sha1 KeyId Algorithm
8,098,772 UART: [idev] --
8,103,289 UART: [ldev] ++
8,103,979 UART: [ldev] CDI.KEYID = 6
8,104,865 UART: [ldev] SUBJECT.KEYID = 5
8,106,078 UART: [ldev] AUTHORITY.KEYID = 7
8,107,314 UART: [ldev] FE.KEYID = 1
8,150,072 UART: [ldev] Erasing FE.KEYID = 1
10,658,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,547 UART: [ldev] --
12,466,730 UART: [fwproc] Wait for Commands...
12,469,590 UART: [fwproc] Recv command 0x46574c44
12,471,873 UART: [fwproc] Recv'd Img size: 114168 bytes
15,915,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,110,152 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,651,275 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,446,163 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,315,960 >>> mbox cmd response: failed
10,316,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,316,882 >>> mbox cmd response: failed
10,317,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,317,439 >>> mbox cmd response: failed
Initializing fuses
2,052,202 writing to cptra_bootfsm_go
5,472,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,763,157 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,592 UART:
192,955 UART: Running Caliptra ROM ...
194,161 UART:
603,804 UART: [state] CFI Enabled
618,641 UART: [state] LifecycleState = Unprovisioned
621,018 UART: [state] DebugLocked = No
623,698 UART: [state] WD Timer not started. Device not locked for debugging
627,637 UART: [kat] SHA2-256
817,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,285 UART: [kat] ++
828,876 UART: [kat] sha1
841,222 UART: [kat] SHA2-256
844,237 UART: [kat] SHA2-384
850,075 UART: [kat] SHA2-512-ACC
852,694 UART: [kat] ECC-384
3,294,319 UART: [kat] HMAC-384Kdf
3,308,824 UART: [kat] LMS
3,840,650 UART: [kat] --
3,844,803 UART: [cold-reset] ++
3,846,403 UART: [fht] FHT @ 0x50003400
3,858,356 UART: [idev] ++
3,859,070 UART: [idev] CDI.KEYID = 6
3,859,965 UART: [idev] SUBJECT.KEYID = 7
3,861,180 UART: [idev] UDS.KEYID = 0
3,866,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,010,220 UART: [idev] Erasing UDS.KEYID = 0
6,342,410 UART: [idev] Sha1 KeyId Algorithm
6,365,828 UART: [idev] --
6,369,733 UART: [ldev] ++
6,370,421 UART: [ldev] CDI.KEYID = 6
6,371,333 UART: [ldev] SUBJECT.KEYID = 5
6,372,547 UART: [ldev] AUTHORITY.KEYID = 7
6,373,723 UART: [ldev] FE.KEYID = 1
6,385,557 UART: [ldev] Erasing FE.KEYID = 1
8,865,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,893 UART: [ldev] --
10,655,383 UART: [fwproc] Wait for Commands...
10,657,639 UART: [fwproc] Recv command 0x46574c44
10,659,915 UART: [fwproc] Recv'd Img size: 114168 bytes
10,755,763 UART: ROM Fatal Error: 0x000B0007
10,759,416 >>> mbox cmd response: failed
10,759,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,760,205 >>> mbox cmd response: failed
10,760,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,760,769 >>> mbox cmd response: failed
Initializing fuses
2,053,304 writing to cptra_bootfsm_go
2,242,625 UART:
2,242,967 UART: Running Caliptra ROM ...
2,244,127 UART:
9,713,085 UART: [state] CFI Enabled
9,728,678 UART: [state] LifecycleState = Unprovisioned
9,731,065 UART: [state] DebugLocked = No
9,733,685 UART: [state] WD Timer not started. Device not locked for debugging
9,738,317 UART: [kat] SHA2-256
9,928,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,938,996 UART: [kat] ++
9,939,513 UART: [kat] sha1
9,951,860 UART: [kat] SHA2-256
9,954,875 UART: [kat] SHA2-384
9,961,403 UART: [kat] SHA2-512-ACC
9,963,980 UART: [kat] ECC-384
12,405,321 UART: [kat] HMAC-384Kdf
12,419,223 UART: [kat] LMS
12,951,001 UART: [kat] --
12,955,867 UART: [cold-reset] ++
12,957,905 UART: [fht] FHT @ 0x50003400
12,969,863 UART: [idev] ++
12,970,537 UART: [idev] CDI.KEYID = 6
12,971,555 UART: [idev] SUBJECT.KEYID = 7
12,972,712 UART: [idev] UDS.KEYID = 0
12,975,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,119,251 UART: [idev] Erasing UDS.KEYID = 0
15,455,547 UART: [idev] Sha1 KeyId Algorithm
15,477,770 UART: [idev] --
15,482,952 UART: [ldev] ++
15,483,632 UART: [ldev] CDI.KEYID = 6
15,484,539 UART: [ldev] SUBJECT.KEYID = 5
15,485,748 UART: [ldev] AUTHORITY.KEYID = 7
15,486,924 UART: [ldev] FE.KEYID = 1
15,498,005 UART: [ldev] Erasing FE.KEYID = 1
17,970,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,688,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,703,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,718,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,733,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,753,725 UART: [ldev] --
19,759,215 UART: [fwproc] Wait for Commands...
19,761,964 UART: [fwproc] Recv command 0x46574c44
19,764,283 UART: [fwproc] Recv'd Img size: 114168 bytes
23,204,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,279,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,395,718 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,937,456 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,762,125 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,535,702 >>> mbox cmd response: failed
10,536,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,536,630 >>> mbox cmd response: failed
10,536,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,537,185 >>> mbox cmd response: failed
Initializing fuses
2,056,576 writing to cptra_bootfsm_go
13,088,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,280,433 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,635 UART: [kat] SHA2-256
892,573 UART: [kat] SHA2-384
895,410 UART: [kat] SHA2-512-ACC
897,311 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
906,946 UART: [kat] LMS
1,475,142 UART: [kat] --
1,475,873 UART: [cold-reset] ++
1,476,395 UART: [fht] Storing FHT @ 0x50003400
1,479,160 UART: [idev] ++
1,479,328 UART: [idev] CDI.KEYID = 6
1,479,688 UART: [idev] SUBJECT.KEYID = 7
1,480,112 UART: [idev] UDS.KEYID = 0
1,480,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,318 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,946 UART: [idev] --
1,513,951 UART: [ldev] ++
1,514,119 UART: [ldev] CDI.KEYID = 6
1,514,482 UART: [ldev] SUBJECT.KEYID = 5
1,514,908 UART: [ldev] AUTHORITY.KEYID = 7
1,515,371 UART: [ldev] FE.KEYID = 1
1,520,659 UART: [ldev] Erasing FE.KEYID = 1
1,545,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,414 UART: [ldev] --
1,584,691 UART: [fwproc] Waiting for Commands...
1,585,434 UART: [fwproc] Received command 0x46574c44
1,586,225 UART: [fwproc] Received Image of size 114168 bytes
1,610,296 UART: ROM Fatal Error: 0x000B0007
1,611,453 >>> mbox cmd response: failed
1,611,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,459 >>> mbox cmd response: failed
1,611,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,669 UART: [kat] SHA2-256
892,607 UART: [kat] SHA2-384
895,328 UART: [kat] SHA2-512-ACC
897,229 UART: [kat] ECC-384
903,034 UART: [kat] HMAC-384Kdf
907,612 UART: [kat] LMS
1,475,808 UART: [kat] --
1,476,911 UART: [cold-reset] ++
1,477,471 UART: [fht] Storing FHT @ 0x50003400
1,480,234 UART: [idev] ++
1,480,402 UART: [idev] CDI.KEYID = 6
1,480,762 UART: [idev] SUBJECT.KEYID = 7
1,481,186 UART: [idev] UDS.KEYID = 0
1,481,531 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,454 UART: [idev] Erasing UDS.KEYID = 0
1,505,946 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,606 UART: [idev] --
1,515,631 UART: [ldev] ++
1,515,799 UART: [ldev] CDI.KEYID = 6
1,516,162 UART: [ldev] SUBJECT.KEYID = 5
1,516,588 UART: [ldev] AUTHORITY.KEYID = 7
1,517,051 UART: [ldev] FE.KEYID = 1
1,522,199 UART: [ldev] Erasing FE.KEYID = 1
1,547,236 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,204 UART: [ldev] --
1,586,573 UART: [fwproc] Waiting for Commands...
1,587,356 UART: [fwproc] Received command 0x46574c44
1,588,147 UART: [fwproc] Received Image of size 114168 bytes
2,884,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,230 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,582 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,201 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,771 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,464,446 >>> mbox cmd response: failed
1,464,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,452 >>> mbox cmd response: failed
1,464,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,464,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,721 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,483 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,942 UART: [kat] SHA2-256
881,873 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,988 UART: [kat] ++
886,140 UART: [kat] sha1
890,416 UART: [kat] SHA2-256
892,354 UART: [kat] SHA2-384
895,097 UART: [kat] SHA2-512-ACC
896,998 UART: [kat] ECC-384
902,647 UART: [kat] HMAC-384Kdf
907,345 UART: [kat] LMS
1,475,541 UART: [kat] --
1,476,356 UART: [cold-reset] ++
1,476,810 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,431 UART: [idev] Erasing UDS.KEYID = 0
1,504,897 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,489 UART: [idev] --
1,514,388 UART: [ldev] ++
1,514,556 UART: [ldev] CDI.KEYID = 6
1,514,919 UART: [ldev] SUBJECT.KEYID = 5
1,515,345 UART: [ldev] AUTHORITY.KEYID = 7
1,515,808 UART: [ldev] FE.KEYID = 1
1,521,170 UART: [ldev] Erasing FE.KEYID = 1
1,546,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,369 UART: [ldev] --
1,585,632 UART: [fwproc] Waiting for Commands...
1,586,379 UART: [fwproc] Received command 0x46574c44
1,587,170 UART: [fwproc] Received Image of size 114168 bytes
1,611,113 UART: ROM Fatal Error: 0x000B0007
1,612,270 >>> mbox cmd response: failed
1,612,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,276 >>> mbox cmd response: failed
1,612,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,282 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,712 UART: [kat] SHA2-256
882,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,758 UART: [kat] ++
886,910 UART: [kat] sha1
891,198 UART: [kat] SHA2-256
893,136 UART: [kat] SHA2-384
895,797 UART: [kat] SHA2-512-ACC
897,698 UART: [kat] ECC-384
903,361 UART: [kat] HMAC-384Kdf
907,901 UART: [kat] LMS
1,476,097 UART: [kat] --
1,476,750 UART: [cold-reset] ++
1,477,118 UART: [fht] Storing FHT @ 0x50003400
1,479,863 UART: [idev] ++
1,480,031 UART: [idev] CDI.KEYID = 6
1,480,391 UART: [idev] SUBJECT.KEYID = 7
1,480,815 UART: [idev] UDS.KEYID = 0
1,481,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,037 UART: [idev] Erasing UDS.KEYID = 0
1,505,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,219 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,521,998 UART: [ldev] Erasing FE.KEYID = 1
1,547,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,837 UART: [ldev] --
1,587,260 UART: [fwproc] Waiting for Commands...
1,587,915 UART: [fwproc] Received command 0x46574c44
1,588,706 UART: [fwproc] Received Image of size 114168 bytes
2,884,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,003 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,982 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,466,105 >>> mbox cmd response: failed
1,466,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,111 >>> mbox cmd response: failed
1,466,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,376 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
893,630 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,755 UART: [kat] ++
897,907 UART: [kat] sha1
902,217 UART: [kat] SHA2-256
904,157 UART: [kat] SHA2-384
907,018 UART: [kat] SHA2-512-ACC
908,919 UART: [kat] ECC-384
918,402 UART: [kat] HMAC-384Kdf
922,980 UART: [kat] LMS
1,171,308 UART: [kat] --
1,172,127 UART: [cold-reset] ++
1,172,587 UART: [fht] FHT @ 0x50003400
1,175,304 UART: [idev] ++
1,175,472 UART: [idev] CDI.KEYID = 6
1,175,832 UART: [idev] SUBJECT.KEYID = 7
1,176,256 UART: [idev] UDS.KEYID = 0
1,176,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,158 UART: [idev] Erasing UDS.KEYID = 0
1,201,183 UART: [idev] Sha1 KeyId Algorithm
1,209,559 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,256 UART: [ldev] SUBJECT.KEYID = 5
1,211,682 UART: [ldev] AUTHORITY.KEYID = 7
1,212,145 UART: [ldev] FE.KEYID = 1
1,217,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,651 UART: [ldev] --
1,282,954 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,416 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,993 UART: ROM Fatal Error: 0x000B0007
1,309,150 >>> mbox cmd response: failed
1,309,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,156 >>> mbox cmd response: failed
1,309,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
893,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,327 UART: [kat] ++
897,479 UART: [kat] sha1
901,571 UART: [kat] SHA2-256
903,511 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
917,614 UART: [kat] HMAC-384Kdf
922,294 UART: [kat] LMS
1,170,622 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,171,957 UART: [fht] FHT @ 0x50003400
1,174,596 UART: [idev] ++
1,174,764 UART: [idev] CDI.KEYID = 6
1,175,124 UART: [idev] SUBJECT.KEYID = 7
1,175,548 UART: [idev] UDS.KEYID = 0
1,175,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,446 UART: [idev] Erasing UDS.KEYID = 0
1,200,321 UART: [idev] Sha1 KeyId Algorithm
1,208,909 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,412 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,923 UART: [ldev] --
1,281,384 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,385 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,238 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,241 >>> mbox cmd response: failed
1,163,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,247 >>> mbox cmd response: failed
1,163,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,157 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,971 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,314 UART: [kat] SHA2-256
904,254 UART: [kat] SHA2-384
907,015 UART: [kat] SHA2-512-ACC
908,916 UART: [kat] ECC-384
918,631 UART: [kat] HMAC-384Kdf
923,353 UART: [kat] LMS
1,171,681 UART: [kat] --
1,172,600 UART: [cold-reset] ++
1,173,140 UART: [fht] FHT @ 0x50003400
1,175,837 UART: [idev] ++
1,176,005 UART: [idev] CDI.KEYID = 6
1,176,365 UART: [idev] SUBJECT.KEYID = 7
1,176,789 UART: [idev] UDS.KEYID = 0
1,177,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,815 UART: [idev] Erasing UDS.KEYID = 0
1,201,644 UART: [idev] Sha1 KeyId Algorithm
1,210,214 UART: [idev] --
1,211,250 UART: [ldev] ++
1,211,418 UART: [ldev] CDI.KEYID = 6
1,211,781 UART: [ldev] SUBJECT.KEYID = 5
1,212,207 UART: [ldev] AUTHORITY.KEYID = 7
1,212,670 UART: [ldev] FE.KEYID = 1
1,218,046 UART: [ldev] Erasing FE.KEYID = 1
1,243,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,628 UART: [ldev] --
1,283,103 UART: [fwproc] Wait for Commands...
1,283,877 UART: [fwproc] Recv command 0x46574c44
1,284,605 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,692 UART: ROM Fatal Error: 0x000B0007
1,309,849 >>> mbox cmd response: failed
1,309,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,855 >>> mbox cmd response: failed
1,309,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
893,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,914 UART: [kat] ++
898,066 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
907,003 UART: [kat] SHA2-512-ACC
908,904 UART: [kat] ECC-384
918,871 UART: [kat] HMAC-384Kdf
923,509 UART: [kat] LMS
1,171,837 UART: [kat] --
1,172,800 UART: [cold-reset] ++
1,173,328 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,703 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,209,826 UART: [idev] --
1,210,868 UART: [ldev] ++
1,211,036 UART: [ldev] CDI.KEYID = 6
1,211,399 UART: [ldev] SUBJECT.KEYID = 5
1,211,825 UART: [ldev] AUTHORITY.KEYID = 7
1,212,288 UART: [ldev] FE.KEYID = 1
1,217,394 UART: [ldev] Erasing FE.KEYID = 1
1,243,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,632 UART: [ldev] --
1,283,035 UART: [fwproc] Wait for Commands...
1,283,765 UART: [fwproc] Recv command 0x46574c44
1,284,493 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,960 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,407 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,866 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,164,064 >>> mbox cmd response: failed
1,164,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,070 >>> mbox cmd response: failed
1,164,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,302 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,066 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,624 UART: [state] LifecycleState = Unprovisioned
85,279 UART: [state] DebugLocked = No
85,985 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
890,738 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,867 UART: [kat] ++
895,019 UART: [kat] sha1
899,031 UART: [kat] SHA2-256
900,971 UART: [kat] SHA2-384
903,580 UART: [kat] SHA2-512-ACC
905,481 UART: [kat] ECC-384
914,858 UART: [kat] HMAC-384Kdf
919,672 UART: [kat] LMS
1,167,984 UART: [kat] --
1,168,687 UART: [cold-reset] ++
1,169,131 UART: [fht] FHT @ 0x50003400
1,172,021 UART: [idev] ++
1,172,189 UART: [idev] CDI.KEYID = 6
1,172,550 UART: [idev] SUBJECT.KEYID = 7
1,172,975 UART: [idev] UDS.KEYID = 0
1,173,321 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,707 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,374 UART: [ldev] ++
1,208,542 UART: [ldev] CDI.KEYID = 6
1,208,906 UART: [ldev] SUBJECT.KEYID = 5
1,209,333 UART: [ldev] AUTHORITY.KEYID = 7
1,209,796 UART: [ldev] FE.KEYID = 1
1,214,858 UART: [ldev] Erasing FE.KEYID = 1
1,240,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,594 UART: [ldev] --
1,279,974 UART: [fwproc] Wait for Commands...
1,280,593 UART: [fwproc] Recv command 0x46574c44
1,281,326 UART: [fwproc] Recv'd Img size: 114168 bytes
1,304,703 UART: ROM Fatal Error: 0x000B0007
1,305,860 >>> mbox cmd response: failed
1,305,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,866 >>> mbox cmd response: failed
1,305,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,280 UART: [kat] HMAC-384Kdf
920,978 UART: [kat] LMS
1,169,290 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,174,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,197 UART: [idev] Sha1 KeyId Algorithm
1,208,073 UART: [idev] --
1,209,160 UART: [ldev] ++
1,209,328 UART: [ldev] CDI.KEYID = 6
1,209,692 UART: [ldev] SUBJECT.KEYID = 5
1,210,119 UART: [ldev] AUTHORITY.KEYID = 7
1,210,582 UART: [ldev] FE.KEYID = 1
1,215,986 UART: [ldev] Erasing FE.KEYID = 1
1,242,745 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,052 UART: [ldev] --
1,282,494 UART: [fwproc] Wait for Commands...
1,283,199 UART: [fwproc] Recv command 0x46574c44
1,283,932 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,261 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,570 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,048 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,625 >>> mbox cmd response: failed
1,159,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,631 >>> mbox cmd response: failed
1,159,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,394 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,941 UART: [state] LifecycleState = Unprovisioned
86,596 UART: [state] DebugLocked = No
87,080 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [kat] SHA2-256
891,909 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,038 UART: [kat] ++
896,190 UART: [kat] sha1
900,554 UART: [kat] SHA2-256
902,494 UART: [kat] SHA2-384
905,389 UART: [kat] SHA2-512-ACC
907,290 UART: [kat] ECC-384
916,991 UART: [kat] HMAC-384Kdf
921,589 UART: [kat] LMS
1,169,901 UART: [kat] --
1,171,052 UART: [cold-reset] ++
1,171,568 UART: [fht] FHT @ 0x50003400
1,174,156 UART: [idev] ++
1,174,324 UART: [idev] CDI.KEYID = 6
1,174,685 UART: [idev] SUBJECT.KEYID = 7
1,175,110 UART: [idev] UDS.KEYID = 0
1,175,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,214 UART: [idev] Erasing UDS.KEYID = 0
1,200,268 UART: [idev] Sha1 KeyId Algorithm
1,209,160 UART: [idev] --
1,210,197 UART: [ldev] ++
1,210,365 UART: [ldev] CDI.KEYID = 6
1,210,729 UART: [ldev] SUBJECT.KEYID = 5
1,211,156 UART: [ldev] AUTHORITY.KEYID = 7
1,211,619 UART: [ldev] FE.KEYID = 1
1,216,797 UART: [ldev] Erasing FE.KEYID = 1
1,243,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,905 UART: [ldev] --
1,282,207 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46574c44
1,283,757 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,678 UART: ROM Fatal Error: 0x000B0007
1,308,835 >>> mbox cmd response: failed
1,308,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,841 >>> mbox cmd response: failed
1,308,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,565 UART: [kat] HMAC-384Kdf
921,413 UART: [kat] LMS
1,169,725 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,184 UART: [fht] FHT @ 0x50003400
1,173,812 UART: [idev] ++
1,173,980 UART: [idev] CDI.KEYID = 6
1,174,341 UART: [idev] SUBJECT.KEYID = 7
1,174,766 UART: [idev] UDS.KEYID = 0
1,175,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,622 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,394 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,242,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,021 UART: [ldev] --
1,281,499 UART: [fwproc] Wait for Commands...
1,282,164 UART: [fwproc] Recv command 0x46574c44
1,282,897 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,106 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,017 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,467 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,431 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,464 >>> mbox cmd response: failed
1,162,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,470 >>> mbox cmd response: failed
1,162,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,699 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
4,878,505 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,877,621 >>> mbox cmd response: failed
16,878,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,878,621 >>> mbox cmd response: failed
16,878,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,879,181 >>> mbox cmd response: failed
Initializing fuses
2,055,813 writing to cptra_bootfsm_go
6,917,312 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,498,449 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
4,878,730 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,887,580 >>> mbox cmd response: failed
16,888,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,888,702 >>> mbox cmd response: failed
16,888,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,889,268 >>> mbox cmd response: failed
Initializing fuses
2,055,358 writing to cptra_bootfsm_go
6,926,374 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,478,091 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
5,184,666 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,070,171 >>> mbox cmd response: failed
17,070,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,071,127 >>> mbox cmd response: failed
17,071,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,071,693 >>> mbox cmd response: failed
Initializing fuses
2,055,979 writing to cptra_bootfsm_go
7,979,516 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,404,308 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
5,185,888 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,054,698 >>> mbox cmd response: failed
17,055,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,055,641 >>> mbox cmd response: failed
17,055,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,056,282 >>> mbox cmd response: failed
Initializing fuses
2,066,092 writing to cptra_bootfsm_go
7,992,390 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,428,220 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,440,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,693,075 >>> mbox cmd response: failed
12,693,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,155 >>> mbox cmd response: failed
12,694,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,714 >>> mbox cmd response: failed
Initializing fuses
2,053,331 writing to cptra_bootfsm_go
5,509,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,360,537 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,443,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,647,506 >>> mbox cmd response: failed
12,648,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,424 >>> mbox cmd response: failed
12,648,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,991 >>> mbox cmd response: failed
Initializing fuses
2,054,582 writing to cptra_bootfsm_go
5,487,079 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,333,445 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,784,927 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,907,319 >>> mbox cmd response: failed
12,907,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,908,211 >>> mbox cmd response: failed
12,908,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,908,774 >>> mbox cmd response: failed
Initializing fuses
2,057,407 writing to cptra_bootfsm_go
10,749,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,468,005 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,786,930 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,920,210 >>> mbox cmd response: failed
12,921,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,921,463 >>> mbox cmd response: failed
12,921,732 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,027 >>> mbox cmd response: failed
Initializing fuses
2,055,094 writing to cptra_bootfsm_go
10,736,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,446,886 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,459,517 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,674,912 >>> mbox cmd response: failed
12,675,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,676,065 >>> mbox cmd response: failed
12,676,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,676,662 >>> mbox cmd response: failed
Initializing fuses
2,057,506 writing to cptra_bootfsm_go
5,523,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,377,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,468,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,720,356 >>> mbox cmd response: failed
12,720,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,721,279 >>> mbox cmd response: failed
12,721,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,721,846 >>> mbox cmd response: failed
Initializing fuses
2,060,413 writing to cptra_bootfsm_go
5,496,515 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,320,964 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,786,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,897,776 >>> mbox cmd response: failed
12,898,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,898,864 >>> mbox cmd response: failed
12,899,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,899,424 >>> mbox cmd response: failed
Initializing fuses
2,056,980 writing to cptra_bootfsm_go
10,762,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,493,214 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,787,910 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,921,393 >>> mbox cmd response: failed
12,922,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,922,498 >>> mbox cmd response: failed
12,922,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,923,065 >>> mbox cmd response: failed
Initializing fuses
2,055,472 writing to cptra_bootfsm_go
10,722,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,477,552 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,429,439 >>> mbox cmd response: failed
1,429,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,445 >>> mbox cmd response: failed
1,429,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,039 UART: [kat] SHA2-256
881,970 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,085 UART: [kat] ++
886,237 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,216 UART: [kat] SHA2-512-ACC
897,117 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,432 UART: [kat] LMS
1,475,628 UART: [kat] --
1,476,679 UART: [cold-reset] ++
1,477,219 UART: [fht] Storing FHT @ 0x50003400
1,480,124 UART: [idev] ++
1,480,292 UART: [idev] CDI.KEYID = 6
1,480,652 UART: [idev] SUBJECT.KEYID = 7
1,481,076 UART: [idev] UDS.KEYID = 0
1,481,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,192 UART: [idev] Erasing UDS.KEYID = 0
1,505,088 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,764 UART: [idev] --
1,514,837 UART: [ldev] ++
1,515,005 UART: [ldev] CDI.KEYID = 6
1,515,368 UART: [ldev] SUBJECT.KEYID = 5
1,515,794 UART: [ldev] AUTHORITY.KEYID = 7
1,516,257 UART: [ldev] FE.KEYID = 1
1,521,329 UART: [ldev] Erasing FE.KEYID = 1
1,546,272 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,496 UART: [ldev] --
1,585,911 UART: [fwproc] Waiting for Commands...
1,586,530 UART: [fwproc] Received command 0x46574c44
1,587,321 UART: [fwproc] Received Image of size 114168 bytes
2,883,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,669 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,021 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,622 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,426,869 >>> mbox cmd response: failed
1,426,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,875 >>> mbox cmd response: failed
1,426,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,426,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,587 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,372 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,429,288 >>> mbox cmd response: failed
1,429,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,294 >>> mbox cmd response: failed
1,429,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
87,050 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
891,124 UART: [kat] SHA2-256
893,062 UART: [kat] SHA2-384
895,665 UART: [kat] SHA2-512-ACC
897,566 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,901 UART: [kat] LMS
1,476,097 UART: [kat] --
1,477,110 UART: [cold-reset] ++
1,477,580 UART: [fht] Storing FHT @ 0x50003400
1,480,405 UART: [idev] ++
1,480,573 UART: [idev] CDI.KEYID = 6
1,480,933 UART: [idev] SUBJECT.KEYID = 7
1,481,357 UART: [idev] UDS.KEYID = 0
1,481,702 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,231 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,513 UART: [idev] --
1,515,422 UART: [ldev] ++
1,515,590 UART: [ldev] CDI.KEYID = 6
1,515,953 UART: [ldev] SUBJECT.KEYID = 5
1,516,379 UART: [ldev] AUTHORITY.KEYID = 7
1,516,842 UART: [ldev] FE.KEYID = 1
1,521,920 UART: [ldev] Erasing FE.KEYID = 1
1,547,899 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,517 UART: [ldev] --
1,586,932 UART: [fwproc] Waiting for Commands...
1,587,673 UART: [fwproc] Received command 0x46574c44
1,588,464 UART: [fwproc] Received Image of size 114168 bytes
2,883,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,759 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,111 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,730 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,429,144 >>> mbox cmd response: failed
1,429,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,150 >>> mbox cmd response: failed
1,429,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,156 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,078 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,201 >>> mbox cmd response: failed
1,427,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,207 >>> mbox cmd response: failed
1,427,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,494 UART: [state] LifecycleState = Unprovisioned
85,149 UART: [state] DebugLocked = No
85,701 UART: [state] WD Timer not started. Device not locked for debugging
86,902 UART: [kat] SHA2-256
892,552 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,677 UART: [kat] ++
896,829 UART: [kat] sha1
901,111 UART: [kat] SHA2-256
903,051 UART: [kat] SHA2-384
905,692 UART: [kat] SHA2-512-ACC
907,593 UART: [kat] ECC-384
917,394 UART: [kat] HMAC-384Kdf
921,960 UART: [kat] LMS
1,170,288 UART: [kat] --
1,171,261 UART: [cold-reset] ++
1,171,827 UART: [fht] FHT @ 0x50003400
1,174,368 UART: [idev] ++
1,174,536 UART: [idev] CDI.KEYID = 6
1,174,896 UART: [idev] SUBJECT.KEYID = 7
1,175,320 UART: [idev] UDS.KEYID = 0
1,175,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,334 UART: [idev] Erasing UDS.KEYID = 0
1,200,569 UART: [idev] Sha1 KeyId Algorithm
1,209,031 UART: [idev] --
1,210,189 UART: [ldev] ++
1,210,357 UART: [ldev] CDI.KEYID = 6
1,210,720 UART: [ldev] SUBJECT.KEYID = 5
1,211,146 UART: [ldev] AUTHORITY.KEYID = 7
1,211,609 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,339 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,344 UART: [fwproc] Recv command 0x46574c44
1,283,072 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,382 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,545 >>> mbox cmd response: failed
1,427,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,551 >>> mbox cmd response: failed
1,427,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,529 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,429,408 >>> mbox cmd response: failed
1,429,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,414 >>> mbox cmd response: failed
1,429,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,420 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
893,291 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,416 UART: [kat] ++
897,568 UART: [kat] sha1
901,724 UART: [kat] SHA2-256
903,664 UART: [kat] SHA2-384
906,385 UART: [kat] SHA2-512-ACC
908,286 UART: [kat] ECC-384
918,243 UART: [kat] HMAC-384Kdf
923,063 UART: [kat] LMS
1,171,391 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,786 UART: [fht] FHT @ 0x50003400
1,175,407 UART: [idev] ++
1,175,575 UART: [idev] CDI.KEYID = 6
1,175,935 UART: [idev] SUBJECT.KEYID = 7
1,176,359 UART: [idev] UDS.KEYID = 0
1,176,704 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,537 UART: [idev] Erasing UDS.KEYID = 0
1,201,586 UART: [idev] Sha1 KeyId Algorithm
1,210,056 UART: [idev] --
1,211,130 UART: [ldev] ++
1,211,298 UART: [ldev] CDI.KEYID = 6
1,211,661 UART: [ldev] SUBJECT.KEYID = 5
1,212,087 UART: [ldev] AUTHORITY.KEYID = 7
1,212,550 UART: [ldev] FE.KEYID = 1
1,218,058 UART: [ldev] Erasing FE.KEYID = 1
1,244,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,188 UART: [ldev] --
1,283,635 UART: [fwproc] Wait for Commands...
1,284,455 UART: [fwproc] Recv command 0x46574c44
1,285,183 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,286 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,590 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,061 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,428,782 >>> mbox cmd response: failed
1,428,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,788 >>> mbox cmd response: failed
1,428,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,524 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,803 >>> mbox cmd response: failed
1,427,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,809 >>> mbox cmd response: failed
1,427,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,692 UART: [state] LifecycleState = Unprovisioned
86,347 UART: [state] DebugLocked = No
87,057 UART: [state] WD Timer not started. Device not locked for debugging
88,322 UART: [kat] SHA2-256
891,872 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,001 UART: [kat] ++
896,153 UART: [kat] sha1
900,379 UART: [kat] SHA2-256
902,319 UART: [kat] SHA2-384
905,018 UART: [kat] SHA2-512-ACC
906,919 UART: [kat] ECC-384
916,954 UART: [kat] HMAC-384Kdf
921,666 UART: [kat] LMS
1,169,978 UART: [kat] --
1,170,971 UART: [cold-reset] ++
1,171,549 UART: [fht] FHT @ 0x50003400
1,174,275 UART: [idev] ++
1,174,443 UART: [idev] CDI.KEYID = 6
1,174,804 UART: [idev] SUBJECT.KEYID = 7
1,175,229 UART: [idev] UDS.KEYID = 0
1,175,575 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,201 UART: [idev] Erasing UDS.KEYID = 0
1,200,333 UART: [idev] Sha1 KeyId Algorithm
1,209,019 UART: [idev] --
1,210,256 UART: [ldev] ++
1,210,424 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,215 UART: [ldev] AUTHORITY.KEYID = 7
1,211,678 UART: [ldev] FE.KEYID = 1
1,216,870 UART: [ldev] Erasing FE.KEYID = 1
1,242,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,880 UART: [ldev] --
1,282,228 UART: [fwproc] Wait for Commands...
1,282,887 UART: [fwproc] Recv command 0x46574c44
1,283,620 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,597 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,906 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,384 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,427,813 >>> mbox cmd response: failed
1,427,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,819 >>> mbox cmd response: failed
1,427,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,427,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,822 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,428,800 >>> mbox cmd response: failed
1,428,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,806 >>> mbox cmd response: failed
1,428,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,428,812 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
87,016 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
891,785 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,914 UART: [kat] ++
896,066 UART: [kat] sha1
900,314 UART: [kat] SHA2-256
902,254 UART: [kat] SHA2-384
905,015 UART: [kat] SHA2-512-ACC
906,916 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,170,092 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,174,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,272 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,999 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,282,007 UART: [fwproc] Wait for Commands...
1,282,598 UART: [fwproc] Recv command 0x46574c44
1,283,331 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,063 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,429,212 >>> mbox cmd response: failed
1,429,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,218 >>> mbox cmd response: failed
1,429,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,429,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,161 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,052 UART:
192,423 UART: Running Caliptra ROM ...
193,544 UART:
193,692 UART: [state] CFI Enabled
266,725 UART: [state] LifecycleState = Unprovisioned
268,647 UART: [state] DebugLocked = No
270,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,018 UART: [kat] SHA2-256
444,742 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,217 UART: [kat] ++
455,722 UART: [kat] sha1
466,629 UART: [kat] SHA2-256
469,314 UART: [kat] SHA2-384
476,043 UART: [kat] SHA2-512-ACC
478,414 UART: [kat] ECC-384
2,767,477 UART: [kat] HMAC-384Kdf
2,781,345 UART: [kat] LMS
3,971,680 UART: [kat] --
3,975,318 UART: [cold-reset] ++
3,977,212 UART: [fht] Storing FHT @ 0x50003400
3,988,486 UART: [idev] ++
3,989,054 UART: [idev] CDI.KEYID = 6
3,990,023 UART: [idev] SUBJECT.KEYID = 7
3,991,240 UART: [idev] UDS.KEYID = 0
3,994,105 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,137,526 UART: [idev] Erasing UDS.KEYID = 0
7,328,726 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,354 UART: [idev] --
7,354,508 UART: [ldev] ++
7,355,078 UART: [ldev] CDI.KEYID = 6
7,356,042 UART: [ldev] SUBJECT.KEYID = 5
7,357,263 UART: [ldev] AUTHORITY.KEYID = 7
7,358,417 UART: [ldev] FE.KEYID = 1
7,396,359 UART: [ldev] Erasing FE.KEYID = 1
10,728,938 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,021,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,036,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,051,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,065,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,084,785 UART: [ldev] --
13,089,788 UART: [fwproc] Waiting for Commands...
13,092,311 UART: [fwproc] Received command 0x46574c44
13,094,508 UART: [fwproc] Received Image of size 113844 bytes
17,152,798 UART: ROM Fatal Error: 0x000B0016
17,156,254 >>> mbox cmd response: failed
17,156,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,157,036 >>> mbox cmd response: failed
17,157,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,157,608 >>> mbox cmd response: failed
Initializing fuses
2,058,288 writing to cptra_bootfsm_go
2,247,580 UART:
2,247,918 UART: Running Caliptra ROM ...
2,248,966 UART:
2,249,120 UART: [state] CFI Enabled
2,322,497 UART: [state] LifecycleState = Unprovisioned
2,324,435 UART: [state] DebugLocked = No
2,326,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,907 UART: [kat] SHA2-256
2,501,568 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,052 UART: [kat] ++
2,512,602 UART: [kat] sha1
2,523,389 UART: [kat] SHA2-256
2,526,087 UART: [kat] SHA2-384
2,531,592 UART: [kat] SHA2-512-ACC
2,533,998 UART: [kat] ECC-384
4,827,179 UART: [kat] HMAC-384Kdf
4,840,326 UART: [kat] LMS
6,030,643 UART: [kat] --
6,035,075 UART: [cold-reset] ++
6,036,956 UART: [fht] Storing FHT @ 0x50003400
6,048,497 UART: [idev] ++
6,049,071 UART: [idev] CDI.KEYID = 6
6,050,017 UART: [idev] SUBJECT.KEYID = 7
6,051,287 UART: [idev] UDS.KEYID = 0
6,053,909 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,197,257 UART: [idev] Erasing UDS.KEYID = 0
9,386,208 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,530 UART: [idev] --
9,411,581 UART: [ldev] ++
9,412,154 UART: [ldev] CDI.KEYID = 6
9,413,123 UART: [ldev] SUBJECT.KEYID = 5
9,414,380 UART: [ldev] AUTHORITY.KEYID = 7
9,415,620 UART: [ldev] FE.KEYID = 1
9,461,377 UART: [ldev] Erasing FE.KEYID = 1
12,796,240 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,108,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,122,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,137,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,152,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,171,780 UART: [ldev] --
15,176,209 UART: [fwproc] Waiting for Commands...
15,179,229 UART: [fwproc] Received command 0x46574c44
15,181,474 UART: [fwproc] Received Image of size 113844 bytes
19,233,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,299,317 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,368,239 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,684,467 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,786,022 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,117,125 >>> mbox cmd response: failed
17,117,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,118,058 >>> mbox cmd response: failed
17,118,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,118,621 >>> mbox cmd response: failed
Initializing fuses
2,047,146 writing to cptra_bootfsm_go
5,845,731 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,896,001 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,551 UART:
192,922 UART: Running Caliptra ROM ...
194,047 UART:
603,625 UART: [state] CFI Enabled
618,065 UART: [state] LifecycleState = Unprovisioned
619,986 UART: [state] DebugLocked = No
622,901 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,955 UART: [kat] SHA2-256
796,719 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,238 UART: [kat] ++
807,706 UART: [kat] sha1
817,504 UART: [kat] SHA2-256
820,223 UART: [kat] SHA2-384
826,912 UART: [kat] SHA2-512-ACC
829,303 UART: [kat] ECC-384
3,113,959 UART: [kat] HMAC-384Kdf
3,125,339 UART: [kat] LMS
4,315,450 UART: [kat] --
4,319,732 UART: [cold-reset] ++
4,321,564 UART: [fht] Storing FHT @ 0x50003400
4,333,102 UART: [idev] ++
4,333,707 UART: [idev] CDI.KEYID = 6
4,334,622 UART: [idev] SUBJECT.KEYID = 7
4,335,893 UART: [idev] UDS.KEYID = 0
4,338,555 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,567 UART: [idev] Erasing UDS.KEYID = 0
7,624,666 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,789 UART: [idev] --
7,650,387 UART: [ldev] ++
7,650,957 UART: [ldev] CDI.KEYID = 6
7,652,083 UART: [ldev] SUBJECT.KEYID = 5
7,653,192 UART: [ldev] AUTHORITY.KEYID = 7
7,654,368 UART: [ldev] FE.KEYID = 1
7,664,643 UART: [ldev] Erasing FE.KEYID = 1
10,951,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,284 UART: [ldev] --
13,310,319 UART: [fwproc] Waiting for Commands...
13,313,117 UART: [fwproc] Received command 0x46574c44
13,315,374 UART: [fwproc] Received Image of size 113844 bytes
17,365,491 UART: ROM Fatal Error: 0x000B0016
17,368,954 >>> mbox cmd response: failed
17,369,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,712 >>> mbox cmd response: failed
17,370,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,370,357 >>> mbox cmd response: failed
Initializing fuses
2,057,559 writing to cptra_bootfsm_go
2,246,863 UART:
2,247,213 UART: Running Caliptra ROM ...
2,248,265 UART:
3,095,776 UART: [state] CFI Enabled
3,107,733 UART: [state] LifecycleState = Unprovisioned
3,109,653 UART: [state] DebugLocked = No
3,110,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,116,395 UART: [kat] SHA2-256
3,286,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,296,659 UART: [kat] ++
3,297,118 UART: [kat] sha1
3,307,197 UART: [kat] SHA2-256
3,309,894 UART: [kat] SHA2-384
3,315,343 UART: [kat] SHA2-512-ACC
3,317,705 UART: [kat] ECC-384
5,601,773 UART: [kat] HMAC-384Kdf
5,612,903 UART: [kat] LMS
6,803,056 UART: [kat] --
6,806,348 UART: [cold-reset] ++
6,807,305 UART: [fht] Storing FHT @ 0x50003400
6,818,541 UART: [idev] ++
6,819,109 UART: [idev] CDI.KEYID = 6
6,820,023 UART: [idev] SUBJECT.KEYID = 7
6,821,295 UART: [idev] UDS.KEYID = 0
6,823,867 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,967,368 UART: [idev] Erasing UDS.KEYID = 0
10,107,562 UART: [idev] Using Sha1 for KeyId Algorithm
10,127,960 UART: [idev] --
10,132,221 UART: [ldev] ++
10,132,788 UART: [ldev] CDI.KEYID = 6
10,133,754 UART: [ldev] SUBJECT.KEYID = 5
10,135,032 UART: [ldev] AUTHORITY.KEYID = 7
10,136,215 UART: [ldev] FE.KEYID = 1
10,146,754 UART: [ldev] Erasing FE.KEYID = 1
13,432,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,726,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,741,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,755,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,770,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,788,576 UART: [ldev] --
15,794,058 UART: [fwproc] Waiting for Commands...
15,795,943 UART: [fwproc] Received command 0x46574c44
15,798,137 UART: [fwproc] Received Image of size 113844 bytes
19,850,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,927,251 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,996,122 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,312,746 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,127,249 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,333,487 >>> mbox cmd response: failed
17,334,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,632 >>> mbox cmd response: failed
17,334,897 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,335,189 >>> mbox cmd response: failed
Initializing fuses
2,049,505 writing to cptra_bootfsm_go
6,661,383 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,598,658 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
192,253 UART:
192,614 UART: Running Caliptra ROM ...
193,802 UART:
193,960 UART: [state] CFI Enabled
262,305 UART: [state] LifecycleState = Unprovisioned
264,223 UART: [state] DebugLocked = No
266,854 UART: [state] WD Timer not started. Device not locked for debugging
270,528 UART: [kat] SHA2-256
449,644 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,218 UART: [kat] ++
461,754 UART: [kat] sha1
473,288 UART: [kat] SHA2-256
476,357 UART: [kat] SHA2-384
482,436 UART: [kat] SHA2-512-ACC
485,367 UART: [kat] ECC-384
2,948,247 UART: [kat] HMAC-384Kdf
2,971,738 UART: [kat] LMS
3,501,158 UART: [kat] --
3,506,668 UART: [cold-reset] ++
3,508,499 UART: [fht] FHT @ 0x50003400
3,520,616 UART: [idev] ++
3,521,182 UART: [idev] CDI.KEYID = 6
3,522,151 UART: [idev] SUBJECT.KEYID = 7
3,523,254 UART: [idev] UDS.KEYID = 0
3,526,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,101 UART: [idev] Erasing UDS.KEYID = 0
6,024,895 UART: [idev] Sha1 KeyId Algorithm
6,049,116 UART: [idev] --
6,052,095 UART: [ldev] ++
6,052,674 UART: [ldev] CDI.KEYID = 6
6,053,591 UART: [ldev] SUBJECT.KEYID = 5
6,054,773 UART: [ldev] AUTHORITY.KEYID = 7
6,056,214 UART: [ldev] FE.KEYID = 1
6,101,078 UART: [ldev] Erasing FE.KEYID = 1
8,608,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,813 UART: [ldev] --
10,416,186 UART: [fwproc] Wait for Commands...
10,419,036 UART: [fwproc] Recv command 0x46574c44
10,421,136 UART: [fwproc] Recv'd Img size: 114168 bytes
13,819,203 UART: ROM Fatal Error: 0x000B0016
13,822,332 >>> mbox cmd response: failed
13,822,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,823,119 >>> mbox cmd response: failed
13,823,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,823,748 >>> mbox cmd response: failed
Initializing fuses
2,053,330 writing to cptra_bootfsm_go
2,242,628 UART:
2,242,969 UART: Running Caliptra ROM ...
2,244,010 UART:
2,244,164 UART: [state] CFI Enabled
2,315,796 UART: [state] LifecycleState = Unprovisioned
2,317,677 UART: [state] DebugLocked = No
2,320,065 UART: [state] WD Timer not started. Device not locked for debugging
2,323,383 UART: [kat] SHA2-256
2,502,506 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,063 UART: [kat] ++
2,514,617 UART: [kat] sha1
2,525,893 UART: [kat] SHA2-256
2,528,967 UART: [kat] SHA2-384
2,535,110 UART: [kat] SHA2-512-ACC
2,538,052 UART: [kat] ECC-384
5,001,548 UART: [kat] HMAC-384Kdf
5,025,990 UART: [kat] LMS
5,555,432 UART: [kat] --
5,559,497 UART: [cold-reset] ++
5,560,897 UART: [fht] FHT @ 0x50003400
5,571,015 UART: [idev] ++
5,571,584 UART: [idev] CDI.KEYID = 6
5,572,551 UART: [idev] SUBJECT.KEYID = 7
5,573,713 UART: [idev] UDS.KEYID = 0
5,576,478 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,720,227 UART: [idev] Erasing UDS.KEYID = 0
8,080,954 UART: [idev] Sha1 KeyId Algorithm
8,104,190 UART: [idev] --
8,108,625 UART: [ldev] ++
8,109,200 UART: [ldev] CDI.KEYID = 6
8,110,110 UART: [ldev] SUBJECT.KEYID = 5
8,111,267 UART: [ldev] AUTHORITY.KEYID = 7
8,112,501 UART: [ldev] FE.KEYID = 1
8,153,619 UART: [ldev] Erasing FE.KEYID = 1
10,655,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,173 UART: [ldev] --
12,469,112 UART: [fwproc] Wait for Commands...
12,471,443 UART: [fwproc] Recv command 0x46574c44
12,473,524 UART: [fwproc] Recv'd Img size: 114168 bytes
15,874,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,951,298 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,020,054 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,338,300 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,380,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,625,594 >>> mbox cmd response: failed
13,626,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,626,517 >>> mbox cmd response: failed
13,626,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,627,080 >>> mbox cmd response: failed
Initializing fuses
2,050,661 writing to cptra_bootfsm_go
5,432,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,131,651 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,674 UART:
193,035 UART: Running Caliptra ROM ...
194,150 UART:
603,772 UART: [state] CFI Enabled
614,113 UART: [state] LifecycleState = Unprovisioned
615,944 UART: [state] DebugLocked = No
618,570 UART: [state] WD Timer not started. Device not locked for debugging
623,051 UART: [kat] SHA2-256
802,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,752 UART: [kat] ++
814,236 UART: [kat] sha1
824,588 UART: [kat] SHA2-256
827,633 UART: [kat] SHA2-384
833,833 UART: [kat] SHA2-512-ACC
836,819 UART: [kat] ECC-384
3,277,639 UART: [kat] HMAC-384Kdf
3,289,578 UART: [kat] LMS
3,819,062 UART: [kat] --
3,820,975 UART: [cold-reset] ++
3,822,264 UART: [fht] FHT @ 0x50003400
3,833,307 UART: [idev] ++
3,833,873 UART: [idev] CDI.KEYID = 6
3,834,782 UART: [idev] SUBJECT.KEYID = 7
3,836,005 UART: [idev] UDS.KEYID = 0
3,838,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,982,550 UART: [idev] Erasing UDS.KEYID = 0
6,311,114 UART: [idev] Sha1 KeyId Algorithm
6,334,066 UART: [idev] --
6,337,687 UART: [ldev] ++
6,338,254 UART: [ldev] CDI.KEYID = 6
6,339,163 UART: [ldev] SUBJECT.KEYID = 5
6,340,319 UART: [ldev] AUTHORITY.KEYID = 7
6,341,603 UART: [ldev] FE.KEYID = 1
6,352,034 UART: [ldev] Erasing FE.KEYID = 1
8,823,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,540,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,556,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,572,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,042 UART: [ldev] --
10,613,342 UART: [fwproc] Wait for Commands...
10,615,344 UART: [fwproc] Recv command 0x46574c44
10,617,445 UART: [fwproc] Recv'd Img size: 114168 bytes
14,007,879 UART: ROM Fatal Error: 0x000B0016
14,010,962 >>> mbox cmd response: failed
14,011,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,011,735 >>> mbox cmd response: failed
14,012,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,012,339 >>> mbox cmd response: failed
Initializing fuses
2,053,200 writing to cptra_bootfsm_go
2,242,489 UART:
2,242,841 UART: Running Caliptra ROM ...
2,243,947 UART:
6,449,114 UART: [state] CFI Enabled
6,463,113 UART: [state] LifecycleState = Unprovisioned
6,464,973 UART: [state] DebugLocked = No
6,467,824 UART: [state] WD Timer not started. Device not locked for debugging
6,470,650 UART: [kat] SHA2-256
6,649,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,661,384 UART: [kat] ++
6,661,934 UART: [kat] sha1
6,674,556 UART: [kat] SHA2-256
6,677,555 UART: [kat] SHA2-384
6,683,604 UART: [kat] SHA2-512-ACC
6,686,560 UART: [kat] ECC-384
9,129,047 UART: [kat] HMAC-384Kdf
9,141,329 UART: [kat] LMS
9,670,781 UART: [kat] --
9,676,950 UART: [cold-reset] ++
9,679,102 UART: [fht] FHT @ 0x50003400
9,689,809 UART: [idev] ++
9,690,379 UART: [idev] CDI.KEYID = 6
9,691,267 UART: [idev] SUBJECT.KEYID = 7
9,692,481 UART: [idev] UDS.KEYID = 0
9,695,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,838,575 UART: [idev] Erasing UDS.KEYID = 0
12,167,593 UART: [idev] Sha1 KeyId Algorithm
12,189,744 UART: [idev] --
12,193,771 UART: [ldev] ++
12,194,370 UART: [ldev] CDI.KEYID = 6
12,195,285 UART: [ldev] SUBJECT.KEYID = 5
12,196,444 UART: [ldev] AUTHORITY.KEYID = 7
12,197,675 UART: [ldev] FE.KEYID = 1
12,207,890 UART: [ldev] Erasing FE.KEYID = 1
14,678,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,395,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,411,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,427,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,442,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,463,824 UART: [ldev] --
16,468,334 UART: [fwproc] Wait for Commands...
16,470,056 UART: [fwproc] Recv command 0x46574c44
16,472,100 UART: [fwproc] Recv'd Img size: 114168 bytes
19,866,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,937,342 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,006,144 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,322,750 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,692,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,817,043 >>> mbox cmd response: failed
13,817,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,817,977 >>> mbox cmd response: failed
13,818,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,818,564 >>> mbox cmd response: failed
Initializing fuses
2,052,379 writing to cptra_bootfsm_go
9,744,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,323,143 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
192,351 UART:
192,756 UART: Running Caliptra ROM ...
193,940 UART:
194,095 UART: [state] CFI Enabled
266,987 UART: [state] LifecycleState = Unprovisioned
269,410 UART: [state] DebugLocked = No
272,253 UART: [state] WD Timer not started. Device not locked for debugging
276,913 UART: [kat] SHA2-256
466,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,560 UART: [kat] ++
478,039 UART: [kat] sha1
490,758 UART: [kat] SHA2-256
493,782 UART: [kat] SHA2-384
498,199 UART: [kat] SHA2-512-ACC
500,819 UART: [kat] ECC-384
2,947,351 UART: [kat] HMAC-384Kdf
2,963,104 UART: [kat] LMS
3,494,924 UART: [kat] --
3,500,887 UART: [cold-reset] ++
3,501,960 UART: [fht] FHT @ 0x50003400
3,513,532 UART: [idev] ++
3,514,208 UART: [idev] CDI.KEYID = 6
3,515,170 UART: [idev] SUBJECT.KEYID = 7
3,516,382 UART: [idev] UDS.KEYID = 0
3,519,313 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,663,144 UART: [idev] Erasing UDS.KEYID = 0
6,024,336 UART: [idev] Sha1 KeyId Algorithm
6,046,888 UART: [idev] --
6,051,861 UART: [ldev] ++
6,052,601 UART: [ldev] CDI.KEYID = 6
6,053,514 UART: [ldev] SUBJECT.KEYID = 5
6,054,830 UART: [ldev] AUTHORITY.KEYID = 7
6,056,025 UART: [ldev] FE.KEYID = 1
6,085,104 UART: [ldev] Erasing FE.KEYID = 1
8,590,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,178 UART: [ldev] --
10,397,346 UART: [fwproc] Wait for Commands...
10,399,774 UART: [fwproc] Recv command 0x46574c44
10,402,096 UART: [fwproc] Recv'd Img size: 114168 bytes
13,838,642 UART: ROM Fatal Error: 0x000B0016
13,842,309 >>> mbox cmd response: failed
13,842,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,843,013 >>> mbox cmd response: failed
13,843,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,843,577 >>> mbox cmd response: failed
Initializing fuses
2,052,969 writing to cptra_bootfsm_go
2,242,362 UART:
2,242,731 UART: Running Caliptra ROM ...
2,243,810 UART:
2,243,971 UART: [state] CFI Enabled
2,321,798 UART: [state] LifecycleState = Unprovisioned
2,324,181 UART: [state] DebugLocked = No
2,326,167 UART: [state] WD Timer not started. Device not locked for debugging
2,330,321 UART: [kat] SHA2-256
2,520,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,000 UART: [kat] ++
2,531,486 UART: [kat] sha1
2,542,166 UART: [kat] SHA2-256
2,545,168 UART: [kat] SHA2-384
2,550,786 UART: [kat] SHA2-512-ACC
2,553,357 UART: [kat] ECC-384
5,001,524 UART: [kat] HMAC-384Kdf
5,028,880 UART: [kat] LMS
5,560,616 UART: [kat] --
5,564,063 UART: [cold-reset] ++
5,565,783 UART: [fht] FHT @ 0x50003400
5,576,278 UART: [idev] ++
5,576,987 UART: [idev] CDI.KEYID = 6
5,577,929 UART: [idev] SUBJECT.KEYID = 7
5,579,153 UART: [idev] UDS.KEYID = 0
5,581,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,725,818 UART: [idev] Erasing UDS.KEYID = 0
8,098,019 UART: [idev] Sha1 KeyId Algorithm
8,119,586 UART: [idev] --
8,125,232 UART: [ldev] ++
8,125,923 UART: [ldev] CDI.KEYID = 6
8,126,835 UART: [ldev] SUBJECT.KEYID = 5
8,127,994 UART: [ldev] AUTHORITY.KEYID = 7
8,129,225 UART: [ldev] FE.KEYID = 1
8,170,450 UART: [ldev] Erasing FE.KEYID = 1
10,678,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,412,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,427,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,442,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,457,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,479,172 UART: [ldev] --
12,485,471 UART: [fwproc] Wait for Commands...
12,487,299 UART: [fwproc] Recv command 0x46574c44
12,489,570 UART: [fwproc] Recv'd Img size: 114168 bytes
15,936,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,010,947 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,127,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,668,240 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,440,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,281,295 >>> mbox cmd response: failed
14,281,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,282,334 >>> mbox cmd response: failed
14,282,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,282,918 >>> mbox cmd response: failed
Initializing fuses
2,049,763 writing to cptra_bootfsm_go
5,474,949 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,764,705 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,465 UART:
192,826 UART: Running Caliptra ROM ...
193,934 UART:
603,735 UART: [state] CFI Enabled
619,415 UART: [state] LifecycleState = Unprovisioned
621,796 UART: [state] DebugLocked = No
624,365 UART: [state] WD Timer not started. Device not locked for debugging
628,588 UART: [kat] SHA2-256
818,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,240 UART: [kat] ++
829,822 UART: [kat] sha1
840,655 UART: [kat] SHA2-256
843,673 UART: [kat] SHA2-384
849,760 UART: [kat] SHA2-512-ACC
852,316 UART: [kat] ECC-384
3,292,614 UART: [kat] HMAC-384Kdf
3,306,207 UART: [kat] LMS
3,838,069 UART: [kat] --
3,842,622 UART: [cold-reset] ++
3,845,230 UART: [fht] FHT @ 0x50003400
3,857,734 UART: [idev] ++
3,858,452 UART: [idev] CDI.KEYID = 6
3,859,374 UART: [idev] SUBJECT.KEYID = 7
3,860,535 UART: [idev] UDS.KEYID = 0
3,863,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,974 UART: [idev] Erasing UDS.KEYID = 0
6,339,016 UART: [idev] Sha1 KeyId Algorithm
6,360,807 UART: [idev] --
6,365,556 UART: [ldev] ++
6,366,237 UART: [ldev] CDI.KEYID = 6
6,367,128 UART: [ldev] SUBJECT.KEYID = 5
6,368,341 UART: [ldev] AUTHORITY.KEYID = 7
6,369,467 UART: [ldev] FE.KEYID = 1
6,382,057 UART: [ldev] Erasing FE.KEYID = 1
8,861,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,366 UART: [ldev] --
10,651,854 UART: [fwproc] Wait for Commands...
10,654,645 UART: [fwproc] Recv command 0x46574c44
10,656,912 UART: [fwproc] Recv'd Img size: 114168 bytes
14,104,479 UART: ROM Fatal Error: 0x000B0016
14,108,109 >>> mbox cmd response: failed
14,108,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,108,865 >>> mbox cmd response: failed
14,109,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,109,412 >>> mbox cmd response: failed
Initializing fuses
2,052,930 writing to cptra_bootfsm_go
2,242,229 UART:
2,242,573 UART: Running Caliptra ROM ...
2,243,714 UART:
6,357,642 UART: [state] CFI Enabled
6,367,647 UART: [state] LifecycleState = Unprovisioned
6,370,001 UART: [state] DebugLocked = No
6,372,630 UART: [state] WD Timer not started. Device not locked for debugging
6,377,631 UART: [kat] SHA2-256
6,567,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,578,266 UART: [kat] ++
6,578,812 UART: [kat] sha1
6,591,001 UART: [kat] SHA2-256
6,594,029 UART: [kat] SHA2-384
6,599,881 UART: [kat] SHA2-512-ACC
6,602,457 UART: [kat] ECC-384
9,043,462 UART: [kat] HMAC-384Kdf
9,057,000 UART: [kat] LMS
9,588,810 UART: [kat] --
9,593,828 UART: [cold-reset] ++
9,596,029 UART: [fht] FHT @ 0x50003400
9,607,822 UART: [idev] ++
9,608,552 UART: [idev] CDI.KEYID = 6
9,609,463 UART: [idev] SUBJECT.KEYID = 7
9,610,682 UART: [idev] UDS.KEYID = 0
9,613,299 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,756,810 UART: [idev] Erasing UDS.KEYID = 0
12,083,554 UART: [idev] Sha1 KeyId Algorithm
12,104,691 UART: [idev] --
12,110,084 UART: [ldev] ++
12,110,782 UART: [ldev] CDI.KEYID = 6
12,111,663 UART: [ldev] SUBJECT.KEYID = 5
12,112,873 UART: [ldev] AUTHORITY.KEYID = 7
12,114,105 UART: [ldev] FE.KEYID = 1
12,125,753 UART: [ldev] Erasing FE.KEYID = 1
14,601,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,322,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,337,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,352,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,367,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,387,725 UART: [ldev] --
16,393,764 UART: [fwproc] Wait for Commands...
16,395,703 UART: [fwproc] Recv command 0x46574c44
16,398,026 UART: [fwproc] Recv'd Img size: 114168 bytes
19,839,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,914,956 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,031,093 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,572,390 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,758,436 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,490,844 >>> mbox cmd response: failed
14,491,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,491,719 >>> mbox cmd response: failed
14,491,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,492,284 >>> mbox cmd response: failed
Initializing fuses
2,049,351 writing to cptra_bootfsm_go
9,140,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,337,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,667 UART: [kat] SHA2-256
881,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,713 UART: [kat] ++
885,865 UART: [kat] sha1
890,225 UART: [kat] SHA2-256
892,163 UART: [kat] SHA2-384
894,762 UART: [kat] SHA2-512-ACC
896,663 UART: [kat] ECC-384
901,926 UART: [kat] HMAC-384Kdf
906,346 UART: [kat] LMS
1,474,542 UART: [kat] --
1,475,383 UART: [cold-reset] ++
1,475,815 UART: [fht] Storing FHT @ 0x50003400
1,478,438 UART: [idev] ++
1,478,606 UART: [idev] CDI.KEYID = 6
1,478,966 UART: [idev] SUBJECT.KEYID = 7
1,479,390 UART: [idev] UDS.KEYID = 0
1,479,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,486,964 UART: [idev] Erasing UDS.KEYID = 0
1,503,042 UART: [idev] Using Sha1 for KeyId Algorithm
1,511,910 UART: [idev] --
1,513,085 UART: [ldev] ++
1,513,253 UART: [ldev] CDI.KEYID = 6
1,513,616 UART: [ldev] SUBJECT.KEYID = 5
1,514,042 UART: [ldev] AUTHORITY.KEYID = 7
1,514,505 UART: [ldev] FE.KEYID = 1
1,519,813 UART: [ldev] Erasing FE.KEYID = 1
1,544,430 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,557,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,270 UART: [ldev] --
1,583,665 UART: [fwproc] Waiting for Commands...
1,584,344 UART: [fwproc] Received command 0x46574c44
1,585,135 UART: [fwproc] Received Image of size 114168 bytes
2,880,357 UART: ROM Fatal Error: 0x000B0016
2,881,514 >>> mbox cmd response: failed
2,881,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,881,520 >>> mbox cmd response: failed
2,881,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,881,526 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,981 UART: [kat] SHA2-256
881,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,027 UART: [kat] ++
886,179 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,042 UART: [kat] SHA2-512-ACC
896,943 UART: [kat] ECC-384
902,136 UART: [kat] HMAC-384Kdf
906,670 UART: [kat] LMS
1,474,866 UART: [kat] --
1,475,615 UART: [cold-reset] ++
1,476,061 UART: [fht] Storing FHT @ 0x50003400
1,478,994 UART: [idev] ++
1,479,162 UART: [idev] CDI.KEYID = 6
1,479,522 UART: [idev] SUBJECT.KEYID = 7
1,479,946 UART: [idev] UDS.KEYID = 0
1,480,291 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,842 UART: [idev] Erasing UDS.KEYID = 0
1,504,156 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,796 UART: [idev] --
1,513,807 UART: [ldev] ++
1,513,975 UART: [ldev] CDI.KEYID = 6
1,514,338 UART: [ldev] SUBJECT.KEYID = 5
1,514,764 UART: [ldev] AUTHORITY.KEYID = 7
1,515,227 UART: [ldev] FE.KEYID = 1
1,520,313 UART: [ldev] Erasing FE.KEYID = 1
1,545,896 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,698 UART: [ldev] --
1,585,127 UART: [fwproc] Waiting for Commands...
1,585,826 UART: [fwproc] Received command 0x46574c44
1,586,617 UART: [fwproc] Received Image of size 114168 bytes
2,881,836 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,548 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,900 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,447 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,735,255 >>> mbox cmd response: failed
2,735,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,261 >>> mbox cmd response: failed
2,735,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,735,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,253 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,390 UART: [kat] SHA2-256
882,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,436 UART: [kat] ++
886,588 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,617 UART: [kat] HMAC-384Kdf
907,153 UART: [kat] LMS
1,475,349 UART: [kat] --
1,476,294 UART: [cold-reset] ++
1,476,786 UART: [fht] Storing FHT @ 0x50003400
1,479,573 UART: [idev] ++
1,479,741 UART: [idev] CDI.KEYID = 6
1,480,101 UART: [idev] SUBJECT.KEYID = 7
1,480,525 UART: [idev] UDS.KEYID = 0
1,480,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,543 UART: [idev] Erasing UDS.KEYID = 0
1,505,231 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,899 UART: [idev] --
1,515,152 UART: [ldev] ++
1,515,320 UART: [ldev] CDI.KEYID = 6
1,515,683 UART: [ldev] SUBJECT.KEYID = 5
1,516,109 UART: [ldev] AUTHORITY.KEYID = 7
1,516,572 UART: [ldev] FE.KEYID = 1
1,521,880 UART: [ldev] Erasing FE.KEYID = 1
1,547,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,027 UART: [ldev] --
1,586,494 UART: [fwproc] Waiting for Commands...
1,587,245 UART: [fwproc] Received command 0x46574c44
1,588,036 UART: [fwproc] Received Image of size 114168 bytes
2,882,776 UART: ROM Fatal Error: 0x000B0016
2,883,933 >>> mbox cmd response: failed
2,883,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,939 >>> mbox cmd response: failed
2,883,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,025 UART: [state] LifecycleState = Unprovisioned
86,680 UART: [state] DebugLocked = No
87,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,004 UART: [kat] SHA2-256
882,935 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,050 UART: [kat] ++
887,202 UART: [kat] sha1
891,332 UART: [kat] SHA2-256
893,270 UART: [kat] SHA2-384
895,943 UART: [kat] SHA2-512-ACC
897,844 UART: [kat] ECC-384
903,301 UART: [kat] HMAC-384Kdf
907,751 UART: [kat] LMS
1,475,947 UART: [kat] --
1,476,596 UART: [cold-reset] ++
1,477,150 UART: [fht] Storing FHT @ 0x50003400
1,480,159 UART: [idev] ++
1,480,327 UART: [idev] CDI.KEYID = 6
1,480,687 UART: [idev] SUBJECT.KEYID = 7
1,481,111 UART: [idev] UDS.KEYID = 0
1,481,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,313 UART: [idev] Erasing UDS.KEYID = 0
1,505,853 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,615 UART: [idev] --
1,515,656 UART: [ldev] ++
1,515,824 UART: [ldev] CDI.KEYID = 6
1,516,187 UART: [ldev] SUBJECT.KEYID = 5
1,516,613 UART: [ldev] AUTHORITY.KEYID = 7
1,517,076 UART: [ldev] FE.KEYID = 1
1,522,730 UART: [ldev] Erasing FE.KEYID = 1
1,548,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,533 UART: [ldev] --
1,588,010 UART: [fwproc] Waiting for Commands...
1,588,729 UART: [fwproc] Received command 0x46574c44
1,589,520 UART: [fwproc] Received Image of size 114168 bytes
2,885,035 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,239 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,270 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,738,802 >>> mbox cmd response: failed
2,738,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,808 >>> mbox cmd response: failed
2,738,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,514 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,496 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
893,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,761 UART: [kat] ++
897,913 UART: [kat] sha1
902,161 UART: [kat] SHA2-256
904,101 UART: [kat] SHA2-384
906,842 UART: [kat] SHA2-512-ACC
908,743 UART: [kat] ECC-384
918,614 UART: [kat] HMAC-384Kdf
923,070 UART: [kat] LMS
1,171,398 UART: [kat] --
1,172,419 UART: [cold-reset] ++
1,172,955 UART: [fht] FHT @ 0x50003400
1,175,472 UART: [idev] ++
1,175,640 UART: [idev] CDI.KEYID = 6
1,176,000 UART: [idev] SUBJECT.KEYID = 7
1,176,424 UART: [idev] UDS.KEYID = 0
1,176,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,216 UART: [idev] Erasing UDS.KEYID = 0
1,201,493 UART: [idev] Sha1 KeyId Algorithm
1,210,149 UART: [idev] --
1,211,425 UART: [ldev] ++
1,211,593 UART: [ldev] CDI.KEYID = 6
1,211,956 UART: [ldev] SUBJECT.KEYID = 5
1,212,382 UART: [ldev] AUTHORITY.KEYID = 7
1,212,845 UART: [ldev] FE.KEYID = 1
1,218,125 UART: [ldev] Erasing FE.KEYID = 1
1,244,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,703 UART: [ldev] --
1,284,152 UART: [fwproc] Wait for Commands...
1,284,856 UART: [fwproc] Recv command 0x46574c44
1,285,584 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,596 UART: ROM Fatal Error: 0x000B0016
2,581,753 >>> mbox cmd response: failed
2,581,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,759 >>> mbox cmd response: failed
2,581,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,904 UART: [kat] SHA2-512-ACC
908,805 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
922,748 UART: [kat] LMS
1,171,076 UART: [kat] --
1,171,827 UART: [cold-reset] ++
1,172,221 UART: [fht] FHT @ 0x50003400
1,174,844 UART: [idev] ++
1,175,012 UART: [idev] CDI.KEYID = 6
1,175,372 UART: [idev] SUBJECT.KEYID = 7
1,175,796 UART: [idev] UDS.KEYID = 0
1,176,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,523 UART: [idev] Sha1 KeyId Algorithm
1,209,003 UART: [idev] --
1,210,087 UART: [ldev] ++
1,210,255 UART: [ldev] CDI.KEYID = 6
1,210,618 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,905 UART: [ldev] --
1,282,410 UART: [fwproc] Wait for Commands...
1,283,166 UART: [fwproc] Recv command 0x46574c44
1,283,894 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,813 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,262 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,339 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,778 >>> mbox cmd response: failed
2,433,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,784 >>> mbox cmd response: failed
2,433,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,879 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,864 UART: [kat] SHA2-256
903,804 UART: [kat] SHA2-384
906,499 UART: [kat] SHA2-512-ACC
908,400 UART: [kat] ECC-384
918,405 UART: [kat] HMAC-384Kdf
922,805 UART: [kat] LMS
1,171,133 UART: [kat] --
1,172,328 UART: [cold-reset] ++
1,172,802 UART: [fht] FHT @ 0x50003400
1,175,253 UART: [idev] ++
1,175,421 UART: [idev] CDI.KEYID = 6
1,175,781 UART: [idev] SUBJECT.KEYID = 7
1,176,205 UART: [idev] UDS.KEYID = 0
1,176,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,219 UART: [idev] Erasing UDS.KEYID = 0
1,201,628 UART: [idev] Sha1 KeyId Algorithm
1,210,236 UART: [idev] --
1,211,256 UART: [ldev] ++
1,211,424 UART: [ldev] CDI.KEYID = 6
1,211,787 UART: [ldev] SUBJECT.KEYID = 5
1,212,213 UART: [ldev] AUTHORITY.KEYID = 7
1,212,676 UART: [ldev] FE.KEYID = 1
1,218,018 UART: [ldev] Erasing FE.KEYID = 1
1,244,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,706 UART: [ldev] --
1,284,187 UART: [fwproc] Wait for Commands...
1,284,875 UART: [fwproc] Recv command 0x46574c44
1,285,603 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,847 UART: ROM Fatal Error: 0x000B0016
2,582,004 >>> mbox cmd response: failed
2,582,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,010 >>> mbox cmd response: failed
2,582,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
893,539 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,664 UART: [kat] ++
897,816 UART: [kat] sha1
901,974 UART: [kat] SHA2-256
903,914 UART: [kat] SHA2-384
906,647 UART: [kat] SHA2-512-ACC
908,548 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,049 UART: [kat] LMS
1,171,377 UART: [kat] --
1,172,266 UART: [cold-reset] ++
1,172,838 UART: [fht] FHT @ 0x50003400
1,175,535 UART: [idev] ++
1,175,703 UART: [idev] CDI.KEYID = 6
1,176,063 UART: [idev] SUBJECT.KEYID = 7
1,176,487 UART: [idev] UDS.KEYID = 0
1,176,832 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,087 UART: [idev] Erasing UDS.KEYID = 0
1,201,570 UART: [idev] Sha1 KeyId Algorithm
1,209,924 UART: [idev] --
1,211,058 UART: [ldev] ++
1,211,226 UART: [ldev] CDI.KEYID = 6
1,211,589 UART: [ldev] SUBJECT.KEYID = 5
1,212,015 UART: [ldev] AUTHORITY.KEYID = 7
1,212,478 UART: [ldev] FE.KEYID = 1
1,217,718 UART: [ldev] Erasing FE.KEYID = 1
1,244,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,616 UART: [ldev] --
1,282,943 UART: [fwproc] Wait for Commands...
1,283,517 UART: [fwproc] Recv command 0x46574c44
1,284,245 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,824 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,273 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,138 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,436,815 >>> mbox cmd response: failed
2,436,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,821 >>> mbox cmd response: failed
2,436,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,827 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,736 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
891,322 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,451 UART: [kat] ++
895,603 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,120 UART: [kat] HMAC-384Kdf
920,722 UART: [kat] LMS
1,169,034 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,053 UART: [idev] ++
1,173,221 UART: [idev] CDI.KEYID = 6
1,173,582 UART: [idev] SUBJECT.KEYID = 7
1,174,007 UART: [idev] UDS.KEYID = 0
1,174,353 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,351 UART: [idev] Sha1 KeyId Algorithm
1,208,343 UART: [idev] --
1,209,586 UART: [ldev] ++
1,209,754 UART: [ldev] CDI.KEYID = 6
1,210,118 UART: [ldev] SUBJECT.KEYID = 5
1,210,545 UART: [ldev] AUTHORITY.KEYID = 7
1,211,008 UART: [ldev] FE.KEYID = 1
1,216,242 UART: [ldev] Erasing FE.KEYID = 1
1,242,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,642 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,755 UART: [fwproc] Recv command 0x46574c44
1,283,488 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,476 UART: ROM Fatal Error: 0x000B0016
2,579,633 >>> mbox cmd response: failed
2,579,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,639 >>> mbox cmd response: failed
2,579,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,645 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,220 UART: [kat] SHA2-512-ACC
906,121 UART: [kat] ECC-384
916,590 UART: [kat] HMAC-384Kdf
921,348 UART: [kat] LMS
1,169,660 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,170,811 UART: [fht] FHT @ 0x50003400
1,173,473 UART: [idev] ++
1,173,641 UART: [idev] CDI.KEYID = 6
1,174,002 UART: [idev] SUBJECT.KEYID = 7
1,174,427 UART: [idev] UDS.KEYID = 0
1,174,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,537 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,207,907 UART: [idev] --
1,208,830 UART: [ldev] ++
1,208,998 UART: [ldev] CDI.KEYID = 6
1,209,362 UART: [ldev] SUBJECT.KEYID = 5
1,209,789 UART: [ldev] AUTHORITY.KEYID = 7
1,210,252 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,241,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,930 UART: [fwproc] Wait for Commands...
1,281,641 UART: [fwproc] Recv command 0x46574c44
1,282,374 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,851 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,160 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,758 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,320 >>> mbox cmd response: failed
2,431,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,326 >>> mbox cmd response: failed
2,431,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,442 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,986 UART: [kat] SHA2-256
901,926 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,325 UART: [kat] HMAC-384Kdf
920,905 UART: [kat] LMS
1,169,217 UART: [kat] --
1,170,164 UART: [cold-reset] ++
1,170,698 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,344 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,384 UART: [idev] --
1,209,553 UART: [ldev] ++
1,209,721 UART: [ldev] CDI.KEYID = 6
1,210,085 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,229 UART: [ldev] --
1,281,513 UART: [fwproc] Wait for Commands...
1,282,098 UART: [fwproc] Recv command 0x46574c44
1,282,831 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,507 UART: ROM Fatal Error: 0x000B0016
2,578,664 >>> mbox cmd response: failed
2,578,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,670 >>> mbox cmd response: failed
2,578,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,702 UART: [kat] ++
895,854 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,168 UART: [cold-reset] ++
1,170,590 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,174,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,988 UART: [idev] Erasing UDS.KEYID = 0
1,199,066 UART: [idev] Sha1 KeyId Algorithm
1,207,922 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,239 UART: [ldev] --
1,281,577 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,927 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,034 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,409 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,863 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,295 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,541 >>> mbox cmd response: failed
2,431,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,547 >>> mbox cmd response: failed
2,431,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,927 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,237 UART:
192,594 UART: Running Caliptra ROM ...
193,764 UART:
193,920 UART: [state] CFI Enabled
260,264 UART: [state] LifecycleState = Unprovisioned
262,245 UART: [state] DebugLocked = No
264,497 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,674 UART: [kat] SHA2-256
438,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,841 UART: [kat] ++
449,322 UART: [kat] sha1
460,028 UART: [kat] SHA2-256
462,756 UART: [kat] SHA2-384
470,195 UART: [kat] SHA2-512-ACC
472,533 UART: [kat] ECC-384
2,765,172 UART: [kat] HMAC-384Kdf
2,796,521 UART: [kat] LMS
3,986,854 UART: [kat] --
3,991,298 UART: [cold-reset] ++
3,993,399 UART: [fht] Storing FHT @ 0x50003400
4,004,449 UART: [idev] ++
4,005,088 UART: [idev] CDI.KEYID = 6
4,006,007 UART: [idev] SUBJECT.KEYID = 7
4,007,232 UART: [idev] UDS.KEYID = 0
4,010,016 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,414 UART: [idev] Erasing UDS.KEYID = 0
7,344,308 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,352 UART: [idev] --
7,370,564 UART: [ldev] ++
7,371,130 UART: [ldev] CDI.KEYID = 6
7,372,148 UART: [ldev] SUBJECT.KEYID = 5
7,373,332 UART: [ldev] AUTHORITY.KEYID = 7
7,374,569 UART: [ldev] FE.KEYID = 1
7,422,658 UART: [ldev] Erasing FE.KEYID = 1
10,757,640 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,941 UART: [ldev] --
13,117,784 UART: [fwproc] Waiting for Commands...
13,120,586 UART: [fwproc] Received command 0x46574c44
13,122,772 UART: [fwproc] Received Image of size 113844 bytes
17,161,652 UART: ROM Fatal Error: 0x000B002A
17,165,058 >>> mbox cmd response: failed
17,165,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,165,820 >>> mbox cmd response: failed
17,166,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,166,400 >>> mbox cmd response: failed
Initializing fuses
2,053,435 writing to cptra_bootfsm_go
2,242,817 UART:
2,243,160 UART: Running Caliptra ROM ...
2,244,244 UART:
2,244,411 UART: [state] CFI Enabled
2,322,691 UART: [state] LifecycleState = Unprovisioned
2,324,681 UART: [state] DebugLocked = No
2,325,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,847 UART: [kat] SHA2-256
2,500,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,059 UART: [kat] ++
2,511,567 UART: [kat] sha1
2,523,753 UART: [kat] SHA2-256
2,526,443 UART: [kat] SHA2-384
2,531,348 UART: [kat] SHA2-512-ACC
2,533,700 UART: [kat] ECC-384
4,824,039 UART: [kat] HMAC-384Kdf
4,845,570 UART: [kat] LMS
6,035,882 UART: [kat] --
6,042,798 UART: [cold-reset] ++
6,043,820 UART: [fht] Storing FHT @ 0x50003400
6,056,013 UART: [idev] ++
6,056,584 UART: [idev] CDI.KEYID = 6
6,057,553 UART: [idev] SUBJECT.KEYID = 7
6,058,771 UART: [idev] UDS.KEYID = 0
6,061,105 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,204,490 UART: [idev] Erasing UDS.KEYID = 0
9,393,962 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,618 UART: [idev] --
9,419,881 UART: [ldev] ++
9,420,450 UART: [ldev] CDI.KEYID = 6
9,421,468 UART: [ldev] SUBJECT.KEYID = 5
9,422,664 UART: [ldev] AUTHORITY.KEYID = 7
9,423,900 UART: [ldev] FE.KEYID = 1
9,468,753 UART: [ldev] Erasing FE.KEYID = 1
12,803,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,115,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,130,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,159,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,989 UART: [ldev] --
15,183,281 UART: [fwproc] Waiting for Commands...
15,185,117 UART: [fwproc] Received command 0x46574c44
15,187,324 UART: [fwproc] Received Image of size 113844 bytes
19,236,512 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,304,107 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,373,013 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,688,484 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
3,809,368 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,138,516 >>> mbox cmd response: failed
17,139,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,139,523 >>> mbox cmd response: failed
17,139,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,140,033 >>> mbox cmd response: failed
Initializing fuses
2,054,074 writing to cptra_bootfsm_go
5,825,120 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,861,784 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,420 UART:
192,944 UART: Running Caliptra ROM ...
194,079 UART:
603,481 UART: [state] CFI Enabled
620,235 UART: [state] LifecycleState = Unprovisioned
622,157 UART: [state] DebugLocked = No
624,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,922 UART: [kat] SHA2-256
798,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,204 UART: [kat] ++
809,655 UART: [kat] sha1
819,945 UART: [kat] SHA2-256
822,644 UART: [kat] SHA2-384
828,785 UART: [kat] SHA2-512-ACC
831,124 UART: [kat] ECC-384
3,114,109 UART: [kat] HMAC-384Kdf
3,126,301 UART: [kat] LMS
4,316,382 UART: [kat] --
4,318,782 UART: [cold-reset] ++
4,320,413 UART: [fht] Storing FHT @ 0x50003400
4,331,682 UART: [idev] ++
4,332,286 UART: [idev] CDI.KEYID = 6
4,333,203 UART: [idev] SUBJECT.KEYID = 7
4,334,474 UART: [idev] UDS.KEYID = 0
4,337,486 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,546 UART: [idev] Erasing UDS.KEYID = 0
7,620,684 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,731 UART: [idev] --
7,646,540 UART: [ldev] ++
7,647,169 UART: [ldev] CDI.KEYID = 6
7,648,053 UART: [ldev] SUBJECT.KEYID = 5
7,649,270 UART: [ldev] AUTHORITY.KEYID = 7
7,650,561 UART: [ldev] FE.KEYID = 1
7,658,314 UART: [ldev] Erasing FE.KEYID = 1
10,948,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,872 UART: [ldev] --
13,308,887 UART: [fwproc] Waiting for Commands...
13,311,584 UART: [fwproc] Received command 0x46574c44
13,313,778 UART: [fwproc] Received Image of size 113844 bytes
17,357,128 UART: ROM Fatal Error: 0x000B002A
17,360,585 >>> mbox cmd response: failed
17,360,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,361,242 >>> mbox cmd response: failed
17,361,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,361,840 >>> mbox cmd response: failed
Initializing fuses
2,055,712 writing to cptra_bootfsm_go
2,245,109 UART:
2,245,611 UART: Running Caliptra ROM ...
2,246,693 UART:
3,096,127 UART: [state] CFI Enabled
3,108,690 UART: [state] LifecycleState = Unprovisioned
3,110,650 UART: [state] DebugLocked = No
3,112,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,117,524 UART: [kat] SHA2-256
3,287,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,297,764 UART: [kat] ++
3,298,227 UART: [kat] sha1
3,309,008 UART: [kat] SHA2-256
3,311,710 UART: [kat] SHA2-384
3,317,427 UART: [kat] SHA2-512-ACC
3,319,805 UART: [kat] ECC-384
5,605,132 UART: [kat] HMAC-384Kdf
5,617,793 UART: [kat] LMS
6,807,943 UART: [kat] --
6,814,053 UART: [cold-reset] ++
6,815,291 UART: [fht] Storing FHT @ 0x50003400
6,826,828 UART: [idev] ++
6,827,399 UART: [idev] CDI.KEYID = 6
6,828,311 UART: [idev] SUBJECT.KEYID = 7
6,829,579 UART: [idev] UDS.KEYID = 0
6,831,779 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,974,869 UART: [idev] Erasing UDS.KEYID = 0
10,113,281 UART: [idev] Using Sha1 for KeyId Algorithm
10,134,957 UART: [idev] --
10,138,098 UART: [ldev] ++
10,138,671 UART: [ldev] CDI.KEYID = 6
10,139,626 UART: [ldev] SUBJECT.KEYID = 5
10,140,921 UART: [ldev] AUTHORITY.KEYID = 7
10,142,018 UART: [ldev] FE.KEYID = 1
10,152,098 UART: [ldev] Erasing FE.KEYID = 1
13,440,821 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,730,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,744,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,759,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,774,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,793,846 UART: [ldev] --
15,798,675 UART: [fwproc] Waiting for Commands...
15,800,561 UART: [fwproc] Received command 0x46574c44
15,802,746 UART: [fwproc] Received Image of size 113844 bytes
19,855,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,925,489 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,994,255 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,310,315 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,133,356 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,347,754 >>> mbox cmd response: failed
17,348,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,348,717 >>> mbox cmd response: failed
17,348,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,349,272 >>> mbox cmd response: failed
Initializing fuses
2,058,235 writing to cptra_bootfsm_go
6,645,017 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,585,053 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,360 UART:
192,714 UART: Running Caliptra ROM ...
193,912 UART:
194,070 UART: [state] CFI Enabled
261,391 UART: [state] LifecycleState = Unprovisioned
263,257 UART: [state] DebugLocked = No
266,210 UART: [state] WD Timer not started. Device not locked for debugging
269,387 UART: [kat] SHA2-256
448,513 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,098 UART: [kat] ++
460,636 UART: [kat] sha1
472,164 UART: [kat] SHA2-256
475,004 UART: [kat] SHA2-384
481,699 UART: [kat] SHA2-512-ACC
484,635 UART: [kat] ECC-384
2,947,712 UART: [kat] HMAC-384Kdf
2,970,969 UART: [kat] LMS
3,500,405 UART: [kat] --
3,505,523 UART: [cold-reset] ++
3,507,834 UART: [fht] FHT @ 0x50003400
3,518,973 UART: [idev] ++
3,519,588 UART: [idev] CDI.KEYID = 6
3,520,517 UART: [idev] SUBJECT.KEYID = 7
3,521,681 UART: [idev] UDS.KEYID = 0
3,524,096 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,748 UART: [idev] Erasing UDS.KEYID = 0
6,026,689 UART: [idev] Sha1 KeyId Algorithm
6,049,798 UART: [idev] --
6,053,317 UART: [ldev] ++
6,053,896 UART: [ldev] CDI.KEYID = 6
6,054,784 UART: [ldev] SUBJECT.KEYID = 5
6,055,951 UART: [ldev] AUTHORITY.KEYID = 7
6,057,240 UART: [ldev] FE.KEYID = 1
6,100,037 UART: [ldev] Erasing FE.KEYID = 1
8,607,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,576 UART: [ldev] --
10,415,017 UART: [fwproc] Wait for Commands...
10,418,255 UART: [fwproc] Recv command 0x46574c44
10,420,300 UART: [fwproc] Recv'd Img size: 114168 bytes
13,816,447 UART: ROM Fatal Error: 0x000B002A
13,819,522 >>> mbox cmd response: failed
13,819,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,314 >>> mbox cmd response: failed
13,820,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,874 >>> mbox cmd response: failed
Initializing fuses
2,053,041 writing to cptra_bootfsm_go
2,242,362 UART:
2,242,723 UART: Running Caliptra ROM ...
2,243,806 UART:
2,243,962 UART: [state] CFI Enabled
2,312,876 UART: [state] LifecycleState = Unprovisioned
2,314,706 UART: [state] DebugLocked = No
2,316,230 UART: [state] WD Timer not started. Device not locked for debugging
2,319,333 UART: [kat] SHA2-256
2,498,479 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,046 UART: [kat] ++
2,510,595 UART: [kat] sha1
2,522,135 UART: [kat] SHA2-256
2,525,148 UART: [kat] SHA2-384
2,531,570 UART: [kat] SHA2-512-ACC
2,534,567 UART: [kat] ECC-384
4,997,976 UART: [kat] HMAC-384Kdf
5,019,502 UART: [kat] LMS
5,548,996 UART: [kat] --
5,554,576 UART: [cold-reset] ++
5,556,996 UART: [fht] FHT @ 0x50003400
5,568,733 UART: [idev] ++
5,569,307 UART: [idev] CDI.KEYID = 6
5,570,292 UART: [idev] SUBJECT.KEYID = 7
5,571,453 UART: [idev] UDS.KEYID = 0
5,573,666 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,717,366 UART: [idev] Erasing UDS.KEYID = 0
8,072,061 UART: [idev] Sha1 KeyId Algorithm
8,096,104 UART: [idev] --
8,100,512 UART: [ldev] ++
8,101,093 UART: [ldev] CDI.KEYID = 6
8,102,007 UART: [ldev] SUBJECT.KEYID = 5
8,103,171 UART: [ldev] AUTHORITY.KEYID = 7
8,104,403 UART: [ldev] FE.KEYID = 1
8,146,372 UART: [ldev] Erasing FE.KEYID = 1
10,650,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,435,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,362 UART: [ldev] --
12,461,679 UART: [fwproc] Wait for Commands...
12,463,881 UART: [fwproc] Recv command 0x46574c44
12,465,934 UART: [fwproc] Recv'd Img size: 114168 bytes
15,865,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,937,036 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,005,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,322,986 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,382,476 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,589,418 >>> mbox cmd response: failed
13,589,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,590,255 >>> mbox cmd response: failed
13,590,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,590,819 >>> mbox cmd response: failed
Initializing fuses
2,057,749 writing to cptra_bootfsm_go
5,424,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,103,574 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,562 UART:
192,921 UART: Running Caliptra ROM ...
194,060 UART:
603,859 UART: [state] CFI Enabled
618,605 UART: [state] LifecycleState = Unprovisioned
620,482 UART: [state] DebugLocked = No
622,506 UART: [state] WD Timer not started. Device not locked for debugging
626,383 UART: [kat] SHA2-256
805,501 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,095 UART: [kat] ++
817,640 UART: [kat] sha1
829,443 UART: [kat] SHA2-256
832,455 UART: [kat] SHA2-384
838,700 UART: [kat] SHA2-512-ACC
841,685 UART: [kat] ECC-384
3,281,498 UART: [kat] HMAC-384Kdf
3,293,660 UART: [kat] LMS
3,823,154 UART: [kat] --
3,827,467 UART: [cold-reset] ++
3,829,723 UART: [fht] FHT @ 0x50003400
3,840,859 UART: [idev] ++
3,841,422 UART: [idev] CDI.KEYID = 6
3,842,359 UART: [idev] SUBJECT.KEYID = 7
3,843,569 UART: [idev] UDS.KEYID = 0
3,845,984 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,618 UART: [idev] Erasing UDS.KEYID = 0
6,319,194 UART: [idev] Sha1 KeyId Algorithm
6,341,242 UART: [idev] --
6,344,840 UART: [ldev] ++
6,345,420 UART: [ldev] CDI.KEYID = 6
6,346,336 UART: [ldev] SUBJECT.KEYID = 5
6,347,516 UART: [ldev] AUTHORITY.KEYID = 7
6,348,749 UART: [ldev] FE.KEYID = 1
6,359,502 UART: [ldev] Erasing FE.KEYID = 1
8,836,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,602 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,844 UART: [ldev] --
10,627,332 UART: [fwproc] Wait for Commands...
10,630,561 UART: [fwproc] Recv command 0x46574c44
10,632,655 UART: [fwproc] Recv'd Img size: 114168 bytes
14,026,237 UART: ROM Fatal Error: 0x000B002A
14,029,371 >>> mbox cmd response: failed
14,029,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,140 >>> mbox cmd response: failed
14,030,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,763 >>> mbox cmd response: failed
Initializing fuses
2,052,945 writing to cptra_bootfsm_go
2,242,261 UART:
2,242,604 UART: Running Caliptra ROM ...
2,243,657 UART:
6,427,557 UART: [state] CFI Enabled
6,441,400 UART: [state] LifecycleState = Unprovisioned
6,443,256 UART: [state] DebugLocked = No
6,445,618 UART: [state] WD Timer not started. Device not locked for debugging
6,449,911 UART: [kat] SHA2-256
6,629,007 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,640,568 UART: [kat] ++
6,641,142 UART: [kat] sha1
6,651,501 UART: [kat] SHA2-256
6,654,571 UART: [kat] SHA2-384
6,660,664 UART: [kat] SHA2-512-ACC
6,663,612 UART: [kat] ECC-384
9,107,468 UART: [kat] HMAC-384Kdf
9,120,017 UART: [kat] LMS
9,649,474 UART: [kat] --
9,652,331 UART: [cold-reset] ++
9,654,268 UART: [fht] FHT @ 0x50003400
9,664,595 UART: [idev] ++
9,665,202 UART: [idev] CDI.KEYID = 6
9,666,088 UART: [idev] SUBJECT.KEYID = 7
9,667,197 UART: [idev] UDS.KEYID = 0
9,669,585 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,812,936 UART: [idev] Erasing UDS.KEYID = 0
12,141,882 UART: [idev] Sha1 KeyId Algorithm
12,165,907 UART: [idev] --
12,170,763 UART: [ldev] ++
12,171,329 UART: [ldev] CDI.KEYID = 6
12,172,240 UART: [ldev] SUBJECT.KEYID = 5
12,173,408 UART: [ldev] AUTHORITY.KEYID = 7
12,174,694 UART: [ldev] FE.KEYID = 1
12,185,288 UART: [ldev] Erasing FE.KEYID = 1
14,660,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,379,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,395,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,411,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,427,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,447,946 UART: [ldev] --
16,452,563 UART: [fwproc] Wait for Commands...
16,455,584 UART: [fwproc] Recv command 0x46574c44
16,457,702 UART: [fwproc] Recv'd Img size: 114168 bytes
19,860,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,928,633 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,997,431 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,315,169 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,702,288 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,810,863 >>> mbox cmd response: failed
13,811,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,812,007 >>> mbox cmd response: failed
13,812,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,812,581 >>> mbox cmd response: failed
Initializing fuses
2,068,320 writing to cptra_bootfsm_go
9,750,279 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,316,667 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,100 UART:
192,477 UART: Running Caliptra ROM ...
193,689 UART:
193,843 UART: [state] CFI Enabled
262,033 UART: [state] LifecycleState = Unprovisioned
264,449 UART: [state] DebugLocked = No
265,614 UART: [state] WD Timer not started. Device not locked for debugging
269,992 UART: [kat] SHA2-256
459,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,589 UART: [kat] ++
471,087 UART: [kat] sha1
483,056 UART: [kat] SHA2-256
486,081 UART: [kat] SHA2-384
492,603 UART: [kat] SHA2-512-ACC
495,215 UART: [kat] ECC-384
2,944,473 UART: [kat] HMAC-384Kdf
2,971,507 UART: [kat] LMS
3,503,272 UART: [kat] --
3,509,745 UART: [cold-reset] ++
3,511,469 UART: [fht] FHT @ 0x50003400
3,523,097 UART: [idev] ++
3,523,778 UART: [idev] CDI.KEYID = 6
3,524,755 UART: [idev] SUBJECT.KEYID = 7
3,525,915 UART: [idev] UDS.KEYID = 0
3,528,417 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,330 UART: [idev] Erasing UDS.KEYID = 0
6,030,315 UART: [idev] Sha1 KeyId Algorithm
6,052,753 UART: [idev] --
6,057,618 UART: [ldev] ++
6,058,302 UART: [ldev] CDI.KEYID = 6
6,059,214 UART: [ldev] SUBJECT.KEYID = 5
6,060,380 UART: [ldev] AUTHORITY.KEYID = 7
6,061,783 UART: [ldev] FE.KEYID = 1
6,101,582 UART: [ldev] Erasing FE.KEYID = 1
8,611,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,922 UART: [ldev] --
10,415,567 UART: [fwproc] Wait for Commands...
10,418,373 UART: [fwproc] Recv command 0x46574c44
10,420,636 UART: [fwproc] Recv'd Img size: 114168 bytes
13,868,696 UART: ROM Fatal Error: 0x000B002A
13,872,369 >>> mbox cmd response: failed
13,872,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,873,118 >>> mbox cmd response: failed
13,873,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,873,675 >>> mbox cmd response: failed
Initializing fuses
2,062,719 writing to cptra_bootfsm_go
2,252,014 UART:
2,252,369 UART: Running Caliptra ROM ...
2,253,506 UART:
2,253,672 UART: [state] CFI Enabled
2,328,707 UART: [state] LifecycleState = Unprovisioned
2,331,082 UART: [state] DebugLocked = No
2,333,448 UART: [state] WD Timer not started. Device not locked for debugging
2,337,914 UART: [kat] SHA2-256
2,527,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,538,554 UART: [kat] ++
2,539,094 UART: [kat] sha1
2,551,342 UART: [kat] SHA2-256
2,554,326 UART: [kat] SHA2-384
2,559,829 UART: [kat] SHA2-512-ACC
2,562,408 UART: [kat] ECC-384
5,009,550 UART: [kat] HMAC-384Kdf
5,031,350 UART: [kat] LMS
5,563,137 UART: [kat] --
5,568,047 UART: [cold-reset] ++
5,569,226 UART: [fht] FHT @ 0x50003400
5,580,319 UART: [idev] ++
5,580,998 UART: [idev] CDI.KEYID = 6
5,581,938 UART: [idev] SUBJECT.KEYID = 7
5,583,147 UART: [idev] UDS.KEYID = 0
5,585,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,729,106 UART: [idev] Erasing UDS.KEYID = 0
8,087,978 UART: [idev] Sha1 KeyId Algorithm
8,109,499 UART: [idev] --
8,114,954 UART: [ldev] ++
8,115,651 UART: [ldev] CDI.KEYID = 6
8,116,538 UART: [ldev] SUBJECT.KEYID = 5
8,117,751 UART: [ldev] AUTHORITY.KEYID = 7
8,118,923 UART: [ldev] FE.KEYID = 1
8,160,197 UART: [ldev] Erasing FE.KEYID = 1
10,668,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,402,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,862 UART: [ldev] --
12,475,554 UART: [fwproc] Wait for Commands...
12,478,245 UART: [fwproc] Recv command 0x46574c44
12,480,517 UART: [fwproc] Recv'd Img size: 114168 bytes
15,933,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,009,221 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,125,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,667,193 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,442,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,278,784 >>> mbox cmd response: failed
14,279,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,656 >>> mbox cmd response: failed
14,279,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,280,215 >>> mbox cmd response: failed
Initializing fuses
2,056,542 writing to cptra_bootfsm_go
5,477,015 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,773,855 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,505 UART:
192,883 UART: Running Caliptra ROM ...
194,085 UART:
603,775 UART: [state] CFI Enabled
615,617 UART: [state] LifecycleState = Unprovisioned
617,664 UART: [state] DebugLocked = No
620,478 UART: [state] WD Timer not started. Device not locked for debugging
625,161 UART: [kat] SHA2-256
815,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,772 UART: [kat] ++
826,279 UART: [kat] sha1
838,993 UART: [kat] SHA2-256
842,007 UART: [kat] SHA2-384
848,483 UART: [kat] SHA2-512-ACC
851,100 UART: [kat] ECC-384
3,294,802 UART: [kat] HMAC-384Kdf
3,308,823 UART: [kat] LMS
3,840,660 UART: [kat] --
3,844,725 UART: [cold-reset] ++
3,845,750 UART: [fht] FHT @ 0x50003400
3,857,329 UART: [idev] ++
3,858,005 UART: [idev] CDI.KEYID = 6
3,859,026 UART: [idev] SUBJECT.KEYID = 7
3,860,134 UART: [idev] UDS.KEYID = 0
3,862,575 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,262 UART: [idev] Erasing UDS.KEYID = 0
6,336,187 UART: [idev] Sha1 KeyId Algorithm
6,357,376 UART: [idev] --
6,360,477 UART: [ldev] ++
6,361,057 UART: [ldev] CDI.KEYID = 6
6,361,943 UART: [ldev] SUBJECT.KEYID = 5
6,363,158 UART: [ldev] AUTHORITY.KEYID = 7
6,364,402 UART: [ldev] FE.KEYID = 1
6,375,019 UART: [ldev] Erasing FE.KEYID = 1
8,856,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,349 UART: [ldev] --
10,645,323 UART: [fwproc] Wait for Commands...
10,647,811 UART: [fwproc] Recv command 0x46574c44
10,650,079 UART: [fwproc] Recv'd Img size: 114168 bytes
14,087,365 UART: ROM Fatal Error: 0x000B002A
14,091,038 >>> mbox cmd response: failed
14,091,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,091,644 >>> mbox cmd response: failed
14,091,947 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,092,253 >>> mbox cmd response: failed
Initializing fuses
2,055,903 writing to cptra_bootfsm_go
2,245,250 UART:
2,245,703 UART: Running Caliptra ROM ...
2,246,760 UART:
6,365,522 UART: [state] CFI Enabled
6,379,329 UART: [state] LifecycleState = Unprovisioned
6,381,719 UART: [state] DebugLocked = No
6,383,275 UART: [state] WD Timer not started. Device not locked for debugging
6,388,562 UART: [kat] SHA2-256
6,578,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,589,187 UART: [kat] ++
6,589,738 UART: [kat] sha1
6,601,118 UART: [kat] SHA2-256
6,604,115 UART: [kat] SHA2-384
6,609,740 UART: [kat] SHA2-512-ACC
6,612,368 UART: [kat] ECC-384
9,052,581 UART: [kat] HMAC-384Kdf
9,066,599 UART: [kat] LMS
9,598,388 UART: [kat] --
9,601,524 UART: [cold-reset] ++
9,603,846 UART: [fht] FHT @ 0x50003400
9,615,489 UART: [idev] ++
9,616,176 UART: [idev] CDI.KEYID = 6
9,617,145 UART: [idev] SUBJECT.KEYID = 7
9,618,367 UART: [idev] UDS.KEYID = 0
9,620,614 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,764,139 UART: [idev] Erasing UDS.KEYID = 0
12,098,381 UART: [idev] Sha1 KeyId Algorithm
12,120,806 UART: [idev] --
12,126,767 UART: [ldev] ++
12,127,454 UART: [ldev] CDI.KEYID = 6
12,128,367 UART: [ldev] SUBJECT.KEYID = 5
12,129,529 UART: [ldev] AUTHORITY.KEYID = 7
12,130,762 UART: [ldev] FE.KEYID = 1
12,143,801 UART: [ldev] Erasing FE.KEYID = 1
14,625,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,345,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,360,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,376,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,391,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,410,884 UART: [ldev] --
16,415,564 UART: [fwproc] Wait for Commands...
16,417,988 UART: [fwproc] Recv command 0x46574c44
16,420,250 UART: [fwproc] Recv'd Img size: 114168 bytes
19,868,900 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,943,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,059,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,601,239 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,753,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,484,317 >>> mbox cmd response: failed
14,484,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,485,242 >>> mbox cmd response: failed
14,485,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,485,800 >>> mbox cmd response: failed
Initializing fuses
2,059,919 writing to cptra_bootfsm_go
9,124,936 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,321,492 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,429 UART: [kat] SHA2-256
892,367 UART: [kat] SHA2-384
895,238 UART: [kat] SHA2-512-ACC
897,139 UART: [kat] ECC-384
902,632 UART: [kat] HMAC-384Kdf
907,188 UART: [kat] LMS
1,475,384 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,805 UART: [fht] Storing FHT @ 0x50003400
1,479,670 UART: [idev] ++
1,479,838 UART: [idev] CDI.KEYID = 6
1,480,198 UART: [idev] SUBJECT.KEYID = 7
1,480,622 UART: [idev] UDS.KEYID = 0
1,480,967 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,332 UART: [idev] Erasing UDS.KEYID = 0
1,504,578 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,196 UART: [idev] --
1,514,259 UART: [ldev] ++
1,514,427 UART: [ldev] CDI.KEYID = 6
1,514,790 UART: [ldev] SUBJECT.KEYID = 5
1,515,216 UART: [ldev] AUTHORITY.KEYID = 7
1,515,679 UART: [ldev] FE.KEYID = 1
1,520,921 UART: [ldev] Erasing FE.KEYID = 1
1,546,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,150 UART: [ldev] --
1,585,473 UART: [fwproc] Waiting for Commands...
1,586,120 UART: [fwproc] Received command 0x46574c44
1,586,911 UART: [fwproc] Received Image of size 114168 bytes
2,883,062 UART: ROM Fatal Error: 0x000B002A
2,884,221 >>> mbox cmd response: failed
2,884,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,227 >>> mbox cmd response: failed
2,884,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,161 UART: [kat] SHA2-256
882,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,207 UART: [kat] ++
886,359 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,246 UART: [kat] LMS
1,475,442 UART: [kat] --
1,476,333 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,476 UART: [idev] ++
1,479,644 UART: [idev] CDI.KEYID = 6
1,480,004 UART: [idev] SUBJECT.KEYID = 7
1,480,428 UART: [idev] UDS.KEYID = 0
1,480,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,400 UART: [idev] Erasing UDS.KEYID = 0
1,504,962 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,584 UART: [idev] --
1,514,481 UART: [ldev] ++
1,514,649 UART: [ldev] CDI.KEYID = 6
1,515,012 UART: [ldev] SUBJECT.KEYID = 5
1,515,438 UART: [ldev] AUTHORITY.KEYID = 7
1,515,901 UART: [ldev] FE.KEYID = 1
1,521,135 UART: [ldev] Erasing FE.KEYID = 1
1,546,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,510 UART: [ldev] --
1,585,939 UART: [fwproc] Waiting for Commands...
1,586,620 UART: [fwproc] Received command 0x46574c44
1,587,411 UART: [fwproc] Received Image of size 114168 bytes
2,883,596 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,034 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,386 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,971 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,057 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,736,010 >>> mbox cmd response: failed
2,736,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,016 >>> mbox cmd response: failed
2,736,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,167 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,043 UART: [state] LifecycleState = Unprovisioned
86,698 UART: [state] DebugLocked = No
87,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,932 UART: [kat] SHA2-256
882,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,978 UART: [kat] ++
887,130 UART: [kat] sha1
891,218 UART: [kat] SHA2-256
893,156 UART: [kat] SHA2-384
895,933 UART: [kat] SHA2-512-ACC
897,834 UART: [kat] ECC-384
903,597 UART: [kat] HMAC-384Kdf
908,233 UART: [kat] LMS
1,476,429 UART: [kat] --
1,477,180 UART: [cold-reset] ++
1,477,586 UART: [fht] Storing FHT @ 0x50003400
1,480,431 UART: [idev] ++
1,480,599 UART: [idev] CDI.KEYID = 6
1,480,959 UART: [idev] SUBJECT.KEYID = 7
1,481,383 UART: [idev] UDS.KEYID = 0
1,481,728 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,459 UART: [idev] Erasing UDS.KEYID = 0
1,506,511 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,133 UART: [idev] --
1,516,160 UART: [ldev] ++
1,516,328 UART: [ldev] CDI.KEYID = 6
1,516,691 UART: [ldev] SUBJECT.KEYID = 5
1,517,117 UART: [ldev] AUTHORITY.KEYID = 7
1,517,580 UART: [ldev] FE.KEYID = 1
1,523,014 UART: [ldev] Erasing FE.KEYID = 1
1,547,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,239 UART: [ldev] --
1,586,530 UART: [fwproc] Waiting for Commands...
1,587,201 UART: [fwproc] Received command 0x46574c44
1,587,992 UART: [fwproc] Received Image of size 114168 bytes
2,882,639 UART: ROM Fatal Error: 0x000B002A
2,883,798 >>> mbox cmd response: failed
2,883,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,804 >>> mbox cmd response: failed
2,883,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,164 UART: [kat] SHA2-256
882,095 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,210 UART: [kat] ++
886,362 UART: [kat] sha1
890,420 UART: [kat] SHA2-256
892,358 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,971 UART: [kat] HMAC-384Kdf
907,813 UART: [kat] LMS
1,476,009 UART: [kat] --
1,476,980 UART: [cold-reset] ++
1,477,384 UART: [fht] Storing FHT @ 0x50003400
1,480,247 UART: [idev] ++
1,480,415 UART: [idev] CDI.KEYID = 6
1,480,775 UART: [idev] SUBJECT.KEYID = 7
1,481,199 UART: [idev] UDS.KEYID = 0
1,481,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,017 UART: [idev] Erasing UDS.KEYID = 0
1,505,617 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,251 UART: [idev] --
1,515,186 UART: [ldev] ++
1,515,354 UART: [ldev] CDI.KEYID = 6
1,515,717 UART: [ldev] SUBJECT.KEYID = 5
1,516,143 UART: [ldev] AUTHORITY.KEYID = 7
1,516,606 UART: [ldev] FE.KEYID = 1
1,521,758 UART: [ldev] Erasing FE.KEYID = 1
1,547,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,667 UART: [ldev] --
1,586,138 UART: [fwproc] Waiting for Commands...
1,586,831 UART: [fwproc] Received command 0x46574c44
1,587,622 UART: [fwproc] Received Image of size 114168 bytes
2,884,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,725 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,077 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,744 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,784 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,738,533 >>> mbox cmd response: failed
2,738,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,539 >>> mbox cmd response: failed
2,738,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,124 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,754 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,824 UART: [kat] SHA2-512-ACC
908,725 UART: [kat] ECC-384
918,566 UART: [kat] HMAC-384Kdf
923,224 UART: [kat] LMS
1,171,552 UART: [kat] --
1,172,531 UART: [cold-reset] ++
1,172,967 UART: [fht] FHT @ 0x50003400
1,175,754 UART: [idev] ++
1,175,922 UART: [idev] CDI.KEYID = 6
1,176,282 UART: [idev] SUBJECT.KEYID = 7
1,176,706 UART: [idev] UDS.KEYID = 0
1,177,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,672 UART: [idev] Erasing UDS.KEYID = 0
1,201,745 UART: [idev] Sha1 KeyId Algorithm
1,210,139 UART: [idev] --
1,211,301 UART: [ldev] ++
1,211,469 UART: [ldev] CDI.KEYID = 6
1,211,832 UART: [ldev] SUBJECT.KEYID = 5
1,212,258 UART: [ldev] AUTHORITY.KEYID = 7
1,212,721 UART: [ldev] FE.KEYID = 1
1,218,101 UART: [ldev] Erasing FE.KEYID = 1
1,244,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,185 UART: [ldev] --
1,283,588 UART: [fwproc] Wait for Commands...
1,284,324 UART: [fwproc] Recv command 0x46574c44
1,285,052 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,079 UART: ROM Fatal Error: 0x000B002A
2,582,238 >>> mbox cmd response: failed
2,582,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,244 >>> mbox cmd response: failed
2,582,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
893,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,395 UART: [kat] ++
897,547 UART: [kat] sha1
901,901 UART: [kat] SHA2-256
903,841 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,436 UART: [kat] HMAC-384Kdf
923,170 UART: [kat] LMS
1,171,498 UART: [kat] --
1,172,299 UART: [cold-reset] ++
1,172,827 UART: [fht] FHT @ 0x50003400
1,175,322 UART: [idev] ++
1,175,490 UART: [idev] CDI.KEYID = 6
1,175,850 UART: [idev] SUBJECT.KEYID = 7
1,176,274 UART: [idev] UDS.KEYID = 0
1,176,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,584 UART: [idev] Erasing UDS.KEYID = 0
1,201,255 UART: [idev] Sha1 KeyId Algorithm
1,209,801 UART: [idev] --
1,210,879 UART: [ldev] ++
1,211,047 UART: [ldev] CDI.KEYID = 6
1,211,410 UART: [ldev] SUBJECT.KEYID = 5
1,211,836 UART: [ldev] AUTHORITY.KEYID = 7
1,212,299 UART: [ldev] FE.KEYID = 1
1,217,285 UART: [ldev] Erasing FE.KEYID = 1
1,244,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,849 UART: [ldev] --
1,283,206 UART: [fwproc] Wait for Commands...
1,283,978 UART: [fwproc] Recv command 0x46574c44
1,284,706 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,130 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,091 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,395 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,004 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,255 >>> mbox cmd response: failed
2,433,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,261 >>> mbox cmd response: failed
2,433,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,327 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,029 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
893,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,784 UART: [kat] ++
897,936 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,905 UART: [kat] SHA2-512-ACC
908,806 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,325 UART: [kat] LMS
1,171,653 UART: [kat] --
1,172,804 UART: [cold-reset] ++
1,173,168 UART: [fht] FHT @ 0x50003400
1,175,895 UART: [idev] ++
1,176,063 UART: [idev] CDI.KEYID = 6
1,176,423 UART: [idev] SUBJECT.KEYID = 7
1,176,847 UART: [idev] UDS.KEYID = 0
1,177,192 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,123 UART: [idev] Erasing UDS.KEYID = 0
1,202,624 UART: [idev] Sha1 KeyId Algorithm
1,211,332 UART: [idev] --
1,212,420 UART: [ldev] ++
1,212,588 UART: [ldev] CDI.KEYID = 6
1,212,951 UART: [ldev] SUBJECT.KEYID = 5
1,213,377 UART: [ldev] AUTHORITY.KEYID = 7
1,213,840 UART: [ldev] FE.KEYID = 1
1,219,276 UART: [ldev] Erasing FE.KEYID = 1
1,245,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,304 UART: [ldev] --
1,284,585 UART: [fwproc] Wait for Commands...
1,285,309 UART: [fwproc] Recv command 0x46574c44
1,286,037 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,972 UART: ROM Fatal Error: 0x000B002A
2,582,131 >>> mbox cmd response: failed
2,582,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,137 >>> mbox cmd response: failed
2,582,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,143 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,934 UART: [kat] SHA2-256
903,874 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
918,581 UART: [kat] HMAC-384Kdf
923,179 UART: [kat] LMS
1,171,507 UART: [kat] --
1,172,208 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,057 UART: [idev] Erasing UDS.KEYID = 0
1,200,838 UART: [idev] Sha1 KeyId Algorithm
1,209,316 UART: [idev] --
1,210,424 UART: [ldev] ++
1,210,592 UART: [ldev] CDI.KEYID = 6
1,210,955 UART: [ldev] SUBJECT.KEYID = 5
1,211,381 UART: [ldev] AUTHORITY.KEYID = 7
1,211,844 UART: [ldev] FE.KEYID = 1
1,217,158 UART: [ldev] Erasing FE.KEYID = 1
1,243,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,810 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,218 UART: [ldev] --
1,282,623 UART: [fwproc] Wait for Commands...
1,283,243 UART: [fwproc] Recv command 0x46574c44
1,283,971 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,928 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,232 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,795 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,436,692 >>> mbox cmd response: failed
2,436,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,698 >>> mbox cmd response: failed
2,436,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,436,704 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,798 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,044 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,137 UART: [kat] ++
895,289 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,959 UART: [idev] Erasing UDS.KEYID = 0
1,198,889 UART: [idev] Sha1 KeyId Algorithm
1,207,805 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,142 UART: [ldev] --
1,281,590 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,173 UART: ROM Fatal Error: 0x000B002A
2,579,332 >>> mbox cmd response: failed
2,579,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,338 >>> mbox cmd response: failed
2,579,338 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,339 UART: [kat] ++
895,491 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,198,669 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,482 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,625 UART: [fwproc] Recv command 0x46574c44
1,282,358 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,121 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,430 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,072 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,710 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,469 >>> mbox cmd response: failed
2,430,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,475 >>> mbox cmd response: failed
2,430,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,012 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,448 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,806 UART: [kat] ++
895,958 UART: [kat] sha1
900,318 UART: [kat] SHA2-256
902,258 UART: [kat] SHA2-384
905,023 UART: [kat] SHA2-512-ACC
906,924 UART: [kat] ECC-384
916,957 UART: [kat] HMAC-384Kdf
921,617 UART: [kat] LMS
1,169,929 UART: [kat] --
1,170,828 UART: [cold-reset] ++
1,171,264 UART: [fht] FHT @ 0x50003400
1,173,808 UART: [idev] ++
1,173,976 UART: [idev] CDI.KEYID = 6
1,174,337 UART: [idev] SUBJECT.KEYID = 7
1,174,762 UART: [idev] UDS.KEYID = 0
1,175,108 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,918 UART: [idev] Erasing UDS.KEYID = 0
1,199,840 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,387 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,515 UART: [ldev] Erasing FE.KEYID = 1
1,243,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,733 UART: [ldev] --
1,283,079 UART: [fwproc] Wait for Commands...
1,283,764 UART: [fwproc] Recv command 0x46574c44
1,284,497 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,440 UART: ROM Fatal Error: 0x000B002A
2,580,599 >>> mbox cmd response: failed
2,580,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,605 >>> mbox cmd response: failed
2,580,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,580,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,756 UART: [kat] ++
895,908 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,545 UART: [kat] LMS
1,169,857 UART: [kat] --
1,170,670 UART: [cold-reset] ++
1,171,148 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,174,914 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,432 UART: [idev] Sha1 KeyId Algorithm
1,209,272 UART: [idev] --
1,210,267 UART: [ldev] ++
1,210,435 UART: [ldev] CDI.KEYID = 6
1,210,799 UART: [ldev] SUBJECT.KEYID = 5
1,211,226 UART: [ldev] AUTHORITY.KEYID = 7
1,211,689 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,243,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,881 UART: [ldev] --
1,283,279 UART: [fwproc] Wait for Commands...
1,284,020 UART: [fwproc] Recv command 0x46574c44
1,284,753 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,522 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,831 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,313 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,676 >>> mbox cmd response: failed
2,432,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,682 >>> mbox cmd response: failed
2,432,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,688 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,323 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,226 UART:
192,590 UART: Running Caliptra ROM ...
193,898 UART:
194,050 UART: [state] CFI Enabled
262,595 UART: [state] LifecycleState = Unprovisioned
264,575 UART: [state] DebugLocked = No
267,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,619 UART: [kat] SHA2-256
442,280 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,800 UART: [kat] ++
453,253 UART: [kat] sha1
465,748 UART: [kat] SHA2-256
468,487 UART: [kat] SHA2-384
474,571 UART: [kat] SHA2-512-ACC
476,920 UART: [kat] ECC-384
2,766,154 UART: [kat] HMAC-384Kdf
2,797,931 UART: [kat] LMS
3,988,207 UART: [kat] --
3,992,973 UART: [cold-reset] ++
3,995,406 UART: [fht] Storing FHT @ 0x50003400
4,007,340 UART: [idev] ++
4,007,911 UART: [idev] CDI.KEYID = 6
4,008,856 UART: [idev] SUBJECT.KEYID = 7
4,010,070 UART: [idev] UDS.KEYID = 0
4,013,217 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,156,640 UART: [idev] Erasing UDS.KEYID = 0
7,342,739 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,948 UART: [idev] --
7,368,570 UART: [ldev] ++
7,369,137 UART: [ldev] CDI.KEYID = 6
7,370,072 UART: [ldev] SUBJECT.KEYID = 5
7,371,297 UART: [ldev] AUTHORITY.KEYID = 7
7,372,533 UART: [ldev] FE.KEYID = 1
7,420,750 UART: [ldev] Erasing FE.KEYID = 1
10,754,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,069 UART: [ldev] --
13,133,308 UART: [fwproc] Waiting for Commands...
13,136,650 UART: [fwproc] Received command 0x46574c44
13,138,843 UART: [fwproc] Received Image of size 113844 bytes
17,183,125 UART: ROM Fatal Error: 0x000B002B
17,186,569 >>> mbox cmd response: failed
17,186,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,233 >>> mbox cmd response: failed
17,187,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,827 >>> mbox cmd response: failed
Initializing fuses
2,054,638 writing to cptra_bootfsm_go
2,243,926 UART:
2,244,289 UART: Running Caliptra ROM ...
2,245,339 UART:
2,245,492 UART: [state] CFI Enabled
2,315,622 UART: [state] LifecycleState = Unprovisioned
2,317,564 UART: [state] DebugLocked = No
2,320,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,022 UART: [kat] SHA2-256
2,494,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,213 UART: [kat] ++
2,505,673 UART: [kat] sha1
2,516,833 UART: [kat] SHA2-256
2,519,530 UART: [kat] SHA2-384
2,524,496 UART: [kat] SHA2-512-ACC
2,526,900 UART: [kat] ECC-384
4,818,200 UART: [kat] HMAC-384Kdf
4,830,602 UART: [kat] LMS
6,020,939 UART: [kat] --
6,026,684 UART: [cold-reset] ++
6,028,414 UART: [fht] Storing FHT @ 0x50003400
6,039,574 UART: [idev] ++
6,040,204 UART: [idev] CDI.KEYID = 6
6,041,116 UART: [idev] SUBJECT.KEYID = 7
6,042,382 UART: [idev] UDS.KEYID = 0
6,044,655 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,187,966 UART: [idev] Erasing UDS.KEYID = 0
9,374,143 UART: [idev] Using Sha1 for KeyId Algorithm
9,396,660 UART: [idev] --
9,400,932 UART: [ldev] ++
9,401,505 UART: [ldev] CDI.KEYID = 6
9,402,473 UART: [ldev] SUBJECT.KEYID = 5
9,403,760 UART: [ldev] AUTHORITY.KEYID = 7
9,404,944 UART: [ldev] FE.KEYID = 1
9,452,394 UART: [ldev] Erasing FE.KEYID = 1
12,784,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,078,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,093,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,108,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,122,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,142,248 UART: [ldev] --
15,147,685 UART: [fwproc] Waiting for Commands...
15,149,732 UART: [fwproc] Received command 0x46574c44
15,151,920 UART: [fwproc] Received Image of size 113844 bytes
19,208,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,290,605 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,359,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,675,254 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,808,598 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,133,582 >>> mbox cmd response: failed
17,134,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,134,481 >>> mbox cmd response: failed
17,134,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,135,035 >>> mbox cmd response: failed
Initializing fuses
2,069,059 writing to cptra_bootfsm_go
5,871,009 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,935,975 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,492 UART:
192,855 UART: Running Caliptra ROM ...
193,998 UART:
603,583 UART: [state] CFI Enabled
619,085 UART: [state] LifecycleState = Unprovisioned
621,063 UART: [state] DebugLocked = No
623,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,735 UART: [kat] SHA2-256
798,467 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,993 UART: [kat] ++
809,468 UART: [kat] sha1
821,369 UART: [kat] SHA2-256
824,110 UART: [kat] SHA2-384
830,681 UART: [kat] SHA2-512-ACC
833,073 UART: [kat] ECC-384
3,115,759 UART: [kat] HMAC-384Kdf
3,127,454 UART: [kat] LMS
4,317,549 UART: [kat] --
4,321,187 UART: [cold-reset] ++
4,322,312 UART: [fht] Storing FHT @ 0x50003400
4,332,873 UART: [idev] ++
4,333,435 UART: [idev] CDI.KEYID = 6
4,334,449 UART: [idev] SUBJECT.KEYID = 7
4,335,611 UART: [idev] UDS.KEYID = 0
4,338,331 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,521 UART: [idev] Erasing UDS.KEYID = 0
7,621,498 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,134 UART: [idev] --
7,646,883 UART: [ldev] ++
7,647,454 UART: [ldev] CDI.KEYID = 6
7,649,023 UART: [ldev] SUBJECT.KEYID = 5
7,650,175 UART: [ldev] AUTHORITY.KEYID = 7
7,651,358 UART: [ldev] FE.KEYID = 1
7,662,093 UART: [ldev] Erasing FE.KEYID = 1
10,955,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,400 UART: [ldev] --
13,315,525 UART: [fwproc] Waiting for Commands...
13,317,356 UART: [fwproc] Received command 0x46574c44
13,319,543 UART: [fwproc] Received Image of size 113844 bytes
17,376,194 UART: ROM Fatal Error: 0x000B002B
17,379,663 >>> mbox cmd response: failed
17,380,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,408 >>> mbox cmd response: failed
17,380,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,380,991 >>> mbox cmd response: failed
Initializing fuses
2,062,007 writing to cptra_bootfsm_go
2,251,347 UART:
2,251,700 UART: Running Caliptra ROM ...
2,252,842 UART:
3,073,072 UART: [state] CFI Enabled
3,086,195 UART: [state] LifecycleState = Unprovisioned
3,088,167 UART: [state] DebugLocked = No
3,090,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,096,463 UART: [kat] SHA2-256
3,266,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,276,763 UART: [kat] ++
3,277,327 UART: [kat] sha1
3,288,173 UART: [kat] SHA2-256
3,290,858 UART: [kat] SHA2-384
3,295,657 UART: [kat] SHA2-512-ACC
3,298,014 UART: [kat] ECC-384
5,582,596 UART: [kat] HMAC-384Kdf
5,594,776 UART: [kat] LMS
6,784,898 UART: [kat] --
6,788,090 UART: [cold-reset] ++
6,789,493 UART: [fht] Storing FHT @ 0x50003400
6,800,165 UART: [idev] ++
6,800,737 UART: [idev] CDI.KEYID = 6
6,801,761 UART: [idev] SUBJECT.KEYID = 7
6,802,918 UART: [idev] UDS.KEYID = 0
6,805,136 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,948,596 UART: [idev] Erasing UDS.KEYID = 0
10,089,294 UART: [idev] Using Sha1 for KeyId Algorithm
10,110,323 UART: [idev] --
10,115,544 UART: [ldev] ++
10,116,126 UART: [ldev] CDI.KEYID = 6
10,117,091 UART: [ldev] SUBJECT.KEYID = 5
10,118,301 UART: [ldev] AUTHORITY.KEYID = 7
10,119,535 UART: [ldev] FE.KEYID = 1
10,131,962 UART: [ldev] Erasing FE.KEYID = 1
13,418,327 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,713,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,727,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,742,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,757,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,775,726 UART: [ldev] --
15,780,177 UART: [fwproc] Waiting for Commands...
15,782,755 UART: [fwproc] Received command 0x46574c44
15,784,956 UART: [fwproc] Received Image of size 113844 bytes
19,832,260 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,910,231 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,979,147 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,295,573 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,129,815 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,333,684 >>> mbox cmd response: failed
17,334,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,575 >>> mbox cmd response: failed
17,334,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,335,136 >>> mbox cmd response: failed
Initializing fuses
2,063,595 writing to cptra_bootfsm_go
6,661,684 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,607,763 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
192,143 UART:
192,509 UART: Running Caliptra ROM ...
193,628 UART:
193,772 UART: [state] CFI Enabled
262,276 UART: [state] LifecycleState = Unprovisioned
264,091 UART: [state] DebugLocked = No
266,579 UART: [state] WD Timer not started. Device not locked for debugging
270,958 UART: [kat] SHA2-256
450,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,695 UART: [kat] ++
462,144 UART: [kat] sha1
473,345 UART: [kat] SHA2-256
476,361 UART: [kat] SHA2-384
481,644 UART: [kat] SHA2-512-ACC
484,580 UART: [kat] ECC-384
2,945,600 UART: [kat] HMAC-384Kdf
2,970,766 UART: [kat] LMS
3,500,230 UART: [kat] --
3,504,237 UART: [cold-reset] ++
3,505,634 UART: [fht] FHT @ 0x50003400
3,516,612 UART: [idev] ++
3,517,185 UART: [idev] CDI.KEYID = 6
3,518,099 UART: [idev] SUBJECT.KEYID = 7
3,519,261 UART: [idev] UDS.KEYID = 0
3,521,754 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,613 UART: [idev] Erasing UDS.KEYID = 0
6,028,415 UART: [idev] Sha1 KeyId Algorithm
6,050,687 UART: [idev] --
6,055,257 UART: [ldev] ++
6,055,836 UART: [ldev] CDI.KEYID = 6
6,056,750 UART: [ldev] SUBJECT.KEYID = 5
6,057,909 UART: [ldev] AUTHORITY.KEYID = 7
6,059,142 UART: [ldev] FE.KEYID = 1
6,097,883 UART: [ldev] Erasing FE.KEYID = 1
8,605,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,367 UART: [ldev] --
10,410,309 UART: [fwproc] Wait for Commands...
10,411,779 UART: [fwproc] Recv command 0x46574c44
10,413,881 UART: [fwproc] Recv'd Img size: 114168 bytes
13,818,335 UART: ROM Fatal Error: 0x000B002B
13,821,471 >>> mbox cmd response: failed
13,821,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,251 >>> mbox cmd response: failed
13,822,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,822,928 >>> mbox cmd response: failed
Initializing fuses
2,055,838 writing to cptra_bootfsm_go
2,245,255 UART:
2,245,606 UART: Running Caliptra ROM ...
2,246,683 UART:
2,246,846 UART: [state] CFI Enabled
2,308,351 UART: [state] LifecycleState = Unprovisioned
2,310,233 UART: [state] DebugLocked = No
2,311,465 UART: [state] WD Timer not started. Device not locked for debugging
2,314,729 UART: [kat] SHA2-256
2,493,803 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,505,420 UART: [kat] ++
2,505,961 UART: [kat] sha1
2,516,318 UART: [kat] SHA2-256
2,519,327 UART: [kat] SHA2-384
2,524,448 UART: [kat] SHA2-512-ACC
2,527,446 UART: [kat] ECC-384
4,971,786 UART: [kat] HMAC-384Kdf
4,995,467 UART: [kat] LMS
5,524,924 UART: [kat] --
5,530,662 UART: [cold-reset] ++
5,532,277 UART: [fht] FHT @ 0x50003400
5,542,145 UART: [idev] ++
5,542,710 UART: [idev] CDI.KEYID = 6
5,543,591 UART: [idev] SUBJECT.KEYID = 7
5,544,802 UART: [idev] UDS.KEYID = 0
5,547,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,690,790 UART: [idev] Erasing UDS.KEYID = 0
8,052,179 UART: [idev] Sha1 KeyId Algorithm
8,075,960 UART: [idev] --
8,080,391 UART: [ldev] ++
8,080,962 UART: [ldev] CDI.KEYID = 6
8,081,849 UART: [ldev] SUBJECT.KEYID = 5
8,083,065 UART: [ldev] AUTHORITY.KEYID = 7
8,084,306 UART: [ldev] FE.KEYID = 1
8,124,363 UART: [ldev] Erasing FE.KEYID = 1
10,631,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,365,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,381,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,397,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,413,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,433,050 UART: [ldev] --
12,438,208 UART: [fwproc] Wait for Commands...
12,440,844 UART: [fwproc] Recv command 0x46574c44
12,442,885 UART: [fwproc] Recv'd Img size: 114168 bytes
15,836,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,904,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,973,000 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,290,392 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,384,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,613,705 >>> mbox cmd response: failed
13,614,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,614,643 >>> mbox cmd response: failed
13,614,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,615,206 >>> mbox cmd response: failed
Initializing fuses
2,060,810 writing to cptra_bootfsm_go
5,428,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,108,474 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,556 UART:
192,914 UART: Running Caliptra ROM ...
194,027 UART:
603,712 UART: [state] CFI Enabled
618,510 UART: [state] LifecycleState = Unprovisioned
620,352 UART: [state] DebugLocked = No
622,160 UART: [state] WD Timer not started. Device not locked for debugging
625,703 UART: [kat] SHA2-256
804,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,396 UART: [kat] ++
816,926 UART: [kat] sha1
826,839 UART: [kat] SHA2-256
829,847 UART: [kat] SHA2-384
835,389 UART: [kat] SHA2-512-ACC
838,321 UART: [kat] ECC-384
3,277,479 UART: [kat] HMAC-384Kdf
3,290,785 UART: [kat] LMS
3,820,283 UART: [kat] --
3,824,820 UART: [cold-reset] ++
3,826,833 UART: [fht] FHT @ 0x50003400
3,838,702 UART: [idev] ++
3,839,270 UART: [idev] CDI.KEYID = 6
3,840,186 UART: [idev] SUBJECT.KEYID = 7
3,841,400 UART: [idev] UDS.KEYID = 0
3,843,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,369 UART: [idev] Erasing UDS.KEYID = 0
6,309,288 UART: [idev] Sha1 KeyId Algorithm
6,332,408 UART: [idev] --
6,336,076 UART: [ldev] ++
6,336,657 UART: [ldev] CDI.KEYID = 6
6,337,569 UART: [ldev] SUBJECT.KEYID = 5
6,338,728 UART: [ldev] AUTHORITY.KEYID = 7
6,339,960 UART: [ldev] FE.KEYID = 1
6,349,199 UART: [ldev] Erasing FE.KEYID = 1
8,824,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,095 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,234 UART: [ldev] --
10,615,090 UART: [fwproc] Wait for Commands...
10,616,981 UART: [fwproc] Recv command 0x46574c44
10,619,075 UART: [fwproc] Recv'd Img size: 114168 bytes
14,015,827 UART: ROM Fatal Error: 0x000B002B
14,018,960 >>> mbox cmd response: failed
14,019,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,019,702 >>> mbox cmd response: failed
14,019,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,020,270 >>> mbox cmd response: failed
Initializing fuses
2,058,477 writing to cptra_bootfsm_go
2,247,812 UART:
2,248,150 UART: Running Caliptra ROM ...
2,249,288 UART:
6,437,878 UART: [state] CFI Enabled
6,449,110 UART: [state] LifecycleState = Unprovisioned
6,451,003 UART: [state] DebugLocked = No
6,453,774 UART: [state] WD Timer not started. Device not locked for debugging
6,457,572 UART: [kat] SHA2-256
6,636,656 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,648,291 UART: [kat] ++
6,648,748 UART: [kat] sha1
6,660,117 UART: [kat] SHA2-256
6,663,191 UART: [kat] SHA2-384
6,668,640 UART: [kat] SHA2-512-ACC
6,671,577 UART: [kat] ECC-384
9,111,547 UART: [kat] HMAC-384Kdf
9,124,897 UART: [kat] LMS
9,654,379 UART: [kat] --
9,658,388 UART: [cold-reset] ++
9,660,647 UART: [fht] FHT @ 0x50003400
9,670,381 UART: [idev] ++
9,670,945 UART: [idev] CDI.KEYID = 6
9,671,913 UART: [idev] SUBJECT.KEYID = 7
9,673,072 UART: [idev] UDS.KEYID = 0
9,675,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,818,780 UART: [idev] Erasing UDS.KEYID = 0
12,144,523 UART: [idev] Sha1 KeyId Algorithm
12,166,950 UART: [idev] --
12,170,193 UART: [ldev] ++
12,170,758 UART: [ldev] CDI.KEYID = 6
12,171,664 UART: [ldev] SUBJECT.KEYID = 5
12,172,891 UART: [ldev] AUTHORITY.KEYID = 7
12,174,123 UART: [ldev] FE.KEYID = 1
12,185,741 UART: [ldev] Erasing FE.KEYID = 1
14,661,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,383,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,399,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,415,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,430,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,451,042 UART: [ldev] --
16,455,941 UART: [fwproc] Wait for Commands...
16,457,886 UART: [fwproc] Recv command 0x46574c44
16,459,979 UART: [fwproc] Recv'd Img size: 114168 bytes
19,859,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,930,409 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,999,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,316,526 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,697,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,810,997 >>> mbox cmd response: failed
13,811,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,811,932 >>> mbox cmd response: failed
13,812,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,812,484 >>> mbox cmd response: failed
Initializing fuses
2,054,515 writing to cptra_bootfsm_go
9,748,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,324,619 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,076 UART:
192,454 UART: Running Caliptra ROM ...
193,597 UART:
193,747 UART: [state] CFI Enabled
264,752 UART: [state] LifecycleState = Unprovisioned
267,157 UART: [state] DebugLocked = No
268,866 UART: [state] WD Timer not started. Device not locked for debugging
273,094 UART: [kat] SHA2-256
463,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,786 UART: [kat] ++
474,263 UART: [kat] sha1
484,246 UART: [kat] SHA2-256
487,294 UART: [kat] SHA2-384
493,556 UART: [kat] SHA2-512-ACC
496,126 UART: [kat] ECC-384
2,945,478 UART: [kat] HMAC-384Kdf
2,970,571 UART: [kat] LMS
3,502,378 UART: [kat] --
3,506,151 UART: [cold-reset] ++
3,508,143 UART: [fht] FHT @ 0x50003400
3,520,153 UART: [idev] ++
3,520,832 UART: [idev] CDI.KEYID = 6
3,521,798 UART: [idev] SUBJECT.KEYID = 7
3,522,899 UART: [idev] UDS.KEYID = 0
3,525,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,256 UART: [idev] Erasing UDS.KEYID = 0
6,026,247 UART: [idev] Sha1 KeyId Algorithm
6,048,664 UART: [idev] --
6,053,019 UART: [ldev] ++
6,053,760 UART: [ldev] CDI.KEYID = 6
6,054,655 UART: [ldev] SUBJECT.KEYID = 5
6,055,820 UART: [ldev] AUTHORITY.KEYID = 7
6,056,998 UART: [ldev] FE.KEYID = 1
6,098,919 UART: [ldev] Erasing FE.KEYID = 1
8,603,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,732 UART: [ldev] --
10,411,727 UART: [fwproc] Wait for Commands...
10,414,645 UART: [fwproc] Recv command 0x46574c44
10,416,913 UART: [fwproc] Recv'd Img size: 114168 bytes
13,851,739 UART: ROM Fatal Error: 0x000B002B
13,855,416 >>> mbox cmd response: failed
13,855,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,856,081 >>> mbox cmd response: failed
13,856,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,856,692 >>> mbox cmd response: failed
Initializing fuses
2,060,797 writing to cptra_bootfsm_go
2,250,137 UART:
2,250,487 UART: Running Caliptra ROM ...
2,251,535 UART:
2,251,686 UART: [state] CFI Enabled
2,309,447 UART: [state] LifecycleState = Unprovisioned
2,311,829 UART: [state] DebugLocked = No
2,314,406 UART: [state] WD Timer not started. Device not locked for debugging
2,318,171 UART: [kat] SHA2-256
2,508,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,838 UART: [kat] ++
2,519,297 UART: [kat] sha1
2,530,407 UART: [kat] SHA2-256
2,533,425 UART: [kat] SHA2-384
2,538,390 UART: [kat] SHA2-512-ACC
2,540,966 UART: [kat] ECC-384
4,995,323 UART: [kat] HMAC-384Kdf
5,017,004 UART: [kat] LMS
5,548,764 UART: [kat] --
5,552,427 UART: [cold-reset] ++
5,553,562 UART: [fht] FHT @ 0x50003400
5,564,814 UART: [idev] ++
5,565,489 UART: [idev] CDI.KEYID = 6
5,566,636 UART: [idev] SUBJECT.KEYID = 7
5,567,746 UART: [idev] UDS.KEYID = 0
5,569,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,713,932 UART: [idev] Erasing UDS.KEYID = 0
8,072,464 UART: [idev] Sha1 KeyId Algorithm
8,095,172 UART: [idev] --
8,099,766 UART: [ldev] ++
8,100,491 UART: [ldev] CDI.KEYID = 6
8,101,388 UART: [ldev] SUBJECT.KEYID = 5
8,102,492 UART: [ldev] AUTHORITY.KEYID = 7
8,103,782 UART: [ldev] FE.KEYID = 1
8,144,759 UART: [ldev] Erasing FE.KEYID = 1
10,649,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,390 UART: [ldev] --
12,457,013 UART: [fwproc] Wait for Commands...
12,460,089 UART: [fwproc] Recv command 0x46574c44
12,462,354 UART: [fwproc] Recv'd Img size: 114168 bytes
15,905,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,099,993 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,642,260 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,434,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,261,176 >>> mbox cmd response: failed
14,261,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,262,141 >>> mbox cmd response: failed
14,262,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,262,701 >>> mbox cmd response: failed
Initializing fuses
2,054,961 writing to cptra_bootfsm_go
5,492,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,785,817 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,438 UART:
192,804 UART: Running Caliptra ROM ...
193,958 UART:
603,802 UART: [state] CFI Enabled
615,627 UART: [state] LifecycleState = Unprovisioned
618,006 UART: [state] DebugLocked = No
620,039 UART: [state] WD Timer not started. Device not locked for debugging
624,704 UART: [kat] SHA2-256
814,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,376 UART: [kat] ++
825,885 UART: [kat] sha1
839,009 UART: [kat] SHA2-256
842,027 UART: [kat] SHA2-384
847,201 UART: [kat] SHA2-512-ACC
849,758 UART: [kat] ECC-384
3,287,090 UART: [kat] HMAC-384Kdf
3,300,582 UART: [kat] LMS
3,832,389 UART: [kat] --
3,838,083 UART: [cold-reset] ++
3,839,650 UART: [fht] FHT @ 0x50003400
3,851,440 UART: [idev] ++
3,852,126 UART: [idev] CDI.KEYID = 6
3,853,033 UART: [idev] SUBJECT.KEYID = 7
3,854,252 UART: [idev] UDS.KEYID = 0
3,856,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,853 UART: [idev] Erasing UDS.KEYID = 0
6,329,304 UART: [idev] Sha1 KeyId Algorithm
6,351,353 UART: [idev] --
6,357,273 UART: [ldev] ++
6,357,961 UART: [ldev] CDI.KEYID = 6
6,358,851 UART: [ldev] SUBJECT.KEYID = 5
6,360,065 UART: [ldev] AUTHORITY.KEYID = 7
6,361,306 UART: [ldev] FE.KEYID = 1
6,372,090 UART: [ldev] Erasing FE.KEYID = 1
8,849,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,573 UART: [ldev] --
10,643,438 UART: [fwproc] Wait for Commands...
10,646,294 UART: [fwproc] Recv command 0x46574c44
10,648,557 UART: [fwproc] Recv'd Img size: 114168 bytes
14,084,559 UART: ROM Fatal Error: 0x000B002B
14,088,239 >>> mbox cmd response: failed
14,088,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,088,888 >>> mbox cmd response: failed
14,089,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,089,496 >>> mbox cmd response: failed
Initializing fuses
2,056,276 writing to cptra_bootfsm_go
2,245,592 UART:
2,245,935 UART: Running Caliptra ROM ...
2,247,024 UART:
6,363,593 UART: [state] CFI Enabled
6,378,117 UART: [state] LifecycleState = Unprovisioned
6,380,466 UART: [state] DebugLocked = No
6,382,664 UART: [state] WD Timer not started. Device not locked for debugging
6,388,157 UART: [kat] SHA2-256
6,578,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,588,813 UART: [kat] ++
6,589,417 UART: [kat] sha1
6,599,610 UART: [kat] SHA2-256
6,602,681 UART: [kat] SHA2-384
6,608,474 UART: [kat] SHA2-512-ACC
6,611,045 UART: [kat] ECC-384
9,055,771 UART: [kat] HMAC-384Kdf
9,069,840 UART: [kat] LMS
9,601,641 UART: [kat] --
9,606,292 UART: [cold-reset] ++
9,608,389 UART: [fht] FHT @ 0x50003400
9,621,488 UART: [idev] ++
9,622,208 UART: [idev] CDI.KEYID = 6
9,623,095 UART: [idev] SUBJECT.KEYID = 7
9,624,315 UART: [idev] UDS.KEYID = 0
9,626,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,769,927 UART: [idev] Erasing UDS.KEYID = 0
12,102,104 UART: [idev] Sha1 KeyId Algorithm
12,124,760 UART: [idev] --
12,129,726 UART: [ldev] ++
12,130,486 UART: [ldev] CDI.KEYID = 6
12,131,395 UART: [ldev] SUBJECT.KEYID = 5
12,132,555 UART: [ldev] AUTHORITY.KEYID = 7
12,133,724 UART: [ldev] FE.KEYID = 1
12,146,156 UART: [ldev] Erasing FE.KEYID = 1
14,626,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,343,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,358,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,374,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,389,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,409,180 UART: [ldev] --
16,413,964 UART: [fwproc] Wait for Commands...
16,416,430 UART: [fwproc] Recv command 0x46574c44
16,418,710 UART: [fwproc] Recv'd Img size: 114168 bytes
19,867,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,946,558 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,062,742 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,605,034 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,759,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,499,416 >>> mbox cmd response: failed
14,500,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,500,368 >>> mbox cmd response: failed
14,500,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,500,940 >>> mbox cmd response: failed
Initializing fuses
2,055,968 writing to cptra_bootfsm_go
9,125,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,325,255 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,693 UART: [kat] SHA2-256
881,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,739 UART: [kat] ++
885,891 UART: [kat] sha1
890,177 UART: [kat] SHA2-256
892,115 UART: [kat] SHA2-384
894,690 UART: [kat] SHA2-512-ACC
896,591 UART: [kat] ECC-384
902,160 UART: [kat] HMAC-384Kdf
906,816 UART: [kat] LMS
1,475,012 UART: [kat] --
1,475,953 UART: [cold-reset] ++
1,476,441 UART: [fht] Storing FHT @ 0x50003400
1,479,220 UART: [idev] ++
1,479,388 UART: [idev] CDI.KEYID = 6
1,479,748 UART: [idev] SUBJECT.KEYID = 7
1,480,172 UART: [idev] UDS.KEYID = 0
1,480,517 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,936 UART: [idev] Erasing UDS.KEYID = 0
1,503,922 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,782 UART: [idev] --
1,513,705 UART: [ldev] ++
1,513,873 UART: [ldev] CDI.KEYID = 6
1,514,236 UART: [ldev] SUBJECT.KEYID = 5
1,514,662 UART: [ldev] AUTHORITY.KEYID = 7
1,515,125 UART: [ldev] FE.KEYID = 1
1,519,817 UART: [ldev] Erasing FE.KEYID = 1
1,545,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,950 UART: [ldev] --
1,584,275 UART: [fwproc] Waiting for Commands...
1,585,018 UART: [fwproc] Received command 0x46574c44
1,585,809 UART: [fwproc] Received Image of size 114168 bytes
2,881,042 UART: ROM Fatal Error: 0x000B002B
2,882,201 >>> mbox cmd response: failed
2,882,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,882,207 >>> mbox cmd response: failed
2,882,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,882,213 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,496 UART: [state] LifecycleState = Unprovisioned
86,151 UART: [state] DebugLocked = No
86,699 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,209 UART: [kat] SHA2-256
882,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,255 UART: [kat] ++
886,407 UART: [kat] sha1
890,719 UART: [kat] SHA2-256
892,657 UART: [kat] SHA2-384
895,194 UART: [kat] SHA2-512-ACC
897,095 UART: [kat] ECC-384
903,070 UART: [kat] HMAC-384Kdf
907,848 UART: [kat] LMS
1,476,044 UART: [kat] --
1,476,985 UART: [cold-reset] ++
1,477,385 UART: [fht] Storing FHT @ 0x50003400
1,480,220 UART: [idev] ++
1,480,388 UART: [idev] CDI.KEYID = 6
1,480,748 UART: [idev] SUBJECT.KEYID = 7
1,481,172 UART: [idev] UDS.KEYID = 0
1,481,517 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,278 UART: [idev] Erasing UDS.KEYID = 0
1,506,130 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,704 UART: [idev] --
1,515,619 UART: [ldev] ++
1,515,787 UART: [ldev] CDI.KEYID = 6
1,516,150 UART: [ldev] SUBJECT.KEYID = 5
1,516,576 UART: [ldev] AUTHORITY.KEYID = 7
1,517,039 UART: [ldev] FE.KEYID = 1
1,522,315 UART: [ldev] Erasing FE.KEYID = 1
1,547,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,568 UART: [ldev] --
1,587,051 UART: [fwproc] Waiting for Commands...
1,587,716 UART: [fwproc] Received command 0x46574c44
1,588,507 UART: [fwproc] Received Image of size 114168 bytes
2,885,348 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,472 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,824 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,431 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,736,384 >>> mbox cmd response: failed
2,736,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,390 >>> mbox cmd response: failed
2,736,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,581 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,442 UART: [kat] SHA2-256
882,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,488 UART: [kat] ++
886,640 UART: [kat] sha1
890,898 UART: [kat] SHA2-256
892,836 UART: [kat] SHA2-384
895,641 UART: [kat] SHA2-512-ACC
897,542 UART: [kat] ECC-384
903,483 UART: [kat] HMAC-384Kdf
907,969 UART: [kat] LMS
1,476,165 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,079 UART: [idev] Erasing UDS.KEYID = 0
1,506,125 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,905 UART: [idev] --
1,516,064 UART: [ldev] ++
1,516,232 UART: [ldev] CDI.KEYID = 6
1,516,595 UART: [ldev] SUBJECT.KEYID = 5
1,517,021 UART: [ldev] AUTHORITY.KEYID = 7
1,517,484 UART: [ldev] FE.KEYID = 1
1,522,702 UART: [ldev] Erasing FE.KEYID = 1
1,548,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,929 UART: [ldev] --
1,587,348 UART: [fwproc] Waiting for Commands...
1,588,179 UART: [fwproc] Received command 0x46574c44
1,588,970 UART: [fwproc] Received Image of size 114168 bytes
2,883,551 UART: ROM Fatal Error: 0x000B002B
2,884,710 >>> mbox cmd response: failed
2,884,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,716 >>> mbox cmd response: failed
2,884,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,082 UART: [kat] SHA2-256
882,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,128 UART: [kat] ++
886,280 UART: [kat] sha1
890,550 UART: [kat] SHA2-256
892,488 UART: [kat] SHA2-384
895,109 UART: [kat] SHA2-512-ACC
897,010 UART: [kat] ECC-384
902,759 UART: [kat] HMAC-384Kdf
907,349 UART: [kat] LMS
1,475,545 UART: [kat] --
1,476,558 UART: [cold-reset] ++
1,477,000 UART: [fht] Storing FHT @ 0x50003400
1,479,781 UART: [idev] ++
1,479,949 UART: [idev] CDI.KEYID = 6
1,480,309 UART: [idev] SUBJECT.KEYID = 7
1,480,733 UART: [idev] UDS.KEYID = 0
1,481,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,805 UART: [idev] Erasing UDS.KEYID = 0
1,505,585 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,321 UART: [idev] --
1,515,544 UART: [ldev] ++
1,515,712 UART: [ldev] CDI.KEYID = 6
1,516,075 UART: [ldev] SUBJECT.KEYID = 5
1,516,501 UART: [ldev] AUTHORITY.KEYID = 7
1,516,964 UART: [ldev] FE.KEYID = 1
1,522,348 UART: [ldev] Erasing FE.KEYID = 1
1,546,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,029 UART: [ldev] --
1,586,544 UART: [fwproc] Waiting for Commands...
1,587,365 UART: [fwproc] Received command 0x46574c44
1,588,156 UART: [fwproc] Received Image of size 114168 bytes
2,882,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,380 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,737,907 >>> mbox cmd response: failed
2,737,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,913 >>> mbox cmd response: failed
2,737,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,737,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,432 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,838 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
893,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,253 UART: [kat] ++
897,405 UART: [kat] sha1
901,505 UART: [kat] SHA2-256
903,445 UART: [kat] SHA2-384
906,246 UART: [kat] SHA2-512-ACC
908,147 UART: [kat] ECC-384
917,860 UART: [kat] HMAC-384Kdf
922,498 UART: [kat] LMS
1,170,826 UART: [kat] --
1,171,541 UART: [cold-reset] ++
1,172,079 UART: [fht] FHT @ 0x50003400
1,174,816 UART: [idev] ++
1,174,984 UART: [idev] CDI.KEYID = 6
1,175,344 UART: [idev] SUBJECT.KEYID = 7
1,175,768 UART: [idev] UDS.KEYID = 0
1,176,113 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,336 UART: [idev] Erasing UDS.KEYID = 0
1,200,895 UART: [idev] Sha1 KeyId Algorithm
1,209,481 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,914 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,216,907 UART: [ldev] Erasing FE.KEYID = 1
1,243,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,882 UART: [fwproc] Recv command 0x46574c44
1,283,610 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,281 UART: ROM Fatal Error: 0x000B002B
2,581,440 >>> mbox cmd response: failed
2,581,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,446 >>> mbox cmd response: failed
2,581,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,719 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
893,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,609 UART: [kat] ++
897,761 UART: [kat] sha1
901,899 UART: [kat] SHA2-256
903,839 UART: [kat] SHA2-384
906,660 UART: [kat] SHA2-512-ACC
908,561 UART: [kat] ECC-384
917,900 UART: [kat] HMAC-384Kdf
922,500 UART: [kat] LMS
1,170,828 UART: [kat] --
1,172,011 UART: [cold-reset] ++
1,172,507 UART: [fht] FHT @ 0x50003400
1,175,208 UART: [idev] ++
1,175,376 UART: [idev] CDI.KEYID = 6
1,175,736 UART: [idev] SUBJECT.KEYID = 7
1,176,160 UART: [idev] UDS.KEYID = 0
1,176,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,941 UART: [idev] Sha1 KeyId Algorithm
1,209,395 UART: [idev] --
1,210,567 UART: [ldev] ++
1,210,735 UART: [ldev] CDI.KEYID = 6
1,211,098 UART: [ldev] SUBJECT.KEYID = 5
1,211,524 UART: [ldev] AUTHORITY.KEYID = 7
1,211,987 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,243,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,471 UART: [ldev] --
1,282,748 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,176 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,113 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,658 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,435,333 >>> mbox cmd response: failed
2,435,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,339 >>> mbox cmd response: failed
2,435,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,345 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,821 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,395 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
893,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,724 UART: [kat] ++
897,876 UART: [kat] sha1
902,086 UART: [kat] SHA2-256
904,026 UART: [kat] SHA2-384
906,907 UART: [kat] SHA2-512-ACC
908,808 UART: [kat] ECC-384
918,699 UART: [kat] HMAC-384Kdf
923,431 UART: [kat] LMS
1,171,759 UART: [kat] --
1,172,576 UART: [cold-reset] ++
1,173,068 UART: [fht] FHT @ 0x50003400
1,175,547 UART: [idev] ++
1,175,715 UART: [idev] CDI.KEYID = 6
1,176,075 UART: [idev] SUBJECT.KEYID = 7
1,176,499 UART: [idev] UDS.KEYID = 0
1,176,844 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,265 UART: [idev] Erasing UDS.KEYID = 0
1,201,208 UART: [idev] Sha1 KeyId Algorithm
1,209,798 UART: [idev] --
1,210,920 UART: [ldev] ++
1,211,088 UART: [ldev] CDI.KEYID = 6
1,211,451 UART: [ldev] SUBJECT.KEYID = 5
1,211,877 UART: [ldev] AUTHORITY.KEYID = 7
1,212,340 UART: [ldev] FE.KEYID = 1
1,217,386 UART: [ldev] Erasing FE.KEYID = 1
1,243,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,742 UART: [ldev] --
1,283,245 UART: [fwproc] Wait for Commands...
1,283,959 UART: [fwproc] Recv command 0x46574c44
1,284,687 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,898 UART: ROM Fatal Error: 0x000B002B
2,581,057 >>> mbox cmd response: failed
2,581,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,063 >>> mbox cmd response: failed
2,581,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
893,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,046 UART: [kat] ++
898,198 UART: [kat] sha1
902,482 UART: [kat] SHA2-256
904,422 UART: [kat] SHA2-384
907,229 UART: [kat] SHA2-512-ACC
909,130 UART: [kat] ECC-384
918,881 UART: [kat] HMAC-384Kdf
923,465 UART: [kat] LMS
1,171,793 UART: [kat] --
1,172,694 UART: [cold-reset] ++
1,173,236 UART: [fht] FHT @ 0x50003400
1,175,697 UART: [idev] ++
1,175,865 UART: [idev] CDI.KEYID = 6
1,176,225 UART: [idev] SUBJECT.KEYID = 7
1,176,649 UART: [idev] UDS.KEYID = 0
1,176,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,051 UART: [idev] Erasing UDS.KEYID = 0
1,202,438 UART: [idev] Sha1 KeyId Algorithm
1,210,826 UART: [idev] --
1,211,804 UART: [ldev] ++
1,211,972 UART: [ldev] CDI.KEYID = 6
1,212,335 UART: [ldev] SUBJECT.KEYID = 5
1,212,761 UART: [ldev] AUTHORITY.KEYID = 7
1,213,224 UART: [ldev] FE.KEYID = 1
1,218,370 UART: [ldev] Erasing FE.KEYID = 1
1,244,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,370 UART: [ldev] --
1,284,845 UART: [fwproc] Wait for Commands...
1,285,581 UART: [fwproc] Recv command 0x46574c44
1,286,309 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,952 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,256 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,763 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,434,192 >>> mbox cmd response: failed
2,434,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,198 >>> mbox cmd response: failed
2,434,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,892 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [kat] SHA2-256
891,170 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,344 UART: [kat] SHA2-512-ACC
906,245 UART: [kat] ECC-384
916,188 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,063 UART: [cold-reset] ++
1,170,521 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,199,093 UART: [idev] Sha1 KeyId Algorithm
1,208,121 UART: [idev] --
1,209,298 UART: [ldev] ++
1,209,466 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,257 UART: [ldev] AUTHORITY.KEYID = 7
1,210,720 UART: [ldev] FE.KEYID = 1
1,215,844 UART: [ldev] Erasing FE.KEYID = 1
1,242,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,696 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,969 UART: [fwproc] Recv command 0x46574c44
1,282,702 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,557 UART: ROM Fatal Error: 0x000B002B
2,577,716 >>> mbox cmd response: failed
2,577,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,722 >>> mbox cmd response: failed
2,577,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,577,728 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,169 UART: [kat] ++
895,321 UART: [kat] sha1
899,547 UART: [kat] SHA2-256
901,487 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,704 UART: [kat] HMAC-384Kdf
920,148 UART: [kat] LMS
1,168,460 UART: [kat] --
1,169,425 UART: [cold-reset] ++
1,169,943 UART: [fht] FHT @ 0x50003400
1,172,685 UART: [idev] ++
1,172,853 UART: [idev] CDI.KEYID = 6
1,173,214 UART: [idev] SUBJECT.KEYID = 7
1,173,639 UART: [idev] UDS.KEYID = 0
1,173,985 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,197,837 UART: [idev] Sha1 KeyId Algorithm
1,206,813 UART: [idev] --
1,207,854 UART: [ldev] ++
1,208,022 UART: [ldev] CDI.KEYID = 6
1,208,386 UART: [ldev] SUBJECT.KEYID = 5
1,208,813 UART: [ldev] AUTHORITY.KEYID = 7
1,209,276 UART: [ldev] FE.KEYID = 1
1,214,660 UART: [ldev] Erasing FE.KEYID = 1
1,240,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,776 UART: [ldev] --
1,280,230 UART: [fwproc] Wait for Commands...
1,280,961 UART: [fwproc] Recv command 0x46574c44
1,281,694 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,727 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,620 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,430,841 >>> mbox cmd response: failed
2,430,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,847 >>> mbox cmd response: failed
2,430,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,430,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,366 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,034 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,774 UART: [kat] ++
895,926 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,675 UART: [kat] SHA2-512-ACC
906,576 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,288 UART: [cold-reset] ++
1,170,652 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,174,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,832 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,723 UART: [ldev] ++
1,209,891 UART: [ldev] CDI.KEYID = 6
1,210,255 UART: [ldev] SUBJECT.KEYID = 5
1,210,682 UART: [ldev] AUTHORITY.KEYID = 7
1,211,145 UART: [ldev] FE.KEYID = 1
1,216,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,395 UART: [ldev] --
1,281,903 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,320 UART: ROM Fatal Error: 0x000B002B
2,579,479 >>> mbox cmd response: failed
2,579,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,485 >>> mbox cmd response: failed
2,579,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
891,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,628 UART: [kat] ++
895,780 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
921,053 UART: [kat] LMS
1,169,365 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,186 UART: [idev] ++
1,173,354 UART: [idev] CDI.KEYID = 6
1,173,715 UART: [idev] SUBJECT.KEYID = 7
1,174,140 UART: [idev] UDS.KEYID = 0
1,174,486 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,198,528 UART: [idev] Sha1 KeyId Algorithm
1,207,462 UART: [idev] --
1,208,345 UART: [ldev] ++
1,208,513 UART: [ldev] CDI.KEYID = 6
1,208,877 UART: [ldev] SUBJECT.KEYID = 5
1,209,304 UART: [ldev] AUTHORITY.KEYID = 7
1,209,767 UART: [ldev] FE.KEYID = 1
1,214,989 UART: [ldev] Erasing FE.KEYID = 1
1,241,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,351 UART: [ldev] --
1,280,837 UART: [fwproc] Wait for Commands...
1,281,602 UART: [fwproc] Recv command 0x46574c44
1,282,335 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,186 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,495 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,967 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,431,924 >>> mbox cmd response: failed
2,431,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,930 >>> mbox cmd response: failed
2,431,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,431,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,469 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,809 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,193 UART:
192,556 UART: Running Caliptra ROM ...
193,695 UART:
193,844 UART: [state] CFI Enabled
261,068 UART: [state] LifecycleState = Unprovisioned
263,054 UART: [state] DebugLocked = No
265,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,658 UART: [kat] SHA2-256
439,386 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,909 UART: [kat] ++
450,356 UART: [kat] sha1
461,531 UART: [kat] SHA2-256
464,219 UART: [kat] SHA2-384
469,116 UART: [kat] SHA2-512-ACC
471,455 UART: [kat] ECC-384
2,764,528 UART: [kat] HMAC-384Kdf
2,798,425 UART: [kat] LMS
3,988,729 UART: [kat] --
3,993,880 UART: [cold-reset] ++
3,995,060 UART: [fht] Storing FHT @ 0x50003400
4,006,497 UART: [idev] ++
4,007,105 UART: [idev] CDI.KEYID = 6
4,008,024 UART: [idev] SUBJECT.KEYID = 7
4,009,308 UART: [idev] UDS.KEYID = 0
4,012,156 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,796 UART: [idev] Erasing UDS.KEYID = 0
7,344,286 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,256 UART: [idev] --
7,369,956 UART: [ldev] ++
7,370,533 UART: [ldev] CDI.KEYID = 6
7,371,553 UART: [ldev] SUBJECT.KEYID = 5
7,372,714 UART: [ldev] AUTHORITY.KEYID = 7
7,373,946 UART: [ldev] FE.KEYID = 1
7,420,240 UART: [ldev] Erasing FE.KEYID = 1
10,748,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,464 UART: [ldev] --
13,111,651 UART: [fwproc] Waiting for Commands...
13,115,047 UART: [fwproc] Received command 0x46574c44
13,117,234 UART: [fwproc] Received Image of size 113844 bytes
17,162,258 UART: ROM Fatal Error: 0x000B0028
17,165,660 >>> mbox cmd response: failed
17,166,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,166,433 >>> mbox cmd response: failed
17,166,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,166,996 >>> mbox cmd response: failed
Initializing fuses
2,057,217 writing to cptra_bootfsm_go
2,246,539 UART:
2,246,929 UART: Running Caliptra ROM ...
2,247,980 UART:
2,248,139 UART: [state] CFI Enabled
2,312,878 UART: [state] LifecycleState = Unprovisioned
2,314,820 UART: [state] DebugLocked = No
2,316,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,632 UART: [kat] SHA2-256
2,491,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,849 UART: [kat] ++
2,502,338 UART: [kat] sha1
2,513,498 UART: [kat] SHA2-256
2,516,176 UART: [kat] SHA2-384
2,522,516 UART: [kat] SHA2-512-ACC
2,524,927 UART: [kat] ECC-384
4,818,001 UART: [kat] HMAC-384Kdf
4,832,114 UART: [kat] LMS
6,022,437 UART: [kat] --
6,026,835 UART: [cold-reset] ++
6,029,206 UART: [fht] Storing FHT @ 0x50003400
6,041,079 UART: [idev] ++
6,041,695 UART: [idev] CDI.KEYID = 6
6,042,614 UART: [idev] SUBJECT.KEYID = 7
6,043,832 UART: [idev] UDS.KEYID = 0
6,046,060 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,189,219 UART: [idev] Erasing UDS.KEYID = 0
9,377,328 UART: [idev] Using Sha1 for KeyId Algorithm
9,398,233 UART: [idev] --
9,401,069 UART: [ldev] ++
9,401,671 UART: [ldev] CDI.KEYID = 6
9,402,692 UART: [ldev] SUBJECT.KEYID = 5
9,403,894 UART: [ldev] AUTHORITY.KEYID = 7
9,405,075 UART: [ldev] FE.KEYID = 1
9,432,429 UART: [ldev] Erasing FE.KEYID = 1
12,767,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,080,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,110,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,124,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,144,837 UART: [ldev] --
15,149,076 UART: [fwproc] Waiting for Commands...
15,152,254 UART: [fwproc] Received command 0x46574c44
15,154,476 UART: [fwproc] Received Image of size 113844 bytes
19,199,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,276,564 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,345,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,661,457 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,788,878 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,143,847 >>> mbox cmd response: failed
17,144,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,145,122 >>> mbox cmd response: failed
17,145,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,145,693 >>> mbox cmd response: failed
Initializing fuses
2,060,870 writing to cptra_bootfsm_go
5,861,780 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,898,270 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,430 UART:
192,789 UART: Running Caliptra ROM ...
193,971 UART:
603,625 UART: [state] CFI Enabled
616,667 UART: [state] LifecycleState = Unprovisioned
618,616 UART: [state] DebugLocked = No
621,289 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,880 UART: [kat] SHA2-256
796,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,211 UART: [kat] ++
807,746 UART: [kat] sha1
818,006 UART: [kat] SHA2-256
820,704 UART: [kat] SHA2-384
826,735 UART: [kat] SHA2-512-ACC
829,129 UART: [kat] ECC-384
3,113,776 UART: [kat] HMAC-384Kdf
3,125,540 UART: [kat] LMS
4,315,668 UART: [kat] --
4,321,238 UART: [cold-reset] ++
4,323,012 UART: [fht] Storing FHT @ 0x50003400
4,335,416 UART: [idev] ++
4,335,980 UART: [idev] CDI.KEYID = 6
4,337,006 UART: [idev] SUBJECT.KEYID = 7
4,338,173 UART: [idev] UDS.KEYID = 0
4,341,246 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,448 UART: [idev] Erasing UDS.KEYID = 0
7,622,831 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,276 UART: [idev] --
7,649,329 UART: [ldev] ++
7,649,902 UART: [ldev] CDI.KEYID = 6
7,650,872 UART: [ldev] SUBJECT.KEYID = 5
7,652,087 UART: [ldev] AUTHORITY.KEYID = 7
7,653,330 UART: [ldev] FE.KEYID = 1
7,663,764 UART: [ldev] Erasing FE.KEYID = 1
10,951,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,023 UART: [ldev] --
13,312,806 UART: [fwproc] Waiting for Commands...
13,314,857 UART: [fwproc] Received command 0x46574c44
13,317,045 UART: [fwproc] Received Image of size 113844 bytes
17,363,498 UART: ROM Fatal Error: 0x000B0028
17,366,960 >>> mbox cmd response: failed
17,367,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,367,638 >>> mbox cmd response: failed
17,367,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,368,237 >>> mbox cmd response: failed
Initializing fuses
2,057,269 writing to cptra_bootfsm_go
2,246,570 UART:
2,246,915 UART: Running Caliptra ROM ...
2,248,063 UART:
3,091,100 UART: [state] CFI Enabled
3,106,780 UART: [state] LifecycleState = Unprovisioned
3,108,721 UART: [state] DebugLocked = No
3,110,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,116,616 UART: [kat] SHA2-256
3,286,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,296,911 UART: [kat] ++
3,297,405 UART: [kat] sha1
3,309,535 UART: [kat] SHA2-256
3,312,231 UART: [kat] SHA2-384
3,317,197 UART: [kat] SHA2-512-ACC
3,319,604 UART: [kat] ECC-384
5,603,705 UART: [kat] HMAC-384Kdf
5,616,275 UART: [kat] LMS
6,806,389 UART: [kat] --
6,810,505 UART: [cold-reset] ++
6,812,176 UART: [fht] Storing FHT @ 0x50003400
6,823,337 UART: [idev] ++
6,823,905 UART: [idev] CDI.KEYID = 6
6,824,835 UART: [idev] SUBJECT.KEYID = 7
6,826,055 UART: [idev] UDS.KEYID = 0
6,828,513 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,971,623 UART: [idev] Erasing UDS.KEYID = 0
10,114,366 UART: [idev] Using Sha1 for KeyId Algorithm
10,136,362 UART: [idev] --
10,139,980 UART: [ldev] ++
10,140,547 UART: [ldev] CDI.KEYID = 6
10,141,565 UART: [ldev] SUBJECT.KEYID = 5
10,142,973 UART: [ldev] AUTHORITY.KEYID = 7
10,144,164 UART: [ldev] FE.KEYID = 1
10,155,766 UART: [ldev] Erasing FE.KEYID = 1
13,445,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,738,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,752,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,767,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,782,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,800,878 UART: [ldev] --
15,806,465 UART: [fwproc] Waiting for Commands...
15,808,305 UART: [fwproc] Received command 0x46574c44
15,810,551 UART: [fwproc] Received Image of size 113844 bytes
19,854,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,935,995 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,004,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,320,756 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,126,105 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,334,742 >>> mbox cmd response: failed
17,335,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,335,827 >>> mbox cmd response: failed
17,336,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,336,402 >>> mbox cmd response: failed
Initializing fuses
2,064,524 writing to cptra_bootfsm_go
6,658,811 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,585,866 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,332 UART:
192,689 UART: Running Caliptra ROM ...
193,897 UART:
194,056 UART: [state] CFI Enabled
259,128 UART: [state] LifecycleState = Unprovisioned
261,047 UART: [state] DebugLocked = No
263,298 UART: [state] WD Timer not started. Device not locked for debugging
267,564 UART: [kat] SHA2-256
446,711 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,274 UART: [kat] ++
458,828 UART: [kat] sha1
469,864 UART: [kat] SHA2-256
472,874 UART: [kat] SHA2-384
478,661 UART: [kat] SHA2-512-ACC
481,623 UART: [kat] ECC-384
2,944,624 UART: [kat] HMAC-384Kdf
2,968,517 UART: [kat] LMS
3,497,955 UART: [kat] --
3,503,965 UART: [cold-reset] ++
3,505,961 UART: [fht] FHT @ 0x50003400
3,518,232 UART: [idev] ++
3,518,852 UART: [idev] CDI.KEYID = 6
3,519,788 UART: [idev] SUBJECT.KEYID = 7
3,520,949 UART: [idev] UDS.KEYID = 0
3,523,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,158 UART: [idev] Erasing UDS.KEYID = 0
6,024,054 UART: [idev] Sha1 KeyId Algorithm
6,046,703 UART: [idev] --
6,050,439 UART: [ldev] ++
6,051,014 UART: [ldev] CDI.KEYID = 6
6,051,911 UART: [ldev] SUBJECT.KEYID = 5
6,053,130 UART: [ldev] AUTHORITY.KEYID = 7
6,054,369 UART: [ldev] FE.KEYID = 1
6,097,303 UART: [ldev] Erasing FE.KEYID = 1
8,598,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,366,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,594 UART: [ldev] --
10,392,273 UART: [fwproc] Wait for Commands...
10,394,298 UART: [fwproc] Recv command 0x46574c44
10,396,387 UART: [fwproc] Recv'd Img size: 114168 bytes
13,792,646 UART: ROM Fatal Error: 0x000B0028
13,795,791 >>> mbox cmd response: failed
13,796,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,796,561 >>> mbox cmd response: failed
13,796,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,797,171 >>> mbox cmd response: failed
Initializing fuses
2,052,369 writing to cptra_bootfsm_go
2,241,717 UART:
2,242,069 UART: Running Caliptra ROM ...
2,243,209 UART:
2,243,380 UART: [state] CFI Enabled
2,315,182 UART: [state] LifecycleState = Unprovisioned
2,317,057 UART: [state] DebugLocked = No
2,318,504 UART: [state] WD Timer not started. Device not locked for debugging
2,321,925 UART: [kat] SHA2-256
2,501,066 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,512,646 UART: [kat] ++
2,513,194 UART: [kat] sha1
2,523,925 UART: [kat] SHA2-256
2,526,928 UART: [kat] SHA2-384
2,534,161 UART: [kat] SHA2-512-ACC
2,537,107 UART: [kat] ECC-384
4,997,944 UART: [kat] HMAC-384Kdf
5,021,515 UART: [kat] LMS
5,550,969 UART: [kat] --
5,554,529 UART: [cold-reset] ++
5,556,666 UART: [fht] FHT @ 0x50003400
5,567,976 UART: [idev] ++
5,568,560 UART: [idev] CDI.KEYID = 6
5,569,475 UART: [idev] SUBJECT.KEYID = 7
5,570,636 UART: [idev] UDS.KEYID = 0
5,572,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,716,620 UART: [idev] Erasing UDS.KEYID = 0
8,076,077 UART: [idev] Sha1 KeyId Algorithm
8,099,315 UART: [idev] --
8,102,079 UART: [ldev] ++
8,102,656 UART: [ldev] CDI.KEYID = 6
8,103,569 UART: [ldev] SUBJECT.KEYID = 5
8,104,732 UART: [ldev] AUTHORITY.KEYID = 7
8,105,963 UART: [ldev] FE.KEYID = 1
8,149,789 UART: [ldev] Erasing FE.KEYID = 1
10,653,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,458,755 UART: [ldev] --
12,463,698 UART: [fwproc] Wait for Commands...
12,466,667 UART: [fwproc] Recv command 0x46574c44
12,468,714 UART: [fwproc] Recv'd Img size: 114168 bytes
15,871,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,940,478 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,009,287 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,326,063 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,366,150 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,593,431 >>> mbox cmd response: failed
13,594,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,594,362 >>> mbox cmd response: failed
13,594,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,594,883 >>> mbox cmd response: failed
Initializing fuses
2,059,237 writing to cptra_bootfsm_go
5,424,195 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,105,889 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,431 UART:
192,949 UART: Running Caliptra ROM ...
194,164 UART:
603,484 UART: [state] CFI Enabled
618,276 UART: [state] LifecycleState = Unprovisioned
620,102 UART: [state] DebugLocked = No
622,879 UART: [state] WD Timer not started. Device not locked for debugging
626,715 UART: [kat] SHA2-256
805,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,388 UART: [kat] ++
817,920 UART: [kat] sha1
829,292 UART: [kat] SHA2-256
832,353 UART: [kat] SHA2-384
838,480 UART: [kat] SHA2-512-ACC
841,425 UART: [kat] ECC-384
3,286,302 UART: [kat] HMAC-384Kdf
3,299,561 UART: [kat] LMS
3,829,044 UART: [kat] --
3,833,198 UART: [cold-reset] ++
3,834,762 UART: [fht] FHT @ 0x50003400
3,846,994 UART: [idev] ++
3,847,558 UART: [idev] CDI.KEYID = 6
3,848,496 UART: [idev] SUBJECT.KEYID = 7
3,849,706 UART: [idev] UDS.KEYID = 0
3,852,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,995,747 UART: [idev] Erasing UDS.KEYID = 0
6,325,034 UART: [idev] Sha1 KeyId Algorithm
6,347,187 UART: [idev] --
6,351,608 UART: [ldev] ++
6,352,187 UART: [ldev] CDI.KEYID = 6
6,353,481 UART: [ldev] SUBJECT.KEYID = 5
6,354,600 UART: [ldev] AUTHORITY.KEYID = 7
6,355,777 UART: [ldev] FE.KEYID = 1
6,367,348 UART: [ldev] Erasing FE.KEYID = 1
8,841,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,576,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,592,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,361 UART: [ldev] --
10,633,987 UART: [fwproc] Wait for Commands...
10,635,438 UART: [fwproc] Recv command 0x46574c44
10,637,483 UART: [fwproc] Recv'd Img size: 114168 bytes
14,034,118 UART: ROM Fatal Error: 0x000B0028
14,037,259 >>> mbox cmd response: failed
14,037,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,038,002 >>> mbox cmd response: failed
14,038,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,038,585 >>> mbox cmd response: failed
Initializing fuses
2,052,426 writing to cptra_bootfsm_go
2,241,745 UART:
2,242,085 UART: Running Caliptra ROM ...
2,243,140 UART:
6,412,992 UART: [state] CFI Enabled
6,424,285 UART: [state] LifecycleState = Unprovisioned
6,426,149 UART: [state] DebugLocked = No
6,427,318 UART: [state] WD Timer not started. Device not locked for debugging
6,431,705 UART: [kat] SHA2-256
6,610,840 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,622,432 UART: [kat] ++
6,622,977 UART: [kat] sha1
6,633,553 UART: [kat] SHA2-256
6,636,604 UART: [kat] SHA2-384
6,641,487 UART: [kat] SHA2-512-ACC
6,644,436 UART: [kat] ECC-384
9,086,556 UART: [kat] HMAC-384Kdf
9,098,780 UART: [kat] LMS
9,628,245 UART: [kat] --
9,631,913 UART: [cold-reset] ++
9,633,531 UART: [fht] FHT @ 0x50003400
9,644,729 UART: [idev] ++
9,645,296 UART: [idev] CDI.KEYID = 6
9,646,203 UART: [idev] SUBJECT.KEYID = 7
9,647,420 UART: [idev] UDS.KEYID = 0
9,649,651 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,793,148 UART: [idev] Erasing UDS.KEYID = 0
12,123,153 UART: [idev] Sha1 KeyId Algorithm
12,147,138 UART: [idev] --
12,151,512 UART: [ldev] ++
12,152,106 UART: [ldev] CDI.KEYID = 6
12,153,015 UART: [ldev] SUBJECT.KEYID = 5
12,154,325 UART: [ldev] AUTHORITY.KEYID = 7
12,155,511 UART: [ldev] FE.KEYID = 1
12,168,317 UART: [ldev] Erasing FE.KEYID = 1
14,642,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,359,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,375,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,391,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,407,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,428,230 UART: [ldev] --
16,433,340 UART: [fwproc] Wait for Commands...
16,435,650 UART: [fwproc] Recv command 0x46574c44
16,437,747 UART: [fwproc] Recv'd Img size: 114168 bytes
19,849,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,915,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,984,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,302,250 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,698,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,815,892 >>> mbox cmd response: failed
13,816,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,816,795 >>> mbox cmd response: failed
13,817,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,817,397 >>> mbox cmd response: failed
Initializing fuses
2,053,588 writing to cptra_bootfsm_go
9,738,946 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,318,143 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,161 UART:
192,557 UART: Running Caliptra ROM ...
193,762 UART:
193,918 UART: [state] CFI Enabled
264,591 UART: [state] LifecycleState = Unprovisioned
267,028 UART: [state] DebugLocked = No
268,583 UART: [state] WD Timer not started. Device not locked for debugging
272,870 UART: [kat] SHA2-256
462,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,492 UART: [kat] ++
473,983 UART: [kat] sha1
485,998 UART: [kat] SHA2-256
489,007 UART: [kat] SHA2-384
495,211 UART: [kat] SHA2-512-ACC
497,780 UART: [kat] ECC-384
2,947,431 UART: [kat] HMAC-384Kdf
2,969,227 UART: [kat] LMS
3,501,020 UART: [kat] --
3,505,036 UART: [cold-reset] ++
3,505,947 UART: [fht] FHT @ 0x50003400
3,517,502 UART: [idev] ++
3,518,196 UART: [idev] CDI.KEYID = 6
3,519,135 UART: [idev] SUBJECT.KEYID = 7
3,520,347 UART: [idev] UDS.KEYID = 0
3,522,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,519 UART: [idev] Erasing UDS.KEYID = 0
6,029,481 UART: [idev] Sha1 KeyId Algorithm
6,051,096 UART: [idev] --
6,056,556 UART: [ldev] ++
6,057,173 UART: [ldev] CDI.KEYID = 6
6,058,065 UART: [ldev] SUBJECT.KEYID = 5
6,059,232 UART: [ldev] AUTHORITY.KEYID = 7
6,060,467 UART: [ldev] FE.KEYID = 1
6,099,742 UART: [ldev] Erasing FE.KEYID = 1
8,608,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,891 UART: [ldev] --
10,411,317 UART: [fwproc] Wait for Commands...
10,413,090 UART: [fwproc] Recv command 0x46574c44
10,415,355 UART: [fwproc] Recv'd Img size: 114168 bytes
13,848,784 UART: ROM Fatal Error: 0x000B0028
13,852,482 >>> mbox cmd response: failed
13,852,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,853,139 >>> mbox cmd response: failed
13,853,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,853,743 >>> mbox cmd response: failed
Initializing fuses
2,059,747 writing to cptra_bootfsm_go
2,249,110 UART:
2,249,470 UART: Running Caliptra ROM ...
2,250,611 UART:
2,250,781 UART: [state] CFI Enabled
2,314,979 UART: [state] LifecycleState = Unprovisioned
2,317,363 UART: [state] DebugLocked = No
2,320,154 UART: [state] WD Timer not started. Device not locked for debugging
2,324,198 UART: [kat] SHA2-256
2,514,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,880 UART: [kat] ++
2,525,343 UART: [kat] sha1
2,535,583 UART: [kat] SHA2-256
2,538,602 UART: [kat] SHA2-384
2,544,273 UART: [kat] SHA2-512-ACC
2,546,843 UART: [kat] ECC-384
4,998,880 UART: [kat] HMAC-384Kdf
5,022,464 UART: [kat] LMS
5,554,217 UART: [kat] --
5,559,388 UART: [cold-reset] ++
5,560,571 UART: [fht] FHT @ 0x50003400
5,571,453 UART: [idev] ++
5,572,169 UART: [idev] CDI.KEYID = 6
5,573,137 UART: [idev] SUBJECT.KEYID = 7
5,574,300 UART: [idev] UDS.KEYID = 0
5,576,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,720,100 UART: [idev] Erasing UDS.KEYID = 0
8,079,131 UART: [idev] Sha1 KeyId Algorithm
8,102,001 UART: [idev] --
8,107,407 UART: [ldev] ++
8,108,092 UART: [ldev] CDI.KEYID = 6
8,109,004 UART: [ldev] SUBJECT.KEYID = 5
8,110,167 UART: [ldev] AUTHORITY.KEYID = 7
8,111,415 UART: [ldev] FE.KEYID = 1
8,151,293 UART: [ldev] Erasing FE.KEYID = 1
10,657,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,114 UART: [ldev] --
12,465,385 UART: [fwproc] Wait for Commands...
12,467,756 UART: [fwproc] Recv command 0x46574c44
12,470,076 UART: [fwproc] Recv'd Img size: 114168 bytes
15,920,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,000,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,116,465 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,658,367 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,442,318 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,287,485 >>> mbox cmd response: failed
14,288,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,288,391 >>> mbox cmd response: failed
14,288,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,288,961 >>> mbox cmd response: failed
Initializing fuses
2,055,684 writing to cptra_bootfsm_go
5,489,367 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,785,177 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,558 UART:
192,920 UART: Running Caliptra ROM ...
194,133 UART:
603,850 UART: [state] CFI Enabled
618,480 UART: [state] LifecycleState = Unprovisioned
620,880 UART: [state] DebugLocked = No
623,201 UART: [state] WD Timer not started. Device not locked for debugging
627,293 UART: [kat] SHA2-256
817,139 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,950 UART: [kat] ++
828,454 UART: [kat] sha1
841,059 UART: [kat] SHA2-256
844,122 UART: [kat] SHA2-384
850,746 UART: [kat] SHA2-512-ACC
853,362 UART: [kat] ECC-384
3,298,378 UART: [kat] HMAC-384Kdf
3,310,825 UART: [kat] LMS
3,842,680 UART: [kat] --
3,848,411 UART: [cold-reset] ++
3,849,488 UART: [fht] FHT @ 0x50003400
3,861,828 UART: [idev] ++
3,862,525 UART: [idev] CDI.KEYID = 6
3,863,542 UART: [idev] SUBJECT.KEYID = 7
3,864,650 UART: [idev] UDS.KEYID = 0
3,867,150 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,010,770 UART: [idev] Erasing UDS.KEYID = 0
6,344,533 UART: [idev] Sha1 KeyId Algorithm
6,366,745 UART: [idev] --
6,370,525 UART: [ldev] ++
6,371,206 UART: [ldev] CDI.KEYID = 6
6,372,119 UART: [ldev] SUBJECT.KEYID = 5
6,373,282 UART: [ldev] AUTHORITY.KEYID = 7
6,374,512 UART: [ldev] FE.KEYID = 1
6,387,133 UART: [ldev] Erasing FE.KEYID = 1
8,864,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,321 UART: [ldev] --
10,656,419 UART: [fwproc] Wait for Commands...
10,657,864 UART: [fwproc] Recv command 0x46574c44
10,660,187 UART: [fwproc] Recv'd Img size: 114168 bytes
14,107,894 UART: ROM Fatal Error: 0x000B0028
14,111,529 >>> mbox cmd response: failed
14,111,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,112,177 >>> mbox cmd response: failed
14,112,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,112,783 >>> mbox cmd response: failed
Initializing fuses
2,056,462 writing to cptra_bootfsm_go
2,245,807 UART:
2,246,160 UART: Running Caliptra ROM ...
2,247,242 UART:
6,342,773 UART: [state] CFI Enabled
6,355,358 UART: [state] LifecycleState = Unprovisioned
6,357,745 UART: [state] DebugLocked = No
6,360,703 UART: [state] WD Timer not started. Device not locked for debugging
6,365,124 UART: [kat] SHA2-256
6,555,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,565,798 UART: [kat] ++
6,566,397 UART: [kat] sha1
6,579,244 UART: [kat] SHA2-256
6,582,276 UART: [kat] SHA2-384
6,587,783 UART: [kat] SHA2-512-ACC
6,590,357 UART: [kat] ECC-384
9,030,024 UART: [kat] HMAC-384Kdf
9,043,471 UART: [kat] LMS
9,575,277 UART: [kat] --
9,580,204 UART: [cold-reset] ++
9,581,921 UART: [fht] FHT @ 0x50003400
9,593,448 UART: [idev] ++
9,594,134 UART: [idev] CDI.KEYID = 6
9,595,074 UART: [idev] SUBJECT.KEYID = 7
9,596,290 UART: [idev] UDS.KEYID = 0
9,598,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,742,001 UART: [idev] Erasing UDS.KEYID = 0
12,073,009 UART: [idev] Sha1 KeyId Algorithm
12,096,363 UART: [idev] --
12,102,137 UART: [ldev] ++
12,102,814 UART: [ldev] CDI.KEYID = 6
12,103,747 UART: [ldev] SUBJECT.KEYID = 5
12,104,953 UART: [ldev] AUTHORITY.KEYID = 7
12,106,094 UART: [ldev] FE.KEYID = 1
12,117,936 UART: [ldev] Erasing FE.KEYID = 1
14,591,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,311,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,326,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,342,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,357,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,377,356 UART: [ldev] --
16,382,948 UART: [fwproc] Wait for Commands...
16,385,054 UART: [fwproc] Recv command 0x46574c44
16,387,324 UART: [fwproc] Recv'd Img size: 114168 bytes
19,830,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,903,122 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,019,293 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,561,047 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,761,440 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,493,712 >>> mbox cmd response: failed
14,494,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,494,624 >>> mbox cmd response: failed
14,494,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,495,226 >>> mbox cmd response: failed
Initializing fuses
2,055,888 writing to cptra_bootfsm_go
9,113,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,308,150 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,628 UART: [state] LifecycleState = Unprovisioned
86,283 UART: [state] DebugLocked = No
86,859 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,583 UART: [kat] SHA2-256
882,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,629 UART: [kat] ++
886,781 UART: [kat] sha1
890,955 UART: [kat] SHA2-256
892,893 UART: [kat] SHA2-384
895,736 UART: [kat] SHA2-512-ACC
897,637 UART: [kat] ECC-384
903,114 UART: [kat] HMAC-384Kdf
907,682 UART: [kat] LMS
1,475,878 UART: [kat] --
1,476,765 UART: [cold-reset] ++
1,477,173 UART: [fht] Storing FHT @ 0x50003400
1,479,984 UART: [idev] ++
1,480,152 UART: [idev] CDI.KEYID = 6
1,480,512 UART: [idev] SUBJECT.KEYID = 7
1,480,936 UART: [idev] UDS.KEYID = 0
1,481,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,006 UART: [idev] Erasing UDS.KEYID = 0
1,505,112 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,822 UART: [idev] --
1,514,989 UART: [ldev] ++
1,515,157 UART: [ldev] CDI.KEYID = 6
1,515,520 UART: [ldev] SUBJECT.KEYID = 5
1,515,946 UART: [ldev] AUTHORITY.KEYID = 7
1,516,409 UART: [ldev] FE.KEYID = 1
1,521,695 UART: [ldev] Erasing FE.KEYID = 1
1,547,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,722 UART: [ldev] --
1,586,017 UART: [fwproc] Waiting for Commands...
1,586,676 UART: [fwproc] Received command 0x46574c44
1,587,467 UART: [fwproc] Received Image of size 114168 bytes
2,882,111 UART: ROM Fatal Error: 0x000B0028
2,883,268 >>> mbox cmd response: failed
2,883,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,274 >>> mbox cmd response: failed
2,883,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,883,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,417 UART: [kat] SHA2-256
882,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,463 UART: [kat] ++
886,615 UART: [kat] sha1
891,047 UART: [kat] SHA2-256
892,985 UART: [kat] SHA2-384
895,576 UART: [kat] SHA2-512-ACC
897,477 UART: [kat] ECC-384
902,776 UART: [kat] HMAC-384Kdf
907,364 UART: [kat] LMS
1,475,560 UART: [kat] --
1,476,467 UART: [cold-reset] ++
1,477,009 UART: [fht] Storing FHT @ 0x50003400
1,479,816 UART: [idev] ++
1,479,984 UART: [idev] CDI.KEYID = 6
1,480,344 UART: [idev] SUBJECT.KEYID = 7
1,480,768 UART: [idev] UDS.KEYID = 0
1,481,113 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,406 UART: [idev] Erasing UDS.KEYID = 0
1,504,404 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,168 UART: [idev] --
1,514,307 UART: [ldev] ++
1,514,475 UART: [ldev] CDI.KEYID = 6
1,514,838 UART: [ldev] SUBJECT.KEYID = 5
1,515,264 UART: [ldev] AUTHORITY.KEYID = 7
1,515,727 UART: [ldev] FE.KEYID = 1
1,520,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,844 UART: [ldev] --
1,585,317 UART: [fwproc] Waiting for Commands...
1,586,010 UART: [fwproc] Received command 0x46574c44
1,586,801 UART: [fwproc] Received Image of size 114168 bytes
2,882,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,814 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,691 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,736,079 >>> mbox cmd response: failed
2,736,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,085 >>> mbox cmd response: failed
2,736,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,443 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,259 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,396 UART: [kat] SHA2-256
882,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,442 UART: [kat] ++
886,594 UART: [kat] sha1
891,038 UART: [kat] SHA2-256
892,976 UART: [kat] SHA2-384
895,889 UART: [kat] SHA2-512-ACC
897,790 UART: [kat] ECC-384
903,601 UART: [kat] HMAC-384Kdf
908,151 UART: [kat] LMS
1,476,347 UART: [kat] --
1,477,056 UART: [cold-reset] ++
1,477,508 UART: [fht] Storing FHT @ 0x50003400
1,480,419 UART: [idev] ++
1,480,587 UART: [idev] CDI.KEYID = 6
1,480,947 UART: [idev] SUBJECT.KEYID = 7
1,481,371 UART: [idev] UDS.KEYID = 0
1,481,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,315 UART: [idev] Erasing UDS.KEYID = 0
1,506,333 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,071 UART: [idev] --
1,516,098 UART: [ldev] ++
1,516,266 UART: [ldev] CDI.KEYID = 6
1,516,629 UART: [ldev] SUBJECT.KEYID = 5
1,517,055 UART: [ldev] AUTHORITY.KEYID = 7
1,517,518 UART: [ldev] FE.KEYID = 1
1,523,038 UART: [ldev] Erasing FE.KEYID = 1
1,548,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,441 UART: [ldev] --
1,587,834 UART: [fwproc] Waiting for Commands...
1,588,687 UART: [fwproc] Received command 0x46574c44
1,589,478 UART: [fwproc] Received Image of size 114168 bytes
2,884,788 UART: ROM Fatal Error: 0x000B0028
2,885,945 >>> mbox cmd response: failed
2,885,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,951 >>> mbox cmd response: failed
2,885,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,836 UART: [kat] SHA2-256
892,774 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
902,453 UART: [kat] HMAC-384Kdf
907,073 UART: [kat] LMS
1,475,269 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,660 UART: [fht] Storing FHT @ 0x50003400
1,479,519 UART: [idev] ++
1,479,687 UART: [idev] CDI.KEYID = 6
1,480,047 UART: [idev] SUBJECT.KEYID = 7
1,480,471 UART: [idev] UDS.KEYID = 0
1,480,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,275 UART: [idev] Erasing UDS.KEYID = 0
1,504,987 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,545 UART: [idev] --
1,514,690 UART: [ldev] ++
1,514,858 UART: [ldev] CDI.KEYID = 6
1,515,221 UART: [ldev] SUBJECT.KEYID = 5
1,515,647 UART: [ldev] AUTHORITY.KEYID = 7
1,516,110 UART: [ldev] FE.KEYID = 1
1,521,252 UART: [ldev] Erasing FE.KEYID = 1
1,546,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,255 UART: [ldev] --
1,585,564 UART: [fwproc] Waiting for Commands...
1,586,405 UART: [fwproc] Received command 0x46574c44
1,587,196 UART: [fwproc] Received Image of size 114168 bytes
2,883,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,300 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,736,882 >>> mbox cmd response: failed
2,736,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,888 >>> mbox cmd response: failed
2,736,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,894 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,929,000 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,913 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
893,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,941 UART: [kat] ++
898,093 UART: [kat] sha1
902,339 UART: [kat] SHA2-256
904,279 UART: [kat] SHA2-384
907,158 UART: [kat] SHA2-512-ACC
909,059 UART: [kat] ECC-384
918,952 UART: [kat] HMAC-384Kdf
923,470 UART: [kat] LMS
1,171,798 UART: [kat] --
1,172,565 UART: [cold-reset] ++
1,173,127 UART: [fht] FHT @ 0x50003400
1,175,850 UART: [idev] ++
1,176,018 UART: [idev] CDI.KEYID = 6
1,176,378 UART: [idev] SUBJECT.KEYID = 7
1,176,802 UART: [idev] UDS.KEYID = 0
1,177,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,600 UART: [idev] Erasing UDS.KEYID = 0
1,201,581 UART: [idev] Sha1 KeyId Algorithm
1,210,217 UART: [idev] --
1,211,257 UART: [ldev] ++
1,211,425 UART: [ldev] CDI.KEYID = 6
1,211,788 UART: [ldev] SUBJECT.KEYID = 5
1,212,214 UART: [ldev] AUTHORITY.KEYID = 7
1,212,677 UART: [ldev] FE.KEYID = 1
1,217,927 UART: [ldev] Erasing FE.KEYID = 1
1,244,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,037 UART: [ldev] --
1,283,466 UART: [fwproc] Wait for Commands...
1,284,096 UART: [fwproc] Recv command 0x46574c44
1,284,824 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,034 UART: ROM Fatal Error: 0x000B0028
2,581,191 >>> mbox cmd response: failed
2,581,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,197 >>> mbox cmd response: failed
2,581,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
893,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,193 UART: [kat] ++
897,345 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,302 UART: [kat] SHA2-512-ACC
908,203 UART: [kat] ECC-384
917,822 UART: [kat] HMAC-384Kdf
922,486 UART: [kat] LMS
1,170,814 UART: [kat] --
1,171,683 UART: [cold-reset] ++
1,172,051 UART: [fht] FHT @ 0x50003400
1,174,798 UART: [idev] ++
1,174,966 UART: [idev] CDI.KEYID = 6
1,175,326 UART: [idev] SUBJECT.KEYID = 7
1,175,750 UART: [idev] UDS.KEYID = 0
1,176,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,342 UART: [idev] Erasing UDS.KEYID = 0
1,200,353 UART: [idev] Sha1 KeyId Algorithm
1,208,841 UART: [idev] --
1,210,099 UART: [ldev] ++
1,210,267 UART: [ldev] CDI.KEYID = 6
1,210,630 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,405 UART: [ldev] Erasing FE.KEYID = 1
1,242,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,009 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,684 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,434,604 >>> mbox cmd response: failed
2,434,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,610 >>> mbox cmd response: failed
2,434,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,785 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
893,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,882 UART: [kat] ++
898,034 UART: [kat] sha1
902,446 UART: [kat] SHA2-256
904,386 UART: [kat] SHA2-384
907,071 UART: [kat] SHA2-512-ACC
908,972 UART: [kat] ECC-384
919,039 UART: [kat] HMAC-384Kdf
923,613 UART: [kat] LMS
1,171,941 UART: [kat] --
1,172,686 UART: [cold-reset] ++
1,173,062 UART: [fht] FHT @ 0x50003400
1,175,671 UART: [idev] ++
1,175,839 UART: [idev] CDI.KEYID = 6
1,176,199 UART: [idev] SUBJECT.KEYID = 7
1,176,623 UART: [idev] UDS.KEYID = 0
1,176,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,399 UART: [idev] Erasing UDS.KEYID = 0
1,201,508 UART: [idev] Sha1 KeyId Algorithm
1,209,958 UART: [idev] --
1,211,132 UART: [ldev] ++
1,211,300 UART: [ldev] CDI.KEYID = 6
1,211,663 UART: [ldev] SUBJECT.KEYID = 5
1,212,089 UART: [ldev] AUTHORITY.KEYID = 7
1,212,552 UART: [ldev] FE.KEYID = 1
1,217,790 UART: [ldev] Erasing FE.KEYID = 1
1,244,519 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,640 UART: [ldev] --
1,284,151 UART: [fwproc] Wait for Commands...
1,284,881 UART: [fwproc] Recv command 0x46574c44
1,285,609 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,145 UART: ROM Fatal Error: 0x000B0028
2,582,302 >>> mbox cmd response: failed
2,582,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,308 >>> mbox cmd response: failed
2,582,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,582,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,312 UART: [kat] SHA2-256
904,252 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,005 UART: [kat] LMS
1,171,333 UART: [kat] --
1,171,986 UART: [cold-reset] ++
1,172,462 UART: [fht] FHT @ 0x50003400
1,175,349 UART: [idev] ++
1,175,517 UART: [idev] CDI.KEYID = 6
1,175,877 UART: [idev] SUBJECT.KEYID = 7
1,176,301 UART: [idev] UDS.KEYID = 0
1,176,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,423 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,560 UART: [idev] --
1,210,766 UART: [ldev] ++
1,210,934 UART: [ldev] CDI.KEYID = 6
1,211,297 UART: [ldev] SUBJECT.KEYID = 5
1,211,723 UART: [ldev] AUTHORITY.KEYID = 7
1,212,186 UART: [ldev] FE.KEYID = 1
1,217,746 UART: [ldev] Erasing FE.KEYID = 1
1,244,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,478 UART: [ldev] --
1,283,803 UART: [fwproc] Wait for Commands...
1,284,597 UART: [fwproc] Recv command 0x46574c44
1,285,325 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,104 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,408 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,857 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,202 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,434,923 >>> mbox cmd response: failed
2,434,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,929 >>> mbox cmd response: failed
2,434,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,935 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,902 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,800 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,065 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
890,954 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,083 UART: [kat] ++
895,235 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,236 UART: [kat] SHA2-512-ACC
906,137 UART: [kat] ECC-384
916,000 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,067 UART: [idev] ++
1,173,235 UART: [idev] CDI.KEYID = 6
1,173,596 UART: [idev] SUBJECT.KEYID = 7
1,174,021 UART: [idev] UDS.KEYID = 0
1,174,367 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,198,647 UART: [idev] Sha1 KeyId Algorithm
1,207,573 UART: [idev] --
1,208,430 UART: [ldev] ++
1,208,598 UART: [ldev] CDI.KEYID = 6
1,208,962 UART: [ldev] SUBJECT.KEYID = 5
1,209,389 UART: [ldev] AUTHORITY.KEYID = 7
1,209,852 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,241,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,878 UART: [ldev] --
1,280,314 UART: [fwproc] Wait for Commands...
1,281,113 UART: [fwproc] Recv command 0x46574c44
1,281,846 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,232 UART: ROM Fatal Error: 0x000B0028
2,578,389 >>> mbox cmd response: failed
2,578,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,395 >>> mbox cmd response: failed
2,578,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,401 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,667 UART: [kat] SHA2-256
901,607 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,845 UART: [cold-reset] ++
1,170,313 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,174,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,337 UART: [idev] Erasing UDS.KEYID = 0
1,198,783 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,662 UART: [ldev] ++
1,208,830 UART: [ldev] CDI.KEYID = 6
1,209,194 UART: [ldev] SUBJECT.KEYID = 5
1,209,621 UART: [ldev] AUTHORITY.KEYID = 7
1,210,084 UART: [ldev] FE.KEYID = 1
1,215,204 UART: [ldev] Erasing FE.KEYID = 1
1,241,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,560 UART: [ldev] --
1,279,956 UART: [fwproc] Wait for Commands...
1,280,685 UART: [fwproc] Recv command 0x46574c44
1,281,418 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,239 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,548 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,042 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,008 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,598 >>> mbox cmd response: failed
2,433,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,604 >>> mbox cmd response: failed
2,433,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,028 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,009 UART: [state] LifecycleState = Unprovisioned
85,664 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
915,581 UART: [kat] HMAC-384Kdf
920,319 UART: [kat] LMS
1,168,631 UART: [kat] --
1,169,224 UART: [cold-reset] ++
1,169,640 UART: [fht] FHT @ 0x50003400
1,172,218 UART: [idev] ++
1,172,386 UART: [idev] CDI.KEYID = 6
1,172,747 UART: [idev] SUBJECT.KEYID = 7
1,173,172 UART: [idev] UDS.KEYID = 0
1,173,518 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,312 UART: [idev] Erasing UDS.KEYID = 0
1,198,530 UART: [idev] Sha1 KeyId Algorithm
1,207,216 UART: [idev] --
1,208,239 UART: [ldev] ++
1,208,407 UART: [ldev] CDI.KEYID = 6
1,208,771 UART: [ldev] SUBJECT.KEYID = 5
1,209,198 UART: [ldev] AUTHORITY.KEYID = 7
1,209,661 UART: [ldev] FE.KEYID = 1
1,215,243 UART: [ldev] Erasing FE.KEYID = 1
1,241,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,431 UART: [ldev] --
1,280,801 UART: [fwproc] Wait for Commands...
1,281,626 UART: [fwproc] Recv command 0x46574c44
1,282,359 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,969 UART: ROM Fatal Error: 0x000B0028
2,579,126 >>> mbox cmd response: failed
2,579,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,132 >>> mbox cmd response: failed
2,579,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
87,020 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,874 UART: [kat] ++
896,026 UART: [kat] sha1
900,072 UART: [kat] SHA2-256
902,012 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,169,972 UART: [cold-reset] ++
1,170,430 UART: [fht] FHT @ 0x50003400
1,172,936 UART: [idev] ++
1,173,104 UART: [idev] CDI.KEYID = 6
1,173,465 UART: [idev] SUBJECT.KEYID = 7
1,173,890 UART: [idev] UDS.KEYID = 0
1,174,236 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,644 UART: [idev] Sha1 KeyId Algorithm
1,208,534 UART: [idev] --
1,209,603 UART: [ldev] ++
1,209,771 UART: [ldev] CDI.KEYID = 6
1,210,135 UART: [ldev] SUBJECT.KEYID = 5
1,210,562 UART: [ldev] AUTHORITY.KEYID = 7
1,211,025 UART: [ldev] FE.KEYID = 1
1,216,361 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,857 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,789 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,053 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,432,119 >>> mbox cmd response: failed
2,432,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,125 >>> mbox cmd response: failed
2,432,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,432,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,701 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,227 UART:
192,587 UART: Running Caliptra ROM ...
193,768 UART:
193,925 UART: [state] CFI Enabled
262,855 UART: [state] LifecycleState = Unprovisioned
264,779 UART: [state] DebugLocked = No
266,437 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,831 UART: [kat] SHA2-256
440,552 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,062 UART: [kat] ++
451,515 UART: [kat] sha1
462,771 UART: [kat] SHA2-256
465,461 UART: [kat] SHA2-384
471,119 UART: [kat] SHA2-512-ACC
473,509 UART: [kat] ECC-384
2,767,206 UART: [kat] HMAC-384Kdf
2,799,690 UART: [kat] LMS
3,989,984 UART: [kat] --
3,993,406 UART: [cold-reset] ++
3,994,959 UART: [fht] Storing FHT @ 0x50003400
4,005,852 UART: [idev] ++
4,006,429 UART: [idev] CDI.KEYID = 6
4,007,317 UART: [idev] SUBJECT.KEYID = 7
4,008,592 UART: [idev] UDS.KEYID = 0
4,011,371 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,766 UART: [idev] Erasing UDS.KEYID = 0
7,346,293 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,606 UART: [idev] --
7,370,110 UART: [ldev] ++
7,370,676 UART: [ldev] CDI.KEYID = 6
7,371,621 UART: [ldev] SUBJECT.KEYID = 5
7,372,890 UART: [ldev] AUTHORITY.KEYID = 7
7,374,183 UART: [ldev] FE.KEYID = 1
7,400,787 UART: [ldev] Erasing FE.KEYID = 1
10,733,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,580 UART: [ldev] --
13,113,896 UART: [fwproc] Waiting for Commands...
13,116,217 UART: [fwproc] Received command 0x46574c44
13,118,402 UART: [fwproc] Received Image of size 113844 bytes
17,164,182 UART: ROM Fatal Error: 0x000B0029
17,167,647 >>> mbox cmd response: failed
17,167,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,168,305 >>> mbox cmd response: failed
17,168,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,168,868 >>> mbox cmd response: failed
Initializing fuses
2,061,846 writing to cptra_bootfsm_go
2,251,111 UART:
2,251,457 UART: Running Caliptra ROM ...
2,252,501 UART:
2,252,676 UART: [state] CFI Enabled
2,313,300 UART: [state] LifecycleState = Unprovisioned
2,315,236 UART: [state] DebugLocked = No
2,318,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,176 UART: [kat] SHA2-256
2,492,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,396 UART: [kat] ++
2,503,857 UART: [kat] sha1
2,514,471 UART: [kat] SHA2-256
2,517,166 UART: [kat] SHA2-384
2,523,693 UART: [kat] SHA2-512-ACC
2,526,030 UART: [kat] ECC-384
4,816,462 UART: [kat] HMAC-384Kdf
4,827,459 UART: [kat] LMS
6,017,739 UART: [kat] --
6,022,677 UART: [cold-reset] ++
6,023,664 UART: [fht] Storing FHT @ 0x50003400
6,034,907 UART: [idev] ++
6,035,475 UART: [idev] CDI.KEYID = 6
6,036,414 UART: [idev] SUBJECT.KEYID = 7
6,037,688 UART: [idev] UDS.KEYID = 0
6,039,810 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,183,109 UART: [idev] Erasing UDS.KEYID = 0
9,370,873 UART: [idev] Using Sha1 for KeyId Algorithm
9,392,693 UART: [idev] --
9,396,412 UART: [ldev] ++
9,396,987 UART: [ldev] CDI.KEYID = 6
9,397,927 UART: [ldev] SUBJECT.KEYID = 5
9,399,187 UART: [ldev] AUTHORITY.KEYID = 7
9,400,433 UART: [ldev] FE.KEYID = 1
9,427,052 UART: [ldev] Erasing FE.KEYID = 1
12,760,014 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,054,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,068,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,083,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,098,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,116,450 UART: [ldev] --
15,120,418 UART: [fwproc] Waiting for Commands...
15,123,211 UART: [fwproc] Received command 0x46574c44
15,125,410 UART: [fwproc] Received Image of size 113844 bytes
19,177,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,253,990 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,322,870 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,639,362 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,788,815 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,142,014 >>> mbox cmd response: failed
17,142,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,142,916 >>> mbox cmd response: failed
17,143,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,143,478 >>> mbox cmd response: failed
Initializing fuses
2,056,045 writing to cptra_bootfsm_go
5,841,650 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,931,524 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,481 UART:
192,855 UART: Running Caliptra ROM ...
193,989 UART:
603,812 UART: [state] CFI Enabled
618,305 UART: [state] LifecycleState = Unprovisioned
620,253 UART: [state] DebugLocked = No
623,194 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,861 UART: [kat] SHA2-256
797,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,195 UART: [kat] ++
808,731 UART: [kat] sha1
820,215 UART: [kat] SHA2-256
822,937 UART: [kat] SHA2-384
827,245 UART: [kat] SHA2-512-ACC
829,581 UART: [kat] ECC-384
3,112,522 UART: [kat] HMAC-384Kdf
3,124,289 UART: [kat] LMS
4,314,375 UART: [kat] --
4,317,743 UART: [cold-reset] ++
4,320,274 UART: [fht] Storing FHT @ 0x50003400
4,331,997 UART: [idev] ++
4,332,610 UART: [idev] CDI.KEYID = 6
4,333,498 UART: [idev] SUBJECT.KEYID = 7
4,334,775 UART: [idev] UDS.KEYID = 0
4,337,506 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,567 UART: [idev] Erasing UDS.KEYID = 0
7,623,427 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,719 UART: [idev] --
7,648,011 UART: [ldev] ++
7,648,585 UART: [ldev] CDI.KEYID = 6
7,649,562 UART: [ldev] SUBJECT.KEYID = 5
7,650,778 UART: [ldev] AUTHORITY.KEYID = 7
7,652,010 UART: [ldev] FE.KEYID = 1
7,662,388 UART: [ldev] Erasing FE.KEYID = 1
10,949,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,646 UART: [ldev] --
13,312,136 UART: [fwproc] Waiting for Commands...
13,315,203 UART: [fwproc] Received command 0x46574c44
13,317,383 UART: [fwproc] Received Image of size 113844 bytes
17,365,139 UART: ROM Fatal Error: 0x000B0029
17,368,545 >>> mbox cmd response: failed
17,368,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,200 >>> mbox cmd response: failed
17,369,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,369,797 >>> mbox cmd response: failed
Initializing fuses
2,068,694 writing to cptra_bootfsm_go
2,258,021 UART:
2,258,370 UART: Running Caliptra ROM ...
2,259,510 UART:
3,082,871 UART: [state] CFI Enabled
3,095,256 UART: [state] LifecycleState = Unprovisioned
3,097,173 UART: [state] DebugLocked = No
3,099,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,104,277 UART: [kat] SHA2-256
3,274,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,284,568 UART: [kat] ++
3,285,031 UART: [kat] sha1
3,297,219 UART: [kat] SHA2-256
3,299,910 UART: [kat] SHA2-384
3,305,409 UART: [kat] SHA2-512-ACC
3,307,814 UART: [kat] ECC-384
5,591,249 UART: [kat] HMAC-384Kdf
5,603,216 UART: [kat] LMS
6,793,327 UART: [kat] --
6,799,652 UART: [cold-reset] ++
6,800,666 UART: [fht] Storing FHT @ 0x50003400
6,812,483 UART: [idev] ++
6,813,061 UART: [idev] CDI.KEYID = 6
6,813,949 UART: [idev] SUBJECT.KEYID = 7
6,815,221 UART: [idev] UDS.KEYID = 0
6,817,505 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,960,447 UART: [idev] Erasing UDS.KEYID = 0
10,107,047 UART: [idev] Using Sha1 for KeyId Algorithm
10,127,852 UART: [idev] --
10,133,359 UART: [ldev] ++
10,133,927 UART: [ldev] CDI.KEYID = 6
10,134,866 UART: [ldev] SUBJECT.KEYID = 5
10,136,151 UART: [ldev] AUTHORITY.KEYID = 7
10,137,307 UART: [ldev] FE.KEYID = 1
10,149,328 UART: [ldev] Erasing FE.KEYID = 1
13,433,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,725,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,740,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,755,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,769,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,787,833 UART: [ldev] --
15,792,557 UART: [fwproc] Waiting for Commands...
15,795,351 UART: [fwproc] Received command 0x46574c44
15,797,535 UART: [fwproc] Received Image of size 113844 bytes
19,843,674 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,922,979 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,991,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,308,380 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
4,127,405 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,332,539 >>> mbox cmd response: failed
17,333,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,333,458 >>> mbox cmd response: failed
17,333,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,334,018 >>> mbox cmd response: failed
Initializing fuses
2,062,309 writing to cptra_bootfsm_go
6,667,843 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,613,547 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,161 UART:
192,534 UART: Running Caliptra ROM ...
193,749 UART:
193,899 UART: [state] CFI Enabled
260,390 UART: [state] LifecycleState = Unprovisioned
262,243 UART: [state] DebugLocked = No
264,654 UART: [state] WD Timer not started. Device not locked for debugging
268,548 UART: [kat] SHA2-256
447,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,226 UART: [kat] ++
459,765 UART: [kat] sha1
470,705 UART: [kat] SHA2-256
473,759 UART: [kat] SHA2-384
480,011 UART: [kat] SHA2-512-ACC
483,004 UART: [kat] ECC-384
2,949,284 UART: [kat] HMAC-384Kdf
2,971,457 UART: [kat] LMS
3,500,868 UART: [kat] --
3,505,297 UART: [cold-reset] ++
3,507,448 UART: [fht] FHT @ 0x50003400
3,517,944 UART: [idev] ++
3,518,515 UART: [idev] CDI.KEYID = 6
3,519,398 UART: [idev] SUBJECT.KEYID = 7
3,520,628 UART: [idev] UDS.KEYID = 0
3,523,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,001 UART: [idev] Erasing UDS.KEYID = 0
6,025,082 UART: [idev] Sha1 KeyId Algorithm
6,046,658 UART: [idev] --
6,050,719 UART: [ldev] ++
6,051,291 UART: [ldev] CDI.KEYID = 6
6,052,212 UART: [ldev] SUBJECT.KEYID = 5
6,053,428 UART: [ldev] AUTHORITY.KEYID = 7
6,054,662 UART: [ldev] FE.KEYID = 1
6,100,539 UART: [ldev] Erasing FE.KEYID = 1
8,602,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,452 UART: [ldev] --
10,413,229 UART: [fwproc] Wait for Commands...
10,415,872 UART: [fwproc] Recv command 0x46574c44
10,417,956 UART: [fwproc] Recv'd Img size: 114168 bytes
13,816,007 UART: ROM Fatal Error: 0x000B0029
13,819,092 >>> mbox cmd response: failed
13,819,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,819,853 >>> mbox cmd response: failed
13,820,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,820,540 >>> mbox cmd response: failed
Initializing fuses
2,059,110 writing to cptra_bootfsm_go
2,248,436 UART:
2,248,783 UART: Running Caliptra ROM ...
2,249,848 UART:
2,249,998 UART: [state] CFI Enabled
2,312,793 UART: [state] LifecycleState = Unprovisioned
2,314,624 UART: [state] DebugLocked = No
2,316,993 UART: [state] WD Timer not started. Device not locked for debugging
2,320,265 UART: [kat] SHA2-256
2,499,380 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,510,943 UART: [kat] ++
2,511,494 UART: [kat] sha1
2,521,970 UART: [kat] SHA2-256
2,524,969 UART: [kat] SHA2-384
2,532,258 UART: [kat] SHA2-512-ACC
2,535,213 UART: [kat] ECC-384
4,999,793 UART: [kat] HMAC-384Kdf
5,022,723 UART: [kat] LMS
5,552,191 UART: [kat] --
5,556,704 UART: [cold-reset] ++
5,558,297 UART: [fht] FHT @ 0x50003400
5,570,260 UART: [idev] ++
5,570,832 UART: [idev] CDI.KEYID = 6
5,571,745 UART: [idev] SUBJECT.KEYID = 7
5,572,962 UART: [idev] UDS.KEYID = 0
5,575,192 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,718,902 UART: [idev] Erasing UDS.KEYID = 0
8,077,290 UART: [idev] Sha1 KeyId Algorithm
8,099,503 UART: [idev] --
8,103,558 UART: [ldev] ++
8,104,125 UART: [ldev] CDI.KEYID = 6
8,105,087 UART: [ldev] SUBJECT.KEYID = 5
8,106,169 UART: [ldev] AUTHORITY.KEYID = 7
8,107,516 UART: [ldev] FE.KEYID = 1
8,151,414 UART: [ldev] Erasing FE.KEYID = 1
10,653,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,371,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,057 UART: [ldev] --
12,445,464 UART: [fwproc] Wait for Commands...
12,447,788 UART: [fwproc] Recv command 0x46574c44
12,449,895 UART: [fwproc] Recv'd Img size: 114168 bytes
15,847,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,921,130 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,989,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,307,919 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
3,386,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,612,442 >>> mbox cmd response: failed
13,613,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,613,400 >>> mbox cmd response: failed
13,613,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,613,971 >>> mbox cmd response: failed
Initializing fuses
2,056,229 writing to cptra_bootfsm_go
5,403,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,083,296 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,724 UART:
193,091 UART: Running Caliptra ROM ...
194,320 UART:
603,939 UART: [state] CFI Enabled
617,221 UART: [state] LifecycleState = Unprovisioned
619,102 UART: [state] DebugLocked = No
622,015 UART: [state] WD Timer not started. Device not locked for debugging
625,297 UART: [kat] SHA2-256
804,409 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,979 UART: [kat] ++
816,424 UART: [kat] sha1
828,535 UART: [kat] SHA2-256
831,551 UART: [kat] SHA2-384
836,397 UART: [kat] SHA2-512-ACC
839,328 UART: [kat] ECC-384
3,281,665 UART: [kat] HMAC-384Kdf
3,294,005 UART: [kat] LMS
3,823,465 UART: [kat] --
3,828,394 UART: [cold-reset] ++
3,829,216 UART: [fht] FHT @ 0x50003400
3,840,849 UART: [idev] ++
3,841,453 UART: [idev] CDI.KEYID = 6
3,842,342 UART: [idev] SUBJECT.KEYID = 7
3,843,500 UART: [idev] UDS.KEYID = 0
3,846,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,497 UART: [idev] Erasing UDS.KEYID = 0
6,318,558 UART: [idev] Sha1 KeyId Algorithm
6,341,652 UART: [idev] --
6,344,899 UART: [ldev] ++
6,345,475 UART: [ldev] CDI.KEYID = 6
6,346,392 UART: [ldev] SUBJECT.KEYID = 5
6,347,552 UART: [ldev] AUTHORITY.KEYID = 7
6,348,785 UART: [ldev] FE.KEYID = 1
6,359,055 UART: [ldev] Erasing FE.KEYID = 1
8,835,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,420 UART: [ldev] --
10,624,819 UART: [fwproc] Wait for Commands...
10,627,562 UART: [fwproc] Recv command 0x46574c44
10,629,657 UART: [fwproc] Recv'd Img size: 114168 bytes
14,029,284 UART: ROM Fatal Error: 0x000B0029
14,032,413 >>> mbox cmd response: failed
14,032,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,033,162 >>> mbox cmd response: failed
14,033,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,033,956 >>> mbox cmd response: failed
Initializing fuses
2,056,998 writing to cptra_bootfsm_go
2,246,320 UART:
2,246,658 UART: Running Caliptra ROM ...
2,247,795 UART:
6,418,026 UART: [state] CFI Enabled
6,430,076 UART: [state] LifecycleState = Unprovisioned
6,431,930 UART: [state] DebugLocked = No
6,434,394 UART: [state] WD Timer not started. Device not locked for debugging
6,438,840 UART: [kat] SHA2-256
6,617,915 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,629,518 UART: [kat] ++
6,630,061 UART: [kat] sha1
6,641,878 UART: [kat] SHA2-256
6,644,887 UART: [kat] SHA2-384
6,650,332 UART: [kat] SHA2-512-ACC
6,653,302 UART: [kat] ECC-384
9,092,926 UART: [kat] HMAC-384Kdf
9,104,594 UART: [kat] LMS
9,634,109 UART: [kat] --
9,639,881 UART: [cold-reset] ++
9,642,185 UART: [fht] FHT @ 0x50003400
9,653,384 UART: [idev] ++
9,653,994 UART: [idev] CDI.KEYID = 6
9,654,885 UART: [idev] SUBJECT.KEYID = 7
9,656,103 UART: [idev] UDS.KEYID = 0
9,658,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,801,940 UART: [idev] Erasing UDS.KEYID = 0
12,128,632 UART: [idev] Sha1 KeyId Algorithm
12,150,369 UART: [idev] --
12,154,147 UART: [ldev] ++
12,154,711 UART: [ldev] CDI.KEYID = 6
12,155,615 UART: [ldev] SUBJECT.KEYID = 5
12,156,828 UART: [ldev] AUTHORITY.KEYID = 7
12,158,059 UART: [ldev] FE.KEYID = 1
12,168,119 UART: [ldev] Erasing FE.KEYID = 1
14,639,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,357,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,373,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,389,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,404,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,426,000 UART: [ldev] --
16,429,811 UART: [fwproc] Wait for Commands...
16,431,693 UART: [fwproc] Recv command 0x46574c44
16,433,788 UART: [fwproc] Recv'd Img size: 114168 bytes
19,841,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,919,566 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,988,384 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,306,145 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,692,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,808,108 >>> mbox cmd response: failed
13,808,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,809,019 >>> mbox cmd response: failed
13,809,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,809,586 >>> mbox cmd response: failed
Initializing fuses
2,053,326 writing to cptra_bootfsm_go
9,758,498 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,324,878 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,237 UART:
192,614 UART: Running Caliptra ROM ...
193,718 UART:
193,863 UART: [state] CFI Enabled
265,588 UART: [state] LifecycleState = Unprovisioned
267,953 UART: [state] DebugLocked = No
270,330 UART: [state] WD Timer not started. Device not locked for debugging
274,773 UART: [kat] SHA2-256
464,670 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,452 UART: [kat] ++
475,903 UART: [kat] sha1
488,460 UART: [kat] SHA2-256
491,469 UART: [kat] SHA2-384
497,883 UART: [kat] SHA2-512-ACC
500,447 UART: [kat] ECC-384
2,943,641 UART: [kat] HMAC-384Kdf
2,969,828 UART: [kat] LMS
3,501,615 UART: [kat] --
3,506,307 UART: [cold-reset] ++
3,508,458 UART: [fht] FHT @ 0x50003400
3,519,471 UART: [idev] ++
3,520,203 UART: [idev] CDI.KEYID = 6
3,521,132 UART: [idev] SUBJECT.KEYID = 7
3,522,295 UART: [idev] UDS.KEYID = 0
3,524,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,551 UART: [idev] Erasing UDS.KEYID = 0
6,026,232 UART: [idev] Sha1 KeyId Algorithm
6,048,675 UART: [idev] --
6,053,054 UART: [ldev] ++
6,053,754 UART: [ldev] CDI.KEYID = 6
6,054,669 UART: [ldev] SUBJECT.KEYID = 5
6,055,833 UART: [ldev] AUTHORITY.KEYID = 7
6,057,070 UART: [ldev] FE.KEYID = 1
6,098,570 UART: [ldev] Erasing FE.KEYID = 1
8,604,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,261 UART: [ldev] --
10,413,916 UART: [fwproc] Wait for Commands...
10,416,243 UART: [fwproc] Recv command 0x46574c44
10,418,507 UART: [fwproc] Recv'd Img size: 114168 bytes
13,858,136 UART: ROM Fatal Error: 0x000B0029
13,861,776 >>> mbox cmd response: failed
13,862,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,862,540 >>> mbox cmd response: failed
13,862,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,863,105 >>> mbox cmd response: failed
Initializing fuses
2,056,816 writing to cptra_bootfsm_go
2,246,161 UART:
2,246,511 UART: Running Caliptra ROM ...
2,247,648 UART:
2,247,813 UART: [state] CFI Enabled
2,305,522 UART: [state] LifecycleState = Unprovisioned
2,307,621 UART: [state] DebugLocked = No
2,309,447 UART: [state] WD Timer not started. Device not locked for debugging
2,313,702 UART: [kat] SHA2-256
2,503,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,514,359 UART: [kat] ++
2,514,819 UART: [kat] sha1
2,526,740 UART: [kat] SHA2-256
2,529,789 UART: [kat] SHA2-384
2,534,441 UART: [kat] SHA2-512-ACC
2,537,054 UART: [kat] ECC-384
4,985,197 UART: [kat] HMAC-384Kdf
5,012,087 UART: [kat] LMS
5,543,854 UART: [kat] --
5,548,821 UART: [cold-reset] ++
5,551,303 UART: [fht] FHT @ 0x50003400
5,562,500 UART: [idev] ++
5,563,181 UART: [idev] CDI.KEYID = 6
5,564,148 UART: [idev] SUBJECT.KEYID = 7
5,565,310 UART: [idev] UDS.KEYID = 0
5,567,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,711,210 UART: [idev] Erasing UDS.KEYID = 0
8,069,751 UART: [idev] Sha1 KeyId Algorithm
8,093,424 UART: [idev] --
8,099,709 UART: [ldev] ++
8,100,399 UART: [ldev] CDI.KEYID = 6
8,101,310 UART: [ldev] SUBJECT.KEYID = 5
8,102,466 UART: [ldev] AUTHORITY.KEYID = 7
8,103,697 UART: [ldev] FE.KEYID = 1
8,140,377 UART: [ldev] Erasing FE.KEYID = 1
10,646,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,395,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,410,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,183 UART: [ldev] --
12,453,366 UART: [fwproc] Wait for Commands...
12,454,847 UART: [fwproc] Recv command 0x46574c44
12,456,848 UART: [fwproc] Recv'd Img size: 114168 bytes
15,897,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,973,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,089,249 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,631,508 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
3,440,991 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,292 >>> mbox cmd response: failed
14,270,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,271,188 >>> mbox cmd response: failed
14,271,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,271,767 >>> mbox cmd response: failed
Initializing fuses
2,060,454 writing to cptra_bootfsm_go
5,492,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,790,307 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,471 UART:
192,831 UART: Running Caliptra ROM ...
193,982 UART:
603,559 UART: [state] CFI Enabled
620,047 UART: [state] LifecycleState = Unprovisioned
622,423 UART: [state] DebugLocked = No
624,611 UART: [state] WD Timer not started. Device not locked for debugging
629,613 UART: [kat] SHA2-256
819,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,315 UART: [kat] ++
830,819 UART: [kat] sha1
841,807 UART: [kat] SHA2-256
844,859 UART: [kat] SHA2-384
849,733 UART: [kat] SHA2-512-ACC
852,293 UART: [kat] ECC-384
3,296,778 UART: [kat] HMAC-384Kdf
3,310,917 UART: [kat] LMS
3,842,713 UART: [kat] --
3,845,470 UART: [cold-reset] ++
3,847,030 UART: [fht] FHT @ 0x50003400
3,858,510 UART: [idev] ++
3,859,193 UART: [idev] CDI.KEYID = 6
3,860,158 UART: [idev] SUBJECT.KEYID = 7
3,861,317 UART: [idev] UDS.KEYID = 0
3,863,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,353 UART: [idev] Erasing UDS.KEYID = 0
6,341,008 UART: [idev] Sha1 KeyId Algorithm
6,364,147 UART: [idev] --
6,368,918 UART: [ldev] ++
6,369,624 UART: [ldev] CDI.KEYID = 6
6,370,536 UART: [ldev] SUBJECT.KEYID = 5
6,371,706 UART: [ldev] AUTHORITY.KEYID = 7
6,372,935 UART: [ldev] FE.KEYID = 1
6,382,721 UART: [ldev] Erasing FE.KEYID = 1
8,862,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,270 UART: [ldev] --
10,653,291 UART: [fwproc] Wait for Commands...
10,655,661 UART: [fwproc] Recv command 0x46574c44
10,657,927 UART: [fwproc] Recv'd Img size: 114168 bytes
14,097,778 UART: ROM Fatal Error: 0x000B0029
14,101,426 >>> mbox cmd response: failed
14,101,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,102,206 >>> mbox cmd response: failed
14,102,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,102,808 >>> mbox cmd response: failed
Initializing fuses
2,054,715 writing to cptra_bootfsm_go
2,244,030 UART:
2,244,381 UART: Running Caliptra ROM ...
2,245,517 UART:
6,349,248 UART: [state] CFI Enabled
6,363,225 UART: [state] LifecycleState = Unprovisioned
6,365,635 UART: [state] DebugLocked = No
6,368,212 UART: [state] WD Timer not started. Device not locked for debugging
6,372,300 UART: [kat] SHA2-256
6,562,169 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,572,973 UART: [kat] ++
6,573,435 UART: [kat] sha1
6,584,492 UART: [kat] SHA2-256
6,587,553 UART: [kat] SHA2-384
6,593,823 UART: [kat] SHA2-512-ACC
6,596,406 UART: [kat] ECC-384
9,038,086 UART: [kat] HMAC-384Kdf
9,051,464 UART: [kat] LMS
9,583,285 UART: [kat] --
9,588,543 UART: [cold-reset] ++
9,591,022 UART: [fht] FHT @ 0x50003400
9,602,340 UART: [idev] ++
9,603,016 UART: [idev] CDI.KEYID = 6
9,604,033 UART: [idev] SUBJECT.KEYID = 7
9,605,142 UART: [idev] UDS.KEYID = 0
9,607,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,750,952 UART: [idev] Erasing UDS.KEYID = 0
12,082,225 UART: [idev] Sha1 KeyId Algorithm
12,104,585 UART: [idev] --
12,110,441 UART: [ldev] ++
12,111,137 UART: [ldev] CDI.KEYID = 6
12,112,050 UART: [ldev] SUBJECT.KEYID = 5
12,113,216 UART: [ldev] AUTHORITY.KEYID = 7
12,114,450 UART: [ldev] FE.KEYID = 1
12,126,499 UART: [ldev] Erasing FE.KEYID = 1
14,606,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,323,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,338,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,354,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,369,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,390,702 UART: [ldev] --
16,395,936 UART: [fwproc] Wait for Commands...
16,397,871 UART: [fwproc] Recv command 0x46574c44
16,400,137 UART: [fwproc] Recv'd Img size: 114168 bytes
19,843,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,923,166 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,039,300 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,580,912 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,756,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,478,770 >>> mbox cmd response: failed
14,479,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,479,644 >>> mbox cmd response: failed
14,479,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,480,206 >>> mbox cmd response: failed
Initializing fuses
2,058,498 writing to cptra_bootfsm_go
9,136,919 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,332,248 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,881 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,471 UART: [kat] SHA2-256
882,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,517 UART: [kat] ++
886,669 UART: [kat] sha1
891,045 UART: [kat] SHA2-256
892,983 UART: [kat] SHA2-384
895,726 UART: [kat] SHA2-512-ACC
897,627 UART: [kat] ECC-384
903,246 UART: [kat] HMAC-384Kdf
907,898 UART: [kat] LMS
1,476,094 UART: [kat] --
1,477,011 UART: [cold-reset] ++
1,477,585 UART: [fht] Storing FHT @ 0x50003400
1,480,464 UART: [idev] ++
1,480,632 UART: [idev] CDI.KEYID = 6
1,480,992 UART: [idev] SUBJECT.KEYID = 7
1,481,416 UART: [idev] UDS.KEYID = 0
1,481,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,488 UART: [idev] Erasing UDS.KEYID = 0
1,505,476 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,138 UART: [idev] --
1,515,317 UART: [ldev] ++
1,515,485 UART: [ldev] CDI.KEYID = 6
1,515,848 UART: [ldev] SUBJECT.KEYID = 5
1,516,274 UART: [ldev] AUTHORITY.KEYID = 7
1,516,737 UART: [ldev] FE.KEYID = 1
1,521,579 UART: [ldev] Erasing FE.KEYID = 1
1,546,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,286 UART: [ldev] --
1,585,749 UART: [fwproc] Waiting for Commands...
1,586,364 UART: [fwproc] Received command 0x46574c44
1,587,155 UART: [fwproc] Received Image of size 114168 bytes
2,883,305 UART: ROM Fatal Error: 0x000B0029
2,884,462 >>> mbox cmd response: failed
2,884,462 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,468 >>> mbox cmd response: failed
2,884,468 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,884,474 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,197 UART: [kat] SHA2-256
882,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,243 UART: [kat] ++
886,395 UART: [kat] sha1
890,723 UART: [kat] SHA2-256
892,661 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,954 UART: [kat] HMAC-384Kdf
907,328 UART: [kat] LMS
1,475,524 UART: [kat] --
1,476,299 UART: [cold-reset] ++
1,476,725 UART: [fht] Storing FHT @ 0x50003400
1,479,514 UART: [idev] ++
1,479,682 UART: [idev] CDI.KEYID = 6
1,480,042 UART: [idev] SUBJECT.KEYID = 7
1,480,466 UART: [idev] UDS.KEYID = 0
1,480,811 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,292 UART: [idev] Erasing UDS.KEYID = 0
1,504,618 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,232 UART: [idev] --
1,514,457 UART: [ldev] ++
1,514,625 UART: [ldev] CDI.KEYID = 6
1,514,988 UART: [ldev] SUBJECT.KEYID = 5
1,515,414 UART: [ldev] AUTHORITY.KEYID = 7
1,515,877 UART: [ldev] FE.KEYID = 1
1,520,981 UART: [ldev] Erasing FE.KEYID = 1
1,546,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,564 UART: [ldev] --
1,586,065 UART: [fwproc] Waiting for Commands...
1,586,746 UART: [fwproc] Received command 0x46574c44
1,587,537 UART: [fwproc] Received Image of size 114168 bytes
2,883,538 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,224 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,267 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,573 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,736,717 >>> mbox cmd response: failed
2,736,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,723 >>> mbox cmd response: failed
2,736,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,736,729 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,443 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,861 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,983 UART: [state] LifecycleState = Unprovisioned
86,638 UART: [state] DebugLocked = No
87,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,910 UART: [kat] SHA2-256
882,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,956 UART: [kat] ++
887,108 UART: [kat] sha1
891,130 UART: [kat] SHA2-256
893,068 UART: [kat] SHA2-384
895,929 UART: [kat] SHA2-512-ACC
897,830 UART: [kat] ECC-384
903,387 UART: [kat] HMAC-384Kdf
907,925 UART: [kat] LMS
1,476,121 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,438 UART: [fht] Storing FHT @ 0x50003400
1,480,053 UART: [idev] ++
1,480,221 UART: [idev] CDI.KEYID = 6
1,480,581 UART: [idev] SUBJECT.KEYID = 7
1,481,005 UART: [idev] UDS.KEYID = 0
1,481,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,931 UART: [idev] Erasing UDS.KEYID = 0
1,505,437 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,251 UART: [idev] --
1,515,274 UART: [ldev] ++
1,515,442 UART: [ldev] CDI.KEYID = 6
1,515,805 UART: [ldev] SUBJECT.KEYID = 5
1,516,231 UART: [ldev] AUTHORITY.KEYID = 7
1,516,694 UART: [ldev] FE.KEYID = 1
1,522,060 UART: [ldev] Erasing FE.KEYID = 1
1,547,469 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,409 UART: [ldev] --
1,586,720 UART: [fwproc] Waiting for Commands...
1,587,365 UART: [fwproc] Received command 0x46574c44
1,588,156 UART: [fwproc] Received Image of size 114168 bytes
2,884,312 UART: ROM Fatal Error: 0x000B0029
2,885,469 >>> mbox cmd response: failed
2,885,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,475 >>> mbox cmd response: failed
2,885,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,885,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,270 UART: [kat] SHA2-256
882,201 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,316 UART: [kat] ++
886,468 UART: [kat] sha1
890,516 UART: [kat] SHA2-256
892,454 UART: [kat] SHA2-384
895,197 UART: [kat] SHA2-512-ACC
897,098 UART: [kat] ECC-384
902,985 UART: [kat] HMAC-384Kdf
907,649 UART: [kat] LMS
1,475,845 UART: [kat] --
1,476,524 UART: [cold-reset] ++
1,477,032 UART: [fht] Storing FHT @ 0x50003400
1,479,637 UART: [idev] ++
1,479,805 UART: [idev] CDI.KEYID = 6
1,480,165 UART: [idev] SUBJECT.KEYID = 7
1,480,589 UART: [idev] UDS.KEYID = 0
1,480,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,645 UART: [idev] Erasing UDS.KEYID = 0
1,505,469 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,029 UART: [idev] --
1,515,082 UART: [ldev] ++
1,515,250 UART: [ldev] CDI.KEYID = 6
1,515,613 UART: [ldev] SUBJECT.KEYID = 5
1,516,039 UART: [ldev] AUTHORITY.KEYID = 7
1,516,502 UART: [ldev] FE.KEYID = 1
1,521,780 UART: [ldev] Erasing FE.KEYID = 1
1,547,359 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,109 UART: [ldev] --
1,586,608 UART: [fwproc] Waiting for Commands...
1,587,355 UART: [fwproc] Received command 0x46574c44
1,588,146 UART: [fwproc] Received Image of size 114168 bytes
2,885,095 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,181 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,533 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,192 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,738,838 >>> mbox cmd response: failed
2,738,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,844 >>> mbox cmd response: failed
2,738,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,738,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,266 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
893,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,621 UART: [kat] ++
897,773 UART: [kat] sha1
902,017 UART: [kat] SHA2-256
903,957 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
918,044 UART: [kat] HMAC-384Kdf
922,620 UART: [kat] LMS
1,170,948 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,441 UART: [fht] FHT @ 0x50003400
1,175,030 UART: [idev] ++
1,175,198 UART: [idev] CDI.KEYID = 6
1,175,558 UART: [idev] SUBJECT.KEYID = 7
1,175,982 UART: [idev] UDS.KEYID = 0
1,176,327 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,216 UART: [idev] Erasing UDS.KEYID = 0
1,200,905 UART: [idev] Sha1 KeyId Algorithm
1,209,417 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,914 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,217,059 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,155 UART: [ldev] --
1,282,634 UART: [fwproc] Wait for Commands...
1,283,276 UART: [fwproc] Recv command 0x46574c44
1,284,004 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,843 UART: ROM Fatal Error: 0x000B0029
2,581,000 >>> mbox cmd response: failed
2,581,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,006 >>> mbox cmd response: failed
2,581,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,576 UART: [kat] SHA2-256
893,226 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,351 UART: [kat] ++
897,503 UART: [kat] sha1
901,659 UART: [kat] SHA2-256
903,599 UART: [kat] SHA2-384
906,254 UART: [kat] SHA2-512-ACC
908,155 UART: [kat] ECC-384
917,984 UART: [kat] HMAC-384Kdf
922,484 UART: [kat] LMS
1,170,812 UART: [kat] --
1,171,655 UART: [cold-reset] ++
1,171,997 UART: [fht] FHT @ 0x50003400
1,174,688 UART: [idev] ++
1,174,856 UART: [idev] CDI.KEYID = 6
1,175,216 UART: [idev] SUBJECT.KEYID = 7
1,175,640 UART: [idev] UDS.KEYID = 0
1,175,985 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,980 UART: [idev] Erasing UDS.KEYID = 0
1,200,631 UART: [idev] Sha1 KeyId Algorithm
1,209,229 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,982 UART: [ldev] SUBJECT.KEYID = 5
1,211,408 UART: [ldev] AUTHORITY.KEYID = 7
1,211,871 UART: [ldev] FE.KEYID = 1
1,216,829 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,151 UART: [ldev] --
1,282,466 UART: [fwproc] Wait for Commands...
1,283,222 UART: [fwproc] Recv command 0x46574c44
1,283,950 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,913 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,496 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,497 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,434,500 >>> mbox cmd response: failed
2,434,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,506 >>> mbox cmd response: failed
2,434,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,434,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,599 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
893,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,504 UART: [kat] ++
897,656 UART: [kat] sha1
901,754 UART: [kat] SHA2-256
903,694 UART: [kat] SHA2-384
906,447 UART: [kat] SHA2-512-ACC
908,348 UART: [kat] ECC-384
917,887 UART: [kat] HMAC-384Kdf
922,555 UART: [kat] LMS
1,170,883 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,598 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,987 UART: [idev] Erasing UDS.KEYID = 0
1,201,008 UART: [idev] Sha1 KeyId Algorithm
1,209,354 UART: [idev] --
1,210,186 UART: [ldev] ++
1,210,354 UART: [ldev] CDI.KEYID = 6
1,210,717 UART: [ldev] SUBJECT.KEYID = 5
1,211,143 UART: [ldev] AUTHORITY.KEYID = 7
1,211,606 UART: [ldev] FE.KEYID = 1
1,216,904 UART: [ldev] Erasing FE.KEYID = 1
1,243,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,436 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,912 UART: [ldev] --
1,283,251 UART: [fwproc] Wait for Commands...
1,283,919 UART: [fwproc] Recv command 0x46574c44
1,284,647 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,287 UART: ROM Fatal Error: 0x000B0029
2,581,444 >>> mbox cmd response: failed
2,581,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,450 >>> mbox cmd response: failed
2,581,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,581,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,332 UART: [kat] SHA2-256
904,272 UART: [kat] SHA2-384
906,849 UART: [kat] SHA2-512-ACC
908,750 UART: [kat] ECC-384
918,697 UART: [kat] HMAC-384Kdf
923,257 UART: [kat] LMS
1,171,585 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,173,108 UART: [fht] FHT @ 0x50003400
1,175,917 UART: [idev] ++
1,176,085 UART: [idev] CDI.KEYID = 6
1,176,445 UART: [idev] SUBJECT.KEYID = 7
1,176,869 UART: [idev] UDS.KEYID = 0
1,177,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,185 UART: [idev] Erasing UDS.KEYID = 0
1,202,014 UART: [idev] Sha1 KeyId Algorithm
1,210,560 UART: [idev] --
1,211,548 UART: [ldev] ++
1,211,716 UART: [ldev] CDI.KEYID = 6
1,212,079 UART: [ldev] SUBJECT.KEYID = 5
1,212,505 UART: [ldev] AUTHORITY.KEYID = 7
1,212,968 UART: [ldev] FE.KEYID = 1
1,217,984 UART: [ldev] Erasing FE.KEYID = 1
1,243,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,938 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,887 UART: [fwproc] Recv command 0x46574c44
1,283,615 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,886 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,425 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,296 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,435,601 >>> mbox cmd response: failed
2,435,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,607 >>> mbox cmd response: failed
2,435,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,435,613 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,410 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
890,936 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,065 UART: [kat] ++
895,217 UART: [kat] sha1
899,379 UART: [kat] SHA2-256
901,319 UART: [kat] SHA2-384
903,972 UART: [kat] SHA2-512-ACC
905,873 UART: [kat] ECC-384
915,204 UART: [kat] HMAC-384Kdf
919,762 UART: [kat] LMS
1,168,074 UART: [kat] --
1,168,793 UART: [cold-reset] ++
1,169,345 UART: [fht] FHT @ 0x50003400
1,172,079 UART: [idev] ++
1,172,247 UART: [idev] CDI.KEYID = 6
1,172,608 UART: [idev] SUBJECT.KEYID = 7
1,173,033 UART: [idev] UDS.KEYID = 0
1,173,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,051 UART: [idev] Erasing UDS.KEYID = 0
1,198,157 UART: [idev] Sha1 KeyId Algorithm
1,206,895 UART: [idev] --
1,207,954 UART: [ldev] ++
1,208,122 UART: [ldev] CDI.KEYID = 6
1,208,486 UART: [ldev] SUBJECT.KEYID = 5
1,208,913 UART: [ldev] AUTHORITY.KEYID = 7
1,209,376 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,708 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,630 UART: [ldev] --
1,280,086 UART: [fwproc] Wait for Commands...
1,280,815 UART: [fwproc] Recv command 0x46574c44
1,281,548 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,274 UART: ROM Fatal Error: 0x000B0029
2,578,431 >>> mbox cmd response: failed
2,578,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,437 >>> mbox cmd response: failed
2,578,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,578,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
891,010 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,433 UART: [kat] SHA2-256
901,373 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
915,566 UART: [kat] HMAC-384Kdf
920,206 UART: [kat] LMS
1,168,518 UART: [kat] --
1,169,331 UART: [cold-reset] ++
1,169,835 UART: [fht] FHT @ 0x50003400
1,172,513 UART: [idev] ++
1,172,681 UART: [idev] CDI.KEYID = 6
1,173,042 UART: [idev] SUBJECT.KEYID = 7
1,173,467 UART: [idev] UDS.KEYID = 0
1,173,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,303 UART: [idev] Sha1 KeyId Algorithm
1,207,127 UART: [idev] --
1,208,166 UART: [ldev] ++
1,208,334 UART: [ldev] CDI.KEYID = 6
1,208,698 UART: [ldev] SUBJECT.KEYID = 5
1,209,125 UART: [ldev] AUTHORITY.KEYID = 7
1,209,588 UART: [ldev] FE.KEYID = 1
1,214,528 UART: [ldev] Erasing FE.KEYID = 1
1,240,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,076 UART: [ldev] --
1,279,478 UART: [fwproc] Wait for Commands...
1,280,207 UART: [fwproc] Recv command 0x46574c44
1,280,940 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,600 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,118 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,429,306 >>> mbox cmd response: failed
2,429,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,429,312 >>> mbox cmd response: failed
2,429,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,429,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,022 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,570 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,982 UART: [kat] ++
896,134 UART: [kat] sha1
900,344 UART: [kat] SHA2-256
902,284 UART: [kat] SHA2-384
905,029 UART: [kat] SHA2-512-ACC
906,930 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,752 UART: [fht] FHT @ 0x50003400
1,173,634 UART: [idev] ++
1,173,802 UART: [idev] CDI.KEYID = 6
1,174,163 UART: [idev] SUBJECT.KEYID = 7
1,174,588 UART: [idev] UDS.KEYID = 0
1,174,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,584 UART: [idev] Erasing UDS.KEYID = 0
1,199,900 UART: [idev] Sha1 KeyId Algorithm
1,208,634 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,145 UART: [ldev] SUBJECT.KEYID = 5
1,210,572 UART: [ldev] AUTHORITY.KEYID = 7
1,211,035 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,282,083 UART: [fwproc] Wait for Commands...
1,282,800 UART: [fwproc] Recv command 0x46574c44
1,283,533 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,953 UART: ROM Fatal Error: 0x000B0029
2,579,110 >>> mbox cmd response: failed
2,579,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,116 >>> mbox cmd response: failed
2,579,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,579,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,045 UART: [kat] SHA2-256
891,595 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,724 UART: [kat] ++
895,876 UART: [kat] sha1
900,076 UART: [kat] SHA2-256
902,016 UART: [kat] SHA2-384
904,771 UART: [kat] SHA2-512-ACC
906,672 UART: [kat] ECC-384
916,723 UART: [kat] HMAC-384Kdf
921,393 UART: [kat] LMS
1,169,705 UART: [kat] --
1,170,514 UART: [cold-reset] ++
1,170,976 UART: [fht] FHT @ 0x50003400
1,173,770 UART: [idev] ++
1,173,938 UART: [idev] CDI.KEYID = 6
1,174,299 UART: [idev] SUBJECT.KEYID = 7
1,174,724 UART: [idev] UDS.KEYID = 0
1,175,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,488 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,679 UART: [ldev] Erasing FE.KEYID = 1
1,242,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,703 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,064 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,373 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,873 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,433,579 >>> mbox cmd response: failed
2,433,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,585 >>> mbox cmd response: failed
2,433,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,433,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,599 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,140 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,163 UART:
192,541 UART: Running Caliptra ROM ...
193,735 UART:
193,888 UART: [state] CFI Enabled
262,196 UART: [state] LifecycleState = Unprovisioned
264,160 UART: [state] DebugLocked = No
265,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,414 UART: [kat] SHA2-256
439,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,642 UART: [kat] ++
450,120 UART: [kat] sha1
461,923 UART: [kat] SHA2-256
464,618 UART: [kat] SHA2-384
470,278 UART: [kat] SHA2-512-ACC
472,615 UART: [kat] ECC-384
2,766,810 UART: [kat] HMAC-384Kdf
2,797,622 UART: [kat] LMS
3,987,932 UART: [kat] --
3,992,128 UART: [cold-reset] ++
3,994,117 UART: [fht] Storing FHT @ 0x50003400
4,004,907 UART: [idev] ++
4,005,534 UART: [idev] CDI.KEYID = 6
4,006,460 UART: [idev] SUBJECT.KEYID = 7
4,007,679 UART: [idev] UDS.KEYID = 0
4,010,684 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,097 UART: [idev] Erasing UDS.KEYID = 0
7,346,770 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,955 UART: [idev] --
7,372,834 UART: [ldev] ++
7,373,408 UART: [ldev] CDI.KEYID = 6
7,374,378 UART: [ldev] SUBJECT.KEYID = 5
7,375,515 UART: [ldev] AUTHORITY.KEYID = 7
7,376,803 UART: [ldev] FE.KEYID = 1
7,422,419 UART: [ldev] Erasing FE.KEYID = 1
10,753,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,919 UART: [ldev] --
13,115,432 UART: [fwproc] Waiting for Commands...
13,118,012 UART: [fwproc] Received command 0x46574c44
13,120,203 UART: [fwproc] Received Image of size 113844 bytes
15,833,627 UART: ROM Fatal Error: 0x000B003F
15,837,073 >>> mbox cmd response: failed
15,837,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,837,780 >>> mbox cmd response: failed
15,838,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,838,358 >>> mbox cmd response: failed
Initializing fuses
2,063,289 writing to cptra_bootfsm_go
2,252,588 UART:
2,252,938 UART: Running Caliptra ROM ...
2,254,021 UART:
2,254,191 UART: [state] CFI Enabled
2,322,221 UART: [state] LifecycleState = Unprovisioned
2,324,158 UART: [state] DebugLocked = No
2,326,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,927 UART: [kat] SHA2-256
2,501,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,139 UART: [kat] ++
2,512,598 UART: [kat] sha1
2,523,646 UART: [kat] SHA2-256
2,526,309 UART: [kat] SHA2-384
2,531,986 UART: [kat] SHA2-512-ACC
2,534,378 UART: [kat] ECC-384
4,823,384 UART: [kat] HMAC-384Kdf
4,854,722 UART: [kat] LMS
6,045,049 UART: [kat] --
6,050,523 UART: [cold-reset] ++
6,052,213 UART: [fht] Storing FHT @ 0x50003400
6,062,688 UART: [idev] ++
6,063,318 UART: [idev] CDI.KEYID = 6
6,064,232 UART: [idev] SUBJECT.KEYID = 7
6,065,451 UART: [idev] UDS.KEYID = 0
6,067,751 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,210,896 UART: [idev] Erasing UDS.KEYID = 0
9,400,832 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,367 UART: [idev] --
9,427,455 UART: [ldev] ++
9,428,095 UART: [ldev] CDI.KEYID = 6
9,428,986 UART: [ldev] SUBJECT.KEYID = 5
9,430,250 UART: [ldev] AUTHORITY.KEYID = 7
9,431,497 UART: [ldev] FE.KEYID = 1
9,478,635 UART: [ldev] Erasing FE.KEYID = 1
12,813,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,124,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,139,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,154,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,168,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,187,466 UART: [ldev] --
15,193,011 UART: [fwproc] Waiting for Commands...
15,195,006 UART: [fwproc] Received command 0x46574c44
15,197,201 UART: [fwproc] Received Image of size 113844 bytes
19,245,695 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,317,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,386,346 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,702,633 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
3,805,679 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,553,822 >>> mbox cmd response: failed
15,554,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,554,712 >>> mbox cmd response: failed
15,554,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,555,279 >>> mbox cmd response: failed
Initializing fuses
2,060,024 writing to cptra_bootfsm_go
5,864,524 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,927,212 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,414 UART:
192,788 UART: Running Caliptra ROM ...
194,220 UART:
603,616 UART: [state] CFI Enabled
619,183 UART: [state] LifecycleState = Unprovisioned
621,131 UART: [state] DebugLocked = No
622,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,616 UART: [kat] SHA2-256
797,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,907 UART: [kat] ++
808,379 UART: [kat] sha1
819,584 UART: [kat] SHA2-256
822,322 UART: [kat] SHA2-384
827,488 UART: [kat] SHA2-512-ACC
829,836 UART: [kat] ECC-384
3,112,587 UART: [kat] HMAC-384Kdf
3,124,965 UART: [kat] LMS
4,315,122 UART: [kat] --
4,319,096 UART: [cold-reset] ++
4,320,826 UART: [fht] Storing FHT @ 0x50003400
4,332,957 UART: [idev] ++
4,333,584 UART: [idev] CDI.KEYID = 6
4,334,495 UART: [idev] SUBJECT.KEYID = 7
4,335,708 UART: [idev] UDS.KEYID = 0
4,338,715 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,937 UART: [idev] Erasing UDS.KEYID = 0
7,620,961 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,964 UART: [idev] --
7,646,798 UART: [ldev] ++
7,647,376 UART: [ldev] CDI.KEYID = 6
7,648,341 UART: [ldev] SUBJECT.KEYID = 5
7,649,576 UART: [ldev] AUTHORITY.KEYID = 7
7,650,812 UART: [ldev] FE.KEYID = 1
7,662,380 UART: [ldev] Erasing FE.KEYID = 1
10,955,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,063 UART: [ldev] --
13,314,420 UART: [fwproc] Waiting for Commands...
13,316,773 UART: [fwproc] Received command 0x46574c44
13,318,972 UART: [fwproc] Received Image of size 113844 bytes
16,020,900 UART: ROM Fatal Error: 0x000B003F
16,024,356 >>> mbox cmd response: failed
16,024,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,115 >>> mbox cmd response: failed
16,025,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,025,701 >>> mbox cmd response: failed
Initializing fuses
2,057,608 writing to cptra_bootfsm_go
2,246,940 UART:
2,247,292 UART: Running Caliptra ROM ...
2,248,571 UART:
4,427,188 UART: [state] CFI Enabled
4,441,442 UART: [state] LifecycleState = Unprovisioned
4,443,411 UART: [state] DebugLocked = No
4,445,449 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,449,740 UART: [kat] SHA2-256
4,619,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,630,070 UART: [kat] ++
4,630,643 UART: [kat] sha1
4,643,055 UART: [kat] SHA2-256
4,645,757 UART: [kat] SHA2-384
4,652,615 UART: [kat] SHA2-512-ACC
4,654,949 UART: [kat] ECC-384
6,937,858 UART: [kat] HMAC-384Kdf
6,948,631 UART: [kat] LMS
8,138,693 UART: [kat] --
8,144,384 UART: [cold-reset] ++
8,146,326 UART: [fht] Storing FHT @ 0x50003400
8,157,859 UART: [idev] ++
8,158,477 UART: [idev] CDI.KEYID = 6
8,159,385 UART: [idev] SUBJECT.KEYID = 7
8,160,651 UART: [idev] UDS.KEYID = 0
8,162,891 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,305,998 UART: [idev] Erasing UDS.KEYID = 0
11,445,983 UART: [idev] Using Sha1 for KeyId Algorithm
11,466,960 UART: [idev] --
11,472,413 UART: [ldev] ++
11,472,981 UART: [ldev] CDI.KEYID = 6
11,473,916 UART: [ldev] SUBJECT.KEYID = 5
11,475,184 UART: [ldev] AUTHORITY.KEYID = 7
11,476,342 UART: [ldev] FE.KEYID = 1
11,489,768 UART: [ldev] Erasing FE.KEYID = 1
14,780,731 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,070,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,084,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,099,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,114,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,134,359 UART: [ldev] --
17,139,795 UART: [fwproc] Waiting for Commands...
17,142,710 UART: [fwproc] Received command 0x46574c44
17,144,917 UART: [fwproc] Received Image of size 113844 bytes
21,196,773 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,269,141 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,338,064 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,655,000 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,132,246 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,767,553 >>> mbox cmd response: failed
15,768,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,566 >>> mbox cmd response: failed
15,768,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,132 >>> mbox cmd response: failed
Initializing fuses
2,061,200 writing to cptra_bootfsm_go
8,225,773 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,160,839 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
192,557 UART:
192,910 UART: Running Caliptra ROM ...
194,112 UART:
194,266 UART: [state] CFI Enabled
262,731 UART: [state] LifecycleState = Unprovisioned
264,619 UART: [state] DebugLocked = No
266,061 UART: [state] WD Timer not started. Device not locked for debugging
268,920 UART: [kat] SHA2-256
448,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,623 UART: [kat] ++
460,157 UART: [kat] sha1
470,179 UART: [kat] SHA2-256
473,241 UART: [kat] SHA2-384
477,931 UART: [kat] SHA2-512-ACC
480,920 UART: [kat] ECC-384
2,923,030 UART: [kat] HMAC-384Kdf
2,947,680 UART: [kat] LMS
3,477,111 UART: [kat] --
3,483,102 UART: [cold-reset] ++
3,485,247 UART: [fht] FHT @ 0x50003400
3,497,473 UART: [idev] ++
3,498,042 UART: [idev] CDI.KEYID = 6
3,498,927 UART: [idev] SUBJECT.KEYID = 7
3,500,137 UART: [idev] UDS.KEYID = 0
3,502,638 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,646,490 UART: [idev] Erasing UDS.KEYID = 0
6,003,457 UART: [idev] Sha1 KeyId Algorithm
6,027,152 UART: [idev] --
6,030,283 UART: [ldev] ++
6,030,851 UART: [ldev] CDI.KEYID = 6
6,031,738 UART: [ldev] SUBJECT.KEYID = 5
6,032,852 UART: [ldev] AUTHORITY.KEYID = 7
6,034,202 UART: [ldev] FE.KEYID = 1
6,075,840 UART: [ldev] Erasing FE.KEYID = 1
8,578,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,744 UART: [ldev] --
10,388,670 UART: [fwproc] Wait for Commands...
10,391,428 UART: [fwproc] Recv command 0x46574c44
10,393,523 UART: [fwproc] Recv'd Img size: 114168 bytes
12,446,599 UART: ROM Fatal Error: 0x000B003F
12,449,676 >>> mbox cmd response: failed
12,450,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,443 >>> mbox cmd response: failed
12,450,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,999 >>> mbox cmd response: failed
Initializing fuses
2,052,147 writing to cptra_bootfsm_go
2,241,459 UART:
2,241,806 UART: Running Caliptra ROM ...
2,242,941 UART:
2,243,110 UART: [state] CFI Enabled
2,318,901 UART: [state] LifecycleState = Unprovisioned
2,320,788 UART: [state] DebugLocked = No
2,322,210 UART: [state] WD Timer not started. Device not locked for debugging
2,325,689 UART: [kat] SHA2-256
2,504,856 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,394 UART: [kat] ++
2,516,854 UART: [kat] sha1
2,526,712 UART: [kat] SHA2-256
2,529,734 UART: [kat] SHA2-384
2,537,129 UART: [kat] SHA2-512-ACC
2,540,130 UART: [kat] ECC-384
5,003,344 UART: [kat] HMAC-384Kdf
5,024,002 UART: [kat] LMS
5,553,465 UART: [kat] --
5,557,727 UART: [cold-reset] ++
5,558,952 UART: [fht] FHT @ 0x50003400
5,569,609 UART: [idev] ++
5,570,179 UART: [idev] CDI.KEYID = 6
5,571,113 UART: [idev] SUBJECT.KEYID = 7
5,572,273 UART: [idev] UDS.KEYID = 0
5,574,423 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,718,332 UART: [idev] Erasing UDS.KEYID = 0
8,079,412 UART: [idev] Sha1 KeyId Algorithm
8,102,045 UART: [idev] --
8,106,189 UART: [ldev] ++
8,106,776 UART: [ldev] CDI.KEYID = 6
8,107,686 UART: [ldev] SUBJECT.KEYID = 5
8,108,849 UART: [ldev] AUTHORITY.KEYID = 7
8,110,079 UART: [ldev] FE.KEYID = 1
8,152,924 UART: [ldev] Erasing FE.KEYID = 1
10,659,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,329 UART: [ldev] --
12,467,519 UART: [fwproc] Wait for Commands...
12,470,491 UART: [fwproc] Recv command 0x46574c44
12,472,587 UART: [fwproc] Recv'd Img size: 114168 bytes
15,873,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,938,065 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,006,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,324,816 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,384,233 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,254,116 >>> mbox cmd response: failed
12,254,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,254,998 >>> mbox cmd response: failed
12,255,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,255,557 >>> mbox cmd response: failed
Initializing fuses
2,056,698 writing to cptra_bootfsm_go
5,415,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,102,423 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,460 writing to cptra_bootfsm_go
192,755 UART:
193,109 UART: Running Caliptra ROM ...
194,309 UART:
603,757 UART: [state] CFI Enabled
616,998 UART: [state] LifecycleState = Unprovisioned
618,846 UART: [state] DebugLocked = No
620,876 UART: [state] WD Timer not started. Device not locked for debugging
624,762 UART: [kat] SHA2-256
803,839 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,434 UART: [kat] ++
815,970 UART: [kat] sha1
827,773 UART: [kat] SHA2-256
830,777 UART: [kat] SHA2-384
837,850 UART: [kat] SHA2-512-ACC
840,845 UART: [kat] ECC-384
3,282,003 UART: [kat] HMAC-384Kdf
3,294,723 UART: [kat] LMS
3,824,238 UART: [kat] --
3,827,554 UART: [cold-reset] ++
3,829,976 UART: [fht] FHT @ 0x50003400
3,841,598 UART: [idev] ++
3,842,166 UART: [idev] CDI.KEYID = 6
3,843,050 UART: [idev] SUBJECT.KEYID = 7
3,844,263 UART: [idev] UDS.KEYID = 0
3,846,721 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,326 UART: [idev] Erasing UDS.KEYID = 0
6,316,375 UART: [idev] Sha1 KeyId Algorithm
6,338,423 UART: [idev] --
6,342,206 UART: [ldev] ++
6,342,798 UART: [ldev] CDI.KEYID = 6
6,343,708 UART: [ldev] SUBJECT.KEYID = 5
6,344,872 UART: [ldev] AUTHORITY.KEYID = 7
6,346,105 UART: [ldev] FE.KEYID = 1
6,357,615 UART: [ldev] Erasing FE.KEYID = 1
8,832,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,419 UART: [ldev] --
10,627,555 UART: [fwproc] Wait for Commands...
10,630,624 UART: [fwproc] Recv command 0x46574c44
10,632,673 UART: [fwproc] Recv'd Img size: 114168 bytes
12,683,221 UART: ROM Fatal Error: 0x000B003F
12,686,288 >>> mbox cmd response: failed
12,686,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,686,963 >>> mbox cmd response: failed
12,687,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,687,558 >>> mbox cmd response: failed
Initializing fuses
2,052,574 writing to cptra_bootfsm_go
2,241,882 UART:
2,242,229 UART: Running Caliptra ROM ...
2,243,504 UART:
7,762,655 UART: [state] CFI Enabled
7,779,158 UART: [state] LifecycleState = Unprovisioned
7,781,022 UART: [state] DebugLocked = No
7,783,791 UART: [state] WD Timer not started. Device not locked for debugging
7,788,285 UART: [kat] SHA2-256
7,967,439 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,978,974 UART: [kat] ++
7,979,432 UART: [kat] sha1
7,992,101 UART: [kat] SHA2-256
7,995,125 UART: [kat] SHA2-384
8,000,089 UART: [kat] SHA2-512-ACC
8,003,037 UART: [kat] ECC-384
10,444,007 UART: [kat] HMAC-384Kdf
10,456,930 UART: [kat] LMS
10,986,425 UART: [kat] --
10,991,448 UART: [cold-reset] ++
10,993,267 UART: [fht] FHT @ 0x50003400
11,004,455 UART: [idev] ++
11,005,021 UART: [idev] CDI.KEYID = 6
11,005,909 UART: [idev] SUBJECT.KEYID = 7
11,007,124 UART: [idev] UDS.KEYID = 0
11,009,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,152,898 UART: [idev] Erasing UDS.KEYID = 0
13,482,697 UART: [idev] Sha1 KeyId Algorithm
13,506,153 UART: [idev] --
13,510,250 UART: [ldev] ++
13,510,817 UART: [ldev] CDI.KEYID = 6
13,511,699 UART: [ldev] SUBJECT.KEYID = 5
13,512,856 UART: [ldev] AUTHORITY.KEYID = 7
13,514,197 UART: [ldev] FE.KEYID = 1
13,524,494 UART: [ldev] Erasing FE.KEYID = 1
15,997,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,713,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,729,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,745,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,761,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,781,892 UART: [ldev] --
17,786,486 UART: [fwproc] Wait for Commands...
17,789,075 UART: [fwproc] Recv command 0x46574c44
17,791,176 UART: [fwproc] Recv'd Img size: 114168 bytes
21,179,630 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,252,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,320,895 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,637,708 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
3,703,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,465,870 >>> mbox cmd response: failed
12,466,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,466,791 >>> mbox cmd response: failed
12,467,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,410 >>> mbox cmd response: failed
Initializing fuses
2,052,775 writing to cptra_bootfsm_go
11,087,919 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,660,561 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,143 UART:
192,507 UART: Running Caliptra ROM ...
193,718 UART:
193,875 UART: [state] CFI Enabled
261,892 UART: [state] LifecycleState = Unprovisioned
264,299 UART: [state] DebugLocked = No
265,683 UART: [state] WD Timer not started. Device not locked for debugging
270,278 UART: [kat] SHA2-256
460,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,948 UART: [kat] ++
471,397 UART: [kat] sha1
483,086 UART: [kat] SHA2-256
486,107 UART: [kat] SHA2-384
492,474 UART: [kat] SHA2-512-ACC
495,038 UART: [kat] ECC-384
2,947,320 UART: [kat] HMAC-384Kdf
2,970,410 UART: [kat] LMS
3,502,190 UART: [kat] --
3,506,935 UART: [cold-reset] ++
3,509,299 UART: [fht] FHT @ 0x50003400
3,520,978 UART: [idev] ++
3,521,655 UART: [idev] CDI.KEYID = 6
3,522,594 UART: [idev] SUBJECT.KEYID = 7
3,523,808 UART: [idev] UDS.KEYID = 0
3,526,250 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,169 UART: [idev] Erasing UDS.KEYID = 0
6,027,457 UART: [idev] Sha1 KeyId Algorithm
6,049,944 UART: [idev] --
6,054,968 UART: [ldev] ++
6,055,653 UART: [ldev] CDI.KEYID = 6
6,056,567 UART: [ldev] SUBJECT.KEYID = 5
6,057,728 UART: [ldev] AUTHORITY.KEYID = 7
6,058,966 UART: [ldev] FE.KEYID = 1
6,098,782 UART: [ldev] Erasing FE.KEYID = 1
8,605,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,078 UART: [ldev] --
10,414,861 UART: [fwproc] Wait for Commands...
10,418,000 UART: [fwproc] Recv command 0x46574c44
10,420,266 UART: [fwproc] Recv'd Img size: 114168 bytes
12,502,055 UART: ROM Fatal Error: 0x000B003F
12,505,721 >>> mbox cmd response: failed
12,506,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,354 >>> mbox cmd response: failed
12,506,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,924 >>> mbox cmd response: failed
Initializing fuses
2,055,602 writing to cptra_bootfsm_go
2,244,904 UART:
2,245,264 UART: Running Caliptra ROM ...
2,246,304 UART:
2,246,455 UART: [state] CFI Enabled
2,302,791 UART: [state] LifecycleState = Unprovisioned
2,305,138 UART: [state] DebugLocked = No
2,307,901 UART: [state] WD Timer not started. Device not locked for debugging
2,312,575 UART: [kat] SHA2-256
2,502,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,513,245 UART: [kat] ++
2,513,709 UART: [kat] sha1
2,525,682 UART: [kat] SHA2-256
2,528,720 UART: [kat] SHA2-384
2,534,275 UART: [kat] SHA2-512-ACC
2,536,872 UART: [kat] ECC-384
4,987,241 UART: [kat] HMAC-384Kdf
5,013,943 UART: [kat] LMS
5,545,723 UART: [kat] --
5,551,045 UART: [cold-reset] ++
5,553,448 UART: [fht] FHT @ 0x50003400
5,564,223 UART: [idev] ++
5,564,901 UART: [idev] CDI.KEYID = 6
5,565,882 UART: [idev] SUBJECT.KEYID = 7
5,567,097 UART: [idev] UDS.KEYID = 0
5,569,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,713,509 UART: [idev] Erasing UDS.KEYID = 0
8,070,447 UART: [idev] Sha1 KeyId Algorithm
8,093,807 UART: [idev] --
8,099,191 UART: [ldev] ++
8,099,887 UART: [ldev] CDI.KEYID = 6
8,100,776 UART: [ldev] SUBJECT.KEYID = 5
8,101,990 UART: [ldev] AUTHORITY.KEYID = 7
8,103,221 UART: [ldev] FE.KEYID = 1
8,144,813 UART: [ldev] Erasing FE.KEYID = 1
10,647,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,550 UART: [ldev] --
12,458,217 UART: [fwproc] Wait for Commands...
12,459,934 UART: [fwproc] Recv command 0x46574c44
12,462,250 UART: [fwproc] Recv'd Img size: 114168 bytes
15,912,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,939 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,646,591 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,441,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,302,038 >>> mbox cmd response: failed
12,302,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,068 >>> mbox cmd response: failed
12,303,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,303,641 >>> mbox cmd response: failed
Initializing fuses
2,055,855 writing to cptra_bootfsm_go
5,493,508 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,785,499 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
192,707 UART:
193,082 UART: Running Caliptra ROM ...
194,289 UART:
603,647 UART: [state] CFI Enabled
620,109 UART: [state] LifecycleState = Unprovisioned
622,480 UART: [state] DebugLocked = No
624,127 UART: [state] WD Timer not started. Device not locked for debugging
627,873 UART: [kat] SHA2-256
817,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,354 UART: [kat] ++
828,886 UART: [kat] sha1
840,165 UART: [kat] SHA2-256
843,217 UART: [kat] SHA2-384
849,795 UART: [kat] SHA2-512-ACC
852,408 UART: [kat] ECC-384
3,295,565 UART: [kat] HMAC-384Kdf
3,308,838 UART: [kat] LMS
3,840,661 UART: [kat] --
3,845,526 UART: [cold-reset] ++
3,847,902 UART: [fht] FHT @ 0x50003400
3,859,695 UART: [idev] ++
3,860,372 UART: [idev] CDI.KEYID = 6
3,861,390 UART: [idev] SUBJECT.KEYID = 7
3,862,550 UART: [idev] UDS.KEYID = 0
3,865,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,008,640 UART: [idev] Erasing UDS.KEYID = 0
6,337,730 UART: [idev] Sha1 KeyId Algorithm
6,360,246 UART: [idev] --
6,364,757 UART: [ldev] ++
6,365,445 UART: [ldev] CDI.KEYID = 6
6,366,358 UART: [ldev] SUBJECT.KEYID = 5
6,367,519 UART: [ldev] AUTHORITY.KEYID = 7
6,368,751 UART: [ldev] FE.KEYID = 1
6,380,803 UART: [ldev] Erasing FE.KEYID = 1
8,859,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,931 UART: [ldev] --
10,652,822 UART: [fwproc] Wait for Commands...
10,655,403 UART: [fwproc] Recv command 0x46574c44
10,657,670 UART: [fwproc] Recv'd Img size: 114168 bytes
12,739,728 UART: ROM Fatal Error: 0x000B003F
12,743,402 >>> mbox cmd response: failed
12,743,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,151 >>> mbox cmd response: failed
12,744,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,707 >>> mbox cmd response: failed
Initializing fuses
2,055,281 writing to cptra_bootfsm_go
2,244,571 UART:
2,244,908 UART: Running Caliptra ROM ...
2,246,176 UART:
7,708,673 UART: [state] CFI Enabled
7,720,351 UART: [state] LifecycleState = Unprovisioned
7,722,706 UART: [state] DebugLocked = No
7,725,653 UART: [state] WD Timer not started. Device not locked for debugging
7,729,588 UART: [kat] SHA2-256
7,919,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,930,253 UART: [kat] ++
7,930,803 UART: [kat] sha1
7,942,831 UART: [kat] SHA2-256
7,945,819 UART: [kat] SHA2-384
7,952,146 UART: [kat] SHA2-512-ACC
7,954,778 UART: [kat] ECC-384
10,396,546 UART: [kat] HMAC-384Kdf
10,408,940 UART: [kat] LMS
10,940,776 UART: [kat] --
10,945,693 UART: [cold-reset] ++
10,946,980 UART: [fht] FHT @ 0x50003400
10,958,127 UART: [idev] ++
10,958,814 UART: [idev] CDI.KEYID = 6
10,959,799 UART: [idev] SUBJECT.KEYID = 7
10,960,960 UART: [idev] UDS.KEYID = 0
10,963,205 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,106,689 UART: [idev] Erasing UDS.KEYID = 0
13,439,815 UART: [idev] Sha1 KeyId Algorithm
13,463,456 UART: [idev] --
13,469,098 UART: [ldev] ++
13,469,792 UART: [ldev] CDI.KEYID = 6
13,470,701 UART: [ldev] SUBJECT.KEYID = 5
13,471,866 UART: [ldev] AUTHORITY.KEYID = 7
13,473,100 UART: [ldev] FE.KEYID = 1
13,483,639 UART: [ldev] Erasing FE.KEYID = 1
15,958,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,675,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,690,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,705,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,720,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,741,557 UART: [ldev] --
17,747,475 UART: [fwproc] Wait for Commands...
17,749,630 UART: [fwproc] Recv command 0x46574c44
17,751,901 UART: [fwproc] Recv'd Img size: 114168 bytes
21,196,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,276,187 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,392,325 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,934,136 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,754,948 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,515,799 >>> mbox cmd response: failed
12,516,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,668 >>> mbox cmd response: failed
12,516,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,517,289 >>> mbox cmd response: failed
Initializing fuses
2,058,011 writing to cptra_bootfsm_go
11,100,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,296,591 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,535 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,051 UART: [kat] SHA2-256
881,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,097 UART: [kat] ++
886,249 UART: [kat] sha1
890,431 UART: [kat] SHA2-256
892,369 UART: [kat] SHA2-384
895,270 UART: [kat] SHA2-512-ACC
897,171 UART: [kat] ECC-384
902,606 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,391 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,802 UART: [idev] ++
1,479,970 UART: [idev] CDI.KEYID = 6
1,480,330 UART: [idev] SUBJECT.KEYID = 7
1,480,754 UART: [idev] UDS.KEYID = 0
1,481,099 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,524 UART: [idev] Erasing UDS.KEYID = 0
1,505,032 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,652 UART: [idev] --
1,514,619 UART: [ldev] ++
1,514,787 UART: [ldev] CDI.KEYID = 6
1,515,150 UART: [ldev] SUBJECT.KEYID = 5
1,515,576 UART: [ldev] AUTHORITY.KEYID = 7
1,516,039 UART: [ldev] FE.KEYID = 1
1,521,011 UART: [ldev] Erasing FE.KEYID = 1
1,546,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,296 UART: [ldev] --
1,585,667 UART: [fwproc] Waiting for Commands...
1,586,302 UART: [fwproc] Received command 0x46574c44
1,587,093 UART: [fwproc] Received Image of size 114168 bytes
1,634,669 UART: ROM Fatal Error: 0x000B003F
1,635,828 >>> mbox cmd response: failed
1,635,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,834 >>> mbox cmd response: failed
1,635,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,756 UART: [state] LifecycleState = Unprovisioned
85,411 UART: [state] DebugLocked = No
86,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,705 UART: [kat] SHA2-256
881,636 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,751 UART: [kat] ++
885,903 UART: [kat] sha1
890,071 UART: [kat] SHA2-256
892,009 UART: [kat] SHA2-384
894,748 UART: [kat] SHA2-512-ACC
896,649 UART: [kat] ECC-384
902,218 UART: [kat] HMAC-384Kdf
906,646 UART: [kat] LMS
1,474,842 UART: [kat] --
1,475,737 UART: [cold-reset] ++
1,476,111 UART: [fht] Storing FHT @ 0x50003400
1,478,938 UART: [idev] ++
1,479,106 UART: [idev] CDI.KEYID = 6
1,479,466 UART: [idev] SUBJECT.KEYID = 7
1,479,890 UART: [idev] UDS.KEYID = 0
1,480,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,582 UART: [idev] Erasing UDS.KEYID = 0
1,504,866 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,468 UART: [idev] --
1,514,315 UART: [ldev] ++
1,514,483 UART: [ldev] CDI.KEYID = 6
1,514,846 UART: [ldev] SUBJECT.KEYID = 5
1,515,272 UART: [ldev] AUTHORITY.KEYID = 7
1,515,735 UART: [ldev] FE.KEYID = 1
1,520,767 UART: [ldev] Erasing FE.KEYID = 1
1,546,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,334 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,600 UART: [fwproc] Received command 0x46574c44
1,587,391 UART: [fwproc] Received Image of size 114168 bytes
2,883,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,884 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,929 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,187 >>> mbox cmd response: failed
1,488,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,193 >>> mbox cmd response: failed
1,488,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,483 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,714 UART: [kat] SHA2-256
882,645 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,760 UART: [kat] ++
886,912 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
896,025 UART: [kat] SHA2-512-ACC
897,926 UART: [kat] ECC-384
903,517 UART: [kat] HMAC-384Kdf
908,061 UART: [kat] LMS
1,476,257 UART: [kat] --
1,477,056 UART: [cold-reset] ++
1,477,538 UART: [fht] Storing FHT @ 0x50003400
1,480,437 UART: [idev] ++
1,480,605 UART: [idev] CDI.KEYID = 6
1,480,965 UART: [idev] SUBJECT.KEYID = 7
1,481,389 UART: [idev] UDS.KEYID = 0
1,481,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,599 UART: [idev] Erasing UDS.KEYID = 0
1,506,381 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,975 UART: [idev] --
1,515,970 UART: [ldev] ++
1,516,138 UART: [ldev] CDI.KEYID = 6
1,516,501 UART: [ldev] SUBJECT.KEYID = 5
1,516,927 UART: [ldev] AUTHORITY.KEYID = 7
1,517,390 UART: [ldev] FE.KEYID = 1
1,522,514 UART: [ldev] Erasing FE.KEYID = 1
1,548,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,883 UART: [ldev] --
1,587,288 UART: [fwproc] Waiting for Commands...
1,587,953 UART: [fwproc] Received command 0x46574c44
1,588,744 UART: [fwproc] Received Image of size 114168 bytes
1,636,377 UART: ROM Fatal Error: 0x000B003F
1,637,536 >>> mbox cmd response: failed
1,637,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,542 >>> mbox cmd response: failed
1,637,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,314 UART: [kat] SHA2-256
882,245 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,360 UART: [kat] ++
886,512 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,713 UART: [kat] SHA2-512-ACC
897,614 UART: [kat] ECC-384
903,203 UART: [kat] HMAC-384Kdf
907,733 UART: [kat] LMS
1,475,929 UART: [kat] --
1,476,718 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,873 UART: [idev] ++
1,480,041 UART: [idev] CDI.KEYID = 6
1,480,401 UART: [idev] SUBJECT.KEYID = 7
1,480,825 UART: [idev] UDS.KEYID = 0
1,481,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,065 UART: [idev] Erasing UDS.KEYID = 0
1,505,635 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,189 UART: [idev] --
1,515,372 UART: [ldev] ++
1,515,540 UART: [ldev] CDI.KEYID = 6
1,515,903 UART: [ldev] SUBJECT.KEYID = 5
1,516,329 UART: [ldev] AUTHORITY.KEYID = 7
1,516,792 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,517 UART: [ldev] --
1,586,970 UART: [fwproc] Waiting for Commands...
1,587,705 UART: [fwproc] Received command 0x46574c44
1,588,496 UART: [fwproc] Received Image of size 114168 bytes
2,883,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,972 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,490,481 >>> mbox cmd response: failed
1,490,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,487 >>> mbox cmd response: failed
1,490,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,244 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
893,560 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,685 UART: [kat] ++
897,837 UART: [kat] sha1
902,037 UART: [kat] SHA2-256
903,977 UART: [kat] SHA2-384
906,716 UART: [kat] SHA2-512-ACC
908,617 UART: [kat] ECC-384
918,068 UART: [kat] HMAC-384Kdf
922,716 UART: [kat] LMS
1,171,044 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,189 UART: [fht] FHT @ 0x50003400
1,174,830 UART: [idev] ++
1,174,998 UART: [idev] CDI.KEYID = 6
1,175,358 UART: [idev] SUBJECT.KEYID = 7
1,175,782 UART: [idev] UDS.KEYID = 0
1,176,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,136 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,208,885 UART: [idev] --
1,210,179 UART: [ldev] ++
1,210,347 UART: [ldev] CDI.KEYID = 6
1,210,710 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,243,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,283,020 UART: [fwproc] Wait for Commands...
1,283,760 UART: [fwproc] Recv command 0x46574c44
1,284,488 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,620 UART: ROM Fatal Error: 0x000B003F
1,333,779 >>> mbox cmd response: failed
1,333,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,785 >>> mbox cmd response: failed
1,333,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
893,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,197 UART: [kat] ++
897,349 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,302 UART: [kat] SHA2-512-ACC
908,203 UART: [kat] ECC-384
917,580 UART: [kat] HMAC-384Kdf
922,108 UART: [kat] LMS
1,170,436 UART: [kat] --
1,171,437 UART: [cold-reset] ++
1,171,859 UART: [fht] FHT @ 0x50003400
1,174,342 UART: [idev] ++
1,174,510 UART: [idev] CDI.KEYID = 6
1,174,870 UART: [idev] SUBJECT.KEYID = 7
1,175,294 UART: [idev] UDS.KEYID = 0
1,175,639 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,058 UART: [idev] Erasing UDS.KEYID = 0
1,200,141 UART: [idev] Sha1 KeyId Algorithm
1,208,711 UART: [idev] --
1,209,757 UART: [ldev] ++
1,209,925 UART: [ldev] CDI.KEYID = 6
1,210,288 UART: [ldev] SUBJECT.KEYID = 5
1,210,714 UART: [ldev] AUTHORITY.KEYID = 7
1,211,177 UART: [ldev] FE.KEYID = 1
1,216,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,732 UART: [fwproc] Recv command 0x46574c44
1,283,460 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,240 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,925 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,186,294 >>> mbox cmd response: failed
1,186,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,300 >>> mbox cmd response: failed
1,186,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,867 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,791 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
893,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,842 UART: [kat] ++
897,994 UART: [kat] sha1
902,290 UART: [kat] SHA2-256
904,230 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,749 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,528 UART: [cold-reset] ++
1,173,002 UART: [fht] FHT @ 0x50003400
1,175,561 UART: [idev] ++
1,175,729 UART: [idev] CDI.KEYID = 6
1,176,089 UART: [idev] SUBJECT.KEYID = 7
1,176,513 UART: [idev] UDS.KEYID = 0
1,176,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,643 UART: [idev] Erasing UDS.KEYID = 0
1,201,936 UART: [idev] Sha1 KeyId Algorithm
1,210,584 UART: [idev] --
1,211,578 UART: [ldev] ++
1,211,746 UART: [ldev] CDI.KEYID = 6
1,212,109 UART: [ldev] SUBJECT.KEYID = 5
1,212,535 UART: [ldev] AUTHORITY.KEYID = 7
1,212,998 UART: [ldev] FE.KEYID = 1
1,218,136 UART: [ldev] Erasing FE.KEYID = 1
1,244,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,612 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,717 UART: [fwproc] Recv command 0x46574c44
1,285,445 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,265 UART: ROM Fatal Error: 0x000B003F
1,333,424 >>> mbox cmd response: failed
1,333,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,430 >>> mbox cmd response: failed
1,333,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,721 UART: [state] LifecycleState = Unprovisioned
86,376 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
893,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,776 UART: [kat] ++
897,928 UART: [kat] sha1
902,282 UART: [kat] SHA2-256
904,222 UART: [kat] SHA2-384
907,023 UART: [kat] SHA2-512-ACC
908,924 UART: [kat] ECC-384
918,619 UART: [kat] HMAC-384Kdf
923,087 UART: [kat] LMS
1,171,415 UART: [kat] --
1,172,350 UART: [cold-reset] ++
1,172,738 UART: [fht] FHT @ 0x50003400
1,175,339 UART: [idev] ++
1,175,507 UART: [idev] CDI.KEYID = 6
1,175,867 UART: [idev] SUBJECT.KEYID = 7
1,176,291 UART: [idev] UDS.KEYID = 0
1,176,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,813 UART: [idev] Erasing UDS.KEYID = 0
1,201,812 UART: [idev] Sha1 KeyId Algorithm
1,210,306 UART: [idev] --
1,211,386 UART: [ldev] ++
1,211,554 UART: [ldev] CDI.KEYID = 6
1,211,917 UART: [ldev] SUBJECT.KEYID = 5
1,212,343 UART: [ldev] AUTHORITY.KEYID = 7
1,212,806 UART: [ldev] FE.KEYID = 1
1,218,106 UART: [ldev] Erasing FE.KEYID = 1
1,243,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,494 UART: [ldev] --
1,282,865 UART: [fwproc] Wait for Commands...
1,283,439 UART: [fwproc] Recv command 0x46574c44
1,284,167 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,630 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,934 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,579 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,030 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,625 >>> mbox cmd response: failed
1,187,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,631 >>> mbox cmd response: failed
1,187,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,668 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,660 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
915,600 UART: [kat] HMAC-384Kdf
920,244 UART: [kat] LMS
1,168,556 UART: [kat] --
1,169,319 UART: [cold-reset] ++
1,169,723 UART: [fht] FHT @ 0x50003400
1,172,349 UART: [idev] ++
1,172,517 UART: [idev] CDI.KEYID = 6
1,172,878 UART: [idev] SUBJECT.KEYID = 7
1,173,303 UART: [idev] UDS.KEYID = 0
1,173,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,923 UART: [idev] Erasing UDS.KEYID = 0
1,197,347 UART: [idev] Sha1 KeyId Algorithm
1,206,379 UART: [idev] --
1,207,342 UART: [ldev] ++
1,207,510 UART: [ldev] CDI.KEYID = 6
1,207,874 UART: [ldev] SUBJECT.KEYID = 5
1,208,301 UART: [ldev] AUTHORITY.KEYID = 7
1,208,764 UART: [ldev] FE.KEYID = 1
1,214,118 UART: [ldev] Erasing FE.KEYID = 1
1,240,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,754 UART: [ldev] --
1,279,218 UART: [fwproc] Wait for Commands...
1,279,987 UART: [fwproc] Recv command 0x46574c44
1,280,720 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,855 UART: ROM Fatal Error: 0x000B003F
1,329,014 >>> mbox cmd response: failed
1,329,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,020 >>> mbox cmd response: failed
1,329,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,116 UART: [kat] SHA2-256
890,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,795 UART: [kat] ++
894,947 UART: [kat] sha1
898,975 UART: [kat] SHA2-256
900,915 UART: [kat] SHA2-384
903,890 UART: [kat] SHA2-512-ACC
905,791 UART: [kat] ECC-384
915,306 UART: [kat] HMAC-384Kdf
920,114 UART: [kat] LMS
1,168,426 UART: [kat] --
1,169,305 UART: [cold-reset] ++
1,169,773 UART: [fht] FHT @ 0x50003400
1,172,579 UART: [idev] ++
1,172,747 UART: [idev] CDI.KEYID = 6
1,173,108 UART: [idev] SUBJECT.KEYID = 7
1,173,533 UART: [idev] UDS.KEYID = 0
1,173,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,317 UART: [idev] Erasing UDS.KEYID = 0
1,198,171 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,208,078 UART: [ldev] ++
1,208,246 UART: [ldev] CDI.KEYID = 6
1,208,610 UART: [ldev] SUBJECT.KEYID = 5
1,209,037 UART: [ldev] AUTHORITY.KEYID = 7
1,209,500 UART: [ldev] FE.KEYID = 1
1,214,726 UART: [ldev] Erasing FE.KEYID = 1
1,240,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,562 UART: [ldev] --
1,279,934 UART: [fwproc] Wait for Commands...
1,280,733 UART: [fwproc] Recv command 0x46574c44
1,281,466 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,431 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,740 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,192 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,999 >>> mbox cmd response: failed
1,183,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,005 >>> mbox cmd response: failed
1,184,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,170 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,174,222 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,207,936 UART: [idev] --
1,209,039 UART: [ldev] ++
1,209,207 UART: [ldev] CDI.KEYID = 6
1,209,571 UART: [ldev] SUBJECT.KEYID = 5
1,209,998 UART: [ldev] AUTHORITY.KEYID = 7
1,210,461 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,291 UART: [ldev] --
1,281,803 UART: [fwproc] Wait for Commands...
1,282,532 UART: [fwproc] Recv command 0x46574c44
1,283,265 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,734 UART: ROM Fatal Error: 0x000B003F
1,331,893 >>> mbox cmd response: failed
1,331,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,899 >>> mbox cmd response: failed
1,331,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,994 UART: [kat] SHA2-256
901,934 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,338 UART: [cold-reset] ++
1,170,868 UART: [fht] FHT @ 0x50003400
1,173,748 UART: [idev] ++
1,173,916 UART: [idev] CDI.KEYID = 6
1,174,277 UART: [idev] SUBJECT.KEYID = 7
1,174,702 UART: [idev] UDS.KEYID = 0
1,175,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,344 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,242,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,861 UART: [ldev] --
1,282,301 UART: [fwproc] Wait for Commands...
1,282,966 UART: [fwproc] Recv command 0x46574c44
1,283,699 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,425 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,013 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,840 >>> mbox cmd response: failed
1,183,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,846 >>> mbox cmd response: failed
1,183,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,339 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,255 UART:
192,610 UART: Running Caliptra ROM ...
193,782 UART:
193,935 UART: [state] CFI Enabled
263,649 UART: [state] LifecycleState = Unprovisioned
265,629 UART: [state] DebugLocked = No
267,013 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,119 UART: [kat] SHA2-256
441,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,363 UART: [kat] ++
452,915 UART: [kat] sha1
465,206 UART: [kat] SHA2-256
467,897 UART: [kat] SHA2-384
472,573 UART: [kat] SHA2-512-ACC
474,974 UART: [kat] ECC-384
2,765,393 UART: [kat] HMAC-384Kdf
2,797,585 UART: [kat] LMS
3,987,890 UART: [kat] --
3,992,574 UART: [cold-reset] ++
3,994,845 UART: [fht] Storing FHT @ 0x50003400
4,005,523 UART: [idev] ++
4,006,092 UART: [idev] CDI.KEYID = 6
4,007,119 UART: [idev] SUBJECT.KEYID = 7
4,008,286 UART: [idev] UDS.KEYID = 0
4,011,267 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,702 UART: [idev] Erasing UDS.KEYID = 0
7,343,442 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,415 UART: [idev] --
7,370,576 UART: [ldev] ++
7,371,150 UART: [ldev] CDI.KEYID = 6
7,372,120 UART: [ldev] SUBJECT.KEYID = 5
7,373,338 UART: [ldev] AUTHORITY.KEYID = 7
7,374,571 UART: [ldev] FE.KEYID = 1
7,420,001 UART: [ldev] Erasing FE.KEYID = 1
10,756,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,510 UART: [ldev] --
13,137,561 UART: [fwproc] Waiting for Commands...
13,139,388 UART: [fwproc] Received command 0x46574c44
13,141,594 UART: [fwproc] Received Image of size 113844 bytes
15,844,605 UART: ROM Fatal Error: 0x000B003C
15,848,051 >>> mbox cmd response: failed
15,848,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,848,794 >>> mbox cmd response: failed
15,849,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,849,363 >>> mbox cmd response: failed
Initializing fuses
2,066,277 writing to cptra_bootfsm_go
2,255,581 UART:
2,255,925 UART: Running Caliptra ROM ...
2,257,067 UART:
2,257,236 UART: [state] CFI Enabled
2,333,949 UART: [state] LifecycleState = Unprovisioned
2,335,916 UART: [state] DebugLocked = No
2,338,117 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,342,375 UART: [kat] SHA2-256
2,512,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,522,589 UART: [kat] ++
2,523,048 UART: [kat] sha1
2,533,831 UART: [kat] SHA2-256
2,536,531 UART: [kat] SHA2-384
2,541,747 UART: [kat] SHA2-512-ACC
2,544,150 UART: [kat] ECC-384
4,835,513 UART: [kat] HMAC-384Kdf
4,868,339 UART: [kat] LMS
6,058,672 UART: [kat] --
6,063,659 UART: [cold-reset] ++
6,065,919 UART: [fht] Storing FHT @ 0x50003400
6,077,085 UART: [idev] ++
6,077,682 UART: [idev] CDI.KEYID = 6
6,078,626 UART: [idev] SUBJECT.KEYID = 7
6,079,844 UART: [idev] UDS.KEYID = 0
6,082,288 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,225,605 UART: [idev] Erasing UDS.KEYID = 0
9,416,039 UART: [idev] Using Sha1 for KeyId Algorithm
9,439,449 UART: [idev] --
9,444,058 UART: [ldev] ++
9,444,637 UART: [ldev] CDI.KEYID = 6
9,445,576 UART: [ldev] SUBJECT.KEYID = 5
9,446,847 UART: [ldev] AUTHORITY.KEYID = 7
9,447,944 UART: [ldev] FE.KEYID = 1
9,491,346 UART: [ldev] Erasing FE.KEYID = 1
12,824,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,138,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,152,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,167,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,181,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,199,881 UART: [ldev] --
15,203,747 UART: [fwproc] Waiting for Commands...
15,206,441 UART: [fwproc] Received command 0x46574c44
15,208,677 UART: [fwproc] Received Image of size 113844 bytes
19,259,482 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,337,726 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,406,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,723,066 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,785,676 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,540,771 >>> mbox cmd response: failed
15,541,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,541,715 >>> mbox cmd response: failed
15,541,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,542,278 >>> mbox cmd response: failed
Initializing fuses
2,055,452 writing to cptra_bootfsm_go
5,842,484 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,917,776 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,409 UART:
192,769 UART: Running Caliptra ROM ...
193,952 UART:
603,457 UART: [state] CFI Enabled
620,575 UART: [state] LifecycleState = Unprovisioned
622,539 UART: [state] DebugLocked = No
624,268 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,688 UART: [kat] SHA2-256
799,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,005 UART: [kat] ++
810,469 UART: [kat] sha1
822,100 UART: [kat] SHA2-256
824,804 UART: [kat] SHA2-384
830,621 UART: [kat] SHA2-512-ACC
833,012 UART: [kat] ECC-384
3,116,457 UART: [kat] HMAC-384Kdf
3,128,263 UART: [kat] LMS
4,318,358 UART: [kat] --
4,322,587 UART: [cold-reset] ++
4,324,687 UART: [fht] Storing FHT @ 0x50003400
4,336,658 UART: [idev] ++
4,337,222 UART: [idev] CDI.KEYID = 6
4,338,235 UART: [idev] SUBJECT.KEYID = 7
4,339,397 UART: [idev] UDS.KEYID = 0
4,342,173 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,363 UART: [idev] Erasing UDS.KEYID = 0
7,632,262 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,910 UART: [idev] --
7,658,065 UART: [ldev] ++
7,658,654 UART: [ldev] CDI.KEYID = 6
7,659,607 UART: [ldev] SUBJECT.KEYID = 5
7,660,826 UART: [ldev] AUTHORITY.KEYID = 7
7,662,061 UART: [ldev] FE.KEYID = 1
7,672,639 UART: [ldev] Erasing FE.KEYID = 1
10,959,039 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,587 UART: [ldev] --
13,320,256 UART: [fwproc] Waiting for Commands...
13,322,202 UART: [fwproc] Received command 0x46574c44
13,324,446 UART: [fwproc] Received Image of size 113844 bytes
16,025,575 UART: ROM Fatal Error: 0x000B003C
16,029,046 >>> mbox cmd response: failed
16,029,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,029,846 >>> mbox cmd response: failed
16,030,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,030,412 >>> mbox cmd response: failed
Initializing fuses
2,055,502 writing to cptra_bootfsm_go
2,244,794 UART:
2,245,164 UART: Running Caliptra ROM ...
2,246,211 UART:
4,427,879 UART: [state] CFI Enabled
4,440,471 UART: [state] LifecycleState = Unprovisioned
4,442,386 UART: [state] DebugLocked = No
4,444,320 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,448,483 UART: [kat] SHA2-256
4,618,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,628,776 UART: [kat] ++
4,629,237 UART: [kat] sha1
4,640,827 UART: [kat] SHA2-256
4,643,572 UART: [kat] SHA2-384
4,648,909 UART: [kat] SHA2-512-ACC
4,651,310 UART: [kat] ECC-384
6,935,295 UART: [kat] HMAC-384Kdf
6,946,866 UART: [kat] LMS
8,137,012 UART: [kat] --
8,143,064 UART: [cold-reset] ++
8,145,435 UART: [fht] Storing FHT @ 0x50003400
8,157,618 UART: [idev] ++
8,158,194 UART: [idev] CDI.KEYID = 6
8,159,134 UART: [idev] SUBJECT.KEYID = 7
8,160,417 UART: [idev] UDS.KEYID = 0
8,162,668 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,305,750 UART: [idev] Erasing UDS.KEYID = 0
11,447,479 UART: [idev] Using Sha1 for KeyId Algorithm
11,468,632 UART: [idev] --
11,473,143 UART: [ldev] ++
11,473,722 UART: [ldev] CDI.KEYID = 6
11,474,699 UART: [ldev] SUBJECT.KEYID = 5
11,475,889 UART: [ldev] AUTHORITY.KEYID = 7
11,477,125 UART: [ldev] FE.KEYID = 1
11,486,901 UART: [ldev] Erasing FE.KEYID = 1
14,775,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,068,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,083,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,097,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,112,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,130,972 UART: [ldev] --
17,135,485 UART: [fwproc] Waiting for Commands...
17,138,608 UART: [fwproc] Received command 0x46574c44
17,140,942 UART: [fwproc] Received Image of size 113844 bytes
21,192,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,262,344 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,331,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,646,811 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,123,574 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,751,542 >>> mbox cmd response: failed
15,752,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,752,462 >>> mbox cmd response: failed
15,752,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,753,083 >>> mbox cmd response: failed
Initializing fuses
2,060,565 writing to cptra_bootfsm_go
8,246,517 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,188,213 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,052 UART:
192,462 UART: Running Caliptra ROM ...
193,576 UART:
193,718 UART: [state] CFI Enabled
261,121 UART: [state] LifecycleState = Unprovisioned
263,023 UART: [state] DebugLocked = No
264,568 UART: [state] WD Timer not started. Device not locked for debugging
267,637 UART: [kat] SHA2-256
446,779 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,369 UART: [kat] ++
458,898 UART: [kat] sha1
468,594 UART: [kat] SHA2-256
471,599 UART: [kat] SHA2-384
477,520 UART: [kat] SHA2-512-ACC
480,508 UART: [kat] ECC-384
2,923,190 UART: [kat] HMAC-384Kdf
2,936,841 UART: [kat] LMS
3,466,262 UART: [kat] --
3,472,456 UART: [cold-reset] ++
3,474,763 UART: [fht] FHT @ 0x50003400
3,485,475 UART: [idev] ++
3,486,044 UART: [idev] CDI.KEYID = 6
3,486,934 UART: [idev] SUBJECT.KEYID = 7
3,488,148 UART: [idev] UDS.KEYID = 0
3,490,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,634,743 UART: [idev] Erasing UDS.KEYID = 0
5,993,917 UART: [idev] Sha1 KeyId Algorithm
6,016,021 UART: [idev] --
6,020,091 UART: [ldev] ++
6,020,676 UART: [ldev] CDI.KEYID = 6
6,021,562 UART: [ldev] SUBJECT.KEYID = 5
6,022,780 UART: [ldev] AUTHORITY.KEYID = 7
6,024,015 UART: [ldev] FE.KEYID = 1
6,065,863 UART: [ldev] Erasing FE.KEYID = 1
8,567,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,438 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,353,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,374,421 UART: [ldev] --
10,378,388 UART: [fwproc] Wait for Commands...
10,380,484 UART: [fwproc] Recv command 0x46574c44
10,382,580 UART: [fwproc] Recv'd Img size: 114168 bytes
12,432,926 UART: ROM Fatal Error: 0x000B003C
12,436,058 >>> mbox cmd response: failed
12,436,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,436,722 >>> mbox cmd response: failed
12,436,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,437,282 >>> mbox cmd response: failed
Initializing fuses
2,062,853 writing to cptra_bootfsm_go
2,252,149 UART:
2,252,490 UART: Running Caliptra ROM ...
2,253,628 UART:
2,253,801 UART: [state] CFI Enabled
2,317,292 UART: [state] LifecycleState = Unprovisioned
2,319,171 UART: [state] DebugLocked = No
2,321,479 UART: [state] WD Timer not started. Device not locked for debugging
2,325,502 UART: [kat] SHA2-256
2,504,636 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,199 UART: [kat] ++
2,516,745 UART: [kat] sha1
2,529,423 UART: [kat] SHA2-256
2,532,455 UART: [kat] SHA2-384
2,539,306 UART: [kat] SHA2-512-ACC
2,542,246 UART: [kat] ECC-384
5,000,266 UART: [kat] HMAC-384Kdf
5,023,426 UART: [kat] LMS
5,552,888 UART: [kat] --
5,557,045 UART: [cold-reset] ++
5,558,550 UART: [fht] FHT @ 0x50003400
5,569,529 UART: [idev] ++
5,570,093 UART: [idev] CDI.KEYID = 6
5,570,978 UART: [idev] SUBJECT.KEYID = 7
5,572,191 UART: [idev] UDS.KEYID = 0
5,574,433 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,718,136 UART: [idev] Erasing UDS.KEYID = 0
8,077,515 UART: [idev] Sha1 KeyId Algorithm
8,099,934 UART: [idev] --
8,104,811 UART: [ldev] ++
8,105,383 UART: [ldev] CDI.KEYID = 6
8,106,266 UART: [ldev] SUBJECT.KEYID = 5
8,107,479 UART: [ldev] AUTHORITY.KEYID = 7
8,108,710 UART: [ldev] FE.KEYID = 1
8,151,741 UART: [ldev] Erasing FE.KEYID = 1
10,653,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,370,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,386,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,402,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,438,638 UART: [ldev] --
12,443,034 UART: [fwproc] Wait for Commands...
12,445,349 UART: [fwproc] Recv command 0x46574c44
12,447,447 UART: [fwproc] Recv'd Img size: 114168 bytes
15,842,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,918,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,987,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,304,598 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,364,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,228,437 >>> mbox cmd response: failed
12,229,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,409 >>> mbox cmd response: failed
12,229,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,969 >>> mbox cmd response: failed
Initializing fuses
2,060,265 writing to cptra_bootfsm_go
5,426,790 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,102,888 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,581 UART:
192,946 UART: Running Caliptra ROM ...
194,144 UART:
603,655 UART: [state] CFI Enabled
616,511 UART: [state] LifecycleState = Unprovisioned
618,338 UART: [state] DebugLocked = No
620,902 UART: [state] WD Timer not started. Device not locked for debugging
625,104 UART: [kat] SHA2-256
804,220 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,819 UART: [kat] ++
816,347 UART: [kat] sha1
827,396 UART: [kat] SHA2-256
830,394 UART: [kat] SHA2-384
836,594 UART: [kat] SHA2-512-ACC
839,550 UART: [kat] ECC-384
3,279,863 UART: [kat] HMAC-384Kdf
3,293,837 UART: [kat] LMS
3,823,336 UART: [kat] --
3,827,066 UART: [cold-reset] ++
3,828,141 UART: [fht] FHT @ 0x50003400
3,839,637 UART: [idev] ++
3,840,196 UART: [idev] CDI.KEYID = 6
3,841,082 UART: [idev] SUBJECT.KEYID = 7
3,842,298 UART: [idev] UDS.KEYID = 0
3,844,866 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,460 UART: [idev] Erasing UDS.KEYID = 0
6,313,103 UART: [idev] Sha1 KeyId Algorithm
6,335,228 UART: [idev] --
6,338,685 UART: [ldev] ++
6,339,253 UART: [ldev] CDI.KEYID = 6
6,340,155 UART: [ldev] SUBJECT.KEYID = 5
6,341,414 UART: [ldev] AUTHORITY.KEYID = 7
6,342,619 UART: [ldev] FE.KEYID = 1
6,352,107 UART: [ldev] Erasing FE.KEYID = 1
8,825,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,542,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,558,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,574,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,589,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,851 UART: [ldev] --
10,614,197 UART: [fwproc] Wait for Commands...
10,616,831 UART: [fwproc] Recv command 0x46574c44
10,618,924 UART: [fwproc] Recv'd Img size: 114168 bytes
12,664,356 UART: ROM Fatal Error: 0x000B003C
12,667,420 >>> mbox cmd response: failed
12,667,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,668,132 >>> mbox cmd response: failed
12,668,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,668,803 >>> mbox cmd response: failed
Initializing fuses
2,055,368 writing to cptra_bootfsm_go
2,244,707 UART:
2,245,074 UART: Running Caliptra ROM ...
2,246,214 UART:
7,780,934 UART: [state] CFI Enabled
7,796,524 UART: [state] LifecycleState = Unprovisioned
7,798,389 UART: [state] DebugLocked = No
7,800,695 UART: [state] WD Timer not started. Device not locked for debugging
7,804,174 UART: [kat] SHA2-256
7,983,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,994,879 UART: [kat] ++
7,995,359 UART: [kat] sha1
8,007,326 UART: [kat] SHA2-256
8,010,354 UART: [kat] SHA2-384
8,016,618 UART: [kat] SHA2-512-ACC
8,019,565 UART: [kat] ECC-384
10,459,807 UART: [kat] HMAC-384Kdf
10,472,270 UART: [kat] LMS
11,001,762 UART: [kat] --
11,006,250 UART: [cold-reset] ++
11,007,213 UART: [fht] FHT @ 0x50003400
11,018,899 UART: [idev] ++
11,019,480 UART: [idev] CDI.KEYID = 6
11,020,397 UART: [idev] SUBJECT.KEYID = 7
11,021,549 UART: [idev] UDS.KEYID = 0
11,024,117 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,167,613 UART: [idev] Erasing UDS.KEYID = 0
13,497,048 UART: [idev] Sha1 KeyId Algorithm
13,519,575 UART: [idev] --
13,523,214 UART: [ldev] ++
13,523,785 UART: [ldev] CDI.KEYID = 6
13,524,691 UART: [ldev] SUBJECT.KEYID = 5
13,525,852 UART: [ldev] AUTHORITY.KEYID = 7
13,527,137 UART: [ldev] FE.KEYID = 1
13,537,681 UART: [ldev] Erasing FE.KEYID = 1
16,012,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,726,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,742,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,758,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,774,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,795,762 UART: [ldev] --
17,800,211 UART: [fwproc] Wait for Commands...
17,803,300 UART: [fwproc] Recv command 0x46574c44
17,805,344 UART: [fwproc] Recv'd Img size: 114168 bytes
21,213,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,289,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,357,796 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,675,805 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
3,702,973 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,453,571 >>> mbox cmd response: failed
12,454,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,470 >>> mbox cmd response: failed
12,454,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,030 >>> mbox cmd response: failed
Initializing fuses
2,053,250 writing to cptra_bootfsm_go
11,105,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,677,400 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,416 UART:
193,247 UART: Running Caliptra ROM ...
194,376 UART:
194,525 UART: [state] CFI Enabled
264,534 UART: [state] LifecycleState = Unprovisioned
267,083 UART: [state] DebugLocked = No
268,962 UART: [state] WD Timer not started. Device not locked for debugging
274,309 UART: [kat] SHA2-256
464,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,932 UART: [kat] ++
475,423 UART: [kat] sha1
487,006 UART: [kat] SHA2-256
490,050 UART: [kat] SHA2-384
495,670 UART: [kat] SHA2-512-ACC
498,290 UART: [kat] ECC-384
2,946,952 UART: [kat] HMAC-384Kdf
2,960,926 UART: [kat] LMS
3,492,706 UART: [kat] --
3,497,687 UART: [cold-reset] ++
3,499,841 UART: [fht] FHT @ 0x50003400
3,511,524 UART: [idev] ++
3,512,199 UART: [idev] CDI.KEYID = 6
3,513,137 UART: [idev] SUBJECT.KEYID = 7
3,514,402 UART: [idev] UDS.KEYID = 0
3,516,999 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,661,025 UART: [idev] Erasing UDS.KEYID = 0
6,019,216 UART: [idev] Sha1 KeyId Algorithm
6,040,100 UART: [idev] --
6,044,864 UART: [ldev] ++
6,045,548 UART: [ldev] CDI.KEYID = 6
6,046,467 UART: [ldev] SUBJECT.KEYID = 5
6,047,630 UART: [ldev] AUTHORITY.KEYID = 7
6,048,881 UART: [ldev] FE.KEYID = 1
6,090,369 UART: [ldev] Erasing FE.KEYID = 1
8,596,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,548 UART: [ldev] --
10,401,567 UART: [fwproc] Wait for Commands...
10,403,022 UART: [fwproc] Recv command 0x46574c44
10,405,017 UART: [fwproc] Recv'd Img size: 114168 bytes
12,476,839 UART: ROM Fatal Error: 0x000B003C
12,480,508 >>> mbox cmd response: failed
12,480,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,481,240 >>> mbox cmd response: failed
12,481,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,481,773 >>> mbox cmd response: failed
Initializing fuses
2,060,970 writing to cptra_bootfsm_go
2,250,303 UART:
2,250,653 UART: Running Caliptra ROM ...
2,251,784 UART:
2,251,950 UART: [state] CFI Enabled
2,317,752 UART: [state] LifecycleState = Unprovisioned
2,320,184 UART: [state] DebugLocked = No
2,322,716 UART: [state] WD Timer not started. Device not locked for debugging
2,326,591 UART: [kat] SHA2-256
2,516,465 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,527,272 UART: [kat] ++
2,527,741 UART: [kat] sha1
2,538,870 UART: [kat] SHA2-256
2,541,898 UART: [kat] SHA2-384
2,548,216 UART: [kat] SHA2-512-ACC
2,550,784 UART: [kat] ECC-384
5,000,218 UART: [kat] HMAC-384Kdf
5,027,672 UART: [kat] LMS
5,559,457 UART: [kat] --
5,564,186 UART: [cold-reset] ++
5,566,829 UART: [fht] FHT @ 0x50003400
5,578,618 UART: [idev] ++
5,579,301 UART: [idev] CDI.KEYID = 6
5,580,287 UART: [idev] SUBJECT.KEYID = 7
5,581,444 UART: [idev] UDS.KEYID = 0
5,584,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,727,798 UART: [idev] Erasing UDS.KEYID = 0
8,088,333 UART: [idev] Sha1 KeyId Algorithm
8,111,228 UART: [idev] --
8,116,449 UART: [ldev] ++
8,117,143 UART: [ldev] CDI.KEYID = 6
8,118,063 UART: [ldev] SUBJECT.KEYID = 5
8,119,232 UART: [ldev] AUTHORITY.KEYID = 7
8,120,407 UART: [ldev] FE.KEYID = 1
8,158,604 UART: [ldev] Erasing FE.KEYID = 1
10,663,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,083 UART: [ldev] --
12,469,509 UART: [fwproc] Wait for Commands...
12,471,604 UART: [fwproc] Recv command 0x46574c44
12,473,868 UART: [fwproc] Recv'd Img size: 114168 bytes
15,917,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,106,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,647,754 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,438,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,303,239 >>> mbox cmd response: failed
12,303,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,096 >>> mbox cmd response: failed
12,304,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,657 >>> mbox cmd response: failed
Initializing fuses
2,056,627 writing to cptra_bootfsm_go
5,485,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,780,235 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,396 UART:
192,772 UART: Running Caliptra ROM ...
193,970 UART:
603,610 UART: [state] CFI Enabled
618,351 UART: [state] LifecycleState = Unprovisioned
620,727 UART: [state] DebugLocked = No
622,050 UART: [state] WD Timer not started. Device not locked for debugging
626,931 UART: [kat] SHA2-256
816,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,576 UART: [kat] ++
828,082 UART: [kat] sha1
840,696 UART: [kat] SHA2-256
843,756 UART: [kat] SHA2-384
850,383 UART: [kat] SHA2-512-ACC
852,938 UART: [kat] ECC-384
3,295,429 UART: [kat] HMAC-384Kdf
3,307,010 UART: [kat] LMS
3,838,829 UART: [kat] --
3,844,729 UART: [cold-reset] ++
3,847,264 UART: [fht] FHT @ 0x50003400
3,857,979 UART: [idev] ++
3,858,688 UART: [idev] CDI.KEYID = 6
3,859,631 UART: [idev] SUBJECT.KEYID = 7
3,860,848 UART: [idev] UDS.KEYID = 0
3,863,262 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,730 UART: [idev] Erasing UDS.KEYID = 0
6,343,015 UART: [idev] Sha1 KeyId Algorithm
6,364,683 UART: [idev] --
6,368,514 UART: [ldev] ++
6,369,194 UART: [ldev] CDI.KEYID = 6
6,370,110 UART: [ldev] SUBJECT.KEYID = 5
6,371,323 UART: [ldev] AUTHORITY.KEYID = 7
6,372,498 UART: [ldev] FE.KEYID = 1
6,384,171 UART: [ldev] Erasing FE.KEYID = 1
8,859,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,303 UART: [ldev] --
10,652,218 UART: [fwproc] Wait for Commands...
10,655,095 UART: [fwproc] Recv command 0x46574c44
10,657,411 UART: [fwproc] Recv'd Img size: 114168 bytes
12,731,510 UART: ROM Fatal Error: 0x000B003C
12,735,188 >>> mbox cmd response: failed
12,735,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,125 >>> mbox cmd response: failed
12,736,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,685 >>> mbox cmd response: failed
Initializing fuses
2,061,616 writing to cptra_bootfsm_go
2,250,920 UART:
2,251,257 UART: Running Caliptra ROM ...
2,252,302 UART:
7,715,786 UART: [state] CFI Enabled
7,726,795 UART: [state] LifecycleState = Unprovisioned
7,729,148 UART: [state] DebugLocked = No
7,732,018 UART: [state] WD Timer not started. Device not locked for debugging
7,737,506 UART: [kat] SHA2-256
7,927,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,938,155 UART: [kat] ++
7,938,672 UART: [kat] sha1
7,950,156 UART: [kat] SHA2-256
7,953,183 UART: [kat] SHA2-384
7,958,425 UART: [kat] SHA2-512-ACC
7,960,992 UART: [kat] ECC-384
10,403,341 UART: [kat] HMAC-384Kdf
10,417,149 UART: [kat] LMS
10,948,989 UART: [kat] --
10,954,284 UART: [cold-reset] ++
10,956,054 UART: [fht] FHT @ 0x50003400
10,969,278 UART: [idev] ++
10,969,998 UART: [idev] CDI.KEYID = 6
10,970,914 UART: [idev] SUBJECT.KEYID = 7
10,972,130 UART: [idev] UDS.KEYID = 0
10,974,465 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,117,804 UART: [idev] Erasing UDS.KEYID = 0
13,453,820 UART: [idev] Sha1 KeyId Algorithm
13,475,705 UART: [idev] --
13,480,564 UART: [ldev] ++
13,481,300 UART: [ldev] CDI.KEYID = 6
13,482,209 UART: [ldev] SUBJECT.KEYID = 5
13,483,366 UART: [ldev] AUTHORITY.KEYID = 7
13,484,594 UART: [ldev] FE.KEYID = 1
13,495,565 UART: [ldev] Erasing FE.KEYID = 1
15,975,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,695,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,710,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,726,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,741,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,762,167 UART: [ldev] --
17,767,611 UART: [fwproc] Wait for Commands...
17,769,128 UART: [fwproc] Recv command 0x46574c44
17,771,010 UART: [fwproc] Recv'd Img size: 114168 bytes
21,217,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,292,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,408,709 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,949,718 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,761,376 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,519,027 >>> mbox cmd response: failed
12,519,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,519,975 >>> mbox cmd response: failed
12,520,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,536 >>> mbox cmd response: failed
Initializing fuses
2,056,866 writing to cptra_bootfsm_go
11,092,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,291,215 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,759 UART: [kat] SHA2-256
881,690 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,805 UART: [kat] ++
885,957 UART: [kat] sha1
889,983 UART: [kat] SHA2-256
891,921 UART: [kat] SHA2-384
894,632 UART: [kat] SHA2-512-ACC
896,533 UART: [kat] ECC-384
902,334 UART: [kat] HMAC-384Kdf
907,096 UART: [kat] LMS
1,475,292 UART: [kat] --
1,476,433 UART: [cold-reset] ++
1,476,823 UART: [fht] Storing FHT @ 0x50003400
1,479,622 UART: [idev] ++
1,479,790 UART: [idev] CDI.KEYID = 6
1,480,150 UART: [idev] SUBJECT.KEYID = 7
1,480,574 UART: [idev] UDS.KEYID = 0
1,480,919 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,600 UART: [idev] Erasing UDS.KEYID = 0
1,505,652 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,232 UART: [idev] --
1,515,137 UART: [ldev] ++
1,515,305 UART: [ldev] CDI.KEYID = 6
1,515,668 UART: [ldev] SUBJECT.KEYID = 5
1,516,094 UART: [ldev] AUTHORITY.KEYID = 7
1,516,557 UART: [ldev] FE.KEYID = 1
1,521,999 UART: [ldev] Erasing FE.KEYID = 1
1,547,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,728 UART: [ldev] --
1,587,155 UART: [fwproc] Waiting for Commands...
1,587,996 UART: [fwproc] Received command 0x46574c44
1,588,787 UART: [fwproc] Received Image of size 114168 bytes
1,636,177 UART: ROM Fatal Error: 0x000B003C
1,637,336 >>> mbox cmd response: failed
1,637,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,342 >>> mbox cmd response: failed
1,637,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,257 UART: [kat] SHA2-256
882,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,303 UART: [kat] ++
886,455 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,348 UART: [kat] LMS
1,475,544 UART: [kat] --
1,476,609 UART: [cold-reset] ++
1,477,103 UART: [fht] Storing FHT @ 0x50003400
1,479,748 UART: [idev] ++
1,479,916 UART: [idev] CDI.KEYID = 6
1,480,276 UART: [idev] SUBJECT.KEYID = 7
1,480,700 UART: [idev] UDS.KEYID = 0
1,481,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,046 UART: [idev] Erasing UDS.KEYID = 0
1,505,588 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,176 UART: [idev] --
1,515,257 UART: [ldev] ++
1,515,425 UART: [ldev] CDI.KEYID = 6
1,515,788 UART: [ldev] SUBJECT.KEYID = 5
1,516,214 UART: [ldev] AUTHORITY.KEYID = 7
1,516,677 UART: [ldev] FE.KEYID = 1
1,521,765 UART: [ldev] Erasing FE.KEYID = 1
1,547,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,146 UART: [ldev] --
1,586,609 UART: [fwproc] Waiting for Commands...
1,587,352 UART: [fwproc] Received command 0x46574c44
1,588,143 UART: [fwproc] Received Image of size 114168 bytes
2,883,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,234 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,215 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,741 >>> mbox cmd response: failed
1,488,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,747 >>> mbox cmd response: failed
1,488,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,265 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,954 UART: [kat] SHA2-256
881,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,000 UART: [kat] ++
886,152 UART: [kat] sha1
890,428 UART: [kat] SHA2-256
892,366 UART: [kat] SHA2-384
894,951 UART: [kat] SHA2-512-ACC
896,852 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,291 UART: [kat] LMS
1,475,487 UART: [kat] --
1,476,302 UART: [cold-reset] ++
1,476,656 UART: [fht] Storing FHT @ 0x50003400
1,479,381 UART: [idev] ++
1,479,549 UART: [idev] CDI.KEYID = 6
1,479,909 UART: [idev] SUBJECT.KEYID = 7
1,480,333 UART: [idev] UDS.KEYID = 0
1,480,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,201 UART: [idev] Erasing UDS.KEYID = 0
1,505,247 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,765 UART: [idev] --
1,514,734 UART: [ldev] ++
1,514,902 UART: [ldev] CDI.KEYID = 6
1,515,265 UART: [ldev] SUBJECT.KEYID = 5
1,515,691 UART: [ldev] AUTHORITY.KEYID = 7
1,516,154 UART: [ldev] FE.KEYID = 1
1,521,370 UART: [ldev] Erasing FE.KEYID = 1
1,546,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,401 UART: [ldev] --
1,585,854 UART: [fwproc] Waiting for Commands...
1,586,721 UART: [fwproc] Received command 0x46574c44
1,587,512 UART: [fwproc] Received Image of size 114168 bytes
1,634,662 UART: ROM Fatal Error: 0x000B003C
1,635,821 >>> mbox cmd response: failed
1,635,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,827 >>> mbox cmd response: failed
1,635,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,839 UART: [state] LifecycleState = Unprovisioned
86,494 UART: [state] DebugLocked = No
86,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,552 UART: [kat] SHA2-256
882,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,598 UART: [kat] ++
886,750 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,065 UART: [kat] HMAC-384Kdf
907,761 UART: [kat] LMS
1,475,957 UART: [kat] --
1,476,650 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,629 UART: [idev] Erasing UDS.KEYID = 0
1,506,073 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,487 UART: [idev] --
1,515,392 UART: [ldev] ++
1,515,560 UART: [ldev] CDI.KEYID = 6
1,515,923 UART: [ldev] SUBJECT.KEYID = 5
1,516,349 UART: [ldev] AUTHORITY.KEYID = 7
1,516,812 UART: [ldev] FE.KEYID = 1
1,521,998 UART: [ldev] Erasing FE.KEYID = 1
1,547,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,933 UART: [ldev] --
1,586,236 UART: [fwproc] Waiting for Commands...
1,586,855 UART: [fwproc] Received command 0x46574c44
1,587,646 UART: [fwproc] Received Image of size 114168 bytes
2,884,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,143 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,495 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,122 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,998 >>> mbox cmd response: failed
1,489,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,004 >>> mbox cmd response: failed
1,490,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,740 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,262 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,176 UART: [kat] SHA2-256
892,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,951 UART: [kat] ++
897,103 UART: [kat] sha1
901,403 UART: [kat] SHA2-256
903,343 UART: [kat] SHA2-384
906,064 UART: [kat] SHA2-512-ACC
907,965 UART: [kat] ECC-384
917,368 UART: [kat] HMAC-384Kdf
922,042 UART: [kat] LMS
1,170,370 UART: [kat] --
1,171,331 UART: [cold-reset] ++
1,171,715 UART: [fht] FHT @ 0x50003400
1,174,268 UART: [idev] ++
1,174,436 UART: [idev] CDI.KEYID = 6
1,174,796 UART: [idev] SUBJECT.KEYID = 7
1,175,220 UART: [idev] UDS.KEYID = 0
1,175,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,014 UART: [idev] Erasing UDS.KEYID = 0
1,199,939 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,521 UART: [ldev] ++
1,209,689 UART: [ldev] CDI.KEYID = 6
1,210,052 UART: [ldev] SUBJECT.KEYID = 5
1,210,478 UART: [ldev] AUTHORITY.KEYID = 7
1,210,941 UART: [ldev] FE.KEYID = 1
1,216,199 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,910 UART: [fwproc] Wait for Commands...
1,282,644 UART: [fwproc] Recv command 0x46574c44
1,283,372 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,218 UART: ROM Fatal Error: 0x000B003C
1,331,377 >>> mbox cmd response: failed
1,331,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,383 >>> mbox cmd response: failed
1,331,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
893,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,165 UART: [kat] ++
897,317 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,452 UART: [kat] SHA2-512-ACC
908,353 UART: [kat] ECC-384
917,830 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,457 UART: [cold-reset] ++
1,171,805 UART: [fht] FHT @ 0x50003400
1,174,404 UART: [idev] ++
1,174,572 UART: [idev] CDI.KEYID = 6
1,174,932 UART: [idev] SUBJECT.KEYID = 7
1,175,356 UART: [idev] UDS.KEYID = 0
1,175,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,990 UART: [idev] Erasing UDS.KEYID = 0
1,199,283 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] --
1,208,609 UART: [ldev] ++
1,208,777 UART: [ldev] CDI.KEYID = 6
1,209,140 UART: [ldev] SUBJECT.KEYID = 5
1,209,566 UART: [ldev] AUTHORITY.KEYID = 7
1,210,029 UART: [ldev] FE.KEYID = 1
1,215,071 UART: [ldev] Erasing FE.KEYID = 1
1,241,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,257 UART: [ldev] --
1,280,628 UART: [fwproc] Wait for Commands...
1,281,204 UART: [fwproc] Recv command 0x46574c44
1,281,932 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,521 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,216 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,186,370 >>> mbox cmd response: failed
1,186,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,376 >>> mbox cmd response: failed
1,186,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,547 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,100 UART: [kat] SHA2-256
904,040 UART: [kat] SHA2-384
906,723 UART: [kat] SHA2-512-ACC
908,624 UART: [kat] ECC-384
918,645 UART: [kat] HMAC-384Kdf
923,267 UART: [kat] LMS
1,171,595 UART: [kat] --
1,172,546 UART: [cold-reset] ++
1,173,092 UART: [fht] FHT @ 0x50003400
1,175,693 UART: [idev] ++
1,175,861 UART: [idev] CDI.KEYID = 6
1,176,221 UART: [idev] SUBJECT.KEYID = 7
1,176,645 UART: [idev] UDS.KEYID = 0
1,176,990 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,574 UART: [idev] Sha1 KeyId Algorithm
1,209,860 UART: [idev] --
1,211,016 UART: [ldev] ++
1,211,184 UART: [ldev] CDI.KEYID = 6
1,211,547 UART: [ldev] SUBJECT.KEYID = 5
1,211,973 UART: [ldev] AUTHORITY.KEYID = 7
1,212,436 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,244,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,068 UART: [ldev] --
1,283,347 UART: [fwproc] Wait for Commands...
1,284,149 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,087 UART: ROM Fatal Error: 0x000B003C
1,333,246 >>> mbox cmd response: failed
1,333,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,252 >>> mbox cmd response: failed
1,333,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,206 UART: [kat] SHA2-256
904,146 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,897 UART: [kat] HMAC-384Kdf
923,475 UART: [kat] LMS
1,171,803 UART: [kat] --
1,172,608 UART: [cold-reset] ++
1,173,142 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
1,176,900 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,887 UART: [idev] Erasing UDS.KEYID = 0
1,201,760 UART: [idev] Sha1 KeyId Algorithm
1,210,256 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,824 UART: [ldev] Erasing FE.KEYID = 1
1,244,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,164 UART: [ldev] --
1,283,635 UART: [fwproc] Wait for Commands...
1,284,295 UART: [fwproc] Recv command 0x46574c44
1,285,023 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,246 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,550 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,087 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,186,119 >>> mbox cmd response: failed
1,186,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,125 >>> mbox cmd response: failed
1,186,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,131 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,058 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
85,905 UART: [state] WD Timer not started. Device not locked for debugging
87,100 UART: [kat] SHA2-256
890,650 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,779 UART: [kat] ++
894,931 UART: [kat] sha1
899,165 UART: [kat] SHA2-256
901,105 UART: [kat] SHA2-384
903,980 UART: [kat] SHA2-512-ACC
905,881 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,330 UART: [kat] LMS
1,168,642 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,170,043 UART: [fht] FHT @ 0x50003400
1,172,627 UART: [idev] ++
1,172,795 UART: [idev] CDI.KEYID = 6
1,173,156 UART: [idev] SUBJECT.KEYID = 7
1,173,581 UART: [idev] UDS.KEYID = 0
1,173,927 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,347 UART: [idev] Sha1 KeyId Algorithm
1,207,227 UART: [idev] --
1,208,156 UART: [ldev] ++
1,208,324 UART: [ldev] CDI.KEYID = 6
1,208,688 UART: [ldev] SUBJECT.KEYID = 5
1,209,115 UART: [ldev] AUTHORITY.KEYID = 7
1,209,578 UART: [ldev] FE.KEYID = 1
1,214,914 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,246 UART: [ldev] --
1,280,634 UART: [fwproc] Wait for Commands...
1,281,459 UART: [fwproc] Recv command 0x46574c44
1,282,192 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,865 UART: ROM Fatal Error: 0x000B003C
1,330,024 >>> mbox cmd response: failed
1,330,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,030 >>> mbox cmd response: failed
1,330,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,036 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,949 UART: [kat] SHA2-256
901,889 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,893 UART: [idev] ++
1,173,061 UART: [idev] CDI.KEYID = 6
1,173,422 UART: [idev] SUBJECT.KEYID = 7
1,173,847 UART: [idev] UDS.KEYID = 0
1,174,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,773 UART: [idev] Erasing UDS.KEYID = 0
1,199,123 UART: [idev] Sha1 KeyId Algorithm
1,208,085 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,242,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,394 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,651 UART: [fwproc] Recv command 0x46574c44
1,283,384 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,587 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,896 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,350 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,651 >>> mbox cmd response: failed
1,184,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,657 >>> mbox cmd response: failed
1,184,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,072 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,170 UART: [state] WD Timer not started. Device not locked for debugging
87,427 UART: [kat] SHA2-256
890,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
916,293 UART: [kat] HMAC-384Kdf
920,959 UART: [kat] LMS
1,169,271 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,410 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,174,284 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,188 UART: [idev] --
1,209,207 UART: [ldev] ++
1,209,375 UART: [ldev] CDI.KEYID = 6
1,209,739 UART: [ldev] SUBJECT.KEYID = 5
1,210,166 UART: [ldev] AUTHORITY.KEYID = 7
1,210,629 UART: [ldev] FE.KEYID = 1
1,216,045 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,795 UART: [ldev] --
1,281,129 UART: [fwproc] Wait for Commands...
1,281,838 UART: [fwproc] Recv command 0x46574c44
1,282,571 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,488 UART: ROM Fatal Error: 0x000B003C
1,330,647 >>> mbox cmd response: failed
1,330,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,653 >>> mbox cmd response: failed
1,330,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
891,303 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,533 UART: [kat] SHA2-512-ACC
906,434 UART: [kat] ECC-384
916,439 UART: [kat] HMAC-384Kdf
921,035 UART: [kat] LMS
1,169,347 UART: [kat] --
1,170,220 UART: [cold-reset] ++
1,170,732 UART: [fht] FHT @ 0x50003400
1,173,436 UART: [idev] ++
1,173,604 UART: [idev] CDI.KEYID = 6
1,173,965 UART: [idev] SUBJECT.KEYID = 7
1,174,390 UART: [idev] UDS.KEYID = 0
1,174,736 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,490 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] --
1,209,399 UART: [ldev] ++
1,209,567 UART: [ldev] CDI.KEYID = 6
1,209,931 UART: [ldev] SUBJECT.KEYID = 5
1,210,358 UART: [ldev] AUTHORITY.KEYID = 7
1,210,821 UART: [ldev] FE.KEYID = 1
1,216,333 UART: [ldev] Erasing FE.KEYID = 1
1,242,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,536 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,845 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,429 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,342 >>> mbox cmd response: failed
1,183,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,348 >>> mbox cmd response: failed
1,183,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,354 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,191 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,215 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,169 UART:
192,545 UART: Running Caliptra ROM ...
193,688 UART:
193,835 UART: [state] CFI Enabled
264,703 UART: [state] LifecycleState = Manufacturing
266,673 UART: [state] DebugLocked = No
268,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,258 UART: [kat] SHA2-256
442,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,448 UART: [kat] ++
453,921 UART: [kat] sha1
465,559 UART: [kat] SHA2-256
468,241 UART: [kat] SHA2-384
474,540 UART: [kat] SHA2-512-ACC
476,885 UART: [kat] ECC-384
2,765,290 UART: [kat] HMAC-384Kdf
2,778,027 UART: [kat] LMS
3,968,345 UART: [kat] --
3,972,664 UART: [cold-reset] ++
3,974,760 UART: [fht] Storing FHT @ 0x50003400
3,985,592 UART: [idev] ++
3,986,157 UART: [idev] CDI.KEYID = 6
3,987,137 UART: [idev] SUBJECT.KEYID = 7
3,988,350 UART: [idev] UDS.KEYID = 0
3,991,197 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,059 UART: [idev] Erasing UDS.KEYID = 0
7,325,116 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,653 UART: [idev] --
7,350,962 UART: [ldev] ++
7,351,536 UART: [ldev] CDI.KEYID = 6
7,352,476 UART: [ldev] SUBJECT.KEYID = 5
7,353,694 UART: [ldev] AUTHORITY.KEYID = 7
7,354,906 UART: [ldev] FE.KEYID = 1
7,402,015 UART: [ldev] Erasing FE.KEYID = 1
10,738,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,865 UART: [ldev] --
13,114,159 UART: [fwproc] Waiting for Commands...
13,117,068 UART: [fwproc] Received command 0x46574c44
13,119,294 UART: [fwproc] Received Image of size 113844 bytes
17,197,778 UART: ROM Fatal Error: 0x000B002C
17,201,236 >>> mbox cmd response: failed
17,201,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,201,933 >>> mbox cmd response: failed
17,202,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,202,532 >>> mbox cmd response: failed
Initializing fuses
2,047,874 writing to cptra_bootfsm_go
2,237,202 UART:
2,237,553 UART: Running Caliptra ROM ...
2,238,598 UART:
2,238,756 UART: [state] CFI Enabled
2,293,473 UART: [state] LifecycleState = Manufacturing
2,295,410 UART: [state] DebugLocked = No
2,297,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,301,840 UART: [kat] SHA2-256
2,471,535 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,482,064 UART: [kat] ++
2,482,528 UART: [kat] sha1
2,493,521 UART: [kat] SHA2-256
2,496,196 UART: [kat] SHA2-384
2,501,492 UART: [kat] SHA2-512-ACC
2,503,908 UART: [kat] ECC-384
4,798,661 UART: [kat] HMAC-384Kdf
4,811,384 UART: [kat] LMS
6,001,705 UART: [kat] --
6,008,359 UART: [cold-reset] ++
6,010,548 UART: [fht] Storing FHT @ 0x50003400
6,021,043 UART: [idev] ++
6,021,620 UART: [idev] CDI.KEYID = 6
6,022,532 UART: [idev] SUBJECT.KEYID = 7
6,023,807 UART: [idev] UDS.KEYID = 0
6,026,327 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,169,637 UART: [idev] Erasing UDS.KEYID = 0
9,347,963 UART: [idev] Using Sha1 for KeyId Algorithm
9,369,595 UART: [idev] --
9,374,799 UART: [ldev] ++
9,375,371 UART: [ldev] CDI.KEYID = 6
9,376,336 UART: [ldev] SUBJECT.KEYID = 5
9,377,611 UART: [ldev] AUTHORITY.KEYID = 7
9,378,795 UART: [ldev] FE.KEYID = 1
9,427,254 UART: [ldev] Erasing FE.KEYID = 1
12,758,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,075,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,089,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,104,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,119,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,138,436 UART: [ldev] --
15,143,552 UART: [fwproc] Waiting for Commands...
15,146,797 UART: [fwproc] Received command 0x46574c44
15,148,985 UART: [fwproc] Received Image of size 113844 bytes
19,233,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,309,311 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,378,235 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,694,847 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,786,788 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,185,940 >>> mbox cmd response: failed
17,186,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,186,922 >>> mbox cmd response: failed
17,187,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,488 >>> mbox cmd response: failed
Initializing fuses
2,049,235 writing to cptra_bootfsm_go
5,840,694 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,947,322 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,503 UART:
192,869 UART: Running Caliptra ROM ...
194,066 UART:
603,530 UART: [state] CFI Enabled
617,424 UART: [state] LifecycleState = Manufacturing
619,341 UART: [state] DebugLocked = No
622,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,512 UART: [kat] SHA2-256
797,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,781 UART: [kat] ++
808,222 UART: [kat] sha1
818,235 UART: [kat] SHA2-256
820,907 UART: [kat] SHA2-384
826,421 UART: [kat] SHA2-512-ACC
828,819 UART: [kat] ECC-384
3,112,357 UART: [kat] HMAC-384Kdf
3,125,243 UART: [kat] LMS
4,315,354 UART: [kat] --
4,318,989 UART: [cold-reset] ++
4,320,816 UART: [fht] Storing FHT @ 0x50003400
4,333,428 UART: [idev] ++
4,334,053 UART: [idev] CDI.KEYID = 6
4,334,937 UART: [idev] SUBJECT.KEYID = 7
4,336,201 UART: [idev] UDS.KEYID = 0
4,339,173 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,232 UART: [idev] Erasing UDS.KEYID = 0
7,623,159 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,862 UART: [idev] --
7,647,804 UART: [ldev] ++
7,648,379 UART: [ldev] CDI.KEYID = 6
7,649,346 UART: [ldev] SUBJECT.KEYID = 5
7,650,529 UART: [ldev] AUTHORITY.KEYID = 7
7,651,820 UART: [ldev] FE.KEYID = 1
7,662,685 UART: [ldev] Erasing FE.KEYID = 1
10,950,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,685 UART: [ldev] --
13,313,800 UART: [fwproc] Waiting for Commands...
13,315,845 UART: [fwproc] Received command 0x46574c44
13,318,030 UART: [fwproc] Received Image of size 113844 bytes
17,397,510 UART: ROM Fatal Error: 0x000B002C
17,400,923 >>> mbox cmd response: failed
17,401,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,401,709 >>> mbox cmd response: failed
17,401,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,402,292 >>> mbox cmd response: failed
Initializing fuses
2,048,403 writing to cptra_bootfsm_go
2,237,687 UART:
2,238,033 UART: Running Caliptra ROM ...
2,239,175 UART:
3,066,956 UART: [state] CFI Enabled
3,080,464 UART: [state] LifecycleState = Manufacturing
3,082,381 UART: [state] DebugLocked = No
3,085,098 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,090,481 UART: [kat] SHA2-256
3,260,218 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,270,767 UART: [kat] ++
3,271,232 UART: [kat] sha1
3,282,495 UART: [kat] SHA2-256
3,285,190 UART: [kat] SHA2-384
3,290,960 UART: [kat] SHA2-512-ACC
3,293,317 UART: [kat] ECC-384
5,577,894 UART: [kat] HMAC-384Kdf
5,590,878 UART: [kat] LMS
6,781,007 UART: [kat] --
6,786,298 UART: [cold-reset] ++
6,788,823 UART: [fht] Storing FHT @ 0x50003400
6,799,763 UART: [idev] ++
6,800,325 UART: [idev] CDI.KEYID = 6
6,801,259 UART: [idev] SUBJECT.KEYID = 7
6,802,524 UART: [idev] UDS.KEYID = 0
6,805,169 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,948,336 UART: [idev] Erasing UDS.KEYID = 0
10,088,723 UART: [idev] Using Sha1 for KeyId Algorithm
10,110,927 UART: [idev] --
10,116,111 UART: [ldev] ++
10,116,680 UART: [ldev] CDI.KEYID = 6
10,117,651 UART: [ldev] SUBJECT.KEYID = 5
10,118,869 UART: [ldev] AUTHORITY.KEYID = 7
10,120,105 UART: [ldev] FE.KEYID = 1
10,130,372 UART: [ldev] Erasing FE.KEYID = 1
13,415,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,708,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,723,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,738,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,752,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,771,001 UART: [ldev] --
15,774,868 UART: [fwproc] Waiting for Commands...
15,778,120 UART: [fwproc] Received command 0x46574c44
15,780,309 UART: [fwproc] Received Image of size 113844 bytes
19,863,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,941,358 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,010,213 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,326,171 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
4,129,699 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,371,775 >>> mbox cmd response: failed
17,372,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,372,870 >>> mbox cmd response: failed
17,373,135 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,373,426 >>> mbox cmd response: failed
Initializing fuses
2,050,532 writing to cptra_bootfsm_go
6,620,557 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,604,795 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,173 UART:
192,545 UART: Running Caliptra ROM ...
193,743 UART:
193,897 UART: [state] CFI Enabled
261,348 UART: [state] LifecycleState = Manufacturing
263,218 UART: [state] DebugLocked = No
264,749 UART: [state] WD Timer not started. Device not locked for debugging
267,575 UART: [kat] SHA2-256
446,713 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,252 UART: [kat] ++
458,783 UART: [kat] sha1
470,260 UART: [kat] SHA2-256
473,315 UART: [kat] SHA2-384
479,287 UART: [kat] SHA2-512-ACC
482,224 UART: [kat] ECC-384
2,926,350 UART: [kat] HMAC-384Kdf
2,950,357 UART: [kat] LMS
3,479,807 UART: [kat] --
3,485,661 UART: [cold-reset] ++
3,487,919 UART: [fht] FHT @ 0x50003400
3,499,061 UART: [idev] ++
3,499,638 UART: [idev] CDI.KEYID = 6
3,500,570 UART: [idev] SUBJECT.KEYID = 7
3,501,795 UART: [idev] UDS.KEYID = 0
3,504,533 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,648,328 UART: [idev] Erasing UDS.KEYID = 0
6,005,270 UART: [idev] Sha1 KeyId Algorithm
6,027,960 UART: [idev] --
6,031,397 UART: [ldev] ++
6,031,979 UART: [ldev] CDI.KEYID = 6
6,032,892 UART: [ldev] SUBJECT.KEYID = 5
6,034,054 UART: [ldev] AUTHORITY.KEYID = 7
6,035,296 UART: [ldev] FE.KEYID = 1
6,079,269 UART: [ldev] Erasing FE.KEYID = 1
8,583,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,271 UART: [ldev] --
10,395,269 UART: [fwproc] Wait for Commands...
10,397,798 UART: [fwproc] Recv command 0x46574c44
10,399,848 UART: [fwproc] Recv'd Img size: 114168 bytes
13,829,520 UART: ROM Fatal Error: 0x000B002C
13,832,638 >>> mbox cmd response: failed
13,833,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,833,388 >>> mbox cmd response: failed
13,833,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,833,945 >>> mbox cmd response: failed
Initializing fuses
2,048,058 writing to cptra_bootfsm_go
2,237,446 UART:
2,237,791 UART: Running Caliptra ROM ...
2,238,933 UART:
2,239,102 UART: [state] CFI Enabled
2,305,993 UART: [state] LifecycleState = Manufacturing
2,307,877 UART: [state] DebugLocked = No
2,309,219 UART: [state] WD Timer not started. Device not locked for debugging
2,313,298 UART: [kat] SHA2-256
2,492,432 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,997 UART: [kat] ++
2,504,535 UART: [kat] sha1
2,515,589 UART: [kat] SHA2-256
2,518,642 UART: [kat] SHA2-384
2,524,527 UART: [kat] SHA2-512-ACC
2,527,525 UART: [kat] ECC-384
4,990,284 UART: [kat] HMAC-384Kdf
5,010,755 UART: [kat] LMS
5,540,241 UART: [kat] --
5,544,575 UART: [cold-reset] ++
5,545,914 UART: [fht] FHT @ 0x50003400
5,556,097 UART: [idev] ++
5,556,705 UART: [idev] CDI.KEYID = 6
5,557,623 UART: [idev] SUBJECT.KEYID = 7
5,558,788 UART: [idev] UDS.KEYID = 0
5,561,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,704,954 UART: [idev] Erasing UDS.KEYID = 0
8,066,398 UART: [idev] Sha1 KeyId Algorithm
8,089,637 UART: [idev] --
8,093,255 UART: [ldev] ++
8,093,827 UART: [ldev] CDI.KEYID = 6
8,094,718 UART: [ldev] SUBJECT.KEYID = 5
8,095,801 UART: [ldev] AUTHORITY.KEYID = 7
8,097,169 UART: [ldev] FE.KEYID = 1
8,139,452 UART: [ldev] Erasing FE.KEYID = 1
10,643,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,427,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,446,597 UART: [ldev] --
12,451,821 UART: [fwproc] Wait for Commands...
12,454,134 UART: [fwproc] Recv command 0x46574c44
12,456,182 UART: [fwproc] Recv'd Img size: 114168 bytes
15,889,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,962,729 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,031,485 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,349,059 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,382,205 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,615,712 >>> mbox cmd response: failed
13,616,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,616,631 >>> mbox cmd response: failed
13,616,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,617,211 >>> mbox cmd response: failed
Initializing fuses
2,045,441 writing to cptra_bootfsm_go
5,425,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,129,752 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,539 UART:
192,895 UART: Running Caliptra ROM ...
194,073 UART:
603,891 UART: [state] CFI Enabled
615,366 UART: [state] LifecycleState = Manufacturing
617,254 UART: [state] DebugLocked = No
619,844 UART: [state] WD Timer not started. Device not locked for debugging
622,965 UART: [kat] SHA2-256
802,083 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,685 UART: [kat] ++
814,134 UART: [kat] sha1
826,030 UART: [kat] SHA2-256
829,035 UART: [kat] SHA2-384
835,343 UART: [kat] SHA2-512-ACC
838,310 UART: [kat] ECC-384
3,278,431 UART: [kat] HMAC-384Kdf
3,290,897 UART: [kat] LMS
3,820,354 UART: [kat] --
3,825,882 UART: [cold-reset] ++
3,828,034 UART: [fht] FHT @ 0x50003400
3,839,663 UART: [idev] ++
3,840,228 UART: [idev] CDI.KEYID = 6
3,841,195 UART: [idev] SUBJECT.KEYID = 7
3,842,298 UART: [idev] UDS.KEYID = 0
3,845,075 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,893 UART: [idev] Erasing UDS.KEYID = 0
6,312,349 UART: [idev] Sha1 KeyId Algorithm
6,334,559 UART: [idev] --
6,337,200 UART: [ldev] ++
6,337,773 UART: [ldev] CDI.KEYID = 6
6,338,790 UART: [ldev] SUBJECT.KEYID = 5
6,339,894 UART: [ldev] AUTHORITY.KEYID = 7
6,341,144 UART: [ldev] FE.KEYID = 1
6,351,864 UART: [ldev] Erasing FE.KEYID = 1
8,826,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,544,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,560,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,705 UART: [ldev] --
10,616,483 UART: [fwproc] Wait for Commands...
10,618,309 UART: [fwproc] Recv command 0x46574c44
10,620,355 UART: [fwproc] Recv'd Img size: 114168 bytes
14,052,264 UART: ROM Fatal Error: 0x000B002C
14,055,343 >>> mbox cmd response: failed
14,055,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,056,103 >>> mbox cmd response: failed
14,056,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,056,696 >>> mbox cmd response: failed
Initializing fuses
2,048,757 writing to cptra_bootfsm_go
2,238,070 UART:
2,238,415 UART: Running Caliptra ROM ...
2,239,555 UART:
6,398,449 UART: [state] CFI Enabled
6,410,385 UART: [state] LifecycleState = Manufacturing
6,412,231 UART: [state] DebugLocked = No
6,413,862 UART: [state] WD Timer not started. Device not locked for debugging
6,418,307 UART: [kat] SHA2-256
6,597,448 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,609,034 UART: [kat] ++
6,609,518 UART: [kat] sha1
6,619,487 UART: [kat] SHA2-256
6,622,534 UART: [kat] SHA2-384
6,628,798 UART: [kat] SHA2-512-ACC
6,631,749 UART: [kat] ECC-384
9,070,719 UART: [kat] HMAC-384Kdf
9,083,648 UART: [kat] LMS
9,613,112 UART: [kat] --
9,617,368 UART: [cold-reset] ++
9,619,767 UART: [fht] FHT @ 0x50003400
9,630,810 UART: [idev] ++
9,631,381 UART: [idev] CDI.KEYID = 6
9,632,266 UART: [idev] SUBJECT.KEYID = 7
9,633,480 UART: [idev] UDS.KEYID = 0
9,636,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,779,825 UART: [idev] Erasing UDS.KEYID = 0
12,106,901 UART: [idev] Sha1 KeyId Algorithm
12,129,768 UART: [idev] --
12,133,867 UART: [ldev] ++
12,134,467 UART: [ldev] CDI.KEYID = 6
12,135,351 UART: [ldev] SUBJECT.KEYID = 5
12,136,478 UART: [ldev] AUTHORITY.KEYID = 7
12,137,818 UART: [ldev] FE.KEYID = 1
12,146,979 UART: [ldev] Erasing FE.KEYID = 1
14,623,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,341,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,357,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,373,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,388,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,409,867 UART: [ldev] --
16,415,021 UART: [fwproc] Wait for Commands...
16,418,202 UART: [fwproc] Recv command 0x46574c44
16,420,313 UART: [fwproc] Recv'd Img size: 114168 bytes
19,855,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,923,984 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,992,727 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,309,660 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
3,696,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,848,940 >>> mbox cmd response: failed
13,849,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,849,830 >>> mbox cmd response: failed
13,850,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,850,393 >>> mbox cmd response: failed
Initializing fuses
2,046,359 writing to cptra_bootfsm_go
9,711,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,315,107 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,272 UART:
192,626 UART: Running Caliptra ROM ...
193,812 UART:
193,967 UART: [state] CFI Enabled
262,923 UART: [state] LifecycleState = Manufacturing
265,330 UART: [state] DebugLocked = No
267,896 UART: [state] WD Timer not started. Device not locked for debugging
271,703 UART: [kat] SHA2-256
461,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,134 UART: [kat] ++
472,780 UART: [kat] sha1
484,914 UART: [kat] SHA2-256
487,928 UART: [kat] SHA2-384
493,808 UART: [kat] SHA2-512-ACC
496,423 UART: [kat] ECC-384
2,951,912 UART: [kat] HMAC-384Kdf
2,974,508 UART: [kat] LMS
3,506,295 UART: [kat] --
3,509,656 UART: [cold-reset] ++
3,511,917 UART: [fht] FHT @ 0x50003400
3,523,154 UART: [idev] ++
3,523,851 UART: [idev] CDI.KEYID = 6
3,524,819 UART: [idev] SUBJECT.KEYID = 7
3,525,979 UART: [idev] UDS.KEYID = 0
3,528,685 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,326 UART: [idev] Erasing UDS.KEYID = 0
6,032,042 UART: [idev] Sha1 KeyId Algorithm
6,054,130 UART: [idev] --
6,059,761 UART: [ldev] ++
6,060,504 UART: [ldev] CDI.KEYID = 6
6,061,423 UART: [ldev] SUBJECT.KEYID = 5
6,062,584 UART: [ldev] AUTHORITY.KEYID = 7
6,063,766 UART: [ldev] FE.KEYID = 1
6,104,347 UART: [ldev] Erasing FE.KEYID = 1
8,614,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,311 UART: [ldev] --
10,418,176 UART: [fwproc] Wait for Commands...
10,421,039 UART: [fwproc] Recv command 0x46574c44
10,423,361 UART: [fwproc] Recv'd Img size: 114168 bytes
13,901,467 UART: ROM Fatal Error: 0x000B002C
13,905,116 >>> mbox cmd response: failed
13,905,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,905,930 >>> mbox cmd response: failed
13,906,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,906,499 >>> mbox cmd response: failed
Initializing fuses
2,054,286 writing to cptra_bootfsm_go
2,243,563 UART:
2,243,907 UART: Running Caliptra ROM ...
2,245,044 UART:
2,245,210 UART: [state] CFI Enabled
2,322,470 UART: [state] LifecycleState = Manufacturing
2,324,856 UART: [state] DebugLocked = No
2,326,591 UART: [state] WD Timer not started. Device not locked for debugging
2,331,903 UART: [kat] SHA2-256
2,521,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,536 UART: [kat] ++
2,533,025 UART: [kat] sha1
2,545,542 UART: [kat] SHA2-256
2,548,521 UART: [kat] SHA2-384
2,554,299 UART: [kat] SHA2-512-ACC
2,556,883 UART: [kat] ECC-384
5,003,535 UART: [kat] HMAC-384Kdf
5,027,107 UART: [kat] LMS
5,558,908 UART: [kat] --
5,563,546 UART: [cold-reset] ++
5,565,321 UART: [fht] FHT @ 0x50003400
5,576,795 UART: [idev] ++
5,577,475 UART: [idev] CDI.KEYID = 6
5,578,460 UART: [idev] SUBJECT.KEYID = 7
5,579,624 UART: [idev] UDS.KEYID = 0
5,582,192 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,725,918 UART: [idev] Erasing UDS.KEYID = 0
8,084,706 UART: [idev] Sha1 KeyId Algorithm
8,106,161 UART: [idev] --
8,110,994 UART: [ldev] ++
8,111,691 UART: [ldev] CDI.KEYID = 6
8,112,605 UART: [ldev] SUBJECT.KEYID = 5
8,113,764 UART: [ldev] AUTHORITY.KEYID = 7
8,114,938 UART: [ldev] FE.KEYID = 1
8,156,100 UART: [ldev] Erasing FE.KEYID = 1
10,663,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,646 UART: [ldev] --
12,470,233 UART: [fwproc] Wait for Commands...
12,472,072 UART: [fwproc] Recv command 0x46574c44
12,474,343 UART: [fwproc] Recv'd Img size: 114168 bytes
15,948,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,025,825 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,142,008 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,684,217 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,440,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,307,478 >>> mbox cmd response: failed
14,308,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,308,366 >>> mbox cmd response: failed
14,308,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,308,936 >>> mbox cmd response: failed
Initializing fuses
2,048,654 writing to cptra_bootfsm_go
5,470,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,808,644 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
192,525 UART:
192,913 UART: Running Caliptra ROM ...
194,017 UART:
603,751 UART: [state] CFI Enabled
617,235 UART: [state] LifecycleState = Manufacturing
619,614 UART: [state] DebugLocked = No
622,398 UART: [state] WD Timer not started. Device not locked for debugging
626,745 UART: [kat] SHA2-256
816,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,449 UART: [kat] ++
828,035 UART: [kat] sha1
838,298 UART: [kat] SHA2-256
841,311 UART: [kat] SHA2-384
846,318 UART: [kat] SHA2-512-ACC
848,895 UART: [kat] ECC-384
3,291,868 UART: [kat] HMAC-384Kdf
3,304,643 UART: [kat] LMS
3,836,511 UART: [kat] --
3,841,577 UART: [cold-reset] ++
3,843,023 UART: [fht] FHT @ 0x50003400
3,854,822 UART: [idev] ++
3,855,653 UART: [idev] CDI.KEYID = 6
3,856,543 UART: [idev] SUBJECT.KEYID = 7
3,857,618 UART: [idev] UDS.KEYID = 0
3,860,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,755 UART: [idev] Erasing UDS.KEYID = 0
6,337,477 UART: [idev] Sha1 KeyId Algorithm
6,358,899 UART: [idev] --
6,364,572 UART: [ldev] ++
6,365,261 UART: [ldev] CDI.KEYID = 6
6,366,211 UART: [ldev] SUBJECT.KEYID = 5
6,367,259 UART: [ldev] AUTHORITY.KEYID = 7
6,368,546 UART: [ldev] FE.KEYID = 1
6,378,980 UART: [ldev] Erasing FE.KEYID = 1
8,857,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,497 UART: [ldev] --
10,651,693 UART: [fwproc] Wait for Commands...
10,654,225 UART: [fwproc] Recv command 0x46574c44
10,656,548 UART: [fwproc] Recv'd Img size: 114168 bytes
14,134,051 UART: ROM Fatal Error: 0x000B002C
14,137,740 >>> mbox cmd response: failed
14,138,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,138,484 >>> mbox cmd response: failed
14,138,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,139,089 >>> mbox cmd response: failed
Initializing fuses
2,052,556 writing to cptra_bootfsm_go
2,241,850 UART:
2,242,190 UART: Running Caliptra ROM ...
2,243,271 UART:
6,318,351 UART: [state] CFI Enabled
6,330,586 UART: [state] LifecycleState = Manufacturing
6,332,938 UART: [state] DebugLocked = No
6,334,973 UART: [state] WD Timer not started. Device not locked for debugging
6,338,951 UART: [kat] SHA2-256
6,528,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,539,640 UART: [kat] ++
6,540,172 UART: [kat] sha1
6,551,708 UART: [kat] SHA2-256
6,554,735 UART: [kat] SHA2-384
6,560,514 UART: [kat] SHA2-512-ACC
6,563,144 UART: [kat] ECC-384
9,004,716 UART: [kat] HMAC-384Kdf
9,016,310 UART: [kat] LMS
9,548,093 UART: [kat] --
9,553,215 UART: [cold-reset] ++
9,554,338 UART: [fht] FHT @ 0x50003400
9,565,998 UART: [idev] ++
9,566,688 UART: [idev] CDI.KEYID = 6
9,567,593 UART: [idev] SUBJECT.KEYID = 7
9,568,810 UART: [idev] UDS.KEYID = 0
9,571,475 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,715,234 UART: [idev] Erasing UDS.KEYID = 0
12,047,472 UART: [idev] Sha1 KeyId Algorithm
12,071,088 UART: [idev] --
12,076,379 UART: [ldev] ++
12,077,063 UART: [ldev] CDI.KEYID = 6
12,077,976 UART: [ldev] SUBJECT.KEYID = 5
12,079,138 UART: [ldev] AUTHORITY.KEYID = 7
12,080,370 UART: [ldev] FE.KEYID = 1
12,091,289 UART: [ldev] Erasing FE.KEYID = 1
14,568,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,288,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,303,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,318,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,333,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,354,036 UART: [ldev] --
16,359,065 UART: [fwproc] Wait for Commands...
16,360,619 UART: [fwproc] Recv command 0x46574c44
16,362,905 UART: [fwproc] Recv'd Img size: 114168 bytes
19,844,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,922,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,038,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,580,080 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
3,751,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,538,880 >>> mbox cmd response: failed
14,539,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,539,779 >>> mbox cmd response: failed
14,540,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,540,420 >>> mbox cmd response: failed
Initializing fuses
2,053,916 writing to cptra_bootfsm_go
9,080,414 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,320,745 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Manufacturing
85,793 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,001 UART: [kat] SHA2-256
881,932 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,047 UART: [kat] ++
886,199 UART: [kat] sha1
890,337 UART: [kat] SHA2-256
892,275 UART: [kat] SHA2-384
895,226 UART: [kat] SHA2-512-ACC
897,127 UART: [kat] ECC-384
902,830 UART: [kat] HMAC-384Kdf
907,338 UART: [kat] LMS
1,475,534 UART: [kat] --
1,476,623 UART: [cold-reset] ++
1,477,013 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,098 UART: [idev] Erasing UDS.KEYID = 0
1,505,622 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,236 UART: [idev] --
1,515,077 UART: [ldev] ++
1,515,245 UART: [ldev] CDI.KEYID = 6
1,515,608 UART: [ldev] SUBJECT.KEYID = 5
1,516,034 UART: [ldev] AUTHORITY.KEYID = 7
1,516,497 UART: [ldev] FE.KEYID = 1
1,521,881 UART: [ldev] Erasing FE.KEYID = 1
1,547,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,936 UART: [ldev] --
1,587,199 UART: [fwproc] Waiting for Commands...
1,587,964 UART: [fwproc] Received command 0x46574c44
1,588,755 UART: [fwproc] Received Image of size 114168 bytes
2,908,765 UART: ROM Fatal Error: 0x000B002C
2,909,924 >>> mbox cmd response: failed
2,909,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,909,930 >>> mbox cmd response: failed
2,909,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,909,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,299 UART: [kat] SHA2-256
892,237 UART: [kat] SHA2-384
895,044 UART: [kat] SHA2-512-ACC
896,945 UART: [kat] ECC-384
902,638 UART: [kat] HMAC-384Kdf
907,022 UART: [kat] LMS
1,475,218 UART: [kat] --
1,476,467 UART: [cold-reset] ++
1,476,849 UART: [fht] Storing FHT @ 0x50003400
1,479,740 UART: [idev] ++
1,479,908 UART: [idev] CDI.KEYID = 6
1,480,268 UART: [idev] SUBJECT.KEYID = 7
1,480,692 UART: [idev] UDS.KEYID = 0
1,481,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,154 UART: [idev] Erasing UDS.KEYID = 0
1,505,814 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,482 UART: [idev] --
1,515,643 UART: [ldev] ++
1,515,811 UART: [ldev] CDI.KEYID = 6
1,516,174 UART: [ldev] SUBJECT.KEYID = 5
1,516,600 UART: [ldev] AUTHORITY.KEYID = 7
1,517,063 UART: [ldev] FE.KEYID = 1
1,522,129 UART: [ldev] Erasing FE.KEYID = 1
1,547,166 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,850 UART: [ldev] --
1,586,219 UART: [fwproc] Waiting for Commands...
1,586,912 UART: [fwproc] Received command 0x46574c44
1,587,703 UART: [fwproc] Received Image of size 114168 bytes
2,883,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,588 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,940 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,525 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,313 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,760,339 >>> mbox cmd response: failed
2,760,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,760,345 >>> mbox cmd response: failed
2,760,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,760,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,427 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,191 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Manufacturing
86,246 UART: [state] DebugLocked = No
86,884 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,892 UART: [kat] SHA2-256
892,830 UART: [kat] SHA2-384
895,593 UART: [kat] SHA2-512-ACC
897,494 UART: [kat] ECC-384
903,139 UART: [kat] HMAC-384Kdf
907,801 UART: [kat] LMS
1,475,997 UART: [kat] --
1,476,994 UART: [cold-reset] ++
1,477,324 UART: [fht] Storing FHT @ 0x50003400
1,480,153 UART: [idev] ++
1,480,321 UART: [idev] CDI.KEYID = 6
1,480,681 UART: [idev] SUBJECT.KEYID = 7
1,481,105 UART: [idev] UDS.KEYID = 0
1,481,450 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,993 UART: [idev] Erasing UDS.KEYID = 0
1,505,471 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,155 UART: [idev] --
1,515,328 UART: [ldev] ++
1,515,496 UART: [ldev] CDI.KEYID = 6
1,515,859 UART: [ldev] SUBJECT.KEYID = 5
1,516,285 UART: [ldev] AUTHORITY.KEYID = 7
1,516,748 UART: [ldev] FE.KEYID = 1
1,521,838 UART: [ldev] Erasing FE.KEYID = 1
1,547,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,289 UART: [ldev] --
1,586,690 UART: [fwproc] Waiting for Commands...
1,587,401 UART: [fwproc] Received command 0x46574c44
1,588,192 UART: [fwproc] Received Image of size 114168 bytes
2,907,818 UART: ROM Fatal Error: 0x000B002C
2,908,977 >>> mbox cmd response: failed
2,908,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,908,983 >>> mbox cmd response: failed
2,908,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,908,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,041 UART: [state] LifecycleState = Unprovisioned
85,696 UART: [state] DebugLocked = No
86,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,920 UART: [kat] SHA2-256
881,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,966 UART: [kat] ++
886,118 UART: [kat] sha1
890,190 UART: [kat] SHA2-256
892,128 UART: [kat] SHA2-384
894,873 UART: [kat] SHA2-512-ACC
896,774 UART: [kat] ECC-384
902,605 UART: [kat] HMAC-384Kdf
907,153 UART: [kat] LMS
1,475,349 UART: [kat] --
1,476,314 UART: [cold-reset] ++
1,476,640 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,505,975 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,693 UART: [idev] --
1,515,692 UART: [ldev] ++
1,515,860 UART: [ldev] CDI.KEYID = 6
1,516,223 UART: [ldev] SUBJECT.KEYID = 5
1,516,649 UART: [ldev] AUTHORITY.KEYID = 7
1,517,112 UART: [ldev] FE.KEYID = 1
1,522,708 UART: [ldev] Erasing FE.KEYID = 1
1,548,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,433 UART: [ldev] --
1,587,834 UART: [fwproc] Waiting for Commands...
1,588,469 UART: [fwproc] Received command 0x46574c44
1,589,260 UART: [fwproc] Received Image of size 114168 bytes
2,884,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,913 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,988 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,814 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,763,484 >>> mbox cmd response: failed
2,763,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,763,490 >>> mbox cmd response: failed
2,763,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,763,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,504 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,662 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Manufacturing
85,449 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
892,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,123 UART: [kat] ++
897,275 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,070 UART: [kat] SHA2-512-ACC
907,971 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,828 UART: [idev] ++
1,174,996 UART: [idev] CDI.KEYID = 6
1,175,356 UART: [idev] SUBJECT.KEYID = 7
1,175,780 UART: [idev] UDS.KEYID = 0
1,176,125 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,132 UART: [idev] Erasing UDS.KEYID = 0
1,200,973 UART: [idev] Sha1 KeyId Algorithm
1,209,499 UART: [idev] --
1,210,669 UART: [ldev] ++
1,210,837 UART: [ldev] CDI.KEYID = 6
1,211,200 UART: [ldev] SUBJECT.KEYID = 5
1,211,626 UART: [ldev] AUTHORITY.KEYID = 7
1,212,089 UART: [ldev] FE.KEYID = 1
1,217,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,301 UART: [ldev] --
1,282,730 UART: [fwproc] Wait for Commands...
1,283,544 UART: [fwproc] Recv command 0x46574c44
1,284,272 UART: [fwproc] Recv'd Img size: 114168 bytes
2,605,008 UART: ROM Fatal Error: 0x000B002C
2,606,167 >>> mbox cmd response: failed
2,606,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,173 >>> mbox cmd response: failed
2,606,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,813 UART: [state] WD Timer not started. Device not locked for debugging
88,114 UART: [kat] SHA2-256
893,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,889 UART: [kat] ++
898,041 UART: [kat] sha1
902,161 UART: [kat] SHA2-256
904,101 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
918,626 UART: [kat] HMAC-384Kdf
923,070 UART: [kat] LMS
1,171,398 UART: [kat] --
1,172,281 UART: [cold-reset] ++
1,172,637 UART: [fht] FHT @ 0x50003400
1,175,266 UART: [idev] ++
1,175,434 UART: [idev] CDI.KEYID = 6
1,175,794 UART: [idev] SUBJECT.KEYID = 7
1,176,218 UART: [idev] UDS.KEYID = 0
1,176,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,904 UART: [idev] Erasing UDS.KEYID = 0
1,200,849 UART: [idev] Sha1 KeyId Algorithm
1,209,373 UART: [idev] --
1,210,275 UART: [ldev] ++
1,210,443 UART: [ldev] CDI.KEYID = 6
1,210,806 UART: [ldev] SUBJECT.KEYID = 5
1,211,232 UART: [ldev] AUTHORITY.KEYID = 7
1,211,695 UART: [ldev] FE.KEYID = 1
1,216,973 UART: [ldev] Erasing FE.KEYID = 1
1,243,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,265 UART: [ldev] --
1,282,556 UART: [fwproc] Wait for Commands...
1,283,356 UART: [fwproc] Recv command 0x46574c44
1,284,084 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,535 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,124 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,073 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,460,586 >>> mbox cmd response: failed
2,460,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,592 >>> mbox cmd response: failed
2,460,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,901 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,987 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Manufacturing
86,390 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,319 UART: [kat] SHA2-256
893,969 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,094 UART: [kat] ++
898,246 UART: [kat] sha1
902,582 UART: [kat] SHA2-256
904,522 UART: [kat] SHA2-384
907,211 UART: [kat] SHA2-512-ACC
909,112 UART: [kat] ECC-384
918,905 UART: [kat] HMAC-384Kdf
923,569 UART: [kat] LMS
1,171,897 UART: [kat] --
1,172,692 UART: [cold-reset] ++
1,173,078 UART: [fht] FHT @ 0x50003400
1,175,677 UART: [idev] ++
1,175,845 UART: [idev] CDI.KEYID = 6
1,176,205 UART: [idev] SUBJECT.KEYID = 7
1,176,629 UART: [idev] UDS.KEYID = 0
1,176,974 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,517 UART: [idev] Erasing UDS.KEYID = 0
1,201,846 UART: [idev] Sha1 KeyId Algorithm
1,210,394 UART: [idev] --
1,211,442 UART: [ldev] ++
1,211,610 UART: [ldev] CDI.KEYID = 6
1,211,973 UART: [ldev] SUBJECT.KEYID = 5
1,212,399 UART: [ldev] AUTHORITY.KEYID = 7
1,212,862 UART: [ldev] FE.KEYID = 1
1,218,166 UART: [ldev] Erasing FE.KEYID = 1
1,244,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,474 UART: [ldev] --
1,283,919 UART: [fwproc] Wait for Commands...
1,284,489 UART: [fwproc] Recv command 0x46574c44
1,285,217 UART: [fwproc] Recv'd Img size: 114168 bytes
2,605,087 UART: ROM Fatal Error: 0x000B002C
2,606,246 >>> mbox cmd response: failed
2,606,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,252 >>> mbox cmd response: failed
2,606,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,258 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
893,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,662 UART: [kat] ++
897,814 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,519 UART: [kat] HMAC-384Kdf
923,107 UART: [kat] LMS
1,171,435 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,866 UART: [fht] FHT @ 0x50003400
1,175,423 UART: [idev] ++
1,175,591 UART: [idev] CDI.KEYID = 6
1,175,951 UART: [idev] SUBJECT.KEYID = 7
1,176,375 UART: [idev] UDS.KEYID = 0
1,176,720 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,667 UART: [idev] Erasing UDS.KEYID = 0
1,201,932 UART: [idev] Sha1 KeyId Algorithm
1,210,208 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,792 UART: [ldev] Erasing FE.KEYID = 1
1,244,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,964 UART: [ldev] --
1,283,303 UART: [fwproc] Wait for Commands...
1,283,917 UART: [fwproc] Recv command 0x46574c44
1,284,645 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,950 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,254 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,819 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,461,881 >>> mbox cmd response: failed
2,461,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,887 >>> mbox cmd response: failed
2,461,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,286 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Manufacturing
85,499 UART: [state] DebugLocked = No
86,051 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,967 UART: [kat] ++
895,119 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,454 UART: [kat] HMAC-384Kdf
920,034 UART: [kat] LMS
1,168,346 UART: [kat] --
1,169,063 UART: [cold-reset] ++
1,169,411 UART: [fht] FHT @ 0x50003400
1,172,153 UART: [idev] ++
1,172,321 UART: [idev] CDI.KEYID = 6
1,172,682 UART: [idev] SUBJECT.KEYID = 7
1,173,107 UART: [idev] UDS.KEYID = 0
1,173,453 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,113 UART: [idev] Erasing UDS.KEYID = 0
1,197,971 UART: [idev] Sha1 KeyId Algorithm
1,207,051 UART: [idev] --
1,208,110 UART: [ldev] ++
1,208,278 UART: [ldev] CDI.KEYID = 6
1,208,642 UART: [ldev] SUBJECT.KEYID = 5
1,209,069 UART: [ldev] AUTHORITY.KEYID = 7
1,209,532 UART: [ldev] FE.KEYID = 1
1,214,494 UART: [ldev] Erasing FE.KEYID = 1
1,240,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,226 UART: [ldev] --
1,279,666 UART: [fwproc] Wait for Commands...
1,280,415 UART: [fwproc] Recv command 0x46574c44
1,281,148 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,033 UART: ROM Fatal Error: 0x000B002C
2,604,192 >>> mbox cmd response: failed
2,604,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,198 >>> mbox cmd response: failed
2,604,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,576 UART: [kat] SHA2-512-ACC
906,477 UART: [kat] ECC-384
916,540 UART: [kat] HMAC-384Kdf
921,062 UART: [kat] LMS
1,169,374 UART: [kat] --
1,170,255 UART: [cold-reset] ++
1,170,673 UART: [fht] FHT @ 0x50003400
1,173,337 UART: [idev] ++
1,173,505 UART: [idev] CDI.KEYID = 6
1,173,866 UART: [idev] SUBJECT.KEYID = 7
1,174,291 UART: [idev] UDS.KEYID = 0
1,174,637 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,525 UART: [idev] Erasing UDS.KEYID = 0
1,199,849 UART: [idev] Sha1 KeyId Algorithm
1,208,759 UART: [idev] --
1,209,770 UART: [ldev] ++
1,209,938 UART: [ldev] CDI.KEYID = 6
1,210,302 UART: [ldev] SUBJECT.KEYID = 5
1,210,729 UART: [ldev] AUTHORITY.KEYID = 7
1,211,192 UART: [ldev] FE.KEYID = 1
1,216,234 UART: [ldev] Erasing FE.KEYID = 1
1,242,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,834 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x46574c44
1,282,618 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,958 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,773 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,830 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,456,533 >>> mbox cmd response: failed
2,456,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,539 >>> mbox cmd response: failed
2,456,539 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,262 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Manufacturing
86,360 UART: [state] DebugLocked = No
87,096 UART: [state] WD Timer not started. Device not locked for debugging
88,373 UART: [kat] SHA2-256
891,923 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,052 UART: [kat] ++
896,204 UART: [kat] sha1
900,490 UART: [kat] SHA2-256
902,430 UART: [kat] SHA2-384
905,263 UART: [kat] SHA2-512-ACC
907,164 UART: [kat] ECC-384
916,859 UART: [kat] HMAC-384Kdf
921,671 UART: [kat] LMS
1,169,983 UART: [kat] --
1,170,938 UART: [cold-reset] ++
1,171,420 UART: [fht] FHT @ 0x50003400
1,174,104 UART: [idev] ++
1,174,272 UART: [idev] CDI.KEYID = 6
1,174,633 UART: [idev] SUBJECT.KEYID = 7
1,175,058 UART: [idev] UDS.KEYID = 0
1,175,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,222 UART: [idev] Erasing UDS.KEYID = 0
1,200,208 UART: [idev] Sha1 KeyId Algorithm
1,209,132 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,793 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,217,017 UART: [ldev] Erasing FE.KEYID = 1
1,243,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,069 UART: [ldev] --
1,283,341 UART: [fwproc] Wait for Commands...
1,283,914 UART: [fwproc] Recv command 0x46574c44
1,284,647 UART: [fwproc] Recv'd Img size: 114168 bytes
2,605,770 UART: ROM Fatal Error: 0x000B002C
2,606,929 >>> mbox cmd response: failed
2,606,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,935 >>> mbox cmd response: failed
2,606,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,749 UART: [state] LifecycleState = Unprovisioned
85,404 UART: [state] DebugLocked = No
85,960 UART: [state] WD Timer not started. Device not locked for debugging
87,069 UART: [kat] SHA2-256
890,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,748 UART: [kat] ++
894,900 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
904,073 UART: [kat] SHA2-512-ACC
905,974 UART: [kat] ECC-384
915,557 UART: [kat] HMAC-384Kdf
920,145 UART: [kat] LMS
1,168,457 UART: [kat] --
1,169,522 UART: [cold-reset] ++
1,169,978 UART: [fht] FHT @ 0x50003400
1,172,700 UART: [idev] ++
1,172,868 UART: [idev] CDI.KEYID = 6
1,173,229 UART: [idev] SUBJECT.KEYID = 7
1,173,654 UART: [idev] UDS.KEYID = 0
1,174,000 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,636 UART: [idev] Erasing UDS.KEYID = 0
1,198,402 UART: [idev] Sha1 KeyId Algorithm
1,207,420 UART: [idev] --
1,208,559 UART: [ldev] ++
1,208,727 UART: [ldev] CDI.KEYID = 6
1,209,091 UART: [ldev] SUBJECT.KEYID = 5
1,209,518 UART: [ldev] AUTHORITY.KEYID = 7
1,209,981 UART: [ldev] FE.KEYID = 1
1,214,999 UART: [ldev] Erasing FE.KEYID = 1
1,242,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,447 UART: [fwproc] Wait for Commands...
1,282,178 UART: [fwproc] Recv command 0x46574c44
1,282,911 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,733 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,329 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,458,946 >>> mbox cmd response: failed
2,458,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,952 >>> mbox cmd response: failed
2,458,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,458,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,187 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,569 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
192,290 UART:
192,646 UART: Running Caliptra ROM ...
193,830 UART:
193,982 UART: [state] CFI Enabled
264,668 UART: [state] LifecycleState = Manufacturing
266,631 UART: [state] DebugLocked = No
268,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,309 UART: [kat] SHA2-256
442,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,545 UART: [kat] ++
453,177 UART: [kat] sha1
463,361 UART: [kat] SHA2-256
466,053 UART: [kat] SHA2-384
472,463 UART: [kat] SHA2-512-ACC
474,800 UART: [kat] ECC-384
2,765,765 UART: [kat] HMAC-384Kdf
2,777,425 UART: [kat] LMS
3,967,739 UART: [kat] --
3,973,730 UART: [cold-reset] ++
3,974,831 UART: [fht] Storing FHT @ 0x50003400
3,986,540 UART: [idev] ++
3,987,172 UART: [idev] CDI.KEYID = 6
3,988,082 UART: [idev] SUBJECT.KEYID = 7
3,989,305 UART: [idev] UDS.KEYID = 0
3,992,027 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,414 UART: [idev] Erasing UDS.KEYID = 0
7,322,024 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,813 UART: [idev] --
7,348,650 UART: [ldev] ++
7,349,231 UART: [ldev] CDI.KEYID = 6
7,350,200 UART: [ldev] SUBJECT.KEYID = 5
7,351,362 UART: [ldev] AUTHORITY.KEYID = 7
7,352,653 UART: [ldev] FE.KEYID = 1
7,379,403 UART: [ldev] Erasing FE.KEYID = 1
10,712,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,323 UART: [ldev] --
13,091,295 UART: [fwproc] Waiting for Commands...
13,093,722 UART: [fwproc] Received command 0x46574c44
13,095,967 UART: [fwproc] Received Image of size 113844 bytes
17,182,381 UART: ROM Fatal Error: 0x000B002E
17,185,777 >>> mbox cmd response: failed
17,186,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,186,538 >>> mbox cmd response: failed
17,186,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,187,103 >>> mbox cmd response: failed
Initializing fuses
2,050,833 writing to cptra_bootfsm_go
2,240,112 UART:
2,240,464 UART: Running Caliptra ROM ...
2,241,507 UART:
2,241,662 UART: [state] CFI Enabled
2,310,037 UART: [state] LifecycleState = Manufacturing
2,311,985 UART: [state] DebugLocked = No
2,313,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,057 UART: [kat] SHA2-256
2,488,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,225 UART: [kat] ++
2,499,685 UART: [kat] sha1
2,511,329 UART: [kat] SHA2-256
2,514,070 UART: [kat] SHA2-384
2,519,735 UART: [kat] SHA2-512-ACC
2,522,137 UART: [kat] ECC-384
4,812,372 UART: [kat] HMAC-384Kdf
4,844,425 UART: [kat] LMS
6,034,710 UART: [kat] --
6,038,933 UART: [cold-reset] ++
6,041,514 UART: [fht] Storing FHT @ 0x50003400
6,053,560 UART: [idev] ++
6,054,136 UART: [idev] CDI.KEYID = 6
6,055,020 UART: [idev] SUBJECT.KEYID = 7
6,056,291 UART: [idev] UDS.KEYID = 0
6,059,106 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,202,431 UART: [idev] Erasing UDS.KEYID = 0
9,390,767 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,268 UART: [idev] --
9,416,049 UART: [ldev] ++
9,416,622 UART: [ldev] CDI.KEYID = 6
9,417,640 UART: [ldev] SUBJECT.KEYID = 5
9,418,847 UART: [ldev] AUTHORITY.KEYID = 7
9,420,084 UART: [ldev] FE.KEYID = 1
9,464,039 UART: [ldev] Erasing FE.KEYID = 1
12,797,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,119,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,152,872 UART: [ldev] --
15,157,918 UART: [fwproc] Waiting for Commands...
15,161,149 UART: [fwproc] Received command 0x46574c44
15,163,331 UART: [fwproc] Received Image of size 113844 bytes
19,241,982 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,328,354 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,397,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,712,741 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,780,800 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,162,504 >>> mbox cmd response: failed
17,163,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,163,418 >>> mbox cmd response: failed
17,163,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,163,929 >>> mbox cmd response: failed
Initializing fuses
2,048,314 writing to cptra_bootfsm_go
5,841,016 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,942,410 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,401 UART:
192,763 UART: Running Caliptra ROM ...
193,897 UART:
603,662 UART: [state] CFI Enabled
620,976 UART: [state] LifecycleState = Manufacturing
622,906 UART: [state] DebugLocked = No
624,181 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,542 UART: [kat] SHA2-256
799,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,826 UART: [kat] ++
810,360 UART: [kat] sha1
821,998 UART: [kat] SHA2-256
824,726 UART: [kat] SHA2-384
829,637 UART: [kat] SHA2-512-ACC
831,977 UART: [kat] ECC-384
3,117,030 UART: [kat] HMAC-384Kdf
3,128,403 UART: [kat] LMS
4,318,532 UART: [kat] --
4,324,713 UART: [cold-reset] ++
4,326,107 UART: [fht] Storing FHT @ 0x50003400
4,337,807 UART: [idev] ++
4,338,381 UART: [idev] CDI.KEYID = 6
4,339,321 UART: [idev] SUBJECT.KEYID = 7
4,340,587 UART: [idev] UDS.KEYID = 0
4,343,512 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,487,164 UART: [idev] Erasing UDS.KEYID = 0
7,629,104 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,646 UART: [idev] --
7,656,116 UART: [ldev] ++
7,656,717 UART: [ldev] CDI.KEYID = 6
7,657,643 UART: [ldev] SUBJECT.KEYID = 5
7,658,861 UART: [ldev] AUTHORITY.KEYID = 7
7,660,100 UART: [ldev] FE.KEYID = 1
7,671,720 UART: [ldev] Erasing FE.KEYID = 1
10,962,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,286,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,907 UART: [ldev] --
13,324,673 UART: [fwproc] Waiting for Commands...
13,326,673 UART: [fwproc] Received command 0x46574c44
13,328,863 UART: [fwproc] Received Image of size 113844 bytes
17,406,274 UART: ROM Fatal Error: 0x000B002E
17,409,685 >>> mbox cmd response: failed
17,410,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,410,394 >>> mbox cmd response: failed
17,410,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,410,973 >>> mbox cmd response: failed
Initializing fuses
2,052,207 writing to cptra_bootfsm_go
2,241,536 UART:
2,241,886 UART: Running Caliptra ROM ...
2,243,030 UART:
3,055,965 UART: [state] CFI Enabled
3,070,472 UART: [state] LifecycleState = Manufacturing
3,072,388 UART: [state] DebugLocked = No
3,074,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,078,707 UART: [kat] SHA2-256
3,248,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,259,019 UART: [kat] ++
3,259,528 UART: [kat] sha1
3,269,879 UART: [kat] SHA2-256
3,272,567 UART: [kat] SHA2-384
3,279,104 UART: [kat] SHA2-512-ACC
3,281,464 UART: [kat] ECC-384
5,568,041 UART: [kat] HMAC-384Kdf
5,578,610 UART: [kat] LMS
6,768,748 UART: [kat] --
6,773,078 UART: [cold-reset] ++
6,774,422 UART: [fht] Storing FHT @ 0x50003400
6,785,312 UART: [idev] ++
6,785,918 UART: [idev] CDI.KEYID = 6
6,786,804 UART: [idev] SUBJECT.KEYID = 7
6,788,041 UART: [idev] UDS.KEYID = 0
6,790,812 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,933,771 UART: [idev] Erasing UDS.KEYID = 0
10,079,965 UART: [idev] Using Sha1 for KeyId Algorithm
10,101,506 UART: [idev] --
10,105,065 UART: [ldev] ++
10,105,636 UART: [ldev] CDI.KEYID = 6
10,106,650 UART: [ldev] SUBJECT.KEYID = 5
10,107,846 UART: [ldev] AUTHORITY.KEYID = 7
10,109,077 UART: [ldev] FE.KEYID = 1
10,120,753 UART: [ldev] Erasing FE.KEYID = 1
13,406,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,700,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,714,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,729,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,744,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,762,780 UART: [ldev] --
15,767,136 UART: [fwproc] Waiting for Commands...
15,770,316 UART: [fwproc] Received command 0x46574c44
15,772,502 UART: [fwproc] Received Image of size 113844 bytes
19,856,942 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,926,264 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,995,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,310,825 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,128,462 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,374,980 >>> mbox cmd response: failed
17,375,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,375,955 >>> mbox cmd response: failed
17,376,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,376,562 >>> mbox cmd response: failed
Initializing fuses
2,048,511 writing to cptra_bootfsm_go
6,617,164 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,587,974 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,106 UART:
192,474 UART: Running Caliptra ROM ...
193,681 UART:
193,837 UART: [state] CFI Enabled
263,095 UART: [state] LifecycleState = Manufacturing
264,957 UART: [state] DebugLocked = No
266,879 UART: [state] WD Timer not started. Device not locked for debugging
270,662 UART: [kat] SHA2-256
449,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,359 UART: [kat] ++
461,903 UART: [kat] sha1
472,361 UART: [kat] SHA2-256
475,373 UART: [kat] SHA2-384
482,108 UART: [kat] SHA2-512-ACC
485,040 UART: [kat] ECC-384
2,950,018 UART: [kat] HMAC-384Kdf
2,971,983 UART: [kat] LMS
3,501,397 UART: [kat] --
3,504,981 UART: [cold-reset] ++
3,506,266 UART: [fht] FHT @ 0x50003400
3,515,950 UART: [idev] ++
3,516,557 UART: [idev] CDI.KEYID = 6
3,517,442 UART: [idev] SUBJECT.KEYID = 7
3,518,658 UART: [idev] UDS.KEYID = 0
3,521,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,198 UART: [idev] Erasing UDS.KEYID = 0
6,027,154 UART: [idev] Sha1 KeyId Algorithm
6,049,207 UART: [idev] --
6,052,583 UART: [ldev] ++
6,053,176 UART: [ldev] CDI.KEYID = 6
6,054,100 UART: [ldev] SUBJECT.KEYID = 5
6,055,203 UART: [ldev] AUTHORITY.KEYID = 7
6,056,496 UART: [ldev] FE.KEYID = 1
6,101,449 UART: [ldev] Erasing FE.KEYID = 1
8,602,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,233 UART: [ldev] --
10,396,552 UART: [fwproc] Wait for Commands...
10,398,487 UART: [fwproc] Recv command 0x46574c44
10,400,587 UART: [fwproc] Recv'd Img size: 114168 bytes
13,823,206 UART: ROM Fatal Error: 0x000B002E
13,826,288 >>> mbox cmd response: failed
13,826,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,827,088 >>> mbox cmd response: failed
13,827,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,827,653 >>> mbox cmd response: failed
Initializing fuses
2,059,520 writing to cptra_bootfsm_go
2,248,823 UART:
2,249,177 UART: Running Caliptra ROM ...
2,250,249 UART:
2,250,403 UART: [state] CFI Enabled
2,307,040 UART: [state] LifecycleState = Manufacturing
2,308,926 UART: [state] DebugLocked = No
2,311,130 UART: [state] WD Timer not started. Device not locked for debugging
2,315,528 UART: [kat] SHA2-256
2,494,665 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,506,226 UART: [kat] ++
2,506,768 UART: [kat] sha1
2,518,690 UART: [kat] SHA2-256
2,521,734 UART: [kat] SHA2-384
2,527,838 UART: [kat] SHA2-512-ACC
2,530,784 UART: [kat] ECC-384
4,991,039 UART: [kat] HMAC-384Kdf
5,015,786 UART: [kat] LMS
5,545,221 UART: [kat] --
5,548,852 UART: [cold-reset] ++
5,550,844 UART: [fht] FHT @ 0x50003400
5,561,451 UART: [idev] ++
5,562,026 UART: [idev] CDI.KEYID = 6
5,562,996 UART: [idev] SUBJECT.KEYID = 7
5,564,155 UART: [idev] UDS.KEYID = 0
5,566,793 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,710,534 UART: [idev] Erasing UDS.KEYID = 0
8,069,986 UART: [idev] Sha1 KeyId Algorithm
8,092,893 UART: [idev] --
8,096,857 UART: [ldev] ++
8,097,434 UART: [ldev] CDI.KEYID = 6
8,098,342 UART: [ldev] SUBJECT.KEYID = 5
8,099,564 UART: [ldev] AUTHORITY.KEYID = 7
8,100,804 UART: [ldev] FE.KEYID = 1
8,144,512 UART: [ldev] Erasing FE.KEYID = 1
10,647,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,724 UART: [ldev] --
12,460,054 UART: [fwproc] Wait for Commands...
12,462,656 UART: [fwproc] Recv command 0x46574c44
12,464,753 UART: [fwproc] Recv'd Img size: 114168 bytes
15,897,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,973,545 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,042,309 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,359,190 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,364,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,618,768 >>> mbox cmd response: failed
13,619,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,619,622 >>> mbox cmd response: failed
13,619,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,620,207 >>> mbox cmd response: failed
Initializing fuses
2,050,040 writing to cptra_bootfsm_go
5,406,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,097,206 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,674 UART:
193,031 UART: Running Caliptra ROM ...
194,224 UART:
603,719 UART: [state] CFI Enabled
618,541 UART: [state] LifecycleState = Manufacturing
620,419 UART: [state] DebugLocked = No
623,222 UART: [state] WD Timer not started. Device not locked for debugging
626,983 UART: [kat] SHA2-256
806,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,703 UART: [kat] ++
818,149 UART: [kat] sha1
829,132 UART: [kat] SHA2-256
832,136 UART: [kat] SHA2-384
837,953 UART: [kat] SHA2-512-ACC
840,938 UART: [kat] ECC-384
3,282,033 UART: [kat] HMAC-384Kdf
3,294,970 UART: [kat] LMS
3,824,483 UART: [kat] --
3,828,422 UART: [cold-reset] ++
3,829,668 UART: [fht] FHT @ 0x50003400
3,839,785 UART: [idev] ++
3,840,394 UART: [idev] CDI.KEYID = 6
3,841,318 UART: [idev] SUBJECT.KEYID = 7
3,842,479 UART: [idev] UDS.KEYID = 0
3,845,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,679 UART: [idev] Erasing UDS.KEYID = 0
6,318,053 UART: [idev] Sha1 KeyId Algorithm
6,340,692 UART: [idev] --
6,344,340 UART: [ldev] ++
6,344,962 UART: [ldev] CDI.KEYID = 6
6,345,853 UART: [ldev] SUBJECT.KEYID = 5
6,347,013 UART: [ldev] AUTHORITY.KEYID = 7
6,348,294 UART: [ldev] FE.KEYID = 1
6,359,518 UART: [ldev] Erasing FE.KEYID = 1
8,830,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,283 UART: [ldev] --
10,620,013 UART: [fwproc] Wait for Commands...
10,621,845 UART: [fwproc] Recv command 0x46574c44
10,623,941 UART: [fwproc] Recv'd Img size: 114168 bytes
14,062,327 UART: ROM Fatal Error: 0x000B002E
14,065,454 >>> mbox cmd response: failed
14,065,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,066,146 >>> mbox cmd response: failed
14,066,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,066,712 >>> mbox cmd response: failed
Initializing fuses
2,054,097 writing to cptra_bootfsm_go
2,243,419 UART:
2,243,757 UART: Running Caliptra ROM ...
2,244,890 UART:
6,395,485 UART: [state] CFI Enabled
6,411,103 UART: [state] LifecycleState = Manufacturing
6,412,988 UART: [state] DebugLocked = No
6,415,751 UART: [state] WD Timer not started. Device not locked for debugging
6,418,738 UART: [kat] SHA2-256
6,597,854 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,609,433 UART: [kat] ++
6,609,893 UART: [kat] sha1
6,621,209 UART: [kat] SHA2-256
6,624,223 UART: [kat] SHA2-384
6,630,658 UART: [kat] SHA2-512-ACC
6,633,601 UART: [kat] ECC-384
9,073,946 UART: [kat] HMAC-384Kdf
9,085,582 UART: [kat] LMS
9,615,076 UART: [kat] --
9,618,256 UART: [cold-reset] ++
9,619,266 UART: [fht] FHT @ 0x50003400
9,629,487 UART: [idev] ++
9,630,051 UART: [idev] CDI.KEYID = 6
9,630,961 UART: [idev] SUBJECT.KEYID = 7
9,632,175 UART: [idev] UDS.KEYID = 0
9,634,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,778,842 UART: [idev] Erasing UDS.KEYID = 0
12,102,263 UART: [idev] Sha1 KeyId Algorithm
12,125,332 UART: [idev] --
12,130,619 UART: [ldev] ++
12,131,208 UART: [ldev] CDI.KEYID = 6
12,132,113 UART: [ldev] SUBJECT.KEYID = 5
12,133,328 UART: [ldev] AUTHORITY.KEYID = 7
12,134,559 UART: [ldev] FE.KEYID = 1
12,143,958 UART: [ldev] Erasing FE.KEYID = 1
14,623,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,341,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,357,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,373,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,389,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,408,212 UART: [ldev] --
16,412,981 UART: [fwproc] Wait for Commands...
16,415,739 UART: [fwproc] Recv command 0x46574c44
16,417,784 UART: [fwproc] Recv'd Img size: 114168 bytes
19,849,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,921,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
19,990,454 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,307,587 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,692,656 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,845,469 >>> mbox cmd response: failed
13,846,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,846,383 >>> mbox cmd response: failed
13,846,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,846,940 >>> mbox cmd response: failed
Initializing fuses
2,050,802 writing to cptra_bootfsm_go
9,714,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,314,422 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,227 UART:
192,583 UART: Running Caliptra ROM ...
193,767 UART:
193,919 UART: [state] CFI Enabled
261,628 UART: [state] LifecycleState = Manufacturing
264,017 UART: [state] DebugLocked = No
265,347 UART: [state] WD Timer not started. Device not locked for debugging
269,134 UART: [kat] SHA2-256
458,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,765 UART: [kat] ++
470,232 UART: [kat] sha1
482,142 UART: [kat] SHA2-256
485,153 UART: [kat] SHA2-384
490,272 UART: [kat] SHA2-512-ACC
492,837 UART: [kat] ECC-384
2,950,409 UART: [kat] HMAC-384Kdf
2,973,352 UART: [kat] LMS
3,505,121 UART: [kat] --
3,509,287 UART: [cold-reset] ++
3,511,061 UART: [fht] FHT @ 0x50003400
3,521,505 UART: [idev] ++
3,522,183 UART: [idev] CDI.KEYID = 6
3,523,199 UART: [idev] SUBJECT.KEYID = 7
3,524,362 UART: [idev] UDS.KEYID = 0
3,527,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,924 UART: [idev] Erasing UDS.KEYID = 0
6,029,340 UART: [idev] Sha1 KeyId Algorithm
6,053,211 UART: [idev] --
6,058,591 UART: [ldev] ++
6,059,284 UART: [ldev] CDI.KEYID = 6
6,060,170 UART: [ldev] SUBJECT.KEYID = 5
6,061,384 UART: [ldev] AUTHORITY.KEYID = 7
6,062,619 UART: [ldev] FE.KEYID = 1
6,102,676 UART: [ldev] Erasing FE.KEYID = 1
8,606,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,190 UART: [ldev] --
10,414,762 UART: [fwproc] Wait for Commands...
10,417,021 UART: [fwproc] Recv command 0x46574c44
10,419,363 UART: [fwproc] Recv'd Img size: 114168 bytes
13,900,975 UART: ROM Fatal Error: 0x000B002E
13,904,604 >>> mbox cmd response: failed
13,905,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,905,363 >>> mbox cmd response: failed
13,905,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,905,927 >>> mbox cmd response: failed
Initializing fuses
2,053,044 writing to cptra_bootfsm_go
2,242,365 UART:
2,242,712 UART: Running Caliptra ROM ...
2,243,798 UART:
2,243,959 UART: [state] CFI Enabled
2,315,440 UART: [state] LifecycleState = Manufacturing
2,317,819 UART: [state] DebugLocked = No
2,318,998 UART: [state] WD Timer not started. Device not locked for debugging
2,323,448 UART: [kat] SHA2-256
2,513,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,087 UART: [kat] ++
2,524,578 UART: [kat] sha1
2,537,737 UART: [kat] SHA2-256
2,540,793 UART: [kat] SHA2-384
2,547,068 UART: [kat] SHA2-512-ACC
2,549,655 UART: [kat] ECC-384
4,998,863 UART: [kat] HMAC-384Kdf
5,021,674 UART: [kat] LMS
5,553,423 UART: [kat] --
5,559,514 UART: [cold-reset] ++
5,561,770 UART: [fht] FHT @ 0x50003400
5,573,953 UART: [idev] ++
5,574,664 UART: [idev] CDI.KEYID = 6
5,575,635 UART: [idev] SUBJECT.KEYID = 7
5,576,849 UART: [idev] UDS.KEYID = 0
5,579,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,723,337 UART: [idev] Erasing UDS.KEYID = 0
8,099,918 UART: [idev] Sha1 KeyId Algorithm
8,121,215 UART: [idev] --
8,125,799 UART: [ldev] ++
8,126,476 UART: [ldev] CDI.KEYID = 6
8,127,387 UART: [ldev] SUBJECT.KEYID = 5
8,128,546 UART: [ldev] AUTHORITY.KEYID = 7
8,129,937 UART: [ldev] FE.KEYID = 1
8,170,736 UART: [ldev] Erasing FE.KEYID = 1
10,675,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,413,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,428,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,443,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,458,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,480,544 UART: [ldev] --
12,486,779 UART: [fwproc] Wait for Commands...
12,488,556 UART: [fwproc] Recv command 0x46574c44
12,490,825 UART: [fwproc] Recv'd Img size: 114168 bytes
15,967,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,045,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,161,261 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,702,425 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,439,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,312,334 >>> mbox cmd response: failed
14,313,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,313,445 >>> mbox cmd response: failed
14,313,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,314,015 >>> mbox cmd response: failed
Initializing fuses
2,053,427 writing to cptra_bootfsm_go
5,488,680 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,815,880 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,537 UART:
192,896 UART: Running Caliptra ROM ...
194,040 UART:
603,636 UART: [state] CFI Enabled
615,454 UART: [state] LifecycleState = Manufacturing
617,865 UART: [state] DebugLocked = No
619,467 UART: [state] WD Timer not started. Device not locked for debugging
623,907 UART: [kat] SHA2-256
813,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,592 UART: [kat] ++
825,140 UART: [kat] sha1
835,967 UART: [kat] SHA2-256
839,031 UART: [kat] SHA2-384
844,260 UART: [kat] SHA2-512-ACC
846,873 UART: [kat] ECC-384
3,285,722 UART: [kat] HMAC-384Kdf
3,298,615 UART: [kat] LMS
3,830,438 UART: [kat] --
3,836,324 UART: [cold-reset] ++
3,838,583 UART: [fht] FHT @ 0x50003400
3,849,267 UART: [idev] ++
3,849,956 UART: [idev] CDI.KEYID = 6
3,850,869 UART: [idev] SUBJECT.KEYID = 7
3,852,087 UART: [idev] UDS.KEYID = 0
3,854,793 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,358 UART: [idev] Erasing UDS.KEYID = 0
6,327,312 UART: [idev] Sha1 KeyId Algorithm
6,349,769 UART: [idev] --
6,355,008 UART: [ldev] ++
6,355,698 UART: [ldev] CDI.KEYID = 6
6,356,610 UART: [ldev] SUBJECT.KEYID = 5
6,357,775 UART: [ldev] AUTHORITY.KEYID = 7
6,359,006 UART: [ldev] FE.KEYID = 1
6,368,089 UART: [ldev] Erasing FE.KEYID = 1
8,845,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,850 UART: [ldev] --
10,634,427 UART: [fwproc] Wait for Commands...
10,635,877 UART: [fwproc] Recv command 0x46574c44
10,638,200 UART: [fwproc] Recv'd Img size: 114168 bytes
14,121,129 UART: ROM Fatal Error: 0x000B002E
14,124,805 >>> mbox cmd response: failed
14,125,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,125,436 >>> mbox cmd response: failed
14,125,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,126,039 >>> mbox cmd response: failed
Initializing fuses
2,056,521 writing to cptra_bootfsm_go
2,245,802 UART:
2,246,141 UART: Running Caliptra ROM ...
2,247,186 UART:
6,328,480 UART: [state] CFI Enabled
6,342,417 UART: [state] LifecycleState = Manufacturing
6,344,773 UART: [state] DebugLocked = No
6,346,003 UART: [state] WD Timer not started. Device not locked for debugging
6,350,529 UART: [kat] SHA2-256
6,540,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,551,214 UART: [kat] ++
6,551,758 UART: [kat] sha1
6,562,545 UART: [kat] SHA2-256
6,565,562 UART: [kat] SHA2-384
6,571,924 UART: [kat] SHA2-512-ACC
6,574,521 UART: [kat] ECC-384
9,016,292 UART: [kat] HMAC-384Kdf
9,030,414 UART: [kat] LMS
9,562,240 UART: [kat] --
9,566,446 UART: [cold-reset] ++
9,567,891 UART: [fht] FHT @ 0x50003400
9,579,842 UART: [idev] ++
9,580,571 UART: [idev] CDI.KEYID = 6
9,581,535 UART: [idev] SUBJECT.KEYID = 7
9,582,633 UART: [idev] UDS.KEYID = 0
9,585,278 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
9,728,763 UART: [idev] Erasing UDS.KEYID = 0
12,056,056 UART: [idev] Sha1 KeyId Algorithm
12,077,948 UART: [idev] --
12,083,345 UART: [ldev] ++
12,084,028 UART: [ldev] CDI.KEYID = 6
12,085,143 UART: [ldev] SUBJECT.KEYID = 5
12,086,273 UART: [ldev] AUTHORITY.KEYID = 7
12,087,459 UART: [ldev] FE.KEYID = 1
12,097,655 UART: [ldev] Erasing FE.KEYID = 1
14,573,503 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,292,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,307,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,322,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,337,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,358,568 UART: [ldev] --
16,364,112 UART: [fwproc] Wait for Commands...
16,366,104 UART: [fwproc] Recv command 0x46574c44
16,368,369 UART: [fwproc] Recv'd Img size: 114168 bytes
19,846,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,926,393 UART: [fwproc] Load FMC at address 0x40000000 len 18800
20,042,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
20,584,089 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,063 writing to cptra_bootfsm_go
3,755,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,540,747 >>> mbox cmd response: failed
14,541,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,541,712 >>> mbox cmd response: failed
14,541,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,542,288 >>> mbox cmd response: failed
Initializing fuses
2,048,789 writing to cptra_bootfsm_go
9,082,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,320,541 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Manufacturing
85,805 UART: [state] DebugLocked = No
86,325 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
895,024 UART: [kat] SHA2-512-ACC
896,925 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
906,914 UART: [kat] LMS
1,475,110 UART: [kat] --
1,475,921 UART: [cold-reset] ++
1,476,269 UART: [fht] Storing FHT @ 0x50003400
1,479,002 UART: [idev] ++
1,479,170 UART: [idev] CDI.KEYID = 6
1,479,530 UART: [idev] SUBJECT.KEYID = 7
1,479,954 UART: [idev] UDS.KEYID = 0
1,480,299 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,112 UART: [idev] Erasing UDS.KEYID = 0
1,504,868 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,618 UART: [idev] --
1,514,753 UART: [ldev] ++
1,514,921 UART: [ldev] CDI.KEYID = 6
1,515,284 UART: [ldev] SUBJECT.KEYID = 5
1,515,710 UART: [ldev] AUTHORITY.KEYID = 7
1,516,173 UART: [ldev] FE.KEYID = 1
1,521,245 UART: [ldev] Erasing FE.KEYID = 1
1,546,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,702 UART: [ldev] --
1,586,061 UART: [fwproc] Waiting for Commands...
1,586,886 UART: [fwproc] Received command 0x46574c44
1,587,677 UART: [fwproc] Received Image of size 114168 bytes
2,908,759 UART: ROM Fatal Error: 0x000B002E
2,909,918 >>> mbox cmd response: failed
2,909,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,909,924 >>> mbox cmd response: failed
2,909,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,909,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,130 UART: [kat] SHA2-512-ACC
897,031 UART: [kat] ECC-384
902,618 UART: [kat] HMAC-384Kdf
907,310 UART: [kat] LMS
1,475,506 UART: [kat] --
1,476,517 UART: [cold-reset] ++
1,476,939 UART: [fht] Storing FHT @ 0x50003400
1,479,504 UART: [idev] ++
1,479,672 UART: [idev] CDI.KEYID = 6
1,480,032 UART: [idev] SUBJECT.KEYID = 7
1,480,456 UART: [idev] UDS.KEYID = 0
1,480,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,386 UART: [idev] Erasing UDS.KEYID = 0
1,505,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,330 UART: [idev] --
1,515,561 UART: [ldev] ++
1,515,729 UART: [ldev] CDI.KEYID = 6
1,516,092 UART: [ldev] SUBJECT.KEYID = 5
1,516,518 UART: [ldev] AUTHORITY.KEYID = 7
1,516,981 UART: [ldev] FE.KEYID = 1
1,522,261 UART: [ldev] Erasing FE.KEYID = 1
1,547,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,596 UART: [ldev] --
1,586,953 UART: [fwproc] Waiting for Commands...
1,587,588 UART: [fwproc] Received command 0x46574c44
1,588,379 UART: [fwproc] Received Image of size 114168 bytes
2,885,022 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,100 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,452 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,189 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,761,545 >>> mbox cmd response: failed
2,761,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,761,551 >>> mbox cmd response: failed
2,761,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,761,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,739 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Manufacturing
85,740 UART: [state] DebugLocked = No
86,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,976 UART: [kat] SHA2-256
881,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,022 UART: [kat] ++
886,174 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,735 UART: [kat] HMAC-384Kdf
907,349 UART: [kat] LMS
1,475,545 UART: [kat] --
1,476,370 UART: [cold-reset] ++
1,476,822 UART: [fht] Storing FHT @ 0x50003400
1,479,501 UART: [idev] ++
1,479,669 UART: [idev] CDI.KEYID = 6
1,480,029 UART: [idev] SUBJECT.KEYID = 7
1,480,453 UART: [idev] UDS.KEYID = 0
1,480,798 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,135 UART: [idev] Erasing UDS.KEYID = 0
1,504,737 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,493 UART: [idev] --
1,514,516 UART: [ldev] ++
1,514,684 UART: [ldev] CDI.KEYID = 6
1,515,047 UART: [ldev] SUBJECT.KEYID = 5
1,515,473 UART: [ldev] AUTHORITY.KEYID = 7
1,515,936 UART: [ldev] FE.KEYID = 1
1,521,398 UART: [ldev] Erasing FE.KEYID = 1
1,546,889 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,673 UART: [ldev] --
1,586,078 UART: [fwproc] Waiting for Commands...
1,586,919 UART: [fwproc] Received command 0x46574c44
1,587,710 UART: [fwproc] Received Image of size 114168 bytes
2,908,074 UART: ROM Fatal Error: 0x000B002E
2,909,233 >>> mbox cmd response: failed
2,909,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,909,239 >>> mbox cmd response: failed
2,909,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,909,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,620 UART: [kat] SHA2-256
892,558 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
902,737 UART: [kat] HMAC-384Kdf
907,261 UART: [kat] LMS
1,475,457 UART: [kat] --
1,476,096 UART: [cold-reset] ++
1,476,426 UART: [fht] Storing FHT @ 0x50003400
1,479,247 UART: [idev] ++
1,479,415 UART: [idev] CDI.KEYID = 6
1,479,775 UART: [idev] SUBJECT.KEYID = 7
1,480,199 UART: [idev] UDS.KEYID = 0
1,480,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,227 UART: [idev] Erasing UDS.KEYID = 0
1,504,955 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,589 UART: [idev] --
1,514,626 UART: [ldev] ++
1,514,794 UART: [ldev] CDI.KEYID = 6
1,515,157 UART: [ldev] SUBJECT.KEYID = 5
1,515,583 UART: [ldev] AUTHORITY.KEYID = 7
1,516,046 UART: [ldev] FE.KEYID = 1
1,521,542 UART: [ldev] Erasing FE.KEYID = 1
1,547,431 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,793 UART: [ldev] --
1,587,164 UART: [fwproc] Waiting for Commands...
1,587,995 UART: [fwproc] Received command 0x46574c44
1,588,786 UART: [fwproc] Received Image of size 114168 bytes
2,884,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,295 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,332 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,764,376 >>> mbox cmd response: failed
2,764,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,382 >>> mbox cmd response: failed
2,764,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,972 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,346 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Manufacturing
85,859 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,342 UART: [kat] SHA2-512-ACC
908,243 UART: [kat] ECC-384
917,556 UART: [kat] HMAC-384Kdf
922,066 UART: [kat] LMS
1,170,394 UART: [kat] --
1,171,519 UART: [cold-reset] ++
1,171,933 UART: [fht] FHT @ 0x50003400
1,174,548 UART: [idev] ++
1,174,716 UART: [idev] CDI.KEYID = 6
1,175,076 UART: [idev] SUBJECT.KEYID = 7
1,175,500 UART: [idev] UDS.KEYID = 0
1,175,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,666 UART: [idev] Erasing UDS.KEYID = 0
1,200,415 UART: [idev] Sha1 KeyId Algorithm
1,208,991 UART: [idev] --
1,210,255 UART: [ldev] ++
1,210,423 UART: [ldev] CDI.KEYID = 6
1,210,786 UART: [ldev] SUBJECT.KEYID = 5
1,211,212 UART: [ldev] AUTHORITY.KEYID = 7
1,211,675 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,243,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,287 UART: [ldev] --
1,282,610 UART: [fwproc] Wait for Commands...
1,283,266 UART: [fwproc] Recv command 0x46574c44
1,283,994 UART: [fwproc] Recv'd Img size: 114168 bytes
2,605,384 UART: ROM Fatal Error: 0x000B002E
2,606,543 >>> mbox cmd response: failed
2,606,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,549 >>> mbox cmd response: failed
2,606,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
902,139 UART: [kat] SHA2-256
904,079 UART: [kat] SHA2-384
906,778 UART: [kat] SHA2-512-ACC
908,679 UART: [kat] ECC-384
918,084 UART: [kat] HMAC-384Kdf
922,628 UART: [kat] LMS
1,170,956 UART: [kat] --
1,171,581 UART: [cold-reset] ++
1,171,991 UART: [fht] FHT @ 0x50003400
1,174,670 UART: [idev] ++
1,174,838 UART: [idev] CDI.KEYID = 6
1,175,198 UART: [idev] SUBJECT.KEYID = 7
1,175,622 UART: [idev] UDS.KEYID = 0
1,175,967 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,420 UART: [idev] Erasing UDS.KEYID = 0
1,200,231 UART: [idev] Sha1 KeyId Algorithm
1,208,611 UART: [idev] --
1,209,719 UART: [ldev] ++
1,209,887 UART: [ldev] CDI.KEYID = 6
1,210,250 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,205 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,301 UART: [ldev] --
1,281,716 UART: [fwproc] Wait for Commands...
1,282,448 UART: [fwproc] Recv command 0x46574c44
1,283,176 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,383 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,328 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,460,492 >>> mbox cmd response: failed
2,460,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,498 >>> mbox cmd response: failed
2,460,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,460,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,411 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,323 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Manufacturing
85,906 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
893,471 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,596 UART: [kat] ++
897,748 UART: [kat] sha1
902,142 UART: [kat] SHA2-256
904,082 UART: [kat] SHA2-384
906,723 UART: [kat] SHA2-512-ACC
908,624 UART: [kat] ECC-384
918,179 UART: [kat] HMAC-384Kdf
922,875 UART: [kat] LMS
1,171,203 UART: [kat] --
1,172,130 UART: [cold-reset] ++
1,172,668 UART: [fht] FHT @ 0x50003400
1,175,155 UART: [idev] ++
1,175,323 UART: [idev] CDI.KEYID = 6
1,175,683 UART: [idev] SUBJECT.KEYID = 7
1,176,107 UART: [idev] UDS.KEYID = 0
1,176,452 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,261 UART: [idev] Erasing UDS.KEYID = 0
1,201,248 UART: [idev] Sha1 KeyId Algorithm
1,209,718 UART: [idev] --
1,210,758 UART: [ldev] ++
1,210,926 UART: [ldev] CDI.KEYID = 6
1,211,289 UART: [ldev] SUBJECT.KEYID = 5
1,211,715 UART: [ldev] AUTHORITY.KEYID = 7
1,212,178 UART: [ldev] FE.KEYID = 1
1,217,692 UART: [ldev] Erasing FE.KEYID = 1
1,243,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,598 UART: [ldev] --
1,282,937 UART: [fwproc] Wait for Commands...
1,283,689 UART: [fwproc] Recv command 0x46574c44
1,284,417 UART: [fwproc] Recv'd Img size: 114168 bytes
2,605,113 UART: ROM Fatal Error: 0x000B002E
2,606,272 >>> mbox cmd response: failed
2,606,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,278 >>> mbox cmd response: failed
2,606,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,606,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
893,649 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,774 UART: [kat] ++
897,926 UART: [kat] sha1
902,272 UART: [kat] SHA2-256
904,212 UART: [kat] SHA2-384
907,029 UART: [kat] SHA2-512-ACC
908,930 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,403 UART: [idev] ++
1,175,571 UART: [idev] CDI.KEYID = 6
1,175,931 UART: [idev] SUBJECT.KEYID = 7
1,176,355 UART: [idev] UDS.KEYID = 0
1,176,700 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,403 UART: [idev] Erasing UDS.KEYID = 0
1,201,566 UART: [idev] Sha1 KeyId Algorithm
1,209,882 UART: [idev] --
1,210,998 UART: [ldev] ++
1,211,166 UART: [ldev] CDI.KEYID = 6
1,211,529 UART: [ldev] SUBJECT.KEYID = 5
1,211,955 UART: [ldev] AUTHORITY.KEYID = 7
1,212,418 UART: [ldev] FE.KEYID = 1
1,217,794 UART: [ldev] Erasing FE.KEYID = 1
1,244,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,966 UART: [ldev] --
1,283,465 UART: [fwproc] Wait for Commands...
1,284,269 UART: [fwproc] Recv command 0x46574c44
1,284,997 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,664 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,968 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,529 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,874 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,461,987 >>> mbox cmd response: failed
2,461,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,993 >>> mbox cmd response: failed
2,461,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,461,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,346 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Manufacturing
85,721 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,950 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,253 UART: [idev] Sha1 KeyId Algorithm
1,207,199 UART: [idev] --
1,208,406 UART: [ldev] ++
1,208,574 UART: [ldev] CDI.KEYID = 6
1,208,938 UART: [ldev] SUBJECT.KEYID = 5
1,209,365 UART: [ldev] AUTHORITY.KEYID = 7
1,209,828 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,241,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,364 UART: [ldev] --
1,280,864 UART: [fwproc] Wait for Commands...
1,281,553 UART: [fwproc] Recv command 0x46574c44
1,282,286 UART: [fwproc] Recv'd Img size: 114168 bytes
2,602,549 UART: ROM Fatal Error: 0x000B002E
2,603,708 >>> mbox cmd response: failed
2,603,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,714 >>> mbox cmd response: failed
2,603,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,603,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,944 UART: [kat] SHA2-256
891,494 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,623 UART: [kat] ++
895,775 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,208 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,407 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,035 UART: [idev] Erasing UDS.KEYID = 0
1,198,657 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,548 UART: [ldev] ++
1,208,716 UART: [ldev] CDI.KEYID = 6
1,209,080 UART: [ldev] SUBJECT.KEYID = 5
1,209,507 UART: [ldev] AUTHORITY.KEYID = 7
1,209,970 UART: [ldev] FE.KEYID = 1
1,215,342 UART: [ldev] Erasing FE.KEYID = 1
1,242,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,994 UART: [ldev] --
1,281,276 UART: [fwproc] Wait for Commands...
1,282,021 UART: [fwproc] Recv command 0x46574c44
1,282,754 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,967 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,756 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,456,683 >>> mbox cmd response: failed
2,456,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,689 >>> mbox cmd response: failed
2,456,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,246 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,764 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Manufacturing
86,180 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,173 UART: [kat] SHA2-256
891,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,310 UART: [kat] SHA2-256
902,250 UART: [kat] SHA2-384
905,009 UART: [kat] SHA2-512-ACC
906,910 UART: [kat] ECC-384
916,793 UART: [kat] HMAC-384Kdf
921,463 UART: [kat] LMS
1,169,775 UART: [kat] --
1,170,608 UART: [cold-reset] ++
1,171,054 UART: [fht] FHT @ 0x50003400
1,173,816 UART: [idev] ++
1,173,984 UART: [idev] CDI.KEYID = 6
1,174,345 UART: [idev] SUBJECT.KEYID = 7
1,174,770 UART: [idev] UDS.KEYID = 0
1,175,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,209,084 UART: [idev] --
1,210,119 UART: [ldev] ++
1,210,287 UART: [ldev] CDI.KEYID = 6
1,210,651 UART: [ldev] SUBJECT.KEYID = 5
1,211,078 UART: [ldev] AUTHORITY.KEYID = 7
1,211,541 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,261 UART: [fwproc] Wait for Commands...
1,283,012 UART: [fwproc] Recv command 0x46574c44
1,283,745 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,210 UART: ROM Fatal Error: 0x000B002E
2,604,369 >>> mbox cmd response: failed
2,604,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,375 >>> mbox cmd response: failed
2,604,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,604,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,674 UART: [kat] ++
895,826 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,699 UART: [kat] SHA2-512-ACC
906,600 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,045 UART: [kat] LMS
1,169,357 UART: [kat] --
1,170,408 UART: [cold-reset] ++
1,170,856 UART: [fht] FHT @ 0x50003400
1,173,524 UART: [idev] ++
1,173,692 UART: [idev] CDI.KEYID = 6
1,174,053 UART: [idev] SUBJECT.KEYID = 7
1,174,478 UART: [idev] UDS.KEYID = 0
1,174,824 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,791 UART: [ldev] ++
1,209,959 UART: [ldev] CDI.KEYID = 6
1,210,323 UART: [ldev] SUBJECT.KEYID = 5
1,210,750 UART: [ldev] AUTHORITY.KEYID = 7
1,211,213 UART: [ldev] FE.KEYID = 1
1,216,651 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,975 UART: [ldev] --
1,282,253 UART: [fwproc] Wait for Commands...
1,282,980 UART: [fwproc] Recv command 0x46574c44
1,283,713 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,313 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,977 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,456,954 >>> mbox cmd response: failed
2,456,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,960 >>> mbox cmd response: failed
2,456,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,456,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,865 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
4,869,991 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,617,200 >>> mbox cmd response: failed
16,617,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,618,230 >>> mbox cmd response: failed
16,618,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,618,801 >>> mbox cmd response: failed
Initializing fuses
2,055,469 writing to cptra_bootfsm_go
6,916,279 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,495,844 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
4,879,432 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,632,961 >>> mbox cmd response: failed
16,633,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,633,909 >>> mbox cmd response: failed
16,634,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,634,484 >>> mbox cmd response: failed
Initializing fuses
2,056,147 writing to cptra_bootfsm_go
6,929,944 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,513,937 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
5,194,856 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,805,699 >>> mbox cmd response: failed
16,806,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,806,719 >>> mbox cmd response: failed
16,806,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,807,297 >>> mbox cmd response: failed
Initializing fuses
2,056,576 writing to cptra_bootfsm_go
8,245,873 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,691,760 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
5,186,825 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,797,236 >>> mbox cmd response: failed
16,797,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,798,197 >>> mbox cmd response: failed
16,798,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,798,757 >>> mbox cmd response: failed
Initializing fuses
2,062,233 writing to cptra_bootfsm_go
8,251,156 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,677,773 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,459,875 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,398,336 >>> mbox cmd response: failed
12,398,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,399,314 >>> mbox cmd response: failed
12,399,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,399,881 >>> mbox cmd response: failed
Initializing fuses
2,056,949 writing to cptra_bootfsm_go
5,497,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,299,651 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,465,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,438,672 >>> mbox cmd response: failed
12,439,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,439,592 >>> mbox cmd response: failed
12,439,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,440,154 >>> mbox cmd response: failed
Initializing fuses
2,053,811 writing to cptra_bootfsm_go
5,522,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,350,183 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,782,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,642,117 >>> mbox cmd response: failed
12,642,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,642,998 >>> mbox cmd response: failed
12,643,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,643,569 >>> mbox cmd response: failed
Initializing fuses
2,052,870 writing to cptra_bootfsm_go
11,011,470 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,718,205 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,791,651 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,643,742 >>> mbox cmd response: failed
12,644,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,644,712 >>> mbox cmd response: failed
12,644,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,645,270 >>> mbox cmd response: failed
Initializing fuses
2,060,253 writing to cptra_bootfsm_go
11,008,551 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,720,101 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,488,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,483,497 >>> mbox cmd response: failed
12,484,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,484,639 >>> mbox cmd response: failed
12,484,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,485,205 >>> mbox cmd response: failed
Initializing fuses
2,057,130 writing to cptra_bootfsm_go
5,541,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,387,751 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,437,488 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,383,707 >>> mbox cmd response: failed
12,384,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,384,633 >>> mbox cmd response: failed
12,384,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,385,260 >>> mbox cmd response: failed
Initializing fuses
2,056,987 writing to cptra_bootfsm_go
5,488,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,319,731 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,782,723 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,634,634 >>> mbox cmd response: failed
12,635,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,635,618 >>> mbox cmd response: failed
12,635,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,636,190 >>> mbox cmd response: failed
Initializing fuses
2,062,632 writing to cptra_bootfsm_go
11,022,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,721,598 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
3,792,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,623,913 >>> mbox cmd response: failed
12,624,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,625,106 >>> mbox cmd response: failed
12,625,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,625,667 >>> mbox cmd response: failed
Initializing fuses
2,062,778 writing to cptra_bootfsm_go
11,030,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,725,232 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,889 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,202,227 >>> mbox cmd response: failed
1,202,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,233 >>> mbox cmd response: failed
1,202,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,239 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,047 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,751 UART: [kat] SHA2-256
881,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,797 UART: [kat] ++
885,949 UART: [kat] sha1
890,053 UART: [kat] SHA2-256
891,991 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,152 UART: [kat] HMAC-384Kdf
906,710 UART: [kat] LMS
1,474,906 UART: [kat] --
1,475,767 UART: [cold-reset] ++
1,476,241 UART: [fht] Storing FHT @ 0x50003400
1,478,810 UART: [idev] ++
1,478,978 UART: [idev] CDI.KEYID = 6
1,479,338 UART: [idev] SUBJECT.KEYID = 7
1,479,762 UART: [idev] UDS.KEYID = 0
1,480,107 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,852 UART: [idev] Erasing UDS.KEYID = 0
1,504,748 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,434 UART: [idev] --
1,514,365 UART: [ldev] ++
1,514,533 UART: [ldev] CDI.KEYID = 6
1,514,896 UART: [ldev] SUBJECT.KEYID = 5
1,515,322 UART: [ldev] AUTHORITY.KEYID = 7
1,515,785 UART: [ldev] FE.KEYID = 1
1,520,695 UART: [ldev] Erasing FE.KEYID = 1
1,546,152 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,966 UART: [ldev] --
1,585,465 UART: [fwproc] Waiting for Commands...
1,586,166 UART: [fwproc] Received command 0x46574c44
1,586,957 UART: [fwproc] Received Image of size 114168 bytes
2,882,534 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,114 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,981 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,201,367 >>> mbox cmd response: failed
1,201,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,373 >>> mbox cmd response: failed
1,201,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,959 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,869 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,205,028 >>> mbox cmd response: failed
1,205,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,034 >>> mbox cmd response: failed
1,205,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,910 UART: [kat] SHA2-256
892,848 UART: [kat] SHA2-384
895,597 UART: [kat] SHA2-512-ACC
897,498 UART: [kat] ECC-384
903,159 UART: [kat] HMAC-384Kdf
907,973 UART: [kat] LMS
1,476,169 UART: [kat] --
1,477,036 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,173 UART: [idev] Erasing UDS.KEYID = 0
1,506,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,823 UART: [idev] --
1,515,630 UART: [ldev] ++
1,515,798 UART: [ldev] CDI.KEYID = 6
1,516,161 UART: [ldev] SUBJECT.KEYID = 5
1,516,587 UART: [ldev] AUTHORITY.KEYID = 7
1,517,050 UART: [ldev] FE.KEYID = 1
1,522,628 UART: [ldev] Erasing FE.KEYID = 1
1,548,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,615 UART: [ldev] --
1,588,022 UART: [fwproc] Waiting for Commands...
1,588,667 UART: [fwproc] Received command 0x46574c44
1,589,458 UART: [fwproc] Received Image of size 114168 bytes
2,885,153 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,309 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,278 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,656 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,204,420 >>> mbox cmd response: failed
1,204,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,426 >>> mbox cmd response: failed
1,204,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,476 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,476 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,203,557 >>> mbox cmd response: failed
1,203,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,563 >>> mbox cmd response: failed
1,203,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,638 UART: [state] LifecycleState = Unprovisioned
86,293 UART: [state] DebugLocked = No
86,937 UART: [state] WD Timer not started. Device not locked for debugging
88,174 UART: [kat] SHA2-256
893,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,949 UART: [kat] ++
898,101 UART: [kat] sha1
902,385 UART: [kat] SHA2-256
904,325 UART: [kat] SHA2-384
906,952 UART: [kat] SHA2-512-ACC
908,853 UART: [kat] ECC-384
918,476 UART: [kat] HMAC-384Kdf
923,142 UART: [kat] LMS
1,171,470 UART: [kat] --
1,172,495 UART: [cold-reset] ++
1,172,875 UART: [fht] FHT @ 0x50003400
1,175,542 UART: [idev] ++
1,175,710 UART: [idev] CDI.KEYID = 6
1,176,070 UART: [idev] SUBJECT.KEYID = 7
1,176,494 UART: [idev] UDS.KEYID = 0
1,176,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,884 UART: [idev] Erasing UDS.KEYID = 0
1,201,371 UART: [idev] Sha1 KeyId Algorithm
1,209,847 UART: [idev] --
1,210,943 UART: [ldev] ++
1,211,111 UART: [ldev] CDI.KEYID = 6
1,211,474 UART: [ldev] SUBJECT.KEYID = 5
1,211,900 UART: [ldev] AUTHORITY.KEYID = 7
1,212,363 UART: [ldev] FE.KEYID = 1
1,217,683 UART: [ldev] Erasing FE.KEYID = 1
1,244,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,181 UART: [ldev] --
1,283,468 UART: [fwproc] Wait for Commands...
1,284,194 UART: [fwproc] Recv command 0x46574c44
1,284,922 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,895 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,199 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,868 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,203,403 >>> mbox cmd response: failed
1,203,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,409 >>> mbox cmd response: failed
1,203,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,475 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,924 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,203,154 >>> mbox cmd response: failed
1,203,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,160 >>> mbox cmd response: failed
1,203,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,166 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
902,130 UART: [kat] SHA2-256
904,070 UART: [kat] SHA2-384
907,005 UART: [kat] SHA2-512-ACC
908,906 UART: [kat] ECC-384
918,613 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,512 UART: [cold-reset] ++
1,173,064 UART: [fht] FHT @ 0x50003400
1,175,879 UART: [idev] ++
1,176,047 UART: [idev] CDI.KEYID = 6
1,176,407 UART: [idev] SUBJECT.KEYID = 7
1,176,831 UART: [idev] UDS.KEYID = 0
1,177,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,769 UART: [idev] Erasing UDS.KEYID = 0
1,202,252 UART: [idev] Sha1 KeyId Algorithm
1,210,666 UART: [idev] --
1,211,706 UART: [ldev] ++
1,211,874 UART: [ldev] CDI.KEYID = 6
1,212,237 UART: [ldev] SUBJECT.KEYID = 5
1,212,663 UART: [ldev] AUTHORITY.KEYID = 7
1,213,126 UART: [ldev] FE.KEYID = 1
1,218,016 UART: [ldev] Erasing FE.KEYID = 1
1,244,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,430 UART: [ldev] --
1,283,723 UART: [fwproc] Wait for Commands...
1,284,387 UART: [fwproc] Recv command 0x46574c44
1,285,115 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,000 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,304 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,805 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,492 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,203,238 >>> mbox cmd response: failed
1,203,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,244 >>> mbox cmd response: failed
1,203,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,820 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,101 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,203,337 >>> mbox cmd response: failed
1,203,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,343 >>> mbox cmd response: failed
1,203,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,266 UART: [kat] SHA2-256
891,816 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,945 UART: [kat] ++
896,097 UART: [kat] sha1
900,403 UART: [kat] SHA2-256
902,343 UART: [kat] SHA2-384
905,274 UART: [kat] SHA2-512-ACC
907,175 UART: [kat] ECC-384
916,966 UART: [kat] HMAC-384Kdf
921,570 UART: [kat] LMS
1,169,882 UART: [kat] --
1,170,869 UART: [cold-reset] ++
1,171,393 UART: [fht] FHT @ 0x50003400
1,174,103 UART: [idev] ++
1,174,271 UART: [idev] CDI.KEYID = 6
1,174,632 UART: [idev] SUBJECT.KEYID = 7
1,175,057 UART: [idev] UDS.KEYID = 0
1,175,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,219 UART: [idev] Erasing UDS.KEYID = 0
1,199,485 UART: [idev] Sha1 KeyId Algorithm
1,208,361 UART: [idev] --
1,209,432 UART: [ldev] ++
1,209,600 UART: [ldev] CDI.KEYID = 6
1,209,964 UART: [ldev] SUBJECT.KEYID = 5
1,210,391 UART: [ldev] AUTHORITY.KEYID = 7
1,210,854 UART: [ldev] FE.KEYID = 1
1,216,150 UART: [ldev] Erasing FE.KEYID = 1
1,242,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,992 UART: [ldev] --
1,282,432 UART: [fwproc] Wait for Commands...
1,283,153 UART: [fwproc] Recv command 0x46574c44
1,283,886 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,115 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,424 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,060 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,202,689 >>> mbox cmd response: failed
1,202,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,695 >>> mbox cmd response: failed
1,202,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,701 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,204 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,202,600 >>> mbox cmd response: failed
1,202,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,606 >>> mbox cmd response: failed
1,202,606 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
891,001 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,400 UART: [kat] SHA2-256
901,340 UART: [kat] SHA2-384
904,187 UART: [kat] SHA2-512-ACC
906,088 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,538 UART: [cold-reset] ++
1,169,974 UART: [fht] FHT @ 0x50003400
1,172,734 UART: [idev] ++
1,172,902 UART: [idev] CDI.KEYID = 6
1,173,263 UART: [idev] SUBJECT.KEYID = 7
1,173,688 UART: [idev] UDS.KEYID = 0
1,174,034 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,792 UART: [idev] Erasing UDS.KEYID = 0
1,199,372 UART: [idev] Sha1 KeyId Algorithm
1,208,058 UART: [idev] --
1,209,151 UART: [ldev] ++
1,209,319 UART: [ldev] CDI.KEYID = 6
1,209,683 UART: [ldev] SUBJECT.KEYID = 5
1,210,110 UART: [ldev] AUTHORITY.KEYID = 7
1,210,573 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,419 UART: [ldev] --
1,281,811 UART: [fwproc] Wait for Commands...
1,282,472 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,827 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,642 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,203,048 >>> mbox cmd response: failed
1,203,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,054 >>> mbox cmd response: failed
1,203,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,303 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,209 UART:
192,565 UART: Running Caliptra ROM ...
193,778 UART:
193,934 UART: [state] CFI Enabled
265,174 UART: [state] LifecycleState = Unprovisioned
267,105 UART: [state] DebugLocked = No
270,057 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,637 UART: [kat] SHA2-256
445,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,847 UART: [kat] ++
456,353 UART: [kat] sha1
466,960 UART: [kat] SHA2-256
469,689 UART: [kat] SHA2-384
474,420 UART: [kat] SHA2-512-ACC
476,786 UART: [kat] ECC-384
2,767,714 UART: [kat] HMAC-384Kdf
2,799,578 UART: [kat] LMS
3,989,891 UART: [kat] --
3,993,318 UART: [cold-reset] ++
3,994,933 UART: [fht] Storing FHT @ 0x50003400
4,005,073 UART: [idev] ++
4,005,646 UART: [idev] CDI.KEYID = 6
4,006,595 UART: [idev] SUBJECT.KEYID = 7
4,007,814 UART: [idev] UDS.KEYID = 0
4,010,563 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,908 UART: [idev] Erasing UDS.KEYID = 0
7,343,561 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,650 UART: [idev] --
7,370,257 UART: [ldev] ++
7,370,868 UART: [ldev] CDI.KEYID = 6
7,371,778 UART: [ldev] SUBJECT.KEYID = 5
7,372,999 UART: [ldev] AUTHORITY.KEYID = 7
7,374,233 UART: [ldev] FE.KEYID = 1
7,421,767 UART: [ldev] Erasing FE.KEYID = 1
10,755,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,086 UART: [ldev] --
13,136,551 UART: [fwproc] Waiting for Commands...
13,138,553 UART: [fwproc] Received command 0x46574c44
13,140,735 UART: [fwproc] Received Image of size 113844 bytes
15,842,386 UART: ROM Fatal Error: 0x000B0012
15,845,843 >>> mbox cmd response: failed
15,846,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,542 >>> mbox cmd response: failed
15,846,851 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,847,152 >>> mbox cmd response: failed
Initializing fuses
2,061,372 writing to cptra_bootfsm_go
2,250,656 UART:
2,251,001 UART: Running Caliptra ROM ...
2,252,051 UART:
2,252,205 UART: [state] CFI Enabled
2,310,980 UART: [state] LifecycleState = Unprovisioned
2,312,886 UART: [state] DebugLocked = No
2,315,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,331 UART: [kat] SHA2-256
2,490,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,518 UART: [kat] ++
2,500,974 UART: [kat] sha1
2,511,861 UART: [kat] SHA2-256
2,514,551 UART: [kat] SHA2-384
2,519,892 UART: [kat] SHA2-512-ACC
2,522,242 UART: [kat] ECC-384
4,817,439 UART: [kat] HMAC-384Kdf
4,847,115 UART: [kat] LMS
6,037,421 UART: [kat] --
6,041,004 UART: [cold-reset] ++
6,042,134 UART: [fht] Storing FHT @ 0x50003400
6,054,271 UART: [idev] ++
6,054,838 UART: [idev] CDI.KEYID = 6
6,055,777 UART: [idev] SUBJECT.KEYID = 7
6,056,994 UART: [idev] UDS.KEYID = 0
6,059,218 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,202,541 UART: [idev] Erasing UDS.KEYID = 0
9,393,109 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,362 UART: [idev] --
9,417,799 UART: [ldev] ++
9,418,370 UART: [ldev] CDI.KEYID = 6
9,419,338 UART: [ldev] SUBJECT.KEYID = 5
9,421,104 UART: [ldev] AUTHORITY.KEYID = 7
9,422,300 UART: [ldev] FE.KEYID = 1
9,448,582 UART: [ldev] Erasing FE.KEYID = 1
12,782,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,112,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,161,092 UART: [ldev] --
15,165,770 UART: [fwproc] Waiting for Commands...
15,168,700 UART: [fwproc] Received command 0x46574c44
15,170,892 UART: [fwproc] Received Image of size 113844 bytes
19,218,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,294,534 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,363,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,680,288 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,787,732 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,571,748 >>> mbox cmd response: failed
15,572,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,572,619 >>> mbox cmd response: failed
15,572,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,573,177 >>> mbox cmd response: failed
Initializing fuses
2,061,848 writing to cptra_bootfsm_go
5,831,427 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,869,276 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,624 UART:
192,977 UART: Running Caliptra ROM ...
194,097 UART:
603,868 UART: [state] CFI Enabled
618,878 UART: [state] LifecycleState = Unprovisioned
620,807 UART: [state] DebugLocked = No
623,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,958 UART: [kat] SHA2-256
798,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,259 UART: [kat] ++
809,700 UART: [kat] sha1
821,332 UART: [kat] SHA2-256
824,008 UART: [kat] SHA2-384
829,773 UART: [kat] SHA2-512-ACC
832,148 UART: [kat] ECC-384
3,114,274 UART: [kat] HMAC-384Kdf
3,126,752 UART: [kat] LMS
4,316,854 UART: [kat] --
4,320,912 UART: [cold-reset] ++
4,323,439 UART: [fht] Storing FHT @ 0x50003400
4,335,728 UART: [idev] ++
4,336,299 UART: [idev] CDI.KEYID = 6
4,337,183 UART: [idev] SUBJECT.KEYID = 7
4,338,451 UART: [idev] UDS.KEYID = 0
4,341,002 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,225 UART: [idev] Erasing UDS.KEYID = 0
7,621,647 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,147 UART: [idev] --
7,646,423 UART: [ldev] ++
7,647,001 UART: [ldev] CDI.KEYID = 6
7,647,973 UART: [ldev] SUBJECT.KEYID = 5
7,649,153 UART: [ldev] AUTHORITY.KEYID = 7
7,650,446 UART: [ldev] FE.KEYID = 1
7,661,472 UART: [ldev] Erasing FE.KEYID = 1
10,950,377 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,865 UART: [ldev] --
13,309,000 UART: [fwproc] Waiting for Commands...
13,312,173 UART: [fwproc] Received command 0x46574c44
13,314,376 UART: [fwproc] Received Image of size 113844 bytes
16,019,798 UART: ROM Fatal Error: 0x000B0012
16,023,322 >>> mbox cmd response: failed
16,023,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,089 >>> mbox cmd response: failed
16,024,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,024,684 >>> mbox cmd response: failed
Initializing fuses
2,061,964 writing to cptra_bootfsm_go
2,251,313 UART:
2,251,668 UART: Running Caliptra ROM ...
2,252,764 UART:
4,441,705 UART: [state] CFI Enabled
4,454,396 UART: [state] LifecycleState = Unprovisioned
4,456,309 UART: [state] DebugLocked = No
4,458,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,463,804 UART: [kat] SHA2-256
4,633,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,644,083 UART: [kat] ++
4,644,653 UART: [kat] sha1
4,655,594 UART: [kat] SHA2-256
4,658,308 UART: [kat] SHA2-384
4,664,895 UART: [kat] SHA2-512-ACC
4,667,252 UART: [kat] ECC-384
6,951,823 UART: [kat] HMAC-384Kdf
6,963,138 UART: [kat] LMS
8,153,253 UART: [kat] --
8,158,728 UART: [cold-reset] ++
8,159,808 UART: [fht] Storing FHT @ 0x50003400
8,170,108 UART: [idev] ++
8,170,708 UART: [idev] CDI.KEYID = 6
8,171,600 UART: [idev] SUBJECT.KEYID = 7
8,172,866 UART: [idev] UDS.KEYID = 0
8,175,201 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,318,140 UART: [idev] Erasing UDS.KEYID = 0
11,456,130 UART: [idev] Using Sha1 for KeyId Algorithm
11,478,057 UART: [idev] --
11,481,948 UART: [ldev] ++
11,482,516 UART: [ldev] CDI.KEYID = 6
11,483,481 UART: [ldev] SUBJECT.KEYID = 5
11,485,253 UART: [ldev] AUTHORITY.KEYID = 7
11,486,448 UART: [ldev] FE.KEYID = 1
11,496,832 UART: [ldev] Erasing FE.KEYID = 1
14,778,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,071,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,085,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,100,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,114,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,134,214 UART: [ldev] --
17,139,653 UART: [fwproc] Waiting for Commands...
17,142,891 UART: [fwproc] Received command 0x46574c44
17,145,097 UART: [fwproc] Received Image of size 113844 bytes
21,195,498 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,274,004 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,342,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,659,621 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
4,127,489 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,761,584 >>> mbox cmd response: failed
15,762,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,762,502 >>> mbox cmd response: failed
15,762,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,067 >>> mbox cmd response: failed
Initializing fuses
2,061,865 writing to cptra_bootfsm_go
8,234,502 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,173,762 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,227 writing to cptra_bootfsm_go
193,423 UART:
193,772 UART: Running Caliptra ROM ...
195,003 UART:
195,163 UART: [state] CFI Enabled
265,103 UART: [state] LifecycleState = Unprovisioned
266,986 UART: [state] DebugLocked = No
269,345 UART: [state] WD Timer not started. Device not locked for debugging
273,507 UART: [kat] SHA2-256
452,628 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
464,230 UART: [kat] ++
464,764 UART: [kat] sha1
474,513 UART: [kat] SHA2-256
477,575 UART: [kat] SHA2-384
484,148 UART: [kat] SHA2-512-ACC
487,118 UART: [kat] ECC-384
2,949,108 UART: [kat] HMAC-384Kdf
2,972,405 UART: [kat] LMS
3,501,835 UART: [kat] --
3,506,172 UART: [cold-reset] ++
3,508,427 UART: [fht] FHT @ 0x50003400
3,520,538 UART: [idev] ++
3,521,109 UART: [idev] CDI.KEYID = 6
3,522,434 UART: [idev] SUBJECT.KEYID = 7
3,523,554 UART: [idev] UDS.KEYID = 0
3,526,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,684 UART: [idev] Erasing UDS.KEYID = 0
6,027,010 UART: [idev] Sha1 KeyId Algorithm
6,049,342 UART: [idev] --
6,053,786 UART: [ldev] ++
6,054,377 UART: [ldev] CDI.KEYID = 6
6,055,269 UART: [ldev] SUBJECT.KEYID = 5
6,056,488 UART: [ldev] AUTHORITY.KEYID = 7
6,057,721 UART: [ldev] FE.KEYID = 1
6,101,225 UART: [ldev] Erasing FE.KEYID = 1
8,605,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,987 UART: [ldev] --
10,414,099 UART: [fwproc] Wait for Commands...
10,416,536 UART: [fwproc] Recv command 0x46574c44
10,418,580 UART: [fwproc] Recv'd Img size: 114168 bytes
12,473,627 UART: ROM Fatal Error: 0x000B0012
12,476,735 >>> mbox cmd response: failed
12,477,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,477,536 >>> mbox cmd response: failed
12,477,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,478,094 >>> mbox cmd response: failed
Initializing fuses
2,065,931 writing to cptra_bootfsm_go
2,255,241 UART:
2,255,571 UART: Running Caliptra ROM ...
2,256,710 UART:
2,256,878 UART: [state] CFI Enabled
2,314,841 UART: [state] LifecycleState = Unprovisioned
2,316,675 UART: [state] DebugLocked = No
2,318,547 UART: [state] WD Timer not started. Device not locked for debugging
2,323,117 UART: [kat] SHA2-256
2,502,261 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,839 UART: [kat] ++
2,514,300 UART: [kat] sha1
2,525,670 UART: [kat] SHA2-256
2,528,686 UART: [kat] SHA2-384
2,534,858 UART: [kat] SHA2-512-ACC
2,537,806 UART: [kat] ECC-384
5,005,195 UART: [kat] HMAC-384Kdf
5,025,046 UART: [kat] LMS
5,554,512 UART: [kat] --
5,560,114 UART: [cold-reset] ++
5,562,046 UART: [fht] FHT @ 0x50003400
5,572,758 UART: [idev] ++
5,573,323 UART: [idev] CDI.KEYID = 6
5,574,235 UART: [idev] SUBJECT.KEYID = 7
5,575,396 UART: [idev] UDS.KEYID = 0
5,577,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,721,708 UART: [idev] Erasing UDS.KEYID = 0
8,078,780 UART: [idev] Sha1 KeyId Algorithm
8,102,120 UART: [idev] --
8,106,740 UART: [ldev] ++
8,107,347 UART: [ldev] CDI.KEYID = 6
8,108,260 UART: [ldev] SUBJECT.KEYID = 5
8,109,309 UART: [ldev] AUTHORITY.KEYID = 7
8,110,654 UART: [ldev] FE.KEYID = 1
8,154,714 UART: [ldev] Erasing FE.KEYID = 1
10,658,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,174 UART: [ldev] --
12,470,169 UART: [fwproc] Wait for Commands...
12,471,948 UART: [fwproc] Recv command 0x46574c44
12,473,992 UART: [fwproc] Recv'd Img size: 114168 bytes
15,877,948 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,959,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,027,923 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,344,880 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,397,531 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,244,512 >>> mbox cmd response: failed
12,245,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,245,384 >>> mbox cmd response: failed
12,245,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,245,954 >>> mbox cmd response: failed
Initializing fuses
2,056,812 writing to cptra_bootfsm_go
5,441,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,139,898 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,357 UART:
192,746 UART: Running Caliptra ROM ...
193,947 UART:
603,305 UART: [state] CFI Enabled
617,749 UART: [state] LifecycleState = Unprovisioned
619,638 UART: [state] DebugLocked = No
621,417 UART: [state] WD Timer not started. Device not locked for debugging
625,089 UART: [kat] SHA2-256
804,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,807 UART: [kat] ++
816,255 UART: [kat] sha1
826,717 UART: [kat] SHA2-256
829,745 UART: [kat] SHA2-384
835,679 UART: [kat] SHA2-512-ACC
838,663 UART: [kat] ECC-384
3,280,580 UART: [kat] HMAC-384Kdf
3,293,344 UART: [kat] LMS
3,822,809 UART: [kat] --
3,828,535 UART: [cold-reset] ++
3,830,739 UART: [fht] FHT @ 0x50003400
3,841,676 UART: [idev] ++
3,842,241 UART: [idev] CDI.KEYID = 6
3,843,214 UART: [idev] SUBJECT.KEYID = 7
3,844,316 UART: [idev] UDS.KEYID = 0
3,846,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,418 UART: [idev] Erasing UDS.KEYID = 0
6,314,933 UART: [idev] Sha1 KeyId Algorithm
6,338,217 UART: [idev] --
6,342,375 UART: [ldev] ++
6,342,984 UART: [ldev] CDI.KEYID = 6
6,343,881 UART: [ldev] SUBJECT.KEYID = 5
6,345,044 UART: [ldev] AUTHORITY.KEYID = 7
6,346,288 UART: [ldev] FE.KEYID = 1
6,356,965 UART: [ldev] Erasing FE.KEYID = 1
8,833,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,868 UART: [ldev] --
10,627,129 UART: [fwproc] Wait for Commands...
10,628,735 UART: [fwproc] Recv command 0x46574c44
10,630,841 UART: [fwproc] Recv'd Img size: 114168 bytes
12,673,274 UART: ROM Fatal Error: 0x000B0012
12,676,395 >>> mbox cmd response: failed
12,676,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,677,041 >>> mbox cmd response: failed
12,677,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,677,601 >>> mbox cmd response: failed
Initializing fuses
2,052,240 writing to cptra_bootfsm_go
2,241,538 UART:
2,241,882 UART: Running Caliptra ROM ...
2,243,019 UART:
7,791,354 UART: [state] CFI Enabled
7,805,018 UART: [state] LifecycleState = Unprovisioned
7,806,889 UART: [state] DebugLocked = No
7,809,848 UART: [state] WD Timer not started. Device not locked for debugging
7,812,893 UART: [kat] SHA2-256
7,992,030 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,003,572 UART: [kat] ++
8,004,124 UART: [kat] sha1
8,015,187 UART: [kat] SHA2-256
8,018,207 UART: [kat] SHA2-384
8,024,411 UART: [kat] SHA2-512-ACC
8,027,354 UART: [kat] ECC-384
10,470,506 UART: [kat] HMAC-384Kdf
10,483,160 UART: [kat] LMS
11,012,667 UART: [kat] --
11,018,179 UART: [cold-reset] ++
11,019,199 UART: [fht] FHT @ 0x50003400
11,030,964 UART: [idev] ++
11,031,603 UART: [idev] CDI.KEYID = 6
11,032,527 UART: [idev] SUBJECT.KEYID = 7
11,033,573 UART: [idev] UDS.KEYID = 0
11,035,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,179,213 UART: [idev] Erasing UDS.KEYID = 0
13,508,779 UART: [idev] Sha1 KeyId Algorithm
13,532,870 UART: [idev] --
13,536,267 UART: [ldev] ++
13,536,831 UART: [ldev] CDI.KEYID = 6
13,537,734 UART: [ldev] SUBJECT.KEYID = 5
13,538,967 UART: [ldev] AUTHORITY.KEYID = 7
13,540,201 UART: [ldev] FE.KEYID = 1
13,550,745 UART: [ldev] Erasing FE.KEYID = 1
16,026,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,744,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,760,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,776,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,791,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,811,860 UART: [ldev] --
17,816,959 UART: [fwproc] Wait for Commands...
17,818,890 UART: [fwproc] Recv command 0x46574c44
17,820,931 UART: [fwproc] Recv'd Img size: 114168 bytes
21,219,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,296,871 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,365,621 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,682,416 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
3,703,480 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,461,529 >>> mbox cmd response: failed
12,462,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,506 >>> mbox cmd response: failed
12,462,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,463,099 >>> mbox cmd response: failed
Initializing fuses
2,054,198 writing to cptra_bootfsm_go
11,099,991 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,670,140 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,180 UART:
192,542 UART: Running Caliptra ROM ...
193,690 UART:
193,836 UART: [state] CFI Enabled
268,528 UART: [state] LifecycleState = Unprovisioned
270,943 UART: [state] DebugLocked = No
273,896 UART: [state] WD Timer not started. Device not locked for debugging
279,044 UART: [kat] SHA2-256
468,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,703 UART: [kat] ++
480,178 UART: [kat] sha1
492,056 UART: [kat] SHA2-256
495,080 UART: [kat] SHA2-384
500,744 UART: [kat] SHA2-512-ACC
503,361 UART: [kat] ECC-384
2,949,938 UART: [kat] HMAC-384Kdf
2,973,138 UART: [kat] LMS
3,504,906 UART: [kat] --
3,508,740 UART: [cold-reset] ++
3,510,188 UART: [fht] FHT @ 0x50003400
3,521,280 UART: [idev] ++
3,521,959 UART: [idev] CDI.KEYID = 6
3,522,973 UART: [idev] SUBJECT.KEYID = 7
3,524,080 UART: [idev] UDS.KEYID = 0
3,526,564 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,565 UART: [idev] Erasing UDS.KEYID = 0
6,030,572 UART: [idev] Sha1 KeyId Algorithm
6,052,488 UART: [idev] --
6,057,655 UART: [ldev] ++
6,058,348 UART: [ldev] CDI.KEYID = 6
6,059,260 UART: [ldev] SUBJECT.KEYID = 5
6,060,480 UART: [ldev] AUTHORITY.KEYID = 7
6,061,668 UART: [ldev] FE.KEYID = 1
6,101,269 UART: [ldev] Erasing FE.KEYID = 1
8,609,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,699 UART: [ldev] --
10,412,262 UART: [fwproc] Wait for Commands...
10,415,438 UART: [fwproc] Recv command 0x46574c44
10,417,755 UART: [fwproc] Recv'd Img size: 114168 bytes
12,498,084 UART: ROM Fatal Error: 0x000B0012
12,501,751 >>> mbox cmd response: failed
12,502,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,502,435 >>> mbox cmd response: failed
12,502,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,502,990 >>> mbox cmd response: failed
Initializing fuses
2,055,313 writing to cptra_bootfsm_go
2,244,665 UART:
2,245,019 UART: Running Caliptra ROM ...
2,246,100 UART:
2,246,261 UART: [state] CFI Enabled
2,309,740 UART: [state] LifecycleState = Unprovisioned
2,312,120 UART: [state] DebugLocked = No
2,314,941 UART: [state] WD Timer not started. Device not locked for debugging
2,319,034 UART: [kat] SHA2-256
2,508,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,636 UART: [kat] ++
2,520,101 UART: [kat] sha1
2,531,967 UART: [kat] SHA2-256
2,534,989 UART: [kat] SHA2-384
2,540,450 UART: [kat] SHA2-512-ACC
2,543,024 UART: [kat] ECC-384
4,991,788 UART: [kat] HMAC-384Kdf
5,015,316 UART: [kat] LMS
5,547,111 UART: [kat] --
5,552,721 UART: [cold-reset] ++
5,554,706 UART: [fht] FHT @ 0x50003400
5,566,499 UART: [idev] ++
5,567,176 UART: [idev] CDI.KEYID = 6
5,568,209 UART: [idev] SUBJECT.KEYID = 7
5,569,374 UART: [idev] UDS.KEYID = 0
5,571,602 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,715,302 UART: [idev] Erasing UDS.KEYID = 0
8,070,530 UART: [idev] Sha1 KeyId Algorithm
8,093,175 UART: [idev] --
8,098,256 UART: [ldev] ++
8,098,941 UART: [ldev] CDI.KEYID = 6
8,100,225 UART: [ldev] SUBJECT.KEYID = 5
8,101,341 UART: [ldev] AUTHORITY.KEYID = 7
8,102,518 UART: [ldev] FE.KEYID = 1
8,143,834 UART: [ldev] Erasing FE.KEYID = 1
10,652,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,382,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,397,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,412,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,428,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,449,042 UART: [ldev] --
12,455,226 UART: [fwproc] Wait for Commands...
12,457,388 UART: [fwproc] Recv command 0x46574c44
12,459,710 UART: [fwproc] Recv'd Img size: 114168 bytes
15,903,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,981,769 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,097,946 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,639,825 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,420,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,291,014 >>> mbox cmd response: failed
12,291,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,291,889 >>> mbox cmd response: failed
12,292,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,292,448 >>> mbox cmd response: failed
Initializing fuses
2,056,407 writing to cptra_bootfsm_go
5,488,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,771,408 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,665 UART:
193,018 UART: Running Caliptra ROM ...
194,233 UART:
603,881 UART: [state] CFI Enabled
616,836 UART: [state] LifecycleState = Unprovisioned
618,871 UART: [state] DebugLocked = No
620,577 UART: [state] WD Timer not started. Device not locked for debugging
624,366 UART: [kat] SHA2-256
814,040 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,795 UART: [kat] ++
825,385 UART: [kat] sha1
836,779 UART: [kat] SHA2-256
839,790 UART: [kat] SHA2-384
846,151 UART: [kat] SHA2-512-ACC
848,712 UART: [kat] ECC-384
3,289,931 UART: [kat] HMAC-384Kdf
3,303,045 UART: [kat] LMS
3,834,913 UART: [kat] --
3,841,193 UART: [cold-reset] ++
3,843,408 UART: [fht] FHT @ 0x50003400
3,854,724 UART: [idev] ++
3,855,403 UART: [idev] CDI.KEYID = 6
3,856,421 UART: [idev] SUBJECT.KEYID = 7
3,857,591 UART: [idev] UDS.KEYID = 0
3,860,336 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,942 UART: [idev] Erasing UDS.KEYID = 0
6,333,056 UART: [idev] Sha1 KeyId Algorithm
6,354,804 UART: [idev] --
6,359,236 UART: [ldev] ++
6,359,921 UART: [ldev] CDI.KEYID = 6
6,360,840 UART: [ldev] SUBJECT.KEYID = 5
6,362,003 UART: [ldev] AUTHORITY.KEYID = 7
6,363,190 UART: [ldev] FE.KEYID = 1
6,374,765 UART: [ldev] Erasing FE.KEYID = 1
8,853,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,243 UART: [ldev] --
10,641,626 UART: [fwproc] Wait for Commands...
10,643,129 UART: [fwproc] Recv command 0x46574c44
10,645,121 UART: [fwproc] Recv'd Img size: 114168 bytes
12,731,337 UART: ROM Fatal Error: 0x000B0012
12,734,974 >>> mbox cmd response: failed
12,735,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,735,718 >>> mbox cmd response: failed
12,735,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,279 >>> mbox cmd response: failed
Initializing fuses
2,062,310 writing to cptra_bootfsm_go
2,251,704 UART:
2,252,058 UART: Running Caliptra ROM ...
2,253,203 UART:
7,737,232 UART: [state] CFI Enabled
7,752,585 UART: [state] LifecycleState = Unprovisioned
7,754,948 UART: [state] DebugLocked = No
7,756,524 UART: [state] WD Timer not started. Device not locked for debugging
7,760,998 UART: [kat] SHA2-256
7,950,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,961,642 UART: [kat] ++
7,962,249 UART: [kat] sha1
7,974,425 UART: [kat] SHA2-256
7,977,454 UART: [kat] SHA2-384
7,983,784 UART: [kat] SHA2-512-ACC
7,986,370 UART: [kat] ECC-384
10,428,813 UART: [kat] HMAC-384Kdf
10,442,297 UART: [kat] LMS
10,974,122 UART: [kat] --
10,977,585 UART: [cold-reset] ++
10,979,037 UART: [fht] FHT @ 0x50003400
10,991,172 UART: [idev] ++
10,991,849 UART: [idev] CDI.KEYID = 6
10,992,885 UART: [idev] SUBJECT.KEYID = 7
10,993,993 UART: [idev] UDS.KEYID = 0
10,996,469 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,139,948 UART: [idev] Erasing UDS.KEYID = 0
13,473,326 UART: [idev] Sha1 KeyId Algorithm
13,496,236 UART: [idev] --
13,500,910 UART: [ldev] ++
13,501,655 UART: [ldev] CDI.KEYID = 6
13,502,567 UART: [ldev] SUBJECT.KEYID = 5
13,503,730 UART: [ldev] AUTHORITY.KEYID = 7
13,504,960 UART: [ldev] FE.KEYID = 1
13,517,394 UART: [ldev] Erasing FE.KEYID = 1
15,994,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,713,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,729,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,744,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,759,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,780,038 UART: [ldev] --
17,786,281 UART: [fwproc] Wait for Commands...
17,787,736 UART: [fwproc] Recv command 0x46574c44
17,790,002 UART: [fwproc] Recv'd Img size: 114168 bytes
21,239,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,315,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,432,058 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,973,229 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,759,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,514,640 >>> mbox cmd response: failed
12,515,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,515,560 >>> mbox cmd response: failed
12,515,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,176 >>> mbox cmd response: failed
Initializing fuses
2,055,430 writing to cptra_bootfsm_go
11,109,876 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,304,865 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,761 UART: [kat] SHA2-256
892,699 UART: [kat] SHA2-384
895,382 UART: [kat] SHA2-512-ACC
897,283 UART: [kat] ECC-384
902,970 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,385 UART: [cold-reset] ++
1,476,793 UART: [fht] Storing FHT @ 0x50003400
1,479,478 UART: [idev] ++
1,479,646 UART: [idev] CDI.KEYID = 6
1,480,006 UART: [idev] SUBJECT.KEYID = 7
1,480,430 UART: [idev] UDS.KEYID = 0
1,480,775 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,652 UART: [idev] Erasing UDS.KEYID = 0
1,505,520 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,094 UART: [idev] --
1,515,187 UART: [ldev] ++
1,515,355 UART: [ldev] CDI.KEYID = 6
1,515,718 UART: [ldev] SUBJECT.KEYID = 5
1,516,144 UART: [ldev] AUTHORITY.KEYID = 7
1,516,607 UART: [ldev] FE.KEYID = 1
1,521,829 UART: [ldev] Erasing FE.KEYID = 1
1,546,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,152 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,100 UART: [ldev] --
1,586,437 UART: [fwproc] Waiting for Commands...
1,587,240 UART: [fwproc] Received command 0x46574c44
1,588,031 UART: [fwproc] Received Image of size 114168 bytes
1,634,786 UART: ROM Fatal Error: 0x000B0012
1,635,943 >>> mbox cmd response: failed
1,635,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,949 >>> mbox cmd response: failed
1,635,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,383 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,015 UART: [kat] SHA2-256
881,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,061 UART: [kat] ++
886,213 UART: [kat] sha1
890,209 UART: [kat] SHA2-256
892,147 UART: [kat] SHA2-384
894,918 UART: [kat] SHA2-512-ACC
896,819 UART: [kat] ECC-384
902,410 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,476,207 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,490 UART: [idev] ++
1,479,658 UART: [idev] CDI.KEYID = 6
1,480,018 UART: [idev] SUBJECT.KEYID = 7
1,480,442 UART: [idev] UDS.KEYID = 0
1,480,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,304 UART: [idev] Erasing UDS.KEYID = 0
1,504,670 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,384 UART: [idev] --
1,514,609 UART: [ldev] ++
1,514,777 UART: [ldev] CDI.KEYID = 6
1,515,140 UART: [ldev] SUBJECT.KEYID = 5
1,515,566 UART: [ldev] AUTHORITY.KEYID = 7
1,516,029 UART: [ldev] FE.KEYID = 1
1,521,409 UART: [ldev] Erasing FE.KEYID = 1
1,546,872 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,490 UART: [ldev] --
1,585,761 UART: [fwproc] Waiting for Commands...
1,586,384 UART: [fwproc] Received command 0x46574c44
1,587,175 UART: [fwproc] Received Image of size 114168 bytes
2,883,546 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,592 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,609 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,952 >>> mbox cmd response: failed
1,487,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,958 >>> mbox cmd response: failed
1,487,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,805 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
87,170 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,704 UART: [kat] SHA2-256
882,635 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,750 UART: [kat] ++
886,902 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,823 UART: [kat] SHA2-512-ACC
897,724 UART: [kat] ECC-384
903,673 UART: [kat] HMAC-384Kdf
908,283 UART: [kat] LMS
1,476,479 UART: [kat] --
1,477,528 UART: [cold-reset] ++
1,478,096 UART: [fht] Storing FHT @ 0x50003400
1,480,713 UART: [idev] ++
1,480,881 UART: [idev] CDI.KEYID = 6
1,481,241 UART: [idev] SUBJECT.KEYID = 7
1,481,665 UART: [idev] UDS.KEYID = 0
1,482,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,785 UART: [idev] Erasing UDS.KEYID = 0
1,506,423 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,925 UART: [idev] --
1,515,934 UART: [ldev] ++
1,516,102 UART: [ldev] CDI.KEYID = 6
1,516,465 UART: [ldev] SUBJECT.KEYID = 5
1,516,891 UART: [ldev] AUTHORITY.KEYID = 7
1,517,354 UART: [ldev] FE.KEYID = 1
1,522,662 UART: [ldev] Erasing FE.KEYID = 1
1,547,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,363 UART: [ldev] --
1,586,654 UART: [fwproc] Waiting for Commands...
1,587,327 UART: [fwproc] Received command 0x46574c44
1,588,118 UART: [fwproc] Received Image of size 114168 bytes
1,634,335 UART: ROM Fatal Error: 0x000B0012
1,635,492 >>> mbox cmd response: failed
1,635,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,498 >>> mbox cmd response: failed
1,635,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,447 UART: [kat] SHA2-512-ACC
897,348 UART: [kat] ECC-384
903,045 UART: [kat] HMAC-384Kdf
907,863 UART: [kat] LMS
1,476,059 UART: [kat] --
1,476,904 UART: [cold-reset] ++
1,477,400 UART: [fht] Storing FHT @ 0x50003400
1,480,239 UART: [idev] ++
1,480,407 UART: [idev] CDI.KEYID = 6
1,480,767 UART: [idev] SUBJECT.KEYID = 7
1,481,191 UART: [idev] UDS.KEYID = 0
1,481,536 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,999 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,505 UART: [idev] --
1,515,750 UART: [ldev] ++
1,515,918 UART: [ldev] CDI.KEYID = 6
1,516,281 UART: [ldev] SUBJECT.KEYID = 5
1,516,707 UART: [ldev] AUTHORITY.KEYID = 7
1,517,170 UART: [ldev] FE.KEYID = 1
1,522,388 UART: [ldev] Erasing FE.KEYID = 1
1,547,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,593 UART: [ldev] --
1,587,032 UART: [fwproc] Waiting for Commands...
1,587,823 UART: [fwproc] Received command 0x46574c44
1,588,614 UART: [fwproc] Received Image of size 114168 bytes
2,884,753 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,141 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,493 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,058 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,490,757 >>> mbox cmd response: failed
1,490,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,763 >>> mbox cmd response: failed
1,490,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,600 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,372 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,465 UART: [kat] SHA2-256
903,405 UART: [kat] SHA2-384
906,106 UART: [kat] SHA2-512-ACC
908,007 UART: [kat] ECC-384
917,858 UART: [kat] HMAC-384Kdf
922,572 UART: [kat] LMS
1,170,900 UART: [kat] --
1,171,905 UART: [cold-reset] ++
1,172,241 UART: [fht] FHT @ 0x50003400
1,174,852 UART: [idev] ++
1,175,020 UART: [idev] CDI.KEYID = 6
1,175,380 UART: [idev] SUBJECT.KEYID = 7
1,175,804 UART: [idev] UDS.KEYID = 0
1,176,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,888 UART: [idev] Erasing UDS.KEYID = 0
1,200,717 UART: [idev] Sha1 KeyId Algorithm
1,209,299 UART: [idev] --
1,210,277 UART: [ldev] ++
1,210,445 UART: [ldev] CDI.KEYID = 6
1,210,808 UART: [ldev] SUBJECT.KEYID = 5
1,211,234 UART: [ldev] AUTHORITY.KEYID = 7
1,211,697 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,242,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,478 UART: [fwproc] Wait for Commands...
1,282,268 UART: [fwproc] Recv command 0x46574c44
1,282,996 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,149 UART: ROM Fatal Error: 0x000B0012
1,331,306 >>> mbox cmd response: failed
1,331,306 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,312 >>> mbox cmd response: failed
1,331,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
893,036 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,161 UART: [kat] ++
897,313 UART: [kat] sha1
901,643 UART: [kat] SHA2-256
903,583 UART: [kat] SHA2-384
906,234 UART: [kat] SHA2-512-ACC
908,135 UART: [kat] ECC-384
917,358 UART: [kat] HMAC-384Kdf
922,008 UART: [kat] LMS
1,170,336 UART: [kat] --
1,170,975 UART: [cold-reset] ++
1,171,331 UART: [fht] FHT @ 0x50003400
1,173,922 UART: [idev] ++
1,174,090 UART: [idev] CDI.KEYID = 6
1,174,450 UART: [idev] SUBJECT.KEYID = 7
1,174,874 UART: [idev] UDS.KEYID = 0
1,175,219 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,088 UART: [idev] Erasing UDS.KEYID = 0
1,200,123 UART: [idev] Sha1 KeyId Algorithm
1,208,523 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,139 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,282,102 UART: [fwproc] Recv command 0x46574c44
1,282,830 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,450 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,273 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,188,335 >>> mbox cmd response: failed
1,188,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,341 >>> mbox cmd response: failed
1,188,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,309 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,205 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
902,104 UART: [kat] SHA2-256
904,044 UART: [kat] SHA2-384
906,945 UART: [kat] SHA2-512-ACC
908,846 UART: [kat] ECC-384
918,333 UART: [kat] HMAC-384Kdf
922,965 UART: [kat] LMS
1,171,293 UART: [kat] --
1,172,056 UART: [cold-reset] ++
1,172,584 UART: [fht] FHT @ 0x50003400
1,175,115 UART: [idev] ++
1,175,283 UART: [idev] CDI.KEYID = 6
1,175,643 UART: [idev] SUBJECT.KEYID = 7
1,176,067 UART: [idev] UDS.KEYID = 0
1,176,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,201,178 UART: [idev] Sha1 KeyId Algorithm
1,209,610 UART: [idev] --
1,210,672 UART: [ldev] ++
1,210,840 UART: [ldev] CDI.KEYID = 6
1,211,203 UART: [ldev] SUBJECT.KEYID = 5
1,211,629 UART: [ldev] AUTHORITY.KEYID = 7
1,212,092 UART: [ldev] FE.KEYID = 1
1,217,552 UART: [ldev] Erasing FE.KEYID = 1
1,244,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,244 UART: [ldev] --
1,283,525 UART: [fwproc] Wait for Commands...
1,284,121 UART: [fwproc] Recv command 0x46574c44
1,284,849 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,406 UART: ROM Fatal Error: 0x000B0012
1,332,563 >>> mbox cmd response: failed
1,332,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,569 >>> mbox cmd response: failed
1,332,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
901,926 UART: [kat] SHA2-256
903,866 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,379 UART: [kat] HMAC-384Kdf
922,945 UART: [kat] LMS
1,171,273 UART: [kat] --
1,172,226 UART: [cold-reset] ++
1,172,716 UART: [fht] FHT @ 0x50003400
1,175,387 UART: [idev] ++
1,175,555 UART: [idev] CDI.KEYID = 6
1,175,915 UART: [idev] SUBJECT.KEYID = 7
1,176,339 UART: [idev] UDS.KEYID = 0
1,176,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,393 UART: [idev] Erasing UDS.KEYID = 0
1,202,066 UART: [idev] Sha1 KeyId Algorithm
1,210,436 UART: [idev] --
1,211,658 UART: [ldev] ++
1,211,826 UART: [ldev] CDI.KEYID = 6
1,212,189 UART: [ldev] SUBJECT.KEYID = 5
1,212,615 UART: [ldev] AUTHORITY.KEYID = 7
1,213,078 UART: [ldev] FE.KEYID = 1
1,218,226 UART: [ldev] Erasing FE.KEYID = 1
1,244,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,413 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,232 UART: [ldev] --
1,283,669 UART: [fwproc] Wait for Commands...
1,284,339 UART: [fwproc] Recv command 0x46574c44
1,285,067 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,042 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,493 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,187,224 >>> mbox cmd response: failed
1,187,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,230 >>> mbox cmd response: failed
1,187,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,884 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,714 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,495 UART: [kat] SHA2-256
901,435 UART: [kat] SHA2-384
904,216 UART: [kat] SHA2-512-ACC
906,117 UART: [kat] ECC-384
916,410 UART: [kat] HMAC-384Kdf
921,118 UART: [kat] LMS
1,169,430 UART: [kat] --
1,170,361 UART: [cold-reset] ++
1,170,897 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,174,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,965 UART: [idev] Erasing UDS.KEYID = 0
1,199,897 UART: [idev] Sha1 KeyId Algorithm
1,208,881 UART: [idev] --
1,210,086 UART: [ldev] ++
1,210,254 UART: [ldev] CDI.KEYID = 6
1,210,618 UART: [ldev] SUBJECT.KEYID = 5
1,211,045 UART: [ldev] AUTHORITY.KEYID = 7
1,211,508 UART: [ldev] FE.KEYID = 1
1,216,582 UART: [ldev] Erasing FE.KEYID = 1
1,243,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,118 UART: [ldev] --
1,282,550 UART: [fwproc] Wait for Commands...
1,283,341 UART: [fwproc] Recv command 0x46574c44
1,284,074 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,275 UART: ROM Fatal Error: 0x000B0012
1,331,432 >>> mbox cmd response: failed
1,331,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,438 >>> mbox cmd response: failed
1,331,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,462 UART: [kat] LMS
1,168,774 UART: [kat] --
1,169,449 UART: [cold-reset] ++
1,169,975 UART: [fht] FHT @ 0x50003400
1,172,513 UART: [idev] ++
1,172,681 UART: [idev] CDI.KEYID = 6
1,173,042 UART: [idev] SUBJECT.KEYID = 7
1,173,467 UART: [idev] UDS.KEYID = 0
1,173,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,129 UART: [idev] Sha1 KeyId Algorithm
1,207,155 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,680 UART: [ldev] Erasing FE.KEYID = 1
1,241,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,080 UART: [ldev] --
1,280,346 UART: [fwproc] Wait for Commands...
1,280,983 UART: [fwproc] Recv command 0x46574c44
1,281,716 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,741 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,050 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,522 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,706 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,361 >>> mbox cmd response: failed
1,182,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,367 >>> mbox cmd response: failed
1,182,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,020 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,462 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,802 UART: [kat] SHA2-256
901,742 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,038 UART: [cold-reset] ++
1,170,602 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,310 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,655 UART: [ldev] ++
1,209,823 UART: [ldev] CDI.KEYID = 6
1,210,187 UART: [ldev] SUBJECT.KEYID = 5
1,210,614 UART: [ldev] AUTHORITY.KEYID = 7
1,211,077 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,282,073 UART: [fwproc] Wait for Commands...
1,282,756 UART: [fwproc] Recv command 0x46574c44
1,283,489 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,108 UART: ROM Fatal Error: 0x000B0012
1,332,265 >>> mbox cmd response: failed
1,332,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,271 >>> mbox cmd response: failed
1,332,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
891,671 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,977 UART: [kat] SHA2-512-ACC
906,878 UART: [kat] ECC-384
916,577 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,342 UART: [cold-reset] ++
1,170,816 UART: [fht] FHT @ 0x50003400
1,173,530 UART: [idev] ++
1,173,698 UART: [idev] CDI.KEYID = 6
1,174,059 UART: [idev] SUBJECT.KEYID = 7
1,174,484 UART: [idev] UDS.KEYID = 0
1,174,830 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,776 UART: [idev] --
1,209,915 UART: [ldev] ++
1,210,083 UART: [ldev] CDI.KEYID = 6
1,210,447 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,385 UART: [fwproc] Wait for Commands...
1,283,122 UART: [fwproc] Recv command 0x46574c44
1,283,855 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,814 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,763 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,444 >>> mbox cmd response: failed
1,184,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,450 >>> mbox cmd response: failed
1,184,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,257 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,973 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,026 UART:
192,405 UART: Running Caliptra ROM ...
193,548 UART:
193,701 UART: [state] CFI Enabled
263,747 UART: [state] LifecycleState = Unprovisioned
265,745 UART: [state] DebugLocked = No
267,669 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,179 UART: [kat] SHA2-256
442,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,358 UART: [kat] ++
453,840 UART: [kat] sha1
464,341 UART: [kat] SHA2-256
467,033 UART: [kat] SHA2-384
471,287 UART: [kat] SHA2-512-ACC
473,630 UART: [kat] ECC-384
2,766,456 UART: [kat] HMAC-384Kdf
2,798,295 UART: [kat] LMS
3,988,568 UART: [kat] --
3,992,998 UART: [cold-reset] ++
3,994,288 UART: [fht] Storing FHT @ 0x50003400
4,005,182 UART: [idev] ++
4,005,774 UART: [idev] CDI.KEYID = 6
4,006,800 UART: [idev] SUBJECT.KEYID = 7
4,007,964 UART: [idev] UDS.KEYID = 0
4,010,929 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,366 UART: [idev] Erasing UDS.KEYID = 0
7,345,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,428 UART: [idev] --
7,371,689 UART: [ldev] ++
7,372,259 UART: [ldev] CDI.KEYID = 6
7,373,201 UART: [ldev] SUBJECT.KEYID = 5
7,374,413 UART: [ldev] AUTHORITY.KEYID = 7
7,375,649 UART: [ldev] FE.KEYID = 1
7,420,495 UART: [ldev] Erasing FE.KEYID = 1
10,755,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,281 UART: [ldev] --
13,137,902 UART: [fwproc] Waiting for Commands...
13,140,700 UART: [fwproc] Received command 0x46574c44
13,142,884 UART: [fwproc] Received Image of size 113844 bytes
15,834,031 UART: ROM Fatal Error: 0x000B0010
15,837,485 >>> mbox cmd response: failed
15,837,926 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,838,262 >>> mbox cmd response: failed
15,838,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,838,825 >>> mbox cmd response: failed
Initializing fuses
2,059,528 writing to cptra_bootfsm_go
2,248,917 UART:
2,249,255 UART: Running Caliptra ROM ...
2,250,388 UART:
2,250,562 UART: [state] CFI Enabled
2,318,699 UART: [state] LifecycleState = Unprovisioned
2,320,657 UART: [state] DebugLocked = No
2,322,209 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,528 UART: [kat] SHA2-256
2,496,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,772 UART: [kat] ++
2,507,319 UART: [kat] sha1
2,517,999 UART: [kat] SHA2-256
2,520,700 UART: [kat] SHA2-384
2,527,455 UART: [kat] SHA2-512-ACC
2,529,791 UART: [kat] ECC-384
4,824,238 UART: [kat] HMAC-384Kdf
4,857,978 UART: [kat] LMS
6,048,265 UART: [kat] --
6,052,107 UART: [cold-reset] ++
6,053,066 UART: [fht] Storing FHT @ 0x50003400
6,064,316 UART: [idev] ++
6,064,946 UART: [idev] CDI.KEYID = 6
6,065,828 UART: [idev] SUBJECT.KEYID = 7
6,067,100 UART: [idev] UDS.KEYID = 0
6,069,289 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,212,562 UART: [idev] Erasing UDS.KEYID = 0
9,401,547 UART: [idev] Using Sha1 for KeyId Algorithm
9,422,885 UART: [idev] --
9,426,001 UART: [ldev] ++
9,426,588 UART: [ldev] CDI.KEYID = 6
9,427,526 UART: [ldev] SUBJECT.KEYID = 5
9,428,777 UART: [ldev] AUTHORITY.KEYID = 7
9,429,953 UART: [ldev] FE.KEYID = 1
9,459,585 UART: [ldev] Erasing FE.KEYID = 1
12,791,969 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,105,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,119,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,134,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,149,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,168,277 UART: [ldev] --
15,172,708 UART: [fwproc] Waiting for Commands...
15,175,675 UART: [fwproc] Received command 0x46574c44
15,177,859 UART: [fwproc] Received Image of size 113844 bytes
19,231,598 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,308,627 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,377,573 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,694,086 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,787,134 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,534,887 >>> mbox cmd response: failed
15,535,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,535,757 >>> mbox cmd response: failed
15,536,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,536,338 >>> mbox cmd response: failed
Initializing fuses
2,055,637 writing to cptra_bootfsm_go
5,823,258 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,861,812 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,573 UART:
192,932 UART: Running Caliptra ROM ...
194,074 UART:
603,899 UART: [state] CFI Enabled
617,161 UART: [state] LifecycleState = Unprovisioned
619,114 UART: [state] DebugLocked = No
620,986 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,446 UART: [kat] SHA2-256
795,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,776 UART: [kat] ++
806,226 UART: [kat] sha1
816,774 UART: [kat] SHA2-256
819,518 UART: [kat] SHA2-384
825,661 UART: [kat] SHA2-512-ACC
827,999 UART: [kat] ECC-384
3,111,680 UART: [kat] HMAC-384Kdf
3,123,548 UART: [kat] LMS
4,313,688 UART: [kat] --
4,319,905 UART: [cold-reset] ++
4,321,466 UART: [fht] Storing FHT @ 0x50003400
4,333,942 UART: [idev] ++
4,334,519 UART: [idev] CDI.KEYID = 6
4,335,438 UART: [idev] SUBJECT.KEYID = 7
4,336,707 UART: [idev] UDS.KEYID = 0
4,339,552 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,716 UART: [idev] Erasing UDS.KEYID = 0
7,623,704 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,921 UART: [idev] --
7,650,018 UART: [ldev] ++
7,650,606 UART: [ldev] CDI.KEYID = 6
7,651,572 UART: [ldev] SUBJECT.KEYID = 5
7,652,732 UART: [ldev] AUTHORITY.KEYID = 7
7,654,020 UART: [ldev] FE.KEYID = 1
7,665,430 UART: [ldev] Erasing FE.KEYID = 1
10,953,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,205 UART: [ldev] --
13,313,469 UART: [fwproc] Waiting for Commands...
13,315,135 UART: [fwproc] Received command 0x46574c44
13,317,382 UART: [fwproc] Received Image of size 113844 bytes
16,014,176 UART: ROM Fatal Error: 0x000B0010
16,017,685 >>> mbox cmd response: failed
16,018,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,018,426 >>> mbox cmd response: failed
16,018,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,018,993 >>> mbox cmd response: failed
Initializing fuses
2,055,264 writing to cptra_bootfsm_go
2,244,576 UART:
2,244,940 UART: Running Caliptra ROM ...
2,246,074 UART:
4,432,991 UART: [state] CFI Enabled
4,448,207 UART: [state] LifecycleState = Unprovisioned
4,450,117 UART: [state] DebugLocked = No
4,451,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,456,740 UART: [kat] SHA2-256
4,626,486 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,637,054 UART: [kat] ++
4,637,516 UART: [kat] sha1
4,647,971 UART: [kat] SHA2-256
4,650,666 UART: [kat] SHA2-384
4,655,956 UART: [kat] SHA2-512-ACC
4,658,477 UART: [kat] ECC-384
6,941,203 UART: [kat] HMAC-384Kdf
6,954,182 UART: [kat] LMS
8,144,294 UART: [kat] --
8,148,589 UART: [cold-reset] ++
8,150,146 UART: [fht] Storing FHT @ 0x50003400
8,161,736 UART: [idev] ++
8,162,355 UART: [idev] CDI.KEYID = 6
8,163,234 UART: [idev] SUBJECT.KEYID = 7
8,164,499 UART: [idev] UDS.KEYID = 0
8,166,721 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,309,832 UART: [idev] Erasing UDS.KEYID = 0
11,450,703 UART: [idev] Using Sha1 for KeyId Algorithm
11,473,013 UART: [idev] --
11,477,869 UART: [ldev] ++
11,478,447 UART: [ldev] CDI.KEYID = 6
11,479,391 UART: [ldev] SUBJECT.KEYID = 5
11,480,679 UART: [ldev] AUTHORITY.KEYID = 7
11,481,775 UART: [ldev] FE.KEYID = 1
11,493,848 UART: [ldev] Erasing FE.KEYID = 1
14,783,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,075,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,089,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,104,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,119,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,137,792 UART: [ldev] --
17,142,467 UART: [fwproc] Waiting for Commands...
17,144,222 UART: [fwproc] Received command 0x46574c44
17,146,418 UART: [fwproc] Received Image of size 113844 bytes
21,188,805 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,261,546 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,330,408 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,646,671 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
4,128,262 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,759,995 >>> mbox cmd response: failed
15,760,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,978 >>> mbox cmd response: failed
15,761,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,761,481 >>> mbox cmd response: failed
Initializing fuses
2,062,131 writing to cptra_bootfsm_go
8,234,970 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,164,522 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,153 UART:
192,511 UART: Running Caliptra ROM ...
193,728 UART:
193,882 UART: [state] CFI Enabled
264,195 UART: [state] LifecycleState = Unprovisioned
266,114 UART: [state] DebugLocked = No
268,822 UART: [state] WD Timer not started. Device not locked for debugging
272,923 UART: [kat] SHA2-256
452,076 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,648 UART: [kat] ++
464,204 UART: [kat] sha1
474,999 UART: [kat] SHA2-256
478,027 UART: [kat] SHA2-384
483,747 UART: [kat] SHA2-512-ACC
486,694 UART: [kat] ECC-384
2,944,546 UART: [kat] HMAC-384Kdf
2,969,452 UART: [kat] LMS
3,498,895 UART: [kat] --
3,502,572 UART: [cold-reset] ++
3,504,297 UART: [fht] FHT @ 0x50003400
3,516,195 UART: [idev] ++
3,516,766 UART: [idev] CDI.KEYID = 6
3,517,656 UART: [idev] SUBJECT.KEYID = 7
3,518,869 UART: [idev] UDS.KEYID = 0
3,521,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,277 UART: [idev] Erasing UDS.KEYID = 0
6,023,596 UART: [idev] Sha1 KeyId Algorithm
6,046,315 UART: [idev] --
6,050,380 UART: [ldev] ++
6,050,958 UART: [ldev] CDI.KEYID = 6
6,051,883 UART: [ldev] SUBJECT.KEYID = 5
6,053,050 UART: [ldev] AUTHORITY.KEYID = 7
6,054,292 UART: [ldev] FE.KEYID = 1
6,098,654 UART: [ldev] Erasing FE.KEYID = 1
8,601,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,578 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,085 UART: [ldev] --
10,414,516 UART: [fwproc] Wait for Commands...
10,416,183 UART: [fwproc] Recv command 0x46574c44
10,418,304 UART: [fwproc] Recv'd Img size: 114168 bytes
12,458,238 UART: ROM Fatal Error: 0x000B0010
12,461,372 >>> mbox cmd response: failed
12,461,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,103 >>> mbox cmd response: failed
12,462,371 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,462,882 >>> mbox cmd response: failed
Initializing fuses
2,054,245 writing to cptra_bootfsm_go
2,243,538 UART:
2,243,890 UART: Running Caliptra ROM ...
2,244,970 UART:
2,245,125 UART: [state] CFI Enabled
2,305,847 UART: [state] LifecycleState = Unprovisioned
2,307,766 UART: [state] DebugLocked = No
2,310,315 UART: [state] WD Timer not started. Device not locked for debugging
2,314,006 UART: [kat] SHA2-256
2,493,149 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,504,714 UART: [kat] ++
2,505,173 UART: [kat] sha1
2,516,654 UART: [kat] SHA2-256
2,519,674 UART: [kat] SHA2-384
2,527,010 UART: [kat] SHA2-512-ACC
2,529,956 UART: [kat] ECC-384
4,989,974 UART: [kat] HMAC-384Kdf
5,014,191 UART: [kat] LMS
5,543,649 UART: [kat] --
5,549,097 UART: [cold-reset] ++
5,550,280 UART: [fht] FHT @ 0x50003400
5,561,968 UART: [idev] ++
5,562,553 UART: [idev] CDI.KEYID = 6
5,563,463 UART: [idev] SUBJECT.KEYID = 7
5,564,621 UART: [idev] UDS.KEYID = 0
5,566,975 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,710,663 UART: [idev] Erasing UDS.KEYID = 0
8,069,714 UART: [idev] Sha1 KeyId Algorithm
8,092,090 UART: [idev] --
8,095,959 UART: [ldev] ++
8,096,535 UART: [ldev] CDI.KEYID = 6
8,097,428 UART: [ldev] SUBJECT.KEYID = 5
8,098,647 UART: [ldev] AUTHORITY.KEYID = 7
8,099,880 UART: [ldev] FE.KEYID = 1
8,142,967 UART: [ldev] Erasing FE.KEYID = 1
10,649,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,399,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,450,979 UART: [ldev] --
12,455,057 UART: [fwproc] Wait for Commands...
12,458,026 UART: [fwproc] Recv command 0x46574c44
12,460,122 UART: [fwproc] Recv'd Img size: 114168 bytes
15,856,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,926,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,994,940 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,311,500 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,363,771 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,205,373 >>> mbox cmd response: failed
12,205,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,206,281 >>> mbox cmd response: failed
12,206,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,206,849 >>> mbox cmd response: failed
Initializing fuses
2,055,167 writing to cptra_bootfsm_go
5,429,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,112,233 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,683 UART:
193,041 UART: Running Caliptra ROM ...
194,250 UART:
603,679 UART: [state] CFI Enabled
616,096 UART: [state] LifecycleState = Unprovisioned
617,928 UART: [state] DebugLocked = No
619,809 UART: [state] WD Timer not started. Device not locked for debugging
624,328 UART: [kat] SHA2-256
803,476 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,025 UART: [kat] ++
815,562 UART: [kat] sha1
826,335 UART: [kat] SHA2-256
829,388 UART: [kat] SHA2-384
836,064 UART: [kat] SHA2-512-ACC
839,004 UART: [kat] ECC-384
3,280,310 UART: [kat] HMAC-384Kdf
3,292,765 UART: [kat] LMS
3,822,239 UART: [kat] --
3,825,104 UART: [cold-reset] ++
3,826,009 UART: [fht] FHT @ 0x50003400
3,837,178 UART: [idev] ++
3,837,759 UART: [idev] CDI.KEYID = 6
3,838,665 UART: [idev] SUBJECT.KEYID = 7
3,839,830 UART: [idev] UDS.KEYID = 0
3,842,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,733 UART: [idev] Erasing UDS.KEYID = 0
6,316,709 UART: [idev] Sha1 KeyId Algorithm
6,339,836 UART: [idev] --
6,345,402 UART: [ldev] ++
6,345,974 UART: [ldev] CDI.KEYID = 6
6,346,991 UART: [ldev] SUBJECT.KEYID = 5
6,348,097 UART: [ldev] AUTHORITY.KEYID = 7
6,349,336 UART: [ldev] FE.KEYID = 1
6,359,501 UART: [ldev] Erasing FE.KEYID = 1
8,834,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,237 UART: [ldev] --
10,622,422 UART: [fwproc] Wait for Commands...
10,624,464 UART: [fwproc] Recv command 0x46574c44
10,626,508 UART: [fwproc] Recv'd Img size: 114168 bytes
12,671,171 UART: ROM Fatal Error: 0x000B0010
12,674,295 >>> mbox cmd response: failed
12,674,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,675,039 >>> mbox cmd response: failed
12,675,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,675,607 >>> mbox cmd response: failed
Initializing fuses
2,062,459 writing to cptra_bootfsm_go
2,251,713 UART:
2,252,082 UART: Running Caliptra ROM ...
2,253,225 UART:
7,774,520 UART: [state] CFI Enabled
7,790,513 UART: [state] LifecycleState = Unprovisioned
7,792,450 UART: [state] DebugLocked = No
7,793,817 UART: [state] WD Timer not started. Device not locked for debugging
7,796,754 UART: [kat] SHA2-256
7,975,912 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,987,443 UART: [kat] ++
7,987,905 UART: [kat] sha1
7,998,847 UART: [kat] SHA2-256
8,001,865 UART: [kat] SHA2-384
8,008,072 UART: [kat] SHA2-512-ACC
8,011,022 UART: [kat] ECC-384
10,454,418 UART: [kat] HMAC-384Kdf
10,466,476 UART: [kat] LMS
10,995,973 UART: [kat] --
11,000,476 UART: [cold-reset] ++
11,002,038 UART: [fht] FHT @ 0x50003400
11,012,861 UART: [idev] ++
11,013,428 UART: [idev] CDI.KEYID = 6
11,014,308 UART: [idev] SUBJECT.KEYID = 7
11,015,516 UART: [idev] UDS.KEYID = 0
11,017,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,161,470 UART: [idev] Erasing UDS.KEYID = 0
13,487,358 UART: [idev] Sha1 KeyId Algorithm
13,510,800 UART: [idev] --
13,515,878 UART: [ldev] ++
13,516,449 UART: [ldev] CDI.KEYID = 6
13,517,360 UART: [ldev] SUBJECT.KEYID = 5
13,518,517 UART: [ldev] AUTHORITY.KEYID = 7
13,519,797 UART: [ldev] FE.KEYID = 1
13,532,837 UART: [ldev] Erasing FE.KEYID = 1
16,011,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,727,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,743,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,759,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,775,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,794,869 UART: [ldev] --
17,798,650 UART: [fwproc] Wait for Commands...
17,800,318 UART: [fwproc] Recv command 0x46574c44
17,802,423 UART: [fwproc] Recv'd Img size: 114168 bytes
21,200,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,273,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,341,827 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,659,243 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,488 writing to cptra_bootfsm_go
3,698,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,448,299 >>> mbox cmd response: failed
12,448,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,173 >>> mbox cmd response: failed
12,449,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,730 >>> mbox cmd response: failed
Initializing fuses
2,058,887 writing to cptra_bootfsm_go
11,103,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,671,426 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,209 UART:
192,561 UART: Running Caliptra ROM ...
193,771 UART:
193,930 UART: [state] CFI Enabled
261,936 UART: [state] LifecycleState = Unprovisioned
264,349 UART: [state] DebugLocked = No
265,677 UART: [state] WD Timer not started. Device not locked for debugging
269,532 UART: [kat] SHA2-256
459,423 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,197 UART: [kat] ++
470,650 UART: [kat] sha1
482,124 UART: [kat] SHA2-256
485,143 UART: [kat] SHA2-384
491,235 UART: [kat] SHA2-512-ACC
493,847 UART: [kat] ECC-384
2,944,943 UART: [kat] HMAC-384Kdf
2,969,765 UART: [kat] LMS
3,501,530 UART: [kat] --
3,506,126 UART: [cold-reset] ++
3,507,135 UART: [fht] FHT @ 0x50003400
3,518,711 UART: [idev] ++
3,519,393 UART: [idev] CDI.KEYID = 6
3,520,361 UART: [idev] SUBJECT.KEYID = 7
3,521,575 UART: [idev] UDS.KEYID = 0
3,524,034 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,843 UART: [idev] Erasing UDS.KEYID = 0
6,024,477 UART: [idev] Sha1 KeyId Algorithm
6,046,854 UART: [idev] --
6,053,232 UART: [ldev] ++
6,053,920 UART: [ldev] CDI.KEYID = 6
6,054,887 UART: [ldev] SUBJECT.KEYID = 5
6,056,056 UART: [ldev] AUTHORITY.KEYID = 7
6,057,237 UART: [ldev] FE.KEYID = 1
6,097,397 UART: [ldev] Erasing FE.KEYID = 1
8,602,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,889 UART: [ldev] --
10,409,958 UART: [fwproc] Wait for Commands...
10,411,734 UART: [fwproc] Recv command 0x46574c44
10,413,998 UART: [fwproc] Recv'd Img size: 114168 bytes
12,489,834 UART: ROM Fatal Error: 0x000B0010
12,493,457 >>> mbox cmd response: failed
12,493,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,494,150 >>> mbox cmd response: failed
12,494,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,494,708 >>> mbox cmd response: failed
Initializing fuses
2,054,360 writing to cptra_bootfsm_go
2,243,677 UART:
2,244,135 UART: Running Caliptra ROM ...
2,245,186 UART:
2,245,363 UART: [state] CFI Enabled
2,315,561 UART: [state] LifecycleState = Unprovisioned
2,317,947 UART: [state] DebugLocked = No
2,319,404 UART: [state] WD Timer not started. Device not locked for debugging
2,323,554 UART: [kat] SHA2-256
2,513,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,245 UART: [kat] ++
2,524,734 UART: [kat] sha1
2,536,472 UART: [kat] SHA2-256
2,539,460 UART: [kat] SHA2-384
2,543,841 UART: [kat] SHA2-512-ACC
2,546,466 UART: [kat] ECC-384
4,995,092 UART: [kat] HMAC-384Kdf
5,020,328 UART: [kat] LMS
5,552,131 UART: [kat] --
5,556,380 UART: [cold-reset] ++
5,558,123 UART: [fht] FHT @ 0x50003400
5,569,110 UART: [idev] ++
5,569,828 UART: [idev] CDI.KEYID = 6
5,570,745 UART: [idev] SUBJECT.KEYID = 7
5,571,963 UART: [idev] UDS.KEYID = 0
5,574,192 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,717,753 UART: [idev] Erasing UDS.KEYID = 0
8,075,814 UART: [idev] Sha1 KeyId Algorithm
8,099,224 UART: [idev] --
8,104,527 UART: [ldev] ++
8,105,212 UART: [ldev] CDI.KEYID = 6
8,106,128 UART: [ldev] SUBJECT.KEYID = 5
8,107,286 UART: [ldev] AUTHORITY.KEYID = 7
8,108,516 UART: [ldev] FE.KEYID = 1
8,148,335 UART: [ldev] Erasing FE.KEYID = 1
10,656,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,390,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,405,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,791 UART: [ldev] --
12,462,777 UART: [fwproc] Wait for Commands...
12,465,201 UART: [fwproc] Recv command 0x46574c44
12,467,467 UART: [fwproc] Recv'd Img size: 114168 bytes
15,916,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,999,332 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,115,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,657,769 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,443,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,309,952 >>> mbox cmd response: failed
12,310,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,310,830 >>> mbox cmd response: failed
12,311,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,311,392 >>> mbox cmd response: failed
Initializing fuses
2,056,285 writing to cptra_bootfsm_go
5,485,440 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,784,781 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,349 UART:
192,730 UART: Running Caliptra ROM ...
193,834 UART:
603,449 UART: [state] CFI Enabled
618,014 UART: [state] LifecycleState = Unprovisioned
620,389 UART: [state] DebugLocked = No
622,681 UART: [state] WD Timer not started. Device not locked for debugging
627,773 UART: [kat] SHA2-256
817,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,477 UART: [kat] ++
829,063 UART: [kat] sha1
839,572 UART: [kat] SHA2-256
842,581 UART: [kat] SHA2-384
846,886 UART: [kat] SHA2-512-ACC
849,445 UART: [kat] ECC-384
3,291,222 UART: [kat] HMAC-384Kdf
3,305,193 UART: [kat] LMS
3,837,024 UART: [kat] --
3,841,080 UART: [cold-reset] ++
3,842,418 UART: [fht] FHT @ 0x50003400
3,855,179 UART: [idev] ++
3,855,892 UART: [idev] CDI.KEYID = 6
3,856,780 UART: [idev] SUBJECT.KEYID = 7
3,858,000 UART: [idev] UDS.KEYID = 0
3,860,431 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,896 UART: [idev] Erasing UDS.KEYID = 0
6,334,560 UART: [idev] Sha1 KeyId Algorithm
6,355,494 UART: [idev] --
6,361,493 UART: [ldev] ++
6,362,178 UART: [ldev] CDI.KEYID = 6
6,363,093 UART: [ldev] SUBJECT.KEYID = 5
6,364,276 UART: [ldev] AUTHORITY.KEYID = 7
6,365,511 UART: [ldev] FE.KEYID = 1
6,375,507 UART: [ldev] Erasing FE.KEYID = 1
8,854,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,124 UART: [ldev] --
10,646,769 UART: [fwproc] Wait for Commands...
10,648,870 UART: [fwproc] Recv command 0x46574c44
10,651,187 UART: [fwproc] Recv'd Img size: 114168 bytes
12,727,007 UART: ROM Fatal Error: 0x000B0010
12,730,659 >>> mbox cmd response: failed
12,731,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,401 >>> mbox cmd response: failed
12,731,692 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,731,990 >>> mbox cmd response: failed
Initializing fuses
2,057,270 writing to cptra_bootfsm_go
2,246,562 UART:
2,246,904 UART: Running Caliptra ROM ...
2,247,960 UART:
7,725,930 UART: [state] CFI Enabled
7,740,696 UART: [state] LifecycleState = Unprovisioned
7,743,069 UART: [state] DebugLocked = No
7,745,760 UART: [state] WD Timer not started. Device not locked for debugging
7,750,008 UART: [kat] SHA2-256
7,939,899 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,950,705 UART: [kat] ++
7,951,271 UART: [kat] sha1
7,962,492 UART: [kat] SHA2-256
7,965,510 UART: [kat] SHA2-384
7,971,881 UART: [kat] SHA2-512-ACC
7,974,447 UART: [kat] ECC-384
10,418,415 UART: [kat] HMAC-384Kdf
10,430,105 UART: [kat] LMS
10,961,925 UART: [kat] --
10,966,401 UART: [cold-reset] ++
10,967,853 UART: [fht] FHT @ 0x50003400
10,978,467 UART: [idev] ++
10,979,142 UART: [idev] CDI.KEYID = 6
10,980,082 UART: [idev] SUBJECT.KEYID = 7
10,981,290 UART: [idev] UDS.KEYID = 0
10,983,598 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,127,068 UART: [idev] Erasing UDS.KEYID = 0
13,463,029 UART: [idev] Sha1 KeyId Algorithm
13,486,154 UART: [idev] --
13,491,226 UART: [ldev] ++
13,491,904 UART: [ldev] CDI.KEYID = 6
13,492,783 UART: [ldev] SUBJECT.KEYID = 5
13,493,995 UART: [ldev] AUTHORITY.KEYID = 7
13,495,224 UART: [ldev] FE.KEYID = 1
13,506,735 UART: [ldev] Erasing FE.KEYID = 1
15,984,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,703,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,718,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,733,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,748,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,769,516 UART: [ldev] --
17,774,678 UART: [fwproc] Wait for Commands...
17,777,103 UART: [fwproc] Recv command 0x46574c44
17,779,397 UART: [fwproc] Recv'd Img size: 114168 bytes
21,227,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,308,132 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,424,258 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,965,738 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,761,057 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,515,540 >>> mbox cmd response: failed
12,516,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,418 >>> mbox cmd response: failed
12,516,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,516,978 >>> mbox cmd response: failed
Initializing fuses
2,060,865 writing to cptra_bootfsm_go
11,105,123 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,300,575 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,828 UART: [state] LifecycleState = Unprovisioned
86,483 UART: [state] DebugLocked = No
87,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,603 UART: [kat] SHA2-256
882,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,649 UART: [kat] ++
886,801 UART: [kat] sha1
891,149 UART: [kat] SHA2-256
893,087 UART: [kat] SHA2-384
895,656 UART: [kat] SHA2-512-ACC
897,557 UART: [kat] ECC-384
903,224 UART: [kat] HMAC-384Kdf
907,648 UART: [kat] LMS
1,475,844 UART: [kat] --
1,476,581 UART: [cold-reset] ++
1,476,947 UART: [fht] Storing FHT @ 0x50003400
1,479,768 UART: [idev] ++
1,479,936 UART: [idev] CDI.KEYID = 6
1,480,296 UART: [idev] SUBJECT.KEYID = 7
1,480,720 UART: [idev] UDS.KEYID = 0
1,481,065 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,676 UART: [idev] Erasing UDS.KEYID = 0
1,505,752 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,482 UART: [idev] --
1,515,529 UART: [ldev] ++
1,515,697 UART: [ldev] CDI.KEYID = 6
1,516,060 UART: [ldev] SUBJECT.KEYID = 5
1,516,486 UART: [ldev] AUTHORITY.KEYID = 7
1,516,949 UART: [ldev] FE.KEYID = 1
1,521,923 UART: [ldev] Erasing FE.KEYID = 1
1,546,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,084 UART: [ldev] --
1,586,469 UART: [fwproc] Waiting for Commands...
1,587,122 UART: [fwproc] Received command 0x46574c44
1,587,913 UART: [fwproc] Received Image of size 114168 bytes
1,630,690 UART: ROM Fatal Error: 0x000B0010
1,631,847 >>> mbox cmd response: failed
1,631,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,853 >>> mbox cmd response: failed
1,631,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,033 UART: [kat] SHA2-256
881,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,079 UART: [kat] ++
886,231 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,102 UART: [kat] SHA2-512-ACC
897,003 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,125 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,508 UART: [idev] ++
1,479,676 UART: [idev] CDI.KEYID = 6
1,480,036 UART: [idev] SUBJECT.KEYID = 7
1,480,460 UART: [idev] UDS.KEYID = 0
1,480,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,080 UART: [idev] Erasing UDS.KEYID = 0
1,504,430 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,976 UART: [idev] --
1,514,227 UART: [ldev] ++
1,514,395 UART: [ldev] CDI.KEYID = 6
1,514,758 UART: [ldev] SUBJECT.KEYID = 5
1,515,184 UART: [ldev] AUTHORITY.KEYID = 7
1,515,647 UART: [ldev] FE.KEYID = 1
1,520,945 UART: [ldev] Erasing FE.KEYID = 1
1,545,988 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,790 UART: [ldev] --
1,585,275 UART: [fwproc] Waiting for Commands...
1,586,014 UART: [fwproc] Received command 0x46574c44
1,586,805 UART: [fwproc] Received Image of size 114168 bytes
2,882,670 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,852 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,897 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,633 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,483,048 >>> mbox cmd response: failed
1,483,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,054 >>> mbox cmd response: failed
1,483,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,373 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,576 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,228 UART: [kat] SHA2-256
882,159 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,274 UART: [kat] ++
886,426 UART: [kat] sha1
890,686 UART: [kat] SHA2-256
892,624 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,753 UART: [kat] HMAC-384Kdf
907,293 UART: [kat] LMS
1,475,489 UART: [kat] --
1,476,296 UART: [cold-reset] ++
1,476,658 UART: [fht] Storing FHT @ 0x50003400
1,479,279 UART: [idev] ++
1,479,447 UART: [idev] CDI.KEYID = 6
1,479,807 UART: [idev] SUBJECT.KEYID = 7
1,480,231 UART: [idev] UDS.KEYID = 0
1,480,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,953 UART: [idev] Erasing UDS.KEYID = 0
1,504,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,701 UART: [idev] --
1,514,652 UART: [ldev] ++
1,514,820 UART: [ldev] CDI.KEYID = 6
1,515,183 UART: [ldev] SUBJECT.KEYID = 5
1,515,609 UART: [ldev] AUTHORITY.KEYID = 7
1,516,072 UART: [ldev] FE.KEYID = 1
1,521,434 UART: [ldev] Erasing FE.KEYID = 1
1,547,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,651 UART: [ldev] --
1,586,038 UART: [fwproc] Waiting for Commands...
1,586,823 UART: [fwproc] Received command 0x46574c44
1,587,614 UART: [fwproc] Received Image of size 114168 bytes
1,631,177 UART: ROM Fatal Error: 0x000B0010
1,632,334 >>> mbox cmd response: failed
1,632,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,340 >>> mbox cmd response: failed
1,632,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,632,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,380 UART: [kat] SHA2-256
882,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,426 UART: [kat] ++
886,578 UART: [kat] sha1
890,806 UART: [kat] SHA2-256
892,744 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
903,457 UART: [kat] HMAC-384Kdf
907,999 UART: [kat] LMS
1,476,195 UART: [kat] --
1,477,030 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,045 UART: [idev] ++
1,480,213 UART: [idev] CDI.KEYID = 6
1,480,573 UART: [idev] SUBJECT.KEYID = 7
1,480,997 UART: [idev] UDS.KEYID = 0
1,481,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,759 UART: [idev] Erasing UDS.KEYID = 0
1,505,409 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,107 UART: [idev] --
1,515,028 UART: [ldev] ++
1,515,196 UART: [ldev] CDI.KEYID = 6
1,515,559 UART: [ldev] SUBJECT.KEYID = 5
1,515,985 UART: [ldev] AUTHORITY.KEYID = 7
1,516,448 UART: [ldev] FE.KEYID = 1
1,521,380 UART: [ldev] Erasing FE.KEYID = 1
1,546,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,609 UART: [ldev] --
1,586,118 UART: [fwproc] Waiting for Commands...
1,586,797 UART: [fwproc] Received command 0x46574c44
1,587,588 UART: [fwproc] Received Image of size 114168 bytes
2,884,489 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,697 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,674 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,485,531 >>> mbox cmd response: failed
1,485,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,537 >>> mbox cmd response: failed
1,485,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,543 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,730 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
893,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,609 UART: [kat] ++
897,761 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,720 UART: [kat] SHA2-512-ACC
908,621 UART: [kat] ECC-384
918,760 UART: [kat] HMAC-384Kdf
923,220 UART: [kat] LMS
1,171,548 UART: [kat] --
1,172,525 UART: [cold-reset] ++
1,172,891 UART: [fht] FHT @ 0x50003400
1,175,736 UART: [idev] ++
1,175,904 UART: [idev] CDI.KEYID = 6
1,176,264 UART: [idev] SUBJECT.KEYID = 7
1,176,688 UART: [idev] UDS.KEYID = 0
1,177,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,080 UART: [idev] Erasing UDS.KEYID = 0
1,201,985 UART: [idev] Sha1 KeyId Algorithm
1,210,477 UART: [idev] --
1,211,685 UART: [ldev] ++
1,211,853 UART: [ldev] CDI.KEYID = 6
1,212,216 UART: [ldev] SUBJECT.KEYID = 5
1,212,642 UART: [ldev] AUTHORITY.KEYID = 7
1,213,105 UART: [ldev] FE.KEYID = 1
1,218,243 UART: [ldev] Erasing FE.KEYID = 1
1,244,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,509 UART: [ldev] --
1,283,902 UART: [fwproc] Wait for Commands...
1,284,644 UART: [fwproc] Recv command 0x46574c44
1,285,372 UART: [fwproc] Recv'd Img size: 114168 bytes
1,327,795 UART: ROM Fatal Error: 0x000B0010
1,328,952 >>> mbox cmd response: failed
1,328,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,958 >>> mbox cmd response: failed
1,328,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
893,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,651 UART: [kat] ++
897,803 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,746 UART: [kat] SHA2-512-ACC
908,647 UART: [kat] ECC-384
918,094 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,171,497 UART: [cold-reset] ++
1,172,073 UART: [fht] FHT @ 0x50003400
1,174,878 UART: [idev] ++
1,175,046 UART: [idev] CDI.KEYID = 6
1,175,406 UART: [idev] SUBJECT.KEYID = 7
1,175,830 UART: [idev] UDS.KEYID = 0
1,176,175 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,942 UART: [idev] Erasing UDS.KEYID = 0
1,200,923 UART: [idev] Sha1 KeyId Algorithm
1,209,343 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,768 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,216,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,282,208 UART: [fwproc] Wait for Commands...
1,282,808 UART: [fwproc] Recv command 0x46574c44
1,283,536 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,673 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,977 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,528 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,019 >>> mbox cmd response: failed
1,182,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,025 >>> mbox cmd response: failed
1,182,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,081 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,690 UART: [state] DebugLocked = No
86,184 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
893,173 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,298 UART: [kat] ++
897,450 UART: [kat] sha1
901,564 UART: [kat] SHA2-256
903,504 UART: [kat] SHA2-384
906,239 UART: [kat] SHA2-512-ACC
908,140 UART: [kat] ECC-384
918,077 UART: [kat] HMAC-384Kdf
922,685 UART: [kat] LMS
1,171,013 UART: [kat] --
1,171,854 UART: [cold-reset] ++
1,172,202 UART: [fht] FHT @ 0x50003400
1,174,819 UART: [idev] ++
1,174,987 UART: [idev] CDI.KEYID = 6
1,175,347 UART: [idev] SUBJECT.KEYID = 7
1,175,771 UART: [idev] UDS.KEYID = 0
1,176,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,951 UART: [idev] Erasing UDS.KEYID = 0
1,200,792 UART: [idev] Sha1 KeyId Algorithm
1,209,140 UART: [idev] --
1,210,348 UART: [ldev] ++
1,210,516 UART: [ldev] CDI.KEYID = 6
1,210,879 UART: [ldev] SUBJECT.KEYID = 5
1,211,305 UART: [ldev] AUTHORITY.KEYID = 7
1,211,768 UART: [ldev] FE.KEYID = 1
1,216,922 UART: [ldev] Erasing FE.KEYID = 1
1,243,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,422 UART: [ldev] --
1,282,751 UART: [fwproc] Wait for Commands...
1,283,567 UART: [fwproc] Recv command 0x46574c44
1,284,295 UART: [fwproc] Recv'd Img size: 114168 bytes
1,326,418 UART: ROM Fatal Error: 0x000B0010
1,327,575 >>> mbox cmd response: failed
1,327,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,581 >>> mbox cmd response: failed
1,327,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
893,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,398 UART: [kat] ++
897,550 UART: [kat] sha1
901,984 UART: [kat] SHA2-256
903,924 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
918,351 UART: [kat] HMAC-384Kdf
922,909 UART: [kat] LMS
1,171,237 UART: [kat] --
1,172,120 UART: [cold-reset] ++
1,172,586 UART: [fht] FHT @ 0x50003400
1,175,127 UART: [idev] ++
1,175,295 UART: [idev] CDI.KEYID = 6
1,175,655 UART: [idev] SUBJECT.KEYID = 7
1,176,079 UART: [idev] UDS.KEYID = 0
1,176,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,667 UART: [idev] Erasing UDS.KEYID = 0
1,200,882 UART: [idev] Sha1 KeyId Algorithm
1,209,188 UART: [idev] --
1,210,086 UART: [ldev] ++
1,210,254 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,043 UART: [ldev] AUTHORITY.KEYID = 7
1,211,506 UART: [ldev] FE.KEYID = 1
1,216,798 UART: [ldev] Erasing FE.KEYID = 1
1,242,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,884 UART: [ldev] --
1,282,213 UART: [fwproc] Wait for Commands...
1,282,783 UART: [fwproc] Recv command 0x46574c44
1,283,511 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,384 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,688 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,231 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,774 >>> mbox cmd response: failed
1,180,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,780 >>> mbox cmd response: failed
1,180,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,628 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
891,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,397 UART: [kat] ++
895,549 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,394 UART: [kat] SHA2-512-ACC
906,295 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,174,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,076 UART: [ldev] ++
1,209,244 UART: [ldev] CDI.KEYID = 6
1,209,608 UART: [ldev] SUBJECT.KEYID = 5
1,210,035 UART: [ldev] AUTHORITY.KEYID = 7
1,210,498 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,408 UART: [ldev] --
1,280,832 UART: [fwproc] Wait for Commands...
1,281,631 UART: [fwproc] Recv command 0x46574c44
1,282,364 UART: [fwproc] Recv'd Img size: 114168 bytes
1,324,945 UART: ROM Fatal Error: 0x000B0010
1,326,102 >>> mbox cmd response: failed
1,326,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,108 >>> mbox cmd response: failed
1,326,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
891,034 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,163 UART: [kat] ++
895,315 UART: [kat] sha1
899,517 UART: [kat] SHA2-256
901,457 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,607 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,793 UART: [idev] ++
1,172,961 UART: [idev] CDI.KEYID = 6
1,173,322 UART: [idev] SUBJECT.KEYID = 7
1,173,747 UART: [idev] UDS.KEYID = 0
1,174,093 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,593 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,056 UART: [ldev] Erasing FE.KEYID = 1
1,240,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,334 UART: [ldev] --
1,279,700 UART: [fwproc] Wait for Commands...
1,280,275 UART: [fwproc] Recv command 0x46574c44
1,281,008 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,351 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,660 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,234 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,864 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,177,821 >>> mbox cmd response: failed
1,177,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,827 >>> mbox cmd response: failed
1,177,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,938 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,694 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,126 UART: [state] WD Timer not started. Device not locked for debugging
88,413 UART: [kat] SHA2-256
891,963 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,092 UART: [kat] ++
896,244 UART: [kat] sha1
900,430 UART: [kat] SHA2-256
902,370 UART: [kat] SHA2-384
905,137 UART: [kat] SHA2-512-ACC
907,038 UART: [kat] ECC-384
917,153 UART: [kat] HMAC-384Kdf
921,761 UART: [kat] LMS
1,170,073 UART: [kat] --
1,170,952 UART: [cold-reset] ++
1,171,416 UART: [fht] FHT @ 0x50003400
1,174,230 UART: [idev] ++
1,174,398 UART: [idev] CDI.KEYID = 6
1,174,759 UART: [idev] SUBJECT.KEYID = 7
1,175,184 UART: [idev] UDS.KEYID = 0
1,175,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,510 UART: [idev] Erasing UDS.KEYID = 0
1,200,924 UART: [idev] Sha1 KeyId Algorithm
1,209,574 UART: [idev] --
1,210,467 UART: [ldev] ++
1,210,635 UART: [ldev] CDI.KEYID = 6
1,210,999 UART: [ldev] SUBJECT.KEYID = 5
1,211,426 UART: [ldev] AUTHORITY.KEYID = 7
1,211,889 UART: [ldev] FE.KEYID = 1
1,217,007 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,015 UART: [ldev] --
1,282,337 UART: [fwproc] Wait for Commands...
1,282,938 UART: [fwproc] Recv command 0x46574c44
1,283,671 UART: [fwproc] Recv'd Img size: 114168 bytes
1,326,632 UART: ROM Fatal Error: 0x000B0010
1,327,789 >>> mbox cmd response: failed
1,327,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,795 >>> mbox cmd response: failed
1,327,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,372 UART: [idev] --
1,209,461 UART: [ldev] ++
1,209,629 UART: [ldev] CDI.KEYID = 6
1,209,993 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,127 UART: [ldev] --
1,281,451 UART: [fwproc] Wait for Commands...
1,282,124 UART: [fwproc] Recv command 0x46574c44
1,282,857 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,932 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,241 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,713 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,205 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,177,848 >>> mbox cmd response: failed
1,177,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,854 >>> mbox cmd response: failed
1,177,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,841 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,375 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
192,355 UART:
192,707 UART: Running Caliptra ROM ...
193,877 UART:
194,028 UART: [state] CFI Enabled
261,844 UART: [state] LifecycleState = Unprovisioned
263,822 UART: [state] DebugLocked = No
266,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,443 UART: [kat] SHA2-256
441,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,650 UART: [kat] ++
452,185 UART: [kat] sha1
463,648 UART: [kat] SHA2-256
466,322 UART: [kat] SHA2-384
473,278 UART: [kat] SHA2-512-ACC
475,618 UART: [kat] ECC-384
2,765,120 UART: [kat] HMAC-384Kdf
2,789,733 UART: [kat] LMS
3,980,020 UART: [kat] --
3,983,114 UART: [cold-reset] ++
3,985,054 UART: [fht] Storing FHT @ 0x50003400
3,996,757 UART: [idev] ++
3,997,380 UART: [idev] CDI.KEYID = 6
3,998,302 UART: [idev] SUBJECT.KEYID = 7
3,999,520 UART: [idev] UDS.KEYID = 0
4,002,564 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,145,992 UART: [idev] Erasing UDS.KEYID = 0
7,337,162 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,196 UART: [idev] --
7,363,061 UART: [ldev] ++
7,363,643 UART: [ldev] CDI.KEYID = 6
7,364,586 UART: [ldev] SUBJECT.KEYID = 5
7,365,799 UART: [ldev] AUTHORITY.KEYID = 7
7,367,030 UART: [ldev] FE.KEYID = 1
7,413,087 UART: [ldev] Erasing FE.KEYID = 1
10,741,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,066,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,734 UART: [ldev] --
13,106,100 UART: [fwproc] Waiting for Commands...
13,109,127 UART: [fwproc] Received command 0x46574c44
13,111,318 UART: [fwproc] Received Image of size 113844 bytes
15,810,699 UART: ROM Fatal Error: 0x000B0040
15,814,196 >>> mbox cmd response: failed
15,814,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,814,928 >>> mbox cmd response: failed
15,815,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,815,479 >>> mbox cmd response: failed
Initializing fuses
2,061,608 writing to cptra_bootfsm_go
2,250,909 UART:
2,251,251 UART: Running Caliptra ROM ...
2,252,298 UART:
2,252,448 UART: [state] CFI Enabled
2,316,200 UART: [state] LifecycleState = Unprovisioned
2,318,098 UART: [state] DebugLocked = No
2,319,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,078 UART: [kat] SHA2-256
2,493,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,281 UART: [kat] ++
2,504,740 UART: [kat] sha1
2,515,627 UART: [kat] SHA2-256
2,518,318 UART: [kat] SHA2-384
2,523,389 UART: [kat] SHA2-512-ACC
2,525,735 UART: [kat] ECC-384
4,817,162 UART: [kat] HMAC-384Kdf
4,850,253 UART: [kat] LMS
6,040,538 UART: [kat] --
6,044,607 UART: [cold-reset] ++
6,047,088 UART: [fht] Storing FHT @ 0x50003400
6,058,958 UART: [idev] ++
6,059,581 UART: [idev] CDI.KEYID = 6
6,060,513 UART: [idev] SUBJECT.KEYID = 7
6,061,737 UART: [idev] UDS.KEYID = 0
6,064,066 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,207,367 UART: [idev] Erasing UDS.KEYID = 0
9,396,765 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,197 UART: [idev] --
9,423,102 UART: [ldev] ++
9,423,725 UART: [ldev] CDI.KEYID = 6
9,424,637 UART: [ldev] SUBJECT.KEYID = 5
9,425,892 UART: [ldev] AUTHORITY.KEYID = 7
9,427,128 UART: [ldev] FE.KEYID = 1
9,473,566 UART: [ldev] Erasing FE.KEYID = 1
12,804,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,113,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,972 UART: [ldev] --
15,165,047 UART: [fwproc] Waiting for Commands...
15,166,770 UART: [fwproc] Received command 0x46574c44
15,168,962 UART: [fwproc] Received Image of size 113844 bytes
19,223,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,304,402 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,373,310 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,689,415 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,787,737 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,542,862 >>> mbox cmd response: failed
15,543,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,544,019 >>> mbox cmd response: failed
15,544,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,544,666 >>> mbox cmd response: failed
Initializing fuses
2,067,927 writing to cptra_bootfsm_go
5,843,362 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,931,080 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,370 UART:
192,723 UART: Running Caliptra ROM ...
193,913 UART:
603,560 UART: [state] CFI Enabled
619,169 UART: [state] LifecycleState = Unprovisioned
621,110 UART: [state] DebugLocked = No
623,248 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,448 UART: [kat] SHA2-256
799,621 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,784 UART: [kat] ++
809,236 UART: [kat] sha1
822,056 UART: [kat] SHA2-256
824,745 UART: [kat] SHA2-384
830,991 UART: [kat] SHA2-512-ACC
833,359 UART: [kat] ECC-384
3,118,789 UART: [kat] HMAC-384Kdf
3,129,578 UART: [kat] LMS
4,319,670 UART: [kat] --
4,324,004 UART: [cold-reset] ++
4,325,675 UART: [fht] Storing FHT @ 0x50003400
4,337,320 UART: [idev] ++
4,337,893 UART: [idev] CDI.KEYID = 6
4,338,861 UART: [idev] SUBJECT.KEYID = 7
4,340,076 UART: [idev] UDS.KEYID = 0
4,342,855 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,044 UART: [idev] Erasing UDS.KEYID = 0
7,625,390 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,445 UART: [idev] --
7,650,336 UART: [ldev] ++
7,650,908 UART: [ldev] CDI.KEYID = 6
7,651,870 UART: [ldev] SUBJECT.KEYID = 5
7,653,084 UART: [ldev] AUTHORITY.KEYID = 7
7,654,319 UART: [ldev] FE.KEYID = 1
7,665,895 UART: [ldev] Erasing FE.KEYID = 1
10,957,881 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,493 UART: [ldev] --
13,315,785 UART: [fwproc] Waiting for Commands...
13,317,885 UART: [fwproc] Received command 0x46574c44
13,320,071 UART: [fwproc] Received Image of size 113844 bytes
16,019,079 UART: ROM Fatal Error: 0x000B0040
16,022,597 >>> mbox cmd response: failed
16,023,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,367 >>> mbox cmd response: failed
16,023,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,934 >>> mbox cmd response: failed
Initializing fuses
2,054,839 writing to cptra_bootfsm_go
2,244,221 UART:
2,244,563 UART: Running Caliptra ROM ...
2,245,699 UART:
4,432,845 UART: [state] CFI Enabled
4,447,702 UART: [state] LifecycleState = Unprovisioned
4,449,607 UART: [state] DebugLocked = No
4,452,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,456,693 UART: [kat] SHA2-256
4,626,418 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,636,998 UART: [kat] ++
4,637,545 UART: [kat] sha1
4,648,167 UART: [kat] SHA2-256
4,650,872 UART: [kat] SHA2-384
4,657,458 UART: [kat] SHA2-512-ACC
4,659,808 UART: [kat] ECC-384
6,944,796 UART: [kat] HMAC-384Kdf
6,956,216 UART: [kat] LMS
8,146,320 UART: [kat] --
8,151,252 UART: [cold-reset] ++
8,153,081 UART: [fht] Storing FHT @ 0x50003400
8,164,085 UART: [idev] ++
8,164,662 UART: [idev] CDI.KEYID = 6
8,165,631 UART: [idev] SUBJECT.KEYID = 7
8,166,847 UART: [idev] UDS.KEYID = 0
8,169,214 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,312,330 UART: [idev] Erasing UDS.KEYID = 0
11,457,069 UART: [idev] Using Sha1 for KeyId Algorithm
11,478,280 UART: [idev] --
11,482,485 UART: [ldev] ++
11,483,104 UART: [ldev] CDI.KEYID = 6
11,484,038 UART: [ldev] SUBJECT.KEYID = 5
11,485,295 UART: [ldev] AUTHORITY.KEYID = 7
11,486,528 UART: [ldev] FE.KEYID = 1
11,497,534 UART: [ldev] Erasing FE.KEYID = 1
14,788,418 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,084,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,098,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,113,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,128,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,147,057 UART: [ldev] --
17,151,730 UART: [fwproc] Waiting for Commands...
17,154,278 UART: [fwproc] Received command 0x46574c44
17,156,522 UART: [fwproc] Received Image of size 113844 bytes
21,205,379 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,280,018 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,348,891 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
21,665,798 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,133,782 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,768,101 >>> mbox cmd response: failed
15,768,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,994 >>> mbox cmd response: failed
15,769,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,769,578 >>> mbox cmd response: failed
Initializing fuses
2,062,655 writing to cptra_bootfsm_go
8,217,789 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,163,318 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,413 UART:
192,792 UART: Running Caliptra ROM ...
193,985 UART:
194,131 UART: [state] CFI Enabled
257,876 UART: [state] LifecycleState = Unprovisioned
259,803 UART: [state] DebugLocked = No
262,587 UART: [state] WD Timer not started. Device not locked for debugging
266,096 UART: [kat] SHA2-256
445,210 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,747 UART: [kat] ++
457,198 UART: [kat] sha1
469,854 UART: [kat] SHA2-256
472,852 UART: [kat] SHA2-384
477,706 UART: [kat] SHA2-512-ACC
480,664 UART: [kat] ECC-384
2,942,820 UART: [kat] HMAC-384Kdf
2,966,508 UART: [kat] LMS
3,495,937 UART: [kat] --
3,499,712 UART: [cold-reset] ++
3,502,130 UART: [fht] FHT @ 0x50003400
3,513,217 UART: [idev] ++
3,514,088 UART: [idev] CDI.KEYID = 6
3,515,022 UART: [idev] SUBJECT.KEYID = 7
3,516,134 UART: [idev] UDS.KEYID = 0
3,518,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,662,225 UART: [idev] Erasing UDS.KEYID = 0
6,021,180 UART: [idev] Sha1 KeyId Algorithm
6,044,053 UART: [idev] --
6,048,492 UART: [ldev] ++
6,049,090 UART: [ldev] CDI.KEYID = 6
6,050,009 UART: [ldev] SUBJECT.KEYID = 5
6,051,177 UART: [ldev] AUTHORITY.KEYID = 7
6,052,414 UART: [ldev] FE.KEYID = 1
6,096,073 UART: [ldev] Erasing FE.KEYID = 1
8,600,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,174 UART: [ldev] --
10,410,623 UART: [fwproc] Wait for Commands...
10,412,504 UART: [fwproc] Recv command 0x46574c44
10,414,599 UART: [fwproc] Recv'd Img size: 114168 bytes
12,463,779 UART: ROM Fatal Error: 0x000B0040
12,466,896 >>> mbox cmd response: failed
12,467,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,467,580 >>> mbox cmd response: failed
12,467,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,468,253 >>> mbox cmd response: failed
Initializing fuses
2,060,786 writing to cptra_bootfsm_go
2,250,175 UART:
2,250,531 UART: Running Caliptra ROM ...
2,251,623 UART:
2,251,788 UART: [state] CFI Enabled
2,317,112 UART: [state] LifecycleState = Unprovisioned
2,318,958 UART: [state] DebugLocked = No
2,320,122 UART: [state] WD Timer not started. Device not locked for debugging
2,323,385 UART: [kat] SHA2-256
2,502,527 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,514,069 UART: [kat] ++
2,514,543 UART: [kat] sha1
2,525,309 UART: [kat] SHA2-256
2,528,343 UART: [kat] SHA2-384
2,534,767 UART: [kat] SHA2-512-ACC
2,537,711 UART: [kat] ECC-384
5,002,648 UART: [kat] HMAC-384Kdf
5,025,366 UART: [kat] LMS
5,554,846 UART: [kat] --
5,558,940 UART: [cold-reset] ++
5,560,546 UART: [fht] FHT @ 0x50003400
5,571,204 UART: [idev] ++
5,571,769 UART: [idev] CDI.KEYID = 6
5,572,676 UART: [idev] SUBJECT.KEYID = 7
5,573,890 UART: [idev] UDS.KEYID = 0
5,576,209 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,719,915 UART: [idev] Erasing UDS.KEYID = 0
8,081,613 UART: [idev] Sha1 KeyId Algorithm
8,105,439 UART: [idev] --
8,108,932 UART: [ldev] ++
8,109,513 UART: [ldev] CDI.KEYID = 6
8,110,423 UART: [ldev] SUBJECT.KEYID = 5
8,111,641 UART: [ldev] AUTHORITY.KEYID = 7
8,112,871 UART: [ldev] FE.KEYID = 1
8,153,431 UART: [ldev] Erasing FE.KEYID = 1
10,657,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,720 UART: [ldev] --
12,468,058 UART: [fwproc] Wait for Commands...
12,471,239 UART: [fwproc] Recv command 0x46574c44
12,473,280 UART: [fwproc] Recv'd Img size: 114168 bytes
15,886,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,954,188 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,022,949 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,340,018 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,386,651 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,233,477 >>> mbox cmd response: failed
12,234,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,234,440 >>> mbox cmd response: failed
12,234,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,235,004 >>> mbox cmd response: failed
Initializing fuses
2,058,636 writing to cptra_bootfsm_go
5,399,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,058,814 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,525 UART:
192,881 UART: Running Caliptra ROM ...
194,006 UART:
603,445 UART: [state] CFI Enabled
619,463 UART: [state] LifecycleState = Unprovisioned
621,351 UART: [state] DebugLocked = No
623,504 UART: [state] WD Timer not started. Device not locked for debugging
627,165 UART: [kat] SHA2-256
806,301 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,878 UART: [kat] ++
818,410 UART: [kat] sha1
830,143 UART: [kat] SHA2-256
833,144 UART: [kat] SHA2-384
839,332 UART: [kat] SHA2-512-ACC
842,315 UART: [kat] ECC-384
3,284,569 UART: [kat] HMAC-384Kdf
3,296,325 UART: [kat] LMS
3,825,859 UART: [kat] --
3,830,769 UART: [cold-reset] ++
3,832,006 UART: [fht] FHT @ 0x50003400
3,842,016 UART: [idev] ++
3,842,582 UART: [idev] CDI.KEYID = 6
3,843,566 UART: [idev] SUBJECT.KEYID = 7
3,844,731 UART: [idev] UDS.KEYID = 0
3,847,223 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,309 UART: [idev] Erasing UDS.KEYID = 0
6,320,735 UART: [idev] Sha1 KeyId Algorithm
6,344,479 UART: [idev] --
6,348,965 UART: [ldev] ++
6,349,546 UART: [ldev] CDI.KEYID = 6
6,350,453 UART: [ldev] SUBJECT.KEYID = 5
6,351,671 UART: [ldev] AUTHORITY.KEYID = 7
6,352,911 UART: [ldev] FE.KEYID = 1
6,364,917 UART: [ldev] Erasing FE.KEYID = 1
8,837,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,870 UART: [ldev] --
10,626,201 UART: [fwproc] Wait for Commands...
10,628,793 UART: [fwproc] Recv command 0x46574c44
10,630,891 UART: [fwproc] Recv'd Img size: 114168 bytes
12,682,527 UART: ROM Fatal Error: 0x000B0040
12,685,611 >>> mbox cmd response: failed
12,686,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,686,383 >>> mbox cmd response: failed
12,686,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,686,982 >>> mbox cmd response: failed
Initializing fuses
2,051,793 writing to cptra_bootfsm_go
2,241,121 UART:
2,241,487 UART: Running Caliptra ROM ...
2,242,620 UART:
7,758,172 UART: [state] CFI Enabled
7,774,158 UART: [state] LifecycleState = Unprovisioned
7,776,026 UART: [state] DebugLocked = No
7,778,010 UART: [state] WD Timer not started. Device not locked for debugging
7,781,595 UART: [kat] SHA2-256
7,960,675 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
7,972,286 UART: [kat] ++
7,972,747 UART: [kat] sha1
7,983,252 UART: [kat] SHA2-256
7,986,272 UART: [kat] SHA2-384
7,992,635 UART: [kat] SHA2-512-ACC
7,995,576 UART: [kat] ECC-384
10,434,989 UART: [kat] HMAC-384Kdf
10,447,261 UART: [kat] LMS
10,976,795 UART: [kat] --
10,982,030 UART: [cold-reset] ++
10,983,317 UART: [fht] FHT @ 0x50003400
10,994,572 UART: [idev] ++
10,995,131 UART: [idev] CDI.KEYID = 6
10,996,011 UART: [idev] SUBJECT.KEYID = 7
10,997,223 UART: [idev] UDS.KEYID = 0
10,999,572 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,143,072 UART: [idev] Erasing UDS.KEYID = 0
13,469,424 UART: [idev] Sha1 KeyId Algorithm
13,491,477 UART: [idev] --
13,495,416 UART: [ldev] ++
13,495,990 UART: [ldev] CDI.KEYID = 6
13,496,900 UART: [ldev] SUBJECT.KEYID = 5
13,498,118 UART: [ldev] AUTHORITY.KEYID = 7
13,499,353 UART: [ldev] FE.KEYID = 1
13,510,889 UART: [ldev] Erasing FE.KEYID = 1
15,984,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,701,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,717,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,733,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,748,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,769,520 UART: [ldev] --
17,773,442 UART: [fwproc] Wait for Commands...
17,774,891 UART: [fwproc] Recv command 0x46574c44
17,776,995 UART: [fwproc] Recv'd Img size: 114168 bytes
21,177,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,248,169 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,316,970 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,633,673 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,699,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,467,856 >>> mbox cmd response: failed
12,468,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,468,743 >>> mbox cmd response: failed
12,469,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,469,310 >>> mbox cmd response: failed
Initializing fuses
2,059,540 writing to cptra_bootfsm_go
11,089,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
21,653,716 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,060 UART:
192,427 UART: Running Caliptra ROM ...
193,525 UART:
193,668 UART: [state] CFI Enabled
261,613 UART: [state] LifecycleState = Unprovisioned
264,028 UART: [state] DebugLocked = No
265,496 UART: [state] WD Timer not started. Device not locked for debugging
269,234 UART: [kat] SHA2-256
459,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,873 UART: [kat] ++
470,319 UART: [kat] sha1
482,246 UART: [kat] SHA2-256
485,261 UART: [kat] SHA2-384
490,759 UART: [kat] SHA2-512-ACC
493,330 UART: [kat] ECC-384
2,950,700 UART: [kat] HMAC-384Kdf
2,971,530 UART: [kat] LMS
3,503,303 UART: [kat] --
3,507,582 UART: [cold-reset] ++
3,509,029 UART: [fht] FHT @ 0x50003400
3,520,879 UART: [idev] ++
3,521,553 UART: [idev] CDI.KEYID = 6
3,522,518 UART: [idev] SUBJECT.KEYID = 7
3,523,732 UART: [idev] UDS.KEYID = 0
3,526,465 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,329 UART: [idev] Erasing UDS.KEYID = 0
6,026,735 UART: [idev] Sha1 KeyId Algorithm
6,049,077 UART: [idev] --
6,054,167 UART: [ldev] ++
6,054,888 UART: [ldev] CDI.KEYID = 6
6,055,809 UART: [ldev] SUBJECT.KEYID = 5
6,056,975 UART: [ldev] AUTHORITY.KEYID = 7
6,058,155 UART: [ldev] FE.KEYID = 1
6,100,449 UART: [ldev] Erasing FE.KEYID = 1
8,603,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,477 UART: [ldev] --
10,413,607 UART: [fwproc] Wait for Commands...
10,415,542 UART: [fwproc] Recv command 0x46574c44
10,417,809 UART: [fwproc] Recv'd Img size: 114168 bytes
12,507,974 UART: ROM Fatal Error: 0x000B0040
12,511,649 >>> mbox cmd response: failed
12,512,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,512,395 >>> mbox cmd response: failed
12,512,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,512,966 >>> mbox cmd response: failed
Initializing fuses
2,059,542 writing to cptra_bootfsm_go
2,248,838 UART:
2,249,186 UART: Running Caliptra ROM ...
2,250,282 UART:
2,250,436 UART: [state] CFI Enabled
2,321,431 UART: [state] LifecycleState = Unprovisioned
2,323,867 UART: [state] DebugLocked = No
2,326,144 UART: [state] WD Timer not started. Device not locked for debugging
2,330,454 UART: [kat] SHA2-256
2,520,317 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,124 UART: [kat] ++
2,531,668 UART: [kat] sha1
2,543,860 UART: [kat] SHA2-256
2,546,865 UART: [kat] SHA2-384
2,552,975 UART: [kat] SHA2-512-ACC
2,555,556 UART: [kat] ECC-384
5,003,285 UART: [kat] HMAC-384Kdf
5,026,648 UART: [kat] LMS
5,558,381 UART: [kat] --
5,561,848 UART: [cold-reset] ++
5,563,622 UART: [fht] FHT @ 0x50003400
5,575,148 UART: [idev] ++
5,575,825 UART: [idev] CDI.KEYID = 6
5,576,809 UART: [idev] SUBJECT.KEYID = 7
5,578,026 UART: [idev] UDS.KEYID = 0
5,580,321 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,724,032 UART: [idev] Erasing UDS.KEYID = 0
8,086,162 UART: [idev] Sha1 KeyId Algorithm
8,108,940 UART: [idev] --
8,113,777 UART: [ldev] ++
8,114,467 UART: [ldev] CDI.KEYID = 6
8,115,352 UART: [ldev] SUBJECT.KEYID = 5
8,116,458 UART: [ldev] AUTHORITY.KEYID = 7
8,117,742 UART: [ldev] FE.KEYID = 1
8,158,070 UART: [ldev] Erasing FE.KEYID = 1
10,659,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,004 UART: [ldev] --
12,468,870 UART: [fwproc] Wait for Commands...
12,471,348 UART: [fwproc] Recv command 0x46574c44
12,473,671 UART: [fwproc] Recv'd Img size: 114168 bytes
15,909,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,098 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,645,100 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,440,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,306,873 >>> mbox cmd response: failed
12,307,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,307,882 >>> mbox cmd response: failed
12,308,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,308,470 >>> mbox cmd response: failed
Initializing fuses
2,056,898 writing to cptra_bootfsm_go
5,487,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,780,200 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,611 UART:
192,979 UART: Running Caliptra ROM ...
194,171 UART:
603,846 UART: [state] CFI Enabled
615,607 UART: [state] LifecycleState = Unprovisioned
617,984 UART: [state] DebugLocked = No
619,465 UART: [state] WD Timer not started. Device not locked for debugging
624,606 UART: [kat] SHA2-256
814,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,287 UART: [kat] ++
825,876 UART: [kat] sha1
837,733 UART: [kat] SHA2-256
840,789 UART: [kat] SHA2-384
847,675 UART: [kat] SHA2-512-ACC
850,255 UART: [kat] ECC-384
3,293,252 UART: [kat] HMAC-384Kdf
3,306,130 UART: [kat] LMS
3,837,923 UART: [kat] --
3,841,060 UART: [cold-reset] ++
3,843,054 UART: [fht] FHT @ 0x50003400
3,854,635 UART: [idev] ++
3,855,313 UART: [idev] CDI.KEYID = 6
3,856,327 UART: [idev] SUBJECT.KEYID = 7
3,857,483 UART: [idev] UDS.KEYID = 0
3,859,915 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,521 UART: [idev] Erasing UDS.KEYID = 0
6,338,513 UART: [idev] Sha1 KeyId Algorithm
6,360,623 UART: [idev] --
6,365,682 UART: [ldev] ++
6,366,371 UART: [ldev] CDI.KEYID = 6
6,367,282 UART: [ldev] SUBJECT.KEYID = 5
6,368,443 UART: [ldev] AUTHORITY.KEYID = 7
6,369,681 UART: [ldev] FE.KEYID = 1
6,382,598 UART: [ldev] Erasing FE.KEYID = 1
8,860,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,957 UART: [ldev] --
10,650,905 UART: [fwproc] Wait for Commands...
10,652,482 UART: [fwproc] Recv command 0x46574c44
10,654,807 UART: [fwproc] Recv'd Img size: 114168 bytes
12,733,397 UART: ROM Fatal Error: 0x000B0040
12,737,074 >>> mbox cmd response: failed
12,737,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,815 >>> mbox cmd response: failed
12,738,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,738,380 >>> mbox cmd response: failed
Initializing fuses
2,055,232 writing to cptra_bootfsm_go
2,244,532 UART:
2,244,875 UART: Running Caliptra ROM ...
2,246,013 UART:
7,710,751 UART: [state] CFI Enabled
7,726,494 UART: [state] LifecycleState = Unprovisioned
7,728,856 UART: [state] DebugLocked = No
7,730,192 UART: [state] WD Timer not started. Device not locked for debugging
7,735,574 UART: [kat] SHA2-256
7,925,460 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,936,204 UART: [kat] ++
7,936,803 UART: [kat] sha1
7,948,886 UART: [kat] SHA2-256
7,951,904 UART: [kat] SHA2-384
7,957,845 UART: [kat] SHA2-512-ACC
7,960,421 UART: [kat] ECC-384
10,400,286 UART: [kat] HMAC-384Kdf
10,414,290 UART: [kat] LMS
10,946,099 UART: [kat] --
10,950,046 UART: [cold-reset] ++
10,951,232 UART: [fht] FHT @ 0x50003400
10,963,529 UART: [idev] ++
10,964,207 UART: [idev] CDI.KEYID = 6
10,965,173 UART: [idev] SUBJECT.KEYID = 7
10,966,332 UART: [idev] UDS.KEYID = 0
10,969,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,112,645 UART: [idev] Erasing UDS.KEYID = 0
13,445,561 UART: [idev] Sha1 KeyId Algorithm
13,468,808 UART: [idev] --
13,474,236 UART: [ldev] ++
13,474,921 UART: [ldev] CDI.KEYID = 6
13,475,861 UART: [ldev] SUBJECT.KEYID = 5
13,477,020 UART: [ldev] AUTHORITY.KEYID = 7
13,478,255 UART: [ldev] FE.KEYID = 1
13,490,431 UART: [ldev] Erasing FE.KEYID = 1
15,965,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,684,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,700,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,715,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,730,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,749,900 UART: [ldev] --
17,754,889 UART: [fwproc] Wait for Commands...
17,758,115 UART: [fwproc] Recv command 0x46574c44
17,760,377 UART: [fwproc] Recv'd Img size: 114168 bytes
21,202,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,282,979 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,399,122 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
21,940,123 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,757,194 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,524,149 >>> mbox cmd response: failed
12,524,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,035 >>> mbox cmd response: failed
12,525,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,597 >>> mbox cmd response: failed
Initializing fuses
2,057,160 writing to cptra_bootfsm_go
11,097,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,280,304 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,783 UART: [kat] SHA2-256
881,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,829 UART: [kat] ++
885,981 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
894,882 UART: [kat] SHA2-512-ACC
896,783 UART: [kat] ECC-384
902,388 UART: [kat] HMAC-384Kdf
906,806 UART: [kat] LMS
1,475,002 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,175 UART: [fht] Storing FHT @ 0x50003400
1,478,864 UART: [idev] ++
1,479,032 UART: [idev] CDI.KEYID = 6
1,479,392 UART: [idev] SUBJECT.KEYID = 7
1,479,816 UART: [idev] UDS.KEYID = 0
1,480,161 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,096 UART: [idev] Erasing UDS.KEYID = 0
1,504,988 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,502 UART: [idev] --
1,514,529 UART: [ldev] ++
1,514,697 UART: [ldev] CDI.KEYID = 6
1,515,060 UART: [ldev] SUBJECT.KEYID = 5
1,515,486 UART: [ldev] AUTHORITY.KEYID = 7
1,515,949 UART: [ldev] FE.KEYID = 1
1,521,213 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,319 UART: [fwproc] Waiting for Commands...
1,586,064 UART: [fwproc] Received command 0x46574c44
1,586,855 UART: [fwproc] Received Image of size 114168 bytes
1,634,544 UART: ROM Fatal Error: 0x000B0040
1,635,701 >>> mbox cmd response: failed
1,635,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,707 >>> mbox cmd response: failed
1,635,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,867 UART: [kat] SHA2-256
881,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,913 UART: [kat] ++
886,065 UART: [kat] sha1
890,219 UART: [kat] SHA2-256
892,157 UART: [kat] SHA2-384
894,800 UART: [kat] SHA2-512-ACC
896,701 UART: [kat] ECC-384
902,140 UART: [kat] HMAC-384Kdf
906,582 UART: [kat] LMS
1,474,778 UART: [kat] --
1,475,763 UART: [cold-reset] ++
1,476,279 UART: [fht] Storing FHT @ 0x50003400
1,479,160 UART: [idev] ++
1,479,328 UART: [idev] CDI.KEYID = 6
1,479,688 UART: [idev] SUBJECT.KEYID = 7
1,480,112 UART: [idev] UDS.KEYID = 0
1,480,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,986 UART: [idev] Erasing UDS.KEYID = 0
1,504,692 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,364 UART: [idev] --
1,514,297 UART: [ldev] ++
1,514,465 UART: [ldev] CDI.KEYID = 6
1,514,828 UART: [ldev] SUBJECT.KEYID = 5
1,515,254 UART: [ldev] AUTHORITY.KEYID = 7
1,515,717 UART: [ldev] FE.KEYID = 1
1,520,841 UART: [ldev] Erasing FE.KEYID = 1
1,546,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,644 UART: [ldev] --
1,586,111 UART: [fwproc] Waiting for Commands...
1,586,790 UART: [fwproc] Received command 0x46574c44
1,587,581 UART: [fwproc] Received Image of size 114168 bytes
2,882,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,880 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,232 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,917 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,794 >>> mbox cmd response: failed
1,488,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,800 >>> mbox cmd response: failed
1,488,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,375 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,353 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,788 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,472 UART: [kat] SHA2-256
882,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,518 UART: [kat] ++
886,670 UART: [kat] sha1
890,796 UART: [kat] SHA2-256
892,734 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
903,017 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,938 UART: [cold-reset] ++
1,477,392 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,805 UART: [idev] Erasing UDS.KEYID = 0
1,505,225 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,693 UART: [idev] --
1,514,540 UART: [ldev] ++
1,514,708 UART: [ldev] CDI.KEYID = 6
1,515,071 UART: [ldev] SUBJECT.KEYID = 5
1,515,497 UART: [ldev] AUTHORITY.KEYID = 7
1,515,960 UART: [ldev] FE.KEYID = 1
1,521,384 UART: [ldev] Erasing FE.KEYID = 1
1,547,589 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,405 UART: [ldev] --
1,586,856 UART: [fwproc] Waiting for Commands...
1,587,523 UART: [fwproc] Received command 0x46574c44
1,588,314 UART: [fwproc] Received Image of size 114168 bytes
1,636,495 UART: ROM Fatal Error: 0x000B0040
1,637,652 >>> mbox cmd response: failed
1,637,652 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,658 >>> mbox cmd response: failed
1,637,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,930 UART: [kat] SHA2-256
892,868 UART: [kat] SHA2-384
895,543 UART: [kat] SHA2-512-ACC
897,444 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,737 UART: [kat] LMS
1,475,933 UART: [kat] --
1,476,664 UART: [cold-reset] ++
1,477,056 UART: [fht] Storing FHT @ 0x50003400
1,479,871 UART: [idev] ++
1,480,039 UART: [idev] CDI.KEYID = 6
1,480,399 UART: [idev] SUBJECT.KEYID = 7
1,480,823 UART: [idev] UDS.KEYID = 0
1,481,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,231 UART: [idev] Erasing UDS.KEYID = 0
1,506,199 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,875 UART: [idev] --
1,515,938 UART: [ldev] ++
1,516,106 UART: [ldev] CDI.KEYID = 6
1,516,469 UART: [ldev] SUBJECT.KEYID = 5
1,516,895 UART: [ldev] AUTHORITY.KEYID = 7
1,517,358 UART: [ldev] FE.KEYID = 1
1,522,386 UART: [ldev] Erasing FE.KEYID = 1
1,548,597 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,191 UART: [ldev] --
1,587,648 UART: [fwproc] Waiting for Commands...
1,588,491 UART: [fwproc] Received command 0x46574c44
1,589,282 UART: [fwproc] Received Image of size 114168 bytes
2,885,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,237 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,126 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,957 >>> mbox cmd response: failed
1,488,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,963 >>> mbox cmd response: failed
1,488,963 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,969 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,212 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
893,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,665 UART: [kat] ++
897,817 UART: [kat] sha1
902,037 UART: [kat] SHA2-256
903,977 UART: [kat] SHA2-384
906,494 UART: [kat] SHA2-512-ACC
908,395 UART: [kat] ECC-384
918,228 UART: [kat] HMAC-384Kdf
922,822 UART: [kat] LMS
1,171,150 UART: [kat] --
1,172,067 UART: [cold-reset] ++
1,172,453 UART: [fht] FHT @ 0x50003400
1,174,946 UART: [idev] ++
1,175,114 UART: [idev] CDI.KEYID = 6
1,175,474 UART: [idev] SUBJECT.KEYID = 7
1,175,898 UART: [idev] UDS.KEYID = 0
1,176,243 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,152 UART: [idev] Erasing UDS.KEYID = 0
1,201,397 UART: [idev] Sha1 KeyId Algorithm
1,209,853 UART: [idev] --
1,211,045 UART: [ldev] ++
1,211,213 UART: [ldev] CDI.KEYID = 6
1,211,576 UART: [ldev] SUBJECT.KEYID = 5
1,212,002 UART: [ldev] AUTHORITY.KEYID = 7
1,212,465 UART: [ldev] FE.KEYID = 1
1,217,537 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,545 UART: [ldev] --
1,282,808 UART: [fwproc] Wait for Commands...
1,283,472 UART: [fwproc] Recv command 0x46574c44
1,284,200 UART: [fwproc] Recv'd Img size: 114168 bytes
1,331,989 UART: ROM Fatal Error: 0x000B0040
1,333,146 >>> mbox cmd response: failed
1,333,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,152 >>> mbox cmd response: failed
1,333,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,158 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
893,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,443 UART: [kat] ++
897,595 UART: [kat] sha1
901,691 UART: [kat] SHA2-256
903,631 UART: [kat] SHA2-384
906,400 UART: [kat] SHA2-512-ACC
908,301 UART: [kat] ECC-384
917,862 UART: [kat] HMAC-384Kdf
922,358 UART: [kat] LMS
1,170,686 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,143 UART: [fht] FHT @ 0x50003400
1,174,634 UART: [idev] ++
1,174,802 UART: [idev] CDI.KEYID = 6
1,175,162 UART: [idev] SUBJECT.KEYID = 7
1,175,586 UART: [idev] UDS.KEYID = 0
1,175,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,452 UART: [idev] Erasing UDS.KEYID = 0
1,200,173 UART: [idev] Sha1 KeyId Algorithm
1,208,659 UART: [idev] --
1,209,653 UART: [ldev] ++
1,209,821 UART: [ldev] CDI.KEYID = 6
1,210,184 UART: [ldev] SUBJECT.KEYID = 5
1,210,610 UART: [ldev] AUTHORITY.KEYID = 7
1,211,073 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,282,172 UART: [fwproc] Wait for Commands...
1,282,868 UART: [fwproc] Recv command 0x46574c44
1,283,596 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,013 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,642 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,186,033 >>> mbox cmd response: failed
1,186,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,039 >>> mbox cmd response: failed
1,186,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,907 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
893,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,388 UART: [kat] ++
897,540 UART: [kat] sha1
901,930 UART: [kat] SHA2-256
903,870 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,551 UART: [kat] HMAC-384Kdf
923,225 UART: [kat] LMS
1,171,553 UART: [kat] --
1,172,274 UART: [cold-reset] ++
1,172,650 UART: [fht] FHT @ 0x50003400
1,175,395 UART: [idev] ++
1,175,563 UART: [idev] CDI.KEYID = 6
1,175,923 UART: [idev] SUBJECT.KEYID = 7
1,176,347 UART: [idev] UDS.KEYID = 0
1,176,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,133 UART: [idev] Erasing UDS.KEYID = 0
1,201,018 UART: [idev] Sha1 KeyId Algorithm
1,209,424 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,244,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,206 UART: [ldev] --
1,283,637 UART: [fwproc] Wait for Commands...
1,284,231 UART: [fwproc] Recv command 0x46574c44
1,284,959 UART: [fwproc] Recv'd Img size: 114168 bytes
1,332,482 UART: ROM Fatal Error: 0x000B0040
1,333,639 >>> mbox cmd response: failed
1,333,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,645 >>> mbox cmd response: failed
1,333,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,866 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,577 UART: [kat] SHA2-256
893,227 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,352 UART: [kat] ++
897,504 UART: [kat] sha1
901,802 UART: [kat] SHA2-256
903,742 UART: [kat] SHA2-384
906,633 UART: [kat] SHA2-512-ACC
908,534 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
923,203 UART: [kat] LMS
1,171,531 UART: [kat] --
1,172,184 UART: [cold-reset] ++
1,172,694 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,089 UART: [idev] Erasing UDS.KEYID = 0
1,201,360 UART: [idev] Sha1 KeyId Algorithm
1,209,908 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,788 UART: [ldev] Erasing FE.KEYID = 1
1,244,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,590 UART: [ldev] --
1,284,027 UART: [fwproc] Wait for Commands...
1,284,811 UART: [fwproc] Recv command 0x46574c44
1,285,539 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,941 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,300 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,149 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,188,988 >>> mbox cmd response: failed
1,188,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,994 >>> mbox cmd response: failed
1,188,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,189,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,026 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,950 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
88,122 UART: [kat] SHA2-256
891,672 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,801 UART: [kat] ++
895,953 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,507 UART: [fht] FHT @ 0x50003400
1,173,181 UART: [idev] ++
1,173,349 UART: [idev] CDI.KEYID = 6
1,173,710 UART: [idev] SUBJECT.KEYID = 7
1,174,135 UART: [idev] UDS.KEYID = 0
1,174,481 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,199,037 UART: [idev] Sha1 KeyId Algorithm
1,207,885 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,242,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,778 UART: [ldev] --
1,281,062 UART: [fwproc] Wait for Commands...
1,281,689 UART: [fwproc] Recv command 0x46574c44
1,282,422 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,554 UART: ROM Fatal Error: 0x000B0040
1,329,711 >>> mbox cmd response: failed
1,329,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,717 >>> mbox cmd response: failed
1,329,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,655 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,878 UART: [kat] SHA2-512-ACC
906,779 UART: [kat] ECC-384
916,432 UART: [kat] HMAC-384Kdf
921,046 UART: [kat] LMS
1,169,358 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,174,579 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,639 UART: [idev] Erasing UDS.KEYID = 0
1,199,701 UART: [idev] Sha1 KeyId Algorithm
1,208,655 UART: [idev] --
1,209,802 UART: [ldev] ++
1,209,970 UART: [ldev] CDI.KEYID = 6
1,210,334 UART: [ldev] SUBJECT.KEYID = 5
1,210,761 UART: [ldev] AUTHORITY.KEYID = 7
1,211,224 UART: [ldev] FE.KEYID = 1
1,216,280 UART: [ldev] Erasing FE.KEYID = 1
1,242,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,214 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,157 UART: [fwproc] Recv command 0x46574c44
1,282,890 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,035 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,257 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,566 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,086 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,574 >>> mbox cmd response: failed
1,182,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,580 >>> mbox cmd response: failed
1,182,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,586 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,872 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
87,128 UART: [state] WD Timer not started. Device not locked for debugging
88,423 UART: [kat] SHA2-256
891,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,102 UART: [kat] ++
896,254 UART: [kat] sha1
900,308 UART: [kat] SHA2-256
902,248 UART: [kat] SHA2-384
904,921 UART: [kat] SHA2-512-ACC
906,822 UART: [kat] ECC-384
916,769 UART: [kat] HMAC-384Kdf
921,355 UART: [kat] LMS
1,169,667 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,174,558 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,702 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,659 UART: [fwproc] Wait for Commands...
1,282,398 UART: [fwproc] Recv command 0x46574c44
1,283,131 UART: [fwproc] Recv'd Img size: 114168 bytes
1,330,563 UART: ROM Fatal Error: 0x000B0040
1,331,720 >>> mbox cmd response: failed
1,331,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,726 >>> mbox cmd response: failed
1,331,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
900,122 UART: [kat] SHA2-256
902,062 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
916,367 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,228 UART: [cold-reset] ++
1,170,742 UART: [fht] FHT @ 0x50003400
1,173,482 UART: [idev] ++
1,173,650 UART: [idev] CDI.KEYID = 6
1,174,011 UART: [idev] SUBJECT.KEYID = 7
1,174,436 UART: [idev] UDS.KEYID = 0
1,174,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,708 UART: [idev] Erasing UDS.KEYID = 0
1,199,816 UART: [idev] Sha1 KeyId Algorithm
1,208,806 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,445 UART: [ldev] Erasing FE.KEYID = 1
1,243,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,589 UART: [fwproc] Wait for Commands...
1,283,390 UART: [fwproc] Recv command 0x46574c44
1,284,123 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,066 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,375 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,957 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,067 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,551 >>> mbox cmd response: failed
1,183,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,557 >>> mbox cmd response: failed
1,183,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,863 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,431 UART:
192,798 UART: Running Caliptra ROM ...
193,970 UART:
194,127 UART: [state] CFI Enabled
260,077 UART: [state] LifecycleState = Unprovisioned
262,053 UART: [state] DebugLocked = No
263,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,497 UART: [kat] SHA2-256
439,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,731 UART: [kat] ++
450,187 UART: [kat] sha1
461,224 UART: [kat] SHA2-256
463,903 UART: [kat] SHA2-384
468,745 UART: [kat] SHA2-512-ACC
471,140 UART: [kat] ECC-384
2,767,013 UART: [kat] HMAC-384Kdf
2,799,614 UART: [kat] LMS
3,989,905 UART: [kat] --
3,994,305 UART: [cold-reset] ++
3,995,653 UART: [fht] Storing FHT @ 0x50003400
4,006,542 UART: [idev] ++
4,007,113 UART: [idev] CDI.KEYID = 6
4,008,092 UART: [idev] SUBJECT.KEYID = 7
4,009,314 UART: [idev] UDS.KEYID = 0
4,011,923 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,363 UART: [idev] Erasing UDS.KEYID = 0
7,343,766 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,001 UART: [idev] --
7,369,721 UART: [ldev] ++
7,370,288 UART: [ldev] CDI.KEYID = 6
7,371,233 UART: [ldev] SUBJECT.KEYID = 5
7,372,497 UART: [ldev] AUTHORITY.KEYID = 7
7,373,649 UART: [ldev] FE.KEYID = 1
7,401,987 UART: [ldev] Erasing FE.KEYID = 1
10,732,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,229 UART: [ldev] --
13,094,878 UART: [fwproc] Waiting for Commands...
13,097,692 UART: [fwproc] Received command 0x46574c44
13,099,936 UART: [fwproc] Received Image of size 113844 bytes
17,153,201 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,226,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,295,561 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,611,678 >>> mbox cmd response: success
17,613,340 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
17,738,094 UART: [afmc] ++
17,738,734 UART: [afmc] CDI.KEYID = 6
17,739,625 UART: [afmc] SUBJECT.KEYID = 7
17,740,734 UART: [afmc] AUTHORITY.KEYID = 5
20,990,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,287,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,289,533 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,303,967 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,318,806 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,333,265 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,966 UART: [afmc] --
23,357,179 UART: [cold-reset] --
23,361,742 UART: [state] Locking Datavault
23,367,634 UART: [state] Locking PCR0, PCR1 and PCR31
23,369,396 UART: [state] Locking ICCM
23,371,171 UART: [exit] Launching FMC @ 0x40000130
23,379,569 UART:
23,379,805 UART: Running Caliptra FMC ...
23,380,908 UART:
23,381,069 UART: [state] CFI Enabled
23,447,650 UART: [fht] FMC Alias Private Key: 7
25,786,159 UART: [art] Extend RT PCRs Done
25,787,390 UART: [art] Lock RT PCRs Done
25,789,097 UART: [art] Populate DV Done
25,794,528 UART: [fht] FMC Alias Private Key: 7
25,796,011 UART: [art] Derive CDI
25,796,776 UART: [art] Store in in slot 0x4
25,856,383 UART: [art] Derive Key Pair
25,857,426 UART: [art] Store priv key in slot 0x5
29,150,361 UART: [art] Derive Key Pair - Done
29,163,352 UART: [art] Signing Cert with AUTHO
29,164,691 UART: RITY.KEYID = 7
31,452,739 UART: [art] Erasing AUTHORITY.KEYID = 7
31,454,241 UART: [art] PUB.X = FFE4D7F1D0B85AB1F4E3AE6C0119B3E965D12A4F89E86F91BED45B39774AABA7F3B997CE56725309DA79DC9B1DBCBB08
31,461,496 UART: [art] PUB.Y = 103EEF2E73954BC53A6DDB555BA5807EDC1AE51E2F3568E224D0991C951D285EE086B670EFBC8DCAEE9E498D047F9C8F
31,468,802 UART: [art] SIG.R = BD02DC13E70A919961D329D7A477DC7E2302D6E95F5C17B1AED1376C010F49EC73A47FF47D40F52E02C9803F09BFF57F
31,476,146 UART: [art] SIG.S = 138419CFA728740E5CA99978327C35649C18CB91694FA64095057160C1585144DF26B0D273778386BA9E7AB691800F93
32,780,955 UART: Caliptra RT
32,781,672 UART: [state] CFI Enabled
32,943,089 UART: [rt] RT listening for mailbox commands...
32,946,497 UART:
32,946,748 UART: Running Caliptra ROM ...
32,947,856 UART:
32,948,011 UART: [state] CFI Enabled
33,007,036 UART: [state] LifecycleState = Unprovisioned
33,009,017 UART: [state] DebugLocked = No
33,011,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,015,908 UART: [kat] SHA2-256
33,185,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,196,072 UART: [kat] ++
33,196,617 UART: [kat] sha1
33,209,074 UART: [kat] SHA2-256
33,211,765 UART: [kat] SHA2-384
33,218,774 UART: [kat] SHA2-512-ACC
33,221,119 UART: [kat] ECC-384
35,514,146 UART: [kat] HMAC-384Kdf
35,545,448 UART: [kat] LMS
36,735,779 UART: [kat] --
36,739,091 UART: [update-reset] ++
39,538,160 >>> mbox cmd response: failed
39,539,992 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
39,683,260 UART: ROM Non-Fatal Error: 0x000B001F
39,684,699 UART: [state] Locking Datavault
39,685,855 UART: [state] Locking PCR0, PCR1 and PCR31
39,687,391 UART: [state] Locking ICCM
39,688,297 UART: [exit] Launching FMC @ 0x40000130
39,689,722 UART:
39,689,884 UART: Running Caliptra FMC ...
39,690,981 UART:
39,691,136 UART: [state] CFI Enabled
39,692,052 UART: [art] Extend RT PCRs Done
39,693,187 UART: [art] Lock RT PCRs Done
39,694,269 UART: [art] Populate DV Done
39,695,298 UART: [fht] FMC Alias Private Key: 7
39,696,615 UART: [art] Derive CDI
39,697,350 UART: [art] Store in in slot 0x4
39,725,758 UART: [art] Derive Key Pair
39,726,798 UART: [art] Store priv key in slot 0x5
43,019,606 UART: [art] Derive Key Pair - Done
43,032,394 UART: [art] Signing Cert with AUTHO
43,033,700 UART: RITY.KEYID = 7
45,321,174 UART: [art] Erasing AUTHORITY.KEYID = 7
45,322,686 UART: [art] PUB.X = FFE4D7F1D0B85AB1F4E3AE6C0119B3E965D12A4F89E86F91BED45B39774AABA7F3B997CE56725309DA79DC9B1DBCBB08
45,329,959 UART: [art] PUB.Y = 103EEF2E73954BC53A6DDB555BA5807EDC1AE51E2F3568E224D0991C951D285EE086B670EFBC8DCAEE9E498D047F9C8F
45,337,214 UART: [art] SIG.R = BD02DC13E70A919961D329D7A477DC7E2302D6E95F5C17B1AED1376C010F49EC73A47FF47D40F52E02C9803F09BFF57F
45,344,610 UART: [art] SIG.S = 138419CFA728740E5CA99978327C35649C18CB91694FA64095057160C1585144DF26B0D273778386BA9E7AB691800F93
46,649,412 UART: Caliptra RT
46,650,110 UART: [state] CFI Enabled
46,983,825 UART: [rt] RT listening for mailbox commands...
46,986,358 UART:
46,986,529 UART: Running Caliptra ROM ...
46,987,574 UART:
46,987,724 UART: [state] CFI Enabled
47,051,876 UART: [state] LifecycleState = Unprovisioned
47,053,803 UART: [state] DebugLocked = No
47,055,139 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,060,726 UART: [kat] SHA2-256
47,230,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,240,917 UART: [kat] ++
47,241,404 UART: [kat] sha1
47,252,729 UART: [kat] SHA2-256
47,255,405 UART: [kat] SHA2-384
47,261,188 UART: [kat] SHA2-512-ACC
47,263,537 UART: [kat] ECC-384
49,551,531 UART: [kat] HMAC-384Kdf
49,563,587 UART: [kat] LMS
50,753,894 UART: [kat] --
50,757,986 UART: [update-reset] ++
54,889,774 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,892,794 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
55,274,038 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
3,807,604 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,896,243 >>> mbox cmd response: success
17,898,077 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
23,584,903 UART:
23,585,296 UART: Running Caliptra FMC ...
23,586,412 UART:
23,586,579 UART: [state] CFI Enabled
23,655,512 UART: [fht] FMC Alias Private Key: 7
25,993,496 UART: [art] Extend RT PCRs Done
25,994,724 UART: [art] Lock RT PCRs Done
25,996,112 UART: [art] Populate DV Done
26,001,805 UART: [fht] FMC Alias Private Key: 7
26,003,409 UART: [art] Derive CDI
26,004,152 UART: [art] Store in in slot 0x4
26,064,361 UART: [art] Derive Key Pair
26,065,405 UART: [art] Store priv key in slot 0x5
29,358,270 UART: [art] Derive Key Pair - Done
29,371,110 UART: [art] Signing Cert with AUTHO
29,372,415 UART: RITY.KEYID = 7
31,659,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,660,781 UART: [art] PUB.X = 1E5A4C7EA97261D1BCC86C126A430E64D617E5A0E2A4EEDF342A098B209EAE635976642409928B33E1E7706AAF03519F
31,667,996 UART: [art] PUB.Y = 5AB6C9A6748C2B26DDC58990A7BD10F8F735EC1A43CAD9A81A1C6C82DDDFBC563C85CE6FA88F444381E1F7CC549A4F32
31,675,261 UART: [art] SIG.R = B2C35A8EAA8B987A95B93427C5EFDA1FDC701F3B184C1E55A89D7618E6ED6AA33346238733EB7A31631F0089A4E5BD65
31,682,658 UART: [art] SIG.S = 338DA57994B319A7E80F1D98868A68499B13283F9DB661ABA46E487382037D8034482FE88069D8E34CB1BBC4B3564A6E
32,988,075 UART: Caliptra RT
32,988,795 UART: [state] CFI Enabled
33,168,949 UART: [rt] RT listening for mailbox commands...
39,588,452 >>> mbox cmd response: failed
39,590,212 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
39,733,384 UART:
39,733,701 UART: Running Caliptra FMC ...
39,734,779 UART:
39,734,935 UART: [state] CFI Enabled
39,735,864 UART: [art] Extend RT PCRs Done
39,737,003 UART: [art] Lock RT PCRs Done
39,738,076 UART: [art] Populate DV Done
39,739,146 UART: [fht] FMC Alias Private Key: 7
39,740,467 UART: [art] Derive CDI
39,741,206 UART: [art] Store in in slot 0x4
39,774,836 UART: [art] Derive Key Pair
39,775,859 UART: [art] Store priv key in slot 0x5
43,069,009 UART: [art] Derive Key Pair - Done
43,081,803 UART: [art] Signing Cert with AUTHO
43,083,144 UART: RITY.KEYID = 7
45,368,934 UART: [art] Erasing AUTHORITY.KEYID = 7
45,370,441 UART: [art] PUB.X = 1E5A4C7EA97261D1BCC86C126A430E64D617E5A0E2A4EEDF342A098B209EAE635976642409928B33E1E7706AAF03519F
45,377,664 UART: [art] PUB.Y = 5AB6C9A6748C2B26DDC58990A7BD10F8F735EC1A43CAD9A81A1C6C82DDDFBC563C85CE6FA88F444381E1F7CC549A4F32
45,384,939 UART: [art] SIG.R = B2C35A8EAA8B987A95B93427C5EFDA1FDC701F3B184C1E55A89D7618E6ED6AA33346238733EB7A31631F0089A4E5BD65
45,392,517 UART: [art] SIG.S = 338DA57994B319A7E80F1D98868A68499B13283F9DB661ABA46E487382037D8034482FE88069D8E34CB1BBC4B3564A6E
46,697,938 UART: Caliptra RT
46,698,654 UART: [state] CFI Enabled
47,049,094 UART: [rt] RT listening for mailbox commands...
55,622,541 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,604 UART:
192,977 UART: Running Caliptra ROM ...
194,103 UART:
603,918 UART: [state] CFI Enabled
620,091 UART: [state] LifecycleState = Unprovisioned
622,037 UART: [state] DebugLocked = No
624,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,737 UART: [kat] SHA2-256
799,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,041 UART: [kat] ++
810,755 UART: [kat] sha1
820,246 UART: [kat] SHA2-256
822,979 UART: [kat] SHA2-384
828,628 UART: [kat] SHA2-512-ACC
830,961 UART: [kat] ECC-384
3,116,397 UART: [kat] HMAC-384Kdf
3,128,905 UART: [kat] LMS
4,319,009 UART: [kat] --
4,321,989 UART: [cold-reset] ++
4,323,330 UART: [fht] Storing FHT @ 0x50003400
4,335,408 UART: [idev] ++
4,336,015 UART: [idev] CDI.KEYID = 6
4,336,934 UART: [idev] SUBJECT.KEYID = 7
4,338,156 UART: [idev] UDS.KEYID = 0
4,340,777 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,824 UART: [idev] Erasing UDS.KEYID = 0
7,620,215 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,379 UART: [idev] --
7,647,352 UART: [ldev] ++
7,647,927 UART: [ldev] CDI.KEYID = 6
7,648,840 UART: [ldev] SUBJECT.KEYID = 5
7,650,076 UART: [ldev] AUTHORITY.KEYID = 7
7,651,315 UART: [ldev] FE.KEYID = 1
7,663,638 UART: [ldev] Erasing FE.KEYID = 1
10,949,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,980 UART: [ldev] --
13,309,658 UART: [fwproc] Waiting for Commands...
13,311,979 UART: [fwproc] Received command 0x46574c44
13,314,167 UART: [fwproc] Received Image of size 113844 bytes
17,366,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,436,617 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,505,535 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,821,575 >>> mbox cmd response: success
17,823,142 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
17,947,790 UART: [afmc] ++
17,948,420 UART: [afmc] CDI.KEYID = 6
17,949,314 UART: [afmc] SUBJECT.KEYID = 7
17,950,362 UART: [afmc] AUTHORITY.KEYID = 5
21,145,544 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,440,175 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,568 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,372 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,852 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,504,955 UART: [afmc] --
23,507,960 UART: [cold-reset] --
23,512,034 UART: [state] Locking Datavault
23,515,551 UART: [state] Locking PCR0, PCR1 and PCR31
23,517,304 UART: [state] Locking ICCM
23,518,607 UART: [exit] Launching FMC @ 0x40000130
23,527,006 UART:
23,527,254 UART: Running Caliptra FMC ...
23,528,358 UART:
23,528,522 UART: [state] CFI Enabled
23,536,341 UART: [fht] FMC Alias Private Key: 7
25,866,991 UART: [art] Extend RT PCRs Done
25,868,205 UART: [art] Lock RT PCRs Done
25,870,069 UART: [art] Populate DV Done
25,875,642 UART: [fht] FMC Alias Private Key: 7
25,877,175 UART: [art] Derive CDI
25,877,988 UART: [art] Store in in slot 0x4
25,920,199 UART: [art] Derive Key Pair
25,921,200 UART: [art] Store priv key in slot 0x5
29,163,627 UART: [art] Derive Key Pair - Done
29,176,390 UART: [art] Signing Cert with AUTHO
29,177,717 UART: RITY.KEYID = 7
31,457,401 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,928 UART: [art] PUB.X = 4F38949BE36311FB629573AD53E746B649500A902EDB2162B706B1678C355431B552195802C8699DE2A9ADF113ED77FF
31,466,156 UART: [art] PUB.Y = 0648F99EF1D5642C271B37C41DD168D07911C6E298D2331CDE153180BD8C1802BEF81DB78E0240A814D6DE0AB7F9AA3B
31,473,380 UART: [art] SIG.R = 9BDBAE89A137DEA92A975AF154EED078E4042B901F5A17F97BE4527AE62074F07B60947B7C82CD8851E878574B2F65C8
31,480,758 UART: [art] SIG.S = 1E2A2D6DCF7CACB5ED726A7BD8478303FFAA5F6189ACF34E820C4F5E10FB10C36D80F32ACEC8609C444AFD9DEEB086A8
32,785,434 UART: Caliptra RT
32,786,151 UART: [state] CFI Enabled
32,903,444 UART: [rt] RT listening for mailbox commands...
32,906,674 UART:
32,906,848 UART: Running Caliptra ROM ...
32,907,900 UART:
32,908,267 UART: [state] CFI Enabled
32,924,539 UART: [state] LifecycleState = Unprovisioned
32,926,481 UART: [state] DebugLocked = No
32,927,861 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,932,606 UART: [kat] SHA2-256
33,102,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,112,820 UART: [kat] ++
33,113,359 UART: [kat] sha1
33,125,015 UART: [kat] SHA2-256
33,127,699 UART: [kat] SHA2-384
33,134,228 UART: [kat] SHA2-512-ACC
33,136,615 UART: [kat] ECC-384
35,421,163 UART: [kat] HMAC-384Kdf
35,434,577 UART: [kat] LMS
36,624,637 UART: [kat] --
36,628,647 UART: [update-reset] ++
39,434,020 >>> mbox cmd response: failed
39,435,896 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
39,578,971 UART: ROM Non-Fatal Error: 0x000B001F
39,580,401 UART: [state] Locking Datavault
39,581,577 UART: [state] Locking PCR0, PCR1 and PCR31
39,583,113 UART: [state] Locking ICCM
39,584,024 UART: [exit] Launching FMC @ 0x40000130
39,585,450 UART:
39,585,612 UART: Running Caliptra FMC ...
39,586,723 UART:
39,586,880 UART: [state] CFI Enabled
39,587,745 UART: [art] Extend RT PCRs Done
39,588,882 UART: [art] Lock RT PCRs Done
39,589,947 UART: [art] Populate DV Done
39,590,972 UART: [fht] FMC Alias Private Key: 7
39,592,285 UART: [art] Derive CDI
39,593,020 UART: [art] Store in in slot 0x4
39,594,187 UART: [art] Derive Key Pair
39,595,124 UART: [art] Store priv key in slot 0x5
42,795,768 UART: [art] Derive Key Pair - Done
42,808,695 UART: [art] Signing Cert with AUTHO
42,810,001 UART: RITY.KEYID = 7
45,089,513 UART: [art] Erasing AUTHORITY.KEYID = 7
45,091,028 UART: [art] PUB.X = 4F38949BE36311FB629573AD53E746B649500A902EDB2162B706B1678C355431B552195802C8699DE2A9ADF113ED77FF
45,098,282 UART: [art] PUB.Y = 0648F99EF1D5642C271B37C41DD168D07911C6E298D2331CDE153180BD8C1802BEF81DB78E0240A814D6DE0AB7F9AA3B
45,105,525 UART: [art] SIG.R = 9BDBAE89A137DEA92A975AF154EED078E4042B901F5A17F97BE4527AE62074F07B60947B7C82CD8851E878574B2F65C8
45,112,870 UART: [art] SIG.S = 1E2A2D6DCF7CACB5ED726A7BD8478303FFAA5F6189ACF34E820C4F5E10FB10C36D80F32ACEC8609C444AFD9DEEB086A8
46,418,484 UART: Caliptra RT
46,419,203 UART: [state] CFI Enabled
46,709,950 UART: [rt] RT listening for mailbox commands...
46,712,749 UART:
46,713,000 UART: Running Caliptra ROM ...
46,714,056 UART:
46,714,373 UART: [state] CFI Enabled
46,725,501 UART: [state] LifecycleState = Unprovisioned
46,727,387 UART: [state] DebugLocked = No
46,728,624 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,733,014 UART: [kat] SHA2-256
46,902,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
46,913,281 UART: [kat] ++
46,913,736 UART: [kat] sha1
46,924,458 UART: [kat] SHA2-256
46,927,196 UART: [kat] SHA2-384
46,933,718 UART: [kat] SHA2-512-ACC
46,936,059 UART: [kat] ECC-384
49,221,901 UART: [kat] HMAC-384Kdf
49,233,758 UART: [kat] LMS
50,423,820 UART: [kat] --
50,430,482 UART: [update-reset] ++
54,567,233 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,570,203 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
54,951,519 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
4,125,530 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,069,156 >>> mbox cmd response: success
18,070,917 <<< Executing mbox cmd 0x46574c44 (99120 bytes) from SoC
23,708,112 UART:
23,708,511 UART: Running Caliptra FMC ...
23,709,598 UART:
23,709,752 UART: [state] CFI Enabled
23,717,580 UART: [fht] FMC Alias Private Key: 7
26,048,289 UART: [art] Extend RT PCRs Done
26,049,523 UART: [art] Lock RT PCRs Done
26,051,124 UART: [art] Populate DV Done
26,056,275 UART: [fht] FMC Alias Private Key: 7
26,057,870 UART: [art] Derive CDI
26,058,687 UART: [art] Store in in slot 0x4
26,101,400 UART: [art] Derive Key Pair
26,102,443 UART: [art] Store priv key in slot 0x5
29,344,960 UART: [art] Derive Key Pair - Done
29,357,742 UART: [art] Signing Cert with AUTHO
29,359,098 UART: RITY.KEYID = 7
31,638,527 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,036 UART: [art] PUB.X = E9EDEA869FB88E8218D3D1CC5AE06E836B6AF7E183DCEBFFB2A5479FA2250BB26D7429CFE30B2575B7BC2198A7DC7C67
31,647,320 UART: [art] PUB.Y = 303435E0F190E5B1118C8CB13AE3879C3CF73548A27EDB2B7FDD80B4EA6FA8CEAED83A12FA409B9B8FD847E32C377C44
31,654,611 UART: [art] SIG.R = 65DE20D81BE00B8EFBA775426A5728318EDCA321CD35C77BCDCF9A74578A38E2E5118C5C79A1591A7D7B88D96BE44FB6
31,661,989 UART: [art] SIG.S = BB2D83D9F0691D1BCE3DA44F6EDC9F0D41F3EDAF5F710386320380AE5CA9599BBDF807FEE56C2867B86A65BDDDA3542D
32,967,477 UART: Caliptra RT
32,968,190 UART: [state] CFI Enabled
33,086,394 UART: [rt] RT listening for mailbox commands...
39,429,358 >>> mbox cmd response: failed
39,431,167 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
39,573,989 UART:
39,574,312 UART: Running Caliptra FMC ...
39,575,382 UART:
39,575,542 UART: [state] CFI Enabled
39,576,475 UART: [art] Extend RT PCRs Done
39,577,637 UART: [art] Lock RT PCRs Done
39,578,708 UART: [art] Populate DV Done
39,579,777 UART: [fht] FMC Alias Private Key: 7
39,581,101 UART: [art] Derive CDI
39,581,839 UART: [art] Store in in slot 0x4
39,583,007 UART: [art] Derive Key Pair
39,584,003 UART: [art] Store priv key in slot 0x5
42,783,346 UART: [art] Derive Key Pair - Done
42,796,445 UART: [art] Signing Cert with AUTHO
42,797,778 UART: RITY.KEYID = 7
45,077,444 UART: [art] Erasing AUTHORITY.KEYID = 7
45,078,959 UART: [art] PUB.X = E9EDEA869FB88E8218D3D1CC5AE06E836B6AF7E183DCEBFFB2A5479FA2250BB26D7429CFE30B2575B7BC2198A7DC7C67
45,086,243 UART: [art] PUB.Y = 303435E0F190E5B1118C8CB13AE3879C3CF73548A27EDB2B7FDD80B4EA6FA8CEAED83A12FA409B9B8FD847E32C377C44
45,093,501 UART: [art] SIG.R = 65DE20D81BE00B8EFBA775426A5728318EDCA321CD35C77BCDCF9A74578A38E2E5118C5C79A1591A7D7B88D96BE44FB6
45,100,886 UART: [art] SIG.S = BB2D83D9F0691D1BCE3DA44F6EDC9F0D41F3EDAF5F710386320380AE5CA9599BBDF807FEE56C2867B86A65BDDDA3542D
46,406,194 UART: Caliptra RT
46,406,933 UART: [state] CFI Enabled
46,695,051 UART: [rt] RT listening for mailbox commands...
55,204,698 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,235 UART:
192,607 UART: Running Caliptra ROM ...
193,799 UART:
193,954 UART: [state] CFI Enabled
265,637 UART: [state] LifecycleState = Unprovisioned
267,510 UART: [state] DebugLocked = No
269,170 UART: [state] WD Timer not started. Device not locked for debugging
272,261 UART: [kat] SHA2-256
451,381 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,946 UART: [kat] ++
463,486 UART: [kat] sha1
474,477 UART: [kat] SHA2-256
477,521 UART: [kat] SHA2-384
482,864 UART: [kat] SHA2-512-ACC
485,854 UART: [kat] ECC-384
2,949,061 UART: [kat] HMAC-384Kdf
2,973,051 UART: [kat] LMS
3,502,508 UART: [kat] --
3,506,934 UART: [cold-reset] ++
3,509,297 UART: [fht] FHT @ 0x50003400
3,520,363 UART: [idev] ++
3,520,968 UART: [idev] CDI.KEYID = 6
3,521,896 UART: [idev] SUBJECT.KEYID = 7
3,523,005 UART: [idev] UDS.KEYID = 0
3,525,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,205 UART: [idev] Erasing UDS.KEYID = 0
6,029,980 UART: [idev] Sha1 KeyId Algorithm
6,051,641 UART: [idev] --
6,055,422 UART: [ldev] ++
6,055,996 UART: [ldev] CDI.KEYID = 6
6,056,887 UART: [ldev] SUBJECT.KEYID = 5
6,058,119 UART: [ldev] AUTHORITY.KEYID = 7
6,059,356 UART: [ldev] FE.KEYID = 1
6,102,098 UART: [ldev] Erasing FE.KEYID = 1
8,603,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,417 UART: [ldev] --
10,393,817 UART: [fwproc] Wait for Commands...
10,396,610 UART: [fwproc] Recv command 0x46574c44
10,398,731 UART: [fwproc] Recv'd Img size: 114168 bytes
13,795,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,866,964 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,935,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,253,407 >>> mbox cmd response: success
14,255,392 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
14,380,581 UART: [afmc] ++
14,381,208 UART: [afmc] CDI.KEYID = 6
14,382,096 UART: [afmc] SUBJECT.KEYID = 7
14,383,214 UART: [afmc] AUTHORITY.KEYID = 5
16,790,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,512,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,514,805 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,530,565 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,546,617 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,562,535 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,584,612 UART: [afmc] --
18,587,717 UART: [cold-reset] --
18,592,976 UART: [state] Locking Datavault
18,598,061 UART: [state] Locking PCR0, PCR1 and PCR31
18,599,716 UART: [state] Locking ICCM
18,601,889 UART: [exit] Launching FMC @ 0x40000130
18,610,348 UART:
18,610,585 UART: Running Caliptra FMC ...
18,611,683 UART:
18,611,845 UART: [state] CFI Enabled
18,672,009 UART: [fht] FMC Alias Private Key: 7
20,435,297 UART: [art] Extend RT PCRs Done
20,436,510 UART: [art] Lock RT PCRs Done
20,437,942 UART: [art] Populate DV Done
20,443,348 UART: [fht] FMC Alias Private Key: 7
20,445,004 UART: [art] Derive CDI
20,445,827 UART: [art] Store in in slot 0x4
20,505,387 UART: [art] Derive Key Pair
20,506,422 UART: [art] Store priv key in slot 0x5
22,969,144 UART: [art] Derive Key Pair - Done
22,981,927 UART: [art] Signing Cert with AUTHO
22,983,254 UART: RITY.KEYID = 7
24,695,041 UART: [art] Erasing AUTHORITY.KEYID = 7
24,696,551 UART: [art] PUB.X = EAE30A93205B939A84D7FC5BC06FF72717DCAE6356E67AFA3DCC27055CDFE57EEBE1A6EA47B0FA1F3B8BC4AE1CBC3ECA
24,703,866 UART: [art] PUB.Y = DC72BB3709F0EEE5CC28FE56F425283DB7D56F80C29ABA0DDD295FF6577BA0CDEEEE92B2A62594911BE9CD3E61E2C690
24,711,170 UART: [art] SIG.R = EDA6C550436632951395699145B20B66924725AE0BE7A387607D1F7C9CB24B3A35BEC1038EE083A6DE383128A06861F5
24,718,556 UART: [art] SIG.S = AE5F53B0D88C319D7F152C6A633AD05735BA6DF0AE7B8710DF02DD4EA63321B285EB990551588A69922D878B08C51779
25,696,633 UART: Caliptra RT
25,697,347 UART: [state] CFI Enabled
25,864,015 UART: [rt] RT listening for mailbox commands...
25,867,291 UART:
25,867,540 UART: Running Caliptra ROM ...
25,868,645 UART:
25,868,801 UART: [state] CFI Enabled
25,931,231 UART: [state] LifecycleState = Unprovisioned
25,933,108 UART: [state] DebugLocked = No
25,935,196 UART: [state] WD Timer not started. Device not locked for debugging
25,939,499 UART: [kat] SHA2-256
26,118,625 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,130,207 UART: [kat] ++
26,130,747 UART: [kat] sha1
26,141,260 UART: [kat] SHA2-256
26,144,267 UART: [kat] SHA2-384
26,150,195 UART: [kat] SHA2-512-ACC
26,153,143 UART: [kat] ECC-384
28,615,215 UART: [kat] HMAC-384Kdf
28,638,352 UART: [kat] LMS
29,167,829 UART: [kat] --
29,170,525 UART: [update-reset] ++
31,258,089 >>> mbox cmd response: failed
31,260,080 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
31,403,742 UART: ROM Non-Fatal Error: 0x000B001F
31,405,197 UART: [state] Locking Datavault
31,406,484 UART: [state] Locking PCR0, PCR1 and PCR31
31,408,032 UART: [state] Locking ICCM
31,408,955 UART: [exit] Launching FMC @ 0x40000130
31,410,379 UART:
31,410,553 UART: Running Caliptra FMC ...
31,411,652 UART:
31,411,807 UART: [state] CFI Enabled
31,412,728 UART: [art] Extend RT PCRs Done
31,413,866 UART: [art] Lock RT PCRs Done
31,414,931 UART: [art] Populate DV Done
31,415,961 UART: [fht] FMC Alias Private Key: 7
31,417,277 UART: [art] Derive CDI
31,418,011 UART: [art] Store in in slot 0x4
31,449,774 UART: [art] Derive Key Pair
31,450,813 UART: [art] Store priv key in slot 0x5
33,912,607 UART: [art] Derive Key Pair - Done
33,925,740 UART: [art] Signing Cert with AUTHO
33,927,079 UART: RITY.KEYID = 7
35,638,207 UART: [art] Erasing AUTHORITY.KEYID = 7
35,639,718 UART: [art] PUB.X = EAE30A93205B939A84D7FC5BC06FF72717DCAE6356E67AFA3DCC27055CDFE57EEBE1A6EA47B0FA1F3B8BC4AE1CBC3ECA
35,647,020 UART: [art] PUB.Y = DC72BB3709F0EEE5CC28FE56F425283DB7D56F80C29ABA0DDD295FF6577BA0CDEEEE92B2A62594911BE9CD3E61E2C690
35,654,332 UART: [art] SIG.R = EDA6C550436632951395699145B20B66924725AE0BE7A387607D1F7C9CB24B3A35BEC1038EE083A6DE383128A06861F5
35,661,683 UART: [art] SIG.S = AE5F53B0D88C319D7F152C6A633AD05735BA6DF0AE7B8710DF02DD4EA63321B285EB990551588A69922D878B08C51779
36,641,221 UART: Caliptra RT
36,641,937 UART: [state] CFI Enabled
36,973,455 UART: [rt] RT listening for mailbox commands...
36,976,203 UART:
36,976,464 UART: Running Caliptra ROM ...
36,977,583 UART:
36,977,740 UART: [state] CFI Enabled
37,043,449 UART: [state] LifecycleState = Unprovisioned
37,045,329 UART: [state] DebugLocked = No
37,046,816 UART: [state] WD Timer not started. Device not locked for debugging
37,050,991 UART: [kat] SHA2-256
37,230,122 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
37,241,702 UART: [kat] ++
37,242,160 UART: [kat] sha1
37,253,526 UART: [kat] SHA2-256
37,256,588 UART: [kat] SHA2-384
37,263,278 UART: [kat] SHA2-512-ACC
37,266,227 UART: [kat] ECC-384
39,728,037 UART: [kat] HMAC-384Kdf
39,749,874 UART: [kat] LMS
40,279,335 UART: [kat] --
40,283,565 UART: [update-reset] ++
43,713,631 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,717,107 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
44,099,453 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,361,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,047,595 >>> mbox cmd response: success
14,049,735 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
18,347,777 UART:
18,348,180 UART: Running Caliptra FMC ...
18,349,327 UART:
18,349,494 UART: [state] CFI Enabled
18,412,306 UART: [fht] FMC Alias Private Key: 7
20,175,668 UART: [art] Extend RT PCRs Done
20,176,899 UART: [art] Lock RT PCRs Done
20,178,208 UART: [art] Populate DV Done
20,183,682 UART: [fht] FMC Alias Private Key: 7
20,185,270 UART: [art] Derive CDI
20,186,061 UART: [art] Store in in slot 0x4
20,244,868 UART: [art] Derive Key Pair
20,245,873 UART: [art] Store priv key in slot 0x5
22,709,246 UART: [art] Derive Key Pair - Done
22,722,309 UART: [art] Signing Cert with AUTHO
22,723,620 UART: RITY.KEYID = 7
24,435,545 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,055 UART: [art] PUB.X = 34D0CBE7DFF9CF57EF8679955180BD82D17B5F91B82ACCD1126F546453D2263C155E754B33BCC3E99C17B5394B2A3F05
24,444,335 UART: [art] PUB.Y = F2E6B6A564ED45BE2EF281FEDB58BC6A6CBC51A7EBC943BEF415F0961A0230A3BE9C0988C6EE5E08141D537EF6A24096
24,451,641 UART: [art] SIG.R = 179D9612570492D8592C5B516953AA313CE5DE35FC5D6352556B073FCA2F64BC3AFDF277C528B0958987B8B144B02833
24,458,973 UART: [art] SIG.S = B945FA01C1F53CF7AEC44563C1463600B0398230DFC3F9F9E3BBD0B87205AF767998E594895C09509433D92BFD0DFA72
25,437,510 UART: Caliptra RT
25,438,225 UART: [state] CFI Enabled
25,604,820 UART: [rt] RT listening for mailbox commands...
30,840,786 >>> mbox cmd response: failed
30,842,594 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,986,296 UART:
30,986,612 UART: Running Caliptra FMC ...
30,987,651 UART:
30,987,799 UART: [state] CFI Enabled
30,988,725 UART: [art] Extend RT PCRs Done
30,989,866 UART: [art] Lock RT PCRs Done
30,990,856 UART: [art] Populate DV Done
30,991,958 UART: [fht] FMC Alias Private Key: 7
30,993,201 UART: [art] Derive CDI
30,993,927 UART: [art] Store in in slot 0x4
31,019,674 UART: [art] Derive Key Pair
31,020,676 UART: [art] Store priv key in slot 0x5
33,483,468 UART: [art] Derive Key Pair - Done
33,496,358 UART: [art] Signing Cert with AUTHO
33,497,654 UART: RITY.KEYID = 7
35,210,264 UART: [art] Erasing AUTHORITY.KEYID = 7
35,211,775 UART: [art] PUB.X = 34D0CBE7DFF9CF57EF8679955180BD82D17B5F91B82ACCD1126F546453D2263C155E754B33BCC3E99C17B5394B2A3F05
35,219,062 UART: [art] PUB.Y = F2E6B6A564ED45BE2EF281FEDB58BC6A6CBC51A7EBC943BEF415F0961A0230A3BE9C0988C6EE5E08141D537EF6A24096
35,226,354 UART: [art] SIG.R = 179D9612570492D8592C5B516953AA313CE5DE35FC5D6352556B073FCA2F64BC3AFDF277C528B0958987B8B144B02833
35,233,739 UART: [art] SIG.S = B945FA01C1F53CF7AEC44563C1463600B0398230DFC3F9F9E3BBD0B87205AF767998E594895C09509433D92BFD0DFA72
36,212,267 UART: Caliptra RT
36,212,968 UART: [state] CFI Enabled
36,553,028 UART: [rt] RT listening for mailbox commands...
43,516,895 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,633 UART:
193,000 UART: Running Caliptra ROM ...
194,143 UART:
603,860 UART: [state] CFI Enabled
622,754 UART: [state] LifecycleState = Unprovisioned
624,640 UART: [state] DebugLocked = No
626,340 UART: [state] WD Timer not started. Device not locked for debugging
629,743 UART: [kat] SHA2-256
808,873 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
820,431 UART: [kat] ++
820,962 UART: [kat] sha1
830,820 UART: [kat] SHA2-256
833,847 UART: [kat] SHA2-384
839,928 UART: [kat] SHA2-512-ACC
842,858 UART: [kat] ECC-384
3,281,540 UART: [kat] HMAC-384Kdf
3,293,450 UART: [kat] LMS
3,822,948 UART: [kat] --
3,827,908 UART: [cold-reset] ++
3,830,163 UART: [fht] FHT @ 0x50003400
3,840,388 UART: [idev] ++
3,840,956 UART: [idev] CDI.KEYID = 6
3,841,973 UART: [idev] SUBJECT.KEYID = 7
3,843,077 UART: [idev] UDS.KEYID = 0
3,845,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,253 UART: [idev] Erasing UDS.KEYID = 0
6,316,032 UART: [idev] Sha1 KeyId Algorithm
6,337,976 UART: [idev] --
6,342,104 UART: [ldev] ++
6,342,681 UART: [ldev] CDI.KEYID = 6
6,343,592 UART: [ldev] SUBJECT.KEYID = 5
6,344,754 UART: [ldev] AUTHORITY.KEYID = 7
6,345,989 UART: [ldev] FE.KEYID = 1
6,357,389 UART: [ldev] Erasing FE.KEYID = 1
8,831,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,204 UART: [ldev] --
10,622,719 UART: [fwproc] Wait for Commands...
10,625,800 UART: [fwproc] Recv command 0x46574c44
10,627,895 UART: [fwproc] Recv'd Img size: 114168 bytes
14,027,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,758 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,556 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,488,351 >>> mbox cmd response: success
14,490,361 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
14,615,830 UART: [afmc] ++
14,616,483 UART: [afmc] CDI.KEYID = 6
14,617,406 UART: [afmc] SUBJECT.KEYID = 7
14,618,518 UART: [afmc] AUTHORITY.KEYID = 5
16,993,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,712,679 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,714,515 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,730,287 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,746,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,762,241 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,785,923 UART: [afmc] --
18,790,221 UART: [cold-reset] --
18,793,990 UART: [state] Locking Datavault
18,798,159 UART: [state] Locking PCR0, PCR1 and PCR31
18,799,870 UART: [state] Locking ICCM
18,801,317 UART: [exit] Launching FMC @ 0x40000130
18,809,765 UART:
18,810,000 UART: Running Caliptra FMC ...
18,811,107 UART:
18,811,270 UART: [state] CFI Enabled
18,819,156 UART: [fht] FMC Alias Private Key: 7
20,576,036 UART: [art] Extend RT PCRs Done
20,577,237 UART: [art] Lock RT PCRs Done
20,579,049 UART: [art] Populate DV Done
20,584,621 UART: [fht] FMC Alias Private Key: 7
20,586,107 UART: [art] Derive CDI
20,586,869 UART: [art] Store in in slot 0x4
20,629,515 UART: [art] Derive Key Pair
20,630,574 UART: [art] Store priv key in slot 0x5
23,056,842 UART: [art] Derive Key Pair - Done
23,070,124 UART: [art] Signing Cert with AUTHO
23,071,430 UART: RITY.KEYID = 7
24,776,696 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,189 UART: [art] PUB.X = 7232761B2EDC78AA13DD36E34F6BB53E20D583B6373E463E7AF649DC2143154FC725A69C4AA2717C3A2E591624B5260A
24,785,464 UART: [art] PUB.Y = E8395C7DB4E5A765B21D881EB041A18006E10CBCC8F58FD2F795E851D973A73E9FA9D9A3E47A4EA91FDE85389D07C9D8
24,792,703 UART: [art] SIG.R = 7E3BF1E9875DCB867E6E44D50C8E1C8C4FE9A001A1AC4EBC26C44E2DA4902048962FD4D3CE407D24744C5F693D0C4BA5
24,800,103 UART: [art] SIG.S = EFBCEAE0134A3DDEEAC0D4488154806B23BCA5D2FD386C884A7885D04E765E98841BD4E53AD21E6E4C28D5EFE4A4C494
25,779,114 UART: Caliptra RT
25,779,828 UART: [state] CFI Enabled
25,896,475 UART: [rt] RT listening for mailbox commands...
25,899,598 UART:
25,899,854 UART: Running Caliptra ROM ...
25,900,964 UART:
25,901,124 UART: [state] CFI Enabled
25,915,515 UART: [state] LifecycleState = Unprovisioned
25,917,353 UART: [state] DebugLocked = No
25,918,972 UART: [state] WD Timer not started. Device not locked for debugging
25,921,837 UART: [kat] SHA2-256
26,100,998 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,112,612 UART: [kat] ++
26,113,066 UART: [kat] sha1
26,124,214 UART: [kat] SHA2-256
26,127,270 UART: [kat] SHA2-384
26,133,155 UART: [kat] SHA2-512-ACC
26,136,098 UART: [kat] ECC-384
28,575,390 UART: [kat] HMAC-384Kdf
28,588,313 UART: [kat] LMS
29,117,818 UART: [kat] --
29,120,677 UART: [update-reset] ++
31,210,249 >>> mbox cmd response: failed
31,212,035 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
31,355,876 UART: ROM Non-Fatal Error: 0x000B001F
31,357,314 UART: [state] Locking Datavault
31,358,474 UART: [state] Locking PCR0, PCR1 and PCR31
31,360,010 UART: [state] Locking ICCM
31,360,917 UART: [exit] Launching FMC @ 0x40000130
31,362,339 UART:
31,362,497 UART: Running Caliptra FMC ...
31,363,592 UART:
31,363,747 UART: [state] CFI Enabled
31,364,666 UART: [art] Extend RT PCRs Done
31,365,802 UART: [art] Lock RT PCRs Done
31,366,865 UART: [art] Populate DV Done
31,367,853 UART: [fht] FMC Alias Private Key: 7
31,369,178 UART: [art] Derive CDI
31,369,915 UART: [art] Store in in slot 0x4
31,371,102 UART: [art] Derive Key Pair
31,372,097 UART: [art] Store priv key in slot 0x5
33,754,625 UART: [art] Derive Key Pair - Done
33,767,889 UART: [art] Signing Cert with AUTHO
33,769,190 UART: RITY.KEYID = 7
35,474,825 UART: [art] Erasing AUTHORITY.KEYID = 7
35,476,319 UART: [art] PUB.X = 7232761B2EDC78AA13DD36E34F6BB53E20D583B6373E463E7AF649DC2143154FC725A69C4AA2717C3A2E591624B5260A
35,483,669 UART: [art] PUB.Y = E8395C7DB4E5A765B21D881EB041A18006E10CBCC8F58FD2F795E851D973A73E9FA9D9A3E47A4EA91FDE85389D07C9D8
35,490,863 UART: [art] SIG.R = 7E3BF1E9875DCB867E6E44D50C8E1C8C4FE9A001A1AC4EBC26C44E2DA4902048962FD4D3CE407D24744C5F693D0C4BA5
35,498,276 UART: [art] SIG.S = EFBCEAE0134A3DDEEAC0D4488154806B23BCA5D2FD386C884A7885D04E765E98841BD4E53AD21E6E4C28D5EFE4A4C494
36,477,662 UART: Caliptra RT
36,478,365 UART: [state] CFI Enabled
36,769,547 UART: [rt] RT listening for mailbox commands...
36,772,181 UART:
36,772,432 UART: Running Caliptra ROM ...
36,773,544 UART:
36,773,778 UART: [state] CFI Enabled
40,319,990 UART: [state] LifecycleState = Unprovisioned
40,321,906 UART: [state] DebugLocked = No
40,323,923 UART: [state] WD Timer not started. Device not locked for debugging
40,327,828 UART: [kat] SHA2-256
40,507,018 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,518,607 UART: [kat] ++
40,519,061 UART: [kat] sha1
40,530,428 UART: [kat] SHA2-256
40,533,432 UART: [kat] SHA2-384
40,539,964 UART: [kat] SHA2-512-ACC
40,542,958 UART: [kat] ECC-384
42,982,070 UART: [kat] HMAC-384Kdf
42,993,977 UART: [kat] LMS
43,523,486 UART: [kat] --
43,529,099 UART: [update-reset] ++
46,958,637 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,962,288 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
47,344,614 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,693,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,335 >>> mbox cmd response: success
14,269,360 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
18,514,571 UART:
18,515,014 UART: Running Caliptra FMC ...
18,516,173 UART:
18,516,331 UART: [state] CFI Enabled
18,523,980 UART: [fht] FMC Alias Private Key: 7
20,280,533 UART: [art] Extend RT PCRs Done
20,281,772 UART: [art] Lock RT PCRs Done
20,283,292 UART: [art] Populate DV Done
20,288,670 UART: [fht] FMC Alias Private Key: 7
20,290,275 UART: [art] Derive CDI
20,291,095 UART: [art] Store in in slot 0x4
20,333,755 UART: [art] Derive Key Pair
20,334,799 UART: [art] Store priv key in slot 0x5
22,761,483 UART: [art] Derive Key Pair - Done
22,774,472 UART: [art] Signing Cert with AUTHO
22,775,770 UART: RITY.KEYID = 7
24,481,410 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,939 UART: [art] PUB.X = 4BC42AEB9A082C27688D128FB96E2E17253AEBAE2973A306852416ECF98F33DE6284F67A2DC155F1BB2D456762ED3233
24,490,199 UART: [art] PUB.Y = A9FC4C4C5F7F7C9018B26F0E956C27D32FF71DB15CE2811E13C5173A32114D52B3467938A4D3DB6DCF86CBC97B031E06
24,497,452 UART: [art] SIG.R = 93C4EAB0427F7F2A071E941DF56A41AEF52A71A8AF6EEFBDDE29A87B586A6B4D6D57053AB9019E1C37C04034E88B1B51
24,504,905 UART: [art] SIG.S = 792080F68C330E04A8C957412CB7F67D926B53EB28BA31B4D4DDF978AAE192DE2BD61EC89923188660E1A83517D1554E
25,483,929 UART: Caliptra RT
25,484,617 UART: [state] CFI Enabled
25,601,965 UART: [rt] RT listening for mailbox commands...
30,768,965 >>> mbox cmd response: failed
30,770,822 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,914,305 UART:
30,914,622 UART: Running Caliptra FMC ...
30,915,688 UART:
30,915,845 UART: [state] CFI Enabled
30,916,705 UART: [art] Extend RT PCRs Done
30,917,844 UART: [art] Lock RT PCRs Done
30,918,909 UART: [art] Populate DV Done
30,920,031 UART: [fht] FMC Alias Private Key: 7
30,921,367 UART: [art] Derive CDI
30,922,104 UART: [art] Store in in slot 0x4
30,923,271 UART: [art] Derive Key Pair
30,924,211 UART: [art] Store priv key in slot 0x5
33,308,219 UART: [art] Derive Key Pair - Done
33,321,054 UART: [art] Signing Cert with AUTHO
33,322,365 UART: RITY.KEYID = 7
35,028,581 UART: [art] Erasing AUTHORITY.KEYID = 7
35,030,115 UART: [art] PUB.X = 4BC42AEB9A082C27688D128FB96E2E17253AEBAE2973A306852416ECF98F33DE6284F67A2DC155F1BB2D456762ED3233
35,037,384 UART: [art] PUB.Y = A9FC4C4C5F7F7C9018B26F0E956C27D32FF71DB15CE2811E13C5173A32114D52B3467938A4D3DB6DCF86CBC97B031E06
35,044,633 UART: [art] SIG.R = 93C4EAB0427F7F2A071E941DF56A41AEF52A71A8AF6EEFBDDE29A87B586A6B4D6D57053AB9019E1C37C04034E88B1B51
35,052,053 UART: [art] SIG.S = 792080F68C330E04A8C957412CB7F67D926B53EB28BA31B4D4DDF978AAE192DE2BD61EC89923188660E1A83517D1554E
36,031,705 UART: Caliptra RT
36,032,398 UART: [state] CFI Enabled
36,318,419 UART: [rt] RT listening for mailbox commands...
47,213,674 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,404 UART:
192,754 UART: Running Caliptra ROM ...
193,944 UART:
194,098 UART: [state] CFI Enabled
265,185 UART: [state] LifecycleState = Unprovisioned
267,599 UART: [state] DebugLocked = No
270,223 UART: [state] WD Timer not started. Device not locked for debugging
275,042 UART: [kat] SHA2-256
464,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,724 UART: [kat] ++
476,366 UART: [kat] sha1
488,385 UART: [kat] SHA2-256
491,389 UART: [kat] SHA2-384
497,420 UART: [kat] SHA2-512-ACC
499,982 UART: [kat] ECC-384
2,946,986 UART: [kat] HMAC-384Kdf
2,970,547 UART: [kat] LMS
3,502,297 UART: [kat] --
3,507,038 UART: [cold-reset] ++
3,507,921 UART: [fht] FHT @ 0x50003400
3,519,665 UART: [idev] ++
3,520,398 UART: [idev] CDI.KEYID = 6
3,521,292 UART: [idev] SUBJECT.KEYID = 7
3,522,561 UART: [idev] UDS.KEYID = 0
3,525,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,952 UART: [idev] Erasing UDS.KEYID = 0
6,027,872 UART: [idev] Sha1 KeyId Algorithm
6,049,981 UART: [idev] --
6,053,712 UART: [ldev] ++
6,054,395 UART: [ldev] CDI.KEYID = 6
6,055,282 UART: [ldev] SUBJECT.KEYID = 5
6,056,446 UART: [ldev] AUTHORITY.KEYID = 7
6,057,683 UART: [ldev] FE.KEYID = 1
6,099,344 UART: [ldev] Erasing FE.KEYID = 1
8,606,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,481 UART: [ldev] --
10,412,319 UART: [fwproc] Wait for Commands...
10,414,793 UART: [fwproc] Recv command 0x46574c44
10,417,111 UART: [fwproc] Recv'd Img size: 114168 bytes
13,857,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,055,212 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,597,316 >>> mbox cmd response: success
14,599,515 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
14,724,850 UART: [afmc] ++
14,725,494 UART: [afmc] CDI.KEYID = 6
14,726,575 UART: [afmc] SUBJECT.KEYID = 7
14,727,635 UART: [afmc] AUTHORITY.KEYID = 5
17,149,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,037 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,187 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,332 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,364 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,004 UART: [afmc] --
18,945,560 UART: [cold-reset] --
18,949,304 UART: [state] Locking Datavault
18,954,295 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,443 UART: [state] Locking ICCM
18,959,462 UART: [exit] Launching FMC @ 0x40000130
18,968,138 UART:
18,968,373 UART: Running Caliptra FMC ...
18,969,473 UART:
18,969,631 UART: [state] CFI Enabled
19,027,983 UART: [fht] FMC Alias Private Key: 7
20,792,370 UART: [art] Extend RT PCRs Done
20,793,589 UART: [art] Lock RT PCRs Done
20,795,265 UART: [art] Populate DV Done
20,800,351 UART: [fht] FMC Alias Private Key: 7
20,801,895 UART: [art] Derive CDI
20,802,660 UART: [art] Store in in slot 0x4
20,861,020 UART: [art] Derive Key Pair
20,862,018 UART: [art] Store priv key in slot 0x5
23,325,989 UART: [art] Derive Key Pair - Done
23,338,827 UART: [art] Signing Cert with AUTHO
23,340,137 UART: RITY.KEYID = 7
25,051,309 UART: [art] Erasing AUTHORITY.KEYID = 7
25,052,824 UART: [art] PUB.X = 995E92E2EEEA4446FE0A8ACFB00D7B8DBF42F513702ADBF57EBA725560CA41E8B9300A0855F11D3B581E070B5A577091
25,060,088 UART: [art] PUB.Y = 0EE8E02F4C41B7CF5B296E83E49D456AE63BC0F23E2A921DA1F8C672BF314CCDBA9EBC1961075FAB2B087571A6F77A6C
25,067,361 UART: [art] SIG.R = EA675FC20C4C23B6C7948B7B1EE25DB27A3B2940B712E144FE4BDD0E2D4C048FBB7D24C717CDB47529B8D8009534A2AD
25,074,789 UART: [art] SIG.S = 9E037C52963978A0DF2E477E4C2D88EEF2C1AC0950FD4BC1FDD2E2E4E3B83398AEBBF2413BDAE2509FE65E4994ACF772
26,053,397 UART: Caliptra RT
26,054,114 UART: [state] CFI Enabled
26,218,945 UART: [rt] RT listening for mailbox commands...
26,222,020 UART:
26,222,277 UART: Running Caliptra ROM ...
26,223,302 UART:
26,223,450 UART: [state] CFI Enabled
26,288,173 UART: [state] LifecycleState = Unprovisioned
26,290,267 UART: [state] DebugLocked = No
26,292,629 UART: [state] WD Timer not started. Device not locked for debugging
26,296,610 UART: [kat] SHA2-256
26,486,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,497,262 UART: [kat] ++
26,497,801 UART: [kat] sha1
26,509,824 UART: [kat] SHA2-256
26,512,865 UART: [kat] SHA2-384
26,519,129 UART: [kat] SHA2-512-ACC
26,521,700 UART: [kat] ECC-384
28,967,791 UART: [kat] HMAC-384Kdf
28,992,326 UART: [kat] LMS
29,523,884 UART: [kat] --
29,527,060 UART: [update-reset] ++
31,627,739 >>> mbox cmd response: failed
31,629,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
31,773,274 UART: ROM Non-Fatal Error: 0x000B001F
31,774,700 UART: [state] Locking Datavault
31,775,857 UART: [state] Locking PCR0, PCR1 and PCR31
31,777,396 UART: [state] Locking ICCM
31,778,305 UART: [exit] Launching FMC @ 0x40000130
31,779,737 UART:
31,779,901 UART: Running Caliptra FMC ...
31,781,023 UART:
31,781,185 UART: [state] CFI Enabled
31,782,025 UART: [art] Extend RT PCRs Done
31,783,081 UART: [art] Lock RT PCRs Done
31,784,150 UART: [art] Populate DV Done
31,785,107 UART: [fht] FMC Alias Private Key: 7
31,786,421 UART: [art] Derive CDI
31,787,151 UART: [art] Store in in slot 0x4
31,823,994 UART: [art] Derive Key Pair
31,825,191 UART: [art] Store priv key in slot 0x5
34,287,826 UART: [art] Derive Key Pair - Done
34,300,721 UART: [art] Signing Cert with AUTHO
34,302,027 UART: RITY.KEYID = 7
36,013,601 UART: [art] Erasing AUTHORITY.KEYID = 7
36,015,092 UART: [art] PUB.X = 995E92E2EEEA4446FE0A8ACFB00D7B8DBF42F513702ADBF57EBA725560CA41E8B9300A0855F11D3B581E070B5A577091
36,022,367 UART: [art] PUB.Y = 0EE8E02F4C41B7CF5B296E83E49D456AE63BC0F23E2A921DA1F8C672BF314CCDBA9EBC1961075FAB2B087571A6F77A6C
36,029,647 UART: [art] SIG.R = EA675FC20C4C23B6C7948B7B1EE25DB27A3B2940B712E144FE4BDD0E2D4C048FBB7D24C717CDB47529B8D8009534A2AD
36,037,060 UART: [art] SIG.S = 9E037C52963978A0DF2E477E4C2D88EEF2C1AC0950FD4BC1FDD2E2E4E3B83398AEBBF2413BDAE2509FE65E4994ACF772
37,016,483 UART: Caliptra RT
37,017,203 UART: [state] CFI Enabled
37,352,666 UART: [rt] RT listening for mailbox commands...
37,355,412 UART:
37,355,581 UART: Running Caliptra ROM ...
37,356,686 UART:
37,356,843 UART: [state] CFI Enabled
37,417,598 UART: [state] LifecycleState = Unprovisioned
37,419,651 UART: [state] DebugLocked = No
37,422,320 UART: [state] WD Timer not started. Device not locked for debugging
37,426,433 UART: [kat] SHA2-256
37,616,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,627,040 UART: [kat] ++
37,627,526 UART: [kat] sha1
37,638,377 UART: [kat] SHA2-256
37,641,393 UART: [kat] SHA2-384
37,648,352 UART: [kat] SHA2-512-ACC
37,650,977 UART: [kat] ECC-384
40,102,499 UART: [kat] HMAC-384Kdf
40,123,804 UART: [kat] LMS
40,655,410 UART: [kat] --
40,661,524 UART: [update-reset] ++
44,122,365 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,126,499 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
44,733,059 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,441,178 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,744,173 >>> mbox cmd response: success
14,746,492 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
19,044,873 UART:
19,045,271 UART: Running Caliptra FMC ...
19,046,377 UART:
19,046,543 UART: [state] CFI Enabled
19,116,834 UART: [fht] FMC Alias Private Key: 7
20,880,477 UART: [art] Extend RT PCRs Done
20,881,696 UART: [art] Lock RT PCRs Done
20,883,299 UART: [art] Populate DV Done
20,888,766 UART: [fht] FMC Alias Private Key: 7
20,890,308 UART: [art] Derive CDI
20,891,079 UART: [art] Store in in slot 0x4
20,948,910 UART: [art] Derive Key Pair
20,949,908 UART: [art] Store priv key in slot 0x5
23,412,875 UART: [art] Derive Key Pair - Done
23,425,665 UART: [art] Signing Cert with AUTHO
23,426,973 UART: RITY.KEYID = 7
25,138,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,213 UART: [art] PUB.X = 1511D82F3CD3BCFF184C81121111DD007AB5831ABA809DC664D4B4426384CFB7DB6E3CC76B26C5A27AA9217573BBB1F7
25,147,437 UART: [art] PUB.Y = F8F25548A23F5296B51E1FF466190B032270EE7F0678CAD7D5006C53992FBA78F1CF249A655CAC080A7DABB7C2EC21AC
25,154,685 UART: [art] SIG.R = 967648EB904A3D206113ADBADFA23D8A5A8ECBD71C7FED3767EE6EC1CB65AF2EDC6F94FF69DCE0B5BFABE2E6E06D3F87
25,162,163 UART: [art] SIG.S = 0B1F86D00CD5FCF7077F0B12463649205700FF95ED315EEE8ADA13080D1B2BFCA15BC976577DA1BC518A5BAE7234766B
26,141,161 UART: Caliptra RT
26,141,882 UART: [state] CFI Enabled
26,307,598 UART: [rt] RT listening for mailbox commands...
31,650,493 >>> mbox cmd response: failed
31,652,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
31,795,976 UART:
31,796,283 UART: Running Caliptra FMC ...
31,797,350 UART:
31,797,506 UART: [state] CFI Enabled
31,798,365 UART: [art] Extend RT PCRs Done
31,799,438 UART: [art] Lock RT PCRs Done
31,800,520 UART: [art] Populate DV Done
31,801,614 UART: [fht] FMC Alias Private Key: 7
31,802,936 UART: [art] Derive CDI
31,803,678 UART: [art] Store in in slot 0x4
31,825,556 UART: [art] Derive Key Pair
31,826,560 UART: [art] Store priv key in slot 0x5
34,289,744 UART: [art] Derive Key Pair - Done
34,302,260 UART: [art] Signing Cert with AUTHO
34,303,575 UART: RITY.KEYID = 7
36,015,650 UART: [art] Erasing AUTHORITY.KEYID = 7
36,017,160 UART: [art] PUB.X = 1511D82F3CD3BCFF184C81121111DD007AB5831ABA809DC664D4B4426384CFB7DB6E3CC76B26C5A27AA9217573BBB1F7
36,024,442 UART: [art] PUB.Y = F8F25548A23F5296B51E1FF466190B032270EE7F0678CAD7D5006C53992FBA78F1CF249A655CAC080A7DABB7C2EC21AC
36,031,716 UART: [art] SIG.R = 967648EB904A3D206113ADBADFA23D8A5A8ECBD71C7FED3767EE6EC1CB65AF2EDC6F94FF69DCE0B5BFABE2E6E06D3F87
36,039,168 UART: [art] SIG.S = 0B1F86D00CD5FCF7077F0B12463649205700FF95ED315EEE8ADA13080D1B2BFCA15BC976577DA1BC518A5BAE7234766B
37,017,989 UART: Caliptra RT
37,018,704 UART: [state] CFI Enabled
37,359,002 UART: [rt] RT listening for mailbox commands...
45,026,008 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,411 UART:
192,791 UART: Running Caliptra ROM ...
194,096 UART:
603,574 UART: [state] CFI Enabled
618,331 UART: [state] LifecycleState = Unprovisioned
620,706 UART: [state] DebugLocked = No
622,953 UART: [state] WD Timer not started. Device not locked for debugging
627,141 UART: [kat] SHA2-256
816,993 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,782 UART: [kat] ++
828,373 UART: [kat] sha1
839,149 UART: [kat] SHA2-256
842,163 UART: [kat] SHA2-384
849,004 UART: [kat] SHA2-512-ACC
851,569 UART: [kat] ECC-384
3,294,435 UART: [kat] HMAC-384Kdf
3,307,931 UART: [kat] LMS
3,839,756 UART: [kat] --
3,843,530 UART: [cold-reset] ++
3,844,491 UART: [fht] FHT @ 0x50003400
3,854,658 UART: [idev] ++
3,855,379 UART: [idev] CDI.KEYID = 6
3,856,315 UART: [idev] SUBJECT.KEYID = 7
3,857,536 UART: [idev] UDS.KEYID = 0
3,859,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,629 UART: [idev] Erasing UDS.KEYID = 0
6,331,107 UART: [idev] Sha1 KeyId Algorithm
6,352,450 UART: [idev] --
6,356,208 UART: [ldev] ++
6,356,899 UART: [ldev] CDI.KEYID = 6
6,357,812 UART: [ldev] SUBJECT.KEYID = 5
6,358,975 UART: [ldev] AUTHORITY.KEYID = 7
6,360,229 UART: [ldev] FE.KEYID = 1
6,370,499 UART: [ldev] Erasing FE.KEYID = 1
8,845,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,577,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,014 UART: [ldev] --
10,635,147 UART: [fwproc] Wait for Commands...
10,637,190 UART: [fwproc] Recv command 0x46574c44
10,639,508 UART: [fwproc] Recv'd Img size: 114168 bytes
14,091,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,080 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,281,268 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,823,460 >>> mbox cmd response: success
14,825,640 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
14,950,633 UART: [afmc] ++
14,951,271 UART: [afmc] CDI.KEYID = 6
14,952,193 UART: [afmc] SUBJECT.KEYID = 7
14,953,305 UART: [afmc] AUTHORITY.KEYID = 5
17,336,903 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,056,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,058,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,073,877 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,088,985 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,104,037 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,127,453 UART: [afmc] --
19,131,751 UART: [cold-reset] --
19,134,761 UART: [state] Locking Datavault
19,140,595 UART: [state] Locking PCR0, PCR1 and PCR31
19,142,806 UART: [state] Locking ICCM
19,144,313 UART: [exit] Launching FMC @ 0x40000130
19,152,954 UART:
19,153,194 UART: Running Caliptra FMC ...
19,154,296 UART:
19,154,458 UART: [state] CFI Enabled
19,162,508 UART: [fht] FMC Alias Private Key: 7
20,919,230 UART: [art] Extend RT PCRs Done
20,920,463 UART: [art] Lock RT PCRs Done
20,922,549 UART: [art] Populate DV Done
20,927,967 UART: [fht] FMC Alias Private Key: 7
20,929,563 UART: [art] Derive CDI
20,930,379 UART: [art] Store in in slot 0x4
20,973,351 UART: [art] Derive Key Pair
20,974,388 UART: [art] Store priv key in slot 0x5
23,400,786 UART: [art] Derive Key Pair - Done
23,414,052 UART: [art] Signing Cert with AUTHO
23,415,357 UART: RITY.KEYID = 7
25,120,966 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,470 UART: [art] PUB.X = 669406B644718CAF4A5E69269172AF834E2AAD114479DB89FB4B6527D71F80177C968812EF93EE760B6B6AD7D0DEEFD3
25,129,727 UART: [art] PUB.Y = 1FD5A37E0A99C8B5155EC2AF6CDF139217531F8DBBA51AC74685E906F261B6770800A3E235FB630035D40AF200ADD24F
25,136,994 UART: [art] SIG.R = 918E04B8A072E76195E1FDC79249CEF0F98AD5AA74E3DFDEECAE82755DC2A6AAABBFBD827CA93F7F06AF5E0462E8AE2D
25,144,404 UART: [art] SIG.S = 0755E956B04CF53753B06D47DA5829833B69778EB73FA1648DCA6D3E9D8E5837D1323705268237BE2FED7DB3BE1F67C1
26,123,851 UART: Caliptra RT
26,124,558 UART: [state] CFI Enabled
26,242,758 UART: [rt] RT listening for mailbox commands...
26,245,754 UART:
26,246,011 UART: Running Caliptra ROM ...
26,247,042 UART:
26,247,361 UART: [state] CFI Enabled
26,258,878 UART: [state] LifecycleState = Unprovisioned
26,260,758 UART: [state] DebugLocked = No
26,262,629 UART: [state] WD Timer not started. Device not locked for debugging
26,268,057 UART: [kat] SHA2-256
26,457,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,468,729 UART: [kat] ++
26,469,245 UART: [kat] sha1
26,480,489 UART: [kat] SHA2-256
26,483,514 UART: [kat] SHA2-384
26,489,559 UART: [kat] SHA2-512-ACC
26,492,127 UART: [kat] ECC-384
28,935,323 UART: [kat] HMAC-384Kdf
28,946,751 UART: [kat] LMS
29,478,354 UART: [kat] --
29,482,452 UART: [update-reset] ++
31,580,803 >>> mbox cmd response: failed
31,582,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
31,726,080 UART: ROM Non-Fatal Error: 0x000B001F
31,727,516 UART: [state] Locking Datavault
31,728,676 UART: [state] Locking PCR0, PCR1 and PCR31
31,730,236 UART: [state] Locking ICCM
31,731,147 UART: [exit] Launching FMC @ 0x40000130
31,732,579 UART:
31,732,740 UART: Running Caliptra FMC ...
31,733,847 UART:
31,734,004 UART: [state] CFI Enabled
31,734,938 UART: [art] Extend RT PCRs Done
31,736,002 UART: [art] Lock RT PCRs Done
31,737,068 UART: [art] Populate DV Done
31,738,018 UART: [fht] FMC Alias Private Key: 7
31,739,252 UART: [art] Derive CDI
31,739,981 UART: [art] Store in in slot 0x4
31,741,152 UART: [art] Derive Key Pair
31,742,109 UART: [art] Store priv key in slot 0x5
34,126,395 UART: [art] Derive Key Pair - Done
34,139,403 UART: [art] Signing Cert with AUTHO
34,140,731 UART: RITY.KEYID = 7
35,846,431 UART: [art] Erasing AUTHORITY.KEYID = 7
35,847,917 UART: [art] PUB.X = 669406B644718CAF4A5E69269172AF834E2AAD114479DB89FB4B6527D71F80177C968812EF93EE760B6B6AD7D0DEEFD3
35,855,249 UART: [art] PUB.Y = 1FD5A37E0A99C8B5155EC2AF6CDF139217531F8DBBA51AC74685E906F261B6770800A3E235FB630035D40AF200ADD24F
35,862,444 UART: [art] SIG.R = 918E04B8A072E76195E1FDC79249CEF0F98AD5AA74E3DFDEECAE82755DC2A6AAABBFBD827CA93F7F06AF5E0462E8AE2D
35,869,853 UART: [art] SIG.S = 0755E956B04CF53753B06D47DA5829833B69778EB73FA1648DCA6D3E9D8E5837D1323705268237BE2FED7DB3BE1F67C1
36,848,168 UART: Caliptra RT
36,848,883 UART: [state] CFI Enabled
37,138,180 UART: [rt] RT listening for mailbox commands...
37,140,870 UART:
37,141,035 UART: Running Caliptra ROM ...
37,142,142 UART:
37,142,513 UART: [state] CFI Enabled
40,308,485 UART: [state] LifecycleState = Unprovisioned
40,310,455 UART: [state] DebugLocked = No
40,312,733 UART: [state] WD Timer not started. Device not locked for debugging
40,317,048 UART: [kat] SHA2-256
40,506,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,517,729 UART: [kat] ++
40,518,275 UART: [kat] sha1
40,529,544 UART: [kat] SHA2-256
40,532,565 UART: [kat] SHA2-384
40,538,176 UART: [kat] SHA2-512-ACC
40,540,803 UART: [kat] ECC-384
42,986,269 UART: [kat] HMAC-384Kdf
43,000,115 UART: [kat] LMS
43,531,725 UART: [kat] --
43,536,845 UART: [update-reset] ++
46,992,369 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,995,267 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
47,601,810 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,755,795 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,943,745 >>> mbox cmd response: success
14,945,958 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
19,200,290 UART:
19,200,703 UART: Running Caliptra FMC ...
19,201,831 UART:
19,201,991 UART: [state] CFI Enabled
19,210,197 UART: [fht] FMC Alias Private Key: 7
20,967,153 UART: [art] Extend RT PCRs Done
20,968,376 UART: [art] Lock RT PCRs Done
20,970,300 UART: [art] Populate DV Done
20,975,571 UART: [fht] FMC Alias Private Key: 7
20,977,107 UART: [art] Derive CDI
20,977,843 UART: [art] Store in in slot 0x4
21,020,439 UART: [art] Derive Key Pair
21,021,443 UART: [art] Store priv key in slot 0x5
23,447,697 UART: [art] Derive Key Pair - Done
23,460,749 UART: [art] Signing Cert with AUTHO
23,462,059 UART: RITY.KEYID = 7
25,167,837 UART: [art] Erasing AUTHORITY.KEYID = 7
25,169,366 UART: [art] PUB.X = 14C94FA6AC4F9C7183CEFB652BB408E3DB39AAF2F6B0F632D79B1FFD5B3E60B1F99982F7D4E1423F26C59EDCB5B0FF30
25,176,659 UART: [art] PUB.Y = 6FAF5E5DE4C7D3EE92504D4109056191E054CEEB18BF1129FABF81C372ED1500D9A448208F5675452E1ABACFB63241FD
25,183,898 UART: [art] SIG.R = A307B9ACD7B1E7036D5EBB30CB5EA57F3A683E0639F962EF230F0E284E86B9EBFC8C562741BBAE79E31DE7FBB3643857
25,191,286 UART: [art] SIG.S = 413D069A684ACE3856FF30C3FF18BD6B25F7EDDA9191912E571A42E9B3573FA2A7A8A191462CC66044368BF161D292C5
26,170,560 UART: Caliptra RT
26,171,259 UART: [state] CFI Enabled
26,288,573 UART: [rt] RT listening for mailbox commands...
31,547,693 >>> mbox cmd response: failed
31,549,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
31,692,978 UART:
31,693,304 UART: Running Caliptra FMC ...
31,694,371 UART:
31,694,530 UART: [state] CFI Enabled
31,695,392 UART: [art] Extend RT PCRs Done
31,696,467 UART: [art] Lock RT PCRs Done
31,697,448 UART: [art] Populate DV Done
31,698,570 UART: [fht] FMC Alias Private Key: 7
31,699,896 UART: [art] Derive CDI
31,700,635 UART: [art] Store in in slot 0x4
31,701,804 UART: [art] Derive Key Pair
31,702,740 UART: [art] Store priv key in slot 0x5
34,084,639 UART: [art] Derive Key Pair - Done
34,097,558 UART: [art] Signing Cert with AUTHO
34,098,863 UART: RITY.KEYID = 7
35,804,389 UART: [art] Erasing AUTHORITY.KEYID = 7
35,805,899 UART: [art] PUB.X = 14C94FA6AC4F9C7183CEFB652BB408E3DB39AAF2F6B0F632D79B1FFD5B3E60B1F99982F7D4E1423F26C59EDCB5B0FF30
35,813,182 UART: [art] PUB.Y = 6FAF5E5DE4C7D3EE92504D4109056191E054CEEB18BF1129FABF81C372ED1500D9A448208F5675452E1ABACFB63241FD
35,820,438 UART: [art] SIG.R = A307B9ACD7B1E7036D5EBB30CB5EA57F3A683E0639F962EF230F0E284E86B9EBFC8C562741BBAE79E31DE7FBB3643857
35,827,825 UART: [art] SIG.S = 413D069A684ACE3856FF30C3FF18BD6B25F7EDDA9191912E571A42E9B3573FA2A7A8A191462CC66044368BF161D292C5
36,806,572 UART: Caliptra RT
36,807,272 UART: [state] CFI Enabled
37,097,482 UART: [rt] RT listening for mailbox commands...
47,895,980 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,749 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,327 UART: [kat] SHA2-256
882,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,373 UART: [kat] ++
886,525 UART: [kat] sha1
890,867 UART: [kat] SHA2-256
892,805 UART: [kat] SHA2-384
895,578 UART: [kat] SHA2-512-ACC
897,479 UART: [kat] ECC-384
903,494 UART: [kat] HMAC-384Kdf
908,180 UART: [kat] LMS
1,476,376 UART: [kat] --
1,477,545 UART: [cold-reset] ++
1,477,889 UART: [fht] Storing FHT @ 0x50003400
1,480,694 UART: [idev] ++
1,480,862 UART: [idev] CDI.KEYID = 6
1,481,222 UART: [idev] SUBJECT.KEYID = 7
1,481,646 UART: [idev] UDS.KEYID = 0
1,481,991 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,836 UART: [idev] Erasing UDS.KEYID = 0
1,506,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,012 UART: [idev] --
1,515,951 UART: [ldev] ++
1,516,119 UART: [ldev] CDI.KEYID = 6
1,516,482 UART: [ldev] SUBJECT.KEYID = 5
1,516,908 UART: [ldev] AUTHORITY.KEYID = 7
1,517,371 UART: [ldev] FE.KEYID = 1
1,522,349 UART: [ldev] Erasing FE.KEYID = 1
1,547,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,646 UART: [ldev] --
1,587,031 UART: [fwproc] Waiting for Commands...
1,587,776 UART: [fwproc] Received command 0x46574c44
1,588,567 UART: [fwproc] Received Image of size 114168 bytes
2,885,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,533 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,402 >>> mbox cmd response: success
3,078,402 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
3,079,478 UART: [afmc] ++
3,079,646 UART: [afmc] CDI.KEYID = 6
3,080,008 UART: [afmc] SUBJECT.KEYID = 7
3,080,433 UART: [afmc] AUTHORITY.KEYID = 5
3,115,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,870 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,650 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,378 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,263 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,953 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,882 UART: [afmc] --
3,158,974 UART: [cold-reset] --
3,159,612 UART: [state] Locking Datavault
3,161,051 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,655 UART: [state] Locking ICCM
3,162,221 UART: [exit] Launching FMC @ 0x40000130
3,167,550 UART:
3,167,566 UART: Running Caliptra FMC ...
3,167,974 UART:
3,168,028 UART: [state] CFI Enabled
3,178,635 UART: [fht] FMC Alias Private Key: 7
3,286,726 UART: [art] Extend RT PCRs Done
3,287,154 UART: [art] Lock RT PCRs Done
3,288,350 UART: [art] Populate DV Done
3,296,513 UART: [fht] FMC Alias Private Key: 7
3,297,679 UART: [art] Derive CDI
3,297,959 UART: [art] Store in in slot 0x4
3,383,684 UART: [art] Derive Key Pair
3,384,044 UART: [art] Store priv key in slot 0x5
3,397,018 UART: [art] Derive Key Pair - Done
3,411,707 UART: [art] Signing Cert with AUTHO
3,412,187 UART: RITY.KEYID = 7
3,427,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,150 UART: [art] PUB.X = DAE22E93AA418AF5F54B4F70F992EB353FDA3DC3E899B8190CA3A0B95BDB39359140077B8F203E4B998B76643831E680
3,434,920 UART: [art] PUB.Y = 485EB0CABECF225949CCD85C7828B4A1B4E89DD68D276A534B1560F2BD89460393BA8A4DFB06E7B415427EDE6B1EAC7F
3,441,882 UART: [art] SIG.R = 336E667802A395A76BC3612F804AE8597E774ED101D25C7309001C6DAC09ACF9F667A90E71F713FC0A221935680D89A8
3,448,605 UART: [art] SIG.S = 498D8BD2F42ECCD200B9FD67FD3D3AE47FB030837AAE3D4E0F37FEF28E2823A494E3D1C96B26DD91FCFC5C62E6057F04
3,472,019 UART: Caliptra RT
3,472,272 UART: [state] CFI Enabled
3,580,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,407 UART:
3,582,423 UART: Running Caliptra ROM ...
3,582,831 UART:
3,582,885 UART: [state] CFI Enabled
3,585,483 UART: [state] LifecycleState = Unprovisioned
3,586,138 UART: [state] DebugLocked = No
3,586,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,588,433 UART: [kat] SHA2-256
4,382,364 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,386,479 UART: [kat] ++
4,386,631 UART: [kat] sha1
4,390,951 UART: [kat] SHA2-256
4,392,889 UART: [kat] SHA2-384
4,395,710 UART: [kat] SHA2-512-ACC
4,397,610 UART: [kat] ECC-384
4,403,123 UART: [kat] HMAC-384Kdf
4,407,681 UART: [kat] LMS
4,975,877 UART: [kat] --
4,976,672 UART: [update-reset] ++
5,087,763 >>> mbox cmd response: failed
5,087,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,088,281 UART: ROM Non-Fatal Error: 0x000B001F
5,089,157 UART: [state] Locking Datavault
5,090,101 UART: [state] Locking PCR0, PCR1 and PCR31
5,090,705 UART: [state] Locking ICCM
5,091,161 UART: [exit] Launching FMC @ 0x40000130
5,096,490 UART:
5,096,506 UART: Running Caliptra FMC ...
5,096,914 UART:
5,096,968 UART: [state] CFI Enabled
5,185,847 UART: [art] Extend RT PCRs Done
5,186,275 UART: [art] Lock RT PCRs Done
5,187,720 UART: [art] Populate DV Done
5,196,039 UART: [fht] FMC Alias Private Key: 7
5,197,037 UART: [art] Derive CDI
5,197,317 UART: [art] Store in in slot 0x4
5,282,956 UART: [art] Derive Key Pair
5,283,316 UART: [art] Store priv key in slot 0x5
5,296,858 UART: [art] Derive Key Pair - Done
5,311,703 UART: [art] Signing Cert with AUTHO
5,312,183 UART: RITY.KEYID = 7
5,327,629 UART: [art] Erasing AUTHORITY.KEYID = 7
5,328,394 UART: [art] PUB.X = DAE22E93AA418AF5F54B4F70F992EB353FDA3DC3E899B8190CA3A0B95BDB39359140077B8F203E4B998B76643831E680
5,335,164 UART: [art] PUB.Y = 485EB0CABECF225949CCD85C7828B4A1B4E89DD68D276A534B1560F2BD89460393BA8A4DFB06E7B415427EDE6B1EAC7F
5,342,126 UART: [art] SIG.R = 336E667802A395A76BC3612F804AE8597E774ED101D25C7309001C6DAC09ACF9F667A90E71F713FC0A221935680D89A8
5,348,849 UART: [art] SIG.S = 498D8BD2F42ECCD200B9FD67FD3D3AE47FB030837AAE3D4E0F37FEF28E2823A494E3D1C96B26DD91FCFC5C62E6057F04
5,373,043 UART: Caliptra RT
5,373,296 UART: [state] CFI Enabled
5,659,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,660,800 UART:
5,660,816 UART: Running Caliptra ROM ...
5,661,224 UART:
5,661,278 UART: [state] CFI Enabled
5,663,928 UART: [state] LifecycleState = Unprovisioned
5,664,583 UART: [state] DebugLocked = No
5,665,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,666,908 UART: [kat] SHA2-256
6,460,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,464,954 UART: [kat] ++
6,465,106 UART: [kat] sha1
6,469,354 UART: [kat] SHA2-256
6,471,292 UART: [kat] SHA2-384
6,473,941 UART: [kat] SHA2-512-ACC
6,475,841 UART: [kat] ECC-384
6,481,532 UART: [kat] HMAC-384Kdf
6,485,982 UART: [kat] LMS
7,054,178 UART: [kat] --
7,054,821 UART: [update-reset] ++
8,388,215 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,389,453 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
8,539,083 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,813 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,426 >>> mbox cmd response: success
2,925,426 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,986,842 UART:
2,986,858 UART: Running Caliptra FMC ...
2,987,266 UART:
2,987,320 UART: [state] CFI Enabled
2,997,587 UART: [fht] FMC Alias Private Key: 7
3,104,756 UART: [art] Extend RT PCRs Done
3,105,184 UART: [art] Lock RT PCRs Done
3,106,474 UART: [art] Populate DV Done
3,114,783 UART: [fht] FMC Alias Private Key: 7
3,115,777 UART: [art] Derive CDI
3,116,057 UART: [art] Store in in slot 0x4
3,201,462 UART: [art] Derive Key Pair
3,201,822 UART: [art] Store priv key in slot 0x5
3,215,336 UART: [art] Derive Key Pair - Done
3,229,863 UART: [art] Signing Cert with AUTHO
3,230,343 UART: RITY.KEYID = 7
3,245,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,374 UART: [art] PUB.X = 2F28D7643898304246F24895AA5FD2AF3CFD4DFB87BEEF4E9C99450E07D194C3D13B231094ADF0F161213676E12473DE
3,253,142 UART: [art] PUB.Y = 21661F2FBABFB5474DF6DB0458CE97D6FB03A9A594EEDD4037883B02C1510656F5D6E53E7B260F0022DA5539EB5F6B0A
3,260,064 UART: [art] SIG.R = C349170AAC589305434C97B8D6F68C4C88067D869F79A03C0A8E861169F46A49661A9ADD6DB13ACD34E7A13A2FD15C3B
3,266,828 UART: [art] SIG.S = 5A51C31C299F8FD07AFDD55B015EC1F36B28CF66C1652BE88495021B582BD5CA7DDB5FDC9713067F276C9FBCA8A3541E
3,290,724 UART: Caliptra RT
3,290,977 UART: [state] CFI Enabled
3,399,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,790,384 >>> mbox cmd response: failed
4,790,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,795,965 UART:
4,795,981 UART: Running Caliptra FMC ...
4,796,389 UART:
4,796,443 UART: [state] CFI Enabled
4,885,036 UART: [art] Extend RT PCRs Done
4,885,464 UART: [art] Lock RT PCRs Done
4,886,795 UART: [art] Populate DV Done
4,895,068 UART: [fht] FMC Alias Private Key: 7
4,896,196 UART: [art] Derive CDI
4,896,476 UART: [art] Store in in slot 0x4
4,982,419 UART: [art] Derive Key Pair
4,982,779 UART: [art] Store priv key in slot 0x5
4,996,317 UART: [art] Derive Key Pair - Done
5,011,224 UART: [art] Signing Cert with AUTHO
5,011,704 UART: RITY.KEYID = 7
5,027,208 UART: [art] Erasing AUTHORITY.KEYID = 7
5,027,973 UART: [art] PUB.X = 2F28D7643898304246F24895AA5FD2AF3CFD4DFB87BEEF4E9C99450E07D194C3D13B231094ADF0F161213676E12473DE
5,034,741 UART: [art] PUB.Y = 21661F2FBABFB5474DF6DB0458CE97D6FB03A9A594EEDD4037883B02C1510656F5D6E53E7B260F0022DA5539EB5F6B0A
5,041,663 UART: [art] SIG.R = C349170AAC589305434C97B8D6F68C4C88067D869F79A03C0A8E861169F46A49661A9ADD6DB13ACD34E7A13A2FD15C3B
5,048,427 UART: [art] SIG.S = 5A51C31C299F8FD07AFDD55B015EC1F36B28CF66C1652BE88495021B582BD5CA7DDB5FDC9713067F276C9FBCA8A3541E
5,071,807 UART: Caliptra RT
5,072,060 UART: [state] CFI Enabled
5,351,771 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,112,078 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,318 UART: [kat] SHA2-256
882,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,364 UART: [kat] ++
886,516 UART: [kat] sha1
890,794 UART: [kat] SHA2-256
892,732 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
902,919 UART: [kat] HMAC-384Kdf
907,539 UART: [kat] LMS
1,475,735 UART: [kat] --
1,476,344 UART: [cold-reset] ++
1,476,862 UART: [fht] Storing FHT @ 0x50003400
1,479,809 UART: [idev] ++
1,479,977 UART: [idev] CDI.KEYID = 6
1,480,337 UART: [idev] SUBJECT.KEYID = 7
1,480,761 UART: [idev] UDS.KEYID = 0
1,481,106 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,461 UART: [idev] Erasing UDS.KEYID = 0
1,505,285 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,083 UART: [idev] --
1,515,096 UART: [ldev] ++
1,515,264 UART: [ldev] CDI.KEYID = 6
1,515,627 UART: [ldev] SUBJECT.KEYID = 5
1,516,053 UART: [ldev] AUTHORITY.KEYID = 7
1,516,516 UART: [ldev] FE.KEYID = 1
1,522,198 UART: [ldev] Erasing FE.KEYID = 1
1,547,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,731 UART: [ldev] --
1,587,098 UART: [fwproc] Waiting for Commands...
1,587,761 UART: [fwproc] Received command 0x46574c44
1,588,552 UART: [fwproc] Received Image of size 114168 bytes
2,885,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,352 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,704 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,373 >>> mbox cmd response: success
3,077,373 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
3,078,457 UART: [afmc] ++
3,078,625 UART: [afmc] CDI.KEYID = 6
3,078,987 UART: [afmc] SUBJECT.KEYID = 7
3,079,412 UART: [afmc] AUTHORITY.KEYID = 5
3,114,621 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,915 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,695 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,308 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,148,998 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,901 UART: [afmc] --
3,157,863 UART: [cold-reset] --
3,158,613 UART: [state] Locking Datavault
3,159,754 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,358 UART: [state] Locking ICCM
3,160,888 UART: [exit] Launching FMC @ 0x40000130
3,166,217 UART:
3,166,233 UART: Running Caliptra FMC ...
3,166,641 UART:
3,166,784 UART: [state] CFI Enabled
3,177,525 UART: [fht] FMC Alias Private Key: 7
3,285,998 UART: [art] Extend RT PCRs Done
3,286,426 UART: [art] Lock RT PCRs Done
3,288,030 UART: [art] Populate DV Done
3,296,095 UART: [fht] FMC Alias Private Key: 7
3,297,047 UART: [art] Derive CDI
3,297,327 UART: [art] Store in in slot 0x4
3,383,146 UART: [art] Derive Key Pair
3,383,506 UART: [art] Store priv key in slot 0x5
3,397,048 UART: [art] Derive Key Pair - Done
3,411,399 UART: [art] Signing Cert with AUTHO
3,411,879 UART: RITY.KEYID = 7
3,427,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,352 UART: [art] PUB.X = 546945AA449F507F7DCB336E16496471CE086F6E6D971F39E20AF04969775289431B28192184EFE345FA5829A31C7EB5
3,435,108 UART: [art] PUB.Y = 394EB88925E003ADB45C3CE10309EF2A5B1C2B8D23BE55BA66756C31652A03626362B55262DCEFDBB6AC288AF037B0D0
3,442,056 UART: [art] SIG.R = 199A2276A6A27C515F1A21AEA8E72579CE4F3AC45A5301D7CBB0691DE1DE2BE1F321E45CAFEF6B3D4B96D50A8B23B812
3,448,838 UART: [art] SIG.S = 1753371A7608C0E32E0EDBF11B088331CA8E30D389A53B84BDF3E16FA83AB489A62CE45CA12C2F5192B0A0F1808717A8
3,472,834 UART: Caliptra RT
3,473,179 UART: [state] CFI Enabled
3,582,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,096 UART:
3,584,112 UART: Running Caliptra ROM ...
3,584,520 UART:
3,584,661 UART: [state] CFI Enabled
3,587,653 UART: [state] LifecycleState = Unprovisioned
3,588,308 UART: [state] DebugLocked = No
3,588,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,569 UART: [kat] SHA2-256
4,384,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,615 UART: [kat] ++
4,388,767 UART: [kat] sha1
4,393,063 UART: [kat] SHA2-256
4,395,001 UART: [kat] SHA2-384
4,397,648 UART: [kat] SHA2-512-ACC
4,399,548 UART: [kat] ECC-384
4,405,247 UART: [kat] HMAC-384Kdf
4,409,779 UART: [kat] LMS
4,977,975 UART: [kat] --
4,979,044 UART: [update-reset] ++
5,091,719 >>> mbox cmd response: failed
5,091,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,091,987 UART: ROM Non-Fatal Error: 0x000B001F
5,092,863 UART: [state] Locking Datavault
5,093,493 UART: [state] Locking PCR0, PCR1 and PCR31
5,094,097 UART: [state] Locking ICCM
5,094,707 UART: [exit] Launching FMC @ 0x40000130
5,100,036 UART:
5,100,052 UART: Running Caliptra FMC ...
5,100,460 UART:
5,100,603 UART: [state] CFI Enabled
5,189,208 UART: [art] Extend RT PCRs Done
5,189,636 UART: [art] Lock RT PCRs Done
5,190,983 UART: [art] Populate DV Done
5,199,322 UART: [fht] FMC Alias Private Key: 7
5,200,386 UART: [art] Derive CDI
5,200,666 UART: [art] Store in in slot 0x4
5,286,305 UART: [art] Derive Key Pair
5,286,665 UART: [art] Store priv key in slot 0x5
5,299,917 UART: [art] Derive Key Pair - Done
5,314,464 UART: [art] Signing Cert with AUTHO
5,314,944 UART: RITY.KEYID = 7
5,330,274 UART: [art] Erasing AUTHORITY.KEYID = 7
5,331,039 UART: [art] PUB.X = 546945AA449F507F7DCB336E16496471CE086F6E6D971F39E20AF04969775289431B28192184EFE345FA5829A31C7EB5
5,337,795 UART: [art] PUB.Y = 394EB88925E003ADB45C3CE10309EF2A5B1C2B8D23BE55BA66756C31652A03626362B55262DCEFDBB6AC288AF037B0D0
5,344,743 UART: [art] SIG.R = 199A2276A6A27C515F1A21AEA8E72579CE4F3AC45A5301D7CBB0691DE1DE2BE1F321E45CAFEF6B3D4B96D50A8B23B812
5,351,525 UART: [art] SIG.S = 1753371A7608C0E32E0EDBF11B088331CA8E30D389A53B84BDF3E16FA83AB489A62CE45CA12C2F5192B0A0F1808717A8
5,375,391 UART: Caliptra RT
5,375,736 UART: [state] CFI Enabled
5,659,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,660,778 UART:
5,660,794 UART: Running Caliptra ROM ...
5,661,202 UART:
5,661,343 UART: [state] CFI Enabled
5,663,825 UART: [state] LifecycleState = Unprovisioned
5,664,480 UART: [state] DebugLocked = No
5,665,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,666,761 UART: [kat] SHA2-256
6,460,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,464,807 UART: [kat] ++
6,464,959 UART: [kat] sha1
6,469,251 UART: [kat] SHA2-256
6,471,189 UART: [kat] SHA2-384
6,473,856 UART: [kat] SHA2-512-ACC
6,475,756 UART: [kat] ECC-384
6,481,403 UART: [kat] HMAC-384Kdf
6,485,957 UART: [kat] LMS
7,054,153 UART: [kat] --
7,055,204 UART: [update-reset] ++
8,389,706 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,390,966 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
8,540,596 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,311 >>> mbox cmd response: success
2,926,311 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,988,013 UART:
2,988,029 UART: Running Caliptra FMC ...
2,988,437 UART:
2,988,580 UART: [state] CFI Enabled
2,999,333 UART: [fht] FMC Alias Private Key: 7
3,107,840 UART: [art] Extend RT PCRs Done
3,108,268 UART: [art] Lock RT PCRs Done
3,109,692 UART: [art] Populate DV Done
3,117,973 UART: [fht] FMC Alias Private Key: 7
3,118,959 UART: [art] Derive CDI
3,119,239 UART: [art] Store in in slot 0x4
3,205,380 UART: [art] Derive Key Pair
3,205,740 UART: [art] Store priv key in slot 0x5
3,219,024 UART: [art] Derive Key Pair - Done
3,233,848 UART: [art] Signing Cert with AUTHO
3,234,328 UART: RITY.KEYID = 7
3,249,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,589 UART: [art] PUB.X = ED9859FE2B1D90E84C458CBB1CB14A18FEF8DCA0BC9B06A200B41D0A0C80CD9C1710792819EB4CDCD44B39E544774DFC
3,257,350 UART: [art] PUB.Y = F35D14052FC782D7324F27E8DFD225127249FF37C772CBA88260E088F90D511209438FA20CE10676FC47456DAB55D19E
3,264,283 UART: [art] SIG.R = 487A7CBBAE90FABB76B6D67CF68A52C083A5B8AA19FC0A891F1FAFBB6E2D01F5A0D625DD8DBEC98EF4A3040991811439
3,271,065 UART: [art] SIG.S = 4AABAE90F3814051AF73B0EE6D61E47B34587970C31CE4BCB622DE54BD0AD85742B52E8588EC0F0E0C1BBE1C11D46EA9
3,295,220 UART: Caliptra RT
3,295,565 UART: [state] CFI Enabled
3,403,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,794,794 >>> mbox cmd response: failed
4,794,794 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,800,511 UART:
4,800,527 UART: Running Caliptra FMC ...
4,800,935 UART:
4,801,078 UART: [state] CFI Enabled
4,890,253 UART: [art] Extend RT PCRs Done
4,890,681 UART: [art] Lock RT PCRs Done
4,891,776 UART: [art] Populate DV Done
4,900,117 UART: [fht] FMC Alias Private Key: 7
4,901,259 UART: [art] Derive CDI
4,901,539 UART: [art] Store in in slot 0x4
4,987,332 UART: [art] Derive Key Pair
4,987,692 UART: [art] Store priv key in slot 0x5
5,000,698 UART: [art] Derive Key Pair - Done
5,015,690 UART: [art] Signing Cert with AUTHO
5,016,170 UART: RITY.KEYID = 7
5,031,122 UART: [art] Erasing AUTHORITY.KEYID = 7
5,031,887 UART: [art] PUB.X = ED9859FE2B1D90E84C458CBB1CB14A18FEF8DCA0BC9B06A200B41D0A0C80CD9C1710792819EB4CDCD44B39E544774DFC
5,038,648 UART: [art] PUB.Y = F35D14052FC782D7324F27E8DFD225127249FF37C772CBA88260E088F90D511209438FA20CE10676FC47456DAB55D19E
5,045,581 UART: [art] SIG.R = 487A7CBBAE90FABB76B6D67CF68A52C083A5B8AA19FC0A891F1FAFBB6E2D01F5A0D625DD8DBEC98EF4A3040991811439
5,052,363 UART: [art] SIG.S = 4AABAE90F3814051AF73B0EE6D61E47B34587970C31CE4BCB622DE54BD0AD85742B52E8588EC0F0E0C1BBE1C11D46EA9
5,076,242 UART: Caliptra RT
5,076,587 UART: [state] CFI Enabled
5,356,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,116,375 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,701 UART: [kat] SHA2-256
903,641 UART: [kat] SHA2-384
906,404 UART: [kat] SHA2-512-ACC
908,305 UART: [kat] ECC-384
917,622 UART: [kat] HMAC-384Kdf
922,156 UART: [kat] LMS
1,170,484 UART: [kat] --
1,171,143 UART: [cold-reset] ++
1,171,525 UART: [fht] FHT @ 0x50003400
1,174,258 UART: [idev] ++
1,174,426 UART: [idev] CDI.KEYID = 6
1,174,786 UART: [idev] SUBJECT.KEYID = 7
1,175,210 UART: [idev] UDS.KEYID = 0
1,175,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,897 UART: [idev] Sha1 KeyId Algorithm
1,208,163 UART: [idev] --
1,209,111 UART: [ldev] ++
1,209,279 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,241,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,783 UART: [ldev] --
1,281,246 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,576 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,700 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,004 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,659 >>> mbox cmd response: success
2,770,659 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,771,805 UART: [afmc] ++
2,771,973 UART: [afmc] CDI.KEYID = 6
2,772,335 UART: [afmc] SUBJECT.KEYID = 7
2,772,760 UART: [afmc] AUTHORITY.KEYID = 5
2,808,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,933 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,652 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,414 UART: [afmc] --
2,851,504 UART: [cold-reset] --
2,852,406 UART: [state] Locking Datavault
2,853,441 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,045 UART: [state] Locking ICCM
2,854,619 UART: [exit] Launching FMC @ 0x40000130
2,859,948 UART:
2,859,964 UART: Running Caliptra FMC ...
2,860,372 UART:
2,860,426 UART: [state] CFI Enabled
2,870,859 UART: [fht] FMC Alias Private Key: 7
2,979,050 UART: [art] Extend RT PCRs Done
2,979,478 UART: [art] Lock RT PCRs Done
2,981,268 UART: [art] Populate DV Done
2,989,193 UART: [fht] FMC Alias Private Key: 7
2,990,345 UART: [art] Derive CDI
2,990,625 UART: [art] Store in in slot 0x4
3,076,562 UART: [art] Derive Key Pair
3,076,922 UART: [art] Store priv key in slot 0x5
3,089,902 UART: [art] Derive Key Pair - Done
3,104,616 UART: [art] Signing Cert with AUTHO
3,105,096 UART: RITY.KEYID = 7
3,120,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,997 UART: [art] PUB.X = 651D539F270DAA7E33B1ED8B4D4FCB90340C0568F57F1BF4F40B373959CE24960483AFB1FAE3FCCB05C5681C252BCD42
3,127,763 UART: [art] PUB.Y = B1273B86CCA9A812712022314A9E27675FAC5F33F3D24F20169F4A81E2F02AB4BAFAA480E937D4FF7888D1715D5CDA52
3,134,721 UART: [art] SIG.R = 04DF05C69D2899349EFB53D3721A59BA8A2B8DF86ECFF3AA3ACDD922027EC0FD5B26D026C4C6EFDB99A8AE8A50FBA8C2
3,141,510 UART: [art] SIG.S = 9DEE433A68BBDDABC0CBE8A792F4FDA2DFFC1CB044D38809E3AC74404C3AF536638C2C92EB0873678F17AFF0117D554F
3,165,939 UART: Caliptra RT
3,166,192 UART: [state] CFI Enabled
3,273,259 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,079 UART:
3,275,095 UART: Running Caliptra ROM ...
3,275,503 UART:
3,275,558 UART: [state] CFI Enabled
3,278,314 UART: [state] LifecycleState = Unprovisioned
3,278,969 UART: [state] DebugLocked = No
3,279,503 UART: [state] WD Timer not started. Device not locked for debugging
3,280,721 UART: [kat] SHA2-256
4,086,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,090,496 UART: [kat] ++
4,090,648 UART: [kat] sha1
4,094,774 UART: [kat] SHA2-256
4,096,714 UART: [kat] SHA2-384
4,099,511 UART: [kat] SHA2-512-ACC
4,101,411 UART: [kat] ECC-384
4,111,244 UART: [kat] HMAC-384Kdf
4,115,660 UART: [kat] LMS
4,363,988 UART: [kat] --
4,364,750 UART: [update-reset] ++
4,454,341 >>> mbox cmd response: failed
4,454,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,454,725 UART: ROM Non-Fatal Error: 0x000B001F
4,455,565 UART: [state] Locking Datavault
4,456,393 UART: [state] Locking PCR0, PCR1 and PCR31
4,456,997 UART: [state] Locking ICCM
4,457,613 UART: [exit] Launching FMC @ 0x40000130
4,462,942 UART:
4,462,958 UART: Running Caliptra FMC ...
4,463,366 UART:
4,463,420 UART: [state] CFI Enabled
4,552,443 UART: [art] Extend RT PCRs Done
4,552,871 UART: [art] Lock RT PCRs Done
4,554,198 UART: [art] Populate DV Done
4,562,319 UART: [fht] FMC Alias Private Key: 7
4,563,493 UART: [art] Derive CDI
4,563,773 UART: [art] Store in in slot 0x4
4,649,250 UART: [art] Derive Key Pair
4,649,610 UART: [art] Store priv key in slot 0x5
4,662,562 UART: [art] Derive Key Pair - Done
4,677,464 UART: [art] Signing Cert with AUTHO
4,677,944 UART: RITY.KEYID = 7
4,693,268 UART: [art] Erasing AUTHORITY.KEYID = 7
4,694,033 UART: [art] PUB.X = 651D539F270DAA7E33B1ED8B4D4FCB90340C0568F57F1BF4F40B373959CE24960483AFB1FAE3FCCB05C5681C252BCD42
4,700,799 UART: [art] PUB.Y = B1273B86CCA9A812712022314A9E27675FAC5F33F3D24F20169F4A81E2F02AB4BAFAA480E937D4FF7888D1715D5CDA52
4,707,757 UART: [art] SIG.R = 04DF05C69D2899349EFB53D3721A59BA8A2B8DF86ECFF3AA3ACDD922027EC0FD5B26D026C4C6EFDB99A8AE8A50FBA8C2
4,714,546 UART: [art] SIG.S = 9DEE433A68BBDDABC0CBE8A792F4FDA2DFFC1CB044D38809E3AC74404C3AF536638C2C92EB0873678F17AFF0117D554F
4,738,171 UART: Caliptra RT
4,738,424 UART: [state] CFI Enabled
5,023,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,025,520 UART:
5,025,536 UART: Running Caliptra ROM ...
5,025,944 UART:
5,025,999 UART: [state] CFI Enabled
5,028,507 UART: [state] LifecycleState = Unprovisioned
5,029,162 UART: [state] DebugLocked = No
5,029,734 UART: [state] WD Timer not started. Device not locked for debugging
5,030,992 UART: [kat] SHA2-256
5,836,642 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,840,767 UART: [kat] ++
5,840,919 UART: [kat] sha1
5,845,113 UART: [kat] SHA2-256
5,847,053 UART: [kat] SHA2-384
5,849,988 UART: [kat] SHA2-512-ACC
5,851,888 UART: [kat] ECC-384
5,861,255 UART: [kat] HMAC-384Kdf
5,865,753 UART: [kat] LMS
6,114,081 UART: [kat] --
6,114,979 UART: [update-reset] ++
7,426,383 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,427,524 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,577,102 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,790 >>> mbox cmd response: success
2,623,790 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,686,046 UART:
2,686,062 UART: Running Caliptra FMC ...
2,686,470 UART:
2,686,524 UART: [state] CFI Enabled
2,696,887 UART: [fht] FMC Alias Private Key: 7
2,804,634 UART: [art] Extend RT PCRs Done
2,805,062 UART: [art] Lock RT PCRs Done
2,806,638 UART: [art] Populate DV Done
2,814,805 UART: [fht] FMC Alias Private Key: 7
2,815,807 UART: [art] Derive CDI
2,816,087 UART: [art] Store in in slot 0x4
2,901,512 UART: [art] Derive Key Pair
2,901,872 UART: [art] Store priv key in slot 0x5
2,914,946 UART: [art] Derive Key Pair - Done
2,929,512 UART: [art] Signing Cert with AUTHO
2,929,992 UART: RITY.KEYID = 7
2,945,192 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,957 UART: [art] PUB.X = 888AAB7D80FF06DAA1A969BCA00F3C83A97A64323A6D702696D7544E4408A4F3C9A01E11742D19A64276C3E57BFFF019
2,952,724 UART: [art] PUB.Y = 42278CE1C197BD57DFBFB12FD67A5CB50C51598D0A33E69ADD18F5D20C1EECA8D3E93D1E95323B3605E278877EB288B5
2,959,676 UART: [art] SIG.R = 133A342A59AB971415645FAB1FFBECE2A2F31917955FD24F052904CAD597C2C2810AF2BA8951B386440AF52B629047B6
2,966,436 UART: [art] SIG.S = A6B7E6C7997B0BC647993963C569B4249C5769215A513A639068B6018570890CF74C9ADDB9AA7BCD1A008BF16AACF587
2,989,988 UART: Caliptra RT
2,990,241 UART: [state] CFI Enabled
3,098,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,164,584 >>> mbox cmd response: failed
4,164,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,170,607 UART:
4,170,623 UART: Running Caliptra FMC ...
4,171,031 UART:
4,171,085 UART: [state] CFI Enabled
4,259,546 UART: [art] Extend RT PCRs Done
4,259,974 UART: [art] Lock RT PCRs Done
4,261,169 UART: [art] Populate DV Done
4,269,404 UART: [fht] FMC Alias Private Key: 7
4,270,372 UART: [art] Derive CDI
4,270,652 UART: [art] Store in in slot 0x4
4,356,249 UART: [art] Derive Key Pair
4,356,609 UART: [art] Store priv key in slot 0x5
4,369,335 UART: [art] Derive Key Pair - Done
4,383,839 UART: [art] Signing Cert with AUTHO
4,384,319 UART: RITY.KEYID = 7
4,399,387 UART: [art] Erasing AUTHORITY.KEYID = 7
4,400,152 UART: [art] PUB.X = 888AAB7D80FF06DAA1A969BCA00F3C83A97A64323A6D702696D7544E4408A4F3C9A01E11742D19A64276C3E57BFFF019
4,406,919 UART: [art] PUB.Y = 42278CE1C197BD57DFBFB12FD67A5CB50C51598D0A33E69ADD18F5D20C1EECA8D3E93D1E95323B3605E278877EB288B5
4,413,871 UART: [art] SIG.R = 133A342A59AB971415645FAB1FFBECE2A2F31917955FD24F052904CAD597C2C2810AF2BA8951B386440AF52B629047B6
4,420,631 UART: [art] SIG.S = A6B7E6C7997B0BC647993963C569B4249C5769215A513A639068B6018570890CF74C9ADDB9AA7BCD1A008BF16AACF587
4,444,397 UART: Caliptra RT
4,444,650 UART: [state] CFI Enabled
4,724,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,160,985 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,704 UART: [kat] SHA2-256
903,644 UART: [kat] SHA2-384
906,325 UART: [kat] SHA2-512-ACC
908,226 UART: [kat] ECC-384
918,173 UART: [kat] HMAC-384Kdf
922,817 UART: [kat] LMS
1,171,145 UART: [kat] --
1,172,076 UART: [cold-reset] ++
1,172,402 UART: [fht] FHT @ 0x50003400
1,174,855 UART: [idev] ++
1,175,023 UART: [idev] CDI.KEYID = 6
1,175,383 UART: [idev] SUBJECT.KEYID = 7
1,175,807 UART: [idev] UDS.KEYID = 0
1,176,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,059 UART: [idev] Erasing UDS.KEYID = 0
1,201,328 UART: [idev] Sha1 KeyId Algorithm
1,209,876 UART: [idev] --
1,210,960 UART: [ldev] ++
1,211,128 UART: [ldev] CDI.KEYID = 6
1,211,491 UART: [ldev] SUBJECT.KEYID = 5
1,211,917 UART: [ldev] AUTHORITY.KEYID = 7
1,212,380 UART: [ldev] FE.KEYID = 1
1,217,618 UART: [ldev] Erasing FE.KEYID = 1
1,243,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,678 UART: [ldev] --
1,283,165 UART: [fwproc] Wait for Commands...
1,283,957 UART: [fwproc] Recv command 0x46574c44
1,284,685 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,773 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,250 >>> mbox cmd response: success
2,773,250 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,774,304 UART: [afmc] ++
2,774,472 UART: [afmc] CDI.KEYID = 6
2,774,834 UART: [afmc] SUBJECT.KEYID = 7
2,775,259 UART: [afmc] AUTHORITY.KEYID = 5
2,810,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,657 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,385 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,270 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,989 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,051 UART: [afmc] --
2,853,965 UART: [cold-reset] --
2,854,929 UART: [state] Locking Datavault
2,855,846 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,450 UART: [state] Locking ICCM
2,857,104 UART: [exit] Launching FMC @ 0x40000130
2,862,433 UART:
2,862,449 UART: Running Caliptra FMC ...
2,862,857 UART:
2,863,000 UART: [state] CFI Enabled
2,873,445 UART: [fht] FMC Alias Private Key: 7
2,981,818 UART: [art] Extend RT PCRs Done
2,982,246 UART: [art] Lock RT PCRs Done
2,983,562 UART: [art] Populate DV Done
2,992,033 UART: [fht] FMC Alias Private Key: 7
2,992,981 UART: [art] Derive CDI
2,993,261 UART: [art] Store in in slot 0x4
3,079,294 UART: [art] Derive Key Pair
3,079,654 UART: [art] Store priv key in slot 0x5
3,092,946 UART: [art] Derive Key Pair - Done
3,107,775 UART: [art] Signing Cert with AUTHO
3,108,255 UART: RITY.KEYID = 7
3,123,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,506 UART: [art] PUB.X = 6FF9371E028CF404313D84C41BCC9603AD04220EBE77851609C30CF46F77C8ABF94A270E50B70C15E6CB25DF80C11490
3,131,253 UART: [art] PUB.Y = 00D0587E649DB24E7FE5DA76A8139D2968569F9EA0723652082CC218B28A0F0038D9832E346AA0633A1FB4B09E7594B8
3,138,149 UART: [art] SIG.R = 5C7A94E1E50D6A72F04D5B95BDD980CB462CFB4B65F59A458C988A13E1C0A96E48239A740EAF034F80E7CF2910972667
3,144,916 UART: [art] SIG.S = 43D404FF0E20B00C17BBEC4584993358912EC89A7C16D395A9A9EF9C8C82D756A04EBC13410C78832B37F5186BCDAF56
3,168,549 UART: Caliptra RT
3,168,894 UART: [state] CFI Enabled
3,276,141 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,278,123 UART:
3,278,139 UART: Running Caliptra ROM ...
3,278,547 UART:
3,278,689 UART: [state] CFI Enabled
3,281,471 UART: [state] LifecycleState = Unprovisioned
3,282,126 UART: [state] DebugLocked = No
3,282,758 UART: [state] WD Timer not started. Device not locked for debugging
3,284,076 UART: [kat] SHA2-256
4,089,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,851 UART: [kat] ++
4,094,003 UART: [kat] sha1
4,098,295 UART: [kat] SHA2-256
4,100,235 UART: [kat] SHA2-384
4,102,872 UART: [kat] SHA2-512-ACC
4,104,772 UART: [kat] ECC-384
4,114,659 UART: [kat] HMAC-384Kdf
4,119,193 UART: [kat] LMS
4,367,521 UART: [kat] --
4,368,389 UART: [update-reset] ++
4,457,324 >>> mbox cmd response: failed
4,457,324 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,457,666 UART: ROM Non-Fatal Error: 0x000B001F
4,458,574 UART: [state] Locking Datavault
4,459,316 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,920 UART: [state] Locking ICCM
4,460,352 UART: [exit] Launching FMC @ 0x40000130
4,465,681 UART:
4,465,697 UART: Running Caliptra FMC ...
4,466,105 UART:
4,466,248 UART: [state] CFI Enabled
4,555,871 UART: [art] Extend RT PCRs Done
4,556,299 UART: [art] Lock RT PCRs Done
4,557,432 UART: [art] Populate DV Done
4,565,787 UART: [fht] FMC Alias Private Key: 7
4,566,931 UART: [art] Derive CDI
4,567,211 UART: [art] Store in in slot 0x4
4,652,726 UART: [art] Derive Key Pair
4,653,086 UART: [art] Store priv key in slot 0x5
4,666,708 UART: [art] Derive Key Pair - Done
4,681,609 UART: [art] Signing Cert with AUTHO
4,682,089 UART: RITY.KEYID = 7
4,697,535 UART: [art] Erasing AUTHORITY.KEYID = 7
4,698,300 UART: [art] PUB.X = 6FF9371E028CF404313D84C41BCC9603AD04220EBE77851609C30CF46F77C8ABF94A270E50B70C15E6CB25DF80C11490
4,705,047 UART: [art] PUB.Y = 00D0587E649DB24E7FE5DA76A8139D2968569F9EA0723652082CC218B28A0F0038D9832E346AA0633A1FB4B09E7594B8
4,711,943 UART: [art] SIG.R = 5C7A94E1E50D6A72F04D5B95BDD980CB462CFB4B65F59A458C988A13E1C0A96E48239A740EAF034F80E7CF2910972667
4,718,710 UART: [art] SIG.S = 43D404FF0E20B00C17BBEC4584993358912EC89A7C16D395A9A9EF9C8C82D756A04EBC13410C78832B37F5186BCDAF56
4,742,535 UART: Caliptra RT
4,742,880 UART: [state] CFI Enabled
5,022,703 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,024,236 UART:
5,024,252 UART: Running Caliptra ROM ...
5,024,660 UART:
5,024,802 UART: [state] CFI Enabled
5,027,494 UART: [state] LifecycleState = Unprovisioned
5,028,149 UART: [state] DebugLocked = No
5,028,861 UART: [state] WD Timer not started. Device not locked for debugging
5,030,197 UART: [kat] SHA2-256
5,835,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,839,972 UART: [kat] ++
5,840,124 UART: [kat] sha1
5,844,216 UART: [kat] SHA2-256
5,846,156 UART: [kat] SHA2-384
5,848,821 UART: [kat] SHA2-512-ACC
5,850,721 UART: [kat] ECC-384
5,860,518 UART: [kat] HMAC-384Kdf
5,865,200 UART: [kat] LMS
6,113,528 UART: [kat] --
6,114,534 UART: [update-reset] ++
7,426,546 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,427,663 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,577,241 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,704 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,199 >>> mbox cmd response: success
2,625,199 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,687,801 UART:
2,687,817 UART: Running Caliptra FMC ...
2,688,225 UART:
2,688,368 UART: [state] CFI Enabled
2,699,495 UART: [fht] FMC Alias Private Key: 7
2,807,298 UART: [art] Extend RT PCRs Done
2,807,726 UART: [art] Lock RT PCRs Done
2,809,640 UART: [art] Populate DV Done
2,817,741 UART: [fht] FMC Alias Private Key: 7
2,818,819 UART: [art] Derive CDI
2,819,099 UART: [art] Store in in slot 0x4
2,904,882 UART: [art] Derive Key Pair
2,905,242 UART: [art] Store priv key in slot 0x5
2,918,762 UART: [art] Derive Key Pair - Done
2,933,722 UART: [art] Signing Cert with AUTHO
2,934,202 UART: RITY.KEYID = 7
2,948,984 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,749 UART: [art] PUB.X = 52EE33C2F474951CBFE3FAFE041529F4E34F87336113C4262659A799A6B74731D991E3E23ECFC45508659C5184BED5AE
2,956,515 UART: [art] PUB.Y = B4FB6B98F21F0E00CB5E543AD98240B23F9C02222A702522304867653F897C60A8466FEDBD882652C6AFFF6E6F26750A
2,963,436 UART: [art] SIG.R = CE0BA2712E9099CE2F0E04368885050690F7B2F9A82D527B09BDD02A5E254F18FB89BA58841853CA5C81C1B1C0D7332C
2,970,192 UART: [art] SIG.S = EC5184D46568184C938B979FE8EA52F9874B5BAC8C3774FCFBC58712E6616613BEC0B8851DAE986B1D5EB6A0718E85C9
2,994,041 UART: Caliptra RT
2,994,386 UART: [state] CFI Enabled
3,102,264 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,169,939 >>> mbox cmd response: failed
4,169,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,175,782 UART:
4,175,798 UART: Running Caliptra FMC ...
4,176,206 UART:
4,176,349 UART: [state] CFI Enabled
4,266,012 UART: [art] Extend RT PCRs Done
4,266,440 UART: [art] Lock RT PCRs Done
4,267,815 UART: [art] Populate DV Done
4,275,942 UART: [fht] FMC Alias Private Key: 7
4,276,946 UART: [art] Derive CDI
4,277,226 UART: [art] Store in in slot 0x4
4,362,817 UART: [art] Derive Key Pair
4,363,177 UART: [art] Store priv key in slot 0x5
4,376,547 UART: [art] Derive Key Pair - Done
4,391,365 UART: [art] Signing Cert with AUTHO
4,391,845 UART: RITY.KEYID = 7
4,407,043 UART: [art] Erasing AUTHORITY.KEYID = 7
4,407,808 UART: [art] PUB.X = 52EE33C2F474951CBFE3FAFE041529F4E34F87336113C4262659A799A6B74731D991E3E23ECFC45508659C5184BED5AE
4,414,574 UART: [art] PUB.Y = B4FB6B98F21F0E00CB5E543AD98240B23F9C02222A702522304867653F897C60A8466FEDBD882652C6AFFF6E6F26750A
4,421,495 UART: [art] SIG.R = CE0BA2712E9099CE2F0E04368885050690F7B2F9A82D527B09BDD02A5E254F18FB89BA58841853CA5C81C1B1C0D7332C
4,428,251 UART: [art] SIG.S = EC5184D46568184C938B979FE8EA52F9874B5BAC8C3774FCFBC58712E6616613BEC0B8851DAE986B1D5EB6A0718E85C9
4,452,180 UART: Caliptra RT
4,452,525 UART: [state] CFI Enabled
4,737,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,174,910 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,469 UART: [kat] ++
895,621 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,740 UART: [kat] SHA2-512-ACC
906,641 UART: [kat] ECC-384
915,968 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,667 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,174,299 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,003 UART: [idev] Erasing UDS.KEYID = 0
1,198,499 UART: [idev] Sha1 KeyId Algorithm
1,207,361 UART: [idev] --
1,208,386 UART: [ldev] ++
1,208,554 UART: [ldev] CDI.KEYID = 6
1,208,918 UART: [ldev] SUBJECT.KEYID = 5
1,209,345 UART: [ldev] AUTHORITY.KEYID = 7
1,209,808 UART: [ldev] FE.KEYID = 1
1,215,002 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,136 UART: [ldev] --
1,280,450 UART: [fwproc] Wait for Commands...
1,281,151 UART: [fwproc] Recv command 0x46574c44
1,281,884 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,401 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,951 >>> mbox cmd response: success
2,770,951 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,772,058 UART: [afmc] ++
2,772,226 UART: [afmc] CDI.KEYID = 6
2,772,589 UART: [afmc] SUBJECT.KEYID = 7
2,773,015 UART: [afmc] AUTHORITY.KEYID = 5
2,808,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,353 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,836,965 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,684 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,501 UART: [afmc] --
2,851,385 UART: [cold-reset] --
2,852,037 UART: [state] Locking Datavault
2,853,280 UART: [state] Locking PCR0, PCR1 and PCR31
2,853,884 UART: [state] Locking ICCM
2,854,342 UART: [exit] Launching FMC @ 0x40000130
2,859,671 UART:
2,859,687 UART: Running Caliptra FMC ...
2,860,095 UART:
2,860,149 UART: [state] CFI Enabled
2,870,516 UART: [fht] FMC Alias Private Key: 7
2,977,939 UART: [art] Extend RT PCRs Done
2,978,367 UART: [art] Lock RT PCRs Done
2,980,059 UART: [art] Populate DV Done
2,988,228 UART: [fht] FMC Alias Private Key: 7
2,989,268 UART: [art] Derive CDI
2,989,548 UART: [art] Store in in slot 0x4
3,075,103 UART: [art] Derive Key Pair
3,075,463 UART: [art] Store priv key in slot 0x5
3,088,185 UART: [art] Derive Key Pair - Done
3,102,476 UART: [art] Signing Cert with AUTHO
3,102,956 UART: RITY.KEYID = 7
3,118,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,119,253 UART: [art] PUB.X = 92F7C9D207E797AD7C56A4E673D21093090CA6930C914A962964926BFE6FA8FE51685C8CB0BFAEE542D2041EA4EBC58C
3,126,018 UART: [art] PUB.Y = 04FAEE923F30BE477280F48B6BE4A42D37C828CCB984F7EBEBBF39318E9380A0E3F117EDE7008CD1828F8868D4A0E00F
3,132,954 UART: [art] SIG.R = 8C8D7833962118086D6ECC9B9E0413728C32F601932E1A2A1E94F68AE6D86DA4C1787D4674AD018D216D9E94A65BC8F7
3,139,712 UART: [art] SIG.S = 15892CB653C2D04BB94A2B90A5C1C557D30C99DC4EFC53491D313064667FAE83BC0C1FD21C7E193BC5EF0D9BB5563039
3,163,484 UART: Caliptra RT
3,163,737 UART: [state] CFI Enabled
3,270,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,272,418 UART:
3,272,434 UART: Running Caliptra ROM ...
3,272,842 UART:
3,272,897 UART: [state] CFI Enabled
3,275,149 UART: [state] LifecycleState = Unprovisioned
3,275,804 UART: [state] DebugLocked = No
3,276,476 UART: [state] WD Timer not started. Device not locked for debugging
3,277,720 UART: [kat] SHA2-256
4,081,270 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,085,399 UART: [kat] ++
4,085,551 UART: [kat] sha1
4,089,899 UART: [kat] SHA2-256
4,091,839 UART: [kat] SHA2-384
4,094,686 UART: [kat] SHA2-512-ACC
4,096,586 UART: [kat] ECC-384
4,106,271 UART: [kat] HMAC-384Kdf
4,110,959 UART: [kat] LMS
4,359,271 UART: [kat] --
4,360,135 UART: [update-reset] ++
4,450,121 >>> mbox cmd response: failed
4,450,121 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,450,385 UART: ROM Non-Fatal Error: 0x000B001F
4,451,343 UART: [state] Locking Datavault
4,452,033 UART: [state] Locking PCR0, PCR1 and PCR31
4,452,637 UART: [state] Locking ICCM
4,453,251 UART: [exit] Launching FMC @ 0x40000130
4,458,580 UART:
4,458,596 UART: Running Caliptra FMC ...
4,459,004 UART:
4,459,058 UART: [state] CFI Enabled
4,547,777 UART: [art] Extend RT PCRs Done
4,548,205 UART: [art] Lock RT PCRs Done
4,549,640 UART: [art] Populate DV Done
4,557,919 UART: [fht] FMC Alias Private Key: 7
4,559,069 UART: [art] Derive CDI
4,559,349 UART: [art] Store in in slot 0x4
4,644,896 UART: [art] Derive Key Pair
4,645,256 UART: [art] Store priv key in slot 0x5
4,658,500 UART: [art] Derive Key Pair - Done
4,673,401 UART: [art] Signing Cert with AUTHO
4,673,881 UART: RITY.KEYID = 7
4,689,349 UART: [art] Erasing AUTHORITY.KEYID = 7
4,690,114 UART: [art] PUB.X = 92F7C9D207E797AD7C56A4E673D21093090CA6930C914A962964926BFE6FA8FE51685C8CB0BFAEE542D2041EA4EBC58C
4,696,879 UART: [art] PUB.Y = 04FAEE923F30BE477280F48B6BE4A42D37C828CCB984F7EBEBBF39318E9380A0E3F117EDE7008CD1828F8868D4A0E00F
4,703,815 UART: [art] SIG.R = 8C8D7833962118086D6ECC9B9E0413728C32F601932E1A2A1E94F68AE6D86DA4C1787D4674AD018D216D9E94A65BC8F7
4,710,573 UART: [art] SIG.S = 15892CB653C2D04BB94A2B90A5C1C557D30C99DC4EFC53491D313064667FAE83BC0C1FD21C7E193BC5EF0D9BB5563039
4,734,649 UART: Caliptra RT
4,734,902 UART: [state] CFI Enabled
5,016,057 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,017,932 UART:
5,017,948 UART: Running Caliptra ROM ...
5,018,356 UART:
5,018,411 UART: [state] CFI Enabled
5,020,783 UART: [state] LifecycleState = Unprovisioned
5,021,438 UART: [state] DebugLocked = No
5,022,090 UART: [state] WD Timer not started. Device not locked for debugging
5,023,416 UART: [kat] SHA2-256
5,826,966 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,831,095 UART: [kat] ++
5,831,247 UART: [kat] sha1
5,835,445 UART: [kat] SHA2-256
5,837,385 UART: [kat] SHA2-384
5,840,096 UART: [kat] SHA2-512-ACC
5,841,996 UART: [kat] ECC-384
5,852,111 UART: [kat] HMAC-384Kdf
5,856,653 UART: [kat] LMS
6,104,965 UART: [kat] --
6,105,939 UART: [update-reset] ++
7,416,286 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,417,393 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,566,971 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,015 >>> mbox cmd response: success
2,618,015 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,679,649 UART:
2,679,665 UART: Running Caliptra FMC ...
2,680,073 UART:
2,680,127 UART: [state] CFI Enabled
2,690,406 UART: [fht] FMC Alias Private Key: 7
2,798,405 UART: [art] Extend RT PCRs Done
2,798,833 UART: [art] Lock RT PCRs Done
2,800,395 UART: [art] Populate DV Done
2,808,752 UART: [fht] FMC Alias Private Key: 7
2,809,926 UART: [art] Derive CDI
2,810,206 UART: [art] Store in in slot 0x4
2,896,101 UART: [art] Derive Key Pair
2,896,461 UART: [art] Store priv key in slot 0x5
2,909,343 UART: [art] Derive Key Pair - Done
2,924,159 UART: [art] Signing Cert with AUTHO
2,924,639 UART: RITY.KEYID = 7
2,939,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,940,362 UART: [art] PUB.X = 9ABCE22085DE0CA442AD61AAB559D534B1C9AE2909B695446BFA8D015B8110FE945814501F90FFB10719F542AEBA62DD
2,947,132 UART: [art] PUB.Y = EB9E904BF6F30A3F53F42AA70A1FB4BB80A566DCD51077CD79C33FCAFA899E8A0D7D5E7EC60087B0D770A815E56594A8
2,954,069 UART: [art] SIG.R = CB5639CCD7A8B5C3C0DF169F5BDB4223D8FFA8100E905B78C2E58A10721FF81770F3C1E9F4A23011BFB320A0D65B5BA2
2,960,852 UART: [art] SIG.S = 9347542378D44552B6DE66D317048E93DF53A2F9B76154599DD75A8A7D7F304108879D3295A110B77BF9472BE6814FE9
2,984,771 UART: Caliptra RT
2,985,024 UART: [state] CFI Enabled
3,092,616 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,153,667 >>> mbox cmd response: failed
4,153,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,159,496 UART:
4,159,512 UART: Running Caliptra FMC ...
4,159,920 UART:
4,159,974 UART: [state] CFI Enabled
4,248,829 UART: [art] Extend RT PCRs Done
4,249,257 UART: [art] Lock RT PCRs Done
4,250,346 UART: [art] Populate DV Done
4,258,461 UART: [fht] FMC Alias Private Key: 7
4,259,559 UART: [art] Derive CDI
4,259,839 UART: [art] Store in in slot 0x4
4,345,676 UART: [art] Derive Key Pair
4,346,036 UART: [art] Store priv key in slot 0x5
4,359,060 UART: [art] Derive Key Pair - Done
4,373,816 UART: [art] Signing Cert with AUTHO
4,374,296 UART: RITY.KEYID = 7
4,389,758 UART: [art] Erasing AUTHORITY.KEYID = 7
4,390,523 UART: [art] PUB.X = 9ABCE22085DE0CA442AD61AAB559D534B1C9AE2909B695446BFA8D015B8110FE945814501F90FFB10719F542AEBA62DD
4,397,293 UART: [art] PUB.Y = EB9E904BF6F30A3F53F42AA70A1FB4BB80A566DCD51077CD79C33FCAFA899E8A0D7D5E7EC60087B0D770A815E56594A8
4,404,230 UART: [art] SIG.R = CB5639CCD7A8B5C3C0DF169F5BDB4223D8FFA8100E905B78C2E58A10721FF81770F3C1E9F4A23011BFB320A0D65B5BA2
4,411,013 UART: [art] SIG.S = 9347542378D44552B6DE66D317048E93DF53A2F9B76154599DD75A8A7D7F304108879D3295A110B77BF9472BE6814FE9
4,434,328 UART: Caliptra RT
4,434,581 UART: [state] CFI Enabled
4,716,605 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,149,262 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,127 UART: [kat] HMAC-384Kdf
920,839 UART: [kat] LMS
1,169,151 UART: [kat] --
1,170,174 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,430 UART: [idev] ++
1,173,598 UART: [idev] CDI.KEYID = 6
1,173,959 UART: [idev] SUBJECT.KEYID = 7
1,174,384 UART: [idev] UDS.KEYID = 0
1,174,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,218 UART: [idev] --
1,209,341 UART: [ldev] ++
1,209,509 UART: [ldev] CDI.KEYID = 6
1,209,873 UART: [ldev] SUBJECT.KEYID = 5
1,210,300 UART: [ldev] AUTHORITY.KEYID = 7
1,210,763 UART: [ldev] FE.KEYID = 1
1,215,721 UART: [ldev] Erasing FE.KEYID = 1
1,242,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,829 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,606 >>> mbox cmd response: success
2,770,606 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,771,757 UART: [afmc] ++
2,771,925 UART: [afmc] CDI.KEYID = 6
2,772,288 UART: [afmc] SUBJECT.KEYID = 7
2,772,714 UART: [afmc] AUTHORITY.KEYID = 5
2,808,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,844 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,573 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,456 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,175 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,178 UART: [afmc] --
2,852,310 UART: [cold-reset] --
2,853,376 UART: [state] Locking Datavault
2,854,743 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,347 UART: [state] Locking ICCM
2,855,905 UART: [exit] Launching FMC @ 0x40000130
2,861,234 UART:
2,861,250 UART: Running Caliptra FMC ...
2,861,658 UART:
2,861,801 UART: [state] CFI Enabled
2,872,448 UART: [fht] FMC Alias Private Key: 7
2,980,397 UART: [art] Extend RT PCRs Done
2,980,825 UART: [art] Lock RT PCRs Done
2,982,471 UART: [art] Populate DV Done
2,990,824 UART: [fht] FMC Alias Private Key: 7
2,991,770 UART: [art] Derive CDI
2,992,050 UART: [art] Store in in slot 0x4
3,077,837 UART: [art] Derive Key Pair
3,078,197 UART: [art] Store priv key in slot 0x5
3,092,203 UART: [art] Derive Key Pair - Done
3,107,083 UART: [art] Signing Cert with AUTHO
3,107,563 UART: RITY.KEYID = 7
3,122,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,410 UART: [art] PUB.X = AC1B0E03F6F2343A71BF8C86AFAB2F4FF4F3D18F9F453350D2EF4A35A419B633DACA80E9123F090023288EE846FCB3BA
3,130,167 UART: [art] PUB.Y = CE054559E7AC505836029674DBF55A0FC80BFA034B1CEA5B6266DD6CE4B4C49B4671E43AD7701ED074902CBA456D3D47
3,137,112 UART: [art] SIG.R = 075272FA1AAB065B11D0F42355650B28C6A900BA992EF546BCB89384578F9B2F779973E86ADF3C243066CDE3C3356072
3,143,849 UART: [art] SIG.S = 8E97A358A6142E62A42DE5ECCAD6642E054FC47AC0BAF1D88F4ADC0FC9AD8B8C4D2F110BED77260EEB49D320C8357F2B
3,167,554 UART: Caliptra RT
3,167,899 UART: [state] CFI Enabled
3,275,402 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,352 UART:
3,277,368 UART: Running Caliptra ROM ...
3,277,776 UART:
3,277,918 UART: [state] CFI Enabled
3,280,218 UART: [state] LifecycleState = Unprovisioned
3,280,873 UART: [state] DebugLocked = No
3,281,489 UART: [state] WD Timer not started. Device not locked for debugging
3,282,613 UART: [kat] SHA2-256
4,086,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,292 UART: [kat] ++
4,090,444 UART: [kat] sha1
4,094,700 UART: [kat] SHA2-256
4,096,640 UART: [kat] SHA2-384
4,099,259 UART: [kat] SHA2-512-ACC
4,101,159 UART: [kat] ECC-384
4,111,176 UART: [kat] HMAC-384Kdf
4,115,796 UART: [kat] LMS
4,364,108 UART: [kat] --
4,364,998 UART: [update-reset] ++
4,452,872 >>> mbox cmd response: failed
4,452,872 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,453,362 UART: ROM Non-Fatal Error: 0x000B001F
4,454,290 UART: [state] Locking Datavault
4,455,118 UART: [state] Locking PCR0, PCR1 and PCR31
4,455,722 UART: [state] Locking ICCM
4,456,332 UART: [exit] Launching FMC @ 0x40000130
4,461,661 UART:
4,461,677 UART: Running Caliptra FMC ...
4,462,085 UART:
4,462,228 UART: [state] CFI Enabled
4,551,319 UART: [art] Extend RT PCRs Done
4,551,747 UART: [art] Lock RT PCRs Done
4,553,166 UART: [art] Populate DV Done
4,561,363 UART: [fht] FMC Alias Private Key: 7
4,562,461 UART: [art] Derive CDI
4,562,741 UART: [art] Store in in slot 0x4
4,648,238 UART: [art] Derive Key Pair
4,648,598 UART: [art] Store priv key in slot 0x5
4,662,118 UART: [art] Derive Key Pair - Done
4,676,962 UART: [art] Signing Cert with AUTHO
4,677,442 UART: RITY.KEYID = 7
4,692,686 UART: [art] Erasing AUTHORITY.KEYID = 7
4,693,451 UART: [art] PUB.X = AC1B0E03F6F2343A71BF8C86AFAB2F4FF4F3D18F9F453350D2EF4A35A419B633DACA80E9123F090023288EE846FCB3BA
4,700,208 UART: [art] PUB.Y = CE054559E7AC505836029674DBF55A0FC80BFA034B1CEA5B6266DD6CE4B4C49B4671E43AD7701ED074902CBA456D3D47
4,707,153 UART: [art] SIG.R = 075272FA1AAB065B11D0F42355650B28C6A900BA992EF546BCB89384578F9B2F779973E86ADF3C243066CDE3C3356072
4,713,890 UART: [art] SIG.S = 8E97A358A6142E62A42DE5ECCAD6642E054FC47AC0BAF1D88F4ADC0FC9AD8B8C4D2F110BED77260EEB49D320C8357F2B
4,737,647 UART: Caliptra RT
4,737,992 UART: [state] CFI Enabled
5,018,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,020,318 UART:
5,020,334 UART: Running Caliptra ROM ...
5,020,742 UART:
5,020,884 UART: [state] CFI Enabled
5,024,020 UART: [state] LifecycleState = Unprovisioned
5,024,675 UART: [state] DebugLocked = No
5,025,253 UART: [state] WD Timer not started. Device not locked for debugging
5,026,447 UART: [kat] SHA2-256
5,829,997 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,834,126 UART: [kat] ++
5,834,278 UART: [kat] sha1
5,838,566 UART: [kat] SHA2-256
5,840,506 UART: [kat] SHA2-384
5,843,189 UART: [kat] SHA2-512-ACC
5,845,089 UART: [kat] ECC-384
5,855,136 UART: [kat] HMAC-384Kdf
5,859,862 UART: [kat] LMS
6,108,174 UART: [kat] --
6,109,350 UART: [update-reset] ++
7,419,231 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,420,344 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,569,922 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,638 >>> mbox cmd response: success
2,620,638 <<< Executing mbox cmd 0x46574c44 (99468 bytes) from SoC
2,683,336 UART:
2,683,352 UART: Running Caliptra FMC ...
2,683,760 UART:
2,683,903 UART: [state] CFI Enabled
2,694,526 UART: [fht] FMC Alias Private Key: 7
2,802,083 UART: [art] Extend RT PCRs Done
2,802,511 UART: [art] Lock RT PCRs Done
2,803,959 UART: [art] Populate DV Done
2,812,120 UART: [fht] FMC Alias Private Key: 7
2,813,068 UART: [art] Derive CDI
2,813,348 UART: [art] Store in in slot 0x4
2,898,707 UART: [art] Derive Key Pair
2,899,067 UART: [art] Store priv key in slot 0x5
2,912,763 UART: [art] Derive Key Pair - Done
2,927,448 UART: [art] Signing Cert with AUTHO
2,927,928 UART: RITY.KEYID = 7
2,943,072 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,837 UART: [art] PUB.X = F1D68FA7624A338C9CF4AD386F4119AB4D28F4047EC68EDD52E55030F011F9BE7BC2E05A2353FC44831A26D83AA09FD2
2,950,616 UART: [art] PUB.Y = 55EF08E86980174DC85C43D7C5379C9D52C7465FB73831B1F8B9430E31C8069D06257C020F84DFF43F4AB1B04C481A2E
2,957,548 UART: [art] SIG.R = AE54A580978FF8E01A3F96434D460A82653270603B60FDABD70904BD5CF16D583DB0ABFC9B00921E80EFA993A3CA344C
2,964,297 UART: [art] SIG.S = 2A80E09E06254BE23F26CAD509BB06184FE4FF92C8F1E1490CA77964E5F54D033204123C3F1FBCA919708B88DCF5D60E
2,988,627 UART: Caliptra RT
2,988,972 UART: [state] CFI Enabled
3,097,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,159,119 >>> mbox cmd response: failed
4,159,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,164,830 UART:
4,164,846 UART: Running Caliptra FMC ...
4,165,254 UART:
4,165,397 UART: [state] CFI Enabled
4,254,960 UART: [art] Extend RT PCRs Done
4,255,388 UART: [art] Lock RT PCRs Done
4,256,761 UART: [art] Populate DV Done
4,264,738 UART: [fht] FMC Alias Private Key: 7
4,265,888 UART: [art] Derive CDI
4,266,168 UART: [art] Store in in slot 0x4
4,351,991 UART: [art] Derive Key Pair
4,352,351 UART: [art] Store priv key in slot 0x5
4,365,917 UART: [art] Derive Key Pair - Done
4,380,518 UART: [art] Signing Cert with AUTHO
4,380,998 UART: RITY.KEYID = 7
4,396,054 UART: [art] Erasing AUTHORITY.KEYID = 7
4,396,819 UART: [art] PUB.X = F1D68FA7624A338C9CF4AD386F4119AB4D28F4047EC68EDD52E55030F011F9BE7BC2E05A2353FC44831A26D83AA09FD2
4,403,598 UART: [art] PUB.Y = 55EF08E86980174DC85C43D7C5379C9D52C7465FB73831B1F8B9430E31C8069D06257C020F84DFF43F4AB1B04C481A2E
4,410,530 UART: [art] SIG.R = AE54A580978FF8E01A3F96434D460A82653270603B60FDABD70904BD5CF16D583DB0ABFC9B00921E80EFA993A3CA344C
4,417,279 UART: [art] SIG.S = 2A80E09E06254BE23F26CAD509BB06184FE4FF92C8F1E1490CA77964E5F54D033204123C3F1FBCA919708B88DCF5D60E
4,440,925 UART: Caliptra RT
4,441,270 UART: [state] CFI Enabled
4,726,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,159,663 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,296 UART:
192,651 UART: Running Caliptra ROM ...
193,836 UART:
193,984 UART: [state] CFI Enabled
253,967 UART: [state] LifecycleState = Unprovisioned
255,944 UART: [state] DebugLocked = No
257,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,890 UART: [kat] SHA2-256
432,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,119 UART: [kat] ++
443,589 UART: [kat] sha1
454,976 UART: [kat] SHA2-256
457,663 UART: [kat] SHA2-384
464,989 UART: [kat] SHA2-512-ACC
467,363 UART: [kat] ECC-384
2,764,498 UART: [kat] HMAC-384Kdf
2,795,251 UART: [kat] LMS
3,985,610 UART: [kat] --
3,992,052 UART: [cold-reset] ++
3,994,562 UART: [fht] Storing FHT @ 0x50003400
4,006,108 UART: [idev] ++
4,006,689 UART: [idev] CDI.KEYID = 6
4,007,574 UART: [idev] SUBJECT.KEYID = 7
4,008,846 UART: [idev] UDS.KEYID = 0
4,011,516 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,154,892 UART: [idev] Erasing UDS.KEYID = 0
7,339,382 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,270 UART: [idev] --
7,364,380 UART: [ldev] ++
7,364,959 UART: [ldev] CDI.KEYID = 6
7,365,925 UART: [ldev] SUBJECT.KEYID = 5
7,367,142 UART: [ldev] AUTHORITY.KEYID = 7
7,368,375 UART: [ldev] FE.KEYID = 1
7,398,201 UART: [ldev] Erasing FE.KEYID = 1
10,731,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,833 UART: [ldev] --
13,115,414 UART: [fwproc] Waiting for Commands...
13,117,953 UART: [fwproc] Received command 0x46574c44
13,120,198 UART: [fwproc] Received Image of size 113844 bytes
17,175,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,171 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,038 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,638,558 >>> mbox cmd response: success
17,640,598 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,783,911 UART: [afmc] ++
17,784,555 UART: [afmc] CDI.KEYID = 6
17,785,481 UART: [afmc] SUBJECT.KEYID = 7
17,786,592 UART: [afmc] AUTHORITY.KEYID = 5
21,003,241 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,747 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,322,156 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,979 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,442 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,372,832 UART: [afmc] --
23,376,279 UART: [cold-reset] --
23,379,654 UART: [state] Locking Datavault
23,387,223 UART: [state] Locking PCR0, PCR1 and PCR31
23,388,929 UART: [state] Locking ICCM
23,391,079 UART: [exit] Launching FMC @ 0x40000130
23,399,478 UART:
23,399,718 UART: Running Caliptra FMC ...
23,400,822 UART:
23,400,980 UART: [state] CFI Enabled
23,467,145 UART: [fht] FMC Alias Private Key: 7
25,805,440 UART: [art] Extend RT PCRs Done
25,806,669 UART: [art] Lock RT PCRs Done
25,808,346 UART: [art] Populate DV Done
25,813,759 UART: [fht] FMC Alias Private Key: 7
25,815,405 UART: [art] Derive CDI
25,816,219 UART: [art] Store in in slot 0x4
25,875,893 UART: [art] Derive Key Pair
25,876,952 UART: [art] Store priv key in slot 0x5
29,169,601 UART: [art] Derive Key Pair - Done
29,182,970 UART: [art] Signing Cert with AUTHO
29,184,266 UART: RITY.KEYID = 7
31,471,259 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,764 UART: [art] PUB.X = 850F7D3EA4427BB90A1FF89A31983BAFB608D5ADEAD23C1368D6EFB9350B3A1349DE8A9DF76780EA52DE59A272C3013F
31,480,022 UART: [art] PUB.Y = 3573FD82D2F60AB157EF29C89BFF22E8DE52AAE2E9D2F7C82D8DF929016577FCD4C5CC7E4C7ED3D950367EFDF98E4B48
31,487,315 UART: [art] SIG.R = 34199A96AE91322B3CF753567C5E079EE2C1E03A7CC82839887CA591E5B682723D4445FF1062C6DF515B3EF57CBB9F9D
31,494,673 UART: [art] SIG.S = 8ABAC630DD76CE5BA0027E3ED1A13899DD6F7FE09935F3923702554032970AC4BE9DC0831E16A60DAEF0A3C3E8F4BFDF
32,799,944 UART: Caliptra RT
32,800,652 UART: [state] CFI Enabled
32,962,459 UART: [rt] RT listening for mailbox commands...
32,965,577 UART:
32,965,743 UART: Running Caliptra ROM ...
32,966,761 UART:
32,966,925 UART: [state] CFI Enabled
33,027,050 UART: [state] LifecycleState = Unprovisioned
33,028,974 UART: [state] DebugLocked = No
33,031,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,036,351 UART: [kat] SHA2-256
33,206,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,216,531 UART: [kat] ++
33,216,987 UART: [kat] sha1
33,226,897 UART: [kat] SHA2-256
33,229,587 UART: [kat] SHA2-384
33,234,921 UART: [kat] SHA2-512-ACC
33,237,265 UART: [kat] ECC-384
35,529,285 UART: [kat] HMAC-384Kdf
35,540,002 UART: [kat] LMS
36,730,363 UART: [kat] --
36,732,366 UART: [update-reset] ++
36,834,123 >>> mbox cmd response: failed
36,835,809 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,979,066 UART: ROM Non-Fatal Error: 0x000B001D
36,980,496 UART: [state] Locking Datavault
36,981,646 UART: [state] Locking PCR0, PCR1 and PCR31
36,983,185 UART: [state] Locking ICCM
36,984,089 UART: [exit] Launching FMC @ 0x40000130
36,985,514 UART:
36,985,674 UART: Running Caliptra FMC ...
36,986,774 UART:
36,986,932 UART: [state] CFI Enabled
36,987,851 UART: [art] Extend RT PCRs Done
36,988,985 UART: [art] Lock RT PCRs Done
36,989,996 UART: [art] Populate DV Done
36,990,943 UART: [fht] FMC Alias Private Key: 7
36,992,254 UART: [art] Derive CDI
36,993,008 UART: [art] Store in in slot 0x4
37,030,236 UART: [art] Derive Key Pair
37,031,304 UART: [art] Store priv key in slot 0x5
40,324,490 UART: [art] Derive Key Pair - Done
40,337,487 UART: [art] Signing Cert with AUTHO
40,338,795 UART: RITY.KEYID = 7
42,625,320 UART: [art] Erasing AUTHORITY.KEYID = 7
42,626,833 UART: [art] PUB.X = 850F7D3EA4427BB90A1FF89A31983BAFB608D5ADEAD23C1368D6EFB9350B3A1349DE8A9DF76780EA52DE59A272C3013F
42,634,075 UART: [art] PUB.Y = 3573FD82D2F60AB157EF29C89BFF22E8DE52AAE2E9D2F7C82D8DF929016577FCD4C5CC7E4C7ED3D950367EFDF98E4B48
42,641,325 UART: [art] SIG.R = 34199A96AE91322B3CF753567C5E079EE2C1E03A7CC82839887CA591E5B682723D4445FF1062C6DF515B3EF57CBB9F9D
42,648,738 UART: [art] SIG.S = 8ABAC630DD76CE5BA0027E3ED1A13899DD6F7FE09935F3923702554032970AC4BE9DC0831E16A60DAEF0A3C3E8F4BFDF
43,954,043 UART: Caliptra RT
43,954,745 UART: [state] CFI Enabled
44,283,216 UART: [rt] RT listening for mailbox commands...
44,285,854 UART:
44,286,107 UART: Running Caliptra ROM ...
44,287,236 UART:
44,287,396 UART: [state] CFI Enabled
44,350,122 UART: [state] LifecycleState = Unprovisioned
44,352,104 UART: [state] DebugLocked = No
44,354,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,358,720 UART: [kat] SHA2-256
44,528,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,538,940 UART: [kat] ++
44,539,484 UART: [kat] sha1
44,550,363 UART: [kat] SHA2-256
44,553,069 UART: [kat] SHA2-384
44,559,018 UART: [kat] SHA2-512-ACC
44,561,371 UART: [kat] ECC-384
46,857,628 UART: [kat] HMAC-384Kdf
46,888,378 UART: [kat] LMS
48,078,733 UART: [kat] --
48,084,962 UART: [update-reset] ++
52,217,327 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,220,288 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
52,601,606 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,807,125 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,889,625 >>> mbox cmd response: success
17,891,554 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,590,459 UART:
23,590,866 UART: Running Caliptra FMC ...
23,591,961 UART:
23,592,116 UART: [state] CFI Enabled
23,658,407 UART: [fht] FMC Alias Private Key: 7
25,997,532 UART: [art] Extend RT PCRs Done
25,998,751 UART: [art] Lock RT PCRs Done
26,000,485 UART: [art] Populate DV Done
26,005,596 UART: [fht] FMC Alias Private Key: 7
26,007,312 UART: [art] Derive CDI
26,008,134 UART: [art] Store in in slot 0x4
26,067,914 UART: [art] Derive Key Pair
26,068,951 UART: [art] Store priv key in slot 0x5
29,362,071 UART: [art] Derive Key Pair - Done
29,375,024 UART: [art] Signing Cert with AUTHO
29,376,334 UART: RITY.KEYID = 7
31,663,976 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,480 UART: [art] PUB.X = D3EE348A294CFCE5650CE14DBF794FC217F52B06956F82917B1259B17DB3F7CEC220C827C256E05C822BC1874F2A2E64
31,672,732 UART: [art] PUB.Y = 6382E467EF94CA33763CEA32C6CE4A6B4C98F4E07A52CB149C28F1385771431627F4A790FAB81F67E3506FE7C9FF1405
31,679,950 UART: [art] SIG.R = D92351E9BE531828316F3AFB0AD95228FD367A344129962B2CE97CCAF603F09285AEDDF1F04F5E45342280DFFA004161
31,687,295 UART: [art] SIG.S = C6610CB548FD3AF50B4846481C5B863C7190BC6768A3A1172A5C82E83733195D5643C01D6D695DAD7CD346AF688B56DB
32,992,032 UART: Caliptra RT
32,992,745 UART: [state] CFI Enabled
33,156,550 UART: [rt] RT listening for mailbox commands...
36,849,330 >>> mbox cmd response: failed
36,851,025 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,994,289 UART:
36,994,588 UART: Running Caliptra FMC ...
36,995,705 UART:
36,995,872 UART: [state] CFI Enabled
36,996,798 UART: [art] Extend RT PCRs Done
36,997,935 UART: [art] Lock RT PCRs Done
36,999,001 UART: [art] Populate DV Done
37,000,103 UART: [fht] FMC Alias Private Key: 7
37,001,433 UART: [art] Derive CDI
37,002,173 UART: [art] Store in in slot 0x4
37,034,513 UART: [art] Derive Key Pair
37,035,510 UART: [art] Store priv key in slot 0x5
40,328,056 UART: [art] Derive Key Pair - Done
40,341,428 UART: [art] Signing Cert with AUTHO
40,342,747 UART: RITY.KEYID = 7
42,629,407 UART: [art] Erasing AUTHORITY.KEYID = 7
42,630,905 UART: [art] PUB.X = D3EE348A294CFCE5650CE14DBF794FC217F52B06956F82917B1259B17DB3F7CEC220C827C256E05C822BC1874F2A2E64
42,638,146 UART: [art] PUB.Y = 6382E467EF94CA33763CEA32C6CE4A6B4C98F4E07A52CB149C28F1385771431627F4A790FAB81F67E3506FE7C9FF1405
42,645,419 UART: [art] SIG.R = D92351E9BE531828316F3AFB0AD95228FD367A344129962B2CE97CCAF603F09285AEDDF1F04F5E45342280DFFA004161
42,652,753 UART: [art] SIG.S = C6610CB548FD3AF50B4846481C5B863C7190BC6768A3A1172A5C82E83733195D5643C01D6D695DAD7CD346AF688B56DB
43,957,846 UART: Caliptra RT
43,958,563 UART: [state] CFI Enabled
44,292,265 UART: [rt] RT listening for mailbox commands...
52,887,501 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,467 UART:
192,848 UART: Running Caliptra ROM ...
193,984 UART:
603,524 UART: [state] CFI Enabled
616,862 UART: [state] LifecycleState = Unprovisioned
618,816 UART: [state] DebugLocked = No
620,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,989 UART: [kat] SHA2-256
794,721 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,259 UART: [kat] ++
805,848 UART: [kat] sha1
816,622 UART: [kat] SHA2-256
819,323 UART: [kat] SHA2-384
826,094 UART: [kat] SHA2-512-ACC
828,448 UART: [kat] ECC-384
3,112,567 UART: [kat] HMAC-384Kdf
3,124,223 UART: [kat] LMS
4,314,377 UART: [kat] --
4,320,357 UART: [cold-reset] ++
4,322,629 UART: [fht] Storing FHT @ 0x50003400
4,335,625 UART: [idev] ++
4,336,211 UART: [idev] CDI.KEYID = 6
4,337,228 UART: [idev] SUBJECT.KEYID = 7
4,338,561 UART: [idev] UDS.KEYID = 0
4,341,515 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,567 UART: [idev] Erasing UDS.KEYID = 0
7,623,040 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,360 UART: [idev] --
7,650,330 UART: [ldev] ++
7,650,897 UART: [ldev] CDI.KEYID = 6
7,651,855 UART: [ldev] SUBJECT.KEYID = 5
7,653,067 UART: [ldev] AUTHORITY.KEYID = 7
7,654,302 UART: [ldev] FE.KEYID = 1
7,663,543 UART: [ldev] Erasing FE.KEYID = 1
10,952,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,900 UART: [ldev] --
13,313,827 UART: [fwproc] Waiting for Commands...
13,315,445 UART: [fwproc] Received command 0x46574c44
13,317,637 UART: [fwproc] Received Image of size 113844 bytes
17,368,521 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,036 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,511,906 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,850 >>> mbox cmd response: success
17,829,937 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,972,967 UART: [afmc] ++
17,973,613 UART: [afmc] CDI.KEYID = 6
17,974,503 UART: [afmc] SUBJECT.KEYID = 7
17,975,551 UART: [afmc] AUTHORITY.KEYID = 5
21,148,807 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,446,117 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,460,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,475,337 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,489,787 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,510,431 UART: [afmc] --
23,514,144 UART: [cold-reset] --
23,516,172 UART: [state] Locking Datavault
23,520,504 UART: [state] Locking PCR0, PCR1 and PCR31
23,522,202 UART: [state] Locking ICCM
23,524,186 UART: [exit] Launching FMC @ 0x40000130
23,532,579 UART:
23,532,817 UART: Running Caliptra FMC ...
23,533,920 UART:
23,534,080 UART: [state] CFI Enabled
23,542,143 UART: [fht] FMC Alias Private Key: 7
25,873,242 UART: [art] Extend RT PCRs Done
25,874,466 UART: [art] Lock RT PCRs Done
25,876,485 UART: [art] Populate DV Done
25,881,949 UART: [fht] FMC Alias Private Key: 7
25,883,643 UART: [art] Derive CDI
25,884,459 UART: [art] Store in in slot 0x4
25,926,834 UART: [art] Derive Key Pair
25,927,832 UART: [art] Store priv key in slot 0x5
29,170,072 UART: [art] Derive Key Pair - Done
29,183,338 UART: [art] Signing Cert with AUTHO
29,184,638 UART: RITY.KEYID = 7
31,464,254 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,760 UART: [art] PUB.X = 3CE536C1F1CFA747CD7FDA2B4CAFDA0110C9626F7825EAC873A09AFE52718214AD4CD3EAE03103492C00E0D9A9545690
31,473,023 UART: [art] PUB.Y = 068F28E003BE5C0CD0A316AB8D7F560B0FE14EDEFD69419ED98C7EAC6F4D55652E6AF3778718DA396054A6DEEACA6CF9
31,480,335 UART: [art] SIG.R = B80F655B43687FA2961E2AD318B9AF347CEA12361A5496EB165706FC8CAA313C56B2E577C60E04C7D29FAA327ABF4FBD
31,487,686 UART: [art] SIG.S = 6837C335A26825D7EC8193BC8B20CCF0839A08D1DBF23456FC954CC18FF55F569F3BE612B198831EC0288D252D394BE9
32,792,735 UART: Caliptra RT
32,793,420 UART: [state] CFI Enabled
32,910,948 UART: [rt] RT listening for mailbox commands...
32,914,116 UART:
32,914,365 UART: Running Caliptra ROM ...
32,915,472 UART:
32,915,740 UART: [state] CFI Enabled
32,928,274 UART: [state] LifecycleState = Unprovisioned
32,930,209 UART: [state] DebugLocked = No
32,932,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,937,982 UART: [kat] SHA2-256
33,107,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,118,211 UART: [kat] ++
33,118,697 UART: [kat] sha1
33,129,639 UART: [kat] SHA2-256
33,132,327 UART: [kat] SHA2-384
33,139,034 UART: [kat] SHA2-512-ACC
33,141,440 UART: [kat] ECC-384
35,426,309 UART: [kat] HMAC-384Kdf
35,439,818 UART: [kat] LMS
36,629,869 UART: [kat] --
36,634,842 UART: [update-reset] ++
36,739,140 >>> mbox cmd response: failed
36,740,888 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,883,702 UART: ROM Non-Fatal Error: 0x000B001D
36,885,129 UART: [state] Locking Datavault
36,886,284 UART: [state] Locking PCR0, PCR1 and PCR31
36,887,821 UART: [state] Locking ICCM
36,888,726 UART: [exit] Launching FMC @ 0x40000130
36,890,146 UART:
36,890,302 UART: Running Caliptra FMC ...
36,891,399 UART:
36,891,576 UART: [state] CFI Enabled
36,892,495 UART: [art] Extend RT PCRs Done
36,893,629 UART: [art] Lock RT PCRs Done
36,894,692 UART: [art] Populate DV Done
36,895,718 UART: [fht] FMC Alias Private Key: 7
36,897,032 UART: [art] Derive CDI
36,897,769 UART: [art] Store in in slot 0x4
36,899,155 UART: [art] Derive Key Pair
36,900,162 UART: [art] Store priv key in slot 0x5
40,101,424 UART: [art] Derive Key Pair - Done
40,114,268 UART: [art] Signing Cert with AUTHO
40,115,722 UART: RITY.KEYID = 7
42,395,167 UART: [art] Erasing AUTHORITY.KEYID = 7
42,396,693 UART: [art] PUB.X = 3CE536C1F1CFA747CD7FDA2B4CAFDA0110C9626F7825EAC873A09AFE52718214AD4CD3EAE03103492C00E0D9A9545690
42,403,929 UART: [art] PUB.Y = 068F28E003BE5C0CD0A316AB8D7F560B0FE14EDEFD69419ED98C7EAC6F4D55652E6AF3778718DA396054A6DEEACA6CF9
42,411,198 UART: [art] SIG.R = B80F655B43687FA2961E2AD318B9AF347CEA12361A5496EB165706FC8CAA313C56B2E577C60E04C7D29FAA327ABF4FBD
42,418,743 UART: [art] SIG.S = 6837C335A26825D7EC8193BC8B20CCF0839A08D1DBF23456FC954CC18FF55F569F3BE612B198831EC0288D252D394BE9
43,723,675 UART: Caliptra RT
43,724,395 UART: [state] CFI Enabled
44,011,850 UART: [rt] RT listening for mailbox commands...
44,014,619 UART:
44,014,881 UART: Running Caliptra ROM ...
44,016,006 UART:
44,016,280 UART: [state] CFI Enabled
44,032,577 UART: [state] LifecycleState = Unprovisioned
44,034,502 UART: [state] DebugLocked = No
44,036,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,041,733 UART: [kat] SHA2-256
44,211,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,222,005 UART: [kat] ++
44,222,546 UART: [kat] sha1
44,234,679 UART: [kat] SHA2-256
44,237,392 UART: [kat] SHA2-384
44,243,215 UART: [kat] SHA2-512-ACC
44,245,616 UART: [kat] ECC-384
46,528,564 UART: [kat] HMAC-384Kdf
46,540,355 UART: [kat] LMS
47,730,426 UART: [kat] --
47,735,767 UART: [update-reset] ++
51,870,202 UART: [update-reset] Image verified using Vendor ECC Key Index 0
51,873,971 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
52,255,278 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,128,390 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,064,402 >>> mbox cmd response: success
18,066,429 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,710,754 UART:
23,711,172 UART: Running Caliptra FMC ...
23,712,271 UART:
23,712,435 UART: [state] CFI Enabled
23,720,271 UART: [fht] FMC Alias Private Key: 7
26,050,543 UART: [art] Extend RT PCRs Done
26,051,789 UART: [art] Lock RT PCRs Done
26,053,442 UART: [art] Populate DV Done
26,058,698 UART: [fht] FMC Alias Private Key: 7
26,060,243 UART: [art] Derive CDI
26,061,015 UART: [art] Store in in slot 0x4
26,103,785 UART: [art] Derive Key Pair
26,104,827 UART: [art] Store priv key in slot 0x5
29,347,293 UART: [art] Derive Key Pair - Done
29,360,010 UART: [art] Signing Cert with AUTHO
29,361,348 UART: RITY.KEYID = 7
31,640,621 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,135 UART: [art] PUB.X = 6A83196237B7D49D1074CA0DFEF17721613A7B98D758D05B682FAB7A614F9B46AA8FC4FA1BDDD86F46D35FCBBFCCD7A5
31,649,388 UART: [art] PUB.Y = D72A49AA31ED1E76342CA019FE2E648BB41169A2B41BF8029CE6CA006FF967F12128D1029312A65F779AD7DC6704E5C0
31,656,641 UART: [art] SIG.R = 6B43307B40CABE1B22EC9E05BACDE9F21C0E11212268C13D81C5E9976DFEE5A0D374A7EE7D78AD76EFDF37FED28EF7DA
31,664,048 UART: [art] SIG.S = 3AF48332C718B9B52218BF6C0FD4EC760F9E2944F5F2584FA3F68A3916923177FE0A31BBE98463339F63C4AB38FD8B0D
32,968,892 UART: Caliptra RT
32,969,607 UART: [state] CFI Enabled
33,087,641 UART: [rt] RT listening for mailbox commands...
36,722,482 >>> mbox cmd response: failed
36,724,334 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,867,265 UART:
36,867,576 UART: Running Caliptra FMC ...
36,868,696 UART:
36,868,865 UART: [state] CFI Enabled
36,869,788 UART: [art] Extend RT PCRs Done
36,870,927 UART: [art] Lock RT PCRs Done
36,871,989 UART: [art] Populate DV Done
36,873,105 UART: [fht] FMC Alias Private Key: 7
36,874,646 UART: [art] Derive CDI
36,875,392 UART: [art] Store in in slot 0x4
36,876,565 UART: [art] Derive Key Pair
36,877,506 UART: [art] Store priv key in slot 0x5
40,075,308 UART: [art] Derive Key Pair - Done
40,088,001 UART: [art] Signing Cert with AUTHO
40,089,312 UART: RITY.KEYID = 7
42,369,003 UART: [art] Erasing AUTHORITY.KEYID = 7
42,370,527 UART: [art] PUB.X = 6A83196237B7D49D1074CA0DFEF17721613A7B98D758D05B682FAB7A614F9B46AA8FC4FA1BDDD86F46D35FCBBFCCD7A5
42,377,786 UART: [art] PUB.Y = D72A49AA31ED1E76342CA019FE2E648BB41169A2B41BF8029CE6CA006FF967F12128D1029312A65F779AD7DC6704E5C0
42,385,022 UART: [art] SIG.R = 6B43307B40CABE1B22EC9E05BACDE9F21C0E11212268C13D81C5E9976DFEE5A0D374A7EE7D78AD76EFDF37FED28EF7DA
42,392,429 UART: [art] SIG.S = 3AF48332C718B9B52218BF6C0FD4EC760F9E2944F5F2584FA3F68A3916923177FE0A31BBE98463339F63C4AB38FD8B0D
43,697,558 UART: Caliptra RT
43,698,263 UART: [state] CFI Enabled
43,989,552 UART: [rt] RT listening for mailbox commands...
52,498,163 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,362 UART:
192,721 UART: Running Caliptra ROM ...
193,927 UART:
194,083 UART: [state] CFI Enabled
262,670 UART: [state] LifecycleState = Unprovisioned
264,540 UART: [state] DebugLocked = No
266,192 UART: [state] WD Timer not started. Device not locked for debugging
270,446 UART: [kat] SHA2-256
449,547 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,156 UART: [kat] ++
461,695 UART: [kat] sha1
472,802 UART: [kat] SHA2-256
475,836 UART: [kat] SHA2-384
481,166 UART: [kat] SHA2-512-ACC
484,104 UART: [kat] ECC-384
2,944,768 UART: [kat] HMAC-384Kdf
2,966,506 UART: [kat] LMS
3,495,974 UART: [kat] --
3,498,688 UART: [cold-reset] ++
3,500,351 UART: [fht] FHT @ 0x50003400
3,511,814 UART: [idev] ++
3,512,378 UART: [idev] CDI.KEYID = 6
3,513,284 UART: [idev] SUBJECT.KEYID = 7
3,514,498 UART: [idev] UDS.KEYID = 0
3,517,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,661,065 UART: [idev] Erasing UDS.KEYID = 0
6,018,881 UART: [idev] Sha1 KeyId Algorithm
6,041,403 UART: [idev] --
6,044,819 UART: [ldev] ++
6,045,404 UART: [ldev] CDI.KEYID = 6
6,046,320 UART: [ldev] SUBJECT.KEYID = 5
6,047,484 UART: [ldev] AUTHORITY.KEYID = 7
6,049,445 UART: [ldev] FE.KEYID = 1
6,094,123 UART: [ldev] Erasing FE.KEYID = 1
8,598,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,878 UART: [ldev] --
10,386,723 UART: [fwproc] Wait for Commands...
10,388,393 UART: [fwproc] Recv command 0x46574c44
10,390,491 UART: [fwproc] Recv'd Img size: 114168 bytes
13,786,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,857,499 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,926,257 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,244,340 >>> mbox cmd response: success
14,246,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,389,986 UART: [afmc] ++
14,390,628 UART: [afmc] CDI.KEYID = 6
14,391,550 UART: [afmc] SUBJECT.KEYID = 7
14,392,595 UART: [afmc] AUTHORITY.KEYID = 5
16,779,474 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,505,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,507,834 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,523,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,539,629 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,555,519 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,578,283 UART: [afmc] --
18,581,223 UART: [cold-reset] --
18,583,911 UART: [state] Locking Datavault
18,588,669 UART: [state] Locking PCR0, PCR1 and PCR31
18,590,312 UART: [state] Locking ICCM
18,592,331 UART: [exit] Launching FMC @ 0x40000130
18,600,784 UART:
18,601,018 UART: Running Caliptra FMC ...
18,602,049 UART:
18,602,198 UART: [state] CFI Enabled
18,664,537 UART: [fht] FMC Alias Private Key: 7
20,427,908 UART: [art] Extend RT PCRs Done
20,429,138 UART: [art] Lock RT PCRs Done
20,430,544 UART: [art] Populate DV Done
20,435,960 UART: [fht] FMC Alias Private Key: 7
20,437,558 UART: [art] Derive CDI
20,438,373 UART: [art] Store in in slot 0x4
20,497,186 UART: [art] Derive Key Pair
20,498,245 UART: [art] Store priv key in slot 0x5
22,960,942 UART: [art] Derive Key Pair - Done
22,974,040 UART: [art] Signing Cert with AUTHO
22,975,352 UART: RITY.KEYID = 7
24,686,904 UART: [art] Erasing AUTHORITY.KEYID = 7
24,688,414 UART: [art] PUB.X = 4EB4A9D11557BD6D57A64F4B66E4CA58027EA5E3E4D9364D64E0F0A0292C17636377F7F35977FFE0EBAEE229DA763E48
24,695,694 UART: [art] PUB.Y = 738021F60F8A8EF0BAAB950312B706A7C64173A83007CBB1230ED0DA0433D3EF7585D833A38237A90D4C98E0062E3D7C
24,702,938 UART: [art] SIG.R = D4DEB5DEEB66F5AED03E1C796728BA45859F33C0EB630929B4EAC9CD5C3D2D56F6F6F428C9F830A3D663544EB73D2A72
24,710,350 UART: [art] SIG.S = D32BF0F1680A97110EFA21D9317543B3426B5E13157CB15E8A08B58EF3CD4B3814A1FE262507AB4E16ADC391D39F3CBD
25,688,475 UART: Caliptra RT
25,689,163 UART: [state] CFI Enabled
25,856,892 UART: [rt] RT listening for mailbox commands...
25,859,640 UART:
25,859,805 UART: Running Caliptra ROM ...
25,860,909 UART:
25,861,063 UART: [state] CFI Enabled
25,923,029 UART: [state] LifecycleState = Unprovisioned
25,924,907 UART: [state] DebugLocked = No
25,926,885 UART: [state] WD Timer not started. Device not locked for debugging
25,930,362 UART: [kat] SHA2-256
26,109,469 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,121,044 UART: [kat] ++
26,121,597 UART: [kat] sha1
26,132,013 UART: [kat] SHA2-256
26,135,076 UART: [kat] SHA2-384
26,141,408 UART: [kat] SHA2-512-ACC
26,144,346 UART: [kat] ECC-384
28,623,531 UART: [kat] HMAC-384Kdf
28,645,370 UART: [kat] LMS
29,174,831 UART: [kat] --
29,178,701 UART: [update-reset] ++
29,222,645 >>> mbox cmd response: failed
29,224,279 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,367,915 UART: ROM Non-Fatal Error: 0x000B001D
29,369,348 UART: [state] Locking Datavault
29,370,509 UART: [state] Locking PCR0, PCR1 and PCR31
29,372,044 UART: [state] Locking ICCM
29,372,933 UART: [exit] Launching FMC @ 0x40000130
29,374,274 UART:
29,374,423 UART: Running Caliptra FMC ...
29,375,523 UART:
29,375,677 UART: [state] CFI Enabled
29,376,508 UART: [art] Extend RT PCRs Done
29,377,609 UART: [art] Lock RT PCRs Done
29,378,590 UART: [art] Populate DV Done
29,379,616 UART: [fht] FMC Alias Private Key: 7
29,380,858 UART: [art] Derive CDI
29,381,591 UART: [art] Store in in slot 0x4
29,410,221 UART: [art] Derive Key Pair
29,411,263 UART: [art] Store priv key in slot 0x5
31,874,188 UART: [art] Derive Key Pair - Done
31,886,968 UART: [art] Signing Cert with AUTHO
31,888,272 UART: RITY.KEYID = 7
33,599,378 UART: [art] Erasing AUTHORITY.KEYID = 7
33,600,887 UART: [art] PUB.X = 4EB4A9D11557BD6D57A64F4B66E4CA58027EA5E3E4D9364D64E0F0A0292C17636377F7F35977FFE0EBAEE229DA763E48
33,608,138 UART: [art] PUB.Y = 738021F60F8A8EF0BAAB950312B706A7C64173A83007CBB1230ED0DA0433D3EF7585D833A38237A90D4C98E0062E3D7C
33,615,392 UART: [art] SIG.R = D4DEB5DEEB66F5AED03E1C796728BA45859F33C0EB630929B4EAC9CD5C3D2D56F6F6F428C9F830A3D663544EB73D2A72
33,622,815 UART: [art] SIG.S = D32BF0F1680A97110EFA21D9317543B3426B5E13157CB15E8A08B58EF3CD4B3814A1FE262507AB4E16ADC391D39F3CBD
34,601,686 UART: Caliptra RT
34,602,393 UART: [state] CFI Enabled
34,939,175 UART: [rt] RT listening for mailbox commands...
34,941,974 UART:
34,942,142 UART: Running Caliptra ROM ...
34,943,253 UART:
34,943,426 UART: [state] CFI Enabled
35,003,536 UART: [state] LifecycleState = Unprovisioned
35,005,433 UART: [state] DebugLocked = No
35,007,308 UART: [state] WD Timer not started. Device not locked for debugging
35,010,546 UART: [kat] SHA2-256
35,189,684 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,201,246 UART: [kat] ++
35,201,786 UART: [kat] sha1
35,213,215 UART: [kat] SHA2-256
35,216,223 UART: [kat] SHA2-384
35,222,540 UART: [kat] SHA2-512-ACC
35,225,480 UART: [kat] ECC-384
37,687,418 UART: [kat] HMAC-384Kdf
37,712,171 UART: [kat] LMS
38,241,621 UART: [kat] --
38,248,209 UART: [update-reset] ++
41,672,424 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,676,507 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
42,058,865 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,381,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,076,540 >>> mbox cmd response: success
14,078,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,362,051 UART:
18,362,506 UART: Running Caliptra FMC ...
18,363,605 UART:
18,363,773 UART: [state] CFI Enabled
18,429,843 UART: [fht] FMC Alias Private Key: 7
20,194,295 UART: [art] Extend RT PCRs Done
20,195,500 UART: [art] Lock RT PCRs Done
20,197,658 UART: [art] Populate DV Done
20,203,174 UART: [fht] FMC Alias Private Key: 7
20,204,830 UART: [art] Derive CDI
20,205,647 UART: [art] Store in in slot 0x4
20,261,864 UART: [art] Derive Key Pair
20,262,900 UART: [art] Store priv key in slot 0x5
22,725,691 UART: [art] Derive Key Pair - Done
22,738,468 UART: [art] Signing Cert with AUTHO
22,739,812 UART: RITY.KEYID = 7
24,451,749 UART: [art] Erasing AUTHORITY.KEYID = 7
24,453,257 UART: [art] PUB.X = 498D6819C99110CA0BC14ACF9E88CA689793B9C380E3975912CBEBE91E05887675762541E3B366C8EDC07B356082422E
24,460,522 UART: [art] PUB.Y = 11D83978DB1C1C0FB3E7DD89BD1385B45F7A693F2308A84B18E87D93CC9560C647CD5DD4075FF3A7582EC33300291B17
24,467,774 UART: [art] SIG.R = 01FC012DE0AEA0B09A61F927235990A0B255E98C08E3C6A9E52576461727C7C31250D145D8C8908B21E79E8B57C4F698
24,475,126 UART: [art] SIG.S = 1DBCADD5A83DA9F7E80280CCB6C315598C25B09883F7F5D7F5543F2AA883030420BFC82609697156A22CC2EEDDBE8AB2
25,454,494 UART: Caliptra RT
25,455,209 UART: [state] CFI Enabled
25,621,001 UART: [rt] RT listening for mailbox commands...
28,831,553 >>> mbox cmd response: failed
28,833,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,977,535 UART:
28,977,857 UART: Running Caliptra FMC ...
28,978,985 UART:
28,979,150 UART: [state] CFI Enabled
28,980,073 UART: [art] Extend RT PCRs Done
28,981,212 UART: [art] Lock RT PCRs Done
28,982,275 UART: [art] Populate DV Done
28,983,364 UART: [fht] FMC Alias Private Key: 7
28,984,692 UART: [art] Derive CDI
28,985,428 UART: [art] Store in in slot 0x4
29,009,387 UART: [art] Derive Key Pair
29,010,396 UART: [art] Store priv key in slot 0x5
31,473,494 UART: [art] Derive Key Pair - Done
31,486,395 UART: [art] Signing Cert with AUTHO
31,487,703 UART: RITY.KEYID = 7
33,199,121 UART: [art] Erasing AUTHORITY.KEYID = 7
33,200,638 UART: [art] PUB.X = 498D6819C99110CA0BC14ACF9E88CA689793B9C380E3975912CBEBE91E05887675762541E3B366C8EDC07B356082422E
33,207,874 UART: [art] PUB.Y = 11D83978DB1C1C0FB3E7DD89BD1385B45F7A693F2308A84B18E87D93CC9560C647CD5DD4075FF3A7582EC33300291B17
33,215,101 UART: [art] SIG.R = 01FC012DE0AEA0B09A61F927235990A0B255E98C08E3C6A9E52576461727C7C31250D145D8C8908B21E79E8B57C4F698
33,222,499 UART: [art] SIG.S = 1DBCADD5A83DA9F7E80280CCB6C315598C25B09883F7F5D7F5543F2AA883030420BFC82609697156A22CC2EEDDBE8AB2
34,201,379 UART: Caliptra RT
34,202,077 UART: [state] CFI Enabled
34,539,304 UART: [rt] RT listening for mailbox commands...
41,520,589 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,353 UART:
192,718 UART: Running Caliptra ROM ...
193,843 UART:
603,409 UART: [state] CFI Enabled
617,475 UART: [state] LifecycleState = Unprovisioned
619,332 UART: [state] DebugLocked = No
621,145 UART: [state] WD Timer not started. Device not locked for debugging
625,076 UART: [kat] SHA2-256
804,179 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,773 UART: [kat] ++
816,311 UART: [kat] sha1
825,807 UART: [kat] SHA2-256
828,823 UART: [kat] SHA2-384
836,375 UART: [kat] SHA2-512-ACC
839,303 UART: [kat] ECC-384
3,281,028 UART: [kat] HMAC-384Kdf
3,294,120 UART: [kat] LMS
3,823,639 UART: [kat] --
3,828,990 UART: [cold-reset] ++
3,831,191 UART: [fht] FHT @ 0x50003400
3,843,299 UART: [idev] ++
3,843,874 UART: [idev] CDI.KEYID = 6
3,844,785 UART: [idev] SUBJECT.KEYID = 7
3,845,999 UART: [idev] UDS.KEYID = 0
3,848,855 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,473 UART: [idev] Erasing UDS.KEYID = 0
6,319,970 UART: [idev] Sha1 KeyId Algorithm
6,342,872 UART: [idev] --
6,347,232 UART: [ldev] ++
6,347,798 UART: [ldev] CDI.KEYID = 6
6,348,684 UART: [ldev] SUBJECT.KEYID = 5
6,349,897 UART: [ldev] AUTHORITY.KEYID = 7
6,351,184 UART: [ldev] FE.KEYID = 1
6,363,314 UART: [ldev] Erasing FE.KEYID = 1
8,836,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,556,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,572,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,824 UART: [ldev] --
10,630,054 UART: [fwproc] Wait for Commands...
10,632,213 UART: [fwproc] Recv command 0x46574c44
10,634,254 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,174,356 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,491,403 >>> mbox cmd response: success
14,493,447 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,636,904 UART: [afmc] ++
14,637,540 UART: [afmc] CDI.KEYID = 6
14,638,465 UART: [afmc] SUBJECT.KEYID = 7
14,639,575 UART: [afmc] AUTHORITY.KEYID = 5
16,997,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,735,805 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,751,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,767,711 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,791,733 UART: [afmc] --
18,795,653 UART: [cold-reset] --
18,800,169 UART: [state] Locking Datavault
18,804,877 UART: [state] Locking PCR0, PCR1 and PCR31
18,806,521 UART: [state] Locking ICCM
18,808,617 UART: [exit] Launching FMC @ 0x40000130
18,817,070 UART:
18,817,315 UART: Running Caliptra FMC ...
18,818,420 UART:
18,818,584 UART: [state] CFI Enabled
18,826,793 UART: [fht] FMC Alias Private Key: 7
20,583,244 UART: [art] Extend RT PCRs Done
20,584,468 UART: [art] Lock RT PCRs Done
20,585,820 UART: [art] Populate DV Done
20,591,148 UART: [fht] FMC Alias Private Key: 7
20,592,718 UART: [art] Derive CDI
20,593,462 UART: [art] Store in in slot 0x4
20,635,947 UART: [art] Derive Key Pair
20,636,950 UART: [art] Store priv key in slot 0x5
23,064,171 UART: [art] Derive Key Pair - Done
23,076,993 UART: [art] Signing Cert with AUTHO
23,078,331 UART: RITY.KEYID = 7
24,784,072 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,575 UART: [art] PUB.X = 17471A381D7CC58E14A5E413CD7AB3C98EC4E7C9335EAF4ED39CC2B1DAA8F1E6513066E58181FDC890D020B5ED52718D
24,792,857 UART: [art] PUB.Y = 89455AF766999E1026A1FD52AA0F844720F185BD9729886C93B8D0EA21229BDA8E7AC98796E016C6F2264BF713C0853B
24,800,116 UART: [art] SIG.R = 3B2224607A9405CD463999A6A01296C91F36C714E111125E9B5FE52D7C041EB782701058F5FFCFF971212480B350E23A
24,807,479 UART: [art] SIG.S = 1AE7B89A4AAA54A94F4A14C4845DEC5B953E3656CC3C73B97A8110DC4544B848AD163A648FED42C1974C74C0E15B8BA0
25,786,623 UART: Caliptra RT
25,787,339 UART: [state] CFI Enabled
25,904,477 UART: [rt] RT listening for mailbox commands...
25,907,292 UART:
25,907,458 UART: Running Caliptra ROM ...
25,908,571 UART:
25,908,887 UART: [state] CFI Enabled
25,925,922 UART: [state] LifecycleState = Unprovisioned
25,927,751 UART: [state] DebugLocked = No
25,930,450 UART: [state] WD Timer not started. Device not locked for debugging
25,933,422 UART: [kat] SHA2-256
26,112,579 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,124,138 UART: [kat] ++
26,124,590 UART: [kat] sha1
26,136,173 UART: [kat] SHA2-256
26,139,184 UART: [kat] SHA2-384
26,145,167 UART: [kat] SHA2-512-ACC
26,148,110 UART: [kat] ECC-384
28,589,354 UART: [kat] HMAC-384Kdf
28,602,412 UART: [kat] LMS
29,131,944 UART: [kat] --
29,136,687 UART: [update-reset] ++
29,176,467 >>> mbox cmd response: failed
29,178,154 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,321,501 UART: ROM Non-Fatal Error: 0x000B001D
29,322,938 UART: [state] Locking Datavault
29,324,007 UART: [state] Locking PCR0, PCR1 and PCR31
29,325,548 UART: [state] Locking ICCM
29,326,432 UART: [exit] Launching FMC @ 0x40000130
29,327,772 UART:
29,327,922 UART: Running Caliptra FMC ...
29,329,015 UART:
29,329,174 UART: [state] CFI Enabled
29,330,010 UART: [art] Extend RT PCRs Done
29,331,064 UART: [art] Lock RT PCRs Done
29,332,146 UART: [art] Populate DV Done
29,333,099 UART: [fht] FMC Alias Private Key: 7
29,334,417 UART: [art] Derive CDI
29,335,154 UART: [art] Store in in slot 0x4
29,336,244 UART: [art] Derive Key Pair
29,337,149 UART: [art] Store priv key in slot 0x5
31,724,065 UART: [art] Derive Key Pair - Done
31,737,121 UART: [art] Signing Cert with AUTHO
31,738,428 UART: RITY.KEYID = 7
33,444,071 UART: [art] Erasing AUTHORITY.KEYID = 7
33,445,579 UART: [art] PUB.X = 17471A381D7CC58E14A5E413CD7AB3C98EC4E7C9335EAF4ED39CC2B1DAA8F1E6513066E58181FDC890D020B5ED52718D
33,452,847 UART: [art] PUB.Y = 89455AF766999E1026A1FD52AA0F844720F185BD9729886C93B8D0EA21229BDA8E7AC98796E016C6F2264BF713C0853B
33,460,119 UART: [art] SIG.R = 3B2224607A9405CD463999A6A01296C91F36C714E111125E9B5FE52D7C041EB782701058F5FFCFF971212480B350E23A
33,467,455 UART: [art] SIG.S = 1AE7B89A4AAA54A94F4A14C4845DEC5B953E3656CC3C73B97A8110DC4544B848AD163A648FED42C1974C74C0E15B8BA0
34,445,924 UART: Caliptra RT
34,446,635 UART: [state] CFI Enabled
34,731,950 UART: [rt] RT listening for mailbox commands...
34,734,694 UART:
34,734,863 UART: Running Caliptra ROM ...
34,735,971 UART:
34,736,243 UART: [state] CFI Enabled
40,299,646 UART: [state] LifecycleState = Unprovisioned
40,301,565 UART: [state] DebugLocked = No
40,302,818 UART: [state] WD Timer not started. Device not locked for debugging
40,307,257 UART: [kat] SHA2-256
40,486,397 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,498,004 UART: [kat] ++
40,498,466 UART: [kat] sha1
40,509,080 UART: [kat] SHA2-256
40,512,101 UART: [kat] SHA2-384
40,518,172 UART: [kat] SHA2-512-ACC
40,521,125 UART: [kat] ECC-384
42,965,091 UART: [kat] HMAC-384Kdf
42,977,148 UART: [kat] LMS
43,506,641 UART: [kat] --
43,511,984 UART: [update-reset] ++
46,940,459 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,944,104 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
47,326,416 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,699,377 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,283,011 >>> mbox cmd response: success
14,284,999 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,531,990 UART:
18,532,510 UART: Running Caliptra FMC ...
18,533,615 UART:
18,533,772 UART: [state] CFI Enabled
18,541,499 UART: [fht] FMC Alias Private Key: 7
20,297,945 UART: [art] Extend RT PCRs Done
20,299,182 UART: [art] Lock RT PCRs Done
20,300,933 UART: [art] Populate DV Done
20,306,257 UART: [fht] FMC Alias Private Key: 7
20,307,802 UART: [art] Derive CDI
20,308,536 UART: [art] Store in in slot 0x4
20,351,193 UART: [art] Derive Key Pair
20,352,193 UART: [art] Store priv key in slot 0x5
22,779,360 UART: [art] Derive Key Pair - Done
22,792,094 UART: [art] Signing Cert with AUTHO
22,793,398 UART: RITY.KEYID = 7
24,498,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,232 UART: [art] PUB.X = 2C0502362AB02AE0A1AE9122D849C625327C4522C526C541338C3BDBD15094F17C67EC3EF0C2930BD08213812216960E
24,507,496 UART: [art] PUB.Y = F534CFCFEC06E78FDA7DAD3EE511BB663F97F28862A651723DCD9B71B2B68EB6D30957789A110BDFD219B19EE4136E1C
24,514,772 UART: [art] SIG.R = 884E13AD644C80183E7166B9D5090B56B349F6A8FD07541CD9E480C49D624E525625E8DF8F4FCAA17FFA5AC8E08D9A29
24,522,180 UART: [art] SIG.S = FA10C48FADC5321C8862811E51A08692C1CB27EF83001CB712AE6F8DF39950DD450E3AF3BE44C093ABFFFE10AD0768F2
25,501,319 UART: Caliptra RT
25,502,034 UART: [state] CFI Enabled
25,619,526 UART: [rt] RT listening for mailbox commands...
28,748,120 >>> mbox cmd response: failed
28,750,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,893,954 UART:
28,894,261 UART: Running Caliptra FMC ...
28,895,385 UART:
28,895,553 UART: [state] CFI Enabled
28,896,479 UART: [art] Extend RT PCRs Done
28,897,622 UART: [art] Lock RT PCRs Done
28,898,713 UART: [art] Populate DV Done
28,899,794 UART: [fht] FMC Alias Private Key: 7
28,901,119 UART: [art] Derive CDI
28,901,855 UART: [art] Store in in slot 0x4
28,903,023 UART: [art] Derive Key Pair
28,903,970 UART: [art] Store priv key in slot 0x5
31,287,960 UART: [art] Derive Key Pair - Done
31,301,022 UART: [art] Signing Cert with AUTHO
31,302,340 UART: RITY.KEYID = 7
33,007,698 UART: [art] Erasing AUTHORITY.KEYID = 7
33,009,183 UART: [art] PUB.X = 2C0502362AB02AE0A1AE9122D849C625327C4522C526C541338C3BDBD15094F17C67EC3EF0C2930BD08213812216960E
33,016,449 UART: [art] PUB.Y = F534CFCFEC06E78FDA7DAD3EE511BB663F97F28862A651723DCD9B71B2B68EB6D30957789A110BDFD219B19EE4136E1C
33,023,699 UART: [art] SIG.R = 884E13AD644C80183E7166B9D5090B56B349F6A8FD07541CD9E480C49D624E525625E8DF8F4FCAA17FFA5AC8E08D9A29
33,031,117 UART: [art] SIG.S = FA10C48FADC5321C8862811E51A08692C1CB27EF83001CB712AE6F8DF39950DD450E3AF3BE44C093ABFFFE10AD0768F2
34,009,620 UART: Caliptra RT
34,010,336 UART: [state] CFI Enabled
34,300,981 UART: [rt] RT listening for mailbox commands...
47,216,905 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,240 UART:
192,603 UART: Running Caliptra ROM ...
193,792 UART:
193,950 UART: [state] CFI Enabled
258,454 UART: [state] LifecycleState = Unprovisioned
260,869 UART: [state] DebugLocked = No
263,658 UART: [state] WD Timer not started. Device not locked for debugging
267,712 UART: [kat] SHA2-256
457,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,364 UART: [kat] ++
468,838 UART: [kat] sha1
479,900 UART: [kat] SHA2-256
482,917 UART: [kat] SHA2-384
489,452 UART: [kat] SHA2-512-ACC
492,010 UART: [kat] ECC-384
2,942,440 UART: [kat] HMAC-384Kdf
2,966,746 UART: [kat] LMS
3,498,495 UART: [kat] --
3,503,844 UART: [cold-reset] ++
3,505,673 UART: [fht] FHT @ 0x50003400
3,518,332 UART: [idev] ++
3,519,210 UART: [idev] CDI.KEYID = 6
3,520,134 UART: [idev] SUBJECT.KEYID = 7
3,521,244 UART: [idev] UDS.KEYID = 0
3,524,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,037 UART: [idev] Erasing UDS.KEYID = 0
6,026,160 UART: [idev] Sha1 KeyId Algorithm
6,048,274 UART: [idev] --
6,053,141 UART: [ldev] ++
6,053,831 UART: [ldev] CDI.KEYID = 6
6,054,745 UART: [ldev] SUBJECT.KEYID = 5
6,055,929 UART: [ldev] AUTHORITY.KEYID = 7
6,057,167 UART: [ldev] FE.KEYID = 1
6,096,862 UART: [ldev] Erasing FE.KEYID = 1
8,601,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,183 UART: [ldev] --
10,407,831 UART: [fwproc] Wait for Commands...
10,409,345 UART: [fwproc] Recv command 0x46574c44
10,411,664 UART: [fwproc] Recv'd Img size: 114168 bytes
13,861,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,084 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,052,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,593,637 >>> mbox cmd response: success
14,595,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,739,384 UART: [afmc] ++
14,740,016 UART: [afmc] CDI.KEYID = 6
14,740,941 UART: [afmc] SUBJECT.KEYID = 7
14,742,050 UART: [afmc] AUTHORITY.KEYID = 5
17,146,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,868,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,870,782 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,885,985 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,901,112 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,916,131 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,940,960 UART: [afmc] --
18,945,034 UART: [cold-reset] --
18,949,877 UART: [state] Locking Datavault
18,955,627 UART: [state] Locking PCR0, PCR1 and PCR31
18,957,822 UART: [state] Locking ICCM
18,960,044 UART: [exit] Launching FMC @ 0x40000130
18,968,701 UART:
18,968,945 UART: Running Caliptra FMC ...
18,970,055 UART:
18,970,234 UART: [state] CFI Enabled
19,026,086 UART: [fht] FMC Alias Private Key: 7
20,790,148 UART: [art] Extend RT PCRs Done
20,791,366 UART: [art] Lock RT PCRs Done
20,792,831 UART: [art] Populate DV Done
20,798,401 UART: [fht] FMC Alias Private Key: 7
20,800,083 UART: [art] Derive CDI
20,800,855 UART: [art] Store in in slot 0x4
20,858,845 UART: [art] Derive Key Pair
20,859,846 UART: [art] Store priv key in slot 0x5
23,323,112 UART: [art] Derive Key Pair - Done
23,336,162 UART: [art] Signing Cert with AUTHO
23,337,490 UART: RITY.KEYID = 7
25,048,286 UART: [art] Erasing AUTHORITY.KEYID = 7
25,049,827 UART: [art] PUB.X = AE7CCAD28733CD1C46A447B1D47EC9DCB887E2D5DB2A07CCC4B544B7B4D2B1778E932B40FEC177E1E072744B9CC5E3C9
25,057,080 UART: [art] PUB.Y = 3CE95B70E86190BED30532F68A5F8F6F9EC27D985442617BEFCFEB230EFCFB1D99B27B1D40073520CC176147DBB752D2
25,064,367 UART: [art] SIG.R = D64677A86FDEDB7153F5D7739A2D6D5F94C42688281FB3F7713383BC965B7C87E8ED7DEA128BF43C51645915948C01ED
25,071,755 UART: [art] SIG.S = 729BA3676E1C07D15F7E8CD55DCD3ADA5DC35E1E0895C382DD4567CA8BDACFB63F7FE490CE4E4465A6DB1FB5E8CA19FC
26,050,655 UART: Caliptra RT
26,051,379 UART: [state] CFI Enabled
26,215,773 UART: [rt] RT listening for mailbox commands...
26,218,734 UART:
26,218,986 UART: Running Caliptra ROM ...
26,220,090 UART:
26,220,253 UART: [state] CFI Enabled
26,281,768 UART: [state] LifecycleState = Unprovisioned
26,283,864 UART: [state] DebugLocked = No
26,286,221 UART: [state] WD Timer not started. Device not locked for debugging
26,291,411 UART: [kat] SHA2-256
26,481,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,492,084 UART: [kat] ++
26,492,626 UART: [kat] sha1
26,504,004 UART: [kat] SHA2-256
26,507,026 UART: [kat] SHA2-384
26,512,317 UART: [kat] SHA2-512-ACC
26,514,938 UART: [kat] ECC-384
28,965,338 UART: [kat] HMAC-384Kdf
28,991,430 UART: [kat] LMS
29,523,038 UART: [kat] --
29,528,707 UART: [update-reset] ++
29,581,891 >>> mbox cmd response: failed
29,583,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,727,397 UART: ROM Non-Fatal Error: 0x000B001D
29,728,838 UART: [state] Locking Datavault
29,730,014 UART: [state] Locking PCR0, PCR1 and PCR31
29,731,561 UART: [state] Locking ICCM
29,732,473 UART: [exit] Launching FMC @ 0x40000130
29,733,903 UART:
29,734,063 UART: Running Caliptra FMC ...
29,735,171 UART:
29,735,329 UART: [state] CFI Enabled
29,736,170 UART: [art] Extend RT PCRs Done
29,737,220 UART: [art] Lock RT PCRs Done
29,738,278 UART: [art] Populate DV Done
29,739,306 UART: [fht] FMC Alias Private Key: 7
29,740,622 UART: [art] Derive CDI
29,741,384 UART: [art] Store in in slot 0x4
29,775,674 UART: [art] Derive Key Pair
29,776,717 UART: [art] Store priv key in slot 0x5
32,239,990 UART: [art] Derive Key Pair - Done
32,253,121 UART: [art] Signing Cert with AUTHO
32,254,431 UART: RITY.KEYID = 7
33,965,612 UART: [art] Erasing AUTHORITY.KEYID = 7
33,967,113 UART: [art] PUB.X = AE7CCAD28733CD1C46A447B1D47EC9DCB887E2D5DB2A07CCC4B544B7B4D2B1778E932B40FEC177E1E072744B9CC5E3C9
33,974,364 UART: [art] PUB.Y = 3CE95B70E86190BED30532F68A5F8F6F9EC27D985442617BEFCFEB230EFCFB1D99B27B1D40073520CC176147DBB752D2
33,981,663 UART: [art] SIG.R = D64677A86FDEDB7153F5D7739A2D6D5F94C42688281FB3F7713383BC965B7C87E8ED7DEA128BF43C51645915948C01ED
33,989,029 UART: [art] SIG.S = 729BA3676E1C07D15F7E8CD55DCD3ADA5DC35E1E0895C382DD4567CA8BDACFB63F7FE490CE4E4465A6DB1FB5E8CA19FC
34,968,166 UART: Caliptra RT
34,968,876 UART: [state] CFI Enabled
35,309,384 UART: [rt] RT listening for mailbox commands...
35,311,966 UART:
35,312,159 UART: Running Caliptra ROM ...
35,313,272 UART:
35,313,427 UART: [state] CFI Enabled
35,372,121 UART: [state] LifecycleState = Unprovisioned
35,374,212 UART: [state] DebugLocked = No
35,376,638 UART: [state] WD Timer not started. Device not locked for debugging
35,381,581 UART: [kat] SHA2-256
35,571,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,582,254 UART: [kat] ++
35,582,790 UART: [kat] sha1
35,593,358 UART: [kat] SHA2-256
35,596,370 UART: [kat] SHA2-384
35,603,703 UART: [kat] SHA2-512-ACC
35,606,264 UART: [kat] ECC-384
38,056,566 UART: [kat] HMAC-384Kdf
38,079,058 UART: [kat] LMS
38,610,650 UART: [kat] --
38,616,823 UART: [update-reset] ++
42,079,192 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,082,103 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
42,688,723 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,439,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,728,787 >>> mbox cmd response: success
14,730,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,028,793 UART:
19,029,218 UART: Running Caliptra FMC ...
19,030,354 UART:
19,030,518 UART: [state] CFI Enabled
19,095,000 UART: [fht] FMC Alias Private Key: 7
20,859,518 UART: [art] Extend RT PCRs Done
20,860,745 UART: [art] Lock RT PCRs Done
20,862,533 UART: [art] Populate DV Done
20,867,887 UART: [fht] FMC Alias Private Key: 7
20,869,600 UART: [art] Derive CDI
20,870,421 UART: [art] Store in in slot 0x4
20,928,202 UART: [art] Derive Key Pair
20,929,253 UART: [art] Store priv key in slot 0x5
23,392,091 UART: [art] Derive Key Pair - Done
23,405,039 UART: [art] Signing Cert with AUTHO
23,406,349 UART: RITY.KEYID = 7
25,116,744 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,259 UART: [art] PUB.X = 41F59697C618E73A84F159548AD3461EFB305F8F786A1F266A08ED6F6AA01182C3E6B80997FA44A7E4F223D643EF9E14
25,125,494 UART: [art] PUB.Y = D3DF17D4F34987C67436A17FD1DC13E5120AEFCB68C60587E40848EC4E029FB6C54AFDB4ECAB887268E315F147FF2DAE
25,132,788 UART: [art] SIG.R = CD038C9767EA00DAD02CBC91DB5F64C112C6E3A1B44CEEFF55E37F5F0EDB763C16C1A027372BC866A951517F589B8937
25,140,169 UART: [art] SIG.S = 7279D98A1AB137D1702FF1B4DE3CAC5AC0C06E4930EB79868403C612962D4D8C6C008310C17D07275C8426903D88A7B8
26,118,758 UART: Caliptra RT
26,119,479 UART: [state] CFI Enabled
26,282,896 UART: [rt] RT listening for mailbox commands...
29,552,423 >>> mbox cmd response: failed
29,554,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,697,511 UART:
29,697,824 UART: Running Caliptra FMC ...
29,698,889 UART:
29,699,048 UART: [state] CFI Enabled
29,699,981 UART: [art] Extend RT PCRs Done
29,701,125 UART: [art] Lock RT PCRs Done
29,702,192 UART: [art] Populate DV Done
29,703,284 UART: [fht] FMC Alias Private Key: 7
29,704,606 UART: [art] Derive CDI
29,705,343 UART: [art] Store in in slot 0x4
29,736,285 UART: [art] Derive Key Pair
29,737,326 UART: [art] Store priv key in slot 0x5
32,200,203 UART: [art] Derive Key Pair - Done
32,212,934 UART: [art] Signing Cert with AUTHO
32,214,245 UART: RITY.KEYID = 7
33,925,461 UART: [art] Erasing AUTHORITY.KEYID = 7
33,926,964 UART: [art] PUB.X = 41F59697C618E73A84F159548AD3461EFB305F8F786A1F266A08ED6F6AA01182C3E6B80997FA44A7E4F223D643EF9E14
33,934,190 UART: [art] PUB.Y = D3DF17D4F34987C67436A17FD1DC13E5120AEFCB68C60587E40848EC4E029FB6C54AFDB4ECAB887268E315F147FF2DAE
33,941,459 UART: [art] SIG.R = CD038C9767EA00DAD02CBC91DB5F64C112C6E3A1B44CEEFF55E37F5F0EDB763C16C1A027372BC866A951517F589B8937
33,948,901 UART: [art] SIG.S = 7279D98A1AB137D1702FF1B4DE3CAC5AC0C06E4930EB79868403C612962D4D8C6C008310C17D07275C8426903D88A7B8
34,928,163 UART: Caliptra RT
34,928,855 UART: [state] CFI Enabled
35,265,294 UART: [rt] RT listening for mailbox commands...
42,933,070 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,644 UART:
193,049 UART: Running Caliptra ROM ...
194,158 UART:
603,885 UART: [state] CFI Enabled
619,557 UART: [state] LifecycleState = Unprovisioned
621,928 UART: [state] DebugLocked = No
623,570 UART: [state] WD Timer not started. Device not locked for debugging
627,455 UART: [kat] SHA2-256
817,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,156 UART: [kat] ++
828,742 UART: [kat] sha1
839,951 UART: [kat] SHA2-256
842,966 UART: [kat] SHA2-384
849,935 UART: [kat] SHA2-512-ACC
852,551 UART: [kat] ECC-384
3,294,350 UART: [kat] HMAC-384Kdf
3,306,708 UART: [kat] LMS
3,838,516 UART: [kat] --
3,843,435 UART: [cold-reset] ++
3,845,637 UART: [fht] FHT @ 0x50003400
3,858,503 UART: [idev] ++
3,859,220 UART: [idev] CDI.KEYID = 6
3,860,113 UART: [idev] SUBJECT.KEYID = 7
3,861,332 UART: [idev] UDS.KEYID = 0
3,864,089 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,561 UART: [idev] Erasing UDS.KEYID = 0
6,345,470 UART: [idev] Sha1 KeyId Algorithm
6,367,766 UART: [idev] --
6,371,216 UART: [ldev] ++
6,371,910 UART: [ldev] CDI.KEYID = 6
6,372,820 UART: [ldev] SUBJECT.KEYID = 5
6,373,981 UART: [ldev] AUTHORITY.KEYID = 7
6,375,211 UART: [ldev] FE.KEYID = 1
6,384,187 UART: [ldev] Erasing FE.KEYID = 1
8,865,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,542 UART: [ldev] --
10,659,141 UART: [fwproc] Wait for Commands...
10,661,299 UART: [fwproc] Recv command 0x46574c44
10,663,583 UART: [fwproc] Recv'd Img size: 114168 bytes
14,107,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,757 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,842,094 >>> mbox cmd response: success
14,844,367 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,987,886 UART: [afmc] ++
14,988,531 UART: [afmc] CDI.KEYID = 6
14,989,612 UART: [afmc] SUBJECT.KEYID = 7
14,990,718 UART: [afmc] AUTHORITY.KEYID = 5
17,354,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,077,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,079,884 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,095,046 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,110,193 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,125,210 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,169 UART: [afmc] --
19,154,210 UART: [cold-reset] --
19,159,694 UART: [state] Locking Datavault
19,163,357 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,556 UART: [state] Locking ICCM
19,167,926 UART: [exit] Launching FMC @ 0x40000130
19,176,548 UART:
19,176,783 UART: Running Caliptra FMC ...
19,177,882 UART:
19,178,042 UART: [state] CFI Enabled
19,186,198 UART: [fht] FMC Alias Private Key: 7
20,942,882 UART: [art] Extend RT PCRs Done
20,944,085 UART: [art] Lock RT PCRs Done
20,946,076 UART: [art] Populate DV Done
20,951,435 UART: [fht] FMC Alias Private Key: 7
20,952,916 UART: [art] Derive CDI
20,953,685 UART: [art] Store in in slot 0x4
20,996,493 UART: [art] Derive Key Pair
20,997,533 UART: [art] Store priv key in slot 0x5
23,424,182 UART: [art] Derive Key Pair - Done
23,437,135 UART: [art] Signing Cert with AUTHO
23,438,437 UART: RITY.KEYID = 7
25,144,275 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,758 UART: [art] PUB.X = 724BF24B9EA22B4E50E30B4A181BCF6246F8730BDCCF05D440AB626EC06341C05B9A0E9119EF0B376D4B95C9185878EE
25,153,048 UART: [art] PUB.Y = 9E470EAB18135C958656D158973A7173096ECEFD247726FAEE772C21702388C84ED0A8F2AA491FB036132624F31E3D7C
25,160,283 UART: [art] SIG.R = D2388569BC51369F570A12C1E9B59148A5D3A48FD154FD5CA18F3CE7A62FE5D3A9720D8B439FF8A257A6C22A95DF7207
25,167,672 UART: [art] SIG.S = BE3393E3F07D8CB04B7E3012021FFA13B3BE0777BA635E316A6C280F840A5A0BC62C047406A3AC53A5369E63E879C118
26,146,419 UART: Caliptra RT
26,147,135 UART: [state] CFI Enabled
26,265,408 UART: [rt] RT listening for mailbox commands...
26,268,632 UART:
26,268,800 UART: Running Caliptra ROM ...
26,269,819 UART:
26,270,237 UART: [state] CFI Enabled
26,286,829 UART: [state] LifecycleState = Unprovisioned
26,288,675 UART: [state] DebugLocked = No
26,290,163 UART: [state] WD Timer not started. Device not locked for debugging
26,294,147 UART: [kat] SHA2-256
26,484,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,494,819 UART: [kat] ++
26,495,338 UART: [kat] sha1
26,506,871 UART: [kat] SHA2-256
26,509,879 UART: [kat] SHA2-384
26,515,820 UART: [kat] SHA2-512-ACC
26,518,445 UART: [kat] ECC-384
28,960,563 UART: [kat] HMAC-384Kdf
28,974,029 UART: [kat] LMS
29,505,624 UART: [kat] --
29,508,923 UART: [update-reset] ++
29,562,648 >>> mbox cmd response: failed
29,564,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,707,800 UART: ROM Non-Fatal Error: 0x000B001D
29,709,224 UART: [state] Locking Datavault
29,710,320 UART: [state] Locking PCR0, PCR1 and PCR31
29,711,856 UART: [state] Locking ICCM
29,712,761 UART: [exit] Launching FMC @ 0x40000130
29,714,188 UART:
29,714,345 UART: Running Caliptra FMC ...
29,715,442 UART:
29,715,597 UART: [state] CFI Enabled
29,716,512 UART: [art] Extend RT PCRs Done
29,717,649 UART: [art] Lock RT PCRs Done
29,718,712 UART: [art] Populate DV Done
29,719,740 UART: [fht] FMC Alias Private Key: 7
29,721,056 UART: [art] Derive CDI
29,721,792 UART: [art] Store in in slot 0x4
29,722,957 UART: [art] Derive Key Pair
29,723,916 UART: [art] Store priv key in slot 0x5
32,110,701 UART: [art] Derive Key Pair - Done
32,123,967 UART: [art] Signing Cert with AUTHO
32,125,274 UART: RITY.KEYID = 7
33,830,809 UART: [art] Erasing AUTHORITY.KEYID = 7
33,832,329 UART: [art] PUB.X = 724BF24B9EA22B4E50E30B4A181BCF6246F8730BDCCF05D440AB626EC06341C05B9A0E9119EF0B376D4B95C9185878EE
33,839,574 UART: [art] PUB.Y = 9E470EAB18135C958656D158973A7173096ECEFD247726FAEE772C21702388C84ED0A8F2AA491FB036132624F31E3D7C
33,846,811 UART: [art] SIG.R = D2388569BC51369F570A12C1E9B59148A5D3A48FD154FD5CA18F3CE7A62FE5D3A9720D8B439FF8A257A6C22A95DF7207
33,854,200 UART: [art] SIG.S = BE3393E3F07D8CB04B7E3012021FFA13B3BE0777BA635E316A6C280F840A5A0BC62C047406A3AC53A5369E63E879C118
34,832,601 UART: Caliptra RT
34,833,290 UART: [state] CFI Enabled
35,121,489 UART: [rt] RT listening for mailbox commands...
35,124,119 UART:
35,124,283 UART: Running Caliptra ROM ...
35,125,388 UART:
35,125,764 UART: [state] CFI Enabled
40,315,500 UART: [state] LifecycleState = Unprovisioned
40,317,427 UART: [state] DebugLocked = No
40,319,395 UART: [state] WD Timer not started. Device not locked for debugging
40,323,863 UART: [kat] SHA2-256
40,513,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,524,536 UART: [kat] ++
40,525,137 UART: [kat] sha1
40,537,059 UART: [kat] SHA2-256
40,540,082 UART: [kat] SHA2-384
40,545,695 UART: [kat] SHA2-512-ACC
40,548,263 UART: [kat] ECC-384
42,988,841 UART: [kat] HMAC-384Kdf
43,000,850 UART: [kat] LMS
43,532,463 UART: [kat] --
43,538,122 UART: [update-reset] ++
46,998,375 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,002,024 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
47,608,639 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,756,377 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,957,878 >>> mbox cmd response: success
14,959,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,210,380 UART:
19,210,789 UART: Running Caliptra FMC ...
19,211,891 UART:
19,212,043 UART: [state] CFI Enabled
19,220,196 UART: [fht] FMC Alias Private Key: 7
20,977,147 UART: [art] Extend RT PCRs Done
20,978,373 UART: [art] Lock RT PCRs Done
20,979,871 UART: [art] Populate DV Done
20,985,514 UART: [fht] FMC Alias Private Key: 7
20,987,054 UART: [art] Derive CDI
20,987,792 UART: [art] Store in in slot 0x4
21,030,662 UART: [art] Derive Key Pair
21,031,706 UART: [art] Store priv key in slot 0x5
23,458,316 UART: [art] Derive Key Pair - Done
23,471,634 UART: [art] Signing Cert with AUTHO
23,472,969 UART: RITY.KEYID = 7
25,178,567 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,073 UART: [art] PUB.X = 2C1A20550D7369EF845F2BD0031DE9BD7A5EFA10891BC89F6841CB1AAE232F7E273BCF09B13169ABA1A5663C26A57DA3
25,187,334 UART: [art] PUB.Y = CCC0AE1B63FAD1E3ED1F3D47F52665C561DA4649D0553B6C4D04F65CB085781CA3B0076AEFF233DCF0A89B7F241415B6
25,194,617 UART: [art] SIG.R = 40F7CA8D6FF7FF335B7B168B88BC1544CC96034B8E3CF0CA28B0501F34DE074220C558C03B1C9405BCA9C9C4C51A33D1
25,202,015 UART: [art] SIG.S = 1500C5CCF067F1C6C41FD36330786E68C9A307ACD0C48622F5697223A4436897D307A56D27A34589759B3A797766B00F
26,181,240 UART: Caliptra RT
26,181,955 UART: [state] CFI Enabled
26,298,847 UART: [rt] RT listening for mailbox commands...
29,485,364 >>> mbox cmd response: failed
29,487,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,630,536 UART:
29,630,850 UART: Running Caliptra FMC ...
29,631,893 UART:
29,632,042 UART: [state] CFI Enabled
29,632,971 UART: [art] Extend RT PCRs Done
29,634,113 UART: [art] Lock RT PCRs Done
29,635,131 UART: [art] Populate DV Done
29,636,233 UART: [fht] FMC Alias Private Key: 7
29,637,557 UART: [art] Derive CDI
29,638,287 UART: [art] Store in in slot 0x4
29,639,373 UART: [art] Derive Key Pair
29,640,363 UART: [art] Store priv key in slot 0x5
32,024,692 UART: [art] Derive Key Pair - Done
32,037,758 UART: [art] Signing Cert with AUTHO
32,039,113 UART: RITY.KEYID = 7
33,744,269 UART: [art] Erasing AUTHORITY.KEYID = 7
33,745,762 UART: [art] PUB.X = 2C1A20550D7369EF845F2BD0031DE9BD7A5EFA10891BC89F6841CB1AAE232F7E273BCF09B13169ABA1A5663C26A57DA3
33,753,060 UART: [art] PUB.Y = CCC0AE1B63FAD1E3ED1F3D47F52665C561DA4649D0553B6C4D04F65CB085781CA3B0076AEFF233DCF0A89B7F241415B6
33,760,351 UART: [art] SIG.R = 40F7CA8D6FF7FF335B7B168B88BC1544CC96034B8E3CF0CA28B0501F34DE074220C558C03B1C9405BCA9C9C4C51A33D1
33,767,753 UART: [art] SIG.S = 1500C5CCF067F1C6C41FD36330786E68C9A307ACD0C48622F5697223A4436897D307A56D27A34589759B3A797766B00F
34,746,745 UART: Caliptra RT
34,747,456 UART: [state] CFI Enabled
35,036,841 UART: [rt] RT listening for mailbox commands...
47,899,674 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,667 UART: [kat] SHA2-256
881,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,713 UART: [kat] ++
885,865 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,138 UART: [kat] HMAC-384Kdf
906,808 UART: [kat] LMS
1,475,004 UART: [kat] --
1,475,793 UART: [cold-reset] ++
1,476,275 UART: [fht] Storing FHT @ 0x50003400
1,479,122 UART: [idev] ++
1,479,290 UART: [idev] CDI.KEYID = 6
1,479,650 UART: [idev] SUBJECT.KEYID = 7
1,480,074 UART: [idev] UDS.KEYID = 0
1,480,419 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,230 UART: [idev] Erasing UDS.KEYID = 0
1,504,456 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,292 UART: [idev] --
1,514,197 UART: [ldev] ++
1,514,365 UART: [ldev] CDI.KEYID = 6
1,514,728 UART: [ldev] SUBJECT.KEYID = 5
1,515,154 UART: [ldev] AUTHORITY.KEYID = 7
1,515,617 UART: [ldev] FE.KEYID = 1
1,520,565 UART: [ldev] Erasing FE.KEYID = 1
1,546,030 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,944 UART: [ldev] --
1,585,281 UART: [fwproc] Waiting for Commands...
1,585,900 UART: [fwproc] Received command 0x46574c44
1,586,691 UART: [fwproc] Received Image of size 114168 bytes
2,882,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,854 >>> mbox cmd response: success
3,074,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,075,970 UART: [afmc] ++
3,076,138 UART: [afmc] CDI.KEYID = 6
3,076,500 UART: [afmc] SUBJECT.KEYID = 7
3,076,925 UART: [afmc] AUTHORITY.KEYID = 5
3,110,970 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,127,540 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,128,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,134,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,139,933 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,145,623 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,153,500 UART: [afmc] --
3,154,600 UART: [cold-reset] --
3,155,412 UART: [state] Locking Datavault
3,156,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,157,191 UART: [state] Locking ICCM
3,157,753 UART: [exit] Launching FMC @ 0x40000130
3,163,082 UART:
3,163,098 UART: Running Caliptra FMC ...
3,163,506 UART:
3,163,560 UART: [state] CFI Enabled
3,174,057 UART: [fht] FMC Alias Private Key: 7
3,282,410 UART: [art] Extend RT PCRs Done
3,282,838 UART: [art] Lock RT PCRs Done
3,284,428 UART: [art] Populate DV Done
3,292,675 UART: [fht] FMC Alias Private Key: 7
3,293,627 UART: [art] Derive CDI
3,293,907 UART: [art] Store in in slot 0x4
3,379,576 UART: [art] Derive Key Pair
3,379,936 UART: [art] Store priv key in slot 0x5
3,393,296 UART: [art] Derive Key Pair - Done
3,407,919 UART: [art] Signing Cert with AUTHO
3,408,399 UART: RITY.KEYID = 7
3,423,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,424,262 UART: [art] PUB.X = F8B9B91084171CB685F012CDDEC5F5BCE4EE16FC3AD175CA2699D7F6A316721C5715ACCD445AF6F06688E9EF548414CA
3,431,048 UART: [art] PUB.Y = 73643F06432C09ABDB03C7819D8D7EF6C8B8DEBDDFEE7FACC7D0CEDE0E43378741829FDA26257F56D2050501693E6C0C
3,437,990 UART: [art] SIG.R = EF3E95F16389192F10224B26B2681CAA43A27F39DBA067FA2C9D33A1D03BC3EF19B6412228333222B81BFFED18C83737
3,444,764 UART: [art] SIG.S = 18E5FCBA4C5B452F5C8D36F79B605ABA535815015F4F421850D73E9A61495A4CB3199741F29992BD95F479FE0A99BCED
3,468,175 UART: Caliptra RT
3,468,428 UART: [state] CFI Enabled
3,576,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,578,596 UART:
3,578,612 UART: Running Caliptra ROM ...
3,579,020 UART:
3,579,074 UART: [state] CFI Enabled
3,581,592 UART: [state] LifecycleState = Unprovisioned
3,582,247 UART: [state] DebugLocked = No
3,582,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,584,494 UART: [kat] SHA2-256
4,378,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,382,540 UART: [kat] ++
4,382,692 UART: [kat] sha1
4,387,096 UART: [kat] SHA2-256
4,389,034 UART: [kat] SHA2-384
4,391,843 UART: [kat] SHA2-512-ACC
4,393,743 UART: [kat] ECC-384
4,399,292 UART: [kat] HMAC-384Kdf
4,403,720 UART: [kat] LMS
4,971,916 UART: [kat] --
4,972,933 UART: [update-reset] ++
5,010,092 >>> mbox cmd response: failed
5,010,092 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,010,432 UART: ROM Non-Fatal Error: 0x000B001D
5,011,320 UART: [state] Locking Datavault
5,012,110 UART: [state] Locking PCR0, PCR1 and PCR31
5,012,714 UART: [state] Locking ICCM
5,013,278 UART: [exit] Launching FMC @ 0x40000130
5,018,607 UART:
5,018,623 UART: Running Caliptra FMC ...
5,019,031 UART:
5,019,085 UART: [state] CFI Enabled
5,108,066 UART: [art] Extend RT PCRs Done
5,108,494 UART: [art] Lock RT PCRs Done
5,109,559 UART: [art] Populate DV Done
5,117,648 UART: [fht] FMC Alias Private Key: 7
5,118,580 UART: [art] Derive CDI
5,118,860 UART: [art] Store in in slot 0x4
5,204,225 UART: [art] Derive Key Pair
5,204,585 UART: [art] Store priv key in slot 0x5
5,217,655 UART: [art] Derive Key Pair - Done
5,232,306 UART: [art] Signing Cert with AUTHO
5,232,786 UART: RITY.KEYID = 7
5,248,072 UART: [art] Erasing AUTHORITY.KEYID = 7
5,248,837 UART: [art] PUB.X = F8B9B91084171CB685F012CDDEC5F5BCE4EE16FC3AD175CA2699D7F6A316721C5715ACCD445AF6F06688E9EF548414CA
5,255,623 UART: [art] PUB.Y = 73643F06432C09ABDB03C7819D8D7EF6C8B8DEBDDFEE7FACC7D0CEDE0E43378741829FDA26257F56D2050501693E6C0C
5,262,565 UART: [art] SIG.R = EF3E95F16389192F10224B26B2681CAA43A27F39DBA067FA2C9D33A1D03BC3EF19B6412228333222B81BFFED18C83737
5,269,339 UART: [art] SIG.S = 18E5FCBA4C5B452F5C8D36F79B605ABA535815015F4F421850D73E9A61495A4CB3199741F29992BD95F479FE0A99BCED
5,293,572 UART: Caliptra RT
5,293,825 UART: [state] CFI Enabled
5,575,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,576,724 UART:
5,576,740 UART: Running Caliptra ROM ...
5,577,148 UART:
5,577,202 UART: [state] CFI Enabled
5,579,860 UART: [state] LifecycleState = Unprovisioned
5,580,515 UART: [state] DebugLocked = No
5,581,147 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,582,834 UART: [kat] SHA2-256
6,376,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,380,880 UART: [kat] ++
6,381,032 UART: [kat] sha1
6,385,400 UART: [kat] SHA2-256
6,387,338 UART: [kat] SHA2-384
6,390,115 UART: [kat] SHA2-512-ACC
6,392,015 UART: [kat] ECC-384
6,397,550 UART: [kat] HMAC-384Kdf
6,402,196 UART: [kat] LMS
6,970,392 UART: [kat] --
6,971,123 UART: [update-reset] ++
8,305,185 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,306,273 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
8,455,903 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,104 >>> mbox cmd response: success
2,926,104 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,987,774 UART:
2,987,790 UART: Running Caliptra FMC ...
2,988,198 UART:
2,988,252 UART: [state] CFI Enabled
2,998,677 UART: [fht] FMC Alias Private Key: 7
3,106,016 UART: [art] Extend RT PCRs Done
3,106,444 UART: [art] Lock RT PCRs Done
3,107,816 UART: [art] Populate DV Done
3,116,057 UART: [fht] FMC Alias Private Key: 7
3,117,161 UART: [art] Derive CDI
3,117,441 UART: [art] Store in in slot 0x4
3,203,108 UART: [art] Derive Key Pair
3,203,468 UART: [art] Store priv key in slot 0x5
3,216,728 UART: [art] Derive Key Pair - Done
3,231,421 UART: [art] Signing Cert with AUTHO
3,231,901 UART: RITY.KEYID = 7
3,246,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,590 UART: [art] PUB.X = D6A0A668F067CE68727A606E17B7DD2079D23F56AB9EAC00982D3FABBB10270974E7D21E2F9BFB628188004DC01862B9
3,254,319 UART: [art] PUB.Y = 95F6399D39B95A6E9FEE70B648C16DF8E2DCDFB6963FF5878CAD423862E5EF61AB1284BE2C62F1FCA05CCD1321C8D7C7
3,261,289 UART: [art] SIG.R = B7CE7618840807C022447AFCA45C5A4B10429292E9F75E222F31908625C91019BB161537101AB8EB29702C8665670016
3,268,015 UART: [art] SIG.S = FF9DD5A62152397FA6B1B94B317D7706974F4D818359261AE554F76F54825C9F72ADF0CD53E4AEEB32598F104C8B005D
3,292,457 UART: Caliptra RT
3,292,710 UART: [state] CFI Enabled
3,400,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,717,764 >>> mbox cmd response: failed
4,717,764 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,723,629 UART:
4,723,645 UART: Running Caliptra FMC ...
4,724,053 UART:
4,724,107 UART: [state] CFI Enabled
4,813,432 UART: [art] Extend RT PCRs Done
4,813,860 UART: [art] Lock RT PCRs Done
4,815,237 UART: [art] Populate DV Done
4,823,424 UART: [fht] FMC Alias Private Key: 7
4,824,482 UART: [art] Derive CDI
4,824,762 UART: [art] Store in in slot 0x4
4,910,293 UART: [art] Derive Key Pair
4,910,653 UART: [art] Store priv key in slot 0x5
4,923,537 UART: [art] Derive Key Pair - Done
4,938,366 UART: [art] Signing Cert with AUTHO
4,938,846 UART: RITY.KEYID = 7
4,954,240 UART: [art] Erasing AUTHORITY.KEYID = 7
4,955,005 UART: [art] PUB.X = D6A0A668F067CE68727A606E17B7DD2079D23F56AB9EAC00982D3FABBB10270974E7D21E2F9BFB628188004DC01862B9
4,961,734 UART: [art] PUB.Y = 95F6399D39B95A6E9FEE70B648C16DF8E2DCDFB6963FF5878CAD423862E5EF61AB1284BE2C62F1FCA05CCD1321C8D7C7
4,968,704 UART: [art] SIG.R = B7CE7618840807C022447AFCA45C5A4B10429292E9F75E222F31908625C91019BB161537101AB8EB29702C8665670016
4,975,430 UART: [art] SIG.S = FF9DD5A62152397FA6B1B94B317D7706974F4D818359261AE554F76F54825C9F72ADF0CD53E4AEEB32598F104C8B005D
4,999,526 UART: Caliptra RT
4,999,779 UART: [state] CFI Enabled
5,281,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,044,026 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,606 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,238 UART: [kat] SHA2-256
882,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,284 UART: [kat] ++
886,436 UART: [kat] sha1
890,710 UART: [kat] SHA2-256
892,648 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,377 UART: [kat] LMS
1,475,573 UART: [kat] --
1,476,450 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,861 UART: [idev] ++
1,480,029 UART: [idev] CDI.KEYID = 6
1,480,389 UART: [idev] SUBJECT.KEYID = 7
1,480,813 UART: [idev] UDS.KEYID = 0
1,481,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,827 UART: [idev] Erasing UDS.KEYID = 0
1,505,215 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,783 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,572 UART: [ldev] Erasing FE.KEYID = 1
1,547,391 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,415 UART: [ldev] --
1,586,722 UART: [fwproc] Waiting for Commands...
1,587,337 UART: [fwproc] Received command 0x46574c44
1,588,128 UART: [fwproc] Received Image of size 114168 bytes
2,884,808 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,798 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,675 >>> mbox cmd response: success
3,077,675 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,078,881 UART: [afmc] ++
3,079,049 UART: [afmc] CDI.KEYID = 6
3,079,411 UART: [afmc] SUBJECT.KEYID = 7
3,079,836 UART: [afmc] AUTHORITY.KEYID = 5
3,115,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,159 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,939 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,667 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,552 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,242 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,105 UART: [afmc] --
3,159,165 UART: [cold-reset] --
3,159,837 UART: [state] Locking Datavault
3,161,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,654 UART: [state] Locking ICCM
3,162,212 UART: [exit] Launching FMC @ 0x40000130
3,167,541 UART:
3,167,557 UART: Running Caliptra FMC ...
3,167,965 UART:
3,168,108 UART: [state] CFI Enabled
3,178,467 UART: [fht] FMC Alias Private Key: 7
3,286,628 UART: [art] Extend RT PCRs Done
3,287,056 UART: [art] Lock RT PCRs Done
3,288,484 UART: [art] Populate DV Done
3,296,781 UART: [fht] FMC Alias Private Key: 7
3,297,743 UART: [art] Derive CDI
3,298,023 UART: [art] Store in in slot 0x4
3,383,764 UART: [art] Derive Key Pair
3,384,124 UART: [art] Store priv key in slot 0x5
3,397,362 UART: [art] Derive Key Pair - Done
3,412,246 UART: [art] Signing Cert with AUTHO
3,412,726 UART: RITY.KEYID = 7
3,427,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,663 UART: [art] PUB.X = 592359B2DC1661E72299FBE2B5C8F4157DB6B7C6291B9512BA15ABD8041866DD3B845B5D03EA594059FBF72CCD2B3710
3,435,433 UART: [art] PUB.Y = 14123814DF01EC512236CEE6DA248C95A660F8D18C3AE861EFE4D3EB61A292B2E298FDB3CF67E1CBC37AD4D8AB395A61
3,442,398 UART: [art] SIG.R = 12F41A20295529F205BA4F1A494A785D22FCDA496E2E62227F34E5F46A62DD0A23BA1D44251398718F0BE3B6A903E371
3,449,156 UART: [art] SIG.S = F4AE81E243238B9D417EF96DBBA5CA6AC20414D174572591587EAED422CD25BAC809EB1C5EE807D49854BDA762D9A37C
3,473,610 UART: Caliptra RT
3,473,955 UART: [state] CFI Enabled
3,581,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,583,727 UART:
3,583,743 UART: Running Caliptra ROM ...
3,584,151 UART:
3,584,292 UART: [state] CFI Enabled
3,587,174 UART: [state] LifecycleState = Unprovisioned
3,587,829 UART: [state] DebugLocked = No
3,588,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,106 UART: [kat] SHA2-256
4,384,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,152 UART: [kat] ++
4,388,304 UART: [kat] sha1
4,392,508 UART: [kat] SHA2-256
4,394,446 UART: [kat] SHA2-384
4,397,181 UART: [kat] SHA2-512-ACC
4,399,081 UART: [kat] ECC-384
4,404,980 UART: [kat] HMAC-384Kdf
4,409,620 UART: [kat] LMS
4,977,816 UART: [kat] --
4,978,771 UART: [update-reset] ++
5,016,242 >>> mbox cmd response: failed
5,016,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,016,814 UART: ROM Non-Fatal Error: 0x000B001D
5,017,616 UART: [state] Locking Datavault
5,018,352 UART: [state] Locking PCR0, PCR1 and PCR31
5,018,956 UART: [state] Locking ICCM
5,019,540 UART: [exit] Launching FMC @ 0x40000130
5,024,869 UART:
5,024,885 UART: Running Caliptra FMC ...
5,025,293 UART:
5,025,436 UART: [state] CFI Enabled
5,114,657 UART: [art] Extend RT PCRs Done
5,115,085 UART: [art] Lock RT PCRs Done
5,116,104 UART: [art] Populate DV Done
5,124,401 UART: [fht] FMC Alias Private Key: 7
5,125,483 UART: [art] Derive CDI
5,125,763 UART: [art] Store in in slot 0x4
5,211,234 UART: [art] Derive Key Pair
5,211,594 UART: [art] Store priv key in slot 0x5
5,224,792 UART: [art] Derive Key Pair - Done
5,239,272 UART: [art] Signing Cert with AUTHO
5,239,752 UART: RITY.KEYID = 7
5,255,354 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,119 UART: [art] PUB.X = 592359B2DC1661E72299FBE2B5C8F4157DB6B7C6291B9512BA15ABD8041866DD3B845B5D03EA594059FBF72CCD2B3710
5,262,889 UART: [art] PUB.Y = 14123814DF01EC512236CEE6DA248C95A660F8D18C3AE861EFE4D3EB61A292B2E298FDB3CF67E1CBC37AD4D8AB395A61
5,269,854 UART: [art] SIG.R = 12F41A20295529F205BA4F1A494A785D22FCDA496E2E62227F34E5F46A62DD0A23BA1D44251398718F0BE3B6A903E371
5,276,612 UART: [art] SIG.S = F4AE81E243238B9D417EF96DBBA5CA6AC20414D174572591587EAED422CD25BAC809EB1C5EE807D49854BDA762D9A37C
5,300,380 UART: Caliptra RT
5,300,725 UART: [state] CFI Enabled
5,581,930 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,583,620 UART:
5,583,636 UART: Running Caliptra ROM ...
5,584,044 UART:
5,584,185 UART: [state] CFI Enabled
5,587,031 UART: [state] LifecycleState = Unprovisioned
5,587,686 UART: [state] DebugLocked = No
5,588,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,589,983 UART: [kat] SHA2-256
6,383,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,388,029 UART: [kat] ++
6,388,181 UART: [kat] sha1
6,392,331 UART: [kat] SHA2-256
6,394,269 UART: [kat] SHA2-384
6,397,098 UART: [kat] SHA2-512-ACC
6,398,998 UART: [kat] ECC-384
6,404,253 UART: [kat] HMAC-384Kdf
6,408,955 UART: [kat] LMS
6,977,151 UART: [kat] --
6,978,024 UART: [update-reset] ++
8,310,154 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,311,342 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
8,460,972 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,929,687 >>> mbox cmd response: success
2,929,687 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,991,147 UART:
2,991,163 UART: Running Caliptra FMC ...
2,991,571 UART:
2,991,714 UART: [state] CFI Enabled
3,002,185 UART: [fht] FMC Alias Private Key: 7
3,110,302 UART: [art] Extend RT PCRs Done
3,110,730 UART: [art] Lock RT PCRs Done
3,112,218 UART: [art] Populate DV Done
3,120,409 UART: [fht] FMC Alias Private Key: 7
3,121,399 UART: [art] Derive CDI
3,121,679 UART: [art] Store in in slot 0x4
3,207,630 UART: [art] Derive Key Pair
3,207,990 UART: [art] Store priv key in slot 0x5
3,221,102 UART: [art] Derive Key Pair - Done
3,235,725 UART: [art] Signing Cert with AUTHO
3,236,205 UART: RITY.KEYID = 7
3,251,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,252,040 UART: [art] PUB.X = 9A5FE9185ECB0E81119C649225E9B2C90F139E80B6C18C5D1526FCD9EBF1578F145E707250BD3561BF832FEBBE150195
3,258,807 UART: [art] PUB.Y = F6275EF389273609DF6B6E401AC12BECAA6F463802E7CDB2184E64FF7781594393F3F16EE3F152323DEA40B1FCFBF902
3,265,758 UART: [art] SIG.R = 9AA4CF540E31514668AFDFC8E487FFAA17A2A9C80B748018C1A97CE96EACF41CFFF6B75FF367762B28A094D0DD374911
3,272,538 UART: [art] SIG.S = 8405AB043E434465A54690EF38FFA647A6EB2A98DFB1D7BA3A959D6D4A41575E245B590A42D8B9B7BE6B5DE1D3ED8648
3,296,318 UART: Caliptra RT
3,296,663 UART: [state] CFI Enabled
3,405,917 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,723,696 >>> mbox cmd response: failed
4,723,696 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,729,511 UART:
4,729,527 UART: Running Caliptra FMC ...
4,729,935 UART:
4,730,078 UART: [state] CFI Enabled
4,818,761 UART: [art] Extend RT PCRs Done
4,819,189 UART: [art] Lock RT PCRs Done
4,820,184 UART: [art] Populate DV Done
4,828,685 UART: [fht] FMC Alias Private Key: 7
4,829,833 UART: [art] Derive CDI
4,830,113 UART: [art] Store in in slot 0x4
4,915,802 UART: [art] Derive Key Pair
4,916,162 UART: [art] Store priv key in slot 0x5
4,929,444 UART: [art] Derive Key Pair - Done
4,944,051 UART: [art] Signing Cert with AUTHO
4,944,531 UART: RITY.KEYID = 7
4,959,587 UART: [art] Erasing AUTHORITY.KEYID = 7
4,960,352 UART: [art] PUB.X = 9A5FE9185ECB0E81119C649225E9B2C90F139E80B6C18C5D1526FCD9EBF1578F145E707250BD3561BF832FEBBE150195
4,967,119 UART: [art] PUB.Y = F6275EF389273609DF6B6E401AC12BECAA6F463802E7CDB2184E64FF7781594393F3F16EE3F152323DEA40B1FCFBF902
4,974,070 UART: [art] SIG.R = 9AA4CF540E31514668AFDFC8E487FFAA17A2A9C80B748018C1A97CE96EACF41CFFF6B75FF367762B28A094D0DD374911
4,980,850 UART: [art] SIG.S = 8405AB043E434465A54690EF38FFA647A6EB2A98DFB1D7BA3A959D6D4A41575E245B590A42D8B9B7BE6B5DE1D3ED8648
5,004,706 UART: Caliptra RT
5,005,051 UART: [state] CFI Enabled
5,287,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,047,937 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,879 UART: [kat] SHA2-256
903,819 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,510 UART: [kat] LMS
1,170,838 UART: [kat] --
1,171,789 UART: [cold-reset] ++
1,172,303 UART: [fht] FHT @ 0x50003400
1,174,806 UART: [idev] ++
1,174,974 UART: [idev] CDI.KEYID = 6
1,175,334 UART: [idev] SUBJECT.KEYID = 7
1,175,758 UART: [idev] UDS.KEYID = 0
1,176,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,478 UART: [idev] Erasing UDS.KEYID = 0
1,200,265 UART: [idev] Sha1 KeyId Algorithm
1,208,827 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,246 UART: [ldev] SUBJECT.KEYID = 5
1,210,672 UART: [ldev] AUTHORITY.KEYID = 7
1,211,135 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,581 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,858 UART: [fwproc] Recv command 0x46574c44
1,282,586 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,432 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,736 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,359 >>> mbox cmd response: success
2,771,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,772,509 UART: [afmc] ++
2,772,677 UART: [afmc] CDI.KEYID = 6
2,773,039 UART: [afmc] SUBJECT.KEYID = 7
2,773,464 UART: [afmc] AUTHORITY.KEYID = 5
2,808,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,450 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,178 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,063 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,782 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,636 UART: [afmc] --
2,851,744 UART: [cold-reset] --
2,852,598 UART: [state] Locking Datavault
2,853,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,565 UART: [state] Locking ICCM
2,855,161 UART: [exit] Launching FMC @ 0x40000130
2,860,490 UART:
2,860,506 UART: Running Caliptra FMC ...
2,860,914 UART:
2,860,968 UART: [state] CFI Enabled
2,871,429 UART: [fht] FMC Alias Private Key: 7
2,979,598 UART: [art] Extend RT PCRs Done
2,980,026 UART: [art] Lock RT PCRs Done
2,981,624 UART: [art] Populate DV Done
2,990,033 UART: [fht] FMC Alias Private Key: 7
2,991,101 UART: [art] Derive CDI
2,991,381 UART: [art] Store in in slot 0x4
3,077,158 UART: [art] Derive Key Pair
3,077,518 UART: [art] Store priv key in slot 0x5
3,090,520 UART: [art] Derive Key Pair - Done
3,105,052 UART: [art] Signing Cert with AUTHO
3,105,532 UART: RITY.KEYID = 7
3,120,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,209 UART: [art] PUB.X = 76BAFC045913E74AC8588E2AF924BC62E3FB934738E22483FA06CE58AFE3756B7AABD58BAF8EA7E7986620A8B837B6A6
3,127,987 UART: [art] PUB.Y = 2A28434301A2BC99149B3AB1D965C5271717BB22DBFBD24CD64ADECD939106D6AD39D035B34BE76DA5E938E229E96C46
3,134,941 UART: [art] SIG.R = 7AA819B9BECEDBDD3F1A2036134D523BFD4056036CB5DF4DBCA68EBF4E11C70ECB0296091C34B7D161D9DA8073CDCFBE
3,141,727 UART: [art] SIG.S = 6DF4FFCACEFD9A4C3E7B1B016C9FCC7EB9D9638E919ADDF67C1A9E79CB196AB3ED5088D9EBAB8052A4CFD5C110ACD0D2
3,165,889 UART: Caliptra RT
3,166,142 UART: [state] CFI Enabled
3,273,751 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,697 UART:
3,275,713 UART: Running Caliptra ROM ...
3,276,121 UART:
3,276,176 UART: [state] CFI Enabled
3,278,796 UART: [state] LifecycleState = Unprovisioned
3,279,451 UART: [state] DebugLocked = No
3,280,041 UART: [state] WD Timer not started. Device not locked for debugging
3,281,167 UART: [kat] SHA2-256
4,086,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,090,942 UART: [kat] ++
4,091,094 UART: [kat] sha1
4,095,404 UART: [kat] SHA2-256
4,097,344 UART: [kat] SHA2-384
4,100,109 UART: [kat] SHA2-512-ACC
4,102,009 UART: [kat] ECC-384
4,111,842 UART: [kat] HMAC-384Kdf
4,116,536 UART: [kat] LMS
4,364,864 UART: [kat] --
4,365,862 UART: [update-reset] ++
4,381,307 >>> mbox cmd response: failed
4,381,307 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,381,527 UART: ROM Non-Fatal Error: 0x000B001D
4,382,351 UART: [state] Locking Datavault
4,382,999 UART: [state] Locking PCR0, PCR1 and PCR31
4,383,603 UART: [state] Locking ICCM
4,384,187 UART: [exit] Launching FMC @ 0x40000130
4,389,516 UART:
4,389,532 UART: Running Caliptra FMC ...
4,389,940 UART:
4,389,994 UART: [state] CFI Enabled
4,479,527 UART: [art] Extend RT PCRs Done
4,479,955 UART: [art] Lock RT PCRs Done
4,481,342 UART: [art] Populate DV Done
4,489,661 UART: [fht] FMC Alias Private Key: 7
4,490,643 UART: [art] Derive CDI
4,490,923 UART: [art] Store in in slot 0x4
4,576,848 UART: [art] Derive Key Pair
4,577,208 UART: [art] Store priv key in slot 0x5
4,590,870 UART: [art] Derive Key Pair - Done
4,605,750 UART: [art] Signing Cert with AUTHO
4,606,230 UART: RITY.KEYID = 7
4,621,438 UART: [art] Erasing AUTHORITY.KEYID = 7
4,622,203 UART: [art] PUB.X = 76BAFC045913E74AC8588E2AF924BC62E3FB934738E22483FA06CE58AFE3756B7AABD58BAF8EA7E7986620A8B837B6A6
4,628,981 UART: [art] PUB.Y = 2A28434301A2BC99149B3AB1D965C5271717BB22DBFBD24CD64ADECD939106D6AD39D035B34BE76DA5E938E229E96C46
4,635,935 UART: [art] SIG.R = 7AA819B9BECEDBDD3F1A2036134D523BFD4056036CB5DF4DBCA68EBF4E11C70ECB0296091C34B7D161D9DA8073CDCFBE
4,642,721 UART: [art] SIG.S = 6DF4FFCACEFD9A4C3E7B1B016C9FCC7EB9D9638E919ADDF67C1A9E79CB196AB3ED5088D9EBAB8052A4CFD5C110ACD0D2
4,666,321 UART: Caliptra RT
4,666,574 UART: [state] CFI Enabled
4,948,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,949,714 UART:
4,949,730 UART: Running Caliptra ROM ...
4,950,138 UART:
4,950,193 UART: [state] CFI Enabled
4,953,329 UART: [state] LifecycleState = Unprovisioned
4,953,984 UART: [state] DebugLocked = No
4,954,478 UART: [state] WD Timer not started. Device not locked for debugging
4,955,640 UART: [kat] SHA2-256
5,761,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,765,415 UART: [kat] ++
5,765,567 UART: [kat] sha1
5,769,963 UART: [kat] SHA2-256
5,771,903 UART: [kat] SHA2-384
5,774,532 UART: [kat] SHA2-512-ACC
5,776,432 UART: [kat] ECC-384
5,786,337 UART: [kat] HMAC-384Kdf
5,791,065 UART: [kat] LMS
6,039,393 UART: [kat] --
6,040,303 UART: [update-reset] ++
7,351,635 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,352,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,502,368 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,544 >>> mbox cmd response: success
2,624,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,686,186 UART:
2,686,202 UART: Running Caliptra FMC ...
2,686,610 UART:
2,686,664 UART: [state] CFI Enabled
2,697,065 UART: [fht] FMC Alias Private Key: 7
2,805,558 UART: [art] Extend RT PCRs Done
2,805,986 UART: [art] Lock RT PCRs Done
2,807,454 UART: [art] Populate DV Done
2,815,523 UART: [fht] FMC Alias Private Key: 7
2,816,621 UART: [art] Derive CDI
2,816,901 UART: [art] Store in in slot 0x4
2,902,876 UART: [art] Derive Key Pair
2,903,236 UART: [art] Store priv key in slot 0x5
2,916,560 UART: [art] Derive Key Pair - Done
2,931,437 UART: [art] Signing Cert with AUTHO
2,931,917 UART: RITY.KEYID = 7
2,946,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,752 UART: [art] PUB.X = 1E11D48DFE9C746DEB1D111A5397CA677A4C912B0BEBE039035C6EB8C908E10BE410E769CC0FED1BF522B409A1D3B4BE
2,954,524 UART: [art] PUB.Y = E6ABDF7BA48FFB50CC65922164854B3D95F8500FFAA2FA4AF4F4EC4C5D5CD17EA23D3C9145CE9890BA00C10F0CCE2F7C
2,961,471 UART: [art] SIG.R = F3CBE8A7FE0F7FB0A21F0566783FA2F2EFA3D8135D181BA838440C1DD6BA7BCBF603BDF6A2B4C0486C6E537435D1514B
2,968,249 UART: [art] SIG.S = 04DD339FAF9246E4461BADA74C3F759CC523DF6146D0AE5134A2212F2DAC812A0E3750312923C8062A5E77EB1AAA3435
2,991,103 UART: Caliptra RT
2,991,356 UART: [state] CFI Enabled
3,098,961 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,092,765 >>> mbox cmd response: failed
4,092,765 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,098,482 UART:
4,098,498 UART: Running Caliptra FMC ...
4,098,906 UART:
4,098,960 UART: [state] CFI Enabled
4,187,535 UART: [art] Extend RT PCRs Done
4,187,963 UART: [art] Lock RT PCRs Done
4,189,502 UART: [art] Populate DV Done
4,197,563 UART: [fht] FMC Alias Private Key: 7
4,198,601 UART: [art] Derive CDI
4,198,881 UART: [art] Store in in slot 0x4
4,284,308 UART: [art] Derive Key Pair
4,284,668 UART: [art] Store priv key in slot 0x5
4,298,416 UART: [art] Derive Key Pair - Done
4,313,121 UART: [art] Signing Cert with AUTHO
4,313,601 UART: RITY.KEYID = 7
4,328,573 UART: [art] Erasing AUTHORITY.KEYID = 7
4,329,338 UART: [art] PUB.X = 1E11D48DFE9C746DEB1D111A5397CA677A4C912B0BEBE039035C6EB8C908E10BE410E769CC0FED1BF522B409A1D3B4BE
4,336,110 UART: [art] PUB.Y = E6ABDF7BA48FFB50CC65922164854B3D95F8500FFAA2FA4AF4F4EC4C5D5CD17EA23D3C9145CE9890BA00C10F0CCE2F7C
4,343,057 UART: [art] SIG.R = F3CBE8A7FE0F7FB0A21F0566783FA2F2EFA3D8135D181BA838440C1DD6BA7BCBF603BDF6A2B4C0486C6E537435D1514B
4,349,835 UART: [art] SIG.S = 04DD339FAF9246E4461BADA74C3F759CC523DF6146D0AE5134A2212F2DAC812A0E3750312923C8062A5E77EB1AAA3435
4,373,727 UART: Caliptra RT
4,373,980 UART: [state] CFI Enabled
4,653,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,090,543 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,683 UART: [kat] HMAC-384Kdf
923,291 UART: [kat] LMS
1,171,619 UART: [kat] --
1,172,498 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,599 UART: [idev] ++
1,175,767 UART: [idev] CDI.KEYID = 6
1,176,127 UART: [idev] SUBJECT.KEYID = 7
1,176,551 UART: [idev] UDS.KEYID = 0
1,176,896 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,387 UART: [idev] Erasing UDS.KEYID = 0
1,201,324 UART: [idev] Sha1 KeyId Algorithm
1,209,834 UART: [idev] --
1,210,908 UART: [ldev] ++
1,211,076 UART: [ldev] CDI.KEYID = 6
1,211,439 UART: [ldev] SUBJECT.KEYID = 5
1,211,865 UART: [ldev] AUTHORITY.KEYID = 7
1,212,328 UART: [ldev] FE.KEYID = 1
1,217,682 UART: [ldev] Erasing FE.KEYID = 1
1,244,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,020 UART: [ldev] --
1,283,521 UART: [fwproc] Wait for Commands...
1,284,135 UART: [fwproc] Recv command 0x46574c44
1,284,863 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,015 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,319 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,812 >>> mbox cmd response: success
2,773,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,774,854 UART: [afmc] ++
2,775,022 UART: [afmc] CDI.KEYID = 6
2,775,384 UART: [afmc] SUBJECT.KEYID = 7
2,775,809 UART: [afmc] AUTHORITY.KEYID = 5
2,811,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,631 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,359 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,244 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,963 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,743 UART: [afmc] --
2,854,785 UART: [cold-reset] --
2,855,653 UART: [state] Locking Datavault
2,856,886 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,490 UART: [state] Locking ICCM
2,858,094 UART: [exit] Launching FMC @ 0x40000130
2,863,423 UART:
2,863,439 UART: Running Caliptra FMC ...
2,863,847 UART:
2,863,990 UART: [state] CFI Enabled
2,874,243 UART: [fht] FMC Alias Private Key: 7
2,981,706 UART: [art] Extend RT PCRs Done
2,982,134 UART: [art] Lock RT PCRs Done
2,983,698 UART: [art] Populate DV Done
2,991,739 UART: [fht] FMC Alias Private Key: 7
2,992,767 UART: [art] Derive CDI
2,993,047 UART: [art] Store in in slot 0x4
3,078,542 UART: [art] Derive Key Pair
3,078,902 UART: [art] Store priv key in slot 0x5
3,092,292 UART: [art] Derive Key Pair - Done
3,107,027 UART: [art] Signing Cert with AUTHO
3,107,507 UART: RITY.KEYID = 7
3,122,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,022 UART: [art] PUB.X = 983CC81384433948F8DCC7D58ADCBB1152FFE252EF1B93699020C952F4AFF81F37536EFDBF251AA7E6F9745F3BB2E08D
3,129,806 UART: [art] PUB.Y = 8155FA4208D63C65368659725E5598318F628B262EA6EE0CE634C87FDD785D8DBA0BF2878FC92B96F7819BF2991D9DB6
3,136,749 UART: [art] SIG.R = FD9AED6B068946485EAFBB168030CEA10188313F12BFD854AB05D2A7EB93C71862FD97A83732287A1021D9D280D4C7C0
3,143,516 UART: [art] SIG.S = FECA53AA497C6F73D87077F6F51EFA93660E73403505339F242EE80342F3D68D64653A0FC40798B47ED1BFF541FC3FBB
3,167,688 UART: Caliptra RT
3,168,033 UART: [state] CFI Enabled
3,276,155 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,933 UART:
3,277,949 UART: Running Caliptra ROM ...
3,278,357 UART:
3,278,499 UART: [state] CFI Enabled
3,281,055 UART: [state] LifecycleState = Unprovisioned
3,281,710 UART: [state] DebugLocked = No
3,282,290 UART: [state] WD Timer not started. Device not locked for debugging
3,283,574 UART: [kat] SHA2-256
4,089,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,093,349 UART: [kat] ++
4,093,501 UART: [kat] sha1
4,097,773 UART: [kat] SHA2-256
4,099,713 UART: [kat] SHA2-384
4,102,570 UART: [kat] SHA2-512-ACC
4,104,470 UART: [kat] ECC-384
4,114,059 UART: [kat] HMAC-384Kdf
4,118,721 UART: [kat] LMS
4,367,049 UART: [kat] --
4,367,837 UART: [update-reset] ++
4,383,398 >>> mbox cmd response: failed
4,383,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,383,756 UART: ROM Non-Fatal Error: 0x000B001D
4,384,528 UART: [state] Locking Datavault
4,385,372 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,976 UART: [state] Locking ICCM
4,386,422 UART: [exit] Launching FMC @ 0x40000130
4,391,751 UART:
4,391,767 UART: Running Caliptra FMC ...
4,392,175 UART:
4,392,318 UART: [state] CFI Enabled
4,481,283 UART: [art] Extend RT PCRs Done
4,481,711 UART: [art] Lock RT PCRs Done
4,482,944 UART: [art] Populate DV Done
4,491,225 UART: [fht] FMC Alias Private Key: 7
4,492,175 UART: [art] Derive CDI
4,492,455 UART: [art] Store in in slot 0x4
4,578,662 UART: [art] Derive Key Pair
4,579,022 UART: [art] Store priv key in slot 0x5
4,591,810 UART: [art] Derive Key Pair - Done
4,606,743 UART: [art] Signing Cert with AUTHO
4,607,223 UART: RITY.KEYID = 7
4,622,829 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,594 UART: [art] PUB.X = 983CC81384433948F8DCC7D58ADCBB1152FFE252EF1B93699020C952F4AFF81F37536EFDBF251AA7E6F9745F3BB2E08D
4,630,378 UART: [art] PUB.Y = 8155FA4208D63C65368659725E5598318F628B262EA6EE0CE634C87FDD785D8DBA0BF2878FC92B96F7819BF2991D9DB6
4,637,321 UART: [art] SIG.R = FD9AED6B068946485EAFBB168030CEA10188313F12BFD854AB05D2A7EB93C71862FD97A83732287A1021D9D280D4C7C0
4,644,088 UART: [art] SIG.S = FECA53AA497C6F73D87077F6F51EFA93660E73403505339F242EE80342F3D68D64653A0FC40798B47ED1BFF541FC3FBB
4,668,228 UART: Caliptra RT
4,668,573 UART: [state] CFI Enabled
4,950,801 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,952,196 UART:
4,952,212 UART: Running Caliptra ROM ...
4,952,620 UART:
4,952,762 UART: [state] CFI Enabled
4,955,524 UART: [state] LifecycleState = Unprovisioned
4,956,179 UART: [state] DebugLocked = No
4,956,761 UART: [state] WD Timer not started. Device not locked for debugging
4,957,965 UART: [kat] SHA2-256
5,763,615 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,767,740 UART: [kat] ++
5,767,892 UART: [kat] sha1
5,772,146 UART: [kat] SHA2-256
5,774,086 UART: [kat] SHA2-384
5,776,949 UART: [kat] SHA2-512-ACC
5,778,849 UART: [kat] ECC-384
5,788,424 UART: [kat] HMAC-384Kdf
5,793,174 UART: [kat] LMS
6,041,502 UART: [kat] --
6,042,410 UART: [update-reset] ++
7,353,084 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,354,265 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,503,843 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,149 >>> mbox cmd response: success
2,626,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,688,499 UART:
2,688,515 UART: Running Caliptra FMC ...
2,688,923 UART:
2,689,066 UART: [state] CFI Enabled
2,699,575 UART: [fht] FMC Alias Private Key: 7
2,807,638 UART: [art] Extend RT PCRs Done
2,808,066 UART: [art] Lock RT PCRs Done
2,809,614 UART: [art] Populate DV Done
2,817,837 UART: [fht] FMC Alias Private Key: 7
2,818,977 UART: [art] Derive CDI
2,819,257 UART: [art] Store in in slot 0x4
2,905,618 UART: [art] Derive Key Pair
2,905,978 UART: [art] Store priv key in slot 0x5
2,918,320 UART: [art] Derive Key Pair - Done
2,933,297 UART: [art] Signing Cert with AUTHO
2,933,777 UART: RITY.KEYID = 7
2,949,335 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,100 UART: [art] PUB.X = A904E683B090BABBF26A7D0E2096DA202EDC03D054D7619F96C9CE27AA46060BD11A631A8A855A357328549D45D67AC6
2,956,861 UART: [art] PUB.Y = 2C3544D91706707F9CC449278A150B0E12E333E9B040D2886C2EAFAA3A67D1AB6D6F6113ED859D7FC488115961A78BDE
2,963,806 UART: [art] SIG.R = 37C488107067084BE4DD5C34BECB0DC67CDA5AA5540086FCC6FD085452D1F3C1F777C6DC57BF205FC3A3549D76FFB182
2,970,559 UART: [art] SIG.S = 7C879155EF8E97B1CE3F88DF8110C685C897ACE2B8EDD1E2A3A305390C0AD47BA65CE32422B9DE08C0E5FD00D4516307
2,994,129 UART: Caliptra RT
2,994,474 UART: [state] CFI Enabled
3,102,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,095,658 >>> mbox cmd response: failed
4,095,658 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,101,385 UART:
4,101,401 UART: Running Caliptra FMC ...
4,101,809 UART:
4,101,952 UART: [state] CFI Enabled
4,191,121 UART: [art] Extend RT PCRs Done
4,191,549 UART: [art] Lock RT PCRs Done
4,192,972 UART: [art] Populate DV Done
4,201,153 UART: [fht] FMC Alias Private Key: 7
4,202,309 UART: [art] Derive CDI
4,202,589 UART: [art] Store in in slot 0x4
4,288,140 UART: [art] Derive Key Pair
4,288,500 UART: [art] Store priv key in slot 0x5
4,301,670 UART: [art] Derive Key Pair - Done
4,316,417 UART: [art] Signing Cert with AUTHO
4,316,897 UART: RITY.KEYID = 7
4,332,333 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,098 UART: [art] PUB.X = A904E683B090BABBF26A7D0E2096DA202EDC03D054D7619F96C9CE27AA46060BD11A631A8A855A357328549D45D67AC6
4,339,859 UART: [art] PUB.Y = 2C3544D91706707F9CC449278A150B0E12E333E9B040D2886C2EAFAA3A67D1AB6D6F6113ED859D7FC488115961A78BDE
4,346,804 UART: [art] SIG.R = 37C488107067084BE4DD5C34BECB0DC67CDA5AA5540086FCC6FD085452D1F3C1F777C6DC57BF205FC3A3549D76FFB182
4,353,557 UART: [art] SIG.S = 7C879155EF8E97B1CE3F88DF8110C685C897ACE2B8EDD1E2A3A305390C0AD47BA65CE32422B9DE08C0E5FD00D4516307
4,377,119 UART: Caliptra RT
4,377,464 UART: [state] CFI Enabled
4,656,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,094,430 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,643 UART: [kat] SHA2-256
901,583 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
915,756 UART: [kat] HMAC-384Kdf
920,456 UART: [kat] LMS
1,168,768 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,865 UART: [idev] Erasing UDS.KEYID = 0
1,198,365 UART: [idev] Sha1 KeyId Algorithm
1,207,205 UART: [idev] --
1,208,134 UART: [ldev] ++
1,208,302 UART: [ldev] CDI.KEYID = 6
1,208,666 UART: [ldev] SUBJECT.KEYID = 5
1,209,093 UART: [ldev] AUTHORITY.KEYID = 7
1,209,556 UART: [ldev] FE.KEYID = 1
1,214,728 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,544 UART: [ldev] --
1,280,888 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,070 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,379 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,983 >>> mbox cmd response: success
2,771,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,773,222 UART: [afmc] ++
2,773,390 UART: [afmc] CDI.KEYID = 6
2,773,753 UART: [afmc] SUBJECT.KEYID = 7
2,774,179 UART: [afmc] AUTHORITY.KEYID = 5
2,810,012 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,119 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,731 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,450 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,213 UART: [afmc] --
2,853,227 UART: [cold-reset] --
2,853,839 UART: [state] Locking Datavault
2,855,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,740 UART: [state] Locking ICCM
2,856,298 UART: [exit] Launching FMC @ 0x40000130
2,861,627 UART:
2,861,643 UART: Running Caliptra FMC ...
2,862,051 UART:
2,862,105 UART: [state] CFI Enabled
2,872,238 UART: [fht] FMC Alias Private Key: 7
2,980,049 UART: [art] Extend RT PCRs Done
2,980,477 UART: [art] Lock RT PCRs Done
2,981,831 UART: [art] Populate DV Done
2,990,228 UART: [fht] FMC Alias Private Key: 7
2,991,182 UART: [art] Derive CDI
2,991,462 UART: [art] Store in in slot 0x4
3,076,825 UART: [art] Derive Key Pair
3,077,185 UART: [art] Store priv key in slot 0x5
3,090,563 UART: [art] Derive Key Pair - Done
3,105,398 UART: [art] Signing Cert with AUTHO
3,105,878 UART: RITY.KEYID = 7
3,121,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,823 UART: [art] PUB.X = 9F3BF7EE5544B315E2E2C776754AD3C1FDA6A1610467D778DADFF2E10238FEB4C05A4941B51522148499E0687633DC68
3,128,589 UART: [art] PUB.Y = 0922F94A83D4C6204DB686E2F298FB5BC4801BCA9A48DEB01683CFBEB6DD3D8B79AD99B7F75699DD8556A89C42A8EC82
3,135,552 UART: [art] SIG.R = CE776BC83779AE11DA8E4C5E62786A69CD21013996E3E4A22781A647DCE293F4F298B0CC788DB850BB3AD2BD99C53760
3,142,327 UART: [art] SIG.S = 9C84D3B9E7F5FE062DE8BDBEBE56AFEA515EDAE38DECFDE6CAB95926F7A36E53A83356CC70A2036AB40B116832948022
3,166,405 UART: Caliptra RT
3,166,658 UART: [state] CFI Enabled
3,273,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,116 UART:
3,276,132 UART: Running Caliptra ROM ...
3,276,540 UART:
3,276,595 UART: [state] CFI Enabled
3,279,369 UART: [state] LifecycleState = Unprovisioned
3,280,024 UART: [state] DebugLocked = No
3,280,630 UART: [state] WD Timer not started. Device not locked for debugging
3,281,950 UART: [kat] SHA2-256
4,085,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,089,629 UART: [kat] ++
4,089,781 UART: [kat] sha1
4,093,987 UART: [kat] SHA2-256
4,095,927 UART: [kat] SHA2-384
4,098,638 UART: [kat] SHA2-512-ACC
4,100,538 UART: [kat] ECC-384
4,110,259 UART: [kat] HMAC-384Kdf
4,114,923 UART: [kat] LMS
4,363,235 UART: [kat] --
4,363,967 UART: [update-reset] ++
4,379,364 >>> mbox cmd response: failed
4,379,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,379,916 UART: ROM Non-Fatal Error: 0x000B001D
4,380,906 UART: [state] Locking Datavault
4,381,656 UART: [state] Locking PCR0, PCR1 and PCR31
4,382,260 UART: [state] Locking ICCM
4,382,696 UART: [exit] Launching FMC @ 0x40000130
4,388,025 UART:
4,388,041 UART: Running Caliptra FMC ...
4,388,449 UART:
4,388,503 UART: [state] CFI Enabled
4,477,574 UART: [art] Extend RT PCRs Done
4,478,002 UART: [art] Lock RT PCRs Done
4,479,133 UART: [art] Populate DV Done
4,487,588 UART: [fht] FMC Alias Private Key: 7
4,488,708 UART: [art] Derive CDI
4,488,988 UART: [art] Store in in slot 0x4
4,573,987 UART: [art] Derive Key Pair
4,574,347 UART: [art] Store priv key in slot 0x5
4,587,473 UART: [art] Derive Key Pair - Done
4,602,122 UART: [art] Signing Cert with AUTHO
4,602,602 UART: RITY.KEYID = 7
4,617,442 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,207 UART: [art] PUB.X = 9F3BF7EE5544B315E2E2C776754AD3C1FDA6A1610467D778DADFF2E10238FEB4C05A4941B51522148499E0687633DC68
4,624,973 UART: [art] PUB.Y = 0922F94A83D4C6204DB686E2F298FB5BC4801BCA9A48DEB01683CFBEB6DD3D8B79AD99B7F75699DD8556A89C42A8EC82
4,631,936 UART: [art] SIG.R = CE776BC83779AE11DA8E4C5E62786A69CD21013996E3E4A22781A647DCE293F4F298B0CC788DB850BB3AD2BD99C53760
4,638,711 UART: [art] SIG.S = 9C84D3B9E7F5FE062DE8BDBEBE56AFEA515EDAE38DECFDE6CAB95926F7A36E53A83356CC70A2036AB40B116832948022
4,663,109 UART: Caliptra RT
4,663,362 UART: [state] CFI Enabled
4,944,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,946,507 UART:
4,946,523 UART: Running Caliptra ROM ...
4,946,931 UART:
4,946,986 UART: [state] CFI Enabled
4,949,290 UART: [state] LifecycleState = Unprovisioned
4,949,945 UART: [state] DebugLocked = No
4,950,435 UART: [state] WD Timer not started. Device not locked for debugging
4,951,757 UART: [kat] SHA2-256
5,755,307 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,759,436 UART: [kat] ++
5,759,588 UART: [kat] sha1
5,763,978 UART: [kat] SHA2-256
5,765,918 UART: [kat] SHA2-384
5,768,649 UART: [kat] SHA2-512-ACC
5,770,549 UART: [kat] ECC-384
5,780,100 UART: [kat] HMAC-384Kdf
5,784,810 UART: [kat] LMS
6,033,122 UART: [kat] --
6,034,218 UART: [update-reset] ++
7,344,825 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,345,802 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,495,380 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,310 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,921 >>> mbox cmd response: success
2,620,921 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,682,879 UART:
2,682,895 UART: Running Caliptra FMC ...
2,683,303 UART:
2,683,357 UART: [state] CFI Enabled
2,693,912 UART: [fht] FMC Alias Private Key: 7
2,801,369 UART: [art] Extend RT PCRs Done
2,801,797 UART: [art] Lock RT PCRs Done
2,803,419 UART: [art] Populate DV Done
2,811,416 UART: [fht] FMC Alias Private Key: 7
2,812,528 UART: [art] Derive CDI
2,812,808 UART: [art] Store in in slot 0x4
2,898,379 UART: [art] Derive Key Pair
2,898,739 UART: [art] Store priv key in slot 0x5
2,911,787 UART: [art] Derive Key Pair - Done
2,926,541 UART: [art] Signing Cert with AUTHO
2,927,021 UART: RITY.KEYID = 7
2,941,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,748 UART: [art] PUB.X = 1474FA5152031AA606B92911115C04765C60008D42D322CBFFD7F9BF3525CEC3FBFB35A40AA36FDD46C88B15DD5DD0A4
2,949,496 UART: [art] PUB.Y = 0D9889AE7D3D376D76E7BF0DBA079F9C53DE9DFF17C95C9D2FE9A549FB93EEC385D0A5FD782C10F3B326DB3729D3A900
2,956,435 UART: [art] SIG.R = 5F7ED52D7335EE0109BDCBA19D222B93FF42CDB381DD197E04BD912ADFA8AA36C499F56FF37D6C71DE6C14E4C10C6A2B
2,963,217 UART: [art] SIG.S = E00A0DD75DB7EB2302067C6B1D2E8DDBA6DC51F4EE80FE48D64AD5CF3A86BF366C4BC093C149AA6D2E4EFC148CDCF8CF
2,986,714 UART: Caliptra RT
2,986,967 UART: [state] CFI Enabled
3,095,276 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,084,190 >>> mbox cmd response: failed
4,084,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,090,223 UART:
4,090,239 UART: Running Caliptra FMC ...
4,090,647 UART:
4,090,701 UART: [state] CFI Enabled
4,179,714 UART: [art] Extend RT PCRs Done
4,180,142 UART: [art] Lock RT PCRs Done
4,181,215 UART: [art] Populate DV Done
4,189,440 UART: [fht] FMC Alias Private Key: 7
4,190,462 UART: [art] Derive CDI
4,190,742 UART: [art] Store in in slot 0x4
4,276,789 UART: [art] Derive Key Pair
4,277,149 UART: [art] Store priv key in slot 0x5
4,290,439 UART: [art] Derive Key Pair - Done
4,305,327 UART: [art] Signing Cert with AUTHO
4,305,807 UART: RITY.KEYID = 7
4,320,761 UART: [art] Erasing AUTHORITY.KEYID = 7
4,321,526 UART: [art] PUB.X = 1474FA5152031AA606B92911115C04765C60008D42D322CBFFD7F9BF3525CEC3FBFB35A40AA36FDD46C88B15DD5DD0A4
4,328,274 UART: [art] PUB.Y = 0D9889AE7D3D376D76E7BF0DBA079F9C53DE9DFF17C95C9D2FE9A549FB93EEC385D0A5FD782C10F3B326DB3729D3A900
4,335,213 UART: [art] SIG.R = 5F7ED52D7335EE0109BDCBA19D222B93FF42CDB381DD197E04BD912ADFA8AA36C499F56FF37D6C71DE6C14E4C10C6A2B
4,341,995 UART: [art] SIG.S = E00A0DD75DB7EB2302067C6B1D2E8DDBA6DC51F4EE80FE48D64AD5CF3A86BF366C4BC093C149AA6D2E4EFC148CDCF8CF
4,366,310 UART: Caliptra RT
4,366,563 UART: [state] CFI Enabled
4,652,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,084,897 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,376 UART: [kat] ++
895,528 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
915,775 UART: [kat] HMAC-384Kdf
920,457 UART: [kat] LMS
1,168,769 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,140 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,174,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,696 UART: [idev] Erasing UDS.KEYID = 0
1,199,168 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,801 UART: [ldev] Erasing FE.KEYID = 1
1,241,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,001 UART: [ldev] --
1,281,275 UART: [fwproc] Wait for Commands...
1,282,098 UART: [fwproc] Recv command 0x46574c44
1,282,831 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,195 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,504 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,018 >>> mbox cmd response: success
2,771,018 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,772,189 UART: [afmc] ++
2,772,357 UART: [afmc] CDI.KEYID = 6
2,772,720 UART: [afmc] SUBJECT.KEYID = 7
2,773,146 UART: [afmc] AUTHORITY.KEYID = 5
2,808,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,854 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,583 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,466 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,185 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,798 UART: [afmc] --
2,851,782 UART: [cold-reset] --
2,852,544 UART: [state] Locking Datavault
2,853,673 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,277 UART: [state] Locking ICCM
2,854,785 UART: [exit] Launching FMC @ 0x40000130
2,860,114 UART:
2,860,130 UART: Running Caliptra FMC ...
2,860,538 UART:
2,860,681 UART: [state] CFI Enabled
2,871,148 UART: [fht] FMC Alias Private Key: 7
2,978,801 UART: [art] Extend RT PCRs Done
2,979,229 UART: [art] Lock RT PCRs Done
2,980,637 UART: [art] Populate DV Done
2,988,850 UART: [fht] FMC Alias Private Key: 7
2,990,032 UART: [art] Derive CDI
2,990,312 UART: [art] Store in in slot 0x4
3,076,253 UART: [art] Derive Key Pair
3,076,613 UART: [art] Store priv key in slot 0x5
3,089,487 UART: [art] Derive Key Pair - Done
3,104,451 UART: [art] Signing Cert with AUTHO
3,104,931 UART: RITY.KEYID = 7
3,119,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,120,288 UART: [art] PUB.X = 67D8201F22F997DD121B6508BBE7F5212E2A02A030BBC5DF7B033CCE3AA3923D0101FBF2DE73A7748D062AE8FA641BAA
3,127,056 UART: [art] PUB.Y = 1A9F8595122CB2A31DC54A924242E8DE4ECC5E0213241961794A24C5C956E6A054E4BB1C077A64904EA78D3D96C9248D
3,134,000 UART: [art] SIG.R = A18C8B99A3C4EF8F58EAD3111D3BAB4B255F363901C42026EB03C2DEFE2844F4DCB28618CC9EF85815F1C5FD9A3123B0
3,140,780 UART: [art] SIG.S = 8A5D9EAEC2FFB7D77CF871E649A72AF0A99C6918EFB9DF7BC89A2343F1E56161975EAC1E3335BD179EE4F1044AB6BB11
3,165,188 UART: Caliptra RT
3,165,533 UART: [state] CFI Enabled
3,273,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,275,065 UART:
3,275,081 UART: Running Caliptra ROM ...
3,275,489 UART:
3,275,631 UART: [state] CFI Enabled
3,278,255 UART: [state] LifecycleState = Unprovisioned
3,278,910 UART: [state] DebugLocked = No
3,279,488 UART: [state] WD Timer not started. Device not locked for debugging
3,280,636 UART: [kat] SHA2-256
4,084,186 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,088,315 UART: [kat] ++
4,088,467 UART: [kat] sha1
4,092,831 UART: [kat] SHA2-256
4,094,771 UART: [kat] SHA2-384
4,097,412 UART: [kat] SHA2-512-ACC
4,099,312 UART: [kat] ECC-384
4,109,135 UART: [kat] HMAC-384Kdf
4,113,569 UART: [kat] LMS
4,361,881 UART: [kat] --
4,362,987 UART: [update-reset] ++
4,378,370 >>> mbox cmd response: failed
4,378,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,378,742 UART: ROM Non-Fatal Error: 0x000B001D
4,379,510 UART: [state] Locking Datavault
4,380,396 UART: [state] Locking PCR0, PCR1 and PCR31
4,381,000 UART: [state] Locking ICCM
4,381,510 UART: [exit] Launching FMC @ 0x40000130
4,386,839 UART:
4,386,855 UART: Running Caliptra FMC ...
4,387,263 UART:
4,387,406 UART: [state] CFI Enabled
4,477,221 UART: [art] Extend RT PCRs Done
4,477,649 UART: [art] Lock RT PCRs Done
4,478,712 UART: [art] Populate DV Done
4,486,691 UART: [fht] FMC Alias Private Key: 7
4,487,751 UART: [art] Derive CDI
4,488,031 UART: [art] Store in in slot 0x4
4,573,742 UART: [art] Derive Key Pair
4,574,102 UART: [art] Store priv key in slot 0x5
4,587,346 UART: [art] Derive Key Pair - Done
4,601,810 UART: [art] Signing Cert with AUTHO
4,602,290 UART: RITY.KEYID = 7
4,617,678 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,443 UART: [art] PUB.X = 67D8201F22F997DD121B6508BBE7F5212E2A02A030BBC5DF7B033CCE3AA3923D0101FBF2DE73A7748D062AE8FA641BAA
4,625,211 UART: [art] PUB.Y = 1A9F8595122CB2A31DC54A924242E8DE4ECC5E0213241961794A24C5C956E6A054E4BB1C077A64904EA78D3D96C9248D
4,632,155 UART: [art] SIG.R = A18C8B99A3C4EF8F58EAD3111D3BAB4B255F363901C42026EB03C2DEFE2844F4DCB28618CC9EF85815F1C5FD9A3123B0
4,638,935 UART: [art] SIG.S = 8A5D9EAEC2FFB7D77CF871E649A72AF0A99C6918EFB9DF7BC89A2343F1E56161975EAC1E3335BD179EE4F1044AB6BB11
4,662,763 UART: Caliptra RT
4,663,108 UART: [state] CFI Enabled
4,939,496 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,941,315 UART:
4,941,331 UART: Running Caliptra ROM ...
4,941,739 UART:
4,941,881 UART: [state] CFI Enabled
4,944,657 UART: [state] LifecycleState = Unprovisioned
4,945,312 UART: [state] DebugLocked = No
4,945,970 UART: [state] WD Timer not started. Device not locked for debugging
4,947,238 UART: [kat] SHA2-256
5,750,788 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,754,917 UART: [kat] ++
5,755,069 UART: [kat] sha1
5,759,395 UART: [kat] SHA2-256
5,761,335 UART: [kat] SHA2-384
5,763,948 UART: [kat] SHA2-512-ACC
5,765,848 UART: [kat] ECC-384
5,775,865 UART: [kat] HMAC-384Kdf
5,780,269 UART: [kat] LMS
6,028,581 UART: [kat] --
6,029,471 UART: [update-reset] ++
7,339,524 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,340,705 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,490,283 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,791 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,842 >>> mbox cmd response: success
2,622,842 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,685,318 UART:
2,685,334 UART: Running Caliptra FMC ...
2,685,742 UART:
2,685,885 UART: [state] CFI Enabled
2,696,546 UART: [fht] FMC Alias Private Key: 7
2,804,329 UART: [art] Extend RT PCRs Done
2,804,757 UART: [art] Lock RT PCRs Done
2,806,129 UART: [art] Populate DV Done
2,814,600 UART: [fht] FMC Alias Private Key: 7
2,815,772 UART: [art] Derive CDI
2,816,052 UART: [art] Store in in slot 0x4
2,901,609 UART: [art] Derive Key Pair
2,901,969 UART: [art] Store priv key in slot 0x5
2,915,747 UART: [art] Derive Key Pair - Done
2,930,560 UART: [art] Signing Cert with AUTHO
2,931,040 UART: RITY.KEYID = 7
2,946,348 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,113 UART: [art] PUB.X = 33DE7EE21F1029F9F4F1D2FCFB58D6264945CD26EF6E50EAEA586C54CD54458FB4AFAFDF917C71CCADA7E302DD8A8815
2,953,906 UART: [art] PUB.Y = F0E162349B7AC0C5500830904E5FB9C9C0E6B4B98E2FD669B1869CDCEA17EF773EDD55B98E214897993A31D6648989B1
2,960,857 UART: [art] SIG.R = 34F3324F1E4608313388E7ECEA78EB6210407807FAA897EF41B9C873FECAF4F47AF5D1039F09B8AFA24D3D04537FD7E3
2,967,622 UART: [art] SIG.S = 24D464FC1EF8CFEF287B1C08714B0A3DE6591E4642A3E091357152B922AC6C98BCF602FDEA639EEDEE510DF672B72EAA
2,991,255 UART: Caliptra RT
2,991,600 UART: [state] CFI Enabled
3,099,189 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,088,762 >>> mbox cmd response: failed
4,088,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,094,529 UART:
4,094,545 UART: Running Caliptra FMC ...
4,094,953 UART:
4,095,096 UART: [state] CFI Enabled
4,184,499 UART: [art] Extend RT PCRs Done
4,184,927 UART: [art] Lock RT PCRs Done
4,185,974 UART: [art] Populate DV Done
4,194,217 UART: [fht] FMC Alias Private Key: 7
4,195,191 UART: [art] Derive CDI
4,195,471 UART: [art] Store in in slot 0x4
4,281,264 UART: [art] Derive Key Pair
4,281,624 UART: [art] Store priv key in slot 0x5
4,294,992 UART: [art] Derive Key Pair - Done
4,309,825 UART: [art] Signing Cert with AUTHO
4,310,305 UART: RITY.KEYID = 7
4,325,559 UART: [art] Erasing AUTHORITY.KEYID = 7
4,326,324 UART: [art] PUB.X = 33DE7EE21F1029F9F4F1D2FCFB58D6264945CD26EF6E50EAEA586C54CD54458FB4AFAFDF917C71CCADA7E302DD8A8815
4,333,117 UART: [art] PUB.Y = F0E162349B7AC0C5500830904E5FB9C9C0E6B4B98E2FD669B1869CDCEA17EF773EDD55B98E214897993A31D6648989B1
4,340,068 UART: [art] SIG.R = 34F3324F1E4608313388E7ECEA78EB6210407807FAA897EF41B9C873FECAF4F47AF5D1039F09B8AFA24D3D04537FD7E3
4,346,833 UART: [art] SIG.S = 24D464FC1EF8CFEF287B1C08714B0A3DE6591E4642A3E091357152B922AC6C98BCF602FDEA639EEDEE510DF672B72EAA
4,370,222 UART: Caliptra RT
4,370,567 UART: [state] CFI Enabled
4,654,264 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,488 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,230 UART:
192,598 UART: Running Caliptra ROM ...
193,774 UART:
193,927 UART: [state] CFI Enabled
257,139 UART: [state] LifecycleState = Unprovisioned
259,070 UART: [state] DebugLocked = No
261,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,068 UART: [kat] SHA2-256
436,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,274 UART: [kat] ++
447,756 UART: [kat] sha1
458,707 UART: [kat] SHA2-256
461,394 UART: [kat] SHA2-384
468,462 UART: [kat] SHA2-512-ACC
470,867 UART: [kat] ECC-384
2,763,785 UART: [kat] HMAC-384Kdf
2,795,401 UART: [kat] LMS
3,985,703 UART: [kat] --
3,990,397 UART: [cold-reset] ++
3,991,357 UART: [fht] Storing FHT @ 0x50003400
4,001,811 UART: [idev] ++
4,002,379 UART: [idev] CDI.KEYID = 6
4,003,359 UART: [idev] SUBJECT.KEYID = 7
4,004,596 UART: [idev] UDS.KEYID = 0
4,007,353 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,150,734 UART: [idev] Erasing UDS.KEYID = 0
7,340,844 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,898 UART: [idev] --
7,366,435 UART: [ldev] ++
7,367,006 UART: [ldev] CDI.KEYID = 6
7,368,031 UART: [ldev] SUBJECT.KEYID = 5
7,369,139 UART: [ldev] AUTHORITY.KEYID = 7
7,370,424 UART: [ldev] FE.KEYID = 1
7,418,350 UART: [ldev] Erasing FE.KEYID = 1
10,755,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,093,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,423 UART: [ldev] --
13,131,096 UART: [fwproc] Waiting for Commands...
13,133,302 UART: [fwproc] Received command 0x46574c44
13,135,488 UART: [fwproc] Received Image of size 113844 bytes
17,174,244 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,247,694 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,316,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,633,732 >>> mbox cmd response: success
17,635,804 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,779,116 UART: [afmc] ++
17,779,763 UART: [afmc] CDI.KEYID = 6
17,780,657 UART: [afmc] SUBJECT.KEYID = 7
17,781,763 UART: [afmc] AUTHORITY.KEYID = 5
20,999,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,299,208 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,301,464 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,316,044 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,330,854 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,345,139 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,367,301 UART: [afmc] --
23,371,761 UART: [cold-reset] --
23,375,464 UART: [state] Locking Datavault
23,378,984 UART: [state] Locking PCR0, PCR1 and PCR31
23,380,742 UART: [state] Locking ICCM
23,383,327 UART: [exit] Launching FMC @ 0x40000130
23,391,723 UART:
23,391,963 UART: Running Caliptra FMC ...
23,393,065 UART:
23,393,226 UART: [state] CFI Enabled
23,461,743 UART: [fht] FMC Alias Private Key: 7
25,799,798 UART: [art] Extend RT PCRs Done
25,801,011 UART: [art] Lock RT PCRs Done
25,802,981 UART: [art] Populate DV Done
25,808,399 UART: [fht] FMC Alias Private Key: 7
25,809,933 UART: [art] Derive CDI
25,810,751 UART: [art] Store in in slot 0x4
25,870,128 UART: [art] Derive Key Pair
25,871,141 UART: [art] Store priv key in slot 0x5
29,164,523 UART: [art] Derive Key Pair - Done
29,177,610 UART: [art] Signing Cert with AUTHO
29,178,938 UART: RITY.KEYID = 7
31,466,839 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,355 UART: [art] PUB.X = 7D87F4E8F19DB8ADA8D8CA24C554C8A2D15B1D6F6B724AB13FC93C414C685877C602E8FC171A3F27D8192F59ED5BC54E
31,475,610 UART: [art] PUB.Y = 95D7AC58F26640D509C87FB1C0AF5C760686CD4344BA94E57957E0A5757A31B8542241FFF0B9B3BCA2B725130E58B3D4
31,482,847 UART: [art] SIG.R = 8B1E3DF7BE719D0EC03DCA08AABE0BD22FE9354662FE24DE15DA77EDD598879E8787E3DE4AB18FF3FDF7741795E4071B
31,490,262 UART: [art] SIG.S = A2FBAF6B4943F86A061179831DFEAFF097A8010EFA967B529892571C7EB69FB780AF023A1FC4B1E546EF723292F2A753
32,795,575 UART: Caliptra RT
32,796,276 UART: [state] CFI Enabled
32,956,737 UART: [rt] RT listening for mailbox commands...
32,959,913 UART:
32,960,079 UART: Running Caliptra ROM ...
32,961,188 UART:
32,961,350 UART: [state] CFI Enabled
33,022,975 UART: [state] LifecycleState = Unprovisioned
33,024,957 UART: [state] DebugLocked = No
33,027,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,033,350 UART: [kat] SHA2-256
33,203,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,213,514 UART: [kat] ++
33,214,049 UART: [kat] sha1
33,225,050 UART: [kat] SHA2-256
33,227,746 UART: [kat] SHA2-384
33,232,921 UART: [kat] SHA2-512-ACC
33,235,316 UART: [kat] ECC-384
35,526,944 UART: [kat] HMAC-384Kdf
35,551,331 UART: [kat] LMS
36,741,700 UART: [kat] --
36,745,872 UART: [update-reset] ++
36,854,348 >>> mbox cmd response: failed
36,856,645 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,999,778 UART: ROM Non-Fatal Error: 0x000B001E
37,001,206 UART: [state] Locking Datavault
37,002,374 UART: [state] Locking PCR0, PCR1 and PCR31
37,003,918 UART: [state] Locking ICCM
37,004,830 UART: [exit] Launching FMC @ 0x40000130
37,006,266 UART:
37,006,431 UART: Running Caliptra FMC ...
37,007,539 UART:
37,007,698 UART: [state] CFI Enabled
37,008,623 UART: [art] Extend RT PCRs Done
37,009,743 UART: [art] Lock RT PCRs Done
37,010,821 UART: [art] Populate DV Done
37,011,977 UART: [fht] FMC Alias Private Key: 7
37,013,228 UART: [art] Derive CDI
37,013,963 UART: [art] Store in in slot 0x4
37,041,129 UART: [art] Derive Key Pair
37,042,133 UART: [art] Store priv key in slot 0x5
40,335,043 UART: [art] Derive Key Pair - Done
40,348,107 UART: [art] Signing Cert with AUTHO
40,349,413 UART: RITY.KEYID = 7
42,636,140 UART: [art] Erasing AUTHORITY.KEYID = 7
42,637,656 UART: [art] PUB.X = 7D87F4E8F19DB8ADA8D8CA24C554C8A2D15B1D6F6B724AB13FC93C414C685877C602E8FC171A3F27D8192F59ED5BC54E
42,644,961 UART: [art] PUB.Y = 95D7AC58F26640D509C87FB1C0AF5C760686CD4344BA94E57957E0A5757A31B8542241FFF0B9B3BCA2B725130E58B3D4
42,652,184 UART: [art] SIG.R = 8B1E3DF7BE719D0EC03DCA08AABE0BD22FE9354662FE24DE15DA77EDD598879E8787E3DE4AB18FF3FDF7741795E4071B
42,659,567 UART: [art] SIG.S = A2FBAF6B4943F86A061179831DFEAFF097A8010EFA967B529892571C7EB69FB780AF023A1FC4B1E546EF723292F2A753
43,965,196 UART: Caliptra RT
43,965,926 UART: [state] CFI Enabled
44,318,086 UART: [rt] RT listening for mailbox commands...
44,321,163 UART:
44,321,419 UART: Running Caliptra ROM ...
44,322,447 UART:
44,322,596 UART: [state] CFI Enabled
44,382,785 UART: [state] LifecycleState = Unprovisioned
44,384,713 UART: [state] DebugLocked = No
44,386,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,392,300 UART: [kat] SHA2-256
44,561,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,572,460 UART: [kat] ++
44,572,914 UART: [kat] sha1
44,584,123 UART: [kat] SHA2-256
44,586,804 UART: [kat] SHA2-384
44,592,733 UART: [kat] SHA2-512-ACC
44,595,104 UART: [kat] ECC-384
46,885,438 UART: [kat] HMAC-384Kdf
46,899,066 UART: [kat] LMS
48,089,408 UART: [kat] --
48,092,660 UART: [update-reset] ++
52,228,482 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,232,247 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
52,613,532 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,801,496 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,854,922 >>> mbox cmd response: success
17,856,889 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,546,147 UART:
23,546,539 UART: Running Caliptra FMC ...
23,547,627 UART:
23,547,780 UART: [state] CFI Enabled
23,614,542 UART: [fht] FMC Alias Private Key: 7
25,952,234 UART: [art] Extend RT PCRs Done
25,953,462 UART: [art] Lock RT PCRs Done
25,955,171 UART: [art] Populate DV Done
25,960,417 UART: [fht] FMC Alias Private Key: 7
25,962,066 UART: [art] Derive CDI
25,962,830 UART: [art] Store in in slot 0x4
26,023,688 UART: [art] Derive Key Pair
26,024,731 UART: [art] Store priv key in slot 0x5
29,318,091 UART: [art] Derive Key Pair - Done
29,331,262 UART: [art] Signing Cert with AUTHO
29,332,572 UART: RITY.KEYID = 7
31,619,880 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,397 UART: [art] PUB.X = 193CA46007A275DDFE28E2011DDB74DF8693C533777A1412D364C8A7FEA4DF789DA76EF591BDDCF869ACF1F885262ECD
31,628,663 UART: [art] PUB.Y = BA910DFEAFCD8C8240994EC3435B4D7310D024F78FBE2C8B95564C58A5F4D6944B02B2AC10AE51EC0B7C6C504BF97E68
31,635,940 UART: [art] SIG.R = 45F6F4AD1E1CDA701CBBD93AD0AEBC1F8FEB7FFAD94E5EFBA352FE0506FFBE2795DEEA09DAD7EEE2BF5067D261B739A7
31,643,347 UART: [art] SIG.S = FDC012932AFAE208B8765493F453E357DA49467A2AE239CCB917CCB01825F559AB100EA82A0C19FFE34016682A01EBAE
32,948,756 UART: Caliptra RT
32,949,468 UART: [state] CFI Enabled
33,111,059 UART: [rt] RT listening for mailbox commands...
36,832,275 >>> mbox cmd response: failed
36,834,037 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,977,629 UART:
36,977,956 UART: Running Caliptra FMC ...
36,979,083 UART:
36,979,251 UART: [state] CFI Enabled
36,980,115 UART: [art] Extend RT PCRs Done
36,981,252 UART: [art] Lock RT PCRs Done
36,982,270 UART: [art] Populate DV Done
36,983,373 UART: [fht] FMC Alias Private Key: 7
36,984,618 UART: [art] Derive CDI
36,985,347 UART: [art] Store in in slot 0x4
37,010,984 UART: [art] Derive Key Pair
37,011,985 UART: [art] Store priv key in slot 0x5
40,305,002 UART: [art] Derive Key Pair - Done
40,317,787 UART: [art] Signing Cert with AUTHO
40,319,094 UART: RITY.KEYID = 7
42,607,553 UART: [art] Erasing AUTHORITY.KEYID = 7
42,609,080 UART: [art] PUB.X = 193CA46007A275DDFE28E2011DDB74DF8693C533777A1412D364C8A7FEA4DF789DA76EF591BDDCF869ACF1F885262ECD
42,616,344 UART: [art] PUB.Y = BA910DFEAFCD8C8240994EC3435B4D7310D024F78FBE2C8B95564C58A5F4D6944B02B2AC10AE51EC0B7C6C504BF97E68
42,623,617 UART: [art] SIG.R = 45F6F4AD1E1CDA701CBBD93AD0AEBC1F8FEB7FFAD94E5EFBA352FE0506FFBE2795DEEA09DAD7EEE2BF5067D261B739A7
42,631,023 UART: [art] SIG.S = FDC012932AFAE208B8765493F453E357DA49467A2AE239CCB917CCB01825F559AB100EA82A0C19FFE34016682A01EBAE
43,936,000 UART: Caliptra RT
43,936,724 UART: [state] CFI Enabled
44,269,736 UART: [rt] RT listening for mailbox commands...
52,852,744 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
192,620 UART:
193,070 UART: Running Caliptra ROM ...
194,188 UART:
603,808 UART: [state] CFI Enabled
616,963 UART: [state] LifecycleState = Unprovisioned
618,859 UART: [state] DebugLocked = No
620,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,819 UART: [kat] SHA2-256
795,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,101 UART: [kat] ++
806,547 UART: [kat] sha1
817,906 UART: [kat] SHA2-256
820,595 UART: [kat] SHA2-384
825,332 UART: [kat] SHA2-512-ACC
827,670 UART: [kat] ECC-384
3,113,902 UART: [kat] HMAC-384Kdf
3,126,530 UART: [kat] LMS
4,316,636 UART: [kat] --
4,321,404 UART: [cold-reset] ++
4,323,984 UART: [fht] Storing FHT @ 0x50003400
4,335,593 UART: [idev] ++
4,336,214 UART: [idev] CDI.KEYID = 6
4,337,096 UART: [idev] SUBJECT.KEYID = 7
4,338,365 UART: [idev] UDS.KEYID = 0
4,341,231 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,484,445 UART: [idev] Erasing UDS.KEYID = 0
7,630,810 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,881 UART: [idev] --
7,654,363 UART: [ldev] ++
7,654,934 UART: [ldev] CDI.KEYID = 6
7,655,873 UART: [ldev] SUBJECT.KEYID = 5
7,657,059 UART: [ldev] AUTHORITY.KEYID = 7
7,658,402 UART: [ldev] FE.KEYID = 1
7,667,831 UART: [ldev] Erasing FE.KEYID = 1
10,954,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,723 UART: [ldev] --
13,313,403 UART: [fwproc] Waiting for Commands...
13,315,769 UART: [fwproc] Received command 0x46574c44
13,317,967 UART: [fwproc] Received Image of size 113844 bytes
17,369,480 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,449,885 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,835,249 >>> mbox cmd response: success
17,837,880 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,980,974 UART: [afmc] ++
17,981,615 UART: [afmc] CDI.KEYID = 6
17,982,549 UART: [afmc] SUBJECT.KEYID = 7
17,983,658 UART: [afmc] AUTHORITY.KEYID = 5
21,150,397 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,443,711 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,445,966 UART: [afmc] PUB.X = 8188FFC08B44A601BACDD8B2DA605DBF9A037170B0C0857C0B49F09D3B10D997C3252CC8F623C2A79CA7CFD6C33D4026
23,460,456 UART: [afmc] PUB.Y = 469A2D2A2746BE66B23BC247F892CCD896F553A8E4CD1A616AA1EAEC06D55BB912FECFFF397570A1DCF8B96CADE6DCBD
23,475,291 UART: [afmc] SIG.R = 70DD329DB50192ACE87A6C10E1666FD5D3BD84C00AA8588EF82FC5A7305C574C4BB5029704E58EAEA71862E1752CC5F4
23,489,510 UART: [afmc] SIG.S = C2527B23317C57C01E8D1CBEE4ABD2C785E441D665A2C9DAA3E5CB0B9D451666EDB7D459C9DAEC3E09BCD9224F672B40
23,512,017 UART: [afmc] --
23,516,156 UART: [cold-reset] --
23,520,181 UART: [state] Locking Datavault
23,525,426 UART: [state] Locking PCR0, PCR1 and PCR31
23,527,190 UART: [state] Locking ICCM
23,529,852 UART: [exit] Launching FMC @ 0x40000130
23,538,251 UART:
23,538,489 UART: Running Caliptra FMC ...
23,539,595 UART:
23,539,767 UART: [state] CFI Enabled
23,548,129 UART: [fht] FMC Alias Private Key: 7
25,878,460 UART: [art] Extend RT PCRs Done
25,879,694 UART: [art] Lock RT PCRs Done
25,881,648 UART: [art] Populate DV Done
25,887,171 UART: [fht] FMC Alias Private Key: 7
25,888,655 UART: [art] Derive CDI
25,889,424 UART: [art] Store in in slot 0x4
25,931,907 UART: [art] Derive Key Pair
25,932,915 UART: [art] Store priv key in slot 0x5
29,175,987 UART: [art] Derive Key Pair - Done
29,189,052 UART: [art] Signing Cert with AUTHO
29,190,370 UART: RITY.KEYID = 7
31,469,978 UART: [art] Erasing AUTHORITY.KEYID = 7
31,471,632 UART: [art] PUB.X = CE3CF21DF7F72652E08446F2A4180EA34F056A5861AB21578F6610D2A38E5FE3A9F3C3A73C920A07BA01A54826F5B30E
31,478,695 UART: [art] PUB.Y = 0879B2B8B490FFB99CB70D91F9EB759FE53B18012202A27B1343F729A568A63A23D8EE3A7E66EDED0E428443208B6F5F
31,485,961 UART: [art] SIG.R = 17060AC69A56D2F53561502B7E054CA8C07F67D47618A77582C1EBF35057BA177DBF5BD3322B96AFACF39A6BFA0C71A0
31,493,357 UART: [art] SIG.S = 56E506EE83B0171223AFDE030A11D4604344DDC4E9AAB36F217C236DB2A32A21F29EB1D5857E7D34B0940DA50B59B3CE
32,798,552 UART: Caliptra RT
32,799,269 UART: [state] CFI Enabled
32,917,436 UART: [rt] RT listening for mailbox commands...
32,920,292 UART:
32,920,461 UART: Running Caliptra ROM ...
32,921,576 UART:
32,921,950 UART: [state] CFI Enabled
32,937,527 UART: [state] LifecycleState = Unprovisioned
32,939,405 UART: [state] DebugLocked = No
32,941,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
32,946,140 UART: [kat] SHA2-256
33,115,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,126,406 UART: [kat] ++
33,126,887 UART: [kat] sha1
33,138,905 UART: [kat] SHA2-256
33,141,626 UART: [kat] SHA2-384
33,148,639 UART: [kat] SHA2-512-ACC
33,151,043 UART: [kat] ECC-384
35,435,079 UART: [kat] HMAC-384Kdf
35,446,554 UART: [kat] LMS
36,636,628 UART: [kat] --
36,642,195 UART: [update-reset] ++
36,750,338 >>> mbox cmd response: failed
36,752,281 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,895,592 UART: ROM Non-Fatal Error: 0x000B001E
36,897,033 UART: [state] Locking Datavault
36,898,194 UART: [state] Locking PCR0, PCR1 and PCR31
36,899,735 UART: [state] Locking ICCM
36,900,642 UART: [exit] Launching FMC @ 0x40000130
36,902,074 UART:
36,902,237 UART: Running Caliptra FMC ...
36,903,358 UART:
36,903,516 UART: [state] CFI Enabled
36,904,367 UART: [art] Extend RT PCRs Done
36,905,510 UART: [art] Lock RT PCRs Done
36,906,499 UART: [art] Populate DV Done
36,907,529 UART: [fht] FMC Alias Private Key: 7
36,908,769 UART: [art] Derive CDI
36,909,498 UART: [art] Store in in slot 0x4
36,910,667 UART: [art] Derive Key Pair
36,911,823 UART: [art] Store priv key in slot 0x5
40,112,819 UART: [art] Derive Key Pair - Done
40,125,898 UART: [art] Signing Cert with AUTHO
40,127,301 UART: RITY.KEYID = 7
42,406,506 UART: [art] Erasing AUTHORITY.KEYID = 7
42,408,028 UART: [art] PUB.X = CE3CF21DF7F72652E08446F2A4180EA34F056A5861AB21578F6610D2A38E5FE3A9F3C3A73C920A07BA01A54826F5B30E
42,415,244 UART: [art] PUB.Y = 0879B2B8B490FFB99CB70D91F9EB759FE53B18012202A27B1343F729A568A63A23D8EE3A7E66EDED0E428443208B6F5F
42,422,512 UART: [art] SIG.R = 17060AC69A56D2F53561502B7E054CA8C07F67D47618A77582C1EBF35057BA177DBF5BD3322B96AFACF39A6BFA0C71A0
42,429,863 UART: [art] SIG.S = 56E506EE83B0171223AFDE030A11D4604344DDC4E9AAB36F217C236DB2A32A21F29EB1D5857E7D34B0940DA50B59B3CE
43,734,683 UART: Caliptra RT
43,735,410 UART: [state] CFI Enabled
44,029,475 UART: [rt] RT listening for mailbox commands...
44,032,287 UART:
44,032,467 UART: Running Caliptra ROM ...
44,033,518 UART:
44,033,942 UART: [state] CFI Enabled
44,046,971 UART: [state] LifecycleState = Unprovisioned
44,048,866 UART: [state] DebugLocked = No
44,051,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,056,762 UART: [kat] SHA2-256
44,226,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,236,980 UART: [kat] ++
44,237,520 UART: [kat] sha1
44,248,321 UART: [kat] SHA2-256
44,251,017 UART: [kat] SHA2-384
44,258,247 UART: [kat] SHA2-512-ACC
44,260,595 UART: [kat] ECC-384
46,546,306 UART: [kat] HMAC-384Kdf
46,558,107 UART: [kat] LMS
47,748,194 UART: [kat] --
47,753,017 UART: [update-reset] ++
51,889,480 UART: [update-reset] Image verified using Vendor ECC Key Index 3
51,892,726 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
52,274,011 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.04s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,599 writing to cptra_bootfsm_go
4,129,815 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,068,731 >>> mbox cmd response: success
18,070,629 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,713,296 UART:
23,713,697 UART: Running Caliptra FMC ...
23,714,787 UART:
23,714,947 UART: [state] CFI Enabled
23,722,737 UART: [fht] FMC Alias Private Key: 7
26,053,856 UART: [art] Extend RT PCRs Done
26,055,080 UART: [art] Lock RT PCRs Done
26,056,769 UART: [art] Populate DV Done
26,062,184 UART: [fht] FMC Alias Private Key: 7
26,063,945 UART: [art] Derive CDI
26,064,760 UART: [art] Store in in slot 0x4
26,107,088 UART: [art] Derive Key Pair
26,108,140 UART: [art] Store priv key in slot 0x5
29,349,925 UART: [art] Derive Key Pair - Done
29,362,734 UART: [art] Signing Cert with AUTHO
29,364,098 UART: RITY.KEYID = 7
31,643,009 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,520 UART: [art] PUB.X = F8F3C633A515136985ACBD7F0249B3192F109DBE0B6410DC825869AD49E53D03A750D4280DEAC68CF677EEE1634E12F8
31,651,785 UART: [art] PUB.Y = 934D1B87101D91AA24FA241F4245130C8FC27B4BEAD375E5CC9AD620757961613DA969289674A857AD578C3161D012F0
31,659,028 UART: [art] SIG.R = 7EFE0DA4060B80C3023ED4EEDA6DE128D0F2D10285FE74A9CE7E8FB2DFE8E2DFDFA25D8EE0F3DD832207965AE48DB1C8
31,666,407 UART: [art] SIG.S = 30BA685FCD05B837A093B484B32C31F6E17AA51F1B544E879F78F53AE75C64B939A7D14D0556A5B96B82DE171768FDD6
32,971,569 UART: Caliptra RT
32,972,254 UART: [state] CFI Enabled
33,090,659 UART: [rt] RT listening for mailbox commands...
36,727,118 >>> mbox cmd response: failed
36,729,627 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
36,872,545 UART:
36,872,876 UART: Running Caliptra FMC ...
36,873,945 UART:
36,874,104 UART: [state] CFI Enabled
36,874,940 UART: [art] Extend RT PCRs Done
36,876,079 UART: [art] Lock RT PCRs Done
36,877,152 UART: [art] Populate DV Done
36,878,257 UART: [fht] FMC Alias Private Key: 7
36,879,579 UART: [art] Derive CDI
36,880,312 UART: [art] Store in in slot 0x4
36,881,479 UART: [art] Derive Key Pair
36,882,624 UART: [art] Store priv key in slot 0x5
40,083,225 UART: [art] Derive Key Pair - Done
40,096,389 UART: [art] Signing Cert with AUTHO
40,097,693 UART: RITY.KEYID = 7
42,376,964 UART: [art] Erasing AUTHORITY.KEYID = 7
42,378,479 UART: [art] PUB.X = F8F3C633A515136985ACBD7F0249B3192F109DBE0B6410DC825869AD49E53D03A750D4280DEAC68CF677EEE1634E12F8
42,385,760 UART: [art] PUB.Y = 934D1B87101D91AA24FA241F4245130C8FC27B4BEAD375E5CC9AD620757961613DA969289674A857AD578C3161D012F0
42,392,949 UART: [art] SIG.R = 7EFE0DA4060B80C3023ED4EEDA6DE128D0F2D10285FE74A9CE7E8FB2DFE8E2DFDFA25D8EE0F3DD832207965AE48DB1C8
42,400,347 UART: [art] SIG.S = 30BA685FCD05B837A093B484B32C31F6E17AA51F1B544E879F78F53AE75C64B939A7D14D0556A5B96B82DE171768FDD6
43,705,444 UART: Caliptra RT
43,706,141 UART: [state] CFI Enabled
43,994,207 UART: [rt] RT listening for mailbox commands...
52,501,477 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
192,337 UART:
192,696 UART: Running Caliptra ROM ...
193,882 UART:
194,033 UART: [state] CFI Enabled
260,687 UART: [state] LifecycleState = Unprovisioned
262,605 UART: [state] DebugLocked = No
264,528 UART: [state] WD Timer not started. Device not locked for debugging
269,151 UART: [kat] SHA2-256
448,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,831 UART: [kat] ++
460,374 UART: [kat] sha1
471,008 UART: [kat] SHA2-256
474,021 UART: [kat] SHA2-384
480,177 UART: [kat] SHA2-512-ACC
483,133 UART: [kat] ECC-384
2,947,124 UART: [kat] HMAC-384Kdf
2,969,308 UART: [kat] LMS
3,498,799 UART: [kat] --
3,503,441 UART: [cold-reset] ++
3,504,791 UART: [fht] FHT @ 0x50003400
3,516,747 UART: [idev] ++
3,517,353 UART: [idev] CDI.KEYID = 6
3,518,275 UART: [idev] SUBJECT.KEYID = 7
3,519,444 UART: [idev] UDS.KEYID = 0
3,522,337 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,973 UART: [idev] Erasing UDS.KEYID = 0
6,023,320 UART: [idev] Sha1 KeyId Algorithm
6,046,557 UART: [idev] --
6,049,096 UART: [ldev] ++
6,049,673 UART: [ldev] CDI.KEYID = 6
6,050,585 UART: [ldev] SUBJECT.KEYID = 5
6,051,669 UART: [ldev] AUTHORITY.KEYID = 7
6,053,014 UART: [ldev] FE.KEYID = 1
6,080,723 UART: [ldev] Erasing FE.KEYID = 1
8,578,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,323 UART: [ldev] --
10,373,837 UART: [fwproc] Wait for Commands...
10,375,503 UART: [fwproc] Recv command 0x46574c44
10,377,549 UART: [fwproc] Recv'd Img size: 114168 bytes
13,776,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,847,975 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,916,746 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,234,997 >>> mbox cmd response: success
14,236,818 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,380,354 UART: [afmc] ++
14,380,987 UART: [afmc] CDI.KEYID = 6
14,381,908 UART: [afmc] SUBJECT.KEYID = 7
14,383,013 UART: [afmc] AUTHORITY.KEYID = 5
16,765,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,494,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,496,362 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,512,314 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,528,144 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,543,927 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,565,830 UART: [afmc] --
18,568,892 UART: [cold-reset] --
18,574,052 UART: [state] Locking Datavault
18,581,624 UART: [state] Locking PCR0, PCR1 and PCR31
18,583,295 UART: [state] Locking ICCM
18,585,986 UART: [exit] Launching FMC @ 0x40000130
18,594,388 UART:
18,594,626 UART: Running Caliptra FMC ...
18,595,727 UART:
18,595,887 UART: [state] CFI Enabled
18,652,420 UART: [fht] FMC Alias Private Key: 7
20,416,045 UART: [art] Extend RT PCRs Done
20,417,267 UART: [art] Lock RT PCRs Done
20,418,836 UART: [art] Populate DV Done
20,424,569 UART: [fht] FMC Alias Private Key: 7
20,426,277 UART: [art] Derive CDI
20,427,091 UART: [art] Store in in slot 0x4
20,485,355 UART: [art] Derive Key Pair
20,486,392 UART: [art] Store priv key in slot 0x5
22,949,543 UART: [art] Derive Key Pair - Done
22,962,395 UART: [art] Signing Cert with AUTHO
22,963,706 UART: RITY.KEYID = 7
24,674,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,118 UART: [art] PUB.X = 050DA561ECD5973ED9DE762180CD3B929987C9A3A3B191F6492E4CCF62C5F553CC905AC63805A2C5B2F8E39D213FFD0C
24,683,382 UART: [art] PUB.Y = 0A79DDA2D8612ED97C2FAD93C41C086FB67121784E86B3630D8EE0BDE656374326E82A26B904563A5560BACF061E7BEC
24,690,630 UART: [art] SIG.R = 3F08904DF9157A90DA30EB1A9C47EF04FE264A5C261BD13C6F7781F080E201E0F79D4665B4AC84EDAD34FD7292476694
24,698,038 UART: [art] SIG.S = 1E06EEEBCFA240D61A15708230B6C0229CB8A97442985F34F4171169C41BF1D95C5BBA11754EEB473FA8D1BD18780E0B
25,677,189 UART: Caliptra RT
25,677,879 UART: [state] CFI Enabled
25,842,652 UART: [rt] RT listening for mailbox commands...
25,845,630 UART:
25,845,884 UART: Running Caliptra ROM ...
25,846,992 UART:
25,847,152 UART: [state] CFI Enabled
25,911,695 UART: [state] LifecycleState = Unprovisioned
25,913,565 UART: [state] DebugLocked = No
25,914,969 UART: [state] WD Timer not started. Device not locked for debugging
25,918,710 UART: [kat] SHA2-256
26,097,822 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,109,401 UART: [kat] ++
26,109,943 UART: [kat] sha1
26,120,565 UART: [kat] SHA2-256
26,123,580 UART: [kat] SHA2-384
26,130,047 UART: [kat] SHA2-512-ACC
26,132,997 UART: [kat] ECC-384
28,593,572 UART: [kat] HMAC-384Kdf
28,619,081 UART: [kat] LMS
29,148,548 UART: [kat] --
29,152,532 UART: [update-reset] ++
29,201,380 >>> mbox cmd response: failed
29,203,055 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,346,572 UART: ROM Non-Fatal Error: 0x000B001E
29,348,171 UART: [state] Locking Datavault
29,349,329 UART: [state] Locking PCR0, PCR1 and PCR31
29,350,865 UART: [state] Locking ICCM
29,351,776 UART: [exit] Launching FMC @ 0x40000130
29,353,198 UART:
29,353,355 UART: Running Caliptra FMC ...
29,354,452 UART:
29,354,608 UART: [state] CFI Enabled
29,355,522 UART: [art] Extend RT PCRs Done
29,356,606 UART: [art] Lock RT PCRs Done
29,357,614 UART: [art] Populate DV Done
29,358,578 UART: [fht] FMC Alias Private Key: 7
29,359,888 UART: [art] Derive CDI
29,360,625 UART: [art] Store in in slot 0x4
29,383,885 UART: [art] Derive Key Pair
29,384,887 UART: [art] Store priv key in slot 0x5
31,848,483 UART: [art] Derive Key Pair - Done
31,861,539 UART: [art] Signing Cert with AUTHO
31,862,848 UART: RITY.KEYID = 7
33,573,248 UART: [art] Erasing AUTHORITY.KEYID = 7
33,574,754 UART: [art] PUB.X = 050DA561ECD5973ED9DE762180CD3B929987C9A3A3B191F6492E4CCF62C5F553CC905AC63805A2C5B2F8E39D213FFD0C
33,582,001 UART: [art] PUB.Y = 0A79DDA2D8612ED97C2FAD93C41C086FB67121784E86B3630D8EE0BDE656374326E82A26B904563A5560BACF061E7BEC
33,589,246 UART: [art] SIG.R = 3F08904DF9157A90DA30EB1A9C47EF04FE264A5C261BD13C6F7781F080E201E0F79D4665B4AC84EDAD34FD7292476694
33,596,669 UART: [art] SIG.S = 1E06EEEBCFA240D61A15708230B6C0229CB8A97442985F34F4171169C41BF1D95C5BBA11754EEB473FA8D1BD18780E0B
34,575,675 UART: Caliptra RT
34,576,378 UART: [state] CFI Enabled
34,915,936 UART: [rt] RT listening for mailbox commands...
34,918,624 UART:
34,918,873 UART: Running Caliptra ROM ...
34,919,978 UART:
34,920,134 UART: [state] CFI Enabled
34,983,167 UART: [state] LifecycleState = Unprovisioned
34,985,054 UART: [state] DebugLocked = No
34,986,172 UART: [state] WD Timer not started. Device not locked for debugging
34,989,543 UART: [kat] SHA2-256
35,168,654 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
35,180,229 UART: [kat] ++
35,180,685 UART: [kat] sha1
35,191,783 UART: [kat] SHA2-256
35,194,840 UART: [kat] SHA2-384
35,200,293 UART: [kat] SHA2-512-ACC
35,203,238 UART: [kat] ECC-384
37,663,697 UART: [kat] HMAC-384Kdf
37,687,044 UART: [kat] LMS
38,216,483 UART: [kat] --
38,219,553 UART: [update-reset] ++
41,643,351 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,646,621 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
42,028,980 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,361,188 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,059,187 >>> mbox cmd response: success
14,061,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,345,174 UART:
18,345,581 UART: Running Caliptra FMC ...
18,346,676 UART:
18,346,826 UART: [state] CFI Enabled
18,411,256 UART: [fht] FMC Alias Private Key: 7
20,174,935 UART: [art] Extend RT PCRs Done
20,176,158 UART: [art] Lock RT PCRs Done
20,177,862 UART: [art] Populate DV Done
20,183,372 UART: [fht] FMC Alias Private Key: 7
20,184,911 UART: [art] Derive CDI
20,185,645 UART: [art] Store in in slot 0x4
20,244,139 UART: [art] Derive Key Pair
20,245,194 UART: [art] Store priv key in slot 0x5
22,708,444 UART: [art] Derive Key Pair - Done
22,721,123 UART: [art] Signing Cert with AUTHO
22,722,442 UART: RITY.KEYID = 7
24,434,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,629 UART: [art] PUB.X = 14C56471FCC4E328002D511880AC0C9127DF744B3BC676D937C9CB5E4E3527861805EF8A4070CC99C8F00E27EEF651BF
24,442,936 UART: [art] PUB.Y = 3746F71C37BE6EED141AA592204126B87773065F7B395347CB017D4819C6233F3D00823E72C7FED2B9C1061F043EC293
24,450,109 UART: [art] SIG.R = 9090C45254634FBE3195D6A4948C3BC61943B4645B513DAD57F4627A90AF44A7A4DE29AE7D52541CC37D5B680BDC34A5
24,457,543 UART: [art] SIG.S = AB92BE81243FD8512CBCD9D9566931FE432CC98B41EDCE28773E8093B9F4DD4950189D71AADCD732B094D3A9B9EEF692
25,436,695 UART: Caliptra RT
25,437,387 UART: [state] CFI Enabled
25,602,252 UART: [rt] RT listening for mailbox commands...
28,820,577 >>> mbox cmd response: failed
28,822,750 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,966,438 UART:
28,966,751 UART: Running Caliptra FMC ...
28,967,897 UART:
28,968,065 UART: [state] CFI Enabled
28,968,995 UART: [art] Extend RT PCRs Done
28,970,139 UART: [art] Lock RT PCRs Done
28,971,206 UART: [art] Populate DV Done
28,972,268 UART: [fht] FMC Alias Private Key: 7
28,973,589 UART: [art] Derive CDI
28,974,325 UART: [art] Store in in slot 0x4
28,990,081 UART: [art] Derive Key Pair
28,991,083 UART: [art] Store priv key in slot 0x5
31,453,603 UART: [art] Derive Key Pair - Done
31,466,440 UART: [art] Signing Cert with AUTHO
31,467,750 UART: RITY.KEYID = 7
33,179,285 UART: [art] Erasing AUTHORITY.KEYID = 7
33,180,793 UART: [art] PUB.X = 14C56471FCC4E328002D511880AC0C9127DF744B3BC676D937C9CB5E4E3527861805EF8A4070CC99C8F00E27EEF651BF
33,188,034 UART: [art] PUB.Y = 3746F71C37BE6EED141AA592204126B87773065F7B395347CB017D4819C6233F3D00823E72C7FED2B9C1061F043EC293
33,195,218 UART: [art] SIG.R = 9090C45254634FBE3195D6A4948C3BC61943B4645B513DAD57F4627A90AF44A7A4DE29AE7D52541CC37D5B680BDC34A5
33,202,660 UART: [art] SIG.S = AB92BE81243FD8512CBCD9D9566931FE432CC98B41EDCE28773E8093B9F4DD4950189D71AADCD732B094D3A9B9EEF692
34,181,113 UART: Caliptra RT
34,181,820 UART: [state] CFI Enabled
34,519,516 UART: [rt] RT listening for mailbox commands...
41,483,159 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,520 UART:
192,898 UART: Running Caliptra ROM ...
193,996 UART:
603,414 UART: [state] CFI Enabled
616,493 UART: [state] LifecycleState = Unprovisioned
618,363 UART: [state] DebugLocked = No
619,984 UART: [state] WD Timer not started. Device not locked for debugging
623,959 UART: [kat] SHA2-256
803,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,675 UART: [kat] ++
815,131 UART: [kat] sha1
826,388 UART: [kat] SHA2-256
829,414 UART: [kat] SHA2-384
834,586 UART: [kat] SHA2-512-ACC
837,522 UART: [kat] ECC-384
3,279,999 UART: [kat] HMAC-384Kdf
3,293,110 UART: [kat] LMS
3,822,645 UART: [kat] --
3,827,998 UART: [cold-reset] ++
3,828,908 UART: [fht] FHT @ 0x50003400
3,839,547 UART: [idev] ++
3,840,152 UART: [idev] CDI.KEYID = 6
3,841,039 UART: [idev] SUBJECT.KEYID = 7
3,842,262 UART: [idev] UDS.KEYID = 0
3,845,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,667 UART: [idev] Erasing UDS.KEYID = 0
6,314,769 UART: [idev] Sha1 KeyId Algorithm
6,336,653 UART: [idev] --
6,340,866 UART: [ldev] ++
6,341,438 UART: [ldev] CDI.KEYID = 6
6,342,321 UART: [ldev] SUBJECT.KEYID = 5
6,343,533 UART: [ldev] AUTHORITY.KEYID = 7
6,344,767 UART: [ldev] FE.KEYID = 1
6,356,682 UART: [ldev] Erasing FE.KEYID = 1
8,830,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,842 UART: [ldev] --
10,620,150 UART: [fwproc] Wait for Commands...
10,622,298 UART: [fwproc] Recv command 0x46574c44
10,624,389 UART: [fwproc] Recv'd Img size: 114168 bytes
14,025,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,095,591 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,164,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,481,493 >>> mbox cmd response: success
14,483,200 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,626,414 UART: [afmc] ++
14,627,049 UART: [afmc] CDI.KEYID = 6
14,627,946 UART: [afmc] SUBJECT.KEYID = 7
14,629,000 UART: [afmc] AUTHORITY.KEYID = 5
16,987,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,711,064 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,727,010 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,742,864 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,758,628 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,780,985 UART: [afmc] --
18,785,221 UART: [cold-reset] --
18,789,889 UART: [state] Locking Datavault
18,795,311 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,982 UART: [state] Locking ICCM
18,799,297 UART: [exit] Launching FMC @ 0x40000130
18,807,702 UART:
18,807,942 UART: Running Caliptra FMC ...
18,809,042 UART:
18,809,202 UART: [state] CFI Enabled
18,817,412 UART: [fht] FMC Alias Private Key: 7
20,573,957 UART: [art] Extend RT PCRs Done
20,575,170 UART: [art] Lock RT PCRs Done
20,576,677 UART: [art] Populate DV Done
20,582,238 UART: [fht] FMC Alias Private Key: 7
20,583,888 UART: [art] Derive CDI
20,584,706 UART: [art] Store in in slot 0x4
20,627,459 UART: [art] Derive Key Pair
20,628,457 UART: [art] Store priv key in slot 0x5
23,054,607 UART: [art] Derive Key Pair - Done
23,067,664 UART: [art] Signing Cert with AUTHO
23,068,965 UART: RITY.KEYID = 7
24,774,050 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,557 UART: [art] PUB.X = C9CD1BACC38049E5914E7CABECEAABA38910024E4260E9768F25BF9AF255247D7ABD3AA971169E003B8A389064CA1F6E
24,782,778 UART: [art] PUB.Y = 61289D68AB0B78C1AFB48AF5DB42D70966DC0813BBBF9E213DA93CE510E38BD19548CC58CCD1DB70F165FE55C2DF70EC
24,790,105 UART: [art] SIG.R = 0816538EA3CA6F7B7F94BC31ABA2F5A2C5BD81857A38205FD3A0F343EB33E475F16318F5B77413227C6A1A7E28AC412A
24,797,516 UART: [art] SIG.S = 2984E61ED1649D174E6EC6A658F13BEB12DE115D146E20C7E70A0C89A8F13F733040D0354A3971ED84BBA87177E23446
25,777,242 UART: Caliptra RT
25,777,957 UART: [state] CFI Enabled
25,895,127 UART: [rt] RT listening for mailbox commands...
25,897,936 UART:
25,898,199 UART: Running Caliptra ROM ...
25,899,228 UART:
25,899,486 UART: [state] CFI Enabled
25,911,702 UART: [state] LifecycleState = Unprovisioned
25,913,574 UART: [state] DebugLocked = No
25,915,524 UART: [state] WD Timer not started. Device not locked for debugging
25,919,314 UART: [kat] SHA2-256
26,098,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
26,110,067 UART: [kat] ++
26,110,614 UART: [kat] sha1
26,120,966 UART: [kat] SHA2-256
26,124,031 UART: [kat] SHA2-384
26,130,173 UART: [kat] SHA2-512-ACC
26,133,114 UART: [kat] ECC-384
28,574,213 UART: [kat] HMAC-384Kdf
28,586,562 UART: [kat] LMS
29,116,035 UART: [kat] --
29,121,825 UART: [update-reset] ++
29,166,153 >>> mbox cmd response: failed
29,168,032 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,311,853 UART: ROM Non-Fatal Error: 0x000B001E
29,313,308 UART: [state] Locking Datavault
29,314,392 UART: [state] Locking PCR0, PCR1 and PCR31
29,315,929 UART: [state] Locking ICCM
29,316,808 UART: [exit] Launching FMC @ 0x40000130
29,318,149 UART:
29,318,296 UART: Running Caliptra FMC ...
29,319,396 UART:
29,319,551 UART: [state] CFI Enabled
29,320,382 UART: [art] Extend RT PCRs Done
29,321,434 UART: [art] Lock RT PCRs Done
29,322,430 UART: [art] Populate DV Done
29,323,405 UART: [fht] FMC Alias Private Key: 7
29,324,726 UART: [art] Derive CDI
29,325,488 UART: [art] Store in in slot 0x4
29,326,659 UART: [art] Derive Key Pair
29,327,614 UART: [art] Store priv key in slot 0x5
31,712,387 UART: [art] Derive Key Pair - Done
31,725,293 UART: [art] Signing Cert with AUTHO
31,726,597 UART: RITY.KEYID = 7
33,432,087 UART: [art] Erasing AUTHORITY.KEYID = 7
33,433,601 UART: [art] PUB.X = C9CD1BACC38049E5914E7CABECEAABA38910024E4260E9768F25BF9AF255247D7ABD3AA971169E003B8A389064CA1F6E
33,440,841 UART: [art] PUB.Y = 61289D68AB0B78C1AFB48AF5DB42D70966DC0813BBBF9E213DA93CE510E38BD19548CC58CCD1DB70F165FE55C2DF70EC
33,448,144 UART: [art] SIG.R = 0816538EA3CA6F7B7F94BC31ABA2F5A2C5BD81857A38205FD3A0F343EB33E475F16318F5B77413227C6A1A7E28AC412A
33,455,531 UART: [art] SIG.S = 2984E61ED1649D174E6EC6A658F13BEB12DE115D146E20C7E70A0C89A8F13F733040D0354A3971ED84BBA87177E23446
34,434,773 UART: Caliptra RT
34,435,476 UART: [state] CFI Enabled
34,722,696 UART: [rt] RT listening for mailbox commands...
34,725,596 UART:
34,725,844 UART: Running Caliptra ROM ...
34,726,949 UART:
34,727,105 UART: [state] CFI Enabled
40,310,225 UART: [state] LifecycleState = Unprovisioned
40,312,510 UART: [state] DebugLocked = No
40,314,449 UART: [state] WD Timer not started. Device not locked for debugging
40,318,895 UART: [kat] SHA2-256
40,498,106 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,509,676 UART: [kat] ++
40,510,218 UART: [kat] sha1
40,520,465 UART: [kat] SHA2-256
40,523,483 UART: [kat] SHA2-384
40,529,033 UART: [kat] SHA2-512-ACC
40,531,974 UART: [kat] ECC-384
42,975,949 UART: [kat] HMAC-384Kdf
42,987,310 UART: [kat] LMS
43,516,847 UART: [kat] --
43,520,464 UART: [update-reset] ++
46,949,220 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,951,756 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
47,334,056 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,701,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,280,772 >>> mbox cmd response: success
14,282,829 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
18,525,683 UART:
18,526,156 UART: Running Caliptra FMC ...
18,527,269 UART:
18,527,431 UART: [state] CFI Enabled
18,535,691 UART: [fht] FMC Alias Private Key: 7
20,292,908 UART: [art] Extend RT PCRs Done
20,294,141 UART: [art] Lock RT PCRs Done
20,295,855 UART: [art] Populate DV Done
20,301,248 UART: [fht] FMC Alias Private Key: 7
20,302,946 UART: [art] Derive CDI
20,303,761 UART: [art] Store in in slot 0x4
20,346,565 UART: [art] Derive Key Pair
20,347,602 UART: [art] Store priv key in slot 0x5
22,774,479 UART: [art] Derive Key Pair - Done
22,787,536 UART: [art] Signing Cert with AUTHO
22,788,846 UART: RITY.KEYID = 7
24,494,721 UART: [art] Erasing AUTHORITY.KEYID = 7
24,496,233 UART: [art] PUB.X = 20E88E72F3A138A1CE33007780B7DBB262330ED9FCDA8FA3C57F8D211BF79D4A71F5E8EF1F5E57B44821AA48C0703212
24,503,537 UART: [art] PUB.Y = 1D0179448C5AEBC9BF65667CD5AFB46C772D180054E49DCAEB3F5388E9B25C664D5495C560882F917B542030BF59DC76
24,510,742 UART: [art] SIG.R = 8BB9A08F94CE420B74A5D737908CAD759B7911F6E37F611D150370DE94821F6198535073EFB78B438ED131E56CD46CDC
24,518,130 UART: [art] SIG.S = C4C66A40C8C9CB99233702E8ADA3D4AD59B5DC618B959E3CB22F8755591DB0521403CFEAA1B2A98C68C7BA06E6EEE26C
25,496,976 UART: Caliptra RT
25,497,701 UART: [state] CFI Enabled
25,614,973 UART: [rt] RT listening for mailbox commands...
28,747,071 >>> mbox cmd response: failed
28,749,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,892,948 UART:
28,893,276 UART: Running Caliptra FMC ...
28,894,343 UART:
28,894,502 UART: [state] CFI Enabled
28,895,365 UART: [art] Extend RT PCRs Done
28,896,508 UART: [art] Lock RT PCRs Done
28,897,579 UART: [art] Populate DV Done
28,898,586 UART: [fht] FMC Alias Private Key: 7
28,899,902 UART: [art] Derive CDI
28,900,643 UART: [art] Store in in slot 0x4
28,901,811 UART: [art] Derive Key Pair
28,902,747 UART: [art] Store priv key in slot 0x5
31,287,608 UART: [art] Derive Key Pair - Done
31,300,477 UART: [art] Signing Cert with AUTHO
31,301,790 UART: RITY.KEYID = 7
33,007,689 UART: [art] Erasing AUTHORITY.KEYID = 7
33,009,183 UART: [art] PUB.X = 20E88E72F3A138A1CE33007780B7DBB262330ED9FCDA8FA3C57F8D211BF79D4A71F5E8EF1F5E57B44821AA48C0703212
33,016,489 UART: [art] PUB.Y = 1D0179448C5AEBC9BF65667CD5AFB46C772D180054E49DCAEB3F5388E9B25C664D5495C560882F917B542030BF59DC76
33,023,736 UART: [art] SIG.R = 8BB9A08F94CE420B74A5D737908CAD759B7911F6E37F611D150370DE94821F6198535073EFB78B438ED131E56CD46CDC
33,031,128 UART: [art] SIG.S = C4C66A40C8C9CB99233702E8ADA3D4AD59B5DC618B959E3CB22F8755591DB0521403CFEAA1B2A98C68C7BA06E6EEE26C
34,010,257 UART: Caliptra RT
34,010,969 UART: [state] CFI Enabled
34,301,137 UART: [rt] RT listening for mailbox commands...
47,205,376 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,101 UART:
192,471 UART: Running Caliptra ROM ...
193,668 UART:
193,820 UART: [state] CFI Enabled
258,595 UART: [state] LifecycleState = Unprovisioned
260,670 UART: [state] DebugLocked = No
262,217 UART: [state] WD Timer not started. Device not locked for debugging
266,212 UART: [kat] SHA2-256
456,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,865 UART: [kat] ++
467,324 UART: [kat] sha1
478,801 UART: [kat] SHA2-256
481,811 UART: [kat] SHA2-384
488,063 UART: [kat] SHA2-512-ACC
490,681 UART: [kat] ECC-384
2,943,506 UART: [kat] HMAC-384Kdf
2,967,086 UART: [kat] LMS
3,498,858 UART: [kat] --
3,503,283 UART: [cold-reset] ++
3,504,734 UART: [fht] FHT @ 0x50003400
3,516,075 UART: [idev] ++
3,516,769 UART: [idev] CDI.KEYID = 6
3,517,654 UART: [idev] SUBJECT.KEYID = 7
3,518,921 UART: [idev] UDS.KEYID = 0
3,521,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,299 UART: [idev] Erasing UDS.KEYID = 0
6,021,641 UART: [idev] Sha1 KeyId Algorithm
6,042,834 UART: [idev] --
6,047,640 UART: [ldev] ++
6,048,214 UART: [ldev] CDI.KEYID = 6
6,049,127 UART: [ldev] SUBJECT.KEYID = 5
6,050,294 UART: [ldev] AUTHORITY.KEYID = 7
6,051,531 UART: [ldev] FE.KEYID = 1
6,095,749 UART: [ldev] Erasing FE.KEYID = 1
8,601,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,299 UART: [ldev] --
10,411,952 UART: [fwproc] Wait for Commands...
10,414,595 UART: [fwproc] Recv command 0x46574c44
10,416,913 UART: [fwproc] Recv'd Img size: 114168 bytes
13,860,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,941,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,057,904 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,599,227 >>> mbox cmd response: success
14,601,539 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,745,263 UART: [afmc] ++
14,745,924 UART: [afmc] CDI.KEYID = 6
14,746,856 UART: [afmc] SUBJECT.KEYID = 7
14,747,965 UART: [afmc] AUTHORITY.KEYID = 5
17,149,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,893,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,895,163 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
18,910,337 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
18,925,459 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
18,940,273 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
18,964,924 UART: [afmc] --
18,968,211 UART: [cold-reset] --
18,971,596 UART: [state] Locking Datavault
18,976,956 UART: [state] Locking PCR0, PCR1 and PCR31
18,979,205 UART: [state] Locking ICCM
18,981,585 UART: [exit] Launching FMC @ 0x40000130
18,990,261 UART:
18,990,515 UART: Running Caliptra FMC ...
18,991,618 UART:
18,991,779 UART: [state] CFI Enabled
19,050,831 UART: [fht] FMC Alias Private Key: 7
20,814,217 UART: [art] Extend RT PCRs Done
20,815,433 UART: [art] Lock RT PCRs Done
20,816,896 UART: [art] Populate DV Done
20,822,415 UART: [fht] FMC Alias Private Key: 7
20,824,116 UART: [art] Derive CDI
20,824,938 UART: [art] Store in in slot 0x4
20,883,005 UART: [art] Derive Key Pair
20,884,055 UART: [art] Store priv key in slot 0x5
23,347,287 UART: [art] Derive Key Pair - Done
23,360,017 UART: [art] Signing Cert with AUTHO
23,361,323 UART: RITY.KEYID = 7
25,073,403 UART: [art] Erasing AUTHORITY.KEYID = 7
25,074,932 UART: [art] PUB.X = C2932787375FA72D5F39BAA4E5ECD81ED7CBD7CB468F35172ECB5FB6F8F9F729E34CD623A977D11A8674257F1BCB36A5
25,082,180 UART: [art] PUB.Y = 30274EA039C4822E4E5F0C4455B1A2BE02807206153548F4B5EB7C3545485C6E43A1F64ED544DC492743794A16D230E1
25,089,444 UART: [art] SIG.R = DD8E230500DD3425A547A12B67D6F9B863C75B0B34A532C672514083B293A8CAD745156D3A7A229AC88D931F357E5900
25,096,787 UART: [art] SIG.S = 7CEE6FD7026F47F570298B10BF7C4FE31A6BD620D1C9145234E147DDAA7ADBECCF5577825C974550AB7120DBFC3FD23A
26,076,005 UART: Caliptra RT
26,076,702 UART: [state] CFI Enabled
26,242,743 UART: [rt] RT listening for mailbox commands...
26,245,548 UART:
26,245,795 UART: Running Caliptra ROM ...
26,246,902 UART:
26,247,061 UART: [state] CFI Enabled
26,310,132 UART: [state] LifecycleState = Unprovisioned
26,312,221 UART: [state] DebugLocked = No
26,313,821 UART: [state] WD Timer not started. Device not locked for debugging
26,318,657 UART: [kat] SHA2-256
26,508,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,519,296 UART: [kat] ++
26,519,781 UART: [kat] sha1
26,530,889 UART: [kat] SHA2-256
26,533,910 UART: [kat] SHA2-384
26,539,847 UART: [kat] SHA2-512-ACC
26,542,415 UART: [kat] ECC-384
28,995,702 UART: [kat] HMAC-384Kdf
29,019,272 UART: [kat] LMS
29,550,829 UART: [kat] --
29,553,973 UART: [update-reset] ++
29,612,014 >>> mbox cmd response: failed
29,613,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,757,291 UART: ROM Non-Fatal Error: 0x000B001E
29,758,716 UART: [state] Locking Datavault
29,759,793 UART: [state] Locking PCR0, PCR1 and PCR31
29,761,330 UART: [state] Locking ICCM
29,762,230 UART: [exit] Launching FMC @ 0x40000130
29,763,572 UART:
29,763,719 UART: Running Caliptra FMC ...
29,764,822 UART:
29,764,980 UART: [state] CFI Enabled
29,765,840 UART: [art] Extend RT PCRs Done
29,766,977 UART: [art] Lock RT PCRs Done
29,768,041 UART: [art] Populate DV Done
29,769,019 UART: [fht] FMC Alias Private Key: 7
29,770,333 UART: [art] Derive CDI
29,771,071 UART: [art] Store in in slot 0x4
29,804,160 UART: [art] Derive Key Pair
29,805,159 UART: [art] Store priv key in slot 0x5
32,268,190 UART: [art] Derive Key Pair - Done
32,281,199 UART: [art] Signing Cert with AUTHO
32,282,513 UART: RITY.KEYID = 7
33,994,131 UART: [art] Erasing AUTHORITY.KEYID = 7
33,995,640 UART: [art] PUB.X = C2932787375FA72D5F39BAA4E5ECD81ED7CBD7CB468F35172ECB5FB6F8F9F729E34CD623A977D11A8674257F1BCB36A5
34,002,941 UART: [art] PUB.Y = 30274EA039C4822E4E5F0C4455B1A2BE02807206153548F4B5EB7C3545485C6E43A1F64ED544DC492743794A16D230E1
34,010,141 UART: [art] SIG.R = DD8E230500DD3425A547A12B67D6F9B863C75B0B34A532C672514083B293A8CAD745156D3A7A229AC88D931F357E5900
34,017,486 UART: [art] SIG.S = 7CEE6FD7026F47F570298B10BF7C4FE31A6BD620D1C9145234E147DDAA7ADBECCF5577825C974550AB7120DBFC3FD23A
34,996,509 UART: Caliptra RT
34,997,203 UART: [state] CFI Enabled
35,332,068 UART: [rt] RT listening for mailbox commands...
35,334,831 UART:
35,335,082 UART: Running Caliptra ROM ...
35,336,190 UART:
35,336,346 UART: [state] CFI Enabled
35,401,173 UART: [state] LifecycleState = Unprovisioned
35,403,266 UART: [state] DebugLocked = No
35,405,624 UART: [state] WD Timer not started. Device not locked for debugging
35,409,647 UART: [kat] SHA2-256
35,599,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,610,263 UART: [kat] ++
35,610,812 UART: [kat] sha1
35,623,275 UART: [kat] SHA2-256
35,626,235 UART: [kat] SHA2-384
35,631,357 UART: [kat] SHA2-512-ACC
35,633,984 UART: [kat] ECC-384
38,085,790 UART: [kat] HMAC-384Kdf
38,106,440 UART: [kat] LMS
38,638,007 UART: [kat] --
38,641,633 UART: [update-reset] ++
42,093,154 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
42,097,339 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
42,703,911 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,439,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,720,982 >>> mbox cmd response: success
14,722,907 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,005,779 UART:
19,006,268 UART: Running Caliptra FMC ...
19,007,391 UART:
19,007,555 UART: [state] CFI Enabled
19,073,419 UART: [fht] FMC Alias Private Key: 7
20,836,924 UART: [art] Extend RT PCRs Done
20,838,155 UART: [art] Lock RT PCRs Done
20,839,674 UART: [art] Populate DV Done
20,844,985 UART: [fht] FMC Alias Private Key: 7
20,846,620 UART: [art] Derive CDI
20,847,443 UART: [art] Store in in slot 0x4
20,907,128 UART: [art] Derive Key Pair
20,908,132 UART: [art] Store priv key in slot 0x5
23,370,793 UART: [art] Derive Key Pair - Done
23,383,690 UART: [art] Signing Cert with AUTHO
23,384,991 UART: RITY.KEYID = 7
25,097,079 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,580 UART: [art] PUB.X = 8B063DC0EB15BB8E1FF9F5D434A986E5720D8058B0EA96B0ABDC766352A950E1E82BEFA8443157E4C86ABD8EA4EC2F2D
25,105,888 UART: [art] PUB.Y = 5F0E4A3287503365E8BB655E1537E08313F44AE7B3540BEFECE07C5A973DDEE594375BE51B35B8B5024BFCE7409F01C6
25,113,133 UART: [art] SIG.R = F06054D0B688F7C2D42313775A1CEEBC5BAB4940324E7AC7CCEB9CA2BC9616795078C1D94BE98052B6DC445656D9E0BE
25,120,570 UART: [art] SIG.S = 43B25C81CDDDEE5668A5652A6EBE54F3D1022760D8254F39F2BA93D9B4A0C98DE97AA7EE9BB20C84CBEDCA370BF2C074
26,100,067 UART: Caliptra RT
26,100,797 UART: [state] CFI Enabled
26,265,737 UART: [rt] RT listening for mailbox commands...
29,543,059 >>> mbox cmd response: failed
29,545,490 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,689,537 UART:
29,689,893 UART: Running Caliptra FMC ...
29,691,027 UART:
29,691,201 UART: [state] CFI Enabled
29,692,131 UART: [art] Extend RT PCRs Done
29,693,271 UART: [art] Lock RT PCRs Done
29,694,336 UART: [art] Populate DV Done
29,695,409 UART: [fht] FMC Alias Private Key: 7
29,696,728 UART: [art] Derive CDI
29,697,462 UART: [art] Store in in slot 0x4
29,718,507 UART: [art] Derive Key Pair
29,719,506 UART: [art] Store priv key in slot 0x5
32,181,792 UART: [art] Derive Key Pair - Done
32,194,845 UART: [art] Signing Cert with AUTHO
32,196,155 UART: RITY.KEYID = 7
33,908,035 UART: [art] Erasing AUTHORITY.KEYID = 7
33,909,547 UART: [art] PUB.X = 8B063DC0EB15BB8E1FF9F5D434A986E5720D8058B0EA96B0ABDC766352A950E1E82BEFA8443157E4C86ABD8EA4EC2F2D
33,916,850 UART: [art] PUB.Y = 5F0E4A3287503365E8BB655E1537E08313F44AE7B3540BEFECE07C5A973DDEE594375BE51B35B8B5024BFCE7409F01C6
33,924,138 UART: [art] SIG.R = F06054D0B688F7C2D42313775A1CEEBC5BAB4940324E7AC7CCEB9CA2BC9616795078C1D94BE98052B6DC445656D9E0BE
33,931,540 UART: [art] SIG.S = 43B25C81CDDDEE5668A5652A6EBE54F3D1022760D8254F39F2BA93D9B4A0C98DE97AA7EE9BB20C84CBEDCA370BF2C074
34,910,729 UART: Caliptra RT
34,911,419 UART: [state] CFI Enabled
35,246,388 UART: [rt] RT listening for mailbox commands...
42,917,181 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,480 UART:
192,864 UART: Running Caliptra ROM ...
193,976 UART:
603,618 UART: [state] CFI Enabled
618,703 UART: [state] LifecycleState = Unprovisioned
621,064 UART: [state] DebugLocked = No
622,504 UART: [state] WD Timer not started. Device not locked for debugging
626,888 UART: [kat] SHA2-256
816,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,521 UART: [kat] ++
828,171 UART: [kat] sha1
839,919 UART: [kat] SHA2-256
842,948 UART: [kat] SHA2-384
848,359 UART: [kat] SHA2-512-ACC
850,921 UART: [kat] ECC-384
3,290,445 UART: [kat] HMAC-384Kdf
3,302,897 UART: [kat] LMS
3,834,732 UART: [kat] --
3,840,027 UART: [cold-reset] ++
3,841,420 UART: [fht] FHT @ 0x50003400
3,852,253 UART: [idev] ++
3,852,981 UART: [idev] CDI.KEYID = 6
3,853,891 UART: [idev] SUBJECT.KEYID = 7
3,855,116 UART: [idev] UDS.KEYID = 0
3,857,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,001,309 UART: [idev] Erasing UDS.KEYID = 0
6,329,531 UART: [idev] Sha1 KeyId Algorithm
6,351,661 UART: [idev] --
6,356,175 UART: [ldev] ++
6,356,940 UART: [ldev] CDI.KEYID = 6
6,357,908 UART: [ldev] SUBJECT.KEYID = 5
6,359,013 UART: [ldev] AUTHORITY.KEYID = 7
6,360,192 UART: [ldev] FE.KEYID = 1
6,371,272 UART: [ldev] Erasing FE.KEYID = 1
8,848,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,905 UART: [ldev] --
10,640,802 UART: [fwproc] Wait for Commands...
10,642,807 UART: [fwproc] Recv command 0x46574c44
10,645,078 UART: [fwproc] Recv'd Img size: 114168 bytes
14,086,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,160,893 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,277,036 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,819,327 >>> mbox cmd response: success
14,821,283 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,964,750 UART: [afmc] ++
14,965,391 UART: [afmc] CDI.KEYID = 6
14,966,316 UART: [afmc] SUBJECT.KEYID = 7
14,967,427 UART: [afmc] AUTHORITY.KEYID = 5
17,329,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,052,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,054,014 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
19,069,191 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
19,084,292 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
19,099,134 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
19,123,546 UART: [afmc] --
19,127,526 UART: [cold-reset] --
19,132,096 UART: [state] Locking Datavault
19,136,830 UART: [state] Locking PCR0, PCR1 and PCR31
19,138,970 UART: [state] Locking ICCM
19,141,882 UART: [exit] Launching FMC @ 0x40000130
19,150,540 UART:
19,150,812 UART: Running Caliptra FMC ...
19,151,874 UART:
19,152,037 UART: [state] CFI Enabled
19,160,089 UART: [fht] FMC Alias Private Key: 7
20,917,062 UART: [art] Extend RT PCRs Done
20,918,274 UART: [art] Lock RT PCRs Done
20,920,007 UART: [art] Populate DV Done
20,925,313 UART: [fht] FMC Alias Private Key: 7
20,926,964 UART: [art] Derive CDI
20,927,724 UART: [art] Store in in slot 0x4
20,970,316 UART: [art] Derive Key Pair
20,971,319 UART: [art] Store priv key in slot 0x5
23,398,380 UART: [art] Derive Key Pair - Done
23,411,425 UART: [art] Signing Cert with AUTHO
23,412,725 UART: RITY.KEYID = 7
25,118,107 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,609 UART: [art] PUB.X = 664F35D03CCE8FC7872CD0468FF85DA096F94E6FF07E8210F4789CA4CC62DF3F1A8EC6FF3D6A29787B3FF5A3A1D04340
25,126,921 UART: [art] PUB.Y = 43444D425043BAE6296EA2247ADD2BFEE0BA5F6C890AB467D1A5229289CF509B6068F6D9D7360BD6D0B604ED683D124C
25,134,171 UART: [art] SIG.R = C458FB88F9D785D869FD4DB8DF0B352F680D73BDF35BC872A9C67A995C24AFCA95971C86A1414A4B54BC245C9E5556DC
25,141,609 UART: [art] SIG.S = 704A6B5C438A8A3BD91628722233F2C19AB43934B79C23D5642BC9B99F6EE2E2CE01A8D7559220D69C36FD4F1CC74236
26,120,427 UART: Caliptra RT
26,121,135 UART: [state] CFI Enabled
26,238,359 UART: [rt] RT listening for mailbox commands...
26,241,253 UART:
26,241,506 UART: Running Caliptra ROM ...
26,242,533 UART:
26,242,901 UART: [state] CFI Enabled
26,254,745 UART: [state] LifecycleState = Unprovisioned
26,256,602 UART: [state] DebugLocked = No
26,259,145 UART: [state] WD Timer not started. Device not locked for debugging
26,263,759 UART: [kat] SHA2-256
26,453,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,464,383 UART: [kat] ++
26,464,902 UART: [kat] sha1
26,476,222 UART: [kat] SHA2-256
26,479,235 UART: [kat] SHA2-384
26,483,872 UART: [kat] SHA2-512-ACC
26,486,446 UART: [kat] ECC-384
28,931,682 UART: [kat] HMAC-384Kdf
28,945,255 UART: [kat] LMS
29,476,879 UART: [kat] --
29,480,504 UART: [update-reset] ++
29,537,845 >>> mbox cmd response: failed
29,539,429 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,682,841 UART: ROM Non-Fatal Error: 0x000B001E
29,684,271 UART: [state] Locking Datavault
29,685,424 UART: [state] Locking PCR0, PCR1 and PCR31
29,686,958 UART: [state] Locking ICCM
29,687,865 UART: [exit] Launching FMC @ 0x40000130
29,689,292 UART:
29,689,449 UART: Running Caliptra FMC ...
29,690,548 UART:
29,690,704 UART: [state] CFI Enabled
29,691,623 UART: [art] Extend RT PCRs Done
29,692,756 UART: [art] Lock RT PCRs Done
29,693,820 UART: [art] Populate DV Done
29,694,850 UART: [fht] FMC Alias Private Key: 7
29,696,167 UART: [art] Derive CDI
29,696,901 UART: [art] Store in in slot 0x4
29,698,071 UART: [art] Derive Key Pair
29,699,088 UART: [art] Store priv key in slot 0x5
32,086,451 UART: [art] Derive Key Pair - Done
32,099,562 UART: [art] Signing Cert with AUTHO
32,100,868 UART: RITY.KEYID = 7
33,806,134 UART: [art] Erasing AUTHORITY.KEYID = 7
33,807,642 UART: [art] PUB.X = 664F35D03CCE8FC7872CD0468FF85DA096F94E6FF07E8210F4789CA4CC62DF3F1A8EC6FF3D6A29787B3FF5A3A1D04340
33,814,942 UART: [art] PUB.Y = 43444D425043BAE6296EA2247ADD2BFEE0BA5F6C890AB467D1A5229289CF509B6068F6D9D7360BD6D0B604ED683D124C
33,822,193 UART: [art] SIG.R = C458FB88F9D785D869FD4DB8DF0B352F680D73BDF35BC872A9C67A995C24AFCA95971C86A1414A4B54BC245C9E5556DC
33,829,621 UART: [art] SIG.S = 704A6B5C438A8A3BD91628722233F2C19AB43934B79C23D5642BC9B99F6EE2E2CE01A8D7559220D69C36FD4F1CC74236
34,808,344 UART: Caliptra RT
34,809,036 UART: [state] CFI Enabled
35,099,406 UART: [rt] RT listening for mailbox commands...
35,101,936 UART:
35,102,099 UART: Running Caliptra ROM ...
35,103,148 UART:
35,103,567 UART: [state] CFI Enabled
40,327,250 UART: [state] LifecycleState = Unprovisioned
40,329,184 UART: [state] DebugLocked = No
40,331,634 UART: [state] WD Timer not started. Device not locked for debugging
40,335,562 UART: [kat] SHA2-256
40,525,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,536,204 UART: [kat] ++
40,536,721 UART: [kat] sha1
40,547,716 UART: [kat] SHA2-256
40,550,677 UART: [kat] SHA2-384
40,556,827 UART: [kat] SHA2-512-ACC
40,559,455 UART: [kat] ECC-384
43,000,419 UART: [kat] HMAC-384Kdf
43,013,537 UART: [kat] LMS
43,545,143 UART: [kat] --
43,549,688 UART: [update-reset] ++
47,003,361 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
47,007,143 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
47,613,743 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,756,523 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,951,216 >>> mbox cmd response: success
14,953,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,203,931 UART:
19,204,353 UART: Running Caliptra FMC ...
19,205,458 UART:
19,205,617 UART: [state] CFI Enabled
19,213,812 UART: [fht] FMC Alias Private Key: 7
20,970,541 UART: [art] Extend RT PCRs Done
20,971,759 UART: [art] Lock RT PCRs Done
20,973,332 UART: [art] Populate DV Done
20,978,726 UART: [fht] FMC Alias Private Key: 7
20,980,320 UART: [art] Derive CDI
20,981,138 UART: [art] Store in in slot 0x4
21,023,787 UART: [art] Derive Key Pair
21,024,794 UART: [art] Store priv key in slot 0x5
23,451,536 UART: [art] Derive Key Pair - Done
23,464,259 UART: [art] Signing Cert with AUTHO
23,465,565 UART: RITY.KEYID = 7
25,170,900 UART: [art] Erasing AUTHORITY.KEYID = 7
25,172,410 UART: [art] PUB.X = EEA29712603BDE693C94495D3DA4738438DCF05D2EACEA48499A8B11B6AADD2C05E387931A861FF68F1854C66163C119
25,179,699 UART: [art] PUB.Y = 8F2BDA4A494D978C9C4BB27429BF65573DDA2C57EF73AC6A352B2B44072318C44DA0633B01EFFCB50C23BC0B5F99E10E
25,186,994 UART: [art] SIG.R = 583FCAA2A153054C15CF065A51229BA6CA774B66846986B0827F7AB687D2FE99C92B000AFB1942593ECB3BA2FC076A27
25,194,321 UART: [art] SIG.S = F0A80FC563F703824E3DEA9CBEC71824C86CAE999EA419A06BB225952EC525750142B744EAE5D46ABB2151E0B729CE92
26,173,027 UART: Caliptra RT
26,173,736 UART: [state] CFI Enabled
26,291,157 UART: [rt] RT listening for mailbox commands...
29,482,140 >>> mbox cmd response: failed
29,484,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,627,620 UART:
29,627,946 UART: Running Caliptra FMC ...
29,628,988 UART:
29,629,158 UART: [state] CFI Enabled
29,630,090 UART: [art] Extend RT PCRs Done
29,631,232 UART: [art] Lock RT PCRs Done
29,632,296 UART: [art] Populate DV Done
29,633,362 UART: [fht] FMC Alias Private Key: 7
29,634,677 UART: [art] Derive CDI
29,635,414 UART: [art] Store in in slot 0x4
29,636,581 UART: [art] Derive Key Pair
29,637,574 UART: [art] Store priv key in slot 0x5
32,021,799 UART: [art] Derive Key Pair - Done
32,034,641 UART: [art] Signing Cert with AUTHO
32,035,956 UART: RITY.KEYID = 7
33,741,714 UART: [art] Erasing AUTHORITY.KEYID = 7
33,743,222 UART: [art] PUB.X = EEA29712603BDE693C94495D3DA4738438DCF05D2EACEA48499A8B11B6AADD2C05E387931A861FF68F1854C66163C119
33,750,502 UART: [art] PUB.Y = 8F2BDA4A494D978C9C4BB27429BF65573DDA2C57EF73AC6A352B2B44072318C44DA0633B01EFFCB50C23BC0B5F99E10E
33,757,766 UART: [art] SIG.R = 583FCAA2A153054C15CF065A51229BA6CA774B66846986B0827F7AB687D2FE99C92B000AFB1942593ECB3BA2FC076A27
33,765,157 UART: [art] SIG.S = F0A80FC563F703824E3DEA9CBEC71824C86CAE999EA419A06BB225952EC525750142B744EAE5D46ABB2151E0B729CE92
34,743,588 UART: Caliptra RT
34,744,337 UART: [state] CFI Enabled
35,031,865 UART: [rt] RT listening for mailbox commands...
47,897,602 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,486 UART: [state] LifecycleState = Unprovisioned
86,141 UART: [state] DebugLocked = No
86,771 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,417 UART: [kat] SHA2-256
882,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,463 UART: [kat] ++
886,615 UART: [kat] sha1
891,013 UART: [kat] SHA2-256
892,951 UART: [kat] SHA2-384
895,630 UART: [kat] SHA2-512-ACC
897,531 UART: [kat] ECC-384
903,160 UART: [kat] HMAC-384Kdf
907,930 UART: [kat] LMS
1,476,126 UART: [kat] --
1,477,151 UART: [cold-reset] ++
1,477,715 UART: [fht] Storing FHT @ 0x50003400
1,480,592 UART: [idev] ++
1,480,760 UART: [idev] CDI.KEYID = 6
1,481,120 UART: [idev] SUBJECT.KEYID = 7
1,481,544 UART: [idev] UDS.KEYID = 0
1,481,889 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,500 UART: [idev] Erasing UDS.KEYID = 0
1,506,498 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,206 UART: [idev] --
1,516,251 UART: [ldev] ++
1,516,419 UART: [ldev] CDI.KEYID = 6
1,516,782 UART: [ldev] SUBJECT.KEYID = 5
1,517,208 UART: [ldev] AUTHORITY.KEYID = 7
1,517,671 UART: [ldev] FE.KEYID = 1
1,522,435 UART: [ldev] Erasing FE.KEYID = 1
1,548,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,000 UART: [ldev] --
1,587,305 UART: [fwproc] Waiting for Commands...
1,588,122 UART: [fwproc] Received command 0x46574c44
1,588,913 UART: [fwproc] Received Image of size 114168 bytes
2,884,241 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,911,849 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,201 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,762 >>> mbox cmd response: success
3,076,762 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,078,020 UART: [afmc] ++
3,078,188 UART: [afmc] CDI.KEYID = 6
3,078,550 UART: [afmc] SUBJECT.KEYID = 7
3,078,975 UART: [afmc] AUTHORITY.KEYID = 5
3,114,166 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,130,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,972 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,136,684 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,142,595 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,148,302 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,156,090 UART: [afmc] --
3,157,120 UART: [cold-reset] --
3,157,754 UART: [state] Locking Datavault
3,159,191 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,795 UART: [state] Locking ICCM
3,160,255 UART: [exit] Launching FMC @ 0x40000130
3,165,584 UART:
3,165,600 UART: Running Caliptra FMC ...
3,166,008 UART:
3,166,062 UART: [state] CFI Enabled
3,176,669 UART: [fht] FMC Alias Private Key: 7
3,284,487 UART: [art] Extend RT PCRs Done
3,284,915 UART: [art] Lock RT PCRs Done
3,286,399 UART: [art] Populate DV Done
3,294,490 UART: [fht] FMC Alias Private Key: 7
3,295,654 UART: [art] Derive CDI
3,295,934 UART: [art] Store in in slot 0x4
3,381,449 UART: [art] Derive Key Pair
3,381,809 UART: [art] Store priv key in slot 0x5
3,395,377 UART: [art] Derive Key Pair - Done
3,409,925 UART: [art] Signing Cert with AUTHO
3,410,405 UART: RITY.KEYID = 7
3,425,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,444 UART: [art] PUB.X = BB6DB27A16AA3246E02081D2AA8A87DA706FC0376018296766FA05F7D4E5AE6AA57ACD6A6C10D47BC8758ABC2277017B
3,433,220 UART: [art] PUB.Y = FB0F90ABA4D4BD8952D2C88E82D01179335EF60EB1DAF68D99D2646776A5547169049A192860AFAC94E5EE2E42E28237
3,440,165 UART: [art] SIG.R = DFD36122E265EF2995FBEE2CA6782A34B5058CE5AA9D6D64DF26B967F2D5C26E5333C1245460381AE133CC3277B4CCE1
3,446,942 UART: [art] SIG.S = 51770ACF9CA8080680FCFBA1896BF6BCAFB04B012E46411D9D88493CF20608F3715AD6029CE9962D7751568C2849941F
3,471,498 UART: Caliptra RT
3,471,751 UART: [state] CFI Enabled
3,580,366 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,582,101 UART:
3,582,117 UART: Running Caliptra ROM ...
3,582,525 UART:
3,582,579 UART: [state] CFI Enabled
3,585,315 UART: [state] LifecycleState = Unprovisioned
3,585,970 UART: [state] DebugLocked = No
3,586,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,588,267 UART: [kat] SHA2-256
4,382,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,386,313 UART: [kat] ++
4,386,465 UART: [kat] sha1
4,390,499 UART: [kat] SHA2-256
4,392,437 UART: [kat] SHA2-384
4,395,192 UART: [kat] SHA2-512-ACC
4,397,092 UART: [kat] ECC-384
4,402,685 UART: [kat] HMAC-384Kdf
4,407,185 UART: [kat] LMS
4,975,381 UART: [kat] --
4,976,150 UART: [update-reset] ++
5,015,529 >>> mbox cmd response: failed
5,015,529 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,016,167 UART: ROM Non-Fatal Error: 0x000B001E
5,016,987 UART: [state] Locking Datavault
5,017,831 UART: [state] Locking PCR0, PCR1 and PCR31
5,018,435 UART: [state] Locking ICCM
5,019,061 UART: [exit] Launching FMC @ 0x40000130
5,024,390 UART:
5,024,406 UART: Running Caliptra FMC ...
5,024,814 UART:
5,024,868 UART: [state] CFI Enabled
5,113,859 UART: [art] Extend RT PCRs Done
5,114,287 UART: [art] Lock RT PCRs Done
5,115,502 UART: [art] Populate DV Done
5,123,845 UART: [fht] FMC Alias Private Key: 7
5,124,869 UART: [art] Derive CDI
5,125,149 UART: [art] Store in in slot 0x4
5,211,104 UART: [art] Derive Key Pair
5,211,464 UART: [art] Store priv key in slot 0x5
5,224,702 UART: [art] Derive Key Pair - Done
5,239,412 UART: [art] Signing Cert with AUTHO
5,239,892 UART: RITY.KEYID = 7
5,255,472 UART: [art] Erasing AUTHORITY.KEYID = 7
5,256,237 UART: [art] PUB.X = BB6DB27A16AA3246E02081D2AA8A87DA706FC0376018296766FA05F7D4E5AE6AA57ACD6A6C10D47BC8758ABC2277017B
5,263,013 UART: [art] PUB.Y = FB0F90ABA4D4BD8952D2C88E82D01179335EF60EB1DAF68D99D2646776A5547169049A192860AFAC94E5EE2E42E28237
5,269,958 UART: [art] SIG.R = DFD36122E265EF2995FBEE2CA6782A34B5058CE5AA9D6D64DF26B967F2D5C26E5333C1245460381AE133CC3277B4CCE1
5,276,735 UART: [art] SIG.S = 51770ACF9CA8080680FCFBA1896BF6BCAFB04B012E46411D9D88493CF20608F3715AD6029CE9962D7751568C2849941F
5,300,173 UART: Caliptra RT
5,300,426 UART: [state] CFI Enabled
5,579,815 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,581,415 UART:
5,581,431 UART: Running Caliptra ROM ...
5,581,839 UART:
5,581,893 UART: [state] CFI Enabled
5,584,553 UART: [state] LifecycleState = Unprovisioned
5,585,208 UART: [state] DebugLocked = No
5,585,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,587,393 UART: [kat] SHA2-256
6,381,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,385,439 UART: [kat] ++
6,385,591 UART: [kat] sha1
6,389,959 UART: [kat] SHA2-256
6,391,897 UART: [kat] SHA2-384
6,394,468 UART: [kat] SHA2-512-ACC
6,396,368 UART: [kat] ECC-384
6,401,931 UART: [kat] HMAC-384Kdf
6,406,499 UART: [kat] LMS
6,974,695 UART: [kat] --
6,975,356 UART: [update-reset] ++
8,308,862 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,310,080 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
8,459,710 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,380 >>> mbox cmd response: success
2,925,380 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,987,194 UART:
2,987,210 UART: Running Caliptra FMC ...
2,987,618 UART:
2,987,672 UART: [state] CFI Enabled
2,998,147 UART: [fht] FMC Alias Private Key: 7
3,106,095 UART: [art] Extend RT PCRs Done
3,106,523 UART: [art] Lock RT PCRs Done
3,107,891 UART: [art] Populate DV Done
3,116,150 UART: [fht] FMC Alias Private Key: 7
3,117,254 UART: [art] Derive CDI
3,117,534 UART: [art] Store in in slot 0x4
3,203,247 UART: [art] Derive Key Pair
3,203,607 UART: [art] Store priv key in slot 0x5
3,216,443 UART: [art] Derive Key Pair - Done
3,231,287 UART: [art] Signing Cert with AUTHO
3,231,767 UART: RITY.KEYID = 7
3,246,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,354 UART: [art] PUB.X = 157E2287FCB45F6B0C392A492BAAAB343DA0C8922E430B72F85A2228D1BF317415CC5104DF17FA7930C6333C42A48CC4
3,254,121 UART: [art] PUB.Y = 56DA873E2904A1C68273365F2B408F983DE443AF428248DE27364DE6CE15DDA7F55B3235FA8260AF8969773760BF4700
3,261,042 UART: [art] SIG.R = 1BCA4C13A8D073706ABFA6A12C7A78F989A26A4FC6B7CB563B1DB01B62EAD0FAC190E13642F867A96C7D5FF0EB233C34
3,267,832 UART: [art] SIG.S = 40BC1A1793C8C9811F4C2CE12F389C06A542C668B2D35C16CDA99E136A00A81C7BEA0F87E644F60679C31B02FBE8C949
3,292,033 UART: Caliptra RT
3,292,286 UART: [state] CFI Enabled
3,401,518 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,720,346 >>> mbox cmd response: failed
4,720,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,726,169 UART:
4,726,185 UART: Running Caliptra FMC ...
4,726,593 UART:
4,726,647 UART: [state] CFI Enabled
4,816,236 UART: [art] Extend RT PCRs Done
4,816,664 UART: [art] Lock RT PCRs Done
4,817,849 UART: [art] Populate DV Done
4,825,926 UART: [fht] FMC Alias Private Key: 7
4,827,026 UART: [art] Derive CDI
4,827,306 UART: [art] Store in in slot 0x4
4,912,751 UART: [art] Derive Key Pair
4,913,111 UART: [art] Store priv key in slot 0x5
4,926,001 UART: [art] Derive Key Pair - Done
4,940,915 UART: [art] Signing Cert with AUTHO
4,941,395 UART: RITY.KEYID = 7
4,957,047 UART: [art] Erasing AUTHORITY.KEYID = 7
4,957,812 UART: [art] PUB.X = 157E2287FCB45F6B0C392A492BAAAB343DA0C8922E430B72F85A2228D1BF317415CC5104DF17FA7930C6333C42A48CC4
4,964,579 UART: [art] PUB.Y = 56DA873E2904A1C68273365F2B408F983DE443AF428248DE27364DE6CE15DDA7F55B3235FA8260AF8969773760BF4700
4,971,500 UART: [art] SIG.R = 1BCA4C13A8D073706ABFA6A12C7A78F989A26A4FC6B7CB563B1DB01B62EAD0FAC190E13642F867A96C7D5FF0EB233C34
4,978,290 UART: [art] SIG.S = 40BC1A1793C8C9811F4C2CE12F389C06A542C668B2D35C16CDA99E136A00A81C7BEA0F87E644F60679C31B02FBE8C949
5,001,589 UART: Caliptra RT
5,001,842 UART: [state] CFI Enabled
5,285,626 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,046,417 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,348 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,874 UART: [kat] SHA2-256
881,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,920 UART: [kat] ++
886,072 UART: [kat] sha1
890,378 UART: [kat] SHA2-256
892,316 UART: [kat] SHA2-384
895,067 UART: [kat] SHA2-512-ACC
896,968 UART: [kat] ECC-384
902,529 UART: [kat] HMAC-384Kdf
907,187 UART: [kat] LMS
1,475,383 UART: [kat] --
1,476,082 UART: [cold-reset] ++
1,476,530 UART: [fht] Storing FHT @ 0x50003400
1,479,195 UART: [idev] ++
1,479,363 UART: [idev] CDI.KEYID = 6
1,479,723 UART: [idev] SUBJECT.KEYID = 7
1,480,147 UART: [idev] UDS.KEYID = 0
1,480,492 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,381 UART: [idev] Erasing UDS.KEYID = 0
1,505,989 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,377 UART: [idev] --
1,515,534 UART: [ldev] ++
1,515,702 UART: [ldev] CDI.KEYID = 6
1,516,065 UART: [ldev] SUBJECT.KEYID = 5
1,516,491 UART: [ldev] AUTHORITY.KEYID = 7
1,516,954 UART: [ldev] FE.KEYID = 1
1,522,512 UART: [ldev] Erasing FE.KEYID = 1
1,547,801 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,115 UART: [ldev] --
1,587,546 UART: [fwproc] Waiting for Commands...
1,588,393 UART: [fwproc] Received command 0x46574c44
1,589,184 UART: [fwproc] Received Image of size 114168 bytes
2,885,962 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,913,620 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,972 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,631 >>> mbox cmd response: success
3,078,631 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,079,747 UART: [afmc] ++
3,079,915 UART: [afmc] CDI.KEYID = 6
3,080,277 UART: [afmc] SUBJECT.KEYID = 7
3,080,702 UART: [afmc] AUTHORITY.KEYID = 5
3,115,755 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,105 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,885 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
3,138,597 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
3,144,508 UART: [afmc] SIG.R = 07F89FD0ECDBB3D7EFD9B981890D812FB0D31B81A6A69BE8A1AD407305957DE0E81A195F920E881863C1BFA71DF8352D
3,150,215 UART: [afmc] SIG.S = 94426025B535D1C1519D3F89E71C308C34AF8C61C87E43837B52052637B77CEAB3BB567F72C12E0FC1093EDEA36ACC15
3,158,339 UART: [afmc] --
3,159,289 UART: [cold-reset] --
3,160,145 UART: [state] Locking Datavault
3,161,394 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,998 UART: [state] Locking ICCM
3,162,656 UART: [exit] Launching FMC @ 0x40000130
3,167,985 UART:
3,168,001 UART: Running Caliptra FMC ...
3,168,409 UART:
3,168,552 UART: [state] CFI Enabled
3,179,107 UART: [fht] FMC Alias Private Key: 7
3,286,795 UART: [art] Extend RT PCRs Done
3,287,223 UART: [art] Lock RT PCRs Done
3,289,015 UART: [art] Populate DV Done
3,297,030 UART: [fht] FMC Alias Private Key: 7
3,297,988 UART: [art] Derive CDI
3,298,268 UART: [art] Store in in slot 0x4
3,384,145 UART: [art] Derive Key Pair
3,384,505 UART: [art] Store priv key in slot 0x5
3,397,913 UART: [art] Derive Key Pair - Done
3,412,671 UART: [art] Signing Cert with AUTHO
3,413,151 UART: RITY.KEYID = 7
3,427,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,428,556 UART: [art] PUB.X = A358FF5B00884C73E11A4E947C71578B6F76E28EF78E297535CA192ADF3D8F559A241A0BD89D3103ED8A36CFB2B146AF
3,435,308 UART: [art] PUB.Y = 888410EE63C1B0BD9A33BCFA1CA4049A51447110AF9EF73D04140E4E9A28CC54D737AD8E9F62D0360928F6CC9C3AFADD
3,442,262 UART: [art] SIG.R = 3F0DF17D28F8EEB52D394B4B73FC814299C71B1023E870494D0159DA301D7993C0129DCCFDD738C6FF952BCA66AFA186
3,449,036 UART: [art] SIG.S = A3FB738AAB60EE1E70CB6BB09E0CA3F794A9F1373AB717E3D02F66E5CE47CBD461AAF4765F9E2E7393DB9CED92F80314
3,472,833 UART: Caliptra RT
3,473,178 UART: [state] CFI Enabled
3,582,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,584,272 UART:
3,584,288 UART: Running Caliptra ROM ...
3,584,696 UART:
3,584,837 UART: [state] CFI Enabled
3,587,999 UART: [state] LifecycleState = Unprovisioned
3,588,654 UART: [state] DebugLocked = No
3,589,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,590,673 UART: [kat] SHA2-256
4,384,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,388,719 UART: [kat] ++
4,388,871 UART: [kat] sha1
4,393,207 UART: [kat] SHA2-256
4,395,145 UART: [kat] SHA2-384
4,397,864 UART: [kat] SHA2-512-ACC
4,399,764 UART: [kat] ECC-384
4,405,493 UART: [kat] HMAC-384Kdf
4,410,117 UART: [kat] LMS
4,978,313 UART: [kat] --
4,979,094 UART: [update-reset] ++
5,018,027 >>> mbox cmd response: failed
5,018,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,018,455 UART: ROM Non-Fatal Error: 0x000B001E
5,019,451 UART: [state] Locking Datavault
5,020,357 UART: [state] Locking PCR0, PCR1 and PCR31
5,020,961 UART: [state] Locking ICCM
5,021,433 UART: [exit] Launching FMC @ 0x40000130
5,026,762 UART:
5,026,778 UART: Running Caliptra FMC ...
5,027,186 UART:
5,027,329 UART: [state] CFI Enabled
5,116,506 UART: [art] Extend RT PCRs Done
5,116,934 UART: [art] Lock RT PCRs Done
5,118,387 UART: [art] Populate DV Done
5,126,898 UART: [fht] FMC Alias Private Key: 7
5,127,942 UART: [art] Derive CDI
5,128,222 UART: [art] Store in in slot 0x4
5,213,833 UART: [art] Derive Key Pair
5,214,193 UART: [art] Store priv key in slot 0x5
5,227,729 UART: [art] Derive Key Pair - Done
5,242,777 UART: [art] Signing Cert with AUTHO
5,243,257 UART: RITY.KEYID = 7
5,258,565 UART: [art] Erasing AUTHORITY.KEYID = 7
5,259,330 UART: [art] PUB.X = A358FF5B00884C73E11A4E947C71578B6F76E28EF78E297535CA192ADF3D8F559A241A0BD89D3103ED8A36CFB2B146AF
5,266,082 UART: [art] PUB.Y = 888410EE63C1B0BD9A33BCFA1CA4049A51447110AF9EF73D04140E4E9A28CC54D737AD8E9F62D0360928F6CC9C3AFADD
5,273,036 UART: [art] SIG.R = 3F0DF17D28F8EEB52D394B4B73FC814299C71B1023E870494D0159DA301D7993C0129DCCFDD738C6FF952BCA66AFA186
5,279,810 UART: [art] SIG.S = A3FB738AAB60EE1E70CB6BB09E0CA3F794A9F1373AB717E3D02F66E5CE47CBD461AAF4765F9E2E7393DB9CED92F80314
5,303,895 UART: Caliptra RT
5,304,240 UART: [state] CFI Enabled
5,586,087 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,829 UART:
5,587,845 UART: Running Caliptra ROM ...
5,588,253 UART:
5,588,394 UART: [state] CFI Enabled
5,591,430 UART: [state] LifecycleState = Unprovisioned
5,592,085 UART: [state] DebugLocked = No
5,592,793 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,594,480 UART: [kat] SHA2-256
6,388,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,392,526 UART: [kat] ++
6,392,678 UART: [kat] sha1
6,396,986 UART: [kat] SHA2-256
6,398,924 UART: [kat] SHA2-384
6,401,673 UART: [kat] SHA2-512-ACC
6,403,573 UART: [kat] ECC-384
6,409,586 UART: [kat] HMAC-384Kdf
6,414,206 UART: [kat] LMS
6,982,402 UART: [kat] --
6,983,359 UART: [update-reset] ++
8,314,375 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,315,643 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
8,465,273 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,480 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,867 >>> mbox cmd response: success
2,925,867 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,987,435 UART:
2,987,451 UART: Running Caliptra FMC ...
2,987,859 UART:
2,988,002 UART: [state] CFI Enabled
2,998,171 UART: [fht] FMC Alias Private Key: 7
3,106,007 UART: [art] Extend RT PCRs Done
3,106,435 UART: [art] Lock RT PCRs Done
3,108,059 UART: [art] Populate DV Done
3,116,424 UART: [fht] FMC Alias Private Key: 7
3,117,356 UART: [art] Derive CDI
3,117,636 UART: [art] Store in in slot 0x4
3,203,515 UART: [art] Derive Key Pair
3,203,875 UART: [art] Store priv key in slot 0x5
3,217,017 UART: [art] Derive Key Pair - Done
3,231,678 UART: [art] Signing Cert with AUTHO
3,232,158 UART: RITY.KEYID = 7
3,247,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,947 UART: [art] PUB.X = 0E22206DF967B0EFD58013EF699376353A4FF6EA8CC7ECC256A4685CC2FB63324A18E40B909EC3840A0E191A7532624E
3,254,709 UART: [art] PUB.Y = 3B73258E4AD2CB807364E398FE9E87D909C32A88BE82C900BB4FBCFE0115AB2138D7B1659B5EBD86D16276088F21ABC6
3,261,638 UART: [art] SIG.R = F5F7329BA130135E62340FC6CFA38803F7B9D984B77EBC4CE01ADA133C3E8751B368912017F5AD1B2D2B72D6AE6E0916
3,268,407 UART: [art] SIG.S = CCDE4D6BF4EE2217972C9C29D9D240729CD99C9AF731E41C997E152A44706C7B7AAFFFA1F47DDF6706182CFEBD04BAAC
3,291,654 UART: Caliptra RT
3,291,999 UART: [state] CFI Enabled
3,400,817 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,720,442 >>> mbox cmd response: failed
4,720,442 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,726,149 UART:
4,726,165 UART: Running Caliptra FMC ...
4,726,573 UART:
4,726,716 UART: [state] CFI Enabled
4,815,825 UART: [art] Extend RT PCRs Done
4,816,253 UART: [art] Lock RT PCRs Done
4,817,404 UART: [art] Populate DV Done
4,825,927 UART: [fht] FMC Alias Private Key: 7
4,826,953 UART: [art] Derive CDI
4,827,233 UART: [art] Store in in slot 0x4
4,913,218 UART: [art] Derive Key Pair
4,913,578 UART: [art] Store priv key in slot 0x5
4,926,960 UART: [art] Derive Key Pair - Done
4,942,019 UART: [art] Signing Cert with AUTHO
4,942,499 UART: RITY.KEYID = 7
4,957,199 UART: [art] Erasing AUTHORITY.KEYID = 7
4,957,964 UART: [art] PUB.X = 0E22206DF967B0EFD58013EF699376353A4FF6EA8CC7ECC256A4685CC2FB63324A18E40B909EC3840A0E191A7532624E
4,964,726 UART: [art] PUB.Y = 3B73258E4AD2CB807364E398FE9E87D909C32A88BE82C900BB4FBCFE0115AB2138D7B1659B5EBD86D16276088F21ABC6
4,971,655 UART: [art] SIG.R = F5F7329BA130135E62340FC6CFA38803F7B9D984B77EBC4CE01ADA133C3E8751B368912017F5AD1B2D2B72D6AE6E0916
4,978,424 UART: [art] SIG.S = CCDE4D6BF4EE2217972C9C29D9D240729CD99C9AF731E41C997E152A44706C7B7AAFFFA1F47DDF6706182CFEBD04BAAC
5,002,835 UART: Caliptra RT
5,003,180 UART: [state] CFI Enabled
5,286,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,047,248 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,616 UART: [state] LifecycleState = Unprovisioned
86,271 UART: [state] DebugLocked = No
86,969 UART: [state] WD Timer not started. Device not locked for debugging
88,270 UART: [kat] SHA2-256
893,920 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,045 UART: [kat] ++
898,197 UART: [kat] sha1
902,593 UART: [kat] SHA2-256
904,533 UART: [kat] SHA2-384
907,306 UART: [kat] SHA2-512-ACC
909,207 UART: [kat] ECC-384
918,954 UART: [kat] HMAC-384Kdf
923,356 UART: [kat] LMS
1,171,684 UART: [kat] --
1,172,663 UART: [cold-reset] ++
1,173,171 UART: [fht] FHT @ 0x50003400
1,175,716 UART: [idev] ++
1,175,884 UART: [idev] CDI.KEYID = 6
1,176,244 UART: [idev] SUBJECT.KEYID = 7
1,176,668 UART: [idev] UDS.KEYID = 0
1,177,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,646 UART: [idev] Erasing UDS.KEYID = 0
1,201,717 UART: [idev] Sha1 KeyId Algorithm
1,210,067 UART: [idev] --
1,211,057 UART: [ldev] ++
1,211,225 UART: [ldev] CDI.KEYID = 6
1,211,588 UART: [ldev] SUBJECT.KEYID = 5
1,212,014 UART: [ldev] AUTHORITY.KEYID = 7
1,212,477 UART: [ldev] FE.KEYID = 1
1,217,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,712 UART: [fwproc] Wait for Commands...
1,283,526 UART: [fwproc] Recv command 0x46574c44
1,284,254 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,640 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,944 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,561 >>> mbox cmd response: success
2,771,561 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,772,771 UART: [afmc] ++
2,772,939 UART: [afmc] CDI.KEYID = 6
2,773,301 UART: [afmc] SUBJECT.KEYID = 7
2,773,726 UART: [afmc] AUTHORITY.KEYID = 5
2,809,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,242 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,954 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,865 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,844,579 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,243 UART: [afmc] --
2,853,221 UART: [cold-reset] --
2,854,267 UART: [state] Locking Datavault
2,855,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,992 UART: [state] Locking ICCM
2,856,554 UART: [exit] Launching FMC @ 0x40000130
2,861,883 UART:
2,861,899 UART: Running Caliptra FMC ...
2,862,307 UART:
2,862,361 UART: [state] CFI Enabled
2,872,870 UART: [fht] FMC Alias Private Key: 7
2,980,880 UART: [art] Extend RT PCRs Done
2,981,308 UART: [art] Lock RT PCRs Done
2,982,832 UART: [art] Populate DV Done
2,990,891 UART: [fht] FMC Alias Private Key: 7
2,991,823 UART: [art] Derive CDI
2,992,103 UART: [art] Store in in slot 0x4
3,077,772 UART: [art] Derive Key Pair
3,078,132 UART: [art] Store priv key in slot 0x5
3,090,622 UART: [art] Derive Key Pair - Done
3,105,381 UART: [art] Signing Cert with AUTHO
3,105,861 UART: RITY.KEYID = 7
3,120,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,580 UART: [art] PUB.X = 803C2E20833282D5B5C1F12932B04888FCF7CC12AFE97625141DABC4AD91BA6DEA3F39FF61FD7756264654C062C663E2
3,128,356 UART: [art] PUB.Y = 747E733B4084FEE0CC77A916930C6C579263D6745E7DAA4FD459C2B99961C5A6EE89CF1A554C62E05637D97B6360F02C
3,135,305 UART: [art] SIG.R = 662A5D74695DB6609DAC604235E4C88F87942290351195DBF292E738E57DC8BF2F7096DDACF19C048A05CFD09BB0B361
3,142,073 UART: [art] SIG.S = 8BF73B82EACCF3C3CAC3B904D5133AA60F7C9D0E23C40A5AD5B21B3D90094D1F1475DF1FDDCFB988FE96E2EEA4BAC1C9
3,165,737 UART: Caliptra RT
3,165,990 UART: [state] CFI Enabled
3,274,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,276,353 UART:
3,276,369 UART: Running Caliptra ROM ...
3,276,777 UART:
3,276,832 UART: [state] CFI Enabled
3,279,656 UART: [state] LifecycleState = Unprovisioned
3,280,311 UART: [state] DebugLocked = No
3,280,873 UART: [state] WD Timer not started. Device not locked for debugging
3,282,135 UART: [kat] SHA2-256
4,087,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,091,910 UART: [kat] ++
4,092,062 UART: [kat] sha1
4,096,258 UART: [kat] SHA2-256
4,098,198 UART: [kat] SHA2-384
4,100,973 UART: [kat] SHA2-512-ACC
4,102,873 UART: [kat] ECC-384
4,112,182 UART: [kat] HMAC-384Kdf
4,116,766 UART: [kat] LMS
4,365,094 UART: [kat] --
4,365,756 UART: [update-reset] ++
4,381,899 >>> mbox cmd response: failed
4,381,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,382,413 UART: ROM Non-Fatal Error: 0x000B001E
4,383,265 UART: [state] Locking Datavault
4,384,077 UART: [state] Locking PCR0, PCR1 and PCR31
4,384,681 UART: [state] Locking ICCM
4,385,273 UART: [exit] Launching FMC @ 0x40000130
4,390,602 UART:
4,390,618 UART: Running Caliptra FMC ...
4,391,026 UART:
4,391,080 UART: [state] CFI Enabled
4,479,319 UART: [art] Extend RT PCRs Done
4,479,747 UART: [art] Lock RT PCRs Done
4,481,168 UART: [art] Populate DV Done
4,489,147 UART: [fht] FMC Alias Private Key: 7
4,490,297 UART: [art] Derive CDI
4,490,577 UART: [art] Store in in slot 0x4
4,576,274 UART: [art] Derive Key Pair
4,576,634 UART: [art] Store priv key in slot 0x5
4,589,518 UART: [art] Derive Key Pair - Done
4,604,547 UART: [art] Signing Cert with AUTHO
4,605,027 UART: RITY.KEYID = 7
4,620,391 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,156 UART: [art] PUB.X = 803C2E20833282D5B5C1F12932B04888FCF7CC12AFE97625141DABC4AD91BA6DEA3F39FF61FD7756264654C062C663E2
4,627,932 UART: [art] PUB.Y = 747E733B4084FEE0CC77A916930C6C579263D6745E7DAA4FD459C2B99961C5A6EE89CF1A554C62E05637D97B6360F02C
4,634,881 UART: [art] SIG.R = 662A5D74695DB6609DAC604235E4C88F87942290351195DBF292E738E57DC8BF2F7096DDACF19C048A05CFD09BB0B361
4,641,649 UART: [art] SIG.S = 8BF73B82EACCF3C3CAC3B904D5133AA60F7C9D0E23C40A5AD5B21B3D90094D1F1475DF1FDDCFB988FE96E2EEA4BAC1C9
4,665,201 UART: Caliptra RT
4,665,454 UART: [state] CFI Enabled
4,949,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,951,172 UART:
4,951,188 UART: Running Caliptra ROM ...
4,951,596 UART:
4,951,651 UART: [state] CFI Enabled
4,954,567 UART: [state] LifecycleState = Unprovisioned
4,955,222 UART: [state] DebugLocked = No
4,955,874 UART: [state] WD Timer not started. Device not locked for debugging
4,957,030 UART: [kat] SHA2-256
5,762,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,766,805 UART: [kat] ++
5,766,957 UART: [kat] sha1
5,771,213 UART: [kat] SHA2-256
5,773,153 UART: [kat] SHA2-384
5,775,920 UART: [kat] SHA2-512-ACC
5,777,820 UART: [kat] ECC-384
5,787,457 UART: [kat] HMAC-384Kdf
5,791,941 UART: [kat] LMS
6,040,269 UART: [kat] --
6,040,995 UART: [update-reset] ++
7,351,685 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,352,832 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,502,410 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,322 >>> mbox cmd response: success
2,623,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,685,842 UART:
2,685,858 UART: Running Caliptra FMC ...
2,686,266 UART:
2,686,320 UART: [state] CFI Enabled
2,696,673 UART: [fht] FMC Alias Private Key: 7
2,804,737 UART: [art] Extend RT PCRs Done
2,805,165 UART: [art] Lock RT PCRs Done
2,806,733 UART: [art] Populate DV Done
2,815,150 UART: [fht] FMC Alias Private Key: 7
2,816,210 UART: [art] Derive CDI
2,816,490 UART: [art] Store in in slot 0x4
2,902,343 UART: [art] Derive Key Pair
2,902,703 UART: [art] Store priv key in slot 0x5
2,915,785 UART: [art] Derive Key Pair - Done
2,930,778 UART: [art] Signing Cert with AUTHO
2,931,258 UART: RITY.KEYID = 7
2,946,196 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,961 UART: [art] PUB.X = 007327EB7B6E6385FF141AA595319C3E5E0F8942DEFD31529B05FD9D3EBC6B56A8E0F107D706866FF8D5AA03E544C294
2,953,702 UART: [art] PUB.Y = 4AF148A07599A23A378226796524CAE807FC89039642CFFC3123CAEE0D356E4DEE60E8238B3EAA2341190F731CBC53C5
2,960,644 UART: [art] SIG.R = 73BF2C95306EFEA4846BA9F36043B5720AFDAB28AB52DA7A719691F71BC434144D6B7BD08D95F217E9436DBAF8378A03
2,967,418 UART: [art] SIG.S = FE174ED53935C13DDF55B0D6BEE2184D65713C8AB26971E7931CE80E432334E5D94A4CA7BFC5E0E88281AD8713B99716
2,991,544 UART: Caliptra RT
2,991,797 UART: [state] CFI Enabled
3,098,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,091,686 >>> mbox cmd response: failed
4,091,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,097,715 UART:
4,097,731 UART: Running Caliptra FMC ...
4,098,139 UART:
4,098,193 UART: [state] CFI Enabled
4,187,260 UART: [art] Extend RT PCRs Done
4,187,688 UART: [art] Lock RT PCRs Done
4,189,007 UART: [art] Populate DV Done
4,197,196 UART: [fht] FMC Alias Private Key: 7
4,198,180 UART: [art] Derive CDI
4,198,460 UART: [art] Store in in slot 0x4
4,284,119 UART: [art] Derive Key Pair
4,284,479 UART: [art] Store priv key in slot 0x5
4,297,753 UART: [art] Derive Key Pair - Done
4,312,500 UART: [art] Signing Cert with AUTHO
4,312,980 UART: RITY.KEYID = 7
4,328,296 UART: [art] Erasing AUTHORITY.KEYID = 7
4,329,061 UART: [art] PUB.X = 007327EB7B6E6385FF141AA595319C3E5E0F8942DEFD31529B05FD9D3EBC6B56A8E0F107D706866FF8D5AA03E544C294
4,335,802 UART: [art] PUB.Y = 4AF148A07599A23A378226796524CAE807FC89039642CFFC3123CAEE0D356E4DEE60E8238B3EAA2341190F731CBC53C5
4,342,744 UART: [art] SIG.R = 73BF2C95306EFEA4846BA9F36043B5720AFDAB28AB52DA7A719691F71BC434144D6B7BD08D95F217E9436DBAF8378A03
4,349,518 UART: [art] SIG.S = FE174ED53935C13DDF55B0D6BEE2184D65713C8AB26971E7931CE80E432334E5D94A4CA7BFC5E0E88281AD8713B99716
4,373,162 UART: Caliptra RT
4,373,415 UART: [state] CFI Enabled
4,650,522 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,087,282 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
893,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,540 UART: [kat] ++
897,692 UART: [kat] sha1
901,826 UART: [kat] SHA2-256
903,766 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
918,331 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,747 UART: [idev] ++
1,175,915 UART: [idev] CDI.KEYID = 6
1,176,275 UART: [idev] SUBJECT.KEYID = 7
1,176,699 UART: [idev] UDS.KEYID = 0
1,177,044 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,523 UART: [idev] Erasing UDS.KEYID = 0
1,201,426 UART: [idev] Sha1 KeyId Algorithm
1,209,890 UART: [idev] --
1,211,044 UART: [ldev] ++
1,211,212 UART: [ldev] CDI.KEYID = 6
1,211,575 UART: [ldev] SUBJECT.KEYID = 5
1,212,001 UART: [ldev] AUTHORITY.KEYID = 7
1,212,464 UART: [ldev] FE.KEYID = 1
1,217,832 UART: [ldev] Erasing FE.KEYID = 1
1,244,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,164 UART: [ldev] --
1,283,509 UART: [fwproc] Wait for Commands...
1,284,315 UART: [fwproc] Recv command 0x46574c44
1,285,043 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,608,067 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,371 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,020 >>> mbox cmd response: success
2,773,020 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,774,224 UART: [afmc] ++
2,774,392 UART: [afmc] CDI.KEYID = 6
2,774,754 UART: [afmc] SUBJECT.KEYID = 7
2,775,179 UART: [afmc] AUTHORITY.KEYID = 5
2,810,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,835 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,833,547 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,839,458 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,845,172 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,852,818 UART: [afmc] --
2,853,762 UART: [cold-reset] --
2,854,634 UART: [state] Locking Datavault
2,855,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,213 UART: [state] Locking ICCM
2,856,663 UART: [exit] Launching FMC @ 0x40000130
2,861,992 UART:
2,862,008 UART: Running Caliptra FMC ...
2,862,416 UART:
2,862,559 UART: [state] CFI Enabled
2,873,510 UART: [fht] FMC Alias Private Key: 7
2,981,668 UART: [art] Extend RT PCRs Done
2,982,096 UART: [art] Lock RT PCRs Done
2,983,588 UART: [art] Populate DV Done
2,991,925 UART: [fht] FMC Alias Private Key: 7
2,992,953 UART: [art] Derive CDI
2,993,233 UART: [art] Store in in slot 0x4
3,078,582 UART: [art] Derive Key Pair
3,078,942 UART: [art] Store priv key in slot 0x5
3,092,706 UART: [art] Derive Key Pair - Done
3,107,771 UART: [art] Signing Cert with AUTHO
3,108,251 UART: RITY.KEYID = 7
3,123,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,360 UART: [art] PUB.X = A54836D4165DA948D1E6CAF40295EBA715E6DDB100B1D5D44D5ACF6F945CF09B818A2AD74D9AE97002C544C066F72E2C
3,131,116 UART: [art] PUB.Y = 2507EE11AB851D18C4EDD135AA19F02A4717203429185BA134904011B98DCB29472AF017C9E253623FFA974464B01DCA
3,138,061 UART: [art] SIG.R = 7FB97976E537C664BEFC2B140D6C40DC53F9B8417418E74226E7DB2E424314139AE5F5A0F7A16CAA513F2F60E6C1901F
3,144,834 UART: [art] SIG.S = 00DBC8E019E63A750D3EA1B91358F16EE66BDFBE503838688D6E98CAE94F69BB339227F731C577FCEEE0019F9765AF1C
3,169,423 UART: Caliptra RT
3,169,768 UART: [state] CFI Enabled
3,277,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,279,598 UART:
3,279,614 UART: Running Caliptra ROM ...
3,280,022 UART:
3,280,164 UART: [state] CFI Enabled
3,283,340 UART: [state] LifecycleState = Unprovisioned
3,283,995 UART: [state] DebugLocked = No
3,284,725 UART: [state] WD Timer not started. Device not locked for debugging
3,286,053 UART: [kat] SHA2-256
4,091,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,095,828 UART: [kat] ++
4,095,980 UART: [kat] sha1
4,100,274 UART: [kat] SHA2-256
4,102,214 UART: [kat] SHA2-384
4,105,143 UART: [kat] SHA2-512-ACC
4,107,043 UART: [kat] ECC-384
4,116,886 UART: [kat] HMAC-384Kdf
4,121,526 UART: [kat] LMS
4,369,854 UART: [kat] --
4,370,680 UART: [update-reset] ++
4,387,275 >>> mbox cmd response: failed
4,387,275 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,387,735 UART: ROM Non-Fatal Error: 0x000B001E
4,388,623 UART: [state] Locking Datavault
4,389,261 UART: [state] Locking PCR0, PCR1 and PCR31
4,389,865 UART: [state] Locking ICCM
4,390,335 UART: [exit] Launching FMC @ 0x40000130
4,395,664 UART:
4,395,680 UART: Running Caliptra FMC ...
4,396,088 UART:
4,396,231 UART: [state] CFI Enabled
4,485,718 UART: [art] Extend RT PCRs Done
4,486,146 UART: [art] Lock RT PCRs Done
4,487,295 UART: [art] Populate DV Done
4,495,414 UART: [fht] FMC Alias Private Key: 7
4,496,508 UART: [art] Derive CDI
4,496,788 UART: [art] Store in in slot 0x4
4,582,807 UART: [art] Derive Key Pair
4,583,167 UART: [art] Store priv key in slot 0x5
4,596,305 UART: [art] Derive Key Pair - Done
4,610,918 UART: [art] Signing Cert with AUTHO
4,611,398 UART: RITY.KEYID = 7
4,626,320 UART: [art] Erasing AUTHORITY.KEYID = 7
4,627,085 UART: [art] PUB.X = A54836D4165DA948D1E6CAF40295EBA715E6DDB100B1D5D44D5ACF6F945CF09B818A2AD74D9AE97002C544C066F72E2C
4,633,841 UART: [art] PUB.Y = 2507EE11AB851D18C4EDD135AA19F02A4717203429185BA134904011B98DCB29472AF017C9E253623FFA974464B01DCA
4,640,786 UART: [art] SIG.R = 7FB97976E537C664BEFC2B140D6C40DC53F9B8417418E74226E7DB2E424314139AE5F5A0F7A16CAA513F2F60E6C1901F
4,647,559 UART: [art] SIG.S = 00DBC8E019E63A750D3EA1B91358F16EE66BDFBE503838688D6E98CAE94F69BB339227F731C577FCEEE0019F9765AF1C
4,671,442 UART: Caliptra RT
4,671,787 UART: [state] CFI Enabled
4,947,153 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,948,724 UART:
4,948,740 UART: Running Caliptra ROM ...
4,949,148 UART:
4,949,290 UART: [state] CFI Enabled
4,951,978 UART: [state] LifecycleState = Unprovisioned
4,952,633 UART: [state] DebugLocked = No
4,953,269 UART: [state] WD Timer not started. Device not locked for debugging
4,954,403 UART: [kat] SHA2-256
5,760,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,764,178 UART: [kat] ++
5,764,330 UART: [kat] sha1
5,768,628 UART: [kat] SHA2-256
5,770,568 UART: [kat] SHA2-384
5,773,177 UART: [kat] SHA2-512-ACC
5,775,077 UART: [kat] ECC-384
5,784,904 UART: [kat] HMAC-384Kdf
5,789,518 UART: [kat] LMS
6,037,846 UART: [kat] --
6,038,760 UART: [update-reset] ++
7,349,480 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,350,543 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,500,121 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,652 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,627,869 >>> mbox cmd response: success
2,627,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,690,783 UART:
2,690,799 UART: Running Caliptra FMC ...
2,691,207 UART:
2,691,350 UART: [state] CFI Enabled
2,701,993 UART: [fht] FMC Alias Private Key: 7
2,810,173 UART: [art] Extend RT PCRs Done
2,810,601 UART: [art] Lock RT PCRs Done
2,812,313 UART: [art] Populate DV Done
2,820,548 UART: [fht] FMC Alias Private Key: 7
2,821,636 UART: [art] Derive CDI
2,821,916 UART: [art] Store in in slot 0x4
2,907,671 UART: [art] Derive Key Pair
2,908,031 UART: [art] Store priv key in slot 0x5
2,921,175 UART: [art] Derive Key Pair - Done
2,935,838 UART: [art] Signing Cert with AUTHO
2,936,318 UART: RITY.KEYID = 7
2,951,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,315 UART: [art] PUB.X = D7AEA1C26193BBA393091F57F0BBBE7744A225D386F67386860A6B353B1264DA655A6153F4E6BCF25E197672D0905C9C
2,959,081 UART: [art] PUB.Y = 253B97316F5EDE3017EE6DDCCA989E56FCE4975F505A8219C5C63E7B7F98C8BBD1F26FFFDAD3F5A4EDB02A1D87AC471F
2,966,057 UART: [art] SIG.R = DF3A58E37260E6E689023FFD85F1463AB5F90599ADB198B16529B4CE8BA541863C7FEE2B399E629DF49D0FAF3A839BBA
2,972,832 UART: [art] SIG.S = A7BF253EB6981221F988AC09D83E2CEEE0FC221DD6EA1490529F529B115E6D398E62027C4F6188014A4D0975CA4EEDB2
2,996,407 UART: Caliptra RT
2,996,752 UART: [state] CFI Enabled
3,104,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,100,201 >>> mbox cmd response: failed
4,100,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,105,998 UART:
4,106,014 UART: Running Caliptra FMC ...
4,106,422 UART:
4,106,565 UART: [state] CFI Enabled
4,195,316 UART: [art] Extend RT PCRs Done
4,195,744 UART: [art] Lock RT PCRs Done
4,197,063 UART: [art] Populate DV Done
4,205,206 UART: [fht] FMC Alias Private Key: 7
4,206,202 UART: [art] Derive CDI
4,206,482 UART: [art] Store in in slot 0x4
4,291,887 UART: [art] Derive Key Pair
4,292,247 UART: [art] Store priv key in slot 0x5
4,305,179 UART: [art] Derive Key Pair - Done
4,319,974 UART: [art] Signing Cert with AUTHO
4,320,454 UART: RITY.KEYID = 7
4,335,126 UART: [art] Erasing AUTHORITY.KEYID = 7
4,335,891 UART: [art] PUB.X = D7AEA1C26193BBA393091F57F0BBBE7744A225D386F67386860A6B353B1264DA655A6153F4E6BCF25E197672D0905C9C
4,342,657 UART: [art] PUB.Y = 253B97316F5EDE3017EE6DDCCA989E56FCE4975F505A8219C5C63E7B7F98C8BBD1F26FFFDAD3F5A4EDB02A1D87AC471F
4,349,633 UART: [art] SIG.R = DF3A58E37260E6E689023FFD85F1463AB5F90599ADB198B16529B4CE8BA541863C7FEE2B399E629DF49D0FAF3A839BBA
4,356,408 UART: [art] SIG.S = A7BF253EB6981221F988AC09D83E2CEEE0FC221DD6EA1490529F529B115E6D398E62027C4F6188014A4D0975CA4EEDB2
4,379,877 UART: Caliptra RT
4,380,222 UART: [state] CFI Enabled
4,665,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,102,539 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,265 UART: [kat] ++
895,417 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,300 UART: [kat] SHA2-512-ACC
906,201 UART: [kat] ECC-384
915,456 UART: [kat] HMAC-384Kdf
919,950 UART: [kat] LMS
1,168,262 UART: [kat] --
1,169,079 UART: [cold-reset] ++
1,169,487 UART: [fht] FHT @ 0x50003400
1,172,245 UART: [idev] ++
1,172,413 UART: [idev] CDI.KEYID = 6
1,172,774 UART: [idev] SUBJECT.KEYID = 7
1,173,199 UART: [idev] UDS.KEYID = 0
1,173,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,335 UART: [idev] Erasing UDS.KEYID = 0
1,197,649 UART: [idev] Sha1 KeyId Algorithm
1,206,689 UART: [idev] --
1,207,554 UART: [ldev] ++
1,207,722 UART: [ldev] CDI.KEYID = 6
1,208,086 UART: [ldev] SUBJECT.KEYID = 5
1,208,513 UART: [ldev] AUTHORITY.KEYID = 7
1,208,976 UART: [ldev] FE.KEYID = 1
1,214,134 UART: [ldev] Erasing FE.KEYID = 1
1,240,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,096 UART: [ldev] --
1,279,586 UART: [fwproc] Wait for Commands...
1,280,207 UART: [fwproc] Recv command 0x46574c44
1,280,940 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,603,715 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,024 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,654 >>> mbox cmd response: success
2,768,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,769,813 UART: [afmc] ++
2,769,981 UART: [afmc] CDI.KEYID = 6
2,770,344 UART: [afmc] SUBJECT.KEYID = 7
2,770,770 UART: [afmc] AUTHORITY.KEYID = 5
2,805,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,821,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,822,700 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,828,413 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,834,322 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,840,036 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,847,827 UART: [afmc] --
2,848,739 UART: [cold-reset] --
2,849,855 UART: [state] Locking Datavault
2,851,144 UART: [state] Locking PCR0, PCR1 and PCR31
2,851,748 UART: [state] Locking ICCM
2,852,286 UART: [exit] Launching FMC @ 0x40000130
2,857,615 UART:
2,857,631 UART: Running Caliptra FMC ...
2,858,039 UART:
2,858,093 UART: [state] CFI Enabled
2,868,420 UART: [fht] FMC Alias Private Key: 7
2,975,854 UART: [art] Extend RT PCRs Done
2,976,282 UART: [art] Lock RT PCRs Done
2,977,540 UART: [art] Populate DV Done
2,985,665 UART: [fht] FMC Alias Private Key: 7
2,986,611 UART: [art] Derive CDI
2,986,891 UART: [art] Store in in slot 0x4
3,072,650 UART: [art] Derive Key Pair
3,073,010 UART: [art] Store priv key in slot 0x5
3,086,236 UART: [art] Derive Key Pair - Done
3,101,129 UART: [art] Signing Cert with AUTHO
3,101,609 UART: RITY.KEYID = 7
3,116,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,117,420 UART: [art] PUB.X = 71A3E144956FF474AA862C17A8AC186B3F6D9FC332702FD1503A37E352E54F7ED9BC1E0ABB528A8B071B1DC4B8DE3B51
3,124,198 UART: [art] PUB.Y = 5DF9A9B975FB2E3791F8A9042F786C893FD695F784A444EF08A548446AC896109B5CDD67F77C68F79BDE5103679AA7DE
3,131,145 UART: [art] SIG.R = 84E0A87A29B1EC9AA3EA965A7D69CAD79B157BFD6F0D5D294B301875E2AF3E6FFADB83BE16F70AB5700EF2F7BEA8845D
3,137,932 UART: [art] SIG.S = 782A73C4D74ABA80DD8C5EB023AC1B83978FE9941EEA5DF80B0E231A398EBAE17A982FF8F5557B47430C541B1CB1CC16
3,161,982 UART: Caliptra RT
3,162,235 UART: [state] CFI Enabled
3,269,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,271,082 UART:
3,271,098 UART: Running Caliptra ROM ...
3,271,506 UART:
3,271,561 UART: [state] CFI Enabled
3,274,329 UART: [state] LifecycleState = Unprovisioned
3,274,984 UART: [state] DebugLocked = No
3,275,618 UART: [state] WD Timer not started. Device not locked for debugging
3,276,950 UART: [kat] SHA2-256
4,080,500 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,084,629 UART: [kat] ++
4,084,781 UART: [kat] sha1
4,089,189 UART: [kat] SHA2-256
4,091,129 UART: [kat] SHA2-384
4,093,850 UART: [kat] SHA2-512-ACC
4,095,750 UART: [kat] ECC-384
4,105,111 UART: [kat] HMAC-384Kdf
4,109,589 UART: [kat] LMS
4,357,901 UART: [kat] --
4,358,809 UART: [update-reset] ++
4,375,103 >>> mbox cmd response: failed
4,375,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,375,429 UART: ROM Non-Fatal Error: 0x000B001E
4,376,385 UART: [state] Locking Datavault
4,377,083 UART: [state] Locking PCR0, PCR1 and PCR31
4,377,687 UART: [state] Locking ICCM
4,378,309 UART: [exit] Launching FMC @ 0x40000130
4,383,638 UART:
4,383,654 UART: Running Caliptra FMC ...
4,384,062 UART:
4,384,116 UART: [state] CFI Enabled
4,473,135 UART: [art] Extend RT PCRs Done
4,473,563 UART: [art] Lock RT PCRs Done
4,474,770 UART: [art] Populate DV Done
4,482,889 UART: [fht] FMC Alias Private Key: 7
4,484,007 UART: [art] Derive CDI
4,484,287 UART: [art] Store in in slot 0x4
4,570,056 UART: [art] Derive Key Pair
4,570,416 UART: [art] Store priv key in slot 0x5
4,583,374 UART: [art] Derive Key Pair - Done
4,598,231 UART: [art] Signing Cert with AUTHO
4,598,711 UART: RITY.KEYID = 7
4,614,261 UART: [art] Erasing AUTHORITY.KEYID = 7
4,615,026 UART: [art] PUB.X = 71A3E144956FF474AA862C17A8AC186B3F6D9FC332702FD1503A37E352E54F7ED9BC1E0ABB528A8B071B1DC4B8DE3B51
4,621,804 UART: [art] PUB.Y = 5DF9A9B975FB2E3791F8A9042F786C893FD695F784A444EF08A548446AC896109B5CDD67F77C68F79BDE5103679AA7DE
4,628,751 UART: [art] SIG.R = 84E0A87A29B1EC9AA3EA965A7D69CAD79B157BFD6F0D5D294B301875E2AF3E6FFADB83BE16F70AB5700EF2F7BEA8845D
4,635,538 UART: [art] SIG.S = 782A73C4D74ABA80DD8C5EB023AC1B83978FE9941EEA5DF80B0E231A398EBAE17A982FF8F5557B47430C541B1CB1CC16
4,659,254 UART: Caliptra RT
4,659,507 UART: [state] CFI Enabled
4,937,282 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,938,869 UART:
4,938,885 UART: Running Caliptra ROM ...
4,939,293 UART:
4,939,348 UART: [state] CFI Enabled
4,942,164 UART: [state] LifecycleState = Unprovisioned
4,942,819 UART: [state] DebugLocked = No
4,943,453 UART: [state] WD Timer not started. Device not locked for debugging
4,944,603 UART: [kat] SHA2-256
5,748,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,752,282 UART: [kat] ++
5,752,434 UART: [kat] sha1
5,756,724 UART: [kat] SHA2-256
5,758,664 UART: [kat] SHA2-384
5,761,341 UART: [kat] SHA2-512-ACC
5,763,241 UART: [kat] ECC-384
5,773,138 UART: [kat] HMAC-384Kdf
5,777,548 UART: [kat] LMS
6,025,860 UART: [kat] --
6,026,984 UART: [update-reset] ++
7,337,236 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,338,271 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,487,849 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,238 >>> mbox cmd response: success
2,619,238 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,680,422 UART:
2,680,438 UART: Running Caliptra FMC ...
2,680,846 UART:
2,680,900 UART: [state] CFI Enabled
2,691,597 UART: [fht] FMC Alias Private Key: 7
2,799,449 UART: [art] Extend RT PCRs Done
2,799,877 UART: [art] Lock RT PCRs Done
2,801,473 UART: [art] Populate DV Done
2,809,676 UART: [fht] FMC Alias Private Key: 7
2,810,670 UART: [art] Derive CDI
2,810,950 UART: [art] Store in in slot 0x4
2,896,613 UART: [art] Derive Key Pair
2,896,973 UART: [art] Store priv key in slot 0x5
2,910,367 UART: [art] Derive Key Pair - Done
2,925,091 UART: [art] Signing Cert with AUTHO
2,925,571 UART: RITY.KEYID = 7
2,940,631 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,396 UART: [art] PUB.X = 5B09D275FBA133A22732C0821426FD564399734D2DE51849E6C6397B6B4DCC60AFC9CA14F0FA0DBE0BE34E973401646C
2,948,160 UART: [art] PUB.Y = EB43A1AED3EDC98300293967A67CE1C210395081792500A9841F45E650DB23911DB442780DFA700AA3D08B3DD6AF3384
2,955,060 UART: [art] SIG.R = 8E48A98B2720021129BC20AAF477AEF28931BD329BA871B83B3ECFD3AA7BC7568DDE353C0B5C765131C736F387EFA083
2,961,834 UART: [art] SIG.S = 2C5ABF5CE29DB16C99691F5D771D546C61FB86AAB1C670A7837C0A575189E7C8124E73E46BB60AE82300C70CF484D4AA
2,985,406 UART: Caliptra RT
2,985,659 UART: [state] CFI Enabled
3,092,906 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,082,651 >>> mbox cmd response: failed
4,082,651 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,088,802 UART:
4,088,818 UART: Running Caliptra FMC ...
4,089,226 UART:
4,089,280 UART: [state] CFI Enabled
4,178,283 UART: [art] Extend RT PCRs Done
4,178,711 UART: [art] Lock RT PCRs Done
4,179,952 UART: [art] Populate DV Done
4,188,199 UART: [fht] FMC Alias Private Key: 7
4,189,333 UART: [art] Derive CDI
4,189,613 UART: [art] Store in in slot 0x4
4,275,266 UART: [art] Derive Key Pair
4,275,626 UART: [art] Store priv key in slot 0x5
4,289,142 UART: [art] Derive Key Pair - Done
4,303,730 UART: [art] Signing Cert with AUTHO
4,304,210 UART: RITY.KEYID = 7
4,319,454 UART: [art] Erasing AUTHORITY.KEYID = 7
4,320,219 UART: [art] PUB.X = 5B09D275FBA133A22732C0821426FD564399734D2DE51849E6C6397B6B4DCC60AFC9CA14F0FA0DBE0BE34E973401646C
4,326,983 UART: [art] PUB.Y = EB43A1AED3EDC98300293967A67CE1C210395081792500A9841F45E650DB23911DB442780DFA700AA3D08B3DD6AF3384
4,333,883 UART: [art] SIG.R = 8E48A98B2720021129BC20AAF477AEF28931BD329BA871B83B3ECFD3AA7BC7568DDE353C0B5C765131C736F387EFA083
4,340,657 UART: [art] SIG.S = 2C5ABF5CE29DB16C99691F5D771D546C61FB86AAB1C670A7837C0A575189E7C8124E73E46BB60AE82300C70CF484D4AA
4,364,601 UART: Caliptra RT
4,364,854 UART: [state] CFI Enabled
4,645,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,075,839 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,061 UART: [kat] LMS
1,169,373 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,352 UART: [idev] ++
1,173,520 UART: [idev] CDI.KEYID = 6
1,173,881 UART: [idev] SUBJECT.KEYID = 7
1,174,306 UART: [idev] UDS.KEYID = 0
1,174,652 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,390 UART: [idev] Erasing UDS.KEYID = 0
1,199,574 UART: [idev] Sha1 KeyId Algorithm
1,208,368 UART: [idev] --
1,209,317 UART: [ldev] ++
1,209,485 UART: [ldev] CDI.KEYID = 6
1,209,849 UART: [ldev] SUBJECT.KEYID = 5
1,210,276 UART: [ldev] AUTHORITY.KEYID = 7
1,210,739 UART: [ldev] FE.KEYID = 1
1,216,051 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,725 UART: [ldev] --
1,282,171 UART: [fwproc] Wait for Commands...
1,282,778 UART: [fwproc] Recv command 0x46574c44
1,283,511 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,606,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,587 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,203 >>> mbox cmd response: success
2,771,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,772,368 UART: [afmc] ++
2,772,536 UART: [afmc] CDI.KEYID = 6
2,772,899 UART: [afmc] SUBJECT.KEYID = 7
2,773,325 UART: [afmc] AUTHORITY.KEYID = 5
2,809,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,698 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,449 UART: [afmc] PUB.X = 5E7C53871AA6F058B53124FDCF7BB922C37B0F6004634542B1F97ECC0B172B2DF64ECC81C84FBAD4D3194BF0C6188AD9
2,832,162 UART: [afmc] PUB.Y = 8B4AF9458E4BE37D7D32FEBB95AE9B31B05CDAC0BACDEF4D68F13D63B38D96CFB7E7FA94C8A6BC17F8DB8A9D63F939CA
2,838,071 UART: [afmc] SIG.R = B839991BFC4655CA4253F1F86AAE1F27C6BE9224409D73CCB6E37CAEECAF896774CB26C971272E642883F71285607E24
2,843,785 UART: [afmc] SIG.S = 7E6683639F41F00A0B8E126226E5EC2F426EA4E9328B61C21587C1CD7029858E10B5914B4DED2A9792B66CB8F41DE80C
2,851,758 UART: [afmc] --
2,852,760 UART: [cold-reset] --
2,853,382 UART: [state] Locking Datavault
2,854,473 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,077 UART: [state] Locking ICCM
2,855,709 UART: [exit] Launching FMC @ 0x40000130
2,861,038 UART:
2,861,054 UART: Running Caliptra FMC ...
2,861,462 UART:
2,861,605 UART: [state] CFI Enabled
2,871,988 UART: [fht] FMC Alias Private Key: 7
2,980,090 UART: [art] Extend RT PCRs Done
2,980,518 UART: [art] Lock RT PCRs Done
2,981,938 UART: [art] Populate DV Done
2,990,001 UART: [fht] FMC Alias Private Key: 7
2,990,985 UART: [art] Derive CDI
2,991,265 UART: [art] Store in in slot 0x4
3,076,908 UART: [art] Derive Key Pair
3,077,268 UART: [art] Store priv key in slot 0x5
3,091,060 UART: [art] Derive Key Pair - Done
3,105,865 UART: [art] Signing Cert with AUTHO
3,106,345 UART: RITY.KEYID = 7
3,121,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,356 UART: [art] PUB.X = 9CF545DE3AD43E26B91C6C3C5A1671A09A88885A8D40971C0E36C3F7A97BBDE67FB2399DE2E17AC294F8EADFD73B30F8
3,129,141 UART: [art] PUB.Y = D0FA33B851885FF93FEF1214625D0BCD5A14BC5058A9685AC66F85547187FA3E68576A72F94BF0FAE5733028DFFC9DA2
3,136,098 UART: [art] SIG.R = 54D8FD22AD28458BDD7605EDD5F2B8E24DF087AB67110401473CBF7B169D428BDE61FFDEAA8936AD2975FF00255C222B
3,142,851 UART: [art] SIG.S = 111E770ACD925383557A390DA1C3188802F605C68FDD61D1AA6AA9F8F9CD3C717F0D706F05DA87912084F777A0BE0090
3,167,002 UART: Caliptra RT
3,167,347 UART: [state] CFI Enabled
3,275,494 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,277,614 UART:
3,277,630 UART: Running Caliptra ROM ...
3,278,038 UART:
3,278,180 UART: [state] CFI Enabled
3,280,912 UART: [state] LifecycleState = Unprovisioned
3,281,567 UART: [state] DebugLocked = No
3,282,075 UART: [state] WD Timer not started. Device not locked for debugging
3,283,269 UART: [kat] SHA2-256
4,086,819 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,090,948 UART: [kat] ++
4,091,100 UART: [kat] sha1
4,095,416 UART: [kat] SHA2-256
4,097,356 UART: [kat] SHA2-384
4,100,157 UART: [kat] SHA2-512-ACC
4,102,057 UART: [kat] ECC-384
4,111,596 UART: [kat] HMAC-384Kdf
4,116,300 UART: [kat] LMS
4,364,612 UART: [kat] --
4,365,418 UART: [update-reset] ++
4,382,600 >>> mbox cmd response: failed
4,382,600 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,382,940 UART: ROM Non-Fatal Error: 0x000B001E
4,383,950 UART: [state] Locking Datavault
4,384,890 UART: [state] Locking PCR0, PCR1 and PCR31
4,385,494 UART: [state] Locking ICCM
4,385,956 UART: [exit] Launching FMC @ 0x40000130
4,391,285 UART:
4,391,301 UART: Running Caliptra FMC ...
4,391,709 UART:
4,391,852 UART: [state] CFI Enabled
4,480,655 UART: [art] Extend RT PCRs Done
4,481,083 UART: [art] Lock RT PCRs Done
4,482,380 UART: [art] Populate DV Done
4,490,845 UART: [fht] FMC Alias Private Key: 7
4,491,891 UART: [art] Derive CDI
4,492,171 UART: [art] Store in in slot 0x4
4,578,314 UART: [art] Derive Key Pair
4,578,674 UART: [art] Store priv key in slot 0x5
4,592,164 UART: [art] Derive Key Pair - Done
4,606,867 UART: [art] Signing Cert with AUTHO
4,607,347 UART: RITY.KEYID = 7
4,622,623 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,388 UART: [art] PUB.X = 9CF545DE3AD43E26B91C6C3C5A1671A09A88885A8D40971C0E36C3F7A97BBDE67FB2399DE2E17AC294F8EADFD73B30F8
4,630,173 UART: [art] PUB.Y = D0FA33B851885FF93FEF1214625D0BCD5A14BC5058A9685AC66F85547187FA3E68576A72F94BF0FAE5733028DFFC9DA2
4,637,130 UART: [art] SIG.R = 54D8FD22AD28458BDD7605EDD5F2B8E24DF087AB67110401473CBF7B169D428BDE61FFDEAA8936AD2975FF00255C222B
4,643,883 UART: [art] SIG.S = 111E770ACD925383557A390DA1C3188802F605C68FDD61D1AA6AA9F8F9CD3C717F0D706F05DA87912084F777A0BE0090
4,668,240 UART: Caliptra RT
4,668,585 UART: [state] CFI Enabled
4,951,722 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,953,535 UART:
4,953,551 UART: Running Caliptra ROM ...
4,953,959 UART:
4,954,101 UART: [state] CFI Enabled
4,956,979 UART: [state] LifecycleState = Unprovisioned
4,957,634 UART: [state] DebugLocked = No
4,958,252 UART: [state] WD Timer not started. Device not locked for debugging
4,959,536 UART: [kat] SHA2-256
5,763,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
5,767,215 UART: [kat] ++
5,767,367 UART: [kat] sha1
5,771,593 UART: [kat] SHA2-256
5,773,533 UART: [kat] SHA2-384
5,776,260 UART: [kat] SHA2-512-ACC
5,778,160 UART: [kat] ECC-384
5,788,243 UART: [kat] HMAC-384Kdf
5,792,865 UART: [kat] LMS
6,041,177 UART: [kat] --
6,042,179 UART: [update-reset] ++
7,352,873 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,353,832 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
7,503,410 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,085 >>> mbox cmd response: success
2,622,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,684,701 UART:
2,684,717 UART: Running Caliptra FMC ...
2,685,125 UART:
2,685,268 UART: [state] CFI Enabled
2,696,055 UART: [fht] FMC Alias Private Key: 7
2,804,099 UART: [art] Extend RT PCRs Done
2,804,527 UART: [art] Lock RT PCRs Done
2,805,763 UART: [art] Populate DV Done
2,813,948 UART: [fht] FMC Alias Private Key: 7
2,814,998 UART: [art] Derive CDI
2,815,278 UART: [art] Store in in slot 0x4
2,901,193 UART: [art] Derive Key Pair
2,901,553 UART: [art] Store priv key in slot 0x5
2,914,473 UART: [art] Derive Key Pair - Done
2,929,670 UART: [art] Signing Cert with AUTHO
2,930,150 UART: RITY.KEYID = 7
2,945,182 UART: [art] Erasing AUTHORITY.KEYID = 7
2,945,947 UART: [art] PUB.X = 89087535D646515A493D6904474894B41DE585FA58318020E299B95FCE6CA8856CD8AA035CC0377E3BBD9894CAE2AE76
2,952,706 UART: [art] PUB.Y = B09D45E73190E17A42D16ED48BE20A2B6532E9BA0CF0E4F90D4C3D20D66335D30FCFF85FA072E9A80C401F854D3AFA4F
2,959,657 UART: [art] SIG.R = 346E3E070FF0107F11DA35DB90370BFF1C60D8EDDC0468BD11F8831ABB30F5C57BF81FB830305D078F0603D173F0681D
2,966,414 UART: [art] SIG.S = F16A5007CE75281CC2ED73C330852B4EE9E168E019D2DF70CF9D09801006BF6B7C83807A9C7A2C4B2799E42C81470BA7
2,990,273 UART: Caliptra RT
2,990,618 UART: [state] CFI Enabled
3,097,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,087,455 >>> mbox cmd response: failed
4,087,455 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,093,032 UART:
4,093,048 UART: Running Caliptra FMC ...
4,093,456 UART:
4,093,599 UART: [state] CFI Enabled
4,183,132 UART: [art] Extend RT PCRs Done
4,183,560 UART: [art] Lock RT PCRs Done
4,184,951 UART: [art] Populate DV Done
4,193,482 UART: [fht] FMC Alias Private Key: 7
4,194,554 UART: [art] Derive CDI
4,194,834 UART: [art] Store in in slot 0x4
4,280,951 UART: [art] Derive Key Pair
4,281,311 UART: [art] Store priv key in slot 0x5
4,294,517 UART: [art] Derive Key Pair - Done
4,309,564 UART: [art] Signing Cert with AUTHO
4,310,044 UART: RITY.KEYID = 7
4,325,508 UART: [art] Erasing AUTHORITY.KEYID = 7
4,326,273 UART: [art] PUB.X = 89087535D646515A493D6904474894B41DE585FA58318020E299B95FCE6CA8856CD8AA035CC0377E3BBD9894CAE2AE76
4,333,032 UART: [art] PUB.Y = B09D45E73190E17A42D16ED48BE20A2B6532E9BA0CF0E4F90D4C3D20D66335D30FCFF85FA072E9A80C401F854D3AFA4F
4,339,983 UART: [art] SIG.R = 346E3E070FF0107F11DA35DB90370BFF1C60D8EDDC0468BD11F8831ABB30F5C57BF81FB830305D078F0603D173F0681D
4,346,740 UART: [art] SIG.S = F16A5007CE75281CC2ED73C330852B4EE9E168E019D2DF70CF9D09801006BF6B7C83807A9C7A2C4B2799E42C81470BA7
4,370,443 UART: Caliptra RT
4,370,788 UART: [state] CFI Enabled
4,653,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,086,244 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
192,085 UART:
192,446 UART: Running Caliptra ROM ...
193,568 UART:
193,713 UART: [state] CFI Enabled
263,180 UART: [state] LifecycleState = Unprovisioned
265,136 UART: [state] DebugLocked = No
268,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,119 UART: [kat] SHA2-256
442,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,308 UART: [kat] ++
453,757 UART: [kat] sha1
464,814 UART: [kat] SHA2-256
467,504 UART: [kat] SHA2-384
474,185 UART: [kat] SHA2-512-ACC
476,573 UART: [kat] ECC-384
2,762,603 UART: [kat] HMAC-384Kdf
2,795,095 UART: [kat] LMS
3,985,430 UART: [kat] --
3,988,906 UART: [cold-reset] ++
3,990,786 UART: [fht] Storing FHT @ 0x50003400
4,003,517 UART: [idev] ++
4,004,150 UART: [idev] CDI.KEYID = 6
4,005,040 UART: [idev] SUBJECT.KEYID = 7
4,006,311 UART: [idev] UDS.KEYID = 0
4,009,070 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,152,494 UART: [idev] Erasing UDS.KEYID = 0
7,339,433 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,019 UART: [idev] --
7,366,291 UART: [ldev] ++
7,366,917 UART: [ldev] CDI.KEYID = 6
7,367,803 UART: [ldev] SUBJECT.KEYID = 5
7,369,068 UART: [ldev] AUTHORITY.KEYID = 7
7,370,309 UART: [ldev] FE.KEYID = 1
7,417,950 UART: [ldev] Erasing FE.KEYID = 1
10,753,576 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,225 UART: [ldev] --
13,131,086 UART: [fwproc] Waiting for Commands...
13,133,720 UART: [fwproc] Received command 0x46574c44
13,135,915 UART: [fwproc] Received Image of size 113844 bytes
21,846,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,923,835 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
21,992,710 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,308,530 >>> mbox cmd response: success
22,310,610 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,453,905 UART: [afmc] ++
22,454,555 UART: [afmc] CDI.KEYID = 6
22,455,449 UART: [afmc] SUBJECT.KEYID = 7
22,456,556 UART: [afmc] AUTHORITY.KEYID = 5
25,676,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,975,364 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,977,624 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
27,992,177 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,006,931 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,021,211 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,042,766 UART: [afmc] --
28,047,140 UART: [cold-reset] --
28,050,354 UART: [state] Locking Datavault
28,055,925 UART: [state] Locking PCR0, PCR1 and PCR31
28,057,685 UART: [state] Locking ICCM
28,059,732 UART: [exit] Launching FMC @ 0x40000130
28,068,078 UART:
28,068,317 UART: Running Caliptra FMC ...
28,069,420 UART:
28,069,584 UART: [state] CFI Enabled
28,137,456 UART: [fht] FMC Alias Private Key: 7
30,475,702 UART: [art] Extend RT PCRs Done
30,477,198 UART: [art] Lock RT PCRs Done
30,478,583 UART: [art] Populate DV Done
30,483,964 UART: [fht] FMC Alias Private Key: 7
30,485,501 UART: [art] Derive CDI
30,486,269 UART: [art] Store in in slot 0x4
30,546,388 UART: [art] Derive Key Pair
30,547,427 UART: [art] Store priv key in slot 0x5
33,840,644 UART: [art] Derive Key Pair - Done
33,853,807 UART: [art] Signing Cert with AUTHO
33,855,139 UART: RITY.KEYID = 7
36,142,745 UART: [art] Erasing AUTHORITY.KEYID = 7
36,144,258 UART: [art] PUB.X = F56883A5E28AA62232AF64365B4C05BDA4B2356F6B17798B120F5AF78AB6B97ACD61D7D77CCC238CCD438B7AAD8326A2
36,151,532 UART: [art] PUB.Y = 1D319CEC228B03A7CB1B16E9BADB7F7DF3DB3AF12CB49A9D9086890D4BD429A49366B15C8746EFA1049ACD86D16B41BF
36,158,775 UART: [art] SIG.R = 1543846E83DA77F38830C11F10B8109A6E5E633BEF495CD1039A22BA64A1C4EDCF218EF3B538B809E316F8AA02B268EF
36,166,178 UART: [art] SIG.S = E33A1FEDE878DA9D2999C2EE38BCCF3695656B82B6746B6DC51D008D0BD6932F27BBD3D5C5D4C6FC29373CC7AF6A9005
37,471,149 UART: Caliptra RT
37,471,863 UART: [state] CFI Enabled
37,632,969 UART: [rt] RT listening for mailbox commands...
37,636,145 UART:
37,636,317 UART: Running Caliptra ROM ...
37,637,365 UART:
37,637,534 UART: [state] CFI Enabled
37,698,997 UART: [state] LifecycleState = Unprovisioned
37,700,926 UART: [state] DebugLocked = No
37,702,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,706,969 UART: [kat] SHA2-256
37,876,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,887,159 UART: [kat] ++
37,887,614 UART: [kat] sha1
37,899,150 UART: [kat] SHA2-256
37,901,851 UART: [kat] SHA2-384
37,909,352 UART: [kat] SHA2-512-ACC
37,911,752 UART: [kat] ECC-384
40,203,870 UART: [kat] HMAC-384Kdf
40,234,346 UART: [kat] LMS
41,424,671 UART: [kat] --
41,430,522 UART: [update-reset] ++
41,546,764 >>> mbox cmd response: failed
41,548,709 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
41,691,971 UART: ROM Non-Fatal Error: 0x000B003D
41,693,404 UART: [state] Locking Datavault
41,694,563 UART: [state] Locking PCR0, PCR1 and PCR31
41,696,102 UART: [state] Locking ICCM
41,697,009 UART: [exit] Launching FMC @ 0x40000130
41,698,445 UART:
41,698,610 UART: Running Caliptra FMC ...
41,699,712 UART:
41,699,866 UART: [state] CFI Enabled
41,700,704 UART: [art] Extend RT PCRs Done
41,701,751 UART: [art] Lock RT PCRs Done
41,702,809 UART: [art] Populate DV Done
41,703,838 UART: [fht] FMC Alias Private Key: 7
41,705,154 UART: [art] Derive CDI
41,705,930 UART: [art] Store in in slot 0x4
41,724,117 UART: [art] Derive Key Pair
41,725,112 UART: [art] Store priv key in slot 0x5
45,017,782 UART: [art] Derive Key Pair - Done
45,031,070 UART: [art] Signing Cert with AUTHO
45,032,381 UART: RITY.KEYID = 7
47,318,846 UART: [art] Erasing AUTHORITY.KEYID = 7
47,320,356 UART: [art] PUB.X = F56883A5E28AA62232AF64365B4C05BDA4B2356F6B17798B120F5AF78AB6B97ACD61D7D77CCC238CCD438B7AAD8326A2
47,327,624 UART: [art] PUB.Y = 1D319CEC228B03A7CB1B16E9BADB7F7DF3DB3AF12CB49A9D9086890D4BD429A49366B15C8746EFA1049ACD86D16B41BF
47,334,874 UART: [art] SIG.R = 1543846E83DA77F38830C11F10B8109A6E5E633BEF495CD1039A22BA64A1C4EDCF218EF3B538B809E316F8AA02B268EF
47,342,233 UART: [art] SIG.S = E33A1FEDE878DA9D2999C2EE38BCCF3695656B82B6746B6DC51D008D0BD6932F27BBD3D5C5D4C6FC29373CC7AF6A9005
48,647,308 UART: Caliptra RT
48,648,005 UART: [state] CFI Enabled
48,977,432 UART: [rt] RT listening for mailbox commands...
48,980,358 UART:
48,980,613 UART: Running Caliptra ROM ...
48,981,655 UART:
48,981,806 UART: [state] CFI Enabled
49,045,833 UART: [state] LifecycleState = Unprovisioned
49,047,724 UART: [state] DebugLocked = No
49,050,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
49,055,717 UART: [kat] SHA2-256
49,225,408 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,235,892 UART: [kat] ++
49,236,374 UART: [kat] sha1
49,246,720 UART: [kat] SHA2-256
49,249,409 UART: [kat] SHA2-384
49,256,579 UART: [kat] SHA2-512-ACC
49,258,934 UART: [kat] ECC-384
51,548,285 UART: [kat] HMAC-384Kdf
51,579,353 UART: [kat] LMS
52,769,659 UART: [kat] --
52,773,559 UART: [update-reset] ++
61,578,399 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,581,984 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
61,963,302 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,783,057 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,146,691 >>> mbox cmd response: success
22,148,662 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
27,836,159 UART:
27,836,563 UART: Running Caliptra FMC ...
27,837,873 UART:
27,838,047 UART: [state] CFI Enabled
27,904,912 UART: [fht] FMC Alias Private Key: 7
30,242,989 UART: [art] Extend RT PCRs Done
30,244,216 UART: [art] Lock RT PCRs Done
30,245,847 UART: [art] Populate DV Done
30,251,686 UART: [fht] FMC Alias Private Key: 7
30,253,120 UART: [art] Derive CDI
30,254,036 UART: [art] Store in in slot 0x4
30,312,944 UART: [art] Derive Key Pair
30,313,987 UART: [art] Store priv key in slot 0x5
33,606,415 UART: [art] Derive Key Pair - Done
33,619,034 UART: [art] Signing Cert with AUTHO
33,620,351 UART: RITY.KEYID = 7
35,908,044 UART: [art] Erasing AUTHORITY.KEYID = 7
35,909,576 UART: [art] PUB.X = 53A79881561EC7307446CD0488849CD129463BE27CFAAFE55F891FE38BF8ACFB9494022CC6C59A6984EFAFF2CEC05954
35,916,787 UART: [art] PUB.Y = BA6913AEE2243B399814644BE34CF1D916C56DCDC87FCB0886FDBA4E805BAF95BD292AD483B74EB7627F0200FCF735A2
35,924,038 UART: [art] SIG.R = 86D01E0E161E1FDE22CBB7E0D24403FDD09211D72795F7B30A056FCCA03F7FE25836E403CBB11CF4A4CD24F222297218
35,931,449 UART: [art] SIG.S = 5764BCAAC237ECB4B41319ECCFDF9C86E92505DB0F5FE5C4A75E1F71F7CA2A67D42E5EF14EA1E6D92A341AD70D127684
37,236,526 UART: Caliptra RT
37,237,230 UART: [state] CFI Enabled
37,398,658 UART: [rt] RT listening for mailbox commands...
41,128,193 >>> mbox cmd response: failed
41,130,084 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
41,273,356 UART:
41,273,677 UART: Running Caliptra FMC ...
41,274,806 UART:
41,275,003 UART: [state] CFI Enabled
41,275,939 UART: [art] Extend RT PCRs Done
41,277,082 UART: [art] Lock RT PCRs Done
41,278,156 UART: [art] Populate DV Done
41,279,261 UART: [fht] FMC Alias Private Key: 7
41,280,588 UART: [art] Derive CDI
41,281,323 UART: [art] Store in in slot 0x4
41,300,373 UART: [art] Derive Key Pair
41,301,376 UART: [art] Store priv key in slot 0x5
44,594,325 UART: [art] Derive Key Pair - Done
44,607,054 UART: [art] Signing Cert with AUTHO
44,608,363 UART: RITY.KEYID = 7
46,896,203 UART: [art] Erasing AUTHORITY.KEYID = 7
46,897,703 UART: [art] PUB.X = 53A79881561EC7307446CD0488849CD129463BE27CFAAFE55F891FE38BF8ACFB9494022CC6C59A6984EFAFF2CEC05954
46,904,952 UART: [art] PUB.Y = BA6913AEE2243B399814644BE34CF1D916C56DCDC87FCB0886FDBA4E805BAF95BD292AD483B74EB7627F0200FCF735A2
46,912,214 UART: [art] SIG.R = 86D01E0E161E1FDE22CBB7E0D24403FDD09211D72795F7B30A056FCCA03F7FE25836E403CBB11CF4A4CD24F222297218
46,919,679 UART: [art] SIG.S = 5764BCAAC237ECB4B41319ECCFDF9C86E92505DB0F5FE5C4A75E1F71F7CA2A67D42E5EF14EA1E6D92A341AD70D127684
48,224,823 UART: Caliptra RT
48,225,535 UART: [state] CFI Enabled
48,564,097 UART: [rt] RT listening for mailbox commands...
61,470,158 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,451 UART:
192,819 UART: Running Caliptra ROM ...
193,916 UART:
603,821 UART: [state] CFI Enabled
615,770 UART: [state] LifecycleState = Unprovisioned
617,713 UART: [state] DebugLocked = No
619,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,623 UART: [kat] SHA2-256
793,368 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,912 UART: [kat] ++
804,362 UART: [kat] sha1
816,215 UART: [kat] SHA2-256
818,938 UART: [kat] SHA2-384
826,111 UART: [kat] SHA2-512-ACC
828,457 UART: [kat] ECC-384
3,111,709 UART: [kat] HMAC-384Kdf
3,123,757 UART: [kat] LMS
4,313,889 UART: [kat] --
4,318,544 UART: [cold-reset] ++
4,321,130 UART: [fht] Storing FHT @ 0x50003400
4,331,805 UART: [idev] ++
4,332,417 UART: [idev] CDI.KEYID = 6
4,333,348 UART: [idev] SUBJECT.KEYID = 7
4,334,569 UART: [idev] UDS.KEYID = 0
4,337,491 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,573 UART: [idev] Erasing UDS.KEYID = 0
7,623,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,136 UART: [idev] --
7,647,591 UART: [ldev] ++
7,648,213 UART: [ldev] CDI.KEYID = 6
7,649,119 UART: [ldev] SUBJECT.KEYID = 5
7,650,329 UART: [ldev] AUTHORITY.KEYID = 7
7,651,634 UART: [ldev] FE.KEYID = 1
7,662,441 UART: [ldev] Erasing FE.KEYID = 1
10,951,842 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,555 UART: [ldev] --
13,315,196 UART: [fwproc] Waiting for Commands...
13,317,671 UART: [fwproc] Received command 0x46574c44
13,319,852 UART: [fwproc] Received Image of size 113844 bytes
22,266,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,348,245 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,417,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,733,062 >>> mbox cmd response: success
22,735,259 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,878,227 UART: [afmc] ++
22,878,868 UART: [afmc] CDI.KEYID = 6
22,879,800 UART: [afmc] SUBJECT.KEYID = 7
22,880,844 UART: [afmc] AUTHORITY.KEYID = 5
26,050,568 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,344,291 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,346,549 UART: [afmc] PUB.X = 6BEEF3AAB260044D43A19E9E052674130862B255DFBFACF047AD47B35331FA7D73787044AC7D4FB9B5DD6F5071EDF71F
28,361,104 UART: [afmc] PUB.Y = 24563BB56007C127C123E8D394B1B6DA2897FD7553F9607464003BB47158DF553FF3B383FE106E0DB4A6C976C631F07D
28,375,851 UART: [afmc] SIG.R = 415804F8BB8A9239330013A0F782FA3D56568F4270FA7F630700584865E54895A63AC48D5E62014B5970459BBD7EB5E0
28,390,050 UART: [afmc] SIG.S = 0D930BA6727AE6DB6F2427DEEA456E3C75D4D3501A0D4DF1CDB012B96FC7676699ACBEEB0F32C893549E92CC6967DEBE
28,412,635 UART: [afmc] --
28,417,022 UART: [cold-reset] --
28,421,704 UART: [state] Locking Datavault
28,426,854 UART: [state] Locking PCR0, PCR1 and PCR31
28,428,605 UART: [state] Locking ICCM
28,431,290 UART: [exit] Launching FMC @ 0x40000130
28,439,711 UART:
28,439,945 UART: Running Caliptra FMC ...
28,441,048 UART:
28,441,215 UART: [state] CFI Enabled
28,449,219 UART: [fht] FMC Alias Private Key: 7
30,780,211 UART: [art] Extend RT PCRs Done
30,781,432 UART: [art] Lock RT PCRs Done
30,782,944 UART: [art] Populate DV Done
30,788,245 UART: [fht] FMC Alias Private Key: 7
30,789,835 UART: [art] Derive CDI
30,790,649 UART: [art] Store in in slot 0x4
30,833,396 UART: [art] Derive Key Pair
30,834,445 UART: [art] Store priv key in slot 0x5
34,076,251 UART: [art] Derive Key Pair - Done
34,089,363 UART: [art] Signing Cert with AUTHO
34,090,699 UART: RITY.KEYID = 7
36,370,219 UART: [art] Erasing AUTHORITY.KEYID = 7
36,371,795 UART: [art] PUB.X = C5012D54ED4BD8EF6C84C20D1C5314C797E4F8786BF18BFF9EC26267D4F9E516594E820E0EC6D3447BCE64D2805D58EE
36,378,937 UART: [art] PUB.Y = 5192E4884428B9AB360255642AFD3A8C8CDACBEE2A1C5494ACDD70ADB0ECB87C36374EA5A5129E93DD17B615C35C277E
36,386,212 UART: [art] SIG.R = 9BCA1CF851F2B2AD5346CC5155A1A374F01E779126AAAD4FD559BA39FC6D2414DC9F32F538D011D78D7FE5544E8FEA49
36,393,589 UART: [art] SIG.S = 014F4D1F8DA117DAA33B1C02BEBF95967FE0A7D81D415E5A9C758780178B2C1041C3A654A4463631C65635542ACF7519
37,698,515 UART: Caliptra RT
37,699,199 UART: [state] CFI Enabled
37,817,493 UART: [rt] RT listening for mailbox commands...
37,820,552 UART:
37,820,722 UART: Running Caliptra ROM ...
37,821,740 UART:
37,822,163 UART: [state] CFI Enabled
37,835,506 UART: [state] LifecycleState = Unprovisioned
37,837,384 UART: [state] DebugLocked = No
37,839,654 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,845,295 UART: [kat] SHA2-256
38,015,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,025,528 UART: [kat] ++
38,026,073 UART: [kat] sha1
38,036,912 UART: [kat] SHA2-256
38,039,601 UART: [kat] SHA2-384
38,046,337 UART: [kat] SHA2-512-ACC
38,048,737 UART: [kat] ECC-384
40,334,257 UART: [kat] HMAC-384Kdf
40,346,752 UART: [kat] LMS
41,536,794 UART: [kat] --
41,541,922 UART: [update-reset] ++
41,658,331 >>> mbox cmd response: failed
41,660,236 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
41,803,211 UART: ROM Non-Fatal Error: 0x000B003D
41,804,634 UART: [state] Locking Datavault
41,805,703 UART: [state] Locking PCR0, PCR1 and PCR31
41,807,255 UART: [state] Locking ICCM
41,808,130 UART: [exit] Launching FMC @ 0x40000130
41,809,502 UART:
41,809,652 UART: Running Caliptra FMC ...
41,810,753 UART:
41,810,909 UART: [state] CFI Enabled
41,811,826 UART: [art] Extend RT PCRs Done
41,812,962 UART: [art] Lock RT PCRs Done
41,814,026 UART: [art] Populate DV Done
41,815,058 UART: [fht] FMC Alias Private Key: 7
41,816,375 UART: [art] Derive CDI
41,817,109 UART: [art] Store in in slot 0x4
41,818,277 UART: [art] Derive Key Pair
41,819,216 UART: [art] Store priv key in slot 0x5
45,020,360 UART: [art] Derive Key Pair - Done
45,033,097 UART: [art] Signing Cert with AUTHO
45,034,428 UART: RITY.KEYID = 7
47,313,720 UART: [art] Erasing AUTHORITY.KEYID = 7
47,315,237 UART: [art] PUB.X = C5012D54ED4BD8EF6C84C20D1C5314C797E4F8786BF18BFF9EC26267D4F9E516594E820E0EC6D3447BCE64D2805D58EE
47,322,472 UART: [art] PUB.Y = 5192E4884428B9AB360255642AFD3A8C8CDACBEE2A1C5494ACDD70ADB0ECB87C36374EA5A5129E93DD17B615C35C277E
47,329,746 UART: [art] SIG.R = 9BCA1CF851F2B2AD5346CC5155A1A374F01E779126AAAD4FD559BA39FC6D2414DC9F32F538D011D78D7FE5544E8FEA49
47,337,142 UART: [art] SIG.S = 014F4D1F8DA117DAA33B1C02BEBF95967FE0A7D81D415E5A9C758780178B2C1041C3A654A4463631C65635542ACF7519
48,642,025 UART: Caliptra RT
48,642,741 UART: [state] CFI Enabled
48,930,699 UART: [rt] RT listening for mailbox commands...
48,933,405 UART:
48,933,662 UART: Running Caliptra ROM ...
48,934,766 UART:
48,935,032 UART: [state] CFI Enabled
48,949,937 UART: [state] LifecycleState = Unprovisioned
48,951,870 UART: [state] DebugLocked = No
48,954,431 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,960,152 UART: [kat] SHA2-256
49,129,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,140,409 UART: [kat] ++
49,140,950 UART: [kat] sha1
49,151,950 UART: [kat] SHA2-256
49,154,641 UART: [kat] SHA2-384
49,160,301 UART: [kat] SHA2-512-ACC
49,162,645 UART: [kat] ECC-384
51,445,742 UART: [kat] HMAC-384Kdf
51,457,587 UART: [kat] LMS
52,647,649 UART: [kat] --
52,651,495 UART: [update-reset] ++
61,684,329 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,688,677 UART: [update-reset] Loading Runtime at address 0x40005000 len 89140
62,069,826 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
4,133,488 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,247,092 >>> mbox cmd response: success
22,249,036 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
27,885,215 UART:
27,885,628 UART: Running Caliptra FMC ...
27,886,762 UART:
27,886,918 UART: [state] CFI Enabled
27,894,916 UART: [fht] FMC Alias Private Key: 7
30,225,316 UART: [art] Extend RT PCRs Done
30,226,680 UART: [art] Lock RT PCRs Done
30,227,960 UART: [art] Populate DV Done
30,233,648 UART: [fht] FMC Alias Private Key: 7
30,235,300 UART: [art] Derive CDI
30,236,114 UART: [art] Store in in slot 0x4
30,278,707 UART: [art] Derive Key Pair
30,279,712 UART: [art] Store priv key in slot 0x5
33,521,644 UART: [art] Derive Key Pair - Done
33,534,424 UART: [art] Signing Cert with AUTHO
33,535,723 UART: RITY.KEYID = 7
35,815,519 UART: [art] Erasing AUTHORITY.KEYID = 7
35,817,037 UART: [art] PUB.X = 65D4651E016E67E3DD4E1DC64C8FC87CC16847B9CB4C9E4EAB00B1FC80E89DCCEA155B7A4E384077286ADA79F72F7398
35,824,287 UART: [art] PUB.Y = 7092AD74A0DC34A385AA5ED96653BEBDCA1DDCC503A00BF59A79FB410749579A12C3E37F31E01850924136AFD473E663
35,831,543 UART: [art] SIG.R = 9856F41A2BB922D1A058A729BF05FE75826D0A41BC6F7E64ADFC04CFDE93993169DAE60EF1AA7441349C84718166B88D
35,838,927 UART: [art] SIG.S = 3D5E841ED22D61E641750B2CE998D17624758B5907471860A10A6D8F8912820615D787F77DCA53189DC79CD9B969AAD3
37,144,714 UART: Caliptra RT
37,145,427 UART: [state] CFI Enabled
37,262,761 UART: [rt] RT listening for mailbox commands...
40,909,819 >>> mbox cmd response: failed
40,911,690 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
41,054,754 UART:
41,055,075 UART: Running Caliptra FMC ...
41,056,203 UART:
41,056,388 UART: [state] CFI Enabled
41,057,265 UART: [art] Extend RT PCRs Done
41,058,407 UART: [art] Lock RT PCRs Done
41,059,473 UART: [art] Populate DV Done
41,060,585 UART: [fht] FMC Alias Private Key: 7
41,061,929 UART: [art] Derive CDI
41,062,671 UART: [art] Store in in slot 0x4
41,063,847 UART: [art] Derive Key Pair
41,064,792 UART: [art] Store priv key in slot 0x5
44,264,539 UART: [art] Derive Key Pair - Done
44,277,319 UART: [art] Signing Cert with AUTHO
44,278,623 UART: RITY.KEYID = 7
46,558,053 UART: [art] Erasing AUTHORITY.KEYID = 7
46,559,570 UART: [art] PUB.X = 65D4651E016E67E3DD4E1DC64C8FC87CC16847B9CB4C9E4EAB00B1FC80E89DCCEA155B7A4E384077286ADA79F72F7398
46,566,833 UART: [art] PUB.Y = 7092AD74A0DC34A385AA5ED96653BEBDCA1DDCC503A00BF59A79FB410749579A12C3E37F31E01850924136AFD473E663
46,574,078 UART: [art] SIG.R = 9856F41A2BB922D1A058A729BF05FE75826D0A41BC6F7E64ADFC04CFDE93993169DAE60EF1AA7441349C84718166B88D
46,581,479 UART: [art] SIG.S = 3D5E841ED22D61E641750B2CE998D17624758B5907471860A10A6D8F8912820615D787F77DCA53189DC79CD9B969AAD3
47,886,286 UART: Caliptra RT
47,886,977 UART: [state] CFI Enabled
48,175,087 UART: [rt] RT listening for mailbox commands...
60,863,154 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,442 UART:
192,812 UART: Running Caliptra ROM ...
193,936 UART:
194,083 UART: [state] CFI Enabled
260,362 UART: [state] LifecycleState = Unprovisioned
262,292 UART: [state] DebugLocked = No
264,215 UART: [state] WD Timer not started. Device not locked for debugging
268,471 UART: [kat] SHA2-256
447,563 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,149 UART: [kat] ++
459,592 UART: [kat] sha1
470,145 UART: [kat] SHA2-256
473,150 UART: [kat] SHA2-384
478,479 UART: [kat] SHA2-512-ACC
481,464 UART: [kat] ECC-384
2,942,176 UART: [kat] HMAC-384Kdf
2,968,533 UART: [kat] LMS
3,497,989 UART: [kat] --
3,502,153 UART: [cold-reset] ++
3,504,305 UART: [fht] FHT @ 0x50003400
3,514,906 UART: [idev] ++
3,515,481 UART: [idev] CDI.KEYID = 6
3,516,421 UART: [idev] SUBJECT.KEYID = 7
3,517,634 UART: [idev] UDS.KEYID = 0
3,520,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,790 UART: [idev] Erasing UDS.KEYID = 0
6,022,851 UART: [idev] Sha1 KeyId Algorithm
6,046,304 UART: [idev] --
6,050,250 UART: [ldev] ++
6,050,831 UART: [ldev] CDI.KEYID = 6
6,051,742 UART: [ldev] SUBJECT.KEYID = 5
6,053,042 UART: [ldev] AUTHORITY.KEYID = 7
6,054,240 UART: [ldev] FE.KEYID = 1
6,098,196 UART: [ldev] Erasing FE.KEYID = 1
8,602,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,552 UART: [ldev] --
10,409,087 UART: [fwproc] Wait for Commands...
10,410,967 UART: [fwproc] Recv command 0x46574c44
10,413,009 UART: [fwproc] Recv'd Img size: 114168 bytes
14,984,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,062,968 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,131,737 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,448,866 >>> mbox cmd response: success
15,450,925 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,594,623 UART: [afmc] ++
15,595,262 UART: [afmc] CDI.KEYID = 6
15,596,184 UART: [afmc] SUBJECT.KEYID = 7
15,597,290 UART: [afmc] AUTHORITY.KEYID = 5
18,000,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,725,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,253 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,743,220 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,759,178 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,774,948 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,797,207 UART: [afmc] --
19,801,888 UART: [cold-reset] --
19,807,210 UART: [state] Locking Datavault
19,811,112 UART: [state] Locking PCR0, PCR1 and PCR31
19,812,760 UART: [state] Locking ICCM
19,814,818 UART: [exit] Launching FMC @ 0x40000130
19,823,275 UART:
19,823,511 UART: Running Caliptra FMC ...
19,824,613 UART:
19,824,775 UART: [state] CFI Enabled
19,883,170 UART: [fht] FMC Alias Private Key: 7
21,647,862 UART: [art] Extend RT PCRs Done
21,649,090 UART: [art] Lock RT PCRs Done
21,650,941 UART: [art] Populate DV Done
21,656,358 UART: [fht] FMC Alias Private Key: 7
21,657,952 UART: [art] Derive CDI
21,658,769 UART: [art] Store in in slot 0x4
21,715,953 UART: [art] Derive Key Pair
21,716,997 UART: [art] Store priv key in slot 0x5
24,180,291 UART: [art] Derive Key Pair - Done
24,193,013 UART: [art] Signing Cert with AUTHO
24,194,344 UART: RITY.KEYID = 7
25,905,911 UART: [art] Erasing AUTHORITY.KEYID = 7
25,907,419 UART: [art] PUB.X = CE8526CD9E6C5BFA1878626B03E2C13BDE1E0E8EE1334C5270D793A27493B45BCF9C252692725810B52E610AF6CE3EC5
25,914,665 UART: [art] PUB.Y = FF7912CFB25846CFDAABFBA4CBFAB01BE805F138C808D62A3398E5F88C20D2BF9CED85EC606FA2315D5C1306C8FF9D3B
25,921,966 UART: [art] SIG.R = EF8828DCA8DFC4D99F60F8AB67AC48B1C2E03F82A3E5F0ABE6BF36AC1F27D3905A29FF0C641CB5EBE29BFCA2B8A609FB
25,929,424 UART: [art] SIG.S = 07446A176B3A807CE16312D3627658D3C95E916D8C0CBD8B55AA16A033994BDAB7CCE9485FCB319716A905FD14FB84C7
26,908,117 UART: Caliptra RT
26,908,838 UART: [state] CFI Enabled
27,074,370 UART: [rt] RT listening for mailbox commands...
27,077,283 UART:
27,077,453 UART: Running Caliptra ROM ...
27,078,565 UART:
27,078,724 UART: [state] CFI Enabled
27,140,327 UART: [state] LifecycleState = Unprovisioned
27,142,197 UART: [state] DebugLocked = No
27,144,310 UART: [state] WD Timer not started. Device not locked for debugging
27,148,611 UART: [kat] SHA2-256
27,327,741 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,339,311 UART: [kat] ++
27,339,850 UART: [kat] sha1
27,350,688 UART: [kat] SHA2-256
27,353,692 UART: [kat] SHA2-384
27,360,486 UART: [kat] SHA2-512-ACC
27,363,432 UART: [kat] ECC-384
29,823,527 UART: [kat] HMAC-384Kdf
29,847,577 UART: [kat] LMS
30,377,070 UART: [kat] --
30,380,300 UART: [update-reset] ++
30,432,989 >>> mbox cmd response: failed
30,434,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,578,239 UART: ROM Non-Fatal Error: 0x000B003D
30,580,358 UART: [state] Locking Datavault
30,581,476 UART: [state] Locking PCR0, PCR1 and PCR31
30,583,048 UART: [state] Locking ICCM
30,583,968 UART: [exit] Launching FMC @ 0x40000130
30,585,400 UART:
30,585,561 UART: Running Caliptra FMC ...
30,586,675 UART:
30,586,834 UART: [state] CFI Enabled
30,587,758 UART: [art] Extend RT PCRs Done
30,589,004 UART: [art] Lock RT PCRs Done
30,590,080 UART: [art] Populate DV Done
30,591,059 UART: [fht] FMC Alias Private Key: 7
30,592,377 UART: [art] Derive CDI
30,593,107 UART: [art] Store in in slot 0x4
30,634,431 UART: [art] Derive Key Pair
30,635,427 UART: [art] Store priv key in slot 0x5
33,098,307 UART: [art] Derive Key Pair - Done
33,111,331 UART: [art] Signing Cert with AUTHO
33,112,646 UART: RITY.KEYID = 7
34,824,021 UART: [art] Erasing AUTHORITY.KEYID = 7
34,825,530 UART: [art] PUB.X = CE8526CD9E6C5BFA1878626B03E2C13BDE1E0E8EE1334C5270D793A27493B45BCF9C252692725810B52E610AF6CE3EC5
34,832,788 UART: [art] PUB.Y = FF7912CFB25846CFDAABFBA4CBFAB01BE805F138C808D62A3398E5F88C20D2BF9CED85EC606FA2315D5C1306C8FF9D3B
34,840,083 UART: [art] SIG.R = EF8828DCA8DFC4D99F60F8AB67AC48B1C2E03F82A3E5F0ABE6BF36AC1F27D3905A29FF0C641CB5EBE29BFCA2B8A609FB
34,847,508 UART: [art] SIG.S = 07446A176B3A807CE16312D3627658D3C95E916D8C0CBD8B55AA16A033994BDAB7CCE9485FCB319716A905FD14FB84C7
35,826,395 UART: Caliptra RT
35,827,099 UART: [state] CFI Enabled
36,164,687 UART: [rt] RT listening for mailbox commands...
36,167,378 UART:
36,167,545 UART: Running Caliptra ROM ...
36,168,655 UART:
36,168,812 UART: [state] CFI Enabled
36,228,817 UART: [state] LifecycleState = Unprovisioned
36,230,694 UART: [state] DebugLocked = No
36,233,149 UART: [state] WD Timer not started. Device not locked for debugging
36,237,265 UART: [kat] SHA2-256
36,416,388 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
36,427,964 UART: [kat] ++
36,428,423 UART: [kat] sha1
36,437,953 UART: [kat] SHA2-256
36,440,970 UART: [kat] SHA2-384
36,447,712 UART: [kat] SHA2-512-ACC
36,450,652 UART: [kat] ECC-384
38,913,233 UART: [kat] HMAC-384Kdf
38,937,194 UART: [kat] LMS
39,466,651 UART: [kat] --
39,471,984 UART: [update-reset] ++
44,065,956 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,069,137 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
44,451,497 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,362,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,043,972 >>> mbox cmd response: success
15,046,117 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,322,154 UART:
19,322,579 UART: Running Caliptra FMC ...
19,323,675 UART:
19,323,836 UART: [state] CFI Enabled
19,390,131 UART: [fht] FMC Alias Private Key: 7
21,154,430 UART: [art] Extend RT PCRs Done
21,155,652 UART: [art] Lock RT PCRs Done
21,157,171 UART: [art] Populate DV Done
21,162,740 UART: [fht] FMC Alias Private Key: 7
21,164,395 UART: [art] Derive CDI
21,165,212 UART: [art] Store in in slot 0x4
21,222,502 UART: [art] Derive Key Pair
21,223,544 UART: [art] Store priv key in slot 0x5
23,686,746 UART: [art] Derive Key Pair - Done
23,699,907 UART: [art] Signing Cert with AUTHO
23,701,211 UART: RITY.KEYID = 7
25,412,503 UART: [art] Erasing AUTHORITY.KEYID = 7
25,414,007 UART: [art] PUB.X = EFCBE7D072B967A29F57EA03704B562C66CC2F0F390669EF0371ADFF0988C42BB1067491FA7071F04BAC277F949DB976
25,421,301 UART: [art] PUB.Y = 61BC4A7E08AA426ABAD568ECDE1533AA47BEC3EA1E96CC0B98924B7D6E43BC9D98B84F1471692E5B3449108785DC7C49
25,428,544 UART: [art] SIG.R = 77E9B2B9A4F3D1B2B9D7C05EC7C84A725886C8169222EE9AB54186F98D40C5F22C843C022D47774BE1637307FC5D026C
25,435,939 UART: [art] SIG.S = 2E3BC116362B4E558B97AD7B2AED3B5CC8B675A31AC1C92020D737A5BADA7CFBCB6A9364E8310382135DA3F1EDEC706A
26,415,018 UART: Caliptra RT
26,415,743 UART: [state] CFI Enabled
26,580,412 UART: [rt] RT listening for mailbox commands...
29,786,306 >>> mbox cmd response: failed
29,788,675 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,932,383 UART:
29,932,705 UART: Running Caliptra FMC ...
29,933,832 UART:
29,934,006 UART: [state] CFI Enabled
29,934,935 UART: [art] Extend RT PCRs Done
29,936,075 UART: [art] Lock RT PCRs Done
29,937,147 UART: [art] Populate DV Done
29,938,175 UART: [fht] FMC Alias Private Key: 7
29,939,495 UART: [art] Derive CDI
29,940,233 UART: [art] Store in in slot 0x4
29,969,069 UART: [art] Derive Key Pair
29,970,130 UART: [art] Store priv key in slot 0x5
32,432,948 UART: [art] Derive Key Pair - Done
32,446,000 UART: [art] Signing Cert with AUTHO
32,447,306 UART: RITY.KEYID = 7
34,159,274 UART: [art] Erasing AUTHORITY.KEYID = 7
34,160,784 UART: [art] PUB.X = EFCBE7D072B967A29F57EA03704B562C66CC2F0F390669EF0371ADFF0988C42BB1067491FA7071F04BAC277F949DB976
34,168,075 UART: [art] PUB.Y = 61BC4A7E08AA426ABAD568ECDE1533AA47BEC3EA1E96CC0B98924B7D6E43BC9D98B84F1471692E5B3449108785DC7C49
34,175,300 UART: [art] SIG.R = 77E9B2B9A4F3D1B2B9D7C05EC7C84A725886C8169222EE9AB54186F98D40C5F22C843C022D47774BE1637307FC5D026C
34,182,681 UART: [art] SIG.S = 2E3BC116362B4E558B97AD7B2AED3B5CC8B675A31AC1C92020D737A5BADA7CFBCB6A9364E8310382135DA3F1EDEC706A
35,161,704 UART: Caliptra RT
35,162,400 UART: [state] CFI Enabled
35,495,611 UART: [rt] RT listening for mailbox commands...
43,466,555 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,555 UART:
192,931 UART: Running Caliptra ROM ...
194,111 UART:
603,561 UART: [state] CFI Enabled
614,686 UART: [state] LifecycleState = Unprovisioned
616,582 UART: [state] DebugLocked = No
619,253 UART: [state] WD Timer not started. Device not locked for debugging
623,342 UART: [kat] SHA2-256
802,499 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,058 UART: [kat] ++
814,598 UART: [kat] sha1
826,777 UART: [kat] SHA2-256
829,805 UART: [kat] SHA2-384
834,968 UART: [kat] SHA2-512-ACC
837,953 UART: [kat] ECC-384
3,279,543 UART: [kat] HMAC-384Kdf
3,292,965 UART: [kat] LMS
3,822,466 UART: [kat] --
3,825,916 UART: [cold-reset] ++
3,828,361 UART: [fht] FHT @ 0x50003400
3,839,015 UART: [idev] ++
3,839,589 UART: [idev] CDI.KEYID = 6
3,840,497 UART: [idev] SUBJECT.KEYID = 7
3,841,711 UART: [idev] UDS.KEYID = 0
3,844,644 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,231 UART: [idev] Erasing UDS.KEYID = 0
6,316,017 UART: [idev] Sha1 KeyId Algorithm
6,340,546 UART: [idev] --
6,344,015 UART: [ldev] ++
6,344,591 UART: [ldev] CDI.KEYID = 6
6,345,500 UART: [ldev] SUBJECT.KEYID = 5
6,346,659 UART: [ldev] AUTHORITY.KEYID = 7
6,347,947 UART: [ldev] FE.KEYID = 1
6,359,296 UART: [ldev] Erasing FE.KEYID = 1
8,833,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,144 UART: [ldev] --
10,622,271 UART: [fwproc] Wait for Commands...
10,625,399 UART: [fwproc] Recv command 0x46574c44
10,627,534 UART: [fwproc] Recv'd Img size: 114168 bytes
15,214,194 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,290,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,359,693 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,676,298 >>> mbox cmd response: success
15,678,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,821,742 UART: [afmc] ++
15,822,373 UART: [afmc] CDI.KEYID = 6
15,823,293 UART: [afmc] SUBJECT.KEYID = 7
15,824,317 UART: [afmc] AUTHORITY.KEYID = 5
18,187,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,907,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,909,747 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
19,925,708 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
19,941,640 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
19,957,448 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
19,979,596 UART: [afmc] --
19,983,614 UART: [cold-reset] --
19,989,335 UART: [state] Locking Datavault
19,994,140 UART: [state] Locking PCR0, PCR1 and PCR31
19,995,799 UART: [state] Locking ICCM
19,997,571 UART: [exit] Launching FMC @ 0x40000130
20,006,019 UART:
20,006,263 UART: Running Caliptra FMC ...
20,007,367 UART:
20,007,532 UART: [state] CFI Enabled
20,015,374 UART: [fht] FMC Alias Private Key: 7
21,772,264 UART: [art] Extend RT PCRs Done
21,773,488 UART: [art] Lock RT PCRs Done
21,775,056 UART: [art] Populate DV Done
21,780,416 UART: [fht] FMC Alias Private Key: 7
21,782,006 UART: [art] Derive CDI
21,782,827 UART: [art] Store in in slot 0x4
21,825,425 UART: [art] Derive Key Pair
21,826,477 UART: [art] Store priv key in slot 0x5
24,253,202 UART: [art] Derive Key Pair - Done
24,266,411 UART: [art] Signing Cert with AUTHO
24,267,717 UART: RITY.KEYID = 7
25,973,313 UART: [art] Erasing AUTHORITY.KEYID = 7
25,974,820 UART: [art] PUB.X = CB923F1F52989F763305AA51B147E820C5AD359994EDC5842B3D8596BEAE5BE1E3B8A77B4C28DD020FA46AC2E27EED37
25,982,142 UART: [art] PUB.Y = 7E30625557DFA216043741E652E40A96781B1A855346DBB2BD4B8B99075FD38071864ABDF5B60A99B73ABC5DA5D7EC50
25,989,371 UART: [art] SIG.R = 7AD7EB5E056EEE27D3E64ECB6E8947E18919C81466BC75108FA584D277DC30FF38BD2D1D699578A8B223F13BCC223C8E
25,996,801 UART: [art] SIG.S = 73399C9452FAE5A7EF5DB4DC927093E96AC1695A3828542B94062C2CA7F3573DE38E2CBD203C4BB9CB51621E0AD663A3
26,976,012 UART: Caliptra RT
26,976,704 UART: [state] CFI Enabled
27,094,293 UART: [rt] RT listening for mailbox commands...
27,097,353 UART:
27,097,608 UART: Running Caliptra ROM ...
27,098,721 UART:
27,098,936 UART: [state] CFI Enabled
27,113,598 UART: [state] LifecycleState = Unprovisioned
27,115,488 UART: [state] DebugLocked = No
27,116,932 UART: [state] WD Timer not started. Device not locked for debugging
27,120,846 UART: [kat] SHA2-256
27,299,987 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
27,311,575 UART: [kat] ++
27,312,110 UART: [kat] sha1
27,322,891 UART: [kat] SHA2-256
27,325,951 UART: [kat] SHA2-384
27,331,982 UART: [kat] SHA2-512-ACC
27,334,974 UART: [kat] ECC-384
29,776,044 UART: [kat] HMAC-384Kdf
29,789,939 UART: [kat] LMS
30,319,441 UART: [kat] --
30,324,453 UART: [update-reset] ++
30,377,040 >>> mbox cmd response: failed
30,378,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,522,153 UART: ROM Non-Fatal Error: 0x000B003D
30,523,579 UART: [state] Locking Datavault
30,524,734 UART: [state] Locking PCR0, PCR1 and PCR31
30,526,275 UART: [state] Locking ICCM
30,527,181 UART: [exit] Launching FMC @ 0x40000130
30,528,612 UART:
30,528,765 UART: Running Caliptra FMC ...
30,529,869 UART:
30,530,029 UART: [state] CFI Enabled
30,530,870 UART: [art] Extend RT PCRs Done
30,532,006 UART: [art] Lock RT PCRs Done
30,533,077 UART: [art] Populate DV Done
30,534,108 UART: [fht] FMC Alias Private Key: 7
30,535,423 UART: [art] Derive CDI
30,536,156 UART: [art] Store in in slot 0x4
30,537,342 UART: [art] Derive Key Pair
30,538,335 UART: [art] Store priv key in slot 0x5
32,925,194 UART: [art] Derive Key Pair - Done
32,937,977 UART: [art] Signing Cert with AUTHO
32,939,276 UART: RITY.KEYID = 7
34,644,710 UART: [art] Erasing AUTHORITY.KEYID = 7
34,646,207 UART: [art] PUB.X = CB923F1F52989F763305AA51B147E820C5AD359994EDC5842B3D8596BEAE5BE1E3B8A77B4C28DD020FA46AC2E27EED37
34,653,513 UART: [art] PUB.Y = 7E30625557DFA216043741E652E40A96781B1A855346DBB2BD4B8B99075FD38071864ABDF5B60A99B73ABC5DA5D7EC50
34,660,753 UART: [art] SIG.R = 7AD7EB5E056EEE27D3E64ECB6E8947E18919C81466BC75108FA584D277DC30FF38BD2D1D699578A8B223F13BCC223C8E
34,668,165 UART: [art] SIG.S = 73399C9452FAE5A7EF5DB4DC927093E96AC1695A3828542B94062C2CA7F3573DE38E2CBD203C4BB9CB51621E0AD663A3
35,647,477 UART: Caliptra RT
35,648,192 UART: [state] CFI Enabled
35,940,067 UART: [rt] RT listening for mailbox commands...
35,942,874 UART:
35,943,040 UART: Running Caliptra ROM ...
35,944,150 UART:
35,944,433 UART: [state] CFI Enabled
40,314,410 UART: [state] LifecycleState = Unprovisioned
40,316,327 UART: [state] DebugLocked = No
40,318,506 UART: [state] WD Timer not started. Device not locked for debugging
40,321,874 UART: [kat] SHA2-256
40,501,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
40,512,634 UART: [kat] ++
40,513,093 UART: [kat] sha1
40,524,034 UART: [kat] SHA2-256
40,527,054 UART: [kat] SHA2-384
40,533,205 UART: [kat] SHA2-512-ACC
40,536,147 UART: [kat] ECC-384
42,975,727 UART: [kat] HMAC-384Kdf
42,988,974 UART: [kat] LMS
43,518,469 UART: [kat] --
43,522,521 UART: [update-reset] ++
48,126,697 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,130,233 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
48,512,552 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,701,770 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,239,937 >>> mbox cmd response: success
15,241,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
19,491,333 UART:
19,491,779 UART: Running Caliptra FMC ...
19,492,882 UART:
19,493,040 UART: [state] CFI Enabled
19,501,249 UART: [fht] FMC Alias Private Key: 7
21,257,739 UART: [art] Extend RT PCRs Done
21,258,998 UART: [art] Lock RT PCRs Done
21,260,758 UART: [art] Populate DV Done
21,265,859 UART: [fht] FMC Alias Private Key: 7
21,267,451 UART: [art] Derive CDI
21,268,197 UART: [art] Store in in slot 0x4
21,311,008 UART: [art] Derive Key Pair
21,312,017 UART: [art] Store priv key in slot 0x5
23,738,902 UART: [art] Derive Key Pair - Done
23,752,058 UART: [art] Signing Cert with AUTHO
23,753,396 UART: RITY.KEYID = 7
25,458,580 UART: [art] Erasing AUTHORITY.KEYID = 7
25,460,082 UART: [art] PUB.X = A1A31CC93EECC84B404B193A3030D6EC361AAEA532767E210767751223939F93C24852958AB1A1321DABE7C1488B3EFC
25,467,341 UART: [art] PUB.Y = 7A09112EB82A83D296490E88E186DA46A9DB81916F3354B76543FD3D78FB64D9184ADFE5E9ECD2629437942B4FE1100D
25,474,603 UART: [art] SIG.R = A542188CCC9EE2A70088B8098A7BE5E81A294B3BCB039BE0AEF9DF1BFD659E8D6821C9CCEB4E44CE61FEA3BE5F017432
25,482,022 UART: [art] SIG.S = 1DE62203ED7C8D989030BD064012C7B2FC19118096B7C54EA4A75312927D3E3A4E4724FFBFE126F366C8060DB2EA951C
26,461,245 UART: Caliptra RT
26,461,960 UART: [state] CFI Enabled
26,579,316 UART: [rt] RT listening for mailbox commands...
29,713,871 >>> mbox cmd response: failed
29,716,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
29,859,570 UART:
29,859,892 UART: Running Caliptra FMC ...
29,861,010 UART:
29,861,172 UART: [state] CFI Enabled
29,862,091 UART: [art] Extend RT PCRs Done
29,863,233 UART: [art] Lock RT PCRs Done
29,864,305 UART: [art] Populate DV Done
29,865,374 UART: [fht] FMC Alias Private Key: 7
29,866,694 UART: [art] Derive CDI
29,867,428 UART: [art] Store in in slot 0x4
29,868,595 UART: [art] Derive Key Pair
29,869,540 UART: [art] Store priv key in slot 0x5
32,254,192 UART: [art] Derive Key Pair - Done
32,267,513 UART: [art] Signing Cert with AUTHO
32,268,810 UART: RITY.KEYID = 7
33,974,167 UART: [art] Erasing AUTHORITY.KEYID = 7
33,975,675 UART: [art] PUB.X = A1A31CC93EECC84B404B193A3030D6EC361AAEA532767E210767751223939F93C24852958AB1A1321DABE7C1488B3EFC
33,982,975 UART: [art] PUB.Y = 7A09112EB82A83D296490E88E186DA46A9DB81916F3354B76543FD3D78FB64D9184ADFE5E9ECD2629437942B4FE1100D
33,990,233 UART: [art] SIG.R = A542188CCC9EE2A70088B8098A7BE5E81A294B3BCB039BE0AEF9DF1BFD659E8D6821C9CCEB4E44CE61FEA3BE5F017432
33,997,639 UART: [art] SIG.S = 1DE62203ED7C8D989030BD064012C7B2FC19118096B7C54EA4A75312927D3E3A4E4724FFBFE126F366C8060DB2EA951C
34,976,275 UART: Caliptra RT
34,977,014 UART: [state] CFI Enabled
35,263,323 UART: [rt] RT listening for mailbox commands...
48,169,843 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,218 writing to cptra_bootfsm_go
193,506 UART:
193,855 UART: Running Caliptra ROM ...
195,060 UART:
195,220 UART: [state] CFI Enabled
262,032 UART: [state] LifecycleState = Unprovisioned
264,385 UART: [state] DebugLocked = No
267,224 UART: [state] WD Timer not started. Device not locked for debugging
272,460 UART: [kat] SHA2-256
462,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,128 UART: [kat] ++
473,574 UART: [kat] sha1
485,332 UART: [kat] SHA2-256
488,378 UART: [kat] SHA2-384
495,126 UART: [kat] SHA2-512-ACC
497,742 UART: [kat] ECC-384
2,945,009 UART: [kat] HMAC-384Kdf
2,968,732 UART: [kat] LMS
3,500,531 UART: [kat] --
3,505,734 UART: [cold-reset] ++
3,507,837 UART: [fht] FHT @ 0x50003400
3,519,961 UART: [idev] ++
3,520,637 UART: [idev] CDI.KEYID = 6
3,521,578 UART: [idev] SUBJECT.KEYID = 7
3,522,792 UART: [idev] UDS.KEYID = 0
3,526,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,923 UART: [idev] Erasing UDS.KEYID = 0
6,023,887 UART: [idev] Sha1 KeyId Algorithm
6,044,924 UART: [idev] --
6,050,377 UART: [ldev] ++
6,051,056 UART: [ldev] CDI.KEYID = 6
6,051,947 UART: [ldev] SUBJECT.KEYID = 5
6,053,165 UART: [ldev] AUTHORITY.KEYID = 7
6,054,399 UART: [ldev] FE.KEYID = 1
6,097,394 UART: [ldev] Erasing FE.KEYID = 1
8,604,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,503 UART: [ldev] --
10,410,109 UART: [fwproc] Wait for Commands...
10,411,863 UART: [fwproc] Recv command 0x46574c44
10,414,187 UART: [fwproc] Recv'd Img size: 114168 bytes
15,032,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,112,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,228,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
15,769,585 >>> mbox cmd response: success
15,771,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,915,272 UART: [afmc] ++
15,915,903 UART: [afmc] CDI.KEYID = 6
15,916,791 UART: [afmc] SUBJECT.KEYID = 7
15,917,893 UART: [afmc] AUTHORITY.KEYID = 5
18,322,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,047,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,049,432 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,064,466 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,079,662 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,094,569 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,117,973 UART: [afmc] --
20,120,871 UART: [cold-reset] --
20,123,169 UART: [state] Locking Datavault
20,129,939 UART: [state] Locking PCR0, PCR1 and PCR31
20,132,130 UART: [state] Locking ICCM
20,133,478 UART: [exit] Launching FMC @ 0x40000130
20,142,147 UART:
20,142,387 UART: Running Caliptra FMC ...
20,143,486 UART:
20,143,648 UART: [state] CFI Enabled
20,204,099 UART: [fht] FMC Alias Private Key: 7
21,968,074 UART: [art] Extend RT PCRs Done
21,969,300 UART: [art] Lock RT PCRs Done
21,971,117 UART: [art] Populate DV Done
21,976,479 UART: [fht] FMC Alias Private Key: 7
21,978,143 UART: [art] Derive CDI
21,978,961 UART: [art] Store in in slot 0x4
22,036,838 UART: [art] Derive Key Pair
22,037,881 UART: [art] Store priv key in slot 0x5
24,500,646 UART: [art] Derive Key Pair - Done
24,513,587 UART: [art] Signing Cert with AUTHO
24,514,886 UART: RITY.KEYID = 7
26,226,501 UART: [art] Erasing AUTHORITY.KEYID = 7
26,228,019 UART: [art] PUB.X = 6AA9D1AF0B6477997363164EF1BFA7844C998C3880E78D9F9ABFC21FF622EE461E79FE5B3A70FFDDDE9683B8B6DC800A
26,235,284 UART: [art] PUB.Y = D342980852435763066D6433A541C53F7837AE409970699D836751D581B3DC4FB4C41800F67C7BB2FE49FDABB141DB65
26,242,542 UART: [art] SIG.R = 3468B70924436705C8F79B2C9AF8D2B0FB7DBF2797CABD6511DEE9E51DF8053A45FA705CBCFF863DAE909134E6A9F7E4
26,249,943 UART: [art] SIG.S = A489E9FD4A3582A8D36276E5C5609E5688A3F8FA651A42971C5AD0C823FA2D17E3D0B153F5DA1EAD71A010B907B9E3EC
27,228,530 UART: Caliptra RT
27,229,240 UART: [state] CFI Enabled
27,395,743 UART: [rt] RT listening for mailbox commands...
27,399,022 UART:
27,399,301 UART: Running Caliptra ROM ...
27,400,411 UART:
27,400,569 UART: [state] CFI Enabled
27,458,634 UART: [state] LifecycleState = Unprovisioned
27,460,723 UART: [state] DebugLocked = No
27,462,135 UART: [state] WD Timer not started. Device not locked for debugging
27,467,295 UART: [kat] SHA2-256
27,657,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,667,910 UART: [kat] ++
27,668,387 UART: [kat] sha1
27,679,658 UART: [kat] SHA2-256
27,682,617 UART: [kat] SHA2-384
27,688,922 UART: [kat] SHA2-512-ACC
27,691,534 UART: [kat] ECC-384
30,144,571 UART: [kat] HMAC-384Kdf
30,168,777 UART: [kat] LMS
30,700,320 UART: [kat] --
30,704,629 UART: [update-reset] ++
30,773,353 >>> mbox cmd response: failed
30,775,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,918,856 UART: ROM Non-Fatal Error: 0x000B003D
30,920,289 UART: [state] Locking Datavault
30,921,444 UART: [state] Locking PCR0, PCR1 and PCR31
30,922,983 UART: [state] Locking ICCM
30,923,889 UART: [exit] Launching FMC @ 0x40000130
30,925,309 UART:
30,925,463 UART: Running Caliptra FMC ...
30,926,562 UART:
30,926,712 UART: [state] CFI Enabled
30,927,573 UART: [art] Extend RT PCRs Done
30,928,707 UART: [art] Lock RT PCRs Done
30,929,772 UART: [art] Populate DV Done
30,930,767 UART: [fht] FMC Alias Private Key: 7
30,932,082 UART: [art] Derive CDI
30,932,822 UART: [art] Store in in slot 0x4
30,953,973 UART: [art] Derive Key Pair
30,954,976 UART: [art] Store priv key in slot 0x5
33,417,985 UART: [art] Derive Key Pair - Done
33,431,308 UART: [art] Signing Cert with AUTHO
33,432,614 UART: RITY.KEYID = 7
35,143,712 UART: [art] Erasing AUTHORITY.KEYID = 7
35,145,202 UART: [art] PUB.X = 6AA9D1AF0B6477997363164EF1BFA7844C998C3880E78D9F9ABFC21FF622EE461E79FE5B3A70FFDDDE9683B8B6DC800A
35,152,501 UART: [art] PUB.Y = D342980852435763066D6433A541C53F7837AE409970699D836751D581B3DC4FB4C41800F67C7BB2FE49FDABB141DB65
35,159,735 UART: [art] SIG.R = 3468B70924436705C8F79B2C9AF8D2B0FB7DBF2797CABD6511DEE9E51DF8053A45FA705CBCFF863DAE909134E6A9F7E4
35,167,125 UART: [art] SIG.S = A489E9FD4A3582A8D36276E5C5609E5688A3F8FA651A42971C5AD0C823FA2D17E3D0B153F5DA1EAD71A010B907B9E3EC
36,146,319 UART: Caliptra RT
36,147,036 UART: [state] CFI Enabled
36,485,116 UART: [rt] RT listening for mailbox commands...
36,487,716 UART:
36,487,972 UART: Running Caliptra ROM ...
36,489,084 UART:
36,489,245 UART: [state] CFI Enabled
36,546,817 UART: [state] LifecycleState = Unprovisioned
36,548,875 UART: [state] DebugLocked = No
36,551,385 UART: [state] WD Timer not started. Device not locked for debugging
36,555,354 UART: [kat] SHA2-256
36,745,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,755,978 UART: [kat] ++
36,756,520 UART: [kat] sha1
36,767,901 UART: [kat] SHA2-256
36,770,916 UART: [kat] SHA2-384
36,777,339 UART: [kat] SHA2-512-ACC
36,779,902 UART: [kat] ECC-384
39,231,636 UART: [kat] HMAC-384Kdf
39,256,348 UART: [kat] LMS
39,787,922 UART: [kat] --
39,793,596 UART: [update-reset] ++
44,424,329 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,427,269 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
45,033,833 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
3,438,311 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,852,476 >>> mbox cmd response: success
15,854,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,139,038 UART:
20,139,795 UART: Running Caliptra FMC ...
20,140,923 UART:
20,141,075 UART: [state] CFI Enabled
20,208,388 UART: [fht] FMC Alias Private Key: 7
21,972,152 UART: [art] Extend RT PCRs Done
21,973,379 UART: [art] Lock RT PCRs Done
21,975,299 UART: [art] Populate DV Done
21,980,446 UART: [fht] FMC Alias Private Key: 7
21,981,932 UART: [art] Derive CDI
21,982,668 UART: [art] Store in in slot 0x4
22,040,924 UART: [art] Derive Key Pair
22,041,972 UART: [art] Store priv key in slot 0x5
24,504,897 UART: [art] Derive Key Pair - Done
24,517,786 UART: [art] Signing Cert with AUTHO
24,519,093 UART: RITY.KEYID = 7
26,231,961 UART: [art] Erasing AUTHORITY.KEYID = 7
26,233,474 UART: [art] PUB.X = 756C6ADEAD45A966C754AF81253D1B8BD2ACF1A0697668CC711BBDDA559766735558F8943D35F76584C669B796D94E07
26,240,746 UART: [art] PUB.Y = 10A738766A686136EB7678EE1026EE915865DEF51809597CE0000904FC97701B10A503FD6F875A93EBD0467C70369F80
26,247,959 UART: [art] SIG.R = 29E883422657F0CB42E4725E86AF07749C2DAE2EB4D7A820479C7B7E5AC59D134BD39393F78AB556BD47C894FF2B724D
26,255,361 UART: [art] SIG.S = E6B35EB01452151AE4C701DA74F957E1558CCB7BEEECDF9DBD9D9919B17BCF28F61B023B98E8AEEB5CF7FB94CEA152E6
27,234,479 UART: Caliptra RT
27,235,173 UART: [state] CFI Enabled
27,399,930 UART: [rt] RT listening for mailbox commands...
30,680,317 >>> mbox cmd response: failed
30,682,200 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,825,909 UART:
30,826,219 UART: Running Caliptra FMC ...
30,827,346 UART:
30,827,512 UART: [state] CFI Enabled
30,828,396 UART: [art] Extend RT PCRs Done
30,829,533 UART: [art] Lock RT PCRs Done
30,830,620 UART: [art] Populate DV Done
30,831,725 UART: [fht] FMC Alias Private Key: 7
30,833,044 UART: [art] Derive CDI
30,833,783 UART: [art] Store in in slot 0x4
30,852,398 UART: [art] Derive Key Pair
30,853,400 UART: [art] Store priv key in slot 0x5
33,316,137 UART: [art] Derive Key Pair - Done
33,329,361 UART: [art] Signing Cert with AUTHO
33,330,673 UART: RITY.KEYID = 7
35,043,165 UART: [art] Erasing AUTHORITY.KEYID = 7
35,044,675 UART: [art] PUB.X = 756C6ADEAD45A966C754AF81253D1B8BD2ACF1A0697668CC711BBDDA559766735558F8943D35F76584C669B796D94E07
35,051,958 UART: [art] PUB.Y = 10A738766A686136EB7678EE1026EE915865DEF51809597CE0000904FC97701B10A503FD6F875A93EBD0467C70369F80
35,059,168 UART: [art] SIG.R = 29E883422657F0CB42E4725E86AF07749C2DAE2EB4D7A820479C7B7E5AC59D134BD39393F78AB556BD47C894FF2B724D
35,066,586 UART: [art] SIG.S = E6B35EB01452151AE4C701DA74F957E1558CCB7BEEECDF9DBD9D9919B17BCF28F61B023B98E8AEEB5CF7FB94CEA152E6
36,045,638 UART: Caliptra RT
36,046,338 UART: [state] CFI Enabled
36,385,201 UART: [rt] RT listening for mailbox commands...
45,150,679 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,473 UART:
192,865 UART: Running Caliptra ROM ...
194,165 UART:
603,566 UART: [state] CFI Enabled
618,088 UART: [state] LifecycleState = Unprovisioned
620,476 UART: [state] DebugLocked = No
622,555 UART: [state] WD Timer not started. Device not locked for debugging
626,399 UART: [kat] SHA2-256
816,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,097 UART: [kat] ++
827,611 UART: [kat] sha1
838,979 UART: [kat] SHA2-256
841,985 UART: [kat] SHA2-384
848,990 UART: [kat] SHA2-512-ACC
851,612 UART: [kat] ECC-384
3,290,603 UART: [kat] HMAC-384Kdf
3,304,825 UART: [kat] LMS
3,836,486 UART: [kat] --
3,840,769 UART: [cold-reset] ++
3,842,222 UART: [fht] FHT @ 0x50003400
3,853,961 UART: [idev] ++
3,854,645 UART: [idev] CDI.KEYID = 6
3,855,616 UART: [idev] SUBJECT.KEYID = 7
3,856,832 UART: [idev] UDS.KEYID = 0
3,859,756 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,308 UART: [idev] Erasing UDS.KEYID = 0
6,332,170 UART: [idev] Sha1 KeyId Algorithm
6,353,637 UART: [idev] --
6,359,737 UART: [ldev] ++
6,360,431 UART: [ldev] CDI.KEYID = 6
6,361,504 UART: [ldev] SUBJECT.KEYID = 5
6,362,608 UART: [ldev] AUTHORITY.KEYID = 7
6,363,784 UART: [ldev] FE.KEYID = 1
6,375,891 UART: [ldev] Erasing FE.KEYID = 1
8,851,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,922 UART: [ldev] --
10,644,718 UART: [fwproc] Wait for Commands...
10,646,282 UART: [fwproc] Recv command 0x46574c44
10,648,607 UART: [fwproc] Recv'd Img size: 114168 bytes
15,278,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,367,488 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,483,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,025,497 >>> mbox cmd response: success
16,027,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,170,915 UART: [afmc] ++
16,171,553 UART: [afmc] CDI.KEYID = 6
16,172,630 UART: [afmc] SUBJECT.KEYID = 7
16,173,741 UART: [afmc] AUTHORITY.KEYID = 5
18,531,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,252,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,254,089 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
20,269,216 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
20,284,414 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
20,299,229 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
20,322,795 UART: [afmc] --
20,327,196 UART: [cold-reset] --
20,331,818 UART: [state] Locking Datavault
20,336,968 UART: [state] Locking PCR0, PCR1 and PCR31
20,339,160 UART: [state] Locking ICCM
20,340,504 UART: [exit] Launching FMC @ 0x40000130
20,349,132 UART:
20,349,407 UART: Running Caliptra FMC ...
20,350,516 UART:
20,350,680 UART: [state] CFI Enabled
20,358,784 UART: [fht] FMC Alias Private Key: 7
22,115,483 UART: [art] Extend RT PCRs Done
22,116,737 UART: [art] Lock RT PCRs Done
22,118,498 UART: [art] Populate DV Done
22,123,987 UART: [fht] FMC Alias Private Key: 7
22,125,692 UART: [art] Derive CDI
22,126,508 UART: [art] Store in in slot 0x4
22,169,212 UART: [art] Derive Key Pair
22,170,215 UART: [art] Store priv key in slot 0x5
24,596,531 UART: [art] Derive Key Pair - Done
24,609,475 UART: [art] Signing Cert with AUTHO
24,610,781 UART: RITY.KEYID = 7
26,316,033 UART: [art] Erasing AUTHORITY.KEYID = 7
26,317,546 UART: [art] PUB.X = F783B2AFA3607E593DC8AB195A2414C7547DEDC8F43BB539F724A0BCB8A3B642E9B999D897CC88C55E97028507022A19
26,324,793 UART: [art] PUB.Y = 865F2ED75B8F15BA4D7E109F73A2A4D8C327FBD57934B70524E5829EB02531C93D3F59C60975CF5FCA23EC6709A22078
26,332,081 UART: [art] SIG.R = 707C80F0B69BFE266C9AC0AB1BED45D0B8ED4D8B83037851AC229E1A78F80E20DE81D94727CF2505A3C1E15B79A086BE
26,339,476 UART: [art] SIG.S = 5C0FF55768D06E16396581291C8271B0D077FC181ADDF5FF41D471B6F69A551E4EF940AB66C1E6421BD01D6EE2BDAB5A
27,318,722 UART: Caliptra RT
27,319,445 UART: [state] CFI Enabled
27,435,972 UART: [rt] RT listening for mailbox commands...
27,438,783 UART:
27,439,032 UART: Running Caliptra ROM ...
27,440,143 UART:
27,440,412 UART: [state] CFI Enabled
27,453,806 UART: [state] LifecycleState = Unprovisioned
27,455,635 UART: [state] DebugLocked = No
27,457,064 UART: [state] WD Timer not started. Device not locked for debugging
27,461,573 UART: [kat] SHA2-256
27,651,507 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,662,264 UART: [kat] ++
27,662,746 UART: [kat] sha1
27,673,637 UART: [kat] SHA2-256
27,676,658 UART: [kat] SHA2-384
27,683,567 UART: [kat] SHA2-512-ACC
27,686,138 UART: [kat] ECC-384
30,127,973 UART: [kat] HMAC-384Kdf
30,141,680 UART: [kat] LMS
30,673,298 UART: [kat] --
30,676,255 UART: [update-reset] ++
30,743,471 >>> mbox cmd response: failed
30,745,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,888,686 UART: ROM Non-Fatal Error: 0x000B003D
30,890,108 UART: [state] Locking Datavault
30,891,268 UART: [state] Locking PCR0, PCR1 and PCR31
30,892,805 UART: [state] Locking ICCM
30,893,711 UART: [exit] Launching FMC @ 0x40000130
30,895,133 UART:
30,895,291 UART: Running Caliptra FMC ...
30,896,388 UART:
30,896,542 UART: [state] CFI Enabled
30,897,462 UART: [art] Extend RT PCRs Done
30,898,599 UART: [art] Lock RT PCRs Done
30,899,687 UART: [art] Populate DV Done
30,900,667 UART: [fht] FMC Alias Private Key: 7
30,901,987 UART: [art] Derive CDI
30,902,742 UART: [art] Store in in slot 0x4
30,903,915 UART: [art] Derive Key Pair
30,905,115 UART: [art] Store priv key in slot 0x5
33,291,432 UART: [art] Derive Key Pair - Done
33,304,657 UART: [art] Signing Cert with AUTHO
33,306,147 UART: RITY.KEYID = 7
35,011,680 UART: [art] Erasing AUTHORITY.KEYID = 7
35,013,184 UART: [art] PUB.X = F783B2AFA3607E593DC8AB195A2414C7547DEDC8F43BB539F724A0BCB8A3B642E9B999D897CC88C55E97028507022A19
35,020,484 UART: [art] PUB.Y = 865F2ED75B8F15BA4D7E109F73A2A4D8C327FBD57934B70524E5829EB02531C93D3F59C60975CF5FCA23EC6709A22078
35,027,734 UART: [art] SIG.R = 707C80F0B69BFE266C9AC0AB1BED45D0B8ED4D8B83037851AC229E1A78F80E20DE81D94727CF2505A3C1E15B79A086BE
35,035,156 UART: [art] SIG.S = 5C0FF55768D06E16396581291C8271B0D077FC181ADDF5FF41D471B6F69A551E4EF940AB66C1E6421BD01D6EE2BDAB5A
36,014,366 UART: Caliptra RT
36,015,081 UART: [state] CFI Enabled
36,303,890 UART: [rt] RT listening for mailbox commands...
36,306,581 UART:
36,306,748 UART: Running Caliptra ROM ...
36,307,857 UART:
36,308,231 UART: [state] CFI Enabled
40,319,271 UART: [state] LifecycleState = Unprovisioned
40,321,183 UART: [state] DebugLocked = No
40,323,089 UART: [state] WD Timer not started. Device not locked for debugging
40,326,740 UART: [kat] SHA2-256
40,516,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,527,197 UART: [kat] ++
40,527,712 UART: [kat] sha1
40,539,515 UART: [kat] SHA2-256
40,542,532 UART: [kat] SHA2-384
40,549,652 UART: [kat] SHA2-512-ACC
40,552,224 UART: [kat] ECC-384
42,994,839 UART: [kat] HMAC-384Kdf
43,006,695 UART: [kat] LMS
43,538,324 UART: [kat] --
43,543,121 UART: [update-reset] ++
48,186,043 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,190,067 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
48,796,627 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,760,416 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,074,725 >>> mbox cmd response: success
16,076,915 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
20,331,867 UART:
20,332,293 UART: Running Caliptra FMC ...
20,333,602 UART:
20,333,779 UART: [state] CFI Enabled
20,341,436 UART: [fht] FMC Alias Private Key: 7
22,097,992 UART: [art] Extend RT PCRs Done
22,099,224 UART: [art] Lock RT PCRs Done
22,100,753 UART: [art] Populate DV Done
22,106,108 UART: [fht] FMC Alias Private Key: 7
22,107,716 UART: [art] Derive CDI
22,108,491 UART: [art] Store in in slot 0x4
22,150,875 UART: [art] Derive Key Pair
22,151,878 UART: [art] Store priv key in slot 0x5
24,578,382 UART: [art] Derive Key Pair - Done
24,591,350 UART: [art] Signing Cert with AUTHO
24,592,709 UART: RITY.KEYID = 7
26,298,397 UART: [art] Erasing AUTHORITY.KEYID = 7
26,299,886 UART: [art] PUB.X = A8FF295CA80469F60B09D832A9DFD2DF5D0C38B2712D0E2D39926FAF022CF709380DEAFC93B258E32BD5CB2A5428B7F2
26,307,151 UART: [art] PUB.Y = AF75A6F762BE1FD3B30A0A52BB674863CDF80FE9811951AE9307E73A8603CAEEEA0485262F56B464C86DC90A2CF7C4F4
26,314,433 UART: [art] SIG.R = 911C791A4569F64F2C15110DBE7A97BABA854D89643C054BA81F31DC0C964523FA1BCCCF85A1D6311BACF2A9E6320AF1
26,321,837 UART: [art] SIG.S = E87601D97EBFAB8B5E35D93FE5D7B5E8DB5C281B65F378197DB4786DCB2F76D6D2B1CBCE6A92355778C811E0717ECEF0
27,300,681 UART: Caliptra RT
27,301,396 UART: [state] CFI Enabled
27,419,600 UART: [rt] RT listening for mailbox commands...
30,622,413 >>> mbox cmd response: failed
30,624,223 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,767,700 UART:
30,768,030 UART: Running Caliptra FMC ...
30,769,096 UART:
30,769,256 UART: [state] CFI Enabled
30,770,183 UART: [art] Extend RT PCRs Done
30,771,327 UART: [art] Lock RT PCRs Done
30,772,393 UART: [art] Populate DV Done
30,773,502 UART: [fht] FMC Alias Private Key: 7
30,774,822 UART: [art] Derive CDI
30,775,560 UART: [art] Store in in slot 0x4
30,776,727 UART: [art] Derive Key Pair
30,777,667 UART: [art] Store priv key in slot 0x5
33,162,780 UART: [art] Derive Key Pair - Done
33,176,163 UART: [art] Signing Cert with AUTHO
33,177,472 UART: RITY.KEYID = 7
34,882,645 UART: [art] Erasing AUTHORITY.KEYID = 7
34,884,138 UART: [art] PUB.X = A8FF295CA80469F60B09D832A9DFD2DF5D0C38B2712D0E2D39926FAF022CF709380DEAFC93B258E32BD5CB2A5428B7F2
34,891,449 UART: [art] PUB.Y = AF75A6F762BE1FD3B30A0A52BB674863CDF80FE9811951AE9307E73A8603CAEEEA0485262F56B464C86DC90A2CF7C4F4
34,898,701 UART: [art] SIG.R = 911C791A4569F64F2C15110DBE7A97BABA854D89643C054BA81F31DC0C964523FA1BCCCF85A1D6311BACF2A9E6320AF1
34,906,081 UART: [art] SIG.S = E87601D97EBFAB8B5E35D93FE5D7B5E8DB5C281B65F378197DB4786DCB2F76D6D2B1CBCE6A92355778C811E0717ECEF0
35,884,710 UART: Caliptra RT
35,885,431 UART: [state] CFI Enabled
36,174,510 UART: [rt] RT listening for mailbox commands...
48,976,850 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,651 UART: [kat] SHA2-256
892,589 UART: [kat] SHA2-384
895,202 UART: [kat] SHA2-512-ACC
897,103 UART: [kat] ECC-384
902,942 UART: [kat] HMAC-384Kdf
907,648 UART: [kat] LMS
1,475,844 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,787 UART: [fht] Storing FHT @ 0x50003400
1,479,602 UART: [idev] ++
1,479,770 UART: [idev] CDI.KEYID = 6
1,480,130 UART: [idev] SUBJECT.KEYID = 7
1,480,554 UART: [idev] UDS.KEYID = 0
1,480,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,550 UART: [idev] Erasing UDS.KEYID = 0
1,505,300 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,882 UART: [idev] --
1,514,885 UART: [ldev] ++
1,515,053 UART: [ldev] CDI.KEYID = 6
1,515,416 UART: [ldev] SUBJECT.KEYID = 5
1,515,842 UART: [ldev] AUTHORITY.KEYID = 7
1,516,305 UART: [ldev] FE.KEYID = 1
1,521,441 UART: [ldev] Erasing FE.KEYID = 1
1,546,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,252 UART: [ldev] --
1,585,721 UART: [fwproc] Waiting for Commands...
1,586,578 UART: [fwproc] Received command 0x46574c44
1,587,369 UART: [fwproc] Received Image of size 114168 bytes
5,081,281 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,109,891 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,139,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,274,836 >>> mbox cmd response: success
5,274,836 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,276,022 UART: [afmc] ++
5,276,190 UART: [afmc] CDI.KEYID = 6
5,276,552 UART: [afmc] SUBJECT.KEYID = 7
5,276,977 UART: [afmc] AUTHORITY.KEYID = 5
5,311,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,328,225 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,329,005 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,334,714 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,340,606 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,346,307 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,354,257 UART: [afmc] --
5,355,345 UART: [cold-reset] --
5,356,247 UART: [state] Locking Datavault
5,357,302 UART: [state] Locking PCR0, PCR1 and PCR31
5,357,906 UART: [state] Locking ICCM
5,358,352 UART: [exit] Launching FMC @ 0x40000130
5,363,681 UART:
5,363,697 UART: Running Caliptra FMC ...
5,364,105 UART:
5,364,159 UART: [state] CFI Enabled
5,374,791 UART: [fht] FMC Alias Private Key: 7
5,482,259 UART: [art] Extend RT PCRs Done
5,482,687 UART: [art] Lock RT PCRs Done
5,484,489 UART: [art] Populate DV Done
5,492,705 UART: [fht] FMC Alias Private Key: 7
5,493,801 UART: [art] Derive CDI
5,494,081 UART: [art] Store in in slot 0x4
5,579,710 UART: [art] Derive Key Pair
5,580,070 UART: [art] Store priv key in slot 0x5
5,593,044 UART: [art] Derive Key Pair - Done
5,607,869 UART: [art] Signing Cert with AUTHO
5,608,349 UART: RITY.KEYID = 7
5,623,451 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,216 UART: [art] PUB.X = E2B580C4DE3E616B49C5006125F1047569D4E8C26F145D81D3F076B6B975E5D6B0846752E240C7170C41C2543EB152DC
5,630,954 UART: [art] PUB.Y = 1DE5FB61B6E9F72823D84FCFDDBCEFEFE8A254AF78B876C0F43EC614D1BD4A68C46767222D6FC5A8FBCCC6C116B078DC
5,637,934 UART: [art] SIG.R = 1B9CE75E10003685011F63657A4409FD55B832E659D95E025B2626800DFAFA9C1D86322998D783C7E946A92D1DFB51B2
5,644,666 UART: [art] SIG.S = EFD09018E560BA1CFB3C4536B2401A83869F99E049B1664FB1263AC024158F8DEFE451ED343E6B84C932A04D6860D60F
5,668,778 UART: Caliptra RT
5,669,031 UART: [state] CFI Enabled
5,776,592 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,778,725 UART:
5,778,741 UART: Running Caliptra ROM ...
5,779,149 UART:
5,779,203 UART: [state] CFI Enabled
5,781,765 UART: [state] LifecycleState = Unprovisioned
5,782,420 UART: [state] DebugLocked = No
5,782,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,784,497 UART: [kat] SHA2-256
6,578,428 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,582,543 UART: [kat] ++
6,582,695 UART: [kat] sha1
6,586,995 UART: [kat] SHA2-256
6,588,933 UART: [kat] SHA2-384
6,591,694 UART: [kat] SHA2-512-ACC
6,593,594 UART: [kat] ECC-384
6,599,041 UART: [kat] HMAC-384Kdf
6,603,633 UART: [kat] LMS
7,171,829 UART: [kat] --
7,172,822 UART: [update-reset] ++
7,213,087 >>> mbox cmd response: failed
7,213,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
7,213,509 UART: ROM Non-Fatal Error: 0x000B003D
7,214,391 UART: [state] Locking Datavault
7,215,401 UART: [state] Locking PCR0, PCR1 and PCR31
7,216,005 UART: [state] Locking ICCM
7,216,533 UART: [exit] Launching FMC @ 0x40000130
7,221,862 UART:
7,221,878 UART: Running Caliptra FMC ...
7,222,286 UART:
7,222,340 UART: [state] CFI Enabled
7,311,639 UART: [art] Extend RT PCRs Done
7,312,067 UART: [art] Lock RT PCRs Done
7,313,246 UART: [art] Populate DV Done
7,321,812 UART: [fht] FMC Alias Private Key: 7
7,322,840 UART: [art] Derive CDI
7,323,120 UART: [art] Store in in slot 0x4
7,408,867 UART: [art] Derive Key Pair
7,409,227 UART: [art] Store priv key in slot 0x5
7,423,131 UART: [art] Derive Key Pair - Done
7,438,012 UART: [art] Signing Cert with AUTHO
7,438,492 UART: RITY.KEYID = 7
7,453,428 UART: [art] Erasing AUTHORITY.KEYID = 7
7,454,193 UART: [art] PUB.X = E2B580C4DE3E616B49C5006125F1047569D4E8C26F145D81D3F076B6B975E5D6B0846752E240C7170C41C2543EB152DC
7,460,931 UART: [art] PUB.Y = 1DE5FB61B6E9F72823D84FCFDDBCEFEFE8A254AF78B876C0F43EC614D1BD4A68C46767222D6FC5A8FBCCC6C116B078DC
7,467,911 UART: [art] SIG.R = 1B9CE75E10003685011F63657A4409FD55B832E659D95E025B2626800DFAFA9C1D86322998D783C7E946A92D1DFB51B2
7,474,643 UART: [art] SIG.S = EFD09018E560BA1CFB3C4536B2401A83869F99E049B1664FB1263AC024158F8DEFE451ED343E6B84C932A04D6860D60F
7,499,611 UART: Caliptra RT
7,499,864 UART: [state] CFI Enabled
7,779,175 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,780,509 UART:
7,780,525 UART: Running Caliptra ROM ...
7,780,933 UART:
7,780,987 UART: [state] CFI Enabled
7,783,515 UART: [state] LifecycleState = Unprovisioned
7,784,170 UART: [state] DebugLocked = No
7,784,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,786,321 UART: [kat] SHA2-256
8,580,252 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,584,367 UART: [kat] ++
8,584,519 UART: [kat] sha1
8,588,881 UART: [kat] SHA2-256
8,590,819 UART: [kat] SHA2-384
8,593,652 UART: [kat] SHA2-512-ACC
8,595,552 UART: [kat] ECC-384
8,601,201 UART: [kat] HMAC-384Kdf
8,605,855 UART: [kat] LMS
9,174,051 UART: [kat] --
9,175,088 UART: [update-reset] ++
12,705,136 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,706,186 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
12,855,816 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,199,862 >>> mbox cmd response: success
5,199,862 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,261,607 UART:
5,261,623 UART: Running Caliptra FMC ...
5,262,031 UART:
5,262,085 UART: [state] CFI Enabled
5,272,529 UART: [fht] FMC Alias Private Key: 7
5,379,583 UART: [art] Extend RT PCRs Done
5,380,011 UART: [art] Lock RT PCRs Done
5,381,289 UART: [art] Populate DV Done
5,389,629 UART: [fht] FMC Alias Private Key: 7
5,390,725 UART: [art] Derive CDI
5,391,005 UART: [art] Store in in slot 0x4
5,476,316 UART: [art] Derive Key Pair
5,476,676 UART: [art] Store priv key in slot 0x5
5,489,780 UART: [art] Derive Key Pair - Done
5,504,475 UART: [art] Signing Cert with AUTHO
5,504,955 UART: RITY.KEYID = 7
5,519,851 UART: [art] Erasing AUTHORITY.KEYID = 7
5,520,616 UART: [art] PUB.X = 1CBBC5203F58E2A785713182C7D1A7F1BDCA9205503AB962BD285D810E02DACA8A3D959AC5EC9DCB268E318371BF84A0
5,527,391 UART: [art] PUB.Y = 4E42D1A288763CA0E065C35171B3659EC60B010F5B6B37A26FD019F3FD939C589E6069BB324B76358066BC18FF9D3F45
5,534,332 UART: [art] SIG.R = C304E98D4C0ED306AE4545A9B2C7ADBED018641EE5AFF106429B1E3B890BEC296EC4E734E0AF3E25FC65E142A820896A
5,541,103 UART: [art] SIG.S = 34FDB655A0C5F93A13C8411D384ED524109093A277ECC9742EF331B56781570B9C611D738CD9546B3ACDC9436899C5BD
5,564,795 UART: Caliptra RT
5,565,048 UART: [state] CFI Enabled
5,673,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,992,959 >>> mbox cmd response: failed
6,992,959 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,998,800 UART:
6,998,816 UART: Running Caliptra FMC ...
6,999,224 UART:
6,999,278 UART: [state] CFI Enabled
7,087,925 UART: [art] Extend RT PCRs Done
7,088,353 UART: [art] Lock RT PCRs Done
7,089,766 UART: [art] Populate DV Done
7,097,868 UART: [fht] FMC Alias Private Key: 7
7,098,992 UART: [art] Derive CDI
7,099,272 UART: [art] Store in in slot 0x4
7,184,705 UART: [art] Derive Key Pair
7,185,065 UART: [art] Store priv key in slot 0x5
7,198,121 UART: [art] Derive Key Pair - Done
7,212,764 UART: [art] Signing Cert with AUTHO
7,213,244 UART: RITY.KEYID = 7
7,228,214 UART: [art] Erasing AUTHORITY.KEYID = 7
7,228,979 UART: [art] PUB.X = 1CBBC5203F58E2A785713182C7D1A7F1BDCA9205503AB962BD285D810E02DACA8A3D959AC5EC9DCB268E318371BF84A0
7,235,754 UART: [art] PUB.Y = 4E42D1A288763CA0E065C35171B3659EC60B010F5B6B37A26FD019F3FD939C589E6069BB324B76358066BC18FF9D3F45
7,242,695 UART: [art] SIG.R = C304E98D4C0ED306AE4545A9B2C7ADBED018641EE5AFF106429B1E3B890BEC296EC4E734E0AF3E25FC65E142A820896A
7,249,466 UART: [art] SIG.S = 34FDB655A0C5F93A13C8411D384ED524109093A277ECC9742EF331B56781570B9C611D738CD9546B3ACDC9436899C5BD
7,273,948 UART: Caliptra RT
7,274,201 UART: [state] CFI Enabled
7,554,678 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,588,971 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,828 UART: [kat] SHA2-256
892,766 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
902,821 UART: [kat] HMAC-384Kdf
907,371 UART: [kat] LMS
1,475,567 UART: [kat] --
1,476,552 UART: [cold-reset] ++
1,477,076 UART: [fht] Storing FHT @ 0x50003400
1,479,863 UART: [idev] ++
1,480,031 UART: [idev] CDI.KEYID = 6
1,480,391 UART: [idev] SUBJECT.KEYID = 7
1,480,815 UART: [idev] UDS.KEYID = 0
1,481,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,751 UART: [idev] Erasing UDS.KEYID = 0
1,505,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,801 UART: [idev] --
1,514,880 UART: [ldev] ++
1,515,048 UART: [ldev] CDI.KEYID = 6
1,515,411 UART: [ldev] SUBJECT.KEYID = 5
1,515,837 UART: [ldev] AUTHORITY.KEYID = 7
1,516,300 UART: [ldev] FE.KEYID = 1
1,521,480 UART: [ldev] Erasing FE.KEYID = 1
1,546,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,563 UART: [ldev] --
1,585,892 UART: [fwproc] Waiting for Commands...
1,586,509 UART: [fwproc] Received command 0x46574c44
1,587,300 UART: [fwproc] Received Image of size 114168 bytes
5,232,482 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,259,958 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
5,289,310 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
5,425,029 >>> mbox cmd response: success
5,425,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,426,241 UART: [afmc] ++
5,426,409 UART: [afmc] CDI.KEYID = 6
5,426,771 UART: [afmc] SUBJECT.KEYID = 7
5,427,196 UART: [afmc] AUTHORITY.KEYID = 5
5,462,518 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,478,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,479,326 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
5,485,035 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
5,490,927 UART: [afmc] SIG.R = A16B7A8ECF1CEA065DCB3C9A57D7141C6B939EF0E4DAA6CA575FF1CC91857BBA857E84BC533F75D9BAB2564EF140000B
5,496,628 UART: [afmc] SIG.S = 186540FF2768235FFC649994F8211E827C773E77161213170429ECA8F9D4E9803DCE906E7D37A51FBC7100C77854F6AA
5,504,380 UART: [afmc] --
5,505,362 UART: [cold-reset] --
5,506,270 UART: [state] Locking Datavault
5,507,711 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,315 UART: [state] Locking ICCM
5,508,861 UART: [exit] Launching FMC @ 0x40000130
5,514,190 UART:
5,514,206 UART: Running Caliptra FMC ...
5,514,614 UART:
5,514,757 UART: [state] CFI Enabled
5,525,457 UART: [fht] FMC Alias Private Key: 7
5,633,279 UART: [art] Extend RT PCRs Done
5,633,707 UART: [art] Lock RT PCRs Done
5,635,299 UART: [art] Populate DV Done
5,643,525 UART: [fht] FMC Alias Private Key: 7
5,644,595 UART: [art] Derive CDI
5,644,875 UART: [art] Store in in slot 0x4
5,730,672 UART: [art] Derive Key Pair
5,731,032 UART: [art] Store priv key in slot 0x5
5,744,796 UART: [art] Derive Key Pair - Done
5,759,612 UART: [art] Signing Cert with AUTHO
5,760,092 UART: RITY.KEYID = 7
5,775,362 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,127 UART: [art] PUB.X = 366C26CDF7CC0F5C21F55AE10C67368BA319463BDBB7F121D4417B1C2382AEB77E8076F34AEE801B30709744F7B92AE6
5,782,899 UART: [art] PUB.Y = 113AE71D777B880AFBB33C63BA8D29878CE831E4EB9B79636067756A24B0B1BBC2C3ECDC37F027A1A9DFDA1B5A568FEB
5,789,866 UART: [art] SIG.R = BB4A20E2A0DD0192D7547C40F6987470424DD3C783EDF1C38AB56BEC95B8FA45D766829C7AE2657592F6CEB9E20F39D2
5,796,640 UART: [art] SIG.S = 8400C885DC7479A84A0F40B2D1E159BB7CA200FDBD9FEBD44B45D6DED422C22048FC698F7909A199D7591EB88FEAD973
5,820,605 UART: Caliptra RT
5,820,950 UART: [state] CFI Enabled
5,929,160 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,931,077 UART:
5,931,093 UART: Running Caliptra ROM ...
5,931,501 UART:
5,931,642 UART: [state] CFI Enabled
5,934,078 UART: [state] LifecycleState = Unprovisioned
5,934,733 UART: [state] DebugLocked = No
5,935,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,936,954 UART: [kat] SHA2-256
6,730,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,735,000 UART: [kat] ++
6,735,152 UART: [kat] sha1
6,739,312 UART: [kat] SHA2-256
6,741,250 UART: [kat] SHA2-384
6,743,823 UART: [kat] SHA2-512-ACC
6,745,723 UART: [kat] ECC-384
6,751,402 UART: [kat] HMAC-384Kdf
6,756,050 UART: [kat] LMS
7,324,246 UART: [kat] --
7,324,789 UART: [update-reset] ++
7,364,814 >>> mbox cmd response: failed
7,364,814 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
7,365,242 UART: ROM Non-Fatal Error: 0x000B003D
7,366,094 UART: [state] Locking Datavault
7,366,958 UART: [state] Locking PCR0, PCR1 and PCR31
7,367,562 UART: [state] Locking ICCM
7,368,036 UART: [exit] Launching FMC @ 0x40000130
7,373,365 UART:
7,373,381 UART: Running Caliptra FMC ...
7,373,789 UART:
7,373,932 UART: [state] CFI Enabled
7,462,935 UART: [art] Extend RT PCRs Done
7,463,363 UART: [art] Lock RT PCRs Done
7,464,528 UART: [art] Populate DV Done
7,472,496 UART: [fht] FMC Alias Private Key: 7
7,473,596 UART: [art] Derive CDI
7,473,876 UART: [art] Store in in slot 0x4
7,559,613 UART: [art] Derive Key Pair
7,559,973 UART: [art] Store priv key in slot 0x5
7,573,191 UART: [art] Derive Key Pair - Done
7,587,863 UART: [art] Signing Cert with AUTHO
7,588,343 UART: RITY.KEYID = 7
7,603,433 UART: [art] Erasing AUTHORITY.KEYID = 7
7,604,198 UART: [art] PUB.X = 366C26CDF7CC0F5C21F55AE10C67368BA319463BDBB7F121D4417B1C2382AEB77E8076F34AEE801B30709744F7B92AE6
7,610,970 UART: [art] PUB.Y = 113AE71D777B880AFBB33C63BA8D29878CE831E4EB9B79636067756A24B0B1BBC2C3ECDC37F027A1A9DFDA1B5A568FEB
7,617,937 UART: [art] SIG.R = BB4A20E2A0DD0192D7547C40F6987470424DD3C783EDF1C38AB56BEC95B8FA45D766829C7AE2657592F6CEB9E20F39D2
7,624,711 UART: [art] SIG.S = 8400C885DC7479A84A0F40B2D1E159BB7CA200FDBD9FEBD44B45D6DED422C22048FC698F7909A199D7591EB88FEAD973
7,648,650 UART: Caliptra RT
7,648,995 UART: [state] CFI Enabled
7,929,343 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,930,713 UART:
7,930,729 UART: Running Caliptra ROM ...
7,931,137 UART:
7,931,278 UART: [state] CFI Enabled
7,934,124 UART: [state] LifecycleState = Unprovisioned
7,934,779 UART: [state] DebugLocked = No
7,935,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,937,126 UART: [kat] SHA2-256
8,731,057 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,735,172 UART: [kat] ++
8,735,324 UART: [kat] sha1
8,739,674 UART: [kat] SHA2-256
8,741,612 UART: [kat] SHA2-384
8,744,495 UART: [kat] SHA2-512-ACC
8,746,395 UART: [kat] ECC-384
8,752,186 UART: [kat] HMAC-384Kdf
8,756,916 UART: [kat] LMS
9,325,112 UART: [kat] --
9,325,747 UART: [update-reset] ++
13,006,681 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,007,913 UART: [update-reset] Loading Runtime at address 0x40005000 len 89484
13,157,543 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,602 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,275,609 >>> mbox cmd response: success
5,275,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,336,792 UART:
5,336,808 UART: Running Caliptra FMC ...
5,337,216 UART:
5,337,359 UART: [state] CFI Enabled
5,347,609 UART: [fht] FMC Alias Private Key: 7
5,455,645 UART: [art] Extend RT PCRs Done
5,456,073 UART: [art] Lock RT PCRs Done
5,457,375 UART: [art] Populate DV Done
5,465,423 UART: [fht] FMC Alias Private Key: 7
5,466,529 UART: [art] Derive CDI
5,466,809 UART: [art] Store in in slot 0x4
5,553,074 UART: [art] Derive Key Pair
5,553,434 UART: [art] Store priv key in slot 0x5
5,566,750 UART: [art] Derive Key Pair - Done
5,581,674 UART: [art] Signing Cert with AUTHO
5,582,154 UART: RITY.KEYID = 7
5,597,228 UART: [art] Erasing AUTHORITY.KEYID = 7
5,597,993 UART: [art] PUB.X = 20B1D5A50472B9FA8B563B69DD98A74EE0DF172616A638BFCA5D9E634CF069E9360DEA6A2E9CDB5DE3B2ADB7C19C0EE9
5,604,778 UART: [art] PUB.Y = 7B9B9469C7BE3EFD5EF1DFE283E1FE7783031DE0FCEF3CA6003DAFAB977D5F969B1EECF21EA72748CF1056350FE468FC
5,611,726 UART: [art] SIG.R = 972A784E0A51C5F7783007EDE2D20AD4F0A4235A4B4B7E272CD1AA45C8DEFEDC6DD9FC34D4AFF243E4B05D30607A4D88
5,618,507 UART: [art] SIG.S = 89CD63FE6297A701934ADCFD32E496C045B97C44DD48431178703B3AE0E72F9B30B6F040C35FA7A7CA684419AC2DD679
5,641,797 UART: Caliptra RT
5,642,142 UART: [state] CFI Enabled
5,751,160 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,070,657 >>> mbox cmd response: failed
7,070,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
7,076,366 UART:
7,076,382 UART: Running Caliptra FMC ...
7,076,790 UART:
7,076,933 UART: [state] CFI Enabled
7,165,730 UART: [art] Extend RT PCRs Done
7,166,158 UART: [art] Lock RT PCRs Done
7,167,097 UART: [art] Populate DV Done
7,175,575 UART: [fht] FMC Alias Private Key: 7
7,176,655 UART: [art] Derive CDI
7,176,935 UART: [art] Store in in slot 0x4
7,262,634 UART: [art] Derive Key Pair
7,262,994 UART: [art] Store priv key in slot 0x5
7,276,824 UART: [art] Derive Key Pair - Done
7,291,466 UART: [art] Signing Cert with AUTHO
7,291,946 UART: RITY.KEYID = 7
7,307,176 UART: [art] Erasing AUTHORITY.KEYID = 7
7,307,941 UART: [art] PUB.X = 20B1D5A50472B9FA8B563B69DD98A74EE0DF172616A638BFCA5D9E634CF069E9360DEA6A2E9CDB5DE3B2ADB7C19C0EE9
7,314,726 UART: [art] PUB.Y = 7B9B9469C7BE3EFD5EF1DFE283E1FE7783031DE0FCEF3CA6003DAFAB977D5F969B1EECF21EA72748CF1056350FE468FC
7,321,674 UART: [art] SIG.R = 972A784E0A51C5F7783007EDE2D20AD4F0A4235A4B4B7E272CD1AA45C8DEFEDC6DD9FC34D4AFF243E4B05D30607A4D88
7,328,455 UART: [art] SIG.S = 89CD63FE6297A701934ADCFD32E496C045B97C44DD48431178703B3AE0E72F9B30B6F040C35FA7A7CA684419AC2DD679
7,351,839 UART: Caliptra RT
7,352,184 UART: [state] CFI Enabled
7,632,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
12,742,346 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 3.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
893,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,729 UART: [kat] ++
897,881 UART: [kat] sha1
901,987 UART: [kat] SHA2-256
903,927 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,962 UART: [kat] LMS
1,171,290 UART: [kat] --
1,172,117 UART: [cold-reset] ++
1,172,671 UART: [fht] FHT @ 0x50003400
1,175,458 UART: [idev] ++
1,175,626 UART: [idev] CDI.KEYID = 6
1,175,986 UART: [idev] SUBJECT.KEYID = 7
1,176,410 UART: [idev] UDS.KEYID = 0
1,176,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,962 UART: [idev] Erasing UDS.KEYID = 0
1,201,301 UART: [idev] Sha1 KeyId Algorithm
1,209,949 UART: [idev] --
1,211,013 UART: [ldev] ++
1,211,181 UART: [ldev] CDI.KEYID = 6
1,211,544 UART: [ldev] SUBJECT.KEYID = 5
1,211,970 UART: [ldev] AUTHORITY.KEYID = 7
1,212,433 UART: [ldev] FE.KEYID = 1
1,217,499 UART: [ldev] Erasing FE.KEYID = 1
1,243,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,597 UART: [ldev] --
1,282,940 UART: [fwproc] Wait for Commands...
1,283,656 UART: [fwproc] Recv command 0x46574c44
1,284,384 UART: [fwproc] Recv'd Img size: 114168 bytes
3,127,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,155,337 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,184,641 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,320,116 >>> mbox cmd response: success
3,320,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,321,246 UART: [afmc] ++
3,321,414 UART: [afmc] CDI.KEYID = 6
3,321,776 UART: [afmc] SUBJECT.KEYID = 7
3,322,201 UART: [afmc] AUTHORITY.KEYID = 5
3,357,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,373,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,374,396 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,380,105 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,385,997 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,391,708 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,399,481 UART: [afmc] --
3,400,423 UART: [cold-reset] --
3,401,149 UART: [state] Locking Datavault
3,402,230 UART: [state] Locking PCR0, PCR1 and PCR31
3,402,834 UART: [state] Locking ICCM
3,403,316 UART: [exit] Launching FMC @ 0x40000130
3,408,645 UART:
3,408,661 UART: Running Caliptra FMC ...
3,409,069 UART:
3,409,123 UART: [state] CFI Enabled
3,419,391 UART: [fht] FMC Alias Private Key: 7
3,526,801 UART: [art] Extend RT PCRs Done
3,527,229 UART: [art] Lock RT PCRs Done
3,528,753 UART: [art] Populate DV Done
3,536,965 UART: [fht] FMC Alias Private Key: 7
3,537,899 UART: [art] Derive CDI
3,538,179 UART: [art] Store in in slot 0x4
3,623,954 UART: [art] Derive Key Pair
3,624,314 UART: [art] Store priv key in slot 0x5
3,637,056 UART: [art] Derive Key Pair - Done
3,652,106 UART: [art] Signing Cert with AUTHO
3,652,586 UART: RITY.KEYID = 7
3,667,458 UART: [art] Erasing AUTHORITY.KEYID = 7
3,668,223 UART: [art] PUB.X = AB0BF6CA54A8BFCF7FCA8A0269E56F1486726770D6B355B58D987AB5DFEB73CD1FD6BCE6BEE654EF14D48845B83C742E
3,675,011 UART: [art] PUB.Y = 0FF704B651BFDE87BB39AF84F3D4F6BD1B6F0D32307F111FCBECE47E4E42AF05A1D27E368BBF5466B67FA47EF3773CD0
3,681,973 UART: [art] SIG.R = 126F249D1C1FDABED5A2135DE968A987ABF835D1FA1F24581C29C314C827B9548AE392C3CC4C1B41E44D87C077664D0B
3,688,750 UART: [art] SIG.S = 2D7E5FE7FFC10486D9F88E3F31B3B35C1DF34FDBD518B26688BFE2DCBA0F8F5EAD495B9BBC33288CFE64831F9E01D999
3,712,114 UART: Caliptra RT
3,712,367 UART: [state] CFI Enabled
3,818,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,820,500 UART:
3,820,516 UART: Running Caliptra ROM ...
3,820,924 UART:
3,820,979 UART: [state] CFI Enabled
3,823,969 UART: [state] LifecycleState = Unprovisioned
3,824,624 UART: [state] DebugLocked = No
3,825,156 UART: [state] WD Timer not started. Device not locked for debugging
3,826,338 UART: [kat] SHA2-256
4,631,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,636,113 UART: [kat] ++
4,636,265 UART: [kat] sha1
4,640,511 UART: [kat] SHA2-256
4,642,451 UART: [kat] SHA2-384
4,645,324 UART: [kat] SHA2-512-ACC
4,647,224 UART: [kat] ECC-384
4,656,787 UART: [kat] HMAC-384Kdf
4,661,387 UART: [kat] LMS
4,909,715 UART: [kat] --
4,910,341 UART: [update-reset] ++
4,928,346 >>> mbox cmd response: failed
4,928,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,928,578 UART: ROM Non-Fatal Error: 0x000B003D
4,929,568 UART: [state] Locking Datavault
4,930,208 UART: [state] Locking PCR0, PCR1 and PCR31
4,930,812 UART: [state] Locking ICCM
4,931,388 UART: [exit] Launching FMC @ 0x40000130
4,936,717 UART:
4,936,733 UART: Running Caliptra FMC ...
4,937,141 UART:
4,937,195 UART: [state] CFI Enabled
5,026,720 UART: [art] Extend RT PCRs Done
5,027,148 UART: [art] Lock RT PCRs Done
5,028,351 UART: [art] Populate DV Done
5,036,629 UART: [fht] FMC Alias Private Key: 7
5,037,747 UART: [art] Derive CDI
5,038,027 UART: [art] Store in in slot 0x4
5,123,580 UART: [art] Derive Key Pair
5,123,940 UART: [art] Store priv key in slot 0x5
5,136,952 UART: [art] Derive Key Pair - Done
5,152,038 UART: [art] Signing Cert with AUTHO
5,152,518 UART: RITY.KEYID = 7
5,167,504 UART: [art] Erasing AUTHORITY.KEYID = 7
5,168,269 UART: [art] PUB.X = AB0BF6CA54A8BFCF7FCA8A0269E56F1486726770D6B355B58D987AB5DFEB73CD1FD6BCE6BEE654EF14D48845B83C742E
5,175,057 UART: [art] PUB.Y = 0FF704B651BFDE87BB39AF84F3D4F6BD1B6F0D32307F111FCBECE47E4E42AF05A1D27E368BBF5466B67FA47EF3773CD0
5,182,019 UART: [art] SIG.R = 126F249D1C1FDABED5A2135DE968A987ABF835D1FA1F24581C29C314C827B9548AE392C3CC4C1B41E44D87C077664D0B
5,188,796 UART: [art] SIG.S = 2D7E5FE7FFC10486D9F88E3F31B3B35C1DF34FDBD518B26688BFE2DCBA0F8F5EAD495B9BBC33288CFE64831F9E01D999
5,213,154 UART: Caliptra RT
5,213,407 UART: [state] CFI Enabled
5,495,540 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,496,917 UART:
5,496,933 UART: Running Caliptra ROM ...
5,497,341 UART:
5,497,396 UART: [state] CFI Enabled
5,500,028 UART: [state] LifecycleState = Unprovisioned
5,500,683 UART: [state] DebugLocked = No
5,501,185 UART: [state] WD Timer not started. Device not locked for debugging
5,502,325 UART: [kat] SHA2-256
6,307,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,312,100 UART: [kat] ++
6,312,252 UART: [kat] sha1
6,316,592 UART: [kat] SHA2-256
6,318,532 UART: [kat] SHA2-384
6,321,203 UART: [kat] SHA2-512-ACC
6,323,103 UART: [kat] ECC-384
6,332,574 UART: [kat] HMAC-384Kdf
6,337,128 UART: [kat] LMS
6,585,456 UART: [kat] --
6,586,068 UART: [update-reset] ++
8,442,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,443,786 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
8,593,364 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,175,964 >>> mbox cmd response: success
3,175,964 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,238,055 UART:
3,238,071 UART: Running Caliptra FMC ...
3,238,479 UART:
3,238,533 UART: [state] CFI Enabled
3,248,653 UART: [fht] FMC Alias Private Key: 7
3,356,461 UART: [art] Extend RT PCRs Done
3,356,889 UART: [art] Lock RT PCRs Done
3,358,497 UART: [art] Populate DV Done
3,366,493 UART: [fht] FMC Alias Private Key: 7
3,367,621 UART: [art] Derive CDI
3,367,901 UART: [art] Store in in slot 0x4
3,452,940 UART: [art] Derive Key Pair
3,453,300 UART: [art] Store priv key in slot 0x5
3,467,088 UART: [art] Derive Key Pair - Done
3,482,245 UART: [art] Signing Cert with AUTHO
3,482,725 UART: RITY.KEYID = 7
3,497,339 UART: [art] Erasing AUTHORITY.KEYID = 7
3,498,104 UART: [art] PUB.X = F5315CEC2288910A93A37F0BB0375AE6B819CB6D05926828A2905D0846F1F7EEFAD07EE9556A7C1384EC96811CDEB68E
3,504,870 UART: [art] PUB.Y = 7FB4A1A8871B7A1161A1AD8369AC1654D4B2E7BBCD1380C78E73FB544DCDE3E73C2326EBCAFBEB176164AE377ED942DE
3,511,842 UART: [art] SIG.R = B37BD2AC4276CF5CFC3A1C1D1302665CC6D7FD6BAD0AA31B533346EC66E50D91EEDB525150DB3BBF7B362E3796E5C565
3,518,623 UART: [art] SIG.S = F8F62C8883FF0577D3847324D8475993AD43ED28CA456C6D0FD3D1740AB7E005C6AF386422E70396645420FA4782EAF5
3,542,165 UART: Caliptra RT
3,542,418 UART: [state] CFI Enabled
3,649,943 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,645,849 >>> mbox cmd response: failed
4,645,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,651,716 UART:
4,651,732 UART: Running Caliptra FMC ...
4,652,140 UART:
4,652,194 UART: [state] CFI Enabled
4,740,735 UART: [art] Extend RT PCRs Done
4,741,163 UART: [art] Lock RT PCRs Done
4,742,332 UART: [art] Populate DV Done
4,750,626 UART: [fht] FMC Alias Private Key: 7
4,751,768 UART: [art] Derive CDI
4,752,048 UART: [art] Store in in slot 0x4
4,837,257 UART: [art] Derive Key Pair
4,837,617 UART: [art] Store priv key in slot 0x5
4,850,741 UART: [art] Derive Key Pair - Done
4,865,630 UART: [art] Signing Cert with AUTHO
4,866,110 UART: RITY.KEYID = 7
4,881,352 UART: [art] Erasing AUTHORITY.KEYID = 7
4,882,117 UART: [art] PUB.X = F5315CEC2288910A93A37F0BB0375AE6B819CB6D05926828A2905D0846F1F7EEFAD07EE9556A7C1384EC96811CDEB68E
4,888,883 UART: [art] PUB.Y = 7FB4A1A8871B7A1161A1AD8369AC1654D4B2E7BBCD1380C78E73FB544DCDE3E73C2326EBCAFBEB176164AE377ED942DE
4,895,855 UART: [art] SIG.R = B37BD2AC4276CF5CFC3A1C1D1302665CC6D7FD6BAD0AA31B533346EC66E50D91EEDB525150DB3BBF7B362E3796E5C565
4,902,636 UART: [art] SIG.S = F8F62C8883FF0577D3847324D8475993AD43ED28CA456C6D0FD3D1740AB7E005C6AF386422E70396645420FA4782EAF5
4,925,970 UART: Caliptra RT
4,926,223 UART: [state] CFI Enabled
5,210,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,196,724 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
893,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,830 UART: [kat] ++
897,982 UART: [kat] sha1
902,280 UART: [kat] SHA2-256
904,220 UART: [kat] SHA2-384
906,981 UART: [kat] SHA2-512-ACC
908,882 UART: [kat] ECC-384
918,685 UART: [kat] HMAC-384Kdf
923,349 UART: [kat] LMS
1,171,677 UART: [kat] --
1,172,628 UART: [cold-reset] ++
1,173,052 UART: [fht] FHT @ 0x50003400
1,175,551 UART: [idev] ++
1,175,719 UART: [idev] CDI.KEYID = 6
1,176,079 UART: [idev] SUBJECT.KEYID = 7
1,176,503 UART: [idev] UDS.KEYID = 0
1,176,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,615 UART: [idev] Erasing UDS.KEYID = 0
1,201,988 UART: [idev] Sha1 KeyId Algorithm
1,210,436 UART: [idev] --
1,211,502 UART: [ldev] ++
1,211,670 UART: [ldev] CDI.KEYID = 6
1,212,033 UART: [ldev] SUBJECT.KEYID = 5
1,212,459 UART: [ldev] AUTHORITY.KEYID = 7
1,212,922 UART: [ldev] FE.KEYID = 1
1,217,988 UART: [ldev] Erasing FE.KEYID = 1
1,244,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,532 UART: [ldev] --
1,283,975 UART: [fwproc] Wait for Commands...
1,284,567 UART: [fwproc] Recv command 0x46574c44
1,285,295 UART: [fwproc] Recv'd Img size: 114168 bytes
3,133,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,189,522 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,325,091 >>> mbox cmd response: success
3,325,091 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,326,289 UART: [afmc] ++
3,326,457 UART: [afmc] CDI.KEYID = 6
3,326,819 UART: [afmc] SUBJECT.KEYID = 7
3,327,244 UART: [afmc] AUTHORITY.KEYID = 5
3,362,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,537 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,386,246 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,392,138 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,397,849 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,405,552 UART: [afmc] --
3,406,666 UART: [cold-reset] --
3,407,668 UART: [state] Locking Datavault
3,408,959 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,563 UART: [state] Locking ICCM
3,410,223 UART: [exit] Launching FMC @ 0x40000130
3,415,552 UART:
3,415,568 UART: Running Caliptra FMC ...
3,415,976 UART:
3,416,119 UART: [state] CFI Enabled
3,426,731 UART: [fht] FMC Alias Private Key: 7
3,534,469 UART: [art] Extend RT PCRs Done
3,534,897 UART: [art] Lock RT PCRs Done
3,536,255 UART: [art] Populate DV Done
3,544,387 UART: [fht] FMC Alias Private Key: 7
3,545,451 UART: [art] Derive CDI
3,545,731 UART: [art] Store in in slot 0x4
3,631,164 UART: [art] Derive Key Pair
3,631,524 UART: [art] Store priv key in slot 0x5
3,644,802 UART: [art] Derive Key Pair - Done
3,659,724 UART: [art] Signing Cert with AUTHO
3,660,204 UART: RITY.KEYID = 7
3,675,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,676,267 UART: [art] PUB.X = 4B67F885C5DA72E71146B024F31ED10FB43744CB12AC6AF1858E4D7899333E90AE15E05F79DAEEEDDDDCE4CD53185F72
3,683,050 UART: [art] PUB.Y = 612A95AD536FD0FE20AC94C05024FE4BA028E759E135968E937D073E3F3ED242EA7D29C68995ADC01C94380C258A63F9
3,689,998 UART: [art] SIG.R = 866B11EB38B00496323A73A2A352E52108DCC3B6956146B41E4F53B9A680AD7E665176B890C7BCDBE25FDD24C05860B2
3,696,764 UART: [art] SIG.S = 8EF5DE4A998811C55C5FDFEE912E3EDF00CBB624833A30B66C64028B27C26FF9442B9D778F4C7D5FB09EDFA6918BED3D
3,720,128 UART: Caliptra RT
3,720,473 UART: [state] CFI Enabled
3,828,702 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,830,572 UART:
3,830,588 UART: Running Caliptra ROM ...
3,830,996 UART:
3,831,138 UART: [state] CFI Enabled
3,833,590 UART: [state] LifecycleState = Unprovisioned
3,834,245 UART: [state] DebugLocked = No
3,834,869 UART: [state] WD Timer not started. Device not locked for debugging
3,836,057 UART: [kat] SHA2-256
4,641,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,645,832 UART: [kat] ++
4,645,984 UART: [kat] sha1
4,650,236 UART: [kat] SHA2-256
4,652,176 UART: [kat] SHA2-384
4,654,999 UART: [kat] SHA2-512-ACC
4,656,899 UART: [kat] ECC-384
4,666,478 UART: [kat] HMAC-384Kdf
4,671,108 UART: [kat] LMS
4,919,436 UART: [kat] --
4,920,302 UART: [update-reset] ++
4,938,441 >>> mbox cmd response: failed
4,938,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,938,817 UART: ROM Non-Fatal Error: 0x000B003D
4,939,601 UART: [state] Locking Datavault
4,940,375 UART: [state] Locking PCR0, PCR1 and PCR31
4,940,979 UART: [state] Locking ICCM
4,941,549 UART: [exit] Launching FMC @ 0x40000130
4,946,878 UART:
4,946,894 UART: Running Caliptra FMC ...
4,947,302 UART:
4,947,445 UART: [state] CFI Enabled
5,036,662 UART: [art] Extend RT PCRs Done
5,037,090 UART: [art] Lock RT PCRs Done
5,038,457 UART: [art] Populate DV Done
5,046,783 UART: [fht] FMC Alias Private Key: 7
5,047,897 UART: [art] Derive CDI
5,048,177 UART: [art] Store in in slot 0x4
5,133,888 UART: [art] Derive Key Pair
5,134,248 UART: [art] Store priv key in slot 0x5
5,147,718 UART: [art] Derive Key Pair - Done
5,162,434 UART: [art] Signing Cert with AUTHO
5,162,914 UART: RITY.KEYID = 7
5,178,196 UART: [art] Erasing AUTHORITY.KEYID = 7
5,178,961 UART: [art] PUB.X = 4B67F885C5DA72E71146B024F31ED10FB43744CB12AC6AF1858E4D7899333E90AE15E05F79DAEEEDDDDCE4CD53185F72
5,185,744 UART: [art] PUB.Y = 612A95AD536FD0FE20AC94C05024FE4BA028E759E135968E937D073E3F3ED242EA7D29C68995ADC01C94380C258A63F9
5,192,692 UART: [art] SIG.R = 866B11EB38B00496323A73A2A352E52108DCC3B6956146B41E4F53B9A680AD7E665176B890C7BCDBE25FDD24C05860B2
5,199,458 UART: [art] SIG.S = 8EF5DE4A998811C55C5FDFEE912E3EDF00CBB624833A30B66C64028B27C26FF9442B9D778F4C7D5FB09EDFA6918BED3D
5,223,324 UART: Caliptra RT
5,223,669 UART: [state] CFI Enabled
5,506,938 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,508,677 UART:
5,508,693 UART: Running Caliptra ROM ...
5,509,101 UART:
5,509,243 UART: [state] CFI Enabled
5,511,663 UART: [state] LifecycleState = Unprovisioned
5,512,318 UART: [state] DebugLocked = No
5,512,908 UART: [state] WD Timer not started. Device not locked for debugging
5,514,174 UART: [kat] SHA2-256
6,319,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,323,949 UART: [kat] ++
6,324,101 UART: [kat] sha1
6,328,331 UART: [kat] SHA2-256
6,330,271 UART: [kat] SHA2-384
6,333,138 UART: [kat] SHA2-512-ACC
6,335,038 UART: [kat] ECC-384
6,344,465 UART: [kat] HMAC-384Kdf
6,349,009 UART: [kat] LMS
6,597,337 UART: [kat] --
6,598,211 UART: [update-reset] ++
8,460,092 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,461,147 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
8,610,725 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,522 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,168,438 >>> mbox cmd response: success
3,168,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,230,335 UART:
3,230,351 UART: Running Caliptra FMC ...
3,230,759 UART:
3,230,902 UART: [state] CFI Enabled
3,241,590 UART: [fht] FMC Alias Private Key: 7
3,349,808 UART: [art] Extend RT PCRs Done
3,350,236 UART: [art] Lock RT PCRs Done
3,351,922 UART: [art] Populate DV Done
3,360,266 UART: [fht] FMC Alias Private Key: 7
3,361,244 UART: [art] Derive CDI
3,361,524 UART: [art] Store in in slot 0x4
3,447,059 UART: [art] Derive Key Pair
3,447,419 UART: [art] Store priv key in slot 0x5
3,460,957 UART: [art] Derive Key Pair - Done
3,475,541 UART: [art] Signing Cert with AUTHO
3,476,021 UART: RITY.KEYID = 7
3,491,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,344 UART: [art] PUB.X = B0F36FED97556307755810570402861C202BE14763F80D5EEE8795E8E124976A5DA456CADB7C6719B96061F2B916A57A
3,499,096 UART: [art] PUB.Y = 09C6DE608D873989019A0C41FFB5A91F7FC9C7C004C1142918894795EDBB83BFE0BF91B13FB874C729FAA3EF0E2E5C99
3,506,043 UART: [art] SIG.R = 6D02989801015B6B98C0EAAA7E65852BE808FAB3AE8A220AB6D50C85DB4ABF1AE9819335E6B8EDA7F1EEC700607F4964
3,512,787 UART: [art] SIG.S = 9DA4D4A3F01FD92382AC3D1AF364CCDEF3614CACF9055B9275F54A75DCF2713E269794ACA3162A24508DDEE59B81E290
3,536,927 UART: Caliptra RT
3,537,272 UART: [state] CFI Enabled
3,645,136 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,641,701 >>> mbox cmd response: failed
4,641,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,647,666 UART:
4,647,682 UART: Running Caliptra FMC ...
4,648,090 UART:
4,648,233 UART: [state] CFI Enabled
4,737,786 UART: [art] Extend RT PCRs Done
4,738,214 UART: [art] Lock RT PCRs Done
4,739,225 UART: [art] Populate DV Done
4,747,195 UART: [fht] FMC Alias Private Key: 7
4,748,313 UART: [art] Derive CDI
4,748,593 UART: [art] Store in in slot 0x4
4,834,470 UART: [art] Derive Key Pair
4,834,830 UART: [art] Store priv key in slot 0x5
4,848,384 UART: [art] Derive Key Pair - Done
4,862,798 UART: [art] Signing Cert with AUTHO
4,863,278 UART: RITY.KEYID = 7
4,878,544 UART: [art] Erasing AUTHORITY.KEYID = 7
4,879,309 UART: [art] PUB.X = B0F36FED97556307755810570402861C202BE14763F80D5EEE8795E8E124976A5DA456CADB7C6719B96061F2B916A57A
4,886,061 UART: [art] PUB.Y = 09C6DE608D873989019A0C41FFB5A91F7FC9C7C004C1142918894795EDBB83BFE0BF91B13FB874C729FAA3EF0E2E5C99
4,893,008 UART: [art] SIG.R = 6D02989801015B6B98C0EAAA7E65852BE808FAB3AE8A220AB6D50C85DB4ABF1AE9819335E6B8EDA7F1EEC700607F4964
4,899,752 UART: [art] SIG.S = 9DA4D4A3F01FD92382AC3D1AF364CCDEF3614CACF9055B9275F54A75DCF2713E269794ACA3162A24508DDEE59B81E290
4,923,140 UART: Caliptra RT
4,923,485 UART: [state] CFI Enabled
5,207,483 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,186,495 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,261 UART: [kat] SHA2-256
902,201 UART: [kat] SHA2-384
904,948 UART: [kat] SHA2-512-ACC
906,849 UART: [kat] ECC-384
916,606 UART: [kat] HMAC-384Kdf
921,162 UART: [kat] LMS
1,169,474 UART: [kat] --
1,170,247 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,209 UART: [idev] ++
1,173,377 UART: [idev] CDI.KEYID = 6
1,173,738 UART: [idev] SUBJECT.KEYID = 7
1,174,163 UART: [idev] UDS.KEYID = 0
1,174,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,399 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Sha1 KeyId Algorithm
1,207,923 UART: [idev] --
1,208,796 UART: [ldev] ++
1,208,964 UART: [ldev] CDI.KEYID = 6
1,209,328 UART: [ldev] SUBJECT.KEYID = 5
1,209,755 UART: [ldev] AUTHORITY.KEYID = 7
1,210,218 UART: [ldev] FE.KEYID = 1
1,215,456 UART: [ldev] Erasing FE.KEYID = 1
1,241,515 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,316 UART: [ldev] --
1,280,606 UART: [fwproc] Wait for Commands...
1,281,277 UART: [fwproc] Recv command 0x46574c44
1,282,010 UART: [fwproc] Recv'd Img size: 114168 bytes
3,112,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,140,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,169,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,305,526 >>> mbox cmd response: success
3,305,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,306,771 UART: [afmc] ++
3,306,939 UART: [afmc] CDI.KEYID = 6
3,307,302 UART: [afmc] SUBJECT.KEYID = 7
3,307,728 UART: [afmc] AUTHORITY.KEYID = 5
3,343,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,359,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,360,341 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,366,051 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,371,941 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,377,652 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,385,486 UART: [afmc] --
3,386,400 UART: [cold-reset] --
3,387,202 UART: [state] Locking Datavault
3,388,433 UART: [state] Locking PCR0, PCR1 and PCR31
3,389,037 UART: [state] Locking ICCM
3,389,691 UART: [exit] Launching FMC @ 0x40000130
3,395,020 UART:
3,395,036 UART: Running Caliptra FMC ...
3,395,444 UART:
3,395,498 UART: [state] CFI Enabled
3,406,066 UART: [fht] FMC Alias Private Key: 7
3,513,818 UART: [art] Extend RT PCRs Done
3,514,246 UART: [art] Lock RT PCRs Done
3,516,114 UART: [art] Populate DV Done
3,524,318 UART: [fht] FMC Alias Private Key: 7
3,525,274 UART: [art] Derive CDI
3,525,554 UART: [art] Store in in slot 0x4
3,611,429 UART: [art] Derive Key Pair
3,611,789 UART: [art] Store priv key in slot 0x5
3,625,321 UART: [art] Derive Key Pair - Done
3,639,772 UART: [art] Signing Cert with AUTHO
3,640,252 UART: RITY.KEYID = 7
3,655,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,656,137 UART: [art] PUB.X = 9200687D204E3D528CB80678DF4968153D9D08FC34455FF88AE235F0506BB49431412474E934B04AD9EFA21B8EC3ADE7
3,662,879 UART: [art] PUB.Y = 9D0929EE81CD3207C2565BBCBEBCBBD553FEE86C61366F7FB8EB2F72EC2A082BEF1719BD06EC44C8AB06633AF00E2AD6
3,669,837 UART: [art] SIG.R = 38194AC65307670EAA3981C9D949F097F4B28145B3B9EB7CF71F6BB13CEFE257960BEF79B1CB17113C975B4CFDA5E8FA
3,676,612 UART: [art] SIG.S = DF24BE153A5D2C03AD0EB5A02538849C2D7F78695781335AC05C21E0FE461E8031E36632AFA7846D61E5E598D6C2B79E
3,700,145 UART: Caliptra RT
3,700,398 UART: [state] CFI Enabled
3,807,746 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,809,560 UART:
3,809,576 UART: Running Caliptra ROM ...
3,809,984 UART:
3,810,039 UART: [state] CFI Enabled
3,812,607 UART: [state] LifecycleState = Unprovisioned
3,813,262 UART: [state] DebugLocked = No
3,813,870 UART: [state] WD Timer not started. Device not locked for debugging
3,815,150 UART: [kat] SHA2-256
4,618,700 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,622,829 UART: [kat] ++
4,622,981 UART: [kat] sha1
4,627,285 UART: [kat] SHA2-256
4,629,225 UART: [kat] SHA2-384
4,631,878 UART: [kat] SHA2-512-ACC
4,633,778 UART: [kat] ECC-384
4,643,511 UART: [kat] HMAC-384Kdf
4,648,007 UART: [kat] LMS
4,896,319 UART: [kat] --
4,897,211 UART: [update-reset] ++
4,914,875 >>> mbox cmd response: failed
4,914,875 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,915,229 UART: ROM Non-Fatal Error: 0x000B003D
4,916,131 UART: [state] Locking Datavault
4,917,055 UART: [state] Locking PCR0, PCR1 and PCR31
4,917,659 UART: [state] Locking ICCM
4,918,241 UART: [exit] Launching FMC @ 0x40000130
4,923,570 UART:
4,923,586 UART: Running Caliptra FMC ...
4,923,994 UART:
4,924,048 UART: [state] CFI Enabled
5,012,941 UART: [art] Extend RT PCRs Done
5,013,369 UART: [art] Lock RT PCRs Done
5,014,636 UART: [art] Populate DV Done
5,022,856 UART: [fht] FMC Alias Private Key: 7
5,023,896 UART: [art] Derive CDI
5,024,176 UART: [art] Store in in slot 0x4
5,109,891 UART: [art] Derive Key Pair
5,110,251 UART: [art] Store priv key in slot 0x5
5,123,603 UART: [art] Derive Key Pair - Done
5,138,536 UART: [art] Signing Cert with AUTHO
5,139,016 UART: RITY.KEYID = 7
5,154,234 UART: [art] Erasing AUTHORITY.KEYID = 7
5,154,999 UART: [art] PUB.X = 9200687D204E3D528CB80678DF4968153D9D08FC34455FF88AE235F0506BB49431412474E934B04AD9EFA21B8EC3ADE7
5,161,741 UART: [art] PUB.Y = 9D0929EE81CD3207C2565BBCBEBCBBD553FEE86C61366F7FB8EB2F72EC2A082BEF1719BD06EC44C8AB06633AF00E2AD6
5,168,699 UART: [art] SIG.R = 38194AC65307670EAA3981C9D949F097F4B28145B3B9EB7CF71F6BB13CEFE257960BEF79B1CB17113C975B4CFDA5E8FA
5,175,474 UART: [art] SIG.S = DF24BE153A5D2C03AD0EB5A02538849C2D7F78695781335AC05C21E0FE461E8031E36632AFA7846D61E5E598D6C2B79E
5,199,985 UART: Caliptra RT
5,200,238 UART: [state] CFI Enabled
5,479,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,481,187 UART:
5,481,203 UART: Running Caliptra ROM ...
5,481,611 UART:
5,481,666 UART: [state] CFI Enabled
5,484,452 UART: [state] LifecycleState = Unprovisioned
5,485,107 UART: [state] DebugLocked = No
5,485,691 UART: [state] WD Timer not started. Device not locked for debugging
5,486,879 UART: [kat] SHA2-256
6,290,429 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,294,558 UART: [kat] ++
6,294,710 UART: [kat] sha1
6,298,966 UART: [kat] SHA2-256
6,300,906 UART: [kat] SHA2-384
6,303,559 UART: [kat] SHA2-512-ACC
6,305,459 UART: [kat] ECC-384
6,314,686 UART: [kat] HMAC-384Kdf
6,319,366 UART: [kat] LMS
6,567,678 UART: [kat] --
6,568,272 UART: [update-reset] ++
8,413,275 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,414,412 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
8,563,990 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,468 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,178,149 >>> mbox cmd response: success
3,178,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,239,036 UART:
3,239,052 UART: Running Caliptra FMC ...
3,239,460 UART:
3,239,514 UART: [state] CFI Enabled
3,250,130 UART: [fht] FMC Alias Private Key: 7
3,358,374 UART: [art] Extend RT PCRs Done
3,358,802 UART: [art] Lock RT PCRs Done
3,360,194 UART: [art] Populate DV Done
3,368,644 UART: [fht] FMC Alias Private Key: 7
3,369,702 UART: [art] Derive CDI
3,369,982 UART: [art] Store in in slot 0x4
3,455,633 UART: [art] Derive Key Pair
3,455,993 UART: [art] Store priv key in slot 0x5
3,468,785 UART: [art] Derive Key Pair - Done
3,483,568 UART: [art] Signing Cert with AUTHO
3,484,048 UART: RITY.KEYID = 7
3,499,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,500,449 UART: [art] PUB.X = 6BBCAB624B14763EB8F70B408C38A653A90EFB19091A6B07176617483313BD7ED0439DD062DD1967D1D56956E2AB0DA5
3,507,208 UART: [art] PUB.Y = A94307E9F3C407DAE88C6B7BDBA9F977246A8CF062C7F520E1D5A07F96BB8FF8F8A446E32F823B3A57321EEBB62A83B8
3,514,168 UART: [art] SIG.R = 10D95E3A7F5A0185D40FCD5E8B0631D87FB43C2991ACA4917940AFF5A07B375267D5FD894D461145A3C6A253524A249B
3,520,931 UART: [art] SIG.S = 30518F8D84BBA7FD169B567C840454E0599867F44D43163CD65B147AF8DD911FAD859F47CD71201058FD866258899472
3,545,061 UART: Caliptra RT
3,545,314 UART: [state] CFI Enabled
3,651,825 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,642,450 >>> mbox cmd response: failed
4,642,450 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,647,957 UART:
4,647,973 UART: Running Caliptra FMC ...
4,648,381 UART:
4,648,435 UART: [state] CFI Enabled
4,736,772 UART: [art] Extend RT PCRs Done
4,737,200 UART: [art] Lock RT PCRs Done
4,738,605 UART: [art] Populate DV Done
4,746,959 UART: [fht] FMC Alias Private Key: 7
4,747,979 UART: [art] Derive CDI
4,748,259 UART: [art] Store in in slot 0x4
4,833,936 UART: [art] Derive Key Pair
4,834,296 UART: [art] Store priv key in slot 0x5
4,847,348 UART: [art] Derive Key Pair - Done
4,862,101 UART: [art] Signing Cert with AUTHO
4,862,581 UART: RITY.KEYID = 7
4,877,697 UART: [art] Erasing AUTHORITY.KEYID = 7
4,878,462 UART: [art] PUB.X = 6BBCAB624B14763EB8F70B408C38A653A90EFB19091A6B07176617483313BD7ED0439DD062DD1967D1D56956E2AB0DA5
4,885,221 UART: [art] PUB.Y = A94307E9F3C407DAE88C6B7BDBA9F977246A8CF062C7F520E1D5A07F96BB8FF8F8A446E32F823B3A57321EEBB62A83B8
4,892,181 UART: [art] SIG.R = 10D95E3A7F5A0185D40FCD5E8B0631D87FB43C2991ACA4917940AFF5A07B375267D5FD894D461145A3C6A253524A249B
4,898,944 UART: [art] SIG.S = 30518F8D84BBA7FD169B567C840454E0599867F44D43163CD65B147AF8DD911FAD859F47CD71201058FD866258899472
4,922,552 UART: Caliptra RT
4,922,805 UART: [state] CFI Enabled
5,203,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,191,944 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
915,655 UART: [kat] HMAC-384Kdf
920,255 UART: [kat] LMS
1,168,567 UART: [kat] --
1,169,374 UART: [cold-reset] ++
1,169,750 UART: [fht] FHT @ 0x50003400
1,172,230 UART: [idev] ++
1,172,398 UART: [idev] CDI.KEYID = 6
1,172,759 UART: [idev] SUBJECT.KEYID = 7
1,173,184 UART: [idev] UDS.KEYID = 0
1,173,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,788 UART: [idev] Erasing UDS.KEYID = 0
1,197,656 UART: [idev] Sha1 KeyId Algorithm
1,206,412 UART: [idev] --
1,207,519 UART: [ldev] ++
1,207,687 UART: [ldev] CDI.KEYID = 6
1,208,051 UART: [ldev] SUBJECT.KEYID = 5
1,208,478 UART: [ldev] AUTHORITY.KEYID = 7
1,208,941 UART: [ldev] FE.KEYID = 1
1,214,279 UART: [ldev] Erasing FE.KEYID = 1
1,240,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,509 UART: [ldev] --
1,280,003 UART: [fwproc] Wait for Commands...
1,280,734 UART: [fwproc] Recv command 0x46574c44
1,281,467 UART: [fwproc] Recv'd Img size: 114168 bytes
3,118,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,145,667 UART: [fwproc] Load FMC at address 0x40000000 len 18800
3,174,976 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
3,310,586 >>> mbox cmd response: success
3,310,586 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,311,711 UART: [afmc] ++
3,311,879 UART: [afmc] CDI.KEYID = 6
3,312,242 UART: [afmc] SUBJECT.KEYID = 7
3,312,668 UART: [afmc] AUTHORITY.KEYID = 5
3,348,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,364,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,365,235 UART: [afmc] PUB.X = FE8BE09160856771B6D273206D3F6ECF14DB96CB59C0C9A6449C05481923D9ADEBB88A2F16A7308355605CFB06E63917
3,370,945 UART: [afmc] PUB.Y = EA3D397708ADF24AB8FCDFF1680850CADFE67FB15822B47E9703DC227AC3C13DFF2BE8491D2DA48C88A3B1E7C80E448E
3,376,835 UART: [afmc] SIG.R = 92B458868CBBF7EF4BA2342CD608B05FF6F6897E9E46C3B12B97E6B54AA4A010AF242F4169624E72198F6D15D468531A
3,382,546 UART: [afmc] SIG.S = EDF895BF97D5D80A84631CD8E9F79336B37759C17679EF93EEA97676CCFB002A14A71F468C1427DDFA8FE28FBD23E97E
3,390,518 UART: [afmc] --
3,391,490 UART: [cold-reset] --
3,392,268 UART: [state] Locking Datavault
3,393,285 UART: [state] Locking PCR0, PCR1 and PCR31
3,393,889 UART: [state] Locking ICCM
3,394,533 UART: [exit] Launching FMC @ 0x40000130
3,399,862 UART:
3,399,878 UART: Running Caliptra FMC ...
3,400,286 UART:
3,400,429 UART: [state] CFI Enabled
3,411,179 UART: [fht] FMC Alias Private Key: 7
3,519,667 UART: [art] Extend RT PCRs Done
3,520,095 UART: [art] Lock RT PCRs Done
3,521,679 UART: [art] Populate DV Done
3,530,147 UART: [fht] FMC Alias Private Key: 7
3,531,093 UART: [art] Derive CDI
3,531,373 UART: [art] Store in in slot 0x4
3,616,962 UART: [art] Derive Key Pair
3,617,322 UART: [art] Store priv key in slot 0x5
3,630,210 UART: [art] Derive Key Pair - Done
3,644,843 UART: [art] Signing Cert with AUTHO
3,645,323 UART: RITY.KEYID = 7
3,660,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,661,736 UART: [art] PUB.X = 3A7C03A8E470BAF77AB29BB1236483FBA9C34D0C2C98D22F99531D5B42AA7B12E25F637BFD71C851AEBAA707E7AC5968
3,668,513 UART: [art] PUB.Y = B736CB85C22E2BE846E3A3C4785942211365241AE70847A3CE3DA0595C1FD0B0E6FF7258538C5947C082B4D88D5FDF86
3,675,462 UART: [art] SIG.R = 318319E7BBC139D09C3CD1BFB5806713A7307B30C318BE17AB5EA1A7BEDAD46CAC1D19590BA284FAE4B20191A98BA468
3,682,242 UART: [art] SIG.S = 172A250606F2646882631E7F229AD65C2EE5435B5EAF4E60EE3F0702B4BD034EB8FF179BEB4FD53E90FF85E872C64C6D
3,706,066 UART: Caliptra RT
3,706,411 UART: [state] CFI Enabled
3,814,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,816,380 UART:
3,816,396 UART: Running Caliptra ROM ...
3,816,804 UART:
3,816,946 UART: [state] CFI Enabled
3,819,770 UART: [state] LifecycleState = Unprovisioned
3,820,425 UART: [state] DebugLocked = No
3,821,145 UART: [state] WD Timer not started. Device not locked for debugging
3,822,363 UART: [kat] SHA2-256
4,625,913 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
4,630,042 UART: [kat] ++
4,630,194 UART: [kat] sha1
4,634,388 UART: [kat] SHA2-256
4,636,328 UART: [kat] SHA2-384
4,639,081 UART: [kat] SHA2-512-ACC
4,640,981 UART: [kat] ECC-384
4,650,620 UART: [kat] HMAC-384Kdf
4,655,208 UART: [kat] LMS
4,903,520 UART: [kat] --
4,904,260 UART: [update-reset] ++
4,921,994 >>> mbox cmd response: failed
4,921,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,922,318 UART: ROM Non-Fatal Error: 0x000B003D
4,923,106 UART: [state] Locking Datavault
4,924,030 UART: [state] Locking PCR0, PCR1 and PCR31
4,924,634 UART: [state] Locking ICCM
4,925,302 UART: [exit] Launching FMC @ 0x40000130
4,930,631 UART:
4,930,647 UART: Running Caliptra FMC ...
4,931,055 UART:
4,931,198 UART: [state] CFI Enabled
5,020,297 UART: [art] Extend RT PCRs Done
5,020,725 UART: [art] Lock RT PCRs Done
5,021,872 UART: [art] Populate DV Done
5,030,112 UART: [fht] FMC Alias Private Key: 7
5,031,214 UART: [art] Derive CDI
5,031,494 UART: [art] Store in in slot 0x4
5,117,183 UART: [art] Derive Key Pair
5,117,543 UART: [art] Store priv key in slot 0x5
5,130,185 UART: [art] Derive Key Pair - Done
5,144,880 UART: [art] Signing Cert with AUTHO
5,145,360 UART: RITY.KEYID = 7
5,160,938 UART: [art] Erasing AUTHORITY.KEYID = 7
5,161,703 UART: [art] PUB.X = 3A7C03A8E470BAF77AB29BB1236483FBA9C34D0C2C98D22F99531D5B42AA7B12E25F637BFD71C851AEBAA707E7AC5968
5,168,480 UART: [art] PUB.Y = B736CB85C22E2BE846E3A3C4785942211365241AE70847A3CE3DA0595C1FD0B0E6FF7258538C5947C082B4D88D5FDF86
5,175,429 UART: [art] SIG.R = 318319E7BBC139D09C3CD1BFB5806713A7307B30C318BE17AB5EA1A7BEDAD46CAC1D19590BA284FAE4B20191A98BA468
5,182,209 UART: [art] SIG.S = 172A250606F2646882631E7F229AD65C2EE5435B5EAF4E60EE3F0702B4BD034EB8FF179BEB4FD53E90FF85E872C64C6D
5,206,609 UART: Caliptra RT
5,206,954 UART: [state] CFI Enabled
5,485,047 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,486,502 UART:
5,486,518 UART: Running Caliptra ROM ...
5,486,926 UART:
5,487,068 UART: [state] CFI Enabled
5,489,826 UART: [state] LifecycleState = Unprovisioned
5,490,481 UART: [state] DebugLocked = No
5,491,077 UART: [state] WD Timer not started. Device not locked for debugging
5,492,305 UART: [kat] SHA2-256
6,295,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
6,299,984 UART: [kat] ++
6,300,136 UART: [kat] sha1
6,304,472 UART: [kat] SHA2-256
6,306,412 UART: [kat] SHA2-384
6,309,219 UART: [kat] SHA2-512-ACC
6,311,119 UART: [kat] ECC-384
6,320,814 UART: [kat] HMAC-384Kdf
6,325,524 UART: [kat] LMS
6,573,836 UART: [kat] --
6,574,782 UART: [update-reset] ++
8,427,330 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,428,521 UART: [update-reset] Loading Runtime at addr 0x40005000 len 89484
8,578,099 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,174,566 >>> mbox cmd response: success
3,174,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,237,075 UART:
3,237,091 UART: Running Caliptra FMC ...
3,237,499 UART:
3,237,642 UART: [state] CFI Enabled
3,248,322 UART: [fht] FMC Alias Private Key: 7
3,355,884 UART: [art] Extend RT PCRs Done
3,356,312 UART: [art] Lock RT PCRs Done
3,357,690 UART: [art] Populate DV Done
3,365,996 UART: [fht] FMC Alias Private Key: 7
3,366,994 UART: [art] Derive CDI
3,367,274 UART: [art] Store in in slot 0x4
3,452,947 UART: [art] Derive Key Pair
3,453,307 UART: [art] Store priv key in slot 0x5
3,466,299 UART: [art] Derive Key Pair - Done
3,481,006 UART: [art] Signing Cert with AUTHO
3,481,486 UART: RITY.KEYID = 7
3,496,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,427 UART: [art] PUB.X = 5D3CC5E5139F5BB46DBABCAC6713C60B8044A684A8688402917DCD4F3BE7FDF239C01ECA3D8FC8C6DF0E78F527554CC8
3,504,208 UART: [art] PUB.Y = 0B7A899F07A0B96123BF93A95EEFCB96ED28E78782B2E6DB7DE5A2EC1461C893BC58A08BE8B662D69B06EB29972AA963
3,511,163 UART: [art] SIG.R = 82D564E53E3A548C154E08B55F516C61AFC0CAB0F1F479E0FE132E1533A914E41A8D80D149C34B896682F78A1230BABC
3,517,936 UART: [art] SIG.S = E609DBAC5DE06F00E5535D2D44E5C4D4A3C7F286C2BC1C338FA4854CE9ECFC0855872A532FDBB91D42D1DF167E12902D
3,542,079 UART: Caliptra RT
3,542,424 UART: [state] CFI Enabled
3,649,405 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
4,641,399 >>> mbox cmd response: failed
4,641,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,647,508 UART:
4,647,524 UART: Running Caliptra FMC ...
4,647,932 UART:
4,648,075 UART: [state] CFI Enabled
4,736,906 UART: [art] Extend RT PCRs Done
4,737,334 UART: [art] Lock RT PCRs Done
4,738,397 UART: [art] Populate DV Done
4,746,665 UART: [fht] FMC Alias Private Key: 7
4,747,609 UART: [art] Derive CDI
4,747,889 UART: [art] Store in in slot 0x4
4,833,844 UART: [art] Derive Key Pair
4,834,204 UART: [art] Store priv key in slot 0x5
4,847,818 UART: [art] Derive Key Pair - Done
4,862,737 UART: [art] Signing Cert with AUTHO
4,863,217 UART: RITY.KEYID = 7
4,877,835 UART: [art] Erasing AUTHORITY.KEYID = 7
4,878,600 UART: [art] PUB.X = 5D3CC5E5139F5BB46DBABCAC6713C60B8044A684A8688402917DCD4F3BE7FDF239C01ECA3D8FC8C6DF0E78F527554CC8
4,885,381 UART: [art] PUB.Y = 0B7A899F07A0B96123BF93A95EEFCB96ED28E78782B2E6DB7DE5A2EC1461C893BC58A08BE8B662D69B06EB29972AA963
4,892,336 UART: [art] SIG.R = 82D564E53E3A548C154E08B55F516C61AFC0CAB0F1F479E0FE132E1533A914E41A8D80D149C34B896682F78A1230BABC
4,899,109 UART: [art] SIG.S = E609DBAC5DE06F00E5535D2D44E5C4D4A3C7F286C2BC1C338FA4854CE9ECFC0855872A532FDBB91D42D1DF167E12902D
4,922,868 UART: Caliptra RT
4,923,213 UART: [state] CFI Enabled
5,205,190 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
8,188,389 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,951 UART:
193,303 UART: Running Caliptra ROM ...
194,502 UART:
194,666 UART: [state] CFI Enabled
263,271 UART: [state] LifecycleState = Unprovisioned
265,246 UART: [state] DebugLocked = No
267,601 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,003 UART: [kat] SHA2-256
441,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,267 UART: [kat] ++
452,718 UART: [kat] sha1
464,625 UART: [kat] SHA2-256
467,363 UART: [kat] SHA2-384
473,078 UART: [kat] SHA2-512-ACC
475,422 UART: [kat] ECC-384
2,763,924 UART: [kat] HMAC-384Kdf
2,795,546 UART: [kat] LMS
3,985,850 UART: [kat] --
3,989,714 UART: [cold-reset] ++
3,991,973 UART: [fht] Storing FHT @ 0x50003400
4,004,535 UART: [idev] ++
4,005,144 UART: [idev] CDI.KEYID = 6
4,006,069 UART: [idev] SUBJECT.KEYID = 7
4,007,293 UART: [idev] UDS.KEYID = 0
4,010,024 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,257 UART: [idev] Erasing UDS.KEYID = 0
7,340,722 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,239 UART: [idev] --
7,366,725 UART: [ldev] ++
7,367,305 UART: [ldev] CDI.KEYID = 6
7,368,273 UART: [ldev] SUBJECT.KEYID = 5
7,369,490 UART: [ldev] AUTHORITY.KEYID = 7
7,370,726 UART: [ldev] FE.KEYID = 1
7,418,583 UART: [ldev] Erasing FE.KEYID = 1
10,753,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,551 UART: [ldev] --
13,133,337 UART: [fwproc] Waiting for Commands...
13,135,333 UART: [fwproc] Received command 0x46574c44
13,137,521 UART: [fwproc] Received Image of size 113844 bytes
14,524,078 UART: ROM Fatal Error: 0x000B000D
14,527,525 >>> mbox cmd response: failed
14,527,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,528,263 >>> mbox cmd response: failed
14,528,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,528,827 >>> mbox cmd response: failed
Initializing fuses
2,054,735 writing to cptra_bootfsm_go
2,244,050 UART:
2,244,411 UART: Running Caliptra ROM ...
2,245,463 UART:
2,245,617 UART: [state] CFI Enabled
2,302,995 UART: [state] LifecycleState = Unprovisioned
2,304,938 UART: [state] DebugLocked = No
2,306,977 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,773 UART: [kat] SHA2-256
2,481,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,971 UART: [kat] ++
2,492,565 UART: [kat] sha1
2,502,757 UART: [kat] SHA2-256
2,505,445 UART: [kat] SHA2-384
2,510,812 UART: [kat] SHA2-512-ACC
2,513,220 UART: [kat] ECC-384
4,806,810 UART: [kat] HMAC-384Kdf
4,839,612 UART: [kat] LMS
6,029,887 UART: [kat] --
6,034,754 UART: [cold-reset] ++
6,035,965 UART: [fht] Storing FHT @ 0x50003400
6,048,222 UART: [idev] ++
6,048,795 UART: [idev] CDI.KEYID = 6
6,049,707 UART: [idev] SUBJECT.KEYID = 7
6,050,975 UART: [idev] UDS.KEYID = 0
6,053,140 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,196,424 UART: [idev] Erasing UDS.KEYID = 0
9,383,699 UART: [idev] Using Sha1 for KeyId Algorithm
9,405,943 UART: [idev] --
9,409,641 UART: [ldev] ++
9,410,240 UART: [ldev] CDI.KEYID = 6
9,411,265 UART: [ldev] SUBJECT.KEYID = 5
9,412,471 UART: [ldev] AUTHORITY.KEYID = 7
9,413,653 UART: [ldev] FE.KEYID = 1
9,440,778 UART: [ldev] Erasing FE.KEYID = 1
12,771,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,066,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,081,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,096,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,110,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,130,320 UART: [ldev] --
15,135,421 UART: [fwproc] Waiting for Commands...
15,137,301 UART: [fwproc] Received command 0x46574c44
15,139,489 UART: [fwproc] Received Image of size 113844 bytes
19,185,521 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,255,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,324,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,640,183 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,804,423 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,227,268 >>> mbox cmd response: failed
14,227,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,228,121 >>> mbox cmd response: failed
14,228,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,228,746 >>> mbox cmd response: failed
Initializing fuses
2,061,872 writing to cptra_bootfsm_go
5,851,032 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,912,249 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,536 writing to cptra_bootfsm_go
192,805 UART:
193,156 UART: Running Caliptra ROM ...
194,337 UART:
604,165 UART: [state] CFI Enabled
617,692 UART: [state] LifecycleState = Unprovisioned
619,588 UART: [state] DebugLocked = No
622,430 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,074 UART: [kat] SHA2-256
797,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,374 UART: [kat] ++
808,906 UART: [kat] sha1
820,489 UART: [kat] SHA2-256
823,195 UART: [kat] SHA2-384
828,255 UART: [kat] SHA2-512-ACC
830,594 UART: [kat] ECC-384
3,112,863 UART: [kat] HMAC-384Kdf
3,124,858 UART: [kat] LMS
4,314,973 UART: [kat] --
4,318,756 UART: [cold-reset] ++
4,320,800 UART: [fht] Storing FHT @ 0x50003400
4,331,150 UART: [idev] ++
4,331,715 UART: [idev] CDI.KEYID = 6
4,332,652 UART: [idev] SUBJECT.KEYID = 7
4,333,920 UART: [idev] UDS.KEYID = 0
4,336,901 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,136 UART: [idev] Erasing UDS.KEYID = 0
7,622,808 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,564 UART: [idev] --
7,648,703 UART: [ldev] ++
7,649,285 UART: [ldev] CDI.KEYID = 6
7,650,203 UART: [ldev] SUBJECT.KEYID = 5
7,651,366 UART: [ldev] AUTHORITY.KEYID = 7
7,652,711 UART: [ldev] FE.KEYID = 1
7,662,005 UART: [ldev] Erasing FE.KEYID = 1
10,948,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,848 UART: [ldev] --
13,308,434 UART: [fwproc] Waiting for Commands...
13,311,720 UART: [fwproc] Received command 0x46574c44
13,313,908 UART: [fwproc] Received Image of size 113844 bytes
14,710,679 UART: ROM Fatal Error: 0x000B000D
14,714,130 >>> mbox cmd response: failed
14,714,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,715,015 >>> mbox cmd response: failed
14,715,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,715,597 >>> mbox cmd response: failed
Initializing fuses
2,059,164 writing to cptra_bootfsm_go
2,248,474 UART:
2,248,820 UART: Running Caliptra ROM ...
2,249,916 UART:
5,735,030 UART: [state] CFI Enabled
5,750,479 UART: [state] LifecycleState = Unprovisioned
5,752,458 UART: [state] DebugLocked = No
5,754,656 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,759,904 UART: [kat] SHA2-256
5,929,679 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,940,195 UART: [kat] ++
5,940,680 UART: [kat] sha1
5,951,789 UART: [kat] SHA2-256
5,954,491 UART: [kat] SHA2-384
5,960,703 UART: [kat] SHA2-512-ACC
5,963,049 UART: [kat] ECC-384
8,247,382 UART: [kat] HMAC-384Kdf
8,259,720 UART: [kat] LMS
9,449,828 UART: [kat] --
9,454,707 UART: [cold-reset] ++
9,456,756 UART: [fht] Storing FHT @ 0x50003400
9,468,832 UART: [idev] ++
9,469,404 UART: [idev] CDI.KEYID = 6
9,470,315 UART: [idev] SUBJECT.KEYID = 7
9,471,606 UART: [idev] UDS.KEYID = 0
9,473,922 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
9,617,034 UART: [idev] Erasing UDS.KEYID = 0
12,759,003 UART: [idev] Using Sha1 for KeyId Algorithm
12,780,606 UART: [idev] --
12,784,608 UART: [ldev] ++
12,785,176 UART: [ldev] CDI.KEYID = 6
12,786,139 UART: [ldev] SUBJECT.KEYID = 5
12,787,392 UART: [ldev] AUTHORITY.KEYID = 7
12,788,628 UART: [ldev] FE.KEYID = 1
12,798,090 UART: [ldev] Erasing FE.KEYID = 1
16,084,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,376,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,391,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,406,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,420,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,440,547 UART: [ldev] --
18,445,476 UART: [fwproc] Waiting for Commands...
18,448,122 UART: [fwproc] Received command 0x46574c44
18,450,367 UART: [fwproc] Received Image of size 113844 bytes
22,502,476 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,579,901 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,648,765 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,964,655 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
4,128,446 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,452,394 >>> mbox cmd response: failed
14,453,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,453,470 >>> mbox cmd response: failed
14,453,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,454,061 >>> mbox cmd response: failed
Initializing fuses
2,055,634 writing to cptra_bootfsm_go
9,530,068 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,461,877 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,447 UART:
192,811 UART: Running Caliptra ROM ...
193,955 UART:
194,099 UART: [state] CFI Enabled
261,490 UART: [state] LifecycleState = Unprovisioned
263,362 UART: [state] DebugLocked = No
265,882 UART: [state] WD Timer not started. Device not locked for debugging
269,174 UART: [kat] SHA2-256
448,319 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,849 UART: [kat] ++
460,317 UART: [kat] sha1
471,407 UART: [kat] SHA2-256
474,472 UART: [kat] SHA2-384
481,147 UART: [kat] SHA2-512-ACC
484,127 UART: [kat] ECC-384
2,944,506 UART: [kat] HMAC-384Kdf
2,967,605 UART: [kat] LMS
3,497,031 UART: [kat] --
3,500,336 UART: [cold-reset] ++
3,501,896 UART: [fht] FHT @ 0x50003400
3,513,203 UART: [idev] ++
3,513,764 UART: [idev] CDI.KEYID = 6
3,514,702 UART: [idev] SUBJECT.KEYID = 7
3,515,914 UART: [idev] UDS.KEYID = 0
3,518,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,662,161 UART: [idev] Erasing UDS.KEYID = 0
6,021,992 UART: [idev] Sha1 KeyId Algorithm
6,045,433 UART: [idev] --
6,048,543 UART: [ldev] ++
6,049,125 UART: [ldev] CDI.KEYID = 6
6,050,011 UART: [ldev] SUBJECT.KEYID = 5
6,051,232 UART: [ldev] AUTHORITY.KEYID = 7
6,052,473 UART: [ldev] FE.KEYID = 1
6,095,022 UART: [ldev] Erasing FE.KEYID = 1
8,600,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,223 UART: [ldev] --
10,406,482 UART: [fwproc] Wait for Commands...
10,408,141 UART: [fwproc] Recv command 0x46574c44
10,410,262 UART: [fwproc] Recv'd Img size: 114168 bytes
11,481,190 UART: ROM Fatal Error: 0x000B000D
11,484,326 >>> mbox cmd response: failed
11,484,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,484,979 >>> mbox cmd response: failed
11,485,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,485,644 >>> mbox cmd response: failed
Initializing fuses
2,059,890 writing to cptra_bootfsm_go
2,249,208 UART:
2,249,554 UART: Running Caliptra ROM ...
2,250,692 UART:
2,250,854 UART: [state] CFI Enabled
2,318,111 UART: [state] LifecycleState = Unprovisioned
2,320,013 UART: [state] DebugLocked = No
2,322,326 UART: [state] WD Timer not started. Device not locked for debugging
2,325,751 UART: [kat] SHA2-256
2,504,880 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,444 UART: [kat] ++
2,516,986 UART: [kat] sha1
2,526,906 UART: [kat] SHA2-256
2,529,926 UART: [kat] SHA2-384
2,534,618 UART: [kat] SHA2-512-ACC
2,537,615 UART: [kat] ECC-384
5,000,586 UART: [kat] HMAC-384Kdf
5,025,299 UART: [kat] LMS
5,554,712 UART: [kat] --
5,557,782 UART: [cold-reset] ++
5,558,960 UART: [fht] FHT @ 0x50003400
5,569,613 UART: [idev] ++
5,570,199 UART: [idev] CDI.KEYID = 6
5,571,130 UART: [idev] SUBJECT.KEYID = 7
5,572,294 UART: [idev] UDS.KEYID = 0
5,574,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,718,278 UART: [idev] Erasing UDS.KEYID = 0
8,078,064 UART: [idev] Sha1 KeyId Algorithm
8,101,570 UART: [idev] --
8,104,814 UART: [ldev] ++
8,105,384 UART: [ldev] CDI.KEYID = 6
8,106,297 UART: [ldev] SUBJECT.KEYID = 5
8,107,515 UART: [ldev] AUTHORITY.KEYID = 7
8,108,750 UART: [ldev] FE.KEYID = 1
8,153,798 UART: [ldev] Erasing FE.KEYID = 1
10,656,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,718 UART: [ldev] --
12,467,552 UART: [fwproc] Wait for Commands...
12,469,223 UART: [fwproc] Recv command 0x46574c44
12,471,324 UART: [fwproc] Recv'd Img size: 114168 bytes
15,872,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,948,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,017,797 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,334,779 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,381,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,254,652 >>> mbox cmd response: failed
11,255,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,255,533 >>> mbox cmd response: failed
11,255,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,256,118 >>> mbox cmd response: failed
Initializing fuses
2,053,945 writing to cptra_bootfsm_go
5,425,248 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,097,709 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,632 UART:
193,012 UART: Running Caliptra ROM ...
194,164 UART:
603,746 UART: [state] CFI Enabled
616,432 UART: [state] LifecycleState = Unprovisioned
618,253 UART: [state] DebugLocked = No
619,737 UART: [state] WD Timer not started. Device not locked for debugging
624,369 UART: [kat] SHA2-256
803,517 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,063 UART: [kat] ++
815,597 UART: [kat] sha1
826,555 UART: [kat] SHA2-256
829,597 UART: [kat] SHA2-384
837,197 UART: [kat] SHA2-512-ACC
840,141 UART: [kat] ECC-384
3,281,372 UART: [kat] HMAC-384Kdf
3,294,629 UART: [kat] LMS
3,824,141 UART: [kat] --
3,827,797 UART: [cold-reset] ++
3,828,931 UART: [fht] FHT @ 0x50003400
3,840,558 UART: [idev] ++
3,841,136 UART: [idev] CDI.KEYID = 6
3,842,047 UART: [idev] SUBJECT.KEYID = 7
3,843,266 UART: [idev] UDS.KEYID = 0
3,845,694 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,289 UART: [idev] Erasing UDS.KEYID = 0
6,313,669 UART: [idev] Sha1 KeyId Algorithm
6,336,210 UART: [idev] --
6,338,587 UART: [ldev] ++
6,339,168 UART: [ldev] CDI.KEYID = 6
6,340,052 UART: [ldev] SUBJECT.KEYID = 5
6,341,134 UART: [ldev] AUTHORITY.KEYID = 7
6,342,556 UART: [ldev] FE.KEYID = 1
6,352,811 UART: [ldev] Erasing FE.KEYID = 1
8,825,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,609,062 UART: [ldev] --
10,613,814 UART: [fwproc] Wait for Commands...
10,615,858 UART: [fwproc] Recv command 0x46574c44
10,617,953 UART: [fwproc] Recv'd Img size: 114168 bytes
11,682,511 UART: ROM Fatal Error: 0x000B000D
11,685,618 >>> mbox cmd response: failed
11,686,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,686,355 >>> mbox cmd response: failed
11,686,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,686,909 >>> mbox cmd response: failed
Initializing fuses
2,052,895 writing to cptra_bootfsm_go
2,242,203 UART:
2,242,552 UART: Running Caliptra ROM ...
2,243,601 UART:
8,764,552 UART: [state] CFI Enabled
8,780,967 UART: [state] LifecycleState = Unprovisioned
8,782,828 UART: [state] DebugLocked = No
8,784,891 UART: [state] WD Timer not started. Device not locked for debugging
8,787,769 UART: [kat] SHA2-256
8,966,929 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,978,482 UART: [kat] ++
8,978,942 UART: [kat] sha1
8,989,936 UART: [kat] SHA2-256
8,992,949 UART: [kat] SHA2-384
8,998,942 UART: [kat] SHA2-512-ACC
9,001,882 UART: [kat] ECC-384
11,443,764 UART: [kat] HMAC-384Kdf
11,456,297 UART: [kat] LMS
11,985,821 UART: [kat] --
11,990,318 UART: [cold-reset] ++
11,991,458 UART: [fht] FHT @ 0x50003400
12,001,738 UART: [idev] ++
12,002,307 UART: [idev] CDI.KEYID = 6
12,003,222 UART: [idev] SUBJECT.KEYID = 7
12,004,439 UART: [idev] UDS.KEYID = 0
12,006,643 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,150,129 UART: [idev] Erasing UDS.KEYID = 0
14,478,326 UART: [idev] Sha1 KeyId Algorithm
14,501,809 UART: [idev] --
14,506,265 UART: [ldev] ++
14,506,842 UART: [ldev] CDI.KEYID = 6
14,507,802 UART: [ldev] SUBJECT.KEYID = 5
14,509,127 UART: [ldev] AUTHORITY.KEYID = 7
14,510,340 UART: [ldev] FE.KEYID = 1
14,522,787 UART: [ldev] Erasing FE.KEYID = 1
16,997,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,712,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,728,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,744,415 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,760,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,780,151 UART: [ldev] --
18,784,387 UART: [fwproc] Wait for Commands...
18,786,212 UART: [fwproc] Recv command 0x46574c44
18,788,307 UART: [fwproc] Recv'd Img size: 114168 bytes
22,191,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,270,761 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,339,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,656,115 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,698,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,469,900 >>> mbox cmd response: failed
11,470,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,470,770 >>> mbox cmd response: failed
11,471,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,471,288 >>> mbox cmd response: failed
Initializing fuses
2,054,902 writing to cptra_bootfsm_go
12,072,567 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,639,069 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,227 UART:
192,621 UART: Running Caliptra ROM ...
193,776 UART:
193,929 UART: [state] CFI Enabled
256,791 UART: [state] LifecycleState = Unprovisioned
259,164 UART: [state] DebugLocked = No
260,606 UART: [state] WD Timer not started. Device not locked for debugging
265,867 UART: [kat] SHA2-256
455,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,521 UART: [kat] ++
466,972 UART: [kat] sha1
478,447 UART: [kat] SHA2-256
481,468 UART: [kat] SHA2-384
488,583 UART: [kat] SHA2-512-ACC
491,140 UART: [kat] ECC-384
2,941,622 UART: [kat] HMAC-384Kdf
2,965,844 UART: [kat] LMS
3,497,609 UART: [kat] --
3,500,359 UART: [cold-reset] ++
3,502,186 UART: [fht] FHT @ 0x50003400
3,514,464 UART: [idev] ++
3,515,141 UART: [idev] CDI.KEYID = 6
3,516,108 UART: [idev] SUBJECT.KEYID = 7
3,517,324 UART: [idev] UDS.KEYID = 0
3,519,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,050 UART: [idev] Erasing UDS.KEYID = 0
6,024,156 UART: [idev] Sha1 KeyId Algorithm
6,045,101 UART: [idev] --
6,050,974 UART: [ldev] ++
6,051,668 UART: [ldev] CDI.KEYID = 6
6,052,584 UART: [ldev] SUBJECT.KEYID = 5
6,053,749 UART: [ldev] AUTHORITY.KEYID = 7
6,054,928 UART: [ldev] FE.KEYID = 1
6,096,375 UART: [ldev] Erasing FE.KEYID = 1
8,604,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,870 UART: [ldev] --
10,409,059 UART: [fwproc] Wait for Commands...
10,411,864 UART: [fwproc] Recv command 0x46574c44
10,414,133 UART: [fwproc] Recv'd Img size: 114168 bytes
11,504,344 UART: ROM Fatal Error: 0x000B000D
11,508,001 >>> mbox cmd response: failed
11,508,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,508,746 >>> mbox cmd response: failed
11,509,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,509,314 >>> mbox cmd response: failed
Initializing fuses
2,059,930 writing to cptra_bootfsm_go
2,249,247 UART:
2,249,596 UART: Running Caliptra ROM ...
2,250,730 UART:
2,250,903 UART: [state] CFI Enabled
2,307,082 UART: [state] LifecycleState = Unprovisioned
2,309,458 UART: [state] DebugLocked = No
2,310,803 UART: [state] WD Timer not started. Device not locked for debugging
2,315,969 UART: [kat] SHA2-256
2,505,851 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,516,619 UART: [kat] ++
2,517,168 UART: [kat] sha1
2,528,779 UART: [kat] SHA2-256
2,531,813 UART: [kat] SHA2-384
2,538,089 UART: [kat] SHA2-512-ACC
2,540,720 UART: [kat] ECC-384
4,991,312 UART: [kat] HMAC-384Kdf
5,015,087 UART: [kat] LMS
5,546,849 UART: [kat] --
5,550,844 UART: [cold-reset] ++
5,552,513 UART: [fht] FHT @ 0x50003400
5,564,366 UART: [idev] ++
5,565,041 UART: [idev] CDI.KEYID = 6
5,566,058 UART: [idev] SUBJECT.KEYID = 7
5,567,315 UART: [idev] UDS.KEYID = 0
5,569,544 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,713,105 UART: [idev] Erasing UDS.KEYID = 0
8,071,435 UART: [idev] Sha1 KeyId Algorithm
8,094,569 UART: [idev] --
8,100,908 UART: [ldev] ++
8,101,588 UART: [ldev] CDI.KEYID = 6
8,102,476 UART: [ldev] SUBJECT.KEYID = 5
8,103,692 UART: [ldev] AUTHORITY.KEYID = 7
8,104,871 UART: [ldev] FE.KEYID = 1
8,143,747 UART: [ldev] Erasing FE.KEYID = 1
10,650,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,383,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,398,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,414,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,429,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,156 UART: [ldev] --
12,457,271 UART: [fwproc] Wait for Commands...
12,459,602 UART: [fwproc] Recv command 0x46574c44
12,461,872 UART: [fwproc] Recv'd Img size: 114168 bytes
15,903,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,981,019 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,097,154 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,638,037 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,438,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,303,294 >>> mbox cmd response: failed
11,303,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,304,232 >>> mbox cmd response: failed
11,304,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,304,798 >>> mbox cmd response: failed
Initializing fuses
2,057,537 writing to cptra_bootfsm_go
5,491,522 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,785,225 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,431 UART:
192,788 UART: Running Caliptra ROM ...
193,996 UART:
603,576 UART: [state] CFI Enabled
619,549 UART: [state] LifecycleState = Unprovisioned
621,913 UART: [state] DebugLocked = No
624,205 UART: [state] WD Timer not started. Device not locked for debugging
629,419 UART: [kat] SHA2-256
819,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,073 UART: [kat] ++
830,608 UART: [kat] sha1
841,815 UART: [kat] SHA2-256
844,819 UART: [kat] SHA2-384
850,751 UART: [kat] SHA2-512-ACC
853,310 UART: [kat] ECC-384
3,293,743 UART: [kat] HMAC-384Kdf
3,305,954 UART: [kat] LMS
3,837,764 UART: [kat] --
3,842,091 UART: [cold-reset] ++
3,844,485 UART: [fht] FHT @ 0x50003400
3,856,877 UART: [idev] ++
3,857,614 UART: [idev] CDI.KEYID = 6
3,858,523 UART: [idev] SUBJECT.KEYID = 7
3,859,740 UART: [idev] UDS.KEYID = 0
3,862,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,809 UART: [idev] Erasing UDS.KEYID = 0
6,335,220 UART: [idev] Sha1 KeyId Algorithm
6,357,551 UART: [idev] --
6,362,901 UART: [ldev] ++
6,363,625 UART: [ldev] CDI.KEYID = 6
6,364,526 UART: [ldev] SUBJECT.KEYID = 5
6,365,688 UART: [ldev] AUTHORITY.KEYID = 7
6,366,924 UART: [ldev] FE.KEYID = 1
6,377,174 UART: [ldev] Erasing FE.KEYID = 1
8,851,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,112 UART: [ldev] --
10,640,117 UART: [fwproc] Wait for Commands...
10,643,134 UART: [fwproc] Recv command 0x46574c44
10,645,398 UART: [fwproc] Recv'd Img size: 114168 bytes
11,744,666 UART: ROM Fatal Error: 0x000B000D
11,748,330 >>> mbox cmd response: failed
11,748,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,749,074 >>> mbox cmd response: failed
11,749,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,749,631 >>> mbox cmd response: failed
Initializing fuses
2,056,194 writing to cptra_bootfsm_go
2,245,506 UART:
2,245,840 UART: Running Caliptra ROM ...
2,246,976 UART:
8,707,261 UART: [state] CFI Enabled
8,723,598 UART: [state] LifecycleState = Unprovisioned
8,725,959 UART: [state] DebugLocked = No
8,727,265 UART: [state] WD Timer not started. Device not locked for debugging
8,731,834 UART: [kat] SHA2-256
8,921,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,932,493 UART: [kat] ++
8,933,012 UART: [kat] sha1
8,944,447 UART: [kat] SHA2-256
8,947,474 UART: [kat] SHA2-384
8,953,408 UART: [kat] SHA2-512-ACC
8,956,000 UART: [kat] ECC-384
11,396,153 UART: [kat] HMAC-384Kdf
11,408,920 UART: [kat] LMS
11,940,746 UART: [kat] --
11,946,848 UART: [cold-reset] ++
11,949,269 UART: [fht] FHT @ 0x50003400
11,961,061 UART: [idev] ++
11,961,738 UART: [idev] CDI.KEYID = 6
11,962,752 UART: [idev] SUBJECT.KEYID = 7
11,963,908 UART: [idev] UDS.KEYID = 0
11,966,166 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,109,643 UART: [idev] Erasing UDS.KEYID = 0
14,440,548 UART: [idev] Sha1 KeyId Algorithm
14,462,019 UART: [idev] --
14,466,910 UART: [ldev] ++
14,467,595 UART: [ldev] CDI.KEYID = 6
14,468,524 UART: [ldev] SUBJECT.KEYID = 5
14,469,688 UART: [ldev] AUTHORITY.KEYID = 7
14,470,920 UART: [ldev] FE.KEYID = 1
14,481,244 UART: [ldev] Erasing FE.KEYID = 1
16,958,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,675,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,691,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,706,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,721,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,742,353 UART: [ldev] --
18,747,463 UART: [fwproc] Wait for Commands...
18,749,074 UART: [fwproc] Recv command 0x46574c44
18,751,339 UART: [fwproc] Recv'd Img size: 114168 bytes
22,202,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,280,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,396,922 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,939,060 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,754,486 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,533,448 >>> mbox cmd response: failed
11,534,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,534,354 >>> mbox cmd response: failed
11,534,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,534,908 >>> mbox cmd response: failed
Initializing fuses
2,063,040 writing to cptra_bootfsm_go
12,081,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,284,209 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,057 UART: [kat] SHA2-256
881,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,103 UART: [kat] ++
886,255 UART: [kat] sha1
890,579 UART: [kat] SHA2-256
892,517 UART: [kat] SHA2-384
895,112 UART: [kat] SHA2-512-ACC
897,013 UART: [kat] ECC-384
902,536 UART: [kat] HMAC-384Kdf
907,094 UART: [kat] LMS
1,475,290 UART: [kat] --
1,476,257 UART: [cold-reset] ++
1,476,627 UART: [fht] Storing FHT @ 0x50003400
1,479,602 UART: [idev] ++
1,479,770 UART: [idev] CDI.KEYID = 6
1,480,130 UART: [idev] SUBJECT.KEYID = 7
1,480,554 UART: [idev] UDS.KEYID = 0
1,480,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,682 UART: [idev] Erasing UDS.KEYID = 0
1,505,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,532 UART: [idev] --
1,515,623 UART: [ldev] ++
1,515,791 UART: [ldev] CDI.KEYID = 6
1,516,154 UART: [ldev] SUBJECT.KEYID = 5
1,516,580 UART: [ldev] AUTHORITY.KEYID = 7
1,517,043 UART: [ldev] FE.KEYID = 1
1,522,429 UART: [ldev] Erasing FE.KEYID = 1
1,547,602 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,688 UART: [ldev] --
1,587,065 UART: [fwproc] Waiting for Commands...
1,587,726 UART: [fwproc] Received command 0x46574c44
1,588,517 UART: [fwproc] Received Image of size 114168 bytes
1,627,052 UART: ROM Fatal Error: 0x000B000D
1,628,211 >>> mbox cmd response: failed
1,628,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,217 >>> mbox cmd response: failed
1,628,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,223 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,083 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,587 UART: [kat] SHA2-256
881,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,633 UART: [kat] ++
885,785 UART: [kat] sha1
889,919 UART: [kat] SHA2-256
891,857 UART: [kat] SHA2-384
894,648 UART: [kat] SHA2-512-ACC
896,549 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
906,742 UART: [kat] LMS
1,474,938 UART: [kat] --
1,475,799 UART: [cold-reset] ++
1,476,249 UART: [fht] Storing FHT @ 0x50003400
1,478,896 UART: [idev] ++
1,479,064 UART: [idev] CDI.KEYID = 6
1,479,424 UART: [idev] SUBJECT.KEYID = 7
1,479,848 UART: [idev] UDS.KEYID = 0
1,480,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,810 UART: [idev] Erasing UDS.KEYID = 0
1,504,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,972 UART: [idev] --
1,513,957 UART: [ldev] ++
1,514,125 UART: [ldev] CDI.KEYID = 6
1,514,488 UART: [ldev] SUBJECT.KEYID = 5
1,514,914 UART: [ldev] AUTHORITY.KEYID = 7
1,515,377 UART: [ldev] FE.KEYID = 1
1,520,887 UART: [ldev] Erasing FE.KEYID = 1
1,545,868 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,638 UART: [ldev] --
1,585,029 UART: [fwproc] Waiting for Commands...
1,585,684 UART: [fwproc] Received command 0x46574c44
1,586,475 UART: [fwproc] Received Image of size 114168 bytes
2,883,008 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,784 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,136 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,759 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,479,740 >>> mbox cmd response: failed
1,479,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,746 >>> mbox cmd response: failed
1,479,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,883 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,596 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,488 UART: [kat] SHA2-256
892,426 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
903,037 UART: [kat] HMAC-384Kdf
907,609 UART: [kat] LMS
1,475,805 UART: [kat] --
1,476,498 UART: [cold-reset] ++
1,476,992 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,241 UART: [idev] Erasing UDS.KEYID = 0
1,505,155 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,733 UART: [idev] --
1,514,944 UART: [ldev] ++
1,515,112 UART: [ldev] CDI.KEYID = 6
1,515,475 UART: [ldev] SUBJECT.KEYID = 5
1,515,901 UART: [ldev] AUTHORITY.KEYID = 7
1,516,364 UART: [ldev] FE.KEYID = 1
1,521,862 UART: [ldev] Erasing FE.KEYID = 1
1,547,041 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,507 UART: [ldev] --
1,585,876 UART: [fwproc] Waiting for Commands...
1,586,593 UART: [fwproc] Received command 0x46574c44
1,587,384 UART: [fwproc] Received Image of size 114168 bytes
1,625,765 UART: ROM Fatal Error: 0x000B000D
1,626,924 >>> mbox cmd response: failed
1,626,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,930 >>> mbox cmd response: failed
1,626,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,936 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,442 UART: [kat] SHA2-256
892,380 UART: [kat] SHA2-384
895,105 UART: [kat] SHA2-512-ACC
897,006 UART: [kat] ECC-384
902,437 UART: [kat] HMAC-384Kdf
907,117 UART: [kat] LMS
1,475,313 UART: [kat] --
1,476,432 UART: [cold-reset] ++
1,476,854 UART: [fht] Storing FHT @ 0x50003400
1,479,603 UART: [idev] ++
1,479,771 UART: [idev] CDI.KEYID = 6
1,480,131 UART: [idev] SUBJECT.KEYID = 7
1,480,555 UART: [idev] UDS.KEYID = 0
1,480,900 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,777 UART: [idev] Erasing UDS.KEYID = 0
1,505,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,347 UART: [idev] --
1,515,348 UART: [ldev] ++
1,515,516 UART: [ldev] CDI.KEYID = 6
1,515,879 UART: [ldev] SUBJECT.KEYID = 5
1,516,305 UART: [ldev] AUTHORITY.KEYID = 7
1,516,768 UART: [ldev] FE.KEYID = 1
1,522,010 UART: [ldev] Erasing FE.KEYID = 1
1,548,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,959 UART: [ldev] --
1,587,414 UART: [fwproc] Waiting for Commands...
1,588,037 UART: [fwproc] Received command 0x46574c44
1,588,828 UART: [fwproc] Received Image of size 114168 bytes
2,884,851 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,785 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,137 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,750 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,481,043 >>> mbox cmd response: failed
1,481,043 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,049 >>> mbox cmd response: failed
1,481,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,266 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,218 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
893,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,213 UART: [kat] ++
897,365 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,260 UART: [kat] SHA2-512-ACC
908,161 UART: [kat] ECC-384
917,948 UART: [kat] HMAC-384Kdf
922,576 UART: [kat] LMS
1,170,904 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,439 UART: [fht] FHT @ 0x50003400
1,175,128 UART: [idev] ++
1,175,296 UART: [idev] CDI.KEYID = 6
1,175,656 UART: [idev] SUBJECT.KEYID = 7
1,176,080 UART: [idev] UDS.KEYID = 0
1,176,425 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,736 UART: [idev] Erasing UDS.KEYID = 0
1,200,573 UART: [idev] Sha1 KeyId Algorithm
1,209,097 UART: [idev] --
1,210,209 UART: [ldev] ++
1,210,377 UART: [ldev] CDI.KEYID = 6
1,210,740 UART: [ldev] SUBJECT.KEYID = 5
1,211,166 UART: [ldev] AUTHORITY.KEYID = 7
1,211,629 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,543 UART: [ldev] --
1,281,840 UART: [fwproc] Wait for Commands...
1,282,470 UART: [fwproc] Recv command 0x46574c44
1,283,198 UART: [fwproc] Recv'd Img size: 114168 bytes
1,321,040 UART: ROM Fatal Error: 0x000B000D
1,322,199 >>> mbox cmd response: failed
1,322,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,205 >>> mbox cmd response: failed
1,322,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
893,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,271 UART: [kat] ++
897,423 UART: [kat] sha1
901,733 UART: [kat] SHA2-256
903,673 UART: [kat] SHA2-384
906,370 UART: [kat] SHA2-512-ACC
908,271 UART: [kat] ECC-384
917,884 UART: [kat] HMAC-384Kdf
922,576 UART: [kat] LMS
1,170,904 UART: [kat] --
1,171,867 UART: [cold-reset] ++
1,172,283 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,090 UART: [idev] Erasing UDS.KEYID = 0
1,200,921 UART: [idev] Sha1 KeyId Algorithm
1,209,587 UART: [idev] --
1,210,815 UART: [ldev] ++
1,210,983 UART: [ldev] CDI.KEYID = 6
1,211,346 UART: [ldev] SUBJECT.KEYID = 5
1,211,772 UART: [ldev] AUTHORITY.KEYID = 7
1,212,235 UART: [ldev] FE.KEYID = 1
1,217,393 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,405 UART: [ldev] --
1,282,864 UART: [fwproc] Wait for Commands...
1,283,466 UART: [fwproc] Recv command 0x46574c44
1,284,194 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,593 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,897 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,450 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,907 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,176,855 >>> mbox cmd response: failed
1,176,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,861 >>> mbox cmd response: failed
1,176,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,929 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,505 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,315 UART: [kat] HMAC-384Kdf
923,003 UART: [kat] LMS
1,171,331 UART: [kat] --
1,172,050 UART: [cold-reset] ++
1,172,624 UART: [fht] FHT @ 0x50003400
1,175,427 UART: [idev] ++
1,175,595 UART: [idev] CDI.KEYID = 6
1,175,955 UART: [idev] SUBJECT.KEYID = 7
1,176,379 UART: [idev] UDS.KEYID = 0
1,176,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,201,098 UART: [idev] Sha1 KeyId Algorithm
1,209,464 UART: [idev] --
1,210,446 UART: [ldev] ++
1,210,614 UART: [ldev] CDI.KEYID = 6
1,210,977 UART: [ldev] SUBJECT.KEYID = 5
1,211,403 UART: [ldev] AUTHORITY.KEYID = 7
1,211,866 UART: [ldev] FE.KEYID = 1
1,217,432 UART: [ldev] Erasing FE.KEYID = 1
1,243,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,998 UART: [ldev] --
1,283,481 UART: [fwproc] Wait for Commands...
1,284,073 UART: [fwproc] Recv command 0x46574c44
1,284,801 UART: [fwproc] Recv'd Img size: 114168 bytes
1,323,418 UART: ROM Fatal Error: 0x000B000D
1,324,577 >>> mbox cmd response: failed
1,324,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,583 >>> mbox cmd response: failed
1,324,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,855 UART: [state] LifecycleState = Unprovisioned
85,510 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,509 UART: [kat] SHA2-256
893,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,284 UART: [kat] ++
897,436 UART: [kat] sha1
901,576 UART: [kat] SHA2-256
903,516 UART: [kat] SHA2-384
906,225 UART: [kat] SHA2-512-ACC
908,126 UART: [kat] ECC-384
917,789 UART: [kat] HMAC-384Kdf
922,369 UART: [kat] LMS
1,170,697 UART: [kat] --
1,171,802 UART: [cold-reset] ++
1,172,140 UART: [fht] FHT @ 0x50003400
1,174,835 UART: [idev] ++
1,175,003 UART: [idev] CDI.KEYID = 6
1,175,363 UART: [idev] SUBJECT.KEYID = 7
1,175,787 UART: [idev] UDS.KEYID = 0
1,176,132 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,915 UART: [idev] Erasing UDS.KEYID = 0
1,200,716 UART: [idev] Sha1 KeyId Algorithm
1,209,170 UART: [idev] --
1,210,342 UART: [ldev] ++
1,210,510 UART: [ldev] CDI.KEYID = 6
1,210,873 UART: [ldev] SUBJECT.KEYID = 5
1,211,299 UART: [ldev] AUTHORITY.KEYID = 7
1,211,762 UART: [ldev] FE.KEYID = 1
1,216,886 UART: [ldev] Erasing FE.KEYID = 1
1,243,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,320 UART: [ldev] --
1,282,769 UART: [fwproc] Wait for Commands...
1,283,549 UART: [fwproc] Recv command 0x46574c44
1,284,277 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,002 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,609 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,478 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,270 >>> mbox cmd response: failed
1,179,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,276 >>> mbox cmd response: failed
1,179,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,282 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,150 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,624 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,702 UART: [kat] SHA2-512-ACC
906,603 UART: [kat] ECC-384
916,258 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,174,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,529 UART: [idev] Erasing UDS.KEYID = 0
1,199,517 UART: [idev] Sha1 KeyId Algorithm
1,208,421 UART: [idev] --
1,209,688 UART: [ldev] ++
1,209,856 UART: [ldev] CDI.KEYID = 6
1,210,220 UART: [ldev] SUBJECT.KEYID = 5
1,210,647 UART: [ldev] AUTHORITY.KEYID = 7
1,211,110 UART: [ldev] FE.KEYID = 1
1,216,288 UART: [ldev] Erasing FE.KEYID = 1
1,242,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,900 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,282,987 UART: [fwproc] Recv command 0x46574c44
1,283,720 UART: [fwproc] Recv'd Img size: 114168 bytes
1,321,727 UART: ROM Fatal Error: 0x000B000D
1,322,886 >>> mbox cmd response: failed
1,322,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,892 >>> mbox cmd response: failed
1,322,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,554 UART: [kat] SHA2-256
891,104 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,233 UART: [kat] ++
895,385 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,540 UART: [kat] SHA2-512-ACC
906,441 UART: [kat] ECC-384
916,522 UART: [kat] HMAC-384Kdf
921,134 UART: [kat] LMS
1,169,446 UART: [kat] --
1,170,207 UART: [cold-reset] ++
1,170,685 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,951 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,646 UART: [ldev] ++
1,208,814 UART: [ldev] CDI.KEYID = 6
1,209,178 UART: [ldev] SUBJECT.KEYID = 5
1,209,605 UART: [ldev] AUTHORITY.KEYID = 7
1,210,068 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,592 UART: [ldev] --
1,280,960 UART: [fwproc] Wait for Commands...
1,281,651 UART: [fwproc] Recv command 0x46574c44
1,282,384 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,894 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,542 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,173,223 >>> mbox cmd response: failed
1,173,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,229 >>> mbox cmd response: failed
1,173,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,082 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,610 UART: [kat] ++
895,762 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,199 UART: [kat] HMAC-384Kdf
920,869 UART: [kat] LMS
1,169,181 UART: [kat] --
1,169,766 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,882 UART: [idev] ++
1,173,050 UART: [idev] CDI.KEYID = 6
1,173,411 UART: [idev] SUBJECT.KEYID = 7
1,173,836 UART: [idev] UDS.KEYID = 0
1,174,182 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,046 UART: [idev] Erasing UDS.KEYID = 0
1,199,012 UART: [idev] Sha1 KeyId Algorithm
1,207,686 UART: [idev] --
1,208,517 UART: [ldev] ++
1,208,685 UART: [ldev] CDI.KEYID = 6
1,209,049 UART: [ldev] SUBJECT.KEYID = 5
1,209,476 UART: [ldev] AUTHORITY.KEYID = 7
1,209,939 UART: [ldev] FE.KEYID = 1
1,214,973 UART: [ldev] Erasing FE.KEYID = 1
1,241,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,761 UART: [ldev] --
1,281,101 UART: [fwproc] Wait for Commands...
1,281,826 UART: [fwproc] Recv command 0x46574c44
1,282,559 UART: [fwproc] Recv'd Img size: 114168 bytes
1,320,546 UART: ROM Fatal Error: 0x000B000D
1,321,705 >>> mbox cmd response: failed
1,321,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,711 >>> mbox cmd response: failed
1,321,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,167 UART: [kat] SHA2-256
891,717 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,846 UART: [kat] ++
895,998 UART: [kat] sha1
900,064 UART: [kat] SHA2-256
902,004 UART: [kat] SHA2-384
904,789 UART: [kat] SHA2-512-ACC
906,690 UART: [kat] ECC-384
916,983 UART: [kat] HMAC-384Kdf
921,547 UART: [kat] LMS
1,169,859 UART: [kat] --
1,170,518 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,622 UART: [idev] ++
1,173,790 UART: [idev] CDI.KEYID = 6
1,174,151 UART: [idev] SUBJECT.KEYID = 7
1,174,576 UART: [idev] UDS.KEYID = 0
1,174,922 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,792 UART: [idev] Erasing UDS.KEYID = 0
1,199,978 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,209,923 UART: [ldev] ++
1,210,091 UART: [ldev] CDI.KEYID = 6
1,210,455 UART: [ldev] SUBJECT.KEYID = 5
1,210,882 UART: [ldev] AUTHORITY.KEYID = 7
1,211,345 UART: [ldev] FE.KEYID = 1
1,216,907 UART: [ldev] Erasing FE.KEYID = 1
1,243,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,853 UART: [ldev] --
1,283,163 UART: [fwproc] Wait for Commands...
1,283,872 UART: [fwproc] Recv command 0x46574c44
1,284,605 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,436 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,745 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,417 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,173,510 >>> mbox cmd response: failed
1,173,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,516 >>> mbox cmd response: failed
1,173,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,369 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
192,302 UART:
192,670 UART: Running Caliptra ROM ...
193,852 UART:
194,001 UART: [state] CFI Enabled
264,336 UART: [state] LifecycleState = Unprovisioned
266,319 UART: [state] DebugLocked = No
268,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,523 UART: [kat] SHA2-256
442,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,727 UART: [kat] ++
453,272 UART: [kat] sha1
463,777 UART: [kat] SHA2-256
466,512 UART: [kat] SHA2-384
472,326 UART: [kat] SHA2-512-ACC
474,723 UART: [kat] ECC-384
2,765,357 UART: [kat] HMAC-384Kdf
2,777,383 UART: [kat] LMS
3,967,780 UART: [kat] --
3,971,778 UART: [cold-reset] ++
3,974,038 UART: [fht] Storing FHT @ 0x50003400
3,986,442 UART: [idev] ++
3,987,008 UART: [idev] CDI.KEYID = 6
3,988,030 UART: [idev] SUBJECT.KEYID = 7
3,989,195 UART: [idev] UDS.KEYID = 0
3,991,974 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,398 UART: [idev] Erasing UDS.KEYID = 0
7,324,461 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,492 UART: [idev] --
7,351,166 UART: [ldev] ++
7,351,747 UART: [ldev] CDI.KEYID = 6
7,352,712 UART: [ldev] SUBJECT.KEYID = 5
7,353,931 UART: [ldev] AUTHORITY.KEYID = 7
7,355,171 UART: [ldev] FE.KEYID = 1
7,399,414 UART: [ldev] Erasing FE.KEYID = 1
10,733,579 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,414 UART: [ldev] --
13,094,658 UART: [fwproc] Waiting for Commands...
13,097,340 UART: [fwproc] Received command 0x46574c44
13,099,538 UART: [fwproc] Received Image of size 113844 bytes
13,173,053 UART: ROM Fatal Error: 0x000B0008
13,176,576 >>> mbox cmd response: failed
13,176,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,227 >>> mbox cmd response: failed
13,177,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,785 >>> mbox cmd response: failed
Initializing fuses
2,050,183 writing to cptra_bootfsm_go
2,239,515 UART:
2,239,865 UART: Running Caliptra ROM ...
2,241,114 UART:
2,241,300 UART: [state] CFI Enabled
2,301,973 UART: [state] LifecycleState = Unprovisioned
2,303,925 UART: [state] DebugLocked = No
2,306,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,513 UART: [kat] SHA2-256
2,481,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,695 UART: [kat] ++
2,492,238 UART: [kat] sha1
2,502,813 UART: [kat] SHA2-256
2,505,507 UART: [kat] SHA2-384
2,511,111 UART: [kat] SHA2-512-ACC
2,513,514 UART: [kat] ECC-384
4,801,179 UART: [kat] HMAC-384Kdf
4,811,953 UART: [kat] LMS
6,002,256 UART: [kat] --
6,008,159 UART: [cold-reset] ++
6,009,151 UART: [fht] Storing FHT @ 0x50003400
6,020,752 UART: [idev] ++
6,021,328 UART: [idev] CDI.KEYID = 6
6,022,249 UART: [idev] SUBJECT.KEYID = 7
6,023,467 UART: [idev] UDS.KEYID = 0
6,026,094 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,169,405 UART: [idev] Erasing UDS.KEYID = 0
9,359,171 UART: [idev] Using Sha1 for KeyId Algorithm
9,379,637 UART: [idev] --
9,382,606 UART: [ldev] ++
9,383,178 UART: [ldev] CDI.KEYID = 6
9,384,119 UART: [ldev] SUBJECT.KEYID = 5
9,385,378 UART: [ldev] AUTHORITY.KEYID = 7
9,386,617 UART: [ldev] FE.KEYID = 1
9,413,685 UART: [ldev] Erasing FE.KEYID = 1
12,743,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,038,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,053,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,068,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,082,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,102,570 UART: [ldev] --
15,106,977 UART: [fwproc] Waiting for Commands...
15,110,277 UART: [fwproc] Received command 0x46574c44
15,112,505 UART: [fwproc] Received Image of size 113844 bytes
19,161,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,235,906 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,304,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,621,374 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
3,808,137 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,927,659 >>> mbox cmd response: failed
12,928,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,928,581 >>> mbox cmd response: failed
12,928,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,202 >>> mbox cmd response: failed
Initializing fuses
2,044,862 writing to cptra_bootfsm_go
5,850,697 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,932,079 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,472 UART:
192,852 UART: Running Caliptra ROM ...
193,953 UART:
603,550 UART: [state] CFI Enabled
619,885 UART: [state] LifecycleState = Unprovisioned
621,797 UART: [state] DebugLocked = No
624,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,887 UART: [kat] SHA2-256
799,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,161 UART: [kat] ++
810,673 UART: [kat] sha1
821,169 UART: [kat] SHA2-256
823,855 UART: [kat] SHA2-384
830,046 UART: [kat] SHA2-512-ACC
832,441 UART: [kat] ECC-384
3,115,634 UART: [kat] HMAC-384Kdf
3,128,331 UART: [kat] LMS
4,318,414 UART: [kat] --
4,323,280 UART: [cold-reset] ++
4,325,861 UART: [fht] Storing FHT @ 0x50003400
4,337,397 UART: [idev] ++
4,338,014 UART: [idev] CDI.KEYID = 6
4,338,937 UART: [idev] SUBJECT.KEYID = 7
4,340,159 UART: [idev] UDS.KEYID = 0
4,342,927 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,971 UART: [idev] Erasing UDS.KEYID = 0
7,628,737 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,371 UART: [idev] --
7,654,885 UART: [ldev] ++
7,655,452 UART: [ldev] CDI.KEYID = 6
7,656,467 UART: [ldev] SUBJECT.KEYID = 5
7,657,624 UART: [ldev] AUTHORITY.KEYID = 7
7,658,853 UART: [ldev] FE.KEYID = 1
7,668,416 UART: [ldev] Erasing FE.KEYID = 1
10,954,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,080 UART: [ldev] --
13,317,678 UART: [fwproc] Waiting for Commands...
13,319,993 UART: [fwproc] Received command 0x46574c44
13,322,177 UART: [fwproc] Received Image of size 113844 bytes
13,392,112 UART: ROM Fatal Error: 0x000B0008
13,395,651 >>> mbox cmd response: failed
13,396,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,396,456 >>> mbox cmd response: failed
13,396,722 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,012 >>> mbox cmd response: failed
Initializing fuses
2,054,797 writing to cptra_bootfsm_go
2,244,120 UART:
2,244,475 UART: Running Caliptra ROM ...
2,245,519 UART:
7,072,253 UART: [state] CFI Enabled
7,088,585 UART: [state] LifecycleState = Unprovisioned
7,090,522 UART: [state] DebugLocked = No
7,093,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,098,387 UART: [kat] SHA2-256
7,268,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,278,680 UART: [kat] ++
7,279,170 UART: [kat] sha1
7,291,515 UART: [kat] SHA2-256
7,294,208 UART: [kat] SHA2-384
7,299,397 UART: [kat] SHA2-512-ACC
7,301,746 UART: [kat] ECC-384
9,584,380 UART: [kat] HMAC-384Kdf
9,595,740 UART: [kat] LMS
10,785,886 UART: [kat] --
10,791,402 UART: [cold-reset] ++
10,793,985 UART: [fht] Storing FHT @ 0x50003400
10,805,407 UART: [idev] ++
10,805,985 UART: [idev] CDI.KEYID = 6
10,806,863 UART: [idev] SUBJECT.KEYID = 7
10,808,182 UART: [idev] UDS.KEYID = 0
10,810,895 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,954,021 UART: [idev] Erasing UDS.KEYID = 0
14,095,143 UART: [idev] Using Sha1 for KeyId Algorithm
14,117,878 UART: [idev] --
14,121,005 UART: [ldev] ++
14,121,579 UART: [ldev] CDI.KEYID = 6
14,122,540 UART: [ldev] SUBJECT.KEYID = 5
14,123,800 UART: [ldev] AUTHORITY.KEYID = 7
14,125,038 UART: [ldev] FE.KEYID = 1
14,135,971 UART: [ldev] Erasing FE.KEYID = 1
17,424,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,718,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,732,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,747,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,762,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,780,761 UART: [ldev] --
19,785,809 UART: [fwproc] Waiting for Commands...
19,788,444 UART: [fwproc] Received command 0x46574c44
19,790,626 UART: [fwproc] Received Image of size 113844 bytes
23,841,034 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,921,741 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,990,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,306,225 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,127,003 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,125,335 >>> mbox cmd response: failed
13,125,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,126,233 >>> mbox cmd response: failed
13,126,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,126,742 >>> mbox cmd response: failed
Initializing fuses
2,050,384 writing to cptra_bootfsm_go
10,870,201 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,807,295 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,231 UART:
192,618 UART: Running Caliptra ROM ...
193,814 UART:
193,974 UART: [state] CFI Enabled
262,781 UART: [state] LifecycleState = Unprovisioned
264,698 UART: [state] DebugLocked = No
266,589 UART: [state] WD Timer not started. Device not locked for debugging
269,413 UART: [kat] SHA2-256
448,558 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,145 UART: [kat] ++
460,682 UART: [kat] sha1
472,323 UART: [kat] SHA2-256
475,331 UART: [kat] SHA2-384
480,766 UART: [kat] SHA2-512-ACC
483,752 UART: [kat] ECC-384
2,949,861 UART: [kat] HMAC-384Kdf
2,970,205 UART: [kat] LMS
3,499,665 UART: [kat] --
3,502,659 UART: [cold-reset] ++
3,504,064 UART: [fht] FHT @ 0x50003400
3,515,749 UART: [idev] ++
3,516,316 UART: [idev] CDI.KEYID = 6
3,517,221 UART: [idev] SUBJECT.KEYID = 7
3,518,432 UART: [idev] UDS.KEYID = 0
3,521,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,989 UART: [idev] Erasing UDS.KEYID = 0
6,025,600 UART: [idev] Sha1 KeyId Algorithm
6,049,044 UART: [idev] --
6,052,725 UART: [ldev] ++
6,053,303 UART: [ldev] CDI.KEYID = 6
6,054,217 UART: [ldev] SUBJECT.KEYID = 5
6,055,381 UART: [ldev] AUTHORITY.KEYID = 7
6,056,675 UART: [ldev] FE.KEYID = 1
6,100,810 UART: [ldev] Erasing FE.KEYID = 1
8,602,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,523 UART: [ldev] --
10,393,034 UART: [fwproc] Wait for Commands...
10,395,947 UART: [fwproc] Recv command 0x46574c44
10,397,992 UART: [fwproc] Recv'd Img size: 114168 bytes
10,476,135 UART: ROM Fatal Error: 0x000B0008
10,479,222 >>> mbox cmd response: failed
10,479,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,003 >>> mbox cmd response: failed
10,480,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,693 >>> mbox cmd response: failed
Initializing fuses
2,051,413 writing to cptra_bootfsm_go
2,240,778 UART:
2,241,125 UART: Running Caliptra ROM ...
2,242,255 UART:
2,242,420 UART: [state] CFI Enabled
2,311,414 UART: [state] LifecycleState = Unprovisioned
2,313,297 UART: [state] DebugLocked = No
2,315,015 UART: [state] WD Timer not started. Device not locked for debugging
2,318,123 UART: [kat] SHA2-256
2,497,242 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,508,802 UART: [kat] ++
2,509,358 UART: [kat] sha1
2,519,554 UART: [kat] SHA2-256
2,522,576 UART: [kat] SHA2-384
2,528,294 UART: [kat] SHA2-512-ACC
2,531,234 UART: [kat] ECC-384
4,993,136 UART: [kat] HMAC-384Kdf
5,016,189 UART: [kat] LMS
5,545,641 UART: [kat] --
5,550,889 UART: [cold-reset] ++
5,553,212 UART: [fht] FHT @ 0x50003400
5,563,599 UART: [idev] ++
5,564,167 UART: [idev] CDI.KEYID = 6
5,565,077 UART: [idev] SUBJECT.KEYID = 7
5,566,296 UART: [idev] UDS.KEYID = 0
5,569,109 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,712,848 UART: [idev] Erasing UDS.KEYID = 0
8,068,561 UART: [idev] Sha1 KeyId Algorithm
8,090,564 UART: [idev] --
8,095,372 UART: [ldev] ++
8,095,945 UART: [ldev] CDI.KEYID = 6
8,096,831 UART: [ldev] SUBJECT.KEYID = 5
8,097,935 UART: [ldev] AUTHORITY.KEYID = 7
8,099,300 UART: [ldev] FE.KEYID = 1
8,144,176 UART: [ldev] Erasing FE.KEYID = 1
10,645,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,364,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,380,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,396,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,411,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,433,209 UART: [ldev] --
12,436,982 UART: [fwproc] Wait for Commands...
12,438,973 UART: [fwproc] Recv command 0x46574c44
12,441,016 UART: [fwproc] Recv'd Img size: 114168 bytes
15,840,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,914,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,983,214 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,301,131 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,387,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,300,161 >>> mbox cmd response: failed
10,300,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,301,094 >>> mbox cmd response: failed
10,301,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,301,668 >>> mbox cmd response: failed
Initializing fuses
2,046,865 writing to cptra_bootfsm_go
5,391,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,083,547 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,505 UART:
192,878 UART: Running Caliptra ROM ...
194,053 UART:
603,491 UART: [state] CFI Enabled
619,381 UART: [state] LifecycleState = Unprovisioned
621,199 UART: [state] DebugLocked = No
623,763 UART: [state] WD Timer not started. Device not locked for debugging
627,870 UART: [kat] SHA2-256
806,953 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,530 UART: [kat] ++
819,072 UART: [kat] sha1
829,043 UART: [kat] SHA2-256
832,104 UART: [kat] SHA2-384
839,587 UART: [kat] SHA2-512-ACC
842,546 UART: [kat] ECC-384
3,286,763 UART: [kat] HMAC-384Kdf
3,299,802 UART: [kat] LMS
3,829,330 UART: [kat] --
3,835,050 UART: [cold-reset] ++
3,836,557 UART: [fht] FHT @ 0x50003400
3,846,729 UART: [idev] ++
3,847,295 UART: [idev] CDI.KEYID = 6
3,848,207 UART: [idev] SUBJECT.KEYID = 7
3,849,424 UART: [idev] UDS.KEYID = 0
3,852,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,996,293 UART: [idev] Erasing UDS.KEYID = 0
6,322,085 UART: [idev] Sha1 KeyId Algorithm
6,345,071 UART: [idev] --
6,350,074 UART: [ldev] ++
6,350,656 UART: [ldev] CDI.KEYID = 6
6,351,570 UART: [ldev] SUBJECT.KEYID = 5
6,352,680 UART: [ldev] AUTHORITY.KEYID = 7
6,354,023 UART: [ldev] FE.KEYID = 1
6,365,186 UART: [ldev] Erasing FE.KEYID = 1
8,837,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,402 UART: [ldev] --
10,628,669 UART: [fwproc] Wait for Commands...
10,630,884 UART: [fwproc] Recv command 0x46574c44
10,632,986 UART: [fwproc] Recv'd Img size: 114168 bytes
10,705,909 UART: ROM Fatal Error: 0x000B0008
10,708,998 >>> mbox cmd response: failed
10,709,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,709,710 >>> mbox cmd response: failed
10,709,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,710,272 >>> mbox cmd response: failed
Initializing fuses
2,051,006 writing to cptra_bootfsm_go
2,240,347 UART:
2,240,699 UART: Running Caliptra ROM ...
2,241,842 UART:
9,748,902 UART: [state] CFI Enabled
9,764,145 UART: [state] LifecycleState = Unprovisioned
9,766,005 UART: [state] DebugLocked = No
9,768,207 UART: [state] WD Timer not started. Device not locked for debugging
9,772,012 UART: [kat] SHA2-256
9,951,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,962,716 UART: [kat] ++
9,963,259 UART: [kat] sha1
9,974,214 UART: [kat] SHA2-256
9,977,228 UART: [kat] SHA2-384
9,983,700 UART: [kat] SHA2-512-ACC
9,986,645 UART: [kat] ECC-384
12,428,881 UART: [kat] HMAC-384Kdf
12,442,070 UART: [kat] LMS
12,971,560 UART: [kat] --
12,975,877 UART: [cold-reset] ++
12,977,429 UART: [fht] FHT @ 0x50003400
12,989,050 UART: [idev] ++
12,989,663 UART: [idev] CDI.KEYID = 6
12,990,730 UART: [idev] SUBJECT.KEYID = 7
12,991,837 UART: [idev] UDS.KEYID = 0
12,994,542 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,137,896 UART: [idev] Erasing UDS.KEYID = 0
15,459,107 UART: [idev] Sha1 KeyId Algorithm
15,483,361 UART: [idev] --
15,487,003 UART: [ldev] ++
15,487,582 UART: [ldev] CDI.KEYID = 6
15,488,488 UART: [ldev] SUBJECT.KEYID = 5
15,489,706 UART: [ldev] AUTHORITY.KEYID = 7
15,490,939 UART: [ldev] FE.KEYID = 1
15,504,390 UART: [ldev] Erasing FE.KEYID = 1
17,982,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,701,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,718,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,733,818 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,749,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,770,807 UART: [ldev] --
19,774,740 UART: [fwproc] Wait for Commands...
19,777,596 UART: [fwproc] Recv command 0x46574c44
19,779,700 UART: [fwproc] Recv'd Img size: 114168 bytes
23,182,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,253,775 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,322,517 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,640,418 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,699,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,478,978 >>> mbox cmd response: failed
10,479,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,479,879 >>> mbox cmd response: failed
10,480,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,468 >>> mbox cmd response: failed
Initializing fuses
2,055,062 writing to cptra_bootfsm_go
13,081,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,664,732 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,485 UART:
192,859 UART: Running Caliptra ROM ...
194,045 UART:
194,206 UART: [state] CFI Enabled
265,118 UART: [state] LifecycleState = Unprovisioned
267,531 UART: [state] DebugLocked = No
269,320 UART: [state] WD Timer not started. Device not locked for debugging
273,771 UART: [kat] SHA2-256
463,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,460 UART: [kat] ++
474,984 UART: [kat] sha1
485,868 UART: [kat] SHA2-256
488,889 UART: [kat] SHA2-384
494,222 UART: [kat] SHA2-512-ACC
496,839 UART: [kat] ECC-384
2,947,938 UART: [kat] HMAC-384Kdf
2,971,561 UART: [kat] LMS
3,503,328 UART: [kat] --
3,505,282 UART: [cold-reset] ++
3,507,812 UART: [fht] FHT @ 0x50003400
3,519,332 UART: [idev] ++
3,520,062 UART: [idev] CDI.KEYID = 6
3,520,998 UART: [idev] SUBJECT.KEYID = 7
3,522,222 UART: [idev] UDS.KEYID = 0
3,524,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,649 UART: [idev] Erasing UDS.KEYID = 0
6,030,362 UART: [idev] Sha1 KeyId Algorithm
6,053,597 UART: [idev] --
6,060,196 UART: [ldev] ++
6,060,883 UART: [ldev] CDI.KEYID = 6
6,061,802 UART: [ldev] SUBJECT.KEYID = 5
6,062,967 UART: [ldev] AUTHORITY.KEYID = 7
6,064,200 UART: [ldev] FE.KEYID = 1
6,101,530 UART: [ldev] Erasing FE.KEYID = 1
8,605,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,254 UART: [ldev] --
10,415,195 UART: [fwproc] Wait for Commands...
10,417,887 UART: [fwproc] Recv command 0x46574c44
10,420,206 UART: [fwproc] Recv'd Img size: 114168 bytes
10,518,295 UART: ROM Fatal Error: 0x000B0008
10,521,950 >>> mbox cmd response: failed
10,522,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,714 >>> mbox cmd response: failed
10,522,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,272 >>> mbox cmd response: failed
Initializing fuses
2,049,581 writing to cptra_bootfsm_go
2,238,883 UART:
2,239,235 UART: Running Caliptra ROM ...
2,240,311 UART:
2,240,472 UART: [state] CFI Enabled
2,306,210 UART: [state] LifecycleState = Unprovisioned
2,308,592 UART: [state] DebugLocked = No
2,310,259 UART: [state] WD Timer not started. Device not locked for debugging
2,315,164 UART: [kat] SHA2-256
2,505,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,777 UART: [kat] ++
2,516,267 UART: [kat] sha1
2,528,728 UART: [kat] SHA2-256
2,531,755 UART: [kat] SHA2-384
2,537,803 UART: [kat] SHA2-512-ACC
2,540,376 UART: [kat] ECC-384
4,991,733 UART: [kat] HMAC-384Kdf
5,012,687 UART: [kat] LMS
5,544,477 UART: [kat] --
5,548,655 UART: [cold-reset] ++
5,549,566 UART: [fht] FHT @ 0x50003400
5,561,688 UART: [idev] ++
5,562,421 UART: [idev] CDI.KEYID = 6
5,563,438 UART: [idev] SUBJECT.KEYID = 7
5,564,542 UART: [idev] UDS.KEYID = 0
5,567,059 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,710,785 UART: [idev] Erasing UDS.KEYID = 0
8,070,567 UART: [idev] Sha1 KeyId Algorithm
8,092,852 UART: [idev] --
8,097,819 UART: [ldev] ++
8,098,502 UART: [ldev] CDI.KEYID = 6
8,099,416 UART: [ldev] SUBJECT.KEYID = 5
8,100,583 UART: [ldev] AUTHORITY.KEYID = 7
8,101,846 UART: [ldev] FE.KEYID = 1
8,141,388 UART: [ldev] Erasing FE.KEYID = 1
10,645,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,546 UART: [ldev] --
12,457,136 UART: [fwproc] Wait for Commands...
12,460,096 UART: [fwproc] Recv command 0x46574c44
12,462,366 UART: [fwproc] Recv'd Img size: 114168 bytes
15,911,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,990,564 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,106,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,647,351 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,442,410 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,317,401 >>> mbox cmd response: failed
10,317,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,318,291 >>> mbox cmd response: failed
10,318,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,318,877 >>> mbox cmd response: failed
Initializing fuses
2,052,251 writing to cptra_bootfsm_go
5,450,256 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,746,732 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,605 UART:
192,955 UART: Running Caliptra ROM ...
194,152 UART:
603,736 UART: [state] CFI Enabled
614,796 UART: [state] LifecycleState = Unprovisioned
616,904 UART: [state] DebugLocked = No
619,590 UART: [state] WD Timer not started. Device not locked for debugging
623,670 UART: [kat] SHA2-256
813,535 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,293 UART: [kat] ++
824,886 UART: [kat] sha1
835,200 UART: [kat] SHA2-256
838,215 UART: [kat] SHA2-384
845,490 UART: [kat] SHA2-512-ACC
848,104 UART: [kat] ECC-384
3,289,665 UART: [kat] HMAC-384Kdf
3,302,568 UART: [kat] LMS
3,834,398 UART: [kat] --
3,840,119 UART: [cold-reset] ++
3,842,106 UART: [fht] FHT @ 0x50003400
3,853,577 UART: [idev] ++
3,854,257 UART: [idev] CDI.KEYID = 6
3,855,223 UART: [idev] SUBJECT.KEYID = 7
3,856,435 UART: [idev] UDS.KEYID = 0
3,859,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,809 UART: [idev] Erasing UDS.KEYID = 0
6,336,048 UART: [idev] Sha1 KeyId Algorithm
6,357,960 UART: [idev] --
6,362,776 UART: [ldev] ++
6,363,460 UART: [ldev] CDI.KEYID = 6
6,364,366 UART: [ldev] SUBJECT.KEYID = 5
6,365,582 UART: [ldev] AUTHORITY.KEYID = 7
6,366,759 UART: [ldev] FE.KEYID = 1
6,378,173 UART: [ldev] Erasing FE.KEYID = 1
8,857,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,665 UART: [ldev] --
10,647,769 UART: [fwproc] Wait for Commands...
10,650,624 UART: [fwproc] Recv command 0x46574c44
10,652,886 UART: [fwproc] Recv'd Img size: 114168 bytes
10,753,831 UART: ROM Fatal Error: 0x000B0008
10,757,508 >>> mbox cmd response: failed
10,757,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,758,241 >>> mbox cmd response: failed
10,758,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,758,803 >>> mbox cmd response: failed
Initializing fuses
2,056,813 writing to cptra_bootfsm_go
2,246,130 UART:
2,246,489 UART: Running Caliptra ROM ...
2,247,594 UART:
9,696,600 UART: [state] CFI Enabled
9,714,575 UART: [state] LifecycleState = Unprovisioned
9,716,960 UART: [state] DebugLocked = No
9,719,294 UART: [state] WD Timer not started. Device not locked for debugging
9,723,769 UART: [kat] SHA2-256
9,913,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,924,429 UART: [kat] ++
9,924,944 UART: [kat] sha1
9,935,827 UART: [kat] SHA2-256
9,938,841 UART: [kat] SHA2-384
9,944,086 UART: [kat] SHA2-512-ACC
9,946,664 UART: [kat] ECC-384
12,388,276 UART: [kat] HMAC-384Kdf
12,401,314 UART: [kat] LMS
12,933,136 UART: [kat] --
12,937,625 UART: [cold-reset] ++
12,939,450 UART: [fht] FHT @ 0x50003400
12,950,749 UART: [idev] ++
12,951,501 UART: [idev] CDI.KEYID = 6
12,952,412 UART: [idev] SUBJECT.KEYID = 7
12,953,628 UART: [idev] UDS.KEYID = 0
12,956,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,099,767 UART: [idev] Erasing UDS.KEYID = 0
15,433,829 UART: [idev] Sha1 KeyId Algorithm
15,456,006 UART: [idev] --
15,460,834 UART: [ldev] ++
15,461,514 UART: [ldev] CDI.KEYID = 6
15,462,393 UART: [ldev] SUBJECT.KEYID = 5
15,463,601 UART: [ldev] AUTHORITY.KEYID = 7
15,464,829 UART: [ldev] FE.KEYID = 1
15,474,584 UART: [ldev] Erasing FE.KEYID = 1
17,952,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,671,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,686,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,701,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,716,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,737,568 UART: [ldev] --
19,743,589 UART: [fwproc] Wait for Commands...
19,746,769 UART: [fwproc] Recv command 0x46574c44
19,749,085 UART: [fwproc] Recv'd Img size: 114168 bytes
23,201,245 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,279,565 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,395,707 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,937,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,755,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,543,915 >>> mbox cmd response: failed
10,544,502 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,835 >>> mbox cmd response: failed
10,545,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,545,414 >>> mbox cmd response: failed
Initializing fuses
2,054,002 writing to cptra_bootfsm_go
13,080,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,289,063 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,803 UART: [kat] SHA2-256
892,741 UART: [kat] SHA2-384
895,460 UART: [kat] SHA2-512-ACC
897,361 UART: [kat] ECC-384
903,166 UART: [kat] HMAC-384Kdf
907,620 UART: [kat] LMS
1,475,816 UART: [kat] --
1,476,945 UART: [cold-reset] ++
1,477,347 UART: [fht] Storing FHT @ 0x50003400
1,480,218 UART: [idev] ++
1,480,386 UART: [idev] CDI.KEYID = 6
1,480,746 UART: [idev] SUBJECT.KEYID = 7
1,481,170 UART: [idev] UDS.KEYID = 0
1,481,515 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,512 UART: [idev] Erasing UDS.KEYID = 0
1,506,456 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,208 UART: [idev] --
1,516,203 UART: [ldev] ++
1,516,371 UART: [ldev] CDI.KEYID = 6
1,516,734 UART: [ldev] SUBJECT.KEYID = 5
1,517,160 UART: [ldev] AUTHORITY.KEYID = 7
1,517,623 UART: [ldev] FE.KEYID = 1
1,522,885 UART: [ldev] Erasing FE.KEYID = 1
1,548,286 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,800 UART: [ldev] --
1,587,231 UART: [fwproc] Waiting for Commands...
1,588,072 UART: [fwproc] Received command 0x46574c44
1,588,863 UART: [fwproc] Received Image of size 114168 bytes
1,614,288 UART: ROM Fatal Error: 0x000B0008
1,615,445 >>> mbox cmd response: failed
1,615,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,451 >>> mbox cmd response: failed
1,615,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,103 UART: [kat] SHA2-256
882,034 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,149 UART: [kat] ++
886,301 UART: [kat] sha1
890,737 UART: [kat] SHA2-256
892,675 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
903,128 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,597 UART: [cold-reset] ++
1,477,163 UART: [fht] Storing FHT @ 0x50003400
1,479,974 UART: [idev] ++
1,480,142 UART: [idev] CDI.KEYID = 6
1,480,502 UART: [idev] SUBJECT.KEYID = 7
1,480,926 UART: [idev] UDS.KEYID = 0
1,481,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,542 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,798 UART: [idev] --
1,514,879 UART: [ldev] ++
1,515,047 UART: [ldev] CDI.KEYID = 6
1,515,410 UART: [ldev] SUBJECT.KEYID = 5
1,515,836 UART: [ldev] AUTHORITY.KEYID = 7
1,516,299 UART: [ldev] FE.KEYID = 1
1,521,271 UART: [ldev] Erasing FE.KEYID = 1
1,546,310 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,422 UART: [ldev] --
1,585,741 UART: [fwproc] Waiting for Commands...
1,586,534 UART: [fwproc] Received command 0x46574c44
1,587,325 UART: [fwproc] Received Image of size 114168 bytes
2,883,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,766 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,118 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,819 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,465,762 >>> mbox cmd response: failed
1,465,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,768 >>> mbox cmd response: failed
1,465,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,605 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,480 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,756 UART: [kat] SHA2-256
881,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,802 UART: [kat] ++
885,954 UART: [kat] sha1
890,036 UART: [kat] SHA2-256
891,974 UART: [kat] SHA2-384
894,887 UART: [kat] SHA2-512-ACC
896,788 UART: [kat] ECC-384
902,239 UART: [kat] HMAC-384Kdf
906,831 UART: [kat] LMS
1,475,027 UART: [kat] --
1,475,958 UART: [cold-reset] ++
1,476,448 UART: [fht] Storing FHT @ 0x50003400
1,479,165 UART: [idev] ++
1,479,333 UART: [idev] CDI.KEYID = 6
1,479,693 UART: [idev] SUBJECT.KEYID = 7
1,480,117 UART: [idev] UDS.KEYID = 0
1,480,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,271 UART: [idev] Erasing UDS.KEYID = 0
1,505,161 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,885 UART: [idev] --
1,514,782 UART: [ldev] ++
1,514,950 UART: [ldev] CDI.KEYID = 6
1,515,313 UART: [ldev] SUBJECT.KEYID = 5
1,515,739 UART: [ldev] AUTHORITY.KEYID = 7
1,516,202 UART: [ldev] FE.KEYID = 1
1,521,438 UART: [ldev] Erasing FE.KEYID = 1
1,546,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,077 UART: [ldev] --
1,586,588 UART: [fwproc] Waiting for Commands...
1,587,315 UART: [fwproc] Received command 0x46574c44
1,588,106 UART: [fwproc] Received Image of size 114168 bytes
1,612,335 UART: ROM Fatal Error: 0x000B0008
1,613,492 >>> mbox cmd response: failed
1,613,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,498 >>> mbox cmd response: failed
1,613,498 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,504 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,634 UART: [kat] SHA2-256
882,565 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,680 UART: [kat] ++
886,832 UART: [kat] sha1
890,906 UART: [kat] SHA2-256
892,844 UART: [kat] SHA2-384
895,621 UART: [kat] SHA2-512-ACC
897,522 UART: [kat] ECC-384
903,625 UART: [kat] HMAC-384Kdf
908,225 UART: [kat] LMS
1,476,421 UART: [kat] --
1,477,308 UART: [cold-reset] ++
1,477,888 UART: [fht] Storing FHT @ 0x50003400
1,480,817 UART: [idev] ++
1,480,985 UART: [idev] CDI.KEYID = 6
1,481,345 UART: [idev] SUBJECT.KEYID = 7
1,481,769 UART: [idev] UDS.KEYID = 0
1,482,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,961 UART: [idev] Erasing UDS.KEYID = 0
1,507,097 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,577 UART: [idev] --
1,516,726 UART: [ldev] ++
1,516,894 UART: [ldev] CDI.KEYID = 6
1,517,257 UART: [ldev] SUBJECT.KEYID = 5
1,517,683 UART: [ldev] AUTHORITY.KEYID = 7
1,518,146 UART: [ldev] FE.KEYID = 1
1,523,310 UART: [ldev] Erasing FE.KEYID = 1
1,548,791 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,607 UART: [ldev] --
1,588,092 UART: [fwproc] Waiting for Commands...
1,588,927 UART: [fwproc] Received command 0x46574c44
1,589,718 UART: [fwproc] Received Image of size 114168 bytes
2,885,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,991 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,343 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,950 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,465,415 >>> mbox cmd response: failed
1,465,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,421 >>> mbox cmd response: failed
1,465,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,954 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,332 UART: [kat] SHA2-512-ACC
908,233 UART: [kat] ECC-384
918,030 UART: [kat] HMAC-384Kdf
922,658 UART: [kat] LMS
1,170,986 UART: [kat] --
1,171,575 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,652 UART: [idev] Erasing UDS.KEYID = 0
1,200,915 UART: [idev] Sha1 KeyId Algorithm
1,209,331 UART: [idev] --
1,210,289 UART: [ldev] ++
1,210,457 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,217,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,568 UART: [fwproc] Wait for Commands...
1,282,292 UART: [fwproc] Recv command 0x46574c44
1,283,020 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,631 UART: ROM Fatal Error: 0x000B0008
1,308,788 >>> mbox cmd response: failed
1,308,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,794 >>> mbox cmd response: failed
1,308,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,800 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
893,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,523 UART: [kat] ++
897,675 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,606 UART: [kat] SHA2-512-ACC
908,507 UART: [kat] ECC-384
918,226 UART: [kat] HMAC-384Kdf
922,778 UART: [kat] LMS
1,171,106 UART: [kat] --
1,171,821 UART: [cold-reset] ++
1,172,353 UART: [fht] FHT @ 0x50003400
1,175,184 UART: [idev] ++
1,175,352 UART: [idev] CDI.KEYID = 6
1,175,712 UART: [idev] SUBJECT.KEYID = 7
1,176,136 UART: [idev] UDS.KEYID = 0
1,176,481 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,580 UART: [idev] Erasing UDS.KEYID = 0
1,201,251 UART: [idev] Sha1 KeyId Algorithm
1,209,691 UART: [idev] --
1,210,797 UART: [ldev] ++
1,210,965 UART: [ldev] CDI.KEYID = 6
1,211,328 UART: [ldev] SUBJECT.KEYID = 5
1,211,754 UART: [ldev] AUTHORITY.KEYID = 7
1,212,217 UART: [ldev] FE.KEYID = 1
1,217,353 UART: [ldev] Erasing FE.KEYID = 1
1,243,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,193 UART: [ldev] --
1,282,590 UART: [fwproc] Wait for Commands...
1,283,174 UART: [fwproc] Recv command 0x46574c44
1,283,902 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,887 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,398 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,675 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,165,243 >>> mbox cmd response: failed
1,165,243 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,249 >>> mbox cmd response: failed
1,165,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,919 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,187 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
893,475 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,600 UART: [kat] ++
897,752 UART: [kat] sha1
902,026 UART: [kat] SHA2-256
903,966 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,035 UART: [kat] HMAC-384Kdf
922,883 UART: [kat] LMS
1,171,211 UART: [kat] --
1,172,036 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,243 UART: [idev] ++
1,175,411 UART: [idev] CDI.KEYID = 6
1,175,771 UART: [idev] SUBJECT.KEYID = 7
1,176,195 UART: [idev] UDS.KEYID = 0
1,176,540 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,201 UART: [idev] Erasing UDS.KEYID = 0
1,201,124 UART: [idev] Sha1 KeyId Algorithm
1,209,568 UART: [idev] --
1,210,652 UART: [ldev] ++
1,210,820 UART: [ldev] CDI.KEYID = 6
1,211,183 UART: [ldev] SUBJECT.KEYID = 5
1,211,609 UART: [ldev] AUTHORITY.KEYID = 7
1,212,072 UART: [ldev] FE.KEYID = 1
1,217,326 UART: [ldev] Erasing FE.KEYID = 1
1,243,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,120 UART: [ldev] --
1,282,489 UART: [fwproc] Wait for Commands...
1,283,231 UART: [fwproc] Recv command 0x46574c44
1,283,959 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,876 UART: ROM Fatal Error: 0x000B0008
1,310,033 >>> mbox cmd response: failed
1,310,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,039 >>> mbox cmd response: failed
1,310,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
893,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,450 UART: [kat] ++
897,602 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,565 UART: [kat] SHA2-512-ACC
908,466 UART: [kat] ECC-384
918,273 UART: [kat] HMAC-384Kdf
922,899 UART: [kat] LMS
1,171,227 UART: [kat] --
1,172,054 UART: [cold-reset] ++
1,172,460 UART: [fht] FHT @ 0x50003400
1,175,047 UART: [idev] ++
1,175,215 UART: [idev] CDI.KEYID = 6
1,175,575 UART: [idev] SUBJECT.KEYID = 7
1,175,999 UART: [idev] UDS.KEYID = 0
1,176,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,275 UART: [idev] Erasing UDS.KEYID = 0
1,201,012 UART: [idev] Sha1 KeyId Algorithm
1,209,266 UART: [idev] --
1,210,110 UART: [ldev] ++
1,210,278 UART: [ldev] CDI.KEYID = 6
1,210,641 UART: [ldev] SUBJECT.KEYID = 5
1,211,067 UART: [ldev] AUTHORITY.KEYID = 7
1,211,530 UART: [ldev] FE.KEYID = 1
1,216,902 UART: [ldev] Erasing FE.KEYID = 1
1,243,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,774 UART: [ldev] --
1,283,171 UART: [fwproc] Wait for Commands...
1,283,871 UART: [fwproc] Recv command 0x46574c44
1,284,599 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,360 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,664 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,123 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,166,380 >>> mbox cmd response: failed
1,166,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,386 >>> mbox cmd response: failed
1,166,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,516 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,308 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
890,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,877 UART: [kat] ++
895,029 UART: [kat] sha1
899,209 UART: [kat] SHA2-256
901,149 UART: [kat] SHA2-384
903,894 UART: [kat] SHA2-512-ACC
905,795 UART: [kat] ECC-384
915,750 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,509 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,567 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,411 UART: [idev] --
1,208,336 UART: [ldev] ++
1,208,504 UART: [ldev] CDI.KEYID = 6
1,208,868 UART: [ldev] SUBJECT.KEYID = 5
1,209,295 UART: [ldev] AUTHORITY.KEYID = 7
1,209,758 UART: [ldev] FE.KEYID = 1
1,214,714 UART: [ldev] Erasing FE.KEYID = 1
1,240,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,378 UART: [ldev] --
1,279,848 UART: [fwproc] Wait for Commands...
1,280,489 UART: [fwproc] Recv command 0x46574c44
1,281,222 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,058 UART: ROM Fatal Error: 0x000B0008
1,307,215 >>> mbox cmd response: failed
1,307,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,221 >>> mbox cmd response: failed
1,307,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
915,760 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,989 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,083 UART: [idev] ++
1,173,251 UART: [idev] CDI.KEYID = 6
1,173,612 UART: [idev] SUBJECT.KEYID = 7
1,174,037 UART: [idev] UDS.KEYID = 0
1,174,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,129 UART: [idev] Erasing UDS.KEYID = 0
1,198,535 UART: [idev] Sha1 KeyId Algorithm
1,207,233 UART: [idev] --
1,208,392 UART: [ldev] ++
1,208,560 UART: [ldev] CDI.KEYID = 6
1,208,924 UART: [ldev] SUBJECT.KEYID = 5
1,209,351 UART: [ldev] AUTHORITY.KEYID = 7
1,209,814 UART: [ldev] FE.KEYID = 1
1,214,974 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,720 UART: [ldev] --
1,281,040 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,683 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,992 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,522 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,930 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,570 >>> mbox cmd response: failed
1,159,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,576 >>> mbox cmd response: failed
1,159,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,054 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,986 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,861 UART: [kat] SHA2-512-ACC
906,762 UART: [kat] ECC-384
916,543 UART: [kat] HMAC-384Kdf
921,223 UART: [kat] LMS
1,169,535 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,728 UART: [fht] FHT @ 0x50003400
1,173,448 UART: [idev] ++
1,173,616 UART: [idev] CDI.KEYID = 6
1,173,977 UART: [idev] SUBJECT.KEYID = 7
1,174,402 UART: [idev] UDS.KEYID = 0
1,174,748 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,484 UART: [idev] Erasing UDS.KEYID = 0
1,199,166 UART: [idev] Sha1 KeyId Algorithm
1,208,012 UART: [idev] --
1,209,177 UART: [ldev] ++
1,209,345 UART: [ldev] CDI.KEYID = 6
1,209,709 UART: [ldev] SUBJECT.KEYID = 5
1,210,136 UART: [ldev] AUTHORITY.KEYID = 7
1,210,599 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,097 UART: [ldev] --
1,281,459 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 114168 bytes
1,307,739 UART: ROM Fatal Error: 0x000B0008
1,308,896 >>> mbox cmd response: failed
1,308,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,902 >>> mbox cmd response: failed
1,308,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,120 UART: [state] WD Timer not started. Device not locked for debugging
88,411 UART: [kat] SHA2-256
891,961 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,090 UART: [kat] ++
896,242 UART: [kat] sha1
900,466 UART: [kat] SHA2-256
902,406 UART: [kat] SHA2-384
905,229 UART: [kat] SHA2-512-ACC
907,130 UART: [kat] ECC-384
916,937 UART: [kat] HMAC-384Kdf
921,499 UART: [kat] LMS
1,169,811 UART: [kat] --
1,170,690 UART: [cold-reset] ++
1,171,160 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,174,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,988 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,208,892 UART: [idev] --
1,209,877 UART: [ldev] ++
1,210,045 UART: [ldev] CDI.KEYID = 6
1,210,409 UART: [ldev] SUBJECT.KEYID = 5
1,210,836 UART: [ldev] AUTHORITY.KEYID = 7
1,211,299 UART: [ldev] FE.KEYID = 1
1,216,845 UART: [ldev] Erasing FE.KEYID = 1
1,243,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,579 UART: [ldev] --
1,282,945 UART: [fwproc] Wait for Commands...
1,283,610 UART: [fwproc] Recv command 0x46574c44
1,284,343 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,536 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,128 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,437 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,907 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,027 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,901 >>> mbox cmd response: failed
1,160,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,907 >>> mbox cmd response: failed
1,160,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,091 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,094 UART:
192,464 UART: Running Caliptra ROM ...
193,593 UART:
193,737 UART: [state] CFI Enabled
265,010 UART: [state] LifecycleState = Unprovisioned
266,965 UART: [state] DebugLocked = No
269,155 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,275 UART: [kat] SHA2-256
443,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,462 UART: [kat] ++
454,996 UART: [kat] sha1
465,982 UART: [kat] SHA2-256
468,723 UART: [kat] SHA2-384
474,802 UART: [kat] SHA2-512-ACC
477,202 UART: [kat] ECC-384
2,767,960 UART: [kat] HMAC-384Kdf
2,799,638 UART: [kat] LMS
3,989,954 UART: [kat] --
3,996,714 UART: [cold-reset] ++
3,998,651 UART: [fht] Storing FHT @ 0x50003400
4,011,699 UART: [idev] ++
4,012,269 UART: [idev] CDI.KEYID = 6
4,013,289 UART: [idev] SUBJECT.KEYID = 7
4,014,471 UART: [idev] UDS.KEYID = 0
4,017,240 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,160,630 UART: [idev] Erasing UDS.KEYID = 0
7,345,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,750 UART: [idev] --
7,371,693 UART: [ldev] ++
7,372,263 UART: [ldev] CDI.KEYID = 6
7,373,229 UART: [ldev] SUBJECT.KEYID = 5
7,374,445 UART: [ldev] AUTHORITY.KEYID = 7
7,375,677 UART: [ldev] FE.KEYID = 1
7,422,380 UART: [ldev] Erasing FE.KEYID = 1
10,754,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,011 UART: [ldev] --
13,137,906 UART: [fwproc] Waiting for Commands...
13,140,108 UART: [fwproc] Received command 0x46574c44
13,142,299 UART: [fwproc] Received Image of size 113844 bytes
13,215,807 UART: ROM Fatal Error: 0x000B0009
13,219,270 >>> mbox cmd response: failed
13,219,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,220,013 >>> mbox cmd response: failed
13,220,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,220,575 >>> mbox cmd response: failed
Initializing fuses
2,047,872 writing to cptra_bootfsm_go
2,237,181 UART:
2,237,554 UART: Running Caliptra ROM ...
2,238,701 UART:
2,238,874 UART: [state] CFI Enabled
2,315,044 UART: [state] LifecycleState = Unprovisioned
2,317,000 UART: [state] DebugLocked = No
2,318,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,686 UART: [kat] SHA2-256
2,493,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,892 UART: [kat] ++
2,504,405 UART: [kat] sha1
2,515,996 UART: [kat] SHA2-256
2,518,690 UART: [kat] SHA2-384
2,524,949 UART: [kat] SHA2-512-ACC
2,527,308 UART: [kat] ECC-384
4,817,000 UART: [kat] HMAC-384Kdf
4,848,358 UART: [kat] LMS
6,038,695 UART: [kat] --
6,044,381 UART: [cold-reset] ++
6,045,353 UART: [fht] Storing FHT @ 0x50003400
6,057,574 UART: [idev] ++
6,058,138 UART: [idev] CDI.KEYID = 6
6,059,078 UART: [idev] SUBJECT.KEYID = 7
6,060,354 UART: [idev] UDS.KEYID = 0
6,062,827 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,206,083 UART: [idev] Erasing UDS.KEYID = 0
9,395,872 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,598 UART: [idev] --
9,421,403 UART: [ldev] ++
9,421,981 UART: [ldev] CDI.KEYID = 6
9,422,948 UART: [ldev] SUBJECT.KEYID = 5
9,424,201 UART: [ldev] AUTHORITY.KEYID = 7
9,425,436 UART: [ldev] FE.KEYID = 1
9,470,790 UART: [ldev] Erasing FE.KEYID = 1
12,804,201 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,116,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,131,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,160,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,178,311 UART: [ldev] --
15,182,819 UART: [fwproc] Waiting for Commands...
15,184,535 UART: [fwproc] Received command 0x46574c44
15,186,723 UART: [fwproc] Received Image of size 113844 bytes
19,238,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,311,550 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,380,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,696,229 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,785,234 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,909,240 >>> mbox cmd response: failed
12,909,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,196 >>> mbox cmd response: failed
12,910,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,910,766 >>> mbox cmd response: failed
Initializing fuses
2,045,960 writing to cptra_bootfsm_go
5,825,914 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,886,860 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,416 UART:
192,797 UART: Running Caliptra ROM ...
193,931 UART:
603,505 UART: [state] CFI Enabled
615,928 UART: [state] LifecycleState = Unprovisioned
617,870 UART: [state] DebugLocked = No
620,225 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,889 UART: [kat] SHA2-256
794,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,229 UART: [kat] ++
805,674 UART: [kat] sha1
817,035 UART: [kat] SHA2-256
819,726 UART: [kat] SHA2-384
824,734 UART: [kat] SHA2-512-ACC
827,125 UART: [kat] ECC-384
3,111,125 UART: [kat] HMAC-384Kdf
3,122,339 UART: [kat] LMS
4,312,490 UART: [kat] --
4,315,296 UART: [cold-reset] ++
4,316,310 UART: [fht] Storing FHT @ 0x50003400
4,326,876 UART: [idev] ++
4,327,456 UART: [idev] CDI.KEYID = 6
4,328,335 UART: [idev] SUBJECT.KEYID = 7
4,329,602 UART: [idev] UDS.KEYID = 0
4,332,311 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,475,540 UART: [idev] Erasing UDS.KEYID = 0
7,614,156 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,921 UART: [idev] --
7,641,268 UART: [ldev] ++
7,641,840 UART: [ldev] CDI.KEYID = 6
7,642,809 UART: [ldev] SUBJECT.KEYID = 5
7,643,970 UART: [ldev] AUTHORITY.KEYID = 7
7,645,374 UART: [ldev] FE.KEYID = 1
7,657,011 UART: [ldev] Erasing FE.KEYID = 1
10,947,196 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,183 UART: [ldev] --
13,306,177 UART: [fwproc] Waiting for Commands...
13,308,066 UART: [fwproc] Received command 0x46574c44
13,310,254 UART: [fwproc] Received Image of size 113844 bytes
13,387,050 UART: ROM Fatal Error: 0x000B0009
13,390,574 >>> mbox cmd response: failed
13,390,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,313 >>> mbox cmd response: failed
13,391,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,391,870 >>> mbox cmd response: failed
Initializing fuses
2,054,570 writing to cptra_bootfsm_go
2,243,896 UART:
2,244,262 UART: Running Caliptra ROM ...
2,245,402 UART:
7,075,295 UART: [state] CFI Enabled
7,088,542 UART: [state] LifecycleState = Unprovisioned
7,090,465 UART: [state] DebugLocked = No
7,092,262 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,096,887 UART: [kat] SHA2-256
7,266,614 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,277,170 UART: [kat] ++
7,277,627 UART: [kat] sha1
7,289,105 UART: [kat] SHA2-256
7,291,795 UART: [kat] SHA2-384
7,298,901 UART: [kat] SHA2-512-ACC
7,301,268 UART: [kat] ECC-384
9,585,140 UART: [kat] HMAC-384Kdf
9,596,499 UART: [kat] LMS
10,786,598 UART: [kat] --
10,790,012 UART: [cold-reset] ++
10,791,621 UART: [fht] Storing FHT @ 0x50003400
10,803,799 UART: [idev] ++
10,804,369 UART: [idev] CDI.KEYID = 6
10,805,304 UART: [idev] SUBJECT.KEYID = 7
10,806,567 UART: [idev] UDS.KEYID = 0
10,809,198 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,952,344 UART: [idev] Erasing UDS.KEYID = 0
14,093,738 UART: [idev] Using Sha1 for KeyId Algorithm
14,114,953 UART: [idev] --
14,119,865 UART: [ldev] ++
14,120,481 UART: [ldev] CDI.KEYID = 6
14,121,404 UART: [ldev] SUBJECT.KEYID = 5
14,122,675 UART: [ldev] AUTHORITY.KEYID = 7
14,123,914 UART: [ldev] FE.KEYID = 1
14,134,344 UART: [ldev] Erasing FE.KEYID = 1
17,419,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,710,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,725,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,740,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,754,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,773,205 UART: [ldev] --
19,778,457 UART: [fwproc] Waiting for Commands...
19,781,045 UART: [fwproc] Received command 0x46574c44
19,783,237 UART: [fwproc] Received Image of size 113844 bytes
23,836,943 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,916,525 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,985,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,302,570 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,131,848 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,130,262 >>> mbox cmd response: failed
13,130,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,131,132 >>> mbox cmd response: failed
13,131,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,131,648 >>> mbox cmd response: failed
Initializing fuses
2,049,052 writing to cptra_bootfsm_go
10,850,724 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,801,282 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
192,305 UART:
192,666 UART: Running Caliptra ROM ...
193,843 UART:
193,991 UART: [state] CFI Enabled
260,759 UART: [state] LifecycleState = Unprovisioned
262,618 UART: [state] DebugLocked = No
265,569 UART: [state] WD Timer not started. Device not locked for debugging
269,290 UART: [kat] SHA2-256
448,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,946 UART: [kat] ++
460,476 UART: [kat] sha1
470,762 UART: [kat] SHA2-256
473,768 UART: [kat] SHA2-384
480,431 UART: [kat] SHA2-512-ACC
483,413 UART: [kat] ECC-384
2,946,345 UART: [kat] HMAC-384Kdf
2,973,587 UART: [kat] LMS
3,503,058 UART: [kat] --
3,506,900 UART: [cold-reset] ++
3,508,075 UART: [fht] FHT @ 0x50003400
3,517,577 UART: [idev] ++
3,518,318 UART: [idev] CDI.KEYID = 6
3,519,227 UART: [idev] SUBJECT.KEYID = 7
3,520,345 UART: [idev] UDS.KEYID = 0
3,523,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,918 UART: [idev] Erasing UDS.KEYID = 0
6,028,459 UART: [idev] Sha1 KeyId Algorithm
6,051,327 UART: [idev] --
6,055,434 UART: [ldev] ++
6,056,003 UART: [ldev] CDI.KEYID = 6
6,056,898 UART: [ldev] SUBJECT.KEYID = 5
6,058,140 UART: [ldev] AUTHORITY.KEYID = 7
6,059,379 UART: [ldev] FE.KEYID = 1
6,103,847 UART: [ldev] Erasing FE.KEYID = 1
8,609,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,535 UART: [ldev] --
10,414,460 UART: [fwproc] Wait for Commands...
10,417,315 UART: [fwproc] Recv command 0x46574c44
10,419,356 UART: [fwproc] Recv'd Img size: 114168 bytes
10,490,248 UART: ROM Fatal Error: 0x000B0009
10,493,354 >>> mbox cmd response: failed
10,493,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,494,040 >>> mbox cmd response: failed
10,494,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,494,689 >>> mbox cmd response: failed
Initializing fuses
2,048,795 writing to cptra_bootfsm_go
2,238,092 UART:
2,238,446 UART: Running Caliptra ROM ...
2,239,494 UART:
2,239,645 UART: [state] CFI Enabled
2,314,694 UART: [state] LifecycleState = Unprovisioned
2,316,523 UART: [state] DebugLocked = No
2,318,751 UART: [state] WD Timer not started. Device not locked for debugging
2,322,887 UART: [kat] SHA2-256
2,501,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,513,560 UART: [kat] ++
2,514,018 UART: [kat] sha1
2,525,605 UART: [kat] SHA2-256
2,528,675 UART: [kat] SHA2-384
2,534,345 UART: [kat] SHA2-512-ACC
2,537,289 UART: [kat] ECC-384
5,000,906 UART: [kat] HMAC-384Kdf
5,022,646 UART: [kat] LMS
5,552,064 UART: [kat] --
5,556,329 UART: [cold-reset] ++
5,557,287 UART: [fht] FHT @ 0x50003400
5,567,540 UART: [idev] ++
5,568,094 UART: [idev] CDI.KEYID = 6
5,568,978 UART: [idev] SUBJECT.KEYID = 7
5,570,188 UART: [idev] UDS.KEYID = 0
5,572,910 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,716,643 UART: [idev] Erasing UDS.KEYID = 0
8,080,444 UART: [idev] Sha1 KeyId Algorithm
8,103,679 UART: [idev] --
8,106,869 UART: [ldev] ++
8,107,442 UART: [ldev] CDI.KEYID = 6
8,108,327 UART: [ldev] SUBJECT.KEYID = 5
8,109,542 UART: [ldev] AUTHORITY.KEYID = 7
8,110,778 UART: [ldev] FE.KEYID = 1
8,151,323 UART: [ldev] Erasing FE.KEYID = 1
10,653,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,929 UART: [ldev] --
12,467,358 UART: [fwproc] Wait for Commands...
12,469,085 UART: [fwproc] Recv command 0x46574c44
12,471,209 UART: [fwproc] Recv'd Img size: 114168 bytes
15,874,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,949,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,018,297 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,334,876 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,382,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,298,832 >>> mbox cmd response: failed
10,299,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,299,965 >>> mbox cmd response: failed
10,300,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,300,480 >>> mbox cmd response: failed
Initializing fuses
2,044,366 writing to cptra_bootfsm_go
5,394,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,090,945 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,553 UART:
192,914 UART: Running Caliptra ROM ...
194,101 UART:
603,568 UART: [state] CFI Enabled
619,036 UART: [state] LifecycleState = Unprovisioned
620,865 UART: [state] DebugLocked = No
623,430 UART: [state] WD Timer not started. Device not locked for debugging
626,844 UART: [kat] SHA2-256
805,973 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,567 UART: [kat] ++
818,014 UART: [kat] sha1
828,458 UART: [kat] SHA2-256
831,516 UART: [kat] SHA2-384
839,055 UART: [kat] SHA2-512-ACC
842,053 UART: [kat] ECC-384
3,281,561 UART: [kat] HMAC-384Kdf
3,294,300 UART: [kat] LMS
3,823,780 UART: [kat] --
3,829,769 UART: [cold-reset] ++
3,831,872 UART: [fht] FHT @ 0x50003400
3,843,926 UART: [idev] ++
3,844,692 UART: [idev] CDI.KEYID = 6
3,845,582 UART: [idev] SUBJECT.KEYID = 7
3,846,629 UART: [idev] UDS.KEYID = 0
3,849,332 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,773 UART: [idev] Erasing UDS.KEYID = 0
6,319,933 UART: [idev] Sha1 KeyId Algorithm
6,343,207 UART: [idev] --
6,348,269 UART: [ldev] ++
6,348,849 UART: [ldev] CDI.KEYID = 6
6,349,770 UART: [ldev] SUBJECT.KEYID = 5
6,350,934 UART: [ldev] AUTHORITY.KEYID = 7
6,352,171 UART: [ldev] FE.KEYID = 1
6,365,195 UART: [ldev] Erasing FE.KEYID = 1
8,838,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,415 UART: [ldev] --
10,628,733 UART: [fwproc] Wait for Commands...
10,630,946 UART: [fwproc] Recv command 0x46574c44
10,633,042 UART: [fwproc] Recv'd Img size: 114168 bytes
10,705,354 UART: ROM Fatal Error: 0x000B0009
10,708,467 >>> mbox cmd response: failed
10,708,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,709,244 >>> mbox cmd response: failed
10,709,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,709,807 >>> mbox cmd response: failed
Initializing fuses
2,047,738 writing to cptra_bootfsm_go
2,237,098 UART:
2,237,445 UART: Running Caliptra ROM ...
2,238,500 UART:
9,746,973 UART: [state] CFI Enabled
9,760,804 UART: [state] LifecycleState = Unprovisioned
9,762,665 UART: [state] DebugLocked = No
9,765,100 UART: [state] WD Timer not started. Device not locked for debugging
9,768,895 UART: [kat] SHA2-256
9,948,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,959,593 UART: [kat] ++
9,960,057 UART: [kat] sha1
9,971,756 UART: [kat] SHA2-256
9,974,787 UART: [kat] SHA2-384
9,980,204 UART: [kat] SHA2-512-ACC
9,983,152 UART: [kat] ECC-384
12,423,283 UART: [kat] HMAC-384Kdf
12,436,375 UART: [kat] LMS
12,965,899 UART: [kat] --
12,970,427 UART: [cold-reset] ++
12,972,735 UART: [fht] FHT @ 0x50003400
12,984,126 UART: [idev] ++
12,984,709 UART: [idev] CDI.KEYID = 6
12,985,624 UART: [idev] SUBJECT.KEYID = 7
12,986,783 UART: [idev] UDS.KEYID = 0
12,989,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,132,916 UART: [idev] Erasing UDS.KEYID = 0
15,459,915 UART: [idev] Sha1 KeyId Algorithm
15,483,395 UART: [idev] --
15,487,660 UART: [ldev] ++
15,488,251 UART: [ldev] CDI.KEYID = 6
15,489,159 UART: [ldev] SUBJECT.KEYID = 5
15,490,317 UART: [ldev] AUTHORITY.KEYID = 7
15,491,547 UART: [ldev] FE.KEYID = 1
15,501,056 UART: [ldev] Erasing FE.KEYID = 1
17,977,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,695,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,727,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,743,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,764,681 UART: [ldev] --
19,768,864 UART: [fwproc] Wait for Commands...
19,770,636 UART: [fwproc] Recv command 0x46574c44
19,772,677 UART: [fwproc] Recv'd Img size: 114168 bytes
23,172,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,249,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,318,372 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,636,519 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,699,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,475,984 >>> mbox cmd response: failed
10,476,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,476,891 >>> mbox cmd response: failed
10,477,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,477,467 >>> mbox cmd response: failed
Initializing fuses
2,052,038 writing to cptra_bootfsm_go
13,085,312 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,653,844 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,172 UART:
192,518 UART: Running Caliptra ROM ...
193,627 UART:
193,767 UART: [state] CFI Enabled
266,617 UART: [state] LifecycleState = Unprovisioned
269,002 UART: [state] DebugLocked = No
271,503 UART: [state] WD Timer not started. Device not locked for debugging
275,795 UART: [kat] SHA2-256
465,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,453 UART: [kat] ++
476,904 UART: [kat] sha1
489,456 UART: [kat] SHA2-256
492,471 UART: [kat] SHA2-384
499,423 UART: [kat] SHA2-512-ACC
501,983 UART: [kat] ECC-384
2,946,540 UART: [kat] HMAC-384Kdf
2,970,920 UART: [kat] LMS
3,502,655 UART: [kat] --
3,507,848 UART: [cold-reset] ++
3,509,408 UART: [fht] FHT @ 0x50003400
3,519,319 UART: [idev] ++
3,520,012 UART: [idev] CDI.KEYID = 6
3,520,960 UART: [idev] SUBJECT.KEYID = 7
3,522,174 UART: [idev] UDS.KEYID = 0
3,525,148 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,994 UART: [idev] Erasing UDS.KEYID = 0
6,029,464 UART: [idev] Sha1 KeyId Algorithm
6,050,884 UART: [idev] --
6,055,784 UART: [ldev] ++
6,056,482 UART: [ldev] CDI.KEYID = 6
6,057,367 UART: [ldev] SUBJECT.KEYID = 5
6,058,486 UART: [ldev] AUTHORITY.KEYID = 7
6,059,892 UART: [ldev] FE.KEYID = 1
6,101,035 UART: [ldev] Erasing FE.KEYID = 1
8,607,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,375 UART: [ldev] --
10,414,803 UART: [fwproc] Wait for Commands...
10,417,062 UART: [fwproc] Recv command 0x46574c44
10,419,383 UART: [fwproc] Recv'd Img size: 114168 bytes
10,523,994 UART: ROM Fatal Error: 0x000B0009
10,527,684 >>> mbox cmd response: failed
10,528,049 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,528,419 >>> mbox cmd response: failed
10,528,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,528,938 >>> mbox cmd response: failed
Initializing fuses
2,049,154 writing to cptra_bootfsm_go
2,238,432 UART:
2,238,781 UART: Running Caliptra ROM ...
2,239,924 UART:
2,240,090 UART: [state] CFI Enabled
2,297,001 UART: [state] LifecycleState = Unprovisioned
2,299,414 UART: [state] DebugLocked = No
2,300,809 UART: [state] WD Timer not started. Device not locked for debugging
2,304,952 UART: [kat] SHA2-256
2,494,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,505,602 UART: [kat] ++
2,506,067 UART: [kat] sha1
2,518,404 UART: [kat] SHA2-256
2,521,438 UART: [kat] SHA2-384
2,526,946 UART: [kat] SHA2-512-ACC
2,529,517 UART: [kat] ECC-384
4,982,861 UART: [kat] HMAC-384Kdf
5,006,331 UART: [kat] LMS
5,538,078 UART: [kat] --
5,543,318 UART: [cold-reset] ++
5,545,902 UART: [fht] FHT @ 0x50003400
5,558,397 UART: [idev] ++
5,559,081 UART: [idev] CDI.KEYID = 6
5,560,102 UART: [idev] SUBJECT.KEYID = 7
5,561,270 UART: [idev] UDS.KEYID = 0
5,563,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,707,636 UART: [idev] Erasing UDS.KEYID = 0
8,063,548 UART: [idev] Sha1 KeyId Algorithm
8,087,320 UART: [idev] --
8,091,995 UART: [ldev] ++
8,092,695 UART: [ldev] CDI.KEYID = 6
8,093,613 UART: [ldev] SUBJECT.KEYID = 5
8,094,795 UART: [ldev] AUTHORITY.KEYID = 7
8,095,979 UART: [ldev] FE.KEYID = 1
8,133,581 UART: [ldev] Erasing FE.KEYID = 1
10,639,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,387,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,418,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,439,042 UART: [ldev] --
12,444,743 UART: [fwproc] Wait for Commands...
12,447,382 UART: [fwproc] Recv command 0x46574c44
12,449,697 UART: [fwproc] Recv'd Img size: 114168 bytes
15,899,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,096,322 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,637,223 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,442,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,319,719 >>> mbox cmd response: failed
10,320,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,320,560 >>> mbox cmd response: failed
10,320,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,321,121 >>> mbox cmd response: failed
Initializing fuses
2,047,811 writing to cptra_bootfsm_go
5,470,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,758,908 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
192,604 UART:
192,982 UART: Running Caliptra ROM ...
194,123 UART:
603,660 UART: [state] CFI Enabled
615,087 UART: [state] LifecycleState = Unprovisioned
617,461 UART: [state] DebugLocked = No
618,728 UART: [state] WD Timer not started. Device not locked for debugging
622,497 UART: [kat] SHA2-256
812,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,205 UART: [kat] ++
823,796 UART: [kat] sha1
834,417 UART: [kat] SHA2-256
837,434 UART: [kat] SHA2-384
842,889 UART: [kat] SHA2-512-ACC
845,451 UART: [kat] ECC-384
3,286,073 UART: [kat] HMAC-384Kdf
3,298,538 UART: [kat] LMS
3,830,369 UART: [kat] --
3,835,056 UART: [cold-reset] ++
3,837,105 UART: [fht] FHT @ 0x50003400
3,849,223 UART: [idev] ++
3,849,897 UART: [idev] CDI.KEYID = 6
3,850,864 UART: [idev] SUBJECT.KEYID = 7
3,852,081 UART: [idev] UDS.KEYID = 0
3,854,972 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,592 UART: [idev] Erasing UDS.KEYID = 0
6,327,976 UART: [idev] Sha1 KeyId Algorithm
6,350,559 UART: [idev] --
6,356,278 UART: [ldev] ++
6,356,992 UART: [ldev] CDI.KEYID = 6
6,357,910 UART: [ldev] SUBJECT.KEYID = 5
6,359,074 UART: [ldev] AUTHORITY.KEYID = 7
6,360,251 UART: [ldev] FE.KEYID = 1
6,370,791 UART: [ldev] Erasing FE.KEYID = 1
8,846,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,431 UART: [ldev] --
10,638,045 UART: [fwproc] Wait for Commands...
10,641,180 UART: [fwproc] Recv command 0x46574c44
10,643,441 UART: [fwproc] Recv'd Img size: 114168 bytes
10,745,719 UART: ROM Fatal Error: 0x000B0009
10,749,406 >>> mbox cmd response: failed
10,749,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,750,137 >>> mbox cmd response: failed
10,750,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,750,691 >>> mbox cmd response: failed
Initializing fuses
2,060,941 writing to cptra_bootfsm_go
2,250,258 UART:
2,250,607 UART: Running Caliptra ROM ...
2,251,771 UART:
9,703,408 UART: [state] CFI Enabled
9,712,886 UART: [state] LifecycleState = Unprovisioned
9,715,242 UART: [state] DebugLocked = No
9,717,437 UART: [state] WD Timer not started. Device not locked for debugging
9,722,276 UART: [kat] SHA2-256
9,912,165 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,922,961 UART: [kat] ++
9,923,506 UART: [kat] sha1
9,936,102 UART: [kat] SHA2-256
9,939,141 UART: [kat] SHA2-384
9,946,379 UART: [kat] SHA2-512-ACC
9,949,013 UART: [kat] ECC-384
12,389,728 UART: [kat] HMAC-384Kdf
12,401,366 UART: [kat] LMS
12,933,209 UART: [kat] --
12,937,563 UART: [cold-reset] ++
12,939,008 UART: [fht] FHT @ 0x50003400
12,950,486 UART: [idev] ++
12,951,221 UART: [idev] CDI.KEYID = 6
12,952,104 UART: [idev] SUBJECT.KEYID = 7
12,953,369 UART: [idev] UDS.KEYID = 0
12,956,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,099,692 UART: [idev] Erasing UDS.KEYID = 0
15,430,063 UART: [idev] Sha1 KeyId Algorithm
15,451,871 UART: [idev] --
15,455,842 UART: [ldev] ++
15,456,432 UART: [ldev] CDI.KEYID = 6
15,457,413 UART: [ldev] SUBJECT.KEYID = 5
15,458,534 UART: [ldev] AUTHORITY.KEYID = 7
15,459,726 UART: [ldev] FE.KEYID = 1
15,473,141 UART: [ldev] Erasing FE.KEYID = 1
17,951,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,672,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,687,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,702,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,717,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,738,090 UART: [ldev] --
19,742,777 UART: [fwproc] Wait for Commands...
19,744,838 UART: [fwproc] Recv command 0x46574c44
19,747,070 UART: [fwproc] Recv'd Img size: 114168 bytes
23,186,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,258,112 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,374,267 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,915,819 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,756,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,538,767 >>> mbox cmd response: failed
10,539,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,539,682 >>> mbox cmd response: failed
10,539,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,540,240 >>> mbox cmd response: failed
Initializing fuses
2,045,674 writing to cptra_bootfsm_go
13,075,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,271,541 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,517 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,999 UART: [kat] SHA2-256
881,930 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,045 UART: [kat] ++
886,197 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,166 UART: [kat] SHA2-512-ACC
897,067 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,118 UART: [kat] LMS
1,475,314 UART: [kat] --
1,476,419 UART: [cold-reset] ++
1,476,917 UART: [fht] Storing FHT @ 0x50003400
1,479,798 UART: [idev] ++
1,479,966 UART: [idev] CDI.KEYID = 6
1,480,326 UART: [idev] SUBJECT.KEYID = 7
1,480,750 UART: [idev] UDS.KEYID = 0
1,481,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,574 UART: [idev] Erasing UDS.KEYID = 0
1,505,270 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,890 UART: [idev] --
1,515,101 UART: [ldev] ++
1,515,269 UART: [ldev] CDI.KEYID = 6
1,515,632 UART: [ldev] SUBJECT.KEYID = 5
1,516,058 UART: [ldev] AUTHORITY.KEYID = 7
1,516,521 UART: [ldev] FE.KEYID = 1
1,521,831 UART: [ldev] Erasing FE.KEYID = 1
1,547,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,650 UART: [ldev] --
1,586,139 UART: [fwproc] Waiting for Commands...
1,587,002 UART: [fwproc] Received command 0x46574c44
1,587,793 UART: [fwproc] Received Image of size 114168 bytes
1,612,775 UART: ROM Fatal Error: 0x000B0009
1,613,932 >>> mbox cmd response: failed
1,613,932 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,938 >>> mbox cmd response: failed
1,613,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,944 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,759 UART: [kat] SHA2-256
881,690 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,805 UART: [kat] ++
885,957 UART: [kat] sha1
890,141 UART: [kat] SHA2-256
892,079 UART: [kat] SHA2-384
894,722 UART: [kat] SHA2-512-ACC
896,623 UART: [kat] ECC-384
902,062 UART: [kat] HMAC-384Kdf
906,682 UART: [kat] LMS
1,474,878 UART: [kat] --
1,475,643 UART: [cold-reset] ++
1,476,131 UART: [fht] Storing FHT @ 0x50003400
1,478,752 UART: [idev] ++
1,478,920 UART: [idev] CDI.KEYID = 6
1,479,280 UART: [idev] SUBJECT.KEYID = 7
1,479,704 UART: [idev] UDS.KEYID = 0
1,480,049 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,790 UART: [idev] Erasing UDS.KEYID = 0
1,503,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,356 UART: [idev] --
1,513,325 UART: [ldev] ++
1,513,493 UART: [ldev] CDI.KEYID = 6
1,513,856 UART: [ldev] SUBJECT.KEYID = 5
1,514,282 UART: [ldev] AUTHORITY.KEYID = 7
1,514,745 UART: [ldev] FE.KEYID = 1
1,520,141 UART: [ldev] Erasing FE.KEYID = 1
1,545,884 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,558 UART: [ldev] --
1,584,909 UART: [fwproc] Waiting for Commands...
1,585,648 UART: [fwproc] Received command 0x46574c44
1,586,439 UART: [fwproc] Received Image of size 114168 bytes
2,881,948 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,382 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,411 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,969 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,466,219 >>> mbox cmd response: failed
1,466,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,225 >>> mbox cmd response: failed
1,466,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,123 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,807 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,514 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,680 UART: [kat] SHA2-256
882,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,726 UART: [kat] ++
886,878 UART: [kat] sha1
891,230 UART: [kat] SHA2-256
893,168 UART: [kat] SHA2-384
895,859 UART: [kat] SHA2-512-ACC
897,760 UART: [kat] ECC-384
903,377 UART: [kat] HMAC-384Kdf
908,037 UART: [kat] LMS
1,476,233 UART: [kat] --
1,477,016 UART: [cold-reset] ++
1,477,382 UART: [fht] Storing FHT @ 0x50003400
1,480,073 UART: [idev] ++
1,480,241 UART: [idev] CDI.KEYID = 6
1,480,601 UART: [idev] SUBJECT.KEYID = 7
1,481,025 UART: [idev] UDS.KEYID = 0
1,481,370 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,837 UART: [idev] Erasing UDS.KEYID = 0
1,505,805 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,563 UART: [idev] --
1,515,518 UART: [ldev] ++
1,515,686 UART: [ldev] CDI.KEYID = 6
1,516,049 UART: [ldev] SUBJECT.KEYID = 5
1,516,475 UART: [ldev] AUTHORITY.KEYID = 7
1,516,938 UART: [ldev] FE.KEYID = 1
1,522,158 UART: [ldev] Erasing FE.KEYID = 1
1,547,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,837 UART: [ldev] --
1,586,250 UART: [fwproc] Waiting for Commands...
1,586,865 UART: [fwproc] Received command 0x46574c44
1,587,656 UART: [fwproc] Received Image of size 114168 bytes
1,612,704 UART: ROM Fatal Error: 0x000B0009
1,613,861 >>> mbox cmd response: failed
1,613,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,867 >>> mbox cmd response: failed
1,613,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,938 UART: [kat] SHA2-256
881,869 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,984 UART: [kat] ++
886,136 UART: [kat] sha1
890,446 UART: [kat] SHA2-256
892,384 UART: [kat] SHA2-384
895,147 UART: [kat] SHA2-512-ACC
897,048 UART: [kat] ECC-384
902,395 UART: [kat] HMAC-384Kdf
906,997 UART: [kat] LMS
1,475,193 UART: [kat] --
1,476,104 UART: [cold-reset] ++
1,476,672 UART: [fht] Storing FHT @ 0x50003400
1,479,617 UART: [idev] ++
1,479,785 UART: [idev] CDI.KEYID = 6
1,480,145 UART: [idev] SUBJECT.KEYID = 7
1,480,569 UART: [idev] UDS.KEYID = 0
1,480,914 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,615 UART: [idev] Erasing UDS.KEYID = 0
1,505,787 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,639 UART: [idev] --
1,515,708 UART: [ldev] ++
1,515,876 UART: [ldev] CDI.KEYID = 6
1,516,239 UART: [ldev] SUBJECT.KEYID = 5
1,516,665 UART: [ldev] AUTHORITY.KEYID = 7
1,517,128 UART: [ldev] FE.KEYID = 1
1,522,454 UART: [ldev] Erasing FE.KEYID = 1
1,548,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,213 UART: [ldev] --
1,587,520 UART: [fwproc] Waiting for Commands...
1,588,213 UART: [fwproc] Received command 0x46574c44
1,589,004 UART: [fwproc] Received Image of size 114168 bytes
2,884,127 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,157 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,509 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,090 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,558 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,467,168 >>> mbox cmd response: failed
1,467,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,174 >>> mbox cmd response: failed
1,467,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,180 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,658 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,844 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,494 UART: [kat] SHA2-256
893,144 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,269 UART: [kat] ++
897,421 UART: [kat] sha1
901,667 UART: [kat] SHA2-256
903,607 UART: [kat] SHA2-384
906,420 UART: [kat] SHA2-512-ACC
908,321 UART: [kat] ECC-384
918,350 UART: [kat] HMAC-384Kdf
922,886 UART: [kat] LMS
1,171,214 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,583 UART: [fht] FHT @ 0x50003400
1,175,370 UART: [idev] ++
1,175,538 UART: [idev] CDI.KEYID = 6
1,175,898 UART: [idev] SUBJECT.KEYID = 7
1,176,322 UART: [idev] UDS.KEYID = 0
1,176,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,438 UART: [idev] Erasing UDS.KEYID = 0
1,201,893 UART: [idev] Sha1 KeyId Algorithm
1,210,357 UART: [idev] --
1,211,493 UART: [ldev] ++
1,211,661 UART: [ldev] CDI.KEYID = 6
1,212,024 UART: [ldev] SUBJECT.KEYID = 5
1,212,450 UART: [ldev] AUTHORITY.KEYID = 7
1,212,913 UART: [ldev] FE.KEYID = 1
1,218,125 UART: [ldev] Erasing FE.KEYID = 1
1,244,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,475 UART: [ldev] --
1,283,758 UART: [fwproc] Wait for Commands...
1,284,536 UART: [fwproc] Recv command 0x46574c44
1,285,264 UART: [fwproc] Recv'd Img size: 114168 bytes
1,310,062 UART: ROM Fatal Error: 0x000B0009
1,311,219 >>> mbox cmd response: failed
1,311,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,225 >>> mbox cmd response: failed
1,311,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
893,608 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,733 UART: [kat] ++
897,885 UART: [kat] sha1
902,033 UART: [kat] SHA2-256
903,973 UART: [kat] SHA2-384
906,646 UART: [kat] SHA2-512-ACC
908,547 UART: [kat] ECC-384
918,456 UART: [kat] HMAC-384Kdf
923,022 UART: [kat] LMS
1,171,350 UART: [kat] --
1,172,195 UART: [cold-reset] ++
1,172,759 UART: [fht] FHT @ 0x50003400
1,175,418 UART: [idev] ++
1,175,586 UART: [idev] CDI.KEYID = 6
1,175,946 UART: [idev] SUBJECT.KEYID = 7
1,176,370 UART: [idev] UDS.KEYID = 0
1,176,715 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,232 UART: [idev] Erasing UDS.KEYID = 0
1,201,513 UART: [idev] Sha1 KeyId Algorithm
1,210,107 UART: [idev] --
1,210,997 UART: [ldev] ++
1,211,165 UART: [ldev] CDI.KEYID = 6
1,211,528 UART: [ldev] SUBJECT.KEYID = 5
1,211,954 UART: [ldev] AUTHORITY.KEYID = 7
1,212,417 UART: [ldev] FE.KEYID = 1
1,217,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,183 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,200 UART: [fwproc] Recv command 0x46574c44
1,283,928 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,265 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,569 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,054 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,917 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,163,336 >>> mbox cmd response: failed
1,163,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,342 >>> mbox cmd response: failed
1,163,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,101 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,211 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,232 UART: [kat] SHA2-256
904,172 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,975 UART: [kat] HMAC-384Kdf
923,733 UART: [kat] LMS
1,172,061 UART: [kat] --
1,172,778 UART: [cold-reset] ++
1,173,196 UART: [fht] FHT @ 0x50003400
1,176,065 UART: [idev] ++
1,176,233 UART: [idev] CDI.KEYID = 6
1,176,593 UART: [idev] SUBJECT.KEYID = 7
1,177,017 UART: [idev] UDS.KEYID = 0
1,177,362 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,083 UART: [idev] Erasing UDS.KEYID = 0
1,202,448 UART: [idev] Sha1 KeyId Algorithm
1,210,978 UART: [idev] --
1,212,124 UART: [ldev] ++
1,212,292 UART: [ldev] CDI.KEYID = 6
1,212,655 UART: [ldev] SUBJECT.KEYID = 5
1,213,081 UART: [ldev] AUTHORITY.KEYID = 7
1,213,544 UART: [ldev] FE.KEYID = 1
1,218,742 UART: [ldev] Erasing FE.KEYID = 1
1,245,251 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,384 UART: [ldev] --
1,284,839 UART: [fwproc] Wait for Commands...
1,285,561 UART: [fwproc] Recv command 0x46574c44
1,286,289 UART: [fwproc] Recv'd Img size: 114168 bytes
1,311,543 UART: ROM Fatal Error: 0x000B0009
1,312,700 >>> mbox cmd response: failed
1,312,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,706 >>> mbox cmd response: failed
1,312,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,502 UART: [kat] SHA2-256
904,442 UART: [kat] SHA2-384
907,159 UART: [kat] SHA2-512-ACC
909,060 UART: [kat] ECC-384
918,997 UART: [kat] HMAC-384Kdf
923,799 UART: [kat] LMS
1,172,127 UART: [kat] --
1,172,918 UART: [cold-reset] ++
1,173,490 UART: [fht] FHT @ 0x50003400
1,176,057 UART: [idev] ++
1,176,225 UART: [idev] CDI.KEYID = 6
1,176,585 UART: [idev] SUBJECT.KEYID = 7
1,177,009 UART: [idev] UDS.KEYID = 0
1,177,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,885 UART: [idev] Erasing UDS.KEYID = 0
1,201,756 UART: [idev] Sha1 KeyId Algorithm
1,210,366 UART: [idev] --
1,211,410 UART: [ldev] ++
1,211,578 UART: [ldev] CDI.KEYID = 6
1,211,941 UART: [ldev] SUBJECT.KEYID = 5
1,212,367 UART: [ldev] AUTHORITY.KEYID = 7
1,212,830 UART: [ldev] FE.KEYID = 1
1,217,890 UART: [ldev] Erasing FE.KEYID = 1
1,244,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,832 UART: [ldev] --
1,283,131 UART: [fwproc] Wait for Commands...
1,283,751 UART: [fwproc] Recv command 0x46574c44
1,284,479 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,983 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,165,917 >>> mbox cmd response: failed
1,165,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,923 >>> mbox cmd response: failed
1,165,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,592 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,649 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
915,808 UART: [kat] HMAC-384Kdf
920,610 UART: [kat] LMS
1,168,922 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,385 UART: [fht] FHT @ 0x50003400
1,173,025 UART: [idev] ++
1,173,193 UART: [idev] CDI.KEYID = 6
1,173,554 UART: [idev] SUBJECT.KEYID = 7
1,173,979 UART: [idev] UDS.KEYID = 0
1,174,325 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,935 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,590 UART: [ldev] ++
1,208,758 UART: [ldev] CDI.KEYID = 6
1,209,122 UART: [ldev] SUBJECT.KEYID = 5
1,209,549 UART: [ldev] AUTHORITY.KEYID = 7
1,210,012 UART: [ldev] FE.KEYID = 1
1,214,994 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,858 UART: [ldev] --
1,280,164 UART: [fwproc] Wait for Commands...
1,280,923 UART: [fwproc] Recv command 0x46574c44
1,281,656 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,220 UART: ROM Fatal Error: 0x000B0009
1,307,377 >>> mbox cmd response: failed
1,307,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,383 >>> mbox cmd response: failed
1,307,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,866 UART: [state] LifecycleState = Unprovisioned
86,521 UART: [state] DebugLocked = No
87,015 UART: [state] WD Timer not started. Device not locked for debugging
88,288 UART: [kat] SHA2-256
891,838 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,967 UART: [kat] ++
896,119 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
905,044 UART: [kat] SHA2-512-ACC
906,945 UART: [kat] ECC-384
916,802 UART: [kat] HMAC-384Kdf
921,516 UART: [kat] LMS
1,169,828 UART: [kat] --
1,170,619 UART: [cold-reset] ++
1,171,147 UART: [fht] FHT @ 0x50003400
1,173,947 UART: [idev] ++
1,174,115 UART: [idev] CDI.KEYID = 6
1,174,476 UART: [idev] SUBJECT.KEYID = 7
1,174,901 UART: [idev] UDS.KEYID = 0
1,175,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,959 UART: [idev] Erasing UDS.KEYID = 0
1,199,797 UART: [idev] Sha1 KeyId Algorithm
1,208,619 UART: [idev] --
1,209,844 UART: [ldev] ++
1,210,012 UART: [ldev] CDI.KEYID = 6
1,210,376 UART: [ldev] SUBJECT.KEYID = 5
1,210,803 UART: [ldev] AUTHORITY.KEYID = 7
1,211,266 UART: [ldev] FE.KEYID = 1
1,216,542 UART: [ldev] Erasing FE.KEYID = 1
1,242,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,648 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,713 UART: [fwproc] Recv command 0x46574c44
1,283,446 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,571 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,880 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,390 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,236 >>> mbox cmd response: failed
1,161,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,242 >>> mbox cmd response: failed
1,161,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,534 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,733 UART: [kat] HMAC-384Kdf
921,269 UART: [kat] LMS
1,169,581 UART: [kat] --
1,170,390 UART: [cold-reset] ++
1,170,968 UART: [fht] FHT @ 0x50003400
1,173,580 UART: [idev] ++
1,173,748 UART: [idev] CDI.KEYID = 6
1,174,109 UART: [idev] SUBJECT.KEYID = 7
1,174,534 UART: [idev] UDS.KEYID = 0
1,174,880 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,064 UART: [idev] Erasing UDS.KEYID = 0
1,199,996 UART: [idev] Sha1 KeyId Algorithm
1,208,704 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,243,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,282,972 UART: [fwproc] Recv command 0x46574c44
1,283,705 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,783 UART: ROM Fatal Error: 0x000B0009
1,309,940 >>> mbox cmd response: failed
1,309,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,946 >>> mbox cmd response: failed
1,309,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,952 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,711 UART: [state] LifecycleState = Unprovisioned
86,366 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,256 UART: [kat] SHA2-256
902,196 UART: [kat] SHA2-384
905,049 UART: [kat] SHA2-512-ACC
906,950 UART: [kat] ECC-384
917,089 UART: [kat] HMAC-384Kdf
921,781 UART: [kat] LMS
1,170,093 UART: [kat] --
1,170,826 UART: [cold-reset] ++
1,171,248 UART: [fht] FHT @ 0x50003400
1,173,830 UART: [idev] ++
1,173,998 UART: [idev] CDI.KEYID = 6
1,174,359 UART: [idev] SUBJECT.KEYID = 7
1,174,784 UART: [idev] UDS.KEYID = 0
1,175,130 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,932 UART: [idev] Sha1 KeyId Algorithm
1,208,744 UART: [idev] --
1,209,807 UART: [ldev] ++
1,209,975 UART: [ldev] CDI.KEYID = 6
1,210,339 UART: [ldev] SUBJECT.KEYID = 5
1,210,766 UART: [ldev] AUTHORITY.KEYID = 7
1,211,229 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,282,065 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,847 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,465 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,065 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,455 >>> mbox cmd response: failed
1,162,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,461 >>> mbox cmd response: failed
1,162,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,467 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,703 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,277 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,269 UART:
192,633 UART: Running Caliptra ROM ...
193,824 UART:
193,979 UART: [state] CFI Enabled
266,753 UART: [state] LifecycleState = Unprovisioned
268,710 UART: [state] DebugLocked = No
271,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,454 UART: [kat] SHA2-256
446,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,673 UART: [kat] ++
457,117 UART: [kat] sha1
467,425 UART: [kat] SHA2-256
470,123 UART: [kat] SHA2-384
475,682 UART: [kat] SHA2-512-ACC
478,072 UART: [kat] ECC-384
2,766,938 UART: [kat] HMAC-384Kdf
2,800,740 UART: [kat] LMS
3,991,053 UART: [kat] --
3,994,936 UART: [cold-reset] ++
3,996,378 UART: [fht] Storing FHT @ 0x50003400
4,008,500 UART: [idev] ++
4,009,075 UART: [idev] CDI.KEYID = 6
4,009,997 UART: [idev] SUBJECT.KEYID = 7
4,011,233 UART: [idev] UDS.KEYID = 0
4,014,194 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,632 UART: [idev] Erasing UDS.KEYID = 0
7,345,718 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,829 UART: [idev] --
7,373,634 UART: [ldev] ++
7,374,202 UART: [ldev] CDI.KEYID = 6
7,375,166 UART: [ldev] SUBJECT.KEYID = 5
7,376,378 UART: [ldev] AUTHORITY.KEYID = 7
7,377,665 UART: [ldev] FE.KEYID = 1
7,421,959 UART: [ldev] Erasing FE.KEYID = 1
10,754,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,353 UART: [ldev] --
13,114,138 UART: [fwproc] Waiting for Commands...
13,116,451 UART: [fwproc] Received command 0x46574c44
13,118,637 UART: [fwproc] Received Image of size 113844 bytes
14,508,458 UART: ROM Fatal Error: 0x000B000C
14,511,932 >>> mbox cmd response: failed
14,512,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,512,709 >>> mbox cmd response: failed
14,512,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,513,274 >>> mbox cmd response: failed
Initializing fuses
2,048,864 writing to cptra_bootfsm_go
2,238,158 UART:
2,238,534 UART: Running Caliptra ROM ...
2,239,616 UART:
2,239,772 UART: [state] CFI Enabled
2,300,527 UART: [state] LifecycleState = Unprovisioned
2,302,468 UART: [state] DebugLocked = No
2,305,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,309,763 UART: [kat] SHA2-256
2,479,475 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,490,003 UART: [kat] ++
2,490,468 UART: [kat] sha1
2,502,004 UART: [kat] SHA2-256
2,504,707 UART: [kat] SHA2-384
2,510,759 UART: [kat] SHA2-512-ACC
2,513,146 UART: [kat] ECC-384
4,805,295 UART: [kat] HMAC-384Kdf
4,837,209 UART: [kat] LMS
6,027,528 UART: [kat] --
6,031,049 UART: [cold-reset] ++
6,033,125 UART: [fht] Storing FHT @ 0x50003400
6,044,561 UART: [idev] ++
6,045,193 UART: [idev] CDI.KEYID = 6
6,046,075 UART: [idev] SUBJECT.KEYID = 7
6,047,353 UART: [idev] UDS.KEYID = 0
6,050,109 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,193,441 UART: [idev] Erasing UDS.KEYID = 0
9,385,670 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,399 UART: [idev] --
9,412,236 UART: [ldev] ++
9,412,810 UART: [ldev] CDI.KEYID = 6
9,413,752 UART: [ldev] SUBJECT.KEYID = 5
9,415,016 UART: [ldev] AUTHORITY.KEYID = 7
9,416,253 UART: [ldev] FE.KEYID = 1
9,460,903 UART: [ldev] Erasing FE.KEYID = 1
12,794,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,121,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,150,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,583 UART: [ldev] --
15,174,576 UART: [fwproc] Waiting for Commands...
15,176,396 UART: [fwproc] Received command 0x46574c44
15,178,583 UART: [fwproc] Received Image of size 113844 bytes
19,221,557 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,294,601 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,363,548 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,680,074 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,806,465 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,252,670 >>> mbox cmd response: failed
14,253,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,253,644 >>> mbox cmd response: failed
14,253,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,254,212 >>> mbox cmd response: failed
Initializing fuses
2,045,516 writing to cptra_bootfsm_go
5,847,287 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,941,078 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,417 UART:
192,769 UART: Running Caliptra ROM ...
193,952 UART:
603,511 UART: [state] CFI Enabled
619,239 UART: [state] LifecycleState = Unprovisioned
621,159 UART: [state] DebugLocked = No
623,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,221 UART: [kat] SHA2-256
797,956 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,492 UART: [kat] ++
809,085 UART: [kat] sha1
819,722 UART: [kat] SHA2-256
822,412 UART: [kat] SHA2-384
827,143 UART: [kat] SHA2-512-ACC
829,535 UART: [kat] ECC-384
3,116,536 UART: [kat] HMAC-384Kdf
3,128,562 UART: [kat] LMS
4,318,686 UART: [kat] --
4,323,831 UART: [cold-reset] ++
4,325,884 UART: [fht] Storing FHT @ 0x50003400
4,337,853 UART: [idev] ++
4,338,418 UART: [idev] CDI.KEYID = 6
4,339,435 UART: [idev] SUBJECT.KEYID = 7
4,340,649 UART: [idev] UDS.KEYID = 0
4,343,316 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,476 UART: [idev] Erasing UDS.KEYID = 0
7,631,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,488 UART: [idev] --
7,655,889 UART: [ldev] ++
7,656,467 UART: [ldev] CDI.KEYID = 6
7,657,384 UART: [ldev] SUBJECT.KEYID = 5
7,658,605 UART: [ldev] AUTHORITY.KEYID = 7
7,659,897 UART: [ldev] FE.KEYID = 1
7,669,409 UART: [ldev] Erasing FE.KEYID = 1
10,958,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,524 UART: [ldev] --
13,320,006 UART: [fwproc] Waiting for Commands...
13,321,955 UART: [fwproc] Received command 0x46574c44
13,324,144 UART: [fwproc] Received Image of size 113844 bytes
14,721,388 UART: ROM Fatal Error: 0x000B000C
14,724,887 >>> mbox cmd response: failed
14,725,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,725,677 >>> mbox cmd response: failed
14,725,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,726,233 >>> mbox cmd response: failed
Initializing fuses
2,055,257 writing to cptra_bootfsm_go
2,244,609 UART:
2,244,959 UART: Running Caliptra ROM ...
2,246,097 UART:
5,743,311 UART: [state] CFI Enabled
5,757,292 UART: [state] LifecycleState = Unprovisioned
5,759,228 UART: [state] DebugLocked = No
5,762,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,766,410 UART: [kat] SHA2-256
5,936,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,946,739 UART: [kat] ++
5,947,204 UART: [kat] sha1
5,958,845 UART: [kat] SHA2-256
5,961,543 UART: [kat] SHA2-384
5,968,935 UART: [kat] SHA2-512-ACC
5,971,284 UART: [kat] ECC-384
8,253,046 UART: [kat] HMAC-384Kdf
8,263,761 UART: [kat] LMS
9,453,853 UART: [kat] --
9,459,623 UART: [cold-reset] ++
9,461,226 UART: [fht] Storing FHT @ 0x50003400
9,472,004 UART: [idev] ++
9,472,595 UART: [idev] CDI.KEYID = 6
9,473,478 UART: [idev] SUBJECT.KEYID = 7
9,474,741 UART: [idev] UDS.KEYID = 0
9,477,427 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
9,620,538 UART: [idev] Erasing UDS.KEYID = 0
12,765,546 UART: [idev] Using Sha1 for KeyId Algorithm
12,786,453 UART: [idev] --
12,791,338 UART: [ldev] ++
12,791,969 UART: [ldev] CDI.KEYID = 6
12,792,849 UART: [ldev] SUBJECT.KEYID = 5
12,794,183 UART: [ldev] AUTHORITY.KEYID = 7
12,795,282 UART: [ldev] FE.KEYID = 1
12,806,009 UART: [ldev] Erasing FE.KEYID = 1
16,090,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,384,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,399,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,414,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,428,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,447,299 UART: [ldev] --
18,451,857 UART: [fwproc] Waiting for Commands...
18,454,713 UART: [fwproc] Received command 0x46574c44
18,456,953 UART: [fwproc] Received Image of size 113844 bytes
22,505,087 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,579,679 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
22,648,603 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
22,964,658 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,127,404 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,443,978 >>> mbox cmd response: failed
14,444,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,444,936 >>> mbox cmd response: failed
14,445,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,445,451 >>> mbox cmd response: failed
Initializing fuses
2,052,013 writing to cptra_bootfsm_go
9,547,749 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
23,485,647 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,136 UART:
192,504 UART: Running Caliptra ROM ...
193,648 UART:
193,796 UART: [state] CFI Enabled
261,141 UART: [state] LifecycleState = Unprovisioned
263,072 UART: [state] DebugLocked = No
264,514 UART: [state] WD Timer not started. Device not locked for debugging
267,427 UART: [kat] SHA2-256
446,559 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,106 UART: [kat] ++
458,694 UART: [kat] sha1
468,342 UART: [kat] SHA2-256
471,347 UART: [kat] SHA2-384
477,109 UART: [kat] SHA2-512-ACC
480,051 UART: [kat] ECC-384
2,926,495 UART: [kat] HMAC-384Kdf
2,949,830 UART: [kat] LMS
3,479,302 UART: [kat] --
3,483,016 UART: [cold-reset] ++
3,484,037 UART: [fht] FHT @ 0x50003400
3,494,430 UART: [idev] ++
3,494,992 UART: [idev] CDI.KEYID = 6
3,495,897 UART: [idev] SUBJECT.KEYID = 7
3,497,112 UART: [idev] UDS.KEYID = 0
3,500,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,643,899 UART: [idev] Erasing UDS.KEYID = 0
6,003,293 UART: [idev] Sha1 KeyId Algorithm
6,026,252 UART: [idev] --
6,029,090 UART: [ldev] ++
6,029,679 UART: [ldev] CDI.KEYID = 6
6,030,593 UART: [ldev] SUBJECT.KEYID = 5
6,031,760 UART: [ldev] AUTHORITY.KEYID = 7
6,033,064 UART: [ldev] FE.KEYID = 1
6,077,747 UART: [ldev] Erasing FE.KEYID = 1
8,583,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,318,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,763 UART: [ldev] --
10,388,890 UART: [fwproc] Wait for Commands...
10,391,202 UART: [fwproc] Recv command 0x46574c44
10,393,304 UART: [fwproc] Recv'd Img size: 114168 bytes
11,456,163 UART: ROM Fatal Error: 0x000B000C
11,459,288 >>> mbox cmd response: failed
11,459,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,460,036 >>> mbox cmd response: failed
11,460,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,460,641 >>> mbox cmd response: failed
Initializing fuses
2,049,884 writing to cptra_bootfsm_go
2,239,245 UART:
2,239,588 UART: Running Caliptra ROM ...
2,240,721 UART:
2,240,895 UART: [state] CFI Enabled
2,305,233 UART: [state] LifecycleState = Unprovisioned
2,307,075 UART: [state] DebugLocked = No
2,309,922 UART: [state] WD Timer not started. Device not locked for debugging
2,312,906 UART: [kat] SHA2-256
2,492,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,503,572 UART: [kat] ++
2,504,124 UART: [kat] sha1
2,516,692 UART: [kat] SHA2-256
2,519,722 UART: [kat] SHA2-384
2,525,981 UART: [kat] SHA2-512-ACC
2,528,923 UART: [kat] ECC-384
4,988,949 UART: [kat] HMAC-384Kdf
5,011,884 UART: [kat] LMS
5,541,366 UART: [kat] --
5,546,815 UART: [cold-reset] ++
5,547,660 UART: [fht] FHT @ 0x50003400
5,558,130 UART: [idev] ++
5,558,688 UART: [idev] CDI.KEYID = 6
5,559,574 UART: [idev] SUBJECT.KEYID = 7
5,560,786 UART: [idev] UDS.KEYID = 0
5,563,534 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,707,271 UART: [idev] Erasing UDS.KEYID = 0
8,066,541 UART: [idev] Sha1 KeyId Algorithm
8,089,832 UART: [idev] --
8,092,262 UART: [ldev] ++
8,092,769 UART: [ldev] CDI.KEYID = 6
8,093,789 UART: [ldev] SUBJECT.KEYID = 5
8,094,956 UART: [ldev] AUTHORITY.KEYID = 7
8,096,190 UART: [ldev] FE.KEYID = 1
8,140,540 UART: [ldev] Erasing FE.KEYID = 1
10,642,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,369,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,385,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,401,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,417,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,836 UART: [ldev] --
12,441,670 UART: [fwproc] Wait for Commands...
12,443,400 UART: [fwproc] Recv command 0x46574c44
12,445,499 UART: [fwproc] Recv'd Img size: 114168 bytes
15,839,673 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,910,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,979,201 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,296,822 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,363,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,245,334 >>> mbox cmd response: failed
11,246,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,246,460 >>> mbox cmd response: failed
11,246,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,247,091 >>> mbox cmd response: failed
Initializing fuses
2,046,241 writing to cptra_bootfsm_go
5,429,126 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,086,829 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,706 UART:
193,068 UART: Running Caliptra ROM ...
194,257 UART:
603,627 UART: [state] CFI Enabled
618,443 UART: [state] LifecycleState = Unprovisioned
620,274 UART: [state] DebugLocked = No
621,814 UART: [state] WD Timer not started. Device not locked for debugging
626,133 UART: [kat] SHA2-256
805,256 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,863 UART: [kat] ++
817,400 UART: [kat] sha1
829,146 UART: [kat] SHA2-256
832,170 UART: [kat] SHA2-384
836,852 UART: [kat] SHA2-512-ACC
839,836 UART: [kat] ECC-384
3,281,051 UART: [kat] HMAC-384Kdf
3,295,113 UART: [kat] LMS
3,824,579 UART: [kat] --
3,829,000 UART: [cold-reset] ++
3,830,987 UART: [fht] FHT @ 0x50003400
3,842,834 UART: [idev] ++
3,843,445 UART: [idev] CDI.KEYID = 6
3,844,362 UART: [idev] SUBJECT.KEYID = 7
3,845,526 UART: [idev] UDS.KEYID = 0
3,848,515 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,992,208 UART: [idev] Erasing UDS.KEYID = 0
6,317,364 UART: [idev] Sha1 KeyId Algorithm
6,340,161 UART: [idev] --
6,343,941 UART: [ldev] ++
6,344,525 UART: [ldev] CDI.KEYID = 6
6,345,411 UART: [ldev] SUBJECT.KEYID = 5
6,346,569 UART: [ldev] AUTHORITY.KEYID = 7
6,347,854 UART: [ldev] FE.KEYID = 1
6,358,607 UART: [ldev] Erasing FE.KEYID = 1
8,834,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,990 UART: [ldev] --
10,627,032 UART: [fwproc] Wait for Commands...
10,629,617 UART: [fwproc] Recv command 0x46574c44
10,631,708 UART: [fwproc] Recv'd Img size: 114168 bytes
11,697,943 UART: ROM Fatal Error: 0x000B000C
11,701,059 >>> mbox cmd response: failed
11,701,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,701,815 >>> mbox cmd response: failed
11,702,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,702,365 >>> mbox cmd response: failed
Initializing fuses
2,058,361 writing to cptra_bootfsm_go
2,247,632 UART:
2,247,973 UART: Running Caliptra ROM ...
2,249,019 UART:
8,753,763 UART: [state] CFI Enabled
8,766,956 UART: [state] LifecycleState = Unprovisioned
8,768,824 UART: [state] DebugLocked = No
8,771,126 UART: [state] WD Timer not started. Device not locked for debugging
8,774,985 UART: [kat] SHA2-256
8,954,134 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,965,689 UART: [kat] ++
8,966,239 UART: [kat] sha1
8,976,704 UART: [kat] SHA2-256
8,979,724 UART: [kat] SHA2-384
8,985,983 UART: [kat] SHA2-512-ACC
8,988,978 UART: [kat] ECC-384
11,430,020 UART: [kat] HMAC-384Kdf
11,442,950 UART: [kat] LMS
11,972,461 UART: [kat] --
11,976,875 UART: [cold-reset] ++
11,978,126 UART: [fht] FHT @ 0x50003400
11,990,291 UART: [idev] ++
11,990,854 UART: [idev] CDI.KEYID = 6
11,991,779 UART: [idev] SUBJECT.KEYID = 7
11,992,941 UART: [idev] UDS.KEYID = 0
11,995,699 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,139,197 UART: [idev] Erasing UDS.KEYID = 0
14,468,939 UART: [idev] Sha1 KeyId Algorithm
14,492,982 UART: [idev] --
14,497,191 UART: [ldev] ++
14,497,758 UART: [ldev] CDI.KEYID = 6
14,498,643 UART: [ldev] SUBJECT.KEYID = 5
14,499,856 UART: [ldev] AUTHORITY.KEYID = 7
14,501,090 UART: [ldev] FE.KEYID = 1
14,511,389 UART: [ldev] Erasing FE.KEYID = 1
16,983,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,702,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,718,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,734,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,750,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,770,811 UART: [ldev] --
18,774,835 UART: [fwproc] Wait for Commands...
18,776,612 UART: [fwproc] Recv command 0x46574c44
18,778,649 UART: [fwproc] Recv'd Img size: 114168 bytes
22,165,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,243,232 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,312,037 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,630,102 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,698,046 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,466,600 >>> mbox cmd response: failed
11,467,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,467,497 >>> mbox cmd response: failed
11,467,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,468,098 >>> mbox cmd response: failed
Initializing fuses
2,052,348 writing to cptra_bootfsm_go
12,096,186 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,667,469 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
192,218 UART:
192,571 UART: Running Caliptra ROM ...
193,763 UART:
193,913 UART: [state] CFI Enabled
263,111 UART: [state] LifecycleState = Unprovisioned
265,511 UART: [state] DebugLocked = No
268,158 UART: [state] WD Timer not started. Device not locked for debugging
272,322 UART: [kat] SHA2-256
462,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,004 UART: [kat] ++
473,494 UART: [kat] sha1
484,699 UART: [kat] SHA2-256
487,718 UART: [kat] SHA2-384
494,619 UART: [kat] SHA2-512-ACC
497,232 UART: [kat] ECC-384
2,947,821 UART: [kat] HMAC-384Kdf
2,969,740 UART: [kat] LMS
3,501,509 UART: [kat] --
3,505,400 UART: [cold-reset] ++
3,507,876 UART: [fht] FHT @ 0x50003400
3,519,126 UART: [idev] ++
3,519,850 UART: [idev] CDI.KEYID = 6
3,520,897 UART: [idev] SUBJECT.KEYID = 7
3,522,028 UART: [idev] UDS.KEYID = 0
3,524,909 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,585 UART: [idev] Erasing UDS.KEYID = 0
6,025,962 UART: [idev] Sha1 KeyId Algorithm
6,048,610 UART: [idev] --
6,053,465 UART: [ldev] ++
6,054,150 UART: [ldev] CDI.KEYID = 6
6,055,065 UART: [ldev] SUBJECT.KEYID = 5
6,056,227 UART: [ldev] AUTHORITY.KEYID = 7
6,057,460 UART: [ldev] FE.KEYID = 1
6,097,497 UART: [ldev] Erasing FE.KEYID = 1
8,604,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,478 UART: [ldev] --
10,412,431 UART: [fwproc] Wait for Commands...
10,414,044 UART: [fwproc] Recv command 0x46574c44
10,416,367 UART: [fwproc] Recv'd Img size: 114168 bytes
11,513,983 UART: ROM Fatal Error: 0x000B000C
11,517,648 >>> mbox cmd response: failed
11,517,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,518,298 >>> mbox cmd response: failed
11,518,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,518,800 >>> mbox cmd response: failed
Initializing fuses
2,050,214 writing to cptra_bootfsm_go
2,239,549 UART:
2,239,901 UART: Running Caliptra ROM ...
2,241,040 UART:
2,241,207 UART: [state] CFI Enabled
2,314,182 UART: [state] LifecycleState = Unprovisioned
2,316,614 UART: [state] DebugLocked = No
2,318,054 UART: [state] WD Timer not started. Device not locked for debugging
2,322,954 UART: [kat] SHA2-256
2,512,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,638 UART: [kat] ++
2,524,181 UART: [kat] sha1
2,534,320 UART: [kat] SHA2-256
2,537,344 UART: [kat] SHA2-384
2,542,360 UART: [kat] SHA2-512-ACC
2,544,932 UART: [kat] ECC-384
4,993,637 UART: [kat] HMAC-384Kdf
5,019,284 UART: [kat] LMS
5,551,079 UART: [kat] --
5,554,157 UART: [cold-reset] ++
5,555,817 UART: [fht] FHT @ 0x50003400
5,568,911 UART: [idev] ++
5,569,646 UART: [idev] CDI.KEYID = 6
5,570,547 UART: [idev] SUBJECT.KEYID = 7
5,571,759 UART: [idev] UDS.KEYID = 0
5,574,475 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,718,201 UART: [idev] Erasing UDS.KEYID = 0
8,078,544 UART: [idev] Sha1 KeyId Algorithm
8,100,490 UART: [idev] --
8,104,332 UART: [ldev] ++
8,105,015 UART: [ldev] CDI.KEYID = 6
8,105,986 UART: [ldev] SUBJECT.KEYID = 5
8,107,145 UART: [ldev] AUTHORITY.KEYID = 7
8,108,339 UART: [ldev] FE.KEYID = 1
8,149,170 UART: [ldev] Erasing FE.KEYID = 1
10,654,184 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,117 UART: [ldev] --
12,461,162 UART: [fwproc] Wait for Commands...
12,464,234 UART: [fwproc] Recv command 0x46574c44
12,466,549 UART: [fwproc] Recv'd Img size: 114168 bytes
15,910,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,988,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,472 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,646,661 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,424 writing to cptra_bootfsm_go
3,421,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,294,293 >>> mbox cmd response: failed
11,295,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,295,367 >>> mbox cmd response: failed
11,295,637 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,295,989 >>> mbox cmd response: failed
Initializing fuses
2,049,411 writing to cptra_bootfsm_go
5,477,839 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,746,982 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,322 UART:
192,688 UART: Running Caliptra ROM ...
193,828 UART:
603,465 UART: [state] CFI Enabled
618,281 UART: [state] LifecycleState = Unprovisioned
620,680 UART: [state] DebugLocked = No
622,492 UART: [state] WD Timer not started. Device not locked for debugging
627,847 UART: [kat] SHA2-256
817,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,526 UART: [kat] ++
829,063 UART: [kat] sha1
840,784 UART: [kat] SHA2-256
843,797 UART: [kat] SHA2-384
851,325 UART: [kat] SHA2-512-ACC
853,897 UART: [kat] ECC-384
3,295,442 UART: [kat] HMAC-384Kdf
3,308,015 UART: [kat] LMS
3,839,884 UART: [kat] --
3,844,332 UART: [cold-reset] ++
3,846,760 UART: [fht] FHT @ 0x50003400
3,858,724 UART: [idev] ++
3,859,422 UART: [idev] CDI.KEYID = 6
3,860,436 UART: [idev] SUBJECT.KEYID = 7
3,861,595 UART: [idev] UDS.KEYID = 0
3,864,246 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,846 UART: [idev] Erasing UDS.KEYID = 0
6,336,487 UART: [idev] Sha1 KeyId Algorithm
6,358,534 UART: [idev] --
6,363,072 UART: [ldev] ++
6,363,806 UART: [ldev] CDI.KEYID = 6
6,364,724 UART: [ldev] SUBJECT.KEYID = 5
6,365,835 UART: [ldev] AUTHORITY.KEYID = 7
6,367,070 UART: [ldev] FE.KEYID = 1
6,378,748 UART: [ldev] Erasing FE.KEYID = 1
8,856,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,947 UART: [ldev] --
10,649,026 UART: [fwproc] Wait for Commands...
10,651,075 UART: [fwproc] Recv command 0x46574c44
10,653,343 UART: [fwproc] Recv'd Img size: 114168 bytes
11,751,365 UART: ROM Fatal Error: 0x000B000C
11,755,012 >>> mbox cmd response: failed
11,755,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,755,809 >>> mbox cmd response: failed
11,756,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,756,373 >>> mbox cmd response: failed
Initializing fuses
2,049,956 writing to cptra_bootfsm_go
2,239,254 UART:
2,239,607 UART: Running Caliptra ROM ...
2,240,748 UART:
8,689,537 UART: [state] CFI Enabled
8,703,380 UART: [state] LifecycleState = Unprovisioned
8,705,739 UART: [state] DebugLocked = No
8,708,535 UART: [state] WD Timer not started. Device not locked for debugging
8,712,840 UART: [kat] SHA2-256
8,902,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,913,477 UART: [kat] ++
8,914,075 UART: [kat] sha1
8,926,053 UART: [kat] SHA2-256
8,929,055 UART: [kat] SHA2-384
8,933,496 UART: [kat] SHA2-512-ACC
8,936,124 UART: [kat] ECC-384
11,379,326 UART: [kat] HMAC-384Kdf
11,392,696 UART: [kat] LMS
11,924,535 UART: [kat] --
11,930,467 UART: [cold-reset] ++
11,932,188 UART: [fht] FHT @ 0x50003400
11,944,083 UART: [idev] ++
11,944,759 UART: [idev] CDI.KEYID = 6
11,945,723 UART: [idev] SUBJECT.KEYID = 7
11,946,936 UART: [idev] UDS.KEYID = 0
11,949,664 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,095,920 UART: [idev] Erasing UDS.KEYID = 0
14,426,021 UART: [idev] Sha1 KeyId Algorithm
14,449,025 UART: [idev] --
14,455,114 UART: [ldev] ++
14,455,809 UART: [ldev] CDI.KEYID = 6
14,456,724 UART: [ldev] SUBJECT.KEYID = 5
14,457,904 UART: [ldev] AUTHORITY.KEYID = 7
14,459,133 UART: [ldev] FE.KEYID = 1
14,469,157 UART: [ldev] Erasing FE.KEYID = 1
16,944,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,661,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,676,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,691,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,706,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,727,989 UART: [ldev] --
18,732,507 UART: [fwproc] Wait for Commands...
18,734,772 UART: [fwproc] Recv command 0x46574c44
18,737,093 UART: [fwproc] Recv'd Img size: 114168 bytes
22,177,525 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,256,045 UART: [fwproc] Load FMC at address 0x40000000 len 18800
22,372,179 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,914,074 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,754,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,527,270 >>> mbox cmd response: failed
11,527,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,528,206 >>> mbox cmd response: failed
11,528,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,528,785 >>> mbox cmd response: failed
Initializing fuses
2,053,972 writing to cptra_bootfsm_go
12,093,419 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,293,590 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,476,143 UART: [cold-reset] ++
1,476,665 UART: [fht] Storing FHT @ 0x50003400
1,479,530 UART: [idev] ++
1,479,698 UART: [idev] CDI.KEYID = 6
1,480,058 UART: [idev] SUBJECT.KEYID = 7
1,480,482 UART: [idev] UDS.KEYID = 0
1,480,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,972 UART: [idev] Erasing UDS.KEYID = 0
1,505,052 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,540 UART: [idev] --
1,514,615 UART: [ldev] ++
1,514,783 UART: [ldev] CDI.KEYID = 6
1,515,146 UART: [ldev] SUBJECT.KEYID = 5
1,515,572 UART: [ldev] AUTHORITY.KEYID = 7
1,516,035 UART: [ldev] FE.KEYID = 1
1,521,317 UART: [ldev] Erasing FE.KEYID = 1
1,546,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,210 UART: [ldev] --
1,585,633 UART: [fwproc] Waiting for Commands...
1,586,394 UART: [fwproc] Received command 0x46574c44
1,587,185 UART: [fwproc] Received Image of size 114168 bytes
1,624,803 UART: ROM Fatal Error: 0x000B000C
1,625,962 >>> mbox cmd response: failed
1,625,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,968 >>> mbox cmd response: failed
1,625,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,657 UART: [kat] SHA2-256
892,595 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
903,016 UART: [kat] HMAC-384Kdf
907,540 UART: [kat] LMS
1,475,736 UART: [kat] --
1,476,723 UART: [cold-reset] ++
1,477,291 UART: [fht] Storing FHT @ 0x50003400
1,480,050 UART: [idev] ++
1,480,218 UART: [idev] CDI.KEYID = 6
1,480,578 UART: [idev] SUBJECT.KEYID = 7
1,481,002 UART: [idev] UDS.KEYID = 0
1,481,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,886 UART: [idev] Erasing UDS.KEYID = 0
1,505,722 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,314 UART: [idev] --
1,515,495 UART: [ldev] ++
1,515,663 UART: [ldev] CDI.KEYID = 6
1,516,026 UART: [ldev] SUBJECT.KEYID = 5
1,516,452 UART: [ldev] AUTHORITY.KEYID = 7
1,516,915 UART: [ldev] FE.KEYID = 1
1,522,047 UART: [ldev] Erasing FE.KEYID = 1
1,546,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,850 UART: [ldev] --
1,586,123 UART: [fwproc] Waiting for Commands...
1,586,848 UART: [fwproc] Received command 0x46574c44
1,587,639 UART: [fwproc] Received Image of size 114168 bytes
2,883,742 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,984 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,336 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,979 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,917 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,478,421 >>> mbox cmd response: failed
1,478,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,427 >>> mbox cmd response: failed
1,478,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,077 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,409 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,408 UART: [kat] SHA2-256
882,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,454 UART: [kat] ++
886,606 UART: [kat] sha1
890,750 UART: [kat] SHA2-256
892,688 UART: [kat] SHA2-384
895,551 UART: [kat] SHA2-512-ACC
897,452 UART: [kat] ECC-384
903,255 UART: [kat] HMAC-384Kdf
907,843 UART: [kat] LMS
1,476,039 UART: [kat] --
1,476,896 UART: [cold-reset] ++
1,477,350 UART: [fht] Storing FHT @ 0x50003400
1,480,111 UART: [idev] ++
1,480,279 UART: [idev] CDI.KEYID = 6
1,480,639 UART: [idev] SUBJECT.KEYID = 7
1,481,063 UART: [idev] UDS.KEYID = 0
1,481,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,025 UART: [idev] Erasing UDS.KEYID = 0
1,505,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,335 UART: [idev] --
1,515,424 UART: [ldev] ++
1,515,592 UART: [ldev] CDI.KEYID = 6
1,515,955 UART: [ldev] SUBJECT.KEYID = 5
1,516,381 UART: [ldev] AUTHORITY.KEYID = 7
1,516,844 UART: [ldev] FE.KEYID = 1
1,521,988 UART: [ldev] Erasing FE.KEYID = 1
1,547,707 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,521 UART: [ldev] --
1,586,846 UART: [fwproc] Waiting for Commands...
1,587,643 UART: [fwproc] Received command 0x46574c44
1,588,434 UART: [fwproc] Received Image of size 114168 bytes
1,625,958 UART: ROM Fatal Error: 0x000B000C
1,627,117 >>> mbox cmd response: failed
1,627,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,123 >>> mbox cmd response: failed
1,627,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,524 UART: [kat] SHA2-256
892,462 UART: [kat] SHA2-384
895,135 UART: [kat] SHA2-512-ACC
897,036 UART: [kat] ECC-384
902,743 UART: [kat] HMAC-384Kdf
907,305 UART: [kat] LMS
1,475,501 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,870 UART: [fht] Storing FHT @ 0x50003400
1,479,531 UART: [idev] ++
1,479,699 UART: [idev] CDI.KEYID = 6
1,480,059 UART: [idev] SUBJECT.KEYID = 7
1,480,483 UART: [idev] UDS.KEYID = 0
1,480,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,207 UART: [idev] --
1,515,238 UART: [ldev] ++
1,515,406 UART: [ldev] CDI.KEYID = 6
1,515,769 UART: [ldev] SUBJECT.KEYID = 5
1,516,195 UART: [ldev] AUTHORITY.KEYID = 7
1,516,658 UART: [ldev] FE.KEYID = 1
1,522,168 UART: [ldev] Erasing FE.KEYID = 1
1,547,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,609 UART: [ldev] --
1,587,000 UART: [fwproc] Waiting for Commands...
1,587,755 UART: [fwproc] Received command 0x46574c44
1,588,546 UART: [fwproc] Received Image of size 114168 bytes
2,885,291 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,203 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,555 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,158 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,948 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,480,544 >>> mbox cmd response: failed
1,480,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,550 >>> mbox cmd response: failed
1,480,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,554 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,044 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,905 UART: [kat] SHA2-256
903,845 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
922,788 UART: [kat] LMS
1,171,116 UART: [kat] --
1,172,073 UART: [cold-reset] ++
1,172,635 UART: [fht] FHT @ 0x50003400
1,175,176 UART: [idev] ++
1,175,344 UART: [idev] CDI.KEYID = 6
1,175,704 UART: [idev] SUBJECT.KEYID = 7
1,176,128 UART: [idev] UDS.KEYID = 0
1,176,473 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,201,417 UART: [idev] Sha1 KeyId Algorithm
1,209,915 UART: [idev] --
1,210,877 UART: [ldev] ++
1,211,045 UART: [ldev] CDI.KEYID = 6
1,211,408 UART: [ldev] SUBJECT.KEYID = 5
1,211,834 UART: [ldev] AUTHORITY.KEYID = 7
1,212,297 UART: [ldev] FE.KEYID = 1
1,217,465 UART: [ldev] Erasing FE.KEYID = 1
1,243,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,631 UART: [ldev] --
1,282,904 UART: [fwproc] Wait for Commands...
1,283,666 UART: [fwproc] Recv command 0x46574c44
1,284,394 UART: [fwproc] Recv'd Img size: 114168 bytes
1,321,152 UART: ROM Fatal Error: 0x000B000C
1,322,311 >>> mbox cmd response: failed
1,322,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,317 >>> mbox cmd response: failed
1,322,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,646 UART: [state] LifecycleState = Unprovisioned
86,301 UART: [state] DebugLocked = No
86,959 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
893,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,943 UART: [kat] ++
898,095 UART: [kat] sha1
902,357 UART: [kat] SHA2-256
904,297 UART: [kat] SHA2-384
906,960 UART: [kat] SHA2-512-ACC
908,861 UART: [kat] ECC-384
918,692 UART: [kat] HMAC-384Kdf
923,238 UART: [kat] LMS
1,171,566 UART: [kat] --
1,172,675 UART: [cold-reset] ++
1,173,085 UART: [fht] FHT @ 0x50003400
1,175,816 UART: [idev] ++
1,175,984 UART: [idev] CDI.KEYID = 6
1,176,344 UART: [idev] SUBJECT.KEYID = 7
1,176,768 UART: [idev] UDS.KEYID = 0
1,177,113 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,816 UART: [idev] Erasing UDS.KEYID = 0
1,202,249 UART: [idev] Sha1 KeyId Algorithm
1,210,699 UART: [idev] --
1,211,759 UART: [ldev] ++
1,211,927 UART: [ldev] CDI.KEYID = 6
1,212,290 UART: [ldev] SUBJECT.KEYID = 5
1,212,716 UART: [ldev] AUTHORITY.KEYID = 7
1,213,179 UART: [ldev] FE.KEYID = 1
1,218,361 UART: [ldev] Erasing FE.KEYID = 1
1,244,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,951 UART: [ldev] --
1,284,278 UART: [fwproc] Wait for Commands...
1,285,038 UART: [fwproc] Recv command 0x46574c44
1,285,766 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,807 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,111 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,746 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,263 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,175,112 >>> mbox cmd response: failed
1,175,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,118 >>> mbox cmd response: failed
1,175,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,221 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
893,175 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,300 UART: [kat] ++
897,452 UART: [kat] sha1
901,698 UART: [kat] SHA2-256
903,638 UART: [kat] SHA2-384
906,441 UART: [kat] SHA2-512-ACC
908,342 UART: [kat] ECC-384
918,557 UART: [kat] HMAC-384Kdf
923,215 UART: [kat] LMS
1,171,543 UART: [kat] --
1,172,502 UART: [cold-reset] ++
1,172,904 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,169 UART: [idev] Erasing UDS.KEYID = 0
1,201,188 UART: [idev] Sha1 KeyId Algorithm
1,209,524 UART: [idev] --
1,210,626 UART: [ldev] ++
1,210,794 UART: [ldev] CDI.KEYID = 6
1,211,157 UART: [ldev] SUBJECT.KEYID = 5
1,211,583 UART: [ldev] AUTHORITY.KEYID = 7
1,212,046 UART: [ldev] FE.KEYID = 1
1,217,518 UART: [ldev] Erasing FE.KEYID = 1
1,244,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,436 UART: [ldev] --
1,283,809 UART: [fwproc] Wait for Commands...
1,284,381 UART: [fwproc] Recv command 0x46574c44
1,285,109 UART: [fwproc] Recv'd Img size: 114168 bytes
1,322,579 UART: ROM Fatal Error: 0x000B000C
1,323,738 >>> mbox cmd response: failed
1,323,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,744 >>> mbox cmd response: failed
1,323,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
893,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,620 UART: [kat] ++
897,772 UART: [kat] sha1
902,008 UART: [kat] SHA2-256
903,948 UART: [kat] SHA2-384
906,677 UART: [kat] SHA2-512-ACC
908,578 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,299 UART: [kat] LMS
1,171,627 UART: [kat] --
1,172,728 UART: [cold-reset] ++
1,173,160 UART: [fht] FHT @ 0x50003400
1,175,739 UART: [idev] ++
1,175,907 UART: [idev] CDI.KEYID = 6
1,176,267 UART: [idev] SUBJECT.KEYID = 7
1,176,691 UART: [idev] UDS.KEYID = 0
1,177,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,693 UART: [idev] Erasing UDS.KEYID = 0
1,201,944 UART: [idev] Sha1 KeyId Algorithm
1,210,492 UART: [idev] --
1,211,564 UART: [ldev] ++
1,211,732 UART: [ldev] CDI.KEYID = 6
1,212,095 UART: [ldev] SUBJECT.KEYID = 5
1,212,521 UART: [ldev] AUTHORITY.KEYID = 7
1,212,984 UART: [ldev] FE.KEYID = 1
1,218,164 UART: [ldev] Erasing FE.KEYID = 1
1,244,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,856 UART: [ldev] --
1,284,207 UART: [fwproc] Wait for Commands...
1,284,797 UART: [fwproc] Recv command 0x46574c44
1,285,525 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,730 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,413 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,176,889 >>> mbox cmd response: failed
1,176,889 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,895 >>> mbox cmd response: failed
1,176,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,901 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,318 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,778 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,823 UART: [fht] FHT @ 0x50003400
1,173,469 UART: [idev] ++
1,173,637 UART: [idev] CDI.KEYID = 6
1,173,998 UART: [idev] SUBJECT.KEYID = 7
1,174,423 UART: [idev] UDS.KEYID = 0
1,174,769 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,199,509 UART: [idev] Sha1 KeyId Algorithm
1,208,213 UART: [idev] --
1,209,260 UART: [ldev] ++
1,209,428 UART: [ldev] CDI.KEYID = 6
1,209,792 UART: [ldev] SUBJECT.KEYID = 5
1,210,219 UART: [ldev] AUTHORITY.KEYID = 7
1,210,682 UART: [ldev] FE.KEYID = 1
1,215,598 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,480 UART: [ldev] --
1,280,806 UART: [fwproc] Wait for Commands...
1,281,609 UART: [fwproc] Recv command 0x46574c44
1,282,342 UART: [fwproc] Recv'd Img size: 114168 bytes
1,319,854 UART: ROM Fatal Error: 0x000B000C
1,321,013 >>> mbox cmd response: failed
1,321,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,019 >>> mbox cmd response: failed
1,321,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
85,937 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,933 UART: [kat] ++
895,085 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,122 UART: [kat] SHA2-512-ACC
906,023 UART: [kat] ECC-384
915,788 UART: [kat] HMAC-384Kdf
920,314 UART: [kat] LMS
1,168,626 UART: [kat] --
1,169,355 UART: [cold-reset] ++
1,169,785 UART: [fht] FHT @ 0x50003400
1,172,465 UART: [idev] ++
1,172,633 UART: [idev] CDI.KEYID = 6
1,172,994 UART: [idev] SUBJECT.KEYID = 7
1,173,419 UART: [idev] UDS.KEYID = 0
1,173,765 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,811 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,683 UART: [idev] --
1,208,898 UART: [ldev] ++
1,209,066 UART: [ldev] CDI.KEYID = 6
1,209,430 UART: [ldev] SUBJECT.KEYID = 5
1,209,857 UART: [ldev] AUTHORITY.KEYID = 7
1,210,320 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,242,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,128 UART: [ldev] --
1,281,626 UART: [fwproc] Wait for Commands...
1,282,201 UART: [fwproc] Recv command 0x46574c44
1,282,934 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,707 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,504 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,054,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,171,006 >>> mbox cmd response: failed
1,171,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,012 >>> mbox cmd response: failed
1,171,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,618,482 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,915 UART: [kat] SHA2-256
891,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,601 UART: [kat] SHA2-512-ACC
906,502 UART: [kat] ECC-384
916,053 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,170,106 UART: [cold-reset] ++
1,170,492 UART: [fht] FHT @ 0x50003400
1,173,092 UART: [idev] ++
1,173,260 UART: [idev] CDI.KEYID = 6
1,173,621 UART: [idev] SUBJECT.KEYID = 7
1,174,046 UART: [idev] UDS.KEYID = 0
1,174,392 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,216,159 UART: [ldev] Erasing FE.KEYID = 1
1,241,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,285 UART: [fwproc] Wait for Commands...
1,281,880 UART: [fwproc] Recv command 0x46574c44
1,282,613 UART: [fwproc] Recv'd Img size: 114168 bytes
1,319,741 UART: ROM Fatal Error: 0x000B000C
1,320,900 >>> mbox cmd response: failed
1,320,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,906 >>> mbox cmd response: failed
1,320,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,912 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
916,127 UART: [kat] HMAC-384Kdf
920,767 UART: [kat] LMS
1,169,079 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,428 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,174,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,778 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,207,674 UART: [idev] --
1,208,547 UART: [ldev] ++
1,208,715 UART: [ldev] CDI.KEYID = 6
1,209,079 UART: [ldev] SUBJECT.KEYID = 5
1,209,506 UART: [ldev] AUTHORITY.KEYID = 7
1,209,969 UART: [ldev] FE.KEYID = 1
1,215,243 UART: [ldev] Erasing FE.KEYID = 1
1,241,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,163 UART: [ldev] --
1,280,659 UART: [fwproc] Wait for Commands...
1,281,340 UART: [fwproc] Recv command 0x46574c44
1,282,073 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,627 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,083 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,172,979 >>> mbox cmd response: failed
1,172,979 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,985 >>> mbox cmd response: failed
1,172,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,172,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,269 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,151 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,040 UART:
192,414 UART: Running Caliptra ROM ...
193,591 UART:
193,745 UART: [state] CFI Enabled
263,786 UART: [state] LifecycleState = Unprovisioned
265,749 UART: [state] DebugLocked = No
267,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,856 UART: [kat] SHA2-256
441,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,056 UART: [kat] ++
452,648 UART: [kat] sha1
462,770 UART: [kat] SHA2-256
465,449 UART: [kat] SHA2-384
472,288 UART: [kat] SHA2-512-ACC
474,677 UART: [kat] ECC-384
2,766,968 UART: [kat] HMAC-384Kdf
2,799,382 UART: [kat] LMS
3,989,719 UART: [kat] --
3,993,962 UART: [cold-reset] ++
3,996,388 UART: [fht] Storing FHT @ 0x50003400
4,008,793 UART: [idev] ++
4,009,409 UART: [idev] CDI.KEYID = 6
4,010,314 UART: [idev] SUBJECT.KEYID = 7
4,011,537 UART: [idev] UDS.KEYID = 0
4,014,527 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,157,845 UART: [idev] Erasing UDS.KEYID = 0
7,347,494 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,504 UART: [idev] --
7,373,996 UART: [ldev] ++
7,374,576 UART: [ldev] CDI.KEYID = 6
7,375,462 UART: [ldev] SUBJECT.KEYID = 5
7,376,734 UART: [ldev] AUTHORITY.KEYID = 7
7,377,967 UART: [ldev] FE.KEYID = 1
7,421,423 UART: [ldev] Erasing FE.KEYID = 1
10,757,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,763 UART: [ldev] --
13,136,470 UART: [fwproc] Waiting for Commands...
13,138,574 UART: [fwproc] Received command 0x46574c44
13,140,762 UART: [fwproc] Received Image of size 113844 bytes
13,235,515 UART: ROM Fatal Error: 0x000B001C
13,238,999 >>> mbox cmd response: failed
13,239,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,239,752 >>> mbox cmd response: failed
13,240,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,240,318 >>> mbox cmd response: failed
Initializing fuses
2,051,651 writing to cptra_bootfsm_go
2,240,958 UART:
2,241,315 UART: Running Caliptra ROM ...
2,242,475 UART:
2,242,645 UART: [state] CFI Enabled
2,319,032 UART: [state] LifecycleState = Unprovisioned
2,320,968 UART: [state] DebugLocked = No
2,323,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,963 UART: [kat] SHA2-256
2,497,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,179 UART: [kat] ++
2,508,682 UART: [kat] sha1
2,519,300 UART: [kat] SHA2-256
2,521,992 UART: [kat] SHA2-384
2,528,028 UART: [kat] SHA2-512-ACC
2,530,419 UART: [kat] ECC-384
4,817,743 UART: [kat] HMAC-384Kdf
4,828,784 UART: [kat] LMS
6,019,110 UART: [kat] --
6,025,445 UART: [cold-reset] ++
6,027,002 UART: [fht] Storing FHT @ 0x50003400
6,038,973 UART: [idev] ++
6,039,549 UART: [idev] CDI.KEYID = 6
6,040,463 UART: [idev] SUBJECT.KEYID = 7
6,041,735 UART: [idev] UDS.KEYID = 0
6,044,219 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,187,381 UART: [idev] Erasing UDS.KEYID = 0
9,374,997 UART: [idev] Using Sha1 for KeyId Algorithm
9,396,223 UART: [idev] --
9,400,757 UART: [ldev] ++
9,401,324 UART: [ldev] CDI.KEYID = 6
9,402,263 UART: [ldev] SUBJECT.KEYID = 5
9,403,726 UART: [ldev] AUTHORITY.KEYID = 7
9,404,844 UART: [ldev] FE.KEYID = 1
9,449,057 UART: [ldev] Erasing FE.KEYID = 1
12,781,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,074,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,088,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,103,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,118,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,136,696 UART: [ldev] --
15,140,550 UART: [fwproc] Waiting for Commands...
15,143,345 UART: [fwproc] Received command 0x46574c44
15,145,529 UART: [fwproc] Received Image of size 113844 bytes
19,188,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,269,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,338,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,655,682 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,804,621 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,941,237 >>> mbox cmd response: failed
12,941,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,942,236 >>> mbox cmd response: failed
12,942,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,942,799 >>> mbox cmd response: failed
Initializing fuses
2,048,387 writing to cptra_bootfsm_go
5,817,562 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,856,086 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,449 UART:
192,810 UART: Running Caliptra ROM ...
193,932 UART:
603,778 UART: [state] CFI Enabled
621,294 UART: [state] LifecycleState = Unprovisioned
623,220 UART: [state] DebugLocked = No
625,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,600 UART: [kat] SHA2-256
800,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,858 UART: [kat] ++
811,446 UART: [kat] sha1
821,441 UART: [kat] SHA2-256
824,128 UART: [kat] SHA2-384
829,712 UART: [kat] SHA2-512-ACC
832,060 UART: [kat] ECC-384
3,114,549 UART: [kat] HMAC-384Kdf
3,127,111 UART: [kat] LMS
4,317,220 UART: [kat] --
4,324,357 UART: [cold-reset] ++
4,326,182 UART: [fht] Storing FHT @ 0x50003400
4,338,577 UART: [idev] ++
4,339,177 UART: [idev] CDI.KEYID = 6
4,340,064 UART: [idev] SUBJECT.KEYID = 7
4,341,337 UART: [idev] UDS.KEYID = 0
4,344,217 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,488,781 UART: [idev] Erasing UDS.KEYID = 0
7,629,271 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,694 UART: [idev] --
7,656,883 UART: [ldev] ++
7,657,475 UART: [ldev] CDI.KEYID = 6
7,658,499 UART: [ldev] SUBJECT.KEYID = 5
7,659,662 UART: [ldev] AUTHORITY.KEYID = 7
7,660,889 UART: [ldev] FE.KEYID = 1
7,672,079 UART: [ldev] Erasing FE.KEYID = 1
10,959,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,169 UART: [ldev] --
13,321,162 UART: [fwproc] Waiting for Commands...
13,324,011 UART: [fwproc] Received command 0x46574c44
13,326,198 UART: [fwproc] Received Image of size 113844 bytes
13,423,573 UART: ROM Fatal Error: 0x000B001C
13,427,043 >>> mbox cmd response: failed
13,427,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,427,735 >>> mbox cmd response: failed
13,428,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,428,300 >>> mbox cmd response: failed
Initializing fuses
2,058,539 writing to cptra_bootfsm_go
2,247,878 UART:
2,248,228 UART: Running Caliptra ROM ...
2,249,370 UART:
7,039,573 UART: [state] CFI Enabled
7,053,294 UART: [state] LifecycleState = Unprovisioned
7,055,209 UART: [state] DebugLocked = No
7,056,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,061,538 UART: [kat] SHA2-256
7,231,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,241,780 UART: [kat] ++
7,242,238 UART: [kat] sha1
7,254,369 UART: [kat] SHA2-256
7,257,060 UART: [kat] SHA2-384
7,261,590 UART: [kat] SHA2-512-ACC
7,263,940 UART: [kat] ECC-384
9,546,896 UART: [kat] HMAC-384Kdf
9,559,338 UART: [kat] LMS
10,749,452 UART: [kat] --
10,755,251 UART: [cold-reset] ++
10,757,399 UART: [fht] Storing FHT @ 0x50003400
10,768,993 UART: [idev] ++
10,769,558 UART: [idev] CDI.KEYID = 6
10,770,573 UART: [idev] SUBJECT.KEYID = 7
10,771,751 UART: [idev] UDS.KEYID = 0
10,774,424 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,917,560 UART: [idev] Erasing UDS.KEYID = 0
14,058,982 UART: [idev] Using Sha1 for KeyId Algorithm
14,080,698 UART: [idev] --
14,084,374 UART: [ldev] ++
14,084,946 UART: [ldev] CDI.KEYID = 6
14,085,893 UART: [ldev] SUBJECT.KEYID = 5
14,087,147 UART: [ldev] AUTHORITY.KEYID = 7
14,088,385 UART: [ldev] FE.KEYID = 1
14,100,250 UART: [ldev] Erasing FE.KEYID = 1
17,388,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,681,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,695,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,710,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,725,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,745,414 UART: [ldev] --
19,750,787 UART: [fwproc] Waiting for Commands...
19,753,860 UART: [fwproc] Received command 0x46574c44
19,756,057 UART: [fwproc] Received Image of size 113844 bytes
23,802,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,878,212 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,947,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,262,843 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,132,864 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,167,988 >>> mbox cmd response: failed
13,168,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,168,906 >>> mbox cmd response: failed
13,169,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,169,470 >>> mbox cmd response: failed
Initializing fuses
2,052,710 writing to cptra_bootfsm_go
10,824,551 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,750,567 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,306 UART:
192,680 UART: Running Caliptra ROM ...
193,768 UART:
193,914 UART: [state] CFI Enabled
262,339 UART: [state] LifecycleState = Unprovisioned
264,265 UART: [state] DebugLocked = No
265,561 UART: [state] WD Timer not started. Device not locked for debugging
268,546 UART: [kat] SHA2-256
447,637 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,210 UART: [kat] ++
459,747 UART: [kat] sha1
472,033 UART: [kat] SHA2-256
475,105 UART: [kat] SHA2-384
480,538 UART: [kat] SHA2-512-ACC
483,524 UART: [kat] ECC-384
2,945,945 UART: [kat] HMAC-384Kdf
2,969,152 UART: [kat] LMS
3,498,584 UART: [kat] --
3,503,122 UART: [cold-reset] ++
3,505,005 UART: [fht] FHT @ 0x50003400
3,515,291 UART: [idev] ++
3,515,864 UART: [idev] CDI.KEYID = 6
3,516,792 UART: [idev] SUBJECT.KEYID = 7
3,517,952 UART: [idev] UDS.KEYID = 0
3,520,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,448 UART: [idev] Erasing UDS.KEYID = 0
6,021,962 UART: [idev] Sha1 KeyId Algorithm
6,045,413 UART: [idev] --
6,050,384 UART: [ldev] ++
6,050,961 UART: [ldev] CDI.KEYID = 6
6,051,850 UART: [ldev] SUBJECT.KEYID = 5
6,053,067 UART: [ldev] AUTHORITY.KEYID = 7
6,054,308 UART: [ldev] FE.KEYID = 1
6,097,770 UART: [ldev] Erasing FE.KEYID = 1
8,600,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,931 UART: [ldev] --
10,411,765 UART: [fwproc] Wait for Commands...
10,413,818 UART: [fwproc] Recv command 0x46574c44
10,415,864 UART: [fwproc] Recv'd Img size: 114168 bytes
10,509,579 UART: ROM Fatal Error: 0x000B001C
10,512,686 >>> mbox cmd response: failed
10,513,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,513,395 >>> mbox cmd response: failed
10,513,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,513,954 >>> mbox cmd response: failed
Initializing fuses
2,055,414 writing to cptra_bootfsm_go
2,244,752 UART:
2,245,102 UART: Running Caliptra ROM ...
2,246,147 UART:
2,246,300 UART: [state] CFI Enabled
2,310,816 UART: [state] LifecycleState = Unprovisioned
2,312,700 UART: [state] DebugLocked = No
2,315,088 UART: [state] WD Timer not started. Device not locked for debugging
2,319,212 UART: [kat] SHA2-256
2,498,353 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,509,928 UART: [kat] ++
2,510,387 UART: [kat] sha1
2,522,191 UART: [kat] SHA2-256
2,525,264 UART: [kat] SHA2-384
2,531,633 UART: [kat] SHA2-512-ACC
2,534,575 UART: [kat] ECC-384
4,995,335 UART: [kat] HMAC-384Kdf
5,019,462 UART: [kat] LMS
5,548,921 UART: [kat] --
5,553,554 UART: [cold-reset] ++
5,555,483 UART: [fht] FHT @ 0x50003400
5,567,006 UART: [idev] ++
5,567,587 UART: [idev] CDI.KEYID = 6
5,568,511 UART: [idev] SUBJECT.KEYID = 7
5,569,729 UART: [idev] UDS.KEYID = 0
5,572,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,715,904 UART: [idev] Erasing UDS.KEYID = 0
8,074,634 UART: [idev] Sha1 KeyId Algorithm
8,097,712 UART: [idev] --
8,102,409 UART: [ldev] ++
8,102,990 UART: [ldev] CDI.KEYID = 6
8,103,876 UART: [ldev] SUBJECT.KEYID = 5
8,105,091 UART: [ldev] AUTHORITY.KEYID = 7
8,106,346 UART: [ldev] FE.KEYID = 1
8,147,467 UART: [ldev] Erasing FE.KEYID = 1
10,654,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,404,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,420,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,910 UART: [ldev] --
12,461,830 UART: [fwproc] Wait for Commands...
12,463,928 UART: [fwproc] Recv command 0x46574c44
12,466,023 UART: [fwproc] Recv'd Img size: 114168 bytes
15,866,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,943,930 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,012,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,330,098 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,380,277 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,301,822 >>> mbox cmd response: failed
10,302,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,302,743 >>> mbox cmd response: failed
10,303,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,303,311 >>> mbox cmd response: failed
Initializing fuses
2,048,415 writing to cptra_bootfsm_go
5,430,135 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,088,583 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,610 UART:
192,968 UART: Running Caliptra ROM ...
194,150 UART:
603,731 UART: [state] CFI Enabled
615,356 UART: [state] LifecycleState = Unprovisioned
617,182 UART: [state] DebugLocked = No
620,151 UART: [state] WD Timer not started. Device not locked for debugging
623,822 UART: [kat] SHA2-256
802,910 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,514 UART: [kat] ++
815,048 UART: [kat] sha1
826,316 UART: [kat] SHA2-256
829,324 UART: [kat] SHA2-384
835,949 UART: [kat] SHA2-512-ACC
838,936 UART: [kat] ECC-384
3,281,659 UART: [kat] HMAC-384Kdf
3,294,261 UART: [kat] LMS
3,823,758 UART: [kat] --
3,827,994 UART: [cold-reset] ++
3,830,468 UART: [fht] FHT @ 0x50003400
3,841,751 UART: [idev] ++
3,842,335 UART: [idev] CDI.KEYID = 6
3,843,256 UART: [idev] SUBJECT.KEYID = 7
3,844,469 UART: [idev] UDS.KEYID = 0
3,847,224 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,795 UART: [idev] Erasing UDS.KEYID = 0
6,320,358 UART: [idev] Sha1 KeyId Algorithm
6,343,363 UART: [idev] --
6,347,198 UART: [ldev] ++
6,347,772 UART: [ldev] CDI.KEYID = 6
6,348,685 UART: [ldev] SUBJECT.KEYID = 5
6,349,867 UART: [ldev] AUTHORITY.KEYID = 7
6,351,104 UART: [ldev] FE.KEYID = 1
6,362,134 UART: [ldev] Erasing FE.KEYID = 1
8,836,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,496 UART: [ldev] --
10,626,487 UART: [fwproc] Wait for Commands...
10,629,283 UART: [fwproc] Recv command 0x46574c44
10,631,368 UART: [fwproc] Recv'd Img size: 114168 bytes
10,726,911 UART: ROM Fatal Error: 0x000B001C
10,730,048 >>> mbox cmd response: failed
10,730,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,730,694 >>> mbox cmd response: failed
10,730,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,731,278 >>> mbox cmd response: failed
Initializing fuses
2,064,627 writing to cptra_bootfsm_go
2,253,937 UART:
2,254,282 UART: Running Caliptra ROM ...
2,255,423 UART:
9,726,514 UART: [state] CFI Enabled
9,738,578 UART: [state] LifecycleState = Unprovisioned
9,740,469 UART: [state] DebugLocked = No
9,742,214 UART: [state] WD Timer not started. Device not locked for debugging
9,746,558 UART: [kat] SHA2-256
9,925,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,937,246 UART: [kat] ++
9,937,703 UART: [kat] sha1
9,949,287 UART: [kat] SHA2-256
9,952,306 UART: [kat] SHA2-384
9,957,756 UART: [kat] SHA2-512-ACC
9,960,705 UART: [kat] ECC-384
12,399,794 UART: [kat] HMAC-384Kdf
12,411,000 UART: [kat] LMS
12,940,495 UART: [kat] --
12,945,350 UART: [cold-reset] ++
12,947,176 UART: [fht] FHT @ 0x50003400
12,959,075 UART: [idev] ++
12,959,644 UART: [idev] CDI.KEYID = 6
12,960,661 UART: [idev] SUBJECT.KEYID = 7
12,961,766 UART: [idev] UDS.KEYID = 0
12,964,490 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,108,024 UART: [idev] Erasing UDS.KEYID = 0
15,435,979 UART: [idev] Sha1 KeyId Algorithm
15,457,957 UART: [idev] --
15,460,981 UART: [ldev] ++
15,461,549 UART: [ldev] CDI.KEYID = 6
15,462,455 UART: [ldev] SUBJECT.KEYID = 5
15,463,613 UART: [ldev] AUTHORITY.KEYID = 7
15,464,899 UART: [ldev] FE.KEYID = 1
15,478,087 UART: [ldev] Erasing FE.KEYID = 1
17,953,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,672,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,688,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,703,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,719,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,740,550 UART: [ldev] --
19,744,688 UART: [fwproc] Wait for Commands...
19,746,276 UART: [fwproc] Recv command 0x46574c44
19,748,385 UART: [fwproc] Recv'd Img size: 114168 bytes
23,150,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,221,089 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,289,844 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,606,651 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,701,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,508,130 >>> mbox cmd response: failed
10,508,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,509,034 >>> mbox cmd response: failed
10,509,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,509,602 >>> mbox cmd response: failed
Initializing fuses
2,050,900 writing to cptra_bootfsm_go
13,054,950 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,631,263 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,254 UART:
192,611 UART: Running Caliptra ROM ...
193,718 UART:
193,858 UART: [state] CFI Enabled
264,392 UART: [state] LifecycleState = Unprovisioned
266,807 UART: [state] DebugLocked = No
268,164 UART: [state] WD Timer not started. Device not locked for debugging
272,710 UART: [kat] SHA2-256
462,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,363 UART: [kat] ++
473,814 UART: [kat] sha1
484,425 UART: [kat] SHA2-256
487,495 UART: [kat] SHA2-384
493,908 UART: [kat] SHA2-512-ACC
496,532 UART: [kat] ECC-384
2,946,456 UART: [kat] HMAC-384Kdf
2,970,110 UART: [kat] LMS
3,501,863 UART: [kat] --
3,507,110 UART: [cold-reset] ++
3,508,777 UART: [fht] FHT @ 0x50003400
3,520,473 UART: [idev] ++
3,521,161 UART: [idev] CDI.KEYID = 6
3,522,098 UART: [idev] SUBJECT.KEYID = 7
3,523,312 UART: [idev] UDS.KEYID = 0
3,526,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,864 UART: [idev] Erasing UDS.KEYID = 0
6,027,936 UART: [idev] Sha1 KeyId Algorithm
6,049,728 UART: [idev] --
6,054,732 UART: [ldev] ++
6,055,425 UART: [ldev] CDI.KEYID = 6
6,056,317 UART: [ldev] SUBJECT.KEYID = 5
6,057,554 UART: [ldev] AUTHORITY.KEYID = 7
6,058,738 UART: [ldev] FE.KEYID = 1
6,099,123 UART: [ldev] Erasing FE.KEYID = 1
8,606,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,417 UART: [ldev] --
10,412,248 UART: [fwproc] Wait for Commands...
10,413,810 UART: [fwproc] Recv command 0x46574c44
10,416,085 UART: [fwproc] Recv'd Img size: 114168 bytes
10,545,691 UART: ROM Fatal Error: 0x000B001C
10,549,341 >>> mbox cmd response: failed
10,549,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,549,996 >>> mbox cmd response: failed
10,550,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,550,577 >>> mbox cmd response: failed
Initializing fuses
2,053,326 writing to cptra_bootfsm_go
2,242,620 UART:
2,242,959 UART: Running Caliptra ROM ...
2,244,002 UART:
2,244,164 UART: [state] CFI Enabled
2,318,452 UART: [state] LifecycleState = Unprovisioned
2,320,884 UART: [state] DebugLocked = No
2,323,763 UART: [state] WD Timer not started. Device not locked for debugging
2,327,687 UART: [kat] SHA2-256
2,517,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,347 UART: [kat] ++
2,528,811 UART: [kat] sha1
2,539,547 UART: [kat] SHA2-256
2,542,590 UART: [kat] SHA2-384
2,548,923 UART: [kat] SHA2-512-ACC
2,551,513 UART: [kat] ECC-384
5,005,088 UART: [kat] HMAC-384Kdf
5,027,155 UART: [kat] LMS
5,558,904 UART: [kat] --
5,562,506 UART: [cold-reset] ++
5,564,167 UART: [fht] FHT @ 0x50003400
5,576,348 UART: [idev] ++
5,577,063 UART: [idev] CDI.KEYID = 6
5,578,041 UART: [idev] SUBJECT.KEYID = 7
5,579,203 UART: [idev] UDS.KEYID = 0
5,581,712 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,725,294 UART: [idev] Erasing UDS.KEYID = 0
8,084,530 UART: [idev] Sha1 KeyId Algorithm
8,106,156 UART: [idev] --
8,110,688 UART: [ldev] ++
8,111,369 UART: [ldev] CDI.KEYID = 6
8,112,342 UART: [ldev] SUBJECT.KEYID = 5
8,113,503 UART: [ldev] AUTHORITY.KEYID = 7
8,114,674 UART: [ldev] FE.KEYID = 1
8,154,368 UART: [ldev] Erasing FE.KEYID = 1
10,663,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,397,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,359 UART: [ldev] --
12,469,553 UART: [fwproc] Wait for Commands...
12,472,106 UART: [fwproc] Recv command 0x46574c44
12,474,424 UART: [fwproc] Recv'd Img size: 114168 bytes
15,914,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,998,012 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,114,194 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,655,741 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,443,771 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,347,027 >>> mbox cmd response: failed
10,347,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,937 >>> mbox cmd response: failed
10,348,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,348,557 >>> mbox cmd response: failed
Initializing fuses
2,052,701 writing to cptra_bootfsm_go
5,484,178 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,773,402 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,499 UART:
192,853 UART: Running Caliptra ROM ...
194,045 UART:
603,504 UART: [state] CFI Enabled
613,324 UART: [state] LifecycleState = Unprovisioned
615,697 UART: [state] DebugLocked = No
617,615 UART: [state] WD Timer not started. Device not locked for debugging
622,857 UART: [kat] SHA2-256
812,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,518 UART: [kat] ++
824,102 UART: [kat] sha1
835,368 UART: [kat] SHA2-256
838,386 UART: [kat] SHA2-384
844,203 UART: [kat] SHA2-512-ACC
846,813 UART: [kat] ECC-384
3,288,072 UART: [kat] HMAC-384Kdf
3,300,274 UART: [kat] LMS
3,832,083 UART: [kat] --
3,836,474 UART: [cold-reset] ++
3,838,624 UART: [fht] FHT @ 0x50003400
3,849,789 UART: [idev] ++
3,850,517 UART: [idev] CDI.KEYID = 6
3,851,535 UART: [idev] SUBJECT.KEYID = 7
3,852,640 UART: [idev] UDS.KEYID = 0
3,855,339 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,998,929 UART: [idev] Erasing UDS.KEYID = 0
6,326,591 UART: [idev] Sha1 KeyId Algorithm
6,348,111 UART: [idev] --
6,353,509 UART: [ldev] ++
6,354,190 UART: [ldev] CDI.KEYID = 6
6,355,077 UART: [ldev] SUBJECT.KEYID = 5
6,356,290 UART: [ldev] AUTHORITY.KEYID = 7
6,357,525 UART: [ldev] FE.KEYID = 1
6,368,362 UART: [ldev] Erasing FE.KEYID = 1
8,845,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,579,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,594,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,609,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,007 UART: [ldev] --
10,634,206 UART: [fwproc] Wait for Commands...
10,635,879 UART: [fwproc] Recv command 0x46574c44
10,638,197 UART: [fwproc] Recv'd Img size: 114168 bytes
10,760,706 UART: ROM Fatal Error: 0x000B001C
10,764,339 >>> mbox cmd response: failed
10,764,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,764,986 >>> mbox cmd response: failed
10,765,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,765,536 >>> mbox cmd response: failed
Initializing fuses
2,051,207 writing to cptra_bootfsm_go
2,240,469 UART:
2,240,828 UART: Running Caliptra ROM ...
2,241,876 UART:
9,687,684 UART: [state] CFI Enabled
9,702,255 UART: [state] LifecycleState = Unprovisioned
9,704,667 UART: [state] DebugLocked = No
9,707,523 UART: [state] WD Timer not started. Device not locked for debugging
9,712,371 UART: [kat] SHA2-256
9,902,263 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,913,068 UART: [kat] ++
9,913,535 UART: [kat] sha1
9,925,184 UART: [kat] SHA2-256
9,928,208 UART: [kat] SHA2-384
9,933,554 UART: [kat] SHA2-512-ACC
9,936,150 UART: [kat] ECC-384
12,377,203 UART: [kat] HMAC-384Kdf
12,391,161 UART: [kat] LMS
12,922,939 UART: [kat] --
12,928,119 UART: [cold-reset] ++
12,930,426 UART: [fht] FHT @ 0x50003400
12,943,190 UART: [idev] ++
12,943,865 UART: [idev] CDI.KEYID = 6
12,944,801 UART: [idev] SUBJECT.KEYID = 7
12,946,020 UART: [idev] UDS.KEYID = 0
12,948,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,092,262 UART: [idev] Erasing UDS.KEYID = 0
15,418,677 UART: [idev] Sha1 KeyId Algorithm
15,439,875 UART: [idev] --
15,444,185 UART: [ldev] ++
15,444,871 UART: [ldev] CDI.KEYID = 6
15,445,804 UART: [ldev] SUBJECT.KEYID = 5
15,446,970 UART: [ldev] AUTHORITY.KEYID = 7
15,448,201 UART: [ldev] FE.KEYID = 1
15,458,358 UART: [ldev] Erasing FE.KEYID = 1
17,935,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,655,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,671,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,686,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,701,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,721,358 UART: [ldev] --
19,726,360 UART: [fwproc] Wait for Commands...
19,728,674 UART: [fwproc] Recv command 0x46574c44
19,730,994 UART: [fwproc] Recv'd Img size: 114168 bytes
23,171,164 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,255,092 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,371,222 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,911,826 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,759,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,585,446 >>> mbox cmd response: failed
10,586,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,586,413 >>> mbox cmd response: failed
10,586,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,586,987 >>> mbox cmd response: failed
Initializing fuses
2,052,771 writing to cptra_bootfsm_go
13,039,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,225,769 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,291 UART: [kat] SHA2-256
882,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,337 UART: [kat] ++
886,489 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,342 UART: [kat] SHA2-512-ACC
897,243 UART: [kat] ECC-384
902,914 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,291 UART: [cold-reset] ++
1,476,689 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,412 UART: [idev] Erasing UDS.KEYID = 0
1,505,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,760 UART: [idev] --
1,514,611 UART: [ldev] ++
1,514,779 UART: [ldev] CDI.KEYID = 6
1,515,142 UART: [ldev] SUBJECT.KEYID = 5
1,515,568 UART: [ldev] AUTHORITY.KEYID = 7
1,516,031 UART: [ldev] FE.KEYID = 1
1,521,197 UART: [ldev] Erasing FE.KEYID = 1
1,546,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,078 UART: [ldev] --
1,585,593 UART: [fwproc] Waiting for Commands...
1,586,268 UART: [fwproc] Received command 0x46574c44
1,587,059 UART: [fwproc] Received Image of size 114168 bytes
1,621,015 UART: ROM Fatal Error: 0x000B001C
1,622,174 >>> mbox cmd response: failed
1,622,174 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,622,180 >>> mbox cmd response: failed
1,622,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,622,186 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,179 UART: [kat] SHA2-256
882,110 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,225 UART: [kat] ++
886,377 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,560 UART: [kat] HMAC-384Kdf
907,240 UART: [kat] LMS
1,475,436 UART: [kat] --
1,476,307 UART: [cold-reset] ++
1,476,757 UART: [fht] Storing FHT @ 0x50003400
1,479,500 UART: [idev] ++
1,479,668 UART: [idev] CDI.KEYID = 6
1,480,028 UART: [idev] SUBJECT.KEYID = 7
1,480,452 UART: [idev] UDS.KEYID = 0
1,480,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,476 UART: [idev] Erasing UDS.KEYID = 0
1,505,140 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,672 UART: [idev] --
1,514,805 UART: [ldev] ++
1,514,973 UART: [ldev] CDI.KEYID = 6
1,515,336 UART: [ldev] SUBJECT.KEYID = 5
1,515,762 UART: [ldev] AUTHORITY.KEYID = 7
1,516,225 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,668 UART: [ldev] --
1,585,995 UART: [fwproc] Waiting for Commands...
1,586,664 UART: [fwproc] Received command 0x46574c44
1,587,455 UART: [fwproc] Received Image of size 114168 bytes
2,882,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,260 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,171 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,587 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,476,729 >>> mbox cmd response: failed
1,476,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,735 >>> mbox cmd response: failed
1,476,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,255 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,907 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,884 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
890,846 UART: [kat] SHA2-256
892,784 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
902,863 UART: [kat] HMAC-384Kdf
907,543 UART: [kat] LMS
1,475,739 UART: [kat] --
1,476,730 UART: [cold-reset] ++
1,477,242 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,481,396 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,257 UART: [idev] Erasing UDS.KEYID = 0
1,505,939 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,567 UART: [idev] --
1,515,566 UART: [ldev] ++
1,515,734 UART: [ldev] CDI.KEYID = 6
1,516,097 UART: [ldev] SUBJECT.KEYID = 5
1,516,523 UART: [ldev] AUTHORITY.KEYID = 7
1,516,986 UART: [ldev] FE.KEYID = 1
1,522,088 UART: [ldev] Erasing FE.KEYID = 1
1,547,633 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,739 UART: [ldev] --
1,587,060 UART: [fwproc] Waiting for Commands...
1,587,803 UART: [fwproc] Received command 0x46574c44
1,588,594 UART: [fwproc] Received Image of size 114168 bytes
1,623,892 UART: ROM Fatal Error: 0x000B001C
1,625,051 >>> mbox cmd response: failed
1,625,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,057 >>> mbox cmd response: failed
1,625,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,442 UART: [kat] SHA2-256
882,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,488 UART: [kat] ++
886,640 UART: [kat] sha1
890,832 UART: [kat] SHA2-256
892,770 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
903,175 UART: [kat] HMAC-384Kdf
907,833 UART: [kat] LMS
1,476,029 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,518 UART: [fht] Storing FHT @ 0x50003400
1,480,285 UART: [idev] ++
1,480,453 UART: [idev] CDI.KEYID = 6
1,480,813 UART: [idev] SUBJECT.KEYID = 7
1,481,237 UART: [idev] UDS.KEYID = 0
1,481,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,833 UART: [idev] Erasing UDS.KEYID = 0
1,505,853 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,445 UART: [idev] --
1,515,602 UART: [ldev] ++
1,515,770 UART: [ldev] CDI.KEYID = 6
1,516,133 UART: [ldev] SUBJECT.KEYID = 5
1,516,559 UART: [ldev] AUTHORITY.KEYID = 7
1,517,022 UART: [ldev] FE.KEYID = 1
1,522,074 UART: [ldev] Erasing FE.KEYID = 1
1,547,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,783 UART: [ldev] --
1,587,190 UART: [fwproc] Waiting for Commands...
1,587,957 UART: [fwproc] Received command 0x46574c44
1,588,748 UART: [fwproc] Received Image of size 114168 bytes
2,883,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,501 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,364 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,477,336 >>> mbox cmd response: failed
1,477,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,342 >>> mbox cmd response: failed
1,477,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,318 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,754 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
893,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,535 UART: [kat] ++
897,687 UART: [kat] sha1
901,683 UART: [kat] SHA2-256
903,623 UART: [kat] SHA2-384
906,504 UART: [kat] SHA2-512-ACC
908,405 UART: [kat] ECC-384
918,318 UART: [kat] HMAC-384Kdf
922,854 UART: [kat] LMS
1,171,182 UART: [kat] --
1,172,077 UART: [cold-reset] ++
1,172,613 UART: [fht] FHT @ 0x50003400
1,175,370 UART: [idev] ++
1,175,538 UART: [idev] CDI.KEYID = 6
1,175,898 UART: [idev] SUBJECT.KEYID = 7
1,176,322 UART: [idev] UDS.KEYID = 0
1,176,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,440 UART: [idev] Erasing UDS.KEYID = 0
1,201,299 UART: [idev] Sha1 KeyId Algorithm
1,209,941 UART: [idev] --
1,211,069 UART: [ldev] ++
1,211,237 UART: [ldev] CDI.KEYID = 6
1,211,600 UART: [ldev] SUBJECT.KEYID = 5
1,212,026 UART: [ldev] AUTHORITY.KEYID = 7
1,212,489 UART: [ldev] FE.KEYID = 1
1,217,501 UART: [ldev] Erasing FE.KEYID = 1
1,243,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,419 UART: [ldev] --
1,282,850 UART: [fwproc] Wait for Commands...
1,283,502 UART: [fwproc] Recv command 0x46574c44
1,284,230 UART: [fwproc] Recv'd Img size: 114168 bytes
1,319,674 UART: ROM Fatal Error: 0x000B001C
1,320,833 >>> mbox cmd response: failed
1,320,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,839 >>> mbox cmd response: failed
1,320,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
893,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,421 UART: [kat] ++
897,573 UART: [kat] sha1
901,697 UART: [kat] SHA2-256
903,637 UART: [kat] SHA2-384
906,246 UART: [kat] SHA2-512-ACC
908,147 UART: [kat] ECC-384
918,218 UART: [kat] HMAC-384Kdf
922,874 UART: [kat] LMS
1,171,202 UART: [kat] --
1,172,311 UART: [cold-reset] ++
1,172,713 UART: [fht] FHT @ 0x50003400
1,175,326 UART: [idev] ++
1,175,494 UART: [idev] CDI.KEYID = 6
1,175,854 UART: [idev] SUBJECT.KEYID = 7
1,176,278 UART: [idev] UDS.KEYID = 0
1,176,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,038 UART: [idev] Erasing UDS.KEYID = 0
1,200,803 UART: [idev] Sha1 KeyId Algorithm
1,209,181 UART: [idev] --
1,210,183 UART: [ldev] ++
1,210,351 UART: [ldev] CDI.KEYID = 6
1,210,714 UART: [ldev] SUBJECT.KEYID = 5
1,211,140 UART: [ldev] AUTHORITY.KEYID = 7
1,211,603 UART: [ldev] FE.KEYID = 1
1,216,933 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,283,090 UART: [fwproc] Wait for Commands...
1,283,724 UART: [fwproc] Recv command 0x46574c44
1,284,452 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,775 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,378 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,174,650 >>> mbox cmd response: failed
1,174,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,656 >>> mbox cmd response: failed
1,174,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,979 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
893,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,532 UART: [kat] ++
897,684 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,457 UART: [kat] SHA2-512-ACC
908,358 UART: [kat] ECC-384
918,507 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,424 UART: [cold-reset] ++
1,173,004 UART: [fht] FHT @ 0x50003400
1,175,771 UART: [idev] ++
1,175,939 UART: [idev] CDI.KEYID = 6
1,176,299 UART: [idev] SUBJECT.KEYID = 7
1,176,723 UART: [idev] UDS.KEYID = 0
1,177,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,959 UART: [idev] Erasing UDS.KEYID = 0
1,202,566 UART: [idev] Sha1 KeyId Algorithm
1,211,114 UART: [idev] --
1,212,298 UART: [ldev] ++
1,212,466 UART: [ldev] CDI.KEYID = 6
1,212,829 UART: [ldev] SUBJECT.KEYID = 5
1,213,255 UART: [ldev] AUTHORITY.KEYID = 7
1,213,718 UART: [ldev] FE.KEYID = 1
1,218,848 UART: [ldev] Erasing FE.KEYID = 1
1,245,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,172 UART: [ldev] --
1,284,449 UART: [fwproc] Wait for Commands...
1,285,075 UART: [fwproc] Recv command 0x46574c44
1,285,803 UART: [fwproc] Recv'd Img size: 114168 bytes
1,320,737 UART: ROM Fatal Error: 0x000B001C
1,321,896 >>> mbox cmd response: failed
1,321,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,902 >>> mbox cmd response: failed
1,321,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,764 UART: [kat] SHA2-256
903,704 UART: [kat] SHA2-384
906,525 UART: [kat] SHA2-512-ACC
908,426 UART: [kat] ECC-384
917,861 UART: [kat] HMAC-384Kdf
922,597 UART: [kat] LMS
1,170,925 UART: [kat] --
1,172,034 UART: [cold-reset] ++
1,172,366 UART: [fht] FHT @ 0x50003400
1,175,071 UART: [idev] ++
1,175,239 UART: [idev] CDI.KEYID = 6
1,175,599 UART: [idev] SUBJECT.KEYID = 7
1,176,023 UART: [idev] UDS.KEYID = 0
1,176,368 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,847 UART: [idev] Erasing UDS.KEYID = 0
1,201,152 UART: [idev] Sha1 KeyId Algorithm
1,209,518 UART: [idev] --
1,210,528 UART: [ldev] ++
1,210,696 UART: [ldev] CDI.KEYID = 6
1,211,059 UART: [ldev] SUBJECT.KEYID = 5
1,211,485 UART: [ldev] AUTHORITY.KEYID = 7
1,211,948 UART: [ldev] FE.KEYID = 1
1,216,988 UART: [ldev] Erasing FE.KEYID = 1
1,243,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,946 UART: [ldev] --
1,282,221 UART: [fwproc] Wait for Commands...
1,282,911 UART: [fwproc] Recv command 0x46574c44
1,283,639 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,942 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,246 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,737 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,176,401 >>> mbox cmd response: failed
1,176,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,407 >>> mbox cmd response: failed
1,176,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,372 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,170 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,754 UART: [state] LifecycleState = Unprovisioned
86,409 UART: [state] DebugLocked = No
86,969 UART: [state] WD Timer not started. Device not locked for debugging
88,246 UART: [kat] SHA2-256
891,796 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,925 UART: [kat] ++
896,077 UART: [kat] sha1
900,449 UART: [kat] SHA2-256
902,389 UART: [kat] SHA2-384
905,132 UART: [kat] SHA2-512-ACC
907,033 UART: [kat] ECC-384
916,690 UART: [kat] HMAC-384Kdf
921,076 UART: [kat] LMS
1,169,388 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,174,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,199,103 UART: [idev] Sha1 KeyId Algorithm
1,207,857 UART: [idev] --
1,208,944 UART: [ldev] ++
1,209,112 UART: [ldev] CDI.KEYID = 6
1,209,476 UART: [ldev] SUBJECT.KEYID = 5
1,209,903 UART: [ldev] AUTHORITY.KEYID = 7
1,210,366 UART: [ldev] FE.KEYID = 1
1,215,550 UART: [ldev] Erasing FE.KEYID = 1
1,241,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,016 UART: [ldev] --
1,280,290 UART: [fwproc] Wait for Commands...
1,281,097 UART: [fwproc] Recv command 0x46574c44
1,281,830 UART: [fwproc] Recv'd Img size: 114168 bytes
1,316,618 UART: ROM Fatal Error: 0x000B001C
1,317,777 >>> mbox cmd response: failed
1,317,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,783 >>> mbox cmd response: failed
1,317,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,785 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [kat] SHA2-256
891,620 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,714 UART: [kat] SHA2-512-ACC
906,615 UART: [kat] ECC-384
916,290 UART: [kat] HMAC-384Kdf
920,878 UART: [kat] LMS
1,169,190 UART: [kat] --
1,170,229 UART: [cold-reset] ++
1,170,807 UART: [fht] FHT @ 0x50003400
1,173,489 UART: [idev] ++
1,173,657 UART: [idev] CDI.KEYID = 6
1,174,018 UART: [idev] SUBJECT.KEYID = 7
1,174,443 UART: [idev] UDS.KEYID = 0
1,174,789 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,313 UART: [idev] Erasing UDS.KEYID = 0
1,198,373 UART: [idev] Sha1 KeyId Algorithm
1,207,223 UART: [idev] --
1,208,144 UART: [ldev] ++
1,208,312 UART: [ldev] CDI.KEYID = 6
1,208,676 UART: [ldev] SUBJECT.KEYID = 5
1,209,103 UART: [ldev] AUTHORITY.KEYID = 7
1,209,566 UART: [ldev] FE.KEYID = 1
1,215,076 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,944 UART: [ldev] --
1,280,240 UART: [fwproc] Wait for Commands...
1,280,939 UART: [fwproc] Recv command 0x46574c44
1,281,672 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,259 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,568 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,216 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,304 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,169,700 >>> mbox cmd response: failed
1,169,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,169,706 >>> mbox cmd response: failed
1,169,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,169,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,042 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,502 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,158 UART: [state] WD Timer not started. Device not locked for debugging
87,469 UART: [kat] SHA2-256
891,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,148 UART: [kat] ++
895,300 UART: [kat] sha1
899,450 UART: [kat] SHA2-256
901,390 UART: [kat] SHA2-384
904,021 UART: [kat] SHA2-512-ACC
905,922 UART: [kat] ECC-384
915,431 UART: [kat] HMAC-384Kdf
920,003 UART: [kat] LMS
1,168,315 UART: [kat] --
1,169,150 UART: [cold-reset] ++
1,169,492 UART: [fht] FHT @ 0x50003400
1,172,176 UART: [idev] ++
1,172,344 UART: [idev] CDI.KEYID = 6
1,172,705 UART: [idev] SUBJECT.KEYID = 7
1,173,130 UART: [idev] UDS.KEYID = 0
1,173,476 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,946 UART: [idev] Erasing UDS.KEYID = 0
1,198,148 UART: [idev] Sha1 KeyId Algorithm
1,206,896 UART: [idev] --
1,207,991 UART: [ldev] ++
1,208,159 UART: [ldev] CDI.KEYID = 6
1,208,523 UART: [ldev] SUBJECT.KEYID = 5
1,208,950 UART: [ldev] AUTHORITY.KEYID = 7
1,209,413 UART: [ldev] FE.KEYID = 1
1,214,683 UART: [ldev] Erasing FE.KEYID = 1
1,240,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,351 UART: [ldev] --
1,279,653 UART: [fwproc] Wait for Commands...
1,280,268 UART: [fwproc] Recv command 0x46574c44
1,281,001 UART: [fwproc] Recv'd Img size: 114168 bytes
1,315,551 UART: ROM Fatal Error: 0x000B001C
1,316,710 >>> mbox cmd response: failed
1,316,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,316,716 >>> mbox cmd response: failed
1,316,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,316,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,849 UART: [kat] LMS
1,169,161 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,174,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,332 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,560 UART: [idev] --
1,209,663 UART: [ldev] ++
1,209,831 UART: [ldev] CDI.KEYID = 6
1,210,195 UART: [ldev] SUBJECT.KEYID = 5
1,210,622 UART: [ldev] AUTHORITY.KEYID = 7
1,211,085 UART: [ldev] FE.KEYID = 1
1,216,751 UART: [ldev] Erasing FE.KEYID = 1
1,242,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,867 UART: [ldev] --
1,282,139 UART: [fwproc] Wait for Commands...
1,282,906 UART: [fwproc] Recv command 0x46574c44
1,283,639 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,027 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,623 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,443 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,170,485 >>> mbox cmd response: failed
1,170,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,491 >>> mbox cmd response: failed
1,170,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,170,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,363 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
4,878,644 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,037,632 >>> mbox cmd response: failed
14,038,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,038,846 >>> mbox cmd response: failed
14,039,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,039,425 >>> mbox cmd response: failed
Initializing fuses
2,057,424 writing to cptra_bootfsm_go
6,918,722 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,495,132 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
4,877,805 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,029,432 >>> mbox cmd response: failed
14,030,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,382 >>> mbox cmd response: failed
14,030,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,030,957 >>> mbox cmd response: failed
Initializing fuses
2,058,530 writing to cptra_bootfsm_go
6,920,131 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,483,804 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
5,190,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,200,186 >>> mbox cmd response: failed
14,200,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,201,143 >>> mbox cmd response: failed
14,201,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,201,771 >>> mbox cmd response: failed
Initializing fuses
2,056,111 writing to cptra_bootfsm_go
10,848,336 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,287,588 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
5,191,781 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,208,063 >>> mbox cmd response: failed
14,208,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,208,998 >>> mbox cmd response: failed
14,209,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,209,601 >>> mbox cmd response: failed
Initializing fuses
2,062,337 writing to cptra_bootfsm_go
10,835,643 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,260,978 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,423,602 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,397,817 >>> mbox cmd response: failed
10,398,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,398,685 >>> mbox cmd response: failed
10,398,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,399,246 >>> mbox cmd response: failed
Initializing fuses
2,054,178 writing to cptra_bootfsm_go
5,507,244 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,349,475 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,457,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,483,084 >>> mbox cmd response: failed
10,483,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,484,183 >>> mbox cmd response: failed
10,484,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,484,818 >>> mbox cmd response: failed
Initializing fuses
2,055,550 writing to cptra_bootfsm_go
5,488,920 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,316,309 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
3,783,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,682,407 >>> mbox cmd response: failed
10,683,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,683,816 >>> mbox cmd response: failed
10,684,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,684,380 >>> mbox cmd response: failed
Initializing fuses
2,056,735 writing to cptra_bootfsm_go
12,963,668 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,673,716 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,782,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,688,906 >>> mbox cmd response: failed
10,689,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,689,906 >>> mbox cmd response: failed
10,690,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,690,486 >>> mbox cmd response: failed
Initializing fuses
2,053,626 writing to cptra_bootfsm_go
12,962,757 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,663,716 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,427,774 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,453,857 >>> mbox cmd response: failed
10,454,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,454,718 >>> mbox cmd response: failed
10,455,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,455,338 >>> mbox cmd response: failed
Initializing fuses
2,069,636 writing to cptra_bootfsm_go
5,495,198 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,295,544 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,464,801 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,486,186 >>> mbox cmd response: failed
10,486,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,487,118 >>> mbox cmd response: failed
10,487,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,487,680 >>> mbox cmd response: failed
Initializing fuses
2,062,462 writing to cptra_bootfsm_go
5,509,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,329,910 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,783,999 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,667,023 >>> mbox cmd response: failed
10,667,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,667,938 >>> mbox cmd response: failed
10,668,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,668,499 >>> mbox cmd response: failed
Initializing fuses
2,059,417 writing to cptra_bootfsm_go
12,966,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,705,073 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,782,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,680,702 >>> mbox cmd response: failed
10,681,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,681,829 >>> mbox cmd response: failed
10,682,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,682,415 >>> mbox cmd response: failed
Initializing fuses
2,058,402 writing to cptra_bootfsm_go
12,966,540 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,676,388 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,194,635 >>> mbox cmd response: failed
1,194,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,641 >>> mbox cmd response: failed
1,194,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,428 UART: [state] LifecycleState = Unprovisioned
86,083 UART: [state] DebugLocked = No
86,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,267 UART: [kat] SHA2-256
882,198 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,313 UART: [kat] ++
886,465 UART: [kat] sha1
890,713 UART: [kat] SHA2-256
892,651 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,848 UART: [kat] HMAC-384Kdf
907,634 UART: [kat] LMS
1,475,830 UART: [kat] --
1,476,555 UART: [cold-reset] ++
1,477,107 UART: [fht] Storing FHT @ 0x50003400
1,479,862 UART: [idev] ++
1,480,030 UART: [idev] CDI.KEYID = 6
1,480,390 UART: [idev] SUBJECT.KEYID = 7
1,480,814 UART: [idev] UDS.KEYID = 0
1,481,159 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,856 UART: [idev] Erasing UDS.KEYID = 0
1,505,704 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,296 UART: [idev] --
1,515,423 UART: [ldev] ++
1,515,591 UART: [ldev] CDI.KEYID = 6
1,515,954 UART: [ldev] SUBJECT.KEYID = 5
1,516,380 UART: [ldev] AUTHORITY.KEYID = 7
1,516,843 UART: [ldev] FE.KEYID = 1
1,522,129 UART: [ldev] Erasing FE.KEYID = 1
1,547,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,924 UART: [ldev] --
1,587,237 UART: [fwproc] Waiting for Commands...
1,587,870 UART: [fwproc] Received command 0x46574c44
1,588,661 UART: [fwproc] Received Image of size 114168 bytes
2,885,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,324 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,395 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,547 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,194,261 >>> mbox cmd response: failed
1,194,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,267 >>> mbox cmd response: failed
1,194,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,019 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,132 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,194,488 >>> mbox cmd response: failed
1,194,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,494 >>> mbox cmd response: failed
1,194,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,336 UART: [kat] SHA2-256
882,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,382 UART: [kat] ++
886,534 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,251 UART: [kat] SHA2-512-ACC
897,152 UART: [kat] ECC-384
902,677 UART: [kat] HMAC-384Kdf
907,255 UART: [kat] LMS
1,475,451 UART: [kat] --
1,476,378 UART: [cold-reset] ++
1,476,848 UART: [fht] Storing FHT @ 0x50003400
1,479,695 UART: [idev] ++
1,479,863 UART: [idev] CDI.KEYID = 6
1,480,223 UART: [idev] SUBJECT.KEYID = 7
1,480,647 UART: [idev] UDS.KEYID = 0
1,480,992 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,035 UART: [idev] Erasing UDS.KEYID = 0
1,505,923 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,467 UART: [idev] --
1,515,570 UART: [ldev] ++
1,515,738 UART: [ldev] CDI.KEYID = 6
1,516,101 UART: [ldev] SUBJECT.KEYID = 5
1,516,527 UART: [ldev] AUTHORITY.KEYID = 7
1,516,990 UART: [ldev] FE.KEYID = 1
1,522,274 UART: [ldev] Erasing FE.KEYID = 1
1,547,349 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,363 UART: [ldev] --
1,586,762 UART: [fwproc] Waiting for Commands...
1,587,449 UART: [fwproc] Received command 0x46574c44
1,588,240 UART: [fwproc] Received Image of size 114168 bytes
2,883,569 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,765 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,646 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,622 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,196,946 >>> mbox cmd response: failed
1,196,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,952 >>> mbox cmd response: failed
1,196,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,958 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,928,296 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,195,667 >>> mbox cmd response: failed
1,195,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,673 >>> mbox cmd response: failed
1,195,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
893,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,655 UART: [kat] ++
897,807 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
906,852 UART: [kat] SHA2-512-ACC
908,753 UART: [kat] ECC-384
918,034 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,805 UART: [cold-reset] ++
1,172,251 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,632 UART: [idev] Erasing UDS.KEYID = 0
1,200,613 UART: [idev] Sha1 KeyId Algorithm
1,208,999 UART: [idev] --
1,210,055 UART: [ldev] ++
1,210,223 UART: [ldev] CDI.KEYID = 6
1,210,586 UART: [ldev] SUBJECT.KEYID = 5
1,211,012 UART: [ldev] AUTHORITY.KEYID = 7
1,211,475 UART: [ldev] FE.KEYID = 1
1,216,863 UART: [ldev] Erasing FE.KEYID = 1
1,243,122 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,179 UART: [ldev] --
1,282,676 UART: [fwproc] Wait for Commands...
1,283,326 UART: [fwproc] Recv command 0x46574c44
1,284,054 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,695 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,999 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,586 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,195,547 >>> mbox cmd response: failed
1,195,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,553 >>> mbox cmd response: failed
1,195,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,295 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,354 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,195,250 >>> mbox cmd response: failed
1,195,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,256 >>> mbox cmd response: failed
1,195,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,390 UART: [kat] SHA2-256
904,330 UART: [kat] SHA2-384
907,163 UART: [kat] SHA2-512-ACC
909,064 UART: [kat] ECC-384
918,919 UART: [kat] HMAC-384Kdf
923,489 UART: [kat] LMS
1,171,817 UART: [kat] --
1,172,678 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,645 UART: [idev] ++
1,175,813 UART: [idev] CDI.KEYID = 6
1,176,173 UART: [idev] SUBJECT.KEYID = 7
1,176,597 UART: [idev] UDS.KEYID = 0
1,176,942 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,551 UART: [idev] Erasing UDS.KEYID = 0
1,201,970 UART: [idev] Sha1 KeyId Algorithm
1,210,458 UART: [idev] --
1,211,528 UART: [ldev] ++
1,211,696 UART: [ldev] CDI.KEYID = 6
1,212,059 UART: [ldev] SUBJECT.KEYID = 5
1,212,485 UART: [ldev] AUTHORITY.KEYID = 7
1,212,948 UART: [ldev] FE.KEYID = 1
1,218,262 UART: [ldev] Erasing FE.KEYID = 1
1,244,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,748 UART: [ldev] --
1,284,165 UART: [fwproc] Wait for Commands...
1,284,953 UART: [fwproc] Recv command 0x46574c44
1,285,681 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,710 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,014 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,457 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,626 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,195,798 >>> mbox cmd response: failed
1,195,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,804 >>> mbox cmd response: failed
1,195,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,810 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,404 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,073 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,194,849 >>> mbox cmd response: failed
1,194,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,855 >>> mbox cmd response: failed
1,194,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,265 UART: [kat] SHA2-256
901,205 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,580 UART: [kat] HMAC-384Kdf
919,996 UART: [kat] LMS
1,168,308 UART: [kat] --
1,169,199 UART: [cold-reset] ++
1,169,777 UART: [fht] FHT @ 0x50003400
1,172,425 UART: [idev] ++
1,172,593 UART: [idev] CDI.KEYID = 6
1,172,954 UART: [idev] SUBJECT.KEYID = 7
1,173,379 UART: [idev] UDS.KEYID = 0
1,173,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,353 UART: [idev] Erasing UDS.KEYID = 0
1,197,941 UART: [idev] Sha1 KeyId Algorithm
1,206,991 UART: [idev] --
1,208,000 UART: [ldev] ++
1,208,168 UART: [ldev] CDI.KEYID = 6
1,208,532 UART: [ldev] SUBJECT.KEYID = 5
1,208,959 UART: [ldev] AUTHORITY.KEYID = 7
1,209,422 UART: [ldev] FE.KEYID = 1
1,214,582 UART: [ldev] Erasing FE.KEYID = 1
1,240,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,714 UART: [ldev] --
1,280,202 UART: [fwproc] Wait for Commands...
1,280,819 UART: [fwproc] Recv command 0x46574c44
1,281,552 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,617 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,926 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,470 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,192,393 >>> mbox cmd response: failed
1,192,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,192,399 >>> mbox cmd response: failed
1,192,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,192,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,564 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,194,060 >>> mbox cmd response: failed
1,194,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,066 >>> mbox cmd response: failed
1,194,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,194,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,796 UART: [kat] ++
895,948 UART: [kat] sha1
900,300 UART: [kat] SHA2-256
902,240 UART: [kat] SHA2-384
905,007 UART: [kat] SHA2-512-ACC
906,908 UART: [kat] ECC-384
916,453 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,414 UART: [cold-reset] ++
1,170,896 UART: [fht] FHT @ 0x50003400
1,173,674 UART: [idev] ++
1,173,842 UART: [idev] CDI.KEYID = 6
1,174,203 UART: [idev] SUBJECT.KEYID = 7
1,174,628 UART: [idev] UDS.KEYID = 0
1,174,974 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,470 UART: [idev] Sha1 KeyId Algorithm
1,208,362 UART: [idev] --
1,209,359 UART: [ldev] ++
1,209,527 UART: [ldev] CDI.KEYID = 6
1,209,891 UART: [ldev] SUBJECT.KEYID = 5
1,210,318 UART: [ldev] AUTHORITY.KEYID = 7
1,210,781 UART: [ldev] FE.KEYID = 1
1,215,939 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,489 UART: [ldev] --
1,281,809 UART: [fwproc] Wait for Commands...
1,282,496 UART: [fwproc] Recv command 0x46574c44
1,283,229 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,168 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,765 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,443 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,222 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,195,144 >>> mbox cmd response: failed
1,195,144 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,150 >>> mbox cmd response: failed
1,195,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,195,156 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,639 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,769 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
192,167 UART:
192,548 UART: Running Caliptra ROM ...
193,641 UART:
193,785 UART: [state] CFI Enabled
263,839 UART: [state] LifecycleState = Unprovisioned
265,744 UART: [state] DebugLocked = No
268,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,431 UART: [kat] SHA2-256
443,153 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,632 UART: [kat] ++
454,088 UART: [kat] sha1
464,920 UART: [kat] SHA2-256
467,663 UART: [kat] SHA2-384
473,098 UART: [kat] SHA2-512-ACC
475,493 UART: [kat] ECC-384
2,768,972 UART: [kat] HMAC-384Kdf
2,799,774 UART: [kat] LMS
3,990,082 UART: [kat] --
3,997,175 UART: [cold-reset] ++
3,998,188 UART: [fht] Storing FHT @ 0x50003400
4,010,487 UART: [idev] ++
4,011,065 UART: [idev] CDI.KEYID = 6
4,011,950 UART: [idev] SUBJECT.KEYID = 7
4,013,221 UART: [idev] UDS.KEYID = 0
4,015,897 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,159,275 UART: [idev] Erasing UDS.KEYID = 0
7,346,323 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,648 UART: [idev] --
7,373,429 UART: [ldev] ++
7,373,998 UART: [ldev] CDI.KEYID = 6
7,374,960 UART: [ldev] SUBJECT.KEYID = 5
7,376,175 UART: [ldev] AUTHORITY.KEYID = 7
7,377,462 UART: [ldev] FE.KEYID = 1
7,422,003 UART: [ldev] Erasing FE.KEYID = 1
10,753,953 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,049 UART: [ldev] --
13,113,973 UART: [fwproc] Waiting for Commands...
13,116,773 UART: [fwproc] Received command 0x46574c44
13,118,957 UART: [fwproc] Received Image of size 113844 bytes
16,888,664 UART: ROM Fatal Error: 0x000B0030
16,892,074 >>> mbox cmd response: failed
16,892,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,892,842 >>> mbox cmd response: failed
16,893,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,893,406 >>> mbox cmd response: failed
Initializing fuses
2,057,878 writing to cptra_bootfsm_go
2,247,179 UART:
2,247,531 UART: Running Caliptra ROM ...
2,248,668 UART:
2,248,839 UART: [state] CFI Enabled
2,312,315 UART: [state] LifecycleState = Unprovisioned
2,314,309 UART: [state] DebugLocked = No
2,316,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,945 UART: [kat] SHA2-256
2,490,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,156 UART: [kat] ++
2,501,702 UART: [kat] sha1
2,513,624 UART: [kat] SHA2-256
2,516,341 UART: [kat] SHA2-384
2,521,906 UART: [kat] SHA2-512-ACC
2,524,238 UART: [kat] ECC-384
4,813,868 UART: [kat] HMAC-384Kdf
4,844,690 UART: [kat] LMS
6,034,996 UART: [kat] --
6,039,594 UART: [cold-reset] ++
6,041,178 UART: [fht] Storing FHT @ 0x50003400
6,053,100 UART: [idev] ++
6,053,676 UART: [idev] CDI.KEYID = 6
6,054,697 UART: [idev] SUBJECT.KEYID = 7
6,055,858 UART: [idev] UDS.KEYID = 0
6,058,153 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,201,445 UART: [idev] Erasing UDS.KEYID = 0
9,389,665 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,289 UART: [idev] --
9,416,070 UART: [ldev] ++
9,416,656 UART: [ldev] CDI.KEYID = 6
9,417,579 UART: [ldev] SUBJECT.KEYID = 5
9,418,837 UART: [ldev] AUTHORITY.KEYID = 7
9,420,078 UART: [ldev] FE.KEYID = 1
9,466,650 UART: [ldev] Erasing FE.KEYID = 1
12,799,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,732 UART: [ldev] --
15,159,083 UART: [fwproc] Waiting for Commands...
15,161,654 UART: [fwproc] Received command 0x46574c44
15,163,854 UART: [fwproc] Received Image of size 113844 bytes
19,208,723 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,288,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,357,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,672,917 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,806,431 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,279,155 >>> mbox cmd response: failed
16,279,724 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,280,082 >>> mbox cmd response: failed
16,280,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,280,650 >>> mbox cmd response: failed
Initializing fuses
2,051,410 writing to cptra_bootfsm_go
5,817,256 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,901,749 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,475 UART:
192,836 UART: Running Caliptra ROM ...
193,972 UART:
603,560 UART: [state] CFI Enabled
618,790 UART: [state] LifecycleState = Unprovisioned
620,729 UART: [state] DebugLocked = No
622,618 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,221 UART: [kat] SHA2-256
796,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,539 UART: [kat] ++
808,012 UART: [kat] sha1
818,948 UART: [kat] SHA2-256
821,633 UART: [kat] SHA2-384
827,606 UART: [kat] SHA2-512-ACC
829,996 UART: [kat] ECC-384
3,113,164 UART: [kat] HMAC-384Kdf
3,125,357 UART: [kat] LMS
4,315,451 UART: [kat] --
4,318,716 UART: [cold-reset] ++
4,320,922 UART: [fht] Storing FHT @ 0x50003400
4,332,458 UART: [idev] ++
4,333,031 UART: [idev] CDI.KEYID = 6
4,334,002 UART: [idev] SUBJECT.KEYID = 7
4,335,225 UART: [idev] UDS.KEYID = 0
4,338,037 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,481,226 UART: [idev] Erasing UDS.KEYID = 0
7,621,604 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,893 UART: [idev] --
7,648,242 UART: [ldev] ++
7,648,820 UART: [ldev] CDI.KEYID = 6
7,649,789 UART: [ldev] SUBJECT.KEYID = 5
7,651,023 UART: [ldev] AUTHORITY.KEYID = 7
7,652,258 UART: [ldev] FE.KEYID = 1
7,663,611 UART: [ldev] Erasing FE.KEYID = 1
10,958,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,582 UART: [ldev] --
13,318,342 UART: [fwproc] Waiting for Commands...
13,320,182 UART: [fwproc] Received command 0x46574c44
13,322,376 UART: [fwproc] Received Image of size 113844 bytes
16,933,764 UART: ROM Fatal Error: 0x000B0030
16,937,161 >>> mbox cmd response: failed
16,937,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,937,908 >>> mbox cmd response: failed
16,938,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,938,496 >>> mbox cmd response: failed
Initializing fuses
2,050,903 writing to cptra_bootfsm_go
2,240,227 UART:
2,240,571 UART: Running Caliptra ROM ...
2,241,711 UART:
3,537,552 UART: [state] CFI Enabled
3,551,815 UART: [state] LifecycleState = Unprovisioned
3,553,719 UART: [state] DebugLocked = No
3,555,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,560,379 UART: [kat] SHA2-256
3,730,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,740,596 UART: [kat] ++
3,741,111 UART: [kat] sha1
3,751,896 UART: [kat] SHA2-256
3,754,605 UART: [kat] SHA2-384
3,761,134 UART: [kat] SHA2-512-ACC
3,763,537 UART: [kat] ECC-384
6,050,072 UART: [kat] HMAC-384Kdf
6,061,182 UART: [kat] LMS
7,251,267 UART: [kat] --
7,254,834 UART: [cold-reset] ++
7,256,260 UART: [fht] Storing FHT @ 0x50003400
7,268,564 UART: [idev] ++
7,269,136 UART: [idev] CDI.KEYID = 6
7,270,101 UART: [idev] SUBJECT.KEYID = 7
7,271,317 UART: [idev] UDS.KEYID = 0
7,273,824 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
7,416,894 UART: [idev] Erasing UDS.KEYID = 0
10,562,668 UART: [idev] Using Sha1 for KeyId Algorithm
10,583,886 UART: [idev] --
10,587,989 UART: [ldev] ++
10,588,552 UART: [ldev] CDI.KEYID = 6
10,589,515 UART: [ldev] SUBJECT.KEYID = 5
10,590,766 UART: [ldev] AUTHORITY.KEYID = 7
10,591,999 UART: [ldev] FE.KEYID = 1
10,602,156 UART: [ldev] Erasing FE.KEYID = 1
13,891,951 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,185,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,200,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,215,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,229,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,248,411 UART: [ldev] --
16,252,805 UART: [fwproc] Waiting for Commands...
16,254,469 UART: [fwproc] Received command 0x46574c44
16,256,675 UART: [fwproc] Received Image of size 113844 bytes
20,303,325 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,381,126 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,449,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,766,157 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,128,893 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,511,261 >>> mbox cmd response: failed
16,511,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,512,212 >>> mbox cmd response: failed
16,512,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,512,774 >>> mbox cmd response: failed
Initializing fuses
2,058,044 writing to cptra_bootfsm_go
7,483,707 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,422,930 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,087 UART:
192,463 UART: Running Caliptra ROM ...
193,628 UART:
193,776 UART: [state] CFI Enabled
260,499 UART: [state] LifecycleState = Unprovisioned
262,417 UART: [state] DebugLocked = No
263,908 UART: [state] WD Timer not started. Device not locked for debugging
266,831 UART: [kat] SHA2-256
445,956 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,545 UART: [kat] ++
458,082 UART: [kat] sha1
469,835 UART: [kat] SHA2-256
472,846 UART: [kat] SHA2-384
480,235 UART: [kat] SHA2-512-ACC
483,167 UART: [kat] ECC-384
2,949,759 UART: [kat] HMAC-384Kdf
2,970,326 UART: [kat] LMS
3,499,798 UART: [kat] --
3,503,588 UART: [cold-reset] ++
3,505,793 UART: [fht] FHT @ 0x50003400
3,517,472 UART: [idev] ++
3,518,042 UART: [idev] CDI.KEYID = 6
3,518,927 UART: [idev] SUBJECT.KEYID = 7
3,520,158 UART: [idev] UDS.KEYID = 0
3,522,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,414 UART: [idev] Erasing UDS.KEYID = 0
6,023,247 UART: [idev] Sha1 KeyId Algorithm
6,047,352 UART: [idev] --
6,051,836 UART: [ldev] ++
6,052,413 UART: [ldev] CDI.KEYID = 6
6,053,302 UART: [ldev] SUBJECT.KEYID = 5
6,054,518 UART: [ldev] AUTHORITY.KEYID = 7
6,055,755 UART: [ldev] FE.KEYID = 1
6,101,277 UART: [ldev] Erasing FE.KEYID = 1
8,603,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,482 UART: [ldev] --
10,414,435 UART: [fwproc] Wait for Commands...
10,416,220 UART: [fwproc] Recv command 0x46574c44
10,418,267 UART: [fwproc] Recv'd Img size: 114168 bytes
12,067,774 UART: ROM Fatal Error: 0x000B0030
12,070,854 >>> mbox cmd response: failed
12,071,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,071,506 >>> mbox cmd response: failed
12,071,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,072,113 >>> mbox cmd response: failed
Initializing fuses
2,056,301 writing to cptra_bootfsm_go
2,245,677 UART:
2,246,022 UART: Running Caliptra ROM ...
2,247,183 UART:
2,247,354 UART: [state] CFI Enabled
2,312,893 UART: [state] LifecycleState = Unprovisioned
2,314,773 UART: [state] DebugLocked = No
2,317,405 UART: [state] WD Timer not started. Device not locked for debugging
2,320,616 UART: [kat] SHA2-256
2,499,699 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,325 UART: [kat] ++
2,511,868 UART: [kat] sha1
2,523,090 UART: [kat] SHA2-256
2,526,164 UART: [kat] SHA2-384
2,532,038 UART: [kat] SHA2-512-ACC
2,534,984 UART: [kat] ECC-384
4,998,337 UART: [kat] HMAC-384Kdf
5,021,115 UART: [kat] LMS
5,550,601 UART: [kat] --
5,554,301 UART: [cold-reset] ++
5,555,215 UART: [fht] FHT @ 0x50003400
5,567,108 UART: [idev] ++
5,567,669 UART: [idev] CDI.KEYID = 6
5,568,651 UART: [idev] SUBJECT.KEYID = 7
5,569,814 UART: [idev] UDS.KEYID = 0
5,572,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,715,706 UART: [idev] Erasing UDS.KEYID = 0
8,076,978 UART: [idev] Sha1 KeyId Algorithm
8,101,192 UART: [idev] --
8,106,198 UART: [ldev] ++
8,106,781 UART: [ldev] CDI.KEYID = 6
8,107,693 UART: [ldev] SUBJECT.KEYID = 5
8,108,856 UART: [ldev] AUTHORITY.KEYID = 7
8,110,088 UART: [ldev] FE.KEYID = 1
8,148,877 UART: [ldev] Erasing FE.KEYID = 1
10,650,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,368,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,384,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,400,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,416,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,435,256 UART: [ldev] --
12,440,542 UART: [fwproc] Wait for Commands...
12,442,640 UART: [fwproc] Recv command 0x46574c44
12,444,739 UART: [fwproc] Recv'd Img size: 114168 bytes
15,841,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,912,173 UART: [fwproc] Load FMC at address 0x40000000 len 18800
15,980,916 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,297,755 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,384,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,776,681 >>> mbox cmd response: failed
11,777,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,777,579 >>> mbox cmd response: failed
11,777,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,778,139 >>> mbox cmd response: failed
Initializing fuses
2,054,350 writing to cptra_bootfsm_go
5,427,794 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,110,080 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,682 UART:
193,034 UART: Running Caliptra ROM ...
194,237 UART:
603,610 UART: [state] CFI Enabled
618,420 UART: [state] LifecycleState = Unprovisioned
620,301 UART: [state] DebugLocked = No
623,005 UART: [state] WD Timer not started. Device not locked for debugging
625,962 UART: [kat] SHA2-256
805,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,687 UART: [kat] ++
817,231 UART: [kat] sha1
829,464 UART: [kat] SHA2-256
832,525 UART: [kat] SHA2-384
838,627 UART: [kat] SHA2-512-ACC
841,569 UART: [kat] ECC-384
3,283,833 UART: [kat] HMAC-384Kdf
3,296,712 UART: [kat] LMS
3,826,170 UART: [kat] --
3,832,056 UART: [cold-reset] ++
3,834,476 UART: [fht] FHT @ 0x50003400
3,845,656 UART: [idev] ++
3,846,235 UART: [idev] CDI.KEYID = 6
3,847,199 UART: [idev] SUBJECT.KEYID = 7
3,848,359 UART: [idev] UDS.KEYID = 0
3,850,757 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,994,255 UART: [idev] Erasing UDS.KEYID = 0
6,321,993 UART: [idev] Sha1 KeyId Algorithm
6,344,091 UART: [idev] --
6,348,948 UART: [ldev] ++
6,349,535 UART: [ldev] CDI.KEYID = 6
6,350,450 UART: [ldev] SUBJECT.KEYID = 5
6,351,613 UART: [ldev] AUTHORITY.KEYID = 7
6,352,845 UART: [ldev] FE.KEYID = 1
6,364,029 UART: [ldev] Erasing FE.KEYID = 1
8,836,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,541 UART: [ldev] --
10,627,723 UART: [fwproc] Wait for Commands...
10,630,469 UART: [fwproc] Recv command 0x46574c44
10,632,514 UART: [fwproc] Recv'd Img size: 114168 bytes
12,294,841 UART: ROM Fatal Error: 0x000B0030
12,297,966 >>> mbox cmd response: failed
12,298,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,736 >>> mbox cmd response: failed
12,299,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,421 >>> mbox cmd response: failed
Initializing fuses
2,049,400 writing to cptra_bootfsm_go
2,238,695 UART:
2,239,041 UART: Running Caliptra ROM ...
2,240,094 UART:
8,170,211 UART: [state] CFI Enabled
8,182,156 UART: [state] LifecycleState = Unprovisioned
8,184,046 UART: [state] DebugLocked = No
8,186,094 UART: [state] WD Timer not started. Device not locked for debugging
8,188,979 UART: [kat] SHA2-256
8,368,087 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,379,685 UART: [kat] ++
8,380,235 UART: [kat] sha1
8,390,321 UART: [kat] SHA2-256
8,393,337 UART: [kat] SHA2-384
8,399,213 UART: [kat] SHA2-512-ACC
8,402,165 UART: [kat] ECC-384
10,843,923 UART: [kat] HMAC-384Kdf
10,857,342 UART: [kat] LMS
11,386,814 UART: [kat] --
11,391,676 UART: [cold-reset] ++
11,393,389 UART: [fht] FHT @ 0x50003400
11,404,526 UART: [idev] ++
11,405,097 UART: [idev] CDI.KEYID = 6
11,405,985 UART: [idev] SUBJECT.KEYID = 7
11,407,194 UART: [idev] UDS.KEYID = 0
11,409,572 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,553,060 UART: [idev] Erasing UDS.KEYID = 0
13,881,124 UART: [idev] Sha1 KeyId Algorithm
13,903,544 UART: [idev] --
13,906,671 UART: [ldev] ++
13,907,236 UART: [ldev] CDI.KEYID = 6
13,908,144 UART: [ldev] SUBJECT.KEYID = 5
13,909,305 UART: [ldev] AUTHORITY.KEYID = 7
13,910,586 UART: [ldev] FE.KEYID = 1
13,921,011 UART: [ldev] Erasing FE.KEYID = 1
16,393,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,111,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,127,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,143,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,158,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,177,919 UART: [ldev] --
18,181,728 UART: [fwproc] Wait for Commands...
18,183,462 UART: [fwproc] Recv command 0x46574c44
18,185,565 UART: [fwproc] Recv'd Img size: 114168 bytes
21,579,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,656,596 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,725,352 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,043,303 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,701,077 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,964,704 >>> mbox cmd response: failed
11,965,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,965,714 >>> mbox cmd response: failed
11,965,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,966,277 >>> mbox cmd response: failed
Initializing fuses
2,060,587 writing to cptra_bootfsm_go
11,599,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,153,945 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,265 UART:
192,618 UART: Running Caliptra ROM ...
193,813 UART:
193,970 UART: [state] CFI Enabled
265,307 UART: [state] LifecycleState = Unprovisioned
267,685 UART: [state] DebugLocked = No
270,448 UART: [state] WD Timer not started. Device not locked for debugging
275,496 UART: [kat] SHA2-256
465,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,138 UART: [kat] ++
476,631 UART: [kat] sha1
488,344 UART: [kat] SHA2-256
491,367 UART: [kat] SHA2-384
497,506 UART: [kat] SHA2-512-ACC
500,127 UART: [kat] ECC-384
2,946,997 UART: [kat] HMAC-384Kdf
2,971,500 UART: [kat] LMS
3,503,286 UART: [kat] --
3,510,045 UART: [cold-reset] ++
3,511,228 UART: [fht] FHT @ 0x50003400
3,523,080 UART: [idev] ++
3,523,770 UART: [idev] CDI.KEYID = 6
3,524,786 UART: [idev] SUBJECT.KEYID = 7
3,525,950 UART: [idev] UDS.KEYID = 0
3,528,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,585 UART: [idev] Erasing UDS.KEYID = 0
6,028,031 UART: [idev] Sha1 KeyId Algorithm
6,049,682 UART: [idev] --
6,055,263 UART: [ldev] ++
6,055,956 UART: [ldev] CDI.KEYID = 6
6,056,850 UART: [ldev] SUBJECT.KEYID = 5
6,057,956 UART: [ldev] AUTHORITY.KEYID = 7
6,059,253 UART: [ldev] FE.KEYID = 1
6,099,926 UART: [ldev] Erasing FE.KEYID = 1
8,604,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,322 UART: [ldev] --
10,412,262 UART: [fwproc] Wait for Commands...
10,414,087 UART: [fwproc] Recv command 0x46574c44
10,416,356 UART: [fwproc] Recv'd Img size: 114168 bytes
12,106,892 UART: ROM Fatal Error: 0x000B0030
12,110,344 >>> mbox cmd response: failed
12,110,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,111,070 >>> mbox cmd response: failed
12,111,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,111,649 >>> mbox cmd response: failed
Initializing fuses
2,051,318 writing to cptra_bootfsm_go
2,240,625 UART:
2,240,964 UART: Running Caliptra ROM ...
2,242,100 UART:
2,242,274 UART: [state] CFI Enabled
2,317,264 UART: [state] LifecycleState = Unprovisioned
2,319,649 UART: [state] DebugLocked = No
2,320,789 UART: [state] WD Timer not started. Device not locked for debugging
2,324,698 UART: [kat] SHA2-256
2,514,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,311 UART: [kat] ++
2,525,774 UART: [kat] sha1
2,537,202 UART: [kat] SHA2-256
2,540,234 UART: [kat] SHA2-384
2,547,196 UART: [kat] SHA2-512-ACC
2,549,768 UART: [kat] ECC-384
5,000,286 UART: [kat] HMAC-384Kdf
5,023,974 UART: [kat] LMS
5,555,777 UART: [kat] --
5,559,846 UART: [cold-reset] ++
5,562,058 UART: [fht] FHT @ 0x50003400
5,574,181 UART: [idev] ++
5,574,857 UART: [idev] CDI.KEYID = 6
5,575,861 UART: [idev] SUBJECT.KEYID = 7
5,577,022 UART: [idev] UDS.KEYID = 0
5,579,525 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,723,229 UART: [idev] Erasing UDS.KEYID = 0
8,077,602 UART: [idev] Sha1 KeyId Algorithm
8,100,955 UART: [idev] --
8,105,925 UART: [ldev] ++
8,106,611 UART: [ldev] CDI.KEYID = 6
8,107,531 UART: [ldev] SUBJECT.KEYID = 5
8,108,696 UART: [ldev] AUTHORITY.KEYID = 7
8,109,928 UART: [ldev] FE.KEYID = 1
8,153,633 UART: [ldev] Erasing FE.KEYID = 1
10,657,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,913 UART: [ldev] --
12,467,617 UART: [fwproc] Wait for Commands...
12,470,800 UART: [fwproc] Recv command 0x46574c44
12,473,075 UART: [fwproc] Recv'd Img size: 114168 bytes
15,918,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,452 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,110,575 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,651,543 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,438,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,855,652 >>> mbox cmd response: failed
11,856,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,856,497 >>> mbox cmd response: failed
11,856,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,857,068 >>> mbox cmd response: failed
Initializing fuses
2,051,828 writing to cptra_bootfsm_go
5,489,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,780,165 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,417 UART:
192,790 UART: Running Caliptra ROM ...
193,933 UART:
603,423 UART: [state] CFI Enabled
618,769 UART: [state] LifecycleState = Unprovisioned
621,139 UART: [state] DebugLocked = No
623,841 UART: [state] WD Timer not started. Device not locked for debugging
627,684 UART: [kat] SHA2-256
817,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,377 UART: [kat] ++
828,878 UART: [kat] sha1
839,890 UART: [kat] SHA2-256
842,908 UART: [kat] SHA2-384
848,077 UART: [kat] SHA2-512-ACC
850,693 UART: [kat] ECC-384
3,292,699 UART: [kat] HMAC-384Kdf
3,304,954 UART: [kat] LMS
3,836,796 UART: [kat] --
3,841,970 UART: [cold-reset] ++
3,843,305 UART: [fht] FHT @ 0x50003400
3,854,612 UART: [idev] ++
3,855,284 UART: [idev] CDI.KEYID = 6
3,856,298 UART: [idev] SUBJECT.KEYID = 7
3,857,455 UART: [idev] UDS.KEYID = 0
3,859,920 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,003,575 UART: [idev] Erasing UDS.KEYID = 0
6,333,687 UART: [idev] Sha1 KeyId Algorithm
6,354,729 UART: [idev] --
6,359,393 UART: [ldev] ++
6,360,081 UART: [ldev] CDI.KEYID = 6
6,360,997 UART: [ldev] SUBJECT.KEYID = 5
6,362,155 UART: [ldev] AUTHORITY.KEYID = 7
6,363,383 UART: [ldev] FE.KEYID = 1
6,374,462 UART: [ldev] Erasing FE.KEYID = 1
8,854,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,455 UART: [ldev] --
10,645,773 UART: [fwproc] Wait for Commands...
10,648,140 UART: [fwproc] Recv command 0x46574c44
10,650,402 UART: [fwproc] Recv'd Img size: 114168 bytes
12,341,976 UART: ROM Fatal Error: 0x000B0030
12,345,380 >>> mbox cmd response: failed
12,345,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,346,165 >>> mbox cmd response: failed
12,346,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,346,722 >>> mbox cmd response: failed
Initializing fuses
2,051,583 writing to cptra_bootfsm_go
2,240,886 UART:
2,241,242 UART: Running Caliptra ROM ...
2,242,322 UART:
8,123,580 UART: [state] CFI Enabled
8,139,958 UART: [state] LifecycleState = Unprovisioned
8,142,308 UART: [state] DebugLocked = No
8,145,171 UART: [state] WD Timer not started. Device not locked for debugging
8,150,340 UART: [kat] SHA2-256
8,340,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,350,992 UART: [kat] ++
8,351,512 UART: [kat] sha1
8,363,265 UART: [kat] SHA2-256
8,366,286 UART: [kat] SHA2-384
8,373,199 UART: [kat] SHA2-512-ACC
8,375,779 UART: [kat] ECC-384
10,814,929 UART: [kat] HMAC-384Kdf
10,828,186 UART: [kat] LMS
11,360,027 UART: [kat] --
11,364,094 UART: [cold-reset] ++
11,365,110 UART: [fht] FHT @ 0x50003400
11,377,091 UART: [idev] ++
11,377,768 UART: [idev] CDI.KEYID = 6
11,378,722 UART: [idev] SUBJECT.KEYID = 7
11,379,934 UART: [idev] UDS.KEYID = 0
11,382,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,525,699 UART: [idev] Erasing UDS.KEYID = 0
13,853,658 UART: [idev] Sha1 KeyId Algorithm
13,874,845 UART: [idev] --
13,879,597 UART: [ldev] ++
13,880,277 UART: [ldev] CDI.KEYID = 6
13,881,161 UART: [ldev] SUBJECT.KEYID = 5
13,882,369 UART: [ldev] AUTHORITY.KEYID = 7
13,883,598 UART: [ldev] FE.KEYID = 1
13,895,403 UART: [ldev] Erasing FE.KEYID = 1
16,373,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,093,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,108,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,123,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,138,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,159,514 UART: [ldev] --
18,164,543 UART: [fwproc] Wait for Commands...
18,166,164 UART: [fwproc] Recv command 0x46574c44
18,168,438 UART: [fwproc] Recv'd Img size: 114168 bytes
21,619,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,697,397 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,813,572 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,355,708 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
3,756,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,075,672 >>> mbox cmd response: failed
12,076,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,076,555 >>> mbox cmd response: failed
12,076,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,077,117 >>> mbox cmd response: failed
Initializing fuses
2,054,848 writing to cptra_bootfsm_go
11,540,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,742,149 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,606 UART: [state] LifecycleState = Unprovisioned
86,261 UART: [state] DebugLocked = No
86,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,603 UART: [kat] SHA2-256
882,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,649 UART: [kat] ++
886,801 UART: [kat] sha1
891,031 UART: [kat] SHA2-256
892,969 UART: [kat] SHA2-384
895,834 UART: [kat] SHA2-512-ACC
897,735 UART: [kat] ECC-384
903,496 UART: [kat] HMAC-384Kdf
907,992 UART: [kat] LMS
1,476,188 UART: [kat] --
1,477,243 UART: [cold-reset] ++
1,477,755 UART: [fht] Storing FHT @ 0x50003400
1,480,368 UART: [idev] ++
1,480,536 UART: [idev] CDI.KEYID = 6
1,480,896 UART: [idev] SUBJECT.KEYID = 7
1,481,320 UART: [idev] UDS.KEYID = 0
1,481,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,798 UART: [idev] Erasing UDS.KEYID = 0
1,505,206 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,726 UART: [idev] --
1,514,917 UART: [ldev] ++
1,515,085 UART: [ldev] CDI.KEYID = 6
1,515,448 UART: [ldev] SUBJECT.KEYID = 5
1,515,874 UART: [ldev] AUTHORITY.KEYID = 7
1,516,337 UART: [ldev] FE.KEYID = 1
1,521,383 UART: [ldev] Erasing FE.KEYID = 1
1,546,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,552 UART: [ldev] --
1,585,915 UART: [fwproc] Waiting for Commands...
1,586,598 UART: [fwproc] Received command 0x46574c44
1,587,389 UART: [fwproc] Received Image of size 114168 bytes
2,800,686 UART: ROM Fatal Error: 0x000B0030
2,801,843 >>> mbox cmd response: failed
2,801,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,801,849 >>> mbox cmd response: failed
2,801,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,801,855 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,628 UART: [state] LifecycleState = Unprovisioned
86,283 UART: [state] DebugLocked = No
86,943 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,541 UART: [kat] SHA2-256
882,472 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,587 UART: [kat] ++
886,739 UART: [kat] sha1
891,171 UART: [kat] SHA2-256
893,109 UART: [kat] SHA2-384
895,996 UART: [kat] SHA2-512-ACC
897,897 UART: [kat] ECC-384
903,482 UART: [kat] HMAC-384Kdf
908,002 UART: [kat] LMS
1,476,198 UART: [kat] --
1,476,873 UART: [cold-reset] ++
1,477,425 UART: [fht] Storing FHT @ 0x50003400
1,480,266 UART: [idev] ++
1,480,434 UART: [idev] CDI.KEYID = 6
1,480,794 UART: [idev] SUBJECT.KEYID = 7
1,481,218 UART: [idev] UDS.KEYID = 0
1,481,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,240 UART: [idev] Erasing UDS.KEYID = 0
1,505,126 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,554 UART: [idev] --
1,514,479 UART: [ldev] ++
1,514,647 UART: [ldev] CDI.KEYID = 6
1,515,010 UART: [ldev] SUBJECT.KEYID = 5
1,515,436 UART: [ldev] AUTHORITY.KEYID = 7
1,515,899 UART: [ldev] FE.KEYID = 1
1,520,987 UART: [ldev] Erasing FE.KEYID = 1
1,546,246 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,288 UART: [ldev] --
1,585,563 UART: [fwproc] Waiting for Commands...
1,586,250 UART: [fwproc] Received command 0x46574c44
1,587,041 UART: [fwproc] Received Image of size 114168 bytes
2,883,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,730 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,082 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,739 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,067 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,653,280 >>> mbox cmd response: failed
2,653,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,286 >>> mbox cmd response: failed
2,653,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,941 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,263 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,414 UART: [kat] SHA2-256
882,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,460 UART: [kat] ++
886,612 UART: [kat] sha1
890,742 UART: [kat] SHA2-256
892,680 UART: [kat] SHA2-384
895,531 UART: [kat] SHA2-512-ACC
897,432 UART: [kat] ECC-384
902,987 UART: [kat] HMAC-384Kdf
907,551 UART: [kat] LMS
1,475,747 UART: [kat] --
1,476,468 UART: [cold-reset] ++
1,476,976 UART: [fht] Storing FHT @ 0x50003400
1,479,745 UART: [idev] ++
1,479,913 UART: [idev] CDI.KEYID = 6
1,480,273 UART: [idev] SUBJECT.KEYID = 7
1,480,697 UART: [idev] UDS.KEYID = 0
1,481,042 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,779 UART: [idev] Erasing UDS.KEYID = 0
1,505,453 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,129 UART: [idev] --
1,515,178 UART: [ldev] ++
1,515,346 UART: [ldev] CDI.KEYID = 6
1,515,709 UART: [ldev] SUBJECT.KEYID = 5
1,516,135 UART: [ldev] AUTHORITY.KEYID = 7
1,516,598 UART: [ldev] FE.KEYID = 1
1,521,940 UART: [ldev] Erasing FE.KEYID = 1
1,547,839 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,641 UART: [ldev] --
1,587,114 UART: [fwproc] Waiting for Commands...
1,587,947 UART: [fwproc] Received command 0x46574c44
1,588,738 UART: [fwproc] Received Image of size 114168 bytes
2,763,582 UART: ROM Fatal Error: 0x000B0030
2,764,739 >>> mbox cmd response: failed
2,764,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,745 >>> mbox cmd response: failed
2,764,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,254 UART: [kat] SHA2-256
882,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,300 UART: [kat] ++
886,452 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,163 UART: [kat] SHA2-512-ACC
897,064 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,187 UART: [kat] LMS
1,475,383 UART: [kat] --
1,476,170 UART: [cold-reset] ++
1,476,586 UART: [fht] Storing FHT @ 0x50003400
1,479,507 UART: [idev] ++
1,479,675 UART: [idev] CDI.KEYID = 6
1,480,035 UART: [idev] SUBJECT.KEYID = 7
1,480,459 UART: [idev] UDS.KEYID = 0
1,480,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,777 UART: [idev] Erasing UDS.KEYID = 0
1,505,593 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,344 UART: [ldev] ++
1,515,512 UART: [ldev] CDI.KEYID = 6
1,515,875 UART: [ldev] SUBJECT.KEYID = 5
1,516,301 UART: [ldev] AUTHORITY.KEYID = 7
1,516,764 UART: [ldev] FE.KEYID = 1
1,521,926 UART: [ldev] Erasing FE.KEYID = 1
1,547,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,917 UART: [ldev] --
1,586,228 UART: [fwproc] Waiting for Commands...
1,586,887 UART: [fwproc] Received command 0x46574c44
1,587,678 UART: [fwproc] Received Image of size 114168 bytes
2,883,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,315 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,364 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,693,250 >>> mbox cmd response: failed
2,693,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,693,256 >>> mbox cmd response: failed
2,693,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,693,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,864 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,312 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,236 UART: [kat] HMAC-384Kdf
922,730 UART: [kat] LMS
1,171,058 UART: [kat] --
1,171,881 UART: [cold-reset] ++
1,172,257 UART: [fht] FHT @ 0x50003400
1,174,866 UART: [idev] ++
1,175,034 UART: [idev] CDI.KEYID = 6
1,175,394 UART: [idev] SUBJECT.KEYID = 7
1,175,818 UART: [idev] UDS.KEYID = 0
1,176,163 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,534 UART: [idev] Erasing UDS.KEYID = 0
1,200,473 UART: [idev] Sha1 KeyId Algorithm
1,209,073 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,772 UART: [ldev] SUBJECT.KEYID = 5
1,211,198 UART: [ldev] AUTHORITY.KEYID = 7
1,211,661 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,798 UART: [fwproc] Wait for Commands...
1,283,492 UART: [fwproc] Recv command 0x46574c44
1,284,220 UART: [fwproc] Recv'd Img size: 114168 bytes
1,592,626 UART: ROM Fatal Error: 0x000B0030
1,593,783 >>> mbox cmd response: failed
1,593,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,789 >>> mbox cmd response: failed
1,593,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
893,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,633 UART: [kat] ++
897,785 UART: [kat] sha1
901,957 UART: [kat] SHA2-256
903,897 UART: [kat] SHA2-384
906,466 UART: [kat] SHA2-512-ACC
908,367 UART: [kat] ECC-384
918,018 UART: [kat] HMAC-384Kdf
922,740 UART: [kat] LMS
1,171,068 UART: [kat] --
1,172,087 UART: [cold-reset] ++
1,172,487 UART: [fht] FHT @ 0x50003400
1,175,078 UART: [idev] ++
1,175,246 UART: [idev] CDI.KEYID = 6
1,175,606 UART: [idev] SUBJECT.KEYID = 7
1,176,030 UART: [idev] UDS.KEYID = 0
1,176,375 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,258 UART: [idev] Erasing UDS.KEYID = 0
1,200,803 UART: [idev] Sha1 KeyId Algorithm
1,209,443 UART: [idev] --
1,210,653 UART: [ldev] ++
1,210,821 UART: [ldev] CDI.KEYID = 6
1,211,184 UART: [ldev] SUBJECT.KEYID = 5
1,211,610 UART: [ldev] AUTHORITY.KEYID = 7
1,212,073 UART: [ldev] FE.KEYID = 1
1,217,035 UART: [ldev] Erasing FE.KEYID = 1
1,243,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,723 UART: [ldev] --
1,283,062 UART: [fwproc] Wait for Commands...
1,283,658 UART: [fwproc] Recv command 0x46574c44
1,284,386 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,255 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,559 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,230 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,450,575 >>> mbox cmd response: failed
1,450,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,581 >>> mbox cmd response: failed
1,450,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,355 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,505 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,428 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
893,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,394 UART: [kat] ++
897,546 UART: [kat] sha1
901,610 UART: [kat] SHA2-256
903,550 UART: [kat] SHA2-384
906,095 UART: [kat] SHA2-512-ACC
907,996 UART: [kat] ECC-384
917,335 UART: [kat] HMAC-384Kdf
921,897 UART: [kat] LMS
1,170,225 UART: [kat] --
1,171,084 UART: [cold-reset] ++
1,171,504 UART: [fht] FHT @ 0x50003400
1,174,099 UART: [idev] ++
1,174,267 UART: [idev] CDI.KEYID = 6
1,174,627 UART: [idev] SUBJECT.KEYID = 7
1,175,051 UART: [idev] UDS.KEYID = 0
1,175,396 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,743 UART: [idev] Erasing UDS.KEYID = 0
1,199,970 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,812 UART: [ldev] ++
1,209,980 UART: [ldev] CDI.KEYID = 6
1,210,343 UART: [ldev] SUBJECT.KEYID = 5
1,210,769 UART: [ldev] AUTHORITY.KEYID = 7
1,211,232 UART: [ldev] FE.KEYID = 1
1,216,230 UART: [ldev] Erasing FE.KEYID = 1
1,242,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,894 UART: [ldev] --
1,282,243 UART: [fwproc] Wait for Commands...
1,283,047 UART: [fwproc] Recv command 0x46574c44
1,283,775 UART: [fwproc] Recv'd Img size: 114168 bytes
1,599,346 UART: ROM Fatal Error: 0x000B0030
1,600,503 >>> mbox cmd response: failed
1,600,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,600,509 >>> mbox cmd response: failed
1,600,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,600,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
893,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,328 UART: [kat] ++
897,480 UART: [kat] sha1
901,668 UART: [kat] SHA2-256
903,608 UART: [kat] SHA2-384
906,379 UART: [kat] SHA2-512-ACC
908,280 UART: [kat] ECC-384
918,107 UART: [kat] HMAC-384Kdf
922,587 UART: [kat] LMS
1,170,915 UART: [kat] --
1,171,678 UART: [cold-reset] ++
1,172,184 UART: [fht] FHT @ 0x50003400
1,174,685 UART: [idev] ++
1,174,853 UART: [idev] CDI.KEYID = 6
1,175,213 UART: [idev] SUBJECT.KEYID = 7
1,175,637 UART: [idev] UDS.KEYID = 0
1,175,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,621 UART: [idev] Erasing UDS.KEYID = 0
1,200,722 UART: [idev] Sha1 KeyId Algorithm
1,209,226 UART: [idev] --
1,210,218 UART: [ldev] ++
1,210,386 UART: [ldev] CDI.KEYID = 6
1,210,749 UART: [ldev] SUBJECT.KEYID = 5
1,211,175 UART: [ldev] AUTHORITY.KEYID = 7
1,211,638 UART: [ldev] FE.KEYID = 1
1,217,216 UART: [ldev] Erasing FE.KEYID = 1
1,243,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,608 UART: [ldev] --
1,282,887 UART: [fwproc] Wait for Commands...
1,283,691 UART: [fwproc] Recv command 0x46574c44
1,284,419 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,129 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,972 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,276 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,857 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,384 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,459,219 >>> mbox cmd response: failed
1,459,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,225 >>> mbox cmd response: failed
1,459,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,054 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,557 UART: [kat] ++
895,709 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,660 UART: [kat] SHA2-512-ACC
906,561 UART: [kat] ECC-384
916,178 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,391 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,381 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,684 UART: [ldev] Erasing FE.KEYID = 1
1,241,809 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,760 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,733 UART: [fwproc] Recv command 0x46574c44
1,282,466 UART: [fwproc] Recv'd Img size: 114168 bytes
1,595,066 UART: ROM Fatal Error: 0x000B0030
1,596,223 >>> mbox cmd response: failed
1,596,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,229 >>> mbox cmd response: failed
1,596,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,551 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,170,005 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,174,455 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,901 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,214,948 UART: [ldev] Erasing FE.KEYID = 1
1,241,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,466 UART: [ldev] --
1,280,850 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,668 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,138 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,950 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,443,830 >>> mbox cmd response: failed
1,443,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,836 >>> mbox cmd response: failed
1,443,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,516 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
920,937 UART: [kat] LMS
1,169,249 UART: [kat] --
1,170,182 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,388 UART: [idev] ++
1,173,556 UART: [idev] CDI.KEYID = 6
1,173,917 UART: [idev] SUBJECT.KEYID = 7
1,174,342 UART: [idev] UDS.KEYID = 0
1,174,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,366 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,225 UART: [ldev] --
1,281,695 UART: [fwproc] Wait for Commands...
1,282,454 UART: [fwproc] Recv command 0x46574c44
1,283,187 UART: [fwproc] Recv'd Img size: 114168 bytes
1,593,538 UART: ROM Fatal Error: 0x000B0030
1,594,695 >>> mbox cmd response: failed
1,594,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,701 >>> mbox cmd response: failed
1,594,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,594,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,729 UART: [state] LifecycleState = Unprovisioned
86,384 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
891,619 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,360 UART: [kat] SHA2-256
902,300 UART: [kat] SHA2-384
905,063 UART: [kat] SHA2-512-ACC
906,964 UART: [kat] ECC-384
916,693 UART: [kat] HMAC-384Kdf
921,455 UART: [kat] LMS
1,169,767 UART: [kat] --
1,170,678 UART: [cold-reset] ++
1,171,124 UART: [fht] FHT @ 0x50003400
1,173,694 UART: [idev] ++
1,173,862 UART: [idev] CDI.KEYID = 6
1,174,223 UART: [idev] SUBJECT.KEYID = 7
1,174,648 UART: [idev] UDS.KEYID = 0
1,174,994 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,199,898 UART: [idev] Sha1 KeyId Algorithm
1,208,846 UART: [idev] --
1,209,887 UART: [ldev] ++
1,210,055 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,365 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,282,073 UART: [fwproc] Wait for Commands...
1,282,680 UART: [fwproc] Recv command 0x46574c44
1,283,413 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,140 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,449 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,053 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,448,000 >>> mbox cmd response: failed
1,448,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,006 >>> mbox cmd response: failed
1,448,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,567 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
192,222 UART:
192,596 UART: Running Caliptra ROM ...
193,692 UART:
193,834 UART: [state] CFI Enabled
262,365 UART: [state] LifecycleState = Unprovisioned
264,320 UART: [state] DebugLocked = No
266,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,563 UART: [kat] SHA2-256
441,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,746 UART: [kat] ++
452,194 UART: [kat] sha1
464,861 UART: [kat] SHA2-256
467,547 UART: [kat] SHA2-384
474,063 UART: [kat] SHA2-512-ACC
476,456 UART: [kat] ECC-384
2,769,225 UART: [kat] HMAC-384Kdf
2,798,640 UART: [kat] LMS
3,988,984 UART: [kat] --
3,993,416 UART: [cold-reset] ++
3,995,077 UART: [fht] Storing FHT @ 0x50003400
4,006,830 UART: [idev] ++
4,007,452 UART: [idev] CDI.KEYID = 6
4,008,335 UART: [idev] SUBJECT.KEYID = 7
4,009,604 UART: [idev] UDS.KEYID = 0
4,012,292 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,672 UART: [idev] Erasing UDS.KEYID = 0
7,344,409 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,278 UART: [idev] --
7,369,414 UART: [ldev] ++
7,369,988 UART: [ldev] CDI.KEYID = 6
7,370,955 UART: [ldev] SUBJECT.KEYID = 5
7,372,172 UART: [ldev] AUTHORITY.KEYID = 7
7,373,459 UART: [ldev] FE.KEYID = 1
7,421,761 UART: [ldev] Erasing FE.KEYID = 1
10,753,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,395 UART: [ldev] --
13,116,936 UART: [fwproc] Waiting for Commands...
13,120,226 UART: [fwproc] Received command 0x46574c44
13,122,413 UART: [fwproc] Received Image of size 113844 bytes
13,201,211 UART: ROM Fatal Error: 0x000B0032
13,204,752 >>> mbox cmd response: failed
13,205,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,205,526 >>> mbox cmd response: failed
13,205,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,206,089 >>> mbox cmd response: failed
Initializing fuses
2,048,845 writing to cptra_bootfsm_go
2,238,168 UART:
2,238,518 UART: Running Caliptra ROM ...
2,239,653 UART:
2,239,821 UART: [state] CFI Enabled
2,308,838 UART: [state] LifecycleState = Unprovisioned
2,310,778 UART: [state] DebugLocked = No
2,313,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,318,768 UART: [kat] SHA2-256
2,488,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,498,968 UART: [kat] ++
2,499,430 UART: [kat] sha1
2,511,937 UART: [kat] SHA2-256
2,514,641 UART: [kat] SHA2-384
2,520,752 UART: [kat] SHA2-512-ACC
2,523,144 UART: [kat] ECC-384
4,813,033 UART: [kat] HMAC-384Kdf
4,845,272 UART: [kat] LMS
6,035,577 UART: [kat] --
6,039,978 UART: [cold-reset] ++
6,042,512 UART: [fht] Storing FHT @ 0x50003400
6,054,263 UART: [idev] ++
6,054,909 UART: [idev] CDI.KEYID = 6
6,055,794 UART: [idev] SUBJECT.KEYID = 7
6,057,057 UART: [idev] UDS.KEYID = 0
6,059,615 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,203,369 UART: [idev] Erasing UDS.KEYID = 0
9,392,334 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,605 UART: [idev] --
9,416,827 UART: [ldev] ++
9,417,406 UART: [ldev] CDI.KEYID = 6
9,418,346 UART: [ldev] SUBJECT.KEYID = 5
9,419,606 UART: [ldev] AUTHORITY.KEYID = 7
9,420,762 UART: [ldev] FE.KEYID = 1
9,467,352 UART: [ldev] Erasing FE.KEYID = 1
12,800,738 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,219 UART: [ldev] --
15,162,924 UART: [fwproc] Waiting for Commands...
15,165,622 UART: [fwproc] Received command 0x46574c44
15,167,807 UART: [fwproc] Received Image of size 113844 bytes
19,209,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,288,843 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,357,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,673,533 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,806,412 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,940,842 >>> mbox cmd response: failed
12,941,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,941,722 >>> mbox cmd response: failed
12,941,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,942,289 >>> mbox cmd response: failed
Initializing fuses
2,045,589 writing to cptra_bootfsm_go
5,842,432 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,911,033 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,705 UART:
193,067 UART: Running Caliptra ROM ...
194,254 UART:
603,836 UART: [state] CFI Enabled
618,648 UART: [state] LifecycleState = Unprovisioned
620,570 UART: [state] DebugLocked = No
623,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,804 UART: [kat] SHA2-256
798,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,074 UART: [kat] ++
809,564 UART: [kat] sha1
820,390 UART: [kat] SHA2-256
823,098 UART: [kat] SHA2-384
827,947 UART: [kat] SHA2-512-ACC
830,285 UART: [kat] ECC-384
3,115,441 UART: [kat] HMAC-384Kdf
3,127,678 UART: [kat] LMS
4,317,802 UART: [kat] --
4,321,192 UART: [cold-reset] ++
4,322,694 UART: [fht] Storing FHT @ 0x50003400
4,334,719 UART: [idev] ++
4,335,285 UART: [idev] CDI.KEYID = 6
4,336,251 UART: [idev] SUBJECT.KEYID = 7
4,337,470 UART: [idev] UDS.KEYID = 0
4,340,227 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,424 UART: [idev] Erasing UDS.KEYID = 0
7,625,492 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,352 UART: [idev] --
7,651,688 UART: [ldev] ++
7,652,258 UART: [ldev] CDI.KEYID = 6
7,653,226 UART: [ldev] SUBJECT.KEYID = 5
7,654,441 UART: [ldev] AUTHORITY.KEYID = 7
7,655,672 UART: [ldev] FE.KEYID = 1
7,667,543 UART: [ldev] Erasing FE.KEYID = 1
10,953,735 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,794 UART: [ldev] --
13,315,139 UART: [fwproc] Waiting for Commands...
13,316,963 UART: [fwproc] Received command 0x46574c44
13,319,158 UART: [fwproc] Received Image of size 113844 bytes
13,395,093 UART: ROM Fatal Error: 0x000B0032
13,398,605 >>> mbox cmd response: failed
13,398,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,399,301 >>> mbox cmd response: failed
13,399,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,399,869 >>> mbox cmd response: failed
Initializing fuses
2,047,938 writing to cptra_bootfsm_go
2,237,258 UART:
2,237,607 UART: Running Caliptra ROM ...
2,238,657 UART:
7,055,284 UART: [state] CFI Enabled
7,069,710 UART: [state] LifecycleState = Unprovisioned
7,071,672 UART: [state] DebugLocked = No
7,074,392 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,078,430 UART: [kat] SHA2-256
7,248,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,258,724 UART: [kat] ++
7,259,187 UART: [kat] sha1
7,269,047 UART: [kat] SHA2-256
7,271,734 UART: [kat] SHA2-384
7,277,720 UART: [kat] SHA2-512-ACC
7,280,067 UART: [kat] ECC-384
9,562,163 UART: [kat] HMAC-384Kdf
9,573,578 UART: [kat] LMS
10,763,693 UART: [kat] --
10,766,891 UART: [cold-reset] ++
10,769,526 UART: [fht] Storing FHT @ 0x50003400
10,781,868 UART: [idev] ++
10,782,437 UART: [idev] CDI.KEYID = 6
10,783,392 UART: [idev] SUBJECT.KEYID = 7
10,784,662 UART: [idev] UDS.KEYID = 0
10,787,314 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,930,439 UART: [idev] Erasing UDS.KEYID = 0
14,071,542 UART: [idev] Using Sha1 for KeyId Algorithm
14,092,244 UART: [idev] --
14,095,148 UART: [ldev] ++
14,095,726 UART: [ldev] CDI.KEYID = 6
14,096,664 UART: [ldev] SUBJECT.KEYID = 5
14,097,917 UART: [ldev] AUTHORITY.KEYID = 7
14,099,163 UART: [ldev] FE.KEYID = 1
14,109,854 UART: [ldev] Erasing FE.KEYID = 1
17,399,436 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,690,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,705,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,720,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,734,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,753,846 UART: [ldev] --
19,758,030 UART: [fwproc] Waiting for Commands...
19,759,704 UART: [fwproc] Received command 0x46574c44
19,761,897 UART: [fwproc] Received Image of size 113844 bytes
23,805,994 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,882,115 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,950,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,267,891 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,129,759 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,126,253 >>> mbox cmd response: failed
13,126,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,195 >>> mbox cmd response: failed
13,127,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,767 >>> mbox cmd response: failed
Initializing fuses
2,050,281 writing to cptra_bootfsm_go
10,869,637 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,806,549 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,339 UART:
192,695 UART: Running Caliptra ROM ...
193,903 UART:
194,064 UART: [state] CFI Enabled
262,676 UART: [state] LifecycleState = Unprovisioned
264,599 UART: [state] DebugLocked = No
267,061 UART: [state] WD Timer not started. Device not locked for debugging
271,056 UART: [kat] SHA2-256
450,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,728 UART: [kat] ++
462,259 UART: [kat] sha1
473,371 UART: [kat] SHA2-256
476,426 UART: [kat] SHA2-384
482,619 UART: [kat] SHA2-512-ACC
485,603 UART: [kat] ECC-384
2,944,775 UART: [kat] HMAC-384Kdf
2,971,030 UART: [kat] LMS
3,500,481 UART: [kat] --
3,504,880 UART: [cold-reset] ++
3,506,335 UART: [fht] FHT @ 0x50003400
3,518,009 UART: [idev] ++
3,518,612 UART: [idev] CDI.KEYID = 6
3,519,540 UART: [idev] SUBJECT.KEYID = 7
3,520,700 UART: [idev] UDS.KEYID = 0
3,523,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,331 UART: [idev] Erasing UDS.KEYID = 0
6,023,652 UART: [idev] Sha1 KeyId Algorithm
6,046,194 UART: [idev] --
6,050,409 UART: [ldev] ++
6,050,984 UART: [ldev] CDI.KEYID = 6
6,051,898 UART: [ldev] SUBJECT.KEYID = 5
6,053,064 UART: [ldev] AUTHORITY.KEYID = 7
6,054,299 UART: [ldev] FE.KEYID = 1
6,098,997 UART: [ldev] Erasing FE.KEYID = 1
8,601,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,334,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,890 UART: [ldev] --
10,391,144 UART: [fwproc] Wait for Commands...
10,393,447 UART: [fwproc] Recv command 0x46574c44
10,395,497 UART: [fwproc] Recv'd Img size: 114168 bytes
10,470,384 UART: ROM Fatal Error: 0x000B0032
10,473,485 >>> mbox cmd response: failed
10,473,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,262 >>> mbox cmd response: failed
10,474,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,474,833 >>> mbox cmd response: failed
Initializing fuses
2,047,270 writing to cptra_bootfsm_go
2,236,656 UART:
2,237,001 UART: Running Caliptra ROM ...
2,238,136 UART:
2,238,306 UART: [state] CFI Enabled
2,312,411 UART: [state] LifecycleState = Unprovisioned
2,314,252 UART: [state] DebugLocked = No
2,316,979 UART: [state] WD Timer not started. Device not locked for debugging
2,320,415 UART: [kat] SHA2-256
2,499,512 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,511,092 UART: [kat] ++
2,511,643 UART: [kat] sha1
2,523,508 UART: [kat] SHA2-256
2,526,540 UART: [kat] SHA2-384
2,532,689 UART: [kat] SHA2-512-ACC
2,535,642 UART: [kat] ECC-384
4,996,059 UART: [kat] HMAC-384Kdf
5,018,401 UART: [kat] LMS
5,547,879 UART: [kat] --
5,553,110 UART: [cold-reset] ++
5,554,238 UART: [fht] FHT @ 0x50003400
5,564,083 UART: [idev] ++
5,564,654 UART: [idev] CDI.KEYID = 6
5,565,563 UART: [idev] SUBJECT.KEYID = 7
5,566,724 UART: [idev] UDS.KEYID = 0
5,569,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,713,102 UART: [idev] Erasing UDS.KEYID = 0
8,074,622 UART: [idev] Sha1 KeyId Algorithm
8,096,932 UART: [idev] --
8,101,276 UART: [ldev] ++
8,101,853 UART: [ldev] CDI.KEYID = 6
8,102,741 UART: [ldev] SUBJECT.KEYID = 5
8,103,905 UART: [ldev] AUTHORITY.KEYID = 7
8,105,248 UART: [ldev] FE.KEYID = 1
8,146,270 UART: [ldev] Erasing FE.KEYID = 1
10,650,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,419,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,434,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,267 UART: [ldev] --
12,460,257 UART: [fwproc] Wait for Commands...
12,462,191 UART: [fwproc] Recv command 0x46574c44
12,464,286 UART: [fwproc] Recv'd Img size: 114168 bytes
15,868,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,942,395 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,011,159 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,329,196 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,384,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,320,037 >>> mbox cmd response: failed
10,320,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,320,930 >>> mbox cmd response: failed
10,321,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,321,489 >>> mbox cmd response: failed
Initializing fuses
2,045,052 writing to cptra_bootfsm_go
5,428,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,117,525 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,500 UART:
192,959 UART: Running Caliptra ROM ...
194,110 UART:
603,773 UART: [state] CFI Enabled
618,512 UART: [state] LifecycleState = Unprovisioned
620,401 UART: [state] DebugLocked = No
622,507 UART: [state] WD Timer not started. Device not locked for debugging
625,748 UART: [kat] SHA2-256
804,862 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,431 UART: [kat] ++
816,879 UART: [kat] sha1
827,698 UART: [kat] SHA2-256
830,753 UART: [kat] SHA2-384
837,106 UART: [kat] SHA2-512-ACC
840,086 UART: [kat] ECC-384
3,281,796 UART: [kat] HMAC-384Kdf
3,294,646 UART: [kat] LMS
3,824,168 UART: [kat] --
3,828,501 UART: [cold-reset] ++
3,830,218 UART: [fht] FHT @ 0x50003400
3,840,552 UART: [idev] ++
3,841,154 UART: [idev] CDI.KEYID = 6
3,842,039 UART: [idev] SUBJECT.KEYID = 7
3,843,205 UART: [idev] UDS.KEYID = 0
3,846,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,989,572 UART: [idev] Erasing UDS.KEYID = 0
6,319,210 UART: [idev] Sha1 KeyId Algorithm
6,340,541 UART: [idev] --
6,344,975 UART: [ldev] ++
6,345,552 UART: [ldev] CDI.KEYID = 6
6,346,440 UART: [ldev] SUBJECT.KEYID = 5
6,347,656 UART: [ldev] AUTHORITY.KEYID = 7
6,348,886 UART: [ldev] FE.KEYID = 1
6,358,992 UART: [ldev] Erasing FE.KEYID = 1
8,833,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,339 UART: [ldev] --
10,624,851 UART: [fwproc] Wait for Commands...
10,626,951 UART: [fwproc] Recv command 0x46574c44
10,629,045 UART: [fwproc] Recv'd Img size: 114168 bytes
10,710,111 UART: ROM Fatal Error: 0x000B0032
10,713,251 >>> mbox cmd response: failed
10,713,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,713,992 >>> mbox cmd response: failed
10,714,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,714,550 >>> mbox cmd response: failed
Initializing fuses
2,049,592 writing to cptra_bootfsm_go
2,238,890 UART:
2,239,224 UART: Running Caliptra ROM ...
2,240,365 UART:
9,737,693 UART: [state] CFI Enabled
9,750,333 UART: [state] LifecycleState = Unprovisioned
9,752,198 UART: [state] DebugLocked = No
9,754,295 UART: [state] WD Timer not started. Device not locked for debugging
9,758,364 UART: [kat] SHA2-256
9,937,519 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,949,057 UART: [kat] ++
9,949,520 UART: [kat] sha1
9,961,212 UART: [kat] SHA2-256
9,964,198 UART: [kat] SHA2-384
9,969,971 UART: [kat] SHA2-512-ACC
9,972,915 UART: [kat] ECC-384
12,416,351 UART: [kat] HMAC-384Kdf
12,429,012 UART: [kat] LMS
12,958,470 UART: [kat] --
12,962,095 UART: [cold-reset] ++
12,964,688 UART: [fht] FHT @ 0x50003400
12,975,645 UART: [idev] ++
12,976,226 UART: [idev] CDI.KEYID = 6
12,977,136 UART: [idev] SUBJECT.KEYID = 7
12,978,298 UART: [idev] UDS.KEYID = 0
12,981,088 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,124,612 UART: [idev] Erasing UDS.KEYID = 0
15,452,961 UART: [idev] Sha1 KeyId Algorithm
15,475,532 UART: [idev] --
15,480,737 UART: [ldev] ++
15,481,303 UART: [ldev] CDI.KEYID = 6
15,482,190 UART: [ldev] SUBJECT.KEYID = 5
15,483,403 UART: [ldev] AUTHORITY.KEYID = 7
15,484,631 UART: [ldev] FE.KEYID = 1
15,497,657 UART: [ldev] Erasing FE.KEYID = 1
17,972,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,688,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,704,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,720,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,736,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,756,151 UART: [ldev] --
19,760,009 UART: [fwproc] Wait for Commands...
19,761,895 UART: [fwproc] Recv command 0x46574c44
19,764,091 UART: [fwproc] Recv'd Img size: 114168 bytes
23,174,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,246,608 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,315,366 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,632,556 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
3,700,440 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,479,318 >>> mbox cmd response: failed
10,480,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,508 >>> mbox cmd response: failed
10,480,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,481,068 >>> mbox cmd response: failed
Initializing fuses
2,053,283 writing to cptra_bootfsm_go
13,086,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,660,065 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,095 UART:
192,484 UART: Running Caliptra ROM ...
193,616 UART:
193,768 UART: [state] CFI Enabled
264,753 UART: [state] LifecycleState = Unprovisioned
267,104 UART: [state] DebugLocked = No
269,134 UART: [state] WD Timer not started. Device not locked for debugging
274,486 UART: [kat] SHA2-256
464,374 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,138 UART: [kat] ++
475,615 UART: [kat] sha1
488,357 UART: [kat] SHA2-256
491,363 UART: [kat] SHA2-384
497,624 UART: [kat] SHA2-512-ACC
500,207 UART: [kat] ECC-384
2,946,619 UART: [kat] HMAC-384Kdf
2,971,421 UART: [kat] LMS
3,503,224 UART: [kat] --
3,510,352 UART: [cold-reset] ++
3,512,125 UART: [fht] FHT @ 0x50003400
3,524,514 UART: [idev] ++
3,525,192 UART: [idev] CDI.KEYID = 6
3,526,209 UART: [idev] SUBJECT.KEYID = 7
3,527,369 UART: [idev] UDS.KEYID = 0
3,530,459 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,674,152 UART: [idev] Erasing UDS.KEYID = 0
6,031,324 UART: [idev] Sha1 KeyId Algorithm
6,053,062 UART: [idev] --
6,056,734 UART: [ldev] ++
6,057,416 UART: [ldev] CDI.KEYID = 6
6,058,332 UART: [ldev] SUBJECT.KEYID = 5
6,059,549 UART: [ldev] AUTHORITY.KEYID = 7
6,060,684 UART: [ldev] FE.KEYID = 1
6,100,807 UART: [ldev] Erasing FE.KEYID = 1
8,605,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,924 UART: [ldev] --
10,410,772 UART: [fwproc] Wait for Commands...
10,413,077 UART: [fwproc] Recv command 0x46574c44
10,415,407 UART: [fwproc] Recv'd Img size: 114168 bytes
10,519,560 UART: ROM Fatal Error: 0x000B0032
10,523,254 >>> mbox cmd response: failed
10,523,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,955 >>> mbox cmd response: failed
10,524,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,496 >>> mbox cmd response: failed
Initializing fuses
2,055,453 writing to cptra_bootfsm_go
2,244,744 UART:
2,245,091 UART: Running Caliptra ROM ...
2,246,141 UART:
2,246,295 UART: [state] CFI Enabled
2,323,821 UART: [state] LifecycleState = Unprovisioned
2,326,199 UART: [state] DebugLocked = No
2,328,751 UART: [state] WD Timer not started. Device not locked for debugging
2,333,055 UART: [kat] SHA2-256
2,522,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,691 UART: [kat] ++
2,534,155 UART: [kat] sha1
2,546,021 UART: [kat] SHA2-256
2,549,048 UART: [kat] SHA2-384
2,555,101 UART: [kat] SHA2-512-ACC
2,557,672 UART: [kat] ECC-384
5,006,670 UART: [kat] HMAC-384Kdf
5,028,852 UART: [kat] LMS
5,560,650 UART: [kat] --
5,565,016 UART: [cold-reset] ++
5,566,819 UART: [fht] FHT @ 0x50003400
5,578,203 UART: [idev] ++
5,578,883 UART: [idev] CDI.KEYID = 6
5,579,854 UART: [idev] SUBJECT.KEYID = 7
5,581,070 UART: [idev] UDS.KEYID = 0
5,583,608 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,727,707 UART: [idev] Erasing UDS.KEYID = 0
8,089,045 UART: [idev] Sha1 KeyId Algorithm
8,111,753 UART: [idev] --
8,116,616 UART: [ldev] ++
8,117,300 UART: [ldev] CDI.KEYID = 6
8,118,370 UART: [ldev] SUBJECT.KEYID = 5
8,119,478 UART: [ldev] AUTHORITY.KEYID = 7
8,120,658 UART: [ldev] FE.KEYID = 1
8,159,084 UART: [ldev] Erasing FE.KEYID = 1
10,666,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,897 UART: [ldev] --
12,473,004 UART: [fwproc] Wait for Commands...
12,474,573 UART: [fwproc] Recv command 0x46574c44
12,476,894 UART: [fwproc] Recv'd Img size: 114168 bytes
15,916,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,987,833 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,104,016 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,646,261 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,440,535 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,323,820 >>> mbox cmd response: failed
10,324,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,324,877 >>> mbox cmd response: failed
10,325,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,325,489 >>> mbox cmd response: failed
Initializing fuses
2,043,727 writing to cptra_bootfsm_go
5,466,350 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,761,344 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,513 UART:
192,899 UART: Running Caliptra ROM ...
194,052 UART:
603,843 UART: [state] CFI Enabled
615,971 UART: [state] LifecycleState = Unprovisioned
618,353 UART: [state] DebugLocked = No
620,782 UART: [state] WD Timer not started. Device not locked for debugging
625,337 UART: [kat] SHA2-256
815,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,011 UART: [kat] ++
826,525 UART: [kat] sha1
838,213 UART: [kat] SHA2-256
841,225 UART: [kat] SHA2-384
847,372 UART: [kat] SHA2-512-ACC
849,943 UART: [kat] ECC-384
3,293,136 UART: [kat] HMAC-384Kdf
3,306,390 UART: [kat] LMS
3,838,254 UART: [kat] --
3,840,999 UART: [cold-reset] ++
3,842,713 UART: [fht] FHT @ 0x50003400
3,853,215 UART: [idev] ++
3,853,893 UART: [idev] CDI.KEYID = 6
3,854,924 UART: [idev] SUBJECT.KEYID = 7
3,856,032 UART: [idev] UDS.KEYID = 0
3,858,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,002,208 UART: [idev] Erasing UDS.KEYID = 0
6,332,856 UART: [idev] Sha1 KeyId Algorithm
6,355,149 UART: [idev] --
6,359,117 UART: [ldev] ++
6,359,802 UART: [ldev] CDI.KEYID = 6
6,360,715 UART: [ldev] SUBJECT.KEYID = 5
6,361,877 UART: [ldev] AUTHORITY.KEYID = 7
6,363,114 UART: [ldev] FE.KEYID = 1
6,373,953 UART: [ldev] Erasing FE.KEYID = 1
8,848,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,822 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,982 UART: [ldev] --
10,638,139 UART: [fwproc] Wait for Commands...
10,640,569 UART: [fwproc] Recv command 0x46574c44
10,642,840 UART: [fwproc] Recv'd Img size: 114168 bytes
10,749,680 UART: ROM Fatal Error: 0x000B0032
10,753,323 >>> mbox cmd response: failed
10,753,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,754,059 >>> mbox cmd response: failed
10,754,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,754,570 >>> mbox cmd response: failed
Initializing fuses
2,049,288 writing to cptra_bootfsm_go
2,238,661 UART:
2,239,013 UART: Running Caliptra ROM ...
2,240,158 UART:
9,705,715 UART: [state] CFI Enabled
9,719,784 UART: [state] LifecycleState = Unprovisioned
9,722,146 UART: [state] DebugLocked = No
9,723,533 UART: [state] WD Timer not started. Device not locked for debugging
9,727,400 UART: [kat] SHA2-256
9,917,311 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,928,053 UART: [kat] ++
9,928,656 UART: [kat] sha1
9,940,523 UART: [kat] SHA2-256
9,943,546 UART: [kat] SHA2-384
9,949,049 UART: [kat] SHA2-512-ACC
9,951,638 UART: [kat] ECC-384
12,392,124 UART: [kat] HMAC-384Kdf
12,404,703 UART: [kat] LMS
12,936,561 UART: [kat] --
12,940,710 UART: [cold-reset] ++
12,941,668 UART: [fht] FHT @ 0x50003400
12,952,701 UART: [idev] ++
12,953,421 UART: [idev] CDI.KEYID = 6
12,954,334 UART: [idev] SUBJECT.KEYID = 7
12,955,550 UART: [idev] UDS.KEYID = 0
12,958,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,102,080 UART: [idev] Erasing UDS.KEYID = 0
15,430,505 UART: [idev] Sha1 KeyId Algorithm
15,451,535 UART: [idev] --
15,455,799 UART: [ldev] ++
15,456,533 UART: [ldev] CDI.KEYID = 6
15,457,440 UART: [ldev] SUBJECT.KEYID = 5
15,458,599 UART: [ldev] AUTHORITY.KEYID = 7
15,459,847 UART: [ldev] FE.KEYID = 1
15,470,934 UART: [ldev] Erasing FE.KEYID = 1
17,947,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,666,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,681,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,696,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,711,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,733,704 UART: [ldev] --
19,738,479 UART: [fwproc] Wait for Commands...
19,740,899 UART: [fwproc] Recv command 0x46574c44
19,743,161 UART: [fwproc] Recv'd Img size: 114168 bytes
23,188,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,266,863 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,382,994 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,924,489 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,762,253 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,552,133 >>> mbox cmd response: failed
10,552,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,224 >>> mbox cmd response: failed
10,553,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,776 >>> mbox cmd response: failed
Initializing fuses
2,054,353 writing to cptra_bootfsm_go
13,074,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,260,291 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,504 UART: [state] LifecycleState = Unprovisioned
86,159 UART: [state] DebugLocked = No
86,817 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,359 UART: [kat] SHA2-256
882,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,405 UART: [kat] ++
886,557 UART: [kat] sha1
890,627 UART: [kat] SHA2-256
892,565 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,570 UART: [kat] HMAC-384Kdf
907,132 UART: [kat] LMS
1,475,328 UART: [kat] --
1,476,011 UART: [cold-reset] ++
1,476,359 UART: [fht] Storing FHT @ 0x50003400
1,479,228 UART: [idev] ++
1,479,396 UART: [idev] CDI.KEYID = 6
1,479,756 UART: [idev] SUBJECT.KEYID = 7
1,480,180 UART: [idev] UDS.KEYID = 0
1,480,525 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,044 UART: [idev] Erasing UDS.KEYID = 0
1,504,260 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,094 UART: [idev] --
1,514,079 UART: [ldev] ++
1,514,247 UART: [ldev] CDI.KEYID = 6
1,514,610 UART: [ldev] SUBJECT.KEYID = 5
1,515,036 UART: [ldev] AUTHORITY.KEYID = 7
1,515,499 UART: [ldev] FE.KEYID = 1
1,520,755 UART: [ldev] Erasing FE.KEYID = 1
1,545,886 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,888 UART: [ldev] --
1,585,223 UART: [fwproc] Waiting for Commands...
1,585,902 UART: [fwproc] Received command 0x46574c44
1,586,693 UART: [fwproc] Received Image of size 114168 bytes
1,612,897 UART: ROM Fatal Error: 0x000B0032
1,614,054 >>> mbox cmd response: failed
1,614,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,060 >>> mbox cmd response: failed
1,614,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Unprovisioned
85,531 UART: [state] DebugLocked = No
86,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,661 UART: [kat] SHA2-256
881,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,707 UART: [kat] ++
885,859 UART: [kat] sha1
889,931 UART: [kat] SHA2-256
891,869 UART: [kat] SHA2-384
894,402 UART: [kat] SHA2-512-ACC
896,303 UART: [kat] ECC-384
902,002 UART: [kat] HMAC-384Kdf
906,498 UART: [kat] LMS
1,474,694 UART: [kat] --
1,475,357 UART: [cold-reset] ++
1,475,921 UART: [fht] Storing FHT @ 0x50003400
1,478,720 UART: [idev] ++
1,478,888 UART: [idev] CDI.KEYID = 6
1,479,248 UART: [idev] SUBJECT.KEYID = 7
1,479,672 UART: [idev] UDS.KEYID = 0
1,480,017 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,998 UART: [idev] Erasing UDS.KEYID = 0
1,504,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,198 UART: [idev] --
1,514,265 UART: [ldev] ++
1,514,433 UART: [ldev] CDI.KEYID = 6
1,514,796 UART: [ldev] SUBJECT.KEYID = 5
1,515,222 UART: [ldev] AUTHORITY.KEYID = 7
1,515,685 UART: [ldev] FE.KEYID = 1
1,520,779 UART: [ldev] Erasing FE.KEYID = 1
1,546,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,336 UART: [ldev] --
1,585,753 UART: [fwproc] Waiting for Commands...
1,586,548 UART: [fwproc] Received command 0x46574c44
1,587,339 UART: [fwproc] Received Image of size 114168 bytes
2,884,350 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,138 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,490 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,021 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,581 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,466,291 >>> mbox cmd response: failed
1,466,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,297 >>> mbox cmd response: failed
1,466,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,303 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,773 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,823 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
86,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,530 UART: [kat] SHA2-256
882,461 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,576 UART: [kat] ++
886,728 UART: [kat] sha1
890,790 UART: [kat] SHA2-256
892,728 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
903,401 UART: [kat] HMAC-384Kdf
908,107 UART: [kat] LMS
1,476,303 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,630 UART: [fht] Storing FHT @ 0x50003400
1,480,433 UART: [idev] ++
1,480,601 UART: [idev] CDI.KEYID = 6
1,480,961 UART: [idev] SUBJECT.KEYID = 7
1,481,385 UART: [idev] UDS.KEYID = 0
1,481,730 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,531 UART: [idev] Erasing UDS.KEYID = 0
1,506,375 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,159 UART: [idev] --
1,516,152 UART: [ldev] ++
1,516,320 UART: [ldev] CDI.KEYID = 6
1,516,683 UART: [ldev] SUBJECT.KEYID = 5
1,517,109 UART: [ldev] AUTHORITY.KEYID = 7
1,517,572 UART: [ldev] FE.KEYID = 1
1,522,710 UART: [ldev] Erasing FE.KEYID = 1
1,547,477 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,519 UART: [ldev] --
1,587,016 UART: [fwproc] Waiting for Commands...
1,587,861 UART: [fwproc] Received command 0x46574c44
1,588,652 UART: [fwproc] Received Image of size 114168 bytes
1,614,482 UART: ROM Fatal Error: 0x000B0032
1,615,639 >>> mbox cmd response: failed
1,615,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,645 >>> mbox cmd response: failed
1,615,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,008 UART: [kat] SHA2-256
881,939 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,054 UART: [kat] ++
886,206 UART: [kat] sha1
890,528 UART: [kat] SHA2-256
892,466 UART: [kat] SHA2-384
895,243 UART: [kat] SHA2-512-ACC
897,144 UART: [kat] ECC-384
902,503 UART: [kat] HMAC-384Kdf
906,945 UART: [kat] LMS
1,475,141 UART: [kat] --
1,475,916 UART: [cold-reset] ++
1,476,260 UART: [fht] Storing FHT @ 0x50003400
1,478,961 UART: [idev] ++
1,479,129 UART: [idev] CDI.KEYID = 6
1,479,489 UART: [idev] SUBJECT.KEYID = 7
1,479,913 UART: [idev] UDS.KEYID = 0
1,480,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,293 UART: [idev] Erasing UDS.KEYID = 0
1,505,233 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,011 UART: [idev] --
1,515,014 UART: [ldev] ++
1,515,182 UART: [ldev] CDI.KEYID = 6
1,515,545 UART: [ldev] SUBJECT.KEYID = 5
1,515,971 UART: [ldev] AUTHORITY.KEYID = 7
1,516,434 UART: [ldev] FE.KEYID = 1
1,521,722 UART: [ldev] Erasing FE.KEYID = 1
1,547,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,161 UART: [ldev] --
1,586,480 UART: [fwproc] Waiting for Commands...
1,587,145 UART: [fwproc] Received command 0x46574c44
1,587,936 UART: [fwproc] Received Image of size 114168 bytes
2,883,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,147 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,499 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,154 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,468,432 >>> mbox cmd response: failed
1,468,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,438 >>> mbox cmd response: failed
1,468,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,924 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,348 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,687 UART: [kat] SHA2-256
903,627 UART: [kat] SHA2-384
906,458 UART: [kat] SHA2-512-ACC
908,359 UART: [kat] ECC-384
918,594 UART: [kat] HMAC-384Kdf
923,148 UART: [kat] LMS
1,171,476 UART: [kat] --
1,172,259 UART: [cold-reset] ++
1,172,589 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,036 UART: [idev] Erasing UDS.KEYID = 0
1,200,985 UART: [idev] Sha1 KeyId Algorithm
1,209,481 UART: [idev] --
1,210,515 UART: [ldev] ++
1,210,683 UART: [ldev] CDI.KEYID = 6
1,211,046 UART: [ldev] SUBJECT.KEYID = 5
1,211,472 UART: [ldev] AUTHORITY.KEYID = 7
1,211,935 UART: [ldev] FE.KEYID = 1
1,217,137 UART: [ldev] Erasing FE.KEYID = 1
1,243,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,387 UART: [ldev] --
1,282,750 UART: [fwproc] Wait for Commands...
1,283,432 UART: [fwproc] Recv command 0x46574c44
1,284,160 UART: [fwproc] Recv'd Img size: 114168 bytes
1,310,332 UART: ROM Fatal Error: 0x000B0032
1,311,489 >>> mbox cmd response: failed
1,311,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,495 >>> mbox cmd response: failed
1,311,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,442 UART: [state] LifecycleState = Unprovisioned
86,097 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
902,097 UART: [kat] SHA2-256
904,037 UART: [kat] SHA2-384
906,676 UART: [kat] SHA2-512-ACC
908,577 UART: [kat] ECC-384
918,452 UART: [kat] HMAC-384Kdf
923,046 UART: [kat] LMS
1,171,374 UART: [kat] --
1,172,335 UART: [cold-reset] ++
1,172,877 UART: [fht] FHT @ 0x50003400
1,175,662 UART: [idev] ++
1,175,830 UART: [idev] CDI.KEYID = 6
1,176,190 UART: [idev] SUBJECT.KEYID = 7
1,176,614 UART: [idev] UDS.KEYID = 0
1,176,959 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,540 UART: [idev] Erasing UDS.KEYID = 0
1,201,011 UART: [idev] Sha1 KeyId Algorithm
1,209,565 UART: [idev] --
1,210,569 UART: [ldev] ++
1,210,737 UART: [ldev] CDI.KEYID = 6
1,211,100 UART: [ldev] SUBJECT.KEYID = 5
1,211,526 UART: [ldev] AUTHORITY.KEYID = 7
1,211,989 UART: [ldev] FE.KEYID = 1
1,216,875 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,256 UART: [fwproc] Recv command 0x46574c44
1,282,984 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,099 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,744 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,633 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,164,000 >>> mbox cmd response: failed
1,164,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,006 >>> mbox cmd response: failed
1,164,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,161 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
901,838 UART: [kat] SHA2-256
903,778 UART: [kat] SHA2-384
906,623 UART: [kat] SHA2-512-ACC
908,524 UART: [kat] ECC-384
918,423 UART: [kat] HMAC-384Kdf
923,255 UART: [kat] LMS
1,171,583 UART: [kat] --
1,172,342 UART: [cold-reset] ++
1,172,872 UART: [fht] FHT @ 0x50003400
1,175,663 UART: [idev] ++
1,175,831 UART: [idev] CDI.KEYID = 6
1,176,191 UART: [idev] SUBJECT.KEYID = 7
1,176,615 UART: [idev] UDS.KEYID = 0
1,176,960 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,781 UART: [idev] Erasing UDS.KEYID = 0
1,201,538 UART: [idev] Sha1 KeyId Algorithm
1,209,832 UART: [idev] --
1,210,832 UART: [ldev] ++
1,211,000 UART: [ldev] CDI.KEYID = 6
1,211,363 UART: [ldev] SUBJECT.KEYID = 5
1,211,789 UART: [ldev] AUTHORITY.KEYID = 7
1,212,252 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,243,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,410 UART: [ldev] --
1,282,879 UART: [fwproc] Wait for Commands...
1,283,675 UART: [fwproc] Recv command 0x46574c44
1,284,403 UART: [fwproc] Recv'd Img size: 114168 bytes
1,310,157 UART: ROM Fatal Error: 0x000B0032
1,311,314 >>> mbox cmd response: failed
1,311,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,320 >>> mbox cmd response: failed
1,311,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,300 UART: [kat] SHA2-256
904,240 UART: [kat] SHA2-384
907,055 UART: [kat] SHA2-512-ACC
908,956 UART: [kat] ECC-384
918,989 UART: [kat] HMAC-384Kdf
923,779 UART: [kat] LMS
1,172,107 UART: [kat] --
1,172,904 UART: [cold-reset] ++
1,173,440 UART: [fht] FHT @ 0x50003400
1,176,221 UART: [idev] ++
1,176,389 UART: [idev] CDI.KEYID = 6
1,176,749 UART: [idev] SUBJECT.KEYID = 7
1,177,173 UART: [idev] UDS.KEYID = 0
1,177,518 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,257 UART: [idev] Erasing UDS.KEYID = 0
1,202,012 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,412 UART: [ldev] ++
1,211,580 UART: [ldev] CDI.KEYID = 6
1,211,943 UART: [ldev] SUBJECT.KEYID = 5
1,212,369 UART: [ldev] AUTHORITY.KEYID = 7
1,212,832 UART: [ldev] FE.KEYID = 1
1,218,450 UART: [ldev] Erasing FE.KEYID = 1
1,244,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,660 UART: [ldev] --
1,283,951 UART: [fwproc] Wait for Commands...
1,284,589 UART: [fwproc] Recv command 0x46574c44
1,285,317 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,898 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,373 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,906 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,164,591 >>> mbox cmd response: failed
1,164,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,597 >>> mbox cmd response: failed
1,164,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,603 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,366 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,708 UART: [state] LifecycleState = Unprovisioned
86,363 UART: [state] DebugLocked = No
86,951 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
891,638 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,767 UART: [kat] ++
895,919 UART: [kat] sha1
900,227 UART: [kat] SHA2-256
902,167 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
920,978 UART: [kat] LMS
1,169,290 UART: [kat] --
1,170,059 UART: [cold-reset] ++
1,170,433 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
1,174,551 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,603 UART: [idev] Erasing UDS.KEYID = 0
1,199,439 UART: [idev] Sha1 KeyId Algorithm
1,208,273 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,241,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,514 UART: [ldev] --
1,280,852 UART: [fwproc] Wait for Commands...
1,281,519 UART: [fwproc] Recv command 0x46574c44
1,282,252 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,590 UART: ROM Fatal Error: 0x000B0032
1,309,747 >>> mbox cmd response: failed
1,309,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,753 >>> mbox cmd response: failed
1,309,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,637 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,990 UART: [kat] SHA2-512-ACC
906,891 UART: [kat] ECC-384
916,702 UART: [kat] HMAC-384Kdf
921,240 UART: [kat] LMS
1,169,552 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,170,859 UART: [fht] FHT @ 0x50003400
1,173,497 UART: [idev] ++
1,173,665 UART: [idev] CDI.KEYID = 6
1,174,026 UART: [idev] SUBJECT.KEYID = 7
1,174,451 UART: [idev] UDS.KEYID = 0
1,174,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,277 UART: [idev] Erasing UDS.KEYID = 0
1,199,317 UART: [idev] Sha1 KeyId Algorithm
1,208,223 UART: [idev] --
1,209,272 UART: [ldev] ++
1,209,440 UART: [ldev] CDI.KEYID = 6
1,209,804 UART: [ldev] SUBJECT.KEYID = 5
1,210,231 UART: [ldev] AUTHORITY.KEYID = 7
1,210,694 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,241,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,570 UART: [ldev] --
1,280,878 UART: [fwproc] Wait for Commands...
1,281,547 UART: [fwproc] Recv command 0x46574c44
1,282,280 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,471 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,780 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,324 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,682 >>> mbox cmd response: failed
1,160,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,688 >>> mbox cmd response: failed
1,160,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,358 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,830 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,337 UART: [kat] SHA2-256
891,887 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,016 UART: [kat] ++
896,168 UART: [kat] sha1
900,444 UART: [kat] SHA2-256
902,384 UART: [kat] SHA2-384
905,111 UART: [kat] SHA2-512-ACC
907,012 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,458 UART: [fht] FHT @ 0x50003400
1,173,228 UART: [idev] ++
1,173,396 UART: [idev] CDI.KEYID = 6
1,173,757 UART: [idev] SUBJECT.KEYID = 7
1,174,182 UART: [idev] UDS.KEYID = 0
1,174,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,958 UART: [idev] Erasing UDS.KEYID = 0
1,198,812 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,727 UART: [ldev] ++
1,208,895 UART: [ldev] CDI.KEYID = 6
1,209,259 UART: [ldev] SUBJECT.KEYID = 5
1,209,686 UART: [ldev] AUTHORITY.KEYID = 7
1,210,149 UART: [ldev] FE.KEYID = 1
1,215,557 UART: [ldev] Erasing FE.KEYID = 1
1,241,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,587 UART: [ldev] --
1,280,867 UART: [fwproc] Wait for Commands...
1,281,586 UART: [fwproc] Recv command 0x46574c44
1,282,319 UART: [fwproc] Recv'd Img size: 114168 bytes
1,308,191 UART: ROM Fatal Error: 0x000B0032
1,309,348 >>> mbox cmd response: failed
1,309,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,354 >>> mbox cmd response: failed
1,309,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [kat] SHA2-256
891,413 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,542 UART: [kat] ++
895,694 UART: [kat] sha1
900,038 UART: [kat] SHA2-256
901,978 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,305 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,810 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,174,786 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,972 UART: [idev] Sha1 KeyId Algorithm
1,208,928 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,243,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,237 UART: [ldev] --
1,282,513 UART: [fwproc] Wait for Commands...
1,283,162 UART: [fwproc] Recv command 0x46574c44
1,283,895 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,141 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,753 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,153 >>> mbox cmd response: failed
1,162,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,159 >>> mbox cmd response: failed
1,162,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,403 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,931 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,138 UART:
192,498 UART: Running Caliptra ROM ...
193,624 UART:
193,791 UART: [state] CFI Enabled
263,348 UART: [state] LifecycleState = Unprovisioned
265,303 UART: [state] DebugLocked = No
267,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,735 UART: [kat] SHA2-256
441,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,965 UART: [kat] ++
452,454 UART: [kat] sha1
464,035 UART: [kat] SHA2-256
466,726 UART: [kat] SHA2-384
473,027 UART: [kat] SHA2-512-ACC
475,421 UART: [kat] ECC-384
2,766,982 UART: [kat] HMAC-384Kdf
2,779,500 UART: [kat] LMS
3,969,811 UART: [kat] --
3,975,659 UART: [cold-reset] ++
3,977,723 UART: [fht] Storing FHT @ 0x50003400
3,990,232 UART: [idev] ++
3,990,799 UART: [idev] CDI.KEYID = 6
3,991,737 UART: [idev] SUBJECT.KEYID = 7
3,993,005 UART: [idev] UDS.KEYID = 0
3,995,579 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,138,979 UART: [idev] Erasing UDS.KEYID = 0
7,323,622 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,803 UART: [idev] --
7,350,772 UART: [ldev] ++
7,351,341 UART: [ldev] CDI.KEYID = 6
7,352,359 UART: [ldev] SUBJECT.KEYID = 5
7,353,518 UART: [ldev] AUTHORITY.KEYID = 7
7,354,804 UART: [ldev] FE.KEYID = 1
7,401,382 UART: [ldev] Erasing FE.KEYID = 1
10,732,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,429 UART: [ldev] --
13,094,828 UART: [fwproc] Waiting for Commands...
13,096,711 UART: [fwproc] Received command 0x46574c44
13,098,906 UART: [fwproc] Received Image of size 113844 bytes
13,180,326 UART: ROM Fatal Error: 0x00B0003A
13,183,790 >>> mbox cmd response: failed
13,184,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,184,477 >>> mbox cmd response: failed
13,184,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,185,045 >>> mbox cmd response: failed
Initializing fuses
2,055,483 writing to cptra_bootfsm_go
2,244,818 UART:
2,245,166 UART: Running Caliptra ROM ...
2,246,209 UART:
2,246,368 UART: [state] CFI Enabled
2,312,668 UART: [state] LifecycleState = Unprovisioned
2,314,622 UART: [state] DebugLocked = No
2,315,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,895 UART: [kat] SHA2-256
2,490,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,114 UART: [kat] ++
2,501,655 UART: [kat] sha1
2,512,877 UART: [kat] SHA2-256
2,515,552 UART: [kat] SHA2-384
2,521,471 UART: [kat] SHA2-512-ACC
2,523,881 UART: [kat] ECC-384
4,816,923 UART: [kat] HMAC-384Kdf
4,848,353 UART: [kat] LMS
6,038,620 UART: [kat] --
6,042,775 UART: [cold-reset] ++
6,044,707 UART: [fht] Storing FHT @ 0x50003400
6,056,038 UART: [idev] ++
6,056,608 UART: [idev] CDI.KEYID = 6
6,057,626 UART: [idev] SUBJECT.KEYID = 7
6,058,789 UART: [idev] UDS.KEYID = 0
6,061,474 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,204,796 UART: [idev] Erasing UDS.KEYID = 0
9,391,563 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,815 UART: [idev] --
9,417,700 UART: [ldev] ++
9,418,286 UART: [ldev] CDI.KEYID = 6
9,419,252 UART: [ldev] SUBJECT.KEYID = 5
9,420,458 UART: [ldev] AUTHORITY.KEYID = 7
9,421,702 UART: [ldev] FE.KEYID = 1
9,449,576 UART: [ldev] Erasing FE.KEYID = 1
12,782,148 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,074,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,089,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,104,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,118,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,138,526 UART: [ldev] --
15,143,737 UART: [fwproc] Waiting for Commands...
15,145,889 UART: [fwproc] Received command 0x46574c44
15,148,075 UART: [fwproc] Received Image of size 113844 bytes
19,201,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,274,625 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,343,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,659,277 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,809,466 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,962,752 >>> mbox cmd response: failed
12,963,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,963,638 >>> mbox cmd response: failed
12,963,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,964,243 >>> mbox cmd response: failed
Initializing fuses
2,046,550 writing to cptra_bootfsm_go
5,840,947 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,896,692 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,580 UART:
192,949 UART: Running Caliptra ROM ...
194,085 UART:
603,718 UART: [state] CFI Enabled
617,945 UART: [state] LifecycleState = Unprovisioned
619,917 UART: [state] DebugLocked = No
621,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,245 UART: [kat] SHA2-256
796,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,537 UART: [kat] ++
807,013 UART: [kat] sha1
818,383 UART: [kat] SHA2-256
821,071 UART: [kat] SHA2-384
827,382 UART: [kat] SHA2-512-ACC
829,722 UART: [kat] ECC-384
3,112,749 UART: [kat] HMAC-384Kdf
3,124,989 UART: [kat] LMS
4,315,141 UART: [kat] --
4,317,749 UART: [cold-reset] ++
4,319,361 UART: [fht] Storing FHT @ 0x50003400
4,330,198 UART: [idev] ++
4,330,777 UART: [idev] CDI.KEYID = 6
4,331,721 UART: [idev] SUBJECT.KEYID = 7
4,332,987 UART: [idev] UDS.KEYID = 0
4,335,881 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,479,099 UART: [idev] Erasing UDS.KEYID = 0
7,618,150 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,988 UART: [idev] --
7,645,522 UART: [ldev] ++
7,646,092 UART: [ldev] CDI.KEYID = 6
7,647,178 UART: [ldev] SUBJECT.KEYID = 5
7,648,302 UART: [ldev] AUTHORITY.KEYID = 7
7,649,549 UART: [ldev] FE.KEYID = 1
7,658,927 UART: [ldev] Erasing FE.KEYID = 1
10,950,131 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,960 UART: [ldev] --
13,312,008 UART: [fwproc] Waiting for Commands...
13,314,435 UART: [fwproc] Received command 0x46574c44
13,316,620 UART: [fwproc] Received Image of size 113844 bytes
13,399,093 UART: ROM Fatal Error: 0x00B0003A
13,402,567 >>> mbox cmd response: failed
13,402,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,403,300 >>> mbox cmd response: failed
13,403,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,403,862 >>> mbox cmd response: failed
Initializing fuses
2,053,255 writing to cptra_bootfsm_go
2,242,581 UART:
2,242,937 UART: Running Caliptra ROM ...
2,243,981 UART:
7,065,155 UART: [state] CFI Enabled
7,078,164 UART: [state] LifecycleState = Unprovisioned
7,080,089 UART: [state] DebugLocked = No
7,081,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,087,034 UART: [kat] SHA2-256
7,256,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,267,305 UART: [kat] ++
7,267,798 UART: [kat] sha1
7,279,174 UART: [kat] SHA2-256
7,281,873 UART: [kat] SHA2-384
7,288,602 UART: [kat] SHA2-512-ACC
7,290,965 UART: [kat] ECC-384
9,576,056 UART: [kat] HMAC-384Kdf
9,587,046 UART: [kat] LMS
10,777,147 UART: [kat] --
10,781,477 UART: [cold-reset] ++
10,783,458 UART: [fht] Storing FHT @ 0x50003400
10,795,909 UART: [idev] ++
10,796,468 UART: [idev] CDI.KEYID = 6
10,797,404 UART: [idev] SUBJECT.KEYID = 7
10,798,664 UART: [idev] UDS.KEYID = 0
10,801,457 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,944,596 UART: [idev] Erasing UDS.KEYID = 0
14,081,266 UART: [idev] Using Sha1 for KeyId Algorithm
14,102,901 UART: [idev] --
14,105,594 UART: [ldev] ++
14,106,162 UART: [ldev] CDI.KEYID = 6
14,107,287 UART: [ldev] SUBJECT.KEYID = 5
14,108,548 UART: [ldev] AUTHORITY.KEYID = 7
14,109,732 UART: [ldev] FE.KEYID = 1
14,120,815 UART: [ldev] Erasing FE.KEYID = 1
17,409,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,701,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,715,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,730,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,745,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,763,882 UART: [ldev] --
19,769,293 UART: [fwproc] Waiting for Commands...
19,771,887 UART: [fwproc] Received command 0x46574c44
19,774,071 UART: [fwproc] Received Image of size 113844 bytes
23,825,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,895,356 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,964,228 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,280,252 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,134,209 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,155,058 >>> mbox cmd response: failed
13,155,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,155,957 >>> mbox cmd response: failed
13,156,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,156,513 >>> mbox cmd response: failed
Initializing fuses
2,047,941 writing to cptra_bootfsm_go
10,842,493 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,780,486 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,247 UART:
192,616 UART: Running Caliptra ROM ...
193,756 UART:
193,903 UART: [state] CFI Enabled
262,486 UART: [state] LifecycleState = Unprovisioned
264,423 UART: [state] DebugLocked = No
266,458 UART: [state] WD Timer not started. Device not locked for debugging
269,755 UART: [kat] SHA2-256
448,889 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,488 UART: [kat] ++
461,021 UART: [kat] sha1
472,180 UART: [kat] SHA2-256
475,186 UART: [kat] SHA2-384
482,457 UART: [kat] SHA2-512-ACC
485,387 UART: [kat] ECC-384
2,945,343 UART: [kat] HMAC-384Kdf
2,970,658 UART: [kat] LMS
3,500,139 UART: [kat] --
3,506,892 UART: [cold-reset] ++
3,509,368 UART: [fht] FHT @ 0x50003400
3,520,568 UART: [idev] ++
3,521,155 UART: [idev] CDI.KEYID = 6
3,522,067 UART: [idev] SUBJECT.KEYID = 7
3,523,290 UART: [idev] UDS.KEYID = 0
3,526,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,017 UART: [idev] Erasing UDS.KEYID = 0
6,023,990 UART: [idev] Sha1 KeyId Algorithm
6,046,304 UART: [idev] --
6,050,304 UART: [ldev] ++
6,050,875 UART: [ldev] CDI.KEYID = 6
6,051,788 UART: [ldev] SUBJECT.KEYID = 5
6,053,008 UART: [ldev] AUTHORITY.KEYID = 7
6,054,250 UART: [ldev] FE.KEYID = 1
6,099,417 UART: [ldev] Erasing FE.KEYID = 1
8,601,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,671 UART: [ldev] --
10,413,089 UART: [fwproc] Wait for Commands...
10,416,316 UART: [fwproc] Recv command 0x46574c44
10,418,366 UART: [fwproc] Recv'd Img size: 114168 bytes
10,500,551 UART: ROM Fatal Error: 0x00B0003A
10,503,635 >>> mbox cmd response: failed
10,504,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,504,368 >>> mbox cmd response: failed
10,504,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,504,924 >>> mbox cmd response: failed
Initializing fuses
2,052,983 writing to cptra_bootfsm_go
2,242,317 UART:
2,242,669 UART: Running Caliptra ROM ...
2,243,762 UART:
2,243,919 UART: [state] CFI Enabled
2,300,356 UART: [state] LifecycleState = Unprovisioned
2,302,204 UART: [state] DebugLocked = No
2,305,102 UART: [state] WD Timer not started. Device not locked for debugging
2,308,093 UART: [kat] SHA2-256
2,487,168 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,730 UART: [kat] ++
2,499,273 UART: [kat] sha1
2,509,900 UART: [kat] SHA2-256
2,512,913 UART: [kat] SHA2-384
2,517,819 UART: [kat] SHA2-512-ACC
2,520,762 UART: [kat] ECC-384
4,984,558 UART: [kat] HMAC-384Kdf
5,008,749 UART: [kat] LMS
5,538,200 UART: [kat] --
5,541,490 UART: [cold-reset] ++
5,543,688 UART: [fht] FHT @ 0x50003400
5,555,534 UART: [idev] ++
5,556,102 UART: [idev] CDI.KEYID = 6
5,557,010 UART: [idev] SUBJECT.KEYID = 7
5,558,231 UART: [idev] UDS.KEYID = 0
5,560,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,704,661 UART: [idev] Erasing UDS.KEYID = 0
8,059,480 UART: [idev] Sha1 KeyId Algorithm
8,083,091 UART: [idev] --
8,087,988 UART: [ldev] ++
8,088,569 UART: [ldev] CDI.KEYID = 6
8,089,482 UART: [ldev] SUBJECT.KEYID = 5
8,090,665 UART: [ldev] AUTHORITY.KEYID = 7
8,091,951 UART: [ldev] FE.KEYID = 1
8,137,368 UART: [ldev] Erasing FE.KEYID = 1
10,641,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,377,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,946 UART: [ldev] --
12,450,507 UART: [fwproc] Wait for Commands...
12,452,548 UART: [fwproc] Recv command 0x46574c44
12,454,585 UART: [fwproc] Recv'd Img size: 114168 bytes
15,860,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,932,582 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,001,340 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,319,411 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,386,570 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,281,731 >>> mbox cmd response: failed
10,282,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,282,840 >>> mbox cmd response: failed
10,283,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,283,404 >>> mbox cmd response: failed
Initializing fuses
2,050,152 writing to cptra_bootfsm_go
5,427,864 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,110,548 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,457 UART:
192,848 UART: Running Caliptra ROM ...
194,036 UART:
603,444 UART: [state] CFI Enabled
619,176 UART: [state] LifecycleState = Unprovisioned
621,010 UART: [state] DebugLocked = No
622,610 UART: [state] WD Timer not started. Device not locked for debugging
625,473 UART: [kat] SHA2-256
804,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,130 UART: [kat] ++
816,675 UART: [kat] sha1
827,775 UART: [kat] SHA2-256
830,840 UART: [kat] SHA2-384
837,191 UART: [kat] SHA2-512-ACC
840,122 UART: [kat] ECC-384
3,280,027 UART: [kat] HMAC-384Kdf
3,291,302 UART: [kat] LMS
3,820,785 UART: [kat] --
3,825,211 UART: [cold-reset] ++
3,826,098 UART: [fht] FHT @ 0x50003400
3,836,603 UART: [idev] ++
3,837,185 UART: [idev] CDI.KEYID = 6
3,838,069 UART: [idev] SUBJECT.KEYID = 7
3,839,286 UART: [idev] UDS.KEYID = 0
3,842,280 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,939 UART: [idev] Erasing UDS.KEYID = 0
6,314,516 UART: [idev] Sha1 KeyId Algorithm
6,337,094 UART: [idev] --
6,341,035 UART: [ldev] ++
6,341,607 UART: [ldev] CDI.KEYID = 6
6,342,491 UART: [ldev] SUBJECT.KEYID = 5
6,343,704 UART: [ldev] AUTHORITY.KEYID = 7
6,344,991 UART: [ldev] FE.KEYID = 1
6,354,494 UART: [ldev] Erasing FE.KEYID = 1
8,827,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,576,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,620 UART: [ldev] --
10,617,368 UART: [fwproc] Wait for Commands...
10,619,465 UART: [fwproc] Recv command 0x46574c44
10,621,507 UART: [fwproc] Recv'd Img size: 114168 bytes
10,699,318 UART: ROM Fatal Error: 0x00B0003A
10,702,409 >>> mbox cmd response: failed
10,702,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,703,070 >>> mbox cmd response: failed
10,703,372 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,703,664 >>> mbox cmd response: failed
Initializing fuses
2,053,410 writing to cptra_bootfsm_go
2,242,761 UART:
2,243,110 UART: Running Caliptra ROM ...
2,244,571 UART:
9,753,861 UART: [state] CFI Enabled
9,771,316 UART: [state] LifecycleState = Unprovisioned
9,773,203 UART: [state] DebugLocked = No
9,775,112 UART: [state] WD Timer not started. Device not locked for debugging
9,778,857 UART: [kat] SHA2-256
9,958,022 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,969,550 UART: [kat] ++
9,970,100 UART: [kat] sha1
9,982,153 UART: [kat] SHA2-256
9,985,174 UART: [kat] SHA2-384
9,989,989 UART: [kat] SHA2-512-ACC
9,992,932 UART: [kat] ECC-384
12,434,966 UART: [kat] HMAC-384Kdf
12,448,642 UART: [kat] LMS
12,978,163 UART: [kat] --
12,983,601 UART: [cold-reset] ++
12,985,918 UART: [fht] FHT @ 0x50003400
12,997,104 UART: [idev] ++
12,997,663 UART: [idev] CDI.KEYID = 6
12,998,576 UART: [idev] SUBJECT.KEYID = 7
12,999,791 UART: [idev] UDS.KEYID = 0
13,002,517 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,145,979 UART: [idev] Erasing UDS.KEYID = 0
15,470,044 UART: [idev] Sha1 KeyId Algorithm
15,493,397 UART: [idev] --
15,496,850 UART: [ldev] ++
15,497,416 UART: [ldev] CDI.KEYID = 6
15,498,295 UART: [ldev] SUBJECT.KEYID = 5
15,499,509 UART: [ldev] AUTHORITY.KEYID = 7
15,500,744 UART: [ldev] FE.KEYID = 1
15,511,206 UART: [ldev] Erasing FE.KEYID = 1
17,985,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,704,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,720,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,736,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,751,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,771,956 UART: [ldev] --
19,775,828 UART: [fwproc] Wait for Commands...
19,779,062 UART: [fwproc] Recv command 0x46574c44
19,781,108 UART: [fwproc] Recv'd Img size: 114168 bytes
23,184,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,254,079 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,322,881 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,639,400 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,695,956 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,484,821 >>> mbox cmd response: failed
10,485,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,485,971 >>> mbox cmd response: failed
10,486,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,486,584 >>> mbox cmd response: failed
Initializing fuses
2,047,430 writing to cptra_bootfsm_go
13,079,487 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,642,803 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,110 UART:
192,474 UART: Running Caliptra ROM ...
193,575 UART:
193,716 UART: [state] CFI Enabled
260,915 UART: [state] LifecycleState = Unprovisioned
263,655 UART: [state] DebugLocked = No
265,875 UART: [state] WD Timer not started. Device not locked for debugging
270,431 UART: [kat] SHA2-256
460,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,093 UART: [kat] ++
471,543 UART: [kat] sha1
483,666 UART: [kat] SHA2-256
486,680 UART: [kat] SHA2-384
491,856 UART: [kat] SHA2-512-ACC
494,420 UART: [kat] ECC-384
2,946,302 UART: [kat] HMAC-384Kdf
2,971,387 UART: [kat] LMS
3,503,195 UART: [kat] --
3,509,307 UART: [cold-reset] ++
3,510,596 UART: [fht] FHT @ 0x50003400
3,523,256 UART: [idev] ++
3,523,939 UART: [idev] CDI.KEYID = 6
3,524,922 UART: [idev] SUBJECT.KEYID = 7
3,526,026 UART: [idev] UDS.KEYID = 0
3,528,793 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,576 UART: [idev] Erasing UDS.KEYID = 0
6,027,195 UART: [idev] Sha1 KeyId Algorithm
6,049,358 UART: [idev] --
6,053,678 UART: [ldev] ++
6,054,367 UART: [ldev] CDI.KEYID = 6
6,055,256 UART: [ldev] SUBJECT.KEYID = 5
6,056,499 UART: [ldev] AUTHORITY.KEYID = 7
6,057,686 UART: [ldev] FE.KEYID = 1
6,098,719 UART: [ldev] Erasing FE.KEYID = 1
8,605,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,171 UART: [ldev] --
10,410,517 UART: [fwproc] Wait for Commands...
10,413,748 UART: [fwproc] Recv command 0x46574c44
10,416,011 UART: [fwproc] Recv'd Img size: 114168 bytes
10,526,736 UART: ROM Fatal Error: 0x00B0003A
10,530,386 >>> mbox cmd response: failed
10,530,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,530,961 >>> mbox cmd response: failed
10,531,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,531,543 >>> mbox cmd response: failed
Initializing fuses
2,055,874 writing to cptra_bootfsm_go
2,245,216 UART:
2,245,557 UART: Running Caliptra ROM ...
2,246,806 UART:
2,246,972 UART: [state] CFI Enabled
2,312,514 UART: [state] LifecycleState = Unprovisioned
2,314,890 UART: [state] DebugLocked = No
2,317,261 UART: [state] WD Timer not started. Device not locked for debugging
2,322,656 UART: [kat] SHA2-256
2,512,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,332 UART: [kat] ++
2,523,840 UART: [kat] sha1
2,536,255 UART: [kat] SHA2-256
2,539,268 UART: [kat] SHA2-384
2,546,348 UART: [kat] SHA2-512-ACC
2,548,923 UART: [kat] ECC-384
4,997,768 UART: [kat] HMAC-384Kdf
5,022,776 UART: [kat] LMS
5,554,546 UART: [kat] --
5,558,279 UART: [cold-reset] ++
5,559,839 UART: [fht] FHT @ 0x50003400
5,571,847 UART: [idev] ++
5,572,573 UART: [idev] CDI.KEYID = 6
5,573,492 UART: [idev] SUBJECT.KEYID = 7
5,574,597 UART: [idev] UDS.KEYID = 0
5,577,604 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,721,212 UART: [idev] Erasing UDS.KEYID = 0
8,081,283 UART: [idev] Sha1 KeyId Algorithm
8,103,609 UART: [idev] --
8,109,493 UART: [ldev] ++
8,110,180 UART: [ldev] CDI.KEYID = 6
8,111,068 UART: [ldev] SUBJECT.KEYID = 5
8,112,173 UART: [ldev] AUTHORITY.KEYID = 7
8,113,463 UART: [ldev] FE.KEYID = 1
8,142,773 UART: [ldev] Erasing FE.KEYID = 1
10,651,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,051 UART: [ldev] --
12,456,220 UART: [fwproc] Wait for Commands...
12,457,892 UART: [fwproc] Recv command 0x46574c44
12,460,229 UART: [fwproc] Recv'd Img size: 114168 bytes
15,912,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,845 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,111,025 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,653,345 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,439,111 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,345,989 >>> mbox cmd response: failed
10,346,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,007 >>> mbox cmd response: failed
10,347,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,570 >>> mbox cmd response: failed
Initializing fuses
2,055,843 writing to cptra_bootfsm_go
5,486,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,757,976 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,532 UART:
192,907 UART: Running Caliptra ROM ...
194,116 UART:
603,707 UART: [state] CFI Enabled
619,193 UART: [state] LifecycleState = Unprovisioned
621,574 UART: [state] DebugLocked = No
623,222 UART: [state] WD Timer not started. Device not locked for debugging
627,599 UART: [kat] SHA2-256
817,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,247 UART: [kat] ++
828,837 UART: [kat] sha1
840,214 UART: [kat] SHA2-256
843,213 UART: [kat] SHA2-384
848,607 UART: [kat] SHA2-512-ACC
851,221 UART: [kat] ECC-384
3,293,075 UART: [kat] HMAC-384Kdf
3,305,419 UART: [kat] LMS
3,837,250 UART: [kat] --
3,842,826 UART: [cold-reset] ++
3,845,086 UART: [fht] FHT @ 0x50003400
3,857,645 UART: [idev] ++
3,858,324 UART: [idev] CDI.KEYID = 6
3,859,338 UART: [idev] SUBJECT.KEYID = 7
3,860,500 UART: [idev] UDS.KEYID = 0
3,863,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,006,806 UART: [idev] Erasing UDS.KEYID = 0
6,338,352 UART: [idev] Sha1 KeyId Algorithm
6,360,945 UART: [idev] --
6,365,998 UART: [ldev] ++
6,366,691 UART: [ldev] CDI.KEYID = 6
6,367,602 UART: [ldev] SUBJECT.KEYID = 5
6,368,764 UART: [ldev] AUTHORITY.KEYID = 7
6,370,001 UART: [ldev] FE.KEYID = 1
6,380,548 UART: [ldev] Erasing FE.KEYID = 1
8,856,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,507 UART: [ldev] --
10,645,394 UART: [fwproc] Wait for Commands...
10,647,057 UART: [fwproc] Recv command 0x46574c44
10,649,380 UART: [fwproc] Recv'd Img size: 114168 bytes
10,752,427 UART: ROM Fatal Error: 0x00B0003A
10,756,059 >>> mbox cmd response: failed
10,756,388 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,756,701 >>> mbox cmd response: failed
10,756,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,757,273 >>> mbox cmd response: failed
Initializing fuses
2,054,284 writing to cptra_bootfsm_go
2,243,633 UART:
2,243,985 UART: Running Caliptra ROM ...
2,245,124 UART:
9,702,125 UART: [state] CFI Enabled
9,717,255 UART: [state] LifecycleState = Unprovisioned
9,719,619 UART: [state] DebugLocked = No
9,722,306 UART: [state] WD Timer not started. Device not locked for debugging
9,726,770 UART: [kat] SHA2-256
9,916,659 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,927,434 UART: [kat] ++
9,928,036 UART: [kat] sha1
9,939,041 UART: [kat] SHA2-256
9,942,078 UART: [kat] SHA2-384
9,947,696 UART: [kat] SHA2-512-ACC
9,950,318 UART: [kat] ECC-384
12,391,612 UART: [kat] HMAC-384Kdf
12,404,220 UART: [kat] LMS
12,936,009 UART: [kat] --
12,939,081 UART: [cold-reset] ++
12,940,691 UART: [fht] FHT @ 0x50003400
12,951,889 UART: [idev] ++
12,952,617 UART: [idev] CDI.KEYID = 6
12,953,583 UART: [idev] SUBJECT.KEYID = 7
12,954,740 UART: [idev] UDS.KEYID = 0
12,957,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,100,807 UART: [idev] Erasing UDS.KEYID = 0
15,430,416 UART: [idev] Sha1 KeyId Algorithm
15,451,535 UART: [idev] --
15,455,577 UART: [ldev] ++
15,456,320 UART: [ldev] CDI.KEYID = 6
15,457,227 UART: [ldev] SUBJECT.KEYID = 5
15,458,437 UART: [ldev] AUTHORITY.KEYID = 7
15,459,589 UART: [ldev] FE.KEYID = 1
15,469,863 UART: [ldev] Erasing FE.KEYID = 1
17,948,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,667,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,683,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,698,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,713,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,735,533 UART: [ldev] --
19,741,449 UART: [fwproc] Wait for Commands...
19,744,249 UART: [fwproc] Recv command 0x46574c44
19,746,515 UART: [fwproc] Recv'd Img size: 114168 bytes
23,198,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,274,577 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,390,714 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,932,316 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,754,799 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,551,158 >>> mbox cmd response: failed
10,551,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,552,050 >>> mbox cmd response: failed
10,552,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,552,642 >>> mbox cmd response: failed
Initializing fuses
2,048,633 writing to cptra_bootfsm_go
13,077,504 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,277,930 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,163 UART: [kat] SHA2-256
882,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,209 UART: [kat] ++
886,361 UART: [kat] sha1
890,591 UART: [kat] SHA2-256
892,529 UART: [kat] SHA2-384
895,114 UART: [kat] SHA2-512-ACC
897,015 UART: [kat] ECC-384
902,402 UART: [kat] HMAC-384Kdf
907,014 UART: [kat] LMS
1,475,210 UART: [kat] --
1,475,963 UART: [cold-reset] ++
1,476,293 UART: [fht] Storing FHT @ 0x50003400
1,479,262 UART: [idev] ++
1,479,430 UART: [idev] CDI.KEYID = 6
1,479,790 UART: [idev] SUBJECT.KEYID = 7
1,480,214 UART: [idev] UDS.KEYID = 0
1,480,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,048 UART: [idev] Erasing UDS.KEYID = 0
1,504,400 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,008 UART: [idev] --
1,513,949 UART: [ldev] ++
1,514,117 UART: [ldev] CDI.KEYID = 6
1,514,480 UART: [ldev] SUBJECT.KEYID = 5
1,514,906 UART: [ldev] AUTHORITY.KEYID = 7
1,515,369 UART: [ldev] FE.KEYID = 1
1,520,373 UART: [ldev] Erasing FE.KEYID = 1
1,546,072 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,730 UART: [ldev] --
1,585,209 UART: [fwproc] Waiting for Commands...
1,585,976 UART: [fwproc] Received command 0x46574c44
1,586,767 UART: [fwproc] Received Image of size 114168 bytes
1,612,672 UART: ROM Fatal Error: 0x00B0003A
1,613,833 >>> mbox cmd response: failed
1,613,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,839 >>> mbox cmd response: failed
1,613,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,845 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,375 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,989 UART: [kat] SHA2-256
881,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,035 UART: [kat] ++
886,187 UART: [kat] sha1
890,497 UART: [kat] SHA2-256
892,435 UART: [kat] SHA2-384
895,232 UART: [kat] SHA2-512-ACC
897,133 UART: [kat] ECC-384
902,798 UART: [kat] HMAC-384Kdf
907,546 UART: [kat] LMS
1,475,742 UART: [kat] --
1,476,759 UART: [cold-reset] ++
1,477,273 UART: [fht] Storing FHT @ 0x50003400
1,479,914 UART: [idev] ++
1,480,082 UART: [idev] CDI.KEYID = 6
1,480,442 UART: [idev] SUBJECT.KEYID = 7
1,480,866 UART: [idev] UDS.KEYID = 0
1,481,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,505,204 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,688 UART: [idev] --
1,514,835 UART: [ldev] ++
1,515,003 UART: [ldev] CDI.KEYID = 6
1,515,366 UART: [ldev] SUBJECT.KEYID = 5
1,515,792 UART: [ldev] AUTHORITY.KEYID = 7
1,516,255 UART: [ldev] FE.KEYID = 1
1,521,345 UART: [ldev] Erasing FE.KEYID = 1
1,546,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,660 UART: [ldev] --
1,586,115 UART: [fwproc] Waiting for Commands...
1,586,774 UART: [fwproc] Received command 0x46574c44
1,587,565 UART: [fwproc] Received Image of size 114168 bytes
2,884,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,610 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,701 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,466,244 >>> mbox cmd response: failed
1,466,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,250 >>> mbox cmd response: failed
1,466,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,917 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,584 UART: [kat] SHA2-256
892,522 UART: [kat] SHA2-384
895,341 UART: [kat] SHA2-512-ACC
897,242 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,673 UART: [kat] LMS
1,475,869 UART: [kat] --
1,476,644 UART: [cold-reset] ++
1,477,208 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,019 UART: [idev] Erasing UDS.KEYID = 0
1,505,589 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,215 UART: [idev] --
1,515,404 UART: [ldev] ++
1,515,572 UART: [ldev] CDI.KEYID = 6
1,515,935 UART: [ldev] SUBJECT.KEYID = 5
1,516,361 UART: [ldev] AUTHORITY.KEYID = 7
1,516,824 UART: [ldev] FE.KEYID = 1
1,522,296 UART: [ldev] Erasing FE.KEYID = 1
1,547,923 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,015 UART: [ldev] --
1,587,512 UART: [fwproc] Waiting for Commands...
1,588,201 UART: [fwproc] Received command 0x46574c44
1,588,992 UART: [fwproc] Received Image of size 114168 bytes
1,614,615 UART: ROM Fatal Error: 0x00B0003A
1,615,776 >>> mbox cmd response: failed
1,615,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,782 >>> mbox cmd response: failed
1,615,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,615,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,789 UART: [kat] SHA2-512-ACC
897,690 UART: [kat] ECC-384
903,593 UART: [kat] HMAC-384Kdf
908,201 UART: [kat] LMS
1,476,397 UART: [kat] --
1,477,218 UART: [cold-reset] ++
1,477,600 UART: [fht] Storing FHT @ 0x50003400
1,480,447 UART: [idev] ++
1,480,615 UART: [idev] CDI.KEYID = 6
1,480,975 UART: [idev] SUBJECT.KEYID = 7
1,481,399 UART: [idev] UDS.KEYID = 0
1,481,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,675 UART: [idev] Erasing UDS.KEYID = 0
1,506,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,699 UART: [idev] --
1,515,778 UART: [ldev] ++
1,515,946 UART: [ldev] CDI.KEYID = 6
1,516,309 UART: [ldev] SUBJECT.KEYID = 5
1,516,735 UART: [ldev] AUTHORITY.KEYID = 7
1,517,198 UART: [ldev] FE.KEYID = 1
1,522,362 UART: [ldev] Erasing FE.KEYID = 1
1,547,319 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,567 UART: [ldev] --
1,587,060 UART: [fwproc] Waiting for Commands...
1,587,903 UART: [fwproc] Received command 0x46574c44
1,588,694 UART: [fwproc] Received Image of size 114168 bytes
2,884,249 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,297 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,260 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,572 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,469,551 >>> mbox cmd response: failed
1,469,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,557 >>> mbox cmd response: failed
1,469,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,469,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,778 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,676 UART: [kat] SHA2-256
893,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,451 UART: [kat] ++
897,603 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,544 UART: [kat] SHA2-512-ACC
908,445 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,570 UART: [kat] LMS
1,170,898 UART: [kat] --
1,171,787 UART: [cold-reset] ++
1,172,281 UART: [fht] FHT @ 0x50003400
1,174,928 UART: [idev] ++
1,175,096 UART: [idev] CDI.KEYID = 6
1,175,456 UART: [idev] SUBJECT.KEYID = 7
1,175,880 UART: [idev] UDS.KEYID = 0
1,176,225 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,914 UART: [idev] Erasing UDS.KEYID = 0
1,201,321 UART: [idev] Sha1 KeyId Algorithm
1,209,959 UART: [idev] --
1,210,807 UART: [ldev] ++
1,210,975 UART: [ldev] CDI.KEYID = 6
1,211,338 UART: [ldev] SUBJECT.KEYID = 5
1,211,764 UART: [ldev] AUTHORITY.KEYID = 7
1,212,227 UART: [ldev] FE.KEYID = 1
1,217,535 UART: [ldev] Erasing FE.KEYID = 1
1,243,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,481 UART: [ldev] --
1,282,898 UART: [fwproc] Wait for Commands...
1,283,700 UART: [fwproc] Recv command 0x46574c44
1,284,428 UART: [fwproc] Recv'd Img size: 114168 bytes
1,310,363 UART: ROM Fatal Error: 0x00B0003A
1,311,524 >>> mbox cmd response: failed
1,311,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,530 >>> mbox cmd response: failed
1,311,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,536 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,505 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
901,781 UART: [kat] SHA2-256
903,721 UART: [kat] SHA2-384
906,548 UART: [kat] SHA2-512-ACC
908,449 UART: [kat] ECC-384
917,896 UART: [kat] HMAC-384Kdf
922,708 UART: [kat] LMS
1,171,036 UART: [kat] --
1,172,019 UART: [cold-reset] ++
1,172,437 UART: [fht] FHT @ 0x50003400
1,175,196 UART: [idev] ++
1,175,364 UART: [idev] CDI.KEYID = 6
1,175,724 UART: [idev] SUBJECT.KEYID = 7
1,176,148 UART: [idev] UDS.KEYID = 0
1,176,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,150 UART: [idev] Erasing UDS.KEYID = 0
1,200,897 UART: [idev] Sha1 KeyId Algorithm
1,209,461 UART: [idev] --
1,210,675 UART: [ldev] ++
1,210,843 UART: [ldev] CDI.KEYID = 6
1,211,206 UART: [ldev] SUBJECT.KEYID = 5
1,211,632 UART: [ldev] AUTHORITY.KEYID = 7
1,212,095 UART: [ldev] FE.KEYID = 1
1,217,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,867 UART: [ldev] --
1,283,264 UART: [fwproc] Wait for Commands...
1,283,894 UART: [fwproc] Recv command 0x46574c44
1,284,622 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,929 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,233 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,916 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,165,753 >>> mbox cmd response: failed
1,165,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,759 >>> mbox cmd response: failed
1,165,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,573 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,875 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,081 UART: [state] LifecycleState = Unprovisioned
86,736 UART: [state] DebugLocked = No
87,362 UART: [state] WD Timer not started. Device not locked for debugging
88,583 UART: [kat] SHA2-256
894,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,358 UART: [kat] ++
898,510 UART: [kat] sha1
902,598 UART: [kat] SHA2-256
904,538 UART: [kat] SHA2-384
907,231 UART: [kat] SHA2-512-ACC
909,132 UART: [kat] ECC-384
918,899 UART: [kat] HMAC-384Kdf
923,425 UART: [kat] LMS
1,171,753 UART: [kat] --
1,172,676 UART: [cold-reset] ++
1,173,134 UART: [fht] FHT @ 0x50003400
1,175,891 UART: [idev] ++
1,176,059 UART: [idev] CDI.KEYID = 6
1,176,419 UART: [idev] SUBJECT.KEYID = 7
1,176,843 UART: [idev] UDS.KEYID = 0
1,177,188 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,819 UART: [idev] Erasing UDS.KEYID = 0
1,202,088 UART: [idev] Sha1 KeyId Algorithm
1,210,632 UART: [idev] --
1,211,606 UART: [ldev] ++
1,211,774 UART: [ldev] CDI.KEYID = 6
1,212,137 UART: [ldev] SUBJECT.KEYID = 5
1,212,563 UART: [ldev] AUTHORITY.KEYID = 7
1,213,026 UART: [ldev] FE.KEYID = 1
1,218,290 UART: [ldev] Erasing FE.KEYID = 1
1,244,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,026 UART: [ldev] --
1,284,337 UART: [fwproc] Wait for Commands...
1,284,993 UART: [fwproc] Recv command 0x46574c44
1,285,721 UART: [fwproc] Recv'd Img size: 114168 bytes
1,312,562 UART: ROM Fatal Error: 0x00B0003A
1,313,723 >>> mbox cmd response: failed
1,313,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,729 >>> mbox cmd response: failed
1,313,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,086 UART: [kat] SHA2-256
904,026 UART: [kat] SHA2-384
906,791 UART: [kat] SHA2-512-ACC
908,692 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
922,913 UART: [kat] LMS
1,171,241 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,522 UART: [fht] FHT @ 0x50003400
1,175,093 UART: [idev] ++
1,175,261 UART: [idev] CDI.KEYID = 6
1,175,621 UART: [idev] SUBJECT.KEYID = 7
1,176,045 UART: [idev] UDS.KEYID = 0
1,176,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,127 UART: [idev] Erasing UDS.KEYID = 0
1,201,196 UART: [idev] Sha1 KeyId Algorithm
1,209,630 UART: [idev] --
1,210,500 UART: [ldev] ++
1,210,668 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,457 UART: [ldev] AUTHORITY.KEYID = 7
1,211,920 UART: [ldev] FE.KEYID = 1
1,217,272 UART: [ldev] Erasing FE.KEYID = 1
1,243,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,324 UART: [ldev] --
1,282,713 UART: [fwproc] Wait for Commands...
1,283,429 UART: [fwproc] Recv command 0x46574c44
1,284,157 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,146 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,450 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,937 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,166,662 >>> mbox cmd response: failed
1,166,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,668 >>> mbox cmd response: failed
1,166,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,306 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,130 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,201 UART: [kat] ++
895,353 UART: [kat] sha1
899,539 UART: [kat] SHA2-256
901,479 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,326 UART: [kat] LMS
1,168,638 UART: [kat] --
1,169,545 UART: [cold-reset] ++
1,170,061 UART: [fht] FHT @ 0x50003400
1,172,515 UART: [idev] ++
1,172,683 UART: [idev] CDI.KEYID = 6
1,173,044 UART: [idev] SUBJECT.KEYID = 7
1,173,469 UART: [idev] UDS.KEYID = 0
1,173,815 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,501 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,904 UART: [ldev] ++
1,209,072 UART: [ldev] CDI.KEYID = 6
1,209,436 UART: [ldev] SUBJECT.KEYID = 5
1,209,863 UART: [ldev] AUTHORITY.KEYID = 7
1,210,326 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,242,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,374 UART: [ldev] --
1,281,790 UART: [fwproc] Wait for Commands...
1,282,425 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,039 UART: ROM Fatal Error: 0x00B0003A
1,310,200 >>> mbox cmd response: failed
1,310,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,206 >>> mbox cmd response: failed
1,310,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
85,863 UART: [state] WD Timer not started. Device not locked for debugging
86,996 UART: [kat] SHA2-256
890,546 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,675 UART: [kat] ++
894,827 UART: [kat] sha1
898,963 UART: [kat] SHA2-256
900,903 UART: [kat] SHA2-384
903,850 UART: [kat] SHA2-512-ACC
905,751 UART: [kat] ECC-384
915,502 UART: [kat] HMAC-384Kdf
920,220 UART: [kat] LMS
1,168,532 UART: [kat] --
1,169,617 UART: [cold-reset] ++
1,170,079 UART: [fht] FHT @ 0x50003400
1,172,839 UART: [idev] ++
1,173,007 UART: [idev] CDI.KEYID = 6
1,173,368 UART: [idev] SUBJECT.KEYID = 7
1,173,793 UART: [idev] UDS.KEYID = 0
1,174,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,351 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,587 UART: [idev] --
1,208,668 UART: [ldev] ++
1,208,836 UART: [ldev] CDI.KEYID = 6
1,209,200 UART: [ldev] SUBJECT.KEYID = 5
1,209,627 UART: [ldev] AUTHORITY.KEYID = 7
1,210,090 UART: [ldev] FE.KEYID = 1
1,215,250 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,388 UART: [ldev] --
1,280,732 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,009 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,318 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,994 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,558 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,161,899 >>> mbox cmd response: failed
1,161,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,905 >>> mbox cmd response: failed
1,161,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,422 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,148 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,519 UART: [kat] SHA2-256
891,069 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,049 UART: [kat] SHA2-512-ACC
905,950 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,390 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,174,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,634 UART: [idev] --
1,209,637 UART: [ldev] ++
1,209,805 UART: [ldev] CDI.KEYID = 6
1,210,169 UART: [ldev] SUBJECT.KEYID = 5
1,210,596 UART: [ldev] AUTHORITY.KEYID = 7
1,211,059 UART: [ldev] FE.KEYID = 1
1,216,029 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,061 UART: [ldev] --
1,281,349 UART: [fwproc] Wait for Commands...
1,282,098 UART: [fwproc] Recv command 0x46574c44
1,282,831 UART: [fwproc] Recv'd Img size: 114168 bytes
1,309,152 UART: ROM Fatal Error: 0x00B0003A
1,310,313 >>> mbox cmd response: failed
1,310,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,319 >>> mbox cmd response: failed
1,310,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,325 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,834 UART: [kat] ++
895,986 UART: [kat] sha1
900,386 UART: [kat] SHA2-256
902,326 UART: [kat] SHA2-384
905,001 UART: [kat] SHA2-512-ACC
906,902 UART: [kat] ECC-384
917,007 UART: [kat] HMAC-384Kdf
921,481 UART: [kat] LMS
1,169,793 UART: [kat] --
1,170,682 UART: [cold-reset] ++
1,171,092 UART: [fht] FHT @ 0x50003400
1,173,818 UART: [idev] ++
1,173,986 UART: [idev] CDI.KEYID = 6
1,174,347 UART: [idev] SUBJECT.KEYID = 7
1,174,772 UART: [idev] UDS.KEYID = 0
1,175,118 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,222 UART: [idev] Erasing UDS.KEYID = 0
1,200,624 UART: [idev] Sha1 KeyId Algorithm
1,209,574 UART: [idev] --
1,210,549 UART: [ldev] ++
1,210,717 UART: [ldev] CDI.KEYID = 6
1,211,081 UART: [ldev] SUBJECT.KEYID = 5
1,211,508 UART: [ldev] AUTHORITY.KEYID = 7
1,211,971 UART: [ldev] FE.KEYID = 1
1,216,831 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,431 UART: [ldev] --
1,282,735 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,283 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,779 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,479 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,997 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,162,384 >>> mbox cmd response: failed
1,162,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,390 >>> mbox cmd response: failed
1,162,390 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,093 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,213 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,180 UART:
192,544 UART: Running Caliptra ROM ...
193,679 UART:
193,828 UART: [state] CFI Enabled
260,859 UART: [state] LifecycleState = Unprovisioned
262,814 UART: [state] DebugLocked = No
264,789 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,343 UART: [kat] SHA2-256
439,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,579 UART: [kat] ++
450,079 UART: [kat] sha1
460,852 UART: [kat] SHA2-256
463,548 UART: [kat] SHA2-384
469,908 UART: [kat] SHA2-512-ACC
472,243 UART: [kat] ECC-384
2,766,738 UART: [kat] HMAC-384Kdf
2,778,166 UART: [kat] LMS
3,968,454 UART: [kat] --
3,973,167 UART: [cold-reset] ++
3,974,503 UART: [fht] Storing FHT @ 0x50003400
3,986,317 UART: [idev] ++
3,986,938 UART: [idev] CDI.KEYID = 6
3,987,817 UART: [idev] SUBJECT.KEYID = 7
3,989,085 UART: [idev] UDS.KEYID = 0
3,991,789 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,135,181 UART: [idev] Erasing UDS.KEYID = 0
7,326,510 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,332 UART: [idev] --
7,352,703 UART: [ldev] ++
7,353,271 UART: [ldev] CDI.KEYID = 6
7,354,286 UART: [ldev] SUBJECT.KEYID = 5
7,355,448 UART: [ldev] AUTHORITY.KEYID = 7
7,356,681 UART: [ldev] FE.KEYID = 1
7,402,894 UART: [ldev] Erasing FE.KEYID = 1
10,734,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,391 UART: [ldev] --
13,096,398 UART: [fwproc] Waiting for Commands...
13,099,251 UART: [fwproc] Received command 0x46574c44
13,101,460 UART: [fwproc] Received Image of size 113844 bytes
17,180,873 UART: ROM Fatal Error: 0x000B0033
17,184,326 >>> mbox cmd response: failed
17,184,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,185,111 >>> mbox cmd response: failed
17,185,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,185,672 >>> mbox cmd response: failed
Initializing fuses
2,049,838 writing to cptra_bootfsm_go
2,239,138 UART:
2,239,478 UART: Running Caliptra ROM ...
2,240,524 UART:
2,240,675 UART: [state] CFI Enabled
2,298,627 UART: [state] LifecycleState = Unprovisioned
2,300,562 UART: [state] DebugLocked = No
2,302,038 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,306,944 UART: [kat] SHA2-256
2,476,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,487,159 UART: [kat] ++
2,487,646 UART: [kat] sha1
2,497,510 UART: [kat] SHA2-256
2,500,255 UART: [kat] SHA2-384
2,504,509 UART: [kat] SHA2-512-ACC
2,506,922 UART: [kat] ECC-384
4,804,405 UART: [kat] HMAC-384Kdf
4,834,295 UART: [kat] LMS
6,024,565 UART: [kat] --
6,029,659 UART: [cold-reset] ++
6,031,761 UART: [fht] Storing FHT @ 0x50003400
6,043,369 UART: [idev] ++
6,043,937 UART: [idev] CDI.KEYID = 6
6,044,873 UART: [idev] SUBJECT.KEYID = 7
6,046,143 UART: [idev] UDS.KEYID = 0
6,048,765 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,192,076 UART: [idev] Erasing UDS.KEYID = 0
9,381,527 UART: [idev] Using Sha1 for KeyId Algorithm
9,402,961 UART: [idev] --
9,407,121 UART: [ldev] ++
9,407,690 UART: [ldev] CDI.KEYID = 6
9,408,629 UART: [ldev] SUBJECT.KEYID = 5
9,409,879 UART: [ldev] AUTHORITY.KEYID = 7
9,411,036 UART: [ldev] FE.KEYID = 1
9,456,690 UART: [ldev] Erasing FE.KEYID = 1
12,788,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,099,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,114,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,586 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,148,450 UART: [ldev] --
15,153,599 UART: [fwproc] Waiting for Commands...
15,156,723 UART: [fwproc] Received command 0x46574c44
15,158,912 UART: [fwproc] Received Image of size 113844 bytes
19,201,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,275,086 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,344,001 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,659,805 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,808,278 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,358,946 >>> mbox cmd response: failed
16,359,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,359,893 >>> mbox cmd response: failed
16,360,168 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,360,461 >>> mbox cmd response: failed
Initializing fuses
2,044,471 writing to cptra_bootfsm_go
5,813,787 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,875,477 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,418 UART:
192,779 UART: Running Caliptra ROM ...
193,971 UART:
603,542 UART: [state] CFI Enabled
618,928 UART: [state] LifecycleState = Unprovisioned
620,852 UART: [state] DebugLocked = No
623,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,285 UART: [kat] SHA2-256
799,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,583 UART: [kat] ++
810,025 UART: [kat] sha1
821,715 UART: [kat] SHA2-256
824,383 UART: [kat] SHA2-384
829,449 UART: [kat] SHA2-512-ACC
831,810 UART: [kat] ECC-384
3,114,070 UART: [kat] HMAC-384Kdf
3,125,847 UART: [kat] LMS
4,315,954 UART: [kat] --
4,321,807 UART: [cold-reset] ++
4,323,638 UART: [fht] Storing FHT @ 0x50003400
4,336,640 UART: [idev] ++
4,337,303 UART: [idev] CDI.KEYID = 6
4,338,234 UART: [idev] SUBJECT.KEYID = 7
4,339,451 UART: [idev] UDS.KEYID = 0
4,342,834 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,485,907 UART: [idev] Erasing UDS.KEYID = 0
7,631,406 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,127 UART: [idev] --
7,657,286 UART: [ldev] ++
7,657,855 UART: [ldev] CDI.KEYID = 6
7,658,843 UART: [ldev] SUBJECT.KEYID = 5
7,660,056 UART: [ldev] AUTHORITY.KEYID = 7
7,661,290 UART: [ldev] FE.KEYID = 1
7,674,908 UART: [ldev] Erasing FE.KEYID = 1
10,959,720 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,971 UART: [ldev] --
13,321,699 UART: [fwproc] Waiting for Commands...
13,323,956 UART: [fwproc] Received command 0x46574c44
13,326,193 UART: [fwproc] Received Image of size 113844 bytes
17,169,389 UART: ROM Fatal Error: 0x000B0033
17,172,815 >>> mbox cmd response: failed
17,173,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,173,628 >>> mbox cmd response: failed
17,173,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,174,201 >>> mbox cmd response: failed
Initializing fuses
2,048,174 writing to cptra_bootfsm_go
2,237,505 UART:
2,237,861 UART: Running Caliptra ROM ...
2,238,999 UART:
3,292,212 UART: [state] CFI Enabled
3,305,719 UART: [state] LifecycleState = Unprovisioned
3,307,626 UART: [state] DebugLocked = No
3,310,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,314,715 UART: [kat] SHA2-256
3,484,497 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,495,008 UART: [kat] ++
3,495,475 UART: [kat] sha1
3,507,278 UART: [kat] SHA2-256
3,509,973 UART: [kat] SHA2-384
3,516,609 UART: [kat] SHA2-512-ACC
3,518,954 UART: [kat] ECC-384
5,803,639 UART: [kat] HMAC-384Kdf
5,814,464 UART: [kat] LMS
7,004,568 UART: [kat] --
7,009,828 UART: [cold-reset] ++
7,012,039 UART: [fht] Storing FHT @ 0x50003400
7,023,364 UART: [idev] ++
7,023,939 UART: [idev] CDI.KEYID = 6
7,024,852 UART: [idev] SUBJECT.KEYID = 7
7,026,128 UART: [idev] UDS.KEYID = 0
7,028,797 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
7,172,319 UART: [idev] Erasing UDS.KEYID = 0
10,311,722 UART: [idev] Using Sha1 for KeyId Algorithm
10,333,258 UART: [idev] --
10,337,629 UART: [ldev] ++
10,338,195 UART: [ldev] CDI.KEYID = 6
10,339,133 UART: [ldev] SUBJECT.KEYID = 5
10,340,391 UART: [ldev] AUTHORITY.KEYID = 7
10,341,545 UART: [ldev] FE.KEYID = 1
10,352,324 UART: [ldev] Erasing FE.KEYID = 1
13,637,742 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,930,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,945,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,959,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,974,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,993,434 UART: [ldev] --
15,997,422 UART: [fwproc] Waiting for Commands...
15,999,259 UART: [fwproc] Received command 0x46574c44
16,001,453 UART: [fwproc] Received Image of size 113844 bytes
20,048,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,121,358 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,190,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,506,972 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,128,929 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
16,773,712 >>> mbox cmd response: failed
16,774,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,774,617 >>> mbox cmd response: failed
16,774,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,775,203 >>> mbox cmd response: failed
Initializing fuses
2,047,393 writing to cptra_bootfsm_go
7,213,510 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
21,143,074 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,036 UART:
192,430 UART: Running Caliptra ROM ...
193,615 UART:
193,772 UART: [state] CFI Enabled
260,906 UART: [state] LifecycleState = Unprovisioned
262,827 UART: [state] DebugLocked = No
264,319 UART: [state] WD Timer not started. Device not locked for debugging
267,233 UART: [kat] SHA2-256
446,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,930 UART: [kat] ++
458,463 UART: [kat] sha1
470,697 UART: [kat] SHA2-256
473,709 UART: [kat] SHA2-384
480,817 UART: [kat] SHA2-512-ACC
483,803 UART: [kat] ECC-384
2,945,207 UART: [kat] HMAC-384Kdf
2,970,768 UART: [kat] LMS
3,500,178 UART: [kat] --
3,504,350 UART: [cold-reset] ++
3,506,667 UART: [fht] FHT @ 0x50003400
3,518,087 UART: [idev] ++
3,518,664 UART: [idev] CDI.KEYID = 6
3,519,577 UART: [idev] SUBJECT.KEYID = 7
3,520,740 UART: [idev] UDS.KEYID = 0
3,523,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,445 UART: [idev] Erasing UDS.KEYID = 0
6,024,157 UART: [idev] Sha1 KeyId Algorithm
6,046,477 UART: [idev] --
6,050,316 UART: [ldev] ++
6,050,890 UART: [ldev] CDI.KEYID = 6
6,051,808 UART: [ldev] SUBJECT.KEYID = 5
6,052,973 UART: [ldev] AUTHORITY.KEYID = 7
6,054,267 UART: [ldev] FE.KEYID = 1
6,097,998 UART: [ldev] Erasing FE.KEYID = 1
8,598,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,317,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,333,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,349,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,385,918 UART: [ldev] --
10,391,351 UART: [fwproc] Wait for Commands...
10,394,474 UART: [fwproc] Recv command 0x46574c44
10,396,567 UART: [fwproc] Recv'd Img size: 114168 bytes
12,050,509 UART: ROM Fatal Error: 0x000B0033
12,053,585 >>> mbox cmd response: failed
12,054,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,054,381 >>> mbox cmd response: failed
12,054,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,055,058 >>> mbox cmd response: failed
Initializing fuses
2,057,249 writing to cptra_bootfsm_go
2,246,551 UART:
2,246,900 UART: Running Caliptra ROM ...
2,248,034 UART:
2,248,200 UART: [state] CFI Enabled
2,316,865 UART: [state] LifecycleState = Unprovisioned
2,318,692 UART: [state] DebugLocked = No
2,321,336 UART: [state] WD Timer not started. Device not locked for debugging
2,325,362 UART: [kat] SHA2-256
2,504,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,516,053 UART: [kat] ++
2,516,515 UART: [kat] sha1
2,528,286 UART: [kat] SHA2-256
2,531,347 UART: [kat] SHA2-384
2,537,452 UART: [kat] SHA2-512-ACC
2,540,399 UART: [kat] ECC-384
5,000,349 UART: [kat] HMAC-384Kdf
5,023,288 UART: [kat] LMS
5,552,721 UART: [kat] --
5,557,642 UART: [cold-reset] ++
5,560,037 UART: [fht] FHT @ 0x50003400
5,570,870 UART: [idev] ++
5,571,445 UART: [idev] CDI.KEYID = 6
5,572,328 UART: [idev] SUBJECT.KEYID = 7
5,573,541 UART: [idev] UDS.KEYID = 0
5,576,109 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,719,841 UART: [idev] Erasing UDS.KEYID = 0
8,077,299 UART: [idev] Sha1 KeyId Algorithm
8,100,500 UART: [idev] --
8,104,233 UART: [ldev] ++
8,104,808 UART: [ldev] CDI.KEYID = 6
8,105,690 UART: [ldev] SUBJECT.KEYID = 5
8,106,906 UART: [ldev] AUTHORITY.KEYID = 7
8,108,137 UART: [ldev] FE.KEYID = 1
8,152,085 UART: [ldev] Erasing FE.KEYID = 1
10,658,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,079 UART: [ldev] --
12,466,023 UART: [fwproc] Wait for Commands...
12,468,835 UART: [fwproc] Recv command 0x46574c44
12,470,930 UART: [fwproc] Recv'd Img size: 114168 bytes
15,875,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,946,507 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,015,253 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,332,235 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,363,034 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,767,248 >>> mbox cmd response: failed
11,768,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,768,357 >>> mbox cmd response: failed
11,768,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,768,926 >>> mbox cmd response: failed
Initializing fuses
2,044,464 writing to cptra_bootfsm_go
5,412,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,116,075 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,659 UART:
193,010 UART: Running Caliptra ROM ...
194,189 UART:
603,696 UART: [state] CFI Enabled
617,831 UART: [state] LifecycleState = Unprovisioned
619,712 UART: [state] DebugLocked = No
621,105 UART: [state] WD Timer not started. Device not locked for debugging
624,891 UART: [kat] SHA2-256
804,004 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,607 UART: [kat] ++
816,153 UART: [kat] sha1
826,227 UART: [kat] SHA2-256
829,280 UART: [kat] SHA2-384
835,307 UART: [kat] SHA2-512-ACC
838,237 UART: [kat] ECC-384
3,279,739 UART: [kat] HMAC-384Kdf
3,292,491 UART: [kat] LMS
3,821,967 UART: [kat] --
3,824,669 UART: [cold-reset] ++
3,826,066 UART: [fht] FHT @ 0x50003400
3,836,856 UART: [idev] ++
3,837,425 UART: [idev] CDI.KEYID = 6
3,838,340 UART: [idev] SUBJECT.KEYID = 7
3,839,556 UART: [idev] UDS.KEYID = 0
3,842,450 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,986,042 UART: [idev] Erasing UDS.KEYID = 0
6,307,028 UART: [idev] Sha1 KeyId Algorithm
6,328,807 UART: [idev] --
6,333,074 UART: [ldev] ++
6,333,648 UART: [ldev] CDI.KEYID = 6
6,334,559 UART: [ldev] SUBJECT.KEYID = 5
6,335,774 UART: [ldev] AUTHORITY.KEYID = 7
6,337,005 UART: [ldev] FE.KEYID = 1
6,345,418 UART: [ldev] Erasing FE.KEYID = 1
8,815,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,532,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,548,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,563,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,579,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,599,842 UART: [ldev] --
10,603,705 UART: [fwproc] Wait for Commands...
10,605,800 UART: [fwproc] Recv command 0x46574c44
10,607,897 UART: [fwproc] Recv'd Img size: 114168 bytes
12,265,836 UART: ROM Fatal Error: 0x000B0033
12,268,932 >>> mbox cmd response: failed
12,269,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,269,694 >>> mbox cmd response: failed
12,269,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,270,254 >>> mbox cmd response: failed
Initializing fuses
2,054,160 writing to cptra_bootfsm_go
2,243,476 UART:
2,243,820 UART: Running Caliptra ROM ...
2,244,872 UART:
8,183,044 UART: [state] CFI Enabled
8,197,709 UART: [state] LifecycleState = Unprovisioned
8,199,597 UART: [state] DebugLocked = No
8,201,644 UART: [state] WD Timer not started. Device not locked for debugging
8,205,985 UART: [kat] SHA2-256
8,385,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
8,396,659 UART: [kat] ++
8,397,201 UART: [kat] sha1
8,409,718 UART: [kat] SHA2-256
8,412,730 UART: [kat] SHA2-384
8,419,744 UART: [kat] SHA2-512-ACC
8,422,715 UART: [kat] ECC-384
10,864,656 UART: [kat] HMAC-384Kdf
10,877,914 UART: [kat] LMS
11,407,436 UART: [kat] --
11,410,455 UART: [cold-reset] ++
11,411,303 UART: [fht] FHT @ 0x50003400
11,421,898 UART: [idev] ++
11,422,466 UART: [idev] CDI.KEYID = 6
11,423,480 UART: [idev] SUBJECT.KEYID = 7
11,424,581 UART: [idev] UDS.KEYID = 0
11,427,430 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,570,947 UART: [idev] Erasing UDS.KEYID = 0
13,899,914 UART: [idev] Sha1 KeyId Algorithm
13,922,522 UART: [idev] --
13,926,247 UART: [ldev] ++
13,926,817 UART: [ldev] CDI.KEYID = 6
13,927,744 UART: [ldev] SUBJECT.KEYID = 5
13,928,908 UART: [ldev] AUTHORITY.KEYID = 7
13,930,139 UART: [ldev] FE.KEYID = 1
13,943,271 UART: [ldev] Erasing FE.KEYID = 1
16,415,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,134,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,150,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,166,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,181,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,201,542 UART: [ldev] --
18,207,036 UART: [fwproc] Wait for Commands...
18,209,944 UART: [fwproc] Recv command 0x46574c44
18,211,985 UART: [fwproc] Recv'd Img size: 114168 bytes
21,619,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,694,498 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,763,255 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,079,991 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
3,702,910 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,974,579 >>> mbox cmd response: failed
11,975,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,975,504 >>> mbox cmd response: failed
11,975,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,976,076 >>> mbox cmd response: failed
Initializing fuses
2,046,342 writing to cptra_bootfsm_go
11,584,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,152,854 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
192,362 UART:
192,740 UART: Running Caliptra ROM ...
193,892 UART:
194,042 UART: [state] CFI Enabled
264,958 UART: [state] LifecycleState = Unprovisioned
267,384 UART: [state] DebugLocked = No
269,685 UART: [state] WD Timer not started. Device not locked for debugging
273,702 UART: [kat] SHA2-256
463,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,363 UART: [kat] ++
474,842 UART: [kat] sha1
486,535 UART: [kat] SHA2-256
489,556 UART: [kat] SHA2-384
494,155 UART: [kat] SHA2-512-ACC
496,726 UART: [kat] ECC-384
2,949,201 UART: [kat] HMAC-384Kdf
2,972,511 UART: [kat] LMS
3,504,294 UART: [kat] --
3,508,891 UART: [cold-reset] ++
3,510,173 UART: [fht] FHT @ 0x50003400
3,521,369 UART: [idev] ++
3,522,042 UART: [idev] CDI.KEYID = 6
3,523,063 UART: [idev] SUBJECT.KEYID = 7
3,524,222 UART: [idev] UDS.KEYID = 0
3,527,005 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,817 UART: [idev] Erasing UDS.KEYID = 0
6,030,117 UART: [idev] Sha1 KeyId Algorithm
6,052,934 UART: [idev] --
6,058,285 UART: [ldev] ++
6,058,988 UART: [ldev] CDI.KEYID = 6
6,059,910 UART: [ldev] SUBJECT.KEYID = 5
6,061,075 UART: [ldev] AUTHORITY.KEYID = 7
6,062,252 UART: [ldev] FE.KEYID = 1
6,101,100 UART: [ldev] Erasing FE.KEYID = 1
8,604,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,453 UART: [ldev] --
10,415,743 UART: [fwproc] Wait for Commands...
10,418,922 UART: [fwproc] Recv command 0x46574c44
10,421,186 UART: [fwproc] Recv'd Img size: 114168 bytes
12,114,333 UART: ROM Fatal Error: 0x000B0033
12,117,781 >>> mbox cmd response: failed
12,118,207 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,118,539 >>> mbox cmd response: failed
12,118,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,119,104 >>> mbox cmd response: failed
Initializing fuses
2,047,889 writing to cptra_bootfsm_go
2,237,234 UART:
2,237,586 UART: Running Caliptra ROM ...
2,238,635 UART:
2,238,787 UART: [state] CFI Enabled
2,310,149 UART: [state] LifecycleState = Unprovisioned
2,312,533 UART: [state] DebugLocked = No
2,314,060 UART: [state] WD Timer not started. Device not locked for debugging
2,318,334 UART: [kat] SHA2-256
2,508,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,519,001 UART: [kat] ++
2,519,465 UART: [kat] sha1
2,531,542 UART: [kat] SHA2-256
2,534,569 UART: [kat] SHA2-384
2,540,404 UART: [kat] SHA2-512-ACC
2,543,030 UART: [kat] ECC-384
4,995,906 UART: [kat] HMAC-384Kdf
5,018,942 UART: [kat] LMS
5,550,727 UART: [kat] --
5,554,341 UART: [cold-reset] ++
5,555,682 UART: [fht] FHT @ 0x50003400
5,567,901 UART: [idev] ++
5,568,578 UART: [idev] CDI.KEYID = 6
5,569,545 UART: [idev] SUBJECT.KEYID = 7
5,570,778 UART: [idev] UDS.KEYID = 0
5,573,426 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,717,143 UART: [idev] Erasing UDS.KEYID = 0
8,076,476 UART: [idev] Sha1 KeyId Algorithm
8,099,911 UART: [idev] --
8,104,673 UART: [ldev] ++
8,105,360 UART: [ldev] CDI.KEYID = 6
8,106,437 UART: [ldev] SUBJECT.KEYID = 5
8,107,547 UART: [ldev] AUTHORITY.KEYID = 7
8,108,724 UART: [ldev] FE.KEYID = 1
8,149,153 UART: [ldev] Erasing FE.KEYID = 1
10,658,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,437,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,454 UART: [ldev] --
12,464,890 UART: [fwproc] Wait for Commands...
12,466,755 UART: [fwproc] Recv command 0x46574c44
12,469,025 UART: [fwproc] Recv'd Img size: 114168 bytes
15,918,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,996,056 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,112,239 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,653,352 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,440,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,870,254 >>> mbox cmd response: failed
11,870,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,871,252 >>> mbox cmd response: failed
11,871,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,871,889 >>> mbox cmd response: failed
Initializing fuses
2,045,367 writing to cptra_bootfsm_go
5,474,960 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,742,300 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,540 UART:
192,910 UART: Running Caliptra ROM ...
194,108 UART:
603,722 UART: [state] CFI Enabled
615,207 UART: [state] LifecycleState = Unprovisioned
617,589 UART: [state] DebugLocked = No
620,371 UART: [state] WD Timer not started. Device not locked for debugging
625,780 UART: [kat] SHA2-256
815,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,464 UART: [kat] ++
827,170 UART: [kat] sha1
837,374 UART: [kat] SHA2-256
840,427 UART: [kat] SHA2-384
846,142 UART: [kat] SHA2-512-ACC
848,755 UART: [kat] ECC-384
3,290,712 UART: [kat] HMAC-384Kdf
3,303,108 UART: [kat] LMS
3,834,936 UART: [kat] --
3,836,871 UART: [cold-reset] ++
3,839,071 UART: [fht] FHT @ 0x50003400
3,851,299 UART: [idev] ++
3,851,977 UART: [idev] CDI.KEYID = 6
3,852,915 UART: [idev] SUBJECT.KEYID = 7
3,854,127 UART: [idev] UDS.KEYID = 0
3,856,764 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,357 UART: [idev] Erasing UDS.KEYID = 0
6,326,094 UART: [idev] Sha1 KeyId Algorithm
6,348,058 UART: [idev] --
6,351,522 UART: [ldev] ++
6,352,204 UART: [ldev] CDI.KEYID = 6
6,353,221 UART: [ldev] SUBJECT.KEYID = 5
6,354,320 UART: [ldev] AUTHORITY.KEYID = 7
6,355,551 UART: [ldev] FE.KEYID = 1
6,366,589 UART: [ldev] Erasing FE.KEYID = 1
8,845,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,628,283 UART: [ldev] --
10,633,498 UART: [fwproc] Wait for Commands...
10,635,487 UART: [fwproc] Recv command 0x46574c44
10,637,806 UART: [fwproc] Recv'd Img size: 114168 bytes
12,323,773 UART: ROM Fatal Error: 0x000B0033
12,327,225 >>> mbox cmd response: failed
12,327,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,327,882 >>> mbox cmd response: failed
12,328,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,328,481 >>> mbox cmd response: failed
Initializing fuses
2,052,065 writing to cptra_bootfsm_go
2,241,366 UART:
2,241,708 UART: Running Caliptra ROM ...
2,242,757 UART:
8,128,111 UART: [state] CFI Enabled
8,143,772 UART: [state] LifecycleState = Unprovisioned
8,146,157 UART: [state] DebugLocked = No
8,148,358 UART: [state] WD Timer not started. Device not locked for debugging
8,152,985 UART: [kat] SHA2-256
8,342,867 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,353,639 UART: [kat] ++
8,354,244 UART: [kat] sha1
8,365,526 UART: [kat] SHA2-256
8,368,544 UART: [kat] SHA2-384
8,374,105 UART: [kat] SHA2-512-ACC
8,376,685 UART: [kat] ECC-384
10,819,182 UART: [kat] HMAC-384Kdf
10,831,942 UART: [kat] LMS
11,363,770 UART: [kat] --
11,370,527 UART: [cold-reset] ++
11,371,972 UART: [fht] FHT @ 0x50003400
11,384,847 UART: [idev] ++
11,385,540 UART: [idev] CDI.KEYID = 6
11,386,560 UART: [idev] SUBJECT.KEYID = 7
11,387,852 UART: [idev] UDS.KEYID = 0
11,390,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,534,375 UART: [idev] Erasing UDS.KEYID = 0
13,866,212 UART: [idev] Sha1 KeyId Algorithm
13,887,626 UART: [idev] --
13,892,007 UART: [ldev] ++
13,892,696 UART: [ldev] CDI.KEYID = 6
13,893,580 UART: [ldev] SUBJECT.KEYID = 5
13,894,791 UART: [ldev] AUTHORITY.KEYID = 7
13,896,021 UART: [ldev] FE.KEYID = 1
13,906,621 UART: [ldev] Erasing FE.KEYID = 1
16,385,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,103,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,118,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,133,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,148,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,168,208 UART: [ldev] --
18,174,339 UART: [fwproc] Wait for Commands...
18,176,491 UART: [fwproc] Recv command 0x46574c44
18,178,752 UART: [fwproc] Recv'd Img size: 114168 bytes
21,617,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,694,270 UART: [fwproc] Load FMC at address 0x40000000 len 18800
21,810,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
22,351,178 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,761,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,102,383 >>> mbox cmd response: failed
12,102,923 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,103,261 >>> mbox cmd response: failed
12,103,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,103,820 >>> mbox cmd response: failed
Initializing fuses
2,057,801 writing to cptra_bootfsm_go
11,528,096 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,727,911 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,851 UART: [kat] SHA2-256
881,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,897 UART: [kat] ++
886,049 UART: [kat] sha1
890,247 UART: [kat] SHA2-256
892,185 UART: [kat] SHA2-384
894,944 UART: [kat] SHA2-512-ACC
896,845 UART: [kat] ECC-384
902,542 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,476,081 UART: [cold-reset] ++
1,476,469 UART: [fht] Storing FHT @ 0x50003400
1,479,482 UART: [idev] ++
1,479,650 UART: [idev] CDI.KEYID = 6
1,480,010 UART: [idev] SUBJECT.KEYID = 7
1,480,434 UART: [idev] UDS.KEYID = 0
1,480,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,308 UART: [idev] Erasing UDS.KEYID = 0
1,505,042 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,728 UART: [idev] --
1,514,745 UART: [ldev] ++
1,514,913 UART: [ldev] CDI.KEYID = 6
1,515,276 UART: [ldev] SUBJECT.KEYID = 5
1,515,702 UART: [ldev] AUTHORITY.KEYID = 7
1,516,165 UART: [ldev] FE.KEYID = 1
1,521,337 UART: [ldev] Erasing FE.KEYID = 1
1,546,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,848 UART: [ldev] --
1,586,359 UART: [fwproc] Waiting for Commands...
1,587,136 UART: [fwproc] Received command 0x46574c44
1,587,927 UART: [fwproc] Received Image of size 114168 bytes
2,762,794 UART: ROM Fatal Error: 0x000B0033
2,763,951 >>> mbox cmd response: failed
2,763,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,763,957 >>> mbox cmd response: failed
2,763,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,763,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
895,052 UART: [kat] SHA2-512-ACC
896,953 UART: [kat] ECC-384
902,456 UART: [kat] HMAC-384Kdf
906,916 UART: [kat] LMS
1,475,112 UART: [kat] --
1,475,933 UART: [cold-reset] ++
1,476,411 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,256 UART: [idev] Erasing UDS.KEYID = 0
1,505,134 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,552 UART: [idev] --
1,514,749 UART: [ldev] ++
1,514,917 UART: [ldev] CDI.KEYID = 6
1,515,280 UART: [ldev] SUBJECT.KEYID = 5
1,515,706 UART: [ldev] AUTHORITY.KEYID = 7
1,516,169 UART: [ldev] FE.KEYID = 1
1,521,355 UART: [ldev] Erasing FE.KEYID = 1
1,546,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,108 UART: [ldev] --
1,585,523 UART: [fwproc] Waiting for Commands...
1,586,326 UART: [fwproc] Received command 0x46574c44
1,587,117 UART: [fwproc] Received Image of size 114168 bytes
2,883,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,312 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,329 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,695 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,652,475 >>> mbox cmd response: failed
2,652,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,481 >>> mbox cmd response: failed
2,652,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,129 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,923,755 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,050 UART: [kat] SHA2-256
881,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,096 UART: [kat] ++
886,248 UART: [kat] sha1
890,686 UART: [kat] SHA2-256
892,624 UART: [kat] SHA2-384
895,393 UART: [kat] SHA2-512-ACC
897,294 UART: [kat] ECC-384
903,149 UART: [kat] HMAC-384Kdf
907,873 UART: [kat] LMS
1,476,069 UART: [kat] --
1,476,824 UART: [cold-reset] ++
1,477,370 UART: [fht] Storing FHT @ 0x50003400
1,480,351 UART: [idev] ++
1,480,519 UART: [idev] CDI.KEYID = 6
1,480,879 UART: [idev] SUBJECT.KEYID = 7
1,481,303 UART: [idev] UDS.KEYID = 0
1,481,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,259 UART: [idev] Erasing UDS.KEYID = 0
1,505,949 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,525 UART: [idev] --
1,515,416 UART: [ldev] ++
1,515,584 UART: [ldev] CDI.KEYID = 6
1,515,947 UART: [ldev] SUBJECT.KEYID = 5
1,516,373 UART: [ldev] AUTHORITY.KEYID = 7
1,516,836 UART: [ldev] FE.KEYID = 1
1,522,368 UART: [ldev] Erasing FE.KEYID = 1
1,547,487 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,169 UART: [ldev] --
1,586,540 UART: [fwproc] Waiting for Commands...
1,587,201 UART: [fwproc] Received command 0x46574c44
1,587,992 UART: [fwproc] Received Image of size 114168 bytes
2,650,108 UART: ROM Fatal Error: 0x000B0033
2,651,265 >>> mbox cmd response: failed
2,651,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,651,271 >>> mbox cmd response: failed
2,651,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,651,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,992 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,644 UART: [kat] SHA2-256
882,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,690 UART: [kat] ++
886,842 UART: [kat] sha1
891,080 UART: [kat] SHA2-256
893,018 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,285 UART: [kat] HMAC-384Kdf
908,075 UART: [kat] LMS
1,476,271 UART: [kat] --
1,477,334 UART: [cold-reset] ++
1,477,742 UART: [fht] Storing FHT @ 0x50003400
1,480,549 UART: [idev] ++
1,480,717 UART: [idev] CDI.KEYID = 6
1,481,077 UART: [idev] SUBJECT.KEYID = 7
1,481,501 UART: [idev] UDS.KEYID = 0
1,481,846 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,490,009 UART: [idev] Erasing UDS.KEYID = 0
1,506,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,997 UART: [idev] --
1,516,260 UART: [ldev] ++
1,516,428 UART: [ldev] CDI.KEYID = 6
1,516,791 UART: [ldev] SUBJECT.KEYID = 5
1,517,217 UART: [ldev] AUTHORITY.KEYID = 7
1,517,680 UART: [ldev] FE.KEYID = 1
1,522,650 UART: [ldev] Erasing FE.KEYID = 1
1,547,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,399 UART: [ldev] --
1,586,746 UART: [fwproc] Waiting for Commands...
1,587,539 UART: [fwproc] Received command 0x46574c44
1,588,330 UART: [fwproc] Received Image of size 114168 bytes
2,885,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,583 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,935 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,426 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,540,789 >>> mbox cmd response: failed
2,540,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,540,795 >>> mbox cmd response: failed
2,540,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,540,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,984 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,224 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
893,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,181 UART: [kat] ++
897,333 UART: [kat] sha1
901,611 UART: [kat] SHA2-256
903,551 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
917,584 UART: [kat] HMAC-384Kdf
922,092 UART: [kat] LMS
1,170,420 UART: [kat] --
1,171,309 UART: [cold-reset] ++
1,171,877 UART: [fht] FHT @ 0x50003400
1,174,678 UART: [idev] ++
1,174,846 UART: [idev] CDI.KEYID = 6
1,175,206 UART: [idev] SUBJECT.KEYID = 7
1,175,630 UART: [idev] UDS.KEYID = 0
1,175,975 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,672 UART: [idev] Erasing UDS.KEYID = 0
1,200,669 UART: [idev] Sha1 KeyId Algorithm
1,209,097 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,716 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,243,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,243 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,376 UART: [fwproc] Recv command 0x46574c44
1,284,104 UART: [fwproc] Recv'd Img size: 114168 bytes
1,599,670 UART: ROM Fatal Error: 0x000B0033
1,600,827 >>> mbox cmd response: failed
1,600,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,600,833 >>> mbox cmd response: failed
1,600,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,600,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
893,448 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,573 UART: [kat] ++
897,725 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
917,886 UART: [kat] HMAC-384Kdf
922,326 UART: [kat] LMS
1,170,654 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,172,121 UART: [fht] FHT @ 0x50003400
1,174,946 UART: [idev] ++
1,175,114 UART: [idev] CDI.KEYID = 6
1,175,474 UART: [idev] SUBJECT.KEYID = 7
1,175,898 UART: [idev] UDS.KEYID = 0
1,176,243 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,988 UART: [idev] Erasing UDS.KEYID = 0
1,200,891 UART: [idev] Sha1 KeyId Algorithm
1,209,353 UART: [idev] --
1,210,495 UART: [ldev] ++
1,210,663 UART: [ldev] CDI.KEYID = 6
1,211,026 UART: [ldev] SUBJECT.KEYID = 5
1,211,452 UART: [ldev] AUTHORITY.KEYID = 7
1,211,915 UART: [ldev] FE.KEYID = 1
1,217,391 UART: [ldev] Erasing FE.KEYID = 1
1,243,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,383 UART: [ldev] --
1,282,656 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,052 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,581 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,885 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,548 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,451,949 >>> mbox cmd response: failed
1,451,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,451,955 >>> mbox cmd response: failed
1,451,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,451,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,605 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,723 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
893,841 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,966 UART: [kat] ++
898,118 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,582 UART: [cold-reset] ++
1,172,960 UART: [fht] FHT @ 0x50003400
1,175,631 UART: [idev] ++
1,175,799 UART: [idev] CDI.KEYID = 6
1,176,159 UART: [idev] SUBJECT.KEYID = 7
1,176,583 UART: [idev] UDS.KEYID = 0
1,176,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,418 UART: [idev] --
1,211,486 UART: [ldev] ++
1,211,654 UART: [ldev] CDI.KEYID = 6
1,212,017 UART: [ldev] SUBJECT.KEYID = 5
1,212,443 UART: [ldev] AUTHORITY.KEYID = 7
1,212,906 UART: [ldev] FE.KEYID = 1
1,218,302 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,532 UART: [ldev] --
1,283,953 UART: [fwproc] Wait for Commands...
1,284,773 UART: [fwproc] Recv command 0x46574c44
1,285,501 UART: [fwproc] Recv'd Img size: 114168 bytes
1,598,130 UART: ROM Fatal Error: 0x000B0033
1,599,287 >>> mbox cmd response: failed
1,599,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,293 >>> mbox cmd response: failed
1,599,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
902,188 UART: [kat] SHA2-256
904,128 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,549 UART: [kat] HMAC-384Kdf
923,165 UART: [kat] LMS
1,171,493 UART: [kat] --
1,172,078 UART: [cold-reset] ++
1,172,448 UART: [fht] FHT @ 0x50003400
1,175,061 UART: [idev] ++
1,175,229 UART: [idev] CDI.KEYID = 6
1,175,589 UART: [idev] SUBJECT.KEYID = 7
1,176,013 UART: [idev] UDS.KEYID = 0
1,176,358 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,967 UART: [idev] Erasing UDS.KEYID = 0
1,201,190 UART: [idev] Sha1 KeyId Algorithm
1,209,604 UART: [idev] --
1,210,580 UART: [ldev] ++
1,210,748 UART: [ldev] CDI.KEYID = 6
1,211,111 UART: [ldev] SUBJECT.KEYID = 5
1,211,537 UART: [ldev] AUTHORITY.KEYID = 7
1,212,000 UART: [ldev] FE.KEYID = 1
1,217,272 UART: [ldev] Erasing FE.KEYID = 1
1,243,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,002 UART: [ldev] --
1,283,393 UART: [fwproc] Wait for Commands...
1,284,141 UART: [fwproc] Recv command 0x46574c44
1,284,869 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,100 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,404 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,861 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,455,749 >>> mbox cmd response: failed
1,455,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,455,755 >>> mbox cmd response: failed
1,455,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,455,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,058 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,390 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,418 UART: [kat] SHA2-512-ACC
906,319 UART: [kat] ECC-384
915,882 UART: [kat] HMAC-384Kdf
920,600 UART: [kat] LMS
1,168,912 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,173,967 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,541 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,479 UART: [idev] --
1,208,694 UART: [ldev] ++
1,208,862 UART: [ldev] CDI.KEYID = 6
1,209,226 UART: [ldev] SUBJECT.KEYID = 5
1,209,653 UART: [ldev] AUTHORITY.KEYID = 7
1,210,116 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,242,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,324 UART: [ldev] --
1,281,832 UART: [fwproc] Wait for Commands...
1,282,537 UART: [fwproc] Recv command 0x46574c44
1,283,270 UART: [fwproc] Recv'd Img size: 114168 bytes
1,591,609 UART: ROM Fatal Error: 0x000B0033
1,592,766 >>> mbox cmd response: failed
1,592,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,772 >>> mbox cmd response: failed
1,592,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,592,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,013 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
890,748 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,877 UART: [kat] ++
895,029 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
904,002 UART: [kat] SHA2-512-ACC
905,903 UART: [kat] ECC-384
915,762 UART: [kat] HMAC-384Kdf
920,492 UART: [kat] LMS
1,168,804 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,745 UART: [idev] ++
1,172,913 UART: [idev] CDI.KEYID = 6
1,173,274 UART: [idev] SUBJECT.KEYID = 7
1,173,699 UART: [idev] UDS.KEYID = 0
1,174,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,089 UART: [idev] --
1,209,256 UART: [ldev] ++
1,209,424 UART: [ldev] CDI.KEYID = 6
1,209,788 UART: [ldev] SUBJECT.KEYID = 5
1,210,215 UART: [ldev] AUTHORITY.KEYID = 7
1,210,678 UART: [ldev] FE.KEYID = 1
1,216,302 UART: [ldev] Erasing FE.KEYID = 1
1,242,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,256 UART: [ldev] --
1,281,578 UART: [fwproc] Wait for Commands...
1,282,291 UART: [fwproc] Recv command 0x46574c44
1,283,024 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,035 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,912 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,450,876 >>> mbox cmd response: failed
1,450,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,882 >>> mbox cmd response: failed
1,450,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,890 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
916,261 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,169,972 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,174,312 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,198,538 UART: [idev] Sha1 KeyId Algorithm
1,207,354 UART: [idev] --
1,208,409 UART: [ldev] ++
1,208,577 UART: [ldev] CDI.KEYID = 6
1,208,941 UART: [ldev] SUBJECT.KEYID = 5
1,209,368 UART: [ldev] AUTHORITY.KEYID = 7
1,209,831 UART: [ldev] FE.KEYID = 1
1,215,247 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,497 UART: [fwproc] Wait for Commands...
1,282,252 UART: [fwproc] Recv command 0x46574c44
1,282,985 UART: [fwproc] Recv'd Img size: 114168 bytes
1,595,562 UART: ROM Fatal Error: 0x000B0033
1,596,719 >>> mbox cmd response: failed
1,596,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,725 >>> mbox cmd response: failed
1,596,725 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,731 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,658 UART: [kat] ++
895,810 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,977 UART: [kat] HMAC-384Kdf
921,515 UART: [kat] LMS
1,169,827 UART: [kat] --
1,170,706 UART: [cold-reset] ++
1,171,038 UART: [fht] FHT @ 0x50003400
1,173,786 UART: [idev] ++
1,173,954 UART: [idev] CDI.KEYID = 6
1,174,315 UART: [idev] SUBJECT.KEYID = 7
1,174,740 UART: [idev] UDS.KEYID = 0
1,175,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,754 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,153 UART: [ldev] SUBJECT.KEYID = 5
1,210,580 UART: [ldev] AUTHORITY.KEYID = 7
1,211,043 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,745 UART: [ldev] --
1,282,033 UART: [fwproc] Wait for Commands...
1,282,608 UART: [fwproc] Recv command 0x46574c44
1,283,341 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,443 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,047 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,448,962 >>> mbox cmd response: failed
1,448,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,968 >>> mbox cmd response: failed
1,448,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,856 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,903 writing to cptra_bootfsm_go
4,878,239 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,326,653 >>> mbox cmd response: failed
15,327,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,327,624 >>> mbox cmd response: failed
15,327,891 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,328,188 >>> mbox cmd response: failed
Initializing fuses
2,048,885 writing to cptra_bootfsm_go
6,906,198 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,483,081 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
4,878,332 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,322,528 >>> mbox cmd response: failed
15,323,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,323,469 >>> mbox cmd response: failed
15,323,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,324,027 >>> mbox cmd response: failed
Initializing fuses
2,055,942 writing to cptra_bootfsm_go
6,917,375 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,490,754 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,564 writing to cptra_bootfsm_go
5,189,643 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,498,245 >>> mbox cmd response: failed
15,498,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,499,199 >>> mbox cmd response: failed
15,499,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,499,763 >>> mbox cmd response: failed
Initializing fuses
2,056,018 writing to cptra_bootfsm_go
9,549,027 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,983,789 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
5,188,028 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,491,377 >>> mbox cmd response: failed
15,492,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,492,811 >>> mbox cmd response: failed
15,493,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,493,407 >>> mbox cmd response: failed
Initializing fuses
2,054,351 writing to cptra_bootfsm_go
9,562,879 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
22,995,730 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,480,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,435,659 >>> mbox cmd response: failed
11,436,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,436,533 >>> mbox cmd response: failed
11,436,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,437,099 >>> mbox cmd response: failed
Initializing fuses
2,049,048 writing to cptra_bootfsm_go
5,506,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,309,394 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,444,226 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,434,629 >>> mbox cmd response: failed
11,435,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,435,746 >>> mbox cmd response: failed
11,436,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,436,317 >>> mbox cmd response: failed
Initializing fuses
2,051,444 writing to cptra_bootfsm_go
5,526,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,378,407 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,779,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,643,565 >>> mbox cmd response: failed
11,644,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,644,657 >>> mbox cmd response: failed
11,644,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,645,216 >>> mbox cmd response: failed
Initializing fuses
2,051,472 writing to cptra_bootfsm_go
12,008,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,732,561 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
3,775,098 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,635,357 >>> mbox cmd response: failed
11,635,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,636,264 >>> mbox cmd response: failed
11,636,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,636,831 >>> mbox cmd response: failed
Initializing fuses
2,050,028 writing to cptra_bootfsm_go
12,010,494 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,708,956 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,444,117 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,406,719 >>> mbox cmd response: failed
11,407,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,407,858 >>> mbox cmd response: failed
11,408,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,408,426 >>> mbox cmd response: failed
Initializing fuses
2,057,681 writing to cptra_bootfsm_go
5,514,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,331,723 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,440,182 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,395,072 >>> mbox cmd response: failed
11,395,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,395,975 >>> mbox cmd response: failed
11,396,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,396,542 >>> mbox cmd response: failed
Initializing fuses
2,050,367 writing to cptra_bootfsm_go
5,508,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,319,534 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,783,587 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,627,893 >>> mbox cmd response: failed
11,628,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,628,815 >>> mbox cmd response: failed
11,629,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,629,380 >>> mbox cmd response: failed
Initializing fuses
2,050,367 writing to cptra_bootfsm_go
12,021,520 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,750,932 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,782,832 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
11,632,390 >>> mbox cmd response: failed
11,632,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,633,326 >>> mbox cmd response: failed
11,633,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,633,917 >>> mbox cmd response: failed
Initializing fuses
2,057,925 writing to cptra_bootfsm_go
12,009,682 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
22,728,207 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,223 >>> mbox cmd response: failed
1,198,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,229 >>> mbox cmd response: failed
1,198,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,235 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,697 UART: [kat] SHA2-256
881,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,743 UART: [kat] ++
885,895 UART: [kat] sha1
890,111 UART: [kat] SHA2-256
892,049 UART: [kat] SHA2-384
894,924 UART: [kat] SHA2-512-ACC
896,825 UART: [kat] ECC-384
902,270 UART: [kat] HMAC-384Kdf
906,784 UART: [kat] LMS
1,474,980 UART: [kat] --
1,475,911 UART: [cold-reset] ++
1,476,411 UART: [fht] Storing FHT @ 0x50003400
1,479,338 UART: [idev] ++
1,479,506 UART: [idev] CDI.KEYID = 6
1,479,866 UART: [idev] SUBJECT.KEYID = 7
1,480,290 UART: [idev] UDS.KEYID = 0
1,480,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,190 UART: [idev] Erasing UDS.KEYID = 0
1,505,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,674 UART: [idev] --
1,514,595 UART: [ldev] ++
1,514,763 UART: [ldev] CDI.KEYID = 6
1,515,126 UART: [ldev] SUBJECT.KEYID = 5
1,515,552 UART: [ldev] AUTHORITY.KEYID = 7
1,516,015 UART: [ldev] FE.KEYID = 1
1,521,343 UART: [ldev] Erasing FE.KEYID = 1
1,546,780 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,784 UART: [ldev] --
1,586,107 UART: [fwproc] Waiting for Commands...
1,586,930 UART: [fwproc] Received command 0x46574c44
1,587,721 UART: [fwproc] Received Image of size 114168 bytes
2,883,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,380 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,732 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,389 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,197,643 >>> mbox cmd response: failed
1,197,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,649 >>> mbox cmd response: failed
1,197,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,955 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,671 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,488 >>> mbox cmd response: failed
1,198,488 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,494 >>> mbox cmd response: failed
1,198,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,811 UART: [state] LifecycleState = Unprovisioned
86,466 UART: [state] DebugLocked = No
87,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,754 UART: [kat] SHA2-256
882,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,800 UART: [kat] ++
886,952 UART: [kat] sha1
891,172 UART: [kat] SHA2-256
893,110 UART: [kat] SHA2-384
895,715 UART: [kat] SHA2-512-ACC
897,616 UART: [kat] ECC-384
903,111 UART: [kat] HMAC-384Kdf
907,791 UART: [kat] LMS
1,475,987 UART: [kat] --
1,477,054 UART: [cold-reset] ++
1,477,632 UART: [fht] Storing FHT @ 0x50003400
1,480,577 UART: [idev] ++
1,480,745 UART: [idev] CDI.KEYID = 6
1,481,105 UART: [idev] SUBJECT.KEYID = 7
1,481,529 UART: [idev] UDS.KEYID = 0
1,481,874 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,817 UART: [idev] Erasing UDS.KEYID = 0
1,506,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,953 UART: [idev] --
1,516,002 UART: [ldev] ++
1,516,170 UART: [ldev] CDI.KEYID = 6
1,516,533 UART: [ldev] SUBJECT.KEYID = 5
1,516,959 UART: [ldev] AUTHORITY.KEYID = 7
1,517,422 UART: [ldev] FE.KEYID = 1
1,522,732 UART: [ldev] Erasing FE.KEYID = 1
1,548,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,691 UART: [ldev] --
1,588,038 UART: [fwproc] Waiting for Commands...
1,588,663 UART: [fwproc] Received command 0x46574c44
1,589,454 UART: [fwproc] Received Image of size 114168 bytes
2,884,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,329 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,260 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,197,780 >>> mbox cmd response: failed
1,197,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,786 >>> mbox cmd response: failed
1,197,786 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,792 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,622 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,766 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,197,109 >>> mbox cmd response: failed
1,197,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,115 >>> mbox cmd response: failed
1,197,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,121 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
893,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,563 UART: [kat] ++
897,715 UART: [kat] sha1
901,725 UART: [kat] SHA2-256
903,665 UART: [kat] SHA2-384
906,510 UART: [kat] SHA2-512-ACC
908,411 UART: [kat] ECC-384
918,486 UART: [kat] HMAC-384Kdf
923,008 UART: [kat] LMS
1,171,336 UART: [kat] --
1,172,179 UART: [cold-reset] ++
1,172,701 UART: [fht] FHT @ 0x50003400
1,175,304 UART: [idev] ++
1,175,472 UART: [idev] CDI.KEYID = 6
1,175,832 UART: [idev] SUBJECT.KEYID = 7
1,176,256 UART: [idev] UDS.KEYID = 0
1,176,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,924 UART: [idev] Erasing UDS.KEYID = 0
1,200,879 UART: [idev] Sha1 KeyId Algorithm
1,209,335 UART: [idev] --
1,210,237 UART: [ldev] ++
1,210,405 UART: [ldev] CDI.KEYID = 6
1,210,768 UART: [ldev] SUBJECT.KEYID = 5
1,211,194 UART: [ldev] AUTHORITY.KEYID = 7
1,211,657 UART: [ldev] FE.KEYID = 1
1,216,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,141 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,483 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,130 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,359 >>> mbox cmd response: failed
1,198,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,365 >>> mbox cmd response: failed
1,198,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,371 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,313 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,678 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,196,538 >>> mbox cmd response: failed
1,196,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,544 >>> mbox cmd response: failed
1,196,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,196,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Unprovisioned
85,604 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
893,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,346 UART: [kat] ++
897,498 UART: [kat] sha1
901,750 UART: [kat] SHA2-256
903,690 UART: [kat] SHA2-384
906,577 UART: [kat] SHA2-512-ACC
908,478 UART: [kat] ECC-384
918,147 UART: [kat] HMAC-384Kdf
922,563 UART: [kat] LMS
1,170,891 UART: [kat] --
1,172,040 UART: [cold-reset] ++
1,172,556 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,447 UART: [idev] Erasing UDS.KEYID = 0
1,201,294 UART: [idev] Sha1 KeyId Algorithm
1,209,824 UART: [idev] --
1,210,916 UART: [ldev] ++
1,211,084 UART: [ldev] CDI.KEYID = 6
1,211,447 UART: [ldev] SUBJECT.KEYID = 5
1,211,873 UART: [ldev] AUTHORITY.KEYID = 7
1,212,336 UART: [ldev] FE.KEYID = 1
1,217,464 UART: [ldev] Erasing FE.KEYID = 1
1,243,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,524 UART: [ldev] --
1,282,887 UART: [fwproc] Wait for Commands...
1,283,597 UART: [fwproc] Recv command 0x46574c44
1,284,325 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,989 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,199,734 >>> mbox cmd response: failed
1,199,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,740 >>> mbox cmd response: failed
1,199,740 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,188 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,198,451 >>> mbox cmd response: failed
1,198,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,457 >>> mbox cmd response: failed
1,198,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,215 UART: [kat] ++
895,367 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,227 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,473 UART: [idev] Erasing UDS.KEYID = 0
1,198,701 UART: [idev] Sha1 KeyId Algorithm
1,207,669 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,944 UART: [ldev] --
1,281,362 UART: [fwproc] Wait for Commands...
1,282,007 UART: [fwproc] Recv command 0x46574c44
1,282,740 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,847 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,156 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,640 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,215 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,197,307 >>> mbox cmd response: failed
1,197,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,313 >>> mbox cmd response: failed
1,197,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,670 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,462 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,062 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,199,318 >>> mbox cmd response: failed
1,199,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,324 >>> mbox cmd response: failed
1,199,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,915 UART: [state] LifecycleState = Unprovisioned
85,570 UART: [state] DebugLocked = No
86,296 UART: [state] WD Timer not started. Device not locked for debugging
87,569 UART: [kat] SHA2-256
891,119 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,312 UART: [cold-reset] ++
1,170,704 UART: [fht] FHT @ 0x50003400
1,173,384 UART: [idev] ++
1,173,552 UART: [idev] CDI.KEYID = 6
1,173,913 UART: [idev] SUBJECT.KEYID = 7
1,174,338 UART: [idev] UDS.KEYID = 0
1,174,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,272 UART: [idev] Sha1 KeyId Algorithm
1,208,010 UART: [idev] --
1,208,953 UART: [ldev] ++
1,209,121 UART: [ldev] CDI.KEYID = 6
1,209,485 UART: [ldev] SUBJECT.KEYID = 5
1,209,912 UART: [ldev] AUTHORITY.KEYID = 7
1,210,375 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,281,911 UART: [fwproc] Wait for Commands...
1,282,514 UART: [fwproc] Recv command 0x46574c44
1,283,247 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,378 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,687 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,151 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,058 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,197,638 >>> mbox cmd response: failed
1,197,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,644 >>> mbox cmd response: failed
1,197,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,789 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,617 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
4,880,677 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,992,524 >>> mbox cmd response: failed
13,993,252 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,993,610 >>> mbox cmd response: failed
13,993,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,994,225 >>> mbox cmd response: failed
Initializing fuses
2,065,677 writing to cptra_bootfsm_go
6,945,069 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,540,918 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
4,880,846 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,012,002 >>> mbox cmd response: failed
14,012,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,012,961 >>> mbox cmd response: failed
14,013,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,013,522 >>> mbox cmd response: failed
Initializing fuses
2,052,984 writing to cptra_bootfsm_go
6,920,113 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,492,777 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
5,187,478 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,153,644 >>> mbox cmd response: failed
14,154,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,154,576 >>> mbox cmd response: failed
14,154,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,155,142 >>> mbox cmd response: failed
Initializing fuses
2,051,415 writing to cptra_bootfsm_go
10,903,215 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,372,611 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
5,188,581 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
14,179,285 >>> mbox cmd response: failed
14,180,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,180,417 >>> mbox cmd response: failed
14,180,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,180,977 >>> mbox cmd response: failed
Initializing fuses
2,064,898 writing to cptra_bootfsm_go
10,870,806 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,353,816 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,487,470 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,462,308 >>> mbox cmd response: failed
10,462,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,463,230 >>> mbox cmd response: failed
10,463,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,463,797 >>> mbox cmd response: failed
Initializing fuses
2,055,896 writing to cptra_bootfsm_go
5,496,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,355,434 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,462,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,424,225 >>> mbox cmd response: failed
10,424,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,425,199 >>> mbox cmd response: failed
10,425,470 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,425,768 >>> mbox cmd response: failed
Initializing fuses
2,050,467 writing to cptra_bootfsm_go
5,518,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,406,607 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,776,446 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,611,488 >>> mbox cmd response: failed
10,612,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,612,439 >>> mbox cmd response: failed
10,612,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,613,054 >>> mbox cmd response: failed
Initializing fuses
2,056,475 writing to cptra_bootfsm_go
13,034,824 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,783,793 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,773,933 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,617,926 >>> mbox cmd response: failed
10,618,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,618,904 >>> mbox cmd response: failed
10,619,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,619,494 >>> mbox cmd response: failed
Initializing fuses
2,059,685 writing to cptra_bootfsm_go
13,030,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,812,281 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,468,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,399,310 >>> mbox cmd response: failed
10,400,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,400,427 >>> mbox cmd response: failed
10,400,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,401,015 >>> mbox cmd response: failed
Initializing fuses
2,063,745 writing to cptra_bootfsm_go
5,540,603 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,392,851 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,459,205 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,410,626 >>> mbox cmd response: failed
10,411,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,411,572 >>> mbox cmd response: failed
10,411,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,412,140 >>> mbox cmd response: failed
Initializing fuses
2,053,184 writing to cptra_bootfsm_go
5,502,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,370,679 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,787,140 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,626,394 >>> mbox cmd response: failed
10,627,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,627,546 >>> mbox cmd response: failed
10,627,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,628,115 >>> mbox cmd response: failed
Initializing fuses
2,063,312 writing to cptra_bootfsm_go
13,027,339 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,789,565 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,785,891 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,634,455 >>> mbox cmd response: failed
10,635,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,635,371 >>> mbox cmd response: failed
10,635,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,635,936 >>> mbox cmd response: failed
Initializing fuses
2,054,462 writing to cptra_bootfsm_go
13,011,395 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,788,417 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,051 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,253 >>> mbox cmd response: failed
1,180,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,259 >>> mbox cmd response: failed
1,180,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,645 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,829 UART: [kat] SHA2-256
892,767 UART: [kat] SHA2-384
895,566 UART: [kat] SHA2-512-ACC
897,467 UART: [kat] ECC-384
902,962 UART: [kat] HMAC-384Kdf
907,544 UART: [kat] LMS
1,475,740 UART: [kat] --
1,476,723 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,505,828 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,526 UART: [idev] --
1,515,685 UART: [ldev] ++
1,515,853 UART: [ldev] CDI.KEYID = 6
1,516,216 UART: [ldev] SUBJECT.KEYID = 5
1,516,642 UART: [ldev] AUTHORITY.KEYID = 7
1,517,105 UART: [ldev] FE.KEYID = 1
1,522,233 UART: [ldev] Erasing FE.KEYID = 1
1,547,198 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,234 UART: [ldev] --
1,586,513 UART: [fwproc] Waiting for Commands...
1,587,134 UART: [fwproc] Received command 0x46574c44
1,587,925 UART: [fwproc] Received Image of size 114168 bytes
2,884,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,333 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,459 >>> mbox cmd response: failed
1,179,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,465 >>> mbox cmd response: failed
1,179,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,917 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,870 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,330 >>> mbox cmd response: failed
1,182,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,336 >>> mbox cmd response: failed
1,182,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,342 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
890,940 UART: [kat] SHA2-256
892,878 UART: [kat] SHA2-384
895,755 UART: [kat] SHA2-512-ACC
897,656 UART: [kat] ECC-384
903,381 UART: [kat] HMAC-384Kdf
907,959 UART: [kat] LMS
1,476,155 UART: [kat] --
1,477,078 UART: [cold-reset] ++
1,477,574 UART: [fht] Storing FHT @ 0x50003400
1,480,353 UART: [idev] ++
1,480,521 UART: [idev] CDI.KEYID = 6
1,480,881 UART: [idev] SUBJECT.KEYID = 7
1,481,305 UART: [idev] UDS.KEYID = 0
1,481,650 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,785 UART: [idev] Erasing UDS.KEYID = 0
1,506,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,523 UART: [idev] --
1,516,562 UART: [ldev] ++
1,516,730 UART: [ldev] CDI.KEYID = 6
1,517,093 UART: [ldev] SUBJECT.KEYID = 5
1,517,519 UART: [ldev] AUTHORITY.KEYID = 7
1,517,982 UART: [ldev] FE.KEYID = 1
1,523,462 UART: [ldev] Erasing FE.KEYID = 1
1,548,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,201 UART: [ldev] --
1,588,702 UART: [fwproc] Waiting for Commands...
1,589,385 UART: [fwproc] Received command 0x46574c44
1,590,176 UART: [fwproc] Received Image of size 114168 bytes
2,885,949 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,955 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,307 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,042 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,562 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,414 >>> mbox cmd response: failed
1,181,414 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,420 >>> mbox cmd response: failed
1,181,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,426 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,910 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,652 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,295 >>> mbox cmd response: failed
1,179,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,301 >>> mbox cmd response: failed
1,179,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
893,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,647 UART: [kat] ++
897,799 UART: [kat] sha1
901,857 UART: [kat] SHA2-256
903,797 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,672 UART: [kat] LMS
1,171,000 UART: [kat] --
1,171,899 UART: [cold-reset] ++
1,172,403 UART: [fht] FHT @ 0x50003400
1,175,088 UART: [idev] ++
1,175,256 UART: [idev] CDI.KEYID = 6
1,175,616 UART: [idev] SUBJECT.KEYID = 7
1,176,040 UART: [idev] UDS.KEYID = 0
1,176,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,054 UART: [idev] Erasing UDS.KEYID = 0
1,201,087 UART: [idev] Sha1 KeyId Algorithm
1,209,713 UART: [idev] --
1,210,555 UART: [ldev] ++
1,210,723 UART: [ldev] CDI.KEYID = 6
1,211,086 UART: [ldev] SUBJECT.KEYID = 5
1,211,512 UART: [ldev] AUTHORITY.KEYID = 7
1,211,975 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,243,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,615 UART: [ldev] --
1,282,082 UART: [fwproc] Wait for Commands...
1,282,888 UART: [fwproc] Recv command 0x46574c44
1,283,616 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,047 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,351 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,906 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,178,535 >>> mbox cmd response: failed
1,178,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,541 >>> mbox cmd response: failed
1,178,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,875 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,467 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,378 >>> mbox cmd response: failed
1,181,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,384 >>> mbox cmd response: failed
1,181,384 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,272 UART: [kat] SHA2-256
904,212 UART: [kat] SHA2-384
907,099 UART: [kat] SHA2-512-ACC
909,000 UART: [kat] ECC-384
919,031 UART: [kat] HMAC-384Kdf
923,563 UART: [kat] LMS
1,171,891 UART: [kat] --
1,172,802 UART: [cold-reset] ++
1,173,294 UART: [fht] FHT @ 0x50003400
1,176,139 UART: [idev] ++
1,176,307 UART: [idev] CDI.KEYID = 6
1,176,667 UART: [idev] SUBJECT.KEYID = 7
1,177,091 UART: [idev] UDS.KEYID = 0
1,177,436 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,089 UART: [idev] Erasing UDS.KEYID = 0
1,202,288 UART: [idev] Sha1 KeyId Algorithm
1,210,650 UART: [idev] --
1,211,778 UART: [ldev] ++
1,211,946 UART: [ldev] CDI.KEYID = 6
1,212,309 UART: [ldev] SUBJECT.KEYID = 5
1,212,735 UART: [ldev] AUTHORITY.KEYID = 7
1,213,198 UART: [ldev] FE.KEYID = 1
1,218,512 UART: [ldev] Erasing FE.KEYID = 1
1,244,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,856 UART: [ldev] --
1,284,299 UART: [fwproc] Wait for Commands...
1,285,009 UART: [fwproc] Recv command 0x46574c44
1,285,737 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,822 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,126 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,743 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,066 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,424 >>> mbox cmd response: failed
1,181,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,430 >>> mbox cmd response: failed
1,181,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,980 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,177,879 >>> mbox cmd response: failed
1,177,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,885 >>> mbox cmd response: failed
1,177,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,424 UART: [kat] SHA2-512-ACC
906,325 UART: [kat] ECC-384
915,824 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,069 UART: [idev] ++
1,173,237 UART: [idev] CDI.KEYID = 6
1,173,598 UART: [idev] SUBJECT.KEYID = 7
1,174,023 UART: [idev] UDS.KEYID = 0
1,174,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,087 UART: [idev] Sha1 KeyId Algorithm
1,206,993 UART: [idev] --
1,208,054 UART: [ldev] ++
1,208,222 UART: [ldev] CDI.KEYID = 6
1,208,586 UART: [ldev] SUBJECT.KEYID = 5
1,209,013 UART: [ldev] AUTHORITY.KEYID = 7
1,209,476 UART: [ldev] FE.KEYID = 1
1,214,684 UART: [ldev] Erasing FE.KEYID = 1
1,240,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,906 UART: [ldev] --
1,280,226 UART: [fwproc] Wait for Commands...
1,280,943 UART: [fwproc] Recv command 0x46574c44
1,281,676 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,540 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,769,072 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,969 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,981 >>> mbox cmd response: failed
1,180,981 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,987 >>> mbox cmd response: failed
1,180,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,250 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,186 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,996 >>> mbox cmd response: failed
1,180,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,002 >>> mbox cmd response: failed
1,181,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,078 UART: [kat] SHA2-256
902,018 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,942 UART: [fht] FHT @ 0x50003400
1,173,668 UART: [idev] ++
1,173,836 UART: [idev] CDI.KEYID = 6
1,174,197 UART: [idev] SUBJECT.KEYID = 7
1,174,622 UART: [idev] UDS.KEYID = 0
1,174,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,738 UART: [idev] Erasing UDS.KEYID = 0
1,199,762 UART: [idev] Sha1 KeyId Algorithm
1,208,664 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,283,056 UART: [fwproc] Recv command 0x46574c44
1,283,789 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,528 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,692 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,001 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,543 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,030 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,678 >>> mbox cmd response: failed
1,180,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,684 >>> mbox cmd response: failed
1,180,684 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,293 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,191 UART:
192,558 UART: Running Caliptra ROM ...
193,748 UART:
193,905 UART: [state] CFI Enabled
267,329 UART: [state] LifecycleState = Manufacturing
269,285 UART: [state] DebugLocked = No
272,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,717 UART: [kat] SHA2-256
446,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,918 UART: [kat] ++
457,404 UART: [kat] sha1
468,875 UART: [kat] SHA2-256
471,611 UART: [kat] SHA2-384
478,251 UART: [kat] SHA2-512-ACC
480,650 UART: [kat] ECC-384
2,766,494 UART: [kat] HMAC-384Kdf
2,779,115 UART: [kat] LMS
3,969,389 UART: [kat] --
3,973,347 UART: [cold-reset] ++
3,975,117 UART: [fht] Storing FHT @ 0x50003400
3,986,602 UART: [idev] ++
3,987,227 UART: [idev] CDI.KEYID = 6
3,988,133 UART: [idev] SUBJECT.KEYID = 7
3,989,402 UART: [idev] UDS.KEYID = 0
3,994,940 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,138,387 UART: [idev] Erasing UDS.KEYID = 0
7,324,868 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,360 UART: [idev] --
7,349,732 UART: [ldev] ++
7,350,305 UART: [ldev] CDI.KEYID = 6
7,351,283 UART: [ldev] SUBJECT.KEYID = 5
7,352,502 UART: [ldev] AUTHORITY.KEYID = 7
7,353,735 UART: [ldev] FE.KEYID = 1
7,402,263 UART: [ldev] Erasing FE.KEYID = 1
10,734,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,063 UART: [ldev] --
13,117,546 UART: [fwproc] Waiting for Commands...
13,119,641 UART: [fwproc] Received command 0x46574c44
13,121,836 UART: [fwproc] Received Image of size 113844 bytes
13,182,586 UART: ROM Fatal Error: 0x000B0003
13,186,125 >>> mbox cmd response: failed
13,186,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,186,937 >>> mbox cmd response: failed
13,187,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,187,503 >>> mbox cmd response: failed
Initializing fuses
2,049,912 writing to cptra_bootfsm_go
2,239,222 UART:
2,239,571 UART: Running Caliptra ROM ...
2,240,644 UART:
2,240,800 UART: [state] CFI Enabled
2,306,402 UART: [state] LifecycleState = Manufacturing
2,308,340 UART: [state] DebugLocked = No
2,310,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,393 UART: [kat] SHA2-256
2,484,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,577 UART: [kat] ++
2,495,064 UART: [kat] sha1
2,505,904 UART: [kat] SHA2-256
2,508,599 UART: [kat] SHA2-384
2,514,317 UART: [kat] SHA2-512-ACC
2,516,678 UART: [kat] ECC-384
4,810,659 UART: [kat] HMAC-384Kdf
4,841,355 UART: [kat] LMS
6,031,663 UART: [kat] --
6,035,374 UART: [cold-reset] ++
6,037,270 UART: [fht] Storing FHT @ 0x50003400
6,048,437 UART: [idev] ++
6,049,046 UART: [idev] CDI.KEYID = 6
6,049,969 UART: [idev] SUBJECT.KEYID = 7
6,051,192 UART: [idev] UDS.KEYID = 0
6,053,644 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,196,832 UART: [idev] Erasing UDS.KEYID = 0
9,387,501 UART: [idev] Using Sha1 for KeyId Algorithm
9,408,821 UART: [idev] --
9,412,027 UART: [ldev] ++
9,412,606 UART: [ldev] CDI.KEYID = 6
9,413,547 UART: [ldev] SUBJECT.KEYID = 5
9,414,796 UART: [ldev] AUTHORITY.KEYID = 7
9,416,036 UART: [ldev] FE.KEYID = 1
9,462,255 UART: [ldev] Erasing FE.KEYID = 1
12,796,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,110,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,125,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,140,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,154,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,172,634 UART: [ldev] --
15,177,808 UART: [fwproc] Waiting for Commands...
15,180,350 UART: [fwproc] Received command 0x46574c44
15,182,537 UART: [fwproc] Received Image of size 113844 bytes
19,274,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,348,688 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,417,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,734,446 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,742 writing to cptra_bootfsm_go
3,789,081 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,901,128 >>> mbox cmd response: failed
12,901,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,902,296 >>> mbox cmd response: failed
12,902,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,902,862 >>> mbox cmd response: failed
Initializing fuses
2,049,841 writing to cptra_bootfsm_go
5,836,682 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,935,631 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,542 UART:
192,905 UART: Running Caliptra ROM ...
194,043 UART:
603,945 UART: [state] CFI Enabled
617,755 UART: [state] LifecycleState = Manufacturing
619,687 UART: [state] DebugLocked = No
621,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,721 UART: [kat] SHA2-256
795,471 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,010 UART: [kat] ++
806,466 UART: [kat] sha1
818,205 UART: [kat] SHA2-256
820,947 UART: [kat] SHA2-384
826,017 UART: [kat] SHA2-512-ACC
828,347 UART: [kat] ECC-384
3,113,416 UART: [kat] HMAC-384Kdf
3,126,462 UART: [kat] LMS
4,316,605 UART: [kat] --
4,321,513 UART: [cold-reset] ++
4,322,963 UART: [fht] Storing FHT @ 0x50003400
4,334,660 UART: [idev] ++
4,335,279 UART: [idev] CDI.KEYID = 6
4,336,210 UART: [idev] SUBJECT.KEYID = 7
4,337,433 UART: [idev] UDS.KEYID = 0
4,343,039 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,486,325 UART: [idev] Erasing UDS.KEYID = 0
7,626,803 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,436 UART: [idev] --
7,652,514 UART: [ldev] ++
7,653,141 UART: [ldev] CDI.KEYID = 6
7,654,024 UART: [ldev] SUBJECT.KEYID = 5
7,655,305 UART: [ldev] AUTHORITY.KEYID = 7
7,656,539 UART: [ldev] FE.KEYID = 1
7,666,766 UART: [ldev] Erasing FE.KEYID = 1
10,952,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,542 UART: [ldev] --
13,312,357 UART: [fwproc] Waiting for Commands...
13,315,431 UART: [fwproc] Received command 0x46574c44
13,317,625 UART: [fwproc] Received Image of size 113844 bytes
13,379,396 UART: ROM Fatal Error: 0x000B0003
13,382,927 >>> mbox cmd response: failed
13,383,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,383,575 >>> mbox cmd response: failed
13,383,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,384,171 >>> mbox cmd response: failed
Initializing fuses
2,050,331 writing to cptra_bootfsm_go
2,239,635 UART:
2,239,992 UART: Running Caliptra ROM ...
2,241,452 UART:
7,080,656 UART: [state] CFI Enabled
7,092,449 UART: [state] LifecycleState = Manufacturing
7,094,426 UART: [state] DebugLocked = No
7,095,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,101,578 UART: [kat] SHA2-256
7,271,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,281,870 UART: [kat] ++
7,282,332 UART: [kat] sha1
7,294,428 UART: [kat] SHA2-256
7,297,134 UART: [kat] SHA2-384
7,302,209 UART: [kat] SHA2-512-ACC
7,304,558 UART: [kat] ECC-384
9,589,744 UART: [kat] HMAC-384Kdf
9,601,204 UART: [kat] LMS
10,791,295 UART: [kat] --
10,794,651 UART: [cold-reset] ++
10,796,207 UART: [fht] Storing FHT @ 0x50003400
10,807,149 UART: [idev] ++
10,807,750 UART: [idev] CDI.KEYID = 6
10,808,666 UART: [idev] SUBJECT.KEYID = 7
10,809,937 UART: [idev] UDS.KEYID = 0
10,812,836 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,955,802 UART: [idev] Erasing UDS.KEYID = 0
14,102,252 UART: [idev] Using Sha1 for KeyId Algorithm
14,124,786 UART: [idev] --
14,127,588 UART: [ldev] ++
14,128,151 UART: [ldev] CDI.KEYID = 6
14,129,113 UART: [ldev] SUBJECT.KEYID = 5
14,130,369 UART: [ldev] AUTHORITY.KEYID = 7
14,131,607 UART: [ldev] FE.KEYID = 1
14,144,579 UART: [ldev] Erasing FE.KEYID = 1
17,430,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,723,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,738,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,753,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,767,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,787,428 UART: [ldev] --
19,791,776 UART: [fwproc] Waiting for Commands...
19,793,770 UART: [fwproc] Received command 0x46574c44
19,795,962 UART: [fwproc] Received Image of size 113844 bytes
23,884,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,958,939 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,027,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,344,892 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
4,128,640 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,105,546 >>> mbox cmd response: failed
13,106,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,106,616 >>> mbox cmd response: failed
13,106,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,107,174 >>> mbox cmd response: failed
Initializing fuses
2,062,469 writing to cptra_bootfsm_go
10,888,493 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,854,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,225 UART:
192,594 UART: Running Caliptra ROM ...
193,796 UART:
193,945 UART: [state] CFI Enabled
264,500 UART: [state] LifecycleState = Manufacturing
266,389 UART: [state] DebugLocked = No
268,774 UART: [state] WD Timer not started. Device not locked for debugging
272,806 UART: [kat] SHA2-256
451,932 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,485 UART: [kat] ++
464,021 UART: [kat] sha1
474,428 UART: [kat] SHA2-256
477,439 UART: [kat] SHA2-384
483,576 UART: [kat] SHA2-512-ACC
486,505 UART: [kat] ECC-384
2,946,863 UART: [kat] HMAC-384Kdf
2,971,870 UART: [kat] LMS
3,501,288 UART: [kat] --
3,504,309 UART: [cold-reset] ++
3,506,026 UART: [fht] FHT @ 0x50003400
3,518,000 UART: [idev] ++
3,518,581 UART: [idev] CDI.KEYID = 6
3,519,501 UART: [idev] SUBJECT.KEYID = 7
3,520,720 UART: [idev] UDS.KEYID = 0
3,523,408 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,220 UART: [idev] Erasing UDS.KEYID = 0
6,025,315 UART: [idev] Sha1 KeyId Algorithm
6,049,682 UART: [idev] --
6,055,085 UART: [ldev] ++
6,055,657 UART: [ldev] CDI.KEYID = 6
6,056,548 UART: [ldev] SUBJECT.KEYID = 5
6,057,766 UART: [ldev] AUTHORITY.KEYID = 7
6,059,000 UART: [ldev] FE.KEYID = 1
6,099,014 UART: [ldev] Erasing FE.KEYID = 1
8,601,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,369,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,385 UART: [ldev] --
10,394,624 UART: [fwproc] Wait for Commands...
10,396,285 UART: [fwproc] Recv command 0x46574c44
10,398,389 UART: [fwproc] Recv'd Img size: 114168 bytes
10,456,964 UART: ROM Fatal Error: 0x000B0003
10,460,104 >>> mbox cmd response: failed
10,460,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,460,754 >>> mbox cmd response: failed
10,461,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,461,321 >>> mbox cmd response: failed
Initializing fuses
2,050,027 writing to cptra_bootfsm_go
2,239,336 UART:
2,239,679 UART: Running Caliptra ROM ...
2,240,816 UART:
2,240,978 UART: [state] CFI Enabled
2,301,540 UART: [state] LifecycleState = Manufacturing
2,303,419 UART: [state] DebugLocked = No
2,305,346 UART: [state] WD Timer not started. Device not locked for debugging
2,308,496 UART: [kat] SHA2-256
2,487,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,499,191 UART: [kat] ++
2,499,733 UART: [kat] sha1
2,511,927 UART: [kat] SHA2-256
2,514,936 UART: [kat] SHA2-384
2,521,315 UART: [kat] SHA2-512-ACC
2,524,303 UART: [kat] ECC-384
4,966,334 UART: [kat] HMAC-384Kdf
4,990,186 UART: [kat] LMS
5,519,648 UART: [kat] --
5,524,717 UART: [cold-reset] ++
5,526,752 UART: [fht] FHT @ 0x50003400
5,537,617 UART: [idev] ++
5,538,182 UART: [idev] CDI.KEYID = 6
5,539,095 UART: [idev] SUBJECT.KEYID = 7
5,540,259 UART: [idev] UDS.KEYID = 0
5,542,943 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,686,664 UART: [idev] Erasing UDS.KEYID = 0
8,043,144 UART: [idev] Sha1 KeyId Algorithm
8,065,793 UART: [idev] --
8,069,787 UART: [ldev] ++
8,070,376 UART: [ldev] CDI.KEYID = 6
8,071,266 UART: [ldev] SUBJECT.KEYID = 5
8,072,427 UART: [ldev] AUTHORITY.KEYID = 7
8,073,716 UART: [ldev] FE.KEYID = 1
8,120,474 UART: [ldev] Erasing FE.KEYID = 1
10,620,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,375,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,391,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,407,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,427,500 UART: [ldev] --
12,432,284 UART: [fwproc] Wait for Commands...
12,433,945 UART: [fwproc] Recv command 0x46574c44
12,436,044 UART: [fwproc] Recv'd Img size: 114168 bytes
15,867,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,940,028 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,008,819 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,325,392 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,354,585 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,229,923 >>> mbox cmd response: failed
10,230,669 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,231,032 >>> mbox cmd response: failed
10,231,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,231,595 >>> mbox cmd response: failed
Initializing fuses
2,047,092 writing to cptra_bootfsm_go
5,428,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,144,761 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,613 UART:
192,988 UART: Running Caliptra ROM ...
194,183 UART:
603,541 UART: [state] CFI Enabled
613,001 UART: [state] LifecycleState = Manufacturing
614,837 UART: [state] DebugLocked = No
616,076 UART: [state] WD Timer not started. Device not locked for debugging
620,272 UART: [kat] SHA2-256
799,408 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,015 UART: [kat] ++
811,554 UART: [kat] sha1
824,168 UART: [kat] SHA2-256
827,231 UART: [kat] SHA2-384
833,311 UART: [kat] SHA2-512-ACC
836,241 UART: [kat] ECC-384
3,277,261 UART: [kat] HMAC-384Kdf
3,290,524 UART: [kat] LMS
3,820,011 UART: [kat] --
3,827,029 UART: [cold-reset] ++
3,828,966 UART: [fht] FHT @ 0x50003400
3,841,022 UART: [idev] ++
3,841,587 UART: [idev] CDI.KEYID = 6
3,842,624 UART: [idev] SUBJECT.KEYID = 7
3,843,735 UART: [idev] UDS.KEYID = 0
3,846,616 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,990,216 UART: [idev] Erasing UDS.KEYID = 0
6,314,456 UART: [idev] Sha1 KeyId Algorithm
6,337,462 UART: [idev] --
6,341,751 UART: [ldev] ++
6,342,328 UART: [ldev] CDI.KEYID = 6
6,343,240 UART: [ldev] SUBJECT.KEYID = 5
6,344,401 UART: [ldev] AUTHORITY.KEYID = 7
6,345,634 UART: [ldev] FE.KEYID = 1
6,355,631 UART: [ldev] Erasing FE.KEYID = 1
8,830,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,620,233 UART: [ldev] --
10,624,477 UART: [fwproc] Wait for Commands...
10,627,169 UART: [fwproc] Recv command 0x46574c44
10,629,265 UART: [fwproc] Recv'd Img size: 114168 bytes
10,691,476 UART: ROM Fatal Error: 0x000B0003
10,694,565 >>> mbox cmd response: failed
10,694,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,695,299 >>> mbox cmd response: failed
10,695,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,695,965 >>> mbox cmd response: failed
Initializing fuses
2,050,808 writing to cptra_bootfsm_go
2,240,123 UART:
2,240,465 UART: Running Caliptra ROM ...
2,241,605 UART:
9,773,613 UART: [state] CFI Enabled
9,789,138 UART: [state] LifecycleState = Manufacturing
9,791,011 UART: [state] DebugLocked = No
9,792,351 UART: [state] WD Timer not started. Device not locked for debugging
9,796,339 UART: [kat] SHA2-256
9,975,460 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,987,052 UART: [kat] ++
9,987,603 UART: [kat] sha1
9,999,743 UART: [kat] SHA2-256
10,002,753 UART: [kat] SHA2-384
10,008,091 UART: [kat] SHA2-512-ACC
10,011,050 UART: [kat] ECC-384
12,452,381 UART: [kat] HMAC-384Kdf
12,464,507 UART: [kat] LMS
12,993,965 UART: [kat] --
12,997,301 UART: [cold-reset] ++
12,998,204 UART: [fht] FHT @ 0x50003400
13,007,991 UART: [idev] ++
13,008,569 UART: [idev] CDI.KEYID = 6
13,009,487 UART: [idev] SUBJECT.KEYID = 7
13,010,710 UART: [idev] UDS.KEYID = 0
13,013,548 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,157,087 UART: [idev] Erasing UDS.KEYID = 0
15,483,861 UART: [idev] Sha1 KeyId Algorithm
15,506,232 UART: [idev] --
15,509,256 UART: [ldev] ++
15,509,827 UART: [ldev] CDI.KEYID = 6
15,510,733 UART: [ldev] SUBJECT.KEYID = 5
15,511,912 UART: [ldev] AUTHORITY.KEYID = 7
15,513,146 UART: [ldev] FE.KEYID = 1
15,523,416 UART: [ldev] Erasing FE.KEYID = 1
17,995,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,713,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,730,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,745,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,761,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,782,962 UART: [ldev] --
19,787,797 UART: [fwproc] Wait for Commands...
19,790,059 UART: [fwproc] Recv command 0x46574c44
19,792,101 UART: [fwproc] Recv'd Img size: 114168 bytes
23,224,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,296,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,365,516 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,682,281 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,694,554 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,458,616 >>> mbox cmd response: failed
10,459,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,459,778 >>> mbox cmd response: failed
10,460,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,460,297 >>> mbox cmd response: failed
Initializing fuses
2,048,910 writing to cptra_bootfsm_go
13,104,283 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,704,208 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,273 UART:
192,626 UART: Running Caliptra ROM ...
193,818 UART:
193,989 UART: [state] CFI Enabled
264,375 UART: [state] LifecycleState = Manufacturing
266,790 UART: [state] DebugLocked = No
269,170 UART: [state] WD Timer not started. Device not locked for debugging
274,468 UART: [kat] SHA2-256
464,379 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,150 UART: [kat] ++
475,795 UART: [kat] sha1
487,265 UART: [kat] SHA2-256
490,285 UART: [kat] SHA2-384
497,721 UART: [kat] SHA2-512-ACC
500,280 UART: [kat] ECC-384
2,946,994 UART: [kat] HMAC-384Kdf
2,973,007 UART: [kat] LMS
3,504,783 UART: [kat] --
3,508,686 UART: [cold-reset] ++
3,510,320 UART: [fht] FHT @ 0x50003400
3,522,372 UART: [idev] ++
3,523,069 UART: [idev] CDI.KEYID = 6
3,523,963 UART: [idev] SUBJECT.KEYID = 7
3,525,176 UART: [idev] UDS.KEYID = 0
3,530,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,674,506 UART: [idev] Erasing UDS.KEYID = 0
6,030,088 UART: [idev] Sha1 KeyId Algorithm
6,052,570 UART: [idev] --
6,057,703 UART: [ldev] ++
6,058,390 UART: [ldev] CDI.KEYID = 6
6,059,304 UART: [ldev] SUBJECT.KEYID = 5
6,060,466 UART: [ldev] AUTHORITY.KEYID = 7
6,061,701 UART: [ldev] FE.KEYID = 1
6,103,517 UART: [ldev] Erasing FE.KEYID = 1
8,611,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,784 UART: [ldev] --
10,419,405 UART: [fwproc] Wait for Commands...
10,420,910 UART: [fwproc] Recv command 0x46574c44
10,422,900 UART: [fwproc] Recv'd Img size: 114168 bytes
10,513,183 UART: ROM Fatal Error: 0x000B0003
10,516,873 >>> mbox cmd response: failed
10,517,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,517,612 >>> mbox cmd response: failed
10,517,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,518,176 >>> mbox cmd response: failed
Initializing fuses
2,050,580 writing to cptra_bootfsm_go
2,239,888 UART:
2,240,234 UART: Running Caliptra ROM ...
2,241,370 UART:
2,241,535 UART: [state] CFI Enabled
2,317,437 UART: [state] LifecycleState = Manufacturing
2,319,813 UART: [state] DebugLocked = No
2,321,743 UART: [state] WD Timer not started. Device not locked for debugging
2,326,316 UART: [kat] SHA2-256
2,516,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,930 UART: [kat] ++
2,527,437 UART: [kat] sha1
2,538,219 UART: [kat] SHA2-256
2,541,238 UART: [kat] SHA2-384
2,547,282 UART: [kat] SHA2-512-ACC
2,549,857 UART: [kat] ECC-384
5,001,434 UART: [kat] HMAC-384Kdf
5,025,822 UART: [kat] LMS
5,557,577 UART: [kat] --
5,563,779 UART: [cold-reset] ++
5,566,305 UART: [fht] FHT @ 0x50003400
5,577,714 UART: [idev] ++
5,578,384 UART: [idev] CDI.KEYID = 6
5,579,326 UART: [idev] SUBJECT.KEYID = 7
5,580,535 UART: [idev] UDS.KEYID = 0
5,583,128 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,726,821 UART: [idev] Erasing UDS.KEYID = 0
8,104,880 UART: [idev] Sha1 KeyId Algorithm
8,126,540 UART: [idev] --
8,130,298 UART: [ldev] ++
8,130,988 UART: [ldev] CDI.KEYID = 6
8,132,055 UART: [ldev] SUBJECT.KEYID = 5
8,133,162 UART: [ldev] AUTHORITY.KEYID = 7
8,134,335 UART: [ldev] FE.KEYID = 1
8,174,355 UART: [ldev] Erasing FE.KEYID = 1
10,678,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,418,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,433,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,448,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,463,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,483,936 UART: [ldev] --
12,490,031 UART: [fwproc] Wait for Commands...
12,492,843 UART: [fwproc] Recv command 0x46574c44
12,495,162 UART: [fwproc] Recv'd Img size: 114168 bytes
15,974,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,045,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,162,169 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,702,852 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,445,868 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,307,621 >>> mbox cmd response: failed
10,308,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,308,501 >>> mbox cmd response: failed
10,308,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,309,078 >>> mbox cmd response: failed
Initializing fuses
2,055,648 writing to cptra_bootfsm_go
5,485,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,827,284 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,509 UART:
192,880 UART: Running Caliptra ROM ...
193,996 UART:
603,787 UART: [state] CFI Enabled
618,847 UART: [state] LifecycleState = Manufacturing
621,227 UART: [state] DebugLocked = No
623,276 UART: [state] WD Timer not started. Device not locked for debugging
628,670 UART: [kat] SHA2-256
818,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,318 UART: [kat] ++
829,854 UART: [kat] sha1
842,358 UART: [kat] SHA2-256
845,407 UART: [kat] SHA2-384
851,567 UART: [kat] SHA2-512-ACC
854,126 UART: [kat] ECC-384
3,292,914 UART: [kat] HMAC-384Kdf
3,306,149 UART: [kat] LMS
3,838,003 UART: [kat] --
3,842,992 UART: [cold-reset] ++
3,844,285 UART: [fht] FHT @ 0x50003400
3,855,383 UART: [idev] ++
3,856,059 UART: [idev] CDI.KEYID = 6
3,856,978 UART: [idev] SUBJECT.KEYID = 7
3,858,189 UART: [idev] UDS.KEYID = 0
3,863,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,007,386 UART: [idev] Erasing UDS.KEYID = 0
6,336,271 UART: [idev] Sha1 KeyId Algorithm
6,358,813 UART: [idev] --
6,362,758 UART: [ldev] ++
6,363,488 UART: [ldev] CDI.KEYID = 6
6,364,383 UART: [ldev] SUBJECT.KEYID = 5
6,365,484 UART: [ldev] AUTHORITY.KEYID = 7
6,366,771 UART: [ldev] FE.KEYID = 1
6,377,666 UART: [ldev] Erasing FE.KEYID = 1
8,853,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,456 UART: [ldev] --
10,645,887 UART: [fwproc] Wait for Commands...
10,648,923 UART: [fwproc] Recv command 0x46574c44
10,651,245 UART: [fwproc] Recv'd Img size: 114168 bytes
10,742,605 UART: ROM Fatal Error: 0x000B0003
10,746,282 >>> mbox cmd response: failed
10,746,734 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,747,067 >>> mbox cmd response: failed
10,747,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,747,623 >>> mbox cmd response: failed
Initializing fuses
2,051,617 writing to cptra_bootfsm_go
2,240,939 UART:
2,241,285 UART: Running Caliptra ROM ...
2,242,428 UART:
9,725,827 UART: [state] CFI Enabled
9,738,941 UART: [state] LifecycleState = Manufacturing
9,741,299 UART: [state] DebugLocked = No
9,742,577 UART: [state] WD Timer not started. Device not locked for debugging
9,747,524 UART: [kat] SHA2-256
9,937,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,948,221 UART: [kat] ++
9,948,825 UART: [kat] sha1
9,961,772 UART: [kat] SHA2-256
9,964,800 UART: [kat] SHA2-384
9,970,850 UART: [kat] SHA2-512-ACC
9,973,422 UART: [kat] ECC-384
12,415,488 UART: [kat] HMAC-384Kdf
12,429,242 UART: [kat] LMS
12,961,017 UART: [kat] --
12,963,609 UART: [cold-reset] ++
12,965,376 UART: [fht] FHT @ 0x50003400
12,975,976 UART: [idev] ++
12,976,684 UART: [idev] CDI.KEYID = 6
12,977,633 UART: [idev] SUBJECT.KEYID = 7
12,978,847 UART: [idev] UDS.KEYID = 0
12,981,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,124,933 UART: [idev] Erasing UDS.KEYID = 0
15,457,959 UART: [idev] Sha1 KeyId Algorithm
15,479,741 UART: [idev] --
15,485,732 UART: [ldev] ++
15,486,467 UART: [ldev] CDI.KEYID = 6
15,487,349 UART: [ldev] SUBJECT.KEYID = 5
15,488,578 UART: [ldev] AUTHORITY.KEYID = 7
15,489,756 UART: [ldev] FE.KEYID = 1
15,501,509 UART: [ldev] Erasing FE.KEYID = 1
17,979,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,695,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,741,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,760,476 UART: [ldev] --
19,765,419 UART: [fwproc] Wait for Commands...
19,768,165 UART: [fwproc] Recv command 0x46574c44
19,770,426 UART: [fwproc] Recv'd Img size: 114168 bytes
23,250,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,327,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,443,427 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,984,290 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,763,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,527,571 >>> mbox cmd response: failed
10,528,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,528,633 >>> mbox cmd response: failed
10,528,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,529,198 >>> mbox cmd response: failed
Initializing fuses
2,050,729 writing to cptra_bootfsm_go
13,100,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,345,174 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Manufacturing
86,009 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,255 UART: [kat] SHA2-256
882,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,301 UART: [kat] ++
886,453 UART: [kat] sha1
890,781 UART: [kat] SHA2-256
892,719 UART: [kat] SHA2-384
895,262 UART: [kat] SHA2-512-ACC
897,163 UART: [kat] ECC-384
902,904 UART: [kat] HMAC-384Kdf
907,440 UART: [kat] LMS
1,475,636 UART: [kat] --
1,476,387 UART: [cold-reset] ++
1,476,937 UART: [fht] Storing FHT @ 0x50003400
1,479,590 UART: [idev] ++
1,479,758 UART: [idev] CDI.KEYID = 6
1,480,118 UART: [idev] SUBJECT.KEYID = 7
1,480,542 UART: [idev] UDS.KEYID = 0
1,480,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,558 UART: [idev] Erasing UDS.KEYID = 0
1,505,104 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,720 UART: [idev] --
1,514,841 UART: [ldev] ++
1,515,009 UART: [ldev] CDI.KEYID = 6
1,515,372 UART: [ldev] SUBJECT.KEYID = 5
1,515,798 UART: [ldev] AUTHORITY.KEYID = 7
1,516,261 UART: [ldev] FE.KEYID = 1
1,521,201 UART: [ldev] Erasing FE.KEYID = 1
1,546,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,916 UART: [ldev] --
1,585,355 UART: [fwproc] Waiting for Commands...
1,586,018 UART: [fwproc] Received command 0x46574c44
1,586,809 UART: [fwproc] Received Image of size 114168 bytes
1,606,819 UART: ROM Fatal Error: 0x000B0003
1,607,976 >>> mbox cmd response: failed
1,607,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,982 >>> mbox cmd response: failed
1,607,982 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,614 UART: [state] LifecycleState = Unprovisioned
86,269 UART: [state] DebugLocked = No
86,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,693 UART: [kat] SHA2-256
882,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,739 UART: [kat] ++
886,891 UART: [kat] sha1
891,161 UART: [kat] SHA2-256
893,099 UART: [kat] SHA2-384
895,738 UART: [kat] SHA2-512-ACC
897,639 UART: [kat] ECC-384
903,412 UART: [kat] HMAC-384Kdf
908,222 UART: [kat] LMS
1,476,418 UART: [kat] --
1,477,319 UART: [cold-reset] ++
1,477,751 UART: [fht] Storing FHT @ 0x50003400
1,480,762 UART: [idev] ++
1,480,930 UART: [idev] CDI.KEYID = 6
1,481,290 UART: [idev] SUBJECT.KEYID = 7
1,481,714 UART: [idev] UDS.KEYID = 0
1,482,059 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,902 UART: [idev] Erasing UDS.KEYID = 0
1,506,176 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,870 UART: [idev] --
1,515,911 UART: [ldev] ++
1,516,079 UART: [ldev] CDI.KEYID = 6
1,516,442 UART: [ldev] SUBJECT.KEYID = 5
1,516,868 UART: [ldev] AUTHORITY.KEYID = 7
1,517,331 UART: [ldev] FE.KEYID = 1
1,522,423 UART: [ldev] Erasing FE.KEYID = 1
1,547,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,696 UART: [ldev] --
1,587,075 UART: [fwproc] Waiting for Commands...
1,587,890 UART: [fwproc] Received command 0x46574c44
1,588,681 UART: [fwproc] Received Image of size 114168 bytes
2,885,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,816 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,869 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,459,879 >>> mbox cmd response: failed
1,459,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,885 >>> mbox cmd response: failed
1,459,885 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,581 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,123 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Manufacturing
85,894 UART: [state] DebugLocked = No
86,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,252 UART: [kat] SHA2-256
882,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,298 UART: [kat] ++
886,450 UART: [kat] sha1
890,560 UART: [kat] SHA2-256
892,498 UART: [kat] SHA2-384
895,225 UART: [kat] SHA2-512-ACC
897,126 UART: [kat] ECC-384
902,665 UART: [kat] HMAC-384Kdf
907,071 UART: [kat] LMS
1,475,267 UART: [kat] --
1,476,128 UART: [cold-reset] ++
1,476,630 UART: [fht] Storing FHT @ 0x50003400
1,479,411 UART: [idev] ++
1,479,579 UART: [idev] CDI.KEYID = 6
1,479,939 UART: [idev] SUBJECT.KEYID = 7
1,480,363 UART: [idev] UDS.KEYID = 0
1,480,708 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,451 UART: [idev] Erasing UDS.KEYID = 0
1,505,321 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,051 UART: [idev] --
1,514,918 UART: [ldev] ++
1,515,086 UART: [ldev] CDI.KEYID = 6
1,515,449 UART: [ldev] SUBJECT.KEYID = 5
1,515,875 UART: [ldev] AUTHORITY.KEYID = 7
1,516,338 UART: [ldev] FE.KEYID = 1
1,521,616 UART: [ldev] Erasing FE.KEYID = 1
1,547,895 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,119 UART: [ldev] --
1,587,412 UART: [fwproc] Waiting for Commands...
1,588,211 UART: [fwproc] Received command 0x46574c44
1,589,002 UART: [fwproc] Received Image of size 114168 bytes
1,609,700 UART: ROM Fatal Error: 0x000B0003
1,610,857 >>> mbox cmd response: failed
1,610,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,863 >>> mbox cmd response: failed
1,610,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,910 UART: [kat] SHA2-256
881,841 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,956 UART: [kat] ++
886,108 UART: [kat] sha1
890,446 UART: [kat] SHA2-256
892,384 UART: [kat] SHA2-384
895,145 UART: [kat] SHA2-512-ACC
897,046 UART: [kat] ECC-384
902,525 UART: [kat] HMAC-384Kdf
907,027 UART: [kat] LMS
1,475,223 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,620 UART: [fht] Storing FHT @ 0x50003400
1,479,301 UART: [idev] ++
1,479,469 UART: [idev] CDI.KEYID = 6
1,479,829 UART: [idev] SUBJECT.KEYID = 7
1,480,253 UART: [idev] UDS.KEYID = 0
1,480,598 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,377 UART: [idev] Erasing UDS.KEYID = 0
1,505,689 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,397 UART: [idev] --
1,515,460 UART: [ldev] ++
1,515,628 UART: [ldev] CDI.KEYID = 6
1,515,991 UART: [ldev] SUBJECT.KEYID = 5
1,516,417 UART: [ldev] AUTHORITY.KEYID = 7
1,516,880 UART: [ldev] FE.KEYID = 1
1,522,086 UART: [ldev] Erasing FE.KEYID = 1
1,547,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,547 UART: [ldev] --
1,586,002 UART: [fwproc] Waiting for Commands...
1,586,629 UART: [fwproc] Received command 0x46574c44
1,587,420 UART: [fwproc] Received Image of size 114168 bytes
2,882,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,253 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,938,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,316 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,462,442 >>> mbox cmd response: failed
1,462,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,448 >>> mbox cmd response: failed
1,462,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,454 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,000 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Manufacturing
85,733 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,516 UART: [kat] SHA2-512-ACC
908,417 UART: [kat] ECC-384
917,688 UART: [kat] HMAC-384Kdf
922,194 UART: [kat] LMS
1,170,522 UART: [kat] --
1,171,563 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,614 UART: [idev] ++
1,174,782 UART: [idev] CDI.KEYID = 6
1,175,142 UART: [idev] SUBJECT.KEYID = 7
1,175,566 UART: [idev] UDS.KEYID = 0
1,175,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,184 UART: [idev] Erasing UDS.KEYID = 0
1,200,163 UART: [idev] Sha1 KeyId Algorithm
1,208,645 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,078 UART: [ldev] SUBJECT.KEYID = 5
1,210,504 UART: [ldev] AUTHORITY.KEYID = 7
1,210,967 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,241,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,145 UART: [ldev] --
1,280,444 UART: [fwproc] Wait for Commands...
1,281,068 UART: [fwproc] Recv command 0x46574c44
1,281,796 UART: [fwproc] Recv'd Img size: 114168 bytes
1,302,380 UART: ROM Fatal Error: 0x000B0003
1,303,537 >>> mbox cmd response: failed
1,303,537 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,543 >>> mbox cmd response: failed
1,303,543 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,772 UART: [kat] SHA2-256
893,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,547 UART: [kat] ++
897,699 UART: [kat] sha1
901,865 UART: [kat] SHA2-256
903,805 UART: [kat] SHA2-384
906,676 UART: [kat] SHA2-512-ACC
908,577 UART: [kat] ECC-384
918,434 UART: [kat] HMAC-384Kdf
923,236 UART: [kat] LMS
1,171,564 UART: [kat] --
1,172,391 UART: [cold-reset] ++
1,172,835 UART: [fht] FHT @ 0x50003400
1,175,572 UART: [idev] ++
1,175,740 UART: [idev] CDI.KEYID = 6
1,176,100 UART: [idev] SUBJECT.KEYID = 7
1,176,524 UART: [idev] UDS.KEYID = 0
1,176,869 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,280 UART: [idev] Erasing UDS.KEYID = 0
1,200,971 UART: [idev] Sha1 KeyId Algorithm
1,209,441 UART: [idev] --
1,210,665 UART: [ldev] ++
1,210,833 UART: [ldev] CDI.KEYID = 6
1,211,196 UART: [ldev] SUBJECT.KEYID = 5
1,211,622 UART: [ldev] AUTHORITY.KEYID = 7
1,212,085 UART: [ldev] FE.KEYID = 1
1,217,109 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,253 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,709 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,718 UART: [fwproc] Recv command 0x46574c44
1,283,446 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,535 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,839 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,390 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,160,054 >>> mbox cmd response: failed
1,160,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,060 >>> mbox cmd response: failed
1,160,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,819 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,857 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,929 UART: [state] LifecycleState = Manufacturing
86,584 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
894,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,202 UART: [kat] ++
898,354 UART: [kat] sha1
902,588 UART: [kat] SHA2-256
904,528 UART: [kat] SHA2-384
907,125 UART: [kat] SHA2-512-ACC
909,026 UART: [kat] ECC-384
918,925 UART: [kat] HMAC-384Kdf
923,569 UART: [kat] LMS
1,171,897 UART: [kat] --
1,172,812 UART: [cold-reset] ++
1,173,208 UART: [fht] FHT @ 0x50003400
1,175,961 UART: [idev] ++
1,176,129 UART: [idev] CDI.KEYID = 6
1,176,489 UART: [idev] SUBJECT.KEYID = 7
1,176,913 UART: [idev] UDS.KEYID = 0
1,177,258 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,023 UART: [idev] Erasing UDS.KEYID = 0
1,202,566 UART: [idev] Sha1 KeyId Algorithm
1,211,100 UART: [idev] --
1,212,166 UART: [ldev] ++
1,212,334 UART: [ldev] CDI.KEYID = 6
1,212,697 UART: [ldev] SUBJECT.KEYID = 5
1,213,123 UART: [ldev] AUTHORITY.KEYID = 7
1,213,586 UART: [ldev] FE.KEYID = 1
1,218,994 UART: [ldev] Erasing FE.KEYID = 1
1,245,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,400 UART: [ldev] --
1,284,761 UART: [fwproc] Wait for Commands...
1,285,475 UART: [fwproc] Recv command 0x46574c44
1,286,203 UART: [fwproc] Recv'd Img size: 114168 bytes
1,306,433 UART: ROM Fatal Error: 0x000B0003
1,307,590 >>> mbox cmd response: failed
1,307,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,596 >>> mbox cmd response: failed
1,307,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
893,195 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,320 UART: [kat] ++
897,472 UART: [kat] sha1
901,834 UART: [kat] SHA2-256
903,774 UART: [kat] SHA2-384
906,291 UART: [kat] SHA2-512-ACC
908,192 UART: [kat] ECC-384
917,741 UART: [kat] HMAC-384Kdf
922,409 UART: [kat] LMS
1,170,737 UART: [kat] --
1,171,848 UART: [cold-reset] ++
1,172,364 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,167 UART: [idev] Erasing UDS.KEYID = 0
1,201,030 UART: [idev] Sha1 KeyId Algorithm
1,209,604 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,376 UART: [ldev] Erasing FE.KEYID = 1
1,243,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,132 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,311 UART: [fwproc] Recv command 0x46574c44
1,284,039 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,324 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,628 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,071 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,159,783 >>> mbox cmd response: failed
1,159,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,789 >>> mbox cmd response: failed
1,159,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,278 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Manufacturing
85,801 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,698 UART: [kat] SHA2-256
891,248 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,377 UART: [kat] ++
895,529 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,493 UART: [cold-reset] ++
1,170,033 UART: [fht] FHT @ 0x50003400
1,172,729 UART: [idev] ++
1,172,897 UART: [idev] CDI.KEYID = 6
1,173,258 UART: [idev] SUBJECT.KEYID = 7
1,173,683 UART: [idev] UDS.KEYID = 0
1,174,029 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,315 UART: [idev] Sha1 KeyId Algorithm
1,207,403 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,215,094 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,988 UART: [ldev] --
1,280,378 UART: [fwproc] Wait for Commands...
1,281,091 UART: [fwproc] Recv command 0x46574c44
1,281,824 UART: [fwproc] Recv'd Img size: 114168 bytes
1,301,599 UART: ROM Fatal Error: 0x000B0003
1,302,756 >>> mbox cmd response: failed
1,302,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,762 >>> mbox cmd response: failed
1,302,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,768 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,715 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,617 UART: [kat] ++
895,769 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,732 UART: [kat] SHA2-512-ACC
906,633 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
921,196 UART: [kat] LMS
1,169,508 UART: [kat] --
1,170,661 UART: [cold-reset] ++
1,171,067 UART: [fht] FHT @ 0x50003400
1,173,663 UART: [idev] ++
1,173,831 UART: [idev] CDI.KEYID = 6
1,174,192 UART: [idev] SUBJECT.KEYID = 7
1,174,617 UART: [idev] UDS.KEYID = 0
1,174,963 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,429 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,556 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,842 UART: [ldev] --
1,281,226 UART: [fwproc] Wait for Commands...
1,281,861 UART: [fwproc] Recv command 0x46574c44
1,282,594 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,347 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,656 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,290 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,910 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,351 >>> mbox cmd response: failed
1,156,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,357 >>> mbox cmd response: failed
1,156,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,363 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,904 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,320 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Manufacturing
86,120 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,096 UART: [kat] SHA2-256
902,036 UART: [kat] SHA2-384
904,703 UART: [kat] SHA2-512-ACC
906,604 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,396 UART: [fht] FHT @ 0x50003400
1,173,038 UART: [idev] ++
1,173,206 UART: [idev] CDI.KEYID = 6
1,173,567 UART: [idev] SUBJECT.KEYID = 7
1,173,992 UART: [idev] UDS.KEYID = 0
1,174,338 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,751 UART: [ldev] ++
1,209,919 UART: [ldev] CDI.KEYID = 6
1,210,283 UART: [ldev] SUBJECT.KEYID = 5
1,210,710 UART: [ldev] AUTHORITY.KEYID = 7
1,211,173 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,817 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,283,016 UART: [fwproc] Recv command 0x46574c44
1,283,749 UART: [fwproc] Recv'd Img size: 114168 bytes
1,304,264 UART: ROM Fatal Error: 0x000B0003
1,305,421 >>> mbox cmd response: failed
1,305,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,427 >>> mbox cmd response: failed
1,305,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,623 UART: [kat] SHA2-256
891,173 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,281 UART: [kat] SHA2-512-ACC
906,182 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,173,014 UART: [idev] ++
1,173,182 UART: [idev] CDI.KEYID = 6
1,173,543 UART: [idev] SUBJECT.KEYID = 7
1,173,968 UART: [idev] UDS.KEYID = 0
1,174,314 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,890 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,914 UART: [idev] --
1,208,989 UART: [ldev] ++
1,209,157 UART: [ldev] CDI.KEYID = 6
1,209,521 UART: [ldev] SUBJECT.KEYID = 5
1,209,948 UART: [ldev] AUTHORITY.KEYID = 7
1,210,411 UART: [ldev] FE.KEYID = 1
1,215,543 UART: [ldev] Erasing FE.KEYID = 1
1,241,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,491 UART: [ldev] --
1,280,967 UART: [fwproc] Wait for Commands...
1,281,570 UART: [fwproc] Recv command 0x46574c44
1,282,303 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,380 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,689 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,273 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,081 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,156,244 >>> mbox cmd response: failed
1,156,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,250 >>> mbox cmd response: failed
1,156,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,156,256 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,829 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
192,189 UART:
192,548 UART: Running Caliptra ROM ...
193,668 UART:
193,815 UART: [state] CFI Enabled
262,922 UART: [state] LifecycleState = Unprovisioned
264,824 UART: [state] DebugLocked = No
267,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,934 UART: [kat] SHA2-256
442,639 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,136 UART: [kat] ++
453,612 UART: [kat] sha1
463,577 UART: [kat] SHA2-256
466,249 UART: [kat] SHA2-384
473,153 UART: [kat] SHA2-512-ACC
475,492 UART: [kat] ECC-384
2,766,060 UART: [kat] HMAC-384Kdf
2,797,494 UART: [kat] LMS
3,987,778 UART: [kat] --
3,991,682 UART: [cold-reset] ++
3,992,653 UART: [fht] Storing FHT @ 0x50003400
4,004,189 UART: [idev] ++
4,004,759 UART: [idev] CDI.KEYID = 6
4,005,728 UART: [idev] SUBJECT.KEYID = 7
4,006,950 UART: [idev] UDS.KEYID = 0
4,009,622 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,153,211 UART: [idev] Erasing UDS.KEYID = 0
7,343,833 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,856 UART: [idev] --
7,368,477 UART: [ldev] ++
7,369,048 UART: [ldev] CDI.KEYID = 6
7,370,017 UART: [ldev] SUBJECT.KEYID = 5
7,371,181 UART: [ldev] AUTHORITY.KEYID = 7
7,372,473 UART: [ldev] FE.KEYID = 1
7,420,278 UART: [ldev] Erasing FE.KEYID = 1
10,751,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,905 UART: [ldev] --
13,115,996 UART: [fwproc] Waiting for Commands...
13,119,238 UART: [fwproc] Received command 0x46574c44
13,121,430 UART: [fwproc] Received Image of size 113844 bytes
13,216,885 UART: ROM Fatal Error: 0x000B001B
13,220,340 >>> mbox cmd response: failed
13,220,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,221,081 >>> mbox cmd response: failed
13,221,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,221,649 >>> mbox cmd response: failed
Initializing fuses
2,050,943 writing to cptra_bootfsm_go
2,240,259 UART:
2,240,616 UART: Running Caliptra ROM ...
2,241,716 UART:
2,241,876 UART: [state] CFI Enabled
2,314,641 UART: [state] LifecycleState = Unprovisioned
2,316,576 UART: [state] DebugLocked = No
2,318,779 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,519 UART: [kat] SHA2-256
2,493,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,731 UART: [kat] ++
2,504,189 UART: [kat] sha1
2,515,238 UART: [kat] SHA2-256
2,517,973 UART: [kat] SHA2-384
2,522,675 UART: [kat] SHA2-512-ACC
2,525,079 UART: [kat] ECC-384
4,819,000 UART: [kat] HMAC-384Kdf
4,830,866 UART: [kat] LMS
6,021,186 UART: [kat] --
6,024,880 UART: [cold-reset] ++
6,026,495 UART: [fht] Storing FHT @ 0x50003400
6,037,158 UART: [idev] ++
6,037,771 UART: [idev] CDI.KEYID = 6
6,038,691 UART: [idev] SUBJECT.KEYID = 7
6,039,911 UART: [idev] UDS.KEYID = 0
6,042,688 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,185,856 UART: [idev] Erasing UDS.KEYID = 0
9,375,363 UART: [idev] Using Sha1 for KeyId Algorithm
9,397,993 UART: [idev] --
9,403,360 UART: [ldev] ++
9,403,937 UART: [ldev] CDI.KEYID = 6
9,404,909 UART: [ldev] SUBJECT.KEYID = 5
9,406,197 UART: [ldev] AUTHORITY.KEYID = 7
9,407,400 UART: [ldev] FE.KEYID = 1
9,454,624 UART: [ldev] Erasing FE.KEYID = 1
12,785,702 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,077,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,092,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,107,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,121,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,141,279 UART: [ldev] --
15,146,167 UART: [fwproc] Waiting for Commands...
15,148,266 UART: [fwproc] Received command 0x46574c44
15,150,452 UART: [fwproc] Received Image of size 113844 bytes
19,201,594 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,279,721 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,348,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,665,469 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
3,788,657 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,960,966 >>> mbox cmd response: failed
12,961,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,961,836 >>> mbox cmd response: failed
12,962,105 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,962,394 >>> mbox cmd response: failed
Initializing fuses
2,046,548 writing to cptra_bootfsm_go
5,842,462 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,876,800 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,549 UART:
192,923 UART: Running Caliptra ROM ...
194,061 UART:
603,572 UART: [state] CFI Enabled
614,660 UART: [state] LifecycleState = Unprovisioned
616,571 UART: [state] DebugLocked = No
619,085 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,021 UART: [kat] SHA2-256
793,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,314 UART: [kat] ++
804,760 UART: [kat] sha1
816,354 UART: [kat] SHA2-256
819,045 UART: [kat] SHA2-384
825,245 UART: [kat] SHA2-512-ACC
827,637 UART: [kat] ECC-384
3,112,491 UART: [kat] HMAC-384Kdf
3,124,948 UART: [kat] LMS
4,315,069 UART: [kat] --
4,320,849 UART: [cold-reset] ++
4,322,894 UART: [fht] Storing FHT @ 0x50003400
4,333,464 UART: [idev] ++
4,334,084 UART: [idev] CDI.KEYID = 6
4,334,995 UART: [idev] SUBJECT.KEYID = 7
4,336,265 UART: [idev] UDS.KEYID = 0
4,338,911 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,482,087 UART: [idev] Erasing UDS.KEYID = 0
7,622,752 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,631 UART: [idev] --
7,648,770 UART: [ldev] ++
7,649,351 UART: [ldev] CDI.KEYID = 6
7,650,331 UART: [ldev] SUBJECT.KEYID = 5
7,651,410 UART: [ldev] AUTHORITY.KEYID = 7
7,652,752 UART: [ldev] FE.KEYID = 1
7,665,398 UART: [ldev] Erasing FE.KEYID = 1
10,954,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,757 UART: [ldev] --
13,316,289 UART: [fwproc] Waiting for Commands...
13,318,177 UART: [fwproc] Received command 0x46574c44
13,320,438 UART: [fwproc] Received Image of size 113844 bytes
13,419,061 UART: ROM Fatal Error: 0x000B001B
13,422,530 >>> mbox cmd response: failed
13,422,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,423,222 >>> mbox cmd response: failed
13,423,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,423,786 >>> mbox cmd response: failed
Initializing fuses
2,053,535 writing to cptra_bootfsm_go
2,242,877 UART:
2,243,231 UART: Running Caliptra ROM ...
2,244,280 UART:
7,044,281 UART: [state] CFI Enabled
7,058,770 UART: [state] LifecycleState = Unprovisioned
7,060,700 UART: [state] DebugLocked = No
7,063,129 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,067,268 UART: [kat] SHA2-256
7,237,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,247,521 UART: [kat] ++
7,248,064 UART: [kat] sha1
7,257,721 UART: [kat] SHA2-256
7,260,455 UART: [kat] SHA2-384
7,265,692 UART: [kat] SHA2-512-ACC
7,268,041 UART: [kat] ECC-384
9,552,619 UART: [kat] HMAC-384Kdf
9,565,432 UART: [kat] LMS
10,755,537 UART: [kat] --
10,758,942 UART: [cold-reset] ++
10,759,849 UART: [fht] Storing FHT @ 0x50003400
10,771,873 UART: [idev] ++
10,772,455 UART: [idev] CDI.KEYID = 6
10,773,362 UART: [idev] SUBJECT.KEYID = 7
10,774,879 UART: [idev] UDS.KEYID = 0
10,777,577 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,920,557 UART: [idev] Erasing UDS.KEYID = 0
14,061,209 UART: [idev] Using Sha1 for KeyId Algorithm
14,082,263 UART: [idev] --
14,087,716 UART: [ldev] ++
14,088,286 UART: [ldev] CDI.KEYID = 6
14,089,231 UART: [ldev] SUBJECT.KEYID = 5
14,090,482 UART: [ldev] AUTHORITY.KEYID = 7
14,091,725 UART: [ldev] FE.KEYID = 1
14,103,541 UART: [ldev] Erasing FE.KEYID = 1
17,395,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,685,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,748,365 UART: [ldev] --
19,753,959 UART: [fwproc] Waiting for Commands...
19,757,082 UART: [fwproc] Received command 0x46574c44
19,759,266 UART: [fwproc] Received Image of size 113844 bytes
23,807,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,888,497 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,957,347 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,273,337 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
4,138,147 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,160,022 >>> mbox cmd response: failed
13,160,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,160,943 >>> mbox cmd response: failed
13,161,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,529 >>> mbox cmd response: failed
Initializing fuses
2,048,805 writing to cptra_bootfsm_go
10,831,134 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,760,209 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,424 UART:
192,792 UART: Running Caliptra ROM ...
193,996 UART:
194,147 UART: [state] CFI Enabled
262,318 UART: [state] LifecycleState = Unprovisioned
264,205 UART: [state] DebugLocked = No
266,459 UART: [state] WD Timer not started. Device not locked for debugging
269,918 UART: [kat] SHA2-256
449,000 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,582 UART: [kat] ++
461,126 UART: [kat] sha1
472,064 UART: [kat] SHA2-256
475,070 UART: [kat] SHA2-384
482,504 UART: [kat] SHA2-512-ACC
485,437 UART: [kat] ECC-384
2,945,997 UART: [kat] HMAC-384Kdf
2,969,348 UART: [kat] LMS
3,498,776 UART: [kat] --
3,502,850 UART: [cold-reset] ++
3,505,276 UART: [fht] FHT @ 0x50003400
3,515,606 UART: [idev] ++
3,516,191 UART: [idev] CDI.KEYID = 6
3,517,101 UART: [idev] SUBJECT.KEYID = 7
3,518,262 UART: [idev] UDS.KEYID = 0
3,521,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,664,822 UART: [idev] Erasing UDS.KEYID = 0
6,025,255 UART: [idev] Sha1 KeyId Algorithm
6,047,786 UART: [idev] --
6,052,973 UART: [ldev] ++
6,053,586 UART: [ldev] CDI.KEYID = 6
6,054,505 UART: [ldev] SUBJECT.KEYID = 5
6,055,671 UART: [ldev] AUTHORITY.KEYID = 7
6,056,909 UART: [ldev] FE.KEYID = 1
6,097,374 UART: [ldev] Erasing FE.KEYID = 1
8,602,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,673 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,148 UART: [ldev] --
10,413,089 UART: [fwproc] Wait for Commands...
10,415,243 UART: [fwproc] Recv command 0x46574c44
10,417,295 UART: [fwproc] Recv'd Img size: 114168 bytes
10,522,072 UART: ROM Fatal Error: 0x000B001B
10,525,174 >>> mbox cmd response: failed
10,525,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,818 >>> mbox cmd response: failed
10,526,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,526,380 >>> mbox cmd response: failed
Initializing fuses
2,052,799 writing to cptra_bootfsm_go
2,242,130 UART:
2,242,480 UART: Running Caliptra ROM ...
2,243,620 UART:
2,243,785 UART: [state] CFI Enabled
2,299,424 UART: [state] LifecycleState = Unprovisioned
2,301,288 UART: [state] DebugLocked = No
2,303,002 UART: [state] WD Timer not started. Device not locked for debugging
2,307,350 UART: [kat] SHA2-256
2,486,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,498,048 UART: [kat] ++
2,498,601 UART: [kat] sha1
2,509,820 UART: [kat] SHA2-256
2,512,834 UART: [kat] SHA2-384
2,520,383 UART: [kat] SHA2-512-ACC
2,523,327 UART: [kat] ECC-384
4,978,485 UART: [kat] HMAC-384Kdf
5,002,985 UART: [kat] LMS
5,532,407 UART: [kat] --
5,535,806 UART: [cold-reset] ++
5,537,091 UART: [fht] FHT @ 0x50003400
5,548,886 UART: [idev] ++
5,549,452 UART: [idev] CDI.KEYID = 6
5,550,359 UART: [idev] SUBJECT.KEYID = 7
5,551,576 UART: [idev] UDS.KEYID = 0
5,554,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,698,034 UART: [idev] Erasing UDS.KEYID = 0
8,055,694 UART: [idev] Sha1 KeyId Algorithm
8,078,505 UART: [idev] --
8,082,293 UART: [ldev] ++
8,082,870 UART: [ldev] CDI.KEYID = 6
8,083,787 UART: [ldev] SUBJECT.KEYID = 5
8,085,058 UART: [ldev] AUTHORITY.KEYID = 7
8,086,260 UART: [ldev] FE.KEYID = 1
8,131,110 UART: [ldev] Erasing FE.KEYID = 1
10,635,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,375,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,391,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,407,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,423,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,442,967 UART: [ldev] --
12,448,179 UART: [fwproc] Wait for Commands...
12,450,224 UART: [fwproc] Recv command 0x46574c44
12,452,283 UART: [fwproc] Recv'd Img size: 114168 bytes
15,855,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,933,359 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,002,136 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,320,147 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,362,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,303,727 >>> mbox cmd response: failed
10,304,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,304,661 >>> mbox cmd response: failed
10,304,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,305,294 >>> mbox cmd response: failed
Initializing fuses
2,055,999 writing to cptra_bootfsm_go
5,407,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,093,577 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,667 UART:
193,023 UART: Running Caliptra ROM ...
194,199 UART:
603,728 UART: [state] CFI Enabled
618,040 UART: [state] LifecycleState = Unprovisioned
619,897 UART: [state] DebugLocked = No
621,440 UART: [state] WD Timer not started. Device not locked for debugging
624,846 UART: [kat] SHA2-256
804,013 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,567 UART: [kat] ++
816,017 UART: [kat] sha1
827,489 UART: [kat] SHA2-256
830,494 UART: [kat] SHA2-384
835,395 UART: [kat] SHA2-512-ACC
838,386 UART: [kat] ECC-384
3,279,913 UART: [kat] HMAC-384Kdf
3,291,408 UART: [kat] LMS
3,820,932 UART: [kat] --
3,824,653 UART: [cold-reset] ++
3,826,857 UART: [fht] FHT @ 0x50003400
3,838,157 UART: [idev] ++
3,838,730 UART: [idev] CDI.KEYID = 6
3,839,640 UART: [idev] SUBJECT.KEYID = 7
3,840,802 UART: [idev] UDS.KEYID = 0
3,843,918 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,558 UART: [idev] Erasing UDS.KEYID = 0
6,318,300 UART: [idev] Sha1 KeyId Algorithm
6,341,372 UART: [idev] --
6,345,426 UART: [ldev] ++
6,345,995 UART: [ldev] CDI.KEYID = 6
6,346,902 UART: [ldev] SUBJECT.KEYID = 5
6,348,115 UART: [ldev] AUTHORITY.KEYID = 7
6,349,347 UART: [ldev] FE.KEYID = 1
6,360,533 UART: [ldev] Erasing FE.KEYID = 1
8,832,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,088 UART: [ldev] --
10,624,655 UART: [fwproc] Wait for Commands...
10,627,404 UART: [fwproc] Recv command 0x46574c44
10,629,511 UART: [fwproc] Recv'd Img size: 114168 bytes
10,727,847 UART: ROM Fatal Error: 0x000B001B
10,730,987 >>> mbox cmd response: failed
10,731,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,731,718 >>> mbox cmd response: failed
10,732,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,732,383 >>> mbox cmd response: failed
Initializing fuses
2,061,153 writing to cptra_bootfsm_go
2,250,470 UART:
2,250,838 UART: Running Caliptra ROM ...
2,251,994 UART:
9,722,612 UART: [state] CFI Enabled
9,737,615 UART: [state] LifecycleState = Unprovisioned
9,739,479 UART: [state] DebugLocked = No
9,742,278 UART: [state] WD Timer not started. Device not locked for debugging
9,745,701 UART: [kat] SHA2-256
9,924,848 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,936,432 UART: [kat] ++
9,936,980 UART: [kat] sha1
9,948,419 UART: [kat] SHA2-256
9,951,436 UART: [kat] SHA2-384
9,958,012 UART: [kat] SHA2-512-ACC
9,960,892 UART: [kat] ECC-384
12,400,937 UART: [kat] HMAC-384Kdf
12,413,436 UART: [kat] LMS
12,942,899 UART: [kat] --
12,946,927 UART: [cold-reset] ++
12,949,183 UART: [fht] FHT @ 0x50003400
12,960,159 UART: [idev] ++
12,960,719 UART: [idev] CDI.KEYID = 6
12,961,625 UART: [idev] SUBJECT.KEYID = 7
12,962,838 UART: [idev] UDS.KEYID = 0
12,965,873 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,109,399 UART: [idev] Erasing UDS.KEYID = 0
15,437,786 UART: [idev] Sha1 KeyId Algorithm
15,461,177 UART: [idev] --
15,465,171 UART: [ldev] ++
15,465,746 UART: [ldev] CDI.KEYID = 6
15,466,659 UART: [ldev] SUBJECT.KEYID = 5
15,467,871 UART: [ldev] AUTHORITY.KEYID = 7
15,469,096 UART: [ldev] FE.KEYID = 1
15,477,478 UART: [ldev] Erasing FE.KEYID = 1
17,951,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,668,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,684,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,700,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,716,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,736,132 UART: [ldev] --
19,740,763 UART: [fwproc] Wait for Commands...
19,742,650 UART: [fwproc] Recv command 0x46574c44
19,744,693 UART: [fwproc] Recv'd Img size: 114168 bytes
23,148,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,221,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,290,514 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,607,881 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,534 writing to cptra_bootfsm_go
3,699,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,504,642 >>> mbox cmd response: failed
10,505,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,754 >>> mbox cmd response: failed
10,506,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,326 >>> mbox cmd response: failed
Initializing fuses
2,055,188 writing to cptra_bootfsm_go
13,061,232 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,630,673 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,216 UART:
192,598 UART: Running Caliptra ROM ...
193,741 UART:
193,889 UART: [state] CFI Enabled
262,983 UART: [state] LifecycleState = Unprovisioned
265,402 UART: [state] DebugLocked = No
267,655 UART: [state] WD Timer not started. Device not locked for debugging
271,620 UART: [kat] SHA2-256
461,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,295 UART: [kat] ++
472,741 UART: [kat] sha1
485,238 UART: [kat] SHA2-256
488,250 UART: [kat] SHA2-384
493,697 UART: [kat] SHA2-512-ACC
496,296 UART: [kat] ECC-384
2,945,130 UART: [kat] HMAC-384Kdf
2,968,885 UART: [kat] LMS
3,500,650 UART: [kat] --
3,504,542 UART: [cold-reset] ++
3,505,832 UART: [fht] FHT @ 0x50003400
3,517,572 UART: [idev] ++
3,518,248 UART: [idev] CDI.KEYID = 6
3,519,264 UART: [idev] SUBJECT.KEYID = 7
3,520,366 UART: [idev] UDS.KEYID = 0
3,523,047 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,666,853 UART: [idev] Erasing UDS.KEYID = 0
6,025,478 UART: [idev] Sha1 KeyId Algorithm
6,046,976 UART: [idev] --
6,052,873 UART: [ldev] ++
6,053,565 UART: [ldev] CDI.KEYID = 6
6,054,490 UART: [ldev] SUBJECT.KEYID = 5
6,055,653 UART: [ldev] AUTHORITY.KEYID = 7
6,056,905 UART: [ldev] FE.KEYID = 1
6,097,115 UART: [ldev] Erasing FE.KEYID = 1
8,599,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,519 UART: [ldev] --
10,409,946 UART: [fwproc] Wait for Commands...
10,412,532 UART: [fwproc] Recv command 0x46574c44
10,414,893 UART: [fwproc] Recv'd Img size: 114168 bytes
10,541,951 UART: ROM Fatal Error: 0x000B001B
10,545,596 >>> mbox cmd response: failed
10,546,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,373 >>> mbox cmd response: failed
10,546,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,958 >>> mbox cmd response: failed
Initializing fuses
2,053,176 writing to cptra_bootfsm_go
2,242,469 UART:
2,242,808 UART: Running Caliptra ROM ...
2,243,951 UART:
2,244,125 UART: [state] CFI Enabled
2,300,910 UART: [state] LifecycleState = Unprovisioned
2,303,287 UART: [state] DebugLocked = No
2,305,979 UART: [state] WD Timer not started. Device not locked for debugging
2,310,891 UART: [kat] SHA2-256
2,500,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,511,538 UART: [kat] ++
2,512,046 UART: [kat] sha1
2,524,187 UART: [kat] SHA2-256
2,527,219 UART: [kat] SHA2-384
2,534,184 UART: [kat] SHA2-512-ACC
2,536,753 UART: [kat] ECC-384
4,984,862 UART: [kat] HMAC-384Kdf
5,007,588 UART: [kat] LMS
5,539,356 UART: [kat] --
5,544,262 UART: [cold-reset] ++
5,545,324 UART: [fht] FHT @ 0x50003400
5,556,957 UART: [idev] ++
5,557,652 UART: [idev] CDI.KEYID = 6
5,558,594 UART: [idev] SUBJECT.KEYID = 7
5,559,803 UART: [idev] UDS.KEYID = 0
5,562,334 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,705,900 UART: [idev] Erasing UDS.KEYID = 0
8,066,446 UART: [idev] Sha1 KeyId Algorithm
8,089,800 UART: [idev] --
8,093,750 UART: [ldev] ++
8,094,447 UART: [ldev] CDI.KEYID = 6
8,095,366 UART: [ldev] SUBJECT.KEYID = 5
8,096,529 UART: [ldev] AUTHORITY.KEYID = 7
8,097,708 UART: [ldev] FE.KEYID = 1
8,135,829 UART: [ldev] Erasing FE.KEYID = 1
10,644,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,444,086 UART: [ldev] --
12,448,988 UART: [fwproc] Wait for Commands...
12,451,516 UART: [fwproc] Recv command 0x46574c44
12,453,798 UART: [fwproc] Recv'd Img size: 114168 bytes
15,891,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,969,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,085,347 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,626,670 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,441,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,342,047 >>> mbox cmd response: failed
10,342,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,342,945 >>> mbox cmd response: failed
10,343,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,531 >>> mbox cmd response: failed
Initializing fuses
2,050,734 writing to cptra_bootfsm_go
5,490,427 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,781,436 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,537 UART:
192,887 UART: Running Caliptra ROM ...
193,988 UART:
603,534 UART: [state] CFI Enabled
615,659 UART: [state] LifecycleState = Unprovisioned
618,032 UART: [state] DebugLocked = No
619,226 UART: [state] WD Timer not started. Device not locked for debugging
624,041 UART: [kat] SHA2-256
813,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,718 UART: [kat] ++
825,223 UART: [kat] sha1
837,671 UART: [kat] SHA2-256
840,686 UART: [kat] SHA2-384
845,534 UART: [kat] SHA2-512-ACC
848,114 UART: [kat] ECC-384
3,291,517 UART: [kat] HMAC-384Kdf
3,304,027 UART: [kat] LMS
3,835,830 UART: [kat] --
3,837,844 UART: [cold-reset] ++
3,839,507 UART: [fht] FHT @ 0x50003400
3,850,486 UART: [idev] ++
3,851,165 UART: [idev] CDI.KEYID = 6
3,852,141 UART: [idev] SUBJECT.KEYID = 7
3,853,358 UART: [idev] UDS.KEYID = 0
3,856,248 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,000,219 UART: [idev] Erasing UDS.KEYID = 0
6,332,986 UART: [idev] Sha1 KeyId Algorithm
6,356,328 UART: [idev] --
6,361,407 UART: [ldev] ++
6,362,091 UART: [ldev] CDI.KEYID = 6
6,363,025 UART: [ldev] SUBJECT.KEYID = 5
6,364,189 UART: [ldev] AUTHORITY.KEYID = 7
6,365,420 UART: [ldev] FE.KEYID = 1
6,374,669 UART: [ldev] Erasing FE.KEYID = 1
8,859,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,421 UART: [ldev] --
10,649,184 UART: [fwproc] Wait for Commands...
10,650,642 UART: [fwproc] Recv command 0x46574c44
10,652,918 UART: [fwproc] Recv'd Img size: 114168 bytes
10,777,393 UART: ROM Fatal Error: 0x000B001B
10,781,077 >>> mbox cmd response: failed
10,781,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,781,836 >>> mbox cmd response: failed
10,782,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,782,398 >>> mbox cmd response: failed
Initializing fuses
2,060,730 writing to cptra_bootfsm_go
2,250,100 UART:
2,250,459 UART: Running Caliptra ROM ...
2,251,600 UART:
9,679,618 UART: [state] CFI Enabled
9,694,954 UART: [state] LifecycleState = Unprovisioned
9,697,347 UART: [state] DebugLocked = No
9,699,721 UART: [state] WD Timer not started. Device not locked for debugging
9,704,897 UART: [kat] SHA2-256
9,894,811 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,905,574 UART: [kat] ++
9,906,179 UART: [kat] sha1
9,918,485 UART: [kat] SHA2-256
9,921,518 UART: [kat] SHA2-384
9,928,230 UART: [kat] SHA2-512-ACC
9,930,840 UART: [kat] ECC-384
12,375,106 UART: [kat] HMAC-384Kdf
12,388,259 UART: [kat] LMS
12,920,044 UART: [kat] --
12,924,630 UART: [cold-reset] ++
12,926,558 UART: [fht] FHT @ 0x50003400
12,936,728 UART: [idev] ++
12,937,413 UART: [idev] CDI.KEYID = 6
12,938,433 UART: [idev] SUBJECT.KEYID = 7
12,939,592 UART: [idev] UDS.KEYID = 0
12,942,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,085,902 UART: [idev] Erasing UDS.KEYID = 0
15,416,117 UART: [idev] Sha1 KeyId Algorithm
15,439,999 UART: [idev] --
15,444,638 UART: [ldev] ++
15,445,355 UART: [ldev] CDI.KEYID = 6
15,446,272 UART: [ldev] SUBJECT.KEYID = 5
15,447,433 UART: [ldev] AUTHORITY.KEYID = 7
15,448,667 UART: [ldev] FE.KEYID = 1
15,459,365 UART: [ldev] Erasing FE.KEYID = 1
17,935,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,657,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,672,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,688,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,703,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,724,725 UART: [ldev] --
19,730,112 UART: [fwproc] Wait for Commands...
19,733,246 UART: [fwproc] Recv command 0x46574c44
19,735,513 UART: [fwproc] Recv'd Img size: 114168 bytes
23,185,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,266,438 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,382,629 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,924,797 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,761,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,572,730 >>> mbox cmd response: failed
10,573,461 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,573,816 >>> mbox cmd response: failed
10,574,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,574,426 >>> mbox cmd response: failed
Initializing fuses
2,052,009 writing to cptra_bootfsm_go
13,039,952 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,227,985 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,199 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,361 UART: [kat] SHA2-256
892,299 UART: [kat] SHA2-384
895,070 UART: [kat] SHA2-512-ACC
896,971 UART: [kat] ECC-384
902,758 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,679 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,916 UART: [idev] Erasing UDS.KEYID = 0
1,505,152 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,912 UART: [idev] --
1,515,005 UART: [ldev] ++
1,515,173 UART: [ldev] CDI.KEYID = 6
1,515,536 UART: [ldev] SUBJECT.KEYID = 5
1,515,962 UART: [ldev] AUTHORITY.KEYID = 7
1,516,425 UART: [ldev] FE.KEYID = 1
1,521,879 UART: [ldev] Erasing FE.KEYID = 1
1,547,188 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,968 UART: [ldev] --
1,586,273 UART: [fwproc] Waiting for Commands...
1,587,040 UART: [fwproc] Received command 0x46574c44
1,587,831 UART: [fwproc] Received Image of size 114168 bytes
1,623,702 UART: ROM Fatal Error: 0x000B001B
1,624,861 >>> mbox cmd response: failed
1,624,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,867 >>> mbox cmd response: failed
1,624,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,558 UART: [state] LifecycleState = Unprovisioned
85,213 UART: [state] DebugLocked = No
85,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,391 UART: [kat] SHA2-256
881,322 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,437 UART: [kat] ++
885,589 UART: [kat] sha1
889,895 UART: [kat] SHA2-256
891,833 UART: [kat] SHA2-384
894,500 UART: [kat] SHA2-512-ACC
896,401 UART: [kat] ECC-384
901,998 UART: [kat] HMAC-384Kdf
906,682 UART: [kat] LMS
1,474,878 UART: [kat] --
1,475,903 UART: [cold-reset] ++
1,476,271 UART: [fht] Storing FHT @ 0x50003400
1,479,064 UART: [idev] ++
1,479,232 UART: [idev] CDI.KEYID = 6
1,479,592 UART: [idev] SUBJECT.KEYID = 7
1,480,016 UART: [idev] UDS.KEYID = 0
1,480,361 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,934 UART: [idev] Erasing UDS.KEYID = 0
1,504,766 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,264 UART: [idev] --
1,514,241 UART: [ldev] ++
1,514,409 UART: [ldev] CDI.KEYID = 6
1,514,772 UART: [ldev] SUBJECT.KEYID = 5
1,515,198 UART: [ldev] AUTHORITY.KEYID = 7
1,515,661 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,545,786 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,872 UART: [ldev] --
1,585,197 UART: [fwproc] Waiting for Commands...
1,585,854 UART: [fwproc] Received command 0x46574c44
1,586,645 UART: [fwproc] Received Image of size 114168 bytes
2,882,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,909,860 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,074,725 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,476,192 >>> mbox cmd response: failed
1,476,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,198 >>> mbox cmd response: failed
1,476,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,857 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,111 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,426 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,930 UART: [kat] SHA2-256
881,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,976 UART: [kat] ++
886,128 UART: [kat] sha1
890,330 UART: [kat] SHA2-256
892,268 UART: [kat] SHA2-384
895,245 UART: [kat] SHA2-512-ACC
897,146 UART: [kat] ECC-384
902,577 UART: [kat] HMAC-384Kdf
907,257 UART: [kat] LMS
1,475,453 UART: [kat] --
1,476,170 UART: [cold-reset] ++
1,476,696 UART: [fht] Storing FHT @ 0x50003400
1,479,337 UART: [idev] ++
1,479,505 UART: [idev] CDI.KEYID = 6
1,479,865 UART: [idev] SUBJECT.KEYID = 7
1,480,289 UART: [idev] UDS.KEYID = 0
1,480,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,865 UART: [idev] Erasing UDS.KEYID = 0
1,504,245 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,963 UART: [idev] --
1,513,854 UART: [ldev] ++
1,514,022 UART: [ldev] CDI.KEYID = 6
1,514,385 UART: [ldev] SUBJECT.KEYID = 5
1,514,811 UART: [ldev] AUTHORITY.KEYID = 7
1,515,274 UART: [ldev] FE.KEYID = 1
1,520,640 UART: [ldev] Erasing FE.KEYID = 1
1,545,979 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,683 UART: [ldev] --
1,584,972 UART: [fwproc] Waiting for Commands...
1,585,761 UART: [fwproc] Received command 0x46574c44
1,586,552 UART: [fwproc] Received Image of size 114168 bytes
1,622,211 UART: ROM Fatal Error: 0x000B001B
1,623,370 >>> mbox cmd response: failed
1,623,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,376 >>> mbox cmd response: failed
1,623,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,623,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
87,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,696 UART: [kat] SHA2-256
882,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,742 UART: [kat] ++
886,894 UART: [kat] sha1
891,206 UART: [kat] SHA2-256
893,144 UART: [kat] SHA2-384
895,819 UART: [kat] SHA2-512-ACC
897,720 UART: [kat] ECC-384
903,259 UART: [kat] HMAC-384Kdf
908,029 UART: [kat] LMS
1,476,225 UART: [kat] --
1,477,212 UART: [cold-reset] ++
1,477,790 UART: [fht] Storing FHT @ 0x50003400
1,480,789 UART: [idev] ++
1,480,957 UART: [idev] CDI.KEYID = 6
1,481,317 UART: [idev] SUBJECT.KEYID = 7
1,481,741 UART: [idev] UDS.KEYID = 0
1,482,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,069 UART: [idev] Erasing UDS.KEYID = 0
1,506,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,673 UART: [idev] --
1,515,762 UART: [ldev] ++
1,515,930 UART: [ldev] CDI.KEYID = 6
1,516,293 UART: [ldev] SUBJECT.KEYID = 5
1,516,719 UART: [ldev] AUTHORITY.KEYID = 7
1,517,182 UART: [ldev] FE.KEYID = 1
1,522,406 UART: [ldev] Erasing FE.KEYID = 1
1,547,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,286 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,847 UART: [ldev] --
1,587,182 UART: [fwproc] Waiting for Commands...
1,587,887 UART: [fwproc] Received command 0x46574c44
1,588,678 UART: [fwproc] Received Image of size 114168 bytes
2,885,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,825 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,692 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,352 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,477,691 >>> mbox cmd response: failed
1,477,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,697 >>> mbox cmd response: failed
1,477,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,736 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,502 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
893,088 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,213 UART: [kat] ++
897,365 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,324 UART: [kat] SHA2-512-ACC
908,225 UART: [kat] ECC-384
918,026 UART: [kat] HMAC-384Kdf
922,710 UART: [kat] LMS
1,171,038 UART: [kat] --
1,171,765 UART: [cold-reset] ++
1,172,265 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,116 UART: [idev] Erasing UDS.KEYID = 0
1,201,007 UART: [idev] Sha1 KeyId Algorithm
1,209,345 UART: [idev] --
1,210,555 UART: [ldev] ++
1,210,723 UART: [ldev] CDI.KEYID = 6
1,211,086 UART: [ldev] SUBJECT.KEYID = 5
1,211,512 UART: [ldev] AUTHORITY.KEYID = 7
1,211,975 UART: [ldev] FE.KEYID = 1
1,217,075 UART: [ldev] Erasing FE.KEYID = 1
1,243,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,506 UART: [fwproc] Recv command 0x46574c44
1,284,234 UART: [fwproc] Recv'd Img size: 114168 bytes
1,319,377 UART: ROM Fatal Error: 0x000B001B
1,320,536 >>> mbox cmd response: failed
1,320,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,542 >>> mbox cmd response: failed
1,320,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
918,046 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,171,701 UART: [cold-reset] ++
1,172,221 UART: [fht] FHT @ 0x50003400
1,174,790 UART: [idev] ++
1,174,958 UART: [idev] CDI.KEYID = 6
1,175,318 UART: [idev] SUBJECT.KEYID = 7
1,175,742 UART: [idev] UDS.KEYID = 0
1,176,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,192 UART: [idev] Erasing UDS.KEYID = 0
1,200,393 UART: [idev] Sha1 KeyId Algorithm
1,208,995 UART: [idev] --
1,209,929 UART: [ldev] ++
1,210,097 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,242,586 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,529 UART: [ldev] --
1,281,970 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,745 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,049 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,622 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,881 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,173,063 >>> mbox cmd response: failed
1,173,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,069 >>> mbox cmd response: failed
1,173,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,635 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,271 UART: [kat] SHA2-256
893,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,046 UART: [kat] ++
898,198 UART: [kat] sha1
902,612 UART: [kat] SHA2-256
904,552 UART: [kat] SHA2-384
907,353 UART: [kat] SHA2-512-ACC
909,254 UART: [kat] ECC-384
918,929 UART: [kat] HMAC-384Kdf
923,673 UART: [kat] LMS
1,172,001 UART: [kat] --
1,172,682 UART: [cold-reset] ++
1,173,122 UART: [fht] FHT @ 0x50003400
1,175,767 UART: [idev] ++
1,175,935 UART: [idev] CDI.KEYID = 6
1,176,295 UART: [idev] SUBJECT.KEYID = 7
1,176,719 UART: [idev] UDS.KEYID = 0
1,177,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,765 UART: [idev] Erasing UDS.KEYID = 0
1,201,366 UART: [idev] Sha1 KeyId Algorithm
1,209,820 UART: [idev] --
1,210,894 UART: [ldev] ++
1,211,062 UART: [ldev] CDI.KEYID = 6
1,211,425 UART: [ldev] SUBJECT.KEYID = 5
1,211,851 UART: [ldev] AUTHORITY.KEYID = 7
1,212,314 UART: [ldev] FE.KEYID = 1
1,217,446 UART: [ldev] Erasing FE.KEYID = 1
1,243,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,632 UART: [ldev] --
1,283,071 UART: [fwproc] Wait for Commands...
1,283,893 UART: [fwproc] Recv command 0x46574c44
1,284,621 UART: [fwproc] Recv'd Img size: 114168 bytes
1,320,152 UART: ROM Fatal Error: 0x000B001B
1,321,311 >>> mbox cmd response: failed
1,321,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,317 >>> mbox cmd response: failed
1,321,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
893,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,564 UART: [kat] ++
897,716 UART: [kat] sha1
901,946 UART: [kat] SHA2-256
903,886 UART: [kat] SHA2-384
906,615 UART: [kat] SHA2-512-ACC
908,516 UART: [kat] ECC-384
918,707 UART: [kat] HMAC-384Kdf
923,525 UART: [kat] LMS
1,171,853 UART: [kat] --
1,172,590 UART: [cold-reset] ++
1,173,076 UART: [fht] FHT @ 0x50003400
1,175,605 UART: [idev] ++
1,175,773 UART: [idev] CDI.KEYID = 6
1,176,133 UART: [idev] SUBJECT.KEYID = 7
1,176,557 UART: [idev] UDS.KEYID = 0
1,176,902 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,489 UART: [idev] Erasing UDS.KEYID = 0
1,201,670 UART: [idev] Sha1 KeyId Algorithm
1,210,126 UART: [idev] --
1,211,380 UART: [ldev] ++
1,211,548 UART: [ldev] CDI.KEYID = 6
1,211,911 UART: [ldev] SUBJECT.KEYID = 5
1,212,337 UART: [ldev] AUTHORITY.KEYID = 7
1,212,800 UART: [ldev] FE.KEYID = 1
1,218,130 UART: [ldev] Erasing FE.KEYID = 1
1,243,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,400 UART: [ldev] --
1,282,675 UART: [fwproc] Wait for Commands...
1,283,391 UART: [fwproc] Recv command 0x46574c44
1,284,119 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,898 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,202 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,849 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,516 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,176,602 >>> mbox cmd response: failed
1,176,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,608 >>> mbox cmd response: failed
1,176,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,316 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,672 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
915,672 UART: [kat] HMAC-384Kdf
920,258 UART: [kat] LMS
1,168,570 UART: [kat] --
1,169,133 UART: [cold-reset] ++
1,169,689 UART: [fht] FHT @ 0x50003400
1,172,367 UART: [idev] ++
1,172,535 UART: [idev] CDI.KEYID = 6
1,172,896 UART: [idev] SUBJECT.KEYID = 7
1,173,321 UART: [idev] UDS.KEYID = 0
1,173,667 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,180,997 UART: [idev] Erasing UDS.KEYID = 0
1,197,433 UART: [idev] Sha1 KeyId Algorithm
1,206,323 UART: [idev] --
1,207,552 UART: [ldev] ++
1,207,720 UART: [ldev] CDI.KEYID = 6
1,208,084 UART: [ldev] SUBJECT.KEYID = 5
1,208,511 UART: [ldev] AUTHORITY.KEYID = 7
1,208,974 UART: [ldev] FE.KEYID = 1
1,214,298 UART: [ldev] Erasing FE.KEYID = 1
1,240,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,802 UART: [ldev] --
1,280,106 UART: [fwproc] Wait for Commands...
1,280,785 UART: [fwproc] Recv command 0x46574c44
1,281,518 UART: [fwproc] Recv'd Img size: 114168 bytes
1,316,049 UART: ROM Fatal Error: 0x000B001B
1,317,208 >>> mbox cmd response: failed
1,317,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,214 >>> mbox cmd response: failed
1,317,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,710 UART: [state] LifecycleState = Unprovisioned
85,365 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,116 UART: [kat] SHA2-256
890,666 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,795 UART: [kat] ++
894,947 UART: [kat] sha1
899,171 UART: [kat] SHA2-256
901,111 UART: [kat] SHA2-384
903,952 UART: [kat] SHA2-512-ACC
905,853 UART: [kat] ECC-384
915,510 UART: [kat] HMAC-384Kdf
920,168 UART: [kat] LMS
1,168,480 UART: [kat] --
1,169,477 UART: [cold-reset] ++
1,169,901 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,174,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,279 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,585 UART: [idev] --
1,208,712 UART: [ldev] ++
1,208,880 UART: [ldev] CDI.KEYID = 6
1,209,244 UART: [ldev] SUBJECT.KEYID = 5
1,209,671 UART: [ldev] AUTHORITY.KEYID = 7
1,210,134 UART: [ldev] FE.KEYID = 1
1,215,500 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,870 UART: [ldev] --
1,281,246 UART: [fwproc] Wait for Commands...
1,281,951 UART: [fwproc] Recv command 0x46574c44
1,282,684 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,563 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,634,872 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,496 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,169,751 >>> mbox cmd response: failed
1,169,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,169,757 >>> mbox cmd response: failed
1,169,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,169,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,590 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
900,140 UART: [kat] SHA2-256
902,080 UART: [kat] SHA2-384
904,835 UART: [kat] SHA2-512-ACC
906,736 UART: [kat] ECC-384
916,419 UART: [kat] HMAC-384Kdf
921,161 UART: [kat] LMS
1,169,473 UART: [kat] --
1,170,486 UART: [cold-reset] ++
1,170,994 UART: [fht] FHT @ 0x50003400
1,173,556 UART: [idev] ++
1,173,724 UART: [idev] CDI.KEYID = 6
1,174,085 UART: [idev] SUBJECT.KEYID = 7
1,174,510 UART: [idev] UDS.KEYID = 0
1,174,856 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,924 UART: [idev] Erasing UDS.KEYID = 0
1,199,700 UART: [idev] Sha1 KeyId Algorithm
1,208,408 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,567 UART: [fwproc] Wait for Commands...
1,282,372 UART: [fwproc] Recv command 0x46574c44
1,283,105 UART: [fwproc] Recv'd Img size: 114168 bytes
1,318,640 UART: ROM Fatal Error: 0x000B001B
1,319,799 >>> mbox cmd response: failed
1,319,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,805 >>> mbox cmd response: failed
1,319,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,302 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
891,185 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,378 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,174,558 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,328 UART: [idev] Sha1 KeyId Algorithm
1,208,328 UART: [idev] --
1,209,497 UART: [ldev] ++
1,209,665 UART: [ldev] CDI.KEYID = 6
1,210,029 UART: [ldev] SUBJECT.KEYID = 5
1,210,456 UART: [ldev] AUTHORITY.KEYID = 7
1,210,919 UART: [ldev] FE.KEYID = 1
1,216,205 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,695 UART: [ldev] --
1,282,047 UART: [fwproc] Wait for Commands...
1,282,666 UART: [fwproc] Recv command 0x46574c44
1,283,399 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,506 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,815 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,421 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,761 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,171,582 >>> mbox cmd response: failed
1,171,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,588 >>> mbox cmd response: failed
1,171,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,171,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,503 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,521 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,126 UART:
192,491 UART: Running Caliptra ROM ...
193,671 UART:
193,831 UART: [state] CFI Enabled
262,417 UART: [state] LifecycleState = Manufacturing
264,390 UART: [state] DebugLocked = No
266,659 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,773 UART: [kat] SHA2-256
440,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,952 UART: [kat] ++
451,538 UART: [kat] sha1
461,884 UART: [kat] SHA2-256
464,614 UART: [kat] SHA2-384
470,371 UART: [kat] SHA2-512-ACC
472,717 UART: [kat] ECC-384
2,764,686 UART: [kat] HMAC-384Kdf
2,778,188 UART: [kat] LMS
3,968,523 UART: [kat] --
3,973,890 UART: [cold-reset] ++
3,974,856 UART: [fht] Storing FHT @ 0x50003400
3,987,344 UART: [idev] ++
3,987,959 UART: [idev] CDI.KEYID = 6
3,988,866 UART: [idev] SUBJECT.KEYID = 7
3,990,142 UART: [idev] UDS.KEYID = 0
3,995,990 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,139,961 UART: [idev] Erasing UDS.KEYID = 0
7,325,198 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,473 UART: [idev] --
7,349,491 UART: [ldev] ++
7,350,070 UART: [ldev] CDI.KEYID = 6
7,351,052 UART: [ldev] SUBJECT.KEYID = 5
7,352,155 UART: [ldev] AUTHORITY.KEYID = 7
7,353,497 UART: [ldev] FE.KEYID = 1
7,400,448 UART: [ldev] Erasing FE.KEYID = 1
10,731,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,529 UART: [ldev] --
13,113,927 UART: [fwproc] Waiting for Commands...
13,116,347 UART: [fwproc] Received command 0x46574c44
13,118,536 UART: [fwproc] Received Image of size 113844 bytes
13,211,514 UART: ROM Fatal Error: 0x000B0005
13,215,025 >>> mbox cmd response: failed
13,215,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,215,774 >>> mbox cmd response: failed
13,216,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,216,334 >>> mbox cmd response: failed
Initializing fuses
2,066,937 writing to cptra_bootfsm_go
2,256,351 UART:
2,256,706 UART: Running Caliptra ROM ...
2,257,843 UART:
2,258,014 UART: [state] CFI Enabled
2,319,766 UART: [state] LifecycleState = Manufacturing
2,321,664 UART: [state] DebugLocked = No
2,324,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,085 UART: [kat] SHA2-256
2,498,768 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,289 UART: [kat] ++
2,509,830 UART: [kat] sha1
2,520,585 UART: [kat] SHA2-256
2,523,287 UART: [kat] SHA2-384
2,529,332 UART: [kat] SHA2-512-ACC
2,531,682 UART: [kat] ECC-384
4,823,087 UART: [kat] HMAC-384Kdf
4,835,873 UART: [kat] LMS
6,026,194 UART: [kat] --
6,030,640 UART: [cold-reset] ++
6,033,226 UART: [fht] Storing FHT @ 0x50003400
6,045,144 UART: [idev] ++
6,045,773 UART: [idev] CDI.KEYID = 6
6,046,686 UART: [idev] SUBJECT.KEYID = 7
6,047,907 UART: [idev] UDS.KEYID = 0
6,050,516 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,193,821 UART: [idev] Erasing UDS.KEYID = 0
9,380,737 UART: [idev] Using Sha1 for KeyId Algorithm
9,402,995 UART: [idev] --
9,407,104 UART: [ldev] ++
9,407,728 UART: [ldev] CDI.KEYID = 6
9,408,694 UART: [ldev] SUBJECT.KEYID = 5
9,409,934 UART: [ldev] AUTHORITY.KEYID = 7
9,411,116 UART: [ldev] FE.KEYID = 1
9,457,646 UART: [ldev] Erasing FE.KEYID = 1
12,791,411 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,098,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,113,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,147,362 UART: [ldev] --
15,152,255 UART: [fwproc] Waiting for Commands...
15,155,327 UART: [fwproc] Received command 0x46574c44
15,157,512 UART: [fwproc] Received Image of size 113844 bytes
19,231,794 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,300,594 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,369,521 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
19,685,691 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,812,392 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
12,957,460 >>> mbox cmd response: failed
12,958,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,958,627 >>> mbox cmd response: failed
12,958,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,959,192 >>> mbox cmd response: failed
Initializing fuses
2,052,331 writing to cptra_bootfsm_go
5,842,286 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,942,068 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
192,296 UART:
192,657 UART: Running Caliptra ROM ...
193,861 UART:
603,613 UART: [state] CFI Enabled
615,817 UART: [state] LifecycleState = Manufacturing
617,740 UART: [state] DebugLocked = No
619,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,625 UART: [kat] SHA2-256
794,358 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,900 UART: [kat] ++
805,406 UART: [kat] sha1
816,281 UART: [kat] SHA2-256
819,014 UART: [kat] SHA2-384
825,804 UART: [kat] SHA2-512-ACC
828,171 UART: [kat] ECC-384
3,111,824 UART: [kat] HMAC-384Kdf
3,123,352 UART: [kat] LMS
4,313,447 UART: [kat] --
4,318,857 UART: [cold-reset] ++
4,320,093 UART: [fht] Storing FHT @ 0x50003400
4,332,065 UART: [idev] ++
4,332,636 UART: [idev] CDI.KEYID = 6
4,333,576 UART: [idev] SUBJECT.KEYID = 7
4,334,842 UART: [idev] UDS.KEYID = 0
4,340,155 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,483,390 UART: [idev] Erasing UDS.KEYID = 0
7,622,362 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,893 UART: [idev] --
7,645,438 UART: [ldev] ++
7,646,088 UART: [ldev] CDI.KEYID = 6
7,646,983 UART: [ldev] SUBJECT.KEYID = 5
7,648,115 UART: [ldev] AUTHORITY.KEYID = 7
7,649,457 UART: [ldev] FE.KEYID = 1
7,660,347 UART: [ldev] Erasing FE.KEYID = 1
10,948,915 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,068 UART: [ldev] --
13,310,100 UART: [fwproc] Waiting for Commands...
13,312,251 UART: [fwproc] Received command 0x46574c44
13,314,436 UART: [fwproc] Received Image of size 113844 bytes
13,409,238 UART: ROM Fatal Error: 0x000B0005
13,412,754 >>> mbox cmd response: failed
13,413,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,413,546 >>> mbox cmd response: failed
13,413,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,414,104 >>> mbox cmd response: failed
Initializing fuses
2,065,635 writing to cptra_bootfsm_go
2,254,969 UART:
2,255,328 UART: Running Caliptra ROM ...
2,256,463 UART:
7,049,585 UART: [state] CFI Enabled
7,069,426 UART: [state] LifecycleState = Manufacturing
7,071,345 UART: [state] DebugLocked = No
7,073,815 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,079,428 UART: [kat] SHA2-256
7,249,180 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,259,746 UART: [kat] ++
7,260,293 UART: [kat] sha1
7,271,457 UART: [kat] SHA2-256
7,274,156 UART: [kat] SHA2-384
7,280,360 UART: [kat] SHA2-512-ACC
7,282,709 UART: [kat] ECC-384
9,565,814 UART: [kat] HMAC-384Kdf
9,577,882 UART: [kat] LMS
10,767,988 UART: [kat] --
10,772,946 UART: [cold-reset] ++
10,774,297 UART: [fht] Storing FHT @ 0x50003400
10,784,972 UART: [idev] ++
10,785,531 UART: [idev] CDI.KEYID = 6
10,786,548 UART: [idev] SUBJECT.KEYID = 7
10,787,703 UART: [idev] UDS.KEYID = 0
10,790,471 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
10,933,958 UART: [idev] Erasing UDS.KEYID = 0
14,075,484 UART: [idev] Using Sha1 for KeyId Algorithm
14,097,299 UART: [idev] --
14,101,160 UART: [ldev] ++
14,101,730 UART: [ldev] CDI.KEYID = 6
14,102,666 UART: [ldev] SUBJECT.KEYID = 5
14,103,917 UART: [ldev] AUTHORITY.KEYID = 7
14,105,158 UART: [ldev] FE.KEYID = 1
14,115,261 UART: [ldev] Erasing FE.KEYID = 1
17,402,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,696,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,740,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,759,704 UART: [ldev] --
19,763,673 UART: [fwproc] Waiting for Commands...
19,765,932 UART: [fwproc] Received command 0x46574c44
19,768,118 UART: [fwproc] Received Image of size 113844 bytes
23,848,107 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,923,186 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,992,066 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
24,307,943 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,131,599 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
13,150,537 >>> mbox cmd response: failed
13,151,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,151,470 >>> mbox cmd response: failed
13,151,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,152,034 >>> mbox cmd response: failed
Initializing fuses
2,053,175 writing to cptra_bootfsm_go
10,839,980 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
24,818,490 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,099 writing to cptra_bootfsm_go
193,350 UART:
193,716 UART: Running Caliptra ROM ...
194,913 UART:
195,065 UART: [state] CFI Enabled
262,014 UART: [state] LifecycleState = Manufacturing
263,887 UART: [state] DebugLocked = No
265,594 UART: [state] WD Timer not started. Device not locked for debugging
270,173 UART: [kat] SHA2-256
449,268 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,830 UART: [kat] ++
461,361 UART: [kat] sha1
472,033 UART: [kat] SHA2-256
475,053 UART: [kat] SHA2-384
481,094 UART: [kat] SHA2-512-ACC
484,010 UART: [kat] ECC-384
2,948,508 UART: [kat] HMAC-384Kdf
2,971,394 UART: [kat] LMS
3,500,887 UART: [kat] --
3,506,011 UART: [cold-reset] ++
3,507,404 UART: [fht] FHT @ 0x50003400
3,519,145 UART: [idev] ++
3,519,716 UART: [idev] CDI.KEYID = 6
3,520,599 UART: [idev] SUBJECT.KEYID = 7
3,521,856 UART: [idev] UDS.KEYID = 0
3,524,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,320 UART: [idev] Erasing UDS.KEYID = 0
6,028,720 UART: [idev] Sha1 KeyId Algorithm
6,050,524 UART: [idev] --
6,054,196 UART: [ldev] ++
6,054,772 UART: [ldev] CDI.KEYID = 6
6,055,659 UART: [ldev] SUBJECT.KEYID = 5
6,056,823 UART: [ldev] AUTHORITY.KEYID = 7
6,058,113 UART: [ldev] FE.KEYID = 1
6,099,825 UART: [ldev] Erasing FE.KEYID = 1
8,602,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,602 UART: [ldev] --
10,414,067 UART: [fwproc] Wait for Commands...
10,415,708 UART: [fwproc] Recv command 0x46574c44
10,417,756 UART: [fwproc] Recv'd Img size: 114168 bytes
10,508,183 UART: ROM Fatal Error: 0x000B0005
10,511,272 >>> mbox cmd response: failed
10,511,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,512,049 >>> mbox cmd response: failed
10,512,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,512,611 >>> mbox cmd response: failed
Initializing fuses
2,056,833 writing to cptra_bootfsm_go
2,246,135 UART:
2,246,480 UART: Running Caliptra ROM ...
2,247,634 UART:
2,247,801 UART: [state] CFI Enabled
2,319,605 UART: [state] LifecycleState = Manufacturing
2,321,489 UART: [state] DebugLocked = No
2,324,097 UART: [state] WD Timer not started. Device not locked for debugging
2,327,357 UART: [kat] SHA2-256
2,506,468 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,518,033 UART: [kat] ++
2,518,498 UART: [kat] sha1
2,530,033 UART: [kat] SHA2-256
2,533,039 UART: [kat] SHA2-384
2,539,469 UART: [kat] SHA2-512-ACC
2,542,417 UART: [kat] ECC-384
5,000,740 UART: [kat] HMAC-384Kdf
5,023,836 UART: [kat] LMS
5,553,287 UART: [kat] --
5,556,975 UART: [cold-reset] ++
5,558,582 UART: [fht] FHT @ 0x50003400
5,570,759 UART: [idev] ++
5,571,358 UART: [idev] CDI.KEYID = 6
5,572,244 UART: [idev] SUBJECT.KEYID = 7
5,573,462 UART: [idev] UDS.KEYID = 0
5,576,149 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,719,740 UART: [idev] Erasing UDS.KEYID = 0
8,077,827 UART: [idev] Sha1 KeyId Algorithm
8,099,936 UART: [idev] --
8,104,478 UART: [ldev] ++
8,105,053 UART: [ldev] CDI.KEYID = 6
8,105,964 UART: [ldev] SUBJECT.KEYID = 5
8,107,128 UART: [ldev] AUTHORITY.KEYID = 7
8,108,365 UART: [ldev] FE.KEYID = 1
8,153,204 UART: [ldev] Erasing FE.KEYID = 1
10,655,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,393,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,995 UART: [ldev] --
12,466,004 UART: [fwproc] Wait for Commands...
12,467,679 UART: [fwproc] Recv command 0x46574c44
12,469,777 UART: [fwproc] Recv'd Img size: 114168 bytes
15,897,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,967,613 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,036,415 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,354,427 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,385,369 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,314,352 >>> mbox cmd response: failed
10,315,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,315,472 >>> mbox cmd response: failed
10,315,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,316,044 >>> mbox cmd response: failed
Initializing fuses
2,056,662 writing to cptra_bootfsm_go
5,416,687 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,149,117 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
192,696 UART:
193,061 UART: Running Caliptra ROM ...
194,277 UART:
603,651 UART: [state] CFI Enabled
614,471 UART: [state] LifecycleState = Manufacturing
616,345 UART: [state] DebugLocked = No
617,615 UART: [state] WD Timer not started. Device not locked for debugging
621,864 UART: [kat] SHA2-256
800,945 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,526 UART: [kat] ++
813,067 UART: [kat] sha1
824,623 UART: [kat] SHA2-256
827,688 UART: [kat] SHA2-384
834,528 UART: [kat] SHA2-512-ACC
837,481 UART: [kat] ECC-384
3,278,508 UART: [kat] HMAC-384Kdf
3,292,687 UART: [kat] LMS
3,822,213 UART: [kat] --
3,825,282 UART: [cold-reset] ++
3,827,104 UART: [fht] FHT @ 0x50003400
3,838,674 UART: [idev] ++
3,839,247 UART: [idev] CDI.KEYID = 6
3,840,157 UART: [idev] SUBJECT.KEYID = 7
3,841,370 UART: [idev] UDS.KEYID = 0
3,844,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,696 UART: [idev] Erasing UDS.KEYID = 0
6,309,320 UART: [idev] Sha1 KeyId Algorithm
6,332,035 UART: [idev] --
6,335,722 UART: [ldev] ++
6,336,296 UART: [ldev] CDI.KEYID = 6
6,337,212 UART: [ldev] SUBJECT.KEYID = 5
6,338,429 UART: [ldev] AUTHORITY.KEYID = 7
6,339,658 UART: [ldev] FE.KEYID = 1
6,350,900 UART: [ldev] Erasing FE.KEYID = 1
8,824,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,449 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,593,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,015 UART: [ldev] --
10,618,025 UART: [fwproc] Wait for Commands...
10,620,016 UART: [fwproc] Recv command 0x46574c44
10,622,061 UART: [fwproc] Recv'd Img size: 114168 bytes
10,712,659 UART: ROM Fatal Error: 0x000B0005
10,715,801 >>> mbox cmd response: failed
10,716,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,716,576 >>> mbox cmd response: failed
10,716,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,717,132 >>> mbox cmd response: failed
Initializing fuses
2,060,607 writing to cptra_bootfsm_go
2,249,921 UART:
2,250,256 UART: Running Caliptra ROM ...
2,251,302 UART:
9,752,184 UART: [state] CFI Enabled
9,767,652 UART: [state] LifecycleState = Manufacturing
9,769,526 UART: [state] DebugLocked = No
9,772,132 UART: [state] WD Timer not started. Device not locked for debugging
9,776,307 UART: [kat] SHA2-256
9,955,403 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
9,967,022 UART: [kat] ++
9,967,491 UART: [kat] sha1
9,978,705 UART: [kat] SHA2-256
9,981,717 UART: [kat] SHA2-384
9,987,543 UART: [kat] SHA2-512-ACC
9,990,489 UART: [kat] ECC-384
12,433,077 UART: [kat] HMAC-384Kdf
12,446,169 UART: [kat] LMS
12,975,642 UART: [kat] --
12,981,574 UART: [cold-reset] ++
12,983,934 UART: [fht] FHT @ 0x50003400
12,994,549 UART: [idev] ++
12,995,117 UART: [idev] CDI.KEYID = 6
12,996,030 UART: [idev] SUBJECT.KEYID = 7
12,997,193 UART: [idev] UDS.KEYID = 0
13,000,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,143,528 UART: [idev] Erasing UDS.KEYID = 0
15,469,134 UART: [idev] Sha1 KeyId Algorithm
15,492,530 UART: [idev] --
15,496,010 UART: [ldev] ++
15,496,588 UART: [ldev] CDI.KEYID = 6
15,497,475 UART: [ldev] SUBJECT.KEYID = 5
15,498,694 UART: [ldev] AUTHORITY.KEYID = 7
15,499,927 UART: [ldev] FE.KEYID = 1
15,509,683 UART: [ldev] Erasing FE.KEYID = 1
17,981,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,699,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,715,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,731,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,747,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,767,037 UART: [ldev] --
19,771,440 UART: [fwproc] Wait for Commands...
19,773,491 UART: [fwproc] Recv command 0x46574c44
19,775,538 UART: [fwproc] Recv'd Img size: 114168 bytes
23,203,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,274,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,343,758 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,661,507 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,584 writing to cptra_bootfsm_go
3,693,555 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,490,237 >>> mbox cmd response: failed
10,490,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,206 >>> mbox cmd response: failed
10,491,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,491,722 >>> mbox cmd response: failed
Initializing fuses
2,053,373 writing to cptra_bootfsm_go
13,073,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
23,673,367 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,125 UART:
192,491 UART: Running Caliptra ROM ...
193,691 UART:
193,846 UART: [state] CFI Enabled
258,446 UART: [state] LifecycleState = Manufacturing
260,469 UART: [state] DebugLocked = No
262,740 UART: [state] WD Timer not started. Device not locked for debugging
266,895 UART: [kat] SHA2-256
456,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,523 UART: [kat] ++
467,969 UART: [kat] sha1
479,512 UART: [kat] SHA2-256
482,516 UART: [kat] SHA2-384
489,489 UART: [kat] SHA2-512-ACC
492,054 UART: [kat] ECC-384
2,946,313 UART: [kat] HMAC-384Kdf
2,970,851 UART: [kat] LMS
3,502,609 UART: [kat] --
3,506,167 UART: [cold-reset] ++
3,508,532 UART: [fht] FHT @ 0x50003400
3,519,840 UART: [idev] ++
3,520,554 UART: [idev] CDI.KEYID = 6
3,521,486 UART: [idev] SUBJECT.KEYID = 7
3,522,647 UART: [idev] UDS.KEYID = 0
3,528,061 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,671,733 UART: [idev] Erasing UDS.KEYID = 0
6,029,147 UART: [idev] Sha1 KeyId Algorithm
6,051,255 UART: [idev] --
6,055,208 UART: [ldev] ++
6,055,894 UART: [ldev] CDI.KEYID = 6
6,056,964 UART: [ldev] SUBJECT.KEYID = 5
6,058,071 UART: [ldev] AUTHORITY.KEYID = 7
6,059,248 UART: [ldev] FE.KEYID = 1
6,099,379 UART: [ldev] Erasing FE.KEYID = 1
8,602,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,647 UART: [ldev] --
10,413,410 UART: [fwproc] Wait for Commands...
10,414,971 UART: [fwproc] Recv command 0x46574c44
10,417,295 UART: [fwproc] Recv'd Img size: 114168 bytes
10,539,677 UART: ROM Fatal Error: 0x000B0005
10,543,355 >>> mbox cmd response: failed
10,543,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,128 >>> mbox cmd response: failed
10,544,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,544,689 >>> mbox cmd response: failed
Initializing fuses
2,052,239 writing to cptra_bootfsm_go
2,241,544 UART:
2,241,890 UART: Running Caliptra ROM ...
2,243,024 UART:
2,243,191 UART: [state] CFI Enabled
2,307,707 UART: [state] LifecycleState = Manufacturing
2,310,083 UART: [state] DebugLocked = No
2,312,288 UART: [state] WD Timer not started. Device not locked for debugging
2,317,347 UART: [kat] SHA2-256
2,507,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,040 UART: [kat] ++
2,518,583 UART: [kat] sha1
2,528,778 UART: [kat] SHA2-256
2,531,796 UART: [kat] SHA2-384
2,536,997 UART: [kat] SHA2-512-ACC
2,539,623 UART: [kat] ECC-384
4,988,554 UART: [kat] HMAC-384Kdf
5,012,020 UART: [kat] LMS
5,543,758 UART: [kat] --
5,547,856 UART: [cold-reset] ++
5,550,222 UART: [fht] FHT @ 0x50003400
5,560,291 UART: [idev] ++
5,560,965 UART: [idev] CDI.KEYID = 6
5,561,929 UART: [idev] SUBJECT.KEYID = 7
5,563,139 UART: [idev] UDS.KEYID = 0
5,565,723 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,709,442 UART: [idev] Erasing UDS.KEYID = 0
8,069,201 UART: [idev] Sha1 KeyId Algorithm
8,092,559 UART: [idev] --
8,096,829 UART: [ldev] ++
8,097,565 UART: [ldev] CDI.KEYID = 6
8,098,458 UART: [ldev] SUBJECT.KEYID = 5
8,099,632 UART: [ldev] AUTHORITY.KEYID = 7
8,100,819 UART: [ldev] FE.KEYID = 1
8,140,033 UART: [ldev] Erasing FE.KEYID = 1
10,646,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,380,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,395,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,410,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,425,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,954 UART: [ldev] --
12,454,082 UART: [fwproc] Wait for Commands...
12,455,805 UART: [fwproc] Recv command 0x46574c44
12,458,069 UART: [fwproc] Recv'd Img size: 114168 bytes
15,938,960 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,020,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,136,917 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,678,619 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,443,345 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,349,670 >>> mbox cmd response: failed
10,350,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,350,538 >>> mbox cmd response: failed
10,350,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,351,102 >>> mbox cmd response: failed
Initializing fuses
2,050,933 writing to cptra_bootfsm_go
5,486,023 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,820,562 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,443 UART:
192,818 UART: Running Caliptra ROM ...
193,925 UART:
603,702 UART: [state] CFI Enabled
620,025 UART: [state] LifecycleState = Manufacturing
622,409 UART: [state] DebugLocked = No
625,243 UART: [state] WD Timer not started. Device not locked for debugging
629,774 UART: [kat] SHA2-256
819,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,478 UART: [kat] ++
830,997 UART: [kat] sha1
842,632 UART: [kat] SHA2-256
845,637 UART: [kat] SHA2-384
851,454 UART: [kat] SHA2-512-ACC
854,014 UART: [kat] ECC-384
3,297,700 UART: [kat] HMAC-384Kdf
3,309,330 UART: [kat] LMS
3,841,125 UART: [kat] --
3,847,114 UART: [cold-reset] ++
3,848,592 UART: [fht] FHT @ 0x50003400
3,860,282 UART: [idev] ++
3,860,961 UART: [idev] CDI.KEYID = 6
3,861,933 UART: [idev] SUBJECT.KEYID = 7
3,863,147 UART: [idev] UDS.KEYID = 0
3,869,143 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,012,648 UART: [idev] Erasing UDS.KEYID = 0
6,340,211 UART: [idev] Sha1 KeyId Algorithm
6,362,119 UART: [idev] --
6,366,517 UART: [ldev] ++
6,367,207 UART: [ldev] CDI.KEYID = 6
6,368,120 UART: [ldev] SUBJECT.KEYID = 5
6,369,287 UART: [ldev] AUTHORITY.KEYID = 7
6,370,519 UART: [ldev] FE.KEYID = 1
6,382,086 UART: [ldev] Erasing FE.KEYID = 1
8,859,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,663 UART: [ldev] --
10,651,395 UART: [fwproc] Wait for Commands...
10,652,844 UART: [fwproc] Recv command 0x46574c44
10,654,834 UART: [fwproc] Recv'd Img size: 114168 bytes
10,778,408 UART: ROM Fatal Error: 0x000B0005
10,782,078 >>> mbox cmd response: failed
10,782,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,782,728 >>> mbox cmd response: failed
10,782,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,783,287 >>> mbox cmd response: failed
Initializing fuses
2,054,328 writing to cptra_bootfsm_go
2,243,619 UART:
2,243,976 UART: Running Caliptra ROM ...
2,245,027 UART:
9,688,528 UART: [state] CFI Enabled
9,703,126 UART: [state] LifecycleState = Manufacturing
9,705,487 UART: [state] DebugLocked = No
9,707,364 UART: [state] WD Timer not started. Device not locked for debugging
9,712,103 UART: [kat] SHA2-256
9,901,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,912,787 UART: [kat] ++
9,913,390 UART: [kat] sha1
9,924,880 UART: [kat] SHA2-256
9,927,904 UART: [kat] SHA2-384
9,934,006 UART: [kat] SHA2-512-ACC
9,936,637 UART: [kat] ECC-384
12,377,333 UART: [kat] HMAC-384Kdf
12,389,591 UART: [kat] LMS
12,921,445 UART: [kat] --
12,924,914 UART: [cold-reset] ++
12,926,543 UART: [fht] FHT @ 0x50003400
12,938,996 UART: [idev] ++
12,939,669 UART: [idev] CDI.KEYID = 6
12,940,609 UART: [idev] SUBJECT.KEYID = 7
12,941,819 UART: [idev] UDS.KEYID = 0
12,944,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,088,273 UART: [idev] Erasing UDS.KEYID = 0
15,415,772 UART: [idev] Sha1 KeyId Algorithm
15,438,477 UART: [idev] --
15,443,332 UART: [ldev] ++
15,444,013 UART: [ldev] CDI.KEYID = 6
15,444,898 UART: [ldev] SUBJECT.KEYID = 5
15,446,110 UART: [ldev] AUTHORITY.KEYID = 7
15,447,289 UART: [ldev] FE.KEYID = 1
15,460,369 UART: [ldev] Erasing FE.KEYID = 1
17,936,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,652,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,667,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,682,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,697,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,717,916 UART: [ldev] --
19,722,616 UART: [fwproc] Wait for Commands...
19,725,588 UART: [fwproc] Recv command 0x46574c44
19,727,898 UART: [fwproc] Recv'd Img size: 114168 bytes
23,202,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,279,505 UART: [fwproc] Load FMC at address 0x40000000 len 18800
23,395,626 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
23,937,278 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,759,677 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
10,566,322 >>> mbox cmd response: failed
10,567,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,390 >>> mbox cmd response: failed
10,567,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,944 >>> mbox cmd response: failed
Initializing fuses
2,057,936 writing to cptra_bootfsm_go
13,060,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
24,299,167 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Manufacturing
85,747 UART: [state] DebugLocked = No
86,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,777 UART: [kat] SHA2-256
881,708 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,823 UART: [kat] ++
885,975 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
894,996 UART: [kat] SHA2-512-ACC
896,897 UART: [kat] ECC-384
902,566 UART: [kat] HMAC-384Kdf
907,164 UART: [kat] LMS
1,475,360 UART: [kat] --
1,476,305 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,686 UART: [idev] ++
1,479,854 UART: [idev] CDI.KEYID = 6
1,480,214 UART: [idev] SUBJECT.KEYID = 7
1,480,638 UART: [idev] UDS.KEYID = 0
1,480,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,894 UART: [idev] Erasing UDS.KEYID = 0
1,505,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,688 UART: [idev] --
1,515,603 UART: [ldev] ++
1,515,771 UART: [ldev] CDI.KEYID = 6
1,516,134 UART: [ldev] SUBJECT.KEYID = 5
1,516,560 UART: [ldev] AUTHORITY.KEYID = 7
1,517,023 UART: [ldev] FE.KEYID = 1
1,522,027 UART: [ldev] Erasing FE.KEYID = 1
1,547,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,190 UART: [ldev] --
1,586,533 UART: [fwproc] Waiting for Commands...
1,587,268 UART: [fwproc] Received command 0x46574c44
1,588,059 UART: [fwproc] Received Image of size 114168 bytes
1,633,294 UART: ROM Fatal Error: 0x000B0005
1,634,451 >>> mbox cmd response: failed
1,634,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,457 >>> mbox cmd response: failed
1,634,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,621 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,225 UART: [kat] SHA2-256
882,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,271 UART: [kat] ++
886,423 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,484 UART: [kat] SHA2-512-ACC
897,385 UART: [kat] ECC-384
902,640 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,860 UART: [idev] Erasing UDS.KEYID = 0
1,504,532 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,212 UART: [idev] --
1,514,249 UART: [ldev] ++
1,514,417 UART: [ldev] CDI.KEYID = 6
1,514,780 UART: [ldev] SUBJECT.KEYID = 5
1,515,206 UART: [ldev] AUTHORITY.KEYID = 7
1,515,669 UART: [ldev] FE.KEYID = 1
1,520,699 UART: [ldev] Erasing FE.KEYID = 1
1,546,100 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,954 UART: [ldev] --
1,585,429 UART: [fwproc] Waiting for Commands...
1,586,172 UART: [fwproc] Received command 0x46574c44
1,586,963 UART: [fwproc] Received Image of size 114168 bytes
2,884,444 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,790 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,142 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,673 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,319 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,485,664 >>> mbox cmd response: failed
1,485,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,670 >>> mbox cmd response: failed
1,485,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,123 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Manufacturing
85,604 UART: [state] DebugLocked = No
86,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,842 UART: [kat] SHA2-256
881,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,888 UART: [kat] ++
886,040 UART: [kat] sha1
890,374 UART: [kat] SHA2-256
892,312 UART: [kat] SHA2-384
895,095 UART: [kat] SHA2-512-ACC
896,996 UART: [kat] ECC-384
902,581 UART: [kat] HMAC-384Kdf
907,079 UART: [kat] LMS
1,475,275 UART: [kat] --
1,476,070 UART: [cold-reset] ++
1,476,574 UART: [fht] Storing FHT @ 0x50003400
1,479,431 UART: [idev] ++
1,479,599 UART: [idev] CDI.KEYID = 6
1,479,959 UART: [idev] SUBJECT.KEYID = 7
1,480,383 UART: [idev] UDS.KEYID = 0
1,480,728 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,281 UART: [idev] Erasing UDS.KEYID = 0
1,504,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,499 UART: [idev] --
1,514,506 UART: [ldev] ++
1,514,674 UART: [ldev] CDI.KEYID = 6
1,515,037 UART: [ldev] SUBJECT.KEYID = 5
1,515,463 UART: [ldev] AUTHORITY.KEYID = 7
1,515,926 UART: [ldev] FE.KEYID = 1
1,521,098 UART: [ldev] Erasing FE.KEYID = 1
1,546,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,957 UART: [ldev] --
1,585,244 UART: [fwproc] Waiting for Commands...
1,585,991 UART: [fwproc] Received command 0x46574c44
1,586,782 UART: [fwproc] Received Image of size 114168 bytes
1,631,877 UART: ROM Fatal Error: 0x000B0005
1,633,034 >>> mbox cmd response: failed
1,633,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,040 >>> mbox cmd response: failed
1,633,040 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,110 UART: [kat] SHA2-256
882,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,156 UART: [kat] ++
886,308 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,133 UART: [kat] SHA2-512-ACC
897,034 UART: [kat] ECC-384
902,731 UART: [kat] HMAC-384Kdf
907,277 UART: [kat] LMS
1,475,473 UART: [kat] --
1,476,570 UART: [cold-reset] ++
1,477,052 UART: [fht] Storing FHT @ 0x50003400
1,479,907 UART: [idev] ++
1,480,075 UART: [idev] CDI.KEYID = 6
1,480,435 UART: [idev] SUBJECT.KEYID = 7
1,480,859 UART: [idev] UDS.KEYID = 0
1,481,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,671 UART: [idev] Erasing UDS.KEYID = 0
1,504,985 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,567 UART: [idev] --
1,514,704 UART: [ldev] ++
1,514,872 UART: [ldev] CDI.KEYID = 6
1,515,235 UART: [ldev] SUBJECT.KEYID = 5
1,515,661 UART: [ldev] AUTHORITY.KEYID = 7
1,516,124 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,546,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,861 UART: [ldev] --
1,586,122 UART: [fwproc] Waiting for Commands...
1,586,939 UART: [fwproc] Received command 0x46574c44
1,587,730 UART: [fwproc] Received Image of size 114168 bytes
2,884,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,395 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,378 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,487,423 >>> mbox cmd response: failed
1,487,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,429 >>> mbox cmd response: failed
1,487,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,435 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,072 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,528 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Manufacturing
85,477 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,122 UART: [kat] SHA2-512-ACC
908,023 UART: [kat] ECC-384
917,496 UART: [kat] HMAC-384Kdf
922,296 UART: [kat] LMS
1,170,624 UART: [kat] --
1,171,775 UART: [cold-reset] ++
1,172,295 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,190 UART: [idev] Erasing UDS.KEYID = 0
1,201,137 UART: [idev] Sha1 KeyId Algorithm
1,209,551 UART: [idev] --
1,210,633 UART: [ldev] ++
1,210,801 UART: [ldev] CDI.KEYID = 6
1,211,164 UART: [ldev] SUBJECT.KEYID = 5
1,211,590 UART: [ldev] AUTHORITY.KEYID = 7
1,212,053 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,873 UART: [ldev] --
1,283,270 UART: [fwproc] Wait for Commands...
1,284,054 UART: [fwproc] Recv command 0x46574c44
1,284,782 UART: [fwproc] Recv'd Img size: 114168 bytes
1,329,861 UART: ROM Fatal Error: 0x000B0005
1,331,018 >>> mbox cmd response: failed
1,331,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,024 >>> mbox cmd response: failed
1,331,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
892,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,099 UART: [kat] ++
897,251 UART: [kat] sha1
901,507 UART: [kat] SHA2-256
903,447 UART: [kat] SHA2-384
906,370 UART: [kat] SHA2-512-ACC
908,271 UART: [kat] ECC-384
918,014 UART: [kat] HMAC-384Kdf
922,712 UART: [kat] LMS
1,171,040 UART: [kat] --
1,171,627 UART: [cold-reset] ++
1,172,185 UART: [fht] FHT @ 0x50003400
1,174,752 UART: [idev] ++
1,174,920 UART: [idev] CDI.KEYID = 6
1,175,280 UART: [idev] SUBJECT.KEYID = 7
1,175,704 UART: [idev] UDS.KEYID = 0
1,176,049 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,278 UART: [idev] Erasing UDS.KEYID = 0
1,200,751 UART: [idev] Sha1 KeyId Algorithm
1,209,347 UART: [idev] --
1,210,389 UART: [ldev] ++
1,210,557 UART: [ldev] CDI.KEYID = 6
1,210,920 UART: [ldev] SUBJECT.KEYID = 5
1,211,346 UART: [ldev] AUTHORITY.KEYID = 7
1,211,809 UART: [ldev] FE.KEYID = 1
1,217,179 UART: [ldev] Erasing FE.KEYID = 1
1,243,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,308 UART: [fwproc] Wait for Commands...
1,282,894 UART: [fwproc] Recv command 0x46574c44
1,283,622 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,605,783 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,087 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,548 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,357 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,457 >>> mbox cmd response: failed
1,184,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,463 >>> mbox cmd response: failed
1,184,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,783 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,041 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Manufacturing
86,058 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
893,373 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,498 UART: [kat] ++
897,650 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
918,261 UART: [kat] HMAC-384Kdf
922,887 UART: [kat] LMS
1,171,215 UART: [kat] --
1,171,912 UART: [cold-reset] ++
1,172,336 UART: [fht] FHT @ 0x50003400
1,174,829 UART: [idev] ++
1,174,997 UART: [idev] CDI.KEYID = 6
1,175,357 UART: [idev] SUBJECT.KEYID = 7
1,175,781 UART: [idev] UDS.KEYID = 0
1,176,126 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,019 UART: [idev] Erasing UDS.KEYID = 0
1,200,458 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,209,894 UART: [ldev] ++
1,210,062 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,851 UART: [ldev] AUTHORITY.KEYID = 7
1,211,314 UART: [ldev] FE.KEYID = 1
1,216,628 UART: [ldev] Erasing FE.KEYID = 1
1,243,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,136 UART: [ldev] --
1,282,435 UART: [fwproc] Wait for Commands...
1,283,223 UART: [fwproc] Recv command 0x46574c44
1,283,951 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,944 UART: ROM Fatal Error: 0x000B0005
1,330,101 >>> mbox cmd response: failed
1,330,101 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,107 >>> mbox cmd response: failed
1,330,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
86,930 UART: [state] WD Timer not started. Device not locked for debugging
88,279 UART: [kat] SHA2-256
893,929 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,054 UART: [kat] ++
898,206 UART: [kat] sha1
902,450 UART: [kat] SHA2-256
904,390 UART: [kat] SHA2-384
907,309 UART: [kat] SHA2-512-ACC
909,210 UART: [kat] ECC-384
918,961 UART: [kat] HMAC-384Kdf
923,633 UART: [kat] LMS
1,171,961 UART: [kat] --
1,172,890 UART: [cold-reset] ++
1,173,236 UART: [fht] FHT @ 0x50003400
1,175,931 UART: [idev] ++
1,176,099 UART: [idev] CDI.KEYID = 6
1,176,459 UART: [idev] SUBJECT.KEYID = 7
1,176,883 UART: [idev] UDS.KEYID = 0
1,177,228 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,091 UART: [idev] Erasing UDS.KEYID = 0
1,202,538 UART: [idev] Sha1 KeyId Algorithm
1,210,996 UART: [idev] --
1,211,896 UART: [ldev] ++
1,212,064 UART: [ldev] CDI.KEYID = 6
1,212,427 UART: [ldev] SUBJECT.KEYID = 5
1,212,853 UART: [ldev] AUTHORITY.KEYID = 7
1,213,316 UART: [ldev] FE.KEYID = 1
1,218,464 UART: [ldev] Erasing FE.KEYID = 1
1,244,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,986 UART: [ldev] --
1,284,261 UART: [fwproc] Wait for Commands...
1,284,965 UART: [fwproc] Recv command 0x46574c44
1,285,693 UART: [fwproc] Recv'd Img size: 114168 bytes
2,582,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,639,690 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,775,351 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,328 >>> mbox cmd response: failed
1,185,328 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,334 >>> mbox cmd response: failed
1,185,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,828 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,348 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Manufacturing
85,711 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,993 UART: [kat] ++
895,145 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
903,960 UART: [kat] SHA2-512-ACC
905,861 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,306 UART: [kat] LMS
1,168,618 UART: [kat] --
1,169,569 UART: [cold-reset] ++
1,169,937 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,173,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,249 UART: [idev] Sha1 KeyId Algorithm
1,206,991 UART: [idev] --
1,207,966 UART: [ldev] ++
1,208,134 UART: [ldev] CDI.KEYID = 6
1,208,498 UART: [ldev] SUBJECT.KEYID = 5
1,208,925 UART: [ldev] AUTHORITY.KEYID = 7
1,209,388 UART: [ldev] FE.KEYID = 1
1,214,458 UART: [ldev] Erasing FE.KEYID = 1
1,240,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,270 UART: [ldev] --
1,279,728 UART: [fwproc] Wait for Commands...
1,280,461 UART: [fwproc] Recv command 0x46574c44
1,281,194 UART: [fwproc] Recv'd Img size: 114168 bytes
1,326,343 UART: ROM Fatal Error: 0x000B0005
1,327,500 >>> mbox cmd response: failed
1,327,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,506 >>> mbox cmd response: failed
1,327,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,482 UART: [state] LifecycleState = Unprovisioned
86,137 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,249 UART: [kat] SHA2-256
902,189 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,196 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,525 UART: [fht] FHT @ 0x50003400
1,173,205 UART: [idev] ++
1,173,373 UART: [idev] CDI.KEYID = 6
1,173,734 UART: [idev] SUBJECT.KEYID = 7
1,174,159 UART: [idev] UDS.KEYID = 0
1,174,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,515 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,212 UART: [ldev] Erasing FE.KEYID = 1
1,241,845 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,504 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,835 UART: [fwproc] Recv command 0x46574c44
1,282,568 UART: [fwproc] Recv'd Img size: 114168 bytes
2,577,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,603,509 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,632,818 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,408 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,322 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,179,919 >>> mbox cmd response: failed
1,179,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,925 >>> mbox cmd response: failed
1,179,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,931 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,458 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,800 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Manufacturing
86,184 UART: [state] DebugLocked = No
86,856 UART: [state] WD Timer not started. Device not locked for debugging
88,157 UART: [kat] SHA2-256
891,707 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,836 UART: [kat] ++
895,988 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
904,983 UART: [kat] SHA2-512-ACC
906,884 UART: [kat] ECC-384
916,695 UART: [kat] HMAC-384Kdf
921,399 UART: [kat] LMS
1,169,711 UART: [kat] --
1,170,524 UART: [cold-reset] ++
1,171,100 UART: [fht] FHT @ 0x50003400
1,173,650 UART: [idev] ++
1,173,818 UART: [idev] CDI.KEYID = 6
1,174,179 UART: [idev] SUBJECT.KEYID = 7
1,174,604 UART: [idev] UDS.KEYID = 0
1,174,950 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,658 UART: [idev] Erasing UDS.KEYID = 0
1,199,566 UART: [idev] Sha1 KeyId Algorithm
1,208,544 UART: [idev] --
1,209,639 UART: [ldev] ++
1,209,807 UART: [ldev] CDI.KEYID = 6
1,210,171 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,255 UART: [ldev] Erasing FE.KEYID = 1
1,242,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,163 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,007 UART: [fwproc] Recv'd Img size: 114168 bytes
1,328,222 UART: ROM Fatal Error: 0x000B0005
1,329,379 >>> mbox cmd response: failed
1,329,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,385 >>> mbox cmd response: failed
1,329,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
900,130 UART: [kat] SHA2-256
902,070 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,561 UART: [kat] HMAC-384Kdf
921,207 UART: [kat] LMS
1,169,519 UART: [kat] --
1,170,388 UART: [cold-reset] ++
1,170,858 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,174,914 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,199,474 UART: [idev] Sha1 KeyId Algorithm
1,208,446 UART: [idev] --
1,209,659 UART: [ldev] ++
1,209,827 UART: [ldev] CDI.KEYID = 6
1,210,191 UART: [ldev] SUBJECT.KEYID = 5
1,210,618 UART: [ldev] AUTHORITY.KEYID = 7
1,211,081 UART: [ldev] FE.KEYID = 1
1,216,169 UART: [ldev] Erasing FE.KEYID = 1
1,242,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,885 UART: [fwproc] Wait for Commands...
1,282,466 UART: [fwproc] Recv command 0x46574c44
1,283,199 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,407 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,017 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,517 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,250 >>> mbox cmd response: failed
1,182,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,256 >>> mbox cmd response: failed
1,182,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,199 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,883 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
191,495 UART:
191,911 UART: Running Caliptra ROM ...
192,993 UART:
193,141 UART: [state] CFI Enabled
263,583 UART: [state] LifecycleState = Unprovisioned
265,669 UART: [state] DebugLocked = Yes
267,573 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,508 UART: [kat] SHA2-256
443,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,738 UART: [kat] ++
454,302 UART: [kat] sha1
465,834 UART: [kat] SHA2-256
468,510 UART: [kat] SHA2-384
474,592 UART: [kat] SHA2-512-ACC
476,989 UART: [kat] ECC-384
2,765,312 UART: [kat] HMAC-384Kdf
2,797,810 UART: [kat] LMS
3,988,085 UART: [kat] --
3,990,695 UART: [cold-reset] ++
3,992,359 UART: [fht] Storing FHT @ 0x50003400
4,003,457 UART: [idev] ++
4,004,036 UART: [idev] CDI.KEYID = 6
4,004,981 UART: [idev] SUBJECT.KEYID = 7
4,006,196 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
192,565 UART:
193,417 UART: Running Caliptra ROM ...
194,561 UART:
194,708 UART: [state] CFI Enabled
253,705 UART: [state] LifecycleState = Manufacturing
255,659 UART: [state] DebugLocked = Yes
257,726 UART: [state] Starting the Watchdog Timer 40000000 cycles
262,416 UART: [kat] SHA2-256
432,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,662 UART: [kat] ++
443,198 UART: [kat] sha1
452,990 UART: [kat] SHA2-256
455,657 UART: [kat] SHA2-384
463,262 UART: [kat] SHA2-512-ACC
465,656 UART: [kat] ECC-384
2,758,127 UART: [kat] HMAC-384Kdf
2,770,405 UART: [kat] LMS
3,960,698 UART: [kat] --
3,965,790 UART: [cold-reset] ++
3,967,964 UART: [fht] Storing FHT @ 0x50003400
3,978,062 UART: [idev] ++
3,978,631 UART: [idev] CDI.KEYID = 6
3,979,651 UART: [idev] SUBJECT.KEYID = 7
3,980,809 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
191,596 UART:
191,972 UART: Running Caliptra ROM ...
193,147 UART:
193,302 UART: [state] CFI Enabled
262,614 UART: [state] LifecycleState = Unknown
264,290 UART: [state] DebugLocked = Yes
267,326 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,310 UART: [kat] SHA2-256
443,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,533 UART: [kat] ++
454,036 UART: [kat] sha1
466,001 UART: [kat] SHA2-256
468,694 UART: [kat] SHA2-384
475,531 UART: [kat] SHA2-512-ACC
477,922 UART: [kat] ECC-384
2,765,610 UART: [kat] HMAC-384Kdf
2,778,225 UART: [kat] LMS
3,968,508 UART: [kat] --
3,972,571 UART: [cold-reset] ++
3,973,488 UART: [fht] Storing FHT @ 0x50003400
3,984,870 UART: [idev] ++
3,985,444 UART: [idev] CDI.KEYID = 6
3,986,331 UART: [idev] SUBJECT.KEYID = 7
3,987,596 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
191,670 UART:
192,571 UART: Running Caliptra ROM ...
193,754 UART:
193,901 UART: [state] CFI Enabled
262,978 UART: [state] LifecycleState = Production
264,777 UART: [state] DebugLocked = Yes
266,741 UART: [state] Starting the Watchdog Timer 40000000 cycles
271,979 UART: [kat] SHA2-256
441,715 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,217 UART: [kat] ++
452,784 UART: [kat] sha1
463,668 UART: [kat] SHA2-256
466,354 UART: [kat] SHA2-384
473,080 UART: [kat] SHA2-512-ACC
475,425 UART: [kat] ECC-384
2,766,674 UART: [kat] HMAC-384Kdf
2,799,398 UART: [kat] LMS
3,989,682 UART: [kat] --
3,993,212 UART: [cold-reset] ++
3,994,608 UART: [fht] Storing FHT @ 0x50003400
4,005,556 UART: [idev] ++
4,006,123 UART: [idev] CDI.KEYID = 6
4,007,066 UART: [idev] SUBJECT.KEYID = 7
4,008,340 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
193,732 UART:
194,642 UART: Running Caliptra ROM ...
195,791 UART:
195,933 UART: [state] CFI Enabled
264,472 UART: [state] LifecycleState = Unprovisioned
266,444 UART: [state] DebugLocked = No
268,044 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,643 UART: [kat] SHA2-256
443,335 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,844 UART: [kat] ++
454,411 UART: [kat] sha1
465,456 UART: [kat] SHA2-256
468,144 UART: [kat] SHA2-384
473,641 UART: [kat] SHA2-512-ACC
476,037 UART: [kat] ECC-384
2,767,906 UART: [kat] HMAC-384Kdf
2,801,001 UART: [kat] LMS
3,991,312 UART: [kat] --
3,996,226 UART: [cold-reset] ++
3,997,670 UART: [fht] Storing FHT @ 0x50003400
4,010,504 UART: [idev] ++
4,011,070 UART: [idev] CDI.KEYID = 6
4,011,960 UART: [idev] SUBJECT.KEYID = 7
4,013,250 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,353 UART:
192,705 UART: Running Caliptra ROM ...
193,895 UART:
194,050 UART: [state] CFI Enabled
259,785 UART: [state] LifecycleState = Manufacturing
261,744 UART: [state] DebugLocked = No
264,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,113 UART: [kat] SHA2-256
439,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,349 UART: [kat] ++
450,879 UART: [kat] sha1
461,762 UART: [kat] SHA2-256
464,437 UART: [kat] SHA2-384
470,845 UART: [kat] SHA2-512-ACC
473,243 UART: [kat] ECC-384
2,766,121 UART: [kat] HMAC-384Kdf
2,797,411 UART: [kat] LMS
3,987,733 UART: [kat] --
3,992,163 UART: [cold-reset] ++
3,994,404 UART: [fht] Storing FHT @ 0x50003400
4,005,137 UART: [idev] ++
4,005,711 UART: [idev] CDI.KEYID = 6
4,006,660 UART: [idev] SUBJECT.KEYID = 7
4,007,902 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
192,481 UART:
192,837 UART: Running Caliptra ROM ...
194,034 UART:
194,188 UART: [state] CFI Enabled
261,550 UART: [state] LifecycleState = Unknown
263,261 UART: [state] DebugLocked = No
264,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,191 UART: [kat] SHA2-256
438,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,361 UART: [kat] ++
449,840 UART: [kat] sha1
461,123 UART: [kat] SHA2-256
463,798 UART: [kat] SHA2-384
470,867 UART: [kat] SHA2-512-ACC
473,259 UART: [kat] ECC-384
2,765,031 UART: [kat] HMAC-384Kdf
2,777,269 UART: [kat] LMS
3,967,520 UART: [kat] --
3,971,660 UART: [cold-reset] ++
3,973,977 UART: [fht] Storing FHT @ 0x50003400
3,985,685 UART: [idev] ++
3,986,296 UART: [idev] CDI.KEYID = 6
3,987,374 UART: [idev] SUBJECT.KEYID = 7
3,988,482 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,295 UART:
192,643 UART: Running Caliptra ROM ...
193,828 UART:
193,980 UART: [state] CFI Enabled
263,062 UART: [state] LifecycleState = Production
264,862 UART: [state] DebugLocked = No
267,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,027 UART: [kat] SHA2-256
442,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,192 UART: [kat] ++
453,721 UART: [kat] sha1
464,801 UART: [kat] SHA2-256
467,526 UART: [kat] SHA2-384
473,508 UART: [kat] SHA2-512-ACC
475,907 UART: [kat] ECC-384
2,767,615 UART: [kat] HMAC-384Kdf
2,799,448 UART: [kat] LMS
3,989,748 UART: [kat] --
3,992,463 UART: [cold-reset] ++
3,993,750 UART: [fht] Storing FHT @ 0x50003400
4,004,911 UART: [idev] ++
4,005,478 UART: [idev] CDI.KEYID = 6
4,006,366 UART: [idev] SUBJECT.KEYID = 7
4,007,661 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,506 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,873 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
191,764 UART:
192,116 UART: Running Caliptra ROM ...
193,246 UART:
603,104 UART: [state] CFI Enabled
616,452 UART: [state] LifecycleState = Unprovisioned
618,360 UART: [state] DebugLocked = Yes
621,169 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,208 UART: [kat] SHA2-256
796,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,537 UART: [kat] ++
807,996 UART: [kat] sha1
818,328 UART: [kat] SHA2-256
821,011 UART: [kat] SHA2-384
827,641 UART: [kat] SHA2-512-ACC
830,029 UART: [kat] ECC-384
3,114,071 UART: [kat] HMAC-384Kdf
3,126,210 UART: [kat] LMS
4,316,319 UART: [kat] --
4,321,757 UART: [cold-reset] ++
4,323,962 UART: [fht] Storing FHT @ 0x50003400
4,334,741 UART: [idev] ++
4,335,311 UART: [idev] CDI.KEYID = 6
4,336,245 UART: [idev] SUBJECT.KEYID = 7
4,337,508 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
13,284 writing to cptra_bootfsm_go
202,801 UART:
203,566 UART: Running Caliptra ROM ...
204,751 UART:
613,959 UART: [state] CFI Enabled
627,080 UART: [state] LifecycleState = Manufacturing
629,010 UART: [state] DebugLocked = Yes
631,130 UART: [state] Starting the Watchdog Timer 40000000 cycles
635,923 UART: [kat] SHA2-256
805,693 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
816,226 UART: [kat] ++
816,726 UART: [kat] sha1
828,308 UART: [kat] SHA2-256
831,045 UART: [kat] SHA2-384
836,920 UART: [kat] SHA2-512-ACC
839,324 UART: [kat] ECC-384
3,125,666 UART: [kat] HMAC-384Kdf
3,138,551 UART: [kat] LMS
4,328,659 UART: [kat] --
4,334,075 UART: [cold-reset] ++
4,336,178 UART: [fht] Storing FHT @ 0x50003400
4,348,046 UART: [idev] ++
4,348,613 UART: [idev] CDI.KEYID = 6
4,349,553 UART: [idev] SUBJECT.KEYID = 7
4,350,818 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
191,762 UART:
192,162 UART: Running Caliptra ROM ...
193,349 UART:
603,090 UART: [state] CFI Enabled
618,503 UART: [state] LifecycleState = Unknown
620,146 UART: [state] DebugLocked = Yes
622,101 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,513 UART: [kat] SHA2-256
796,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,880 UART: [kat] ++
807,428 UART: [kat] sha1
818,583 UART: [kat] SHA2-256
821,301 UART: [kat] SHA2-384
825,896 UART: [kat] SHA2-512-ACC
828,298 UART: [kat] ECC-384
3,113,152 UART: [kat] HMAC-384Kdf
3,123,829 UART: [kat] LMS
4,313,950 UART: [kat] --
4,318,775 UART: [cold-reset] ++
4,319,901 UART: [fht] Storing FHT @ 0x50003400
4,331,544 UART: [idev] ++
4,332,116 UART: [idev] CDI.KEYID = 6
4,333,053 UART: [idev] SUBJECT.KEYID = 7
4,334,273 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
191,913 UART:
192,852 UART: Running Caliptra ROM ...
194,018 UART:
603,048 UART: [state] CFI Enabled
618,923 UART: [state] LifecycleState = Production
620,702 UART: [state] DebugLocked = Yes
623,537 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,640 UART: [kat] SHA2-256
798,444 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,971 UART: [kat] ++
809,495 UART: [kat] sha1
819,669 UART: [kat] SHA2-256
822,366 UART: [kat] SHA2-384
829,236 UART: [kat] SHA2-512-ACC
831,633 UART: [kat] ECC-384
3,116,813 UART: [kat] HMAC-384Kdf
3,129,491 UART: [kat] LMS
4,319,592 UART: [kat] --
4,323,912 UART: [cold-reset] ++
4,325,577 UART: [fht] Storing FHT @ 0x50003400
4,337,161 UART: [idev] ++
4,337,778 UART: [idev] CDI.KEYID = 6
4,338,660 UART: [idev] SUBJECT.KEYID = 7
4,339,927 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,662 UART:
193,536 UART: Running Caliptra ROM ...
194,706 UART:
603,818 UART: [state] CFI Enabled
617,054 UART: [state] LifecycleState = Unprovisioned
619,021 UART: [state] DebugLocked = No
620,890 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,581 UART: [kat] SHA2-256
796,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,877 UART: [kat] ++
807,472 UART: [kat] sha1
819,759 UART: [kat] SHA2-256
822,444 UART: [kat] SHA2-384
829,122 UART: [kat] SHA2-512-ACC
831,458 UART: [kat] ECC-384
3,113,891 UART: [kat] HMAC-384Kdf
3,126,458 UART: [kat] LMS
4,316,568 UART: [kat] --
4,320,357 UART: [cold-reset] ++
4,322,666 UART: [fht] Storing FHT @ 0x50003400
4,333,505 UART: [idev] ++
4,334,085 UART: [idev] CDI.KEYID = 6
4,335,004 UART: [idev] SUBJECT.KEYID = 7
4,336,274 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,520 UART:
192,880 UART: Running Caliptra ROM ...
194,084 UART:
603,592 UART: [state] CFI Enabled
614,993 UART: [state] LifecycleState = Manufacturing
616,901 UART: [state] DebugLocked = No
618,390 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,717 UART: [kat] SHA2-256
793,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,969 UART: [kat] ++
804,475 UART: [kat] sha1
816,755 UART: [kat] SHA2-256
819,485 UART: [kat] SHA2-384
824,703 UART: [kat] SHA2-512-ACC
827,094 UART: [kat] ECC-384
3,111,999 UART: [kat] HMAC-384Kdf
3,122,840 UART: [kat] LMS
4,312,930 UART: [kat] --
4,317,895 UART: [cold-reset] ++
4,319,552 UART: [fht] Storing FHT @ 0x50003400
4,331,245 UART: [idev] ++
4,331,877 UART: [idev] CDI.KEYID = 6
4,332,755 UART: [idev] SUBJECT.KEYID = 7
4,334,019 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,599 writing to cptra_bootfsm_go
192,806 UART:
193,177 UART: Running Caliptra ROM ...
194,370 UART:
603,853 UART: [state] CFI Enabled
618,721 UART: [state] LifecycleState = Unknown
620,377 UART: [state] DebugLocked = No
622,243 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,979 UART: [kat] SHA2-256
797,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,267 UART: [kat] ++
808,743 UART: [kat] sha1
818,429 UART: [kat] SHA2-256
821,117 UART: [kat] SHA2-384
826,340 UART: [kat] SHA2-512-ACC
828,736 UART: [kat] ECC-384
3,113,187 UART: [kat] HMAC-384Kdf
3,123,323 UART: [kat] LMS
4,313,447 UART: [kat] --
4,317,350 UART: [cold-reset] ++
4,319,290 UART: [fht] Storing FHT @ 0x50003400
4,331,639 UART: [idev] ++
4,332,203 UART: [idev] CDI.KEYID = 6
4,333,220 UART: [idev] SUBJECT.KEYID = 7
4,334,377 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
192,592 UART:
192,955 UART: Running Caliptra ROM ...
194,159 UART:
603,991 UART: [state] CFI Enabled
616,422 UART: [state] LifecycleState = Production
618,227 UART: [state] DebugLocked = No
621,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,222 UART: [kat] SHA2-256
796,008 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,537 UART: [kat] ++
806,980 UART: [kat] sha1
817,693 UART: [kat] SHA2-256
820,437 UART: [kat] SHA2-384
827,275 UART: [kat] SHA2-512-ACC
829,668 UART: [kat] ECC-384
3,114,307 UART: [kat] HMAC-384Kdf
3,125,251 UART: [kat] LMS
4,315,344 UART: [kat] --
4,319,949 UART: [cold-reset] ++
4,322,051 UART: [fht] Storing FHT @ 0x50003400
4,333,969 UART: [idev] ++
4,334,591 UART: [idev] CDI.KEYID = 6
4,335,520 UART: [idev] SUBJECT.KEYID = 7
4,336,734 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
191,848 UART:
192,268 UART: Running Caliptra ROM ...
193,385 UART:
193,534 UART: [state] CFI Enabled
263,680 UART: [state] LifecycleState = Unprovisioned
265,606 UART: [state] DebugLocked = Yes
267,847 UART: [state] Starting the WD Timer 40000000 cycles
272,711 UART: [kat] SHA2-256
451,846 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,434 UART: [kat] ++
464,026 UART: [kat] sha1
476,318 UART: [kat] SHA2-256
479,336 UART: [kat] SHA2-384
486,880 UART: [kat] SHA2-512-ACC
489,867 UART: [kat] ECC-384
2,948,039 UART: [kat] HMAC-384Kdf
2,971,129 UART: [kat] LMS
3,500,640 UART: [kat] --
3,504,177 UART: [cold-reset] ++
3,505,254 UART: [fht] FHT @ 0x50003400
3,516,213 UART: [idev] ++
3,516,781 UART: [idev] CDI.KEYID = 6
3,517,753 UART: [idev] SUBJECT.KEYID = 7
3,518,914 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,771 writing to cptra_bootfsm_go
192,936 UART:
193,689 UART: Running Caliptra ROM ...
194,833 UART:
195,004 UART: [state] CFI Enabled
255,604 UART: [state] LifecycleState = Manufacturing
257,499 UART: [state] DebugLocked = Yes
259,837 UART: [state] Starting the WD Timer 40000000 cycles
263,833 UART: [kat] SHA2-256
443,006 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,570 UART: [kat] ++
455,141 UART: [kat] sha1
464,837 UART: [kat] SHA2-256
467,837 UART: [kat] SHA2-384
475,057 UART: [kat] SHA2-512-ACC
477,994 UART: [kat] ECC-384
2,940,449 UART: [kat] HMAC-384Kdf
2,963,666 UART: [kat] LMS
3,493,154 UART: [kat] --
3,497,802 UART: [cold-reset] ++
3,500,242 UART: [fht] FHT @ 0x50003400
3,510,191 UART: [idev] ++
3,510,764 UART: [idev] CDI.KEYID = 6
3,511,645 UART: [idev] SUBJECT.KEYID = 7
3,512,856 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,793 writing to cptra_bootfsm_go
192,401 UART:
193,187 UART: Running Caliptra ROM ...
194,341 UART:
194,487 UART: [state] CFI Enabled
261,717 UART: [state] LifecycleState = Unknown
263,348 UART: [state] DebugLocked = Yes
265,796 UART: [state] Starting the WD Timer 40000000 cycles
270,012 UART: [kat] SHA2-256
449,150 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,729 UART: [kat] ++
461,268 UART: [kat] sha1
471,534 UART: [kat] SHA2-256
474,544 UART: [kat] SHA2-384
480,530 UART: [kat] SHA2-512-ACC
483,488 UART: [kat] ECC-384
2,946,064 UART: [kat] HMAC-384Kdf
2,968,893 UART: [kat] LMS
3,498,363 UART: [kat] --
3,503,515 UART: [cold-reset] ++
3,505,021 UART: [fht] FHT @ 0x50003400
3,516,659 UART: [idev] ++
3,517,234 UART: [idev] CDI.KEYID = 6
3,518,145 UART: [idev] SUBJECT.KEYID = 7
3,519,302 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
20,467 writing to cptra_bootfsm_go
209,068 UART:
210,010 UART: Running Caliptra ROM ...
211,138 UART:
211,307 UART: [state] CFI Enabled
287,456 UART: [state] LifecycleState = Production
289,262 UART: [state] DebugLocked = Yes
290,957 UART: [state] Starting the WD Timer 40000000 cycles
295,608 UART: [kat] SHA2-256
474,802 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
486,333 UART: [kat] ++
486,868 UART: [kat] sha1
497,454 UART: [kat] SHA2-256
500,464 UART: [kat] SHA2-384
506,666 UART: [kat] SHA2-512-ACC
509,599 UART: [kat] ECC-384
2,970,328 UART: [kat] HMAC-384Kdf
2,994,466 UART: [kat] LMS
3,523,949 UART: [kat] --
3,528,314 UART: [cold-reset] ++
3,529,835 UART: [fht] FHT @ 0x50003400
3,541,038 UART: [idev] ++
3,541,604 UART: [idev] CDI.KEYID = 6
3,542,490 UART: [idev] SUBJECT.KEYID = 7
3,543,702 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,000 writing to cptra_bootfsm_go
193,157 UART:
193,838 UART: Running Caliptra ROM ...
194,987 UART:
195,137 UART: [state] CFI Enabled
262,481 UART: [state] LifecycleState = Unprovisioned
264,373 UART: [state] DebugLocked = No
265,621 UART: [state] WD Timer not started. Device not locked for debugging
269,553 UART: [kat] SHA2-256
448,667 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,279 UART: [kat] ++
460,814 UART: [kat] sha1
472,687 UART: [kat] SHA2-256
475,747 UART: [kat] SHA2-384
481,894 UART: [kat] SHA2-512-ACC
484,885 UART: [kat] ECC-384
2,946,698 UART: [kat] HMAC-384Kdf
2,970,724 UART: [kat] LMS
3,500,198 UART: [kat] --
3,503,147 UART: [cold-reset] ++
3,505,421 UART: [fht] FHT @ 0x50003400
3,516,228 UART: [idev] ++
3,516,813 UART: [idev] CDI.KEYID = 6
3,517,729 UART: [idev] SUBJECT.KEYID = 7
3,518,893 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,308 UART:
192,689 UART: Running Caliptra ROM ...
193,902 UART:
194,058 UART: [state] CFI Enabled
259,276 UART: [state] LifecycleState = Manufacturing
261,141 UART: [state] DebugLocked = No
263,661 UART: [state] WD Timer not started. Device not locked for debugging
267,480 UART: [kat] SHA2-256
446,560 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,169 UART: [kat] ++
458,710 UART: [kat] sha1
469,704 UART: [kat] SHA2-256
472,716 UART: [kat] SHA2-384
478,934 UART: [kat] SHA2-512-ACC
481,912 UART: [kat] ECC-384
2,944,852 UART: [kat] HMAC-384Kdf
2,966,020 UART: [kat] LMS
3,495,441 UART: [kat] --
3,501,160 UART: [cold-reset] ++
3,503,211 UART: [fht] FHT @ 0x50003400
3,514,082 UART: [idev] ++
3,514,841 UART: [idev] CDI.KEYID = 6
3,515,739 UART: [idev] SUBJECT.KEYID = 7
3,516,791 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,375 UART:
192,740 UART: Running Caliptra ROM ...
193,928 UART:
194,083 UART: [state] CFI Enabled
255,883 UART: [state] LifecycleState = Unknown
257,539 UART: [state] DebugLocked = No
259,840 UART: [state] WD Timer not started. Device not locked for debugging
262,791 UART: [kat] SHA2-256
441,896 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
453,476 UART: [kat] ++
454,014 UART: [kat] sha1
464,847 UART: [kat] SHA2-256
467,910 UART: [kat] SHA2-384
474,799 UART: [kat] SHA2-512-ACC
477,753 UART: [kat] ECC-384
2,941,948 UART: [kat] HMAC-384Kdf
2,966,460 UART: [kat] LMS
3,495,889 UART: [kat] --
3,500,008 UART: [cold-reset] ++
3,501,469 UART: [fht] FHT @ 0x50003400
3,513,910 UART: [idev] ++
3,514,473 UART: [idev] CDI.KEYID = 6
3,515,490 UART: [idev] SUBJECT.KEYID = 7
3,516,591 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,120 UART:
192,501 UART: Running Caliptra ROM ...
193,623 UART:
193,766 UART: [state] CFI Enabled
258,236 UART: [state] LifecycleState = Production
260,041 UART: [state] DebugLocked = No
261,719 UART: [state] WD Timer not started. Device not locked for debugging
266,046 UART: [kat] SHA2-256
445,161 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
456,707 UART: [kat] ++
457,159 UART: [kat] sha1
468,197 UART: [kat] SHA2-256
471,262 UART: [kat] SHA2-384
477,128 UART: [kat] SHA2-512-ACC
480,119 UART: [kat] ECC-384
2,945,596 UART: [kat] HMAC-384Kdf
2,967,035 UART: [kat] LMS
3,496,483 UART: [kat] --
3,501,323 UART: [cold-reset] ++
3,502,181 UART: [fht] FHT @ 0x50003400
3,512,866 UART: [idev] ++
3,513,432 UART: [idev] CDI.KEYID = 6
3,514,453 UART: [idev] SUBJECT.KEYID = 7
3,515,556 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
14,815 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,797 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
19,557 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,905 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
191,935 UART:
192,373 UART: Running Caliptra ROM ...
193,488 UART:
602,918 UART: [state] CFI Enabled
618,848 UART: [state] LifecycleState = Unprovisioned
620,739 UART: [state] DebugLocked = Yes
622,742 UART: [state] Starting the WD Timer 40000000 cycles
627,057 UART: [kat] SHA2-256
806,176 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,768 UART: [kat] ++
818,324 UART: [kat] sha1
829,318 UART: [kat] SHA2-256
832,380 UART: [kat] SHA2-384
837,491 UART: [kat] SHA2-512-ACC
840,420 UART: [kat] ECC-384
3,284,997 UART: [kat] HMAC-384Kdf
3,297,503 UART: [kat] LMS
3,827,004 UART: [kat] --
3,830,620 UART: [cold-reset] ++
3,833,196 UART: [fht] FHT @ 0x50003400
3,844,222 UART: [idev] ++
3,844,841 UART: [idev] CDI.KEYID = 6
3,845,727 UART: [idev] SUBJECT.KEYID = 7
3,846,943 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
23,049 writing to cptra_bootfsm_go
213,864 UART:
214,650 UART: Running Caliptra ROM ...
218,597 UART:
624,970 UART: [state] CFI Enabled
636,980 UART: [state] LifecycleState = Manufacturing
638,848 UART: [state] DebugLocked = Yes
640,713 UART: [state] Starting the WD Timer 40000000 cycles
645,417 UART: [kat] SHA2-256
824,576 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
836,150 UART: [kat] ++
836,705 UART: [kat] sha1
846,940 UART: [kat] SHA2-256
849,939 UART: [kat] SHA2-384
855,923 UART: [kat] SHA2-512-ACC
858,904 UART: [kat] ECC-384
3,301,473 UART: [kat] HMAC-384Kdf
3,314,101 UART: [kat] LMS
3,843,662 UART: [kat] --
3,849,255 UART: [cold-reset] ++
3,850,553 UART: [fht] FHT @ 0x50003400
3,863,100 UART: [idev] ++
3,863,664 UART: [idev] CDI.KEYID = 6
3,864,595 UART: [idev] SUBJECT.KEYID = 7
3,865,756 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
21,230 writing to cptra_bootfsm_go
209,862 UART:
210,674 UART: Running Caliptra ROM ...
211,858 UART:
620,774 UART: [state] CFI Enabled
636,566 UART: [state] LifecycleState = Unknown
638,225 UART: [state] DebugLocked = Yes
640,937 UART: [state] Starting the WD Timer 40000000 cycles
646,337 UART: [kat] SHA2-256
825,465 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
837,020 UART: [kat] ++
837,568 UART: [kat] sha1
849,108 UART: [kat] SHA2-256
852,132 UART: [kat] SHA2-384
858,494 UART: [kat] SHA2-512-ACC
861,481 UART: [kat] ECC-384
3,302,347 UART: [kat] HMAC-384Kdf
3,314,898 UART: [kat] LMS
3,844,411 UART: [kat] --
3,848,608 UART: [cold-reset] ++
3,849,943 UART: [fht] FHT @ 0x50003400
3,861,350 UART: [idev] ++
3,861,928 UART: [idev] CDI.KEYID = 6
3,862,812 UART: [idev] SUBJECT.KEYID = 7
3,864,029 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,674 writing to cptra_bootfsm_go
192,270 UART:
192,932 UART: Running Caliptra ROM ...
194,033 UART:
603,574 UART: [state] CFI Enabled
621,621 UART: [state] LifecycleState = Production
623,335 UART: [state] DebugLocked = Yes
624,966 UART: [state] Starting the WD Timer 40000000 cycles
629,007 UART: [kat] SHA2-256
808,153 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,718 UART: [kat] ++
820,258 UART: [kat] sha1
831,489 UART: [kat] SHA2-256
834,497 UART: [kat] SHA2-384
839,131 UART: [kat] SHA2-512-ACC
842,118 UART: [kat] ECC-384
3,284,455 UART: [kat] HMAC-384Kdf
3,296,095 UART: [kat] LMS
3,825,614 UART: [kat] --
3,831,011 UART: [cold-reset] ++
3,832,781 UART: [fht] FHT @ 0x50003400
3,842,461 UART: [idev] ++
3,843,032 UART: [idev] CDI.KEYID = 6
3,843,943 UART: [idev] SUBJECT.KEYID = 7
3,845,099 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,556 UART:
193,332 UART: Running Caliptra ROM ...
194,491 UART:
603,606 UART: [state] CFI Enabled
615,100 UART: [state] LifecycleState = Unprovisioned
616,995 UART: [state] DebugLocked = No
618,485 UART: [state] WD Timer not started. Device not locked for debugging
622,619 UART: [kat] SHA2-256
801,737 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,331 UART: [kat] ++
813,862 UART: [kat] sha1
825,316 UART: [kat] SHA2-256
828,338 UART: [kat] SHA2-384
833,892 UART: [kat] SHA2-512-ACC
836,824 UART: [kat] ECC-384
3,278,979 UART: [kat] HMAC-384Kdf
3,292,350 UART: [kat] LMS
3,821,827 UART: [kat] --
3,826,154 UART: [cold-reset] ++
3,828,298 UART: [fht] FHT @ 0x50003400
3,840,837 UART: [idev] ++
3,841,406 UART: [idev] CDI.KEYID = 6
3,842,287 UART: [idev] SUBJECT.KEYID = 7
3,843,554 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,555 UART:
192,925 UART: Running Caliptra ROM ...
194,068 UART:
603,492 UART: [state] CFI Enabled
616,294 UART: [state] LifecycleState = Manufacturing
618,177 UART: [state] DebugLocked = No
619,930 UART: [state] WD Timer not started. Device not locked for debugging
623,263 UART: [kat] SHA2-256
802,382 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
813,983 UART: [kat] ++
814,429 UART: [kat] sha1
826,111 UART: [kat] SHA2-256
829,109 UART: [kat] SHA2-384
835,945 UART: [kat] SHA2-512-ACC
838,870 UART: [kat] ECC-384
3,280,904 UART: [kat] HMAC-384Kdf
3,291,945 UART: [kat] LMS
3,821,474 UART: [kat] --
3,824,380 UART: [cold-reset] ++
3,825,450 UART: [fht] FHT @ 0x50003400
3,837,129 UART: [idev] ++
3,837,701 UART: [idev] CDI.KEYID = 6
3,838,669 UART: [idev] SUBJECT.KEYID = 7
3,839,827 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,594 UART:
192,953 UART: Running Caliptra ROM ...
194,049 UART:
603,805 UART: [state] CFI Enabled
616,244 UART: [state] LifecycleState = Unknown
617,910 UART: [state] DebugLocked = No
620,284 UART: [state] WD Timer not started. Device not locked for debugging
624,313 UART: [kat] SHA2-256
803,467 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,006 UART: [kat] ++
815,542 UART: [kat] sha1
825,074 UART: [kat] SHA2-256
828,076 UART: [kat] SHA2-384
834,762 UART: [kat] SHA2-512-ACC
837,766 UART: [kat] ECC-384
3,280,144 UART: [kat] HMAC-384Kdf
3,292,534 UART: [kat] LMS
3,822,033 UART: [kat] --
3,828,934 UART: [cold-reset] ++
3,831,357 UART: [fht] FHT @ 0x50003400
3,843,680 UART: [idev] ++
3,844,246 UART: [idev] CDI.KEYID = 6
3,845,212 UART: [idev] SUBJECT.KEYID = 7
3,846,288 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
194,052 UART:
194,448 UART: Running Caliptra ROM ...
195,650 UART:
605,217 UART: [state] CFI Enabled
615,666 UART: [state] LifecycleState = Production
617,386 UART: [state] DebugLocked = No
620,271 UART: [state] WD Timer not started. Device not locked for debugging
623,836 UART: [kat] SHA2-256
802,989 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,557 UART: [kat] ++
815,096 UART: [kat] sha1
825,195 UART: [kat] SHA2-256
828,198 UART: [kat] SHA2-384
835,578 UART: [kat] SHA2-512-ACC
838,519 UART: [kat] ECC-384
3,281,905 UART: [kat] HMAC-384Kdf
3,294,051 UART: [kat] LMS
3,823,520 UART: [kat] --
3,829,190 UART: [cold-reset] ++
3,830,038 UART: [fht] FHT @ 0x50003400
3,842,262 UART: [idev] ++
3,842,866 UART: [idev] CDI.KEYID = 6
3,843,756 UART: [idev] SUBJECT.KEYID = 7
3,844,972 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
7,326 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,243 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
21,850 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,151 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
191,698 UART:
192,076 UART: Running Caliptra ROM ...
193,240 UART:
193,394 UART: [state] CFI Enabled
263,231 UART: [state] LifecycleState = Unprovisioned
265,666 UART: [state] DebugLocked = Yes
267,411 UART: [state] Starting the WD Timer 40000000 cycles
272,505 UART: [kat] SHA2-256
462,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,149 UART: [kat] ++
474,947 UART: [kat] sha1
484,883 UART: [kat] SHA2-256
487,905 UART: [kat] SHA2-384
492,862 UART: [kat] SHA2-512-ACC
495,421 UART: [kat] ECC-384
2,945,103 UART: [kat] HMAC-384Kdf
2,968,658 UART: [kat] LMS
3,500,454 UART: [kat] --
3,506,821 UART: [cold-reset] ++
3,509,124 UART: [fht] FHT @ 0x50003400
3,520,318 UART: [idev] ++
3,521,037 UART: [idev] CDI.KEYID = 6
3,521,957 UART: [idev] SUBJECT.KEYID = 7
3,523,139 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,408 UART:
193,244 UART: Running Caliptra ROM ...
194,383 UART:
194,528 UART: [state] CFI Enabled
267,646 UART: [state] LifecycleState = Manufacturing
270,035 UART: [state] DebugLocked = Yes
271,628 UART: [state] Starting the WD Timer 40000000 cycles
277,788 UART: [kat] SHA2-256
467,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,409 UART: [kat] ++
479,037 UART: [kat] sha1
490,522 UART: [kat] SHA2-256
493,532 UART: [kat] SHA2-384
500,059 UART: [kat] SHA2-512-ACC
502,633 UART: [kat] ECC-384
2,951,794 UART: [kat] HMAC-384Kdf
2,974,832 UART: [kat] LMS
3,506,609 UART: [kat] --
3,511,972 UART: [cold-reset] ++
3,513,855 UART: [fht] FHT @ 0x50003400
3,525,488 UART: [idev] ++
3,526,173 UART: [idev] CDI.KEYID = 6
3,527,138 UART: [idev] SUBJECT.KEYID = 7
3,528,353 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
191,738 UART:
192,678 UART: Running Caliptra ROM ...
193,790 UART:
193,933 UART: [state] CFI Enabled
261,481 UART: [state] LifecycleState = Unknown
263,614 UART: [state] DebugLocked = Yes
265,438 UART: [state] Starting the WD Timer 40000000 cycles
270,521 UART: [kat] SHA2-256
460,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,165 UART: [kat] ++
471,697 UART: [kat] sha1
483,974 UART: [kat] SHA2-256
486,992 UART: [kat] SHA2-384
494,056 UART: [kat] SHA2-512-ACC
496,634 UART: [kat] ECC-384
2,946,418 UART: [kat] HMAC-384Kdf
2,970,895 UART: [kat] LMS
3,502,650 UART: [kat] --
3,508,451 UART: [cold-reset] ++
3,509,420 UART: [fht] FHT @ 0x50003400
3,520,025 UART: [idev] ++
3,520,715 UART: [idev] CDI.KEYID = 6
3,521,733 UART: [idev] SUBJECT.KEYID = 7
3,522,892 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
191,979 UART:
192,915 UART: Running Caliptra ROM ...
194,086 UART:
194,245 UART: [state] CFI Enabled
263,664 UART: [state] LifecycleState = Production
265,909 UART: [state] DebugLocked = Yes
267,931 UART: [state] Starting the WD Timer 40000000 cycles
272,493 UART: [kat] SHA2-256
462,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,164 UART: [kat] ++
473,750 UART: [kat] sha1
485,002 UART: [kat] SHA2-256
488,032 UART: [kat] SHA2-384
494,610 UART: [kat] SHA2-512-ACC
497,172 UART: [kat] ECC-384
2,945,560 UART: [kat] HMAC-384Kdf
2,969,054 UART: [kat] LMS
3,500,829 UART: [kat] --
3,503,929 UART: [cold-reset] ++
3,506,082 UART: [fht] FHT @ 0x50003400
3,516,852 UART: [idev] ++
3,517,530 UART: [idev] CDI.KEYID = 6
3,518,550 UART: [idev] SUBJECT.KEYID = 7
3,519,710 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,288 UART:
193,180 UART: Running Caliptra ROM ...
194,343 UART:
194,493 UART: [state] CFI Enabled
268,488 UART: [state] LifecycleState = Unprovisioned
270,889 UART: [state] DebugLocked = No
272,547 UART: [state] WD Timer not started. Device not locked for debugging
278,003 UART: [kat] SHA2-256
467,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,656 UART: [kat] ++
479,147 UART: [kat] sha1
490,138 UART: [kat] SHA2-256
493,150 UART: [kat] SHA2-384
499,077 UART: [kat] SHA2-512-ACC
501,697 UART: [kat] ECC-384
2,950,774 UART: [kat] HMAC-384Kdf
2,973,727 UART: [kat] LMS
3,505,519 UART: [kat] --
3,510,015 UART: [cold-reset] ++
3,511,523 UART: [fht] FHT @ 0x50003400
3,523,148 UART: [idev] ++
3,523,881 UART: [idev] CDI.KEYID = 6
3,524,789 UART: [idev] SUBJECT.KEYID = 7
3,526,002 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,345 UART:
192,699 UART: Running Caliptra ROM ...
193,927 UART:
194,081 UART: [state] CFI Enabled
263,774 UART: [state] LifecycleState = Manufacturing
266,182 UART: [state] DebugLocked = No
268,944 UART: [state] WD Timer not started. Device not locked for debugging
272,716 UART: [kat] SHA2-256
462,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,176 UART: [kat] ++
473,654 UART: [kat] sha1
483,991 UART: [kat] SHA2-256
487,002 UART: [kat] SHA2-384
492,289 UART: [kat] SHA2-512-ACC
494,856 UART: [kat] ECC-384
2,945,491 UART: [kat] HMAC-384Kdf
2,969,406 UART: [kat] LMS
3,501,156 UART: [kat] --
3,505,056 UART: [cold-reset] ++
3,506,051 UART: [fht] FHT @ 0x50003400
3,517,046 UART: [idev] ++
3,517,736 UART: [idev] CDI.KEYID = 6
3,518,754 UART: [idev] SUBJECT.KEYID = 7
3,519,913 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,068 UART:
192,618 UART: Running Caliptra ROM ...
193,839 UART:
194,000 UART: [state] CFI Enabled
255,301 UART: [state] LifecycleState = Unknown
257,003 UART: [state] DebugLocked = No
259,033 UART: [state] WD Timer not started. Device not locked for debugging
264,229 UART: [kat] SHA2-256
454,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,885 UART: [kat] ++
465,364 UART: [kat] sha1
476,515 UART: [kat] SHA2-256
479,524 UART: [kat] SHA2-384
485,935 UART: [kat] SHA2-512-ACC
488,503 UART: [kat] ECC-384
2,940,871 UART: [kat] HMAC-384Kdf
2,966,745 UART: [kat] LMS
3,498,522 UART: [kat] --
3,504,141 UART: [cold-reset] ++
3,506,626 UART: [fht] FHT @ 0x50003400
3,517,502 UART: [idev] ++
3,518,232 UART: [idev] CDI.KEYID = 6
3,519,245 UART: [idev] SUBJECT.KEYID = 7
3,520,368 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,300 UART:
192,657 UART: Running Caliptra ROM ...
193,862 UART:
194,036 UART: [state] CFI Enabled
256,650 UART: [state] LifecycleState = Production
258,827 UART: [state] DebugLocked = No
261,152 UART: [state] WD Timer not started. Device not locked for debugging
264,873 UART: [kat] SHA2-256
454,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,475 UART: [kat] ++
465,926 UART: [kat] sha1
477,394 UART: [kat] SHA2-256
480,418 UART: [kat] SHA2-384
486,512 UART: [kat] SHA2-512-ACC
489,130 UART: [kat] ECC-384
2,943,664 UART: [kat] HMAC-384Kdf
2,966,322 UART: [kat] LMS
3,498,110 UART: [kat] --
3,501,256 UART: [cold-reset] ++
3,502,136 UART: [fht] FHT @ 0x50003400
3,512,806 UART: [idev] ++
3,513,498 UART: [idev] CDI.KEYID = 6
3,514,522 UART: [idev] SUBJECT.KEYID = 7
3,515,628 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
31,520 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
18,242 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
191,780 UART:
192,144 UART: Running Caliptra ROM ...
193,302 UART:
603,152 UART: [state] CFI Enabled
616,215 UART: [state] LifecycleState = Unprovisioned
618,602 UART: [state] DebugLocked = Yes
620,129 UART: [state] Starting the WD Timer 40000000 cycles
624,746 UART: [kat] SHA2-256
814,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,466 UART: [kat] ++
826,070 UART: [kat] sha1
836,850 UART: [kat] SHA2-256
839,862 UART: [kat] SHA2-384
846,160 UART: [kat] SHA2-512-ACC
848,769 UART: [kat] ECC-384
3,290,508 UART: [kat] HMAC-384Kdf
3,302,622 UART: [kat] LMS
3,834,448 UART: [kat] --
3,839,476 UART: [cold-reset] ++
3,840,868 UART: [fht] FHT @ 0x50003400
3,851,042 UART: [idev] ++
3,851,724 UART: [idev] CDI.KEYID = 6
3,852,745 UART: [idev] SUBJECT.KEYID = 7
3,853,935 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,783 UART:
193,636 UART: Running Caliptra ROM ...
194,799 UART:
604,135 UART: [state] CFI Enabled
613,571 UART: [state] LifecycleState = Manufacturing
615,964 UART: [state] DebugLocked = Yes
618,193 UART: [state] Starting the WD Timer 40000000 cycles
624,412 UART: [kat] SHA2-256
814,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,100 UART: [kat] ++
825,717 UART: [kat] sha1
837,412 UART: [kat] SHA2-256
840,424 UART: [kat] SHA2-384
845,486 UART: [kat] SHA2-512-ACC
848,044 UART: [kat] ECC-384
3,290,629 UART: [kat] HMAC-384Kdf
3,303,841 UART: [kat] LMS
3,835,641 UART: [kat] --
3,838,517 UART: [cold-reset] ++
3,841,102 UART: [fht] FHT @ 0x50003400
3,851,819 UART: [idev] ++
3,852,497 UART: [idev] CDI.KEYID = 6
3,853,512 UART: [idev] SUBJECT.KEYID = 7
3,854,678 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
191,933 UART:
192,831 UART: Running Caliptra ROM ...
193,937 UART:
603,210 UART: [state] CFI Enabled
619,639 UART: [state] LifecycleState = Unknown
621,664 UART: [state] DebugLocked = Yes
624,584 UART: [state] Starting the WD Timer 40000000 cycles
629,198 UART: [kat] SHA2-256
819,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,878 UART: [kat] ++
830,466 UART: [kat] sha1
842,555 UART: [kat] SHA2-256
845,527 UART: [kat] SHA2-384
851,348 UART: [kat] SHA2-512-ACC
853,958 UART: [kat] ECC-384
3,298,915 UART: [kat] HMAC-384Kdf
3,311,399 UART: [kat] LMS
3,843,242 UART: [kat] --
3,849,634 UART: [cold-reset] ++
3,850,865 UART: [fht] FHT @ 0x50003400
3,861,201 UART: [idev] ++
3,861,893 UART: [idev] CDI.KEYID = 6
3,862,909 UART: [idev] SUBJECT.KEYID = 7
3,864,076 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
13,226 writing to cptra_bootfsm_go
201,846 UART:
202,726 UART: Running Caliptra ROM ...
203,897 UART:
613,042 UART: [state] CFI Enabled
628,448 UART: [state] LifecycleState = Production
630,710 UART: [state] DebugLocked = Yes
632,504 UART: [state] Starting the WD Timer 40000000 cycles
638,132 UART: [kat] SHA2-256
828,009 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
838,810 UART: [kat] ++
839,398 UART: [kat] sha1
849,192 UART: [kat] SHA2-256
852,211 UART: [kat] SHA2-384
857,069 UART: [kat] SHA2-512-ACC
859,628 UART: [kat] ECC-384
3,301,457 UART: [kat] HMAC-384Kdf
3,314,727 UART: [kat] LMS
3,846,582 UART: [kat] --
3,851,383 UART: [cold-reset] ++
3,853,154 UART: [fht] FHT @ 0x50003400
3,865,055 UART: [idev] ++
3,865,733 UART: [idev] CDI.KEYID = 6
3,866,747 UART: [idev] SUBJECT.KEYID = 7
3,867,904 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
192,496 UART:
193,397 UART: Running Caliptra ROM ...
194,570 UART:
603,806 UART: [state] CFI Enabled
616,876 UART: [state] LifecycleState = Unprovisioned
619,248 UART: [state] DebugLocked = No
621,870 UART: [state] WD Timer not started. Device not locked for debugging
626,938 UART: [kat] SHA2-256
816,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,600 UART: [kat] ++
828,147 UART: [kat] sha1
840,041 UART: [kat] SHA2-256
843,056 UART: [kat] SHA2-384
848,723 UART: [kat] SHA2-512-ACC
851,282 UART: [kat] ECC-384
3,291,384 UART: [kat] HMAC-384Kdf
3,303,206 UART: [kat] LMS
3,835,033 UART: [kat] --
3,837,679 UART: [cold-reset] ++
3,838,919 UART: [fht] FHT @ 0x50003400
3,850,078 UART: [idev] ++
3,850,759 UART: [idev] CDI.KEYID = 6
3,851,723 UART: [idev] SUBJECT.KEYID = 7
3,852,882 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,483 UART:
192,838 UART: Running Caliptra ROM ...
194,048 UART:
603,571 UART: [state] CFI Enabled
615,455 UART: [state] LifecycleState = Manufacturing
617,837 UART: [state] DebugLocked = No
620,729 UART: [state] WD Timer not started. Device not locked for debugging
624,608 UART: [kat] SHA2-256
814,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,256 UART: [kat] ++
825,762 UART: [kat] sha1
837,454 UART: [kat] SHA2-256
840,460 UART: [kat] SHA2-384
846,654 UART: [kat] SHA2-512-ACC
849,267 UART: [kat] ECC-384
3,291,743 UART: [kat] HMAC-384Kdf
3,305,276 UART: [kat] LMS
3,837,103 UART: [kat] --
3,842,814 UART: [cold-reset] ++
3,844,484 UART: [fht] FHT @ 0x50003400
3,856,223 UART: [idev] ++
3,856,897 UART: [idev] CDI.KEYID = 6
3,857,836 UART: [idev] SUBJECT.KEYID = 7
3,859,052 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,685 UART:
193,060 UART: Running Caliptra ROM ...
194,651 UART:
603,923 UART: [state] CFI Enabled
615,710 UART: [state] LifecycleState = Unknown
617,764 UART: [state] DebugLocked = No
620,271 UART: [state] WD Timer not started. Device not locked for debugging
625,186 UART: [kat] SHA2-256
815,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,835 UART: [kat] ++
826,368 UART: [kat] sha1
838,693 UART: [kat] SHA2-256
841,741 UART: [kat] SHA2-384
846,488 UART: [kat] SHA2-512-ACC
849,103 UART: [kat] ECC-384
3,289,861 UART: [kat] HMAC-384Kdf
3,302,521 UART: [kat] LMS
3,834,388 UART: [kat] --
3,838,609 UART: [cold-reset] ++
3,840,601 UART: [fht] FHT @ 0x50003400
3,851,530 UART: [idev] ++
3,852,204 UART: [idev] CDI.KEYID = 6
3,853,168 UART: [idev] SUBJECT.KEYID = 7
3,854,380 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,491 UART:
192,864 UART: Running Caliptra ROM ...
194,088 UART:
603,648 UART: [state] CFI Enabled
618,682 UART: [state] LifecycleState = Production
620,887 UART: [state] DebugLocked = No
622,238 UART: [state] WD Timer not started. Device not locked for debugging
626,009 UART: [kat] SHA2-256
815,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,471 UART: [kat] ++
826,983 UART: [kat] sha1
838,832 UART: [kat] SHA2-256
841,849 UART: [kat] SHA2-384
848,049 UART: [kat] SHA2-512-ACC
850,615 UART: [kat] ECC-384
3,292,396 UART: [kat] HMAC-384Kdf
3,306,532 UART: [kat] LMS
3,838,346 UART: [kat] --
3,843,469 UART: [cold-reset] ++
3,844,538 UART: [fht] FHT @ 0x50003400
3,857,413 UART: [idev] ++
3,858,099 UART: [idev] CDI.KEYID = 6
3,859,124 UART: [idev] SUBJECT.KEYID = 7
3,860,286 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
28,417 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
5,894 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
4,879,098 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,534,175 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
4,878,109 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,503,887 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
5,192,846 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,672,544 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
5,180,350 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,701,491 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,459,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,384,469 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,434,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,302,779 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,776,022 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,549,393 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,476 writing to cptra_bootfsm_go
3,779,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,556,244 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,443,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,272,105 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,441,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,344,923 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,776,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,556,014 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,782,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,553,062 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,012 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,671,359 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,669,663 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,671,399 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,803 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,670,354 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,660 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,670,104 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,670,622 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,672,525 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,347 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,671,271 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,568 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,670,693 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,128 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,669,088 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,255 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,671,591 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,673,261 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,741 writing to cptra_bootfsm_go
192,384 UART:
192,735 UART: Running Caliptra ROM ...
193,901 UART:
194,051 UART: [state] CFI Enabled
262,530 UART: [state] LifecycleState = Production
264,364 UART: [state] DebugLocked = Yes
266,858 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,891 UART: [kat] SHA2-256
442,628 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,101 UART: [kat] ++
453,588 UART: [kat] sha1
464,846 UART: [kat] SHA2-256
467,585 UART: [kat] SHA2-384
473,344 UART: [kat] SHA2-512-ACC
475,691 UART: [kat] ECC-384
2,767,532 UART: [kat] HMAC-384Kdf
2,799,499 UART: [kat] LMS
3,989,848 UART: [kat] --
3,994,412 UART: [cold-reset] ++
3,996,030 UART: [fht] Storing FHT @ 0x50003400
4,008,064 UART: [idev] ++
4,008,679 UART: [idev] CDI.KEYID = 6
4,009,576 UART: [idev] SUBJECT.KEYID = 7
4,010,847 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
191,743 UART:
192,145 UART: Running Caliptra ROM ...
193,329 UART:
603,112 UART: [state] CFI Enabled
616,656 UART: [state] LifecycleState = Production
618,454 UART: [state] DebugLocked = Yes
620,838 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,452 UART: [kat] SHA2-256
796,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,753 UART: [kat] ++
807,296 UART: [kat] sha1
817,917 UART: [kat] SHA2-256
820,594 UART: [kat] SHA2-384
825,606 UART: [kat] SHA2-512-ACC
827,997 UART: [kat] ECC-384
3,111,865 UART: [kat] HMAC-384Kdf
3,124,321 UART: [kat] LMS
4,314,453 UART: [kat] --
4,318,369 UART: [cold-reset] ++
4,319,501 UART: [fht] Storing FHT @ 0x50003400
4,331,366 UART: [idev] ++
4,331,930 UART: [idev] CDI.KEYID = 6
4,332,896 UART: [idev] SUBJECT.KEYID = 7
4,334,118 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
191,801 UART:
192,159 UART: Running Caliptra ROM ...
193,360 UART:
193,536 UART: [state] CFI Enabled
263,944 UART: [state] LifecycleState = Production
265,727 UART: [state] DebugLocked = Yes
267,738 UART: [state] Starting the WD Timer 40000000 cycles
272,712 UART: [kat] SHA2-256
451,874 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,415 UART: [kat] ++
463,953 UART: [kat] sha1
476,584 UART: [kat] SHA2-256
479,591 UART: [kat] SHA2-384
485,413 UART: [kat] SHA2-512-ACC
488,342 UART: [kat] ECC-384
2,947,779 UART: [kat] HMAC-384Kdf
2,971,195 UART: [kat] LMS
3,500,712 UART: [kat] --
3,505,969 UART: [cold-reset] ++
3,508,575 UART: [fht] FHT @ 0x50003400
3,518,858 UART: [idev] ++
3,519,423 UART: [idev] CDI.KEYID = 6
3,520,387 UART: [idev] SUBJECT.KEYID = 7
3,521,542 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
5,175 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
191,889 UART:
192,276 UART: Running Caliptra ROM ...
193,462 UART:
603,162 UART: [state] CFI Enabled
616,378 UART: [state] LifecycleState = Production
618,140 UART: [state] DebugLocked = Yes
620,357 UART: [state] Starting the WD Timer 40000000 cycles
625,689 UART: [kat] SHA2-256
804,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,371 UART: [kat] ++
816,893 UART: [kat] sha1
828,173 UART: [kat] SHA2-256
831,199 UART: [kat] SHA2-384
837,754 UART: [kat] SHA2-512-ACC
840,691 UART: [kat] ECC-384
3,283,455 UART: [kat] HMAC-384Kdf
3,295,811 UART: [kat] LMS
3,825,309 UART: [kat] --
3,830,464 UART: [cold-reset] ++
3,831,377 UART: [fht] FHT @ 0x50003400
3,843,111 UART: [idev] ++
3,843,681 UART: [idev] CDI.KEYID = 6
3,844,568 UART: [idev] SUBJECT.KEYID = 7
3,845,781 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
6,044 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
191,488 UART:
191,875 UART: Running Caliptra ROM ...
192,980 UART:
193,127 UART: [state] CFI Enabled
263,175 UART: [state] LifecycleState = Production
265,402 UART: [state] DebugLocked = Yes
267,798 UART: [state] Starting the WD Timer 40000000 cycles
272,382 UART: [kat] SHA2-256
462,273 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,036 UART: [kat] ++
473,639 UART: [kat] sha1
484,702 UART: [kat] SHA2-256
487,712 UART: [kat] SHA2-384
494,069 UART: [kat] SHA2-512-ACC
496,655 UART: [kat] ECC-384
2,950,434 UART: [kat] HMAC-384Kdf
2,972,678 UART: [kat] LMS
3,504,487 UART: [kat] --
3,507,019 UART: [cold-reset] ++
3,509,549 UART: [fht] FHT @ 0x50003400
3,520,523 UART: [idev] ++
3,521,259 UART: [idev] CDI.KEYID = 6
3,522,141 UART: [idev] SUBJECT.KEYID = 7
3,523,406 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
191,935 UART:
192,276 UART: Running Caliptra ROM ...
193,454 UART:
602,915 UART: [state] CFI Enabled
617,317 UART: [state] LifecycleState = Production
619,552 UART: [state] DebugLocked = Yes
621,919 UART: [state] Starting the WD Timer 40000000 cycles
626,749 UART: [kat] SHA2-256
816,589 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,431 UART: [kat] ++
827,963 UART: [kat] sha1
840,589 UART: [kat] SHA2-256
843,610 UART: [kat] SHA2-384
848,563 UART: [kat] SHA2-512-ACC
851,175 UART: [kat] ECC-384
3,293,704 UART: [kat] HMAC-384Kdf
3,307,192 UART: [kat] LMS
3,839,021 UART: [kat] --
3,841,015 UART: [cold-reset] ++
3,842,380 UART: [fht] FHT @ 0x50003400
3,854,878 UART: [idev] ++
3,855,567 UART: [idev] CDI.KEYID = 6
3,856,481 UART: [idev] SUBJECT.KEYID = 7
3,857,698 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Production
85,831 UART: [state] DebugLocked = Yes
86,507 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,069 UART: [kat] SHA2-256
882,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,115 UART: [kat] ++
886,267 UART: [kat] sha1
890,305 UART: [kat] SHA2-256
892,243 UART: [kat] SHA2-384
894,956 UART: [kat] SHA2-512-ACC
896,857 UART: [kat] ECC-384
902,750 UART: [kat] HMAC-384Kdf
907,298 UART: [kat] LMS
1,475,494 UART: [kat] --
1,476,251 UART: [cold-reset] ++
1,476,738 UART: [fht] Storing FHT @ 0x50003400
1,479,625 UART: [idev] ++
1,479,793 UART: [idev] CDI.KEYID = 6
1,480,153 UART: [idev] SUBJECT.KEYID = 7
1,480,577 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Production
85,522 UART: [state] DebugLocked = Yes
86,284 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,606 UART: [kat] SHA2-256
892,544 UART: [kat] SHA2-384
895,261 UART: [kat] SHA2-512-ACC
897,162 UART: [kat] ECC-384
902,501 UART: [kat] HMAC-384Kdf
907,191 UART: [kat] LMS
1,475,387 UART: [kat] --
1,476,336 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,971 UART: [state] LifecycleState = Production
85,579 UART: [state] DebugLocked = Yes
86,307 UART: [state] Starting the WD Timer 40000000 cycles
87,814 UART: [kat] SHA2-256
893,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,589 UART: [kat] ++
897,741 UART: [kat] sha1
901,939 UART: [kat] SHA2-256
903,879 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
918,272 UART: [kat] HMAC-384Kdf
922,900 UART: [kat] LMS
1,171,228 UART: [kat] --
1,172,275 UART: [cold-reset] ++
1,172,832 UART: [fht] FHT @ 0x50003400
1,175,321 UART: [idev] ++
1,175,489 UART: [idev] CDI.KEYID = 6
1,175,849 UART: [idev] SUBJECT.KEYID = 7
1,176,273 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Production
85,824 UART: [state] DebugLocked = Yes
86,388 UART: [state] Starting the WD Timer 40000000 cycles
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,062 UART: [kat] SHA2-256
904,002 UART: [kat] SHA2-384
906,721 UART: [kat] SHA2-512-ACC
908,622 UART: [kat] ECC-384
918,259 UART: [kat] HMAC-384Kdf
923,101 UART: [kat] LMS
1,171,429 UART: [kat] --
1,172,250 UART: [cold-reset] ++
1,172,653 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,915 UART: [state] LifecycleState = Production
85,523 UART: [state] DebugLocked = Yes
86,195 UART: [state] Starting the WD Timer 40000000 cycles
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,476 UART: [kat] LMS
1,168,788 UART: [kat] --
1,169,567 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,614 UART: [idev] ++
1,172,782 UART: [idev] CDI.KEYID = 6
1,173,143 UART: [idev] SUBJECT.KEYID = 7
1,173,568 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Production
86,030 UART: [state] DebugLocked = Yes
86,762 UART: [state] Starting the WD Timer 40000000 cycles
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,962 UART: [kat] ++
896,114 UART: [kat] sha1
900,326 UART: [kat] SHA2-256
902,266 UART: [kat] SHA2-384
905,089 UART: [kat] SHA2-512-ACC
906,990 UART: [kat] ECC-384
916,865 UART: [kat] HMAC-384Kdf
921,449 UART: [kat] LMS
1,169,761 UART: [kat] --
1,170,596 UART: [cold-reset] ++
1,171,093 UART: [fht] FHT @ 0x50003400
1,173,979 UART: [idev] ++
1,174,147 UART: [idev] CDI.KEYID = 6
1,174,508 UART: [idev] SUBJECT.KEYID = 7
1,174,933 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
191,546 UART:
191,954 UART: Running Caliptra ROM ...
193,059 UART:
193,211 UART: [state] CFI Enabled
258,281 UART: [state] LifecycleState = Production
260,165 UART: [state] DebugLocked = Yes
261,603 UART: [state] Starting the Watchdog Timer 40000000 cycles
266,131 UART: [kat] SHA2-256
435,913 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
446,360 UART: [kat] ++
446,954 UART: [kat] sha1
456,631 UART: [kat] SHA2-256
459,291 UART: [kat] SHA2-384
466,633 UART: [kat] SHA2-512-ACC
469,003 UART: [kat] ECC-384
2,762,491 UART: [kat] HMAC-384Kdf
2,794,757 UART: [kat] LMS
3,985,118 UART: [kat] --
3,990,527 UART: [cold-reset] ++
3,992,613 UART: [fht] Storing FHT @ 0x50003400
4,003,955 UART: [idev] ++
4,004,535 UART: [idev] CDI.KEYID = 6
4,005,426 UART: [idev] SUBJECT.KEYID = 7
4,006,636 UART: [idev] UDS.KEYID = 0
4,007,631 ready_for_fw is high
4,007,869 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,151,178 UART: [idev] Erasing UDS.KEYID = 0
7,343,514 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,296 UART: [idev] --
7,368,719 UART: [ldev] ++
7,369,343 UART: [ldev] CDI.KEYID = 6
7,370,306 UART: [ldev] SUBJECT.KEYID = 5
7,371,521 UART: [ldev] AUTHORITY.KEYID = 7
7,372,750 UART: [ldev] FE.KEYID = 1
7,399,830 UART: [ldev] Erasing FE.KEYID = 1
10,737,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,978 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,056,511 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,071,203 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,085,540 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,103,859 UART: [ldev] --
13,107,795 UART: [fwproc] Waiting for Commands...
13,109,570 UART: [fwproc] Received command 0x46574c44
13,111,763 UART: [fwproc] Received Image of size 113844 bytes
17,198,605 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,611 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,340,575 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,656,787 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,805,628 ready_for_fw is high
3,806,037 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,929,776 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
191,919 UART:
192,276 UART: Running Caliptra ROM ...
193,372 UART:
602,999 UART: [state] CFI Enabled
616,958 UART: [state] LifecycleState = Production
618,795 UART: [state] DebugLocked = Yes
620,650 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,465 UART: [kat] SHA2-256
796,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,836 UART: [kat] ++
807,332 UART: [kat] sha1
817,782 UART: [kat] SHA2-256
820,520 UART: [kat] SHA2-384
827,651 UART: [kat] SHA2-512-ACC
830,025 UART: [kat] ECC-384
3,112,784 UART: [kat] HMAC-384Kdf
3,124,465 UART: [kat] LMS
4,314,603 UART: [kat] --
4,318,334 UART: [cold-reset] ++
4,320,915 UART: [fht] Storing FHT @ 0x50003400
4,330,766 UART: [idev] ++
4,331,403 UART: [idev] CDI.KEYID = 6
4,332,318 UART: [idev] SUBJECT.KEYID = 7
4,333,566 UART: [idev] UDS.KEYID = 0
4,334,496 ready_for_fw is high
4,334,737 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,477,780 UART: [idev] Erasing UDS.KEYID = 0
7,622,183 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,189 UART: [idev] --
7,647,900 UART: [ldev] ++
7,648,480 UART: [ldev] CDI.KEYID = 6
7,649,421 UART: [ldev] SUBJECT.KEYID = 5
7,650,634 UART: [ldev] AUTHORITY.KEYID = 7
7,651,920 UART: [ldev] FE.KEYID = 1
7,664,001 UART: [ldev] Erasing FE.KEYID = 1
10,950,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,330 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,255,854 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,270,504 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,284,858 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,303,069 UART: [ldev] --
13,307,708 UART: [fwproc] Waiting for Commands...
13,310,835 UART: [fwproc] Received command 0x46574c44
13,313,028 UART: [fwproc] Received Image of size 113844 bytes
17,397,162 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,469,244 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,538,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,854,661 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
4,122,641 ready_for_fw is high
4,123,273 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,097,305 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
191,826 UART:
192,200 UART: Running Caliptra ROM ...
193,419 UART:
193,572 UART: [state] CFI Enabled
262,013 UART: [state] LifecycleState = Production
263,770 UART: [state] DebugLocked = Yes
266,267 UART: [state] Starting the WD Timer 40000000 cycles
271,568 UART: [kat] SHA2-256
450,720 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,290 UART: [kat] ++
462,745 UART: [kat] sha1
475,090 UART: [kat] SHA2-256
478,118 UART: [kat] SHA2-384
482,999 UART: [kat] SHA2-512-ACC
485,948 UART: [kat] ECC-384
2,947,555 UART: [kat] HMAC-384Kdf
2,971,667 UART: [kat] LMS
3,501,194 UART: [kat] --
3,504,770 UART: [cold-reset] ++
3,506,782 UART: [fht] FHT @ 0x50003400
3,517,982 UART: [idev] ++
3,518,547 UART: [idev] CDI.KEYID = 6
3,519,460 UART: [idev] SUBJECT.KEYID = 7
3,520,642 UART: [idev] UDS.KEYID = 0
3,521,694 ready_for_fw is high
3,521,909 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,524 UART: [idev] Erasing UDS.KEYID = 0
6,026,409 UART: [idev] Sha1 KeyId Algorithm
6,050,184 UART: [idev] --
6,054,261 UART: [ldev] ++
6,054,842 UART: [ldev] CDI.KEYID = 6
6,055,729 UART: [ldev] SUBJECT.KEYID = 5
6,056,945 UART: [ldev] AUTHORITY.KEYID = 7
6,058,176 UART: [ldev] FE.KEYID = 1
6,101,587 UART: [ldev] Erasing FE.KEYID = 1
8,607,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,395 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,403 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,373,257 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,389,208 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,277 UART: [ldev] --
10,412,353 UART: [fwproc] Wait for Commands...
10,414,177 UART: [fwproc] Recv command 0x46574c44
10,416,278 UART: [fwproc] Recv'd Img size: 114168 bytes
13,855,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,348 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,003,114 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,320,761 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,381,550 ready_for_fw is high
3,382,225 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,071,379 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
191,840 UART:
192,239 UART: Running Caliptra ROM ...
193,366 UART:
603,013 UART: [state] CFI Enabled
618,252 UART: [state] LifecycleState = Production
620,066 UART: [state] DebugLocked = Yes
622,413 UART: [state] Starting the WD Timer 40000000 cycles
627,430 UART: [kat] SHA2-256
806,578 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,129 UART: [kat] ++
818,578 UART: [kat] sha1
830,884 UART: [kat] SHA2-256
833,872 UART: [kat] SHA2-384
839,240 UART: [kat] SHA2-512-ACC
842,252 UART: [kat] ECC-384
3,285,038 UART: [kat] HMAC-384Kdf
3,297,713 UART: [kat] LMS
3,827,222 UART: [kat] --
3,831,574 UART: [cold-reset] ++
3,833,013 UART: [fht] FHT @ 0x50003400
3,843,928 UART: [idev] ++
3,844,494 UART: [idev] CDI.KEYID = 6
3,845,411 UART: [idev] SUBJECT.KEYID = 7
3,846,659 UART: [idev] UDS.KEYID = 0
3,847,587 ready_for_fw is high
3,847,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,991,281 UART: [idev] Erasing UDS.KEYID = 0
6,319,603 UART: [idev] Sha1 KeyId Algorithm
6,342,758 UART: [idev] --
6,346,778 UART: [ldev] ++
6,347,361 UART: [ldev] CDI.KEYID = 6
6,348,273 UART: [ldev] SUBJECT.KEYID = 5
6,349,489 UART: [ldev] AUTHORITY.KEYID = 7
6,350,739 UART: [ldev] FE.KEYID = 1
6,362,823 UART: [ldev] Erasing FE.KEYID = 1
8,836,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,492 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,570,488 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,586,298 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,602,277 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,622,387 UART: [ldev] --
10,627,596 UART: [fwproc] Wait for Commands...
10,629,311 UART: [fwproc] Recv command 0x46574c44
10,631,404 UART: [fwproc] Recv'd Img size: 114168 bytes
14,063,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,132,866 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,201,634 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,519,815 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
3,700,529 ready_for_fw is high
3,700,954 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,301,868 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,516 UART:
191,888 UART: Running Caliptra ROM ...
192,999 UART:
193,164 UART: [state] CFI Enabled
265,949 UART: [state] LifecycleState = Production
268,185 UART: [state] DebugLocked = Yes
270,474 UART: [state] Starting the WD Timer 40000000 cycles
275,631 UART: [kat] SHA2-256
465,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,273 UART: [kat] ++
476,884 UART: [kat] sha1
489,377 UART: [kat] SHA2-256
492,397 UART: [kat] SHA2-384
498,962 UART: [kat] SHA2-512-ACC
501,551 UART: [kat] ECC-384
2,959,491 UART: [kat] HMAC-384Kdf
2,984,455 UART: [kat] LMS
3,516,222 UART: [kat] --
3,520,577 UART: [cold-reset] ++
3,523,173 UART: [fht] FHT @ 0x50003400
3,535,433 UART: [idev] ++
3,536,153 UART: [idev] CDI.KEYID = 6
3,537,080 UART: [idev] SUBJECT.KEYID = 7
3,538,263 UART: [idev] UDS.KEYID = 0
3,539,192 ready_for_fw is high
3,539,418 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,683,091 UART: [idev] Erasing UDS.KEYID = 0
6,042,501 UART: [idev] Sha1 KeyId Algorithm
6,065,670 UART: [idev] --
6,071,168 UART: [ldev] ++
6,071,861 UART: [ldev] CDI.KEYID = 6
6,072,775 UART: [ldev] SUBJECT.KEYID = 5
6,073,935 UART: [ldev] AUTHORITY.KEYID = 7
6,075,167 UART: [ldev] FE.KEYID = 1
6,112,993 UART: [ldev] Erasing FE.KEYID = 1
8,617,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,353,541 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,368,740 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,383,846 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,398,844 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,420,092 UART: [ldev] --
10,425,304 UART: [fwproc] Wait for Commands...
10,427,345 UART: [fwproc] Recv command 0x46574c44
10,429,287 UART: [fwproc] Recv'd Img size: 114168 bytes
13,910,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,891 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,108,072 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,650,328 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,438,652 ready_for_fw is high
3,439,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,780,936 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
191,824 UART:
192,213 UART: Running Caliptra ROM ...
193,360 UART:
602,840 UART: [state] CFI Enabled
618,075 UART: [state] LifecycleState = Production
620,284 UART: [state] DebugLocked = Yes
621,712 UART: [state] Starting the WD Timer 40000000 cycles
626,300 UART: [kat] SHA2-256
816,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,006 UART: [kat] ++
827,626 UART: [kat] sha1
837,999 UART: [kat] SHA2-256
841,017 UART: [kat] SHA2-384
847,016 UART: [kat] SHA2-512-ACC
849,612 UART: [kat] ECC-384
3,290,097 UART: [kat] HMAC-384Kdf
3,303,193 UART: [kat] LMS
3,835,029 UART: [kat] --
3,839,963 UART: [cold-reset] ++
3,840,825 UART: [fht] FHT @ 0x50003400
3,852,617 UART: [idev] ++
3,853,515 UART: [idev] CDI.KEYID = 6
3,854,404 UART: [idev] SUBJECT.KEYID = 7
3,855,452 UART: [idev] UDS.KEYID = 0
3,856,349 ready_for_fw is high
3,856,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,999,826 UART: [idev] Erasing UDS.KEYID = 0
6,329,653 UART: [idev] Sha1 KeyId Algorithm
6,353,693 UART: [idev] --
6,357,833 UART: [ldev] ++
6,358,520 UART: [ldev] CDI.KEYID = 6
6,359,504 UART: [ldev] SUBJECT.KEYID = 5
6,360,664 UART: [ldev] AUTHORITY.KEYID = 7
6,361,842 UART: [ldev] FE.KEYID = 1
6,370,979 UART: [ldev] Erasing FE.KEYID = 1
8,841,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,560,967 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,576,122 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,591,218 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,606,225 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,625,792 UART: [ldev] --
10,631,865 UART: [fwproc] Wait for Commands...
10,633,582 UART: [fwproc] Recv command 0x46574c44
10,635,524 UART: [fwproc] Recv'd Img size: 114168 bytes
14,114,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,604 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,848,126 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,856 writing to cptra_bootfsm_go
3,757,269 ready_for_fw is high
3,757,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
15,001,091 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Production
86,275 UART: [state] DebugLocked = Yes
86,803 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,431 UART: [kat] SHA2-256
882,362 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,477 UART: [kat] ++
886,629 UART: [kat] sha1
890,795 UART: [kat] SHA2-256
892,733 UART: [kat] SHA2-384
895,470 UART: [kat] SHA2-512-ACC
897,371 UART: [kat] ECC-384
903,200 UART: [kat] HMAC-384Kdf
907,748 UART: [kat] LMS
1,475,944 UART: [kat] --
1,476,501 UART: [cold-reset] ++
1,477,074 UART: [fht] Storing FHT @ 0x50003400
1,480,005 UART: [idev] ++
1,480,173 UART: [idev] CDI.KEYID = 6
1,480,533 UART: [idev] SUBJECT.KEYID = 7
1,480,957 UART: [idev] UDS.KEYID = 0
1,481,302 ready_for_fw is high
1,481,302 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,914 UART: [idev] Erasing UDS.KEYID = 0
1,505,213 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,892 UART: [idev] --
1,514,941 UART: [ldev] ++
1,515,109 UART: [ldev] CDI.KEYID = 6
1,515,472 UART: [ldev] SUBJECT.KEYID = 5
1,515,898 UART: [ldev] AUTHORITY.KEYID = 7
1,516,361 UART: [ldev] FE.KEYID = 1
1,521,343 UART: [ldev] Erasing FE.KEYID = 1
1,546,342 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,201 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,895 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,767 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,473 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,579 UART: [ldev] --
1,585,898 UART: [fwproc] Waiting for Commands...
1,586,547 UART: [fwproc] Received command 0x46574c44
1,587,338 UART: [fwproc] Received Image of size 114168 bytes
2,909,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,936,914 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,966,266 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,102,000 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,434 ready_for_fw is high
1,362,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,950,280 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,654 UART: [state] LifecycleState = Production
86,262 UART: [state] DebugLocked = Yes
86,928 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,546 UART: [kat] SHA2-256
882,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,592 UART: [kat] ++
886,744 UART: [kat] sha1
890,890 UART: [kat] SHA2-256
892,828 UART: [kat] SHA2-384
895,429 UART: [kat] SHA2-512-ACC
897,330 UART: [kat] ECC-384
903,157 UART: [kat] HMAC-384Kdf
907,747 UART: [kat] LMS
1,475,943 UART: [kat] --
1,476,872 UART: [cold-reset] ++
1,477,427 UART: [fht] Storing FHT @ 0x50003400
1,480,394 UART: [idev] ++
1,480,562 UART: [idev] CDI.KEYID = 6
1,480,922 UART: [idev] SUBJECT.KEYID = 7
1,481,346 UART: [idev] UDS.KEYID = 0
1,481,691 ready_for_fw is high
1,481,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,365 UART: [idev] Erasing UDS.KEYID = 0
1,506,338 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,516,036 UART: [ldev] ++
1,516,204 UART: [ldev] CDI.KEYID = 6
1,516,567 UART: [ldev] SUBJECT.KEYID = 5
1,516,993 UART: [ldev] AUTHORITY.KEYID = 7
1,517,456 UART: [ldev] FE.KEYID = 1
1,522,440 UART: [ldev] Erasing FE.KEYID = 1
1,548,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,688 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,382 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,254 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,960 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,586,060 UART: [ldev] --
1,587,415 UART: [fwproc] Waiting for Commands...
1,588,212 UART: [fwproc] Received command 0x46574c44
1,589,003 UART: [fwproc] Received Image of size 114168 bytes
2,909,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,937,385 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,966,737 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,102,455 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,809 ready_for_fw is high
1,362,809 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,951,641 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,911 UART: [state] LifecycleState = Production
85,519 UART: [state] DebugLocked = Yes
86,115 UART: [state] Starting the WD Timer 40000000 cycles
87,778 UART: [kat] SHA2-256
893,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,553 UART: [kat] ++
897,705 UART: [kat] sha1
902,007 UART: [kat] SHA2-256
903,947 UART: [kat] SHA2-384
906,736 UART: [kat] SHA2-512-ACC
908,637 UART: [kat] ECC-384
918,648 UART: [kat] HMAC-384Kdf
923,364 UART: [kat] LMS
1,171,692 UART: [kat] --
1,172,565 UART: [cold-reset] ++
1,173,034 UART: [fht] FHT @ 0x50003400
1,175,923 UART: [idev] ++
1,176,091 UART: [idev] CDI.KEYID = 6
1,176,451 UART: [idev] SUBJECT.KEYID = 7
1,176,875 UART: [idev] UDS.KEYID = 0
1,177,220 ready_for_fw is high
1,177,220 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,858 UART: [idev] Erasing UDS.KEYID = 0
1,201,658 UART: [idev] Sha1 KeyId Algorithm
1,210,125 UART: [idev] --
1,211,303 UART: [ldev] ++
1,211,471 UART: [ldev] CDI.KEYID = 6
1,211,834 UART: [ldev] SUBJECT.KEYID = 5
1,212,260 UART: [ldev] AUTHORITY.KEYID = 7
1,212,723 UART: [ldev] FE.KEYID = 1
1,218,171 UART: [ldev] Erasing FE.KEYID = 1
1,244,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,369 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,063 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,935 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,641 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,942 UART: [ldev] --
1,284,237 UART: [fwproc] Wait for Commands...
1,285,057 UART: [fwproc] Recv command 0x46574c44
1,285,785 UART: [fwproc] Recv'd Img size: 114168 bytes
2,606,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,634,083 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,663,387 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,798,901 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,144 ready_for_fw is high
1,061,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,651,302 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,988 UART: [state] LifecycleState = Production
86,596 UART: [state] DebugLocked = Yes
87,192 UART: [state] Starting the WD Timer 40000000 cycles
88,861 UART: [kat] SHA2-256
894,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,636 UART: [kat] ++
898,788 UART: [kat] sha1
902,818 UART: [kat] SHA2-256
904,758 UART: [kat] SHA2-384
907,509 UART: [kat] SHA2-512-ACC
909,410 UART: [kat] ECC-384
919,091 UART: [kat] HMAC-384Kdf
923,761 UART: [kat] LMS
1,172,089 UART: [kat] --
1,172,992 UART: [cold-reset] ++
1,173,317 UART: [fht] FHT @ 0x50003400
1,176,006 UART: [idev] ++
1,176,174 UART: [idev] CDI.KEYID = 6
1,176,534 UART: [idev] SUBJECT.KEYID = 7
1,176,958 UART: [idev] UDS.KEYID = 0
1,177,303 ready_for_fw is high
1,177,303 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,185,135 UART: [idev] Erasing UDS.KEYID = 0
1,202,753 UART: [idev] Sha1 KeyId Algorithm
1,211,100 UART: [idev] --
1,212,106 UART: [ldev] ++
1,212,274 UART: [ldev] CDI.KEYID = 6
1,212,637 UART: [ldev] SUBJECT.KEYID = 5
1,213,063 UART: [ldev] AUTHORITY.KEYID = 7
1,213,526 UART: [ldev] FE.KEYID = 1
1,218,952 UART: [ldev] Erasing FE.KEYID = 1
1,245,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,266 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,960 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,832 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,538 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,283,699 UART: [ldev] --
1,285,090 UART: [fwproc] Wait for Commands...
1,285,776 UART: [fwproc] Recv command 0x46574c44
1,286,504 UART: [fwproc] Recv'd Img size: 114168 bytes
2,608,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,636,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,665,344 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,800,964 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,145 ready_for_fw is high
1,061,145 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,650,025 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Production
85,627 UART: [state] DebugLocked = Yes
86,363 UART: [state] Starting the WD Timer 40000000 cycles
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,292 UART: [kat] HMAC-384Kdf
920,768 UART: [kat] LMS
1,169,080 UART: [kat] --
1,170,087 UART: [cold-reset] ++
1,170,536 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,174,596 ready_for_fw is high
1,174,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,193 UART: [idev] --
1,209,262 UART: [ldev] ++
1,209,430 UART: [ldev] CDI.KEYID = 6
1,209,794 UART: [ldev] SUBJECT.KEYID = 5
1,210,221 UART: [ldev] AUTHORITY.KEYID = 7
1,210,684 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,242,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,027 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,721 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,591 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,297 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,251 UART: [ldev] --
1,281,647 UART: [fwproc] Wait for Commands...
1,282,254 UART: [fwproc] Recv command 0x46574c44
1,282,987 UART: [fwproc] Recv'd Img size: 114168 bytes
2,603,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,630,363 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,659,672 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,795,171 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,533 ready_for_fw is high
1,056,533 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,791 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Production
85,968 UART: [state] DebugLocked = Yes
86,610 UART: [state] Starting the WD Timer 40000000 cycles
88,279 UART: [kat] SHA2-256
891,829 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,958 UART: [kat] ++
896,110 UART: [kat] sha1
900,266 UART: [kat] SHA2-256
902,206 UART: [kat] SHA2-384
905,087 UART: [kat] SHA2-512-ACC
906,988 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,387 UART: [kat] LMS
1,169,699 UART: [kat] --
1,170,734 UART: [cold-reset] ++
1,171,083 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,175,013 ready_for_fw is high
1,175,013 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,034 UART: [idev] Erasing UDS.KEYID = 0
1,201,143 UART: [idev] Sha1 KeyId Algorithm
1,209,854 UART: [idev] --
1,210,985 UART: [ldev] ++
1,211,153 UART: [ldev] CDI.KEYID = 6
1,211,517 UART: [ldev] SUBJECT.KEYID = 5
1,211,944 UART: [ldev] AUTHORITY.KEYID = 7
1,212,407 UART: [ldev] FE.KEYID = 1
1,217,561 UART: [ldev] Erasing FE.KEYID = 1
1,244,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,796 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,490 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,360 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,066 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,134 UART: [ldev] --
1,283,440 UART: [fwproc] Wait for Commands...
1,284,235 UART: [fwproc] Recv command 0x46574c44
1,284,968 UART: [fwproc] Recv'd Img size: 114168 bytes
2,606,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,633,648 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,662,957 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,798,460 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,602 ready_for_fw is high
1,057,602 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,649,102 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
7,087,704 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
7,090,578 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
7,392,264 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
7,394,529 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
5,686,463 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
5,654,803 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
5,987,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
5,998,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
5,650,558 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
5,664,282 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
5,993,127 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
5,998,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,865 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,991 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,399 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,206 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,990 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,835 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,215 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,720 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,139 UART:
192,523 UART: Running Caliptra ROM ...
193,679 UART:
193,832 UART: [state] CFI Enabled
265,107 UART: [state] LifecycleState = Unprovisioned
267,494 UART: [state] DebugLocked = No
270,290 UART: [state] WD Timer not started. Device not locked for debugging
274,489 UART: [kat] SHA2-256
456,394 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
467,592 UART: ROM integrity test failed
468,871 UART: ROM Fatal Error: 0x90080001
2,721,500 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,865,342 >>> mbox cmd response: failed
2,865,911 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,008,894 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
192,274 UART:
192,645 UART: Running Caliptra ROM ...
193,794 UART:
193,946 UART: [state] CFI Enabled
262,437 UART: [state] LifecycleState = Unprovisioned
264,805 UART: [state] DebugLocked = No
266,291 UART: [state] WD Timer not started. Device not locked for debugging
271,074 UART: [kat] SHA2-256
452,990 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
464,160 UART: ROM integrity test failed
465,415 UART: ROM Fatal Error: 0x90080001
2,728,271 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,871,989 >>> mbox cmd response: failed
2,872,543 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,015,527 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
192,455 UART:
192,884 UART: Running Caliptra ROM ...
193,991 UART:
603,617 UART: [state] CFI Enabled
614,776 UART: [state] LifecycleState = Unprovisioned
617,129 UART: [state] DebugLocked = No
618,340 UART: [state] WD Timer not started. Device not locked for debugging
621,750 UART: [kat] SHA2-256
803,728 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
814,911 UART: ROM integrity test failed
816,224 UART: ROM Fatal Error: 0x90080001
3,067,819 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,211,549 >>> mbox cmd response: failed
3,212,118 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,355,102 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "704a97316b84a9f1816f79097e62682c33f0a853552fb20f99e070441bc7655558fa4d15c482a63cc429ad818faa5617",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,555 UART:
192,920 UART: Running Caliptra ROM ...
194,037 UART:
603,886 UART: [state] CFI Enabled
616,624 UART: [state] LifecycleState = Unprovisioned
618,989 UART: [state] DebugLocked = No
621,607 UART: [state] WD Timer not started. Device not locked for debugging
626,704 UART: [kat] SHA2-256
808,680 UART: ROM Digest: 01D778585CB610275114F85C7885DA9639A935E86167A293D5ED0ED323C9C97D
819,896 UART: ROM integrity test failed
821,152 UART: ROM Fatal Error: 0x90080001
3,069,497 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,213,383 >>> mbox cmd response: failed
3,214,059 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,357,484 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,411 UART:
192,778 UART: Running Caliptra ROM ...
193,955 UART:
194,108 UART: [state] CFI Enabled
264,604 UART: [state] LifecycleState = Unprovisioned
266,500 UART: [state] DebugLocked = No
268,587 UART: [state] WD Timer not started. Device not locked for debugging
272,344 UART: [kat] SHA2-256
451,471 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,467 UART: ROM integrity test failed
463,724 UART: ROM Fatal Error: 0x90080001
2,712,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,857,130 >>> mbox cmd response: failed
2,857,719 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,001,118 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,270 UART:
193,077 UART: Running Caliptra ROM ...
194,195 UART:
194,335 UART: [state] CFI Enabled
263,129 UART: [state] LifecycleState = Unprovisioned
264,975 UART: [state] DebugLocked = No
267,649 UART: [state] WD Timer not started. Device not locked for debugging
271,429 UART: [kat] SHA2-256
450,553 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,611 UART: ROM integrity test failed
462,814 UART: ROM Fatal Error: 0x90080001
2,711,548 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,855,769 >>> mbox cmd response: failed
2,856,360 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,999,752 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,627 UART:
193,007 UART: Running Caliptra ROM ...
194,134 UART:
603,653 UART: [state] CFI Enabled
619,087 UART: [state] LifecycleState = Unprovisioned
620,957 UART: [state] DebugLocked = No
623,464 UART: [state] WD Timer not started. Device not locked for debugging
626,895 UART: [kat] SHA2-256
805,982 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
817,029 UART: ROM integrity test failed
818,310 UART: ROM Fatal Error: 0x90080001
3,059,938 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,204,039 >>> mbox cmd response: failed
3,204,623 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,348,597 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,542 UART:
192,909 UART: Running Caliptra ROM ...
194,026 UART:
603,691 UART: [state] CFI Enabled
618,162 UART: [state] LifecycleState = Unprovisioned
620,024 UART: [state] DebugLocked = No
622,871 UART: [state] WD Timer not started. Device not locked for debugging
626,571 UART: [kat] SHA2-256
805,723 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,723 UART: ROM integrity test failed
817,987 UART: ROM Fatal Error: 0x90080001
3,062,613 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,206,660 >>> mbox cmd response: failed
3,207,220 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,350,603 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
192,345 UART:
192,695 UART: Running Caliptra ROM ...
193,767 UART:
193,928 UART: [state] CFI Enabled
261,596 UART: [state] LifecycleState = Unprovisioned
263,478 UART: [state] DebugLocked = No
265,315 UART: [state] WD Timer not started. Device not locked for debugging
268,692 UART: [kat] SHA2-256
447,825 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
458,893 UART: ROM integrity test failed
460,084 UART: ROM Fatal Error: 0x90080001
2,723,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,867,879 >>> mbox cmd response: failed
2,868,484 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,011,731 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,244 UART:
192,610 UART: Running Caliptra ROM ...
193,767 UART:
193,941 UART: [state] CFI Enabled
261,488 UART: [state] LifecycleState = Unprovisioned
263,381 UART: [state] DebugLocked = No
265,518 UART: [state] WD Timer not started. Device not locked for debugging
269,532 UART: [kat] SHA2-256
448,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,663 UART: ROM integrity test failed
460,920 UART: ROM Fatal Error: 0x90080001
2,719,485 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,863,884 >>> mbox cmd response: failed
2,864,500 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,007,764 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,435 writing to cptra_bootfsm_go
192,767 UART:
193,136 UART: Running Caliptra ROM ...
194,241 UART:
603,913 UART: [state] CFI Enabled
620,397 UART: [state] LifecycleState = Unprovisioned
622,255 UART: [state] DebugLocked = No
625,145 UART: [state] WD Timer not started. Device not locked for debugging
629,810 UART: [kat] SHA2-256
808,925 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
819,965 UART: ROM integrity test failed
821,138 UART: ROM Fatal Error: 0x90080001
3,072,737 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,217,040 >>> mbox cmd response: failed
3,217,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,360,973 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "fe1305d11bc1a19269dd42571c7b5e8c716a25551a100c9e771e2e06b8d09958424821bc03ef997f0ff860e95c9b4212",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,925 writing to cptra_bootfsm_go
193,037 UART:
193,422 UART: Running Caliptra ROM ...
194,549 UART:
604,231 UART: [state] CFI Enabled
617,630 UART: [state] LifecycleState = Unprovisioned
619,490 UART: [state] DebugLocked = No
621,408 UART: [state] WD Timer not started. Device not locked for debugging
625,909 UART: [kat] SHA2-256
805,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,042 UART: ROM integrity test failed
817,300 UART: ROM Fatal Error: 0x90080001
3,071,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,215,960 >>> mbox cmd response: failed
3,216,525 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,359,955 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,512 UART: [kat] SHA2-256
891,062 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,033 UART: ROM integrity test failed
895,480 UART: ROM Fatal Error: 0x90080001
897,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,101 >>> mbox cmd response: failed
897,101 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,107 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,149 UART: ROM integrity test failed
895,596 UART: ROM Fatal Error: 0x90080001
897,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,217 >>> mbox cmd response: failed
897,217 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,223 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,942 UART: ROM integrity test failed
896,389 UART: ROM Fatal Error: 0x90080001
898,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
898,010 >>> mbox cmd response: failed
898,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
898,016 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,388 UART: ROM integrity test failed
895,835 UART: ROM Fatal Error: 0x90080001
897,450 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,456 >>> mbox cmd response: failed
897,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,462 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,085 UART: ROM integrity test failed
895,532 UART: ROM Fatal Error: 0x90080001
897,147 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,153 >>> mbox cmd response: failed
897,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,159 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,666 UART: [kat] SHA2-256
891,216 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,187 UART: ROM integrity test failed
895,634 UART: ROM Fatal Error: 0x90080001
897,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,255 >>> mbox cmd response: failed
897,255 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,261 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,286 UART: [state] WD Timer not started. Device not locked for debugging
87,565 UART: [kat] SHA2-256
891,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,086 UART: ROM integrity test failed
895,533 UART: ROM Fatal Error: 0x90080001
897,148 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,154 >>> mbox cmd response: failed
897,154 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,160 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,488 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,305 UART: [kat] SHA2-256
891,855 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,826 UART: ROM integrity test failed
896,273 UART: ROM Fatal Error: 0x90080001
897,888 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,894 >>> mbox cmd response: failed
897,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,900 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,974 UART: [kat] SHA2-256
891,524 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,495 UART: ROM integrity test failed
895,942 UART: ROM Fatal Error: 0x90080001
897,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,563 >>> mbox cmd response: failed
897,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,569 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,135 UART: ROM integrity test failed
895,582 UART: ROM Fatal Error: 0x90080001
897,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,203 >>> mbox cmd response: failed
897,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,209 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
891,603 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,574 UART: ROM integrity test failed
896,021 UART: ROM Fatal Error: 0x90080001
897,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,642 >>> mbox cmd response: failed
897,642 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,648 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b84589c195229bad83bfb2e0436ce48f547c88465268c31932554ad596ff05d205a7c6acec1900919e826bbd5143b136",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,172 UART: ROM integrity test failed
895,619 UART: ROM Fatal Error: 0x90080001
897,234 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,240 >>> mbox cmd response: failed
897,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
897,246 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
2,693,907 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,837,635 >>> mbox cmd response: failed
2,838,190 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,981,155 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
4,859,584 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,435,483 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
2,702,511 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,846,997 >>> mbox cmd response: failed
2,847,578 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,990,572 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
4,873,779 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,433,080 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,875 writing to cptra_bootfsm_go
3,048,581 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,192,256 >>> mbox cmd response: failed
3,192,808 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,335,789 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
21,564,973 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,013,929 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,044,126 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,188,538 >>> mbox cmd response: failed
3,189,116 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,332,090 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
21,583,613 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,029,470 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,706,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,851,016 >>> mbox cmd response: failed
2,851,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,994,820 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,471,478 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,282,831 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
2,702,172 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,846,485 >>> mbox cmd response: failed
2,847,046 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,990,435 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,433,966 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,264,747 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,074,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,218,498 >>> mbox cmd response: failed
3,219,071 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,362,454 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,171,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,882,071 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,065,704 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,210,137 >>> mbox cmd response: failed
3,210,700 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,354,586 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,175,833 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,879,932 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
2,715,526 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,859,745 >>> mbox cmd response: failed
2,860,304 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,003,512 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,419,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,257,045 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,718,851 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,862,990 >>> mbox cmd response: failed
2,863,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,006,922 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,439,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,271,000 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
3,061,000 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,205,260 >>> mbox cmd response: failed
3,205,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,349,245 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
20,188,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,910,473 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,408 writing to cptra_bootfsm_go
3,069,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,213,901 >>> mbox cmd response: failed
3,214,476 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,357,840 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
20,179,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,915,996 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,606 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,614 >>> mbox cmd response: failed
814,614 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,111 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,357 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,162 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,170 >>> mbox cmd response: failed
815,170 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,257 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,439 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,531 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,539 >>> mbox cmd response: failed
815,539 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,948 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,647,270 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,499 >>> mbox cmd response: failed
815,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,686 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,260 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,268 >>> mbox cmd response: failed
814,268 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,897 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,079 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,694 >>> mbox cmd response: failed
814,694 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,271 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,643 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,195 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,203 >>> mbox cmd response: failed
815,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
815,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,992 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,050 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,891 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,899 >>> mbox cmd response: failed
814,899 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,292 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,832 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,970 >>> mbox cmd response: failed
814,970 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,531 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,772 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,780 >>> mbox cmd response: failed
814,780 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,597 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,713 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,805 >>> mbox cmd response: failed
814,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,882 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,635 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,643 >>> mbox cmd response: failed
814,643 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
814,649 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,860 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,847 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,185 UART:
192,560 UART: Running Caliptra ROM ...
193,694 UART:
193,865 UART: [state] CFI Enabled
264,780 UART: [state] LifecycleState = Unprovisioned
267,035 UART: [state] DebugLocked = No
269,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,242 UART: [kat] SHA2-256
444,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,375 UART: [kat] ++
455,976 UART: [kat] sha1
468,062 UART: [kat] SHA2-256
470,788 UART: [kat] SHA2-384
475,711 UART: [kat] SHA2-512-ACC
478,080 UART: [kat] ECC-384
2,767,314 UART: [kat] HMAC-384Kdf
2,792,836 UART: [kat] LMS
3,983,107 UART: [kat] --
3,988,631 UART: [cold-reset] ++
3,990,872 UART: [fht] Storing FHT @ 0x50003400
4,002,497 UART: [idev] ++
4,003,076 UART: [idev] CDI.KEYID = 6
4,003,994 UART: [idev] SUBJECT.KEYID = 7
4,005,251 UART: [idev] UDS.KEYID = 0
4,006,314 ready_for_fw is high
4,006,551 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,150,995 UART: [idev] Erasing UDS.KEYID = 0
7,338,926 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,045 UART: [idev] --
7,366,428 UART: [ldev] ++
7,366,999 UART: [ldev] CDI.KEYID = 6
7,367,936 UART: [ldev] SUBJECT.KEYID = 5
7,369,203 UART: [ldev] AUTHORITY.KEYID = 7
7,370,354 UART: [ldev] FE.KEYID = 1
7,416,786 UART: [ldev] Erasing FE.KEYID = 1
10,749,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,179 UART: [ldev] --
13,112,071 UART: [fwproc] Waiting for Commands...
13,113,851 UART: [fwproc] Received command 0x46574c44
13,116,040 UART: [fwproc] Received Image of size 114716 bytes
17,174,738 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,011 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,644,415 >>> mbox cmd response: success
17,649,372 UART: [afmc] ++
17,649,962 UART: [afmc] CDI.KEYID = 6
17,650,906 UART: [afmc] SUBJECT.KEYID = 7
17,652,141 UART: [afmc] AUTHORITY.KEYID = 5
21,022,740 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,432 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,732 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,340,118 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,354,967 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,369,395 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,390,992 UART: [afmc] --
23,394,138 UART: [cold-reset] --
23,398,163 UART: [state] Locking Datavault
23,403,518 UART: [state] Locking PCR0, PCR1 and PCR31
23,405,270 UART: [state] Locking ICCM
23,406,983 UART: [exit] Launching FMC @ 0x40000130
23,415,375 UART:
23,415,613 UART: Running Caliptra FMC ...
23,416,712 UART:
23,416,889 UART: [state] CFI Enabled
23,486,387 UART: [fht] FMC Alias Private Key: 7
25,824,369 UART: [art] Extend RT PCRs Done
25,825,589 UART: [art] Lock RT PCRs Done
25,827,297 UART: [art] Populate DV Done
25,832,822 UART: [fht] FMC Alias Private Key: 7
25,834,533 UART: [art] Derive CDI
25,835,358 UART: [art] Store in in slot 0x4
25,896,092 UART: [art] Derive Key Pair
25,897,138 UART: [art] Store priv key in slot 0x5
29,190,255 UART: [art] Derive Key Pair - Done
29,203,139 UART: [art] Signing Cert with AUTHO
29,204,443 UART: RITY.KEYID = 7
31,492,388 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,897 UART: [art] PUB.X = BABA64287E86253A68C484F088B1ECF3512E978FAEFE97D938018AD26D58D3884D27F594D265D18888137BF6237C93C2
31,501,095 UART: [art] PUB.Y = C60F13FD1D4B8C759EB870A379845AD48AC3D1621EF9A9083FBED8403C31F434B66FAA18E82D3D18F96EC6C592DBCCF9
31,508,359 UART: [art] SIG.R = B26E5370B7FBAD06665CE8750894F6C2150A70264462442401BB3B0A1BD078967110886F0FC7472F5EEBEC82304845D6
31,515,699 UART: [art] SIG.S = 3346DB73225060A7F71A93C12F3A6485F999EF477EEEB5A1223BB264616EDB994082A1E90DDA5DA5793ADDBF00E7E1A0
32,820,734 UART: Caliptra RT
32,821,446 UART: [state] CFI Enabled
32,982,590 UART: [rt] RT listening for mailbox commands...
32,984,450 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,014,184 UART: [rt]cmd =0x46504c54, len=4
33,015,646 >>> mbox cmd response data (8 bytes)
33,016,732 UART: [rt] FIPS self test
33,017,682 UART: [kat] ++
33,018,186 UART: [kat] sha1
33,022,574 UART: [kat] SHA2-256
33,024,509 UART: [kat] SHA2-384
33,027,416 UART: [kat] SHA2-512-ACC
33,029,708 UART: [kat] ECC-384
33,031,333 UART: Fatal Error: 0x90040004
33,066,728 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,210,695 >>> mbox cmd response: failed
33,211,285 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,355,289 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,075 UART:
190,365 UART: Running Caliptra ROM ...
191,640 UART:
191,790 UART: [state] CFI Enabled
245,612 UART: [state] LifecycleState = Unprovisioned
247,498 UART: [state] DebugLocked = No
250,573 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
255,187 UART: [kat] SHA2-256
424,931 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
435,413 UART: [kat] ++
435,883 UART: [kat] sha1
446,763 UART: [kat] SHA2-256
449,447 UART: [kat] SHA2-384
456,347 UART: [kat] SHA2-512-ACC
458,686 UART: [kat] ECC-384
2,753,457 UART: [kat] HMAC-384Kdf
2,783,987 UART: [kat] LMS
3,974,323 UART: [kat] --
3,978,285 UART: [cold-reset] ++
3,980,170 UART: [fht] Storing FHT @ 0x50003400
3,991,059 UART: [idev] ++
3,991,640 UART: [idev] CDI.KEYID = 6
3,992,551 UART: [idev] SUBJECT.KEYID = 7
3,993,823 UART: [idev] UDS.KEYID = 0
3,995,338 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,139,545 UART: [idev] Erasing UDS.KEYID = 0
7,332,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,489 UART: [idev] --
7,358,861 UART: [ldev] ++
7,359,486 UART: [ldev] CDI.KEYID = 6
7,360,394 UART: [ldev] SUBJECT.KEYID = 5
7,361,608 UART: [ldev] AUTHORITY.KEYID = 7
7,362,894 UART: [ldev] FE.KEYID = 1
7,392,548 UART: [ldev] Erasing FE.KEYID = 1
10,725,714 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,017 UART: [ldev] --
13,104,097 UART: [fwproc] Waiting for Commands...
13,106,737 UART: [fwproc] Received command 0x46574c44
13,108,945 UART: [fwproc] Received Image of size 114716 bytes
17,168,368 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,584 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,629,085 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,801,647 ready_for_fw is high
3,802,031 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,879,244 >>> mbox cmd response: success
23,559,759 UART:
23,560,162 UART: Running Caliptra FMC ...
23,561,301 UART:
23,561,482 UART: [state] CFI Enabled
23,632,022 UART: [fht] FMC Alias Private Key: 7
25,969,493 UART: [art] Extend RT PCRs Done
25,970,714 UART: [art] Lock RT PCRs Done
25,972,394 UART: [art] Populate DV Done
25,977,751 UART: [fht] FMC Alias Private Key: 7
25,979,235 UART: [art] Derive CDI
25,979,999 UART: [art] Store in in slot 0x4
26,039,589 UART: [art] Derive Key Pair
26,040,641 UART: [art] Store priv key in slot 0x5
29,333,217 UART: [art] Derive Key Pair - Done
29,345,966 UART: [art] Signing Cert with AUTHO
29,347,311 UART: RITY.KEYID = 7
31,635,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,324 UART: [art] PUB.X = 6C8AF8231F25C6CFB415258BFDC198F9D84093743A9352EA8EC8D7A9BD39AE7F93819EAA89B76A352AC9704B5F8BA23B
31,644,581 UART: [art] PUB.Y = 18B10FAB244075CCDFE219ED1A70583BC6682FAAF36374AC83C846A71DC50536591939BA05B2E365F598773D202502BE
31,651,793 UART: [art] SIG.R = 7BD38306A7029FD08FABE45372EE4C812A1D6B2BE0CFBDFC259E195F7D2A6D7887CF4CCDF4B33B87BFDBCBD4B71A952B
31,659,197 UART: [art] SIG.S = D6F8BFC4251D2B19C6CACF746888127BD5F22607404AAC14454AF8E58301A35B8A0FBE3853E37883F38B0D348EAC1B3F
32,964,264 UART: Caliptra RT
32,964,973 UART: [state] CFI Enabled
33,133,944 UART: [rt] RT listening for mailbox commands...
33,135,804 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,165,491 UART: [rt]cmd =0x46504c54, len=4
33,167,071 >>> mbox cmd response data (8 bytes)
33,168,137 UART: [rt] FIPS self test
33,169,086 UART: [kat] ++
33,169,542 UART: [kat] sha1
33,173,836 UART: [kat] SHA2-256
33,175,763 UART: [kat] SHA2-384
33,178,886 UART: [kat] SHA2-512-ACC
33,181,138 UART: [kat] ECC-384
33,182,875 UART: Fatal Error: 0x90040004
33,218,283 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,362,450 >>> mbox cmd response: failed
33,363,078 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,507,123 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
3,768,135 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,847,530 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,409 UART:
192,787 UART: Running Caliptra ROM ...
193,883 UART:
603,743 UART: [state] CFI Enabled
615,913 UART: [state] LifecycleState = Unprovisioned
617,867 UART: [state] DebugLocked = No
619,812 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,755 UART: [kat] SHA2-256
794,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,047 UART: [kat] ++
805,586 UART: [kat] sha1
817,605 UART: [kat] SHA2-256
820,338 UART: [kat] SHA2-384
825,151 UART: [kat] SHA2-512-ACC
827,556 UART: [kat] ECC-384
3,111,902 UART: [kat] HMAC-384Kdf
3,123,480 UART: [kat] LMS
4,313,594 UART: [kat] --
4,315,894 UART: [cold-reset] ++
4,316,998 UART: [fht] Storing FHT @ 0x50003400
4,327,916 UART: [idev] ++
4,328,479 UART: [idev] CDI.KEYID = 6
4,329,507 UART: [idev] SUBJECT.KEYID = 7
4,330,681 UART: [idev] UDS.KEYID = 0
4,331,754 ready_for_fw is high
4,331,988 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,476,157 UART: [idev] Erasing UDS.KEYID = 0
7,617,890 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,859 UART: [idev] --
7,644,872 UART: [ldev] ++
7,645,457 UART: [ldev] CDI.KEYID = 6
7,646,370 UART: [ldev] SUBJECT.KEYID = 5
7,647,588 UART: [ldev] AUTHORITY.KEYID = 7
7,648,875 UART: [ldev] FE.KEYID = 1
7,659,628 UART: [ldev] Erasing FE.KEYID = 1
10,949,671 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,262 UART: [ldev] --
13,312,510 UART: [fwproc] Waiting for Commands...
13,315,647 UART: [fwproc] Received command 0x46574c44
13,317,893 UART: [fwproc] Received Image of size 114716 bytes
17,378,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,590 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,842,438 >>> mbox cmd response: success
17,846,851 UART: [afmc] ++
17,847,439 UART: [afmc] CDI.KEYID = 6
17,848,457 UART: [afmc] SUBJECT.KEYID = 7
17,849,637 UART: [afmc] AUTHORITY.KEYID = 5
21,163,564 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,422 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,848 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,666 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,083 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,270 UART: [afmc] --
23,531,192 UART: [cold-reset] --
23,532,946 UART: [state] Locking Datavault
23,539,222 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,917 UART: [state] Locking ICCM
23,543,581 UART: [exit] Launching FMC @ 0x40000130
23,551,965 UART:
23,552,211 UART: Running Caliptra FMC ...
23,553,239 UART:
23,553,407 UART: [state] CFI Enabled
23,561,458 UART: [fht] FMC Alias Private Key: 7
25,891,457 UART: [art] Extend RT PCRs Done
25,892,689 UART: [art] Lock RT PCRs Done
25,894,023 UART: [art] Populate DV Done
25,899,395 UART: [fht] FMC Alias Private Key: 7
25,901,092 UART: [art] Derive CDI
25,901,830 UART: [art] Store in in slot 0x4
25,944,588 UART: [art] Derive Key Pair
25,945,630 UART: [art] Store priv key in slot 0x5
29,187,614 UART: [art] Derive Key Pair - Done
29,200,939 UART: [art] Signing Cert with AUTHO
29,202,238 UART: RITY.KEYID = 7
31,481,259 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,771 UART: [art] PUB.X = F0E8E84F3E01D4AC1E49CFC960EF072911B082295A3E3090FBF5CD05C20942D7355F458355AFB0994DCA213F88E3F89E
31,490,021 UART: [art] PUB.Y = 4657CFCDE0A61F80B35D245B4E326AA64F6B2619FE96F210972DBB1FCF1007E4DA4229769FCBF6F6B76DDFF1745C27F1
31,497,286 UART: [art] SIG.R = 469542E49A64A599B40332A5C355A0235065A43E5229A5C829B4E5B5F9230FA5EF4CF07EAD71348C1B5AEDCA19572DEF
31,504,673 UART: [art] SIG.S = 08ECBE0C30652113876D7559B15DAC4949938BACCEE23694E75E4CD95BF2F234CE6565806936870CC73338F9F4AC502D
32,810,263 UART: Caliptra RT
32,810,979 UART: [state] CFI Enabled
32,928,002 UART: [rt] RT listening for mailbox commands...
32,929,864 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,959,647 UART: [rt]cmd =0x46504c54, len=4
32,961,064 >>> mbox cmd response data (8 bytes)
32,961,927 UART: [rt] FIPS self test
32,962,870 UART: [kat] ++
32,963,326 UART: [kat] sha1
32,967,836 UART: [kat] SHA2-256
32,969,768 UART: [kat] SHA2-384
32,972,835 UART: [kat] SHA2-512-ACC
32,975,072 UART: [kat] ECC-384
32,977,022 UART: Fatal Error: 0x90040004
33,012,400 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,156,541 >>> mbox cmd response: failed
33,157,158 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,301,048 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,008 UART:
190,308 UART: Running Caliptra ROM ...
191,334 UART:
7,223,346 UART: [state] CFI Enabled
7,235,874 UART: [state] LifecycleState = Unprovisioned
7,237,793 UART: [state] DebugLocked = No
7,240,642 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,246,294 UART: [kat] SHA2-256
7,416,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,426,600 UART: [kat] ++
7,427,106 UART: [kat] sha1
7,438,325 UART: [kat] SHA2-256
7,441,022 UART: [kat] SHA2-384
7,446,593 UART: [kat] SHA2-512-ACC
7,448,985 UART: [kat] ECC-384
9,734,171 UART: [kat] HMAC-384Kdf
9,745,705 UART: [kat] LMS
10,935,832 UART: [kat] --
10,937,767 UART: [cold-reset] ++
10,939,913 UART: [fht] Storing FHT @ 0x50003400
10,951,229 UART: [idev] ++
10,951,800 UART: [idev] CDI.KEYID = 6
10,952,768 UART: [idev] SUBJECT.KEYID = 7
10,953,985 UART: [idev] UDS.KEYID = 0
10,955,586 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,099,980 UART: [idev] Erasing UDS.KEYID = 0
14,243,380 UART: [idev] Using Sha1 for KeyId Algorithm
14,265,030 UART: [idev] --
14,269,949 UART: [ldev] ++
14,270,515 UART: [ldev] CDI.KEYID = 6
14,271,453 UART: [ldev] SUBJECT.KEYID = 5
14,272,666 UART: [ldev] AUTHORITY.KEYID = 7
14,273,954 UART: [ldev] FE.KEYID = 1
14,284,361 UART: [ldev] Erasing FE.KEYID = 1
17,572,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,864,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,879,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,893,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,908,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,927,352 UART: [ldev] --
19,931,634 UART: [fwproc] Waiting for Commands...
19,934,333 UART: [fwproc] Received command 0x46574c44
19,936,538 UART: [fwproc] Received Image of size 114716 bytes
23,998,845 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,077,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,146,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,465,205 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,128,747 ready_for_fw is high
4,129,184 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,097,757 >>> mbox cmd response: success
23,740,370 UART:
23,740,798 UART: Running Caliptra FMC ...
23,741,917 UART:
23,742,076 UART: [state] CFI Enabled
23,749,921 UART: [fht] FMC Alias Private Key: 7
26,080,389 UART: [art] Extend RT PCRs Done
26,081,619 UART: [art] Lock RT PCRs Done
26,083,739 UART: [art] Populate DV Done
26,088,899 UART: [fht] FMC Alias Private Key: 7
26,090,495 UART: [art] Derive CDI
26,091,335 UART: [art] Store in in slot 0x4
26,133,727 UART: [art] Derive Key Pair
26,134,772 UART: [art] Store priv key in slot 0x5
29,377,100 UART: [art] Derive Key Pair - Done
29,390,199 UART: [art] Signing Cert with AUTHO
29,391,532 UART: RITY.KEYID = 7
31,670,479 UART: [art] Erasing AUTHORITY.KEYID = 7
31,671,985 UART: [art] PUB.X = F8E4F67741FF9A3AEC68D1300C8B6A3D6316F52224C1CA7F367D7C2337C156AF4B33ED2F442B5DFC869A30EC5F1F5BEC
31,679,244 UART: [art] PUB.Y = E43A268488886E4B180CDA84CDAE0EB50349BA4E44ADCF4A6967D20CDAE26CEDF9F88676BDB61F7899B9F81C9DB790C9
31,686,551 UART: [art] SIG.R = C4CC7B01EB863D36FA7404D6B38170A4EFC27F2242C6640EB024CD0C575E7E48863EB1AC143B2034E5E33103BE4CB169
31,693,893 UART: [art] SIG.S = 7FFEA1673F111D3B226607231C492EBF42A6498604523D163AA8DFEA0DDF18D5A5FB0A9B5489D00051C7100225FF8618
32,999,247 UART: Caliptra RT
32,999,964 UART: [state] CFI Enabled
33,116,763 UART: [rt] RT listening for mailbox commands...
33,118,608 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,148,413 UART: [rt]cmd =0x46504c54, len=4
33,150,047 >>> mbox cmd response data (8 bytes)
33,151,314 UART: [rt] FIPS self test
33,152,268 UART: [kat] ++
33,152,720 UART: [kat] sha1
33,157,014 UART: [kat] SHA2-256
33,158,951 UART: [kat] SHA2-384
33,161,909 UART: [kat] SHA2-512-ACC
33,164,156 UART: [kat] ECC-384
33,166,215 UART: Fatal Error: 0x90040004
33,201,419 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,345,561 >>> mbox cmd response: failed
33,346,193 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,490,181 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
10,573,131 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,528,095 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,131 UART:
192,499 UART: Running Caliptra ROM ...
193,708 UART:
193,859 UART: [state] CFI Enabled
265,772 UART: [state] LifecycleState = Unprovisioned
267,693 UART: [state] DebugLocked = No
269,377 UART: [state] WD Timer not started. Device not locked for debugging
272,857 UART: [kat] SHA2-256
451,965 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,515 UART: [kat] ++
464,055 UART: [kat] sha1
475,939 UART: [kat] SHA2-256
478,944 UART: [kat] SHA2-384
486,784 UART: [kat] SHA2-512-ACC
489,732 UART: [kat] ECC-384
2,949,055 UART: [kat] HMAC-384Kdf
2,973,450 UART: [kat] LMS
3,502,881 UART: [kat] --
3,506,904 UART: [cold-reset] ++
3,509,350 UART: [fht] FHT @ 0x50003400
3,519,268 UART: [idev] ++
3,519,832 UART: [idev] CDI.KEYID = 6
3,520,756 UART: [idev] SUBJECT.KEYID = 7
3,521,933 UART: [idev] UDS.KEYID = 0
3,522,860 ready_for_fw is high
3,523,122 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,037 UART: [idev] Erasing UDS.KEYID = 0
6,029,259 UART: [idev] Sha1 KeyId Algorithm
6,052,899 UART: [idev] --
6,057,741 UART: [ldev] ++
6,058,322 UART: [ldev] CDI.KEYID = 6
6,059,240 UART: [ldev] SUBJECT.KEYID = 5
6,060,399 UART: [ldev] AUTHORITY.KEYID = 7
6,061,688 UART: [ldev] FE.KEYID = 1
6,104,478 UART: [ldev] Erasing FE.KEYID = 1
8,603,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,543 UART: [ldev] --
10,398,107 UART: [fwproc] Wait for Commands...
10,401,227 UART: [fwproc] Recv command 0x46574c44
10,403,283 UART: [fwproc] Recv'd Img size: 115032 bytes
13,812,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,944 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,279,893 >>> mbox cmd response: success
14,284,339 UART: [afmc] ++
14,285,124 UART: [afmc] CDI.KEYID = 6
14,286,043 UART: [afmc] SUBJECT.KEYID = 7
14,287,155 UART: [afmc] AUTHORITY.KEYID = 5
16,809,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,535,445 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,551,204 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,567,266 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,583,110 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,905 UART: [afmc] --
18,609,005 UART: [cold-reset] --
18,612,661 UART: [state] Locking Datavault
18,617,852 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,497 UART: [state] Locking ICCM
18,620,834 UART: [exit] Launching FMC @ 0x40000130
18,629,237 UART:
18,629,476 UART: Running Caliptra FMC ...
18,630,578 UART:
18,630,744 UART: [state] CFI Enabled
18,692,246 UART: [fht] FMC Alias Private Key: 7
20,455,987 UART: [art] Extend RT PCRs Done
20,457,209 UART: [art] Lock RT PCRs Done
20,458,701 UART: [art] Populate DV Done
20,464,291 UART: [fht] FMC Alias Private Key: 7
20,465,776 UART: [art] Derive CDI
20,466,513 UART: [art] Store in in slot 0x4
20,524,850 UART: [art] Derive Key Pair
20,525,890 UART: [art] Store priv key in slot 0x5
22,988,836 UART: [art] Derive Key Pair - Done
23,001,561 UART: [art] Signing Cert with AUTHO
23,002,870 UART: RITY.KEYID = 7
24,714,938 UART: [art] Erasing AUTHORITY.KEYID = 7
24,716,475 UART: [art] PUB.X = C6E7C10B15AA3AB49FC4E3E39454784B3230EEE549B6052030FB6B31A2589585D1046ABD07C9CB13A7BE82118EC7AF0A
24,723,711 UART: [art] PUB.Y = BE4FA8D3F9D132BF235178BAC60B9D53542FC9EB319D53AB0C352762E173E297920EE7416FEA9643BDCDE2283B377576
24,730,934 UART: [art] SIG.R = 1239DAA8B505B49E21E17D7C18B756735067CC9F83EA0D7AF3A9DAF1AEB05597F8A6FC71DB9B36755989F929F5757F44
24,738,370 UART: [art] SIG.S = 9D443CE8301955333F9E02DF177423ED246CA312F18D57219E8393F45D57B2797E65619C1D7EB333CCB89B1F93B21421
25,717,746 UART: Caliptra RT
25,718,447 UART: [state] CFI Enabled
25,883,925 UART: [rt] RT listening for mailbox commands...
25,885,930 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,915,833 UART: [rt]cmd =0x46504c54, len=4
25,917,520 >>> mbox cmd response data (8 bytes)
25,918,578 UART: [rt] FIPS self test
25,919,513 UART: [kat] ++
25,919,967 UART: [kat] sha1
25,924,315 UART: [kat] SHA2-256
25,926,196 UART: [kat] SHA2-384
25,929,318 UART: [kat] SHA2-512-ACC
25,931,557 UART: [kat] ECC-384
25,933,558 UART: Fatal Error: 0x90040004
25,968,881 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,113,234 >>> mbox cmd response: failed
26,113,882 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,258,325 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
190,058 UART:
190,350 UART: Running Caliptra ROM ...
191,463 UART:
191,612 UART: [state] CFI Enabled
246,809 UART: [state] LifecycleState = Unprovisioned
248,636 UART: [state] DebugLocked = No
251,520 UART: [state] WD Timer not started. Device not locked for debugging
255,193 UART: [kat] SHA2-256
434,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
445,882 UART: [kat] ++
446,422 UART: [kat] sha1
457,628 UART: [kat] SHA2-256
460,682 UART: [kat] SHA2-384
467,039 UART: [kat] SHA2-512-ACC
470,030 UART: [kat] ECC-384
2,929,549 UART: [kat] HMAC-384Kdf
2,955,061 UART: [kat] LMS
3,484,540 UART: [kat] --
3,490,364 UART: [cold-reset] ++
3,491,704 UART: [fht] FHT @ 0x50003400
3,503,441 UART: [idev] ++
3,504,009 UART: [idev] CDI.KEYID = 6
3,504,895 UART: [idev] SUBJECT.KEYID = 7
3,506,105 UART: [idev] UDS.KEYID = 0
3,507,608 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,652,312 UART: [idev] Erasing UDS.KEYID = 0
6,008,784 UART: [idev] Sha1 KeyId Algorithm
6,031,448 UART: [idev] --
6,036,668 UART: [ldev] ++
6,037,248 UART: [ldev] CDI.KEYID = 6
6,038,134 UART: [ldev] SUBJECT.KEYID = 5
6,039,372 UART: [ldev] AUTHORITY.KEYID = 7
6,040,613 UART: [ldev] FE.KEYID = 1
6,071,119 UART: [ldev] Erasing FE.KEYID = 1
8,575,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,379,888 UART: [ldev] --
10,384,508 UART: [fwproc] Wait for Commands...
10,386,387 UART: [fwproc] Recv command 0x46574c44
10,388,486 UART: [fwproc] Recv'd Img size: 115032 bytes
13,803,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,668 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,437 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,266,315 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
3,381,063 ready_for_fw is high
3,381,667 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,067,111 >>> mbox cmd response: success
18,354,552 UART:
18,355,001 UART: Running Caliptra FMC ...
18,356,166 UART:
18,356,328 UART: [state] CFI Enabled
18,419,819 UART: [fht] FMC Alias Private Key: 7
20,183,545 UART: [art] Extend RT PCRs Done
20,184,756 UART: [art] Lock RT PCRs Done
20,186,654 UART: [art] Populate DV Done
20,192,319 UART: [fht] FMC Alias Private Key: 7
20,193,865 UART: [art] Derive CDI
20,194,680 UART: [art] Store in in slot 0x4
20,252,188 UART: [art] Derive Key Pair
20,253,225 UART: [art] Store priv key in slot 0x5
22,716,560 UART: [art] Derive Key Pair - Done
22,729,352 UART: [art] Signing Cert with AUTHO
22,730,659 UART: RITY.KEYID = 7
24,442,223 UART: [art] Erasing AUTHORITY.KEYID = 7
24,443,734 UART: [art] PUB.X = BA3C5B45B7A378692404A40994ACCBC46D2A70B28743EE52C08781DE60CAB12D241415C080F620A01BD9D7BDA28AF24D
24,450,998 UART: [art] PUB.Y = C581A59D9B98C028A244AC8A569F266A795A24A7D0764956E10456780B5AB5C6CA971E4F461C756701392914D028D8D2
24,458,217 UART: [art] SIG.R = FE07B182D173042C7AF3D24B9FB85BACFF38EAD7F42E06FCE9973A5E70C2E459C47F34B3ED4FE970B6499C2C0601BE59
24,465,659 UART: [art] SIG.S = 3203BCFCD8B9F87CBD58BDBC577E36C6BF7335E72E5DB6AD368B44C4C28BABDA9D58AF39D51E188DE68AAC5904CF5337
25,444,919 UART: Caliptra RT
25,445,622 UART: [state] CFI Enabled
25,610,139 UART: [rt] RT listening for mailbox commands...
25,611,995 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,641,511 UART: [rt]cmd =0x46504c54, len=4
25,642,980 >>> mbox cmd response data (8 bytes)
25,644,158 UART: [rt] FIPS self test
25,645,096 UART: [kat] ++
25,645,551 UART: [kat] sha1
25,649,842 UART: [kat] SHA2-256
25,651,725 UART: [kat] SHA2-384
25,654,714 UART: [kat] SHA2-512-ACC
25,656,997 UART: [kat] ECC-384
25,658,733 UART: Fatal Error: 0x90040004
25,694,121 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,838,600 >>> mbox cmd response: failed
25,839,258 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,983,647 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,367,456 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,091,788 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,749 UART:
193,148 UART: Running Caliptra ROM ...
194,369 UART:
603,960 UART: [state] CFI Enabled
617,483 UART: [state] LifecycleState = Unprovisioned
619,357 UART: [state] DebugLocked = No
620,889 UART: [state] WD Timer not started. Device not locked for debugging
624,501 UART: [kat] SHA2-256
803,631 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,168 UART: [kat] ++
815,706 UART: [kat] sha1
826,021 UART: [kat] SHA2-256
829,040 UART: [kat] SHA2-384
834,253 UART: [kat] SHA2-512-ACC
837,187 UART: [kat] ECC-384
3,280,862 UART: [kat] HMAC-384Kdf
3,293,396 UART: [kat] LMS
3,822,850 UART: [kat] --
3,825,923 UART: [cold-reset] ++
3,827,219 UART: [fht] FHT @ 0x50003400
3,837,135 UART: [idev] ++
3,837,710 UART: [idev] CDI.KEYID = 6
3,838,633 UART: [idev] SUBJECT.KEYID = 7
3,839,814 UART: [idev] UDS.KEYID = 0
3,840,767 ready_for_fw is high
3,840,985 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,985,547 UART: [idev] Erasing UDS.KEYID = 0
6,314,208 UART: [idev] Sha1 KeyId Algorithm
6,338,329 UART: [idev] --
6,343,020 UART: [ldev] ++
6,343,601 UART: [ldev] CDI.KEYID = 6
6,344,489 UART: [ldev] SUBJECT.KEYID = 5
6,345,649 UART: [ldev] AUTHORITY.KEYID = 7
6,346,938 UART: [ldev] FE.KEYID = 1
6,358,456 UART: [ldev] Erasing FE.KEYID = 1
8,833,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,600,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,604 UART: [ldev] --
10,626,278 UART: [fwproc] Wait for Commands...
10,628,697 UART: [fwproc] Recv command 0x46574c44
10,630,790 UART: [fwproc] Recv'd Img size: 115032 bytes
14,040,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,112,557 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,181,331 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,502,240 >>> mbox cmd response: success
14,506,754 UART: [afmc] ++
14,507,342 UART: [afmc] CDI.KEYID = 6
14,508,257 UART: [afmc] SUBJECT.KEYID = 7
14,509,474 UART: [afmc] AUTHORITY.KEYID = 5
17,006,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,457 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,237 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,263 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,158 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,237 UART: [afmc] --
18,805,530 UART: [cold-reset] --
18,809,172 UART: [state] Locking Datavault
18,815,281 UART: [state] Locking PCR0, PCR1 and PCR31
18,816,926 UART: [state] Locking ICCM
18,818,373 UART: [exit] Launching FMC @ 0x40000130
18,826,763 UART:
18,826,997 UART: Running Caliptra FMC ...
18,828,099 UART:
18,828,268 UART: [state] CFI Enabled
18,836,367 UART: [fht] FMC Alias Private Key: 7
20,592,780 UART: [art] Extend RT PCRs Done
20,594,016 UART: [art] Lock RT PCRs Done
20,595,617 UART: [art] Populate DV Done
20,601,108 UART: [fht] FMC Alias Private Key: 7
20,602,640 UART: [art] Derive CDI
20,603,388 UART: [art] Store in in slot 0x4
20,645,925 UART: [art] Derive Key Pair
20,646,930 UART: [art] Store priv key in slot 0x5
23,073,084 UART: [art] Derive Key Pair - Done
23,085,937 UART: [art] Signing Cert with AUTHO
23,087,274 UART: RITY.KEYID = 7
24,792,535 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,022 UART: [art] PUB.X = FE4D71A0EFA45C747E19B498C1292B342EE6645CE36E99EB2B6BFC6A054B958C758E52516981D46D19496FD78386987B
24,801,277 UART: [art] PUB.Y = 00078DD89B9F893E5B21B8079CEA1E29F5D6BC36B969F197E883D1A8FAB06D6FB08B0E910AB66319E2CDE7821A07D911
24,808,572 UART: [art] SIG.R = C608DF9BC5DFD5D602983D4F59C422D64470CC4358AC3C2FE45299A63EFFD0585256B0FF6B497BE2470B93F5615D6D41
24,815,964 UART: [art] SIG.S = 5E3569C6A7818312AEFB0897F139A1CD16BEFDDFB32C5376761BA124E64961ABC355286EF85F6E5C7FD97AC8188838D0
25,795,379 UART: Caliptra RT
25,796,094 UART: [state] CFI Enabled
25,914,212 UART: [rt] RT listening for mailbox commands...
25,916,090 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,945,823 UART: [rt]cmd =0x46504c54, len=4
25,947,407 >>> mbox cmd response data (8 bytes)
25,948,397 UART: [rt] FIPS self test
25,949,338 UART: [kat] ++
25,949,789 UART: [kat] sha1
25,954,189 UART: [kat] SHA2-256
25,956,067 UART: [kat] SHA2-384
25,959,143 UART: [kat] SHA2-512-ACC
25,961,379 UART: [kat] ECC-384
25,962,861 UART: Fatal Error: 0x90040004
25,998,070 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,142,588 >>> mbox cmd response: failed
26,143,180 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,287,558 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
190,016 UART:
190,305 UART: Running Caliptra ROM ...
191,327 UART:
14,235,080 UART: [state] CFI Enabled
14,249,651 UART: [state] LifecycleState = Unprovisioned
14,251,520 UART: [state] DebugLocked = No
14,254,258 UART: [state] WD Timer not started. Device not locked for debugging
14,258,324 UART: [kat] SHA2-256
14,437,456 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,449,037 UART: [kat] ++
14,449,578 UART: [kat] sha1
14,460,581 UART: [kat] SHA2-256
14,463,602 UART: [kat] SHA2-384
14,470,393 UART: [kat] SHA2-512-ACC
14,473,336 UART: [kat] ECC-384
16,913,511 UART: [kat] HMAC-384Kdf
16,927,032 UART: [kat] LMS
17,456,543 UART: [kat] --
17,461,846 UART: [cold-reset] ++
17,463,071 UART: [fht] FHT @ 0x50003400
17,474,377 UART: [idev] ++
17,474,936 UART: [idev] CDI.KEYID = 6
17,475,813 UART: [idev] SUBJECT.KEYID = 7
17,477,022 UART: [idev] UDS.KEYID = 0
17,478,605 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,623,019 UART: [idev] Erasing UDS.KEYID = 0
19,947,634 UART: [idev] Sha1 KeyId Algorithm
19,971,787 UART: [idev] --
19,976,320 UART: [ldev] ++
19,976,890 UART: [ldev] CDI.KEYID = 6
19,977,796 UART: [ldev] SUBJECT.KEYID = 5
19,979,028 UART: [ldev] AUTHORITY.KEYID = 7
19,980,264 UART: [ldev] FE.KEYID = 1
19,991,444 UART: [ldev] Erasing FE.KEYID = 1
22,467,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,186,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,202,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,218,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,234,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,253,447 UART: [ldev] --
24,258,664 UART: [fwproc] Wait for Commands...
24,260,596 UART: [fwproc] Recv command 0x46574c44
24,262,695 UART: [fwproc] Recv'd Img size: 115032 bytes
27,680,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,757,304 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,826,074 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,147,173 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
3,697,504 ready_for_fw is high
3,698,173 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,292,668 >>> mbox cmd response: success
18,539,787 UART:
18,540,173 UART: Running Caliptra FMC ...
18,541,339 UART:
18,541,500 UART: [state] CFI Enabled
18,549,178 UART: [fht] FMC Alias Private Key: 7
20,306,001 UART: [art] Extend RT PCRs Done
20,307,240 UART: [art] Lock RT PCRs Done
20,308,511 UART: [art] Populate DV Done
20,313,755 UART: [fht] FMC Alias Private Key: 7
20,315,456 UART: [art] Derive CDI
20,316,213 UART: [art] Store in in slot 0x4
20,359,083 UART: [art] Derive Key Pair
20,360,089 UART: [art] Store priv key in slot 0x5
22,787,091 UART: [art] Derive Key Pair - Done
22,799,908 UART: [art] Signing Cert with AUTHO
22,801,221 UART: RITY.KEYID = 7
24,506,601 UART: [art] Erasing AUTHORITY.KEYID = 7
24,508,097 UART: [art] PUB.X = B6FC4832D37136584898B0DFC579758128626EA5D2A2871FE4C77DC3676411120B3B8AFE55ACC943EBD0308FFA5821D7
24,515,332 UART: [art] PUB.Y = 6FA29839E14CAAB716A157223C3EEF6D251E523C3737674892424FC16B8A9105E5CB088C02CC974F098B902E9097E28D
24,522,634 UART: [art] SIG.R = D6984620EFDD1773C1F4AA90F50D266F3AC70266097091F41A36B2974B77F7B156A59344B5002337A54D82834136FFC0
24,529,962 UART: [art] SIG.S = 0002758F2F3121C696F6CF73E352F7CF892063B25FE5FBB86FA34F92885EA4CCD449A392FFD0CB3071B3B65645F3DAAF
25,508,510 UART: Caliptra RT
25,509,228 UART: [state] CFI Enabled
25,625,972 UART: [rt] RT listening for mailbox commands...
25,627,829 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,363 UART: [rt]cmd =0x46504c54, len=4
25,659,151 >>> mbox cmd response data (8 bytes)
25,660,372 UART: [rt] FIPS self test
25,661,311 UART: [kat] ++
25,661,764 UART: [kat] sha1
25,666,326 UART: [kat] SHA2-256
25,668,200 UART: [kat] SHA2-384
25,671,048 UART: [kat] SHA2-512-ACC
25,673,352 UART: [kat] ECC-384
25,675,144 UART: Fatal Error: 0x90040004
25,710,360 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,854,878 >>> mbox cmd response: failed
25,855,542 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,999,988 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,623,242 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,202,139 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,171 UART:
192,530 UART: Running Caliptra ROM ...
193,715 UART:
193,863 UART: [state] CFI Enabled
267,554 UART: [state] LifecycleState = Unprovisioned
270,005 UART: [state] DebugLocked = No
271,202 UART: [state] WD Timer not started. Device not locked for debugging
275,110 UART: [kat] SHA2-256
464,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,705 UART: [kat] ++
476,157 UART: [kat] sha1
487,321 UART: [kat] SHA2-256
490,330 UART: [kat] SHA2-384
495,188 UART: [kat] SHA2-512-ACC
497,779 UART: [kat] ECC-384
2,947,362 UART: [kat] HMAC-384Kdf
2,972,215 UART: [kat] LMS
3,503,968 UART: [kat] --
3,508,201 UART: [cold-reset] ++
3,509,721 UART: [fht] FHT @ 0x50003400
3,521,060 UART: [idev] ++
3,521,729 UART: [idev] CDI.KEYID = 6
3,522,613 UART: [idev] SUBJECT.KEYID = 7
3,523,861 UART: [idev] UDS.KEYID = 0
3,524,793 ready_for_fw is high
3,525,019 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,669,833 UART: [idev] Erasing UDS.KEYID = 0
6,026,651 UART: [idev] Sha1 KeyId Algorithm
6,049,181 UART: [idev] --
6,055,152 UART: [ldev] ++
6,055,848 UART: [ldev] CDI.KEYID = 6
6,056,916 UART: [ldev] SUBJECT.KEYID = 5
6,058,022 UART: [ldev] AUTHORITY.KEYID = 7
6,059,204 UART: [ldev] FE.KEYID = 1
6,099,994 UART: [ldev] Erasing FE.KEYID = 1
8,603,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,958 UART: [ldev] --
10,415,329 UART: [fwproc] Wait for Commands...
10,416,892 UART: [fwproc] Recv command 0x46574c44
10,419,158 UART: [fwproc] Recv'd Img size: 115032 bytes
13,877,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,950 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,612,536 >>> mbox cmd response: success
14,615,797 UART: [afmc] ++
14,616,489 UART: [afmc] CDI.KEYID = 6
14,617,653 UART: [afmc] SUBJECT.KEYID = 7
14,619,136 UART: [afmc] AUTHORITY.KEYID = 5
17,149,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,871,090 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,873,009 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,888,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,903,291 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,918,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,942,100 UART: [afmc] --
18,946,188 UART: [cold-reset] --
18,949,457 UART: [state] Locking Datavault
18,954,657 UART: [state] Locking PCR0, PCR1 and PCR31
18,956,844 UART: [state] Locking ICCM
18,958,563 UART: [exit] Launching FMC @ 0x40000130
18,967,230 UART:
18,967,465 UART: Running Caliptra FMC ...
18,968,565 UART:
18,968,725 UART: [state] CFI Enabled
19,028,363 UART: [fht] FMC Alias Private Key: 7
20,791,391 UART: [art] Extend RT PCRs Done
20,792,610 UART: [art] Lock RT PCRs Done
20,794,237 UART: [art] Populate DV Done
20,799,715 UART: [fht] FMC Alias Private Key: 7
20,801,418 UART: [art] Derive CDI
20,802,156 UART: [art] Store in in slot 0x4
20,860,117 UART: [art] Derive Key Pair
20,861,154 UART: [art] Store priv key in slot 0x5
23,324,014 UART: [art] Derive Key Pair - Done
23,337,068 UART: [art] Signing Cert with AUTHO
23,338,379 UART: RITY.KEYID = 7
25,050,186 UART: [art] Erasing AUTHORITY.KEYID = 7
25,051,697 UART: [art] PUB.X = C698D9D233B2003E776BC6AD3DF76C92E3E54CA66D048A8ACB91E1C69F79E8563155DDB6100AF052290762950F9D0A85
25,058,920 UART: [art] PUB.Y = 9EBBAB3F26DA2AA885B5302A89CC52622E72B3FDE9B5A4D02A1C4D8E7515D6B3EB8BC9138BD94B83A2F3ACE61A5EAF5D
25,066,185 UART: [art] SIG.R = BD5546C705F7C4FDF1A089CC38D71ACBB20605FAE35106EE609739585DF35A4981611E6584F1E418CAC4B99C21F5E16E
25,073,564 UART: [art] SIG.S = 2A9D967C9E69F2C6F6CE3E6F675F9694ED078BC111CF91D37EF647B312B3EDC3CC0139E121A0EABE28768316D426B76C
26,052,197 UART: Caliptra RT
26,052,912 UART: [state] CFI Enabled
26,217,926 UART: [rt] RT listening for mailbox commands...
26,219,784 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,249,775 UART: [rt]cmd =0x46504c54, len=4
26,251,354 >>> mbox cmd response data (8 bytes)
26,252,629 UART: [rt] FIPS self test
26,253,569 UART: [kat] ++
26,254,018 UART: [kat] sha1
26,258,425 UART: [kat] SHA2-256
26,260,357 UART: [kat] SHA2-384
26,263,262 UART: [kat] SHA2-512-ACC
26,265,552 UART: [kat] ECC-384
26,267,606 UART: Fatal Error: 0x90040004
26,302,963 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,447,460 >>> mbox cmd response: failed
26,448,098 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,592,409 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,043 UART:
190,334 UART: Running Caliptra ROM ...
191,452 UART:
191,614 UART: [state] CFI Enabled
248,652 UART: [state] LifecycleState = Unprovisioned
251,006 UART: [state] DebugLocked = No
253,900 UART: [state] WD Timer not started. Device not locked for debugging
258,836 UART: [kat] SHA2-256
448,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
459,463 UART: [kat] ++
460,046 UART: [kat] sha1
471,797 UART: [kat] SHA2-256
474,821 UART: [kat] SHA2-384
481,667 UART: [kat] SHA2-512-ACC
484,276 UART: [kat] ECC-384
2,931,676 UART: [kat] HMAC-384Kdf
2,958,277 UART: [kat] LMS
3,490,006 UART: [kat] --
3,494,219 UART: [cold-reset] ++
3,495,949 UART: [fht] FHT @ 0x50003400
3,507,039 UART: [idev] ++
3,507,716 UART: [idev] CDI.KEYID = 6
3,508,678 UART: [idev] SUBJECT.KEYID = 7
3,509,892 UART: [idev] UDS.KEYID = 0
3,511,400 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,656,390 UART: [idev] Erasing UDS.KEYID = 0
6,018,452 UART: [idev] Sha1 KeyId Algorithm
6,041,200 UART: [idev] --
6,045,269 UART: [ldev] ++
6,046,010 UART: [ldev] CDI.KEYID = 6
6,046,925 UART: [ldev] SUBJECT.KEYID = 5
6,048,028 UART: [ldev] AUTHORITY.KEYID = 7
6,049,316 UART: [ldev] FE.KEYID = 1
6,085,675 UART: [ldev] Erasing FE.KEYID = 1
8,594,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,581 UART: [ldev] --
10,399,546 UART: [fwproc] Wait for Commands...
10,401,268 UART: [fwproc] Recv command 0x46574c44
10,403,586 UART: [fwproc] Recv'd Img size: 115032 bytes
13,861,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,449 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,056,566 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,602,870 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,439,064 ready_for_fw is high
3,439,519 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,744,841 >>> mbox cmd response: success
19,027,424 UART:
19,027,825 UART: Running Caliptra FMC ...
19,028,959 UART:
19,029,115 UART: [state] CFI Enabled
19,087,597 UART: [fht] FMC Alias Private Key: 7
20,851,787 UART: [art] Extend RT PCRs Done
20,853,013 UART: [art] Lock RT PCRs Done
20,854,473 UART: [art] Populate DV Done
20,859,800 UART: [fht] FMC Alias Private Key: 7
20,861,453 UART: [art] Derive CDI
20,862,195 UART: [art] Store in in slot 0x4
20,921,509 UART: [art] Derive Key Pair
20,922,551 UART: [art] Store priv key in slot 0x5
23,385,294 UART: [art] Derive Key Pair - Done
23,398,604 UART: [art] Signing Cert with AUTHO
23,399,944 UART: RITY.KEYID = 7
25,110,854 UART: [art] Erasing AUTHORITY.KEYID = 7
25,112,366 UART: [art] PUB.X = B041C20234C20236BEAF8F788FC99A023DFF9224F115A925325111F51DA4ACEF728EC4EDD7ABEA0B507B6E2015A01BEC
25,119,623 UART: [art] PUB.Y = 106B55DEE28CE9C57E2F57D56F78783A1F5AB3561676BDDD7FB1333A69381781AFFECC2A5B28F6022EEAB6B61C2911AD
25,126,932 UART: [art] SIG.R = AC95BC35151D458AAB2DF70189C984507C96FDF4C25DD2AC34049AFE15C88C9C982FDAF9E54CCACB5D98986992123A0A
25,134,341 UART: [art] SIG.S = CCFBEE6A3225BEF242F577C607202F79DEDDBEDE67EA8B57DA209F29B425FC9DDBD3DBD7CAC80087D20E284ABE65F2B7
26,113,513 UART: Caliptra RT
26,114,206 UART: [state] CFI Enabled
26,279,837 UART: [rt] RT listening for mailbox commands...
26,281,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,311,381 UART: [rt]cmd =0x46504c54, len=4
26,312,961 >>> mbox cmd response data (8 bytes)
26,314,053 UART: [rt] FIPS self test
26,314,996 UART: [kat] ++
26,315,490 UART: [kat] sha1
26,319,946 UART: [kat] SHA2-256
26,321,875 UART: [kat] SHA2-384
26,325,047 UART: [kat] SHA2-512-ACC
26,327,296 UART: [kat] ECC-384
26,329,139 UART: Fatal Error: 0x90040004
26,364,467 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,508,878 >>> mbox cmd response: failed
26,509,529 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,653,956 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,424,100 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,743,865 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,610 UART:
192,984 UART: Running Caliptra ROM ...
194,095 UART:
603,826 UART: [state] CFI Enabled
616,281 UART: [state] LifecycleState = Unprovisioned
618,667 UART: [state] DebugLocked = No
621,407 UART: [state] WD Timer not started. Device not locked for debugging
626,458 UART: [kat] SHA2-256
816,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,132 UART: [kat] ++
827,626 UART: [kat] sha1
839,331 UART: [kat] SHA2-256
842,348 UART: [kat] SHA2-384
847,278 UART: [kat] SHA2-512-ACC
849,864 UART: [kat] ECC-384
3,293,575 UART: [kat] HMAC-384Kdf
3,306,812 UART: [kat] LMS
3,838,669 UART: [kat] --
3,843,803 UART: [cold-reset] ++
3,844,664 UART: [fht] FHT @ 0x50003400
3,856,267 UART: [idev] ++
3,856,995 UART: [idev] CDI.KEYID = 6
3,857,885 UART: [idev] SUBJECT.KEYID = 7
3,859,135 UART: [idev] UDS.KEYID = 0
3,860,040 ready_for_fw is high
3,860,265 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,004,684 UART: [idev] Erasing UDS.KEYID = 0
6,334,139 UART: [idev] Sha1 KeyId Algorithm
6,357,743 UART: [idev] --
6,361,877 UART: [ldev] ++
6,362,625 UART: [ldev] CDI.KEYID = 6
6,363,560 UART: [ldev] SUBJECT.KEYID = 5
6,364,669 UART: [ldev] AUTHORITY.KEYID = 7
6,365,898 UART: [ldev] FE.KEYID = 1
6,377,564 UART: [ldev] Erasing FE.KEYID = 1
8,855,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,126 UART: [ldev] --
10,648,900 UART: [fwproc] Wait for Commands...
10,650,673 UART: [fwproc] Recv command 0x46574c44
10,653,004 UART: [fwproc] Recv'd Img size: 115032 bytes
14,119,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,202,007 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,318,180 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,864,023 >>> mbox cmd response: success
14,868,655 UART: [afmc] ++
14,869,354 UART: [afmc] CDI.KEYID = 6
14,870,539 UART: [afmc] SUBJECT.KEYID = 7
14,872,029 UART: [afmc] AUTHORITY.KEYID = 5
17,376,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,100,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,102,133 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,117,293 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,132,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,147,505 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,171,610 UART: [afmc] --
19,174,877 UART: [cold-reset] --
19,180,574 UART: [state] Locking Datavault
19,185,392 UART: [state] Locking PCR0, PCR1 and PCR31
19,187,588 UART: [state] Locking ICCM
19,189,649 UART: [exit] Launching FMC @ 0x40000130
19,198,297 UART:
19,198,541 UART: Running Caliptra FMC ...
19,199,652 UART:
19,199,818 UART: [state] CFI Enabled
19,208,341 UART: [fht] FMC Alias Private Key: 7
20,965,587 UART: [art] Extend RT PCRs Done
20,966,819 UART: [art] Lock RT PCRs Done
20,968,473 UART: [art] Populate DV Done
20,973,722 UART: [fht] FMC Alias Private Key: 7
20,975,372 UART: [art] Derive CDI
20,976,186 UART: [art] Store in in slot 0x4
21,018,940 UART: [art] Derive Key Pair
21,019,946 UART: [art] Store priv key in slot 0x5
23,446,503 UART: [art] Derive Key Pair - Done
23,459,555 UART: [art] Signing Cert with AUTHO
23,460,871 UART: RITY.KEYID = 7
25,166,428 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,945 UART: [art] PUB.X = 359E3131BD5E2ACA6525494DB9BE755011DCCEC12985B660FA7A8312BB60ABDFABAD974EA3A97AE06F9510C05F776EA3
25,175,178 UART: [art] PUB.Y = 15FEF391A20551A820E69C5316FE3C371CE717C79C0D25698199BF02E98BB140108D8D11392AC91C6B0E3C0BE2184D8B
25,182,447 UART: [art] SIG.R = A3149CC222397FEAC7EAA860CBB4E89161ABC9418EED5F1EE5BF6B82566513F447C7C95EBCB5E09B75E97B875BD956A5
25,189,874 UART: [art] SIG.S = 86E0B2E6A06A0F263B0BC59C30FB18D2419B59F5606ED4D98715065DF01BC492200EC3AD44E161AA4FA33959B70C86B0
26,168,780 UART: Caliptra RT
26,169,493 UART: [state] CFI Enabled
26,286,617 UART: [rt] RT listening for mailbox commands...
26,288,469 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,318,200 UART: [rt]cmd =0x46504c54, len=4
26,319,779 >>> mbox cmd response data (8 bytes)
26,320,943 UART: [rt] FIPS self test
26,321,897 UART: [kat] ++
26,322,342 UART: [kat] sha1
26,326,751 UART: [kat] SHA2-256
26,328,633 UART: [kat] SHA2-384
26,331,739 UART: [kat] SHA2-512-ACC
26,334,029 UART: [kat] ECC-384
26,336,199 UART: Fatal Error: 0x90040004
26,371,354 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,515,870 >>> mbox cmd response: failed
26,516,481 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,660,855 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,088 UART:
190,382 UART: Running Caliptra ROM ...
191,409 UART:
13,875,624 UART: [state] CFI Enabled
13,891,615 UART: [state] LifecycleState = Unprovisioned
13,893,984 UART: [state] DebugLocked = No
13,895,849 UART: [state] WD Timer not started. Device not locked for debugging
13,900,090 UART: [kat] SHA2-256
14,089,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,100,765 UART: [kat] ++
14,101,306 UART: [kat] sha1
14,113,869 UART: [kat] SHA2-256
14,116,886 UART: [kat] SHA2-384
14,123,092 UART: [kat] SHA2-512-ACC
14,125,674 UART: [kat] ECC-384
16,566,439 UART: [kat] HMAC-384Kdf
16,578,671 UART: [kat] LMS
17,110,510 UART: [kat] --
17,114,817 UART: [cold-reset] ++
17,116,318 UART: [fht] FHT @ 0x50003400
17,127,136 UART: [idev] ++
17,127,817 UART: [idev] CDI.KEYID = 6
17,128,801 UART: [idev] SUBJECT.KEYID = 7
17,129,959 UART: [idev] UDS.KEYID = 0
17,131,473 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,275,883 UART: [idev] Erasing UDS.KEYID = 0
19,607,169 UART: [idev] Sha1 KeyId Algorithm
19,630,026 UART: [idev] --
19,634,890 UART: [ldev] ++
19,635,572 UART: [ldev] CDI.KEYID = 6
19,636,478 UART: [ldev] SUBJECT.KEYID = 5
19,637,690 UART: [ldev] AUTHORITY.KEYID = 7
19,638,864 UART: [ldev] FE.KEYID = 1
19,650,157 UART: [ldev] Erasing FE.KEYID = 1
22,129,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,849,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,864,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,879,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,894,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,915,481 UART: [ldev] --
23,921,349 UART: [fwproc] Wait for Commands...
23,923,183 UART: [fwproc] Recv command 0x46574c44
23,925,449 UART: [fwproc] Recv'd Img size: 115032 bytes
27,376,876 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,458,610 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,574,734 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,122,136 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,757,628 ready_for_fw is high
3,758,070 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,988,279 >>> mbox cmd response: success
19,237,165 UART:
19,237,555 UART: Running Caliptra FMC ...
19,238,714 UART:
19,238,874 UART: [state] CFI Enabled
19,247,019 UART: [fht] FMC Alias Private Key: 7
21,003,627 UART: [art] Extend RT PCRs Done
21,004,871 UART: [art] Lock RT PCRs Done
21,006,747 UART: [art] Populate DV Done
21,012,340 UART: [fht] FMC Alias Private Key: 7
21,013,947 UART: [art] Derive CDI
21,014,789 UART: [art] Store in in slot 0x4
21,057,346 UART: [art] Derive Key Pair
21,058,387 UART: [art] Store priv key in slot 0x5
23,485,088 UART: [art] Derive Key Pair - Done
23,498,043 UART: [art] Signing Cert with AUTHO
23,499,358 UART: RITY.KEYID = 7
25,204,719 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,217 UART: [art] PUB.X = 4410BB6DD669291647B1C2A3867BB4C5C413ADB9FD5A4CEE1F043B0DFB52624CC867B5708D0ACE29E9CB12DF072CD1A6
25,213,486 UART: [art] PUB.Y = 2D7541868B1A6745E49E443B8EB85933302FB2EFB4CF8F40B77E724A4EE870007DCCF1CDADBCBDF4F5E1F84A1B4B1660
25,220,749 UART: [art] SIG.R = E8619454751FE9303675583EBE04E39C0BAAFE737FD8F8CE4C9D4DEDB6BBA2B37CB024AF65D8D9E9D3B6E1B2E91D8A32
25,228,147 UART: [art] SIG.S = 22BC9E6B7813B6C8D6558AF3797541A204653A640B6AF6E3B182C4991A7F16ED5AE6C4AB048A3E75DDB7B8EF6E71F856
26,206,786 UART: Caliptra RT
26,207,477 UART: [state] CFI Enabled
26,324,985 UART: [rt] RT listening for mailbox commands...
26,326,831 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,356,723 UART: [rt]cmd =0x46504c54, len=4
26,358,322 >>> mbox cmd response data (8 bytes)
26,359,358 UART: [rt] FIPS self test
26,360,304 UART: [kat] ++
26,360,756 UART: [kat] sha1
26,365,213 UART: [kat] SHA2-256
26,367,140 UART: [kat] SHA2-384
26,370,151 UART: [kat] SHA2-512-ACC
26,372,399 UART: [kat] ECC-384
26,374,357 UART: Fatal Error: 0x90040004
26,409,713 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,554,104 >>> mbox cmd response: failed
26,554,734 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,699,117 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
16,984,909 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,187,388 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
85,943 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,599 UART: [kat] SHA2-256
881,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,645 UART: [kat] ++
885,797 UART: [kat] sha1
890,171 UART: [kat] SHA2-256
892,109 UART: [kat] SHA2-384
894,804 UART: [kat] SHA2-512-ACC
896,705 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
906,966 UART: [kat] LMS
1,475,162 UART: [kat] --
1,476,171 UART: [cold-reset] ++
1,476,517 UART: [fht] Storing FHT @ 0x50003400
1,479,248 UART: [idev] ++
1,479,416 UART: [idev] CDI.KEYID = 6
1,479,776 UART: [idev] SUBJECT.KEYID = 7
1,480,200 UART: [idev] UDS.KEYID = 0
1,480,545 ready_for_fw is high
1,480,545 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,496 UART: [idev] Erasing UDS.KEYID = 0
1,505,296 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,882 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,615 UART: [ldev] Erasing FE.KEYID = 1
1,547,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,200 UART: [ldev] --
1,586,537 UART: [fwproc] Waiting for Commands...
1,587,392 UART: [fwproc] Received command 0x46574c44
1,588,183 UART: [fwproc] Received Image of size 115032 bytes
2,893,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,944 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,296 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,163 >>> mbox cmd response: success
3,088,253 UART: [afmc] ++
3,088,421 UART: [afmc] CDI.KEYID = 6
3,088,783 UART: [afmc] SUBJECT.KEYID = 7
3,089,208 UART: [afmc] AUTHORITY.KEYID = 5
3,124,559 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,611 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,391 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,119 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,004 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,694 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,483 UART: [afmc] --
3,167,479 UART: [cold-reset] --
3,168,529 UART: [state] Locking Datavault
3,169,764 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,368 UART: [state] Locking ICCM
3,170,920 UART: [exit] Launching FMC @ 0x40000130
3,176,249 UART:
3,176,265 UART: Running Caliptra FMC ...
3,176,673 UART:
3,176,727 UART: [state] CFI Enabled
3,187,140 UART: [fht] FMC Alias Private Key: 7
3,295,415 UART: [art] Extend RT PCRs Done
3,295,843 UART: [art] Lock RT PCRs Done
3,297,515 UART: [art] Populate DV Done
3,305,750 UART: [fht] FMC Alias Private Key: 7
3,306,748 UART: [art] Derive CDI
3,307,028 UART: [art] Store in in slot 0x4
3,392,535 UART: [art] Derive Key Pair
3,392,895 UART: [art] Store priv key in slot 0x5
3,405,973 UART: [art] Derive Key Pair - Done
3,420,416 UART: [art] Signing Cert with AUTHO
3,420,896 UART: RITY.KEYID = 7
3,436,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,145 UART: [art] PUB.X = 7BCCFD7A0435E3FD975116DE9FE7663A0BA6A81B2779B284E2130BB9B2E1458E01EC801CAD6499DC62BEAEBE0944A5A0
3,443,918 UART: [art] PUB.Y = 782F57621DD7643D3D24720A56E2A2FE8291AF99F52C068BA142A5133A793C185A4C85EF89875FD91F9D46967E244228
3,450,856 UART: [art] SIG.R = 383091815C6E6D505C8A8F222282B5DB2AE53802D2D7AABD1F8E0B51963ACB108AF8B7BD100837F0950C85590A5262E3
3,457,613 UART: [art] SIG.S = D67C68EBCDB6534C1A2453CCE863E01FB3B29579C9AC67110FA33237FA736B1E650F7D9A49FCB915B26F06C5AE1FCCBF
3,481,765 UART: Caliptra RT
3,482,018 UART: [state] CFI Enabled
3,590,549 UART: [rt] RT listening for mailbox commands...
3,591,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,163 UART: [rt]cmd =0x46504c54, len=4
3,622,289 >>> mbox cmd response data (8 bytes)
3,622,422 UART: [rt] FIPS self test
3,622,750 UART: [kat] ++
3,622,902 UART: [kat] sha1
3,627,120 UART: [kat] SHA2-256
3,629,142 UART: [kat] SHA2-384
3,631,929 UART: [kat] SHA2-512-ACC
3,633,856 UART: [kat] ECC-384
3,635,281 UART: Fatal Error: 0x90040004
3,636,820 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,636,825 >>> mbox cmd response: failed
3,636,825 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,636,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,763 UART: [kat] SHA2-256
881,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,809 UART: [kat] ++
885,961 UART: [kat] sha1
890,197 UART: [kat] SHA2-256
892,135 UART: [kat] SHA2-384
894,840 UART: [kat] SHA2-512-ACC
896,741 UART: [kat] ECC-384
902,344 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,583 UART: [fht] Storing FHT @ 0x50003400
1,479,204 UART: [idev] ++
1,479,372 UART: [idev] CDI.KEYID = 6
1,479,732 UART: [idev] SUBJECT.KEYID = 7
1,480,156 UART: [idev] UDS.KEYID = 0
1,480,501 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,208 UART: [idev] Erasing UDS.KEYID = 0
1,504,322 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,968 UART: [idev] --
1,513,941 UART: [ldev] ++
1,514,109 UART: [ldev] CDI.KEYID = 6
1,514,472 UART: [ldev] SUBJECT.KEYID = 5
1,514,898 UART: [ldev] AUTHORITY.KEYID = 7
1,515,361 UART: [ldev] FE.KEYID = 1
1,520,413 UART: [ldev] Erasing FE.KEYID = 1
1,545,950 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,688 UART: [ldev] --
1,585,049 UART: [fwproc] Waiting for Commands...
1,585,854 UART: [fwproc] Received command 0x46574c44
1,586,645 UART: [fwproc] Received Image of size 115032 bytes
2,890,456 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,917,806 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,158 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,084,173 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,723 ready_for_fw is high
1,362,723 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,509 >>> mbox cmd response: success
2,996,795 UART:
2,996,811 UART: Running Caliptra FMC ...
2,997,219 UART:
2,997,273 UART: [state] CFI Enabled
3,007,710 UART: [fht] FMC Alias Private Key: 7
3,115,759 UART: [art] Extend RT PCRs Done
3,116,187 UART: [art] Lock RT PCRs Done
3,117,567 UART: [art] Populate DV Done
3,125,700 UART: [fht] FMC Alias Private Key: 7
3,126,832 UART: [art] Derive CDI
3,127,112 UART: [art] Store in in slot 0x4
3,212,865 UART: [art] Derive Key Pair
3,213,225 UART: [art] Store priv key in slot 0x5
3,226,673 UART: [art] Derive Key Pair - Done
3,241,532 UART: [art] Signing Cert with AUTHO
3,242,012 UART: RITY.KEYID = 7
3,257,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,957 UART: [art] PUB.X = 6C1D6DFD6574B278BE14FA4E59BDDD71F31636252427A89CD3ECD32088021CBBBC9895E800C467EA64DCDB4929F890D5
3,264,714 UART: [art] PUB.Y = 41D454F36CE991FC2ACC7E2284A1DF9E5FAEA68A49C88C340F43C01DC05FAEC09A7A728D4B7B6619A442F59B94971A63
3,271,675 UART: [art] SIG.R = B725EDAD3AC67959712F5C9C907E3BB527B6103AB2F6DF2321E899B7E1C1BA9BEEFFDE685D9EE8F00067B5003A4ABBE1
3,278,423 UART: [art] SIG.S = A87C4FDC989015050DC842FA78670CB402EF3B36FEBD0B618919DF2DBDB946BE258E78B9E22320D3C159B6A1EBE71731
3,302,311 UART: Caliptra RT
3,302,564 UART: [state] CFI Enabled
3,410,670 UART: [rt] RT listening for mailbox commands...
3,411,333 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,018 UART: [rt]cmd =0x46504c54, len=4
3,442,140 >>> mbox cmd response data (8 bytes)
3,442,495 UART: [rt] FIPS self test
3,442,823 UART: [kat] ++
3,442,975 UART: [kat] sha1
3,447,161 UART: [kat] SHA2-256
3,449,183 UART: [kat] SHA2-384
3,451,932 UART: [kat] SHA2-512-ACC
3,453,859 UART: [kat] ECC-384
3,455,342 UART: Fatal Error: 0x90040004
3,456,881 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,456,886 >>> mbox cmd response: failed
3,456,886 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,456,891 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,887 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,509 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,768 UART: [kat] SHA2-256
882,699 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,814 UART: [kat] ++
886,966 UART: [kat] sha1
891,214 UART: [kat] SHA2-256
893,152 UART: [kat] SHA2-384
896,065 UART: [kat] SHA2-512-ACC
897,966 UART: [kat] ECC-384
903,685 UART: [kat] HMAC-384Kdf
908,147 UART: [kat] LMS
1,476,343 UART: [kat] --
1,477,148 UART: [cold-reset] ++
1,477,596 UART: [fht] Storing FHT @ 0x50003400
1,480,299 UART: [idev] ++
1,480,467 UART: [idev] CDI.KEYID = 6
1,480,827 UART: [idev] SUBJECT.KEYID = 7
1,481,251 UART: [idev] UDS.KEYID = 0
1,481,596 ready_for_fw is high
1,481,596 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,095 UART: [idev] Erasing UDS.KEYID = 0
1,506,251 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,733 UART: [idev] --
1,515,970 UART: [ldev] ++
1,516,138 UART: [ldev] CDI.KEYID = 6
1,516,501 UART: [ldev] SUBJECT.KEYID = 5
1,516,927 UART: [ldev] AUTHORITY.KEYID = 7
1,517,390 UART: [ldev] FE.KEYID = 1
1,522,720 UART: [ldev] Erasing FE.KEYID = 1
1,548,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,535 UART: [ldev] --
1,587,938 UART: [fwproc] Waiting for Commands...
1,588,675 UART: [fwproc] Received command 0x46574c44
1,589,466 UART: [fwproc] Received Image of size 115032 bytes
2,895,367 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,035 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,387 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,089,192 >>> mbox cmd response: success
3,090,366 UART: [afmc] ++
3,090,534 UART: [afmc] CDI.KEYID = 6
3,090,896 UART: [afmc] SUBJECT.KEYID = 7
3,091,321 UART: [afmc] AUTHORITY.KEYID = 5
3,126,050 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,394 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,174 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,902 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,787 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,477 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,482 UART: [afmc] --
3,169,612 UART: [cold-reset] --
3,170,478 UART: [state] Locking Datavault
3,171,391 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,995 UART: [state] Locking ICCM
3,172,543 UART: [exit] Launching FMC @ 0x40000130
3,177,872 UART:
3,177,888 UART: Running Caliptra FMC ...
3,178,296 UART:
3,178,439 UART: [state] CFI Enabled
3,189,104 UART: [fht] FMC Alias Private Key: 7
3,296,865 UART: [art] Extend RT PCRs Done
3,297,293 UART: [art] Lock RT PCRs Done
3,298,811 UART: [art] Populate DV Done
3,306,880 UART: [fht] FMC Alias Private Key: 7
3,308,038 UART: [art] Derive CDI
3,308,318 UART: [art] Store in in slot 0x4
3,393,879 UART: [art] Derive Key Pair
3,394,239 UART: [art] Store priv key in slot 0x5
3,407,223 UART: [art] Derive Key Pair - Done
3,422,049 UART: [art] Signing Cert with AUTHO
3,422,529 UART: RITY.KEYID = 7
3,437,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,608 UART: [art] PUB.X = F9C440C88173E45A85DB262ECFEE265379DB535DC7652F01AFA55C2DED03071F4997D6CFA76F4ED6A17677D79DA186AF
3,445,383 UART: [art] PUB.Y = 8BB765E4601466127DFCC981CB54E254348A892B17BB1FDDCF67BEA1E8CC064414238AB0257957E14A74FBA9B1D06FED
3,452,342 UART: [art] SIG.R = 3BB8AF4C06365C1F4C7BD942A533B598FE752B36FDE1033D293BFE0057475AC59E89F3E4623C8915417373E9892286E9
3,459,082 UART: [art] SIG.S = ED93AC3BE1DDBA742917A675023D34E688A884A66C3EDC5CF1B3B76384B6E5E33957A5ECE9CEB51E0C8F1AC2F7A78E99
3,483,457 UART: Caliptra RT
3,483,802 UART: [state] CFI Enabled
3,592,225 UART: [rt] RT listening for mailbox commands...
3,592,888 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,655 UART: [rt]cmd =0x46504c54, len=4
3,623,679 >>> mbox cmd response data (8 bytes)
3,623,968 UART: [rt] FIPS self test
3,624,296 UART: [kat] ++
3,624,448 UART: [kat] sha1
3,628,492 UART: [kat] SHA2-256
3,630,514 UART: [kat] SHA2-384
3,633,409 UART: [kat] SHA2-512-ACC
3,635,336 UART: [kat] ECC-384
3,637,083 UART: Fatal Error: 0x90040004
3,638,622 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,638,627 >>> mbox cmd response: failed
3,638,627 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,638,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,870 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
891,120 UART: [kat] SHA2-256
893,058 UART: [kat] SHA2-384
895,787 UART: [kat] SHA2-512-ACC
897,688 UART: [kat] ECC-384
903,399 UART: [kat] HMAC-384Kdf
908,097 UART: [kat] LMS
1,476,293 UART: [kat] --
1,477,206 UART: [cold-reset] ++
1,477,604 UART: [fht] Storing FHT @ 0x50003400
1,480,207 UART: [idev] ++
1,480,375 UART: [idev] CDI.KEYID = 6
1,480,735 UART: [idev] SUBJECT.KEYID = 7
1,481,159 UART: [idev] UDS.KEYID = 0
1,481,504 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,101 UART: [idev] Erasing UDS.KEYID = 0
1,505,727 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,261 UART: [idev] --
1,515,450 UART: [ldev] ++
1,515,618 UART: [ldev] CDI.KEYID = 6
1,515,981 UART: [ldev] SUBJECT.KEYID = 5
1,516,407 UART: [ldev] AUTHORITY.KEYID = 7
1,516,870 UART: [ldev] FE.KEYID = 1
1,522,192 UART: [ldev] Erasing FE.KEYID = 1
1,547,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,783 UART: [ldev] --
1,587,064 UART: [fwproc] Waiting for Commands...
1,587,723 UART: [fwproc] Received command 0x46574c44
1,588,514 UART: [fwproc] Received Image of size 115032 bytes
2,892,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,235 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,466 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,736 ready_for_fw is high
1,362,736 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,014 >>> mbox cmd response: success
2,999,142 UART:
2,999,158 UART: Running Caliptra FMC ...
2,999,566 UART:
2,999,709 UART: [state] CFI Enabled
3,010,182 UART: [fht] FMC Alias Private Key: 7
3,117,735 UART: [art] Extend RT PCRs Done
3,118,163 UART: [art] Lock RT PCRs Done
3,119,527 UART: [art] Populate DV Done
3,127,948 UART: [fht] FMC Alias Private Key: 7
3,129,086 UART: [art] Derive CDI
3,129,366 UART: [art] Store in in slot 0x4
3,214,619 UART: [art] Derive Key Pair
3,214,979 UART: [art] Store priv key in slot 0x5
3,228,231 UART: [art] Derive Key Pair - Done
3,243,134 UART: [art] Signing Cert with AUTHO
3,243,614 UART: RITY.KEYID = 7
3,258,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,555 UART: [art] PUB.X = 71C42D35808F10A657610ACF4FCCCF63DB21CC9B0B814DDBD64C14A8BFBCF378A777B7B22DAA808C7CB0C12B05223434
3,266,334 UART: [art] PUB.Y = 0F9B1CD8693DF8E5A2F35CD6DF8EADBF13DDE6F9AD03402EDD753F668E694ED2813596A44EFFAB4F187AE5235E5FD5D8
3,273,304 UART: [art] SIG.R = 39D13665E9B1DA421408C9B224186A48D47120D54528073DBF4F5161D27BC5BE7708F1AC5D56EB1D75565F0CCC58B828
3,280,062 UART: [art] SIG.S = 96E398E71ABE77F0D21DE4938DEE0097720FA284EDA4733732F07727D8D5ABE52F82E9AE35FE64E7C39CE334D0C80701
3,303,450 UART: Caliptra RT
3,303,795 UART: [state] CFI Enabled
3,411,300 UART: [rt] RT listening for mailbox commands...
3,411,963 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,778 UART: [rt]cmd =0x46504c54, len=4
3,442,778 >>> mbox cmd response data (8 bytes)
3,443,033 UART: [rt] FIPS self test
3,443,361 UART: [kat] ++
3,443,513 UART: [kat] sha1
3,447,665 UART: [kat] SHA2-256
3,449,687 UART: [kat] SHA2-384
3,452,618 UART: [kat] SHA2-512-ACC
3,454,545 UART: [kat] ECC-384
3,456,148 UART: Fatal Error: 0x90040004
3,457,687 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,457,692 >>> mbox cmd response: failed
3,457,692 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,457,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,648 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,432 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,278 UART: [kat] SHA2-256
892,928 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,053 UART: [kat] ++
897,205 UART: [kat] sha1
901,509 UART: [kat] SHA2-256
903,449 UART: [kat] SHA2-384
906,146 UART: [kat] SHA2-512-ACC
908,047 UART: [kat] ECC-384
917,106 UART: [kat] HMAC-384Kdf
921,580 UART: [kat] LMS
1,169,908 UART: [kat] --
1,170,693 UART: [cold-reset] ++
1,171,027 UART: [fht] FHT @ 0x50003400
1,173,510 UART: [idev] ++
1,173,678 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,462 UART: [idev] UDS.KEYID = 0
1,174,807 ready_for_fw is high
1,174,807 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,199,425 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,209,117 UART: [ldev] ++
1,209,285 UART: [ldev] CDI.KEYID = 6
1,209,648 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,655 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,836 UART: [fwproc] Recv command 0x46574c44
1,282,564 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,849 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,153 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,068 >>> mbox cmd response: success
2,781,274 UART: [afmc] ++
2,781,442 UART: [afmc] CDI.KEYID = 6
2,781,804 UART: [afmc] SUBJECT.KEYID = 7
2,782,229 UART: [afmc] AUTHORITY.KEYID = 5
2,817,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,505 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,233 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,118 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,837 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,463 UART: [afmc] --
2,860,541 UART: [cold-reset] --
2,861,333 UART: [state] Locking Datavault
2,862,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,936 UART: [state] Locking ICCM
2,863,416 UART: [exit] Launching FMC @ 0x40000130
2,868,745 UART:
2,868,761 UART: Running Caliptra FMC ...
2,869,169 UART:
2,869,223 UART: [state] CFI Enabled
2,879,820 UART: [fht] FMC Alias Private Key: 7
2,986,589 UART: [art] Extend RT PCRs Done
2,987,017 UART: [art] Lock RT PCRs Done
2,988,411 UART: [art] Populate DV Done
2,996,688 UART: [fht] FMC Alias Private Key: 7
2,997,630 UART: [art] Derive CDI
2,997,910 UART: [art] Store in in slot 0x4
3,083,723 UART: [art] Derive Key Pair
3,084,083 UART: [art] Store priv key in slot 0x5
3,097,343 UART: [art] Derive Key Pair - Done
3,112,145 UART: [art] Signing Cert with AUTHO
3,112,625 UART: RITY.KEYID = 7
3,127,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,128,322 UART: [art] PUB.X = 2FFB8F47CA2608A9A5C584A75B125CE47A1036D18BB6A4D5A7BA689F542B7742924EDD7ACFB4B6F71DDC0D14B3F83DC3
3,135,106 UART: [art] PUB.Y = DEB9366B798D193623717E989FC81E03CDB7EF01510CEBA0FB904E18D1D8403B7C9EBA217035DE4460CB5661114B1F6C
3,142,055 UART: [art] SIG.R = DAF59C9C28351C258D8AE7AF25ED6D9DFA7DC274301A7600F5713B0FFB89CCB22A3C6CD39722723A3F8C57221CD23129
3,148,812 UART: [art] SIG.S = FC321986B9DE2AD9A950AD987643AA2EB0530CE39389A0193125C796641110C67203EC84938233D044547764382E0ACD
3,172,538 UART: Caliptra RT
3,172,791 UART: [state] CFI Enabled
3,280,663 UART: [rt] RT listening for mailbox commands...
3,281,326 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,311,125 UART: [rt]cmd =0x46504c54, len=4
3,312,475 >>> mbox cmd response data (8 bytes)
3,312,810 UART: [rt] FIPS self test
3,313,138 UART: [kat] ++
3,313,290 UART: [kat] sha1
3,317,480 UART: [kat] SHA2-256
3,319,502 UART: [kat] SHA2-384
3,322,483 UART: [kat] SHA2-512-ACC
3,324,410 UART: [kat] ECC-384
3,326,341 UART: Fatal Error: 0x90040004
3,327,880 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,885 >>> mbox cmd response: failed
3,327,885 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,738 UART: [state] LifecycleState = Unprovisioned
86,393 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,132 UART: [kat] SHA2-256
893,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,907 UART: [kat] ++
898,059 UART: [kat] sha1
902,263 UART: [kat] SHA2-256
904,203 UART: [kat] SHA2-384
907,174 UART: [kat] SHA2-512-ACC
909,075 UART: [kat] ECC-384
918,786 UART: [kat] HMAC-384Kdf
923,428 UART: [kat] LMS
1,171,756 UART: [kat] --
1,172,759 UART: [cold-reset] ++
1,173,223 UART: [fht] FHT @ 0x50003400
1,175,756 UART: [idev] ++
1,175,924 UART: [idev] CDI.KEYID = 6
1,176,284 UART: [idev] SUBJECT.KEYID = 7
1,176,708 UART: [idev] UDS.KEYID = 0
1,177,053 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,618 UART: [idev] Erasing UDS.KEYID = 0
1,201,671 UART: [idev] Sha1 KeyId Algorithm
1,209,977 UART: [idev] --
1,210,929 UART: [ldev] ++
1,211,097 UART: [ldev] CDI.KEYID = 6
1,211,460 UART: [ldev] SUBJECT.KEYID = 5
1,211,886 UART: [ldev] AUTHORITY.KEYID = 7
1,212,349 UART: [ldev] FE.KEYID = 1
1,217,715 UART: [ldev] Erasing FE.KEYID = 1
1,244,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,293 UART: [ldev] --
1,283,662 UART: [fwproc] Wait for Commands...
1,284,394 UART: [fwproc] Recv command 0x46574c44
1,285,122 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,473 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,777 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,600 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,991 ready_for_fw is high
1,060,991 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,269 >>> mbox cmd response: success
2,697,819 UART:
2,697,835 UART: Running Caliptra FMC ...
2,698,243 UART:
2,698,297 UART: [state] CFI Enabled
2,709,108 UART: [fht] FMC Alias Private Key: 7
2,817,225 UART: [art] Extend RT PCRs Done
2,817,653 UART: [art] Lock RT PCRs Done
2,819,451 UART: [art] Populate DV Done
2,827,822 UART: [fht] FMC Alias Private Key: 7
2,828,798 UART: [art] Derive CDI
2,829,078 UART: [art] Store in in slot 0x4
2,915,091 UART: [art] Derive Key Pair
2,915,451 UART: [art] Store priv key in slot 0x5
2,928,819 UART: [art] Derive Key Pair - Done
2,943,814 UART: [art] Signing Cert with AUTHO
2,944,294 UART: RITY.KEYID = 7
2,959,364 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,129 UART: [art] PUB.X = D8EA62AD92D5ACB1B61A54EAE04AB4EBE4F4AECDFC6E931810C5402CA2C98775E7B28053D2A47D79D8177249FB84AB84
2,966,919 UART: [art] PUB.Y = 7912E1A04EC2EE985E9CC2D4F1C6B95C545089D17AF2DD80FB40A69430133475910D0B45D0FC5DC213B961459988FFC7
2,973,867 UART: [art] SIG.R = CB57170407A4CA2B9569323651E4FBE5888E132F18EC5C55879E920BFB53F066C3B8BD081229571297D313C76E367DB5
2,980,621 UART: [art] SIG.S = E39CD57A110EB56092D65E6C98E40F9C1F2BF7CDA771362E6027E11781694CAFE7326EA912F9D4EF76D46964AB58A4AA
3,004,528 UART: Caliptra RT
3,004,781 UART: [state] CFI Enabled
3,112,359 UART: [rt] RT listening for mailbox commands...
3,113,022 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,775 UART: [rt]cmd =0x46504c54, len=4
3,143,951 >>> mbox cmd response data (8 bytes)
3,144,202 UART: [rt] FIPS self test
3,144,530 UART: [kat] ++
3,144,682 UART: [kat] sha1
3,148,814 UART: [kat] SHA2-256
3,150,836 UART: [kat] SHA2-384
3,153,757 UART: [kat] SHA2-512-ACC
3,155,684 UART: [kat] ECC-384
3,157,373 UART: Fatal Error: 0x90040004
3,158,912 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,158,917 >>> mbox cmd response: failed
3,158,917 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,158,922 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,043 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,891 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,573 UART: [kat] HMAC-384Kdf
923,123 UART: [kat] LMS
1,171,451 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 ready_for_fw is high
1,176,812 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,403 UART: [idev] Erasing UDS.KEYID = 0
1,201,404 UART: [idev] Sha1 KeyId Algorithm
1,209,776 UART: [idev] --
1,210,996 UART: [ldev] ++
1,211,164 UART: [ldev] CDI.KEYID = 6
1,211,527 UART: [ldev] SUBJECT.KEYID = 5
1,211,953 UART: [ldev] AUTHORITY.KEYID = 7
1,212,416 UART: [ldev] FE.KEYID = 1
1,217,716 UART: [ldev] Erasing FE.KEYID = 1
1,244,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,786 UART: [ldev] --
1,283,113 UART: [fwproc] Wait for Commands...
1,283,747 UART: [fwproc] Recv command 0x46574c44
1,284,475 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,170 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,474 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,239 >>> mbox cmd response: success
2,784,293 UART: [afmc] ++
2,784,461 UART: [afmc] CDI.KEYID = 6
2,784,823 UART: [afmc] SUBJECT.KEYID = 7
2,785,248 UART: [afmc] AUTHORITY.KEYID = 5
2,821,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,546 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,274 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,159 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,878 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,874 UART: [afmc] --
2,864,816 UART: [cold-reset] --
2,865,598 UART: [state] Locking Datavault
2,866,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,169 UART: [state] Locking ICCM
2,867,601 UART: [exit] Launching FMC @ 0x40000130
2,872,930 UART:
2,872,946 UART: Running Caliptra FMC ...
2,873,354 UART:
2,873,497 UART: [state] CFI Enabled
2,883,804 UART: [fht] FMC Alias Private Key: 7
2,991,865 UART: [art] Extend RT PCRs Done
2,992,293 UART: [art] Lock RT PCRs Done
2,993,675 UART: [art] Populate DV Done
3,001,646 UART: [fht] FMC Alias Private Key: 7
3,002,596 UART: [art] Derive CDI
3,002,876 UART: [art] Store in in slot 0x4
3,088,503 UART: [art] Derive Key Pair
3,088,863 UART: [art] Store priv key in slot 0x5
3,102,009 UART: [art] Derive Key Pair - Done
3,116,714 UART: [art] Signing Cert with AUTHO
3,117,194 UART: RITY.KEYID = 7
3,132,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,525 UART: [art] PUB.X = 040E9689BFADCC62CFDF277CEF7A5E5BFFFF4D956435E0B3578B5A1662216CA821A9C93BA203CFB6913CAABDC39DD33F
3,140,312 UART: [art] PUB.Y = 489115C116DBB34DE6F489B68618EB29D45FF3393E33E984CAFC8922C2D4EDAEC3C277F34A93A7BB9349FCB5E72F91B9
3,147,276 UART: [art] SIG.R = 067C95BFE938EDB49D0383A26E2B3A7423D0360AAE172093250485D0B6E2F8F9164EFCB6FB9FC3EF11BE23328AD81601
3,154,039 UART: [art] SIG.S = F0E0B95DE9FC95B0629F1274258E05C9DEC78C035F5EC32FD1F1CD15750519B33F4DBB2B1D4177FDE84A181D413F22B5
3,178,053 UART: Caliptra RT
3,178,398 UART: [state] CFI Enabled
3,286,637 UART: [rt] RT listening for mailbox commands...
3,287,300 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,117 UART: [rt]cmd =0x46504c54, len=4
3,318,257 >>> mbox cmd response data (8 bytes)
3,318,598 UART: [rt] FIPS self test
3,318,926 UART: [kat] ++
3,319,078 UART: [kat] sha1
3,323,260 UART: [kat] SHA2-256
3,325,282 UART: [kat] SHA2-384
3,327,997 UART: [kat] SHA2-512-ACC
3,329,924 UART: [kat] ECC-384
3,331,157 UART: Fatal Error: 0x90040004
3,332,696 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,332,701 >>> mbox cmd response: failed
3,332,701 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,332,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
893,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,752 UART: [kat] ++
897,904 UART: [kat] sha1
902,324 UART: [kat] SHA2-256
904,264 UART: [kat] SHA2-384
907,019 UART: [kat] SHA2-512-ACC
908,920 UART: [kat] ECC-384
918,551 UART: [kat] HMAC-384Kdf
923,193 UART: [kat] LMS
1,171,521 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,291 UART: [idev] ++
1,175,459 UART: [idev] CDI.KEYID = 6
1,175,819 UART: [idev] SUBJECT.KEYID = 7
1,176,243 UART: [idev] UDS.KEYID = 0
1,176,588 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,117 UART: [idev] Erasing UDS.KEYID = 0
1,201,290 UART: [idev] Sha1 KeyId Algorithm
1,209,888 UART: [idev] --
1,210,896 UART: [ldev] ++
1,211,064 UART: [ldev] CDI.KEYID = 6
1,211,427 UART: [ldev] SUBJECT.KEYID = 5
1,211,853 UART: [ldev] AUTHORITY.KEYID = 7
1,212,316 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,244,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,078 UART: [ldev] --
1,283,429 UART: [fwproc] Wait for Commands...
1,284,071 UART: [fwproc] Recv command 0x46574c44
1,284,799 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,656 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,960 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,773 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,566 ready_for_fw is high
1,061,566 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,637,812 >>> mbox cmd response: success
2,700,020 UART:
2,700,036 UART: Running Caliptra FMC ...
2,700,444 UART:
2,700,587 UART: [state] CFI Enabled
2,711,408 UART: [fht] FMC Alias Private Key: 7
2,819,507 UART: [art] Extend RT PCRs Done
2,819,935 UART: [art] Lock RT PCRs Done
2,821,541 UART: [art] Populate DV Done
2,829,704 UART: [fht] FMC Alias Private Key: 7
2,830,632 UART: [art] Derive CDI
2,830,912 UART: [art] Store in in slot 0x4
2,916,303 UART: [art] Derive Key Pair
2,916,663 UART: [art] Store priv key in slot 0x5
2,930,065 UART: [art] Derive Key Pair - Done
2,944,841 UART: [art] Signing Cert with AUTHO
2,945,321 UART: RITY.KEYID = 7
2,960,269 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,034 UART: [art] PUB.X = F4F2526FC6E3F54F152AF604179FFFF9AB2C928B47181AF7A373CFF0A56F9238BAA8DE8621F4FE8EDBF1984AFFC005F2
2,967,820 UART: [art] PUB.Y = CE5498D1A240B2CF0CE2DA962FEF9A0483C2A7401D2B04DAC9A68F0C13AB27B48FF097C2B3588D6B0ECA412E306425A6
2,974,771 UART: [art] SIG.R = 9619F073315C2694333099669300FCECC7A441BB4FFB32B891632F2AC2FDBEAB934DBCFF4D87917F198EBDE4A2FF72B8
2,981,533 UART: [art] SIG.S = D2CB005E7ED0E9C5C61D76F386A7E5EDF5D20B34397B73CB6DD6B57F3F2112BA174B959A25BB6397A11D874AFD54410B
3,005,560 UART: Caliptra RT
3,005,905 UART: [state] CFI Enabled
3,114,273 UART: [rt] RT listening for mailbox commands...
3,114,936 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,649 UART: [rt]cmd =0x46504c54, len=4
3,145,773 >>> mbox cmd response data (8 bytes)
3,146,030 UART: [rt] FIPS self test
3,146,358 UART: [kat] ++
3,146,510 UART: [kat] sha1
3,150,564 UART: [kat] SHA2-256
3,152,586 UART: [kat] SHA2-384
3,155,479 UART: [kat] SHA2-512-ACC
3,157,406 UART: [kat] ECC-384
3,159,053 UART: Fatal Error: 0x90040004
3,160,592 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,160,597 >>> mbox cmd response: failed
3,160,597 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,160,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,650 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,166 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,564 UART: [state] LifecycleState = Unprovisioned
86,219 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
891,640 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,769 UART: [kat] ++
895,921 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,752 UART: [kat] SHA2-512-ACC
906,653 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,885 UART: [cold-reset] ++
1,170,371 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 ready_for_fw is high
1,174,221 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,208,950 UART: [ldev] ++
1,209,118 UART: [ldev] CDI.KEYID = 6
1,209,482 UART: [ldev] SUBJECT.KEYID = 5
1,209,909 UART: [ldev] AUTHORITY.KEYID = 7
1,210,372 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,241,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,588 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,765 UART: [fwproc] Recv command 0x46574c44
1,282,498 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,272 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,260 >>> mbox cmd response: success
2,783,497 UART: [afmc] ++
2,783,665 UART: [afmc] CDI.KEYID = 6
2,784,028 UART: [afmc] SUBJECT.KEYID = 7
2,784,454 UART: [afmc] AUTHORITY.KEYID = 5
2,819,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,057 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,808 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,537 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,420 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,139 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,988 UART: [afmc] --
2,863,038 UART: [cold-reset] --
2,863,886 UART: [state] Locking Datavault
2,865,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,665 UART: [state] Locking ICCM
2,866,193 UART: [exit] Launching FMC @ 0x40000130
2,871,522 UART:
2,871,538 UART: Running Caliptra FMC ...
2,871,946 UART:
2,872,000 UART: [state] CFI Enabled
2,882,521 UART: [fht] FMC Alias Private Key: 7
2,990,274 UART: [art] Extend RT PCRs Done
2,990,702 UART: [art] Lock RT PCRs Done
2,992,270 UART: [art] Populate DV Done
3,000,603 UART: [fht] FMC Alias Private Key: 7
3,001,623 UART: [art] Derive CDI
3,001,903 UART: [art] Store in in slot 0x4
3,086,990 UART: [art] Derive Key Pair
3,087,350 UART: [art] Store priv key in slot 0x5
3,099,978 UART: [art] Derive Key Pair - Done
3,114,822 UART: [art] Signing Cert with AUTHO
3,115,302 UART: RITY.KEYID = 7
3,131,064 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,829 UART: [art] PUB.X = 1765580C9D0877C99512FE5CE2DEBFFD5DF23522573ADE6AF3C59C5329FAC58894B42B3D6B7B1F8935E4EB76873D473E
3,138,603 UART: [art] PUB.Y = DA10B62494ACA1EA7EC34645D87983D54CDA7E2EE5CF3837727EEC6AF0EA5C9CF1F00757B5874B185ABA04595C620D00
3,145,536 UART: [art] SIG.R = BD4A2C09AB3B04FF0FD33E80F6DA55965ABA882BFB0743D9A5B0D01D094A72C0BEF04601FEE8C247719613772F276FC5
3,152,302 UART: [art] SIG.S = 918EFD8E7B7BE0D9885B336271A92C7EDE88E083A73059C03F416A993390EC94A11D7C49558EB75DB121451DEB478B5C
3,176,103 UART: Caliptra RT
3,176,356 UART: [state] CFI Enabled
3,284,554 UART: [rt] RT listening for mailbox commands...
3,285,217 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,158 UART: [rt]cmd =0x46504c54, len=4
3,316,280 >>> mbox cmd response data (8 bytes)
3,316,647 UART: [rt] FIPS self test
3,316,975 UART: [kat] ++
3,317,127 UART: [kat] sha1
3,321,599 UART: [kat] SHA2-256
3,323,621 UART: [kat] SHA2-384
3,326,630 UART: [kat] SHA2-512-ACC
3,328,557 UART: [kat] ECC-384
3,330,130 UART: Fatal Error: 0x90040004
3,331,669 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,331,674 >>> mbox cmd response: failed
3,331,674 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,331,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,143 UART: [kat] ++
895,295 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,550 UART: [kat] HMAC-384Kdf
920,000 UART: [kat] LMS
1,168,312 UART: [kat] --
1,169,311 UART: [cold-reset] ++
1,169,793 UART: [fht] FHT @ 0x50003400
1,172,239 UART: [idev] ++
1,172,407 UART: [idev] CDI.KEYID = 6
1,172,768 UART: [idev] SUBJECT.KEYID = 7
1,173,193 UART: [idev] UDS.KEYID = 0
1,173,539 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,180,803 UART: [idev] Erasing UDS.KEYID = 0
1,197,907 UART: [idev] Sha1 KeyId Algorithm
1,206,719 UART: [idev] --
1,207,832 UART: [ldev] ++
1,208,000 UART: [ldev] CDI.KEYID = 6
1,208,364 UART: [ldev] SUBJECT.KEYID = 5
1,208,791 UART: [ldev] AUTHORITY.KEYID = 7
1,209,254 UART: [ldev] FE.KEYID = 1
1,214,446 UART: [ldev] Erasing FE.KEYID = 1
1,240,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,222 UART: [ldev] --
1,279,550 UART: [fwproc] Wait for Commands...
1,280,239 UART: [fwproc] Recv command 0x46574c44
1,280,972 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,231 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,540 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,432 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,600 ready_for_fw is high
1,056,600 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,644 >>> mbox cmd response: success
2,692,168 UART:
2,692,184 UART: Running Caliptra FMC ...
2,692,592 UART:
2,692,646 UART: [state] CFI Enabled
2,702,917 UART: [fht] FMC Alias Private Key: 7
2,810,852 UART: [art] Extend RT PCRs Done
2,811,280 UART: [art] Lock RT PCRs Done
2,812,760 UART: [art] Populate DV Done
2,820,845 UART: [fht] FMC Alias Private Key: 7
2,821,943 UART: [art] Derive CDI
2,822,223 UART: [art] Store in in slot 0x4
2,907,618 UART: [art] Derive Key Pair
2,907,978 UART: [art] Store priv key in slot 0x5
2,921,458 UART: [art] Derive Key Pair - Done
2,936,263 UART: [art] Signing Cert with AUTHO
2,936,743 UART: RITY.KEYID = 7
2,952,065 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,830 UART: [art] PUB.X = 37DFCC05E0C629F79B0CB2E0EA49E98756CFDC23EC73AC6BA7B899006AA07124AC5020B108DC51BC702960C6EB0A0263
2,959,577 UART: [art] PUB.Y = 29D0846B1AE2CAD0438B42A061E70718F68AF39CC2FFE4006AE623FF75512EA70CD03F37BAEAD1C9F580F8DD1C63F340
2,966,515 UART: [art] SIG.R = 1E1185A823320EE981B43CB087E33D53DB3D4B110FF5D7FE2F82481D709941D1C6F79D4B4F7C4DCAFC0748E25B597099
2,973,282 UART: [art] SIG.S = 9BBD24DC6E1108C7F5E3F8C577816AD045B720F3774D3D532598A1F8BD0B595C9A2E798598EB5F510183F600F638A76C
2,996,786 UART: Caliptra RT
2,997,039 UART: [state] CFI Enabled
3,105,314 UART: [rt] RT listening for mailbox commands...
3,105,977 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,786 UART: [rt]cmd =0x46504c54, len=4
3,137,006 >>> mbox cmd response data (8 bytes)
3,137,283 UART: [rt] FIPS self test
3,137,611 UART: [kat] ++
3,137,763 UART: [kat] sha1
3,142,143 UART: [kat] SHA2-256
3,144,165 UART: [kat] SHA2-384
3,147,194 UART: [kat] SHA2-512-ACC
3,149,121 UART: [kat] ECC-384
3,150,542 UART: Fatal Error: 0x90040004
3,152,081 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,086 >>> mbox cmd response: failed
3,152,086 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,124 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,856 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,282 UART: [cold-reset] ++
1,170,688 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,174,408 ready_for_fw is high
1,174,408 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,938 UART: [idev] Erasing UDS.KEYID = 0
1,198,968 UART: [idev] Sha1 KeyId Algorithm
1,207,830 UART: [idev] --
1,208,641 UART: [ldev] ++
1,208,809 UART: [ldev] CDI.KEYID = 6
1,209,173 UART: [ldev] SUBJECT.KEYID = 5
1,209,600 UART: [ldev] AUTHORITY.KEYID = 7
1,210,063 UART: [ldev] FE.KEYID = 1
1,215,319 UART: [ldev] Erasing FE.KEYID = 1
1,241,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,819 UART: [ldev] --
1,281,337 UART: [fwproc] Wait for Commands...
1,281,928 UART: [fwproc] Recv command 0x46574c44
1,282,661 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,040 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,349 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,327 >>> mbox cmd response: success
2,783,578 UART: [afmc] ++
2,783,746 UART: [afmc] CDI.KEYID = 6
2,784,109 UART: [afmc] SUBJECT.KEYID = 7
2,784,535 UART: [afmc] AUTHORITY.KEYID = 5
2,820,308 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,184 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,935 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,664 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,547 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,266 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,157 UART: [afmc] --
2,864,137 UART: [cold-reset] --
2,864,801 UART: [state] Locking Datavault
2,866,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,638 UART: [state] Locking ICCM
2,867,232 UART: [exit] Launching FMC @ 0x40000130
2,872,561 UART:
2,872,577 UART: Running Caliptra FMC ...
2,872,985 UART:
2,873,128 UART: [state] CFI Enabled
2,883,851 UART: [fht] FMC Alias Private Key: 7
2,991,862 UART: [art] Extend RT PCRs Done
2,992,290 UART: [art] Lock RT PCRs Done
2,993,660 UART: [art] Populate DV Done
3,001,533 UART: [fht] FMC Alias Private Key: 7
3,002,535 UART: [art] Derive CDI
3,002,815 UART: [art] Store in in slot 0x4
3,088,560 UART: [art] Derive Key Pair
3,088,920 UART: [art] Store priv key in slot 0x5
3,101,836 UART: [art] Derive Key Pair - Done
3,116,948 UART: [art] Signing Cert with AUTHO
3,117,428 UART: RITY.KEYID = 7
3,132,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,117 UART: [art] PUB.X = 8F624EA06F00DF4CD4B6F574C7648342FC15C6717FE752A3F70BD7A668355AE4F97952EFCF992DFFFB959B83FBBE39B9
3,139,878 UART: [art] PUB.Y = 700AD56FD30DA9FB14D5C7A7F4180891476796C9EDE18161C4E836E84D83D9FDA8323AE93C36DFBDC4AAEDBDAC5D0836
3,146,836 UART: [art] SIG.R = 2E676B7B272D7A3073899092111F7A1C040656229040AB97F982C91959B43DBB80E9EB016B7FE0E16DF5FFC52FE317C4
3,153,597 UART: [art] SIG.S = 228B3964787B821CF6C88BB7EDA0FE924FEAB7D076535B004438E0EC4D1CBC9116E22B0B74E4D8E00DFA243C61F33BAB
3,177,574 UART: Caliptra RT
3,177,919 UART: [state] CFI Enabled
3,285,724 UART: [rt] RT listening for mailbox commands...
3,286,387 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,208 UART: [rt]cmd =0x46504c54, len=4
3,317,340 >>> mbox cmd response data (8 bytes)
3,317,539 UART: [rt] FIPS self test
3,317,867 UART: [kat] ++
3,318,019 UART: [kat] sha1
3,322,231 UART: [kat] SHA2-256
3,324,253 UART: [kat] SHA2-384
3,327,106 UART: [kat] SHA2-512-ACC
3,329,033 UART: [kat] ECC-384
3,330,732 UART: Fatal Error: 0x90040004
3,332,271 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,332,276 >>> mbox cmd response: failed
3,332,276 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,332,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,204 UART: [kat] ++
895,356 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,223 UART: [kat] SHA2-512-ACC
906,124 UART: [kat] ECC-384
915,853 UART: [kat] HMAC-384Kdf
920,437 UART: [kat] LMS
1,168,749 UART: [kat] --
1,169,792 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,906 UART: [idev] ++
1,173,074 UART: [idev] CDI.KEYID = 6
1,173,435 UART: [idev] SUBJECT.KEYID = 7
1,173,860 UART: [idev] UDS.KEYID = 0
1,174,206 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,198,868 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,209,013 UART: [ldev] ++
1,209,181 UART: [ldev] CDI.KEYID = 6
1,209,545 UART: [ldev] SUBJECT.KEYID = 5
1,209,972 UART: [ldev] AUTHORITY.KEYID = 7
1,210,435 UART: [ldev] FE.KEYID = 1
1,215,595 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,473 UART: [ldev] --
1,281,755 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,129 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,533 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,395 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,087 ready_for_fw is high
1,056,087 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,765 >>> mbox cmd response: success
2,693,821 UART:
2,693,837 UART: Running Caliptra FMC ...
2,694,245 UART:
2,694,388 UART: [state] CFI Enabled
2,704,995 UART: [fht] FMC Alias Private Key: 7
2,813,334 UART: [art] Extend RT PCRs Done
2,813,762 UART: [art] Lock RT PCRs Done
2,815,578 UART: [art] Populate DV Done
2,823,875 UART: [fht] FMC Alias Private Key: 7
2,824,943 UART: [art] Derive CDI
2,825,223 UART: [art] Store in in slot 0x4
2,911,270 UART: [art] Derive Key Pair
2,911,630 UART: [art] Store priv key in slot 0x5
2,925,520 UART: [art] Derive Key Pair - Done
2,940,195 UART: [art] Signing Cert with AUTHO
2,940,675 UART: RITY.KEYID = 7
2,956,075 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,840 UART: [art] PUB.X = 6C1B8C91D82900FB3D6EEE15D0F796C8620665D87BE8F07F6543D1A47947973B74E6115B7F207713414E3EF3757AA93D
2,963,583 UART: [art] PUB.Y = 20A3B24A4CFFF0323B62B6637BE0254DDEAE8D2ECA6251F3515C45307ED68A9D34085E9A643D693E8443C90DD09DE92C
2,970,537 UART: [art] SIG.R = FB3AABB7FBF6B2653DC703C7610956ED89242A8CC456BEE73C5A18869C34903AAEFDCCB3C6CB565EAE97887E80C01BEA
2,977,325 UART: [art] SIG.S = C5F0F6FC5D7542CB5040C69792A16D321C498F4C5A4A107A52989E6208A751354999AA7DEB35E748861C11402D41A501
3,000,956 UART: Caliptra RT
3,001,301 UART: [state] CFI Enabled
3,109,533 UART: [rt] RT listening for mailbox commands...
3,110,196 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,885 UART: [rt]cmd =0x46504c54, len=4
3,140,991 >>> mbox cmd response data (8 bytes)
3,141,164 UART: [rt] FIPS self test
3,141,492 UART: [kat] ++
3,141,644 UART: [kat] sha1
3,145,936 UART: [kat] SHA2-256
3,147,958 UART: [kat] SHA2-384
3,150,965 UART: [kat] SHA2-512-ACC
3,152,892 UART: [kat] ECC-384
3,154,401 UART: Fatal Error: 0x90040004
3,155,940 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,155,945 >>> mbox cmd response: failed
3,155,945 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,155,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,223 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,147 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
5,969,656 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,113,549 >>> mbox cmd response: failed
6,114,103 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,257,067 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
4,867,767 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,448,501 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
5,970,801 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,114,971 >>> mbox cmd response: failed
6,115,542 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,258,709 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
4,865,417 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,438,268 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
6,291,114 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,434,898 >>> mbox cmd response: failed
6,435,453 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,578,417 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
18,466,822 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,887,851 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,431 writing to cptra_bootfsm_go
6,294,179 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,438,053 >>> mbox cmd response: failed
6,438,622 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,581,601 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
18,465,695 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,903,806 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
5,188,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,333,175 >>> mbox cmd response: failed
5,333,743 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,477,377 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,443,219 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,262 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
5,184,461 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,329,245 >>> mbox cmd response: failed
5,329,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,473,244 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,450,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,455 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
5,499,199 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,643,454 >>> mbox cmd response: failed
5,644,026 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,787,320 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
17,864,045 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,608,925 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
5,501,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,645,550 >>> mbox cmd response: failed
5,646,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,789,335 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
17,861,274 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,574,360 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
5,164,451 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,309,543 >>> mbox cmd response: failed
5,310,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,453,386 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,424,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,269,547 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
5,168,220 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,312,318 >>> mbox cmd response: failed
5,312,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,456,282 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,422,690 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,224,048 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
5,499,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,644,377 >>> mbox cmd response: failed
5,644,981 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,788,425 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,869,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,610,448 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
5,490,255 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,634,518 >>> mbox cmd response: failed
5,635,085 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,778,454 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
17,868,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,576,488 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,070 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,078 >>> mbox cmd response: failed
822,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,533 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,558 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,566 >>> mbox cmd response: failed
821,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,572 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,181 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,809 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,817 >>> mbox cmd response: failed
821,817 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,612 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,606 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,515 >>> mbox cmd response: failed
822,515 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,316 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,702 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,710 >>> mbox cmd response: failed
822,710 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,389 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,771 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,742 >>> mbox cmd response: failed
821,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,748 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,765 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,395 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,421 >>> mbox cmd response: failed
822,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,914 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,571 >>> mbox cmd response: failed
822,571 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,574 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,462 >>> mbox cmd response: failed
821,462 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,493 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,960 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,968 >>> mbox cmd response: failed
821,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,974 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,911 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,575 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,379 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,387 >>> mbox cmd response: failed
822,387 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,978 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,816 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,341 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,349 >>> mbox cmd response: failed
822,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,355 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,098 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,057 UART:
192,450 UART: Running Caliptra ROM ...
193,633 UART:
193,787 UART: [state] CFI Enabled
265,300 UART: [state] LifecycleState = Unprovisioned
267,227 UART: [state] DebugLocked = No
269,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,777 UART: [kat] SHA2-256
444,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,966 UART: [kat] ++
455,438 UART: [kat] sha1
465,391 UART: [kat] SHA2-256
468,115 UART: [kat] SHA2-384
475,458 UART: [kat] SHA2-512-ACC
477,832 UART: [kat] ECC-384
2,766,739 UART: [kat] HMAC-384Kdf
2,793,706 UART: [kat] LMS
3,984,008 UART: [kat] --
3,987,036 UART: [cold-reset] ++
3,989,266 UART: [fht] Storing FHT @ 0x50003400
4,000,751 UART: [idev] ++
4,001,325 UART: [idev] CDI.KEYID = 6
4,002,313 UART: [idev] SUBJECT.KEYID = 7
4,003,569 UART: [idev] UDS.KEYID = 0
4,004,625 ready_for_fw is high
4,004,850 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,149,189 UART: [idev] Erasing UDS.KEYID = 0
7,341,601 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,545 UART: [idev] --
7,366,545 UART: [ldev] ++
7,367,174 UART: [ldev] CDI.KEYID = 6
7,368,098 UART: [ldev] SUBJECT.KEYID = 5
7,369,322 UART: [ldev] AUTHORITY.KEYID = 7
7,370,583 UART: [ldev] FE.KEYID = 1
7,418,400 UART: [ldev] Erasing FE.KEYID = 1
10,745,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,153 UART: [ldev] --
13,110,667 UART: [fwproc] Waiting for Commands...
13,113,090 UART: [fwproc] Received command 0x46574c44
13,115,335 UART: [fwproc] Received Image of size 114716 bytes
17,182,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,258,046 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,326,913 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,646,353 >>> mbox cmd response: success
17,650,183 UART: [afmc] ++
17,650,798 UART: [afmc] CDI.KEYID = 6
17,651,718 UART: [afmc] SUBJECT.KEYID = 7
17,652,933 UART: [afmc] AUTHORITY.KEYID = 5
21,027,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,324,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,326,595 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,341,041 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,355,846 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,370,267 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,391,162 UART: [afmc] --
23,395,674 UART: [cold-reset] --
23,399,416 UART: [state] Locking Datavault
23,404,396 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,103 UART: [state] Locking ICCM
23,407,339 UART: [exit] Launching FMC @ 0x40000130
23,415,736 UART:
23,416,000 UART: Running Caliptra FMC ...
23,417,110 UART:
23,417,270 UART: [state] CFI Enabled
23,483,581 UART: [fht] FMC Alias Private Key: 7
25,821,257 UART: [art] Extend RT PCRs Done
25,822,479 UART: [art] Lock RT PCRs Done
25,824,299 UART: [art] Populate DV Done
25,829,813 UART: [fht] FMC Alias Private Key: 7
25,831,348 UART: [art] Derive CDI
25,832,083 UART: [art] Store in in slot 0x4
25,892,151 UART: [art] Derive Key Pair
25,893,186 UART: [art] Store priv key in slot 0x5
29,186,589 UART: [art] Derive Key Pair - Done
29,199,437 UART: [art] Signing Cert with AUTHO
29,200,740 UART: RITY.KEYID = 7
31,488,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,764 UART: [art] PUB.X = A348A1D6BB443FD71CD0D5D8C109454479B71E1A38C818344FADD07D6A23037485AF375FCA479CDABAEC6A95C053E991
31,496,912 UART: [art] PUB.Y = 83794D3BFAC0F8045C9512E612105B9F292E6BB468753D2721FEE5C3D177F400A9B7B4F82FD90228CC6D5B0B68FDCDB8
31,504,201 UART: [art] SIG.R = 568FF66CD97E0BE3C6E084B75D02040E40BE701C765FE0B5F2ECF75511A4CB253753806A6404DC46CCECB0287D517E07
31,511,553 UART: [art] SIG.S = CC5C4CC12D1D66608594F567246AD74182B50A2687899B8ADAC7DA74064070A96C8291FECB72BC0EB60E55171B14CE4C
32,816,451 UART: Caliptra RT
32,817,167 UART: [state] CFI Enabled
32,980,567 UART: [rt] RT listening for mailbox commands...
32,982,419 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,012,241 UART: [rt]cmd =0x46504c54, len=4
33,013,754 >>> mbox cmd response data (8 bytes)
33,014,818 UART: [rt] FIPS self test
33,015,773 UART: [kat] ++
33,016,226 UART: [kat] sha1
33,020,507 UART: [kat] SHA2-256
33,022,453 UART: [kat] SHA2-384
33,025,366 UART: [kat] SHA2-512-ACC
33,027,626 UART: [kat] ECC-384
36,291,042 UART: Fatal Error: 0x90040005
36,326,302 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,470,458 >>> mbox cmd response: failed
36,471,128 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,615,533 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,022 UART:
190,315 UART: Running Caliptra ROM ...
191,343 UART:
191,483 UART: [state] CFI Enabled
253,549 UART: [state] LifecycleState = Unprovisioned
255,468 UART: [state] DebugLocked = No
257,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,056 UART: [kat] SHA2-256
432,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,274 UART: [kat] ++
443,723 UART: [kat] sha1
454,217 UART: [kat] SHA2-256
456,958 UART: [kat] SHA2-384
464,396 UART: [kat] SHA2-512-ACC
466,773 UART: [kat] ECC-384
2,753,758 UART: [kat] HMAC-384Kdf
2,784,658 UART: [kat] LMS
3,974,986 UART: [kat] --
3,978,846 UART: [cold-reset] ++
3,980,772 UART: [fht] Storing FHT @ 0x50003400
3,992,444 UART: [idev] ++
3,993,010 UART: [idev] CDI.KEYID = 6
3,993,973 UART: [idev] SUBJECT.KEYID = 7
3,995,191 UART: [idev] UDS.KEYID = 0
3,996,780 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,141,382 UART: [idev] Erasing UDS.KEYID = 0
7,332,127 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,674 UART: [idev] --
7,357,429 UART: [ldev] ++
7,358,008 UART: [ldev] CDI.KEYID = 6
7,358,978 UART: [ldev] SUBJECT.KEYID = 5
7,360,196 UART: [ldev] AUTHORITY.KEYID = 7
7,361,431 UART: [ldev] FE.KEYID = 1
7,406,728 UART: [ldev] Erasing FE.KEYID = 1
10,738,394 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,914 UART: [ldev] --
13,098,909 UART: [fwproc] Waiting for Commands...
13,102,177 UART: [fwproc] Received command 0x46574c44
13,104,380 UART: [fwproc] Received Image of size 114716 bytes
17,170,895 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,272 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,145 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,640,306 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,804,228 ready_for_fw is high
3,804,665 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,875,468 >>> mbox cmd response: success
23,569,278 UART:
23,569,666 UART: Running Caliptra FMC ...
23,570,806 UART:
23,570,962 UART: [state] CFI Enabled
23,639,077 UART: [fht] FMC Alias Private Key: 7
25,976,921 UART: [art] Extend RT PCRs Done
25,978,147 UART: [art] Lock RT PCRs Done
25,979,660 UART: [art] Populate DV Done
25,985,129 UART: [fht] FMC Alias Private Key: 7
25,986,671 UART: [art] Derive CDI
25,987,487 UART: [art] Store in in slot 0x4
26,047,235 UART: [art] Derive Key Pair
26,048,278 UART: [art] Store priv key in slot 0x5
29,340,930 UART: [art] Derive Key Pair - Done
29,354,088 UART: [art] Signing Cert with AUTHO
29,355,406 UART: RITY.KEYID = 7
31,642,054 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,575 UART: [art] PUB.X = 89B5F791248ECA79EA5046C037D9812D8293F6C5D1E8615AE07F9BC97FE0E4EC9904DB18D318C03568BA79A2C78FC710
31,650,874 UART: [art] PUB.Y = E0BB32FF604C725D4FCDDC778DCA63033A6BA086C3C6739727D20F8A74D5E65DF0C32E5A4EBE585DA063E3595903C1A7
31,658,060 UART: [art] SIG.R = 3389669961DC43C1D80BAA18125DA634C33C102C882A9C99824452FA55C79D9082EE6E66A6751013D09C07FBBA88653B
31,665,449 UART: [art] SIG.S = 60580274CF778B640BE06B740E5DD45AB93E5E6D686C1376AA7A2DDF456C0B7EBB3B4798C5241FAFE0D1654140C8D110
32,970,405 UART: Caliptra RT
32,971,121 UART: [state] CFI Enabled
33,132,249 UART: [rt] RT listening for mailbox commands...
33,134,109 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,163,889 UART: [rt]cmd =0x46504c54, len=4
33,165,394 >>> mbox cmd response data (8 bytes)
33,166,118 UART: [rt] FIPS self test
33,167,066 UART: [kat] ++
33,167,525 UART: [kat] sha1
33,171,983 UART: [kat] SHA2-256
33,173,919 UART: [kat] SHA2-384
33,176,829 UART: [kat] SHA2-512-ACC
33,179,083 UART: [kat] ECC-384
36,444,256 UART: Fatal Error: 0x90040005
36,479,551 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,623,971 >>> mbox cmd response: failed
36,624,565 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,768,629 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
3,770,404 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,873,371 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,446 UART:
192,813 UART: Running Caliptra ROM ...
193,908 UART:
603,800 UART: [state] CFI Enabled
617,827 UART: [state] LifecycleState = Unprovisioned
619,808 UART: [state] DebugLocked = No
621,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,138 UART: [kat] SHA2-256
794,859 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,449 UART: [kat] ++
805,897 UART: [kat] sha1
816,555 UART: [kat] SHA2-256
819,217 UART: [kat] SHA2-384
825,798 UART: [kat] SHA2-512-ACC
828,173 UART: [kat] ECC-384
3,113,075 UART: [kat] HMAC-384Kdf
3,125,057 UART: [kat] LMS
4,315,179 UART: [kat] --
4,320,036 UART: [cold-reset] ++
4,321,338 UART: [fht] Storing FHT @ 0x50003400
4,333,329 UART: [idev] ++
4,333,897 UART: [idev] CDI.KEYID = 6
4,334,814 UART: [idev] SUBJECT.KEYID = 7
4,336,060 UART: [idev] UDS.KEYID = 0
4,337,147 ready_for_fw is high
4,337,394 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,481,555 UART: [idev] Erasing UDS.KEYID = 0
7,627,023 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,908 UART: [idev] --
7,652,853 UART: [ldev] ++
7,653,444 UART: [ldev] CDI.KEYID = 6
7,654,471 UART: [ldev] SUBJECT.KEYID = 5
7,655,576 UART: [ldev] AUTHORITY.KEYID = 7
7,656,866 UART: [ldev] FE.KEYID = 1
7,665,570 UART: [ldev] Erasing FE.KEYID = 1
10,956,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,772 UART: [ldev] --
13,317,252 UART: [fwproc] Waiting for Commands...
13,320,166 UART: [fwproc] Received command 0x46574c44
13,322,357 UART: [fwproc] Received Image of size 114716 bytes
17,383,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,416 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,847,261 >>> mbox cmd response: success
17,850,815 UART: [afmc] ++
17,851,416 UART: [afmc] CDI.KEYID = 6
17,852,326 UART: [afmc] SUBJECT.KEYID = 7
17,853,595 UART: [afmc] AUTHORITY.KEYID = 5
21,167,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,461,360 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,463,618 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,478,010 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,492,850 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,507,281 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,218 UART: [afmc] --
23,532,902 UART: [cold-reset] --
23,536,437 UART: [state] Locking Datavault
23,540,728 UART: [state] Locking PCR0, PCR1 and PCR31
23,542,430 UART: [state] Locking ICCM
23,545,278 UART: [exit] Launching FMC @ 0x40000130
23,553,669 UART:
23,553,911 UART: Running Caliptra FMC ...
23,555,012 UART:
23,555,175 UART: [state] CFI Enabled
23,562,952 UART: [fht] FMC Alias Private Key: 7
25,894,162 UART: [art] Extend RT PCRs Done
25,895,388 UART: [art] Lock RT PCRs Done
25,897,012 UART: [art] Populate DV Done
25,902,486 UART: [fht] FMC Alias Private Key: 7
25,904,132 UART: [art] Derive CDI
25,904,950 UART: [art] Store in in slot 0x4
25,947,759 UART: [art] Derive Key Pair
25,948,754 UART: [art] Store priv key in slot 0x5
29,191,190 UART: [art] Derive Key Pair - Done
29,204,309 UART: [art] Signing Cert with AUTHO
29,205,612 UART: RITY.KEYID = 7
31,484,959 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,469 UART: [art] PUB.X = B6FB9A70CDE8A24ABE4A86C8F4E943CA9E10C68885615E583BF12D39D772A0F431F51252DAD5C0881F2A71C976D35AE4
31,493,746 UART: [art] PUB.Y = 5C3522168FF8E1DD7B2F37E17319BD9221FE89F2FDAEC709989C8495CDD04F2069C750E0E81C79D4F468C7C08041C582
31,500,997 UART: [art] SIG.R = 6A4F048ED7EFEF787B63E19C9C13DB0AE824E35CCC0D6F57D636554F821FF3D0E4BEA8F9A6924933405FBC123FC33E82
31,508,393 UART: [art] SIG.S = C84C53B957CC0FA8F9F205AABCAD96E70960745E6402F44D3168951EFBA223A250B59B67F9A94C3576A83650D2C443AF
32,813,686 UART: Caliptra RT
32,814,407 UART: [state] CFI Enabled
32,932,625 UART: [rt] RT listening for mailbox commands...
32,934,514 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,964,403 UART: [rt]cmd =0x46504c54, len=4
32,965,928 >>> mbox cmd response data (8 bytes)
32,967,100 UART: [rt] FIPS self test
32,968,052 UART: [kat] ++
32,968,524 UART: [kat] sha1
32,972,922 UART: [kat] SHA2-256
32,974,856 UART: [kat] SHA2-384
32,977,812 UART: [kat] SHA2-512-ACC
32,980,100 UART: [kat] ECC-384
36,219,245 UART: Fatal Error: 0x90040005
36,254,549 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,398,969 >>> mbox cmd response: failed
36,399,627 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,543,638 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,088 UART:
190,384 UART: Running Caliptra ROM ...
191,504 UART:
3,980,791 UART: [state] CFI Enabled
3,998,312 UART: [state] LifecycleState = Unprovisioned
4,000,274 UART: [state] DebugLocked = No
4,003,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,007,881 UART: [kat] SHA2-256
4,177,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,188,193 UART: [kat] ++
4,188,737 UART: [kat] sha1
4,198,552 UART: [kat] SHA2-256
4,201,292 UART: [kat] SHA2-384
4,206,144 UART: [kat] SHA2-512-ACC
4,208,494 UART: [kat] ECC-384
6,492,135 UART: [kat] HMAC-384Kdf
6,503,553 UART: [kat] LMS
7,693,648 UART: [kat] --
7,699,261 UART: [cold-reset] ++
7,701,031 UART: [fht] Storing FHT @ 0x50003400
7,711,398 UART: [idev] ++
7,711,964 UART: [idev] CDI.KEYID = 6
7,712,901 UART: [idev] SUBJECT.KEYID = 7
7,714,165 UART: [idev] UDS.KEYID = 0
7,715,651 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
7,859,650 UART: [idev] Erasing UDS.KEYID = 0
11,006,317 UART: [idev] Using Sha1 for KeyId Algorithm
11,027,917 UART: [idev] --
11,030,482 UART: [ldev] ++
11,031,060 UART: [ldev] CDI.KEYID = 6
11,032,079 UART: [ldev] SUBJECT.KEYID = 5
11,033,245 UART: [ldev] AUTHORITY.KEYID = 7
11,034,473 UART: [ldev] FE.KEYID = 1
11,044,798 UART: [ldev] Erasing FE.KEYID = 1
14,334,361 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,629,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,643,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,658,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,673,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,692,521 UART: [ldev] --
16,697,569 UART: [fwproc] Waiting for Commands...
16,699,610 UART: [fwproc] Received command 0x46574c44
16,701,803 UART: [fwproc] Received Image of size 114716 bytes
20,759,793 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,834,791 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,903,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
21,222,432 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
4,133,905 ready_for_fw is high
4,134,346 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,079,395 >>> mbox cmd response: success
23,715,445 UART:
23,715,832 UART: Running Caliptra FMC ...
23,716,981 UART:
23,717,142 UART: [state] CFI Enabled
23,724,873 UART: [fht] FMC Alias Private Key: 7
26,055,947 UART: [art] Extend RT PCRs Done
26,057,175 UART: [art] Lock RT PCRs Done
26,058,879 UART: [art] Populate DV Done
26,064,139 UART: [fht] FMC Alias Private Key: 7
26,065,681 UART: [art] Derive CDI
26,066,421 UART: [art] Store in in slot 0x4
26,109,124 UART: [art] Derive Key Pair
26,110,130 UART: [art] Store priv key in slot 0x5
29,352,003 UART: [art] Derive Key Pair - Done
29,365,166 UART: [art] Signing Cert with AUTHO
29,366,469 UART: RITY.KEYID = 7
31,646,133 UART: [art] Erasing AUTHORITY.KEYID = 7
31,647,644 UART: [art] PUB.X = AC1B39DED464D0BD5EF0EA9FA0890CC8023D75060060D771CD14F521BA0861A8D3EF7DB53D4846E9505B8D846D5DDB5F
31,654,902 UART: [art] PUB.Y = 89B961E99F0F1F95AA2EB5999EEBA7FA630116170831CDB9C7349E9910863626F6B5AF5FDF56EDE2AC59AC4744156864
31,662,153 UART: [art] SIG.R = 5031540D84BBF8A2B36C23E9592FEA4E39078011CC7A22DF9103AE353D16E2A210E025131F715147E36B7A6DCFC5D712
31,669,553 UART: [art] SIG.S = D6367021F6DAF6F4222203A4E09C82617B8E247ADD9694DBDD818727FF8584057030DC334676F29099CB35F5A6DB0774
32,975,135 UART: Caliptra RT
32,975,843 UART: [state] CFI Enabled
33,093,867 UART: [rt] RT listening for mailbox commands...
33,095,721 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,125,239 UART: [rt]cmd =0x46504c54, len=4
33,126,760 >>> mbox cmd response data (8 bytes)
33,127,806 UART: [rt] FIPS self test
33,128,753 UART: [kat] ++
33,129,206 UART: [kat] sha1
33,133,606 UART: [kat] SHA2-256
33,135,560 UART: [kat] SHA2-384
33,138,355 UART: [kat] SHA2-512-ACC
33,140,654 UART: [kat] ECC-384
36,379,826 UART: Fatal Error: 0x90040005
36,415,115 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,559,244 >>> mbox cmd response: failed
36,559,867 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,703,887 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
7,362,290 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
21,315,107 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
192,351 UART:
192,733 UART: Running Caliptra ROM ...
193,878 UART:
194,024 UART: [state] CFI Enabled
261,803 UART: [state] LifecycleState = Unprovisioned
263,706 UART: [state] DebugLocked = No
265,607 UART: [state] WD Timer not started. Device not locked for debugging
269,581 UART: [kat] SHA2-256
448,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,223 UART: [kat] ++
460,755 UART: [kat] sha1
471,853 UART: [kat] SHA2-256
474,867 UART: [kat] SHA2-384
481,358 UART: [kat] SHA2-512-ACC
484,371 UART: [kat] ECC-384
2,948,901 UART: [kat] HMAC-384Kdf
2,973,058 UART: [kat] LMS
3,502,535 UART: [kat] --
3,507,030 UART: [cold-reset] ++
3,509,045 UART: [fht] FHT @ 0x50003400
3,519,395 UART: [idev] ++
3,519,960 UART: [idev] CDI.KEYID = 6
3,520,924 UART: [idev] SUBJECT.KEYID = 7
3,522,098 UART: [idev] UDS.KEYID = 0
3,523,029 ready_for_fw is high
3,523,265 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,030 UART: [idev] Erasing UDS.KEYID = 0
6,027,053 UART: [idev] Sha1 KeyId Algorithm
6,049,480 UART: [idev] --
6,052,456 UART: [ldev] ++
6,053,028 UART: [ldev] CDI.KEYID = 6
6,053,915 UART: [ldev] SUBJECT.KEYID = 5
6,055,083 UART: [ldev] AUTHORITY.KEYID = 7
6,056,378 UART: [ldev] FE.KEYID = 1
6,100,700 UART: [ldev] Erasing FE.KEYID = 1
8,604,711 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,062 UART: [ldev] --
10,416,128 UART: [fwproc] Wait for Commands...
10,418,935 UART: [fwproc] Recv command 0x46574c44
10,421,033 UART: [fwproc] Recv'd Img size: 115032 bytes
13,832,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,521 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,271 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,294,596 >>> mbox cmd response: success
14,298,622 UART: [afmc] ++
14,299,210 UART: [afmc] CDI.KEYID = 6
14,300,121 UART: [afmc] SUBJECT.KEYID = 7
14,301,342 UART: [afmc] AUTHORITY.KEYID = 5
16,829,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,572,092 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,588,115 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,930 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,627,668 UART: [afmc] --
18,631,644 UART: [cold-reset] --
18,635,503 UART: [state] Locking Datavault
18,640,853 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,552 UART: [state] Locking ICCM
18,644,599 UART: [exit] Launching FMC @ 0x40000130
18,652,965 UART:
18,653,266 UART: Running Caliptra FMC ...
18,654,307 UART:
18,654,456 UART: [state] CFI Enabled
18,710,829 UART: [fht] FMC Alias Private Key: 7
20,474,286 UART: [art] Extend RT PCRs Done
20,475,525 UART: [art] Lock RT PCRs Done
20,477,287 UART: [art] Populate DV Done
20,482,725 UART: [fht] FMC Alias Private Key: 7
20,484,321 UART: [art] Derive CDI
20,485,140 UART: [art] Store in in slot 0x4
20,542,187 UART: [art] Derive Key Pair
20,543,229 UART: [art] Store priv key in slot 0x5
23,005,722 UART: [art] Derive Key Pair - Done
23,018,623 UART: [art] Signing Cert with AUTHO
23,019,937 UART: RITY.KEYID = 7
24,732,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,305 UART: [art] PUB.X = 04EB759FCFEE8F492B29B5366FAFCC997DB9994B0C4127811F69A5114FA540A72271263BD15CFFA9B0112F4E3718E89F
24,741,589 UART: [art] PUB.Y = 53312DE64A5AFE54E757B5AF1BCDB1C7DAC89DF13FC781D3C595E6641F6C4AC5B515C5FDB11799DB4EF815ABE28F1DFC
24,748,900 UART: [art] SIG.R = 577B2BA9D710D870D284E00875D83D38221606DA45F31024FB675A1D9814CD6721DC86E4D82D1C6359C72CB86606A33E
24,756,278 UART: [art] SIG.S = DD51EC92924EF227F0FF2E2895970201320AC57F7D4A3A3DF12AF9BEF5DDFD30A917C714139A32360AA7ED6BAEC9128C
25,735,440 UART: Caliptra RT
25,736,157 UART: [state] CFI Enabled
25,899,231 UART: [rt] RT listening for mailbox commands...
25,901,101 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,930,636 UART: [rt]cmd =0x46504c54, len=4
25,932,243 >>> mbox cmd response data (8 bytes)
25,933,394 UART: [rt] FIPS self test
25,934,342 UART: [kat] ++
25,934,793 UART: [kat] sha1
25,939,080 UART: [kat] SHA2-256
25,940,955 UART: [kat] SHA2-384
25,943,999 UART: [kat] SHA2-512-ACC
25,946,230 UART: [kat] ECC-384
28,381,504 UART: Fatal Error: 0x90040005
28,416,893 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,561,258 >>> mbox cmd response: failed
28,561,898 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,706,353 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
190,032 UART:
190,326 UART: Running Caliptra ROM ...
191,358 UART:
191,497 UART: [state] CFI Enabled
266,507 UART: [state] LifecycleState = Unprovisioned
268,370 UART: [state] DebugLocked = No
270,743 UART: [state] WD Timer not started. Device not locked for debugging
275,231 UART: [kat] SHA2-256
454,356 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,927 UART: [kat] ++
466,376 UART: [kat] sha1
476,869 UART: [kat] SHA2-256
479,935 UART: [kat] SHA2-384
484,827 UART: [kat] SHA2-512-ACC
487,814 UART: [kat] ECC-384
2,950,810 UART: [kat] HMAC-384Kdf
2,973,790 UART: [kat] LMS
3,503,245 UART: [kat] --
3,506,636 UART: [cold-reset] ++
3,507,917 UART: [fht] FHT @ 0x50003400
3,519,384 UART: [idev] ++
3,519,948 UART: [idev] CDI.KEYID = 6
3,520,913 UART: [idev] SUBJECT.KEYID = 7
3,522,069 UART: [idev] UDS.KEYID = 0
3,523,644 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,319 UART: [idev] Erasing UDS.KEYID = 0
6,029,671 UART: [idev] Sha1 KeyId Algorithm
6,051,721 UART: [idev] --
6,054,584 UART: [ldev] ++
6,055,159 UART: [ldev] CDI.KEYID = 6
6,056,050 UART: [ldev] SUBJECT.KEYID = 5
6,057,207 UART: [ldev] AUTHORITY.KEYID = 7
6,058,491 UART: [ldev] FE.KEYID = 1
6,102,820 UART: [ldev] Erasing FE.KEYID = 1
8,607,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,977 UART: [ldev] --
10,414,002 UART: [fwproc] Wait for Commands...
10,416,100 UART: [fwproc] Recv command 0x46574c44
10,418,142 UART: [fwproc] Recv'd Img size: 115032 bytes
13,830,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,901,590 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,970,397 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,290,810 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,384,700 ready_for_fw is high
3,385,341 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,095,551 >>> mbox cmd response: success
18,378,117 UART:
18,378,523 UART: Running Caliptra FMC ...
18,379,649 UART:
18,379,803 UART: [state] CFI Enabled
18,449,812 UART: [fht] FMC Alias Private Key: 7
20,213,780 UART: [art] Extend RT PCRs Done
20,214,989 UART: [art] Lock RT PCRs Done
20,216,800 UART: [art] Populate DV Done
20,222,298 UART: [fht] FMC Alias Private Key: 7
20,223,781 UART: [art] Derive CDI
20,224,544 UART: [art] Store in in slot 0x4
20,282,300 UART: [art] Derive Key Pair
20,283,305 UART: [art] Store priv key in slot 0x5
22,746,315 UART: [art] Derive Key Pair - Done
22,759,064 UART: [art] Signing Cert with AUTHO
22,760,376 UART: RITY.KEYID = 7
24,471,065 UART: [art] Erasing AUTHORITY.KEYID = 7
24,472,558 UART: [art] PUB.X = 3496B68C07E420128C4542F2861BD1AD5E90F5F8800F5EED8F53DB4A9E211E9E8ED06A155BD5FB1141071B441141E2B0
24,479,824 UART: [art] PUB.Y = 8F355B2CC0D4C53495EB26C6C8E56E6805F68FBD72032F1A9BE9D16E183CBAEC36029E36CB6E1ABCCE0A2A1BC9F9CE1F
24,487,103 UART: [art] SIG.R = 8602A45E4E689CC4847609B6E4A780C866A57F5EECC2642D4CAFC3B41AF692A6FBB098EDC6F7BE8AC9BA24777932DDF3
24,494,549 UART: [art] SIG.S = BF3FE6C854664EFFEA04591D35F48C0530A15BFEDF9F36F0CBC406A596EBCA32544911C1FDEA2B51B62C2360465F82AB
25,473,152 UART: Caliptra RT
25,473,872 UART: [state] CFI Enabled
25,638,287 UART: [rt] RT listening for mailbox commands...
25,640,150 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,669,718 UART: [rt]cmd =0x46504c54, len=4
25,671,114 >>> mbox cmd response data (8 bytes)
25,672,254 UART: [rt] FIPS self test
25,673,204 UART: [kat] ++
25,673,655 UART: [kat] sha1
25,678,005 UART: [kat] SHA2-256
25,679,882 UART: [kat] SHA2-384
25,682,763 UART: [kat] SHA2-512-ACC
25,685,003 UART: [kat] ECC-384
28,119,546 UART: Fatal Error: 0x90040005
28,154,992 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,299,490 >>> mbox cmd response: failed
28,300,147 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,444,459 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,347,683 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,046,294 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,573 UART:
192,943 UART: Running Caliptra ROM ...
194,451 UART:
603,879 UART: [state] CFI Enabled
617,577 UART: [state] LifecycleState = Unprovisioned
619,455 UART: [state] DebugLocked = No
620,921 UART: [state] WD Timer not started. Device not locked for debugging
624,542 UART: [kat] SHA2-256
803,653 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,252 UART: [kat] ++
815,784 UART: [kat] sha1
826,188 UART: [kat] SHA2-256
829,197 UART: [kat] SHA2-384
835,407 UART: [kat] SHA2-512-ACC
838,410 UART: [kat] ECC-384
3,280,735 UART: [kat] HMAC-384Kdf
3,292,556 UART: [kat] LMS
3,822,113 UART: [kat] --
3,826,244 UART: [cold-reset] ++
3,827,961 UART: [fht] FHT @ 0x50003400
3,840,506 UART: [idev] ++
3,841,070 UART: [idev] CDI.KEYID = 6
3,841,959 UART: [idev] SUBJECT.KEYID = 7
3,843,202 UART: [idev] UDS.KEYID = 0
3,844,106 ready_for_fw is high
3,844,337 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,988,898 UART: [idev] Erasing UDS.KEYID = 0
6,316,059 UART: [idev] Sha1 KeyId Algorithm
6,338,481 UART: [idev] --
6,342,685 UART: [ldev] ++
6,343,253 UART: [ldev] CDI.KEYID = 6
6,344,139 UART: [ldev] SUBJECT.KEYID = 5
6,345,243 UART: [ldev] AUTHORITY.KEYID = 7
6,346,589 UART: [ldev] FE.KEYID = 1
6,357,436 UART: [ldev] Erasing FE.KEYID = 1
8,831,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,480 UART: [ldev] --
10,622,201 UART: [fwproc] Wait for Commands...
10,623,767 UART: [fwproc] Recv command 0x46574c44
10,625,886 UART: [fwproc] Recv'd Img size: 115032 bytes
14,043,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,118,585 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,187,343 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,507,754 >>> mbox cmd response: success
14,512,629 UART: [afmc] ++
14,513,218 UART: [afmc] CDI.KEYID = 6
14,514,292 UART: [afmc] SUBJECT.KEYID = 7
14,515,413 UART: [afmc] AUTHORITY.KEYID = 5
17,012,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,733,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,735,549 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,751,339 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,767,365 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,783,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,806,483 UART: [afmc] --
18,809,565 UART: [cold-reset] --
18,813,697 UART: [state] Locking Datavault
18,819,478 UART: [state] Locking PCR0, PCR1 and PCR31
18,821,117 UART: [state] Locking ICCM
18,823,726 UART: [exit] Launching FMC @ 0x40000130
18,832,170 UART:
18,832,404 UART: Running Caliptra FMC ...
18,833,624 UART:
18,833,790 UART: [state] CFI Enabled
18,841,904 UART: [fht] FMC Alias Private Key: 7
20,598,593 UART: [art] Extend RT PCRs Done
20,599,805 UART: [art] Lock RT PCRs Done
20,601,347 UART: [art] Populate DV Done
20,606,601 UART: [fht] FMC Alias Private Key: 7
20,608,206 UART: [art] Derive CDI
20,609,027 UART: [art] Store in in slot 0x4
20,651,808 UART: [art] Derive Key Pair
20,652,814 UART: [art] Store priv key in slot 0x5
23,080,031 UART: [art] Derive Key Pair - Done
23,092,932 UART: [art] Signing Cert with AUTHO
23,094,236 UART: RITY.KEYID = 7
24,799,838 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,336 UART: [art] PUB.X = 05B7E32ED07A418F15B0A46963BFB958DFFAB377B3A33F74F89F0784F156AB2D1E0A1403243D9FCD87EB8AD0A81917EC
24,808,643 UART: [art] PUB.Y = 0736BF563C82C3C12C680EC16D992C1E807C3A3ECBF585C5804C78F3BC36606B794C16611169019E85372FC09241718E
24,815,875 UART: [art] SIG.R = D6EAC0534CB34FAF9D05F69A90DA603A699E4FF4E48060400049F84671A7A46C69721091E35D87944E0DD50BCDE6A1BE
24,823,220 UART: [art] SIG.S = EE66AD6C64EF603008D3178AC772335217FE41CC0ACC97B2030BCCE66D56A1DD82AB4554B70DD59E7CAF281221424575
25,802,706 UART: Caliptra RT
25,803,418 UART: [state] CFI Enabled
25,919,730 UART: [rt] RT listening for mailbox commands...
25,921,578 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,951,305 UART: [rt]cmd =0x46504c54, len=4
25,952,827 >>> mbox cmd response data (8 bytes)
25,953,906 UART: [rt] FIPS self test
25,954,879 UART: [kat] ++
25,955,337 UART: [kat] sha1
25,959,687 UART: [kat] SHA2-256
25,961,563 UART: [kat] SHA2-384
25,964,632 UART: [kat] SHA2-512-ACC
25,966,922 UART: [kat] ECC-384
28,390,661 UART: Fatal Error: 0x90040005
28,425,953 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,570,482 >>> mbox cmd response: failed
28,571,090 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,715,479 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,133 UART:
190,424 UART: Running Caliptra ROM ...
191,550 UART:
11,817,452 UART: [state] CFI Enabled
11,826,643 UART: [state] LifecycleState = Unprovisioned
11,828,492 UART: [state] DebugLocked = No
11,830,793 UART: [state] WD Timer not started. Device not locked for debugging
11,835,077 UART: [kat] SHA2-256
12,014,219 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,025,803 UART: [kat] ++
12,026,346 UART: [kat] sha1
12,036,702 UART: [kat] SHA2-256
12,039,719 UART: [kat] SHA2-384
12,046,340 UART: [kat] SHA2-512-ACC
12,049,298 UART: [kat] ECC-384
14,491,405 UART: [kat] HMAC-384Kdf
14,504,548 UART: [kat] LMS
15,034,000 UART: [kat] --
15,040,281 UART: [cold-reset] ++
15,041,724 UART: [fht] FHT @ 0x50003400
15,051,517 UART: [idev] ++
15,052,080 UART: [idev] CDI.KEYID = 6
15,052,957 UART: [idev] SUBJECT.KEYID = 7
15,054,168 UART: [idev] UDS.KEYID = 0
15,055,756 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
15,200,160 UART: [idev] Erasing UDS.KEYID = 0
17,524,574 UART: [idev] Sha1 KeyId Algorithm
17,548,280 UART: [idev] --
17,551,247 UART: [ldev] ++
17,551,812 UART: [ldev] CDI.KEYID = 6
17,552,690 UART: [ldev] SUBJECT.KEYID = 5
17,553,842 UART: [ldev] AUTHORITY.KEYID = 7
17,555,178 UART: [ldev] FE.KEYID = 1
17,566,665 UART: [ldev] Erasing FE.KEYID = 1
20,041,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,759,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,775,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,791,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,807,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,827,863 UART: [ldev] --
21,832,046 UART: [fwproc] Wait for Commands...
21,833,927 UART: [fwproc] Recv command 0x46574c44
21,836,023 UART: [fwproc] Recv'd Img size: 115032 bytes
25,246,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,317,032 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,385,844 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,706,049 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,447 writing to cptra_bootfsm_go
3,693,001 ready_for_fw is high
3,693,428 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,271,150 >>> mbox cmd response: success
18,519,396 UART:
18,519,791 UART: Running Caliptra FMC ...
18,520,911 UART:
18,521,064 UART: [state] CFI Enabled
18,529,068 UART: [fht] FMC Alias Private Key: 7
20,285,775 UART: [art] Extend RT PCRs Done
20,287,002 UART: [art] Lock RT PCRs Done
20,288,985 UART: [art] Populate DV Done
20,294,317 UART: [fht] FMC Alias Private Key: 7
20,295,803 UART: [art] Derive CDI
20,296,561 UART: [art] Store in in slot 0x4
20,339,008 UART: [art] Derive Key Pair
20,340,058 UART: [art] Store priv key in slot 0x5
22,767,073 UART: [art] Derive Key Pair - Done
22,780,075 UART: [art] Signing Cert with AUTHO
22,781,589 UART: RITY.KEYID = 7
24,486,824 UART: [art] Erasing AUTHORITY.KEYID = 7
24,488,326 UART: [art] PUB.X = B4E6C7B15CA648CEAF86709CA196D04A01B8A2137FB137F27795CC5357FE5CA1D65845B1C7DD03ADE8964AB420A970F5
24,495,608 UART: [art] PUB.Y = 652021E9CDC9A7AD684D92E44DCC4772060F4D3736ADD817BA1E54BE2193D653D691D51682BD7E9EF9321DFE48C595C7
24,502,888 UART: [art] SIG.R = 533305EAF489FD16F6B814E1027BD107825FFE587062BDE042D85B7845E003059C268446215B97B1844481ED45824D91
24,510,205 UART: [art] SIG.S = 94D41CBD4AD99EC150F047576ACEC816364DC4BEEC47A07C6A6E0451B1D756DE132688F18D4E09AE620FAE026F0ACAC9
25,489,014 UART: Caliptra RT
25,489,713 UART: [state] CFI Enabled
25,606,891 UART: [rt] RT listening for mailbox commands...
25,608,747 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,638,198 UART: [rt]cmd =0x46504c54, len=4
25,639,903 >>> mbox cmd response data (8 bytes)
25,641,236 UART: [rt] FIPS self test
25,642,175 UART: [kat] ++
25,642,628 UART: [kat] sha1
25,646,859 UART: [kat] SHA2-256
25,648,801 UART: [kat] SHA2-384
25,651,925 UART: [kat] SHA2-512-ACC
25,654,231 UART: [kat] ECC-384
28,078,157 UART: Fatal Error: 0x90040005
28,113,741 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,258,704 >>> mbox cmd response: failed
28,259,432 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,403,838 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
15,229,283 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,819,385 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,086 UART:
192,472 UART: Running Caliptra ROM ...
193,616 UART:
193,763 UART: [state] CFI Enabled
268,234 UART: [state] LifecycleState = Unprovisioned
270,606 UART: [state] DebugLocked = No
271,793 UART: [state] WD Timer not started. Device not locked for debugging
276,132 UART: [kat] SHA2-256
465,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,738 UART: [kat] ++
477,188 UART: [kat] sha1
487,497 UART: [kat] SHA2-256
490,511 UART: [kat] SHA2-384
497,372 UART: [kat] SHA2-512-ACC
499,954 UART: [kat] ECC-384
2,948,548 UART: [kat] HMAC-384Kdf
2,972,367 UART: [kat] LMS
3,504,130 UART: [kat] --
3,508,554 UART: [cold-reset] ++
3,511,130 UART: [fht] FHT @ 0x50003400
3,522,466 UART: [idev] ++
3,523,173 UART: [idev] CDI.KEYID = 6
3,524,209 UART: [idev] SUBJECT.KEYID = 7
3,525,311 UART: [idev] UDS.KEYID = 0
3,526,239 ready_for_fw is high
3,526,451 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,671,132 UART: [idev] Erasing UDS.KEYID = 0
6,031,836 UART: [idev] Sha1 KeyId Algorithm
6,054,111 UART: [idev] --
6,059,267 UART: [ldev] ++
6,059,957 UART: [ldev] CDI.KEYID = 6
6,060,868 UART: [ldev] SUBJECT.KEYID = 5
6,062,026 UART: [ldev] AUTHORITY.KEYID = 7
6,063,259 UART: [ldev] FE.KEYID = 1
6,101,941 UART: [ldev] Erasing FE.KEYID = 1
8,609,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,407 UART: [ldev] --
10,416,375 UART: [fwproc] Wait for Commands...
10,417,819 UART: [fwproc] Recv command 0x46574c44
10,419,755 UART: [fwproc] Recv'd Img size: 115032 bytes
13,875,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,088 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,225 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,615,023 >>> mbox cmd response: success
14,619,360 UART: [afmc] ++
14,620,073 UART: [afmc] CDI.KEYID = 6
14,621,266 UART: [afmc] SUBJECT.KEYID = 7
14,622,700 UART: [afmc] AUTHORITY.KEYID = 5
17,152,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,877,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,894,847 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,909,958 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,924,979 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,488 UART: [afmc] --
18,951,915 UART: [cold-reset] --
18,956,966 UART: [state] Locking Datavault
18,962,988 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,174 UART: [state] Locking ICCM
18,968,230 UART: [exit] Launching FMC @ 0x40000130
18,976,895 UART:
18,977,126 UART: Running Caliptra FMC ...
18,978,163 UART:
18,978,310 UART: [state] CFI Enabled
19,033,645 UART: [fht] FMC Alias Private Key: 7
20,798,564 UART: [art] Extend RT PCRs Done
20,799,783 UART: [art] Lock RT PCRs Done
20,801,493 UART: [art] Populate DV Done
20,806,850 UART: [fht] FMC Alias Private Key: 7
20,808,494 UART: [art] Derive CDI
20,809,228 UART: [art] Store in in slot 0x4
20,865,939 UART: [art] Derive Key Pair
20,866,983 UART: [art] Store priv key in slot 0x5
23,329,708 UART: [art] Derive Key Pair - Done
23,342,870 UART: [art] Signing Cert with AUTHO
23,344,175 UART: RITY.KEYID = 7
25,055,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,840 UART: [art] PUB.X = 1FE03BC3EEDD9D8F6AFC78B7A27E9B19CAB3A800A6736ECF2166EF1177C2CD7E863CB13D7E70984DB1AA8096C42269DD
25,064,142 UART: [art] PUB.Y = 7237B86EB8766AF78999CE982C2CCFFDDB4669E112FA33B4EB9B6993FC50D0711EAF96A9E8F40033B6891B9A4F4F8814
25,071,339 UART: [art] SIG.R = A4F230983F203D4EAC2A034BACB769693661781650BA2B9284E929673C41C6B62BAB050EEAB45A83B20CF6E0261C3DC0
25,078,729 UART: [art] SIG.S = 7F9519285AD620EFB4F212445F3BBC97C80C775321C67B13861546B7589BC05A64DAF80829C6EDFE354EABDA36908BB8
26,058,252 UART: Caliptra RT
26,058,951 UART: [state] CFI Enabled
26,222,154 UART: [rt] RT listening for mailbox commands...
26,224,017 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,253,640 UART: [rt]cmd =0x46504c54, len=4
26,255,056 >>> mbox cmd response data (8 bytes)
26,256,060 UART: [rt] FIPS self test
26,257,008 UART: [kat] ++
26,257,484 UART: [kat] sha1
26,261,888 UART: [kat] SHA2-256
26,263,761 UART: [kat] SHA2-384
26,266,610 UART: [kat] SHA2-512-ACC
26,268,899 UART: [kat] ECC-384
28,704,206 UART: Fatal Error: 0x90040005
28,739,457 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,884,013 >>> mbox cmd response: failed
28,884,681 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,029,081 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
189,992 UART:
190,278 UART: Running Caliptra ROM ...
191,306 UART:
191,445 UART: [state] CFI Enabled
260,214 UART: [state] LifecycleState = Unprovisioned
262,633 UART: [state] DebugLocked = No
265,228 UART: [state] WD Timer not started. Device not locked for debugging
270,385 UART: [kat] SHA2-256
460,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,000 UART: [kat] ++
471,454 UART: [kat] sha1
484,008 UART: [kat] SHA2-256
487,024 UART: [kat] SHA2-384
492,793 UART: [kat] SHA2-512-ACC
495,350 UART: [kat] ECC-384
2,945,348 UART: [kat] HMAC-384Kdf
2,969,566 UART: [kat] LMS
3,501,364 UART: [kat] --
3,506,604 UART: [cold-reset] ++
3,508,594 UART: [fht] FHT @ 0x50003400
3,521,111 UART: [idev] ++
3,521,799 UART: [idev] CDI.KEYID = 6
3,522,764 UART: [idev] SUBJECT.KEYID = 7
3,523,923 UART: [idev] UDS.KEYID = 0
3,525,424 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,670,133 UART: [idev] Erasing UDS.KEYID = 0
6,025,830 UART: [idev] Sha1 KeyId Algorithm
6,048,645 UART: [idev] --
6,053,819 UART: [ldev] ++
6,054,516 UART: [ldev] CDI.KEYID = 6
6,055,431 UART: [ldev] SUBJECT.KEYID = 5
6,056,597 UART: [ldev] AUTHORITY.KEYID = 7
6,057,831 UART: [ldev] FE.KEYID = 1
6,097,859 UART: [ldev] Erasing FE.KEYID = 1
8,602,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,378 UART: [ldev] --
10,410,217 UART: [fwproc] Wait for Commands...
10,412,094 UART: [fwproc] Recv command 0x46574c44
10,414,421 UART: [fwproc] Recv'd Img size: 115032 bytes
13,872,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,781 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,970 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,619,926 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,440,591 ready_for_fw is high
3,441,232 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,752,088 >>> mbox cmd response: success
19,045,896 UART:
19,046,293 UART: Running Caliptra FMC ...
19,047,460 UART:
19,047,624 UART: [state] CFI Enabled
19,114,151 UART: [fht] FMC Alias Private Key: 7
20,878,665 UART: [art] Extend RT PCRs Done
20,879,890 UART: [art] Lock RT PCRs Done
20,881,464 UART: [art] Populate DV Done
20,886,778 UART: [fht] FMC Alias Private Key: 7
20,888,265 UART: [art] Derive CDI
20,889,029 UART: [art] Store in in slot 0x4
20,946,511 UART: [art] Derive Key Pair
20,947,554 UART: [art] Store priv key in slot 0x5
23,410,222 UART: [art] Derive Key Pair - Done
23,422,953 UART: [art] Signing Cert with AUTHO
23,424,294 UART: RITY.KEYID = 7
25,135,219 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,727 UART: [art] PUB.X = 040F51D6567FFD6EEC7182F4EE90C4AAA3CD6076CBB171DC0168BB77EFEE5E4D72867F9473F41444D485D110896CBD5B
25,144,008 UART: [art] PUB.Y = 97D1F8F80E3DC2C402906E5880D5C656DB45641B9A8136282582C782F60725C6CDA56CBEAB69B0F9610FC249F4FB068A
25,151,240 UART: [art] SIG.R = 59CD8B1601AB6B34B5049FF9989CB68373865648BBE35BAF3A08E79B94AC65AAAE80D49013B24588A9F5938CA9939841
25,158,588 UART: [art] SIG.S = 695B34C2701763BA64512B4E9B7FC347A3F1C5795F6B34B2FB5BD9335E54E1DFA18ED30C659906D6CA940931C983BE9C
26,138,193 UART: Caliptra RT
26,138,885 UART: [state] CFI Enabled
26,303,981 UART: [rt] RT listening for mailbox commands...
26,305,849 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,335,482 UART: [rt]cmd =0x46504c54, len=4
26,337,173 >>> mbox cmd response data (8 bytes)
26,338,130 UART: [rt] FIPS self test
26,339,087 UART: [kat] ++
26,339,550 UART: [kat] sha1
26,343,938 UART: [kat] SHA2-256
26,345,872 UART: [kat] SHA2-384
26,348,850 UART: [kat] SHA2-512-ACC
26,351,153 UART: [kat] ECC-384
28,786,225 UART: Fatal Error: 0x90040005
28,821,665 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,966,050 >>> mbox cmd response: failed
28,966,699 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,111,150 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,424,833 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,730,151 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,444 UART:
192,815 UART: Running Caliptra ROM ...
193,955 UART:
603,504 UART: [state] CFI Enabled
619,031 UART: [state] LifecycleState = Unprovisioned
621,339 UART: [state] DebugLocked = No
623,788 UART: [state] WD Timer not started. Device not locked for debugging
627,840 UART: [kat] SHA2-256
817,732 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,474 UART: [kat] ++
828,999 UART: [kat] sha1
839,328 UART: [kat] SHA2-256
842,310 UART: [kat] SHA2-384
849,237 UART: [kat] SHA2-512-ACC
851,824 UART: [kat] ECC-384
3,294,080 UART: [kat] HMAC-384Kdf
3,308,804 UART: [kat] LMS
3,840,624 UART: [kat] --
3,845,829 UART: [cold-reset] ++
3,848,051 UART: [fht] FHT @ 0x50003400
3,860,266 UART: [idev] ++
3,860,914 UART: [idev] CDI.KEYID = 6
3,861,949 UART: [idev] SUBJECT.KEYID = 7
3,863,057 UART: [idev] UDS.KEYID = 0
3,863,986 ready_for_fw is high
3,864,202 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,008,767 UART: [idev] Erasing UDS.KEYID = 0
6,342,210 UART: [idev] Sha1 KeyId Algorithm
6,364,971 UART: [idev] --
6,370,742 UART: [ldev] ++
6,371,437 UART: [ldev] CDI.KEYID = 6
6,372,348 UART: [ldev] SUBJECT.KEYID = 5
6,373,574 UART: [ldev] AUTHORITY.KEYID = 7
6,374,756 UART: [ldev] FE.KEYID = 1
6,385,027 UART: [ldev] Erasing FE.KEYID = 1
8,860,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,415 UART: [ldev] --
10,652,545 UART: [fwproc] Wait for Commands...
10,654,218 UART: [fwproc] Recv command 0x46574c44
10,656,551 UART: [fwproc] Recv'd Img size: 115032 bytes
14,115,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,309,326 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,855,485 >>> mbox cmd response: success
14,858,874 UART: [afmc] ++
14,859,575 UART: [afmc] CDI.KEYID = 6
14,860,815 UART: [afmc] SUBJECT.KEYID = 7
14,862,245 UART: [afmc] AUTHORITY.KEYID = 5
17,364,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,539 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,707 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,812 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,851 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,155,753 UART: [afmc] --
19,158,557 UART: [cold-reset] --
19,162,679 UART: [state] Locking Datavault
19,167,234 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,371 UART: [state] Locking ICCM
19,171,128 UART: [exit] Launching FMC @ 0x40000130
19,179,790 UART:
19,180,023 UART: Running Caliptra FMC ...
19,181,047 UART:
19,181,195 UART: [state] CFI Enabled
19,189,592 UART: [fht] FMC Alias Private Key: 7
20,946,298 UART: [art] Extend RT PCRs Done
20,947,513 UART: [art] Lock RT PCRs Done
20,949,541 UART: [art] Populate DV Done
20,954,737 UART: [fht] FMC Alias Private Key: 7
20,956,329 UART: [art] Derive CDI
20,957,069 UART: [art] Store in in slot 0x4
20,999,570 UART: [art] Derive Key Pair
21,000,609 UART: [art] Store priv key in slot 0x5
23,427,456 UART: [art] Derive Key Pair - Done
23,440,546 UART: [art] Signing Cert with AUTHO
23,441,853 UART: RITY.KEYID = 7
25,147,543 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,052 UART: [art] PUB.X = 808F159A4487135BD69243D766283F2BBBA3330D21C3C095A3075699A1089AAF1C897B66C6B253C454346150B890D7AD
25,156,293 UART: [art] PUB.Y = 10610ADC9E9E09D6477B3F14F983BE2A4E8014C889A62F7B4E711E775EAB8111A26C18CAEEDC3619D96F249A1DE0FBF2
25,163,561 UART: [art] SIG.R = E57CE57E7ED615C8ACD89CAC37AC98E8F858C7B8451DFBE9DDA9BF5D778C46DCBAA18A9576F3FBDB17570875B9A92064
25,171,020 UART: [art] SIG.S = FEEA3AA825DDC8C694898018BC92704C470BF9B752E4F399D713AA7ED7AD1DFB81892D732C0010085417B239A4FDDAE7
26,149,968 UART: Caliptra RT
26,150,666 UART: [state] CFI Enabled
26,268,789 UART: [rt] RT listening for mailbox commands...
26,270,654 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,300,516 UART: [rt]cmd =0x46504c54, len=4
26,302,181 >>> mbox cmd response data (8 bytes)
26,303,690 UART: [rt] FIPS self test
26,304,633 UART: [kat] ++
26,305,085 UART: [kat] sha1
26,309,330 UART: [kat] SHA2-256
26,311,263 UART: [kat] SHA2-384
26,314,115 UART: [kat] SHA2-512-ACC
26,316,353 UART: [kat] ECC-384
28,740,053 UART: Fatal Error: 0x90040005
28,775,446 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,920,010 >>> mbox cmd response: failed
28,920,637 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,064,916 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,057 UART:
190,367 UART: Running Caliptra ROM ...
191,421 UART:
11,472,029 UART: [state] CFI Enabled
11,485,312 UART: [state] LifecycleState = Unprovisioned
11,487,719 UART: [state] DebugLocked = No
11,488,971 UART: [state] WD Timer not started. Device not locked for debugging
11,494,187 UART: [kat] SHA2-256
11,684,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,694,850 UART: [kat] ++
11,695,367 UART: [kat] sha1
11,707,955 UART: [kat] SHA2-256
11,710,982 UART: [kat] SHA2-384
11,716,756 UART: [kat] SHA2-512-ACC
11,719,324 UART: [kat] ECC-384
14,162,394 UART: [kat] HMAC-384Kdf
14,174,773 UART: [kat] LMS
14,706,570 UART: [kat] --
14,709,865 UART: [cold-reset] ++
14,712,444 UART: [fht] FHT @ 0x50003400
14,723,314 UART: [idev] ++
14,724,050 UART: [idev] CDI.KEYID = 6
14,724,966 UART: [idev] SUBJECT.KEYID = 7
14,726,172 UART: [idev] UDS.KEYID = 0
14,727,684 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,872,473 UART: [idev] Erasing UDS.KEYID = 0
17,201,083 UART: [idev] Sha1 KeyId Algorithm
17,223,467 UART: [idev] --
17,228,569 UART: [ldev] ++
17,229,258 UART: [ldev] CDI.KEYID = 6
17,230,166 UART: [ldev] SUBJECT.KEYID = 5
17,231,326 UART: [ldev] AUTHORITY.KEYID = 7
17,232,555 UART: [ldev] FE.KEYID = 1
17,242,609 UART: [ldev] Erasing FE.KEYID = 1
19,721,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,439,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,454,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,470,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,485,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,506,664 UART: [ldev] --
21,511,929 UART: [fwproc] Wait for Commands...
21,514,351 UART: [fwproc] Recv command 0x46574c44
21,516,622 UART: [fwproc] Recv'd Img size: 115032 bytes
24,972,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,048,698 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,164,848 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,712,262 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,759,576 ready_for_fw is high
3,760,260 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,967,019 >>> mbox cmd response: success
19,218,627 UART:
19,219,050 UART: Running Caliptra FMC ...
19,220,174 UART:
19,220,338 UART: [state] CFI Enabled
19,227,906 UART: [fht] FMC Alias Private Key: 7
20,984,907 UART: [art] Extend RT PCRs Done
20,986,134 UART: [art] Lock RT PCRs Done
20,987,663 UART: [art] Populate DV Done
20,993,200 UART: [fht] FMC Alias Private Key: 7
20,994,749 UART: [art] Derive CDI
20,995,566 UART: [art] Store in in slot 0x4
21,037,929 UART: [art] Derive Key Pair
21,038,987 UART: [art] Store priv key in slot 0x5
23,465,792 UART: [art] Derive Key Pair - Done
23,478,575 UART: [art] Signing Cert with AUTHO
23,479,877 UART: RITY.KEYID = 7
25,184,870 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,380 UART: [art] PUB.X = 82F230AD993C51749937F59A30CD7D6DB56267C878A14430E8782D30CA3BD0B54D165B71669AAE6A65514B657F0814C8
25,193,585 UART: [art] PUB.Y = 852D66D6B335EC9971B0A71CC49B82FF00860D5DA2E40FF2BE02D348C650AD518F551D7E536619B2519C785AE961F8F8
25,200,845 UART: [art] SIG.R = 6BEBFD9E8677E0A9F342A56E9D37B87C3DDCE6FBB400FFE7F8AA47CA6DAA38B6E6F94B5AFA63710EEC777F6DA65F374E
25,208,249 UART: [art] SIG.S = 409B8BBE2F8D9B3ABB262095FC123DA8ADE3A8A11CFAF2C57CEF09C881A7D8072C10781ADD0A2556EF7F0453017050FF
26,187,298 UART: Caliptra RT
26,188,010 UART: [state] CFI Enabled
26,305,723 UART: [rt] RT listening for mailbox commands...
26,307,575 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,337,040 UART: [rt]cmd =0x46504c54, len=4
26,338,675 >>> mbox cmd response data (8 bytes)
26,339,879 UART: [rt] FIPS self test
26,340,840 UART: [kat] ++
26,341,290 UART: [kat] sha1
26,345,799 UART: [kat] SHA2-256
26,347,675 UART: [kat] SHA2-384
26,350,718 UART: [kat] SHA2-512-ACC
26,352,956 UART: [kat] ECC-384
28,776,762 UART: Fatal Error: 0x90040005
28,812,004 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,956,479 >>> mbox cmd response: failed
28,957,152 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,101,584 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
14,571,011 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,778,078 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,699 UART: [kat] SHA2-256
892,637 UART: [kat] SHA2-384
895,466 UART: [kat] SHA2-512-ACC
897,367 UART: [kat] ECC-384
902,636 UART: [kat] HMAC-384Kdf
907,200 UART: [kat] LMS
1,475,396 UART: [kat] --
1,476,257 UART: [cold-reset] ++
1,476,745 UART: [fht] Storing FHT @ 0x50003400
1,479,418 UART: [idev] ++
1,479,586 UART: [idev] CDI.KEYID = 6
1,479,946 UART: [idev] SUBJECT.KEYID = 7
1,480,370 UART: [idev] UDS.KEYID = 0
1,480,715 ready_for_fw is high
1,480,715 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,836 UART: [idev] Erasing UDS.KEYID = 0
1,505,284 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,908 UART: [idev] --
1,514,965 UART: [ldev] ++
1,515,133 UART: [ldev] CDI.KEYID = 6
1,515,496 UART: [ldev] SUBJECT.KEYID = 5
1,515,922 UART: [ldev] AUTHORITY.KEYID = 7
1,516,385 UART: [ldev] FE.KEYID = 1
1,521,625 UART: [ldev] Erasing FE.KEYID = 1
1,546,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,312 UART: [ldev] --
1,585,605 UART: [fwproc] Waiting for Commands...
1,586,298 UART: [fwproc] Received command 0x46574c44
1,587,089 UART: [fwproc] Received Image of size 115032 bytes
2,891,628 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,085,487 >>> mbox cmd response: success
3,086,681 UART: [afmc] ++
3,086,849 UART: [afmc] CDI.KEYID = 6
3,087,211 UART: [afmc] SUBJECT.KEYID = 7
3,087,636 UART: [afmc] AUTHORITY.KEYID = 5
3,122,613 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,737 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,517 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,245 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,130 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,156,820 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,647 UART: [afmc] --
3,165,699 UART: [cold-reset] --
3,166,359 UART: [state] Locking Datavault
3,167,746 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,350 UART: [state] Locking ICCM
3,168,946 UART: [exit] Launching FMC @ 0x40000130
3,174,275 UART:
3,174,291 UART: Running Caliptra FMC ...
3,174,699 UART:
3,174,753 UART: [state] CFI Enabled
3,185,482 UART: [fht] FMC Alias Private Key: 7
3,293,991 UART: [art] Extend RT PCRs Done
3,294,419 UART: [art] Lock RT PCRs Done
3,295,663 UART: [art] Populate DV Done
3,303,898 UART: [fht] FMC Alias Private Key: 7
3,304,914 UART: [art] Derive CDI
3,305,194 UART: [art] Store in in slot 0x4
3,390,629 UART: [art] Derive Key Pair
3,390,989 UART: [art] Store priv key in slot 0x5
3,403,801 UART: [art] Derive Key Pair - Done
3,418,624 UART: [art] Signing Cert with AUTHO
3,419,104 UART: RITY.KEYID = 7
3,434,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,881 UART: [art] PUB.X = 5FDD8844F87F553B513E687A0CE6F82D4A27CF96EA74669149CFCCD09EF5C7D36F0FD5A07240B8A89474518DB9C050A8
3,441,655 UART: [art] PUB.Y = 4E0B24DCAED09AE1CF78372CBC5AB1396605319DE7B2329E4B8B7BBE4E0813D496B9DF75B4B8F97897294F39F7C143BA
3,448,610 UART: [art] SIG.R = E9C1DB17F0E102C253FF34B8B0438D24B73803C4ED1AC9AA731187332538BCDC0898E8952910599CFFD332E16F1AB147
3,455,375 UART: [art] SIG.S = 968910E7C75AFC4B40268C2AAD6789946BD05133EED2D00CF4D95F95A4F55A5151B6F362CB35A85BEFD40C9748096A3C
3,479,219 UART: Caliptra RT
3,479,472 UART: [state] CFI Enabled
3,588,198 UART: [rt] RT listening for mailbox commands...
3,588,861 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,772 UART: [rt]cmd =0x46504c54, len=4
3,619,856 >>> mbox cmd response data (8 bytes)
3,620,007 UART: [rt] FIPS self test
3,620,335 UART: [kat] ++
3,620,487 UART: [kat] sha1
3,624,801 UART: [kat] SHA2-256
3,626,823 UART: [kat] SHA2-384
3,629,674 UART: [kat] SHA2-512-ACC
3,631,601 UART: [kat] ECC-384
3,640,284 UART: Fatal Error: 0x90040005
3,641,823 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,641,828 >>> mbox cmd response: failed
3,641,828 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,641,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,315 UART: [kat] SHA2-256
892,253 UART: [kat] SHA2-384
894,816 UART: [kat] SHA2-512-ACC
896,717 UART: [kat] ECC-384
902,576 UART: [kat] HMAC-384Kdf
907,110 UART: [kat] LMS
1,475,306 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,553 UART: [fht] Storing FHT @ 0x50003400
1,479,378 UART: [idev] ++
1,479,546 UART: [idev] CDI.KEYID = 6
1,479,906 UART: [idev] SUBJECT.KEYID = 7
1,480,330 UART: [idev] UDS.KEYID = 0
1,480,675 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,212 UART: [idev] Erasing UDS.KEYID = 0
1,505,048 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,796 UART: [idev] --
1,514,875 UART: [ldev] ++
1,515,043 UART: [ldev] CDI.KEYID = 6
1,515,406 UART: [ldev] SUBJECT.KEYID = 5
1,515,832 UART: [ldev] AUTHORITY.KEYID = 7
1,516,295 UART: [ldev] FE.KEYID = 1
1,521,477 UART: [ldev] Erasing FE.KEYID = 1
1,546,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,212 UART: [ldev] --
1,585,579 UART: [fwproc] Waiting for Commands...
1,586,372 UART: [fwproc] Received command 0x46574c44
1,587,163 UART: [fwproc] Received Image of size 115032 bytes
2,893,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,754 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,106 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,129 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,953 ready_for_fw is high
1,361,953 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,773 >>> mbox cmd response: success
2,997,357 UART:
2,997,373 UART: Running Caliptra FMC ...
2,997,781 UART:
2,997,835 UART: [state] CFI Enabled
3,007,828 UART: [fht] FMC Alias Private Key: 7
3,115,781 UART: [art] Extend RT PCRs Done
3,116,209 UART: [art] Lock RT PCRs Done
3,117,799 UART: [art] Populate DV Done
3,125,770 UART: [fht] FMC Alias Private Key: 7
3,126,848 UART: [art] Derive CDI
3,127,128 UART: [art] Store in in slot 0x4
3,212,655 UART: [art] Derive Key Pair
3,213,015 UART: [art] Store priv key in slot 0x5
3,226,375 UART: [art] Derive Key Pair - Done
3,241,114 UART: [art] Signing Cert with AUTHO
3,241,594 UART: RITY.KEYID = 7
3,256,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,557 UART: [art] PUB.X = 0A2BCDF2478A3D4B73DCC952862EF59BCB0B232A3B3F35D915D08A83620B8E424D356DB3FFE3C15180CD2EECABCC3816
3,264,338 UART: [art] PUB.Y = 10EE610B8C4FDADDC0BF7654D4B3B959A6717AFCEF78339DB1A16B0CDAB012FCC53250CCF51ECD5285D95A1082412161
3,271,300 UART: [art] SIG.R = 8F2B7A1984D4149DD0DB38BA56A5172746F3547291ECC7CB06E77F8A6A410ADE4B907F802386EF8FFDB7FE7A6040052E
3,278,071 UART: [art] SIG.S = 08C76370C2F1E7D7A871503525E179A22A86B3BFFD996F4363B6AFA5E2890A55DD00A9A7AC98DF52799C33B064FECCCD
3,301,748 UART: Caliptra RT
3,302,001 UART: [state] CFI Enabled
3,410,242 UART: [rt] RT listening for mailbox commands...
3,410,905 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,778 UART: [rt]cmd =0x46504c54, len=4
3,441,906 >>> mbox cmd response data (8 bytes)
3,442,235 UART: [rt] FIPS self test
3,442,563 UART: [kat] ++
3,442,715 UART: [kat] sha1
3,446,729 UART: [kat] SHA2-256
3,448,751 UART: [kat] SHA2-384
3,451,596 UART: [kat] SHA2-512-ACC
3,453,523 UART: [kat] ECC-384
3,462,750 UART: Fatal Error: 0x90040005
3,464,289 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,464,294 >>> mbox cmd response: failed
3,464,294 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,464,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,263 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,245 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,288 UART: [kat] SHA2-256
882,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,334 UART: [kat] ++
886,486 UART: [kat] sha1
890,620 UART: [kat] SHA2-256
892,558 UART: [kat] SHA2-384
895,157 UART: [kat] SHA2-512-ACC
897,058 UART: [kat] ECC-384
902,795 UART: [kat] HMAC-384Kdf
907,353 UART: [kat] LMS
1,475,549 UART: [kat] --
1,476,672 UART: [cold-reset] ++
1,477,158 UART: [fht] Storing FHT @ 0x50003400
1,479,991 UART: [idev] ++
1,480,159 UART: [idev] CDI.KEYID = 6
1,480,519 UART: [idev] SUBJECT.KEYID = 7
1,480,943 UART: [idev] UDS.KEYID = 0
1,481,288 ready_for_fw is high
1,481,288 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,561 UART: [idev] Erasing UDS.KEYID = 0
1,505,469 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,157 UART: [idev] --
1,515,360 UART: [ldev] ++
1,515,528 UART: [ldev] CDI.KEYID = 6
1,515,891 UART: [ldev] SUBJECT.KEYID = 5
1,516,317 UART: [ldev] AUTHORITY.KEYID = 7
1,516,780 UART: [ldev] FE.KEYID = 1
1,522,130 UART: [ldev] Erasing FE.KEYID = 1
1,547,421 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,301 UART: [ldev] --
1,586,704 UART: [fwproc] Waiting for Commands...
1,587,571 UART: [fwproc] Received command 0x46574c44
1,588,362 UART: [fwproc] Received Image of size 115032 bytes
2,894,021 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,509 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,861 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,648 >>> mbox cmd response: success
3,087,794 UART: [afmc] ++
3,087,962 UART: [afmc] CDI.KEYID = 6
3,088,324 UART: [afmc] SUBJECT.KEYID = 7
3,088,749 UART: [afmc] AUTHORITY.KEYID = 5
3,123,850 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,026 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,806 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,534 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,419 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,109 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,928 UART: [afmc] --
3,166,872 UART: [cold-reset] --
3,167,754 UART: [state] Locking Datavault
3,168,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,227 UART: [state] Locking ICCM
3,169,687 UART: [exit] Launching FMC @ 0x40000130
3,175,016 UART:
3,175,032 UART: Running Caliptra FMC ...
3,175,440 UART:
3,175,583 UART: [state] CFI Enabled
3,185,954 UART: [fht] FMC Alias Private Key: 7
3,294,619 UART: [art] Extend RT PCRs Done
3,295,047 UART: [art] Lock RT PCRs Done
3,296,879 UART: [art] Populate DV Done
3,305,228 UART: [fht] FMC Alias Private Key: 7
3,306,264 UART: [art] Derive CDI
3,306,544 UART: [art] Store in in slot 0x4
3,392,251 UART: [art] Derive Key Pair
3,392,611 UART: [art] Store priv key in slot 0x5
3,405,323 UART: [art] Derive Key Pair - Done
3,420,432 UART: [art] Signing Cert with AUTHO
3,420,912 UART: RITY.KEYID = 7
3,436,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,945 UART: [art] PUB.X = 5B062420E7C170ADE76E9B59CF0C0B3B43F8F2FE9D93E9E6FE47FE216CADD280C7BEFE982DB4065F51C46A9473C973D6
3,443,721 UART: [art] PUB.Y = 72665DAFD14E36D1E4D4E8CB9B47AA6A72E21C60D84B969B7466D46EFD916C72C29527FB1F108DDD99744E9B7101778E
3,450,676 UART: [art] SIG.R = 3AF3CBCB690FA0900086780A0053B14CEBA3E296F1E501BDA14C63CC8407DD3BEEA595229BF31988B1C640185F52660E
3,457,395 UART: [art] SIG.S = 9460CD56F3E786319B34B5C4264F2A9C79F827EC9E0AF6D6A5FBB1CEFC9566424DE854531B8F5A563BF182C04BA19602
3,480,786 UART: Caliptra RT
3,481,131 UART: [state] CFI Enabled
3,590,382 UART: [rt] RT listening for mailbox commands...
3,591,045 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,770 UART: [rt]cmd =0x46504c54, len=4
3,621,930 >>> mbox cmd response data (8 bytes)
3,622,297 UART: [rt] FIPS self test
3,622,625 UART: [kat] ++
3,622,777 UART: [kat] sha1
3,627,133 UART: [kat] SHA2-256
3,629,155 UART: [kat] SHA2-384
3,632,026 UART: [kat] SHA2-512-ACC
3,633,953 UART: [kat] ECC-384
3,642,884 UART: Fatal Error: 0x90040005
3,644,423 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,644,428 >>> mbox cmd response: failed
3,644,428 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,644,433 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
903,097 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,476,824 UART: [cold-reset] ++
1,477,286 UART: [fht] Storing FHT @ 0x50003400
1,480,087 UART: [idev] ++
1,480,255 UART: [idev] CDI.KEYID = 6
1,480,615 UART: [idev] SUBJECT.KEYID = 7
1,481,039 UART: [idev] UDS.KEYID = 0
1,481,384 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,987 UART: [idev] Erasing UDS.KEYID = 0
1,505,933 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,347 UART: [idev] --
1,515,272 UART: [ldev] ++
1,515,440 UART: [ldev] CDI.KEYID = 6
1,515,803 UART: [ldev] SUBJECT.KEYID = 5
1,516,229 UART: [ldev] AUTHORITY.KEYID = 7
1,516,692 UART: [ldev] FE.KEYID = 1
1,521,884 UART: [ldev] Erasing FE.KEYID = 1
1,547,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,797 UART: [ldev] --
1,587,116 UART: [fwproc] Waiting for Commands...
1,587,785 UART: [fwproc] Received command 0x46574c44
1,588,576 UART: [fwproc] Received Image of size 115032 bytes
2,892,585 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,833 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,185 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,085,972 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,690 ready_for_fw is high
1,362,690 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,490 >>> mbox cmd response: success
3,000,180 UART:
3,000,196 UART: Running Caliptra FMC ...
3,000,604 UART:
3,000,747 UART: [state] CFI Enabled
3,011,762 UART: [fht] FMC Alias Private Key: 7
3,119,821 UART: [art] Extend RT PCRs Done
3,120,249 UART: [art] Lock RT PCRs Done
3,121,873 UART: [art] Populate DV Done
3,130,028 UART: [fht] FMC Alias Private Key: 7
3,130,966 UART: [art] Derive CDI
3,131,246 UART: [art] Store in in slot 0x4
3,216,799 UART: [art] Derive Key Pair
3,217,159 UART: [art] Store priv key in slot 0x5
3,230,231 UART: [art] Derive Key Pair - Done
3,245,238 UART: [art] Signing Cert with AUTHO
3,245,718 UART: RITY.KEYID = 7
3,261,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,847 UART: [art] PUB.X = AB9B455D12C50E0B8D177FEE6B3A03331BD00F37E62393D7F2726B8C94C99124DAF7C969DD64CA79AF3C8612CE92F1A3
3,268,617 UART: [art] PUB.Y = 2A777342F05E08B6948AEEF868ABB74F5B3060C44FCF8FF6E2E4AE3D2D50EA02E61D424BB59BE19207B7A80B427BFD20
3,275,571 UART: [art] SIG.R = 988A3E9F8C219B4332F0B2282EC8191E402D6268872F41B548E9EA3527211E18C50F0D6AD36E361A65E8ABD8D5D0263E
3,282,335 UART: [art] SIG.S = BCFC5007168AD2556F3CC9098BAB9FBA6C2A1C77C2F5F75DD2E2C766B4299BDDBD03E3502BC4E064E5B4132F70D2E809
3,306,042 UART: Caliptra RT
3,306,387 UART: [state] CFI Enabled
3,414,837 UART: [rt] RT listening for mailbox commands...
3,415,500 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,383 UART: [rt]cmd =0x46504c54, len=4
3,446,367 >>> mbox cmd response data (8 bytes)
3,446,684 UART: [rt] FIPS self test
3,447,012 UART: [kat] ++
3,447,164 UART: [kat] sha1
3,451,524 UART: [kat] SHA2-256
3,453,546 UART: [kat] SHA2-384
3,456,343 UART: [kat] SHA2-512-ACC
3,458,270 UART: [kat] ECC-384
3,467,029 UART: Fatal Error: 0x90040005
3,468,568 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,468,573 >>> mbox cmd response: failed
3,468,573 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,468,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,816 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,968 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,534 UART: [kat] SHA2-256
893,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,309 UART: [kat] ++
897,461 UART: [kat] sha1
901,895 UART: [kat] SHA2-256
903,835 UART: [kat] SHA2-384
906,676 UART: [kat] SHA2-512-ACC
908,577 UART: [kat] ECC-384
918,452 UART: [kat] HMAC-384Kdf
923,134 UART: [kat] LMS
1,171,462 UART: [kat] --
1,172,223 UART: [cold-reset] ++
1,172,589 UART: [fht] FHT @ 0x50003400
1,175,188 UART: [idev] ++
1,175,356 UART: [idev] CDI.KEYID = 6
1,175,716 UART: [idev] SUBJECT.KEYID = 7
1,176,140 UART: [idev] UDS.KEYID = 0
1,176,485 ready_for_fw is high
1,176,485 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,168 UART: [idev] Erasing UDS.KEYID = 0
1,200,843 UART: [idev] Sha1 KeyId Algorithm
1,209,425 UART: [idev] --
1,210,505 UART: [ldev] ++
1,210,673 UART: [ldev] CDI.KEYID = 6
1,211,036 UART: [ldev] SUBJECT.KEYID = 5
1,211,462 UART: [ldev] AUTHORITY.KEYID = 7
1,211,925 UART: [ldev] FE.KEYID = 1
1,217,057 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,281,862 UART: [fwproc] Wait for Commands...
1,282,506 UART: [fwproc] Recv command 0x46574c44
1,283,234 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,595 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,464 >>> mbox cmd response: success
2,782,616 UART: [afmc] ++
2,782,784 UART: [afmc] CDI.KEYID = 6
2,783,146 UART: [afmc] SUBJECT.KEYID = 7
2,783,571 UART: [afmc] AUTHORITY.KEYID = 5
2,818,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,981 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,594 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,313 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,099 UART: [afmc] --
2,862,129 UART: [cold-reset] --
2,863,007 UART: [state] Locking Datavault
2,864,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,898 UART: [state] Locking ICCM
2,865,432 UART: [exit] Launching FMC @ 0x40000130
2,870,761 UART:
2,870,777 UART: Running Caliptra FMC ...
2,871,185 UART:
2,871,239 UART: [state] CFI Enabled
2,881,654 UART: [fht] FMC Alias Private Key: 7
2,989,811 UART: [art] Extend RT PCRs Done
2,990,239 UART: [art] Lock RT PCRs Done
2,991,521 UART: [art] Populate DV Done
2,999,758 UART: [fht] FMC Alias Private Key: 7
3,000,700 UART: [art] Derive CDI
3,000,980 UART: [art] Store in in slot 0x4
3,086,621 UART: [art] Derive Key Pair
3,086,981 UART: [art] Store priv key in slot 0x5
3,099,971 UART: [art] Derive Key Pair - Done
3,114,655 UART: [art] Signing Cert with AUTHO
3,115,135 UART: RITY.KEYID = 7
3,130,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,266 UART: [art] PUB.X = B1374AB3F6B3B0742EF4D4869B20584DAD8ED40F3CE472D1D19594B8A55B732EAD51651C8A53D0370C28BAE9AA27124A
3,138,040 UART: [art] PUB.Y = 9F18B67FE235621E17BA5016DEB1CF59E390D129E15EC74CE78B8AB9223B0A00FE09741FF9B4364B4CC901FC14240C34
3,144,964 UART: [art] SIG.R = CE7DADC10B1F01EB662D209485087F3540D68BF0E599E147747498E98E7643452C725560807C98D2733ED41D52CBBA87
3,151,721 UART: [art] SIG.S = 084D483E46B7B8D7F56141F4A11092E398A0090C08777334A90B368E1FBDF0473305C069A766448ECDD7F53EC292FCA4
3,176,130 UART: Caliptra RT
3,176,383 UART: [state] CFI Enabled
3,284,140 UART: [rt] RT listening for mailbox commands...
3,284,803 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,574 UART: [rt]cmd =0x46504c54, len=4
3,315,524 >>> mbox cmd response data (8 bytes)
3,315,741 UART: [rt] FIPS self test
3,316,069 UART: [kat] ++
3,316,221 UART: [kat] sha1
3,320,335 UART: [kat] SHA2-256
3,322,357 UART: [kat] SHA2-384
3,325,266 UART: [kat] SHA2-512-ACC
3,327,193 UART: [kat] ECC-384
3,335,856 UART: Fatal Error: 0x90040005
3,337,395 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,400 >>> mbox cmd response: failed
3,337,400 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
893,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,727 UART: [kat] ++
897,879 UART: [kat] sha1
902,223 UART: [kat] SHA2-256
904,163 UART: [kat] SHA2-384
906,880 UART: [kat] SHA2-512-ACC
908,781 UART: [kat] ECC-384
918,358 UART: [kat] HMAC-384Kdf
922,782 UART: [kat] LMS
1,171,110 UART: [kat] --
1,171,907 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,138 UART: [idev] ++
1,175,306 UART: [idev] CDI.KEYID = 6
1,175,666 UART: [idev] SUBJECT.KEYID = 7
1,176,090 UART: [idev] UDS.KEYID = 0
1,176,435 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,930 UART: [idev] Erasing UDS.KEYID = 0
1,201,353 UART: [idev] Sha1 KeyId Algorithm
1,209,741 UART: [idev] --
1,210,825 UART: [ldev] ++
1,210,993 UART: [ldev] CDI.KEYID = 6
1,211,356 UART: [ldev] SUBJECT.KEYID = 5
1,211,782 UART: [ldev] AUTHORITY.KEYID = 7
1,212,245 UART: [ldev] FE.KEYID = 1
1,217,349 UART: [ldev] Erasing FE.KEYID = 1
1,243,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,573 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,710 UART: [fwproc] Recv command 0x46574c44
1,284,438 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,737 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,041 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,014 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 ready_for_fw is high
1,060,105 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,671 >>> mbox cmd response: success
2,696,923 UART:
2,696,939 UART: Running Caliptra FMC ...
2,697,347 UART:
2,697,401 UART: [state] CFI Enabled
2,707,886 UART: [fht] FMC Alias Private Key: 7
2,816,121 UART: [art] Extend RT PCRs Done
2,816,549 UART: [art] Lock RT PCRs Done
2,817,895 UART: [art] Populate DV Done
2,826,346 UART: [fht] FMC Alias Private Key: 7
2,827,522 UART: [art] Derive CDI
2,827,802 UART: [art] Store in in slot 0x4
2,914,007 UART: [art] Derive Key Pair
2,914,367 UART: [art] Store priv key in slot 0x5
2,927,161 UART: [art] Derive Key Pair - Done
2,942,050 UART: [art] Signing Cert with AUTHO
2,942,530 UART: RITY.KEYID = 7
2,957,358 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,123 UART: [art] PUB.X = 6351B323DCBCA001F9B013FDECE83DA69E3379DECC2F8C6E46724C61154ACB38BFB32173EB6551B9458E4A8F56C68C83
2,964,904 UART: [art] PUB.Y = 94A72EB78E733A637ADE9254206BD1671CA49B87312A142AFA5D4B9BE86AFBDAAFD724C58AC18D2B4F48DD3984509DE2
2,971,870 UART: [art] SIG.R = 06111FFEEF57A72882BE0F35E12CB38CDCC6EAA880BDC357306598EB0C5C6F3A05074BB2DD6E730FF1B0B791C4B7481D
2,978,640 UART: [art] SIG.S = CA5942CBA719BAFE9C644E0556EF410F0B7D9E88BA6AA959F67B51D69738265DBF60F60821DCF98EFD485BCD88BAFE4D
3,002,909 UART: Caliptra RT
3,003,162 UART: [state] CFI Enabled
3,110,083 UART: [rt] RT listening for mailbox commands...
3,110,746 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,647 UART: [rt]cmd =0x46504c54, len=4
3,142,037 >>> mbox cmd response data (8 bytes)
3,142,306 UART: [rt] FIPS self test
3,142,634 UART: [kat] ++
3,142,786 UART: [kat] sha1
3,146,878 UART: [kat] SHA2-256
3,148,900 UART: [kat] SHA2-384
3,151,775 UART: [kat] SHA2-512-ACC
3,153,702 UART: [kat] ECC-384
3,162,791 UART: Fatal Error: 0x90040005
3,164,330 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,164,335 >>> mbox cmd response: failed
3,164,335 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,164,340 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,463 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,750 UART: [kat] SHA2-256
904,690 UART: [kat] SHA2-384
907,327 UART: [kat] SHA2-512-ACC
909,228 UART: [kat] ECC-384
918,663 UART: [kat] HMAC-384Kdf
923,281 UART: [kat] LMS
1,171,609 UART: [kat] --
1,172,496 UART: [cold-reset] ++
1,172,994 UART: [fht] FHT @ 0x50003400
1,175,821 UART: [idev] ++
1,175,989 UART: [idev] CDI.KEYID = 6
1,176,349 UART: [idev] SUBJECT.KEYID = 7
1,176,773 UART: [idev] UDS.KEYID = 0
1,177,118 ready_for_fw is high
1,177,118 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,647 UART: [idev] Erasing UDS.KEYID = 0
1,201,956 UART: [idev] Sha1 KeyId Algorithm
1,210,400 UART: [idev] --
1,211,364 UART: [ldev] ++
1,211,532 UART: [ldev] CDI.KEYID = 6
1,211,895 UART: [ldev] SUBJECT.KEYID = 5
1,212,321 UART: [ldev] AUTHORITY.KEYID = 7
1,212,784 UART: [ldev] FE.KEYID = 1
1,218,154 UART: [ldev] Erasing FE.KEYID = 1
1,244,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,916 UART: [ldev] --
1,284,369 UART: [fwproc] Wait for Commands...
1,285,193 UART: [fwproc] Recv command 0x46574c44
1,285,921 UART: [fwproc] Recv'd Img size: 115032 bytes
2,592,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,254 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,558 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,785,413 >>> mbox cmd response: success
2,786,515 UART: [afmc] ++
2,786,683 UART: [afmc] CDI.KEYID = 6
2,787,045 UART: [afmc] SUBJECT.KEYID = 7
2,787,470 UART: [afmc] AUTHORITY.KEYID = 5
2,822,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,902 UART: [afmc] --
2,866,030 UART: [cold-reset] --
2,866,636 UART: [state] Locking Datavault
2,867,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,329 UART: [state] Locking ICCM
2,868,965 UART: [exit] Launching FMC @ 0x40000130
2,874,294 UART:
2,874,310 UART: Running Caliptra FMC ...
2,874,718 UART:
2,874,861 UART: [state] CFI Enabled
2,885,434 UART: [fht] FMC Alias Private Key: 7
2,993,243 UART: [art] Extend RT PCRs Done
2,993,671 UART: [art] Lock RT PCRs Done
2,995,263 UART: [art] Populate DV Done
3,003,682 UART: [fht] FMC Alias Private Key: 7
3,004,710 UART: [art] Derive CDI
3,004,990 UART: [art] Store in in slot 0x4
3,090,647 UART: [art] Derive Key Pair
3,091,007 UART: [art] Store priv key in slot 0x5
3,104,079 UART: [art] Derive Key Pair - Done
3,118,957 UART: [art] Signing Cert with AUTHO
3,119,437 UART: RITY.KEYID = 7
3,135,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,784 UART: [art] PUB.X = 0E9EC3CB470AC02256B80BADD94ADA1782F3CFF3358C47186FFE1259319BE284B92A452A911BA207FC8174F47BD7B384
3,142,552 UART: [art] PUB.Y = 031C5DB8BF668AECF0850E5DA287E3E28BD4CC506FD3E7F90C489D989D57E745B0C5068776004B78C6BE74F5F913C2C8
3,149,478 UART: [art] SIG.R = CD09B8D987E87966B5E26476658224ABC75D836A28E5A54D63285EFACF4AB1505F4B83C94C10F073F873E478A7E6BADB
3,156,253 UART: [art] SIG.S = 672D1E224D1EBE747569727375F1FB8CDC6C5D5AE4A5000390503E804D7C97B598FD38EA0D50D8571482EAC07A46B218
3,180,618 UART: Caliptra RT
3,180,963 UART: [state] CFI Enabled
3,289,148 UART: [rt] RT listening for mailbox commands...
3,289,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,700 UART: [rt]cmd =0x46504c54, len=4
3,320,922 >>> mbox cmd response data (8 bytes)
3,321,267 UART: [rt] FIPS self test
3,321,595 UART: [kat] ++
3,321,747 UART: [kat] sha1
3,325,931 UART: [kat] SHA2-256
3,327,953 UART: [kat] SHA2-384
3,330,770 UART: [kat] SHA2-512-ACC
3,332,697 UART: [kat] ECC-384
3,341,872 UART: Fatal Error: 0x90040005
3,343,411 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,416 >>> mbox cmd response: failed
3,343,416 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,421 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
893,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,960 UART: [kat] ++
898,112 UART: [kat] sha1
902,330 UART: [kat] SHA2-256
904,270 UART: [kat] SHA2-384
906,985 UART: [kat] SHA2-512-ACC
908,886 UART: [kat] ECC-384
919,041 UART: [kat] HMAC-384Kdf
923,665 UART: [kat] LMS
1,171,993 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,260 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,885 UART: [idev] Erasing UDS.KEYID = 0
1,201,856 UART: [idev] Sha1 KeyId Algorithm
1,210,226 UART: [idev] --
1,211,462 UART: [ldev] ++
1,211,630 UART: [ldev] CDI.KEYID = 6
1,211,993 UART: [ldev] SUBJECT.KEYID = 5
1,212,419 UART: [ldev] AUTHORITY.KEYID = 7
1,212,882 UART: [ldev] FE.KEYID = 1
1,218,090 UART: [ldev] Erasing FE.KEYID = 1
1,244,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,370 UART: [ldev] --
1,283,645 UART: [fwproc] Wait for Commands...
1,284,343 UART: [fwproc] Recv command 0x46574c44
1,285,071 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,312 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,616 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,415 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,946 ready_for_fw is high
1,060,946 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,100 >>> mbox cmd response: success
2,696,494 UART:
2,696,510 UART: Running Caliptra FMC ...
2,696,918 UART:
2,697,061 UART: [state] CFI Enabled
2,707,792 UART: [fht] FMC Alias Private Key: 7
2,816,403 UART: [art] Extend RT PCRs Done
2,816,831 UART: [art] Lock RT PCRs Done
2,818,275 UART: [art] Populate DV Done
2,826,634 UART: [fht] FMC Alias Private Key: 7
2,827,686 UART: [art] Derive CDI
2,827,966 UART: [art] Store in in slot 0x4
2,913,985 UART: [art] Derive Key Pair
2,914,345 UART: [art] Store priv key in slot 0x5
2,927,685 UART: [art] Derive Key Pair - Done
2,942,522 UART: [art] Signing Cert with AUTHO
2,943,002 UART: RITY.KEYID = 7
2,958,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,283 UART: [art] PUB.X = CE4753D6662157176B82599987A7BD943D96B12DD73A13C309EA7D7652724F5F260241936E4D39BABED296F248C6DD6C
2,966,045 UART: [art] PUB.Y = 46C2EC2DE1AF94C6D6FF440FD66B6ED6E2F24298C9198DD9AE77FEC0AA8A6BBB6FBB098BF69555B317CE85907C9A6D1F
2,973,015 UART: [art] SIG.R = 201A255CF2629C51E834FC122A2480AF71CE2F9720C3AA058EC96E5B8BAFABB560292F9B83DE97149E6AE98226B4660C
2,979,787 UART: [art] SIG.S = 8169D18E74425EFFE9A299C2D7FCD99776811B2FA37532595BAE843FCBCCC0A19E62D87547F549ECE20E63045F837A83
3,003,812 UART: Caliptra RT
3,004,157 UART: [state] CFI Enabled
3,112,338 UART: [rt] RT listening for mailbox commands...
3,113,001 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,874 UART: [rt]cmd =0x46504c54, len=4
3,144,116 >>> mbox cmd response data (8 bytes)
3,144,377 UART: [rt] FIPS self test
3,144,705 UART: [kat] ++
3,144,857 UART: [kat] sha1
3,149,177 UART: [kat] SHA2-256
3,151,199 UART: [kat] SHA2-384
3,154,048 UART: [kat] SHA2-512-ACC
3,155,975 UART: [kat] ECC-384
3,164,874 UART: Fatal Error: 0x90040005
3,166,413 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,166,418 >>> mbox cmd response: failed
3,166,418 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,166,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,852 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,918 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,131 UART: [kat] ++
895,283 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,384 UART: [kat] SHA2-512-ACC
906,285 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,174,265 ready_for_fw is high
1,174,265 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,001 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,209,054 UART: [ldev] ++
1,209,222 UART: [ldev] CDI.KEYID = 6
1,209,586 UART: [ldev] SUBJECT.KEYID = 5
1,210,013 UART: [ldev] AUTHORITY.KEYID = 7
1,210,476 UART: [ldev] FE.KEYID = 1
1,215,776 UART: [ldev] Erasing FE.KEYID = 1
1,242,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,366 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,487 UART: [fwproc] Recv command 0x46574c44
1,283,220 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,861 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,170 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,084 >>> mbox cmd response: success
2,783,135 UART: [afmc] ++
2,783,303 UART: [afmc] CDI.KEYID = 6
2,783,666 UART: [afmc] SUBJECT.KEYID = 7
2,784,092 UART: [afmc] AUTHORITY.KEYID = 5
2,819,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,554 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,283 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,166 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,885 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,684 UART: [afmc] --
2,862,766 UART: [cold-reset] --
2,863,520 UART: [state] Locking Datavault
2,864,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,093 UART: [state] Locking ICCM
2,865,611 UART: [exit] Launching FMC @ 0x40000130
2,870,940 UART:
2,870,956 UART: Running Caliptra FMC ...
2,871,364 UART:
2,871,418 UART: [state] CFI Enabled
2,881,865 UART: [fht] FMC Alias Private Key: 7
2,989,630 UART: [art] Extend RT PCRs Done
2,990,058 UART: [art] Lock RT PCRs Done
2,991,818 UART: [art] Populate DV Done
3,000,033 UART: [fht] FMC Alias Private Key: 7
3,001,129 UART: [art] Derive CDI
3,001,409 UART: [art] Store in in slot 0x4
3,087,454 UART: [art] Derive Key Pair
3,087,814 UART: [art] Store priv key in slot 0x5
3,100,666 UART: [art] Derive Key Pair - Done
3,115,453 UART: [art] Signing Cert with AUTHO
3,115,933 UART: RITY.KEYID = 7
3,130,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,598 UART: [art] PUB.X = 4E07CEA9FD1A3011B013E7D4631638F31602EB05F8CC84F5D0D4B1351C15CBAB14E330EACB33B4E3DD2D96FD32ABD6AF
3,138,381 UART: [art] PUB.Y = E7609BC08668F07033BB31628126B18BBBBC2189877F403B16651EE414FB98502E4DFA0398CFD0EA0BBADB8F33486B7E
3,145,333 UART: [art] SIG.R = 8970CEDF7F9C3841A3589C6F64567D0E4A731C4561CB7D3A66BF8CC40D5EB05A157DD5767CD3F633B06CD077D15DF6D9
3,152,109 UART: [art] SIG.S = C281A4BF96DC1B2F47610F5D3363876564C2FAA15280DA1B6EE6BECEBC7A28BDACF0EA4C00F56265B8A2E34DC34DE046
3,175,693 UART: Caliptra RT
3,175,946 UART: [state] CFI Enabled
3,283,854 UART: [rt] RT listening for mailbox commands...
3,284,517 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,292 UART: [rt]cmd =0x46504c54, len=4
3,315,596 >>> mbox cmd response data (8 bytes)
3,315,769 UART: [rt] FIPS self test
3,316,097 UART: [kat] ++
3,316,249 UART: [kat] sha1
3,320,491 UART: [kat] SHA2-256
3,322,513 UART: [kat] SHA2-384
3,325,412 UART: [kat] SHA2-512-ACC
3,327,339 UART: [kat] ECC-384
3,335,912 UART: Fatal Error: 0x90040005
3,337,451 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,456 >>> mbox cmd response: failed
3,337,456 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,979 UART: [kat] ++
895,131 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
915,794 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,685 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,172,939 UART: [idev] ++
1,173,107 UART: [idev] CDI.KEYID = 6
1,173,468 UART: [idev] SUBJECT.KEYID = 7
1,173,893 UART: [idev] UDS.KEYID = 0
1,174,239 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,199,703 UART: [idev] Sha1 KeyId Algorithm
1,208,693 UART: [idev] --
1,209,568 UART: [ldev] ++
1,209,736 UART: [ldev] CDI.KEYID = 6
1,210,100 UART: [ldev] SUBJECT.KEYID = 5
1,210,527 UART: [ldev] AUTHORITY.KEYID = 7
1,210,990 UART: [ldev] FE.KEYID = 1
1,216,272 UART: [ldev] Erasing FE.KEYID = 1
1,242,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,414 UART: [ldev] --
1,281,798 UART: [fwproc] Wait for Commands...
1,282,619 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,103 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,412 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,358 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,114 ready_for_fw is high
1,056,114 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,940 >>> mbox cmd response: success
2,694,248 UART:
2,694,264 UART: Running Caliptra FMC ...
2,694,672 UART:
2,694,726 UART: [state] CFI Enabled
2,705,169 UART: [fht] FMC Alias Private Key: 7
2,813,450 UART: [art] Extend RT PCRs Done
2,813,878 UART: [art] Lock RT PCRs Done
2,815,380 UART: [art] Populate DV Done
2,823,595 UART: [fht] FMC Alias Private Key: 7
2,824,541 UART: [art] Derive CDI
2,824,821 UART: [art] Store in in slot 0x4
2,910,636 UART: [art] Derive Key Pair
2,910,996 UART: [art] Store priv key in slot 0x5
2,924,106 UART: [art] Derive Key Pair - Done
2,939,150 UART: [art] Signing Cert with AUTHO
2,939,630 UART: RITY.KEYID = 7
2,954,630 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,395 UART: [art] PUB.X = C42C8666D2C273CCD1198820083EF9F036430CB832C0AB4BFCD3373A50CFB893A876B24F6E1A629D0D0F3420311B8F4D
2,962,159 UART: [art] PUB.Y = B3F334468B2322257C19E6BAD663C8A68252FAE442269252FB5B0207D68E59E512101F416CB19483E9E4AFE0D2F4C115
2,969,101 UART: [art] SIG.R = 41973A0F57874B0986A36079D414205553F06EC85762C465AF33F31211377B1AC1A6583CACFEA705E7392877CF5E0F17
2,975,851 UART: [art] SIG.S = 99062FFE7DFA128AFAB383A2FF76D7CC7E0F51422D0AF246F694CAEE0A1AC7BCD05DA8AE35982A028D56B1A44525F0B8
2,999,663 UART: Caliptra RT
2,999,916 UART: [state] CFI Enabled
3,107,393 UART: [rt] RT listening for mailbox commands...
3,108,056 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,833 UART: [rt]cmd =0x46504c54, len=4
3,138,825 >>> mbox cmd response data (8 bytes)
3,139,176 UART: [rt] FIPS self test
3,139,504 UART: [kat] ++
3,139,656 UART: [kat] sha1
3,143,854 UART: [kat] SHA2-256
3,145,876 UART: [kat] SHA2-384
3,148,623 UART: [kat] SHA2-512-ACC
3,150,550 UART: [kat] ECC-384
3,159,897 UART: Fatal Error: 0x90040005
3,161,436 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,161,441 >>> mbox cmd response: failed
3,161,441 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,161,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,914 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,012 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,636 UART: [kat] ++
895,788 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,781 UART: [kat] LMS
1,169,093 UART: [kat] --
1,169,942 UART: [cold-reset] ++
1,170,408 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,198,526 UART: [idev] Sha1 KeyId Algorithm
1,207,332 UART: [idev] --
1,208,535 UART: [ldev] ++
1,208,703 UART: [ldev] CDI.KEYID = 6
1,209,067 UART: [ldev] SUBJECT.KEYID = 5
1,209,494 UART: [ldev] AUTHORITY.KEYID = 7
1,209,957 UART: [ldev] FE.KEYID = 1
1,215,265 UART: [ldev] Erasing FE.KEYID = 1
1,241,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,153 UART: [fwproc] Wait for Commands...
1,281,764 UART: [fwproc] Recv command 0x46574c44
1,282,497 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,392 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,701 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,535 >>> mbox cmd response: success
2,781,686 UART: [afmc] ++
2,781,854 UART: [afmc] CDI.KEYID = 6
2,782,217 UART: [afmc] SUBJECT.KEYID = 7
2,782,643 UART: [afmc] AUTHORITY.KEYID = 5
2,818,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,243 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,972 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,855 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,574 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,387 UART: [afmc] --
2,861,283 UART: [cold-reset] --
2,862,021 UART: [state] Locking Datavault
2,863,022 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,626 UART: [state] Locking ICCM
2,864,276 UART: [exit] Launching FMC @ 0x40000130
2,869,605 UART:
2,869,621 UART: Running Caliptra FMC ...
2,870,029 UART:
2,870,172 UART: [state] CFI Enabled
2,880,721 UART: [fht] FMC Alias Private Key: 7
2,988,678 UART: [art] Extend RT PCRs Done
2,989,106 UART: [art] Lock RT PCRs Done
2,990,690 UART: [art] Populate DV Done
2,998,945 UART: [fht] FMC Alias Private Key: 7
3,000,003 UART: [art] Derive CDI
3,000,283 UART: [art] Store in in slot 0x4
3,085,874 UART: [art] Derive Key Pair
3,086,234 UART: [art] Store priv key in slot 0x5
3,099,914 UART: [art] Derive Key Pair - Done
3,114,527 UART: [art] Signing Cert with AUTHO
3,115,007 UART: RITY.KEYID = 7
3,130,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,878 UART: [art] PUB.X = 8BEF5148B0E489DEA495E2C9018D4479A3B7F30F8226ED4D473B360E69CCE3457D1142EDDF64B130A88A07542D55CEB6
3,137,644 UART: [art] PUB.Y = AF9C9CC4796547A469323886763C38524B8FB0E3D96ACBC97BD4A0D746ADDC86A0D54E02EADE7EF412D3316D0437160B
3,144,595 UART: [art] SIG.R = E7E3FDA9B5ECA90C1FD8A51C3515D51996C48761C522B57BC6AFACCBF57FE5E8173006B8BD71282B0848CB0A1EDEE775
3,151,373 UART: [art] SIG.S = 9054DFDD48BB2A33A82EC4219E3B1FF682C137BE3721727CF9B654929475F25FC312DACD53F4E68FB1C970EDF593613D
3,175,214 UART: Caliptra RT
3,175,559 UART: [state] CFI Enabled
3,283,611 UART: [rt] RT listening for mailbox commands...
3,284,274 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,011 UART: [rt]cmd =0x46504c54, len=4
3,315,301 >>> mbox cmd response data (8 bytes)
3,315,650 UART: [rt] FIPS self test
3,315,978 UART: [kat] ++
3,316,130 UART: [kat] sha1
3,320,276 UART: [kat] SHA2-256
3,322,298 UART: [kat] SHA2-384
3,325,179 UART: [kat] SHA2-512-ACC
3,327,106 UART: [kat] ECC-384
3,336,361 UART: Fatal Error: 0x90040005
3,337,900 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,905 >>> mbox cmd response: failed
3,337,905 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,963 UART: [state] LifecycleState = Unprovisioned
85,618 UART: [state] DebugLocked = No
86,202 UART: [state] WD Timer not started. Device not locked for debugging
87,329 UART: [kat] SHA2-256
890,879 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,008 UART: [kat] ++
895,160 UART: [kat] sha1
899,380 UART: [kat] SHA2-256
901,320 UART: [kat] SHA2-384
903,923 UART: [kat] SHA2-512-ACC
905,824 UART: [kat] ECC-384
915,489 UART: [kat] HMAC-384Kdf
920,045 UART: [kat] LMS
1,168,357 UART: [kat] --
1,169,244 UART: [cold-reset] ++
1,169,772 UART: [fht] FHT @ 0x50003400
1,172,442 UART: [idev] ++
1,172,610 UART: [idev] CDI.KEYID = 6
1,172,971 UART: [idev] SUBJECT.KEYID = 7
1,173,396 UART: [idev] UDS.KEYID = 0
1,173,742 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,310 UART: [idev] Erasing UDS.KEYID = 0
1,197,780 UART: [idev] Sha1 KeyId Algorithm
1,206,712 UART: [idev] --
1,207,765 UART: [ldev] ++
1,207,933 UART: [ldev] CDI.KEYID = 6
1,208,297 UART: [ldev] SUBJECT.KEYID = 5
1,208,724 UART: [ldev] AUTHORITY.KEYID = 7
1,209,187 UART: [ldev] FE.KEYID = 1
1,214,233 UART: [ldev] Erasing FE.KEYID = 1
1,240,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,667 UART: [ldev] --
1,280,041 UART: [fwproc] Wait for Commands...
1,280,844 UART: [fwproc] Recv command 0x46574c44
1,281,577 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,800 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,109 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,778,867 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,431 ready_for_fw is high
1,056,431 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,809 >>> mbox cmd response: success
2,694,459 UART:
2,694,475 UART: Running Caliptra FMC ...
2,694,883 UART:
2,695,026 UART: [state] CFI Enabled
2,705,643 UART: [fht] FMC Alias Private Key: 7
2,813,768 UART: [art] Extend RT PCRs Done
2,814,196 UART: [art] Lock RT PCRs Done
2,815,576 UART: [art] Populate DV Done
2,823,723 UART: [fht] FMC Alias Private Key: 7
2,824,681 UART: [art] Derive CDI
2,824,961 UART: [art] Store in in slot 0x4
2,910,812 UART: [art] Derive Key Pair
2,911,172 UART: [art] Store priv key in slot 0x5
2,924,386 UART: [art] Derive Key Pair - Done
2,938,961 UART: [art] Signing Cert with AUTHO
2,939,441 UART: RITY.KEYID = 7
2,954,325 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,090 UART: [art] PUB.X = 599C3882D90CA89567E2F239479107E6D05EB15DB8C91B4EE79120D5D3DBA61603AE1D387E0AAFD8E27C01606D1322BB
2,961,851 UART: [art] PUB.Y = D36F80F7133BAA8926F13576FC31825C557F09ABD30240541F82F19BB7FF660F26C546A01BC4136133D350752E8FE90E
2,968,787 UART: [art] SIG.R = 49B82F24CD67F35B3A921A841879EA5E133F6FDF08853B5047A76EE480B4F3832FCE1ACD5B1951C9A0C20FEFFCF36CB5
2,975,567 UART: [art] SIG.S = 0CA39C59695A9F81F8023A811AF63A6C5BD9CC4A0B95F3173B4B1D3C1C4F01C1A27FA949F41B0D187BE490A46A8DAFA6
2,999,857 UART: Caliptra RT
3,000,202 UART: [state] CFI Enabled
3,108,633 UART: [rt] RT listening for mailbox commands...
3,109,296 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,331 UART: [rt]cmd =0x46504c54, len=4
3,140,535 >>> mbox cmd response data (8 bytes)
3,140,794 UART: [rt] FIPS self test
3,141,122 UART: [kat] ++
3,141,274 UART: [kat] sha1
3,145,288 UART: [kat] SHA2-256
3,147,310 UART: [kat] SHA2-384
3,150,341 UART: [kat] SHA2-512-ACC
3,152,268 UART: [kat] ECC-384
3,160,849 UART: Fatal Error: 0x90040005
3,162,388 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,162,393 >>> mbox cmd response: failed
3,162,393 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,162,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,805 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,635 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,684,115 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,827,987 >>> mbox cmd response: failed
3,828,541 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,971,528 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,869,824 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,422,817 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,674,570 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,818,517 >>> mbox cmd response: failed
3,819,066 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,962,049 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
4,862,751 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,435,799 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,017,665 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,161,541 >>> mbox cmd response: failed
4,162,109 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,305,353 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
20,740,923 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,181,882 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,024,224 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,168,051 >>> mbox cmd response: failed
4,168,608 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,311,442 >>> mbox cmd response: failed
Initializing fuses
1,130 writing to cptra_bootfsm_go
20,740,889 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
34,182,613 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,446,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,590,914 >>> mbox cmd response: failed
3,591,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,734,867 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,440,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,274,271 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,434,750 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,578,875 >>> mbox cmd response: failed
3,579,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,722,837 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,449,970 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,291,281 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
3,782,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,926,892 >>> mbox cmd response: failed
3,927,467 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,070,852 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
19,583,298 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,295,061 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,787,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,932,263 >>> mbox cmd response: failed
3,932,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,076,269 >>> mbox cmd response: failed
Initializing fuses
1,006 writing to cptra_bootfsm_go
19,568,091 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,285,720 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,453,842 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,598,171 >>> mbox cmd response: failed
3,598,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,742,135 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
3,428,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,282,474 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,030 writing to cptra_bootfsm_go
3,455,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,599,458 >>> mbox cmd response: failed
3,600,009 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,743,398 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,451,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,324,717 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,792,849 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,937,139 >>> mbox cmd response: failed
3,937,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,081,071 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
19,569,345 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,293,367 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,795,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,940,074 >>> mbox cmd response: failed
3,940,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,083,996 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
19,564,174 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,293,541 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,803 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,811 >>> mbox cmd response: failed
816,811 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,825 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,571 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,927 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,935 >>> mbox cmd response: failed
816,935 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,095 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,569 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,976 >>> mbox cmd response: failed
816,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,284 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,118 >>> mbox cmd response: failed
817,118 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,124 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,042 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,652 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,335 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,343 >>> mbox cmd response: failed
816,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,277 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,009 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,533 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,541 >>> mbox cmd response: failed
816,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,845 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,699 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,300 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,308 >>> mbox cmd response: failed
817,308 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,178 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,064 >>> mbox cmd response: failed
817,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,070 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,480 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,610 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,081 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,089 >>> mbox cmd response: failed
817,089 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,095 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,185 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,561 >>> mbox cmd response: failed
817,561 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,763 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,620 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,628 >>> mbox cmd response: failed
817,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
817,634 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,328 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,686 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,866 >>> mbox cmd response: failed
816,866 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
816,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,512 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,268 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,129 UART:
192,489 UART: Running Caliptra ROM ...
193,664 UART:
193,818 UART: [state] CFI Enabled
263,922 UART: [state] LifecycleState = Unprovisioned
265,909 UART: [state] DebugLocked = No
268,230 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,679 UART: [kat] SHA2-256
443,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,884 UART: [kat] ++
454,335 UART: [kat] sha1
466,419 UART: [kat] SHA2-256
469,079 UART: [kat] SHA2-384
475,363 UART: [kat] SHA2-512-ACC
477,735 UART: [kat] ECC-384
2,767,391 UART: [kat] HMAC-384Kdf
2,780,680 UART: [kat] LMS
3,970,988 UART: [kat] --
3,974,506 UART: [cold-reset] ++
3,977,081 UART: [fht] Storing FHT @ 0x50003400
3,989,349 UART: [idev] ++
3,989,916 UART: [idev] CDI.KEYID = 6
3,990,800 UART: [idev] SUBJECT.KEYID = 7
3,992,044 UART: [idev] UDS.KEYID = 0
3,993,099 ready_for_fw is high
3,993,325 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,137,618 UART: [idev] Erasing UDS.KEYID = 0
7,328,559 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,352 UART: [idev] --
7,353,920 UART: [ldev] ++
7,354,499 UART: [ldev] CDI.KEYID = 6
7,355,517 UART: [ldev] SUBJECT.KEYID = 5
7,356,714 UART: [ldev] AUTHORITY.KEYID = 7
7,357,892 UART: [ldev] FE.KEYID = 1
7,405,104 UART: [ldev] Erasing FE.KEYID = 1
10,739,409 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,055,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,069,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,084,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,099,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,119,782 UART: [ldev] --
13,124,564 UART: [fwproc] Waiting for Commands...
13,126,402 UART: [fwproc] Received command 0x46574c44
13,128,591 UART: [fwproc] Received Image of size 114716 bytes
17,193,028 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,167 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,654,233 >>> mbox cmd response: success
17,657,871 UART: [afmc] ++
17,658,464 UART: [afmc] CDI.KEYID = 6
17,659,407 UART: [afmc] SUBJECT.KEYID = 7
17,660,677 UART: [afmc] AUTHORITY.KEYID = 5
21,038,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,336,811 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,339,078 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,353,467 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,368,331 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,382,751 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,405,265 UART: [afmc] --
23,409,238 UART: [cold-reset] --
23,413,639 UART: [state] Locking Datavault
23,418,547 UART: [state] Locking PCR0, PCR1 and PCR31
23,420,305 UART: [state] Locking ICCM
23,422,432 UART: [exit] Launching FMC @ 0x40000130
23,430,790 UART:
23,431,028 UART: Running Caliptra FMC ...
23,432,138 UART:
23,432,298 UART: [state] CFI Enabled
23,483,251 UART: [fht] FMC Alias Private Key: 7
25,820,898 UART: [art] Extend RT PCRs Done
25,822,124 UART: [art] Lock RT PCRs Done
25,823,671 UART: [art] Populate DV Done
25,829,190 UART: [fht] FMC Alias Private Key: 7
25,830,893 UART: [art] Derive CDI
25,831,709 UART: [art] Store in in slot 0x4
25,891,674 UART: [art] Derive Key Pair
25,892,711 UART: [art] Store priv key in slot 0x5
29,184,963 UART: [art] Derive Key Pair - Done
29,197,908 UART: [art] Signing Cert with AUTHO
29,199,209 UART: RITY.KEYID = 7
31,487,246 UART: [art] Erasing AUTHORITY.KEYID = 7
31,488,754 UART: [art] PUB.X = AE663FAD46146BDA63A17F50F0AAA4A4931B232461D4F763B8E8F94DEEF50FE35811BB79EFD6712DFE9A93DDDBD08620
31,496,040 UART: [art] PUB.Y = 1EC8D00C7A2EA76C51EF7CC55FD3177962AF5BD40D35757DD868476105AC15BB512CF356B916D6493AB26D328E7D7E89
31,503,292 UART: [art] SIG.R = ECAFA00C59B774241A291D4E476FE772ECBC715869552B3C6B1A961D38F552AF1565F1C61CA9E53BD7100EC155ED559D
31,510,635 UART: [art] SIG.S = 02ED0C845225B563465F91666CC3C7F331ACAFDC8DC0AB00D5F0B172FAE42B2F7A349DB0D12E69E7E21111D3E283FCEC
32,816,074 UART: Caliptra RT
32,816,797 UART: [state] CFI Enabled
32,978,900 UART: [rt] RT listening for mailbox commands...
32,980,763 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,010,237 UART: [rt]cmd =0x46504c54, len=4
33,011,759 >>> mbox cmd response data (8 bytes)
33,012,960 UART: [rt] FIPS self test
33,013,914 UART: [kat] ++
33,014,373 UART: [kat] sha1
33,018,726 UART: [kat] SHA2-256
33,020,662 UART: [kat] SHA2-384
33,023,429 UART: [kat] SHA2-512-ACC
33,025,672 UART: [kat] ECC-384
33,995,170 UART: Fatal Error: 0x90040004
34,030,463 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,174,621 >>> mbox cmd response: failed
34,175,279 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,319,282 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,123 UART:
190,441 UART: Running Caliptra ROM ...
191,498 UART:
191,640 UART: [state] CFI Enabled
266,561 UART: [state] LifecycleState = Unprovisioned
268,508 UART: [state] DebugLocked = No
271,030 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,455 UART: [kat] SHA2-256
445,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,634 UART: [kat] ++
456,220 UART: [kat] sha1
467,965 UART: [kat] SHA2-256
470,706 UART: [kat] SHA2-384
475,923 UART: [kat] SHA2-512-ACC
478,314 UART: [kat] ECC-384
2,765,121 UART: [kat] HMAC-384Kdf
2,795,976 UART: [kat] LMS
3,986,283 UART: [kat] --
3,990,713 UART: [cold-reset] ++
3,992,007 UART: [fht] Storing FHT @ 0x50003400
4,002,527 UART: [idev] ++
4,003,099 UART: [idev] CDI.KEYID = 6
4,003,988 UART: [idev] SUBJECT.KEYID = 7
4,005,280 UART: [idev] UDS.KEYID = 0
4,006,787 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,151,085 UART: [idev] Erasing UDS.KEYID = 0
7,344,025 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,326 UART: [idev] --
7,369,722 UART: [ldev] ++
7,370,288 UART: [ldev] CDI.KEYID = 6
7,371,252 UART: [ldev] SUBJECT.KEYID = 5
7,372,468 UART: [ldev] AUTHORITY.KEYID = 7
7,373,757 UART: [ldev] FE.KEYID = 1
7,418,188 UART: [ldev] Erasing FE.KEYID = 1
10,752,321 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,615 UART: [ldev] --
13,133,448 UART: [fwproc] Waiting for Commands...
13,135,768 UART: [fwproc] Received command 0x46574c44
13,137,953 UART: [fwproc] Received Image of size 114716 bytes
17,200,694 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,140 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,350,000 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,669,998 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,781,565 ready_for_fw is high
3,781,953 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,881,177 >>> mbox cmd response: success
23,564,730 UART:
23,565,119 UART: Running Caliptra FMC ...
23,566,266 UART:
23,566,420 UART: [state] CFI Enabled
23,636,951 UART: [fht] FMC Alias Private Key: 7
25,974,280 UART: [art] Extend RT PCRs Done
25,975,511 UART: [art] Lock RT PCRs Done
25,977,186 UART: [art] Populate DV Done
25,982,782 UART: [fht] FMC Alias Private Key: 7
25,984,341 UART: [art] Derive CDI
25,985,161 UART: [art] Store in in slot 0x4
26,045,879 UART: [art] Derive Key Pair
26,046,905 UART: [art] Store priv key in slot 0x5
29,339,713 UART: [art] Derive Key Pair - Done
29,352,656 UART: [art] Signing Cert with AUTHO
29,353,961 UART: RITY.KEYID = 7
31,641,625 UART: [art] Erasing AUTHORITY.KEYID = 7
31,643,141 UART: [art] PUB.X = 444B6DD10B49AC969B3231B1BB84C4D098A3267D4D28BA8AC8F746A1024B65A7C809C720E9FFFEA776D0D02260FC0DBF
31,650,403 UART: [art] PUB.Y = D60359920C187F3C7BD5840A61894DD04A6C3BE8787C3BD55B7F6379009C93465CB26D02B9C43A62BAC24ED5DB837587
31,657,642 UART: [art] SIG.R = D6BADBBA5F3BAFBA885EE398450F565861469AF45C2D8741BAC9CA87F4A32013D2BFE9CF95E94AD91FA6CA8077236F7B
31,665,051 UART: [art] SIG.S = 28BBEE8068345589C538FD30AB099F8DCF314C32CA4787B867A871D164C808742BF665DA6086AE3E27555EB5C44266B0
32,970,286 UART: Caliptra RT
32,970,991 UART: [state] CFI Enabled
33,131,894 UART: [rt] RT listening for mailbox commands...
33,133,749 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,163,371 UART: [rt]cmd =0x46504c54, len=4
33,164,945 >>> mbox cmd response data (8 bytes)
33,166,101 UART: [rt] FIPS self test
33,167,073 UART: [kat] ++
33,167,530 UART: [kat] sha1
33,171,751 UART: [kat] SHA2-256
33,173,682 UART: [kat] SHA2-384
33,176,769 UART: [kat] SHA2-512-ACC
33,179,062 UART: [kat] ECC-384
34,150,399 UART: Fatal Error: 0x90040004
34,185,630 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,329,717 >>> mbox cmd response: failed
34,330,314 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,474,333 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,784,673 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,865,828 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,505 UART:
192,856 UART: Running Caliptra ROM ...
194,057 UART:
603,767 UART: [state] CFI Enabled
619,198 UART: [state] LifecycleState = Unprovisioned
621,154 UART: [state] DebugLocked = No
624,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,761 UART: [kat] SHA2-256
798,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,019 UART: [kat] ++
809,517 UART: [kat] sha1
822,236 UART: [kat] SHA2-256
824,969 UART: [kat] SHA2-384
831,411 UART: [kat] SHA2-512-ACC
833,789 UART: [kat] ECC-384
3,118,850 UART: [kat] HMAC-384Kdf
3,131,318 UART: [kat] LMS
4,321,439 UART: [kat] --
4,323,902 UART: [cold-reset] ++
4,325,699 UART: [fht] Storing FHT @ 0x50003400
4,336,896 UART: [idev] ++
4,337,461 UART: [idev] CDI.KEYID = 6
4,338,493 UART: [idev] SUBJECT.KEYID = 7
4,339,669 UART: [idev] UDS.KEYID = 0
4,340,747 ready_for_fw is high
4,340,988 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,485,152 UART: [idev] Erasing UDS.KEYID = 0
7,628,951 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,510 UART: [idev] --
7,654,533 UART: [ldev] ++
7,655,110 UART: [ldev] CDI.KEYID = 6
7,656,080 UART: [ldev] SUBJECT.KEYID = 5
7,657,296 UART: [ldev] AUTHORITY.KEYID = 7
7,658,528 UART: [ldev] FE.KEYID = 1
7,668,851 UART: [ldev] Erasing FE.KEYID = 1
10,960,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,572 UART: [ldev] --
13,322,195 UART: [fwproc] Waiting for Commands...
13,325,160 UART: [fwproc] Received command 0x46574c44
13,327,348 UART: [fwproc] Received Image of size 114716 bytes
17,380,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,654 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,845,258 >>> mbox cmd response: success
17,849,822 UART: [afmc] ++
17,850,410 UART: [afmc] CDI.KEYID = 6
17,851,351 UART: [afmc] SUBJECT.KEYID = 7
17,852,559 UART: [afmc] AUTHORITY.KEYID = 5
21,167,135 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,390 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,657 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,477,076 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,837 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,312 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,321 UART: [afmc] --
23,530,812 UART: [cold-reset] --
23,535,804 UART: [state] Locking Datavault
23,541,935 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,688 UART: [state] Locking ICCM
23,545,002 UART: [exit] Launching FMC @ 0x40000130
23,553,402 UART:
23,553,646 UART: Running Caliptra FMC ...
23,554,669 UART:
23,554,816 UART: [state] CFI Enabled
23,563,130 UART: [fht] FMC Alias Private Key: 7
25,894,958 UART: [art] Extend RT PCRs Done
25,896,181 UART: [art] Lock RT PCRs Done
25,897,831 UART: [art] Populate DV Done
25,903,351 UART: [fht] FMC Alias Private Key: 7
25,904,999 UART: [art] Derive CDI
25,905,816 UART: [art] Store in in slot 0x4
25,947,982 UART: [art] Derive Key Pair
25,949,022 UART: [art] Store priv key in slot 0x5
29,191,402 UART: [art] Derive Key Pair - Done
29,204,402 UART: [art] Signing Cert with AUTHO
29,205,715 UART: RITY.KEYID = 7
31,484,763 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,279 UART: [art] PUB.X = 6C840F8E764B9F8B412CBA980714E570ACB133284F73CA32E814079B7935ABB0D807438033585655EC4F7F534C607BBC
31,493,531 UART: [art] PUB.Y = AE3CCEC420FE1B2B73385EF3EA192E9501D741DFA7BC9A9BA588109D99AE8F107839F735A58976B96F94BA184D8E6988
31,500,770 UART: [art] SIG.R = 06C7A645F59CD2F0AE2D2AAF8853D517C3AA9A3F0354F39D7753976E8A7499EABD794A8BF9010C7CB06127F00D765760
31,508,158 UART: [art] SIG.S = BC9BF9AC9A800B3B664826B2050135758B2896AAF26A8B834CD9C10C3105295A67DB0FD9F4E5D138030EB784B1AC75D6
32,812,927 UART: Caliptra RT
32,814,033 UART: [state] CFI Enabled
32,932,179 UART: [rt] RT listening for mailbox commands...
32,934,363 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,964,162 UART: [rt]cmd =0x46504c54, len=4
32,965,833 >>> mbox cmd response data (8 bytes)
32,966,834 UART: [rt] FIPS self test
32,967,808 UART: [kat] ++
32,968,290 UART: [kat] sha1
32,972,481 UART: [kat] SHA2-256
32,974,396 UART: [kat] SHA2-384
32,977,365 UART: [kat] SHA2-512-ACC
32,979,662 UART: [kat] ECC-384
33,943,864 UART: Fatal Error: 0x90040004
33,979,463 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,123,773 >>> mbox cmd response: failed
34,124,389 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,268,444 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,120 UART:
190,418 UART: Running Caliptra ROM ...
191,527 UART:
6,255,997 UART: [state] CFI Enabled
6,270,962 UART: [state] LifecycleState = Unprovisioned
6,272,876 UART: [state] DebugLocked = No
6,275,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,280,485 UART: [kat] SHA2-256
6,450,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,460,771 UART: [kat] ++
6,461,232 UART: [kat] sha1
6,472,441 UART: [kat] SHA2-256
6,475,134 UART: [kat] SHA2-384
6,481,877 UART: [kat] SHA2-512-ACC
6,484,234 UART: [kat] ECC-384
8,769,551 UART: [kat] HMAC-384Kdf
8,781,567 UART: [kat] LMS
9,971,630 UART: [kat] --
9,975,152 UART: [cold-reset] ++
9,976,441 UART: [fht] Storing FHT @ 0x50003400
9,987,889 UART: [idev] ++
9,988,453 UART: [idev] CDI.KEYID = 6
9,989,388 UART: [idev] SUBJECT.KEYID = 7
9,990,655 UART: [idev] UDS.KEYID = 0
9,992,206 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
10,136,218 UART: [idev] Erasing UDS.KEYID = 0
13,276,154 UART: [idev] Using Sha1 for KeyId Algorithm
13,297,966 UART: [idev] --
13,302,176 UART: [ldev] ++
13,302,801 UART: [ldev] CDI.KEYID = 6
13,303,710 UART: [ldev] SUBJECT.KEYID = 5
13,304,920 UART: [ldev] AUTHORITY.KEYID = 7
13,306,205 UART: [ldev] FE.KEYID = 1
13,316,041 UART: [ldev] Erasing FE.KEYID = 1
16,607,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,900,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,914,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,929,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,944,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,963,283 UART: [ldev] --
18,968,222 UART: [fwproc] Waiting for Commands...
18,970,749 UART: [fwproc] Received command 0x46574c44
18,972,933 UART: [fwproc] Received Image of size 114716 bytes
23,029,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,103,689 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
23,172,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
23,492,378 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
4,130,015 ready_for_fw is high
4,130,474 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,085,244 >>> mbox cmd response: success
23,727,215 UART:
23,727,671 UART: Running Caliptra FMC ...
23,728,795 UART:
23,728,958 UART: [state] CFI Enabled
23,736,747 UART: [fht] FMC Alias Private Key: 7
26,067,721 UART: [art] Extend RT PCRs Done
26,068,987 UART: [art] Lock RT PCRs Done
26,070,595 UART: [art] Populate DV Done
26,075,974 UART: [fht] FMC Alias Private Key: 7
26,077,462 UART: [art] Derive CDI
26,078,230 UART: [art] Store in in slot 0x4
26,120,946 UART: [art] Derive Key Pair
26,121,980 UART: [art] Store priv key in slot 0x5
29,364,313 UART: [art] Derive Key Pair - Done
29,377,424 UART: [art] Signing Cert with AUTHO
29,378,730 UART: RITY.KEYID = 7
31,657,906 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,426 UART: [art] PUB.X = F8D253FB6AF2390A0F3EEB592D255BFFDB07D28DDD63BA4D49FEBFFF5239D1F636D424F033838B3414F997E0933258C9
31,666,689 UART: [art] PUB.Y = A078F7139030B39AA7309A5687497131562B5F4F2CF79D5BD71C1524EC46AA77E3F8B68A0C6848650CFA42268E7A3BA5
31,673,939 UART: [art] SIG.R = FC66D8F3D87A33107D2CD4DE785FC0DCC67C9DC1A3574973E36888528CF062CA86F2945AB7F324195DFE9323CBA50283
31,681,287 UART: [art] SIG.S = EF4835733BF86375CC005931AB45926F0F2BBD83E3B9CCB7F610FAB8710B63EEC4164CA152644D95CE0B0E313F589F0D
32,986,666 UART: Caliptra RT
32,987,404 UART: [state] CFI Enabled
33,105,186 UART: [rt] RT listening for mailbox commands...
33,107,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,136,818 UART: [rt]cmd =0x46504c54, len=4
33,138,398 >>> mbox cmd response data (8 bytes)
33,139,785 UART: [rt] FIPS self test
33,140,725 UART: [kat] ++
33,141,172 UART: [kat] sha1
33,145,627 UART: [kat] SHA2-256
33,147,555 UART: [kat] SHA2-384
33,150,464 UART: [kat] SHA2-512-ACC
33,152,762 UART: [kat] ECC-384
34,116,363 UART: Fatal Error: 0x90040004
34,151,631 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,295,775 >>> mbox cmd response: failed
34,296,432 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
34,440,441 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
9,609,721 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
23,572,563 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,510 UART:
192,870 UART: Running Caliptra ROM ...
194,072 UART:
194,230 UART: [state] CFI Enabled
263,890 UART: [state] LifecycleState = Unprovisioned
265,805 UART: [state] DebugLocked = No
268,141 UART: [state] WD Timer not started. Device not locked for debugging
271,269 UART: [kat] SHA2-256
450,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,029 UART: [kat] ++
462,567 UART: [kat] sha1
472,951 UART: [kat] SHA2-256
475,955 UART: [kat] SHA2-384
480,972 UART: [kat] SHA2-512-ACC
483,969 UART: [kat] ECC-384
2,949,308 UART: [kat] HMAC-384Kdf
2,971,077 UART: [kat] LMS
3,500,532 UART: [kat] --
3,502,991 UART: [cold-reset] ++
3,505,004 UART: [fht] FHT @ 0x50003400
3,516,852 UART: [idev] ++
3,517,418 UART: [idev] CDI.KEYID = 6
3,518,522 UART: [idev] SUBJECT.KEYID = 7
3,519,650 UART: [idev] UDS.KEYID = 0
3,520,551 ready_for_fw is high
3,520,764 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,665,324 UART: [idev] Erasing UDS.KEYID = 0
6,029,276 UART: [idev] Sha1 KeyId Algorithm
6,052,134 UART: [idev] --
6,055,756 UART: [ldev] ++
6,056,326 UART: [ldev] CDI.KEYID = 6
6,057,240 UART: [ldev] SUBJECT.KEYID = 5
6,058,407 UART: [ldev] AUTHORITY.KEYID = 7
6,059,696 UART: [ldev] FE.KEYID = 1
6,101,297 UART: [ldev] Erasing FE.KEYID = 1
8,606,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,646 UART: [ldev] --
10,417,929 UART: [fwproc] Wait for Commands...
10,419,597 UART: [fwproc] Recv command 0x46574c44
10,421,704 UART: [fwproc] Recv'd Img size: 115032 bytes
13,833,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,427 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,195 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,291,738 >>> mbox cmd response: success
14,295,571 UART: [afmc] ++
14,296,157 UART: [afmc] CDI.KEYID = 6
14,297,045 UART: [afmc] SUBJECT.KEYID = 7
14,298,263 UART: [afmc] AUTHORITY.KEYID = 5
16,836,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,581,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,583,019 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,598,799 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,614,854 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,630,700 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,654,370 UART: [afmc] --
18,657,218 UART: [cold-reset] --
18,662,595 UART: [state] Locking Datavault
18,669,473 UART: [state] Locking PCR0, PCR1 and PCR31
18,671,121 UART: [state] Locking ICCM
18,673,455 UART: [exit] Launching FMC @ 0x40000130
18,681,850 UART:
18,682,088 UART: Running Caliptra FMC ...
18,683,193 UART:
18,683,359 UART: [state] CFI Enabled
18,738,107 UART: [fht] FMC Alias Private Key: 7
20,502,129 UART: [art] Extend RT PCRs Done
20,503,380 UART: [art] Lock RT PCRs Done
20,505,066 UART: [art] Populate DV Done
20,510,427 UART: [fht] FMC Alias Private Key: 7
20,511,921 UART: [art] Derive CDI
20,512,681 UART: [art] Store in in slot 0x4
20,570,317 UART: [art] Derive Key Pair
20,571,362 UART: [art] Store priv key in slot 0x5
23,034,104 UART: [art] Derive Key Pair - Done
23,046,902 UART: [art] Signing Cert with AUTHO
23,048,258 UART: RITY.KEYID = 7
24,759,941 UART: [art] Erasing AUTHORITY.KEYID = 7
24,761,450 UART: [art] PUB.X = 74EE6F3234411DB971D9E73D7A3E1209613B96A36CC64771D9D4992DC3CFFF617868AB86B55202C78135F8DD64CDE27D
24,768,694 UART: [art] PUB.Y = A836D2B422514AC373838AA643D309B107AA15226F4F3CBA3A2BBB1088A00D535E15C4603F184DCE184897374B2643DD
24,775,930 UART: [art] SIG.R = 7BC9734FAAFB6F6E54B715DDC73023C5648C298C836D9CF49D9AEE206A104659A201A284BBF016E9FFC4D32FEF86EBC9
24,783,352 UART: [art] SIG.S = 87910851745C80BC8511E91A03BF2A6F9EC3FA1CCE2A7C4FDC1BB5F878D39BBD53C7A0207267663017D6212D0B3A8841
25,762,083 UART: Caliptra RT
25,762,812 UART: [state] CFI Enabled
25,927,127 UART: [rt] RT listening for mailbox commands...
25,928,987 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,958,749 UART: [rt]cmd =0x46504c54, len=4
25,960,383 >>> mbox cmd response data (8 bytes)
25,961,586 UART: [rt] FIPS self test
25,962,524 UART: [kat] ++
25,962,979 UART: [kat] sha1
25,967,489 UART: [kat] SHA2-256
25,969,364 UART: [kat] SHA2-384
25,972,436 UART: [kat] SHA2-512-ACC
25,974,723 UART: [kat] ECC-384
26,703,360 UART: Fatal Error: 0x90040004
26,738,812 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,883,411 >>> mbox cmd response: failed
26,884,083 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,028,415 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
190,131 UART:
190,421 UART: Running Caliptra ROM ...
191,452 UART:
191,598 UART: [state] CFI Enabled
247,054 UART: [state] LifecycleState = Unprovisioned
249,052 UART: [state] DebugLocked = No
251,371 UART: [state] WD Timer not started. Device not locked for debugging
254,198 UART: [kat] SHA2-256
433,364 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
444,929 UART: [kat] ++
445,470 UART: [kat] sha1
457,330 UART: [kat] SHA2-256
460,386 UART: [kat] SHA2-384
467,564 UART: [kat] SHA2-512-ACC
470,506 UART: [kat] ECC-384
2,934,488 UART: [kat] HMAC-384Kdf
2,954,389 UART: [kat] LMS
3,483,856 UART: [kat] --
3,488,735 UART: [cold-reset] ++
3,490,349 UART: [fht] FHT @ 0x50003400
3,501,166 UART: [idev] ++
3,501,728 UART: [idev] CDI.KEYID = 6
3,502,646 UART: [idev] SUBJECT.KEYID = 7
3,503,865 UART: [idev] UDS.KEYID = 0
3,505,375 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,649,988 UART: [idev] Erasing UDS.KEYID = 0
6,008,117 UART: [idev] Sha1 KeyId Algorithm
6,030,785 UART: [idev] --
6,035,979 UART: [ldev] ++
6,036,573 UART: [ldev] CDI.KEYID = 6
6,037,489 UART: [ldev] SUBJECT.KEYID = 5
6,038,514 UART: [ldev] AUTHORITY.KEYID = 7
6,039,859 UART: [ldev] FE.KEYID = 1
6,083,780 UART: [ldev] Erasing FE.KEYID = 1
8,590,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,354,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,631 UART: [ldev] --
10,396,408 UART: [fwproc] Wait for Commands...
10,398,345 UART: [fwproc] Recv command 0x46574c44
10,400,441 UART: [fwproc] Recv'd Img size: 115032 bytes
13,817,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,152 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,932 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,280,795 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,381,417 ready_for_fw is high
3,381,800 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,103,088 >>> mbox cmd response: success
18,389,474 UART:
18,389,882 UART: Running Caliptra FMC ...
18,391,036 UART:
18,391,199 UART: [state] CFI Enabled
18,456,394 UART: [fht] FMC Alias Private Key: 7
20,220,298 UART: [art] Extend RT PCRs Done
20,221,506 UART: [art] Lock RT PCRs Done
20,223,240 UART: [art] Populate DV Done
20,228,680 UART: [fht] FMC Alias Private Key: 7
20,230,334 UART: [art] Derive CDI
20,231,151 UART: [art] Store in in slot 0x4
20,288,402 UART: [art] Derive Key Pair
20,289,416 UART: [art] Store priv key in slot 0x5
22,753,045 UART: [art] Derive Key Pair - Done
22,766,318 UART: [art] Signing Cert with AUTHO
22,767,625 UART: RITY.KEYID = 7
24,478,194 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,208 UART: [art] PUB.X = 89C06345638FBE086A920A6F6FA05BA22FA3715D9D2D1768041062BC639D5534AD6D18D88F5DFEAFD95BF3C1067E5F82
24,486,971 UART: [art] PUB.Y = 72B04A1A6618D24D816FE0E441B294F67989C3B173A236C5BBC737D2FA47EFAB6F220D245211844D94530B3F014425E5
24,494,202 UART: [art] SIG.R = FFF2AF7270F1CE71F0DE41FC25D4C0864C90B15DD58914EAD6C74300CE44B7838917E63BC435B5BB413E6B4644DB7F6D
24,501,612 UART: [art] SIG.S = C95F1DB286086379ADFA0E3E28E893B4654639C9C817F3198020F1F1C1BA8B5323316B13D5739D5EDF660B576B192E91
25,480,532 UART: Caliptra RT
25,481,619 UART: [state] CFI Enabled
25,646,075 UART: [rt] RT listening for mailbox commands...
25,647,948 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,677,833 UART: [rt]cmd =0x46504c54, len=4
25,679,339 >>> mbox cmd response data (8 bytes)
25,680,491 UART: [rt] FIPS self test
25,681,436 UART: [kat] ++
25,681,909 UART: [kat] sha1
25,686,259 UART: [kat] SHA2-256
25,688,185 UART: [kat] SHA2-384
25,691,032 UART: [kat] SHA2-512-ACC
25,693,327 UART: [kat] ECC-384
26,422,596 UART: Fatal Error: 0x90040004
26,457,861 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,602,908 >>> mbox cmd response: failed
26,603,529 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,747,987 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,342,356 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,036,765 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,587 UART:
193,016 UART: Running Caliptra ROM ...
194,212 UART:
603,879 UART: [state] CFI Enabled
618,605 UART: [state] LifecycleState = Unprovisioned
620,417 UART: [state] DebugLocked = No
621,955 UART: [state] WD Timer not started. Device not locked for debugging
624,818 UART: [kat] SHA2-256
803,900 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,510 UART: [kat] ++
816,046 UART: [kat] sha1
828,354 UART: [kat] SHA2-256
831,437 UART: [kat] SHA2-384
838,441 UART: [kat] SHA2-512-ACC
841,379 UART: [kat] ECC-384
3,283,838 UART: [kat] HMAC-384Kdf
3,296,580 UART: [kat] LMS
3,826,110 UART: [kat] --
3,830,773 UART: [cold-reset] ++
3,832,966 UART: [fht] FHT @ 0x50003400
3,844,813 UART: [idev] ++
3,845,387 UART: [idev] CDI.KEYID = 6
3,846,346 UART: [idev] SUBJECT.KEYID = 7
3,847,525 UART: [idev] UDS.KEYID = 0
3,848,429 ready_for_fw is high
3,848,655 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,993,197 UART: [idev] Erasing UDS.KEYID = 0
6,318,554 UART: [idev] Sha1 KeyId Algorithm
6,341,624 UART: [idev] --
6,345,965 UART: [ldev] ++
6,346,534 UART: [ldev] CDI.KEYID = 6
6,347,414 UART: [ldev] SUBJECT.KEYID = 5
6,348,628 UART: [ldev] AUTHORITY.KEYID = 7
6,349,862 UART: [ldev] FE.KEYID = 1
6,358,374 UART: [ldev] Erasing FE.KEYID = 1
8,832,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,551,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,567,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,583,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,462 UART: [ldev] --
10,623,374 UART: [fwproc] Wait for Commands...
10,625,145 UART: [fwproc] Recv command 0x46574c44
10,627,239 UART: [fwproc] Recv'd Img size: 115032 bytes
14,041,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,118,224 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,187,011 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,506,594 >>> mbox cmd response: success
14,511,312 UART: [afmc] ++
14,511,905 UART: [afmc] CDI.KEYID = 6
14,512,790 UART: [afmc] SUBJECT.KEYID = 7
14,513,899 UART: [afmc] AUTHORITY.KEYID = 5
17,017,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,737,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,739,115 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,754,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,770,882 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,786,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,809,960 UART: [afmc] --
18,814,590 UART: [cold-reset] --
18,817,533 UART: [state] Locking Datavault
18,822,799 UART: [state] Locking PCR0, PCR1 and PCR31
18,824,450 UART: [state] Locking ICCM
18,826,063 UART: [exit] Launching FMC @ 0x40000130
18,834,464 UART:
18,834,701 UART: Running Caliptra FMC ...
18,835,730 UART:
18,835,880 UART: [state] CFI Enabled
18,844,091 UART: [fht] FMC Alias Private Key: 7
20,601,173 UART: [art] Extend RT PCRs Done
20,602,409 UART: [art] Lock RT PCRs Done
20,604,064 UART: [art] Populate DV Done
20,609,263 UART: [fht] FMC Alias Private Key: 7
20,610,803 UART: [art] Derive CDI
20,611,537 UART: [art] Store in in slot 0x4
20,654,297 UART: [art] Derive Key Pair
20,655,343 UART: [art] Store priv key in slot 0x5
23,081,960 UART: [art] Derive Key Pair - Done
23,094,911 UART: [art] Signing Cert with AUTHO
23,096,230 UART: RITY.KEYID = 7
24,801,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,811 UART: [art] PUB.X = 66966683F88A13767B71D9095DB812ADB03DC92B4C8AFFBEF114053BFD641F659327651580A05878FD381E892A84DEFD
24,810,065 UART: [art] PUB.Y = 6A41CDE724646824BD22105DEFCF2E3C1A17BEB3FE4F691F83969B0DD9B6830135F0A9228B6CCF46AE4CFFE35730E2E1
24,817,369 UART: [art] SIG.R = 628F08FBAD50035DA2C5DC52FB49013A48BC1BB45F6596AE2179F36BB414AA558BCE0F38E2AED8FB6F6EC5A050A38FE9
24,824,765 UART: [art] SIG.S = 6F954FF525C765BAC781EF13A322209A9B10985736507155DF072CD2EB41D906D31BCF494C83D7C789EF738AEFB5EFF9
25,803,682 UART: Caliptra RT
25,804,378 UART: [state] CFI Enabled
25,920,841 UART: [rt] RT listening for mailbox commands...
25,922,693 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,952,446 UART: [rt]cmd =0x46504c54, len=4
25,954,071 >>> mbox cmd response data (8 bytes)
25,955,551 UART: [rt] FIPS self test
25,956,490 UART: [kat] ++
25,956,962 UART: [kat] sha1
25,961,422 UART: [kat] SHA2-256
25,963,351 UART: [kat] SHA2-384
25,966,526 UART: [kat] SHA2-512-ACC
25,968,772 UART: [kat] ECC-384
26,691,509 UART: Fatal Error: 0x90040004
26,726,946 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,871,435 >>> mbox cmd response: failed
26,872,089 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,016,380 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,058 UART:
190,346 UART: Running Caliptra ROM ...
191,454 UART:
13,520,146 UART: [state] CFI Enabled
13,532,814 UART: [state] LifecycleState = Unprovisioned
13,534,810 UART: [state] DebugLocked = No
13,536,200 UART: [state] WD Timer not started. Device not locked for debugging
13,539,405 UART: [kat] SHA2-256
13,718,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
13,730,061 UART: [kat] ++
13,730,522 UART: [kat] sha1
13,740,485 UART: [kat] SHA2-256
13,743,513 UART: [kat] SHA2-384
13,749,665 UART: [kat] SHA2-512-ACC
13,752,660 UART: [kat] ECC-384
16,193,250 UART: [kat] HMAC-384Kdf
16,205,317 UART: [kat] LMS
16,734,789 UART: [kat] --
16,739,647 UART: [cold-reset] ++
16,740,819 UART: [fht] FHT @ 0x50003400
16,751,811 UART: [idev] ++
16,752,377 UART: [idev] CDI.KEYID = 6
16,753,340 UART: [idev] SUBJECT.KEYID = 7
16,754,495 UART: [idev] UDS.KEYID = 0
16,756,084 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
16,900,505 UART: [idev] Erasing UDS.KEYID = 0
19,227,624 UART: [idev] Sha1 KeyId Algorithm
19,249,347 UART: [idev] --
19,253,768 UART: [ldev] ++
19,254,337 UART: [ldev] CDI.KEYID = 6
19,255,243 UART: [ldev] SUBJECT.KEYID = 5
19,256,456 UART: [ldev] AUTHORITY.KEYID = 7
19,257,686 UART: [ldev] FE.KEYID = 1
19,270,167 UART: [ldev] Erasing FE.KEYID = 1
21,740,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,456,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,472,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,488,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,504,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,526,018 UART: [ldev] --
23,530,743 UART: [fwproc] Wait for Commands...
23,532,950 UART: [fwproc] Recv command 0x46574c44
23,535,145 UART: [fwproc] Recv'd Img size: 115032 bytes
26,951,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,023,634 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,092,389 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
27,412,404 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,697,814 ready_for_fw is high
3,698,256 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,273,349 >>> mbox cmd response: success
18,525,303 UART:
18,525,724 UART: Running Caliptra FMC ...
18,526,880 UART:
18,527,047 UART: [state] CFI Enabled
18,535,057 UART: [fht] FMC Alias Private Key: 7
20,291,508 UART: [art] Extend RT PCRs Done
20,292,748 UART: [art] Lock RT PCRs Done
20,294,172 UART: [art] Populate DV Done
20,299,782 UART: [fht] FMC Alias Private Key: 7
20,301,295 UART: [art] Derive CDI
20,302,062 UART: [art] Store in in slot 0x4
20,344,672 UART: [art] Derive Key Pair
20,345,723 UART: [art] Store priv key in slot 0x5
22,772,435 UART: [art] Derive Key Pair - Done
22,785,118 UART: [art] Signing Cert with AUTHO
22,786,424 UART: RITY.KEYID = 7
24,491,729 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,242 UART: [art] PUB.X = EAE8C59370993A6B2AB4C1999873AC17D7BDDCEC591A3A4218D795F96DEF1C52B0D63F6CC83667833EDE38BBCA7B0104
24,500,525 UART: [art] PUB.Y = 5F4FF54F3E8A954834D7CBD1D19767E9D9F898FE79C46017FF4DF271ADB844829CE0BD7409D1BFFEA96D3A1A446A3EF0
24,507,761 UART: [art] SIG.R = 04FF2C0FF8E584F0AD9152970D1F1723BCF03A087483BE9350744B71D327A20E0DC402327C4493C6A48FD0FE6E35B019
24,515,137 UART: [art] SIG.S = 7D4865A328A69CD8ECE37967008D5C369ECCF421B813C87AC67419A5ECD7EAF81E3393E984E20C3FE44246F1232BA1FC
25,494,288 UART: Caliptra RT
25,494,996 UART: [state] CFI Enabled
25,611,770 UART: [rt] RT listening for mailbox commands...
25,613,622 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,643,322 UART: [rt]cmd =0x46504c54, len=4
25,645,068 >>> mbox cmd response data (8 bytes)
25,646,170 UART: [rt] FIPS self test
25,647,110 UART: [kat] ++
25,647,557 UART: [kat] sha1
25,651,902 UART: [kat] SHA2-256
25,653,829 UART: [kat] SHA2-384
25,656,714 UART: [kat] SHA2-512-ACC
25,659,010 UART: [kat] ECC-384
26,381,601 UART: Fatal Error: 0x90040004
26,417,048 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,561,600 >>> mbox cmd response: failed
26,562,272 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,706,574 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
16,928,243 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,514,586 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
192,324 UART:
192,697 UART: Running Caliptra ROM ...
193,890 UART:
194,042 UART: [state] CFI Enabled
264,523 UART: [state] LifecycleState = Unprovisioned
266,931 UART: [state] DebugLocked = No
268,823 UART: [state] WD Timer not started. Device not locked for debugging
273,854 UART: [kat] SHA2-256
463,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,489 UART: [kat] ++
474,967 UART: [kat] sha1
486,487 UART: [kat] SHA2-256
489,501 UART: [kat] SHA2-384
495,709 UART: [kat] SHA2-512-ACC
498,303 UART: [kat] ECC-384
2,946,047 UART: [kat] HMAC-384Kdf
2,970,220 UART: [kat] LMS
3,502,048 UART: [kat] --
3,506,793 UART: [cold-reset] ++
3,508,262 UART: [fht] FHT @ 0x50003400
3,520,966 UART: [idev] ++
3,521,683 UART: [idev] CDI.KEYID = 6
3,522,672 UART: [idev] SUBJECT.KEYID = 7
3,523,849 UART: [idev] UDS.KEYID = 0
3,524,797 ready_for_fw is high
3,525,019 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,669,732 UART: [idev] Erasing UDS.KEYID = 0
6,024,381 UART: [idev] Sha1 KeyId Algorithm
6,047,007 UART: [idev] --
6,051,816 UART: [ldev] ++
6,052,499 UART: [ldev] CDI.KEYID = 6
6,053,419 UART: [ldev] SUBJECT.KEYID = 5
6,054,624 UART: [ldev] AUTHORITY.KEYID = 7
6,055,760 UART: [ldev] FE.KEYID = 1
6,101,214 UART: [ldev] Erasing FE.KEYID = 1
8,605,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,255 UART: [ldev] --
10,418,564 UART: [fwproc] Wait for Commands...
10,420,720 UART: [fwproc] Recv command 0x46574c44
10,423,041 UART: [fwproc] Recv'd Img size: 115032 bytes
13,876,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,469 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,606 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,613,571 >>> mbox cmd response: success
14,617,568 UART: [afmc] ++
14,618,270 UART: [afmc] CDI.KEYID = 6
14,619,512 UART: [afmc] SUBJECT.KEYID = 7
14,620,945 UART: [afmc] AUTHORITY.KEYID = 5
17,152,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,643 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,797 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,806 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,945,695 UART: [afmc] --
18,948,573 UART: [cold-reset] --
18,952,774 UART: [state] Locking Datavault
18,957,973 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,161 UART: [state] Locking ICCM
18,963,122 UART: [exit] Launching FMC @ 0x40000130
18,971,787 UART:
18,972,028 UART: Running Caliptra FMC ...
18,973,137 UART:
18,973,299 UART: [state] CFI Enabled
19,031,331 UART: [fht] FMC Alias Private Key: 7
20,794,902 UART: [art] Extend RT PCRs Done
20,796,114 UART: [art] Lock RT PCRs Done
20,797,872 UART: [art] Populate DV Done
20,803,090 UART: [fht] FMC Alias Private Key: 7
20,804,849 UART: [art] Derive CDI
20,805,662 UART: [art] Store in in slot 0x4
20,864,377 UART: [art] Derive Key Pair
20,865,413 UART: [art] Store priv key in slot 0x5
23,328,801 UART: [art] Derive Key Pair - Done
23,341,901 UART: [art] Signing Cert with AUTHO
23,343,200 UART: RITY.KEYID = 7
25,054,279 UART: [art] Erasing AUTHORITY.KEYID = 7
25,055,785 UART: [art] PUB.X = 13556458DD43D46997AD5852E970F4EB0C86C4E9250265A33C5096A2888ADF9668A56A5EC7E5A1663B2D0C0D2FA186BC
25,063,008 UART: [art] PUB.Y = E31CF36FF1DCC660858D17E89E26F15FAED7FE9F69C765F5E9018EB61FEC142C74F940C5074379F9692A9C6AE0FDE4B5
25,070,326 UART: [art] SIG.R = 1F2BA2A27D06B80CE0C063A50FE1D51C18FBE13FB0644B1500472C381EA1437612BE4DAAD1AA7D1CF1068339E65B8005
25,077,711 UART: [art] SIG.S = ADEC92E15FBCD5FFE20FB516EC3BFE96C3D0E6AEB880DB6A74916708DADCA83AA56B05E987FF6F1B1E2B9B0F8CA105EF
26,056,993 UART: Caliptra RT
26,057,705 UART: [state] CFI Enabled
26,221,539 UART: [rt] RT listening for mailbox commands...
26,223,417 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,253,298 UART: [rt]cmd =0x46504c54, len=4
26,254,753 >>> mbox cmd response data (8 bytes)
26,256,147 UART: [rt] FIPS self test
26,257,095 UART: [kat] ++
26,257,547 UART: [kat] sha1
26,261,980 UART: [kat] SHA2-256
26,263,914 UART: [kat] SHA2-384
26,266,762 UART: [kat] SHA2-512-ACC
26,269,006 UART: [kat] ECC-384
26,998,315 UART: Fatal Error: 0x90040004
27,034,309 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,178,766 >>> mbox cmd response: failed
27,179,428 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,324,212 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
190,140 UART:
190,447 UART: Running Caliptra ROM ...
191,505 UART:
191,647 UART: [state] CFI Enabled
268,385 UART: [state] LifecycleState = Unprovisioned
270,798 UART: [state] DebugLocked = No
272,284 UART: [state] WD Timer not started. Device not locked for debugging
276,145 UART: [kat] SHA2-256
466,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,803 UART: [kat] ++
477,280 UART: [kat] sha1
489,459 UART: [kat] SHA2-256
492,466 UART: [kat] SHA2-384
497,962 UART: [kat] SHA2-512-ACC
500,568 UART: [kat] ECC-384
2,953,106 UART: [kat] HMAC-384Kdf
2,973,545 UART: [kat] LMS
3,505,319 UART: [kat] --
3,511,146 UART: [cold-reset] ++
3,513,621 UART: [fht] FHT @ 0x50003400
3,523,692 UART: [idev] ++
3,524,369 UART: [idev] CDI.KEYID = 6
3,525,389 UART: [idev] SUBJECT.KEYID = 7
3,526,551 UART: [idev] UDS.KEYID = 0
3,528,059 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,672,637 UART: [idev] Erasing UDS.KEYID = 0
6,031,546 UART: [idev] Sha1 KeyId Algorithm
6,053,708 UART: [idev] --
6,058,191 UART: [ldev] ++
6,058,881 UART: [ldev] CDI.KEYID = 6
6,059,793 UART: [ldev] SUBJECT.KEYID = 5
6,060,977 UART: [ldev] AUTHORITY.KEYID = 7
6,062,213 UART: [ldev] FE.KEYID = 1
6,101,541 UART: [ldev] Erasing FE.KEYID = 1
8,610,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,208 UART: [ldev] --
10,417,391 UART: [fwproc] Wait for Commands...
10,420,208 UART: [fwproc] Recv command 0x46574c44
10,422,577 UART: [fwproc] Recv'd Img size: 115032 bytes
13,881,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,220 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,076,402 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,623,329 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,437,372 ready_for_fw is high
3,437,786 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,750,939 >>> mbox cmd response: success
19,046,613 UART:
19,046,999 UART: Running Caliptra FMC ...
19,048,139 UART:
19,048,319 UART: [state] CFI Enabled
19,114,808 UART: [fht] FMC Alias Private Key: 7
20,878,199 UART: [art] Extend RT PCRs Done
20,879,442 UART: [art] Lock RT PCRs Done
20,881,046 UART: [art] Populate DV Done
20,886,525 UART: [fht] FMC Alias Private Key: 7
20,888,171 UART: [art] Derive CDI
20,888,908 UART: [art] Store in in slot 0x4
20,947,835 UART: [art] Derive Key Pair
20,948,873 UART: [art] Store priv key in slot 0x5
23,412,145 UART: [art] Derive Key Pair - Done
23,425,255 UART: [art] Signing Cert with AUTHO
23,426,559 UART: RITY.KEYID = 7
25,138,054 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,570 UART: [art] PUB.X = CF0D4FCF53CF941038E40B4FD6D1C85C0F12717DBB72D07BDFDA39FD99C5BD512D41485950C34765715E0415DA384FCB
25,146,887 UART: [art] PUB.Y = F6C03D7E9ADD349432D85CE2CA2402D23BE1459B43FAFB70AC9D10669ECBE8645063C9CC70623F6387EB23C467E0348E
25,154,121 UART: [art] SIG.R = A9D3B310437456862ABF2A096EA040916313FDFFB30A0E3A5C34A9C1EDAAD29D9D5448DFA747D7D6D2D0E8E2CC102684
25,161,533 UART: [art] SIG.S = 756030C563A26DD550D8222D5363825FEBF048DF51E4F5DDEC00DE5D0CC388C8C45FF3417632BF8994A4EE5496EE3031
26,140,415 UART: Caliptra RT
26,141,129 UART: [state] CFI Enabled
26,306,773 UART: [rt] RT listening for mailbox commands...
26,308,630 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,515 UART: [rt]cmd =0x46504c54, len=4
26,339,985 >>> mbox cmd response data (8 bytes)
26,340,976 UART: [rt] FIPS self test
26,341,914 UART: [kat] ++
26,342,361 UART: [kat] sha1
26,346,952 UART: [kat] SHA2-256
26,348,842 UART: [kat] SHA2-384
26,351,748 UART: [kat] SHA2-512-ACC
26,353,994 UART: [kat] ECC-384
27,082,825 UART: Fatal Error: 0x90040004
27,118,269 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,262,785 >>> mbox cmd response: failed
27,263,393 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,407,641 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,419,594 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,738,733 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,519 UART:
192,892 UART: Running Caliptra ROM ...
194,100 UART:
603,800 UART: [state] CFI Enabled
619,154 UART: [state] LifecycleState = Unprovisioned
621,523 UART: [state] DebugLocked = No
623,339 UART: [state] WD Timer not started. Device not locked for debugging
628,526 UART: [kat] SHA2-256
818,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,163 UART: [kat] ++
829,773 UART: [kat] sha1
841,155 UART: [kat] SHA2-256
844,171 UART: [kat] SHA2-384
849,452 UART: [kat] SHA2-512-ACC
852,040 UART: [kat] ECC-384
3,295,463 UART: [kat] HMAC-384Kdf
3,307,804 UART: [kat] LMS
3,839,663 UART: [kat] --
3,843,973 UART: [cold-reset] ++
3,845,278 UART: [fht] FHT @ 0x50003400
3,855,413 UART: [idev] ++
3,856,131 UART: [idev] CDI.KEYID = 6
3,857,022 UART: [idev] SUBJECT.KEYID = 7
3,858,272 UART: [idev] UDS.KEYID = 0
3,859,176 ready_for_fw is high
3,859,400 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,003,869 UART: [idev] Erasing UDS.KEYID = 0
6,339,539 UART: [idev] Sha1 KeyId Algorithm
6,361,859 UART: [idev] --
6,366,472 UART: [ldev] ++
6,367,220 UART: [ldev] CDI.KEYID = 6
6,368,145 UART: [ldev] SUBJECT.KEYID = 5
6,369,320 UART: [ldev] AUTHORITY.KEYID = 7
6,370,497 UART: [ldev] FE.KEYID = 1
6,381,905 UART: [ldev] Erasing FE.KEYID = 1
8,860,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,078 UART: [ldev] --
10,655,375 UART: [fwproc] Wait for Commands...
10,658,553 UART: [fwproc] Recv command 0x46574c44
10,660,817 UART: [fwproc] Recv'd Img size: 115032 bytes
14,115,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,191,389 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,307,570 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,854,592 >>> mbox cmd response: success
14,859,036 UART: [afmc] ++
14,859,743 UART: [afmc] CDI.KEYID = 6
14,860,928 UART: [afmc] SUBJECT.KEYID = 7
14,862,413 UART: [afmc] AUTHORITY.KEYID = 5
17,368,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,090,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,092,074 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,107,244 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,122,353 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,137,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,162,145 UART: [afmc] --
19,166,309 UART: [cold-reset] --
19,171,311 UART: [state] Locking Datavault
19,179,209 UART: [state] Locking PCR0, PCR1 and PCR31
19,181,391 UART: [state] Locking ICCM
19,184,171 UART: [exit] Launching FMC @ 0x40000130
19,192,811 UART:
19,193,047 UART: Running Caliptra FMC ...
19,194,075 UART:
19,194,223 UART: [state] CFI Enabled
19,202,489 UART: [fht] FMC Alias Private Key: 7
20,959,095 UART: [art] Extend RT PCRs Done
20,960,320 UART: [art] Lock RT PCRs Done
20,961,706 UART: [art] Populate DV Done
20,967,074 UART: [fht] FMC Alias Private Key: 7
20,968,572 UART: [art] Derive CDI
20,969,334 UART: [art] Store in in slot 0x4
21,011,930 UART: [art] Derive Key Pair
21,012,978 UART: [art] Store priv key in slot 0x5
23,439,568 UART: [art] Derive Key Pair - Done
23,452,466 UART: [art] Signing Cert with AUTHO
23,453,765 UART: RITY.KEYID = 7
25,159,239 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,737 UART: [art] PUB.X = 5F3088594176BCB9EF06369986C6AA6130547D77C39F3AB6D45C1462437F0A94E6DC7771DAE2C4F3AA971D6696E75383
25,167,978 UART: [art] PUB.Y = 48A7FCE2BC54AE2129945F205E72BC390405D0A4CE43C26B10C75385EC34D7004E8683276D6D5266E7E61F01C072E754
25,175,232 UART: [art] SIG.R = 8857ED6FB737370BE9C750252C7A60849A5EAB14F317F8CB2C37B1FF80BF24A01526F9F67F4EC2D00CF1CBF47010A949
25,182,615 UART: [art] SIG.S = 1B0E5FD2F1D8DB65E34110D3DB2787326202F734C912758C6CD719BB3829854C00B9EFF58C9C171DE5AA9928F37BDDD5
26,161,711 UART: Caliptra RT
26,162,404 UART: [state] CFI Enabled
26,279,204 UART: [rt] RT listening for mailbox commands...
26,281,061 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,310,632 UART: [rt]cmd =0x46504c54, len=4
26,311,997 >>> mbox cmd response data (8 bytes)
26,313,001 UART: [rt] FIPS self test
26,313,954 UART: [kat] ++
26,314,408 UART: [kat] sha1
26,318,678 UART: [kat] SHA2-256
26,320,608 UART: [kat] SHA2-384
26,323,588 UART: [kat] SHA2-512-ACC
26,325,831 UART: [kat] ECC-384
27,048,324 UART: Fatal Error: 0x90040004
27,083,765 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,228,255 >>> mbox cmd response: failed
27,228,908 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,373,160 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,106 UART:
190,402 UART: Running Caliptra ROM ...
191,429 UART:
13,162,113 UART: [state] CFI Enabled
13,177,614 UART: [state] LifecycleState = Unprovisioned
13,179,973 UART: [state] DebugLocked = No
13,181,895 UART: [state] WD Timer not started. Device not locked for debugging
13,185,887 UART: [kat] SHA2-256
13,375,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,386,575 UART: [kat] ++
13,387,167 UART: [kat] sha1
13,398,222 UART: [kat] SHA2-256
13,401,249 UART: [kat] SHA2-384
13,408,640 UART: [kat] SHA2-512-ACC
13,411,206 UART: [kat] ECC-384
15,853,885 UART: [kat] HMAC-384Kdf
15,867,525 UART: [kat] LMS
16,399,375 UART: [kat] --
16,403,471 UART: [cold-reset] ++
16,404,427 UART: [fht] FHT @ 0x50003400
16,416,696 UART: [idev] ++
16,417,410 UART: [idev] CDI.KEYID = 6
16,418,327 UART: [idev] SUBJECT.KEYID = 7
16,419,565 UART: [idev] UDS.KEYID = 0
16,421,134 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
16,565,420 UART: [idev] Erasing UDS.KEYID = 0
18,897,174 UART: [idev] Sha1 KeyId Algorithm
18,919,120 UART: [idev] --
18,923,708 UART: [ldev] ++
18,924,383 UART: [ldev] CDI.KEYID = 6
18,925,294 UART: [ldev] SUBJECT.KEYID = 5
18,926,453 UART: [ldev] AUTHORITY.KEYID = 7
18,927,688 UART: [ldev] FE.KEYID = 1
18,937,147 UART: [ldev] Erasing FE.KEYID = 1
21,417,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,135,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,150,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,165,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,180,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,202,040 UART: [ldev] --
23,206,877 UART: [fwproc] Wait for Commands...
23,209,956 UART: [fwproc] Recv command 0x46574c44
23,212,287 UART: [fwproc] Recv'd Img size: 115032 bytes
26,674,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,755,925 UART: [fwproc] Load FMC at address 0x40000000 len 18800
26,872,105 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
27,418,429 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,754,087 ready_for_fw is high
3,754,715 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,966,250 >>> mbox cmd response: success
19,219,450 UART:
19,219,844 UART: Running Caliptra FMC ...
19,220,967 UART:
19,221,121 UART: [state] CFI Enabled
19,228,916 UART: [fht] FMC Alias Private Key: 7
20,986,137 UART: [art] Extend RT PCRs Done
20,987,343 UART: [art] Lock RT PCRs Done
20,989,315 UART: [art] Populate DV Done
20,994,784 UART: [fht] FMC Alias Private Key: 7
20,996,444 UART: [art] Derive CDI
20,997,187 UART: [art] Store in in slot 0x4
21,039,892 UART: [art] Derive Key Pair
21,040,905 UART: [art] Store priv key in slot 0x5
23,467,972 UART: [art] Derive Key Pair - Done
23,480,960 UART: [art] Signing Cert with AUTHO
23,482,282 UART: RITY.KEYID = 7
25,187,638 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,139 UART: [art] PUB.X = 0FF2E385FDC6BAF58D7DEEDDAAC191EFB6E41C4945CDDF0286E4B682D80094433CD7B8BDB335A108C9297399A5C656F2
25,196,451 UART: [art] PUB.Y = F26B8283D268A3DCDB84EB363711EEC201454A978DA5D367DAFA5D16971D741C911353D57E53DD609E9C297DB9CD9900
25,203,673 UART: [art] SIG.R = 64E803C76F3CC38821983F28A5F3390F14FCB787FF2DF5A708D19B30D478E25BAFCB8A5E8CE23D30C66BBEDC38809120
25,211,071 UART: [art] SIG.S = 4004852AADDC910F97E8CFFAE05C5649C86C5A2CA7E6BF6779D6E9791E8E967A165C9D6314A62F44B183BDFB99D586D7
26,189,529 UART: Caliptra RT
26,190,242 UART: [state] CFI Enabled
26,307,363 UART: [rt] RT listening for mailbox commands...
26,309,235 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,338,902 UART: [rt]cmd =0x46504c54, len=4
26,340,531 >>> mbox cmd response data (8 bytes)
26,341,575 UART: [rt] FIPS self test
26,342,526 UART: [kat] ++
26,342,978 UART: [kat] sha1
26,347,594 UART: [kat] SHA2-256
26,349,498 UART: [kat] SHA2-384
26,352,438 UART: [kat] SHA2-512-ACC
26,354,697 UART: [kat] ECC-384
27,077,135 UART: Fatal Error: 0x90040004
27,112,406 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,256,860 >>> mbox cmd response: failed
27,257,474 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,402,361 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
16,280,717 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
27,478,540 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,755 UART: [kat] SHA2-256
881,686 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,801 UART: [kat] ++
885,953 UART: [kat] sha1
890,259 UART: [kat] SHA2-256
892,197 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,312 UART: [kat] HMAC-384Kdf
907,010 UART: [kat] LMS
1,475,206 UART: [kat] --
1,476,211 UART: [cold-reset] ++
1,476,733 UART: [fht] Storing FHT @ 0x50003400
1,479,628 UART: [idev] ++
1,479,796 UART: [idev] CDI.KEYID = 6
1,480,156 UART: [idev] SUBJECT.KEYID = 7
1,480,580 UART: [idev] UDS.KEYID = 0
1,480,925 ready_for_fw is high
1,480,925 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,316 UART: [idev] Erasing UDS.KEYID = 0
1,505,258 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,722 UART: [idev] --
1,514,917 UART: [ldev] ++
1,515,085 UART: [ldev] CDI.KEYID = 6
1,515,448 UART: [ldev] SUBJECT.KEYID = 5
1,515,874 UART: [ldev] AUTHORITY.KEYID = 7
1,516,337 UART: [ldev] FE.KEYID = 1
1,521,485 UART: [ldev] Erasing FE.KEYID = 1
1,547,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,294 UART: [ldev] --
1,586,669 UART: [fwproc] Waiting for Commands...
1,587,334 UART: [fwproc] Received command 0x46574c44
1,588,125 UART: [fwproc] Received Image of size 115032 bytes
2,894,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,896 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,248 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,267 >>> mbox cmd response: success
3,089,503 UART: [afmc] ++
3,089,671 UART: [afmc] CDI.KEYID = 6
3,090,033 UART: [afmc] SUBJECT.KEYID = 7
3,090,458 UART: [afmc] AUTHORITY.KEYID = 5
3,126,437 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,277 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,005 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,890 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,580 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,519 UART: [afmc] --
3,169,461 UART: [cold-reset] --
3,170,319 UART: [state] Locking Datavault
3,171,436 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,040 UART: [state] Locking ICCM
3,172,480 UART: [exit] Launching FMC @ 0x40000130
3,177,809 UART:
3,177,825 UART: Running Caliptra FMC ...
3,178,233 UART:
3,178,287 UART: [state] CFI Enabled
3,188,792 UART: [fht] FMC Alias Private Key: 7
3,296,691 UART: [art] Extend RT PCRs Done
3,297,119 UART: [art] Lock RT PCRs Done
3,298,571 UART: [art] Populate DV Done
3,306,914 UART: [fht] FMC Alias Private Key: 7
3,308,026 UART: [art] Derive CDI
3,308,306 UART: [art] Store in in slot 0x4
3,394,031 UART: [art] Derive Key Pair
3,394,391 UART: [art] Store priv key in slot 0x5
3,407,549 UART: [art] Derive Key Pair - Done
3,422,151 UART: [art] Signing Cert with AUTHO
3,422,631 UART: RITY.KEYID = 7
3,437,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,364 UART: [art] PUB.X = 608AD9D761C77BB4DD19B8B739989750DF154F2427E120ABBDB2AF29FB63615AE5CED2C751626B6FAA1DF001171C3601
3,445,138 UART: [art] PUB.Y = D9D9DBEC4EB60EA144D59A550AD61C2BD97DA2925086DD61431CD952BA73359DAC37BD6F63600810A959CC9DE9794605
3,452,086 UART: [art] SIG.R = 31E23AC5925BDAA0CF9D8CA42E745488CF9FB5A565D79005472FCD9AD21A85A75C96DB2B1048F87D0CE92833DDCB849D
3,458,866 UART: [art] SIG.S = FC003883D79A8D96A53AA9B6022874FCA95F3FD85B9DBA2298BBACE79BC00A4A5A7BACC37EBF9D71C5F8BF5805490A89
3,482,821 UART: Caliptra RT
3,483,074 UART: [state] CFI Enabled
3,591,031 UART: [rt] RT listening for mailbox commands...
3,591,694 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,375 UART: [rt]cmd =0x46504c54, len=4
3,622,597 >>> mbox cmd response data (8 bytes)
3,622,866 UART: [rt] FIPS self test
3,623,194 UART: [kat] ++
3,623,346 UART: [kat] sha1
3,627,680 UART: [kat] SHA2-256
3,629,702 UART: [kat] SHA2-384
3,632,699 UART: [kat] SHA2-512-ACC
3,634,626 UART: [kat] ECC-384
3,638,206 UART: Fatal Error: 0x90040004
3,639,745 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,639,750 >>> mbox cmd response: failed
3,639,750 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,639,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,193 UART: [kat] SHA2-256
882,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,239 UART: [kat] ++
886,391 UART: [kat] sha1
890,811 UART: [kat] SHA2-256
892,749 UART: [kat] SHA2-384
895,644 UART: [kat] SHA2-512-ACC
897,545 UART: [kat] ECC-384
902,714 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,399 UART: [cold-reset] ++
1,476,979 UART: [fht] Storing FHT @ 0x50003400
1,479,780 UART: [idev] ++
1,479,948 UART: [idev] CDI.KEYID = 6
1,480,308 UART: [idev] SUBJECT.KEYID = 7
1,480,732 UART: [idev] UDS.KEYID = 0
1,481,077 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,832 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,436 UART: [idev] --
1,514,651 UART: [ldev] ++
1,514,819 UART: [ldev] CDI.KEYID = 6
1,515,182 UART: [ldev] SUBJECT.KEYID = 5
1,515,608 UART: [ldev] AUTHORITY.KEYID = 7
1,516,071 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,718 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,794 UART: [ldev] --
1,586,247 UART: [fwproc] Waiting for Commands...
1,586,966 UART: [fwproc] Received command 0x46574c44
1,587,757 UART: [fwproc] Received Image of size 115032 bytes
2,893,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,766 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,118 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,085,981 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,353 ready_for_fw is high
1,362,353 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,934,985 >>> mbox cmd response: success
2,996,971 UART:
2,996,987 UART: Running Caliptra FMC ...
2,997,395 UART:
2,997,449 UART: [state] CFI Enabled
3,008,008 UART: [fht] FMC Alias Private Key: 7
3,115,097 UART: [art] Extend RT PCRs Done
3,115,525 UART: [art] Lock RT PCRs Done
3,117,317 UART: [art] Populate DV Done
3,125,680 UART: [fht] FMC Alias Private Key: 7
3,126,858 UART: [art] Derive CDI
3,127,138 UART: [art] Store in in slot 0x4
3,213,097 UART: [art] Derive Key Pair
3,213,457 UART: [art] Store priv key in slot 0x5
3,226,655 UART: [art] Derive Key Pair - Done
3,241,423 UART: [art] Signing Cert with AUTHO
3,241,903 UART: RITY.KEYID = 7
3,257,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,198 UART: [art] PUB.X = AFD5C2474C126D581CCB920410C0C0408D6530C8B65AC1B133764DBA1050C0E983D23FFCD0B0F5B3BAA695989E620C5F
3,264,972 UART: [art] PUB.Y = AC00B5744897F6A67876DB554472E915547DE43A66D6B9CA56D0F34964D88DDF91513BACA46E2773A41C76E66C5AC3D8
3,271,904 UART: [art] SIG.R = B1B9B6C572DC4216D333D0C4AB97AEAB22BBF7ABBE2B437FFBA46233C639913D99F0ABC191E3FF81B31F800E9C24204C
3,278,691 UART: [art] SIG.S = F37F596932DA5560925BF1566020C2B24752EA3E348BECED04E560010224A923E49E6B53B9775002C345C9EF930ED858
3,302,239 UART: Caliptra RT
3,302,492 UART: [state] CFI Enabled
3,409,986 UART: [rt] RT listening for mailbox commands...
3,410,649 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,388 UART: [rt]cmd =0x46504c54, len=4
3,441,494 >>> mbox cmd response data (8 bytes)
3,441,769 UART: [rt] FIPS self test
3,442,097 UART: [kat] ++
3,442,249 UART: [kat] sha1
3,446,391 UART: [kat] SHA2-256
3,448,413 UART: [kat] SHA2-384
3,451,302 UART: [kat] SHA2-512-ACC
3,453,229 UART: [kat] ECC-384
3,456,859 UART: Fatal Error: 0x90040004
3,458,398 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,458,403 >>> mbox cmd response: failed
3,458,403 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,458,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,319 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,709 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,741 UART: [state] LifecycleState = Unprovisioned
86,396 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,474 UART: [kat] SHA2-256
882,405 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,520 UART: [kat] ++
886,672 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,479 UART: [kat] SHA2-512-ACC
897,380 UART: [kat] ECC-384
903,023 UART: [kat] HMAC-384Kdf
907,611 UART: [kat] LMS
1,475,807 UART: [kat] --
1,476,642 UART: [cold-reset] ++
1,477,070 UART: [fht] Storing FHT @ 0x50003400
1,479,957 UART: [idev] ++
1,480,125 UART: [idev] CDI.KEYID = 6
1,480,485 UART: [idev] SUBJECT.KEYID = 7
1,480,909 UART: [idev] UDS.KEYID = 0
1,481,254 ready_for_fw is high
1,481,254 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,845 UART: [idev] Erasing UDS.KEYID = 0
1,505,281 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,921 UART: [idev] --
1,515,026 UART: [ldev] ++
1,515,194 UART: [ldev] CDI.KEYID = 6
1,515,557 UART: [ldev] SUBJECT.KEYID = 5
1,515,983 UART: [ldev] AUTHORITY.KEYID = 7
1,516,446 UART: [ldev] FE.KEYID = 1
1,522,106 UART: [ldev] Erasing FE.KEYID = 1
1,546,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,829 UART: [ldev] --
1,586,100 UART: [fwproc] Waiting for Commands...
1,586,851 UART: [fwproc] Received command 0x46574c44
1,587,642 UART: [fwproc] Received Image of size 115032 bytes
2,891,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,295 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,084,462 >>> mbox cmd response: success
3,085,578 UART: [afmc] ++
3,085,746 UART: [afmc] CDI.KEYID = 6
3,086,108 UART: [afmc] SUBJECT.KEYID = 7
3,086,533 UART: [afmc] AUTHORITY.KEYID = 5
3,121,724 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,312 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,144,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,150,705 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,156,395 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,236 UART: [afmc] --
3,165,322 UART: [cold-reset] --
3,165,936 UART: [state] Locking Datavault
3,166,923 UART: [state] Locking PCR0, PCR1 and PCR31
3,167,527 UART: [state] Locking ICCM
3,168,081 UART: [exit] Launching FMC @ 0x40000130
3,173,410 UART:
3,173,426 UART: Running Caliptra FMC ...
3,173,834 UART:
3,173,977 UART: [state] CFI Enabled
3,184,876 UART: [fht] FMC Alias Private Key: 7
3,293,225 UART: [art] Extend RT PCRs Done
3,293,653 UART: [art] Lock RT PCRs Done
3,295,201 UART: [art] Populate DV Done
3,303,138 UART: [fht] FMC Alias Private Key: 7
3,304,294 UART: [art] Derive CDI
3,304,574 UART: [art] Store in in slot 0x4
3,390,097 UART: [art] Derive Key Pair
3,390,457 UART: [art] Store priv key in slot 0x5
3,403,307 UART: [art] Derive Key Pair - Done
3,418,200 UART: [art] Signing Cert with AUTHO
3,418,680 UART: RITY.KEYID = 7
3,434,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,081 UART: [art] PUB.X = 40216DDE348A361CB715A48C23B0413B6040AA9C8C214202ABF0E97D65C81097487D96B9FD1F8A4A05B3265C8B0362B4
3,441,842 UART: [art] PUB.Y = 6F78CBB430E43F66B9B1C0934BE973F86A81D7C420C2ED8BD4D2E40A0134564846BF35DD7D349C362DA0A3AC1F44A485
3,448,796 UART: [art] SIG.R = 32B05BB289D0317B5DE1E61E8002FF44C71C2D39240B8FB7CBD8952A9D88D6260B538A648BEBDE89A95DE52A14958F64
3,455,565 UART: [art] SIG.S = 535483BEDB001CEFD0576A1FFFE5FC8E0A88FA04F5B81CE4D4AF9FE38B3CED0A4F32131E3550157589333AC22DB55807
3,479,324 UART: Caliptra RT
3,479,669 UART: [state] CFI Enabled
3,587,135 UART: [rt] RT listening for mailbox commands...
3,587,798 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,457 UART: [rt]cmd =0x46504c54, len=4
3,618,687 >>> mbox cmd response data (8 bytes)
3,618,968 UART: [rt] FIPS self test
3,619,296 UART: [kat] ++
3,619,448 UART: [kat] sha1
3,623,632 UART: [kat] SHA2-256
3,625,654 UART: [kat] SHA2-384
3,628,589 UART: [kat] SHA2-512-ACC
3,630,516 UART: [kat] ECC-384
3,634,536 UART: Fatal Error: 0x90040004
3,636,075 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,636,080 >>> mbox cmd response: failed
3,636,080 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,636,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,369 UART: [kat] SHA2-512-ACC
897,270 UART: [kat] ECC-384
902,851 UART: [kat] HMAC-384Kdf
907,473 UART: [kat] LMS
1,475,669 UART: [kat] --
1,476,676 UART: [cold-reset] ++
1,477,240 UART: [fht] Storing FHT @ 0x50003400
1,480,089 UART: [idev] ++
1,480,257 UART: [idev] CDI.KEYID = 6
1,480,617 UART: [idev] SUBJECT.KEYID = 7
1,481,041 UART: [idev] UDS.KEYID = 0
1,481,386 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,371 UART: [idev] Erasing UDS.KEYID = 0
1,506,649 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,227 UART: [idev] --
1,516,206 UART: [ldev] ++
1,516,374 UART: [ldev] CDI.KEYID = 6
1,516,737 UART: [ldev] SUBJECT.KEYID = 5
1,517,163 UART: [ldev] AUTHORITY.KEYID = 7
1,517,626 UART: [ldev] FE.KEYID = 1
1,522,944 UART: [ldev] Erasing FE.KEYID = 1
1,547,717 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,023 UART: [ldev] --
1,587,510 UART: [fwproc] Waiting for Commands...
1,588,217 UART: [fwproc] Received command 0x46574c44
1,589,008 UART: [fwproc] Received Image of size 115032 bytes
2,895,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,093 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,089,294 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,642 ready_for_fw is high
1,362,642 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,474 >>> mbox cmd response: success
2,998,412 UART:
2,998,428 UART: Running Caliptra FMC ...
2,998,836 UART:
2,998,979 UART: [state] CFI Enabled
3,009,934 UART: [fht] FMC Alias Private Key: 7
3,118,083 UART: [art] Extend RT PCRs Done
3,118,511 UART: [art] Lock RT PCRs Done
3,120,457 UART: [art] Populate DV Done
3,128,684 UART: [fht] FMC Alias Private Key: 7
3,129,846 UART: [art] Derive CDI
3,130,126 UART: [art] Store in in slot 0x4
3,215,985 UART: [art] Derive Key Pair
3,216,345 UART: [art] Store priv key in slot 0x5
3,229,835 UART: [art] Derive Key Pair - Done
3,244,747 UART: [art] Signing Cert with AUTHO
3,245,227 UART: RITY.KEYID = 7
3,260,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,020 UART: [art] PUB.X = D04519524F9D80273D9FD2B8246336CDC36484C9B3CBF1A828D5B9BFBDB552851AA1E57F59BB70E19E51CBD81C5D01F0
3,267,799 UART: [art] PUB.Y = C5FDAF9F1D664B76FF30C742A7FFA61AC41D47C25D035CD8450009A71C982945C5D7F55BEB821F469F155102E7919BBF
3,274,728 UART: [art] SIG.R = F51AF57BF1D7CEB48AE46BF155BFAB98475B33DF72EDEBBD4C0AE5125F8B69FF5281DBEC84C115EA1A6F2D0547313CCB
3,281,522 UART: [art] SIG.S = 18B4021E6B7612395E132E26DB021670140244325F0414F81A06AAC557A4D807A16D2F6F0C988DB5B07EB641668CA369
3,305,608 UART: Caliptra RT
3,305,953 UART: [state] CFI Enabled
3,414,842 UART: [rt] RT listening for mailbox commands...
3,415,505 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,294 UART: [rt]cmd =0x46504c54, len=4
3,446,478 >>> mbox cmd response data (8 bytes)
3,446,833 UART: [rt] FIPS self test
3,447,161 UART: [kat] ++
3,447,313 UART: [kat] sha1
3,451,531 UART: [kat] SHA2-256
3,453,553 UART: [kat] SHA2-384
3,456,176 UART: [kat] SHA2-512-ACC
3,458,103 UART: [kat] ECC-384
3,461,631 UART: Fatal Error: 0x90040004
3,463,170 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,463,175 >>> mbox cmd response: failed
3,463,175 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,463,180 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,928 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,876 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,794 UART: [state] LifecycleState = Unprovisioned
85,449 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,158 UART: [kat] SHA2-256
892,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,933 UART: [kat] ++
897,085 UART: [kat] sha1
901,347 UART: [kat] SHA2-256
903,287 UART: [kat] SHA2-384
906,056 UART: [kat] SHA2-512-ACC
907,957 UART: [kat] ECC-384
917,578 UART: [kat] HMAC-384Kdf
922,144 UART: [kat] LMS
1,170,472 UART: [kat] --
1,171,463 UART: [cold-reset] ++
1,171,879 UART: [fht] FHT @ 0x50003400
1,174,584 UART: [idev] ++
1,174,752 UART: [idev] CDI.KEYID = 6
1,175,112 UART: [idev] SUBJECT.KEYID = 7
1,175,536 UART: [idev] UDS.KEYID = 0
1,175,881 ready_for_fw is high
1,175,881 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,628 UART: [idev] Erasing UDS.KEYID = 0
1,200,205 UART: [idev] Sha1 KeyId Algorithm
1,208,847 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,368 UART: [ldev] SUBJECT.KEYID = 5
1,210,794 UART: [ldev] AUTHORITY.KEYID = 7
1,211,257 UART: [ldev] FE.KEYID = 1
1,216,577 UART: [ldev] Erasing FE.KEYID = 1
1,242,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,521 UART: [ldev] --
1,282,008 UART: [fwproc] Wait for Commands...
1,282,720 UART: [fwproc] Recv command 0x46574c44
1,283,448 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,705 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,009 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,984 >>> mbox cmd response: success
2,784,040 UART: [afmc] ++
2,784,208 UART: [afmc] CDI.KEYID = 6
2,784,570 UART: [afmc] SUBJECT.KEYID = 7
2,784,995 UART: [afmc] AUTHORITY.KEYID = 5
2,820,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,683 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,296 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,015 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,925 UART: [afmc] --
2,863,983 UART: [cold-reset] --
2,864,903 UART: [state] Locking Datavault
2,866,014 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,618 UART: [state] Locking ICCM
2,867,198 UART: [exit] Launching FMC @ 0x40000130
2,872,527 UART:
2,872,543 UART: Running Caliptra FMC ...
2,872,951 UART:
2,873,005 UART: [state] CFI Enabled
2,883,424 UART: [fht] FMC Alias Private Key: 7
2,991,315 UART: [art] Extend RT PCRs Done
2,991,743 UART: [art] Lock RT PCRs Done
2,993,289 UART: [art] Populate DV Done
3,001,632 UART: [fht] FMC Alias Private Key: 7
3,002,714 UART: [art] Derive CDI
3,002,994 UART: [art] Store in in slot 0x4
3,088,653 UART: [art] Derive Key Pair
3,089,013 UART: [art] Store priv key in slot 0x5
3,102,075 UART: [art] Derive Key Pair - Done
3,116,817 UART: [art] Signing Cert with AUTHO
3,117,297 UART: RITY.KEYID = 7
3,131,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,764 UART: [art] PUB.X = 79FE10FA23C85A211AF67873730EC166939F62DD482FF13F7C20B8E71CEC48BD2F11E9BC69FB4F050B1DC51870FFB798
3,139,537 UART: [art] PUB.Y = 8A9A90D7C97D490BC6264F69F232B92334B1233143B849EB84835F4DA707367223EB5664B9744569CECDE0D4E7A08846
3,146,475 UART: [art] SIG.R = CB9C078BE131AD685CB0E12B44441FAB39AE4F6B750E52F401A68785AB3785C8720622E52DC5628B638C1387B6854301
3,153,228 UART: [art] SIG.S = 72EB85A754E245F8E5472B0516684C04EBCCDCC42248889312C730F243C5A91D56BA3F471E65469DDC58EBD5763D9552
3,176,631 UART: Caliptra RT
3,176,884 UART: [state] CFI Enabled
3,284,669 UART: [rt] RT listening for mailbox commands...
3,285,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,313 UART: [rt]cmd =0x46504c54, len=4
3,316,467 >>> mbox cmd response data (8 bytes)
3,316,798 UART: [rt] FIPS self test
3,317,126 UART: [kat] ++
3,317,278 UART: [kat] sha1
3,321,472 UART: [kat] SHA2-256
3,323,494 UART: [kat] SHA2-384
3,326,359 UART: [kat] SHA2-512-ACC
3,328,286 UART: [kat] ECC-384
3,331,982 UART: Fatal Error: 0x90040004
3,333,521 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,526 >>> mbox cmd response: failed
3,333,526 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
893,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,145 UART: [kat] ++
897,297 UART: [kat] sha1
901,615 UART: [kat] SHA2-256
903,555 UART: [kat] SHA2-384
906,196 UART: [kat] SHA2-512-ACC
908,097 UART: [kat] ECC-384
918,170 UART: [kat] HMAC-384Kdf
922,868 UART: [kat] LMS
1,171,196 UART: [kat] --
1,171,951 UART: [cold-reset] ++
1,172,299 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,760 UART: [idev] Erasing UDS.KEYID = 0
1,200,121 UART: [idev] Sha1 KeyId Algorithm
1,208,593 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,232 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,193 UART: [ldev] Erasing FE.KEYID = 1
1,243,180 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,269 UART: [ldev] --
1,282,560 UART: [fwproc] Wait for Commands...
1,283,152 UART: [fwproc] Recv command 0x46574c44
1,283,880 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,697 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,001 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,744 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,561 ready_for_fw is high
1,060,561 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,339 >>> mbox cmd response: success
2,697,339 UART:
2,697,355 UART: Running Caliptra FMC ...
2,697,763 UART:
2,697,817 UART: [state] CFI Enabled
2,708,452 UART: [fht] FMC Alias Private Key: 7
2,816,815 UART: [art] Extend RT PCRs Done
2,817,243 UART: [art] Lock RT PCRs Done
2,819,017 UART: [art] Populate DV Done
2,827,200 UART: [fht] FMC Alias Private Key: 7
2,828,362 UART: [art] Derive CDI
2,828,642 UART: [art] Store in in slot 0x4
2,914,233 UART: [art] Derive Key Pair
2,914,593 UART: [art] Store priv key in slot 0x5
2,928,303 UART: [art] Derive Key Pair - Done
2,942,992 UART: [art] Signing Cert with AUTHO
2,943,472 UART: RITY.KEYID = 7
2,958,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,083 UART: [art] PUB.X = 43B1AB8E4565A9578CA775155896C8E98181CB0635ECE99FE9E3AD95A2B79254F59F4BD534650EF2E0051CFA8DCB7143
2,965,850 UART: [art] PUB.Y = AD377E7315B9C4F13065116B42F4530107480DB6F032BE95E4AC2AC37E67E039D1FE0543BBD13426FCFB7821445F0D17
2,972,787 UART: [art] SIG.R = DD29442A154D6656E2BE72F19CDF240448B6789F704AA13F4F48931B1E21AC1FAC67546416804415128707A8509D2E22
2,979,543 UART: [art] SIG.S = B43B67C2C4435E581C34AB6C475F333448ABC56943F070618FBFD8DC05A3132FD94435DA7F0E3F5718F7E76F23BE58BA
3,003,134 UART: Caliptra RT
3,003,387 UART: [state] CFI Enabled
3,111,261 UART: [rt] RT listening for mailbox commands...
3,111,924 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,727 UART: [rt]cmd =0x46504c54, len=4
3,142,743 >>> mbox cmd response data (8 bytes)
3,143,050 UART: [rt] FIPS self test
3,143,378 UART: [kat] ++
3,143,530 UART: [kat] sha1
3,147,860 UART: [kat] SHA2-256
3,149,882 UART: [kat] SHA2-384
3,152,577 UART: [kat] SHA2-512-ACC
3,154,504 UART: [kat] ECC-384
3,158,464 UART: Fatal Error: 0x90040004
3,160,003 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,160,008 >>> mbox cmd response: failed
3,160,008 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,160,013 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,849 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,093 UART: [state] LifecycleState = Unprovisioned
86,748 UART: [state] DebugLocked = No
87,328 UART: [state] WD Timer not started. Device not locked for debugging
88,451 UART: [kat] SHA2-256
894,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,226 UART: [kat] ++
898,378 UART: [kat] sha1
902,706 UART: [kat] SHA2-256
904,646 UART: [kat] SHA2-384
907,235 UART: [kat] SHA2-512-ACC
909,136 UART: [kat] ECC-384
918,827 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,708 UART: [cold-reset] ++
1,173,288 UART: [fht] FHT @ 0x50003400
1,176,139 UART: [idev] ++
1,176,307 UART: [idev] CDI.KEYID = 6
1,176,667 UART: [idev] SUBJECT.KEYID = 7
1,177,091 UART: [idev] UDS.KEYID = 0
1,177,436 ready_for_fw is high
1,177,436 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,185,177 UART: [idev] Erasing UDS.KEYID = 0
1,202,168 UART: [idev] Sha1 KeyId Algorithm
1,210,582 UART: [idev] --
1,211,662 UART: [ldev] ++
1,211,830 UART: [ldev] CDI.KEYID = 6
1,212,193 UART: [ldev] SUBJECT.KEYID = 5
1,212,619 UART: [ldev] AUTHORITY.KEYID = 7
1,213,082 UART: [ldev] FE.KEYID = 1
1,218,518 UART: [ldev] Erasing FE.KEYID = 1
1,245,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,508 UART: [ldev] --
1,283,783 UART: [fwproc] Wait for Commands...
1,284,407 UART: [fwproc] Recv command 0x46574c44
1,285,135 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,410 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,714 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,561 >>> mbox cmd response: success
2,785,799 UART: [afmc] ++
2,785,967 UART: [afmc] CDI.KEYID = 6
2,786,329 UART: [afmc] SUBJECT.KEYID = 7
2,786,754 UART: [afmc] AUTHORITY.KEYID = 5
2,822,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,712 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,440 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,325 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,044 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,840 UART: [afmc] --
2,865,770 UART: [cold-reset] --
2,866,662 UART: [state] Locking Datavault
2,867,925 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,529 UART: [state] Locking ICCM
2,869,049 UART: [exit] Launching FMC @ 0x40000130
2,874,378 UART:
2,874,394 UART: Running Caliptra FMC ...
2,874,802 UART:
2,874,945 UART: [state] CFI Enabled
2,885,982 UART: [fht] FMC Alias Private Key: 7
2,994,977 UART: [art] Extend RT PCRs Done
2,995,405 UART: [art] Lock RT PCRs Done
2,996,987 UART: [art] Populate DV Done
3,005,208 UART: [fht] FMC Alias Private Key: 7
3,006,198 UART: [art] Derive CDI
3,006,478 UART: [art] Store in in slot 0x4
3,091,977 UART: [art] Derive Key Pair
3,092,337 UART: [art] Store priv key in slot 0x5
3,105,627 UART: [art] Derive Key Pair - Done
3,120,269 UART: [art] Signing Cert with AUTHO
3,120,749 UART: RITY.KEYID = 7
3,135,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,136,622 UART: [art] PUB.X = BB9336908EFB47FA2F91411D586412FD7DB90E9A41F24A4C962A21B02C43BB2CCC65537A647BBAE9AFC0AD5BCDC2F1C8
3,143,411 UART: [art] PUB.Y = 9C9DC23A095D2E0B84D6E017875205DC1444B7ADE9BD8E704968ED46D9A8F16E76BCC082393E5F6513627F44CF86D2FE
3,150,360 UART: [art] SIG.R = C8803FC720FA77C0A89261D16005DFA81C5C132F8C764459B3EFAF3619CCCC0C271D65279EF4249B005517708212E7D2
3,157,102 UART: [art] SIG.S = 4E88A3BABD7BA5C43BF8809C22FE1A443D518F587223AACE6CA06898D4BC99C0995E5B905A0149ECF1E100E47A10DA37
3,180,758 UART: Caliptra RT
3,181,103 UART: [state] CFI Enabled
3,288,616 UART: [rt] RT listening for mailbox commands...
3,289,279 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,144 UART: [rt]cmd =0x46504c54, len=4
3,320,348 >>> mbox cmd response data (8 bytes)
3,320,665 UART: [rt] FIPS self test
3,320,993 UART: [kat] ++
3,321,145 UART: [kat] sha1
3,325,219 UART: [kat] SHA2-256
3,327,241 UART: [kat] SHA2-384
3,330,142 UART: [kat] SHA2-512-ACC
3,332,069 UART: [kat] ECC-384
3,336,119 UART: Fatal Error: 0x90040004
3,337,658 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,663 >>> mbox cmd response: failed
3,337,663 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,337,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
893,741 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,866 UART: [kat] ++
898,018 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
918,773 UART: [kat] HMAC-384Kdf
923,329 UART: [kat] LMS
1,171,657 UART: [kat] --
1,172,246 UART: [cold-reset] ++
1,172,664 UART: [fht] FHT @ 0x50003400
1,175,319 UART: [idev] ++
1,175,487 UART: [idev] CDI.KEYID = 6
1,175,847 UART: [idev] SUBJECT.KEYID = 7
1,176,271 UART: [idev] UDS.KEYID = 0
1,176,616 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,249 UART: [idev] Erasing UDS.KEYID = 0
1,201,028 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,546 UART: [ldev] ++
1,210,714 UART: [ldev] CDI.KEYID = 6
1,211,077 UART: [ldev] SUBJECT.KEYID = 5
1,211,503 UART: [ldev] AUTHORITY.KEYID = 7
1,211,966 UART: [ldev] FE.KEYID = 1
1,216,938 UART: [ldev] Erasing FE.KEYID = 1
1,243,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,250 UART: [ldev] --
1,282,611 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,708 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,012 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,995 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,332 ready_for_fw is high
1,061,332 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,662 >>> mbox cmd response: success
2,697,632 UART:
2,697,648 UART: Running Caliptra FMC ...
2,698,056 UART:
2,698,199 UART: [state] CFI Enabled
2,708,868 UART: [fht] FMC Alias Private Key: 7
2,817,851 UART: [art] Extend RT PCRs Done
2,818,279 UART: [art] Lock RT PCRs Done
2,819,635 UART: [art] Populate DV Done
2,827,686 UART: [fht] FMC Alias Private Key: 7
2,828,790 UART: [art] Derive CDI
2,829,070 UART: [art] Store in in slot 0x4
2,914,361 UART: [art] Derive Key Pair
2,914,721 UART: [art] Store priv key in slot 0x5
2,928,089 UART: [art] Derive Key Pair - Done
2,942,439 UART: [art] Signing Cert with AUTHO
2,942,919 UART: RITY.KEYID = 7
2,958,411 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,176 UART: [art] PUB.X = 53957D0A9BC3991F1B08639C0BFEAC84219118A4CC47EC746710B1E5C30C8D1681DB27239E46E205F65F264A7714302E
2,965,929 UART: [art] PUB.Y = A399ACCA5634F7BE9C1ED3F92CBDDEBB91BA12606A2D255808857B402A911E41419BAE1F7F600FB7608462DA9A951A88
2,972,885 UART: [art] SIG.R = 3B98F7E701D75DFD2C43B56308DC019B9D64CA0EFC2E1E40037E68AFAFDB951FF6D40AED464F85FED9222E46D276E0DC
2,979,659 UART: [art] SIG.S = 23987C78C5663991F0FA864CB7FFE68C7B4F54574FBE14F7D562025FD6BEC1D57603C4729EC8B680B4FA6482F55D2D67
3,004,044 UART: Caliptra RT
3,004,389 UART: [state] CFI Enabled
3,112,456 UART: [rt] RT listening for mailbox commands...
3,113,119 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,826 UART: [rt]cmd =0x46504c54, len=4
3,143,864 >>> mbox cmd response data (8 bytes)
3,144,109 UART: [rt] FIPS self test
3,144,437 UART: [kat] ++
3,144,589 UART: [kat] sha1
3,148,855 UART: [kat] SHA2-256
3,150,877 UART: [kat] SHA2-384
3,153,730 UART: [kat] SHA2-512-ACC
3,155,657 UART: [kat] ECC-384
3,159,477 UART: Fatal Error: 0x90040004
3,161,016 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,161,021 >>> mbox cmd response: failed
3,161,021 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,161,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,718 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,456 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,299 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,880 UART: [kat] HMAC-384Kdf
920,426 UART: [kat] LMS
1,168,738 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,699 UART: [idev] ++
1,172,867 UART: [idev] CDI.KEYID = 6
1,173,228 UART: [idev] SUBJECT.KEYID = 7
1,173,653 UART: [idev] UDS.KEYID = 0
1,173,999 ready_for_fw is high
1,173,999 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,505 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,628 UART: [ldev] ++
1,208,796 UART: [ldev] CDI.KEYID = 6
1,209,160 UART: [ldev] SUBJECT.KEYID = 5
1,209,587 UART: [ldev] AUTHORITY.KEYID = 7
1,210,050 UART: [ldev] FE.KEYID = 1
1,214,996 UART: [ldev] Erasing FE.KEYID = 1
1,241,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,496 UART: [ldev] --
1,280,982 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,127 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,915 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,224 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,040 >>> mbox cmd response: success
2,781,099 UART: [afmc] ++
2,781,267 UART: [afmc] CDI.KEYID = 6
2,781,630 UART: [afmc] SUBJECT.KEYID = 7
2,782,056 UART: [afmc] AUTHORITY.KEYID = 5
2,817,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,063 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,814 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,543 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,426 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,145 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,888 UART: [afmc] --
2,861,006 UART: [cold-reset] --
2,861,922 UART: [state] Locking Datavault
2,863,287 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,891 UART: [state] Locking ICCM
2,864,525 UART: [exit] Launching FMC @ 0x40000130
2,869,854 UART:
2,869,870 UART: Running Caliptra FMC ...
2,870,278 UART:
2,870,332 UART: [state] CFI Enabled
2,880,933 UART: [fht] FMC Alias Private Key: 7
2,989,592 UART: [art] Extend RT PCRs Done
2,990,020 UART: [art] Lock RT PCRs Done
2,991,594 UART: [art] Populate DV Done
2,999,731 UART: [fht] FMC Alias Private Key: 7
3,000,905 UART: [art] Derive CDI
3,001,185 UART: [art] Store in in slot 0x4
3,086,556 UART: [art] Derive Key Pair
3,086,916 UART: [art] Store priv key in slot 0x5
3,099,862 UART: [art] Derive Key Pair - Done
3,114,576 UART: [art] Signing Cert with AUTHO
3,115,056 UART: RITY.KEYID = 7
3,130,340 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,105 UART: [art] PUB.X = 1160DE18500C00F8B227AB1CF354D5DB5AAE2D3A535A4E3E2B85E0E0D60AE772F66EDCBF714EDB78CBD5953C3057BF36
3,137,867 UART: [art] PUB.Y = 71F47789BF212B95A70DF10835602D0E1AB0CAAEEF80F0189013FC582E5BABBE0FE6EC4EBDEF13EE024AD9BAA1B84007
3,144,823 UART: [art] SIG.R = 49F7E2619EE9DF57E55A37AEE289B40866886D78782277EC181A5AE6B690478DE011B9D3724896FC6DE8A7FF01CB1959
3,151,589 UART: [art] SIG.S = C09B1278D605282DB55F0A980F35AED73F238E7CD241A4A600A09D1E2CF26E7D9E38B9545BA3EEACB03FD986C161453A
3,175,363 UART: Caliptra RT
3,175,616 UART: [state] CFI Enabled
3,284,249 UART: [rt] RT listening for mailbox commands...
3,284,912 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,043 UART: [rt]cmd =0x46504c54, len=4
3,316,223 >>> mbox cmd response data (8 bytes)
3,316,390 UART: [rt] FIPS self test
3,316,718 UART: [kat] ++
3,316,870 UART: [kat] sha1
3,321,186 UART: [kat] SHA2-256
3,323,208 UART: [kat] SHA2-384
3,326,291 UART: [kat] SHA2-512-ACC
3,328,218 UART: [kat] ECC-384
3,331,890 UART: Fatal Error: 0x90040004
3,333,429 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,434 >>> mbox cmd response: failed
3,333,434 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,439 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,412 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,884 UART: [kat] SHA2-256
891,434 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,563 UART: [kat] ++
895,715 UART: [kat] sha1
899,805 UART: [kat] SHA2-256
901,745 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
915,632 UART: [kat] HMAC-384Kdf
920,102 UART: [kat] LMS
1,168,414 UART: [kat] --
1,169,145 UART: [cold-reset] ++
1,169,707 UART: [fht] FHT @ 0x50003400
1,172,301 UART: [idev] ++
1,172,469 UART: [idev] CDI.KEYID = 6
1,172,830 UART: [idev] SUBJECT.KEYID = 7
1,173,255 UART: [idev] UDS.KEYID = 0
1,173,601 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,135 UART: [idev] Erasing UDS.KEYID = 0
1,197,771 UART: [idev] Sha1 KeyId Algorithm
1,206,625 UART: [idev] --
1,207,648 UART: [ldev] ++
1,207,816 UART: [ldev] CDI.KEYID = 6
1,208,180 UART: [ldev] SUBJECT.KEYID = 5
1,208,607 UART: [ldev] AUTHORITY.KEYID = 7
1,209,070 UART: [ldev] FE.KEYID = 1
1,214,082 UART: [ldev] Erasing FE.KEYID = 1
1,240,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,924 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,051 UART: [fwproc] Recv command 0x46574c44
1,281,784 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,609 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,918 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,746 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,100 ready_for_fw is high
1,056,100 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,688 >>> mbox cmd response: success
2,691,144 UART:
2,691,160 UART: Running Caliptra FMC ...
2,691,568 UART:
2,691,622 UART: [state] CFI Enabled
2,702,011 UART: [fht] FMC Alias Private Key: 7
2,809,832 UART: [art] Extend RT PCRs Done
2,810,260 UART: [art] Lock RT PCRs Done
2,811,812 UART: [art] Populate DV Done
2,819,925 UART: [fht] FMC Alias Private Key: 7
2,820,911 UART: [art] Derive CDI
2,821,191 UART: [art] Store in in slot 0x4
2,907,054 UART: [art] Derive Key Pair
2,907,414 UART: [art] Store priv key in slot 0x5
2,920,354 UART: [art] Derive Key Pair - Done
2,935,358 UART: [art] Signing Cert with AUTHO
2,935,838 UART: RITY.KEYID = 7
2,951,172 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,937 UART: [art] PUB.X = C006FE1B197047F440F6BC1928DBDFBBB45EA73255D36263F0BE93B4648A092A62529D3C7DC5957DD42C11BDA143CA15
2,958,711 UART: [art] PUB.Y = 98B5AA0835CE22374AB1E75DE0598CE3801AFAD75FF71077A17FE4932EAFF2C074269677AFB367199573286AB4033369
2,965,655 UART: [art] SIG.R = 5CBE20579E51C3FA94A2D9FE6625D6B02EF2CC48920BCD7084437811B7E14FC1CFEFB705B7A001BB39B2A6A8879B7949
2,972,428 UART: [art] SIG.S = FC3C117024BEE4C14646619CAFD58661FC33512AE2F0D54588B086570D868BB499FE63ECAF48A3099FC0718049D4AE24
2,996,645 UART: Caliptra RT
2,996,898 UART: [state] CFI Enabled
3,104,925 UART: [rt] RT listening for mailbox commands...
3,105,588 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,335 UART: [rt]cmd =0x46504c54, len=4
3,136,545 >>> mbox cmd response data (8 bytes)
3,136,742 UART: [rt] FIPS self test
3,137,070 UART: [kat] ++
3,137,222 UART: [kat] sha1
3,141,386 UART: [kat] SHA2-256
3,143,408 UART: [kat] SHA2-384
3,146,277 UART: [kat] SHA2-512-ACC
3,148,204 UART: [kat] ECC-384
3,152,020 UART: Fatal Error: 0x90040004
3,153,559 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,153,564 >>> mbox cmd response: failed
3,153,564 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,153,569 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,062 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,850 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,733 UART: [kat] LMS
1,169,045 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,000 UART: [idev] ++
1,173,168 UART: [idev] CDI.KEYID = 6
1,173,529 UART: [idev] SUBJECT.KEYID = 7
1,173,954 UART: [idev] UDS.KEYID = 0
1,174,300 ready_for_fw is high
1,174,300 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,199,292 UART: [idev] Sha1 KeyId Algorithm
1,208,172 UART: [idev] --
1,209,313 UART: [ldev] ++
1,209,481 UART: [ldev] CDI.KEYID = 6
1,209,845 UART: [ldev] SUBJECT.KEYID = 5
1,210,272 UART: [ldev] AUTHORITY.KEYID = 7
1,210,735 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,087 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,994 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,303 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,173 >>> mbox cmd response: success
2,782,240 UART: [afmc] ++
2,782,408 UART: [afmc] CDI.KEYID = 6
2,782,771 UART: [afmc] SUBJECT.KEYID = 7
2,783,197 UART: [afmc] AUTHORITY.KEYID = 5
2,818,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,632 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,383 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,112 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,995 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,714 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,633 UART: [afmc] --
2,862,605 UART: [cold-reset] --
2,863,357 UART: [state] Locking Datavault
2,864,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,992 UART: [state] Locking ICCM
2,865,612 UART: [exit] Launching FMC @ 0x40000130
2,870,941 UART:
2,870,957 UART: Running Caliptra FMC ...
2,871,365 UART:
2,871,508 UART: [state] CFI Enabled
2,881,891 UART: [fht] FMC Alias Private Key: 7
2,990,244 UART: [art] Extend RT PCRs Done
2,990,672 UART: [art] Lock RT PCRs Done
2,992,138 UART: [art] Populate DV Done
3,000,379 UART: [fht] FMC Alias Private Key: 7
3,001,427 UART: [art] Derive CDI
3,001,707 UART: [art] Store in in slot 0x4
3,087,612 UART: [art] Derive Key Pair
3,087,972 UART: [art] Store priv key in slot 0x5
3,101,724 UART: [art] Derive Key Pair - Done
3,116,393 UART: [art] Signing Cert with AUTHO
3,116,873 UART: RITY.KEYID = 7
3,132,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,998 UART: [art] PUB.X = D28755367D65A0FAF05E24E43A7DC3CC350982181FFAC4BC31E0617F08204072F26E17A6C84921337CF54E6EF0863489
3,139,760 UART: [art] PUB.Y = 45AF2F2185A20A5E3496DF5BDB1B22749534AFB3143E87E141E618F74FD3F2B9B764FCFFFBC105EDC3362DC5AE0919B4
3,146,717 UART: [art] SIG.R = 9E49C8A39AD19D878E8F2C50829F3DB78836861DE84CD60DA7DEC1AAB66D74619D35CD3065532F0ED94998447708BEBE
3,153,486 UART: [art] SIG.S = 6900EE85A5A4578407F0364CE22ACE8E79B3C63C2BEB81F30517B31D6D0A46847BFFCE6ABD061267D031C7291AEF2530
3,177,581 UART: Caliptra RT
3,177,926 UART: [state] CFI Enabled
3,285,923 UART: [rt] RT listening for mailbox commands...
3,286,586 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,329 UART: [rt]cmd =0x46504c54, len=4
3,317,591 >>> mbox cmd response data (8 bytes)
3,317,932 UART: [rt] FIPS self test
3,318,260 UART: [kat] ++
3,318,412 UART: [kat] sha1
3,322,700 UART: [kat] SHA2-256
3,324,722 UART: [kat] SHA2-384
3,327,619 UART: [kat] SHA2-512-ACC
3,329,546 UART: [kat] ECC-384
3,333,164 UART: Fatal Error: 0x90040004
3,334,703 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,334,708 >>> mbox cmd response: failed
3,334,708 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,334,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,501 UART: [kat] SHA2-512-ACC
906,402 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,169,930 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,938 UART: [idev] Erasing UDS.KEYID = 0
1,198,790 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,487 UART: [ldev] ++
1,208,655 UART: [ldev] CDI.KEYID = 6
1,209,019 UART: [ldev] SUBJECT.KEYID = 5
1,209,446 UART: [ldev] AUTHORITY.KEYID = 7
1,209,909 UART: [ldev] FE.KEYID = 1
1,215,197 UART: [ldev] Erasing FE.KEYID = 1
1,241,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,559 UART: [ldev] --
1,280,825 UART: [fwproc] Wait for Commands...
1,281,600 UART: [fwproc] Recv command 0x46574c44
1,282,333 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,732 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,041 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,841 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,445 ready_for_fw is high
1,056,445 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,929 >>> mbox cmd response: success
2,693,449 UART:
2,693,465 UART: Running Caliptra FMC ...
2,693,873 UART:
2,694,016 UART: [state] CFI Enabled
2,704,735 UART: [fht] FMC Alias Private Key: 7
2,812,602 UART: [art] Extend RT PCRs Done
2,813,030 UART: [art] Lock RT PCRs Done
2,814,350 UART: [art] Populate DV Done
2,822,657 UART: [fht] FMC Alias Private Key: 7
2,823,725 UART: [art] Derive CDI
2,824,005 UART: [art] Store in in slot 0x4
2,909,666 UART: [art] Derive Key Pair
2,910,026 UART: [art] Store priv key in slot 0x5
2,923,404 UART: [art] Derive Key Pair - Done
2,938,299 UART: [art] Signing Cert with AUTHO
2,938,779 UART: RITY.KEYID = 7
2,953,785 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,550 UART: [art] PUB.X = 08E7024029F75B845824C86C67C03D2AC95705C3CBC9BEB03324296AE5BAEAF1FEDAA7FF2D58DDD28EC116CA223D3B90
2,961,329 UART: [art] PUB.Y = 1CB69AA4697E30DC00212502BA71CBE4DF13665C629C0298F3E9DB2F309A7D8BBE156EF0031011884904FD1E2FD22803
2,968,246 UART: [art] SIG.R = 6F2F497D3952F4F27B07D375D46887048586D6BB8BFFA72F8E6EE3A76A8F164FB87A5CF1BE574D4F9D9487824BAED20E
2,975,019 UART: [art] SIG.S = 63801E7FD38E015CADC1100B4A5D0BD3D4E44F52F2C3292F6CA7FFABC661F9FF15CFDDB7BDB947F5748FA9B5AD4A45FF
2,998,705 UART: Caliptra RT
2,999,050 UART: [state] CFI Enabled
3,107,393 UART: [rt] RT listening for mailbox commands...
3,108,056 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,709 UART: [rt]cmd =0x46504c54, len=4
3,138,835 >>> mbox cmd response data (8 bytes)
3,139,022 UART: [rt] FIPS self test
3,139,350 UART: [kat] ++
3,139,502 UART: [kat] sha1
3,143,704 UART: [kat] SHA2-256
3,145,726 UART: [kat] SHA2-384
3,148,511 UART: [kat] SHA2-512-ACC
3,150,438 UART: [kat] ECC-384
3,154,114 UART: Fatal Error: 0x90040004
3,155,653 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,155,658 >>> mbox cmd response: failed
3,155,658 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,155,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,969 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,983 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
5,979,598 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,123,459 >>> mbox cmd response: failed
6,124,003 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,267,037 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
4,879,558 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,478,532 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
5,980,695 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,124,530 >>> mbox cmd response: failed
6,125,104 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,268,088 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
4,875,878 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,442,315 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
6,308,274 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,451,916 >>> mbox cmd response: failed
6,452,505 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,595,492 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
18,456,735 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,899,770 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,317 writing to cptra_bootfsm_go
6,297,864 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,441,710 >>> mbox cmd response: failed
6,442,268 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,585,233 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
18,473,496 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,905,555 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
5,166,805 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,311,134 >>> mbox cmd response: failed
5,311,702 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,455,097 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,442,165 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,274,883 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
5,191,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,336,067 >>> mbox cmd response: failed
5,336,640 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,480,014 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,462,241 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,397 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,481 writing to cptra_bootfsm_go
5,509,510 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,653,608 >>> mbox cmd response: failed
5,654,160 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,797,536 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
17,849,240 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,570,441 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
5,505,704 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,650,058 >>> mbox cmd response: failed
5,650,616 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,793,848 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
17,851,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,572,396 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
5,147,895 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,292,232 >>> mbox cmd response: failed
5,292,778 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,437,236 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,420,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,249,671 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
5,179,758 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,324,572 >>> mbox cmd response: failed
5,325,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,468,467 >>> mbox cmd response: failed
Initializing fuses
985 writing to cptra_bootfsm_go
3,443,523 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,257,563 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
5,514,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,659,344 >>> mbox cmd response: failed
5,659,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,803,347 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,845,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,556,430 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
5,507,177 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,651,990 >>> mbox cmd response: failed
5,652,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,795,973 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
17,860,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,552,471 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,879 >>> mbox cmd response: failed
822,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,305 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,653 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,195 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,203 >>> mbox cmd response: failed
822,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,529 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,157 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,732 >>> mbox cmd response: failed
822,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,796 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,832 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,840 >>> mbox cmd response: failed
822,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,866 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
821,575 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,583 >>> mbox cmd response: failed
821,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
821,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,373 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,591 >>> mbox cmd response: failed
822,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,647 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,385 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,466 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,474 >>> mbox cmd response: failed
823,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,480 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,702 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,318 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,326 >>> mbox cmd response: failed
823,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,640 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,351 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,359 >>> mbox cmd response: failed
822,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,561 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,491 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,499 >>> mbox cmd response: failed
822,499 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,505 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,785 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,966 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,974 >>> mbox cmd response: failed
822,974 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,980 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,402 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,284 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
822,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,532 >>> mbox cmd response: failed
822,532 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
822,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,216 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,356 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,225 UART:
192,581 UART: Running Caliptra ROM ...
193,753 UART:
193,905 UART: [state] CFI Enabled
266,210 UART: [state] LifecycleState = Unprovisioned
268,208 UART: [state] DebugLocked = No
270,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,707 UART: [kat] SHA2-256
444,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,949 UART: [kat] ++
455,479 UART: [kat] sha1
466,576 UART: [kat] SHA2-256
469,230 UART: [kat] SHA2-384
475,998 UART: [kat] SHA2-512-ACC
478,379 UART: [kat] ECC-384
2,766,418 UART: [kat] HMAC-384Kdf
2,792,043 UART: [kat] LMS
3,982,341 UART: [kat] --
3,984,367 UART: [cold-reset] ++
3,986,165 UART: [fht] Storing FHT @ 0x50003400
3,997,950 UART: [idev] ++
3,998,564 UART: [idev] CDI.KEYID = 6
3,999,503 UART: [idev] SUBJECT.KEYID = 7
4,000,687 UART: [idev] UDS.KEYID = 0
4,001,741 ready_for_fw is high
4,001,964 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,146,160 UART: [idev] Erasing UDS.KEYID = 0
7,337,629 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,195 UART: [idev] --
7,364,495 UART: [ldev] ++
7,365,067 UART: [ldev] CDI.KEYID = 6
7,366,054 UART: [ldev] SUBJECT.KEYID = 5
7,367,214 UART: [ldev] AUTHORITY.KEYID = 7
7,368,500 UART: [ldev] FE.KEYID = 1
7,416,800 UART: [ldev] Erasing FE.KEYID = 1
10,752,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,263 UART: [ldev] --
13,121,111 UART: [fwproc] Waiting for Commands...
13,123,268 UART: [fwproc] Received command 0x46574c44
13,125,456 UART: [fwproc] Received Image of size 114716 bytes
17,194,467 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,342,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,661,782 >>> mbox cmd response: success
17,665,582 UART: [afmc] ++
17,666,172 UART: [afmc] CDI.KEYID = 6
17,667,162 UART: [afmc] SUBJECT.KEYID = 7
17,668,378 UART: [afmc] AUTHORITY.KEYID = 5
21,038,200 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,334,375 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,336,646 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,351,054 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,365,865 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,380,461 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,401,706 UART: [afmc] --
23,405,304 UART: [cold-reset] --
23,409,434 UART: [state] Locking Datavault
23,415,977 UART: [state] Locking PCR0, PCR1 and PCR31
23,417,736 UART: [state] Locking ICCM
23,419,349 UART: [exit] Launching FMC @ 0x40000130
23,427,749 UART:
23,427,986 UART: Running Caliptra FMC ...
23,429,092 UART:
23,429,259 UART: [state] CFI Enabled
23,496,395 UART: [fht] FMC Alias Private Key: 7
25,834,414 UART: [art] Extend RT PCRs Done
25,835,655 UART: [art] Lock RT PCRs Done
25,837,364 UART: [art] Populate DV Done
25,842,881 UART: [fht] FMC Alias Private Key: 7
25,844,529 UART: [art] Derive CDI
25,845,344 UART: [art] Store in in slot 0x4
25,906,503 UART: [art] Derive Key Pair
25,907,501 UART: [art] Store priv key in slot 0x5
29,200,642 UART: [art] Derive Key Pair - Done
29,213,528 UART: [art] Signing Cert with AUTHO
29,214,829 UART: RITY.KEYID = 7
31,501,799 UART: [art] Erasing AUTHORITY.KEYID = 7
31,503,298 UART: [art] PUB.X = 1A8905D622925CAAC2DC6F745B61C46E015471D435BE0A554C79F1468460B350463581306A877D06B3C7C36BBE7AFD24
31,510,663 UART: [art] PUB.Y = E8E5F00908E3A84EFF65FFDD44C7952C26706EE2577197F415CA2D2250CDB6DADE156CB05EA949F01CC4A1DB92AF6A53
31,517,813 UART: [art] SIG.R = CC626798240B0123FC8A7F42D48DDEC518A1BF4AAFB6BF60911EA8039627585B12AC30D91250C50E693EB067B365BE44
31,525,157 UART: [art] SIG.S = DF56E3AC8CC711402C07C0BDF1C4D4F7659B83DF25D86AB8408D5676A37D1DDE214490C12411CEAF843FE9D5CF29578A
32,829,691 UART: Caliptra RT
32,830,422 UART: [state] CFI Enabled
32,992,825 UART: [rt] RT listening for mailbox commands...
32,994,686 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,024,437 UART: [rt]cmd =0x46504c54, len=4
33,026,179 >>> mbox cmd response data (8 bytes)
33,027,332 UART: [rt] FIPS self test
33,028,274 UART: [kat] ++
33,028,722 UART: [kat] sha1
33,033,143 UART: [kat] SHA2-256
33,035,063 UART: [kat] SHA2-384
33,038,066 UART: [kat] SHA2-512-ACC
33,040,364 UART: [kat] ECC-384
36,305,576 UART: Fatal Error: 0x90040003
36,341,031 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,485,155 >>> mbox cmd response: failed
36,485,819 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,629,698 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
190,042 UART:
190,336 UART: Running Caliptra ROM ...
191,364 UART:
191,504 UART: [state] CFI Enabled
248,965 UART: [state] LifecycleState = Unprovisioned
250,882 UART: [state] DebugLocked = No
253,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,417 UART: [kat] SHA2-256
428,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,618 UART: [kat] ++
439,119 UART: [kat] sha1
450,430 UART: [kat] SHA2-256
453,105 UART: [kat] SHA2-384
459,263 UART: [kat] SHA2-512-ACC
461,601 UART: [kat] ECC-384
2,752,608 UART: [kat] HMAC-384Kdf
2,781,678 UART: [kat] LMS
3,971,980 UART: [kat] --
3,975,383 UART: [cold-reset] ++
3,976,398 UART: [fht] Storing FHT @ 0x50003400
3,987,986 UART: [idev] ++
3,988,551 UART: [idev] CDI.KEYID = 6
3,989,516 UART: [idev] SUBJECT.KEYID = 7
3,990,727 UART: [idev] UDS.KEYID = 0
3,992,292 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,136,494 UART: [idev] Erasing UDS.KEYID = 0
7,330,364 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,708 UART: [idev] --
7,355,532 UART: [ldev] ++
7,356,125 UART: [ldev] CDI.KEYID = 6
7,357,196 UART: [ldev] SUBJECT.KEYID = 5
7,358,304 UART: [ldev] AUTHORITY.KEYID = 7
7,359,716 UART: [ldev] FE.KEYID = 1
7,404,950 UART: [ldev] Erasing FE.KEYID = 1
10,738,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,083,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,667 UART: [ldev] --
13,119,743 UART: [fwproc] Waiting for Commands...
13,121,454 UART: [fwproc] Received command 0x46574c44
13,123,626 UART: [fwproc] Received Image of size 114716 bytes
17,181,861 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,949 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,329,824 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,648,685 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
3,784,531 ready_for_fw is high
3,784,924 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,863,670 >>> mbox cmd response: success
23,567,073 UART:
23,567,457 UART: Running Caliptra FMC ...
23,568,651 UART:
23,568,819 UART: [state] CFI Enabled
23,636,874 UART: [fht] FMC Alias Private Key: 7
25,974,214 UART: [art] Extend RT PCRs Done
25,975,475 UART: [art] Lock RT PCRs Done
25,977,294 UART: [art] Populate DV Done
25,982,809 UART: [fht] FMC Alias Private Key: 7
25,984,295 UART: [art] Derive CDI
25,985,032 UART: [art] Store in in slot 0x4
26,044,593 UART: [art] Derive Key Pair
26,045,637 UART: [art] Store priv key in slot 0x5
29,337,970 UART: [art] Derive Key Pair - Done
29,350,749 UART: [art] Signing Cert with AUTHO
29,352,057 UART: RITY.KEYID = 7
31,639,687 UART: [art] Erasing AUTHORITY.KEYID = 7
31,641,196 UART: [art] PUB.X = A6AF8FEB2441706D676C43C5EB9AED0F1F245990CB7398EA289DAD18433EF2BB998F1682EE0192DE2FE93401492836FE
31,648,454 UART: [art] PUB.Y = 5CE93BD74C8D897DCC5CD7E9D1DBC5538EFC7232D0EC6C83F22E8E84E7D91CE46FD9C01D458FE14A7DC32563848B6EA1
31,655,693 UART: [art] SIG.R = B3CCBBDBB47BC72AA780581671470175AFD39FA703958A9D76F4F0D81A456BBC3976265ED9826ECBE28F67BE0C50EE43
31,663,092 UART: [art] SIG.S = C4A684C5AAF7EA4DF5315AF3093A6B88342B7014F2B9DC9E9082C095280F111E244545C8B839370CEC8A83293DBDBCF0
32,968,556 UART: Caliptra RT
32,969,269 UART: [state] CFI Enabled
33,150,082 UART: [rt] RT listening for mailbox commands...
33,151,947 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,181,574 UART: [rt]cmd =0x46504c54, len=4
33,183,205 >>> mbox cmd response data (8 bytes)
33,184,113 UART: [rt] FIPS self test
33,185,060 UART: [kat] ++
33,185,517 UART: [kat] sha1
33,189,952 UART: [kat] SHA2-256
33,191,892 UART: [kat] SHA2-384
33,194,847 UART: [kat] SHA2-512-ACC
33,197,149 UART: [kat] ECC-384
36,463,422 UART: Fatal Error: 0x90040003
36,498,814 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,642,929 >>> mbox cmd response: failed
36,643,541 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,787,450 >>> mbox cmd response: failed
Initializing fuses
924 writing to cptra_bootfsm_go
3,766,899 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,834,800 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,525 UART:
192,890 UART: Running Caliptra ROM ...
194,087 UART:
603,861 UART: [state] CFI Enabled
618,109 UART: [state] LifecycleState = Unprovisioned
619,993 UART: [state] DebugLocked = No
621,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,892 UART: [kat] SHA2-256
796,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,195 UART: [kat] ++
807,724 UART: [kat] sha1
818,486 UART: [kat] SHA2-256
821,176 UART: [kat] SHA2-384
827,744 UART: [kat] SHA2-512-ACC
830,118 UART: [kat] ECC-384
3,114,438 UART: [kat] HMAC-384Kdf
3,126,329 UART: [kat] LMS
4,316,453 UART: [kat] --
4,320,901 UART: [cold-reset] ++
4,322,487 UART: [fht] Storing FHT @ 0x50003400
4,335,486 UART: [idev] ++
4,336,106 UART: [idev] CDI.KEYID = 6
4,337,032 UART: [idev] SUBJECT.KEYID = 7
4,338,217 UART: [idev] UDS.KEYID = 0
4,339,299 ready_for_fw is high
4,339,542 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,483,543 UART: [idev] Erasing UDS.KEYID = 0
7,623,719 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,848 UART: [idev] --
7,651,568 UART: [ldev] ++
7,652,150 UART: [ldev] CDI.KEYID = 6
7,653,140 UART: [ldev] SUBJECT.KEYID = 5
7,654,306 UART: [ldev] AUTHORITY.KEYID = 7
7,655,598 UART: [ldev] FE.KEYID = 1
7,666,898 UART: [ldev] Erasing FE.KEYID = 1
10,954,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,600 UART: [ldev] --
13,314,675 UART: [fwproc] Waiting for Commands...
13,317,582 UART: [fwproc] Received command 0x46574c44
13,319,769 UART: [fwproc] Received Image of size 114716 bytes
17,372,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,283 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,152 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,844,161 >>> mbox cmd response: success
17,848,586 UART: [afmc] ++
17,849,180 UART: [afmc] CDI.KEYID = 6
17,850,266 UART: [afmc] SUBJECT.KEYID = 7
17,851,392 UART: [afmc] AUTHORITY.KEYID = 5
21,162,829 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,067 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,404 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,270 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,683 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,069 UART: [afmc] --
23,530,292 UART: [cold-reset] --
23,533,979 UART: [state] Locking Datavault
23,539,179 UART: [state] Locking PCR0, PCR1 and PCR31
23,540,881 UART: [state] Locking ICCM
23,542,486 UART: [exit] Launching FMC @ 0x40000130
23,550,879 UART:
23,551,124 UART: Running Caliptra FMC ...
23,552,228 UART:
23,552,388 UART: [state] CFI Enabled
23,560,709 UART: [fht] FMC Alias Private Key: 7
25,892,342 UART: [art] Extend RT PCRs Done
25,893,562 UART: [art] Lock RT PCRs Done
25,895,376 UART: [art] Populate DV Done
25,901,000 UART: [fht] FMC Alias Private Key: 7
25,902,707 UART: [art] Derive CDI
25,903,443 UART: [art] Store in in slot 0x4
25,946,087 UART: [art] Derive Key Pair
25,947,132 UART: [art] Store priv key in slot 0x5
29,189,029 UART: [art] Derive Key Pair - Done
29,201,823 UART: [art] Signing Cert with AUTHO
29,203,147 UART: RITY.KEYID = 7
31,482,176 UART: [art] Erasing AUTHORITY.KEYID = 7
31,483,685 UART: [art] PUB.X = 6594E39BF5C9E6BC9B13108FDE62E806D507217E4CE41EEB2E0BAE3B6A1ED418F311822CF274F96F51C9AE232B690B85
31,490,941 UART: [art] PUB.Y = BAE0AF1D8A63FB53621177E781D193384709895C6C0CC0F33447615142CDDF1BA38398315D87CFD27C21AFFFC097F5E8
31,498,185 UART: [art] SIG.R = 630B300E404AFB40AD37B9673DEB874FE72DDC85BFBC320F5032DC082E390D05468BA43FFAE4C95CA13BB73F066BAF52
31,505,580 UART: [art] SIG.S = E7CA54D1D150D03B09E80C68B907C34EBD9CC9B604C79A2EE023EF3D936EE50F008354F02080A3E5C6E686295489C05C
32,810,780 UART: Caliptra RT
32,811,479 UART: [state] CFI Enabled
32,929,560 UART: [rt] RT listening for mailbox commands...
32,931,428 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,960,993 UART: [rt]cmd =0x46504c54, len=4
32,962,623 >>> mbox cmd response data (8 bytes)
32,963,756 UART: [rt] FIPS self test
32,964,696 UART: [kat] ++
32,965,146 UART: [kat] sha1
32,969,599 UART: [kat] SHA2-256
32,971,545 UART: [kat] SHA2-384
32,974,655 UART: [kat] SHA2-512-ACC
32,976,895 UART: [kat] ECC-384
36,218,337 UART: Fatal Error: 0x90040003
36,253,724 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,397,679 >>> mbox cmd response: failed
36,398,328 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,542,321 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,095 UART:
190,397 UART: Running Caliptra ROM ...
191,515 UART:
3,974,240 UART: [state] CFI Enabled
3,988,201 UART: [state] LifecycleState = Unprovisioned
3,990,112 UART: [state] DebugLocked = No
3,992,434 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,997,114 UART: [kat] SHA2-256
4,166,853 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,177,408 UART: [kat] ++
4,177,948 UART: [kat] sha1
4,188,566 UART: [kat] SHA2-256
4,191,293 UART: [kat] SHA2-384
4,196,094 UART: [kat] SHA2-512-ACC
4,198,500 UART: [kat] ECC-384
6,482,719 UART: [kat] HMAC-384Kdf
6,492,841 UART: [kat] LMS
7,682,955 UART: [kat] --
7,686,587 UART: [cold-reset] ++
7,688,896 UART: [fht] Storing FHT @ 0x50003400
7,699,023 UART: [idev] ++
7,699,591 UART: [idev] CDI.KEYID = 6
7,700,575 UART: [idev] SUBJECT.KEYID = 7
7,701,791 UART: [idev] UDS.KEYID = 0
7,703,309 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
7,847,312 UART: [idev] Erasing UDS.KEYID = 0
10,984,972 UART: [idev] Using Sha1 for KeyId Algorithm
11,006,202 UART: [idev] --
11,010,124 UART: [ldev] ++
11,010,704 UART: [ldev] CDI.KEYID = 6
11,011,722 UART: [ldev] SUBJECT.KEYID = 5
11,012,829 UART: [ldev] AUTHORITY.KEYID = 7
11,014,113 UART: [ldev] FE.KEYID = 1
11,024,762 UART: [ldev] Erasing FE.KEYID = 1
14,317,330 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,609,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,624,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,639,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,653,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,672,958 UART: [ldev] --
16,678,068 UART: [fwproc] Waiting for Commands...
16,680,395 UART: [fwproc] Received command 0x46574c44
16,682,581 UART: [fwproc] Received Image of size 114716 bytes
20,746,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,824,642 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,893,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
21,212,943 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,126,043 ready_for_fw is high
4,126,451 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,094,413 >>> mbox cmd response: success
23,740,352 UART:
23,740,739 UART: Running Caliptra FMC ...
23,741,905 UART:
23,742,071 UART: [state] CFI Enabled
23,750,031 UART: [fht] FMC Alias Private Key: 7
26,080,810 UART: [art] Extend RT PCRs Done
26,082,032 UART: [art] Lock RT PCRs Done
26,083,909 UART: [art] Populate DV Done
26,089,539 UART: [fht] FMC Alias Private Key: 7
26,091,142 UART: [art] Derive CDI
26,091,966 UART: [art] Store in in slot 0x4
26,134,950 UART: [art] Derive Key Pair
26,135,987 UART: [art] Store priv key in slot 0x5
29,378,425 UART: [art] Derive Key Pair - Done
29,391,533 UART: [art] Signing Cert with AUTHO
29,392,852 UART: RITY.KEYID = 7
31,672,388 UART: [art] Erasing AUTHORITY.KEYID = 7
31,673,906 UART: [art] PUB.X = 9BB51DE369FC09C7986567F90AC7EF77C3292E711E626F4FC07B5F20C6500FECD8246A827D506744818F67DD40E391F2
31,681,187 UART: [art] PUB.Y = 7C8ED93385DE1B34564EA2FE5ECFE79D5255E890A220E7F083B3EC720E43A87E76052EA3C9D54E13025B38A50B3E98E8
31,688,373 UART: [art] SIG.R = 7D64EFE38A262562867F77F2068ECE28E9FD5A7DBDD0FE890BD8251FB9F0DE95D853B5A20F7A8F8E9A8D8617BF91B2AC
31,695,837 UART: [art] SIG.S = 1BAFFE9821E3D0F1AF8CE49FCEA24E0F45F4543845DBE645BDA9DE677655A6ED9EDE72EF5220CAB8BDFC45F93D78074D
33,000,697 UART: Caliptra RT
33,001,411 UART: [state] CFI Enabled
33,119,079 UART: [rt] RT listening for mailbox commands...
33,120,960 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,150,660 UART: [rt]cmd =0x46504c54, len=4
33,152,403 >>> mbox cmd response data (8 bytes)
33,153,505 UART: [rt] FIPS self test
33,154,443 UART: [kat] ++
33,154,898 UART: [kat] sha1
33,159,231 UART: [kat] SHA2-256
33,161,168 UART: [kat] SHA2-384
33,164,081 UART: [kat] SHA2-512-ACC
33,166,332 UART: [kat] ECC-384
36,407,306 UART: Fatal Error: 0x90040003
36,442,550 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,586,632 >>> mbox cmd response: failed
36,587,305 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,731,293 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
7,322,500 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
21,282,905 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,277 UART:
192,653 UART: Running Caliptra ROM ...
193,812 UART:
193,958 UART: [state] CFI Enabled
262,656 UART: [state] LifecycleState = Unprovisioned
264,570 UART: [state] DebugLocked = No
266,261 UART: [state] WD Timer not started. Device not locked for debugging
269,600 UART: [kat] SHA2-256
448,681 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,299 UART: [kat] ++
460,858 UART: [kat] sha1
472,309 UART: [kat] SHA2-256
475,329 UART: [kat] SHA2-384
481,752 UART: [kat] SHA2-512-ACC
484,695 UART: [kat] ECC-384
2,950,321 UART: [kat] HMAC-384Kdf
2,971,947 UART: [kat] LMS
3,501,370 UART: [kat] --
3,506,478 UART: [cold-reset] ++
3,508,489 UART: [fht] FHT @ 0x50003400
3,519,616 UART: [idev] ++
3,520,184 UART: [idev] CDI.KEYID = 6
3,521,066 UART: [idev] SUBJECT.KEYID = 7
3,522,247 UART: [idev] UDS.KEYID = 0
3,523,271 ready_for_fw is high
3,523,501 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,290 UART: [idev] Erasing UDS.KEYID = 0
6,028,321 UART: [idev] Sha1 KeyId Algorithm
6,051,601 UART: [idev] --
6,056,533 UART: [ldev] ++
6,057,112 UART: [ldev] CDI.KEYID = 6
6,058,027 UART: [ldev] SUBJECT.KEYID = 5
6,059,194 UART: [ldev] AUTHORITY.KEYID = 7
6,060,488 UART: [ldev] FE.KEYID = 1
6,100,805 UART: [ldev] Erasing FE.KEYID = 1
8,601,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,163 UART: [ldev] --
10,393,000 UART: [fwproc] Wait for Commands...
10,394,746 UART: [fwproc] Recv command 0x46574c44
10,396,852 UART: [fwproc] Recv'd Img size: 115032 bytes
13,808,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,274 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,054 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,273,431 >>> mbox cmd response: success
14,277,685 UART: [afmc] ++
14,278,273 UART: [afmc] CDI.KEYID = 6
14,279,341 UART: [afmc] SUBJECT.KEYID = 7
14,280,445 UART: [afmc] AUTHORITY.KEYID = 5
16,804,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,533,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,955 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,550,751 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,566,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,582,630 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,605,826 UART: [afmc] --
18,608,826 UART: [cold-reset] --
18,612,038 UART: [state] Locking Datavault
18,617,559 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,260 UART: [state] Locking ICCM
18,620,386 UART: [exit] Launching FMC @ 0x40000130
18,628,837 UART:
18,629,080 UART: Running Caliptra FMC ...
18,630,187 UART:
18,630,346 UART: [state] CFI Enabled
18,689,742 UART: [fht] FMC Alias Private Key: 7
20,453,696 UART: [art] Extend RT PCRs Done
20,454,923 UART: [art] Lock RT PCRs Done
20,456,604 UART: [art] Populate DV Done
20,462,128 UART: [fht] FMC Alias Private Key: 7
20,463,776 UART: [art] Derive CDI
20,464,613 UART: [art] Store in in slot 0x4
20,522,473 UART: [art] Derive Key Pair
20,523,514 UART: [art] Store priv key in slot 0x5
22,986,334 UART: [art] Derive Key Pair - Done
22,999,386 UART: [art] Signing Cert with AUTHO
23,000,696 UART: RITY.KEYID = 7
24,712,090 UART: [art] Erasing AUTHORITY.KEYID = 7
24,713,598 UART: [art] PUB.X = CD84737BEA10AF2A65C29F6F48941A8C4E8A671D12A1D311FC0C85673BE8FA9518D538E7D5197E4FBFC9491A1DAE0E94
24,720,876 UART: [art] PUB.Y = 65E0E066FE9D15B919DEFCC164EC44F0B17C45E22D2D70C142862A8978E535C134BD777468CFC8148966ED652E997E69
24,728,128 UART: [art] SIG.R = 2BE4DAB8757DB311E234303C67DA385F4F938F00C2F29054029926570AAC1B5ED36FE9B9AA53DF66482D39E159FAE1EF
24,735,540 UART: [art] SIG.S = 44577C47C0BFFE4BD5613CC915DB298CCF2BF973B6332EA41421E384E7579308BC2F1CF72B32A122B6405582D824118F
25,714,303 UART: Caliptra RT
25,715,022 UART: [state] CFI Enabled
25,879,977 UART: [rt] RT listening for mailbox commands...
25,881,835 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,911,576 UART: [rt]cmd =0x46504c54, len=4
25,913,338 >>> mbox cmd response data (8 bytes)
25,914,449 UART: [rt] FIPS self test
25,915,393 UART: [kat] ++
25,915,845 UART: [kat] sha1
25,920,243 UART: [kat] SHA2-256
25,922,173 UART: [kat] SHA2-384
25,925,077 UART: [kat] SHA2-512-ACC
25,927,329 UART: [kat] ECC-384
28,363,128 UART: Fatal Error: 0x90040003
28,398,364 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,543,194 >>> mbox cmd response: failed
28,543,808 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,688,218 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,039 UART:
190,354 UART: Running Caliptra ROM ...
191,383 UART:
191,523 UART: [state] CFI Enabled
263,519 UART: [state] LifecycleState = Unprovisioned
265,440 UART: [state] DebugLocked = No
266,847 UART: [state] WD Timer not started. Device not locked for debugging
269,718 UART: [kat] SHA2-256
448,882 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,432 UART: [kat] ++
460,879 UART: [kat] sha1
472,725 UART: [kat] SHA2-256
475,788 UART: [kat] SHA2-384
481,816 UART: [kat] SHA2-512-ACC
484,747 UART: [kat] ECC-384
2,950,524 UART: [kat] HMAC-384Kdf
2,972,962 UART: [kat] LMS
3,502,405 UART: [kat] --
3,508,227 UART: [cold-reset] ++
3,510,653 UART: [fht] FHT @ 0x50003400
3,521,305 UART: [idev] ++
3,521,868 UART: [idev] CDI.KEYID = 6
3,522,781 UART: [idev] SUBJECT.KEYID = 7
3,523,993 UART: [idev] UDS.KEYID = 0
3,525,496 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,670,206 UART: [idev] Erasing UDS.KEYID = 0
6,027,482 UART: [idev] Sha1 KeyId Algorithm
6,052,056 UART: [idev] --
6,056,424 UART: [ldev] ++
6,057,009 UART: [ldev] CDI.KEYID = 6
6,057,927 UART: [ldev] SUBJECT.KEYID = 5
6,059,088 UART: [ldev] AUTHORITY.KEYID = 7
6,060,328 UART: [ldev] FE.KEYID = 1
6,100,699 UART: [ldev] Erasing FE.KEYID = 1
8,604,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,453 UART: [ldev] --
10,413,774 UART: [fwproc] Wait for Commands...
10,415,655 UART: [fwproc] Recv command 0x46574c44
10,417,697 UART: [fwproc] Recv'd Img size: 115032 bytes
13,824,843 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,612 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,381 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,290,158 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,361,157 ready_for_fw is high
3,361,740 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,082,847 >>> mbox cmd response: success
18,370,688 UART:
18,371,087 UART: Running Caliptra FMC ...
18,372,219 UART:
18,372,369 UART: [state] CFI Enabled
18,435,614 UART: [fht] FMC Alias Private Key: 7
20,199,510 UART: [art] Extend RT PCRs Done
20,200,738 UART: [art] Lock RT PCRs Done
20,202,310 UART: [art] Populate DV Done
20,207,911 UART: [fht] FMC Alias Private Key: 7
20,209,458 UART: [art] Derive CDI
20,210,295 UART: [art] Store in in slot 0x4
20,268,207 UART: [art] Derive Key Pair
20,269,245 UART: [art] Store priv key in slot 0x5
22,732,272 UART: [art] Derive Key Pair - Done
22,745,327 UART: [art] Signing Cert with AUTHO
22,746,629 UART: RITY.KEYID = 7
24,458,225 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,733 UART: [art] PUB.X = 601D474D5F3F1F7BC75C8AF9DAC4A5D748C604FB3ADE96047D701DDB7D33EA2B930D0E9ACC1D42E88F993E1E20D53F37
24,467,044 UART: [art] PUB.Y = 41A797642946E78B6B5BF5B84447B31BC64DD3B203164B225053349BD44C53320DAE30C7C581F4E8D31217E71294DC82
24,474,306 UART: [art] SIG.R = 6D75C773057ABA97C00295CA9E8C919605F4AD37F0BC140742F08E5BAB8DE63D96EC3A6A92DBE98C9400DBDD828BB866
24,481,666 UART: [art] SIG.S = 38C77FF4DFD6E10CC21B84BEABF3F2806CC7A779A6667C56EE4DE7DD4C81F888A124D15F5848095982779EE143B3629B
25,460,085 UART: Caliptra RT
25,460,809 UART: [state] CFI Enabled
25,625,679 UART: [rt] RT listening for mailbox commands...
25,627,539 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,604 UART: [rt]cmd =0x46504c54, len=4
25,659,090 >>> mbox cmd response data (8 bytes)
25,660,035 UART: [rt] FIPS self test
25,660,985 UART: [kat] ++
25,661,486 UART: [kat] sha1
25,665,729 UART: [kat] SHA2-256
25,667,615 UART: [kat] SHA2-384
25,670,800 UART: [kat] SHA2-512-ACC
25,673,020 UART: [kat] ECC-384
28,111,857 UART: Fatal Error: 0x90040003
28,147,147 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,291,688 >>> mbox cmd response: failed
28,292,329 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,436,786 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,363,910 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,063,500 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,487 UART:
192,875 UART: Running Caliptra ROM ...
194,000 UART:
603,535 UART: [state] CFI Enabled
617,291 UART: [state] LifecycleState = Unprovisioned
619,159 UART: [state] DebugLocked = No
621,746 UART: [state] WD Timer not started. Device not locked for debugging
625,859 UART: [kat] SHA2-256
804,977 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,580 UART: [kat] ++
817,116 UART: [kat] sha1
827,951 UART: [kat] SHA2-256
830,996 UART: [kat] SHA2-384
838,483 UART: [kat] SHA2-512-ACC
841,417 UART: [kat] ECC-384
3,284,169 UART: [kat] HMAC-384Kdf
3,296,260 UART: [kat] LMS
3,825,783 UART: [kat] --
3,830,374 UART: [cold-reset] ++
3,831,398 UART: [fht] FHT @ 0x50003400
3,842,469 UART: [idev] ++
3,843,034 UART: [idev] CDI.KEYID = 6
3,843,949 UART: [idev] SUBJECT.KEYID = 7
3,845,195 UART: [idev] UDS.KEYID = 0
3,846,121 ready_for_fw is high
3,846,321 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,990,783 UART: [idev] Erasing UDS.KEYID = 0
6,318,670 UART: [idev] Sha1 KeyId Algorithm
6,341,415 UART: [idev] --
6,344,923 UART: [ldev] ++
6,345,530 UART: [ldev] CDI.KEYID = 6
6,346,445 UART: [ldev] SUBJECT.KEYID = 5
6,347,488 UART: [ldev] AUTHORITY.KEYID = 7
6,348,778 UART: [ldev] FE.KEYID = 1
6,357,910 UART: [ldev] Erasing FE.KEYID = 1
8,834,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,553,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,569,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,585,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,738 UART: [ldev] --
10,626,410 UART: [fwproc] Wait for Commands...
10,628,837 UART: [fwproc] Recv command 0x46574c44
10,630,935 UART: [fwproc] Recv'd Img size: 115032 bytes
14,043,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,784 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,544 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,506,198 >>> mbox cmd response: success
14,509,711 UART: [afmc] ++
14,510,299 UART: [afmc] CDI.KEYID = 6
14,511,184 UART: [afmc] SUBJECT.KEYID = 7
14,512,399 UART: [afmc] AUTHORITY.KEYID = 5
17,011,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,733,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,735,085 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,750,901 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,766,900 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,782,769 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,804,672 UART: [afmc] --
18,808,752 UART: [cold-reset] --
18,813,578 UART: [state] Locking Datavault
18,820,548 UART: [state] Locking PCR0, PCR1 and PCR31
18,822,185 UART: [state] Locking ICCM
18,823,600 UART: [exit] Launching FMC @ 0x40000130
18,832,044 UART:
18,832,294 UART: Running Caliptra FMC ...
18,833,318 UART:
18,833,465 UART: [state] CFI Enabled
18,841,153 UART: [fht] FMC Alias Private Key: 7
20,598,266 UART: [art] Extend RT PCRs Done
20,599,494 UART: [art] Lock RT PCRs Done
20,601,258 UART: [art] Populate DV Done
20,606,717 UART: [fht] FMC Alias Private Key: 7
20,608,198 UART: [art] Derive CDI
20,608,936 UART: [art] Store in in slot 0x4
20,651,576 UART: [art] Derive Key Pair
20,652,572 UART: [art] Store priv key in slot 0x5
23,079,521 UART: [art] Derive Key Pair - Done
23,092,730 UART: [art] Signing Cert with AUTHO
23,094,040 UART: RITY.KEYID = 7
24,799,438 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,987 UART: [art] PUB.X = 0551FA447EB082FDE105974C1B64A1CEABFB1AC544B7BEB18BC2E4A2CF21AABA2F4A545F9D33BA9245644FF375A38E74
24,808,190 UART: [art] PUB.Y = C8E30E1DFD1BEFB8235AA29D5E574C3E9156F1E930CB64219281A5C13520FEC724D58D7606D23D1624B340041CD772AF
24,815,483 UART: [art] SIG.R = 287374B23DBD7692BC4CFCACBB7F0455B55F0FF15BE584D319F50A7084CC3772E4CFFE9DC98E89592835688ABEC0927D
24,822,893 UART: [art] SIG.S = 26C54176A8278009DCFE095688F25524963EFC66A039B864B35B8022E338A8E31CC5F432CE03313C91DEFB1FF20DD701
25,801,701 UART: Caliptra RT
25,802,397 UART: [state] CFI Enabled
25,919,994 UART: [rt] RT listening for mailbox commands...
25,921,838 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,951,627 UART: [rt]cmd =0x46504c54, len=4
25,953,233 >>> mbox cmd response data (8 bytes)
25,954,631 UART: [rt] FIPS self test
25,955,589 UART: [kat] ++
25,956,041 UART: [kat] sha1
25,960,448 UART: [kat] SHA2-256
25,962,375 UART: [kat] SHA2-384
25,965,336 UART: [kat] SHA2-512-ACC
25,967,625 UART: [kat] ECC-384
28,393,807 UART: Fatal Error: 0x90040003
28,429,278 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,573,643 >>> mbox cmd response: failed
28,574,262 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,718,690 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,033 UART:
190,325 UART: Running Caliptra ROM ...
191,353 UART:
11,812,660 UART: [state] CFI Enabled
11,824,849 UART: [state] LifecycleState = Unprovisioned
11,826,701 UART: [state] DebugLocked = No
11,829,003 UART: [state] WD Timer not started. Device not locked for debugging
11,833,290 UART: [kat] SHA2-256
12,012,406 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,023,989 UART: [kat] ++
12,024,449 UART: [kat] sha1
12,036,001 UART: [kat] SHA2-256
12,039,060 UART: [kat] SHA2-384
12,046,246 UART: [kat] SHA2-512-ACC
12,049,252 UART: [kat] ECC-384
14,492,222 UART: [kat] HMAC-384Kdf
14,504,887 UART: [kat] LMS
15,034,395 UART: [kat] --
15,038,487 UART: [cold-reset] ++
15,039,985 UART: [fht] FHT @ 0x50003400
15,050,164 UART: [idev] ++
15,050,729 UART: [idev] CDI.KEYID = 6
15,051,634 UART: [idev] SUBJECT.KEYID = 7
15,052,850 UART: [idev] UDS.KEYID = 0
15,054,389 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
15,198,797 UART: [idev] Erasing UDS.KEYID = 0
17,523,881 UART: [idev] Sha1 KeyId Algorithm
17,546,899 UART: [idev] --
17,549,304 UART: [ldev] ++
17,549,890 UART: [ldev] CDI.KEYID = 6
17,550,955 UART: [ldev] SUBJECT.KEYID = 5
17,552,059 UART: [ldev] AUTHORITY.KEYID = 7
17,553,240 UART: [ldev] FE.KEYID = 1
17,564,748 UART: [ldev] Erasing FE.KEYID = 1
20,038,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,757,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,773,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,788,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,804,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,825,468 UART: [ldev] --
21,829,760 UART: [fwproc] Wait for Commands...
21,832,446 UART: [fwproc] Recv command 0x46574c44
21,834,544 UART: [fwproc] Recv'd Img size: 115032 bytes
25,240,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,310,456 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,379,213 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,698,992 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,695,791 ready_for_fw is high
3,696,187 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,280,086 >>> mbox cmd response: success
18,523,981 UART:
18,524,407 UART: Running Caliptra FMC ...
18,525,545 UART:
18,525,709 UART: [state] CFI Enabled
18,533,167 UART: [fht] FMC Alias Private Key: 7
20,290,555 UART: [art] Extend RT PCRs Done
20,291,787 UART: [art] Lock RT PCRs Done
20,293,312 UART: [art] Populate DV Done
20,298,718 UART: [fht] FMC Alias Private Key: 7
20,300,274 UART: [art] Derive CDI
20,301,095 UART: [art] Store in in slot 0x4
20,343,604 UART: [art] Derive Key Pair
20,344,646 UART: [art] Store priv key in slot 0x5
22,771,519 UART: [art] Derive Key Pair - Done
22,784,681 UART: [art] Signing Cert with AUTHO
22,785,992 UART: RITY.KEYID = 7
24,491,347 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,851 UART: [art] PUB.X = B073EC454504645244E06642B9230E0A7277D5F491481096FC165318A93DDF2D42222C4CEFCF156A16790D059F6955F5
24,500,146 UART: [art] PUB.Y = 74DF40171A5E32FC3EDA8DA572644E691EB6806F810D380F152B082A2A39C5FE08A13C0E0B2C5936B364318789A06EC2
24,507,332 UART: [art] SIG.R = 1B44AC6C26AFF70020FF5C271810DE590FE417C590C3240D6742A88F5D78C3ECB2A2D57817DA0DB9884BA6BF3FD214DA
24,514,765 UART: [art] SIG.S = DF942C41439F1CC873F4211813117EC7D3CC532F5F2441A0BCDFE358175C9A11055323F3743D51CDEE8E742417173DA2
25,493,587 UART: Caliptra RT
25,494,300 UART: [state] CFI Enabled
25,612,136 UART: [rt] RT listening for mailbox commands...
25,613,991 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,643,566 UART: [rt]cmd =0x46504c54, len=4
25,645,305 >>> mbox cmd response data (8 bytes)
25,646,673 UART: [rt] FIPS self test
25,647,620 UART: [kat] ++
25,648,071 UART: [kat] sha1
25,652,640 UART: [kat] SHA2-256
25,654,518 UART: [kat] SHA2-384
25,657,479 UART: [kat] SHA2-512-ACC
25,659,781 UART: [kat] ECC-384
28,085,107 UART: Fatal Error: 0x90040003
28,120,348 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,264,825 >>> mbox cmd response: failed
28,265,522 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,409,967 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
15,216,929 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,793,578 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,186 UART:
192,538 UART: Running Caliptra ROM ...
193,735 UART:
193,890 UART: [state] CFI Enabled
265,557 UART: [state] LifecycleState = Unprovisioned
267,913 UART: [state] DebugLocked = No
270,095 UART: [state] WD Timer not started. Device not locked for debugging
274,578 UART: [kat] SHA2-256
464,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,224 UART: [kat] ++
475,697 UART: [kat] sha1
487,286 UART: [kat] SHA2-256
490,303 UART: [kat] SHA2-384
496,655 UART: [kat] SHA2-512-ACC
499,239 UART: [kat] ECC-384
2,948,148 UART: [kat] HMAC-384Kdf
2,972,776 UART: [kat] LMS
3,504,605 UART: [kat] --
3,508,747 UART: [cold-reset] ++
3,511,039 UART: [fht] FHT @ 0x50003400
3,523,233 UART: [idev] ++
3,523,879 UART: [idev] CDI.KEYID = 6
3,524,913 UART: [idev] SUBJECT.KEYID = 7
3,526,015 UART: [idev] UDS.KEYID = 0
3,526,952 ready_for_fw is high
3,527,156 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,671,932 UART: [idev] Erasing UDS.KEYID = 0
6,027,237 UART: [idev] Sha1 KeyId Algorithm
6,051,089 UART: [idev] --
6,056,921 UART: [ldev] ++
6,057,620 UART: [ldev] CDI.KEYID = 6
6,058,512 UART: [ldev] SUBJECT.KEYID = 5
6,059,680 UART: [ldev] AUTHORITY.KEYID = 7
6,060,916 UART: [ldev] FE.KEYID = 1
6,102,094 UART: [ldev] Erasing FE.KEYID = 1
8,607,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,908 UART: [ldev] --
10,413,383 UART: [fwproc] Wait for Commands...
10,415,230 UART: [fwproc] Recv command 0x46574c44
10,417,496 UART: [fwproc] Recv'd Img size: 115032 bytes
13,872,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,159 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,614,014 >>> mbox cmd response: success
14,618,096 UART: [afmc] ++
14,618,803 UART: [afmc] CDI.KEYID = 6
14,620,045 UART: [afmc] SUBJECT.KEYID = 7
14,621,484 UART: [afmc] AUTHORITY.KEYID = 5
17,148,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,878,029 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,206 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,389 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,440 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,118 UART: [afmc] --
18,950,095 UART: [cold-reset] --
18,954,823 UART: [state] Locking Datavault
18,960,457 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,594 UART: [state] Locking ICCM
18,965,370 UART: [exit] Launching FMC @ 0x40000130
18,974,035 UART:
18,974,271 UART: Running Caliptra FMC ...
18,975,376 UART:
18,975,532 UART: [state] CFI Enabled
19,031,782 UART: [fht] FMC Alias Private Key: 7
20,796,223 UART: [art] Extend RT PCRs Done
20,797,443 UART: [art] Lock RT PCRs Done
20,798,928 UART: [art] Populate DV Done
20,804,181 UART: [fht] FMC Alias Private Key: 7
20,805,928 UART: [art] Derive CDI
20,806,684 UART: [art] Store in in slot 0x4
20,864,700 UART: [art] Derive Key Pair
20,865,742 UART: [art] Store priv key in slot 0x5
23,329,182 UART: [art] Derive Key Pair - Done
23,341,901 UART: [art] Signing Cert with AUTHO
23,343,216 UART: RITY.KEYID = 7
25,054,884 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,413 UART: [art] PUB.X = 26323B71E20F32FB381ABBFDAA4761908470B8A48DF5BA7205C634C8E9480792D5B40F684B17C1034629F48170027E09
25,063,656 UART: [art] PUB.Y = 09B5A6693D5C996CD387DBABADF65D5D781633D437706A7C1567D2CC38E35E9AA2F853E2FD7128AD69E35C633B733E24
25,070,874 UART: [art] SIG.R = B5AC71537BE22F3E97A24CB4E5F4E54D491DDA08F9AF05DEA6A70AB91738539BAA8EBE9BF313CBA1F962E01583139105
25,078,407 UART: [art] SIG.S = 54663D884E86F09CEBFC13F66029CD38970B0E4822BE12615B5DEDA3D1B3D9790658948595A47B62A238AC22CDE8D637
26,056,919 UART: Caliptra RT
26,057,614 UART: [state] CFI Enabled
26,223,262 UART: [rt] RT listening for mailbox commands...
26,225,127 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,254,805 UART: [rt]cmd =0x46504c54, len=4
26,256,399 >>> mbox cmd response data (8 bytes)
26,257,861 UART: [rt] FIPS self test
26,258,812 UART: [kat] ++
26,259,264 UART: [kat] sha1
26,263,504 UART: [kat] SHA2-256
26,265,432 UART: [kat] SHA2-384
26,268,549 UART: [kat] SHA2-512-ACC
26,270,788 UART: [kat] ECC-384
28,707,281 UART: Fatal Error: 0x90040003
28,742,520 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,887,037 >>> mbox cmd response: failed
28,887,664 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,032,495 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,003 UART:
190,314 UART: Running Caliptra ROM ...
191,431 UART:
191,581 UART: [state] CFI Enabled
267,815 UART: [state] LifecycleState = Unprovisioned
270,231 UART: [state] DebugLocked = No
272,370 UART: [state] WD Timer not started. Device not locked for debugging
277,580 UART: [kat] SHA2-256
467,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,203 UART: [kat] ++
478,650 UART: [kat] sha1
491,264 UART: [kat] SHA2-256
494,268 UART: [kat] SHA2-384
500,842 UART: [kat] SHA2-512-ACC
503,455 UART: [kat] ECC-384
2,948,176 UART: [kat] HMAC-384Kdf
2,974,501 UART: [kat] LMS
3,506,265 UART: [kat] --
3,512,046 UART: [cold-reset] ++
3,513,080 UART: [fht] FHT @ 0x50003400
3,524,230 UART: [idev] ++
3,524,906 UART: [idev] CDI.KEYID = 6
3,525,873 UART: [idev] SUBJECT.KEYID = 7
3,527,032 UART: [idev] UDS.KEYID = 0
3,528,539 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,673,139 UART: [idev] Erasing UDS.KEYID = 0
6,029,313 UART: [idev] Sha1 KeyId Algorithm
6,050,429 UART: [idev] --
6,055,102 UART: [ldev] ++
6,055,794 UART: [ldev] CDI.KEYID = 6
6,056,709 UART: [ldev] SUBJECT.KEYID = 5
6,057,880 UART: [ldev] AUTHORITY.KEYID = 7
6,059,117 UART: [ldev] FE.KEYID = 1
6,103,651 UART: [ldev] Erasing FE.KEYID = 1
8,611,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,241 UART: [ldev] --
10,415,965 UART: [fwproc] Wait for Commands...
10,418,874 UART: [fwproc] Recv command 0x46574c44
10,421,191 UART: [fwproc] Recv'd Img size: 115032 bytes
13,873,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,118 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,271 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,615,510 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
3,418,722 ready_for_fw is high
3,419,183 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,736,394 >>> mbox cmd response: success
19,025,367 UART:
19,025,758 UART: Running Caliptra FMC ...
19,026,917 UART:
19,027,076 UART: [state] CFI Enabled
19,095,993 UART: [fht] FMC Alias Private Key: 7
20,859,901 UART: [art] Extend RT PCRs Done
20,861,124 UART: [art] Lock RT PCRs Done
20,862,260 UART: [art] Populate DV Done
20,867,464 UART: [fht] FMC Alias Private Key: 7
20,869,057 UART: [art] Derive CDI
20,869,823 UART: [art] Store in in slot 0x4
20,928,657 UART: [art] Derive Key Pair
20,929,702 UART: [art] Store priv key in slot 0x5
23,392,282 UART: [art] Derive Key Pair - Done
23,405,386 UART: [art] Signing Cert with AUTHO
23,406,724 UART: RITY.KEYID = 7
25,118,163 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,674 UART: [art] PUB.X = 135ECCBB0710E011F967F62331D2361FAD916204AA5224B3C297A6456B433FA80C406DF45F4389D92E05E7E84FB04E97
25,126,935 UART: [art] PUB.Y = B535EE8CC1DD5BDA713A35F2890A55768671C80CCBC4BD7DC9F1F6A99E32D0EAC4FBA204121ECD07ECE887784428876E
25,134,192 UART: [art] SIG.R = BCB29724B344D485F21217999E9036C5A4269DBBDEAA7FEF66379FA439366DB443EE6E8DB5E1B53D9C6EACAAFA6BF397
25,141,597 UART: [art] SIG.S = D74E5B556A58490959CB49653FC284D09FE4304BBE03BEAC06B1C6FE981FA286E3776A3CFA88F4C037DE3CAEFC4C3C83
26,121,086 UART: Caliptra RT
26,121,777 UART: [state] CFI Enabled
26,285,270 UART: [rt] RT listening for mailbox commands...
26,287,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,316,738 UART: [rt]cmd =0x46504c54, len=4
26,318,475 >>> mbox cmd response data (8 bytes)
26,319,836 UART: [rt] FIPS self test
26,320,772 UART: [kat] ++
26,321,223 UART: [kat] sha1
26,325,572 UART: [kat] SHA2-256
26,327,448 UART: [kat] SHA2-384
26,330,697 UART: [kat] SHA2-512-ACC
26,332,945 UART: [kat] ECC-384
28,770,008 UART: Fatal Error: 0x90040003
28,805,306 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,949,850 >>> mbox cmd response: failed
28,950,504 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,094,950 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,439,849 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,740,126 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,530 UART:
192,900 UART: Running Caliptra ROM ...
194,041 UART:
603,444 UART: [state] CFI Enabled
616,740 UART: [state] LifecycleState = Unprovisioned
619,104 UART: [state] DebugLocked = No
620,708 UART: [state] WD Timer not started. Device not locked for debugging
625,109 UART: [kat] SHA2-256
814,993 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,732 UART: [kat] ++
826,338 UART: [kat] sha1
839,495 UART: [kat] SHA2-256
842,517 UART: [kat] SHA2-384
849,854 UART: [kat] SHA2-512-ACC
852,441 UART: [kat] ECC-384
3,292,938 UART: [kat] HMAC-384Kdf
3,305,560 UART: [kat] LMS
3,837,426 UART: [kat] --
3,841,362 UART: [cold-reset] ++
3,842,448 UART: [fht] FHT @ 0x50003400
3,854,941 UART: [idev] ++
3,855,695 UART: [idev] CDI.KEYID = 6
3,856,583 UART: [idev] SUBJECT.KEYID = 7
3,857,849 UART: [idev] UDS.KEYID = 0
3,858,757 ready_for_fw is high
3,858,992 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,003,411 UART: [idev] Erasing UDS.KEYID = 0
6,334,688 UART: [idev] Sha1 KeyId Algorithm
6,355,943 UART: [idev] --
6,360,428 UART: [ldev] ++
6,361,166 UART: [ldev] CDI.KEYID = 6
6,362,049 UART: [ldev] SUBJECT.KEYID = 5
6,363,178 UART: [ldev] AUTHORITY.KEYID = 7
6,364,469 UART: [ldev] FE.KEYID = 1
6,376,306 UART: [ldev] Erasing FE.KEYID = 1
8,850,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,193 UART: [ldev] --
10,640,567 UART: [fwproc] Wait for Commands...
10,643,741 UART: [fwproc] Recv command 0x46574c44
10,646,011 UART: [fwproc] Recv'd Img size: 115032 bytes
14,105,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,939 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,056 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,847,153 >>> mbox cmd response: success
14,851,472 UART: [afmc] ++
14,852,172 UART: [afmc] CDI.KEYID = 6
14,853,413 UART: [afmc] SUBJECT.KEYID = 7
14,854,847 UART: [afmc] AUTHORITY.KEYID = 5
17,359,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,868 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,783 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,957 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,115,111 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,130,156 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,153,620 UART: [afmc] --
19,157,007 UART: [cold-reset] --
19,160,771 UART: [state] Locking Datavault
19,165,925 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,066 UART: [state] Locking ICCM
19,169,737 UART: [exit] Launching FMC @ 0x40000130
19,178,428 UART:
19,178,667 UART: Running Caliptra FMC ...
19,179,772 UART:
19,179,931 UART: [state] CFI Enabled
19,188,088 UART: [fht] FMC Alias Private Key: 7
20,945,064 UART: [art] Extend RT PCRs Done
20,946,285 UART: [art] Lock RT PCRs Done
20,947,962 UART: [art] Populate DV Done
20,953,268 UART: [fht] FMC Alias Private Key: 7
20,954,755 UART: [art] Derive CDI
20,955,518 UART: [art] Store in in slot 0x4
20,998,159 UART: [art] Derive Key Pair
20,999,193 UART: [art] Store priv key in slot 0x5
23,426,488 UART: [art] Derive Key Pair - Done
23,439,532 UART: [art] Signing Cert with AUTHO
23,440,838 UART: RITY.KEYID = 7
25,146,375 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,874 UART: [art] PUB.X = D43A2DF6227FE76E02C9C489C2CBD4ABDE81F681B70394DEC5C9271BD4B69438142C5C5A72642651941A90E0418B3FD2
25,155,151 UART: [art] PUB.Y = 3C9702AADE1FC30605A90FC6B3802D9757E6601AA492C3DE1C268DEE7EE7943603EFB3E3613EA7AC99B6F90D4FF90B37
25,162,424 UART: [art] SIG.R = E0A44E94610C5B354114E5691855B440F31D9C5D6CF12B6764A2408E4DBF7E5681B9BCB85935C9CA295529AF279DF6F2
25,169,805 UART: [art] SIG.S = B092CFF1D714851685754CCF15206CEC3D139854A7D57F78829B74B2E88CA3EFF315D0CA1F4F5FDD276182124A898917
26,148,715 UART: Caliptra RT
26,149,400 UART: [state] CFI Enabled
26,266,268 UART: [rt] RT listening for mailbox commands...
26,268,140 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,297,889 UART: [rt]cmd =0x46504c54, len=4
26,299,521 >>> mbox cmd response data (8 bytes)
26,300,851 UART: [rt] FIPS self test
26,301,793 UART: [kat] ++
26,302,246 UART: [kat] sha1
26,306,630 UART: [kat] SHA2-256
26,308,512 UART: [kat] SHA2-384
26,311,490 UART: [kat] SHA2-512-ACC
26,313,791 UART: [kat] ECC-384
28,739,502 UART: Fatal Error: 0x90040003
28,774,793 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,919,270 >>> mbox cmd response: failed
28,919,927 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,064,326 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,093 UART:
190,386 UART: Running Caliptra ROM ...
191,444 UART:
11,473,359 UART: [state] CFI Enabled
11,488,884 UART: [state] LifecycleState = Unprovisioned
11,491,238 UART: [state] DebugLocked = No
11,493,463 UART: [state] WD Timer not started. Device not locked for debugging
11,498,103 UART: [kat] SHA2-256
11,687,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,698,791 UART: [kat] ++
11,699,304 UART: [kat] sha1
11,710,519 UART: [kat] SHA2-256
11,713,540 UART: [kat] SHA2-384
11,719,800 UART: [kat] SHA2-512-ACC
11,722,431 UART: [kat] ECC-384
14,164,721 UART: [kat] HMAC-384Kdf
14,178,120 UART: [kat] LMS
14,709,950 UART: [kat] --
14,715,610 UART: [cold-reset] ++
14,716,571 UART: [fht] FHT @ 0x50003400
14,727,340 UART: [idev] ++
14,728,068 UART: [idev] CDI.KEYID = 6
14,728,976 UART: [idev] SUBJECT.KEYID = 7
14,730,205 UART: [idev] UDS.KEYID = 0
14,731,752 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,876,170 UART: [idev] Erasing UDS.KEYID = 0
17,207,970 UART: [idev] Sha1 KeyId Algorithm
17,231,789 UART: [idev] --
17,236,053 UART: [ldev] ++
17,236,736 UART: [ldev] CDI.KEYID = 6
17,237,702 UART: [ldev] SUBJECT.KEYID = 5
17,238,860 UART: [ldev] AUTHORITY.KEYID = 7
17,240,087 UART: [ldev] FE.KEYID = 1
17,250,138 UART: [ldev] Erasing FE.KEYID = 1
19,727,203 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,444,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,460,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,475,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,490,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,511,937 UART: [ldev] --
21,518,222 UART: [fwproc] Wait for Commands...
21,520,497 UART: [fwproc] Recv command 0x46574c44
21,522,766 UART: [fwproc] Recv'd Img size: 115032 bytes
24,982,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,057,696 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,173,873 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,719,988 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,759,258 ready_for_fw is high
3,759,868 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,986,064 >>> mbox cmd response: success
19,241,240 UART:
19,241,634 UART: Running Caliptra FMC ...
19,242,811 UART:
19,242,970 UART: [state] CFI Enabled
19,251,030 UART: [fht] FMC Alias Private Key: 7
21,007,932 UART: [art] Extend RT PCRs Done
21,009,164 UART: [art] Lock RT PCRs Done
21,010,859 UART: [art] Populate DV Done
21,016,125 UART: [fht] FMC Alias Private Key: 7
21,017,728 UART: [art] Derive CDI
21,018,548 UART: [art] Store in in slot 0x4
21,060,821 UART: [art] Derive Key Pair
21,061,829 UART: [art] Store priv key in slot 0x5
23,488,829 UART: [art] Derive Key Pair - Done
23,501,243 UART: [art] Signing Cert with AUTHO
23,502,551 UART: RITY.KEYID = 7
25,208,181 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,695 UART: [art] PUB.X = 24EA123FEE3DD84FD17D813DA9B8D9D8D54EF3EE926D6A775720468D8BD839732D99719CB1861480F9FFE1FE0DFD7A4A
25,216,973 UART: [art] PUB.Y = 1C6B161C6D787D58465F1C5BDFB2B8A184E8DC62672FC81CF3F5793947ED44961F4629E55602B005DFD68181D50E497A
25,224,190 UART: [art] SIG.R = D917BB49CCA076558482D599AB564B0F601C56572E19C27AFC5153D4DB5DB961CAA27AB31E3A6FC9C5A6FE34701E155C
25,231,634 UART: [art] SIG.S = 2F1FD7181458FE990FFA204584A3ED894753455675997D1AA91C007B1AD8C3088DE1F8632EB88749FF8151177B9AE0EB
26,210,292 UART: Caliptra RT
26,210,986 UART: [state] CFI Enabled
26,329,448 UART: [rt] RT listening for mailbox commands...
26,331,293 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,361,019 UART: [rt]cmd =0x46504c54, len=4
26,362,413 >>> mbox cmd response data (8 bytes)
26,363,670 UART: [rt] FIPS self test
26,364,609 UART: [kat] ++
26,365,062 UART: [kat] sha1
26,369,628 UART: [kat] SHA2-256
26,371,555 UART: [kat] SHA2-384
26,374,725 UART: [kat] SHA2-512-ACC
26,376,979 UART: [kat] ECC-384
28,802,916 UART: Fatal Error: 0x90040003
28,838,376 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,982,782 >>> mbox cmd response: failed
28,983,388 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,127,753 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
14,551,410 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,777,454 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,507 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,183 UART: [kat] SHA2-256
882,114 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,229 UART: [kat] ++
886,381 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,608 UART: [kat] SHA2-512-ACC
897,509 UART: [kat] ECC-384
903,334 UART: [kat] HMAC-384Kdf
907,802 UART: [kat] LMS
1,475,998 UART: [kat] --
1,476,969 UART: [cold-reset] ++
1,477,529 UART: [fht] Storing FHT @ 0x50003400
1,480,442 UART: [idev] ++
1,480,610 UART: [idev] CDI.KEYID = 6
1,480,970 UART: [idev] SUBJECT.KEYID = 7
1,481,394 UART: [idev] UDS.KEYID = 0
1,481,739 ready_for_fw is high
1,481,739 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,430 UART: [idev] Erasing UDS.KEYID = 0
1,505,476 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,132 UART: [idev] --
1,514,945 UART: [ldev] ++
1,515,113 UART: [ldev] CDI.KEYID = 6
1,515,476 UART: [ldev] SUBJECT.KEYID = 5
1,515,902 UART: [ldev] AUTHORITY.KEYID = 7
1,516,365 UART: [ldev] FE.KEYID = 1
1,521,385 UART: [ldev] Erasing FE.KEYID = 1
1,546,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,800 UART: [ldev] --
1,586,165 UART: [fwproc] Waiting for Commands...
1,586,944 UART: [fwproc] Received command 0x46574c44
1,587,735 UART: [fwproc] Received Image of size 115032 bytes
2,893,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,592 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,944 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,865 >>> mbox cmd response: success
3,088,889 UART: [afmc] ++
3,089,057 UART: [afmc] CDI.KEYID = 6
3,089,419 UART: [afmc] SUBJECT.KEYID = 7
3,089,844 UART: [afmc] AUTHORITY.KEYID = 5
3,125,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,419 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,199 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,927 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,812 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,502 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,289 UART: [afmc] --
3,168,311 UART: [cold-reset] --
3,168,951 UART: [state] Locking Datavault
3,170,496 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,100 UART: [state] Locking ICCM
3,171,550 UART: [exit] Launching FMC @ 0x40000130
3,176,879 UART:
3,176,895 UART: Running Caliptra FMC ...
3,177,303 UART:
3,177,357 UART: [state] CFI Enabled
3,187,680 UART: [fht] FMC Alias Private Key: 7
3,295,863 UART: [art] Extend RT PCRs Done
3,296,291 UART: [art] Lock RT PCRs Done
3,297,807 UART: [art] Populate DV Done
3,306,142 UART: [fht] FMC Alias Private Key: 7
3,307,238 UART: [art] Derive CDI
3,307,518 UART: [art] Store in in slot 0x4
3,393,033 UART: [art] Derive Key Pair
3,393,393 UART: [art] Store priv key in slot 0x5
3,406,975 UART: [art] Derive Key Pair - Done
3,421,616 UART: [art] Signing Cert with AUTHO
3,422,096 UART: RITY.KEYID = 7
3,437,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,385 UART: [art] PUB.X = F2A7D945CAB577193C65F8A4FBCB2200B66D991936D1AF5A482B21EE9C55613C6D75606E7B0873EEAE48065E65F0741F
3,445,133 UART: [art] PUB.Y = 7BF6FC9044F343FC6E267D91CACE30BD9BE360E241252C75850771AE1398EF48311EA100E3AB0D45075A14FD7F419D44
3,452,058 UART: [art] SIG.R = CB340A64342876F90C918951EFE4C669AE57E137B7092AD00CDD1874BADBB9F6264E9613E27FB377F7C26F7958EFA42E
3,458,824 UART: [art] SIG.S = AD117A365B4E8F0C74C86B064D37F1981F7E9D7BF37902C4D1C279FBF2E0BD46A85DF8EC8DB4345029080D27CBD1E23C
3,482,796 UART: Caliptra RT
3,483,049 UART: [state] CFI Enabled
3,590,965 UART: [rt] RT listening for mailbox commands...
3,591,628 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,645 UART: [rt]cmd =0x46504c54, len=4
3,622,803 >>> mbox cmd response data (8 bytes)
3,622,992 UART: [rt] FIPS self test
3,623,320 UART: [kat] ++
3,623,472 UART: [kat] sha1
3,627,752 UART: [kat] SHA2-256
3,629,774 UART: [kat] SHA2-384
3,632,755 UART: [kat] SHA2-512-ACC
3,634,682 UART: [kat] ECC-384
3,643,580 UART: Fatal Error: 0x90040003
3,645,119 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,645,124 >>> mbox cmd response: failed
3,645,124 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,645,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,340 UART: [kat] SHA2-512-ACC
897,241 UART: [kat] ECC-384
902,734 UART: [kat] HMAC-384Kdf
907,270 UART: [kat] LMS
1,475,466 UART: [kat] --
1,476,293 UART: [cold-reset] ++
1,476,755 UART: [fht] Storing FHT @ 0x50003400
1,479,542 UART: [idev] ++
1,479,710 UART: [idev] CDI.KEYID = 6
1,480,070 UART: [idev] SUBJECT.KEYID = 7
1,480,494 UART: [idev] UDS.KEYID = 0
1,480,839 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,322 UART: [idev] Erasing UDS.KEYID = 0
1,504,492 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,146 UART: [idev] --
1,514,269 UART: [ldev] ++
1,514,437 UART: [ldev] CDI.KEYID = 6
1,514,800 UART: [ldev] SUBJECT.KEYID = 5
1,515,226 UART: [ldev] AUTHORITY.KEYID = 7
1,515,689 UART: [ldev] FE.KEYID = 1
1,520,907 UART: [ldev] Erasing FE.KEYID = 1
1,546,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,642 UART: [ldev] --
1,585,045 UART: [fwproc] Waiting for Commands...
1,585,822 UART: [fwproc] Received command 0x46574c44
1,586,613 UART: [fwproc] Received Image of size 115032 bytes
2,893,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,074 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,426 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,423 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 ready_for_fw is high
1,362,391 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,235 >>> mbox cmd response: success
2,997,041 UART:
2,997,057 UART: Running Caliptra FMC ...
2,997,465 UART:
2,997,519 UART: [state] CFI Enabled
3,007,986 UART: [fht] FMC Alias Private Key: 7
3,115,951 UART: [art] Extend RT PCRs Done
3,116,379 UART: [art] Lock RT PCRs Done
3,118,191 UART: [art] Populate DV Done
3,126,316 UART: [fht] FMC Alias Private Key: 7
3,127,394 UART: [art] Derive CDI
3,127,674 UART: [art] Store in in slot 0x4
3,213,703 UART: [art] Derive Key Pair
3,214,063 UART: [art] Store priv key in slot 0x5
3,227,437 UART: [art] Derive Key Pair - Done
3,242,307 UART: [art] Signing Cert with AUTHO
3,242,787 UART: RITY.KEYID = 7
3,257,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,612 UART: [art] PUB.X = 484CA119A5A3528E81F83F8427FE5BEFD9BD3C623FFCF3388395857BA113D40FB05F873070BA4DE4BAEFB64297F98B79
3,265,391 UART: [art] PUB.Y = 91C475C48E1AE43758138255EEB46E16FCD3E63CAA5831C36C1AC512DEB839192C2104B233F4AB87708A2AE25A9E3577
3,272,342 UART: [art] SIG.R = 37D692D631A707E86EC83E742A43C2268ABE3630F1F7C50ACF46B8F05C59B9AC7DF0879A09C207846DD0627500D96C1D
3,279,082 UART: [art] SIG.S = 3EB4CC853C2F42EBE37A1F3A83750F245E1B0D54D6706110F6D690D38EAF03D3E829CE81190E9B6F6F5DE89A425057BA
3,302,719 UART: Caliptra RT
3,302,972 UART: [state] CFI Enabled
3,411,066 UART: [rt] RT listening for mailbox commands...
3,411,729 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,536 UART: [rt]cmd =0x46504c54, len=4
3,442,868 >>> mbox cmd response data (8 bytes)
3,443,021 UART: [rt] FIPS self test
3,443,349 UART: [kat] ++
3,443,501 UART: [kat] sha1
3,447,735 UART: [kat] SHA2-256
3,449,757 UART: [kat] SHA2-384
3,452,542 UART: [kat] SHA2-512-ACC
3,454,469 UART: [kat] ECC-384
3,464,313 UART: Fatal Error: 0x90040003
3,465,852 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,465,857 >>> mbox cmd response: failed
3,465,857 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,465,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,489 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,349 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,414 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,282 UART: [kat] SHA2-256
892,220 UART: [kat] SHA2-384
895,099 UART: [kat] SHA2-512-ACC
897,000 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,495 UART: [kat] LMS
1,475,691 UART: [kat] --
1,476,552 UART: [cold-reset] ++
1,476,980 UART: [fht] Storing FHT @ 0x50003400
1,479,905 UART: [idev] ++
1,480,073 UART: [idev] CDI.KEYID = 6
1,480,433 UART: [idev] SUBJECT.KEYID = 7
1,480,857 UART: [idev] UDS.KEYID = 0
1,481,202 ready_for_fw is high
1,481,202 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,049 UART: [idev] Erasing UDS.KEYID = 0
1,505,579 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,289 UART: [idev] --
1,515,208 UART: [ldev] ++
1,515,376 UART: [ldev] CDI.KEYID = 6
1,515,739 UART: [ldev] SUBJECT.KEYID = 5
1,516,165 UART: [ldev] AUTHORITY.KEYID = 7
1,516,628 UART: [ldev] FE.KEYID = 1
1,522,010 UART: [ldev] Erasing FE.KEYID = 1
1,547,183 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,231 UART: [ldev] --
1,586,604 UART: [fwproc] Waiting for Commands...
1,587,327 UART: [fwproc] Received command 0x46574c44
1,588,118 UART: [fwproc] Received Image of size 115032 bytes
2,893,425 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,515 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,867 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,750 >>> mbox cmd response: success
3,087,804 UART: [afmc] ++
3,087,972 UART: [afmc] CDI.KEYID = 6
3,088,334 UART: [afmc] SUBJECT.KEYID = 7
3,088,759 UART: [afmc] AUTHORITY.KEYID = 5
3,123,876 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,570 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,298 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,183 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,873 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,688 UART: [afmc] --
3,166,596 UART: [cold-reset] --
3,167,494 UART: [state] Locking Datavault
3,168,657 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,261 UART: [state] Locking ICCM
3,169,823 UART: [exit] Launching FMC @ 0x40000130
3,175,152 UART:
3,175,168 UART: Running Caliptra FMC ...
3,175,576 UART:
3,175,719 UART: [state] CFI Enabled
3,186,190 UART: [fht] FMC Alias Private Key: 7
3,294,475 UART: [art] Extend RT PCRs Done
3,294,903 UART: [art] Lock RT PCRs Done
3,296,371 UART: [art] Populate DV Done
3,304,360 UART: [fht] FMC Alias Private Key: 7
3,305,488 UART: [art] Derive CDI
3,305,768 UART: [art] Store in in slot 0x4
3,391,581 UART: [art] Derive Key Pair
3,391,941 UART: [art] Store priv key in slot 0x5
3,405,699 UART: [art] Derive Key Pair - Done
3,420,670 UART: [art] Signing Cert with AUTHO
3,421,150 UART: RITY.KEYID = 7
3,436,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,405 UART: [art] PUB.X = 4EEB9E4392AC255275750260CC496F24943797F8AB07F7324990BD9DF1DB15BC3E03DC7D73B82B91FE749D9A583F404B
3,444,170 UART: [art] PUB.Y = A7D426BEA1E1DD701ABBEA00F6DE5A6B9988CC00474CD42655277FFF2AD8745C3120E40E391C264A759409A444C8FB9F
3,451,082 UART: [art] SIG.R = 3A087371484DBE8F89E88B5AC749225AA628C5298190360E443740727067F98942949E712BEF39FF06B26056B0E3B045
3,457,829 UART: [art] SIG.S = FC5B66A9AE27E78620452E1D5136FD887F669C6B55F9B737C462E712EB4C7FC15BCAC2DA8080776CAF1C68C07D788C9A
3,482,472 UART: Caliptra RT
3,482,817 UART: [state] CFI Enabled
3,590,368 UART: [rt] RT listening for mailbox commands...
3,591,031 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,440 UART: [rt]cmd =0x46504c54, len=4
3,621,492 >>> mbox cmd response data (8 bytes)
3,621,607 UART: [rt] FIPS self test
3,621,935 UART: [kat] ++
3,622,087 UART: [kat] sha1
3,626,477 UART: [kat] SHA2-256
3,628,499 UART: [kat] SHA2-384
3,631,556 UART: [kat] SHA2-512-ACC
3,633,483 UART: [kat] ECC-384
3,643,605 UART: Fatal Error: 0x90040003
3,645,144 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,645,149 >>> mbox cmd response: failed
3,645,149 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,645,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,152 UART: [kat] SHA2-256
882,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,198 UART: [kat] ++
886,350 UART: [kat] sha1
890,562 UART: [kat] SHA2-256
892,500 UART: [kat] SHA2-384
895,209 UART: [kat] SHA2-512-ACC
897,110 UART: [kat] ECC-384
902,871 UART: [kat] HMAC-384Kdf
907,403 UART: [kat] LMS
1,475,599 UART: [kat] --
1,476,498 UART: [cold-reset] ++
1,476,848 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,129 UART: [idev] Erasing UDS.KEYID = 0
1,505,797 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,563 UART: [idev] --
1,515,534 UART: [ldev] ++
1,515,702 UART: [ldev] CDI.KEYID = 6
1,516,065 UART: [ldev] SUBJECT.KEYID = 5
1,516,491 UART: [ldev] AUTHORITY.KEYID = 7
1,516,954 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,277 UART: [ldev] --
1,587,594 UART: [fwproc] Waiting for Commands...
1,588,263 UART: [fwproc] Received command 0x46574c44
1,589,054 UART: [fwproc] Received Image of size 115032 bytes
2,894,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,453 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,726 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,174 ready_for_fw is high
1,362,174 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,310 >>> mbox cmd response: success
2,998,044 UART:
2,998,060 UART: Running Caliptra FMC ...
2,998,468 UART:
2,998,611 UART: [state] CFI Enabled
3,009,428 UART: [fht] FMC Alias Private Key: 7
3,117,859 UART: [art] Extend RT PCRs Done
3,118,287 UART: [art] Lock RT PCRs Done
3,119,697 UART: [art] Populate DV Done
3,127,936 UART: [fht] FMC Alias Private Key: 7
3,129,028 UART: [art] Derive CDI
3,129,308 UART: [art] Store in in slot 0x4
3,214,869 UART: [art] Derive Key Pair
3,215,229 UART: [art] Store priv key in slot 0x5
3,228,309 UART: [art] Derive Key Pair - Done
3,243,006 UART: [art] Signing Cert with AUTHO
3,243,486 UART: RITY.KEYID = 7
3,258,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,549 UART: [art] PUB.X = 6BCB5FA6557F3F929AE58D28F3F073A9D6A8B9CCE05E93BEECD95AA81D0D2F03157F86AEBAF169362DF0F83D05F68F9B
3,266,334 UART: [art] PUB.Y = 8E0D9456EC65F973D0D479570DD3D4EB3F81DEFACC36AB8F0BDAAAEB8507508B996DAFE4E36950DF1DC36B80EEA4B62C
3,273,300 UART: [art] SIG.R = 84822124463AFA8A5DA1F9CBE3057989FED55BF3E536AF6BF2915DFF6725FF8F07441A0C41472B6AF4A305399C764186
3,280,062 UART: [art] SIG.S = 85A57EF4B830EAA37B29E8B5C9446FE7B9DB1CAA3577EDEC147443B892D8E2CA205FB43BA99B077B2C8E8E7C893B38EA
3,303,932 UART: Caliptra RT
3,304,277 UART: [state] CFI Enabled
3,412,761 UART: [rt] RT listening for mailbox commands...
3,413,424 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,389 UART: [rt]cmd =0x46504c54, len=4
3,444,353 >>> mbox cmd response data (8 bytes)
3,444,626 UART: [rt] FIPS self test
3,444,954 UART: [kat] ++
3,445,106 UART: [kat] sha1
3,449,216 UART: [kat] SHA2-256
3,451,238 UART: [kat] SHA2-384
3,454,291 UART: [kat] SHA2-512-ACC
3,456,218 UART: [kat] ECC-384
3,465,288 UART: Fatal Error: 0x90040003
3,466,827 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,466,832 >>> mbox cmd response: failed
3,466,832 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,466,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,236 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,608 UART: [kat] SHA2-512-ACC
908,509 UART: [kat] ECC-384
917,984 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,947 UART: [cold-reset] ++
1,172,379 UART: [fht] FHT @ 0x50003400
1,175,126 UART: [idev] ++
1,175,294 UART: [idev] CDI.KEYID = 6
1,175,654 UART: [idev] SUBJECT.KEYID = 7
1,176,078 UART: [idev] UDS.KEYID = 0
1,176,423 ready_for_fw is high
1,176,423 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,732 UART: [idev] Erasing UDS.KEYID = 0
1,200,595 UART: [idev] Sha1 KeyId Algorithm
1,209,027 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,524 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,769 UART: [ldev] Erasing FE.KEYID = 1
1,243,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,898 UART: [fwproc] Wait for Commands...
1,282,706 UART: [fwproc] Recv command 0x46574c44
1,283,434 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,185 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,489 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,398 >>> mbox cmd response: success
2,784,444 UART: [afmc] ++
2,784,612 UART: [afmc] CDI.KEYID = 6
2,784,974 UART: [afmc] SUBJECT.KEYID = 7
2,785,399 UART: [afmc] AUTHORITY.KEYID = 5
2,821,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,317 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,065 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,793 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,678 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,397 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,257 UART: [afmc] --
2,865,329 UART: [cold-reset] --
2,866,377 UART: [state] Locking Datavault
2,867,546 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,150 UART: [state] Locking ICCM
2,868,606 UART: [exit] Launching FMC @ 0x40000130
2,873,935 UART:
2,873,951 UART: Running Caliptra FMC ...
2,874,359 UART:
2,874,413 UART: [state] CFI Enabled
2,884,748 UART: [fht] FMC Alias Private Key: 7
2,992,201 UART: [art] Extend RT PCRs Done
2,992,629 UART: [art] Lock RT PCRs Done
2,994,065 UART: [art] Populate DV Done
3,002,202 UART: [fht] FMC Alias Private Key: 7
3,003,248 UART: [art] Derive CDI
3,003,528 UART: [art] Store in in slot 0x4
3,089,495 UART: [art] Derive Key Pair
3,089,855 UART: [art] Store priv key in slot 0x5
3,103,223 UART: [art] Derive Key Pair - Done
3,117,447 UART: [art] Signing Cert with AUTHO
3,117,927 UART: RITY.KEYID = 7
3,132,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,294 UART: [art] PUB.X = 75DB986A5F9CFC0D52F73EACAE0837BD94A0A32C93DB3F8DC644682C0A1AC6724DB6101E1F48C3B1C91952F7B04F149E
3,140,071 UART: [art] PUB.Y = BF82DAA86B7C1532AA8B287AC84DB8D95532F77CC735245C4A51E2F354DDFCAD587503EC73F53FAB5F056642DE80D40E
3,147,028 UART: [art] SIG.R = BE94470033D890D5E91C5573F53F6C5437B59393C79209A4A4820B7F807166B4E4FAD3B1C95F4C0A087901AFB19F31ED
3,153,761 UART: [art] SIG.S = E24CD42CF4206AF82D72F4C5190EF87CCB1FE0B6C9AFD079063EBECF4E78547852057BC722C89CEBA6ABE24D64B8E7AB
3,178,105 UART: Caliptra RT
3,178,358 UART: [state] CFI Enabled
3,286,172 UART: [rt] RT listening for mailbox commands...
3,286,835 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,806 UART: [rt]cmd =0x46504c54, len=4
3,317,970 >>> mbox cmd response data (8 bytes)
3,318,179 UART: [rt] FIPS self test
3,318,507 UART: [kat] ++
3,318,659 UART: [kat] sha1
3,323,035 UART: [kat] SHA2-256
3,325,057 UART: [kat] SHA2-384
3,327,704 UART: [kat] SHA2-512-ACC
3,329,631 UART: [kat] ECC-384
3,338,903 UART: Fatal Error: 0x90040003
3,340,442 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,340,447 >>> mbox cmd response: failed
3,340,447 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,340,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,823 UART: [kat] SHA2-256
903,763 UART: [kat] SHA2-384
906,644 UART: [kat] SHA2-512-ACC
908,545 UART: [kat] ECC-384
918,468 UART: [kat] HMAC-384Kdf
923,102 UART: [kat] LMS
1,171,430 UART: [kat] --
1,172,263 UART: [cold-reset] ++
1,172,743 UART: [fht] FHT @ 0x50003400
1,175,514 UART: [idev] ++
1,175,682 UART: [idev] CDI.KEYID = 6
1,176,042 UART: [idev] SUBJECT.KEYID = 7
1,176,466 UART: [idev] UDS.KEYID = 0
1,176,811 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,774 UART: [idev] Erasing UDS.KEYID = 0
1,202,043 UART: [idev] Sha1 KeyId Algorithm
1,210,631 UART: [idev] --
1,211,595 UART: [ldev] ++
1,211,763 UART: [ldev] CDI.KEYID = 6
1,212,126 UART: [ldev] SUBJECT.KEYID = 5
1,212,552 UART: [ldev] AUTHORITY.KEYID = 7
1,213,015 UART: [ldev] FE.KEYID = 1
1,218,215 UART: [ldev] Erasing FE.KEYID = 1
1,244,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,063 UART: [ldev] --
1,283,550 UART: [fwproc] Wait for Commands...
1,284,156 UART: [fwproc] Recv command 0x46574c44
1,284,884 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,969 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,273 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,110 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,395 ready_for_fw is high
1,060,395 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,987 >>> mbox cmd response: success
2,695,521 UART:
2,695,537 UART: Running Caliptra FMC ...
2,695,945 UART:
2,695,999 UART: [state] CFI Enabled
2,706,930 UART: [fht] FMC Alias Private Key: 7
2,815,129 UART: [art] Extend RT PCRs Done
2,815,557 UART: [art] Lock RT PCRs Done
2,816,847 UART: [art] Populate DV Done
2,824,930 UART: [fht] FMC Alias Private Key: 7
2,825,970 UART: [art] Derive CDI
2,826,250 UART: [art] Store in in slot 0x4
2,912,241 UART: [art] Derive Key Pair
2,912,601 UART: [art] Store priv key in slot 0x5
2,926,137 UART: [art] Derive Key Pair - Done
2,941,156 UART: [art] Signing Cert with AUTHO
2,941,636 UART: RITY.KEYID = 7
2,957,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,881 UART: [art] PUB.X = 87A2969B454D556F0A42E6471B52F57BFBC6DB22FC9916032D7EED8A49316E5E91BF1D683A198D22B3F47FCB6E82AB55
2,964,655 UART: [art] PUB.Y = A252A323E601B6BC507C05DA6B3FE51568D99D5AF77E3993B45F6BCA920C81421ACFADDC5EE85A6737DCD347CC6F23C6
2,971,614 UART: [art] SIG.R = 32572C62E7DBC9ED0115342A02F4FE89D775271517150CA0DE96808BBC4677B1462A36B33CFF1FD27EBAD1AA01F364C5
2,978,380 UART: [art] SIG.S = 38F7DD5EA90D0220FBD0B5ED18FE1B05C7A09C143F3897B29A540835C52D762699B895E9CD65D9720182C09FA91BFBC7
3,002,162 UART: Caliptra RT
3,002,415 UART: [state] CFI Enabled
3,109,876 UART: [rt] RT listening for mailbox commands...
3,110,539 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,578 UART: [rt]cmd =0x46504c54, len=4
3,141,936 >>> mbox cmd response data (8 bytes)
3,142,085 UART: [rt] FIPS self test
3,142,413 UART: [kat] ++
3,142,565 UART: [kat] sha1
3,146,917 UART: [kat] SHA2-256
3,148,939 UART: [kat] SHA2-384
3,151,682 UART: [kat] SHA2-512-ACC
3,153,609 UART: [kat] ECC-384
3,162,901 UART: Fatal Error: 0x90040003
3,164,440 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,164,445 >>> mbox cmd response: failed
3,164,445 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,164,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,387 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,369 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
893,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,888 UART: [kat] ++
898,040 UART: [kat] sha1
902,328 UART: [kat] SHA2-256
904,268 UART: [kat] SHA2-384
906,919 UART: [kat] SHA2-512-ACC
908,820 UART: [kat] ECC-384
918,477 UART: [kat] HMAC-384Kdf
923,169 UART: [kat] LMS
1,171,497 UART: [kat] --
1,172,308 UART: [cold-reset] ++
1,172,864 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 ready_for_fw is high
1,176,802 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,573 UART: [idev] Erasing UDS.KEYID = 0
1,202,212 UART: [idev] Sha1 KeyId Algorithm
1,210,708 UART: [idev] --
1,211,826 UART: [ldev] ++
1,211,994 UART: [ldev] CDI.KEYID = 6
1,212,357 UART: [ldev] SUBJECT.KEYID = 5
1,212,783 UART: [ldev] AUTHORITY.KEYID = 7
1,213,246 UART: [ldev] FE.KEYID = 1
1,218,810 UART: [ldev] Erasing FE.KEYID = 1
1,245,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,574 UART: [ldev] --
1,284,993 UART: [fwproc] Wait for Commands...
1,285,597 UART: [fwproc] Recv command 0x46574c44
1,286,325 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,830 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,134 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,107 >>> mbox cmd response: success
2,785,289 UART: [afmc] ++
2,785,457 UART: [afmc] CDI.KEYID = 6
2,785,819 UART: [afmc] SUBJECT.KEYID = 7
2,786,244 UART: [afmc] AUTHORITY.KEYID = 5
2,821,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,602 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,330 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,215 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,934 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,832 UART: [afmc] --
2,864,842 UART: [cold-reset] --
2,865,718 UART: [state] Locking Datavault
2,866,947 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,551 UART: [state] Locking ICCM
2,868,023 UART: [exit] Launching FMC @ 0x40000130
2,873,352 UART:
2,873,368 UART: Running Caliptra FMC ...
2,873,776 UART:
2,873,919 UART: [state] CFI Enabled
2,884,686 UART: [fht] FMC Alias Private Key: 7
2,992,213 UART: [art] Extend RT PCRs Done
2,992,641 UART: [art] Lock RT PCRs Done
2,994,121 UART: [art] Populate DV Done
3,002,216 UART: [fht] FMC Alias Private Key: 7
3,003,246 UART: [art] Derive CDI
3,003,526 UART: [art] Store in in slot 0x4
3,089,335 UART: [art] Derive Key Pair
3,089,695 UART: [art] Store priv key in slot 0x5
3,103,309 UART: [art] Derive Key Pair - Done
3,118,034 UART: [art] Signing Cert with AUTHO
3,118,514 UART: RITY.KEYID = 7
3,133,716 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,481 UART: [art] PUB.X = 62E001540CFDB8B3D1CC3366EEFBB88F245F4730B5E3A55488D04FAD25036149FCF8A97AAF565A88EABBEB2173B65419
3,141,256 UART: [art] PUB.Y = 8385A7FD9F4784B80C491EED9C32067CF7D8AF7A793A3D359527EC0C9536BCEF2ECAB548697CE0DCF6CBCE78C1C0B61A
3,148,219 UART: [art] SIG.R = 196EF008FC13EAB703467B5AF3BD12AE8DA797F7DE1E5645521C03F94092AD8CBEFCC7BE0FCEA023C7D1D4EC2F842F93
3,155,001 UART: [art] SIG.S = 0517A9715EC807B6892E017252DE3EC5330FC9C65570865763D0578B6101CC72FE0B77C793305741A34B2456368A69A3
3,179,298 UART: Caliptra RT
3,179,643 UART: [state] CFI Enabled
3,287,142 UART: [rt] RT listening for mailbox commands...
3,287,805 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,516 UART: [rt]cmd =0x46504c54, len=4
3,318,750 >>> mbox cmd response data (8 bytes)
3,318,891 UART: [rt] FIPS self test
3,319,219 UART: [kat] ++
3,319,371 UART: [kat] sha1
3,323,503 UART: [kat] SHA2-256
3,325,525 UART: [kat] SHA2-384
3,328,356 UART: [kat] SHA2-512-ACC
3,330,283 UART: [kat] ECC-384
3,339,995 UART: Fatal Error: 0x90040003
3,341,534 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,341,539 >>> mbox cmd response: failed
3,341,539 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,341,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,167 UART: [state] LifecycleState = Unprovisioned
85,822 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
893,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,446 UART: [kat] ++
897,598 UART: [kat] sha1
901,616 UART: [kat] SHA2-256
903,556 UART: [kat] SHA2-384
906,231 UART: [kat] SHA2-512-ACC
908,132 UART: [kat] ECC-384
918,009 UART: [kat] HMAC-384Kdf
922,691 UART: [kat] LMS
1,171,019 UART: [kat] --
1,172,018 UART: [cold-reset] ++
1,172,386 UART: [fht] FHT @ 0x50003400
1,175,107 UART: [idev] ++
1,175,275 UART: [idev] CDI.KEYID = 6
1,175,635 UART: [idev] SUBJECT.KEYID = 7
1,176,059 UART: [idev] UDS.KEYID = 0
1,176,404 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,615 UART: [idev] Erasing UDS.KEYID = 0
1,200,698 UART: [idev] Sha1 KeyId Algorithm
1,208,962 UART: [idev] --
1,210,058 UART: [ldev] ++
1,210,226 UART: [ldev] CDI.KEYID = 6
1,210,589 UART: [ldev] SUBJECT.KEYID = 5
1,211,015 UART: [ldev] AUTHORITY.KEYID = 7
1,211,478 UART: [ldev] FE.KEYID = 1
1,216,936 UART: [ldev] Erasing FE.KEYID = 1
1,243,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,642 UART: [ldev] --
1,283,133 UART: [fwproc] Wait for Commands...
1,283,777 UART: [fwproc] Recv command 0x46574c44
1,284,505 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,494 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,798 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,739 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,552 ready_for_fw is high
1,061,552 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,637,806 >>> mbox cmd response: success
2,699,572 UART:
2,699,588 UART: Running Caliptra FMC ...
2,699,996 UART:
2,700,139 UART: [state] CFI Enabled
2,710,992 UART: [fht] FMC Alias Private Key: 7
2,818,693 UART: [art] Extend RT PCRs Done
2,819,121 UART: [art] Lock RT PCRs Done
2,820,651 UART: [art] Populate DV Done
2,828,682 UART: [fht] FMC Alias Private Key: 7
2,829,640 UART: [art] Derive CDI
2,829,920 UART: [art] Store in in slot 0x4
2,915,609 UART: [art] Derive Key Pair
2,915,969 UART: [art] Store priv key in slot 0x5
2,929,791 UART: [art] Derive Key Pair - Done
2,944,546 UART: [art] Signing Cert with AUTHO
2,945,026 UART: RITY.KEYID = 7
2,960,148 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,913 UART: [art] PUB.X = 270A6FDAC818F1676CE7F4A3B7FFDA40B45EFDE3F61DEC5E6ABF6E0A91F501D4A244046C4EE2C9C3C7C4D7384F0138D3
2,967,692 UART: [art] PUB.Y = BF8A89A32EF7D35C6DA7E995644F4D388589E761B1BEED78BC94C7F1F152008C01B2DA7A11E2DA3376FAA51F08D27E81
2,974,628 UART: [art] SIG.R = E6419E38D3802884FB9832053F75CBD5D38FDB95BD361FE7C1095AA71E015043D8B77D6F59DC062DF825DDDE49CBB178
2,981,396 UART: [art] SIG.S = 522EEF693136AD45EB34D9A7C879527BC4B409D721C0AFFB01A6636FA4CDC7D511BBA54F4BDB6CA2FAE6CCB00D558DFE
3,005,470 UART: Caliptra RT
3,005,815 UART: [state] CFI Enabled
3,114,008 UART: [rt] RT listening for mailbox commands...
3,114,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,738 UART: [rt]cmd =0x46504c54, len=4
3,145,768 >>> mbox cmd response data (8 bytes)
3,145,933 UART: [rt] FIPS self test
3,146,261 UART: [kat] ++
3,146,413 UART: [kat] sha1
3,150,555 UART: [kat] SHA2-256
3,152,577 UART: [kat] SHA2-384
3,155,512 UART: [kat] SHA2-512-ACC
3,157,439 UART: [kat] ECC-384
3,167,083 UART: Fatal Error: 0x90040003
3,168,622 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,168,627 >>> mbox cmd response: failed
3,168,627 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,168,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,076 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,836 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,057 UART: [kat] ++
895,209 UART: [kat] sha1
899,427 UART: [kat] SHA2-256
901,367 UART: [kat] SHA2-384
904,100 UART: [kat] SHA2-512-ACC
906,001 UART: [kat] ECC-384
915,296 UART: [kat] HMAC-384Kdf
919,902 UART: [kat] LMS
1,168,214 UART: [kat] --
1,169,253 UART: [cold-reset] ++
1,169,615 UART: [fht] FHT @ 0x50003400
1,172,469 UART: [idev] ++
1,172,637 UART: [idev] CDI.KEYID = 6
1,172,998 UART: [idev] SUBJECT.KEYID = 7
1,173,423 UART: [idev] UDS.KEYID = 0
1,173,769 ready_for_fw is high
1,173,769 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,375 UART: [idev] Erasing UDS.KEYID = 0
1,198,285 UART: [idev] Sha1 KeyId Algorithm
1,207,251 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,516 UART: [ldev] Erasing FE.KEYID = 1
1,240,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,230 UART: [ldev] --
1,279,580 UART: [fwproc] Wait for Commands...
1,280,325 UART: [fwproc] Recv command 0x46574c44
1,281,058 UART: [fwproc] Recv'd Img size: 115032 bytes
2,584,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,125 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,640,434 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,777,362 >>> mbox cmd response: success
2,778,381 UART: [afmc] ++
2,778,549 UART: [afmc] CDI.KEYID = 6
2,778,912 UART: [afmc] SUBJECT.KEYID = 7
2,779,338 UART: [afmc] AUTHORITY.KEYID = 5
2,814,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,837,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,843,406 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,849,125 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,856,940 UART: [afmc] --
2,857,906 UART: [cold-reset] --
2,858,872 UART: [state] Locking Datavault
2,859,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,591 UART: [state] Locking ICCM
2,861,183 UART: [exit] Launching FMC @ 0x40000130
2,866,512 UART:
2,866,528 UART: Running Caliptra FMC ...
2,866,936 UART:
2,866,990 UART: [state] CFI Enabled
2,877,681 UART: [fht] FMC Alias Private Key: 7
2,985,874 UART: [art] Extend RT PCRs Done
2,986,302 UART: [art] Lock RT PCRs Done
2,987,842 UART: [art] Populate DV Done
2,996,259 UART: [fht] FMC Alias Private Key: 7
2,997,439 UART: [art] Derive CDI
2,997,719 UART: [art] Store in in slot 0x4
3,083,396 UART: [art] Derive Key Pair
3,083,756 UART: [art] Store priv key in slot 0x5
3,096,910 UART: [art] Derive Key Pair - Done
3,111,385 UART: [art] Signing Cert with AUTHO
3,111,865 UART: RITY.KEYID = 7
3,126,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,127,648 UART: [art] PUB.X = 136A8861AFD50EAF19B094D168797352468DFCBE63EEC1844942B17E7C9E29ABC06009F9E3F103EEFEB74A8C6E883DCE
3,134,423 UART: [art] PUB.Y = 7CB0C776EF926B14D618187098A3DE28DC93432BBC7D61654F6CD8AA39988ACA7D821748F17B255E5B3830A031DA3DEE
3,141,381 UART: [art] SIG.R = C59B5774E0B66061453DD567983F18309EFFC0789A5A91743E231DE1BE82E99443D94FB75FF28F2263F9A8326EF3B571
3,148,149 UART: [art] SIG.S = 2C238ADAEEF74AF98494DAFF9A497FC0D943406099A2208428676CA68FF1A83C78B489B4643A9BB67E747669A923D06E
3,171,506 UART: Caliptra RT
3,171,759 UART: [state] CFI Enabled
3,279,232 UART: [rt] RT listening for mailbox commands...
3,279,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,309,466 UART: [rt]cmd =0x46504c54, len=4
3,310,476 >>> mbox cmd response data (8 bytes)
3,310,595 UART: [rt] FIPS self test
3,310,923 UART: [kat] ++
3,311,075 UART: [kat] sha1
3,315,301 UART: [kat] SHA2-256
3,317,323 UART: [kat] SHA2-384
3,320,066 UART: [kat] SHA2-512-ACC
3,321,993 UART: [kat] ECC-384
3,331,799 UART: Fatal Error: 0x90040003
3,333,338 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,343 >>> mbox cmd response: failed
3,333,343 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
916,228 UART: [kat] HMAC-384Kdf
920,736 UART: [kat] LMS
1,169,048 UART: [kat] --
1,170,031 UART: [cold-reset] ++
1,170,413 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,174,499 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,139 UART: [idev] Erasing UDS.KEYID = 0
1,199,611 UART: [idev] Sha1 KeyId Algorithm
1,208,521 UART: [idev] --
1,209,386 UART: [ldev] ++
1,209,554 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,345 UART: [ldev] AUTHORITY.KEYID = 7
1,210,808 UART: [ldev] FE.KEYID = 1
1,215,690 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,804 UART: [ldev] --
1,281,184 UART: [fwproc] Wait for Commands...
1,281,787 UART: [fwproc] Recv command 0x46574c44
1,282,520 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,829 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,138 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,028 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,744 ready_for_fw is high
1,055,744 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,344 >>> mbox cmd response: success
2,691,082 UART:
2,691,098 UART: Running Caliptra FMC ...
2,691,506 UART:
2,691,560 UART: [state] CFI Enabled
2,702,181 UART: [fht] FMC Alias Private Key: 7
2,809,992 UART: [art] Extend RT PCRs Done
2,810,420 UART: [art] Lock RT PCRs Done
2,811,804 UART: [art] Populate DV Done
2,820,171 UART: [fht] FMC Alias Private Key: 7
2,821,217 UART: [art] Derive CDI
2,821,497 UART: [art] Store in in slot 0x4
2,906,764 UART: [art] Derive Key Pair
2,907,124 UART: [art] Store priv key in slot 0x5
2,920,384 UART: [art] Derive Key Pair - Done
2,935,317 UART: [art] Signing Cert with AUTHO
2,935,797 UART: RITY.KEYID = 7
2,951,033 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,798 UART: [art] PUB.X = E596B88A5A4F1DB4B7CDD9298BE45F4DC9A4F33E575EF6F39ED613DDAE8EA745071135219BF7A9156321E0D72388BCAD
2,958,581 UART: [art] PUB.Y = 45F40256561091394C9A02A794270F4D525408D516172EA0E6335844761A04CE08007CA44DB0886EA6C05F747A027D6C
2,965,474 UART: [art] SIG.R = CEFCD76B4FB2016517E0ACB9BA10FC07C6F1E893235DB426DDDDF2C2D6FC9D2413F622F502426A9E63E63F0FE08CF365
2,972,252 UART: [art] SIG.S = 2FF0484447F57CA9052F4AA16413DCCE014F67475AC5456EEF83870067DB6FBBCE184C74FDE99C06FF966B2D3E136BFD
2,995,602 UART: Caliptra RT
2,995,855 UART: [state] CFI Enabled
3,103,720 UART: [rt] RT listening for mailbox commands...
3,104,383 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,182 UART: [rt]cmd =0x46504c54, len=4
3,135,382 >>> mbox cmd response data (8 bytes)
3,135,651 UART: [rt] FIPS self test
3,135,979 UART: [kat] ++
3,136,131 UART: [kat] sha1
3,140,547 UART: [kat] SHA2-256
3,142,569 UART: [kat] SHA2-384
3,145,530 UART: [kat] SHA2-512-ACC
3,147,457 UART: [kat] ECC-384
3,156,567 UART: Fatal Error: 0x90040003
3,158,106 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,158,111 >>> mbox cmd response: failed
3,158,111 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,158,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,928 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,586 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,328 UART: [fht] FHT @ 0x50003400
1,173,068 UART: [idev] ++
1,173,236 UART: [idev] CDI.KEYID = 6
1,173,597 UART: [idev] SUBJECT.KEYID = 7
1,174,022 UART: [idev] UDS.KEYID = 0
1,174,368 ready_for_fw is high
1,174,368 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,104 UART: [idev] Erasing UDS.KEYID = 0
1,199,266 UART: [idev] Sha1 KeyId Algorithm
1,208,150 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,575 UART: [fwproc] Wait for Commands...
1,282,398 UART: [fwproc] Recv command 0x46574c44
1,283,131 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,682 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,991 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,795 >>> mbox cmd response: success
2,783,010 UART: [afmc] ++
2,783,178 UART: [afmc] CDI.KEYID = 6
2,783,541 UART: [afmc] SUBJECT.KEYID = 7
2,783,967 UART: [afmc] AUTHORITY.KEYID = 5
2,819,388 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,946 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,829 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,548 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,413 UART: [afmc] --
2,862,433 UART: [cold-reset] --
2,863,143 UART: [state] Locking Datavault
2,864,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,932 UART: [state] Locking ICCM
2,865,552 UART: [exit] Launching FMC @ 0x40000130
2,870,881 UART:
2,870,897 UART: Running Caliptra FMC ...
2,871,305 UART:
2,871,448 UART: [state] CFI Enabled
2,882,117 UART: [fht] FMC Alias Private Key: 7
2,990,192 UART: [art] Extend RT PCRs Done
2,990,620 UART: [art] Lock RT PCRs Done
2,991,964 UART: [art] Populate DV Done
3,000,139 UART: [fht] FMC Alias Private Key: 7
3,001,117 UART: [art] Derive CDI
3,001,397 UART: [art] Store in in slot 0x4
3,087,136 UART: [art] Derive Key Pair
3,087,496 UART: [art] Store priv key in slot 0x5
3,100,660 UART: [art] Derive Key Pair - Done
3,115,258 UART: [art] Signing Cert with AUTHO
3,115,738 UART: RITY.KEYID = 7
3,130,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,707 UART: [art] PUB.X = 4560650AF7AD69A6810200CE7149D9CE51AD8A041965BB2852EBE43D502085D34CDE1574692C82207952B5B05469CFAE
3,138,444 UART: [art] PUB.Y = 78BF3E9B51FEB3F08FF58CFB215AE9A1F7640A659EC0A697AB2E2AB254073E47A86A65C975C8FA15139855E720DB66D8
3,145,400 UART: [art] SIG.R = 26B4038EB57C95C31D9A7959A6B05FDA0C1C5FA78C1B1D185128AC0D0E43B12B433B1D7A18B0AA55764E947AE6F5A131
3,152,168 UART: [art] SIG.S = 672A5C84DFBBF10645B74C3AF8C0A1DDD43D55AC9E2E053F63F730202F9450AAF301BEEFFF5FEEC3BCDE5EAA2DFC91D9
3,175,942 UART: Caliptra RT
3,176,287 UART: [state] CFI Enabled
3,285,046 UART: [rt] RT listening for mailbox commands...
3,285,709 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,254 UART: [rt]cmd =0x46504c54, len=4
3,316,424 >>> mbox cmd response data (8 bytes)
3,316,637 UART: [rt] FIPS self test
3,316,965 UART: [kat] ++
3,317,117 UART: [kat] sha1
3,321,229 UART: [kat] SHA2-256
3,323,251 UART: [kat] SHA2-384
3,326,086 UART: [kat] SHA2-512-ACC
3,328,013 UART: [kat] ECC-384
3,337,559 UART: Fatal Error: 0x90040003
3,339,098 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,339,103 >>> mbox cmd response: failed
3,339,103 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,339,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,980 UART: [kat] ++
896,132 UART: [kat] sha1
900,272 UART: [kat] SHA2-256
902,212 UART: [kat] SHA2-384
904,963 UART: [kat] SHA2-512-ACC
906,864 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,969 UART: [kat] LMS
1,169,281 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,174,798 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,650 UART: [idev] Erasing UDS.KEYID = 0
1,199,736 UART: [idev] Sha1 KeyId Algorithm
1,208,602 UART: [idev] --
1,209,699 UART: [ldev] ++
1,209,867 UART: [ldev] CDI.KEYID = 6
1,210,231 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,591 UART: [ldev] --
1,281,889 UART: [fwproc] Wait for Commands...
1,282,554 UART: [fwproc] Recv command 0x46574c44
1,283,287 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,914 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,223 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,197 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,019 ready_for_fw is high
1,057,019 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,588 >>> mbox cmd response: success
2,694,010 UART:
2,694,026 UART: Running Caliptra FMC ...
2,694,434 UART:
2,694,577 UART: [state] CFI Enabled
2,705,144 UART: [fht] FMC Alias Private Key: 7
2,812,521 UART: [art] Extend RT PCRs Done
2,812,949 UART: [art] Lock RT PCRs Done
2,814,397 UART: [art] Populate DV Done
2,822,852 UART: [fht] FMC Alias Private Key: 7
2,823,882 UART: [art] Derive CDI
2,824,162 UART: [art] Store in in slot 0x4
2,909,823 UART: [art] Derive Key Pair
2,910,183 UART: [art] Store priv key in slot 0x5
2,923,693 UART: [art] Derive Key Pair - Done
2,938,493 UART: [art] Signing Cert with AUTHO
2,938,973 UART: RITY.KEYID = 7
2,954,209 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,974 UART: [art] PUB.X = 4C36DB214E2D9AED848DBE60F14C46487CD09F9306B77D67BFD664B6D8F5713392ABC0DFB7878D7284162B9EF3953A26
2,961,749 UART: [art] PUB.Y = 99430AF769FA37111214AF02154F88E48B01108D33A1DFF3978D62920308E124B1444FC5B33926393BC3750989672C09
2,968,662 UART: [art] SIG.R = 32CFB924832C17EF783B4CBEAD7E7E1E6E119111D45748935F53D0FBFB35FC0CEBD5168CB8DAA6D04129F93A70B4FCDB
2,975,451 UART: [art] SIG.S = 97FADA1C8E480D452A5F3D36FFB465B3B90A824CA025688B14850244E9441BDED8D2DCBB20EA3D7CFAFDE0E1CD5F026F
2,999,742 UART: Caliptra RT
3,000,087 UART: [state] CFI Enabled
3,108,604 UART: [rt] RT listening for mailbox commands...
3,109,267 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,068 UART: [rt]cmd =0x46504c54, len=4
3,140,194 >>> mbox cmd response data (8 bytes)
3,140,413 UART: [rt] FIPS self test
3,140,741 UART: [kat] ++
3,140,893 UART: [kat] sha1
3,144,935 UART: [kat] SHA2-256
3,146,957 UART: [kat] SHA2-384
3,149,862 UART: [kat] SHA2-512-ACC
3,151,789 UART: [kat] ECC-384
3,162,003 UART: Fatal Error: 0x90040003
3,163,542 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,163,547 >>> mbox cmd response: failed
3,163,547 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,163,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,435 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,910 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
276,647 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
276,189 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
653,684 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
620,131 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
310,519 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,670 writing to cptra_bootfsm_go
311,802 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
653,470 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
653,653 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
310,415 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
311,129 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
653,339 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
653,513 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 108.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 8.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,913 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 9.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
5,986,348 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,130,231 >>> mbox cmd response: failed
6,130,789 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,273,787 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,872,501 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
19,334,130 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
5,979,685 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,123,898 >>> mbox cmd response: failed
6,124,479 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,267,480 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,857,965 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,405,715 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
6,309,287 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,453,235 >>> mbox cmd response: failed
6,453,805 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,596,808 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
18,454,001 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,903,002 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
6,305,101 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,449,144 >>> mbox cmd response: failed
6,449,708 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,592,730 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
18,455,452 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,888,857 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
5,178,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,323,183 >>> mbox cmd response: failed
5,323,756 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,467,656 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
3,454,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,276,885 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
5,155,940 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,300,227 >>> mbox cmd response: failed
5,300,789 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,444,711 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,437,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,345 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
5,509,093 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,653,328 >>> mbox cmd response: failed
5,653,877 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,797,251 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,860,958 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,564,727 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
5,519,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,664,186 >>> mbox cmd response: failed
5,664,784 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,808,138 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
17,855,199 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,589,886 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
5,179,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,324,125 >>> mbox cmd response: failed
5,324,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,467,935 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,426,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,241,191 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
5,203,123 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,347,466 >>> mbox cmd response: failed
5,348,247 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,492,276 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,442,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,245,501 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
5,515,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,659,179 >>> mbox cmd response: failed
5,659,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,803,110 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
17,853,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,575,975 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
5,501,199 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,645,456 >>> mbox cmd response: failed
5,646,011 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,789,382 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
17,862,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,568,653 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,145 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,153 >>> mbox cmd response: failed
823,153 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,123 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,649 >>> mbox cmd response: failed
823,649 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,325 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
825,212 >>> mbox cmd response: failed
825,212 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
825,218 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,952 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,172 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,924 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,932 >>> mbox cmd response: failed
823,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,288 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,420 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,701 >>> mbox cmd response: failed
823,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,075 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,065 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,073 >>> mbox cmd response: failed
824,073 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,523 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,706 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,714 >>> mbox cmd response: failed
824,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,814 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,584 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,592 >>> mbox cmd response: failed
824,592 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,647,982 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
823,365 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,373 >>> mbox cmd response: failed
823,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
823,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,087 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,337 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,033 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,041 >>> mbox cmd response: failed
824,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,119 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,725 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,626 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,634 >>> mbox cmd response: failed
824,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,512 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,744 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,060 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,068 >>> mbox cmd response: failed
824,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
824,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,102 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
192,002 UART:
192,371 UART: Running Caliptra ROM ...
193,509 UART:
193,656 UART: [state] CFI Enabled
261,848 UART: [state] LifecycleState = Unprovisioned
263,786 UART: [state] DebugLocked = No
265,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,524 UART: [kat] SHA2-256
441,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,731 UART: [kat] ++
452,189 UART: [kat] sha1
461,857 UART: [kat] SHA2-256
464,510 UART: [kat] SHA2-384
470,149 UART: [kat] SHA2-512-ACC
472,539 UART: [kat] ECC-384
2,767,349 UART: [kat] HMAC-384Kdf
2,800,119 UART: [kat] LMS
3,990,459 UART: [kat] --
3,995,092 UART: [cold-reset] ++
3,997,736 UART: [fht] Storing FHT @ 0x50003400
4,008,519 UART: [idev] ++
4,009,092 UART: [idev] CDI.KEYID = 6
4,010,137 UART: [idev] SUBJECT.KEYID = 7
4,011,322 UART: [idev] UDS.KEYID = 0
4,012,366 ready_for_fw is high
4,012,590 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,156,978 UART: [idev] Erasing UDS.KEYID = 0
7,347,800 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,662 UART: [idev] --
7,375,164 UART: [ldev] ++
7,375,763 UART: [ldev] CDI.KEYID = 6
7,376,785 UART: [ldev] SUBJECT.KEYID = 5
7,377,901 UART: [ldev] AUTHORITY.KEYID = 7
7,379,191 UART: [ldev] FE.KEYID = 1
7,424,272 UART: [ldev] Erasing FE.KEYID = 1
10,757,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,724 UART: [ldev] --
13,116,692 UART: [fwproc] Waiting for Commands...
13,119,330 UART: [fwproc] Received command 0x46574c44
13,121,524 UART: [fwproc] Received Image of size 114716 bytes
17,178,588 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,653 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,641,041 >>> mbox cmd response: success
17,645,840 UART: [afmc] ++
17,646,433 UART: [afmc] CDI.KEYID = 6
17,647,398 UART: [afmc] SUBJECT.KEYID = 7
17,648,608 UART: [afmc] AUTHORITY.KEYID = 5
20,999,486 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,300,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,302,810 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,317,220 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,332,077 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,346,494 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,368,138 UART: [afmc] --
23,371,515 UART: [cold-reset] --
23,375,104 UART: [state] Locking Datavault
23,380,791 UART: [state] Locking PCR0, PCR1 and PCR31
23,382,513 UART: [state] Locking ICCM
23,384,394 UART: [exit] Launching FMC @ 0x40000130
23,392,788 UART:
23,393,025 UART: Running Caliptra FMC ...
23,394,133 UART:
23,394,295 UART: [state] CFI Enabled
23,451,845 UART: [fht] FMC Alias Private Key: 7
25,789,929 UART: [art] Extend RT PCRs Done
25,791,272 UART: [art] Lock RT PCRs Done
25,792,762 UART: [art] Populate DV Done
25,798,345 UART: [fht] FMC Alias Private Key: 7
25,799,868 UART: [art] Derive CDI
25,800,637 UART: [art] Store in in slot 0x4
25,861,198 UART: [art] Derive Key Pair
25,862,198 UART: [art] Store priv key in slot 0x5
29,155,233 UART: [art] Derive Key Pair - Done
29,168,135 UART: [art] Signing Cert with AUTHO
29,169,452 UART: RITY.KEYID = 7
31,456,896 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,406 UART: [art] PUB.X = 59BB1B91D03115284DC38E6E204AFB64C4FC15883A2E6D7689FF84168ED662C2E4990A497D2F5F1A3800103A5BF63B00
31,465,606 UART: [art] PUB.Y = 717F9F581F4BF2812552929E1623B408385F8F9458A86A930FE9E13C2F75ACBF25461C472217F3C4EA633D2F7988FA85
31,472,853 UART: [art] SIG.R = DEF60C2BA79898AB8E9030025A44E326539A084D0ECB068F4470E732CE2F74D39129EB131721C4FFB5F5717DB4B49E3A
31,480,302 UART: [art] SIG.S = 9AB4DBCEA15D71D9F2311822DB265535B0BD92F3F8EC2634605CF342FAE3B52BA406444B5392BB2C9E32E8C19A675160
32,785,461 UART: Caliptra RT
32,786,163 UART: [state] CFI Enabled
32,948,257 UART: [rt] RT listening for mailbox commands...
32,950,119 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,979,824 UART: [rt]cmd =0x46504c54, len=4
32,981,350 >>> mbox cmd response data (8 bytes)
32,982,564 UART: [rt] FIPS self test
32,983,508 UART: [kat] ++
32,983,957 UART: [kat] sha1
32,988,377 UART: [kat] SHA2-256
32,990,306 UART: [kat] SHA2-384
32,993,330 UART: [kat] SHA2-512-ACC
32,995,624 UART: [kat] ECC-384
36,263,211 UART: [kat] HMAC-384Kdf
36,264,474 UART: Fatal Error: 0x90030001
36,299,862 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,444,037 >>> mbox cmd response: failed
36,444,707 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,588,623 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
190,114 UART:
190,410 UART: Running Caliptra ROM ...
191,526 UART:
191,677 UART: [state] CFI Enabled
250,004 UART: [state] LifecycleState = Unprovisioned
251,981 UART: [state] DebugLocked = No
253,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,642 UART: [kat] SHA2-256
428,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,822 UART: [kat] ++
439,340 UART: [kat] sha1
450,163 UART: [kat] SHA2-256
452,842 UART: [kat] SHA2-384
458,711 UART: [kat] SHA2-512-ACC
461,110 UART: [kat] ECC-384
2,752,145 UART: [kat] HMAC-384Kdf
2,765,909 UART: [kat] LMS
3,956,203 UART: [kat] --
3,961,072 UART: [cold-reset] ++
3,962,212 UART: [fht] Storing FHT @ 0x50003400
3,973,935 UART: [idev] ++
3,974,503 UART: [idev] CDI.KEYID = 6
3,975,468 UART: [idev] SUBJECT.KEYID = 7
3,976,683 UART: [idev] UDS.KEYID = 0
3,978,258 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,122,480 UART: [idev] Erasing UDS.KEYID = 0
7,311,935 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,721 UART: [idev] --
7,338,287 UART: [ldev] ++
7,338,860 UART: [ldev] CDI.KEYID = 6
7,339,825 UART: [ldev] SUBJECT.KEYID = 5
7,341,040 UART: [ldev] AUTHORITY.KEYID = 7
7,342,280 UART: [ldev] FE.KEYID = 1
7,387,988 UART: [ldev] Erasing FE.KEYID = 1
10,725,370 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,037,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,052,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,067,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,081,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,184 UART: [ldev] --
13,106,284 UART: [fwproc] Waiting for Commands...
13,109,197 UART: [fwproc] Received command 0x46574c44
13,111,385 UART: [fwproc] Received Image of size 114716 bytes
17,165,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,241,286 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,310,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,628,854 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,786,357 ready_for_fw is high
3,786,925 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,893,101 >>> mbox cmd response: success
23,584,623 UART:
23,585,022 UART: Running Caliptra FMC ...
23,586,179 UART:
23,586,364 UART: [state] CFI Enabled
23,654,549 UART: [fht] FMC Alias Private Key: 7
25,992,542 UART: [art] Extend RT PCRs Done
25,993,880 UART: [art] Lock RT PCRs Done
25,995,592 UART: [art] Populate DV Done
26,001,177 UART: [fht] FMC Alias Private Key: 7
26,002,796 UART: [art] Derive CDI
26,003,625 UART: [art] Store in in slot 0x4
26,062,512 UART: [art] Derive Key Pair
26,063,520 UART: [art] Store priv key in slot 0x5
29,356,946 UART: [art] Derive Key Pair - Done
29,369,672 UART: [art] Signing Cert with AUTHO
29,370,975 UART: RITY.KEYID = 7
31,658,458 UART: [art] Erasing AUTHORITY.KEYID = 7
31,659,964 UART: [art] PUB.X = 8EC1B18B122A0A1F7DBFE32CFF59D906016A5B7EE8F46A7F683F388F66BDE10FEB312920457B0F88C7F1E37EEA856012
31,667,229 UART: [art] PUB.Y = 06C9ABE029D477BA7F2218BAE885A3232833797D43123160429B9C8A198CE4F85A1FECDDBCFE295241B45B76363D4057
31,674,476 UART: [art] SIG.R = BAEEC8E3C617199392403196C8D8351A59B4C375A7111864086E89749BD13C06D275313B12919D9FF95008B4716E2F0D
31,681,834 UART: [art] SIG.S = 046FE558C1FFCDB22BD397E52703797D7939E9F918826F740996DC3A6BB53D6EA036D03B16F424C092D9CE479E3EB140
32,986,875 UART: Caliptra RT
32,987,593 UART: [state] CFI Enabled
33,150,747 UART: [rt] RT listening for mailbox commands...
33,152,603 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,182,389 UART: [rt]cmd =0x46504c54, len=4
33,183,805 >>> mbox cmd response data (8 bytes)
33,184,975 UART: [rt] FIPS self test
33,185,917 UART: [kat] ++
33,186,370 UART: [kat] sha1
33,190,805 UART: [kat] SHA2-256
33,192,734 UART: [kat] SHA2-384
33,195,629 UART: [kat] SHA2-512-ACC
33,197,889 UART: [kat] ECC-384
36,464,615 UART: [kat] HMAC-384Kdf
36,466,060 UART: Fatal Error: 0x90030001
36,501,457 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,645,600 >>> mbox cmd response: failed
36,646,236 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,790,094 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,809,125 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,908,403 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,539 UART:
192,910 UART: Running Caliptra ROM ...
194,008 UART:
603,583 UART: [state] CFI Enabled
616,953 UART: [state] LifecycleState = Unprovisioned
618,844 UART: [state] DebugLocked = No
620,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,872 UART: [kat] SHA2-256
795,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,195 UART: [kat] ++
806,641 UART: [kat] sha1
817,839 UART: [kat] SHA2-256
820,566 UART: [kat] SHA2-384
826,565 UART: [kat] SHA2-512-ACC
828,939 UART: [kat] ECC-384
3,114,122 UART: [kat] HMAC-384Kdf
3,125,651 UART: [kat] LMS
4,315,819 UART: [kat] --
4,318,627 UART: [cold-reset] ++
4,319,732 UART: [fht] Storing FHT @ 0x50003400
4,331,428 UART: [idev] ++
4,331,997 UART: [idev] CDI.KEYID = 6
4,332,951 UART: [idev] SUBJECT.KEYID = 7
4,334,203 UART: [idev] UDS.KEYID = 0
4,335,169 ready_for_fw is high
4,335,384 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,479,527 UART: [idev] Erasing UDS.KEYID = 0
7,622,919 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,317 UART: [idev] --
7,650,045 UART: [ldev] ++
7,650,629 UART: [ldev] CDI.KEYID = 6
7,651,570 UART: [ldev] SUBJECT.KEYID = 5
7,652,785 UART: [ldev] AUTHORITY.KEYID = 7
7,654,070 UART: [ldev] FE.KEYID = 1
7,664,099 UART: [ldev] Erasing FE.KEYID = 1
10,954,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,687 UART: [ldev] --
13,313,586 UART: [fwproc] Waiting for Commands...
13,315,742 UART: [fwproc] Received command 0x46574c44
13,317,929 UART: [fwproc] Received Image of size 114716 bytes
17,377,467 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,702 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,845,697 >>> mbox cmd response: success
17,850,253 UART: [afmc] ++
17,850,853 UART: [afmc] CDI.KEYID = 6
17,851,766 UART: [afmc] SUBJECT.KEYID = 7
17,853,063 UART: [afmc] AUTHORITY.KEYID = 5
21,165,453 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,144 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,552 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,371 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,793 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,528,039 UART: [afmc] --
23,532,458 UART: [cold-reset] --
23,537,355 UART: [state] Locking Datavault
23,543,523 UART: [state] Locking PCR0, PCR1 and PCR31
23,545,275 UART: [state] Locking ICCM
23,547,750 UART: [exit] Launching FMC @ 0x40000130
23,556,132 UART:
23,556,392 UART: Running Caliptra FMC ...
23,557,500 UART:
23,557,679 UART: [state] CFI Enabled
23,565,676 UART: [fht] FMC Alias Private Key: 7
25,895,975 UART: [art] Extend RT PCRs Done
25,897,204 UART: [art] Lock RT PCRs Done
25,898,967 UART: [art] Populate DV Done
25,904,594 UART: [fht] FMC Alias Private Key: 7
25,906,139 UART: [art] Derive CDI
25,906,872 UART: [art] Store in in slot 0x4
25,949,086 UART: [art] Derive Key Pair
25,950,289 UART: [art] Store priv key in slot 0x5
29,191,975 UART: [art] Derive Key Pair - Done
29,204,812 UART: [art] Signing Cert with AUTHO
29,206,126 UART: RITY.KEYID = 7
31,485,599 UART: [art] Erasing AUTHORITY.KEYID = 7
31,487,120 UART: [art] PUB.X = F2D433A4986533D52DA3F95A6D5C5588AB00A98AD65A9AA81CA641FB53EFC6032D74C314F3986B00D17DF10B7660C277
31,494,319 UART: [art] PUB.Y = C5E0BC654E9039E55BF7ECB2B74E34D1796C193B18B4581933D35BF0E584591AE36D76A539801B0709C405EF9DAB790D
31,501,577 UART: [art] SIG.R = 4BC7E4BF0BFF3F82C3E9C5A78640DC164D6AD6D8B40829B3CF82E2D0FBC3DABE02866DA34A7FAAE8F2F0FFD57F8CE71B
31,509,021 UART: [art] SIG.S = 0C8E354EB91A1C25279ED9A59A768A6418F085E7CE0C86CAA58F9CA12ABA58716B570EF4F157951675FD751CCC709037
32,814,197 UART: Caliptra RT
32,814,902 UART: [state] CFI Enabled
32,931,661 UART: [rt] RT listening for mailbox commands...
32,933,511 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,963,411 UART: [rt]cmd =0x46504c54, len=4
32,965,148 >>> mbox cmd response data (8 bytes)
32,966,656 UART: [rt] FIPS self test
32,967,590 UART: [kat] ++
32,968,042 UART: [kat] sha1
32,972,450 UART: [kat] SHA2-256
32,974,389 UART: [kat] SHA2-384
32,977,405 UART: [kat] SHA2-512-ACC
32,979,696 UART: [kat] ECC-384
36,222,311 UART: [kat] HMAC-384Kdf
36,223,809 UART: Fatal Error: 0x90030001
36,258,953 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,403,072 >>> mbox cmd response: failed
36,403,678 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,547,716 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,105 UART:
190,401 UART: Running Caliptra ROM ...
191,428 UART:
3,994,884 UART: [state] CFI Enabled
4,009,687 UART: [state] LifecycleState = Unprovisioned
4,011,606 UART: [state] DebugLocked = No
4,013,051 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,017,252 UART: [kat] SHA2-256
4,186,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,197,547 UART: [kat] ++
4,198,004 UART: [kat] sha1
4,208,847 UART: [kat] SHA2-256
4,211,533 UART: [kat] SHA2-384
4,218,072 UART: [kat] SHA2-512-ACC
4,220,426 UART: [kat] ECC-384
6,504,256 UART: [kat] HMAC-384Kdf
6,516,157 UART: [kat] LMS
7,706,268 UART: [kat] --
7,710,337 UART: [cold-reset] ++
7,712,869 UART: [fht] Storing FHT @ 0x50003400
7,725,110 UART: [idev] ++
7,725,727 UART: [idev] CDI.KEYID = 6
7,726,618 UART: [idev] SUBJECT.KEYID = 7
7,727,888 UART: [idev] UDS.KEYID = 0
7,729,444 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
7,873,407 UART: [idev] Erasing UDS.KEYID = 0
11,016,343 UART: [idev] Using Sha1 for KeyId Algorithm
11,038,535 UART: [idev] --
11,042,534 UART: [ldev] ++
11,043,106 UART: [ldev] CDI.KEYID = 6
11,044,072 UART: [ldev] SUBJECT.KEYID = 5
11,045,291 UART: [ldev] AUTHORITY.KEYID = 7
11,046,522 UART: [ldev] FE.KEYID = 1
11,058,248 UART: [ldev] Erasing FE.KEYID = 1
14,349,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,641,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,656,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,671,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,685,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,703,820 UART: [ldev] --
16,708,548 UART: [fwproc] Waiting for Commands...
16,710,880 UART: [fwproc] Received command 0x46574c44
16,713,129 UART: [fwproc] Received Image of size 114716 bytes
20,773,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,849,215 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,918,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
21,237,020 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
4,124,747 ready_for_fw is high
4,125,126 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,077,567 >>> mbox cmd response: success
23,721,671 UART:
23,722,058 UART: Running Caliptra FMC ...
23,723,221 UART:
23,723,385 UART: [state] CFI Enabled
23,731,284 UART: [fht] FMC Alias Private Key: 7
26,062,310 UART: [art] Extend RT PCRs Done
26,063,545 UART: [art] Lock RT PCRs Done
26,064,982 UART: [art] Populate DV Done
26,070,135 UART: [fht] FMC Alias Private Key: 7
26,071,681 UART: [art] Derive CDI
26,072,417 UART: [art] Store in in slot 0x4
26,115,249 UART: [art] Derive Key Pair
26,116,251 UART: [art] Store priv key in slot 0x5
29,358,179 UART: [art] Derive Key Pair - Done
29,371,397 UART: [art] Signing Cert with AUTHO
29,372,706 UART: RITY.KEYID = 7
31,652,229 UART: [art] Erasing AUTHORITY.KEYID = 7
31,653,741 UART: [art] PUB.X = 77E6F2C4A66B33F1A7309A01B8FCC3F7B642A272F007B8CABDF66D1AD7C628D50374783F6CBBD257AA4C889F5EC13455
31,661,034 UART: [art] PUB.Y = A1A3423B625E4278866CA1FC47C83A03D784C888C10FB7172A037580B0949C8887F7513F9A416C7B82EC37B72292E9B8
31,668,238 UART: [art] SIG.R = 1C2637775E0A2EA184FA5DC1DFF4362DA8E40EEC9F633E92B86E0CDB71861FBDA1418E4ADE5740C6804D1ECAFBBDB51E
31,675,639 UART: [art] SIG.S = BAF624F5E70C2FB7666D36952E7051210D2BA6E42BA167E9A7673332E6F5596848D985807D1B0E52533079B4CE1C1A5A
32,980,713 UART: Caliptra RT
32,981,436 UART: [state] CFI Enabled
33,098,627 UART: [rt] RT listening for mailbox commands...
33,100,489 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,130,175 UART: [rt]cmd =0x46504c54, len=4
33,131,701 >>> mbox cmd response data (8 bytes)
33,132,984 UART: [rt] FIPS self test
33,133,929 UART: [kat] ++
33,134,379 UART: [kat] sha1
33,138,837 UART: [kat] SHA2-256
33,140,763 UART: [kat] SHA2-384
33,143,887 UART: [kat] SHA2-512-ACC
33,146,190 UART: [kat] ECC-384
36,388,770 UART: [kat] HMAC-384Kdf
36,390,139 UART: Fatal Error: 0x90030001
36,425,362 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,569,937 >>> mbox cmd response: failed
36,570,619 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,714,615 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
7,342,336 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
21,296,452 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,838 writing to cptra_bootfsm_go
193,090 UART:
193,478 UART: Running Caliptra ROM ...
194,597 UART:
194,736 UART: [state] CFI Enabled
264,266 UART: [state] LifecycleState = Unprovisioned
266,174 UART: [state] DebugLocked = No
267,562 UART: [state] WD Timer not started. Device not locked for debugging
270,905 UART: [kat] SHA2-256
450,021 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,628 UART: [kat] ++
462,162 UART: [kat] sha1
472,738 UART: [kat] SHA2-256
475,754 UART: [kat] SHA2-384
482,699 UART: [kat] SHA2-512-ACC
485,606 UART: [kat] ECC-384
2,949,012 UART: [kat] HMAC-384Kdf
2,965,250 UART: [kat] LMS
3,494,673 UART: [kat] --
3,499,907 UART: [cold-reset] ++
3,501,845 UART: [fht] FHT @ 0x50003400
3,514,132 UART: [idev] ++
3,514,704 UART: [idev] CDI.KEYID = 6
3,515,744 UART: [idev] SUBJECT.KEYID = 7
3,516,848 UART: [idev] UDS.KEYID = 0
3,517,786 ready_for_fw is high
3,518,032 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,662,833 UART: [idev] Erasing UDS.KEYID = 0
6,016,876 UART: [idev] Sha1 KeyId Algorithm
6,040,487 UART: [idev] --
6,044,857 UART: [ldev] ++
6,045,435 UART: [ldev] CDI.KEYID = 6
6,046,352 UART: [ldev] SUBJECT.KEYID = 5
6,047,572 UART: [ldev] AUTHORITY.KEYID = 7
6,048,873 UART: [ldev] FE.KEYID = 1
6,094,896 UART: [ldev] Erasing FE.KEYID = 1
8,597,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,425 UART: [ldev] --
10,407,735 UART: [fwproc] Wait for Commands...
10,410,489 UART: [fwproc] Recv command 0x46574c44
10,412,529 UART: [fwproc] Recv'd Img size: 115032 bytes
13,828,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,963 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,725 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,292,862 >>> mbox cmd response: success
14,297,700 UART: [afmc] ++
14,298,293 UART: [afmc] CDI.KEYID = 6
14,299,175 UART: [afmc] SUBJECT.KEYID = 7
14,300,390 UART: [afmc] AUTHORITY.KEYID = 5
16,843,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,567,779 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,569,645 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,585,411 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,601,471 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,617,309 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,640,425 UART: [afmc] --
18,643,705 UART: [cold-reset] --
18,647,012 UART: [state] Locking Datavault
18,652,439 UART: [state] Locking PCR0, PCR1 and PCR31
18,654,089 UART: [state] Locking ICCM
18,655,703 UART: [exit] Launching FMC @ 0x40000130
18,664,099 UART:
18,664,336 UART: Running Caliptra FMC ...
18,665,443 UART:
18,665,600 UART: [state] CFI Enabled
18,724,353 UART: [fht] FMC Alias Private Key: 7
20,488,394 UART: [art] Extend RT PCRs Done
20,489,619 UART: [art] Lock RT PCRs Done
20,491,465 UART: [art] Populate DV Done
20,496,887 UART: [fht] FMC Alias Private Key: 7
20,498,478 UART: [art] Derive CDI
20,499,292 UART: [art] Store in in slot 0x4
20,556,161 UART: [art] Derive Key Pair
20,557,159 UART: [art] Store priv key in slot 0x5
23,020,343 UART: [art] Derive Key Pair - Done
23,033,312 UART: [art] Signing Cert with AUTHO
23,034,628 UART: RITY.KEYID = 7
24,746,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,747,794 UART: [art] PUB.X = D2C2D06C10841042C2AF7CFDE83C950FB3A9942539761C5B14DCF7D5EB7C46B3261E156553E381BF39E2EC617E8E51DB
24,755,072 UART: [art] PUB.Y = C440CCDCBA478E1EA0C8CC262D0CE445827D2A08DAF2E6EBDC26410209DFEA98941B8C760221837AEA6F271EC8241571
24,762,390 UART: [art] SIG.R = BD41B7845E30337DA071C00F01ED299E277C979471A5F8A0EE4744BF0D1C51F2B2A668809F2C073838D9AEEBD58C0396
24,769,779 UART: [art] SIG.S = 1E67346F5C5D35D3484FD30DD6C939F80E97F0C96810F2D1422EFE6C20F4CB2A9EABD41B52B0785315CF0C22E7147A34
25,748,815 UART: Caliptra RT
25,749,535 UART: [state] CFI Enabled
25,914,375 UART: [rt] RT listening for mailbox commands...
25,916,222 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,945,973 UART: [rt]cmd =0x46504c54, len=4
25,947,641 >>> mbox cmd response data (8 bytes)
25,948,933 UART: [rt] FIPS self test
25,949,885 UART: [kat] ++
25,950,332 UART: [kat] sha1
25,954,781 UART: [kat] SHA2-256
25,956,705 UART: [kat] SHA2-384
25,959,717 UART: [kat] SHA2-512-ACC
25,962,004 UART: [kat] ECC-384
28,400,521 UART: [kat] HMAC-384Kdf
28,401,947 UART: Fatal Error: 0x90030001
28,437,336 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,581,817 >>> mbox cmd response: failed
28,582,402 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,726,833 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,004 UART:
190,302 UART: Running Caliptra ROM ...
191,357 UART:
191,500 UART: [state] CFI Enabled
263,274 UART: [state] LifecycleState = Unprovisioned
265,139 UART: [state] DebugLocked = No
267,870 UART: [state] WD Timer not started. Device not locked for debugging
271,978 UART: [kat] SHA2-256
451,097 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,708 UART: [kat] ++
463,177 UART: [kat] sha1
473,567 UART: [kat] SHA2-256
476,633 UART: [kat] SHA2-384
481,457 UART: [kat] SHA2-512-ACC
484,394 UART: [kat] ECC-384
2,949,671 UART: [kat] HMAC-384Kdf
2,971,079 UART: [kat] LMS
3,500,510 UART: [kat] --
3,503,955 UART: [cold-reset] ++
3,506,047 UART: [fht] FHT @ 0x50003400
3,517,346 UART: [idev] ++
3,517,950 UART: [idev] CDI.KEYID = 6
3,518,876 UART: [idev] SUBJECT.KEYID = 7
3,520,041 UART: [idev] UDS.KEYID = 0
3,521,553 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,666,204 UART: [idev] Erasing UDS.KEYID = 0
6,029,620 UART: [idev] Sha1 KeyId Algorithm
6,052,310 UART: [idev] --
6,055,821 UART: [ldev] ++
6,056,397 UART: [ldev] CDI.KEYID = 6
6,057,311 UART: [ldev] SUBJECT.KEYID = 5
6,058,472 UART: [ldev] AUTHORITY.KEYID = 7
6,059,707 UART: [ldev] FE.KEYID = 1
6,099,682 UART: [ldev] Erasing FE.KEYID = 1
8,603,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,475 UART: [ldev] --
10,412,428 UART: [fwproc] Wait for Commands...
10,415,338 UART: [fwproc] Recv command 0x46574c44
10,417,454 UART: [fwproc] Recv'd Img size: 115032 bytes
13,821,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,226 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,960,996 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,281,349 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,362,275 ready_for_fw is high
3,362,728 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,060,210 >>> mbox cmd response: success
18,345,400 UART:
18,345,816 UART: Running Caliptra FMC ...
18,346,930 UART:
18,347,090 UART: [state] CFI Enabled
18,405,465 UART: [fht] FMC Alias Private Key: 7
20,169,675 UART: [art] Extend RT PCRs Done
20,170,903 UART: [art] Lock RT PCRs Done
20,172,375 UART: [art] Populate DV Done
20,177,823 UART: [fht] FMC Alias Private Key: 7
20,179,318 UART: [art] Derive CDI
20,180,079 UART: [art] Store in in slot 0x4
20,237,718 UART: [art] Derive Key Pair
20,238,756 UART: [art] Store priv key in slot 0x5
22,701,878 UART: [art] Derive Key Pair - Done
22,714,990 UART: [art] Signing Cert with AUTHO
22,716,297 UART: RITY.KEYID = 7
24,427,751 UART: [art] Erasing AUTHORITY.KEYID = 7
24,429,261 UART: [art] PUB.X = 1F7632F935D18CC9B4AE4F963759D7DF249FB2ACFC48A016BA9D1EBCB4F7D9F75717B7BEAD454BF3DF17146690942665
24,436,517 UART: [art] PUB.Y = 3458B543ED553702EA5254B7622DEFF392F0AD98BC25F2C2123989151F8611C32FA9D71CD10832DCD9214667100FDE5D
24,443,901 UART: [art] SIG.R = 03A8413CEF3A11565160FF2CBB8AC6321DAD6B10784031CDBB48BE09B4F1913A49DF5E4D1EF0484ECE4ABE0E6E36E90D
24,451,171 UART: [art] SIG.S = 2E23E6A50C8D80448978F42FB9D32071DD8E3F62A2E4F275F20BC351AB5DA1DE6A1145A92BB71F55D21FFC48974F0FE7
25,429,854 UART: Caliptra RT
25,430,566 UART: [state] CFI Enabled
25,596,451 UART: [rt] RT listening for mailbox commands...
25,598,302 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,627,995 UART: [rt]cmd =0x46504c54, len=4
25,629,506 >>> mbox cmd response data (8 bytes)
25,630,851 UART: [rt] FIPS self test
25,631,800 UART: [kat] ++
25,632,249 UART: [kat] sha1
25,636,808 UART: [kat] SHA2-256
25,638,680 UART: [kat] SHA2-384
25,641,635 UART: [kat] SHA2-512-ACC
25,643,908 UART: [kat] ECC-384
28,096,856 UART: [kat] HMAC-384Kdf
28,098,228 UART: Fatal Error: 0x90030001
28,133,553 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,277,901 >>> mbox cmd response: failed
28,278,587 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,422,981 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,381,251 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,070,543 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,711 UART:
193,066 UART: Running Caliptra ROM ...
194,288 UART:
603,726 UART: [state] CFI Enabled
619,097 UART: [state] LifecycleState = Unprovisioned
620,982 UART: [state] DebugLocked = No
623,082 UART: [state] WD Timer not started. Device not locked for debugging
627,555 UART: [kat] SHA2-256
806,633 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,224 UART: [kat] ++
818,755 UART: [kat] sha1
830,083 UART: [kat] SHA2-256
833,102 UART: [kat] SHA2-384
839,096 UART: [kat] SHA2-512-ACC
842,036 UART: [kat] ECC-384
3,287,602 UART: [kat] HMAC-384Kdf
3,300,235 UART: [kat] LMS
3,829,791 UART: [kat] --
3,832,672 UART: [cold-reset] ++
3,834,964 UART: [fht] FHT @ 0x50003400
3,846,641 UART: [idev] ++
3,847,222 UART: [idev] CDI.KEYID = 6
3,848,140 UART: [idev] SUBJECT.KEYID = 7
3,849,320 UART: [idev] UDS.KEYID = 0
3,850,377 ready_for_fw is high
3,850,611 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,995,012 UART: [idev] Erasing UDS.KEYID = 0
6,320,402 UART: [idev] Sha1 KeyId Algorithm
6,342,165 UART: [idev] --
6,346,695 UART: [ldev] ++
6,347,265 UART: [ldev] CDI.KEYID = 6
6,348,149 UART: [ldev] SUBJECT.KEYID = 5
6,349,359 UART: [ldev] AUTHORITY.KEYID = 7
6,350,590 UART: [ldev] FE.KEYID = 1
6,360,317 UART: [ldev] Erasing FE.KEYID = 1
8,834,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,602,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,821 UART: [ldev] --
10,626,677 UART: [fwproc] Wait for Commands...
10,628,665 UART: [fwproc] Recv command 0x46574c44
10,630,728 UART: [fwproc] Recv'd Img size: 115032 bytes
14,042,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,108,946 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,177,757 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,498,508 >>> mbox cmd response: success
14,502,036 UART: [afmc] ++
14,502,633 UART: [afmc] CDI.KEYID = 6
14,503,519 UART: [afmc] SUBJECT.KEYID = 7
14,504,620 UART: [afmc] AUTHORITY.KEYID = 5
17,007,321 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,726,849 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,703 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,486 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,517 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,395 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,361 UART: [afmc] --
18,803,544 UART: [cold-reset] --
18,806,995 UART: [state] Locking Datavault
18,812,355 UART: [state] Locking PCR0, PCR1 and PCR31
18,813,997 UART: [state] Locking ICCM
18,815,498 UART: [exit] Launching FMC @ 0x40000130
18,823,904 UART:
18,824,143 UART: Running Caliptra FMC ...
18,825,242 UART:
18,825,400 UART: [state] CFI Enabled
18,833,666 UART: [fht] FMC Alias Private Key: 7
20,590,504 UART: [art] Extend RT PCRs Done
20,591,739 UART: [art] Lock RT PCRs Done
20,593,475 UART: [art] Populate DV Done
20,598,995 UART: [fht] FMC Alias Private Key: 7
20,600,489 UART: [art] Derive CDI
20,601,229 UART: [art] Store in in slot 0x4
20,643,837 UART: [art] Derive Key Pair
20,644,878 UART: [art] Store priv key in slot 0x5
23,071,763 UART: [art] Derive Key Pair - Done
23,084,712 UART: [art] Signing Cert with AUTHO
23,086,059 UART: RITY.KEYID = 7
24,791,383 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,888 UART: [art] PUB.X = 5E972DC87A007587B8640FA96DEC61EDF4A39B630C36BA16406CC898B1F64BB973BFFB4B08046BC019088B5A1804F459
24,800,206 UART: [art] PUB.Y = 1EE91B20C0F404023930B5DDACACD9C1FB1F342F950182A990E03B5151EE3CE2C7D3B34BE1D1D13FDA5E6572BE26D61E
24,807,454 UART: [art] SIG.R = 1517EDF2B8B147831FBAECBD8AD9F085FAE4E5CD15ADCC1001479FA0814AA9C44593C63299B1C929B8A04E0C8FFB8A9C
24,814,863 UART: [art] SIG.S = D76F1C7C3D3FFD32F02D36E4CF9467679B85559306CACB230AEECA3C4A2F62F4DDD8B811B77196FAFE02F37CD41AED96
25,793,907 UART: Caliptra RT
25,794,596 UART: [state] CFI Enabled
25,911,980 UART: [rt] RT listening for mailbox commands...
25,913,819 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,943,695 UART: [rt]cmd =0x46504c54, len=4
25,945,291 >>> mbox cmd response data (8 bytes)
25,946,319 UART: [rt] FIPS self test
25,947,269 UART: [kat] ++
25,947,721 UART: [kat] sha1
25,952,045 UART: [kat] SHA2-256
25,953,923 UART: [kat] SHA2-384
25,956,989 UART: [kat] SHA2-512-ACC
25,959,278 UART: [kat] ECC-384
28,386,532 UART: [kat] HMAC-384Kdf
28,387,906 UART: Fatal Error: 0x90030001
28,423,549 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,568,074 >>> mbox cmd response: failed
28,568,695 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,712,989 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,087 UART:
190,397 UART: Running Caliptra ROM ...
191,506 UART:
11,820,624 UART: [state] CFI Enabled
11,835,573 UART: [state] LifecycleState = Unprovisioned
11,837,432 UART: [state] DebugLocked = No
11,840,355 UART: [state] WD Timer not started. Device not locked for debugging
11,844,942 UART: [kat] SHA2-256
12,024,037 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,035,619 UART: [kat] ++
12,036,081 UART: [kat] sha1
12,047,185 UART: [kat] SHA2-256
12,050,209 UART: [kat] SHA2-384
12,056,520 UART: [kat] SHA2-512-ACC
12,059,465 UART: [kat] ECC-384
14,505,476 UART: [kat] HMAC-384Kdf
14,516,628 UART: [kat] LMS
15,046,107 UART: [kat] --
15,050,209 UART: [cold-reset] ++
15,051,815 UART: [fht] FHT @ 0x50003400
15,063,873 UART: [idev] ++
15,064,453 UART: [idev] CDI.KEYID = 6
15,065,332 UART: [idev] SUBJECT.KEYID = 7
15,066,550 UART: [idev] UDS.KEYID = 0
15,068,071 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
15,212,520 UART: [idev] Erasing UDS.KEYID = 0
17,536,237 UART: [idev] Sha1 KeyId Algorithm
17,558,597 UART: [idev] --
17,562,800 UART: [ldev] ++
17,563,368 UART: [ldev] CDI.KEYID = 6
17,564,273 UART: [ldev] SUBJECT.KEYID = 5
17,565,486 UART: [ldev] AUTHORITY.KEYID = 7
17,566,716 UART: [ldev] FE.KEYID = 1
17,576,518 UART: [ldev] Erasing FE.KEYID = 1
20,048,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,765,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,781,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,797,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,813,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,834,119 UART: [ldev] --
21,838,090 UART: [fwproc] Wait for Commands...
21,840,459 UART: [fwproc] Recv command 0x46574c44
21,842,554 UART: [fwproc] Recv'd Img size: 115032 bytes
25,247,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,325,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,394,497 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,714,944 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,698,013 ready_for_fw is high
3,698,484 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,277,099 >>> mbox cmd response: success
18,524,435 UART:
18,524,867 UART: Running Caliptra FMC ...
18,525,988 UART:
18,526,155 UART: [state] CFI Enabled
18,533,898 UART: [fht] FMC Alias Private Key: 7
20,290,920 UART: [art] Extend RT PCRs Done
20,292,159 UART: [art] Lock RT PCRs Done
20,294,011 UART: [art] Populate DV Done
20,299,358 UART: [fht] FMC Alias Private Key: 7
20,300,903 UART: [art] Derive CDI
20,301,667 UART: [art] Store in in slot 0x4
20,344,266 UART: [art] Derive Key Pair
20,345,267 UART: [art] Store priv key in slot 0x5
22,772,254 UART: [art] Derive Key Pair - Done
22,785,049 UART: [art] Signing Cert with AUTHO
22,786,360 UART: RITY.KEYID = 7
24,491,600 UART: [art] Erasing AUTHORITY.KEYID = 7
24,493,106 UART: [art] PUB.X = 10C3FFB56C97FCAB0DB9ADFFEF51E41E75B63775B103ECFFC522D910A00340D2973CC62E02987F173FB12F095998ADC4
24,500,390 UART: [art] PUB.Y = D9053804CC76D215F0E38B99D43140379A060935341581F7FEE6EA395191B118D390EF4FA24E6B25E5930FE395E7671E
24,507,586 UART: [art] SIG.R = F5E00A80886C9C44B8FEE112F2E96EABC5D95B7E7E772016A9C0DA41BFAFC8DF330B82C45105DB26F28058EA4534D646
24,515,002 UART: [art] SIG.S = F6C1976645F189C94F449145EE14D17100D6716AB5766A2D0520EBDD992344C2E32B2567E9A97E084FB9335CFD2C3B72
25,493,853 UART: Caliptra RT
25,494,566 UART: [state] CFI Enabled
25,612,497 UART: [rt] RT listening for mailbox commands...
25,614,343 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,643,986 UART: [rt]cmd =0x46504c54, len=4
25,645,489 >>> mbox cmd response data (8 bytes)
25,646,592 UART: [rt] FIPS self test
25,647,536 UART: [kat] ++
25,648,000 UART: [kat] sha1
25,652,565 UART: [kat] SHA2-256
25,654,497 UART: [kat] SHA2-384
25,657,731 UART: [kat] SHA2-512-ACC
25,659,971 UART: [kat] ECC-384
28,087,243 UART: [kat] HMAC-384Kdf
28,088,615 UART: Fatal Error: 0x90030001
28,123,864 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,268,202 >>> mbox cmd response: failed
28,268,838 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,413,196 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
15,216,069 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,808,806 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,237 UART:
192,589 UART: Running Caliptra ROM ...
193,693 UART:
193,859 UART: [state] CFI Enabled
261,585 UART: [state] LifecycleState = Unprovisioned
264,024 UART: [state] DebugLocked = No
265,428 UART: [state] WD Timer not started. Device not locked for debugging
269,613 UART: [kat] SHA2-256
459,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,266 UART: [kat] ++
470,715 UART: [kat] sha1
483,724 UART: [kat] SHA2-256
486,736 UART: [kat] SHA2-384
492,801 UART: [kat] SHA2-512-ACC
495,379 UART: [kat] ECC-384
2,950,039 UART: [kat] HMAC-384Kdf
2,972,229 UART: [kat] LMS
3,503,985 UART: [kat] --
3,509,039 UART: [cold-reset] ++
3,510,433 UART: [fht] FHT @ 0x50003400
3,521,635 UART: [idev] ++
3,522,272 UART: [idev] CDI.KEYID = 6
3,523,262 UART: [idev] SUBJECT.KEYID = 7
3,524,438 UART: [idev] UDS.KEYID = 0
3,525,367 ready_for_fw is high
3,525,575 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,670,652 UART: [idev] Erasing UDS.KEYID = 0
6,028,080 UART: [idev] Sha1 KeyId Algorithm
6,050,782 UART: [idev] --
6,056,327 UART: [ldev] ++
6,057,022 UART: [ldev] CDI.KEYID = 6
6,057,911 UART: [ldev] SUBJECT.KEYID = 5
6,059,124 UART: [ldev] AUTHORITY.KEYID = 7
6,060,304 UART: [ldev] FE.KEYID = 1
6,100,416 UART: [ldev] Erasing FE.KEYID = 1
8,608,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,180 UART: [ldev] --
10,404,901 UART: [fwproc] Wait for Commands...
10,407,212 UART: [fwproc] Recv command 0x46574c44
10,409,539 UART: [fwproc] Recv'd Img size: 115032 bytes
13,856,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,932,611 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,048,772 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,596,232 >>> mbox cmd response: success
14,599,697 UART: [afmc] ++
14,600,472 UART: [afmc] CDI.KEYID = 6
14,601,585 UART: [afmc] SUBJECT.KEYID = 7
14,603,099 UART: [afmc] AUTHORITY.KEYID = 5
17,141,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,864,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,866,845 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,882,029 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,897,150 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,912,159 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,935,075 UART: [afmc] --
18,938,354 UART: [cold-reset] --
18,942,922 UART: [state] Locking Datavault
18,947,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,949,880 UART: [state] Locking ICCM
18,951,814 UART: [exit] Launching FMC @ 0x40000130
18,960,479 UART:
18,960,715 UART: Running Caliptra FMC ...
18,961,818 UART:
18,961,994 UART: [state] CFI Enabled
19,024,147 UART: [fht] FMC Alias Private Key: 7
20,788,932 UART: [art] Extend RT PCRs Done
20,790,157 UART: [art] Lock RT PCRs Done
20,791,945 UART: [art] Populate DV Done
20,797,252 UART: [fht] FMC Alias Private Key: 7
20,798,736 UART: [art] Derive CDI
20,799,497 UART: [art] Store in in slot 0x4
20,857,136 UART: [art] Derive Key Pair
20,858,175 UART: [art] Store priv key in slot 0x5
23,320,999 UART: [art] Derive Key Pair - Done
23,333,790 UART: [art] Signing Cert with AUTHO
23,335,104 UART: RITY.KEYID = 7
25,046,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,047,734 UART: [art] PUB.X = AC3400C7FD2383FD384D89C33CF24BB6650CA1EBC5BEB0C52653BEB06BFC075E4F6103F6FB367935BE4AEFF386D74413
25,055,022 UART: [art] PUB.Y = 84AC080828AF389335B41247B227C3AD3B36D5BF5A43F13B84E95C67A524CB3A640811050561253D55DC2EAB27012C66
25,062,249 UART: [art] SIG.R = 7F4FD2FFED5877B43907777DB3B95AF2CAF99880FEC630E14D75547778C7545C3A0ED3C51D831ED7B4C8E72845CA34EA
25,069,677 UART: [art] SIG.S = 14B666C54A0A589A5A7B967F001C7C5E7AD3BE069D99ABB3DD9A6668B7BBBF35C75093FCDB3A4616BD8D2B2ECB09E8A0
26,048,653 UART: Caliptra RT
26,049,354 UART: [state] CFI Enabled
26,214,301 UART: [rt] RT listening for mailbox commands...
26,216,149 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,245,707 UART: [rt]cmd =0x46504c54, len=4
26,247,451 >>> mbox cmd response data (8 bytes)
26,248,399 UART: [rt] FIPS self test
26,249,346 UART: [kat] ++
26,249,797 UART: [kat] sha1
26,254,279 UART: [kat] SHA2-256
26,256,209 UART: [kat] SHA2-384
26,259,061 UART: [kat] SHA2-512-ACC
26,261,354 UART: [kat] ECC-384
28,699,762 UART: [kat] HMAC-384Kdf
28,700,884 UART: Fatal Error: 0x90030001
28,736,059 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,880,644 >>> mbox cmd response: failed
28,881,231 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,025,689 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,088 UART:
190,382 UART: Running Caliptra ROM ...
191,408 UART:
191,550 UART: [state] CFI Enabled
265,696 UART: [state] LifecycleState = Unprovisioned
268,055 UART: [state] DebugLocked = No
270,036 UART: [state] WD Timer not started. Device not locked for debugging
274,221 UART: [kat] SHA2-256
464,091 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,895 UART: [kat] ++
475,372 UART: [kat] sha1
487,552 UART: [kat] SHA2-256
490,566 UART: [kat] SHA2-384
496,764 UART: [kat] SHA2-512-ACC
499,379 UART: [kat] ECC-384
2,946,152 UART: [kat] HMAC-384Kdf
2,978,308 UART: [kat] LMS
3,510,106 UART: [kat] --
3,515,350 UART: [cold-reset] ++
3,517,761 UART: [fht] FHT @ 0x50003400
3,528,908 UART: [idev] ++
3,529,589 UART: [idev] CDI.KEYID = 6
3,530,552 UART: [idev] SUBJECT.KEYID = 7
3,531,764 UART: [idev] UDS.KEYID = 0
3,533,270 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,678,229 UART: [idev] Erasing UDS.KEYID = 0
6,059,220 UART: [idev] Sha1 KeyId Algorithm
6,081,983 UART: [idev] --
6,086,246 UART: [ldev] ++
6,086,939 UART: [ldev] CDI.KEYID = 6
6,087,828 UART: [ldev] SUBJECT.KEYID = 5
6,089,045 UART: [ldev] AUTHORITY.KEYID = 7
6,090,224 UART: [ldev] FE.KEYID = 1
6,131,117 UART: [ldev] Erasing FE.KEYID = 1
8,640,594 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,374,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,389,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,404,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,420,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,440,344 UART: [ldev] --
10,445,611 UART: [fwproc] Wait for Commands...
10,448,697 UART: [fwproc] Recv command 0x46574c44
10,450,965 UART: [fwproc] Recv'd Img size: 115032 bytes
13,914,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,804 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,105,959 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,653,388 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,440,297 ready_for_fw is high
3,440,928 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,741,791 >>> mbox cmd response: success
19,021,851 UART:
19,022,233 UART: Running Caliptra FMC ...
19,023,381 UART:
19,023,545 UART: [state] CFI Enabled
19,091,815 UART: [fht] FMC Alias Private Key: 7
20,854,877 UART: [art] Extend RT PCRs Done
20,856,104 UART: [art] Lock RT PCRs Done
20,857,734 UART: [art] Populate DV Done
20,863,161 UART: [fht] FMC Alias Private Key: 7
20,864,829 UART: [art] Derive CDI
20,865,652 UART: [art] Store in in slot 0x4
20,924,488 UART: [art] Derive Key Pair
20,925,526 UART: [art] Store priv key in slot 0x5
23,387,960 UART: [art] Derive Key Pair - Done
23,400,906 UART: [art] Signing Cert with AUTHO
23,402,207 UART: RITY.KEYID = 7
25,126,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,128,343 UART: [art] PUB.X = 25ABA1094902C30DAAB9F8E2186C5670A0C0CBD53776BA18C9C03929D30CB6AB5987A73B570E2A30E96ADAA28736A402
25,135,601 UART: [art] PUB.Y = 4A5E229A71278409C1BA0F46C6E7594BA9218BBF68F8E87D8F13663FD09D4E72E8FD29112EDA6D5CA3AC3D6F838E2A12
25,142,858 UART: [art] SIG.R = 1699E6E494CFB2EF6CA37E693BC2AA2E62CE66EDF7D48383C91992A2CA8F4523643116A7F89744266AB0D43B007EC450
25,150,258 UART: [art] SIG.S = 55E9679A52E17A1F158C0599F5F1A25D3108A27E077CEBFA7991EDA3E0806B753AB38EA7D1184F1504E4B653030CDA05
26,129,429 UART: Caliptra RT
26,130,119 UART: [state] CFI Enabled
26,295,124 UART: [rt] RT listening for mailbox commands...
26,296,983 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,326,572 UART: [rt]cmd =0x46504c54, len=4
26,328,018 >>> mbox cmd response data (8 bytes)
26,329,230 UART: [rt] FIPS self test
26,330,175 UART: [kat] ++
26,330,627 UART: [kat] sha1
26,335,136 UART: [kat] SHA2-256
26,337,061 UART: [kat] SHA2-384
26,339,914 UART: [kat] SHA2-512-ACC
26,342,161 UART: [kat] ECC-384
28,779,737 UART: [kat] HMAC-384Kdf
28,781,160 UART: Fatal Error: 0x90030001
28,816,457 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,961,198 >>> mbox cmd response: failed
28,961,871 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,106,284 >>> mbox cmd response: failed
Initializing fuses
987 writing to cptra_bootfsm_go
3,435,673 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,745,138 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
192,697 UART:
193,058 UART: Running Caliptra ROM ...
194,253 UART:
603,931 UART: [state] CFI Enabled
619,378 UART: [state] LifecycleState = Unprovisioned
621,788 UART: [state] DebugLocked = No
623,185 UART: [state] WD Timer not started. Device not locked for debugging
628,514 UART: [kat] SHA2-256
818,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,112 UART: [kat] ++
829,637 UART: [kat] sha1
841,864 UART: [kat] SHA2-256
844,880 UART: [kat] SHA2-384
851,511 UART: [kat] SHA2-512-ACC
854,095 UART: [kat] ECC-384
3,296,571 UART: [kat] HMAC-384Kdf
3,309,161 UART: [kat] LMS
3,841,004 UART: [kat] --
3,846,166 UART: [cold-reset] ++
3,848,383 UART: [fht] FHT @ 0x50003400
3,859,292 UART: [idev] ++
3,860,003 UART: [idev] CDI.KEYID = 6
3,860,924 UART: [idev] SUBJECT.KEYID = 7
3,862,174 UART: [idev] UDS.KEYID = 0
3,863,119 ready_for_fw is high
3,863,327 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,007,803 UART: [idev] Erasing UDS.KEYID = 0
6,341,253 UART: [idev] Sha1 KeyId Algorithm
6,362,213 UART: [idev] --
6,367,120 UART: [ldev] ++
6,367,800 UART: [ldev] CDI.KEYID = 6
6,368,709 UART: [ldev] SUBJECT.KEYID = 5
6,369,872 UART: [ldev] AUTHORITY.KEYID = 7
6,371,104 UART: [ldev] FE.KEYID = 1
6,382,293 UART: [ldev] Erasing FE.KEYID = 1
8,861,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,423 UART: [ldev] --
10,652,229 UART: [fwproc] Wait for Commands...
10,654,004 UART: [fwproc] Recv command 0x46574c44
10,656,326 UART: [fwproc] Recv'd Img size: 115032 bytes
14,113,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,195,601 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,311,745 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,858,602 >>> mbox cmd response: success
14,862,215 UART: [afmc] ++
14,862,967 UART: [afmc] CDI.KEYID = 6
14,864,080 UART: [afmc] SUBJECT.KEYID = 7
14,865,619 UART: [afmc] AUTHORITY.KEYID = 5
17,371,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,093,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,095,415 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,110,614 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,125,758 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,140,765 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,165,483 UART: [afmc] --
19,169,346 UART: [cold-reset] --
19,171,487 UART: [state] Locking Datavault
19,177,386 UART: [state] Locking PCR0, PCR1 and PCR31
19,179,561 UART: [state] Locking ICCM
19,181,990 UART: [exit] Launching FMC @ 0x40000130
19,190,661 UART:
19,190,908 UART: Running Caliptra FMC ...
19,192,013 UART:
19,192,179 UART: [state] CFI Enabled
19,200,173 UART: [fht] FMC Alias Private Key: 7
20,957,181 UART: [art] Extend RT PCRs Done
20,958,396 UART: [art] Lock RT PCRs Done
20,960,074 UART: [art] Populate DV Done
20,965,561 UART: [fht] FMC Alias Private Key: 7
20,967,260 UART: [art] Derive CDI
20,968,072 UART: [art] Store in in slot 0x4
21,010,667 UART: [art] Derive Key Pair
21,011,695 UART: [art] Store priv key in slot 0x5
23,438,542 UART: [art] Derive Key Pair - Done
23,451,208 UART: [art] Signing Cert with AUTHO
23,452,518 UART: RITY.KEYID = 7
25,158,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,719 UART: [art] PUB.X = 57D4F79EF504ED26E5E8ECF2AF420C82457CDDC5F877AB5623D1F9145B7F060C610E1F2D9D3D9E7666B6AE95012842ED
25,166,998 UART: [art] PUB.Y = 5CD7A730AB90535034410EC086F76F90FF9F488C8DB1BF590542D3CE8D58C85020A5AF4AAAEFDA178DD60DD009E296C8
25,174,267 UART: [art] SIG.R = 502F122AECDAC7E3EBB49F66FE191C1A656E6A5C8577D6145F32EE9CA705520698B262A5929931E7ECA32D897ACD5D3C
25,181,675 UART: [art] SIG.S = 127BC2A8E3F47BE2FEA6B45AA30A0318281B493384F991769589E05CD396EC0F274F88769DCC2AED50181F898498EF5D
26,160,294 UART: Caliptra RT
26,160,985 UART: [state] CFI Enabled
26,278,367 UART: [rt] RT listening for mailbox commands...
26,280,229 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,309,594 UART: [rt]cmd =0x46504c54, len=4
26,311,258 >>> mbox cmd response data (8 bytes)
26,312,132 UART: [rt] FIPS self test
26,313,084 UART: [kat] ++
26,313,540 UART: [kat] sha1
26,317,756 UART: [kat] SHA2-256
26,319,690 UART: [kat] SHA2-384
26,322,809 UART: [kat] SHA2-512-ACC
26,325,051 UART: [kat] ECC-384
28,752,196 UART: [kat] HMAC-384Kdf
28,753,592 UART: Fatal Error: 0x90030001
28,788,927 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,933,320 >>> mbox cmd response: failed
28,933,981 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,078,401 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,136 UART:
190,438 UART: Running Caliptra ROM ...
191,496 UART:
11,450,207 UART: [state] CFI Enabled
11,466,165 UART: [state] LifecycleState = Unprovisioned
11,468,550 UART: [state] DebugLocked = No
11,471,138 UART: [state] WD Timer not started. Device not locked for debugging
11,474,846 UART: [kat] SHA2-256
11,664,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,675,303 UART: [kat] ++
11,675,897 UART: [kat] sha1
11,688,030 UART: [kat] SHA2-256
11,691,044 UART: [kat] SHA2-384
11,697,044 UART: [kat] SHA2-512-ACC
11,699,627 UART: [kat] ECC-384
14,140,418 UART: [kat] HMAC-384Kdf
14,153,507 UART: [kat] LMS
14,685,339 UART: [kat] --
14,690,837 UART: [cold-reset] ++
14,692,661 UART: [fht] FHT @ 0x50003400
14,703,807 UART: [idev] ++
14,704,482 UART: [idev] CDI.KEYID = 6
14,705,497 UART: [idev] SUBJECT.KEYID = 7
14,706,659 UART: [idev] UDS.KEYID = 0
14,708,329 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,852,812 UART: [idev] Erasing UDS.KEYID = 0
17,186,021 UART: [idev] Sha1 KeyId Algorithm
17,208,344 UART: [idev] --
17,214,014 UART: [ldev] ++
17,214,699 UART: [ldev] CDI.KEYID = 6
17,215,622 UART: [ldev] SUBJECT.KEYID = 5
17,216,782 UART: [ldev] AUTHORITY.KEYID = 7
17,218,264 UART: [ldev] FE.KEYID = 1
17,228,198 UART: [ldev] Erasing FE.KEYID = 1
19,705,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,424,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,439,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,455,002 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,470,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,491,723 UART: [ldev] --
21,496,499 UART: [fwproc] Wait for Commands...
21,498,647 UART: [fwproc] Recv command 0x46574c44
21,500,913 UART: [fwproc] Recv'd Img size: 115032 bytes
24,952,342 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,032,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,148,147 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,694,795 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,759,058 ready_for_fw is high
3,759,699 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,965,145 >>> mbox cmd response: success
19,227,745 UART:
19,228,159 UART: Running Caliptra FMC ...
19,229,299 UART:
19,229,455 UART: [state] CFI Enabled
19,237,675 UART: [fht] FMC Alias Private Key: 7
20,994,710 UART: [art] Extend RT PCRs Done
20,995,945 UART: [art] Lock RT PCRs Done
20,997,765 UART: [art] Populate DV Done
21,003,293 UART: [fht] FMC Alias Private Key: 7
21,004,784 UART: [art] Derive CDI
21,005,522 UART: [art] Store in in slot 0x4
21,048,497 UART: [art] Derive Key Pair
21,049,499 UART: [art] Store priv key in slot 0x5
23,475,704 UART: [art] Derive Key Pair - Done
23,488,970 UART: [art] Signing Cert with AUTHO
23,490,508 UART: RITY.KEYID = 7
25,195,832 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,336 UART: [art] PUB.X = EF689F9DC32E594E4B00D862BD97C5B00A010EB30F09522A522223527497449F00FC5E4709157ACF0F9B02B014483FB0
25,204,562 UART: [art] PUB.Y = 2623AE71D860F02F8CB2FFAE729DECAEC856E3FC8E5D8C718E7476161836C1E20495F2D960A53A8EB489C7C6A0DA5A43
25,211,832 UART: [art] SIG.R = FF8F5F275AC24F4D80CEE45898BF037924F7066B0AE252F6FB77F2A9C90F8CC46D6BD7445D7320BD3043F462E2A84892
25,219,231 UART: [art] SIG.S = A452E15831CD64A2371FA3024AB56063CDC75DCB6BABCC0D614C65E690CBB3FC0C0BA8ACCB1770DB51747D7260144205
26,197,955 UART: Caliptra RT
26,198,650 UART: [state] CFI Enabled
26,315,384 UART: [rt] RT listening for mailbox commands...
26,317,229 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,800 UART: [rt]cmd =0x46504c54, len=4
26,348,892 >>> mbox cmd response data (8 bytes)
26,349,883 UART: [rt] FIPS self test
26,350,832 UART: [kat] ++
26,351,288 UART: [kat] sha1
26,355,849 UART: [kat] SHA2-256
26,357,725 UART: [kat] SHA2-384
26,360,737 UART: [kat] SHA2-512-ACC
26,362,981 UART: [kat] ECC-384
28,790,202 UART: [kat] HMAC-384Kdf
28,791,309 UART: Fatal Error: 0x90030001
28,826,535 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,971,051 >>> mbox cmd response: failed
28,971,678 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,116,094 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
14,570,219 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,774,644 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,597 UART: [kat] SHA2-256
892,535 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
903,110 UART: [kat] HMAC-384Kdf
907,616 UART: [kat] LMS
1,475,812 UART: [kat] --
1,476,745 UART: [cold-reset] ++
1,477,115 UART: [fht] Storing FHT @ 0x50003400
1,479,936 UART: [idev] ++
1,480,104 UART: [idev] CDI.KEYID = 6
1,480,464 UART: [idev] SUBJECT.KEYID = 7
1,480,888 UART: [idev] UDS.KEYID = 0
1,481,233 ready_for_fw is high
1,481,233 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,590 UART: [idev] Erasing UDS.KEYID = 0
1,505,762 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,396 UART: [idev] --
1,515,339 UART: [ldev] ++
1,515,507 UART: [ldev] CDI.KEYID = 6
1,515,870 UART: [ldev] SUBJECT.KEYID = 5
1,516,296 UART: [ldev] AUTHORITY.KEYID = 7
1,516,759 UART: [ldev] FE.KEYID = 1
1,522,031 UART: [ldev] Erasing FE.KEYID = 1
1,547,480 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,412 UART: [ldev] --
1,586,683 UART: [fwproc] Waiting for Commands...
1,587,348 UART: [fwproc] Received command 0x46574c44
1,588,139 UART: [fwproc] Received Image of size 115032 bytes
2,892,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,512 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,657 >>> mbox cmd response: success
3,087,771 UART: [afmc] ++
3,087,939 UART: [afmc] CDI.KEYID = 6
3,088,301 UART: [afmc] SUBJECT.KEYID = 7
3,088,726 UART: [afmc] AUTHORITY.KEYID = 5
3,124,221 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,435 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,215 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,943 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,828 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,518 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,403 UART: [afmc] --
3,167,445 UART: [cold-reset] --
3,168,331 UART: [state] Locking Datavault
3,169,498 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,102 UART: [state] Locking ICCM
3,170,722 UART: [exit] Launching FMC @ 0x40000130
3,176,051 UART:
3,176,067 UART: Running Caliptra FMC ...
3,176,475 UART:
3,176,529 UART: [state] CFI Enabled
3,186,930 UART: [fht] FMC Alias Private Key: 7
3,294,573 UART: [art] Extend RT PCRs Done
3,295,001 UART: [art] Lock RT PCRs Done
3,296,433 UART: [art] Populate DV Done
3,304,530 UART: [fht] FMC Alias Private Key: 7
3,305,630 UART: [art] Derive CDI
3,305,910 UART: [art] Store in in slot 0x4
3,391,801 UART: [art] Derive Key Pair
3,392,161 UART: [art] Store priv key in slot 0x5
3,405,367 UART: [art] Derive Key Pair - Done
3,420,051 UART: [art] Signing Cert with AUTHO
3,420,531 UART: RITY.KEYID = 7
3,435,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,536 UART: [art] PUB.X = 8779FB5B821B79111EAF75B719CF80BA068BDE7EFE2A093946606E91439CB562755159AFD40DB797F79039534017C2DA
3,443,297 UART: [art] PUB.Y = CACE9C8D0B7DFCAE51588A7D227E3F20457D7A0ECFE6957674B8C503EBECBE73582CE25C26F9E2016E2809361B3BF678
3,450,248 UART: [art] SIG.R = E8B9D1BC904CB8F4BDEDE4FF92DDEB8C8E26A2DE99C856AEE0987C02EF1111FDC1ED503C385B530F9B8F8C77F104061C
3,457,032 UART: [art] SIG.S = 907AD9A6B44A0C4EBD489B7C0FECCDB27E1EFFA8F7775ED621AA306E43B3AAE6105B182582D8C47DF4BC82076568A133
3,480,586 UART: Caliptra RT
3,480,839 UART: [state] CFI Enabled
3,589,217 UART: [rt] RT listening for mailbox commands...
3,589,880 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,615 UART: [rt]cmd =0x46504c54, len=4
3,620,709 >>> mbox cmd response data (8 bytes)
3,620,990 UART: [rt] FIPS self test
3,621,318 UART: [kat] ++
3,621,470 UART: [kat] sha1
3,625,810 UART: [kat] SHA2-256
3,627,832 UART: [kat] SHA2-384
3,630,925 UART: [kat] SHA2-512-ACC
3,632,852 UART: [kat] ECC-384
3,642,732 UART: [kat] HMAC-384Kdf
3,643,742 UART: Fatal Error: 0x90030001
3,645,281 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,645,286 >>> mbox cmd response: failed
3,645,286 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,645,291 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,181 UART: [kat] SHA2-256
892,119 UART: [kat] SHA2-384
894,896 UART: [kat] SHA2-512-ACC
896,797 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,362 UART: [kat] LMS
1,475,558 UART: [kat] --
1,476,459 UART: [cold-reset] ++
1,476,885 UART: [fht] Storing FHT @ 0x50003400
1,479,666 UART: [idev] ++
1,479,834 UART: [idev] CDI.KEYID = 6
1,480,194 UART: [idev] SUBJECT.KEYID = 7
1,480,618 UART: [idev] UDS.KEYID = 0
1,480,963 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,020 UART: [idev] Erasing UDS.KEYID = 0
1,505,130 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,748 UART: [idev] --
1,514,781 UART: [ldev] ++
1,514,949 UART: [ldev] CDI.KEYID = 6
1,515,312 UART: [ldev] SUBJECT.KEYID = 5
1,515,738 UART: [ldev] AUTHORITY.KEYID = 7
1,516,201 UART: [ldev] FE.KEYID = 1
1,521,707 UART: [ldev] Erasing FE.KEYID = 1
1,546,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,986 UART: [ldev] --
1,586,291 UART: [fwproc] Waiting for Commands...
1,586,954 UART: [fwproc] Received command 0x46574c44
1,587,745 UART: [fwproc] Received Image of size 115032 bytes
2,892,536 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,166 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,403 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,159 ready_for_fw is high
1,363,159 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,934,971 >>> mbox cmd response: success
2,996,413 UART:
2,996,429 UART: Running Caliptra FMC ...
2,996,837 UART:
2,996,891 UART: [state] CFI Enabled
3,007,586 UART: [fht] FMC Alias Private Key: 7
3,115,601 UART: [art] Extend RT PCRs Done
3,116,029 UART: [art] Lock RT PCRs Done
3,117,815 UART: [art] Populate DV Done
3,125,908 UART: [fht] FMC Alias Private Key: 7
3,127,024 UART: [art] Derive CDI
3,127,304 UART: [art] Store in in slot 0x4
3,212,725 UART: [art] Derive Key Pair
3,213,085 UART: [art] Store priv key in slot 0x5
3,225,503 UART: [art] Derive Key Pair - Done
3,240,328 UART: [art] Signing Cert with AUTHO
3,240,808 UART: RITY.KEYID = 7
3,255,724 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,489 UART: [art] PUB.X = 0A4E6710397F2C2F3A7C00FEDB09A5048A05C7BFEF27DA319B08B70D043935F1637DD3AFA95DE3884C5269CC288CA844
3,263,226 UART: [art] PUB.Y = 71BFB60F545D96DDDEF7326EB9763BE8FF831E339A1CC974FBBA36FD0FB3AA09616D38D010ED1FA668F9F80B4ED55040
3,270,184 UART: [art] SIG.R = 76AA096F33D78FC47F5B312B72B2B1CB9ECAD52024484A83D8F2E34B3BAF6075AC0EEE6F621E9FFB8D569CA71281AFB9
3,276,968 UART: [art] SIG.S = ECBCE6A7347BA71AC8D68E02A174F4C735C9012693DDBF250086B83BC1ABF5EA4D326899994CCF6D2A91F9A21D1CD28E
3,300,867 UART: Caliptra RT
3,301,120 UART: [state] CFI Enabled
3,409,809 UART: [rt] RT listening for mailbox commands...
3,410,472 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,339 UART: [rt]cmd =0x46504c54, len=4
3,441,427 >>> mbox cmd response data (8 bytes)
3,441,596 UART: [rt] FIPS self test
3,441,924 UART: [kat] ++
3,442,076 UART: [kat] sha1
3,446,202 UART: [kat] SHA2-256
3,448,224 UART: [kat] SHA2-384
3,450,855 UART: [kat] SHA2-512-ACC
3,452,782 UART: [kat] ECC-384
3,462,710 UART: [kat] HMAC-384Kdf
3,463,798 UART: Fatal Error: 0x90030001
3,465,337 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,465,342 >>> mbox cmd response: failed
3,465,342 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,465,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,793 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,917 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,842 UART: [kat] SHA2-256
881,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,888 UART: [kat] ++
886,040 UART: [kat] sha1
890,222 UART: [kat] SHA2-256
892,160 UART: [kat] SHA2-384
894,877 UART: [kat] SHA2-512-ACC
896,778 UART: [kat] ECC-384
902,555 UART: [kat] HMAC-384Kdf
907,325 UART: [kat] LMS
1,475,521 UART: [kat] --
1,476,390 UART: [cold-reset] ++
1,476,750 UART: [fht] Storing FHT @ 0x50003400
1,479,583 UART: [idev] ++
1,479,751 UART: [idev] CDI.KEYID = 6
1,480,111 UART: [idev] SUBJECT.KEYID = 7
1,480,535 UART: [idev] UDS.KEYID = 0
1,480,880 ready_for_fw is high
1,480,880 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,425 UART: [idev] Erasing UDS.KEYID = 0
1,504,993 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,431 UART: [idev] --
1,514,654 UART: [ldev] ++
1,514,822 UART: [ldev] CDI.KEYID = 6
1,515,185 UART: [ldev] SUBJECT.KEYID = 5
1,515,611 UART: [ldev] AUTHORITY.KEYID = 7
1,516,074 UART: [ldev] FE.KEYID = 1
1,521,242 UART: [ldev] Erasing FE.KEYID = 1
1,546,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,773 UART: [ldev] --
1,586,084 UART: [fwproc] Waiting for Commands...
1,586,769 UART: [fwproc] Received command 0x46574c44
1,587,560 UART: [fwproc] Received Image of size 115032 bytes
2,892,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,277 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,629 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,582 >>> mbox cmd response: success
3,087,822 UART: [afmc] ++
3,087,990 UART: [afmc] CDI.KEYID = 6
3,088,352 UART: [afmc] SUBJECT.KEYID = 7
3,088,777 UART: [afmc] AUTHORITY.KEYID = 5
3,124,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,416 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,196 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,924 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,809 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,499 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,440 UART: [afmc] --
3,167,524 UART: [cold-reset] --
3,168,426 UART: [state] Locking Datavault
3,169,593 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,197 UART: [state] Locking ICCM
3,170,789 UART: [exit] Launching FMC @ 0x40000130
3,176,118 UART:
3,176,134 UART: Running Caliptra FMC ...
3,176,542 UART:
3,176,685 UART: [state] CFI Enabled
3,187,182 UART: [fht] FMC Alias Private Key: 7
3,295,415 UART: [art] Extend RT PCRs Done
3,295,843 UART: [art] Lock RT PCRs Done
3,297,689 UART: [art] Populate DV Done
3,305,726 UART: [fht] FMC Alias Private Key: 7
3,306,732 UART: [art] Derive CDI
3,307,012 UART: [art] Store in in slot 0x4
3,392,507 UART: [art] Derive Key Pair
3,392,867 UART: [art] Store priv key in slot 0x5
3,405,937 UART: [art] Derive Key Pair - Done
3,420,874 UART: [art] Signing Cert with AUTHO
3,421,354 UART: RITY.KEYID = 7
3,436,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,389 UART: [art] PUB.X = BD37135AC0C7351CED4164BDE4827956ABC2400635F0669A68C095F644203364FFF3A37C7422A9818D2348B8DEC9FDA4
3,444,158 UART: [art] PUB.Y = F96203EBBAC67B7328CB2F35B6590E3AED11E2A7E1132E2CF86656A7B9F0FB53020C14CA5009DF859737AFBCFAB78EBC
3,451,113 UART: [art] SIG.R = 7F553539AE59EF903959F4CF4A0D82C80EB97D7E5AA7897366BB4B8F474F37263867A46BA7CEBCE5735ED638D02CC915
3,457,885 UART: [art] SIG.S = AE135B1806B3C0EF15D399EEF18B9F693DCC68DB5878B4DE09152CAD8CCDCEB5CC9F7F0C0AF033A9C6F0DBA8EDBC49C3
3,481,912 UART: Caliptra RT
3,482,257 UART: [state] CFI Enabled
3,591,192 UART: [rt] RT listening for mailbox commands...
3,591,855 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,322 UART: [rt]cmd =0x46504c54, len=4
3,622,598 >>> mbox cmd response data (8 bytes)
3,622,827 UART: [rt] FIPS self test
3,623,155 UART: [kat] ++
3,623,307 UART: [kat] sha1
3,627,407 UART: [kat] SHA2-256
3,629,429 UART: [kat] SHA2-384
3,632,422 UART: [kat] SHA2-512-ACC
3,634,349 UART: [kat] ECC-384
3,644,393 UART: [kat] HMAC-384Kdf
3,645,351 UART: Fatal Error: 0x90030001
3,646,890 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,646,895 >>> mbox cmd response: failed
3,646,895 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,646,900 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,292 UART: [kat] SHA2-256
882,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,338 UART: [kat] ++
886,490 UART: [kat] sha1
890,778 UART: [kat] SHA2-256
892,716 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,703 UART: [kat] LMS
1,475,899 UART: [kat] --
1,476,808 UART: [cold-reset] ++
1,477,380 UART: [fht] Storing FHT @ 0x50003400
1,480,109 UART: [idev] ++
1,480,277 UART: [idev] CDI.KEYID = 6
1,480,637 UART: [idev] SUBJECT.KEYID = 7
1,481,061 UART: [idev] UDS.KEYID = 0
1,481,406 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,869 UART: [idev] Erasing UDS.KEYID = 0
1,505,629 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,405 UART: [idev] --
1,515,622 UART: [ldev] ++
1,515,790 UART: [ldev] CDI.KEYID = 6
1,516,153 UART: [ldev] SUBJECT.KEYID = 5
1,516,579 UART: [ldev] AUTHORITY.KEYID = 7
1,517,042 UART: [ldev] FE.KEYID = 1
1,522,378 UART: [ldev] Erasing FE.KEYID = 1
1,548,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,545 UART: [ldev] --
1,587,878 UART: [fwproc] Waiting for Commands...
1,588,717 UART: [fwproc] Received command 0x46574c44
1,589,508 UART: [fwproc] Received Image of size 115032 bytes
2,895,285 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,575 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,750 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,674 ready_for_fw is high
1,362,674 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,934,778 >>> mbox cmd response: success
2,996,028 UART:
2,996,044 UART: Running Caliptra FMC ...
2,996,452 UART:
2,996,595 UART: [state] CFI Enabled
3,007,188 UART: [fht] FMC Alias Private Key: 7
3,114,815 UART: [art] Extend RT PCRs Done
3,115,243 UART: [art] Lock RT PCRs Done
3,116,685 UART: [art] Populate DV Done
3,124,836 UART: [fht] FMC Alias Private Key: 7
3,125,896 UART: [art] Derive CDI
3,126,176 UART: [art] Store in in slot 0x4
3,211,645 UART: [art] Derive Key Pair
3,212,005 UART: [art] Store priv key in slot 0x5
3,225,111 UART: [art] Derive Key Pair - Done
3,239,715 UART: [art] Signing Cert with AUTHO
3,240,195 UART: RITY.KEYID = 7
3,255,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,572 UART: [art] PUB.X = A2EEC88D8B0EF4C73E74C1B13BBE08D054ACE48320C383AA00ACEE2B06BDB48D3EF327FB676666C5A175BA07A61C9FE7
3,263,332 UART: [art] PUB.Y = F97CE3CD986B4A48FD4C6AB5C53A088B03721C7FCF107595CFE9FC6FDC0B4EDCE0D6B7087B301AC16BF2440B9579F73D
3,270,289 UART: [art] SIG.R = 679252F5D06EDD003CC41CD3AEA0146D60A48FF903A59BDD75D3AD1C74E3351BCFB6DBAF9DFAF417D410BDC0D8CCDB30
3,277,064 UART: [art] SIG.S = C6A934C12DACA60179DEEE5AFD35500C18B776AED01A38CE2C0B583ECA17CDBDD971F9E4595F3A455F3D38ADDE977FB6
3,300,470 UART: Caliptra RT
3,300,815 UART: [state] CFI Enabled
3,409,682 UART: [rt] RT listening for mailbox commands...
3,410,345 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,254 UART: [rt]cmd =0x46504c54, len=4
3,441,506 >>> mbox cmd response data (8 bytes)
3,441,777 UART: [rt] FIPS self test
3,442,105 UART: [kat] ++
3,442,257 UART: [kat] sha1
3,446,615 UART: [kat] SHA2-256
3,448,637 UART: [kat] SHA2-384
3,451,556 UART: [kat] SHA2-512-ACC
3,453,483 UART: [kat] ECC-384
3,463,557 UART: [kat] HMAC-384Kdf
3,464,357 UART: Fatal Error: 0x90030001
3,465,896 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,465,901 >>> mbox cmd response: failed
3,465,901 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,465,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,608 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,600 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
88,106 UART: [kat] SHA2-256
893,756 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,881 UART: [kat] ++
898,033 UART: [kat] sha1
902,091 UART: [kat] SHA2-256
904,031 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,512 UART: [kat] HMAC-384Kdf
923,046 UART: [kat] LMS
1,171,374 UART: [kat] --
1,172,305 UART: [cold-reset] ++
1,172,853 UART: [fht] FHT @ 0x50003400
1,175,444 UART: [idev] ++
1,175,612 UART: [idev] CDI.KEYID = 6
1,175,972 UART: [idev] SUBJECT.KEYID = 7
1,176,396 UART: [idev] UDS.KEYID = 0
1,176,741 ready_for_fw is high
1,176,741 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,672 UART: [idev] Erasing UDS.KEYID = 0
1,201,579 UART: [idev] Sha1 KeyId Algorithm
1,209,887 UART: [idev] --
1,210,985 UART: [ldev] ++
1,211,153 UART: [ldev] CDI.KEYID = 6
1,211,516 UART: [ldev] SUBJECT.KEYID = 5
1,211,942 UART: [ldev] AUTHORITY.KEYID = 7
1,212,405 UART: [ldev] FE.KEYID = 1
1,217,345 UART: [ldev] Erasing FE.KEYID = 1
1,243,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,103 UART: [ldev] --
1,282,426 UART: [fwproc] Wait for Commands...
1,283,170 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,037 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,341 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,330 >>> mbox cmd response: success
2,783,444 UART: [afmc] ++
2,783,612 UART: [afmc] CDI.KEYID = 6
2,783,974 UART: [afmc] SUBJECT.KEYID = 7
2,784,399 UART: [afmc] AUTHORITY.KEYID = 5
2,820,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,673 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,421 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,034 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,753 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,489 UART: [afmc] --
2,863,381 UART: [cold-reset] --
2,864,469 UART: [state] Locking Datavault
2,865,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,334 UART: [state] Locking ICCM
2,866,862 UART: [exit] Launching FMC @ 0x40000130
2,872,191 UART:
2,872,207 UART: Running Caliptra FMC ...
2,872,615 UART:
2,872,669 UART: [state] CFI Enabled
2,883,040 UART: [fht] FMC Alias Private Key: 7
2,990,931 UART: [art] Extend RT PCRs Done
2,991,359 UART: [art] Lock RT PCRs Done
2,992,581 UART: [art] Populate DV Done
3,000,816 UART: [fht] FMC Alias Private Key: 7
3,001,934 UART: [art] Derive CDI
3,002,214 UART: [art] Store in in slot 0x4
3,088,075 UART: [art] Derive Key Pair
3,088,435 UART: [art] Store priv key in slot 0x5
3,101,707 UART: [art] Derive Key Pair - Done
3,116,316 UART: [art] Signing Cert with AUTHO
3,116,796 UART: RITY.KEYID = 7
3,131,948 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,713 UART: [art] PUB.X = 3948B9615CD329C8B1BD9D42DC49A5BF2F549228C3C37D5B7A76B3529F4C8FC08997812DC4001A4F4A6B5426ACEEC03C
3,139,471 UART: [art] PUB.Y = 27830B56615E2BA5BED90E03E94E8D4B53DCE62DD5FE442915CBEAF9021919727BFFA8ED3B928EC94ACF762A4B6C2C7A
3,146,429 UART: [art] SIG.R = 0CCE91FC6E34A89A341081AFC15BA2DF06EDFF653B85DF5A734FC2FF006C56AAC10429BDF9DAD5E6ABAF577E7233451B
3,153,194 UART: [art] SIG.S = 9EFC57C525531BC73DDA72ECA5D800A0970067E111D9A2FD8608C5E404B69368B325C10929DDAD19B56818ADACA3A971
3,176,766 UART: Caliptra RT
3,177,019 UART: [state] CFI Enabled
3,285,002 UART: [rt] RT listening for mailbox commands...
3,285,665 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,218 UART: [rt]cmd =0x46504c54, len=4
3,316,434 >>> mbox cmd response data (8 bytes)
3,316,671 UART: [rt] FIPS self test
3,316,999 UART: [kat] ++
3,317,151 UART: [kat] sha1
3,321,407 UART: [kat] SHA2-256
3,323,429 UART: [kat] SHA2-384
3,326,392 UART: [kat] SHA2-512-ACC
3,328,319 UART: [kat] ECC-384
3,338,103 UART: [kat] HMAC-384Kdf
3,338,867 UART: Fatal Error: 0x90030001
3,340,406 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,340,411 >>> mbox cmd response: failed
3,340,411 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,340,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,617 UART: [kat] SHA2-256
903,557 UART: [kat] SHA2-384
906,296 UART: [kat] SHA2-512-ACC
908,197 UART: [kat] ECC-384
917,568 UART: [kat] HMAC-384Kdf
922,170 UART: [kat] LMS
1,170,498 UART: [kat] --
1,171,411 UART: [cold-reset] ++
1,171,965 UART: [fht] FHT @ 0x50003400
1,174,586 UART: [idev] ++
1,174,754 UART: [idev] CDI.KEYID = 6
1,175,114 UART: [idev] SUBJECT.KEYID = 7
1,175,538 UART: [idev] UDS.KEYID = 0
1,175,883 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,762 UART: [idev] Erasing UDS.KEYID = 0
1,200,945 UART: [idev] Sha1 KeyId Algorithm
1,209,323 UART: [idev] --
1,210,257 UART: [ldev] ++
1,210,425 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,214 UART: [ldev] AUTHORITY.KEYID = 7
1,211,677 UART: [ldev] FE.KEYID = 1
1,216,789 UART: [ldev] Erasing FE.KEYID = 1
1,243,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,284 UART: [fwproc] Wait for Commands...
1,283,030 UART: [fwproc] Recv command 0x46574c44
1,283,758 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,445 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,749 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,526 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,199 ready_for_fw is high
1,060,199 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,129 >>> mbox cmd response: success
2,695,247 UART:
2,695,263 UART: Running Caliptra FMC ...
2,695,671 UART:
2,695,725 UART: [state] CFI Enabled
2,706,264 UART: [fht] FMC Alias Private Key: 7
2,814,927 UART: [art] Extend RT PCRs Done
2,815,355 UART: [art] Lock RT PCRs Done
2,816,919 UART: [art] Populate DV Done
2,825,072 UART: [fht] FMC Alias Private Key: 7
2,826,060 UART: [art] Derive CDI
2,826,340 UART: [art] Store in in slot 0x4
2,911,933 UART: [art] Derive Key Pair
2,912,293 UART: [art] Store priv key in slot 0x5
2,925,063 UART: [art] Derive Key Pair - Done
2,939,738 UART: [art] Signing Cert with AUTHO
2,940,218 UART: RITY.KEYID = 7
2,954,894 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,659 UART: [art] PUB.X = 2A961E865674930280DAB09C7AD650BB6828100EF880A0169B920340FA9B9ECC396CB1C7E51E755DD209C3F6458818B9
2,962,415 UART: [art] PUB.Y = F5C1E2934ACCF1544D35FF8EF682B05D72940C26CB9AAEFB0AE58AE14D258F54FB59728706EC7291B5FC5BE9479E5FF3
2,969,374 UART: [art] SIG.R = DD6EC973A15979F2ED64DBFECEB84D1BB7135C125E93026E2547D84D448D61323D1FE3747086BE502E09FA08AEA28F02
2,976,142 UART: [art] SIG.S = CBBE5C424EF40BCBA424F232816463BD71010F8E90FE197FE29931D1C24805DAF1565CA4F48D5ED447B6EA399411A346
2,999,669 UART: Caliptra RT
2,999,922 UART: [state] CFI Enabled
3,107,904 UART: [rt] RT listening for mailbox commands...
3,108,567 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,160 UART: [rt]cmd =0x46504c54, len=4
3,139,416 >>> mbox cmd response data (8 bytes)
3,139,663 UART: [rt] FIPS self test
3,139,991 UART: [kat] ++
3,140,143 UART: [kat] sha1
3,144,389 UART: [kat] SHA2-256
3,146,411 UART: [kat] SHA2-384
3,149,476 UART: [kat] SHA2-512-ACC
3,151,403 UART: [kat] ECC-384
3,161,915 UART: [kat] HMAC-384Kdf
3,162,879 UART: Fatal Error: 0x90030001
3,164,418 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,164,423 >>> mbox cmd response: failed
3,164,423 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,164,428 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,925 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,833 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [kat] SHA2-256
893,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,738 UART: [kat] ++
897,890 UART: [kat] sha1
902,210 UART: [kat] SHA2-256
904,150 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,297 UART: [kat] HMAC-384Kdf
923,035 UART: [kat] LMS
1,171,363 UART: [kat] --
1,172,076 UART: [cold-reset] ++
1,172,644 UART: [fht] FHT @ 0x50003400
1,175,363 UART: [idev] ++
1,175,531 UART: [idev] CDI.KEYID = 6
1,175,891 UART: [idev] SUBJECT.KEYID = 7
1,176,315 UART: [idev] UDS.KEYID = 0
1,176,660 ready_for_fw is high
1,176,660 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,747 UART: [idev] Erasing UDS.KEYID = 0
1,201,480 UART: [idev] Sha1 KeyId Algorithm
1,209,904 UART: [idev] --
1,210,936 UART: [ldev] ++
1,211,104 UART: [ldev] CDI.KEYID = 6
1,211,467 UART: [ldev] SUBJECT.KEYID = 5
1,211,893 UART: [ldev] AUTHORITY.KEYID = 7
1,212,356 UART: [ldev] FE.KEYID = 1
1,217,718 UART: [ldev] Erasing FE.KEYID = 1
1,244,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,072 UART: [ldev] --
1,283,419 UART: [fwproc] Wait for Commands...
1,284,229 UART: [fwproc] Recv command 0x46574c44
1,284,957 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,114 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,418 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,273 >>> mbox cmd response: success
2,784,301 UART: [afmc] ++
2,784,469 UART: [afmc] CDI.KEYID = 6
2,784,831 UART: [afmc] SUBJECT.KEYID = 7
2,785,256 UART: [afmc] AUTHORITY.KEYID = 5
2,820,829 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,892 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,620 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,505 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,148 UART: [afmc] --
2,864,048 UART: [cold-reset] --
2,865,056 UART: [state] Locking Datavault
2,866,305 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,909 UART: [state] Locking ICCM
2,867,421 UART: [exit] Launching FMC @ 0x40000130
2,872,750 UART:
2,872,766 UART: Running Caliptra FMC ...
2,873,174 UART:
2,873,317 UART: [state] CFI Enabled
2,883,738 UART: [fht] FMC Alias Private Key: 7
2,992,481 UART: [art] Extend RT PCRs Done
2,992,909 UART: [art] Lock RT PCRs Done
2,994,405 UART: [art] Populate DV Done
3,002,404 UART: [fht] FMC Alias Private Key: 7
3,003,562 UART: [art] Derive CDI
3,003,842 UART: [art] Store in in slot 0x4
3,089,539 UART: [art] Derive Key Pair
3,089,899 UART: [art] Store priv key in slot 0x5
3,102,951 UART: [art] Derive Key Pair - Done
3,117,596 UART: [art] Signing Cert with AUTHO
3,118,076 UART: RITY.KEYID = 7
3,133,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,235 UART: [art] PUB.X = 5B114E662F3E7F571EC834AC6BB88239704079E1C6E1D48E3AA590D5551C5215D75EA0F7831A35BD61CE5D24EBC1C2E9
3,141,013 UART: [art] PUB.Y = 800EF10BD1C903250F4480249179EAD9C3B3E44AAFD380637062F9575402D763D054FF23334889A2B7F9F9930688CFED
3,147,941 UART: [art] SIG.R = D063EDCD64FFD3C2C71144DFDD13EB8CB35C8C59DF4668476267C53F76405BA9D08F6F420EBB0CDA9A7AECF3CBB4192B
3,154,731 UART: [art] SIG.S = 271146A1F75FC845D8D1B247C3B04590820C707EFFF84E6BB87F6EDA7D8F42B95DD55EF1DA857271EC63858F640A3A17
3,179,184 UART: Caliptra RT
3,179,529 UART: [state] CFI Enabled
3,287,952 UART: [rt] RT listening for mailbox commands...
3,288,615 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,322 UART: [rt]cmd =0x46504c54, len=4
3,319,310 >>> mbox cmd response data (8 bytes)
3,319,569 UART: [rt] FIPS self test
3,319,897 UART: [kat] ++
3,320,049 UART: [kat] sha1
3,324,279 UART: [kat] SHA2-256
3,326,301 UART: [kat] SHA2-384
3,329,302 UART: [kat] SHA2-512-ACC
3,331,229 UART: [kat] ECC-384
3,340,989 UART: [kat] HMAC-384Kdf
3,342,159 UART: Fatal Error: 0x90030001
3,343,698 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,703 >>> mbox cmd response: failed
3,343,703 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,304 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
893,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,440 UART: [kat] ++
897,592 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,393 UART: [kat] HMAC-384Kdf
922,897 UART: [kat] LMS
1,171,225 UART: [kat] --
1,172,154 UART: [cold-reset] ++
1,172,496 UART: [fht] FHT @ 0x50003400
1,175,221 UART: [idev] ++
1,175,389 UART: [idev] CDI.KEYID = 6
1,175,749 UART: [idev] SUBJECT.KEYID = 7
1,176,173 UART: [idev] UDS.KEYID = 0
1,176,518 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,439 UART: [idev] Erasing UDS.KEYID = 0
1,201,730 UART: [idev] Sha1 KeyId Algorithm
1,210,420 UART: [idev] --
1,211,386 UART: [ldev] ++
1,211,554 UART: [ldev] CDI.KEYID = 6
1,211,917 UART: [ldev] SUBJECT.KEYID = 5
1,212,343 UART: [ldev] AUTHORITY.KEYID = 7
1,212,806 UART: [ldev] FE.KEYID = 1
1,217,828 UART: [ldev] Erasing FE.KEYID = 1
1,244,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,786 UART: [ldev] --
1,284,085 UART: [fwproc] Wait for Commands...
1,284,865 UART: [fwproc] Recv command 0x46574c44
1,285,593 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,888 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,192 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,133 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,416 ready_for_fw is high
1,060,416 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,734 >>> mbox cmd response: success
2,698,082 UART:
2,698,098 UART: Running Caliptra FMC ...
2,698,506 UART:
2,698,649 UART: [state] CFI Enabled
2,709,212 UART: [fht] FMC Alias Private Key: 7
2,817,485 UART: [art] Extend RT PCRs Done
2,817,913 UART: [art] Lock RT PCRs Done
2,819,729 UART: [art] Populate DV Done
2,827,796 UART: [fht] FMC Alias Private Key: 7
2,828,822 UART: [art] Derive CDI
2,829,102 UART: [art] Store in in slot 0x4
2,914,899 UART: [art] Derive Key Pair
2,915,259 UART: [art] Store priv key in slot 0x5
2,928,751 UART: [art] Derive Key Pair - Done
2,943,276 UART: [art] Signing Cert with AUTHO
2,943,756 UART: RITY.KEYID = 7
2,959,022 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,787 UART: [art] PUB.X = 1B20562A74E17509F00AD7675E9E51173F8B5F7397A759E6EB15A7EF1E07C5C2E34A0CBB9DF3DC807F4367909E8054D6
2,966,549 UART: [art] PUB.Y = B135029B7E83D2794A89E87C31CF8F96A4FA1BCD63392560670AA2212290211D629630F95F776682819622E30C1E97F6
2,973,478 UART: [art] SIG.R = 82152BC786FE5FFE015CAE529688F97C64F31D3B4BA91C3FA7BA2A3AAD3F3DFD792F33DF46B28FF8A204BF994F36FD77
2,980,264 UART: [art] SIG.S = 73C092321F2FC82EAE7DBD60BD3B3CB79B5ED58793FEA486A05156271BAFF98690F2680BC829522048649B478C3C043D
3,003,877 UART: Caliptra RT
3,004,222 UART: [state] CFI Enabled
3,112,593 UART: [rt] RT listening for mailbox commands...
3,113,256 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,157 UART: [rt]cmd =0x46504c54, len=4
3,144,255 >>> mbox cmd response data (8 bytes)
3,144,462 UART: [rt] FIPS self test
3,144,790 UART: [kat] ++
3,144,942 UART: [kat] sha1
3,149,182 UART: [kat] SHA2-256
3,151,204 UART: [kat] SHA2-384
3,154,133 UART: [kat] SHA2-512-ACC
3,156,060 UART: [kat] ECC-384
3,165,760 UART: [kat] HMAC-384Kdf
3,166,784 UART: Fatal Error: 0x90030001
3,168,323 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,168,328 >>> mbox cmd response: failed
3,168,328 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,168,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,742 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,618 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,006 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,559 UART: [cold-reset] ++
1,169,949 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,174,001 ready_for_fw is high
1,174,001 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,177 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,204 UART: [ldev] ++
1,208,372 UART: [ldev] CDI.KEYID = 6
1,208,736 UART: [ldev] SUBJECT.KEYID = 5
1,209,163 UART: [ldev] AUTHORITY.KEYID = 7
1,209,626 UART: [ldev] FE.KEYID = 1
1,214,702 UART: [ldev] Erasing FE.KEYID = 1
1,240,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,432 UART: [ldev] --
1,279,836 UART: [fwproc] Wait for Commands...
1,280,493 UART: [fwproc] Recv command 0x46574c44
1,281,226 UART: [fwproc] Recv'd Img size: 115032 bytes
2,585,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,670 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,590 >>> mbox cmd response: success
2,780,641 UART: [afmc] ++
2,780,809 UART: [afmc] CDI.KEYID = 6
2,781,172 UART: [afmc] SUBJECT.KEYID = 7
2,781,598 UART: [afmc] AUTHORITY.KEYID = 5
2,816,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,676 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,839,405 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,845,288 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,007 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,946 UART: [afmc] --
2,859,848 UART: [cold-reset] --
2,860,622 UART: [state] Locking Datavault
2,861,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,325 UART: [state] Locking ICCM
2,862,933 UART: [exit] Launching FMC @ 0x40000130
2,868,262 UART:
2,868,278 UART: Running Caliptra FMC ...
2,868,686 UART:
2,868,740 UART: [state] CFI Enabled
2,879,005 UART: [fht] FMC Alias Private Key: 7
2,987,026 UART: [art] Extend RT PCRs Done
2,987,454 UART: [art] Lock RT PCRs Done
2,989,210 UART: [art] Populate DV Done
2,997,287 UART: [fht] FMC Alias Private Key: 7
2,998,445 UART: [art] Derive CDI
2,998,725 UART: [art] Store in in slot 0x4
3,084,660 UART: [art] Derive Key Pair
3,085,020 UART: [art] Store priv key in slot 0x5
3,098,012 UART: [art] Derive Key Pair - Done
3,113,050 UART: [art] Signing Cert with AUTHO
3,113,530 UART: RITY.KEYID = 7
3,128,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,443 UART: [art] PUB.X = 9E35052ED113157F78A0BD4334AE4947EFCF9EEBB0CE4106ED263D07C19E24E3F443B2A814035C5361FB919851805F5A
3,136,205 UART: [art] PUB.Y = 2F75C6DBD2C365F1F4A8202B44FD8FD87FC72402482B387C775314AB3EC40D04D1659F5995BA540887ABFA31EA5203DA
3,143,148 UART: [art] SIG.R = 3152E191D8140ED08C92F578DEAFE4BFABDBAD9EBE5854813E66F5001A5DC7B9293777B8EB56C0C27617D00A22B4185B
3,149,902 UART: [art] SIG.S = B0B2EF3AFD4CDDB24E64C61435CFA719826296D22CFA4BEB7DC6E7D8F7FDAC347DCE43DE78AAA4559949B53CE519C1E2
3,174,149 UART: Caliptra RT
3,174,402 UART: [state] CFI Enabled
3,282,541 UART: [rt] RT listening for mailbox commands...
3,283,204 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,879 UART: [rt]cmd =0x46504c54, len=4
3,313,973 >>> mbox cmd response data (8 bytes)
3,314,246 UART: [rt] FIPS self test
3,314,574 UART: [kat] ++
3,314,726 UART: [kat] sha1
3,318,738 UART: [kat] SHA2-256
3,320,760 UART: [kat] SHA2-384
3,323,619 UART: [kat] SHA2-512-ACC
3,325,546 UART: [kat] ECC-384
3,335,456 UART: [kat] HMAC-384Kdf
3,336,616 UART: Fatal Error: 0x90030001
3,338,155 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,338,160 >>> mbox cmd response: failed
3,338,160 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,338,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,913 UART: [kat] SHA2-256
901,853 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,462 UART: [kat] HMAC-384Kdf
921,082 UART: [kat] LMS
1,169,394 UART: [kat] --
1,170,373 UART: [cold-reset] ++
1,170,925 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,174,835 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,651 UART: [idev] Erasing UDS.KEYID = 0
1,199,941 UART: [idev] Sha1 KeyId Algorithm
1,208,669 UART: [idev] --
1,209,866 UART: [ldev] ++
1,210,034 UART: [ldev] CDI.KEYID = 6
1,210,398 UART: [ldev] SUBJECT.KEYID = 5
1,210,825 UART: [ldev] AUTHORITY.KEYID = 7
1,211,288 UART: [ldev] FE.KEYID = 1
1,216,438 UART: [ldev] Erasing FE.KEYID = 1
1,242,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,728 UART: [ldev] --
1,282,072 UART: [fwproc] Wait for Commands...
1,282,793 UART: [fwproc] Recv command 0x46574c44
1,283,526 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,709 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,018 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,966 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,598 ready_for_fw is high
1,055,598 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,386 >>> mbox cmd response: success
2,693,322 UART:
2,693,338 UART: Running Caliptra FMC ...
2,693,746 UART:
2,693,800 UART: [state] CFI Enabled
2,704,529 UART: [fht] FMC Alias Private Key: 7
2,811,694 UART: [art] Extend RT PCRs Done
2,812,122 UART: [art] Lock RT PCRs Done
2,813,472 UART: [art] Populate DV Done
2,821,529 UART: [fht] FMC Alias Private Key: 7
2,822,553 UART: [art] Derive CDI
2,822,833 UART: [art] Store in in slot 0x4
2,908,242 UART: [art] Derive Key Pair
2,908,602 UART: [art] Store priv key in slot 0x5
2,921,794 UART: [art] Derive Key Pair - Done
2,936,563 UART: [art] Signing Cert with AUTHO
2,937,043 UART: RITY.KEYID = 7
2,952,231 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,996 UART: [art] PUB.X = 6B971A15D81272031EE6A35C0886BD523C3180415539DE3D766F1E20A1BBDD4E6767357240BAC7E28D9F0E76742619AA
2,959,755 UART: [art] PUB.Y = 8CAFE4554BFE8315BF85F4E0AADEDCB113D49944BC7708B33EFA1C1FBFADB0984715784F910164A70A7AB8F7EF596DA5
2,966,718 UART: [art] SIG.R = 893F2C6D8C7E2335B2288397F2DDDAF21A7F20262522F9414B5C964BBB9221366AAA083A4D588E3F36F26FEEDE9332FB
2,973,493 UART: [art] SIG.S = 6B0F35FD22189514A416D9C2FE5FBB8EDCC88B8153F63ACA03E03456F3CD87157CDD1573515ED2D6931B0B4C453B91C2
2,996,935 UART: Caliptra RT
2,997,188 UART: [state] CFI Enabled
3,105,073 UART: [rt] RT listening for mailbox commands...
3,105,736 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,729 UART: [rt]cmd =0x46504c54, len=4
3,136,697 >>> mbox cmd response data (8 bytes)
3,136,818 UART: [rt] FIPS self test
3,137,146 UART: [kat] ++
3,137,298 UART: [kat] sha1
3,141,642 UART: [kat] SHA2-256
3,143,664 UART: [kat] SHA2-384
3,146,531 UART: [kat] SHA2-512-ACC
3,148,458 UART: [kat] ECC-384
3,158,508 UART: [kat] HMAC-384Kdf
3,159,578 UART: Fatal Error: 0x90030001
3,161,117 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,161,122 >>> mbox cmd response: failed
3,161,122 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,161,127 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,488 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,314 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,946 UART: [kat] ++
896,098 UART: [kat] sha1
900,366 UART: [kat] SHA2-256
902,306 UART: [kat] SHA2-384
905,115 UART: [kat] SHA2-512-ACC
907,016 UART: [kat] ECC-384
916,745 UART: [kat] HMAC-384Kdf
921,231 UART: [kat] LMS
1,169,543 UART: [kat] --
1,170,490 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,928 UART: [idev] Erasing UDS.KEYID = 0
1,198,838 UART: [idev] Sha1 KeyId Algorithm
1,207,724 UART: [idev] --
1,208,833 UART: [ldev] ++
1,209,001 UART: [ldev] CDI.KEYID = 6
1,209,365 UART: [ldev] SUBJECT.KEYID = 5
1,209,792 UART: [ldev] AUTHORITY.KEYID = 7
1,210,255 UART: [ldev] FE.KEYID = 1
1,215,769 UART: [ldev] Erasing FE.KEYID = 1
1,241,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,815 UART: [ldev] --
1,281,271 UART: [fwproc] Wait for Commands...
1,281,902 UART: [fwproc] Recv command 0x46574c44
1,282,635 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,063 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,057 >>> mbox cmd response: success
2,783,310 UART: [afmc] ++
2,783,478 UART: [afmc] CDI.KEYID = 6
2,783,841 UART: [afmc] SUBJECT.KEYID = 7
2,784,267 UART: [afmc] AUTHORITY.KEYID = 5
2,819,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,745 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,357 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,076 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,857 UART: [afmc] --
2,862,807 UART: [cold-reset] --
2,863,509 UART: [state] Locking Datavault
2,864,862 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,466 UART: [state] Locking ICCM
2,865,924 UART: [exit] Launching FMC @ 0x40000130
2,871,253 UART:
2,871,269 UART: Running Caliptra FMC ...
2,871,677 UART:
2,871,820 UART: [state] CFI Enabled
2,882,581 UART: [fht] FMC Alias Private Key: 7
2,990,582 UART: [art] Extend RT PCRs Done
2,991,010 UART: [art] Lock RT PCRs Done
2,992,474 UART: [art] Populate DV Done
3,000,779 UART: [fht] FMC Alias Private Key: 7
3,001,853 UART: [art] Derive CDI
3,002,133 UART: [art] Store in in slot 0x4
3,088,036 UART: [art] Derive Key Pair
3,088,396 UART: [art] Store priv key in slot 0x5
3,102,428 UART: [art] Derive Key Pair - Done
3,117,275 UART: [art] Signing Cert with AUTHO
3,117,755 UART: RITY.KEYID = 7
3,133,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,870 UART: [art] PUB.X = F7EB386C37F09B345B8CE66408580EED9344C08F1A7A10753A0D6C09C5D60A1FFB38D21B22CD4CB813653AE5421C4FDA
3,140,637 UART: [art] PUB.Y = 0E44E93CA67FCC7F30B995C648236B2BFEF9755FB9D04C0110513A0834EAC56D9C68FDD4C91D6EEC1C852CDB623D9488
3,147,592 UART: [art] SIG.R = A0342607176BCA97A5DD0577BD090D3C93C88ADD69DFB5AEF2D9BAFF1E3E30CAB14697371EF414B2D3C56D6CCA3C04BF
3,154,371 UART: [art] SIG.S = 48F290A7E7EB6764DEE958795C99F794FAC9F76281BCA9AB9F805698933D5C11DB1837F9DEF2990BE091080660F9EDCF
3,178,413 UART: Caliptra RT
3,178,758 UART: [state] CFI Enabled
3,287,457 UART: [rt] RT listening for mailbox commands...
3,288,120 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,981 UART: [rt]cmd =0x46504c54, len=4
3,318,933 >>> mbox cmd response data (8 bytes)
3,319,228 UART: [rt] FIPS self test
3,319,556 UART: [kat] ++
3,319,708 UART: [kat] sha1
3,323,986 UART: [kat] SHA2-256
3,326,008 UART: [kat] SHA2-384
3,328,969 UART: [kat] SHA2-512-ACC
3,330,896 UART: [kat] ECC-384
3,340,920 UART: [kat] HMAC-384Kdf
3,341,836 UART: Fatal Error: 0x90030001
3,343,375 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,380 >>> mbox cmd response: failed
3,343,380 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,385 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,432 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
891,147 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
916,301 UART: [kat] HMAC-384Kdf
920,963 UART: [kat] LMS
1,169,275 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,173,066 UART: [idev] ++
1,173,234 UART: [idev] CDI.KEYID = 6
1,173,595 UART: [idev] SUBJECT.KEYID = 7
1,174,020 UART: [idev] UDS.KEYID = 0
1,174,366 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,066 UART: [idev] Erasing UDS.KEYID = 0
1,199,014 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,208,949 UART: [ldev] ++
1,209,117 UART: [ldev] CDI.KEYID = 6
1,209,481 UART: [ldev] SUBJECT.KEYID = 5
1,209,908 UART: [ldev] AUTHORITY.KEYID = 7
1,210,371 UART: [ldev] FE.KEYID = 1
1,215,427 UART: [ldev] Erasing FE.KEYID = 1
1,241,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,795 UART: [ldev] --
1,281,283 UART: [fwproc] Wait for Commands...
1,282,024 UART: [fwproc] Recv command 0x46574c44
1,282,757 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,458 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,767 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,681 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,163 ready_for_fw is high
1,056,163 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,931 >>> mbox cmd response: success
2,692,899 UART:
2,692,915 UART: Running Caliptra FMC ...
2,693,323 UART:
2,693,466 UART: [state] CFI Enabled
2,704,289 UART: [fht] FMC Alias Private Key: 7
2,811,952 UART: [art] Extend RT PCRs Done
2,812,380 UART: [art] Lock RT PCRs Done
2,813,532 UART: [art] Populate DV Done
2,821,525 UART: [fht] FMC Alias Private Key: 7
2,822,503 UART: [art] Derive CDI
2,822,783 UART: [art] Store in in slot 0x4
2,908,844 UART: [art] Derive Key Pair
2,909,204 UART: [art] Store priv key in slot 0x5
2,922,198 UART: [art] Derive Key Pair - Done
2,936,990 UART: [art] Signing Cert with AUTHO
2,937,470 UART: RITY.KEYID = 7
2,952,722 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,487 UART: [art] PUB.X = CC03021006D64636A047B1D112790F7E2D5C1D021E56EF7E13DCC0E4B45B31173E0607191E70FE56DEDAE7A2E02289A0
2,960,240 UART: [art] PUB.Y = E3D9AFB63F64BF543F8E1D4C036712C4986FFF8E44E390FFDEA2404389019801DB0CF7CCFE5901F2EBEA7F9489033DB1
2,967,188 UART: [art] SIG.R = 0DD6E495F20DFE9649DF1E226AF4849797740681257C347F8CDB5D32E48D5B920B3538970838B5B19A239B37991232A9
2,973,935 UART: [art] SIG.S = FCEBCC3A3B7A7CA2E542928E1E419A06C0C686832FBA3BA8EB9D7C053585E091404574779E5141496DDCCD94F71BCB15
2,997,894 UART: Caliptra RT
2,998,239 UART: [state] CFI Enabled
3,107,232 UART: [rt] RT listening for mailbox commands...
3,107,895 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,866 UART: [rt]cmd =0x46504c54, len=4
3,138,958 >>> mbox cmd response data (8 bytes)
3,139,075 UART: [rt] FIPS self test
3,139,403 UART: [kat] ++
3,139,555 UART: [kat] sha1
3,143,827 UART: [kat] SHA2-256
3,145,849 UART: [kat] SHA2-384
3,148,912 UART: [kat] SHA2-512-ACC
3,150,839 UART: [kat] ECC-384
3,161,013 UART: [kat] HMAC-384Kdf
3,161,983 UART: Fatal Error: 0x90030001
3,163,522 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,163,527 >>> mbox cmd response: failed
3,163,527 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,163,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,519 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,211 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
5,998,393 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,142,249 >>> mbox cmd response: failed
6,142,820 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,285,805 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
4,855,821 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,428,966 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,952 writing to cptra_bootfsm_go
6,006,102 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,149,840 >>> mbox cmd response: failed
6,150,430 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,293,491 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
4,872,931 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,477,289 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,512 writing to cptra_bootfsm_go
6,310,311 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,454,193 >>> mbox cmd response: failed
6,454,776 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,597,605 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
18,447,948 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,878,070 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
6,312,973 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,456,840 >>> mbox cmd response: failed
6,457,397 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
6,600,417 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
18,433,234 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
31,868,364 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
5,191,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,335,424 >>> mbox cmd response: failed
5,335,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,479,279 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,485,109 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,301,437 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
5,227,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,372,002 >>> mbox cmd response: failed
5,372,577 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,515,965 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,463,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,316,043 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
5,510,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,655,001 >>> mbox cmd response: failed
5,655,585 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,798,966 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
17,866,679 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,585,920 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
5,510,630 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,655,387 >>> mbox cmd response: failed
5,655,961 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,799,352 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
17,853,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,587,622 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
5,212,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,356,935 >>> mbox cmd response: failed
5,357,498 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,500,894 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,466,512 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,314,458 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
5,170,371 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,315,219 >>> mbox cmd response: failed
5,315,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,459,188 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,456,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,293,037 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
5,509,277 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,653,414 >>> mbox cmd response: failed
5,653,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,797,414 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,845,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,584,464 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,165 writing to cptra_bootfsm_go
5,509,941 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,654,411 >>> mbox cmd response: failed
5,654,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,798,377 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
17,868,639 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,577,082 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,114 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,122 >>> mbox cmd response: failed
827,122 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,128 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,581 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,083 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,574 >>> mbox cmd response: failed
827,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,041 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,333 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,609 >>> mbox cmd response: failed
827,609 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,615 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,874 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,683 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,691 >>> mbox cmd response: failed
827,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,152 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,474 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,386 >>> mbox cmd response: failed
827,386 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,525 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,047 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,760 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,768 >>> mbox cmd response: failed
827,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,774 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,007 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,397 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,313 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,321 >>> mbox cmd response: failed
827,321 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,582 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,665 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,673 >>> mbox cmd response: failed
827,673 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,166 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,890 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,004 >>> mbox cmd response: failed
827,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
827,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,059 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,059 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,708 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
826,716 >>> mbox cmd response: failed
826,716 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
826,722 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,091 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,063 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
828,553 >>> mbox cmd response: failed
828,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
828,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,560 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,748 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
828,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
828,141 >>> mbox cmd response: failed
828,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
828,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,474 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,647,392 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,375 UART:
192,744 UART: Running Caliptra ROM ...
193,882 UART:
194,027 UART: [state] CFI Enabled
264,567 UART: [state] LifecycleState = Unprovisioned
266,562 UART: [state] DebugLocked = No
268,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,957 UART: [kat] SHA2-256
443,688 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,153 UART: [kat] ++
454,600 UART: [kat] sha1
464,125 UART: [kat] SHA2-256
466,849 UART: [kat] SHA2-384
472,914 UART: [kat] SHA2-512-ACC
475,280 UART: [kat] ECC-384
2,767,999 UART: [kat] HMAC-384Kdf
2,780,239 UART: [kat] LMS
3,970,525 UART: [kat] --
3,975,550 UART: [cold-reset] ++
3,977,494 UART: [fht] Storing FHT @ 0x50003400
3,987,771 UART: [idev] ++
3,988,336 UART: [idev] CDI.KEYID = 6
3,989,365 UART: [idev] SUBJECT.KEYID = 7
3,990,545 UART: [idev] UDS.KEYID = 0
3,991,533 ready_for_fw is high
3,991,736 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,136,020 UART: [idev] Erasing UDS.KEYID = 0
7,326,869 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,922 UART: [idev] --
7,353,274 UART: [ldev] ++
7,353,997 UART: [ldev] CDI.KEYID = 6
7,354,947 UART: [ldev] SUBJECT.KEYID = 5
7,356,062 UART: [ldev] AUTHORITY.KEYID = 7
7,357,303 UART: [ldev] FE.KEYID = 1
7,405,220 UART: [ldev] Erasing FE.KEYID = 1
10,736,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,517 UART: [ldev] --
13,095,595 UART: [fwproc] Waiting for Commands...
13,097,532 UART: [fwproc] Received command 0x46574c44
13,099,721 UART: [fwproc] Received Image of size 114716 bytes
17,150,552 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,229,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,298,004 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,618,279 >>> mbox cmd response: success
17,622,167 UART: [afmc] ++
17,622,760 UART: [afmc] CDI.KEYID = 6
17,623,703 UART: [afmc] SUBJECT.KEYID = 7
17,624,973 UART: [afmc] AUTHORITY.KEYID = 5
20,994,064 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,291,352 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,293,660 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,308,060 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,864 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,337,336 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,359,877 UART: [afmc] --
23,363,347 UART: [cold-reset] --
23,368,564 UART: [state] Locking Datavault
23,372,198 UART: [state] Locking PCR0, PCR1 and PCR31
23,373,953 UART: [state] Locking ICCM
23,375,121 UART: [exit] Launching FMC @ 0x40000130
23,383,513 UART:
23,383,746 UART: Running Caliptra FMC ...
23,384,768 UART:
23,384,915 UART: [state] CFI Enabled
23,452,690 UART: [fht] FMC Alias Private Key: 7
25,790,487 UART: [art] Extend RT PCRs Done
25,791,717 UART: [art] Lock RT PCRs Done
25,792,935 UART: [art] Populate DV Done
25,798,517 UART: [fht] FMC Alias Private Key: 7
25,800,169 UART: [art] Derive CDI
25,800,989 UART: [art] Store in in slot 0x4
25,861,495 UART: [art] Derive Key Pair
25,862,536 UART: [art] Store priv key in slot 0x5
29,155,371 UART: [art] Derive Key Pair - Done
29,168,486 UART: [art] Signing Cert with AUTHO
29,169,806 UART: RITY.KEYID = 7
31,456,577 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,084 UART: [art] PUB.X = 89DA1F68055A6FFAB1659B66003322C0D79A9418B3786C94C671120954586E28F8F06F99F9EE941B6A34D7886F60B425
31,465,297 UART: [art] PUB.Y = 831950D598A5D5134A71185C8059DF7BE3F7E86B62E0D561FCA2E97C763DE4BB67599360E12CDB85CCCA0185D6A3CC85
31,472,542 UART: [art] SIG.R = 40E29E5E0C607B7FF70C10DEBED5CD36EE442D74D434926EAEAEABDB1D27843C8E11CE524552C8F1A2B041DDE2F13104
31,479,935 UART: [art] SIG.S = 2B552A936A0BCA2A141C577AE7F81D7DC7B11D431D8E849F27CEC39F94B695C628A7D4CBB1063D4B7F8375F2AA41EE02
32,785,059 UART: Caliptra RT
32,785,773 UART: [state] CFI Enabled
32,945,956 UART: [rt] RT listening for mailbox commands...
32,947,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,977,563 UART: [rt]cmd =0x46504c54, len=4
32,979,236 >>> mbox cmd response data (8 bytes)
32,980,529 UART: [rt] FIPS self test
32,981,475 UART: [kat] ++
32,981,925 UART: [kat] sha1
32,986,462 UART: [kat] SHA2-256
32,988,417 UART: [kat] SHA2-384
32,991,487 UART: [kat] SHA2-512-ACC
32,993,725 UART: [kat] ECC-384
36,263,168 UART: [kat] HMAC-384Kdf
36,272,969 UART: Fatal Error: 0x90030002
36,308,196 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,452,311 >>> mbox cmd response: failed
36,452,943 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,596,995 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,015 UART:
190,309 UART: Running Caliptra ROM ...
191,423 UART:
191,577 UART: [state] CFI Enabled
260,594 UART: [state] LifecycleState = Unprovisioned
262,531 UART: [state] DebugLocked = No
265,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,096 UART: [kat] SHA2-256
439,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,328 UART: [kat] ++
450,773 UART: [kat] sha1
462,189 UART: [kat] SHA2-256
464,874 UART: [kat] SHA2-384
471,561 UART: [kat] SHA2-512-ACC
473,899 UART: [kat] ECC-384
2,762,687 UART: [kat] HMAC-384Kdf
2,796,467 UART: [kat] LMS
3,986,773 UART: [kat] --
3,992,181 UART: [cold-reset] ++
3,993,413 UART: [fht] Storing FHT @ 0x50003400
4,004,739 UART: [idev] ++
4,005,327 UART: [idev] CDI.KEYID = 6
4,006,214 UART: [idev] SUBJECT.KEYID = 7
4,007,487 UART: [idev] UDS.KEYID = 0
4,009,041 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,153,288 UART: [idev] Erasing UDS.KEYID = 0
7,339,882 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,048 UART: [idev] --
7,365,102 UART: [ldev] ++
7,365,736 UART: [ldev] CDI.KEYID = 6
7,366,646 UART: [ldev] SUBJECT.KEYID = 5
7,367,866 UART: [ldev] AUTHORITY.KEYID = 7
7,369,158 UART: [ldev] FE.KEYID = 1
7,417,189 UART: [ldev] Erasing FE.KEYID = 1
10,751,237 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,859 UART: [ldev] --
13,130,476 UART: [fwproc] Waiting for Commands...
13,133,167 UART: [fwproc] Received command 0x46574c44
13,135,354 UART: [fwproc] Received Image of size 114716 bytes
17,191,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,222 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,658,188 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,783,738 ready_for_fw is high
3,784,120 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,858,183 >>> mbox cmd response: success
23,543,327 UART:
23,543,726 UART: Running Caliptra FMC ...
23,544,836 UART:
23,544,990 UART: [state] CFI Enabled
23,614,356 UART: [fht] FMC Alias Private Key: 7
25,951,942 UART: [art] Extend RT PCRs Done
25,953,163 UART: [art] Lock RT PCRs Done
25,954,953 UART: [art] Populate DV Done
25,960,636 UART: [fht] FMC Alias Private Key: 7
25,962,178 UART: [art] Derive CDI
25,963,011 UART: [art] Store in in slot 0x4
26,022,551 UART: [art] Derive Key Pair
26,023,600 UART: [art] Store priv key in slot 0x5
29,315,916 UART: [art] Derive Key Pair - Done
29,329,072 UART: [art] Signing Cert with AUTHO
29,330,382 UART: RITY.KEYID = 7
31,616,502 UART: [art] Erasing AUTHORITY.KEYID = 7
31,618,012 UART: [art] PUB.X = 6F1F8616E6F12725A7570AD40909A9370B5A20A6A7B4EAE3D99D811A67EA7FA268DFA9AC56E0ED2B49536E0B50179FDA
31,625,274 UART: [art] PUB.Y = AA6EF4A01C07BA48F67CCC9D672E39F03B17B6DA14B7E26574CA5DCEA0B71ACFBFD2C0A02E0D31B864E07303AE290454
31,632,570 UART: [art] SIG.R = E43D824EFF565DA233B07FAFE3A4B59E0BE2186ABBC73FF5CFEAC0FD0B3DABF7B8CE2ED96442CD7A0AAAFDA2836135B1
31,639,980 UART: [art] SIG.S = F8DE1400C14A7624676557936A1659236F785A472783C9FCDC70343BA5A1BAABE3CC13ED214F2E0EAF8114B72B6CCDA7
32,945,478 UART: Caliptra RT
32,946,180 UART: [state] CFI Enabled
33,127,266 UART: [rt] RT listening for mailbox commands...
33,129,122 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,159,006 UART: [rt]cmd =0x46504c54, len=4
33,160,665 >>> mbox cmd response data (8 bytes)
33,161,998 UART: [rt] FIPS self test
33,162,938 UART: [kat] ++
33,163,390 UART: [kat] sha1
33,167,899 UART: [kat] SHA2-256
33,169,828 UART: [kat] SHA2-384
33,172,906 UART: [kat] SHA2-512-ACC
33,175,157 UART: [kat] ECC-384
36,441,550 UART: [kat] HMAC-384Kdf
36,448,925 UART: Fatal Error: 0x90030002
36,484,312 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,628,294 >>> mbox cmd response: failed
36,628,869 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,772,866 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
3,781,988 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,861,882 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,236 writing to cptra_bootfsm_go
193,639 UART:
194,111 UART: Running Caliptra ROM ...
195,239 UART:
604,733 UART: [state] CFI Enabled
621,939 UART: [state] LifecycleState = Unprovisioned
623,887 UART: [state] DebugLocked = No
626,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,791 UART: [kat] SHA2-256
800,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,119 UART: [kat] ++
811,569 UART: [kat] sha1
822,728 UART: [kat] SHA2-256
825,452 UART: [kat] SHA2-384
832,319 UART: [kat] SHA2-512-ACC
834,690 UART: [kat] ECC-384
3,117,860 UART: [kat] HMAC-384Kdf
3,129,637 UART: [kat] LMS
4,319,721 UART: [kat] --
4,324,401 UART: [cold-reset] ++
4,325,804 UART: [fht] Storing FHT @ 0x50003400
4,337,793 UART: [idev] ++
4,338,374 UART: [idev] CDI.KEYID = 6
4,339,281 UART: [idev] SUBJECT.KEYID = 7
4,340,531 UART: [idev] UDS.KEYID = 0
4,341,585 ready_for_fw is high
4,341,820 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,486,016 UART: [idev] Erasing UDS.KEYID = 0
7,625,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,742 UART: [idev] --
7,652,780 UART: [ldev] ++
7,653,355 UART: [ldev] CDI.KEYID = 6
7,654,296 UART: [ldev] SUBJECT.KEYID = 5
7,655,509 UART: [ldev] AUTHORITY.KEYID = 7
7,656,799 UART: [ldev] FE.KEYID = 1
7,668,444 UART: [ldev] Erasing FE.KEYID = 1
10,954,312 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,280 UART: [ldev] --
13,314,514 UART: [fwproc] Waiting for Commands...
13,317,636 UART: [fwproc] Received command 0x46574c44
13,319,822 UART: [fwproc] Received Image of size 114716 bytes
17,381,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,459,614 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,528,488 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,848,703 >>> mbox cmd response: success
17,852,827 UART: [afmc] ++
17,853,412 UART: [afmc] CDI.KEYID = 6
17,854,296 UART: [afmc] SUBJECT.KEYID = 7
17,855,568 UART: [afmc] AUTHORITY.KEYID = 5
21,170,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,466,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,468,793 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,483,163 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,498,013 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,512,440 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,023 UART: [afmc] --
23,537,518 UART: [cold-reset] --
23,541,807 UART: [state] Locking Datavault
23,547,231 UART: [state] Locking PCR0, PCR1 and PCR31
23,548,988 UART: [state] Locking ICCM
23,551,433 UART: [exit] Launching FMC @ 0x40000130
23,559,819 UART:
23,560,052 UART: Running Caliptra FMC ...
23,561,091 UART:
23,561,241 UART: [state] CFI Enabled
23,569,021 UART: [fht] FMC Alias Private Key: 7
25,900,443 UART: [art] Extend RT PCRs Done
25,901,674 UART: [art] Lock RT PCRs Done
25,903,276 UART: [art] Populate DV Done
25,908,635 UART: [fht] FMC Alias Private Key: 7
25,910,277 UART: [art] Derive CDI
25,911,015 UART: [art] Store in in slot 0x4
25,953,720 UART: [art] Derive Key Pair
25,954,762 UART: [art] Store priv key in slot 0x5
29,197,329 UART: [art] Derive Key Pair - Done
29,210,601 UART: [art] Signing Cert with AUTHO
29,211,945 UART: RITY.KEYID = 7
31,491,804 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,309 UART: [art] PUB.X = E41F000AEEE362FEB3652D2C454477D32B1322D0C5050619441C4854536958B9A52AC89650E57662903FB84FB8F767BF
31,500,560 UART: [art] PUB.Y = CC57ABEF94FCAD93C1CB2718566623969158C9C74EBCB03B16872B52BBF892E72A86B9E413DAC154498C178C97357E86
31,507,793 UART: [art] SIG.R = DABD7EBAC30CC82973FC2FDE74E6F7F84496DD251854BC58CC199545CAA8B54775CF2DF5278F5738DCDC0A4A8CAB51C5
31,515,240 UART: [art] SIG.S = 155A0515844A8657C7AE09F17E187DF313B4E2BC65C80FB31238487E5AFA5B8FF3ED8AD6F1B18CEFAB4F1D961F14ACA4
32,820,568 UART: Caliptra RT
32,821,268 UART: [state] CFI Enabled
32,939,725 UART: [rt] RT listening for mailbox commands...
32,941,565 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,971,391 UART: [rt]cmd =0x46504c54, len=4
32,972,888 >>> mbox cmd response data (8 bytes)
32,973,909 UART: [rt] FIPS self test
32,974,789 UART: [kat] ++
32,975,256 UART: [kat] sha1
32,979,636 UART: [kat] SHA2-256
32,981,575 UART: [kat] SHA2-384
32,984,486 UART: [kat] SHA2-512-ACC
32,986,785 UART: [kat] ECC-384
36,229,691 UART: [kat] HMAC-384Kdf
36,235,328 UART: Fatal Error: 0x90030002
36,270,721 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,414,852 >>> mbox cmd response: failed
36,415,481 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,559,376 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
189,997 UART:
190,287 UART: Running Caliptra ROM ...
191,311 UART:
3,964,851 UART: [state] CFI Enabled
3,976,254 UART: [state] LifecycleState = Unprovisioned
3,978,218 UART: [state] DebugLocked = No
3,980,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,985,493 UART: [kat] SHA2-256
4,155,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,165,761 UART: [kat] ++
4,166,222 UART: [kat] sha1
4,177,271 UART: [kat] SHA2-256
4,180,012 UART: [kat] SHA2-384
4,186,049 UART: [kat] SHA2-512-ACC
4,188,406 UART: [kat] ECC-384
6,472,822 UART: [kat] HMAC-384Kdf
6,484,399 UART: [kat] LMS
7,674,471 UART: [kat] --
7,680,042 UART: [cold-reset] ++
7,681,680 UART: [fht] Storing FHT @ 0x50003400
7,693,501 UART: [idev] ++
7,694,087 UART: [idev] CDI.KEYID = 6
7,694,999 UART: [idev] SUBJECT.KEYID = 7
7,696,269 UART: [idev] UDS.KEYID = 0
7,697,776 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
7,842,101 UART: [idev] Erasing UDS.KEYID = 0
10,981,843 UART: [idev] Using Sha1 for KeyId Algorithm
11,003,979 UART: [idev] --
11,008,087 UART: [ldev] ++
11,008,662 UART: [ldev] CDI.KEYID = 6
11,009,685 UART: [ldev] SUBJECT.KEYID = 5
11,010,845 UART: [ldev] AUTHORITY.KEYID = 7
11,012,077 UART: [ldev] FE.KEYID = 1
11,023,100 UART: [ldev] Erasing FE.KEYID = 1
14,308,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,600,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,614,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,629,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,644,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,662,029 UART: [ldev] --
16,667,139 UART: [fwproc] Waiting for Commands...
16,669,453 UART: [fwproc] Received command 0x46574c44
16,671,636 UART: [fwproc] Received Image of size 114716 bytes
20,732,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,811,109 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,880,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
21,198,722 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,123,339 ready_for_fw is high
4,123,733 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,066,746 >>> mbox cmd response: success
23,712,390 UART:
23,712,816 UART: Running Caliptra FMC ...
23,713,941 UART:
23,714,101 UART: [state] CFI Enabled
23,721,795 UART: [fht] FMC Alias Private Key: 7
26,052,517 UART: [art] Extend RT PCRs Done
26,053,747 UART: [art] Lock RT PCRs Done
26,055,152 UART: [art] Populate DV Done
26,060,794 UART: [fht] FMC Alias Private Key: 7
26,062,448 UART: [art] Derive CDI
26,063,271 UART: [art] Store in in slot 0x4
26,105,446 UART: [art] Derive Key Pair
26,106,490 UART: [art] Store priv key in slot 0x5
29,348,385 UART: [art] Derive Key Pair - Done
29,361,767 UART: [art] Signing Cert with AUTHO
29,363,114 UART: RITY.KEYID = 7
31,642,573 UART: [art] Erasing AUTHORITY.KEYID = 7
31,644,087 UART: [art] PUB.X = 9862E68097A8F7F6D212F32C2CE34CE530DFBDF6C0E28C1F940DDB71055D3700619F3FE7BC4323B4E502F118C272EDF9
31,651,356 UART: [art] PUB.Y = ABBE068697ADE0726D71EA9A1C09251D5714D271B2448444402DF196ADF8136D372C02EF70CE3A93ED0B5A74630ED3B0
31,658,601 UART: [art] SIG.R = 32B6431A9B933C8C6B613A6137985AB16644B00093A01C9CA391DFBCCEC0AFB10CB59B3FC6ECBF8AACAD17FF96C2E4E4
31,665,945 UART: [art] SIG.S = 8334B87E25C186FB8FA88B26D82008D8B1C31E51D408C47FAF4C6643451D95F8DB7C4421AE4719E3171BFDFEF1894B92
32,970,867 UART: Caliptra RT
32,971,585 UART: [state] CFI Enabled
33,089,435 UART: [rt] RT listening for mailbox commands...
33,091,290 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,120,889 UART: [rt]cmd =0x46504c54, len=4
33,122,384 >>> mbox cmd response data (8 bytes)
33,123,395 UART: [rt] FIPS self test
33,124,342 UART: [kat] ++
33,124,790 UART: [kat] sha1
33,129,223 UART: [kat] SHA2-256
33,131,157 UART: [kat] SHA2-384
33,134,116 UART: [kat] SHA2-512-ACC
33,136,428 UART: [kat] ECC-384
36,379,167 UART: [kat] HMAC-384Kdf
36,384,644 UART: Fatal Error: 0x90030002
36,419,979 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,564,067 >>> mbox cmd response: failed
36,564,719 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
36,708,594 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
7,352,328 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
21,312,932 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,165 UART:
192,534 UART: Running Caliptra ROM ...
193,743 UART:
193,895 UART: [state] CFI Enabled
268,212 UART: [state] LifecycleState = Unprovisioned
270,125 UART: [state] DebugLocked = No
271,804 UART: [state] WD Timer not started. Device not locked for debugging
275,965 UART: [kat] SHA2-256
455,101 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
466,686 UART: [kat] ++
467,137 UART: [kat] sha1
478,083 UART: [kat] SHA2-256
481,174 UART: [kat] SHA2-384
486,381 UART: [kat] SHA2-512-ACC
489,388 UART: [kat] ECC-384
2,947,999 UART: [kat] HMAC-384Kdf
2,973,530 UART: [kat] LMS
3,502,969 UART: [kat] --
3,506,542 UART: [cold-reset] ++
3,507,479 UART: [fht] FHT @ 0x50003400
3,518,391 UART: [idev] ++
3,518,968 UART: [idev] CDI.KEYID = 6
3,519,852 UART: [idev] SUBJECT.KEYID = 7
3,521,103 UART: [idev] UDS.KEYID = 0
3,522,008 ready_for_fw is high
3,522,226 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,666,897 UART: [idev] Erasing UDS.KEYID = 0
6,026,602 UART: [idev] Sha1 KeyId Algorithm
6,049,932 UART: [idev] --
6,055,037 UART: [ldev] ++
6,055,621 UART: [ldev] CDI.KEYID = 6
6,056,504 UART: [ldev] SUBJECT.KEYID = 5
6,057,667 UART: [ldev] AUTHORITY.KEYID = 7
6,058,956 UART: [ldev] FE.KEYID = 1
6,102,448 UART: [ldev] Erasing FE.KEYID = 1
8,604,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,094 UART: [ldev] --
10,415,882 UART: [fwproc] Wait for Commands...
10,417,709 UART: [fwproc] Recv command 0x46574c44
10,419,763 UART: [fwproc] Recv'd Img size: 115032 bytes
13,828,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,856 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,966,667 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,286,208 >>> mbox cmd response: success
14,290,848 UART: [afmc] ++
14,291,445 UART: [afmc] CDI.KEYID = 6
14,292,331 UART: [afmc] SUBJECT.KEYID = 7
14,293,551 UART: [afmc] AUTHORITY.KEYID = 5
16,835,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,560,045 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,575,829 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,591,845 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,708 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,486 UART: [afmc] --
18,634,141 UART: [cold-reset] --
18,636,708 UART: [state] Locking Datavault
18,641,903 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,603 UART: [state] Locking ICCM
18,645,115 UART: [exit] Launching FMC @ 0x40000130
18,653,566 UART:
18,653,807 UART: Running Caliptra FMC ...
18,654,911 UART:
18,655,075 UART: [state] CFI Enabled
18,718,070 UART: [fht] FMC Alias Private Key: 7
20,481,957 UART: [art] Extend RT PCRs Done
20,483,179 UART: [art] Lock RT PCRs Done
20,484,566 UART: [art] Populate DV Done
20,489,923 UART: [fht] FMC Alias Private Key: 7
20,491,619 UART: [art] Derive CDI
20,492,355 UART: [art] Store in in slot 0x4
20,549,570 UART: [art] Derive Key Pair
20,550,612 UART: [art] Store priv key in slot 0x5
23,013,684 UART: [art] Derive Key Pair - Done
23,027,075 UART: [art] Signing Cert with AUTHO
23,028,387 UART: RITY.KEYID = 7
24,739,027 UART: [art] Erasing AUTHORITY.KEYID = 7
24,740,541 UART: [art] PUB.X = B9BDE0754CE962EE474D5501FDABB3701EC175506AF821D0A905E90DA0A6B206B17F932C1025EB7F786AAF27E4369A27
24,747,781 UART: [art] PUB.Y = 1A2786A49186121C846CB5594F602E7F5D789AD1D82E067FB2952C47A37FFF15F0CACC69E4F89611EA60D457C4D67997
24,755,054 UART: [art] SIG.R = 1050A49C3A80B32ED9EACA4FC26CB5280ECC09B65E3983B1A5166411E1905DF8660FFF79AC3EC85950F5458301F7340B
24,762,497 UART: [art] SIG.S = 7C1EE7B2AA40214B71D03538AC80FD11E05C0A663359CBFD98ACCAB930FE792FC297F099559BBD57EE6D6BEFC46518E6
25,741,729 UART: Caliptra RT
25,742,432 UART: [state] CFI Enabled
25,907,364 UART: [rt] RT listening for mailbox commands...
25,909,240 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,939,034 UART: [rt]cmd =0x46504c54, len=4
25,940,510 >>> mbox cmd response data (8 bytes)
25,941,583 UART: [rt] FIPS self test
25,942,522 UART: [kat] ++
25,942,966 UART: [kat] sha1
25,947,314 UART: [kat] SHA2-256
25,949,244 UART: [kat] SHA2-384
25,952,103 UART: [kat] SHA2-512-ACC
25,954,399 UART: [kat] ECC-384
28,392,119 UART: [kat] HMAC-384Kdf
28,398,682 UART: Fatal Error: 0x90030002
28,433,926 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,578,450 >>> mbox cmd response: failed
28,579,098 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,723,532 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,123 UART:
190,406 UART: Running Caliptra ROM ...
191,515 UART:
191,856 UART: [state] CFI Enabled
262,320 UART: [state] LifecycleState = Unprovisioned
264,192 UART: [state] DebugLocked = No
266,946 UART: [state] WD Timer not started. Device not locked for debugging
270,295 UART: [kat] SHA2-256
449,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,023 UART: [kat] ++
461,495 UART: [kat] sha1
472,210 UART: [kat] SHA2-256
475,266 UART: [kat] SHA2-384
482,536 UART: [kat] SHA2-512-ACC
485,468 UART: [kat] ECC-384
2,944,160 UART: [kat] HMAC-384Kdf
2,967,957 UART: [kat] LMS
3,497,429 UART: [kat] --
3,501,925 UART: [cold-reset] ++
3,504,300 UART: [fht] FHT @ 0x50003400
3,515,117 UART: [idev] ++
3,515,681 UART: [idev] CDI.KEYID = 6
3,516,589 UART: [idev] SUBJECT.KEYID = 7
3,517,807 UART: [idev] UDS.KEYID = 0
3,519,477 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,664,271 UART: [idev] Erasing UDS.KEYID = 0
6,021,842 UART: [idev] Sha1 KeyId Algorithm
6,045,129 UART: [idev] --
6,048,729 UART: [ldev] ++
6,049,312 UART: [ldev] CDI.KEYID = 6
6,050,232 UART: [ldev] SUBJECT.KEYID = 5
6,051,395 UART: [ldev] AUTHORITY.KEYID = 7
6,052,688 UART: [ldev] FE.KEYID = 1
6,096,282 UART: [ldev] Erasing FE.KEYID = 1
8,596,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,315,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,701 UART: [ldev] --
10,387,668 UART: [fwproc] Wait for Commands...
10,389,494 UART: [fwproc] Recv command 0x46574c44
10,391,561 UART: [fwproc] Recv'd Img size: 115032 bytes
13,800,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,876,717 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,945,484 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,266,285 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
3,382,121 ready_for_fw is high
3,382,535 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,101,026 >>> mbox cmd response: success
18,412,637 UART:
18,413,033 UART: Running Caliptra FMC ...
18,414,144 UART:
18,414,299 UART: [state] CFI Enabled
18,478,177 UART: [fht] FMC Alias Private Key: 7
20,241,640 UART: [art] Extend RT PCRs Done
20,242,865 UART: [art] Lock RT PCRs Done
20,244,530 UART: [art] Populate DV Done
20,250,244 UART: [fht] FMC Alias Private Key: 7
20,251,837 UART: [art] Derive CDI
20,252,570 UART: [art] Store in in slot 0x4
20,310,706 UART: [art] Derive Key Pair
20,311,710 UART: [art] Store priv key in slot 0x5
22,774,863 UART: [art] Derive Key Pair - Done
22,788,077 UART: [art] Signing Cert with AUTHO
22,789,383 UART: RITY.KEYID = 7
24,501,218 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,729 UART: [art] PUB.X = F9B9850EE3520020687A2262155CF8B8BE37248402A0CC3242EA0CF2F23D9DAE9684C11FBE7AF45366B59447D882B341
24,509,991 UART: [art] PUB.Y = 767DB514F4386FED47F3D136288EEC86883BB953AD189EDABCBFA1CEA4BFBFFAA79134428C147FE88AC47DAF4F97D447
24,517,258 UART: [art] SIG.R = 29CCC55C2958A0914031F0FA25152E4DC0F0A39107000F0BF291ED52E85D8E048A456E54AD1F7C7651E6BC0D62DBEB2C
24,524,654 UART: [art] SIG.S = 59A5AEA5BD0F399B624B7E494C65D3F7FB61C7E92CA407D07E11F4700C1B2BB43DBA6BF13A2CF75507B51BA5F417C407
25,503,392 UART: Caliptra RT
25,504,109 UART: [state] CFI Enabled
25,668,366 UART: [rt] RT listening for mailbox commands...
25,670,217 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,700,046 UART: [rt]cmd =0x46504c54, len=4
25,701,771 >>> mbox cmd response data (8 bytes)
25,703,115 UART: [rt] FIPS self test
25,704,060 UART: [kat] ++
25,704,513 UART: [kat] sha1
25,709,186 UART: [kat] SHA2-256
25,711,123 UART: [kat] SHA2-384
25,713,976 UART: [kat] SHA2-512-ACC
25,716,267 UART: [kat] ECC-384
28,154,041 UART: [kat] HMAC-384Kdf
28,180,180 UART: Fatal Error: 0x90030002
28,215,444 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,359,979 >>> mbox cmd response: failed
28,360,591 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,505,047 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
3,376,757 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,078,484 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,581 UART:
192,950 UART: Running Caliptra ROM ...
194,179 UART:
603,802 UART: [state] CFI Enabled
614,764 UART: [state] LifecycleState = Unprovisioned
616,644 UART: [state] DebugLocked = No
618,105 UART: [state] WD Timer not started. Device not locked for debugging
622,079 UART: [kat] SHA2-256
801,207 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,729 UART: [kat] ++
813,258 UART: [kat] sha1
824,568 UART: [kat] SHA2-256
827,550 UART: [kat] SHA2-384
832,066 UART: [kat] SHA2-512-ACC
835,084 UART: [kat] ECC-384
3,276,110 UART: [kat] HMAC-384Kdf
3,289,556 UART: [kat] LMS
3,819,081 UART: [kat] --
3,822,186 UART: [cold-reset] ++
3,824,406 UART: [fht] FHT @ 0x50003400
3,836,168 UART: [idev] ++
3,836,733 UART: [idev] CDI.KEYID = 6
3,837,641 UART: [idev] SUBJECT.KEYID = 7
3,838,817 UART: [idev] UDS.KEYID = 0
3,839,878 ready_for_fw is high
3,840,097 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,984,614 UART: [idev] Erasing UDS.KEYID = 0
6,315,656 UART: [idev] Sha1 KeyId Algorithm
6,338,444 UART: [idev] --
6,342,523 UART: [ldev] ++
6,343,099 UART: [ldev] CDI.KEYID = 6
6,344,015 UART: [ldev] SUBJECT.KEYID = 5
6,345,230 UART: [ldev] AUTHORITY.KEYID = 7
6,346,459 UART: [ldev] FE.KEYID = 1
6,355,776 UART: [ldev] Erasing FE.KEYID = 1
8,830,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,546,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,562,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,578,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,614,522 UART: [ldev] --
10,618,279 UART: [fwproc] Wait for Commands...
10,620,052 UART: [fwproc] Recv command 0x46574c44
10,622,097 UART: [fwproc] Recv'd Img size: 115032 bytes
14,032,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,838 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,171,643 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,492,436 >>> mbox cmd response: success
14,496,546 UART: [afmc] ++
14,497,153 UART: [afmc] CDI.KEYID = 6
14,498,061 UART: [afmc] SUBJECT.KEYID = 7
14,499,226 UART: [afmc] AUTHORITY.KEYID = 5
17,001,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,721,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,038 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,058 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,770,933 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,793,642 UART: [afmc] --
18,796,809 UART: [cold-reset] --
18,798,883 UART: [state] Locking Datavault
18,805,477 UART: [state] Locking PCR0, PCR1 and PCR31
18,807,173 UART: [state] Locking ICCM
18,808,669 UART: [exit] Launching FMC @ 0x40000130
18,817,063 UART:
18,817,349 UART: Running Caliptra FMC ...
18,818,483 UART:
18,818,641 UART: [state] CFI Enabled
18,826,690 UART: [fht] FMC Alias Private Key: 7
20,583,642 UART: [art] Extend RT PCRs Done
20,584,873 UART: [art] Lock RT PCRs Done
20,586,390 UART: [art] Populate DV Done
20,591,691 UART: [fht] FMC Alias Private Key: 7
20,593,388 UART: [art] Derive CDI
20,594,202 UART: [art] Store in in slot 0x4
20,636,901 UART: [art] Derive Key Pair
20,637,902 UART: [art] Store priv key in slot 0x5
23,064,662 UART: [art] Derive Key Pair - Done
23,078,040 UART: [art] Signing Cert with AUTHO
23,079,352 UART: RITY.KEYID = 7
24,784,932 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,436 UART: [art] PUB.X = 2D29ACA03E235E0545898804D0818DBB3F262707A54B40161860DBD47937C6EDF575508FFA4D37E43F77ED20EE6C992B
24,793,706 UART: [art] PUB.Y = 1101F7BE834E195E469263EEA593599DC1BEA7C01A9753F20B4BDDE49E6100FB96200496FD0143586C17464329CCDA5F
24,800,941 UART: [art] SIG.R = 5DF4779DFAB41766D77BD5D426F4FF6AF85058AD3FF905BA94B670EC37F3769E4497E35BAE8349DFCD7085B5D2425F23
24,808,339 UART: [art] SIG.S = 7720FA0CBA6DA2A7093ABBD938843B269130EAD5F4C2985ED12F035B40BF1C7FFF893B282682E70861760CD8717ADA5E
25,787,073 UART: Caliptra RT
25,787,773 UART: [state] CFI Enabled
25,906,411 UART: [rt] RT listening for mailbox commands...
25,908,264 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,938,202 UART: [rt]cmd =0x46504c54, len=4
25,939,723 >>> mbox cmd response data (8 bytes)
25,940,736 UART: [rt] FIPS self test
25,941,681 UART: [kat] ++
25,942,133 UART: [kat] sha1
25,946,346 UART: [kat] SHA2-256
25,948,281 UART: [kat] SHA2-384
25,951,077 UART: [kat] SHA2-512-ACC
25,953,316 UART: [kat] ECC-384
28,380,701 UART: [kat] HMAC-384Kdf
28,386,013 UART: Fatal Error: 0x90030002
28,421,392 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,565,741 >>> mbox cmd response: failed
28,566,340 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,710,736 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
189,996 UART:
190,280 UART: Running Caliptra ROM ...
191,306 UART:
11,828,899 UART: [state] CFI Enabled
11,840,786 UART: [state] LifecycleState = Unprovisioned
11,842,639 UART: [state] DebugLocked = No
11,844,186 UART: [state] WD Timer not started. Device not locked for debugging
11,848,194 UART: [kat] SHA2-256
12,027,324 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
12,038,859 UART: [kat] ++
12,039,413 UART: [kat] sha1
12,050,849 UART: [kat] SHA2-256
12,053,919 UART: [kat] SHA2-384
12,061,254 UART: [kat] SHA2-512-ACC
12,064,201 UART: [kat] ECC-384
14,505,063 UART: [kat] HMAC-384Kdf
14,518,321 UART: [kat] LMS
15,047,780 UART: [kat] --
15,052,041 UART: [cold-reset] ++
15,052,950 UART: [fht] FHT @ 0x50003400
15,063,796 UART: [idev] ++
15,064,360 UART: [idev] CDI.KEYID = 6
15,065,443 UART: [idev] SUBJECT.KEYID = 7
15,066,559 UART: [idev] UDS.KEYID = 0
15,068,104 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
15,212,362 UART: [idev] Erasing UDS.KEYID = 0
17,538,570 UART: [idev] Sha1 KeyId Algorithm
17,562,231 UART: [idev] --
17,565,765 UART: [ldev] ++
17,566,343 UART: [ldev] CDI.KEYID = 6
17,567,256 UART: [ldev] SUBJECT.KEYID = 5
17,568,416 UART: [ldev] AUTHORITY.KEYID = 7
17,569,648 UART: [ldev] FE.KEYID = 1
17,581,049 UART: [ldev] Erasing FE.KEYID = 1
20,049,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,768,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,785,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,800,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,816,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,835,822 UART: [ldev] --
21,840,842 UART: [fwproc] Wait for Commands...
21,842,406 UART: [fwproc] Recv command 0x46574c44
21,844,508 UART: [fwproc] Recv'd Img size: 115032 bytes
25,256,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,332,323 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,401,077 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,720,814 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,694,139 ready_for_fw is high
3,694,595 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,304,513 >>> mbox cmd response: success
18,552,145 UART:
18,552,544 UART: Running Caliptra FMC ...
18,553,662 UART:
18,553,814 UART: [state] CFI Enabled
18,561,790 UART: [fht] FMC Alias Private Key: 7
20,318,715 UART: [art] Extend RT PCRs Done
20,319,945 UART: [art] Lock RT PCRs Done
20,321,600 UART: [art] Populate DV Done
20,326,990 UART: [fht] FMC Alias Private Key: 7
20,328,585 UART: [art] Derive CDI
20,329,402 UART: [art] Store in in slot 0x4
20,372,152 UART: [art] Derive Key Pair
20,373,181 UART: [art] Store priv key in slot 0x5
22,800,157 UART: [art] Derive Key Pair - Done
22,813,255 UART: [art] Signing Cert with AUTHO
22,814,618 UART: RITY.KEYID = 7
24,519,873 UART: [art] Erasing AUTHORITY.KEYID = 7
24,521,361 UART: [art] PUB.X = 2DF7E3BDAD3B0D003929BB197DFE7F3D7C08573D663C525A8646A1C1439F4E3423F1C0814C1FFE1C1C316E683740E006
24,528,638 UART: [art] PUB.Y = 28A2231052B645221F444FF3D63A89D204CDBD851BB3265545FC5CA972C019C693959A5D73802805DB34F8FE404DA59E
24,535,867 UART: [art] SIG.R = 2A14D02621BD4EE705B2120D9CA8327C27FC4D045C8A25A8F3D2B01D249E6080D57A55ACE11B3CE0B0EBABE07498393B
24,543,320 UART: [art] SIG.S = 01B898003F2628EB2B2E0A33F12342E0703B82C8E1BF22086AFEBDDAB3465048E0FD954B6446AE0A46208578CAE48D3C
25,522,444 UART: Caliptra RT
25,523,159 UART: [state] CFI Enabled
25,640,681 UART: [rt] RT listening for mailbox commands...
25,642,533 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,672,150 UART: [rt]cmd =0x46504c54, len=4
25,673,728 >>> mbox cmd response data (8 bytes)
25,675,088 UART: [rt] FIPS self test
25,676,029 UART: [kat] ++
25,676,483 UART: [kat] sha1
25,680,994 UART: [kat] SHA2-256
25,682,922 UART: [kat] SHA2-384
25,685,783 UART: [kat] SHA2-512-ACC
25,688,076 UART: [kat] ECC-384
28,115,697 UART: [kat] HMAC-384Kdf
28,120,956 UART: Fatal Error: 0x90030002
28,156,201 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,300,662 >>> mbox cmd response: failed
28,301,269 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,445,655 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
15,187,014 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,769,831 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,232 UART:
192,603 UART: Running Caliptra ROM ...
193,711 UART:
193,854 UART: [state] CFI Enabled
263,329 UART: [state] LifecycleState = Unprovisioned
265,746 UART: [state] DebugLocked = No
267,770 UART: [state] WD Timer not started. Device not locked for debugging
273,170 UART: [kat] SHA2-256
463,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,786 UART: [kat] ++
474,234 UART: [kat] sha1
486,606 UART: [kat] SHA2-256
489,639 UART: [kat] SHA2-384
495,555 UART: [kat] SHA2-512-ACC
498,152 UART: [kat] ECC-384
2,947,092 UART: [kat] HMAC-384Kdf
2,973,289 UART: [kat] LMS
3,505,041 UART: [kat] --
3,509,828 UART: [cold-reset] ++
3,511,622 UART: [fht] FHT @ 0x50003400
3,522,602 UART: [idev] ++
3,523,320 UART: [idev] CDI.KEYID = 6
3,524,249 UART: [idev] SUBJECT.KEYID = 7
3,525,429 UART: [idev] UDS.KEYID = 0
3,526,360 ready_for_fw is high
3,526,589 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,671,339 UART: [idev] Erasing UDS.KEYID = 0
6,030,904 UART: [idev] Sha1 KeyId Algorithm
6,054,151 UART: [idev] --
6,059,123 UART: [ldev] ++
6,059,813 UART: [ldev] CDI.KEYID = 6
6,060,723 UART: [ldev] SUBJECT.KEYID = 5
6,061,946 UART: [ldev] AUTHORITY.KEYID = 7
6,063,130 UART: [ldev] FE.KEYID = 1
6,101,287 UART: [ldev] Erasing FE.KEYID = 1
8,609,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,092 UART: [ldev] --
10,413,972 UART: [fwproc] Wait for Commands...
10,416,028 UART: [fwproc] Recv command 0x46574c44
10,418,305 UART: [fwproc] Recv'd Img size: 115032 bytes
13,865,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,094 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,234 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,604,596 >>> mbox cmd response: success
14,608,463 UART: [afmc] ++
14,609,167 UART: [afmc] CDI.KEYID = 6
14,610,272 UART: [afmc] SUBJECT.KEYID = 7
14,611,819 UART: [afmc] AUTHORITY.KEYID = 5
17,151,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,873,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,875,265 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,890,514 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,905,623 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,920,623 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,785 UART: [afmc] --
18,948,541 UART: [cold-reset] --
18,951,392 UART: [state] Locking Datavault
18,956,705 UART: [state] Locking PCR0, PCR1 and PCR31
18,958,839 UART: [state] Locking ICCM
18,960,864 UART: [exit] Launching FMC @ 0x40000130
18,969,535 UART:
18,969,812 UART: Running Caliptra FMC ...
18,970,845 UART:
18,970,993 UART: [state] CFI Enabled
19,030,437 UART: [fht] FMC Alias Private Key: 7
20,794,958 UART: [art] Extend RT PCRs Done
20,796,182 UART: [art] Lock RT PCRs Done
20,797,832 UART: [art] Populate DV Done
20,803,302 UART: [fht] FMC Alias Private Key: 7
20,804,895 UART: [art] Derive CDI
20,805,633 UART: [art] Store in in slot 0x4
20,863,380 UART: [art] Derive Key Pair
20,864,443 UART: [art] Store priv key in slot 0x5
23,327,466 UART: [art] Derive Key Pair - Done
23,340,898 UART: [art] Signing Cert with AUTHO
23,342,210 UART: RITY.KEYID = 7
25,052,771 UART: [art] Erasing AUTHORITY.KEYID = 7
25,054,296 UART: [art] PUB.X = D951BCCA5AF7ED48BC960E44846F13B17195211DC4E773E28C28382EA42ABC77A5DD4AB33B1B758D0373F33028085361
25,061,529 UART: [art] PUB.Y = 2862CFDF1457D78D9935FF4CDFFFE8B219189450C44A5D82D8B60588FDCDBD0C37B6627D40D07805AE701CB4093791ED
25,068,791 UART: [art] SIG.R = 50A13580A150F62A36FC6941E5621736889EDB51153846B6B2326FDC8A2A38550170755831CCCB96CAECA97BE810F20A
25,076,210 UART: [art] SIG.S = BD0FF5117607233F086FC3BF7FE9AEDBEEF6FC96CFE54E074A80460963426885B67E43F3188802C3D9695DEA07EB13D3
26,055,477 UART: Caliptra RT
26,056,195 UART: [state] CFI Enabled
26,221,918 UART: [rt] RT listening for mailbox commands...
26,223,776 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,253,652 UART: [rt]cmd =0x46504c54, len=4
26,254,993 >>> mbox cmd response data (8 bytes)
26,256,329 UART: [rt] FIPS self test
26,257,290 UART: [kat] ++
26,257,742 UART: [kat] sha1
26,262,089 UART: [kat] SHA2-256
26,264,019 UART: [kat] SHA2-384
26,267,035 UART: [kat] SHA2-512-ACC
26,269,330 UART: [kat] ECC-384
28,706,660 UART: [kat] HMAC-384Kdf
28,733,505 UART: Fatal Error: 0x90030002
28,768,770 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,913,226 >>> mbox cmd response: failed
28,913,860 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,058,312 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,114 UART:
190,408 UART: Running Caliptra ROM ...
191,458 UART:
191,598 UART: [state] CFI Enabled
258,944 UART: [state] LifecycleState = Unprovisioned
261,302 UART: [state] DebugLocked = No
263,675 UART: [state] WD Timer not started. Device not locked for debugging
268,930 UART: [kat] SHA2-256
458,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,589 UART: [kat] ++
470,204 UART: [kat] sha1
481,866 UART: [kat] SHA2-256
484,883 UART: [kat] SHA2-384
489,573 UART: [kat] SHA2-512-ACC
492,132 UART: [kat] ECC-384
2,941,776 UART: [kat] HMAC-384Kdf
2,965,505 UART: [kat] LMS
3,497,277 UART: [kat] --
3,501,941 UART: [cold-reset] ++
3,504,044 UART: [fht] FHT @ 0x50003400
3,515,101 UART: [idev] ++
3,515,824 UART: [idev] CDI.KEYID = 6
3,516,799 UART: [idev] SUBJECT.KEYID = 7
3,517,964 UART: [idev] UDS.KEYID = 0
3,519,483 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,663,940 UART: [idev] Erasing UDS.KEYID = 0
6,022,998 UART: [idev] Sha1 KeyId Algorithm
6,045,812 UART: [idev] --
6,050,406 UART: [ldev] ++
6,051,093 UART: [ldev] CDI.KEYID = 6
6,051,984 UART: [ldev] SUBJECT.KEYID = 5
6,053,147 UART: [ldev] AUTHORITY.KEYID = 7
6,054,380 UART: [ldev] FE.KEYID = 1
6,094,318 UART: [ldev] Erasing FE.KEYID = 1
8,599,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,057 UART: [ldev] --
10,408,171 UART: [fwproc] Wait for Commands...
10,409,675 UART: [fwproc] Recv command 0x46574c44
10,411,997 UART: [fwproc] Recv'd Img size: 115032 bytes
13,865,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,520 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,696 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,606,846 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,437,747 ready_for_fw is high
3,438,166 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,723,815 >>> mbox cmd response: success
19,028,535 UART:
19,028,973 UART: Running Caliptra FMC ...
19,030,096 UART:
19,030,260 UART: [state] CFI Enabled
19,098,761 UART: [fht] FMC Alias Private Key: 7
20,862,807 UART: [art] Extend RT PCRs Done
20,864,032 UART: [art] Lock RT PCRs Done
20,865,663 UART: [art] Populate DV Done
20,871,354 UART: [fht] FMC Alias Private Key: 7
20,872,948 UART: [art] Derive CDI
20,873,765 UART: [art] Store in in slot 0x4
20,931,519 UART: [art] Derive Key Pair
20,932,564 UART: [art] Store priv key in slot 0x5
23,395,405 UART: [art] Derive Key Pair - Done
23,408,160 UART: [art] Signing Cert with AUTHO
23,409,463 UART: RITY.KEYID = 7
25,122,901 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,411 UART: [art] PUB.X = C276B390EA950DBD096C7C6D6E8412D2CC669F99A70C68F72D4BC26D7DE274D4AF60AD9F86E28629625C5F474BCE4BF7
25,131,671 UART: [art] PUB.Y = DBAEF8DF1C5091B8D850E0D98B0C078CAE8C520883BC14D1066FB21ABC3BAF9F2A9B0A120DBB63ABAEC2262598C408F9
25,138,981 UART: [art] SIG.R = 489CBAEE875C47B8808736D39F399422FD82C2007F5279CD9D4A7AAF30810EBE634F5A18F1B413DF29C23928110CD23A
25,146,366 UART: [art] SIG.S = 91A4AA97B8B035D1739F12B041355CC0AD6E417F85ACEC9B2ACCCD1EE64E74A22FA9DE80C4A79282A1BA6630957251C8
26,126,000 UART: Caliptra RT
26,126,718 UART: [state] CFI Enabled
26,291,282 UART: [rt] RT listening for mailbox commands...
26,293,139 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,322,601 UART: [rt]cmd =0x46504c54, len=4
26,324,073 >>> mbox cmd response data (8 bytes)
26,325,290 UART: [rt] FIPS self test
26,326,242 UART: [kat] ++
26,326,691 UART: [kat] sha1
26,331,106 UART: [kat] SHA2-256
26,332,991 UART: [kat] SHA2-384
26,336,008 UART: [kat] SHA2-512-ACC
26,338,263 UART: [kat] ECC-384
28,775,571 UART: [kat] HMAC-384Kdf
28,781,538 UART: Fatal Error: 0x90030002
28,816,763 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,961,293 >>> mbox cmd response: failed
28,961,954 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,106,412 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,435,746 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,751,754 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,505 UART:
192,883 UART: Running Caliptra ROM ...
194,082 UART:
603,535 UART: [state] CFI Enabled
618,057 UART: [state] LifecycleState = Unprovisioned
620,443 UART: [state] DebugLocked = No
622,191 UART: [state] WD Timer not started. Device not locked for debugging
627,161 UART: [kat] SHA2-256
817,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,810 UART: [kat] ++
828,417 UART: [kat] sha1
838,754 UART: [kat] SHA2-256
841,809 UART: [kat] SHA2-384
848,592 UART: [kat] SHA2-512-ACC
851,184 UART: [kat] ECC-384
3,293,045 UART: [kat] HMAC-384Kdf
3,305,740 UART: [kat] LMS
3,837,559 UART: [kat] --
3,841,059 UART: [cold-reset] ++
3,842,161 UART: [fht] FHT @ 0x50003400
3,853,216 UART: [idev] ++
3,853,938 UART: [idev] CDI.KEYID = 6
3,854,931 UART: [idev] SUBJECT.KEYID = 7
3,856,050 UART: [idev] UDS.KEYID = 0
3,857,109 ready_for_fw is high
3,857,341 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,001,846 UART: [idev] Erasing UDS.KEYID = 0
6,335,343 UART: [idev] Sha1 KeyId Algorithm
6,358,415 UART: [idev] --
6,363,901 UART: [ldev] ++
6,364,599 UART: [ldev] CDI.KEYID = 6
6,365,522 UART: [ldev] SUBJECT.KEYID = 5
6,366,686 UART: [ldev] AUTHORITY.KEYID = 7
6,367,925 UART: [ldev] FE.KEYID = 1
6,377,981 UART: [ldev] Erasing FE.KEYID = 1
8,855,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,474 UART: [ldev] --
10,647,580 UART: [fwproc] Wait for Commands...
10,650,279 UART: [fwproc] Recv command 0x46574c44
10,652,602 UART: [fwproc] Recv'd Img size: 115032 bytes
14,106,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,005 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,144 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,847,852 >>> mbox cmd response: success
14,851,381 UART: [afmc] ++
14,852,034 UART: [afmc] CDI.KEYID = 6
14,853,277 UART: [afmc] SUBJECT.KEYID = 7
14,854,733 UART: [afmc] AUTHORITY.KEYID = 5
17,359,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,582 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,628 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,153,180 UART: [afmc] --
19,157,222 UART: [cold-reset] --
19,163,017 UART: [state] Locking Datavault
19,168,282 UART: [state] Locking PCR0, PCR1 and PCR31
19,170,420 UART: [state] Locking ICCM
19,171,983 UART: [exit] Launching FMC @ 0x40000130
19,180,657 UART:
19,180,902 UART: Running Caliptra FMC ...
19,182,008 UART:
19,182,196 UART: [state] CFI Enabled
19,190,193 UART: [fht] FMC Alias Private Key: 7
20,947,154 UART: [art] Extend RT PCRs Done
20,948,377 UART: [art] Lock RT PCRs Done
20,950,328 UART: [art] Populate DV Done
20,955,741 UART: [fht] FMC Alias Private Key: 7
20,957,335 UART: [art] Derive CDI
20,958,150 UART: [art] Store in in slot 0x4
21,000,750 UART: [art] Derive Key Pair
21,001,798 UART: [art] Store priv key in slot 0x5
23,428,403 UART: [art] Derive Key Pair - Done
23,441,292 UART: [art] Signing Cert with AUTHO
23,442,603 UART: RITY.KEYID = 7
25,147,994 UART: [art] Erasing AUTHORITY.KEYID = 7
25,149,510 UART: [art] PUB.X = 53F9C105A5AFAA56C0A99F22E7BC097D0F30E73067053402071EF5143581063EB50424044D3022ECB584FAD10E2D9ECF
25,156,973 UART: [art] PUB.Y = 88BCE98C2FAAA2989C0CEAB3D42B21ACD864E857C62E284FC7D09DEAB1F44992386CE6C05966EC3A008C55FBE247607D
25,164,060 UART: [art] SIG.R = EFC85041DDF565794A55ACEA490EA0CC7FC825B733C1FA8013D4CF2AD1BBFF1B8AA9BF34E56FD8F99FFD7CB7580365B1
25,171,490 UART: [art] SIG.S = 37617639D934AB5A40884CA31E8DFBA498F8E52C716221B49F0179DE9855E6AE442FC0E5333773792BA0049AAF9F127C
26,150,562 UART: Caliptra RT
26,151,253 UART: [state] CFI Enabled
26,267,882 UART: [rt] RT listening for mailbox commands...
26,269,747 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,299,325 UART: [rt]cmd =0x46504c54, len=4
26,300,937 >>> mbox cmd response data (8 bytes)
26,301,900 UART: [rt] FIPS self test
26,302,846 UART: [kat] ++
26,303,296 UART: [kat] sha1
26,307,678 UART: [kat] SHA2-256
26,309,614 UART: [kat] SHA2-384
26,312,359 UART: [kat] SHA2-512-ACC
26,314,598 UART: [kat] ECC-384
28,741,906 UART: [kat] HMAC-384Kdf
28,747,398 UART: Fatal Error: 0x90030002
28,782,794 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,927,297 >>> mbox cmd response: failed
28,927,974 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,072,270 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,110 UART:
190,415 UART: Running Caliptra ROM ...
191,532 UART:
11,451,161 UART: [state] CFI Enabled
11,463,661 UART: [state] LifecycleState = Unprovisioned
11,466,035 UART: [state] DebugLocked = No
11,467,320 UART: [state] WD Timer not started. Device not locked for debugging
11,471,728 UART: [kat] SHA2-256
11,661,616 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,672,380 UART: [kat] ++
11,672,903 UART: [kat] sha1
11,684,436 UART: [kat] SHA2-256
11,687,438 UART: [kat] SHA2-384
11,694,293 UART: [kat] SHA2-512-ACC
11,696,861 UART: [kat] ECC-384
14,137,777 UART: [kat] HMAC-384Kdf
14,150,180 UART: [kat] LMS
14,681,997 UART: [kat] --
14,686,223 UART: [cold-reset] ++
14,688,711 UART: [fht] FHT @ 0x50003400
14,699,751 UART: [idev] ++
14,700,432 UART: [idev] CDI.KEYID = 6
14,701,450 UART: [idev] SUBJECT.KEYID = 7
14,702,556 UART: [idev] UDS.KEYID = 0
14,704,089 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,848,549 UART: [idev] Erasing UDS.KEYID = 0
17,181,004 UART: [idev] Sha1 KeyId Algorithm
17,202,485 UART: [idev] --
17,208,284 UART: [ldev] ++
17,209,003 UART: [ldev] CDI.KEYID = 6
17,209,925 UART: [ldev] SUBJECT.KEYID = 5
17,211,089 UART: [ldev] AUTHORITY.KEYID = 7
17,212,267 UART: [ldev] FE.KEYID = 1
17,223,886 UART: [ldev] Erasing FE.KEYID = 1
19,701,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,422,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,437,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,452,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,467,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,487,421 UART: [ldev] --
21,492,900 UART: [fwproc] Wait for Commands...
21,495,128 UART: [fwproc] Recv command 0x46574c44
21,497,447 UART: [fwproc] Recv'd Img size: 115032 bytes
24,950,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,031,390 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,147,503 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,694,437 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,752,734 ready_for_fw is high
3,753,301 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,967,107 >>> mbox cmd response: success
19,216,060 UART:
19,216,478 UART: Running Caliptra FMC ...
19,217,624 UART:
19,217,781 UART: [state] CFI Enabled
19,225,566 UART: [fht] FMC Alias Private Key: 7
20,982,600 UART: [art] Extend RT PCRs Done
20,983,826 UART: [art] Lock RT PCRs Done
20,985,445 UART: [art] Populate DV Done
20,990,874 UART: [fht] FMC Alias Private Key: 7
20,992,365 UART: [art] Derive CDI
20,993,130 UART: [art] Store in in slot 0x4
21,036,220 UART: [art] Derive Key Pair
21,037,267 UART: [art] Store priv key in slot 0x5
23,463,606 UART: [art] Derive Key Pair - Done
23,476,613 UART: [art] Signing Cert with AUTHO
23,477,923 UART: RITY.KEYID = 7
25,183,197 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,840 UART: [art] PUB.X = 7E5BB8E2F10619F0E2CC8862DDBA820F5C51BF6C9FDD40D71C765A205D9CAA55C8BE09AC5D36D231AAC5F88E6B3C5913
25,191,999 UART: [art] PUB.Y = 542806FB936F71540942ECE9229829CB93A018493E02AE9814670707A4FC1E70BC8AEC36186F8DEDE4BC7C4FBBB67A19
25,199,259 UART: [art] SIG.R = D6DD39678F743D42AD4F778EDC7852740017BA0DE9A4E720B88154B4917953C014BEA4349C25267D7FA6E68851E8C54E
25,206,665 UART: [art] SIG.S = 73191018B2DA6910DA926740A3A235BA3EEA48928EC62208EDC3FCDA13CD1FFDBDE079D669337E1042E2C768A4443FD3
26,185,893 UART: Caliptra RT
26,186,613 UART: [state] CFI Enabled
26,304,335 UART: [rt] RT listening for mailbox commands...
26,306,223 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,335,847 UART: [rt]cmd =0x46504c54, len=4
26,337,479 >>> mbox cmd response data (8 bytes)
26,338,795 UART: [rt] FIPS self test
26,339,737 UART: [kat] ++
26,340,185 UART: [kat] sha1
26,344,479 UART: [kat] SHA2-256
26,346,412 UART: [kat] SHA2-384
26,349,370 UART: [kat] SHA2-512-ACC
26,351,611 UART: [kat] ECC-384
28,779,527 UART: [kat] HMAC-384Kdf
28,784,908 UART: Fatal Error: 0x90030002
28,820,173 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,964,634 >>> mbox cmd response: failed
28,965,280 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,109,749 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
14,571,459 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,793,640 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,715 UART: [kat] SHA2-256
892,653 UART: [kat] SHA2-384
895,508 UART: [kat] SHA2-512-ACC
897,409 UART: [kat] ECC-384
902,908 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,779 UART: [cold-reset] ++
1,477,179 UART: [fht] Storing FHT @ 0x50003400
1,479,922 UART: [idev] ++
1,480,090 UART: [idev] CDI.KEYID = 6
1,480,450 UART: [idev] SUBJECT.KEYID = 7
1,480,874 UART: [idev] UDS.KEYID = 0
1,481,219 ready_for_fw is high
1,481,219 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,580 UART: [idev] Erasing UDS.KEYID = 0
1,504,916 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,897 UART: [ldev] ++
1,515,065 UART: [ldev] CDI.KEYID = 6
1,515,428 UART: [ldev] SUBJECT.KEYID = 5
1,515,854 UART: [ldev] AUTHORITY.KEYID = 7
1,516,317 UART: [ldev] FE.KEYID = 1
1,521,723 UART: [ldev] Erasing FE.KEYID = 1
1,547,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,016 UART: [ldev] --
1,586,339 UART: [fwproc] Waiting for Commands...
1,587,128 UART: [fwproc] Received command 0x46574c44
1,587,919 UART: [fwproc] Received Image of size 115032 bytes
2,893,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,386 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,679 >>> mbox cmd response: success
3,087,839 UART: [afmc] ++
3,088,007 UART: [afmc] CDI.KEYID = 6
3,088,369 UART: [afmc] SUBJECT.KEYID = 7
3,088,794 UART: [afmc] AUTHORITY.KEYID = 5
3,124,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,971 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,751 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,479 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,364 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,054 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,013 UART: [afmc] --
3,167,947 UART: [cold-reset] --
3,168,725 UART: [state] Locking Datavault
3,169,946 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,550 UART: [state] Locking ICCM
3,171,000 UART: [exit] Launching FMC @ 0x40000130
3,176,329 UART:
3,176,345 UART: Running Caliptra FMC ...
3,176,753 UART:
3,176,807 UART: [state] CFI Enabled
3,187,148 UART: [fht] FMC Alias Private Key: 7
3,295,381 UART: [art] Extend RT PCRs Done
3,295,809 UART: [art] Lock RT PCRs Done
3,297,051 UART: [art] Populate DV Done
3,305,202 UART: [fht] FMC Alias Private Key: 7
3,306,146 UART: [art] Derive CDI
3,306,426 UART: [art] Store in in slot 0x4
3,391,753 UART: [art] Derive Key Pair
3,392,113 UART: [art] Store priv key in slot 0x5
3,405,177 UART: [art] Derive Key Pair - Done
3,419,945 UART: [art] Signing Cert with AUTHO
3,420,425 UART: RITY.KEYID = 7
3,435,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,868 UART: [art] PUB.X = 6822EA59176BAA2F0FD6EB373CA48BCC12BA6D40D1C11F8207921A30DAB179A06A58EFA6EBA2BD5660AA700602CF3ADF
3,442,648 UART: [art] PUB.Y = 178FB8B3F8670630C7A7CAE576150248A0D7FA1B50EF9E157BD12A097C9B962F95B23948C0FE7B640EBD72D31EF49508
3,449,589 UART: [art] SIG.R = 928A04343F31B7571C87579C09D62B888AA94D6983E897C3CA330BD7E1F2D6E22022C25BAC8181E0A8504DCE3488DBAE
3,456,354 UART: [art] SIG.S = F2637E8EAD3DFDF943CB0AC050125244E4594D70746D99B9C4ACFCFB9C55F129F7E7505C2D68AD115EA642ED37DE2737
3,480,042 UART: Caliptra RT
3,480,295 UART: [state] CFI Enabled
3,587,581 UART: [rt] RT listening for mailbox commands...
3,588,244 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,115 UART: [rt]cmd =0x46504c54, len=4
3,619,225 >>> mbox cmd response data (8 bytes)
3,619,480 UART: [rt] FIPS self test
3,619,808 UART: [kat] ++
3,619,960 UART: [kat] sha1
3,624,234 UART: [kat] SHA2-256
3,626,256 UART: [kat] SHA2-384
3,629,349 UART: [kat] SHA2-512-ACC
3,631,276 UART: [kat] ECC-384
3,641,158 UART: [kat] HMAC-384Kdf
3,645,874 UART: Fatal Error: 0x90030002
3,647,413 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,647,418 >>> mbox cmd response: failed
3,647,418 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,647,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,379 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,251 UART: [kat] SHA2-256
892,189 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,212 UART: [kat] HMAC-384Kdf
906,772 UART: [kat] LMS
1,474,968 UART: [kat] --
1,475,975 UART: [cold-reset] ++
1,476,551 UART: [fht] Storing FHT @ 0x50003400
1,479,468 UART: [idev] ++
1,479,636 UART: [idev] CDI.KEYID = 6
1,479,996 UART: [idev] SUBJECT.KEYID = 7
1,480,420 UART: [idev] UDS.KEYID = 0
1,480,765 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,798 UART: [idev] Erasing UDS.KEYID = 0
1,505,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,010 UART: [idev] --
1,515,157 UART: [ldev] ++
1,515,325 UART: [ldev] CDI.KEYID = 6
1,515,688 UART: [ldev] SUBJECT.KEYID = 5
1,516,114 UART: [ldev] AUTHORITY.KEYID = 7
1,516,577 UART: [ldev] FE.KEYID = 1
1,521,643 UART: [ldev] Erasing FE.KEYID = 1
1,547,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,060 UART: [ldev] --
1,586,437 UART: [fwproc] Waiting for Commands...
1,587,086 UART: [fwproc] Received command 0x46574c44
1,587,877 UART: [fwproc] Received Image of size 115032 bytes
2,892,774 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,042 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,295 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,553 ready_for_fw is high
1,361,553 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,069 >>> mbox cmd response: success
2,997,269 UART:
2,997,285 UART: Running Caliptra FMC ...
2,997,693 UART:
2,997,747 UART: [state] CFI Enabled
3,008,336 UART: [fht] FMC Alias Private Key: 7
3,115,987 UART: [art] Extend RT PCRs Done
3,116,415 UART: [art] Lock RT PCRs Done
3,118,093 UART: [art] Populate DV Done
3,126,432 UART: [fht] FMC Alias Private Key: 7
3,127,374 UART: [art] Derive CDI
3,127,654 UART: [art] Store in in slot 0x4
3,213,647 UART: [art] Derive Key Pair
3,214,007 UART: [art] Store priv key in slot 0x5
3,227,003 UART: [art] Derive Key Pair - Done
3,241,740 UART: [art] Signing Cert with AUTHO
3,242,220 UART: RITY.KEYID = 7
3,257,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,403 UART: [art] PUB.X = 387375FD7571117029C95472BE62C0C369741F36AD570739B48AD06774B883E213CAD40263B646604F7E3ED555BAEEBC
3,265,163 UART: [art] PUB.Y = 5D1F3257FD8F08BE46C865DB718E854AD4FE3E445D21CB69C1D140730F2EE7D859EE62FB6DF74E4B372DDC020F8992E1
3,272,115 UART: [art] SIG.R = F469DA3703AA9FB85D9A2FCFD2B9428C14685F9260B4C59230DC5D4B2145860C2C891905AB9FD1BE093B510EC7FAB805
3,278,877 UART: [art] SIG.S = C2928332AA99DD821C93C3313E2B027B0E216EFB8844B177741F8DFC9083D24D153F9584C672060F9E976CB796D3AB22
3,302,940 UART: Caliptra RT
3,303,193 UART: [state] CFI Enabled
3,411,983 UART: [rt] RT listening for mailbox commands...
3,412,646 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,583 UART: [rt]cmd =0x46504c54, len=4
3,443,689 >>> mbox cmd response data (8 bytes)
3,443,932 UART: [rt] FIPS self test
3,444,260 UART: [kat] ++
3,444,412 UART: [kat] sha1
3,448,638 UART: [kat] SHA2-256
3,450,660 UART: [kat] SHA2-384
3,453,405 UART: [kat] SHA2-512-ACC
3,455,332 UART: [kat] ECC-384
3,465,654 UART: [kat] HMAC-384Kdf
3,470,276 UART: Fatal Error: 0x90030002
3,471,815 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,471,820 >>> mbox cmd response: failed
3,471,820 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,471,825 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,829 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,449 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,665 UART: [state] LifecycleState = Unprovisioned
86,320 UART: [state] DebugLocked = No
86,932 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,904 UART: [kat] SHA2-256
892,842 UART: [kat] SHA2-384
895,523 UART: [kat] SHA2-512-ACC
897,424 UART: [kat] ECC-384
903,103 UART: [kat] HMAC-384Kdf
907,775 UART: [kat] LMS
1,475,971 UART: [kat] --
1,476,858 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,041 UART: [idev] ++
1,480,209 UART: [idev] CDI.KEYID = 6
1,480,569 UART: [idev] SUBJECT.KEYID = 7
1,480,993 UART: [idev] UDS.KEYID = 0
1,481,338 ready_for_fw is high
1,481,338 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,349 UART: [idev] Erasing UDS.KEYID = 0
1,505,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,171 UART: [idev] --
1,515,206 UART: [ldev] ++
1,515,374 UART: [ldev] CDI.KEYID = 6
1,515,737 UART: [ldev] SUBJECT.KEYID = 5
1,516,163 UART: [ldev] AUTHORITY.KEYID = 7
1,516,626 UART: [ldev] FE.KEYID = 1
1,521,708 UART: [ldev] Erasing FE.KEYID = 1
1,546,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,333 UART: [ldev] --
1,585,628 UART: [fwproc] Waiting for Commands...
1,586,387 UART: [fwproc] Received command 0x46574c44
1,587,178 UART: [fwproc] Received Image of size 115032 bytes
2,893,361 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,479 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,678 >>> mbox cmd response: success
3,087,710 UART: [afmc] ++
3,087,878 UART: [afmc] CDI.KEYID = 6
3,088,240 UART: [afmc] SUBJECT.KEYID = 7
3,088,665 UART: [afmc] AUTHORITY.KEYID = 5
3,124,212 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,412 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,920 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,805 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,495 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,330 UART: [afmc] --
3,167,330 UART: [cold-reset] --
3,168,368 UART: [state] Locking Datavault
3,169,633 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,237 UART: [state] Locking ICCM
3,170,761 UART: [exit] Launching FMC @ 0x40000130
3,176,090 UART:
3,176,106 UART: Running Caliptra FMC ...
3,176,514 UART:
3,176,657 UART: [state] CFI Enabled
3,187,474 UART: [fht] FMC Alias Private Key: 7
3,295,453 UART: [art] Extend RT PCRs Done
3,295,881 UART: [art] Lock RT PCRs Done
3,297,489 UART: [art] Populate DV Done
3,305,762 UART: [fht] FMC Alias Private Key: 7
3,306,878 UART: [art] Derive CDI
3,307,158 UART: [art] Store in in slot 0x4
3,393,157 UART: [art] Derive Key Pair
3,393,517 UART: [art] Store priv key in slot 0x5
3,407,029 UART: [art] Derive Key Pair - Done
3,421,706 UART: [art] Signing Cert with AUTHO
3,422,186 UART: RITY.KEYID = 7
3,437,912 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,677 UART: [art] PUB.X = 113B0E9C2E17A9DE6F9BB7112085DA5B8DC67BDCA432E522930F81D48C38D543A8354121570E48A5019BC88ADD9FC52D
3,445,443 UART: [art] PUB.Y = 7C1590D02191A77E8F48783F778B6EAB975549B06DEFEF9E9E357044E0D65A050CE2712133E292A7BA8843C735D8BB79
3,452,387 UART: [art] SIG.R = ED307665BDBA1C71E800268D974900AAB3BCB372985279E5BAC47F684041BA9EEBEADE19557256C0C2F2735AD77D7BEA
3,459,127 UART: [art] SIG.S = BE498EBA3246BBA18F0583019AA907D02DD7CA064EFE31326108DDF0C8B0F626EEE7CC4DB2BE3B3864B11E670C4D8E0C
3,482,797 UART: Caliptra RT
3,483,142 UART: [state] CFI Enabled
3,592,138 UART: [rt] RT listening for mailbox commands...
3,592,801 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,824 UART: [rt]cmd =0x46504c54, len=4
3,623,978 >>> mbox cmd response data (8 bytes)
3,624,323 UART: [rt] FIPS self test
3,624,651 UART: [kat] ++
3,624,803 UART: [kat] sha1
3,629,191 UART: [kat] SHA2-256
3,631,213 UART: [kat] SHA2-384
3,633,906 UART: [kat] SHA2-512-ACC
3,635,833 UART: [kat] ECC-384
3,646,105 UART: [kat] HMAC-384Kdf
3,650,497 UART: Fatal Error: 0x90030002
3,652,036 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,652,041 >>> mbox cmd response: failed
3,652,041 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,652,046 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,333 UART: [state] LifecycleState = Unprovisioned
85,988 UART: [state] DebugLocked = No
86,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,980 UART: [kat] SHA2-256
881,911 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,026 UART: [kat] ++
886,178 UART: [kat] sha1
890,248 UART: [kat] SHA2-256
892,186 UART: [kat] SHA2-384
895,055 UART: [kat] SHA2-512-ACC
896,956 UART: [kat] ECC-384
902,461 UART: [kat] HMAC-384Kdf
907,069 UART: [kat] LMS
1,475,265 UART: [kat] --
1,475,888 UART: [cold-reset] ++
1,476,340 UART: [fht] Storing FHT @ 0x50003400
1,479,185 UART: [idev] ++
1,479,353 UART: [idev] CDI.KEYID = 6
1,479,713 UART: [idev] SUBJECT.KEYID = 7
1,480,137 UART: [idev] UDS.KEYID = 0
1,480,482 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,457 UART: [idev] Erasing UDS.KEYID = 0
1,505,619 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,207 UART: [idev] --
1,515,166 UART: [ldev] ++
1,515,334 UART: [ldev] CDI.KEYID = 6
1,515,697 UART: [ldev] SUBJECT.KEYID = 5
1,516,123 UART: [ldev] AUTHORITY.KEYID = 7
1,516,586 UART: [ldev] FE.KEYID = 1
1,521,940 UART: [ldev] Erasing FE.KEYID = 1
1,546,911 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,139 UART: [ldev] --
1,586,520 UART: [fwproc] Waiting for Commands...
1,587,361 UART: [fwproc] Received command 0x46574c44
1,588,152 UART: [fwproc] Received Image of size 115032 bytes
2,893,843 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,083 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,474 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 ready_for_fw is high
1,362,954 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,400 >>> mbox cmd response: success
3,000,152 UART:
3,000,168 UART: Running Caliptra FMC ...
3,000,576 UART:
3,000,719 UART: [state] CFI Enabled
3,010,976 UART: [fht] FMC Alias Private Key: 7
3,118,931 UART: [art] Extend RT PCRs Done
3,119,359 UART: [art] Lock RT PCRs Done
3,121,007 UART: [art] Populate DV Done
3,129,240 UART: [fht] FMC Alias Private Key: 7
3,130,360 UART: [art] Derive CDI
3,130,640 UART: [art] Store in in slot 0x4
3,216,379 UART: [art] Derive Key Pair
3,216,739 UART: [art] Store priv key in slot 0x5
3,229,149 UART: [art] Derive Key Pair - Done
3,244,152 UART: [art] Signing Cert with AUTHO
3,244,632 UART: RITY.KEYID = 7
3,259,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,743 UART: [art] PUB.X = 01E803FEE4BB747BF83635A7813E49BEDACD2F5EBFD0A7725CCD78DDA41BF2ED4772E1A99E2AF18FCB57CE7A81BDDD37
3,267,539 UART: [art] PUB.Y = 4DB9F35700FBEE795C52EA34407FDC2DA59B38CE6DE0C9E3A1965C09B793B89B655DE6E87B8205909B560CD9E6CD3FD4
3,274,474 UART: [art] SIG.R = 165B954B5691CD9FE06B44787AE0F25917D77FFE6CDC9C5E7647DAAA9FAF43380E3CBEDB3C6A0043A917C8497A270B1D
3,281,232 UART: [art] SIG.S = 07DFAA6E189925CA46951F1DC7C8A0580040D1894E220EFF42BBDB9DBF305DC9B3C37AE17B79EA32037CBCF477B571C8
3,304,424 UART: Caliptra RT
3,304,769 UART: [state] CFI Enabled
3,414,641 UART: [rt] RT listening for mailbox commands...
3,415,304 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,243 UART: [rt]cmd =0x46504c54, len=4
3,446,265 >>> mbox cmd response data (8 bytes)
3,446,396 UART: [rt] FIPS self test
3,446,724 UART: [kat] ++
3,446,876 UART: [kat] sha1
3,451,116 UART: [kat] SHA2-256
3,453,138 UART: [kat] SHA2-384
3,456,031 UART: [kat] SHA2-512-ACC
3,457,958 UART: [kat] ECC-384
3,468,004 UART: [kat] HMAC-384Kdf
3,472,584 UART: Fatal Error: 0x90030002
3,474,123 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,474,128 >>> mbox cmd response: failed
3,474,128 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,474,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,224 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,534 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,362 UART: [kat] SHA2-256
893,012 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,137 UART: [kat] ++
897,289 UART: [kat] sha1
901,381 UART: [kat] SHA2-256
903,321 UART: [kat] SHA2-384
906,108 UART: [kat] SHA2-512-ACC
908,009 UART: [kat] ECC-384
917,544 UART: [kat] HMAC-384Kdf
921,970 UART: [kat] LMS
1,170,298 UART: [kat] --
1,171,065 UART: [cold-reset] ++
1,171,473 UART: [fht] FHT @ 0x50003400
1,174,022 UART: [idev] ++
1,174,190 UART: [idev] CDI.KEYID = 6
1,174,550 UART: [idev] SUBJECT.KEYID = 7
1,174,974 UART: [idev] UDS.KEYID = 0
1,175,319 ready_for_fw is high
1,175,319 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,192 UART: [idev] Erasing UDS.KEYID = 0
1,200,249 UART: [idev] Sha1 KeyId Algorithm
1,208,703 UART: [idev] --
1,209,835 UART: [ldev] ++
1,210,003 UART: [ldev] CDI.KEYID = 6
1,210,366 UART: [ldev] SUBJECT.KEYID = 5
1,210,792 UART: [ldev] AUTHORITY.KEYID = 7
1,211,255 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,740 UART: [fwproc] Wait for Commands...
1,282,406 UART: [fwproc] Recv command 0x46574c44
1,283,134 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,479 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,783 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,604 >>> mbox cmd response: success
2,784,736 UART: [afmc] ++
2,784,904 UART: [afmc] CDI.KEYID = 6
2,785,266 UART: [afmc] SUBJECT.KEYID = 7
2,785,691 UART: [afmc] AUTHORITY.KEYID = 5
2,821,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,177 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,790 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,509 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,315 UART: [afmc] --
2,865,305 UART: [cold-reset] --
2,866,033 UART: [state] Locking Datavault
2,867,240 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,844 UART: [state] Locking ICCM
2,868,306 UART: [exit] Launching FMC @ 0x40000130
2,873,635 UART:
2,873,651 UART: Running Caliptra FMC ...
2,874,059 UART:
2,874,113 UART: [state] CFI Enabled
2,884,536 UART: [fht] FMC Alias Private Key: 7
2,992,017 UART: [art] Extend RT PCRs Done
2,992,445 UART: [art] Lock RT PCRs Done
2,994,207 UART: [art] Populate DV Done
3,002,364 UART: [fht] FMC Alias Private Key: 7
3,003,322 UART: [art] Derive CDI
3,003,602 UART: [art] Store in in slot 0x4
3,088,903 UART: [art] Derive Key Pair
3,089,263 UART: [art] Store priv key in slot 0x5
3,102,753 UART: [art] Derive Key Pair - Done
3,117,583 UART: [art] Signing Cert with AUTHO
3,118,063 UART: RITY.KEYID = 7
3,132,945 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,710 UART: [art] PUB.X = 2398E249896C33431EF6050502BA5AEEFF7DC71B380463604FEBF454BF1C61F2327827A053ED492CF5268AD73D9B70D1
3,140,470 UART: [art] PUB.Y = 3BDA964D496E7A3D45B0E0132EB1950338642EF8D6826A0097BE65E3D6C6B39DE95DD875F56DA029E4419F2BCE90B6FE
3,147,405 UART: [art] SIG.R = 5D6B5B1FA9973516C6F6FE6594530DE0213B4983EFC5753886282ADA10389927FC026DB6E7BF4D6D2CDC7D3DFE8F2F84
3,154,179 UART: [art] SIG.S = 379692C7B4296832FFB34B4FBEBA752912A3AF65A510C058DD8688E0D0B6512F1EC6BE74A60B4B61FD5B5A792D167A84
3,177,867 UART: Caliptra RT
3,178,120 UART: [state] CFI Enabled
3,285,721 UART: [rt] RT listening for mailbox commands...
3,286,384 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,185 UART: [rt]cmd =0x46504c54, len=4
3,317,543 >>> mbox cmd response data (8 bytes)
3,317,858 UART: [rt] FIPS self test
3,318,186 UART: [kat] ++
3,318,338 UART: [kat] sha1
3,322,504 UART: [kat] SHA2-256
3,324,526 UART: [kat] SHA2-384
3,327,545 UART: [kat] SHA2-512-ACC
3,329,472 UART: [kat] ECC-384
3,339,594 UART: [kat] HMAC-384Kdf
3,344,082 UART: Fatal Error: 0x90030002
3,345,621 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,345,626 >>> mbox cmd response: failed
3,345,626 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,345,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
893,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,593 UART: [kat] ++
897,745 UART: [kat] sha1
902,003 UART: [kat] SHA2-256
903,943 UART: [kat] SHA2-384
906,774 UART: [kat] SHA2-512-ACC
908,675 UART: [kat] ECC-384
918,150 UART: [kat] HMAC-384Kdf
922,612 UART: [kat] LMS
1,170,940 UART: [kat] --
1,171,727 UART: [cold-reset] ++
1,172,069 UART: [fht] FHT @ 0x50003400
1,174,798 UART: [idev] ++
1,174,966 UART: [idev] CDI.KEYID = 6
1,175,326 UART: [idev] SUBJECT.KEYID = 7
1,175,750 UART: [idev] UDS.KEYID = 0
1,176,095 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,722 UART: [idev] Erasing UDS.KEYID = 0
1,200,553 UART: [idev] Sha1 KeyId Algorithm
1,209,035 UART: [idev] --
1,210,029 UART: [ldev] ++
1,210,197 UART: [ldev] CDI.KEYID = 6
1,210,560 UART: [ldev] SUBJECT.KEYID = 5
1,210,986 UART: [ldev] AUTHORITY.KEYID = 7
1,211,449 UART: [ldev] FE.KEYID = 1
1,216,819 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,644 UART: [fwproc] Wait for Commands...
1,283,282 UART: [fwproc] Recv command 0x46574c44
1,284,010 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,057 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,852 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,097 ready_for_fw is high
1,059,097 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,039 >>> mbox cmd response: success
2,695,361 UART:
2,695,377 UART: Running Caliptra FMC ...
2,695,785 UART:
2,695,839 UART: [state] CFI Enabled
2,706,436 UART: [fht] FMC Alias Private Key: 7
2,814,553 UART: [art] Extend RT PCRs Done
2,814,981 UART: [art] Lock RT PCRs Done
2,816,755 UART: [art] Populate DV Done
2,824,738 UART: [fht] FMC Alias Private Key: 7
2,825,880 UART: [art] Derive CDI
2,826,160 UART: [art] Store in in slot 0x4
2,911,811 UART: [art] Derive Key Pair
2,912,171 UART: [art] Store priv key in slot 0x5
2,925,599 UART: [art] Derive Key Pair - Done
2,940,246 UART: [art] Signing Cert with AUTHO
2,940,726 UART: RITY.KEYID = 7
2,955,802 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,567 UART: [art] PUB.X = 8A2F456F78B93B1FACA022F8CF70799190AC43C5F7B690AF22774B9BD72A9AEE12856E31C33494F965108E597E2FA7D1
2,963,343 UART: [art] PUB.Y = AACDED3BAFE53EEF3450C205ADB73A55B91BF37F0527A2385DEF3BACFBA53237EE0E79A5E59EECA5C75ED5DBA2BD0E62
2,970,319 UART: [art] SIG.R = 6B6666FAC1C40248F941511C45DB0103E39AC833FE2C1E7114E2CB5BE39C924CE7BF9E3A9E980F869FCA84A8C77BC766
2,977,089 UART: [art] SIG.S = 18B66B3889F5D0B37932EC5B94507C7260D8E6AB9234B244B6C8C370A383ADD8A1FC500D424391AC8EA4A3F033A80BDE
3,001,592 UART: Caliptra RT
3,001,845 UART: [state] CFI Enabled
3,109,520 UART: [rt] RT listening for mailbox commands...
3,110,183 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,070 UART: [rt]cmd =0x46504c54, len=4
3,141,176 >>> mbox cmd response data (8 bytes)
3,141,535 UART: [rt] FIPS self test
3,141,863 UART: [kat] ++
3,142,015 UART: [kat] sha1
3,146,263 UART: [kat] SHA2-256
3,148,285 UART: [kat] SHA2-384
3,151,166 UART: [kat] SHA2-512-ACC
3,153,093 UART: [kat] ECC-384
3,163,537 UART: [kat] HMAC-384Kdf
3,168,313 UART: Fatal Error: 0x90030002
3,169,852 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,169,857 >>> mbox cmd response: failed
3,169,857 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,169,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,763 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,209 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
893,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,064 UART: [kat] ++
898,216 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,111 UART: [kat] SHA2-512-ACC
909,012 UART: [kat] ECC-384
918,667 UART: [kat] HMAC-384Kdf
923,253 UART: [kat] LMS
1,171,581 UART: [kat] --
1,172,440 UART: [cold-reset] ++
1,172,830 UART: [fht] FHT @ 0x50003400
1,175,499 UART: [idev] ++
1,175,667 UART: [idev] CDI.KEYID = 6
1,176,027 UART: [idev] SUBJECT.KEYID = 7
1,176,451 UART: [idev] UDS.KEYID = 0
1,176,796 ready_for_fw is high
1,176,796 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,255 UART: [idev] Erasing UDS.KEYID = 0
1,201,526 UART: [idev] Sha1 KeyId Algorithm
1,210,074 UART: [idev] --
1,211,106 UART: [ldev] ++
1,211,274 UART: [ldev] CDI.KEYID = 6
1,211,637 UART: [ldev] SUBJECT.KEYID = 5
1,212,063 UART: [ldev] AUTHORITY.KEYID = 7
1,212,526 UART: [ldev] FE.KEYID = 1
1,217,980 UART: [ldev] Erasing FE.KEYID = 1
1,244,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,076 UART: [ldev] --
1,283,469 UART: [fwproc] Wait for Commands...
1,284,279 UART: [fwproc] Recv command 0x46574c44
1,285,007 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,218 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,522 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,265 >>> mbox cmd response: success
2,784,471 UART: [afmc] ++
2,784,639 UART: [afmc] CDI.KEYID = 6
2,785,001 UART: [afmc] SUBJECT.KEYID = 7
2,785,426 UART: [afmc] AUTHORITY.KEYID = 5
2,820,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,571 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,290 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,062 UART: [afmc] --
2,863,980 UART: [cold-reset] --
2,864,552 UART: [state] Locking Datavault
2,865,797 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,401 UART: [state] Locking ICCM
2,866,889 UART: [exit] Launching FMC @ 0x40000130
2,872,218 UART:
2,872,234 UART: Running Caliptra FMC ...
2,872,642 UART:
2,872,785 UART: [state] CFI Enabled
2,883,452 UART: [fht] FMC Alias Private Key: 7
2,991,479 UART: [art] Extend RT PCRs Done
2,991,907 UART: [art] Lock RT PCRs Done
2,993,317 UART: [art] Populate DV Done
3,001,470 UART: [fht] FMC Alias Private Key: 7
3,002,448 UART: [art] Derive CDI
3,002,728 UART: [art] Store in in slot 0x4
3,088,613 UART: [art] Derive Key Pair
3,088,973 UART: [art] Store priv key in slot 0x5
3,101,865 UART: [art] Derive Key Pair - Done
3,116,973 UART: [art] Signing Cert with AUTHO
3,117,453 UART: RITY.KEYID = 7
3,132,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,080 UART: [art] PUB.X = B4DAC0869D97C7957A3F9D9B34A7B26C411679B643B9E1C2AC3EE768F367B8E251428B74B4DA6277E8577DF7FA0C58DA
3,139,857 UART: [art] PUB.Y = E9E5F11B721583E731BA320890CE4D1E3B016015051FA47BCD89759C948EE28DB7D74F3B806992CEEA0FB0BFCECAEE48
3,146,811 UART: [art] SIG.R = 819F0111B1E49E1F98A36139FFC184E9955F5BDCC085FBDAB7F572291E5E38078A3B16A9B2C192003586D85496C74FF7
3,153,555 UART: [art] SIG.S = 0445180B0DA74E370E30A11DAB0AD6CD0DEEC79593F9382D65589EA0C1DB71BBFACAD4D424951BB82985E3E5A701D4AE
3,177,407 UART: Caliptra RT
3,177,752 UART: [state] CFI Enabled
3,286,481 UART: [rt] RT listening for mailbox commands...
3,287,144 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,983 UART: [rt]cmd =0x46504c54, len=4
3,318,179 >>> mbox cmd response data (8 bytes)
3,318,316 UART: [rt] FIPS self test
3,318,644 UART: [kat] ++
3,318,796 UART: [kat] sha1
3,323,142 UART: [kat] SHA2-256
3,325,164 UART: [kat] SHA2-384
3,328,175 UART: [kat] SHA2-512-ACC
3,330,102 UART: [kat] ECC-384
3,340,192 UART: [kat] HMAC-384Kdf
3,344,870 UART: Fatal Error: 0x90030002
3,346,409 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,346,414 >>> mbox cmd response: failed
3,346,414 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,346,419 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
893,669 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,794 UART: [kat] ++
897,946 UART: [kat] sha1
902,092 UART: [kat] SHA2-256
904,032 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,603 UART: [kat] HMAC-384Kdf
923,155 UART: [kat] LMS
1,171,483 UART: [kat] --
1,172,450 UART: [cold-reset] ++
1,172,898 UART: [fht] FHT @ 0x50003400
1,175,425 UART: [idev] ++
1,175,593 UART: [idev] CDI.KEYID = 6
1,175,953 UART: [idev] SUBJECT.KEYID = 7
1,176,377 UART: [idev] UDS.KEYID = 0
1,176,722 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,343 UART: [idev] Erasing UDS.KEYID = 0
1,200,698 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,210,014 UART: [ldev] ++
1,210,182 UART: [ldev] CDI.KEYID = 6
1,210,545 UART: [ldev] SUBJECT.KEYID = 5
1,210,971 UART: [ldev] AUTHORITY.KEYID = 7
1,211,434 UART: [ldev] FE.KEYID = 1
1,216,686 UART: [ldev] Erasing FE.KEYID = 1
1,243,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,360 UART: [ldev] --
1,282,741 UART: [fwproc] Wait for Commands...
1,283,391 UART: [fwproc] Recv command 0x46574c44
1,284,119 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,338 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,642 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,523 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,600 ready_for_fw is high
1,060,600 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,547 >>> mbox cmd response: success
2,698,249 UART:
2,698,265 UART: Running Caliptra FMC ...
2,698,673 UART:
2,698,816 UART: [state] CFI Enabled
2,709,483 UART: [fht] FMC Alias Private Key: 7
2,817,626 UART: [art] Extend RT PCRs Done
2,818,054 UART: [art] Lock RT PCRs Done
2,819,616 UART: [art] Populate DV Done
2,827,689 UART: [fht] FMC Alias Private Key: 7
2,828,767 UART: [art] Derive CDI
2,829,047 UART: [art] Store in in slot 0x4
2,914,898 UART: [art] Derive Key Pair
2,915,258 UART: [art] Store priv key in slot 0x5
2,929,500 UART: [art] Derive Key Pair - Done
2,944,585 UART: [art] Signing Cert with AUTHO
2,945,065 UART: RITY.KEYID = 7
2,960,069 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,834 UART: [art] PUB.X = 173C6532AF3D822157F430842E87BFC1A8866F631CE9574624BA101E7AC4DE6AF37CFF3BF58BEC65D10790F9F53FD6A1
2,967,611 UART: [art] PUB.Y = 1FABEE1AF1D7262910F93220A959ABB579CA5502F33A99D757B5CCC99D39837DAB0198ABAE1602DA3CE9A1102FD4F308
2,974,563 UART: [art] SIG.R = 0D974583CBE2433FD892AC6913F26FA4C76109B055254066A9448124FF42FC701E20C8665BAAA2AD850F8D96F4D6D9C1
2,981,326 UART: [art] SIG.S = DDDE9972816651E98AD133B5DFFB75B0AA0D6F08A41BEEA0B95965F1A294333E0D8BFB46B68378E441ACB2346ABE48FF
3,005,296 UART: Caliptra RT
3,005,641 UART: [state] CFI Enabled
3,113,248 UART: [rt] RT listening for mailbox commands...
3,113,911 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,834 UART: [rt]cmd =0x46504c54, len=4
3,144,844 >>> mbox cmd response data (8 bytes)
3,145,099 UART: [rt] FIPS self test
3,145,427 UART: [kat] ++
3,145,579 UART: [kat] sha1
3,149,677 UART: [kat] SHA2-256
3,151,699 UART: [kat] SHA2-384
3,154,598 UART: [kat] SHA2-512-ACC
3,156,525 UART: [kat] ECC-384
3,166,833 UART: [kat] HMAC-384Kdf
3,171,381 UART: Fatal Error: 0x90030002
3,172,920 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,172,925 >>> mbox cmd response: failed
3,172,925 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,172,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,722 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,638,177 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,337 UART: [kat] ++
895,489 UART: [kat] sha1
899,803 UART: [kat] SHA2-256
901,743 UART: [kat] SHA2-384
904,418 UART: [kat] SHA2-512-ACC
906,319 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,170,039 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,203 UART: [idev] ++
1,173,371 UART: [idev] CDI.KEYID = 6
1,173,732 UART: [idev] SUBJECT.KEYID = 7
1,174,157 UART: [idev] UDS.KEYID = 0
1,174,503 ready_for_fw is high
1,174,503 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,989 UART: [idev] Erasing UDS.KEYID = 0
1,198,891 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,734 UART: [ldev] --
1,281,128 UART: [fwproc] Wait for Commands...
1,281,907 UART: [fwproc] Recv command 0x46574c44
1,282,640 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,804 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,766 >>> mbox cmd response: success
2,780,971 UART: [afmc] ++
2,781,139 UART: [afmc] CDI.KEYID = 6
2,781,502 UART: [afmc] SUBJECT.KEYID = 7
2,781,928 UART: [afmc] AUTHORITY.KEYID = 5
2,818,347 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,659 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,542 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,261 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,922 UART: [afmc] --
2,862,036 UART: [cold-reset] --
2,862,706 UART: [state] Locking Datavault
2,863,749 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,353 UART: [state] Locking ICCM
2,864,885 UART: [exit] Launching FMC @ 0x40000130
2,870,214 UART:
2,870,230 UART: Running Caliptra FMC ...
2,870,638 UART:
2,870,692 UART: [state] CFI Enabled
2,881,465 UART: [fht] FMC Alias Private Key: 7
2,989,776 UART: [art] Extend RT PCRs Done
2,990,204 UART: [art] Lock RT PCRs Done
2,991,732 UART: [art] Populate DV Done
2,999,839 UART: [fht] FMC Alias Private Key: 7
3,000,821 UART: [art] Derive CDI
3,001,101 UART: [art] Store in in slot 0x4
3,087,210 UART: [art] Derive Key Pair
3,087,570 UART: [art] Store priv key in slot 0x5
3,100,266 UART: [art] Derive Key Pair - Done
3,115,085 UART: [art] Signing Cert with AUTHO
3,115,565 UART: RITY.KEYID = 7
3,131,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,812 UART: [art] PUB.X = CD0A91B1621E0585C6FAE033F4AA67AD061DCC47DDA973CA6C056647603C97498C8403BA5D667DCA1A114BBA98A759CD
3,138,581 UART: [art] PUB.Y = 0450689692D4358A09BA5CC1B63307ED999E8F932B3E089401F1748A027FDDD4FE3A54828202722A99102EEF4E7792C4
3,145,504 UART: [art] SIG.R = 9C5F578DC80140A633AE30601241DC4436AFB86BFBD8CDC59622FE76E097BF636150CB6FFC72D34231EEBE9A3957DD2E
3,152,285 UART: [art] SIG.S = BD51332D27E67B4D8D489281CCCEC87740DDF9F13B2EB90CD25F3606B2C047A7F41DA5D9D24FFAEA15EAFECD211A1D41
3,176,056 UART: Caliptra RT
3,176,309 UART: [state] CFI Enabled
3,284,029 UART: [rt] RT listening for mailbox commands...
3,284,692 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,619 UART: [rt]cmd =0x46504c54, len=4
3,315,621 >>> mbox cmd response data (8 bytes)
3,315,746 UART: [rt] FIPS self test
3,316,074 UART: [kat] ++
3,316,226 UART: [kat] sha1
3,320,574 UART: [kat] SHA2-256
3,322,596 UART: [kat] SHA2-384
3,325,415 UART: [kat] SHA2-512-ACC
3,327,342 UART: [kat] ECC-384
3,337,534 UART: [kat] HMAC-384Kdf
3,342,144 UART: Fatal Error: 0x90030002
3,343,683 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,688 >>> mbox cmd response: failed
3,343,688 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,343,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,223 UART: [kat] ++
895,375 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,169,797 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,174,113 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,487 UART: [idev] Erasing UDS.KEYID = 0
1,198,331 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,234 UART: [ldev] ++
1,208,402 UART: [ldev] CDI.KEYID = 6
1,208,766 UART: [ldev] SUBJECT.KEYID = 5
1,209,193 UART: [ldev] AUTHORITY.KEYID = 7
1,209,656 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,240,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,810 UART: [ldev] --
1,280,158 UART: [fwproc] Wait for Commands...
1,280,915 UART: [fwproc] Recv command 0x46574c44
1,281,648 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,590 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,380 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,532 ready_for_fw is high
1,055,532 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,116 >>> mbox cmd response: success
2,692,330 UART:
2,692,346 UART: Running Caliptra FMC ...
2,692,754 UART:
2,692,808 UART: [state] CFI Enabled
2,703,557 UART: [fht] FMC Alias Private Key: 7
2,812,176 UART: [art] Extend RT PCRs Done
2,812,604 UART: [art] Lock RT PCRs Done
2,814,166 UART: [art] Populate DV Done
2,822,213 UART: [fht] FMC Alias Private Key: 7
2,823,333 UART: [art] Derive CDI
2,823,613 UART: [art] Store in in slot 0x4
2,909,420 UART: [art] Derive Key Pair
2,909,780 UART: [art] Store priv key in slot 0x5
2,922,580 UART: [art] Derive Key Pair - Done
2,937,159 UART: [art] Signing Cert with AUTHO
2,937,639 UART: RITY.KEYID = 7
2,952,817 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,582 UART: [art] PUB.X = 372F2D04372625A5EA6996E4737FB84EE616260047BD4F78114F517356BB564C7362AA799B2590FD801804FD3FA12994
2,960,314 UART: [art] PUB.Y = F78EE9DB3D7BF43412DE2EB2A0138539BAF1349C1EE75C1B0BCB3B8318CA747AB930681B6A946D15C0941DFE3452E3FB
2,967,277 UART: [art] SIG.R = 35DF5449402363EC003FBB4977CA779BA9957159E296C67597022427B08C960F067548A69C99FDEB0C3DB8C880DD04FD
2,974,008 UART: [art] SIG.S = 1F7EB08F4B10B4757586398F0FC53FD5A97677DA79EC0A49AA905302A51F1978950D8D0B3CDC2888FFB846383E897AB4
2,998,114 UART: Caliptra RT
2,998,367 UART: [state] CFI Enabled
3,107,066 UART: [rt] RT listening for mailbox commands...
3,107,729 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,640 UART: [rt]cmd =0x46504c54, len=4
3,138,708 >>> mbox cmd response data (8 bytes)
3,138,823 UART: [rt] FIPS self test
3,139,151 UART: [kat] ++
3,139,303 UART: [kat] sha1
3,143,461 UART: [kat] SHA2-256
3,145,483 UART: [kat] SHA2-384
3,148,362 UART: [kat] SHA2-512-ACC
3,150,289 UART: [kat] ECC-384
3,159,889 UART: [kat] HMAC-384Kdf
3,164,655 UART: Fatal Error: 0x90030002
3,166,194 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,166,199 >>> mbox cmd response: failed
3,166,199 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,166,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,594 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,486 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,386 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,800 UART: [kat] SHA2-256
901,740 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,155 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,894 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 ready_for_fw is high
1,174,220 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,538 UART: [idev] Erasing UDS.KEYID = 0
1,198,514 UART: [idev] Sha1 KeyId Algorithm
1,207,444 UART: [idev] --
1,208,553 UART: [ldev] ++
1,208,721 UART: [ldev] CDI.KEYID = 6
1,209,085 UART: [ldev] SUBJECT.KEYID = 5
1,209,512 UART: [ldev] AUTHORITY.KEYID = 7
1,209,975 UART: [ldev] FE.KEYID = 1
1,215,281 UART: [ldev] Erasing FE.KEYID = 1
1,242,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,329 UART: [ldev] --
1,281,775 UART: [fwproc] Wait for Commands...
1,282,352 UART: [fwproc] Recv command 0x46574c44
1,283,085 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,444 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,753 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,623 >>> mbox cmd response: success
2,782,844 UART: [afmc] ++
2,783,012 UART: [afmc] CDI.KEYID = 6
2,783,375 UART: [afmc] SUBJECT.KEYID = 7
2,783,801 UART: [afmc] AUTHORITY.KEYID = 5
2,819,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,943 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,672 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,555 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,274 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,985 UART: [afmc] --
2,862,895 UART: [cold-reset] --
2,863,827 UART: [state] Locking Datavault
2,865,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,772 UART: [state] Locking ICCM
2,866,222 UART: [exit] Launching FMC @ 0x40000130
2,871,551 UART:
2,871,567 UART: Running Caliptra FMC ...
2,871,975 UART:
2,872,118 UART: [state] CFI Enabled
2,882,591 UART: [fht] FMC Alias Private Key: 7
2,991,146 UART: [art] Extend RT PCRs Done
2,991,574 UART: [art] Lock RT PCRs Done
2,993,522 UART: [art] Populate DV Done
3,001,665 UART: [fht] FMC Alias Private Key: 7
3,002,673 UART: [art] Derive CDI
3,002,953 UART: [art] Store in in slot 0x4
3,088,886 UART: [art] Derive Key Pair
3,089,246 UART: [art] Store priv key in slot 0x5
3,102,302 UART: [art] Derive Key Pair - Done
3,117,294 UART: [art] Signing Cert with AUTHO
3,117,774 UART: RITY.KEYID = 7
3,132,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,673 UART: [art] PUB.X = 52DF9C3E79FFFC17AF20EDE203156A98C1DD80F7000BA35E6D69042131227E79E33432785B6D08178D69D85FDB89CD3E
3,140,415 UART: [art] PUB.Y = 2FAAA4C98681ACAC35FE0B768ECB525886AA0DFA6AF5B4585D0EBE703F6253100F14E40DECBCC28878B1B1681752767C
3,147,366 UART: [art] SIG.R = 439243ACD722960D4C8DB314F92B8682C577786F52FA4996590B6DB252EFA0F6A91B438762C6409CDC3AA7019A823B56
3,154,125 UART: [art] SIG.S = 95EC689A0BED2D8F04D552F8A42D5ACFA9E1F37A5B026AF4C246000E82FF33C6DA29CB8FF4B6797BEB211314D971AF37
3,178,276 UART: Caliptra RT
3,178,621 UART: [state] CFI Enabled
3,286,554 UART: [rt] RT listening for mailbox commands...
3,287,217 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,304 UART: [rt]cmd =0x46504c54, len=4
3,318,578 >>> mbox cmd response data (8 bytes)
3,318,733 UART: [rt] FIPS self test
3,319,061 UART: [kat] ++
3,319,213 UART: [kat] sha1
3,323,533 UART: [kat] SHA2-256
3,325,555 UART: [kat] SHA2-384
3,328,380 UART: [kat] SHA2-512-ACC
3,330,307 UART: [kat] ECC-384
3,340,073 UART: [kat] HMAC-384Kdf
3,344,703 UART: Fatal Error: 0x90030002
3,346,242 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,346,247 >>> mbox cmd response: failed
3,346,247 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,346,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,170,034 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,076 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,098 UART: [idev] --
1,209,083 UART: [ldev] ++
1,209,251 UART: [ldev] CDI.KEYID = 6
1,209,615 UART: [ldev] SUBJECT.KEYID = 5
1,210,042 UART: [ldev] AUTHORITY.KEYID = 7
1,210,505 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,241,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,487 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,645 UART: [ldev] --
1,281,079 UART: [fwproc] Wait for Commands...
1,281,748 UART: [fwproc] Recv command 0x46574c44
1,282,481 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,802 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,111 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,091 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,131 ready_for_fw is high
1,056,131 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,237 >>> mbox cmd response: success
2,694,913 UART:
2,694,929 UART: Running Caliptra FMC ...
2,695,337 UART:
2,695,480 UART: [state] CFI Enabled
2,706,107 UART: [fht] FMC Alias Private Key: 7
2,814,456 UART: [art] Extend RT PCRs Done
2,814,884 UART: [art] Lock RT PCRs Done
2,816,720 UART: [art] Populate DV Done
2,825,179 UART: [fht] FMC Alias Private Key: 7
2,826,129 UART: [art] Derive CDI
2,826,409 UART: [art] Store in in slot 0x4
2,912,712 UART: [art] Derive Key Pair
2,913,072 UART: [art] Store priv key in slot 0x5
2,925,824 UART: [art] Derive Key Pair - Done
2,941,169 UART: [art] Signing Cert with AUTHO
2,941,649 UART: RITY.KEYID = 7
2,956,621 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,386 UART: [art] PUB.X = B3583418839664D249E7AB0E39EC20BB33F4531ACE6BB2E498013CC93243EAFF0AA79621607C604054CD7ECDB6C38B7A
2,964,155 UART: [art] PUB.Y = E2257CFD374D92BF12253E3DCE53A478EB81DFF59D5ACF140831F7855E54442CC1F4C05A6E0AA38AEEC630F0D811C70A
2,971,112 UART: [art] SIG.R = 80435204E82DC6AF1DC0556493418A75B39DEF1D118D21D705405FC29829A68F45E9AFE682D11A0BE1213B6434382F4F
2,977,871 UART: [art] SIG.S = EFA2519F042DF06F28C0F4D9CEC3CAFEBAC487505808F5655A99A30E2CE5A165CE804365F345D3B2374BCF4FED0C44C7
3,001,236 UART: Caliptra RT
3,001,581 UART: [state] CFI Enabled
3,108,215 UART: [rt] RT listening for mailbox commands...
3,108,878 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,687 UART: [rt]cmd =0x46504c54, len=4
3,139,811 >>> mbox cmd response data (8 bytes)
3,140,084 UART: [rt] FIPS self test
3,140,412 UART: [kat] ++
3,140,564 UART: [kat] sha1
3,144,770 UART: [kat] SHA2-256
3,146,792 UART: [kat] SHA2-384
3,149,813 UART: [kat] SHA2-512-ACC
3,151,740 UART: [kat] ECC-384
3,162,280 UART: [kat] HMAC-384Kdf
3,166,736 UART: Fatal Error: 0x90030002
3,168,275 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,168,280 >>> mbox cmd response: failed
3,168,280 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,168,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,059 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,933 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
8,186,081 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,330,139 >>> mbox cmd response: failed
8,330,714 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,474,310 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
4,867,392 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,416,360 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
8,193,298 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,337,832 >>> mbox cmd response: failed
8,338,393 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,481,382 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
4,859,027 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,444,479 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
8,505,840 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,649,755 >>> mbox cmd response: failed
8,650,307 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,793,301 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
16,260,064 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
29,700,654 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
8,496,690 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,640,603 >>> mbox cmd response: failed
8,641,160 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
8,784,134 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
16,278,164 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
29,705,671 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
5,744,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,888,477 >>> mbox cmd response: failed
5,889,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,032,426 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,462,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,327,585 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
5,737,208 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,882,167 >>> mbox cmd response: failed
5,882,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,026,162 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,425,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,044 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,450 writing to cptra_bootfsm_go
6,073,703 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,218,459 >>> mbox cmd response: failed
6,219,018 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,362,404 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
17,296,438 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,014,488 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
6,061,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,207,418 >>> mbox cmd response: failed
6,208,844 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,352,705 >>> mbox cmd response: failed
Initializing fuses
1,055 writing to cptra_bootfsm_go
17,299,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,031,099 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,998 writing to cptra_bootfsm_go
5,745,481 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,890,028 >>> mbox cmd response: failed
5,890,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,033,984 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,430,808 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,243,484 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
5,742,291 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
5,886,538 >>> mbox cmd response: failed
5,887,106 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,030,487 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
3,444,144 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,276,842 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
6,069,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,213,492 >>> mbox cmd response: failed
6,214,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,357,354 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
17,303,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
28,024,930 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
6,059,788 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,204,046 >>> mbox cmd response: failed
6,204,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
6,348,017 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
17,291,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
27,989,716 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,740 >>> mbox cmd response: failed
1,097,740 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,746 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,059 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,541 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,238 >>> mbox cmd response: failed
1,098,238 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,207 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,909 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,957 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,965 >>> mbox cmd response: failed
1,098,965 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,214 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,284 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,843 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,851 >>> mbox cmd response: failed
1,097,851 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,832 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,647,402 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,102 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,110 >>> mbox cmd response: failed
1,098,110 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,601 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,791 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,834 >>> mbox cmd response: failed
1,097,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,847 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,181 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,535 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,543 >>> mbox cmd response: failed
1,097,543 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,549 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,896 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,565 >>> mbox cmd response: failed
1,097,565 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,571 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,496 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,890 >>> mbox cmd response: failed
1,097,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,895 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,090 >>> mbox cmd response: failed
1,098,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,096 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,393 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,288 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,097,853 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,861 >>> mbox cmd response: failed
1,097,861 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,097,867 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,190 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,808 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,098,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,197 >>> mbox cmd response: failed
1,098,197 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,098,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,900 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,266 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,274 UART:
192,643 UART: Running Caliptra ROM ...
193,836 UART:
193,995 UART: [state] CFI Enabled
262,611 UART: [state] LifecycleState = Unprovisioned
264,559 UART: [state] DebugLocked = No
266,957 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,194 UART: [kat] SHA2-256
441,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,382 UART: [kat] ++
452,829 UART: [kat] sha1
463,561 UART: [kat] SHA2-256
466,222 UART: [kat] SHA2-384
471,028 UART: [kat] SHA2-512-ACC
473,384 UART: [kat] ECC-384
2,767,258 UART: [kat] HMAC-384Kdf
2,801,626 UART: [kat] LMS
3,991,935 UART: [kat] --
3,996,939 UART: [cold-reset] ++
3,999,169 UART: [fht] Storing FHT @ 0x50003400
4,010,508 UART: [idev] ++
4,011,100 UART: [idev] CDI.KEYID = 6
4,012,016 UART: [idev] SUBJECT.KEYID = 7
4,013,277 UART: [idev] UDS.KEYID = 0
4,014,360 ready_for_fw is high
4,014,600 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,158,966 UART: [idev] Erasing UDS.KEYID = 0
7,345,812 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,950 UART: [idev] --
7,371,005 UART: [ldev] ++
7,371,590 UART: [ldev] CDI.KEYID = 6
7,372,529 UART: [ldev] SUBJECT.KEYID = 5
7,373,799 UART: [ldev] AUTHORITY.KEYID = 7
7,374,952 UART: [ldev] FE.KEYID = 1
7,421,331 UART: [ldev] Erasing FE.KEYID = 1
10,755,199 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,566 UART: [ldev] --
13,135,586 UART: [fwproc] Waiting for Commands...
13,137,734 UART: [fwproc] Received command 0x46574c44
13,139,920 UART: [fwproc] Received Image of size 114716 bytes
17,198,199 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,270,340 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,339,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,658,780 >>> mbox cmd response: success
17,662,810 UART: [afmc] ++
17,663,402 UART: [afmc] CDI.KEYID = 6
17,664,367 UART: [afmc] SUBJECT.KEYID = 7
17,665,582 UART: [afmc] AUTHORITY.KEYID = 5
21,029,053 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,325,417 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,327,729 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,342,105 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,356,953 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,371,391 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,393,039 UART: [afmc] --
23,396,420 UART: [cold-reset] --
23,399,793 UART: [state] Locking Datavault
23,404,281 UART: [state] Locking PCR0, PCR1 and PCR31
23,406,041 UART: [state] Locking ICCM
23,408,357 UART: [exit] Launching FMC @ 0x40000130
23,416,756 UART:
23,416,994 UART: Running Caliptra FMC ...
23,418,098 UART:
23,418,267 UART: [state] CFI Enabled
23,486,041 UART: [fht] FMC Alias Private Key: 7
25,824,911 UART: [art] Extend RT PCRs Done
25,826,136 UART: [art] Lock RT PCRs Done
25,828,057 UART: [art] Populate DV Done
25,833,540 UART: [fht] FMC Alias Private Key: 7
25,835,065 UART: [art] Derive CDI
25,835,842 UART: [art] Store in in slot 0x4
25,894,826 UART: [art] Derive Key Pair
25,895,827 UART: [art] Store priv key in slot 0x5
29,189,117 UART: [art] Derive Key Pair - Done
29,201,855 UART: [art] Signing Cert with AUTHO
29,203,198 UART: RITY.KEYID = 7
31,491,422 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,926 UART: [art] PUB.X = 4B642B94E2FA864DC5FAB1B4C16F55DD7630E36E1457E4E25D85842B9248AEF85EF82F060D530996892F2279C93E2E7F
31,500,138 UART: [art] PUB.Y = DD30AB9F40CF6781DF673F3FF2FAD4DAC5928B13785E5B66301712FB520F0BA400F02CA0D52B80762990F638DE9F4D18
31,507,377 UART: [art] SIG.R = EE40AAE6FC8C5D7E095B5403939EB733BC2BBAAC1EF47B58818B14A131822897AC750BEE62989BAB1254FA95A12D3B5D
31,514,809 UART: [art] SIG.S = 5D64B1E470BFB79B9A9CB73CD33DC0D0C4E1D9652E307434718E87CBD99168B6B6D4E455BCF8D8C09612E1367CD70BAB
32,819,946 UART: Caliptra RT
32,820,667 UART: [state] CFI Enabled
32,983,529 UART: [rt] RT listening for mailbox commands...
32,985,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,014,968 UART: [rt]cmd =0x46504c54, len=4
33,016,441 >>> mbox cmd response data (8 bytes)
33,017,629 UART: [rt] FIPS self test
33,018,581 UART: [kat] ++
33,019,033 UART: [kat] sha1
33,023,329 UART: [kat] SHA2-256
33,025,260 UART: [kat] SHA2-384
33,028,414 UART: [kat] SHA2-512-ACC
33,031,159 UART: [kat] ECC-384
36,297,311 UART: [kat] HMAC-384Kdf
36,304,949 UART: [kat] LMS
37,050,974 UART: Fatal Error: 0x90070002
37,086,265 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,230,717 >>> mbox cmd response: failed
37,231,362 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,375,533 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,092 UART:
190,391 UART: Running Caliptra ROM ...
191,418 UART:
191,558 UART: [state] CFI Enabled
260,043 UART: [state] LifecycleState = Unprovisioned
261,968 UART: [state] DebugLocked = No
263,212 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,426 UART: [kat] SHA2-256
438,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,633 UART: [kat] ++
449,189 UART: [kat] sha1
459,758 UART: [kat] SHA2-256
462,428 UART: [kat] SHA2-384
467,818 UART: [kat] SHA2-512-ACC
470,161 UART: [kat] ECC-384
2,761,883 UART: [kat] HMAC-384Kdf
2,788,127 UART: [kat] LMS
3,978,392 UART: [kat] --
3,983,864 UART: [cold-reset] ++
3,984,997 UART: [fht] Storing FHT @ 0x50003400
3,996,319 UART: [idev] ++
3,996,882 UART: [idev] CDI.KEYID = 6
3,997,844 UART: [idev] SUBJECT.KEYID = 7
3,999,114 UART: [idev] UDS.KEYID = 0
4,000,629 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,144,858 UART: [idev] Erasing UDS.KEYID = 0
7,335,453 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,538 UART: [idev] --
7,364,367 UART: [ldev] ++
7,364,934 UART: [ldev] CDI.KEYID = 6
7,365,908 UART: [ldev] SUBJECT.KEYID = 5
7,367,127 UART: [ldev] AUTHORITY.KEYID = 7
7,368,360 UART: [ldev] FE.KEYID = 1
7,408,931 UART: [ldev] Erasing FE.KEYID = 1
10,744,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,055,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,070,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,099,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,119,417 UART: [ldev] --
13,124,954 UART: [fwproc] Waiting for Commands...
13,127,002 UART: [fwproc] Received command 0x46574c44
13,129,217 UART: [fwproc] Received Image of size 114716 bytes
17,188,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,262,034 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,330,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,650,435 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,804,626 ready_for_fw is high
3,804,993 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,889,023 >>> mbox cmd response: success
23,571,813 UART:
23,572,208 UART: Running Caliptra FMC ...
23,573,355 UART:
23,573,521 UART: [state] CFI Enabled
23,640,496 UART: [fht] FMC Alias Private Key: 7
25,978,802 UART: [art] Extend RT PCRs Done
25,980,024 UART: [art] Lock RT PCRs Done
25,981,627 UART: [art] Populate DV Done
25,987,104 UART: [fht] FMC Alias Private Key: 7
25,988,703 UART: [art] Derive CDI
25,989,521 UART: [art] Store in in slot 0x4
26,051,266 UART: [art] Derive Key Pair
26,052,274 UART: [art] Store priv key in slot 0x5
29,345,908 UART: [art] Derive Key Pair - Done
29,359,236 UART: [art] Signing Cert with AUTHO
29,360,547 UART: RITY.KEYID = 7
31,647,942 UART: [art] Erasing AUTHORITY.KEYID = 7
31,649,451 UART: [art] PUB.X = 3F9F883C601ED35B1B14B7CAAE44B52891CF6ED6211CE7947538812B8F1B8B30B0E2CBB8594EEA340BEFEE45AB1BB37E
31,656,788 UART: [art] PUB.Y = D88805CE8499A5C2F6A7A1CF862B469DA002B5B761E911CCA773FB302D916EA166D30A8F393FCF5343A96E3C3D2B756E
31,664,002 UART: [art] SIG.R = A61E9F1614A4C56AD7CF509EE433AE3174F488D9389E769975A35F7CB299F2E2143E7DA5D1E54A87D596D05A69E69FFC
31,671,353 UART: [art] SIG.S = 02364A330C4E3AD23C031BFF39972C11F19CE645F8FFAE579D8FD8FF0DD09E21C3EBE625DFF78CC5AFD64264ABCEA274
32,976,573 UART: Caliptra RT
32,977,288 UART: [state] CFI Enabled
33,137,052 UART: [rt] RT listening for mailbox commands...
33,138,913 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,168,488 UART: [rt]cmd =0x46504c54, len=4
33,170,173 >>> mbox cmd response data (8 bytes)
33,171,181 UART: [rt] FIPS self test
33,172,122 UART: [kat] ++
33,172,593 UART: [kat] sha1
33,176,798 UART: [kat] SHA2-256
33,178,721 UART: [kat] SHA2-384
33,181,695 UART: [kat] SHA2-512-ACC
33,183,959 UART: [kat] ECC-384
36,452,291 UART: [kat] HMAC-384Kdf
36,460,368 UART: [kat] LMS
37,206,092 UART: Fatal Error: 0x90070002
37,241,329 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,385,521 >>> mbox cmd response: failed
37,386,184 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,530,242 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,803,201 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,869,111 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,490 UART:
192,869 UART: Running Caliptra ROM ...
194,009 UART:
603,833 UART: [state] CFI Enabled
620,067 UART: [state] LifecycleState = Unprovisioned
622,034 UART: [state] DebugLocked = No
624,781 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,355 UART: [kat] SHA2-256
800,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,619 UART: [kat] ++
811,225 UART: [kat] sha1
821,704 UART: [kat] SHA2-256
824,402 UART: [kat] SHA2-384
829,945 UART: [kat] SHA2-512-ACC
832,279 UART: [kat] ECC-384
3,115,850 UART: [kat] HMAC-384Kdf
3,126,734 UART: [kat] LMS
4,316,877 UART: [kat] --
4,322,010 UART: [cold-reset] ++
4,324,233 UART: [fht] Storing FHT @ 0x50003400
4,335,607 UART: [idev] ++
4,336,211 UART: [idev] CDI.KEYID = 6
4,337,127 UART: [idev] SUBJECT.KEYID = 7
4,338,307 UART: [idev] UDS.KEYID = 0
4,339,416 ready_for_fw is high
4,339,658 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,483,716 UART: [idev] Erasing UDS.KEYID = 0
7,623,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,395 UART: [idev] --
7,649,559 UART: [ldev] ++
7,650,129 UART: [ldev] CDI.KEYID = 6
7,651,113 UART: [ldev] SUBJECT.KEYID = 5
7,652,274 UART: [ldev] AUTHORITY.KEYID = 7
7,653,564 UART: [ldev] FE.KEYID = 1
7,664,427 UART: [ldev] Erasing FE.KEYID = 1
10,953,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,470 UART: [ldev] --
13,314,634 UART: [fwproc] Waiting for Commands...
13,316,519 UART: [fwproc] Received command 0x46574c44
13,318,707 UART: [fwproc] Received Image of size 114716 bytes
17,376,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,477 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,843,491 >>> mbox cmd response: success
17,846,870 UART: [afmc] ++
17,847,461 UART: [afmc] CDI.KEYID = 6
17,848,385 UART: [afmc] SUBJECT.KEYID = 7
17,849,656 UART: [afmc] AUTHORITY.KEYID = 5
21,166,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,464,347 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,466,600 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,995 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,825 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,510,289 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,531,318 UART: [afmc] --
23,534,538 UART: [cold-reset] --
23,538,712 UART: [state] Locking Datavault
23,545,108 UART: [state] Locking PCR0, PCR1 and PCR31
23,546,862 UART: [state] Locking ICCM
23,548,272 UART: [exit] Launching FMC @ 0x40000130
23,556,665 UART:
23,556,909 UART: Running Caliptra FMC ...
23,558,011 UART:
23,558,171 UART: [state] CFI Enabled
23,566,433 UART: [fht] FMC Alias Private Key: 7
25,897,105 UART: [art] Extend RT PCRs Done
25,898,337 UART: [art] Lock RT PCRs Done
25,900,150 UART: [art] Populate DV Done
25,905,724 UART: [fht] FMC Alias Private Key: 7
25,907,379 UART: [art] Derive CDI
25,908,197 UART: [art] Store in in slot 0x4
25,951,010 UART: [art] Derive Key Pair
25,952,052 UART: [art] Store priv key in slot 0x5
29,194,261 UART: [art] Derive Key Pair - Done
29,207,049 UART: [art] Signing Cert with AUTHO
29,208,380 UART: RITY.KEYID = 7
31,487,944 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,455 UART: [art] PUB.X = 62403A52CF9FB52F0CDB4978F81757D44EAAD7DF2941EF180096F2EF2DFD90CC0C94DCA34405F3DED664BA17D08769BE
31,496,703 UART: [art] PUB.Y = 6E805DD58CD740EA0168B4235D2F0BB41439C9CBF8D85C0DFA16B86D4144234B238B17BBDAF3A9B63252A109A4D9C729
31,503,940 UART: [art] SIG.R = A0DCDBFB3B739879C7CC7E07D3F168E838C75B7606438BC17D74CC67102A61821FA1FFBA7F57B831894CD2636A48059F
31,511,332 UART: [art] SIG.S = 01D13A1A29DF07FA2DC858049BEF0FD0F24725E03790384D23CAACCCDF6C0A8DCF924EABD78DDEDABD4613634812B5C3
32,816,155 UART: Caliptra RT
32,816,871 UART: [state] CFI Enabled
32,935,120 UART: [rt] RT listening for mailbox commands...
32,936,966 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,966,494 UART: [rt]cmd =0x46504c54, len=4
32,968,122 >>> mbox cmd response data (8 bytes)
32,969,690 UART: [rt] FIPS self test
32,970,631 UART: [kat] ++
32,971,078 UART: [kat] sha1
32,975,652 UART: [kat] SHA2-256
32,977,585 UART: [kat] SHA2-384
32,980,743 UART: [kat] SHA2-512-ACC
32,982,976 UART: [kat] ECC-384
36,226,025 UART: [kat] HMAC-384Kdf
36,231,987 UART: [kat] LMS
36,977,752 UART: Fatal Error: 0x90070002
37,012,960 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,157,070 >>> mbox cmd response: failed
37,157,655 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,301,640 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
189,996 UART:
190,290 UART: Running Caliptra ROM ...
191,313 UART:
3,224,465 UART: [state] CFI Enabled
3,241,648 UART: [state] LifecycleState = Unprovisioned
3,243,559 UART: [state] DebugLocked = No
3,245,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,250,170 UART: [kat] SHA2-256
3,419,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,430,433 UART: [kat] ++
3,430,924 UART: [kat] sha1
3,442,193 UART: [kat] SHA2-256
3,444,922 UART: [kat] SHA2-384
3,451,449 UART: [kat] SHA2-512-ACC
3,453,858 UART: [kat] ECC-384
5,737,984 UART: [kat] HMAC-384Kdf
5,750,108 UART: [kat] LMS
6,940,258 UART: [kat] --
6,943,945 UART: [cold-reset] ++
6,945,229 UART: [fht] Storing FHT @ 0x50003400
6,957,759 UART: [idev] ++
6,958,367 UART: [idev] CDI.KEYID = 6
6,959,254 UART: [idev] SUBJECT.KEYID = 7
6,960,524 UART: [idev] UDS.KEYID = 0
6,962,035 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
7,105,892 UART: [idev] Erasing UDS.KEYID = 0
10,250,283 UART: [idev] Using Sha1 for KeyId Algorithm
10,271,780 UART: [idev] --
10,275,669 UART: [ldev] ++
10,276,234 UART: [ldev] CDI.KEYID = 6
10,277,166 UART: [ldev] SUBJECT.KEYID = 5
10,278,377 UART: [ldev] AUTHORITY.KEYID = 7
10,279,662 UART: [ldev] FE.KEYID = 1
10,291,416 UART: [ldev] Erasing FE.KEYID = 1
13,579,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,872,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,887,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,902,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,916,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,935,546 UART: [ldev] --
15,939,782 UART: [fwproc] Waiting for Commands...
15,942,636 UART: [fwproc] Received command 0x46574c44
15,944,878 UART: [fwproc] Received Image of size 114716 bytes
20,012,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,085,200 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
20,154,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
20,473,145 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
4,127,023 ready_for_fw is high
4,127,439 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,076,483 >>> mbox cmd response: success
23,717,675 UART:
23,718,078 UART: Running Caliptra FMC ...
23,719,228 UART:
23,719,390 UART: [state] CFI Enabled
23,727,379 UART: [fht] FMC Alias Private Key: 7
26,058,276 UART: [art] Extend RT PCRs Done
26,059,516 UART: [art] Lock RT PCRs Done
26,061,156 UART: [art] Populate DV Done
26,066,546 UART: [fht] FMC Alias Private Key: 7
26,068,040 UART: [art] Derive CDI
26,068,810 UART: [art] Store in in slot 0x4
26,111,302 UART: [art] Derive Key Pair
26,112,341 UART: [art] Store priv key in slot 0x5
29,354,009 UART: [art] Derive Key Pair - Done
29,367,178 UART: [art] Signing Cert with AUTHO
29,368,496 UART: RITY.KEYID = 7
31,647,414 UART: [art] Erasing AUTHORITY.KEYID = 7
31,648,923 UART: [art] PUB.X = EB223462269419BF3692A6FE4BDA962AFEDCAAA486761614B19AFB960EAE973C689EAAAED46584F7213CA70591CE1BE8
31,656,189 UART: [art] PUB.Y = 627A835FF7CA66C3EE13361DA128DE6984183E299CF2AA24FA3E92761F4CFFB4872CCC6891AB1F7A295276A090526274
31,663,439 UART: [art] SIG.R = 5EF3F039A898D8F8E986060B3F98554DD0FC3BD5DD1DD93EE82CE237970D2660F0E3D919C04E7D45BDF442FA73F5EA61
31,670,854 UART: [art] SIG.S = 76D27B6123BC6B4DBC0D7C2C30E2F361626ADF4E68EEDECB0A5388CB36B1AB0CE56391F1561A6C1D8ED49A3DBF08A458
32,975,700 UART: Caliptra RT
32,976,400 UART: [state] CFI Enabled
33,093,932 UART: [rt] RT listening for mailbox commands...
33,095,834 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,125,506 UART: [rt]cmd =0x46504c54, len=4
33,127,070 >>> mbox cmd response data (8 bytes)
33,128,244 UART: [rt] FIPS self test
33,129,184 UART: [kat] ++
33,129,632 UART: [kat] sha1
33,134,195 UART: [kat] SHA2-256
33,136,123 UART: [kat] SHA2-384
33,139,135 UART: [kat] SHA2-512-ACC
33,141,392 UART: [kat] ECC-384
36,384,224 UART: [kat] HMAC-384Kdf
36,390,242 UART: [kat] LMS
37,135,943 UART: Fatal Error: 0x90070002
37,171,207 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,315,664 >>> mbox cmd response: failed
37,316,351 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
37,460,529 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
6,609,614 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
20,563,688 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,354 UART:
192,720 UART: Running Caliptra ROM ...
193,927 UART:
194,079 UART: [state] CFI Enabled
262,264 UART: [state] LifecycleState = Unprovisioned
264,208 UART: [state] DebugLocked = No
266,527 UART: [state] WD Timer not started. Device not locked for debugging
270,300 UART: [kat] SHA2-256
449,416 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
461,016 UART: [kat] ++
461,555 UART: [kat] sha1
473,536 UART: [kat] SHA2-256
476,587 UART: [kat] SHA2-384
482,093 UART: [kat] SHA2-512-ACC
485,042 UART: [kat] ECC-384
2,947,218 UART: [kat] HMAC-384Kdf
2,973,647 UART: [kat] LMS
3,503,089 UART: [kat] --
3,508,095 UART: [cold-reset] ++
3,510,561 UART: [fht] FHT @ 0x50003400
3,522,902 UART: [idev] ++
3,523,477 UART: [idev] CDI.KEYID = 6
3,524,547 UART: [idev] SUBJECT.KEYID = 7
3,525,659 UART: [idev] UDS.KEYID = 0
3,526,610 ready_for_fw is high
3,526,847 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,671,608 UART: [idev] Erasing UDS.KEYID = 0
6,026,994 UART: [idev] Sha1 KeyId Algorithm
6,051,098 UART: [idev] --
6,054,613 UART: [ldev] ++
6,055,188 UART: [ldev] CDI.KEYID = 6
6,056,104 UART: [ldev] SUBJECT.KEYID = 5
6,057,266 UART: [ldev] AUTHORITY.KEYID = 7
6,058,561 UART: [ldev] FE.KEYID = 1
6,102,923 UART: [ldev] Erasing FE.KEYID = 1
8,606,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,611 UART: [ldev] --
10,417,774 UART: [fwproc] Wait for Commands...
10,419,716 UART: [fwproc] Recv command 0x46574c44
10,421,817 UART: [fwproc] Recv'd Img size: 115032 bytes
13,831,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,644 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,440 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,289,001 >>> mbox cmd response: success
14,292,421 UART: [afmc] ++
14,293,014 UART: [afmc] CDI.KEYID = 6
14,293,929 UART: [afmc] SUBJECT.KEYID = 7
14,295,090 UART: [afmc] AUTHORITY.KEYID = 5
16,829,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,556,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,557,930 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,573,673 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,589,753 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,605,581 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,073 UART: [afmc] --
18,632,113 UART: [cold-reset] --
18,635,492 UART: [state] Locking Datavault
18,640,901 UART: [state] Locking PCR0, PCR1 and PCR31
18,642,558 UART: [state] Locking ICCM
18,644,167 UART: [exit] Launching FMC @ 0x40000130
18,652,562 UART:
18,652,796 UART: Running Caliptra FMC ...
18,653,898 UART:
18,654,060 UART: [state] CFI Enabled
18,713,611 UART: [fht] FMC Alias Private Key: 7
20,477,408 UART: [art] Extend RT PCRs Done
20,478,631 UART: [art] Lock RT PCRs Done
20,480,336 UART: [art] Populate DV Done
20,485,768 UART: [fht] FMC Alias Private Key: 7
20,487,369 UART: [art] Derive CDI
20,488,109 UART: [art] Store in in slot 0x4
20,546,029 UART: [art] Derive Key Pair
20,547,074 UART: [art] Store priv key in slot 0x5
23,010,395 UART: [art] Derive Key Pair - Done
23,023,343 UART: [art] Signing Cert with AUTHO
23,024,655 UART: RITY.KEYID = 7
24,736,398 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,913 UART: [art] PUB.X = 6340C694D9C1EB4A40C8DA1E17E389F016168C858C4E7749BF6E2900FA88E99681F8383A3A5316780F41341C6E6AB823
24,745,147 UART: [art] PUB.Y = 17096AB928D881C60C343207457EED4660F0DA1B35E8C056AA72029AA67E6B24388B95E7CD164303CEF5C43257A17145
24,752,354 UART: [art] SIG.R = 18ADDC380919C2EE25607CF5C6D0AE4AF4CB8918C7A771080E54FA1700ACCB8AC2A2413187ECCA0D3FAA00EBE729EE18
24,759,716 UART: [art] SIG.S = D342848CFB3908928F8620608F6F51F63FBD0BF46DFF805B29BEC2B59E1B12BF5F44895BD05FC0282ED80E7EA1E7BA17
25,738,753 UART: Caliptra RT
25,739,460 UART: [state] CFI Enabled
25,905,172 UART: [rt] RT listening for mailbox commands...
25,907,152 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,936,835 UART: [rt]cmd =0x46504c54, len=4
25,938,579 >>> mbox cmd response data (8 bytes)
25,939,528 UART: [rt] FIPS self test
25,940,473 UART: [kat] ++
25,940,921 UART: [kat] sha1
25,945,213 UART: [kat] SHA2-256
25,947,089 UART: [kat] SHA2-384
25,950,189 UART: [kat] SHA2-512-ACC
25,952,420 UART: [kat] ECC-384
28,390,522 UART: [kat] HMAC-384Kdf
28,417,751 UART: [kat] LMS
28,644,888 UART: Fatal Error: 0x90070002
28,680,149 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,824,998 >>> mbox cmd response: failed
28,825,646 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,970,127 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
190,161 UART:
190,451 UART: Running Caliptra ROM ...
191,477 UART:
191,615 UART: [state] CFI Enabled
266,246 UART: [state] LifecycleState = Unprovisioned
268,166 UART: [state] DebugLocked = No
270,865 UART: [state] WD Timer not started. Device not locked for debugging
275,026 UART: [kat] SHA2-256
454,151 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,726 UART: [kat] ++
466,176 UART: [kat] sha1
477,752 UART: [kat] SHA2-256
480,763 UART: [kat] SHA2-384
486,649 UART: [kat] SHA2-512-ACC
489,583 UART: [kat] ECC-384
2,948,499 UART: [kat] HMAC-384Kdf
2,971,751 UART: [kat] LMS
3,501,170 UART: [kat] --
3,506,190 UART: [cold-reset] ++
3,507,525 UART: [fht] FHT @ 0x50003400
3,518,404 UART: [idev] ++
3,518,969 UART: [idev] CDI.KEYID = 6
3,519,852 UART: [idev] SUBJECT.KEYID = 7
3,521,063 UART: [idev] UDS.KEYID = 0
3,522,580 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,667,178 UART: [idev] Erasing UDS.KEYID = 0
6,025,631 UART: [idev] Sha1 KeyId Algorithm
6,048,661 UART: [idev] --
6,053,034 UART: [ldev] ++
6,053,628 UART: [ldev] CDI.KEYID = 6
6,054,517 UART: [ldev] SUBJECT.KEYID = 5
6,056,245 UART: [ldev] AUTHORITY.KEYID = 7
6,057,358 UART: [ldev] FE.KEYID = 1
6,100,177 UART: [ldev] Erasing FE.KEYID = 1
8,605,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,955 UART: [ldev] --
10,414,576 UART: [fwproc] Wait for Commands...
10,417,375 UART: [fwproc] Recv command 0x46574c44
10,419,475 UART: [fwproc] Recv'd Img size: 115032 bytes
13,833,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,600 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,295,629 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,359,250 ready_for_fw is high
3,359,928 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,045,834 >>> mbox cmd response: success
18,343,369 UART:
18,343,757 UART: Running Caliptra FMC ...
18,344,897 UART:
18,345,055 UART: [state] CFI Enabled
18,410,250 UART: [fht] FMC Alias Private Key: 7
20,173,441 UART: [art] Extend RT PCRs Done
20,174,667 UART: [art] Lock RT PCRs Done
20,176,213 UART: [art] Populate DV Done
20,181,450 UART: [fht] FMC Alias Private Key: 7
20,182,938 UART: [art] Derive CDI
20,183,702 UART: [art] Store in in slot 0x4
20,243,019 UART: [art] Derive Key Pair
20,244,070 UART: [art] Store priv key in slot 0x5
22,707,026 UART: [art] Derive Key Pair - Done
22,719,798 UART: [art] Signing Cert with AUTHO
22,721,104 UART: RITY.KEYID = 7
24,434,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,502 UART: [art] PUB.X = E82CBA218EBB0D6EE0E8E7C670B1B3C43AEA59E9A59EC9C7FDFFF34467BD1CFBC0DEF8B22530EC9369B7D99C728C8698
24,443,775 UART: [art] PUB.Y = 2E90A0818BFBFA6B59B72FDD6CC97B3CD5C97B3C9809BBED8382316CADC574371C4360952E33F6FF2EB08F34B316297E
24,451,053 UART: [art] SIG.R = F8ADABF206AA326342649DDB1696EB2C782DBDEF294498E9A65C3A7CC213D63D77237AFD6CDBB3060FE113C96086DBA8
24,458,455 UART: [art] SIG.S = CEF267B274B0E60DA58266BA4545C767ADD7BAD979088EC009FFC521FA1B329E7B9096CEF40CEF1076C3B9D4128FD7AC
25,438,165 UART: Caliptra RT
25,438,881 UART: [state] CFI Enabled
25,602,496 UART: [rt] RT listening for mailbox commands...
25,604,357 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,633,986 UART: [rt]cmd =0x46504c54, len=4
25,635,491 >>> mbox cmd response data (8 bytes)
25,636,348 UART: [rt] FIPS self test
25,637,295 UART: [kat] ++
25,637,750 UART: [kat] sha1
25,642,204 UART: [kat] SHA2-256
25,644,136 UART: [kat] SHA2-384
25,647,099 UART: [kat] SHA2-512-ACC
25,649,349 UART: [kat] ECC-384
28,088,603 UART: [kat] HMAC-384Kdf
28,115,549 UART: [kat] LMS
28,342,729 UART: Fatal Error: 0x90070002
28,378,160 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,522,742 >>> mbox cmd response: failed
28,523,400 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,667,712 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,360,876 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,056,925 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,485 UART:
192,877 UART: Running Caliptra ROM ...
194,204 UART:
603,599 UART: [state] CFI Enabled
617,567 UART: [state] LifecycleState = Unprovisioned
619,435 UART: [state] DebugLocked = No
620,980 UART: [state] WD Timer not started. Device not locked for debugging
624,672 UART: [kat] SHA2-256
803,789 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,324 UART: [kat] ++
815,775 UART: [kat] sha1
826,576 UART: [kat] SHA2-256
829,583 UART: [kat] SHA2-384
835,500 UART: [kat] SHA2-512-ACC
838,448 UART: [kat] ECC-384
3,277,353 UART: [kat] HMAC-384Kdf
3,289,661 UART: [kat] LMS
3,819,133 UART: [kat] --
3,822,383 UART: [cold-reset] ++
3,824,320 UART: [fht] FHT @ 0x50003400
3,834,096 UART: [idev] ++
3,834,673 UART: [idev] CDI.KEYID = 6
3,835,603 UART: [idev] SUBJECT.KEYID = 7
3,836,782 UART: [idev] UDS.KEYID = 0
3,837,714 ready_for_fw is high
3,837,931 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,982,489 UART: [idev] Erasing UDS.KEYID = 0
6,307,478 UART: [idev] Sha1 KeyId Algorithm
6,328,877 UART: [idev] --
6,333,361 UART: [ldev] ++
6,333,970 UART: [ldev] CDI.KEYID = 6
6,334,888 UART: [ldev] SUBJECT.KEYID = 5
6,336,047 UART: [ldev] AUTHORITY.KEYID = 7
6,337,282 UART: [ldev] FE.KEYID = 1
6,348,142 UART: [ldev] Erasing FE.KEYID = 1
8,820,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,538,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,554,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,570,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,586,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,606,889 UART: [ldev] --
10,611,079 UART: [fwproc] Wait for Commands...
10,612,966 UART: [fwproc] Recv command 0x46574c44
10,615,007 UART: [fwproc] Recv'd Img size: 115032 bytes
14,030,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,101,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,170,434 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,490,735 >>> mbox cmd response: success
14,495,772 UART: [afmc] ++
14,496,387 UART: [afmc] CDI.KEYID = 6
14,497,274 UART: [afmc] SUBJECT.KEYID = 7
14,498,475 UART: [afmc] AUTHORITY.KEYID = 5
16,999,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,290 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,734,115 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,750,109 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,765,938 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,789,183 UART: [afmc] --
18,793,536 UART: [cold-reset] --
18,798,855 UART: [state] Locking Datavault
18,803,937 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,580 UART: [state] Locking ICCM
18,808,326 UART: [exit] Launching FMC @ 0x40000130
18,816,725 UART:
18,817,000 UART: Running Caliptra FMC ...
18,818,040 UART:
18,818,190 UART: [state] CFI Enabled
18,826,512 UART: [fht] FMC Alias Private Key: 7
20,583,965 UART: [art] Extend RT PCRs Done
20,585,205 UART: [art] Lock RT PCRs Done
20,586,853 UART: [art] Populate DV Done
20,592,319 UART: [fht] FMC Alias Private Key: 7
20,593,802 UART: [art] Derive CDI
20,594,536 UART: [art] Store in in slot 0x4
20,636,585 UART: [art] Derive Key Pair
20,637,581 UART: [art] Store priv key in slot 0x5
23,064,012 UART: [art] Derive Key Pair - Done
23,076,627 UART: [art] Signing Cert with AUTHO
23,077,929 UART: RITY.KEYID = 7
24,783,035 UART: [art] Erasing AUTHORITY.KEYID = 7
24,784,539 UART: [art] PUB.X = 46B3A6169F3D2F57711DF9E393B88A62EAB9B55D7AE53771FF32E7019FAA95E1F830DBC8A2B253584D4285EEFE757D54
24,791,845 UART: [art] PUB.Y = 44EE466187A77CB7F151D029E18F23B4EA193461C8DA3A49520B990EC2FB4CC7CD0CA6D6FC987532024274AA5A29E7EA
24,799,131 UART: [art] SIG.R = 9A9B6E5A44CB65303C242A9064D36971DF2A01E03F82028C4E09DE8C63B45BD9FDE62E08EE03039EC353E1B71FEB1645
24,806,525 UART: [art] SIG.S = 204F9FE98D61835A324FA0350E35D3F0AFA2B65EC8BA9B704C83F96B09C6A479B747A74A08EDEB694A49EDD96BBC77FA
25,785,405 UART: Caliptra RT
25,786,133 UART: [state] CFI Enabled
25,904,305 UART: [rt] RT listening for mailbox commands...
25,906,148 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,935,613 UART: [rt]cmd =0x46504c54, len=4
25,937,277 >>> mbox cmd response data (8 bytes)
25,938,278 UART: [rt] FIPS self test
25,939,224 UART: [kat] ++
25,939,673 UART: [kat] sha1
25,944,180 UART: [kat] SHA2-256
25,946,049 UART: [kat] SHA2-384
25,949,094 UART: [kat] SHA2-512-ACC
25,951,377 UART: [kat] ECC-384
28,378,743 UART: [kat] HMAC-384Kdf
28,384,651 UART: [kat] LMS
28,611,679 UART: Fatal Error: 0x90070002
28,646,945 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,791,412 >>> mbox cmd response: failed
28,792,024 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,936,461 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,035 UART:
190,327 UART: Running Caliptra ROM ...
191,352 UART:
11,581,821 UART: [state] CFI Enabled
11,598,306 UART: [state] LifecycleState = Unprovisioned
11,600,164 UART: [state] DebugLocked = No
11,602,414 UART: [state] WD Timer not started. Device not locked for debugging
11,606,042 UART: [kat] SHA2-256
11,785,128 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
11,796,741 UART: [kat] ++
11,797,281 UART: [kat] sha1
11,809,492 UART: [kat] SHA2-256
11,812,517 UART: [kat] SHA2-384
11,820,226 UART: [kat] SHA2-512-ACC
11,823,165 UART: [kat] ECC-384
14,263,901 UART: [kat] HMAC-384Kdf
14,276,501 UART: [kat] LMS
14,806,007 UART: [kat] --
14,810,593 UART: [cold-reset] ++
14,813,167 UART: [fht] FHT @ 0x50003400
14,824,195 UART: [idev] ++
14,824,759 UART: [idev] CDI.KEYID = 6
14,825,724 UART: [idev] SUBJECT.KEYID = 7
14,826,881 UART: [idev] UDS.KEYID = 0
14,828,451 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,972,853 UART: [idev] Erasing UDS.KEYID = 0
17,296,642 UART: [idev] Sha1 KeyId Algorithm
17,318,810 UART: [idev] --
17,322,506 UART: [ldev] ++
17,323,091 UART: [ldev] CDI.KEYID = 6
17,324,005 UART: [ldev] SUBJECT.KEYID = 5
17,325,167 UART: [ldev] AUTHORITY.KEYID = 7
17,326,448 UART: [ldev] FE.KEYID = 1
17,335,092 UART: [ldev] Erasing FE.KEYID = 1
19,807,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,526,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,542,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,558,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,574,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,593,346 UART: [ldev] --
21,597,091 UART: [fwproc] Wait for Commands...
21,600,054 UART: [fwproc] Recv command 0x46574c44
21,602,158 UART: [fwproc] Recv'd Img size: 115032 bytes
25,011,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,082,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
25,151,653 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,472,498 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
3,694,859 ready_for_fw is high
3,695,337 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,284,934 >>> mbox cmd response: success
18,531,424 UART:
18,531,830 UART: Running Caliptra FMC ...
18,533,032 UART:
18,533,207 UART: [state] CFI Enabled
18,540,505 UART: [fht] FMC Alias Private Key: 7
20,297,890 UART: [art] Extend RT PCRs Done
20,299,094 UART: [art] Lock RT PCRs Done
20,300,625 UART: [art] Populate DV Done
20,305,757 UART: [fht] FMC Alias Private Key: 7
20,307,405 UART: [art] Derive CDI
20,308,222 UART: [art] Store in in slot 0x4
20,350,712 UART: [art] Derive Key Pair
20,351,776 UART: [art] Store priv key in slot 0x5
22,778,787 UART: [art] Derive Key Pair - Done
22,791,648 UART: [art] Signing Cert with AUTHO
22,792,958 UART: RITY.KEYID = 7
24,498,446 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,935 UART: [art] PUB.X = 6EF0ED4097416C79E9C587F405D35BBFF3031FC8424B29E2FA18E6110CF36052625D3B3A6E7D42F43DAE6DC0B9B116DE
24,507,210 UART: [art] PUB.Y = FE7C71B6389AD7E9DF6722C98A3312B41398F35F2B8AD1D0DC382A37AABF4A8A4C78016CB344ACC896E31AE6D88642E9
24,514,500 UART: [art] SIG.R = 3018C7F8B3FBE34EB0D4363B3822A31EDDDDBC63243C5F186A5B78AB264A54FCEBC1A9A251AE74CE3B5CCB294E9E401D
24,521,934 UART: [art] SIG.S = 735FB9A742CE7CFE7DDB36C72A88328E9CB2D5D101D11669D9CC5DAC496427F11E1DCC1F1D467FD05B83EF8ED08E4506
25,500,767 UART: Caliptra RT
25,501,483 UART: [state] CFI Enabled
25,618,618 UART: [rt] RT listening for mailbox commands...
25,620,476 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,649,944 UART: [rt]cmd =0x46504c54, len=4
25,651,468 >>> mbox cmd response data (8 bytes)
25,652,734 UART: [rt] FIPS self test
25,653,694 UART: [kat] ++
25,654,148 UART: [kat] sha1
25,658,496 UART: [kat] SHA2-256
25,660,428 UART: [kat] SHA2-384
25,663,440 UART: [kat] SHA2-512-ACC
25,665,687 UART: [kat] ECC-384
28,093,109 UART: [kat] HMAC-384Kdf
28,099,017 UART: [kat] LMS
28,326,101 UART: Fatal Error: 0x90070002
28,361,514 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,506,050 >>> mbox cmd response: failed
28,506,738 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,650,974 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
14,960,722 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,549,195 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,330 UART:
192,692 UART: Running Caliptra ROM ...
193,893 UART:
194,044 UART: [state] CFI Enabled
266,132 UART: [state] LifecycleState = Unprovisioned
268,542 UART: [state] DebugLocked = No
271,213 UART: [state] WD Timer not started. Device not locked for debugging
275,041 UART: [kat] SHA2-256
464,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,710 UART: [kat] ++
476,163 UART: [kat] sha1
487,045 UART: [kat] SHA2-256
490,053 UART: [kat] SHA2-384
495,464 UART: [kat] SHA2-512-ACC
498,063 UART: [kat] ECC-384
2,949,239 UART: [kat] HMAC-384Kdf
2,975,346 UART: [kat] LMS
3,507,140 UART: [kat] --
3,509,139 UART: [cold-reset] ++
3,511,498 UART: [fht] FHT @ 0x50003400
3,523,830 UART: [idev] ++
3,524,538 UART: [idev] CDI.KEYID = 6
3,525,424 UART: [idev] SUBJECT.KEYID = 7
3,526,675 UART: [idev] UDS.KEYID = 0
3,527,607 ready_for_fw is high
3,527,840 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,672,903 UART: [idev] Erasing UDS.KEYID = 0
6,033,451 UART: [idev] Sha1 KeyId Algorithm
6,056,645 UART: [idev] --
6,061,081 UART: [ldev] ++
6,061,763 UART: [ldev] CDI.KEYID = 6
6,062,706 UART: [ldev] SUBJECT.KEYID = 5
6,063,862 UART: [ldev] AUTHORITY.KEYID = 7
6,065,097 UART: [ldev] FE.KEYID = 1
6,104,623 UART: [ldev] Erasing FE.KEYID = 1
8,607,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,581 UART: [ldev] --
10,417,663 UART: [fwproc] Wait for Commands...
10,420,157 UART: [fwproc] Recv command 0x46574c44
10,422,425 UART: [fwproc] Recv'd Img size: 115032 bytes
13,873,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,077 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,192 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,608,015 >>> mbox cmd response: success
14,611,244 UART: [afmc] ++
14,611,944 UART: [afmc] CDI.KEYID = 6
14,613,184 UART: [afmc] SUBJECT.KEYID = 7
14,614,614 UART: [afmc] AUTHORITY.KEYID = 5
17,152,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,879,972 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,184 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,295 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,301 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,947,633 UART: [afmc] --
18,950,466 UART: [cold-reset] --
18,953,792 UART: [state] Locking Datavault
18,959,643 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,833 UART: [state] Locking ICCM
18,964,520 UART: [exit] Launching FMC @ 0x40000130
18,973,190 UART:
18,973,464 UART: Running Caliptra FMC ...
18,974,577 UART:
18,974,738 UART: [state] CFI Enabled
19,035,745 UART: [fht] FMC Alias Private Key: 7
20,799,670 UART: [art] Extend RT PCRs Done
20,800,899 UART: [art] Lock RT PCRs Done
20,802,474 UART: [art] Populate DV Done
20,808,047 UART: [fht] FMC Alias Private Key: 7
20,809,696 UART: [art] Derive CDI
20,810,469 UART: [art] Store in in slot 0x4
20,868,321 UART: [art] Derive Key Pair
20,869,316 UART: [art] Store priv key in slot 0x5
23,332,182 UART: [art] Derive Key Pair - Done
23,345,340 UART: [art] Signing Cert with AUTHO
23,346,639 UART: RITY.KEYID = 7
25,058,291 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,807 UART: [art] PUB.X = 404E5548CD7B2F4B8775AF67745C816994C2D0C5859C9789461F35908490813DD1C3C3492C5A0DAD48A090326FFAC46D
25,067,031 UART: [art] PUB.Y = EF6DE4FC0DA18B5249179AE0FF134040E5902FE4A166798CDF60FF6DFC3CE4EB1C9B4AF6E23C896942FEEE8C3DEE057D
25,074,302 UART: [art] SIG.R = 60426322B868825DFBDF38BBA8AE324D1EC4C792510DF9F736E3039D579D2C2963E289425FED49F6652CBE34480A6C2B
25,081,734 UART: [art] SIG.S = D5ACFEF9E263A230CE18602F8D5B7929D9E9924AD966028DFF9E92439E5D955B672484B500A96EEB7B2FB3A2E570B69F
26,060,224 UART: Caliptra RT
26,060,912 UART: [state] CFI Enabled
26,226,825 UART: [rt] RT listening for mailbox commands...
26,228,670 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,258,253 UART: [rt]cmd =0x46504c54, len=4
26,259,812 >>> mbox cmd response data (8 bytes)
26,260,987 UART: [rt] FIPS self test
26,261,941 UART: [kat] ++
26,262,387 UART: [kat] sha1
26,266,841 UART: [kat] SHA2-256
26,268,766 UART: [kat] SHA2-384
26,271,836 UART: [kat] SHA2-512-ACC
26,274,124 UART: [kat] ECC-384
28,712,759 UART: [kat] HMAC-384Kdf
28,719,156 UART: [kat] LMS
28,946,307 UART: Fatal Error: 0x90070002
28,981,725 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,126,059 >>> mbox cmd response: failed
29,126,691 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,271,078 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,001 UART:
190,294 UART: Running Caliptra ROM ...
191,350 UART:
191,493 UART: [state] CFI Enabled
266,133 UART: [state] LifecycleState = Unprovisioned
268,543 UART: [state] DebugLocked = No
269,756 UART: [state] WD Timer not started. Device not locked for debugging
274,353 UART: [kat] SHA2-256
464,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,008 UART: [kat] ++
475,459 UART: [kat] sha1
486,558 UART: [kat] SHA2-256
489,573 UART: [kat] SHA2-384
495,606 UART: [kat] SHA2-512-ACC
498,181 UART: [kat] ECC-384
2,948,267 UART: [kat] HMAC-384Kdf
2,974,100 UART: [kat] LMS
3,505,837 UART: [kat] --
3,508,604 UART: [cold-reset] ++
3,509,841 UART: [fht] FHT @ 0x50003400
3,521,850 UART: [idev] ++
3,522,527 UART: [idev] CDI.KEYID = 6
3,523,544 UART: [idev] SUBJECT.KEYID = 7
3,524,705 UART: [idev] UDS.KEYID = 0
3,526,485 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,671,131 UART: [idev] Erasing UDS.KEYID = 0
6,031,358 UART: [idev] Sha1 KeyId Algorithm
6,053,079 UART: [idev] --
6,058,211 UART: [ldev] ++
6,058,891 UART: [ldev] CDI.KEYID = 6
6,059,823 UART: [ldev] SUBJECT.KEYID = 5
6,060,994 UART: [ldev] AUTHORITY.KEYID = 7
6,062,172 UART: [ldev] FE.KEYID = 1
6,101,610 UART: [ldev] Erasing FE.KEYID = 1
8,606,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,265 UART: [ldev] --
10,414,124 UART: [fwproc] Wait for Commands...
10,415,681 UART: [fwproc] Recv command 0x46574c44
10,418,124 UART: [fwproc] Recv'd Img size: 115032 bytes
13,875,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,420 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,074,541 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,621,754 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,436,968 ready_for_fw is high
3,437,387 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,755,807 >>> mbox cmd response: success
19,044,468 UART:
19,044,855 UART: Running Caliptra FMC ...
19,045,969 UART:
19,046,121 UART: [state] CFI Enabled
19,113,022 UART: [fht] FMC Alias Private Key: 7
20,877,420 UART: [art] Extend RT PCRs Done
20,878,641 UART: [art] Lock RT PCRs Done
20,880,591 UART: [art] Populate DV Done
20,886,230 UART: [fht] FMC Alias Private Key: 7
20,887,770 UART: [art] Derive CDI
20,888,585 UART: [art] Store in in slot 0x4
20,945,950 UART: [art] Derive Key Pair
20,946,993 UART: [art] Store priv key in slot 0x5
23,409,527 UART: [art] Derive Key Pair - Done
23,422,677 UART: [art] Signing Cert with AUTHO
23,424,015 UART: RITY.KEYID = 7
25,135,658 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,166 UART: [art] PUB.X = 3063FC828B3E341AE025E04D939B01FE04E5EA945F6F9EF4C5CBE619F8861175293A066A13411738BFD4648C602041F3
25,144,429 UART: [art] PUB.Y = F924A1649DA3B20C0FFBA40BBA64F35FABF8C5195A47DCB25503D9BC9B8B1B86F6E643B4F4757AD7F06FD6B67C2797AA
25,151,684 UART: [art] SIG.R = 60224B907B1D6EEAB96EB56EAC84181A6F06A02D72106377EA42CC83CB0A0147CD39ED9F427A9739B18B3DF4CB145A7B
25,159,111 UART: [art] SIG.S = 1E9E56E8FF7896481DFDB2B2F154677B38FADD7C569CF8A467EFFB4CF137E8F25A12B75BA5D1E8785A4D094F5302FF52
26,137,893 UART: Caliptra RT
26,138,598 UART: [state] CFI Enabled
26,303,605 UART: [rt] RT listening for mailbox commands...
26,305,468 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,334,981 UART: [rt]cmd =0x46504c54, len=4
26,336,346 >>> mbox cmd response data (8 bytes)
26,337,395 UART: [rt] FIPS self test
26,338,335 UART: [kat] ++
26,338,785 UART: [kat] sha1
26,343,346 UART: [kat] SHA2-256
26,345,219 UART: [kat] SHA2-384
26,348,067 UART: [kat] SHA2-512-ACC
26,350,373 UART: [kat] ECC-384
28,788,542 UART: [kat] HMAC-384Kdf
28,815,235 UART: [kat] LMS
29,042,197 UART: Fatal Error: 0x90070002
29,077,465 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,221,999 >>> mbox cmd response: failed
29,222,589 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,367,045 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,440,800 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,751,533 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,682 UART:
193,069 UART: Running Caliptra ROM ...
194,277 UART:
603,892 UART: [state] CFI Enabled
618,832 UART: [state] LifecycleState = Unprovisioned
621,213 UART: [state] DebugLocked = No
623,234 UART: [state] WD Timer not started. Device not locked for debugging
628,266 UART: [kat] SHA2-256
818,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,959 UART: [kat] ++
829,408 UART: [kat] sha1
842,085 UART: [kat] SHA2-256
845,110 UART: [kat] SHA2-384
850,543 UART: [kat] SHA2-512-ACC
853,196 UART: [kat] ECC-384
3,297,075 UART: [kat] HMAC-384Kdf
3,309,567 UART: [kat] LMS
3,841,403 UART: [kat] --
3,843,767 UART: [cold-reset] ++
3,845,273 UART: [fht] FHT @ 0x50003400
3,856,274 UART: [idev] ++
3,856,951 UART: [idev] CDI.KEYID = 6
3,857,997 UART: [idev] SUBJECT.KEYID = 7
3,859,111 UART: [idev] UDS.KEYID = 0
3,860,058 ready_for_fw is high
3,860,289 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,004,714 UART: [idev] Erasing UDS.KEYID = 0
6,331,521 UART: [idev] Sha1 KeyId Algorithm
6,354,198 UART: [idev] --
6,358,233 UART: [ldev] ++
6,358,924 UART: [ldev] CDI.KEYID = 6
6,359,807 UART: [ldev] SUBJECT.KEYID = 5
6,361,024 UART: [ldev] AUTHORITY.KEYID = 7
6,362,155 UART: [ldev] FE.KEYID = 1
6,373,503 UART: [ldev] Erasing FE.KEYID = 1
8,849,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,489 UART: [ldev] --
10,639,592 UART: [fwproc] Wait for Commands...
10,642,660 UART: [fwproc] Recv command 0x46574c44
10,644,943 UART: [fwproc] Recv'd Img size: 115032 bytes
14,101,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,810 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,988 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,844,496 >>> mbox cmd response: success
14,847,800 UART: [afmc] ++
14,848,513 UART: [afmc] CDI.KEYID = 6
14,849,627 UART: [afmc] SUBJECT.KEYID = 7
14,851,165 UART: [afmc] AUTHORITY.KEYID = 5
17,354,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,827 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,997 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,158 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,147,074 UART: [afmc] --
19,150,380 UART: [cold-reset] --
19,155,281 UART: [state] Locking Datavault
19,161,940 UART: [state] Locking PCR0, PCR1 and PCR31
19,164,127 UART: [state] Locking ICCM
19,166,150 UART: [exit] Launching FMC @ 0x40000130
19,174,823 UART:
19,175,060 UART: Running Caliptra FMC ...
19,176,117 UART:
19,176,268 UART: [state] CFI Enabled
19,184,212 UART: [fht] FMC Alias Private Key: 7
20,940,842 UART: [art] Extend RT PCRs Done
20,942,056 UART: [art] Lock RT PCRs Done
20,943,710 UART: [art] Populate DV Done
20,949,012 UART: [fht] FMC Alias Private Key: 7
20,950,605 UART: [art] Derive CDI
20,951,423 UART: [art] Store in in slot 0x4
20,994,109 UART: [art] Derive Key Pair
20,995,146 UART: [art] Store priv key in slot 0x5
23,421,282 UART: [art] Derive Key Pair - Done
23,434,172 UART: [art] Signing Cert with AUTHO
23,435,476 UART: RITY.KEYID = 7
25,140,978 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,488 UART: [art] PUB.X = 5441BCEC2DFD056C64C3C81246B2E8BF83851BDCB3D24E03FF0332353B308847927E5C9BD10AD9E1EB5D0604321DB303
25,149,766 UART: [art] PUB.Y = 65C7ACC66880DDE52675D08099AE8640179E58B6A7329CDDA29AFD147BA9242191EE3EDD033A9EF0101322CB5CA46067
25,157,027 UART: [art] SIG.R = 5A9A4DCA247B3C698CB4DE0F9FECDF1A02A11F5D0FCB1E3AECD6565FD7E7C87EA376C39FA6A052CD7F265436C3FE8F03
25,164,449 UART: [art] SIG.S = 06FE0401A19A58AAA46AEBF1690585788FB7F6F315AF7154F041630FB4CD745A5CB5F37D1BBFA839487805B24AE48DD0
26,142,932 UART: Caliptra RT
26,143,627 UART: [state] CFI Enabled
26,260,704 UART: [rt] RT listening for mailbox commands...
26,262,557 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,292,294 UART: [rt]cmd =0x46504c54, len=4
26,294,031 >>> mbox cmd response data (8 bytes)
26,295,171 UART: [rt] FIPS self test
26,296,115 UART: [kat] ++
26,296,562 UART: [kat] sha1
26,301,042 UART: [kat] SHA2-256
26,302,982 UART: [kat] SHA2-384
26,305,832 UART: [kat] SHA2-512-ACC
26,308,123 UART: [kat] ECC-384
28,735,411 UART: [kat] HMAC-384Kdf
28,741,110 UART: [kat] LMS
28,968,039 UART: Fatal Error: 0x90070002
29,003,452 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,148,335 >>> mbox cmd response: failed
29,148,970 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,293,191 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,017 UART:
190,305 UART: Running Caliptra ROM ...
191,334 UART:
11,234,939 UART: [state] CFI Enabled
11,251,532 UART: [state] LifecycleState = Unprovisioned
11,253,888 UART: [state] DebugLocked = No
11,256,707 UART: [state] WD Timer not started. Device not locked for debugging
11,262,187 UART: [kat] SHA2-256
11,452,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,462,894 UART: [kat] ++
11,463,410 UART: [kat] sha1
11,475,808 UART: [kat] SHA2-256
11,478,830 UART: [kat] SHA2-384
11,484,553 UART: [kat] SHA2-512-ACC
11,487,174 UART: [kat] ECC-384
13,928,475 UART: [kat] HMAC-384Kdf
13,943,044 UART: [kat] LMS
14,474,827 UART: [kat] --
14,478,991 UART: [cold-reset] ++
14,481,254 UART: [fht] FHT @ 0x50003400
14,493,559 UART: [idev] ++
14,494,246 UART: [idev] CDI.KEYID = 6
14,495,209 UART: [idev] SUBJECT.KEYID = 7
14,496,420 UART: [idev] UDS.KEYID = 0
14,497,935 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,642,347 UART: [idev] Erasing UDS.KEYID = 0
16,976,020 UART: [idev] Sha1 KeyId Algorithm
16,999,744 UART: [idev] --
17,005,303 UART: [ldev] ++
17,005,984 UART: [ldev] CDI.KEYID = 6
17,006,870 UART: [ldev] SUBJECT.KEYID = 5
17,008,083 UART: [ldev] AUTHORITY.KEYID = 7
17,009,280 UART: [ldev] FE.KEYID = 1
17,021,419 UART: [ldev] Erasing FE.KEYID = 1
19,498,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,217,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,232,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,247,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,262,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,284,955 UART: [ldev] --
21,289,718 UART: [fwproc] Wait for Commands...
21,292,376 UART: [fwproc] Recv command 0x46574c44
21,294,697 UART: [fwproc] Recv'd Img size: 115032 bytes
24,754,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,833,190 UART: [fwproc] Load FMC at address 0x40000000 len 18800
24,949,332 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
25,496,651 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,766,548 ready_for_fw is high
3,767,008 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,980,365 >>> mbox cmd response: success
19,236,440 UART:
19,236,831 UART: Running Caliptra FMC ...
19,237,982 UART:
19,238,141 UART: [state] CFI Enabled
19,246,031 UART: [fht] FMC Alias Private Key: 7
21,002,532 UART: [art] Extend RT PCRs Done
21,003,762 UART: [art] Lock RT PCRs Done
21,005,292 UART: [art] Populate DV Done
21,010,504 UART: [fht] FMC Alias Private Key: 7
21,012,100 UART: [art] Derive CDI
21,012,924 UART: [art] Store in in slot 0x4
21,055,522 UART: [art] Derive Key Pair
21,056,523 UART: [art] Store priv key in slot 0x5
23,483,870 UART: [art] Derive Key Pair - Done
23,496,666 UART: [art] Signing Cert with AUTHO
23,497,974 UART: RITY.KEYID = 7
25,203,111 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,601 UART: [art] PUB.X = 3FEA1ED020AFDF006500DB6C981FF0D61C8985DCF4D400929835B8C522A85C7956C4864E403D8787A354C46A18AB218F
25,211,858 UART: [art] PUB.Y = 5F292DBF82FB40C8C59FA0732867FE0F3DF8973EC34D3D048CE9CF4F83196A1376566785B863319A5AF24C812AF123C5
25,219,116 UART: [art] SIG.R = 086267B654C36C346B3EC878DEE3AC75D8A09D6253F04CCBF38AFE9FE8F8BC27BD4566726C3006B1FE6AB2484065765F
25,226,540 UART: [art] SIG.S = C575DAFC03DAC326CDE3C1198BF00D2A1594C14B7D5EF76E4EFD277E88C0DC774448AEE9713F9D712DD7534F217D322A
26,205,275 UART: Caliptra RT
26,205,987 UART: [state] CFI Enabled
26,323,155 UART: [rt] RT listening for mailbox commands...
26,325,002 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,942 UART: [rt]cmd =0x46504c54, len=4
26,356,598 >>> mbox cmd response data (8 bytes)
26,357,812 UART: [rt] FIPS self test
26,358,756 UART: [kat] ++
26,359,205 UART: [kat] sha1
26,363,818 UART: [kat] SHA2-256
26,365,748 UART: [kat] SHA2-384
26,368,651 UART: [kat] SHA2-512-ACC
26,370,903 UART: [kat] ECC-384
28,797,856 UART: [kat] HMAC-384Kdf
28,803,599 UART: [kat] LMS
29,030,538 UART: Fatal Error: 0x90070002
29,065,976 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,210,297 >>> mbox cmd response: failed
29,210,877 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
29,355,314 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
14,326,018 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,546,791 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,847 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,351 UART: [kat] SHA2-256
882,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,397 UART: [kat] ++
886,549 UART: [kat] sha1
890,707 UART: [kat] SHA2-256
892,645 UART: [kat] SHA2-384
895,502 UART: [kat] SHA2-512-ACC
897,403 UART: [kat] ECC-384
902,682 UART: [kat] HMAC-384Kdf
907,200 UART: [kat] LMS
1,475,396 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,653 UART: [fht] Storing FHT @ 0x50003400
1,479,352 UART: [idev] ++
1,479,520 UART: [idev] CDI.KEYID = 6
1,479,880 UART: [idev] SUBJECT.KEYID = 7
1,480,304 UART: [idev] UDS.KEYID = 0
1,480,649 ready_for_fw is high
1,480,649 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,036 UART: [idev] Erasing UDS.KEYID = 0
1,504,744 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,326 UART: [idev] --
1,514,287 UART: [ldev] ++
1,514,455 UART: [ldev] CDI.KEYID = 6
1,514,818 UART: [ldev] SUBJECT.KEYID = 5
1,515,244 UART: [ldev] AUTHORITY.KEYID = 7
1,515,707 UART: [ldev] FE.KEYID = 1
1,521,029 UART: [ldev] Erasing FE.KEYID = 1
1,546,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,448 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,658 UART: [fwproc] Received command 0x46574c44
1,587,449 UART: [fwproc] Received Image of size 115032 bytes
2,892,120 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,210 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,562 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,503 >>> mbox cmd response: success
3,087,595 UART: [afmc] ++
3,087,763 UART: [afmc] CDI.KEYID = 6
3,088,125 UART: [afmc] SUBJECT.KEYID = 7
3,088,550 UART: [afmc] AUTHORITY.KEYID = 5
3,123,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,001 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,781 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,509 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,394 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,084 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,169 UART: [afmc] --
3,167,283 UART: [cold-reset] --
3,168,191 UART: [state] Locking Datavault
3,169,454 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,058 UART: [state] Locking ICCM
3,170,508 UART: [exit] Launching FMC @ 0x40000130
3,175,837 UART:
3,175,853 UART: Running Caliptra FMC ...
3,176,261 UART:
3,176,315 UART: [state] CFI Enabled
3,187,010 UART: [fht] FMC Alias Private Key: 7
3,294,291 UART: [art] Extend RT PCRs Done
3,294,719 UART: [art] Lock RT PCRs Done
3,296,149 UART: [art] Populate DV Done
3,304,458 UART: [fht] FMC Alias Private Key: 7
3,305,618 UART: [art] Derive CDI
3,305,898 UART: [art] Store in in slot 0x4
3,391,813 UART: [art] Derive Key Pair
3,392,173 UART: [art] Store priv key in slot 0x5
3,405,333 UART: [art] Derive Key Pair - Done
3,420,041 UART: [art] Signing Cert with AUTHO
3,420,521 UART: RITY.KEYID = 7
3,436,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,786 UART: [art] PUB.X = 00A797B59C89B3CF832C4181CDCFEDB96E743A6F02DEA0B1591335D4D3AFEB2B970A0BB00CC7B64DA79888A03AEC6D80
3,443,542 UART: [art] PUB.Y = C93A47737F67FF3CAD4FC22686079A83C13EDEF580C54D3C5743D2B1B20B5DFC98CAD317A8998DC4DAFDFFEE00586B61
3,450,484 UART: [art] SIG.R = 0FD9EFB4BF4219E3D08884574EFAED081D2B23C51BEA2C0A04A010D852A35525B7D141395DC607790ACBFC33F6020992
3,457,238 UART: [art] SIG.S = E20852A1DF4022E0BA9E23108CFE339C4BF47260E717E65134284F21234365C64F8ADFCF37EB9CBB08A9A6655FBF800C
3,480,918 UART: Caliptra RT
3,481,171 UART: [state] CFI Enabled
3,588,732 UART: [rt] RT listening for mailbox commands...
3,589,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,390 UART: [rt]cmd =0x46504c54, len=4
3,620,710 >>> mbox cmd response data (8 bytes)
3,621,029 UART: [rt] FIPS self test
3,621,357 UART: [kat] ++
3,621,509 UART: [kat] sha1
3,625,657 UART: [kat] SHA2-256
3,627,679 UART: [kat] SHA2-384
3,630,418 UART: [kat] SHA2-512-ACC
3,632,345 UART: [kat] ECC-384
3,642,467 UART: [kat] HMAC-384Kdf
3,647,211 UART: [kat] LMS
3,915,743 UART: Fatal Error: 0x90070002
3,917,282 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,917,287 >>> mbox cmd response: failed
3,917,287 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,917,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,647 UART: [kat] SHA2-256
892,585 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,274 UART: [kat] HMAC-384Kdf
906,686 UART: [kat] LMS
1,474,882 UART: [kat] --
1,475,987 UART: [cold-reset] ++
1,476,463 UART: [fht] Storing FHT @ 0x50003400
1,479,148 UART: [idev] ++
1,479,316 UART: [idev] CDI.KEYID = 6
1,479,676 UART: [idev] SUBJECT.KEYID = 7
1,480,100 UART: [idev] UDS.KEYID = 0
1,480,445 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,180 UART: [idev] Erasing UDS.KEYID = 0
1,504,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,446 UART: [idev] --
1,514,433 UART: [ldev] ++
1,514,601 UART: [ldev] CDI.KEYID = 6
1,514,964 UART: [ldev] SUBJECT.KEYID = 5
1,515,390 UART: [ldev] AUTHORITY.KEYID = 7
1,515,853 UART: [ldev] FE.KEYID = 1
1,520,897 UART: [ldev] Erasing FE.KEYID = 1
1,546,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,520 UART: [ldev] --
1,586,007 UART: [fwproc] Waiting for Commands...
1,586,766 UART: [fwproc] Received command 0x46574c44
1,587,557 UART: [fwproc] Received Image of size 115032 bytes
2,893,764 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,156 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,523 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,149 ready_for_fw is high
1,362,149 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,177 >>> mbox cmd response: success
2,997,493 UART:
2,997,509 UART: Running Caliptra FMC ...
2,997,917 UART:
2,997,971 UART: [state] CFI Enabled
3,008,638 UART: [fht] FMC Alias Private Key: 7
3,116,489 UART: [art] Extend RT PCRs Done
3,116,917 UART: [art] Lock RT PCRs Done
3,118,365 UART: [art] Populate DV Done
3,126,568 UART: [fht] FMC Alias Private Key: 7
3,127,686 UART: [art] Derive CDI
3,127,966 UART: [art] Store in in slot 0x4
3,213,661 UART: [art] Derive Key Pair
3,214,021 UART: [art] Store priv key in slot 0x5
3,227,233 UART: [art] Derive Key Pair - Done
3,242,065 UART: [art] Signing Cert with AUTHO
3,242,545 UART: RITY.KEYID = 7
3,257,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,634 UART: [art] PUB.X = 16692F9BA8BAADF16A9CC62085D52E029040A0F52F46294AFB5A7D3F39C1C1616602BBB79DC8C6EC4CD4CBF1995FB759
3,265,414 UART: [art] PUB.Y = 6A7FAED2027CBB81C64609B5E9F939E9F7647D60E6F80CC7068F992CEB6B8086443943318A15B659BF0A4D6B2D2D803D
3,272,355 UART: [art] SIG.R = AEF676C6B0AFAAF1F16CB79E5E72FF49050804AAA564E0A6F215016E20FBF50D80042C08041A7CCCF55031EED9DF1760
3,279,117 UART: [art] SIG.S = 5249FB1870BEA4CEBCBE7F7971C28E39F9BF4AA54F93B51D2591E6C3045261CA04D3ABE6DE24519621123E1B98ABB4E6
3,303,576 UART: Caliptra RT
3,303,829 UART: [state] CFI Enabled
3,412,068 UART: [rt] RT listening for mailbox commands...
3,412,731 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,672 UART: [rt]cmd =0x46504c54, len=4
3,443,948 >>> mbox cmd response data (8 bytes)
3,444,211 UART: [rt] FIPS self test
3,444,539 UART: [kat] ++
3,444,691 UART: [kat] sha1
3,449,003 UART: [kat] SHA2-256
3,451,025 UART: [kat] SHA2-384
3,453,898 UART: [kat] SHA2-512-ACC
3,455,825 UART: [kat] ECC-384
3,465,941 UART: [kat] HMAC-384Kdf
3,470,329 UART: [kat] LMS
3,738,889 UART: Fatal Error: 0x90070002
3,740,428 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,740,433 >>> mbox cmd response: failed
3,740,433 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,740,438 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,975 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,971 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,953 UART: [state] LifecycleState = Unprovisioned
86,608 UART: [state] DebugLocked = No
87,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,764 UART: [kat] SHA2-256
882,695 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,810 UART: [kat] ++
886,962 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
896,089 UART: [kat] SHA2-512-ACC
897,990 UART: [kat] ECC-384
903,441 UART: [kat] HMAC-384Kdf
908,121 UART: [kat] LMS
1,476,317 UART: [kat] --
1,477,422 UART: [cold-reset] ++
1,477,794 UART: [fht] Storing FHT @ 0x50003400
1,480,621 UART: [idev] ++
1,480,789 UART: [idev] CDI.KEYID = 6
1,481,149 UART: [idev] SUBJECT.KEYID = 7
1,481,573 UART: [idev] UDS.KEYID = 0
1,481,918 ready_for_fw is high
1,481,918 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,749 UART: [idev] Erasing UDS.KEYID = 0
1,506,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,111 UART: [idev] --
1,516,002 UART: [ldev] ++
1,516,170 UART: [ldev] CDI.KEYID = 6
1,516,533 UART: [ldev] SUBJECT.KEYID = 5
1,516,959 UART: [ldev] AUTHORITY.KEYID = 7
1,517,422 UART: [ldev] FE.KEYID = 1
1,522,718 UART: [ldev] Erasing FE.KEYID = 1
1,547,229 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,981 UART: [ldev] --
1,586,294 UART: [fwproc] Waiting for Commands...
1,587,161 UART: [fwproc] Received command 0x46574c44
1,587,952 UART: [fwproc] Received Image of size 115032 bytes
2,892,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,105 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,492 >>> mbox cmd response: success
3,087,664 UART: [afmc] ++
3,087,832 UART: [afmc] CDI.KEYID = 6
3,088,194 UART: [afmc] SUBJECT.KEYID = 7
3,088,619 UART: [afmc] AUTHORITY.KEYID = 5
3,123,922 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,334 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,114 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,842 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,727 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,417 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,412 UART: [afmc] --
3,167,528 UART: [cold-reset] --
3,168,384 UART: [state] Locking Datavault
3,169,379 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,983 UART: [state] Locking ICCM
3,170,621 UART: [exit] Launching FMC @ 0x40000130
3,175,950 UART:
3,175,966 UART: Running Caliptra FMC ...
3,176,374 UART:
3,176,517 UART: [state] CFI Enabled
3,187,242 UART: [fht] FMC Alias Private Key: 7
3,294,931 UART: [art] Extend RT PCRs Done
3,295,359 UART: [art] Lock RT PCRs Done
3,296,867 UART: [art] Populate DV Done
3,305,090 UART: [fht] FMC Alias Private Key: 7
3,306,260 UART: [art] Derive CDI
3,306,540 UART: [art] Store in in slot 0x4
3,392,305 UART: [art] Derive Key Pair
3,392,665 UART: [art] Store priv key in slot 0x5
3,405,633 UART: [art] Derive Key Pair - Done
3,420,400 UART: [art] Signing Cert with AUTHO
3,420,880 UART: RITY.KEYID = 7
3,436,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,969 UART: [art] PUB.X = F88C7FCE2D82D0A568345F630552A7A3AB3FE7D974C91A2BBE1001E99CBE53C61EDCC7D00215510F7F5CAE66544F4FD5
3,443,743 UART: [art] PUB.Y = AADF8FC4100DA11E892F0DBED7F852891F7547380CAF0E8D539340B5EF2B4D83857D032297C1AEE65D794394FEBFB117
3,450,690 UART: [art] SIG.R = 8F09B6C0FF04F5186F2D2448BDF3823D1A30D68759EAEC39A7928ED203B0C7541CBD56582A77941BDADE9F21871B8EEE
3,457,463 UART: [art] SIG.S = 2F4E47A7E30E2ED4F9CCC1292DD889BC8FBAF22A08129D6291C29BC5453A0B19C44AD7212C7C7A1AF6C56B51F7E1E620
3,481,327 UART: Caliptra RT
3,481,672 UART: [state] CFI Enabled
3,590,477 UART: [rt] RT listening for mailbox commands...
3,591,140 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,069 UART: [rt]cmd =0x46504c54, len=4
3,622,241 >>> mbox cmd response data (8 bytes)
3,622,354 UART: [rt] FIPS self test
3,622,682 UART: [kat] ++
3,622,834 UART: [kat] sha1
3,627,056 UART: [kat] SHA2-256
3,629,078 UART: [kat] SHA2-384
3,631,971 UART: [kat] SHA2-512-ACC
3,633,898 UART: [kat] ECC-384
3,644,146 UART: [kat] HMAC-384Kdf
3,648,794 UART: [kat] LMS
3,917,446 UART: Fatal Error: 0x90070002
3,918,985 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,918,990 >>> mbox cmd response: failed
3,918,990 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,918,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
890,886 UART: [kat] SHA2-256
892,824 UART: [kat] SHA2-384
895,509 UART: [kat] SHA2-512-ACC
897,410 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,639 UART: [kat] LMS
1,475,835 UART: [kat] --
1,476,866 UART: [cold-reset] ++
1,477,356 UART: [fht] Storing FHT @ 0x50003400
1,480,327 UART: [idev] ++
1,480,495 UART: [idev] CDI.KEYID = 6
1,480,855 UART: [idev] SUBJECT.KEYID = 7
1,481,279 UART: [idev] UDS.KEYID = 0
1,481,624 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,445 UART: [idev] Erasing UDS.KEYID = 0
1,506,145 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,821 UART: [idev] --
1,515,928 UART: [ldev] ++
1,516,096 UART: [ldev] CDI.KEYID = 6
1,516,459 UART: [ldev] SUBJECT.KEYID = 5
1,516,885 UART: [ldev] AUTHORITY.KEYID = 7
1,517,348 UART: [ldev] FE.KEYID = 1
1,522,714 UART: [ldev] Erasing FE.KEYID = 1
1,547,553 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,255 UART: [ldev] --
1,586,738 UART: [fwproc] Waiting for Commands...
1,587,353 UART: [fwproc] Received command 0x46574c44
1,588,144 UART: [fwproc] Received Image of size 115032 bytes
2,893,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,673 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,980 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,948 ready_for_fw is high
1,362,948 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,038 >>> mbox cmd response: success
2,998,392 UART:
2,998,408 UART: Running Caliptra FMC ...
2,998,816 UART:
2,998,959 UART: [state] CFI Enabled
3,009,942 UART: [fht] FMC Alias Private Key: 7
3,117,955 UART: [art] Extend RT PCRs Done
3,118,383 UART: [art] Lock RT PCRs Done
3,119,895 UART: [art] Populate DV Done
3,128,406 UART: [fht] FMC Alias Private Key: 7
3,129,334 UART: [art] Derive CDI
3,129,614 UART: [art] Store in in slot 0x4
3,215,389 UART: [art] Derive Key Pair
3,215,749 UART: [art] Store priv key in slot 0x5
3,229,149 UART: [art] Derive Key Pair - Done
3,244,230 UART: [art] Signing Cert with AUTHO
3,244,710 UART: RITY.KEYID = 7
3,259,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,513 UART: [art] PUB.X = FA63A54C953FB6612EC0FB6CC41F5E873BF3E83548EE808F63C29C6886D734947644A6AF89C92F90B1C1EF2C46467EAC
3,267,293 UART: [art] PUB.Y = 10D7127F9DA0D65803A5DB9653822CC46D5F63F15633BC0F8DA210E1797D9FDA1BE8C1DB00B6BD50F1A838FCB73F8674
3,274,227 UART: [art] SIG.R = 89B1451DE867F669C6C9AFFCCB2355FF0156457DB510AB927B42A7F5AF6B9946F7443080D8EFAED8602CB6ED888B24C2
3,281,006 UART: [art] SIG.S = 73006AA8E73C633013F64DE17CE78D510E2B93832B43F13FDF69B88B46E5B1AF64774C45554FA5693A53623ED057DA7B
3,304,826 UART: Caliptra RT
3,305,171 UART: [state] CFI Enabled
3,413,648 UART: [rt] RT listening for mailbox commands...
3,414,311 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,968 UART: [rt]cmd =0x46504c54, len=4
3,444,974 >>> mbox cmd response data (8 bytes)
3,445,189 UART: [rt] FIPS self test
3,445,517 UART: [kat] ++
3,445,669 UART: [kat] sha1
3,450,053 UART: [kat] SHA2-256
3,452,075 UART: [kat] SHA2-384
3,454,982 UART: [kat] SHA2-512-ACC
3,456,909 UART: [kat] ECC-384
3,466,993 UART: [kat] HMAC-384Kdf
3,471,535 UART: [kat] LMS
3,740,019 UART: Fatal Error: 0x90070002
3,741,558 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,741,563 >>> mbox cmd response: failed
3,741,563 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,741,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,554 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,670 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,821 UART: [state] WD Timer not started. Device not locked for debugging
88,150 UART: [kat] SHA2-256
893,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,925 UART: [kat] ++
898,077 UART: [kat] sha1
902,317 UART: [kat] SHA2-256
904,257 UART: [kat] SHA2-384
907,100 UART: [kat] SHA2-512-ACC
909,001 UART: [kat] ECC-384
918,928 UART: [kat] HMAC-384Kdf
923,532 UART: [kat] LMS
1,171,860 UART: [kat] --
1,172,557 UART: [cold-reset] ++
1,173,043 UART: [fht] FHT @ 0x50003400
1,175,790 UART: [idev] ++
1,175,958 UART: [idev] CDI.KEYID = 6
1,176,318 UART: [idev] SUBJECT.KEYID = 7
1,176,742 UART: [idev] UDS.KEYID = 0
1,177,087 ready_for_fw is high
1,177,087 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,676 UART: [idev] Erasing UDS.KEYID = 0
1,201,895 UART: [idev] Sha1 KeyId Algorithm
1,210,369 UART: [idev] --
1,211,489 UART: [ldev] ++
1,211,657 UART: [ldev] CDI.KEYID = 6
1,212,020 UART: [ldev] SUBJECT.KEYID = 5
1,212,446 UART: [ldev] AUTHORITY.KEYID = 7
1,212,909 UART: [ldev] FE.KEYID = 1
1,218,169 UART: [ldev] Erasing FE.KEYID = 1
1,243,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,283,118 UART: [fwproc] Wait for Commands...
1,283,880 UART: [fwproc] Recv command 0x46574c44
1,284,608 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,541 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,845 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,822 >>> mbox cmd response: success
2,782,960 UART: [afmc] ++
2,783,128 UART: [afmc] CDI.KEYID = 6
2,783,490 UART: [afmc] SUBJECT.KEYID = 7
2,783,915 UART: [afmc] AUTHORITY.KEYID = 5
2,819,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,945 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,830 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,549 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,177 UART: [afmc] --
2,862,147 UART: [cold-reset] --
2,862,859 UART: [state] Locking Datavault
2,864,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,836 UART: [state] Locking ICCM
2,865,322 UART: [exit] Launching FMC @ 0x40000130
2,870,651 UART:
2,870,667 UART: Running Caliptra FMC ...
2,871,075 UART:
2,871,129 UART: [state] CFI Enabled
2,881,526 UART: [fht] FMC Alias Private Key: 7
2,989,449 UART: [art] Extend RT PCRs Done
2,989,877 UART: [art] Lock RT PCRs Done
2,991,049 UART: [art] Populate DV Done
2,999,314 UART: [fht] FMC Alias Private Key: 7
3,000,410 UART: [art] Derive CDI
3,000,690 UART: [art] Store in in slot 0x4
3,086,443 UART: [art] Derive Key Pair
3,086,803 UART: [art] Store priv key in slot 0x5
3,099,647 UART: [art] Derive Key Pair - Done
3,114,507 UART: [art] Signing Cert with AUTHO
3,114,987 UART: RITY.KEYID = 7
3,129,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,752 UART: [art] PUB.X = 938948B76DB3D8F5A090CF122B7221109DD804A6D76150F8B005913B8898AABCAFBF86F41E393C0091763AC193A59878
3,137,492 UART: [art] PUB.Y = A754A3FF90F40B4811BBE6E9387805980287E6A3409D60736369322E3E46F8E84DA1B324058A4265428C9649D7A71DA6
3,144,420 UART: [art] SIG.R = 8FFDCA5FE12398115DC3AE77563283646E4C1E06BF55C9D60E890032C399208D66B9668C166861DA85B0C0ACC8013B75
3,151,159 UART: [art] SIG.S = 54077D35638622A61F1992568614DCE8A47BC91EB0C358964C76A8CFC708A27A3A17316EE7881FE533BC8C9C5FCF047B
3,175,085 UART: Caliptra RT
3,175,338 UART: [state] CFI Enabled
3,283,547 UART: [rt] RT listening for mailbox commands...
3,284,210 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,827 UART: [rt]cmd =0x46504c54, len=4
3,314,991 >>> mbox cmd response data (8 bytes)
3,315,112 UART: [rt] FIPS self test
3,315,440 UART: [kat] ++
3,315,592 UART: [kat] sha1
3,319,822 UART: [kat] SHA2-256
3,321,844 UART: [kat] SHA2-384
3,324,793 UART: [kat] SHA2-512-ACC
3,326,720 UART: [kat] ECC-384
3,336,370 UART: [kat] HMAC-384Kdf
3,341,068 UART: [kat] LMS
3,609,592 UART: Fatal Error: 0x90070002
3,611,131 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,611,136 >>> mbox cmd response: failed
3,611,136 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,611,141 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,843 UART: [kat] SHA2-256
903,783 UART: [kat] SHA2-384
906,660 UART: [kat] SHA2-512-ACC
908,561 UART: [kat] ECC-384
918,400 UART: [kat] HMAC-384Kdf
922,994 UART: [kat] LMS
1,171,322 UART: [kat] --
1,172,251 UART: [cold-reset] ++
1,172,647 UART: [fht] FHT @ 0x50003400
1,175,152 UART: [idev] ++
1,175,320 UART: [idev] CDI.KEYID = 6
1,175,680 UART: [idev] SUBJECT.KEYID = 7
1,176,104 UART: [idev] UDS.KEYID = 0
1,176,449 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,068 UART: [idev] Erasing UDS.KEYID = 0
1,201,189 UART: [idev] Sha1 KeyId Algorithm
1,209,557 UART: [idev] --
1,210,517 UART: [ldev] ++
1,210,685 UART: [ldev] CDI.KEYID = 6
1,211,048 UART: [ldev] SUBJECT.KEYID = 5
1,211,474 UART: [ldev] AUTHORITY.KEYID = 7
1,211,937 UART: [ldev] FE.KEYID = 1
1,217,155 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,483 UART: [ldev] --
1,282,920 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,390 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,023 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,327 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,226 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,549 ready_for_fw is high
1,059,549 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,253 >>> mbox cmd response: success
2,695,679 UART:
2,695,695 UART: Running Caliptra FMC ...
2,696,103 UART:
2,696,157 UART: [state] CFI Enabled
2,706,390 UART: [fht] FMC Alias Private Key: 7
2,814,283 UART: [art] Extend RT PCRs Done
2,814,711 UART: [art] Lock RT PCRs Done
2,816,629 UART: [art] Populate DV Done
2,825,080 UART: [fht] FMC Alias Private Key: 7
2,826,234 UART: [art] Derive CDI
2,826,514 UART: [art] Store in in slot 0x4
2,912,137 UART: [art] Derive Key Pair
2,912,497 UART: [art] Store priv key in slot 0x5
2,925,547 UART: [art] Derive Key Pair - Done
2,940,353 UART: [art] Signing Cert with AUTHO
2,940,833 UART: RITY.KEYID = 7
2,956,445 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,210 UART: [art] PUB.X = B6B46F8466A9D16D2C96B78455F7EF7D35109EF90079AE0275C0495F2A63ED58D9D9EEFB6F7776C50A058E16C325E115
2,963,953 UART: [art] PUB.Y = 798CE797D28555231CC4D09A0AD9E57A909EE998127D34CFC7919C6A47095F5F2884F32C8799ED47D392EC75D934908D
2,970,895 UART: [art] SIG.R = FC2BC847D396CF608ABDA9FA28D51B2CB886CEA6E373032BBE572DCC7F5970B9D0C683D5DE29EFA67A9C43B300C2C1FF
2,977,666 UART: [art] SIG.S = CF958F01E9F40599BB033F43022BE8CFCBC50166CDD5C0F32F8C75D4156F1308D2AEF2982AF9FB6E096CE9E361E6645A
3,001,694 UART: Caliptra RT
3,001,947 UART: [state] CFI Enabled
3,109,349 UART: [rt] RT listening for mailbox commands...
3,110,012 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,985 UART: [rt]cmd =0x46504c54, len=4
3,140,979 >>> mbox cmd response data (8 bytes)
3,141,160 UART: [rt] FIPS self test
3,141,488 UART: [kat] ++
3,141,640 UART: [kat] sha1
3,145,940 UART: [kat] SHA2-256
3,147,962 UART: [kat] SHA2-384
3,150,957 UART: [kat] SHA2-512-ACC
3,152,884 UART: [kat] ECC-384
3,162,928 UART: [kat] HMAC-384Kdf
3,167,538 UART: [kat] LMS
3,436,206 UART: Fatal Error: 0x90070002
3,437,745 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,437,750 >>> mbox cmd response: failed
3,437,750 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,437,755 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,059 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,773 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,032 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
893,861 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,986 UART: [kat] ++
898,138 UART: [kat] sha1
902,294 UART: [kat] SHA2-256
904,234 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,701 UART: [kat] HMAC-384Kdf
923,433 UART: [kat] LMS
1,171,761 UART: [kat] --
1,172,648 UART: [cold-reset] ++
1,173,218 UART: [fht] FHT @ 0x50003400
1,175,735 UART: [idev] ++
1,175,903 UART: [idev] CDI.KEYID = 6
1,176,263 UART: [idev] SUBJECT.KEYID = 7
1,176,687 UART: [idev] UDS.KEYID = 0
1,177,032 ready_for_fw is high
1,177,032 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,525 UART: [idev] Erasing UDS.KEYID = 0
1,201,088 UART: [idev] Sha1 KeyId Algorithm
1,209,398 UART: [idev] --
1,210,582 UART: [ldev] ++
1,210,750 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,539 UART: [ldev] AUTHORITY.KEYID = 7
1,212,002 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,244,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,940 UART: [ldev] --
1,284,293 UART: [fwproc] Wait for Commands...
1,285,019 UART: [fwproc] Recv command 0x46574c44
1,285,747 UART: [fwproc] Recv'd Img size: 115032 bytes
2,591,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,782 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,086 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,977 >>> mbox cmd response: success
2,786,217 UART: [afmc] ++
2,786,385 UART: [afmc] CDI.KEYID = 6
2,786,747 UART: [afmc] SUBJECT.KEYID = 7
2,787,172 UART: [afmc] AUTHORITY.KEYID = 5
2,822,909 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,839,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,840,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,938 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,851,823 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,857,542 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,865,426 UART: [afmc] --
2,866,398 UART: [cold-reset] --
2,867,406 UART: [state] Locking Datavault
2,868,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,869,037 UART: [state] Locking ICCM
2,869,533 UART: [exit] Launching FMC @ 0x40000130
2,874,862 UART:
2,874,878 UART: Running Caliptra FMC ...
2,875,286 UART:
2,875,429 UART: [state] CFI Enabled
2,886,038 UART: [fht] FMC Alias Private Key: 7
2,993,747 UART: [art] Extend RT PCRs Done
2,994,175 UART: [art] Lock RT PCRs Done
2,995,449 UART: [art] Populate DV Done
3,003,794 UART: [fht] FMC Alias Private Key: 7
3,004,724 UART: [art] Derive CDI
3,005,004 UART: [art] Store in in slot 0x4
3,090,799 UART: [art] Derive Key Pair
3,091,159 UART: [art] Store priv key in slot 0x5
3,104,487 UART: [art] Derive Key Pair - Done
3,119,190 UART: [art] Signing Cert with AUTHO
3,119,670 UART: RITY.KEYID = 7
3,134,780 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,545 UART: [art] PUB.X = 5095DA4F49517B776A5CBB3A5EE683A1BEB5A4D1A7E21C60D675E80905F9B0F1035BBC61DED8035214FD4901F5795384
3,142,306 UART: [art] PUB.Y = 275D250E175B76FB7ECC5598D4866B52AFC316448A3F2B7CADE12008CD32DF5E623817E43FED25BFDF3AF2711CD19BF5
3,149,266 UART: [art] SIG.R = 5DCC7F2170FEFB74394C9C40CEF08D98856D98946FC8B2CBC2164B8479B877D1CF58B809BEF40A6D6F808E2EA1F8E407
3,156,041 UART: [art] SIG.S = 057B15EA86E049A962777DE9090D970523452BE94EEA51EC98C543C501425A0A103FC4DCFCB3B12D96825F7A9873794B
3,180,072 UART: Caliptra RT
3,180,417 UART: [state] CFI Enabled
3,289,154 UART: [rt] RT listening for mailbox commands...
3,289,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,682 UART: [rt]cmd =0x46504c54, len=4
3,320,834 >>> mbox cmd response data (8 bytes)
3,321,091 UART: [rt] FIPS self test
3,321,419 UART: [kat] ++
3,321,571 UART: [kat] sha1
3,325,985 UART: [kat] SHA2-256
3,328,007 UART: [kat] SHA2-384
3,330,952 UART: [kat] SHA2-512-ACC
3,332,879 UART: [kat] ECC-384
3,342,757 UART: [kat] HMAC-384Kdf
3,347,329 UART: [kat] LMS
3,616,033 UART: Fatal Error: 0x90070002
3,617,572 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,617,577 >>> mbox cmd response: failed
3,617,577 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,617,582 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,147 UART: [kat] SHA2-256
893,797 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,922 UART: [kat] ++
898,074 UART: [kat] sha1
902,332 UART: [kat] SHA2-256
904,272 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,655 UART: [kat] HMAC-384Kdf
923,365 UART: [kat] LMS
1,171,693 UART: [kat] --
1,172,654 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,769 UART: [idev] ++
1,175,937 UART: [idev] CDI.KEYID = 6
1,176,297 UART: [idev] SUBJECT.KEYID = 7
1,176,721 UART: [idev] UDS.KEYID = 0
1,177,066 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,755 UART: [idev] Erasing UDS.KEYID = 0
1,202,166 UART: [idev] Sha1 KeyId Algorithm
1,210,640 UART: [idev] --
1,211,784 UART: [ldev] ++
1,211,952 UART: [ldev] CDI.KEYID = 6
1,212,315 UART: [ldev] SUBJECT.KEYID = 5
1,212,741 UART: [ldev] AUTHORITY.KEYID = 7
1,213,204 UART: [ldev] FE.KEYID = 1
1,218,462 UART: [ldev] Erasing FE.KEYID = 1
1,244,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,131 UART: [fwproc] Wait for Commands...
1,284,809 UART: [fwproc] Recv command 0x46574c44
1,285,537 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,074 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,378 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,175 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,072 ready_for_fw is high
1,060,072 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,990 >>> mbox cmd response: success
2,696,512 UART:
2,696,528 UART: Running Caliptra FMC ...
2,696,936 UART:
2,697,079 UART: [state] CFI Enabled
2,707,564 UART: [fht] FMC Alias Private Key: 7
2,815,175 UART: [art] Extend RT PCRs Done
2,815,603 UART: [art] Lock RT PCRs Done
2,817,115 UART: [art] Populate DV Done
2,825,374 UART: [fht] FMC Alias Private Key: 7
2,826,312 UART: [art] Derive CDI
2,826,592 UART: [art] Store in in slot 0x4
2,912,259 UART: [art] Derive Key Pair
2,912,619 UART: [art] Store priv key in slot 0x5
2,925,323 UART: [art] Derive Key Pair - Done
2,940,064 UART: [art] Signing Cert with AUTHO
2,940,544 UART: RITY.KEYID = 7
2,955,558 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,323 UART: [art] PUB.X = 4C137B879866B4E6AFBA8AFD02E9E906D03AA5F778BE23E3751EEC53FD8AC1A2879DD1FFC916B653CFDDEFEB3004E3B2
2,963,110 UART: [art] PUB.Y = 0A2C40460D3311FE92B5E247C28EAD8B4B751C4AE37F1EEF7636F1D06B008D82FF2EA85893B6F4EE8D3EE6A9971C002B
2,970,024 UART: [art] SIG.R = EB90603E6379FE1517861A2E880EFC5AAD6B56FB8C2A53463BA804455ACF1041CDC3A64744F75848DABFEEBDA0AF5244
2,976,804 UART: [art] SIG.S = 73AE775F20D1D92F2A8FE1F57439C7B0124D3245014A530D66027CE60640F90CF12F6C5E79418CA7B4A9BCB2358FE25A
3,000,634 UART: Caliptra RT
3,000,979 UART: [state] CFI Enabled
3,109,506 UART: [rt] RT listening for mailbox commands...
3,110,169 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,742 UART: [rt]cmd =0x46504c54, len=4
3,140,898 >>> mbox cmd response data (8 bytes)
3,141,163 UART: [rt] FIPS self test
3,141,491 UART: [kat] ++
3,141,643 UART: [kat] sha1
3,145,853 UART: [kat] SHA2-256
3,147,875 UART: [kat] SHA2-384
3,150,916 UART: [kat] SHA2-512-ACC
3,152,843 UART: [kat] ECC-384
3,163,023 UART: [kat] HMAC-384Kdf
3,167,637 UART: [kat] LMS
3,436,301 UART: Fatal Error: 0x90070002
3,437,840 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,437,845 >>> mbox cmd response: failed
3,437,845 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,437,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,730 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,000 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,247 UART: [kat] ++
895,399 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,900 UART: [kat] HMAC-384Kdf
920,386 UART: [kat] LMS
1,168,698 UART: [kat] --
1,169,787 UART: [cold-reset] ++
1,170,363 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 ready_for_fw is high
1,174,361 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,995 UART: [idev] Erasing UDS.KEYID = 0
1,198,913 UART: [idev] Sha1 KeyId Algorithm
1,207,765 UART: [idev] --
1,208,664 UART: [ldev] ++
1,208,832 UART: [ldev] CDI.KEYID = 6
1,209,196 UART: [ldev] SUBJECT.KEYID = 5
1,209,623 UART: [ldev] AUTHORITY.KEYID = 7
1,210,086 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,241,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,192 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46574c44
1,282,084 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,551 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,860 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,738 >>> mbox cmd response: success
2,781,909 UART: [afmc] ++
2,782,077 UART: [afmc] CDI.KEYID = 6
2,782,440 UART: [afmc] SUBJECT.KEYID = 7
2,782,866 UART: [afmc] AUTHORITY.KEYID = 5
2,818,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,164 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,893 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,776 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,495 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,316 UART: [afmc] --
2,861,248 UART: [cold-reset] --
2,862,078 UART: [state] Locking Datavault
2,862,995 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,599 UART: [state] Locking ICCM
2,864,039 UART: [exit] Launching FMC @ 0x40000130
2,869,368 UART:
2,869,384 UART: Running Caliptra FMC ...
2,869,792 UART:
2,869,846 UART: [state] CFI Enabled
2,880,287 UART: [fht] FMC Alias Private Key: 7
2,988,628 UART: [art] Extend RT PCRs Done
2,989,056 UART: [art] Lock RT PCRs Done
2,990,530 UART: [art] Populate DV Done
2,998,859 UART: [fht] FMC Alias Private Key: 7
2,999,799 UART: [art] Derive CDI
3,000,079 UART: [art] Store in in slot 0x4
3,085,606 UART: [art] Derive Key Pair
3,085,966 UART: [art] Store priv key in slot 0x5
3,099,050 UART: [art] Derive Key Pair - Done
3,113,917 UART: [art] Signing Cert with AUTHO
3,114,397 UART: RITY.KEYID = 7
3,129,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,002 UART: [art] PUB.X = 2EB928B94FB1517FF01E247AFBACCD4810EC76B2CE1A5BA50155F9054FC8063FE63621EE5BC7495460BB9AE2CAB116D2
3,136,781 UART: [art] PUB.Y = ED903735E549CC1D2B8D4D3FA5EE511A67AEE9AE6F0DE81B0A0C0D9F3198185110C2AC305F509139C2A95E4227A73A35
3,143,729 UART: [art] SIG.R = 7CCFC045A813D69F386A96C4B2906FBDF2452E77AE8CFF638192DEF85B163BDC39E5BA167A53BEDF877DCF472EF05151
3,150,517 UART: [art] SIG.S = 64184C967BE50C494C6F305C102A211C3B77C738F97AE84B2388A1730BA71216C1F2824D391B30E2A58F9075F32F1A0F
3,173,779 UART: Caliptra RT
3,174,032 UART: [state] CFI Enabled
3,282,053 UART: [rt] RT listening for mailbox commands...
3,282,716 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,409 UART: [rt]cmd =0x46504c54, len=4
3,313,691 >>> mbox cmd response data (8 bytes)
3,313,994 UART: [rt] FIPS self test
3,314,322 UART: [kat] ++
3,314,474 UART: [kat] sha1
3,318,714 UART: [kat] SHA2-256
3,320,736 UART: [kat] SHA2-384
3,323,677 UART: [kat] SHA2-512-ACC
3,325,604 UART: [kat] ECC-384
3,335,348 UART: [kat] HMAC-384Kdf
3,339,776 UART: [kat] LMS
3,608,362 UART: Fatal Error: 0x90070002
3,609,901 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,609,906 >>> mbox cmd response: failed
3,609,906 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,609,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,988 UART: [kat] SHA2-256
891,538 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
915,726 UART: [kat] HMAC-384Kdf
920,222 UART: [kat] LMS
1,168,534 UART: [kat] --
1,169,337 UART: [cold-reset] ++
1,169,801 UART: [fht] FHT @ 0x50003400
1,172,251 UART: [idev] ++
1,172,419 UART: [idev] CDI.KEYID = 6
1,172,780 UART: [idev] SUBJECT.KEYID = 7
1,173,205 UART: [idev] UDS.KEYID = 0
1,173,551 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,180,889 UART: [idev] Erasing UDS.KEYID = 0
1,197,773 UART: [idev] Sha1 KeyId Algorithm
1,206,625 UART: [idev] --
1,207,582 UART: [ldev] ++
1,207,750 UART: [ldev] CDI.KEYID = 6
1,208,114 UART: [ldev] SUBJECT.KEYID = 5
1,208,541 UART: [ldev] AUTHORITY.KEYID = 7
1,209,004 UART: [ldev] FE.KEYID = 1
1,214,248 UART: [ldev] Erasing FE.KEYID = 1
1,240,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,800 UART: [ldev] --
1,279,254 UART: [fwproc] Wait for Commands...
1,279,847 UART: [fwproc] Recv command 0x46574c44
1,280,580 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,291 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,600 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,596 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,662 ready_for_fw is high
1,055,662 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,352 >>> mbox cmd response: success
2,693,366 UART:
2,693,382 UART: Running Caliptra FMC ...
2,693,790 UART:
2,693,844 UART: [state] CFI Enabled
2,704,403 UART: [fht] FMC Alias Private Key: 7
2,811,852 UART: [art] Extend RT PCRs Done
2,812,280 UART: [art] Lock RT PCRs Done
2,814,206 UART: [art] Populate DV Done
2,822,577 UART: [fht] FMC Alias Private Key: 7
2,823,689 UART: [art] Derive CDI
2,823,969 UART: [art] Store in in slot 0x4
2,909,380 UART: [art] Derive Key Pair
2,909,740 UART: [art] Store priv key in slot 0x5
2,922,876 UART: [art] Derive Key Pair - Done
2,938,100 UART: [art] Signing Cert with AUTHO
2,938,580 UART: RITY.KEYID = 7
2,953,788 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,553 UART: [art] PUB.X = 94951FD9E5F4C58688D76FCBD098ECDC9AAFDA9836B81E4D4073A53DED68E2F130468206D9363D38E1255B3A66DC9217
2,961,328 UART: [art] PUB.Y = 513192B07529E3546AF76F60D6CA75DE777848B4B9204383D677C4C037D5AF223BFC0D70FB881438CFF764FCD826DFA5
2,968,279 UART: [art] SIG.R = 6FA20EB058557CED01A51CC54B023ACE8D9BD10CC5C5F3ABBB2E206127F4FE3C49B83FBD1E96F3E274469D4821A28733
2,975,053 UART: [art] SIG.S = 4928FF19310F0F9A88F4F554381BF35564D1F721060BD6013DA3740A460DE40965C507259A4B3BE2455ADEFA83B34525
2,998,485 UART: Caliptra RT
2,998,738 UART: [state] CFI Enabled
3,106,661 UART: [rt] RT listening for mailbox commands...
3,107,324 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,009 UART: [rt]cmd =0x46504c54, len=4
3,138,251 >>> mbox cmd response data (8 bytes)
3,138,458 UART: [rt] FIPS self test
3,138,786 UART: [kat] ++
3,138,938 UART: [kat] sha1
3,143,150 UART: [kat] SHA2-256
3,145,172 UART: [kat] SHA2-384
3,148,053 UART: [kat] SHA2-512-ACC
3,149,980 UART: [kat] ECC-384
3,159,918 UART: [kat] HMAC-384Kdf
3,164,682 UART: [kat] LMS
3,433,242 UART: Fatal Error: 0x90070002
3,434,781 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,434,786 >>> mbox cmd response: failed
3,434,786 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,434,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,636 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,336 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,696 UART: [kat] ++
895,848 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
904,847 UART: [kat] SHA2-512-ACC
906,748 UART: [kat] ECC-384
916,747 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,834 UART: [fht] FHT @ 0x50003400
1,173,504 UART: [idev] ++
1,173,672 UART: [idev] CDI.KEYID = 6
1,174,033 UART: [idev] SUBJECT.KEYID = 7
1,174,458 UART: [idev] UDS.KEYID = 0
1,174,804 ready_for_fw is high
1,174,804 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,872 UART: [idev] Erasing UDS.KEYID = 0
1,199,820 UART: [idev] Sha1 KeyId Algorithm
1,208,572 UART: [idev] --
1,209,477 UART: [ldev] ++
1,209,645 UART: [ldev] CDI.KEYID = 6
1,210,009 UART: [ldev] SUBJECT.KEYID = 5
1,210,436 UART: [ldev] AUTHORITY.KEYID = 7
1,210,899 UART: [ldev] FE.KEYID = 1
1,216,257 UART: [ldev] Erasing FE.KEYID = 1
1,243,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,282,095 UART: [fwproc] Wait for Commands...
1,282,790 UART: [fwproc] Recv command 0x46574c44
1,283,523 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,936 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,245 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,005 >>> mbox cmd response: success
2,783,026 UART: [afmc] ++
2,783,194 UART: [afmc] CDI.KEYID = 6
2,783,557 UART: [afmc] SUBJECT.KEYID = 7
2,783,983 UART: [afmc] AUTHORITY.KEYID = 5
2,819,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,641 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,370 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,253 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,972 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,863 UART: [afmc] --
2,862,837 UART: [cold-reset] --
2,863,659 UART: [state] Locking Datavault
2,864,870 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,474 UART: [state] Locking ICCM
2,865,994 UART: [exit] Launching FMC @ 0x40000130
2,871,323 UART:
2,871,339 UART: Running Caliptra FMC ...
2,871,747 UART:
2,871,890 UART: [state] CFI Enabled
2,882,837 UART: [fht] FMC Alias Private Key: 7
2,990,820 UART: [art] Extend RT PCRs Done
2,991,248 UART: [art] Lock RT PCRs Done
2,993,096 UART: [art] Populate DV Done
3,001,405 UART: [fht] FMC Alias Private Key: 7
3,002,493 UART: [art] Derive CDI
3,002,773 UART: [art] Store in in slot 0x4
3,088,810 UART: [art] Derive Key Pair
3,089,170 UART: [art] Store priv key in slot 0x5
3,103,224 UART: [art] Derive Key Pair - Done
3,118,209 UART: [art] Signing Cert with AUTHO
3,118,689 UART: RITY.KEYID = 7
3,133,879 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,644 UART: [art] PUB.X = 3865220D73A9E23430E4EF47B1B84A951B36CF13E96167D174FD5839439A4DDF32F71FDE9A464CCF26828EEE853828D6
3,141,413 UART: [art] PUB.Y = 6E2CDC07C8F2F555C85ED6BA36F3E10624DF91E5ED00703A1014712E74989E48BD7A2AF99F34A71931C6FA41C7179EEE
3,148,345 UART: [art] SIG.R = EDCA811781B1091668BBC3CB6BA5268A404E04143981B9CCDACE95439E89C16FBACC36DDC3677E07687D3ACD25B190C6
3,155,120 UART: [art] SIG.S = E1ECE40D0996D6D3FCA49E3AA602FB269670AF3630D203983B7857C18057313D4F32B857D80F70E528B41966F351E886
3,178,744 UART: Caliptra RT
3,179,089 UART: [state] CFI Enabled
3,287,627 UART: [rt] RT listening for mailbox commands...
3,288,290 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,975 UART: [rt]cmd =0x46504c54, len=4
3,319,207 >>> mbox cmd response data (8 bytes)
3,319,532 UART: [rt] FIPS self test
3,319,860 UART: [kat] ++
3,320,012 UART: [kat] sha1
3,324,472 UART: [kat] SHA2-256
3,326,494 UART: [kat] SHA2-384
3,329,229 UART: [kat] SHA2-512-ACC
3,331,156 UART: [kat] ECC-384
3,341,640 UART: [kat] HMAC-384Kdf
3,346,242 UART: [kat] LMS
3,614,800 UART: Fatal Error: 0x90070002
3,616,339 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,616,344 >>> mbox cmd response: failed
3,616,344 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,616,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,785 UART: [state] LifecycleState = Unprovisioned
86,440 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,325 UART: [kat] SHA2-256
891,875 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,004 UART: [kat] ++
896,156 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
905,005 UART: [kat] SHA2-512-ACC
906,906 UART: [kat] ECC-384
916,911 UART: [kat] HMAC-384Kdf
921,519 UART: [kat] LMS
1,169,831 UART: [kat] --
1,170,666 UART: [cold-reset] ++
1,171,216 UART: [fht] FHT @ 0x50003400
1,174,058 UART: [idev] ++
1,174,226 UART: [idev] CDI.KEYID = 6
1,174,587 UART: [idev] SUBJECT.KEYID = 7
1,175,012 UART: [idev] UDS.KEYID = 0
1,175,358 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,294 UART: [idev] Erasing UDS.KEYID = 0
1,200,304 UART: [idev] Sha1 KeyId Algorithm
1,209,344 UART: [idev] --
1,210,457 UART: [ldev] ++
1,210,625 UART: [ldev] CDI.KEYID = 6
1,210,989 UART: [ldev] SUBJECT.KEYID = 5
1,211,416 UART: [ldev] AUTHORITY.KEYID = 7
1,211,879 UART: [ldev] FE.KEYID = 1
1,216,767 UART: [ldev] Erasing FE.KEYID = 1
1,242,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,413 UART: [ldev] --
1,281,695 UART: [fwproc] Wait for Commands...
1,282,458 UART: [fwproc] Recv command 0x46574c44
1,283,191 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,836 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,832 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,141 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,011 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,251 ready_for_fw is high
1,056,251 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,479 >>> mbox cmd response: success
2,692,371 UART:
2,692,387 UART: Running Caliptra FMC ...
2,692,795 UART:
2,692,938 UART: [state] CFI Enabled
2,703,501 UART: [fht] FMC Alias Private Key: 7
2,811,576 UART: [art] Extend RT PCRs Done
2,812,004 UART: [art] Lock RT PCRs Done
2,813,562 UART: [art] Populate DV Done
2,821,887 UART: [fht] FMC Alias Private Key: 7
2,823,051 UART: [art] Derive CDI
2,823,331 UART: [art] Store in in slot 0x4
2,908,982 UART: [art] Derive Key Pair
2,909,342 UART: [art] Store priv key in slot 0x5
2,921,868 UART: [art] Derive Key Pair - Done
2,936,547 UART: [art] Signing Cert with AUTHO
2,937,027 UART: RITY.KEYID = 7
2,952,935 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,700 UART: [art] PUB.X = 5C257543CD3709E6AF2F4173AA4A260433B1E55809B5493A8CE5C5F7A012A836A9EEF7EFA7EA04568CE7800E982D1FEF
2,960,465 UART: [art] PUB.Y = 7CE28E3A6AD954F9D308253F5C9A26EAA67A2510196BCE609D939ADA18C570B521B3821DC296938251845837EA25792D
2,967,410 UART: [art] SIG.R = 6611FF20B70F529DDD4F05D7D51019E2594BB5DB423DD4A416643D8CF15B6C8E011E841D17EFFF2BF45C2BC305650B0A
2,974,174 UART: [art] SIG.S = C6A011C3260249441FC291DDA5FAF3A7D72F5011DB8560B4BC25DDDAE88D12CD13FA1376247D0CC1F985821E16ACF55E
2,997,519 UART: Caliptra RT
2,997,864 UART: [state] CFI Enabled
3,104,995 UART: [rt] RT listening for mailbox commands...
3,105,658 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,593 UART: [rt]cmd =0x46504c54, len=4
3,136,781 >>> mbox cmd response data (8 bytes)
3,136,912 UART: [rt] FIPS self test
3,137,240 UART: [kat] ++
3,137,392 UART: [kat] sha1
3,141,552 UART: [kat] SHA2-256
3,143,574 UART: [kat] SHA2-384
3,146,305 UART: [kat] SHA2-512-ACC
3,148,232 UART: [kat] ECC-384
3,158,464 UART: [kat] HMAC-384Kdf
3,163,010 UART: [kat] LMS
3,431,530 UART: Fatal Error: 0x90070002
3,433,069 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,433,074 >>> mbox cmd response: failed
3,433,074 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,433,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,287 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,649 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
2,667,150 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,811,015 >>> mbox cmd response: failed
2,811,574 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,954,545 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
4,862,519 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,442,709 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
2,671,950 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,816,091 >>> mbox cmd response: failed
2,816,673 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,959,706 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
4,855,964 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,396,516 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
3,024,347 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,168,281 >>> mbox cmd response: failed
3,168,851 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,311,890 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
21,584,288 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,021,721 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,023,147 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,167,259 >>> mbox cmd response: failed
3,167,815 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,310,676 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
21,592,534 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,031,216 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,663,109 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,807,446 >>> mbox cmd response: failed
2,807,997 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,951,453 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,481,974 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,298,410 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
2,687,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,831,681 >>> mbox cmd response: failed
2,832,249 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,975,703 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,451,519 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,316,175 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,038,753 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,183,099 >>> mbox cmd response: failed
3,183,673 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,327,047 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,173,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,881,702 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,040,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,184,832 >>> mbox cmd response: failed
3,185,387 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,328,774 >>> mbox cmd response: failed
Initializing fuses
991 writing to cptra_bootfsm_go
20,179,662 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,906,761 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,676,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,820,459 >>> mbox cmd response: failed
2,821,008 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,964,409 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,462,383 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,280,880 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,684,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,829,308 >>> mbox cmd response: failed
2,829,884 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,973,279 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,453,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,289,680 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,033,775 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,178,668 >>> mbox cmd response: failed
3,179,236 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,322,663 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,177,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,898,935 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,391 writing to cptra_bootfsm_go
3,044,012 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,188,340 >>> mbox cmd response: failed
3,188,910 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,332,144 >>> mbox cmd response: failed
Initializing fuses
1,027 writing to cptra_bootfsm_go
20,188,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,888,315 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,580 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,588 >>> mbox cmd response: failed
803,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,525 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,595 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,742 >>> mbox cmd response: failed
803,742 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,748 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,773 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,287 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,295 >>> mbox cmd response: failed
804,295 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,236 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,762 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,115 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,123 >>> mbox cmd response: failed
804,123 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,129 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,128 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,332 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,014 >>> mbox cmd response: failed
804,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,727 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,229 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,286 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,294 >>> mbox cmd response: failed
804,294 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,137 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,425 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,817 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,825 >>> mbox cmd response: failed
803,825 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,910 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,528 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,823 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,831 >>> mbox cmd response: failed
803,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,837 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,062 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,534 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,542 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,550 >>> mbox cmd response: failed
803,550 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,959 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
804,068 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,076 >>> mbox cmd response: failed
804,076 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
804,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,587 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,517 >>> mbox cmd response: failed
803,517 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,523 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,168 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
803,759 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,767 >>> mbox cmd response: failed
803,767 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
803,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,782 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,172 UART:
192,538 UART: Running Caliptra ROM ...
193,671 UART:
193,838 UART: [state] CFI Enabled
265,363 UART: [state] LifecycleState = Unprovisioned
267,340 UART: [state] DebugLocked = No
269,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,819 UART: [kat] SHA2-256
444,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,079 UART: [kat] ++
455,561 UART: [kat] sha1
467,360 UART: [kat] SHA2-256
470,014 UART: [kat] SHA2-384
474,979 UART: [kat] SHA2-512-ACC
477,314 UART: [kat] ECC-384
2,765,845 UART: [kat] HMAC-384Kdf
2,777,549 UART: [kat] LMS
3,967,859 UART: [kat] --
3,970,950 UART: [cold-reset] ++
3,972,055 UART: [fht] Storing FHT @ 0x50003400
3,982,549 UART: [idev] ++
3,983,117 UART: [idev] CDI.KEYID = 6
3,984,156 UART: [idev] SUBJECT.KEYID = 7
3,985,295 UART: [idev] UDS.KEYID = 0
3,986,315 ready_for_fw is high
3,986,539 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,130,889 UART: [idev] Erasing UDS.KEYID = 0
7,327,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,231 UART: [idev] --
7,352,912 UART: [ldev] ++
7,353,528 UART: [ldev] CDI.KEYID = 6
7,354,448 UART: [ldev] SUBJECT.KEYID = 5
7,355,560 UART: [ldev] AUTHORITY.KEYID = 7
7,356,801 UART: [ldev] FE.KEYID = 1
7,402,116 UART: [ldev] Erasing FE.KEYID = 1
10,736,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,318 UART: [ldev] --
13,115,650 UART: [fwproc] Waiting for Commands...
13,117,894 UART: [fwproc] Received command 0x46574c44
13,120,089 UART: [fwproc] Received Image of size 114716 bytes
17,180,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,255,603 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,324,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,642,967 >>> mbox cmd response: success
17,646,793 UART: [afmc] ++
17,647,444 UART: [afmc] CDI.KEYID = 6
17,648,358 UART: [afmc] SUBJECT.KEYID = 7
17,649,595 UART: [afmc] AUTHORITY.KEYID = 5
21,007,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,309,547 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,311,815 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,326,190 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,341,041 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,355,547 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,376,772 UART: [afmc] --
23,380,851 UART: [cold-reset] --
23,383,903 UART: [state] Locking Datavault
23,389,420 UART: [state] Locking PCR0, PCR1 and PCR31
23,391,173 UART: [state] Locking ICCM
23,392,299 UART: [exit] Launching FMC @ 0x40000130
23,400,694 UART:
23,400,929 UART: Running Caliptra FMC ...
23,402,027 UART:
23,402,211 UART: [state] CFI Enabled
23,459,716 UART: [fht] FMC Alias Private Key: 7
25,797,961 UART: [art] Extend RT PCRs Done
25,799,184 UART: [art] Lock RT PCRs Done
25,800,621 UART: [art] Populate DV Done
25,805,921 UART: [fht] FMC Alias Private Key: 7
25,807,621 UART: [art] Derive CDI
25,808,435 UART: [art] Store in in slot 0x4
25,868,180 UART: [art] Derive Key Pair
25,869,218 UART: [art] Store priv key in slot 0x5
29,162,904 UART: [art] Derive Key Pair - Done
29,176,118 UART: [art] Signing Cert with AUTHO
29,177,424 UART: RITY.KEYID = 7
31,464,326 UART: [art] Erasing AUTHORITY.KEYID = 7
31,465,834 UART: [art] PUB.X = F3BC2B27ADE42659B40CD263A1A133E49363D9EB67C9D3C3B1CFFAAC8075DF17A05C105BB171CE35B487F2C6DD7E9D15
31,473,082 UART: [art] PUB.Y = EB4D4A24FBA737CAA03AB6E95F96827D125E360D443CBF246D719A79ACB5A15F2BE17D435A377919189BA3B67E6783F4
31,480,351 UART: [art] SIG.R = 35C7AF9E63FC267809B75F0FC33DCF619595A57700FDA71106D9962FFE3296FA78D471EC26AD4C996D343A5A6A176433
31,487,691 UART: [art] SIG.S = FB164E6F064A1DDAA9D57BF47204223F7844D662B66AAA9BFC89A40DAAF1C660859299CBABD2088CCAE2D7C128A82160
32,792,950 UART: Caliptra RT
32,794,180 UART: [state] CFI Enabled
32,954,840 UART: [rt] RT listening for mailbox commands...
32,956,707 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,986,222 UART: [rt]cmd =0x46504c54, len=4
32,987,745 >>> mbox cmd response data (8 bytes)
32,988,776 UART: [rt] FIPS self test
32,989,728 UART: [kat] ++
32,990,183 UART: [kat] sha1
32,990,862 UART: Fatal Error: 0x90060001
33,026,070 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,170,158 >>> mbox cmd response: failed
33,170,780 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,314,836 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,051 UART:
190,341 UART: Running Caliptra ROM ...
191,459 UART:
191,613 UART: [state] CFI Enabled
262,688 UART: [state] LifecycleState = Unprovisioned
264,613 UART: [state] DebugLocked = No
266,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,932 UART: [kat] SHA2-256
440,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,128 UART: [kat] ++
451,600 UART: [kat] sha1
462,101 UART: [kat] SHA2-256
464,779 UART: [kat] SHA2-384
471,830 UART: [kat] SHA2-512-ACC
474,189 UART: [kat] ECC-384
2,765,593 UART: [kat] HMAC-384Kdf
2,776,411 UART: [kat] LMS
3,966,682 UART: [kat] --
3,972,050 UART: [cold-reset] ++
3,973,391 UART: [fht] Storing FHT @ 0x50003400
3,983,907 UART: [idev] ++
3,984,473 UART: [idev] CDI.KEYID = 6
3,985,489 UART: [idev] SUBJECT.KEYID = 7
3,986,647 UART: [idev] UDS.KEYID = 0
3,988,268 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,132,675 UART: [idev] Erasing UDS.KEYID = 0
7,323,588 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,556 UART: [idev] --
7,349,490 UART: [ldev] ++
7,350,058 UART: [ldev] CDI.KEYID = 6
7,351,050 UART: [ldev] SUBJECT.KEYID = 5
7,352,213 UART: [ldev] AUTHORITY.KEYID = 7
7,353,449 UART: [ldev] FE.KEYID = 1
7,401,968 UART: [ldev] Erasing FE.KEYID = 1
10,735,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,931 UART: [ldev] --
13,116,061 UART: [fwproc] Waiting for Commands...
13,118,807 UART: [fwproc] Received command 0x46574c44
13,120,990 UART: [fwproc] Received Image of size 114716 bytes
17,179,947 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,254,201 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,323,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,643,317 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,805,907 ready_for_fw is high
3,806,331 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,900,422 >>> mbox cmd response: success
23,599,748 UART:
23,600,158 UART: Running Caliptra FMC ...
23,601,280 UART:
23,601,430 UART: [state] CFI Enabled
23,672,637 UART: [fht] FMC Alias Private Key: 7
26,010,247 UART: [art] Extend RT PCRs Done
26,011,482 UART: [art] Lock RT PCRs Done
26,013,194 UART: [art] Populate DV Done
26,018,510 UART: [fht] FMC Alias Private Key: 7
26,020,055 UART: [art] Derive CDI
26,020,816 UART: [art] Store in in slot 0x4
26,081,132 UART: [art] Derive Key Pair
26,082,177 UART: [art] Store priv key in slot 0x5
29,375,598 UART: [art] Derive Key Pair - Done
29,388,266 UART: [art] Signing Cert with AUTHO
29,389,566 UART: RITY.KEYID = 7
31,677,087 UART: [art] Erasing AUTHORITY.KEYID = 7
31,678,920 UART: [art] PUB.X = AA4A9322A5B0437AFC34C299BCEF64D9EAA7907FE4BBEBE531E452CB0FDD1EE44C661FCE1B23754619FFE4CB321E40A2
31,685,923 UART: [art] PUB.Y = 66873A08620E0123E5E6D581FB481CEF24ED2C9A5A2BBF5DEE01D791C25056160CBC5A9CF90686C37FDC17029649226D
31,693,090 UART: [art] SIG.R = DA669C5EDC5F93A9017B56E4994F064B7533D124F4C7BCC27F1DDBD1035C367609EC72108B1E02EAF5DB2784D2870499
31,700,501 UART: [art] SIG.S = C932FB468D2DE923E2027A850622848E67ADD80BE6793FFAA90CA3A136244C2C05517893C835EB7507FCBA905F8E9D0C
33,005,912 UART: Caliptra RT
33,006,636 UART: [state] CFI Enabled
33,167,542 UART: [rt] RT listening for mailbox commands...
33,169,406 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,198,858 UART: [rt]cmd =0x46504c54, len=4
33,200,507 >>> mbox cmd response data (8 bytes)
33,201,639 UART: [rt] FIPS self test
33,202,586 UART: [kat] ++
33,203,040 UART: [kat] sha1
33,203,719 UART: Fatal Error: 0x90060001
33,239,037 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,383,056 >>> mbox cmd response: failed
33,383,716 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,527,778 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,801,950 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,888,345 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,504 UART:
192,864 UART: Running Caliptra ROM ...
194,015 UART:
603,835 UART: [state] CFI Enabled
619,902 UART: [state] LifecycleState = Unprovisioned
621,848 UART: [state] DebugLocked = No
623,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,467 UART: [kat] SHA2-256
799,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,743 UART: [kat] ++
810,214 UART: [kat] sha1
820,525 UART: [kat] SHA2-256
823,257 UART: [kat] SHA2-384
829,242 UART: [kat] SHA2-512-ACC
831,630 UART: [kat] ECC-384
3,114,063 UART: [kat] HMAC-384Kdf
3,127,398 UART: [kat] LMS
4,317,467 UART: [kat] --
4,322,129 UART: [cold-reset] ++
4,323,357 UART: [fht] Storing FHT @ 0x50003400
4,335,202 UART: [idev] ++
4,335,767 UART: [idev] CDI.KEYID = 6
4,336,655 UART: [idev] SUBJECT.KEYID = 7
4,337,910 UART: [idev] UDS.KEYID = 0
4,338,931 ready_for_fw is high
4,339,158 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,483,309 UART: [idev] Erasing UDS.KEYID = 0
7,631,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,304 UART: [idev] --
7,657,387 UART: [ldev] ++
7,657,983 UART: [ldev] CDI.KEYID = 6
7,658,956 UART: [ldev] SUBJECT.KEYID = 5
7,660,173 UART: [ldev] AUTHORITY.KEYID = 7
7,661,405 UART: [ldev] FE.KEYID = 1
7,670,917 UART: [ldev] Erasing FE.KEYID = 1
10,959,630 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,741 UART: [ldev] --
13,318,041 UART: [fwproc] Waiting for Commands...
13,320,306 UART: [fwproc] Received command 0x46574c44
13,322,488 UART: [fwproc] Received Image of size 114716 bytes
17,384,485 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,457,301 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,526,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,845,649 >>> mbox cmd response: success
17,849,019 UART: [afmc] ++
17,849,613 UART: [afmc] CDI.KEYID = 6
17,850,634 UART: [afmc] SUBJECT.KEYID = 7
17,851,789 UART: [afmc] AUTHORITY.KEYID = 5
21,164,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,458,535 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,460,843 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,475,233 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,031 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,504,455 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,526,424 UART: [afmc] --
23,529,927 UART: [cold-reset] --
23,534,600 UART: [state] Locking Datavault
23,541,576 UART: [state] Locking PCR0, PCR1 and PCR31
23,543,350 UART: [state] Locking ICCM
23,545,823 UART: [exit] Launching FMC @ 0x40000130
23,554,171 UART:
23,554,408 UART: Running Caliptra FMC ...
23,555,513 UART:
23,555,675 UART: [state] CFI Enabled
23,564,045 UART: [fht] FMC Alias Private Key: 7
25,895,074 UART: [art] Extend RT PCRs Done
25,896,305 UART: [art] Lock RT PCRs Done
25,897,904 UART: [art] Populate DV Done
25,903,262 UART: [fht] FMC Alias Private Key: 7
25,904,795 UART: [art] Derive CDI
25,905,612 UART: [art] Store in in slot 0x4
25,948,366 UART: [art] Derive Key Pair
25,949,405 UART: [art] Store priv key in slot 0x5
29,190,648 UART: [art] Derive Key Pair - Done
29,203,492 UART: [art] Signing Cert with AUTHO
29,204,824 UART: RITY.KEYID = 7
31,483,908 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,418 UART: [art] PUB.X = 4A7220D2D4D9651AE19820115725956C079425B5A027D573025E2AD87642A122E3020FF22C5D66640501D5FB54D4CA0A
31,492,662 UART: [art] PUB.Y = C9F920C6749BD5DC73BD578DD5CB976329E2DD23E10A8E52F734E46417F323B6BE2BB1BF9ED695283C76F7461C6292E8
31,499,901 UART: [art] SIG.R = 195FFDD4FE9B741305C8F610F493BE955E7D5D20372011B85EC0EDECA0F932C31C25C4133CBDD856198E64A282212DED
31,507,296 UART: [art] SIG.S = 9C05C0E308DCBFEEC27EA509758614961188AE06B96F1AEBFB37F88A1F4D624B228C88CFBF916801E77686B006456717
32,812,383 UART: Caliptra RT
32,813,098 UART: [state] CFI Enabled
32,930,162 UART: [rt] RT listening for mailbox commands...
32,932,009 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,961,693 UART: [rt]cmd =0x46504c54, len=4
32,963,291 >>> mbox cmd response data (8 bytes)
32,964,323 UART: [rt] FIPS self test
32,965,265 UART: [kat] ++
32,965,717 UART: [kat] sha1
32,966,297 UART: Fatal Error: 0x90060001
33,001,392 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,145,956 >>> mbox cmd response: failed
33,146,608 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,290,553 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,107 UART:
190,397 UART: Running Caliptra ROM ...
191,513 UART:
7,233,114 UART: [state] CFI Enabled
7,246,584 UART: [state] LifecycleState = Unprovisioned
7,248,508 UART: [state] DebugLocked = No
7,250,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,254,355 UART: [kat] SHA2-256
7,424,094 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,434,621 UART: [kat] ++
7,435,079 UART: [kat] sha1
7,446,830 UART: [kat] SHA2-256
7,449,518 UART: [kat] SHA2-384
7,456,260 UART: [kat] SHA2-512-ACC
7,458,616 UART: [kat] ECC-384
9,742,454 UART: [kat] HMAC-384Kdf
9,755,273 UART: [kat] LMS
10,945,413 UART: [kat] --
10,950,711 UART: [cold-reset] ++
10,951,940 UART: [fht] Storing FHT @ 0x50003400
10,963,747 UART: [idev] ++
10,964,308 UART: [idev] CDI.KEYID = 6
10,965,268 UART: [idev] SUBJECT.KEYID = 7
10,966,481 UART: [idev] UDS.KEYID = 0
10,968,041 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,112,072 UART: [idev] Erasing UDS.KEYID = 0
14,253,528 UART: [idev] Using Sha1 for KeyId Algorithm
14,275,557 UART: [idev] --
14,279,445 UART: [ldev] ++
14,280,013 UART: [ldev] CDI.KEYID = 6
14,280,978 UART: [ldev] SUBJECT.KEYID = 5
14,282,188 UART: [ldev] AUTHORITY.KEYID = 7
14,283,471 UART: [ldev] FE.KEYID = 1
14,294,604 UART: [ldev] Erasing FE.KEYID = 1
17,581,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,873,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,888,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,903,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,917,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,937,295 UART: [ldev] --
19,941,424 UART: [fwproc] Waiting for Commands...
19,943,375 UART: [fwproc] Received command 0x46574c44
19,945,564 UART: [fwproc] Received Image of size 114716 bytes
24,006,588 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,086,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,155,260 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,475,244 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
4,124,242 ready_for_fw is high
4,124,703 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,076,078 >>> mbox cmd response: success
23,719,124 UART:
23,719,517 UART: Running Caliptra FMC ...
23,720,642 UART:
23,720,796 UART: [state] CFI Enabled
23,728,768 UART: [fht] FMC Alias Private Key: 7
26,060,190 UART: [art] Extend RT PCRs Done
26,061,413 UART: [art] Lock RT PCRs Done
26,063,068 UART: [art] Populate DV Done
26,068,590 UART: [fht] FMC Alias Private Key: 7
26,070,249 UART: [art] Derive CDI
26,071,068 UART: [art] Store in in slot 0x4
26,113,883 UART: [art] Derive Key Pair
26,114,902 UART: [art] Store priv key in slot 0x5
29,356,721 UART: [art] Derive Key Pair - Done
29,369,620 UART: [art] Signing Cert with AUTHO
29,370,939 UART: RITY.KEYID = 7
31,649,904 UART: [art] Erasing AUTHORITY.KEYID = 7
31,651,421 UART: [art] PUB.X = C40018AABB742CB73FF3E4F039C15B8B9B2628059405EFAE8B7ED141E04DA315C86EAA94A02A51C5209388390841C1DD
31,658,686 UART: [art] PUB.Y = B1CA4DDA64333D5BB91B1A92EC3810F8CA3B0490E5EC75633443C0D6B3034AE40B74550088042BBDF19684555AAB0322
31,665,939 UART: [art] SIG.R = FF27480B6A7C2F7B8A7A2A5B7D18D936747B0349868160C37E894113EC4CFA0A7C416A6ADB6DA5D78FED889DDE54D9A8
31,673,293 UART: [art] SIG.S = 376EEB31E6AE5B58698CA61DCB54E2FEE2400FD5E2B4BC9E6DF262845B64C5EB28D372EA22D228A4037746CE28E3FE74
32,978,595 UART: Caliptra RT
32,979,324 UART: [state] CFI Enabled
33,095,869 UART: [rt] RT listening for mailbox commands...
33,097,725 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,127,530 UART: [rt]cmd =0x46504c54, len=4
33,129,215 >>> mbox cmd response data (8 bytes)
33,130,365 UART: [rt] FIPS self test
33,131,322 UART: [kat] ++
33,131,773 UART: [kat] sha1
33,132,556 UART: Fatal Error: 0x90060001
33,167,845 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,311,788 >>> mbox cmd response: failed
33,312,440 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,456,478 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
10,601,081 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,562,498 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,116 UART:
192,501 UART: Running Caliptra ROM ...
193,717 UART:
193,876 UART: [state] CFI Enabled
262,314 UART: [state] LifecycleState = Unprovisioned
264,144 UART: [state] DebugLocked = No
266,112 UART: [state] WD Timer not started. Device not locked for debugging
270,230 UART: [kat] SHA2-256
449,393 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,968 UART: [kat] ++
461,509 UART: [kat] sha1
472,181 UART: [kat] SHA2-256
475,189 UART: [kat] SHA2-384
480,324 UART: [kat] SHA2-512-ACC
483,261 UART: [kat] ECC-384
2,926,624 UART: [kat] HMAC-384Kdf
2,951,364 UART: [kat] LMS
3,480,752 UART: [kat] --
3,487,097 UART: [cold-reset] ++
3,488,284 UART: [fht] FHT @ 0x50003400
3,500,002 UART: [idev] ++
3,500,579 UART: [idev] CDI.KEYID = 6
3,501,499 UART: [idev] SUBJECT.KEYID = 7
3,502,674 UART: [idev] UDS.KEYID = 0
3,503,601 ready_for_fw is high
3,503,810 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,648,445 UART: [idev] Erasing UDS.KEYID = 0
6,007,643 UART: [idev] Sha1 KeyId Algorithm
6,030,381 UART: [idev] --
6,035,297 UART: [ldev] ++
6,035,867 UART: [ldev] CDI.KEYID = 6
6,036,932 UART: [ldev] SUBJECT.KEYID = 5
6,038,039 UART: [ldev] AUTHORITY.KEYID = 7
6,039,222 UART: [ldev] FE.KEYID = 1
6,079,956 UART: [ldev] Erasing FE.KEYID = 1
8,583,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,387,050 UART: [ldev] --
10,392,046 UART: [fwproc] Wait for Commands...
10,393,935 UART: [fwproc] Recv command 0x46574c44
10,396,035 UART: [fwproc] Recv'd Img size: 115032 bytes
13,807,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,562 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,953,375 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,273,849 >>> mbox cmd response: success
14,278,272 UART: [afmc] ++
14,278,858 UART: [afmc] CDI.KEYID = 6
14,279,745 UART: [afmc] SUBJECT.KEYID = 7
14,280,902 UART: [afmc] AUTHORITY.KEYID = 5
16,811,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,532,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,534,090 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,549,893 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,565,896 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,581,788 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,604,956 UART: [afmc] --
18,607,885 UART: [cold-reset] --
18,612,023 UART: [state] Locking Datavault
18,617,813 UART: [state] Locking PCR0, PCR1 and PCR31
18,619,459 UART: [state] Locking ICCM
18,620,615 UART: [exit] Launching FMC @ 0x40000130
18,629,011 UART:
18,629,250 UART: Running Caliptra FMC ...
18,630,350 UART:
18,630,508 UART: [state] CFI Enabled
18,691,373 UART: [fht] FMC Alias Private Key: 7
20,455,205 UART: [art] Extend RT PCRs Done
20,456,434 UART: [art] Lock RT PCRs Done
20,457,925 UART: [art] Populate DV Done
20,463,400 UART: [fht] FMC Alias Private Key: 7
20,465,103 UART: [art] Derive CDI
20,465,842 UART: [art] Store in in slot 0x4
20,524,128 UART: [art] Derive Key Pair
20,525,170 UART: [art] Store priv key in slot 0x5
22,988,401 UART: [art] Derive Key Pair - Done
23,001,018 UART: [art] Signing Cert with AUTHO
23,002,337 UART: RITY.KEYID = 7
24,714,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,715,687 UART: [art] PUB.X = 6ED6ACAD03E928C178711FE8F71586DED123FC991928878C253A05E1DADA3BAAC3A41BBA1D8A11376A4267CA27099FB8
24,722,976 UART: [art] PUB.Y = 804ADBA4BA3D635E36EC7DC71FA4821B90D49803EE1A6E59305149DDEF54714841BEAD99A56E0D52BB32C6ADB3CE7816
24,730,228 UART: [art] SIG.R = BDEE9DEFA35B4B9512A4E8BBDA32DBCB51385302F5014B6055B623E3C6157E962FE342CAD09938E4EA0868DCF0338142
24,737,689 UART: [art] SIG.S = 3AA3370EEE9549D00E270CB6CE16DC3666810EC7F6BD230A13C7E1EDD2D76D2B1840CD2E6070947158807CAC115EE0FA
25,716,633 UART: Caliptra RT
25,717,354 UART: [state] CFI Enabled
25,882,107 UART: [rt] RT listening for mailbox commands...
25,884,095 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,913,844 UART: [rt]cmd =0x46504c54, len=4
25,915,372 >>> mbox cmd response data (8 bytes)
25,916,554 UART: [rt] FIPS self test
25,917,493 UART: [kat] ++
25,917,948 UART: [kat] sha1
25,918,458 UART: Fatal Error: 0x90060001
25,953,659 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,098,199 >>> mbox cmd response: failed
26,098,863 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,243,268 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
190,120 UART:
190,413 UART: Running Caliptra ROM ...
191,522 UART:
191,669 UART: [state] CFI Enabled
257,873 UART: [state] LifecycleState = Unprovisioned
259,739 UART: [state] DebugLocked = No
261,927 UART: [state] WD Timer not started. Device not locked for debugging
265,229 UART: [kat] SHA2-256
444,340 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
455,946 UART: [kat] ++
456,487 UART: [kat] sha1
467,971 UART: [kat] SHA2-256
470,981 UART: [kat] SHA2-384
477,664 UART: [kat] SHA2-512-ACC
480,652 UART: [kat] ECC-384
2,945,780 UART: [kat] HMAC-384Kdf
2,968,383 UART: [kat] LMS
3,497,813 UART: [kat] --
3,501,770 UART: [cold-reset] ++
3,503,813 UART: [fht] FHT @ 0x50003400
3,515,332 UART: [idev] ++
3,515,899 UART: [idev] CDI.KEYID = 6
3,516,866 UART: [idev] SUBJECT.KEYID = 7
3,518,026 UART: [idev] UDS.KEYID = 0
3,519,545 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,664,264 UART: [idev] Erasing UDS.KEYID = 0
6,022,108 UART: [idev] Sha1 KeyId Algorithm
6,045,223 UART: [idev] --
6,048,551 UART: [ldev] ++
6,049,134 UART: [ldev] CDI.KEYID = 6
6,050,049 UART: [ldev] SUBJECT.KEYID = 5
6,051,233 UART: [ldev] AUTHORITY.KEYID = 7
6,052,521 UART: [ldev] FE.KEYID = 1
6,096,698 UART: [ldev] Erasing FE.KEYID = 1
8,597,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,348,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,364,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,654 UART: [ldev] --
10,389,174 UART: [fwproc] Wait for Commands...
10,391,493 UART: [fwproc] Recv command 0x46574c44
10,393,592 UART: [fwproc] Recv'd Img size: 115032 bytes
13,806,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,884,223 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,952,989 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,272,522 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
3,379,451 ready_for_fw is high
3,379,877 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,056,379 >>> mbox cmd response: success
18,348,444 UART:
18,348,829 UART: Running Caliptra FMC ...
18,349,967 UART:
18,350,128 UART: [state] CFI Enabled
18,413,902 UART: [fht] FMC Alias Private Key: 7
20,177,915 UART: [art] Extend RT PCRs Done
20,179,130 UART: [art] Lock RT PCRs Done
20,180,816 UART: [art] Populate DV Done
20,186,113 UART: [fht] FMC Alias Private Key: 7
20,187,816 UART: [art] Derive CDI
20,188,630 UART: [art] Store in in slot 0x4
20,247,911 UART: [art] Derive Key Pair
20,248,960 UART: [art] Store priv key in slot 0x5
22,712,344 UART: [art] Derive Key Pair - Done
22,725,346 UART: [art] Signing Cert with AUTHO
22,726,645 UART: RITY.KEYID = 7
24,437,412 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,932 UART: [art] PUB.X = C6AED8FECFD84AD1890115AB50F3D9CB0D0CD9C0F6286C02B495343B908B9A778321A9EE7029981A315CCEC8A1CCB15C
24,446,195 UART: [art] PUB.Y = 610A865E60EAC40179773B52A2612E68FC904AA1D9AFEA68D283E6C51E767FA6DB81CB5FF64964A52AE32F9B72B16D10
24,453,476 UART: [art] SIG.R = B5D9B6527CF15E61BC1B5A6D8D76DE4449396881D034C27300D5FE4876B8D3045CCB1A4A2B2D927F60C196623A50A1C5
24,460,871 UART: [art] SIG.S = 8E49333587DCE8042FA0A95DF4CCCB56C4CC97B651D2E4C31DE295BF494C1DA747EC74167C9F31BF152D7103BCE75D43
25,440,548 UART: Caliptra RT
25,441,255 UART: [state] CFI Enabled
25,604,541 UART: [rt] RT listening for mailbox commands...
25,606,410 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,636,195 UART: [rt]cmd =0x46504c54, len=4
25,637,669 >>> mbox cmd response data (8 bytes)
25,639,038 UART: [rt] FIPS self test
25,639,985 UART: [kat] ++
25,640,434 UART: [kat] sha1
25,641,139 UART: Fatal Error: 0x90060001
25,676,532 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,821,037 >>> mbox cmd response: failed
25,821,635 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,965,932 >>> mbox cmd response: failed
Initializing fuses
920 writing to cptra_bootfsm_go
3,381,326 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,095,904 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,746 UART:
193,108 UART: Running Caliptra ROM ...
194,329 UART:
603,835 UART: [state] CFI Enabled
615,535 UART: [state] LifecycleState = Unprovisioned
617,415 UART: [state] DebugLocked = No
619,936 UART: [state] WD Timer not started. Device not locked for debugging
624,361 UART: [kat] SHA2-256
803,463 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,050 UART: [kat] ++
815,583 UART: [kat] sha1
827,104 UART: [kat] SHA2-256
830,106 UART: [kat] SHA2-384
836,742 UART: [kat] SHA2-512-ACC
839,752 UART: [kat] ECC-384
3,279,205 UART: [kat] HMAC-384Kdf
3,292,574 UART: [kat] LMS
3,822,056 UART: [kat] --
3,827,571 UART: [cold-reset] ++
3,829,652 UART: [fht] FHT @ 0x50003400
3,840,489 UART: [idev] ++
3,841,049 UART: [idev] CDI.KEYID = 6
3,841,937 UART: [idev] SUBJECT.KEYID = 7
3,843,132 UART: [idev] UDS.KEYID = 0
3,844,033 ready_for_fw is high
3,844,244 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,988,750 UART: [idev] Erasing UDS.KEYID = 0
6,313,108 UART: [idev] Sha1 KeyId Algorithm
6,336,987 UART: [idev] --
6,341,689 UART: [ldev] ++
6,342,259 UART: [ldev] CDI.KEYID = 6
6,343,172 UART: [ldev] SUBJECT.KEYID = 5
6,344,385 UART: [ldev] AUTHORITY.KEYID = 7
6,345,615 UART: [ldev] FE.KEYID = 1
6,355,934 UART: [ldev] Erasing FE.KEYID = 1
8,831,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,502 UART: [ldev] --
10,620,856 UART: [fwproc] Wait for Commands...
10,623,315 UART: [fwproc] Recv command 0x46574c44
10,625,426 UART: [fwproc] Recv'd Img size: 115032 bytes
14,038,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,192 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,990 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,496,041 >>> mbox cmd response: success
14,500,331 UART: [afmc] ++
14,500,922 UART: [afmc] CDI.KEYID = 6
14,501,832 UART: [afmc] SUBJECT.KEYID = 7
14,502,994 UART: [afmc] AUTHORITY.KEYID = 5
17,001,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,527 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,338 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,203 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,578 UART: [afmc] --
18,799,125 UART: [cold-reset] --
18,804,606 UART: [state] Locking Datavault
18,809,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,811,338 UART: [state] Locking ICCM
18,813,538 UART: [exit] Launching FMC @ 0x40000130
18,821,931 UART:
18,822,168 UART: Running Caliptra FMC ...
18,823,269 UART:
18,823,431 UART: [state] CFI Enabled
18,831,268 UART: [fht] FMC Alias Private Key: 7
20,588,826 UART: [art] Extend RT PCRs Done
20,590,054 UART: [art] Lock RT PCRs Done
20,591,923 UART: [art] Populate DV Done
20,597,445 UART: [fht] FMC Alias Private Key: 7
20,599,094 UART: [art] Derive CDI
20,599,912 UART: [art] Store in in slot 0x4
20,642,511 UART: [art] Derive Key Pair
20,643,555 UART: [art] Store priv key in slot 0x5
23,069,953 UART: [art] Derive Key Pair - Done
23,083,058 UART: [art] Signing Cert with AUTHO
23,084,372 UART: RITY.KEYID = 7
24,789,842 UART: [art] Erasing AUTHORITY.KEYID = 7
24,791,347 UART: [art] PUB.X = 723B3CA75BBBB2948E38708CA1C61D79280D5858908C26137A34C1F90D64DA2D2065DABC2E5113DC79FB6B41BAC8C8C7
24,798,660 UART: [art] PUB.Y = B8C064BC90DD649B8F27755A8C2AC164641D3949B533FEC1B1723B2B574ADDFA34FAC19432C103F2BA6AE5BBCC2FDA86
24,805,906 UART: [art] SIG.R = 6CCE23F7FE37BA18DED312C2179845CB045EDD1481600A52B5B8ECCCAD9D52F9E4F9F25811C696C85D3FFE28A1CEF812
24,813,350 UART: [art] SIG.S = C5C759FE3E955FE107E4E77BB12A1C8663D20875C5A50379CD4590FDBC2C388156C738642918F64CE72B2E33EA64286D
25,792,095 UART: Caliptra RT
25,792,811 UART: [state] CFI Enabled
25,910,403 UART: [rt] RT listening for mailbox commands...
25,912,266 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,941,953 UART: [rt]cmd =0x46504c54, len=4
25,943,522 >>> mbox cmd response data (8 bytes)
25,944,631 UART: [rt] FIPS self test
25,945,576 UART: [kat] ++
25,946,082 UART: [kat] sha1
25,946,706 UART: Fatal Error: 0x90060001
25,982,081 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,126,454 >>> mbox cmd response: failed
26,127,063 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,271,418 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,026 UART:
190,317 UART: Running Caliptra ROM ...
191,363 UART:
14,257,050 UART: [state] CFI Enabled
14,271,257 UART: [state] LifecycleState = Unprovisioned
14,273,146 UART: [state] DebugLocked = No
14,275,507 UART: [state] WD Timer not started. Device not locked for debugging
14,279,030 UART: [kat] SHA2-256
14,458,163 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,469,741 UART: [kat] ++
14,470,278 UART: [kat] sha1
14,481,658 UART: [kat] SHA2-256
14,484,665 UART: [kat] SHA2-384
14,491,021 UART: [kat] SHA2-512-ACC
14,493,967 UART: [kat] ECC-384
16,935,771 UART: [kat] HMAC-384Kdf
16,948,157 UART: [kat] LMS
17,477,615 UART: [kat] --
17,480,863 UART: [cold-reset] ++
17,481,762 UART: [fht] FHT @ 0x50003400
17,491,495 UART: [idev] ++
17,492,064 UART: [idev] CDI.KEYID = 6
17,492,974 UART: [idev] SUBJECT.KEYID = 7
17,494,187 UART: [idev] UDS.KEYID = 0
17,495,709 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,640,105 UART: [idev] Erasing UDS.KEYID = 0
19,969,352 UART: [idev] Sha1 KeyId Algorithm
19,992,740 UART: [idev] --
19,996,572 UART: [ldev] ++
19,997,136 UART: [ldev] CDI.KEYID = 6
19,998,042 UART: [ldev] SUBJECT.KEYID = 5
19,999,201 UART: [ldev] AUTHORITY.KEYID = 7
20,000,487 UART: [ldev] FE.KEYID = 1
20,010,867 UART: [ldev] Erasing FE.KEYID = 1
22,483,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,202,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,218,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,234,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,250,053 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,269,343 UART: [ldev] --
24,273,800 UART: [fwproc] Wait for Commands...
24,276,586 UART: [fwproc] Recv command 0x46574c44
24,278,637 UART: [fwproc] Recv'd Img size: 115032 bytes
27,688,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,761,552 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,830,302 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,150,679 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,697,334 ready_for_fw is high
3,697,824 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,286,278 >>> mbox cmd response: success
18,539,053 UART:
18,539,554 UART: Running Caliptra FMC ...
18,540,682 UART:
18,540,836 UART: [state] CFI Enabled
18,548,583 UART: [fht] FMC Alias Private Key: 7
20,304,991 UART: [art] Extend RT PCRs Done
20,306,232 UART: [art] Lock RT PCRs Done
20,307,646 UART: [art] Populate DV Done
20,312,945 UART: [fht] FMC Alias Private Key: 7
20,314,649 UART: [art] Derive CDI
20,315,468 UART: [art] Store in in slot 0x4
20,358,289 UART: [art] Derive Key Pair
20,359,333 UART: [art] Store priv key in slot 0x5
22,786,412 UART: [art] Derive Key Pair - Done
22,799,308 UART: [art] Signing Cert with AUTHO
22,800,617 UART: RITY.KEYID = 7
24,506,105 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,616 UART: [art] PUB.X = 05F72125458A4B09140CAFA626900EA121D36EBC567761F9AE7C477819CFBA9F1D89BCED21A43A7E63FC48C2DC6AC5B5
24,514,851 UART: [art] PUB.Y = 8CA644FD14C89B193739A9BB18703D2A72DB0B24DF0161CA99A339D4C2A88579B6AB6BC00FF093A3671301F0EBE1A77A
24,522,152 UART: [art] SIG.R = 6A325483B51E9333763D648E901FDA442EDBEA4F7D94A80467FEDF8A852049BCFF57A566987BDC15DACA6F5CAED3927D
24,529,525 UART: [art] SIG.S = 073EB37F858A5174F6E4F87876C033B0074A3F3EEC557175D9536BA74A1E2013FE93F3EC27D9FCF87388FFBEFB6689E9
25,507,950 UART: Caliptra RT
25,508,650 UART: [state] CFI Enabled
25,625,781 UART: [rt] RT listening for mailbox commands...
25,627,632 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,272 UART: [rt]cmd =0x46504c54, len=4
25,658,905 >>> mbox cmd response data (8 bytes)
25,660,165 UART: [rt] FIPS self test
25,661,099 UART: [kat] ++
25,661,553 UART: [kat] sha1
25,662,230 UART: Fatal Error: 0x90060001
25,697,435 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,841,898 >>> mbox cmd response: failed
25,842,586 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,987,391 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
17,626,962 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,220,045 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,080 UART:
192,454 UART: Running Caliptra ROM ...
193,557 UART:
193,701 UART: [state] CFI Enabled
264,982 UART: [state] LifecycleState = Unprovisioned
267,354 UART: [state] DebugLocked = No
268,997 UART: [state] WD Timer not started. Device not locked for debugging
272,890 UART: [kat] SHA2-256
462,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,547 UART: [kat] ++
473,999 UART: [kat] sha1
485,116 UART: [kat] SHA2-256
488,139 UART: [kat] SHA2-384
493,296 UART: [kat] SHA2-512-ACC
495,886 UART: [kat] ECC-384
2,947,462 UART: [kat] HMAC-384Kdf
2,971,380 UART: [kat] LMS
3,503,158 UART: [kat] --
3,507,078 UART: [cold-reset] ++
3,509,020 UART: [fht] FHT @ 0x50003400
3,521,496 UART: [idev] ++
3,522,202 UART: [idev] CDI.KEYID = 6
3,523,197 UART: [idev] SUBJECT.KEYID = 7
3,524,313 UART: [idev] UDS.KEYID = 0
3,525,364 ready_for_fw is high
3,525,597 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,670,363 UART: [idev] Erasing UDS.KEYID = 0
6,027,840 UART: [idev] Sha1 KeyId Algorithm
6,050,081 UART: [idev] --
6,055,219 UART: [ldev] ++
6,055,923 UART: [ldev] CDI.KEYID = 6
6,056,837 UART: [ldev] SUBJECT.KEYID = 5
6,058,000 UART: [ldev] AUTHORITY.KEYID = 7
6,059,184 UART: [ldev] FE.KEYID = 1
6,101,105 UART: [ldev] Erasing FE.KEYID = 1
8,605,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,926 UART: [ldev] --
10,416,031 UART: [fwproc] Wait for Commands...
10,417,755 UART: [fwproc] Recv command 0x46574c44
10,420,038 UART: [fwproc] Recv'd Img size: 115032 bytes
13,865,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,058,130 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,604,591 >>> mbox cmd response: success
14,608,934 UART: [afmc] ++
14,609,632 UART: [afmc] CDI.KEYID = 6
14,610,922 UART: [afmc] SUBJECT.KEYID = 7
14,612,303 UART: [afmc] AUTHORITY.KEYID = 5
17,157,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,897,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,899,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,914,572 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,693 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,688 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,922 UART: [afmc] --
18,972,676 UART: [cold-reset] --
18,977,840 UART: [state] Locking Datavault
18,983,792 UART: [state] Locking PCR0, PCR1 and PCR31
18,985,989 UART: [state] Locking ICCM
18,987,491 UART: [exit] Launching FMC @ 0x40000130
18,996,145 UART:
18,996,392 UART: Running Caliptra FMC ...
18,997,499 UART:
18,997,658 UART: [state] CFI Enabled
19,055,106 UART: [fht] FMC Alias Private Key: 7
20,819,613 UART: [art] Extend RT PCRs Done
20,820,823 UART: [art] Lock RT PCRs Done
20,822,391 UART: [art] Populate DV Done
20,827,641 UART: [fht] FMC Alias Private Key: 7
20,829,232 UART: [art] Derive CDI
20,830,001 UART: [art] Store in in slot 0x4
20,888,221 UART: [art] Derive Key Pair
20,889,222 UART: [art] Store priv key in slot 0x5
23,352,857 UART: [art] Derive Key Pair - Done
23,365,591 UART: [art] Signing Cert with AUTHO
23,366,895 UART: RITY.KEYID = 7
25,077,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,079,327 UART: [art] PUB.X = 9E128BB736986DE9904ABD89C5CB262BA6CDA4092AAC2FC4AB33E21658F55A52F0B339EB2C1C4DDE0DA1A5E3447F3E40
25,086,614 UART: [art] PUB.Y = 1AED6A1B0384B6C1F7874DB1E024A70813E87F568623991238420FE9D408F4F4E83CCC65622175AE9F30EA0CD35DAD56
25,093,885 UART: [art] SIG.R = 0DE71F5A44810487332B6C736CC910DF31194E800C5B42B5C7139164E746D299FE9AFA1E1A4D7D55072A9330A8F3C048
25,101,260 UART: [art] SIG.S = 058BD48CB97860F0D741AF8B21AFCB6BE39B026EAC0CAA30A71F8878FC06481F339B8332ECDCFD8E4EDC386D3ED1DC5F
26,079,977 UART: Caliptra RT
26,080,693 UART: [state] CFI Enabled
26,246,189 UART: [rt] RT listening for mailbox commands...
26,248,049 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,277,669 UART: [rt]cmd =0x46504c54, len=4
26,279,227 >>> mbox cmd response data (8 bytes)
26,280,358 UART: [rt] FIPS self test
26,281,311 UART: [kat] ++
26,281,764 UART: [kat] sha1
26,282,277 UART: Fatal Error: 0x90060001
26,317,431 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,461,904 >>> mbox cmd response: failed
26,462,518 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,606,917 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,003 UART:
190,299 UART: Running Caliptra ROM ...
191,330 UART:
191,466 UART: [state] CFI Enabled
261,672 UART: [state] LifecycleState = Unprovisioned
264,027 UART: [state] DebugLocked = No
266,538 UART: [state] WD Timer not started. Device not locked for debugging
271,312 UART: [kat] SHA2-256
461,173 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,981 UART: [kat] ++
472,428 UART: [kat] sha1
483,416 UART: [kat] SHA2-256
486,476 UART: [kat] SHA2-384
491,754 UART: [kat] SHA2-512-ACC
494,365 UART: [kat] ECC-384
2,944,178 UART: [kat] HMAC-384Kdf
2,967,853 UART: [kat] LMS
3,499,594 UART: [kat] --
3,504,127 UART: [cold-reset] ++
3,505,928 UART: [fht] FHT @ 0x50003400
3,519,130 UART: [idev] ++
3,519,815 UART: [idev] CDI.KEYID = 6
3,520,799 UART: [idev] SUBJECT.KEYID = 7
3,521,963 UART: [idev] UDS.KEYID = 0
3,523,465 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,060 UART: [idev] Erasing UDS.KEYID = 0
6,023,736 UART: [idev] Sha1 KeyId Algorithm
6,046,007 UART: [idev] --
6,051,246 UART: [ldev] ++
6,051,941 UART: [ldev] CDI.KEYID = 6
6,052,852 UART: [ldev] SUBJECT.KEYID = 5
6,054,014 UART: [ldev] AUTHORITY.KEYID = 7
6,055,248 UART: [ldev] FE.KEYID = 1
6,097,445 UART: [ldev] Erasing FE.KEYID = 1
8,602,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,765 UART: [ldev] --
10,414,839 UART: [fwproc] Wait for Commands...
10,417,106 UART: [fwproc] Recv command 0x46574c44
10,419,424 UART: [fwproc] Recv'd Img size: 115032 bytes
13,879,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,071,679 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,618,242 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,437,594 ready_for_fw is high
3,437,979 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,740,338 >>> mbox cmd response: success
19,025,758 UART:
19,026,158 UART: Running Caliptra FMC ...
19,027,369 UART:
19,027,548 UART: [state] CFI Enabled
19,092,629 UART: [fht] FMC Alias Private Key: 7
20,856,636 UART: [art] Extend RT PCRs Done
20,857,854 UART: [art] Lock RT PCRs Done
20,859,750 UART: [art] Populate DV Done
20,865,343 UART: [fht] FMC Alias Private Key: 7
20,866,978 UART: [art] Derive CDI
20,867,811 UART: [art] Store in in slot 0x4
20,925,451 UART: [art] Derive Key Pair
20,926,446 UART: [art] Store priv key in slot 0x5
23,389,514 UART: [art] Derive Key Pair - Done
23,402,475 UART: [art] Signing Cert with AUTHO
23,403,783 UART: RITY.KEYID = 7
25,115,196 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,706 UART: [art] PUB.X = E497C012D6D095418E68444732FCA1760649274AA34D64EFFF991270C6BD2F3AEC3A03EBBA890FB43D1F0D401B4BA8D4
25,123,967 UART: [art] PUB.Y = 493BE4E4E3460690C45E499B1C23E3F20E922169EA6B1B0E2CDF9301C28E5A5B1D226746655C5467097D77E1BBFB585B
25,131,172 UART: [art] SIG.R = 7345EBC13F142DBB5C78EA04EC6FD1555CA59766D55B5CF9B65397CA4796E4BB9CE6BD7EBDB72A07D8535C3399097AF5
25,138,638 UART: [art] SIG.S = 83DAC6FFA360F62944F305C17D3DB4D67F9E76DBDF05535C56FADD71063D831144E4A2AF2CEC6A28AF0138C4545ED7D6
26,117,249 UART: Caliptra RT
26,117,951 UART: [state] CFI Enabled
26,281,632 UART: [rt] RT listening for mailbox commands...
26,283,486 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,313,273 UART: [rt]cmd =0x46504c54, len=4
26,314,889 >>> mbox cmd response data (8 bytes)
26,315,985 UART: [rt] FIPS self test
26,316,942 UART: [kat] ++
26,317,396 UART: [kat] sha1
26,318,019 UART: Fatal Error: 0x90060001
26,353,226 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,497,749 >>> mbox cmd response: failed
26,498,414 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,643,245 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
3,436,575 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,730,359 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,446 UART:
192,820 UART: Running Caliptra ROM ...
194,012 UART:
603,761 UART: [state] CFI Enabled
615,159 UART: [state] LifecycleState = Unprovisioned
617,532 UART: [state] DebugLocked = No
619,640 UART: [state] WD Timer not started. Device not locked for debugging
623,915 UART: [kat] SHA2-256
813,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,554 UART: [kat] ++
825,103 UART: [kat] sha1
836,766 UART: [kat] SHA2-256
839,775 UART: [kat] SHA2-384
845,362 UART: [kat] SHA2-512-ACC
847,958 UART: [kat] ECC-384
3,290,783 UART: [kat] HMAC-384Kdf
3,302,766 UART: [kat] LMS
3,834,600 UART: [kat] --
3,840,234 UART: [cold-reset] ++
3,841,242 UART: [fht] FHT @ 0x50003400
3,852,442 UART: [idev] ++
3,853,079 UART: [idev] CDI.KEYID = 6
3,854,114 UART: [idev] SUBJECT.KEYID = 7
3,855,289 UART: [idev] UDS.KEYID = 0
3,856,215 ready_for_fw is high
3,856,437 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,001,008 UART: [idev] Erasing UDS.KEYID = 0
6,326,932 UART: [idev] Sha1 KeyId Algorithm
6,349,250 UART: [idev] --
6,354,503 UART: [ldev] ++
6,355,239 UART: [ldev] CDI.KEYID = 6
6,356,122 UART: [ldev] SUBJECT.KEYID = 5
6,357,338 UART: [ldev] AUTHORITY.KEYID = 7
6,358,466 UART: [ldev] FE.KEYID = 1
6,369,827 UART: [ldev] Erasing FE.KEYID = 1
8,848,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,811 UART: [ldev] --
10,636,842 UART: [fwproc] Wait for Commands...
10,639,766 UART: [fwproc] Recv command 0x46574c44
10,642,088 UART: [fwproc] Recv'd Img size: 115032 bytes
14,097,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,174,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,290,272 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,836,986 >>> mbox cmd response: success
14,841,836 UART: [afmc] ++
14,842,537 UART: [afmc] CDI.KEYID = 6
14,843,697 UART: [afmc] SUBJECT.KEYID = 7
14,845,238 UART: [afmc] AUTHORITY.KEYID = 5
17,350,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,072,588 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,074,563 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,089,740 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,104,877 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,119,885 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,143,675 UART: [afmc] --
19,147,536 UART: [cold-reset] --
19,152,156 UART: [state] Locking Datavault
19,158,452 UART: [state] Locking PCR0, PCR1 and PCR31
19,160,641 UART: [state] Locking ICCM
19,162,556 UART: [exit] Launching FMC @ 0x40000130
19,171,223 UART:
19,171,454 UART: Running Caliptra FMC ...
19,172,480 UART:
19,172,625 UART: [state] CFI Enabled
19,181,167 UART: [fht] FMC Alias Private Key: 7
20,937,942 UART: [art] Extend RT PCRs Done
20,939,170 UART: [art] Lock RT PCRs Done
20,941,150 UART: [art] Populate DV Done
20,946,348 UART: [fht] FMC Alias Private Key: 7
20,948,048 UART: [art] Derive CDI
20,948,788 UART: [art] Store in in slot 0x4
20,991,163 UART: [art] Derive Key Pair
20,992,163 UART: [art] Store priv key in slot 0x5
23,419,015 UART: [art] Derive Key Pair - Done
23,432,127 UART: [art] Signing Cert with AUTHO
23,433,434 UART: RITY.KEYID = 7
25,138,821 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,326 UART: [art] PUB.X = 3CAAC21D49D435F935C06742D8880091D23E0A005BFB9FB1F8C5F47950EAE6FA031FFCD3D5ED572B30CFA6EE1EB3D920
25,147,601 UART: [art] PUB.Y = 25E0BD1BE9F169899EAD9A7C0E0EF96F32F928751D3E4F0C80186FBF9BBF6BFE95844D1EC07500979781F4D1DB23F50C
25,154,806 UART: [art] SIG.R = FBB94097441A4E36256E2BBCEE58D9CD341BFC5CA301EC6A808F90208C582F4493179041282122A8F1735722C5BD8E48
25,162,227 UART: [art] SIG.S = 695EDE78A202A036507C4B8E073D51FBBC340CCE63A84C8ED5471CE794DA3BA90B3E4DA4C886E76BB9A403FF323412AD
26,141,390 UART: Caliptra RT
26,142,094 UART: [state] CFI Enabled
26,258,998 UART: [rt] RT listening for mailbox commands...
26,260,841 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,290,572 UART: [rt]cmd =0x46504c54, len=4
26,292,204 >>> mbox cmd response data (8 bytes)
26,293,066 UART: [rt] FIPS self test
26,294,004 UART: [kat] ++
26,294,479 UART: [kat] sha1
26,295,156 UART: Fatal Error: 0x90060001
26,330,537 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,475,051 >>> mbox cmd response: failed
26,475,657 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,620,066 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,090 UART:
190,376 UART: Running Caliptra ROM ...
191,487 UART:
13,913,185 UART: [state] CFI Enabled
13,927,398 UART: [state] LifecycleState = Unprovisioned
13,929,791 UART: [state] DebugLocked = No
13,931,075 UART: [state] WD Timer not started. Device not locked for debugging
13,935,602 UART: [kat] SHA2-256
14,125,513 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,136,284 UART: [kat] ++
14,136,886 UART: [kat] sha1
14,147,296 UART: [kat] SHA2-256
14,150,318 UART: [kat] SHA2-384
14,156,968 UART: [kat] SHA2-512-ACC
14,159,570 UART: [kat] ECC-384
16,599,672 UART: [kat] HMAC-384Kdf
16,614,173 UART: [kat] LMS
17,146,002 UART: [kat] --
17,148,579 UART: [cold-reset] ++
17,149,697 UART: [fht] FHT @ 0x50003400
17,161,052 UART: [idev] ++
17,161,783 UART: [idev] CDI.KEYID = 6
17,162,690 UART: [idev] SUBJECT.KEYID = 7
17,163,902 UART: [idev] UDS.KEYID = 0
17,165,446 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,309,861 UART: [idev] Erasing UDS.KEYID = 0
19,644,427 UART: [idev] Sha1 KeyId Algorithm
19,666,678 UART: [idev] --
19,671,795 UART: [ldev] ++
19,672,469 UART: [ldev] CDI.KEYID = 6
19,673,351 UART: [ldev] SUBJECT.KEYID = 5
19,674,557 UART: [ldev] AUTHORITY.KEYID = 7
19,675,786 UART: [ldev] FE.KEYID = 1
19,687,309 UART: [ldev] Erasing FE.KEYID = 1
22,162,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,880,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,895,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,910,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,926,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,947,442 UART: [ldev] --
23,952,140 UART: [fwproc] Wait for Commands...
23,954,135 UART: [fwproc] Recv command 0x46574c44
23,956,399 UART: [fwproc] Recv'd Img size: 115032 bytes
27,412,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,492,493 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,608,622 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,155,822 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,761,550 ready_for_fw is high
3,762,005 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,972,977 >>> mbox cmd response: success
19,230,923 UART:
19,231,326 UART: Running Caliptra FMC ...
19,232,443 UART:
19,232,610 UART: [state] CFI Enabled
19,240,015 UART: [fht] FMC Alias Private Key: 7
20,997,206 UART: [art] Extend RT PCRs Done
20,998,454 UART: [art] Lock RT PCRs Done
21,000,646 UART: [art] Populate DV Done
21,006,084 UART: [fht] FMC Alias Private Key: 7
21,007,584 UART: [art] Derive CDI
21,008,330 UART: [art] Store in in slot 0x4
21,050,977 UART: [art] Derive Key Pair
21,051,977 UART: [art] Store priv key in slot 0x5
23,478,970 UART: [art] Derive Key Pair - Done
23,492,089 UART: [art] Signing Cert with AUTHO
23,493,395 UART: RITY.KEYID = 7
25,198,494 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,008 UART: [art] PUB.X = 1DD6447BB04A38EB0D6B89F63E32042E8149D409071F067010E98AA9F94BC9DD9B5D410CD08BAA0625871D84AC114C9E
25,207,223 UART: [art] PUB.Y = EBF307948AAE3CB21FCDC2BF03E8C2E6D62D2474C5C248D55F50695D6C2F10BC4574C2CF79F15D18558C16915B09E04F
25,214,482 UART: [art] SIG.R = C44DE6BDF11B744988ACA0CDA357512A0F7FD1B81CDBE061E1E18E0C0340052AF382B7F694C13D39385B9AAE0715C63E
25,221,890 UART: [art] SIG.S = 3F37BB9970C180E2EE5D9770D949F47B68E2810ABF0C39E0DCA0B0C8B994775F879FAE1A8521CF269FA203BF0E480C5D
26,200,773 UART: Caliptra RT
26,201,467 UART: [state] CFI Enabled
26,318,477 UART: [rt] RT listening for mailbox commands...
26,320,328 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,349,865 UART: [rt]cmd =0x46504c54, len=4
26,351,387 >>> mbox cmd response data (8 bytes)
26,352,433 UART: [rt] FIPS self test
26,353,371 UART: [kat] ++
26,354,027 UART: [kat] sha1
26,354,584 UART: Fatal Error: 0x90060001
26,389,650 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,534,097 >>> mbox cmd response: failed
26,534,777 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,679,163 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,006,209 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,215,641 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,965 UART: [kat] SHA2-256
881,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,011 UART: [kat] ++
886,163 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,520 UART: [kat] HMAC-384Kdf
907,004 UART: [kat] LMS
1,475,200 UART: [kat] --
1,476,187 UART: [cold-reset] ++
1,476,569 UART: [fht] Storing FHT @ 0x50003400
1,479,432 UART: [idev] ++
1,479,600 UART: [idev] CDI.KEYID = 6
1,479,960 UART: [idev] SUBJECT.KEYID = 7
1,480,384 UART: [idev] UDS.KEYID = 0
1,480,729 ready_for_fw is high
1,480,729 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,628 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,396 UART: [idev] --
1,514,455 UART: [ldev] ++
1,514,623 UART: [ldev] CDI.KEYID = 6
1,514,986 UART: [ldev] SUBJECT.KEYID = 5
1,515,412 UART: [ldev] AUTHORITY.KEYID = 7
1,515,875 UART: [ldev] FE.KEYID = 1
1,520,911 UART: [ldev] Erasing FE.KEYID = 1
1,546,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,366 UART: [ldev] --
1,585,631 UART: [fwproc] Waiting for Commands...
1,586,492 UART: [fwproc] Received command 0x46574c44
1,587,283 UART: [fwproc] Received Image of size 115032 bytes
2,892,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,828 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,011 >>> mbox cmd response: success
3,087,167 UART: [afmc] ++
3,087,335 UART: [afmc] CDI.KEYID = 6
3,087,697 UART: [afmc] SUBJECT.KEYID = 7
3,088,122 UART: [afmc] AUTHORITY.KEYID = 5
3,122,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,969 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,749 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,477 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,362 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,052 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,769 UART: [afmc] --
3,165,859 UART: [cold-reset] --
3,166,697 UART: [state] Locking Datavault
3,167,674 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,278 UART: [state] Locking ICCM
3,168,780 UART: [exit] Launching FMC @ 0x40000130
3,174,109 UART:
3,174,125 UART: Running Caliptra FMC ...
3,174,533 UART:
3,174,587 UART: [state] CFI Enabled
3,184,888 UART: [fht] FMC Alias Private Key: 7
3,292,387 UART: [art] Extend RT PCRs Done
3,292,815 UART: [art] Lock RT PCRs Done
3,294,253 UART: [art] Populate DV Done
3,302,588 UART: [fht] FMC Alias Private Key: 7
3,303,666 UART: [art] Derive CDI
3,303,946 UART: [art] Store in in slot 0x4
3,389,529 UART: [art] Derive Key Pair
3,389,889 UART: [art] Store priv key in slot 0x5
3,403,747 UART: [art] Derive Key Pair - Done
3,418,261 UART: [art] Signing Cert with AUTHO
3,418,741 UART: RITY.KEYID = 7
3,434,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,434,814 UART: [art] PUB.X = 4D64D1089232B59331D81B65E60BD44E4D85C1FA80322FB170C9741FB28A04DDC875573C3C64B8427418F109375075FB
3,441,566 UART: [art] PUB.Y = B1F6D76AA6FD87F6D57969D442B4632E5C39234229843FC6FA84861705A32E098C4A320A65EB6DA2D3EFCE1C536ADAA3
3,448,517 UART: [art] SIG.R = 96B815CF725FE313F4EABCE40E6A4B9A3A2DBA0688F5CA8DC9D6D4D402CE84953BFB44D0C34195B4160EB80CBED927F1
3,455,294 UART: [art] SIG.S = 75FC016FCA43475544D60EFCC6BA47048A3A98BA8DB1DC9765968ABC13713F27115DBFA411C5EB3249E124AF828BB561
3,478,922 UART: Caliptra RT
3,479,175 UART: [state] CFI Enabled
3,586,816 UART: [rt] RT listening for mailbox commands...
3,587,479 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,372 UART: [rt]cmd =0x46504c54, len=4
3,618,438 >>> mbox cmd response data (8 bytes)
3,618,731 UART: [rt] FIPS self test
3,619,059 UART: [kat] ++
3,619,211 UART: [kat] sha1
3,619,825 UART: Fatal Error: 0x90060001
3,621,364 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,621,369 >>> mbox cmd response: failed
3,621,369 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,621,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
895,004 UART: [kat] SHA2-512-ACC
896,905 UART: [kat] ECC-384
902,210 UART: [kat] HMAC-384Kdf
906,824 UART: [kat] LMS
1,475,020 UART: [kat] --
1,475,631 UART: [cold-reset] ++
1,476,033 UART: [fht] Storing FHT @ 0x50003400
1,478,706 UART: [idev] ++
1,478,874 UART: [idev] CDI.KEYID = 6
1,479,234 UART: [idev] SUBJECT.KEYID = 7
1,479,658 UART: [idev] UDS.KEYID = 0
1,480,003 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,487,490 UART: [idev] Erasing UDS.KEYID = 0
1,504,600 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,310 UART: [idev] --
1,514,409 UART: [ldev] ++
1,514,577 UART: [ldev] CDI.KEYID = 6
1,514,940 UART: [ldev] SUBJECT.KEYID = 5
1,515,366 UART: [ldev] AUTHORITY.KEYID = 7
1,515,829 UART: [ldev] FE.KEYID = 1
1,520,907 UART: [ldev] Erasing FE.KEYID = 1
1,545,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,684 UART: [ldev] --
1,584,981 UART: [fwproc] Waiting for Commands...
1,585,662 UART: [fwproc] Received command 0x46574c44
1,586,453 UART: [fwproc] Received Image of size 115032 bytes
2,891,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,936 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,288 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,085,089 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,447 ready_for_fw is high
1,362,447 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,741 >>> mbox cmd response: success
2,998,733 UART:
2,998,749 UART: Running Caliptra FMC ...
2,999,157 UART:
2,999,211 UART: [state] CFI Enabled
3,009,876 UART: [fht] FMC Alias Private Key: 7
3,117,873 UART: [art] Extend RT PCRs Done
3,118,301 UART: [art] Lock RT PCRs Done
3,119,973 UART: [art] Populate DV Done
3,128,210 UART: [fht] FMC Alias Private Key: 7
3,129,372 UART: [art] Derive CDI
3,129,652 UART: [art] Store in in slot 0x4
3,215,849 UART: [art] Derive Key Pair
3,216,209 UART: [art] Store priv key in slot 0x5
3,229,681 UART: [art] Derive Key Pair - Done
3,244,613 UART: [art] Signing Cert with AUTHO
3,245,093 UART: RITY.KEYID = 7
3,260,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,286 UART: [art] PUB.X = 4DFCF153EBBDD1F9A2684B249412C2722FD6CD99ADCB24EF321905B2B573718F94B9D983D338199B8F367BEDEA0325F0
3,268,062 UART: [art] PUB.Y = C7A831BDEA4A4DC626A2CD2301F47ECA5416DBDA1F6557F29DEACD947AD4CE8E2086FFDC67F495667775930E16A231C9
3,275,024 UART: [art] SIG.R = 5EB7F8F9DB54DE4FA3FE22B28AFBD790BD286E5C6093A77EA468530DB76DBBCB125E29E3EEBD19B44D3D8BEBF9ED331F
3,281,823 UART: [art] SIG.S = 1258634183CED1C10591E9BA25FEAEB40EC48B7C7FA70F3F80B32C145E2B38430387F99464AADBE6DC47E8D3BFD62F1C
3,305,124 UART: Caliptra RT
3,305,377 UART: [state] CFI Enabled
3,413,801 UART: [rt] RT listening for mailbox commands...
3,414,464 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,365 UART: [rt]cmd =0x46504c54, len=4
3,445,603 >>> mbox cmd response data (8 bytes)
3,445,752 UART: [rt] FIPS self test
3,446,080 UART: [kat] ++
3,446,232 UART: [kat] sha1
3,447,068 UART: Fatal Error: 0x90060001
3,448,607 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,448,612 >>> mbox cmd response: failed
3,448,612 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,448,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,859 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,739 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,592 UART: [kat] SHA2-256
882,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,638 UART: [kat] ++
886,790 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,669 UART: [kat] SHA2-512-ACC
897,570 UART: [kat] ECC-384
903,053 UART: [kat] HMAC-384Kdf
907,873 UART: [kat] LMS
1,476,069 UART: [kat] --
1,477,154 UART: [cold-reset] ++
1,477,618 UART: [fht] Storing FHT @ 0x50003400
1,480,453 UART: [idev] ++
1,480,621 UART: [idev] CDI.KEYID = 6
1,480,981 UART: [idev] SUBJECT.KEYID = 7
1,481,405 UART: [idev] UDS.KEYID = 0
1,481,750 ready_for_fw is high
1,481,750 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,131 UART: [idev] Erasing UDS.KEYID = 0
1,505,567 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,143 UART: [idev] --
1,515,134 UART: [ldev] ++
1,515,302 UART: [ldev] CDI.KEYID = 6
1,515,665 UART: [ldev] SUBJECT.KEYID = 5
1,516,091 UART: [ldev] AUTHORITY.KEYID = 7
1,516,554 UART: [ldev] FE.KEYID = 1
1,521,868 UART: [ldev] Erasing FE.KEYID = 1
1,547,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,771 UART: [ldev] --
1,587,058 UART: [fwproc] Waiting for Commands...
1,587,675 UART: [fwproc] Received command 0x46574c44
1,588,466 UART: [fwproc] Received Image of size 115032 bytes
2,893,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,805 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,157 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,042 >>> mbox cmd response: success
3,088,290 UART: [afmc] ++
3,088,458 UART: [afmc] CDI.KEYID = 6
3,088,820 UART: [afmc] SUBJECT.KEYID = 7
3,089,245 UART: [afmc] AUTHORITY.KEYID = 5
3,124,270 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,244 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,972 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,857 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,547 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,490 UART: [afmc] --
3,167,400 UART: [cold-reset] --
3,168,414 UART: [state] Locking Datavault
3,169,745 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,349 UART: [state] Locking ICCM
3,170,903 UART: [exit] Launching FMC @ 0x40000130
3,176,232 UART:
3,176,248 UART: Running Caliptra FMC ...
3,176,656 UART:
3,176,799 UART: [state] CFI Enabled
3,187,786 UART: [fht] FMC Alias Private Key: 7
3,295,871 UART: [art] Extend RT PCRs Done
3,296,299 UART: [art] Lock RT PCRs Done
3,297,901 UART: [art] Populate DV Done
3,306,264 UART: [fht] FMC Alias Private Key: 7
3,307,374 UART: [art] Derive CDI
3,307,654 UART: [art] Store in in slot 0x4
3,393,511 UART: [art] Derive Key Pair
3,393,871 UART: [art] Store priv key in slot 0x5
3,407,381 UART: [art] Derive Key Pair - Done
3,422,071 UART: [art] Signing Cert with AUTHO
3,422,551 UART: RITY.KEYID = 7
3,437,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,672 UART: [art] PUB.X = E9FE97274B6D4969104F67ABD6042F1AF822E72B38F9A7AB3602B98FDE742634BA8DCE80300B24D16F18239F3747CDDB
3,445,441 UART: [art] PUB.Y = 70F7BB8212C917F745320494C11F52B1CEAE5787CA2F4897F25B6235919A670EE6057347A52A29D9965244BBA7D95D05
3,452,373 UART: [art] SIG.R = E0DA922729C144FD600FBD11D3F08288B522A91901CD600F6ECAD9357C258FD977EE35F141F73176849172EB8C09578B
3,459,131 UART: [art] SIG.S = B0F860BBD739DB3BD85880A57187334A8567D188CA3AFADB58A5CC45F9F19DD54954A7600BC8DCE6D4D64554BDED83F1
3,482,917 UART: Caliptra RT
3,483,262 UART: [state] CFI Enabled
3,591,292 UART: [rt] RT listening for mailbox commands...
3,591,955 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,926 UART: [rt]cmd =0x46504c54, len=4
3,623,106 >>> mbox cmd response data (8 bytes)
3,623,391 UART: [rt] FIPS self test
3,623,719 UART: [kat] ++
3,623,871 UART: [kat] sha1
3,624,613 UART: Fatal Error: 0x90060001
3,626,152 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,626,157 >>> mbox cmd response: failed
3,626,157 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,626,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,308 UART: [kat] SHA2-256
882,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,354 UART: [kat] ++
886,506 UART: [kat] sha1
890,738 UART: [kat] SHA2-256
892,676 UART: [kat] SHA2-384
895,413 UART: [kat] SHA2-512-ACC
897,314 UART: [kat] ECC-384
903,011 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,614 UART: [cold-reset] ++
1,476,974 UART: [fht] Storing FHT @ 0x50003400
1,479,831 UART: [idev] ++
1,479,999 UART: [idev] CDI.KEYID = 6
1,480,359 UART: [idev] SUBJECT.KEYID = 7
1,480,783 UART: [idev] UDS.KEYID = 0
1,481,128 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,298 UART: [ldev] ++
1,515,466 UART: [ldev] CDI.KEYID = 6
1,515,829 UART: [ldev] SUBJECT.KEYID = 5
1,516,255 UART: [ldev] AUTHORITY.KEYID = 7
1,516,718 UART: [ldev] FE.KEYID = 1
1,522,170 UART: [ldev] Erasing FE.KEYID = 1
1,547,793 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,737 UART: [ldev] --
1,587,100 UART: [fwproc] Waiting for Commands...
1,587,755 UART: [fwproc] Received command 0x46574c44
1,588,546 UART: [fwproc] Received Image of size 115032 bytes
2,893,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,783 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,135 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,166 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,404 ready_for_fw is high
1,363,404 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,424 >>> mbox cmd response: success
2,999,224 UART:
2,999,240 UART: Running Caliptra FMC ...
2,999,648 UART:
2,999,791 UART: [state] CFI Enabled
3,010,262 UART: [fht] FMC Alias Private Key: 7
3,118,493 UART: [art] Extend RT PCRs Done
3,118,921 UART: [art] Lock RT PCRs Done
3,120,227 UART: [art] Populate DV Done
3,128,486 UART: [fht] FMC Alias Private Key: 7
3,129,574 UART: [art] Derive CDI
3,129,854 UART: [art] Store in in slot 0x4
3,215,173 UART: [art] Derive Key Pair
3,215,533 UART: [art] Store priv key in slot 0x5
3,229,415 UART: [art] Derive Key Pair - Done
3,244,423 UART: [art] Signing Cert with AUTHO
3,244,903 UART: RITY.KEYID = 7
3,260,267 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,032 UART: [art] PUB.X = B49D1DF5E274C0DBF553AA6F3BA9AD242E5C9BF514E8950665BE77300B6D71223675AF3686A68FC3A93502412D0F4592
3,267,794 UART: [art] PUB.Y = E0172CF8D912EA73EB5F8E0431074A5DAFEDB63CB522C388DE20457C07EE2610A5668FD1EFEC8603325B1B6E1893C279
3,274,742 UART: [art] SIG.R = 0A37DF93C18AC638AB08B84B6CFDC78A7D52E3F489CFDBAF29FC8978DD709EFDCBE83330458F5C1AFF81D26EF5895219
3,281,528 UART: [art] SIG.S = D13DCD14A3EF0D6419891F390EBF84D0C9518A722358677951EE46544DC5C05B7A79DB5A35022184D44A2E2B4F6DFA25
3,305,016 UART: Caliptra RT
3,305,361 UART: [state] CFI Enabled
3,413,692 UART: [rt] RT listening for mailbox commands...
3,414,355 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,438 UART: [rt]cmd =0x46504c54, len=4
3,445,584 >>> mbox cmd response data (8 bytes)
3,445,699 UART: [rt] FIPS self test
3,446,027 UART: [kat] ++
3,446,179 UART: [kat] sha1
3,446,965 UART: Fatal Error: 0x90060001
3,448,504 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,448,509 >>> mbox cmd response: failed
3,448,509 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,448,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,824 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,660 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,651 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
893,600 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,725 UART: [kat] ++
897,877 UART: [kat] sha1
902,073 UART: [kat] SHA2-256
904,013 UART: [kat] SHA2-384
906,950 UART: [kat] SHA2-512-ACC
908,851 UART: [kat] ECC-384
918,452 UART: [kat] HMAC-384Kdf
923,032 UART: [kat] LMS
1,171,360 UART: [kat] --
1,172,207 UART: [cold-reset] ++
1,172,661 UART: [fht] FHT @ 0x50003400
1,175,114 UART: [idev] ++
1,175,282 UART: [idev] CDI.KEYID = 6
1,175,642 UART: [idev] SUBJECT.KEYID = 7
1,176,066 UART: [idev] UDS.KEYID = 0
1,176,411 ready_for_fw is high
1,176,411 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,940 UART: [idev] Erasing UDS.KEYID = 0
1,200,801 UART: [idev] Sha1 KeyId Algorithm
1,209,423 UART: [idev] --
1,210,527 UART: [ldev] ++
1,210,695 UART: [ldev] CDI.KEYID = 6
1,211,058 UART: [ldev] SUBJECT.KEYID = 5
1,211,484 UART: [ldev] AUTHORITY.KEYID = 7
1,211,947 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,243,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,271 UART: [ldev] --
1,282,662 UART: [fwproc] Wait for Commands...
1,283,384 UART: [fwproc] Recv command 0x46574c44
1,284,112 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,661 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,965 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,744 >>> mbox cmd response: success
2,782,968 UART: [afmc] ++
2,783,136 UART: [afmc] CDI.KEYID = 6
2,783,498 UART: [afmc] SUBJECT.KEYID = 7
2,783,923 UART: [afmc] AUTHORITY.KEYID = 5
2,818,994 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,419 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,167 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,895 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,780 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,499 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,305 UART: [afmc] --
2,862,313 UART: [cold-reset] --
2,863,089 UART: [state] Locking Datavault
2,864,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,688 UART: [state] Locking ICCM
2,865,174 UART: [exit] Launching FMC @ 0x40000130
2,870,503 UART:
2,870,519 UART: Running Caliptra FMC ...
2,870,927 UART:
2,870,981 UART: [state] CFI Enabled
2,881,064 UART: [fht] FMC Alias Private Key: 7
2,989,775 UART: [art] Extend RT PCRs Done
2,990,203 UART: [art] Lock RT PCRs Done
2,991,819 UART: [art] Populate DV Done
3,000,242 UART: [fht] FMC Alias Private Key: 7
3,001,324 UART: [art] Derive CDI
3,001,604 UART: [art] Store in in slot 0x4
3,087,011 UART: [art] Derive Key Pair
3,087,371 UART: [art] Store priv key in slot 0x5
3,100,817 UART: [art] Derive Key Pair - Done
3,116,056 UART: [art] Signing Cert with AUTHO
3,116,536 UART: RITY.KEYID = 7
3,131,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,627 UART: [art] PUB.X = 9B482F9ABB1ACE108F5F995CA20EF20616B53ED200641AEB6104EE544977B45970EAD9585DBD8B4AF6C5356BAB1F046C
3,139,377 UART: [art] PUB.Y = 5C9CFD219003910AAF11ACB7F33933FCE1D398DDDC310C5E15DE52316D346B83E54E601CFB37F9841F5C962C0C5133D7
3,146,325 UART: [art] SIG.R = A7212210942B0726858D84E8D388526CC09BB1BA145B9EFFD8CA0804DD7469043A5193DC2ACEE914E96CBAF8CB1239CC
3,153,093 UART: [art] SIG.S = 0CCBDA624058D57DDD9F65078FA75D13919269E77F66154249AD615465A9D3D754C702DFD2348C1AF110416ED3A4EEC4
3,176,685 UART: Caliptra RT
3,176,938 UART: [state] CFI Enabled
3,284,025 UART: [rt] RT listening for mailbox commands...
3,284,688 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,547 UART: [rt]cmd =0x46504c54, len=4
3,315,629 >>> mbox cmd response data (8 bytes)
3,315,892 UART: [rt] FIPS self test
3,316,220 UART: [kat] ++
3,316,372 UART: [kat] sha1
3,317,274 UART: Fatal Error: 0x90060001
3,318,813 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,318,818 >>> mbox cmd response: failed
3,318,818 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,318,823 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,831 UART: [kat] SHA2-256
903,771 UART: [kat] SHA2-384
906,524 UART: [kat] SHA2-512-ACC
908,425 UART: [kat] ECC-384
918,140 UART: [kat] HMAC-384Kdf
922,906 UART: [kat] LMS
1,171,234 UART: [kat] --
1,172,121 UART: [cold-reset] ++
1,172,655 UART: [fht] FHT @ 0x50003400
1,175,508 UART: [idev] ++
1,175,676 UART: [idev] CDI.KEYID = 6
1,176,036 UART: [idev] SUBJECT.KEYID = 7
1,176,460 UART: [idev] UDS.KEYID = 0
1,176,805 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,766 UART: [idev] Erasing UDS.KEYID = 0
1,201,803 UART: [idev] Sha1 KeyId Algorithm
1,210,325 UART: [idev] --
1,211,395 UART: [ldev] ++
1,211,563 UART: [ldev] CDI.KEYID = 6
1,211,926 UART: [ldev] SUBJECT.KEYID = 5
1,212,352 UART: [ldev] AUTHORITY.KEYID = 7
1,212,815 UART: [ldev] FE.KEYID = 1
1,217,963 UART: [ldev] Erasing FE.KEYID = 1
1,244,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,407 UART: [ldev] --
1,283,760 UART: [fwproc] Wait for Commands...
1,284,372 UART: [fwproc] Recv command 0x46574c44
1,285,100 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,425 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,729 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,536 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,085 ready_for_fw is high
1,061,085 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,771 >>> mbox cmd response: success
2,695,893 UART:
2,695,909 UART: Running Caliptra FMC ...
2,696,317 UART:
2,696,371 UART: [state] CFI Enabled
2,706,646 UART: [fht] FMC Alias Private Key: 7
2,814,095 UART: [art] Extend RT PCRs Done
2,814,523 UART: [art] Lock RT PCRs Done
2,815,897 UART: [art] Populate DV Done
2,824,384 UART: [fht] FMC Alias Private Key: 7
2,825,478 UART: [art] Derive CDI
2,825,758 UART: [art] Store in in slot 0x4
2,911,449 UART: [art] Derive Key Pair
2,911,809 UART: [art] Store priv key in slot 0x5
2,924,841 UART: [art] Derive Key Pair - Done
2,939,795 UART: [art] Signing Cert with AUTHO
2,940,275 UART: RITY.KEYID = 7
2,955,589 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,354 UART: [art] PUB.X = 2E15ADFEF3956DCF8431A19810C33557956AE855FD092404FB6DE35B65544C5E478DADD79F38D0EDD540A3BAA16CDA13
2,963,132 UART: [art] PUB.Y = 408BB1C2FD1FD84173C6C02C213E6D2FC05452FF14C5E246E8B57E176C8329FDA7515A2F02A9584E6B79798C9B04BCFE
2,970,086 UART: [art] SIG.R = 5BB1F0D2A7C8B45C6C2D44D39F1D6EC5B0124A30BD05B4E8FFF61323781BF3AF12602E31A9558028BF725AA8B3478C55
2,976,863 UART: [art] SIG.S = AD6E92FE0D97C59E56B743FC1328961460FFB6DE79FECCE02434628FCE2075FB8CF6F7F4117CC86D20242966EC9766EE
3,000,699 UART: Caliptra RT
3,000,952 UART: [state] CFI Enabled
3,109,053 UART: [rt] RT listening for mailbox commands...
3,109,716 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,669 UART: [rt]cmd =0x46504c54, len=4
3,140,769 >>> mbox cmd response data (8 bytes)
3,140,970 UART: [rt] FIPS self test
3,141,298 UART: [kat] ++
3,141,450 UART: [kat] sha1
3,142,108 UART: Fatal Error: 0x90060001
3,143,647 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,143,652 >>> mbox cmd response: failed
3,143,652 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,143,657 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,931 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,523 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,707 UART: [state] LifecycleState = Unprovisioned
86,362 UART: [state] DebugLocked = No
86,904 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
907,091 UART: [kat] SHA2-512-ACC
908,992 UART: [kat] ECC-384
919,039 UART: [kat] HMAC-384Kdf
923,709 UART: [kat] LMS
1,172,037 UART: [kat] --
1,172,736 UART: [cold-reset] ++
1,173,288 UART: [fht] FHT @ 0x50003400
1,175,927 UART: [idev] ++
1,176,095 UART: [idev] CDI.KEYID = 6
1,176,455 UART: [idev] SUBJECT.KEYID = 7
1,176,879 UART: [idev] UDS.KEYID = 0
1,177,224 ready_for_fw is high
1,177,224 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,971 UART: [idev] Erasing UDS.KEYID = 0
1,202,434 UART: [idev] Sha1 KeyId Algorithm
1,210,894 UART: [idev] --
1,212,024 UART: [ldev] ++
1,212,192 UART: [ldev] CDI.KEYID = 6
1,212,555 UART: [ldev] SUBJECT.KEYID = 5
1,212,981 UART: [ldev] AUTHORITY.KEYID = 7
1,213,444 UART: [ldev] FE.KEYID = 1
1,218,736 UART: [ldev] Erasing FE.KEYID = 1
1,244,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,916 UART: [ldev] --
1,284,381 UART: [fwproc] Wait for Commands...
1,285,197 UART: [fwproc] Recv command 0x46574c44
1,285,925 UART: [fwproc] Recv'd Img size: 115032 bytes
2,591,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,619,424 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,728 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,785,703 >>> mbox cmd response: success
2,786,837 UART: [afmc] ++
2,787,005 UART: [afmc] CDI.KEYID = 6
2,787,367 UART: [afmc] SUBJECT.KEYID = 7
2,787,792 UART: [afmc] AUTHORITY.KEYID = 5
2,824,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,840,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,841,170 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,846,898 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,852,783 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,858,502 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,866,536 UART: [afmc] --
2,867,564 UART: [cold-reset] --
2,868,658 UART: [state] Locking Datavault
2,870,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,870,665 UART: [state] Locking ICCM
2,871,111 UART: [exit] Launching FMC @ 0x40000130
2,876,440 UART:
2,876,456 UART: Running Caliptra FMC ...
2,876,864 UART:
2,877,007 UART: [state] CFI Enabled
2,887,988 UART: [fht] FMC Alias Private Key: 7
2,995,983 UART: [art] Extend RT PCRs Done
2,996,411 UART: [art] Lock RT PCRs Done
2,998,031 UART: [art] Populate DV Done
3,006,140 UART: [fht] FMC Alias Private Key: 7
3,007,070 UART: [art] Derive CDI
3,007,350 UART: [art] Store in in slot 0x4
3,093,233 UART: [art] Derive Key Pair
3,093,593 UART: [art] Store priv key in slot 0x5
3,106,955 UART: [art] Derive Key Pair - Done
3,121,790 UART: [art] Signing Cert with AUTHO
3,122,270 UART: RITY.KEYID = 7
3,136,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,137,727 UART: [art] PUB.X = CDC722A3CFCB18197C0BFF9DE594EEEB210204AEDDD362DD6472D3C3658F90CB8E6955FF44A327E5467554BF6F0FE3A1
3,144,505 UART: [art] PUB.Y = C88AACF38F7029C175C56197D38CE2E2FEB89DE8457893E5CF1FA056026FF6E596BC46FC6695A986E8E695F4429331B5
3,151,458 UART: [art] SIG.R = FCBAEDC5E3E00B5A4BFAAB96EBA4C9CE383FC8A4E43EEC668220F2322951086BAE5FB7200928E8734892EF432B94983D
3,158,237 UART: [art] SIG.S = 9DFA94224F19188F5658406A964994E0A48AC0C5056876899A0362EC7029CCCF188535AFA5E94B967C307161A4A88F61
3,182,146 UART: Caliptra RT
3,182,491 UART: [state] CFI Enabled
3,289,613 UART: [rt] RT listening for mailbox commands...
3,290,276 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,320,235 UART: [rt]cmd =0x46504c54, len=4
3,321,507 >>> mbox cmd response data (8 bytes)
3,321,790 UART: [rt] FIPS self test
3,322,118 UART: [kat] ++
3,322,270 UART: [kat] sha1
3,323,008 UART: Fatal Error: 0x90060001
3,324,547 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,552 >>> mbox cmd response: failed
3,324,552 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,544 UART: [kat] SHA2-256
904,484 UART: [kat] SHA2-384
907,217 UART: [kat] SHA2-512-ACC
909,118 UART: [kat] ECC-384
918,989 UART: [kat] HMAC-384Kdf
923,705 UART: [kat] LMS
1,172,033 UART: [kat] --
1,173,034 UART: [cold-reset] ++
1,173,608 UART: [fht] FHT @ 0x50003400
1,176,087 UART: [idev] ++
1,176,255 UART: [idev] CDI.KEYID = 6
1,176,615 UART: [idev] SUBJECT.KEYID = 7
1,177,039 UART: [idev] UDS.KEYID = 0
1,177,384 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,911 UART: [idev] Erasing UDS.KEYID = 0
1,201,402 UART: [idev] Sha1 KeyId Algorithm
1,209,868 UART: [idev] --
1,211,038 UART: [ldev] ++
1,211,206 UART: [ldev] CDI.KEYID = 6
1,211,569 UART: [ldev] SUBJECT.KEYID = 5
1,211,995 UART: [ldev] AUTHORITY.KEYID = 7
1,212,458 UART: [ldev] FE.KEYID = 1
1,217,506 UART: [ldev] Erasing FE.KEYID = 1
1,244,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,504 UART: [ldev] --
1,282,877 UART: [fwproc] Wait for Commands...
1,283,651 UART: [fwproc] Recv command 0x46574c44
1,284,379 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,842 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,146 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,125 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,834 ready_for_fw is high
1,060,834 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,982 >>> mbox cmd response: success
2,696,710 UART:
2,696,726 UART: Running Caliptra FMC ...
2,697,134 UART:
2,697,277 UART: [state] CFI Enabled
2,707,964 UART: [fht] FMC Alias Private Key: 7
2,815,729 UART: [art] Extend RT PCRs Done
2,816,157 UART: [art] Lock RT PCRs Done
2,817,721 UART: [art] Populate DV Done
2,826,018 UART: [fht] FMC Alias Private Key: 7
2,827,148 UART: [art] Derive CDI
2,827,428 UART: [art] Store in in slot 0x4
2,912,921 UART: [art] Derive Key Pair
2,913,281 UART: [art] Store priv key in slot 0x5
2,926,801 UART: [art] Derive Key Pair - Done
2,941,400 UART: [art] Signing Cert with AUTHO
2,941,880 UART: RITY.KEYID = 7
2,956,900 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,665 UART: [art] PUB.X = 13B82456AF67B86E5D85A151B16C0CB9E398FACFE407AE420C306E926CF62908E4ABD035D9932634FD31A87A78BF1C3A
2,964,433 UART: [art] PUB.Y = 354A7FA70C5FACF7285379B37A86FD98949783BDD9D846B26A88F6E02E01AADF166D4FE87D5F84477945FC77C09494E0
2,971,383 UART: [art] SIG.R = 7F9458E684719F538E2EBDB44B2382559D51D24BCC425CFEE94D59961E12073EEC50B144F20A8F3323ECD20AAEA76734
2,978,150 UART: [art] SIG.S = 1F12664FB02F7A3686F149384A6D28DCE3FE180B531E99C92EEFD2C4486D561BBFA0F6F16377794CA78F766A45A023F3
3,002,060 UART: Caliptra RT
3,002,405 UART: [state] CFI Enabled
3,109,742 UART: [rt] RT listening for mailbox commands...
3,110,405 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,140 UART: [rt]cmd =0x46504c54, len=4
3,141,346 >>> mbox cmd response data (8 bytes)
3,141,661 UART: [rt] FIPS self test
3,141,989 UART: [kat] ++
3,142,141 UART: [kat] sha1
3,142,885 UART: Fatal Error: 0x90060001
3,144,424 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,144,429 >>> mbox cmd response: failed
3,144,429 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,144,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,646 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,908 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,156 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,169,945 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 ready_for_fw is high
1,174,253 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,175 UART: [idev] Erasing UDS.KEYID = 0
1,199,243 UART: [idev] Sha1 KeyId Algorithm
1,208,175 UART: [idev] --
1,209,292 UART: [ldev] ++
1,209,460 UART: [ldev] CDI.KEYID = 6
1,209,824 UART: [ldev] SUBJECT.KEYID = 5
1,210,251 UART: [ldev] AUTHORITY.KEYID = 7
1,210,714 UART: [ldev] FE.KEYID = 1
1,215,812 UART: [ldev] Erasing FE.KEYID = 1
1,242,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,910 UART: [ldev] --
1,281,192 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46574c44
1,282,562 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,787 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,096 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,968 >>> mbox cmd response: success
2,781,051 UART: [afmc] ++
2,781,219 UART: [afmc] CDI.KEYID = 6
2,781,582 UART: [afmc] SUBJECT.KEYID = 7
2,782,008 UART: [afmc] AUTHORITY.KEYID = 5
2,817,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,004 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,733 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,335 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,186 UART: [afmc] --
2,861,218 UART: [cold-reset] --
2,862,098 UART: [state] Locking Datavault
2,863,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,065 UART: [state] Locking ICCM
2,864,723 UART: [exit] Launching FMC @ 0x40000130
2,870,052 UART:
2,870,068 UART: Running Caliptra FMC ...
2,870,476 UART:
2,870,530 UART: [state] CFI Enabled
2,881,353 UART: [fht] FMC Alias Private Key: 7
2,989,234 UART: [art] Extend RT PCRs Done
2,989,662 UART: [art] Lock RT PCRs Done
2,991,030 UART: [art] Populate DV Done
2,999,345 UART: [fht] FMC Alias Private Key: 7
3,000,341 UART: [art] Derive CDI
3,000,621 UART: [art] Store in in slot 0x4
3,086,552 UART: [art] Derive Key Pair
3,086,912 UART: [art] Store priv key in slot 0x5
3,099,662 UART: [art] Derive Key Pair - Done
3,114,152 UART: [art] Signing Cert with AUTHO
3,114,632 UART: RITY.KEYID = 7
3,129,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,311 UART: [art] PUB.X = DE46A7D173BDB951602253C4801A079FB8968973CE37B50496AB612D20DA9F9B60C722B38405FFAED88D77BDDEF5859C
3,137,080 UART: [art] PUB.Y = 480481558A843BAF169E53D605901458F96D344F105FE7492FFDF00403A4BF433EB836EB776E8CF381D97D52782F5983
3,144,012 UART: [art] SIG.R = 2997739228D039B01F1C43FB433CF04D9E8ED47F9D8226AAC2146E94F65E98D4402D808FC32F9D681C87C62B832A1471
3,150,780 UART: [art] SIG.S = 30A5BB6574313A985E934EA87F163EC33EF10F7642EBB00166BB60779018F4256BF8B743524F0592AE0EA982DC3AF8B9
3,175,089 UART: Caliptra RT
3,175,342 UART: [state] CFI Enabled
3,283,533 UART: [rt] RT listening for mailbox commands...
3,284,196 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,839 UART: [rt]cmd =0x46504c54, len=4
3,315,123 >>> mbox cmd response data (8 bytes)
3,315,320 UART: [rt] FIPS self test
3,315,648 UART: [kat] ++
3,315,800 UART: [kat] sha1
3,316,542 UART: Fatal Error: 0x90060001
3,318,081 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,318,086 >>> mbox cmd response: failed
3,318,086 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,318,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
920,942 UART: [kat] LMS
1,169,254 UART: [kat] --
1,169,995 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,172,943 UART: [idev] ++
1,173,111 UART: [idev] CDI.KEYID = 6
1,173,472 UART: [idev] SUBJECT.KEYID = 7
1,173,897 UART: [idev] UDS.KEYID = 0
1,174,243 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,757 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,184 UART: [ldev] Erasing FE.KEYID = 1
1,240,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,026 UART: [ldev] --
1,280,476 UART: [fwproc] Wait for Commands...
1,281,169 UART: [fwproc] Recv command 0x46574c44
1,281,902 UART: [fwproc] Recv'd Img size: 115032 bytes
2,585,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,151 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,641,460 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,778,252 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,260 ready_for_fw is high
1,056,260 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,342 >>> mbox cmd response: success
2,693,866 UART:
2,693,882 UART: Running Caliptra FMC ...
2,694,290 UART:
2,694,344 UART: [state] CFI Enabled
2,704,751 UART: [fht] FMC Alias Private Key: 7
2,812,572 UART: [art] Extend RT PCRs Done
2,813,000 UART: [art] Lock RT PCRs Done
2,814,350 UART: [art] Populate DV Done
2,822,831 UART: [fht] FMC Alias Private Key: 7
2,823,955 UART: [art] Derive CDI
2,824,235 UART: [art] Store in in slot 0x4
2,910,000 UART: [art] Derive Key Pair
2,910,360 UART: [art] Store priv key in slot 0x5
2,923,520 UART: [art] Derive Key Pair - Done
2,938,454 UART: [art] Signing Cert with AUTHO
2,938,934 UART: RITY.KEYID = 7
2,954,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,365 UART: [art] PUB.X = 3E8274C9022C272A7645FB66E50F4F10058D5634FF4FE033D10C5B565B580F7FD4D823196AD43A2E4A8485DB80117AEB
2,962,122 UART: [art] PUB.Y = B9DEE47A2E6AD2E58F2EE88960165C372BF43F1E888E6725ADAB23E522801C402276707E74D5737B5D4255C1C20BBF74
2,969,073 UART: [art] SIG.R = 1B79B16BC98DC57680185C1F3ADA890D1464120922A037911B2946B7612B186CCB3E5E5B38F72D9BF8CE2CA0D40D779D
2,975,838 UART: [art] SIG.S = C18E00B4D368A50079B541509EA25E3501A9B5BC535AF994886C3383A6E89A892DFF4BB956893CF389879DCE03A26108
2,999,496 UART: Caliptra RT
2,999,749 UART: [state] CFI Enabled
3,108,256 UART: [rt] RT listening for mailbox commands...
3,108,919 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,880 UART: [rt]cmd =0x46504c54, len=4
3,139,964 >>> mbox cmd response data (8 bytes)
3,140,211 UART: [rt] FIPS self test
3,140,539 UART: [kat] ++
3,140,691 UART: [kat] sha1
3,141,365 UART: Fatal Error: 0x90060001
3,142,904 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,142,909 >>> mbox cmd response: failed
3,142,909 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,142,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,522 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,762 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,520 UART: [kat] ++
895,672 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,349 UART: [kat] HMAC-384Kdf
920,955 UART: [kat] LMS
1,169,267 UART: [kat] --
1,169,994 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,174,372 ready_for_fw is high
1,174,372 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,448 UART: [idev] Sha1 KeyId Algorithm
1,208,294 UART: [idev] --
1,209,355 UART: [ldev] ++
1,209,523 UART: [ldev] CDI.KEYID = 6
1,209,887 UART: [ldev] SUBJECT.KEYID = 5
1,210,314 UART: [ldev] AUTHORITY.KEYID = 7
1,210,777 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,242,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,721 UART: [ldev] --
1,281,103 UART: [fwproc] Wait for Commands...
1,281,764 UART: [fwproc] Recv command 0x46574c44
1,282,497 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,280 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,589 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,417 >>> mbox cmd response: success
2,782,638 UART: [afmc] ++
2,782,806 UART: [afmc] CDI.KEYID = 6
2,783,169 UART: [afmc] SUBJECT.KEYID = 7
2,783,595 UART: [afmc] AUTHORITY.KEYID = 5
2,819,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,796 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,241 UART: [afmc] --
2,863,263 UART: [cold-reset] --
2,864,149 UART: [state] Locking Datavault
2,865,388 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,992 UART: [state] Locking ICCM
2,866,514 UART: [exit] Launching FMC @ 0x40000130
2,871,843 UART:
2,871,859 UART: Running Caliptra FMC ...
2,872,267 UART:
2,872,410 UART: [state] CFI Enabled
2,882,643 UART: [fht] FMC Alias Private Key: 7
2,990,876 UART: [art] Extend RT PCRs Done
2,991,304 UART: [art] Lock RT PCRs Done
2,992,574 UART: [art] Populate DV Done
3,000,931 UART: [fht] FMC Alias Private Key: 7
3,001,889 UART: [art] Derive CDI
3,002,169 UART: [art] Store in in slot 0x4
3,087,654 UART: [art] Derive Key Pair
3,088,014 UART: [art] Store priv key in slot 0x5
3,100,850 UART: [art] Derive Key Pair - Done
3,115,710 UART: [art] Signing Cert with AUTHO
3,116,190 UART: RITY.KEYID = 7
3,131,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,735 UART: [art] PUB.X = A69CC8384E95D69EBF4BC5EF496D0B28A8B3A03528BB81D8EC319A722B91DAA76F0BFE182DB1A5F4E36AEA41E9CA12D9
3,139,523 UART: [art] PUB.Y = C583E3B16A315202F6100F8720392AB927CCEF8F3AD3D4DE7AA0FD63E8EDD2B351C1D990D8E9D6AC194900911F120AB5
3,146,454 UART: [art] SIG.R = 979DB8F80CC235B4914336FF1DD5415814C49B34B3013B048172896928D952BE40251E938B4CE14D8189E86AD3CCE2A0
3,153,211 UART: [art] SIG.S = B6776460A94AB422210C0B3FDD626F1C9228545A9D9FEE604629F7BCBF6076EA41608A1D115857913EA7C79A58E53664
3,177,416 UART: Caliptra RT
3,177,761 UART: [state] CFI Enabled
3,286,011 UART: [rt] RT listening for mailbox commands...
3,286,674 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,467 UART: [rt]cmd =0x46504c54, len=4
3,317,485 >>> mbox cmd response data (8 bytes)
3,317,764 UART: [rt] FIPS self test
3,318,092 UART: [kat] ++
3,318,244 UART: [kat] sha1
3,319,142 UART: Fatal Error: 0x90060001
3,320,681 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,320,686 >>> mbox cmd response: failed
3,320,686 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,320,691 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,983 UART: [state] LifecycleState = Unprovisioned
85,638 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,469 UART: [kat] SHA2-256
891,019 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,148 UART: [kat] ++
895,300 UART: [kat] sha1
899,458 UART: [kat] SHA2-256
901,398 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,345 UART: [kat] LMS
1,168,657 UART: [kat] --
1,169,304 UART: [cold-reset] ++
1,169,818 UART: [fht] FHT @ 0x50003400
1,172,408 UART: [idev] ++
1,172,576 UART: [idev] CDI.KEYID = 6
1,172,937 UART: [idev] SUBJECT.KEYID = 7
1,173,362 UART: [idev] UDS.KEYID = 0
1,173,708 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,600 UART: [idev] Erasing UDS.KEYID = 0
1,198,816 UART: [idev] Sha1 KeyId Algorithm
1,207,708 UART: [idev] --
1,208,817 UART: [ldev] ++
1,208,985 UART: [ldev] CDI.KEYID = 6
1,209,349 UART: [ldev] SUBJECT.KEYID = 5
1,209,776 UART: [ldev] AUTHORITY.KEYID = 7
1,210,239 UART: [ldev] FE.KEYID = 1
1,215,457 UART: [ldev] Erasing FE.KEYID = 1
1,242,240 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,651 UART: [fwproc] Wait for Commands...
1,282,472 UART: [fwproc] Recv command 0x46574c44
1,283,205 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,297 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,111 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,099 ready_for_fw is high
1,057,099 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,287 >>> mbox cmd response: success
2,695,333 UART:
2,695,349 UART: Running Caliptra FMC ...
2,695,757 UART:
2,695,900 UART: [state] CFI Enabled
2,706,263 UART: [fht] FMC Alias Private Key: 7
2,814,624 UART: [art] Extend RT PCRs Done
2,815,052 UART: [art] Lock RT PCRs Done
2,816,690 UART: [art] Populate DV Done
2,825,077 UART: [fht] FMC Alias Private Key: 7
2,826,197 UART: [art] Derive CDI
2,826,477 UART: [art] Store in in slot 0x4
2,912,088 UART: [art] Derive Key Pair
2,912,448 UART: [art] Store priv key in slot 0x5
2,925,944 UART: [art] Derive Key Pair - Done
2,940,601 UART: [art] Signing Cert with AUTHO
2,941,081 UART: RITY.KEYID = 7
2,956,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,114 UART: [art] PUB.X = 9F0886874A1584A5D41237F46A9859039826CD220C71AAC3D02447908AC00567EA24BFE41225127D4F39CF06B8C683E4
2,963,861 UART: [art] PUB.Y = 2696F99BC90A1CB43BB8965CB270BE6FE2C07D9C50F31197D3F9AC5D14C2129EFAF54D4E6D9503800D9A3ED505475A3C
2,970,811 UART: [art] SIG.R = 44078D2C3C0AE7E679662F6E3BA79D1C0BA660F7B78DCEFC5C86C08DF6F8ABFE720FD1148DA592D942030CD7AC5254E6
2,977,581 UART: [art] SIG.S = D078F1C68BA71154375E25DA9623DE9E87F7E77DB2317BEFE2580EF3E349FC95BA42F6BCBB40B9D1794B962B9707597A
3,001,870 UART: Caliptra RT
3,002,215 UART: [state] CFI Enabled
3,110,394 UART: [rt] RT listening for mailbox commands...
3,111,057 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,850 UART: [rt]cmd =0x46504c54, len=4
3,142,020 >>> mbox cmd response data (8 bytes)
3,142,223 UART: [rt] FIPS self test
3,142,551 UART: [kat] ++
3,142,703 UART: [kat] sha1
3,143,311 UART: Fatal Error: 0x90060001
3,144,850 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,144,855 >>> mbox cmd response: failed
3,144,855 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,144,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,557 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,617 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
2,676,900 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,820,716 >>> mbox cmd response: failed
2,821,272 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,965,819 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
4,874,427 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,447,533 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
2,674,020 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,817,752 >>> mbox cmd response: failed
2,818,325 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,961,359 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
4,859,242 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,446,845 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,040,554 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,184,882 >>> mbox cmd response: failed
3,185,447 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,329,043 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
21,582,007 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,008,860 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,030,496 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,175,084 >>> mbox cmd response: failed
3,175,784 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,318,823 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
21,591,472 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,022,213 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,688,847 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,833,127 >>> mbox cmd response: failed
2,833,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,976,964 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,446,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,253,472 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,692,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,836,752 >>> mbox cmd response: failed
2,837,313 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,980,550 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,445,554 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,282,395 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,409 writing to cptra_bootfsm_go
3,047,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,191,283 >>> mbox cmd response: failed
3,191,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,335,077 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
20,194,738 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,912,222 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,044,495 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,188,751 >>> mbox cmd response: failed
3,189,320 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,332,693 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,174,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,915,124 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,689,226 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,833,486 >>> mbox cmd response: failed
2,834,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,977,432 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,443,349 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,259,149 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
2,688,481 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,832,613 >>> mbox cmd response: failed
2,833,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,976,574 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
3,460,069 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,291,787 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,043,710 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,188,242 >>> mbox cmd response: failed
3,188,831 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,332,256 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
20,185,005 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,930,973 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,052,398 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,196,477 >>> mbox cmd response: failed
3,197,021 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,340,404 >>> mbox cmd response: failed
Initializing fuses
984 writing to cptra_bootfsm_go
20,187,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,907,360 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,309 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,317 >>> mbox cmd response: failed
807,317 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,323 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,185 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,181 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,189 >>> mbox cmd response: failed
807,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,359 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,464 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,472 >>> mbox cmd response: failed
807,472 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,720 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,638 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,604 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,612 >>> mbox cmd response: failed
807,612 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,448 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,610 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,905 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
806,913 >>> mbox cmd response: failed
806,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
806,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,713 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,029 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,413 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,421 >>> mbox cmd response: failed
807,421 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,909 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,911 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,334 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,342 >>> mbox cmd response: failed
807,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,928 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,656 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,666 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,674 >>> mbox cmd response: failed
807,674 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,680 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,618 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,120 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
808,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
808,289 >>> mbox cmd response: failed
808,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
808,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,951 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,643 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
806,717 >>> mbox cmd response: failed
806,717 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
806,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,529 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,503 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,646 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,654 >>> mbox cmd response: failed
807,654 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,856 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,382 >>> mbox cmd response: failed
807,382 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
807,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,806 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,836 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,096 UART:
192,483 UART: Running Caliptra ROM ...
193,588 UART:
193,736 UART: [state] CFI Enabled
265,674 UART: [state] LifecycleState = Unprovisioned
267,615 UART: [state] DebugLocked = No
269,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,370 UART: [kat] SHA2-256
444,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,547 UART: [kat] ++
455,107 UART: [kat] sha1
466,638 UART: [kat] SHA2-256
469,365 UART: [kat] SHA2-384
474,998 UART: [kat] SHA2-512-ACC
477,375 UART: [kat] ECC-384
2,768,892 UART: [kat] HMAC-384Kdf
2,800,954 UART: [kat] LMS
3,991,210 UART: [kat] --
3,996,127 UART: [cold-reset] ++
3,998,060 UART: [fht] Storing FHT @ 0x50003400
4,010,187 UART: [idev] ++
4,010,752 UART: [idev] CDI.KEYID = 6
4,011,739 UART: [idev] SUBJECT.KEYID = 7
4,012,993 UART: [idev] UDS.KEYID = 0
4,013,987 ready_for_fw is high
4,014,200 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,158,534 UART: [idev] Erasing UDS.KEYID = 0
7,350,212 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,835 UART: [idev] --
7,374,718 UART: [ldev] ++
7,375,294 UART: [ldev] CDI.KEYID = 6
7,376,208 UART: [ldev] SUBJECT.KEYID = 5
7,377,426 UART: [ldev] AUTHORITY.KEYID = 7
7,378,712 UART: [ldev] FE.KEYID = 1
7,424,833 UART: [ldev] Erasing FE.KEYID = 1
10,758,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,000 UART: [ldev] --
13,139,428 UART: [fwproc] Waiting for Commands...
13,141,037 UART: [fwproc] Received command 0x46574c44
13,143,251 UART: [fwproc] Received Image of size 114716 bytes
17,198,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,269,803 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,338,672 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,657,460 >>> mbox cmd response: success
17,661,412 UART: [afmc] ++
17,662,000 UART: [afmc] CDI.KEYID = 6
17,663,027 UART: [afmc] SUBJECT.KEYID = 7
17,664,191 UART: [afmc] AUTHORITY.KEYID = 5
21,028,275 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,328,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,241 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,345,635 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,360,504 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,374,929 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,138 UART: [afmc] --
23,401,764 UART: [cold-reset] --
23,403,748 UART: [state] Locking Datavault
23,408,672 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,371 UART: [state] Locking ICCM
23,411,821 UART: [exit] Launching FMC @ 0x40000130
23,420,218 UART:
23,420,464 UART: Running Caliptra FMC ...
23,421,567 UART:
23,421,734 UART: [state] CFI Enabled
23,488,101 UART: [fht] FMC Alias Private Key: 7
25,826,350 UART: [art] Extend RT PCRs Done
25,827,576 UART: [art] Lock RT PCRs Done
25,829,173 UART: [art] Populate DV Done
25,834,493 UART: [fht] FMC Alias Private Key: 7
25,836,081 UART: [art] Derive CDI
25,836,900 UART: [art] Store in in slot 0x4
25,896,347 UART: [art] Derive Key Pair
25,897,393 UART: [art] Store priv key in slot 0x5
29,190,199 UART: [art] Derive Key Pair - Done
29,203,485 UART: [art] Signing Cert with AUTHO
29,204,792 UART: RITY.KEYID = 7
31,491,571 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,081 UART: [art] PUB.X = D565679DD0C45512C765E2BE5F423D5677B2E57AB605A217249E5AB85BCB53E733262D0BD1C08228FE92F2F05462399D
31,500,341 UART: [art] PUB.Y = BDAC703D486348E1CD7C0BBF67BFA90EFCF63994338FB0D9256476635A62A9198BC230A6F54A1510BC08DEE10F81358D
31,507,584 UART: [art] SIG.R = 69AD559F23F703C7705C75FFEC8D6784E7EB0AE3D1972C2AB99A8F115962FAC8AFD33388353FBC40B634D609FC27F534
31,514,980 UART: [art] SIG.S = CDF2F47CC17EC87195C38CCFDBA78E2FBCF8FEE0393421CD26452DB010BA6F1FED9084028E7B1CCA49A20B2D009EA362
32,820,293 UART: Caliptra RT
32,821,011 UART: [state] CFI Enabled
32,981,376 UART: [rt] RT listening for mailbox commands...
32,983,247 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,013,050 UART: [rt]cmd =0x46504c54, len=4
33,014,669 >>> mbox cmd response data (8 bytes)
33,015,577 UART: [rt] FIPS self test
33,016,538 UART: [kat] ++
33,016,990 UART: [kat] sha1
33,021,176 UART: Fatal Error: 0x90060002
33,056,391 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,200,523 >>> mbox cmd response: failed
33,201,133 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,345,196 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,101 UART:
190,386 UART: Running Caliptra ROM ...
191,445 UART:
191,590 UART: [state] CFI Enabled
257,093 UART: [state] LifecycleState = Unprovisioned
259,021 UART: [state] DebugLocked = No
261,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,214 UART: [kat] SHA2-256
436,915 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,422 UART: [kat] ++
447,877 UART: [kat] sha1
458,917 UART: [kat] SHA2-256
461,605 UART: [kat] SHA2-384
467,152 UART: [kat] SHA2-512-ACC
469,489 UART: [kat] ECC-384
2,760,047 UART: [kat] HMAC-384Kdf
2,791,981 UART: [kat] LMS
3,982,313 UART: [kat] --
3,986,370 UART: [cold-reset] ++
3,987,399 UART: [fht] Storing FHT @ 0x50003400
3,999,044 UART: [idev] ++
3,999,619 UART: [idev] CDI.KEYID = 6
4,000,660 UART: [idev] SUBJECT.KEYID = 7
4,001,828 UART: [idev] UDS.KEYID = 0
4,003,398 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,148,476 UART: [idev] Erasing UDS.KEYID = 0
7,339,934 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,970 UART: [idev] --
7,366,504 UART: [ldev] ++
7,367,078 UART: [ldev] CDI.KEYID = 6
7,368,023 UART: [ldev] SUBJECT.KEYID = 5
7,369,235 UART: [ldev] AUTHORITY.KEYID = 7
7,370,469 UART: [ldev] FE.KEYID = 1
7,415,471 UART: [ldev] Erasing FE.KEYID = 1
10,746,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,040,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,084,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,103,392 UART: [ldev] --
13,107,486 UART: [fwproc] Waiting for Commands...
13,110,019 UART: [fwproc] Received command 0x46574c44
13,112,215 UART: [fwproc] Received Image of size 114716 bytes
17,173,310 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,250,370 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,319,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,638,409 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,782,838 ready_for_fw is high
3,783,292 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,842,322 >>> mbox cmd response: success
23,529,159 UART:
23,529,560 UART: Running Caliptra FMC ...
23,530,672 UART:
23,530,823 UART: [state] CFI Enabled
23,599,848 UART: [fht] FMC Alias Private Key: 7
25,936,999 UART: [art] Extend RT PCRs Done
25,938,220 UART: [art] Lock RT PCRs Done
25,940,033 UART: [art] Populate DV Done
25,945,569 UART: [fht] FMC Alias Private Key: 7
25,947,228 UART: [art] Derive CDI
25,948,051 UART: [art] Store in in slot 0x4
26,009,702 UART: [art] Derive Key Pair
26,010,745 UART: [art] Store priv key in slot 0x5
29,303,485 UART: [art] Derive Key Pair - Done
29,316,341 UART: [art] Signing Cert with AUTHO
29,317,686 UART: RITY.KEYID = 7
31,605,659 UART: [art] Erasing AUTHORITY.KEYID = 7
31,607,168 UART: [art] PUB.X = 796B45EDCAF911BCB3706A75BEA889405FAA11605AAC4E8D2258767933843A48F22296ABAE6E4B342EAB0089D08F52CE
31,614,424 UART: [art] PUB.Y = B5936144E67FD9A410ABA06BCCFC87BD6FDF9784690888838A14D29D563DF06E0F4C8D749804CB41F4FA60948F804581
31,621,663 UART: [art] SIG.R = 0E29A53F3D866A31F2F189AC63A2532B1FD7B49FCA80AC59C716249832540BF24E4D988C57BAD810E62F277CE25680A7
31,629,064 UART: [art] SIG.S = BAD775C70896C7E6EE5A6E8E7466B716710F51F7E7913ED00BDD454D6AA98965F9B6635C06A21100032C4DD533AA37AB
32,934,284 UART: Caliptra RT
32,934,985 UART: [state] CFI Enabled
33,096,169 UART: [rt] RT listening for mailbox commands...
33,098,022 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,127,688 UART: [rt]cmd =0x46504c54, len=4
33,129,428 >>> mbox cmd response data (8 bytes)
33,130,597 UART: [rt] FIPS self test
33,131,535 UART: [kat] ++
33,131,984 UART: [kat] sha1
33,136,356 UART: Fatal Error: 0x90060002
33,171,732 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,316,234 >>> mbox cmd response: failed
33,316,819 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,460,739 >>> mbox cmd response: failed
Initializing fuses
928 writing to cptra_bootfsm_go
3,795,086 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,881,151 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,505 UART:
192,862 UART: Running Caliptra ROM ...
193,960 UART:
603,837 UART: [state] CFI Enabled
617,563 UART: [state] LifecycleState = Unprovisioned
619,450 UART: [state] DebugLocked = No
622,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,185 UART: [kat] SHA2-256
797,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,475 UART: [kat] ++
808,969 UART: [kat] sha1
818,709 UART: [kat] SHA2-256
821,433 UART: [kat] SHA2-384
827,423 UART: [kat] SHA2-512-ACC
829,796 UART: [kat] ECC-384
3,113,335 UART: [kat] HMAC-384Kdf
3,123,592 UART: [kat] LMS
4,313,737 UART: [kat] --
4,317,854 UART: [cold-reset] ++
4,320,103 UART: [fht] Storing FHT @ 0x50003400
4,332,372 UART: [idev] ++
4,332,936 UART: [idev] CDI.KEYID = 6
4,333,918 UART: [idev] SUBJECT.KEYID = 7
4,335,168 UART: [idev] UDS.KEYID = 0
4,336,236 ready_for_fw is high
4,336,472 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,480,675 UART: [idev] Erasing UDS.KEYID = 0
7,621,354 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,323 UART: [idev] --
7,645,998 UART: [ldev] ++
7,646,567 UART: [ldev] CDI.KEYID = 6
7,647,529 UART: [ldev] SUBJECT.KEYID = 5
7,648,740 UART: [ldev] AUTHORITY.KEYID = 7
7,650,029 UART: [ldev] FE.KEYID = 1
7,658,897 UART: [ldev] Erasing FE.KEYID = 1
10,942,007 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,836 UART: [ldev] --
13,304,004 UART: [fwproc] Waiting for Commands...
13,306,106 UART: [fwproc] Received command 0x46574c44
13,308,291 UART: [fwproc] Received Image of size 114716 bytes
17,364,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,437,390 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,506,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,824,753 >>> mbox cmd response: success
17,828,273 UART: [afmc] ++
17,828,868 UART: [afmc] CDI.KEYID = 6
17,829,755 UART: [afmc] SUBJECT.KEYID = 7
17,831,040 UART: [afmc] AUTHORITY.KEYID = 5
21,147,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,440,670 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,442,923 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,457,283 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,472,143 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,486,583 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,509,105 UART: [afmc] --
23,512,304 UART: [cold-reset] --
23,517,305 UART: [state] Locking Datavault
23,522,715 UART: [state] Locking PCR0, PCR1 and PCR31
23,524,417 UART: [state] Locking ICCM
23,525,592 UART: [exit] Launching FMC @ 0x40000130
23,533,984 UART:
23,534,230 UART: Running Caliptra FMC ...
23,535,333 UART:
23,535,517 UART: [state] CFI Enabled
23,543,463 UART: [fht] FMC Alias Private Key: 7
25,874,398 UART: [art] Extend RT PCRs Done
25,875,627 UART: [art] Lock RT PCRs Done
25,877,277 UART: [art] Populate DV Done
25,882,963 UART: [fht] FMC Alias Private Key: 7
25,884,664 UART: [art] Derive CDI
25,885,480 UART: [art] Store in in slot 0x4
25,928,345 UART: [art] Derive Key Pair
25,929,381 UART: [art] Store priv key in slot 0x5
29,170,764 UART: [art] Derive Key Pair - Done
29,183,768 UART: [art] Signing Cert with AUTHO
29,185,259 UART: RITY.KEYID = 7
31,464,698 UART: [art] Erasing AUTHORITY.KEYID = 7
31,466,204 UART: [art] PUB.X = B35D10915A3DCF56D3ACE04EC776B6EC6844EE073DE7E7CD32C3CE544E2AE21878407DDC8AD505E435F836F215A8AD35
31,473,457 UART: [art] PUB.Y = 6E6DBDB0880E8CE6A9BD59412DD6711C37C1C3BF8EACBD8173D7A130C85FD9849E5E0ACA12CCA1EDB4A51B8A55DE174D
31,480,771 UART: [art] SIG.R = 999E87316BC42601DE9B31507788D3C6B34A0B1DD7AEE5DFF265FD3F5AF2391B748B60805BA3BBF09030D0E2686CED27
31,488,164 UART: [art] SIG.S = 8110D8B8B44C89118ABD0332AF0AAB264CC1F3C035C7A30FE72938D5B2B85DBEBC56319FF110D38C3EA9AD196725B43E
32,793,262 UART: Caliptra RT
32,793,964 UART: [state] CFI Enabled
32,911,830 UART: [rt] RT listening for mailbox commands...
32,913,690 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,943,327 UART: [rt]cmd =0x46504c54, len=4
32,944,830 >>> mbox cmd response data (8 bytes)
32,945,967 UART: [rt] FIPS self test
32,946,912 UART: [kat] ++
32,947,363 UART: [kat] sha1
32,951,602 UART: Fatal Error: 0x90060002
32,986,801 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,131,219 >>> mbox cmd response: failed
33,131,897 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,275,946 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
189,990 UART:
190,281 UART: Running Caliptra ROM ...
191,393 UART:
7,250,520 UART: [state] CFI Enabled
7,265,007 UART: [state] LifecycleState = Unprovisioned
7,266,927 UART: [state] DebugLocked = No
7,269,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,273,489 UART: [kat] SHA2-256
7,443,247 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,453,750 UART: [kat] ++
7,454,210 UART: [kat] sha1
7,465,423 UART: [kat] SHA2-256
7,468,168 UART: [kat] SHA2-384
7,474,584 UART: [kat] SHA2-512-ACC
7,476,962 UART: [kat] ECC-384
9,762,243 UART: [kat] HMAC-384Kdf
9,773,727 UART: [kat] LMS
10,963,843 UART: [kat] --
10,968,935 UART: [cold-reset] ++
10,970,547 UART: [fht] Storing FHT @ 0x50003400
10,980,351 UART: [idev] ++
10,980,910 UART: [idev] CDI.KEYID = 6
10,981,842 UART: [idev] SUBJECT.KEYID = 7
10,983,107 UART: [idev] UDS.KEYID = 0
10,984,594 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,128,571 UART: [idev] Erasing UDS.KEYID = 0
14,272,576 UART: [idev] Using Sha1 for KeyId Algorithm
14,295,258 UART: [idev] --
14,299,304 UART: [ldev] ++
14,299,875 UART: [ldev] CDI.KEYID = 6
14,300,828 UART: [ldev] SUBJECT.KEYID = 5
14,302,040 UART: [ldev] AUTHORITY.KEYID = 7
14,303,329 UART: [ldev] FE.KEYID = 1
14,313,583 UART: [ldev] Erasing FE.KEYID = 1
17,600,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,894,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,908,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,923,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,938,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,957,406 UART: [ldev] --
19,962,276 UART: [fwproc] Waiting for Commands...
19,964,437 UART: [fwproc] Received command 0x46574c44
19,966,622 UART: [fwproc] Received Image of size 114716 bytes
24,023,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,102,011 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,170,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,490,956 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
4,127,505 ready_for_fw is high
4,127,968 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,088,520 >>> mbox cmd response: success
23,734,256 UART:
23,734,651 UART: Running Caliptra FMC ...
23,735,776 UART:
23,735,929 UART: [state] CFI Enabled
23,743,717 UART: [fht] FMC Alias Private Key: 7
26,074,480 UART: [art] Extend RT PCRs Done
26,075,710 UART: [art] Lock RT PCRs Done
26,077,423 UART: [art] Populate DV Done
26,082,970 UART: [fht] FMC Alias Private Key: 7
26,084,624 UART: [art] Derive CDI
26,085,394 UART: [art] Store in in slot 0x4
26,128,003 UART: [art] Derive Key Pair
26,129,058 UART: [art] Store priv key in slot 0x5
29,371,120 UART: [art] Derive Key Pair - Done
29,383,746 UART: [art] Signing Cert with AUTHO
29,385,091 UART: RITY.KEYID = 7
31,664,531 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,046 UART: [art] PUB.X = 91136C75D9FCF0F6E40CF3F5B3FDF96D8548148E336D9EB7FF371CDAC89118667872EF1CC9AB617E03895D1E7CB9B73A
31,673,264 UART: [art] PUB.Y = 3FDCB774E7C000DFD4ED9F5C5674F45AA736A67EC512BC78BA84C84B193B3EB7A4DD1DF0B5F6E0F537738030559896F7
31,680,506 UART: [art] SIG.R = 754F26860A7C6E13C92370EC05440D2CE372C4139FDB202950B4B41568A33FE7E421FDC49F241ECB73BCA957BC9E30FD
31,687,902 UART: [art] SIG.S = 2ED63AD9D83B473302F8107BE32C72EB5F0D62D3FE075A4EAEA7FBC49E482CC31F7CA4688BA31BB060BB68C04A191D69
32,993,139 UART: Caliptra RT
32,993,856 UART: [state] CFI Enabled
33,110,651 UART: [rt] RT listening for mailbox commands...
33,112,518 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,142,082 UART: [rt]cmd =0x46504c54, len=4
33,143,722 >>> mbox cmd response data (8 bytes)
33,144,907 UART: [rt] FIPS self test
33,145,867 UART: [kat] ++
33,146,316 UART: [kat] sha1
33,150,608 UART: Fatal Error: 0x90060002
33,185,808 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,329,919 >>> mbox cmd response: failed
33,330,509 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,474,552 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
10,570,266 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,517,605 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,509 UART:
192,879 UART: Running Caliptra ROM ...
194,029 UART:
194,178 UART: [state] CFI Enabled
262,857 UART: [state] LifecycleState = Unprovisioned
264,775 UART: [state] DebugLocked = No
266,656 UART: [state] WD Timer not started. Device not locked for debugging
269,851 UART: [kat] SHA2-256
448,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
460,518 UART: [kat] ++
460,967 UART: [kat] sha1
472,228 UART: [kat] SHA2-256
475,207 UART: [kat] SHA2-384
482,912 UART: [kat] SHA2-512-ACC
485,856 UART: [kat] ECC-384
2,945,769 UART: [kat] HMAC-384Kdf
2,970,729 UART: [kat] LMS
3,500,133 UART: [kat] --
3,503,451 UART: [cold-reset] ++
3,504,423 UART: [fht] FHT @ 0x50003400
3,515,546 UART: [idev] ++
3,516,116 UART: [idev] CDI.KEYID = 6
3,517,003 UART: [idev] SUBJECT.KEYID = 7
3,518,260 UART: [idev] UDS.KEYID = 0
3,519,164 ready_for_fw is high
3,519,374 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,664,028 UART: [idev] Erasing UDS.KEYID = 0
6,026,287 UART: [idev] Sha1 KeyId Algorithm
6,050,538 UART: [idev] --
6,054,970 UART: [ldev] ++
6,055,544 UART: [ldev] CDI.KEYID = 6
6,056,458 UART: [ldev] SUBJECT.KEYID = 5
6,057,677 UART: [ldev] AUTHORITY.KEYID = 7
6,058,914 UART: [ldev] FE.KEYID = 1
6,105,149 UART: [ldev] Erasing FE.KEYID = 1
8,618,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,499 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,388,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,424,518 UART: [ldev] --
10,428,972 UART: [fwproc] Wait for Commands...
10,431,341 UART: [fwproc] Recv command 0x46574c44
10,433,443 UART: [fwproc] Recv'd Img size: 115032 bytes
13,845,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,918,916 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,987,686 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,308,521 >>> mbox cmd response: success
14,313,478 UART: [afmc] ++
14,314,073 UART: [afmc] CDI.KEYID = 6
14,315,014 UART: [afmc] SUBJECT.KEYID = 7
14,316,177 UART: [afmc] AUTHORITY.KEYID = 5
16,843,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,568,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,570,684 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,586,423 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,602,488 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,618,324 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,641,343 UART: [afmc] --
18,645,596 UART: [cold-reset] --
18,649,245 UART: [state] Locking Datavault
18,654,924 UART: [state] Locking PCR0, PCR1 and PCR31
18,656,632 UART: [state] Locking ICCM
18,659,267 UART: [exit] Launching FMC @ 0x40000130
18,667,666 UART:
18,667,903 UART: Running Caliptra FMC ...
18,669,025 UART:
18,669,197 UART: [state] CFI Enabled
18,726,261 UART: [fht] FMC Alias Private Key: 7
20,490,683 UART: [art] Extend RT PCRs Done
20,491,890 UART: [art] Lock RT PCRs Done
20,493,295 UART: [art] Populate DV Done
20,498,816 UART: [fht] FMC Alias Private Key: 7
20,500,418 UART: [art] Derive CDI
20,501,235 UART: [art] Store in in slot 0x4
20,559,848 UART: [art] Derive Key Pair
20,560,888 UART: [art] Store priv key in slot 0x5
23,023,940 UART: [art] Derive Key Pair - Done
23,036,676 UART: [art] Signing Cert with AUTHO
23,037,987 UART: RITY.KEYID = 7
24,749,784 UART: [art] Erasing AUTHORITY.KEYID = 7
24,751,273 UART: [art] PUB.X = 43B79321E8AD83EFEF7D2073E901E11E9A34FBE4BF2E1DAC3D505AACC6580AA80F97D84DA27C1704D286478DEC91DDEE
24,758,645 UART: [art] PUB.Y = C302EFA7B300E2565283AC2AEF4C8125D055A5BA97F4F087C248B833BAD28C0B3D51A812E61C8DE8E4F727C00B5BD97B
24,765,868 UART: [art] SIG.R = A705827F30E5B0086E1BBD806E980B3AD257356C4D23385D93E78E786601C686CAF35584B5DE912719C76F5F5A12CE5E
24,773,238 UART: [art] SIG.S = D24517750DDE4FE07F95DDCA5FB3B97E2CF4B70B2199EF66C9D5DF3075AB4D2517C5D2C36E7BA4EFE89B67D081FAB927
25,753,006 UART: Caliptra RT
25,753,729 UART: [state] CFI Enabled
25,918,484 UART: [rt] RT listening for mailbox commands...
25,920,334 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,950,015 UART: [rt]cmd =0x46504c54, len=4
25,951,604 >>> mbox cmd response data (8 bytes)
25,952,563 UART: [rt] FIPS self test
25,953,514 UART: [kat] ++
25,953,967 UART: [kat] sha1
25,958,207 UART: Fatal Error: 0x90060002
25,993,594 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,138,059 >>> mbox cmd response: failed
26,138,702 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,283,185 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,123 UART:
190,416 UART: Running Caliptra ROM ...
191,527 UART:
191,675 UART: [state] CFI Enabled
254,486 UART: [state] LifecycleState = Unprovisioned
256,312 UART: [state] DebugLocked = No
258,140 UART: [state] WD Timer not started. Device not locked for debugging
262,229 UART: [kat] SHA2-256
441,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,968 UART: [kat] ++
453,494 UART: [kat] sha1
464,159 UART: [kat] SHA2-256
467,157 UART: [kat] SHA2-384
471,800 UART: [kat] SHA2-512-ACC
474,733 UART: [kat] ECC-384
2,919,116 UART: [kat] HMAC-384Kdf
2,942,589 UART: [kat] LMS
3,472,050 UART: [kat] --
3,476,150 UART: [cold-reset] ++
3,478,458 UART: [fht] FHT @ 0x50003400
3,489,329 UART: [idev] ++
3,489,899 UART: [idev] CDI.KEYID = 6
3,490,811 UART: [idev] SUBJECT.KEYID = 7
3,492,029 UART: [idev] UDS.KEYID = 0
3,493,546 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,638,243 UART: [idev] Erasing UDS.KEYID = 0
5,995,756 UART: [idev] Sha1 KeyId Algorithm
6,018,378 UART: [idev] --
6,022,695 UART: [ldev] ++
6,023,329 UART: [ldev] CDI.KEYID = 6
6,024,249 UART: [ldev] SUBJECT.KEYID = 5
6,025,364 UART: [ldev] AUTHORITY.KEYID = 7
6,026,603 UART: [ldev] FE.KEYID = 1
6,070,357 UART: [ldev] Erasing FE.KEYID = 1
8,574,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,329,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,345,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,272 UART: [ldev] --
10,387,050 UART: [fwproc] Wait for Commands...
10,388,886 UART: [fwproc] Recv command 0x46574c44
10,390,987 UART: [fwproc] Recv'd Img size: 115032 bytes
13,800,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,874,774 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,943,567 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,263,088 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,383,878 ready_for_fw is high
3,384,347 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,074,230 >>> mbox cmd response: success
18,367,917 UART:
18,368,296 UART: Running Caliptra FMC ...
18,369,461 UART:
18,369,620 UART: [state] CFI Enabled
18,433,895 UART: [fht] FMC Alias Private Key: 7
20,197,907 UART: [art] Extend RT PCRs Done
20,199,136 UART: [art] Lock RT PCRs Done
20,200,630 UART: [art] Populate DV Done
20,206,083 UART: [fht] FMC Alias Private Key: 7
20,207,692 UART: [art] Derive CDI
20,208,513 UART: [art] Store in in slot 0x4
20,266,803 UART: [art] Derive Key Pair
20,267,849 UART: [art] Store priv key in slot 0x5
22,730,145 UART: [art] Derive Key Pair - Done
22,743,577 UART: [art] Signing Cert with AUTHO
22,744,887 UART: RITY.KEYID = 7
24,456,567 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,080 UART: [art] PUB.X = 8C3C7D8B25353C68C35877295B7E4A97660F346CA31BAEFF8D6193DBBD69133C2F02BB55F3A3C9B4A8293272A928D77D
24,465,371 UART: [art] PUB.Y = 22B9374D0BEC6150CE9E00EAD9F2805B048DE4742BB0D4D9D20D1C5EEAF990D88EAFCCBD9044001153A4CDF2CFB39A57
24,472,590 UART: [art] SIG.R = A293A8534DEA5C63DDED41805FDE20111EA30043B29DEC7F1EEC50211871C6C07462CF1E3C0A18B4D7E5A08BE0F740F5
24,479,983 UART: [art] SIG.S = EC5FC65EA960E3628FC5F7C05E84266DAED385D541B23152AB3E511CE50A65970C33E5A651549C5E472CC1B49B9AA324
25,459,009 UART: Caliptra RT
25,459,716 UART: [state] CFI Enabled
25,624,287 UART: [rt] RT listening for mailbox commands...
25,626,137 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,972 UART: [rt]cmd =0x46504c54, len=4
25,657,579 >>> mbox cmd response data (8 bytes)
25,658,794 UART: [rt] FIPS self test
25,659,743 UART: [kat] ++
25,660,192 UART: [kat] sha1
25,664,484 UART: Fatal Error: 0x90060002
25,699,684 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,844,158 >>> mbox cmd response: failed
25,844,777 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,989,244 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,355,508 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,054,716 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,765 writing to cptra_bootfsm_go
192,975 UART:
193,340 UART: Running Caliptra ROM ...
194,554 UART:
603,957 UART: [state] CFI Enabled
616,984 UART: [state] LifecycleState = Unprovisioned
618,997 UART: [state] DebugLocked = No
620,944 UART: [state] WD Timer not started. Device not locked for debugging
625,355 UART: [kat] SHA2-256
804,457 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,051 UART: [kat] ++
816,502 UART: [kat] sha1
828,157 UART: [kat] SHA2-256
831,163 UART: [kat] SHA2-384
837,939 UART: [kat] SHA2-512-ACC
840,883 UART: [kat] ECC-384
3,282,777 UART: [kat] HMAC-384Kdf
3,295,356 UART: [kat] LMS
3,824,831 UART: [kat] --
3,829,527 UART: [cold-reset] ++
3,831,671 UART: [fht] FHT @ 0x50003400
3,842,577 UART: [idev] ++
3,843,167 UART: [idev] CDI.KEYID = 6
3,844,078 UART: [idev] SUBJECT.KEYID = 7
3,845,333 UART: [idev] UDS.KEYID = 0
3,846,260 ready_for_fw is high
3,846,475 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,990,926 UART: [idev] Erasing UDS.KEYID = 0
6,318,739 UART: [idev] Sha1 KeyId Algorithm
6,343,016 UART: [idev] --
6,346,270 UART: [ldev] ++
6,346,845 UART: [ldev] CDI.KEYID = 6
6,347,753 UART: [ldev] SUBJECT.KEYID = 5
6,348,963 UART: [ldev] AUTHORITY.KEYID = 7
6,350,193 UART: [ldev] FE.KEYID = 1
6,360,567 UART: [ldev] Erasing FE.KEYID = 1
8,831,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,180 UART: [ldev] --
10,622,101 UART: [fwproc] Wait for Commands...
10,624,965 UART: [fwproc] Recv command 0x46574c44
10,627,064 UART: [fwproc] Recv'd Img size: 115032 bytes
14,034,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,766 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,576 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,496,773 >>> mbox cmd response: success
14,500,812 UART: [afmc] ++
14,501,407 UART: [afmc] CDI.KEYID = 6
14,502,293 UART: [afmc] SUBJECT.KEYID = 7
14,503,449 UART: [afmc] AUTHORITY.KEYID = 5
17,007,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,728,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,744,688 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,760,737 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,776,616 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,798,921 UART: [afmc] --
18,801,875 UART: [cold-reset] --
18,806,435 UART: [state] Locking Datavault
18,810,546 UART: [state] Locking PCR0, PCR1 and PCR31
18,812,197 UART: [state] Locking ICCM
18,814,075 UART: [exit] Launching FMC @ 0x40000130
18,822,524 UART:
18,822,759 UART: Running Caliptra FMC ...
18,823,865 UART:
18,824,027 UART: [state] CFI Enabled
18,832,182 UART: [fht] FMC Alias Private Key: 7
20,589,296 UART: [art] Extend RT PCRs Done
20,590,516 UART: [art] Lock RT PCRs Done
20,591,898 UART: [art] Populate DV Done
20,597,360 UART: [fht] FMC Alias Private Key: 7
20,599,004 UART: [art] Derive CDI
20,599,826 UART: [art] Store in in slot 0x4
20,642,039 UART: [art] Derive Key Pair
20,643,081 UART: [art] Store priv key in slot 0x5
23,070,014 UART: [art] Derive Key Pair - Done
23,083,235 UART: [art] Signing Cert with AUTHO
23,084,538 UART: RITY.KEYID = 7
24,790,497 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,005 UART: [art] PUB.X = C1EADF5913C46FABF4D5F4081D02200A727DE71502E8A90A131CE78316A2256EEC29F171C07B40BD5CB17BDC7AE20E7A
24,799,262 UART: [art] PUB.Y = 0A0B6806F2428769F881C59B0172B363E3E5D94B2962583593C89712A7C60163B42669AF379DF07182BFF3408F46333E
24,806,496 UART: [art] SIG.R = 999E007934CA20F6AECB4FFF6C7E99E68DE8DB7227594CEB5B46847777F0DD9C4DD52E8EE2749D4DA2D6326320770D9F
24,813,847 UART: [art] SIG.S = B5985F9519B21B1AA8D56E5676FCCA41D301CDF7973FD52652CDCDE5A12558E20706DD5EBE24502BA50564118DD0F99A
25,793,371 UART: Caliptra RT
25,794,091 UART: [state] CFI Enabled
25,911,271 UART: [rt] RT listening for mailbox commands...
25,913,131 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,943,029 UART: [rt]cmd =0x46504c54, len=4
25,944,768 >>> mbox cmd response data (8 bytes)
25,945,984 UART: [rt] FIPS self test
25,946,927 UART: [kat] ++
25,947,381 UART: [kat] sha1
25,951,650 UART: Fatal Error: 0x90060002
25,987,037 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,131,380 >>> mbox cmd response: failed
26,132,046 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,276,425 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,112 UART:
190,407 UART: Running Caliptra ROM ...
191,436 UART:
14,261,396 UART: [state] CFI Enabled
14,277,440 UART: [state] LifecycleState = Unprovisioned
14,279,301 UART: [state] DebugLocked = No
14,282,084 UART: [state] WD Timer not started. Device not locked for debugging
14,285,345 UART: [kat] SHA2-256
14,464,480 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,476,067 UART: [kat] ++
14,476,529 UART: [kat] sha1
14,487,085 UART: [kat] SHA2-256
14,490,100 UART: [kat] SHA2-384
14,495,332 UART: [kat] SHA2-512-ACC
14,498,327 UART: [kat] ECC-384
16,939,669 UART: [kat] HMAC-384Kdf
16,951,425 UART: [kat] LMS
17,480,889 UART: [kat] --
17,484,499 UART: [cold-reset] ++
17,486,270 UART: [fht] FHT @ 0x50003400
17,497,192 UART: [idev] ++
17,497,757 UART: [idev] CDI.KEYID = 6
17,498,772 UART: [idev] SUBJECT.KEYID = 7
17,499,871 UART: [idev] UDS.KEYID = 0
17,501,447 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,646,215 UART: [idev] Erasing UDS.KEYID = 0
19,966,870 UART: [idev] Sha1 KeyId Algorithm
19,990,094 UART: [idev] --
19,994,738 UART: [ldev] ++
19,995,303 UART: [ldev] CDI.KEYID = 6
19,996,183 UART: [ldev] SUBJECT.KEYID = 5
19,997,393 UART: [ldev] AUTHORITY.KEYID = 7
19,998,646 UART: [ldev] FE.KEYID = 1
20,011,421 UART: [ldev] Erasing FE.KEYID = 1
22,483,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,200,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,216,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,232,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,248,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,268,635 UART: [ldev] --
24,273,637 UART: [fwproc] Wait for Commands...
24,276,437 UART: [fwproc] Recv command 0x46574c44
24,278,529 UART: [fwproc] Recv'd Img size: 115032 bytes
27,690,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,762,346 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,831,135 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,152,272 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,698,084 ready_for_fw is high
3,698,725 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,281,324 >>> mbox cmd response: success
18,533,242 UART:
18,533,637 UART: Running Caliptra FMC ...
18,534,783 UART:
18,534,940 UART: [state] CFI Enabled
18,542,987 UART: [fht] FMC Alias Private Key: 7
20,299,537 UART: [art] Extend RT PCRs Done
20,300,769 UART: [art] Lock RT PCRs Done
20,302,264 UART: [art] Populate DV Done
20,307,564 UART: [fht] FMC Alias Private Key: 7
20,309,272 UART: [art] Derive CDI
20,310,095 UART: [art] Store in in slot 0x4
20,352,887 UART: [art] Derive Key Pair
20,353,935 UART: [art] Store priv key in slot 0x5
22,780,360 UART: [art] Derive Key Pair - Done
22,793,309 UART: [art] Signing Cert with AUTHO
22,794,618 UART: RITY.KEYID = 7
24,499,894 UART: [art] Erasing AUTHORITY.KEYID = 7
24,501,405 UART: [art] PUB.X = 3C548F80E5A084C236B9D39D1EDE7250807AA89B6E98E364913A1C36ED326B654013943C158E14157D34798A62040C74
24,508,628 UART: [art] PUB.Y = 433ADACCD83A68D18A91BF6D4DC0A66BDC5F51E53117B5668C2D1B96001E10386BD9F4480E75213637BFCBEB150E237C
24,515,875 UART: [art] SIG.R = 147946A27D0449B0F6E2DCF0DC55394EF112DBA8857DA2E145D8FA267BFAD221388288B0083E4F5265AD04AC0033B218
24,523,259 UART: [art] SIG.S = F5D3CF6567D5C74C12F88256967E1FAE02036F176DF16CE6369C53F0100574F7392D63F5FCE78FF87C90E4D2355948DF
25,502,284 UART: Caliptra RT
25,502,999 UART: [state] CFI Enabled
25,620,675 UART: [rt] RT listening for mailbox commands...
25,622,520 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,652,241 UART: [rt]cmd =0x46504c54, len=4
25,653,716 >>> mbox cmd response data (8 bytes)
25,654,868 UART: [rt] FIPS self test
25,655,810 UART: [kat] ++
25,656,261 UART: [kat] sha1
25,660,394 UART: Fatal Error: 0x90060002
25,695,766 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,840,176 >>> mbox cmd response: failed
25,840,802 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,985,195 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
17,645,233 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,229,715 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,201 UART:
192,558 UART: Running Caliptra ROM ...
193,762 UART:
193,913 UART: [state] CFI Enabled
265,646 UART: [state] LifecycleState = Unprovisioned
268,061 UART: [state] DebugLocked = No
270,958 UART: [state] WD Timer not started. Device not locked for debugging
276,354 UART: [kat] SHA2-256
466,224 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,986 UART: [kat] ++
477,437 UART: [kat] sha1
489,237 UART: [kat] SHA2-256
492,249 UART: [kat] SHA2-384
498,465 UART: [kat] SHA2-512-ACC
501,059 UART: [kat] ECC-384
2,949,802 UART: [kat] HMAC-384Kdf
2,972,989 UART: [kat] LMS
3,504,841 UART: [kat] --
3,509,194 UART: [cold-reset] ++
3,510,983 UART: [fht] FHT @ 0x50003400
3,521,825 UART: [idev] ++
3,522,469 UART: [idev] CDI.KEYID = 6
3,523,454 UART: [idev] SUBJECT.KEYID = 7
3,524,636 UART: [idev] UDS.KEYID = 0
3,525,905 ready_for_fw is high
3,526,111 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,670,788 UART: [idev] Erasing UDS.KEYID = 0
6,028,462 UART: [idev] Sha1 KeyId Algorithm
6,050,353 UART: [idev] --
6,055,591 UART: [ldev] ++
6,056,276 UART: [ldev] CDI.KEYID = 6
6,057,161 UART: [ldev] SUBJECT.KEYID = 5
6,058,397 UART: [ldev] AUTHORITY.KEYID = 7
6,059,578 UART: [ldev] FE.KEYID = 1
6,100,019 UART: [ldev] Erasing FE.KEYID = 1
8,603,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,240 UART: [ldev] --
10,416,401 UART: [fwproc] Wait for Commands...
10,419,039 UART: [fwproc] Recv command 0x46574c44
10,421,307 UART: [fwproc] Recv'd Img size: 115032 bytes
13,872,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,245 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,389 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,615,391 >>> mbox cmd response: success
14,619,095 UART: [afmc] ++
14,619,797 UART: [afmc] CDI.KEYID = 6
14,620,956 UART: [afmc] SUBJECT.KEYID = 7
14,622,444 UART: [afmc] AUTHORITY.KEYID = 5
17,150,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,597 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,773 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,893 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,896 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,866 UART: [afmc] --
18,969,061 UART: [cold-reset] --
18,972,560 UART: [state] Locking Datavault
18,979,216 UART: [state] Locking PCR0, PCR1 and PCR31
18,981,352 UART: [state] Locking ICCM
18,983,884 UART: [exit] Launching FMC @ 0x40000130
18,992,571 UART:
18,992,815 UART: Running Caliptra FMC ...
18,993,919 UART:
18,994,076 UART: [state] CFI Enabled
19,049,363 UART: [fht] FMC Alias Private Key: 7
20,813,015 UART: [art] Extend RT PCRs Done
20,814,246 UART: [art] Lock RT PCRs Done
20,815,950 UART: [art] Populate DV Done
20,821,631 UART: [fht] FMC Alias Private Key: 7
20,823,220 UART: [art] Derive CDI
20,823,957 UART: [art] Store in in slot 0x4
20,873,577 UART: [art] Derive Key Pair
20,874,616 UART: [art] Store priv key in slot 0x5
23,337,714 UART: [art] Derive Key Pair - Done
23,350,759 UART: [art] Signing Cert with AUTHO
23,352,098 UART: RITY.KEYID = 7
25,062,865 UART: [art] Erasing AUTHORITY.KEYID = 7
25,064,386 UART: [art] PUB.X = 7B51DF415B9650063BD64BBE44830EE3C5FF6F02B33D69FE3FA334848D7FD3EA23A9FEE4BF4E8ABE637D1D3FBE298A5F
25,071,695 UART: [art] PUB.Y = 18FD9E231E43EDAF752051641C043D785ECF88B4F01A2D7438145F39682005D28B1ABA92C619A1478F59A2E461C8F39F
25,078,907 UART: [art] SIG.R = 6F1F6651D2A4222E883CAADFC8A22FF431242316318C25178F22B23F8C86C908D4E44B66AFE8A5492FC828B9BFB8C5A3
25,086,284 UART: [art] SIG.S = 3D4AAC2FA33F45AC1014E670F25045DFDD57D9D5F010E35CD2FC42B4436B69C228A161E1EC5EAA220D290AF8CD2840D3
26,064,865 UART: Caliptra RT
26,065,712 UART: [state] CFI Enabled
26,230,135 UART: [rt] RT listening for mailbox commands...
26,231,987 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,261,604 UART: [rt]cmd =0x46504c54, len=4
26,263,237 >>> mbox cmd response data (8 bytes)
26,264,025 UART: [rt] FIPS self test
26,264,972 UART: [kat] ++
26,265,424 UART: [kat] sha1
26,269,827 UART: Fatal Error: 0x90060002
26,305,025 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,449,625 >>> mbox cmd response: failed
26,450,206 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,594,605 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
189,991 UART:
190,404 UART: Running Caliptra ROM ...
191,430 UART:
191,564 UART: [state] CFI Enabled
256,062 UART: [state] LifecycleState = Unprovisioned
258,387 UART: [state] DebugLocked = No
259,791 UART: [state] WD Timer not started. Device not locked for debugging
264,290 UART: [kat] SHA2-256
454,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,967 UART: [kat] ++
465,442 UART: [kat] sha1
476,666 UART: [kat] SHA2-256
479,686 UART: [kat] SHA2-384
485,018 UART: [kat] SHA2-512-ACC
487,583 UART: [kat] ECC-384
2,941,534 UART: [kat] HMAC-384Kdf
2,962,977 UART: [kat] LMS
3,494,718 UART: [kat] --
3,500,524 UART: [cold-reset] ++
3,501,434 UART: [fht] FHT @ 0x50003400
3,514,154 UART: [idev] ++
3,514,831 UART: [idev] CDI.KEYID = 6
3,515,801 UART: [idev] SUBJECT.KEYID = 7
3,517,017 UART: [idev] UDS.KEYID = 0
3,518,548 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,663,196 UART: [idev] Erasing UDS.KEYID = 0
6,022,959 UART: [idev] Sha1 KeyId Algorithm
6,045,511 UART: [idev] --
6,050,681 UART: [ldev] ++
6,051,379 UART: [ldev] CDI.KEYID = 6
6,052,296 UART: [ldev] SUBJECT.KEYID = 5
6,053,459 UART: [ldev] AUTHORITY.KEYID = 7
6,054,697 UART: [ldev] FE.KEYID = 1
6,094,188 UART: [ldev] Erasing FE.KEYID = 1
8,601,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,964 UART: [ldev] --
10,409,612 UART: [fwproc] Wait for Commands...
10,411,829 UART: [fwproc] Recv command 0x46574c44
10,414,152 UART: [fwproc] Recv'd Img size: 115032 bytes
13,875,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,477 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,608 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,613,399 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,435,340 ready_for_fw is high
3,435,986 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,751,149 >>> mbox cmd response: success
19,051,307 UART:
19,051,702 UART: Running Caliptra FMC ...
19,052,873 UART:
19,053,039 UART: [state] CFI Enabled
19,116,922 UART: [fht] FMC Alias Private Key: 7
20,880,370 UART: [art] Extend RT PCRs Done
20,881,598 UART: [art] Lock RT PCRs Done
20,883,166 UART: [art] Populate DV Done
20,888,590 UART: [fht] FMC Alias Private Key: 7
20,890,233 UART: [art] Derive CDI
20,891,064 UART: [art] Store in in slot 0x4
20,949,628 UART: [art] Derive Key Pair
20,950,630 UART: [art] Store priv key in slot 0x5
23,413,708 UART: [art] Derive Key Pair - Done
23,426,650 UART: [art] Signing Cert with AUTHO
23,427,957 UART: RITY.KEYID = 7
25,139,886 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,410 UART: [art] PUB.X = 4DD22B896019E491A3B1CA595C97B6D699E9C856EA961780612F78AE10F3BDDF5F866CAC2921C9044A7647D66286D4F2
25,148,623 UART: [art] PUB.Y = 92C2DD27F964CAFD8FED2B0BC7C86E4BF6DF7C0286A40498456237ED7D713DBF1AF9D05A6B30D024E66E5AC7F1807D48
25,155,936 UART: [art] SIG.R = 58C97A126679B0C8724B5D0F99EC82A1B49870B63227BCF8BFA74859C66C94F119C6E83E43C3E65F783DD8FD85F7CE0B
25,163,278 UART: [art] SIG.S = 2B078905663664BE266CE3F611885608783B467AC266CE62675DCD2D0763872FCAF813B0E4B55C292947640DEEFD7C7A
26,141,992 UART: Caliptra RT
26,142,709 UART: [state] CFI Enabled
26,308,318 UART: [rt] RT listening for mailbox commands...
26,310,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,339,848 UART: [rt]cmd =0x46504c54, len=4
26,341,568 >>> mbox cmd response data (8 bytes)
26,342,673 UART: [rt] FIPS self test
26,343,617 UART: [kat] ++
26,344,064 UART: [kat] sha1
26,348,303 UART: Fatal Error: 0x90060002
26,383,503 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,528,020 >>> mbox cmd response: failed
26,528,639 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,673,028 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,432,316 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,734,215 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,444 UART:
192,837 UART: Running Caliptra ROM ...
193,992 UART:
603,643 UART: [state] CFI Enabled
618,161 UART: [state] LifecycleState = Unprovisioned
620,535 UART: [state] DebugLocked = No
622,721 UART: [state] WD Timer not started. Device not locked for debugging
626,997 UART: [kat] SHA2-256
816,888 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,699 UART: [kat] ++
828,146 UART: [kat] sha1
838,673 UART: [kat] SHA2-256
841,691 UART: [kat] SHA2-384
847,332 UART: [kat] SHA2-512-ACC
849,919 UART: [kat] ECC-384
3,290,500 UART: [kat] HMAC-384Kdf
3,303,247 UART: [kat] LMS
3,835,084 UART: [kat] --
3,840,296 UART: [cold-reset] ++
3,841,660 UART: [fht] FHT @ 0x50003400
3,852,937 UART: [idev] ++
3,853,656 UART: [idev] CDI.KEYID = 6
3,854,540 UART: [idev] SUBJECT.KEYID = 7
3,855,786 UART: [idev] UDS.KEYID = 0
3,856,689 ready_for_fw is high
3,856,890 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,001,377 UART: [idev] Erasing UDS.KEYID = 0
6,333,551 UART: [idev] Sha1 KeyId Algorithm
6,355,230 UART: [idev] --
6,360,249 UART: [ldev] ++
6,360,930 UART: [ldev] CDI.KEYID = 6
6,361,899 UART: [ldev] SUBJECT.KEYID = 5
6,363,060 UART: [ldev] AUTHORITY.KEYID = 7
6,364,257 UART: [ldev] FE.KEYID = 1
6,375,120 UART: [ldev] Erasing FE.KEYID = 1
8,853,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,330 UART: [ldev] --
10,642,630 UART: [fwproc] Wait for Commands...
10,644,679 UART: [fwproc] Recv command 0x46574c44
10,647,003 UART: [fwproc] Recv'd Img size: 115032 bytes
14,096,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,175,570 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,291,689 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,837,770 >>> mbox cmd response: success
14,842,248 UART: [afmc] ++
14,842,985 UART: [afmc] CDI.KEYID = 6
14,844,179 UART: [afmc] SUBJECT.KEYID = 7
14,845,611 UART: [afmc] AUTHORITY.KEYID = 5
17,348,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,071,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,073,000 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,088,183 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,103,333 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,118,332 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,141,106 UART: [afmc] --
19,145,082 UART: [cold-reset] --
19,149,920 UART: [state] Locking Datavault
19,156,631 UART: [state] Locking PCR0, PCR1 and PCR31
19,158,821 UART: [state] Locking ICCM
19,160,324 UART: [exit] Launching FMC @ 0x40000130
19,169,001 UART:
19,169,263 UART: Running Caliptra FMC ...
19,170,369 UART:
19,170,528 UART: [state] CFI Enabled
19,178,630 UART: [fht] FMC Alias Private Key: 7
20,936,177 UART: [art] Extend RT PCRs Done
20,937,402 UART: [art] Lock RT PCRs Done
20,939,419 UART: [art] Populate DV Done
20,944,835 UART: [fht] FMC Alias Private Key: 7
20,946,525 UART: [art] Derive CDI
20,947,270 UART: [art] Store in in slot 0x4
20,990,462 UART: [art] Derive Key Pair
20,991,461 UART: [art] Store priv key in slot 0x5
23,417,848 UART: [art] Derive Key Pair - Done
23,430,957 UART: [art] Signing Cert with AUTHO
23,432,298 UART: RITY.KEYID = 7
25,137,540 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,062 UART: [art] PUB.X = 608BA2D72D6FA2E46DE34EEB56F33E95F6588CA6AF5176CDAB560321A8B793528EA7B26016919D6ABD45FFB2ED9211F3
25,146,346 UART: [art] PUB.Y = F0610E5832995B60BD61A08690492D25EA0FA93ED596D43931072B9669BC3C88947364B884F6C1601428017558EF58AB
25,153,601 UART: [art] SIG.R = 0DCA9BCAC1B1CECD3248B8CCC13F3BBECF7D7A70BC487C01265AA77255C6AC9B10CD7FB0360433708515E1BE01C48CD4
25,160,976 UART: [art] SIG.S = 3951DCD174ABF2185CC72E82DC4C56923684DEDA709D52B44C7859EAEED3967F8B5BB62BA5EDCCB12E583A8ADF59D871
26,139,968 UART: Caliptra RT
26,140,673 UART: [state] CFI Enabled
26,258,540 UART: [rt] RT listening for mailbox commands...
26,260,396 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,289,921 UART: [rt]cmd =0x46504c54, len=4
26,291,386 >>> mbox cmd response data (8 bytes)
26,292,597 UART: [rt] FIPS self test
26,293,547 UART: [kat] ++
26,293,992 UART: [kat] sha1
26,298,120 UART: Fatal Error: 0x90060002
26,333,485 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,477,961 >>> mbox cmd response: failed
26,478,617 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,622,998 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
189,961 UART:
190,246 UART: Running Caliptra ROM ...
191,268 UART:
13,911,752 UART: [state] CFI Enabled
13,928,308 UART: [state] LifecycleState = Unprovisioned
13,930,755 UART: [state] DebugLocked = No
13,933,553 UART: [state] WD Timer not started. Device not locked for debugging
13,937,422 UART: [kat] SHA2-256
14,127,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,138,071 UART: [kat] ++
14,138,675 UART: [kat] sha1
14,148,439 UART: [kat] SHA2-256
14,151,427 UART: [kat] SHA2-384
14,157,685 UART: [kat] SHA2-512-ACC
14,160,247 UART: [kat] ECC-384
16,602,278 UART: [kat] HMAC-384Kdf
16,616,553 UART: [kat] LMS
17,148,390 UART: [kat] --
17,152,971 UART: [cold-reset] ++
17,154,037 UART: [fht] FHT @ 0x50003400
17,165,833 UART: [idev] ++
17,166,515 UART: [idev] CDI.KEYID = 6
17,167,476 UART: [idev] SUBJECT.KEYID = 7
17,168,690 UART: [idev] UDS.KEYID = 0
17,170,203 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,314,590 UART: [idev] Erasing UDS.KEYID = 0
19,643,036 UART: [idev] Sha1 KeyId Algorithm
19,665,837 UART: [idev] --
19,670,816 UART: [ldev] ++
19,671,495 UART: [ldev] CDI.KEYID = 6
19,672,404 UART: [ldev] SUBJECT.KEYID = 5
19,673,564 UART: [ldev] AUTHORITY.KEYID = 7
19,674,794 UART: [ldev] FE.KEYID = 1
19,685,759 UART: [ldev] Erasing FE.KEYID = 1
22,160,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,880,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,895,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,911,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,926,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,946,216 UART: [ldev] --
23,952,076 UART: [fwproc] Wait for Commands...
23,954,281 UART: [fwproc] Recv command 0x46574c44
23,956,645 UART: [fwproc] Recv'd Img size: 115032 bytes
27,406,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,483,333 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,599,471 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,146,843 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,754,018 ready_for_fw is high
3,754,421 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,963,219 >>> mbox cmd response: success
19,212,934 UART:
19,213,339 UART: Running Caliptra FMC ...
19,214,504 UART:
19,214,692 UART: [state] CFI Enabled
19,222,703 UART: [fht] FMC Alias Private Key: 7
20,979,832 UART: [art] Extend RT PCRs Done
20,981,062 UART: [art] Lock RT PCRs Done
20,982,798 UART: [art] Populate DV Done
20,988,058 UART: [fht] FMC Alias Private Key: 7
20,989,549 UART: [art] Derive CDI
20,990,315 UART: [art] Store in in slot 0x4
21,033,150 UART: [art] Derive Key Pair
21,034,206 UART: [art] Store priv key in slot 0x5
23,461,109 UART: [art] Derive Key Pair - Done
23,474,009 UART: [art] Signing Cert with AUTHO
23,475,327 UART: RITY.KEYID = 7
25,180,384 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,895 UART: [art] PUB.X = 336781F68F08A9948367DD096176EE260D69E543159E2BDDD823FADC8ECB904DE1E847AFD75BB834BA3B25220EB74381
25,189,156 UART: [art] PUB.Y = A9CB3FCED09BBDB0D6FA0761F52BD9EEB206F9CD34A6885C48D01903B010DD1117D3F912B4DE6CB0738E7B12711F4604
25,196,440 UART: [art] SIG.R = ADC7EB4509270DCF2975AF58B9B1DE45F250F97A1F8BF273BADBC6763B06C0601D0D9CA17A7C7D1578805F6737DF1796
25,203,839 UART: [art] SIG.S = 5D11F8810B8076077C66F86CC7BF35DFB5EB4650127F8CA56BF8F80DCD81C5626182FE663755DD165EA0577B7CF73D57
26,182,531 UART: Caliptra RT
26,183,228 UART: [state] CFI Enabled
26,301,007 UART: [rt] RT listening for mailbox commands...
26,302,862 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,332,709 UART: [rt]cmd =0x46504c54, len=4
26,334,397 >>> mbox cmd response data (8 bytes)
26,335,223 UART: [rt] FIPS self test
26,336,162 UART: [kat] ++
26,336,615 UART: [kat] sha1
26,340,964 UART: Fatal Error: 0x90060002
26,376,676 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,521,053 >>> mbox cmd response: failed
26,521,713 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,666,125 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
17,024,792 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,250,287 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,009 UART: [kat] SHA2-256
881,940 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,055 UART: [kat] ++
886,207 UART: [kat] sha1
890,471 UART: [kat] SHA2-256
892,409 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,206 UART: [kat] HMAC-384Kdf
906,834 UART: [kat] LMS
1,475,030 UART: [kat] --
1,475,839 UART: [cold-reset] ++
1,476,355 UART: [fht] Storing FHT @ 0x50003400
1,479,146 UART: [idev] ++
1,479,314 UART: [idev] CDI.KEYID = 6
1,479,674 UART: [idev] SUBJECT.KEYID = 7
1,480,098 UART: [idev] UDS.KEYID = 0
1,480,443 ready_for_fw is high
1,480,443 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,487,884 UART: [idev] Erasing UDS.KEYID = 0
1,504,532 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,210 UART: [idev] --
1,514,153 UART: [ldev] ++
1,514,321 UART: [ldev] CDI.KEYID = 6
1,514,684 UART: [ldev] SUBJECT.KEYID = 5
1,515,110 UART: [ldev] AUTHORITY.KEYID = 7
1,515,573 UART: [ldev] FE.KEYID = 1
1,521,031 UART: [ldev] Erasing FE.KEYID = 1
1,546,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,700 UART: [ldev] --
1,585,987 UART: [fwproc] Waiting for Commands...
1,586,850 UART: [fwproc] Received command 0x46574c44
1,587,641 UART: [fwproc] Received Image of size 115032 bytes
2,893,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,408 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,760 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,745 >>> mbox cmd response: success
3,087,759 UART: [afmc] ++
3,087,927 UART: [afmc] CDI.KEYID = 6
3,088,289 UART: [afmc] SUBJECT.KEYID = 7
3,088,714 UART: [afmc] AUTHORITY.KEYID = 5
3,124,019 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,159 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,887 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,772 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,462 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,543 UART: [afmc] --
3,167,427 UART: [cold-reset] --
3,168,405 UART: [state] Locking Datavault
3,169,748 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,352 UART: [state] Locking ICCM
3,170,924 UART: [exit] Launching FMC @ 0x40000130
3,176,253 UART:
3,176,269 UART: Running Caliptra FMC ...
3,176,677 UART:
3,176,731 UART: [state] CFI Enabled
3,187,102 UART: [fht] FMC Alias Private Key: 7
3,294,869 UART: [art] Extend RT PCRs Done
3,295,297 UART: [art] Lock RT PCRs Done
3,296,841 UART: [art] Populate DV Done
3,305,210 UART: [fht] FMC Alias Private Key: 7
3,306,152 UART: [art] Derive CDI
3,306,432 UART: [art] Store in in slot 0x4
3,391,917 UART: [art] Derive Key Pair
3,392,277 UART: [art] Store priv key in slot 0x5
3,404,803 UART: [art] Derive Key Pair - Done
3,419,897 UART: [art] Signing Cert with AUTHO
3,420,377 UART: RITY.KEYID = 7
3,435,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,630 UART: [art] PUB.X = 39BAFDB3AF7CADD4D23086425C7481FCE83835AB8FA295CD2753DF201731BDEFC366FB341CBD760E669DE275F0AF1D69
3,443,417 UART: [art] PUB.Y = EAAB159BDDA3EC9EB1BD9E8CF02BFC31AFC97F6374D1AD20EC9D53F20550360CBDCF7CC2BEF5C0A6CCE33CB8579E076E
3,450,396 UART: [art] SIG.R = 314763AC7892D00356A1B3DEFCA85B0FB53B618277133D9ECAC52338137AA7B0409FB626634E14A5E76D0E8A19CDA49C
3,457,163 UART: [art] SIG.S = A407DCF922F0FAFED5FFFA852688B0F9BB6818F0156E1207A0911CFA81DF288580F18E1D0C0ACBE38087634A48268E4B
3,480,398 UART: Caliptra RT
3,480,651 UART: [state] CFI Enabled
3,589,106 UART: [rt] RT listening for mailbox commands...
3,589,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,680 UART: [rt]cmd =0x46504c54, len=4
3,620,728 >>> mbox cmd response data (8 bytes)
3,621,043 UART: [rt] FIPS self test
3,621,371 UART: [kat] ++
3,621,523 UART: [kat] sha1
3,625,626 UART: Fatal Error: 0x90060002
3,627,165 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,627,170 >>> mbox cmd response: failed
3,627,170 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,627,175 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,399 UART: [kat] SHA2-256
882,330 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,445 UART: [kat] ++
886,597 UART: [kat] sha1
890,757 UART: [kat] SHA2-256
892,695 UART: [kat] SHA2-384
895,470 UART: [kat] SHA2-512-ACC
897,371 UART: [kat] ECC-384
902,760 UART: [kat] HMAC-384Kdf
907,412 UART: [kat] LMS
1,475,608 UART: [kat] --
1,476,623 UART: [cold-reset] ++
1,477,027 UART: [fht] Storing FHT @ 0x50003400
1,479,904 UART: [idev] ++
1,480,072 UART: [idev] CDI.KEYID = 6
1,480,432 UART: [idev] SUBJECT.KEYID = 7
1,480,856 UART: [idev] UDS.KEYID = 0
1,481,201 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,064 UART: [idev] Erasing UDS.KEYID = 0
1,505,726 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,360 UART: [idev] --
1,515,339 UART: [ldev] ++
1,515,507 UART: [ldev] CDI.KEYID = 6
1,515,870 UART: [ldev] SUBJECT.KEYID = 5
1,516,296 UART: [ldev] AUTHORITY.KEYID = 7
1,516,759 UART: [ldev] FE.KEYID = 1
1,521,571 UART: [ldev] Erasing FE.KEYID = 1
1,547,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,866 UART: [ldev] --
1,586,157 UART: [fwproc] Waiting for Commands...
1,586,818 UART: [fwproc] Received command 0x46574c44
1,587,609 UART: [fwproc] Received Image of size 115032 bytes
2,892,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,168 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,520 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,453 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,665 ready_for_fw is high
1,362,665 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,679 >>> mbox cmd response: success
2,998,869 UART:
2,998,885 UART: Running Caliptra FMC ...
2,999,293 UART:
2,999,347 UART: [state] CFI Enabled
3,009,774 UART: [fht] FMC Alias Private Key: 7
3,118,621 UART: [art] Extend RT PCRs Done
3,119,049 UART: [art] Lock RT PCRs Done
3,120,641 UART: [art] Populate DV Done
3,128,818 UART: [fht] FMC Alias Private Key: 7
3,129,828 UART: [art] Derive CDI
3,130,108 UART: [art] Store in in slot 0x4
3,215,867 UART: [art] Derive Key Pair
3,216,227 UART: [art] Store priv key in slot 0x5
3,229,225 UART: [art] Derive Key Pair - Done
3,243,746 UART: [art] Signing Cert with AUTHO
3,244,226 UART: RITY.KEYID = 7
3,259,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,107 UART: [art] PUB.X = 33F1E815C24FFAC3A974FBC58B34AE5EB5878EC97DD2B8198D16BDF7606EA7F0BD99CFBD2626CCDAA3A21E00A67189CC
3,266,881 UART: [art] PUB.Y = D84617F478CE3039103A367731027DFED825F2DE483F53AF1CCBF31A18094E98C954BF6CFB129014789F2B1AE025E180
3,273,827 UART: [art] SIG.R = 92D28FC7DA5776E45D3979631F500E659549012FA7C2A380BEBC23B62423E9ADE22F5679001AF29055FDFE50D5CDFB8D
3,280,577 UART: [art] SIG.S = 572E194E51779FCD81B0964F6A4C0C3A1CFD7F32FE6526FD9F1A87B30FD92857A8F9A640E7864A902CA6C77B15FBF43B
3,304,376 UART: Caliptra RT
3,304,629 UART: [state] CFI Enabled
3,412,464 UART: [rt] RT listening for mailbox commands...
3,413,127 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,754 UART: [rt]cmd =0x46504c54, len=4
3,443,722 >>> mbox cmd response data (8 bytes)
3,444,085 UART: [rt] FIPS self test
3,444,413 UART: [kat] ++
3,444,565 UART: [kat] sha1
3,448,768 UART: Fatal Error: 0x90060002
3,450,307 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,450,312 >>> mbox cmd response: failed
3,450,312 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,450,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,981 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,021 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
87,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,724 UART: [kat] SHA2-256
882,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,770 UART: [kat] ++
886,922 UART: [kat] sha1
891,188 UART: [kat] SHA2-256
893,126 UART: [kat] SHA2-384
895,951 UART: [kat] SHA2-512-ACC
897,852 UART: [kat] ECC-384
903,719 UART: [kat] HMAC-384Kdf
908,491 UART: [kat] LMS
1,476,687 UART: [kat] --
1,477,584 UART: [cold-reset] ++
1,478,034 UART: [fht] Storing FHT @ 0x50003400
1,480,839 UART: [idev] ++
1,481,007 UART: [idev] CDI.KEYID = 6
1,481,367 UART: [idev] SUBJECT.KEYID = 7
1,481,791 UART: [idev] UDS.KEYID = 0
1,482,136 ready_for_fw is high
1,482,136 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,695 UART: [idev] Erasing UDS.KEYID = 0
1,506,527 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,197 UART: [idev] --
1,516,098 UART: [ldev] ++
1,516,266 UART: [ldev] CDI.KEYID = 6
1,516,629 UART: [ldev] SUBJECT.KEYID = 5
1,517,055 UART: [ldev] AUTHORITY.KEYID = 7
1,517,518 UART: [ldev] FE.KEYID = 1
1,522,948 UART: [ldev] Erasing FE.KEYID = 1
1,548,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,323 UART: [ldev] --
1,587,798 UART: [fwproc] Waiting for Commands...
1,588,461 UART: [fwproc] Received command 0x46574c44
1,589,252 UART: [fwproc] Received Image of size 115032 bytes
2,895,725 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,869 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,953,221 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,090,110 >>> mbox cmd response: success
3,091,362 UART: [afmc] ++
3,091,530 UART: [afmc] CDI.KEYID = 6
3,091,892 UART: [afmc] SUBJECT.KEYID = 7
3,092,317 UART: [afmc] AUTHORITY.KEYID = 5
3,127,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,902 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,682 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,410 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,156,295 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,985 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,904 UART: [afmc] --
3,171,016 UART: [cold-reset] --
3,171,680 UART: [state] Locking Datavault
3,172,807 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,411 UART: [state] Locking ICCM
3,173,929 UART: [exit] Launching FMC @ 0x40000130
3,179,258 UART:
3,179,274 UART: Running Caliptra FMC ...
3,179,682 UART:
3,179,825 UART: [state] CFI Enabled
3,190,206 UART: [fht] FMC Alias Private Key: 7
3,298,013 UART: [art] Extend RT PCRs Done
3,298,441 UART: [art] Lock RT PCRs Done
3,300,315 UART: [art] Populate DV Done
3,308,472 UART: [fht] FMC Alias Private Key: 7
3,309,438 UART: [art] Derive CDI
3,309,718 UART: [art] Store in in slot 0x4
3,395,871 UART: [art] Derive Key Pair
3,396,231 UART: [art] Store priv key in slot 0x5
3,409,893 UART: [art] Derive Key Pair - Done
3,424,567 UART: [art] Signing Cert with AUTHO
3,425,047 UART: RITY.KEYID = 7
3,440,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,441,212 UART: [art] PUB.X = B0ADCAB9BDD78D1E53224197A09F427D2AD4ADC50EE679A49094E4CCBE570F69B8947AB5734F1568E2FE95E40D78879E
3,447,987 UART: [art] PUB.Y = D5797E1FBC374D9D211A3C7FEDE6B2F1CBE63425B3C018EFB564530B84ABC9470E340584CA6C9C78DB3BA250D59B5F69
3,454,944 UART: [art] SIG.R = 60154A86F69FF65313F6FD2173362B7C588E6714C1B7B00C540973DC2F31C46DED244662B034341ABB8864D74A693274
3,461,700 UART: [art] SIG.S = 5FC6FD88713CE63AAC355EC86E66271FB786C2D1D84069A13C16F77A928D6A4DEAE9C70D0795B9479053A4D42EF96DAE
3,485,521 UART: Caliptra RT
3,485,866 UART: [state] CFI Enabled
3,593,350 UART: [rt] RT listening for mailbox commands...
3,594,013 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,604 UART: [rt]cmd =0x46504c54, len=4
3,624,666 >>> mbox cmd response data (8 bytes)
3,625,005 UART: [rt] FIPS self test
3,625,333 UART: [kat] ++
3,625,485 UART: [kat] sha1
3,629,932 UART: Fatal Error: 0x90060002
3,631,471 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,631,476 >>> mbox cmd response: failed
3,631,476 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,631,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,756 UART: [kat] SHA2-256
892,694 UART: [kat] SHA2-384
895,521 UART: [kat] SHA2-512-ACC
897,422 UART: [kat] ECC-384
902,953 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,652 UART: [cold-reset] ++
1,477,166 UART: [fht] Storing FHT @ 0x50003400
1,479,927 UART: [idev] ++
1,480,095 UART: [idev] CDI.KEYID = 6
1,480,455 UART: [idev] SUBJECT.KEYID = 7
1,480,879 UART: [idev] UDS.KEYID = 0
1,481,224 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,185 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,967 UART: [idev] --
1,514,914 UART: [ldev] ++
1,515,082 UART: [ldev] CDI.KEYID = 6
1,515,445 UART: [ldev] SUBJECT.KEYID = 5
1,515,871 UART: [ldev] AUTHORITY.KEYID = 7
1,516,334 UART: [ldev] FE.KEYID = 1
1,521,744 UART: [ldev] Erasing FE.KEYID = 1
1,547,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,077 UART: [ldev] --
1,586,398 UART: [fwproc] Waiting for Commands...
1,587,267 UART: [fwproc] Received command 0x46574c44
1,588,058 UART: [fwproc] Received Image of size 115032 bytes
2,892,623 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,799 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,172 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,062 ready_for_fw is high
1,363,062 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,260 >>> mbox cmd response: success
2,999,116 UART:
2,999,132 UART: Running Caliptra FMC ...
2,999,540 UART:
2,999,683 UART: [state] CFI Enabled
3,010,434 UART: [fht] FMC Alias Private Key: 7
3,118,129 UART: [art] Extend RT PCRs Done
3,118,557 UART: [art] Lock RT PCRs Done
3,120,113 UART: [art] Populate DV Done
3,128,502 UART: [fht] FMC Alias Private Key: 7
3,129,602 UART: [art] Derive CDI
3,129,882 UART: [art] Store in in slot 0x4
3,215,587 UART: [art] Derive Key Pair
3,215,947 UART: [art] Store priv key in slot 0x5
3,228,913 UART: [art] Derive Key Pair - Done
3,243,856 UART: [art] Signing Cert with AUTHO
3,244,336 UART: RITY.KEYID = 7
3,260,072 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,837 UART: [art] PUB.X = E44B85121AADB43277B701D48F2011C136AA32571C7224746E34C451149C54D8F7FDF0A4312EE32155F8ACA4192F9CDE
3,267,606 UART: [art] PUB.Y = A3F412A9A06924154E65F93E0BFF901A52421E40D444AC27422C5D1CFEE55BD40684774C136722379D5B04F61B97CA49
3,274,545 UART: [art] SIG.R = A7A868047DA668621F03D27BA96EBE3EB82E8986CEA50A3455F85FB3ED3C935623C3872315D8F9372AB48BF8EEA1E584
3,281,314 UART: [art] SIG.S = 270FF7981BE74AFE51EDCBFA95E07C415C330FF23B7D300B0716E18611D6EFD6E5832D526997D7B876E8CA78D66B48A7
3,305,417 UART: Caliptra RT
3,305,762 UART: [state] CFI Enabled
3,414,251 UART: [rt] RT listening for mailbox commands...
3,414,914 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,773 UART: [rt]cmd =0x46504c54, len=4
3,446,015 >>> mbox cmd response data (8 bytes)
3,446,136 UART: [rt] FIPS self test
3,446,464 UART: [kat] ++
3,446,616 UART: [kat] sha1
3,450,687 UART: Fatal Error: 0x90060002
3,452,226 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,231 >>> mbox cmd response: failed
3,452,231 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,498 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,160 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
901,923 UART: [kat] SHA2-256
903,863 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,280 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,172,217 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,175,118 UART: [idev] ++
1,175,286 UART: [idev] CDI.KEYID = 6
1,175,646 UART: [idev] SUBJECT.KEYID = 7
1,176,070 UART: [idev] UDS.KEYID = 0
1,176,415 ready_for_fw is high
1,176,415 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,160 UART: [idev] Erasing UDS.KEYID = 0
1,201,367 UART: [idev] Sha1 KeyId Algorithm
1,209,797 UART: [idev] --
1,210,723 UART: [ldev] ++
1,210,891 UART: [ldev] CDI.KEYID = 6
1,211,254 UART: [ldev] SUBJECT.KEYID = 5
1,211,680 UART: [ldev] AUTHORITY.KEYID = 7
1,212,143 UART: [ldev] FE.KEYID = 1
1,217,397 UART: [ldev] Erasing FE.KEYID = 1
1,243,952 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,935 UART: [ldev] --
1,283,220 UART: [fwproc] Wait for Commands...
1,283,886 UART: [fwproc] Recv command 0x46574c44
1,284,614 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,875 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,179 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,072 >>> mbox cmd response: success
2,784,154 UART: [afmc] ++
2,784,322 UART: [afmc] CDI.KEYID = 6
2,784,684 UART: [afmc] SUBJECT.KEYID = 7
2,785,109 UART: [afmc] AUTHORITY.KEYID = 5
2,820,830 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,808 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,199 UART: [afmc] --
2,864,221 UART: [cold-reset] --
2,865,135 UART: [state] Locking Datavault
2,866,296 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,900 UART: [state] Locking ICCM
2,867,334 UART: [exit] Launching FMC @ 0x40000130
2,872,663 UART:
2,872,679 UART: Running Caliptra FMC ...
2,873,087 UART:
2,873,141 UART: [state] CFI Enabled
2,883,726 UART: [fht] FMC Alias Private Key: 7
2,991,963 UART: [art] Extend RT PCRs Done
2,992,391 UART: [art] Lock RT PCRs Done
2,993,969 UART: [art] Populate DV Done
3,002,454 UART: [fht] FMC Alias Private Key: 7
3,003,548 UART: [art] Derive CDI
3,003,828 UART: [art] Store in in slot 0x4
3,089,855 UART: [art] Derive Key Pair
3,090,215 UART: [art] Store priv key in slot 0x5
3,102,535 UART: [art] Derive Key Pair - Done
3,117,200 UART: [art] Signing Cert with AUTHO
3,117,680 UART: RITY.KEYID = 7
3,133,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,873 UART: [art] PUB.X = 86E80E8C57E9DB3D1CD99FFFB29E80A0D8DB291C3F7D04764770FF3B92F8AC6831EE1E11F4F6DB6F296C79540E3E3576
3,140,648 UART: [art] PUB.Y = BCF32E79CD21126E96AB84B401D98FD5E23B728DCBDFDCE2C4C6F5DEBD9B84ED5F26CA98BAA97F46C2E8BFE681732DB6
3,147,627 UART: [art] SIG.R = 6B2CB07A505E6458E48226E1E5A676D955AFC0C6E3F2688B2E484D41756E7469BABD44F0D1537D5C2FC3976DF74074B2
3,154,401 UART: [art] SIG.S = A0146ECF3E76551D42B67884A317E260ADD34D2C37B50DA716536760F27A8A79FC3FCB67E5E25FFBF300AD82C79FB7EB
3,178,285 UART: Caliptra RT
3,178,538 UART: [state] CFI Enabled
3,286,671 UART: [rt] RT listening for mailbox commands...
3,287,334 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,275 UART: [rt]cmd =0x46504c54, len=4
3,318,299 >>> mbox cmd response data (8 bytes)
3,318,606 UART: [rt] FIPS self test
3,318,934 UART: [kat] ++
3,319,086 UART: [kat] sha1
3,323,479 UART: Fatal Error: 0x90060002
3,325,018 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,023 >>> mbox cmd response: failed
3,325,023 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
893,382 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,507 UART: [kat] ++
897,659 UART: [kat] sha1
901,975 UART: [kat] SHA2-256
903,915 UART: [kat] SHA2-384
906,734 UART: [kat] SHA2-512-ACC
908,635 UART: [kat] ECC-384
918,102 UART: [kat] HMAC-384Kdf
922,672 UART: [kat] LMS
1,171,000 UART: [kat] --
1,171,719 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,174,850 UART: [idev] ++
1,175,018 UART: [idev] CDI.KEYID = 6
1,175,378 UART: [idev] SUBJECT.KEYID = 7
1,175,802 UART: [idev] UDS.KEYID = 0
1,176,147 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,482 UART: [idev] Erasing UDS.KEYID = 0
1,200,343 UART: [idev] Sha1 KeyId Algorithm
1,208,733 UART: [idev] --
1,209,963 UART: [ldev] ++
1,210,131 UART: [ldev] CDI.KEYID = 6
1,210,494 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,216,455 UART: [ldev] Erasing FE.KEYID = 1
1,242,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,302 UART: [fwproc] Wait for Commands...
1,283,022 UART: [fwproc] Recv command 0x46574c44
1,283,750 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,471 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,236 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,715 ready_for_fw is high
1,059,715 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,129 >>> mbox cmd response: success
2,696,813 UART:
2,696,829 UART: Running Caliptra FMC ...
2,697,237 UART:
2,697,291 UART: [state] CFI Enabled
2,707,504 UART: [fht] FMC Alias Private Key: 7
2,815,483 UART: [art] Extend RT PCRs Done
2,815,911 UART: [art] Lock RT PCRs Done
2,817,481 UART: [art] Populate DV Done
2,825,832 UART: [fht] FMC Alias Private Key: 7
2,826,874 UART: [art] Derive CDI
2,827,154 UART: [art] Store in in slot 0x4
2,912,635 UART: [art] Derive Key Pair
2,912,995 UART: [art] Store priv key in slot 0x5
2,925,977 UART: [art] Derive Key Pair - Done
2,940,993 UART: [art] Signing Cert with AUTHO
2,941,473 UART: RITY.KEYID = 7
2,956,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,904 UART: [art] PUB.X = 68FC6F6A66CED2BC597A34D6FE03624DB707367091F2D75A3014C19CE399628F446A5E10FAEB8ABBFE48E722223779E8
2,963,676 UART: [art] PUB.Y = 21D2851CFACBD9B6B6B25143FF391D700C10D2FAD33CE6CF60F4945EED20F7C4BAD1600C17F035A487A27C7DE49829C4
2,970,636 UART: [art] SIG.R = 620D4B96A6AB1CC1447B052F39910138FD18D205552954B54CAD79F704516940369DD8C13AA50819956C1216553D206C
2,977,376 UART: [art] SIG.S = B341A99D0135337E6CB1FD28D5FB2FC9B97C59CF85F7FD72F564E5A9C64ACF0F23D63761B062B839AAA8321E64C0A723
3,001,207 UART: Caliptra RT
3,001,460 UART: [state] CFI Enabled
3,109,999 UART: [rt] RT listening for mailbox commands...
3,110,662 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,607 UART: [rt]cmd =0x46504c54, len=4
3,141,845 >>> mbox cmd response data (8 bytes)
3,141,972 UART: [rt] FIPS self test
3,142,300 UART: [kat] ++
3,142,452 UART: [kat] sha1
3,146,611 UART: Fatal Error: 0x90060002
3,148,150 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,148,155 >>> mbox cmd response: failed
3,148,155 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,148,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,759 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,067 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
901,984 UART: [kat] SHA2-256
903,924 UART: [kat] SHA2-384
906,635 UART: [kat] SHA2-512-ACC
908,536 UART: [kat] ECC-384
918,537 UART: [kat] HMAC-384Kdf
922,943 UART: [kat] LMS
1,171,271 UART: [kat] --
1,171,896 UART: [cold-reset] ++
1,172,352 UART: [fht] FHT @ 0x50003400
1,174,961 UART: [idev] ++
1,175,129 UART: [idev] CDI.KEYID = 6
1,175,489 UART: [idev] SUBJECT.KEYID = 7
1,175,913 UART: [idev] UDS.KEYID = 0
1,176,258 ready_for_fw is high
1,176,258 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,947 UART: [idev] Erasing UDS.KEYID = 0
1,201,166 UART: [idev] Sha1 KeyId Algorithm
1,209,512 UART: [idev] --
1,210,684 UART: [ldev] ++
1,210,852 UART: [ldev] CDI.KEYID = 6
1,211,215 UART: [ldev] SUBJECT.KEYID = 5
1,211,641 UART: [ldev] AUTHORITY.KEYID = 7
1,212,104 UART: [ldev] FE.KEYID = 1
1,217,576 UART: [ldev] Erasing FE.KEYID = 1
1,243,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,744 UART: [ldev] --
1,283,237 UART: [fwproc] Wait for Commands...
1,283,937 UART: [fwproc] Recv command 0x46574c44
1,284,665 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,116 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,420 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,223 >>> mbox cmd response: success
2,783,253 UART: [afmc] ++
2,783,421 UART: [afmc] CDI.KEYID = 6
2,783,783 UART: [afmc] SUBJECT.KEYID = 7
2,784,208 UART: [afmc] AUTHORITY.KEYID = 5
2,820,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,304 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,032 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,917 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,636 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,586 UART: [afmc] --
2,863,624 UART: [cold-reset] --
2,864,454 UART: [state] Locking Datavault
2,865,591 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,195 UART: [state] Locking ICCM
2,866,785 UART: [exit] Launching FMC @ 0x40000130
2,872,114 UART:
2,872,130 UART: Running Caliptra FMC ...
2,872,538 UART:
2,872,681 UART: [state] CFI Enabled
2,883,360 UART: [fht] FMC Alias Private Key: 7
2,991,881 UART: [art] Extend RT PCRs Done
2,992,309 UART: [art] Lock RT PCRs Done
2,994,215 UART: [art] Populate DV Done
3,002,286 UART: [fht] FMC Alias Private Key: 7
3,003,448 UART: [art] Derive CDI
3,003,728 UART: [art] Store in in slot 0x4
3,089,413 UART: [art] Derive Key Pair
3,089,773 UART: [art] Store priv key in slot 0x5
3,103,147 UART: [art] Derive Key Pair - Done
3,117,947 UART: [art] Signing Cert with AUTHO
3,118,427 UART: RITY.KEYID = 7
3,133,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,342 UART: [art] PUB.X = 4306C6D31CF399CA2EC568EF8763130BB4F2038E6EE90028AA95E4B7C37583EE11F5BDC48F2F364C65F02E3F86E620BC
3,141,091 UART: [art] PUB.Y = E142379BC520D46FB73644BB40C963269C7459DF16A84BB1845B61506F442AA5E481EFAE1880780F53CF1DAC57723268
3,148,036 UART: [art] SIG.R = 1B9180C9C7D83C1ACD0441D400AC8913CA8D978EC5ED682139834958D3A7216F52EBFE318C03454AB72EC6CE9505D0AC
3,154,783 UART: [art] SIG.S = 2A46F1656EF976F35CD1BCB36C3F8160F74F155ABA302F12CCBB84CD4575FAF52E2492B440E9F6C09775E28A22434DF5
3,178,248 UART: Caliptra RT
3,178,593 UART: [state] CFI Enabled
3,286,588 UART: [rt] RT listening for mailbox commands...
3,287,251 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,996 UART: [rt]cmd =0x46504c54, len=4
3,318,140 >>> mbox cmd response data (8 bytes)
3,318,387 UART: [rt] FIPS self test
3,318,715 UART: [kat] ++
3,318,867 UART: [kat] sha1
3,323,236 UART: Fatal Error: 0x90060002
3,324,775 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,780 >>> mbox cmd response: failed
3,324,780 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,412 UART: [kat] SHA2-256
904,352 UART: [kat] SHA2-384
907,187 UART: [kat] SHA2-512-ACC
909,088 UART: [kat] ECC-384
918,805 UART: [kat] HMAC-384Kdf
923,373 UART: [kat] LMS
1,171,701 UART: [kat] --
1,172,580 UART: [cold-reset] ++
1,173,016 UART: [fht] FHT @ 0x50003400
1,175,811 UART: [idev] ++
1,175,979 UART: [idev] CDI.KEYID = 6
1,176,339 UART: [idev] SUBJECT.KEYID = 7
1,176,763 UART: [idev] UDS.KEYID = 0
1,177,108 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,427 UART: [idev] Erasing UDS.KEYID = 0
1,201,704 UART: [idev] Sha1 KeyId Algorithm
1,210,122 UART: [idev] --
1,211,340 UART: [ldev] ++
1,211,508 UART: [ldev] CDI.KEYID = 6
1,211,871 UART: [ldev] SUBJECT.KEYID = 5
1,212,297 UART: [ldev] AUTHORITY.KEYID = 7
1,212,760 UART: [ldev] FE.KEYID = 1
1,218,096 UART: [ldev] Erasing FE.KEYID = 1
1,244,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,692 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,787 UART: [fwproc] Recv command 0x46574c44
1,285,515 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,730 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,648,034 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,947 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,220 ready_for_fw is high
1,060,220 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,436 >>> mbox cmd response: success
2,697,762 UART:
2,697,778 UART: Running Caliptra FMC ...
2,698,186 UART:
2,698,329 UART: [state] CFI Enabled
2,709,050 UART: [fht] FMC Alias Private Key: 7
2,817,449 UART: [art] Extend RT PCRs Done
2,817,877 UART: [art] Lock RT PCRs Done
2,819,219 UART: [art] Populate DV Done
2,827,406 UART: [fht] FMC Alias Private Key: 7
2,828,588 UART: [art] Derive CDI
2,828,868 UART: [art] Store in in slot 0x4
2,914,585 UART: [art] Derive Key Pair
2,914,945 UART: [art] Store priv key in slot 0x5
2,928,031 UART: [art] Derive Key Pair - Done
2,942,845 UART: [art] Signing Cert with AUTHO
2,943,325 UART: RITY.KEYID = 7
2,958,661 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,426 UART: [art] PUB.X = 73DC84D3D27FC6CD0A4EDE653C42AC2219FDF60FE9E86469C6DD6070DF7AF3C8858F97A859A1ACDE1268C22DB547B577
2,966,208 UART: [art] PUB.Y = 92CEFBFD3C831A61573CFD3B80433767C987DE8FCA84B08F88F12CFEE49F230F4789D022BA06165095CFCF0AABFCC473
2,973,167 UART: [art] SIG.R = 8461F696CDE2A2FE8DDCCD2574D4DC731201F9382483696B86966A1CB74E5B8E5DBA00EEC99B98A7CF0A9CB6277D2D99
2,979,923 UART: [art] SIG.S = D52DCF1C7E3DAEADED1FF5916B73C642C65C0B6B7C5C4D963ED272CA73A8AAD19B0BE26495D4984E87FABB49D9661EB1
3,003,544 UART: Caliptra RT
3,003,889 UART: [state] CFI Enabled
3,112,599 UART: [rt] RT listening for mailbox commands...
3,113,262 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,063 UART: [rt]cmd =0x46504c54, len=4
3,144,205 >>> mbox cmd response data (8 bytes)
3,144,344 UART: [rt] FIPS self test
3,144,672 UART: [kat] ++
3,144,824 UART: [kat] sha1
3,149,015 UART: Fatal Error: 0x90060002
3,150,554 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,150,559 >>> mbox cmd response: failed
3,150,559 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,150,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,400 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,637,422 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,868 UART: [kat] SHA2-512-ACC
906,769 UART: [kat] ECC-384
916,110 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,277 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,174,197 ready_for_fw is high
1,174,197 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,659 UART: [idev] Erasing UDS.KEYID = 0
1,198,073 UART: [idev] Sha1 KeyId Algorithm
1,206,879 UART: [idev] --
1,208,052 UART: [ldev] ++
1,208,220 UART: [ldev] CDI.KEYID = 6
1,208,584 UART: [ldev] SUBJECT.KEYID = 5
1,209,011 UART: [ldev] AUTHORITY.KEYID = 7
1,209,474 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,104 UART: [ldev] --
1,280,410 UART: [fwproc] Wait for Commands...
1,281,153 UART: [fwproc] Recv command 0x46574c44
1,281,886 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,203 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,512 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,300 >>> mbox cmd response: success
2,782,413 UART: [afmc] ++
2,782,581 UART: [afmc] CDI.KEYID = 6
2,782,944 UART: [afmc] SUBJECT.KEYID = 7
2,783,370 UART: [afmc] AUTHORITY.KEYID = 5
2,818,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,443 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,194 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,923 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,806 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,525 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,446 UART: [afmc] --
2,862,384 UART: [cold-reset] --
2,863,244 UART: [state] Locking Datavault
2,864,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,051 UART: [state] Locking ICCM
2,865,671 UART: [exit] Launching FMC @ 0x40000130
2,871,000 UART:
2,871,016 UART: Running Caliptra FMC ...
2,871,424 UART:
2,871,478 UART: [state] CFI Enabled
2,882,355 UART: [fht] FMC Alias Private Key: 7
2,989,852 UART: [art] Extend RT PCRs Done
2,990,280 UART: [art] Lock RT PCRs Done
2,991,832 UART: [art] Populate DV Done
3,000,309 UART: [fht] FMC Alias Private Key: 7
3,001,433 UART: [art] Derive CDI
3,001,713 UART: [art] Store in in slot 0x4
3,087,512 UART: [art] Derive Key Pair
3,087,872 UART: [art] Store priv key in slot 0x5
3,101,152 UART: [art] Derive Key Pair - Done
3,115,928 UART: [art] Signing Cert with AUTHO
3,116,408 UART: RITY.KEYID = 7
3,131,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,443 UART: [art] PUB.X = E383082BFDEA195FEAB886EA9900678B4CBD5BFF9655621ECC00F347E076AE8FF6173B0D8DDB053708F9DA8454155089
3,139,167 UART: [art] PUB.Y = A0AD9C4E4942FEC3214106E08752AC9D8E980A2ACB88FA128ACE65D067F6CE00BB8828CF828F582412FE653941617001
3,146,090 UART: [art] SIG.R = 1EA909CA9747A7D5E2D585D6E0BE4A26E20894159FB0C57F53578A655615D89E0117E0999E92E1B2491CDCC2ED9770B8
3,152,853 UART: [art] SIG.S = 7FE8F1A10FA12385BA2367238CE997BEEC9A2F56C68505FDDA87B276E95EB2642F08992A162A763462C5E2455BEC7659
3,176,953 UART: Caliptra RT
3,177,206 UART: [state] CFI Enabled
3,284,191 UART: [rt] RT listening for mailbox commands...
3,284,854 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,497 UART: [rt]cmd =0x46504c54, len=4
3,315,561 >>> mbox cmd response data (8 bytes)
3,315,928 UART: [rt] FIPS self test
3,316,256 UART: [kat] ++
3,316,408 UART: [kat] sha1
3,320,757 UART: Fatal Error: 0x90060002
3,322,296 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,322,301 >>> mbox cmd response: failed
3,322,301 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,322,306 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,253 UART: [kat] ++
895,405 UART: [kat] sha1
899,463 UART: [kat] SHA2-256
901,403 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
915,986 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,615 UART: [cold-reset] ++
1,170,155 UART: [fht] FHT @ 0x50003400
1,172,765 UART: [idev] ++
1,172,933 UART: [idev] CDI.KEYID = 6
1,173,294 UART: [idev] SUBJECT.KEYID = 7
1,173,719 UART: [idev] UDS.KEYID = 0
1,174,065 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,495 UART: [idev] Erasing UDS.KEYID = 0
1,198,529 UART: [idev] Sha1 KeyId Algorithm
1,207,325 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,215,164 UART: [ldev] Erasing FE.KEYID = 1
1,241,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,050 UART: [fwproc] Wait for Commands...
1,281,741 UART: [fwproc] Recv command 0x46574c44
1,282,474 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,721 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,030 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,894 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,992 ready_for_fw is high
1,055,992 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,738 >>> mbox cmd response: success
2,692,562 UART:
2,692,578 UART: Running Caliptra FMC ...
2,692,986 UART:
2,693,040 UART: [state] CFI Enabled
2,703,445 UART: [fht] FMC Alias Private Key: 7
2,811,776 UART: [art] Extend RT PCRs Done
2,812,204 UART: [art] Lock RT PCRs Done
2,813,682 UART: [art] Populate DV Done
2,822,015 UART: [fht] FMC Alias Private Key: 7
2,823,065 UART: [art] Derive CDI
2,823,345 UART: [art] Store in in slot 0x4
2,909,158 UART: [art] Derive Key Pair
2,909,518 UART: [art] Store priv key in slot 0x5
2,922,538 UART: [art] Derive Key Pair - Done
2,937,578 UART: [art] Signing Cert with AUTHO
2,938,058 UART: RITY.KEYID = 7
2,952,920 UART: [art] Erasing AUTHORITY.KEYID = 7
2,953,685 UART: [art] PUB.X = A2296C542D73887DB2DED60FF1DBBBA669ACD52B38B00D16386796E67D713D6A1A9DD7CB26CCD28DA9FA1B68DDB8830A
2,960,468 UART: [art] PUB.Y = 48A944E1A52A5327AA37B1B287422138678650678CB429C2F0DB4349CD70318141CDD06A3069877D335357DAABCB4E7E
2,967,414 UART: [art] SIG.R = 8E5488D9C1FB09401E14B83E7B3D053F41EB57350323A7EBD594C2AECEBB56695B418EACAA841ED735C76A287044403A
2,974,183 UART: [art] SIG.S = F413606DD6E1740F9842D59D9E92D6313B3FB984B0637906324A367731F25FDE498111D262273EB9EEFAFC6EBFE864E8
2,998,084 UART: Caliptra RT
2,998,337 UART: [state] CFI Enabled
3,105,337 UART: [rt] RT listening for mailbox commands...
3,106,000 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,717 UART: [rt]cmd =0x46504c54, len=4
3,136,979 >>> mbox cmd response data (8 bytes)
3,137,300 UART: [rt] FIPS self test
3,137,628 UART: [kat] ++
3,137,780 UART: [kat] sha1
3,142,113 UART: Fatal Error: 0x90060002
3,143,652 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,143,657 >>> mbox cmd response: failed
3,143,657 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,143,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,672 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,068 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
916,747 UART: [kat] HMAC-384Kdf
921,313 UART: [kat] LMS
1,169,625 UART: [kat] --
1,170,536 UART: [cold-reset] ++
1,171,050 UART: [fht] FHT @ 0x50003400
1,173,908 UART: [idev] ++
1,174,076 UART: [idev] CDI.KEYID = 6
1,174,437 UART: [idev] SUBJECT.KEYID = 7
1,174,862 UART: [idev] UDS.KEYID = 0
1,175,208 ready_for_fw is high
1,175,208 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,904 UART: [idev] Erasing UDS.KEYID = 0
1,200,292 UART: [idev] Sha1 KeyId Algorithm
1,209,144 UART: [idev] --
1,210,199 UART: [ldev] ++
1,210,367 UART: [ldev] CDI.KEYID = 6
1,210,731 UART: [ldev] SUBJECT.KEYID = 5
1,211,158 UART: [ldev] AUTHORITY.KEYID = 7
1,211,621 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,153 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,490 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,799 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,565 >>> mbox cmd response: success
2,782,706 UART: [afmc] ++
2,782,874 UART: [afmc] CDI.KEYID = 6
2,783,237 UART: [afmc] SUBJECT.KEYID = 7
2,783,663 UART: [afmc] AUTHORITY.KEYID = 5
2,819,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,093 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,822 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,331 UART: [afmc] --
2,863,463 UART: [cold-reset] --
2,864,367 UART: [state] Locking Datavault
2,865,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,178 UART: [state] Locking ICCM
2,866,850 UART: [exit] Launching FMC @ 0x40000130
2,872,179 UART:
2,872,195 UART: Running Caliptra FMC ...
2,872,603 UART:
2,872,746 UART: [state] CFI Enabled
2,883,255 UART: [fht] FMC Alias Private Key: 7
2,990,910 UART: [art] Extend RT PCRs Done
2,991,338 UART: [art] Lock RT PCRs Done
2,992,916 UART: [art] Populate DV Done
3,001,075 UART: [fht] FMC Alias Private Key: 7
3,002,051 UART: [art] Derive CDI
3,002,331 UART: [art] Store in in slot 0x4
3,088,222 UART: [art] Derive Key Pair
3,088,582 UART: [art] Store priv key in slot 0x5
3,102,030 UART: [art] Derive Key Pair - Done
3,116,650 UART: [art] Signing Cert with AUTHO
3,117,130 UART: RITY.KEYID = 7
3,132,576 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,341 UART: [art] PUB.X = B4DF6B630B3EA7F1EC53D23DB1A966EB1AF45441C5F1E338BDC6E6FBB3800CE8101432D43896E18845475EF7ED82A6FA
3,140,121 UART: [art] PUB.Y = 614AB68D63D38645E98A07AD8168C746C936051EC160B7FAC30B0B256634C1C8697DD4444E94BE36DE6FE6CEE5745ED9
3,147,065 UART: [art] SIG.R = 3ED1D8E8B3F59B966D5891CB06649643C7702132DBBFECC6418ABF6722FB74CACD83487D7FD89C9D6C2C754468D1D280
3,153,842 UART: [art] SIG.S = 33B00BC32B53A5A6B346E2792BC58A7538FDC4690A10BE7F71E8E18142695FBF6440355697CF2E99A20273C59ECCC0CF
3,178,200 UART: Caliptra RT
3,178,545 UART: [state] CFI Enabled
3,286,760 UART: [rt] RT listening for mailbox commands...
3,287,423 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,448 UART: [rt]cmd =0x46504c54, len=4
3,318,524 >>> mbox cmd response data (8 bytes)
3,318,791 UART: [rt] FIPS self test
3,319,119 UART: [kat] ++
3,319,271 UART: [kat] sha1
3,323,610 UART: Fatal Error: 0x90060002
3,325,149 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,154 >>> mbox cmd response: failed
3,325,154 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
891,293 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,970 UART: [kat] SHA2-256
901,910 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
916,215 UART: [kat] HMAC-384Kdf
920,923 UART: [kat] LMS
1,169,235 UART: [kat] --
1,169,916 UART: [cold-reset] ++
1,170,406 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,174,310 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,870 UART: [idev] Erasing UDS.KEYID = 0
1,199,106 UART: [idev] Sha1 KeyId Algorithm
1,208,030 UART: [idev] --
1,208,905 UART: [ldev] ++
1,209,073 UART: [ldev] CDI.KEYID = 6
1,209,437 UART: [ldev] SUBJECT.KEYID = 5
1,209,864 UART: [ldev] AUTHORITY.KEYID = 7
1,210,327 UART: [ldev] FE.KEYID = 1
1,215,833 UART: [ldev] Erasing FE.KEYID = 1
1,242,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,735 UART: [ldev] --
1,281,175 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,182 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,491 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,419 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,475 ready_for_fw is high
1,056,475 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,021 >>> mbox cmd response: success
2,693,303 UART:
2,693,319 UART: Running Caliptra FMC ...
2,693,727 UART:
2,693,870 UART: [state] CFI Enabled
2,704,665 UART: [fht] FMC Alias Private Key: 7
2,813,130 UART: [art] Extend RT PCRs Done
2,813,558 UART: [art] Lock RT PCRs Done
2,815,218 UART: [art] Populate DV Done
2,823,575 UART: [fht] FMC Alias Private Key: 7
2,824,557 UART: [art] Derive CDI
2,824,837 UART: [art] Store in in slot 0x4
2,910,362 UART: [art] Derive Key Pair
2,910,722 UART: [art] Store priv key in slot 0x5
2,924,290 UART: [art] Derive Key Pair - Done
2,938,827 UART: [art] Signing Cert with AUTHO
2,939,307 UART: RITY.KEYID = 7
2,954,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,348 UART: [art] PUB.X = 57FB1C943707177C3835A4F1D3D307EBE8564D170F0BFEE0B34FD067F0C2FD9D86A236DCD8493A59248F0949F39056E6
2,962,107 UART: [art] PUB.Y = DCC5DA4A7874F95D81258797959761F1A79E2400B46B0BD5DDA0A46850B644EB258502A6220AD0B6179E8807D57FE547
2,969,021 UART: [art] SIG.R = ED9BE3488D158DDE17BB05499C5369F6E6F91282548A55714F831AACB23E14809750C0760A097331842EBE97D31DAE1D
2,975,782 UART: [art] SIG.S = 998F57B334A432398BED0B3D78614D037B511FAC80E5EBF9C70948A3FBAD9ECF91DB3D07BC073AAAAD314DECD74A15CD
2,999,706 UART: Caliptra RT
3,000,051 UART: [state] CFI Enabled
3,108,303 UART: [rt] RT listening for mailbox commands...
3,108,966 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,095 UART: [rt]cmd =0x46504c54, len=4
3,140,119 >>> mbox cmd response data (8 bytes)
3,140,352 UART: [rt] FIPS self test
3,140,680 UART: [kat] ++
3,140,832 UART: [kat] sha1
3,145,227 UART: Fatal Error: 0x90060002
3,146,766 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,146,771 >>> mbox cmd response: failed
3,146,771 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,146,776 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,941 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,767 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
2,503,995 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,647,873 >>> mbox cmd response: failed
2,648,456 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,791,441 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
4,857,692 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,437,719 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
2,513,771 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,657,668 >>> mbox cmd response: failed
2,658,226 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,801,207 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
4,869,937 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,444,763 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,553 writing to cptra_bootfsm_go
2,861,970 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,006,321 >>> mbox cmd response: failed
3,006,898 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,149,738 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
21,585,735 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,032,776 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
2,860,125 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,003,960 >>> mbox cmd response: failed
3,004,519 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,147,524 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
21,583,951 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,016,371 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
2,523,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,668,415 >>> mbox cmd response: failed
2,668,992 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,812,531 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,444,343 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,268,806 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,516,056 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,660,353 >>> mbox cmd response: failed
2,660,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,804,329 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,424,846 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,287,726 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
2,873,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,017,583 >>> mbox cmd response: failed
3,018,159 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,161,398 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,186,962 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,921,219 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
2,867,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,012,051 >>> mbox cmd response: failed
3,012,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,156,075 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,187,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,920,145 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,521,505 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,665,607 >>> mbox cmd response: failed
2,666,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,809,993 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,443,566 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,263,388 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
2,526,689 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,671,502 >>> mbox cmd response: failed
2,672,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,815,494 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,460,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,335,145 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
2,876,493 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,020,756 >>> mbox cmd response: failed
3,021,330 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,164,696 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,182,042 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,905,005 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
2,890,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,034,385 >>> mbox cmd response: failed
3,034,953 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,178,351 >>> mbox cmd response: failed
Initializing fuses
997 writing to cptra_bootfsm_go
20,177,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,884,181 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,688 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,696 >>> mbox cmd response: failed
85,696 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,702 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,189 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,845 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,590 >>> mbox cmd response: failed
85,590 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,083 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,817 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,697 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,705 >>> mbox cmd response: failed
85,705 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,711 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,968 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,204 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,457 >>> mbox cmd response: failed
86,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,874 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,506 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,830 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,838 >>> mbox cmd response: failed
85,838 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,267 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,511 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,444 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,452 >>> mbox cmd response: failed
85,452 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,313 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,597 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,469 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,477 >>> mbox cmd response: failed
86,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,378 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,466 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,227 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,235 >>> mbox cmd response: failed
86,235 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,116 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,086 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,004 >>> mbox cmd response: failed
86,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,019 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,041 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,736 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,744 >>> mbox cmd response: failed
85,744 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,750 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,727 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,995 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,003 >>> mbox cmd response: failed
86,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,390 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,326 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,859 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,867 >>> mbox cmd response: failed
85,867 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
85,873 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,496 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,824 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,131 UART:
192,512 UART: Running Caliptra ROM ...
193,654 UART:
193,804 UART: [state] CFI Enabled
264,646 UART: [state] LifecycleState = Unprovisioned
266,640 UART: [state] DebugLocked = No
267,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,346 UART: [kat] SHA2-256
442,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,552 UART: [kat] ++
453,028 UART: [kat] sha1
464,408 UART: [kat] SHA2-256
467,143 UART: [kat] SHA2-384
473,649 UART: [kat] SHA2-512-ACC
476,019 UART: [kat] ECC-384
2,769,107 UART: [kat] HMAC-384Kdf
2,799,759 UART: [kat] LMS
3,990,021 UART: [kat] --
3,995,112 UART: [cold-reset] ++
3,996,130 UART: [fht] Storing FHT @ 0x50003400
4,008,492 UART: [idev] ++
4,009,105 UART: [idev] CDI.KEYID = 6
4,010,028 UART: [idev] SUBJECT.KEYID = 7
4,011,138 UART: [idev] UDS.KEYID = 0
4,012,203 ready_for_fw is high
4,012,443 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,156,689 UART: [idev] Erasing UDS.KEYID = 0
7,346,423 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,806 UART: [idev] --
7,371,638 UART: [ldev] ++
7,372,224 UART: [ldev] CDI.KEYID = 6
7,373,164 UART: [ldev] SUBJECT.KEYID = 5
7,374,377 UART: [ldev] AUTHORITY.KEYID = 7
7,375,664 UART: [ldev] FE.KEYID = 1
7,422,417 UART: [ldev] Erasing FE.KEYID = 1
10,755,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,990 UART: [ldev] --
13,135,270 UART: [fwproc] Waiting for Commands...
13,137,916 UART: [fwproc] Received command 0x46574c44
13,140,108 UART: [fwproc] Received Image of size 114716 bytes
17,203,839 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,294 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,352,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,671,656 >>> mbox cmd response: success
17,676,612 UART: [afmc] ++
17,677,199 UART: [afmc] CDI.KEYID = 6
17,678,086 UART: [afmc] SUBJECT.KEYID = 7
17,679,353 UART: [afmc] AUTHORITY.KEYID = 5
21,047,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,345,398 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,347,661 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,362,038 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,376,880 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,391,370 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,414,028 UART: [afmc] --
23,417,625 UART: [cold-reset] --
23,422,241 UART: [state] Locking Datavault
23,425,510 UART: [state] Locking PCR0, PCR1 and PCR31
23,427,260 UART: [state] Locking ICCM
23,428,714 UART: [exit] Launching FMC @ 0x40000130
23,437,109 UART:
23,437,344 UART: Running Caliptra FMC ...
23,438,446 UART:
23,438,601 UART: [state] CFI Enabled
23,504,982 UART: [fht] FMC Alias Private Key: 7
25,843,691 UART: [art] Extend RT PCRs Done
25,844,915 UART: [art] Lock RT PCRs Done
25,846,462 UART: [art] Populate DV Done
25,851,878 UART: [fht] FMC Alias Private Key: 7
25,853,463 UART: [art] Derive CDI
25,854,206 UART: [art] Store in in slot 0x4
25,913,464 UART: [art] Derive Key Pair
25,914,462 UART: [art] Store priv key in slot 0x5
29,207,221 UART: [art] Derive Key Pair - Done
29,220,191 UART: [art] Signing Cert with AUTHO
29,221,514 UART: RITY.KEYID = 7
31,508,885 UART: [art] Erasing AUTHORITY.KEYID = 7
31,510,406 UART: [art] PUB.X = 462D615022BB9640E1D09100D4FD8EBA47AE6B2A4F590A2B1EB2A1C84C5C9A5DAAB6341C86EFF2F0CB3CF938AFA240C0
31,517,673 UART: [art] PUB.Y = 595166682EA54E5AE3DB21CA7093832162886D0437BFB91285C2625C4C87A421AD52A0BE6353783B275F3B9FD11BE1C4
31,524,919 UART: [art] SIG.R = D88B5DFA96213E74B0441E7E9ECE83018E042D524CF392135BF69DDA0FD558832701F84167FB5E016A6E739DA6CCF35C
31,532,354 UART: [art] SIG.S = 7F880F2529B87ACDFF2A697E7DBCD7E06FBDCA673D8ACEB6A496FAAF933798E9D90E0F4BBF3FBF87B72DEA46F6EF0B1F
32,837,871 UART: Caliptra RT
32,838,572 UART: [state] CFI Enabled
32,999,643 UART: [rt] RT listening for mailbox commands...
33,001,516 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,030,987 UART: [rt]cmd =0x46504c54, len=4
33,032,574 >>> mbox cmd response data (8 bytes)
33,033,661 UART: [rt] FIPS self test
33,034,604 UART: [kat] ++
33,035,134 UART: [kat] sha1
33,039,329 UART: [kat] SHA2-256
33,040,133 UART: Fatal Error: 0x90010001
33,075,530 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,219,647 >>> mbox cmd response: failed
33,220,262 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,364,184 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
190,073 UART:
190,364 UART: Running Caliptra ROM ...
191,471 UART:
191,621 UART: [state] CFI Enabled
256,321 UART: [state] LifecycleState = Unprovisioned
258,236 UART: [state] DebugLocked = No
259,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,983 UART: [kat] SHA2-256
433,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,189 UART: [kat] ++
444,691 UART: [kat] sha1
456,917 UART: [kat] SHA2-256
459,607 UART: [kat] SHA2-384
465,963 UART: [kat] SHA2-512-ACC
468,353 UART: [kat] ECC-384
2,759,176 UART: [kat] HMAC-384Kdf
2,790,040 UART: [kat] LMS
3,980,328 UART: [kat] --
3,984,825 UART: [cold-reset] ++
3,987,247 UART: [fht] Storing FHT @ 0x50003400
3,997,761 UART: [idev] ++
3,998,329 UART: [idev] CDI.KEYID = 6
3,999,296 UART: [idev] SUBJECT.KEYID = 7
4,000,538 UART: [idev] UDS.KEYID = 0
4,002,064 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,146,379 UART: [idev] Erasing UDS.KEYID = 0
7,336,511 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,539 UART: [idev] --
7,363,177 UART: [ldev] ++
7,363,746 UART: [ldev] CDI.KEYID = 6
7,364,824 UART: [ldev] SUBJECT.KEYID = 5
7,365,943 UART: [ldev] AUTHORITY.KEYID = 7
7,367,183 UART: [ldev] FE.KEYID = 1
7,412,673 UART: [ldev] Erasing FE.KEYID = 1
10,742,716 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,036,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,051,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,066,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,080,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,100,296 UART: [ldev] --
13,104,646 UART: [fwproc] Waiting for Commands...
13,106,697 UART: [fwproc] Received command 0x46574c44
13,108,890 UART: [fwproc] Received Image of size 114716 bytes
17,171,622 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,252,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,321,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,640,246 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,805,399 ready_for_fw is high
3,806,003 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,866,383 >>> mbox cmd response: success
23,567,950 UART:
23,568,368 UART: Running Caliptra FMC ...
23,569,560 UART:
23,569,726 UART: [state] CFI Enabled
23,635,432 UART: [fht] FMC Alias Private Key: 7
25,973,143 UART: [art] Extend RT PCRs Done
25,974,390 UART: [art] Lock RT PCRs Done
25,976,321 UART: [art] Populate DV Done
25,981,903 UART: [fht] FMC Alias Private Key: 7
25,983,400 UART: [art] Derive CDI
25,984,138 UART: [art] Store in in slot 0x4
26,045,784 UART: [art] Derive Key Pair
26,046,832 UART: [art] Store priv key in slot 0x5
29,339,927 UART: [art] Derive Key Pair - Done
29,352,925 UART: [art] Signing Cert with AUTHO
29,354,232 UART: RITY.KEYID = 7
31,641,138 UART: [art] Erasing AUTHORITY.KEYID = 7
31,642,650 UART: [art] PUB.X = 8DB44EB286BABB8A2D32958DCE17356DA912191AB515D9E693469F299625FD2694A3B1DCD55825A624CAABA2C865A306
31,649,908 UART: [art] PUB.Y = 9982923A1A505E58D2B0A5383F159249643CC81D53F090FDB0B227E0585CB9512A3C74F7F53CF5C49544A3CCCE648910
31,657,102 UART: [art] SIG.R = 2CAF05FBFCBC2E67610FB62B0BE6EF7854315DA15ECEEA5CA1D48B2D48F2813A0A68E778EB2CF7EFE36D59C8E930EE75
31,664,507 UART: [art] SIG.S = 7E0D4DE1F0CA676687EA983AADC581370248C1860EF17A27A2BFDE36903C0153A65124B2F86C461984B5347A03A85761
32,969,743 UART: Caliptra RT
32,970,469 UART: [state] CFI Enabled
33,130,716 UART: [rt] RT listening for mailbox commands...
33,132,572 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,162,142 UART: [rt]cmd =0x46504c54, len=4
33,163,697 >>> mbox cmd response data (8 bytes)
33,164,719 UART: [rt] FIPS self test
33,165,670 UART: [kat] ++
33,166,146 UART: [kat] sha1
33,170,550 UART: [kat] SHA2-256
33,171,291 UART: Fatal Error: 0x90010001
33,206,565 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,350,642 >>> mbox cmd response: failed
33,351,290 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,495,681 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,785,986 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,846,030 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,344 UART:
192,713 UART: Running Caliptra ROM ...
193,908 UART:
603,582 UART: [state] CFI Enabled
615,452 UART: [state] LifecycleState = Unprovisioned
617,332 UART: [state] DebugLocked = No
619,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,485 UART: [kat] SHA2-256
794,229 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,753 UART: [kat] ++
805,267 UART: [kat] sha1
816,082 UART: [kat] SHA2-256
818,748 UART: [kat] SHA2-384
824,813 UART: [kat] SHA2-512-ACC
827,187 UART: [kat] ECC-384
3,109,936 UART: [kat] HMAC-384Kdf
3,120,624 UART: [kat] LMS
4,310,761 UART: [kat] --
4,316,391 UART: [cold-reset] ++
4,318,048 UART: [fht] Storing FHT @ 0x50003400
4,330,315 UART: [idev] ++
4,331,051 UART: [idev] CDI.KEYID = 6
4,331,944 UART: [idev] SUBJECT.KEYID = 7
4,333,123 UART: [idev] UDS.KEYID = 0
4,334,210 ready_for_fw is high
4,334,455 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,478,683 UART: [idev] Erasing UDS.KEYID = 0
7,615,396 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,601 UART: [idev] --
7,640,138 UART: [ldev] ++
7,640,761 UART: [ldev] CDI.KEYID = 6
7,641,672 UART: [ldev] SUBJECT.KEYID = 5
7,642,885 UART: [ldev] AUTHORITY.KEYID = 7
7,644,171 UART: [ldev] FE.KEYID = 1
7,654,976 UART: [ldev] Erasing FE.KEYID = 1
10,944,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,170 UART: [ldev] --
13,304,252 UART: [fwproc] Waiting for Commands...
13,306,369 UART: [fwproc] Received command 0x46574c44
13,308,616 UART: [fwproc] Received Image of size 114716 bytes
17,367,966 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,448,732 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,517,622 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,836,392 >>> mbox cmd response: success
17,840,419 UART: [afmc] ++
17,841,010 UART: [afmc] CDI.KEYID = 6
17,841,919 UART: [afmc] SUBJECT.KEYID = 7
17,843,187 UART: [afmc] AUTHORITY.KEYID = 5
21,155,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,452,325 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,454,637 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,469,008 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,483,810 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,498,234 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,519,476 UART: [afmc] --
23,523,249 UART: [cold-reset] --
23,528,246 UART: [state] Locking Datavault
23,532,855 UART: [state] Locking PCR0, PCR1 and PCR31
23,534,605 UART: [state] Locking ICCM
23,537,398 UART: [exit] Launching FMC @ 0x40000130
23,545,740 UART:
23,545,976 UART: Running Caliptra FMC ...
23,547,079 UART:
23,547,245 UART: [state] CFI Enabled
23,555,347 UART: [fht] FMC Alias Private Key: 7
25,885,711 UART: [art] Extend RT PCRs Done
25,886,941 UART: [art] Lock RT PCRs Done
25,888,740 UART: [art] Populate DV Done
25,894,213 UART: [fht] FMC Alias Private Key: 7
25,895,861 UART: [art] Derive CDI
25,896,699 UART: [art] Store in in slot 0x4
25,939,009 UART: [art] Derive Key Pair
25,940,055 UART: [art] Store priv key in slot 0x5
29,182,150 UART: [art] Derive Key Pair - Done
29,195,533 UART: [art] Signing Cert with AUTHO
29,196,838 UART: RITY.KEYID = 7
31,476,286 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,793 UART: [art] PUB.X = 719A1D694701C3136F4BCC97E7E79F676BD20F4D1C179C254077E7094AEB85923A79D4B32027780487765C4B09C5E306
31,484,986 UART: [art] PUB.Y = 03E674B1AE04E4DDFF66C0E921FBF7C4482F099D5DD5002ACFE2850A31A414EBBE0B614F670C6E06A021FA5A86F2508F
31,492,273 UART: [art] SIG.R = D42D3A27C0D176E0FBA97988BCAA01169ABC495E8FEFAFF352B4778F93254522064D104CA7F6A91B569B7760212D2F8C
31,499,711 UART: [art] SIG.S = C427BFAD05CAC7B5666AF43D65BF7EA7F81AD73CC2A94C7266B70437E8B009BAACDD111AF0EE95C2D48F34CF675B7479
32,804,780 UART: Caliptra RT
32,805,492 UART: [state] CFI Enabled
32,923,204 UART: [rt] RT listening for mailbox commands...
32,925,044 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,954,890 UART: [rt]cmd =0x46504c54, len=4
32,956,520 >>> mbox cmd response data (8 bytes)
32,957,870 UART: [rt] FIPS self test
32,958,811 UART: [kat] ++
32,959,257 UART: [kat] sha1
32,963,872 UART: [kat] SHA2-256
32,964,610 UART: Fatal Error: 0x90010001
32,999,733 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,143,789 >>> mbox cmd response: failed
33,144,414 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,288,459 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,042 UART:
190,332 UART: Running Caliptra ROM ...
191,357 UART:
7,241,394 UART: [state] CFI Enabled
7,255,102 UART: [state] LifecycleState = Unprovisioned
7,257,049 UART: [state] DebugLocked = No
7,258,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,264,160 UART: [kat] SHA2-256
7,433,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,444,459 UART: [kat] ++
7,444,997 UART: [kat] sha1
7,456,330 UART: [kat] SHA2-256
7,459,023 UART: [kat] SHA2-384
7,465,822 UART: [kat] SHA2-512-ACC
7,468,173 UART: [kat] ECC-384
9,753,954 UART: [kat] HMAC-384Kdf
9,766,122 UART: [kat] LMS
10,956,229 UART: [kat] --
10,961,596 UART: [cold-reset] ++
10,963,905 UART: [fht] Storing FHT @ 0x50003400
10,974,812 UART: [idev] ++
10,975,431 UART: [idev] CDI.KEYID = 6
10,976,314 UART: [idev] SUBJECT.KEYID = 7
10,977,576 UART: [idev] UDS.KEYID = 0
10,979,121 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,123,200 UART: [idev] Erasing UDS.KEYID = 0
14,270,460 UART: [idev] Using Sha1 for KeyId Algorithm
14,293,120 UART: [idev] --
14,296,656 UART: [ldev] ++
14,297,229 UART: [ldev] CDI.KEYID = 6
14,298,169 UART: [ldev] SUBJECT.KEYID = 5
14,299,379 UART: [ldev] AUTHORITY.KEYID = 7
14,300,661 UART: [ldev] FE.KEYID = 1
14,311,009 UART: [ldev] Erasing FE.KEYID = 1
17,599,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,892,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,907,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,922,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,936,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,954,932 UART: [ldev] --
19,959,004 UART: [fwproc] Waiting for Commands...
19,961,428 UART: [fwproc] Received command 0x46574c44
19,963,612 UART: [fwproc] Received Image of size 114716 bytes
24,022,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,093,754 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,162,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,481,563 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,131,740 ready_for_fw is high
4,132,245 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,092,500 >>> mbox cmd response: success
23,735,284 UART:
23,735,678 UART: Running Caliptra FMC ...
23,736,798 UART:
23,736,953 UART: [state] CFI Enabled
23,744,734 UART: [fht] FMC Alias Private Key: 7
26,075,970 UART: [art] Extend RT PCRs Done
26,077,205 UART: [art] Lock RT PCRs Done
26,078,757 UART: [art] Populate DV Done
26,084,304 UART: [fht] FMC Alias Private Key: 7
26,085,851 UART: [art] Derive CDI
26,086,588 UART: [art] Store in in slot 0x4
26,129,083 UART: [art] Derive Key Pair
26,130,127 UART: [art] Store priv key in slot 0x5
29,372,203 UART: [art] Derive Key Pair - Done
29,385,040 UART: [art] Signing Cert with AUTHO
29,386,350 UART: RITY.KEYID = 7
31,665,447 UART: [art] Erasing AUTHORITY.KEYID = 7
31,666,962 UART: [art] PUB.X = E2A01677B49267D4183B4462902BD581CA3EBF2BE7B220B323396A00E8384EEB1E5964E5732BEA8C7DB98D13B8F0F03D
31,674,168 UART: [art] PUB.Y = 8FC704EF090F79E72D37AF546BAA1047BEC460C13918FA40ACC27170D893A3EEC8820F08AC6787C3FE1625DC975D984B
31,681,416 UART: [art] SIG.R = 93EEB06090D03D32825F004346CDA1133CBAD6B73AECF5A0474F25769A5821C66736587DF460366E67E4B13094D29D72
31,688,763 UART: [art] SIG.S = 859A2FAFEE96EC3C3D78828038404DA2E4E957D0B182BA52067A2F319EF7B325CE62FBD0BB651ED488DD7E91A8459D48
32,994,814 UART: Caliptra RT
32,995,509 UART: [state] CFI Enabled
33,112,478 UART: [rt] RT listening for mailbox commands...
33,114,351 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,144,307 UART: [rt]cmd =0x46504c54, len=4
33,145,886 >>> mbox cmd response data (8 bytes)
33,147,047 UART: [rt] FIPS self test
33,147,990 UART: [kat] ++
33,148,440 UART: [kat] sha1
33,152,820 UART: [kat] SHA2-256
33,153,564 UART: Fatal Error: 0x90010001
33,188,951 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,333,058 >>> mbox cmd response: failed
33,333,700 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,477,541 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
10,577,851 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,524,973 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,380 UART:
192,756 UART: Running Caliptra ROM ...
193,963 UART:
194,118 UART: [state] CFI Enabled
266,130 UART: [state] LifecycleState = Unprovisioned
268,043 UART: [state] DebugLocked = No
270,365 UART: [state] WD Timer not started. Device not locked for debugging
274,351 UART: [kat] SHA2-256
453,430 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,046 UART: [kat] ++
465,593 UART: [kat] sha1
475,343 UART: [kat] SHA2-256
478,347 UART: [kat] SHA2-384
483,708 UART: [kat] SHA2-512-ACC
486,650 UART: [kat] ECC-384
2,949,705 UART: [kat] HMAC-384Kdf
2,971,895 UART: [kat] LMS
3,501,353 UART: [kat] --
3,507,766 UART: [cold-reset] ++
3,509,628 UART: [fht] FHT @ 0x50003400
3,519,899 UART: [idev] ++
3,520,474 UART: [idev] CDI.KEYID = 6
3,521,512 UART: [idev] SUBJECT.KEYID = 7
3,522,616 UART: [idev] UDS.KEYID = 0
3,523,541 ready_for_fw is high
3,523,731 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,374 UART: [idev] Erasing UDS.KEYID = 0
6,025,102 UART: [idev] Sha1 KeyId Algorithm
6,047,581 UART: [idev] --
6,051,473 UART: [ldev] ++
6,052,049 UART: [ldev] CDI.KEYID = 6
6,052,966 UART: [ldev] SUBJECT.KEYID = 5
6,054,186 UART: [ldev] AUTHORITY.KEYID = 7
6,055,445 UART: [ldev] FE.KEYID = 1
6,102,063 UART: [ldev] Erasing FE.KEYID = 1
8,607,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,268 UART: [ldev] --
10,416,371 UART: [fwproc] Wait for Commands...
10,419,498 UART: [fwproc] Recv command 0x46574c44
10,421,592 UART: [fwproc] Recv'd Img size: 115032 bytes
13,835,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,906,922 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,975,697 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,295,646 >>> mbox cmd response: success
14,300,501 UART: [afmc] ++
14,301,154 UART: [afmc] CDI.KEYID = 6
14,302,073 UART: [afmc] SUBJECT.KEYID = 7
14,303,182 UART: [afmc] AUTHORITY.KEYID = 5
16,832,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,574,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,576,166 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,591,905 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,607,971 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,623,834 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,646,974 UART: [afmc] --
18,650,842 UART: [cold-reset] --
18,654,004 UART: [state] Locking Datavault
18,659,740 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,449 UART: [state] Locking ICCM
18,662,896 UART: [exit] Launching FMC @ 0x40000130
18,671,350 UART:
18,671,608 UART: Running Caliptra FMC ...
18,672,714 UART:
18,672,882 UART: [state] CFI Enabled
18,732,661 UART: [fht] FMC Alias Private Key: 7
20,496,049 UART: [art] Extend RT PCRs Done
20,497,278 UART: [art] Lock RT PCRs Done
20,498,915 UART: [art] Populate DV Done
20,504,596 UART: [fht] FMC Alias Private Key: 7
20,506,305 UART: [art] Derive CDI
20,507,118 UART: [art] Store in in slot 0x4
20,564,971 UART: [art] Derive Key Pair
20,566,015 UART: [art] Store priv key in slot 0x5
23,028,238 UART: [art] Derive Key Pair - Done
23,041,250 UART: [art] Signing Cert with AUTHO
23,042,555 UART: RITY.KEYID = 7
24,754,351 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,883 UART: [art] PUB.X = 889A5B4D874FA220A92E27E3887B92D78C53CBF83D3F4301D68BBF26EB594E6249CD6DDE4D60F149E732DCC6E133E3FF
24,763,107 UART: [art] PUB.Y = 6E3F1A92C0B28240695D3E5ABEF4CF3EEB3199DBC35530AFFBB74DE9D4D61FE4FD8E89160FF3A93A2213C92CE68CF7E0
24,770,429 UART: [art] SIG.R = 5FD94F4D1C0BCDCF4508E5A77082BAFBC50EADE02D7B085ADAC564167A42A61B56895DC120D34EDB6CBE64E0AD783502
24,777,888 UART: [art] SIG.S = CF0979B59B4321598C1163EB0DBF08FCC67379A94159F955633DA9CC890E32A8F1F8FAF1FABF553F4A0E2FCD09443B32
25,757,463 UART: Caliptra RT
25,758,181 UART: [state] CFI Enabled
25,921,797 UART: [rt] RT listening for mailbox commands...
25,923,657 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,953,349 UART: [rt]cmd =0x46504c54, len=4
25,954,764 >>> mbox cmd response data (8 bytes)
25,955,668 UART: [rt] FIPS self test
25,956,611 UART: [kat] ++
25,957,065 UART: [kat] sha1
25,961,721 UART: [kat] SHA2-256
25,962,528 UART: Fatal Error: 0x90010001
25,997,907 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,142,429 >>> mbox cmd response: failed
26,143,091 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,287,400 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
189,992 UART:
190,286 UART: Running Caliptra ROM ...
191,313 UART:
191,448 UART: [state] CFI Enabled
256,796 UART: [state] LifecycleState = Unprovisioned
258,660 UART: [state] DebugLocked = No
260,169 UART: [state] WD Timer not started. Device not locked for debugging
263,793 UART: [kat] SHA2-256
442,938 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
454,486 UART: [kat] ++
454,932 UART: [kat] sha1
467,607 UART: [kat] SHA2-256
470,619 UART: [kat] SHA2-384
476,761 UART: [kat] SHA2-512-ACC
479,695 UART: [kat] ECC-384
2,941,891 UART: [kat] HMAC-384Kdf
2,963,305 UART: [kat] LMS
3,492,774 UART: [kat] --
3,496,513 UART: [cold-reset] ++
3,498,888 UART: [fht] FHT @ 0x50003400
3,510,784 UART: [idev] ++
3,511,359 UART: [idev] CDI.KEYID = 6
3,512,266 UART: [idev] SUBJECT.KEYID = 7
3,513,430 UART: [idev] UDS.KEYID = 0
3,514,995 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,659,746 UART: [idev] Erasing UDS.KEYID = 0
6,017,305 UART: [idev] Sha1 KeyId Algorithm
6,040,292 UART: [idev] --
6,044,997 UART: [ldev] ++
6,045,569 UART: [ldev] CDI.KEYID = 6
6,046,476 UART: [ldev] SUBJECT.KEYID = 5
6,047,577 UART: [ldev] AUTHORITY.KEYID = 7
6,048,916 UART: [ldev] FE.KEYID = 1
6,092,561 UART: [ldev] Erasing FE.KEYID = 1
8,597,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,300 UART: [ldev] --
10,405,673 UART: [fwproc] Wait for Commands...
10,408,147 UART: [fwproc] Recv command 0x46574c44
10,410,290 UART: [fwproc] Recv'd Img size: 115032 bytes
13,822,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,069 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,813 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,283,095 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,381,865 ready_for_fw is high
3,382,271 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,077,482 >>> mbox cmd response: success
18,362,822 UART:
18,363,208 UART: Running Caliptra FMC ...
18,364,325 UART:
18,364,499 UART: [state] CFI Enabled
18,432,993 UART: [fht] FMC Alias Private Key: 7
20,196,954 UART: [art] Extend RT PCRs Done
20,198,178 UART: [art] Lock RT PCRs Done
20,199,730 UART: [art] Populate DV Done
20,205,230 UART: [fht] FMC Alias Private Key: 7
20,206,985 UART: [art] Derive CDI
20,207,724 UART: [art] Store in in slot 0x4
20,266,079 UART: [art] Derive Key Pair
20,267,131 UART: [art] Store priv key in slot 0x5
22,730,454 UART: [art] Derive Key Pair - Done
22,743,404 UART: [art] Signing Cert with AUTHO
22,744,711 UART: RITY.KEYID = 7
24,456,133 UART: [art] Erasing AUTHORITY.KEYID = 7
24,457,647 UART: [art] PUB.X = AD70202CAE53D3504F225735F7798BC5EBCF46613594A2D52F8F2954BFDE44751A22B6BC2C960986AC646F87F5BB9A0F
24,464,905 UART: [art] PUB.Y = A307851D549F1E97603E74033DD4AE35312AD23F9848AD2DE806EF1686C547D8465C71FB518D461AF67C0FC6C1035AD7
24,472,174 UART: [art] SIG.R = 9B8EE40773BC879A4A8B41F6B47FD4E3A0B6BA95FCD5844CEBE8FE1BB4559935E132E8FE1FCC2D7B095536DF476AD338
24,479,580 UART: [art] SIG.S = D625349B3BA1A4B144CC77A8F6EBC39DCEA4BE06431514EFABA378784B0EF3D2A4C5F5C057619B3CAFA162333D0B0E9D
25,458,669 UART: Caliptra RT
25,459,372 UART: [state] CFI Enabled
25,623,791 UART: [rt] RT listening for mailbox commands...
25,625,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,655,311 UART: [rt]cmd =0x46504c54, len=4
25,656,940 >>> mbox cmd response data (8 bytes)
25,658,321 UART: [rt] FIPS self test
25,659,256 UART: [kat] ++
25,659,702 UART: [kat] sha1
25,664,102 UART: [kat] SHA2-256
25,664,835 UART: Fatal Error: 0x90010001
25,700,136 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,844,670 >>> mbox cmd response: failed
25,845,260 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,989,736 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,353,721 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,030,648 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,549 writing to cptra_bootfsm_go
192,686 UART:
193,235 UART: Running Caliptra ROM ...
194,460 UART:
603,775 UART: [state] CFI Enabled
617,443 UART: [state] LifecycleState = Unprovisioned
619,400 UART: [state] DebugLocked = No
620,634 UART: [state] WD Timer not started. Device not locked for debugging
623,766 UART: [kat] SHA2-256
802,847 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,445 UART: [kat] ++
814,979 UART: [kat] sha1
825,931 UART: [kat] SHA2-256
829,004 UART: [kat] SHA2-384
834,673 UART: [kat] SHA2-512-ACC
837,576 UART: [kat] ECC-384
3,278,778 UART: [kat] HMAC-384Kdf
3,292,563 UART: [kat] LMS
3,822,048 UART: [kat] --
3,825,335 UART: [cold-reset] ++
3,826,200 UART: [fht] FHT @ 0x50003400
3,837,963 UART: [idev] ++
3,838,559 UART: [idev] CDI.KEYID = 6
3,839,478 UART: [idev] SUBJECT.KEYID = 7
3,840,659 UART: [idev] UDS.KEYID = 0
3,841,587 ready_for_fw is high
3,841,812 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,986,431 UART: [idev] Erasing UDS.KEYID = 0
6,310,653 UART: [idev] Sha1 KeyId Algorithm
6,333,566 UART: [idev] --
6,337,451 UART: [ldev] ++
6,338,020 UART: [ldev] CDI.KEYID = 6
6,338,934 UART: [ldev] SUBJECT.KEYID = 5
6,340,149 UART: [ldev] AUTHORITY.KEYID = 7
6,341,389 UART: [ldev] FE.KEYID = 1
6,354,054 UART: [ldev] Erasing FE.KEYID = 1
8,829,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,548,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,564,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,580,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,596,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,629 UART: [ldev] --
10,619,545 UART: [fwproc] Wait for Commands...
10,621,428 UART: [fwproc] Recv command 0x46574c44
10,623,524 UART: [fwproc] Recv'd Img size: 115032 bytes
14,022,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,537 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,296 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,482,523 >>> mbox cmd response: success
14,487,490 UART: [afmc] ++
14,488,079 UART: [afmc] CDI.KEYID = 6
14,488,995 UART: [afmc] SUBJECT.KEYID = 7
14,490,155 UART: [afmc] AUTHORITY.KEYID = 5
16,987,667 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,708,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,709,968 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,725,702 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,741,742 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,757,633 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,781,990 UART: [afmc] --
18,785,153 UART: [cold-reset] --
18,789,603 UART: [state] Locking Datavault
18,794,531 UART: [state] Locking PCR0, PCR1 and PCR31
18,796,178 UART: [state] Locking ICCM
18,798,919 UART: [exit] Launching FMC @ 0x40000130
18,807,311 UART:
18,807,545 UART: Running Caliptra FMC ...
18,808,648 UART:
18,808,811 UART: [state] CFI Enabled
18,816,914 UART: [fht] FMC Alias Private Key: 7
20,573,065 UART: [art] Extend RT PCRs Done
20,574,271 UART: [art] Lock RT PCRs Done
20,576,105 UART: [art] Populate DV Done
20,581,677 UART: [fht] FMC Alias Private Key: 7
20,583,375 UART: [art] Derive CDI
20,584,194 UART: [art] Store in in slot 0x4
20,626,642 UART: [art] Derive Key Pair
20,627,678 UART: [art] Store priv key in slot 0x5
23,054,334 UART: [art] Derive Key Pair - Done
23,067,443 UART: [art] Signing Cert with AUTHO
23,068,755 UART: RITY.KEYID = 7
24,774,149 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,627 UART: [art] PUB.X = 085585A97E97368C11A8F3C406E9594A14AD576053E38518E4926B2923D0EB1F782D1377D6E6B0B9D3B1276E995F6DFE
24,782,865 UART: [art] PUB.Y = 00DA5DA795DFFF3D7167E8E6363817219B3F7FA0CCCEF1D6C5D2118F20116DCBCDD449DA57B7D3426682C42F4AC6A57B
24,790,149 UART: [art] SIG.R = 6ECF71F0DAD0BC797B90D3AA22A758210F279CDE8E62218F4518DC2278A1383BF63F7380F57EA8AAFE1A8051962FA0E1
24,797,538 UART: [art] SIG.S = 5C2244B6ADA541A39979FC08669251F3EB8408376119383F52F588AB454D0E439FEA626EC1985E7A8FE633EE48624A15
25,777,004 UART: Caliptra RT
25,777,719 UART: [state] CFI Enabled
25,895,219 UART: [rt] RT listening for mailbox commands...
25,897,083 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,926,721 UART: [rt]cmd =0x46504c54, len=4
25,928,351 >>> mbox cmd response data (8 bytes)
25,929,470 UART: [rt] FIPS self test
25,930,410 UART: [kat] ++
25,930,858 UART: [kat] sha1
25,935,395 UART: [kat] SHA2-256
25,936,244 UART: Fatal Error: 0x90010001
25,971,565 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,116,105 >>> mbox cmd response: failed
26,116,752 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,261,036 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
190,116 UART:
190,399 UART: Running Caliptra ROM ...
191,423 UART:
14,259,779 UART: [state] CFI Enabled
14,274,966 UART: [state] LifecycleState = Unprovisioned
14,276,829 UART: [state] DebugLocked = No
14,279,021 UART: [state] WD Timer not started. Device not locked for debugging
14,283,573 UART: [kat] SHA2-256
14,462,703 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,474,288 UART: [kat] ++
14,474,742 UART: [kat] sha1
14,486,543 UART: [kat] SHA2-256
14,489,561 UART: [kat] SHA2-384
14,495,278 UART: [kat] SHA2-512-ACC
14,498,255 UART: [kat] ECC-384
16,938,696 UART: [kat] HMAC-384Kdf
16,951,403 UART: [kat] LMS
17,480,878 UART: [kat] --
17,486,278 UART: [cold-reset] ++
17,488,205 UART: [fht] FHT @ 0x50003400
17,499,666 UART: [idev] ++
17,500,302 UART: [idev] CDI.KEYID = 6
17,501,189 UART: [idev] SUBJECT.KEYID = 7
17,502,349 UART: [idev] UDS.KEYID = 0
17,503,885 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,648,314 UART: [idev] Erasing UDS.KEYID = 0
19,975,993 UART: [idev] Sha1 KeyId Algorithm
19,998,885 UART: [idev] --
20,003,041 UART: [ldev] ++
20,003,617 UART: [ldev] CDI.KEYID = 6
20,004,532 UART: [ldev] SUBJECT.KEYID = 5
20,005,769 UART: [ldev] AUTHORITY.KEYID = 7
20,006,947 UART: [ldev] FE.KEYID = 1
20,018,630 UART: [ldev] Erasing FE.KEYID = 1
22,492,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,209,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,225,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,241,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,257,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,277,954 UART: [ldev] --
24,282,467 UART: [fwproc] Wait for Commands...
24,285,046 UART: [fwproc] Recv command 0x46574c44
24,287,092 UART: [fwproc] Recv'd Img size: 115032 bytes
27,692,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,763,723 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,832,498 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,153,233 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
3,698,959 ready_for_fw is high
3,699,557 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,281,216 >>> mbox cmd response: success
18,524,522 UART:
18,524,907 UART: Running Caliptra FMC ...
18,526,125 UART:
18,526,296 UART: [state] CFI Enabled
18,534,573 UART: [fht] FMC Alias Private Key: 7
20,291,579 UART: [art] Extend RT PCRs Done
20,292,812 UART: [art] Lock RT PCRs Done
20,294,338 UART: [art] Populate DV Done
20,299,682 UART: [fht] FMC Alias Private Key: 7
20,301,391 UART: [art] Derive CDI
20,302,132 UART: [art] Store in in slot 0x4
20,345,060 UART: [art] Derive Key Pair
20,346,106 UART: [art] Store priv key in slot 0x5
22,772,716 UART: [art] Derive Key Pair - Done
22,785,982 UART: [art] Signing Cert with AUTHO
22,787,293 UART: RITY.KEYID = 7
24,492,745 UART: [art] Erasing AUTHORITY.KEYID = 7
24,494,255 UART: [art] PUB.X = DA922DA30F3BF2F2DC1CAF355C66FC55CCB6C1E6EEB257B13FB9CE5F6729202D3E787B432529E5193C3AD5CE6FE44111
24,501,540 UART: [art] PUB.Y = B62CE3947CCCE4A5EBEC3E3437500C0FF5003E4FBA0D897F702F392BAA29F812CF86164059C2D181411BFECF6CD7BC8A
24,508,776 UART: [art] SIG.R = 2429BD10698C798CA32740790AAD902334FB8900B34FCB7529784D1D2C60ECF69D1BF0F96EE36400B7BB4D7C31A6BEDB
24,516,161 UART: [art] SIG.S = D75E0A614D146A2F67B4D59C42FECE93227ABA47AEDFA95491C72873729E8CB412D66C9FB871094FA33C50532F749E8F
25,494,852 UART: Caliptra RT
25,495,554 UART: [state] CFI Enabled
25,612,637 UART: [rt] RT listening for mailbox commands...
25,614,477 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,644,083 UART: [rt]cmd =0x46504c54, len=4
25,645,769 >>> mbox cmd response data (8 bytes)
25,646,807 UART: [rt] FIPS self test
25,647,740 UART: [kat] ++
25,648,187 UART: [kat] sha1
25,652,565 UART: [kat] SHA2-256
25,653,305 UART: Fatal Error: 0x90010001
25,688,685 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,833,167 >>> mbox cmd response: failed
25,833,782 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,978,111 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
17,645,826 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,226,193 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
192,065 UART:
192,427 UART: Running Caliptra ROM ...
193,555 UART:
193,697 UART: [state] CFI Enabled
266,239 UART: [state] LifecycleState = Unprovisioned
268,663 UART: [state] DebugLocked = No
271,092 UART: [state] WD Timer not started. Device not locked for debugging
275,287 UART: [kat] SHA2-256
465,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,969 UART: [kat] ++
476,461 UART: [kat] sha1
487,270 UART: [kat] SHA2-256
490,284 UART: [kat] SHA2-384
495,851 UART: [kat] SHA2-512-ACC
498,446 UART: [kat] ECC-384
2,948,335 UART: [kat] HMAC-384Kdf
2,972,011 UART: [kat] LMS
3,503,787 UART: [kat] --
3,507,926 UART: [cold-reset] ++
3,508,792 UART: [fht] FHT @ 0x50003400
3,519,695 UART: [idev] ++
3,520,333 UART: [idev] CDI.KEYID = 6
3,521,312 UART: [idev] SUBJECT.KEYID = 7
3,522,494 UART: [idev] UDS.KEYID = 0
3,523,402 ready_for_fw is high
3,523,606 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,299 UART: [idev] Erasing UDS.KEYID = 0
6,030,745 UART: [idev] Sha1 KeyId Algorithm
6,052,047 UART: [idev] --
6,057,484 UART: [ldev] ++
6,058,180 UART: [ldev] CDI.KEYID = 6
6,059,095 UART: [ldev] SUBJECT.KEYID = 5
6,060,260 UART: [ldev] AUTHORITY.KEYID = 7
6,061,493 UART: [ldev] FE.KEYID = 1
6,100,284 UART: [ldev] Erasing FE.KEYID = 1
8,603,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,170 UART: [ldev] --
10,413,967 UART: [fwproc] Wait for Commands...
10,416,136 UART: [fwproc] Recv command 0x46574c44
10,418,405 UART: [fwproc] Recv'd Img size: 115032 bytes
13,873,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,580 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,744 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,609,068 >>> mbox cmd response: success
14,612,555 UART: [afmc] ++
14,613,286 UART: [afmc] CDI.KEYID = 6
14,614,478 UART: [afmc] SUBJECT.KEYID = 7
14,615,969 UART: [afmc] AUTHORITY.KEYID = 5
17,155,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,501 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,709 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,837 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,849 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,950,041 UART: [afmc] --
18,953,058 UART: [cold-reset] --
18,958,273 UART: [state] Locking Datavault
18,965,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,967,703 UART: [state] Locking ICCM
18,969,138 UART: [exit] Launching FMC @ 0x40000130
18,977,755 UART:
18,977,990 UART: Running Caliptra FMC ...
18,979,014 UART:
18,979,164 UART: [state] CFI Enabled
19,033,359 UART: [fht] FMC Alias Private Key: 7
20,797,430 UART: [art] Extend RT PCRs Done
20,798,664 UART: [art] Lock RT PCRs Done
20,800,367 UART: [art] Populate DV Done
20,805,613 UART: [fht] FMC Alias Private Key: 7
20,807,093 UART: [art] Derive CDI
20,807,827 UART: [art] Store in in slot 0x4
20,865,891 UART: [art] Derive Key Pair
20,866,929 UART: [art] Store priv key in slot 0x5
23,329,729 UART: [art] Derive Key Pair - Done
23,342,678 UART: [art] Signing Cert with AUTHO
23,343,991 UART: RITY.KEYID = 7
25,055,697 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,210 UART: [art] PUB.X = 2DEEF5B5016133AA0AB09E1F9DE283F94539F0419235559E903802A8CFC6F555A953CE22C854636C4BA3883EE92F6382
25,064,449 UART: [art] PUB.Y = 4372E6D4899DD2633D0DBD11F9B9543DA5477620162ACFAB68F8851C2BDAA55E23C91BD0F25979AE00840DB5750CBDC1
25,071,711 UART: [art] SIG.R = 27BEE052B39A588708A5CECE5AFE039941AAC7E38F55BCA208A106D508D21E2784C7F03B66F6DC14C3C50822EEEDA8CA
25,079,131 UART: [art] SIG.S = 26DEE6FB448A012D78B3395F1C5B0157B745D00E2B22F8EAF62BFC4FB8D4F9BB10C76C3CC977729C4C522BD23A2A3D5B
26,057,883 UART: Caliptra RT
26,058,598 UART: [state] CFI Enabled
26,223,658 UART: [rt] RT listening for mailbox commands...
26,225,506 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,255,236 UART: [rt]cmd =0x46504c54, len=4
26,257,033 >>> mbox cmd response data (8 bytes)
26,257,988 UART: [rt] FIPS self test
26,258,926 UART: [kat] ++
26,259,376 UART: [kat] sha1
26,263,696 UART: [kat] SHA2-256
26,264,435 UART: Fatal Error: 0x90010001
26,299,809 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,444,189 >>> mbox cmd response: failed
26,444,787 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,589,189 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,133 UART:
190,442 UART: Running Caliptra ROM ...
191,557 UART:
191,722 UART: [state] CFI Enabled
254,020 UART: [state] LifecycleState = Unprovisioned
256,409 UART: [state] DebugLocked = No
258,537 UART: [state] WD Timer not started. Device not locked for debugging
262,930 UART: [kat] SHA2-256
452,840 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
463,631 UART: [kat] ++
464,075 UART: [kat] sha1
475,876 UART: [kat] SHA2-256
478,942 UART: [kat] SHA2-384
484,542 UART: [kat] SHA2-512-ACC
487,098 UART: [kat] ECC-384
2,938,670 UART: [kat] HMAC-384Kdf
2,962,319 UART: [kat] LMS
3,494,095 UART: [kat] --
3,500,747 UART: [cold-reset] ++
3,502,789 UART: [fht] FHT @ 0x50003400
3,514,581 UART: [idev] ++
3,515,251 UART: [idev] CDI.KEYID = 6
3,516,185 UART: [idev] SUBJECT.KEYID = 7
3,517,396 UART: [idev] UDS.KEYID = 0
3,518,877 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,663,499 UART: [idev] Erasing UDS.KEYID = 0
6,018,303 UART: [idev] Sha1 KeyId Algorithm
6,040,635 UART: [idev] --
6,045,807 UART: [ldev] ++
6,046,504 UART: [ldev] CDI.KEYID = 6
6,047,389 UART: [ldev] SUBJECT.KEYID = 5
6,048,606 UART: [ldev] AUTHORITY.KEYID = 7
6,049,805 UART: [ldev] FE.KEYID = 1
6,090,897 UART: [ldev] Erasing FE.KEYID = 1
8,598,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,644 UART: [ldev] --
10,402,477 UART: [fwproc] Wait for Commands...
10,404,901 UART: [fwproc] Recv command 0x46574c44
10,407,216 UART: [fwproc] Recv'd Img size: 115032 bytes
13,860,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,320 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,051,442 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,598,128 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,440,040 ready_for_fw is high
3,440,649 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,780,484 >>> mbox cmd response: success
19,070,649 UART:
19,071,045 UART: Running Caliptra FMC ...
19,072,195 UART:
19,072,360 UART: [state] CFI Enabled
19,138,526 UART: [fht] FMC Alias Private Key: 7
20,902,669 UART: [art] Extend RT PCRs Done
20,904,040 UART: [art] Lock RT PCRs Done
20,905,592 UART: [art] Populate DV Done
20,910,805 UART: [fht] FMC Alias Private Key: 7
20,912,405 UART: [art] Derive CDI
20,913,152 UART: [art] Store in in slot 0x4
20,970,887 UART: [art] Derive Key Pair
20,971,886 UART: [art] Store priv key in slot 0x5
23,434,399 UART: [art] Derive Key Pair - Done
23,447,561 UART: [art] Signing Cert with AUTHO
23,448,862 UART: RITY.KEYID = 7
25,160,262 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,773 UART: [art] PUB.X = 821E28F60E0F0E955D9EC84BA163B45189195C5F80A3B5574309B5ADCFDF337FDADAAECE23A0AC7355048BD87DB298A5
25,169,028 UART: [art] PUB.Y = 8DC4DCEE218587FB7FD35AE7E7942BD22AB79BDA92F66EE8B996BC8FAD6124D566ADAF90DC12BFC959CC3E859B4E9743
25,176,356 UART: [art] SIG.R = 6769FA4129099B7B94E82E05816D223296FD9B1409A89DCFB5A2EF1F90823BAF6066FB60FD5170810CD793E5267506BE
25,183,700 UART: [art] SIG.S = F51ECC73234EFAD95398D83380EBB6A98D446FA048DB7E2D99B7D130AA104962C581773A789E2AF16D969EA50EA3C4EE
26,162,939 UART: Caliptra RT
26,163,635 UART: [state] CFI Enabled
26,326,487 UART: [rt] RT listening for mailbox commands...
26,328,342 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,857 UART: [rt]cmd =0x46504c54, len=4
26,359,410 >>> mbox cmd response data (8 bytes)
26,360,747 UART: [rt] FIPS self test
26,361,693 UART: [kat] ++
26,362,139 UART: [kat] sha1
26,366,591 UART: [kat] SHA2-256
26,367,326 UART: Fatal Error: 0x90010001
26,402,446 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,546,968 >>> mbox cmd response: failed
26,547,562 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,692,362 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,433,517 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,748,556 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,567 UART:
192,937 UART: Running Caliptra ROM ...
194,141 UART:
603,815 UART: [state] CFI Enabled
621,043 UART: [state] LifecycleState = Unprovisioned
623,449 UART: [state] DebugLocked = No
625,118 UART: [state] WD Timer not started. Device not locked for debugging
629,375 UART: [kat] SHA2-256
819,250 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,055 UART: [kat] ++
830,508 UART: [kat] sha1
842,876 UART: [kat] SHA2-256
845,919 UART: [kat] SHA2-384
851,774 UART: [kat] SHA2-512-ACC
854,344 UART: [kat] ECC-384
3,296,244 UART: [kat] HMAC-384Kdf
3,309,992 UART: [kat] LMS
3,841,815 UART: [kat] --
3,845,105 UART: [cold-reset] ++
3,847,683 UART: [fht] FHT @ 0x50003400
3,859,090 UART: [idev] ++
3,859,801 UART: [idev] CDI.KEYID = 6
3,860,783 UART: [idev] SUBJECT.KEYID = 7
3,861,958 UART: [idev] UDS.KEYID = 0
3,862,883 ready_for_fw is high
3,863,124 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,007,633 UART: [idev] Erasing UDS.KEYID = 0
6,341,600 UART: [idev] Sha1 KeyId Algorithm
6,364,809 UART: [idev] --
6,369,722 UART: [ldev] ++
6,370,406 UART: [ldev] CDI.KEYID = 6
6,371,369 UART: [ldev] SUBJECT.KEYID = 5
6,372,526 UART: [ldev] AUTHORITY.KEYID = 7
6,373,906 UART: [ldev] FE.KEYID = 1
6,384,680 UART: [ldev] Erasing FE.KEYID = 1
8,860,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,314 UART: [ldev] --
10,651,155 UART: [fwproc] Wait for Commands...
10,654,339 UART: [fwproc] Recv command 0x46574c44
10,656,608 UART: [fwproc] Recv'd Img size: 115032 bytes
14,108,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,179 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,309,325 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,856,677 >>> mbox cmd response: success
14,860,288 UART: [afmc] ++
14,860,993 UART: [afmc] CDI.KEYID = 6
14,862,161 UART: [afmc] SUBJECT.KEYID = 7
14,863,693 UART: [afmc] AUTHORITY.KEYID = 5
17,365,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,088,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,090,207 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,105,408 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,120,532 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,135,527 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,159,275 UART: [afmc] --
19,162,386 UART: [cold-reset] --
19,166,001 UART: [state] Locking Datavault
19,170,292 UART: [state] Locking PCR0, PCR1 and PCR31
19,172,439 UART: [state] Locking ICCM
19,174,216 UART: [exit] Launching FMC @ 0x40000130
19,182,865 UART:
19,183,108 UART: Running Caliptra FMC ...
19,184,213 UART:
19,184,376 UART: [state] CFI Enabled
19,192,749 UART: [fht] FMC Alias Private Key: 7
20,949,908 UART: [art] Extend RT PCRs Done
20,951,132 UART: [art] Lock RT PCRs Done
20,952,784 UART: [art] Populate DV Done
20,958,251 UART: [fht] FMC Alias Private Key: 7
20,959,899 UART: [art] Derive CDI
20,960,719 UART: [art] Store in in slot 0x4
21,003,375 UART: [art] Derive Key Pair
21,004,401 UART: [art] Store priv key in slot 0x5
23,430,949 UART: [art] Derive Key Pair - Done
23,443,950 UART: [art] Signing Cert with AUTHO
23,445,255 UART: RITY.KEYID = 7
25,150,922 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,433 UART: [art] PUB.X = 8D0622E11EBE630BD8B0B52240E9C16A5B80AB5D81297052833B5A0F38F3F7A5D93C3D6106A3B4F220FE8972DCA14455
25,159,715 UART: [art] PUB.Y = 5BAB9EDB561C6758D6CE31DA2819F661F6812F16FFAE52C914405C439EFE121DD1B0FC103E8AD0EC887C808FAD1DE176
25,167,028 UART: [art] SIG.R = 9B0DF033D0C68903F14322E7CAE9397C907165E52788EAD0C2D4DB1AEF54445FA70738EDCE8F4F07972FA7003B825CAD
25,174,473 UART: [art] SIG.S = D70C366F9A48AAD09D8FA903FCC395D17CB4C2FA592DE1B65A8CD0B8AF93E3AEA460BA1736D2C063F89A030F3B58DDD7
26,154,072 UART: Caliptra RT
26,154,786 UART: [state] CFI Enabled
26,271,633 UART: [rt] RT listening for mailbox commands...
26,273,483 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,302,831 UART: [rt]cmd =0x46504c54, len=4
26,304,655 >>> mbox cmd response data (8 bytes)
26,305,670 UART: [rt] FIPS self test
26,306,635 UART: [kat] ++
26,307,089 UART: [kat] sha1
26,311,494 UART: [kat] SHA2-256
26,312,233 UART: Fatal Error: 0x90010001
26,347,439 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,491,952 >>> mbox cmd response: failed
26,492,610 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,637,000 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,000 UART:
190,298 UART: Running Caliptra ROM ...
191,409 UART:
13,901,853 UART: [state] CFI Enabled
13,918,485 UART: [state] LifecycleState = Unprovisioned
13,920,905 UART: [state] DebugLocked = No
13,922,363 UART: [state] WD Timer not started. Device not locked for debugging
13,927,107 UART: [kat] SHA2-256
14,117,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,127,801 UART: [kat] ++
14,128,321 UART: [kat] sha1
14,138,833 UART: [kat] SHA2-256
14,141,837 UART: [kat] SHA2-384
14,148,699 UART: [kat] SHA2-512-ACC
14,151,271 UART: [kat] ECC-384
16,595,797 UART: [kat] HMAC-384Kdf
16,609,755 UART: [kat] LMS
17,141,599 UART: [kat] --
17,144,022 UART: [cold-reset] ++
17,145,361 UART: [fht] FHT @ 0x50003400
17,157,996 UART: [idev] ++
17,158,669 UART: [idev] CDI.KEYID = 6
17,159,622 UART: [idev] SUBJECT.KEYID = 7
17,160,836 UART: [idev] UDS.KEYID = 0
17,162,325 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,306,754 UART: [idev] Erasing UDS.KEYID = 0
19,637,492 UART: [idev] Sha1 KeyId Algorithm
19,661,176 UART: [idev] --
19,666,762 UART: [ldev] ++
19,667,454 UART: [ldev] CDI.KEYID = 6
19,668,337 UART: [ldev] SUBJECT.KEYID = 5
19,669,547 UART: [ldev] AUTHORITY.KEYID = 7
19,670,777 UART: [ldev] FE.KEYID = 1
19,680,828 UART: [ldev] Erasing FE.KEYID = 1
22,161,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,882,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,897,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,912,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,927,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,947,665 UART: [ldev] --
23,953,259 UART: [fwproc] Wait for Commands...
23,955,573 UART: [fwproc] Recv command 0x46574c44
23,957,838 UART: [fwproc] Recv'd Img size: 115032 bytes
27,407,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,485,004 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,601,134 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,147,115 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,758,374 ready_for_fw is high
3,758,962 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,964,072 >>> mbox cmd response: success
19,221,244 UART:
19,221,626 UART: Running Caliptra FMC ...
19,222,773 UART:
19,222,937 UART: [state] CFI Enabled
19,230,834 UART: [fht] FMC Alias Private Key: 7
20,988,083 UART: [art] Extend RT PCRs Done
20,989,306 UART: [art] Lock RT PCRs Done
20,990,623 UART: [art] Populate DV Done
20,996,201 UART: [fht] FMC Alias Private Key: 7
20,997,744 UART: [art] Derive CDI
20,998,558 UART: [art] Store in in slot 0x4
21,040,941 UART: [art] Derive Key Pair
21,041,986 UART: [art] Store priv key in slot 0x5
23,468,926 UART: [art] Derive Key Pair - Done
23,482,004 UART: [art] Signing Cert with AUTHO
23,483,325 UART: RITY.KEYID = 7
25,188,436 UART: [art] Erasing AUTHORITY.KEYID = 7
25,189,946 UART: [art] PUB.X = 7146852E747A917AEA4A99464199FFB9F90803CD354A298CD9DB7D7FB45C6F7FF0E6E71B708D786D558496FC4CE307D7
25,197,203 UART: [art] PUB.Y = 6DB46D56481D95DAA8F5CCC46283FF5B98DE153D20E3EB2C767858DDF2F592A4C098D8711596A2F4AA989F5B89954762
25,204,464 UART: [art] SIG.R = B877AFD34AF58C87FFF1DDDE567AD0A38889E1B0855504BCC3498DB55280C8397537BB5A3F19EF0532CC35064D0B201A
25,211,860 UART: [art] SIG.S = 79BD74938AC25838E673A3CB9C38DEEEDE41C7937AFC0D28669BBA1A26DD9901CCA51796929178FFF2C74595027779BB
26,190,614 UART: Caliptra RT
26,191,323 UART: [state] CFI Enabled
26,308,512 UART: [rt] RT listening for mailbox commands...
26,310,367 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,340,204 UART: [rt]cmd =0x46504c54, len=4
26,341,722 >>> mbox cmd response data (8 bytes)
26,342,771 UART: [rt] FIPS self test
26,343,713 UART: [kat] ++
26,344,167 UART: [kat] sha1
26,348,482 UART: [kat] SHA2-256
26,349,289 UART: Fatal Error: 0x90010001
26,384,668 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,529,006 >>> mbox cmd response: failed
26,529,598 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,674,029 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
17,006,517 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,224,734 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,121 UART: [kat] SHA2-256
882,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,167 UART: [kat] ++
886,319 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,094 UART: [kat] SHA2-512-ACC
896,995 UART: [kat] ECC-384
902,650 UART: [kat] HMAC-384Kdf
907,118 UART: [kat] LMS
1,475,314 UART: [kat] --
1,476,073 UART: [cold-reset] ++
1,476,507 UART: [fht] Storing FHT @ 0x50003400
1,479,166 UART: [idev] ++
1,479,334 UART: [idev] CDI.KEYID = 6
1,479,694 UART: [idev] SUBJECT.KEYID = 7
1,480,118 UART: [idev] UDS.KEYID = 0
1,480,463 ready_for_fw is high
1,480,463 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,266 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,186 UART: [idev] --
1,515,093 UART: [ldev] ++
1,515,261 UART: [ldev] CDI.KEYID = 6
1,515,624 UART: [ldev] SUBJECT.KEYID = 5
1,516,050 UART: [ldev] AUTHORITY.KEYID = 7
1,516,513 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,546,242 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,212 UART: [ldev] --
1,585,707 UART: [fwproc] Waiting for Commands...
1,586,384 UART: [fwproc] Received command 0x46574c44
1,587,175 UART: [fwproc] Received Image of size 115032 bytes
2,891,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,194 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,085,547 >>> mbox cmd response: success
3,086,703 UART: [afmc] ++
3,086,871 UART: [afmc] CDI.KEYID = 6
3,087,233 UART: [afmc] SUBJECT.KEYID = 7
3,087,658 UART: [afmc] AUTHORITY.KEYID = 5
3,122,539 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,079 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,859 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,587 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,472 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,162 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,127 UART: [afmc] --
3,166,239 UART: [cold-reset] --
3,167,035 UART: [state] Locking Datavault
3,168,358 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,962 UART: [state] Locking ICCM
3,169,486 UART: [exit] Launching FMC @ 0x40000130
3,174,815 UART:
3,174,831 UART: Running Caliptra FMC ...
3,175,239 UART:
3,175,293 UART: [state] CFI Enabled
3,185,772 UART: [fht] FMC Alias Private Key: 7
3,293,507 UART: [art] Extend RT PCRs Done
3,293,935 UART: [art] Lock RT PCRs Done
3,295,381 UART: [art] Populate DV Done
3,303,656 UART: [fht] FMC Alias Private Key: 7
3,304,790 UART: [art] Derive CDI
3,305,070 UART: [art] Store in in slot 0x4
3,390,867 UART: [art] Derive Key Pair
3,391,227 UART: [art] Store priv key in slot 0x5
3,404,135 UART: [art] Derive Key Pair - Done
3,418,900 UART: [art] Signing Cert with AUTHO
3,419,380 UART: RITY.KEYID = 7
3,434,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,181 UART: [art] PUB.X = 763C590A341DED6BAEE66968B2418578023BCE2B50FECBCE4779A4C3E926BE1CACB25A8A4CF5038B6049CFE6C7710DB7
3,441,957 UART: [art] PUB.Y = 9230E78C00D37219A410DCD19AA8FA6EBF3395EA73E47EB6ADC5E9F236B5F3D94068AC12CD946CDCC8C3145AA9AF6E0B
3,448,904 UART: [art] SIG.R = 8218CFA4CE63BF496A13B742A540F5921E60CC6C965A075EC815A386981C677C988CBF3EDD380FC2A8C5A92E6347F1FD
3,455,678 UART: [art] SIG.S = 690745B697F85DFB0D75E8ABE736D8B5EF731981D132D69D27DCBED5B9FC9ED54BF5A83016CD6E01D3A4D64F3973B8ED
3,479,526 UART: Caliptra RT
3,479,779 UART: [state] CFI Enabled
3,587,826 UART: [rt] RT listening for mailbox commands...
3,588,489 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,342 UART: [rt]cmd =0x46504c54, len=4
3,619,458 >>> mbox cmd response data (8 bytes)
3,619,669 UART: [rt] FIPS self test
3,619,997 UART: [kat] ++
3,620,149 UART: [kat] sha1
3,624,245 UART: [kat] SHA2-256
3,624,719 UART: Fatal Error: 0x90010001
3,626,258 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,626,263 >>> mbox cmd response: failed
3,626,263 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,626,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,213 UART: [kat] SHA2-256
882,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,259 UART: [kat] ++
886,411 UART: [kat] sha1
890,645 UART: [kat] SHA2-256
892,583 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
902,694 UART: [kat] HMAC-384Kdf
907,420 UART: [kat] LMS
1,475,616 UART: [kat] --
1,476,513 UART: [cold-reset] ++
1,477,049 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,650 UART: [idev] Erasing UDS.KEYID = 0
1,505,438 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,148 UART: [idev] --
1,515,235 UART: [ldev] ++
1,515,403 UART: [ldev] CDI.KEYID = 6
1,515,766 UART: [ldev] SUBJECT.KEYID = 5
1,516,192 UART: [ldev] AUTHORITY.KEYID = 7
1,516,655 UART: [ldev] FE.KEYID = 1
1,521,905 UART: [ldev] Erasing FE.KEYID = 1
1,546,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,752 UART: [ldev] --
1,586,265 UART: [fwproc] Waiting for Commands...
1,587,070 UART: [fwproc] Received command 0x46574c44
1,587,861 UART: [fwproc] Received Image of size 115032 bytes
2,893,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,720 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,072 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,023 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,895 ready_for_fw is high
1,362,895 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,939,213 >>> mbox cmd response: success
3,000,803 UART:
3,000,819 UART: Running Caliptra FMC ...
3,001,227 UART:
3,001,281 UART: [state] CFI Enabled
3,011,640 UART: [fht] FMC Alias Private Key: 7
3,119,925 UART: [art] Extend RT PCRs Done
3,120,353 UART: [art] Lock RT PCRs Done
3,121,661 UART: [art] Populate DV Done
3,129,884 UART: [fht] FMC Alias Private Key: 7
3,130,862 UART: [art] Derive CDI
3,131,142 UART: [art] Store in in slot 0x4
3,217,173 UART: [art] Derive Key Pair
3,217,533 UART: [art] Store priv key in slot 0x5
3,230,429 UART: [art] Derive Key Pair - Done
3,244,830 UART: [art] Signing Cert with AUTHO
3,245,310 UART: RITY.KEYID = 7
3,260,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,451 UART: [art] PUB.X = C224B36C0908E874912158238C90B747AABCD28F98ECC7E83F3F09B6C1669181BAF37A5EA6C761E363BB0CA6D9C5C139
3,268,217 UART: [art] PUB.Y = 9ED2F1C2F482253AD2373BBD8DE23A91383B1BDCCBA89D6CE4FED474C9B9DC20496CF80D044A90B90EE717F6A767F882
3,275,176 UART: [art] SIG.R = 05D508F40E1FE84863B248D4E67789CB454B6F503DA6A11D049E8079D658E79D422A26115EE5461E4108CFD957EB66EF
3,281,931 UART: [art] SIG.S = 31A3C3074D056B7FE5C6FD79A6CD1C81C34F5CDF2752AF873830F3F75414D50B335DB541402499416248AA3B4F3A29D7
3,305,741 UART: Caliptra RT
3,305,994 UART: [state] CFI Enabled
3,413,876 UART: [rt] RT listening for mailbox commands...
3,414,539 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,386 UART: [rt]cmd =0x46504c54, len=4
3,445,606 >>> mbox cmd response data (8 bytes)
3,445,761 UART: [rt] FIPS self test
3,446,089 UART: [kat] ++
3,446,241 UART: [kat] sha1
3,450,605 UART: [kat] SHA2-256
3,451,157 UART: Fatal Error: 0x90010001
3,452,696 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,701 >>> mbox cmd response: failed
3,452,701 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,706 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,309 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,045 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,396 UART: [kat] SHA2-256
882,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,442 UART: [kat] ++
886,594 UART: [kat] sha1
890,914 UART: [kat] SHA2-256
892,852 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
903,129 UART: [kat] HMAC-384Kdf
907,735 UART: [kat] LMS
1,475,931 UART: [kat] --
1,476,678 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,015 UART: [idev] ++
1,480,183 UART: [idev] CDI.KEYID = 6
1,480,543 UART: [idev] SUBJECT.KEYID = 7
1,480,967 UART: [idev] UDS.KEYID = 0
1,481,312 ready_for_fw is high
1,481,312 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,137 UART: [idev] Erasing UDS.KEYID = 0
1,506,029 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,697 UART: [idev] --
1,515,722 UART: [ldev] ++
1,515,890 UART: [ldev] CDI.KEYID = 6
1,516,253 UART: [ldev] SUBJECT.KEYID = 5
1,516,679 UART: [ldev] AUTHORITY.KEYID = 7
1,517,142 UART: [ldev] FE.KEYID = 1
1,522,248 UART: [ldev] Erasing FE.KEYID = 1
1,547,763 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,573 UART: [ldev] --
1,586,874 UART: [fwproc] Waiting for Commands...
1,587,705 UART: [fwproc] Received command 0x46574c44
1,588,496 UART: [fwproc] Received Image of size 115032 bytes
2,894,775 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,559 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,911 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,814 >>> mbox cmd response: success
3,089,952 UART: [afmc] ++
3,090,120 UART: [afmc] CDI.KEYID = 6
3,090,482 UART: [afmc] SUBJECT.KEYID = 7
3,090,907 UART: [afmc] AUTHORITY.KEYID = 5
3,126,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,612 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,143,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,149,120 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,005 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,695 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,532 UART: [afmc] --
3,169,598 UART: [cold-reset] --
3,170,638 UART: [state] Locking Datavault
3,171,857 UART: [state] Locking PCR0, PCR1 and PCR31
3,172,461 UART: [state] Locking ICCM
3,172,975 UART: [exit] Launching FMC @ 0x40000130
3,178,304 UART:
3,178,320 UART: Running Caliptra FMC ...
3,178,728 UART:
3,178,871 UART: [state] CFI Enabled
3,189,346 UART: [fht] FMC Alias Private Key: 7
3,297,369 UART: [art] Extend RT PCRs Done
3,297,797 UART: [art] Lock RT PCRs Done
3,299,175 UART: [art] Populate DV Done
3,307,282 UART: [fht] FMC Alias Private Key: 7
3,308,358 UART: [art] Derive CDI
3,308,638 UART: [art] Store in in slot 0x4
3,393,963 UART: [art] Derive Key Pair
3,394,323 UART: [art] Store priv key in slot 0x5
3,407,519 UART: [art] Derive Key Pair - Done
3,421,999 UART: [art] Signing Cert with AUTHO
3,422,479 UART: RITY.KEYID = 7
3,437,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,640 UART: [art] PUB.X = 90D7998B42CC688A00461F96DC02D8157581CF0A4F67FFA8D1059A62D0391661282077C115C3E5CD2E8691575647F7E0
3,445,371 UART: [art] PUB.Y = 2C7A5C26960C74D3F9DA7983AD098284F85B898AECC26CDADE8169DC62A133F08F0406783324547C406436AEB3E0E102
3,452,308 UART: [art] SIG.R = A5D4C67E0C1996998DD0A95F8E5F9966F26C2067F1338A38C9F80148D7B8E9031BF98EFC21310A3E9614D2BC7113CC3E
3,459,070 UART: [art] SIG.S = 32900A152D46226B37F2191BC4C792B24BE891643A11F88A24D4530DDFC79D92687A5B40B7ED3CF5F6F9EA7FD86DFE80
3,482,683 UART: Caliptra RT
3,483,028 UART: [state] CFI Enabled
3,591,231 UART: [rt] RT listening for mailbox commands...
3,591,894 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,597 UART: [rt]cmd =0x46504c54, len=4
3,622,731 >>> mbox cmd response data (8 bytes)
3,622,896 UART: [rt] FIPS self test
3,623,224 UART: [kat] ++
3,623,376 UART: [kat] sha1
3,627,600 UART: [kat] SHA2-256
3,628,018 UART: Fatal Error: 0x90010001
3,629,557 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,629,562 >>> mbox cmd response: failed
3,629,562 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,629,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,058 UART: [kat] SHA2-256
881,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,104 UART: [kat] ++
886,256 UART: [kat] sha1
890,638 UART: [kat] SHA2-256
892,576 UART: [kat] SHA2-384
895,387 UART: [kat] SHA2-512-ACC
897,288 UART: [kat] ECC-384
903,041 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,822 UART: [cold-reset] ++
1,477,248 UART: [fht] Storing FHT @ 0x50003400
1,479,943 UART: [idev] ++
1,480,111 UART: [idev] CDI.KEYID = 6
1,480,471 UART: [idev] SUBJECT.KEYID = 7
1,480,895 UART: [idev] UDS.KEYID = 0
1,481,240 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,795 UART: [idev] Erasing UDS.KEYID = 0
1,505,369 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,077 UART: [idev] --
1,515,108 UART: [ldev] ++
1,515,276 UART: [ldev] CDI.KEYID = 6
1,515,639 UART: [ldev] SUBJECT.KEYID = 5
1,516,065 UART: [ldev] AUTHORITY.KEYID = 7
1,516,528 UART: [ldev] FE.KEYID = 1
1,522,020 UART: [ldev] Erasing FE.KEYID = 1
1,547,355 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,743 UART: [ldev] --
1,587,022 UART: [fwproc] Waiting for Commands...
1,587,779 UART: [fwproc] Received command 0x46574c44
1,588,570 UART: [fwproc] Received Image of size 115032 bytes
2,894,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,839 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,191 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,140 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,834 ready_for_fw is high
1,363,834 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,968 >>> mbox cmd response: success
2,999,492 UART:
2,999,508 UART: Running Caliptra FMC ...
2,999,916 UART:
3,000,059 UART: [state] CFI Enabled
3,010,844 UART: [fht] FMC Alias Private Key: 7
3,118,927 UART: [art] Extend RT PCRs Done
3,119,355 UART: [art] Lock RT PCRs Done
3,121,019 UART: [art] Populate DV Done
3,129,214 UART: [fht] FMC Alias Private Key: 7
3,130,310 UART: [art] Derive CDI
3,130,590 UART: [art] Store in in slot 0x4
3,216,283 UART: [art] Derive Key Pair
3,216,643 UART: [art] Store priv key in slot 0x5
3,229,905 UART: [art] Derive Key Pair - Done
3,244,660 UART: [art] Signing Cert with AUTHO
3,245,140 UART: RITY.KEYID = 7
3,260,214 UART: [art] Erasing AUTHORITY.KEYID = 7
3,260,979 UART: [art] PUB.X = 281825123F32290E6145693C1CC3F5D712EBA8DF9B02BF2DC7B9C5E84F2C088F614CEBEDE86F1989FFAF70A4897B6DD8
3,267,754 UART: [art] PUB.Y = D05B72F1EA0782829C7250D66144F323EF858BEF3A7840BE807F6FD5CB2DF0F0A5DB4A5EEBABCD5ED585B8EC2B1E02FF
3,274,724 UART: [art] SIG.R = CCFD00149161DECF32EF857C2B70A395EF3DBC867D38FC3E17E84997DCCBA7D3A5537558C3A7A1BB5B705086A52C9A79
3,281,488 UART: [art] SIG.S = 23E40CAD62284C7E5D3AB03EF91BFE707D54DF7088B3509720FFA8BD930C476C1BDEF7FDEC9F0461A2E10704B9BCE0C9
3,305,114 UART: Caliptra RT
3,305,459 UART: [state] CFI Enabled
3,414,096 UART: [rt] RT listening for mailbox commands...
3,414,759 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,506 UART: [rt]cmd =0x46504c54, len=4
3,445,838 >>> mbox cmd response data (8 bytes)
3,446,035 UART: [rt] FIPS self test
3,446,363 UART: [kat] ++
3,446,515 UART: [kat] sha1
3,450,753 UART: [kat] SHA2-256
3,451,127 UART: Fatal Error: 0x90010001
3,452,666 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,671 >>> mbox cmd response: failed
3,452,671 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,114 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,488 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
893,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,653 UART: [kat] ++
897,805 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,760 UART: [kat] SHA2-512-ACC
908,661 UART: [kat] ECC-384
918,338 UART: [kat] HMAC-384Kdf
922,826 UART: [kat] LMS
1,171,154 UART: [kat] --
1,171,819 UART: [cold-reset] ++
1,172,289 UART: [fht] FHT @ 0x50003400
1,175,014 UART: [idev] ++
1,175,182 UART: [idev] CDI.KEYID = 6
1,175,542 UART: [idev] SUBJECT.KEYID = 7
1,175,966 UART: [idev] UDS.KEYID = 0
1,176,311 ready_for_fw is high
1,176,311 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,064 UART: [idev] Erasing UDS.KEYID = 0
1,200,861 UART: [idev] Sha1 KeyId Algorithm
1,209,445 UART: [idev] --
1,210,663 UART: [ldev] ++
1,210,831 UART: [ldev] CDI.KEYID = 6
1,211,194 UART: [ldev] SUBJECT.KEYID = 5
1,211,620 UART: [ldev] AUTHORITY.KEYID = 7
1,212,083 UART: [ldev] FE.KEYID = 1
1,217,279 UART: [ldev] Erasing FE.KEYID = 1
1,243,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,657 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,419 UART: [ldev] --
1,282,860 UART: [fwproc] Wait for Commands...
1,283,644 UART: [fwproc] Recv command 0x46574c44
1,284,372 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,495 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,799 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,722 >>> mbox cmd response: success
2,783,920 UART: [afmc] ++
2,784,088 UART: [afmc] CDI.KEYID = 6
2,784,450 UART: [afmc] SUBJECT.KEYID = 7
2,784,875 UART: [afmc] AUTHORITY.KEYID = 5
2,819,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,141 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,869 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,754 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,473 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,297 UART: [afmc] --
2,863,323 UART: [cold-reset] --
2,863,987 UART: [state] Locking Datavault
2,865,244 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,848 UART: [state] Locking ICCM
2,866,302 UART: [exit] Launching FMC @ 0x40000130
2,871,631 UART:
2,871,647 UART: Running Caliptra FMC ...
2,872,055 UART:
2,872,109 UART: [state] CFI Enabled
2,882,744 UART: [fht] FMC Alias Private Key: 7
2,990,769 UART: [art] Extend RT PCRs Done
2,991,197 UART: [art] Lock RT PCRs Done
2,992,699 UART: [art] Populate DV Done
3,000,992 UART: [fht] FMC Alias Private Key: 7
3,001,976 UART: [art] Derive CDI
3,002,256 UART: [art] Store in in slot 0x4
3,088,103 UART: [art] Derive Key Pair
3,088,463 UART: [art] Store priv key in slot 0x5
3,101,091 UART: [art] Derive Key Pair - Done
3,115,845 UART: [art] Signing Cert with AUTHO
3,116,325 UART: RITY.KEYID = 7
3,131,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,114 UART: [art] PUB.X = 10D3E7F662FD517B57EA27E880C07E56C5F88DB2C70EDE9A3F11EB21CF8AC8A9FD8B69484A6F5566F6585E4EEA5CA69A
3,138,901 UART: [art] PUB.Y = 4CC7F7EDB4596C2531443ABF4B7B492A22CAE029A4724438F36522F0173FB7D982F9E635BEAE12B660FD87F5C3633E66
3,145,857 UART: [art] SIG.R = 5EDD728A46727B7BAFCE7625C74499536AD7945E7B64EDB1B620F8CFE4F3ADDB48F3DA99F6F26B0651F701A1C5818DD3
3,152,637 UART: [art] SIG.S = 52EF0EF0190BB0836942D09CA607CC801081220CB5519BD41902D8CF076FA23A5749F69FEFD6DEDC5FDF448257298367
3,176,226 UART: Caliptra RT
3,176,479 UART: [state] CFI Enabled
3,283,702 UART: [rt] RT listening for mailbox commands...
3,284,365 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,184 UART: [rt]cmd =0x46504c54, len=4
3,315,292 >>> mbox cmd response data (8 bytes)
3,315,429 UART: [rt] FIPS self test
3,315,757 UART: [kat] ++
3,315,909 UART: [kat] sha1
3,320,343 UART: [kat] SHA2-256
3,320,795 UART: Fatal Error: 0x90010001
3,322,334 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,322,339 >>> mbox cmd response: failed
3,322,339 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,322,344 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,013 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
892,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,987 UART: [kat] ++
897,139 UART: [kat] sha1
901,207 UART: [kat] SHA2-256
903,147 UART: [kat] SHA2-384
905,990 UART: [kat] SHA2-512-ACC
907,891 UART: [kat] ECC-384
917,368 UART: [kat] HMAC-384Kdf
921,876 UART: [kat] LMS
1,170,204 UART: [kat] --
1,171,253 UART: [cold-reset] ++
1,171,687 UART: [fht] FHT @ 0x50003400
1,174,362 UART: [idev] ++
1,174,530 UART: [idev] CDI.KEYID = 6
1,174,890 UART: [idev] SUBJECT.KEYID = 7
1,175,314 UART: [idev] UDS.KEYID = 0
1,175,659 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,586 UART: [idev] Erasing UDS.KEYID = 0
1,201,177 UART: [idev] Sha1 KeyId Algorithm
1,209,663 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,226 UART: [ldev] SUBJECT.KEYID = 5
1,211,652 UART: [ldev] AUTHORITY.KEYID = 7
1,212,115 UART: [ldev] FE.KEYID = 1
1,217,117 UART: [ldev] Erasing FE.KEYID = 1
1,243,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,961 UART: [ldev] --
1,282,328 UART: [fwproc] Wait for Commands...
1,283,070 UART: [fwproc] Recv command 0x46574c44
1,283,798 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,143 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,447 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,244 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,795 ready_for_fw is high
1,060,795 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,363 >>> mbox cmd response: success
2,697,599 UART:
2,697,615 UART: Running Caliptra FMC ...
2,698,023 UART:
2,698,077 UART: [state] CFI Enabled
2,708,400 UART: [fht] FMC Alias Private Key: 7
2,816,255 UART: [art] Extend RT PCRs Done
2,816,683 UART: [art] Lock RT PCRs Done
2,818,235 UART: [art] Populate DV Done
2,826,432 UART: [fht] FMC Alias Private Key: 7
2,827,462 UART: [art] Derive CDI
2,827,742 UART: [art] Store in in slot 0x4
2,913,275 UART: [art] Derive Key Pair
2,913,635 UART: [art] Store priv key in slot 0x5
2,927,031 UART: [art] Derive Key Pair - Done
2,942,094 UART: [art] Signing Cert with AUTHO
2,942,574 UART: RITY.KEYID = 7
2,957,770 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,535 UART: [art] PUB.X = 39180A0E459413E1AEF83F9E9CC2E17557324A31C5D0CBB0C46C905B32EBCFC474550D083161E9E0934B071FDCFF9033
2,965,296 UART: [art] PUB.Y = 47C24E187F47C70BCC6A02F310CEE9178234C81091FEC57917D5331D7FF58C5D4568A29A1C2D98D28F9E3FC72397B902
2,972,239 UART: [art] SIG.R = 7EC276D53AAD05911C5165A6E8050D36937CA37F642DB8ADFF1872BA4EDC472E0889F08CB1A3D9F3496080610C972EB0
2,979,000 UART: [art] SIG.S = E83192C5F87DBB2AEDE896496BB4A78FB45B03F051BDB198E282CE3890599F039F39C372571B987B9AC6CB289FDC5C7A
3,002,757 UART: Caliptra RT
3,003,010 UART: [state] CFI Enabled
3,110,779 UART: [rt] RT listening for mailbox commands...
3,111,442 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,539 UART: [rt]cmd =0x46504c54, len=4
3,142,717 >>> mbox cmd response data (8 bytes)
3,142,852 UART: [rt] FIPS self test
3,143,180 UART: [kat] ++
3,143,332 UART: [kat] sha1
3,147,404 UART: [kat] SHA2-256
3,147,942 UART: Fatal Error: 0x90010001
3,149,481 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,486 >>> mbox cmd response: failed
3,149,486 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,503 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,623 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
893,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,628 UART: [kat] ++
897,780 UART: [kat] sha1
901,816 UART: [kat] SHA2-256
903,756 UART: [kat] SHA2-384
906,311 UART: [kat] SHA2-512-ACC
908,212 UART: [kat] ECC-384
917,757 UART: [kat] HMAC-384Kdf
922,533 UART: [kat] LMS
1,170,861 UART: [kat] --
1,171,830 UART: [cold-reset] ++
1,172,164 UART: [fht] FHT @ 0x50003400
1,174,741 UART: [idev] ++
1,174,909 UART: [idev] CDI.KEYID = 6
1,175,269 UART: [idev] SUBJECT.KEYID = 7
1,175,693 UART: [idev] UDS.KEYID = 0
1,176,038 ready_for_fw is high
1,176,038 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,825 UART: [idev] Erasing UDS.KEYID = 0
1,201,220 UART: [idev] Sha1 KeyId Algorithm
1,209,758 UART: [idev] --
1,211,028 UART: [ldev] ++
1,211,196 UART: [ldev] CDI.KEYID = 6
1,211,559 UART: [ldev] SUBJECT.KEYID = 5
1,211,985 UART: [ldev] AUTHORITY.KEYID = 7
1,212,448 UART: [ldev] FE.KEYID = 1
1,217,670 UART: [ldev] Erasing FE.KEYID = 1
1,244,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,950 UART: [ldev] --
1,283,411 UART: [fwproc] Wait for Commands...
1,284,023 UART: [fwproc] Recv command 0x46574c44
1,284,751 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,913 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,217 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,158 >>> mbox cmd response: success
2,785,214 UART: [afmc] ++
2,785,382 UART: [afmc] CDI.KEYID = 6
2,785,744 UART: [afmc] SUBJECT.KEYID = 7
2,786,169 UART: [afmc] AUTHORITY.KEYID = 5
2,822,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,615 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,363 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,845,091 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,976 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,695 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,563 UART: [afmc] --
2,865,473 UART: [cold-reset] --
2,866,459 UART: [state] Locking Datavault
2,867,568 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,172 UART: [state] Locking ICCM
2,868,748 UART: [exit] Launching FMC @ 0x40000130
2,874,077 UART:
2,874,093 UART: Running Caliptra FMC ...
2,874,501 UART:
2,874,644 UART: [state] CFI Enabled
2,885,031 UART: [fht] FMC Alias Private Key: 7
2,993,396 UART: [art] Extend RT PCRs Done
2,993,824 UART: [art] Lock RT PCRs Done
2,995,460 UART: [art] Populate DV Done
3,003,741 UART: [fht] FMC Alias Private Key: 7
3,004,813 UART: [art] Derive CDI
3,005,093 UART: [art] Store in in slot 0x4
3,090,444 UART: [art] Derive Key Pair
3,090,804 UART: [art] Store priv key in slot 0x5
3,103,774 UART: [art] Derive Key Pair - Done
3,118,086 UART: [art] Signing Cert with AUTHO
3,118,566 UART: RITY.KEYID = 7
3,134,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,134,893 UART: [art] PUB.X = FC05E61924D49D56A58E2AA18748AE91BAAA54692AEB371CBEA7A1D7794EA33F4955B17711310B4869983A1CC886E4C3
3,141,663 UART: [art] PUB.Y = 70599A2803E62D30FC99FD80A309ABB91C3098D1CCF1D1CEF1C294F20741ACF04509943D82111BB1ECB8A8298E88A866
3,148,607 UART: [art] SIG.R = 56B45AA90A523B57AA2715ECA87C2112C4F19ADD0ED96AAE217A31B607508711302961A4983BD8BD40D74880BF0711AB
3,155,369 UART: [art] SIG.S = 3800AD1798917B661B8EF5849E61E4E0F49A15228371AAF3C4D4BE6790452C42FB7767C6062E62EF07D69212E9242E78
3,180,032 UART: Caliptra RT
3,180,377 UART: [state] CFI Enabled
3,288,458 UART: [rt] RT listening for mailbox commands...
3,289,121 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,982 UART: [rt]cmd =0x46504c54, len=4
3,320,170 >>> mbox cmd response data (8 bytes)
3,320,451 UART: [rt] FIPS self test
3,320,779 UART: [kat] ++
3,320,931 UART: [kat] sha1
3,324,977 UART: [kat] SHA2-256
3,325,511 UART: Fatal Error: 0x90010001
3,327,050 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,055 >>> mbox cmd response: failed
3,327,055 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
893,441 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,566 UART: [kat] ++
897,718 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,435 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,448 UART: [cold-reset] ++
1,172,832 UART: [fht] FHT @ 0x50003400
1,175,341 UART: [idev] ++
1,175,509 UART: [idev] CDI.KEYID = 6
1,175,869 UART: [idev] SUBJECT.KEYID = 7
1,176,293 UART: [idev] UDS.KEYID = 0
1,176,638 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,355 UART: [idev] Erasing UDS.KEYID = 0
1,201,336 UART: [idev] Sha1 KeyId Algorithm
1,209,758 UART: [idev] --
1,210,740 UART: [ldev] ++
1,210,908 UART: [ldev] CDI.KEYID = 6
1,211,271 UART: [ldev] SUBJECT.KEYID = 5
1,211,697 UART: [ldev] AUTHORITY.KEYID = 7
1,212,160 UART: [ldev] FE.KEYID = 1
1,217,590 UART: [ldev] Erasing FE.KEYID = 1
1,243,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,934 UART: [ldev] --
1,282,303 UART: [fwproc] Wait for Commands...
1,283,075 UART: [fwproc] Recv command 0x46574c44
1,283,803 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,087 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,391 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,234 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,738 ready_for_fw is high
1,060,738 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,670 >>> mbox cmd response: success
2,698,822 UART:
2,698,838 UART: Running Caliptra FMC ...
2,699,246 UART:
2,699,389 UART: [state] CFI Enabled
2,710,004 UART: [fht] FMC Alias Private Key: 7
2,818,093 UART: [art] Extend RT PCRs Done
2,818,521 UART: [art] Lock RT PCRs Done
2,819,929 UART: [art] Populate DV Done
2,827,912 UART: [fht] FMC Alias Private Key: 7
2,828,948 UART: [art] Derive CDI
2,829,228 UART: [art] Store in in slot 0x4
2,914,991 UART: [art] Derive Key Pair
2,915,351 UART: [art] Store priv key in slot 0x5
2,928,831 UART: [art] Derive Key Pair - Done
2,943,493 UART: [art] Signing Cert with AUTHO
2,943,973 UART: RITY.KEYID = 7
2,959,145 UART: [art] Erasing AUTHORITY.KEYID = 7
2,959,910 UART: [art] PUB.X = 6815D6F88DB31874BB9E50A9D40402AF9FDBCB284B184F96F5E8E58EC90CCFE230BD72D5C863786C0CB09E6A66382800
2,966,656 UART: [art] PUB.Y = C4D318770F795C5BD9EEDCE50DA2D7B656B5A92C695E0AB115888834582E8BB9559AC5A9E622155D8683DBEAF5AE7043
2,973,607 UART: [art] SIG.R = F64A1D5D79C0205BEAEE2C98B129AE8870BBBD0F705B5143BCACD123D37B8798A4210DFD5652A1DD346B1C36664E02FA
2,980,384 UART: [art] SIG.S = AB2670457A498FE0E1E36F6AF8528161A8957DF1D3452074DB1898C092D9903C53278D1A10513AEA856A08D60E91E164
3,004,037 UART: Caliptra RT
3,004,382 UART: [state] CFI Enabled
3,112,944 UART: [rt] RT listening for mailbox commands...
3,113,607 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,588 UART: [rt]cmd =0x46504c54, len=4
3,144,898 >>> mbox cmd response data (8 bytes)
3,145,039 UART: [rt] FIPS self test
3,145,367 UART: [kat] ++
3,145,519 UART: [kat] sha1
3,149,785 UART: [kat] SHA2-256
3,150,213 UART: Fatal Error: 0x90010001
3,151,752 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,757 >>> mbox cmd response: failed
3,151,757 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,058 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,670 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,704 UART: [kat] LMS
1,169,016 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,174,319 ready_for_fw is high
1,174,319 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,111 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,737 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,136 UART: [ldev] Erasing FE.KEYID = 1
1,241,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,416 UART: [ldev] --
1,280,862 UART: [fwproc] Wait for Commands...
1,281,571 UART: [fwproc] Recv command 0x46574c44
1,282,304 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,682 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,628 >>> mbox cmd response: success
2,781,811 UART: [afmc] ++
2,781,979 UART: [afmc] CDI.KEYID = 6
2,782,342 UART: [afmc] SUBJECT.KEYID = 7
2,782,768 UART: [afmc] AUTHORITY.KEYID = 5
2,818,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,234 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,963 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,846 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,565 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,368 UART: [afmc] --
2,862,470 UART: [cold-reset] --
2,863,452 UART: [state] Locking Datavault
2,864,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,269 UART: [state] Locking ICCM
2,865,921 UART: [exit] Launching FMC @ 0x40000130
2,871,250 UART:
2,871,266 UART: Running Caliptra FMC ...
2,871,674 UART:
2,871,728 UART: [state] CFI Enabled
2,882,231 UART: [fht] FMC Alias Private Key: 7
2,990,136 UART: [art] Extend RT PCRs Done
2,990,564 UART: [art] Lock RT PCRs Done
2,992,250 UART: [art] Populate DV Done
3,000,579 UART: [fht] FMC Alias Private Key: 7
3,001,549 UART: [art] Derive CDI
3,001,829 UART: [art] Store in in slot 0x4
3,087,056 UART: [art] Derive Key Pair
3,087,416 UART: [art] Store priv key in slot 0x5
3,100,214 UART: [art] Derive Key Pair - Done
3,115,147 UART: [art] Signing Cert with AUTHO
3,115,627 UART: RITY.KEYID = 7
3,130,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,550 UART: [art] PUB.X = 73668D6CE67BC5D3900BCC0A2E19A24B10F7C86735991F55BA937A43DD6585D83DB4CAC7DC6FB679AAC0AE3F4F7B9254
3,138,330 UART: [art] PUB.Y = 384D2560CA1C0D0834973C409A2E4A5681183D889793164520258C5668457C06C26AC6476C9CD075B2BD3E7E9117616D
3,145,257 UART: [art] SIG.R = 66CC44EC9AC0E0BB4EC013B69C791CC5B363FA7FFA0EC7A0D663379F1D3E5D64FADBE5E13ADEAFDE284801A2FBE9F682
3,152,053 UART: [art] SIG.S = 9DA644FC52FB09FD7BC73D635341BA7278DC71BD0EDF3731BDB317860E393C9D5D3F14965DAE8DD448DEC5C48549FB16
3,176,689 UART: Caliptra RT
3,176,942 UART: [state] CFI Enabled
3,285,097 UART: [rt] RT listening for mailbox commands...
3,285,760 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,579 UART: [rt]cmd =0x46504c54, len=4
3,316,759 >>> mbox cmd response data (8 bytes)
3,317,000 UART: [rt] FIPS self test
3,317,328 UART: [kat] ++
3,317,480 UART: [kat] sha1
3,321,606 UART: [kat] SHA2-256
3,322,192 UART: Fatal Error: 0x90010001
3,323,731 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,323,736 >>> mbox cmd response: failed
3,323,736 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,323,741 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,443 UART: [kat] SHA2-256
901,383 UART: [kat] SHA2-384
904,056 UART: [kat] SHA2-512-ACC
905,957 UART: [kat] ECC-384
915,748 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,491 UART: [cold-reset] ++
1,169,899 UART: [fht] FHT @ 0x50003400
1,172,533 UART: [idev] ++
1,172,701 UART: [idev] CDI.KEYID = 6
1,173,062 UART: [idev] SUBJECT.KEYID = 7
1,173,487 UART: [idev] UDS.KEYID = 0
1,173,833 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,111 UART: [idev] Erasing UDS.KEYID = 0
1,197,881 UART: [idev] Sha1 KeyId Algorithm
1,206,657 UART: [idev] --
1,207,696 UART: [ldev] ++
1,207,864 UART: [ldev] CDI.KEYID = 6
1,208,228 UART: [ldev] SUBJECT.KEYID = 5
1,208,655 UART: [ldev] AUTHORITY.KEYID = 7
1,209,118 UART: [ldev] FE.KEYID = 1
1,214,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,190 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,503 UART: [fwproc] Recv command 0x46574c44
1,282,236 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,803 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,112 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,038 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,120 ready_for_fw is high
1,055,120 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,048 >>> mbox cmd response: success
2,693,530 UART:
2,693,546 UART: Running Caliptra FMC ...
2,693,954 UART:
2,694,008 UART: [state] CFI Enabled
2,704,755 UART: [fht] FMC Alias Private Key: 7
2,812,654 UART: [art] Extend RT PCRs Done
2,813,082 UART: [art] Lock RT PCRs Done
2,814,582 UART: [art] Populate DV Done
2,822,731 UART: [fht] FMC Alias Private Key: 7
2,823,687 UART: [art] Derive CDI
2,823,967 UART: [art] Store in in slot 0x4
2,909,782 UART: [art] Derive Key Pair
2,910,142 UART: [art] Store priv key in slot 0x5
2,923,304 UART: [art] Derive Key Pair - Done
2,938,067 UART: [art] Signing Cert with AUTHO
2,938,547 UART: RITY.KEYID = 7
2,953,883 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,648 UART: [art] PUB.X = 4E226F24112E2295C458D58959EAEA4057E5FDEF9273822D4D8FC49BC74A71EE8A06BA0918DD92653218108B5D64E86C
2,961,414 UART: [art] PUB.Y = D0519E8ED2E7801FA3EA92E1BC624EE3B6121CCDDFB1A33CEA58385CD4F686391451B70D17CC54EE6C6FE0D2A3CADFC4
2,968,387 UART: [art] SIG.R = 3C889E799315E691543D0033D73A405A50F1CBB2DF12A7BDF72C36964B16039D799E8EB21A04FC70F08AFD3C4577F1A1
2,975,133 UART: [art] SIG.S = 98E65259CD7DE21E451AF7A84FD3E7344B6D64987F281BED2F3BF8D2858E629BF5C379356A2AB8966B376EB7B19A2091
2,999,348 UART: Caliptra RT
2,999,601 UART: [state] CFI Enabled
3,107,492 UART: [rt] RT listening for mailbox commands...
3,108,155 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,178 UART: [rt]cmd =0x46504c54, len=4
3,139,266 >>> mbox cmd response data (8 bytes)
3,139,611 UART: [rt] FIPS self test
3,139,939 UART: [kat] ++
3,140,091 UART: [kat] sha1
3,144,171 UART: [kat] SHA2-256
3,144,577 UART: Fatal Error: 0x90010001
3,146,116 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,146,121 >>> mbox cmd response: failed
3,146,121 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,146,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,160 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,846 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,308 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,003 UART: [kat] SHA2-512-ACC
905,904 UART: [kat] ECC-384
915,343 UART: [kat] HMAC-384Kdf
919,987 UART: [kat] LMS
1,168,299 UART: [kat] --
1,169,158 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,184 UART: [idev] ++
1,172,352 UART: [idev] CDI.KEYID = 6
1,172,713 UART: [idev] SUBJECT.KEYID = 7
1,173,138 UART: [idev] UDS.KEYID = 0
1,173,484 ready_for_fw is high
1,173,484 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,120 UART: [idev] Erasing UDS.KEYID = 0
1,197,900 UART: [idev] Sha1 KeyId Algorithm
1,206,590 UART: [idev] --
1,207,715 UART: [ldev] ++
1,207,883 UART: [ldev] CDI.KEYID = 6
1,208,247 UART: [ldev] SUBJECT.KEYID = 5
1,208,674 UART: [ldev] AUTHORITY.KEYID = 7
1,209,137 UART: [ldev] FE.KEYID = 1
1,214,321 UART: [ldev] Erasing FE.KEYID = 1
1,240,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,219 UART: [ldev] --
1,279,605 UART: [fwproc] Wait for Commands...
1,280,314 UART: [fwproc] Recv command 0x46574c44
1,281,047 UART: [fwproc] Recv'd Img size: 115032 bytes
2,585,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,981 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,955 >>> mbox cmd response: success
2,781,036 UART: [afmc] ++
2,781,204 UART: [afmc] CDI.KEYID = 6
2,781,567 UART: [afmc] SUBJECT.KEYID = 7
2,781,993 UART: [afmc] AUTHORITY.KEYID = 5
2,817,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,866 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,617 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,346 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,229 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,851,948 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,859,595 UART: [afmc] --
2,860,473 UART: [cold-reset] --
2,861,201 UART: [state] Locking Datavault
2,862,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,050 UART: [state] Locking ICCM
2,863,598 UART: [exit] Launching FMC @ 0x40000130
2,868,927 UART:
2,868,943 UART: Running Caliptra FMC ...
2,869,351 UART:
2,869,494 UART: [state] CFI Enabled
2,880,433 UART: [fht] FMC Alias Private Key: 7
2,988,608 UART: [art] Extend RT PCRs Done
2,989,036 UART: [art] Lock RT PCRs Done
2,990,604 UART: [art] Populate DV Done
2,999,007 UART: [fht] FMC Alias Private Key: 7
2,999,975 UART: [art] Derive CDI
3,000,255 UART: [art] Store in in slot 0x4
3,086,532 UART: [art] Derive Key Pair
3,086,892 UART: [art] Store priv key in slot 0x5
3,100,716 UART: [art] Derive Key Pair - Done
3,115,636 UART: [art] Signing Cert with AUTHO
3,116,116 UART: RITY.KEYID = 7
3,131,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,401 UART: [art] PUB.X = 229848631E34A1E8745B490690991111C21AA03EE3D24B95EDAD6AD3A52F372E06C808385E3BE8222B6B5FCD4487BA30
3,139,162 UART: [art] PUB.Y = 256E3A9713924C584E60AC8604E99AB74FCAB2B0984C785F012CAD4B7FC6859B32325A36A861C4F4FEC26B097A63ACCE
3,146,113 UART: [art] SIG.R = FB483E54B94FB4DBD43B33DE729A8373CFC82320D25C482BEB8F33ECD6D17DD02934AEFD153B7D563DB450C1A7F99036
3,152,899 UART: [art] SIG.S = D73CB83833601D48EBFC0149F6B87E5FFA77F2A865C5F2A11E9A54300F6D2FBD1CFBD4F6EE7C6C582CD00CD7ED350A30
3,176,390 UART: Caliptra RT
3,176,735 UART: [state] CFI Enabled
3,284,901 UART: [rt] RT listening for mailbox commands...
3,285,564 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,479 UART: [rt]cmd =0x46504c54, len=4
3,316,705 >>> mbox cmd response data (8 bytes)
3,316,870 UART: [rt] FIPS self test
3,317,198 UART: [kat] ++
3,317,350 UART: [kat] sha1
3,321,524 UART: [kat] SHA2-256
3,321,916 UART: Fatal Error: 0x90010001
3,323,455 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,323,460 >>> mbox cmd response: failed
3,323,460 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,323,465 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,684 UART: [cold-reset] ++
1,170,232 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,772 UART: [idev] Erasing UDS.KEYID = 0
1,198,684 UART: [idev] Sha1 KeyId Algorithm
1,207,760 UART: [idev] --
1,208,883 UART: [ldev] ++
1,209,051 UART: [ldev] CDI.KEYID = 6
1,209,415 UART: [ldev] SUBJECT.KEYID = 5
1,209,842 UART: [ldev] AUTHORITY.KEYID = 7
1,210,305 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,103 UART: [ldev] --
1,282,541 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,997 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,218 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,148 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,457 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,405 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,807 ready_for_fw is high
1,055,807 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,639 >>> mbox cmd response: success
2,693,651 UART:
2,693,667 UART: Running Caliptra FMC ...
2,694,075 UART:
2,694,218 UART: [state] CFI Enabled
2,704,795 UART: [fht] FMC Alias Private Key: 7
2,813,042 UART: [art] Extend RT PCRs Done
2,813,470 UART: [art] Lock RT PCRs Done
2,815,202 UART: [art] Populate DV Done
2,823,299 UART: [fht] FMC Alias Private Key: 7
2,824,377 UART: [art] Derive CDI
2,824,657 UART: [art] Store in in slot 0x4
2,910,298 UART: [art] Derive Key Pair
2,910,658 UART: [art] Store priv key in slot 0x5
2,923,628 UART: [art] Derive Key Pair - Done
2,937,973 UART: [art] Signing Cert with AUTHO
2,938,453 UART: RITY.KEYID = 7
2,953,371 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,136 UART: [art] PUB.X = E12DCF17634545F825D3DE41141FCFF3916A65F19765A382E58F6F683E4964502151902549CDBAD10A64A4C44ACD48EB
2,960,905 UART: [art] PUB.Y = C09A0910D027EDB0324C9DDC8EC11D4BBAFFA030DFDAEBB314EB690B99089E18EB28D2D80D706F0EBB2D27222809B3F7
2,967,859 UART: [art] SIG.R = D32B84B664E94767660DB4F3B5DD9CAE5A5794B7659E45246D0B2A58F2EB0CE6996C68DD5A2F3C734AA044B23088EB51
2,974,628 UART: [art] SIG.S = 979744CC7696187A4BC046F660B5B1C3539B060693D6FEEC0382659B2EE5171B0EC90FA229A128D33D75E0D212ACC060
2,998,514 UART: Caliptra RT
2,998,859 UART: [state] CFI Enabled
3,106,731 UART: [rt] RT listening for mailbox commands...
3,107,394 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,283 UART: [rt]cmd =0x46504c54, len=4
3,138,437 >>> mbox cmd response data (8 bytes)
3,138,610 UART: [rt] FIPS self test
3,138,938 UART: [kat] ++
3,139,090 UART: [kat] sha1
3,143,242 UART: [kat] SHA2-256
3,143,614 UART: Fatal Error: 0x90010001
3,145,153 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,145,158 >>> mbox cmd response: failed
3,145,158 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,145,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,463 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,957 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
2,522,707 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,666,385 >>> mbox cmd response: failed
2,666,937 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,809,929 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
4,858,649 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,442,787 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
2,511,052 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,654,695 >>> mbox cmd response: failed
2,655,262 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,798,256 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,871,367 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,449,955 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
2,859,469 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,003,292 >>> mbox cmd response: failed
3,003,861 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,146,690 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
21,585,745 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,010,166 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
2,868,050 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,011,976 >>> mbox cmd response: failed
3,012,568 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,155,541 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
21,585,322 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,025,110 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,520,889 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,665,214 >>> mbox cmd response: failed
2,665,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,809,188 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,425,275 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,256,378 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,517,820 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,662,141 >>> mbox cmd response: failed
2,662,735 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,806,121 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,470,882 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,301,805 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,881,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,026,341 >>> mbox cmd response: failed
3,026,945 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,170,362 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
20,180,049 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,913,222 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
2,865,944 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,010,155 >>> mbox cmd response: failed
3,010,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,154,116 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
20,184,353 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,909,727 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
2,519,890 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,664,013 >>> mbox cmd response: failed
2,664,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,807,979 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,439,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,524 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,516,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,660,892 >>> mbox cmd response: failed
2,661,454 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,805,300 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,455,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,311,066 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,876,001 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,020,494 >>> mbox cmd response: failed
3,021,069 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,165,184 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,183,501 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,907,427 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,879,139 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,023,431 >>> mbox cmd response: failed
3,024,000 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,167,386 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,185,883 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,914,610 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,538 >>> mbox cmd response: failed
87,538 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,893 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,533 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,356 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,364 >>> mbox cmd response: failed
87,364 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,559 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,476 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,751 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,759 >>> mbox cmd response: failed
87,759 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,038 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,754 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,731 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,739 >>> mbox cmd response: failed
87,739 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,894 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,816 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,138 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,146 >>> mbox cmd response: failed
87,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,655 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,791 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,996 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,004 >>> mbox cmd response: failed
88,004 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
88,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,469 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,439 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,447 >>> mbox cmd response: failed
87,447 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,456 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,398 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,693 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,701 >>> mbox cmd response: failed
87,701 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,872 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,690 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,402 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,410 >>> mbox cmd response: failed
87,410 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,851 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,809 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,836 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,844 >>> mbox cmd response: failed
86,844 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
86,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,053 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,649 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,887 >>> mbox cmd response: failed
87,887 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,758 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,730 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,733 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,741 >>> mbox cmd response: failed
87,741 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
87,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,212 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,842 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,125 UART:
192,515 UART: Running Caliptra ROM ...
193,651 UART:
193,802 UART: [state] CFI Enabled
264,719 UART: [state] LifecycleState = Unprovisioned
266,817 UART: [state] DebugLocked = No
269,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,089 UART: [kat] SHA2-256
444,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,288 UART: [kat] ++
455,820 UART: [kat] sha1
467,201 UART: [kat] SHA2-256
469,932 UART: [kat] SHA2-384
475,568 UART: [kat] SHA2-512-ACC
477,938 UART: [kat] ECC-384
2,766,213 UART: [kat] HMAC-384Kdf
2,778,269 UART: [kat] LMS
3,968,525 UART: [kat] --
3,972,954 UART: [cold-reset] ++
3,974,815 UART: [fht] Storing FHT @ 0x50003400
3,985,588 UART: [idev] ++
3,986,160 UART: [idev] CDI.KEYID = 6
3,987,197 UART: [idev] SUBJECT.KEYID = 7
3,988,326 UART: [idev] UDS.KEYID = 0
3,989,287 ready_for_fw is high
3,989,672 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,134,407 UART: [idev] Erasing UDS.KEYID = 0
7,325,197 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,636 UART: [idev] --
7,350,801 UART: [ldev] ++
7,351,428 UART: [ldev] CDI.KEYID = 6
7,352,351 UART: [ldev] SUBJECT.KEYID = 5
7,353,588 UART: [ldev] AUTHORITY.KEYID = 7
7,354,826 UART: [ldev] FE.KEYID = 1
7,402,256 UART: [ldev] Erasing FE.KEYID = 1
10,733,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,747 UART: [ldev] --
13,094,859 UART: [fwproc] Waiting for Commands...
13,097,715 UART: [fwproc] Received command 0x46574c44
13,099,901 UART: [fwproc] Received Image of size 114716 bytes
17,156,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,232,020 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,300,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,619,581 >>> mbox cmd response: success
17,624,254 UART: [afmc] ++
17,624,904 UART: [afmc] CDI.KEYID = 6
17,625,984 UART: [afmc] SUBJECT.KEYID = 7
17,627,111 UART: [afmc] AUTHORITY.KEYID = 5
20,989,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,285,579 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,287,885 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,302,270 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,317,131 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,331,560 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,353,152 UART: [afmc] --
23,356,313 UART: [cold-reset] --
23,359,205 UART: [state] Locking Datavault
23,363,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,365,511 UART: [state] Locking ICCM
23,367,177 UART: [exit] Launching FMC @ 0x40000130
23,375,537 UART:
23,375,778 UART: Running Caliptra FMC ...
23,376,882 UART:
23,377,045 UART: [state] CFI Enabled
23,447,099 UART: [fht] FMC Alias Private Key: 7
25,784,773 UART: [art] Extend RT PCRs Done
25,786,135 UART: [art] Lock RT PCRs Done
25,787,523 UART: [art] Populate DV Done
25,793,257 UART: [fht] FMC Alias Private Key: 7
25,794,911 UART: [art] Derive CDI
25,795,727 UART: [art] Store in in slot 0x4
25,855,737 UART: [art] Derive Key Pair
25,856,733 UART: [art] Store priv key in slot 0x5
29,149,080 UART: [art] Derive Key Pair - Done
29,162,142 UART: [art] Signing Cert with AUTHO
29,163,444 UART: RITY.KEYID = 7
31,451,170 UART: [art] Erasing AUTHORITY.KEYID = 7
31,452,676 UART: [art] PUB.X = A6A20BA8DD1B6E8C9457BF442F480E7E0C302F1DDC89B3FE1792247357EA9D50A02CB86040CFB4DB267FF99A35EEFE19
31,459,984 UART: [art] PUB.Y = 46355351ACC8C21F6CBD93160157ECBA840FCB5993C12239E22E49EDE20C48FAD404372CA2EE0A1697A1D68FC96ED380
31,467,203 UART: [art] SIG.R = 8279E200EB54D6996B8E7F1A686FAE324F53E5493E934E43483D5EF907C5F12F7212F92D8E22BC819E9252546A157646
31,474,561 UART: [art] SIG.S = C7BB9CF38B5D8490BABF646AA05F1001174783FF6E1314400FFDD0623D35532D0700FA4345DD841318A95657FD8C8FE0
32,779,931 UART: Caliptra RT
32,780,632 UART: [state] CFI Enabled
32,940,128 UART: [rt] RT listening for mailbox commands...
32,941,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,971,888 UART: [rt]cmd =0x46504c54, len=4
32,973,406 >>> mbox cmd response data (8 bytes)
32,974,655 UART: [rt] FIPS self test
32,975,602 UART: [kat] ++
32,976,103 UART: [kat] sha1
32,980,615 UART: [kat] SHA2-256
32,982,058 UART: Fatal Error: 0x90010002
33,017,476 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,161,974 >>> mbox cmd response: failed
33,162,665 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,306,730 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,113 UART:
190,402 UART: Running Caliptra ROM ...
191,510 UART:
191,667 UART: [state] CFI Enabled
254,582 UART: [state] LifecycleState = Unprovisioned
256,505 UART: [state] DebugLocked = No
258,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,911 UART: [kat] SHA2-256
433,635 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,146 UART: [kat] ++
444,692 UART: [kat] sha1
456,440 UART: [kat] SHA2-256
459,179 UART: [kat] SHA2-384
465,752 UART: [kat] SHA2-512-ACC
468,089 UART: [kat] ECC-384
2,757,941 UART: [kat] HMAC-384Kdf
2,788,968 UART: [kat] LMS
3,979,272 UART: [kat] --
3,984,515 UART: [cold-reset] ++
3,985,641 UART: [fht] Storing FHT @ 0x50003400
3,997,554 UART: [idev] ++
3,998,129 UART: [idev] CDI.KEYID = 6
3,999,641 UART: [idev] SUBJECT.KEYID = 7
4,000,767 UART: [idev] UDS.KEYID = 0
4,002,297 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,146,487 UART: [idev] Erasing UDS.KEYID = 0
7,337,224 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,336 UART: [idev] --
7,361,708 UART: [ldev] ++
7,362,292 UART: [ldev] CDI.KEYID = 6
7,363,258 UART: [ldev] SUBJECT.KEYID = 5
7,364,471 UART: [ldev] AUTHORITY.KEYID = 7
7,365,702 UART: [ldev] FE.KEYID = 1
7,411,614 UART: [ldev] Erasing FE.KEYID = 1
10,742,484 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,311 UART: [ldev] --
13,106,174 UART: [fwproc] Waiting for Commands...
13,108,865 UART: [fwproc] Received command 0x46574c44
13,111,073 UART: [fwproc] Received Image of size 114716 bytes
17,170,047 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,949 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,630,319 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,784,891 ready_for_fw is high
3,785,326 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,838,268 >>> mbox cmd response: success
23,521,924 UART:
23,522,313 UART: Running Caliptra FMC ...
23,523,432 UART:
23,523,593 UART: [state] CFI Enabled
23,574,533 UART: [fht] FMC Alias Private Key: 7
25,912,377 UART: [art] Extend RT PCRs Done
25,913,606 UART: [art] Lock RT PCRs Done
25,914,775 UART: [art] Populate DV Done
25,919,982 UART: [fht] FMC Alias Private Key: 7
25,921,691 UART: [art] Derive CDI
25,922,509 UART: [art] Store in in slot 0x4
25,983,841 UART: [art] Derive Key Pair
25,984,884 UART: [art] Store priv key in slot 0x5
29,277,874 UART: [art] Derive Key Pair - Done
29,290,821 UART: [art] Signing Cert with AUTHO
29,292,149 UART: RITY.KEYID = 7
31,579,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,720 UART: [art] PUB.X = EEFC5BE7A3B4C3D97FD2CFF5F3569202CBAEA29DA9BF826D6165144F62A9D603CE6069F4127A4E2FC144F56B76D75E0C
31,587,973 UART: [art] PUB.Y = 700A24A1A3EB541B9AEB4C67E4B847F36BAA69AF45BA96D9DE794BE856BFC60A5E017297DBCE0634C89ECC074269D283
31,595,212 UART: [art] SIG.R = 7378FAA3BCCCB516BDDDB9324AD904982988CDE3C61371F97D665D9A5CDAE1C6273B303B45038C1D2023119D36CE0CBC
31,602,618 UART: [art] SIG.S = A95D6282A6E24CD321B15980EF08844E8812572D43599D0A529AC3CE6D1664ACAD67111F35E7F4C804E07D573E8CA0A2
32,907,219 UART: Caliptra RT
32,907,929 UART: [state] CFI Enabled
33,068,665 UART: [rt] RT listening for mailbox commands...
33,070,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,100,207 UART: [rt]cmd =0x46504c54, len=4
33,101,895 >>> mbox cmd response data (8 bytes)
33,103,168 UART: [rt] FIPS self test
33,104,117 UART: [kat] ++
33,104,568 UART: [kat] sha1
33,109,079 UART: [kat] SHA2-256
33,110,554 UART: Fatal Error: 0x90010002
33,146,005 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,290,022 >>> mbox cmd response: failed
33,290,637 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,434,655 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,774,232 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,860,020 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,529 UART:
192,902 UART: Running Caliptra ROM ...
194,014 UART:
603,690 UART: [state] CFI Enabled
619,421 UART: [state] LifecycleState = Unprovisioned
621,374 UART: [state] DebugLocked = No
623,961 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,114 UART: [kat] SHA2-256
798,855 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,402 UART: [kat] ++
809,880 UART: [kat] sha1
821,130 UART: [kat] SHA2-256
823,857 UART: [kat] SHA2-384
829,638 UART: [kat] SHA2-512-ACC
832,020 UART: [kat] ECC-384
3,114,810 UART: [kat] HMAC-384Kdf
3,127,299 UART: [kat] LMS
4,317,358 UART: [kat] --
4,322,420 UART: [cold-reset] ++
4,324,641 UART: [fht] Storing FHT @ 0x50003400
4,334,965 UART: [idev] ++
4,335,549 UART: [idev] CDI.KEYID = 6
4,336,459 UART: [idev] SUBJECT.KEYID = 7
4,337,709 UART: [idev] UDS.KEYID = 0
4,338,772 ready_for_fw is high
4,338,983 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,483,322 UART: [idev] Erasing UDS.KEYID = 0
7,625,415 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,334 UART: [idev] --
7,650,468 UART: [ldev] ++
7,651,042 UART: [ldev] CDI.KEYID = 6
7,652,012 UART: [ldev] SUBJECT.KEYID = 5
7,653,253 UART: [ldev] AUTHORITY.KEYID = 7
7,654,493 UART: [ldev] FE.KEYID = 1
7,668,220 UART: [ldev] Erasing FE.KEYID = 1
10,955,437 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,551 UART: [ldev] --
13,314,735 UART: [fwproc] Waiting for Commands...
13,317,101 UART: [fwproc] Received command 0x46574c44
13,319,290 UART: [fwproc] Received Image of size 114716 bytes
17,379,007 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,532 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,843,704 >>> mbox cmd response: success
17,847,719 UART: [afmc] ++
17,848,334 UART: [afmc] CDI.KEYID = 6
17,849,414 UART: [afmc] SUBJECT.KEYID = 7
17,850,521 UART: [afmc] AUTHORITY.KEYID = 5
21,161,576 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,455,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,458,181 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,472,560 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,487,407 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,501,876 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,522,974 UART: [afmc] --
23,527,544 UART: [cold-reset] --
23,531,015 UART: [state] Locking Datavault
23,534,222 UART: [state] Locking PCR0, PCR1 and PCR31
23,535,979 UART: [state] Locking ICCM
23,537,754 UART: [exit] Launching FMC @ 0x40000130
23,546,120 UART:
23,546,361 UART: Running Caliptra FMC ...
23,547,464 UART:
23,547,626 UART: [state] CFI Enabled
23,555,619 UART: [fht] FMC Alias Private Key: 7
25,886,289 UART: [art] Extend RT PCRs Done
25,887,530 UART: [art] Lock RT PCRs Done
25,889,234 UART: [art] Populate DV Done
25,894,485 UART: [fht] FMC Alias Private Key: 7
25,895,971 UART: [art] Derive CDI
25,896,706 UART: [art] Store in in slot 0x4
25,938,918 UART: [art] Derive Key Pair
25,939,962 UART: [art] Store priv key in slot 0x5
29,182,260 UART: [art] Derive Key Pair - Done
29,195,303 UART: [art] Signing Cert with AUTHO
29,196,608 UART: RITY.KEYID = 7
31,475,801 UART: [art] Erasing AUTHORITY.KEYID = 7
31,477,326 UART: [art] PUB.X = 5C2B91BFFB54DEFF68987A92DF9F2EC77E5FB7611EA6116A9D408FC1EEB413D57158ADFC0FF6787B3B4E7A1127D0E2A2
31,484,574 UART: [art] PUB.Y = 6780A5B035EF36915EC3D25D13C01D1526A54304DC0283498E5C403B1CDBB8649B632F34B4CD1A6FA1780B9FDA84157C
31,491,816 UART: [art] SIG.R = 111477EB5960C9BBA276D2DFD241C51030160164252F209E5E15A7D0D769BE772E97E247D8C68E3A73873FEBF2B30736
31,499,163 UART: [art] SIG.S = AB7692C8768AC6F5A5564B5002BCB7631AB2C57000475E7EBCDA1DC9E3332ED491ED8B52A63351490B6F09E8251EA958
32,803,945 UART: Caliptra RT
32,804,661 UART: [state] CFI Enabled
32,923,535 UART: [rt] RT listening for mailbox commands...
32,925,393 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,955,101 UART: [rt]cmd =0x46504c54, len=4
32,956,731 >>> mbox cmd response data (8 bytes)
32,957,837 UART: [rt] FIPS self test
32,958,781 UART: [kat] ++
32,959,232 UART: [kat] sha1
32,963,473 UART: [kat] SHA2-256
32,964,918 UART: Fatal Error: 0x90010002
33,000,321 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,144,470 >>> mbox cmd response: failed
33,145,135 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,289,125 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
190,071 UART:
190,366 UART: Running Caliptra ROM ...
191,481 UART:
7,248,024 UART: [state] CFI Enabled
7,264,209 UART: [state] LifecycleState = Unprovisioned
7,266,127 UART: [state] DebugLocked = No
7,268,806 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,274,295 UART: [kat] SHA2-256
7,444,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,454,569 UART: [kat] ++
7,455,081 UART: [kat] sha1
7,466,950 UART: [kat] SHA2-256
7,469,651 UART: [kat] SHA2-384
7,475,048 UART: [kat] SHA2-512-ACC
7,477,401 UART: [kat] ECC-384
9,760,694 UART: [kat] HMAC-384Kdf
9,772,056 UART: [kat] LMS
10,962,151 UART: [kat] --
10,965,341 UART: [cold-reset] ++
10,967,113 UART: [fht] Storing FHT @ 0x50003400
10,978,658 UART: [idev] ++
10,979,220 UART: [idev] CDI.KEYID = 6
10,980,180 UART: [idev] SUBJECT.KEYID = 7
10,981,451 UART: [idev] UDS.KEYID = 0
10,982,964 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,127,005 UART: [idev] Erasing UDS.KEYID = 0
14,265,842 UART: [idev] Using Sha1 for KeyId Algorithm
14,288,030 UART: [idev] --
14,290,730 UART: [ldev] ++
14,291,298 UART: [ldev] CDI.KEYID = 6
14,292,256 UART: [ldev] SUBJECT.KEYID = 5
14,293,468 UART: [ldev] AUTHORITY.KEYID = 7
14,294,697 UART: [ldev] FE.KEYID = 1
14,305,069 UART: [ldev] Erasing FE.KEYID = 1
17,592,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,886,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,901,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,915,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,930,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,949,323 UART: [ldev] --
19,953,724 UART: [fwproc] Waiting for Commands...
19,955,336 UART: [fwproc] Received command 0x46574c44
19,957,557 UART: [fwproc] Received Image of size 114716 bytes
24,019,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,099,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,168,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,487,450 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
4,127,054 ready_for_fw is high
4,127,525 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,088,675 >>> mbox cmd response: success
23,732,119 UART:
23,732,506 UART: Running Caliptra FMC ...
23,733,661 UART:
23,733,820 UART: [state] CFI Enabled
23,741,753 UART: [fht] FMC Alias Private Key: 7
26,072,342 UART: [art] Extend RT PCRs Done
26,073,578 UART: [art] Lock RT PCRs Done
26,075,241 UART: [art] Populate DV Done
26,080,556 UART: [fht] FMC Alias Private Key: 7
26,082,047 UART: [art] Derive CDI
26,082,791 UART: [art] Store in in slot 0x4
26,125,262 UART: [art] Derive Key Pair
26,126,310 UART: [art] Store priv key in slot 0x5
29,368,174 UART: [art] Derive Key Pair - Done
29,380,799 UART: [art] Signing Cert with AUTHO
29,382,100 UART: RITY.KEYID = 7
31,661,550 UART: [art] Erasing AUTHORITY.KEYID = 7
31,663,070 UART: [art] PUB.X = 4F84A1E7A5EA350C6582B8C1CCE802A60401C7753F26A9DD354095EB3D3491921DD0DAB24F80B81239F2B9D0B970F50A
31,670,334 UART: [art] PUB.Y = B43155B32F086CBCBB79A2C16C8A0D4FB2CA4B7EBF78514241D9ACE134EE2FAD1C71BDDFB690AECB3FBE0A219151D047
31,677,594 UART: [art] SIG.R = 55FC00327B66A3390E4BEB43831B9F6B85AE209B4DBC6D53E65A625D2A8A491B9D18EE0CA6439F6C5002B16A03691C94
31,684,940 UART: [art] SIG.S = A6D2FE68B0FB0840D572AC63E64C8055F7A83A200B28AA990EBFF5F6C7103B065BB64734E25A7FB1712D810155918163
32,989,926 UART: Caliptra RT
32,990,645 UART: [state] CFI Enabled
33,108,600 UART: [rt] RT listening for mailbox commands...
33,110,451 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,140,195 UART: [rt]cmd =0x46504c54, len=4
33,141,715 >>> mbox cmd response data (8 bytes)
33,143,116 UART: [rt] FIPS self test
33,144,058 UART: [kat] ++
33,144,512 UART: [kat] sha1
33,148,781 UART: [kat] SHA2-256
33,150,387 UART: Fatal Error: 0x90010002
33,185,819 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,329,915 >>> mbox cmd response: failed
33,330,528 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,474,426 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
10,586,127 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,545,294 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,174 UART:
192,557 UART: Running Caliptra ROM ...
193,686 UART:
193,827 UART: [state] CFI Enabled
265,037 UART: [state] LifecycleState = Unprovisioned
266,753 UART: [state] DebugLocked = No
267,929 UART: [state] WD Timer not started. Device not locked for debugging
271,637 UART: [kat] SHA2-256
450,799 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,348 UART: [kat] ++
462,800 UART: [kat] sha1
473,607 UART: [kat] SHA2-256
476,615 UART: [kat] SHA2-384
482,112 UART: [kat] SHA2-512-ACC
485,057 UART: [kat] ECC-384
2,947,393 UART: [kat] HMAC-384Kdf
2,972,203 UART: [kat] LMS
3,501,693 UART: [kat] --
3,503,987 UART: [cold-reset] ++
3,504,993 UART: [fht] FHT @ 0x50003400
3,515,751 UART: [idev] ++
3,516,307 UART: [idev] CDI.KEYID = 6
3,517,194 UART: [idev] SUBJECT.KEYID = 7
3,518,443 UART: [idev] UDS.KEYID = 0
3,519,347 ready_for_fw is high
3,519,560 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,664,232 UART: [idev] Erasing UDS.KEYID = 0
6,024,534 UART: [idev] Sha1 KeyId Algorithm
6,046,637 UART: [idev] --
6,050,093 UART: [ldev] ++
6,050,672 UART: [ldev] CDI.KEYID = 6
6,051,587 UART: [ldev] SUBJECT.KEYID = 5
6,052,747 UART: [ldev] AUTHORITY.KEYID = 7
6,054,000 UART: [ldev] FE.KEYID = 1
6,101,929 UART: [ldev] Erasing FE.KEYID = 1
8,605,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,859 UART: [ldev] --
10,413,718 UART: [fwproc] Wait for Commands...
10,416,248 UART: [fwproc] Recv command 0x46574c44
10,418,346 UART: [fwproc] Recv'd Img size: 115032 bytes
13,830,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,263 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,972,068 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,291,977 >>> mbox cmd response: success
14,296,278 UART: [afmc] ++
14,296,888 UART: [afmc] CDI.KEYID = 6
14,297,856 UART: [afmc] SUBJECT.KEYID = 7
14,298,961 UART: [afmc] AUTHORITY.KEYID = 5
16,831,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,557,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,559,079 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,574,827 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,590,883 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,606,755 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,954 UART: [afmc] --
18,633,899 UART: [cold-reset] --
18,636,356 UART: [state] Locking Datavault
18,641,547 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,301 UART: [state] Locking ICCM
18,645,705 UART: [exit] Launching FMC @ 0x40000130
18,654,101 UART:
18,654,358 UART: Running Caliptra FMC ...
18,655,385 UART:
18,655,535 UART: [state] CFI Enabled
18,714,556 UART: [fht] FMC Alias Private Key: 7
20,478,911 UART: [art] Extend RT PCRs Done
20,480,138 UART: [art] Lock RT PCRs Done
20,481,468 UART: [art] Populate DV Done
20,486,878 UART: [fht] FMC Alias Private Key: 7
20,488,419 UART: [art] Derive CDI
20,489,155 UART: [art] Store in in slot 0x4
20,547,385 UART: [art] Derive Key Pair
20,548,424 UART: [art] Store priv key in slot 0x5
23,012,004 UART: [art] Derive Key Pair - Done
23,024,960 UART: [art] Signing Cert with AUTHO
23,026,269 UART: RITY.KEYID = 7
24,737,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,286 UART: [art] PUB.X = 9FF8EFC89EAEA1C6389E8636B7F1376C68264076F71F7876B10525D42D7C0C293E118B2B2422CAB3C85EF9B268F74453
24,746,534 UART: [art] PUB.Y = 2E0041FD256D7BF4FBD14FC177A46B1D88D32CC141FF65241BA3283001A4007516F0D0340707D3A5F21BBB4213C5480B
24,753,754 UART: [art] SIG.R = D3F0D9752368C01E62C176B1AD65F627316C8B500BFABAC4447652FE949D555C08D619E89387A525FE32462AE69A8C2D
24,761,124 UART: [art] SIG.S = 85E623915D769A59FB59F4108C1C72F61E088CD847DF5B900FE54F17C59126388AF24467F57108B15F7D5AE700E8F4D7
25,740,160 UART: Caliptra RT
25,740,883 UART: [state] CFI Enabled
25,904,593 UART: [rt] RT listening for mailbox commands...
25,906,448 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,936,350 UART: [rt]cmd =0x46504c54, len=4
25,937,928 >>> mbox cmd response data (8 bytes)
25,938,868 UART: [rt] FIPS self test
25,939,816 UART: [kat] ++
25,940,271 UART: [kat] sha1
25,944,740 UART: [kat] SHA2-256
25,946,118 UART: Fatal Error: 0x90010002
25,981,331 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,125,802 >>> mbox cmd response: failed
26,126,455 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,270,847 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,066 UART:
190,357 UART: Running Caliptra ROM ...
191,381 UART:
191,521 UART: [state] CFI Enabled
257,417 UART: [state] LifecycleState = Unprovisioned
259,279 UART: [state] DebugLocked = No
262,196 UART: [state] WD Timer not started. Device not locked for debugging
266,303 UART: [kat] SHA2-256
445,423 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
457,018 UART: [kat] ++
457,551 UART: [kat] sha1
467,695 UART: [kat] SHA2-256
470,758 UART: [kat] SHA2-384
476,514 UART: [kat] SHA2-512-ACC
479,488 UART: [kat] ECC-384
2,940,864 UART: [kat] HMAC-384Kdf
2,964,368 UART: [kat] LMS
3,493,833 UART: [kat] --
3,499,080 UART: [cold-reset] ++
3,501,618 UART: [fht] FHT @ 0x50003400
3,512,490 UART: [idev] ++
3,513,063 UART: [idev] CDI.KEYID = 6
3,514,164 UART: [idev] SUBJECT.KEYID = 7
3,515,288 UART: [idev] UDS.KEYID = 0
3,516,849 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,661,400 UART: [idev] Erasing UDS.KEYID = 0
6,016,568 UART: [idev] Sha1 KeyId Algorithm
6,039,602 UART: [idev] --
6,043,220 UART: [ldev] ++
6,043,800 UART: [ldev] CDI.KEYID = 6
6,044,712 UART: [ldev] SUBJECT.KEYID = 5
6,045,874 UART: [ldev] AUTHORITY.KEYID = 7
6,047,115 UART: [ldev] FE.KEYID = 1
6,091,658 UART: [ldev] Erasing FE.KEYID = 1
8,594,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,784 UART: [ldev] --
10,406,631 UART: [fwproc] Wait for Commands...
10,409,223 UART: [fwproc] Recv command 0x46574c44
10,411,320 UART: [fwproc] Recv'd Img size: 115032 bytes
13,826,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,439 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,968,199 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,288,582 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,362,253 ready_for_fw is high
3,362,686 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,081,053 >>> mbox cmd response: success
18,366,016 UART:
18,366,403 UART: Running Caliptra FMC ...
18,367,555 UART:
18,367,721 UART: [state] CFI Enabled
18,434,318 UART: [fht] FMC Alias Private Key: 7
20,198,173 UART: [art] Extend RT PCRs Done
20,199,393 UART: [art] Lock RT PCRs Done
20,201,293 UART: [art] Populate DV Done
20,206,898 UART: [fht] FMC Alias Private Key: 7
20,208,605 UART: [art] Derive CDI
20,209,420 UART: [art] Store in in slot 0x4
20,268,684 UART: [art] Derive Key Pair
20,269,719 UART: [art] Store priv key in slot 0x5
22,732,725 UART: [art] Derive Key Pair - Done
22,745,750 UART: [art] Signing Cert with AUTHO
22,747,058 UART: RITY.KEYID = 7
24,458,853 UART: [art] Erasing AUTHORITY.KEYID = 7
24,460,372 UART: [art] PUB.X = E73967EA6E2287A459FFF614FAEDA48F1691AF0372A350B7BCD4983FB2D7535198A71D64F86A55E70DD030AC4593F12A
24,467,635 UART: [art] PUB.Y = EF7B126935BE3262BF6906D2B8458295A0FA0580A0E0E7ED4B423AA25E682C9B5F19BE91042326A791A77020461F32A6
24,474,858 UART: [art] SIG.R = 55C474686FEE0FA791CBB3987CA85EE1D38699E3DFC13F4B42D4C61B26B30F43F862592DDE905EC1E83643BFD137DA5E
24,482,261 UART: [art] SIG.S = 7C9539A0A963ECC51946CD68247F4743B68805852DC741D36F26B40DCF24F1D834FB7EBDBF46AB96257B554528AE4E91
25,461,121 UART: Caliptra RT
25,461,838 UART: [state] CFI Enabled
25,628,047 UART: [rt] RT listening for mailbox commands...
25,629,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,659,579 UART: [rt]cmd =0x46504c54, len=4
25,661,294 >>> mbox cmd response data (8 bytes)
25,662,453 UART: [rt] FIPS self test
25,663,391 UART: [kat] ++
25,663,846 UART: [kat] sha1
25,668,433 UART: [kat] SHA2-256
25,669,945 UART: Fatal Error: 0x90010002
25,705,387 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,849,890 >>> mbox cmd response: failed
25,850,512 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,994,823 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,371,435 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,063,632 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,535 UART:
192,903 UART: Running Caliptra ROM ...
194,506 UART:
603,537 UART: [state] CFI Enabled
617,138 UART: [state] LifecycleState = Unprovisioned
619,039 UART: [state] DebugLocked = No
621,566 UART: [state] WD Timer not started. Device not locked for debugging
624,404 UART: [kat] SHA2-256
803,555 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,158 UART: [kat] ++
815,691 UART: [kat] sha1
826,004 UART: [kat] SHA2-256
829,023 UART: [kat] SHA2-384
835,698 UART: [kat] SHA2-512-ACC
838,704 UART: [kat] ECC-384
3,279,338 UART: [kat] HMAC-384Kdf
3,292,226 UART: [kat] LMS
3,821,769 UART: [kat] --
3,826,831 UART: [cold-reset] ++
3,828,408 UART: [fht] FHT @ 0x50003400
3,839,321 UART: [idev] ++
3,839,911 UART: [idev] CDI.KEYID = 6
3,840,821 UART: [idev] SUBJECT.KEYID = 7
3,842,000 UART: [idev] UDS.KEYID = 0
3,843,063 ready_for_fw is high
3,843,305 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,987,864 UART: [idev] Erasing UDS.KEYID = 0
6,315,342 UART: [idev] Sha1 KeyId Algorithm
6,338,354 UART: [idev] --
6,342,239 UART: [ldev] ++
6,342,810 UART: [ldev] CDI.KEYID = 6
6,343,722 UART: [ldev] SUBJECT.KEYID = 5
6,344,883 UART: [ldev] AUTHORITY.KEYID = 7
6,346,168 UART: [ldev] FE.KEYID = 1
6,354,988 UART: [ldev] Erasing FE.KEYID = 1
8,828,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,594,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,616,052 UART: [ldev] --
10,620,679 UART: [fwproc] Wait for Commands...
10,623,045 UART: [fwproc] Recv command 0x46574c44
10,625,145 UART: [fwproc] Recv'd Img size: 115032 bytes
14,031,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,318 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,126 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,496,273 >>> mbox cmd response: success
14,500,395 UART: [afmc] ++
14,500,997 UART: [afmc] CDI.KEYID = 6
14,502,069 UART: [afmc] SUBJECT.KEYID = 7
14,503,178 UART: [afmc] AUTHORITY.KEYID = 5
17,001,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,723,866 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,739,649 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,755,678 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,771,557 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,794,918 UART: [afmc] --
18,798,304 UART: [cold-reset] --
18,801,194 UART: [state] Locking Datavault
18,807,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,809,168 UART: [state] Locking ICCM
18,811,426 UART: [exit] Launching FMC @ 0x40000130
18,819,837 UART:
18,820,072 UART: Running Caliptra FMC ...
18,821,177 UART:
18,821,344 UART: [state] CFI Enabled
18,829,825 UART: [fht] FMC Alias Private Key: 7
20,586,376 UART: [art] Extend RT PCRs Done
20,587,601 UART: [art] Lock RT PCRs Done
20,589,252 UART: [art] Populate DV Done
20,594,559 UART: [fht] FMC Alias Private Key: 7
20,596,139 UART: [art] Derive CDI
20,596,879 UART: [art] Store in in slot 0x4
20,639,583 UART: [art] Derive Key Pair
20,640,585 UART: [art] Store priv key in slot 0x5
23,067,682 UART: [art] Derive Key Pair - Done
23,080,818 UART: [art] Signing Cert with AUTHO
23,082,146 UART: RITY.KEYID = 7
24,787,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,789,343 UART: [art] PUB.X = 061A2FFE90591C9AEADD808B7F164BA996A7D9B9817352629EF327727088F82AE4DD25AA8A3529D52624F12A3AF91E6D
24,796,645 UART: [art] PUB.Y = 799F81F73770EE869E162E13F85A28C493378645E705AB50C573BF0F8D1FCA590CC844871486B45EC521020567AA682B
24,803,877 UART: [art] SIG.R = C923E9A4198303AD2DE5F95BB079368E3F9353291CD4C6E94610729F7E115FE81AEA000811E4D80B2A29B518E67E3A62
24,811,221 UART: [art] SIG.S = 6FF0C9379A4350C6964CBB92A260C9BE53E4E6053BA25AE2F56DFFDE763794CCAC9CBA13FEC2E8A6D358C4D3154AD6AB
25,789,635 UART: Caliptra RT
25,790,340 UART: [state] CFI Enabled
25,906,688 UART: [rt] RT listening for mailbox commands...
25,908,553 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,938,224 UART: [rt]cmd =0x46504c54, len=4
25,939,798 >>> mbox cmd response data (8 bytes)
25,940,957 UART: [rt] FIPS self test
25,941,905 UART: [kat] ++
25,942,351 UART: [kat] sha1
25,946,561 UART: [kat] SHA2-256
25,948,052 UART: Fatal Error: 0x90010002
25,983,427 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,127,895 >>> mbox cmd response: failed
26,128,502 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,272,795 >>> mbox cmd response: failed
Initializing fuses
1,157 writing to cptra_bootfsm_go
190,360 UART:
190,640 UART: Running Caliptra ROM ...
191,749 UART:
14,259,825 UART: [state] CFI Enabled
14,272,020 UART: [state] LifecycleState = Unprovisioned
14,273,880 UART: [state] DebugLocked = No
14,275,691 UART: [state] WD Timer not started. Device not locked for debugging
14,279,755 UART: [kat] SHA2-256
14,458,886 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,470,469 UART: [kat] ++
14,471,012 UART: [kat] sha1
14,481,853 UART: [kat] SHA2-256
14,484,857 UART: [kat] SHA2-384
14,492,474 UART: [kat] SHA2-512-ACC
14,495,465 UART: [kat] ECC-384
16,937,399 UART: [kat] HMAC-384Kdf
16,949,306 UART: [kat] LMS
17,478,797 UART: [kat] --
17,482,890 UART: [cold-reset] ++
17,484,871 UART: [fht] FHT @ 0x50003400
17,495,518 UART: [idev] ++
17,496,087 UART: [idev] CDI.KEYID = 6
17,496,995 UART: [idev] SUBJECT.KEYID = 7
17,498,209 UART: [idev] UDS.KEYID = 0
17,499,719 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,644,056 UART: [idev] Erasing UDS.KEYID = 0
19,969,112 UART: [idev] Sha1 KeyId Algorithm
19,993,413 UART: [idev] --
19,995,566 UART: [ldev] ++
19,996,134 UART: [ldev] CDI.KEYID = 6
19,997,014 UART: [ldev] SUBJECT.KEYID = 5
19,998,247 UART: [ldev] AUTHORITY.KEYID = 7
19,999,405 UART: [ldev] FE.KEYID = 1
20,010,311 UART: [ldev] Erasing FE.KEYID = 1
22,485,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,205,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,221,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,237,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,252,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,273,421 UART: [ldev] --
24,278,631 UART: [fwproc] Wait for Commands...
24,280,239 UART: [fwproc] Recv command 0x46574c44
24,282,282 UART: [fwproc] Recv'd Img size: 115032 bytes
27,693,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,770,809 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,839,570 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,159,553 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,377 writing to cptra_bootfsm_go
3,700,326 ready_for_fw is high
3,700,926 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,281,933 >>> mbox cmd response: success
18,529,815 UART:
18,530,198 UART: Running Caliptra FMC ...
18,531,358 UART:
18,531,523 UART: [state] CFI Enabled
18,539,417 UART: [fht] FMC Alias Private Key: 7
20,296,222 UART: [art] Extend RT PCRs Done
20,297,448 UART: [art] Lock RT PCRs Done
20,299,126 UART: [art] Populate DV Done
20,304,683 UART: [fht] FMC Alias Private Key: 7
20,306,187 UART: [art] Derive CDI
20,306,951 UART: [art] Store in in slot 0x4
20,349,718 UART: [art] Derive Key Pair
20,350,757 UART: [art] Store priv key in slot 0x5
22,777,387 UART: [art] Derive Key Pair - Done
22,790,503 UART: [art] Signing Cert with AUTHO
22,791,810 UART: RITY.KEYID = 7
24,497,235 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,751 UART: [art] PUB.X = F679349354488F80E4446BA0216195F170146816A301C80A6C91DDF7D0A9B669A63086A012DFC88FD8C502665DDDB0C9
24,505,976 UART: [art] PUB.Y = EB207574237A4152588118AB224005B3483DB0007385D7D3F040799EF237FA6A7A42A88A992A9968D38E4D01C827CDD3
24,513,223 UART: [art] SIG.R = 67B2598A3ADAFDF26D6F9C4C7359F3A3DF6CD4BC0AB9CECD905C058D51CA7303EDAFEBD2BA8A2B15FF52A23657EAC192
24,520,654 UART: [art] SIG.S = F93DB6F65A8ED93106074781014FF068766274622F69252196ABD01FD28E2EE25DBC59ACAF9C27EFA35437F25E9A29A1
25,499,913 UART: Caliptra RT
25,500,611 UART: [state] CFI Enabled
25,618,336 UART: [rt] RT listening for mailbox commands...
25,620,188 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,650,041 UART: [rt]cmd =0x46504c54, len=4
25,651,572 >>> mbox cmd response data (8 bytes)
25,652,994 UART: [rt] FIPS self test
25,653,932 UART: [kat] ++
25,654,379 UART: [kat] sha1
25,658,779 UART: [kat] SHA2-256
25,660,219 UART: Fatal Error: 0x90010002
25,695,510 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,839,848 >>> mbox cmd response: failed
25,840,484 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,984,885 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,623,987 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,214,788 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,066 UART:
192,429 UART: Running Caliptra ROM ...
193,564 UART:
193,707 UART: [state] CFI Enabled
261,587 UART: [state] LifecycleState = Unprovisioned
264,016 UART: [state] DebugLocked = No
265,990 UART: [state] WD Timer not started. Device not locked for debugging
270,319 UART: [kat] SHA2-256
460,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,936 UART: [kat] ++
471,412 UART: [kat] sha1
481,513 UART: [kat] SHA2-256
484,527 UART: [kat] SHA2-384
490,331 UART: [kat] SHA2-512-ACC
492,923 UART: [kat] ECC-384
2,948,885 UART: [kat] HMAC-384Kdf
2,972,643 UART: [kat] LMS
3,504,406 UART: [kat] --
3,509,044 UART: [cold-reset] ++
3,511,624 UART: [fht] FHT @ 0x50003400
3,522,185 UART: [idev] ++
3,522,898 UART: [idev] CDI.KEYID = 6
3,523,783 UART: [idev] SUBJECT.KEYID = 7
3,525,029 UART: [idev] UDS.KEYID = 0
3,525,962 ready_for_fw is high
3,526,170 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,670,873 UART: [idev] Erasing UDS.KEYID = 0
6,029,864 UART: [idev] Sha1 KeyId Algorithm
6,051,858 UART: [idev] --
6,057,037 UART: [ldev] ++
6,057,729 UART: [ldev] CDI.KEYID = 6
6,058,616 UART: [ldev] SUBJECT.KEYID = 5
6,059,833 UART: [ldev] AUTHORITY.KEYID = 7
6,061,075 UART: [ldev] FE.KEYID = 1
6,100,109 UART: [ldev] Erasing FE.KEYID = 1
8,605,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,388 UART: [ldev] --
10,415,056 UART: [fwproc] Wait for Commands...
10,416,943 UART: [fwproc] Recv command 0x46574c44
10,419,209 UART: [fwproc] Recv'd Img size: 115032 bytes
13,872,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,072,276 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,619,573 >>> mbox cmd response: success
14,623,501 UART: [afmc] ++
14,624,199 UART: [afmc] CDI.KEYID = 6
14,625,315 UART: [afmc] SUBJECT.KEYID = 7
14,626,857 UART: [afmc] AUTHORITY.KEYID = 5
17,152,132 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,876,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,877,887 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,893,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,908,219 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,923,265 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,006 UART: [afmc] --
18,949,504 UART: [cold-reset] --
18,954,181 UART: [state] Locking Datavault
18,960,636 UART: [state] Locking PCR0, PCR1 and PCR31
18,962,828 UART: [state] Locking ICCM
18,964,873 UART: [exit] Launching FMC @ 0x40000130
18,973,543 UART:
18,973,775 UART: Running Caliptra FMC ...
18,974,872 UART:
18,975,024 UART: [state] CFI Enabled
19,033,069 UART: [fht] FMC Alias Private Key: 7
20,796,780 UART: [art] Extend RT PCRs Done
20,798,000 UART: [art] Lock RT PCRs Done
20,799,554 UART: [art] Populate DV Done
20,804,803 UART: [fht] FMC Alias Private Key: 7
20,806,447 UART: [art] Derive CDI
20,807,260 UART: [art] Store in in slot 0x4
20,865,751 UART: [art] Derive Key Pair
20,866,790 UART: [art] Store priv key in slot 0x5
23,329,758 UART: [art] Derive Key Pair - Done
23,342,811 UART: [art] Signing Cert with AUTHO
23,344,116 UART: RITY.KEYID = 7
25,056,164 UART: [art] Erasing AUTHORITY.KEYID = 7
25,057,673 UART: [art] PUB.X = 2819A173D1572A6F7F7FCBCCAD0630FCBF7BA05675F526E129DFB979C3EA0507941DB6E94CECE6C6A586E8877A71F2AE
25,064,963 UART: [art] PUB.Y = 4F3175632A41E150B5CE18E33FA4BE2E478248361A18CFFB73C788BD818B3B25DE8F730A13B62FAC17D3BABA768D6091
25,072,227 UART: [art] SIG.R = 270B68B4E9C955056A9FE48F663CC17BE60527838B5B7394EC9DEC9C48FB9C219EB4175D9888D123F38BEDFD4CA2DEDD
25,079,648 UART: [art] SIG.S = 2D66D6353BAF67F58F014895CB68E26B86A6AA5BF4A5058CF5F7A087EABFAAF0CFF4E54AF0665E8E88E379C09B347A55
26,058,304 UART: Caliptra RT
26,059,017 UART: [state] CFI Enabled
26,224,789 UART: [rt] RT listening for mailbox commands...
26,226,641 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,256,209 UART: [rt]cmd =0x46504c54, len=4
26,257,842 >>> mbox cmd response data (8 bytes)
26,258,951 UART: [rt] FIPS self test
26,259,896 UART: [kat] ++
26,260,367 UART: [kat] sha1
26,264,712 UART: [kat] SHA2-256
26,266,205 UART: Fatal Error: 0x90010002
26,301,444 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,445,849 >>> mbox cmd response: failed
26,446,506 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,590,969 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
190,010 UART:
190,301 UART: Running Caliptra ROM ...
191,417 UART:
191,564 UART: [state] CFI Enabled
256,428 UART: [state] LifecycleState = Unprovisioned
258,839 UART: [state] DebugLocked = No
260,166 UART: [state] WD Timer not started. Device not locked for debugging
265,561 UART: [kat] SHA2-256
455,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,220 UART: [kat] ++
466,701 UART: [kat] sha1
477,152 UART: [kat] SHA2-256
480,170 UART: [kat] SHA2-384
486,261 UART: [kat] SHA2-512-ACC
488,878 UART: [kat] ECC-384
2,939,235 UART: [kat] HMAC-384Kdf
2,961,883 UART: [kat] LMS
3,493,662 UART: [kat] --
3,500,444 UART: [cold-reset] ++
3,502,233 UART: [fht] FHT @ 0x50003400
3,513,764 UART: [idev] ++
3,514,453 UART: [idev] CDI.KEYID = 6
3,515,418 UART: [idev] SUBJECT.KEYID = 7
3,516,598 UART: [idev] UDS.KEYID = 0
3,518,113 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,662,724 UART: [idev] Erasing UDS.KEYID = 0
6,020,791 UART: [idev] Sha1 KeyId Algorithm
6,044,253 UART: [idev] --
6,049,600 UART: [ldev] ++
6,050,291 UART: [ldev] CDI.KEYID = 6
6,051,176 UART: [ldev] SUBJECT.KEYID = 5
6,052,392 UART: [ldev] AUTHORITY.KEYID = 7
6,053,628 UART: [ldev] FE.KEYID = 1
6,090,986 UART: [ldev] Erasing FE.KEYID = 1
8,596,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,717 UART: [ldev] --
10,404,845 UART: [fwproc] Wait for Commands...
10,408,078 UART: [fwproc] Recv command 0x46574c44
10,410,345 UART: [fwproc] Recv'd Img size: 115032 bytes
13,868,750 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,703 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,063,879 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,610,341 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,437,173 ready_for_fw is high
3,437,606 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,746,416 >>> mbox cmd response: success
19,042,383 UART:
19,042,793 UART: Running Caliptra FMC ...
19,043,917 UART:
19,044,080 UART: [state] CFI Enabled
19,109,206 UART: [fht] FMC Alias Private Key: 7
20,873,505 UART: [art] Extend RT PCRs Done
20,874,765 UART: [art] Lock RT PCRs Done
20,876,205 UART: [art] Populate DV Done
20,881,481 UART: [fht] FMC Alias Private Key: 7
20,882,979 UART: [art] Derive CDI
20,883,749 UART: [art] Store in in slot 0x4
20,942,853 UART: [art] Derive Key Pair
20,943,902 UART: [art] Store priv key in slot 0x5
23,407,201 UART: [art] Derive Key Pair - Done
23,420,338 UART: [art] Signing Cert with AUTHO
23,421,683 UART: RITY.KEYID = 7
25,131,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,484 UART: [art] PUB.X = DEF2F13B802D4B790E1C2AA53295BAEE923A193A82EACB4A5AC02AB59D03071726C93FCAB2B86246C3D17842E3BC2F9A
25,140,748 UART: [art] PUB.Y = C76210E3FBBAE693AB8D185E9F75CC69DE4821C667F421F6DE2F185FDA6B688D5CBAB945045B2AF8DD8EBCC4F59A2332
25,148,055 UART: [art] SIG.R = F05A210A63A2DB3D8BCB68BB6131D94EF6E01F10CDDA46EAC3467F68B2348B964B4CF78E373E0194F9DC460EE0FCD908
25,155,458 UART: [art] SIG.S = D6E42AB4674C7749687F664D2A0805BB0E9F3267067C401560CF0B4F4A7018B43E367F147C871FA2A33BE63D12E5BC11
26,134,206 UART: Caliptra RT
26,134,920 UART: [state] CFI Enabled
26,301,131 UART: [rt] RT listening for mailbox commands...
26,302,993 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,332,700 UART: [rt]cmd =0x46504c54, len=4
26,334,394 >>> mbox cmd response data (8 bytes)
26,335,832 UART: [rt] FIPS self test
26,336,771 UART: [kat] ++
26,337,221 UART: [kat] sha1
26,341,520 UART: [kat] SHA2-256
26,343,129 UART: Fatal Error: 0x90010002
26,378,519 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,522,927 >>> mbox cmd response: failed
26,523,575 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,668,028 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,409,108 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,723,728 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,484 UART:
192,888 UART: Running Caliptra ROM ...
194,089 UART:
603,620 UART: [state] CFI Enabled
619,339 UART: [state] LifecycleState = Unprovisioned
621,712 UART: [state] DebugLocked = No
623,386 UART: [state] WD Timer not started. Device not locked for debugging
628,348 UART: [kat] SHA2-256
818,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,998 UART: [kat] ++
829,600 UART: [kat] sha1
840,700 UART: [kat] SHA2-256
843,715 UART: [kat] SHA2-384
850,839 UART: [kat] SHA2-512-ACC
853,421 UART: [kat] ECC-384
3,294,704 UART: [kat] HMAC-384Kdf
3,308,356 UART: [kat] LMS
3,840,211 UART: [kat] --
3,845,199 UART: [cold-reset] ++
3,847,490 UART: [fht] FHT @ 0x50003400
3,857,963 UART: [idev] ++
3,858,704 UART: [idev] CDI.KEYID = 6
3,859,617 UART: [idev] SUBJECT.KEYID = 7
3,860,874 UART: [idev] UDS.KEYID = 0
3,861,801 ready_for_fw is high
3,862,001 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,006,332 UART: [idev] Erasing UDS.KEYID = 0
6,337,915 UART: [idev] Sha1 KeyId Algorithm
6,360,201 UART: [idev] --
6,363,819 UART: [ldev] ++
6,364,501 UART: [ldev] CDI.KEYID = 6
6,365,391 UART: [ldev] SUBJECT.KEYID = 5
6,366,605 UART: [ldev] AUTHORITY.KEYID = 7
6,367,857 UART: [ldev] FE.KEYID = 1
6,379,078 UART: [ldev] Erasing FE.KEYID = 1
8,853,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,128 UART: [ldev] --
10,646,094 UART: [fwproc] Wait for Commands...
10,649,020 UART: [fwproc] Recv command 0x46574c44
10,651,275 UART: [fwproc] Recv'd Img size: 115032 bytes
14,105,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,180,341 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,296,459 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,842,754 >>> mbox cmd response: success
14,847,565 UART: [afmc] ++
14,848,289 UART: [afmc] CDI.KEYID = 6
14,849,476 UART: [afmc] SUBJECT.KEYID = 7
14,850,907 UART: [afmc] AUTHORITY.KEYID = 5
17,357,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,078,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,080,940 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,110 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,111,219 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,126,274 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,150,098 UART: [afmc] --
19,152,841 UART: [cold-reset] --
19,157,843 UART: [state] Locking Datavault
19,163,309 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,507 UART: [state] Locking ICCM
19,167,710 UART: [exit] Launching FMC @ 0x40000130
19,176,383 UART:
19,176,641 UART: Running Caliptra FMC ...
19,177,744 UART:
19,177,904 UART: [state] CFI Enabled
19,186,221 UART: [fht] FMC Alias Private Key: 7
20,943,815 UART: [art] Extend RT PCRs Done
20,945,035 UART: [art] Lock RT PCRs Done
20,946,694 UART: [art] Populate DV Done
20,951,996 UART: [fht] FMC Alias Private Key: 7
20,953,695 UART: [art] Derive CDI
20,954,433 UART: [art] Store in in slot 0x4
20,996,700 UART: [art] Derive Key Pair
20,997,736 UART: [art] Store priv key in slot 0x5
23,424,121 UART: [art] Derive Key Pair - Done
23,437,165 UART: [art] Signing Cert with AUTHO
23,438,469 UART: RITY.KEYID = 7
25,143,656 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,178 UART: [art] PUB.X = 00A6875B6C73231955A6AC313F2AFF228EF2CF6615E2F6AACE821D63837E331D0FC1F289E25F12BEC01B67E24B8692EF
25,152,461 UART: [art] PUB.Y = 2DB2CD35952885139754A549E8EC34FE39FA91EC1C9A41406E2A1567ADCC62460C4DC3F5CC93A15EDEC84B28BCB42042
25,159,731 UART: [art] SIG.R = D6BE0A87A94CA7D116C3A07E5CE46D33A904D8F4E6039F53B328AC184AD096E35AD27F4BD14D07DF4F34BEBB9347052C
25,167,151 UART: [art] SIG.S = A0B1C7212D858134E354C1AE7A578527FF780BEFF60E640222FAF36D4A855827F5C8C2955D5207FCA2FB5822C6204C29
26,145,962 UART: Caliptra RT
26,146,674 UART: [state] CFI Enabled
26,263,645 UART: [rt] RT listening for mailbox commands...
26,265,491 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,295,116 UART: [rt]cmd =0x46504c54, len=4
26,296,526 >>> mbox cmd response data (8 bytes)
26,297,798 UART: [rt] FIPS self test
26,298,740 UART: [kat] ++
26,299,194 UART: [kat] sha1
26,303,597 UART: [kat] SHA2-256
26,305,092 UART: Fatal Error: 0x90010002
26,340,410 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,484,763 >>> mbox cmd response: failed
26,485,329 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,629,771 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,095 UART:
190,450 UART: Running Caliptra ROM ...
191,482 UART:
13,896,482 UART: [state] CFI Enabled
13,911,508 UART: [state] LifecycleState = Unprovisioned
13,913,870 UART: [state] DebugLocked = No
13,915,640 UART: [state] WD Timer not started. Device not locked for debugging
13,919,617 UART: [kat] SHA2-256
14,109,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,120,260 UART: [kat] ++
14,120,784 UART: [kat] sha1
14,132,284 UART: [kat] SHA2-256
14,135,309 UART: [kat] SHA2-384
14,141,187 UART: [kat] SHA2-512-ACC
14,143,756 UART: [kat] ECC-384
16,585,512 UART: [kat] HMAC-384Kdf
16,598,550 UART: [kat] LMS
17,130,396 UART: [kat] --
17,134,022 UART: [cold-reset] ++
17,135,689 UART: [fht] FHT @ 0x50003400
17,147,048 UART: [idev] ++
17,147,763 UART: [idev] CDI.KEYID = 6
17,148,787 UART: [idev] SUBJECT.KEYID = 7
17,149,892 UART: [idev] UDS.KEYID = 0
17,151,431 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,295,694 UART: [idev] Erasing UDS.KEYID = 0
19,623,766 UART: [idev] Sha1 KeyId Algorithm
19,645,527 UART: [idev] --
19,650,601 UART: [ldev] ++
19,651,285 UART: [ldev] CDI.KEYID = 6
19,652,298 UART: [ldev] SUBJECT.KEYID = 5
19,653,399 UART: [ldev] AUTHORITY.KEYID = 7
19,654,627 UART: [ldev] FE.KEYID = 1
19,668,511 UART: [ldev] Erasing FE.KEYID = 1
22,146,405 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,865,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,880,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,895,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,911,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,932,428 UART: [ldev] --
23,937,964 UART: [fwproc] Wait for Commands...
23,939,830 UART: [fwproc] Recv command 0x46574c44
23,942,113 UART: [fwproc] Recv'd Img size: 115032 bytes
27,398,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,475,982 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,592,149 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,139,218 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,471 writing to cptra_bootfsm_go
3,760,724 ready_for_fw is high
3,761,292 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,971,675 >>> mbox cmd response: success
19,230,147 UART:
19,230,535 UART: Running Caliptra FMC ...
19,231,685 UART:
19,231,867 UART: [state] CFI Enabled
19,239,868 UART: [fht] FMC Alias Private Key: 7
20,996,293 UART: [art] Extend RT PCRs Done
20,997,517 UART: [art] Lock RT PCRs Done
20,999,281 UART: [art] Populate DV Done
21,004,707 UART: [fht] FMC Alias Private Key: 7
21,006,309 UART: [art] Derive CDI
21,007,130 UART: [art] Store in in slot 0x4
21,049,902 UART: [art] Derive Key Pair
21,050,946 UART: [art] Store priv key in slot 0x5
23,477,693 UART: [art] Derive Key Pair - Done
23,490,425 UART: [art] Signing Cert with AUTHO
23,491,727 UART: RITY.KEYID = 7
25,197,403 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,915 UART: [art] PUB.X = 6B284F15A990A9EBD92D564CEBE880A407BC55A8D774F834A2AA7A6CC6FCD4FFF2694B759998A6FD2169B29036BD28AA
25,206,176 UART: [art] PUB.Y = 40CCF8A97449D168226EEF617A532BD8417AB8D5865526BFAC8434ADA9D7F0030FEB9E1F571A053D5D17FC3AE5004B2B
25,213,399 UART: [art] SIG.R = 256D6B2138880EA10B738E0A12B159B1437777FC68B5DB8DE9B23A93349ECEA0CA967F6B812259191A8CF21FE95D5735
25,220,801 UART: [art] SIG.S = 99355ECB342DA365ADD2DAB95F5B49CB355C6876B5693C7FA7A83F571BD815B2E17C69F1FF7A089922B294ED6D7D24ED
26,200,054 UART: Caliptra RT
26,200,773 UART: [state] CFI Enabled
26,317,419 UART: [rt] RT listening for mailbox commands...
26,319,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,349,053 UART: [rt]cmd =0x46504c54, len=4
26,350,629 >>> mbox cmd response data (8 bytes)
26,351,675 UART: [rt] FIPS self test
26,352,622 UART: [kat] ++
26,353,074 UART: [kat] sha1
26,357,504 UART: [kat] SHA2-256
26,359,111 UART: Fatal Error: 0x90010002
26,394,554 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,538,962 >>> mbox cmd response: failed
26,539,567 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,684,036 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
16,987,660 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,191,879 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,654 UART: [state] LifecycleState = Unprovisioned
86,309 UART: [state] DebugLocked = No
86,865 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,379 UART: [kat] SHA2-256
882,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,425 UART: [kat] ++
886,577 UART: [kat] sha1
890,699 UART: [kat] SHA2-256
892,637 UART: [kat] SHA2-384
895,476 UART: [kat] SHA2-512-ACC
897,377 UART: [kat] ECC-384
902,812 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,323 UART: [cold-reset] ++
1,476,835 UART: [fht] Storing FHT @ 0x50003400
1,479,688 UART: [idev] ++
1,479,856 UART: [idev] CDI.KEYID = 6
1,480,216 UART: [idev] SUBJECT.KEYID = 7
1,480,640 UART: [idev] UDS.KEYID = 0
1,480,985 ready_for_fw is high
1,480,985 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,566 UART: [idev] Erasing UDS.KEYID = 0
1,504,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,654 UART: [idev] --
1,514,581 UART: [ldev] ++
1,514,749 UART: [ldev] CDI.KEYID = 6
1,515,112 UART: [ldev] SUBJECT.KEYID = 5
1,515,538 UART: [ldev] AUTHORITY.KEYID = 7
1,516,001 UART: [ldev] FE.KEYID = 1
1,520,795 UART: [ldev] Erasing FE.KEYID = 1
1,545,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,066 UART: [ldev] --
1,585,445 UART: [fwproc] Waiting for Commands...
1,586,144 UART: [fwproc] Received command 0x46574c44
1,586,935 UART: [fwproc] Received Image of size 115032 bytes
2,891,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,019 >>> mbox cmd response: success
3,087,137 UART: [afmc] ++
3,087,305 UART: [afmc] CDI.KEYID = 6
3,087,667 UART: [afmc] SUBJECT.KEYID = 7
3,088,092 UART: [afmc] AUTHORITY.KEYID = 5
3,123,261 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,499 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,279 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,892 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,582 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,429 UART: [afmc] --
3,166,525 UART: [cold-reset] --
3,167,237 UART: [state] Locking Datavault
3,168,426 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,030 UART: [state] Locking ICCM
3,169,660 UART: [exit] Launching FMC @ 0x40000130
3,174,989 UART:
3,175,005 UART: Running Caliptra FMC ...
3,175,413 UART:
3,175,467 UART: [state] CFI Enabled
3,186,262 UART: [fht] FMC Alias Private Key: 7
3,294,449 UART: [art] Extend RT PCRs Done
3,294,877 UART: [art] Lock RT PCRs Done
3,296,649 UART: [art] Populate DV Done
3,304,634 UART: [fht] FMC Alias Private Key: 7
3,305,662 UART: [art] Derive CDI
3,305,942 UART: [art] Store in in slot 0x4
3,391,535 UART: [art] Derive Key Pair
3,391,895 UART: [art] Store priv key in slot 0x5
3,405,869 UART: [art] Derive Key Pair - Done
3,420,670 UART: [art] Signing Cert with AUTHO
3,421,150 UART: RITY.KEYID = 7
3,436,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,137 UART: [art] PUB.X = 6A96A68D3B10D884E3142DEE88E21DCAB8D9D6DBC448D913FB4D5A75C8F50806A20F93DA10A34274BAED63B114ABD0E7
3,443,916 UART: [art] PUB.Y = E81D13550B2BE3077BF44A9D2DC464F2AD54C7575B60F7628F59092DC4B397545A5500EB26D7F5AAA839D4977F925121
3,450,835 UART: [art] SIG.R = D5B9FB1CE1A4C86B6B5C48448B5FAE52AD95D1FF70A219A247DAF8F00FB1FCCD267FCD2FC10C3BFFDB58A0F32BA433CE
3,457,635 UART: [art] SIG.S = 6E0CDCABEF947705E367C0E980693035533C202B40AF52B408F2AEF737F294C1674A8FEC35271CE815AB0735AA120AC4
3,481,185 UART: Caliptra RT
3,481,438 UART: [state] CFI Enabled
3,589,195 UART: [rt] RT listening for mailbox commands...
3,589,858 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,427 UART: [rt]cmd =0x46504c54, len=4
3,620,581 >>> mbox cmd response data (8 bytes)
3,620,718 UART: [rt] FIPS self test
3,621,046 UART: [kat] ++
3,621,198 UART: [kat] sha1
3,625,254 UART: [kat] SHA2-256
3,627,186 UART: Fatal Error: 0x90010002
3,628,725 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,628,730 >>> mbox cmd response: failed
3,628,730 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,628,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,867 UART: [kat] SHA2-256
881,798 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,913 UART: [kat] ++
886,065 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
895,060 UART: [kat] SHA2-512-ACC
896,961 UART: [kat] ECC-384
902,300 UART: [kat] HMAC-384Kdf
906,882 UART: [kat] LMS
1,475,078 UART: [kat] --
1,475,919 UART: [cold-reset] ++
1,476,317 UART: [fht] Storing FHT @ 0x50003400
1,479,162 UART: [idev] ++
1,479,330 UART: [idev] CDI.KEYID = 6
1,479,690 UART: [idev] SUBJECT.KEYID = 7
1,480,114 UART: [idev] UDS.KEYID = 0
1,480,459 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,487,886 UART: [idev] Erasing UDS.KEYID = 0
1,504,176 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,776 UART: [idev] --
1,513,751 UART: [ldev] ++
1,513,919 UART: [ldev] CDI.KEYID = 6
1,514,282 UART: [ldev] SUBJECT.KEYID = 5
1,514,708 UART: [ldev] AUTHORITY.KEYID = 7
1,515,171 UART: [ldev] FE.KEYID = 1
1,520,473 UART: [ldev] Erasing FE.KEYID = 1
1,545,584 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,430 UART: [ldev] --
1,584,815 UART: [fwproc] Waiting for Commands...
1,585,622 UART: [fwproc] Received command 0x46574c44
1,586,413 UART: [fwproc] Received Image of size 115032 bytes
2,892,248 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,278 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,263 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 ready_for_fw is high
1,362,391 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,497 >>> mbox cmd response: success
2,997,361 UART:
2,997,377 UART: Running Caliptra FMC ...
2,997,785 UART:
2,997,839 UART: [state] CFI Enabled
3,008,608 UART: [fht] FMC Alias Private Key: 7
3,116,083 UART: [art] Extend RT PCRs Done
3,116,511 UART: [art] Lock RT PCRs Done
3,118,159 UART: [art] Populate DV Done
3,126,300 UART: [fht] FMC Alias Private Key: 7
3,127,236 UART: [art] Derive CDI
3,127,516 UART: [art] Store in in slot 0x4
3,213,383 UART: [art] Derive Key Pair
3,213,743 UART: [art] Store priv key in slot 0x5
3,227,213 UART: [art] Derive Key Pair - Done
3,241,979 UART: [art] Signing Cert with AUTHO
3,242,459 UART: RITY.KEYID = 7
3,257,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,786 UART: [art] PUB.X = 20CB6F35D6E90832BB546A38ADCB48FBE6D05A5DA2C83860004F1C1DE1978EFB7C9651B21BE64E7941D313E898AA5D3A
3,264,545 UART: [art] PUB.Y = 18E9F0972A04F13E04BF767DCD265C9583EE1C804B78C9B4C301748C035DCEB6382470927DAF08D192467F9C406EB234
3,271,480 UART: [art] SIG.R = 4F53725E27CA0E117D5DBC3CA79280B53C36B71750E36E61908170F11F0ED4508B0CDB19CC4FF61128B8392A4CC62A58
3,278,245 UART: [art] SIG.S = 86D9102CAE0E29BF79236C5735378323B8A391C9A2265F8D15D95157FBC39AC35FB4227FCAC66C3FB411F278EC1ED42F
3,301,997 UART: Caliptra RT
3,302,250 UART: [state] CFI Enabled
3,410,117 UART: [rt] RT listening for mailbox commands...
3,410,780 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,521 UART: [rt]cmd =0x46504c54, len=4
3,441,761 >>> mbox cmd response data (8 bytes)
3,442,046 UART: [rt] FIPS self test
3,442,374 UART: [kat] ++
3,442,526 UART: [kat] sha1
3,446,678 UART: [kat] SHA2-256
3,448,744 UART: Fatal Error: 0x90010002
3,450,283 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,450,288 >>> mbox cmd response: failed
3,450,288 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,450,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,733 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,937 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,676 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,631 UART: [kat] SHA2-512-ACC
897,532 UART: [kat] ECC-384
903,219 UART: [kat] HMAC-384Kdf
907,955 UART: [kat] LMS
1,476,151 UART: [kat] --
1,476,910 UART: [cold-reset] ++
1,477,316 UART: [fht] Storing FHT @ 0x50003400
1,480,097 UART: [idev] ++
1,480,265 UART: [idev] CDI.KEYID = 6
1,480,625 UART: [idev] SUBJECT.KEYID = 7
1,481,049 UART: [idev] UDS.KEYID = 0
1,481,394 ready_for_fw is high
1,481,394 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,459 UART: [idev] Erasing UDS.KEYID = 0
1,506,655 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,457 UART: [idev] --
1,516,468 UART: [ldev] ++
1,516,636 UART: [ldev] CDI.KEYID = 6
1,516,999 UART: [ldev] SUBJECT.KEYID = 5
1,517,425 UART: [ldev] AUTHORITY.KEYID = 7
1,517,888 UART: [ldev] FE.KEYID = 1
1,523,340 UART: [ldev] Erasing FE.KEYID = 1
1,548,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,479 UART: [ldev] --
1,587,982 UART: [fwproc] Waiting for Commands...
1,588,709 UART: [fwproc] Received command 0x46574c44
1,589,500 UART: [fwproc] Received Image of size 115032 bytes
2,894,655 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,073 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,446 >>> mbox cmd response: success
3,089,650 UART: [afmc] ++
3,089,818 UART: [afmc] CDI.KEYID = 6
3,090,180 UART: [afmc] SUBJECT.KEYID = 7
3,090,605 UART: [afmc] AUTHORITY.KEYID = 5
3,125,836 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,142,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,898 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,626 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,154,511 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,160,201 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,168,014 UART: [afmc] --
3,168,984 UART: [cold-reset] --
3,169,964 UART: [state] Locking Datavault
3,171,073 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,677 UART: [state] Locking ICCM
3,172,117 UART: [exit] Launching FMC @ 0x40000130
3,177,446 UART:
3,177,462 UART: Running Caliptra FMC ...
3,177,870 UART:
3,178,013 UART: [state] CFI Enabled
3,188,610 UART: [fht] FMC Alias Private Key: 7
3,296,329 UART: [art] Extend RT PCRs Done
3,296,757 UART: [art] Lock RT PCRs Done
3,298,329 UART: [art] Populate DV Done
3,306,752 UART: [fht] FMC Alias Private Key: 7
3,307,852 UART: [art] Derive CDI
3,308,132 UART: [art] Store in in slot 0x4
3,393,433 UART: [art] Derive Key Pair
3,393,793 UART: [art] Store priv key in slot 0x5
3,406,855 UART: [art] Derive Key Pair - Done
3,421,811 UART: [art] Signing Cert with AUTHO
3,422,291 UART: RITY.KEYID = 7
3,437,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,438,490 UART: [art] PUB.X = 12EC0AF136AE47573044DA73EC9B3DE5D543BA0026606D0770EADE7B484BDBC9ECD436663E6E518E012D8F924AFDF30C
3,445,242 UART: [art] PUB.Y = A4C96B5B0530EC110CEBDDC392FEC97914A03771E251EC2B44470395C77877F1F875DB5C1BCF10A3066E8F5590DFAC16
3,452,190 UART: [art] SIG.R = 17E7FB624CF4CB530BC1AAF344BDD560B8A43AC37584B57428E5F41F4DE820DD4EFBFA1208BE407CB1A44483EE020C9D
3,458,968 UART: [art] SIG.S = E0EBD8369439E6BAC0B536EA72D682DF543A5C186E006100A0C414FE54B0ABA3C412BFB0BD078371D46A88260D1B9F23
3,483,731 UART: Caliptra RT
3,484,076 UART: [state] CFI Enabled
3,593,603 UART: [rt] RT listening for mailbox commands...
3,594,266 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,953 UART: [rt]cmd =0x46504c54, len=4
3,625,027 >>> mbox cmd response data (8 bytes)
3,625,266 UART: [rt] FIPS self test
3,625,594 UART: [kat] ++
3,625,746 UART: [kat] sha1
3,629,950 UART: [kat] SHA2-256
3,631,842 UART: Fatal Error: 0x90010002
3,633,381 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,633,386 >>> mbox cmd response: failed
3,633,386 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,633,391 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,682 UART: [kat] SHA2-256
892,620 UART: [kat] SHA2-384
895,415 UART: [kat] SHA2-512-ACC
897,316 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,693 UART: [kat] LMS
1,475,889 UART: [kat] --
1,476,860 UART: [cold-reset] ++
1,477,304 UART: [fht] Storing FHT @ 0x50003400
1,480,227 UART: [idev] ++
1,480,395 UART: [idev] CDI.KEYID = 6
1,480,755 UART: [idev] SUBJECT.KEYID = 7
1,481,179 UART: [idev] UDS.KEYID = 0
1,481,524 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,439 UART: [idev] Erasing UDS.KEYID = 0
1,505,843 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,415 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,522,572 UART: [ldev] Erasing FE.KEYID = 1
1,547,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,517 UART: [ldev] --
1,586,800 UART: [fwproc] Waiting for Commands...
1,587,447 UART: [fwproc] Received command 0x46574c44
1,588,238 UART: [fwproc] Received Image of size 115032 bytes
2,893,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,933 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,308 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 ready_for_fw is high
1,362,908 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,606 >>> mbox cmd response: success
2,999,126 UART:
2,999,142 UART: Running Caliptra FMC ...
2,999,550 UART:
2,999,693 UART: [state] CFI Enabled
3,010,570 UART: [fht] FMC Alias Private Key: 7
3,118,621 UART: [art] Extend RT PCRs Done
3,119,049 UART: [art] Lock RT PCRs Done
3,120,663 UART: [art] Populate DV Done
3,128,924 UART: [fht] FMC Alias Private Key: 7
3,129,912 UART: [art] Derive CDI
3,130,192 UART: [art] Store in in slot 0x4
3,216,209 UART: [art] Derive Key Pair
3,216,569 UART: [art] Store priv key in slot 0x5
3,230,253 UART: [art] Derive Key Pair - Done
3,245,159 UART: [art] Signing Cert with AUTHO
3,245,639 UART: RITY.KEYID = 7
3,260,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,452 UART: [art] PUB.X = A8C4FDBDDEA7E2BEEB6F3592A48641869EE3D955E7964F7B76244646848A2FE3B916A6310B71EF543DF9C7A92EA47797
3,268,229 UART: [art] PUB.Y = C9DB4CCEB0949242D985BDDB80F00B11FEF1A04C9627FFE5BEE87876BC86CF18AE68B81FF20340A947996FCAB9568EEC
3,275,195 UART: [art] SIG.R = 3EBAA35D6A03D336B215EE5488D9329BA7925085468710FE75D566C9820CAF2C7AFA87B15BDCBF260979D9CCB6542643
3,281,962 UART: [art] SIG.S = 50CDA6CA6F4B625D04B65DE771EC80E4B155B6DFB8C21D066F3A1563044D33A1FAF34E853715A45F16265A365998C782
3,305,788 UART: Caliptra RT
3,306,133 UART: [state] CFI Enabled
3,415,767 UART: [rt] RT listening for mailbox commands...
3,416,430 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,313 UART: [rt]cmd =0x46504c54, len=4
3,447,343 >>> mbox cmd response data (8 bytes)
3,447,562 UART: [rt] FIPS self test
3,447,890 UART: [kat] ++
3,448,042 UART: [kat] sha1
3,452,108 UART: [kat] SHA2-256
3,454,190 UART: Fatal Error: 0x90010002
3,455,729 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,455,734 >>> mbox cmd response: failed
3,455,734 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,455,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,078 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,294 UART: [kat] SHA2-512-ACC
908,195 UART: [kat] ECC-384
918,170 UART: [kat] HMAC-384Kdf
922,718 UART: [kat] LMS
1,171,046 UART: [kat] --
1,172,159 UART: [cold-reset] ++
1,172,625 UART: [fht] FHT @ 0x50003400
1,175,470 UART: [idev] ++
1,175,638 UART: [idev] CDI.KEYID = 6
1,175,998 UART: [idev] SUBJECT.KEYID = 7
1,176,422 UART: [idev] UDS.KEYID = 0
1,176,767 ready_for_fw is high
1,176,767 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,238 UART: [idev] Erasing UDS.KEYID = 0
1,201,625 UART: [idev] Sha1 KeyId Algorithm
1,210,057 UART: [idev] --
1,211,137 UART: [ldev] ++
1,211,305 UART: [ldev] CDI.KEYID = 6
1,211,668 UART: [ldev] SUBJECT.KEYID = 5
1,212,094 UART: [ldev] AUTHORITY.KEYID = 7
1,212,557 UART: [ldev] FE.KEYID = 1
1,217,645 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,337 UART: [ldev] --
1,282,658 UART: [fwproc] Wait for Commands...
1,283,302 UART: [fwproc] Recv command 0x46574c44
1,284,030 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,961 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,265 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,052 >>> mbox cmd response: success
2,783,204 UART: [afmc] ++
2,783,372 UART: [afmc] CDI.KEYID = 6
2,783,734 UART: [afmc] SUBJECT.KEYID = 7
2,784,159 UART: [afmc] AUTHORITY.KEYID = 5
2,819,756 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,653 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,381 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,266 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,985 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,781 UART: [afmc] --
2,862,873 UART: [cold-reset] --
2,863,527 UART: [state] Locking Datavault
2,864,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,274 UART: [state] Locking ICCM
2,865,878 UART: [exit] Launching FMC @ 0x40000130
2,871,207 UART:
2,871,223 UART: Running Caliptra FMC ...
2,871,631 UART:
2,871,685 UART: [state] CFI Enabled
2,882,074 UART: [fht] FMC Alias Private Key: 7
2,989,833 UART: [art] Extend RT PCRs Done
2,990,261 UART: [art] Lock RT PCRs Done
2,991,823 UART: [art] Populate DV Done
3,000,130 UART: [fht] FMC Alias Private Key: 7
3,001,086 UART: [art] Derive CDI
3,001,366 UART: [art] Store in in slot 0x4
3,086,881 UART: [art] Derive Key Pair
3,087,241 UART: [art] Store priv key in slot 0x5
3,100,669 UART: [art] Derive Key Pair - Done
3,115,395 UART: [art] Signing Cert with AUTHO
3,115,875 UART: RITY.KEYID = 7
3,131,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,792 UART: [art] PUB.X = E08D200EEC3E174F1A65977F89FE0D46E7A8FBDDE7841DA0ACB211EBA555103BCD7B2CFDB6FD9856E4F31BBFD60D26AC
3,138,583 UART: [art] PUB.Y = DE8A5C02B1CF2AFEF0B0D1FD2202A2FBA4F8B6E860053F04A09D7A71E4B177944636CC8F1AD1471E5489DACD01CA155B
3,145,538 UART: [art] SIG.R = 380895675F1BC572C489671B711E44515E26FBD96A688B3A567C6694806F491A5C6CD7F8BFFA970FA831DC2C15597237
3,152,298 UART: [art] SIG.S = 0256605B130BC26E01891F2DB44EE49B8C4014A09D014F5EE5F13FA3EEB05F31AB6A51D08DFF4684902F07B598FE6A5C
3,176,060 UART: Caliptra RT
3,176,313 UART: [state] CFI Enabled
3,284,146 UART: [rt] RT listening for mailbox commands...
3,284,809 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,780 UART: [rt]cmd =0x46504c54, len=4
3,315,838 >>> mbox cmd response data (8 bytes)
3,316,095 UART: [rt] FIPS self test
3,316,423 UART: [kat] ++
3,316,575 UART: [kat] sha1
3,320,589 UART: [kat] SHA2-256
3,322,597 UART: Fatal Error: 0x90010002
3,324,136 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,141 >>> mbox cmd response: failed
3,324,141 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,146 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,546 UART: [state] LifecycleState = Unprovisioned
85,201 UART: [state] DebugLocked = No
85,711 UART: [state] WD Timer not started. Device not locked for debugging
87,062 UART: [kat] SHA2-256
892,712 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,837 UART: [kat] ++
896,989 UART: [kat] sha1
901,177 UART: [kat] SHA2-256
903,117 UART: [kat] SHA2-384
905,858 UART: [kat] SHA2-512-ACC
907,759 UART: [kat] ECC-384
917,184 UART: [kat] HMAC-384Kdf
921,670 UART: [kat] LMS
1,169,998 UART: [kat] --
1,170,993 UART: [cold-reset] ++
1,171,495 UART: [fht] FHT @ 0x50003400
1,174,352 UART: [idev] ++
1,174,520 UART: [idev] CDI.KEYID = 6
1,174,880 UART: [idev] SUBJECT.KEYID = 7
1,175,304 UART: [idev] UDS.KEYID = 0
1,175,649 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,250 UART: [idev] Erasing UDS.KEYID = 0
1,200,213 UART: [idev] Sha1 KeyId Algorithm
1,208,803 UART: [idev] --
1,209,861 UART: [ldev] ++
1,210,029 UART: [ldev] CDI.KEYID = 6
1,210,392 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,777 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,285 UART: [ldev] --
1,282,690 UART: [fwproc] Wait for Commands...
1,283,264 UART: [fwproc] Recv command 0x46574c44
1,283,992 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,767 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,071 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,966 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,703 ready_for_fw is high
1,060,703 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,761 >>> mbox cmd response: success
2,697,727 UART:
2,697,743 UART: Running Caliptra FMC ...
2,698,151 UART:
2,698,205 UART: [state] CFI Enabled
2,709,136 UART: [fht] FMC Alias Private Key: 7
2,817,337 UART: [art] Extend RT PCRs Done
2,817,765 UART: [art] Lock RT PCRs Done
2,819,293 UART: [art] Populate DV Done
2,827,260 UART: [fht] FMC Alias Private Key: 7
2,828,334 UART: [art] Derive CDI
2,828,614 UART: [art] Store in in slot 0x4
2,913,873 UART: [art] Derive Key Pair
2,914,233 UART: [art] Store priv key in slot 0x5
2,927,455 UART: [art] Derive Key Pair - Done
2,941,856 UART: [art] Signing Cert with AUTHO
2,942,336 UART: RITY.KEYID = 7
2,957,254 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,019 UART: [art] PUB.X = C0F80F96575EC0845FE558028611CF0C7F35740BDF42FD5DB938700E8913143CF51F9F20075F1DF9AE5A2366C5BE34D6
2,964,775 UART: [art] PUB.Y = 45D610E1A5E07C287C6E489BF8760578EF275590B4CDA5DF2B6EBF98D56B6D60F3BD29D02F26F430AC092842BD0E35E0
2,971,726 UART: [art] SIG.R = 7B75DED9B4FC3270D87C2287388A7FAB2E99B87C0DCD2D8B82ACB9830073EA8B63FB0C4B6A86F74BC5B6B724CC277FB4
2,978,488 UART: [art] SIG.S = BED4D7D4089E2C53712A0E777342F4C2F25B5E69CE7CD312AAE41ED3BD230B4BA25879C197CD5CC4A3670430D160BD9A
3,002,129 UART: Caliptra RT
3,002,382 UART: [state] CFI Enabled
3,109,661 UART: [rt] RT listening for mailbox commands...
3,110,324 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,947 UART: [rt]cmd =0x46504c54, len=4
3,141,055 >>> mbox cmd response data (8 bytes)
3,141,212 UART: [rt] FIPS self test
3,141,540 UART: [kat] ++
3,141,692 UART: [kat] sha1
3,145,912 UART: [kat] SHA2-256
3,148,044 UART: Fatal Error: 0x90010002
3,149,583 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,588 >>> mbox cmd response: failed
3,149,588 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,693 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,003 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,256 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
893,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,242 UART: [kat] ++
897,394 UART: [kat] sha1
901,586 UART: [kat] SHA2-256
903,526 UART: [kat] SHA2-384
906,323 UART: [kat] SHA2-512-ACC
908,224 UART: [kat] ECC-384
918,059 UART: [kat] HMAC-384Kdf
922,709 UART: [kat] LMS
1,171,037 UART: [kat] --
1,171,696 UART: [cold-reset] ++
1,172,188 UART: [fht] FHT @ 0x50003400
1,174,711 UART: [idev] ++
1,174,879 UART: [idev] CDI.KEYID = 6
1,175,239 UART: [idev] SUBJECT.KEYID = 7
1,175,663 UART: [idev] UDS.KEYID = 0
1,176,008 ready_for_fw is high
1,176,008 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,789 UART: [idev] Erasing UDS.KEYID = 0
1,200,650 UART: [idev] Sha1 KeyId Algorithm
1,209,108 UART: [idev] --
1,210,290 UART: [ldev] ++
1,210,458 UART: [ldev] CDI.KEYID = 6
1,210,821 UART: [ldev] SUBJECT.KEYID = 5
1,211,247 UART: [ldev] AUTHORITY.KEYID = 7
1,211,710 UART: [ldev] FE.KEYID = 1
1,216,902 UART: [ldev] Erasing FE.KEYID = 1
1,242,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,978 UART: [ldev] --
1,282,451 UART: [fwproc] Wait for Commands...
1,283,093 UART: [fwproc] Recv command 0x46574c44
1,283,821 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,572 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,876 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,787 >>> mbox cmd response: success
2,784,049 UART: [afmc] ++
2,784,217 UART: [afmc] CDI.KEYID = 6
2,784,579 UART: [afmc] SUBJECT.KEYID = 7
2,785,004 UART: [afmc] AUTHORITY.KEYID = 5
2,819,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,018 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,631 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,350 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,068 UART: [afmc] --
2,862,966 UART: [cold-reset] --
2,863,544 UART: [state] Locking Datavault
2,864,721 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,325 UART: [state] Locking ICCM
2,865,833 UART: [exit] Launching FMC @ 0x40000130
2,871,162 UART:
2,871,178 UART: Running Caliptra FMC ...
2,871,586 UART:
2,871,729 UART: [state] CFI Enabled
2,882,232 UART: [fht] FMC Alias Private Key: 7
2,989,923 UART: [art] Extend RT PCRs Done
2,990,351 UART: [art] Lock RT PCRs Done
2,991,761 UART: [art] Populate DV Done
2,999,822 UART: [fht] FMC Alias Private Key: 7
3,000,906 UART: [art] Derive CDI
3,001,186 UART: [art] Store in in slot 0x4
3,086,693 UART: [art] Derive Key Pair
3,087,053 UART: [art] Store priv key in slot 0x5
3,100,249 UART: [art] Derive Key Pair - Done
3,114,837 UART: [art] Signing Cert with AUTHO
3,115,317 UART: RITY.KEYID = 7
3,130,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,400 UART: [art] PUB.X = A378D6439236AA42CF04A6F2F225C67149D0C649CDCC4A3728E918250594C59999939B3A73D27E7DF8F095B347D32906
3,138,155 UART: [art] PUB.Y = E59F99039558E09E2EE7655D412E73AE92D21E4B048640D8B4FE4645DD58901AE9D5C7012B14E5CD07CE3431D3CF24E1
3,145,097 UART: [art] SIG.R = 803CAB7C56AD8F0DE789F3624875FC41B4AD9663A8C09BC20855E0151232EA9DB1DB81387B31A02D6B2DA78112820741
3,151,860 UART: [art] SIG.S = BD6905F5B641F50373C765415A037CFEB64F988D2E9EB83EC02CDEE8C4E095A5F5B4FC60C91C1DB8EB608457B4495F89
3,175,780 UART: Caliptra RT
3,176,125 UART: [state] CFI Enabled
3,283,983 UART: [rt] RT listening for mailbox commands...
3,284,646 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,325 UART: [rt]cmd =0x46504c54, len=4
3,315,527 >>> mbox cmd response data (8 bytes)
3,315,656 UART: [rt] FIPS self test
3,315,984 UART: [kat] ++
3,316,136 UART: [kat] sha1
3,320,350 UART: [kat] SHA2-256
3,322,268 UART: Fatal Error: 0x90010002
3,323,807 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,323,812 >>> mbox cmd response: failed
3,323,812 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,323,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,348 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
893,223 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,348 UART: [kat] ++
897,500 UART: [kat] sha1
901,892 UART: [kat] SHA2-256
903,832 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
918,139 UART: [kat] HMAC-384Kdf
922,861 UART: [kat] LMS
1,171,189 UART: [kat] --
1,172,028 UART: [cold-reset] ++
1,172,512 UART: [fht] FHT @ 0x50003400
1,175,163 UART: [idev] ++
1,175,331 UART: [idev] CDI.KEYID = 6
1,175,691 UART: [idev] SUBJECT.KEYID = 7
1,176,115 UART: [idev] UDS.KEYID = 0
1,176,460 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,099 UART: [idev] Erasing UDS.KEYID = 0
1,201,026 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,578 UART: [ldev] ++
1,210,746 UART: [ldev] CDI.KEYID = 6
1,211,109 UART: [ldev] SUBJECT.KEYID = 5
1,211,535 UART: [ldev] AUTHORITY.KEYID = 7
1,211,998 UART: [ldev] FE.KEYID = 1
1,217,520 UART: [ldev] Erasing FE.KEYID = 1
1,243,835 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,844 UART: [ldev] --
1,283,181 UART: [fwproc] Wait for Commands...
1,283,769 UART: [fwproc] Recv command 0x46574c44
1,284,497 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,144 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,448 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,327 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,276 ready_for_fw is high
1,060,276 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,320 >>> mbox cmd response: success
2,696,430 UART:
2,696,446 UART: Running Caliptra FMC ...
2,696,854 UART:
2,696,997 UART: [state] CFI Enabled
2,707,550 UART: [fht] FMC Alias Private Key: 7
2,815,653 UART: [art] Extend RT PCRs Done
2,816,081 UART: [art] Lock RT PCRs Done
2,817,635 UART: [art] Populate DV Done
2,825,832 UART: [fht] FMC Alias Private Key: 7
2,826,766 UART: [art] Derive CDI
2,827,046 UART: [art] Store in in slot 0x4
2,912,573 UART: [art] Derive Key Pair
2,912,933 UART: [art] Store priv key in slot 0x5
2,926,551 UART: [art] Derive Key Pair - Done
2,941,442 UART: [art] Signing Cert with AUTHO
2,941,922 UART: RITY.KEYID = 7
2,957,042 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,807 UART: [art] PUB.X = CFED8510EFD9D79EA0EF1B86BEBD2E2E39C640D717202A23226B88B07DCD63E0AB831CE1668EE478A71FD2DBC7F2556F
2,964,599 UART: [art] PUB.Y = D03CDC28C1CE88D7DC50474C02CBCAA1478AF135D72136195A1127C021A4E587E0677A0E612D228F1E45C7DE5308CB77
2,971,546 UART: [art] SIG.R = 801CEFF84C1D8C20865150B233C9EB3B25516232CEC76BA036E974AAC4EB5D20F79F7AF83D1195C0C530C83AD71BCF1A
2,978,330 UART: [art] SIG.S = 9BE1C95D4B6BFAC158163202073C9EF645D14636D18DE698AC4A14DDAFFE4DC3DB7AFBF45F9AB2214A96CDFC47204179
3,001,719 UART: Caliptra RT
3,002,064 UART: [state] CFI Enabled
3,109,440 UART: [rt] RT listening for mailbox commands...
3,110,103 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,090 UART: [rt]cmd =0x46504c54, len=4
3,141,258 >>> mbox cmd response data (8 bytes)
3,141,437 UART: [rt] FIPS self test
3,141,765 UART: [kat] ++
3,141,917 UART: [kat] sha1
3,146,163 UART: [kat] SHA2-256
3,148,299 UART: Fatal Error: 0x90010002
3,149,838 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,843 >>> mbox cmd response: failed
3,149,843 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,848 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,316 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,616 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,829 UART: [kat] SHA2-256
901,769 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,584 UART: [kat] LMS
1,168,896 UART: [kat] --
1,169,793 UART: [cold-reset] ++
1,170,159 UART: [fht] FHT @ 0x50003400
1,172,799 UART: [idev] ++
1,172,967 UART: [idev] CDI.KEYID = 6
1,173,328 UART: [idev] SUBJECT.KEYID = 7
1,173,753 UART: [idev] UDS.KEYID = 0
1,174,099 ready_for_fw is high
1,174,099 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,939 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,082 UART: [ldev] --
1,280,600 UART: [fwproc] Wait for Commands...
1,281,347 UART: [fwproc] Recv command 0x46574c44
1,282,080 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,271 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,642,580 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,779,526 >>> mbox cmd response: success
2,780,643 UART: [afmc] ++
2,780,811 UART: [afmc] CDI.KEYID = 6
2,781,174 UART: [afmc] SUBJECT.KEYID = 7
2,781,600 UART: [afmc] AUTHORITY.KEYID = 5
2,816,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,058 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,838,787 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,844,670 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,850,389 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,858,170 UART: [afmc] --
2,859,072 UART: [cold-reset] --
2,860,052 UART: [state] Locking Datavault
2,861,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,041 UART: [state] Locking ICCM
2,862,567 UART: [exit] Launching FMC @ 0x40000130
2,867,896 UART:
2,867,912 UART: Running Caliptra FMC ...
2,868,320 UART:
2,868,374 UART: [state] CFI Enabled
2,878,525 UART: [fht] FMC Alias Private Key: 7
2,987,498 UART: [art] Extend RT PCRs Done
2,987,926 UART: [art] Lock RT PCRs Done
2,989,420 UART: [art] Populate DV Done
2,997,803 UART: [fht] FMC Alias Private Key: 7
2,998,755 UART: [art] Derive CDI
2,999,035 UART: [art] Store in in slot 0x4
3,084,744 UART: [art] Derive Key Pair
3,085,104 UART: [art] Store priv key in slot 0x5
3,098,436 UART: [art] Derive Key Pair - Done
3,113,296 UART: [art] Signing Cert with AUTHO
3,113,776 UART: RITY.KEYID = 7
3,128,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,281 UART: [art] PUB.X = ED51067A6F5023FD3447F222156DF34578B0A7337E29FF7BF1764E1A6863B23B33673F8DA95B51DE7EE83FA6CB2C4F6F
3,136,056 UART: [art] PUB.Y = CBC1F6F05FFC1CA248D92335D36F1FD66B6171DAA21697E9C773D2E6651A353408427E27663A0139EE6CA4B339251361
3,143,000 UART: [art] SIG.R = 06F26B981464D3EAD63AB4C240B26F362F07C6CD5891B78AF318388C80CEE882DA428F29EBFC3A06B5F6A611E0685B65
3,149,769 UART: [art] SIG.S = DA99A63D784025158EDC6DA14027B6F59BF715C3ED2486D5335C93C90C63E26226A5E637CA1EAAC69286FD52088A0CF6
3,173,439 UART: Caliptra RT
3,173,692 UART: [state] CFI Enabled
3,281,391 UART: [rt] RT listening for mailbox commands...
3,282,054 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,041 UART: [rt]cmd =0x46504c54, len=4
3,313,227 >>> mbox cmd response data (8 bytes)
3,313,398 UART: [rt] FIPS self test
3,313,726 UART: [kat] ++
3,313,878 UART: [kat] sha1
3,318,142 UART: [kat] SHA2-256
3,320,266 UART: Fatal Error: 0x90010002
3,321,805 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,321,810 >>> mbox cmd response: failed
3,321,810 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,321,815 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,100 UART: [kat] HMAC-384Kdf
920,706 UART: [kat] LMS
1,169,018 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,174,299 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,673 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,906 UART: [ldev] ++
1,209,074 UART: [ldev] CDI.KEYID = 6
1,209,438 UART: [ldev] SUBJECT.KEYID = 5
1,209,865 UART: [ldev] AUTHORITY.KEYID = 7
1,210,328 UART: [ldev] FE.KEYID = 1
1,215,636 UART: [ldev] Erasing FE.KEYID = 1
1,241,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,790 UART: [ldev] --
1,281,060 UART: [fwproc] Wait for Commands...
1,281,757 UART: [fwproc] Recv command 0x46574c44
1,282,490 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,653 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,962 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,756 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,380 ready_for_fw is high
1,056,380 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,358 >>> mbox cmd response: success
2,690,206 UART:
2,690,222 UART: Running Caliptra FMC ...
2,690,630 UART:
2,690,684 UART: [state] CFI Enabled
2,701,463 UART: [fht] FMC Alias Private Key: 7
2,809,472 UART: [art] Extend RT PCRs Done
2,809,900 UART: [art] Lock RT PCRs Done
2,811,428 UART: [art] Populate DV Done
2,819,641 UART: [fht] FMC Alias Private Key: 7
2,820,649 UART: [art] Derive CDI
2,820,929 UART: [art] Store in in slot 0x4
2,906,418 UART: [art] Derive Key Pair
2,906,778 UART: [art] Store priv key in slot 0x5
2,920,086 UART: [art] Derive Key Pair - Done
2,934,539 UART: [art] Signing Cert with AUTHO
2,935,019 UART: RITY.KEYID = 7
2,949,987 UART: [art] Erasing AUTHORITY.KEYID = 7
2,950,752 UART: [art] PUB.X = F91834633C26A64B1D1A10D22ED855D8B5929C72EBD7DD100256ACFC530E794BF67C5CF07D888D3698BB2CC01D454A53
2,957,524 UART: [art] PUB.Y = 64B71B41224AB29755D60315E69A34544AD3CB4E527424395CE13FADC10631A1D0629372C7BB8FAFAEC3594670919D8D
2,964,468 UART: [art] SIG.R = 6020B8D337A088D8898A0D73D0C9E7581C1C1DB8DF4A06EBB785D80DCF8ABB602A0C15D5F49F34BF7A7EDDF4199387B6
2,971,242 UART: [art] SIG.S = 26761DA367A81629D2477ABA04F151AB89F78451AEDB1C168D275C2C2D5E226CB7D88559AD012733028D4C290C3EE428
2,995,013 UART: Caliptra RT
2,995,266 UART: [state] CFI Enabled
3,102,423 UART: [rt] RT listening for mailbox commands...
3,103,086 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,809 UART: [rt]cmd =0x46504c54, len=4
3,133,917 >>> mbox cmd response data (8 bytes)
3,134,280 UART: [rt] FIPS self test
3,134,608 UART: [kat] ++
3,134,760 UART: [kat] sha1
3,139,100 UART: [kat] SHA2-256
3,141,224 UART: Fatal Error: 0x90010002
3,142,763 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,142,768 >>> mbox cmd response: failed
3,142,768 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,142,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,518 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,716 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,172,918 UART: [idev] ++
1,173,086 UART: [idev] CDI.KEYID = 6
1,173,447 UART: [idev] SUBJECT.KEYID = 7
1,173,872 UART: [idev] UDS.KEYID = 0
1,174,218 ready_for_fw is high
1,174,218 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,070 UART: [idev] Sha1 KeyId Algorithm
1,207,800 UART: [idev] --
1,208,839 UART: [ldev] ++
1,209,007 UART: [ldev] CDI.KEYID = 6
1,209,371 UART: [ldev] SUBJECT.KEYID = 5
1,209,798 UART: [ldev] AUTHORITY.KEYID = 7
1,210,261 UART: [ldev] FE.KEYID = 1
1,215,375 UART: [ldev] Erasing FE.KEYID = 1
1,241,820 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,903 UART: [ldev] --
1,281,375 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46574c44
1,282,741 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,266 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,575 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,397 >>> mbox cmd response: success
2,782,580 UART: [afmc] ++
2,782,748 UART: [afmc] CDI.KEYID = 6
2,783,111 UART: [afmc] SUBJECT.KEYID = 7
2,783,537 UART: [afmc] AUTHORITY.KEYID = 5
2,819,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,945 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,674 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,557 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,276 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,241 UART: [afmc] --
2,863,341 UART: [cold-reset] --
2,864,093 UART: [state] Locking Datavault
2,865,562 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,166 UART: [state] Locking ICCM
2,866,818 UART: [exit] Launching FMC @ 0x40000130
2,872,147 UART:
2,872,163 UART: Running Caliptra FMC ...
2,872,571 UART:
2,872,714 UART: [state] CFI Enabled
2,883,395 UART: [fht] FMC Alias Private Key: 7
2,991,484 UART: [art] Extend RT PCRs Done
2,991,912 UART: [art] Lock RT PCRs Done
2,993,378 UART: [art] Populate DV Done
3,001,535 UART: [fht] FMC Alias Private Key: 7
3,002,551 UART: [art] Derive CDI
3,002,831 UART: [art] Store in in slot 0x4
3,088,738 UART: [art] Derive Key Pair
3,089,098 UART: [art] Store priv key in slot 0x5
3,102,378 UART: [art] Derive Key Pair - Done
3,117,200 UART: [art] Signing Cert with AUTHO
3,117,680 UART: RITY.KEYID = 7
3,133,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,915 UART: [art] PUB.X = 67219AEBCF8A240B0C3DDA26507C2CB59E7AB87B19348B7BFEF490255727EEF331B45D3A164DFA09A196277B5A2F7441
3,140,686 UART: [art] PUB.Y = 09877649F59C247AECF983BB7E784ED8014CF269920A9DEAB374BD839962707ED36C0C252DC3CAF7FBEBFD60528F880B
3,147,633 UART: [art] SIG.R = C2ADB1BF44AF68D81A4D1384E683940978BB1244E99CD34E6B2E56FDAEB96646B9CDA6133561EE37F0F777E51C3CE308
3,154,409 UART: [art] SIG.S = D0750902551F6378AF3C4546D28B93B783D9843341B4BCCA4B10801689D803F0927E7CA5EAD40D37B9B6A1F4E4D156DB
3,177,744 UART: Caliptra RT
3,178,089 UART: [state] CFI Enabled
3,285,315 UART: [rt] RT listening for mailbox commands...
3,285,978 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,513 UART: [rt]cmd =0x46504c54, len=4
3,316,809 >>> mbox cmd response data (8 bytes)
3,316,958 UART: [rt] FIPS self test
3,317,286 UART: [kat] ++
3,317,438 UART: [kat] sha1
3,321,510 UART: [kat] SHA2-256
3,323,588 UART: Fatal Error: 0x90010002
3,325,127 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,132 >>> mbox cmd response: failed
3,325,132 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,137 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,561 UART: [kat] SHA2-512-ACC
906,462 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,244 UART: [cold-reset] ++
1,170,644 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,174,628 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,250 UART: [idev] Erasing UDS.KEYID = 0
1,199,154 UART: [idev] Sha1 KeyId Algorithm
1,208,144 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,841 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,216,055 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,875 UART: [fwproc] Wait for Commands...
1,282,580 UART: [fwproc] Recv command 0x46574c44
1,283,313 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,236 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,545 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,409 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,735 ready_for_fw is high
1,056,735 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,811 >>> mbox cmd response: success
2,694,969 UART:
2,694,985 UART: Running Caliptra FMC ...
2,695,393 UART:
2,695,536 UART: [state] CFI Enabled
2,705,855 UART: [fht] FMC Alias Private Key: 7
2,814,238 UART: [art] Extend RT PCRs Done
2,814,666 UART: [art] Lock RT PCRs Done
2,816,422 UART: [art] Populate DV Done
2,824,707 UART: [fht] FMC Alias Private Key: 7
2,825,663 UART: [art] Derive CDI
2,825,943 UART: [art] Store in in slot 0x4
2,911,890 UART: [art] Derive Key Pair
2,912,250 UART: [art] Store priv key in slot 0x5
2,925,806 UART: [art] Derive Key Pair - Done
2,940,706 UART: [art] Signing Cert with AUTHO
2,941,186 UART: RITY.KEYID = 7
2,956,374 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,139 UART: [art] PUB.X = 3855EF5B21390D389789B98E2D730A2B760C0EB73C4094D6633C0EFDC461D20A9A598ED79D6CE398197DE09F8A31D337
2,963,893 UART: [art] PUB.Y = C56E4B443C3D6FEB8B6CB3AE87809C4135BD0B288FD2CAA828F72C0E7443A95C765F46223EF2043815A5893C23176E88
2,970,838 UART: [art] SIG.R = 389C94A5B7EC4E796F02206646A416CC6F411C92A766DC63338C8750D5607F5F8A4E5ED87DCF9CCF2E04A2A3CC482BA1
2,977,612 UART: [art] SIG.S = C280C25F3587EC09A95966777271AE77AA36D7C1AF37CAF31A4137C2CA361FA9A6360CD85A37FA2C36520A709216609B
3,001,790 UART: Caliptra RT
3,002,135 UART: [state] CFI Enabled
3,110,884 UART: [rt] RT listening for mailbox commands...
3,111,547 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,516 UART: [rt]cmd =0x46504c54, len=4
3,142,656 >>> mbox cmd response data (8 bytes)
3,142,831 UART: [rt] FIPS self test
3,143,159 UART: [kat] ++
3,143,311 UART: [kat] sha1
3,147,521 UART: [kat] SHA2-256
3,149,639 UART: Fatal Error: 0x90010002
3,151,178 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,183 >>> mbox cmd response: failed
3,151,183 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,188 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,609 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,849 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,697,851 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,841,676 >>> mbox cmd response: failed
2,842,243 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,985,800 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
4,876,144 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,453,547 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,953 writing to cptra_bootfsm_go
2,688,481 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,832,336 >>> mbox cmd response: failed
2,832,900 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,975,916 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
4,858,549 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,434,711 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,043,840 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,187,782 >>> mbox cmd response: failed
3,188,342 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,331,179 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
21,583,597 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,023,545 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,046,823 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,190,665 >>> mbox cmd response: failed
3,191,203 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,334,177 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
21,591,927 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,035,082 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
2,700,925 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,845,750 >>> mbox cmd response: failed
2,846,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,989,567 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,432,251 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,295,808 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
2,697,816 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,841,921 >>> mbox cmd response: failed
2,842,469 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,985,870 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,438,848 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,309,254 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,617 writing to cptra_bootfsm_go
3,055,266 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,199,565 >>> mbox cmd response: failed
3,200,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,343,403 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,177,374 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,903,635 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
3,055,227 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,199,696 >>> mbox cmd response: failed
3,200,251 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,343,481 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,181,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,934,296 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
2,712,183 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,856,448 >>> mbox cmd response: failed
2,857,005 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,000,380 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,425,492 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,240,257 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,708,025 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,852,355 >>> mbox cmd response: failed
2,852,927 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,996,331 >>> mbox cmd response: failed
Initializing fuses
989 writing to cptra_bootfsm_go
3,443,772 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,251,093 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,048,574 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,192,863 >>> mbox cmd response: failed
3,193,434 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,336,863 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,177,014 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,886,970 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,199 writing to cptra_bootfsm_go
3,053,342 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,197,665 >>> mbox cmd response: failed
3,198,237 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,341,617 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,181,797 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,884,434 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,776 >>> mbox cmd response: failed
811,776 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,407 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,273 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,802 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,810 >>> mbox cmd response: failed
811,810 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,076,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,057 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,481 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,489 >>> mbox cmd response: failed
812,489 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,495 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,966 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,088 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,545 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,553 >>> mbox cmd response: failed
812,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,010 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,664 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,924 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,932 >>> mbox cmd response: failed
811,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,938 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,263 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,697 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,724 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,732 >>> mbox cmd response: failed
811,732 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,738 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,917 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,963 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,971 >>> mbox cmd response: failed
811,971 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,164 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,591 >>> mbox cmd response: failed
812,591 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,597 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,258 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,792 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,800 >>> mbox cmd response: failed
811,800 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,443 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,905 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,072 >>> mbox cmd response: failed
812,072 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,091 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,453 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,267 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,275 >>> mbox cmd response: failed
812,275 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,281 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,410 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,992 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,143 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,151 >>> mbox cmd response: failed
812,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,854 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,550 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,248 UART:
192,610 UART: Running Caliptra ROM ...
193,775 UART:
193,925 UART: [state] CFI Enabled
262,925 UART: [state] LifecycleState = Unprovisioned
264,854 UART: [state] DebugLocked = No
267,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,616 UART: [kat] SHA2-256
442,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,745 UART: [kat] ++
453,359 UART: [kat] sha1
463,705 UART: [kat] SHA2-256
466,415 UART: [kat] SHA2-384
472,209 UART: [kat] SHA2-512-ACC
474,507 UART: [kat] ECC-384
2,768,630 UART: [kat] HMAC-384Kdf
2,780,331 UART: [kat] LMS
3,970,622 UART: [kat] --
3,977,264 UART: [cold-reset] ++
3,979,772 UART: [fht] Storing FHT @ 0x50003400
3,990,750 UART: [idev] ++
3,991,337 UART: [idev] CDI.KEYID = 6
3,992,252 UART: [idev] SUBJECT.KEYID = 7
3,993,504 UART: [idev] UDS.KEYID = 0
3,994,576 ready_for_fw is high
3,994,837 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,139,055 UART: [idev] Erasing UDS.KEYID = 0
7,332,020 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,505 UART: [idev] --
7,357,697 UART: [ldev] ++
7,358,309 UART: [ldev] CDI.KEYID = 6
7,359,220 UART: [ldev] SUBJECT.KEYID = 5
7,360,437 UART: [ldev] AUTHORITY.KEYID = 7
7,361,726 UART: [ldev] FE.KEYID = 1
7,404,403 UART: [ldev] Erasing FE.KEYID = 1
10,736,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,822 UART: [ldev] --
13,120,238 UART: [fwproc] Waiting for Commands...
13,122,401 UART: [fwproc] Received command 0x46574c44
13,124,644 UART: [fwproc] Received Image of size 114716 bytes
17,188,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,829 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,335,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,655,007 >>> mbox cmd response: success
17,658,912 UART: [afmc] ++
17,659,506 UART: [afmc] CDI.KEYID = 6
17,660,778 UART: [afmc] SUBJECT.KEYID = 7
17,661,893 UART: [afmc] AUTHORITY.KEYID = 5
21,031,085 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,330,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,430 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,843 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,650 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,376,146 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,397,486 UART: [afmc] --
23,401,838 UART: [cold-reset] --
23,405,643 UART: [state] Locking Datavault
23,411,656 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,367 UART: [state] Locking ICCM
23,415,852 UART: [exit] Launching FMC @ 0x40000130
23,424,263 UART:
23,424,544 UART: Running Caliptra FMC ...
23,425,661 UART:
23,425,833 UART: [state] CFI Enabled
23,491,552 UART: [fht] FMC Alias Private Key: 7
25,830,476 UART: [art] Extend RT PCRs Done
25,831,692 UART: [art] Lock RT PCRs Done
25,833,529 UART: [art] Populate DV Done
25,839,161 UART: [fht] FMC Alias Private Key: 7
25,840,770 UART: [art] Derive CDI
25,841,587 UART: [art] Store in in slot 0x4
25,900,476 UART: [art] Derive Key Pair
25,901,517 UART: [art] Store priv key in slot 0x5
29,194,484 UART: [art] Derive Key Pair - Done
29,207,640 UART: [art] Signing Cert with AUTHO
29,208,941 UART: RITY.KEYID = 7
31,496,302 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,803 UART: [art] PUB.X = 5DC65E139CBD85C6D93CE70862CA29D5E28C25C5F1D06D09B5F1DEA0E9D2C6D84CF2852A9B2AFCB1E7C9D629FB06A3D5
31,505,078 UART: [art] PUB.Y = 6D4EDB7D6C3F022DF2C2E0392FE2057D5AA7C73B80E4C6CD495C2CFC8EF2554147833C47BFE00A54FA08C2B2EFD823B7
31,512,335 UART: [art] SIG.R = 91CDF4D96A61BACAAAE998BD57F1EB1912D6DD199D0F1D04176894961E97BBAC3F9CCB0A34EAF2446F3DBFC8F8FBC76B
31,519,783 UART: [art] SIG.S = 43C9071FCD7FC4EAECEB61A54BB39E0FC26ED33048F12F251604AC6DCA4936EA289A03B82C4FF4EBFF8714904D3AE580
32,824,600 UART: Caliptra RT
32,825,296 UART: [state] CFI Enabled
32,985,760 UART: [rt] RT listening for mailbox commands...
32,987,618 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,017,432 UART: [rt]cmd =0x46504c54, len=4
33,018,917 >>> mbox cmd response data (8 bytes)
33,019,777 UART: [rt] FIPS self test
33,021,328 UART: [kat] ++
33,021,797 UART: [kat] sha1
33,025,613 UART: [kat] SHA2-256
33,027,551 UART: [kat] SHA2-384
33,030,573 UART: [kat] SHA2-512-ACC
33,031,463 UART: Droping operation
33,032,240 UART: Fatal Error: 0x90050002
33,067,392 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,211,485 >>> mbox cmd response: failed
33,212,078 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,356,089 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,115 UART:
190,408 UART: Running Caliptra ROM ...
191,434 UART:
191,572 UART: [state] CFI Enabled
248,767 UART: [state] LifecycleState = Unprovisioned
250,686 UART: [state] DebugLocked = No
253,276 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
257,620 UART: [kat] SHA2-256
427,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
437,822 UART: [kat] ++
438,263 UART: [kat] sha1
447,734 UART: [kat] SHA2-256
450,410 UART: [kat] SHA2-384
456,762 UART: [kat] SHA2-512-ACC
459,107 UART: [kat] ECC-384
2,751,992 UART: [kat] HMAC-384Kdf
2,765,329 UART: [kat] LMS
3,955,631 UART: [kat] --
3,958,671 UART: [cold-reset] ++
3,960,224 UART: [fht] Storing FHT @ 0x50003400
3,971,001 UART: [idev] ++
3,971,569 UART: [idev] CDI.KEYID = 6
3,972,453 UART: [idev] SUBJECT.KEYID = 7
3,973,723 UART: [idev] UDS.KEYID = 0
3,975,264 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,119,661 UART: [idev] Erasing UDS.KEYID = 0
7,311,186 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,021 UART: [idev] --
7,339,043 UART: [ldev] ++
7,339,617 UART: [ldev] CDI.KEYID = 6
7,340,585 UART: [ldev] SUBJECT.KEYID = 5
7,341,799 UART: [ldev] AUTHORITY.KEYID = 7
7,343,055 UART: [ldev] FE.KEYID = 1
7,387,054 UART: [ldev] Erasing FE.KEYID = 1
10,722,772 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,015,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,029,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,044,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,059,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,079,209 UART: [ldev] --
13,084,429 UART: [fwproc] Waiting for Commands...
13,087,501 UART: [fwproc] Received command 0x46574c44
13,089,691 UART: [fwproc] Received Image of size 114716 bytes
17,147,529 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,225,470 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,294,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,613,901 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,803,952 ready_for_fw is high
3,804,544 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,914,663 >>> mbox cmd response: success
23,609,201 UART:
23,609,647 UART: Running Caliptra FMC ...
23,610,766 UART:
23,610,928 UART: [state] CFI Enabled
23,663,121 UART: [fht] FMC Alias Private Key: 7
26,001,079 UART: [art] Extend RT PCRs Done
26,002,318 UART: [art] Lock RT PCRs Done
26,003,906 UART: [art] Populate DV Done
26,009,497 UART: [fht] FMC Alias Private Key: 7
26,011,102 UART: [art] Derive CDI
26,011,922 UART: [art] Store in in slot 0x4
26,073,138 UART: [art] Derive Key Pair
26,074,181 UART: [art] Store priv key in slot 0x5
29,366,907 UART: [art] Derive Key Pair - Done
29,379,488 UART: [art] Signing Cert with AUTHO
29,380,799 UART: RITY.KEYID = 7
31,668,498 UART: [art] Erasing AUTHORITY.KEYID = 7
31,670,008 UART: [art] PUB.X = EA9A098A2F460433319C6A160A695C979FD569D7C47153AB81AD5F8CD0870C58A97504A88F54EB5616C341A3AB82543E
31,677,228 UART: [art] PUB.Y = 5577059AD62472C07D54FBA38820D1EB26A2C11BBA51D8E3711441711B397A0D49262BD73799670C68586987B5913999
31,684,414 UART: [art] SIG.R = 5D3EAAC2A9911EB960435C792546FF88D1D1CCB5E202C3168C7EC91B6A531FDA034A1B71172F9CC257A7025E0684F76B
31,691,809 UART: [art] SIG.S = 7FBEDFFAA2C9E528FB21CA830C514D3278C3B3EF671E664E9ED8CC92968C4337A6F3647159FF289A256543407CEEE994
32,997,589 UART: Caliptra RT
32,998,292 UART: [state] CFI Enabled
33,158,772 UART: [rt] RT listening for mailbox commands...
33,160,651 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,190,519 UART: [rt]cmd =0x46504c54, len=4
33,192,139 >>> mbox cmd response data (8 bytes)
33,193,362 UART: [rt] FIPS self test
33,194,307 UART: [kat] ++
33,194,760 UART: [kat] sha1
33,199,077 UART: [kat] SHA2-256
33,201,015 UART: [kat] SHA2-384
33,204,139 UART: [kat] SHA2-512-ACC
33,205,085 UART: Droping operation
33,205,862 UART: Fatal Error: 0x90050002
33,241,018 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,385,084 >>> mbox cmd response: failed
33,385,753 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,529,762 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,769,834 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,860,588 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,717 UART:
193,067 UART: Running Caliptra ROM ...
194,173 UART:
603,838 UART: [state] CFI Enabled
617,574 UART: [state] LifecycleState = Unprovisioned
619,505 UART: [state] DebugLocked = No
621,697 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,643 UART: [kat] SHA2-256
796,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,919 UART: [kat] ++
807,404 UART: [kat] sha1
818,282 UART: [kat] SHA2-256
820,941 UART: [kat] SHA2-384
827,504 UART: [kat] SHA2-512-ACC
829,873 UART: [kat] ECC-384
3,113,602 UART: [kat] HMAC-384Kdf
3,124,713 UART: [kat] LMS
4,314,808 UART: [kat] --
4,319,392 UART: [cold-reset] ++
4,321,115 UART: [fht] Storing FHT @ 0x50003400
4,331,672 UART: [idev] ++
4,332,232 UART: [idev] CDI.KEYID = 6
4,333,139 UART: [idev] SUBJECT.KEYID = 7
4,334,391 UART: [idev] UDS.KEYID = 0
4,335,364 ready_for_fw is high
4,335,567 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,479,683 UART: [idev] Erasing UDS.KEYID = 0
7,622,451 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,881 UART: [idev] --
7,648,196 UART: [ldev] ++
7,648,774 UART: [ldev] CDI.KEYID = 6
7,649,754 UART: [ldev] SUBJECT.KEYID = 5
7,650,915 UART: [ldev] AUTHORITY.KEYID = 7
7,652,208 UART: [ldev] FE.KEYID = 1
7,663,816 UART: [ldev] Erasing FE.KEYID = 1
10,948,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,351 UART: [ldev] --
13,310,264 UART: [fwproc] Waiting for Commands...
13,312,096 UART: [fwproc] Received command 0x46574c44
13,314,285 UART: [fwproc] Received Image of size 114716 bytes
17,377,678 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,456,302 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,525,158 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,845,048 >>> mbox cmd response: success
17,849,763 UART: [afmc] ++
17,850,351 UART: [afmc] CDI.KEYID = 6
17,851,368 UART: [afmc] SUBJECT.KEYID = 7
17,852,526 UART: [afmc] AUTHORITY.KEYID = 5
21,170,590 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,464,842 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,467,114 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,481,497 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,496,343 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,510,813 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,531,988 UART: [afmc] --
23,535,150 UART: [cold-reset] --
23,539,439 UART: [state] Locking Datavault
23,545,603 UART: [state] Locking PCR0, PCR1 and PCR31
23,547,363 UART: [state] Locking ICCM
23,549,675 UART: [exit] Launching FMC @ 0x40000130
23,558,070 UART:
23,558,310 UART: Running Caliptra FMC ...
23,559,410 UART:
23,559,571 UART: [state] CFI Enabled
23,567,885 UART: [fht] FMC Alias Private Key: 7
25,898,388 UART: [art] Extend RT PCRs Done
25,899,631 UART: [art] Lock RT PCRs Done
25,901,526 UART: [art] Populate DV Done
25,906,885 UART: [fht] FMC Alias Private Key: 7
25,908,369 UART: [art] Derive CDI
25,909,127 UART: [art] Store in in slot 0x4
25,951,555 UART: [art] Derive Key Pair
25,952,552 UART: [art] Store priv key in slot 0x5
29,194,163 UART: [art] Derive Key Pair - Done
29,207,274 UART: [art] Signing Cert with AUTHO
29,208,590 UART: RITY.KEYID = 7
31,488,243 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,796 UART: [art] PUB.X = 8D9602600BD16DE03DFADFA8989DCE7C30EB24965E4606400AB6622F52A2FD4D451CA68A613033D94A62D167C019D968
31,496,998 UART: [art] PUB.Y = 4AD3332FF5C7AD70086AD458C77A2146C7BAC41B54D200646F152C513280B5B966B054E14AF8B63A2A3AE15F543A701C
31,504,266 UART: [art] SIG.R = A907978CD2C267327A0B581574AE9B87244E127D8790830ACCCC0ED73F3D39AEC800BB4D7FE4A359BD9D029907A01E60
31,511,620 UART: [art] SIG.S = 2BF040E559E6A6B8B17C92666D101EF106C5CE8AAA7987AAB35C2B84ACB1B042F7737DBBA30E3410329757C7AAE64A07
32,816,797 UART: Caliptra RT
32,817,787 UART: [state] CFI Enabled
32,935,261 UART: [rt] RT listening for mailbox commands...
32,937,129 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,966,952 UART: [rt]cmd =0x46504c54, len=4
32,968,350 >>> mbox cmd response data (8 bytes)
32,969,195 UART: [rt] FIPS self test
32,970,049 UART: [kat] ++
32,970,494 UART: [kat] sha1
32,975,054 UART: [kat] SHA2-256
32,976,995 UART: [kat] SHA2-384
32,979,923 UART: [kat] SHA2-512-ACC
32,980,820 UART: Droping operation
32,981,589 UART: Fatal Error: 0x90050002
33,016,708 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,160,768 >>> mbox cmd response: failed
33,161,448 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,305,506 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,111 UART:
190,396 UART: Running Caliptra ROM ...
191,423 UART:
7,229,393 UART: [state] CFI Enabled
7,241,740 UART: [state] LifecycleState = Unprovisioned
7,243,673 UART: [state] DebugLocked = No
7,245,224 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,249,465 UART: [kat] SHA2-256
7,419,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,429,784 UART: [kat] ++
7,430,329 UART: [kat] sha1
7,440,775 UART: [kat] SHA2-256
7,443,531 UART: [kat] SHA2-384
7,448,837 UART: [kat] SHA2-512-ACC
7,451,190 UART: [kat] ECC-384
9,738,777 UART: [kat] HMAC-384Kdf
9,750,898 UART: [kat] LMS
10,940,979 UART: [kat] --
10,944,552 UART: [cold-reset] ++
10,946,753 UART: [fht] Storing FHT @ 0x50003400
10,958,393 UART: [idev] ++
10,958,962 UART: [idev] CDI.KEYID = 6
10,959,927 UART: [idev] SUBJECT.KEYID = 7
10,961,136 UART: [idev] UDS.KEYID = 0
10,962,763 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,106,791 UART: [idev] Erasing UDS.KEYID = 0
14,248,327 UART: [idev] Using Sha1 for KeyId Algorithm
14,271,165 UART: [idev] --
14,275,539 UART: [ldev] ++
14,276,163 UART: [ldev] CDI.KEYID = 6
14,277,112 UART: [ldev] SUBJECT.KEYID = 5
14,278,328 UART: [ldev] AUTHORITY.KEYID = 7
14,279,480 UART: [ldev] FE.KEYID = 1
14,292,685 UART: [ldev] Erasing FE.KEYID = 1
17,580,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,871,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,886,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,900,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,915,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,934,108 UART: [ldev] --
19,939,048 UART: [fwproc] Waiting for Commands...
19,942,280 UART: [fwproc] Received command 0x46574c44
19,944,465 UART: [fwproc] Received Image of size 114716 bytes
24,002,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,080,376 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,149,256 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,468,000 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
4,128,980 ready_for_fw is high
4,129,554 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,084,455 >>> mbox cmd response: success
23,719,021 UART:
23,719,978 UART: Running Caliptra FMC ...
23,721,122 UART:
23,721,276 UART: [state] CFI Enabled
23,728,728 UART: [fht] FMC Alias Private Key: 7
26,059,214 UART: [art] Extend RT PCRs Done
26,060,878 UART: [art] Lock RT PCRs Done
26,062,077 UART: [art] Populate DV Done
26,067,433 UART: [fht] FMC Alias Private Key: 7
26,068,986 UART: [art] Derive CDI
26,069,730 UART: [art] Store in in slot 0x4
26,112,396 UART: [art] Derive Key Pair
26,113,444 UART: [art] Store priv key in slot 0x5
29,355,846 UART: [art] Derive Key Pair - Done
29,369,121 UART: [art] Signing Cert with AUTHO
29,370,438 UART: RITY.KEYID = 7
31,650,543 UART: [art] Erasing AUTHORITY.KEYID = 7
31,652,049 UART: [art] PUB.X = 02DB34E90F43DB982DFC9E78EB332234E38C35E10732C45BDBFB1406E38CFB060376AD101E110EA304479C2CC29576C6
31,659,308 UART: [art] PUB.Y = 4873AA0886A9DA63E527C70FBA160253E8FC6A52E581A64D60E6C4A0A26D9682247880677DB22310D632312C9C860860
31,666,562 UART: [art] SIG.R = 35937B5819B41AB8CD9689141F57B5EDAB533C9A51BCA0AC16B677CC3A6CC403D9132A598DB3CD3E28CA13102851CEEE
31,673,911 UART: [art] SIG.S = E52B4B9662ED710E1E907FEDB48D81776B1BBE47EB2BD943552CE6C29B1D9E7EF0C9C414A7E9462145AA83362358E323
32,978,621 UART: Caliptra RT
32,979,350 UART: [state] CFI Enabled
33,096,605 UART: [rt] RT listening for mailbox commands...
33,098,474 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,128,355 UART: [rt]cmd =0x46504c54, len=4
33,129,910 >>> mbox cmd response data (8 bytes)
33,130,784 UART: [rt] FIPS self test
33,131,730 UART: [kat] ++
33,132,184 UART: [kat] sha1
33,136,640 UART: [kat] SHA2-256
33,138,572 UART: [kat] SHA2-384
33,141,585 UART: [kat] SHA2-512-ACC
33,142,550 UART: Droping operation
33,143,326 UART: Fatal Error: 0x90050002
33,178,468 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,322,526 >>> mbox cmd response: failed
33,323,190 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,467,179 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
10,585,186 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,545,871 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,369 UART:
192,737 UART: Running Caliptra ROM ...
193,859 UART:
194,005 UART: [state] CFI Enabled
265,191 UART: [state] LifecycleState = Unprovisioned
267,106 UART: [state] DebugLocked = No
268,718 UART: [state] WD Timer not started. Device not locked for debugging
273,256 UART: [kat] SHA2-256
452,363 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,982 UART: [kat] ++
464,514 UART: [kat] sha1
476,038 UART: [kat] SHA2-256
479,057 UART: [kat] SHA2-384
485,054 UART: [kat] SHA2-512-ACC
487,996 UART: [kat] ECC-384
2,946,195 UART: [kat] HMAC-384Kdf
2,971,320 UART: [kat] LMS
3,500,760 UART: [kat] --
3,503,981 UART: [cold-reset] ++
3,504,848 UART: [fht] FHT @ 0x50003400
3,515,829 UART: [idev] ++
3,516,402 UART: [idev] CDI.KEYID = 6
3,517,328 UART: [idev] SUBJECT.KEYID = 7
3,518,506 UART: [idev] UDS.KEYID = 0
3,519,434 ready_for_fw is high
3,519,647 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,664,329 UART: [idev] Erasing UDS.KEYID = 0
6,024,946 UART: [idev] Sha1 KeyId Algorithm
6,046,478 UART: [idev] --
6,049,498 UART: [ldev] ++
6,050,089 UART: [ldev] CDI.KEYID = 6
6,050,985 UART: [ldev] SUBJECT.KEYID = 5
6,052,088 UART: [ldev] AUTHORITY.KEYID = 7
6,053,386 UART: [ldev] FE.KEYID = 1
6,098,905 UART: [ldev] Erasing FE.KEYID = 1
8,599,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,121 UART: [ldev] --
10,413,657 UART: [fwproc] Wait for Commands...
10,416,563 UART: [fwproc] Recv command 0x46574c44
10,418,606 UART: [fwproc] Recv'd Img size: 115032 bytes
13,825,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,903,168 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,971,974 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,291,493 >>> mbox cmd response: success
14,295,333 UART: [afmc] ++
14,295,928 UART: [afmc] CDI.KEYID = 6
14,296,819 UART: [afmc] SUBJECT.KEYID = 7
14,297,993 UART: [afmc] AUTHORITY.KEYID = 5
16,828,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,227 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,053 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,922 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,626,840 UART: [afmc] --
18,631,080 UART: [cold-reset] --
18,633,752 UART: [state] Locking Datavault
18,638,941 UART: [state] Locking PCR0, PCR1 and PCR31
18,640,586 UART: [state] Locking ICCM
18,642,032 UART: [exit] Launching FMC @ 0x40000130
18,650,453 UART:
18,650,693 UART: Running Caliptra FMC ...
18,651,799 UART:
18,651,973 UART: [state] CFI Enabled
18,710,073 UART: [fht] FMC Alias Private Key: 7
20,473,917 UART: [art] Extend RT PCRs Done
20,475,117 UART: [art] Lock RT PCRs Done
20,476,904 UART: [art] Populate DV Done
20,482,369 UART: [fht] FMC Alias Private Key: 7
20,484,074 UART: [art] Derive CDI
20,484,895 UART: [art] Store in in slot 0x4
20,543,119 UART: [art] Derive Key Pair
20,544,154 UART: [art] Store priv key in slot 0x5
23,007,376 UART: [art] Derive Key Pair - Done
23,020,539 UART: [art] Signing Cert with AUTHO
23,021,852 UART: RITY.KEYID = 7
24,733,040 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,534 UART: [art] PUB.X = FC0A049C7626B9547B013CF8A5C2CFC17350927A965AC9DC45042980B8F15DF338F0023025E88F68846BBA881450773D
24,741,761 UART: [art] PUB.Y = DF2389264AA4CBFA29FAD3F8DC4814D4528F42780F94F2D34CBAC1EF1B382656E19CDDBC5A2780608BB3392A4EEB9121
24,749,073 UART: [art] SIG.R = D2CDBCBAFB41CF881DA3A131555F0CDDABECB26ADC045FA1B556C9DE8AAE6E69A2AD67F31212595BAA6683B45143025E
24,756,450 UART: [art] SIG.S = 2533A67CD0D20CC2DEEE53AFE564B6574D773E2D7E4298C9FE67FA7FAB2336E62F30350110CE62DB8BF106D0132EEBE4
25,735,442 UART: Caliptra RT
25,736,148 UART: [state] CFI Enabled
25,903,322 UART: [rt] RT listening for mailbox commands...
25,905,172 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,934,905 UART: [rt]cmd =0x46504c54, len=4
25,936,750 >>> mbox cmd response data (8 bytes)
25,938,081 UART: [rt] FIPS self test
25,939,027 UART: [kat] ++
25,939,529 UART: [kat] sha1
25,943,930 UART: [kat] SHA2-256
25,945,808 UART: [kat] SHA2-384
25,948,840 UART: [kat] SHA2-512-ACC
25,949,729 UART: Droping operation
25,950,502 UART: Fatal Error: 0x90050002
25,985,824 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,130,365 >>> mbox cmd response: failed
26,130,994 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,275,293 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
190,073 UART:
190,366 UART: Running Caliptra ROM ...
191,393 UART:
191,531 UART: [state] CFI Enabled
247,805 UART: [state] LifecycleState = Unprovisioned
249,670 UART: [state] DebugLocked = No
252,527 UART: [state] WD Timer not started. Device not locked for debugging
256,441 UART: [kat] SHA2-256
435,566 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,176 UART: [kat] ++
447,625 UART: [kat] sha1
458,825 UART: [kat] SHA2-256
461,829 UART: [kat] SHA2-384
467,540 UART: [kat] SHA2-512-ACC
470,469 UART: [kat] ECC-384
2,932,706 UART: [kat] HMAC-384Kdf
2,956,435 UART: [kat] LMS
3,485,899 UART: [kat] --
3,489,612 UART: [cold-reset] ++
3,491,323 UART: [fht] FHT @ 0x50003400
3,501,498 UART: [idev] ++
3,502,062 UART: [idev] CDI.KEYID = 6
3,502,973 UART: [idev] SUBJECT.KEYID = 7
3,504,208 UART: [idev] UDS.KEYID = 0
3,505,716 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,650,409 UART: [idev] Erasing UDS.KEYID = 0
6,013,845 UART: [idev] Sha1 KeyId Algorithm
6,037,133 UART: [idev] --
6,040,699 UART: [ldev] ++
6,041,272 UART: [ldev] CDI.KEYID = 6
6,042,162 UART: [ldev] SUBJECT.KEYID = 5
6,043,383 UART: [ldev] AUTHORITY.KEYID = 7
6,044,617 UART: [ldev] FE.KEYID = 1
6,085,563 UART: [ldev] Erasing FE.KEYID = 1
8,584,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,322,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,353,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,872 UART: [ldev] --
10,377,110 UART: [fwproc] Wait for Commands...
10,379,214 UART: [fwproc] Recv command 0x46574c44
10,381,313 UART: [fwproc] Recv'd Img size: 115032 bytes
13,795,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,865,905 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,934,658 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,254,985 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,358,413 ready_for_fw is high
3,358,792 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,040,809 >>> mbox cmd response: success
18,324,546 UART:
18,324,987 UART: Running Caliptra FMC ...
18,326,116 UART:
18,326,264 UART: [state] CFI Enabled
18,392,062 UART: [fht] FMC Alias Private Key: 7
20,156,011 UART: [art] Extend RT PCRs Done
20,157,229 UART: [art] Lock RT PCRs Done
20,158,984 UART: [art] Populate DV Done
20,164,424 UART: [fht] FMC Alias Private Key: 7
20,166,081 UART: [art] Derive CDI
20,166,905 UART: [art] Store in in slot 0x4
20,226,021 UART: [art] Derive Key Pair
20,227,090 UART: [art] Store priv key in slot 0x5
22,690,056 UART: [art] Derive Key Pair - Done
22,703,180 UART: [art] Signing Cert with AUTHO
22,704,524 UART: RITY.KEYID = 7
24,415,720 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,217 UART: [art] PUB.X = FA813903D9963583BE6519055CDDD3D5A98BF2BD79AE1CBACCB101D478C76BB79F04DD92C5AB89E1BA2F5DF18139F2FF
24,424,488 UART: [art] PUB.Y = 8C519E7ECC3E5529DFBC557D2DEE5379ED3816A035574269003CAF2336668FAC6AA41BB8995EC3D078E9DED3C9276DF4
24,431,752 UART: [art] SIG.R = A4FACF87035440B0837CFBB50A6E540E3A23B0C24C1EB32CEC13AF6A999882313DD432B6B5911B10822BBAF7639FB0AD
24,439,144 UART: [art] SIG.S = 0EC3850EAF3B9FF2A887F2FD64CEF1E820ADE4837AC90E6DAB4C0BE0BFC98EDE8CD4E73F5CBCDBE70478B528E599A87A
25,418,212 UART: Caliptra RT
25,418,915 UART: [state] CFI Enabled
25,583,222 UART: [rt] RT listening for mailbox commands...
25,585,080 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,614,861 UART: [rt]cmd =0x46504c54, len=4
25,616,598 >>> mbox cmd response data (8 bytes)
25,617,653 UART: [rt] FIPS self test
25,618,595 UART: [kat] ++
25,619,062 UART: [kat] sha1
25,623,463 UART: [kat] SHA2-256
25,625,337 UART: [kat] SHA2-384
25,628,436 UART: [kat] SHA2-512-ACC
25,629,375 UART: Droping operation
25,630,150 UART: Fatal Error: 0x90050002
25,665,389 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,809,747 >>> mbox cmd response: failed
25,810,421 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,954,868 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,369,208 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,045,399 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,577 UART:
192,941 UART: Running Caliptra ROM ...
194,162 UART:
603,641 UART: [state] CFI Enabled
618,651 UART: [state] LifecycleState = Unprovisioned
620,523 UART: [state] DebugLocked = No
622,215 UART: [state] WD Timer not started. Device not locked for debugging
625,416 UART: [kat] SHA2-256
804,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,099 UART: [kat] ++
816,558 UART: [kat] sha1
828,426 UART: [kat] SHA2-256
831,440 UART: [kat] SHA2-384
837,079 UART: [kat] SHA2-512-ACC
839,994 UART: [kat] ECC-384
3,284,004 UART: [kat] HMAC-384Kdf
3,297,019 UART: [kat] LMS
3,826,469 UART: [kat] --
3,831,250 UART: [cold-reset] ++
3,833,353 UART: [fht] FHT @ 0x50003400
3,845,330 UART: [idev] ++
3,845,897 UART: [idev] CDI.KEYID = 6
3,846,869 UART: [idev] SUBJECT.KEYID = 7
3,848,049 UART: [idev] UDS.KEYID = 0
3,848,954 ready_for_fw is high
3,849,166 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,993,618 UART: [idev] Erasing UDS.KEYID = 0
6,316,286 UART: [idev] Sha1 KeyId Algorithm
6,339,143 UART: [idev] --
6,343,414 UART: [ldev] ++
6,343,990 UART: [ldev] CDI.KEYID = 6
6,344,905 UART: [ldev] SUBJECT.KEYID = 5
6,346,118 UART: [ldev] AUTHORITY.KEYID = 7
6,347,348 UART: [ldev] FE.KEYID = 1
6,359,395 UART: [ldev] Erasing FE.KEYID = 1
8,832,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,549,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,565,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,581,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,617,481 UART: [ldev] --
10,622,146 UART: [fwproc] Wait for Commands...
10,624,346 UART: [fwproc] Recv command 0x46574c44
10,626,382 UART: [fwproc] Recv'd Img size: 115032 bytes
14,040,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,435 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,235 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,506,158 >>> mbox cmd response: success
14,510,706 UART: [afmc] ++
14,511,292 UART: [afmc] CDI.KEYID = 6
14,512,174 UART: [afmc] SUBJECT.KEYID = 7
14,513,386 UART: [afmc] AUTHORITY.KEYID = 5
17,008,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,794 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,574 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,616 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,490 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,800,965 UART: [afmc] --
18,804,580 UART: [cold-reset] --
18,808,985 UART: [state] Locking Datavault
18,814,180 UART: [state] Locking PCR0, PCR1 and PCR31
18,815,827 UART: [state] Locking ICCM
18,816,893 UART: [exit] Launching FMC @ 0x40000130
18,825,288 UART:
18,825,526 UART: Running Caliptra FMC ...
18,826,629 UART:
18,826,790 UART: [state] CFI Enabled
18,834,514 UART: [fht] FMC Alias Private Key: 7
20,591,678 UART: [art] Extend RT PCRs Done
20,592,903 UART: [art] Lock RT PCRs Done
20,594,672 UART: [art] Populate DV Done
20,599,925 UART: [fht] FMC Alias Private Key: 7
20,601,569 UART: [art] Derive CDI
20,602,389 UART: [art] Store in in slot 0x4
20,644,778 UART: [art] Derive Key Pair
20,645,819 UART: [art] Store priv key in slot 0x5
23,072,551 UART: [art] Derive Key Pair - Done
23,085,010 UART: [art] Signing Cert with AUTHO
23,086,318 UART: RITY.KEYID = 7
24,792,026 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,508 UART: [art] PUB.X = 16303A3916710205602136EA83BB2CB4E77916C45BDCF7D8F69A6F04B829FCA6657115E79748B3BEA80D77E4A7C53E35
24,800,761 UART: [art] PUB.Y = 0B696B554480F5CBF26E1B4CDFC0972958CEDA2FAF03D9676D14630FD1CF299FA0F24121EF14D82E22D10FDB44D2BF66
24,808,053 UART: [art] SIG.R = C61225A85EA77709AB2A0B096C8B86F51816D82415CFBBA685E23CF89827D117FFD91CF65C28CD726726DBA42B99F519
24,815,450 UART: [art] SIG.S = D6128E60E7E443E10DCF5C82F7E1143875C0EDDD8B79D7093DD5F96DC5D55191DFA74F908EEF49B18EA101B358594524
25,794,759 UART: Caliptra RT
25,795,525 UART: [state] CFI Enabled
25,912,835 UART: [rt] RT listening for mailbox commands...
25,914,694 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,944,480 UART: [rt]cmd =0x46504c54, len=4
25,946,109 >>> mbox cmd response data (8 bytes)
25,947,331 UART: [rt] FIPS self test
25,948,272 UART: [kat] ++
25,948,722 UART: [kat] sha1
25,953,121 UART: [kat] SHA2-256
25,954,993 UART: [kat] SHA2-384
25,958,142 UART: [kat] SHA2-512-ACC
25,959,031 UART: Droping operation
25,959,805 UART: Fatal Error: 0x90050002
25,995,126 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,139,468 >>> mbox cmd response: failed
26,140,090 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,284,495 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,101 UART:
190,395 UART: Running Caliptra ROM ...
191,415 UART:
14,247,388 UART: [state] CFI Enabled
14,259,094 UART: [state] LifecycleState = Unprovisioned
14,260,959 UART: [state] DebugLocked = No
14,262,993 UART: [state] WD Timer not started. Device not locked for debugging
14,267,214 UART: [kat] SHA2-256
14,446,292 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,457,878 UART: [kat] ++
14,458,415 UART: [kat] sha1
14,470,116 UART: [kat] SHA2-256
14,473,185 UART: [kat] SHA2-384
14,479,614 UART: [kat] SHA2-512-ACC
14,482,607 UART: [kat] ECC-384
16,924,514 UART: [kat] HMAC-384Kdf
16,937,657 UART: [kat] LMS
17,467,154 UART: [kat] --
17,471,320 UART: [cold-reset] ++
17,472,607 UART: [fht] FHT @ 0x50003400
17,482,506 UART: [idev] ++
17,483,069 UART: [idev] CDI.KEYID = 6
17,484,088 UART: [idev] SUBJECT.KEYID = 7
17,485,196 UART: [idev] UDS.KEYID = 0
17,486,717 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,631,127 UART: [idev] Erasing UDS.KEYID = 0
19,953,547 UART: [idev] Sha1 KeyId Algorithm
19,976,777 UART: [idev] --
19,980,821 UART: [ldev] ++
19,981,407 UART: [ldev] CDI.KEYID = 6
19,982,312 UART: [ldev] SUBJECT.KEYID = 5
19,983,469 UART: [ldev] AUTHORITY.KEYID = 7
19,984,755 UART: [ldev] FE.KEYID = 1
19,998,100 UART: [ldev] Erasing FE.KEYID = 1
22,474,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,192,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,208,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,224,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,239,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,260,443 UART: [ldev] --
24,264,502 UART: [fwproc] Wait for Commands...
24,267,725 UART: [fwproc] Recv command 0x46574c44
24,269,830 UART: [fwproc] Recv'd Img size: 115032 bytes
27,677,448 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,753,754 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,822,537 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,142,528 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,694,723 ready_for_fw is high
3,695,146 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,284,139 >>> mbox cmd response: success
18,538,144 UART:
18,538,532 UART: Running Caliptra FMC ...
18,539,746 UART:
18,539,927 UART: [state] CFI Enabled
18,547,808 UART: [fht] FMC Alias Private Key: 7
20,304,738 UART: [art] Extend RT PCRs Done
20,305,958 UART: [art] Lock RT PCRs Done
20,307,641 UART: [art] Populate DV Done
20,312,767 UART: [fht] FMC Alias Private Key: 7
20,314,254 UART: [art] Derive CDI
20,315,018 UART: [art] Store in in slot 0x4
20,357,777 UART: [art] Derive Key Pair
20,358,779 UART: [art] Store priv key in slot 0x5
22,786,286 UART: [art] Derive Key Pair - Done
22,799,074 UART: [art] Signing Cert with AUTHO
22,800,400 UART: RITY.KEYID = 7
24,506,003 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,510 UART: [art] PUB.X = E037CC80BF899CE0200D8E76E1DF62BF658C2B3961703F113519C62AF2F2153992F438D49FC1474CB20E617257E33012
24,514,742 UART: [art] PUB.Y = BFAC945937C54E08613AE4E87ACAD3BD97BA3B5FA6B3A1094AA3E8CA14495234AA4E54BE5DBB1C7A044F1BDED71D5141
24,522,050 UART: [art] SIG.R = 85E1D6611178E95A9E30188A291A2E2A6963C862663BAD3DA28BCBC9EE0ED0D57F38B9FCF603C2D540EAA242C91DEAA9
24,529,421 UART: [art] SIG.S = CCE8467945CA2F18163D1F022C8220A14936F5C08879B5B57F6752CA2C013B53DEF30F4C7F147E782B1F8EA9156B5CDE
25,508,767 UART: Caliptra RT
25,509,466 UART: [state] CFI Enabled
25,626,894 UART: [rt] RT listening for mailbox commands...
25,628,726 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,658,506 UART: [rt]cmd =0x46504c54, len=4
25,660,012 >>> mbox cmd response data (8 bytes)
25,660,901 UART: [rt] FIPS self test
25,661,840 UART: [kat] ++
25,662,292 UART: [kat] sha1
25,666,856 UART: [kat] SHA2-256
25,668,759 UART: [kat] SHA2-384
25,671,618 UART: [kat] SHA2-512-ACC
25,672,566 UART: Droping operation
25,673,338 UART: Fatal Error: 0x90050002
25,708,403 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,852,858 >>> mbox cmd response: failed
25,853,469 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,997,849 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
17,627,235 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,213,091 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,175 UART:
192,552 UART: Running Caliptra ROM ...
193,738 UART:
193,914 UART: [state] CFI Enabled
265,802 UART: [state] LifecycleState = Unprovisioned
268,197 UART: [state] DebugLocked = No
270,520 UART: [state] WD Timer not started. Device not locked for debugging
275,585 UART: [kat] SHA2-256
465,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,219 UART: [kat] ++
476,695 UART: [kat] sha1
489,210 UART: [kat] SHA2-256
492,227 UART: [kat] SHA2-384
497,230 UART: [kat] SHA2-512-ACC
499,821 UART: [kat] ECC-384
2,950,613 UART: [kat] HMAC-384Kdf
2,973,440 UART: [kat] LMS
3,505,199 UART: [kat] --
3,511,396 UART: [cold-reset] ++
3,513,207 UART: [fht] FHT @ 0x50003400
3,523,630 UART: [idev] ++
3,524,277 UART: [idev] CDI.KEYID = 6
3,525,313 UART: [idev] SUBJECT.KEYID = 7
3,526,422 UART: [idev] UDS.KEYID = 0
3,527,358 ready_for_fw is high
3,527,564 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,672,274 UART: [idev] Erasing UDS.KEYID = 0
6,028,328 UART: [idev] Sha1 KeyId Algorithm
6,051,559 UART: [idev] --
6,055,378 UART: [ldev] ++
6,056,068 UART: [ldev] CDI.KEYID = 6
6,056,987 UART: [ldev] SUBJECT.KEYID = 5
6,058,151 UART: [ldev] AUTHORITY.KEYID = 7
6,059,384 UART: [ldev] FE.KEYID = 1
6,103,307 UART: [ldev] Erasing FE.KEYID = 1
8,609,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,056 UART: [ldev] --
10,416,730 UART: [fwproc] Wait for Commands...
10,418,505 UART: [fwproc] Recv command 0x46574c44
10,420,826 UART: [fwproc] Recv'd Img size: 115032 bytes
13,871,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,844 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,070,990 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,618,325 >>> mbox cmd response: success
14,622,603 UART: [afmc] ++
14,623,312 UART: [afmc] CDI.KEYID = 6
14,624,491 UART: [afmc] SUBJECT.KEYID = 7
14,625,946 UART: [afmc] AUTHORITY.KEYID = 5
17,154,781 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,898,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,900,150 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,915,333 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,930,472 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,945,488 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,310 UART: [afmc] --
18,973,064 UART: [cold-reset] --
18,977,523 UART: [state] Locking Datavault
18,983,637 UART: [state] Locking PCR0, PCR1 and PCR31
18,985,820 UART: [state] Locking ICCM
18,987,374 UART: [exit] Launching FMC @ 0x40000130
18,996,050 UART:
18,996,327 UART: Running Caliptra FMC ...
18,997,439 UART:
18,997,621 UART: [state] CFI Enabled
19,054,359 UART: [fht] FMC Alias Private Key: 7
20,818,677 UART: [art] Extend RT PCRs Done
20,819,894 UART: [art] Lock RT PCRs Done
20,821,711 UART: [art] Populate DV Done
20,827,339 UART: [fht] FMC Alias Private Key: 7
20,828,995 UART: [art] Derive CDI
20,829,813 UART: [art] Store in in slot 0x4
20,887,285 UART: [art] Derive Key Pair
20,888,322 UART: [art] Store priv key in slot 0x5
23,351,446 UART: [art] Derive Key Pair - Done
23,364,439 UART: [art] Signing Cert with AUTHO
23,365,751 UART: RITY.KEYID = 7
25,076,516 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,027 UART: [art] PUB.X = A14A660B930375CFBBFB1E2F562801F482F04B832C808E949E61554D11715F5BDA63ED58714F7FDDA9FB12E3D8AC00A5
25,085,261 UART: [art] PUB.Y = BDA49C23C2B8E85AD02C6AB278566F7F0EFBB2B7E241C3C849BF5E7937BD4F7A2DB188FD30E4E50F9CA073ABC6E3B750
25,092,538 UART: [art] SIG.R = A348DD8C96101E62533708BF18AF1C759AE5F0BE2630B94193BE4AACF562B82D5A1F146A9AAC69FCBD9374A46BFAFF06
25,099,966 UART: [art] SIG.S = 07487C8BD4AC6467FFB3677021039B845B3B7CB7DC61982B370A79DF65D67F5A68DB4C138D1876A5ECBA7D4870EA68D7
26,078,496 UART: Caliptra RT
26,079,196 UART: [state] CFI Enabled
26,243,663 UART: [rt] RT listening for mailbox commands...
26,245,514 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,275,257 UART: [rt]cmd =0x46504c54, len=4
26,276,918 >>> mbox cmd response data (8 bytes)
26,277,877 UART: [rt] FIPS self test
26,278,829 UART: [kat] ++
26,279,278 UART: [kat] sha1
26,283,840 UART: [kat] SHA2-256
26,285,768 UART: [kat] SHA2-384
26,288,730 UART: [kat] SHA2-512-ACC
26,289,611 UART: Droping operation
26,290,382 UART: Fatal Error: 0x90050002
26,325,462 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,469,926 >>> mbox cmd response: failed
26,470,581 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,615,015 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,020 UART:
190,322 UART: Running Caliptra ROM ...
191,349 UART:
191,489 UART: [state] CFI Enabled
251,727 UART: [state] LifecycleState = Unprovisioned
254,139 UART: [state] DebugLocked = No
256,221 UART: [state] WD Timer not started. Device not locked for debugging
260,832 UART: [kat] SHA2-256
450,707 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,517 UART: [kat] ++
462,068 UART: [kat] sha1
472,848 UART: [kat] SHA2-256
475,908 UART: [kat] SHA2-384
482,210 UART: [kat] SHA2-512-ACC
484,830 UART: [kat] ECC-384
2,935,847 UART: [kat] HMAC-384Kdf
2,960,661 UART: [kat] LMS
3,492,470 UART: [kat] --
3,496,467 UART: [cold-reset] ++
3,498,995 UART: [fht] FHT @ 0x50003400
3,509,738 UART: [idev] ++
3,510,421 UART: [idev] CDI.KEYID = 6
3,511,355 UART: [idev] SUBJECT.KEYID = 7
3,512,564 UART: [idev] UDS.KEYID = 0
3,514,053 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,658,534 UART: [idev] Erasing UDS.KEYID = 0
6,016,997 UART: [idev] Sha1 KeyId Algorithm
6,039,978 UART: [idev] --
6,044,563 UART: [ldev] ++
6,045,246 UART: [ldev] CDI.KEYID = 6
6,046,130 UART: [ldev] SUBJECT.KEYID = 5
6,047,347 UART: [ldev] AUTHORITY.KEYID = 7
6,048,474 UART: [ldev] FE.KEYID = 1
6,087,863 UART: [ldev] Erasing FE.KEYID = 1
8,595,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,331,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,455 UART: [ldev] --
10,404,645 UART: [fwproc] Wait for Commands...
10,407,390 UART: [fwproc] Recv command 0x46574c44
10,409,728 UART: [fwproc] Recv'd Img size: 115032 bytes
13,870,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,672 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,792 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,614,258 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,437,430 ready_for_fw is high
3,437,825 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,720,387 >>> mbox cmd response: success
19,004,584 UART:
19,004,974 UART: Running Caliptra FMC ...
19,006,092 UART:
19,006,254 UART: [state] CFI Enabled
19,071,337 UART: [fht] FMC Alias Private Key: 7
20,836,067 UART: [art] Extend RT PCRs Done
20,837,296 UART: [art] Lock RT PCRs Done
20,838,740 UART: [art] Populate DV Done
20,844,159 UART: [fht] FMC Alias Private Key: 7
20,845,811 UART: [art] Derive CDI
20,846,550 UART: [art] Store in in slot 0x4
20,903,967 UART: [art] Derive Key Pair
20,905,010 UART: [art] Store priv key in slot 0x5
23,367,831 UART: [art] Derive Key Pair - Done
23,380,688 UART: [art] Signing Cert with AUTHO
23,382,001 UART: RITY.KEYID = 7
25,094,002 UART: [art] Erasing AUTHORITY.KEYID = 7
25,095,519 UART: [art] PUB.X = E32D810E3DEB3AFD8E22C13F45679146E5AC081EA527C9F786685EEB649975F83F09E8A1F939C1B7DD6118E38A250A81
25,102,788 UART: [art] PUB.Y = 1B4F6326945990F7F6826664C935744C2FA58F5E5251DF9F039D4724564A156B12FFBCC80796E4A2C03B35220435D583
25,110,043 UART: [art] SIG.R = CFB2052CC0A36090A796900EABCA52136A732F362725512772F522C51964B12902E4AF293FA9E07FD729094C3891BF44
25,117,485 UART: [art] SIG.S = C9C4665DD3A2F3573E2DDD6D06610CCB86991E8F3D5EA4577697B7A9E13469D41C22BE920198143D7144B0EE93758990
26,095,905 UART: Caliptra RT
26,096,598 UART: [state] CFI Enabled
26,261,634 UART: [rt] RT listening for mailbox commands...
26,263,509 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,293,340 UART: [rt]cmd =0x46504c54, len=4
26,294,817 >>> mbox cmd response data (8 bytes)
26,295,900 UART: [rt] FIPS self test
26,296,849 UART: [kat] ++
26,297,302 UART: [kat] sha1
26,301,724 UART: [kat] SHA2-256
26,303,611 UART: [kat] SHA2-384
26,306,570 UART: [kat] SHA2-512-ACC
26,307,518 UART: Droping operation
26,308,293 UART: Fatal Error: 0x90050002
26,343,607 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,488,108 >>> mbox cmd response: failed
26,488,688 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,632,936 >>> mbox cmd response: failed
Initializing fuses
927 writing to cptra_bootfsm_go
3,427,863 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,744,806 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,442 UART:
192,823 UART: Running Caliptra ROM ...
193,940 UART:
603,683 UART: [state] CFI Enabled
614,595 UART: [state] LifecycleState = Unprovisioned
617,008 UART: [state] DebugLocked = No
618,771 UART: [state] WD Timer not started. Device not locked for debugging
622,612 UART: [kat] SHA2-256
812,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,277 UART: [kat] ++
823,817 UART: [kat] sha1
835,476 UART: [kat] SHA2-256
838,488 UART: [kat] SHA2-384
844,986 UART: [kat] SHA2-512-ACC
847,573 UART: [kat] ECC-384
3,289,470 UART: [kat] HMAC-384Kdf
3,303,095 UART: [kat] LMS
3,834,951 UART: [kat] --
3,838,684 UART: [cold-reset] ++
3,840,838 UART: [fht] FHT @ 0x50003400
3,851,676 UART: [idev] ++
3,852,385 UART: [idev] CDI.KEYID = 6
3,853,301 UART: [idev] SUBJECT.KEYID = 7
3,854,551 UART: [idev] UDS.KEYID = 0
3,855,499 ready_for_fw is high
3,855,736 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,000,339 UART: [idev] Erasing UDS.KEYID = 0
6,333,739 UART: [idev] Sha1 KeyId Algorithm
6,356,434 UART: [idev] --
6,360,102 UART: [ldev] ++
6,360,783 UART: [ldev] CDI.KEYID = 6
6,361,802 UART: [ldev] SUBJECT.KEYID = 5
6,362,904 UART: [ldev] AUTHORITY.KEYID = 7
6,364,135 UART: [ldev] FE.KEYID = 1
6,374,784 UART: [ldev] Erasing FE.KEYID = 1
8,858,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,744 UART: [ldev] --
10,651,850 UART: [fwproc] Wait for Commands...
10,653,629 UART: [fwproc] Recv command 0x46574c44
10,655,894 UART: [fwproc] Recv'd Img size: 115032 bytes
14,109,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,978 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,299,120 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,845,832 >>> mbox cmd response: success
14,850,301 UART: [afmc] ++
14,851,161 UART: [afmc] CDI.KEYID = 6
14,852,204 UART: [afmc] SUBJECT.KEYID = 7
14,853,644 UART: [afmc] AUTHORITY.KEYID = 5
17,354,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,076,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,078,067 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,093,227 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,108,367 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,123,408 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,983 UART: [afmc] --
19,151,346 UART: [cold-reset] --
19,156,134 UART: [state] Locking Datavault
19,161,221 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,356 UART: [state] Locking ICCM
19,166,324 UART: [exit] Launching FMC @ 0x40000130
19,175,008 UART:
19,175,292 UART: Running Caliptra FMC ...
19,176,356 UART:
19,176,511 UART: [state] CFI Enabled
19,184,457 UART: [fht] FMC Alias Private Key: 7
20,942,316 UART: [art] Extend RT PCRs Done
20,943,541 UART: [art] Lock RT PCRs Done
20,945,010 UART: [art] Populate DV Done
20,950,499 UART: [fht] FMC Alias Private Key: 7
20,952,163 UART: [art] Derive CDI
20,952,932 UART: [art] Store in in slot 0x4
20,995,367 UART: [art] Derive Key Pair
20,996,371 UART: [art] Store priv key in slot 0x5
23,422,783 UART: [art] Derive Key Pair - Done
23,435,884 UART: [art] Signing Cert with AUTHO
23,437,186 UART: RITY.KEYID = 7
25,142,536 UART: [art] Erasing AUTHORITY.KEYID = 7
25,144,039 UART: [art] PUB.X = B56C5C0566E8BB2D4E586D055E36CAA0BFF7D7048A206D4D09BAE9800AD2B6C1BF92D3A0300C4750541D28B89B1BE009
25,151,312 UART: [art] PUB.Y = 529AE4B91D81B78976E396988E1C25FE01CD9FAA277EFB9696FE72231E02DDE0FF6D08FBE0F24814289D47F181426E46
25,158,567 UART: [art] SIG.R = 1E0C1D5F5303194F3C00E3FB158EE7DE42015ED9CD5501DE9FDC2E2E030BB33B9642F7A922DF324B3F2C253377627945
25,165,935 UART: [art] SIG.S = EA122036C7E19B13870FD11AD7DDB317719375C3E69AA7F842AD33866883E19B136E12CF723DB4F5F9238B894129601B
26,144,525 UART: Caliptra RT
26,145,238 UART: [state] CFI Enabled
26,261,775 UART: [rt] RT listening for mailbox commands...
26,263,654 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,293,301 UART: [rt]cmd =0x46504c54, len=4
26,294,942 >>> mbox cmd response data (8 bytes)
26,295,896 UART: [rt] FIPS self test
26,296,857 UART: [kat] ++
26,297,313 UART: [kat] sha1
26,301,876 UART: [kat] SHA2-256
26,303,809 UART: [kat] SHA2-384
26,306,717 UART: [kat] SHA2-512-ACC
26,307,598 UART: Droping operation
26,308,372 UART: Fatal Error: 0x90050002
26,343,571 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,488,043 >>> mbox cmd response: failed
26,488,709 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,633,153 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
190,111 UART:
190,399 UART: Running Caliptra ROM ...
191,519 UART:
13,895,980 UART: [state] CFI Enabled
13,907,801 UART: [state] LifecycleState = Unprovisioned
13,910,186 UART: [state] DebugLocked = No
13,913,008 UART: [state] WD Timer not started. Device not locked for debugging
13,917,095 UART: [kat] SHA2-256
14,106,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,117,751 UART: [kat] ++
14,118,262 UART: [kat] sha1
14,128,130 UART: [kat] SHA2-256
14,131,142 UART: [kat] SHA2-384
14,137,781 UART: [kat] SHA2-512-ACC
14,140,382 UART: [kat] ECC-384
16,583,948 UART: [kat] HMAC-384Kdf
16,597,485 UART: [kat] LMS
17,129,323 UART: [kat] --
17,134,173 UART: [cold-reset] ++
17,135,134 UART: [fht] FHT @ 0x50003400
17,146,550 UART: [idev] ++
17,147,226 UART: [idev] CDI.KEYID = 6
17,148,245 UART: [idev] SUBJECT.KEYID = 7
17,149,404 UART: [idev] UDS.KEYID = 0
17,150,923 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,295,324 UART: [idev] Erasing UDS.KEYID = 0
19,626,788 UART: [idev] Sha1 KeyId Algorithm
19,650,017 UART: [idev] --
19,654,555 UART: [ldev] ++
19,655,291 UART: [ldev] CDI.KEYID = 6
19,656,169 UART: [ldev] SUBJECT.KEYID = 5
19,657,559 UART: [ldev] AUTHORITY.KEYID = 7
19,658,774 UART: [ldev] FE.KEYID = 1
19,669,126 UART: [ldev] Erasing FE.KEYID = 1
22,150,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,870,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,885,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,900,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,915,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,936,669 UART: [ldev] --
23,941,721 UART: [fwproc] Wait for Commands...
23,943,497 UART: [fwproc] Recv command 0x46574c44
23,945,765 UART: [fwproc] Recv'd Img size: 115032 bytes
27,400,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,476,278 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,592,426 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,139,463 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,750,934 ready_for_fw is high
3,751,522 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,964,003 >>> mbox cmd response: success
19,217,278 UART:
19,217,666 UART: Running Caliptra FMC ...
19,218,782 UART:
19,218,937 UART: [state] CFI Enabled
19,227,316 UART: [fht] FMC Alias Private Key: 7
20,983,902 UART: [art] Extend RT PCRs Done
20,985,132 UART: [art] Lock RT PCRs Done
20,986,925 UART: [art] Populate DV Done
20,992,375 UART: [fht] FMC Alias Private Key: 7
20,994,083 UART: [art] Derive CDI
20,994,830 UART: [art] Store in in slot 0x4
21,037,211 UART: [art] Derive Key Pair
21,038,217 UART: [art] Store priv key in slot 0x5
23,465,189 UART: [art] Derive Key Pair - Done
23,477,991 UART: [art] Signing Cert with AUTHO
23,479,305 UART: RITY.KEYID = 7
25,184,928 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,434 UART: [art] PUB.X = 4B2F237290E337C79B8E969C4738E94FA4A19E65D6D75582A3B6B288992BAF5F94EC8C1646590FEAB2F5BF0330BF578F
25,193,704 UART: [art] PUB.Y = B78539016D990CAB36D6C8813EE2A05283D90F1FB53A3175336186AD2CAD8D9A6F4D6889BA1EDC8B926135540636D4D3
25,200,964 UART: [art] SIG.R = 38DB9F965CD550B303919D2848C341C23BC8BC11CFA8C0AD00E7D3B9FC4A9113977AA58A856F273D82EAFFB11C20E242
25,208,359 UART: [art] SIG.S = 3DDA3B8A562BD2AA48ABC7A789F3E363859EBFE8BFE570727BBB55ADB913DEB7F91CF76FAAFABDCC41F732DCBD7B3FCF
26,186,998 UART: Caliptra RT
26,187,691 UART: [state] CFI Enabled
26,305,230 UART: [rt] RT listening for mailbox commands...
26,307,091 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,336,654 UART: [rt]cmd =0x46504c54, len=4
26,338,158 >>> mbox cmd response data (8 bytes)
26,339,208 UART: [rt] FIPS self test
26,340,155 UART: [kat] ++
26,340,603 UART: [kat] sha1
26,345,092 UART: [kat] SHA2-256
26,346,971 UART: [kat] SHA2-384
26,349,980 UART: [kat] SHA2-512-ACC
26,350,932 UART: Droping operation
26,351,707 UART: Fatal Error: 0x90050002
26,386,849 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,531,369 >>> mbox cmd response: failed
26,531,981 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,676,373 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
17,011,231 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,207,931 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,395 UART: [kat] SHA2-256
892,333 UART: [kat] SHA2-384
895,064 UART: [kat] SHA2-512-ACC
896,965 UART: [kat] ECC-384
902,592 UART: [kat] HMAC-384Kdf
907,082 UART: [kat] LMS
1,475,278 UART: [kat] --
1,476,043 UART: [cold-reset] ++
1,476,371 UART: [fht] Storing FHT @ 0x50003400
1,479,324 UART: [idev] ++
1,479,492 UART: [idev] CDI.KEYID = 6
1,479,852 UART: [idev] SUBJECT.KEYID = 7
1,480,276 UART: [idev] UDS.KEYID = 0
1,480,621 ready_for_fw is high
1,480,621 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,306 UART: [idev] Erasing UDS.KEYID = 0
1,505,232 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,826 UART: [idev] --
1,514,935 UART: [ldev] ++
1,515,103 UART: [ldev] CDI.KEYID = 6
1,515,466 UART: [ldev] SUBJECT.KEYID = 5
1,515,892 UART: [ldev] AUTHORITY.KEYID = 7
1,516,355 UART: [ldev] FE.KEYID = 1
1,521,429 UART: [ldev] Erasing FE.KEYID = 1
1,547,008 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,288 UART: [ldev] --
1,586,583 UART: [fwproc] Waiting for Commands...
1,587,278 UART: [fwproc] Received command 0x46574c44
1,588,069 UART: [fwproc] Received Image of size 115032 bytes
2,893,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,658 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,010 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,033 >>> mbox cmd response: success
3,088,227 UART: [afmc] ++
3,088,395 UART: [afmc] CDI.KEYID = 6
3,088,757 UART: [afmc] SUBJECT.KEYID = 7
3,089,182 UART: [afmc] AUTHORITY.KEYID = 5
3,124,311 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,601 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,381 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,109 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,994 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,684 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,533 UART: [afmc] --
3,167,575 UART: [cold-reset] --
3,168,409 UART: [state] Locking Datavault
3,169,498 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,102 UART: [state] Locking ICCM
3,170,678 UART: [exit] Launching FMC @ 0x40000130
3,176,007 UART:
3,176,023 UART: Running Caliptra FMC ...
3,176,431 UART:
3,176,485 UART: [state] CFI Enabled
3,186,882 UART: [fht] FMC Alias Private Key: 7
3,294,209 UART: [art] Extend RT PCRs Done
3,294,637 UART: [art] Lock RT PCRs Done
3,296,015 UART: [art] Populate DV Done
3,304,298 UART: [fht] FMC Alias Private Key: 7
3,305,286 UART: [art] Derive CDI
3,305,566 UART: [art] Store in in slot 0x4
3,391,453 UART: [art] Derive Key Pair
3,391,813 UART: [art] Store priv key in slot 0x5
3,405,293 UART: [art] Derive Key Pair - Done
3,419,889 UART: [art] Signing Cert with AUTHO
3,420,369 UART: RITY.KEYID = 7
3,435,611 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,376 UART: [art] PUB.X = A9CC3C367ED8E36DEF9AAF78D84FB3466C1B04D7EFAD946D72326C6B1E0C2B01E732ADCA5938094788AF1263B6A52F97
3,443,150 UART: [art] PUB.Y = B362746E63EE16AC594E727A58E39DE422E32C88939939659BD9A0E6868F99DAA226E7823E3B4AEDF45D05B495DD1AA0
3,450,103 UART: [art] SIG.R = AEE1AEF13190911D97061E80A4CE2C12EED3377A4513CC5306CC3D8DD932803FDBF0C90FD539BB05C9F3F6AB46FEB2C6
3,456,881 UART: [art] SIG.S = C380171F17A20CF3ED75EB287D923C26608E87A069FB1FF435C5538186CE1AC63966F2867126606D503176039D0F2523
3,480,887 UART: Caliptra RT
3,481,140 UART: [state] CFI Enabled
3,589,884 UART: [rt] RT listening for mailbox commands...
3,590,547 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,356 UART: [rt]cmd =0x46504c54, len=4
3,621,670 >>> mbox cmd response data (8 bytes)
3,621,941 UART: [rt] FIPS self test
3,622,269 UART: [kat] ++
3,622,421 UART: [kat] sha1
3,626,487 UART: [kat] SHA2-256
3,628,509 UART: [kat] SHA2-384
3,631,582 UART: [kat] SHA2-512-ACC
3,631,987 UART: Droping operation
3,632,474 UART: Fatal Error: 0x90050002
3,634,013 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,634,018 >>> mbox cmd response: failed
3,634,018 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,634,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,968 UART: [kat] SHA2-512-ACC
896,869 UART: [kat] ECC-384
902,738 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,447 UART: [cold-reset] ++
1,476,957 UART: [fht] Storing FHT @ 0x50003400
1,479,730 UART: [idev] ++
1,479,898 UART: [idev] CDI.KEYID = 6
1,480,258 UART: [idev] SUBJECT.KEYID = 7
1,480,682 UART: [idev] UDS.KEYID = 0
1,481,027 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,964 UART: [idev] Erasing UDS.KEYID = 0
1,505,732 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,506 UART: [idev] --
1,515,427 UART: [ldev] ++
1,515,595 UART: [ldev] CDI.KEYID = 6
1,515,958 UART: [ldev] SUBJECT.KEYID = 5
1,516,384 UART: [ldev] AUTHORITY.KEYID = 7
1,516,847 UART: [ldev] FE.KEYID = 1
1,522,157 UART: [ldev] Erasing FE.KEYID = 1
1,547,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,604 UART: [ldev] --
1,587,001 UART: [fwproc] Waiting for Commands...
1,587,646 UART: [fwproc] Received command 0x46574c44
1,588,437 UART: [fwproc] Received Image of size 115032 bytes
2,894,750 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,123 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,779 ready_for_fw is high
1,362,779 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,247 >>> mbox cmd response: success
2,998,885 UART:
2,998,901 UART: Running Caliptra FMC ...
2,999,309 UART:
2,999,363 UART: [state] CFI Enabled
3,009,634 UART: [fht] FMC Alias Private Key: 7
3,117,341 UART: [art] Extend RT PCRs Done
3,117,769 UART: [art] Lock RT PCRs Done
3,119,379 UART: [art] Populate DV Done
3,127,628 UART: [fht] FMC Alias Private Key: 7
3,128,728 UART: [art] Derive CDI
3,129,008 UART: [art] Store in in slot 0x4
3,214,255 UART: [art] Derive Key Pair
3,214,615 UART: [art] Store priv key in slot 0x5
3,227,675 UART: [art] Derive Key Pair - Done
3,242,428 UART: [art] Signing Cert with AUTHO
3,242,908 UART: RITY.KEYID = 7
3,257,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,653 UART: [art] PUB.X = 1ABA802BBA69A0124F25EA8EAFC026D76A7C0BA14C2C624870C9C7CB9476D012CC05760689C822CF536D317CED3BE842
3,265,426 UART: [art] PUB.Y = 8EDE39EEC580FAF9E5F97328CECF74D78FDF67AF9EA07F4069514928959F55A84A645931EA51C1FCE9E25A2334F0EA01
3,272,387 UART: [art] SIG.R = 7AC40215F4BFDCA54088D9A60D66BFAB2DE426154850A1C975E3127CA3E9591EA76B43558892E0CA3B0495E9394D232F
3,279,152 UART: [art] SIG.S = F1EE926B05D7D99CB07603F6AD889F07C8FFBF970207BD4F2A6386598C8C01991AE66C1A27C0370091F0818B984E4126
3,303,057 UART: Caliptra RT
3,303,310 UART: [state] CFI Enabled
3,411,859 UART: [rt] RT listening for mailbox commands...
3,412,522 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,467 UART: [rt]cmd =0x46504c54, len=4
3,443,651 >>> mbox cmd response data (8 bytes)
3,443,986 UART: [rt] FIPS self test
3,444,314 UART: [kat] ++
3,444,466 UART: [kat] sha1
3,448,830 UART: [kat] SHA2-256
3,450,852 UART: [kat] SHA2-384
3,453,893 UART: [kat] SHA2-512-ACC
3,454,298 UART: Droping operation
3,454,863 UART: Fatal Error: 0x90050002
3,456,402 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,456,407 >>> mbox cmd response: failed
3,456,407 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,456,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,355 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,561 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,240 UART: [kat] SHA2-256
882,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,286 UART: [kat] ++
886,438 UART: [kat] sha1
890,702 UART: [kat] SHA2-256
892,640 UART: [kat] SHA2-384
895,277 UART: [kat] SHA2-512-ACC
897,178 UART: [kat] ECC-384
902,547 UART: [kat] HMAC-384Kdf
907,267 UART: [kat] LMS
1,475,463 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,876 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 ready_for_fw is high
1,481,120 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,029 UART: [idev] Erasing UDS.KEYID = 0
1,506,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,977 UART: [idev] --
1,516,174 UART: [ldev] ++
1,516,342 UART: [ldev] CDI.KEYID = 6
1,516,705 UART: [ldev] SUBJECT.KEYID = 5
1,517,131 UART: [ldev] AUTHORITY.KEYID = 7
1,517,594 UART: [ldev] FE.KEYID = 1
1,522,486 UART: [ldev] Erasing FE.KEYID = 1
1,547,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,757 UART: [ldev] --
1,587,152 UART: [fwproc] Waiting for Commands...
1,587,819 UART: [fwproc] Received command 0x46574c44
1,588,610 UART: [fwproc] Received Image of size 115032 bytes
2,893,747 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,317 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,669 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,570 >>> mbox cmd response: success
3,088,622 UART: [afmc] ++
3,088,790 UART: [afmc] CDI.KEYID = 6
3,089,152 UART: [afmc] SUBJECT.KEYID = 7
3,089,577 UART: [afmc] AUTHORITY.KEYID = 5
3,124,828 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,974 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,754 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,147,482 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,367 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,057 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,888 UART: [afmc] --
3,167,796 UART: [cold-reset] --
3,168,742 UART: [state] Locking Datavault
3,169,869 UART: [state] Locking PCR0, PCR1 and PCR31
3,170,473 UART: [state] Locking ICCM
3,171,001 UART: [exit] Launching FMC @ 0x40000130
3,176,330 UART:
3,176,346 UART: Running Caliptra FMC ...
3,176,754 UART:
3,176,897 UART: [state] CFI Enabled
3,187,686 UART: [fht] FMC Alias Private Key: 7
3,295,371 UART: [art] Extend RT PCRs Done
3,295,799 UART: [art] Lock RT PCRs Done
3,297,295 UART: [art] Populate DV Done
3,305,584 UART: [fht] FMC Alias Private Key: 7
3,306,700 UART: [art] Derive CDI
3,306,980 UART: [art] Store in in slot 0x4
3,392,859 UART: [art] Derive Key Pair
3,393,219 UART: [art] Store priv key in slot 0x5
3,406,469 UART: [art] Derive Key Pair - Done
3,421,107 UART: [art] Signing Cert with AUTHO
3,421,587 UART: RITY.KEYID = 7
3,436,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,764 UART: [art] PUB.X = 0D64BDF13C916CEFEE3ED8F1C61649CDF96718371557666799B27F7E7B86CBB876A014B0EE73BD00EC71EA1E58F80F3D
3,444,520 UART: [art] PUB.Y = 2056E03B847C22EA643460F81163C21D895B8AF41DC328EDC196C63C2DB941DE4A677DAA8C26CD4391A9CA3C73F20B59
3,451,475 UART: [art] SIG.R = 30E565A4C94FF219E6479B164AE7DFAD1440B9CA668B28722C1DA0D5385282BAC3FDD3C84C25AF949BEF1A817CCF6752
3,458,259 UART: [art] SIG.S = D1DD1546252C703D5857CAEADAE56A51E0455552B9708BDBDC5BFD4C8396DB2530AA0780AF49BB045E09AA641AFDA698
3,482,189 UART: Caliptra RT
3,482,534 UART: [state] CFI Enabled
3,592,043 UART: [rt] RT listening for mailbox commands...
3,592,706 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,622,773 UART: [rt]cmd =0x46504c54, len=4
3,623,871 >>> mbox cmd response data (8 bytes)
3,624,070 UART: [rt] FIPS self test
3,624,398 UART: [kat] ++
3,624,550 UART: [kat] sha1
3,628,934 UART: [kat] SHA2-256
3,630,956 UART: [kat] SHA2-384
3,633,787 UART: [kat] SHA2-512-ACC
3,634,192 UART: Droping operation
3,634,683 UART: Fatal Error: 0x90050002
3,636,222 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,636,227 >>> mbox cmd response: failed
3,636,227 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,636,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,366 UART: [kat] SHA2-256
882,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,412 UART: [kat] ++
886,564 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,739 UART: [kat] HMAC-384Kdf
907,347 UART: [kat] LMS
1,475,543 UART: [kat] --
1,476,702 UART: [cold-reset] ++
1,477,090 UART: [fht] Storing FHT @ 0x50003400
1,479,893 UART: [idev] ++
1,480,061 UART: [idev] CDI.KEYID = 6
1,480,421 UART: [idev] SUBJECT.KEYID = 7
1,480,845 UART: [idev] UDS.KEYID = 0
1,481,190 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,209 UART: [idev] Erasing UDS.KEYID = 0
1,506,273 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,921 UART: [idev] --
1,516,074 UART: [ldev] ++
1,516,242 UART: [ldev] CDI.KEYID = 6
1,516,605 UART: [ldev] SUBJECT.KEYID = 5
1,517,031 UART: [ldev] AUTHORITY.KEYID = 7
1,517,494 UART: [ldev] FE.KEYID = 1
1,522,802 UART: [ldev] Erasing FE.KEYID = 1
1,548,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,085 UART: [ldev] --
1,587,360 UART: [fwproc] Waiting for Commands...
1,588,159 UART: [fwproc] Received command 0x46574c44
1,588,950 UART: [fwproc] Received Image of size 115032 bytes
2,893,915 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,677 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,029 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,089,014 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,318 ready_for_fw is high
1,363,318 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,310 >>> mbox cmd response: success
2,999,838 UART:
2,999,854 UART: Running Caliptra FMC ...
3,000,262 UART:
3,000,405 UART: [state] CFI Enabled
3,011,440 UART: [fht] FMC Alias Private Key: 7
3,119,251 UART: [art] Extend RT PCRs Done
3,119,679 UART: [art] Lock RT PCRs Done
3,121,431 UART: [art] Populate DV Done
3,129,912 UART: [fht] FMC Alias Private Key: 7
3,131,010 UART: [art] Derive CDI
3,131,290 UART: [art] Store in in slot 0x4
3,217,191 UART: [art] Derive Key Pair
3,217,551 UART: [art] Store priv key in slot 0x5
3,231,119 UART: [art] Derive Key Pair - Done
3,245,927 UART: [art] Signing Cert with AUTHO
3,246,407 UART: RITY.KEYID = 7
3,261,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,694 UART: [art] PUB.X = AE68F81D562E1035878BEBC1557B65CB30443BDF100D8E82B63BBDEA846386F53834D4D61FC75B49C00A275461CFAE10
3,269,466 UART: [art] PUB.Y = 043D5D687C5C7B015137B78E612C7A318A14144E6C5D4888A6662C94DE99C426C83EED297C763FEF70B2D8A63C94AA9D
3,276,414 UART: [art] SIG.R = 8F25D2C6C953893E931DBBD5BA7186E446C0BEEA1AF60EF8FBE8811FF115B0AD378CC0316C78978D8F75B4AF118AA062
3,283,197 UART: [art] SIG.S = 34659FE305BAC2A64E067B577353002DB9BABCEFA1A5852152C750CBD26829AB9A74DEA441E6EED12329C203073A10CF
3,307,066 UART: Caliptra RT
3,307,411 UART: [state] CFI Enabled
3,415,460 UART: [rt] RT listening for mailbox commands...
3,416,123 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,016 UART: [rt]cmd =0x46504c54, len=4
3,447,172 >>> mbox cmd response data (8 bytes)
3,447,509 UART: [rt] FIPS self test
3,447,837 UART: [kat] ++
3,447,989 UART: [kat] sha1
3,452,155 UART: [kat] SHA2-256
3,454,177 UART: [kat] SHA2-384
3,456,976 UART: [kat] SHA2-512-ACC
3,457,381 UART: Droping operation
3,457,984 UART: Fatal Error: 0x90050002
3,459,523 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,459,528 >>> mbox cmd response: failed
3,459,528 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,459,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,960 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,258 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
893,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,525 UART: [kat] ++
897,677 UART: [kat] sha1
901,845 UART: [kat] SHA2-256
903,785 UART: [kat] SHA2-384
906,572 UART: [kat] SHA2-512-ACC
908,473 UART: [kat] ECC-384
918,064 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,171,889 UART: [cold-reset] ++
1,172,349 UART: [fht] FHT @ 0x50003400
1,175,062 UART: [idev] ++
1,175,230 UART: [idev] CDI.KEYID = 6
1,175,590 UART: [idev] SUBJECT.KEYID = 7
1,176,014 UART: [idev] UDS.KEYID = 0
1,176,359 ready_for_fw is high
1,176,359 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,292 UART: [idev] Erasing UDS.KEYID = 0
1,201,423 UART: [idev] Sha1 KeyId Algorithm
1,209,893 UART: [idev] --
1,210,893 UART: [ldev] ++
1,211,061 UART: [ldev] CDI.KEYID = 6
1,211,424 UART: [ldev] SUBJECT.KEYID = 5
1,211,850 UART: [ldev] AUTHORITY.KEYID = 7
1,212,313 UART: [ldev] FE.KEYID = 1
1,217,333 UART: [ldev] Erasing FE.KEYID = 1
1,243,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,082 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,783 UART: [ldev] --
1,283,190 UART: [fwproc] Wait for Commands...
1,284,006 UART: [fwproc] Recv command 0x46574c44
1,284,734 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,531 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,835 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,632 >>> mbox cmd response: success
2,784,892 UART: [afmc] ++
2,785,060 UART: [afmc] CDI.KEYID = 6
2,785,422 UART: [afmc] SUBJECT.KEYID = 7
2,785,847 UART: [afmc] AUTHORITY.KEYID = 5
2,821,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,775 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,503 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,388 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,107 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,891 UART: [afmc] --
2,864,795 UART: [cold-reset] --
2,865,615 UART: [state] Locking Datavault
2,866,572 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,176 UART: [state] Locking ICCM
2,867,736 UART: [exit] Launching FMC @ 0x40000130
2,873,065 UART:
2,873,081 UART: Running Caliptra FMC ...
2,873,489 UART:
2,873,543 UART: [state] CFI Enabled
2,883,946 UART: [fht] FMC Alias Private Key: 7
2,991,497 UART: [art] Extend RT PCRs Done
2,991,925 UART: [art] Lock RT PCRs Done
2,993,409 UART: [art] Populate DV Done
3,001,510 UART: [fht] FMC Alias Private Key: 7
3,002,588 UART: [art] Derive CDI
3,002,868 UART: [art] Store in in slot 0x4
3,088,319 UART: [art] Derive Key Pair
3,088,679 UART: [art] Store priv key in slot 0x5
3,102,171 UART: [art] Derive Key Pair - Done
3,116,772 UART: [art] Signing Cert with AUTHO
3,117,252 UART: RITY.KEYID = 7
3,132,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,273 UART: [art] PUB.X = B379C3719DA4AFD026CDB29C5EB2344218419033F85032FDCF4F1804C3E6D0CEBC7D668B7FE0FDE81C949A784B08625C
3,140,049 UART: [art] PUB.Y = 832015F90777F8F0904841A10FC32E9E7DC3CEEC20B0854294922706CBF181AD93EC86746D52529AEDA3A8967B0F4472
3,146,985 UART: [art] SIG.R = 3FE36B3C6E39D14D5C8F6DC12241DACCC766EDA84B18F30105825D9DD45D7BE53961922CE5D37AA1762DA3F2BA24254E
3,153,763 UART: [art] SIG.S = 276315B23C05C90B013F07D412AFB15B7E77698C66D3EAC7ADD6B60AD9A17D3BD9746F26EDD8E8B2C1F522745CE983EF
3,177,039 UART: Caliptra RT
3,177,292 UART: [state] CFI Enabled
3,285,577 UART: [rt] RT listening for mailbox commands...
3,286,240 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,829 UART: [rt]cmd =0x46504c54, len=4
3,317,013 >>> mbox cmd response data (8 bytes)
3,317,268 UART: [rt] FIPS self test
3,317,596 UART: [kat] ++
3,317,748 UART: [kat] sha1
3,322,050 UART: [kat] SHA2-256
3,324,072 UART: [kat] SHA2-384
3,327,087 UART: [kat] SHA2-512-ACC
3,327,492 UART: Droping operation
3,327,885 UART: Fatal Error: 0x90050002
3,329,424 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,329,429 >>> mbox cmd response: failed
3,329,429 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,329,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,658 UART: [state] LifecycleState = Unprovisioned
86,313 UART: [state] DebugLocked = No
87,009 UART: [state] WD Timer not started. Device not locked for debugging
88,342 UART: [kat] SHA2-256
893,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,117 UART: [kat] ++
898,269 UART: [kat] sha1
902,559 UART: [kat] SHA2-256
904,499 UART: [kat] SHA2-384
907,248 UART: [kat] SHA2-512-ACC
909,149 UART: [kat] ECC-384
918,612 UART: [kat] HMAC-384Kdf
923,316 UART: [kat] LMS
1,171,644 UART: [kat] --
1,172,729 UART: [cold-reset] ++
1,173,235 UART: [fht] FHT @ 0x50003400
1,176,070 UART: [idev] ++
1,176,238 UART: [idev] CDI.KEYID = 6
1,176,598 UART: [idev] SUBJECT.KEYID = 7
1,177,022 UART: [idev] UDS.KEYID = 0
1,177,367 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,894 UART: [idev] Erasing UDS.KEYID = 0
1,201,405 UART: [idev] Sha1 KeyId Algorithm
1,209,923 UART: [idev] --
1,211,015 UART: [ldev] ++
1,211,183 UART: [ldev] CDI.KEYID = 6
1,211,546 UART: [ldev] SUBJECT.KEYID = 5
1,211,972 UART: [ldev] AUTHORITY.KEYID = 7
1,212,435 UART: [ldev] FE.KEYID = 1
1,217,585 UART: [ldev] Erasing FE.KEYID = 1
1,244,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,271 UART: [ldev] --
1,283,558 UART: [fwproc] Wait for Commands...
1,284,220 UART: [fwproc] Recv command 0x46574c44
1,284,948 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,167 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,471 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,378 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,877 ready_for_fw is high
1,059,877 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,261 >>> mbox cmd response: success
2,693,899 UART:
2,693,915 UART: Running Caliptra FMC ...
2,694,323 UART:
2,694,377 UART: [state] CFI Enabled
2,705,078 UART: [fht] FMC Alias Private Key: 7
2,813,223 UART: [art] Extend RT PCRs Done
2,813,651 UART: [art] Lock RT PCRs Done
2,815,187 UART: [art] Populate DV Done
2,823,536 UART: [fht] FMC Alias Private Key: 7
2,824,692 UART: [art] Derive CDI
2,824,972 UART: [art] Store in in slot 0x4
2,910,533 UART: [art] Derive Key Pair
2,910,893 UART: [art] Store priv key in slot 0x5
2,924,925 UART: [art] Derive Key Pair - Done
2,939,676 UART: [art] Signing Cert with AUTHO
2,940,156 UART: RITY.KEYID = 7
2,955,518 UART: [art] Erasing AUTHORITY.KEYID = 7
2,956,283 UART: [art] PUB.X = 5C930E219EAEB07CB0CB46B1AC8CCDE585EF130A9B7359BB8856AFBF0DBB9634086C536609109ECEFBFA6CC2BE0E1116
2,963,059 UART: [art] PUB.Y = 108B5C5C4E4CB9420983C5E8778124455F036B3C78865FA1828162DD2B9811C506088D2D72D95172B2C4C64C077F4655
2,969,982 UART: [art] SIG.R = 577242569A30784A5E8DADBE26F7F38399A4E185F0102B2FFF96259A040B5A58F8FFD97250ED5F03A1C79DAB000BC11D
2,976,726 UART: [art] SIG.S = 82D97661484A542366CBD217722FF4EDA7968982530CBB66154872CEF2486FDA13055874044D065156D0D1E58DC2E0A0
3,000,831 UART: Caliptra RT
3,001,084 UART: [state] CFI Enabled
3,108,697 UART: [rt] RT listening for mailbox commands...
3,109,360 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,033 UART: [rt]cmd =0x46504c54, len=4
3,140,253 >>> mbox cmd response data (8 bytes)
3,140,406 UART: [rt] FIPS self test
3,140,734 UART: [kat] ++
3,140,886 UART: [kat] sha1
3,145,224 UART: [kat] SHA2-256
3,147,246 UART: [kat] SHA2-384
3,149,991 UART: [kat] SHA2-512-ACC
3,150,396 UART: Droping operation
3,150,907 UART: Fatal Error: 0x90050002
3,152,446 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,451 >>> mbox cmd response: failed
3,152,451 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,597 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,823 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,127 UART: [state] LifecycleState = Unprovisioned
85,782 UART: [state] DebugLocked = No
86,452 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
893,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,454 UART: [kat] ++
897,606 UART: [kat] sha1
901,860 UART: [kat] SHA2-256
903,800 UART: [kat] SHA2-384
906,619 UART: [kat] SHA2-512-ACC
908,520 UART: [kat] ECC-384
918,177 UART: [kat] HMAC-384Kdf
922,771 UART: [kat] LMS
1,171,099 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,552 UART: [fht] FHT @ 0x50003400
1,175,091 UART: [idev] ++
1,175,259 UART: [idev] CDI.KEYID = 6
1,175,619 UART: [idev] SUBJECT.KEYID = 7
1,176,043 UART: [idev] UDS.KEYID = 0
1,176,388 ready_for_fw is high
1,176,388 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,429 UART: [idev] Erasing UDS.KEYID = 0
1,200,990 UART: [idev] Sha1 KeyId Algorithm
1,209,496 UART: [idev] --
1,210,628 UART: [ldev] ++
1,210,796 UART: [ldev] CDI.KEYID = 6
1,211,159 UART: [ldev] SUBJECT.KEYID = 5
1,211,585 UART: [ldev] AUTHORITY.KEYID = 7
1,212,048 UART: [ldev] FE.KEYID = 1
1,217,260 UART: [ldev] Erasing FE.KEYID = 1
1,244,105 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,802 UART: [ldev] --
1,283,311 UART: [fwproc] Wait for Commands...
1,284,109 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,594 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,898 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,671 >>> mbox cmd response: success
2,783,683 UART: [afmc] ++
2,783,851 UART: [afmc] CDI.KEYID = 6
2,784,213 UART: [afmc] SUBJECT.KEYID = 7
2,784,638 UART: [afmc] AUTHORITY.KEYID = 5
2,820,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,724 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,452 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,337 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,056 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,894 UART: [afmc] --
2,863,910 UART: [cold-reset] --
2,864,650 UART: [state] Locking Datavault
2,865,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,595 UART: [state] Locking ICCM
2,867,139 UART: [exit] Launching FMC @ 0x40000130
2,872,468 UART:
2,872,484 UART: Running Caliptra FMC ...
2,872,892 UART:
2,873,035 UART: [state] CFI Enabled
2,883,800 UART: [fht] FMC Alias Private Key: 7
2,991,537 UART: [art] Extend RT PCRs Done
2,991,965 UART: [art] Lock RT PCRs Done
2,993,405 UART: [art] Populate DV Done
3,001,590 UART: [fht] FMC Alias Private Key: 7
3,002,680 UART: [art] Derive CDI
3,002,960 UART: [art] Store in in slot 0x4
3,088,673 UART: [art] Derive Key Pair
3,089,033 UART: [art] Store priv key in slot 0x5
3,102,003 UART: [art] Derive Key Pair - Done
3,116,594 UART: [art] Signing Cert with AUTHO
3,117,074 UART: RITY.KEYID = 7
3,132,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,157 UART: [art] PUB.X = 3A635CB74F2BDA8FEA8125D8C7F0F751F4A50EB7EC2A1930C77F7D885AE10E61629FF8E4BFAB9FB24D02554B19A3FC2B
3,139,940 UART: [art] PUB.Y = 280231451E3F494DB07ABF32E65B06138F4F81A3D27B15D7B111EA90C55D9C3454BD8CE178098CBC560A6B2593AFF1FF
3,146,886 UART: [art] SIG.R = 6A1DB06B23443246C3573784762AF4CB6424127322C676E12EB585888779CF1AC13D3FB7FBBD1CF21D3EB96D83A829CE
3,153,660 UART: [art] SIG.S = 135F3231FDF34D65CE7D66C6A4B00C274830B89111112AB30A248E83648096646E9561BB56A5D269F5C5403D14DF5FBE
3,177,757 UART: Caliptra RT
3,178,102 UART: [state] CFI Enabled
3,285,551 UART: [rt] RT listening for mailbox commands...
3,286,214 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,763 UART: [rt]cmd =0x46504c54, len=4
3,316,769 >>> mbox cmd response data (8 bytes)
3,317,136 UART: [rt] FIPS self test
3,317,464 UART: [kat] ++
3,317,616 UART: [kat] sha1
3,321,858 UART: [kat] SHA2-256
3,323,880 UART: [kat] SHA2-384
3,326,805 UART: [kat] SHA2-512-ACC
3,327,210 UART: Droping operation
3,327,813 UART: Fatal Error: 0x90050002
3,329,352 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,329,357 >>> mbox cmd response: failed
3,329,357 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,329,362 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,781 UART: [state] LifecycleState = Unprovisioned
86,436 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,383 UART: [kat] SHA2-256
894,033 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,158 UART: [kat] ++
898,310 UART: [kat] sha1
902,420 UART: [kat] SHA2-256
904,360 UART: [kat] SHA2-384
907,075 UART: [kat] SHA2-512-ACC
908,976 UART: [kat] ECC-384
918,623 UART: [kat] HMAC-384Kdf
923,127 UART: [kat] LMS
1,171,455 UART: [kat] --
1,172,272 UART: [cold-reset] ++
1,172,778 UART: [fht] FHT @ 0x50003400
1,175,513 UART: [idev] ++
1,175,681 UART: [idev] CDI.KEYID = 6
1,176,041 UART: [idev] SUBJECT.KEYID = 7
1,176,465 UART: [idev] UDS.KEYID = 0
1,176,810 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,535 UART: [idev] Erasing UDS.KEYID = 0
1,201,984 UART: [idev] Sha1 KeyId Algorithm
1,210,482 UART: [idev] --
1,211,612 UART: [ldev] ++
1,211,780 UART: [ldev] CDI.KEYID = 6
1,212,143 UART: [ldev] SUBJECT.KEYID = 5
1,212,569 UART: [ldev] AUTHORITY.KEYID = 7
1,213,032 UART: [ldev] FE.KEYID = 1
1,218,004 UART: [ldev] Erasing FE.KEYID = 1
1,244,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,584 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,418 UART: [ldev] --
1,283,753 UART: [fwproc] Wait for Commands...
1,284,377 UART: [fwproc] Recv command 0x46574c44
1,285,105 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,014 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,318 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,311 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,506 ready_for_fw is high
1,060,506 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,978 >>> mbox cmd response: success
2,697,644 UART:
2,697,660 UART: Running Caliptra FMC ...
2,698,068 UART:
2,698,211 UART: [state] CFI Enabled
2,708,480 UART: [fht] FMC Alias Private Key: 7
2,815,607 UART: [art] Extend RT PCRs Done
2,816,035 UART: [art] Lock RT PCRs Done
2,817,699 UART: [art] Populate DV Done
2,825,932 UART: [fht] FMC Alias Private Key: 7
2,826,888 UART: [art] Derive CDI
2,827,168 UART: [art] Store in in slot 0x4
2,912,691 UART: [art] Derive Key Pair
2,913,051 UART: [art] Store priv key in slot 0x5
2,926,269 UART: [art] Derive Key Pair - Done
2,940,754 UART: [art] Signing Cert with AUTHO
2,941,234 UART: RITY.KEYID = 7
2,956,446 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,211 UART: [art] PUB.X = 8ED0970A63D4D438E563C09D1F07FD383915F36848991B2F69B1EDAFF7A3938C702475564491D6732572E13E0BB9BBF3
2,963,970 UART: [art] PUB.Y = A5B915B97098D72A0D01BDF577BF18CB84B13023379239979AE9E3A53FC263772D6D3B60F241CCCCC7C14D3892134B4D
2,970,918 UART: [art] SIG.R = 8DAAC81AF3C6F9E1F4956C10BC327A337F73C10418D4D16516B4D04DF7BA967FE778E425449A027F1209121DA9DC8C00
2,977,663 UART: [art] SIG.S = 99563AAFBEA472665582BFA0DE4E38F47A189B14C56E7A080B8CAF0D62B0240E32B0175C6A99A31CC8B339A20604E207
3,000,871 UART: Caliptra RT
3,001,216 UART: [state] CFI Enabled
3,108,944 UART: [rt] RT listening for mailbox commands...
3,109,607 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,622 UART: [rt]cmd =0x46504c54, len=4
3,140,718 >>> mbox cmd response data (8 bytes)
3,140,977 UART: [rt] FIPS self test
3,141,305 UART: [kat] ++
3,141,457 UART: [kat] sha1
3,145,587 UART: [kat] SHA2-256
3,147,609 UART: [kat] SHA2-384
3,150,530 UART: [kat] SHA2-512-ACC
3,150,935 UART: Droping operation
3,151,556 UART: Fatal Error: 0x90050002
3,153,095 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,153,100 >>> mbox cmd response: failed
3,153,100 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,153,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,792 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,046 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,434 UART: [kat] SHA2-256
890,984 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,113 UART: [kat] ++
895,265 UART: [kat] sha1
899,599 UART: [kat] SHA2-256
901,539 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
915,818 UART: [kat] HMAC-384Kdf
920,528 UART: [kat] LMS
1,168,840 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,267 UART: [fht] FHT @ 0x50003400
1,172,923 UART: [idev] ++
1,173,091 UART: [idev] CDI.KEYID = 6
1,173,452 UART: [idev] SUBJECT.KEYID = 7
1,173,877 UART: [idev] UDS.KEYID = 0
1,174,223 ready_for_fw is high
1,174,223 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,791 UART: [idev] Erasing UDS.KEYID = 0
1,199,113 UART: [idev] Sha1 KeyId Algorithm
1,207,821 UART: [idev] --
1,208,840 UART: [ldev] ++
1,209,008 UART: [ldev] CDI.KEYID = 6
1,209,372 UART: [ldev] SUBJECT.KEYID = 5
1,209,799 UART: [ldev] AUTHORITY.KEYID = 7
1,210,262 UART: [ldev] FE.KEYID = 1
1,215,520 UART: [ldev] Erasing FE.KEYID = 1
1,241,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,826 UART: [ldev] --
1,281,248 UART: [fwproc] Wait for Commands...
1,282,065 UART: [fwproc] Recv command 0x46574c44
1,282,798 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,365 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,674 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,422 >>> mbox cmd response: success
2,783,447 UART: [afmc] ++
2,783,615 UART: [afmc] CDI.KEYID = 6
2,783,978 UART: [afmc] SUBJECT.KEYID = 7
2,784,404 UART: [afmc] AUTHORITY.KEYID = 5
2,819,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,239 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,122 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,841 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,568 UART: [afmc] --
2,862,450 UART: [cold-reset] --
2,863,250 UART: [state] Locking Datavault
2,864,705 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,309 UART: [state] Locking ICCM
2,865,929 UART: [exit] Launching FMC @ 0x40000130
2,871,258 UART:
2,871,274 UART: Running Caliptra FMC ...
2,871,682 UART:
2,871,736 UART: [state] CFI Enabled
2,882,377 UART: [fht] FMC Alias Private Key: 7
2,990,068 UART: [art] Extend RT PCRs Done
2,990,496 UART: [art] Lock RT PCRs Done
2,991,862 UART: [art] Populate DV Done
3,000,157 UART: [fht] FMC Alias Private Key: 7
3,001,145 UART: [art] Derive CDI
3,001,425 UART: [art] Store in in slot 0x4
3,086,786 UART: [art] Derive Key Pair
3,087,146 UART: [art] Store priv key in slot 0x5
3,100,640 UART: [art] Derive Key Pair - Done
3,115,258 UART: [art] Signing Cert with AUTHO
3,115,738 UART: RITY.KEYID = 7
3,131,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,075 UART: [art] PUB.X = 55B1AE5F6119E754D4F5EA7AF69503AA0827C85D43F7F76E79CCC70594CD52B0E317CABB2FFAA3525F75E40521E579EC
3,138,847 UART: [art] PUB.Y = 2652C720840084AE3AA12F2ED09B4BD9094066EB299D1F79EAE1E8A1A5ACE84FDBD6EF2192264E5FBD0982F204B4B6C9
3,145,780 UART: [art] SIG.R = A7D5DFE78D4B0374BBBB91187CA482DE5EAA0279F3DA499B61C0477D2E990EEFF5A6640E1B986F3BAFAFC908878C21B5
3,152,555 UART: [art] SIG.S = AA424B7836E8142AE1FB56D65C3612E88B01438F06345A99FC72FCA0650241A5E49CDE99C5DEDDB2E06097E7E2AD244B
3,175,745 UART: Caliptra RT
3,175,998 UART: [state] CFI Enabled
3,283,570 UART: [rt] RT listening for mailbox commands...
3,284,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,984 UART: [rt]cmd =0x46504c54, len=4
3,315,184 >>> mbox cmd response data (8 bytes)
3,315,429 UART: [rt] FIPS self test
3,315,757 UART: [kat] ++
3,315,909 UART: [kat] sha1
3,320,147 UART: [kat] SHA2-256
3,322,169 UART: [kat] SHA2-384
3,324,894 UART: [kat] SHA2-512-ACC
3,325,299 UART: Droping operation
3,325,722 UART: Fatal Error: 0x90050002
3,327,261 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,266 >>> mbox cmd response: failed
3,327,266 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
85,893 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
894,903 UART: [kat] ++
895,055 UART: [kat] sha1
899,225 UART: [kat] SHA2-256
901,165 UART: [kat] SHA2-384
903,832 UART: [kat] SHA2-512-ACC
905,733 UART: [kat] ECC-384
914,924 UART: [kat] HMAC-384Kdf
919,594 UART: [kat] LMS
1,167,906 UART: [kat] --
1,168,867 UART: [cold-reset] ++
1,169,195 UART: [fht] FHT @ 0x50003400
1,171,809 UART: [idev] ++
1,171,977 UART: [idev] CDI.KEYID = 6
1,172,338 UART: [idev] SUBJECT.KEYID = 7
1,172,763 UART: [idev] UDS.KEYID = 0
1,173,109 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,180,801 UART: [idev] Erasing UDS.KEYID = 0
1,197,733 UART: [idev] Sha1 KeyId Algorithm
1,206,709 UART: [idev] --
1,207,892 UART: [ldev] ++
1,208,060 UART: [ldev] CDI.KEYID = 6
1,208,424 UART: [ldev] SUBJECT.KEYID = 5
1,208,851 UART: [ldev] AUTHORITY.KEYID = 7
1,209,314 UART: [ldev] FE.KEYID = 1
1,214,698 UART: [ldev] Erasing FE.KEYID = 1
1,241,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,512 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,659 UART: [fwproc] Recv command 0x46574c44
1,282,392 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,508 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,426 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,872 ready_for_fw is high
1,055,872 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,924 >>> mbox cmd response: success
2,691,708 UART:
2,691,724 UART: Running Caliptra FMC ...
2,692,132 UART:
2,692,186 UART: [state] CFI Enabled
2,702,845 UART: [fht] FMC Alias Private Key: 7
2,810,804 UART: [art] Extend RT PCRs Done
2,811,232 UART: [art] Lock RT PCRs Done
2,812,896 UART: [art] Populate DV Done
2,821,193 UART: [fht] FMC Alias Private Key: 7
2,822,145 UART: [art] Derive CDI
2,822,425 UART: [art] Store in in slot 0x4
2,908,392 UART: [art] Derive Key Pair
2,908,752 UART: [art] Store priv key in slot 0x5
2,922,070 UART: [art] Derive Key Pair - Done
2,936,632 UART: [art] Signing Cert with AUTHO
2,937,112 UART: RITY.KEYID = 7
2,952,162 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,927 UART: [art] PUB.X = CFD711863C8C9C192C8C35D768EF78131C5AE292E7CF29F9F27F22551BEAC3C53DDEBAA796E2B69489A2D348125FA024
2,959,709 UART: [art] PUB.Y = 3ECB4289F829F5DA9334B3F9EDA43562BCDB3E3E3F5F4EB158CA3FDD0ACEF52C80B907940A5864381EA4BC4771C487DD
2,966,670 UART: [art] SIG.R = E9C56AF9339AC3A09E99C4C84359E0BD4075CC4A3A9F7E9AAE52B55D385E297046029A867507B1BC028BD834D80A28B3
2,973,434 UART: [art] SIG.S = 91E72222770A875F793B09D2339380419A4B3F625FBFD2043DB1475A9DC72AF00FFAFA372A89DC7D1033FFB4C3323F29
2,997,047 UART: Caliptra RT
2,997,300 UART: [state] CFI Enabled
3,104,552 UART: [rt] RT listening for mailbox commands...
3,105,215 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,166 UART: [rt]cmd =0x46504c54, len=4
3,136,426 >>> mbox cmd response data (8 bytes)
3,136,689 UART: [rt] FIPS self test
3,137,017 UART: [kat] ++
3,137,169 UART: [kat] sha1
3,141,337 UART: [kat] SHA2-256
3,143,359 UART: [kat] SHA2-384
3,146,092 UART: [kat] SHA2-512-ACC
3,146,497 UART: Droping operation
3,147,006 UART: Fatal Error: 0x90050002
3,148,545 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,148,550 >>> mbox cmd response: failed
3,148,550 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,148,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,402 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,628,934 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
891,095 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,279 UART: [kat] SHA2-512-ACC
906,180 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,720 UART: [fht] FHT @ 0x50003400
1,173,232 UART: [idev] ++
1,173,400 UART: [idev] CDI.KEYID = 6
1,173,761 UART: [idev] SUBJECT.KEYID = 7
1,174,186 UART: [idev] UDS.KEYID = 0
1,174,532 ready_for_fw is high
1,174,532 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,030 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,208,376 UART: [idev] --
1,209,403 UART: [ldev] ++
1,209,571 UART: [ldev] CDI.KEYID = 6
1,209,935 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,216,067 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,081 UART: [ldev] --
1,282,405 UART: [fwproc] Wait for Commands...
1,282,988 UART: [fwproc] Recv command 0x46574c44
1,283,721 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,440 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,749 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,647 >>> mbox cmd response: success
2,783,672 UART: [afmc] ++
2,783,840 UART: [afmc] CDI.KEYID = 6
2,784,203 UART: [afmc] SUBJECT.KEYID = 7
2,784,629 UART: [afmc] AUTHORITY.KEYID = 5
2,819,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,831 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,560 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,443 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,162 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,079 UART: [afmc] --
2,863,167 UART: [cold-reset] --
2,863,957 UART: [state] Locking Datavault
2,864,992 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,596 UART: [state] Locking ICCM
2,866,046 UART: [exit] Launching FMC @ 0x40000130
2,871,375 UART:
2,871,391 UART: Running Caliptra FMC ...
2,871,799 UART:
2,871,942 UART: [state] CFI Enabled
2,882,535 UART: [fht] FMC Alias Private Key: 7
2,990,606 UART: [art] Extend RT PCRs Done
2,991,034 UART: [art] Lock RT PCRs Done
2,992,730 UART: [art] Populate DV Done
3,001,047 UART: [fht] FMC Alias Private Key: 7
3,001,985 UART: [art] Derive CDI
3,002,265 UART: [art] Store in in slot 0x4
3,088,168 UART: [art] Derive Key Pair
3,088,528 UART: [art] Store priv key in slot 0x5
3,101,972 UART: [art] Derive Key Pair - Done
3,116,884 UART: [art] Signing Cert with AUTHO
3,117,364 UART: RITY.KEYID = 7
3,132,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,241 UART: [art] PUB.X = 6C99E3F4B6BEEC80348DADAEDA1AE6690256FD869E93C077321256777F14EDE17DB91945DAC99F99E9B618FB32D6977D
3,140,020 UART: [art] PUB.Y = 0872F52FDCE9573CFF4C8B84D4434D9D88143229AB78CEDC617064B64C7A992FB9B8C419A07C2B55BDF81CC066BD8BBA
3,146,983 UART: [art] SIG.R = CD86CE84FFEFF5C25136D61E86B437C3B497D26A93350ECDBC2DA210072BD99AA00F77F3C23F6B33E6AA2F8B37DB7964
3,153,762 UART: [art] SIG.S = 99BDA417C67A0C5F4A63B0D40C47C1D309ECDAC81F29E76FB5FDB21B07F66E04B53CD1F44D24E343818D4004B40A7AF0
3,177,768 UART: Caliptra RT
3,178,113 UART: [state] CFI Enabled
3,287,513 UART: [rt] RT listening for mailbox commands...
3,288,176 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,945 UART: [rt]cmd =0x46504c54, len=4
3,319,033 >>> mbox cmd response data (8 bytes)
3,319,244 UART: [rt] FIPS self test
3,319,572 UART: [kat] ++
3,319,724 UART: [kat] sha1
3,323,900 UART: [kat] SHA2-256
3,325,922 UART: [kat] SHA2-384
3,328,841 UART: [kat] SHA2-512-ACC
3,329,246 UART: Droping operation
3,329,817 UART: Fatal Error: 0x90050002
3,331,356 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,331,361 >>> mbox cmd response: failed
3,331,361 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,331,366 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,247 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,466 UART: [fht] FHT @ 0x50003400
1,173,132 UART: [idev] ++
1,173,300 UART: [idev] CDI.KEYID = 6
1,173,661 UART: [idev] SUBJECT.KEYID = 7
1,174,086 UART: [idev] UDS.KEYID = 0
1,174,432 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,332 UART: [idev] Sha1 KeyId Algorithm
1,208,104 UART: [idev] --
1,208,955 UART: [ldev] ++
1,209,123 UART: [ldev] CDI.KEYID = 6
1,209,487 UART: [ldev] SUBJECT.KEYID = 5
1,209,914 UART: [ldev] AUTHORITY.KEYID = 7
1,210,377 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,623 UART: [fwproc] Wait for Commands...
1,282,240 UART: [fwproc] Recv command 0x46574c44
1,282,973 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,828 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,496 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,805 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,793 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,585 ready_for_fw is high
1,056,585 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,169 >>> mbox cmd response: success
2,692,979 UART:
2,692,995 UART: Running Caliptra FMC ...
2,693,403 UART:
2,693,546 UART: [state] CFI Enabled
2,704,121 UART: [fht] FMC Alias Private Key: 7
2,812,690 UART: [art] Extend RT PCRs Done
2,813,118 UART: [art] Lock RT PCRs Done
2,814,700 UART: [art] Populate DV Done
2,823,169 UART: [fht] FMC Alias Private Key: 7
2,824,209 UART: [art] Derive CDI
2,824,489 UART: [art] Store in in slot 0x4
2,910,342 UART: [art] Derive Key Pair
2,910,702 UART: [art] Store priv key in slot 0x5
2,923,978 UART: [art] Derive Key Pair - Done
2,938,394 UART: [art] Signing Cert with AUTHO
2,938,874 UART: RITY.KEYID = 7
2,954,098 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,863 UART: [art] PUB.X = D80F5EC4D1284150B7E949AD55A06997FE0632DA0B75E180BF3BA0C7754752EDA3FD88F80973DC5994B73B319730CCC8
2,961,627 UART: [art] PUB.Y = 095E9E654D6397D05475BC1485A296B237C226579C08C68A04DF32590F6C46352C1C69AD5056AB5A0694B163E46CD083
2,968,554 UART: [art] SIG.R = 8DB2FA1A004D5E1BAFFE703EA69203D9A41EC183FBE8F41EBECCC44739E2EF944B0E9CF2B01BE020124B94D3639EB4E6
2,975,320 UART: [art] SIG.S = A657FA8E51394ACDF88778483A0B7F0797B6E52E35D9EE582BDAF90775BB7621BF1ADBF3E69D112C5A703B0CCADFE86F
2,999,197 UART: Caliptra RT
2,999,542 UART: [state] CFI Enabled
3,107,634 UART: [rt] RT listening for mailbox commands...
3,108,297 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,894 UART: [rt]cmd =0x46504c54, len=4
3,138,962 >>> mbox cmd response data (8 bytes)
3,139,273 UART: [rt] FIPS self test
3,139,601 UART: [kat] ++
3,139,753 UART: [kat] sha1
3,143,997 UART: [kat] SHA2-256
3,146,019 UART: [kat] SHA2-384
3,148,652 UART: [kat] SHA2-512-ACC
3,149,057 UART: Droping operation
3,149,612 UART: Fatal Error: 0x90050002
3,151,151 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,156 >>> mbox cmd response: failed
3,151,156 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,723 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,961 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
2,688,931 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,832,632 >>> mbox cmd response: failed
2,833,177 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,976,194 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
4,862,401 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,438,379 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,689,075 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,832,974 >>> mbox cmd response: failed
2,833,532 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,976,500 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
4,861,451 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,426,479 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,550 writing to cptra_bootfsm_go
3,047,068 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,191,499 >>> mbox cmd response: failed
3,192,083 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,335,127 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
21,580,086 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,015,082 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,043,317 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,187,191 >>> mbox cmd response: failed
3,187,753 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,330,732 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
21,581,945 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,012,338 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
2,708,913 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,853,289 >>> mbox cmd response: failed
2,853,877 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,997,278 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,446,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,280,366 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
2,698,745 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,843,224 >>> mbox cmd response: failed
2,843,780 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,987,306 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,460,003 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,285,627 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
3,062,156 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,206,449 >>> mbox cmd response: failed
3,207,016 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,350,394 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,167,976 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,914,494 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,053,699 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,198,177 >>> mbox cmd response: failed
3,198,781 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,342,187 >>> mbox cmd response: failed
Initializing fuses
977 writing to cptra_bootfsm_go
20,173,537 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,893,384 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
2,706,702 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,850,989 >>> mbox cmd response: failed
2,851,563 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,994,949 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,470,657 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,295,543 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
2,707,151 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,851,421 >>> mbox cmd response: failed
2,851,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,995,368 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,445,947 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,284,970 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,054,868 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,199,146 >>> mbox cmd response: failed
3,199,718 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,343,648 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,173,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,883,639 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,054,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,198,458 >>> mbox cmd response: failed
3,199,035 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,342,348 >>> mbox cmd response: failed
Initializing fuses
1,014 writing to cptra_bootfsm_go
20,178,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,893,724 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,036 >>> mbox cmd response: failed
813,036 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,261 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,419 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,686 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,694 >>> mbox cmd response: failed
812,694 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,681 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,409 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,541 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,549 >>> mbox cmd response: failed
813,549 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,555 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,958 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,772 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,449 >>> mbox cmd response: failed
813,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,455 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,012 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,800 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,812 >>> mbox cmd response: failed
812,812 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,757 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,625 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,404 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,412 >>> mbox cmd response: failed
813,412 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,641 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,701 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,409 >>> mbox cmd response: failed
813,409 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,504 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,858 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,269 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,277 >>> mbox cmd response: failed
813,277 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,660 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,979 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,076 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,084 >>> mbox cmd response: failed
813,084 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,275 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,176 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,184 >>> mbox cmd response: failed
813,184 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,673 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,717 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,879 >>> mbox cmd response: failed
812,879 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,468 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,990 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,203 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,211 >>> mbox cmd response: failed
813,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
813,217 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,028 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,386 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
192,240 UART:
192,597 UART: Running Caliptra ROM ...
193,680 UART:
193,820 UART: [state] CFI Enabled
264,369 UART: [state] LifecycleState = Unprovisioned
266,305 UART: [state] DebugLocked = No
269,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,431 UART: [kat] SHA2-256
443,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,656 UART: [kat] ++
454,293 UART: [kat] sha1
465,459 UART: [kat] SHA2-256
468,118 UART: [kat] SHA2-384
473,682 UART: [kat] SHA2-512-ACC
476,054 UART: [kat] ECC-384
2,767,744 UART: [kat] HMAC-384Kdf
2,779,982 UART: [kat] LMS
3,970,230 UART: [kat] --
3,975,957 UART: [cold-reset] ++
3,977,614 UART: [fht] Storing FHT @ 0x50003400
3,989,025 UART: [idev] ++
3,989,620 UART: [idev] CDI.KEYID = 6
3,990,510 UART: [idev] SUBJECT.KEYID = 7
3,991,754 UART: [idev] UDS.KEYID = 0
3,992,739 ready_for_fw is high
3,992,955 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,137,347 UART: [idev] Erasing UDS.KEYID = 0
7,325,615 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,049 UART: [idev] --
7,352,432 UART: [ldev] ++
7,353,059 UART: [ldev] CDI.KEYID = 6
7,353,994 UART: [ldev] SUBJECT.KEYID = 5
7,355,212 UART: [ldev] AUTHORITY.KEYID = 7
7,356,441 UART: [ldev] FE.KEYID = 1
7,404,093 UART: [ldev] Erasing FE.KEYID = 1
10,735,196 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,407 UART: [ldev] --
13,117,913 UART: [fwproc] Waiting for Commands...
13,121,144 UART: [fwproc] Received command 0x46574c44
13,123,330 UART: [fwproc] Received Image of size 114716 bytes
17,186,431 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,823 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,699 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,652,323 >>> mbox cmd response: success
17,655,995 UART: [afmc] ++
17,656,581 UART: [afmc] CDI.KEYID = 6
17,657,468 UART: [afmc] SUBJECT.KEYID = 7
17,658,734 UART: [afmc] AUTHORITY.KEYID = 5
21,033,600 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,331,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,334,188 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,348,578 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,363,432 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,377,846 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,399,790 UART: [afmc] --
23,403,121 UART: [cold-reset] --
23,407,694 UART: [state] Locking Datavault
23,412,240 UART: [state] Locking PCR0, PCR1 and PCR31
23,413,939 UART: [state] Locking ICCM
23,416,415 UART: [exit] Launching FMC @ 0x40000130
23,424,756 UART:
23,425,001 UART: Running Caliptra FMC ...
23,426,114 UART:
23,426,286 UART: [state] CFI Enabled
23,491,630 UART: [fht] FMC Alias Private Key: 7
25,829,290 UART: [art] Extend RT PCRs Done
25,830,518 UART: [art] Lock RT PCRs Done
25,832,303 UART: [art] Populate DV Done
25,837,824 UART: [fht] FMC Alias Private Key: 7
25,839,367 UART: [art] Derive CDI
25,840,184 UART: [art] Store in in slot 0x4
25,900,471 UART: [art] Derive Key Pair
25,901,509 UART: [art] Store priv key in slot 0x5
29,194,272 UART: [art] Derive Key Pair - Done
29,207,219 UART: [art] Signing Cert with AUTHO
29,208,523 UART: RITY.KEYID = 7
31,495,616 UART: [art] Erasing AUTHORITY.KEYID = 7
31,497,112 UART: [art] PUB.X = 1C4C912133153ADFE26A5E0206A0F52C8541842D4410CA9CDB0BB07CBED7790FBFB92BBB691891C0482B735D09C0FBA0
31,504,368 UART: [art] PUB.Y = F200CCC33E6491700B65706D93158626ADE31DA1349E93DC1ACC7CF67ACD00FFC1391750081E2ADD51482E03BC74852A
31,511,602 UART: [art] SIG.R = 738BDD278B6FBA9BD6F27C626D39289A6BCA4FDDE40938FE2A106ADC60871FAF12ECC34872254F416E79674861E55192
31,519,000 UART: [art] SIG.S = 1DCA8AEBE05804EBC3C73E687F287859C0CDC63CD69CAC1A33096CF37CDD9FB901DD6C800B40CEE719BF2C60F4DF35B3
32,824,175 UART: Caliptra RT
32,824,893 UART: [state] CFI Enabled
32,984,447 UART: [rt] RT listening for mailbox commands...
32,986,307 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,016,108 UART: [rt]cmd =0x46504c54, len=4
33,017,574 >>> mbox cmd response data (8 bytes)
33,018,335 UART: [rt] FIPS self test
33,019,281 UART: [kat] ++
33,019,738 UART: [kat] sha1
33,024,278 UART: [kat] SHA2-256
33,026,215 UART: [kat] SHA2-384
33,029,287 UART: [kat] SHA2-512-ACC
33,030,295 UART: Droping operation
33,031,205 UART: Fatal Error: 0x90050003
33,066,537 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,210,493 >>> mbox cmd response: failed
33,211,182 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,355,235 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,096 UART:
190,397 UART: Running Caliptra ROM ...
191,429 UART:
191,565 UART: [state] CFI Enabled
252,001 UART: [state] LifecycleState = Unprovisioned
253,893 UART: [state] DebugLocked = No
255,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,153 UART: [kat] SHA2-256
429,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
440,349 UART: [kat] ++
440,796 UART: [kat] sha1
452,049 UART: [kat] SHA2-256
454,758 UART: [kat] SHA2-384
461,112 UART: [kat] SHA2-512-ACC
463,506 UART: [kat] ECC-384
2,754,434 UART: [kat] HMAC-384Kdf
2,785,781 UART: [kat] LMS
3,976,089 UART: [kat] --
3,983,504 UART: [cold-reset] ++
3,985,167 UART: [fht] Storing FHT @ 0x50003400
3,996,489 UART: [idev] ++
3,997,061 UART: [idev] CDI.KEYID = 6
3,998,029 UART: [idev] SUBJECT.KEYID = 7
3,999,244 UART: [idev] UDS.KEYID = 0
4,000,819 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,145,131 UART: [idev] Erasing UDS.KEYID = 0
7,331,421 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,100 UART: [idev] --
7,356,222 UART: [ldev] ++
7,356,793 UART: [ldev] CDI.KEYID = 6
7,357,811 UART: [ldev] SUBJECT.KEYID = 5
7,358,967 UART: [ldev] AUTHORITY.KEYID = 7
7,360,253 UART: [ldev] FE.KEYID = 1
7,406,712 UART: [ldev] Erasing FE.KEYID = 1
10,738,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,613 UART: [ldev] --
13,100,346 UART: [fwproc] Waiting for Commands...
13,102,603 UART: [fwproc] Received command 0x46574c44
13,104,788 UART: [fwproc] Received Image of size 114716 bytes
17,158,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,234,711 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,303,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,623,183 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,807,446 ready_for_fw is high
3,807,854 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,916,482 >>> mbox cmd response: success
23,611,527 UART:
23,611,911 UART: Running Caliptra FMC ...
23,613,047 UART:
23,613,222 UART: [state] CFI Enabled
23,679,842 UART: [fht] FMC Alias Private Key: 7
26,017,734 UART: [art] Extend RT PCRs Done
26,018,999 UART: [art] Lock RT PCRs Done
26,020,394 UART: [art] Populate DV Done
26,025,775 UART: [fht] FMC Alias Private Key: 7
26,027,429 UART: [art] Derive CDI
26,028,253 UART: [art] Store in in slot 0x4
26,088,005 UART: [art] Derive Key Pair
26,089,018 UART: [art] Store priv key in slot 0x5
29,381,642 UART: [art] Derive Key Pair - Done
29,394,555 UART: [art] Signing Cert with AUTHO
29,395,866 UART: RITY.KEYID = 7
31,683,066 UART: [art] Erasing AUTHORITY.KEYID = 7
31,684,579 UART: [art] PUB.X = 6AD8F2B7506B48C49A63CC1114EBD4E39BC92EA314FE31440F3245DDD10DC46027FDE8A38ABFE66684FFF024FA89C2B0
31,691,843 UART: [art] PUB.Y = 3444EA0F7039CA1F2AA2C062ACD3029C6CA944889E38110AEC95FC924CF85BF0EE189EC98AA6BD0DBC661E95121A1331
31,699,132 UART: [art] SIG.R = E09C66AAACB257710E957556847058AAEEAD3D189B58F35E2AF407FAE458961F201FD5584814EC0FF70711FD981ACEC3
31,706,489 UART: [art] SIG.S = ABA180B525A7B41B3E99C38AA3F043B3E1738AFB81FC9F87BDC38B3E10806BD7B30F78CDE4A96D4DCF16DE9082DAEB5A
33,011,110 UART: Caliptra RT
33,011,826 UART: [state] CFI Enabled
33,171,708 UART: [rt] RT listening for mailbox commands...
33,173,563 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,203,356 UART: [rt]cmd =0x46504c54, len=4
33,204,935 >>> mbox cmd response data (8 bytes)
33,206,269 UART: [rt] FIPS self test
33,207,208 UART: [kat] ++
33,207,658 UART: [kat] sha1
33,212,133 UART: [kat] SHA2-256
33,214,062 UART: [kat] SHA2-384
33,216,980 UART: [kat] SHA2-512-ACC
33,217,968 UART: Droping operation
33,218,911 UART: Fatal Error: 0x90050003
33,254,122 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,398,248 >>> mbox cmd response: failed
33,398,894 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,542,944 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,768,613 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,846,856 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,553 UART:
192,931 UART: Running Caliptra ROM ...
194,139 UART:
603,894 UART: [state] CFI Enabled
616,354 UART: [state] LifecycleState = Unprovisioned
618,316 UART: [state] DebugLocked = No
620,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,720 UART: [kat] SHA2-256
794,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,049 UART: [kat] ++
805,535 UART: [kat] sha1
816,861 UART: [kat] SHA2-256
819,521 UART: [kat] SHA2-384
826,092 UART: [kat] SHA2-512-ACC
828,470 UART: [kat] ECC-384
3,114,075 UART: [kat] HMAC-384Kdf
3,126,030 UART: [kat] LMS
4,316,160 UART: [kat] --
4,322,533 UART: [cold-reset] ++
4,325,121 UART: [fht] Storing FHT @ 0x50003400
4,336,606 UART: [idev] ++
4,337,171 UART: [idev] CDI.KEYID = 6
4,338,152 UART: [idev] SUBJECT.KEYID = 7
4,339,330 UART: [idev] UDS.KEYID = 0
4,340,375 ready_for_fw is high
4,340,582 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,484,679 UART: [idev] Erasing UDS.KEYID = 0
7,628,683 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,253 UART: [idev] --
7,655,175 UART: [ldev] ++
7,655,755 UART: [ldev] CDI.KEYID = 6
7,656,668 UART: [ldev] SUBJECT.KEYID = 5
7,657,887 UART: [ldev] AUTHORITY.KEYID = 7
7,659,178 UART: [ldev] FE.KEYID = 1
7,670,228 UART: [ldev] Erasing FE.KEYID = 1
10,960,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,270,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,467 UART: [ldev] --
13,323,351 UART: [fwproc] Waiting for Commands...
13,325,133 UART: [fwproc] Received command 0x46574c44
13,327,321 UART: [fwproc] Received Image of size 114716 bytes
17,391,335 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,926 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,790 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,847,570 >>> mbox cmd response: success
17,851,673 UART: [afmc] ++
17,852,264 UART: [afmc] CDI.KEYID = 6
17,853,306 UART: [afmc] SUBJECT.KEYID = 7
17,854,472 UART: [afmc] AUTHORITY.KEYID = 5
21,173,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,468,679 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,470,931 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,485,324 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,500,153 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,514,574 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,535,682 UART: [afmc] --
23,538,902 UART: [cold-reset] --
23,542,655 UART: [state] Locking Datavault
23,548,819 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,572 UART: [state] Locking ICCM
23,552,484 UART: [exit] Launching FMC @ 0x40000130
23,560,830 UART:
23,561,110 UART: Running Caliptra FMC ...
23,562,244 UART:
23,562,405 UART: [state] CFI Enabled
23,570,400 UART: [fht] FMC Alias Private Key: 7
25,901,003 UART: [art] Extend RT PCRs Done
25,902,229 UART: [art] Lock RT PCRs Done
25,903,806 UART: [art] Populate DV Done
25,909,546 UART: [fht] FMC Alias Private Key: 7
25,911,085 UART: [art] Derive CDI
25,911,826 UART: [art] Store in in slot 0x4
25,954,741 UART: [art] Derive Key Pair
25,955,784 UART: [art] Store priv key in slot 0x5
29,197,892 UART: [art] Derive Key Pair - Done
29,210,912 UART: [art] Signing Cert with AUTHO
29,212,213 UART: RITY.KEYID = 7
31,491,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,493,296 UART: [art] PUB.X = 379AE27132E33ACD2392F6B2194002E80AD57BB42045B0EED1A3BB0254FEFE1E1CA5506976EA6F4AC4076059930DB2DC
31,500,575 UART: [art] PUB.Y = DE59C243ABCA5F44FD5A5488EEAC818CBC8B8C53CFBF4724D389BF1E61DCEBC87AF8F69AB0A9930DC561358F46D5D933
31,507,816 UART: [art] SIG.R = 28A50D704E99FB787B191A28E99B2AEAB9DF9FBE6DD1340B23F035B75E3256084B060FFA62B76B7A58848001A9E1D45F
31,515,212 UART: [art] SIG.S = 4279E874F87623A82203962A7DB5259CE027ADE983C896B5A5DC2F65AD32640AB4CAD1311C4C5C77C3BF548DE50B8DCD
32,820,021 UART: Caliptra RT
32,820,727 UART: [state] CFI Enabled
32,937,134 UART: [rt] RT listening for mailbox commands...
32,938,984 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,968,567 UART: [rt]cmd =0x46504c54, len=4
32,970,145 >>> mbox cmd response data (8 bytes)
32,970,785 UART: [rt] FIPS self test
32,971,640 UART: [kat] ++
32,972,083 UART: [kat] sha1
32,976,598 UART: [kat] SHA2-256
32,978,484 UART: [kat] SHA2-384
32,981,560 UART: [kat] SHA2-512-ACC
32,982,557 UART: Droping operation
32,983,483 UART: Fatal Error: 0x90050003
33,018,869 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,163,024 >>> mbox cmd response: failed
33,163,675 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,307,515 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,090 UART:
190,405 UART: Running Caliptra ROM ...
191,434 UART:
7,236,209 UART: [state] CFI Enabled
7,250,422 UART: [state] LifecycleState = Unprovisioned
7,252,334 UART: [state] DebugLocked = No
7,255,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,259,286 UART: [kat] SHA2-256
7,429,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,439,550 UART: [kat] ++
7,440,011 UART: [kat] sha1
7,451,701 UART: [kat] SHA2-256
7,454,434 UART: [kat] SHA2-384
7,460,538 UART: [kat] SHA2-512-ACC
7,462,891 UART: [kat] ECC-384
9,747,773 UART: [kat] HMAC-384Kdf
9,759,242 UART: [kat] LMS
10,949,363 UART: [kat] --
10,953,642 UART: [cold-reset] ++
10,955,201 UART: [fht] Storing FHT @ 0x50003400
10,967,762 UART: [idev] ++
10,968,372 UART: [idev] CDI.KEYID = 6
10,969,259 UART: [idev] SUBJECT.KEYID = 7
10,970,531 UART: [idev] UDS.KEYID = 0
10,972,022 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,115,991 UART: [idev] Erasing UDS.KEYID = 0
14,255,372 UART: [idev] Using Sha1 for KeyId Algorithm
14,276,538 UART: [idev] --
14,279,344 UART: [ldev] ++
14,279,918 UART: [ldev] CDI.KEYID = 6
14,280,854 UART: [ldev] SUBJECT.KEYID = 5
14,281,985 UART: [ldev] AUTHORITY.KEYID = 7
14,283,324 UART: [ldev] FE.KEYID = 1
14,296,377 UART: [ldev] Erasing FE.KEYID = 1
17,585,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,880,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,895,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,910,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,924,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,942,738 UART: [ldev] --
19,948,181 UART: [fwproc] Waiting for Commands...
19,950,466 UART: [fwproc] Received command 0x46574c44
19,952,658 UART: [fwproc] Received Image of size 114716 bytes
24,017,356 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,092,255 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,161,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,480,248 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
4,123,766 ready_for_fw is high
4,124,384 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,070,313 >>> mbox cmd response: success
23,707,481 UART:
23,707,905 UART: Running Caliptra FMC ...
23,709,013 UART:
23,709,181 UART: [state] CFI Enabled
23,717,201 UART: [fht] FMC Alias Private Key: 7
26,048,297 UART: [art] Extend RT PCRs Done
26,049,564 UART: [art] Lock RT PCRs Done
26,051,196 UART: [art] Populate DV Done
26,056,784 UART: [fht] FMC Alias Private Key: 7
26,058,331 UART: [art] Derive CDI
26,059,098 UART: [art] Store in in slot 0x4
26,101,874 UART: [art] Derive Key Pair
26,102,918 UART: [art] Store priv key in slot 0x5
29,345,245 UART: [art] Derive Key Pair - Done
29,358,119 UART: [art] Signing Cert with AUTHO
29,359,459 UART: RITY.KEYID = 7
31,638,491 UART: [art] Erasing AUTHORITY.KEYID = 7
31,640,002 UART: [art] PUB.X = 0362F32DBC84253BE244EE568F331B6F2E1E1EE8BD0075BF5BE8941588E43D564AE45B53F5377623DD84E2D4A24B7467
31,647,223 UART: [art] PUB.Y = BA120941FC9B35ABF46ACA355416F5969A4572ACA7968C19DFF3B75C043306464C2532E0E43C75DC40E6ED6F40B52899
31,654,466 UART: [art] SIG.R = 8DEF4356598423A1FA9E049D5D277470682B8FD5673852F1558056124E1507DB9378D33994943D4A75C38C38D1F8C6BD
31,661,807 UART: [art] SIG.S = 021FEE29D3474012F0E68285D727C466D6258CE3A535FE6A028A50ACDEF7A71FF39B19D2B137F617ED19F95989FD002E
32,967,223 UART: Caliptra RT
32,967,947 UART: [state] CFI Enabled
33,085,443 UART: [rt] RT listening for mailbox commands...
33,087,301 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,117,065 UART: [rt]cmd =0x46504c54, len=4
33,118,679 >>> mbox cmd response data (8 bytes)
33,120,227 UART: [rt] FIPS self test
33,121,166 UART: [kat] ++
33,121,617 UART: [kat] sha1
33,126,052 UART: [kat] SHA2-256
33,127,987 UART: [kat] SHA2-384
33,130,963 UART: [kat] SHA2-512-ACC
33,131,926 UART: Droping operation
33,132,861 UART: Fatal Error: 0x90050003
33,168,069 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,312,114 >>> mbox cmd response: failed
33,312,780 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,456,820 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
10,588,076 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,539,649 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,572 UART:
192,922 UART: Running Caliptra ROM ...
194,126 UART:
194,278 UART: [state] CFI Enabled
261,512 UART: [state] LifecycleState = Unprovisioned
263,416 UART: [state] DebugLocked = No
264,597 UART: [state] WD Timer not started. Device not locked for debugging
269,137 UART: [kat] SHA2-256
448,265 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,809 UART: [kat] ++
460,345 UART: [kat] sha1
472,227 UART: [kat] SHA2-256
475,262 UART: [kat] SHA2-384
481,289 UART: [kat] SHA2-512-ACC
484,240 UART: [kat] ECC-384
2,948,168 UART: [kat] HMAC-384Kdf
2,972,601 UART: [kat] LMS
3,502,026 UART: [kat] --
3,508,178 UART: [cold-reset] ++
3,509,262 UART: [fht] FHT @ 0x50003400
3,519,634 UART: [idev] ++
3,520,237 UART: [idev] CDI.KEYID = 6
3,521,157 UART: [idev] SUBJECT.KEYID = 7
3,522,337 UART: [idev] UDS.KEYID = 0
3,523,264 ready_for_fw is high
3,523,501 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,172 UART: [idev] Erasing UDS.KEYID = 0
6,025,559 UART: [idev] Sha1 KeyId Algorithm
6,048,519 UART: [idev] --
6,052,949 UART: [ldev] ++
6,053,530 UART: [ldev] CDI.KEYID = 6
6,054,442 UART: [ldev] SUBJECT.KEYID = 5
6,055,574 UART: [ldev] AUTHORITY.KEYID = 7
6,056,864 UART: [ldev] FE.KEYID = 1
6,102,404 UART: [ldev] Erasing FE.KEYID = 1
8,604,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,321,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,675 UART: [ldev] --
10,393,726 UART: [fwproc] Wait for Commands...
10,396,167 UART: [fwproc] Recv command 0x46574c44
10,398,276 UART: [fwproc] Recv'd Img size: 115032 bytes
13,810,394 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,885,795 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,954,547 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,274,134 >>> mbox cmd response: success
14,278,931 UART: [afmc] ++
14,279,514 UART: [afmc] CDI.KEYID = 6
14,280,422 UART: [afmc] SUBJECT.KEYID = 7
14,281,577 UART: [afmc] AUTHORITY.KEYID = 5
16,811,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,535,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,537,429 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,553,213 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,569,231 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,585,064 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,606,930 UART: [afmc] --
18,611,439 UART: [cold-reset] --
18,615,836 UART: [state] Locking Datavault
18,621,195 UART: [state] Locking PCR0, PCR1 and PCR31
18,622,896 UART: [state] Locking ICCM
18,625,206 UART: [exit] Launching FMC @ 0x40000130
18,633,624 UART:
18,633,861 UART: Running Caliptra FMC ...
18,635,170 UART:
18,635,340 UART: [state] CFI Enabled
18,693,540 UART: [fht] FMC Alias Private Key: 7
20,457,012 UART: [art] Extend RT PCRs Done
20,458,245 UART: [art] Lock RT PCRs Done
20,460,024 UART: [art] Populate DV Done
20,465,386 UART: [fht] FMC Alias Private Key: 7
20,466,976 UART: [art] Derive CDI
20,467,715 UART: [art] Store in in slot 0x4
20,526,161 UART: [art] Derive Key Pair
20,527,205 UART: [art] Store priv key in slot 0x5
22,989,973 UART: [art] Derive Key Pair - Done
23,002,704 UART: [art] Signing Cert with AUTHO
23,004,015 UART: RITY.KEYID = 7
24,715,751 UART: [art] Erasing AUTHORITY.KEYID = 7
24,717,261 UART: [art] PUB.X = 536A85F14E3B50F8AFB07F0204F2477C9D79846FAE9BBA9635703655D8B38BD09BC6AE4D4F00B9D353C56A8A1EC697B9
24,724,495 UART: [art] PUB.Y = B62A41936A2F5FBBED018B8FD022249D482F8C22760EBB04CDA7F5A7BAD6CBFD2DD671816F1A3610FB4F6458F1CC4E95
24,731,765 UART: [art] SIG.R = 4C92C9A4A0A6D98288618038EE8CC1F87AEACEAD03C7773B12C5840FACC712F063BCAD12A26C5AF3739FB2071E9EE56C
24,739,204 UART: [art] SIG.S = BD736E14F265E5311BAEE28EDD48799931225F428C2E33BD18CA9310680583C5ACA99B15B5C3EFFD47E8B7E93AE3E852
25,717,591 UART: Caliptra RT
25,718,288 UART: [state] CFI Enabled
25,883,886 UART: [rt] RT listening for mailbox commands...
25,885,737 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,915,303 UART: [rt]cmd =0x46504c54, len=4
25,916,752 >>> mbox cmd response data (8 bytes)
25,918,474 UART: [rt] FIPS self test
25,919,415 UART: [kat] ++
25,919,865 UART: [kat] sha1
25,924,429 UART: [kat] SHA2-256
25,926,300 UART: [kat] SHA2-384
25,929,114 UART: [kat] SHA2-512-ACC
25,930,107 UART: Droping operation
25,930,959 UART: Fatal Error: 0x90050003
25,966,158 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,110,666 >>> mbox cmd response: failed
26,111,281 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,256,066 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,011 UART:
190,305 UART: Running Caliptra ROM ...
191,330 UART:
191,470 UART: [state] CFI Enabled
249,200 UART: [state] LifecycleState = Unprovisioned
251,066 UART: [state] DebugLocked = No
252,419 UART: [state] WD Timer not started. Device not locked for debugging
255,571 UART: [kat] SHA2-256
434,730 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
446,279 UART: [kat] ++
446,725 UART: [kat] sha1
458,185 UART: [kat] SHA2-256
461,063 UART: [kat] SHA2-384
466,292 UART: [kat] SHA2-512-ACC
469,278 UART: [kat] ECC-384
2,934,407 UART: [kat] HMAC-384Kdf
2,957,434 UART: [kat] LMS
3,486,867 UART: [kat] --
3,492,150 UART: [cold-reset] ++
3,493,702 UART: [fht] FHT @ 0x50003400
3,504,727 UART: [idev] ++
3,505,327 UART: [idev] CDI.KEYID = 6
3,506,240 UART: [idev] SUBJECT.KEYID = 7
3,507,418 UART: [idev] UDS.KEYID = 0
3,508,930 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,653,480 UART: [idev] Erasing UDS.KEYID = 0
6,024,375 UART: [idev] Sha1 KeyId Algorithm
6,047,390 UART: [idev] --
6,052,576 UART: [ldev] ++
6,053,157 UART: [ldev] CDI.KEYID = 6
6,054,042 UART: [ldev] SUBJECT.KEYID = 5
6,055,206 UART: [ldev] AUTHORITY.KEYID = 7
6,056,503 UART: [ldev] FE.KEYID = 1
6,097,423 UART: [ldev] Erasing FE.KEYID = 1
8,602,124 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,188 UART: [ldev] --
10,412,728 UART: [fwproc] Wait for Commands...
10,414,883 UART: [fwproc] Recv command 0x46574c44
10,416,932 UART: [fwproc] Recv'd Img size: 115032 bytes
13,822,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,893,075 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,867 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,281,464 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,377,430 ready_for_fw is high
3,377,885 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,080,569 >>> mbox cmd response: success
18,366,664 UART:
18,367,075 UART: Running Caliptra FMC ...
18,368,216 UART:
18,368,380 UART: [state] CFI Enabled
18,432,166 UART: [fht] FMC Alias Private Key: 7
20,195,790 UART: [art] Extend RT PCRs Done
20,197,010 UART: [art] Lock RT PCRs Done
20,198,969 UART: [art] Populate DV Done
20,204,189 UART: [fht] FMC Alias Private Key: 7
20,205,687 UART: [art] Derive CDI
20,206,451 UART: [art] Store in in slot 0x4
20,264,097 UART: [art] Derive Key Pair
20,265,179 UART: [art] Store priv key in slot 0x5
22,727,963 UART: [art] Derive Key Pair - Done
22,741,117 UART: [art] Signing Cert with AUTHO
22,742,461 UART: RITY.KEYID = 7
24,453,541 UART: [art] Erasing AUTHORITY.KEYID = 7
24,455,060 UART: [art] PUB.X = EF7568A667A631A1007A9C71B3C033985B7E65FF499D3B05BEDFE34C4440F6C2E27046D33D075D978744886BCAF9B27D
24,462,274 UART: [art] PUB.Y = 8D598F0F08E4B1FE63C060E9B127BBDF6A90F24A1788B679E9E4E0C86F8F9FA73CFCA3D799FF759937FDC35AC251D725
24,469,537 UART: [art] SIG.R = 9A0716B88B3979B9B9D578CED1A02521DC6C48F72BB874832D42F2F9FECA7F574345370BF373CB6AD79CAE8B9E9D9250
24,476,932 UART: [art] SIG.S = 50340206697067C6E0F4109DEC5B417800F64BA602E09D2D2D6B7536B77AC1228018739467852C7E821B634B1F04EDA7
25,455,997 UART: Caliptra RT
25,456,701 UART: [state] CFI Enabled
25,622,437 UART: [rt] RT listening for mailbox commands...
25,624,291 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,654,076 UART: [rt]cmd =0x46504c54, len=4
25,655,544 >>> mbox cmd response data (8 bytes)
25,656,478 UART: [rt] FIPS self test
25,657,418 UART: [kat] ++
25,657,872 UART: [kat] sha1
25,662,544 UART: [kat] SHA2-256
25,664,417 UART: [kat] SHA2-384
25,667,267 UART: [kat] SHA2-512-ACC
25,668,222 UART: Droping operation
25,668,998 UART: Fatal Error: 0x90050003
25,704,376 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,848,783 >>> mbox cmd response: failed
25,849,394 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,993,789 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,366,607 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,068,298 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,478 UART:
192,850 UART: Running Caliptra ROM ...
193,992 UART:
603,693 UART: [state] CFI Enabled
618,922 UART: [state] LifecycleState = Unprovisioned
620,785 UART: [state] DebugLocked = No
622,309 UART: [state] WD Timer not started. Device not locked for debugging
625,931 UART: [kat] SHA2-256
805,109 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,635 UART: [kat] ++
817,101 UART: [kat] sha1
829,633 UART: [kat] SHA2-256
832,681 UART: [kat] SHA2-384
838,959 UART: [kat] SHA2-512-ACC
841,901 UART: [kat] ECC-384
3,283,309 UART: [kat] HMAC-384Kdf
3,295,679 UART: [kat] LMS
3,825,148 UART: [kat] --
3,828,894 UART: [cold-reset] ++
3,829,834 UART: [fht] FHT @ 0x50003400
3,840,593 UART: [idev] ++
3,841,150 UART: [idev] CDI.KEYID = 6
3,842,102 UART: [idev] SUBJECT.KEYID = 7
3,843,278 UART: [idev] UDS.KEYID = 0
3,844,260 ready_for_fw is high
3,844,474 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,989,012 UART: [idev] Erasing UDS.KEYID = 0
6,317,367 UART: [idev] Sha1 KeyId Algorithm
6,338,974 UART: [idev] --
6,342,756 UART: [ldev] ++
6,343,365 UART: [ldev] CDI.KEYID = 6
6,344,282 UART: [ldev] SUBJECT.KEYID = 5
6,345,448 UART: [ldev] AUTHORITY.KEYID = 7
6,346,692 UART: [ldev] FE.KEYID = 1
6,357,883 UART: [ldev] Erasing FE.KEYID = 1
8,829,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,547,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,563,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,579,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,595,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,615,444 UART: [ldev] --
10,619,467 UART: [fwproc] Wait for Commands...
10,621,096 UART: [fwproc] Recv command 0x46574c44
10,623,196 UART: [fwproc] Recv'd Img size: 115032 bytes
14,042,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,116,356 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,185,134 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,505,353 >>> mbox cmd response: success
14,509,580 UART: [afmc] ++
14,510,173 UART: [afmc] CDI.KEYID = 6
14,511,080 UART: [afmc] SUBJECT.KEYID = 7
14,512,301 UART: [afmc] AUTHORITY.KEYID = 5
17,011,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,729,724 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,731,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,747,398 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,763,405 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,779,283 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,646 UART: [afmc] --
18,805,617 UART: [cold-reset] --
18,809,917 UART: [state] Locking Datavault
18,815,866 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,568 UART: [state] Locking ICCM
18,819,314 UART: [exit] Launching FMC @ 0x40000130
18,827,727 UART:
18,827,994 UART: Running Caliptra FMC ...
18,829,101 UART:
18,829,259 UART: [state] CFI Enabled
18,837,578 UART: [fht] FMC Alias Private Key: 7
20,594,440 UART: [art] Extend RT PCRs Done
20,595,661 UART: [art] Lock RT PCRs Done
20,596,949 UART: [art] Populate DV Done
20,602,363 UART: [fht] FMC Alias Private Key: 7
20,604,064 UART: [art] Derive CDI
20,604,900 UART: [art] Store in in slot 0x4
20,647,279 UART: [art] Derive Key Pair
20,648,279 UART: [art] Store priv key in slot 0x5
23,074,991 UART: [art] Derive Key Pair - Done
23,087,983 UART: [art] Signing Cert with AUTHO
23,089,295 UART: RITY.KEYID = 7
24,794,823 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,328 UART: [art] PUB.X = 0E9C51F89DA75E19B5BEC45F894843B8CC043355D53FB948157D8063FAF84209E0A8C8F9610C28E1EC8B6DE748867BBE
24,803,589 UART: [art] PUB.Y = 7314E64111F9CBE7808CD50570ED930D1AE8CA148B23AFF8479D42691B80871BEEFAB6D9A08464A78DE3AC38F691163D
24,810,879 UART: [art] SIG.R = 0883E60AACE6E3DE61E16DF2FE970ED1E0B25C6AE1438CA4B25B70EDDC8100733FA9571BD9992062A6CCB0D11D07FA8F
24,818,276 UART: [art] SIG.S = CF2B8F39A37177F55B1BC4C716A672FB6BE6D2DC6A23AA26A21EA3EB5F7A28BE0B0A4158645BAF386C79C80A4ADFF758
25,797,341 UART: Caliptra RT
25,798,035 UART: [state] CFI Enabled
25,914,119 UART: [rt] RT listening for mailbox commands...
25,915,964 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,945,685 UART: [rt]cmd =0x46504c54, len=4
25,947,307 >>> mbox cmd response data (8 bytes)
25,948,473 UART: [rt] FIPS self test
25,949,423 UART: [kat] ++
25,949,872 UART: [kat] sha1
25,954,217 UART: [kat] SHA2-256
25,956,100 UART: [kat] SHA2-384
25,959,094 UART: [kat] SHA2-512-ACC
25,960,087 UART: Droping operation
25,960,912 UART: Fatal Error: 0x90050003
25,996,112 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,140,609 >>> mbox cmd response: failed
26,141,207 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,285,608 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,034 UART:
190,345 UART: Running Caliptra ROM ...
191,371 UART:
14,244,340 UART: [state] CFI Enabled
14,256,417 UART: [state] LifecycleState = Unprovisioned
14,258,270 UART: [state] DebugLocked = No
14,260,192 UART: [state] WD Timer not started. Device not locked for debugging
14,263,120 UART: [kat] SHA2-256
14,442,275 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,453,825 UART: [kat] ++
14,454,285 UART: [kat] sha1
14,464,823 UART: [kat] SHA2-256
14,467,830 UART: [kat] SHA2-384
14,474,681 UART: [kat] SHA2-512-ACC
14,477,637 UART: [kat] ECC-384
16,919,917 UART: [kat] HMAC-384Kdf
16,933,109 UART: [kat] LMS
17,462,606 UART: [kat] --
17,468,608 UART: [cold-reset] ++
17,469,729 UART: [fht] FHT @ 0x50003400
17,481,248 UART: [idev] ++
17,481,821 UART: [idev] CDI.KEYID = 6
17,482,786 UART: [idev] SUBJECT.KEYID = 7
17,483,941 UART: [idev] UDS.KEYID = 0
17,485,572 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,630,027 UART: [idev] Erasing UDS.KEYID = 0
19,957,921 UART: [idev] Sha1 KeyId Algorithm
19,981,570 UART: [idev] --
19,985,216 UART: [ldev] ++
19,985,786 UART: [ldev] CDI.KEYID = 6
19,986,664 UART: [ldev] SUBJECT.KEYID = 5
19,987,874 UART: [ldev] AUTHORITY.KEYID = 7
19,989,162 UART: [ldev] FE.KEYID = 1
19,999,092 UART: [ldev] Erasing FE.KEYID = 1
22,473,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,190,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,206,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,221,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,237,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,258,379 UART: [ldev] --
24,262,347 UART: [fwproc] Wait for Commands...
24,264,170 UART: [fwproc] Recv command 0x46574c44
24,266,209 UART: [fwproc] Recv'd Img size: 115032 bytes
27,677,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,749,820 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,818,573 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,139,452 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,694,055 ready_for_fw is high
3,694,514 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,285,054 >>> mbox cmd response: success
18,534,005 UART:
18,534,411 UART: Running Caliptra FMC ...
18,535,576 UART:
18,535,736 UART: [state] CFI Enabled
18,543,695 UART: [fht] FMC Alias Private Key: 7
20,300,970 UART: [art] Extend RT PCRs Done
20,302,193 UART: [art] Lock RT PCRs Done
20,304,011 UART: [art] Populate DV Done
20,309,408 UART: [fht] FMC Alias Private Key: 7
20,310,895 UART: [art] Derive CDI
20,311,660 UART: [art] Store in in slot 0x4
20,354,096 UART: [art] Derive Key Pair
20,355,103 UART: [art] Store priv key in slot 0x5
22,781,839 UART: [art] Derive Key Pair - Done
22,794,683 UART: [art] Signing Cert with AUTHO
22,795,996 UART: RITY.KEYID = 7
24,501,027 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,543 UART: [art] PUB.X = 9E74703A965A4B492637E26F1872D146DADAF5964BDE27088489B2403A68122F249744E7319F6319DB672929EB02DF82
24,509,722 UART: [art] PUB.Y = 114A96753F39882385F68A7A0FDA7AA31B61745E6E2C808970048F1158395B594EFDF45EECD9DA6B05FD85238A404BA8
24,516,979 UART: [art] SIG.R = C709222634B9714A7145C06CB0B10BA99B4E9C173D63C6AD43FD51F46F001E7E67355C4653BAAA04F5FC8B3135263859
24,524,370 UART: [art] SIG.S = 713DBD7BB4C40BBF595143FF4350426DED8AC3DE04E709320C843C7336EA9390B3223301298217B857438A8144CBAACA
25,503,185 UART: Caliptra RT
25,503,911 UART: [state] CFI Enabled
25,621,147 UART: [rt] RT listening for mailbox commands...
25,623,001 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,652,740 UART: [rt]cmd =0x46504c54, len=4
25,654,269 >>> mbox cmd response data (8 bytes)
25,655,266 UART: [rt] FIPS self test
25,656,222 UART: [kat] ++
25,656,671 UART: [kat] sha1
25,661,071 UART: [kat] SHA2-256
25,663,007 UART: [kat] SHA2-384
25,666,026 UART: [kat] SHA2-512-ACC
25,667,038 UART: Droping operation
25,667,954 UART: Fatal Error: 0x90050003
25,703,166 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,847,670 >>> mbox cmd response: failed
25,848,366 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,992,811 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,627,601 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,202,806 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,023 UART:
192,410 UART: Running Caliptra ROM ...
193,600 UART:
193,752 UART: [state] CFI Enabled
265,103 UART: [state] LifecycleState = Unprovisioned
267,135 UART: [state] DebugLocked = No
269,570 UART: [state] WD Timer not started. Device not locked for debugging
274,777 UART: [kat] SHA2-256
464,625 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,398 UART: [kat] ++
475,850 UART: [kat] sha1
487,014 UART: [kat] SHA2-256
490,034 UART: [kat] SHA2-384
496,813 UART: [kat] SHA2-512-ACC
499,398 UART: [kat] ECC-384
2,946,811 UART: [kat] HMAC-384Kdf
2,971,693 UART: [kat] LMS
3,503,468 UART: [kat] --
3,505,765 UART: [cold-reset] ++
3,507,276 UART: [fht] FHT @ 0x50003400
3,519,542 UART: [idev] ++
3,520,275 UART: [idev] CDI.KEYID = 6
3,521,188 UART: [idev] SUBJECT.KEYID = 7
3,522,441 UART: [idev] UDS.KEYID = 0
3,523,639 ready_for_fw is high
3,523,852 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,550 UART: [idev] Erasing UDS.KEYID = 0
6,025,910 UART: [idev] Sha1 KeyId Algorithm
6,049,271 UART: [idev] --
6,054,799 UART: [ldev] ++
6,055,492 UART: [ldev] CDI.KEYID = 6
6,056,411 UART: [ldev] SUBJECT.KEYID = 5
6,057,572 UART: [ldev] AUTHORITY.KEYID = 7
6,058,747 UART: [ldev] FE.KEYID = 1
6,099,576 UART: [ldev] Erasing FE.KEYID = 1
8,608,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,708 UART: [ldev] --
10,414,831 UART: [fwproc] Wait for Commands...
10,416,712 UART: [fwproc] Recv command 0x46574c44
10,419,031 UART: [fwproc] Recv'd Img size: 115032 bytes
13,872,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,992 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,144 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,613,011 >>> mbox cmd response: success
14,616,797 UART: [afmc] ++
14,617,495 UART: [afmc] CDI.KEYID = 6
14,618,677 UART: [afmc] SUBJECT.KEYID = 7
14,620,170 UART: [afmc] AUTHORITY.KEYID = 5
17,153,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,402 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,549 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,688 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,749 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,866 UART: [afmc] --
18,950,519 UART: [cold-reset] --
18,956,707 UART: [state] Locking Datavault
18,962,173 UART: [state] Locking PCR0, PCR1 and PCR31
18,964,310 UART: [state] Locking ICCM
18,965,868 UART: [exit] Launching FMC @ 0x40000130
18,974,537 UART:
18,974,774 UART: Running Caliptra FMC ...
18,975,877 UART:
18,976,035 UART: [state] CFI Enabled
19,032,186 UART: [fht] FMC Alias Private Key: 7
20,796,988 UART: [art] Extend RT PCRs Done
20,798,200 UART: [art] Lock RT PCRs Done
20,800,094 UART: [art] Populate DV Done
20,805,399 UART: [fht] FMC Alias Private Key: 7
20,806,893 UART: [art] Derive CDI
20,807,656 UART: [art] Store in in slot 0x4
20,865,561 UART: [art] Derive Key Pair
20,866,595 UART: [art] Store priv key in slot 0x5
23,329,674 UART: [art] Derive Key Pair - Done
23,342,884 UART: [art] Signing Cert with AUTHO
23,344,192 UART: RITY.KEYID = 7
25,054,567 UART: [art] Erasing AUTHORITY.KEYID = 7
25,056,094 UART: [art] PUB.X = 396C06523FC952F7CC6A517506E17F030D983F0F0DB9BA800BAED5216F22AA1096EDF26A4517EFC5F3C42A70F2A3069F
25,063,382 UART: [art] PUB.Y = 2B58B5DA735ED70AD2F62C0F623FE71240DD63DA0260A94AA07DE7D0768A28BE5EA6B3D00F3D1BA1D3A51D7EDCFD4BAC
25,070,646 UART: [art] SIG.R = AD7A3B506CA1581C7DCA6599B3C5AF9D12F2DB805D5AD4FCA01DEF19278DB849AAA798359F931FFA5E07BC93358BC6AF
25,078,085 UART: [art] SIG.S = 2127696B07260FBEAAB5AA9C4B98B59ABE58BE26753967FD6C991AA05180EC45103103B3980277C601D31FEBEEB9FFA2
26,056,793 UART: Caliptra RT
26,057,549 UART: [state] CFI Enabled
26,221,323 UART: [rt] RT listening for mailbox commands...
26,223,192 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,252,893 UART: [rt]cmd =0x46504c54, len=4
26,254,369 >>> mbox cmd response data (8 bytes)
26,255,286 UART: [rt] FIPS self test
26,256,232 UART: [kat] ++
26,256,683 UART: [kat] sha1
26,261,139 UART: [kat] SHA2-256
26,263,075 UART: [kat] SHA2-384
26,266,039 UART: [kat] SHA2-512-ACC
26,267,034 UART: Droping operation
26,267,945 UART: Fatal Error: 0x90050003
26,303,344 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,448,332 >>> mbox cmd response: failed
26,449,015 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,593,457 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,048 UART:
190,340 UART: Running Caliptra ROM ...
191,363 UART:
191,507 UART: [state] CFI Enabled
246,760 UART: [state] LifecycleState = Unprovisioned
249,121 UART: [state] DebugLocked = No
251,877 UART: [state] WD Timer not started. Device not locked for debugging
256,820 UART: [kat] SHA2-256
446,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,417 UART: [kat] ++
457,861 UART: [kat] sha1
470,089 UART: [kat] SHA2-256
473,076 UART: [kat] SHA2-384
479,326 UART: [kat] SHA2-512-ACC
481,918 UART: [kat] ECC-384
2,933,587 UART: [kat] HMAC-384Kdf
2,956,547 UART: [kat] LMS
3,488,358 UART: [kat] --
3,495,028 UART: [cold-reset] ++
3,496,748 UART: [fht] FHT @ 0x50003400
3,508,001 UART: [idev] ++
3,508,692 UART: [idev] CDI.KEYID = 6
3,509,661 UART: [idev] SUBJECT.KEYID = 7
3,510,877 UART: [idev] UDS.KEYID = 0
3,512,396 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,657,016 UART: [idev] Erasing UDS.KEYID = 0
6,014,378 UART: [idev] Sha1 KeyId Algorithm
6,035,349 UART: [idev] --
6,040,555 UART: [ldev] ++
6,041,250 UART: [ldev] CDI.KEYID = 6
6,042,141 UART: [ldev] SUBJECT.KEYID = 5
6,043,356 UART: [ldev] AUTHORITY.KEYID = 7
6,044,533 UART: [ldev] FE.KEYID = 1
6,085,652 UART: [ldev] Erasing FE.KEYID = 1
8,591,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,126 UART: [ldev] --
10,397,473 UART: [fwproc] Wait for Commands...
10,399,828 UART: [fwproc] Recv command 0x46574c44
10,402,104 UART: [fwproc] Recv'd Img size: 115032 bytes
13,856,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,725 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,054,891 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,600,734 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,436,236 ready_for_fw is high
3,436,630 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,748,642 >>> mbox cmd response: success
19,038,354 UART:
19,038,784 UART: Running Caliptra FMC ...
19,039,929 UART:
19,040,092 UART: [state] CFI Enabled
19,108,751 UART: [fht] FMC Alias Private Key: 7
20,872,634 UART: [art] Extend RT PCRs Done
20,874,371 UART: [art] Lock RT PCRs Done
20,875,660 UART: [art] Populate DV Done
20,881,196 UART: [fht] FMC Alias Private Key: 7
20,882,850 UART: [art] Derive CDI
20,883,735 UART: [art] Store in in slot 0x4
20,946,694 UART: [art] Derive Key Pair
20,947,868 UART: [art] Store priv key in slot 0x5
23,410,995 UART: [art] Derive Key Pair - Done
23,424,079 UART: [art] Signing Cert with AUTHO
23,425,395 UART: RITY.KEYID = 7
25,137,467 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,981 UART: [art] PUB.X = 3909926B8551ED11032C558DCF914F6231703F40E3ADBC98F05EF8B567A18FA51A4912687C2342DDFB91058D972570CA
25,146,220 UART: [art] PUB.Y = D623B2A995BB8652BB0D8ACDC15DA14B1B0701A5CADD2FC0F364039945A0CDCB7EB2B16E62D26B57892B3E2C69EDC7A4
25,153,521 UART: [art] SIG.R = EC48BA80000716FE11AE1850BE29DD936F9CEED8C9F1A8C510EE994CBC285392290F591FF9E97918F69E0C2B0BF792AD
25,160,874 UART: [art] SIG.S = 4EFCF0C09685FFCDBA378C5D74824BB0A76EAB18B8B9F1E3AC9FDEEBAE49CB40C960C4442FC81FE57C7FBB32544FB0D1
26,140,071 UART: Caliptra RT
26,140,772 UART: [state] CFI Enabled
26,304,597 UART: [rt] RT listening for mailbox commands...
26,306,455 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,336,019 UART: [rt]cmd =0x46504c54, len=4
26,337,526 >>> mbox cmd response data (8 bytes)
26,338,711 UART: [rt] FIPS self test
26,339,662 UART: [kat] ++
26,340,116 UART: [kat] sha1
26,344,655 UART: [kat] SHA2-256
26,346,591 UART: [kat] SHA2-384
26,349,550 UART: [kat] SHA2-512-ACC
26,350,575 UART: Droping operation
26,351,369 UART: Fatal Error: 0x90050003
26,386,574 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,531,071 >>> mbox cmd response: failed
26,531,692 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,676,167 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,424,822 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,742,351 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,429 UART:
192,805 UART: Running Caliptra ROM ...
193,950 UART:
603,727 UART: [state] CFI Enabled
618,168 UART: [state] LifecycleState = Unprovisioned
620,675 UART: [state] DebugLocked = No
623,017 UART: [state] WD Timer not started. Device not locked for debugging
628,368 UART: [kat] SHA2-256
818,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,035 UART: [kat] ++
829,590 UART: [kat] sha1
841,891 UART: [kat] SHA2-256
844,907 UART: [kat] SHA2-384
850,621 UART: [kat] SHA2-512-ACC
853,207 UART: [kat] ECC-384
3,294,802 UART: [kat] HMAC-384Kdf
3,307,436 UART: [kat] LMS
3,839,293 UART: [kat] --
3,842,364 UART: [cold-reset] ++
3,843,801 UART: [fht] FHT @ 0x50003400
3,854,004 UART: [idev] ++
3,854,739 UART: [idev] CDI.KEYID = 6
3,855,627 UART: [idev] SUBJECT.KEYID = 7
3,856,880 UART: [idev] UDS.KEYID = 0
3,857,811 ready_for_fw is high
3,858,037 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,002,597 UART: [idev] Erasing UDS.KEYID = 0
6,340,153 UART: [idev] Sha1 KeyId Algorithm
6,362,474 UART: [idev] --
6,367,959 UART: [ldev] ++
6,368,648 UART: [ldev] CDI.KEYID = 6
6,369,556 UART: [ldev] SUBJECT.KEYID = 5
6,370,772 UART: [ldev] AUTHORITY.KEYID = 7
6,371,952 UART: [ldev] FE.KEYID = 1
6,384,654 UART: [ldev] Erasing FE.KEYID = 1
8,863,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,486 UART: [ldev] --
10,651,132 UART: [fwproc] Wait for Commands...
10,653,890 UART: [fwproc] Recv command 0x46574c44
10,656,213 UART: [fwproc] Recv'd Img size: 115032 bytes
14,107,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,191,228 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,307,405 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,854,759 >>> mbox cmd response: success
14,859,076 UART: [afmc] ++
14,859,785 UART: [afmc] CDI.KEYID = 6
14,860,892 UART: [afmc] SUBJECT.KEYID = 7
14,862,427 UART: [afmc] AUTHORITY.KEYID = 5
17,360,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,084,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,086,209 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,101,439 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,116,544 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,131,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,154,828 UART: [afmc] --
19,159,027 UART: [cold-reset] --
19,163,330 UART: [state] Locking Datavault
19,167,782 UART: [state] Locking PCR0, PCR1 and PCR31
19,169,920 UART: [state] Locking ICCM
19,171,917 UART: [exit] Launching FMC @ 0x40000130
19,180,586 UART:
19,180,824 UART: Running Caliptra FMC ...
19,181,928 UART:
19,182,093 UART: [state] CFI Enabled
19,190,420 UART: [fht] FMC Alias Private Key: 7
20,947,642 UART: [art] Extend RT PCRs Done
20,948,862 UART: [art] Lock RT PCRs Done
20,950,330 UART: [art] Populate DV Done
20,955,695 UART: [fht] FMC Alias Private Key: 7
20,957,397 UART: [art] Derive CDI
20,958,214 UART: [art] Store in in slot 0x4
21,000,933 UART: [art] Derive Key Pair
21,001,981 UART: [art] Store priv key in slot 0x5
23,428,184 UART: [art] Derive Key Pair - Done
23,440,914 UART: [art] Signing Cert with AUTHO
23,442,223 UART: RITY.KEYID = 7
25,147,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,987 UART: [art] PUB.X = 3CD1C4250046A309E829DFA84D98DF9814EFCBF31B16A3E94FB60122D9026B1BF27D418AE6F804594F81433F24BF8A39
25,156,218 UART: [art] PUB.Y = 16FD76B41D525DF940548F10CBF01DA29053670B6FABC3EEB874E34777BD3099B4254A7ACB22515BF7735677D499B2E8
25,163,485 UART: [art] SIG.R = 09AFBE9FCED98407431C14B1B923113D3CBC9C6F0E70D66F0DACA5872997FD6391CAF66784A2F183909BDFDA7838A2A7
25,170,864 UART: [art] SIG.S = 83E1AC10115AA142FDE896F5F3CD25ED0BC8F6CFBD7786938E17E533D22018403796C750C82928982752343D597A12AC
26,149,795 UART: Caliptra RT
26,150,497 UART: [state] CFI Enabled
26,268,699 UART: [rt] RT listening for mailbox commands...
26,270,551 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,300,176 UART: [rt]cmd =0x46504c54, len=4
26,302,028 >>> mbox cmd response data (8 bytes)
26,303,273 UART: [rt] FIPS self test
26,304,216 UART: [kat] ++
26,304,669 UART: [kat] sha1
26,309,018 UART: [kat] SHA2-256
26,310,950 UART: [kat] SHA2-384
26,313,857 UART: [kat] SHA2-512-ACC
26,314,856 UART: Droping operation
26,315,656 UART: Fatal Error: 0x90050003
26,350,971 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,495,370 >>> mbox cmd response: failed
26,496,003 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,640,393 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,095 UART:
190,387 UART: Running Caliptra ROM ...
191,440 UART:
13,886,847 UART: [state] CFI Enabled
13,901,333 UART: [state] LifecycleState = Unprovisioned
13,903,694 UART: [state] DebugLocked = No
13,905,058 UART: [state] WD Timer not started. Device not locked for debugging
13,908,820 UART: [kat] SHA2-256
14,098,678 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,109,451 UART: [kat] ++
14,109,969 UART: [kat] sha1
14,122,318 UART: [kat] SHA2-256
14,125,309 UART: [kat] SHA2-384
14,132,503 UART: [kat] SHA2-512-ACC
14,135,081 UART: [kat] ECC-384
16,577,758 UART: [kat] HMAC-384Kdf
16,591,132 UART: [kat] LMS
17,122,969 UART: [kat] --
17,126,922 UART: [cold-reset] ++
17,128,157 UART: [fht] FHT @ 0x50003400
17,138,713 UART: [idev] ++
17,139,390 UART: [idev] CDI.KEYID = 6
17,140,409 UART: [idev] SUBJECT.KEYID = 7
17,141,570 UART: [idev] UDS.KEYID = 0
17,143,422 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,287,814 UART: [idev] Erasing UDS.KEYID = 0
19,614,474 UART: [idev] Sha1 KeyId Algorithm
19,636,123 UART: [idev] --
19,641,837 UART: [ldev] ++
19,642,540 UART: [ldev] CDI.KEYID = 6
19,643,424 UART: [ldev] SUBJECT.KEYID = 5
19,644,584 UART: [ldev] AUTHORITY.KEYID = 7
19,645,815 UART: [ldev] FE.KEYID = 1
19,657,765 UART: [ldev] Erasing FE.KEYID = 1
22,139,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,857,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,872,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,887,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,902,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,922,864 UART: [ldev] --
23,928,237 UART: [fwproc] Wait for Commands...
23,930,341 UART: [fwproc] Recv command 0x46574c44
23,932,612 UART: [fwproc] Recv'd Img size: 115032 bytes
27,381,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,461,897 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,578,032 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,124,974 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,753,586 ready_for_fw is high
3,754,049 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,969,609 >>> mbox cmd response: success
19,220,458 UART:
19,221,003 UART: Running Caliptra FMC ...
19,222,251 UART:
19,222,427 UART: [state] CFI Enabled
19,230,043 UART: [fht] FMC Alias Private Key: 7
20,986,892 UART: [art] Extend RT PCRs Done
20,988,113 UART: [art] Lock RT PCRs Done
20,989,686 UART: [art] Populate DV Done
20,995,161 UART: [fht] FMC Alias Private Key: 7
20,996,823 UART: [art] Derive CDI
20,997,567 UART: [art] Store in in slot 0x4
21,040,215 UART: [art] Derive Key Pair
21,041,225 UART: [art] Store priv key in slot 0x5
23,467,824 UART: [art] Derive Key Pair - Done
23,480,508 UART: [art] Signing Cert with AUTHO
23,481,819 UART: RITY.KEYID = 7
25,187,315 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,822 UART: [art] PUB.X = BC05937B86EB599167EBDE964284DB33658A772B4FB5C602E9A34F14CF4453CFA2B7D8B2316A90D271B646516064A440
25,196,052 UART: [art] PUB.Y = 228DBB1278EA4CCF2062DE59F46CDAFD6AB50B0684C548801666731C88321681607E76BDF4EE2575CCEEAD92D136BF2D
25,203,317 UART: [art] SIG.R = E07183D49D54C7B4DE1320BA02C10A55E6329FB5E2F7758655CF8335F6CD0D76DD4AED6B5CF267E32520E3629477070F
25,210,669 UART: [art] SIG.S = 2F92FB71E709E0BF78FAE0F8C90B9E3EE8E95E14B45AC0105FD9C9FC8E0DC828F0DF018931B764C3CF23FE05267AF0E7
26,189,359 UART: Caliptra RT
26,190,058 UART: [state] CFI Enabled
26,307,498 UART: [rt] RT listening for mailbox commands...
26,309,345 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,339,027 UART: [rt]cmd =0x46504c54, len=4
26,340,543 >>> mbox cmd response data (8 bytes)
26,341,679 UART: [rt] FIPS self test
26,342,650 UART: [kat] ++
26,343,104 UART: [kat] sha1
26,347,342 UART: [kat] SHA2-256
26,349,274 UART: [kat] SHA2-384
26,352,303 UART: [kat] SHA2-512-ACC
26,353,310 UART: Droping operation
26,354,290 UART: Fatal Error: 0x90050003
26,389,447 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,533,978 >>> mbox cmd response: failed
26,534,619 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,679,029 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
17,009,086 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,230,261 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,295 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,200 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,476,003 UART: [cold-reset] ++
1,476,391 UART: [fht] Storing FHT @ 0x50003400
1,479,164 UART: [idev] ++
1,479,332 UART: [idev] CDI.KEYID = 6
1,479,692 UART: [idev] SUBJECT.KEYID = 7
1,480,116 UART: [idev] UDS.KEYID = 0
1,480,461 ready_for_fw is high
1,480,461 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,064 UART: [idev] Erasing UDS.KEYID = 0
1,504,578 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,348 UART: [idev] --
1,514,467 UART: [ldev] ++
1,514,635 UART: [ldev] CDI.KEYID = 6
1,514,998 UART: [ldev] SUBJECT.KEYID = 5
1,515,424 UART: [ldev] AUTHORITY.KEYID = 7
1,515,887 UART: [ldev] FE.KEYID = 1
1,521,027 UART: [ldev] Erasing FE.KEYID = 1
1,545,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,876 UART: [ldev] --
1,585,239 UART: [fwproc] Waiting for Commands...
1,585,938 UART: [fwproc] Received command 0x46574c44
1,586,729 UART: [fwproc] Received Image of size 115032 bytes
2,892,190 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,008 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,085,367 >>> mbox cmd response: success
3,086,581 UART: [afmc] ++
3,086,749 UART: [afmc] CDI.KEYID = 6
3,087,111 UART: [afmc] SUBJECT.KEYID = 7
3,087,536 UART: [afmc] AUTHORITY.KEYID = 5
3,122,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,138,921 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,701 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,429 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,314 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,004 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,839 UART: [afmc] --
3,165,949 UART: [cold-reset] --
3,166,519 UART: [state] Locking Datavault
3,167,892 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,496 UART: [state] Locking ICCM
3,169,006 UART: [exit] Launching FMC @ 0x40000130
3,174,335 UART:
3,174,351 UART: Running Caliptra FMC ...
3,174,759 UART:
3,174,813 UART: [state] CFI Enabled
3,185,154 UART: [fht] FMC Alias Private Key: 7
3,293,519 UART: [art] Extend RT PCRs Done
3,293,947 UART: [art] Lock RT PCRs Done
3,295,851 UART: [art] Populate DV Done
3,303,896 UART: [fht] FMC Alias Private Key: 7
3,305,018 UART: [art] Derive CDI
3,305,298 UART: [art] Store in in slot 0x4
3,390,839 UART: [art] Derive Key Pair
3,391,199 UART: [art] Store priv key in slot 0x5
3,404,541 UART: [art] Derive Key Pair - Done
3,419,250 UART: [art] Signing Cert with AUTHO
3,419,730 UART: RITY.KEYID = 7
3,435,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,939 UART: [art] PUB.X = A006C46FAC0FCAB745EAB6AF437F170B5D2B629F9DEA98B99238D979968C0849B2ABB4115D96E0A82C9A4C34EC0E6D28
3,442,710 UART: [art] PUB.Y = C944B88CB16192804917BB2445C5EE38EBC9DE6192DC6A7CE2E3A8562D6EC0B9078B65CEF6E2CE1BE4804F66F0FD604E
3,449,673 UART: [art] SIG.R = BDEC0F5CA7B8DBA3D01A69D8D8ECD66EAAA0A0A6A8F5E0D1748FB1CDDBA5185094653FF557A7BF4D8B9757432D68F62E
3,456,468 UART: [art] SIG.S = 4A6ABDC6918E8A67EA03A6F4A630FB5B7DF5069DB779BE50338AE1524B988C351E905B4EE284BBDCD27C71AF6BEE63EE
3,480,909 UART: Caliptra RT
3,481,162 UART: [state] CFI Enabled
3,589,539 UART: [rt] RT listening for mailbox commands...
3,590,202 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,167 UART: [rt]cmd =0x46504c54, len=4
3,621,203 >>> mbox cmd response data (8 bytes)
3,621,470 UART: [rt] FIPS self test
3,621,798 UART: [kat] ++
3,621,950 UART: [kat] sha1
3,626,284 UART: [kat] SHA2-256
3,628,306 UART: [kat] SHA2-384
3,631,097 UART: [kat] SHA2-512-ACC
3,632,580 UART: Droping operation
3,633,149 UART: Fatal Error: 0x90050003
3,634,688 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,634,693 >>> mbox cmd response: failed
3,634,693 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,634,698 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,673 UART: [kat] SHA2-256
892,611 UART: [kat] SHA2-384
895,542 UART: [kat] SHA2-512-ACC
897,443 UART: [kat] ECC-384
903,256 UART: [kat] HMAC-384Kdf
907,764 UART: [kat] LMS
1,475,960 UART: [kat] --
1,476,991 UART: [cold-reset] ++
1,477,565 UART: [fht] Storing FHT @ 0x50003400
1,480,478 UART: [idev] ++
1,480,646 UART: [idev] CDI.KEYID = 6
1,481,006 UART: [idev] SUBJECT.KEYID = 7
1,481,430 UART: [idev] UDS.KEYID = 0
1,481,775 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,814 UART: [idev] Erasing UDS.KEYID = 0
1,506,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,084 UART: [idev] --
1,516,065 UART: [ldev] ++
1,516,233 UART: [ldev] CDI.KEYID = 6
1,516,596 UART: [ldev] SUBJECT.KEYID = 5
1,517,022 UART: [ldev] AUTHORITY.KEYID = 7
1,517,485 UART: [ldev] FE.KEYID = 1
1,522,465 UART: [ldev] Erasing FE.KEYID = 1
1,548,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,284 UART: [ldev] --
1,587,619 UART: [fwproc] Waiting for Commands...
1,588,428 UART: [fwproc] Received command 0x46574c44
1,589,219 UART: [fwproc] Received Image of size 115032 bytes
2,895,552 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,246 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,598 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,089,483 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,633 ready_for_fw is high
1,361,633 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,399 >>> mbox cmd response: success
2,996,141 UART:
2,996,157 UART: Running Caliptra FMC ...
2,996,565 UART:
2,996,619 UART: [state] CFI Enabled
3,007,270 UART: [fht] FMC Alias Private Key: 7
3,115,399 UART: [art] Extend RT PCRs Done
3,115,827 UART: [art] Lock RT PCRs Done
3,117,401 UART: [art] Populate DV Done
3,125,720 UART: [fht] FMC Alias Private Key: 7
3,126,872 UART: [art] Derive CDI
3,127,152 UART: [art] Store in in slot 0x4
3,212,955 UART: [art] Derive Key Pair
3,213,315 UART: [art] Store priv key in slot 0x5
3,226,619 UART: [art] Derive Key Pair - Done
3,241,282 UART: [art] Signing Cert with AUTHO
3,241,762 UART: RITY.KEYID = 7
3,256,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,611 UART: [art] PUB.X = E8955B7FB8F082EC712FCA3C143A5C92EA455B64499BC6384445B42ECCA746D983D8F1553966A7DB1C4544482D778692
3,264,381 UART: [art] PUB.Y = DD7B5F5AA39244043C257D9C00A1507C114F466378F1FC47E5961DC9A77CDA8093E2BBB13621F8407472084AC324AA85
3,271,303 UART: [art] SIG.R = 31FD5CD51FC92F6AFEF8057FF2ADB008D778A8A69CD5856698BA12EDA0185A25F84F8EABD9C091C25623523FB29CDE4D
3,278,087 UART: [art] SIG.S = 54E5D82973538715D46A110F6FDCF1856B9AD0609AC4B16745769BA1CE89F68FFEA4A2C6C7B784C9E62683DBF9244E3A
3,302,159 UART: Caliptra RT
3,302,412 UART: [state] CFI Enabled
3,409,732 UART: [rt] RT listening for mailbox commands...
3,410,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,086 UART: [rt]cmd =0x46504c54, len=4
3,441,228 >>> mbox cmd response data (8 bytes)
3,441,359 UART: [rt] FIPS self test
3,441,687 UART: [kat] ++
3,441,839 UART: [kat] sha1
3,446,197 UART: [kat] SHA2-256
3,448,219 UART: [kat] SHA2-384
3,451,212 UART: [kat] SHA2-512-ACC
3,452,695 UART: Droping operation
3,453,158 UART: Fatal Error: 0x90050003
3,454,697 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,454,702 >>> mbox cmd response: failed
3,454,702 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,454,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,355 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,933,859 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,528 UART: [kat] SHA2-256
882,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,574 UART: [kat] ++
886,726 UART: [kat] sha1
890,954 UART: [kat] SHA2-256
892,892 UART: [kat] SHA2-384
895,775 UART: [kat] SHA2-512-ACC
897,676 UART: [kat] ECC-384
903,207 UART: [kat] HMAC-384Kdf
907,851 UART: [kat] LMS
1,476,047 UART: [kat] --
1,476,974 UART: [cold-reset] ++
1,477,498 UART: [fht] Storing FHT @ 0x50003400
1,480,173 UART: [idev] ++
1,480,341 UART: [idev] CDI.KEYID = 6
1,480,701 UART: [idev] SUBJECT.KEYID = 7
1,481,125 UART: [idev] UDS.KEYID = 0
1,481,470 ready_for_fw is high
1,481,470 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,959 UART: [idev] Erasing UDS.KEYID = 0
1,505,467 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,971 UART: [idev] --
1,514,990 UART: [ldev] ++
1,515,158 UART: [ldev] CDI.KEYID = 6
1,515,521 UART: [ldev] SUBJECT.KEYID = 5
1,515,947 UART: [ldev] AUTHORITY.KEYID = 7
1,516,410 UART: [ldev] FE.KEYID = 1
1,521,472 UART: [ldev] Erasing FE.KEYID = 1
1,546,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,135 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,989 UART: [ldev] --
1,586,500 UART: [fwproc] Waiting for Commands...
1,587,165 UART: [fwproc] Received command 0x46574c44
1,587,956 UART: [fwproc] Received Image of size 115032 bytes
2,892,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,945 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,260 >>> mbox cmd response: success
3,087,334 UART: [afmc] ++
3,087,502 UART: [afmc] CDI.KEYID = 6
3,087,864 UART: [afmc] SUBJECT.KEYID = 7
3,088,289 UART: [afmc] AUTHORITY.KEYID = 5
3,123,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,606 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,386 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,114 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,999 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,689 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,644 UART: [afmc] --
3,166,748 UART: [cold-reset] --
3,167,648 UART: [state] Locking Datavault
3,168,763 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,367 UART: [state] Locking ICCM
3,169,901 UART: [exit] Launching FMC @ 0x40000130
3,175,230 UART:
3,175,246 UART: Running Caliptra FMC ...
3,175,654 UART:
3,175,797 UART: [state] CFI Enabled
3,186,230 UART: [fht] FMC Alias Private Key: 7
3,294,235 UART: [art] Extend RT PCRs Done
3,294,663 UART: [art] Lock RT PCRs Done
3,296,029 UART: [art] Populate DV Done
3,304,128 UART: [fht] FMC Alias Private Key: 7
3,305,194 UART: [art] Derive CDI
3,305,474 UART: [art] Store in in slot 0x4
3,390,919 UART: [art] Derive Key Pair
3,391,279 UART: [art] Store priv key in slot 0x5
3,404,887 UART: [art] Derive Key Pair - Done
3,419,531 UART: [art] Signing Cert with AUTHO
3,420,011 UART: RITY.KEYID = 7
3,435,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,180 UART: [art] PUB.X = F2A1A0C8666626129D104EDCD3F92CBFA1B3322F8F4A0734FC0F4E92BF028426CE8D6CFC6294455A69756C03AC776E6F
3,442,948 UART: [art] PUB.Y = 5592341C0BD72EBF63F7B0DE5386C433F690ABD459F8E1D732A53D19DDBDD99D17DBE200A0B987131E17A3CFFE7A97A7
3,449,889 UART: [art] SIG.R = FB4194A0339FF5216AFCCEBCE816E6359FC9F4E5569C6AF4215D81478490F8CCB92F864333B13A9ACCD3BB030807FC07
3,456,659 UART: [art] SIG.S = 3207E9EB526F669D7B4337E532469009E6581F5C716C488EE8A81D1079F1BF03CB1F1E088F9A1FAC20C22710FE492F6A
3,480,372 UART: Caliptra RT
3,480,717 UART: [state] CFI Enabled
3,588,474 UART: [rt] RT listening for mailbox commands...
3,589,137 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,618,726 UART: [rt]cmd =0x46504c54, len=4
3,619,788 >>> mbox cmd response data (8 bytes)
3,620,089 UART: [rt] FIPS self test
3,620,417 UART: [kat] ++
3,620,569 UART: [kat] sha1
3,624,831 UART: [kat] SHA2-256
3,626,853 UART: [kat] SHA2-384
3,629,700 UART: [kat] SHA2-512-ACC
3,631,183 UART: Droping operation
3,631,704 UART: Fatal Error: 0x90050003
3,633,243 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,633,248 >>> mbox cmd response: failed
3,633,248 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,633,253 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,902 UART: [kat] SHA2-256
881,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,948 UART: [kat] ++
886,100 UART: [kat] sha1
890,318 UART: [kat] SHA2-256
892,256 UART: [kat] SHA2-384
894,967 UART: [kat] SHA2-512-ACC
896,868 UART: [kat] ECC-384
902,667 UART: [kat] HMAC-384Kdf
907,251 UART: [kat] LMS
1,475,447 UART: [kat] --
1,476,138 UART: [cold-reset] ++
1,476,626 UART: [fht] Storing FHT @ 0x50003400
1,479,449 UART: [idev] ++
1,479,617 UART: [idev] CDI.KEYID = 6
1,479,977 UART: [idev] SUBJECT.KEYID = 7
1,480,401 UART: [idev] UDS.KEYID = 0
1,480,746 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,639 UART: [idev] Erasing UDS.KEYID = 0
1,505,845 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,489 UART: [idev] --
1,515,406 UART: [ldev] ++
1,515,574 UART: [ldev] CDI.KEYID = 6
1,515,937 UART: [ldev] SUBJECT.KEYID = 5
1,516,363 UART: [ldev] AUTHORITY.KEYID = 7
1,516,826 UART: [ldev] FE.KEYID = 1
1,522,134 UART: [ldev] Erasing FE.KEYID = 1
1,547,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,265 UART: [ldev] --
1,586,758 UART: [fwproc] Waiting for Commands...
1,587,501 UART: [fwproc] Received command 0x46574c44
1,588,292 UART: [fwproc] Received Image of size 115032 bytes
2,892,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,079 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,340 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,138 ready_for_fw is high
1,362,138 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,934,880 >>> mbox cmd response: success
2,997,010 UART:
2,997,026 UART: Running Caliptra FMC ...
2,997,434 UART:
2,997,577 UART: [state] CFI Enabled
3,008,240 UART: [fht] FMC Alias Private Key: 7
3,115,785 UART: [art] Extend RT PCRs Done
3,116,213 UART: [art] Lock RT PCRs Done
3,117,833 UART: [art] Populate DV Done
3,126,274 UART: [fht] FMC Alias Private Key: 7
3,127,306 UART: [art] Derive CDI
3,127,586 UART: [art] Store in in slot 0x4
3,213,311 UART: [art] Derive Key Pair
3,213,671 UART: [art] Store priv key in slot 0x5
3,226,279 UART: [art] Derive Key Pair - Done
3,240,802 UART: [art] Signing Cert with AUTHO
3,241,282 UART: RITY.KEYID = 7
3,256,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,257,151 UART: [art] PUB.X = 4587E71CE5205597A4E5EEE75EA8C3E68BB002A21A60A081FD0C545265823A7D439C163394BCC8C0BF28BB66F042FF60
3,263,921 UART: [art] PUB.Y = F7605CEE13B5C8163B4A0E27AF74F7061534C9813B90FB197A0DBCB3F8C64D5A1979482A739A5196E70B243F9A814DBE
3,270,865 UART: [art] SIG.R = B79EBE66F472BACE8F94229157BF4F23820CC964000EB75EDBC78074FEBC48D9B3FB59E573805F99F8FE06BDAFBCB026
3,277,624 UART: [art] SIG.S = 05D6E7E1F186BE26EDDEDBB223B0294CB6B631E6A3550C7470E8A494EA9F2BE9BEBBE42BC952A9DE6525F36F8CFAB203
3,301,522 UART: Caliptra RT
3,301,867 UART: [state] CFI Enabled
3,410,340 UART: [rt] RT listening for mailbox commands...
3,411,003 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,440,860 UART: [rt]cmd =0x46504c54, len=4
3,442,022 >>> mbox cmd response data (8 bytes)
3,442,199 UART: [rt] FIPS self test
3,442,527 UART: [kat] ++
3,442,679 UART: [kat] sha1
3,446,913 UART: [kat] SHA2-256
3,448,935 UART: [kat] SHA2-384
3,451,826 UART: [kat] SHA2-512-ACC
3,453,309 UART: Droping operation
3,453,750 UART: Fatal Error: 0x90050003
3,455,289 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,455,294 >>> mbox cmd response: failed
3,455,294 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,455,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,364,338 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,194 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
892,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,105 UART: [kat] ++
897,257 UART: [kat] sha1
901,513 UART: [kat] SHA2-256
903,453 UART: [kat] SHA2-384
906,310 UART: [kat] SHA2-512-ACC
908,211 UART: [kat] ECC-384
918,498 UART: [kat] HMAC-384Kdf
923,070 UART: [kat] LMS
1,171,398 UART: [kat] --
1,172,497 UART: [cold-reset] ++
1,173,071 UART: [fht] FHT @ 0x50003400
1,175,752 UART: [idev] ++
1,175,920 UART: [idev] CDI.KEYID = 6
1,176,280 UART: [idev] SUBJECT.KEYID = 7
1,176,704 UART: [idev] UDS.KEYID = 0
1,177,049 ready_for_fw is high
1,177,049 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,800 UART: [idev] Erasing UDS.KEYID = 0
1,201,705 UART: [idev] Sha1 KeyId Algorithm
1,210,241 UART: [idev] --
1,211,313 UART: [ldev] ++
1,211,481 UART: [ldev] CDI.KEYID = 6
1,211,844 UART: [ldev] SUBJECT.KEYID = 5
1,212,270 UART: [ldev] AUTHORITY.KEYID = 7
1,212,733 UART: [ldev] FE.KEYID = 1
1,218,139 UART: [ldev] Erasing FE.KEYID = 1
1,244,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,493 UART: [ldev] --
1,283,840 UART: [fwproc] Wait for Commands...
1,284,526 UART: [fwproc] Recv command 0x46574c44
1,285,254 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,993 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,297 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,062 >>> mbox cmd response: success
2,784,132 UART: [afmc] ++
2,784,300 UART: [afmc] CDI.KEYID = 6
2,784,662 UART: [afmc] SUBJECT.KEYID = 7
2,785,087 UART: [afmc] AUTHORITY.KEYID = 5
2,821,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,355 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,083 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,968 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,687 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,601 UART: [afmc] --
2,864,693 UART: [cold-reset] --
2,865,499 UART: [state] Locking Datavault
2,866,530 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,134 UART: [state] Locking ICCM
2,867,564 UART: [exit] Launching FMC @ 0x40000130
2,872,893 UART:
2,872,909 UART: Running Caliptra FMC ...
2,873,317 UART:
2,873,371 UART: [state] CFI Enabled
2,883,834 UART: [fht] FMC Alias Private Key: 7
2,992,195 UART: [art] Extend RT PCRs Done
2,992,623 UART: [art] Lock RT PCRs Done
2,994,055 UART: [art] Populate DV Done
3,002,078 UART: [fht] FMC Alias Private Key: 7
3,003,122 UART: [art] Derive CDI
3,003,402 UART: [art] Store in in slot 0x4
3,089,143 UART: [art] Derive Key Pair
3,089,503 UART: [art] Store priv key in slot 0x5
3,102,567 UART: [art] Derive Key Pair - Done
3,117,554 UART: [art] Signing Cert with AUTHO
3,118,034 UART: RITY.KEYID = 7
3,133,174 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,939 UART: [art] PUB.X = 5EF375FB362A4C4AA786A77BFA4C9CFA26EF2E77857D6A37A8F8FFB0B47105F1AAA9B7603744339591D178159323A0F2
3,140,714 UART: [art] PUB.Y = 5BC77CA526931E6F385A4A322EE3A6F640860D894869B7A23015A17C499FAAA9521AB109A802B221032973C558AA6E86
3,147,648 UART: [art] SIG.R = 6CF849B3FE1420A02BB6B3FDD79C300E31ACA913F7F4F9128E488719D2FB4B064C4B3B0096E3E77BCC4EC87CB23E5FF7
3,154,408 UART: [art] SIG.S = F1C0C8C7B4AB1E5EED4E9C3F75030AD34533A17FF4D8C826B92826322776499EA9531D9F6953666307C50B3323899419
3,177,699 UART: Caliptra RT
3,177,952 UART: [state] CFI Enabled
3,285,875 UART: [rt] RT listening for mailbox commands...
3,286,538 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,277 UART: [rt]cmd =0x46504c54, len=4
3,317,623 >>> mbox cmd response data (8 bytes)
3,317,976 UART: [rt] FIPS self test
3,318,304 UART: [kat] ++
3,318,456 UART: [kat] sha1
3,322,694 UART: [kat] SHA2-256
3,324,716 UART: [kat] SHA2-384
3,327,721 UART: [kat] SHA2-512-ACC
3,329,204 UART: Droping operation
3,329,651 UART: Fatal Error: 0x90050003
3,331,190 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,331,195 >>> mbox cmd response: failed
3,331,195 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,331,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
893,396 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,521 UART: [kat] ++
897,673 UART: [kat] sha1
901,875 UART: [kat] SHA2-256
903,815 UART: [kat] SHA2-384
906,348 UART: [kat] SHA2-512-ACC
908,249 UART: [kat] ECC-384
917,966 UART: [kat] HMAC-384Kdf
922,458 UART: [kat] LMS
1,170,786 UART: [kat] --
1,171,697 UART: [cold-reset] ++
1,172,101 UART: [fht] FHT @ 0x50003400
1,174,774 UART: [idev] ++
1,174,942 UART: [idev] CDI.KEYID = 6
1,175,302 UART: [idev] SUBJECT.KEYID = 7
1,175,726 UART: [idev] UDS.KEYID = 0
1,176,071 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,706 UART: [idev] Erasing UDS.KEYID = 0
1,200,903 UART: [idev] Sha1 KeyId Algorithm
1,209,319 UART: [idev] --
1,210,385 UART: [ldev] ++
1,210,553 UART: [ldev] CDI.KEYID = 6
1,210,916 UART: [ldev] SUBJECT.KEYID = 5
1,211,342 UART: [ldev] AUTHORITY.KEYID = 7
1,211,805 UART: [ldev] FE.KEYID = 1
1,217,161 UART: [ldev] Erasing FE.KEYID = 1
1,243,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,963 UART: [ldev] --
1,283,438 UART: [fwproc] Wait for Commands...
1,284,140 UART: [fwproc] Recv command 0x46574c44
1,284,868 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,361 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,665 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,546 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,007 ready_for_fw is high
1,060,007 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,847 >>> mbox cmd response: success
2,695,955 UART:
2,695,971 UART: Running Caliptra FMC ...
2,696,379 UART:
2,696,433 UART: [state] CFI Enabled
2,706,954 UART: [fht] FMC Alias Private Key: 7
2,815,095 UART: [art] Extend RT PCRs Done
2,815,523 UART: [art] Lock RT PCRs Done
2,817,111 UART: [art] Populate DV Done
2,825,250 UART: [fht] FMC Alias Private Key: 7
2,826,276 UART: [art] Derive CDI
2,826,556 UART: [art] Store in in slot 0x4
2,912,195 UART: [art] Derive Key Pair
2,912,555 UART: [art] Store priv key in slot 0x5
2,925,707 UART: [art] Derive Key Pair - Done
2,940,570 UART: [art] Signing Cert with AUTHO
2,941,050 UART: RITY.KEYID = 7
2,956,940 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,705 UART: [art] PUB.X = 4D6982BB75AA4F3EFF2973E1F137D30DA762FC6DB7191835A79AD724B995A608CB8DB24892910B04126136512D16400E
2,964,458 UART: [art] PUB.Y = D537A69A36AB8733DEE24F45ED939493EFCE3F6526757E44319D0289FE714D84E7C54D9D337E74CF2BEC5032F359FE02
2,971,408 UART: [art] SIG.R = 1244BB514088C4C3249C2ED349C22D868752AB5883B2789784A8C02B55C960ADEF1E5640C1FA8D4870E9347755E790AC
2,978,174 UART: [art] SIG.S = B12DF8A24DEEC93B1C4F6ACD56060C892FE2B1954586DD942AE9543C0A99422BD69198007F3AF1AE076B113896D92306
3,001,248 UART: Caliptra RT
3,001,501 UART: [state] CFI Enabled
3,109,396 UART: [rt] RT listening for mailbox commands...
3,110,059 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,930 UART: [rt]cmd =0x46504c54, len=4
3,140,990 >>> mbox cmd response data (8 bytes)
3,141,237 UART: [rt] FIPS self test
3,141,565 UART: [kat] ++
3,141,717 UART: [kat] sha1
3,145,981 UART: [kat] SHA2-256
3,148,003 UART: [kat] SHA2-384
3,150,964 UART: [kat] SHA2-512-ACC
3,152,447 UART: Droping operation
3,152,924 UART: Fatal Error: 0x90050003
3,154,463 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,154,468 >>> mbox cmd response: failed
3,154,468 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,154,473 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,571 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,585 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,254 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
893,157 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,282 UART: [kat] ++
897,434 UART: [kat] sha1
901,608 UART: [kat] SHA2-256
903,548 UART: [kat] SHA2-384
906,135 UART: [kat] SHA2-512-ACC
908,036 UART: [kat] ECC-384
917,929 UART: [kat] HMAC-384Kdf
922,573 UART: [kat] LMS
1,170,901 UART: [kat] --
1,171,996 UART: [cold-reset] ++
1,172,412 UART: [fht] FHT @ 0x50003400
1,175,055 UART: [idev] ++
1,175,223 UART: [idev] CDI.KEYID = 6
1,175,583 UART: [idev] SUBJECT.KEYID = 7
1,176,007 UART: [idev] UDS.KEYID = 0
1,176,352 ready_for_fw is high
1,176,352 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,926 UART: [idev] Sha1 KeyId Algorithm
1,210,544 UART: [idev] --
1,211,624 UART: [ldev] ++
1,211,792 UART: [ldev] CDI.KEYID = 6
1,212,155 UART: [ldev] SUBJECT.KEYID = 5
1,212,581 UART: [ldev] AUTHORITY.KEYID = 7
1,213,044 UART: [ldev] FE.KEYID = 1
1,218,360 UART: [ldev] Erasing FE.KEYID = 1
1,244,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,638 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,651 UART: [fwproc] Recv command 0x46574c44
1,285,379 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,276 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,580 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,565 >>> mbox cmd response: success
2,785,797 UART: [afmc] ++
2,785,965 UART: [afmc] CDI.KEYID = 6
2,786,327 UART: [afmc] SUBJECT.KEYID = 7
2,786,752 UART: [afmc] AUTHORITY.KEYID = 5
2,821,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,848 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,324 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,209 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,928 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,630 UART: [afmc] --
2,864,658 UART: [cold-reset] --
2,865,446 UART: [state] Locking Datavault
2,866,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,079 UART: [state] Locking ICCM
2,867,749 UART: [exit] Launching FMC @ 0x40000130
2,873,078 UART:
2,873,094 UART: Running Caliptra FMC ...
2,873,502 UART:
2,873,645 UART: [state] CFI Enabled
2,884,214 UART: [fht] FMC Alias Private Key: 7
2,992,123 UART: [art] Extend RT PCRs Done
2,992,551 UART: [art] Lock RT PCRs Done
2,994,273 UART: [art] Populate DV Done
3,002,838 UART: [fht] FMC Alias Private Key: 7
3,003,920 UART: [art] Derive CDI
3,004,200 UART: [art] Store in in slot 0x4
3,090,207 UART: [art] Derive Key Pair
3,090,567 UART: [art] Store priv key in slot 0x5
3,104,217 UART: [art] Derive Key Pair - Done
3,119,131 UART: [art] Signing Cert with AUTHO
3,119,611 UART: RITY.KEYID = 7
3,134,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,480 UART: [art] PUB.X = 60CCCB4BC16A08CC50A272B642004EAC4673C0346DF95C6126CA3D1B2A669AB23C2DC416CD8A6FFFB88A9728D43BD25B
3,142,243 UART: [art] PUB.Y = EBEFE313B3BED45A6B43668BD4222791FA3A75BE614036D88816790C99C6192CC8B65C346D0CC07CB6988A5D64290AB1
3,149,190 UART: [art] SIG.R = ADF74AF6F1056E2EC07499B95262E9B790E4678816408FAE3E0BD5D323991130FBB79D8E2A77D9A33E54BB97FCAFFF24
3,155,966 UART: [art] SIG.S = E72C6826CA7D3CE84A74A642D4FC69E23563F666CD5D7A3BA062EF85868DCC22CED76A2204F2814F572AA807CDF9C980
3,179,829 UART: Caliptra RT
3,180,174 UART: [state] CFI Enabled
3,288,524 UART: [rt] RT listening for mailbox commands...
3,289,187 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,940 UART: [rt]cmd =0x46504c54, len=4
3,320,076 >>> mbox cmd response data (8 bytes)
3,320,337 UART: [rt] FIPS self test
3,320,665 UART: [kat] ++
3,320,817 UART: [kat] sha1
3,325,133 UART: [kat] SHA2-256
3,327,155 UART: [kat] SHA2-384
3,330,154 UART: [kat] SHA2-512-ACC
3,331,637 UART: Droping operation
3,332,176 UART: Fatal Error: 0x90050003
3,333,715 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,720 >>> mbox cmd response: failed
3,333,720 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
893,743 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,868 UART: [kat] ++
898,020 UART: [kat] sha1
902,322 UART: [kat] SHA2-256
904,262 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
922,949 UART: [kat] LMS
1,171,277 UART: [kat] --
1,172,200 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,263 UART: [idev] ++
1,175,431 UART: [idev] CDI.KEYID = 6
1,175,791 UART: [idev] SUBJECT.KEYID = 7
1,176,215 UART: [idev] UDS.KEYID = 0
1,176,560 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,201,846 UART: [idev] Sha1 KeyId Algorithm
1,210,360 UART: [idev] --
1,211,448 UART: [ldev] ++
1,211,616 UART: [ldev] CDI.KEYID = 6
1,211,979 UART: [ldev] SUBJECT.KEYID = 5
1,212,405 UART: [ldev] AUTHORITY.KEYID = 7
1,212,868 UART: [ldev] FE.KEYID = 1
1,218,360 UART: [ldev] Erasing FE.KEYID = 1
1,245,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,183 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,418 UART: [ldev] --
1,284,879 UART: [fwproc] Wait for Commands...
1,285,637 UART: [fwproc] Recv command 0x46574c44
1,286,365 UART: [fwproc] Recv'd Img size: 115032 bytes
2,592,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,620,466 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,649,770 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,786,513 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,986 ready_for_fw is high
1,060,986 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,926 >>> mbox cmd response: success
2,698,796 UART:
2,698,812 UART: Running Caliptra FMC ...
2,699,220 UART:
2,699,363 UART: [state] CFI Enabled
2,710,132 UART: [fht] FMC Alias Private Key: 7
2,818,853 UART: [art] Extend RT PCRs Done
2,819,281 UART: [art] Lock RT PCRs Done
2,820,903 UART: [art] Populate DV Done
2,829,234 UART: [fht] FMC Alias Private Key: 7
2,830,368 UART: [art] Derive CDI
2,830,648 UART: [art] Store in in slot 0x4
2,916,113 UART: [art] Derive Key Pair
2,916,473 UART: [art] Store priv key in slot 0x5
2,929,533 UART: [art] Derive Key Pair - Done
2,944,282 UART: [art] Signing Cert with AUTHO
2,944,762 UART: RITY.KEYID = 7
2,960,144 UART: [art] Erasing AUTHORITY.KEYID = 7
2,960,909 UART: [art] PUB.X = 321A5C7F0E9D4DA423E358F624C2D156B437502670821ED16E6F926F7BD2DE6E0B4674B905A8760C7B8A042A3366F22F
2,967,664 UART: [art] PUB.Y = B82BBF8F64BEF7758122021023162DCE3A6D2D17601E63C05F22926C182E4251EFB8D8C2D8536EB59063986DF3A008DE
2,974,610 UART: [art] SIG.R = 843205BBF63C4D660729DE0817AAFFA94D195220AED3A224891E63D86950814BD04E5D3C0CFD5C115463576577B1C349
2,981,366 UART: [art] SIG.S = 87FC73EEED52B1E187346B57021054DF82F13439CBD9D13B47DB95691FD3C4B5570FADE5ABD35376B9EAE9C08B1613E2
3,004,851 UART: Caliptra RT
3,005,196 UART: [state] CFI Enabled
3,113,654 UART: [rt] RT listening for mailbox commands...
3,114,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,143,924 UART: [rt]cmd =0x46504c54, len=4
3,145,002 >>> mbox cmd response data (8 bytes)
3,145,293 UART: [rt] FIPS self test
3,145,621 UART: [kat] ++
3,145,773 UART: [kat] sha1
3,150,045 UART: [kat] SHA2-256
3,152,067 UART: [kat] SHA2-384
3,154,938 UART: [kat] SHA2-512-ACC
3,156,421 UART: Droping operation
3,156,808 UART: Fatal Error: 0x90050003
3,158,347 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,158,352 >>> mbox cmd response: failed
3,158,352 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,158,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,488 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,864 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,452 UART: [state] LifecycleState = Unprovisioned
86,107 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,864 UART: [kat] SHA2-256
891,414 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
899,893 UART: [kat] SHA2-256
901,833 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
915,782 UART: [kat] HMAC-384Kdf
920,232 UART: [kat] LMS
1,168,544 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,713 UART: [fht] FHT @ 0x50003400
1,172,251 UART: [idev] ++
1,172,419 UART: [idev] CDI.KEYID = 6
1,172,780 UART: [idev] SUBJECT.KEYID = 7
1,173,205 UART: [idev] UDS.KEYID = 0
1,173,551 ready_for_fw is high
1,173,551 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,196 UART: [ldev] ++
1,208,364 UART: [ldev] CDI.KEYID = 6
1,208,728 UART: [ldev] SUBJECT.KEYID = 5
1,209,155 UART: [ldev] AUTHORITY.KEYID = 7
1,209,618 UART: [ldev] FE.KEYID = 1
1,214,970 UART: [ldev] Erasing FE.KEYID = 1
1,241,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,912 UART: [ldev] --
1,281,208 UART: [fwproc] Wait for Commands...
1,281,955 UART: [fwproc] Recv command 0x46574c44
1,282,688 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,031 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,340 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,180 >>> mbox cmd response: success
2,782,389 UART: [afmc] ++
2,782,557 UART: [afmc] CDI.KEYID = 6
2,782,920 UART: [afmc] SUBJECT.KEYID = 7
2,783,346 UART: [afmc] AUTHORITY.KEYID = 5
2,817,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,192 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,921 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,804 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,523 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,334 UART: [afmc] --
2,861,418 UART: [cold-reset] --
2,862,144 UART: [state] Locking Datavault
2,863,189 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,793 UART: [state] Locking ICCM
2,864,331 UART: [exit] Launching FMC @ 0x40000130
2,869,660 UART:
2,869,676 UART: Running Caliptra FMC ...
2,870,084 UART:
2,870,138 UART: [state] CFI Enabled
2,880,413 UART: [fht] FMC Alias Private Key: 7
2,988,930 UART: [art] Extend RT PCRs Done
2,989,358 UART: [art] Lock RT PCRs Done
2,990,978 UART: [art] Populate DV Done
2,999,243 UART: [fht] FMC Alias Private Key: 7
3,000,415 UART: [art] Derive CDI
3,000,695 UART: [art] Store in in slot 0x4
3,086,376 UART: [art] Derive Key Pair
3,086,736 UART: [art] Store priv key in slot 0x5
3,099,968 UART: [art] Derive Key Pair - Done
3,114,850 UART: [art] Signing Cert with AUTHO
3,115,330 UART: RITY.KEYID = 7
3,130,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,633 UART: [art] PUB.X = B9E687BC174C7675C26B3045C48FA789ADCBFB2426591BF5DC69ADAFEB083D748693D9AF40871E120D21CB4153850E06
3,138,399 UART: [art] PUB.Y = 3988801736FCC27618AD6D14D18B5B45EB572711EF372F0CFA3B198ABFCA83FC5FE1DD2C774476705A2E10ACFC1031C3
3,145,358 UART: [art] SIG.R = 7FA77F6BAFA2F320DC597BDF77B60410A9DC0CF38679CCC90041CA8890D30ED96BDFE95AB8D8E56B12C7044D86D1D579
3,152,112 UART: [art] SIG.S = BF5D7BE23678BABAED021B47E6A0A549A5B701A44A5E257AA5C5015448AD5921DBB425AA62D3571F6D01016FA0ABBA30
3,176,036 UART: Caliptra RT
3,176,289 UART: [state] CFI Enabled
3,283,730 UART: [rt] RT listening for mailbox commands...
3,284,393 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,486 UART: [rt]cmd =0x46504c54, len=4
3,315,694 >>> mbox cmd response data (8 bytes)
3,315,817 UART: [rt] FIPS self test
3,316,145 UART: [kat] ++
3,316,297 UART: [kat] sha1
3,320,689 UART: [kat] SHA2-256
3,322,711 UART: [kat] SHA2-384
3,325,534 UART: [kat] SHA2-512-ACC
3,327,017 UART: Droping operation
3,327,514 UART: Fatal Error: 0x90050003
3,329,053 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,329,058 >>> mbox cmd response: failed
3,329,058 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,329,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,098 UART: [kat] SHA2-256
891,648 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,777 UART: [kat] ++
895,929 UART: [kat] sha1
900,055 UART: [kat] SHA2-256
901,995 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,170,077 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,187 UART: [idev] ++
1,173,355 UART: [idev] CDI.KEYID = 6
1,173,716 UART: [idev] SUBJECT.KEYID = 7
1,174,141 UART: [idev] UDS.KEYID = 0
1,174,487 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,357 UART: [idev] Erasing UDS.KEYID = 0
1,199,517 UART: [idev] Sha1 KeyId Algorithm
1,208,313 UART: [idev] --
1,209,434 UART: [ldev] ++
1,209,602 UART: [ldev] CDI.KEYID = 6
1,209,966 UART: [ldev] SUBJECT.KEYID = 5
1,210,393 UART: [ldev] AUTHORITY.KEYID = 7
1,210,856 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,242,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,824 UART: [ldev] --
1,281,116 UART: [fwproc] Wait for Commands...
1,281,823 UART: [fwproc] Recv command 0x46574c44
1,282,556 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,119 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,428 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,186 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,938 ready_for_fw is high
1,055,938 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,674 >>> mbox cmd response: success
2,692,504 UART:
2,692,520 UART: Running Caliptra FMC ...
2,692,928 UART:
2,692,982 UART: [state] CFI Enabled
2,703,651 UART: [fht] FMC Alias Private Key: 7
2,811,150 UART: [art] Extend RT PCRs Done
2,811,578 UART: [art] Lock RT PCRs Done
2,813,424 UART: [art] Populate DV Done
2,821,675 UART: [fht] FMC Alias Private Key: 7
2,822,843 UART: [art] Derive CDI
2,823,123 UART: [art] Store in in slot 0x4
2,908,426 UART: [art] Derive Key Pair
2,908,786 UART: [art] Store priv key in slot 0x5
2,921,722 UART: [art] Derive Key Pair - Done
2,936,323 UART: [art] Signing Cert with AUTHO
2,936,803 UART: RITY.KEYID = 7
2,951,727 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,492 UART: [art] PUB.X = 5B9388AF79F8CE83B7E3D650DCD358F2F14875D10130558517CAF03E9A592AF0DF077EF84F705B2E0E739D4A7F0E0C7E
2,959,257 UART: [art] PUB.Y = DF4D3A2CF03254DDDEE1E9D692EBC186A1E160683A2B7375C7D953F9E05674201FD8A562299D735E8E4B45BD16128B29
2,966,213 UART: [art] SIG.R = AD41F734BC66377A35943A4730D142E3F0ACEE7D6366CFA1361C8CB8AE194689B93A5C9255FDA966417148FA2B5F6216
2,972,987 UART: [art] SIG.S = 67F0098A9D393C682109050377BFF0AE0B10DF992F01741B37BF7F53CB45B58BE991B3B75DB536F5871964966CED0F22
2,996,625 UART: Caliptra RT
2,996,878 UART: [state] CFI Enabled
3,105,405 UART: [rt] RT listening for mailbox commands...
3,106,068 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,961 UART: [rt]cmd =0x46504c54, len=4
3,137,019 >>> mbox cmd response data (8 bytes)
3,137,352 UART: [rt] FIPS self test
3,137,680 UART: [kat] ++
3,137,832 UART: [kat] sha1
3,141,926 UART: [kat] SHA2-256
3,143,948 UART: [kat] SHA2-384
3,146,725 UART: [kat] SHA2-512-ACC
3,148,208 UART: Droping operation
3,148,837 UART: Fatal Error: 0x90050003
3,150,376 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,150,381 >>> mbox cmd response: failed
3,150,381 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,150,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,176 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,050 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,942 UART: [state] WD Timer not started. Device not locked for debugging
88,257 UART: [kat] SHA2-256
891,807 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,936 UART: [kat] ++
896,088 UART: [kat] sha1
900,160 UART: [kat] SHA2-256
902,100 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,749 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,582 UART: [cold-reset] ++
1,170,954 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,174,858 ready_for_fw is high
1,174,858 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,108 UART: [idev] Sha1 KeyId Algorithm
1,209,150 UART: [idev] --
1,210,143 UART: [ldev] ++
1,210,311 UART: [ldev] CDI.KEYID = 6
1,210,675 UART: [ldev] SUBJECT.KEYID = 5
1,211,102 UART: [ldev] AUTHORITY.KEYID = 7
1,211,565 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,807 UART: [ldev] --
1,282,273 UART: [fwproc] Wait for Commands...
1,282,978 UART: [fwproc] Recv command 0x46574c44
1,283,711 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,880 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,189 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,001 >>> mbox cmd response: success
2,784,098 UART: [afmc] ++
2,784,266 UART: [afmc] CDI.KEYID = 6
2,784,629 UART: [afmc] SUBJECT.KEYID = 7
2,785,055 UART: [afmc] AUTHORITY.KEYID = 5
2,820,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,195 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,924 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,849,807 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,526 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,409 UART: [afmc] --
2,864,431 UART: [cold-reset] --
2,865,259 UART: [state] Locking Datavault
2,866,736 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,340 UART: [state] Locking ICCM
2,867,846 UART: [exit] Launching FMC @ 0x40000130
2,873,175 UART:
2,873,191 UART: Running Caliptra FMC ...
2,873,599 UART:
2,873,742 UART: [state] CFI Enabled
2,884,239 UART: [fht] FMC Alias Private Key: 7
2,992,188 UART: [art] Extend RT PCRs Done
2,992,616 UART: [art] Lock RT PCRs Done
2,994,066 UART: [art] Populate DV Done
3,002,299 UART: [fht] FMC Alias Private Key: 7
3,003,419 UART: [art] Derive CDI
3,003,699 UART: [art] Store in in slot 0x4
3,088,938 UART: [art] Derive Key Pair
3,089,298 UART: [art] Store priv key in slot 0x5
3,103,314 UART: [art] Derive Key Pair - Done
3,118,231 UART: [art] Signing Cert with AUTHO
3,118,711 UART: RITY.KEYID = 7
3,134,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,114 UART: [art] PUB.X = E9FD233BD78BBFCF416B969726E5D440F59A97D69A7AFE705D272E1AC73785D50419EA20912101627E1D5023280570D3
3,141,873 UART: [art] PUB.Y = 3CF677A8073FE6C85BF1736877C2EA93D137EAF7192E823BFDC7ACE0EFD54ED0CDB8A4F734544D1A4F64DA9FBDDBB486
3,148,846 UART: [art] SIG.R = 5931256ECFA675C9B20BC1E99D309A5FCD58CD064E8109B9C571A45F0878EA396D8F4084EAD150396FD980878289F7A9
3,155,606 UART: [art] SIG.S = A05498455886EF92765A6A01C1290205268E123DFD7556C5078EA7C9803B7F097865BF947DCE217FF6DE4EAFA086DF09
3,179,523 UART: Caliptra RT
3,179,868 UART: [state] CFI Enabled
3,287,937 UART: [rt] RT listening for mailbox commands...
3,288,600 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,318,413 UART: [rt]cmd =0x46504c54, len=4
3,319,519 >>> mbox cmd response data (8 bytes)
3,319,774 UART: [rt] FIPS self test
3,320,102 UART: [kat] ++
3,320,254 UART: [kat] sha1
3,324,620 UART: [kat] SHA2-256
3,326,642 UART: [kat] SHA2-384
3,329,463 UART: [kat] SHA2-512-ACC
3,330,946 UART: Droping operation
3,331,473 UART: Fatal Error: 0x90050003
3,333,012 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,017 >>> mbox cmd response: failed
3,333,017 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,333,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,491 UART: [kat] SHA2-512-ACC
906,392 UART: [kat] ECC-384
916,625 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,340 UART: [cold-reset] ++
1,170,682 UART: [fht] FHT @ 0x50003400
1,173,316 UART: [idev] ++
1,173,484 UART: [idev] CDI.KEYID = 6
1,173,845 UART: [idev] SUBJECT.KEYID = 7
1,174,270 UART: [idev] UDS.KEYID = 0
1,174,616 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,198,532 UART: [idev] Sha1 KeyId Algorithm
1,207,494 UART: [idev] --
1,208,487 UART: [ldev] ++
1,208,655 UART: [ldev] CDI.KEYID = 6
1,209,019 UART: [ldev] SUBJECT.KEYID = 5
1,209,446 UART: [ldev] AUTHORITY.KEYID = 7
1,209,909 UART: [ldev] FE.KEYID = 1
1,214,937 UART: [ldev] Erasing FE.KEYID = 1
1,241,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,813 UART: [ldev] --
1,280,117 UART: [fwproc] Wait for Commands...
1,280,868 UART: [fwproc] Recv command 0x46574c44
1,281,601 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,284 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,593 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,579 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,711 ready_for_fw is high
1,056,711 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,795 >>> mbox cmd response: success
2,694,887 UART:
2,694,903 UART: Running Caliptra FMC ...
2,695,311 UART:
2,695,454 UART: [state] CFI Enabled
2,706,309 UART: [fht] FMC Alias Private Key: 7
2,814,532 UART: [art] Extend RT PCRs Done
2,814,960 UART: [art] Lock RT PCRs Done
2,816,628 UART: [art] Populate DV Done
2,824,809 UART: [fht] FMC Alias Private Key: 7
2,825,755 UART: [art] Derive CDI
2,826,035 UART: [art] Store in in slot 0x4
2,911,380 UART: [art] Derive Key Pair
2,911,740 UART: [art] Store priv key in slot 0x5
2,924,598 UART: [art] Derive Key Pair - Done
2,939,351 UART: [art] Signing Cert with AUTHO
2,939,831 UART: RITY.KEYID = 7
2,955,013 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,778 UART: [art] PUB.X = 3EB52BFF1DBD6A0D3DD9200ECC5BACAB00EFDCE3361B89C64AF3FAF3B31455B8A045A23725364B80379C30D29BF5FF8D
2,962,546 UART: [art] PUB.Y = E5A73E007F245E4B1A0D3D56ECB856CCD5977E2BC592B6E42FA8729B4A54905E8F091F664C79BA0864E71500436545BB
2,969,447 UART: [art] SIG.R = 4D2176295A3B760EFB388AF83B58742AD68E8806DBC579102E9951D136CE70A516726A3FCB63F2D2AB5CE2B8C63982F6
2,976,215 UART: [art] SIG.S = FFF971CB7875B14536A2AD770A5C3DA0F17AB1E3F0B11AB626E9C5B63731CDD7726AE27A1AC62C37A96AB32B568ED35A
2,999,761 UART: Caliptra RT
3,000,106 UART: [state] CFI Enabled
3,107,819 UART: [rt] RT listening for mailbox commands...
3,108,482 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,227 UART: [rt]cmd =0x46504c54, len=4
3,139,277 >>> mbox cmd response data (8 bytes)
3,139,584 UART: [rt] FIPS self test
3,139,912 UART: [kat] ++
3,140,064 UART: [kat] sha1
3,144,268 UART: [kat] SHA2-256
3,146,290 UART: [kat] SHA2-384
3,149,083 UART: [kat] SHA2-512-ACC
3,150,566 UART: Droping operation
3,151,003 UART: Fatal Error: 0x90050003
3,152,542 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,547 >>> mbox cmd response: failed
3,152,547 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,552 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,705 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,199 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
2,679,823 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,823,726 >>> mbox cmd response: failed
2,824,277 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,967,261 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
4,876,392 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,456,250 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,684,381 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,828,427 >>> mbox cmd response: failed
2,828,997 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,972,122 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,864,431 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,421,379 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,406 writing to cptra_bootfsm_go
3,036,219 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,180,305 >>> mbox cmd response: failed
3,180,858 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,323,733 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
21,579,504 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,018,248 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,039,024 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,183,191 >>> mbox cmd response: failed
3,183,755 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,326,772 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
21,584,564 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,024,299 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
2,698,101 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,842,475 >>> mbox cmd response: failed
2,843,052 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,986,307 >>> mbox cmd response: failed
Initializing fuses
990 writing to cptra_bootfsm_go
3,461,396 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,610 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,728,670 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,872,956 >>> mbox cmd response: failed
2,873,513 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,016,749 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,473,952 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,305,217 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,065,991 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,210,067 >>> mbox cmd response: failed
3,210,627 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,353,999 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
20,172,963 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,903,196 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,050,624 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,194,849 >>> mbox cmd response: failed
3,195,415 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,338,801 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
20,180,942 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,916,822 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,706,822 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,851,121 >>> mbox cmd response: failed
2,851,684 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,995,066 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,449,934 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,323,644 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,841 writing to cptra_bootfsm_go
2,701,753 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,846,045 >>> mbox cmd response: failed
2,846,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,989,986 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,463,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,298,571 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,057,714 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,202,016 >>> mbox cmd response: failed
3,202,597 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,345,972 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,180,592 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,899,335 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,062,358 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,206,646 >>> mbox cmd response: failed
3,207,202 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,350,585 >>> mbox cmd response: failed
Initializing fuses
979 writing to cptra_bootfsm_go
20,185,064 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,884,513 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,104 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,112 >>> mbox cmd response: failed
812,112 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,629 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,998 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,006 >>> mbox cmd response: failed
812,006 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,012 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,843 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,289 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,297 >>> mbox cmd response: failed
812,297 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,303 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,270 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,350 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,201 >>> mbox cmd response: failed
812,201 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,207 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,048 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,646,346 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,126 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,134 >>> mbox cmd response: failed
812,134 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,605 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,642,721 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,648 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,656 >>> mbox cmd response: failed
812,656 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,707 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,528 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,273 >>> mbox cmd response: failed
812,273 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,432 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,666 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,359 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,367 >>> mbox cmd response: failed
812,367 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,158 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,002 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,196 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,204 >>> mbox cmd response: failed
812,204 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,210 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,725 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,393 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,972 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,980 >>> mbox cmd response: failed
811,980 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,353 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,661 >>> mbox cmd response: failed
812,661 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,652 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,213 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,221 >>> mbox cmd response: failed
812,221 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,326 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,554 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,056 UART:
192,438 UART: Running Caliptra ROM ...
193,532 UART:
193,676 UART: [state] CFI Enabled
262,356 UART: [state] LifecycleState = Unprovisioned
264,350 UART: [state] DebugLocked = No
267,167 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,531 UART: [kat] SHA2-256
441,258 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,742 UART: [kat] ++
452,225 UART: [kat] sha1
462,957 UART: [kat] SHA2-256
465,618 UART: [kat] SHA2-384
470,829 UART: [kat] SHA2-512-ACC
473,201 UART: [kat] ECC-384
2,766,392 UART: [kat] HMAC-384Kdf
2,779,317 UART: [kat] LMS
3,969,659 UART: [kat] --
3,973,641 UART: [cold-reset] ++
3,974,737 UART: [fht] Storing FHT @ 0x50003400
3,985,866 UART: [idev] ++
3,986,430 UART: [idev] CDI.KEYID = 6
3,987,420 UART: [idev] SUBJECT.KEYID = 7
3,988,664 UART: [idev] UDS.KEYID = 0
3,989,719 ready_for_fw is high
3,989,955 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,134,321 UART: [idev] Erasing UDS.KEYID = 0
7,325,771 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,530 UART: [idev] --
7,351,583 UART: [ldev] ++
7,352,157 UART: [ldev] CDI.KEYID = 6
7,353,061 UART: [ldev] SUBJECT.KEYID = 5
7,354,281 UART: [ldev] AUTHORITY.KEYID = 7
7,355,571 UART: [ldev] FE.KEYID = 1
7,402,386 UART: [ldev] Erasing FE.KEYID = 1
10,735,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,395 UART: [ldev] --
13,117,258 UART: [fwproc] Waiting for Commands...
13,120,599 UART: [fwproc] Received command 0x46574c44
13,122,785 UART: [fwproc] Received Image of size 114716 bytes
17,185,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,260,449 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,329,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,649,510 >>> mbox cmd response: success
17,652,957 UART: [afmc] ++
17,653,548 UART: [afmc] CDI.KEYID = 6
17,654,436 UART: [afmc] SUBJECT.KEYID = 7
17,655,705 UART: [afmc] AUTHORITY.KEYID = 5
21,032,465 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,339,685 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,341,936 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,356,325 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,371,179 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,385,596 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,407,456 UART: [afmc] --
23,411,065 UART: [cold-reset] --
23,415,097 UART: [state] Locking Datavault
23,418,724 UART: [state] Locking PCR0, PCR1 and PCR31
23,420,419 UART: [state] Locking ICCM
23,421,645 UART: [exit] Launching FMC @ 0x40000130
23,430,038 UART:
23,430,273 UART: Running Caliptra FMC ...
23,431,374 UART:
23,431,528 UART: [state] CFI Enabled
23,500,542 UART: [fht] FMC Alias Private Key: 7
25,838,711 UART: [art] Extend RT PCRs Done
25,839,930 UART: [art] Lock RT PCRs Done
25,841,742 UART: [art] Populate DV Done
25,847,483 UART: [fht] FMC Alias Private Key: 7
25,848,966 UART: [art] Derive CDI
25,849,702 UART: [art] Store in in slot 0x4
25,910,093 UART: [art] Derive Key Pair
25,911,136 UART: [art] Store priv key in slot 0x5
29,203,581 UART: [art] Derive Key Pair - Done
29,216,468 UART: [art] Signing Cert with AUTHO
29,217,783 UART: RITY.KEYID = 7
31,505,375 UART: [art] Erasing AUTHORITY.KEYID = 7
31,506,903 UART: [art] PUB.X = 492DA7EFD9C180F30AA7EA245CE3D64315C5BC06CF6BAC99566197DFB399FA7DE5F3C91CC3D683DBD5BD2C4CF09E9756
31,514,158 UART: [art] PUB.Y = 41D60BF45CD0094DB0218E45F8EADB60924E2E21CCC42A0DBE231C05039F43D5EF67525B2FDCB01AD90AF8B3BE43D514
31,521,453 UART: [art] SIG.R = 3576E4260C19289E3BB94F6BCC99C3885F3418AAFF46A69FEAFA9744DC2258D1F48C83D636718F1710A5DE1FAF0A718E
31,528,858 UART: [art] SIG.S = 60102B9CD77E450D1D7C5A08E3D0D80615720A972F54F5430786245AB6CD76AC118904BA6F0F4CF15FCAAEE057D1EF89
32,834,020 UART: Caliptra RT
32,834,735 UART: [state] CFI Enabled
32,994,742 UART: [rt] RT listening for mailbox commands...
32,996,755 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,026,376 UART: [rt]cmd =0x46504c54, len=4
33,028,066 >>> mbox cmd response data (8 bytes)
33,029,537 UART: [rt] FIPS self test
33,030,479 UART: [kat] ++
33,030,935 UART: [kat] sha1
33,035,487 UART: [kat] SHA2-256
33,037,448 UART: [kat] SHA2-384
33,040,570 UART: [kat] SHA2-512-ACC
33,041,618 UART: Fatal Error: 0x90050001
33,076,997 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,221,012 >>> mbox cmd response: failed
33,221,615 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,365,597 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
190,113 UART:
190,403 UART: Running Caliptra ROM ...
191,435 UART:
191,576 UART: [state] CFI Enabled
250,700 UART: [state] LifecycleState = Unprovisioned
252,581 UART: [state] DebugLocked = No
255,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,645 UART: [kat] SHA2-256
429,372 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,860 UART: [kat] ++
440,311 UART: [kat] sha1
451,730 UART: [kat] SHA2-256
454,416 UART: [kat] SHA2-384
460,712 UART: [kat] SHA2-512-ACC
463,047 UART: [kat] ECC-384
2,755,210 UART: [kat] HMAC-384Kdf
2,785,581 UART: [kat] LMS
3,975,900 UART: [kat] --
3,980,535 UART: [cold-reset] ++
3,981,981 UART: [fht] Storing FHT @ 0x50003400
3,993,303 UART: [idev] ++
3,993,877 UART: [idev] CDI.KEYID = 6
3,994,896 UART: [idev] SUBJECT.KEYID = 7
3,996,075 UART: [idev] UDS.KEYID = 0
3,997,593 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,141,884 UART: [idev] Erasing UDS.KEYID = 0
7,331,264 UART: [idev] Using Sha1 for KeyId Algorithm
7,352,542 UART: [idev] --
7,355,940 UART: [ldev] ++
7,356,511 UART: [ldev] CDI.KEYID = 6
7,357,476 UART: [ldev] SUBJECT.KEYID = 5
7,358,690 UART: [ldev] AUTHORITY.KEYID = 7
7,359,979 UART: [ldev] FE.KEYID = 1
7,387,531 UART: [ldev] Erasing FE.KEYID = 1
10,723,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,035,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,049,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,064,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,097,501 UART: [ldev] --
13,102,296 UART: [fwproc] Waiting for Commands...
13,103,913 UART: [fwproc] Received command 0x46574c44
13,106,105 UART: [fwproc] Received Image of size 114716 bytes
17,168,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,244,164 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,313,039 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,631,979 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,787,346 ready_for_fw is high
3,787,969 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,864,323 >>> mbox cmd response: success
23,546,545 UART:
23,546,932 UART: Running Caliptra FMC ...
23,548,077 UART:
23,548,248 UART: [state] CFI Enabled
23,615,416 UART: [fht] FMC Alias Private Key: 7
25,953,791 UART: [art] Extend RT PCRs Done
25,955,041 UART: [art] Lock RT PCRs Done
25,956,466 UART: [art] Populate DV Done
25,961,723 UART: [fht] FMC Alias Private Key: 7
25,963,207 UART: [art] Derive CDI
25,963,966 UART: [art] Store in in slot 0x4
26,024,471 UART: [art] Derive Key Pair
26,025,513 UART: [art] Store priv key in slot 0x5
29,318,089 UART: [art] Derive Key Pair - Done
29,331,188 UART: [art] Signing Cert with AUTHO
29,332,515 UART: RITY.KEYID = 7
31,620,151 UART: [art] Erasing AUTHORITY.KEYID = 7
31,621,664 UART: [art] PUB.X = 8A2C329FB6A0EDCCD530F6EE75A5B1510D2B5A171602F171A1AEA9688E65AD5A3C75FD8D7CEB6429013F465E9F812CE7
31,628,919 UART: [art] PUB.Y = 6EB36D09DD83A1DE860D5EEDE7DF9D09E263DFBD93D476DED277F33151715D5C07CC496B9CC1C3F2C7C99A56958CE24A
31,636,159 UART: [art] SIG.R = 1BB7F3BA073A3A3431391F75FA908C09136F2EC7B5D357C59742D6E8A332D471E80AAE956CB37787FF4765B98F07DC00
31,643,563 UART: [art] SIG.S = CD1F00C52B4FF8FBE5256A7D9E1381412F12A646047897D608523E15F9735B19B9E36F792F2075CA82D4B8F908AB235D
32,948,462 UART: Caliptra RT
32,949,229 UART: [state] CFI Enabled
33,111,277 UART: [rt] RT listening for mailbox commands...
33,113,133 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,142,666 UART: [rt]cmd =0x46504c54, len=4
33,144,360 >>> mbox cmd response data (8 bytes)
33,145,549 UART: [rt] FIPS self test
33,146,489 UART: [kat] ++
33,146,939 UART: [kat] sha1
33,151,505 UART: [kat] SHA2-256
33,153,441 UART: [kat] SHA2-384
33,156,320 UART: [kat] SHA2-512-ACC
33,157,279 UART: Fatal Error: 0x90050001
33,192,522 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,336,629 >>> mbox cmd response: failed
33,337,278 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,481,136 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,774,679 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,867,772 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,508 UART:
192,883 UART: Running Caliptra ROM ...
194,021 UART:
603,566 UART: [state] CFI Enabled
615,833 UART: [state] LifecycleState = Unprovisioned
617,785 UART: [state] DebugLocked = No
620,240 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,175 UART: [kat] SHA2-256
794,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,430 UART: [kat] ++
805,909 UART: [kat] sha1
817,355 UART: [kat] SHA2-256
820,087 UART: [kat] SHA2-384
826,015 UART: [kat] SHA2-512-ACC
828,391 UART: [kat] ECC-384
3,113,432 UART: [kat] HMAC-384Kdf
3,126,103 UART: [kat] LMS
4,316,233 UART: [kat] --
4,320,230 UART: [cold-reset] ++
4,322,162 UART: [fht] Storing FHT @ 0x50003400
4,332,224 UART: [idev] ++
4,332,787 UART: [idev] CDI.KEYID = 6
4,333,822 UART: [idev] SUBJECT.KEYID = 7
4,334,999 UART: [idev] UDS.KEYID = 0
4,335,987 ready_for_fw is high
4,336,195 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,480,743 UART: [idev] Erasing UDS.KEYID = 0
7,627,385 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,217 UART: [idev] --
7,655,560 UART: [ldev] ++
7,656,132 UART: [ldev] CDI.KEYID = 6
7,657,152 UART: [ldev] SUBJECT.KEYID = 5
7,658,314 UART: [ldev] AUTHORITY.KEYID = 7
7,659,622 UART: [ldev] FE.KEYID = 1
7,670,008 UART: [ldev] Erasing FE.KEYID = 1
10,958,549 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,000 UART: [ldev] --
13,319,112 UART: [fwproc] Waiting for Commands...
13,320,993 UART: [fwproc] Received command 0x46574c44
13,323,179 UART: [fwproc] Received Image of size 114716 bytes
17,390,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,464,303 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,533,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,852,734 >>> mbox cmd response: success
17,856,627 UART: [afmc] ++
17,857,239 UART: [afmc] CDI.KEYID = 6
17,858,129 UART: [afmc] SUBJECT.KEYID = 7
17,859,345 UART: [afmc] AUTHORITY.KEYID = 5
21,175,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,467,876 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,470,130 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,484,515 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,499,370 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,513,790 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,534,771 UART: [afmc] --
23,537,881 UART: [cold-reset] --
23,539,419 UART: [state] Locking Datavault
23,545,344 UART: [state] Locking PCR0, PCR1 and PCR31
23,547,099 UART: [state] Locking ICCM
23,548,305 UART: [exit] Launching FMC @ 0x40000130
23,556,697 UART:
23,556,952 UART: Running Caliptra FMC ...
23,558,058 UART:
23,558,218 UART: [state] CFI Enabled
23,566,590 UART: [fht] FMC Alias Private Key: 7
25,897,615 UART: [art] Extend RT PCRs Done
25,898,841 UART: [art] Lock RT PCRs Done
25,900,600 UART: [art] Populate DV Done
25,906,064 UART: [fht] FMC Alias Private Key: 7
25,907,549 UART: [art] Derive CDI
25,908,284 UART: [art] Store in in slot 0x4
25,951,308 UART: [art] Derive Key Pair
25,952,347 UART: [art] Store priv key in slot 0x5
29,194,404 UART: [art] Derive Key Pair - Done
29,207,185 UART: [art] Signing Cert with AUTHO
29,208,500 UART: RITY.KEYID = 7
31,487,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,489,339 UART: [art] PUB.X = C6C21A214444FC4A5157E7FC711180D2B83BA82022C701076381B04686A931CB0C98E3397E25D56B1794AA10B93114A6
31,496,549 UART: [art] PUB.Y = B5F2E50232704BF8F4A08ECF84CE00F04C55DCA065B0732AF6C9F994898600B3A77AB2A0B8FDC49403B7477388DF46A6
31,503,785 UART: [art] SIG.R = 4293E7ABE621706D496AB2C3E66F732BFDC15D34DC57F3658151C9725811A4475C4F344122A1F1276F203BD62C8FE493
31,511,172 UART: [art] SIG.S = 2F44188D978532808A639C69F5FFE3ED25D9D75E7B96F994712CBCBFAE05185A2F86C5C7C5A40DD3E78103B77CEA81CE
32,816,484 UART: Caliptra RT
32,817,205 UART: [state] CFI Enabled
32,935,125 UART: [rt] RT listening for mailbox commands...
32,936,963 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,966,658 UART: [rt]cmd =0x46504c54, len=4
32,968,210 >>> mbox cmd response data (8 bytes)
32,969,178 UART: [rt] FIPS self test
32,970,120 UART: [kat] ++
32,970,575 UART: [kat] sha1
32,975,086 UART: [kat] SHA2-256
32,977,017 UART: [kat] SHA2-384
32,979,923 UART: [kat] SHA2-512-ACC
32,980,935 UART: Fatal Error: 0x90050001
33,016,150 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,160,202 >>> mbox cmd response: failed
33,160,869 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,304,912 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,010 UART:
190,305 UART: Running Caliptra ROM ...
191,330 UART:
7,237,292 UART: [state] CFI Enabled
7,249,704 UART: [state] LifecycleState = Unprovisioned
7,251,696 UART: [state] DebugLocked = No
7,254,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,258,225 UART: [kat] SHA2-256
7,427,983 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,438,519 UART: [kat] ++
7,438,976 UART: [kat] sha1
7,450,187 UART: [kat] SHA2-256
7,452,930 UART: [kat] SHA2-384
7,458,917 UART: [kat] SHA2-512-ACC
7,461,274 UART: [kat] ECC-384
9,747,338 UART: [kat] HMAC-384Kdf
9,760,595 UART: [kat] LMS
10,950,710 UART: [kat] --
10,955,366 UART: [cold-reset] ++
10,956,270 UART: [fht] Storing FHT @ 0x50003400
10,968,047 UART: [idev] ++
10,968,609 UART: [idev] CDI.KEYID = 6
10,969,541 UART: [idev] SUBJECT.KEYID = 7
10,970,802 UART: [idev] UDS.KEYID = 0
10,972,353 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,116,353 UART: [idev] Erasing UDS.KEYID = 0
14,261,077 UART: [idev] Using Sha1 for KeyId Algorithm
14,282,577 UART: [idev] --
14,286,086 UART: [ldev] ++
14,286,655 UART: [ldev] CDI.KEYID = 6
14,287,627 UART: [ldev] SUBJECT.KEYID = 5
14,288,837 UART: [ldev] AUTHORITY.KEYID = 7
14,290,069 UART: [ldev] FE.KEYID = 1
14,301,572 UART: [ldev] Erasing FE.KEYID = 1
17,591,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,881,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,896,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,911,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,925,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,944,714 UART: [ldev] --
19,949,062 UART: [fwproc] Waiting for Commands...
19,950,909 UART: [fwproc] Received command 0x46574c44
19,953,098 UART: [fwproc] Received Image of size 114716 bytes
24,014,270 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,087,025 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,155,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,475,953 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,135,198 ready_for_fw is high
4,135,757 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,093,468 >>> mbox cmd response: success
23,732,109 UART:
23,732,510 UART: Running Caliptra FMC ...
23,733,626 UART:
23,733,790 UART: [state] CFI Enabled
23,741,926 UART: [fht] FMC Alias Private Key: 7
26,072,295 UART: [art] Extend RT PCRs Done
26,073,529 UART: [art] Lock RT PCRs Done
26,075,020 UART: [art] Populate DV Done
26,080,332 UART: [fht] FMC Alias Private Key: 7
26,081,929 UART: [art] Derive CDI
26,082,674 UART: [art] Store in in slot 0x4
26,125,488 UART: [art] Derive Key Pair
26,126,498 UART: [art] Store priv key in slot 0x5
29,368,956 UART: [art] Derive Key Pair - Done
29,382,127 UART: [art] Signing Cert with AUTHO
29,383,442 UART: RITY.KEYID = 7
31,663,106 UART: [art] Erasing AUTHORITY.KEYID = 7
31,664,617 UART: [art] PUB.X = 071D5F527C74D43FEDEBA10A9AAC3394796542350176B39C6252E78B0CEC3AC741613CAC61EFF3C9551E2040DA95C0C7
31,671,873 UART: [art] PUB.Y = 46DF2234E15E094180CB9E399120991EE77EF6BE9E6291F9EF59AAB6819BF31819ACE1C8C761BC33F3E9AC9CE3FCE845
31,679,115 UART: [art] SIG.R = 14F242815A54A28FFCDC0002BD90E8873A54412123C86DE05E6A568BFFB4FFB1D4D6D4596490980CA345330C5972AF9F
31,686,541 UART: [art] SIG.S = 4A3D892202E4C68CF2C937C502E7FD0078A21EE2715E85426BBC8A229F7F83BC71A88145EE88815506C66AF848AFECDE
32,992,002 UART: Caliptra RT
32,992,727 UART: [state] CFI Enabled
33,109,759 UART: [rt] RT listening for mailbox commands...
33,111,635 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,141,326 UART: [rt]cmd =0x46504c54, len=4
33,142,852 >>> mbox cmd response data (8 bytes)
33,143,907 UART: [rt] FIPS self test
33,144,852 UART: [kat] ++
33,145,305 UART: [kat] sha1
33,149,873 UART: [kat] SHA2-256
33,151,801 UART: [kat] SHA2-384
33,154,865 UART: [kat] SHA2-512-ACC
33,155,823 UART: Fatal Error: 0x90050001
33,191,155 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,335,102 >>> mbox cmd response: failed
33,335,774 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,479,818 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
10,578,230 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,539,916 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,456 UART:
192,816 UART: Running Caliptra ROM ...
194,026 UART:
194,182 UART: [state] CFI Enabled
264,199 UART: [state] LifecycleState = Unprovisioned
266,124 UART: [state] DebugLocked = No
267,450 UART: [state] WD Timer not started. Device not locked for debugging
271,562 UART: [kat] SHA2-256
450,702 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,255 UART: [kat] ++
462,789 UART: [kat] sha1
474,456 UART: [kat] SHA2-256
477,540 UART: [kat] SHA2-384
483,674 UART: [kat] SHA2-512-ACC
486,611 UART: [kat] ECC-384
2,950,705 UART: [kat] HMAC-384Kdf
2,972,911 UART: [kat] LMS
3,502,325 UART: [kat] --
3,506,397 UART: [cold-reset] ++
3,508,192 UART: [fht] FHT @ 0x50003400
3,519,882 UART: [idev] ++
3,520,475 UART: [idev] CDI.KEYID = 6
3,521,439 UART: [idev] SUBJECT.KEYID = 7
3,522,616 UART: [idev] UDS.KEYID = 0
3,523,549 ready_for_fw is high
3,523,783 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,532 UART: [idev] Erasing UDS.KEYID = 0
6,026,988 UART: [idev] Sha1 KeyId Algorithm
6,050,063 UART: [idev] --
6,053,039 UART: [ldev] ++
6,053,619 UART: [ldev] CDI.KEYID = 6
6,054,734 UART: [ldev] SUBJECT.KEYID = 5
6,055,862 UART: [ldev] AUTHORITY.KEYID = 7
6,057,049 UART: [ldev] FE.KEYID = 1
6,102,587 UART: [ldev] Erasing FE.KEYID = 1
8,607,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,366 UART: [ldev] --
10,416,653 UART: [fwproc] Wait for Commands...
10,418,314 UART: [fwproc] Recv command 0x46574c44
10,420,416 UART: [fwproc] Recv'd Img size: 115032 bytes
13,826,446 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,547 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,969,314 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,290,291 >>> mbox cmd response: success
14,293,884 UART: [afmc] ++
14,294,642 UART: [afmc] CDI.KEYID = 6
14,295,535 UART: [afmc] SUBJECT.KEYID = 7
14,296,579 UART: [afmc] AUTHORITY.KEYID = 5
16,835,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,560,285 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,576,082 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,592,124 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,944 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,629,659 UART: [afmc] --
18,633,917 UART: [cold-reset] --
18,639,125 UART: [state] Locking Datavault
18,642,326 UART: [state] Locking PCR0, PCR1 and PCR31
18,644,027 UART: [state] Locking ICCM
18,645,481 UART: [exit] Launching FMC @ 0x40000130
18,653,876 UART:
18,654,113 UART: Running Caliptra FMC ...
18,655,212 UART:
18,655,372 UART: [state] CFI Enabled
18,715,804 UART: [fht] FMC Alias Private Key: 7
20,479,777 UART: [art] Extend RT PCRs Done
20,480,993 UART: [art] Lock RT PCRs Done
20,482,997 UART: [art] Populate DV Done
20,488,347 UART: [fht] FMC Alias Private Key: 7
20,489,930 UART: [art] Derive CDI
20,490,669 UART: [art] Store in in slot 0x4
20,548,350 UART: [art] Derive Key Pair
20,549,395 UART: [art] Store priv key in slot 0x5
23,011,690 UART: [art] Derive Key Pair - Done
23,024,581 UART: [art] Signing Cert with AUTHO
23,025,921 UART: RITY.KEYID = 7
24,736,674 UART: [art] Erasing AUTHORITY.KEYID = 7
24,738,174 UART: [art] PUB.X = 6A3106BABD7650515BD7E979BE1BAF452AD3E244443EE2360CBF477FE424CE1C81A238554264050B49C7E9BDB5DBB1A3
24,745,448 UART: [art] PUB.Y = 042E286C11DD60FB998EB662D736168492E6439CC09F7CDEB6E49945EDB446A69B6C6A70756E8C9263316D5641E0B971
24,752,714 UART: [art] SIG.R = B9D895EB00294FBE703FBA3CC3ABA735CF7E20C6C5ACAA5FA7D0020B38800BD4F8AEBD36E1F5FB5D726AE408D5EE6FD3
24,760,139 UART: [art] SIG.S = B9478F13EC3D1B9589AF3171790C4CA7C81C2B55D4F810E6B7A9CD8355BA89A19CA8EBC087C4E8A979F93C2E9F97A03B
25,739,408 UART: Caliptra RT
25,740,118 UART: [state] CFI Enabled
25,903,728 UART: [rt] RT listening for mailbox commands...
25,905,571 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,935,144 UART: [rt]cmd =0x46504c54, len=4
25,936,723 >>> mbox cmd response data (8 bytes)
25,938,214 UART: [rt] FIPS self test
25,939,156 UART: [kat] ++
25,939,603 UART: [kat] sha1
25,944,165 UART: [kat] SHA2-256
25,946,088 UART: [kat] SHA2-384
25,949,110 UART: [kat] SHA2-512-ACC
25,949,995 UART: Fatal Error: 0x90050001
25,985,296 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,129,700 >>> mbox cmd response: failed
26,130,336 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,274,750 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,021 UART:
190,316 UART: Running Caliptra ROM ...
191,340 UART:
191,479 UART: [state] CFI Enabled
248,725 UART: [state] LifecycleState = Unprovisioned
250,607 UART: [state] DebugLocked = No
253,033 UART: [state] WD Timer not started. Device not locked for debugging
257,038 UART: [kat] SHA2-256
436,181 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
447,728 UART: [kat] ++
448,175 UART: [kat] sha1
459,587 UART: [kat] SHA2-256
462,593 UART: [kat] SHA2-384
469,939 UART: [kat] SHA2-512-ACC
472,926 UART: [kat] ECC-384
2,937,030 UART: [kat] HMAC-384Kdf
2,957,088 UART: [kat] LMS
3,486,575 UART: [kat] --
3,488,693 UART: [cold-reset] ++
3,490,790 UART: [fht] FHT @ 0x50003400
3,501,553 UART: [idev] ++
3,502,126 UART: [idev] CDI.KEYID = 6
3,503,149 UART: [idev] SUBJECT.KEYID = 7
3,504,255 UART: [idev] UDS.KEYID = 0
3,505,761 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,650,448 UART: [idev] Erasing UDS.KEYID = 0
6,014,584 UART: [idev] Sha1 KeyId Algorithm
6,037,411 UART: [idev] --
6,041,055 UART: [ldev] ++
6,041,656 UART: [ldev] CDI.KEYID = 6
6,042,541 UART: [ldev] SUBJECT.KEYID = 5
6,043,758 UART: [ldev] AUTHORITY.KEYID = 7
6,044,993 UART: [ldev] FE.KEYID = 1
6,085,006 UART: [ldev] Erasing FE.KEYID = 1
8,588,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,359,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,173 UART: [ldev] --
10,400,432 UART: [fwproc] Wait for Commands...
10,403,446 UART: [fwproc] Recv command 0x46574c44
10,405,545 UART: [fwproc] Recv'd Img size: 115032 bytes
13,818,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,894,583 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,963,335 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,284,246 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,385,095 ready_for_fw is high
3,385,646 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,073,367 >>> mbox cmd response: success
18,360,912 UART:
18,361,328 UART: Running Caliptra FMC ...
18,362,488 UART:
18,362,649 UART: [state] CFI Enabled
18,432,372 UART: [fht] FMC Alias Private Key: 7
20,196,867 UART: [art] Extend RT PCRs Done
20,198,094 UART: [art] Lock RT PCRs Done
20,199,886 UART: [art] Populate DV Done
20,205,335 UART: [fht] FMC Alias Private Key: 7
20,206,935 UART: [art] Derive CDI
20,207,751 UART: [art] Store in in slot 0x4
20,265,119 UART: [art] Derive Key Pair
20,266,119 UART: [art] Store priv key in slot 0x5
22,729,218 UART: [art] Derive Key Pair - Done
22,742,167 UART: [art] Signing Cert with AUTHO
22,743,473 UART: RITY.KEYID = 7
24,454,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,456,086 UART: [art] PUB.X = 36BC812C6E8580FB04FE357C0C268EAED68A0B15EBAEF8FD16272700DC5AD80714B71F70B861B3CA37D1180934789E65
24,463,297 UART: [art] PUB.Y = A1B8CC12A141A65EF13A66EC543D08452257F4813D5CDA1BAA387C047A3963EB740600B4A2F32692E61E7AE9D7C70F05
24,470,518 UART: [art] SIG.R = 4593778F2879326A68D2DA56EBAE86BA0920404FDDB036C573726580F64536E66489951D1C8CB416770CECB04A1B1931
24,477,916 UART: [art] SIG.S = 6862F4B8EAE4791908977614BAF1552C0D8550FA0D6627FEB9918B27D5B4B10D5A2F9FED8C8EA8D85DC2573D8D4C2E49
25,456,498 UART: Caliptra RT
25,457,218 UART: [state] CFI Enabled
25,621,861 UART: [rt] RT listening for mailbox commands...
25,623,743 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,653,381 UART: [rt]cmd =0x46504c54, len=4
25,655,105 >>> mbox cmd response data (8 bytes)
25,656,330 UART: [rt] FIPS self test
25,657,278 UART: [kat] ++
25,657,733 UART: [kat] sha1
25,662,191 UART: [kat] SHA2-256
25,664,072 UART: [kat] SHA2-384
25,667,198 UART: [kat] SHA2-512-ACC
25,668,152 UART: Fatal Error: 0x90050001
25,703,364 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,847,841 >>> mbox cmd response: failed
25,848,505 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,992,934 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,347,785 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,063,284 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,518 UART:
192,943 UART: Running Caliptra ROM ...
194,153 UART:
603,812 UART: [state] CFI Enabled
618,467 UART: [state] LifecycleState = Unprovisioned
620,331 UART: [state] DebugLocked = No
623,267 UART: [state] WD Timer not started. Device not locked for debugging
627,803 UART: [kat] SHA2-256
806,908 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,504 UART: [kat] ++
818,956 UART: [kat] sha1
830,400 UART: [kat] SHA2-256
833,408 UART: [kat] SHA2-384
839,615 UART: [kat] SHA2-512-ACC
842,624 UART: [kat] ECC-384
3,284,405 UART: [kat] HMAC-384Kdf
3,297,154 UART: [kat] LMS
3,826,644 UART: [kat] --
3,832,436 UART: [cold-reset] ++
3,834,883 UART: [fht] FHT @ 0x50003400
3,844,299 UART: [idev] ++
3,844,862 UART: [idev] CDI.KEYID = 6
3,845,783 UART: [idev] SUBJECT.KEYID = 7
3,846,959 UART: [idev] UDS.KEYID = 0
3,848,011 ready_for_fw is high
3,848,239 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,992,714 UART: [idev] Erasing UDS.KEYID = 0
6,322,987 UART: [idev] Sha1 KeyId Algorithm
6,346,427 UART: [idev] --
6,349,546 UART: [ldev] ++
6,350,124 UART: [ldev] CDI.KEYID = 6
6,351,050 UART: [ldev] SUBJECT.KEYID = 5
6,352,220 UART: [ldev] AUTHORITY.KEYID = 7
6,353,478 UART: [ldev] FE.KEYID = 1
6,363,853 UART: [ldev] Erasing FE.KEYID = 1
8,835,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,621,635 UART: [ldev] --
10,625,501 UART: [fwproc] Wait for Commands...
10,628,745 UART: [fwproc] Recv command 0x46574c44
10,630,789 UART: [fwproc] Recv'd Img size: 115032 bytes
14,041,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,115,156 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,966 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,504,765 >>> mbox cmd response: success
14,508,909 UART: [afmc] ++
14,509,523 UART: [afmc] CDI.KEYID = 6
14,510,439 UART: [afmc] SUBJECT.KEYID = 7
14,511,599 UART: [afmc] AUTHORITY.KEYID = 5
17,015,368 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,738,217 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,754,004 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,770,043 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,785,874 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,808,318 UART: [afmc] --
18,812,874 UART: [cold-reset] --
18,816,985 UART: [state] Locking Datavault
18,822,238 UART: [state] Locking PCR0, PCR1 and PCR31
18,823,941 UART: [state] Locking ICCM
18,825,714 UART: [exit] Launching FMC @ 0x40000130
18,834,164 UART:
18,834,415 UART: Running Caliptra FMC ...
18,835,521 UART:
18,835,685 UART: [state] CFI Enabled
18,844,004 UART: [fht] FMC Alias Private Key: 7
20,601,074 UART: [art] Extend RT PCRs Done
20,602,298 UART: [art] Lock RT PCRs Done
20,603,665 UART: [art] Populate DV Done
20,608,863 UART: [fht] FMC Alias Private Key: 7
20,610,519 UART: [art] Derive CDI
20,611,332 UART: [art] Store in in slot 0x4
20,654,474 UART: [art] Derive Key Pair
20,655,510 UART: [art] Store priv key in slot 0x5
23,081,269 UART: [art] Derive Key Pair - Done
23,093,949 UART: [art] Signing Cert with AUTHO
23,095,255 UART: RITY.KEYID = 7
24,800,344 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,872 UART: [art] PUB.X = F062E8A24022379BC0C62F2D208F180D9778E919E8182E9392237B2C94821E266FB52783C8ED50DE9CAE39D4D3B7B59E
24,809,066 UART: [art] PUB.Y = 222934DC334354D3DC4B3D768C128FC73E8BE57ECAFB74CE3D7AD791EB4F1A34511120ACC2C5289A438385ECFE74884A
24,816,352 UART: [art] SIG.R = 6D5EABC972E3FD673E774E9C995E235F580D5662A0230247C35A4D8296085E8ACE5244A4CFC6EBFBE7651C484400A8C8
24,823,763 UART: [art] SIG.S = 4D40068480AC8DA3CAAE7482458FC1DD2606D82218608F45FC805F78A37EC022C2A6690671D8CAE673AA38FE49AFFBF3
25,803,126 UART: Caliptra RT
25,803,820 UART: [state] CFI Enabled
25,921,097 UART: [rt] RT listening for mailbox commands...
25,922,945 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,952,572 UART: [rt]cmd =0x46504c54, len=4
25,954,291 >>> mbox cmd response data (8 bytes)
25,955,141 UART: [rt] FIPS self test
25,956,093 UART: [kat] ++
25,956,550 UART: [kat] sha1
25,960,791 UART: [kat] SHA2-256
25,962,716 UART: [kat] SHA2-384
25,965,576 UART: [kat] SHA2-512-ACC
25,966,592 UART: Fatal Error: 0x90050001
26,001,719 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,146,231 >>> mbox cmd response: failed
26,146,900 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,291,284 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,025 UART:
190,337 UART: Running Caliptra ROM ...
191,368 UART:
14,247,184 UART: [state] CFI Enabled
14,259,258 UART: [state] LifecycleState = Unprovisioned
14,261,119 UART: [state] DebugLocked = No
14,264,067 UART: [state] WD Timer not started. Device not locked for debugging
14,266,996 UART: [kat] SHA2-256
14,446,088 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,457,696 UART: [kat] ++
14,458,242 UART: [kat] sha1
14,469,245 UART: [kat] SHA2-256
14,472,271 UART: [kat] SHA2-384
14,477,718 UART: [kat] SHA2-512-ACC
14,480,658 UART: [kat] ECC-384
16,921,356 UART: [kat] HMAC-384Kdf
16,934,635 UART: [kat] LMS
17,464,096 UART: [kat] --
17,467,013 UART: [cold-reset] ++
17,468,782 UART: [fht] FHT @ 0x50003400
17,478,245 UART: [idev] ++
17,478,806 UART: [idev] CDI.KEYID = 6
17,479,872 UART: [idev] SUBJECT.KEYID = 7
17,480,990 UART: [idev] UDS.KEYID = 0
17,482,564 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,626,888 UART: [idev] Erasing UDS.KEYID = 0
19,950,895 UART: [idev] Sha1 KeyId Algorithm
19,974,011 UART: [idev] --
19,977,872 UART: [ldev] ++
19,978,447 UART: [ldev] CDI.KEYID = 6
19,979,338 UART: [ldev] SUBJECT.KEYID = 5
19,980,495 UART: [ldev] AUTHORITY.KEYID = 7
19,981,779 UART: [ldev] FE.KEYID = 1
19,992,696 UART: [ldev] Erasing FE.KEYID = 1
22,468,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,185,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,201,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,217,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,233,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,254,302 UART: [ldev] --
24,259,460 UART: [fwproc] Wait for Commands...
24,261,412 UART: [fwproc] Recv command 0x46574c44
24,263,516 UART: [fwproc] Recv'd Img size: 115032 bytes
27,674,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,744,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,813,296 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,133,135 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,698,987 ready_for_fw is high
3,699,396 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,282,403 >>> mbox cmd response: success
18,537,815 UART:
18,538,232 UART: Running Caliptra FMC ...
18,539,391 UART:
18,539,550 UART: [state] CFI Enabled
18,547,686 UART: [fht] FMC Alias Private Key: 7
20,304,318 UART: [art] Extend RT PCRs Done
20,305,537 UART: [art] Lock RT PCRs Done
20,307,188 UART: [art] Populate DV Done
20,312,631 UART: [fht] FMC Alias Private Key: 7
20,314,336 UART: [art] Derive CDI
20,315,073 UART: [art] Store in in slot 0x4
20,357,842 UART: [art] Derive Key Pair
20,358,885 UART: [art] Store priv key in slot 0x5
22,785,956 UART: [art] Derive Key Pair - Done
22,799,119 UART: [art] Signing Cert with AUTHO
22,800,428 UART: RITY.KEYID = 7
24,506,059 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,550 UART: [art] PUB.X = 54366BF76E7EA8D1DFDE19864F5A07C7974EA464D8F773FB47F704C5C402E3FE3CD95120AB7BD5381FED65C8FF0E3F88
24,514,852 UART: [art] PUB.Y = B720A30B7EF917FAF17797228DC2A3BEDF2050A23470B2710B78BCDD600D2B51CA0C053EA453847E9FC779EA4FEC46D2
24,522,155 UART: [art] SIG.R = 1BB0FD188DD426ED53BC3FB8CCD987BCED6A7006F10320F4436C23E3B5E3776E3BEDD067272C780D29FA6E2B1401D8F2
24,529,543 UART: [art] SIG.S = 9B80E3D2654BBF74363093E020A3AE622BBB2E08CAC9A5CAE50D3188A374218C123A668733A6C6DF770026620845D4C3
25,508,817 UART: Caliptra RT
25,509,544 UART: [state] CFI Enabled
25,626,180 UART: [rt] RT listening for mailbox commands...
25,628,027 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,822 UART: [rt]cmd =0x46504c54, len=4
25,659,375 >>> mbox cmd response data (8 bytes)
25,660,479 UART: [rt] FIPS self test
25,661,430 UART: [kat] ++
25,661,876 UART: [kat] sha1
25,666,169 UART: [kat] SHA2-256
25,668,098 UART: [kat] SHA2-384
25,670,911 UART: [kat] SHA2-512-ACC
25,671,913 UART: Fatal Error: 0x90050001
25,707,116 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,851,628 >>> mbox cmd response: failed
25,852,318 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,996,692 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
17,631,004 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,227,636 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,434 writing to cptra_bootfsm_go
193,686 UART:
194,039 UART: Running Caliptra ROM ...
195,148 UART:
195,291 UART: [state] CFI Enabled
265,377 UART: [state] LifecycleState = Unprovisioned
267,724 UART: [state] DebugLocked = No
270,338 UART: [state] WD Timer not started. Device not locked for debugging
275,726 UART: [kat] SHA2-256
465,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,342 UART: [kat] ++
476,792 UART: [kat] sha1
488,843 UART: [kat] SHA2-256
491,828 UART: [kat] SHA2-384
499,322 UART: [kat] SHA2-512-ACC
501,907 UART: [kat] ECC-384
2,950,198 UART: [kat] HMAC-384Kdf
2,973,875 UART: [kat] LMS
3,505,684 UART: [kat] --
3,510,651 UART: [cold-reset] ++
3,512,527 UART: [fht] FHT @ 0x50003400
3,523,535 UART: [idev] ++
3,524,208 UART: [idev] CDI.KEYID = 6
3,525,194 UART: [idev] SUBJECT.KEYID = 7
3,526,376 UART: [idev] UDS.KEYID = 0
3,527,468 ready_for_fw is high
3,527,712 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,672,408 UART: [idev] Erasing UDS.KEYID = 0
6,027,920 UART: [idev] Sha1 KeyId Algorithm
6,048,902 UART: [idev] --
6,053,392 UART: [ldev] ++
6,054,086 UART: [ldev] CDI.KEYID = 6
6,055,013 UART: [ldev] SUBJECT.KEYID = 5
6,056,179 UART: [ldev] AUTHORITY.KEYID = 7
6,057,358 UART: [ldev] FE.KEYID = 1
6,101,936 UART: [ldev] Erasing FE.KEYID = 1
8,611,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,751 UART: [ldev] --
10,416,032 UART: [fwproc] Wait for Commands...
10,418,564 UART: [fwproc] Recv command 0x46574c44
10,420,878 UART: [fwproc] Recv'd Img size: 115032 bytes
13,875,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,684 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,069,857 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,615,996 >>> mbox cmd response: success
14,619,452 UART: [afmc] ++
14,620,147 UART: [afmc] CDI.KEYID = 6
14,621,312 UART: [afmc] SUBJECT.KEYID = 7
14,622,856 UART: [afmc] AUTHORITY.KEYID = 5
17,153,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,896,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,898,784 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,913,972 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,929,094 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,944,093 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,968,550 UART: [afmc] --
18,971,649 UART: [cold-reset] --
18,976,602 UART: [state] Locking Datavault
18,982,825 UART: [state] Locking PCR0, PCR1 and PCR31
18,985,020 UART: [state] Locking ICCM
18,987,120 UART: [exit] Launching FMC @ 0x40000130
18,995,784 UART:
18,996,018 UART: Running Caliptra FMC ...
18,997,119 UART:
18,997,277 UART: [state] CFI Enabled
19,053,933 UART: [fht] FMC Alias Private Key: 7
20,818,087 UART: [art] Extend RT PCRs Done
20,819,330 UART: [art] Lock RT PCRs Done
20,820,953 UART: [art] Populate DV Done
20,826,316 UART: [fht] FMC Alias Private Key: 7
20,827,797 UART: [art] Derive CDI
20,828,557 UART: [art] Store in in slot 0x4
20,886,781 UART: [art] Derive Key Pair
20,887,817 UART: [art] Store priv key in slot 0x5
23,350,935 UART: [art] Derive Key Pair - Done
23,364,155 UART: [art] Signing Cert with AUTHO
23,365,491 UART: RITY.KEYID = 7
25,076,657 UART: [art] Erasing AUTHORITY.KEYID = 7
25,078,165 UART: [art] PUB.X = 71C3A6FD660CBAAF7369CE794D7E644E259C528C793E1E39F7EC197FAFF5166E26B511E1021C796C958F708C27979180
25,085,401 UART: [art] PUB.Y = 43D1E871C20B340F2B85F382BC2EAA52BECD615F44C77C093F0DF9842ED888C056724764EA5BC48C993D8BA03CA07BF8
25,092,677 UART: [art] SIG.R = 2450101771891CDA851F5EC5B6424263C480B4D3BDBD128F7E609F262F7FB8F1110890812FEACA3DC03643836C7C9E35
25,100,057 UART: [art] SIG.S = 8F84C18C7D34A12B283FEDEFFDE3F9BE84328E756F9B3B8996C54A6511B8E12A1316EAAE4749CE326FB4A7BC814D0387
26,079,066 UART: Caliptra RT
26,079,807 UART: [state] CFI Enabled
26,245,926 UART: [rt] RT listening for mailbox commands...
26,247,774 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,277,509 UART: [rt]cmd =0x46504c54, len=4
26,279,112 >>> mbox cmd response data (8 bytes)
26,279,974 UART: [rt] FIPS self test
26,280,917 UART: [kat] ++
26,281,374 UART: [kat] sha1
26,285,884 UART: [kat] SHA2-256
26,287,817 UART: [kat] SHA2-384
26,290,883 UART: [kat] SHA2-512-ACC
26,291,873 UART: Fatal Error: 0x90050001
26,327,249 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,471,582 >>> mbox cmd response: failed
26,472,188 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,616,624 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,120 UART:
190,408 UART: Running Caliptra ROM ...
191,433 UART:
191,572 UART: [state] CFI Enabled
247,579 UART: [state] LifecycleState = Unprovisioned
249,957 UART: [state] DebugLocked = No
251,680 UART: [state] WD Timer not started. Device not locked for debugging
256,562 UART: [kat] SHA2-256
446,425 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,213 UART: [kat] ++
457,746 UART: [kat] sha1
469,221 UART: [kat] SHA2-256
472,232 UART: [kat] SHA2-384
478,265 UART: [kat] SHA2-512-ACC
480,842 UART: [kat] ECC-384
2,933,957 UART: [kat] HMAC-384Kdf
2,957,208 UART: [kat] LMS
3,488,957 UART: [kat] --
3,495,553 UART: [cold-reset] ++
3,496,516 UART: [fht] FHT @ 0x50003400
3,507,764 UART: [idev] ++
3,508,443 UART: [idev] CDI.KEYID = 6
3,509,410 UART: [idev] SUBJECT.KEYID = 7
3,510,567 UART: [idev] UDS.KEYID = 0
3,512,066 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,656,658 UART: [idev] Erasing UDS.KEYID = 0
6,014,756 UART: [idev] Sha1 KeyId Algorithm
6,037,292 UART: [idev] --
6,041,040 UART: [ldev] ++
6,041,737 UART: [ldev] CDI.KEYID = 6
6,042,646 UART: [ldev] SUBJECT.KEYID = 5
6,043,811 UART: [ldev] AUTHORITY.KEYID = 7
6,045,045 UART: [ldev] FE.KEYID = 1
6,085,859 UART: [ldev] Erasing FE.KEYID = 1
8,590,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,697 UART: [ldev] --
10,400,015 UART: [fwproc] Wait for Commands...
10,402,922 UART: [fwproc] Recv command 0x46574c44
10,405,243 UART: [fwproc] Recv'd Img size: 115032 bytes
13,868,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,998 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,065,175 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,611,530 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,436,673 ready_for_fw is high
3,437,080 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,758,464 >>> mbox cmd response: success
19,041,021 UART:
19,041,405 UART: Running Caliptra FMC ...
19,042,568 UART:
19,042,731 UART: [state] CFI Enabled
19,107,658 UART: [fht] FMC Alias Private Key: 7
20,870,910 UART: [art] Extend RT PCRs Done
20,872,133 UART: [art] Lock RT PCRs Done
20,873,709 UART: [art] Populate DV Done
20,879,128 UART: [fht] FMC Alias Private Key: 7
20,880,570 UART: [art] Derive CDI
20,881,336 UART: [art] Store in in slot 0x4
20,939,410 UART: [art] Derive Key Pair
20,940,474 UART: [art] Store priv key in slot 0x5
23,403,783 UART: [art] Derive Key Pair - Done
23,417,037 UART: [art] Signing Cert with AUTHO
23,418,351 UART: RITY.KEYID = 7
25,129,159 UART: [art] Erasing AUTHORITY.KEYID = 7
25,130,660 UART: [art] PUB.X = FC795E947B086C4AD34DDAEAB32FB387D5C95C09DD01D36E13C1A9A1F200A7E0839CBEDF408F08FDA0705CDFCC578FB3
25,137,922 UART: [art] PUB.Y = F736A1F9DC3A6F3721FE08DA50CE9D4E0F6A795E5F0E9B33A74265D7AA76A8FF4A36E94A13E7243F49464F07EFED75D5
25,145,235 UART: [art] SIG.R = 353A5602769E55CD9FB1B4DC9A45F6EF747556B5763EE2012AAE92CE6212A373F993B09BF0ECE630B41B316C24F9C6B5
25,152,582 UART: [art] SIG.S = E482AFC677A7A15BCC329E7FA5FCA795B349949806EC21BEB6E0DFD34D46A35384674A394908CAD75EEEEE998F22177A
26,131,971 UART: Caliptra RT
26,132,685 UART: [state] CFI Enabled
26,296,844 UART: [rt] RT listening for mailbox commands...
26,298,705 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,328,218 UART: [rt]cmd =0x46504c54, len=4
26,329,858 >>> mbox cmd response data (8 bytes)
26,331,297 UART: [rt] FIPS self test
26,332,260 UART: [kat] ++
26,332,709 UART: [kat] sha1
26,337,162 UART: [kat] SHA2-256
26,339,095 UART: [kat] SHA2-384
26,342,139 UART: [kat] SHA2-512-ACC
26,343,138 UART: Fatal Error: 0x90050001
26,378,451 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,522,955 >>> mbox cmd response: failed
26,523,606 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,667,918 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,425,921 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,719,502 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
192,521 UART:
192,908 UART: Running Caliptra ROM ...
194,110 UART:
603,559 UART: [state] CFI Enabled
616,798 UART: [state] LifecycleState = Unprovisioned
619,180 UART: [state] DebugLocked = No
621,285 UART: [state] WD Timer not started. Device not locked for debugging
626,043 UART: [kat] SHA2-256
815,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,753 UART: [kat] ++
827,273 UART: [kat] sha1
837,722 UART: [kat] SHA2-256
840,806 UART: [kat] SHA2-384
846,799 UART: [kat] SHA2-512-ACC
849,390 UART: [kat] ECC-384
3,290,967 UART: [kat] HMAC-384Kdf
3,305,507 UART: [kat] LMS
3,837,369 UART: [kat] --
3,840,602 UART: [cold-reset] ++
3,843,185 UART: [fht] FHT @ 0x50003400
3,855,020 UART: [idev] ++
3,855,663 UART: [idev] CDI.KEYID = 6
3,856,700 UART: [idev] SUBJECT.KEYID = 7
3,857,883 UART: [idev] UDS.KEYID = 0
3,858,816 ready_for_fw is high
3,859,033 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,003,516 UART: [idev] Erasing UDS.KEYID = 0
6,333,892 UART: [idev] Sha1 KeyId Algorithm
6,356,314 UART: [idev] --
6,360,467 UART: [ldev] ++
6,361,150 UART: [ldev] CDI.KEYID = 6
6,362,061 UART: [ldev] SUBJECT.KEYID = 5
6,363,302 UART: [ldev] AUTHORITY.KEYID = 7
6,364,485 UART: [ldev] FE.KEYID = 1
6,375,190 UART: [ldev] Erasing FE.KEYID = 1
8,854,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,472 UART: [ldev] --
10,645,178 UART: [fwproc] Wait for Commands...
10,647,710 UART: [fwproc] Recv command 0x46574c44
10,650,030 UART: [fwproc] Recv'd Img size: 115032 bytes
14,101,459 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,199 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,309 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,845,729 >>> mbox cmd response: success
14,850,087 UART: [afmc] ++
14,850,799 UART: [afmc] CDI.KEYID = 6
14,851,915 UART: [afmc] SUBJECT.KEYID = 7
14,853,460 UART: [afmc] AUTHORITY.KEYID = 5
17,359,691 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,082,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,084,694 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,099,859 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,115,010 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,130,069 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,154,013 UART: [afmc] --
19,158,377 UART: [cold-reset] --
19,163,919 UART: [state] Locking Datavault
19,169,117 UART: [state] Locking PCR0, PCR1 and PCR31
19,171,313 UART: [state] Locking ICCM
19,173,554 UART: [exit] Launching FMC @ 0x40000130
19,182,185 UART:
19,182,423 UART: Running Caliptra FMC ...
19,183,525 UART:
19,183,680 UART: [state] CFI Enabled
19,191,786 UART: [fht] FMC Alias Private Key: 7
20,948,861 UART: [art] Extend RT PCRs Done
20,950,081 UART: [art] Lock RT PCRs Done
20,951,791 UART: [art] Populate DV Done
20,957,047 UART: [fht] FMC Alias Private Key: 7
20,958,587 UART: [art] Derive CDI
20,959,325 UART: [art] Store in in slot 0x4
21,002,024 UART: [art] Derive Key Pair
21,003,031 UART: [art] Store priv key in slot 0x5
23,429,854 UART: [art] Derive Key Pair - Done
23,442,903 UART: [art] Signing Cert with AUTHO
23,444,207 UART: RITY.KEYID = 7
25,149,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,151,323 UART: [art] PUB.X = 92C951C2A3EA6CF76BABB0317719D1051EDF48DC49B305D19854BD4702081082879A90CF27A5E99D04EE858FB4DB5E56
25,158,592 UART: [art] PUB.Y = 7268D8452B005D3CF1D90A56B1A8456DA692B3A614419529B0B490FC9F4B68E909C0983C79CE31CA793F5DDB34CAC142
25,165,852 UART: [art] SIG.R = 7B7B1037B017107B1E8D09187731A341CC0CC5833494990B276E70806DA2B605BA051CADF0EAE5E6EE3997700B21B26F
25,173,212 UART: [art] SIG.S = 267F3ECB6BAD95466F098303B03CEBB155893DA8C64FD78ED55C8966896D85BF9BFA1128D802910899115FAEE502E088
26,152,207 UART: Caliptra RT
26,152,925 UART: [state] CFI Enabled
26,270,802 UART: [rt] RT listening for mailbox commands...
26,272,654 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,302,281 UART: [rt]cmd =0x46504c54, len=4
26,303,754 >>> mbox cmd response data (8 bytes)
26,305,139 UART: [rt] FIPS self test
26,306,080 UART: [kat] ++
26,306,535 UART: [kat] sha1
26,310,953 UART: [kat] SHA2-256
26,312,869 UART: [kat] SHA2-384
26,315,811 UART: [kat] SHA2-512-ACC
26,316,705 UART: Fatal Error: 0x90050001
26,351,920 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,496,819 >>> mbox cmd response: failed
26,497,436 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,641,826 >>> mbox cmd response: failed
Initializing fuses
926 writing to cptra_bootfsm_go
190,071 UART:
190,367 UART: Running Caliptra ROM ...
191,395 UART:
13,879,144 UART: [state] CFI Enabled
13,894,423 UART: [state] LifecycleState = Unprovisioned
13,896,786 UART: [state] DebugLocked = No
13,898,878 UART: [state] WD Timer not started. Device not locked for debugging
13,903,232 UART: [kat] SHA2-256
14,093,138 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,103,891 UART: [kat] ++
14,104,495 UART: [kat] sha1
14,115,876 UART: [kat] SHA2-256
14,118,898 UART: [kat] SHA2-384
14,124,886 UART: [kat] SHA2-512-ACC
14,127,458 UART: [kat] ECC-384
16,569,415 UART: [kat] HMAC-384Kdf
16,581,490 UART: [kat] LMS
17,113,294 UART: [kat] --
17,117,448 UART: [cold-reset] ++
17,118,460 UART: [fht] FHT @ 0x50003400
17,131,489 UART: [idev] ++
17,132,170 UART: [idev] CDI.KEYID = 6
17,133,187 UART: [idev] SUBJECT.KEYID = 7
17,134,350 UART: [idev] UDS.KEYID = 0
17,135,876 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,280,300 UART: [idev] Erasing UDS.KEYID = 0
19,604,095 UART: [idev] Sha1 KeyId Algorithm
19,627,705 UART: [idev] --
19,632,235 UART: [ldev] ++
19,632,912 UART: [ldev] CDI.KEYID = 6
19,633,820 UART: [ldev] SUBJECT.KEYID = 5
19,634,983 UART: [ldev] AUTHORITY.KEYID = 7
19,636,212 UART: [ldev] FE.KEYID = 1
19,646,488 UART: [ldev] Erasing FE.KEYID = 1
22,125,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,846,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,861,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,876,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,891,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,912,654 UART: [ldev] --
23,918,436 UART: [fwproc] Wait for Commands...
23,920,213 UART: [fwproc] Recv command 0x46574c44
23,922,544 UART: [fwproc] Recv'd Img size: 115032 bytes
27,378,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,460,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,576,702 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,123,768 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,762,080 ready_for_fw is high
3,762,536 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,981,533 >>> mbox cmd response: success
19,228,100 UART:
19,228,518 UART: Running Caliptra FMC ...
19,229,640 UART:
19,229,804 UART: [state] CFI Enabled
19,237,748 UART: [fht] FMC Alias Private Key: 7
20,994,633 UART: [art] Extend RT PCRs Done
20,995,854 UART: [art] Lock RT PCRs Done
20,997,402 UART: [art] Populate DV Done
21,002,710 UART: [fht] FMC Alias Private Key: 7
21,004,318 UART: [art] Derive CDI
21,005,143 UART: [art] Store in in slot 0x4
21,047,695 UART: [art] Derive Key Pair
21,048,702 UART: [art] Store priv key in slot 0x5
23,475,332 UART: [art] Derive Key Pair - Done
23,488,229 UART: [art] Signing Cert with AUTHO
23,489,551 UART: RITY.KEYID = 7
25,195,205 UART: [art] Erasing AUTHORITY.KEYID = 7
25,196,715 UART: [art] PUB.X = 9F47CE322CE76778D02360E3B28326C48E2C91706C652835C7AB06754D9B19ED5BB64382E41F55F34151099E06F3DF58
25,203,921 UART: [art] PUB.Y = 41221DC9F948AD935A0B6B6D711F44514D2043438299447C237BACE1A967A7CB4A23EB1248A32DD7EB15CDCEC869A777
25,211,183 UART: [art] SIG.R = 24D39824489F5B44E12F5299081B51F2A77543224BF828F37F8AA98F979336BDD16FFDB4F6DBCBD56968250A715F0A65
25,218,634 UART: [art] SIG.S = 43CFDBC79D1A1CF5618107E0CEA215D887C17B816A214A6022F456AF0D5CB33BC4C003549989AC59777C110B9FAF3BDF
26,197,391 UART: Caliptra RT
26,198,102 UART: [state] CFI Enabled
26,314,739 UART: [rt] RT listening for mailbox commands...
26,316,593 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,395 UART: [rt]cmd =0x46504c54, len=4
26,347,900 >>> mbox cmd response data (8 bytes)
26,348,953 UART: [rt] FIPS self test
26,349,903 UART: [kat] ++
26,350,355 UART: [kat] sha1
26,354,863 UART: [kat] SHA2-256
26,356,757 UART: [kat] SHA2-384
26,359,720 UART: [kat] SHA2-512-ACC
26,360,667 UART: Fatal Error: 0x90050001
26,395,819 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,540,276 >>> mbox cmd response: failed
26,540,923 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,685,383 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
16,996,193 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,204,138 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,828 UART: [state] LifecycleState = Unprovisioned
85,483 UART: [state] DebugLocked = No
86,173 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,799 UART: [kat] SHA2-256
881,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,845 UART: [kat] ++
885,997 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
895,040 UART: [kat] SHA2-512-ACC
896,941 UART: [kat] ECC-384
902,536 UART: [kat] HMAC-384Kdf
907,172 UART: [kat] LMS
1,475,368 UART: [kat] --
1,476,227 UART: [cold-reset] ++
1,476,659 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 ready_for_fw is high
1,480,619 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,182 UART: [idev] Erasing UDS.KEYID = 0
1,505,018 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,654 UART: [idev] --
1,514,579 UART: [ldev] ++
1,514,747 UART: [ldev] CDI.KEYID = 6
1,515,110 UART: [ldev] SUBJECT.KEYID = 5
1,515,536 UART: [ldev] AUTHORITY.KEYID = 7
1,515,999 UART: [ldev] FE.KEYID = 1
1,521,165 UART: [ldev] Erasing FE.KEYID = 1
1,546,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,640 UART: [ldev] --
1,586,061 UART: [fwproc] Waiting for Commands...
1,586,812 UART: [fwproc] Received command 0x46574c44
1,587,603 UART: [fwproc] Received Image of size 115032 bytes
2,892,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,554 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,948,906 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,085,889 >>> mbox cmd response: success
3,086,929 UART: [afmc] ++
3,087,097 UART: [afmc] CDI.KEYID = 6
3,087,459 UART: [afmc] SUBJECT.KEYID = 7
3,087,884 UART: [afmc] AUTHORITY.KEYID = 5
3,122,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,009 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,139,789 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,145,517 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,151,402 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,092 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,164,945 UART: [afmc] --
3,165,903 UART: [cold-reset] --
3,166,565 UART: [state] Locking Datavault
3,167,606 UART: [state] Locking PCR0, PCR1 and PCR31
3,168,210 UART: [state] Locking ICCM
3,168,836 UART: [exit] Launching FMC @ 0x40000130
3,174,165 UART:
3,174,181 UART: Running Caliptra FMC ...
3,174,589 UART:
3,174,643 UART: [state] CFI Enabled
3,185,128 UART: [fht] FMC Alias Private Key: 7
3,293,543 UART: [art] Extend RT PCRs Done
3,293,971 UART: [art] Lock RT PCRs Done
3,295,663 UART: [art] Populate DV Done
3,303,706 UART: [fht] FMC Alias Private Key: 7
3,304,836 UART: [art] Derive CDI
3,305,116 UART: [art] Store in in slot 0x4
3,390,717 UART: [art] Derive Key Pair
3,391,077 UART: [art] Store priv key in slot 0x5
3,404,235 UART: [art] Derive Key Pair - Done
3,418,844 UART: [art] Signing Cert with AUTHO
3,419,324 UART: RITY.KEYID = 7
3,434,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,435,315 UART: [art] PUB.X = EA2AECF57E722A9ECDD2E9FAE000D7364BD72E012E92CFD6447597CEED74EEE80EA703E259D3BCDD413EE24437075DAB
3,442,077 UART: [art] PUB.Y = 3EFA98F545E172AAC54DA191D32703B715F432DFA9C2D2DCFF98926C9D1BF1515851DFAFA50F8AD9C2FF4BED1CC85095
3,449,043 UART: [art] SIG.R = 1999E0E648B5A091E74FA7FD0B05D87B1683DBB9525F75A20249412F63997A41308AC293B7B0130220EC425B1C743795
3,455,793 UART: [art] SIG.S = 7750C81CDE58E4E8CE9E4967FE62620A2B5D2754B6245CF5363A3AE7DB03B71D88407419463287EE570ADE62DFF0E915
3,479,569 UART: Caliptra RT
3,479,822 UART: [state] CFI Enabled
3,587,450 UART: [rt] RT listening for mailbox commands...
3,588,113 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,617,960 UART: [rt]cmd =0x46504c54, len=4
3,619,114 >>> mbox cmd response data (8 bytes)
3,619,253 UART: [rt] FIPS self test
3,619,581 UART: [kat] ++
3,619,733 UART: [kat] sha1
3,623,875 UART: [kat] SHA2-256
3,625,897 UART: [kat] SHA2-384
3,628,546 UART: [kat] SHA2-512-ACC
3,629,136 UART: Fatal Error: 0x90050001
3,630,675 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,630,680 >>> mbox cmd response: failed
3,630,680 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,630,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,614 UART: [state] LifecycleState = Unprovisioned
85,269 UART: [state] DebugLocked = No
85,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,369 UART: [kat] SHA2-256
881,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,415 UART: [kat] ++
885,567 UART: [kat] sha1
889,919 UART: [kat] SHA2-256
891,857 UART: [kat] SHA2-384
894,682 UART: [kat] SHA2-512-ACC
896,583 UART: [kat] ECC-384
902,042 UART: [kat] HMAC-384Kdf
906,612 UART: [kat] LMS
1,474,808 UART: [kat] --
1,475,703 UART: [cold-reset] ++
1,476,037 UART: [fht] Storing FHT @ 0x50003400
1,478,780 UART: [idev] ++
1,478,948 UART: [idev] CDI.KEYID = 6
1,479,308 UART: [idev] SUBJECT.KEYID = 7
1,479,732 UART: [idev] UDS.KEYID = 0
1,480,077 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,038 UART: [idev] Erasing UDS.KEYID = 0
1,504,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,456 UART: [idev] --
1,514,517 UART: [ldev] ++
1,514,685 UART: [ldev] CDI.KEYID = 6
1,515,048 UART: [ldev] SUBJECT.KEYID = 5
1,515,474 UART: [ldev] AUTHORITY.KEYID = 7
1,515,937 UART: [ldev] FE.KEYID = 1
1,521,191 UART: [ldev] Erasing FE.KEYID = 1
1,546,592 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,960 UART: [ldev] --
1,585,305 UART: [fwproc] Waiting for Commands...
1,585,992 UART: [fwproc] Received command 0x46574c44
1,586,783 UART: [fwproc] Received Image of size 115032 bytes
2,891,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,918,458 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,947,810 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,084,663 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,689 ready_for_fw is high
1,362,689 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,483 >>> mbox cmd response: success
2,997,845 UART:
2,997,861 UART: Running Caliptra FMC ...
2,998,269 UART:
2,998,323 UART: [state] CFI Enabled
3,008,608 UART: [fht] FMC Alias Private Key: 7
3,116,349 UART: [art] Extend RT PCRs Done
3,116,777 UART: [art] Lock RT PCRs Done
3,118,331 UART: [art] Populate DV Done
3,126,522 UART: [fht] FMC Alias Private Key: 7
3,127,520 UART: [art] Derive CDI
3,127,800 UART: [art] Store in in slot 0x4
3,213,497 UART: [art] Derive Key Pair
3,213,857 UART: [art] Store priv key in slot 0x5
3,226,875 UART: [art] Derive Key Pair - Done
3,241,406 UART: [art] Signing Cert with AUTHO
3,241,886 UART: RITY.KEYID = 7
3,257,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,039 UART: [art] PUB.X = DB0BB39824A8CC602DAE678AFE2F9C9B1190C754DD466CA3E06DEE695D7A23E302470A39FAB72D940B416239254129F8
3,264,805 UART: [art] PUB.Y = 476E85CC6699F32BC2847CF8DB2DA8F791CAE82DE58DEE8DF4B05321A691D25BC82E192F973626BCA9F5636F40905204
3,271,760 UART: [art] SIG.R = 23404761D6E2EAB1FAFB91885E358C0AF8D5F364046810870C9276B6D39695E439F28B52F94283A92BFE81C6F3A0196A
3,278,519 UART: [art] SIG.S = 915AA1D6845D43912FE0BAF7DF2B65A652E5AA79626FFDD0C4FEDB3992443D63A9A85A61C5E872F59C329CFFBFDAFD65
3,302,602 UART: Caliptra RT
3,302,855 UART: [state] CFI Enabled
3,411,128 UART: [rt] RT listening for mailbox commands...
3,411,791 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,441,858 UART: [rt]cmd =0x46504c54, len=4
3,442,976 >>> mbox cmd response data (8 bytes)
3,443,235 UART: [rt] FIPS self test
3,443,563 UART: [kat] ++
3,443,715 UART: [kat] sha1
3,448,007 UART: [kat] SHA2-256
3,450,029 UART: [kat] SHA2-384
3,452,950 UART: [kat] SHA2-512-ACC
3,453,608 UART: Fatal Error: 0x90050001
3,455,147 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,455,152 >>> mbox cmd response: failed
3,455,152 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,455,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,485 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,070 UART: [kat] SHA2-256
882,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,116 UART: [kat] ++
886,268 UART: [kat] sha1
890,466 UART: [kat] SHA2-256
892,404 UART: [kat] SHA2-384
895,045 UART: [kat] SHA2-512-ACC
896,946 UART: [kat] ECC-384
902,427 UART: [kat] HMAC-384Kdf
907,215 UART: [kat] LMS
1,475,411 UART: [kat] --
1,476,222 UART: [cold-reset] ++
1,476,562 UART: [fht] Storing FHT @ 0x50003400
1,479,227 UART: [idev] ++
1,479,395 UART: [idev] CDI.KEYID = 6
1,479,755 UART: [idev] SUBJECT.KEYID = 7
1,480,179 UART: [idev] UDS.KEYID = 0
1,480,524 ready_for_fw is high
1,480,524 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,529 UART: [idev] Erasing UDS.KEYID = 0
1,505,377 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,037 UART: [idev] --
1,515,136 UART: [ldev] ++
1,515,304 UART: [ldev] CDI.KEYID = 6
1,515,667 UART: [ldev] SUBJECT.KEYID = 5
1,516,093 UART: [ldev] AUTHORITY.KEYID = 7
1,516,556 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,546,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,053 UART: [ldev] --
1,586,430 UART: [fwproc] Waiting for Commands...
1,587,243 UART: [fwproc] Received command 0x46574c44
1,588,034 UART: [fwproc] Received Image of size 115032 bytes
2,893,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,929 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,096 >>> mbox cmd response: success
3,088,222 UART: [afmc] ++
3,088,390 UART: [afmc] CDI.KEYID = 6
3,088,752 UART: [afmc] SUBJECT.KEYID = 7
3,089,177 UART: [afmc] AUTHORITY.KEYID = 5
3,124,234 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,322 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,102 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,830 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,715 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,405 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,272 UART: [afmc] --
3,167,310 UART: [cold-reset] --
3,168,354 UART: [state] Locking Datavault
3,169,317 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,921 UART: [state] Locking ICCM
3,170,489 UART: [exit] Launching FMC @ 0x40000130
3,175,818 UART:
3,175,834 UART: Running Caliptra FMC ...
3,176,242 UART:
3,176,385 UART: [state] CFI Enabled
3,186,974 UART: [fht] FMC Alias Private Key: 7
3,295,295 UART: [art] Extend RT PCRs Done
3,295,723 UART: [art] Lock RT PCRs Done
3,297,169 UART: [art] Populate DV Done
3,305,348 UART: [fht] FMC Alias Private Key: 7
3,306,414 UART: [art] Derive CDI
3,306,694 UART: [art] Store in in slot 0x4
3,392,467 UART: [art] Derive Key Pair
3,392,827 UART: [art] Store priv key in slot 0x5
3,405,921 UART: [art] Derive Key Pair - Done
3,420,515 UART: [art] Signing Cert with AUTHO
3,420,995 UART: RITY.KEYID = 7
3,436,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,788 UART: [art] PUB.X = A9309A99F7A78E02E82E61B85EF1963A748B8DE7E6C3B076150341ED972D9A17C1A2871472A837BF7F4414EAB56D0069
3,443,530 UART: [art] PUB.Y = 90250FFC8BAAEDB63753A9FE9FFDC5D94335A60BD83C6430A32AB11857A421A97656B07F7844944BF841202DAD044F35
3,450,477 UART: [art] SIG.R = E9C570FF7F43A494B02AD8EA216472285EC80ED40F5E9AC6F9285A49E43C4D7E7740DC5F286D785BB152516C06FBB6F1
3,457,248 UART: [art] SIG.S = 891A661484A65494941DC82BECDB458A9AA7A65BD70D43CAB12C4E19FA91E2F017C90F62D3CEBFD69DD04C4E4093CB7F
3,481,023 UART: Caliptra RT
3,481,368 UART: [state] CFI Enabled
3,589,404 UART: [rt] RT listening for mailbox commands...
3,590,067 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,146 UART: [rt]cmd =0x46504c54, len=4
3,621,450 >>> mbox cmd response data (8 bytes)
3,621,573 UART: [rt] FIPS self test
3,621,901 UART: [kat] ++
3,622,053 UART: [kat] sha1
3,626,429 UART: [kat] SHA2-256
3,628,451 UART: [kat] SHA2-384
3,631,318 UART: [kat] SHA2-512-ACC
3,632,040 UART: Fatal Error: 0x90050001
3,633,579 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,633,584 >>> mbox cmd response: failed
3,633,584 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,633,589 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,494 UART: [kat] SHA2-256
882,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,540 UART: [kat] ++
886,692 UART: [kat] sha1
890,916 UART: [kat] SHA2-256
892,854 UART: [kat] SHA2-384
895,597 UART: [kat] SHA2-512-ACC
897,498 UART: [kat] ECC-384
903,423 UART: [kat] HMAC-384Kdf
908,015 UART: [kat] LMS
1,476,211 UART: [kat] --
1,477,338 UART: [cold-reset] ++
1,477,764 UART: [fht] Storing FHT @ 0x50003400
1,480,483 UART: [idev] ++
1,480,651 UART: [idev] CDI.KEYID = 6
1,481,011 UART: [idev] SUBJECT.KEYID = 7
1,481,435 UART: [idev] UDS.KEYID = 0
1,481,780 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,897 UART: [idev] Erasing UDS.KEYID = 0
1,505,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,527 UART: [idev] --
1,515,690 UART: [ldev] ++
1,515,858 UART: [ldev] CDI.KEYID = 6
1,516,221 UART: [ldev] SUBJECT.KEYID = 5
1,516,647 UART: [ldev] AUTHORITY.KEYID = 7
1,517,110 UART: [ldev] FE.KEYID = 1
1,522,302 UART: [ldev] Erasing FE.KEYID = 1
1,548,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,997 UART: [ldev] --
1,587,404 UART: [fwproc] Waiting for Commands...
1,588,051 UART: [fwproc] Received command 0x46574c44
1,588,842 UART: [fwproc] Received Image of size 115032 bytes
2,894,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,922,433 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,758 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,164 ready_for_fw is high
1,363,164 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,750 >>> mbox cmd response: success
3,000,310 UART:
3,000,326 UART: Running Caliptra FMC ...
3,000,734 UART:
3,000,877 UART: [state] CFI Enabled
3,011,582 UART: [fht] FMC Alias Private Key: 7
3,120,741 UART: [art] Extend RT PCRs Done
3,121,169 UART: [art] Lock RT PCRs Done
3,122,717 UART: [art] Populate DV Done
3,130,964 UART: [fht] FMC Alias Private Key: 7
3,131,982 UART: [art] Derive CDI
3,132,262 UART: [art] Store in in slot 0x4
3,217,769 UART: [art] Derive Key Pair
3,218,129 UART: [art] Store priv key in slot 0x5
3,231,811 UART: [art] Derive Key Pair - Done
3,246,462 UART: [art] Signing Cert with AUTHO
3,246,942 UART: RITY.KEYID = 7
3,262,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,263,091 UART: [art] PUB.X = 1F50C78BC72A58479007908FE3EBD784A2A07194AB727396D0F188BFAA658E934241E91B14617E1B8B1DEB89CAC79C63
3,269,862 UART: [art] PUB.Y = EABCD6A834D1FC46215EA428518DCCE39B3BF7B8442FBB587F7B7D49F158E9761064DA2F6E2451DA200F9D3A4C4159E1
3,276,823 UART: [art] SIG.R = 330794C4A3FDB0971EBF2199CAF0E7637B3FDD4D78603E8BE1452BAAAB798DEC0BB6E17D3399DF7366788CCFF66B605C
3,283,605 UART: [art] SIG.S = F96C4067669A15E241941F5F227805360FD7A7A3E1464B56DE92ED7499992875B066A4E04975AACC330F92A1C411351C
3,307,395 UART: Caliptra RT
3,307,740 UART: [state] CFI Enabled
3,415,571 UART: [rt] RT listening for mailbox commands...
3,416,234 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,446,055 UART: [rt]cmd =0x46504c54, len=4
3,447,199 >>> mbox cmd response data (8 bytes)
3,447,382 UART: [rt] FIPS self test
3,447,710 UART: [kat] ++
3,447,862 UART: [kat] sha1
3,451,934 UART: [kat] SHA2-256
3,453,956 UART: [kat] SHA2-384
3,456,625 UART: [kat] SHA2-512-ACC
3,457,317 UART: Fatal Error: 0x90050001
3,458,856 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,458,861 >>> mbox cmd response: failed
3,458,861 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,458,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,970 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,710 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
893,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,501 UART: [kat] ++
897,653 UART: [kat] sha1
901,867 UART: [kat] SHA2-256
903,807 UART: [kat] SHA2-384
906,480 UART: [kat] SHA2-512-ACC
908,381 UART: [kat] ECC-384
917,886 UART: [kat] HMAC-384Kdf
922,482 UART: [kat] LMS
1,170,810 UART: [kat] --
1,171,793 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,774 UART: [idev] ++
1,174,942 UART: [idev] CDI.KEYID = 6
1,175,302 UART: [idev] SUBJECT.KEYID = 7
1,175,726 UART: [idev] UDS.KEYID = 0
1,176,071 ready_for_fw is high
1,176,071 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,688 UART: [idev] Erasing UDS.KEYID = 0
1,200,569 UART: [idev] Sha1 KeyId Algorithm
1,209,025 UART: [idev] --
1,209,975 UART: [ldev] ++
1,210,143 UART: [ldev] CDI.KEYID = 6
1,210,506 UART: [ldev] SUBJECT.KEYID = 5
1,210,932 UART: [ldev] AUTHORITY.KEYID = 7
1,211,395 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,756 UART: [fwproc] Wait for Commands...
1,282,570 UART: [fwproc] Recv command 0x46574c44
1,283,298 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,139 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,984 >>> mbox cmd response: success
2,782,194 UART: [afmc] ++
2,782,362 UART: [afmc] CDI.KEYID = 6
2,782,724 UART: [afmc] SUBJECT.KEYID = 7
2,783,149 UART: [afmc] AUTHORITY.KEYID = 5
2,818,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,717 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,602 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,321 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,217 UART: [afmc] --
2,862,129 UART: [cold-reset] --
2,863,031 UART: [state] Locking Datavault
2,864,260 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,864 UART: [state] Locking ICCM
2,865,442 UART: [exit] Launching FMC @ 0x40000130
2,870,771 UART:
2,870,787 UART: Running Caliptra FMC ...
2,871,195 UART:
2,871,249 UART: [state] CFI Enabled
2,881,598 UART: [fht] FMC Alias Private Key: 7
2,989,241 UART: [art] Extend RT PCRs Done
2,989,669 UART: [art] Lock RT PCRs Done
2,991,453 UART: [art] Populate DV Done
2,999,838 UART: [fht] FMC Alias Private Key: 7
3,000,854 UART: [art] Derive CDI
3,001,134 UART: [art] Store in in slot 0x4
3,086,631 UART: [art] Derive Key Pair
3,086,991 UART: [art] Store priv key in slot 0x5
3,100,281 UART: [art] Derive Key Pair - Done
3,114,662 UART: [art] Signing Cert with AUTHO
3,115,142 UART: RITY.KEYID = 7
3,130,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,951 UART: [art] PUB.X = B1F2E361A45C87231EEAF8123ECB130750E88FC599B3084651519289145003F3FEC67EA21B9948EDA8F069293052EB5C
3,137,710 UART: [art] PUB.Y = 566842E7915F46610BDD9F9D8FFC442AC8C660E2A47A7D248D5893C55C9698E1DC0F6AB273482D4A1988CD0595A61D39
3,144,653 UART: [art] SIG.R = A650825C5F33B51A3DF524B961909A5F5D41136AC00C96AFED6B55074384DE56104D09132BA769BB37295D5C17A8EE0B
3,151,413 UART: [art] SIG.S = 50ED7EACD187707C5FAB67B730BB77256DBA3CCCBF0B12F00029D94A50EBCD0638C9C4EA86E54456847EE333F6431B4A
3,174,546 UART: Caliptra RT
3,174,799 UART: [state] CFI Enabled
3,283,438 UART: [rt] RT listening for mailbox commands...
3,284,101 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,054 UART: [rt]cmd =0x46504c54, len=4
3,315,414 >>> mbox cmd response data (8 bytes)
3,315,581 UART: [rt] FIPS self test
3,315,909 UART: [kat] ++
3,316,061 UART: [kat] sha1
3,320,403 UART: [kat] SHA2-256
3,322,425 UART: [kat] SHA2-384
3,325,472 UART: [kat] SHA2-512-ACC
3,325,980 UART: Fatal Error: 0x90050001
3,327,519 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,524 >>> mbox cmd response: failed
3,327,524 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,790 UART: [state] LifecycleState = Unprovisioned
85,445 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
892,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,061 UART: [kat] ++
897,213 UART: [kat] sha1
901,633 UART: [kat] SHA2-256
903,573 UART: [kat] SHA2-384
906,272 UART: [kat] SHA2-512-ACC
908,173 UART: [kat] ECC-384
917,784 UART: [kat] HMAC-384Kdf
922,396 UART: [kat] LMS
1,170,724 UART: [kat] --
1,171,807 UART: [cold-reset] ++
1,172,313 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,888 UART: [idev] Erasing UDS.KEYID = 0
1,199,995 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,861 UART: [ldev] ++
1,210,029 UART: [ldev] CDI.KEYID = 6
1,210,392 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,539 UART: [ldev] Erasing FE.KEYID = 1
1,242,872 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,283,092 UART: [fwproc] Recv command 0x46574c44
1,283,820 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,615 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,919 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,858 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,547 ready_for_fw is high
1,059,547 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,343 >>> mbox cmd response: success
2,694,673 UART:
2,694,689 UART: Running Caliptra FMC ...
2,695,097 UART:
2,695,151 UART: [state] CFI Enabled
2,706,052 UART: [fht] FMC Alias Private Key: 7
2,813,719 UART: [art] Extend RT PCRs Done
2,814,147 UART: [art] Lock RT PCRs Done
2,815,507 UART: [art] Populate DV Done
2,823,368 UART: [fht] FMC Alias Private Key: 7
2,824,298 UART: [art] Derive CDI
2,824,578 UART: [art] Store in in slot 0x4
2,910,183 UART: [art] Derive Key Pair
2,910,543 UART: [art] Store priv key in slot 0x5
2,923,805 UART: [art] Derive Key Pair - Done
2,938,686 UART: [art] Signing Cert with AUTHO
2,939,166 UART: RITY.KEYID = 7
2,954,308 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,073 UART: [art] PUB.X = 4737230DB1870FAC0BEF6539C468C2D52931F0C0A4BC39BC8367B2583CFB6C398FCD7F8ABC25B8B35D53241AF9CED44C
2,961,850 UART: [art] PUB.Y = C1ACA8065B7558DDD433BC5E712913F4D31E481B85FAD5A3EF7B527DD55C02796655E44CA13F79A0A3C843C464DBA222
2,968,804 UART: [art] SIG.R = C0E4ACBF670A7B903438D1F8C44275806796FBD63781ED8910F7C500968B4827F7B9D705B98B02354E8476E7F0F08941
2,975,537 UART: [art] SIG.S = 8DBFB210D93190EB39448223D3C2469D19E84DBEDCAF4690A597DB2EBB1F405E470A3156D652214615F583F3565389B3
2,999,385 UART: Caliptra RT
2,999,638 UART: [state] CFI Enabled
3,107,570 UART: [rt] RT listening for mailbox commands...
3,108,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,004 UART: [rt]cmd =0x46504c54, len=4
3,139,154 >>> mbox cmd response data (8 bytes)
3,139,381 UART: [rt] FIPS self test
3,139,709 UART: [kat] ++
3,139,861 UART: [kat] sha1
3,144,167 UART: [kat] SHA2-256
3,146,189 UART: [kat] SHA2-384
3,149,148 UART: [kat] SHA2-512-ACC
3,149,850 UART: Fatal Error: 0x90050001
3,151,389 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,394 >>> mbox cmd response: failed
3,151,394 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,399 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,517 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,543 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
88,015 UART: [kat] SHA2-256
893,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,790 UART: [kat] ++
897,942 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,805 UART: [kat] SHA2-512-ACC
908,706 UART: [kat] ECC-384
918,793 UART: [kat] HMAC-384Kdf
923,495 UART: [kat] LMS
1,171,823 UART: [kat] --
1,172,794 UART: [cold-reset] ++
1,173,232 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 ready_for_fw is high
1,177,094 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,781 UART: [idev] Erasing UDS.KEYID = 0
1,201,434 UART: [idev] Sha1 KeyId Algorithm
1,210,118 UART: [idev] --
1,211,214 UART: [ldev] ++
1,211,382 UART: [ldev] CDI.KEYID = 6
1,211,745 UART: [ldev] SUBJECT.KEYID = 5
1,212,171 UART: [ldev] AUTHORITY.KEYID = 7
1,212,634 UART: [ldev] FE.KEYID = 1
1,218,014 UART: [ldev] Erasing FE.KEYID = 1
1,244,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,540 UART: [ldev] --
1,283,995 UART: [fwproc] Wait for Commands...
1,284,765 UART: [fwproc] Recv command 0x46574c44
1,285,493 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,712 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,016 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,791 >>> mbox cmd response: success
2,784,943 UART: [afmc] ++
2,785,111 UART: [afmc] CDI.KEYID = 6
2,785,473 UART: [afmc] SUBJECT.KEYID = 7
2,785,898 UART: [afmc] AUTHORITY.KEYID = 5
2,821,485 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,048 UART: [afmc] --
2,865,046 UART: [cold-reset] --
2,865,708 UART: [state] Locking Datavault
2,866,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,491 UART: [state] Locking ICCM
2,868,133 UART: [exit] Launching FMC @ 0x40000130
2,873,462 UART:
2,873,478 UART: Running Caliptra FMC ...
2,873,886 UART:
2,874,029 UART: [state] CFI Enabled
2,884,370 UART: [fht] FMC Alias Private Key: 7
2,992,641 UART: [art] Extend RT PCRs Done
2,993,069 UART: [art] Lock RT PCRs Done
2,994,535 UART: [art] Populate DV Done
3,002,900 UART: [fht] FMC Alias Private Key: 7
3,004,062 UART: [art] Derive CDI
3,004,342 UART: [art] Store in in slot 0x4
3,090,181 UART: [art] Derive Key Pair
3,090,541 UART: [art] Store priv key in slot 0x5
3,103,957 UART: [art] Derive Key Pair - Done
3,118,998 UART: [art] Signing Cert with AUTHO
3,119,478 UART: RITY.KEYID = 7
3,134,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,447 UART: [art] PUB.X = 537C8E6906789C77F2EAA29D05EB227EED61386762931D963C44530C7D090F7C101D4662CB070ED98DCD973F40EBF7DF
3,142,200 UART: [art] PUB.Y = 1BD5F730170B1B672223D0657AAA30A3F0052FC0EA16BE3B3D1C14A128B4FAC640574BD9178F1CEC3E1FE593ABAB4C16
3,149,160 UART: [art] SIG.R = 028C6B2E5A0ECA80DAFD91DE1D3DC72AF736ED0E4D53AB343F5BCCA851E6597F67DE5D99B16728E811F4361DFF57D95C
3,155,943 UART: [art] SIG.S = 307A9D9D83A30480AEC73042D0530ED14ACAA771C5F4DA26EDA73B8B009461AD5F26AFD8C3DBE2577E759D2B27AD3D8E
3,179,896 UART: Caliptra RT
3,180,241 UART: [state] CFI Enabled
3,288,726 UART: [rt] RT listening for mailbox commands...
3,289,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,319,556 UART: [rt]cmd =0x46504c54, len=4
3,320,680 >>> mbox cmd response data (8 bytes)
3,320,935 UART: [rt] FIPS self test
3,321,263 UART: [kat] ++
3,321,415 UART: [kat] sha1
3,325,633 UART: [kat] SHA2-256
3,327,655 UART: [kat] SHA2-384
3,330,352 UART: [kat] SHA2-512-ACC
3,331,070 UART: Fatal Error: 0x90050001
3,332,609 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,332,614 >>> mbox cmd response: failed
3,332,614 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,332,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
893,639 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,764 UART: [kat] ++
897,916 UART: [kat] sha1
901,990 UART: [kat] SHA2-256
903,930 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,351 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,196 UART: [cold-reset] ++
1,172,750 UART: [fht] FHT @ 0x50003400
1,175,497 UART: [idev] ++
1,175,665 UART: [idev] CDI.KEYID = 6
1,176,025 UART: [idev] SUBJECT.KEYID = 7
1,176,449 UART: [idev] UDS.KEYID = 0
1,176,794 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,299 UART: [idev] Erasing UDS.KEYID = 0
1,201,184 UART: [idev] Sha1 KeyId Algorithm
1,209,792 UART: [idev] --
1,210,774 UART: [ldev] ++
1,210,942 UART: [ldev] CDI.KEYID = 6
1,211,305 UART: [ldev] SUBJECT.KEYID = 5
1,211,731 UART: [ldev] AUTHORITY.KEYID = 7
1,212,194 UART: [ldev] FE.KEYID = 1
1,217,376 UART: [ldev] Erasing FE.KEYID = 1
1,243,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,798 UART: [ldev] --
1,283,099 UART: [fwproc] Wait for Commands...
1,283,771 UART: [fwproc] Recv command 0x46574c44
1,284,499 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,086 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,390 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,193 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,118 ready_for_fw is high
1,061,118 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,316 >>> mbox cmd response: success
2,696,904 UART:
2,696,920 UART: Running Caliptra FMC ...
2,697,328 UART:
2,697,471 UART: [state] CFI Enabled
2,708,278 UART: [fht] FMC Alias Private Key: 7
2,816,299 UART: [art] Extend RT PCRs Done
2,816,727 UART: [art] Lock RT PCRs Done
2,818,443 UART: [art] Populate DV Done
2,826,658 UART: [fht] FMC Alias Private Key: 7
2,827,620 UART: [art] Derive CDI
2,827,900 UART: [art] Store in in slot 0x4
2,913,487 UART: [art] Derive Key Pair
2,913,847 UART: [art] Store priv key in slot 0x5
2,926,695 UART: [art] Derive Key Pair - Done
2,941,592 UART: [art] Signing Cert with AUTHO
2,942,072 UART: RITY.KEYID = 7
2,957,320 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,085 UART: [art] PUB.X = AA853EA91C391AAA4B550B4BFF09F6DF9C7B369C4262845237731981F47357A966765455AD0182CE37DCECABFE053D37
2,964,849 UART: [art] PUB.Y = FCFAF0810ED657F0DB17BD222629E591D26F1C12EFD40B81BD1391C0A361DAF7FF07181C9BABD9251995E2ECB11AA45A
2,971,810 UART: [art] SIG.R = 815FB2517C8F514B3DCA92ED60A168E0EBD54510C920ED68786B305A804D09866B6F58FF533F9206F6B8476CE3A0F7F8
2,978,578 UART: [art] SIG.S = C7196C46329E1FC9FB3C711C7CDC708FA0BBA4EF34F954C0E6A81C237E82E48973161786CBAB2C8F2751E378F8F103B8
3,002,490 UART: Caliptra RT
3,002,835 UART: [state] CFI Enabled
3,111,003 UART: [rt] RT listening for mailbox commands...
3,111,666 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,271 UART: [rt]cmd =0x46504c54, len=4
3,142,377 >>> mbox cmd response data (8 bytes)
3,142,526 UART: [rt] FIPS self test
3,142,854 UART: [kat] ++
3,143,006 UART: [kat] sha1
3,147,304 UART: [kat] SHA2-256
3,149,326 UART: [kat] SHA2-384
3,152,247 UART: [kat] SHA2-512-ACC
3,152,923 UART: Fatal Error: 0x90050001
3,154,462 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,154,467 >>> mbox cmd response: failed
3,154,467 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,154,472 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,374 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,100 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,455 UART: [cold-reset] ++
1,169,911 UART: [fht] FHT @ 0x50003400
1,172,433 UART: [idev] ++
1,172,601 UART: [idev] CDI.KEYID = 6
1,172,962 UART: [idev] SUBJECT.KEYID = 7
1,173,387 UART: [idev] UDS.KEYID = 0
1,173,733 ready_for_fw is high
1,173,733 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,180,969 UART: [idev] Erasing UDS.KEYID = 0
1,198,055 UART: [idev] Sha1 KeyId Algorithm
1,207,037 UART: [idev] --
1,207,972 UART: [ldev] ++
1,208,140 UART: [ldev] CDI.KEYID = 6
1,208,504 UART: [ldev] SUBJECT.KEYID = 5
1,208,931 UART: [ldev] AUTHORITY.KEYID = 7
1,209,394 UART: [ldev] FE.KEYID = 1
1,214,600 UART: [ldev] Erasing FE.KEYID = 1
1,240,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,280,014 UART: [fwproc] Wait for Commands...
1,280,609 UART: [fwproc] Recv command 0x46574c44
1,281,342 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,909 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,218 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,158 >>> mbox cmd response: success
2,781,297 UART: [afmc] ++
2,781,465 UART: [afmc] CDI.KEYID = 6
2,781,828 UART: [afmc] SUBJECT.KEYID = 7
2,782,254 UART: [afmc] AUTHORITY.KEYID = 5
2,817,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,816 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,545 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,428 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,147 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,002 UART: [afmc] --
2,860,978 UART: [cold-reset] --
2,861,850 UART: [state] Locking Datavault
2,863,183 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,787 UART: [state] Locking ICCM
2,864,313 UART: [exit] Launching FMC @ 0x40000130
2,869,642 UART:
2,869,658 UART: Running Caliptra FMC ...
2,870,066 UART:
2,870,120 UART: [state] CFI Enabled
2,880,617 UART: [fht] FMC Alias Private Key: 7
2,988,380 UART: [art] Extend RT PCRs Done
2,988,808 UART: [art] Lock RT PCRs Done
2,989,962 UART: [art] Populate DV Done
2,998,059 UART: [fht] FMC Alias Private Key: 7
2,999,239 UART: [art] Derive CDI
2,999,519 UART: [art] Store in in slot 0x4
3,085,060 UART: [art] Derive Key Pair
3,085,420 UART: [art] Store priv key in slot 0x5
3,098,862 UART: [art] Derive Key Pair - Done
3,113,327 UART: [art] Signing Cert with AUTHO
3,113,807 UART: RITY.KEYID = 7
3,129,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,129,872 UART: [art] PUB.X = ABCD2CB9216B7F19F3BD527B0F573B04E8451192AAEBBEAD871FF0BFAB5F7B6554939AFCAA165EA4A66DCD0C507A2C4F
3,136,663 UART: [art] PUB.Y = 25CEE429C2F8C99AC2E01B85BC5CEAF3027968F9C382CBA899BAB45F29909BEF55BD516BBDE6AC01D0093E21E3E69E7A
3,143,626 UART: [art] SIG.R = F05946F0746ABD3DCDDCB72028350DE73EF0C53BE78DF25D3F812807EE63DAD151843D022CC88FB1CCE1A1775DEB39F0
3,150,405 UART: [art] SIG.S = 63D555FB3D92FB49D89096469E72859E6A6CEFA39429F955B01FFCB9A2D95D33A96BF5FAB336B0964E2C975F52B91B50
3,174,318 UART: Caliptra RT
3,174,571 UART: [state] CFI Enabled
3,283,176 UART: [rt] RT listening for mailbox commands...
3,283,839 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,688 UART: [rt]cmd =0x46504c54, len=4
3,314,746 >>> mbox cmd response data (8 bytes)
3,315,067 UART: [rt] FIPS self test
3,315,395 UART: [kat] ++
3,315,547 UART: [kat] sha1
3,319,643 UART: [kat] SHA2-256
3,321,665 UART: [kat] SHA2-384
3,324,686 UART: [kat] SHA2-512-ACC
3,325,230 UART: Fatal Error: 0x90050001
3,326,769 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,326,774 >>> mbox cmd response: failed
3,326,774 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,326,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,693 UART: [cold-reset] ++
1,170,175 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,007 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,598 UART: [ldev] ++
1,208,766 UART: [ldev] CDI.KEYID = 6
1,209,130 UART: [ldev] SUBJECT.KEYID = 5
1,209,557 UART: [ldev] AUTHORITY.KEYID = 7
1,210,020 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,068 UART: [ldev] --
1,280,462 UART: [fwproc] Wait for Commands...
1,281,245 UART: [fwproc] Recv command 0x46574c44
1,281,978 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,129 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,438 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,350 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,490 ready_for_fw is high
1,056,490 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,562 >>> mbox cmd response: success
2,694,352 UART:
2,694,368 UART: Running Caliptra FMC ...
2,694,776 UART:
2,694,830 UART: [state] CFI Enabled
2,705,179 UART: [fht] FMC Alias Private Key: 7
2,813,266 UART: [art] Extend RT PCRs Done
2,813,694 UART: [art] Lock RT PCRs Done
2,815,190 UART: [art] Populate DV Done
2,823,317 UART: [fht] FMC Alias Private Key: 7
2,824,385 UART: [art] Derive CDI
2,824,665 UART: [art] Store in in slot 0x4
2,910,344 UART: [art] Derive Key Pair
2,910,704 UART: [art] Store priv key in slot 0x5
2,923,852 UART: [art] Derive Key Pair - Done
2,938,452 UART: [art] Signing Cert with AUTHO
2,938,932 UART: RITY.KEYID = 7
2,954,156 UART: [art] Erasing AUTHORITY.KEYID = 7
2,954,921 UART: [art] PUB.X = FE316ACE1F990A0AC3EB1E9814627742BD49662898FE66EA41394BF54E4E8433F69D38A34BA687708269793AEE1FDDD1
2,961,691 UART: [art] PUB.Y = BDE8D113FF37B10E665E6EE6B0F2A36F95C5EC7EE4573AFD39E28D2B74C4D3A8414F06386232F38B3957ABC912892E4A
2,968,647 UART: [art] SIG.R = 658A8201DC6C473941F7091D7EB391B5040D1DB636EDC162F87F9C117F5C76F6A6AE42BB189C7E6B9EC56B53FD61E637
2,975,413 UART: [art] SIG.S = C77C2259A1538ABFD3F0A046C312F6CFF4EA47B4C6E752A97F8D612B632FE6E87037D189874F751378926928B70DCB73
2,999,243 UART: Caliptra RT
2,999,496 UART: [state] CFI Enabled
3,107,345 UART: [rt] RT listening for mailbox commands...
3,108,008 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,907 UART: [rt]cmd =0x46504c54, len=4
3,138,933 >>> mbox cmd response data (8 bytes)
3,139,272 UART: [rt] FIPS self test
3,139,600 UART: [kat] ++
3,139,752 UART: [kat] sha1
3,143,982 UART: [kat] SHA2-256
3,146,004 UART: [kat] SHA2-384
3,148,753 UART: [kat] SHA2-512-ACC
3,149,465 UART: Fatal Error: 0x90050001
3,151,004 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,009 >>> mbox cmd response: failed
3,151,009 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,151,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,814 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,562 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,215 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,705 UART: [kat] SHA2-256
891,255 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,877 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,698 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,872 UART: [idev] ++
1,173,040 UART: [idev] CDI.KEYID = 6
1,173,401 UART: [idev] SUBJECT.KEYID = 7
1,173,826 UART: [idev] UDS.KEYID = 0
1,174,172 ready_for_fw is high
1,174,172 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,198,816 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,621 UART: [ldev] ++
1,208,789 UART: [ldev] CDI.KEYID = 6
1,209,153 UART: [ldev] SUBJECT.KEYID = 5
1,209,580 UART: [ldev] AUTHORITY.KEYID = 7
1,210,043 UART: [ldev] FE.KEYID = 1
1,215,203 UART: [ldev] Erasing FE.KEYID = 1
1,241,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,189 UART: [ldev] --
1,280,653 UART: [fwproc] Wait for Commands...
1,281,226 UART: [fwproc] Recv command 0x46574c44
1,281,959 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,486 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,795 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,603 >>> mbox cmd response: success
2,781,794 UART: [afmc] ++
2,781,962 UART: [afmc] CDI.KEYID = 6
2,782,325 UART: [afmc] SUBJECT.KEYID = 7
2,782,751 UART: [afmc] AUTHORITY.KEYID = 5
2,818,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,489 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,218 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,101 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,820 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,727 UART: [afmc] --
2,862,709 UART: [cold-reset] --
2,863,551 UART: [state] Locking Datavault
2,864,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,314 UART: [state] Locking ICCM
2,865,878 UART: [exit] Launching FMC @ 0x40000130
2,871,207 UART:
2,871,223 UART: Running Caliptra FMC ...
2,871,631 UART:
2,871,774 UART: [state] CFI Enabled
2,882,161 UART: [fht] FMC Alias Private Key: 7
2,990,204 UART: [art] Extend RT PCRs Done
2,990,632 UART: [art] Lock RT PCRs Done
2,992,304 UART: [art] Populate DV Done
3,000,347 UART: [fht] FMC Alias Private Key: 7
3,001,349 UART: [art] Derive CDI
3,001,629 UART: [art] Store in in slot 0x4
3,086,908 UART: [art] Derive Key Pair
3,087,268 UART: [art] Store priv key in slot 0x5
3,100,886 UART: [art] Derive Key Pair - Done
3,115,598 UART: [art] Signing Cert with AUTHO
3,116,078 UART: RITY.KEYID = 7
3,131,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,035 UART: [art] PUB.X = B2D2A0C4EAC9BF0F6A7B863E34B9107ED8EFB04B76ECAE53E46065779683BAA735A79B7FB4E6AD06690004A063DA00EC
3,138,770 UART: [art] PUB.Y = A41D1ED5B4D77407B6EB7AD67464A250624BA8B3BEF3A28AE40164F1793F5FF3C2814B7B2271B5444722DDE6679F58EB
3,145,722 UART: [art] SIG.R = ADB0F6EDCC260EBDA449C06245304EA5704B4A02D2A7435825431E30B5499AE2F19078BF352D4317BB948BBF4A3CE3EB
3,152,498 UART: [art] SIG.S = A3C044A8A49BFE6F4B6D2585CC5364F26974C3ED88E0271DBCD77F93AC460FAFBF028AF9AFF2244286B65E9E20830D96
3,176,430 UART: Caliptra RT
3,176,775 UART: [state] CFI Enabled
3,284,157 UART: [rt] RT listening for mailbox commands...
3,284,820 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,314,773 UART: [rt]cmd =0x46504c54, len=4
3,316,021 >>> mbox cmd response data (8 bytes)
3,316,300 UART: [rt] FIPS self test
3,316,628 UART: [kat] ++
3,316,780 UART: [kat] sha1
3,320,818 UART: [kat] SHA2-256
3,322,840 UART: [kat] SHA2-384
3,325,509 UART: [kat] SHA2-512-ACC
3,326,101 UART: Fatal Error: 0x90050001
3,327,640 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,645 >>> mbox cmd response: failed
3,327,645 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
899,810 UART: [kat] SHA2-256
901,750 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
921,257 UART: [kat] LMS
1,169,569 UART: [kat] --
1,170,546 UART: [cold-reset] ++
1,170,914 UART: [fht] FHT @ 0x50003400
1,173,546 UART: [idev] ++
1,173,714 UART: [idev] CDI.KEYID = 6
1,174,075 UART: [idev] SUBJECT.KEYID = 7
1,174,500 UART: [idev] UDS.KEYID = 0
1,174,846 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,328 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,058 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,811 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,993 UART: [ldev] --
1,281,371 UART: [fwproc] Wait for Commands...
1,282,100 UART: [fwproc] Recv command 0x46574c44
1,282,833 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,214 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,523 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,433 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,641 ready_for_fw is high
1,056,641 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,757 >>> mbox cmd response: success
2,695,343 UART:
2,695,359 UART: Running Caliptra FMC ...
2,695,767 UART:
2,695,910 UART: [state] CFI Enabled
2,706,719 UART: [fht] FMC Alias Private Key: 7
2,814,916 UART: [art] Extend RT PCRs Done
2,815,344 UART: [art] Lock RT PCRs Done
2,817,188 UART: [art] Populate DV Done
2,825,467 UART: [fht] FMC Alias Private Key: 7
2,826,565 UART: [art] Derive CDI
2,826,845 UART: [art] Store in in slot 0x4
2,912,750 UART: [art] Derive Key Pair
2,913,110 UART: [art] Store priv key in slot 0x5
2,926,398 UART: [art] Derive Key Pair - Done
2,941,100 UART: [art] Signing Cert with AUTHO
2,941,580 UART: RITY.KEYID = 7
2,956,458 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,223 UART: [art] PUB.X = 588299E177EC675C247C79254C296D092709760302EEC23783F9BD91C4E8348D049F5110F21900750120F3ED87E9CFCE
2,963,943 UART: [art] PUB.Y = F074CAC7F7144D7B56CD350D2B9DBF69CB69EF55E10F2FA10E8D15F3442EC45C60661637E09B6D3B6B40E0B8F5214C71
2,970,896 UART: [art] SIG.R = 0A2FE9B98736FE5A0230F495FAC3BC1E7A84EEE4808272F12AA63E3EF0706C6A89120B77CF7739930A3123C878CB4EF0
2,977,662 UART: [art] SIG.S = 9D5C4F4BB71AE2298C23ED317645257554E5FD47E4E98428A80B9507CD4CAC59EAC7B8D9896044A5B0D978ED941808AD
3,001,498 UART: Caliptra RT
3,001,843 UART: [state] CFI Enabled
3,109,648 UART: [rt] RT listening for mailbox commands...
3,110,311 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,139,904 UART: [rt]cmd =0x46504c54, len=4
3,141,082 >>> mbox cmd response data (8 bytes)
3,141,203 UART: [rt] FIPS self test
3,141,531 UART: [kat] ++
3,141,683 UART: [kat] sha1
3,145,791 UART: [kat] SHA2-256
3,147,813 UART: [kat] SHA2-384
3,150,750 UART: [kat] SHA2-512-ACC
3,151,328 UART: Fatal Error: 0x90050001
3,152,867 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,872 >>> mbox cmd response: failed
3,152,872 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,951 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,511 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
2,687,089 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,830,943 >>> mbox cmd response: failed
2,831,521 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,974,511 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
4,862,707 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,441,846 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
2,684,322 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,828,068 >>> mbox cmd response: failed
2,828,620 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,971,609 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
4,866,674 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,453,243 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,041,299 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,185,178 >>> mbox cmd response: failed
3,185,732 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,328,700 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
21,583,186 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,029,199 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,034,372 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,178,670 >>> mbox cmd response: failed
3,179,274 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,322,303 >>> mbox cmd response: failed
Initializing fuses
991 writing to cptra_bootfsm_go
21,581,006 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,025,817 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
2,697,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,841,786 >>> mbox cmd response: failed
2,842,346 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,985,750 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,442,629 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,267,813 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,697,171 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,841,500 >>> mbox cmd response: failed
2,842,067 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,985,465 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,439,787 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,257,336 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
3,059,931 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,204,248 >>> mbox cmd response: failed
3,204,837 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,348,112 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,166,506 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,911,319 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,404 writing to cptra_bootfsm_go
3,050,248 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,194,538 >>> mbox cmd response: failed
3,195,105 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,338,352 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
20,187,031 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,893,836 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
2,699,755 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,844,020 >>> mbox cmd response: failed
2,844,586 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,987,983 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,464,230 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,301,919 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
2,696,938 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,841,204 >>> mbox cmd response: failed
2,841,765 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,985,127 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,465,988 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,273,840 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,048,393 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,192,563 >>> mbox cmd response: failed
3,193,302 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,336,542 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
20,189,564 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,921,086 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,483 writing to cptra_bootfsm_go
3,055,344 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,199,658 >>> mbox cmd response: failed
3,200,226 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,344,176 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,176,292 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,904,757 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
810,082 >>> mbox cmd response: failed
810,082 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
810,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,373 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,113 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,420 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,428 >>> mbox cmd response: failed
809,428 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,675 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,207 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,553 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,561 >>> mbox cmd response: failed
809,561 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,424 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,648,044 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,185 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
810,193 >>> mbox cmd response: failed
810,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
810,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,998 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,574 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,850 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,858 >>> mbox cmd response: failed
809,858 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,979 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,377 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,818 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,826 >>> mbox cmd response: failed
809,826 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,993 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,995 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,433 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,441 >>> mbox cmd response: failed
809,441 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,500 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,346 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,777 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,785 >>> mbox cmd response: failed
809,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,791 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,692 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,390 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,774 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,782 >>> mbox cmd response: failed
809,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,709 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,961 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,832 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,840 >>> mbox cmd response: failed
809,840 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,381 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,709 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
809,595 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,603 >>> mbox cmd response: failed
809,603 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
809,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,458 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,336 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,321 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
810,329 >>> mbox cmd response: failed
810,329 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
810,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,722 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,564 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,114 UART:
192,488 UART: Running Caliptra ROM ...
193,667 UART:
193,821 UART: [state] CFI Enabled
268,073 UART: [state] LifecycleState = Unprovisioned
270,059 UART: [state] DebugLocked = No
272,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,780 UART: [kat] SHA2-256
447,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,947 UART: [kat] ++
458,484 UART: [kat] sha1
469,437 UART: [kat] SHA2-256
472,166 UART: [kat] SHA2-384
477,944 UART: [kat] SHA2-512-ACC
480,313 UART: [kat] ECC-384
2,767,790 UART: [kat] HMAC-384Kdf
2,777,759 UART: [kat] LMS
3,968,092 UART: [kat] --
3,971,972 UART: [cold-reset] ++
3,974,546 UART: [fht] Storing FHT @ 0x50003400
3,984,758 UART: [idev] ++
3,985,359 UART: [idev] CDI.KEYID = 6
3,986,250 UART: [idev] SUBJECT.KEYID = 7
3,987,600 UART: [idev] UDS.KEYID = 0
3,988,599 ready_for_fw is high
3,988,812 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,133,119 UART: [idev] Erasing UDS.KEYID = 0
7,327,504 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,765 UART: [idev] --
7,353,367 UART: [ldev] ++
7,353,939 UART: [ldev] CDI.KEYID = 6
7,354,904 UART: [ldev] SUBJECT.KEYID = 5
7,356,126 UART: [ldev] AUTHORITY.KEYID = 7
7,357,364 UART: [ldev] FE.KEYID = 1
7,400,747 UART: [ldev] Erasing FE.KEYID = 1
10,733,579 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,305 UART: [ldev] --
13,093,472 UART: [fwproc] Waiting for Commands...
13,096,492 UART: [fwproc] Received command 0x46574c44
13,098,681 UART: [fwproc] Received Image of size 114716 bytes
17,160,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,233,975 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,302,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,623,018 >>> mbox cmd response: success
17,627,294 UART: [afmc] ++
17,627,888 UART: [afmc] CDI.KEYID = 6
17,628,800 UART: [afmc] SUBJECT.KEYID = 7
17,630,077 UART: [afmc] AUTHORITY.KEYID = 5
21,004,678 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,305,175 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,307,442 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,321,872 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,336,692 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,351,118 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,373,787 UART: [afmc] --
23,377,539 UART: [cold-reset] --
23,380,964 UART: [state] Locking Datavault
23,386,261 UART: [state] Locking PCR0, PCR1 and PCR31
23,387,965 UART: [state] Locking ICCM
23,389,252 UART: [exit] Launching FMC @ 0x40000130
23,397,595 UART:
23,397,833 UART: Running Caliptra FMC ...
23,398,934 UART:
23,399,098 UART: [state] CFI Enabled
23,464,973 UART: [fht] FMC Alias Private Key: 7
25,802,460 UART: [art] Extend RT PCRs Done
25,803,682 UART: [art] Lock RT PCRs Done
25,805,659 UART: [art] Populate DV Done
25,811,183 UART: [fht] FMC Alias Private Key: 7
25,812,664 UART: [art] Derive CDI
25,813,428 UART: [art] Store in in slot 0x4
25,872,736 UART: [art] Derive Key Pair
25,873,739 UART: [art] Store priv key in slot 0x5
29,166,168 UART: [art] Derive Key Pair - Done
29,179,228 UART: [art] Signing Cert with AUTHO
29,180,542 UART: RITY.KEYID = 7
31,467,364 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,873 UART: [art] PUB.X = 5777031A2408F86FD67AEB34B38EAACD7D09B7BC5A9B7F03E8567394E56C302E685099A93DCBEC1E314562F5E6355256
31,476,074 UART: [art] PUB.Y = 8D4F8D42E55DCEA34BA2E6034FC6C9DC33707DF08D3A7060EF44424649766564949919910422C6AA52E8785DE9C808B3
31,483,303 UART: [art] SIG.R = 0AA54882EAC04C15D83E29B875CD1D1480FD5AE67ED685842BEE646206A44FE20B7F3A8D734FD0F330E0E19829D38A3A
31,490,710 UART: [art] SIG.S = 6488E6DA3476824174CADBB22C25B8751CC53743A9E22AE3915FCEAE30180B2F134FE1CE2C8C0A7A607CB6AD8B425BDB
32,795,795 UART: Caliptra RT
32,796,502 UART: [state] CFI Enabled
32,955,980 UART: [rt] RT listening for mailbox commands...
32,957,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,987,527 UART: [rt]cmd =0x46504c54, len=4
32,989,106 >>> mbox cmd response data (8 bytes)
32,990,131 UART: [rt] FIPS self test
32,991,086 UART: [kat] ++
32,991,545 UART: [kat] sha1
32,996,061 UART: [kat] SHA2-256
32,997,994 UART: [kat] SHA2-384
32,999,457 UART: Fatal Error: 0x90020001
33,034,652 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,178,791 >>> mbox cmd response: failed
33,179,424 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,323,473 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
190,087 UART:
190,379 UART: Running Caliptra ROM ...
191,488 UART:
191,643 UART: [state] CFI Enabled
255,214 UART: [state] LifecycleState = Unprovisioned
257,185 UART: [state] DebugLocked = No
259,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
264,640 UART: [kat] SHA2-256
434,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,820 UART: [kat] ++
445,403 UART: [kat] sha1
456,880 UART: [kat] SHA2-256
459,609 UART: [kat] SHA2-384
465,312 UART: [kat] SHA2-512-ACC
467,710 UART: [kat] ECC-384
2,757,384 UART: [kat] HMAC-384Kdf
2,789,729 UART: [kat] LMS
3,980,044 UART: [kat] --
3,985,309 UART: [cold-reset] ++
3,987,733 UART: [fht] Storing FHT @ 0x50003400
3,998,961 UART: [idev] ++
3,999,569 UART: [idev] CDI.KEYID = 6
4,000,485 UART: [idev] SUBJECT.KEYID = 7
4,001,764 UART: [idev] UDS.KEYID = 0
4,003,286 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,147,358 UART: [idev] Erasing UDS.KEYID = 0
7,332,371 UART: [idev] Using Sha1 for KeyId Algorithm
7,354,027 UART: [idev] --
7,357,798 UART: [ldev] ++
7,358,404 UART: [ldev] CDI.KEYID = 6
7,359,336 UART: [ldev] SUBJECT.KEYID = 5
7,360,555 UART: [ldev] AUTHORITY.KEYID = 7
7,361,807 UART: [ldev] FE.KEYID = 1
7,390,012 UART: [ldev] Erasing FE.KEYID = 1
10,721,604 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,015,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,029,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,044,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,059,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,079,412 UART: [ldev] --
13,083,326 UART: [fwproc] Waiting for Commands...
13,085,100 UART: [fwproc] Received command 0x46574c44
13,087,291 UART: [fwproc] Received Image of size 114716 bytes
17,145,333 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,221,686 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,290,550 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,609,656 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,784,655 ready_for_fw is high
3,785,091 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,892,988 >>> mbox cmd response: success
23,592,950 UART:
23,593,351 UART: Running Caliptra FMC ...
23,594,494 UART:
23,594,658 UART: [state] CFI Enabled
23,656,822 UART: [fht] FMC Alias Private Key: 7
25,994,734 UART: [art] Extend RT PCRs Done
25,995,961 UART: [art] Lock RT PCRs Done
25,997,852 UART: [art] Populate DV Done
26,002,949 UART: [fht] FMC Alias Private Key: 7
26,004,560 UART: [art] Derive CDI
26,005,325 UART: [art] Store in in slot 0x4
26,065,208 UART: [art] Derive Key Pair
26,066,279 UART: [art] Store priv key in slot 0x5
29,359,046 UART: [art] Derive Key Pair - Done
29,372,047 UART: [art] Signing Cert with AUTHO
29,373,352 UART: RITY.KEYID = 7
31,660,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,279 UART: [art] PUB.X = DCA227212B02A812B7519048A8C3B29B95B3C2FE2F350D63FE258A46A446B68516B1B12375C550CA74DC3A308403117E
31,669,542 UART: [art] PUB.Y = ED02655BFA1A1A3C599601410386BC707E8C319BA03C2BA04CA69BAEF4BEB0B1C3963076C5F8FF13EA6C75EF4CCA438C
31,676,785 UART: [art] SIG.R = 3F09EDEFDD31EAD4FB7F687D43B2B2616B2B9F948B96C5E13526E481E9794E6CFDA25E9114EAF44D80157D655654765F
31,684,177 UART: [art] SIG.S = D2C2B87FEE16B4A8F17CF8F4796AD417EC0BD16DA483C144263DC5335148468E8478001DCB3C47932D78C34210F7A0CA
32,988,899 UART: Caliptra RT
32,989,616 UART: [state] CFI Enabled
33,152,407 UART: [rt] RT listening for mailbox commands...
33,154,266 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,183,839 UART: [rt]cmd =0x46504c54, len=4
33,185,471 >>> mbox cmd response data (8 bytes)
33,186,953 UART: [rt] FIPS self test
33,187,899 UART: [kat] ++
33,188,346 UART: [kat] sha1
33,193,017 UART: [kat] SHA2-256
33,194,949 UART: [kat] SHA2-384
33,196,181 UART: Fatal Error: 0x90020001
33,231,571 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,375,558 >>> mbox cmd response: failed
33,376,182 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,520,189 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,793,442 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,851,120 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
49 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,538 UART:
192,910 UART: Running Caliptra ROM ...
194,107 UART:
603,797 UART: [state] CFI Enabled
619,957 UART: [state] LifecycleState = Unprovisioned
621,915 UART: [state] DebugLocked = No
624,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,801 UART: [kat] SHA2-256
799,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,126 UART: [kat] ++
810,606 UART: [kat] sha1
821,412 UART: [kat] SHA2-256
824,143 UART: [kat] SHA2-384
829,853 UART: [kat] SHA2-512-ACC
832,234 UART: [kat] ECC-384
3,117,106 UART: [kat] HMAC-384Kdf
3,128,524 UART: [kat] LMS
4,318,660 UART: [kat] --
4,321,308 UART: [cold-reset] ++
4,323,239 UART: [fht] Storing FHT @ 0x50003400
4,334,581 UART: [idev] ++
4,335,153 UART: [idev] CDI.KEYID = 6
4,336,136 UART: [idev] SUBJECT.KEYID = 7
4,337,314 UART: [idev] UDS.KEYID = 0
4,338,355 ready_for_fw is high
4,338,570 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,482,659 UART: [idev] Erasing UDS.KEYID = 0
7,622,273 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,881 UART: [idev] --
7,648,049 UART: [ldev] ++
7,648,636 UART: [ldev] CDI.KEYID = 6
7,649,604 UART: [ldev] SUBJECT.KEYID = 5
7,650,844 UART: [ldev] AUTHORITY.KEYID = 7
7,652,088 UART: [ldev] FE.KEYID = 1
7,662,578 UART: [ldev] Erasing FE.KEYID = 1
10,951,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,058 UART: [ldev] --
13,308,972 UART: [fwproc] Waiting for Commands...
13,311,555 UART: [fwproc] Received command 0x46574c44
13,313,742 UART: [fwproc] Received Image of size 114716 bytes
17,376,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,458,132 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,527,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,845,721 >>> mbox cmd response: success
17,850,412 UART: [afmc] ++
17,851,012 UART: [afmc] CDI.KEYID = 6
17,851,927 UART: [afmc] SUBJECT.KEYID = 7
17,853,198 UART: [afmc] AUTHORITY.KEYID = 5
21,167,517 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,463,793 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,466,071 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,480,448 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,495,271 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,509,708 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,532,602 UART: [afmc] --
23,537,062 UART: [cold-reset] --
23,542,005 UART: [state] Locking Datavault
23,549,154 UART: [state] Locking PCR0, PCR1 and PCR31
23,550,909 UART: [state] Locking ICCM
23,552,464 UART: [exit] Launching FMC @ 0x40000130
23,560,835 UART:
23,561,121 UART: Running Caliptra FMC ...
23,562,236 UART:
23,562,396 UART: [state] CFI Enabled
23,570,553 UART: [fht] FMC Alias Private Key: 7
25,901,181 UART: [art] Extend RT PCRs Done
25,902,406 UART: [art] Lock RT PCRs Done
25,903,818 UART: [art] Populate DV Done
25,909,070 UART: [fht] FMC Alias Private Key: 7
25,910,563 UART: [art] Derive CDI
25,911,325 UART: [art] Store in in slot 0x4
25,954,296 UART: [art] Derive Key Pair
25,955,301 UART: [art] Store priv key in slot 0x5
29,197,768 UART: [art] Derive Key Pair - Done
29,210,780 UART: [art] Signing Cert with AUTHO
29,212,092 UART: RITY.KEYID = 7
31,491,389 UART: [art] Erasing AUTHORITY.KEYID = 7
31,492,901 UART: [art] PUB.X = 454DBC8220C796C62589CFCBB5411A39455F30282430EB092A38092BA779B2A7372F39E6810719ED65AA6D84296B49AF
31,500,097 UART: [art] PUB.Y = 89DBB2C2EE080E3670CB9CC981BC63A62ADA76B6A4F59C0C92221937D03AD6F9FF59CB18857933B4C851BD14EE81336E
31,507,388 UART: [art] SIG.R = 845942A61F45963EAE88781BEA71132819E5CCEDCAA4D439F4DF28599928CC41E35B113C29D45F57E0EA91CF6CAC8067
31,514,723 UART: [art] SIG.S = 85BFB759DAE57C439853965E60D8F52F3F1BDE186176A6B55C73C1481C28F5AAA5AD09302E61A856052FDEF2A89BADB2
32,819,703 UART: Caliptra RT
32,820,429 UART: [state] CFI Enabled
32,938,108 UART: [rt] RT listening for mailbox commands...
32,939,971 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,969,771 UART: [rt]cmd =0x46504c54, len=4
32,971,461 >>> mbox cmd response data (8 bytes)
32,972,119 UART: [rt] FIPS self test
32,972,997 UART: [kat] ++
32,973,441 UART: [kat] sha1
32,977,851 UART: [kat] SHA2-256
32,979,790 UART: [kat] SHA2-384
32,980,781 UART: Fatal Error: 0x90020001
33,016,160 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,160,257 >>> mbox cmd response: failed
33,160,886 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,304,760 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
190,027 UART:
190,318 UART: Running Caliptra ROM ...
191,343 UART:
7,224,507 UART: [state] CFI Enabled
7,236,960 UART: [state] LifecycleState = Unprovisioned
7,238,873 UART: [state] DebugLocked = No
7,241,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,246,516 UART: [kat] SHA2-256
7,416,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,426,773 UART: [kat] ++
7,427,265 UART: [kat] sha1
7,437,558 UART: [kat] SHA2-256
7,440,256 UART: [kat] SHA2-384
7,445,923 UART: [kat] SHA2-512-ACC
7,448,272 UART: [kat] ECC-384
9,730,361 UART: [kat] HMAC-384Kdf
9,742,532 UART: [kat] LMS
10,932,643 UART: [kat] --
10,937,507 UART: [cold-reset] ++
10,939,980 UART: [fht] Storing FHT @ 0x50003400
10,951,945 UART: [idev] ++
10,952,508 UART: [idev] CDI.KEYID = 6
10,953,522 UART: [idev] SUBJECT.KEYID = 7
10,954,745 UART: [idev] UDS.KEYID = 0
10,956,269 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,100,291 UART: [idev] Erasing UDS.KEYID = 0
14,244,730 UART: [idev] Using Sha1 for KeyId Algorithm
14,266,062 UART: [idev] --
14,268,409 UART: [ldev] ++
14,269,052 UART: [ldev] CDI.KEYID = 6
14,269,962 UART: [ldev] SUBJECT.KEYID = 5
14,271,178 UART: [ldev] AUTHORITY.KEYID = 7
14,272,408 UART: [ldev] FE.KEYID = 1
14,284,403 UART: [ldev] Erasing FE.KEYID = 1
17,570,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,859,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,874,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,889,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,903,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,922,254 UART: [ldev] --
19,927,734 UART: [fwproc] Waiting for Commands...
19,929,686 UART: [fwproc] Received command 0x46574c44
19,932,034 UART: [fwproc] Received Image of size 114716 bytes
23,994,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,074,599 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,143,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,462,967 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,123,624 ready_for_fw is high
4,124,286 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,079,388 >>> mbox cmd response: success
23,714,177 UART:
23,714,564 UART: Running Caliptra FMC ...
23,715,737 UART:
23,715,897 UART: [state] CFI Enabled
23,723,737 UART: [fht] FMC Alias Private Key: 7
26,054,523 UART: [art] Extend RT PCRs Done
26,055,743 UART: [art] Lock RT PCRs Done
26,057,378 UART: [art] Populate DV Done
26,062,954 UART: [fht] FMC Alias Private Key: 7
26,064,443 UART: [art] Derive CDI
26,065,207 UART: [art] Store in in slot 0x4
26,107,908 UART: [art] Derive Key Pair
26,108,911 UART: [art] Store priv key in slot 0x5
29,351,084 UART: [art] Derive Key Pair - Done
29,364,089 UART: [art] Signing Cert with AUTHO
29,365,404 UART: RITY.KEYID = 7
31,644,751 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,259 UART: [art] PUB.X = 3106634F7E2CE8ECD218C0E081E7D076938D19C1DF7A17D7B2F7699B7EC5B89CF3C32A263FEF6998ECF29B32F99626B8
31,653,528 UART: [art] PUB.Y = FA9C00560F9280C60B4CDF444B95EDE8F080418956539A1E6D1A339EDEC1E86F4FCCF104A6F66B92B75D54B531BDCFE8
31,660,775 UART: [art] SIG.R = CA9C3CB39149E22AA5732F7B1DCF96151A6812FA11D0BC43B3F0F4D388254D422587ED477BB1E3FB1CF96D61AED27316
31,668,175 UART: [art] SIG.S = ED1062AFD72BAA7156D3F8B13219194849DC3029B5A0295EB28C09D98A58AC7CAA42E1AE8011970CA16E38FA87C1BB4A
32,973,388 UART: Caliptra RT
32,974,091 UART: [state] CFI Enabled
33,092,521 UART: [rt] RT listening for mailbox commands...
33,094,374 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,124,230 UART: [rt]cmd =0x46504c54, len=4
33,125,908 >>> mbox cmd response data (8 bytes)
33,127,060 UART: [rt] FIPS self test
33,128,007 UART: [kat] ++
33,128,463 UART: [kat] sha1
33,132,677 UART: [kat] SHA2-256
33,134,562 UART: [kat] SHA2-384
33,135,740 UART: Fatal Error: 0x90020001
33,171,483 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,315,532 >>> mbox cmd response: failed
33,316,143 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,460,138 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
10,591,742 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,542,554 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,187 UART:
192,567 UART: Running Caliptra ROM ...
193,770 UART:
193,929 UART: [state] CFI Enabled
266,614 UART: [state] LifecycleState = Unprovisioned
268,451 UART: [state] DebugLocked = No
271,197 UART: [state] WD Timer not started. Device not locked for debugging
275,101 UART: [kat] SHA2-256
454,247 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,791 UART: [kat] ++
466,325 UART: [kat] sha1
476,503 UART: [kat] SHA2-256
479,520 UART: [kat] SHA2-384
486,936 UART: [kat] SHA2-512-ACC
489,879 UART: [kat] ECC-384
2,949,126 UART: [kat] HMAC-384Kdf
2,974,491 UART: [kat] LMS
3,503,957 UART: [kat] --
3,509,013 UART: [cold-reset] ++
3,511,020 UART: [fht] FHT @ 0x50003400
3,521,011 UART: [idev] ++
3,521,576 UART: [idev] CDI.KEYID = 6
3,522,460 UART: [idev] SUBJECT.KEYID = 7
3,523,710 UART: [idev] UDS.KEYID = 0
3,524,659 ready_for_fw is high
3,524,896 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,669,657 UART: [idev] Erasing UDS.KEYID = 0
6,032,496 UART: [idev] Sha1 KeyId Algorithm
6,055,350 UART: [idev] --
6,059,677 UART: [ldev] ++
6,060,253 UART: [ldev] CDI.KEYID = 6
6,061,169 UART: [ldev] SUBJECT.KEYID = 5
6,062,352 UART: [ldev] AUTHORITY.KEYID = 7
6,063,594 UART: [ldev] FE.KEYID = 1
6,102,713 UART: [ldev] Erasing FE.KEYID = 1
8,608,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,445 UART: [ldev] --
10,418,658 UART: [fwproc] Wait for Commands...
10,421,719 UART: [fwproc] Recv command 0x46574c44
10,423,828 UART: [fwproc] Recv'd Img size: 115032 bytes
13,836,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,905,362 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,974,173 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,295,254 >>> mbox cmd response: success
14,299,747 UART: [afmc] ++
14,300,340 UART: [afmc] CDI.KEYID = 6
14,301,249 UART: [afmc] SUBJECT.KEYID = 7
14,302,407 UART: [afmc] AUTHORITY.KEYID = 5
16,827,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,558,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,559,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,575,767 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,591,757 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,607,602 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,630,792 UART: [afmc] --
18,635,037 UART: [cold-reset] --
18,638,522 UART: [state] Locking Datavault
18,642,091 UART: [state] Locking PCR0, PCR1 and PCR31
18,643,734 UART: [state] Locking ICCM
18,646,190 UART: [exit] Launching FMC @ 0x40000130
18,654,605 UART:
18,654,888 UART: Running Caliptra FMC ...
18,655,948 UART:
18,656,099 UART: [state] CFI Enabled
18,715,653 UART: [fht] FMC Alias Private Key: 7
20,479,388 UART: [art] Extend RT PCRs Done
20,480,614 UART: [art] Lock RT PCRs Done
20,482,317 UART: [art] Populate DV Done
20,487,733 UART: [fht] FMC Alias Private Key: 7
20,489,327 UART: [art] Derive CDI
20,490,144 UART: [art] Store in in slot 0x4
20,548,106 UART: [art] Derive Key Pair
20,549,155 UART: [art] Store priv key in slot 0x5
23,011,532 UART: [art] Derive Key Pair - Done
23,024,524 UART: [art] Signing Cert with AUTHO
23,025,833 UART: RITY.KEYID = 7
24,738,060 UART: [art] Erasing AUTHORITY.KEYID = 7
24,739,566 UART: [art] PUB.X = 5E05AD2653F8F6BAE3A5559AED1AFF9D00EBED0D62F2AA6F0A06E601884F3853DD94B775A480DBF257D0D338A6CD707B
24,746,846 UART: [art] PUB.Y = 1C2AA66C631C5107E46F877DAD862A76BFF42DCE2D591E02846E76BAD541DAF8AD9517F8676D03E74B2D62A6E41D7008
24,754,118 UART: [art] SIG.R = B9AD08EC73EFDBAC6F773C8FEEAFA509C89DC580F4E817D133338573727DF528E860D29583CE36F7BFE162EBEB668405
24,761,502 UART: [art] SIG.S = 58091EFDE8CC28BEC0FBCC3DBBB5597BA229490EDCF33AF67C916965CB1012452533ED7EEA5CE8755D1EFD80ADD409E0
25,740,406 UART: Caliptra RT
25,741,119 UART: [state] CFI Enabled
25,907,316 UART: [rt] RT listening for mailbox commands...
25,909,177 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,939,077 UART: [rt]cmd =0x46504c54, len=4
25,940,695 >>> mbox cmd response data (8 bytes)
25,942,149 UART: [rt] FIPS self test
25,943,091 UART: [kat] ++
25,943,545 UART: [kat] sha1
25,948,164 UART: [kat] SHA2-256
25,950,093 UART: [kat] SHA2-384
25,951,293 UART: Fatal Error: 0x90020001
25,986,504 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,131,048 >>> mbox cmd response: failed
26,131,690 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,276,114 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,046 UART:
190,335 UART: Running Caliptra ROM ...
191,358 UART:
191,499 UART: [state] CFI Enabled
251,609 UART: [state] LifecycleState = Unprovisioned
253,473 UART: [state] DebugLocked = No
255,469 UART: [state] WD Timer not started. Device not locked for debugging
259,360 UART: [kat] SHA2-256
438,485 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
450,045 UART: [kat] ++
450,493 UART: [kat] sha1
461,256 UART: [kat] SHA2-256
464,303 UART: [kat] SHA2-384
471,040 UART: [kat] SHA2-512-ACC
473,978 UART: [kat] ECC-384
2,936,038 UART: [kat] HMAC-384Kdf
2,958,866 UART: [kat] LMS
3,488,322 UART: [kat] --
3,493,090 UART: [cold-reset] ++
3,494,548 UART: [fht] FHT @ 0x50003400
3,505,589 UART: [idev] ++
3,506,193 UART: [idev] CDI.KEYID = 6
3,507,107 UART: [idev] SUBJECT.KEYID = 7
3,508,269 UART: [idev] UDS.KEYID = 0
3,509,783 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,654,377 UART: [idev] Erasing UDS.KEYID = 0
6,015,979 UART: [idev] Sha1 KeyId Algorithm
6,040,076 UART: [idev] --
6,044,455 UART: [ldev] ++
6,045,029 UART: [ldev] CDI.KEYID = 6
6,045,943 UART: [ldev] SUBJECT.KEYID = 5
6,047,106 UART: [ldev] AUTHORITY.KEYID = 7
6,048,344 UART: [ldev] FE.KEYID = 1
6,087,448 UART: [ldev] Erasing FE.KEYID = 1
8,592,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,874 UART: [ldev] --
10,399,697 UART: [fwproc] Wait for Commands...
10,401,494 UART: [fwproc] Recv command 0x46574c44
10,403,598 UART: [fwproc] Recv'd Img size: 115032 bytes
13,815,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,718 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,528 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,281,469 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
3,359,425 ready_for_fw is high
3,359,799 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,047,043 >>> mbox cmd response: success
18,325,230 UART:
18,325,640 UART: Running Caliptra FMC ...
18,326,762 UART:
18,326,922 UART: [state] CFI Enabled
18,392,264 UART: [fht] FMC Alias Private Key: 7
20,156,312 UART: [art] Extend RT PCRs Done
20,157,533 UART: [art] Lock RT PCRs Done
20,159,113 UART: [art] Populate DV Done
20,164,671 UART: [fht] FMC Alias Private Key: 7
20,166,330 UART: [art] Derive CDI
20,167,092 UART: [art] Store in in slot 0x4
20,224,794 UART: [art] Derive Key Pair
20,225,997 UART: [art] Store priv key in slot 0x5
22,688,986 UART: [art] Derive Key Pair - Done
22,702,151 UART: [art] Signing Cert with AUTHO
22,703,468 UART: RITY.KEYID = 7
24,413,996 UART: [art] Erasing AUTHORITY.KEYID = 7
24,415,502 UART: [art] PUB.X = 8FBCA7D0518B320373D5D1FDCBA8CC265B4AFC9AC4D71D3CC7E98E0199DAAAC9ACED88FA343ECFC4079502C57F1FE59A
24,422,824 UART: [art] PUB.Y = 4441CE378351DEF3352A929236A4526C758D463CE02EC3A928B522FA6D16E96834B3AFD78A18CDDF9D471C7E8AA8802B
24,430,103 UART: [art] SIG.R = 216D4A8192D364A6658E3F6D1FA4B4ECA591FF20794747712CCAE1D07CE881A3215CAAD1C8CD0E0BA000CFD8A2E3D418
24,437,443 UART: [art] SIG.S = 239A6F4CF19BC211DEF9AF3702AA8D474F7EC0F7342F732978D70B1B5CB61D86B3713269BC25206BE52954C6A5646D66
25,416,166 UART: Caliptra RT
25,416,869 UART: [state] CFI Enabled
25,582,373 UART: [rt] RT listening for mailbox commands...
25,584,246 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,613,781 UART: [rt]cmd =0x46504c54, len=4
25,615,199 >>> mbox cmd response data (8 bytes)
25,616,149 UART: [rt] FIPS self test
25,617,099 UART: [kat] ++
25,617,550 UART: [kat] sha1
25,621,984 UART: [kat] SHA2-256
25,623,918 UART: [kat] SHA2-384
25,625,053 UART: Fatal Error: 0x90020001
25,660,263 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,804,751 >>> mbox cmd response: failed
25,805,420 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,949,865 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,348,563 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,040,887 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
192,645 UART:
193,016 UART: Running Caliptra ROM ...
194,188 UART:
603,574 UART: [state] CFI Enabled
613,414 UART: [state] LifecycleState = Unprovisioned
615,211 UART: [state] DebugLocked = No
617,169 UART: [state] WD Timer not started. Device not locked for debugging
621,073 UART: [kat] SHA2-256
800,198 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
811,807 UART: [kat] ++
812,254 UART: [kat] sha1
824,405 UART: [kat] SHA2-256
827,423 UART: [kat] SHA2-384
835,121 UART: [kat] SHA2-512-ACC
838,131 UART: [kat] ECC-384
3,278,468 UART: [kat] HMAC-384Kdf
3,289,867 UART: [kat] LMS
3,819,355 UART: [kat] --
3,824,156 UART: [cold-reset] ++
3,825,150 UART: [fht] FHT @ 0x50003400
3,835,787 UART: [idev] ++
3,836,364 UART: [idev] CDI.KEYID = 6
3,837,274 UART: [idev] SUBJECT.KEYID = 7
3,838,452 UART: [idev] UDS.KEYID = 0
3,839,376 ready_for_fw is high
3,839,572 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,983,907 UART: [idev] Erasing UDS.KEYID = 0
6,311,237 UART: [idev] Sha1 KeyId Algorithm
6,333,617 UART: [idev] --
6,337,449 UART: [ldev] ++
6,338,024 UART: [ldev] CDI.KEYID = 6
6,338,933 UART: [ldev] SUBJECT.KEYID = 5
6,340,115 UART: [ldev] AUTHORITY.KEYID = 7
6,341,352 UART: [ldev] FE.KEYID = 1
6,352,932 UART: [ldev] Erasing FE.KEYID = 1
8,826,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,590,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,611,152 UART: [ldev] --
10,615,876 UART: [fwproc] Wait for Commands...
10,617,913 UART: [fwproc] Recv command 0x46574c44
10,619,950 UART: [fwproc] Recv'd Img size: 115032 bytes
14,037,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,111,134 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,179,942 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,501,165 >>> mbox cmd response: success
14,505,233 UART: [afmc] ++
14,505,824 UART: [afmc] CDI.KEYID = 6
14,506,736 UART: [afmc] SUBJECT.KEYID = 7
14,507,953 UART: [afmc] AUTHORITY.KEYID = 5
17,006,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,730,782 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,732,705 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,748,445 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,764,487 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,780,364 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,803,270 UART: [afmc] --
18,807,357 UART: [cold-reset] --
18,811,164 UART: [state] Locking Datavault
18,817,219 UART: [state] Locking PCR0, PCR1 and PCR31
18,818,859 UART: [state] Locking ICCM
18,820,174 UART: [exit] Launching FMC @ 0x40000130
18,828,635 UART:
18,828,868 UART: Running Caliptra FMC ...
18,829,893 UART:
18,830,039 UART: [state] CFI Enabled
18,837,871 UART: [fht] FMC Alias Private Key: 7
20,595,145 UART: [art] Extend RT PCRs Done
20,596,370 UART: [art] Lock RT PCRs Done
20,597,971 UART: [art] Populate DV Done
20,603,326 UART: [fht] FMC Alias Private Key: 7
20,604,810 UART: [art] Derive CDI
20,605,572 UART: [art] Store in in slot 0x4
20,648,105 UART: [art] Derive Key Pair
20,649,144 UART: [art] Store priv key in slot 0x5
23,076,086 UART: [art] Derive Key Pair - Done
23,089,420 UART: [art] Signing Cert with AUTHO
23,090,737 UART: RITY.KEYID = 7
24,796,219 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,722 UART: [art] PUB.X = C16B5F8671ABD3116E639DB62243603BFB11DD1F2D945895C2B1977998AF55151C6ECB408CE780D25E473ADFEC67A915
24,804,965 UART: [art] PUB.Y = CB7F7B8AFBA4A3A6467954D0140298EAF8CF6ADC4EFF3FAE4814EBF833B47FE6A8773BDAA46BE2F67B403A97F4C769F8
24,812,259 UART: [art] SIG.R = AF0AF1B997350B241DE9AF4205A04DC24517B896D05F212F0C02C3AA534CB5AF6BC289693E4E8D2947727E3C9CAA0238
24,819,649 UART: [art] SIG.S = 2E061E8B4DE11A09794457CB5A3AB6BCE74BD93C428474ABF6065ECAD81D61AE9F001698B9036DE4ACB4A717AF4EF0CD
25,798,509 UART: Caliptra RT
25,799,212 UART: [state] CFI Enabled
25,916,237 UART: [rt] RT listening for mailbox commands...
25,918,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,947,543 UART: [rt]cmd =0x46504c54, len=4
25,948,957 >>> mbox cmd response data (8 bytes)
25,950,233 UART: [rt] FIPS self test
25,951,182 UART: [kat] ++
25,951,675 UART: [kat] sha1
25,956,130 UART: [kat] SHA2-256
25,958,005 UART: [kat] SHA2-384
25,959,095 UART: Fatal Error: 0x90020001
25,994,490 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,138,879 >>> mbox cmd response: failed
26,139,520 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,283,959 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,084 UART:
190,373 UART: Running Caliptra ROM ...
191,402 UART:
14,253,491 UART: [state] CFI Enabled
14,268,779 UART: [state] LifecycleState = Unprovisioned
14,270,667 UART: [state] DebugLocked = No
14,273,199 UART: [state] WD Timer not started. Device not locked for debugging
14,277,427 UART: [kat] SHA2-256
14,456,514 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,468,113 UART: [kat] ++
14,468,660 UART: [kat] sha1
14,480,203 UART: [kat] SHA2-256
14,483,267 UART: [kat] SHA2-384
14,490,651 UART: [kat] SHA2-512-ACC
14,493,641 UART: [kat] ECC-384
16,936,215 UART: [kat] HMAC-384Kdf
16,947,898 UART: [kat] LMS
17,477,378 UART: [kat] --
17,482,201 UART: [cold-reset] ++
17,483,165 UART: [fht] FHT @ 0x50003400
17,494,468 UART: [idev] ++
17,495,095 UART: [idev] CDI.KEYID = 6
17,495,983 UART: [idev] SUBJECT.KEYID = 7
17,497,140 UART: [idev] UDS.KEYID = 0
17,498,681 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,643,222 UART: [idev] Erasing UDS.KEYID = 0
19,967,095 UART: [idev] Sha1 KeyId Algorithm
19,989,565 UART: [idev] --
19,994,744 UART: [ldev] ++
19,995,313 UART: [ldev] CDI.KEYID = 6
19,996,196 UART: [ldev] SUBJECT.KEYID = 5
19,997,410 UART: [ldev] AUTHORITY.KEYID = 7
19,998,698 UART: [ldev] FE.KEYID = 1
20,010,608 UART: [ldev] Erasing FE.KEYID = 1
22,485,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,204,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,220,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,236,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,252,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,273,277 UART: [ldev] --
24,277,363 UART: [fwproc] Wait for Commands...
24,279,152 UART: [fwproc] Recv command 0x46574c44
24,281,199 UART: [fwproc] Recv'd Img size: 115032 bytes
27,697,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,771,738 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,840,486 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,160,601 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
3,695,980 ready_for_fw is high
3,696,390 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,287,037 >>> mbox cmd response: success
18,531,030 UART:
18,531,436 UART: Running Caliptra FMC ...
18,532,654 UART:
18,532,822 UART: [state] CFI Enabled
18,540,501 UART: [fht] FMC Alias Private Key: 7
20,297,350 UART: [art] Extend RT PCRs Done
20,298,591 UART: [art] Lock RT PCRs Done
20,300,434 UART: [art] Populate DV Done
20,305,994 UART: [fht] FMC Alias Private Key: 7
20,307,493 UART: [art] Derive CDI
20,308,257 UART: [art] Store in in slot 0x4
20,350,539 UART: [art] Derive Key Pair
20,351,580 UART: [art] Store priv key in slot 0x5
22,778,002 UART: [art] Derive Key Pair - Done
22,791,063 UART: [art] Signing Cert with AUTHO
22,792,547 UART: RITY.KEYID = 7
24,497,490 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,981 UART: [art] PUB.X = 977B889247DAB697D62C8C53054E9635074C4F40F6E877C342FC64FDB9BA745CEF0F5471A9A442524497DFA252FBF69C
24,506,275 UART: [art] PUB.Y = 921492D7732917944E4B68CBC0B262B2FFC1836779C9C63B5B39D27B853219F100E271B8F2A72BCE54E3328BB308E617
24,513,515 UART: [art] SIG.R = 6A1AA1FB364C6BA42942D562AC33FFB31D1B01ED9D59E0174BA83292531AC7C7E60FBDC5624C8DCB49FAE3111E06A040
24,520,938 UART: [art] SIG.S = 69533A16E37D0A6470E3ED897F3BF9B8ECC0CDE65608B059E26686DA2CADE1FBD1BDC744B1E25D691878CBBA1746CB3D
25,499,779 UART: Caliptra RT
25,500,504 UART: [state] CFI Enabled
25,617,572 UART: [rt] RT listening for mailbox commands...
25,619,422 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,649,163 UART: [rt]cmd =0x46504c54, len=4
25,650,737 >>> mbox cmd response data (8 bytes)
25,651,996 UART: [rt] FIPS self test
25,652,935 UART: [kat] ++
25,653,388 UART: [kat] sha1
25,657,735 UART: [kat] SHA2-256
25,659,615 UART: [kat] SHA2-384
25,660,651 UART: Fatal Error: 0x90020001
25,696,033 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,840,519 >>> mbox cmd response: failed
25,841,197 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,985,496 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
17,645,342 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,235,993 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,478 UART:
192,847 UART: Running Caliptra ROM ...
194,032 UART:
194,188 UART: [state] CFI Enabled
262,967 UART: [state] LifecycleState = Unprovisioned
265,386 UART: [state] DebugLocked = No
267,094 UART: [state] WD Timer not started. Device not locked for debugging
272,221 UART: [kat] SHA2-256
462,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,906 UART: [kat] ++
473,437 UART: [kat] sha1
484,606 UART: [kat] SHA2-256
487,616 UART: [kat] SHA2-384
493,252 UART: [kat] SHA2-512-ACC
495,837 UART: [kat] ECC-384
2,948,596 UART: [kat] HMAC-384Kdf
2,973,190 UART: [kat] LMS
3,505,000 UART: [kat] --
3,508,028 UART: [cold-reset] ++
3,508,906 UART: [fht] FHT @ 0x50003400
3,519,884 UART: [idev] ++
3,520,592 UART: [idev] CDI.KEYID = 6
3,521,499 UART: [idev] SUBJECT.KEYID = 7
3,522,757 UART: [idev] UDS.KEYID = 0
3,523,675 ready_for_fw is high
3,523,896 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,668,680 UART: [idev] Erasing UDS.KEYID = 0
6,033,405 UART: [idev] Sha1 KeyId Algorithm
6,055,580 UART: [idev] --
6,060,857 UART: [ldev] ++
6,061,554 UART: [ldev] CDI.KEYID = 6
6,062,469 UART: [ldev] SUBJECT.KEYID = 5
6,063,629 UART: [ldev] AUTHORITY.KEYID = 7
6,064,861 UART: [ldev] FE.KEYID = 1
6,101,109 UART: [ldev] Erasing FE.KEYID = 1
8,605,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,045 UART: [ldev] --
10,416,886 UART: [fwproc] Wait for Commands...
10,418,495 UART: [fwproc] Recv command 0x46574c44
10,420,813 UART: [fwproc] Recv'd Img size: 115032 bytes
13,886,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,951 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,081,129 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,627,647 >>> mbox cmd response: success
14,631,928 UART: [afmc] ++
14,632,631 UART: [afmc] CDI.KEYID = 6
14,633,816 UART: [afmc] SUBJECT.KEYID = 7
14,635,301 UART: [afmc] AUTHORITY.KEYID = 5
17,173,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,898,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,900,226 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,915,392 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,930,554 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,945,587 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,969,163 UART: [afmc] --
18,972,060 UART: [cold-reset] --
18,975,065 UART: [state] Locking Datavault
18,981,236 UART: [state] Locking PCR0, PCR1 and PCR31
18,983,421 UART: [state] Locking ICCM
18,985,949 UART: [exit] Launching FMC @ 0x40000130
18,994,612 UART:
18,994,846 UART: Running Caliptra FMC ...
18,995,946 UART:
18,996,103 UART: [state] CFI Enabled
19,055,976 UART: [fht] FMC Alias Private Key: 7
20,820,115 UART: [art] Extend RT PCRs Done
20,821,353 UART: [art] Lock RT PCRs Done
20,823,089 UART: [art] Populate DV Done
20,828,666 UART: [fht] FMC Alias Private Key: 7
20,830,262 UART: [art] Derive CDI
20,831,087 UART: [art] Store in in slot 0x4
20,888,784 UART: [art] Derive Key Pair
20,889,826 UART: [art] Store priv key in slot 0x5
23,353,022 UART: [art] Derive Key Pair - Done
23,365,700 UART: [art] Signing Cert with AUTHO
23,366,999 UART: RITY.KEYID = 7
25,079,033 UART: [art] Erasing AUTHORITY.KEYID = 7
25,080,549 UART: [art] PUB.X = EFE3383951BC0863BAB36B5A1905A5A71CE124E26483C2A24F5DC13CE846BF94096B3786FBB5901E4980E497217C7FA4
25,087,781 UART: [art] PUB.Y = 189536D987B4BD748DD08CEA80FCCF7824DB637CE7E772E458DC52672204FEFA5312777238431659B0E55A95EE0E3401
25,095,024 UART: [art] SIG.R = 681298DF0F0B7E69A12DCAFF890E9A6B9390118D2DE51D5863519B98EA8AC42295D726DC9AB3506B2C2EE7FF7AE4143F
25,102,458 UART: [art] SIG.S = F3CBFC606FC8C7D49E847C0BAF5CD7E0A9EE68AC1F87670C53FEABE20DB112A4DBB30DEE67B3B3E51BB7513A486D0F4D
26,082,202 UART: Caliptra RT
26,082,936 UART: [state] CFI Enabled
26,248,752 UART: [rt] RT listening for mailbox commands...
26,250,608 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,280,249 UART: [rt]cmd =0x46504c54, len=4
26,281,938 >>> mbox cmd response data (8 bytes)
26,283,025 UART: [rt] FIPS self test
26,283,976 UART: [kat] ++
26,284,427 UART: [kat] sha1
26,288,885 UART: [kat] SHA2-256
26,290,810 UART: [kat] SHA2-384
26,292,163 UART: Fatal Error: 0x90020001
26,327,282 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,471,766 >>> mbox cmd response: failed
26,472,422 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,616,815 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,112 UART:
190,404 UART: Running Caliptra ROM ...
191,432 UART:
191,570 UART: [state] CFI Enabled
256,221 UART: [state] LifecycleState = Unprovisioned
258,635 UART: [state] DebugLocked = No
261,147 UART: [state] WD Timer not started. Device not locked for debugging
265,540 UART: [kat] SHA2-256
455,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,191 UART: [kat] ++
466,720 UART: [kat] sha1
478,189 UART: [kat] SHA2-256
481,234 UART: [kat] SHA2-384
487,432 UART: [kat] SHA2-512-ACC
490,054 UART: [kat] ECC-384
2,937,597 UART: [kat] HMAC-384Kdf
2,960,619 UART: [kat] LMS
3,492,429 UART: [kat] --
3,497,128 UART: [cold-reset] ++
3,499,381 UART: [fht] FHT @ 0x50003400
3,511,339 UART: [idev] ++
3,512,020 UART: [idev] CDI.KEYID = 6
3,513,039 UART: [idev] SUBJECT.KEYID = 7
3,514,330 UART: [idev] UDS.KEYID = 0
3,515,859 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,660,330 UART: [idev] Erasing UDS.KEYID = 0
6,016,430 UART: [idev] Sha1 KeyId Algorithm
6,037,942 UART: [idev] --
6,042,806 UART: [ldev] ++
6,043,498 UART: [ldev] CDI.KEYID = 6
6,044,411 UART: [ldev] SUBJECT.KEYID = 5
6,045,598 UART: [ldev] AUTHORITY.KEYID = 7
6,046,784 UART: [ldev] FE.KEYID = 1
6,089,954 UART: [ldev] Erasing FE.KEYID = 1
8,595,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,344,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,395,964 UART: [ldev] --
10,401,918 UART: [fwproc] Wait for Commands...
10,404,616 UART: [fwproc] Recv command 0x46574c44
10,406,935 UART: [fwproc] Recv'd Img size: 115032 bytes
13,871,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,340 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,066,458 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,612,979 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,417,374 ready_for_fw is high
3,417,904 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,714,836 >>> mbox cmd response: success
19,004,928 UART:
19,005,331 UART: Running Caliptra FMC ...
19,006,487 UART:
19,006,653 UART: [state] CFI Enabled
19,072,914 UART: [fht] FMC Alias Private Key: 7
20,836,547 UART: [art] Extend RT PCRs Done
20,837,764 UART: [art] Lock RT PCRs Done
20,839,284 UART: [art] Populate DV Done
20,844,755 UART: [fht] FMC Alias Private Key: 7
20,846,291 UART: [art] Derive CDI
20,847,103 UART: [art] Store in in slot 0x4
20,905,547 UART: [art] Derive Key Pair
20,906,585 UART: [art] Store priv key in slot 0x5
23,368,915 UART: [art] Derive Key Pair - Done
23,382,013 UART: [art] Signing Cert with AUTHO
23,383,310 UART: RITY.KEYID = 7
25,094,629 UART: [art] Erasing AUTHORITY.KEYID = 7
25,096,140 UART: [art] PUB.X = ED2F2E94D08981B87ACDDF1A5291D32207DB2AD7B2252CAB8CF0A172EB150227D7F2F6A542C445B97F4BD1E1BAA6A604
25,103,428 UART: [art] PUB.Y = 39A1655910B9DDC4D4BB17BD9F1B382B091B890721CDC454E445B1E145A2A28F61B39297A38BA9648D95C7B5F0C9730D
25,110,704 UART: [art] SIG.R = 6E100EB5FE06992B2AABC18EB389561183F591B4990BFF998F550EF0AF23B4C629F0F6DE53B3A7AE557B528C43D8E0F4
25,118,100 UART: [art] SIG.S = 62D52E01F1504538EDCFBB3F32C7E1D68EC2FFC8F1BFA4D3B87BAB96B4A3C6CBF66795FCDBE503ECC0372977431525EC
26,096,648 UART: Caliptra RT
26,097,339 UART: [state] CFI Enabled
26,261,495 UART: [rt] RT listening for mailbox commands...
26,263,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,292,972 UART: [rt]cmd =0x46504c54, len=4
26,294,500 >>> mbox cmd response data (8 bytes)
26,295,556 UART: [rt] FIPS self test
26,296,406 UART: [kat] ++
26,296,868 UART: [kat] sha1
26,301,585 UART: [kat] SHA2-256
26,303,463 UART: [kat] SHA2-384
26,304,655 UART: Fatal Error: 0x90020001
26,339,877 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,484,703 >>> mbox cmd response: failed
26,485,352 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,629,763 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,428,703 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,725,410 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
192,548 UART:
192,923 UART: Running Caliptra ROM ...
194,055 UART:
603,964 UART: [state] CFI Enabled
620,813 UART: [state] LifecycleState = Unprovisioned
623,192 UART: [state] DebugLocked = No
624,590 UART: [state] WD Timer not started. Device not locked for debugging
629,007 UART: [kat] SHA2-256
818,891 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,644 UART: [kat] ++
830,249 UART: [kat] sha1
840,424 UART: [kat] SHA2-256
843,439 UART: [kat] SHA2-384
849,858 UART: [kat] SHA2-512-ACC
852,393 UART: [kat] ECC-384
3,297,083 UART: [kat] HMAC-384Kdf
3,311,596 UART: [kat] LMS
3,843,384 UART: [kat] --
3,847,960 UART: [cold-reset] ++
3,849,829 UART: [fht] FHT @ 0x50003400
3,861,044 UART: [idev] ++
3,861,795 UART: [idev] CDI.KEYID = 6
3,862,687 UART: [idev] SUBJECT.KEYID = 7
3,863,938 UART: [idev] UDS.KEYID = 0
3,864,839 ready_for_fw is high
3,865,053 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,009,383 UART: [idev] Erasing UDS.KEYID = 0
6,339,401 UART: [idev] Sha1 KeyId Algorithm
6,360,261 UART: [idev] --
6,364,745 UART: [ldev] ++
6,365,444 UART: [ldev] CDI.KEYID = 6
6,366,352 UART: [ldev] SUBJECT.KEYID = 5
6,367,510 UART: [ldev] AUTHORITY.KEYID = 7
6,368,741 UART: [ldev] FE.KEYID = 1
6,377,714 UART: [ldev] Erasing FE.KEYID = 1
8,854,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,385 UART: [ldev] --
10,648,218 UART: [fwproc] Wait for Commands...
10,649,996 UART: [fwproc] Recv command 0x46574c44
10,652,254 UART: [fwproc] Recv'd Img size: 115032 bytes
14,106,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,184,142 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,300,291 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,847,316 >>> mbox cmd response: success
14,851,315 UART: [afmc] ++
14,852,013 UART: [afmc] CDI.KEYID = 6
14,853,182 UART: [afmc] SUBJECT.KEYID = 7
14,854,665 UART: [afmc] AUTHORITY.KEYID = 5
17,357,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,079,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,081,685 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,096,848 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,014 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,066 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,716 UART: [afmc] --
19,154,835 UART: [cold-reset] --
19,159,886 UART: [state] Locking Datavault
19,166,010 UART: [state] Locking PCR0, PCR1 and PCR31
19,168,168 UART: [state] Locking ICCM
19,170,641 UART: [exit] Launching FMC @ 0x40000130
19,179,308 UART:
19,179,543 UART: Running Caliptra FMC ...
19,180,644 UART:
19,180,800 UART: [state] CFI Enabled
19,188,524 UART: [fht] FMC Alias Private Key: 7
20,945,917 UART: [art] Extend RT PCRs Done
20,947,137 UART: [art] Lock RT PCRs Done
20,948,927 UART: [art] Populate DV Done
20,954,394 UART: [fht] FMC Alias Private Key: 7
20,955,986 UART: [art] Derive CDI
20,956,802 UART: [art] Store in in slot 0x4
20,999,351 UART: [art] Derive Key Pair
21,000,398 UART: [art] Store priv key in slot 0x5
23,427,445 UART: [art] Derive Key Pair - Done
23,440,454 UART: [art] Signing Cert with AUTHO
23,441,762 UART: RITY.KEYID = 7
25,147,423 UART: [art] Erasing AUTHORITY.KEYID = 7
25,148,941 UART: [art] PUB.X = 1CEE443ECB0BF6969F3BD4EEF2C4485A3EB6CA85484A7DEF01DA04DAC49DEB96F2E50A9F431D9004784929F7F139A2DA
25,156,274 UART: [art] PUB.Y = 57B0721E0FB4AD94452BBE65B7057B39D9FCC132934E9682719B4469EDD8132E04F30365AB591D0DD5B63665C832F803
25,163,495 UART: [art] SIG.R = 70A1952E4B5CFB18D7D09AF001D0F9AC4E4A70F08C8CB1BD8CFC017D60EB6D5CF655D5AFC680CCDD2ECEC142BC487653
25,170,925 UART: [art] SIG.S = 8A203F26C2FE05F1C51E2E17A81F0A582165851A1901BAEFB8096953F24A00F08D43C3670DDC89D84EFE3AFF476ED4DB
26,149,764 UART: Caliptra RT
26,150,451 UART: [state] CFI Enabled
26,266,234 UART: [rt] RT listening for mailbox commands...
26,268,086 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,297,825 UART: [rt]cmd =0x46504c54, len=4
26,299,563 >>> mbox cmd response data (8 bytes)
26,300,953 UART: [rt] FIPS self test
26,301,896 UART: [kat] ++
26,302,349 UART: [kat] sha1
26,306,854 UART: [kat] SHA2-256
26,308,739 UART: [kat] SHA2-384
26,309,809 UART: Fatal Error: 0x90020001
26,345,186 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,489,900 >>> mbox cmd response: failed
26,490,576 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,635,023 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,108 UART:
190,394 UART: Running Caliptra ROM ...
191,504 UART:
13,877,972 UART: [state] CFI Enabled
13,892,225 UART: [state] LifecycleState = Unprovisioned
13,894,579 UART: [state] DebugLocked = No
13,897,474 UART: [state] WD Timer not started. Device not locked for debugging
13,902,224 UART: [kat] SHA2-256
14,092,063 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,102,886 UART: [kat] ++
14,103,488 UART: [kat] sha1
14,114,921 UART: [kat] SHA2-256
14,117,990 UART: [kat] SHA2-384
14,122,410 UART: [kat] SHA2-512-ACC
14,125,027 UART: [kat] ECC-384
16,564,710 UART: [kat] HMAC-384Kdf
16,576,883 UART: [kat] LMS
17,108,704 UART: [kat] --
17,113,991 UART: [cold-reset] ++
17,115,812 UART: [fht] FHT @ 0x50003400
17,127,764 UART: [idev] ++
17,128,447 UART: [idev] CDI.KEYID = 6
17,129,411 UART: [idev] SUBJECT.KEYID = 7
17,130,586 UART: [idev] UDS.KEYID = 0
17,132,114 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,276,514 UART: [idev] Erasing UDS.KEYID = 0
19,607,210 UART: [idev] Sha1 KeyId Algorithm
19,630,283 UART: [idev] --
19,634,737 UART: [ldev] ++
19,635,427 UART: [ldev] CDI.KEYID = 6
19,636,313 UART: [ldev] SUBJECT.KEYID = 5
19,637,524 UART: [ldev] AUTHORITY.KEYID = 7
19,638,700 UART: [ldev] FE.KEYID = 1
19,651,721 UART: [ldev] Erasing FE.KEYID = 1
22,128,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,847,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,862,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,878,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,893,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,913,488 UART: [ldev] --
23,919,620 UART: [fwproc] Wait for Commands...
23,922,314 UART: [fwproc] Recv command 0x46574c44
23,924,637 UART: [fwproc] Recv'd Img size: 115032 bytes
27,376,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,451,528 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,567,667 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,113,431 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,758,026 ready_for_fw is high
3,758,654 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,970,733 >>> mbox cmd response: success
19,222,615 UART:
19,223,006 UART: Running Caliptra FMC ...
19,224,124 UART:
19,224,285 UART: [state] CFI Enabled
19,232,024 UART: [fht] FMC Alias Private Key: 7
20,988,939 UART: [art] Extend RT PCRs Done
20,990,157 UART: [art] Lock RT PCRs Done
20,991,939 UART: [art] Populate DV Done
20,997,255 UART: [fht] FMC Alias Private Key: 7
20,998,905 UART: [art] Derive CDI
20,999,721 UART: [art] Store in in slot 0x4
21,042,381 UART: [art] Derive Key Pair
21,043,388 UART: [art] Store priv key in slot 0x5
23,469,686 UART: [art] Derive Key Pair - Done
23,482,524 UART: [art] Signing Cert with AUTHO
23,483,833 UART: RITY.KEYID = 7
25,189,322 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,830 UART: [art] PUB.X = C43903576FE9C620E925152F9A4125AA6B6856DD51A8EF608504FFF5DA407706F8C58F9C73B6325D4717FDDF4E68BDA5
25,198,093 UART: [art] PUB.Y = D8A56ACA7D9933BCD1FE1918B4CA41B39557E62177848021633091641D9D47186D46FE7C4AE01B8BBB95DAA00EA5CC18
25,205,357 UART: [art] SIG.R = A64A7D1947D2A38C68DC20C1E086B75CBC0349E51FA0A2B76682CFCDF6743E8002D030BC0F5B137C0D49C00AB0BEDB4A
25,212,828 UART: [art] SIG.S = 1A0C7582A9F2156EFF74B4131FE2EF2AE616584F9D805650DFF2850C16CB6D66F1615E31096B3711917D16B5049795A8
26,192,055 UART: Caliptra RT
26,192,816 UART: [state] CFI Enabled
26,311,183 UART: [rt] RT listening for mailbox commands...
26,313,033 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,342,610 UART: [rt]cmd =0x46504c54, len=4
26,344,171 >>> mbox cmd response data (8 bytes)
26,345,131 UART: [rt] FIPS self test
26,346,077 UART: [kat] ++
26,346,536 UART: [kat] sha1
26,350,993 UART: [kat] SHA2-256
26,352,920 UART: [kat] SHA2-384
26,353,935 UART: Fatal Error: 0x90020001
26,389,170 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,533,634 >>> mbox cmd response: failed
26,534,279 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,678,682 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
16,999,707 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,202,099 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,719 UART: [kat] SHA2-256
881,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,765 UART: [kat] ++
885,917 UART: [kat] sha1
890,103 UART: [kat] SHA2-256
892,041 UART: [kat] SHA2-384
894,770 UART: [kat] SHA2-512-ACC
896,671 UART: [kat] ECC-384
902,120 UART: [kat] HMAC-384Kdf
906,712 UART: [kat] LMS
1,474,908 UART: [kat] --
1,475,663 UART: [cold-reset] ++
1,476,051 UART: [fht] Storing FHT @ 0x50003400
1,478,666 UART: [idev] ++
1,478,834 UART: [idev] CDI.KEYID = 6
1,479,194 UART: [idev] SUBJECT.KEYID = 7
1,479,618 UART: [idev] UDS.KEYID = 0
1,479,963 ready_for_fw is high
1,479,963 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,074 UART: [idev] Erasing UDS.KEYID = 0
1,504,646 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,384 UART: [idev] --
1,514,413 UART: [ldev] ++
1,514,581 UART: [ldev] CDI.KEYID = 6
1,514,944 UART: [ldev] SUBJECT.KEYID = 5
1,515,370 UART: [ldev] AUTHORITY.KEYID = 7
1,515,833 UART: [ldev] FE.KEYID = 1
1,521,035 UART: [ldev] Erasing FE.KEYID = 1
1,546,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,678 UART: [ldev] --
1,586,135 UART: [fwproc] Waiting for Commands...
1,586,820 UART: [fwproc] Received command 0x46574c44
1,587,611 UART: [fwproc] Received Image of size 115032 bytes
2,892,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,140 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,385 >>> mbox cmd response: success
3,087,535 UART: [afmc] ++
3,087,703 UART: [afmc] CDI.KEYID = 6
3,088,065 UART: [afmc] SUBJECT.KEYID = 7
3,088,490 UART: [afmc] AUTHORITY.KEYID = 5
3,123,551 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,773 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,553 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,281 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,166 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,856 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,733 UART: [afmc] --
3,166,759 UART: [cold-reset] --
3,167,807 UART: [state] Locking Datavault
3,169,096 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,700 UART: [state] Locking ICCM
3,170,182 UART: [exit] Launching FMC @ 0x40000130
3,175,511 UART:
3,175,527 UART: Running Caliptra FMC ...
3,175,935 UART:
3,175,989 UART: [state] CFI Enabled
3,186,818 UART: [fht] FMC Alias Private Key: 7
3,294,607 UART: [art] Extend RT PCRs Done
3,295,035 UART: [art] Lock RT PCRs Done
3,296,461 UART: [art] Populate DV Done
3,304,720 UART: [fht] FMC Alias Private Key: 7
3,305,866 UART: [art] Derive CDI
3,306,146 UART: [art] Store in in slot 0x4
3,391,909 UART: [art] Derive Key Pair
3,392,269 UART: [art] Store priv key in slot 0x5
3,405,655 UART: [art] Derive Key Pair - Done
3,420,424 UART: [art] Signing Cert with AUTHO
3,420,904 UART: RITY.KEYID = 7
3,436,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,871 UART: [art] PUB.X = C3615A5727675C12B725C96F53BD745D68EE4391F735CB4DCB89DF6881F9647BAF8AD1AA3EB8DA7A5881A4256C004580
3,443,625 UART: [art] PUB.Y = D6DE7F0F80ED27C7DE8B6F2364C2972EEBF49F565501A25488FE18EF1BEC340C1558E4BB6B88C46CF35C35F6C79E4BF1
3,450,584 UART: [art] SIG.R = 7F0B9214876E7EAC5493C9B34D2937EA1916331317A74725BE780747466DC9DBD30188A6FC927C53C4B5BDFC050E1653
3,457,337 UART: [art] SIG.S = EE8D5A7E3B34DA96D778B8B8952D6EFD8A939FD63B94EB1305C39434B5538726BCC181D9EC49E0B4788F6A370ECFDAFA
3,480,644 UART: Caliptra RT
3,480,897 UART: [state] CFI Enabled
3,590,066 UART: [rt] RT listening for mailbox commands...
3,590,729 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,602 UART: [rt]cmd =0x46504c54, len=4
3,621,826 >>> mbox cmd response data (8 bytes)
3,622,047 UART: [rt] FIPS self test
3,622,375 UART: [kat] ++
3,622,527 UART: [kat] sha1
3,626,735 UART: [kat] SHA2-256
3,628,757 UART: [kat] SHA2-384
3,629,827 UART: Fatal Error: 0x90020001
3,631,366 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,631,371 >>> mbox cmd response: failed
3,631,371 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,631,376 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,089 UART: [kat] SHA2-256
882,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,135 UART: [kat] ++
886,287 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,372 UART: [kat] SHA2-512-ACC
897,273 UART: [kat] ECC-384
902,848 UART: [kat] HMAC-384Kdf
907,584 UART: [kat] LMS
1,475,780 UART: [kat] --
1,476,645 UART: [cold-reset] ++
1,477,095 UART: [fht] Storing FHT @ 0x50003400
1,479,978 UART: [idev] ++
1,480,146 UART: [idev] CDI.KEYID = 6
1,480,506 UART: [idev] SUBJECT.KEYID = 7
1,480,930 UART: [idev] UDS.KEYID = 0
1,481,275 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,186 UART: [idev] Erasing UDS.KEYID = 0
1,506,112 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,700 UART: [idev] --
1,515,779 UART: [ldev] ++
1,515,947 UART: [ldev] CDI.KEYID = 6
1,516,310 UART: [ldev] SUBJECT.KEYID = 5
1,516,736 UART: [ldev] AUTHORITY.KEYID = 7
1,517,199 UART: [ldev] FE.KEYID = 1
1,522,405 UART: [ldev] Erasing FE.KEYID = 1
1,547,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,460 UART: [ldev] --
1,586,749 UART: [fwproc] Waiting for Commands...
1,587,602 UART: [fwproc] Received command 0x46574c44
1,588,393 UART: [fwproc] Received Image of size 115032 bytes
2,893,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,856 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,047 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,257 ready_for_fw is high
1,363,257 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,549 >>> mbox cmd response: success
2,999,083 UART:
2,999,099 UART: Running Caliptra FMC ...
2,999,507 UART:
2,999,561 UART: [state] CFI Enabled
3,010,244 UART: [fht] FMC Alias Private Key: 7
3,118,161 UART: [art] Extend RT PCRs Done
3,118,589 UART: [art] Lock RT PCRs Done
3,120,249 UART: [art] Populate DV Done
3,128,512 UART: [fht] FMC Alias Private Key: 7
3,129,600 UART: [art] Derive CDI
3,129,880 UART: [art] Store in in slot 0x4
3,215,703 UART: [art] Derive Key Pair
3,216,063 UART: [art] Store priv key in slot 0x5
3,228,353 UART: [art] Derive Key Pair - Done
3,243,207 UART: [art] Signing Cert with AUTHO
3,243,687 UART: RITY.KEYID = 7
3,258,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,550 UART: [art] PUB.X = E497E70A3BEC7AA62D3D5C0E8BACC1A902D6D02A5956830473E6583135FB07B7EAD235ED350BA31D36FBB817C787C3F2
3,266,316 UART: [art] PUB.Y = DDDB2C67704935AD6B7614ADFAE22A7B16C2C0D92B0239309FF4886E00639EFB7F970DFFA50DE1893088DB461E119545
3,273,243 UART: [art] SIG.R = 219D2BFD1ABD3F40FC6260F9E8F74E42997FC03509BAB73905CAD4BD0E92F0BDE6EDF29EB11E8E07A79527142714A1C3
3,280,017 UART: [art] SIG.S = 18BA7E54C410A83108C45E7AD63016B7CC7AF7041337B2D186DD7139230B00411105D9E09044F9D20462E6817AB64620
3,304,079 UART: Caliptra RT
3,304,332 UART: [state] CFI Enabled
3,413,174 UART: [rt] RT listening for mailbox commands...
3,413,837 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,968 UART: [rt]cmd =0x46504c54, len=4
3,445,230 >>> mbox cmd response data (8 bytes)
3,445,555 UART: [rt] FIPS self test
3,445,883 UART: [kat] ++
3,446,035 UART: [kat] sha1
3,450,183 UART: [kat] SHA2-256
3,452,205 UART: [kat] SHA2-384
3,453,007 UART: Fatal Error: 0x90020001
3,454,546 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,454,551 >>> mbox cmd response: failed
3,454,551 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,454,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,965 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,325 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,280 UART: [kat] SHA2-256
882,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,326 UART: [kat] ++
886,478 UART: [kat] sha1
890,836 UART: [kat] SHA2-256
892,774 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
903,193 UART: [kat] HMAC-384Kdf
907,881 UART: [kat] LMS
1,476,077 UART: [kat] --
1,477,012 UART: [cold-reset] ++
1,477,390 UART: [fht] Storing FHT @ 0x50003400
1,480,207 UART: [idev] ++
1,480,375 UART: [idev] CDI.KEYID = 6
1,480,735 UART: [idev] SUBJECT.KEYID = 7
1,481,159 UART: [idev] UDS.KEYID = 0
1,481,504 ready_for_fw is high
1,481,504 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,103 UART: [idev] Erasing UDS.KEYID = 0
1,505,353 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,929 UART: [idev] --
1,514,884 UART: [ldev] ++
1,515,052 UART: [ldev] CDI.KEYID = 6
1,515,415 UART: [ldev] SUBJECT.KEYID = 5
1,515,841 UART: [ldev] AUTHORITY.KEYID = 7
1,516,304 UART: [ldev] FE.KEYID = 1
1,521,312 UART: [ldev] Erasing FE.KEYID = 1
1,546,381 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,809 UART: [ldev] --
1,586,232 UART: [fwproc] Waiting for Commands...
1,586,873 UART: [fwproc] Received command 0x46574c44
1,587,664 UART: [fwproc] Received Image of size 115032 bytes
2,893,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,361 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,713 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,600 >>> mbox cmd response: success
3,088,794 UART: [afmc] ++
3,088,962 UART: [afmc] CDI.KEYID = 6
3,089,324 UART: [afmc] SUBJECT.KEYID = 7
3,089,749 UART: [afmc] AUTHORITY.KEYID = 5
3,124,832 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,540 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,320 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,048 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,933 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,623 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,508 UART: [afmc] --
3,168,452 UART: [cold-reset] --
3,169,272 UART: [state] Locking Datavault
3,170,671 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,275 UART: [state] Locking ICCM
3,171,779 UART: [exit] Launching FMC @ 0x40000130
3,177,108 UART:
3,177,124 UART: Running Caliptra FMC ...
3,177,532 UART:
3,177,675 UART: [state] CFI Enabled
3,188,354 UART: [fht] FMC Alias Private Key: 7
3,297,173 UART: [art] Extend RT PCRs Done
3,297,601 UART: [art] Lock RT PCRs Done
3,299,413 UART: [art] Populate DV Done
3,307,622 UART: [fht] FMC Alias Private Key: 7
3,308,556 UART: [art] Derive CDI
3,308,836 UART: [art] Store in in slot 0x4
3,394,679 UART: [art] Derive Key Pair
3,395,039 UART: [art] Store priv key in slot 0x5
3,408,419 UART: [art] Derive Key Pair - Done
3,423,098 UART: [art] Signing Cert with AUTHO
3,423,578 UART: RITY.KEYID = 7
3,438,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,637 UART: [art] PUB.X = 27502D070EB94A8C47942EB322068C7A79D3BD5B1C31BE40E710E7887D638F9216C94BB80003C22EACF9B1D5829F62D7
3,446,375 UART: [art] PUB.Y = 931BBA3311EF98A25D73915BEF2951E73DE527F4036DCD5CD3771AA8E0606969D8C621F63E849AB3E272CC5AECE1631B
3,453,332 UART: [art] SIG.R = 86D84F61FA555A35AA06D19E1AE274CB06FDA96C3C079092DA3F5E5B04BF4F89431A41A613F7DC896BA3301EADC87B9A
3,460,106 UART: [art] SIG.S = 9DA98543179B21CC5B1BED7CD2E342F3698796958EAC9E8CB8A9B52873748174F8D24691120CB831F3159C613BADAD95
3,483,492 UART: Caliptra RT
3,483,837 UART: [state] CFI Enabled
3,591,289 UART: [rt] RT listening for mailbox commands...
3,591,952 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,933 UART: [rt]cmd =0x46504c54, len=4
3,623,079 >>> mbox cmd response data (8 bytes)
3,623,300 UART: [rt] FIPS self test
3,623,628 UART: [kat] ++
3,623,780 UART: [kat] sha1
3,628,106 UART: [kat] SHA2-256
3,630,128 UART: [kat] SHA2-384
3,630,998 UART: Fatal Error: 0x90020001
3,632,537 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,632,542 >>> mbox cmd response: failed
3,632,542 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,632,547 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,904 UART: [kat] SHA2-256
881,835 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,950 UART: [kat] ++
886,102 UART: [kat] sha1
890,428 UART: [kat] SHA2-256
892,366 UART: [kat] SHA2-384
895,121 UART: [kat] SHA2-512-ACC
897,022 UART: [kat] ECC-384
902,787 UART: [kat] HMAC-384Kdf
907,395 UART: [kat] LMS
1,475,591 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,024 UART: [fht] Storing FHT @ 0x50003400
1,479,947 UART: [idev] ++
1,480,115 UART: [idev] CDI.KEYID = 6
1,480,475 UART: [idev] SUBJECT.KEYID = 7
1,480,899 UART: [idev] UDS.KEYID = 0
1,481,244 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,957 UART: [idev] Erasing UDS.KEYID = 0
1,506,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,635 UART: [idev] --
1,515,508 UART: [ldev] ++
1,515,676 UART: [ldev] CDI.KEYID = 6
1,516,039 UART: [ldev] SUBJECT.KEYID = 5
1,516,465 UART: [ldev] AUTHORITY.KEYID = 7
1,516,928 UART: [ldev] FE.KEYID = 1
1,522,244 UART: [ldev] Erasing FE.KEYID = 1
1,547,363 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,431 UART: [ldev] --
1,586,756 UART: [fwproc] Waiting for Commands...
1,587,395 UART: [fwproc] Received command 0x46574c44
1,588,186 UART: [fwproc] Received Image of size 115032 bytes
2,893,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,977 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,950,329 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,087,186 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 ready_for_fw is high
1,362,576 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,476 >>> mbox cmd response: success
2,997,630 UART:
2,997,646 UART: Running Caliptra FMC ...
2,998,054 UART:
2,998,197 UART: [state] CFI Enabled
3,008,872 UART: [fht] FMC Alias Private Key: 7
3,117,127 UART: [art] Extend RT PCRs Done
3,117,555 UART: [art] Lock RT PCRs Done
3,118,851 UART: [art] Populate DV Done
3,127,184 UART: [fht] FMC Alias Private Key: 7
3,128,140 UART: [art] Derive CDI
3,128,420 UART: [art] Store in in slot 0x4
3,214,025 UART: [art] Derive Key Pair
3,214,385 UART: [art] Store priv key in slot 0x5
3,227,691 UART: [art] Derive Key Pair - Done
3,242,577 UART: [art] Signing Cert with AUTHO
3,243,057 UART: RITY.KEYID = 7
3,257,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,258,504 UART: [art] PUB.X = 961698F476D6708CFB75C65FBC3685A807D5B109C3DEBE3C27656E6AF96DE6C1FF1E5BB42C73867616FB1A8E39E92087
3,265,276 UART: [art] PUB.Y = 39ED604E9457707FD19256ECF9472BDF59B8E59466CDFD4B60E60E941A533A5684E6C2A7D5B390B19AD2D33562D30CAB
3,272,228 UART: [art] SIG.R = 7E9578188BF883B83E343E2C86B9F7AACFBAE88506F9A6502EB6CB5C4A2DA6058775AB8853805F8B2BB62EB2AF56EF4A
3,279,008 UART: [art] SIG.S = F30EEA6005D4E7C700F7F949EF72DFBB3292B786C737B1A48E16F4B83B62BFD7668AC0F4E142015F3870E04801E50A2A
3,303,694 UART: Caliptra RT
3,304,039 UART: [state] CFI Enabled
3,412,760 UART: [rt] RT listening for mailbox commands...
3,413,423 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,443,432 UART: [rt]cmd =0x46504c54, len=4
3,444,638 >>> mbox cmd response data (8 bytes)
3,444,993 UART: [rt] FIPS self test
3,445,321 UART: [kat] ++
3,445,473 UART: [kat] sha1
3,449,611 UART: [kat] SHA2-256
3,451,633 UART: [kat] SHA2-384
3,452,455 UART: Fatal Error: 0x90020001
3,453,994 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,453,999 >>> mbox cmd response: failed
3,453,999 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,454,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,932 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,620 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
893,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,343 UART: [kat] ++
897,495 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,526 UART: [kat] HMAC-384Kdf
923,306 UART: [kat] LMS
1,171,634 UART: [kat] --
1,172,423 UART: [cold-reset] ++
1,172,777 UART: [fht] FHT @ 0x50003400
1,175,338 UART: [idev] ++
1,175,506 UART: [idev] CDI.KEYID = 6
1,175,866 UART: [idev] SUBJECT.KEYID = 7
1,176,290 UART: [idev] UDS.KEYID = 0
1,176,635 ready_for_fw is high
1,176,635 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,324 UART: [idev] Erasing UDS.KEYID = 0
1,200,945 UART: [idev] Sha1 KeyId Algorithm
1,209,427 UART: [idev] --
1,210,557 UART: [ldev] ++
1,210,725 UART: [ldev] CDI.KEYID = 6
1,211,088 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,205 UART: [ldev] Erasing FE.KEYID = 1
1,243,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,242 UART: [fwproc] Wait for Commands...
1,283,890 UART: [fwproc] Recv command 0x46574c44
1,284,618 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,867 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,171 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,958 >>> mbox cmd response: success
2,783,170 UART: [afmc] ++
2,783,338 UART: [afmc] CDI.KEYID = 6
2,783,700 UART: [afmc] SUBJECT.KEYID = 7
2,784,125 UART: [afmc] AUTHORITY.KEYID = 5
2,819,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,321 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,843,049 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,934 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,653 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,483 UART: [afmc] --
2,863,555 UART: [cold-reset] --
2,864,347 UART: [state] Locking Datavault
2,865,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,888 UART: [state] Locking ICCM
2,866,502 UART: [exit] Launching FMC @ 0x40000130
2,871,831 UART:
2,871,847 UART: Running Caliptra FMC ...
2,872,255 UART:
2,872,309 UART: [state] CFI Enabled
2,882,780 UART: [fht] FMC Alias Private Key: 7
2,990,011 UART: [art] Extend RT PCRs Done
2,990,439 UART: [art] Lock RT PCRs Done
2,992,127 UART: [art] Populate DV Done
3,000,370 UART: [fht] FMC Alias Private Key: 7
3,001,434 UART: [art] Derive CDI
3,001,714 UART: [art] Store in in slot 0x4
3,087,097 UART: [art] Derive Key Pair
3,087,457 UART: [art] Store priv key in slot 0x5
3,100,445 UART: [art] Derive Key Pair - Done
3,115,161 UART: [art] Signing Cert with AUTHO
3,115,641 UART: RITY.KEYID = 7
3,130,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,200 UART: [art] PUB.X = BAFDEE113E428BC2A2A72A1CD9D4303326118AA4A9238AF51F9B72CE2E08FBAC0E03C3E0EDE2D99E2B417D3A37E23CAD
3,137,987 UART: [art] PUB.Y = 1B77009EB5132F0042740150E46B78CDBB14FC6B4592AE45D56E648776C138065E4DAA635B0C3B5052C60DED5700C307
3,144,854 UART: [art] SIG.R = 2C98BCBEA86D046A56D452D0AD6BF9EE54CFC06B8770E5D05367B0CD383CC5AC36C919A80A92B50407C5291B8FE5E6A4
3,151,628 UART: [art] SIG.S = 24EF5F3B7B3A5E04CFD714D06E6259D04A57FFB5DCDF107D7B5DA28273500A575F020D3F4C3DF7E7E0299E25AB9D7BAB
3,175,409 UART: Caliptra RT
3,175,662 UART: [state] CFI Enabled
3,283,351 UART: [rt] RT listening for mailbox commands...
3,284,014 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,917 UART: [rt]cmd =0x46504c54, len=4
3,315,007 >>> mbox cmd response data (8 bytes)
3,315,134 UART: [rt] FIPS self test
3,315,462 UART: [kat] ++
3,315,614 UART: [kat] sha1
3,319,810 UART: [kat] SHA2-256
3,321,832 UART: [kat] SHA2-384
3,322,864 UART: Fatal Error: 0x90020001
3,324,403 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,408 >>> mbox cmd response: failed
3,324,408 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,324,413 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,357 UART: [state] WD Timer not started. Device not locked for debugging
87,710 UART: [kat] SHA2-256
893,360 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,485 UART: [kat] ++
897,637 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,692 UART: [kat] SHA2-512-ACC
908,593 UART: [kat] ECC-384
918,396 UART: [kat] HMAC-384Kdf
923,136 UART: [kat] LMS
1,171,464 UART: [kat] --
1,172,477 UART: [cold-reset] ++
1,173,019 UART: [fht] FHT @ 0x50003400
1,175,914 UART: [idev] ++
1,176,082 UART: [idev] CDI.KEYID = 6
1,176,442 UART: [idev] SUBJECT.KEYID = 7
1,176,866 UART: [idev] UDS.KEYID = 0
1,177,211 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,185,026 UART: [idev] Erasing UDS.KEYID = 0
1,201,541 UART: [idev] Sha1 KeyId Algorithm
1,210,187 UART: [idev] --
1,211,307 UART: [ldev] ++
1,211,475 UART: [ldev] CDI.KEYID = 6
1,211,838 UART: [ldev] SUBJECT.KEYID = 5
1,212,264 UART: [ldev] AUTHORITY.KEYID = 7
1,212,727 UART: [ldev] FE.KEYID = 1
1,218,105 UART: [ldev] Erasing FE.KEYID = 1
1,244,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,593 UART: [ldev] --
1,284,042 UART: [fwproc] Wait for Commands...
1,284,758 UART: [fwproc] Recv command 0x46574c44
1,285,486 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,815 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,119 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,882 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,465 ready_for_fw is high
1,059,465 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,849 >>> mbox cmd response: success
2,694,885 UART:
2,694,901 UART: Running Caliptra FMC ...
2,695,309 UART:
2,695,363 UART: [state] CFI Enabled
2,705,852 UART: [fht] FMC Alias Private Key: 7
2,813,773 UART: [art] Extend RT PCRs Done
2,814,201 UART: [art] Lock RT PCRs Done
2,815,817 UART: [art] Populate DV Done
2,823,890 UART: [fht] FMC Alias Private Key: 7
2,824,824 UART: [art] Derive CDI
2,825,104 UART: [art] Store in in slot 0x4
2,910,637 UART: [art] Derive Key Pair
2,910,997 UART: [art] Store priv key in slot 0x5
2,924,029 UART: [art] Derive Key Pair - Done
2,938,809 UART: [art] Signing Cert with AUTHO
2,939,289 UART: RITY.KEYID = 7
2,954,915 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,680 UART: [art] PUB.X = 706FA85E3F7EA585995A683D1318DB03AD57A4C8DA584C034CEDB8045779EB7323B06236527E227F86186A25FAA88653
2,962,439 UART: [art] PUB.Y = D2B91EA828BF186A90C50203FBF3F1C16F0D8B0E75DAA6E4437D38D6DFA589F4355A49DDB9416B683D2F26C81D62C4C5
2,969,391 UART: [art] SIG.R = 443BE8F317C26009F3E8218C9A74FAA8603E2F587643C7C9D546FB11480239B4533428A9FDECEBBF34E754FD914EBA5B
2,976,163 UART: [art] SIG.S = 89B5CFACADCC3F5D6ED7D3053892EAF6399C21CEC9C830C07A3B231C87A2580EE9EF3E0E1C7EB6B835857D1373EE1959
2,999,991 UART: Caliptra RT
3,000,244 UART: [state] CFI Enabled
3,107,339 UART: [rt] RT listening for mailbox commands...
3,108,002 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,137,623 UART: [rt]cmd =0x46504c54, len=4
3,138,689 >>> mbox cmd response data (8 bytes)
3,138,936 UART: [rt] FIPS self test
3,139,264 UART: [kat] ++
3,139,416 UART: [kat] sha1
3,143,672 UART: [kat] SHA2-256
3,145,694 UART: [kat] SHA2-384
3,146,428 UART: Fatal Error: 0x90020001
3,147,967 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,147,972 >>> mbox cmd response: failed
3,147,972 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,147,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,719 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,001 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,997 UART: [state] LifecycleState = Unprovisioned
86,652 UART: [state] DebugLocked = No
87,212 UART: [state] WD Timer not started. Device not locked for debugging
88,547 UART: [kat] SHA2-256
894,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,322 UART: [kat] ++
898,474 UART: [kat] sha1
902,594 UART: [kat] SHA2-256
904,534 UART: [kat] SHA2-384
907,161 UART: [kat] SHA2-512-ACC
909,062 UART: [kat] ECC-384
918,717 UART: [kat] HMAC-384Kdf
923,549 UART: [kat] LMS
1,171,877 UART: [kat] --
1,173,016 UART: [cold-reset] ++
1,173,412 UART: [fht] FHT @ 0x50003400
1,176,081 UART: [idev] ++
1,176,249 UART: [idev] CDI.KEYID = 6
1,176,609 UART: [idev] SUBJECT.KEYID = 7
1,177,033 UART: [idev] UDS.KEYID = 0
1,177,378 ready_for_fw is high
1,177,378 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,977 UART: [idev] Erasing UDS.KEYID = 0
1,201,982 UART: [idev] Sha1 KeyId Algorithm
1,210,328 UART: [idev] --
1,211,592 UART: [ldev] ++
1,211,760 UART: [ldev] CDI.KEYID = 6
1,212,123 UART: [ldev] SUBJECT.KEYID = 5
1,212,549 UART: [ldev] AUTHORITY.KEYID = 7
1,213,012 UART: [ldev] FE.KEYID = 1
1,218,492 UART: [ldev] Erasing FE.KEYID = 1
1,245,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,004 UART: [ldev] --
1,284,407 UART: [fwproc] Wait for Commands...
1,285,201 UART: [fwproc] Recv command 0x46574c44
1,285,929 UART: [fwproc] Recv'd Img size: 115032 bytes
2,591,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,480 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,784 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,703 >>> mbox cmd response: success
2,784,721 UART: [afmc] ++
2,784,889 UART: [afmc] CDI.KEYID = 6
2,785,251 UART: [afmc] SUBJECT.KEYID = 7
2,785,676 UART: [afmc] AUTHORITY.KEYID = 5
2,821,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,504 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,232 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,117 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,855,836 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,636 UART: [afmc] --
2,864,598 UART: [cold-reset] --
2,865,268 UART: [state] Locking Datavault
2,866,273 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,877 UART: [state] Locking ICCM
2,867,333 UART: [exit] Launching FMC @ 0x40000130
2,872,662 UART:
2,872,678 UART: Running Caliptra FMC ...
2,873,086 UART:
2,873,229 UART: [state] CFI Enabled
2,883,752 UART: [fht] FMC Alias Private Key: 7
2,992,053 UART: [art] Extend RT PCRs Done
2,992,481 UART: [art] Lock RT PCRs Done
2,994,183 UART: [art] Populate DV Done
3,002,368 UART: [fht] FMC Alias Private Key: 7
3,003,486 UART: [art] Derive CDI
3,003,766 UART: [art] Store in in slot 0x4
3,089,171 UART: [art] Derive Key Pair
3,089,531 UART: [art] Store priv key in slot 0x5
3,102,523 UART: [art] Derive Key Pair - Done
3,117,179 UART: [art] Signing Cert with AUTHO
3,117,659 UART: RITY.KEYID = 7
3,133,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,904 UART: [art] PUB.X = 33BADC4E5C7AC67D591F40F24E7CEDD36ACE03120E91183FD37DC6BEFDE03E3D60CFCA9F4E7A92B6B2FAB7B53A775FF4
3,140,700 UART: [art] PUB.Y = 8CBF066E9D02A9108C5F6D5A10303A3E2805FEF690A4BD76BC98ABDB91B06CEDC8B66670D51C2D0D0981F527896C4D43
3,147,647 UART: [art] SIG.R = 509234B5A2E389FC7A898FC2EAF6075E291692F2570AFE2C4F9BB66BE50A109F96DFB337255DC8918B9606F5B38C6BF8
3,154,413 UART: [art] SIG.S = 379798CDA89D5E9097C3491C0BB29203BF635F5821E2A16C7BA1C5180DA5868D5F11ABE3C62424FE007D2A6EFCA9C3CB
3,178,663 UART: Caliptra RT
3,179,008 UART: [state] CFI Enabled
3,287,199 UART: [rt] RT listening for mailbox commands...
3,287,862 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,565 UART: [rt]cmd =0x46504c54, len=4
3,318,829 >>> mbox cmd response data (8 bytes)
3,318,998 UART: [rt] FIPS self test
3,319,326 UART: [kat] ++
3,319,478 UART: [kat] sha1
3,323,764 UART: [kat] SHA2-256
3,325,786 UART: [kat] SHA2-384
3,326,700 UART: Fatal Error: 0x90020001
3,328,239 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,328,244 >>> mbox cmd response: failed
3,328,244 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,328,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,228 UART: [kat] SHA2-256
904,168 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,237 UART: [kat] LMS
1,171,565 UART: [kat] --
1,172,320 UART: [cold-reset] ++
1,172,648 UART: [fht] FHT @ 0x50003400
1,175,287 UART: [idev] ++
1,175,455 UART: [idev] CDI.KEYID = 6
1,175,815 UART: [idev] SUBJECT.KEYID = 7
1,176,239 UART: [idev] UDS.KEYID = 0
1,176,584 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,663 UART: [idev] Erasing UDS.KEYID = 0
1,200,812 UART: [idev] Sha1 KeyId Algorithm
1,209,232 UART: [idev] --
1,210,132 UART: [ldev] ++
1,210,300 UART: [ldev] CDI.KEYID = 6
1,210,663 UART: [ldev] SUBJECT.KEYID = 5
1,211,089 UART: [ldev] AUTHORITY.KEYID = 7
1,211,552 UART: [ldev] FE.KEYID = 1
1,217,168 UART: [ldev] Erasing FE.KEYID = 1
1,243,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,560 UART: [ldev] --
1,283,019 UART: [fwproc] Wait for Commands...
1,283,663 UART: [fwproc] Recv command 0x46574c44
1,284,391 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,790 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,094 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,031 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,586 ready_for_fw is high
1,060,586 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,484 >>> mbox cmd response: success
2,697,044 UART:
2,697,060 UART: Running Caliptra FMC ...
2,697,468 UART:
2,697,611 UART: [state] CFI Enabled
2,708,234 UART: [fht] FMC Alias Private Key: 7
2,816,757 UART: [art] Extend RT PCRs Done
2,817,185 UART: [art] Lock RT PCRs Done
2,818,459 UART: [art] Populate DV Done
2,826,696 UART: [fht] FMC Alias Private Key: 7
2,827,878 UART: [art] Derive CDI
2,828,158 UART: [art] Store in in slot 0x4
2,913,943 UART: [art] Derive Key Pair
2,914,303 UART: [art] Store priv key in slot 0x5
2,927,659 UART: [art] Derive Key Pair - Done
2,942,264 UART: [art] Signing Cert with AUTHO
2,942,744 UART: RITY.KEYID = 7
2,958,082 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,847 UART: [art] PUB.X = AECD44207A667B2844EFD47ED9EF300F650345EC922DF4F31523B47E319F01A71D1BFCBB03E4802E78EC59D7EAAC3F80
2,965,621 UART: [art] PUB.Y = 76882CBE6408B0E0A7ADC41317FAE2697F26BB1F0BB14808917D0722AF9214FBFBC2A4506B64C1700FF43C8204AA5D2B
2,972,563 UART: [art] SIG.R = 4DCF140164581E44BA937A2B3145348CCC56E09470F164294AC33B74BAE396A0B3BAE333F6C8A0AC32466471CFC86FEE
2,979,338 UART: [art] SIG.S = 935F70D4FCDC107E4DEB85F77C3F612F8B35568F7ED01ED96C1EE51D1895C2CE8DB75DF006B0D7C6AD608779DA454A4E
3,003,492 UART: Caliptra RT
3,003,837 UART: [state] CFI Enabled
3,111,586 UART: [rt] RT listening for mailbox commands...
3,112,249 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,142,178 UART: [rt]cmd =0x46504c54, len=4
3,143,134 >>> mbox cmd response data (8 bytes)
3,143,325 UART: [rt] FIPS self test
3,143,653 UART: [kat] ++
3,143,805 UART: [kat] sha1
3,148,017 UART: [kat] SHA2-256
3,150,039 UART: [kat] SHA2-384
3,150,783 UART: Fatal Error: 0x90020001
3,152,322 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,327 >>> mbox cmd response: failed
3,152,327 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,154 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,670 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,790 UART: [state] LifecycleState = Unprovisioned
86,445 UART: [state] DebugLocked = No
86,997 UART: [state] WD Timer not started. Device not locked for debugging
88,314 UART: [kat] SHA2-256
891,864 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,993 UART: [kat] ++
896,145 UART: [kat] sha1
900,363 UART: [kat] SHA2-256
902,303 UART: [kat] SHA2-384
905,054 UART: [kat] SHA2-512-ACC
906,955 UART: [kat] ECC-384
916,662 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,481 UART: [cold-reset] ++
1,171,037 UART: [fht] FHT @ 0x50003400
1,173,683 UART: [idev] ++
1,173,851 UART: [idev] CDI.KEYID = 6
1,174,212 UART: [idev] SUBJECT.KEYID = 7
1,174,637 UART: [idev] UDS.KEYID = 0
1,174,983 ready_for_fw is high
1,174,983 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,877 UART: [idev] Erasing UDS.KEYID = 0
1,199,343 UART: [idev] Sha1 KeyId Algorithm
1,208,353 UART: [idev] --
1,209,326 UART: [ldev] ++
1,209,494 UART: [ldev] CDI.KEYID = 6
1,209,858 UART: [ldev] SUBJECT.KEYID = 5
1,210,285 UART: [ldev] AUTHORITY.KEYID = 7
1,210,748 UART: [ldev] FE.KEYID = 1
1,215,938 UART: [ldev] Erasing FE.KEYID = 1
1,242,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,296 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,277 UART: [fwproc] Recv command 0x46574c44
1,283,010 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,455 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,764 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,606 >>> mbox cmd response: success
2,782,727 UART: [afmc] ++
2,782,895 UART: [afmc] CDI.KEYID = 6
2,783,258 UART: [afmc] SUBJECT.KEYID = 7
2,783,684 UART: [afmc] AUTHORITY.KEYID = 5
2,819,313 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,338 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,067 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,950 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,669 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,500 UART: [afmc] --
2,862,538 UART: [cold-reset] --
2,863,360 UART: [state] Locking Datavault
2,864,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,035 UART: [state] Locking ICCM
2,865,653 UART: [exit] Launching FMC @ 0x40000130
2,870,982 UART:
2,870,998 UART: Running Caliptra FMC ...
2,871,406 UART:
2,871,460 UART: [state] CFI Enabled
2,882,139 UART: [fht] FMC Alias Private Key: 7
2,990,172 UART: [art] Extend RT PCRs Done
2,990,600 UART: [art] Lock RT PCRs Done
2,992,362 UART: [art] Populate DV Done
3,000,727 UART: [fht] FMC Alias Private Key: 7
3,001,689 UART: [art] Derive CDI
3,001,969 UART: [art] Store in in slot 0x4
3,087,662 UART: [art] Derive Key Pair
3,088,022 UART: [art] Store priv key in slot 0x5
3,101,282 UART: [art] Derive Key Pair - Done
3,116,124 UART: [art] Signing Cert with AUTHO
3,116,604 UART: RITY.KEYID = 7
3,131,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,407 UART: [art] PUB.X = C927FD9EC8BEDC7E8A3383F0FE0A38AC976431891CB40020C387F7162242B64032E93EBCF21E10D886DF79AFDF43CF9D
3,139,166 UART: [art] PUB.Y = 6E71C4C9C669DD2B233A49CFCC671415A9F8B308B0BCD53803816AB7EA3899F61F055EBFE648D051F7058FF9A9198815
3,146,110 UART: [art] SIG.R = B118885297304463B06838B9BFE030787356BF63F153B7291FC10C19015890EAA37DD7AAA5C2A630A5B687758E252F8F
3,152,868 UART: [art] SIG.S = E43A087E6B91EDF4100D8B4078F447E52652D3B9C00C48A1E457B4962A7F6210CD404A397683A76C65C56764FE0DD5DB
3,177,251 UART: Caliptra RT
3,177,504 UART: [state] CFI Enabled
3,285,724 UART: [rt] RT listening for mailbox commands...
3,286,387 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,248 UART: [rt]cmd =0x46504c54, len=4
3,317,510 >>> mbox cmd response data (8 bytes)
3,317,831 UART: [rt] FIPS self test
3,318,159 UART: [kat] ++
3,318,311 UART: [kat] sha1
3,322,361 UART: [kat] SHA2-256
3,324,383 UART: [kat] SHA2-384
3,325,319 UART: Fatal Error: 0x90020001
3,326,858 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,326,863 >>> mbox cmd response: failed
3,326,863 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,326,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,348 UART: [kat] SHA2-256
890,898 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,027 UART: [kat] ++
895,179 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
915,736 UART: [kat] HMAC-384Kdf
920,446 UART: [kat] LMS
1,168,758 UART: [kat] --
1,169,869 UART: [cold-reset] ++
1,170,359 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,174,201 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,939 UART: [idev] Erasing UDS.KEYID = 0
1,198,479 UART: [idev] Sha1 KeyId Algorithm
1,207,141 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,215,046 UART: [ldev] Erasing FE.KEYID = 1
1,240,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,924 UART: [ldev] --
1,280,194 UART: [fwproc] Wait for Commands...
1,280,881 UART: [fwproc] Recv command 0x46574c44
1,281,614 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,472 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,394 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,488 ready_for_fw is high
1,056,488 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,150 >>> mbox cmd response: success
2,692,734 UART:
2,692,750 UART: Running Caliptra FMC ...
2,693,158 UART:
2,693,212 UART: [state] CFI Enabled
2,703,559 UART: [fht] FMC Alias Private Key: 7
2,811,038 UART: [art] Extend RT PCRs Done
2,811,466 UART: [art] Lock RT PCRs Done
2,812,688 UART: [art] Populate DV Done
2,820,751 UART: [fht] FMC Alias Private Key: 7
2,821,887 UART: [art] Derive CDI
2,822,167 UART: [art] Store in in slot 0x4
2,907,668 UART: [art] Derive Key Pair
2,908,028 UART: [art] Store priv key in slot 0x5
2,920,976 UART: [art] Derive Key Pair - Done
2,935,824 UART: [art] Signing Cert with AUTHO
2,936,304 UART: RITY.KEYID = 7
2,951,610 UART: [art] Erasing AUTHORITY.KEYID = 7
2,952,375 UART: [art] PUB.X = 21BAE130B9B1DC476D5C0248419019425E314AE6511745EA5282ED2D9853A974A3E5511C27169BDF7698C74CE923F111
2,959,136 UART: [art] PUB.Y = C7B8BB192637FDBD8C0E01A9BB50028E213DCC6535B3040E5BBD5475CE573F9C3C7B5233640A28C69F886BDA1D0D8479
2,966,075 UART: [art] SIG.R = 2926DABB400240B65212DC7FD7DD4B447DA0BB49B0018890D4C6A596F51377C44F2D0123F21A16889DF92B586BE66880
2,972,836 UART: [art] SIG.S = 7938CE569D136E1772727E0D3777E543A6FF30283E43371FBF0D6BC1C904AAC0641ABC0ADF41C575C0DAE6E6F86DF197
2,996,591 UART: Caliptra RT
2,996,844 UART: [state] CFI Enabled
3,104,941 UART: [rt] RT listening for mailbox commands...
3,105,604 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,135,261 UART: [rt]cmd =0x46504c54, len=4
3,136,497 >>> mbox cmd response data (8 bytes)
3,136,854 UART: [rt] FIPS self test
3,137,182 UART: [kat] ++
3,137,334 UART: [kat] sha1
3,141,492 UART: [kat] SHA2-256
3,143,514 UART: [kat] SHA2-384
3,144,470 UART: Fatal Error: 0x90020001
3,146,009 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,146,014 >>> mbox cmd response: failed
3,146,014 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,146,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,230 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,916 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,554 UART: [kat] ++
895,706 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
916,549 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,192 UART: [cold-reset] ++
1,170,610 UART: [fht] FHT @ 0x50003400
1,173,354 UART: [idev] ++
1,173,522 UART: [idev] CDI.KEYID = 6
1,173,883 UART: [idev] SUBJECT.KEYID = 7
1,174,308 UART: [idev] UDS.KEYID = 0
1,174,654 ready_for_fw is high
1,174,654 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,309 UART: [ldev] --
1,281,661 UART: [fwproc] Wait for Commands...
1,282,400 UART: [fwproc] Recv command 0x46574c44
1,283,133 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,288 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,597 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,549 >>> mbox cmd response: success
2,782,786 UART: [afmc] ++
2,782,954 UART: [afmc] CDI.KEYID = 6
2,783,317 UART: [afmc] SUBJECT.KEYID = 7
2,783,743 UART: [afmc] AUTHORITY.KEYID = 5
2,819,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,259 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,988 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,871 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,590 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,443 UART: [afmc] --
2,862,451 UART: [cold-reset] --
2,863,249 UART: [state] Locking Datavault
2,864,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,018 UART: [state] Locking ICCM
2,865,608 UART: [exit] Launching FMC @ 0x40000130
2,870,937 UART:
2,870,953 UART: Running Caliptra FMC ...
2,871,361 UART:
2,871,504 UART: [state] CFI Enabled
2,882,173 UART: [fht] FMC Alias Private Key: 7
2,990,386 UART: [art] Extend RT PCRs Done
2,990,814 UART: [art] Lock RT PCRs Done
2,992,774 UART: [art] Populate DV Done
3,001,005 UART: [fht] FMC Alias Private Key: 7
3,002,071 UART: [art] Derive CDI
3,002,351 UART: [art] Store in in slot 0x4
3,088,062 UART: [art] Derive Key Pair
3,088,422 UART: [art] Store priv key in slot 0x5
3,101,868 UART: [art] Derive Key Pair - Done
3,116,653 UART: [art] Signing Cert with AUTHO
3,117,133 UART: RITY.KEYID = 7
3,132,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,133,180 UART: [art] PUB.X = 39EDBF6910EE5C2561A596F872174514E85FCB0ACBBE3065E2964CF8219997C5664B0491211AEF51054FDA5829B1AD61
3,139,943 UART: [art] PUB.Y = 93C4881FCECBCC8742F13926C312CF2E031E2E0C72034237E4EF0712C89C51F79288CB763652F81D8AC7C1B3421ECC36
3,146,885 UART: [art] SIG.R = 842482E9CFF1096B2B841AF5E603B084FFA73D93E69804A1DD0C1F55D0D8AD3AD3F2B361698220382C38E29BFCF09B81
3,153,651 UART: [art] SIG.S = E38B74D69C3419CA3C2439567ADA251FD9C04C9B9E0F551CA13BEF0F75C68C6170395A2E3F7F11298A37F65E734FA125
3,178,064 UART: Caliptra RT
3,178,409 UART: [state] CFI Enabled
3,286,687 UART: [rt] RT listening for mailbox commands...
3,287,350 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,915 UART: [rt]cmd =0x46504c54, len=4
3,318,285 >>> mbox cmd response data (8 bytes)
3,318,446 UART: [rt] FIPS self test
3,318,774 UART: [kat] ++
3,318,926 UART: [kat] sha1
3,323,172 UART: [kat] SHA2-256
3,325,194 UART: [kat] SHA2-384
3,325,860 UART: Fatal Error: 0x90020001
3,327,399 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,404 >>> mbox cmd response: failed
3,327,404 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,327,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,793 UART: [kat] SHA2-256
891,343 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,920 UART: [kat] SHA2-256
901,860 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
920,949 UART: [kat] LMS
1,169,261 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,678 UART: [fht] FHT @ 0x50003400
1,173,202 UART: [idev] ++
1,173,370 UART: [idev] CDI.KEYID = 6
1,173,731 UART: [idev] SUBJECT.KEYID = 7
1,174,156 UART: [idev] UDS.KEYID = 0
1,174,502 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,202 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,282,163 UART: [fwproc] Wait for Commands...
1,282,852 UART: [fwproc] Recv command 0x46574c44
1,283,585 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,776 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,085 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,831 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,131 ready_for_fw is high
1,057,131 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,467 >>> mbox cmd response: success
2,694,543 UART:
2,694,559 UART: Running Caliptra FMC ...
2,694,967 UART:
2,695,110 UART: [state] CFI Enabled
2,705,667 UART: [fht] FMC Alias Private Key: 7
2,813,588 UART: [art] Extend RT PCRs Done
2,814,016 UART: [art] Lock RT PCRs Done
2,815,752 UART: [art] Populate DV Done
2,823,949 UART: [fht] FMC Alias Private Key: 7
2,824,967 UART: [art] Derive CDI
2,825,247 UART: [art] Store in in slot 0x4
2,910,964 UART: [art] Derive Key Pair
2,911,324 UART: [art] Store priv key in slot 0x5
2,924,710 UART: [art] Derive Key Pair - Done
2,939,752 UART: [art] Signing Cert with AUTHO
2,940,232 UART: RITY.KEYID = 7
2,955,156 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,921 UART: [art] PUB.X = BA27F9369E5AC2930873DAF86A7E0D894AD6DDDDBA76E53045BA7719967836018AC97D34AD597477785EE015685D55C4
2,962,684 UART: [art] PUB.Y = 041432D59DDE41A75E2030C902CC82B71629D58796D3288A48FF75D7EB04E4D9135AED158D9D73DC4F1490D9B4785A1B
2,969,627 UART: [art] SIG.R = B28F660FCC3C52131B64896F7FE66E75785C201E2B4D6900A4AE77D717599D9A0FC53C867D5C404E6DD29C0E9EC05D0B
2,976,371 UART: [art] SIG.S = A8181497A827D37B70861CF6533B5C0F811614409FDDA3EDCFAB31D54EC884D316875703422864D124ABB1FA95F82F51
3,000,034 UART: Caliptra RT
3,000,379 UART: [state] CFI Enabled
3,108,165 UART: [rt] RT listening for mailbox commands...
3,108,828 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,285 UART: [rt]cmd =0x46504c54, len=4
3,139,385 >>> mbox cmd response data (8 bytes)
3,139,648 UART: [rt] FIPS self test
3,139,976 UART: [kat] ++
3,140,128 UART: [kat] sha1
3,144,362 UART: [kat] SHA2-256
3,146,384 UART: [kat] SHA2-384
3,147,550 UART: Fatal Error: 0x90020001
3,149,089 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,094 >>> mbox cmd response: failed
3,149,094 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,149,099 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,603 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,081 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
2,685,242 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,829,791 >>> mbox cmd response: failed
2,830,375 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,973,380 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
4,868,074 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,423,746 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,687,929 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,831,795 >>> mbox cmd response: failed
2,832,367 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
2,975,386 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
4,865,937 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,442,528 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
3,038,996 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,182,908 >>> mbox cmd response: failed
3,183,469 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,326,983 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
21,586,439 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,019,189 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "cf18bc62a3da86f62cf36df485dbcda3f5bb27febdf7546734f5c49a9bd271f17c27be3f272932d0350d2ff2282324fd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,036,045 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,180,118 >>> mbox cmd response: failed
3,180,687 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
3,323,707 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
21,574,218 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
35,009,465 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
2,698,507 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,843,469 >>> mbox cmd response: failed
2,844,043 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,987,334 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,435,417 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,256,574 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
2,689,669 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,833,957 >>> mbox cmd response: failed
2,834,528 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,977,923 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,450,768 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,618 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
3,057,763 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,202,014 >>> mbox cmd response: failed
3,202,588 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,345,968 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
20,165,252 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,886,599 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,043,037 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,187,363 >>> mbox cmd response: failed
3,187,939 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,331,340 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
20,164,836 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,890,901 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
2,698,200 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,842,498 >>> mbox cmd response: failed
2,843,090 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,986,489 >>> mbox cmd response: failed
Initializing fuses
985 writing to cptra_bootfsm_go
3,457,796 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,276,094 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,706,089 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,850,359 >>> mbox cmd response: failed
2,850,926 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,994,161 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,439,137 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,266,652 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
3,066,254 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,210,518 >>> mbox cmd response: failed
3,211,081 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,354,461 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,164,892 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,890,814 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "8a96c60960929cbe455d6b9be6fe80cf4e3c5bd31f626f540a4b887ae888bc20fa39ccfae301fae053be5171eb8cd4fa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,058,827 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,202,959 >>> mbox cmd response: failed
3,203,509 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,346,893 >>> mbox cmd response: failed
Initializing fuses
982 writing to cptra_bootfsm_go
20,172,896 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
30,914,118 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,771 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,779 >>> mbox cmd response: failed
811,779 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,785 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,569 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,333 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,645 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,653 >>> mbox cmd response: failed
811,653 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,603 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,599 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,180 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,188 >>> mbox cmd response: failed
812,188 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,100 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,896 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,628 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,636 >>> mbox cmd response: failed
811,636 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,642 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,596 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,060 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,185 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,193 >>> mbox cmd response: failed
811,193 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,143 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,113 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,871 >>> mbox cmd response: failed
811,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,799 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,117 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,066 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,074 >>> mbox cmd response: failed
812,074 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,340 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,782 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,078 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,086 >>> mbox cmd response: failed
812,086 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
812,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,002 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,528 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,211 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,219 >>> mbox cmd response: failed
811,219 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,225 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,233 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,643,935 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,683 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,691 >>> mbox cmd response: failed
811,691 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,697 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,437 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,645,157 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,932 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,940 >>> mbox cmd response: failed
811,940 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,077,986 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,146 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
811,764 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,772 >>> mbox cmd response: failed
811,772 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
811,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c93bc9da5d510a8e58832d03906dbee3707bc5f1602336ef4c27d816fa2bfebe6d61b8491ffeca510032b77ac7bb3d5a",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,078,582 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,644,830 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
192,022 UART:
192,391 UART: Running Caliptra ROM ...
193,486 UART:
193,633 UART: [state] CFI Enabled
264,848 UART: [state] LifecycleState = Unprovisioned
266,845 UART: [state] DebugLocked = No
268,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,670 UART: [kat] SHA2-256
443,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,885 UART: [kat] ++
454,356 UART: [kat] sha1
466,015 UART: [kat] SHA2-256
468,681 UART: [kat] SHA2-384
473,112 UART: [kat] SHA2-512-ACC
475,483 UART: [kat] ECC-384
2,769,266 UART: [kat] HMAC-384Kdf
2,780,372 UART: [kat] LMS
3,970,678 UART: [kat] --
3,974,200 UART: [cold-reset] ++
3,975,140 UART: [fht] Storing FHT @ 0x50003400
3,986,573 UART: [idev] ++
3,987,141 UART: [idev] CDI.KEYID = 6
3,988,022 UART: [idev] SUBJECT.KEYID = 7
3,989,273 UART: [idev] UDS.KEYID = 0
3,990,241 ready_for_fw is high
3,990,435 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,134,768 UART: [idev] Erasing UDS.KEYID = 0
7,329,366 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,479 UART: [idev] --
7,354,468 UART: [ldev] ++
7,355,039 UART: [ldev] CDI.KEYID = 6
7,355,976 UART: [ldev] SUBJECT.KEYID = 5
7,357,186 UART: [ldev] AUTHORITY.KEYID = 7
7,358,474 UART: [ldev] FE.KEYID = 1
7,404,074 UART: [ldev] Erasing FE.KEYID = 1
10,735,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,047,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,062,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,095,475 UART: [ldev] --
13,099,993 UART: [fwproc] Waiting for Commands...
13,103,027 UART: [fwproc] Received command 0x46574c44
13,105,219 UART: [fwproc] Received Image of size 114716 bytes
17,165,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,701 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,311,594 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,630,766 >>> mbox cmd response: success
17,635,319 UART: [afmc] ++
17,635,911 UART: [afmc] CDI.KEYID = 6
17,636,848 UART: [afmc] SUBJECT.KEYID = 7
17,638,117 UART: [afmc] AUTHORITY.KEYID = 5
20,987,514 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,291,300 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,293,612 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,308,016 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,322,839 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,337,297 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,360,065 UART: [afmc] --
23,363,723 UART: [cold-reset] --
23,369,103 UART: [state] Locking Datavault
23,373,971 UART: [state] Locking PCR0, PCR1 and PCR31
23,375,723 UART: [state] Locking ICCM
23,377,197 UART: [exit] Launching FMC @ 0x40000130
23,385,535 UART:
23,385,774 UART: Running Caliptra FMC ...
23,386,800 UART:
23,386,946 UART: [state] CFI Enabled
23,452,822 UART: [fht] FMC Alias Private Key: 7
25,790,465 UART: [art] Extend RT PCRs Done
25,791,684 UART: [art] Lock RT PCRs Done
25,792,959 UART: [art] Populate DV Done
25,798,330 UART: [fht] FMC Alias Private Key: 7
25,799,810 UART: [art] Derive CDI
25,800,565 UART: [art] Store in in slot 0x4
25,861,774 UART: [art] Derive Key Pair
25,862,816 UART: [art] Store priv key in slot 0x5
29,155,379 UART: [art] Derive Key Pair - Done
29,168,373 UART: [art] Signing Cert with AUTHO
29,169,707 UART: RITY.KEYID = 7
31,456,624 UART: [art] Erasing AUTHORITY.KEYID = 7
31,458,136 UART: [art] PUB.X = DFD81F12281E32B3C30BFC03EFF86DC803574D14C84CEFC297B54F80226EFC922E005FEA58699645C57052DFC8D34871
31,465,385 UART: [art] PUB.Y = 6D71434019D56C027D8D0121F4B93337F547725A493A0E023E638B6C667804EEC066C83EF59E5EF49EA24DEDF54A3707
31,472,617 UART: [art] SIG.R = 0387779038689C8807512A159D407D228182928BED64F151668D84475B0C0E31952DA5F3753D8A372B8F945E4510C96D
31,479,964 UART: [art] SIG.S = 1D675B62CD73616EC500518C442D4833137D898AFA27D2F39941B57FEBDAFBEEAA5C1ADA40E1F8067D1E665A3CC39E32
32,784,948 UART: Caliptra RT
32,785,648 UART: [state] CFI Enabled
32,945,950 UART: [rt] RT listening for mailbox commands...
32,947,802 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,977,368 UART: [rt]cmd =0x46504c54, len=4
32,978,912 >>> mbox cmd response data (8 bytes)
32,980,142 UART: [rt] FIPS self test
32,981,087 UART: [kat] ++
32,981,542 UART: [kat] sha1
32,985,892 UART: [kat] SHA2-256
32,987,820 UART: [kat] SHA2-384
32,989,972 UART: Fatal Error: 0x90020002
33,025,362 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,169,836 >>> mbox cmd response: failed
33,170,472 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,314,386 >>> mbox cmd response: failed
Initializing fuses
931 writing to cptra_bootfsm_go
190,063 UART:
190,358 UART: Running Caliptra ROM ...
191,472 UART:
191,646 UART: [state] CFI Enabled
255,541 UART: [state] LifecycleState = Unprovisioned
257,506 UART: [state] DebugLocked = No
259,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
264,591 UART: [kat] SHA2-256
434,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
444,827 UART: [kat] ++
445,272 UART: [kat] sha1
456,366 UART: [kat] SHA2-256
459,061 UART: [kat] SHA2-384
464,235 UART: [kat] SHA2-512-ACC
466,629 UART: [kat] ECC-384
2,755,711 UART: [kat] HMAC-384Kdf
2,788,089 UART: [kat] LMS
3,978,409 UART: [kat] --
3,983,387 UART: [cold-reset] ++
3,984,423 UART: [fht] Storing FHT @ 0x50003400
3,995,972 UART: [idev] ++
3,996,545 UART: [idev] CDI.KEYID = 6
3,997,483 UART: [idev] SUBJECT.KEYID = 7
3,998,750 UART: [idev] UDS.KEYID = 0
4,000,237 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,144,541 UART: [idev] Erasing UDS.KEYID = 0
7,336,054 UART: [idev] Using Sha1 for KeyId Algorithm
7,359,283 UART: [idev] --
7,363,768 UART: [ldev] ++
7,364,393 UART: [ldev] CDI.KEYID = 6
7,365,302 UART: [ldev] SUBJECT.KEYID = 5
7,366,522 UART: [ldev] AUTHORITY.KEYID = 7
7,367,812 UART: [ldev] FE.KEYID = 1
7,411,781 UART: [ldev] Erasing FE.KEYID = 1
10,746,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,071,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,086,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,100,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,120,634 UART: [ldev] --
13,125,199 UART: [fwproc] Waiting for Commands...
13,127,841 UART: [fwproc] Received command 0x46574c44
13,130,086 UART: [fwproc] Received Image of size 114716 bytes
17,187,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,247 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,332,169 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,651,595 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,805,219 ready_for_fw is high
3,805,611 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,868,255 >>> mbox cmd response: success
23,566,227 UART:
23,566,651 UART: Running Caliptra FMC ...
23,567,763 UART:
23,567,929 UART: [state] CFI Enabled
23,632,962 UART: [fht] FMC Alias Private Key: 7
25,970,616 UART: [art] Extend RT PCRs Done
25,971,842 UART: [art] Lock RT PCRs Done
25,973,528 UART: [art] Populate DV Done
25,978,899 UART: [fht] FMC Alias Private Key: 7
25,980,593 UART: [art] Derive CDI
25,981,422 UART: [art] Store in in slot 0x4
26,041,274 UART: [art] Derive Key Pair
26,042,281 UART: [art] Store priv key in slot 0x5
29,335,179 UART: [art] Derive Key Pair - Done
29,348,148 UART: [art] Signing Cert with AUTHO
29,349,510 UART: RITY.KEYID = 7
31,637,114 UART: [art] Erasing AUTHORITY.KEYID = 7
31,638,646 UART: [art] PUB.X = 9A329336D4A642CF31C0D750704D819F6C7ECD7E1B0299AC1D247C9C56C1C17CFB1FE2D632F01144A366B371ED9FD957
31,645,904 UART: [art] PUB.Y = 797D8EBC5C2334B9464C94903E5793E055C84DA1E22FB71BAE2626F8B3402ECC588FE2877D1E4FF189E1CB435F2C5F5E
31,653,109 UART: [art] SIG.R = A54AACFA1BF4C06DCBEBF30328297C1D9F6C126A3D95A9D077E909F8052413B04D5A58DD1B969B4E88C7C3349FE2D12B
31,660,553 UART: [art] SIG.S = 08ADEDEAD5BF4F30C2EB79154BC8EEA0856A8735412F001F8DA2AC2DC2F8B42DFC95563E046AC35B341ECE6EE6C2FB30
32,965,453 UART: Caliptra RT
32,966,159 UART: [state] CFI Enabled
33,126,729 UART: [rt] RT listening for mailbox commands...
33,128,583 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,158,444 UART: [rt]cmd =0x46504c54, len=4
33,159,866 >>> mbox cmd response data (8 bytes)
33,161,303 UART: [rt] FIPS self test
33,162,245 UART: [kat] ++
33,162,719 UART: [kat] sha1
33,167,180 UART: [kat] SHA2-256
33,169,108 UART: [kat] SHA2-384
33,171,372 UART: Fatal Error: 0x90020002
33,206,770 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,350,867 >>> mbox cmd response: failed
33,351,536 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,495,394 >>> mbox cmd response: failed
Initializing fuses
1,520 writing to cptra_bootfsm_go
3,774,714 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,852,275 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,462 UART:
192,848 UART: Running Caliptra ROM ...
193,948 UART:
603,617 UART: [state] CFI Enabled
617,642 UART: [state] LifecycleState = Unprovisioned
619,527 UART: [state] DebugLocked = No
621,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,581 UART: [kat] SHA2-256
796,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,863 UART: [kat] ++
807,313 UART: [kat] sha1
818,329 UART: [kat] SHA2-256
821,061 UART: [kat] SHA2-384
825,875 UART: [kat] SHA2-512-ACC
828,249 UART: [kat] ECC-384
3,111,210 UART: [kat] HMAC-384Kdf
3,122,242 UART: [kat] LMS
4,312,369 UART: [kat] --
4,316,242 UART: [cold-reset] ++
4,317,612 UART: [fht] Storing FHT @ 0x50003400
4,327,822 UART: [idev] ++
4,328,384 UART: [idev] CDI.KEYID = 6
4,329,419 UART: [idev] SUBJECT.KEYID = 7
4,330,598 UART: [idev] UDS.KEYID = 0
4,331,553 ready_for_fw is high
4,331,766 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,475,890 UART: [idev] Erasing UDS.KEYID = 0
7,619,424 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,383 UART: [idev] --
7,644,583 UART: [ldev] ++
7,645,161 UART: [ldev] CDI.KEYID = 6
7,646,136 UART: [ldev] SUBJECT.KEYID = 5
7,647,299 UART: [ldev] AUTHORITY.KEYID = 7
7,648,594 UART: [ldev] FE.KEYID = 1
7,661,080 UART: [ldev] Erasing FE.KEYID = 1
10,950,828 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,488 UART: [ldev] --
13,308,349 UART: [fwproc] Waiting for Commands...
13,310,820 UART: [fwproc] Received command 0x46574c44
13,313,029 UART: [fwproc] Received Image of size 114716 bytes
17,377,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,455,217 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,524,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,843,889 >>> mbox cmd response: success
17,848,473 UART: [afmc] ++
17,849,072 UART: [afmc] CDI.KEYID = 6
17,849,992 UART: [afmc] SUBJECT.KEYID = 7
17,851,215 UART: [afmc] AUTHORITY.KEYID = 5
21,166,398 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,460,250 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,462,509 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,878 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,491,708 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,506,146 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,688 UART: [afmc] --
23,531,395 UART: [cold-reset] --
23,535,688 UART: [state] Locking Datavault
23,542,310 UART: [state] Locking PCR0, PCR1 and PCR31
23,544,070 UART: [state] Locking ICCM
23,546,517 UART: [exit] Launching FMC @ 0x40000130
23,554,864 UART:
23,555,140 UART: Running Caliptra FMC ...
23,556,170 UART:
23,556,319 UART: [state] CFI Enabled
23,564,261 UART: [fht] FMC Alias Private Key: 7
25,895,037 UART: [art] Extend RT PCRs Done
25,896,261 UART: [art] Lock RT PCRs Done
25,898,059 UART: [art] Populate DV Done
25,903,422 UART: [fht] FMC Alias Private Key: 7
25,904,960 UART: [art] Derive CDI
25,905,777 UART: [art] Store in in slot 0x4
25,948,586 UART: [art] Derive Key Pair
25,949,791 UART: [art] Store priv key in slot 0x5
29,191,411 UART: [art] Derive Key Pair - Done
29,204,680 UART: [art] Signing Cert with AUTHO
29,205,987 UART: RITY.KEYID = 7
31,485,185 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,713 UART: [art] PUB.X = 3F30B718B918E574A5F5A9F89F20B20C60397BEB4C73496D86DA9BB2DE45C14FB207AC881A238C7E7EF9BBA192B6862C
31,493,969 UART: [art] PUB.Y = B26F3453D0E38F316262CBDA3AD171E4EF4260FD821F69B68F243F3589A12FF8D97A5B79C5EDC098FF92212D36DC830C
31,501,205 UART: [art] SIG.R = 333422C9E8EB5CF09CDA879CE9B33C4D6E1D2690C429397C253A8354178AB9675808262B4EDADE8AC78D753972018C97
31,508,543 UART: [art] SIG.S = 9E50B824EAC4E7BCD218175D8FAE3AF12D4E33CACA6C70A9B5E6597E2E3AF009FFD895F535A4E2DD338D4B5FA6654458
32,813,447 UART: Caliptra RT
32,814,166 UART: [state] CFI Enabled
32,931,841 UART: [rt] RT listening for mailbox commands...
32,933,692 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,963,590 UART: [rt]cmd =0x46504c54, len=4
32,965,170 >>> mbox cmd response data (8 bytes)
32,966,405 UART: [rt] FIPS self test
32,967,348 UART: [kat] ++
32,967,813 UART: [kat] sha1
32,972,378 UART: [kat] SHA2-256
32,974,307 UART: [kat] SHA2-384
32,976,565 UART: Fatal Error: 0x90020002
33,011,937 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,156,079 >>> mbox cmd response: failed
33,156,750 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,300,595 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,038 UART:
190,343 UART: Running Caliptra ROM ...
191,369 UART:
7,236,085 UART: [state] CFI Enabled
7,251,380 UART: [state] LifecycleState = Unprovisioned
7,253,302 UART: [state] DebugLocked = No
7,255,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,260,635 UART: [kat] SHA2-256
7,430,373 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,440,921 UART: [kat] ++
7,441,379 UART: [kat] sha1
7,452,859 UART: [kat] SHA2-256
7,455,592 UART: [kat] SHA2-384
7,462,671 UART: [kat] SHA2-512-ACC
7,465,029 UART: [kat] ECC-384
9,745,293 UART: [kat] HMAC-384Kdf
9,757,411 UART: [kat] LMS
10,947,518 UART: [kat] --
10,951,685 UART: [cold-reset] ++
10,953,564 UART: [fht] Storing FHT @ 0x50003400
10,965,586 UART: [idev] ++
10,966,213 UART: [idev] CDI.KEYID = 6
10,967,111 UART: [idev] SUBJECT.KEYID = 7
10,968,410 UART: [idev] UDS.KEYID = 0
10,969,902 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
11,113,755 UART: [idev] Erasing UDS.KEYID = 0
14,257,728 UART: [idev] Using Sha1 for KeyId Algorithm
14,280,303 UART: [idev] --
14,285,440 UART: [ldev] ++
14,286,011 UART: [ldev] CDI.KEYID = 6
14,286,978 UART: [ldev] SUBJECT.KEYID = 5
14,288,197 UART: [ldev] AUTHORITY.KEYID = 7
14,289,487 UART: [ldev] FE.KEYID = 1
14,300,247 UART: [ldev] Erasing FE.KEYID = 1
17,586,079 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,878,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,893,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,908,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,922,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,941,946 UART: [ldev] --
19,947,168 UART: [fwproc] Waiting for Commands...
19,949,593 UART: [fwproc] Received command 0x46574c44
19,951,781 UART: [fwproc] Received Image of size 114716 bytes
24,003,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,079,334 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
24,148,203 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
24,468,213 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,130,469 ready_for_fw is high
4,131,098 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,088,030 >>> mbox cmd response: success
23,731,252 UART:
23,731,661 UART: Running Caliptra FMC ...
23,732,780 UART:
23,732,948 UART: [state] CFI Enabled
23,740,726 UART: [fht] FMC Alias Private Key: 7
26,071,916 UART: [art] Extend RT PCRs Done
26,073,178 UART: [art] Lock RT PCRs Done
26,074,670 UART: [art] Populate DV Done
26,080,308 UART: [fht] FMC Alias Private Key: 7
26,081,959 UART: [art] Derive CDI
26,082,778 UART: [art] Store in in slot 0x4
26,125,690 UART: [art] Derive Key Pair
26,126,727 UART: [art] Store priv key in slot 0x5
29,367,970 UART: [art] Derive Key Pair - Done
29,380,923 UART: [art] Signing Cert with AUTHO
29,382,226 UART: RITY.KEYID = 7
31,661,264 UART: [art] Erasing AUTHORITY.KEYID = 7
31,662,776 UART: [art] PUB.X = A572CB309785FCE56197CE300796A4C66490A65A529B89C472AC8AA598EEE7ADFB74535056BF6095DAA69DB2D75FBC0D
31,670,041 UART: [art] PUB.Y = CD12D8EB2E4807D4CFB09C8FCDC1020404DC7281627511EF0DC12AE1BA32D7F258C9D1EBBCD7A4BE5712700BBF2917C6
31,677,296 UART: [art] SIG.R = C9074658095244C76A62C4CC226C5B59F82904BCAEC28541ED60E42DCD160BC0F13D80006C6268ADC7B5308544EC181C
31,684,691 UART: [art] SIG.S = 7A941C804578BADE4B4B6043B28FFD779697DDE27ABB974E3739035AFE3BDBB61D75BC8CA2ADCC225744146C6A202128
32,990,261 UART: Caliptra RT
32,990,984 UART: [state] CFI Enabled
33,108,500 UART: [rt] RT listening for mailbox commands...
33,110,361 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,140,234 UART: [rt]cmd =0x46504c54, len=4
33,141,704 >>> mbox cmd response data (8 bytes)
33,142,773 UART: [rt] FIPS self test
33,143,723 UART: [kat] ++
33,144,170 UART: [kat] sha1
33,148,836 UART: [kat] SHA2-256
33,150,765 UART: [kat] SHA2-384
33,153,269 UART: Fatal Error: 0x90020002
33,188,661 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,332,791 >>> mbox cmd response: failed
33,333,470 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
33,477,370 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
10,556,255 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
24,515,842 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,457 UART:
192,815 UART: Running Caliptra ROM ...
194,021 UART:
194,180 UART: [state] CFI Enabled
266,370 UART: [state] LifecycleState = Unprovisioned
268,215 UART: [state] DebugLocked = No
270,966 UART: [state] WD Timer not started. Device not locked for debugging
275,157 UART: [kat] SHA2-256
454,245 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,849 UART: [kat] ++
466,376 UART: [kat] sha1
477,311 UART: [kat] SHA2-256
480,363 UART: [kat] SHA2-384
486,720 UART: [kat] SHA2-512-ACC
489,658 UART: [kat] ECC-384
2,949,423 UART: [kat] HMAC-384Kdf
2,972,086 UART: [kat] LMS
3,501,570 UART: [kat] --
3,504,294 UART: [cold-reset] ++
3,506,229 UART: [fht] FHT @ 0x50003400
3,517,655 UART: [idev] ++
3,518,264 UART: [idev] CDI.KEYID = 6
3,519,179 UART: [idev] SUBJECT.KEYID = 7
3,520,362 UART: [idev] UDS.KEYID = 0
3,521,292 ready_for_fw is high
3,521,522 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,666,185 UART: [idev] Erasing UDS.KEYID = 0
6,027,086 UART: [idev] Sha1 KeyId Algorithm
6,050,706 UART: [idev] --
6,055,622 UART: [ldev] ++
6,056,196 UART: [ldev] CDI.KEYID = 6
6,057,109 UART: [ldev] SUBJECT.KEYID = 5
6,058,235 UART: [ldev] AUTHORITY.KEYID = 7
6,059,526 UART: [ldev] FE.KEYID = 1
6,099,572 UART: [ldev] Erasing FE.KEYID = 1
8,601,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,319,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,351,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,367,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,818 UART: [ldev] --
10,393,923 UART: [fwproc] Wait for Commands...
10,396,771 UART: [fwproc] Recv command 0x46574c44
10,398,825 UART: [fwproc] Recv'd Img size: 115032 bytes
13,816,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,890,113 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,958,929 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,278,677 >>> mbox cmd response: success
14,283,485 UART: [afmc] ++
14,284,077 UART: [afmc] CDI.KEYID = 6
14,284,988 UART: [afmc] SUBJECT.KEYID = 7
14,286,145 UART: [afmc] AUTHORITY.KEYID = 5
16,829,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,551,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,552,993 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,568,773 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,584,810 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,600,671 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,621,775 UART: [afmc] --
18,626,175 UART: [cold-reset] --
18,631,062 UART: [state] Locking Datavault
18,634,191 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,914 UART: [state] Locking ICCM
18,637,149 UART: [exit] Launching FMC @ 0x40000130
18,645,566 UART:
18,645,802 UART: Running Caliptra FMC ...
18,646,834 UART:
18,646,984 UART: [state] CFI Enabled
18,711,669 UART: [fht] FMC Alias Private Key: 7
20,475,871 UART: [art] Extend RT PCRs Done
20,477,085 UART: [art] Lock RT PCRs Done
20,478,818 UART: [art] Populate DV Done
20,483,960 UART: [fht] FMC Alias Private Key: 7
20,485,455 UART: [art] Derive CDI
20,486,218 UART: [art] Store in in slot 0x4
20,544,074 UART: [art] Derive Key Pair
20,545,072 UART: [art] Store priv key in slot 0x5
23,008,659 UART: [art] Derive Key Pair - Done
23,021,557 UART: [art] Signing Cert with AUTHO
23,022,866 UART: RITY.KEYID = 7
24,733,334 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,841 UART: [art] PUB.X = 60E0413A7A9F0FABEC041CB086581AE397B8CBC85C323DFC74F97529CF94AA7D424EF0FC94B997B0BBCFBB151370379C
24,742,129 UART: [art] PUB.Y = EB50948E4858D8363C6B308DA5FBBE8B7A94FB3424A2ABE70AA79FCC2AEAA82DC8F194A3591E5793ED09929916D242AB
24,749,391 UART: [art] SIG.R = DD5E2BAAD8F08C291193E7ACF4BA81BFE1A685188C61C07C59ED7BA1C3EA77E5D5EE20BEFD374D52919F99E3BFA18DED
24,756,819 UART: [art] SIG.S = FA795FB456BCD1C10935D5652E7895AF34B2B2E39A1FD23CFE24A4C691F189974AC73D68DBCA4CE74AF3D8D1562A7136
25,735,751 UART: Caliptra RT
25,736,468 UART: [state] CFI Enabled
25,901,496 UART: [rt] RT listening for mailbox commands...
25,903,348 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,932,812 UART: [rt]cmd =0x46504c54, len=4
25,934,423 >>> mbox cmd response data (8 bytes)
25,935,965 UART: [rt] FIPS self test
25,936,907 UART: [kat] ++
25,937,358 UART: [kat] sha1
25,941,815 UART: [kat] SHA2-256
25,943,687 UART: [kat] SHA2-384
25,945,797 UART: Fatal Error: 0x90020002
25,980,947 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,125,633 >>> mbox cmd response: failed
26,126,265 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,270,681 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,146 UART:
190,437 UART: Running Caliptra ROM ...
191,491 UART:
191,634 UART: [state] CFI Enabled
254,066 UART: [state] LifecycleState = Unprovisioned
255,935 UART: [state] DebugLocked = No
258,232 UART: [state] WD Timer not started. Device not locked for debugging
261,427 UART: [kat] SHA2-256
440,522 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
452,096 UART: [kat] ++
452,551 UART: [kat] sha1
463,965 UART: [kat] SHA2-256
467,028 UART: [kat] SHA2-384
474,576 UART: [kat] SHA2-512-ACC
477,509 UART: [kat] ECC-384
2,937,482 UART: [kat] HMAC-384Kdf
2,960,299 UART: [kat] LMS
3,489,756 UART: [kat] --
3,493,908 UART: [cold-reset] ++
3,496,378 UART: [fht] FHT @ 0x50003400
3,506,008 UART: [idev] ++
3,506,585 UART: [idev] CDI.KEYID = 6
3,507,496 UART: [idev] SUBJECT.KEYID = 7
3,508,712 UART: [idev] UDS.KEYID = 0
3,510,216 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,655,383 UART: [idev] Erasing UDS.KEYID = 0
6,013,354 UART: [idev] Sha1 KeyId Algorithm
6,037,141 UART: [idev] --
6,041,845 UART: [ldev] ++
6,042,456 UART: [ldev] CDI.KEYID = 6
6,043,379 UART: [ldev] SUBJECT.KEYID = 5
6,044,548 UART: [ldev] AUTHORITY.KEYID = 7
6,045,786 UART: [ldev] FE.KEYID = 1
6,089,164 UART: [ldev] Erasing FE.KEYID = 1
8,595,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,346,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,911 UART: [ldev] --
10,402,473 UART: [fwproc] Wait for Commands...
10,405,409 UART: [fwproc] Recv command 0x46574c44
10,407,510 UART: [fwproc] Recv'd Img size: 115032 bytes
13,817,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,248 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,043 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,281,970 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,380,957 ready_for_fw is high
3,381,364 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,074,039 >>> mbox cmd response: success
18,369,345 UART:
18,369,753 UART: Running Caliptra FMC ...
18,370,868 UART:
18,371,023 UART: [state] CFI Enabled
18,435,820 UART: [fht] FMC Alias Private Key: 7
20,199,594 UART: [art] Extend RT PCRs Done
20,200,824 UART: [art] Lock RT PCRs Done
20,202,226 UART: [art] Populate DV Done
20,207,536 UART: [fht] FMC Alias Private Key: 7
20,209,192 UART: [art] Derive CDI
20,210,013 UART: [art] Store in in slot 0x4
20,268,258 UART: [art] Derive Key Pair
20,269,303 UART: [art] Store priv key in slot 0x5
22,732,331 UART: [art] Derive Key Pair - Done
22,745,179 UART: [art] Signing Cert with AUTHO
22,746,490 UART: RITY.KEYID = 7
24,458,441 UART: [art] Erasing AUTHORITY.KEYID = 7
24,459,951 UART: [art] PUB.X = EB320087FFCA04B16BCDCD03D2F6C89D5FFC28CC2E4FA37823039019BF22DC302AC79808805A1D9ECD2F22BD0EAE3BC7
24,467,292 UART: [art] PUB.Y = 828E3221A2244A446A114CF647F18CE861E0DAA7A8530FFF60F14E5EBBB9D83F8EEC800823AD8657A29346A83D1F27CE
24,474,529 UART: [art] SIG.R = C804D8B18D9D0ADC028284ED93D989828A48A00BE0AF81CCAE1F2B260FE62864887DB38FFD11F29CFB2FC7AF440C8DE6
24,481,930 UART: [art] SIG.S = FBEC2520A3FB45E877FD0A4B66E34162CDC29D811C3C6760AB7186AE9000EB0423919B3A40301EB9029CAD0BE93C4C20
25,461,544 UART: Caliptra RT
25,462,257 UART: [state] CFI Enabled
25,625,993 UART: [rt] RT listening for mailbox commands...
25,627,849 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,657,746 UART: [rt]cmd =0x46504c54, len=4
25,659,223 >>> mbox cmd response data (8 bytes)
25,660,605 UART: [rt] FIPS self test
25,661,587 UART: [kat] ++
25,662,044 UART: [kat] sha1
25,666,502 UART: [kat] SHA2-256
25,668,386 UART: [kat] SHA2-384
25,670,512 UART: Fatal Error: 0x90020002
25,705,711 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,850,236 >>> mbox cmd response: failed
25,850,889 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,995,353 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,343,533 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,039,624 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
192,552 UART:
192,925 UART: Running Caliptra ROM ...
194,040 UART:
603,502 UART: [state] CFI Enabled
619,006 UART: [state] LifecycleState = Unprovisioned
620,926 UART: [state] DebugLocked = No
622,662 UART: [state] WD Timer not started. Device not locked for debugging
625,719 UART: [kat] SHA2-256
804,828 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,360 UART: [kat] ++
816,879 UART: [kat] sha1
827,609 UART: [kat] SHA2-256
830,621 UART: [kat] SHA2-384
837,678 UART: [kat] SHA2-512-ACC
840,616 UART: [kat] ECC-384
3,282,831 UART: [kat] HMAC-384Kdf
3,295,706 UART: [kat] LMS
3,825,180 UART: [kat] --
3,830,948 UART: [cold-reset] ++
3,832,956 UART: [fht] FHT @ 0x50003400
3,843,651 UART: [idev] ++
3,844,214 UART: [idev] CDI.KEYID = 6
3,845,101 UART: [idev] SUBJECT.KEYID = 7
3,846,354 UART: [idev] UDS.KEYID = 0
3,847,291 ready_for_fw is high
3,847,512 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,992,079 UART: [idev] Erasing UDS.KEYID = 0
6,319,959 UART: [idev] Sha1 KeyId Algorithm
6,343,093 UART: [idev] --
6,346,766 UART: [ldev] ++
6,347,338 UART: [ldev] CDI.KEYID = 6
6,348,236 UART: [ldev] SUBJECT.KEYID = 5
6,349,448 UART: [ldev] AUTHORITY.KEYID = 7
6,350,679 UART: [ldev] FE.KEYID = 1
6,361,839 UART: [ldev] Erasing FE.KEYID = 1
8,835,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,554,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,570,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,586,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,601,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,622,006 UART: [ldev] --
10,627,238 UART: [fwproc] Wait for Commands...
10,628,744 UART: [fwproc] Recv command 0x46574c44
10,630,843 UART: [fwproc] Recv'd Img size: 115032 bytes
14,042,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,114,864 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,183,669 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,504,274 >>> mbox cmd response: success
14,508,032 UART: [afmc] ++
14,508,621 UART: [afmc] CDI.KEYID = 6
14,509,533 UART: [afmc] SUBJECT.KEYID = 7
14,510,695 UART: [afmc] AUTHORITY.KEYID = 5
17,008,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,983 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,745,759 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,761,803 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,777,664 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,801,098 UART: [afmc] --
18,805,076 UART: [cold-reset] --
18,810,177 UART: [state] Locking Datavault
18,815,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,817,389 UART: [state] Locking ICCM
18,818,448 UART: [exit] Launching FMC @ 0x40000130
18,826,839 UART:
18,827,071 UART: Running Caliptra FMC ...
18,828,099 UART:
18,828,249 UART: [state] CFI Enabled
18,836,564 UART: [fht] FMC Alias Private Key: 7
20,594,523 UART: [art] Extend RT PCRs Done
20,595,739 UART: [art] Lock RT PCRs Done
20,597,182 UART: [art] Populate DV Done
20,602,485 UART: [fht] FMC Alias Private Key: 7
20,604,032 UART: [art] Derive CDI
20,604,796 UART: [art] Store in in slot 0x4
20,647,584 UART: [art] Derive Key Pair
20,648,597 UART: [art] Store priv key in slot 0x5
23,075,404 UART: [art] Derive Key Pair - Done
23,088,570 UART: [art] Signing Cert with AUTHO
23,089,925 UART: RITY.KEYID = 7
24,795,039 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,532 UART: [art] PUB.X = CBF0DD000FAE57995F8D1AA79104E3C44256AA1F688BD4000D43AADD4682AA3634358869F71676992DB1AC3524AFB9CF
24,803,781 UART: [art] PUB.Y = 0DCC3F31FAE8C88570184F9AB25CE28FB86ADCEF56D58EC6C8589710608025208239AC16AD469E7CA560EFE5822328B6
24,811,017 UART: [art] SIG.R = 0DF3EA70E4444C3A641323663E1C6962AF62D48B5C81A0A4BC661FF7E583A661211BF1F2B2E9D53EC63D408F95646D97
24,818,409 UART: [art] SIG.S = F6B930699214C56AD4E80D1CDBE8CBB6C660BB37CD70CD0E778FBA2951508D7311B71BC4EE4CB87F1619C58C001CE687
25,797,403 UART: Caliptra RT
25,798,104 UART: [state] CFI Enabled
25,914,527 UART: [rt] RT listening for mailbox commands...
25,916,369 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,946,257 UART: [rt]cmd =0x46504c54, len=4
25,947,932 >>> mbox cmd response data (8 bytes)
25,948,938 UART: [rt] FIPS self test
25,949,883 UART: [kat] ++
25,950,330 UART: [kat] sha1
25,954,781 UART: [kat] SHA2-256
25,956,673 UART: [kat] SHA2-384
25,958,800 UART: Fatal Error: 0x90020002
25,994,166 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,139,099 >>> mbox cmd response: failed
26,139,739 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,284,032 >>> mbox cmd response: failed
Initializing fuses
1,124 writing to cptra_bootfsm_go
190,240 UART:
190,526 UART: Running Caliptra ROM ...
191,549 UART:
14,248,128 UART: [state] CFI Enabled
14,263,260 UART: [state] LifecycleState = Unprovisioned
14,265,115 UART: [state] DebugLocked = No
14,267,010 UART: [state] WD Timer not started. Device not locked for debugging
14,270,907 UART: [kat] SHA2-256
14,450,078 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
14,461,630 UART: [kat] ++
14,462,091 UART: [kat] sha1
14,472,816 UART: [kat] SHA2-256
14,475,887 UART: [kat] SHA2-384
14,483,650 UART: [kat] SHA2-512-ACC
14,486,576 UART: [kat] ECC-384
16,930,412 UART: [kat] HMAC-384Kdf
16,943,277 UART: [kat] LMS
17,472,774 UART: [kat] --
17,479,135 UART: [cold-reset] ++
17,480,519 UART: [fht] FHT @ 0x50003400
17,492,087 UART: [idev] ++
17,492,660 UART: [idev] CDI.KEYID = 6
17,493,563 UART: [idev] SUBJECT.KEYID = 7
17,494,771 UART: [idev] UDS.KEYID = 0
17,496,307 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,640,727 UART: [idev] Erasing UDS.KEYID = 0
19,974,147 UART: [idev] Sha1 KeyId Algorithm
19,998,027 UART: [idev] --
20,002,890 UART: [ldev] ++
20,003,500 UART: [ldev] CDI.KEYID = 6
20,004,395 UART: [ldev] SUBJECT.KEYID = 5
20,005,558 UART: [ldev] AUTHORITY.KEYID = 7
20,006,715 UART: [ldev] FE.KEYID = 1
20,019,536 UART: [ldev] Erasing FE.KEYID = 1
22,489,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,208,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,224,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,240,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,256,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,276,775 UART: [ldev] --
24,281,734 UART: [fwproc] Wait for Commands...
24,284,642 UART: [fwproc] Recv command 0x46574c44
24,286,737 UART: [fwproc] Recv'd Img size: 115032 bytes
27,701,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,775,344 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,844,138 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,165,055 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
3,695,344 ready_for_fw is high
3,695,939 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,276,967 >>> mbox cmd response: success
18,523,864 UART:
18,524,258 UART: Running Caliptra FMC ...
18,525,459 UART:
18,525,647 UART: [state] CFI Enabled
18,533,266 UART: [fht] FMC Alias Private Key: 7
20,289,865 UART: [art] Extend RT PCRs Done
20,291,094 UART: [art] Lock RT PCRs Done
20,292,720 UART: [art] Populate DV Done
20,298,169 UART: [fht] FMC Alias Private Key: 7
20,299,660 UART: [art] Derive CDI
20,300,483 UART: [art] Store in in slot 0x4
20,342,982 UART: [art] Derive Key Pair
20,344,029 UART: [art] Store priv key in slot 0x5
22,771,518 UART: [art] Derive Key Pair - Done
22,784,586 UART: [art] Signing Cert with AUTHO
22,785,894 UART: RITY.KEYID = 7
24,491,288 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,793 UART: [art] PUB.X = BEEE94C8E09EBD36D7B933377C6A0D6B2C31EDAEC0A22CC9202FA13CB92DA9CBB244DEFAC84823735335F8A16F00C944
24,500,078 UART: [art] PUB.Y = 56545DD93B0F1FC75EADC225D223879BE8E52F9CDC46D4F44F448B639C736123B7F0F0B52C9F2D0638895A84E3B7975E
24,507,344 UART: [art] SIG.R = E5099CFBEB63CA6366F38389B74ABEA014B02061AEF20CEB3DC789D868676737AB5D26053883D5489CBEE26663E9EBFD
24,514,719 UART: [art] SIG.S = 311B704D286395B1352BA3EE9D80B1DD45B22C6C7258679546BF0B462C1019F30711AC8F4CAC824A64DF6668DBBEBF86
25,493,852 UART: Caliptra RT
25,494,561 UART: [state] CFI Enabled
25,611,582 UART: [rt] RT listening for mailbox commands...
25,613,461 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,643,082 UART: [rt]cmd =0x46504c54, len=4
25,644,557 >>> mbox cmd response data (8 bytes)
25,645,695 UART: [rt] FIPS self test
25,646,640 UART: [kat] ++
25,647,094 UART: [kat] sha1
25,651,554 UART: [kat] SHA2-256
25,653,443 UART: [kat] SHA2-384
25,655,863 UART: Fatal Error: 0x90020002
25,691,251 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,835,806 >>> mbox cmd response: failed
25,836,449 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
25,980,696 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,644,634 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,232,993 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
192,341 UART:
192,695 UART: Running Caliptra ROM ...
193,881 UART:
194,040 UART: [state] CFI Enabled
262,649 UART: [state] LifecycleState = Unprovisioned
264,985 UART: [state] DebugLocked = No
266,523 UART: [state] WD Timer not started. Device not locked for debugging
270,599 UART: [kat] SHA2-256
460,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,272 UART: [kat] ++
471,748 UART: [kat] sha1
481,972 UART: [kat] SHA2-256
485,031 UART: [kat] SHA2-384
490,369 UART: [kat] SHA2-512-ACC
492,964 UART: [kat] ECC-384
2,947,337 UART: [kat] HMAC-384Kdf
2,972,261 UART: [kat] LMS
3,504,044 UART: [kat] --
3,507,217 UART: [cold-reset] ++
3,509,654 UART: [fht] FHT @ 0x50003400
3,520,586 UART: [idev] ++
3,521,270 UART: [idev] CDI.KEYID = 6
3,522,185 UART: [idev] SUBJECT.KEYID = 7
3,523,454 UART: [idev] UDS.KEYID = 0
3,524,386 ready_for_fw is high
3,524,597 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,669,163 UART: [idev] Erasing UDS.KEYID = 0
6,029,843 UART: [idev] Sha1 KeyId Algorithm
6,052,336 UART: [idev] --
6,055,905 UART: [ldev] ++
6,056,597 UART: [ldev] CDI.KEYID = 6
6,057,509 UART: [ldev] SUBJECT.KEYID = 5
6,058,725 UART: [ldev] AUTHORITY.KEYID = 7
6,059,901 UART: [ldev] FE.KEYID = 1
6,100,804 UART: [ldev] Erasing FE.KEYID = 1
8,609,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,919 UART: [ldev] --
10,416,522 UART: [fwproc] Wait for Commands...
10,419,701 UART: [fwproc] Recv command 0x46574c44
10,421,966 UART: [fwproc] Recv'd Img size: 115032 bytes
13,873,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,275 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,067,456 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,613,435 >>> mbox cmd response: success
14,618,201 UART: [afmc] ++
14,618,904 UART: [afmc] CDI.KEYID = 6
14,620,142 UART: [afmc] SUBJECT.KEYID = 7
14,621,573 UART: [afmc] AUTHORITY.KEYID = 5
17,150,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,249 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,431 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,563 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,964,014 UART: [afmc] --
18,967,297 UART: [cold-reset] --
18,971,594 UART: [state] Locking Datavault
18,977,974 UART: [state] Locking PCR0, PCR1 and PCR31
18,980,171 UART: [state] Locking ICCM
18,982,109 UART: [exit] Launching FMC @ 0x40000130
18,990,776 UART:
18,991,012 UART: Running Caliptra FMC ...
18,992,118 UART:
18,992,274 UART: [state] CFI Enabled
19,052,691 UART: [fht] FMC Alias Private Key: 7
20,817,117 UART: [art] Extend RT PCRs Done
20,818,333 UART: [art] Lock RT PCRs Done
20,819,895 UART: [art] Populate DV Done
20,825,477 UART: [fht] FMC Alias Private Key: 7
20,826,963 UART: [art] Derive CDI
20,827,727 UART: [art] Store in in slot 0x4
20,885,520 UART: [art] Derive Key Pair
20,886,559 UART: [art] Store priv key in slot 0x5
23,349,443 UART: [art] Derive Key Pair - Done
23,362,661 UART: [art] Signing Cert with AUTHO
23,364,003 UART: RITY.KEYID = 7
25,075,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,076,790 UART: [art] PUB.X = DA1B4D0E99D3103ECDA3963320F22875BFCEC340D1D0251DD3314221F2845842B664E283F656D9635CED48BC06ADFEAF
25,084,066 UART: [art] PUB.Y = BE45D3084321DDD061966526C5D1026821AFED789D07AA82046D98C900FF3820F5A56F142B7FEF39771C9F4C455B4E27
25,091,290 UART: [art] SIG.R = 7878964C43A1E8CC9E194AA48204F9640FCA3287C413FC46817244FFBFF9ADF5222129154CAF8492D27B161DCE24FF3C
25,098,719 UART: [art] SIG.S = 9C1861FBF856E42C8BD16214F909413282B48101859F7240E47D5849EE911C3B5138E079F1EED42A39E95FB58FF761CA
26,077,574 UART: Caliptra RT
26,078,288 UART: [state] CFI Enabled
26,242,461 UART: [rt] RT listening for mailbox commands...
26,244,335 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,273,848 UART: [rt]cmd =0x46504c54, len=4
26,275,266 >>> mbox cmd response data (8 bytes)
26,276,698 UART: [rt] FIPS self test
26,277,637 UART: [kat] ++
26,278,089 UART: [kat] sha1
26,282,548 UART: [kat] SHA2-256
26,284,483 UART: [kat] SHA2-384
26,286,794 UART: Fatal Error: 0x90020002
26,322,116 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,466,465 >>> mbox cmd response: failed
26,467,080 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,611,581 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,143 UART:
190,431 UART: Running Caliptra ROM ...
191,538 UART:
191,683 UART: [state] CFI Enabled
254,118 UART: [state] LifecycleState = Unprovisioned
256,496 UART: [state] DebugLocked = No
259,432 UART: [state] WD Timer not started. Device not locked for debugging
263,479 UART: [kat] SHA2-256
453,356 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,080 UART: [kat] ++
464,562 UART: [kat] sha1
474,901 UART: [kat] SHA2-256
477,913 UART: [kat] SHA2-384
483,792 UART: [kat] SHA2-512-ACC
486,408 UART: [kat] ECC-384
2,938,204 UART: [kat] HMAC-384Kdf
2,959,739 UART: [kat] LMS
3,491,539 UART: [kat] --
3,494,404 UART: [cold-reset] ++
3,496,068 UART: [fht] FHT @ 0x50003400
3,505,972 UART: [idev] ++
3,506,702 UART: [idev] CDI.KEYID = 6
3,507,720 UART: [idev] SUBJECT.KEYID = 7
3,508,822 UART: [idev] UDS.KEYID = 0
3,510,328 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,654,924 UART: [idev] Erasing UDS.KEYID = 0
6,016,508 UART: [idev] Sha1 KeyId Algorithm
6,038,718 UART: [idev] --
6,043,338 UART: [ldev] ++
6,044,027 UART: [ldev] CDI.KEYID = 6
6,044,941 UART: [ldev] SUBJECT.KEYID = 5
6,046,107 UART: [ldev] AUTHORITY.KEYID = 7
6,047,304 UART: [ldev] FE.KEYID = 1
6,089,062 UART: [ldev] Erasing FE.KEYID = 1
8,596,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,330,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,376,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,977 UART: [ldev] --
10,402,977 UART: [fwproc] Wait for Commands...
10,405,777 UART: [fwproc] Recv command 0x46574c44
10,408,044 UART: [fwproc] Recv'd Img size: 115032 bytes
13,862,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,835 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,053,949 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,601,079 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,439,283 ready_for_fw is high
3,439,913 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,751,125 >>> mbox cmd response: success
19,069,384 UART:
19,069,777 UART: Running Caliptra FMC ...
19,070,987 UART:
19,071,178 UART: [state] CFI Enabled
19,135,393 UART: [fht] FMC Alias Private Key: 7
20,899,608 UART: [art] Extend RT PCRs Done
20,900,882 UART: [art] Lock RT PCRs Done
20,902,494 UART: [art] Populate DV Done
20,907,911 UART: [fht] FMC Alias Private Key: 7
20,909,566 UART: [art] Derive CDI
20,910,386 UART: [art] Store in in slot 0x4
20,967,852 UART: [art] Derive Key Pair
20,968,856 UART: [art] Store priv key in slot 0x5
23,430,364 UART: [art] Derive Key Pair - Done
23,443,529 UART: [art] Signing Cert with AUTHO
23,444,831 UART: RITY.KEYID = 7
25,155,953 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,469 UART: [art] PUB.X = 13CD52E6C55A1D9CB23F5608C6DAE0C6F861F93A1DBBB9F05FDEBD4BEF7A8435B6C0E8A9C730F05BCC868EC64DF84E26
25,164,784 UART: [art] PUB.Y = 9B958243421927623067D882FA3E0A90EE4C4CD557ACE00665B0363A5D5702B6389182342BD494A8601DF616325E29E5
25,172,001 UART: [art] SIG.R = 4FB5C98A7ADD01C4AA5CE20CAFF13EC5D9ED0A746D8DABDE04788D4F6927EDB16C5A12789DD9B4B60734266142FB212B
25,179,466 UART: [art] SIG.S = E74B3C5E72911517997067A11BAF9E4FA2DB63B12ABD9260E39BE27F70AF046FAF683CA8AC4A6A2220CBC85C2560BF5C
26,158,262 UART: Caliptra RT
26,158,978 UART: [state] CFI Enabled
26,322,497 UART: [rt] RT listening for mailbox commands...
26,324,372 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,292 UART: [rt]cmd =0x46504c54, len=4
26,355,905 >>> mbox cmd response data (8 bytes)
26,357,183 UART: [rt] FIPS self test
26,358,126 UART: [kat] ++
26,358,574 UART: [kat] sha1
26,363,193 UART: [kat] SHA2-256
26,365,072 UART: [kat] SHA2-384
26,367,362 UART: Fatal Error: 0x90020002
26,402,574 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,547,048 >>> mbox cmd response: failed
26,547,722 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,692,177 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,426,846 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,727,567 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,366 UART:
192,750 UART: Running Caliptra ROM ...
193,892 UART:
603,535 UART: [state] CFI Enabled
616,905 UART: [state] LifecycleState = Unprovisioned
619,288 UART: [state] DebugLocked = No
620,680 UART: [state] WD Timer not started. Device not locked for debugging
624,445 UART: [kat] SHA2-256
814,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,163 UART: [kat] ++
825,695 UART: [kat] sha1
837,231 UART: [kat] SHA2-256
840,249 UART: [kat] SHA2-384
846,330 UART: [kat] SHA2-512-ACC
848,913 UART: [kat] ECC-384
3,291,431 UART: [kat] HMAC-384Kdf
3,306,094 UART: [kat] LMS
3,837,887 UART: [kat] --
3,841,177 UART: [cold-reset] ++
3,842,122 UART: [fht] FHT @ 0x50003400
3,854,455 UART: [idev] ++
3,855,092 UART: [idev] CDI.KEYID = 6
3,856,130 UART: [idev] SUBJECT.KEYID = 7
3,857,310 UART: [idev] UDS.KEYID = 0
3,858,235 ready_for_fw is high
3,858,463 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,002,968 UART: [idev] Erasing UDS.KEYID = 0
6,331,496 UART: [idev] Sha1 KeyId Algorithm
6,354,108 UART: [idev] --
6,358,290 UART: [ldev] ++
6,358,989 UART: [ldev] CDI.KEYID = 6
6,359,903 UART: [ldev] SUBJECT.KEYID = 5
6,361,068 UART: [ldev] AUTHORITY.KEYID = 7
6,362,304 UART: [ldev] FE.KEYID = 1
6,373,006 UART: [ldev] Erasing FE.KEYID = 1
8,854,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,501 UART: [ldev] --
10,647,741 UART: [fwproc] Wait for Commands...
10,649,514 UART: [fwproc] Recv command 0x46574c44
10,651,851 UART: [fwproc] Recv'd Img size: 115032 bytes
14,108,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,185,492 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,301,620 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,848,790 >>> mbox cmd response: success
14,852,234 UART: [afmc] ++
14,852,939 UART: [afmc] CDI.KEYID = 6
14,854,174 UART: [afmc] SUBJECT.KEYID = 7
14,855,604 UART: [afmc] AUTHORITY.KEYID = 5
17,361,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,899 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,829 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,007 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,174 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,171 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,152,543 UART: [afmc] --
19,156,129 UART: [cold-reset] --
19,159,192 UART: [state] Locking Datavault
19,165,791 UART: [state] Locking PCR0, PCR1 and PCR31
19,167,924 UART: [state] Locking ICCM
19,169,574 UART: [exit] Launching FMC @ 0x40000130
19,178,292 UART:
19,178,529 UART: Running Caliptra FMC ...
19,179,633 UART:
19,179,790 UART: [state] CFI Enabled
19,187,948 UART: [fht] FMC Alias Private Key: 7
20,945,097 UART: [art] Extend RT PCRs Done
20,946,325 UART: [art] Lock RT PCRs Done
20,948,086 UART: [art] Populate DV Done
20,953,665 UART: [fht] FMC Alias Private Key: 7
20,955,214 UART: [art] Derive CDI
20,955,951 UART: [art] Store in in slot 0x4
20,998,566 UART: [art] Derive Key Pair
20,999,610 UART: [art] Store priv key in slot 0x5
23,426,187 UART: [art] Derive Key Pair - Done
23,439,183 UART: [art] Signing Cert with AUTHO
23,440,484 UART: RITY.KEYID = 7
25,145,780 UART: [art] Erasing AUTHORITY.KEYID = 7
25,147,300 UART: [art] PUB.X = CA9B6336DDFBE68E956078330183E784C1BFF05087EAFF7D86218D220F35D3F8EF82B88DF20DB618BD2B47A979C8182A
25,154,577 UART: [art] PUB.Y = C7B8AE8F6959D6B187FC45A4934D56DA42719FBAA26D4CB553DEC9B59A1E50C2E43201EEF7E590F95CF855B4CFFEFA38
25,161,847 UART: [art] SIG.R = 487FC31B067CABF1ED8123CA0E8C87EAF65037A7841BF94BE6B8CD0ED5274BD6819456FC0B6A0264CDA2642B0E46DF23
25,169,270 UART: [art] SIG.S = AF62E8CCC1FA16E50115D29F5864D466EE401D034D7657C7C8DF25949D7D610B0F8EECD2F3AFA617037FDC75D1E08BC9
26,147,849 UART: Caliptra RT
26,148,569 UART: [state] CFI Enabled
26,265,527 UART: [rt] RT listening for mailbox commands...
26,267,385 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,297,128 UART: [rt]cmd =0x46504c54, len=4
26,298,706 >>> mbox cmd response data (8 bytes)
26,299,946 UART: [rt] FIPS self test
26,300,889 UART: [kat] ++
26,301,343 UART: [kat] sha1
26,305,840 UART: [kat] SHA2-256
26,307,778 UART: [kat] SHA2-384
26,310,253 UART: Fatal Error: 0x90020002
26,345,631 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,490,027 >>> mbox cmd response: failed
26,490,694 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,635,098 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,095 UART:
190,391 UART: Running Caliptra ROM ...
191,416 UART:
13,889,476 UART: [state] CFI Enabled
13,904,689 UART: [state] LifecycleState = Unprovisioned
13,907,109 UART: [state] DebugLocked = No
13,909,120 UART: [state] WD Timer not started. Device not locked for debugging
13,913,904 UART: [kat] SHA2-256
14,103,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,114,573 UART: [kat] ++
14,115,094 UART: [kat] sha1
14,127,390 UART: [kat] SHA2-256
14,130,412 UART: [kat] SHA2-384
14,135,753 UART: [kat] SHA2-512-ACC
14,138,333 UART: [kat] ECC-384
16,581,611 UART: [kat] HMAC-384Kdf
16,594,410 UART: [kat] LMS
17,126,204 UART: [kat] --
17,131,324 UART: [cold-reset] ++
17,133,254 UART: [fht] FHT @ 0x50003400
17,145,074 UART: [idev] ++
17,145,755 UART: [idev] CDI.KEYID = 6
17,146,950 UART: [idev] SUBJECT.KEYID = 7
17,148,094 UART: [idev] UDS.KEYID = 0
17,149,588 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
17,293,835 UART: [idev] Erasing UDS.KEYID = 0
19,627,588 UART: [idev] Sha1 KeyId Algorithm
19,650,361 UART: [idev] --
19,655,593 UART: [ldev] ++
19,656,272 UART: [ldev] CDI.KEYID = 6
19,657,179 UART: [ldev] SUBJECT.KEYID = 5
19,658,390 UART: [ldev] AUTHORITY.KEYID = 7
19,659,564 UART: [ldev] FE.KEYID = 1
19,672,004 UART: [ldev] Erasing FE.KEYID = 1
22,144,066 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,864,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,880,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,895,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,910,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,932,490 UART: [ldev] --
23,938,351 UART: [fwproc] Wait for Commands...
23,941,367 UART: [fwproc] Recv command 0x46574c44
23,943,688 UART: [fwproc] Recv'd Img size: 115032 bytes
27,407,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,483,512 UART: [fwproc] Load FMC at address 0x40000000 len 18800
27,599,630 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
28,146,846 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,751,231 ready_for_fw is high
3,751,697 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,973,609 >>> mbox cmd response: success
19,231,625 UART:
19,232,003 UART: Running Caliptra FMC ...
19,233,162 UART:
19,233,326 UART: [state] CFI Enabled
19,241,416 UART: [fht] FMC Alias Private Key: 7
20,998,420 UART: [art] Extend RT PCRs Done
20,999,649 UART: [art] Lock RT PCRs Done
21,001,329 UART: [art] Populate DV Done
21,006,808 UART: [fht] FMC Alias Private Key: 7
21,008,352 UART: [art] Derive CDI
21,009,118 UART: [art] Store in in slot 0x4
21,051,131 UART: [art] Derive Key Pair
21,052,159 UART: [art] Store priv key in slot 0x5
23,479,498 UART: [art] Derive Key Pair - Done
23,492,281 UART: [art] Signing Cert with AUTHO
23,493,592 UART: RITY.KEYID = 7
25,199,216 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,718 UART: [art] PUB.X = 870C68BD573879DBD0153FB181112547DCF60FEE0B16442E607FDD778F7E32CB082F02B393D30D0F26AA1D6645AC5467
25,207,981 UART: [art] PUB.Y = 80787BEA331D3371CE075ADB9437964426305F3ED3187FFFE673106932A6F0E81F699FE9B1F78891B382BD1AC154E664
25,215,244 UART: [art] SIG.R = DCEA70AA2D093EB1D551DCF24740FB106E9EC175E30C5EDEF7210A50435FC894C9A88CB689EF156A3232E6C362ABAD69
25,222,656 UART: [art] SIG.S = F76900ADB27E81B42A4E50F22B017820F1339735AD86795AC2D52C4DCCB604CBD5F39F69A6065A6B86767FB5E2ACE190
26,201,254 UART: Caliptra RT
26,201,937 UART: [state] CFI Enabled
26,320,182 UART: [rt] RT listening for mailbox commands...
26,322,028 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,702 UART: [rt]cmd =0x46504c54, len=4
26,353,203 >>> mbox cmd response data (8 bytes)
26,354,575 UART: [rt] FIPS self test
26,355,539 UART: [kat] ++
26,355,992 UART: [kat] sha1
26,360,484 UART: [kat] SHA2-256
26,362,359 UART: [kat] SHA2-384
26,364,612 UART: Fatal Error: 0x90020002
26,399,822 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,544,309 >>> mbox cmd response: failed
26,544,893 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
26,689,281 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
16,997,560 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
28,208,924 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,734 UART: [state] LifecycleState = Unprovisioned
86,389 UART: [state] DebugLocked = No
87,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,745 UART: [kat] SHA2-256
882,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,791 UART: [kat] ++
886,943 UART: [kat] sha1
891,233 UART: [kat] SHA2-256
893,171 UART: [kat] SHA2-384
896,116 UART: [kat] SHA2-512-ACC
898,017 UART: [kat] ECC-384
903,636 UART: [kat] HMAC-384Kdf
908,166 UART: [kat] LMS
1,476,362 UART: [kat] --
1,477,299 UART: [cold-reset] ++
1,477,727 UART: [fht] Storing FHT @ 0x50003400
1,480,360 UART: [idev] ++
1,480,528 UART: [idev] CDI.KEYID = 6
1,480,888 UART: [idev] SUBJECT.KEYID = 7
1,481,312 UART: [idev] UDS.KEYID = 0
1,481,657 ready_for_fw is high
1,481,657 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,210 UART: [idev] Erasing UDS.KEYID = 0
1,505,698 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,244 UART: [idev] --
1,515,319 UART: [ldev] ++
1,515,487 UART: [ldev] CDI.KEYID = 6
1,515,850 UART: [ldev] SUBJECT.KEYID = 5
1,516,276 UART: [ldev] AUTHORITY.KEYID = 7
1,516,739 UART: [ldev] FE.KEYID = 1
1,521,645 UART: [ldev] Erasing FE.KEYID = 1
1,546,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,312 UART: [ldev] --
1,585,639 UART: [fwproc] Waiting for Commands...
1,586,396 UART: [fwproc] Received command 0x46574c44
1,587,187 UART: [fwproc] Received Image of size 115032 bytes
2,892,574 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,118 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,470 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,393 >>> mbox cmd response: success
3,087,643 UART: [afmc] ++
3,087,811 UART: [afmc] CDI.KEYID = 6
3,088,173 UART: [afmc] SUBJECT.KEYID = 7
3,088,598 UART: [afmc] AUTHORITY.KEYID = 5
3,124,391 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,140,367 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,141,147 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,875 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,760 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,158,450 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,166,339 UART: [afmc] --
3,167,357 UART: [cold-reset] --
3,168,071 UART: [state] Locking Datavault
3,169,204 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,808 UART: [state] Locking ICCM
3,170,246 UART: [exit] Launching FMC @ 0x40000130
3,175,575 UART:
3,175,591 UART: Running Caliptra FMC ...
3,175,999 UART:
3,176,053 UART: [state] CFI Enabled
3,186,360 UART: [fht] FMC Alias Private Key: 7
3,294,367 UART: [art] Extend RT PCRs Done
3,294,795 UART: [art] Lock RT PCRs Done
3,296,235 UART: [art] Populate DV Done
3,304,480 UART: [fht] FMC Alias Private Key: 7
3,305,468 UART: [art] Derive CDI
3,305,748 UART: [art] Store in in slot 0x4
3,391,737 UART: [art] Derive Key Pair
3,392,097 UART: [art] Store priv key in slot 0x5
3,405,105 UART: [art] Derive Key Pair - Done
3,419,728 UART: [art] Signing Cert with AUTHO
3,420,208 UART: RITY.KEYID = 7
3,435,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,525 UART: [art] PUB.X = EA1F0ECB2205BDDD9EEBC3C94A99CCBAB044A408905B2A61D223CC856F66D9FFBB85D3288085E427835442E8AB122913
3,443,300 UART: [art] PUB.Y = 9466213C089B6FF390ADC4375B7A59E39765FD547F77D5509ADC0445F29CB22CF1F4906CCA41645BB1F3D6F4BC7513E4
3,450,250 UART: [art] SIG.R = EAA0058D9AEB86652D5DFCDD4CAD3A3CE06B0F427A2C59365AB9D346F88FA910A72FCE00983A019B983E9C078D9D4678
3,457,002 UART: [art] SIG.S = 5D7E25A6C1DFE7FDF7033DB94273891A8F89C4665A62FF2C27E3E07304998E04E5C36B42FE7D652FC02C4C94493F727D
3,480,672 UART: Caliptra RT
3,480,925 UART: [state] CFI Enabled
3,588,832 UART: [rt] RT listening for mailbox commands...
3,589,495 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,619,454 UART: [rt]cmd =0x46504c54, len=4
3,620,528 >>> mbox cmd response data (8 bytes)
3,620,701 UART: [rt] FIPS self test
3,621,029 UART: [kat] ++
3,621,181 UART: [kat] sha1
3,625,529 UART: [kat] SHA2-256
3,627,551 UART: [kat] SHA2-384
3,629,966 UART: Fatal Error: 0x90020002
3,631,505 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,631,510 >>> mbox cmd response: failed
3,631,510 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,631,515 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,737 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,241 UART: [kat] SHA2-256
882,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,287 UART: [kat] ++
886,439 UART: [kat] sha1
890,677 UART: [kat] SHA2-256
892,615 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,836 UART: [kat] HMAC-384Kdf
907,616 UART: [kat] LMS
1,475,812 UART: [kat] --
1,476,863 UART: [cold-reset] ++
1,477,349 UART: [fht] Storing FHT @ 0x50003400
1,480,234 UART: [idev] ++
1,480,402 UART: [idev] CDI.KEYID = 6
1,480,762 UART: [idev] SUBJECT.KEYID = 7
1,481,186 UART: [idev] UDS.KEYID = 0
1,481,531 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,224 UART: [idev] Erasing UDS.KEYID = 0
1,505,784 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,398 UART: [idev] --
1,515,349 UART: [ldev] ++
1,515,517 UART: [ldev] CDI.KEYID = 6
1,515,880 UART: [ldev] SUBJECT.KEYID = 5
1,516,306 UART: [ldev] AUTHORITY.KEYID = 7
1,516,769 UART: [ldev] FE.KEYID = 1
1,522,025 UART: [ldev] Erasing FE.KEYID = 1
1,547,138 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,504 UART: [ldev] --
1,585,955 UART: [fwproc] Waiting for Commands...
1,586,652 UART: [fwproc] Received command 0x46574c44
1,587,443 UART: [fwproc] Received Image of size 115032 bytes
2,892,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,696 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,048 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,023 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,459 ready_for_fw is high
1,362,459 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,934,407 >>> mbox cmd response: success
2,996,269 UART:
2,996,285 UART: Running Caliptra FMC ...
2,996,693 UART:
2,996,747 UART: [state] CFI Enabled
3,007,368 UART: [fht] FMC Alias Private Key: 7
3,114,981 UART: [art] Extend RT PCRs Done
3,115,409 UART: [art] Lock RT PCRs Done
3,117,011 UART: [art] Populate DV Done
3,125,430 UART: [fht] FMC Alias Private Key: 7
3,126,580 UART: [art] Derive CDI
3,126,860 UART: [art] Store in in slot 0x4
3,212,325 UART: [art] Derive Key Pair
3,212,685 UART: [art] Store priv key in slot 0x5
3,225,947 UART: [art] Derive Key Pair - Done
3,240,685 UART: [art] Signing Cert with AUTHO
3,241,165 UART: RITY.KEYID = 7
3,255,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,256,636 UART: [art] PUB.X = 95A42B30D85341E14BF869EE79CAD98C1A34682EBCE406CF46DD7B8A62554E25CA980EB39C3EE799ACAC9BCE0B33D45B
3,263,417 UART: [art] PUB.Y = 77FF69599C77DBA6D0019246F52C21F907A131135301DFAE5A36B8170E7EBC3080180EFE70C80F2193B6A51ECAC67AA8
3,270,355 UART: [art] SIG.R = 79C07D1C9997815B22887A01A45479B4D7E5A3C55A95FEBD30E48478297AA4B310A5144F934386C3424F2F7D9659D263
3,277,114 UART: [art] SIG.S = 05B85A1AB7097AA69CAA0C86F9CC0A5C662B8FD065738BAD3FEED6C9D18B895FC8221D5FA3C8E8ED52B58F5462B48E43
3,301,185 UART: Caliptra RT
3,301,438 UART: [state] CFI Enabled
3,409,362 UART: [rt] RT listening for mailbox commands...
3,410,025 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,439,898 UART: [rt]cmd =0x46504c54, len=4
3,441,150 >>> mbox cmd response data (8 bytes)
3,441,469 UART: [rt] FIPS self test
3,441,797 UART: [kat] ++
3,441,949 UART: [kat] sha1
3,446,077 UART: [kat] SHA2-256
3,448,099 UART: [kat] SHA2-384
3,450,858 UART: Fatal Error: 0x90020002
3,452,397 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,402 >>> mbox cmd response: failed
3,452,402 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,452,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,935,763 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,452 UART: [kat] SHA2-256
882,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,498 UART: [kat] ++
886,650 UART: [kat] sha1
890,874 UART: [kat] SHA2-256
892,812 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
902,967 UART: [kat] HMAC-384Kdf
907,613 UART: [kat] LMS
1,475,809 UART: [kat] --
1,476,746 UART: [cold-reset] ++
1,477,130 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 ready_for_fw is high
1,481,070 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,961 UART: [idev] Erasing UDS.KEYID = 0
1,505,359 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,857 UART: [idev] --
1,514,884 UART: [ldev] ++
1,515,052 UART: [ldev] CDI.KEYID = 6
1,515,415 UART: [ldev] SUBJECT.KEYID = 5
1,515,841 UART: [ldev] AUTHORITY.KEYID = 7
1,516,304 UART: [ldev] FE.KEYID = 1
1,521,642 UART: [ldev] Erasing FE.KEYID = 1
1,547,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,753 UART: [ldev] --
1,586,218 UART: [fwproc] Waiting for Commands...
1,586,837 UART: [fwproc] Received command 0x46574c44
1,587,628 UART: [fwproc] Received Image of size 115032 bytes
2,893,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,920,397 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,718 >>> mbox cmd response: success
3,087,790 UART: [afmc] ++
3,087,958 UART: [afmc] CDI.KEYID = 6
3,088,320 UART: [afmc] SUBJECT.KEYID = 7
3,088,745 UART: [afmc] AUTHORITY.KEYID = 5
3,123,396 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,139,680 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,140,460 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,146,188 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,152,073 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,157,763 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,165,680 UART: [afmc] --
3,166,656 UART: [cold-reset] --
3,167,360 UART: [state] Locking Datavault
3,168,753 UART: [state] Locking PCR0, PCR1 and PCR31
3,169,357 UART: [state] Locking ICCM
3,170,007 UART: [exit] Launching FMC @ 0x40000130
3,175,336 UART:
3,175,352 UART: Running Caliptra FMC ...
3,175,760 UART:
3,175,903 UART: [state] CFI Enabled
3,186,448 UART: [fht] FMC Alias Private Key: 7
3,294,753 UART: [art] Extend RT PCRs Done
3,295,181 UART: [art] Lock RT PCRs Done
3,296,801 UART: [art] Populate DV Done
3,304,856 UART: [fht] FMC Alias Private Key: 7
3,305,790 UART: [art] Derive CDI
3,306,070 UART: [art] Store in in slot 0x4
3,391,875 UART: [art] Derive Key Pair
3,392,235 UART: [art] Store priv key in slot 0x5
3,405,347 UART: [art] Derive Key Pair - Done
3,420,050 UART: [art] Signing Cert with AUTHO
3,420,530 UART: RITY.KEYID = 7
3,435,706 UART: [art] Erasing AUTHORITY.KEYID = 7
3,436,471 UART: [art] PUB.X = 0E4473D330598222C3931B2C40EBA5C3C7A8F50C8D0072D1CD487B9BAB3B0231810987CD1B870727E8B106A724BFA254
3,443,201 UART: [art] PUB.Y = A9E07A9C63D5D5FE56E871FEEE63AB8C42DA6FBACC4B0F79238B217A211F292266E2E1A7CA72C67AFD172CCFBD7160E5
3,450,172 UART: [art] SIG.R = 0FFC125CBA571F4B2C860E3957DB8A6F32B41580A0A5C69FC54698637BC16EA2E69BA8985A6E1D0D3C1282CDB2DE090E
3,456,941 UART: [art] SIG.S = 7CD88BA849410E7B51D4DD6053CED2E73EB6372968A616B80DC592198671733EDAF552BB0675CEEEA63B39F56F3D2D55
3,481,055 UART: Caliptra RT
3,481,400 UART: [state] CFI Enabled
3,589,352 UART: [rt] RT listening for mailbox commands...
3,590,015 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,620,078 UART: [rt]cmd =0x46504c54, len=4
3,621,448 >>> mbox cmd response data (8 bytes)
3,621,589 UART: [rt] FIPS self test
3,621,917 UART: [kat] ++
3,622,069 UART: [kat] sha1
3,626,353 UART: [kat] SHA2-256
3,628,375 UART: [kat] SHA2-384
3,631,018 UART: Fatal Error: 0x90020002
3,632,557 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,632,562 >>> mbox cmd response: failed
3,632,562 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,632,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,742 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,620 UART: [kat] SHA2-256
892,558 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,581 UART: [kat] HMAC-384Kdf
907,289 UART: [kat] LMS
1,475,485 UART: [kat] --
1,476,176 UART: [cold-reset] ++
1,476,616 UART: [fht] Storing FHT @ 0x50003400
1,479,401 UART: [idev] ++
1,479,569 UART: [idev] CDI.KEYID = 6
1,479,929 UART: [idev] SUBJECT.KEYID = 7
1,480,353 UART: [idev] UDS.KEYID = 0
1,480,698 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,505,409 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,187 UART: [idev] --
1,515,158 UART: [ldev] ++
1,515,326 UART: [ldev] CDI.KEYID = 6
1,515,689 UART: [ldev] SUBJECT.KEYID = 5
1,516,115 UART: [ldev] AUTHORITY.KEYID = 7
1,516,578 UART: [ldev] FE.KEYID = 1
1,522,200 UART: [ldev] Erasing FE.KEYID = 1
1,547,295 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,039 UART: [ldev] --
1,586,544 UART: [fwproc] Waiting for Commands...
1,587,289 UART: [fwproc] Received command 0x46574c44
1,588,080 UART: [fwproc] Received Image of size 115032 bytes
2,892,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,919,683 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,949,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,086,004 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,910 ready_for_fw is high
1,362,910 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,750 >>> mbox cmd response: success
3,000,250 UART:
3,000,266 UART: Running Caliptra FMC ...
3,000,674 UART:
3,000,817 UART: [state] CFI Enabled
3,011,516 UART: [fht] FMC Alias Private Key: 7
3,119,947 UART: [art] Extend RT PCRs Done
3,120,375 UART: [art] Lock RT PCRs Done
3,121,709 UART: [art] Populate DV Done
3,130,044 UART: [fht] FMC Alias Private Key: 7
3,131,180 UART: [art] Derive CDI
3,131,460 UART: [art] Store in in slot 0x4
3,217,257 UART: [art] Derive Key Pair
3,217,617 UART: [art] Store priv key in slot 0x5
3,231,117 UART: [art] Derive Key Pair - Done
3,245,751 UART: [art] Signing Cert with AUTHO
3,246,231 UART: RITY.KEYID = 7
3,261,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,262,530 UART: [art] PUB.X = D7C0F59D650BF2553F1162DA7D2D9042A1CA9ED23E83FDB8592E9B982FA6DF819B98F5941B7D1781697DED67EBA14A43
3,269,309 UART: [art] PUB.Y = 00D93B58D428A78E0451EB6BE5A6786EEDDCAFA48F6D820263080EC48F4E34E05B491B67E85556E567BB4173BBE90AF8
3,276,232 UART: [art] SIG.R = ED045FDF19CF797F403CBBAA999C8A47F207DCA730EFFF33E68AD732767EC67841D5A5B69053B23EF19226FB703D225D
3,283,010 UART: [art] SIG.S = B68626B2085AD0A08366199AB70CF29C00B34AEC0298B2B84C5FEDEE57447E75430D6F3011A365B12952A7B03B89361B
3,307,037 UART: Caliptra RT
3,307,382 UART: [state] CFI Enabled
3,414,764 UART: [rt] RT listening for mailbox commands...
3,415,427 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,445,268 UART: [rt]cmd =0x46504c54, len=4
3,446,486 >>> mbox cmd response data (8 bytes)
3,446,709 UART: [rt] FIPS self test
3,447,037 UART: [kat] ++
3,447,189 UART: [kat] sha1
3,451,559 UART: [kat] SHA2-256
3,453,581 UART: [kat] SHA2-384
3,456,376 UART: Fatal Error: 0x90020002
3,457,915 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,457,920 >>> mbox cmd response: failed
3,457,920 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,457,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,078 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,937,560 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
893,180 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,305 UART: [kat] ++
897,457 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,220 UART: [kat] SHA2-512-ACC
908,121 UART: [kat] ECC-384
917,776 UART: [kat] HMAC-384Kdf
922,486 UART: [kat] LMS
1,170,814 UART: [kat] --
1,171,525 UART: [cold-reset] ++
1,171,935 UART: [fht] FHT @ 0x50003400
1,174,618 UART: [idev] ++
1,174,786 UART: [idev] CDI.KEYID = 6
1,175,146 UART: [idev] SUBJECT.KEYID = 7
1,175,570 UART: [idev] UDS.KEYID = 0
1,175,915 ready_for_fw is high
1,175,915 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,533 UART: [idev] Sha1 KeyId Algorithm
1,209,095 UART: [idev] --
1,209,947 UART: [ldev] ++
1,210,115 UART: [ldev] CDI.KEYID = 6
1,210,478 UART: [ldev] SUBJECT.KEYID = 5
1,210,904 UART: [ldev] AUTHORITY.KEYID = 7
1,211,367 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,595 UART: [ldev] --
1,282,054 UART: [fwproc] Wait for Commands...
1,282,626 UART: [fwproc] Recv command 0x46574c44
1,283,354 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,515 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,819 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,568 >>> mbox cmd response: success
2,782,772 UART: [afmc] ++
2,782,940 UART: [afmc] CDI.KEYID = 6
2,783,302 UART: [afmc] SUBJECT.KEYID = 7
2,783,727 UART: [afmc] AUTHORITY.KEYID = 5
2,819,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,103 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,831 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,848,716 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,854,435 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,862,091 UART: [afmc] --
2,863,073 UART: [cold-reset] --
2,863,881 UART: [state] Locking Datavault
2,865,126 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,730 UART: [state] Locking ICCM
2,866,362 UART: [exit] Launching FMC @ 0x40000130
2,871,691 UART:
2,871,707 UART: Running Caliptra FMC ...
2,872,115 UART:
2,872,169 UART: [state] CFI Enabled
2,882,832 UART: [fht] FMC Alias Private Key: 7
2,990,375 UART: [art] Extend RT PCRs Done
2,990,803 UART: [art] Lock RT PCRs Done
2,992,329 UART: [art] Populate DV Done
3,000,426 UART: [fht] FMC Alias Private Key: 7
3,001,570 UART: [art] Derive CDI
3,001,850 UART: [art] Store in in slot 0x4
3,087,203 UART: [art] Derive Key Pair
3,087,563 UART: [art] Store priv key in slot 0x5
3,100,167 UART: [art] Derive Key Pair - Done
3,114,910 UART: [art] Signing Cert with AUTHO
3,115,390 UART: RITY.KEYID = 7
3,130,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,943 UART: [art] PUB.X = 617A7503CAF31142A082CCBA8F4237BE7F785E1625DAE6122675806433BE4BA0ABF495EF5C6AE4FCC1BB3B3BD9DC0A55
3,137,725 UART: [art] PUB.Y = 7435F631975F04DBA7F19F3580CB69D0C3721A4CB81DC2A2FED9610FB6515D937553056CFEE8EEEFF5EC814801C3FEA9
3,144,677 UART: [art] SIG.R = 55706F47F7B460BC27495432E2CB323A4C11FD423EE479696C847A073404E005BC9A216B15533623A8A183FA29396153
3,151,426 UART: [art] SIG.S = EBCF7E86E53DA2806A176F7107F6139EFBA57EF443E2A8DD17A55DCDC25DF2FDD6266E5D90092B9F23C46EF4B1A53D9F
3,174,829 UART: Caliptra RT
3,175,082 UART: [state] CFI Enabled
3,282,313 UART: [rt] RT listening for mailbox commands...
3,282,976 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,312,545 UART: [rt]cmd =0x46504c54, len=4
3,313,891 >>> mbox cmd response data (8 bytes)
3,314,184 UART: [rt] FIPS self test
3,314,512 UART: [kat] ++
3,314,664 UART: [kat] sha1
3,318,944 UART: [kat] SHA2-256
3,320,966 UART: [kat] SHA2-384
3,323,655 UART: Fatal Error: 0x90020002
3,325,194 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,199 >>> mbox cmd response: failed
3,325,199 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,204 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,730 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
86,097 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,559 UART: [kat] SHA2-256
903,499 UART: [kat] SHA2-384
906,270 UART: [kat] SHA2-512-ACC
908,171 UART: [kat] ECC-384
917,546 UART: [kat] HMAC-384Kdf
922,160 UART: [kat] LMS
1,170,488 UART: [kat] --
1,170,931 UART: [cold-reset] ++
1,171,407 UART: [fht] FHT @ 0x50003400
1,174,110 UART: [idev] ++
1,174,278 UART: [idev] CDI.KEYID = 6
1,174,638 UART: [idev] SUBJECT.KEYID = 7
1,175,062 UART: [idev] UDS.KEYID = 0
1,175,407 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,974 UART: [idev] Erasing UDS.KEYID = 0
1,200,093 UART: [idev] Sha1 KeyId Algorithm
1,208,637 UART: [idev] --
1,209,659 UART: [ldev] ++
1,209,827 UART: [ldev] CDI.KEYID = 6
1,210,190 UART: [ldev] SUBJECT.KEYID = 5
1,210,616 UART: [ldev] AUTHORITY.KEYID = 7
1,211,079 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,208 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,553 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,645,857 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,782,812 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,515 ready_for_fw is high
1,060,515 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,959 >>> mbox cmd response: success
2,697,563 UART:
2,697,579 UART: Running Caliptra FMC ...
2,697,987 UART:
2,698,041 UART: [state] CFI Enabled
2,708,382 UART: [fht] FMC Alias Private Key: 7
2,816,575 UART: [art] Extend RT PCRs Done
2,817,003 UART: [art] Lock RT PCRs Done
2,818,257 UART: [art] Populate DV Done
2,826,424 UART: [fht] FMC Alias Private Key: 7
2,827,430 UART: [art] Derive CDI
2,827,710 UART: [art] Store in in slot 0x4
2,913,009 UART: [art] Derive Key Pair
2,913,369 UART: [art] Store priv key in slot 0x5
2,926,967 UART: [art] Derive Key Pair - Done
2,941,778 UART: [art] Signing Cert with AUTHO
2,942,258 UART: RITY.KEYID = 7
2,957,628 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,393 UART: [art] PUB.X = B6EAF79431E520047E78735A93FD7F0A1C2A0BFE8CF4706F2038337A78A62021139C020A067C52106A2B00679D23C6E4
2,965,119 UART: [art] PUB.Y = 2141FE6996C4877283AFA786FA4EA77E0F7A1E83C90684926BD9BC669FF2CC8EBE4CC6E4BF6898522F8C83EE3D3E3B3A
2,972,079 UART: [art] SIG.R = 8D96D840F3BC73F499645F4D4180CB3C2EB1737A282078F71AC4A386B2F2CD4E88EE8843556DE50AB8AFE54411D63F52
2,978,852 UART: [art] SIG.S = 9E26182708928490DAED10B8F05F6CFD91037D3613F8DB34D8248781D7822763120FC5A7B14D3036CA37F773418945BE
3,002,194 UART: Caliptra RT
3,002,447 UART: [state] CFI Enabled
3,110,051 UART: [rt] RT listening for mailbox commands...
3,110,714 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,503 UART: [rt]cmd =0x46504c54, len=4
3,141,863 >>> mbox cmd response data (8 bytes)
3,142,004 UART: [rt] FIPS self test
3,142,332 UART: [kat] ++
3,142,484 UART: [kat] sha1
3,146,686 UART: [kat] SHA2-256
3,148,708 UART: [kat] SHA2-384
3,151,391 UART: Fatal Error: 0x90020002
3,152,930 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,935 >>> mbox cmd response: failed
3,152,935 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,787 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,634,373 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
902,062 UART: [kat] SHA2-256
904,002 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,373 UART: [kat] HMAC-384Kdf
923,125 UART: [kat] LMS
1,171,453 UART: [kat] --
1,172,278 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 ready_for_fw is high
1,176,572 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,211 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,052 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,218,022 UART: [ldev] Erasing FE.KEYID = 1
1,244,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,838 UART: [ldev] --
1,283,259 UART: [fwproc] Wait for Commands...
1,283,953 UART: [fwproc] Recv command 0x46574c44
1,284,681 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,881 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,196 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,500 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,389 >>> mbox cmd response: success
2,784,571 UART: [afmc] ++
2,784,739 UART: [afmc] CDI.KEYID = 6
2,785,101 UART: [afmc] SUBJECT.KEYID = 7
2,785,526 UART: [afmc] AUTHORITY.KEYID = 5
2,821,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,772 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,500 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,385 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,104 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,864,122 UART: [afmc] --
2,865,120 UART: [cold-reset] --
2,866,060 UART: [state] Locking Datavault
2,867,229 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,833 UART: [state] Locking ICCM
2,868,431 UART: [exit] Launching FMC @ 0x40000130
2,873,760 UART:
2,873,776 UART: Running Caliptra FMC ...
2,874,184 UART:
2,874,327 UART: [state] CFI Enabled
2,884,792 UART: [fht] FMC Alias Private Key: 7
2,992,069 UART: [art] Extend RT PCRs Done
2,992,497 UART: [art] Lock RT PCRs Done
2,994,031 UART: [art] Populate DV Done
3,002,388 UART: [fht] FMC Alias Private Key: 7
3,003,500 UART: [art] Derive CDI
3,003,780 UART: [art] Store in in slot 0x4
3,089,701 UART: [art] Derive Key Pair
3,090,061 UART: [art] Store priv key in slot 0x5
3,103,837 UART: [art] Derive Key Pair - Done
3,118,436 UART: [art] Signing Cert with AUTHO
3,118,916 UART: RITY.KEYID = 7
3,134,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,057 UART: [art] PUB.X = AFA86D3BDADDB8F20C6A2B658624A798DB2406180296C13445AC37A79F4BAAF4AE09F600367DD98E068EC9303C1471BD
3,141,802 UART: [art] PUB.Y = 4C09171B831FA9D033432C49CCDB21CFFEDEA94AECCAB9A73608332D73ADCCA937D411F27A2DAB331D3777D693A186C6
3,148,764 UART: [art] SIG.R = 42E71D030C9ED330B728C847A2E7018FA2CB6CE09FC941972D305C5D31C59D0D567FDF6497BE6C1C3EB1CA250B659821
3,155,527 UART: [art] SIG.S = 5729B1E7C152B266850B8DDF81EC20C3FC00E79A429C515AD249FDC2C01421FBA8EADFB2CECA1A551CF11E291725A05F
3,179,253 UART: Caliptra RT
3,179,598 UART: [state] CFI Enabled
3,287,305 UART: [rt] RT listening for mailbox commands...
3,287,968 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,941 UART: [rt]cmd =0x46504c54, len=4
3,318,979 >>> mbox cmd response data (8 bytes)
3,319,220 UART: [rt] FIPS self test
3,319,548 UART: [kat] ++
3,319,700 UART: [kat] sha1
3,323,904 UART: [kat] SHA2-256
3,325,926 UART: [kat] SHA2-384
3,328,457 UART: Fatal Error: 0x90020002
3,329,996 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,330,001 >>> mbox cmd response: failed
3,330,001 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,330,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Unprovisioned
86,508 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,433 UART: [kat] SHA2-256
894,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,208 UART: [kat] ++
898,360 UART: [kat] sha1
902,540 UART: [kat] SHA2-256
904,480 UART: [kat] SHA2-384
907,135 UART: [kat] SHA2-512-ACC
909,036 UART: [kat] ECC-384
918,711 UART: [kat] HMAC-384Kdf
923,457 UART: [kat] LMS
1,171,785 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,172,902 UART: [fht] FHT @ 0x50003400
1,175,491 UART: [idev] ++
1,175,659 UART: [idev] CDI.KEYID = 6
1,176,019 UART: [idev] SUBJECT.KEYID = 7
1,176,443 UART: [idev] UDS.KEYID = 0
1,176,788 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,479 UART: [idev] Erasing UDS.KEYID = 0
1,202,122 UART: [idev] Sha1 KeyId Algorithm
1,210,568 UART: [idev] --
1,211,570 UART: [ldev] ++
1,211,738 UART: [ldev] CDI.KEYID = 6
1,212,101 UART: [ldev] SUBJECT.KEYID = 5
1,212,527 UART: [ldev] AUTHORITY.KEYID = 7
1,212,990 UART: [ldev] FE.KEYID = 1
1,218,242 UART: [ldev] Erasing FE.KEYID = 1
1,244,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,044 UART: [ldev] --
1,283,375 UART: [fwproc] Wait for Commands...
1,283,989 UART: [fwproc] Recv command 0x46574c44
1,284,717 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,301 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,386 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,646,690 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,445 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,180 ready_for_fw is high
1,060,180 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,510 >>> mbox cmd response: success
2,695,872 UART:
2,695,888 UART: Running Caliptra FMC ...
2,696,296 UART:
2,696,439 UART: [state] CFI Enabled
2,707,440 UART: [fht] FMC Alias Private Key: 7
2,815,241 UART: [art] Extend RT PCRs Done
2,815,669 UART: [art] Lock RT PCRs Done
2,816,937 UART: [art] Populate DV Done
2,824,976 UART: [fht] FMC Alias Private Key: 7
2,825,912 UART: [art] Derive CDI
2,826,192 UART: [art] Store in in slot 0x4
2,911,957 UART: [art] Derive Key Pair
2,912,317 UART: [art] Store priv key in slot 0x5
2,925,835 UART: [art] Derive Key Pair - Done
2,940,465 UART: [art] Signing Cert with AUTHO
2,940,945 UART: RITY.KEYID = 7
2,956,275 UART: [art] Erasing AUTHORITY.KEYID = 7
2,957,040 UART: [art] PUB.X = 227AAC8FA6FE02329A631A5EF4047F17CE655555F63B65C5E407C9CBD1CEC9F463FC4F621FC1D5CD91A0306FD49A4345
2,963,815 UART: [art] PUB.Y = B74074A694C289EF1A82B5D9262F1DF3ABBE1A821D5F4B816B5984BFBB160A0041722794E373EDA615E94781426493F8
2,970,740 UART: [art] SIG.R = 039A9658D39D35350D6A5081D3BE58F6C7E3B7DF7E31057EC78835639997BD020A3FC6FF1D6DF923EA07B7159C44ECEB
2,977,500 UART: [art] SIG.S = 8A409AD73F9EF5DA20782318EEB61CC6E27C81D5D80473633857AA45B94EADB9D7417231CF7C2CF160BED55C66D6BEB0
3,001,800 UART: Caliptra RT
3,002,145 UART: [state] CFI Enabled
3,109,858 UART: [rt] RT listening for mailbox commands...
3,110,521 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,720 UART: [rt]cmd =0x46504c54, len=4
3,141,786 >>> mbox cmd response data (8 bytes)
3,141,925 UART: [rt] FIPS self test
3,142,253 UART: [kat] ++
3,142,405 UART: [kat] sha1
3,146,637 UART: [kat] SHA2-256
3,148,659 UART: [kat] SHA2-384
3,151,444 UART: Fatal Error: 0x90020002
3,152,983 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,988 >>> mbox cmd response: failed
3,152,988 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,152,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,734 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,637,336 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,702 UART: [kat] LMS
1,169,014 UART: [kat] --
1,169,861 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,174,127 ready_for_fw is high
1,174,127 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,197,951 UART: [idev] Sha1 KeyId Algorithm
1,206,799 UART: [idev] --
1,207,820 UART: [ldev] ++
1,207,988 UART: [ldev] CDI.KEYID = 6
1,208,352 UART: [ldev] SUBJECT.KEYID = 5
1,208,779 UART: [ldev] AUTHORITY.KEYID = 7
1,209,242 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,922 UART: [fwproc] Wait for Commands...
1,281,747 UART: [fwproc] Recv command 0x46574c44
1,282,480 UART: [fwproc] Recv'd Img size: 115032 bytes
2,586,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,163 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,643,472 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,386 >>> mbox cmd response: success
2,781,623 UART: [afmc] ++
2,781,791 UART: [afmc] CDI.KEYID = 6
2,782,154 UART: [afmc] SUBJECT.KEYID = 7
2,782,580 UART: [afmc] AUTHORITY.KEYID = 5
2,817,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,008 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,840,737 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,846,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,339 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,068 UART: [afmc] --
2,861,048 UART: [cold-reset] --
2,861,918 UART: [state] Locking Datavault
2,863,323 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,927 UART: [state] Locking ICCM
2,864,431 UART: [exit] Launching FMC @ 0x40000130
2,869,760 UART:
2,869,776 UART: Running Caliptra FMC ...
2,870,184 UART:
2,870,238 UART: [state] CFI Enabled
2,880,929 UART: [fht] FMC Alias Private Key: 7
2,989,032 UART: [art] Extend RT PCRs Done
2,989,460 UART: [art] Lock RT PCRs Done
2,991,076 UART: [art] Populate DV Done
2,999,327 UART: [fht] FMC Alias Private Key: 7
3,000,463 UART: [art] Derive CDI
3,000,743 UART: [art] Store in in slot 0x4
3,086,012 UART: [art] Derive Key Pair
3,086,372 UART: [art] Store priv key in slot 0x5
3,099,750 UART: [art] Derive Key Pair - Done
3,114,838 UART: [art] Signing Cert with AUTHO
3,115,318 UART: RITY.KEYID = 7
3,130,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,131,497 UART: [art] PUB.X = 4E1C5608807A5D379F0DCEB0596307690322782A25964C3ABF6B2950B5C4F8926A638D18F4FBCD1FF0D16D39D616FE2A
3,138,259 UART: [art] PUB.Y = F998762872BB61BA544E86285B2D8FA5EA216BAD1EBC85D312E84C6F90479ED6D5BBA79A6B50950EE32630D9136C1FA4
3,145,216 UART: [art] SIG.R = 834F87AE014C431F296B52A5FFC7E84AD178950A03B2F6266E606DEF055C89B8EEDE2C21E1666E061D710C0B2F936284
3,151,969 UART: [art] SIG.S = F9AC6B725FFA3344CB2CE79623559362C317804101637C9E0916D444500A8A4D8FB67AED462A749576F93930557D7199
3,176,361 UART: Caliptra RT
3,176,614 UART: [state] CFI Enabled
3,283,340 UART: [rt] RT listening for mailbox commands...
3,284,003 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,652 UART: [rt]cmd =0x46504c54, len=4
3,314,896 >>> mbox cmd response data (8 bytes)
3,315,131 UART: [rt] FIPS self test
3,315,459 UART: [kat] ++
3,315,611 UART: [kat] sha1
3,319,633 UART: [kat] SHA2-256
3,321,655 UART: [kat] SHA2-384
3,324,374 UART: Fatal Error: 0x90020002
3,325,913 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,918 >>> mbox cmd response: failed
3,325,918 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,325,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
891,090 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,369 UART: [kat] SHA2-256
901,309 UART: [kat] SHA2-384
903,964 UART: [kat] SHA2-512-ACC
905,865 UART: [kat] ECC-384
915,754 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,629 UART: [cold-reset] ++
1,169,955 UART: [fht] FHT @ 0x50003400
1,172,717 UART: [idev] ++
1,172,885 UART: [idev] CDI.KEYID = 6
1,173,246 UART: [idev] SUBJECT.KEYID = 7
1,173,671 UART: [idev] UDS.KEYID = 0
1,174,017 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,197,757 UART: [idev] Sha1 KeyId Algorithm
1,206,709 UART: [idev] --
1,207,658 UART: [ldev] ++
1,207,826 UART: [ldev] CDI.KEYID = 6
1,208,190 UART: [ldev] SUBJECT.KEYID = 5
1,208,617 UART: [ldev] AUTHORITY.KEYID = 7
1,209,080 UART: [ldev] FE.KEYID = 1
1,214,400 UART: [ldev] Erasing FE.KEYID = 1
1,240,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,092 UART: [ldev] --
1,280,502 UART: [fwproc] Wait for Commands...
1,281,131 UART: [fwproc] Recv command 0x46574c44
1,281,864 UART: [fwproc] Recv'd Img size: 115032 bytes
2,587,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,901 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,210 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,780,980 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,730 ready_for_fw is high
1,055,730 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,628,414 >>> mbox cmd response: success
2,690,728 UART:
2,690,744 UART: Running Caliptra FMC ...
2,691,152 UART:
2,691,206 UART: [state] CFI Enabled
2,701,533 UART: [fht] FMC Alias Private Key: 7
2,809,528 UART: [art] Extend RT PCRs Done
2,809,956 UART: [art] Lock RT PCRs Done
2,811,572 UART: [art] Populate DV Done
2,819,843 UART: [fht] FMC Alias Private Key: 7
2,821,017 UART: [art] Derive CDI
2,821,297 UART: [art] Store in in slot 0x4
2,907,122 UART: [art] Derive Key Pair
2,907,482 UART: [art] Store priv key in slot 0x5
2,920,498 UART: [art] Derive Key Pair - Done
2,934,878 UART: [art] Signing Cert with AUTHO
2,935,358 UART: RITY.KEYID = 7
2,950,902 UART: [art] Erasing AUTHORITY.KEYID = 7
2,951,667 UART: [art] PUB.X = FD6FFE7A0B0D7EA8E510E799574A6B208C5BD2EC93214794ADE66837C5B7A3DAF5E0E1DD14DD7FBC5CA877F812A37DB0
2,958,455 UART: [art] PUB.Y = AE420B33BA92E034BAE2E59C47C2D75BF49356F92B146C5B4829DD8CBB0B8AD70FBC7198E3D6F14D5B32831A39F9C99E
2,965,412 UART: [art] SIG.R = 0C6EEF6719603656E0E39724AE7EA7C49B7B07358C1D206949671B91C9E7F8847C713986EA6C7742011C59D3D19E1673
2,972,165 UART: [art] SIG.S = EC92E0FB9770B11C274889DB1A860DCD71A51052F1BC8B9F34633A017800DC5E8B87C3622DBF8D2E9C03AEE59ACCB739
2,996,501 UART: Caliptra RT
2,996,754 UART: [state] CFI Enabled
3,104,433 UART: [rt] RT listening for mailbox commands...
3,105,096 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,134,937 UART: [rt]cmd =0x46504c54, len=4
3,136,207 >>> mbox cmd response data (8 bytes)
3,136,480 UART: [rt] FIPS self test
3,136,808 UART: [kat] ++
3,136,960 UART: [kat] sha1
3,141,284 UART: [kat] SHA2-256
3,143,306 UART: [kat] SHA2-384
3,146,089 UART: Fatal Error: 0x90020002
3,147,628 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,147,633 >>> mbox cmd response: failed
3,147,633 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,147,638 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,502 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,629,254 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,615 UART: [state] LifecycleState = Unprovisioned
86,270 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
891,663 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,792 UART: [kat] ++
895,944 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,943 UART: [kat] LMS
1,169,255 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,606 UART: [fht] FHT @ 0x50003400
1,173,096 UART: [idev] ++
1,173,264 UART: [idev] CDI.KEYID = 6
1,173,625 UART: [idev] SUBJECT.KEYID = 7
1,174,050 UART: [idev] UDS.KEYID = 0
1,174,396 ready_for_fw is high
1,174,396 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,230 UART: [idev] Erasing UDS.KEYID = 0
1,199,452 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,243,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,349 UART: [ldev] --
1,282,643 UART: [fwproc] Wait for Commands...
1,283,410 UART: [fwproc] Recv command 0x46574c44
1,284,143 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,426 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,735 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,511 >>> mbox cmd response: success
2,782,730 UART: [afmc] ++
2,782,898 UART: [afmc] CDI.KEYID = 6
2,783,261 UART: [afmc] SUBJECT.KEYID = 7
2,783,687 UART: [afmc] AUTHORITY.KEYID = 5
2,819,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,323 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,842,052 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,935 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,654 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,589 UART: [afmc] --
2,862,509 UART: [cold-reset] --
2,863,349 UART: [state] Locking Datavault
2,864,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,352 UART: [state] Locking ICCM
2,865,980 UART: [exit] Launching FMC @ 0x40000130
2,871,309 UART:
2,871,325 UART: Running Caliptra FMC ...
2,871,733 UART:
2,871,876 UART: [state] CFI Enabled
2,882,759 UART: [fht] FMC Alias Private Key: 7
2,990,558 UART: [art] Extend RT PCRs Done
2,990,986 UART: [art] Lock RT PCRs Done
2,992,652 UART: [art] Populate DV Done
3,000,969 UART: [fht] FMC Alias Private Key: 7
3,001,965 UART: [art] Derive CDI
3,002,245 UART: [art] Store in in slot 0x4
3,088,044 UART: [art] Derive Key Pair
3,088,404 UART: [art] Store priv key in slot 0x5
3,101,336 UART: [art] Derive Key Pair - Done
3,116,107 UART: [art] Signing Cert with AUTHO
3,116,587 UART: RITY.KEYID = 7
3,131,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,596 UART: [art] PUB.X = AC3A038618932F775B3C35F1382645A4EC883043E467A198AFC0E970CF515DB6E117BD1E6F7F52DFA0113EEC93F61CAC
3,139,373 UART: [art] PUB.Y = 0BAEB1EEB253E8D87BE0D3C8DCA56214FBE6CCCC26829B90B7B65FD9627A571AD6B2CADB698097A5236BA7F940748297
3,146,338 UART: [art] SIG.R = EB555D4B4E47BDF2C97F352F12905F460392E820FF5E13677DD0E7A1222D6B45A4DB64A9BACA342677D603A3C45A16E6
3,153,110 UART: [art] SIG.S = 64BBE296E04E5438CCB6AE040839930FD07276E63B7B88E51A945707E5CB61A014CC8CED0E281555BAD23035BEFC86F6
3,176,882 UART: Caliptra RT
3,177,227 UART: [state] CFI Enabled
3,285,096 UART: [rt] RT listening for mailbox commands...
3,285,759 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,862 UART: [rt]cmd =0x46504c54, len=4
3,317,164 >>> mbox cmd response data (8 bytes)
3,317,431 UART: [rt] FIPS self test
3,317,759 UART: [kat] ++
3,317,911 UART: [kat] sha1
3,322,211 UART: [kat] SHA2-256
3,324,233 UART: [kat] SHA2-384
3,327,062 UART: Fatal Error: 0x90020002
3,328,601 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,328,606 >>> mbox cmd response: failed
3,328,606 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,328,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,693 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,880 UART: [kat] ++
896,032 UART: [kat] sha1
900,422 UART: [kat] SHA2-256
902,362 UART: [kat] SHA2-384
905,107 UART: [kat] SHA2-512-ACC
907,008 UART: [kat] ECC-384
916,905 UART: [kat] HMAC-384Kdf
921,637 UART: [kat] LMS
1,169,949 UART: [kat] --
1,170,784 UART: [cold-reset] ++
1,171,198 UART: [fht] FHT @ 0x50003400
1,173,670 UART: [idev] ++
1,173,838 UART: [idev] CDI.KEYID = 6
1,174,199 UART: [idev] SUBJECT.KEYID = 7
1,174,624 UART: [idev] UDS.KEYID = 0
1,174,970 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,446 UART: [idev] Sha1 KeyId Algorithm
1,209,382 UART: [idev] --
1,210,379 UART: [ldev] ++
1,210,547 UART: [ldev] CDI.KEYID = 6
1,210,911 UART: [ldev] SUBJECT.KEYID = 5
1,211,338 UART: [ldev] AUTHORITY.KEYID = 7
1,211,801 UART: [ldev] FE.KEYID = 1
1,216,877 UART: [ldev] Erasing FE.KEYID = 1
1,243,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,597 UART: [ldev] --
1,283,065 UART: [fwproc] Wait for Commands...
1,283,872 UART: [fwproc] Recv command 0x46574c44
1,284,605 UART: [fwproc] Recv'd Img size: 115032 bytes
2,590,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,209 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,784,111 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,801 ready_for_fw is high
1,055,801 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,630,987 >>> mbox cmd response: success
2,693,229 UART:
2,693,245 UART: Running Caliptra FMC ...
2,693,653 UART:
2,693,796 UART: [state] CFI Enabled
2,704,381 UART: [fht] FMC Alias Private Key: 7
2,812,918 UART: [art] Extend RT PCRs Done
2,813,346 UART: [art] Lock RT PCRs Done
2,814,984 UART: [art] Populate DV Done
2,823,365 UART: [fht] FMC Alias Private Key: 7
2,824,537 UART: [art] Derive CDI
2,824,817 UART: [art] Store in in slot 0x4
2,910,414 UART: [art] Derive Key Pair
2,910,774 UART: [art] Store priv key in slot 0x5
2,924,344 UART: [art] Derive Key Pair - Done
2,939,054 UART: [art] Signing Cert with AUTHO
2,939,534 UART: RITY.KEYID = 7
2,954,664 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,429 UART: [art] PUB.X = 07BBCCE89BF9EADFA3D15E20F1A1D9FBA7AE0D3A6F5916A69DF989011C473011D7BD47097CFC059B3E808CA32B40F645
2,962,204 UART: [art] PUB.Y = 7B0E8A33CAF2EA373F5D4050D305A82EF8733DA136C15A22EEA73258A2E4442E88C9F829B35EF6815B28B95C1865CDF2
2,969,156 UART: [art] SIG.R = 8A1101145237F685AE90639A4D88A6595AE477C3AD6BD4FA2090A534CFA8E801C7A4CB4C45E6F392FA888476392EC59F
2,975,924 UART: [art] SIG.S = C872C17B92B622083DE5DA7418AA4693B3E75D45198FBB7896AF340C45D2CB7FED29704C8E4E3311415D084262F5141A
2,999,334 UART: Caliptra RT
2,999,679 UART: [state] CFI Enabled
3,107,799 UART: [rt] RT listening for mailbox commands...
3,108,462 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,138,159 UART: [rt]cmd =0x46504c54, len=4
3,139,289 >>> mbox cmd response data (8 bytes)
3,139,520 UART: [rt] FIPS self test
3,139,848 UART: [kat] ++
3,140,000 UART: [kat] sha1
3,144,338 UART: [kat] SHA2-256
3,146,360 UART: [kat] SHA2-384
3,149,011 UART: Fatal Error: 0x90020002
3,150,550 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,150,555 >>> mbox cmd response: failed
3,150,555 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,150,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,401 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,631,943 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,180 UART:
192,524 UART: Running Caliptra ROM ...
193,667 UART:
193,821 UART: [state] CFI Enabled
261,734 UART: [state] LifecycleState = Unprovisioned
263,670 UART: [state] DebugLocked = No
265,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,108 UART: [kat] SHA2-256
438,765 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,308 UART: [kat] ++
449,840 UART: [kat] sha1
461,624 UART: [kat] SHA2-256
464,302 UART: [kat] SHA2-384
471,365 UART: [kat] SHA2-512-ACC
473,761 UART: [kat] ECC-384
2,764,869 UART: [kat] HMAC-384Kdf
2,798,008 UART: [kat] LMS
3,988,296 UART: [kat] --
3,993,765 UART: [cold-reset] ++
3,995,110 UART: [fht] Storing FHT @ 0x50003400
4,006,544 UART: [idev] ++
4,007,115 UART: [idev] CDI.KEYID = 6
4,008,077 UART: [idev] SUBJECT.KEYID = 7
4,009,300 UART: [idev] UDS.KEYID = 0
4,010,429 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,032,240 UART: [idev] Erasing UDS.KEYID = 0
7,342,348 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,142 UART: [idev] --
7,366,870 UART: [ldev] ++
7,367,491 UART: [ldev] CDI.KEYID = 6
7,368,371 UART: [ldev] SUBJECT.KEYID = 5
7,369,639 UART: [ldev] AUTHORITY.KEYID = 7
7,370,871 UART: [ldev] FE.KEYID = 1
7,418,848 UART: [ldev] Erasing FE.KEYID = 1
10,749,992 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,860 UART: [ldev] --
13,113,923 UART: [fwproc] Waiting for Commands...
13,116,938 UART: [fwproc] Received command 0x46505652
13,119,344 UART: [rt] FIPS Version
13,120,999 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,784,032 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,827,506 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,467 UART:
192,834 UART: Running Caliptra ROM ...
193,950 UART:
603,539 UART: [state] CFI Enabled
617,844 UART: [state] LifecycleState = Unprovisioned
619,751 UART: [state] DebugLocked = No
621,612 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,792 UART: [kat] SHA2-256
796,552 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,062 UART: [kat] ++
807,676 UART: [kat] sha1
818,939 UART: [kat] SHA2-256
821,687 UART: [kat] SHA2-384
828,794 UART: [kat] SHA2-512-ACC
831,132 UART: [kat] ECC-384
3,115,054 UART: [kat] HMAC-384Kdf
3,127,379 UART: [kat] LMS
4,317,480 UART: [kat] --
4,321,390 UART: [cold-reset] ++
4,322,352 UART: [fht] Storing FHT @ 0x50003400
4,333,842 UART: [idev] ++
4,334,404 UART: [idev] CDI.KEYID = 6
4,335,346 UART: [idev] SUBJECT.KEYID = 7
4,336,612 UART: [idev] UDS.KEYID = 0
4,337,630 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,355,149 UART: [idev] Erasing UDS.KEYID = 0
7,624,641 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,445 UART: [idev] --
7,650,310 UART: [ldev] ++
7,650,895 UART: [ldev] CDI.KEYID = 6
7,651,860 UART: [ldev] SUBJECT.KEYID = 5
7,653,075 UART: [ldev] AUTHORITY.KEYID = 7
7,654,310 UART: [ldev] FE.KEYID = 1
7,666,035 UART: [ldev] Erasing FE.KEYID = 1
10,949,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,165 UART: [ldev] --
13,309,161 UART: [fwproc] Waiting for Commands...
13,311,261 UART: [fwproc] Received command 0x46505652
13,313,683 UART: [rt] FIPS Version
13,315,299 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
4,133,089 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,056,948 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,508 UART:
192,868 UART: Running Caliptra ROM ...
194,057 UART:
194,216 UART: [state] CFI Enabled
264,195 UART: [state] LifecycleState = Unprovisioned
266,123 UART: [state] DebugLocked = No
268,702 UART: [state] WD Timer not started. Device not locked for debugging
271,922 UART: [kat] SHA2-256
451,058 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,606 UART: [kat] ++
463,151 UART: [kat] sha1
474,250 UART: [kat] SHA2-256
477,303 UART: [kat] SHA2-384
482,736 UART: [kat] SHA2-512-ACC
485,719 UART: [kat] ECC-384
2,947,521 UART: [kat] HMAC-384Kdf
2,972,715 UART: [kat] LMS
3,502,153 UART: [kat] --
3,507,558 UART: [cold-reset] ++
3,509,008 UART: [fht] FHT @ 0x50003400
3,520,427 UART: [idev] ++
3,520,990 UART: [idev] CDI.KEYID = 6
3,521,876 UART: [idev] SUBJECT.KEYID = 7
3,523,087 UART: [idev] UDS.KEYID = 0
3,524,243 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,721 UART: [idev] Erasing UDS.KEYID = 0
6,024,315 UART: [idev] Sha1 KeyId Algorithm
6,046,036 UART: [idev] --
6,050,016 UART: [ldev] ++
6,050,599 UART: [ldev] CDI.KEYID = 6
6,051,486 UART: [ldev] SUBJECT.KEYID = 5
6,052,722 UART: [ldev] AUTHORITY.KEYID = 7
6,053,964 UART: [ldev] FE.KEYID = 1
6,099,586 UART: [ldev] Erasing FE.KEYID = 1
8,605,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,526 UART: [ldev] --
10,410,601 UART: [fwproc] Wait for Commands...
10,413,618 UART: [fwproc] Recv command 0x46505652
10,415,931 UART: [rt] FIPS Version
10,417,438 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,180 writing to cptra_bootfsm_go
3,354,644 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,179,906 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
192,627 UART:
192,992 UART: Running Caliptra ROM ...
194,169 UART:
603,797 UART: [state] CFI Enabled
619,878 UART: [state] LifecycleState = Unprovisioned
621,776 UART: [state] DebugLocked = No
623,912 UART: [state] WD Timer not started. Device not locked for debugging
627,348 UART: [kat] SHA2-256
806,503 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
818,083 UART: [kat] ++
818,627 UART: [kat] sha1
829,018 UART: [kat] SHA2-256
832,087 UART: [kat] SHA2-384
838,492 UART: [kat] SHA2-512-ACC
841,421 UART: [kat] ECC-384
3,281,157 UART: [kat] HMAC-384Kdf
3,294,296 UART: [kat] LMS
3,823,786 UART: [kat] --
3,828,715 UART: [cold-reset] ++
3,829,615 UART: [fht] FHT @ 0x50003400
3,841,478 UART: [idev] ++
3,842,051 UART: [idev] CDI.KEYID = 6
3,842,972 UART: [idev] SUBJECT.KEYID = 7
3,844,188 UART: [idev] UDS.KEYID = 0
3,845,182 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,862,849 UART: [idev] Erasing UDS.KEYID = 0
6,321,542 UART: [idev] Sha1 KeyId Algorithm
6,344,554 UART: [idev] --
6,349,304 UART: [ldev] ++
6,349,874 UART: [ldev] CDI.KEYID = 6
6,350,780 UART: [ldev] SUBJECT.KEYID = 5
6,351,992 UART: [ldev] AUTHORITY.KEYID = 7
6,353,225 UART: [ldev] FE.KEYID = 1
6,362,471 UART: [ldev] Erasing FE.KEYID = 1
8,840,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,557,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,573,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,589,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,605,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,624,865 UART: [ldev] --
10,629,923 UART: [fwproc] Wait for Commands...
10,632,828 UART: [fwproc] Recv command 0x46505652
10,635,199 UART: [rt] FIPS Version
10,636,712 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,922 writing to cptra_bootfsm_go
3,700,666 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,410,541 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,314 UART:
192,703 UART: Running Caliptra ROM ...
193,856 UART:
194,010 UART: [state] CFI Enabled
262,376 UART: [state] LifecycleState = Unprovisioned
264,762 UART: [state] DebugLocked = No
266,740 UART: [state] WD Timer not started. Device not locked for debugging
272,073 UART: [kat] SHA2-256
461,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,741 UART: [kat] ++
473,213 UART: [kat] sha1
484,716 UART: [kat] SHA2-256
487,754 UART: [kat] SHA2-384
492,824 UART: [kat] SHA2-512-ACC
495,440 UART: [kat] ECC-384
2,946,785 UART: [kat] HMAC-384Kdf
2,970,460 UART: [kat] LMS
3,502,237 UART: [kat] --
3,505,981 UART: [cold-reset] ++
3,507,819 UART: [fht] FHT @ 0x50003400
3,520,214 UART: [idev] ++
3,520,931 UART: [idev] CDI.KEYID = 6
3,521,820 UART: [idev] SUBJECT.KEYID = 7
3,523,035 UART: [idev] UDS.KEYID = 0
3,524,035 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,541,690 UART: [idev] Erasing UDS.KEYID = 0
6,024,686 UART: [idev] Sha1 KeyId Algorithm
6,046,739 UART: [idev] --
6,052,304 UART: [ldev] ++
6,052,990 UART: [ldev] CDI.KEYID = 6
6,053,901 UART: [ldev] SUBJECT.KEYID = 5
6,055,064 UART: [ldev] AUTHORITY.KEYID = 7
6,056,301 UART: [ldev] FE.KEYID = 1
6,097,746 UART: [ldev] Erasing FE.KEYID = 1
8,603,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,800 UART: [ldev] --
10,414,052 UART: [fwproc] Wait for Commands...
10,417,237 UART: [fwproc] Recv command 0x46505652
10,419,776 UART: [rt] FIPS Version
10,421,512 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,435,580 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,219,972 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,520 writing to cptra_bootfsm_go
192,664 UART:
193,018 UART: Running Caliptra ROM ...
194,189 UART:
603,731 UART: [state] CFI Enabled
616,295 UART: [state] LifecycleState = Unprovisioned
618,670 UART: [state] DebugLocked = No
621,508 UART: [state] WD Timer not started. Device not locked for debugging
626,137 UART: [kat] SHA2-256
816,051 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,833 UART: [kat] ++
827,435 UART: [kat] sha1
837,890 UART: [kat] SHA2-256
840,897 UART: [kat] SHA2-384
845,910 UART: [kat] SHA2-512-ACC
848,520 UART: [kat] ECC-384
3,291,425 UART: [kat] HMAC-384Kdf
3,304,201 UART: [kat] LMS
3,836,068 UART: [kat] --
3,839,238 UART: [cold-reset] ++
3,841,072 UART: [fht] FHT @ 0x50003400
3,851,356 UART: [idev] ++
3,852,052 UART: [idev] CDI.KEYID = 6
3,853,074 UART: [idev] SUBJECT.KEYID = 7
3,854,181 UART: [idev] UDS.KEYID = 0
3,855,185 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,872,800 UART: [idev] Erasing UDS.KEYID = 0
6,338,795 UART: [idev] Sha1 KeyId Algorithm
6,360,732 UART: [idev] --
6,365,750 UART: [ldev] ++
6,366,487 UART: [ldev] CDI.KEYID = 6
6,367,395 UART: [ldev] SUBJECT.KEYID = 5
6,368,555 UART: [ldev] AUTHORITY.KEYID = 7
6,369,789 UART: [ldev] FE.KEYID = 1
6,381,847 UART: [ldev] Erasing FE.KEYID = 1
8,858,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,609 UART: [ldev] --
10,649,561 UART: [fwproc] Wait for Commands...
10,651,933 UART: [fwproc] Recv command 0x46505652
10,654,528 UART: [rt] FIPS Version
10,656,206 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,756,131 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,460,488 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,593 UART: [kat] SHA2-256
892,531 UART: [kat] SHA2-384
895,422 UART: [kat] SHA2-512-ACC
897,323 UART: [kat] ECC-384
903,106 UART: [kat] HMAC-384Kdf
907,666 UART: [kat] LMS
1,475,862 UART: [kat] --
1,476,605 UART: [cold-reset] ++
1,477,005 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,604 UART: [idev] Erasing UDS.KEYID = 0
1,504,896 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,374 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,521,369 UART: [ldev] Erasing FE.KEYID = 1
1,546,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,312 UART: [ldev] --
1,585,817 UART: [fwproc] Waiting for Commands...
1,586,666 UART: [fwproc] Received command 0x46505652
1,587,548 UART: [rt] FIPS Version
1,588,101 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,585 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,924 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,234 UART: [kat] SHA2-256
882,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,280 UART: [kat] ++
886,432 UART: [kat] sha1
890,502 UART: [kat] SHA2-256
892,440 UART: [kat] SHA2-384
895,305 UART: [kat] SHA2-512-ACC
897,206 UART: [kat] ECC-384
902,669 UART: [kat] HMAC-384Kdf
907,171 UART: [kat] LMS
1,475,367 UART: [kat] --
1,476,262 UART: [cold-reset] ++
1,476,592 UART: [fht] Storing FHT @ 0x50003400
1,479,529 UART: [idev] ++
1,479,697 UART: [idev] CDI.KEYID = 6
1,480,057 UART: [idev] SUBJECT.KEYID = 7
1,480,481 UART: [idev] UDS.KEYID = 0
1,480,826 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,269 UART: [idev] Erasing UDS.KEYID = 0
1,505,533 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,111 UART: [idev] --
1,515,074 UART: [ldev] ++
1,515,242 UART: [ldev] CDI.KEYID = 6
1,515,605 UART: [ldev] SUBJECT.KEYID = 5
1,516,031 UART: [ldev] AUTHORITY.KEYID = 7
1,516,494 UART: [ldev] FE.KEYID = 1
1,521,560 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,281 UART: [ldev] --
1,586,734 UART: [fwproc] Waiting for Commands...
1,587,415 UART: [fwproc] Received command 0x46505652
1,588,297 UART: [rt] FIPS Version
1,588,850 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,744 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,283 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,890 UART: [state] LifecycleState = Unprovisioned
85,545 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,751 UART: [kat] SHA2-256
903,691 UART: [kat] SHA2-384
906,306 UART: [kat] SHA2-512-ACC
908,207 UART: [kat] ECC-384
917,842 UART: [kat] HMAC-384Kdf
922,300 UART: [kat] LMS
1,170,628 UART: [kat] --
1,171,697 UART: [cold-reset] ++
1,172,071 UART: [fht] FHT @ 0x50003400
1,174,686 UART: [idev] ++
1,174,854 UART: [idev] CDI.KEYID = 6
1,175,214 UART: [idev] SUBJECT.KEYID = 7
1,175,638 UART: [idev] UDS.KEYID = 0
1,175,983 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,274 UART: [idev] Erasing UDS.KEYID = 0
1,199,525 UART: [idev] Sha1 KeyId Algorithm
1,208,115 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,489 UART: [ldev] Erasing FE.KEYID = 1
1,241,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,903 UART: [ldev] --
1,280,396 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46505652
1,281,945 UART: [rt] FIPS Version
1,282,499 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,251 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,741 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,907 UART: [state] LifecycleState = Unprovisioned
86,562 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,403 UART: [kat] SHA2-256
894,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,178 UART: [kat] ++
898,330 UART: [kat] sha1
902,670 UART: [kat] SHA2-256
904,610 UART: [kat] SHA2-384
907,363 UART: [kat] SHA2-512-ACC
909,264 UART: [kat] ECC-384
918,923 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,648 UART: [cold-reset] ++
1,173,158 UART: [fht] FHT @ 0x50003400
1,175,733 UART: [idev] ++
1,175,901 UART: [idev] CDI.KEYID = 6
1,176,261 UART: [idev] SUBJECT.KEYID = 7
1,176,685 UART: [idev] UDS.KEYID = 0
1,177,030 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,715 UART: [idev] Erasing UDS.KEYID = 0
1,201,866 UART: [idev] Sha1 KeyId Algorithm
1,210,396 UART: [idev] --
1,211,550 UART: [ldev] ++
1,211,718 UART: [ldev] CDI.KEYID = 6
1,212,081 UART: [ldev] SUBJECT.KEYID = 5
1,212,507 UART: [ldev] AUTHORITY.KEYID = 7
1,212,970 UART: [ldev] FE.KEYID = 1
1,217,848 UART: [ldev] Erasing FE.KEYID = 1
1,244,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,900 UART: [ldev] --
1,283,225 UART: [fwproc] Wait for Commands...
1,283,963 UART: [fwproc] Recv command 0x46505652
1,284,784 UART: [rt] FIPS Version
1,285,338 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,972 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,500 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,342 UART: [kat] SHA2-256
890,892 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,277 UART: [kat] SHA2-256
901,217 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
915,608 UART: [kat] HMAC-384Kdf
920,124 UART: [kat] LMS
1,168,436 UART: [kat] --
1,168,893 UART: [cold-reset] ++
1,169,287 UART: [fht] FHT @ 0x50003400
1,172,049 UART: [idev] ++
1,172,217 UART: [idev] CDI.KEYID = 6
1,172,578 UART: [idev] SUBJECT.KEYID = 7
1,173,003 UART: [idev] UDS.KEYID = 0
1,173,349 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,223 UART: [idev] Erasing UDS.KEYID = 0
1,198,521 UART: [idev] Sha1 KeyId Algorithm
1,207,595 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,086 UART: [ldev] Erasing FE.KEYID = 1
1,241,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,280,898 UART: [fwproc] Wait for Commands...
1,281,609 UART: [fwproc] Recv command 0x46505652
1,282,436 UART: [rt] FIPS Version
1,282,997 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,166 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,135,902 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,434 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,232 UART: [kat] ++
895,384 UART: [kat] sha1
899,788 UART: [kat] SHA2-256
901,728 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,787 UART: [kat] HMAC-384Kdf
921,265 UART: [kat] LMS
1,169,577 UART: [kat] --
1,170,720 UART: [cold-reset] ++
1,171,120 UART: [fht] FHT @ 0x50003400
1,173,742 UART: [idev] ++
1,173,910 UART: [idev] CDI.KEYID = 6
1,174,271 UART: [idev] SUBJECT.KEYID = 7
1,174,696 UART: [idev] UDS.KEYID = 0
1,175,042 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,594 UART: [idev] --
1,209,559 UART: [ldev] ++
1,209,727 UART: [ldev] CDI.KEYID = 6
1,210,091 UART: [ldev] SUBJECT.KEYID = 5
1,210,518 UART: [ldev] AUTHORITY.KEYID = 7
1,210,981 UART: [ldev] FE.KEYID = 1
1,216,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,623 UART: [ldev] --
1,282,031 UART: [fwproc] Wait for Commands...
1,282,816 UART: [fwproc] Recv command 0x46505652
1,283,643 UART: [rt] FIPS Version
1,284,204 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,395 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,137,843 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,137 UART:
192,505 UART: Running Caliptra ROM ...
193,683 UART:
193,837 UART: [state] CFI Enabled
263,759 UART: [state] LifecycleState = Unprovisioned
265,710 UART: [state] DebugLocked = No
267,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,933 UART: [kat] SHA2-256
441,684 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,192 UART: [kat] ++
452,722 UART: [kat] sha1
463,818 UART: [kat] SHA2-256
466,470 UART: [kat] SHA2-384
472,810 UART: [kat] SHA2-512-ACC
475,110 UART: [kat] ECC-384
2,769,660 UART: [kat] HMAC-384Kdf
2,801,031 UART: [kat] LMS
3,991,343 UART: [kat] --
3,997,641 UART: [cold-reset] ++
4,000,079 UART: [fht] Storing FHT @ 0x50003400
4,011,079 UART: [idev] ++
4,011,667 UART: [idev] CDI.KEYID = 6
4,012,592 UART: [idev] SUBJECT.KEYID = 7
4,013,846 UART: [idev] UDS.KEYID = 0
4,014,934 ready_for_fw is high
4,015,173 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,158,434 UART: [idev] Erasing UDS.KEYID = 0
7,350,271 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,315 UART: [idev] --
7,376,858 UART: [ldev] ++
7,377,431 UART: [ldev] CDI.KEYID = 6
7,378,407 UART: [ldev] SUBJECT.KEYID = 5
7,379,624 UART: [ldev] AUTHORITY.KEYID = 7
7,380,860 UART: [ldev] FE.KEYID = 1
7,424,938 UART: [ldev] Erasing FE.KEYID = 1
10,762,813 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,074,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,089,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,104,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,118,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,138,522 UART: [ldev] --
13,142,545 UART: [fwproc] Waiting for Commands...
13,145,451 UART: [fwproc] Received command 0x46574c44
13,147,684 UART: [fwproc] Received Image of size 113844 bytes
17,198,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,398 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,343,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,660,119 >>> mbox cmd response: success
17,660,715 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,664,807 UART: [afmc] ++
17,665,399 UART: [afmc] CDI.KEYID = 6
17,666,280 UART: [afmc] SUBJECT.KEYID = 7
17,667,551 UART: [afmc] AUTHORITY.KEYID = 5
21,034,656 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,335,684 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,337,942 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,352,382 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,367,189 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,381,611 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,403,526 UART: [afmc] --
23,406,969 UART: [cold-reset] --
23,410,994 UART: [state] Locking Datavault
23,416,682 UART: [state] Locking PCR0, PCR1 and PCR31
23,418,382 UART: [state] Locking ICCM
23,419,967 UART: [exit] Launching FMC @ 0x40000130
23,428,358 UART:
23,428,631 UART: Running Caliptra FMC ...
23,429,657 UART:
23,429,805 UART: [state] CFI Enabled
23,494,615 UART: [fht] FMC Alias Private Key: 7
25,832,053 UART: [art] Extend RT PCRs Done
25,833,277 UART: [art] Lock RT PCRs Done
25,834,937 UART: [art] Populate DV Done
25,840,405 UART: [fht] FMC Alias Private Key: 7
25,842,158 UART: [art] Derive CDI
25,842,970 UART: [art] Store in in slot 0x4
25,903,383 UART: [art] Derive Key Pair
25,904,417 UART: [art] Store priv key in slot 0x5
29,182,517 UART: [art] Derive Key Pair - Done
29,195,676 UART: [art] Signing Cert with AUTHO
29,196,979 UART: RITY.KEYID = 7
31,484,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,486,145 UART: [art] PUB.X = 3155462D8C43CC9D1B800EB452A8A8319752D3A2C07895043721FDE8F5D97E19B761E91C971D13427E59A93AEB3D4D85
31,493,381 UART: [art] PUB.Y = BB5409CA41A1A1EDC06DEA0042B16BA12FB0F5518AD712BBA88A9F7660C8E9135413C940EDDD3C0FE80BE4B03527B262
31,500,656 UART: [art] SIG.R = 8F1F962D63915C76D8E12CB323745FDDA4E769340A236DBCBB16443523CEAD1FE4C776ADB1128CD4D6B5AD4159DC1F3E
31,508,080 UART: [art] SIG.S = C2AA1ACE9D8A7404A6E58D01524548BD2BB13312373C976E28308524E7F171F6AFE52ACE6164AF1E1C8494FF878AE2FE
32,813,473 UART: Caliptra RT
32,814,195 UART: [state] CFI Enabled
32,975,463 UART: [rt] RT listening for mailbox commands...
33,006,762 UART: [rt]cmd =0x46505652, len=4
33,008,043 UART: [rt] FIPS Version
33,009,269 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,783,258 ready_for_fw is high
3,783,853 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,839,978 >>> mbox cmd response: success
17,840,696 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,522,728 UART:
23,523,433 UART: Running Caliptra FMC ...
23,524,598 UART:
23,524,757 UART: [state] CFI Enabled
23,593,901 UART: [fht] FMC Alias Private Key: 7
25,931,401 UART: [art] Extend RT PCRs Done
25,933,303 UART: [art] Lock RT PCRs Done
25,934,318 UART: [art] Populate DV Done
25,939,640 UART: [fht] FMC Alias Private Key: 7
25,941,193 UART: [art] Derive CDI
25,941,930 UART: [art] Store in in slot 0x4
25,986,870 UART: [art] Derive Key Pair
25,987,913 UART: [art] Store priv key in slot 0x5
29,280,361 UART: [art] Derive Key Pair - Done
29,293,342 UART: [art] Signing Cert with AUTHO
29,294,768 UART: RITY.KEYID = 7
31,584,574 UART: [art] Erasing AUTHORITY.KEYID = 7
31,586,654 UART: [art] PUB.X = EF3E168AE0DD7323DBD94AAF86C2A5A033BE2329468C23DB3AAEAA6F5B0923438B20C2F9E1B03223A488B1384C54AD9F
31,593,359 UART: [art] PUB.Y = E6310C403A503ECB0E5D31E0910CD155E76C6447D95E5CC5DA2C7230051F5D89F125AE85A8A3252F5D543713C91EA9EB
31,600,574 UART: [art] SIG.R = 2999D64F4A8263FE213F6DC1E7A9D1432CCDC3604356B6B15A3090ECC3CE0FA4842B7C9A7638B5DF89FFA44589A08690
31,607,960 UART: [art] SIG.S = 902C8FC7519524D00E880DDC089C5E58F3D06BDA783872E34B17AEDCD9CD19513318F29BF67750D48751DF917FFF4556
32,913,246 UART: Caliptra RT
32,913,972 UART: [state] CFI Enabled
33,078,452 UART: [rt] RT listening for mailbox commands...
33,109,971 UART: [rt]cmd =0x46505652, len=4
33,111,228 UART: [rt] FIPS Version
33,112,502 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,457 writing to cptra_bootfsm_go
192,604 UART:
192,987 UART: Running Caliptra ROM ...
194,184 UART:
603,853 UART: [state] CFI Enabled
617,371 UART: [state] LifecycleState = Unprovisioned
619,347 UART: [state] DebugLocked = No
620,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,115 UART: [kat] SHA2-256
795,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,419 UART: [kat] ++
806,895 UART: [kat] sha1
817,560 UART: [kat] SHA2-256
820,284 UART: [kat] SHA2-384
825,281 UART: [kat] SHA2-512-ACC
827,658 UART: [kat] ECC-384
3,109,015 UART: [kat] HMAC-384Kdf
3,121,532 UART: [kat] LMS
4,311,655 UART: [kat] --
4,315,371 UART: [cold-reset] ++
4,317,654 UART: [fht] Storing FHT @ 0x50003400
4,327,928 UART: [idev] ++
4,328,499 UART: [idev] CDI.KEYID = 6
4,329,477 UART: [idev] SUBJECT.KEYID = 7
4,330,729 UART: [idev] UDS.KEYID = 0
4,331,691 ready_for_fw is high
4,331,894 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,474,881 UART: [idev] Erasing UDS.KEYID = 0
7,621,805 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,106 UART: [idev] --
7,650,671 UART: [ldev] ++
7,651,146 UART: [ldev] CDI.KEYID = 6
7,652,370 UART: [ldev] SUBJECT.KEYID = 5
7,653,399 UART: [ldev] AUTHORITY.KEYID = 7
7,654,620 UART: [ldev] FE.KEYID = 1
7,665,178 UART: [ldev] Erasing FE.KEYID = 1
10,953,211 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,203 UART: [ldev] --
13,313,226 UART: [fwproc] Waiting for Commands...
13,316,347 UART: [fwproc] Received command 0x46574c44
13,318,532 UART: [fwproc] Received Image of size 113844 bytes
17,367,432 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,441,767 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,510,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,827,078 >>> mbox cmd response: success
17,827,657 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,831,179 UART: [afmc] ++
17,831,771 UART: [afmc] CDI.KEYID = 6
17,832,657 UART: [afmc] SUBJECT.KEYID = 7
17,833,928 UART: [afmc] AUTHORITY.KEYID = 5
21,148,499 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,445,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,447,329 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,461,709 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,476,526 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,490,959 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,511,697 UART: [afmc] --
23,515,297 UART: [cold-reset] --
23,519,909 UART: [state] Locking Datavault
23,523,645 UART: [state] Locking PCR0, PCR1 and PCR31
23,525,402 UART: [state] Locking ICCM
23,526,932 UART: [exit] Launching FMC @ 0x40000130
23,535,295 UART:
23,535,534 UART: Running Caliptra FMC ...
23,536,637 UART:
23,536,803 UART: [state] CFI Enabled
23,545,027 UART: [fht] FMC Alias Private Key: 7
25,876,227 UART: [art] Extend RT PCRs Done
25,877,453 UART: [art] Lock RT PCRs Done
25,879,052 UART: [art] Populate DV Done
25,884,354 UART: [fht] FMC Alias Private Key: 7
25,885,942 UART: [art] Derive CDI
25,886,756 UART: [art] Store in in slot 0x4
25,929,363 UART: [art] Derive Key Pair
25,930,407 UART: [art] Store priv key in slot 0x5
29,172,395 UART: [art] Derive Key Pair - Done
29,185,399 UART: [art] Signing Cert with AUTHO
29,186,710 UART: RITY.KEYID = 7
31,466,528 UART: [art] Erasing AUTHORITY.KEYID = 7
31,468,040 UART: [art] PUB.X = 8CE8A69DDAF1B609C59ECD3B0E06E894EB43C0AEA64B81169A024C0C95F3E1FC49AB125A73DC6D9AB450C75B962405F0
31,475,302 UART: [art] PUB.Y = 4137802D385B6B4A01245A137111ECEDBF6ACF93DD2CF0C7B81990B0B8D6D03B6B8B440E6FC952200CEBA27184266715
31,482,537 UART: [art] SIG.R = 0941A22BF3E87A5ED8B2CF1D6069652A632F307DB7DB89CC5258A80B48F0933ABB7F45DAB5B12AFB68AC3775731A1BF5
31,489,940 UART: [art] SIG.S = A11EE04F99B6255ACBE5A634E3E16B4A593DE3F62D00E379A45A93665F705DBE69C4905434DB015C15F45E81AA4A6FF0
32,794,980 UART: Caliptra RT
32,795,697 UART: [state] CFI Enabled
32,912,814 UART: [rt] RT listening for mailbox commands...
32,943,995 UART: [rt]cmd =0x46505652, len=4
32,945,274 UART: [rt] FIPS Version
32,946,546 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
4,127,323 ready_for_fw is high
4,127,808 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,063,128 >>> mbox cmd response: success
18,063,756 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,705,173 UART:
23,705,551 UART: Running Caliptra FMC ...
23,706,713 UART:
23,706,871 UART: [state] CFI Enabled
23,714,888 UART: [fht] FMC Alias Private Key: 7
26,045,598 UART: [art] Extend RT PCRs Done
26,046,845 UART: [art] Lock RT PCRs Done
26,048,212 UART: [art] Populate DV Done
26,053,625 UART: [fht] FMC Alias Private Key: 7
26,055,219 UART: [art] Derive CDI
26,056,034 UART: [art] Store in in slot 0x4
26,098,849 UART: [art] Derive Key Pair
26,099,891 UART: [art] Store priv key in slot 0x5
29,342,444 UART: [art] Derive Key Pair - Done
29,355,381 UART: [art] Signing Cert with AUTHO
29,356,683 UART: RITY.KEYID = 7
31,636,381 UART: [art] Erasing AUTHORITY.KEYID = 7
31,637,888 UART: [art] PUB.X = 280B8ADC0175138AE6A4832CEFE72B7CF4A6129DC4DB8E1A6198D4EE8A298A00F9748903E07B8C1737CA9BB96F5D4FD4
31,645,153 UART: [art] PUB.Y = 66CEAF37020BE6104F6CB76CB8E1E238F695505F88D632F11959F9D908B267E957B3CB7821455BB7CD3AC7B29050293B
31,652,408 UART: [art] SIG.R = 74ABEB96AF7625DE9218CB0932731CA10FD0BC6595A9ABA750802B9474A55326351E52554D382B2A4CB2137E183D888E
31,659,763 UART: [art] SIG.S = F4625324676389DAD3B218311B50ACD5C57812F2BD37142CFEE26E3B71C2E5A270556C9B408BDF08E906B959BB51540B
32,965,358 UART: Caliptra RT
32,966,111 UART: [state] CFI Enabled
33,083,457 UART: [rt] RT listening for mailbox commands...
33,114,821 UART: [rt]cmd =0x46505652, len=4
33,116,070 UART: [rt] FIPS Version
33,117,395 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,155 UART:
192,539 UART: Running Caliptra ROM ...
193,649 UART:
193,796 UART: [state] CFI Enabled
265,113 UART: [state] LifecycleState = Unprovisioned
267,048 UART: [state] DebugLocked = No
269,431 UART: [state] WD Timer not started. Device not locked for debugging
272,347 UART: [kat] SHA2-256
451,491 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,094 UART: [kat] ++
463,637 UART: [kat] sha1
475,662 UART: [kat] SHA2-256
478,669 UART: [kat] SHA2-384
484,162 UART: [kat] SHA2-512-ACC
487,109 UART: [kat] ECC-384
2,949,905 UART: [kat] HMAC-384Kdf
2,971,810 UART: [kat] LMS
3,501,233 UART: [kat] --
3,505,239 UART: [cold-reset] ++
3,507,670 UART: [fht] FHT @ 0x50003400
3,517,870 UART: [idev] ++
3,518,433 UART: [idev] CDI.KEYID = 6
3,519,319 UART: [idev] SUBJECT.KEYID = 7
3,520,566 UART: [idev] UDS.KEYID = 0
3,521,515 ready_for_fw is high
3,521,734 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,665,346 UART: [idev] Erasing UDS.KEYID = 0
6,027,137 UART: [idev] Sha1 KeyId Algorithm
6,048,786 UART: [idev] --
6,052,611 UART: [ldev] ++
6,053,195 UART: [ldev] CDI.KEYID = 6
6,054,111 UART: [ldev] SUBJECT.KEYID = 5
6,055,280 UART: [ldev] AUTHORITY.KEYID = 7
6,056,517 UART: [ldev] FE.KEYID = 1
6,100,271 UART: [ldev] Erasing FE.KEYID = 1
8,620,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,357,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,373,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,389,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,425,108 UART: [ldev] --
10,429,775 UART: [fwproc] Wait for Commands...
10,432,029 UART: [fwproc] Recv command 0x46574c44
10,434,075 UART: [fwproc] Recv'd Img size: 114168 bytes
13,835,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,010 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,983,828 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,301,506 >>> mbox cmd response: success
14,302,095 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,305,930 UART: [afmc] ++
14,306,510 UART: [afmc] CDI.KEYID = 6
14,307,389 UART: [afmc] SUBJECT.KEYID = 7
14,308,602 UART: [afmc] AUTHORITY.KEYID = 5
16,844,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,570,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,572,127 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,587,896 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,603,925 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,619,785 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,642,970 UART: [afmc] --
18,646,622 UART: [cold-reset] --
18,649,403 UART: [state] Locking Datavault
18,653,135 UART: [state] Locking PCR0, PCR1 and PCR31
18,654,832 UART: [state] Locking ICCM
18,657,063 UART: [exit] Launching FMC @ 0x40000130
18,665,458 UART:
18,665,694 UART: Running Caliptra FMC ...
18,666,723 UART:
18,666,869 UART: [state] CFI Enabled
18,726,681 UART: [fht] FMC Alias Private Key: 7
20,490,288 UART: [art] Extend RT PCRs Done
20,491,500 UART: [art] Lock RT PCRs Done
20,493,055 UART: [art] Populate DV Done
20,498,521 UART: [fht] FMC Alias Private Key: 7
20,500,111 UART: [art] Derive CDI
20,500,923 UART: [art] Store in in slot 0x4
20,559,965 UART: [art] Derive Key Pair
20,560,993 UART: [art] Store priv key in slot 0x5
23,024,181 UART: [art] Derive Key Pair - Done
23,037,287 UART: [art] Signing Cert with AUTHO
23,038,590 UART: RITY.KEYID = 7
24,749,431 UART: [art] Erasing AUTHORITY.KEYID = 7
24,750,924 UART: [art] PUB.X = AC8425C3D104B11D936A86DE4CF29250AFDCCC4305D4AA45A4E1C751311D7F38C7DCFDA0D87105E1F5549ED6D0BDD199
24,758,268 UART: [art] PUB.Y = AFC83FF704B275C87625B3677AD34E7167EA28A8EA7D8D80553268C9114FA994DF19E2F65B42D97BE9CD0C40BE40535F
24,765,514 UART: [art] SIG.R = CBB715A033E9CCDA55326E0C187E609DDAD5B0D5E27B0F4A6E7599A558E77567E0FC94077247E43BDEAA68365CB55E30
24,772,927 UART: [art] SIG.S = E41596E4CAF685F0DBA559CC9D6F6CB74CBEBBAACADA4930EC1D8C671EEE2CF80F04C8F5F3D37921505D188759B7DEC9
25,751,884 UART: Caliptra RT
25,752,597 UART: [state] CFI Enabled
25,917,534 UART: [rt] RT listening for mailbox commands...
25,948,839 UART: [rt]cmd =0x46505652, len=4
25,950,142 UART: [rt] FIPS Version
25,951,347 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,361,925 ready_for_fw is high
3,362,576 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,068,354 >>> mbox cmd response: success
14,069,188 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,346,065 UART:
18,346,465 UART: Running Caliptra FMC ...
18,347,645 UART:
18,347,805 UART: [state] CFI Enabled
18,416,065 UART: [fht] FMC Alias Private Key: 7
20,180,263 UART: [art] Extend RT PCRs Done
20,181,483 UART: [art] Lock RT PCRs Done
20,183,030 UART: [art] Populate DV Done
20,188,290 UART: [fht] FMC Alias Private Key: 7
20,189,996 UART: [art] Derive CDI
20,190,817 UART: [art] Store in in slot 0x4
20,250,066 UART: [art] Derive Key Pair
20,251,066 UART: [art] Store priv key in slot 0x5
22,713,882 UART: [art] Derive Key Pair - Done
22,726,601 UART: [art] Signing Cert with AUTHO
22,727,902 UART: RITY.KEYID = 7
24,439,833 UART: [art] Erasing AUTHORITY.KEYID = 7
24,441,371 UART: [art] PUB.X = 172E3873F35D470D2D9AACEBC0891B9DAD3F4FA2DEA0312E39ED0915BA084DF92C1D6BB4AC8039F3A5600DF6B8F94FAF
24,448,670 UART: [art] PUB.Y = 8E4FD59E913D4F028C2BB75F77AA7CB8D68A9C7D2E6C61E37F131049EDE87EE620D21B2361506F7EC50115ECAB77DA74
24,455,916 UART: [art] SIG.R = 663D6D450689EF2202FD93115073821F0C83886C426A3C1F0BB4381C31ED573D0A1E65EC2BD018A98E64A10673B0E49F
24,463,313 UART: [art] SIG.S = 718B02D613685FA062CC42F4B0B343D7364E3647568B5259530712A88F09A2A4903EF99CB50D2C503113FFD320D2AEE1
25,442,130 UART: Caliptra RT
25,442,836 UART: [state] CFI Enabled
25,608,792 UART: [rt] RT listening for mailbox commands...
25,640,521 UART: [rt]cmd =0x46505652, len=4
25,641,790 UART: [rt] FIPS Version
25,642,952 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,988 writing to cptra_bootfsm_go
193,305 UART:
193,686 UART: Running Caliptra ROM ...
194,809 UART:
604,594 UART: [state] CFI Enabled
616,286 UART: [state] LifecycleState = Unprovisioned
618,175 UART: [state] DebugLocked = No
619,934 UART: [state] WD Timer not started. Device not locked for debugging
623,564 UART: [kat] SHA2-256
802,732 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,256 UART: [kat] ++
814,705 UART: [kat] sha1
825,221 UART: [kat] SHA2-256
828,237 UART: [kat] SHA2-384
835,082 UART: [kat] SHA2-512-ACC
838,023 UART: [kat] ECC-384
3,280,477 UART: [kat] HMAC-384Kdf
3,292,440 UART: [kat] LMS
3,821,950 UART: [kat] --
3,824,595 UART: [cold-reset] ++
3,825,818 UART: [fht] FHT @ 0x50003400
3,837,792 UART: [idev] ++
3,838,358 UART: [idev] CDI.KEYID = 6
3,839,290 UART: [idev] SUBJECT.KEYID = 7
3,840,470 UART: [idev] UDS.KEYID = 0
3,841,397 ready_for_fw is high
3,841,611 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,985,016 UART: [idev] Erasing UDS.KEYID = 0
6,308,357 UART: [idev] Sha1 KeyId Algorithm
6,331,217 UART: [idev] --
6,336,165 UART: [ldev] ++
6,336,747 UART: [ldev] CDI.KEYID = 6
6,337,634 UART: [ldev] SUBJECT.KEYID = 5
6,338,748 UART: [ldev] AUTHORITY.KEYID = 7
6,340,044 UART: [ldev] FE.KEYID = 1
6,352,292 UART: [ldev] Erasing FE.KEYID = 1
8,825,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,541,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,557,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,573,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,588,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,608,042 UART: [ldev] --
10,612,344 UART: [fwproc] Wait for Commands...
10,614,178 UART: [fwproc] Recv command 0x46574c44
10,616,225 UART: [fwproc] Recv'd Img size: 114168 bytes
14,016,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,093,403 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,162,172 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,480,107 >>> mbox cmd response: success
14,480,672 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,483,904 UART: [afmc] ++
14,484,525 UART: [afmc] CDI.KEYID = 6
14,485,442 UART: [afmc] SUBJECT.KEYID = 7
14,486,606 UART: [afmc] AUTHORITY.KEYID = 5
16,986,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,703,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,705,588 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,721,396 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,737,378 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,753,284 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,776,451 UART: [afmc] --
18,780,913 UART: [cold-reset] --
18,784,449 UART: [state] Locking Datavault
18,788,668 UART: [state] Locking PCR0, PCR1 and PCR31
18,790,316 UART: [state] Locking ICCM
18,792,954 UART: [exit] Launching FMC @ 0x40000130
18,801,348 UART:
18,801,586 UART: Running Caliptra FMC ...
18,802,688 UART:
18,803,053 UART: [state] CFI Enabled
18,810,657 UART: [fht] FMC Alias Private Key: 7
20,567,059 UART: [art] Extend RT PCRs Done
20,568,284 UART: [art] Lock RT PCRs Done
20,569,607 UART: [art] Populate DV Done
20,575,072 UART: [fht] FMC Alias Private Key: 7
20,576,566 UART: [art] Derive CDI
20,577,333 UART: [art] Store in in slot 0x4
20,619,706 UART: [art] Derive Key Pair
20,620,708 UART: [art] Store priv key in slot 0x5
23,047,413 UART: [art] Derive Key Pair - Done
23,060,625 UART: [art] Signing Cert with AUTHO
23,061,932 UART: RITY.KEYID = 7
24,767,918 UART: [art] Erasing AUTHORITY.KEYID = 7
24,769,421 UART: [art] PUB.X = AD2DD363A8EBA694D73B2D026956082DF593B00514C48BEB49F6302ED46EE93383CFC8FCC6B9B0E53206B1F744496580
24,776,676 UART: [art] PUB.Y = 4F359583F57AF4DC499A6073B462AC4482C038960C31FBF81C979234E7ED2F6A85D04AF37179DFB48EA4AA5DD0914F29
24,783,961 UART: [art] SIG.R = 05F0A195B362BB187E28F95496B32EFD636AB4B64571241D60A00B9D365A2C2CD45BE82AC91C9329C7E6A4DCDD54D0A7
24,791,306 UART: [art] SIG.S = FAD49C3BC87257FA1A896A347A1AC3D79D042E35AECB86FDB1C6A6B95CE15AD8A1B60DD30BA90DDE2C98513B40BF28CB
25,771,090 UART: Caliptra RT
25,771,802 UART: [state] CFI Enabled
25,888,914 UART: [rt] RT listening for mailbox commands...
25,920,161 UART: [rt]cmd =0x46505652, len=4
25,921,462 UART: [rt] FIPS Version
25,922,567 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,754 writing to cptra_bootfsm_go
3,694,406 ready_for_fw is high
3,694,799 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,276,353 >>> mbox cmd response: success
14,277,250 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,531,733 UART:
18,532,202 UART: Running Caliptra FMC ...
18,533,372 UART:
18,533,525 UART: [state] CFI Enabled
18,541,519 UART: [fht] FMC Alias Private Key: 7
20,297,898 UART: [art] Extend RT PCRs Done
20,299,136 UART: [art] Lock RT PCRs Done
20,300,665 UART: [art] Populate DV Done
20,306,301 UART: [fht] FMC Alias Private Key: 7
20,307,843 UART: [art] Derive CDI
20,308,607 UART: [art] Store in in slot 0x4
20,351,208 UART: [art] Derive Key Pair
20,352,253 UART: [art] Store priv key in slot 0x5
22,778,710 UART: [art] Derive Key Pair - Done
22,791,560 UART: [art] Signing Cert with AUTHO
22,792,872 UART: RITY.KEYID = 7
24,497,840 UART: [art] Erasing AUTHORITY.KEYID = 7
24,499,345 UART: [art] PUB.X = 24177FD6817DB60DD41AA01B64EFC20B221F1AE5CAFD6E503925902AA6AEB6980CBF6B57DAF3FFC2A4604B9DB6B95765
24,506,607 UART: [art] PUB.Y = 7C2AC89BB82F3DAF4931D7EFD00F7BF8DED06C8C13AC3A6E6A8ED173968CC99D33A5E0CEC349655D6D00699059A16E38
24,513,861 UART: [art] SIG.R = 99F14F9AA7CE1C63C46C95320D3653F98737DC072E8C1D910130AC7DF6E0293DEFE65B986E0DDD80DB634B2B3DFF948D
24,521,317 UART: [art] SIG.S = 3C874E90FCF4520660C7EA9D0F24246D34F161FD25EAF20DCF609AEACC1E8A98F174CC0053E4E8B1CD47715A20EC96E0
25,500,151 UART: Caliptra RT
25,500,853 UART: [state] CFI Enabled
25,618,837 UART: [rt] RT listening for mailbox commands...
25,650,195 UART: [rt]cmd =0x46505652, len=4
25,651,439 UART: [rt] FIPS Version
25,652,595 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,182 UART:
192,554 UART: Running Caliptra ROM ...
193,721 UART:
193,874 UART: [state] CFI Enabled
263,306 UART: [state] LifecycleState = Unprovisioned
265,670 UART: [state] DebugLocked = No
267,416 UART: [state] WD Timer not started. Device not locked for debugging
272,377 UART: [kat] SHA2-256
462,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,030 UART: [kat] ++
473,512 UART: [kat] sha1
484,822 UART: [kat] SHA2-256
487,845 UART: [kat] SHA2-384
493,129 UART: [kat] SHA2-512-ACC
495,717 UART: [kat] ECC-384
2,949,808 UART: [kat] HMAC-384Kdf
2,972,625 UART: [kat] LMS
3,504,399 UART: [kat] --
3,510,103 UART: [cold-reset] ++
3,511,969 UART: [fht] FHT @ 0x50003400
3,522,808 UART: [idev] ++
3,523,521 UART: [idev] CDI.KEYID = 6
3,524,556 UART: [idev] SUBJECT.KEYID = 7
3,525,656 UART: [idev] UDS.KEYID = 0
3,526,584 ready_for_fw is high
3,526,804 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,670,413 UART: [idev] Erasing UDS.KEYID = 0
6,029,256 UART: [idev] Sha1 KeyId Algorithm
6,052,198 UART: [idev] --
6,056,880 UART: [ldev] ++
6,057,575 UART: [ldev] CDI.KEYID = 6
6,058,492 UART: [ldev] SUBJECT.KEYID = 5
6,059,653 UART: [ldev] AUTHORITY.KEYID = 7
6,060,832 UART: [ldev] FE.KEYID = 1
6,102,167 UART: [ldev] Erasing FE.KEYID = 1
8,606,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,508 UART: [ldev] --
10,416,519 UART: [fwproc] Wait for Commands...
10,418,672 UART: [fwproc] Recv command 0x46574c44
10,420,940 UART: [fwproc] Recv'd Img size: 114168 bytes
13,871,805 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,470 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,068,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,609,835 >>> mbox cmd response: success
14,610,418 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,613,534 UART: [afmc] ++
14,614,226 UART: [afmc] CDI.KEYID = 6
14,615,390 UART: [afmc] SUBJECT.KEYID = 7
14,616,929 UART: [afmc] AUTHORITY.KEYID = 5
17,153,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,894,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,896,538 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,911,737 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,926,858 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,941,898 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,966,310 UART: [afmc] --
18,970,607 UART: [cold-reset] --
18,976,093 UART: [state] Locking Datavault
18,982,747 UART: [state] Locking PCR0, PCR1 and PCR31
18,984,893 UART: [state] Locking ICCM
18,986,212 UART: [exit] Launching FMC @ 0x40000130
18,994,835 UART:
18,995,109 UART: Running Caliptra FMC ...
18,996,136 UART:
18,996,283 UART: [state] CFI Enabled
19,052,832 UART: [fht] FMC Alias Private Key: 7
20,817,422 UART: [art] Extend RT PCRs Done
20,818,647 UART: [art] Lock RT PCRs Done
20,820,298 UART: [art] Populate DV Done
20,825,620 UART: [fht] FMC Alias Private Key: 7
20,827,160 UART: [art] Derive CDI
20,827,895 UART: [art] Store in in slot 0x4
20,885,777 UART: [art] Derive Key Pair
20,886,819 UART: [art] Store priv key in slot 0x5
23,350,041 UART: [art] Derive Key Pair - Done
23,362,932 UART: [art] Signing Cert with AUTHO
23,364,233 UART: RITY.KEYID = 7
25,076,200 UART: [art] Erasing AUTHORITY.KEYID = 7
25,077,713 UART: [art] PUB.X = 2394636918CFB47A0BF9EC1D0AE27F0785924F37B395E3AA86BEE0A9088CA833B67702FFA47D79BD40E9B068893D3315
25,084,966 UART: [art] PUB.Y = 4A6BE58C6B6ED281EFC644F7C05DEF5D83823A9396C9665B300441A64BDEE13F5879A653638D54D4B2B4E4CA3EBF099C
25,092,272 UART: [art] SIG.R = 5D63441F830827BD462C3430AE588B6CD51AAC0D254E95715EEF72E40C16D6A583554EE5DDEB1A9D9A19CC560D447DCE
25,099,671 UART: [art] SIG.S = EF2B0A9EFEA6F2A965337A68F75048E47917E81FE00F3CD498FC33C20ABCFC3A0675DFF7827E3BC0FEEF8C0DCD0AFEF9
26,078,194 UART: Caliptra RT
26,078,910 UART: [state] CFI Enabled
26,244,375 UART: [rt] RT listening for mailbox commands...
26,275,800 UART: [rt]cmd =0x46505652, len=4
26,277,079 UART: [rt] FIPS Version
26,278,298 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,439,970 ready_for_fw is high
3,440,348 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,736,371 >>> mbox cmd response: success
14,737,195 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,019,749 UART:
19,020,155 UART: Running Caliptra FMC ...
19,021,506 UART:
19,021,674 UART: [state] CFI Enabled
19,085,666 UART: [fht] FMC Alias Private Key: 7
20,849,846 UART: [art] Extend RT PCRs Done
20,851,085 UART: [art] Lock RT PCRs Done
20,852,609 UART: [art] Populate DV Done
20,858,147 UART: [fht] FMC Alias Private Key: 7
20,859,726 UART: [art] Derive CDI
20,860,550 UART: [art] Store in in slot 0x4
20,918,004 UART: [art] Derive Key Pair
20,919,012 UART: [art] Store priv key in slot 0x5
23,382,265 UART: [art] Derive Key Pair - Done
23,395,267 UART: [art] Signing Cert with AUTHO
23,396,578 UART: RITY.KEYID = 7
25,107,158 UART: [art] Erasing AUTHORITY.KEYID = 7
25,108,668 UART: [art] PUB.X = 533A214EB7C823AE52AFD3C2DAA9104AAD8AAD7A0CBBA90CE300566A8BF5D73C8DC9E5B6C1999E57E93840D8C3CCCF3D
25,115,961 UART: [art] PUB.Y = B4882E8EBE4D7644969AA8240DC1CF9DDFEDE16F1D6FA46E381E569569B5F49CF623256B21593CAFCE1123E29E0421DC
25,123,236 UART: [art] SIG.R = 5AF1FF522C7CA8AF6C0865793542208763C3C8FA24D0C57722AF1D9FB6386BDA8ECC38F51C77D416429A5A4B6317464D
25,130,622 UART: [art] SIG.S = B4A6962CA88141A9A8F702D643B4C4D798B827C83CAFB1DA397BF35846701D51DF1C7BD64BCEC69F73FB4F57E6E5CDB2
26,109,636 UART: Caliptra RT
26,110,348 UART: [state] CFI Enabled
26,273,440 UART: [rt] RT listening for mailbox commands...
26,305,061 UART: [rt]cmd =0x46505652, len=4
26,306,341 UART: [rt] FIPS Version
26,307,607 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,489 writing to cptra_bootfsm_go
192,639 UART:
193,002 UART: Running Caliptra ROM ...
194,203 UART:
603,864 UART: [state] CFI Enabled
618,150 UART: [state] LifecycleState = Unprovisioned
620,517 UART: [state] DebugLocked = No
621,836 UART: [state] WD Timer not started. Device not locked for debugging
627,008 UART: [kat] SHA2-256
816,847 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,636 UART: [kat] ++
828,238 UART: [kat] sha1
839,296 UART: [kat] SHA2-256
842,314 UART: [kat] SHA2-384
848,627 UART: [kat] SHA2-512-ACC
851,218 UART: [kat] ECC-384
3,293,484 UART: [kat] HMAC-384Kdf
3,307,351 UART: [kat] LMS
3,839,168 UART: [kat] --
3,842,946 UART: [cold-reset] ++
3,845,235 UART: [fht] FHT @ 0x50003400
3,857,062 UART: [idev] ++
3,857,710 UART: [idev] CDI.KEYID = 6
3,858,744 UART: [idev] SUBJECT.KEYID = 7
3,859,847 UART: [idev] UDS.KEYID = 0
3,860,777 ready_for_fw is high
3,860,989 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,399 UART: [idev] Erasing UDS.KEYID = 0
6,344,183 UART: [idev] Sha1 KeyId Algorithm
6,367,358 UART: [idev] --
6,371,940 UART: [ldev] ++
6,372,689 UART: [ldev] CDI.KEYID = 6
6,373,599 UART: [ldev] SUBJECT.KEYID = 5
6,374,757 UART: [ldev] AUTHORITY.KEYID = 7
6,375,934 UART: [ldev] FE.KEYID = 1
6,388,148 UART: [ldev] Erasing FE.KEYID = 1
8,868,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,589,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,604,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,620,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,635,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,657,350 UART: [ldev] --
10,663,371 UART: [fwproc] Wait for Commands...
10,665,039 UART: [fwproc] Recv command 0x46574c44
10,667,310 UART: [fwproc] Recv'd Img size: 114168 bytes
14,111,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,192,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,308,308 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,850,423 >>> mbox cmd response: success
14,851,003 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,854,131 UART: [afmc] ++
14,854,883 UART: [afmc] CDI.KEYID = 6
14,856,072 UART: [afmc] SUBJECT.KEYID = 7
14,857,510 UART: [afmc] AUTHORITY.KEYID = 5
17,358,731 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,081,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,083,414 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,098,589 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,113,756 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,128,781 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,153,708 UART: [afmc] --
19,156,595 UART: [cold-reset] --
19,158,651 UART: [state] Locking Datavault
19,161,639 UART: [state] Locking PCR0, PCR1 and PCR31
19,163,784 UART: [state] Locking ICCM
19,165,881 UART: [exit] Launching FMC @ 0x40000130
19,174,554 UART:
19,174,791 UART: Running Caliptra FMC ...
19,175,893 UART:
19,176,052 UART: [state] CFI Enabled
19,183,723 UART: [fht] FMC Alias Private Key: 7
20,940,675 UART: [art] Extend RT PCRs Done
20,941,894 UART: [art] Lock RT PCRs Done
20,943,955 UART: [art] Populate DV Done
20,949,521 UART: [fht] FMC Alias Private Key: 7
20,951,066 UART: [art] Derive CDI
20,951,884 UART: [art] Store in in slot 0x4
20,994,319 UART: [art] Derive Key Pair
20,995,381 UART: [art] Store priv key in slot 0x5
23,421,844 UART: [art] Derive Key Pair - Done
23,435,067 UART: [art] Signing Cert with AUTHO
23,436,368 UART: RITY.KEYID = 7
25,141,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,092 UART: [art] PUB.X = A0E2E319AADF0C68E62215B0B9D80581DEEDBB524E76906C066CDBC805EF1BA54A22CF211B37B3758DE054BB88E8832D
25,150,339 UART: [art] PUB.Y = A9A7F503258E4711D103CF54EF92EB1B69C86C2D201CF6EFAF3BE6E3C09806B913DE3047449A8A0EC9210F8D825F2C42
25,157,648 UART: [art] SIG.R = 905A6827D1E83C8086A81C579A635FB1C89D218D7A898D678316BDE8076DE7ACCD8AEDF50B92AA0B85D9E1A949058474
25,165,002 UART: [art] SIG.S = 02CF1F632EAC94FED4F7B79DB90AF17E888A1190AF7BF10CCC1C607F03ED77BB93591542A1CA274D353DB067BD52A2DA
26,143,803 UART: Caliptra RT
26,144,501 UART: [state] CFI Enabled
26,262,054 UART: [rt] RT listening for mailbox commands...
26,293,368 UART: [rt]cmd =0x46505652, len=4
26,294,650 UART: [rt] FIPS Version
26,295,815 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,754,936 ready_for_fw is high
3,755,720 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,942,074 >>> mbox cmd response: success
14,942,912 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,195,604 UART:
19,196,018 UART: Running Caliptra FMC ...
19,197,161 UART:
19,197,312 UART: [state] CFI Enabled
19,205,175 UART: [fht] FMC Alias Private Key: 7
20,962,193 UART: [art] Extend RT PCRs Done
20,963,430 UART: [art] Lock RT PCRs Done
20,964,814 UART: [art] Populate DV Done
20,970,149 UART: [fht] FMC Alias Private Key: 7
20,971,675 UART: [art] Derive CDI
20,972,427 UART: [art] Store in in slot 0x4
21,015,405 UART: [art] Derive Key Pair
21,016,417 UART: [art] Store priv key in slot 0x5
23,443,125 UART: [art] Derive Key Pair - Done
23,456,294 UART: [art] Signing Cert with AUTHO
23,457,656 UART: RITY.KEYID = 7
25,163,043 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,558 UART: [art] PUB.X = C9E9CEA046C04D7521A1C193F897A6B4633F8E85181132C8806C1D51860FFF1407A6113E802624A386B8788F4690E8CA
25,171,772 UART: [art] PUB.Y = 76AED3B74700E34EA1D0A17170F8D598504F5CAE1A3C08441E7A258B69F6A56A73D2EA8C120FBF7040A4B144A5BF5607
25,179,023 UART: [art] SIG.R = E345E16751400FD45C6F7820E9D041B5A6A1231D54D8643E549CDFE94D929BF64A79AD185570BDBA3C5E6BB2B5523818
25,186,433 UART: [art] SIG.S = 2035D0FED7520343D7C61760BE7C3CC17760C5CFD0FDADC308F6CEFA04EC4E96A14E637093666F1306EDF1BFEFE93B8C
26,164,747 UART: Caliptra RT
26,165,461 UART: [state] CFI Enabled
26,283,305 UART: [rt] RT listening for mailbox commands...
26,314,672 UART: [rt]cmd =0x46505652, len=4
26,315,923 UART: [rt] FIPS Version
26,317,083 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,857 UART: [kat] SHA2-256
881,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,903 UART: [kat] ++
886,055 UART: [kat] sha1
890,291 UART: [kat] SHA2-256
892,229 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,514 UART: [kat] HMAC-384Kdf
907,070 UART: [kat] LMS
1,475,266 UART: [kat] --
1,476,147 UART: [cold-reset] ++
1,476,535 UART: [fht] Storing FHT @ 0x50003400
1,479,310 UART: [idev] ++
1,479,478 UART: [idev] CDI.KEYID = 6
1,479,838 UART: [idev] SUBJECT.KEYID = 7
1,480,262 UART: [idev] UDS.KEYID = 0
1,480,607 ready_for_fw is high
1,480,607 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,456 UART: [idev] Erasing UDS.KEYID = 0
1,504,902 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,458 UART: [idev] --
1,514,439 UART: [ldev] ++
1,514,607 UART: [ldev] CDI.KEYID = 6
1,514,970 UART: [ldev] SUBJECT.KEYID = 5
1,515,396 UART: [ldev] AUTHORITY.KEYID = 7
1,515,859 UART: [ldev] FE.KEYID = 1
1,521,117 UART: [ldev] Erasing FE.KEYID = 1
1,546,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,974 UART: [ldev] --
1,585,413 UART: [fwproc] Waiting for Commands...
1,586,104 UART: [fwproc] Received command 0x46574c44
1,586,895 UART: [fwproc] Received Image of size 114168 bytes
2,883,415 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,195 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,940,547 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,112 >>> mbox cmd response: success
3,076,112 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,077,186 UART: [afmc] ++
3,077,354 UART: [afmc] CDI.KEYID = 6
3,077,716 UART: [afmc] SUBJECT.KEYID = 7
3,078,141 UART: [afmc] AUTHORITY.KEYID = 5
3,113,360 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,129,730 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,130,510 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,136,238 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,142,123 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,147,813 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,155,708 UART: [afmc] --
3,156,762 UART: [cold-reset] --
3,157,358 UART: [state] Locking Datavault
3,158,483 UART: [state] Locking PCR0, PCR1 and PCR31
3,159,087 UART: [state] Locking ICCM
3,159,645 UART: [exit] Launching FMC @ 0x40000130
3,164,974 UART:
3,164,990 UART: Running Caliptra FMC ...
3,165,398 UART:
3,165,452 UART: [state] CFI Enabled
3,175,617 UART: [fht] FMC Alias Private Key: 7
3,283,694 UART: [art] Extend RT PCRs Done
3,284,122 UART: [art] Lock RT PCRs Done
3,285,592 UART: [art] Populate DV Done
3,293,741 UART: [fht] FMC Alias Private Key: 7
3,294,691 UART: [art] Derive CDI
3,294,971 UART: [art] Store in in slot 0x4
3,380,490 UART: [art] Derive Key Pair
3,380,850 UART: [art] Store priv key in slot 0x5
3,393,918 UART: [art] Derive Key Pair - Done
3,408,695 UART: [art] Signing Cert with AUTHO
3,409,175 UART: RITY.KEYID = 7
3,424,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,425,120 UART: [art] PUB.X = 10B867818FECD769861973CDBD407E4299BFB096EF613251FE9DBC15D4DDB830033659BABB2F2D51EFA519610C6AAF0F
3,431,895 UART: [art] PUB.Y = 7B23426ACB57415917A447AE0DD4EE2F6385D55C05001A34A4F26B218722F128DEE22D805AED0919501741773427B09A
3,438,808 UART: [art] SIG.R = A747B622949CEB07B4F3FB06C0ED19DF6C84F53D1D40E96C9B326586939CB50178F719E83F608ADADD999C498F373208
3,445,570 UART: [art] SIG.S = 324625EE2FD717C277E2B77B36B2B6854D0AA1CF161436F5C527D1BF6E23F2658736C291EBDA0745842D663EF8994797
3,469,127 UART: Caliptra RT
3,469,380 UART: [state] CFI Enabled
3,577,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,608,493 UART: [rt]cmd =0x46505652, len=4
3,609,153 UART: [rt] FIPS Version
3,610,304 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,401 ready_for_fw is high
1,363,401 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,418 >>> mbox cmd response: success
2,927,418 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,962 UART:
2,988,978 UART: Running Caliptra FMC ...
2,989,386 UART:
2,989,440 UART: [state] CFI Enabled
2,999,883 UART: [fht] FMC Alias Private Key: 7
3,107,314 UART: [art] Extend RT PCRs Done
3,107,742 UART: [art] Lock RT PCRs Done
3,109,550 UART: [art] Populate DV Done
3,117,769 UART: [fht] FMC Alias Private Key: 7
3,118,791 UART: [art] Derive CDI
3,119,071 UART: [art] Store in in slot 0x4
3,204,788 UART: [art] Derive Key Pair
3,205,148 UART: [art] Store priv key in slot 0x5
3,217,732 UART: [art] Derive Key Pair - Done
3,232,513 UART: [art] Signing Cert with AUTHO
3,232,993 UART: RITY.KEYID = 7
3,248,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,248,808 UART: [art] PUB.X = A2254FF1A868CFBD426ED23B7BF6302AC5A0CE653AD65B10E103B598E74272C643248470E948A3CE4F04FCFB1ADA5ED8
3,255,588 UART: [art] PUB.Y = 986AFB5B5515766CC133ADC693554DA4C5B9D357356365FBCAB0C86CA3A16AF73C2BC80B294340A0EE8725788CA1B040
3,262,543 UART: [art] SIG.R = 4A66E1B7D0AF82933FA39FC9D5217394593C5C1E75AA3E310BA5001C0812A3801D58D3F274186EA835B833D2CD668BF0
3,269,287 UART: [art] SIG.S = 9ABC9D5D2D170CE0190AB4CADE8FF2F1DBB9BD3A2635424B98C92D9AFBF60DAB74B49857B5B073839D9B51C9C57713D1
3,293,307 UART: Caliptra RT
3,293,560 UART: [state] CFI Enabled
3,401,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,431,915 UART: [rt]cmd =0x46505652, len=4
3,432,575 UART: [rt] FIPS Version
3,433,858 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,534 UART: [kat] SHA2-256
882,465 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,580 UART: [kat] ++
886,732 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,633 UART: [kat] SHA2-512-ACC
897,534 UART: [kat] ECC-384
903,407 UART: [kat] HMAC-384Kdf
907,931 UART: [kat] LMS
1,476,127 UART: [kat] --
1,476,982 UART: [cold-reset] ++
1,477,506 UART: [fht] Storing FHT @ 0x50003400
1,480,467 UART: [idev] ++
1,480,635 UART: [idev] CDI.KEYID = 6
1,480,995 UART: [idev] SUBJECT.KEYID = 7
1,481,419 UART: [idev] UDS.KEYID = 0
1,481,764 ready_for_fw is high
1,481,764 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,537 UART: [idev] Erasing UDS.KEYID = 0
1,506,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,693 UART: [idev] --
1,515,940 UART: [ldev] ++
1,516,108 UART: [ldev] CDI.KEYID = 6
1,516,471 UART: [ldev] SUBJECT.KEYID = 5
1,516,897 UART: [ldev] AUTHORITY.KEYID = 7
1,517,360 UART: [ldev] FE.KEYID = 1
1,522,680 UART: [ldev] Erasing FE.KEYID = 1
1,547,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,587,122 UART: [fwproc] Waiting for Commands...
1,587,983 UART: [fwproc] Received command 0x46574c44
1,588,774 UART: [fwproc] Received Image of size 114168 bytes
2,884,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,911,856 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,941,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,076,779 >>> mbox cmd response: success
3,076,779 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,007 UART: [afmc] ++
3,078,175 UART: [afmc] CDI.KEYID = 6
3,078,537 UART: [afmc] SUBJECT.KEYID = 7
3,078,962 UART: [afmc] AUTHORITY.KEYID = 5
3,114,495 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,015 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,131,795 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,523 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,408 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,098 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,156,909 UART: [afmc] --
3,157,981 UART: [cold-reset] --
3,158,831 UART: [state] Locking Datavault
3,159,772 UART: [state] Locking PCR0, PCR1 and PCR31
3,160,376 UART: [state] Locking ICCM
3,160,830 UART: [exit] Launching FMC @ 0x40000130
3,166,159 UART:
3,166,175 UART: Running Caliptra FMC ...
3,166,583 UART:
3,166,726 UART: [state] CFI Enabled
3,177,457 UART: [fht] FMC Alias Private Key: 7
3,285,212 UART: [art] Extend RT PCRs Done
3,285,640 UART: [art] Lock RT PCRs Done
3,287,098 UART: [art] Populate DV Done
3,295,313 UART: [fht] FMC Alias Private Key: 7
3,296,491 UART: [art] Derive CDI
3,296,771 UART: [art] Store in in slot 0x4
3,382,682 UART: [art] Derive Key Pair
3,383,042 UART: [art] Store priv key in slot 0x5
3,396,018 UART: [art] Derive Key Pair - Done
3,410,699 UART: [art] Signing Cert with AUTHO
3,411,179 UART: RITY.KEYID = 7
3,426,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,018 UART: [art] PUB.X = 540D1808BC9313285C5DF77A4B2583DCBD00B126FEBB8C9890FD5DF533294D06A81F36BB1325BDB03F957B265FFA4C1D
3,433,769 UART: [art] PUB.Y = 99D196508C00991E55A80BA35D993C2734AADC05D38D5A8498C3B78928A9505EB174D8E776C730D5CDBBF3FEA20BA50A
3,440,693 UART: [art] SIG.R = 4AFD7F5E3DC1820A7BEDFDF0105C4566C4ACA510A9716961747F1F54FBEA92586F3261B2BB3D7D2D7543A364FC576256
3,447,470 UART: [art] SIG.S = A4B7CE2C5914067046457251F4364BD721A242CA00EC48B262E27BB3C690DDE2231E9CCD8AB8FB63063143B5F79E46B6
3,471,509 UART: Caliptra RT
3,471,854 UART: [state] CFI Enabled
3,580,937 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,611,445 UART: [rt]cmd =0x46505652, len=4
3,612,105 UART: [rt] FIPS Version
3,613,146 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,912 ready_for_fw is high
1,362,912 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,155 >>> mbox cmd response: success
2,926,155 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,987,119 UART:
2,987,135 UART: Running Caliptra FMC ...
2,987,543 UART:
2,987,686 UART: [state] CFI Enabled
2,998,401 UART: [fht] FMC Alias Private Key: 7
3,106,058 UART: [art] Extend RT PCRs Done
3,106,486 UART: [art] Lock RT PCRs Done
3,108,188 UART: [art] Populate DV Done
3,116,295 UART: [fht] FMC Alias Private Key: 7
3,117,261 UART: [art] Derive CDI
3,117,541 UART: [art] Store in in slot 0x4
3,203,484 UART: [art] Derive Key Pair
3,203,844 UART: [art] Store priv key in slot 0x5
3,216,852 UART: [art] Derive Key Pair - Done
3,231,232 UART: [art] Signing Cert with AUTHO
3,231,712 UART: RITY.KEYID = 7
3,246,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,297 UART: [art] PUB.X = 0EDD7BB4B4160824EB341329A0461B4EB1082F058BB37927C5737F430F22E2CBF9F665E29DF8A0FC2BF067745FBA0A89
3,254,057 UART: [art] PUB.Y = 78ABDC0D5F86485563D301B2471E4EC58895FE62F228580FFE8F28914DEFAF4A2FAE8195F3AB192B7D41FDD6608DCAAE
3,261,016 UART: [art] SIG.R = A5C50FE70643FD053A1EE3E6266064BCFB8E8EFE343E5B7F76886AABB4838C838FB89FDEAA6265DAD135CEB86D729226
3,267,795 UART: [art] SIG.S = BA45DC02373C457275339E987A0BD0865D19D94F875B85F08834EC1DD121787245F323253BD773AEB110B68F83847BA6
3,291,162 UART: Caliptra RT
3,291,507 UART: [state] CFI Enabled
3,398,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,429,373 UART: [rt]cmd =0x46505652, len=4
3,430,033 UART: [rt] FIPS Version
3,431,166 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,422 UART: [kat] SHA2-256
893,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,197 UART: [kat] ++
897,349 UART: [kat] sha1
901,349 UART: [kat] SHA2-256
903,289 UART: [kat] SHA2-384
906,050 UART: [kat] SHA2-512-ACC
907,951 UART: [kat] ECC-384
917,376 UART: [kat] HMAC-384Kdf
922,068 UART: [kat] LMS
1,170,396 UART: [kat] --
1,171,319 UART: [cold-reset] ++
1,171,743 UART: [fht] FHT @ 0x50003400
1,174,488 UART: [idev] ++
1,174,656 UART: [idev] CDI.KEYID = 6
1,175,016 UART: [idev] SUBJECT.KEYID = 7
1,175,440 UART: [idev] UDS.KEYID = 0
1,175,785 ready_for_fw is high
1,175,785 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,943 UART: [idev] Sha1 KeyId Algorithm
1,208,569 UART: [idev] --
1,209,689 UART: [ldev] ++
1,209,857 UART: [ldev] CDI.KEYID = 6
1,210,220 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,311 UART: [ldev] Erasing FE.KEYID = 1
1,242,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,222 UART: [fwproc] Wait for Commands...
1,282,884 UART: [fwproc] Recv command 0x46574c44
1,283,612 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,206 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,510 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,175 >>> mbox cmd response: success
2,772,175 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,433 UART: [afmc] ++
2,773,601 UART: [afmc] CDI.KEYID = 6
2,773,963 UART: [afmc] SUBJECT.KEYID = 7
2,774,388 UART: [afmc] AUTHORITY.KEYID = 5
2,809,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,092 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,820 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,705 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,424 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,368 UART: [afmc] --
2,853,484 UART: [cold-reset] --
2,854,390 UART: [state] Locking Datavault
2,855,827 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,431 UART: [state] Locking ICCM
2,856,979 UART: [exit] Launching FMC @ 0x40000130
2,862,308 UART:
2,862,324 UART: Running Caliptra FMC ...
2,862,732 UART:
2,862,786 UART: [state] CFI Enabled
2,873,077 UART: [fht] FMC Alias Private Key: 7
2,980,884 UART: [art] Extend RT PCRs Done
2,981,312 UART: [art] Lock RT PCRs Done
2,983,014 UART: [art] Populate DV Done
2,991,015 UART: [fht] FMC Alias Private Key: 7
2,992,141 UART: [art] Derive CDI
2,992,421 UART: [art] Store in in slot 0x4
3,077,858 UART: [art] Derive Key Pair
3,078,218 UART: [art] Store priv key in slot 0x5
3,091,018 UART: [art] Derive Key Pair - Done
3,106,044 UART: [art] Signing Cert with AUTHO
3,106,524 UART: RITY.KEYID = 7
3,121,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,425 UART: [art] PUB.X = 70D91A1BA04FA5625F1CC62DC825D8F9A58A9EEE5147B2DA93D38B6535241075E3304AA9390340D10DB5EAF097376FBC
3,129,197 UART: [art] PUB.Y = 36A2C61C92B3B82C8536833719B897C7DCB418EA5BA118AEE5B532E6538D39FFA43CCD5BD3BF2C0CAE20983DDC7A56AC
3,136,164 UART: [art] SIG.R = 372A3C36735BBEBA18D9EC50D46A5A4DA463CAFA7292C8FA6764161CE1676BE1E8912471C09393D56DE3F80AC64F993D
3,142,941 UART: [art] SIG.S = 71A286ABC7FC6EF2AB89FE7E917E4E0FF70FF3960412923C47024B208764328A219398020F3861F63118595FDD613566
3,166,328 UART: Caliptra RT
3,166,581 UART: [state] CFI Enabled
3,274,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,490 UART: [rt]cmd =0x46505652, len=4
3,306,150 UART: [rt] FIPS Version
3,307,089 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,747 ready_for_fw is high
1,060,747 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,724 >>> mbox cmd response: success
2,624,724 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,086 UART:
2,687,102 UART: Running Caliptra FMC ...
2,687,510 UART:
2,687,564 UART: [state] CFI Enabled
2,698,099 UART: [fht] FMC Alias Private Key: 7
2,806,202 UART: [art] Extend RT PCRs Done
2,806,630 UART: [art] Lock RT PCRs Done
2,808,410 UART: [art] Populate DV Done
2,816,603 UART: [fht] FMC Alias Private Key: 7
2,817,757 UART: [art] Derive CDI
2,818,037 UART: [art] Store in in slot 0x4
2,903,608 UART: [art] Derive Key Pair
2,903,968 UART: [art] Store priv key in slot 0x5
2,917,200 UART: [art] Derive Key Pair - Done
2,931,556 UART: [art] Signing Cert with AUTHO
2,932,036 UART: RITY.KEYID = 7
2,947,364 UART: [art] Erasing AUTHORITY.KEYID = 7
2,948,129 UART: [art] PUB.X = 503AAC1990B532289106A0FFE260CE3173566E5C63FA89F4C6E60198BD0130B7EB6E4C7252CCE9DA8D99154A44BA8CE7
2,954,898 UART: [art] PUB.Y = 60FE758A76E285A2C212B0A8C2C869A46B3D1C875ABC73D18553A2BDC1F6FFA4E50EF96DA4B9DFDEA2630FD6E6AF94B1
2,961,866 UART: [art] SIG.R = 0B4E4B073D36F25EFF0D599514B69E4C07037CC9156A1013110872DA3C3E0D105132E37A9C564CC6EEE906E41041AF91
2,968,612 UART: [art] SIG.S = DF531631DE87E3443DB814A90D1D16E77BCD88FF89B4FC30F811DB09D99CA064BC8004A9FF94C47A930C3384C2CBE96B
2,992,501 UART: Caliptra RT
2,992,754 UART: [state] CFI Enabled
3,100,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,725 UART: [rt]cmd =0x46505652, len=4
3,131,385 UART: [rt] FIPS Version
3,132,580 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,583 UART: [state] LifecycleState = Unprovisioned
86,238 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,370 UART: [kat] SHA2-256
904,310 UART: [kat] SHA2-384
907,117 UART: [kat] SHA2-512-ACC
909,018 UART: [kat] ECC-384
918,497 UART: [kat] HMAC-384Kdf
923,259 UART: [kat] LMS
1,171,587 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,172,894 UART: [fht] FHT @ 0x50003400
1,175,537 UART: [idev] ++
1,175,705 UART: [idev] CDI.KEYID = 6
1,176,065 UART: [idev] SUBJECT.KEYID = 7
1,176,489 UART: [idev] UDS.KEYID = 0
1,176,834 ready_for_fw is high
1,176,834 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,621 UART: [idev] Erasing UDS.KEYID = 0
1,201,822 UART: [idev] Sha1 KeyId Algorithm
1,210,166 UART: [idev] --
1,211,176 UART: [ldev] ++
1,211,344 UART: [ldev] CDI.KEYID = 6
1,211,707 UART: [ldev] SUBJECT.KEYID = 5
1,212,133 UART: [ldev] AUTHORITY.KEYID = 7
1,212,596 UART: [ldev] FE.KEYID = 1
1,217,896 UART: [ldev] Erasing FE.KEYID = 1
1,244,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,408 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,571 UART: [fwproc] Recv command 0x46574c44
1,285,299 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,171 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,475 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,028 >>> mbox cmd response: success
2,774,028 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,186 UART: [afmc] ++
2,775,354 UART: [afmc] CDI.KEYID = 6
2,775,716 UART: [afmc] SUBJECT.KEYID = 7
2,776,141 UART: [afmc] AUTHORITY.KEYID = 5
2,811,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,059 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,787 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,672 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,391 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,051 UART: [afmc] --
2,854,975 UART: [cold-reset] --
2,855,807 UART: [state] Locking Datavault
2,857,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,610 UART: [state] Locking ICCM
2,858,040 UART: [exit] Launching FMC @ 0x40000130
2,863,369 UART:
2,863,385 UART: Running Caliptra FMC ...
2,863,793 UART:
2,863,936 UART: [state] CFI Enabled
2,874,595 UART: [fht] FMC Alias Private Key: 7
2,982,130 UART: [art] Extend RT PCRs Done
2,982,558 UART: [art] Lock RT PCRs Done
2,983,792 UART: [art] Populate DV Done
2,992,101 UART: [fht] FMC Alias Private Key: 7
2,993,105 UART: [art] Derive CDI
2,993,385 UART: [art] Store in in slot 0x4
3,079,198 UART: [art] Derive Key Pair
3,079,558 UART: [art] Store priv key in slot 0x5
3,093,086 UART: [art] Derive Key Pair - Done
3,108,170 UART: [art] Signing Cert with AUTHO
3,108,650 UART: RITY.KEYID = 7
3,124,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,125,023 UART: [art] PUB.X = 2987F2EA6BAF43526CFDC9A68D3A243525A1988182A0E3B7732EB7C7F5BCC2F0177326D6FA434B96E8C24FB5CB7F8FA1
3,131,807 UART: [art] PUB.Y = 4A49F7B2A77B2B854490CE60AE9B019A7F076E690B39C05B0604901390225AB34101E12509EB3348DED629F4013FB371
3,138,727 UART: [art] SIG.R = 341786B00FA4FCAB91A5C3A2E4BB056062433C58402D67E11D77BBDDBF69C34657C986F4B5C63B32455E0E69FCFE7811
3,145,496 UART: [art] SIG.S = B5819B2826D8FCBE4B68E03C118E8213E42620518129D1C40486E461CE0788544F7473075B65B3670D49A2993A72C96D
3,169,757 UART: Caliptra RT
3,170,102 UART: [state] CFI Enabled
3,277,311 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,819 UART: [rt]cmd =0x46505652, len=4
3,308,479 UART: [rt] FIPS Version
3,309,754 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,552 ready_for_fw is high
1,060,552 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,089 >>> mbox cmd response: success
2,624,089 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,729 UART:
2,686,745 UART: Running Caliptra FMC ...
2,687,153 UART:
2,687,296 UART: [state] CFI Enabled
2,697,999 UART: [fht] FMC Alias Private Key: 7
2,806,368 UART: [art] Extend RT PCRs Done
2,806,796 UART: [art] Lock RT PCRs Done
2,808,550 UART: [art] Populate DV Done
2,816,735 UART: [fht] FMC Alias Private Key: 7
2,817,909 UART: [art] Derive CDI
2,818,189 UART: [art] Store in in slot 0x4
2,903,610 UART: [art] Derive Key Pair
2,903,970 UART: [art] Store priv key in slot 0x5
2,917,446 UART: [art] Derive Key Pair - Done
2,932,389 UART: [art] Signing Cert with AUTHO
2,932,869 UART: RITY.KEYID = 7
2,948,393 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,158 UART: [art] PUB.X = 986B4B2899C60999659FC35474F4D78C2F02E526DB2397C4115115B88C1C21F32102C77A694823B544D71EBF157D4429
2,955,907 UART: [art] PUB.Y = 961A1E39B3035FB145F8B85D0A383807095BDBAFE8576C13EA767C90E10D873820C0A3F1A3744E14023720D5940C91CA
2,962,834 UART: [art] SIG.R = F6971CFE2BDB8F2CFE562FF84F48EF00646A6AD98DC680106D304B5119BCA3F33441D9EA3A08BC7BE65D6D4C5C6C4D2A
2,969,601 UART: [art] SIG.S = 384BA34269889FF8188D623AE6AFCEBACDD38E22C065C89CC168C55081A3FB1555630742787FA169C7DBA58110D26224
2,993,763 UART: Caliptra RT
2,994,108 UART: [state] CFI Enabled
3,102,401 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,767 UART: [rt]cmd =0x46505652, len=4
3,133,427 UART: [rt] FIPS Version
3,134,514 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,765 UART: [kat] SHA2-256
901,705 UART: [kat] SHA2-384
904,492 UART: [kat] SHA2-512-ACC
906,393 UART: [kat] ECC-384
916,466 UART: [kat] HMAC-384Kdf
921,108 UART: [kat] LMS
1,169,420 UART: [kat] --
1,170,317 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,174,617 ready_for_fw is high
1,174,617 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,571 UART: [idev] Erasing UDS.KEYID = 0
1,199,983 UART: [idev] Sha1 KeyId Algorithm
1,208,773 UART: [idev] --
1,209,694 UART: [ldev] ++
1,209,862 UART: [ldev] CDI.KEYID = 6
1,210,226 UART: [ldev] SUBJECT.KEYID = 5
1,210,653 UART: [ldev] AUTHORITY.KEYID = 7
1,211,116 UART: [ldev] FE.KEYID = 1
1,216,246 UART: [ldev] Erasing FE.KEYID = 1
1,242,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,588 UART: [ldev] --
1,282,040 UART: [fwproc] Wait for Commands...
1,282,801 UART: [fwproc] Recv command 0x46574c44
1,283,534 UART: [fwproc] Recv'd Img size: 114168 bytes
2,578,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,852 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,161 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,709 >>> mbox cmd response: success
2,771,709 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,910 UART: [afmc] ++
2,773,078 UART: [afmc] CDI.KEYID = 6
2,773,441 UART: [afmc] SUBJECT.KEYID = 7
2,773,867 UART: [afmc] AUTHORITY.KEYID = 5
2,809,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,153 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,882 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,765 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,484 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,457 UART: [afmc] --
2,853,431 UART: [cold-reset] --
2,854,289 UART: [state] Locking Datavault
2,855,452 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,056 UART: [state] Locking ICCM
2,856,728 UART: [exit] Launching FMC @ 0x40000130
2,862,057 UART:
2,862,073 UART: Running Caliptra FMC ...
2,862,481 UART:
2,862,535 UART: [state] CFI Enabled
2,872,712 UART: [fht] FMC Alias Private Key: 7
2,979,949 UART: [art] Extend RT PCRs Done
2,980,377 UART: [art] Lock RT PCRs Done
2,981,735 UART: [art] Populate DV Done
2,990,012 UART: [fht] FMC Alias Private Key: 7
2,991,060 UART: [art] Derive CDI
2,991,340 UART: [art] Store in in slot 0x4
3,077,123 UART: [art] Derive Key Pair
3,077,483 UART: [art] Store priv key in slot 0x5
3,090,615 UART: [art] Derive Key Pair - Done
3,105,343 UART: [art] Signing Cert with AUTHO
3,105,823 UART: RITY.KEYID = 7
3,120,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,440 UART: [art] PUB.X = 7779E419F8520F65A0B9605803677279C1C2D91E3DDF26B5B213D08ED4C53ACECF24DB36A9B9FE980111A77A4D1C779E
3,128,207 UART: [art] PUB.Y = E6E0313F434A3C7B1E8135EA0E00E2A86AF46C5D1B31686E9C71234E7C5F4EC16F0D5AD2D1347E7353FAFD11139B7886
3,135,137 UART: [art] SIG.R = 8DE452EA12306839291E98E24AA2508B7365C0B3E931E23C3EB0B62FFC10770A8D13475B70D9A66CBD9536B4308E83CA
3,141,906 UART: [art] SIG.S = 67588CE28D1697E86667887A32C1A0C217155BEF50A9FF003E71FD531BCF5F0ABAB3D456A24D85F441EFFC7954BA5092
3,166,072 UART: Caliptra RT
3,166,325 UART: [state] CFI Enabled
3,272,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,200 UART: [rt]cmd =0x46505652, len=4
3,303,860 UART: [rt] FIPS Version
3,304,857 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,210 ready_for_fw is high
1,055,210 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,237 >>> mbox cmd response: success
2,620,237 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,121 UART:
2,682,137 UART: Running Caliptra FMC ...
2,682,545 UART:
2,682,599 UART: [state] CFI Enabled
2,693,186 UART: [fht] FMC Alias Private Key: 7
2,801,441 UART: [art] Extend RT PCRs Done
2,801,869 UART: [art] Lock RT PCRs Done
2,803,343 UART: [art] Populate DV Done
2,811,464 UART: [fht] FMC Alias Private Key: 7
2,812,472 UART: [art] Derive CDI
2,812,752 UART: [art] Store in in slot 0x4
2,898,523 UART: [art] Derive Key Pair
2,898,883 UART: [art] Store priv key in slot 0x5
2,911,785 UART: [art] Derive Key Pair - Done
2,926,744 UART: [art] Signing Cert with AUTHO
2,927,224 UART: RITY.KEYID = 7
2,942,754 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,519 UART: [art] PUB.X = 2A404C1F3BD24E5E65DF2F6FDBF9E9A8912B25285C178F79155DE811963AB48852F4B081574F3F97ED7F9AAA05A2353D
2,950,294 UART: [art] PUB.Y = 6D94E9A599EAAC11F237EE16609DF0B8BDBF4321DFC2DEFC9C7F18DEBC6FEE6A00B9A7419BA0985711FC78F05E59531B
2,957,246 UART: [art] SIG.R = B351647B8C0C93CC4BF8ABADC76A81F2E61B711D3B4E1D18BCA2DAB85DAB4ACA0E51F7873DF07A65176BFA752E8132ED
2,964,036 UART: [art] SIG.S = E0474EB740D9D2B7BCFC47FBC6D64DE369FA173EB2AFE85E6918AD89F48C0973BECEAA806AC69935B8FAB458389E35D8
2,987,750 UART: Caliptra RT
2,988,003 UART: [state] CFI Enabled
3,096,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,126,521 UART: [rt]cmd =0x46505652, len=4
3,127,181 UART: [rt] FIPS Version
3,128,296 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,250 UART: [state] WD Timer not started. Device not locked for debugging
87,425 UART: [kat] SHA2-256
890,975 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,104 UART: [kat] ++
895,256 UART: [kat] sha1
899,444 UART: [kat] SHA2-256
901,384 UART: [kat] SHA2-384
904,189 UART: [kat] SHA2-512-ACC
906,090 UART: [kat] ECC-384
915,937 UART: [kat] HMAC-384Kdf
920,371 UART: [kat] LMS
1,168,683 UART: [kat] --
1,169,544 UART: [cold-reset] ++
1,170,096 UART: [fht] FHT @ 0x50003400
1,172,842 UART: [idev] ++
1,173,010 UART: [idev] CDI.KEYID = 6
1,173,371 UART: [idev] SUBJECT.KEYID = 7
1,173,796 UART: [idev] UDS.KEYID = 0
1,174,142 ready_for_fw is high
1,174,142 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,120 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,404 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,107 UART: [ldev] SUBJECT.KEYID = 5
1,210,534 UART: [ldev] AUTHORITY.KEYID = 7
1,210,997 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,282,021 UART: [fwproc] Wait for Commands...
1,282,778 UART: [fwproc] Recv command 0x46574c44
1,283,511 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,227 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,635,536 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,770,992 >>> mbox cmd response: success
2,770,992 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,007 UART: [afmc] ++
2,772,175 UART: [afmc] CDI.KEYID = 6
2,772,538 UART: [afmc] SUBJECT.KEYID = 7
2,772,964 UART: [afmc] AUTHORITY.KEYID = 5
2,808,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,824,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,825,392 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,831,121 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,837,004 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,842,723 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,850,584 UART: [afmc] --
2,851,560 UART: [cold-reset] --
2,852,340 UART: [state] Locking Datavault
2,853,753 UART: [state] Locking PCR0, PCR1 and PCR31
2,854,357 UART: [state] Locking ICCM
2,854,811 UART: [exit] Launching FMC @ 0x40000130
2,860,140 UART:
2,860,156 UART: Running Caliptra FMC ...
2,860,564 UART:
2,860,707 UART: [state] CFI Enabled
2,871,468 UART: [fht] FMC Alias Private Key: 7
2,979,733 UART: [art] Extend RT PCRs Done
2,980,161 UART: [art] Lock RT PCRs Done
2,981,547 UART: [art] Populate DV Done
2,989,980 UART: [fht] FMC Alias Private Key: 7
2,990,976 UART: [art] Derive CDI
2,991,256 UART: [art] Store in in slot 0x4
3,077,027 UART: [art] Derive Key Pair
3,077,387 UART: [art] Store priv key in slot 0x5
3,090,523 UART: [art] Derive Key Pair - Done
3,105,446 UART: [art] Signing Cert with AUTHO
3,105,926 UART: RITY.KEYID = 7
3,121,014 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,779 UART: [art] PUB.X = 9BE346BEF0A67E60AD077A871D2B29F25723C36FC7F4CF6C1063F46DF9CD0B1CAB2528A5555F55D254F52887D4BAF03F
3,128,557 UART: [art] PUB.Y = 66CA79D17CFA9B3ECCE4AB78E3236E2B55D5E437D660E66A64684E1F14126BFA0D85292EF9C97E85D6F0BB1FB5D93A34
3,135,520 UART: [art] SIG.R = 91696E51A4DCEC241718118C1194C0572783E561B14D660DAA63C6DB3AE78B363101D9884F6C642DF98497D9B39378F0
3,142,278 UART: [art] SIG.S = FCF07DC9F70279822DEB4F0F82A46ECFB59D61C476541DC68258539571E1562CF6899FFC55EF4D18FCC77DAEC042ABE9
3,166,099 UART: Caliptra RT
3,166,444 UART: [state] CFI Enabled
3,273,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,303,984 UART: [rt]cmd =0x46505652, len=4
3,304,644 UART: [rt] FIPS Version
3,305,655 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,385 ready_for_fw is high
1,056,385 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,686 >>> mbox cmd response: success
2,620,686 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,682,358 UART:
2,682,374 UART: Running Caliptra FMC ...
2,682,782 UART:
2,682,925 UART: [state] CFI Enabled
2,693,188 UART: [fht] FMC Alias Private Key: 7
2,800,823 UART: [art] Extend RT PCRs Done
2,801,251 UART: [art] Lock RT PCRs Done
2,802,813 UART: [art] Populate DV Done
2,811,270 UART: [fht] FMC Alias Private Key: 7
2,812,432 UART: [art] Derive CDI
2,812,712 UART: [art] Store in in slot 0x4
2,898,835 UART: [art] Derive Key Pair
2,899,195 UART: [art] Store priv key in slot 0x5
2,911,929 UART: [art] Derive Key Pair - Done
2,926,678 UART: [art] Signing Cert with AUTHO
2,927,158 UART: RITY.KEYID = 7
2,942,600 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,365 UART: [art] PUB.X = 1DE1F3A5D9DB5A14EDA73FA91BAA17CCCBD2B00893D5DE5A5CC07F89E2572C8D7FD5D6D61300E1CDDA66A07C3320273B
2,950,136 UART: [art] PUB.Y = 8341AFD6C30E5C235CB317295BD311DA7D69DA3CA9D58FF735119DF71E520671A806485BCADEB298B5A81CC1384BB74E
2,957,089 UART: [art] SIG.R = 9F73799E1E89439E3F10F2E18262380F4AA4B02AEC89B482F431BA5307BA19ED330CE596AB570B57076C08BFC028C530
2,963,843 UART: [art] SIG.S = FED73462080A947508BE7F2ADAAC01B5F4B2E1D3A603AE0266243DEAEA9E6264A2180F86DA97821ACCBFC35666FD00C4
2,987,159 UART: Caliptra RT
2,987,504 UART: [state] CFI Enabled
3,094,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,370 UART: [rt]cmd =0x46505652, len=4
3,126,030 UART: [rt] FIPS Version
3,127,135 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,126 UART:
192,480 UART: Running Caliptra ROM ...
193,649 UART:
193,806 UART: [state] CFI Enabled
262,629 UART: [state] LifecycleState = Unprovisioned
264,568 UART: [state] DebugLocked = No
266,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,079 UART: [kat] SHA2-256
440,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,275 UART: [kat] ++
451,807 UART: [kat] sha1
462,151 UART: [kat] SHA2-256
464,839 UART: [kat] SHA2-384
470,818 UART: [kat] SHA2-512-ACC
473,211 UART: [kat] ECC-384
2,765,259 UART: [kat] HMAC-384Kdf
2,778,425 UART: [kat] LMS
3,968,750 UART: [kat] --
3,972,078 UART: [cold-reset] ++
3,974,348 UART: [fht] Storing FHT @ 0x50003400
3,987,018 UART: [idev] ++
3,987,586 UART: [idev] CDI.KEYID = 6
3,988,551 UART: [idev] SUBJECT.KEYID = 7
3,990,581 UART: [idev] UDS.KEYID = 0
4,076,137 UART: [idev] Erasing UDS.KEYID = 0
4,078,312 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,323,690 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,074 UART: [idev] --
7,347,654 UART: [ldev] ++
7,348,232 UART: [ldev] CDI.KEYID = 6
7,349,577 UART: [ldev] SUBJECT.KEYID = 5
7,350,701 UART: [ldev] AUTHORITY.KEYID = 7
7,351,881 UART: [ldev] FE.KEYID = 1
7,378,681 UART: [ldev] Erasing FE.KEYID = 1
10,717,252 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,603 UART: [ldev] --
13,091,850 UART: [fwproc] Waiting for Commands...
13,094,331 UART: [fwproc] Received command 0x46505652
13,096,734 UART: [rt] FIPS Version
13,098,344 >>> mbox cmd response data (36 bytes)
13,099,227 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,101,225 UART: [fwproc] Received command 0x46504c54
13,103,711 UART: [kat] SHA2-256
13,273,377 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,283,742 UART: [kat] ++
13,284,387 UART: [kat] sha1
13,295,004 UART: [kat] SHA2-256
13,297,707 UART: [kat] SHA2-384
13,303,606 UART: [kat] SHA2-512-ACC
13,306,008 UART: [kat] ECC-384
15,609,499 UART: [kat] HMAC-384Kdf
15,641,823 UART: [kat] LMS
16,831,306 UART: [kat] --
16,832,001 >>> mbox cmd response data (8 bytes)
16,832,364 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,833,562 UART: [fwproc] Received command 0x46504c67
16,836,204 >>> mbox cmd response data (8 bytes)
16,836,520 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,838,082 UART: [fwproc] Received command 0x43415053
16,841,099 >>> mbox cmd response data (24 bytes)
16,841,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,842,771 UART: [fwproc] Received command 0x4d454153
16,851,783 >>> mbox cmd response data (12 bytes)
16,852,206 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,854,009 UART: [fwproc] Received command 0x46505344
16,856,768 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,883,696 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,859,637 >>> mbox cmd response data (36 bytes)
12,860,924 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,390,973 >>> mbox cmd response data (8 bytes)
16,391,471 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,392,572 >>> mbox cmd response data (8 bytes)
16,392,991 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,394,994 >>> mbox cmd response data (24 bytes)
16,395,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,404,272 >>> mbox cmd response data (12 bytes)
16,404,702 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,406,648 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,538 UART:
192,920 UART: Running Caliptra ROM ...
194,081 UART:
603,566 UART: [state] CFI Enabled
618,619 UART: [state] LifecycleState = Unprovisioned
620,532 UART: [state] DebugLocked = No
622,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,230 UART: [kat] SHA2-256
796,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,503 UART: [kat] ++
807,982 UART: [kat] sha1
819,831 UART: [kat] SHA2-256
822,563 UART: [kat] SHA2-384
826,808 UART: [kat] SHA2-512-ACC
829,200 UART: [kat] ECC-384
3,112,337 UART: [kat] HMAC-384Kdf
3,124,709 UART: [kat] LMS
4,314,820 UART: [kat] --
4,319,334 UART: [cold-reset] ++
4,320,306 UART: [fht] Storing FHT @ 0x50003400
4,332,113 UART: [idev] ++
4,332,724 UART: [idev] CDI.KEYID = 6
4,333,640 UART: [idev] SUBJECT.KEYID = 7
4,334,856 UART: [idev] UDS.KEYID = 0
4,420,950 UART: [idev] Erasing UDS.KEYID = 0
4,423,123 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,624,840 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,901 UART: [idev] --
7,651,390 UART: [ldev] ++
7,651,965 UART: [ldev] CDI.KEYID = 6
7,652,929 UART: [ldev] SUBJECT.KEYID = 5
7,654,144 UART: [ldev] AUTHORITY.KEYID = 7
7,655,375 UART: [ldev] FE.KEYID = 1
7,665,700 UART: [ldev] Erasing FE.KEYID = 1
10,952,353 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,290 UART: [ldev] --
13,311,021 UART: [fwproc] Waiting for Commands...
13,314,364 UART: [fwproc] Received command 0x46505652
13,316,769 UART: [rt] FIPS Version
13,318,431 >>> mbox cmd response data (36 bytes)
13,319,267 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,319,952 UART: [fwproc] Received command 0x46504c54
13,322,433 UART: [kat] SHA2-256
13,492,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,502,456 UART: [kat] ++
13,502,999 UART: [kat] sha1
13,513,366 UART: [kat] SHA2-256
13,516,062 UART: [kat] SHA2-384
13,522,537 UART: [kat] SHA2-512-ACC
13,524,940 UART: [kat] ECC-384
15,808,050 UART: [kat] HMAC-384Kdf
15,819,744 UART: [kat] LMS
17,009,190 UART: [kat] --
17,009,911 >>> mbox cmd response data (8 bytes)
17,010,335 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,011,381 UART: [fwproc] Received command 0x46504c67
17,014,024 >>> mbox cmd response data (8 bytes)
17,014,346 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,014,889 UART: [fwproc] Received command 0x43415053
17,017,949 >>> mbox cmd response data (24 bytes)
17,018,583 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,019,164 UART: [fwproc] Received command 0x4d454153
17,028,144 >>> mbox cmd response data (12 bytes)
17,028,567 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,029,161 UART: [fwproc] Received command 0x46505344
17,031,955 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
4,214,809 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,044,949 >>> mbox cmd response data (36 bytes)
13,046,134 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,544,311 >>> mbox cmd response data (8 bytes)
16,544,822 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,546,377 >>> mbox cmd response data (8 bytes)
16,546,793 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,549,068 >>> mbox cmd response data (24 bytes)
16,549,617 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,558,508 >>> mbox cmd response data (12 bytes)
16,558,940 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,560,508 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,216 UART:
192,616 UART: Running Caliptra ROM ...
193,906 UART:
194,063 UART: [state] CFI Enabled
268,433 UART: [state] LifecycleState = Unprovisioned
270,274 UART: [state] DebugLocked = No
271,713 UART: [state] WD Timer not started. Device not locked for debugging
274,612 UART: [kat] SHA2-256
453,767 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
465,304 UART: [kat] ++
465,782 UART: [kat] sha1
477,305 UART: [kat] SHA2-256
480,326 UART: [kat] SHA2-384
486,741 UART: [kat] SHA2-512-ACC
489,697 UART: [kat] ECC-384
2,949,291 UART: [kat] HMAC-384Kdf
2,972,538 UART: [kat] LMS
3,502,023 UART: [kat] --
3,505,989 UART: [cold-reset] ++
3,508,246 UART: [fht] FHT @ 0x50003400
3,519,806 UART: [idev] ++
3,520,432 UART: [idev] CDI.KEYID = 6
3,521,321 UART: [idev] SUBJECT.KEYID = 7
3,522,485 UART: [idev] UDS.KEYID = 0
3,605,029 UART: [idev] Erasing UDS.KEYID = 0
3,607,260 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,027,411 UART: [idev] Sha1 KeyId Algorithm
6,050,131 UART: [idev] --
6,053,524 UART: [ldev] ++
6,054,109 UART: [ldev] CDI.KEYID = 6
6,055,005 UART: [ldev] SUBJECT.KEYID = 5
6,056,179 UART: [ldev] AUTHORITY.KEYID = 7
6,057,418 UART: [ldev] FE.KEYID = 1
6,099,791 UART: [ldev] Erasing FE.KEYID = 1
8,607,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,033 UART: [ldev] --
10,413,113 UART: [fwproc] Wait for Commands...
10,414,942 UART: [fwproc] Recv command 0x46505652
10,417,256 UART: [rt] FIPS Version
10,418,760 >>> mbox cmd response data (36 bytes)
10,419,476 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,420,632 UART: [fwproc] Recv command 0x46504c54
10,423,023 UART: [kat] SHA2-256
10,602,177 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,613,829 UART: [kat] ++
10,614,390 UART: [kat] sha1
10,625,882 UART: [kat] SHA2-256
10,628,949 UART: [kat] SHA2-384
10,634,663 UART: [kat] SHA2-512-ACC
10,637,604 UART: [kat] ECC-384
13,087,417 UART: [kat] HMAC-384Kdf
13,107,761 UART: [kat] LMS
13,637,353 UART: [kat] --
13,637,997 >>> mbox cmd response data (8 bytes)
13,638,355 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,639,439 UART: [fwproc] Recv command 0x46504c67
13,641,994 >>> mbox cmd response data (8 bytes)
13,642,311 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,643,546 UART: [fwproc] Recv command 0x43415053
13,646,252 >>> mbox cmd response data (24 bytes)
13,646,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,648,638 UART: [fwproc] Recv command 0x4d454153
13,657,170 >>> mbox cmd response data (12 bytes)
13,657,606 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,659,119 UART: [fwproc] Recv command 0x46505344
13,661,606 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,100 writing to cptra_bootfsm_go
3,441,032 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,203,181 >>> mbox cmd response data (36 bytes)
10,204,374 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,307,551 >>> mbox cmd response data (8 bytes)
13,308,057 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,309,619 >>> mbox cmd response data (8 bytes)
13,310,035 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,312,334 >>> mbox cmd response data (24 bytes)
13,312,927 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,320,313 >>> mbox cmd response data (12 bytes)
13,320,747 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,322,269 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,581 UART:
192,951 UART: Running Caliptra ROM ...
194,127 UART:
603,698 UART: [state] CFI Enabled
614,377 UART: [state] LifecycleState = Unprovisioned
616,236 UART: [state] DebugLocked = No
617,774 UART: [state] WD Timer not started. Device not locked for debugging
621,602 UART: [kat] SHA2-256
800,756 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
812,303 UART: [kat] ++
812,829 UART: [kat] sha1
823,062 UART: [kat] SHA2-256
826,127 UART: [kat] SHA2-384
831,827 UART: [kat] SHA2-512-ACC
834,753 UART: [kat] ECC-384
3,276,745 UART: [kat] HMAC-384Kdf
3,289,052 UART: [kat] LMS
3,818,566 UART: [kat] --
3,822,255 UART: [cold-reset] ++
3,824,243 UART: [fht] FHT @ 0x50003400
3,835,756 UART: [idev] ++
3,836,327 UART: [idev] CDI.KEYID = 6
3,837,240 UART: [idev] SUBJECT.KEYID = 7
3,838,453 UART: [idev] UDS.KEYID = 0
3,918,570 UART: [idev] Erasing UDS.KEYID = 0
3,920,835 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,314,166 UART: [idev] Sha1 KeyId Algorithm
6,336,226 UART: [idev] --
6,339,309 UART: [ldev] ++
6,339,888 UART: [ldev] CDI.KEYID = 6
6,340,802 UART: [ldev] SUBJECT.KEYID = 5
6,341,970 UART: [ldev] AUTHORITY.KEYID = 7
6,343,257 UART: [ldev] FE.KEYID = 1
6,354,600 UART: [ldev] Erasing FE.KEYID = 1
8,825,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,941 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,795 UART: [ldev] --
10,617,907 UART: [fwproc] Wait for Commands...
10,620,704 UART: [fwproc] Recv command 0x46505652
10,623,031 UART: [rt] FIPS Version
10,624,549 >>> mbox cmd response data (36 bytes)
10,625,269 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,626,456 UART: [fwproc] Recv command 0x46504c54
10,628,790 UART: [kat] SHA2-256
10,807,940 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,819,579 UART: [kat] ++
10,820,043 UART: [kat] sha1
10,830,930 UART: [kat] SHA2-256
10,834,015 UART: [kat] SHA2-384
10,840,916 UART: [kat] SHA2-512-ACC
10,843,862 UART: [kat] ECC-384
13,286,944 UART: [kat] HMAC-384Kdf
13,298,956 UART: [kat] LMS
13,828,633 UART: [kat] --
13,829,295 >>> mbox cmd response data (8 bytes)
13,829,647 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,831,156 UART: [fwproc] Recv command 0x46504c67
13,833,705 >>> mbox cmd response data (8 bytes)
13,834,017 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,834,874 UART: [fwproc] Recv command 0x43415053
13,837,577 >>> mbox cmd response data (24 bytes)
13,838,021 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,838,532 UART: [fwproc] Recv command 0x4d454153
13,847,026 >>> mbox cmd response data (12 bytes)
13,847,462 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,848,545 UART: [fwproc] Recv command 0x46505344
13,851,026 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,432 writing to cptra_bootfsm_go
3,784,511 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,418,168 >>> mbox cmd response data (36 bytes)
10,419,356 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,484,521 >>> mbox cmd response data (8 bytes)
13,485,024 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,486,724 >>> mbox cmd response data (8 bytes)
13,487,127 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,489,350 >>> mbox cmd response data (24 bytes)
13,489,877 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,497,302 >>> mbox cmd response data (12 bytes)
13,497,746 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,499,532 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,127 UART:
192,542 UART: Running Caliptra ROM ...
193,647 UART:
193,793 UART: [state] CFI Enabled
261,819 UART: [state] LifecycleState = Unprovisioned
264,210 UART: [state] DebugLocked = No
265,917 UART: [state] WD Timer not started. Device not locked for debugging
270,711 UART: [kat] SHA2-256
460,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,356 UART: [kat] ++
472,004 UART: [kat] sha1
484,076 UART: [kat] SHA2-256
487,003 UART: [kat] SHA2-384
493,054 UART: [kat] SHA2-512-ACC
495,631 UART: [kat] ECC-384
2,947,631 UART: [kat] HMAC-384Kdf
2,970,786 UART: [kat] LMS
3,502,589 UART: [kat] --
3,504,927 UART: [cold-reset] ++
3,507,519 UART: [fht] FHT @ 0x50003400
3,518,609 UART: [idev] ++
3,519,188 UART: [idev] CDI.KEYID = 6
3,520,156 UART: [idev] SUBJECT.KEYID = 7
3,521,371 UART: [idev] UDS.KEYID = 0
3,608,031 UART: [idev] Erasing UDS.KEYID = 0
3,610,293 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,031,550 UART: [idev] Sha1 KeyId Algorithm
6,052,763 UART: [idev] --
6,058,444 UART: [ldev] ++
6,059,138 UART: [ldev] CDI.KEYID = 6
6,060,050 UART: [ldev] SUBJECT.KEYID = 5
6,061,242 UART: [ldev] AUTHORITY.KEYID = 7
6,062,482 UART: [ldev] FE.KEYID = 1
6,099,669 UART: [ldev] Erasing FE.KEYID = 1
8,609,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,680 UART: [ldev] --
10,412,389 UART: [fwproc] Wait for Commands...
10,413,856 UART: [fwproc] Recv command 0x46505652
10,416,073 UART: [rt] FIPS Version
10,417,806 >>> mbox cmd response data (36 bytes)
10,418,627 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,419,577 UART: [fwproc] Recv command 0x46504c54
10,421,779 UART: [kat] SHA2-256
10,611,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,622,309 UART: [kat] ++
10,622,852 UART: [kat] sha1
10,634,986 UART: [kat] SHA2-256
10,638,004 UART: [kat] SHA2-384
10,642,594 UART: [kat] SHA2-512-ACC
10,645,178 UART: [kat] ECC-384
13,100,784 UART: [kat] HMAC-384Kdf
13,124,672 UART: [kat] LMS
13,656,562 UART: [kat] --
13,657,219 >>> mbox cmd response data (8 bytes)
13,657,572 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,659,088 UART: [fwproc] Recv command 0x46504c67
13,661,590 >>> mbox cmd response data (8 bytes)
13,661,909 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,662,628 UART: [fwproc] Recv command 0x43415053
13,665,616 >>> mbox cmd response data (24 bytes)
13,666,293 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,667,572 UART: [fwproc] Recv command 0x4d454153
13,677,258 >>> mbox cmd response data (12 bytes)
13,677,678 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,678,870 UART: [fwproc] Recv command 0x46505344
13,681,581 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,521,639 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,242,186 >>> mbox cmd response data (36 bytes)
10,243,215 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,404,832 >>> mbox cmd response data (8 bytes)
13,405,329 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,406,286 >>> mbox cmd response data (8 bytes)
13,406,647 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,408,482 >>> mbox cmd response data (24 bytes)
13,409,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,417,172 >>> mbox cmd response data (12 bytes)
13,417,585 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,418,833 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,468 UART:
192,861 UART: Running Caliptra ROM ...
193,981 UART:
603,723 UART: [state] CFI Enabled
616,667 UART: [state] LifecycleState = Unprovisioned
619,042 UART: [state] DebugLocked = No
620,702 UART: [state] WD Timer not started. Device not locked for debugging
626,201 UART: [kat] SHA2-256
816,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,850 UART: [kat] ++
827,380 UART: [kat] sha1
837,666 UART: [kat] SHA2-256
840,734 UART: [kat] SHA2-384
847,739 UART: [kat] SHA2-512-ACC
850,304 UART: [kat] ECC-384
3,291,675 UART: [kat] HMAC-384Kdf
3,304,634 UART: [kat] LMS
3,836,477 UART: [kat] --
3,842,436 UART: [cold-reset] ++
3,843,990 UART: [fht] FHT @ 0x50003400
3,855,342 UART: [idev] ++
3,856,068 UART: [idev] CDI.KEYID = 6
3,856,959 UART: [idev] SUBJECT.KEYID = 7
3,858,231 UART: [idev] UDS.KEYID = 0
3,943,666 UART: [idev] Erasing UDS.KEYID = 0
3,945,859 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,333,472 UART: [idev] Sha1 KeyId Algorithm
6,355,386 UART: [idev] --
6,359,549 UART: [ldev] ++
6,360,230 UART: [ldev] CDI.KEYID = 6
6,361,113 UART: [ldev] SUBJECT.KEYID = 5
6,362,330 UART: [ldev] AUTHORITY.KEYID = 7
6,363,504 UART: [ldev] FE.KEYID = 1
6,374,722 UART: [ldev] Erasing FE.KEYID = 1
8,853,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,076 UART: [ldev] --
10,646,159 UART: [fwproc] Wait for Commands...
10,648,574 UART: [fwproc] Recv command 0x46505652
10,651,172 UART: [rt] FIPS Version
10,652,881 >>> mbox cmd response data (36 bytes)
10,653,757 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,655,092 UART: [fwproc] Recv command 0x46504c54
10,657,322 UART: [kat] SHA2-256
10,847,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,857,834 UART: [kat] ++
10,858,348 UART: [kat] sha1
10,868,318 UART: [kat] SHA2-256
10,871,333 UART: [kat] SHA2-384
10,878,515 UART: [kat] SHA2-512-ACC
10,881,137 UART: [kat] ECC-384
13,323,871 UART: [kat] HMAC-384Kdf
13,337,264 UART: [kat] LMS
13,869,146 UART: [kat] --
13,869,842 >>> mbox cmd response data (8 bytes)
13,870,193 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,870,841 UART: [fwproc] Recv command 0x46504c67
13,873,339 >>> mbox cmd response data (8 bytes)
13,873,656 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,874,672 UART: [fwproc] Recv command 0x43415053
13,877,386 >>> mbox cmd response data (24 bytes)
13,877,869 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,878,984 UART: [fwproc] Recv command 0x4d454153
13,888,669 >>> mbox cmd response data (12 bytes)
13,889,084 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,889,956 UART: [fwproc] Recv command 0x46505344
13,892,677 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,841,747 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,469,466 >>> mbox cmd response data (36 bytes)
10,470,633 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,593,757 >>> mbox cmd response data (8 bytes)
13,594,271 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,595,986 >>> mbox cmd response data (8 bytes)
13,596,402 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,598,623 >>> mbox cmd response data (24 bytes)
13,599,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,607,031 >>> mbox cmd response data (12 bytes)
13,607,449 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,609,395 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,419 UART: [kat] SHA2-256
882,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,465 UART: [kat] ++
886,617 UART: [kat] sha1
890,921 UART: [kat] SHA2-256
892,859 UART: [kat] SHA2-384
895,670 UART: [kat] SHA2-512-ACC
897,571 UART: [kat] ECC-384
902,944 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,935 UART: [cold-reset] ++
1,477,411 UART: [fht] Storing FHT @ 0x50003400
1,480,296 UART: [idev] ++
1,480,464 UART: [idev] CDI.KEYID = 6
1,480,824 UART: [idev] SUBJECT.KEYID = 7
1,481,248 UART: [idev] UDS.KEYID = 0
1,481,593 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,348 UART: [idev] Erasing UDS.KEYID = 0
1,505,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,202 UART: [idev] --
1,515,353 UART: [ldev] ++
1,515,521 UART: [ldev] CDI.KEYID = 6
1,515,884 UART: [ldev] SUBJECT.KEYID = 5
1,516,310 UART: [ldev] AUTHORITY.KEYID = 7
1,516,773 UART: [ldev] FE.KEYID = 1
1,521,649 UART: [ldev] Erasing FE.KEYID = 1
1,547,066 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,074 UART: [ldev] --
1,586,433 UART: [fwproc] Waiting for Commands...
1,587,190 UART: [fwproc] Received command 0x46505652
1,588,072 UART: [rt] FIPS Version
1,588,625 >>> mbox cmd response data (36 bytes)
1,588,626 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,810 UART: [fwproc] Received command 0x46504c54
1,589,717 UART: [kat] SHA2-256
2,383,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,763 UART: [kat] ++
2,387,915 UART: [kat] sha1
2,392,257 UART: [kat] SHA2-256
2,394,195 UART: [kat] SHA2-384
2,396,932 UART: [kat] SHA2-512-ACC
2,398,832 UART: [kat] ECC-384
2,404,365 UART: [kat] HMAC-384Kdf
2,408,985 UART: [kat] LMS
2,977,181 UART: [kat] --
2,977,419 >>> mbox cmd response data (8 bytes)
2,977,420 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,516 UART: [fwproc] Received command 0x46504c67
2,978,470 >>> mbox cmd response data (8 bytes)
2,978,471 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,645 UART: [fwproc] Received command 0x43415053
2,979,693 >>> mbox cmd response data (24 bytes)
2,979,694 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,968 UART: [fwproc] Received command 0x4d454153
2,984,032 >>> mbox cmd response data (12 bytes)
2,984,033 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,984,209 UART: [fwproc] Received command 0x46505344
2,985,157 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,843 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,804 >>> mbox cmd response data (36 bytes)
1,441,805 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,946 >>> mbox cmd response data (8 bytes)
2,716,947 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,251 >>> mbox cmd response data (8 bytes)
2,717,252 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,840 >>> mbox cmd response data (24 bytes)
2,717,841 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,287 >>> mbox cmd response data (12 bytes)
2,721,288 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,731 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,634 UART: [kat] SHA2-256
892,572 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,891 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,556 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,480,099 UART: [idev] ++
1,480,267 UART: [idev] CDI.KEYID = 6
1,480,627 UART: [idev] SUBJECT.KEYID = 7
1,481,051 UART: [idev] UDS.KEYID = 0
1,481,396 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,027 UART: [idev] Erasing UDS.KEYID = 0
1,505,855 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,579 UART: [idev] --
1,515,570 UART: [ldev] ++
1,515,738 UART: [ldev] CDI.KEYID = 6
1,516,101 UART: [ldev] SUBJECT.KEYID = 5
1,516,527 UART: [ldev] AUTHORITY.KEYID = 7
1,516,990 UART: [ldev] FE.KEYID = 1
1,522,570 UART: [ldev] Erasing FE.KEYID = 1
1,548,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,121 UART: [ldev] --
1,587,514 UART: [fwproc] Waiting for Commands...
1,588,253 UART: [fwproc] Received command 0x46505652
1,589,135 UART: [rt] FIPS Version
1,589,688 >>> mbox cmd response data (36 bytes)
1,589,689 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,589,949 UART: [fwproc] Received command 0x46504c54
1,590,856 UART: [kat] SHA2-256
2,384,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,388,902 UART: [kat] ++
2,389,054 UART: [kat] sha1
2,393,266 UART: [kat] SHA2-256
2,395,204 UART: [kat] SHA2-384
2,397,775 UART: [kat] SHA2-512-ACC
2,399,675 UART: [kat] ECC-384
2,405,640 UART: [kat] HMAC-384Kdf
2,410,268 UART: [kat] LMS
2,978,464 UART: [kat] --
2,978,702 >>> mbox cmd response data (8 bytes)
2,978,703 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,978,851 UART: [fwproc] Received command 0x46504c67
2,979,805 >>> mbox cmd response data (8 bytes)
2,979,806 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,979,866 UART: [fwproc] Received command 0x43415053
2,980,914 >>> mbox cmd response data (24 bytes)
2,980,915 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,981,143 UART: [fwproc] Received command 0x4d454153
2,985,207 >>> mbox cmd response data (12 bytes)
2,985,208 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,985,344 UART: [fwproc] Received command 0x46505344
2,986,292 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,116 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,979 >>> mbox cmd response data (36 bytes)
1,441,980 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,067 >>> mbox cmd response data (8 bytes)
2,717,068 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,404 >>> mbox cmd response data (8 bytes)
2,717,405 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,811 >>> mbox cmd response data (24 bytes)
2,717,812 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,721,284 >>> mbox cmd response data (12 bytes)
2,721,285 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,622 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,671 UART: [kat] SHA2-256
903,611 UART: [kat] SHA2-384
906,426 UART: [kat] SHA2-512-ACC
908,327 UART: [kat] ECC-384
917,664 UART: [kat] HMAC-384Kdf
922,272 UART: [kat] LMS
1,170,600 UART: [kat] --
1,171,575 UART: [cold-reset] ++
1,172,085 UART: [fht] FHT @ 0x50003400
1,174,706 UART: [idev] ++
1,174,874 UART: [idev] CDI.KEYID = 6
1,175,234 UART: [idev] SUBJECT.KEYID = 7
1,175,658 UART: [idev] UDS.KEYID = 0
1,176,003 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,682 UART: [idev] Erasing UDS.KEYID = 0
1,200,697 UART: [idev] Sha1 KeyId Algorithm
1,209,315 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,914 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,217,167 UART: [ldev] Erasing FE.KEYID = 1
1,243,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,729 UART: [ldev] --
1,283,094 UART: [fwproc] Wait for Commands...
1,283,744 UART: [fwproc] Recv command 0x46505652
1,284,565 UART: [rt] FIPS Version
1,285,119 >>> mbox cmd response data (36 bytes)
1,285,120 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,426 UART: [fwproc] Recv command 0x46504c54
1,286,272 UART: [kat] SHA2-256
2,091,922 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,047 UART: [kat] ++
2,096,199 UART: [kat] sha1
2,100,507 UART: [kat] SHA2-256
2,102,447 UART: [kat] SHA2-384
2,105,318 UART: [kat] SHA2-512-ACC
2,107,218 UART: [kat] ECC-384
2,116,929 UART: [kat] HMAC-384Kdf
2,121,475 UART: [kat] LMS
2,369,803 UART: [kat] --
2,370,041 >>> mbox cmd response data (8 bytes)
2,370,042 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,370,347 UART: [fwproc] Recv command 0x46504c67
2,371,240 >>> mbox cmd response data (8 bytes)
2,371,241 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,468 UART: [fwproc] Recv command 0x43415053
2,372,451 >>> mbox cmd response data (24 bytes)
2,372,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,372,543 UART: [fwproc] Recv command 0x4d454153
2,376,552 >>> mbox cmd response data (12 bytes)
2,376,553 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,684 UART: [fwproc] Recv command 0x46505344
2,377,571 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,739 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,835 >>> mbox cmd response data (36 bytes)
1,139,836 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,570 >>> mbox cmd response data (8 bytes)
2,112,571 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,989 >>> mbox cmd response data (8 bytes)
2,112,990 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,360 >>> mbox cmd response data (24 bytes)
2,113,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,741 >>> mbox cmd response data (12 bytes)
2,116,742 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,006 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
923,059 UART: [kat] LMS
1,171,387 UART: [kat] --
1,172,308 UART: [cold-reset] ++
1,172,870 UART: [fht] FHT @ 0x50003400
1,175,515 UART: [idev] ++
1,175,683 UART: [idev] CDI.KEYID = 6
1,176,043 UART: [idev] SUBJECT.KEYID = 7
1,176,467 UART: [idev] UDS.KEYID = 0
1,176,812 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,563 UART: [idev] Erasing UDS.KEYID = 0
1,201,720 UART: [idev] Sha1 KeyId Algorithm
1,210,172 UART: [idev] --
1,211,222 UART: [ldev] ++
1,211,390 UART: [ldev] CDI.KEYID = 6
1,211,753 UART: [ldev] SUBJECT.KEYID = 5
1,212,179 UART: [ldev] AUTHORITY.KEYID = 7
1,212,642 UART: [ldev] FE.KEYID = 1
1,218,036 UART: [ldev] Erasing FE.KEYID = 1
1,244,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,472 UART: [ldev] --
1,283,765 UART: [fwproc] Wait for Commands...
1,284,505 UART: [fwproc] Recv command 0x46505652
1,285,326 UART: [rt] FIPS Version
1,285,880 >>> mbox cmd response data (36 bytes)
1,285,881 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,981 UART: [fwproc] Recv command 0x46504c54
1,286,827 UART: [kat] SHA2-256
2,092,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,602 UART: [kat] ++
2,096,754 UART: [kat] sha1
2,101,164 UART: [kat] SHA2-256
2,103,104 UART: [kat] SHA2-384
2,105,969 UART: [kat] SHA2-512-ACC
2,107,869 UART: [kat] ECC-384
2,117,990 UART: [kat] HMAC-384Kdf
2,122,758 UART: [kat] LMS
2,371,086 UART: [kat] --
2,371,324 >>> mbox cmd response data (8 bytes)
2,371,325 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,371,498 UART: [fwproc] Recv command 0x46504c67
2,372,391 >>> mbox cmd response data (8 bytes)
2,372,392 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,372,635 UART: [fwproc] Recv command 0x43415053
2,373,618 >>> mbox cmd response data (24 bytes)
2,373,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,373,802 UART: [fwproc] Recv command 0x4d454153
2,377,811 >>> mbox cmd response data (12 bytes)
2,377,812 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,378,109 UART: [fwproc] Recv command 0x46505344
2,378,996 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,660 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,974 >>> mbox cmd response data (36 bytes)
1,141,975 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,115,031 >>> mbox cmd response data (8 bytes)
2,115,032 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,115,396 >>> mbox cmd response data (8 bytes)
2,115,397 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,115,955 >>> mbox cmd response data (24 bytes)
2,115,956 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,119,454 >>> mbox cmd response data (12 bytes)
2,119,455 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,119,749 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,569 UART: [kat] ++
895,721 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,778 UART: [kat] SHA2-512-ACC
906,679 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,480 UART: [kat] LMS
1,168,792 UART: [kat] --
1,169,601 UART: [cold-reset] ++
1,170,119 UART: [fht] FHT @ 0x50003400
1,172,655 UART: [idev] ++
1,172,823 UART: [idev] CDI.KEYID = 6
1,173,184 UART: [idev] SUBJECT.KEYID = 7
1,173,609 UART: [idev] UDS.KEYID = 0
1,173,955 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,943 UART: [idev] Sha1 KeyId Algorithm
1,207,849 UART: [idev] --
1,208,834 UART: [ldev] ++
1,209,002 UART: [ldev] CDI.KEYID = 6
1,209,366 UART: [ldev] SUBJECT.KEYID = 5
1,209,793 UART: [ldev] AUTHORITY.KEYID = 7
1,210,256 UART: [ldev] FE.KEYID = 1
1,215,344 UART: [ldev] Erasing FE.KEYID = 1
1,241,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,744 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,957 UART: [fwproc] Recv command 0x46505652
1,282,784 UART: [rt] FIPS Version
1,283,345 >>> mbox cmd response data (36 bytes)
1,283,346 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,651 UART: [fwproc] Recv command 0x46504c54
1,284,505 UART: [kat] SHA2-256
2,088,055 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,184 UART: [kat] ++
2,092,336 UART: [kat] sha1
2,096,426 UART: [kat] SHA2-256
2,098,366 UART: [kat] SHA2-384
2,101,175 UART: [kat] SHA2-512-ACC
2,103,075 UART: [kat] ECC-384
2,112,802 UART: [kat] HMAC-384Kdf
2,117,394 UART: [kat] LMS
2,365,706 UART: [kat] --
2,365,947 >>> mbox cmd response data (8 bytes)
2,365,948 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,366,236 UART: [fwproc] Recv command 0x46504c67
2,367,140 >>> mbox cmd response data (8 bytes)
2,367,141 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,367,243 UART: [fwproc] Recv command 0x43415053
2,368,238 >>> mbox cmd response data (24 bytes)
2,368,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,468 UART: [fwproc] Recv command 0x4d454153
2,372,495 >>> mbox cmd response data (12 bytes)
2,372,496 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,695 UART: [fwproc] Recv command 0x46505344
2,373,598 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,224 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,232 >>> mbox cmd response data (36 bytes)
1,136,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,799 >>> mbox cmd response data (8 bytes)
2,104,800 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,274 >>> mbox cmd response data (8 bytes)
2,105,275 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,105,702 >>> mbox cmd response data (24 bytes)
2,105,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,109,097 >>> mbox cmd response data (12 bytes)
2,109,098 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,109,532 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,969 UART: [state] LifecycleState = Unprovisioned
85,624 UART: [state] DebugLocked = No
86,350 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
891,027 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,452 UART: [kat] SHA2-256
901,392 UART: [kat] SHA2-384
904,109 UART: [kat] SHA2-512-ACC
906,010 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,466 UART: [cold-reset] ++
1,170,026 UART: [fht] FHT @ 0x50003400
1,172,754 UART: [idev] ++
1,172,922 UART: [idev] CDI.KEYID = 6
1,173,283 UART: [idev] SUBJECT.KEYID = 7
1,173,708 UART: [idev] UDS.KEYID = 0
1,174,054 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,492 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,257 UART: [ldev] ++
1,209,425 UART: [ldev] CDI.KEYID = 6
1,209,789 UART: [ldev] SUBJECT.KEYID = 5
1,210,216 UART: [ldev] AUTHORITY.KEYID = 7
1,210,679 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,241,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,355 UART: [fwproc] Wait for Commands...
1,282,008 UART: [fwproc] Recv command 0x46505652
1,282,835 UART: [rt] FIPS Version
1,283,396 >>> mbox cmd response data (36 bytes)
1,283,397 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,576 UART: [fwproc] Recv command 0x46504c54
1,284,430 UART: [kat] SHA2-256
2,087,980 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,092,109 UART: [kat] ++
2,092,261 UART: [kat] sha1
2,096,539 UART: [kat] SHA2-256
2,098,479 UART: [kat] SHA2-384
2,101,162 UART: [kat] SHA2-512-ACC
2,103,062 UART: [kat] ECC-384
2,112,527 UART: [kat] HMAC-384Kdf
2,117,035 UART: [kat] LMS
2,365,347 UART: [kat] --
2,365,588 >>> mbox cmd response data (8 bytes)
2,365,589 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,791 UART: [fwproc] Recv command 0x46504c67
2,366,695 >>> mbox cmd response data (8 bytes)
2,366,696 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,366,800 UART: [fwproc] Recv command 0x43415053
2,367,795 >>> mbox cmd response data (24 bytes)
2,367,796 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,037 UART: [fwproc] Recv command 0x4d454153
2,372,064 >>> mbox cmd response data (12 bytes)
2,372,065 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,334 UART: [fwproc] Recv command 0x46505344
2,373,237 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,327 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,753 >>> mbox cmd response data (36 bytes)
1,136,754 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,105,692 >>> mbox cmd response data (8 bytes)
2,105,693 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,106,191 >>> mbox cmd response data (8 bytes)
2,106,192 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,106,671 >>> mbox cmd response data (24 bytes)
2,106,672 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,110,240 >>> mbox cmd response data (12 bytes)
2,110,241 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,110,551 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,101 UART:
192,486 UART: Running Caliptra ROM ...
193,577 UART:
193,719 UART: [state] CFI Enabled
265,045 UART: [state] LifecycleState = Unprovisioned
266,937 UART: [state] DebugLocked = No
268,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,402 UART: [kat] SHA2-256
443,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,649 UART: [kat] ++
454,098 UART: [kat] sha1
466,187 UART: [kat] SHA2-256
468,903 UART: [kat] SHA2-384
474,471 UART: [kat] SHA2-512-ACC
476,842 UART: [kat] ECC-384
2,764,238 UART: [kat] HMAC-384Kdf
2,778,846 UART: [kat] LMS
3,969,168 UART: [kat] --
3,972,031 UART: [cold-reset] ++
3,972,979 UART: [fht] Storing FHT @ 0x50003400
3,984,181 UART: [idev] ++
3,984,748 UART: [idev] CDI.KEYID = 6
3,985,736 UART: [idev] SUBJECT.KEYID = 7
3,986,916 UART: [idev] UDS.KEYID = 0
3,987,984 ready_for_fw is high
3,988,210 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,131,438 UART: [idev] Erasing UDS.KEYID = 0
7,324,144 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,834 UART: [idev] --
7,348,940 UART: [ldev] ++
7,349,509 UART: [ldev] CDI.KEYID = 6
7,350,449 UART: [ldev] SUBJECT.KEYID = 5
7,351,660 UART: [ldev] AUTHORITY.KEYID = 7
7,352,948 UART: [ldev] FE.KEYID = 1
7,400,838 UART: [ldev] Erasing FE.KEYID = 1
10,730,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,576 UART: [ldev] --
13,096,114 UART: [fwproc] Waiting for Commands...
13,098,706 UART: [fwproc] Received command 0x46574c44
13,100,897 UART: [fwproc] Received Image of size 113844 bytes
17,149,337 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,219,450 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,288,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,605,324 >>> mbox cmd response: success
17,608,216 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,609,149 UART: [afmc] ++
17,609,744 UART: [afmc] CDI.KEYID = 6
17,610,654 UART: [afmc] SUBJECT.KEYID = 7
17,611,870 UART: [afmc] AUTHORITY.KEYID = 5
20,963,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,267,492 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,269,750 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,284,153 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,299,016 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,313,464 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,334,924 UART: [afmc] --
23,339,386 UART: [cold-reset] --
23,343,733 UART: [state] Locking Datavault
23,348,071 UART: [state] Locking PCR0, PCR1 and PCR31
23,349,829 UART: [state] Locking ICCM
23,351,494 UART: [exit] Launching FMC @ 0x40000130
23,359,836 UART:
23,360,074 UART: Running Caliptra FMC ...
23,361,179 UART:
23,361,337 UART: [state] CFI Enabled
23,426,881 UART: [fht] FMC Alias Private Key: 7
25,764,470 UART: [art] Extend RT PCRs Done
25,765,691 UART: [art] Lock RT PCRs Done
25,766,957 UART: [art] Populate DV Done
25,772,266 UART: [fht] FMC Alias Private Key: 7
25,773,854 UART: [art] Derive CDI
25,774,665 UART: [art] Store in in slot 0x4
25,834,866 UART: [art] Derive Key Pair
25,835,902 UART: [art] Store priv key in slot 0x5
29,128,870 UART: [art] Derive Key Pair - Done
29,142,209 UART: [art] Signing Cert with AUTHO
29,143,515 UART: RITY.KEYID = 7
31,431,079 UART: [art] Erasing AUTHORITY.KEYID = 7
31,432,601 UART: [art] PUB.X = D4A33C8AB02FC2AA973684C76734AD4F880A0B0A07FEBD89AF965F5A9629126D23E6C130F97F376F982F0A8288ED3A5C
31,439,855 UART: [art] PUB.Y = 50A8E7CC33EEA7E63CFCC7135B738132913BBE84CDE5DD266B92AE1462093A838497D3EEA164C3F3D921E55581F9DCBF
31,447,156 UART: [art] SIG.R = 2E2FD81F96AA9D2A0D2205EA983814FCBFA40F233C278EB207019D2B0F941CD84A39183A864539E53880DF8D9B86293A
31,454,501 UART: [art] SIG.S = 144E089ACC0A2CD8DDAB019811142A0AB1B35ED00572FDF90F2D59A4174E2613E95E57640F26D20C66F3B7F867F5CF76
32,759,182 UART: Caliptra RT
32,759,889 UART: [state] CFI Enabled
32,922,043 UART: [rt] RT listening for mailbox commands...
32,953,247 UART: [rt]cmd =0x46505652, len=4
32,954,555 UART: [rt] FIPS Version
32,955,558 >>> mbox cmd response data (36 bytes)
32,956,248 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,986,074 UART: [rt]cmd =0x46504c54, len=4
32,987,579 >>> mbox cmd response data (8 bytes)
32,987,914 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,017,476 UART: [rt]cmd =0x46504c67, len=4
33,018,806 >>> mbox cmd response: failed
33,020,248 UART: [rt] FIPS self test
33,021,182 UART: [kat] ++
33,021,631 UART: [kat] sha1
33,026,051 UART: [kat] SHA2-256
33,027,853 UART: [kat] SHA2-384
33,030,844 UART: [kat] SHA2-512-ACC
33,033,086 UART: [kat] ECC-384
36,301,948 UART: [kat] HMAC-384Kdf
36,309,995 UART: [kat] LMS
36,719,358 UART: [kat] --
40,694,967 UART: [rt] Verify complete
40,861,185 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,890,986 UART: [rt]cmd =0x46504c67, len=4
40,892,467 >>> mbox cmd response data (8 bytes)
40,892,837 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,922,764 UART: [rt]cmd =0x49444543, len=4
40,929,618 >>> mbox cmd response data (37 bytes)
40,930,215 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
40,960,025 UART: [rt]cmd =0x49444549, len=4
40,962,902 >>> mbox cmd response data (104 bytes)
40,963,702 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
40,993,457 UART: [rt]cmd =0x49444550, len=4
41,004,156 >>> mbox cmd response data (8 bytes)
41,004,580 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,034,288 UART: [rt]cmd =0x4c444556, len=4
41,045,533 >>> mbox cmd response data (687 bytes)
41,049,049 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,078,869 UART: [rt]cmd =0x43455246, len=4
41,091,773 >>> mbox cmd response data (920 bytes)
41,096,326 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,125,908 UART: [rt]cmd =0x43455252, len=4
41,137,375 >>> mbox cmd response data (782 bytes)
41,142,071 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,173,642 UART: [rt]cmd =0x53494756, len=196
42,465,552 >>> mbox cmd response data (8 bytes)
42,466,052 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,496,606 UART: [rt]cmd =0x4d454153, len=108
42,515,769 >>> mbox cmd response data (12 bytes)
42,516,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,546,132 UART: [rt]cmd =0x494e464f, len=4
42,550,467 >>> mbox cmd response data (312 bytes)
42,552,792 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,582,720 UART: [rt]cmd =0x54514754, len=24
42,585,471 >>> mbox cmd response data (8 bytes)
42,585,802 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,615,318 UART: [rt]cmd =0x47544744, len=8
42,618,120 >>> mbox cmd response data (104 bytes)
42,618,898 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,648,497 UART: [rt]cmd =0x50435252, len=8
42,650,457 >>> mbox cmd response data (8 bytes)
42,650,782 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,680,810 UART: [rt]cmd =0x50435251, len=36
43,837,117 >>> mbox cmd response data (1848 bytes)
43,846,022 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,876,420 UART: [rt]cmd =0x50435245, len=56
43,879,637 >>> mbox cmd response data (8 bytes)
43,880,092 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,910,150 UART: [rt]cmd =0x44504543, len=20
43,930,502 >>> mbox cmd response data (44 bytes)
43,931,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
43,961,341 UART: [rt]cmd =0x44504543, len=24
44,005,498 >>> mbox cmd response data (40 bytes)
44,006,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,036,519 UART: [rt]cmd =0x44504543, len=96
44,075,384 >>> mbox cmd response data (56 bytes)
44,076,131 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,106,544 UART: [rt]cmd =0x44504543, len=92
52,167,664 >>> mbox cmd response data (6284 bytes)
52,196,943 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,227,894 UART: [rt]cmd =0x44504543, len=136
57,863,390 >>> mbox cmd response data (136 bytes)
57,864,619 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,894,734 UART: [rt]cmd =0x44504543, len=40
57,934,532 >>> mbox cmd response data (40 bytes)
57,935,212 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,965,239 UART: [rt]cmd =0x44504543, len=28
58,007,732 >>> mbox cmd response data (2076 bytes)
58,017,637 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,047,773 UART: [rt]cmd =0x44504543, len=36
58,077,129 >>> mbox cmd response data (24 bytes)
58,077,708 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,107,204 UART: [rt]cmd =0x4453424c, len=4
61,428,510 >>> mbox cmd response data (8 bytes)
61,429,012 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,458,631 UART: [rt]cmd =0x46505344, len=4
61,568,458 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,776,288 ready_for_fw is high
3,776,744 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,864,509 >>> mbox cmd response: success
17,867,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,562,857 UART:
23,563,244 UART: Running Caliptra FMC ...
23,564,394 UART:
23,564,543 UART: [state] CFI Enabled
23,628,545 UART: [fht] FMC Alias Private Key: 7
25,966,503 UART: [art] Extend RT PCRs Done
25,967,731 UART: [art] Lock RT PCRs Done
25,969,547 UART: [art] Populate DV Done
25,974,959 UART: [fht] FMC Alias Private Key: 7
25,976,607 UART: [art] Derive CDI
25,977,367 UART: [art] Store in in slot 0x4
26,038,285 UART: [art] Derive Key Pair
26,039,335 UART: [art] Store priv key in slot 0x5
29,331,987 UART: [art] Derive Key Pair - Done
29,345,366 UART: [art] Signing Cert with AUTHO
29,346,680 UART: RITY.KEYID = 7
31,633,883 UART: [art] Erasing AUTHORITY.KEYID = 7
31,635,396 UART: [art] PUB.X = E58CA1436EB87E192E0BAB829B85BA050648E0CF819F1F6415F07AF34FF9FCF4BB31127AB98B17EAEF503C49210C62AC
31,642,663 UART: [art] PUB.Y = 2CF28D1E01BFF4B6CCD95ACCC008BA5E367DA535D96CF02ACE1368A380C4E6B10D7AAC01CFFE5B6FD85A4400FE8BCCF1
31,649,909 UART: [art] SIG.R = 3A3041D278160B4BF9CE5A679EE7EA617DFE2DAC88D8F0BBE3B2E5AC4A6229069B634D241B06E1DE90D992E7E6FC83A0
31,657,312 UART: [art] SIG.S = A669F9082F142CE502DE65B4AD8EBEB72CCEDED9181155C7F26C720C933C2B8F4AB4053A0B8AC05DED6E459374FCF630
32,963,098 UART: Caliptra RT
32,963,811 UART: [state] CFI Enabled
33,123,451 UART: [rt] RT listening for mailbox commands...
33,154,647 UART: [rt]cmd =0x46505652, len=4
33,155,895 UART: [rt] FIPS Version
33,157,184 >>> mbox cmd response data (36 bytes)
33,157,952 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,187,573 UART: [rt]cmd =0x46504c54, len=4
33,189,048 >>> mbox cmd response data (8 bytes)
33,189,380 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,219,633 UART: [rt]cmd =0x46504c67, len=4
33,221,126 >>> mbox cmd response: failed
33,222,224 UART: [rt] FIPS self test
33,223,221 UART: [kat] ++
33,223,675 UART: [kat] sha1
33,228,066 UART: [kat] SHA2-256
33,229,864 UART: [kat] SHA2-384
33,232,613 UART: [kat] SHA2-512-ACC
33,234,859 UART: [kat] ECC-384
36,502,408 UART: [kat] HMAC-384Kdf
36,509,499 UART: [kat] LMS
36,918,855 UART: [kat] --
40,873,748 UART: [rt] Verify complete
41,062,969 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,092,822 UART: [rt]cmd =0x46504c67, len=4
41,094,414 >>> mbox cmd response data (8 bytes)
41,094,765 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,124,267 UART: [rt]cmd =0x49444543, len=4
41,131,442 >>> mbox cmd response data (37 bytes)
41,132,036 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,161,748 UART: [rt]cmd =0x49444549, len=4
41,164,562 >>> mbox cmd response data (104 bytes)
41,165,356 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,195,270 UART: [rt]cmd =0x49444550, len=4
41,205,789 >>> mbox cmd response data (8 bytes)
41,206,193 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,235,625 UART: [rt]cmd =0x4c444556, len=4
41,246,883 >>> mbox cmd response data (687 bytes)
41,250,394 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,280,103 UART: [rt]cmd =0x43455246, len=4
41,293,113 >>> mbox cmd response data (920 bytes)
41,297,653 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,327,614 UART: [rt]cmd =0x43455252, len=4
41,339,019 >>> mbox cmd response data (783 bytes)
41,343,717 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,375,187 UART: [rt]cmd =0x53494756, len=196
42,667,252 >>> mbox cmd response data (8 bytes)
42,667,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,698,226 UART: [rt]cmd =0x4d454153, len=108
42,716,518 >>> mbox cmd response data (12 bytes)
42,716,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,746,477 UART: [rt]cmd =0x494e464f, len=4
42,750,808 >>> mbox cmd response data (312 bytes)
42,753,036 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,783,174 UART: [rt]cmd =0x54514754, len=24
42,785,817 >>> mbox cmd response data (8 bytes)
42,786,232 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,816,025 UART: [rt]cmd =0x47544744, len=8
42,819,048 >>> mbox cmd response data (104 bytes)
42,819,856 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,849,619 UART: [rt]cmd =0x50435252, len=8
42,851,630 >>> mbox cmd response data (8 bytes)
42,852,039 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,882,161 UART: [rt]cmd =0x50435251, len=36
44,054,049 >>> mbox cmd response data (1848 bytes)
44,062,962 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,093,125 UART: [rt]cmd =0x50435245, len=56
44,096,072 >>> mbox cmd response data (8 bytes)
44,096,441 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,126,164 UART: [rt]cmd =0x44504543, len=20
44,146,197 >>> mbox cmd response data (44 bytes)
44,146,893 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,176,706 UART: [rt]cmd =0x44504543, len=24
44,224,263 >>> mbox cmd response data (40 bytes)
44,224,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,255,154 UART: [rt]cmd =0x44504543, len=96
44,294,718 >>> mbox cmd response data (56 bytes)
44,295,462 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,325,785 UART: [rt]cmd =0x44504543, len=92
52,385,022 >>> mbox cmd response data (6284 bytes)
52,414,261 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,445,367 UART: [rt]cmd =0x44504543, len=136
58,082,552 >>> mbox cmd response data (136 bytes)
58,083,779 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,113,940 UART: [rt]cmd =0x44504543, len=40
58,153,023 >>> mbox cmd response data (40 bytes)
58,153,689 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,183,786 UART: [rt]cmd =0x44504543, len=28
58,226,114 >>> mbox cmd response data (2076 bytes)
58,236,176 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,266,051 UART: [rt]cmd =0x44504543, len=36
58,295,053 >>> mbox cmd response data (24 bytes)
58,295,635 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,325,326 UART: [rt]cmd =0x4453424c, len=4
61,646,546 >>> mbox cmd response data (8 bytes)
61,647,038 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,676,562 UART: [rt]cmd =0x46505344, len=4
61,786,500 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,649 UART:
193,016 UART: Running Caliptra ROM ...
194,225 UART:
603,753 UART: [state] CFI Enabled
619,493 UART: [state] LifecycleState = Unprovisioned
621,481 UART: [state] DebugLocked = No
624,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,405 UART: [kat] SHA2-256
798,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,703 UART: [kat] ++
809,153 UART: [kat] sha1
820,379 UART: [kat] SHA2-256
823,035 UART: [kat] SHA2-384
829,174 UART: [kat] SHA2-512-ACC
831,542 UART: [kat] ECC-384
3,113,385 UART: [kat] HMAC-384Kdf
3,125,381 UART: [kat] LMS
4,315,455 UART: [kat] --
4,319,718 UART: [cold-reset] ++
4,320,807 UART: [fht] Storing FHT @ 0x50003400
4,333,501 UART: [idev] ++
4,334,086 UART: [idev] CDI.KEYID = 6
4,334,974 UART: [idev] SUBJECT.KEYID = 7
4,336,224 UART: [idev] UDS.KEYID = 0
4,337,221 ready_for_fw is high
4,337,451 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,510 UART: [idev] Erasing UDS.KEYID = 0
7,619,049 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,027 UART: [idev] --
7,643,331 UART: [ldev] ++
7,643,905 UART: [ldev] CDI.KEYID = 6
7,644,876 UART: [ldev] SUBJECT.KEYID = 5
7,646,087 UART: [ldev] AUTHORITY.KEYID = 7
7,647,579 UART: [ldev] FE.KEYID = 1
7,657,634 UART: [ldev] Erasing FE.KEYID = 1
10,947,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,069 UART: [ldev] --
13,307,258 UART: [fwproc] Waiting for Commands...
13,310,653 UART: [fwproc] Received command 0x46574c44
13,312,849 UART: [fwproc] Received Image of size 113844 bytes
17,365,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,443,316 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,512,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,829,133 >>> mbox cmd response: success
17,832,134 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,832,593 UART: [afmc] ++
17,833,100 UART: [afmc] CDI.KEYID = 6
17,834,066 UART: [afmc] SUBJECT.KEYID = 7
17,835,234 UART: [afmc] AUTHORITY.KEYID = 5
21,144,510 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,437,642 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,439,893 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,454,285 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,469,143 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,483,568 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,505,209 UART: [afmc] --
23,509,682 UART: [cold-reset] --
23,513,597 UART: [state] Locking Datavault
23,517,764 UART: [state] Locking PCR0, PCR1 and PCR31
23,519,461 UART: [state] Locking ICCM
23,521,718 UART: [exit] Launching FMC @ 0x40000130
23,530,114 UART:
23,530,349 UART: Running Caliptra FMC ...
23,531,380 UART:
23,531,529 UART: [state] CFI Enabled
23,539,542 UART: [fht] FMC Alias Private Key: 7
25,870,774 UART: [art] Extend RT PCRs Done
25,871,988 UART: [art] Lock RT PCRs Done
25,873,719 UART: [art] Populate DV Done
25,879,143 UART: [fht] FMC Alias Private Key: 7
25,880,791 UART: [art] Derive CDI
25,881,606 UART: [art] Store in in slot 0x4
25,924,740 UART: [art] Derive Key Pair
25,925,776 UART: [art] Store priv key in slot 0x5
29,167,780 UART: [art] Derive Key Pair - Done
29,180,842 UART: [art] Signing Cert with AUTHO
29,182,144 UART: RITY.KEYID = 7
31,461,681 UART: [art] Erasing AUTHORITY.KEYID = 7
31,463,184 UART: [art] PUB.X = D44E1A8B7C75A0DD9A6FF673C5A2F7711F8140D20D4D1F0B482FB925FB4B5E08FC4D297AFD0B22CC0AE7CF99FC4B4BAA
31,470,449 UART: [art] PUB.Y = B48F42378F6C70A510CB1EC1AF1F7DFB1E56FF3707E72F916E5E1F867130C81D36E8227B5504EA4C4DAFD1F20F7716F4
31,477,730 UART: [art] SIG.R = B96DABC45C82CE167C46C36A0A5348BC1763E565A650FB0D153CB7E6F588A8AA5E77A811CB5BA9145CC3F92C35758391
31,485,145 UART: [art] SIG.S = CE9339CA535954B026B7EA7CAC1EC77716B4EE45ADAECAC5F4BEC0F9D646B7C36B883C432932C53F72E0BA9448A13C0C
32,789,952 UART: Caliptra RT
32,790,665 UART: [state] CFI Enabled
32,908,374 UART: [rt] RT listening for mailbox commands...
32,939,829 UART: [rt]cmd =0x46505652, len=4
32,941,107 UART: [rt] FIPS Version
32,942,163 >>> mbox cmd response data (36 bytes)
32,942,974 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
32,972,999 UART: [rt]cmd =0x46504c54, len=4
32,974,315 >>> mbox cmd response data (8 bytes)
32,974,640 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,003,956 UART: [rt]cmd =0x46504c67, len=4
33,005,300 >>> mbox cmd response: failed
33,006,572 UART: [rt] FIPS self test
33,007,717 UART: [kat] ++
33,008,179 UART: [kat] sha1
33,012,180 UART: [kat] SHA2-256
33,013,989 UART: [kat] SHA2-384
33,016,710 UART: [kat] SHA2-512-ACC
33,018,959 UART: [kat] ECC-384
36,261,165 UART: [kat] HMAC-384Kdf
36,266,928 UART: [kat] LMS
36,676,288 UART: [kat] --
40,653,164 UART: [rt] Verify complete
40,849,017 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,878,860 UART: [rt]cmd =0x46504c67, len=4
40,880,390 >>> mbox cmd response data (8 bytes)
40,880,737 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
40,910,598 UART: [rt]cmd =0x49444543, len=4
40,917,678 >>> mbox cmd response data (37 bytes)
40,918,270 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
40,947,772 UART: [rt]cmd =0x49444549, len=4
40,950,645 >>> mbox cmd response data (104 bytes)
40,951,450 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
40,981,289 UART: [rt]cmd =0x49444550, len=4
40,991,663 >>> mbox cmd response data (8 bytes)
40,992,052 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,021,927 UART: [rt]cmd =0x4c444556, len=4
41,032,832 >>> mbox cmd response data (687 bytes)
41,036,357 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,066,276 UART: [rt]cmd =0x43455246, len=4
41,079,139 >>> mbox cmd response data (920 bytes)
41,083,680 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,113,268 UART: [rt]cmd =0x43455252, len=4
41,124,550 >>> mbox cmd response data (784 bytes)
41,129,255 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,160,757 UART: [rt]cmd =0x53494756, len=196
42,452,826 >>> mbox cmd response data (8 bytes)
42,453,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,484,080 UART: [rt]cmd =0x4d454153, len=108
42,502,366 >>> mbox cmd response data (12 bytes)
42,502,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,532,550 UART: [rt]cmd =0x494e464f, len=4
42,536,967 >>> mbox cmd response data (312 bytes)
42,539,446 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,569,577 UART: [rt]cmd =0x54514754, len=24
42,571,841 >>> mbox cmd response data (8 bytes)
42,572,172 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,601,927 UART: [rt]cmd =0x47544744, len=8
42,605,124 >>> mbox cmd response data (104 bytes)
42,605,974 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,635,798 UART: [rt]cmd =0x50435252, len=8
42,637,758 >>> mbox cmd response data (8 bytes)
42,638,125 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,668,159 UART: [rt]cmd =0x50435251, len=36
43,823,329 >>> mbox cmd response data (1848 bytes)
43,832,257 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,862,419 UART: [rt]cmd =0x50435245, len=56
43,865,387 >>> mbox cmd response data (8 bytes)
43,865,753 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,895,435 UART: [rt]cmd =0x44504543, len=20
43,915,933 >>> mbox cmd response data (44 bytes)
43,916,640 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
43,946,764 UART: [rt]cmd =0x44504543, len=24
43,972,559 >>> mbox cmd response data (40 bytes)
43,973,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,004,001 UART: [rt]cmd =0x44504543, len=96
44,040,837 >>> mbox cmd response data (56 bytes)
44,041,568 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,072,106 UART: [rt]cmd =0x44504543, len=92
52,053,137 >>> mbox cmd response data (6284 bytes)
52,082,272 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,113,526 UART: [rt]cmd =0x44504543, len=136
57,675,244 >>> mbox cmd response data (136 bytes)
57,677,144 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,707,328 UART: [rt]cmd =0x44504543, len=40
57,733,646 >>> mbox cmd response data (40 bytes)
57,734,369 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,764,453 UART: [rt]cmd =0x44504543, len=28
57,806,965 >>> mbox cmd response data (2076 bytes)
57,817,095 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,847,229 UART: [rt]cmd =0x44504543, len=36
57,876,493 >>> mbox cmd response data (24 bytes)
57,877,057 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
57,906,629 UART: [rt]cmd =0x4453424c, len=4
61,153,230 >>> mbox cmd response data (8 bytes)
61,153,737 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,183,565 UART: [rt]cmd =0x46505344, len=4
61,292,793 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,129,330 ready_for_fw is high
4,129,715 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,067,176 >>> mbox cmd response: success
18,070,565 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,704,135 UART:
23,704,523 UART: Running Caliptra FMC ...
23,705,665 UART:
23,705,829 UART: [state] CFI Enabled
23,713,372 UART: [fht] FMC Alias Private Key: 7
26,043,711 UART: [art] Extend RT PCRs Done
26,044,943 UART: [art] Lock RT PCRs Done
26,046,751 UART: [art] Populate DV Done
26,052,064 UART: [fht] FMC Alias Private Key: 7
26,053,661 UART: [art] Derive CDI
26,054,480 UART: [art] Store in in slot 0x4
26,097,228 UART: [art] Derive Key Pair
26,098,305 UART: [art] Store priv key in slot 0x5
29,340,683 UART: [art] Derive Key Pair - Done
29,353,900 UART: [art] Signing Cert with AUTHO
29,355,215 UART: RITY.KEYID = 7
31,634,832 UART: [art] Erasing AUTHORITY.KEYID = 7
31,636,351 UART: [art] PUB.X = 6ADCE6C7B9FC3A4AF20C929E737E042EFD339F9DA3B7A87DFE90608B26FB277EA5EF4EB94ECFF2C836F2F81B0CC8A2D1
31,643,611 UART: [art] PUB.Y = FC7CF339FB072EDA7101116BAB9E266CA3E40B89AA0A32FA051863BD0F01ED73BC5859FCF1113132C97086D39C100412
31,650,891 UART: [art] SIG.R = 0CC4D57B91CAF18E430148FFA547AF391D360E5523A9BCE8605FF0F7DCCCA1CD259BA5A3E046C3A986FC5111A2DDAF55
31,658,308 UART: [art] SIG.S = BE7A6FABFBF17017C526AC3CB9D86AA7A2D93BBDA95584F43DF8540C53AF7DC126251A81F3F0914EE8688685FEFB7499
32,963,479 UART: Caliptra RT
32,964,195 UART: [state] CFI Enabled
33,082,580 UART: [rt] RT listening for mailbox commands...
33,113,879 UART: [rt]cmd =0x46505652, len=4
33,115,160 UART: [rt] FIPS Version
33,116,268 >>> mbox cmd response data (36 bytes)
33,117,001 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,146,615 UART: [rt]cmd =0x46504c54, len=4
33,148,260 >>> mbox cmd response data (8 bytes)
33,148,634 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,179,006 UART: [rt]cmd =0x46504c67, len=4
33,180,394 >>> mbox cmd response: failed
33,181,090 UART: [rt] FIPS self test
33,182,085 UART: [kat] ++
33,182,540 UART: [kat] sha1
33,186,860 UART: [kat] SHA2-256
33,188,693 UART: [kat] SHA2-384
33,191,647 UART: [kat] SHA2-512-ACC
33,193,911 UART: [kat] ECC-384
36,436,182 UART: [kat] HMAC-384Kdf
36,442,192 UART: [kat] LMS
36,851,559 UART: [kat] --
40,806,147 UART: [rt] Verify complete
41,023,654 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,053,597 UART: [rt]cmd =0x46504c67, len=4
41,055,138 >>> mbox cmd response data (8 bytes)
41,055,530 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,084,972 UART: [rt]cmd =0x49444543, len=4
41,092,058 >>> mbox cmd response data (37 bytes)
41,092,659 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,122,495 UART: [rt]cmd =0x49444549, len=4
41,125,348 >>> mbox cmd response data (104 bytes)
41,126,236 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,156,402 UART: [rt]cmd =0x49444550, len=4
41,166,907 >>> mbox cmd response data (8 bytes)
41,167,299 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,197,064 UART: [rt]cmd =0x4c444556, len=4
41,208,025 >>> mbox cmd response data (687 bytes)
41,211,538 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,241,174 UART: [rt]cmd =0x43455246, len=4
41,254,090 >>> mbox cmd response data (920 bytes)
41,258,799 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,288,684 UART: [rt]cmd =0x43455252, len=4
41,300,092 >>> mbox cmd response data (783 bytes)
41,304,795 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,336,136 UART: [rt]cmd =0x53494756, len=196
42,628,121 >>> mbox cmd response data (8 bytes)
42,628,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,659,085 UART: [rt]cmd =0x4d454153, len=108
42,678,181 >>> mbox cmd response data (12 bytes)
42,678,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,708,349 UART: [rt]cmd =0x494e464f, len=4
42,712,554 >>> mbox cmd response data (312 bytes)
42,714,802 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,744,722 UART: [rt]cmd =0x54514754, len=24
42,747,147 >>> mbox cmd response data (8 bytes)
42,747,562 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,777,279 UART: [rt]cmd =0x47544744, len=8
42,780,156 >>> mbox cmd response data (104 bytes)
42,780,936 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,810,912 UART: [rt]cmd =0x50435252, len=8
42,812,601 >>> mbox cmd response data (8 bytes)
42,812,935 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,843,049 UART: [rt]cmd =0x50435251, len=36
43,998,360 >>> mbox cmd response data (1848 bytes)
44,007,274 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,037,679 UART: [rt]cmd =0x50435245, len=56
44,040,862 >>> mbox cmd response data (8 bytes)
44,041,310 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,071,011 UART: [rt]cmd =0x44504543, len=20
44,091,570 >>> mbox cmd response data (44 bytes)
44,092,290 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,122,300 UART: [rt]cmd =0x44504543, len=24
44,148,879 >>> mbox cmd response data (40 bytes)
44,149,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,180,164 UART: [rt]cmd =0x44504543, len=96
44,215,860 >>> mbox cmd response data (56 bytes)
44,216,591 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,247,181 UART: [rt]cmd =0x44504543, len=92
52,228,687 >>> mbox cmd response data (6284 bytes)
52,257,792 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,288,939 UART: [rt]cmd =0x44504543, len=136
57,849,594 >>> mbox cmd response data (136 bytes)
57,850,807 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,881,227 UART: [rt]cmd =0x44504543, len=40
57,907,165 >>> mbox cmd response data (40 bytes)
57,907,867 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,937,828 UART: [rt]cmd =0x44504543, len=28
57,980,334 >>> mbox cmd response data (2076 bytes)
57,990,247 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,020,635 UART: [rt]cmd =0x44504543, len=36
58,050,442 >>> mbox cmd response data (24 bytes)
58,051,005 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,080,692 UART: [rt]cmd =0x4453424c, len=4
61,326,604 >>> mbox cmd response data (8 bytes)
61,327,101 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,356,874 UART: [rt]cmd =0x46505344, len=4
61,466,814 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
192,417 UART:
192,777 UART: Running Caliptra ROM ...
193,981 UART:
194,137 UART: [state] CFI Enabled
262,870 UART: [state] LifecycleState = Unprovisioned
264,726 UART: [state] DebugLocked = No
266,405 UART: [state] WD Timer not started. Device not locked for debugging
269,241 UART: [kat] SHA2-256
448,387 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,936 UART: [kat] ++
460,392 UART: [kat] sha1
471,835 UART: [kat] SHA2-256
474,871 UART: [kat] SHA2-384
481,225 UART: [kat] SHA2-512-ACC
484,179 UART: [kat] ECC-384
2,946,696 UART: [kat] HMAC-384Kdf
2,971,866 UART: [kat] LMS
3,501,319 UART: [kat] --
3,506,603 UART: [cold-reset] ++
3,508,471 UART: [fht] FHT @ 0x50003400
3,520,095 UART: [idev] ++
3,520,674 UART: [idev] CDI.KEYID = 6
3,521,598 UART: [idev] SUBJECT.KEYID = 7
3,522,778 UART: [idev] UDS.KEYID = 0
3,523,832 ready_for_fw is high
3,524,040 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,667,645 UART: [idev] Erasing UDS.KEYID = 0
6,024,506 UART: [idev] Sha1 KeyId Algorithm
6,047,779 UART: [idev] --
6,051,406 UART: [ldev] ++
6,051,983 UART: [ldev] CDI.KEYID = 6
6,052,906 UART: [ldev] SUBJECT.KEYID = 5
6,054,067 UART: [ldev] AUTHORITY.KEYID = 7
6,055,308 UART: [ldev] FE.KEYID = 1
6,099,801 UART: [ldev] Erasing FE.KEYID = 1
8,603,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,847 UART: [ldev] --
10,410,601 UART: [fwproc] Wait for Commands...
10,412,429 UART: [fwproc] Recv command 0x46574c44
10,414,530 UART: [fwproc] Recv'd Img size: 114168 bytes
13,814,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,892,302 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,961,123 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,278,668 >>> mbox cmd response: success
14,281,659 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,283,404 UART: [afmc] ++
14,283,994 UART: [afmc] CDI.KEYID = 6
14,284,906 UART: [afmc] SUBJECT.KEYID = 7
14,286,068 UART: [afmc] AUTHORITY.KEYID = 5
16,830,186 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,552,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,554,689 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,570,481 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,586,478 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,602,355 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,624,099 UART: [afmc] --
18,627,624 UART: [cold-reset] --
18,631,491 UART: [state] Locking Datavault
18,637,600 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,240 UART: [state] Locking ICCM
18,641,256 UART: [exit] Launching FMC @ 0x40000130
18,649,704 UART:
18,649,939 UART: Running Caliptra FMC ...
18,650,967 UART:
18,651,112 UART: [state] CFI Enabled
18,710,164 UART: [fht] FMC Alias Private Key: 7
20,473,516 UART: [art] Extend RT PCRs Done
20,474,739 UART: [art] Lock RT PCRs Done
20,476,287 UART: [art] Populate DV Done
20,481,815 UART: [fht] FMC Alias Private Key: 7
20,483,354 UART: [art] Derive CDI
20,484,117 UART: [art] Store in in slot 0x4
20,542,584 UART: [art] Derive Key Pair
20,543,628 UART: [art] Store priv key in slot 0x5
23,006,303 UART: [art] Derive Key Pair - Done
23,019,069 UART: [art] Signing Cert with AUTHO
23,020,401 UART: RITY.KEYID = 7
24,732,520 UART: [art] Erasing AUTHORITY.KEYID = 7
24,734,022 UART: [art] PUB.X = 07582BFBDFBB49BC5B98D2476B8DB2336FEC22AD5CDCE9E819B392C47ADE5D2A35B429ACB27BDFB1AE3F10363EC64D27
24,741,385 UART: [art] PUB.Y = 5BA82A8716EE5C278BE8640780B9270B9611CB120EB20835486FBEC9785B2A97A5640DB06F076BD934E8621F3E34982A
24,748,626 UART: [art] SIG.R = 25343F44C2D1E428D15743D249B8922B3A02E9E9709969A138609B99EC5FF204FEC417D7CE89138F58465AD2FEECC9A3
24,756,017 UART: [art] SIG.S = 386828E75002FAE13B0CBE09E88BCA28DCBA4A8383CD5F654F6FD9D0EDB2CC09368AAC873960CF3EEF4AD69BFD4960F1
25,735,133 UART: Caliptra RT
25,735,835 UART: [state] CFI Enabled
25,899,923 UART: [rt] RT listening for mailbox commands...
25,931,416 UART: [rt]cmd =0x46505652, len=4
25,932,666 UART: [rt] FIPS Version
25,934,150 >>> mbox cmd response data (36 bytes)
25,934,814 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,964,645 UART: [rt]cmd =0x46504c54, len=4
25,966,184 >>> mbox cmd response data (8 bytes)
25,966,529 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,995,980 UART: [rt]cmd =0x46504c67, len=4
25,997,411 >>> mbox cmd response: failed
25,998,518 UART: [rt] FIPS self test
25,999,447 UART: [kat] ++
25,999,898 UART: [kat] sha1
26,004,251 UART: [kat] SHA2-256
26,006,051 UART: [kat] SHA2-384
26,009,070 UART: [kat] SHA2-512-ACC
26,011,281 UART: [kat] ECC-384
28,453,212 UART: [kat] HMAC-384Kdf
28,460,187 UART: [kat] LMS
28,657,368 UART: [kat] --
31,986,777 UART: [rt] Verify complete
32,135,921 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,165,795 UART: [rt]cmd =0x46504c67, len=4
32,167,303 >>> mbox cmd response data (8 bytes)
32,167,661 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,197,524 UART: [rt]cmd =0x49444543, len=4
32,204,454 >>> mbox cmd response data (37 bytes)
32,205,040 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,234,607 UART: [rt]cmd =0x49444549, len=4
32,237,302 >>> mbox cmd response data (104 bytes)
32,238,105 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,267,698 UART: [rt]cmd =0x49444550, len=4
32,278,238 >>> mbox cmd response data (8 bytes)
32,278,642 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,308,245 UART: [rt]cmd =0x4c444556, len=4
32,319,469 >>> mbox cmd response data (687 bytes)
32,323,005 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,352,807 UART: [rt]cmd =0x43455246, len=4
32,365,563 >>> mbox cmd response data (887 bytes)
32,369,966 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,399,713 UART: [rt]cmd =0x43455252, len=4
32,411,066 >>> mbox cmd response data (782 bytes)
32,415,782 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,447,288 UART: [rt]cmd =0x53494756, len=196
33,412,594 >>> mbox cmd response data (8 bytes)
33,413,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,443,731 UART: [rt]cmd =0x4d454153, len=108
33,463,019 >>> mbox cmd response data (12 bytes)
33,463,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,493,214 UART: [rt]cmd =0x494e464f, len=4
33,497,549 >>> mbox cmd response data (312 bytes)
33,499,882 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,530,033 UART: [rt]cmd =0x54514754, len=24
33,532,526 >>> mbox cmd response data (8 bytes)
33,532,939 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,562,697 UART: [rt]cmd =0x47544744, len=8
33,565,622 >>> mbox cmd response data (104 bytes)
33,566,472 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,596,058 UART: [rt]cmd =0x50435252, len=8
33,597,995 >>> mbox cmd response data (8 bytes)
33,598,337 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,628,191 UART: [rt]cmd =0x50435251, len=36
34,541,852 >>> mbox cmd response data (1848 bytes)
34,550,780 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,581,159 UART: [rt]cmd =0x50435245, len=56
34,584,396 >>> mbox cmd response data (8 bytes)
34,584,843 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,614,566 UART: [rt]cmd =0x44504543, len=20
34,635,061 >>> mbox cmd response data (44 bytes)
34,635,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,665,616 UART: [rt]cmd =0x44504543, len=24
34,702,131 >>> mbox cmd response data (40 bytes)
34,702,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,733,261 UART: [rt]cmd =0x44504543, len=96
34,772,197 >>> mbox cmd response data (56 bytes)
34,772,928 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,803,412 UART: [rt]cmd =0x44504543, len=92
40,902,593 >>> mbox cmd response data (6284 bytes)
40,931,664 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,962,505 UART: [rt]cmd =0x44504543, len=136
45,189,423 >>> mbox cmd response data (136 bytes)
45,190,626 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,220,981 UART: [rt]cmd =0x44504543, len=40
45,259,403 >>> mbox cmd response data (40 bytes)
45,260,123 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,290,149 UART: [rt]cmd =0x44504543, len=28
45,332,599 >>> mbox cmd response data (2076 bytes)
45,342,685 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,372,840 UART: [rt]cmd =0x44504543, len=36
45,402,105 >>> mbox cmd response data (24 bytes)
45,402,666 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,432,221 UART: [rt]cmd =0x4453424c, len=4
47,922,759 >>> mbox cmd response data (8 bytes)
47,923,246 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,953,026 UART: [rt]cmd =0x46505344, len=4
48,062,310 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
3,382,320 ready_for_fw is high
3,382,930 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,090,178 >>> mbox cmd response: success
14,093,244 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,366,720 UART:
18,367,107 UART: Running Caliptra FMC ...
18,368,292 UART:
18,368,453 UART: [state] CFI Enabled
18,434,465 UART: [fht] FMC Alias Private Key: 7
20,198,943 UART: [art] Extend RT PCRs Done
20,200,204 UART: [art] Lock RT PCRs Done
20,202,028 UART: [art] Populate DV Done
20,207,718 UART: [fht] FMC Alias Private Key: 7
20,209,317 UART: [art] Derive CDI
20,210,131 UART: [art] Store in in slot 0x4
20,267,363 UART: [art] Derive Key Pair
20,268,404 UART: [art] Store priv key in slot 0x5
22,731,038 UART: [art] Derive Key Pair - Done
22,743,772 UART: [art] Signing Cert with AUTHO
22,745,072 UART: RITY.KEYID = 7
24,457,021 UART: [art] Erasing AUTHORITY.KEYID = 7
24,458,529 UART: [art] PUB.X = 462E8174A613C5B887EC6C196AC03897D24B169FCAB5D629FEACD8D9D5685EAE02BC5713BC758DC8D726F7289CE3C497
24,465,783 UART: [art] PUB.Y = 881C311BBF1214801AD9D3CECFE7A3C11EEBE1122A3441D79F75FB4C3F68B78555DA86AED105641651058D339BCBA324
24,473,097 UART: [art] SIG.R = 3537FBE9AB3DEBD2E0EE1B440EE86814370D483ECEB182732B30D58F88D22DEF288E0703E2F2B7452DE68200A1B108DF
24,480,473 UART: [art] SIG.S = 0BA424DA16C47D3D74FE593F2E61CBAC621AE7DF7D055839057F5540DE14E997DA71C9AB2D65465CF863124DD1D4832D
25,459,756 UART: Caliptra RT
25,460,455 UART: [state] CFI Enabled
25,624,266 UART: [rt] RT listening for mailbox commands...
25,655,424 UART: [rt]cmd =0x46505652, len=4
25,656,671 UART: [rt] FIPS Version
25,657,937 >>> mbox cmd response data (36 bytes)
25,658,577 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,688,533 UART: [rt]cmd =0x46504c54, len=4
25,690,198 >>> mbox cmd response data (8 bytes)
25,690,552 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,720,681 UART: [rt]cmd =0x46504c67, len=4
25,722,083 >>> mbox cmd response: failed
25,723,289 UART: [rt] FIPS self test
25,724,259 UART: [kat] ++
25,724,707 UART: [kat] sha1
25,729,007 UART: [kat] SHA2-256
25,730,843 UART: [kat] SHA2-384
25,733,658 UART: [kat] SHA2-512-ACC
25,735,865 UART: [kat] ECC-384
28,173,709 UART: [kat] HMAC-384Kdf
28,200,391 UART: [kat] LMS
28,397,601 UART: [kat] --
31,707,457 UART: [rt] Verify complete
31,861,134 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,890,871 UART: [rt]cmd =0x46504c67, len=4
31,892,235 >>> mbox cmd response data (8 bytes)
31,892,569 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,922,008 UART: [rt]cmd =0x49444543, len=4
31,929,085 >>> mbox cmd response data (37 bytes)
31,929,690 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,959,666 UART: [rt]cmd =0x49444549, len=4
31,962,236 >>> mbox cmd response data (104 bytes)
31,963,119 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
31,992,733 UART: [rt]cmd =0x49444550, len=4
32,003,470 >>> mbox cmd response data (8 bytes)
32,003,895 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,033,606 UART: [rt]cmd =0x4c444556, len=4
32,044,686 >>> mbox cmd response data (687 bytes)
32,048,187 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,078,188 UART: [rt]cmd =0x43455246, len=4
32,090,888 >>> mbox cmd response data (887 bytes)
32,095,306 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,125,001 UART: [rt]cmd =0x43455252, len=4
32,136,363 >>> mbox cmd response data (782 bytes)
32,141,067 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,172,436 UART: [rt]cmd =0x53494756, len=196
33,138,443 >>> mbox cmd response data (8 bytes)
33,138,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,169,592 UART: [rt]cmd =0x4d454153, len=108
33,187,930 >>> mbox cmd response data (12 bytes)
33,188,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,218,287 UART: [rt]cmd =0x494e464f, len=4
33,222,648 >>> mbox cmd response data (312 bytes)
33,224,864 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,254,886 UART: [rt]cmd =0x54514754, len=24
33,257,425 >>> mbox cmd response data (8 bytes)
33,257,841 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,287,528 UART: [rt]cmd =0x47544744, len=8
33,290,438 >>> mbox cmd response data (104 bytes)
33,291,302 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,321,016 UART: [rt]cmd =0x50435252, len=8
33,323,084 >>> mbox cmd response data (8 bytes)
33,323,499 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,353,608 UART: [rt]cmd =0x50435251, len=36
34,282,303 >>> mbox cmd response data (1848 bytes)
34,291,220 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,321,397 UART: [rt]cmd =0x50435245, len=56
34,324,339 >>> mbox cmd response data (8 bytes)
34,324,788 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,354,567 UART: [rt]cmd =0x44504543, len=20
34,375,026 >>> mbox cmd response data (44 bytes)
34,375,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,405,528 UART: [rt]cmd =0x44504543, len=24
34,442,818 >>> mbox cmd response data (40 bytes)
34,443,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,473,765 UART: [rt]cmd =0x44504543, len=96
34,513,975 >>> mbox cmd response data (56 bytes)
34,514,723 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,544,917 UART: [rt]cmd =0x44504543, len=92
40,644,760 >>> mbox cmd response data (6284 bytes)
40,673,835 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,704,602 UART: [rt]cmd =0x44504543, len=136
44,933,827 >>> mbox cmd response data (136 bytes)
44,935,021 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,965,025 UART: [rt]cmd =0x44504543, len=40
45,002,653 >>> mbox cmd response data (40 bytes)
45,003,336 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,033,425 UART: [rt]cmd =0x44504543, len=28
45,076,411 >>> mbox cmd response data (2076 bytes)
45,086,328 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,116,400 UART: [rt]cmd =0x44504543, len=36
45,145,850 >>> mbox cmd response data (24 bytes)
45,146,423 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,176,027 UART: [rt]cmd =0x4453424c, len=4
47,666,180 >>> mbox cmd response data (8 bytes)
47,666,694 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,696,480 UART: [rt]cmd =0x46505344, len=4
47,806,204 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,410 UART:
192,786 UART: Running Caliptra ROM ...
194,005 UART:
603,547 UART: [state] CFI Enabled
617,716 UART: [state] LifecycleState = Unprovisioned
619,589 UART: [state] DebugLocked = No
621,321 UART: [state] WD Timer not started. Device not locked for debugging
624,946 UART: [kat] SHA2-256
804,115 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,623 UART: [kat] ++
816,070 UART: [kat] sha1
826,020 UART: [kat] SHA2-256
829,033 UART: [kat] SHA2-384
834,960 UART: [kat] SHA2-512-ACC
837,969 UART: [kat] ECC-384
3,281,049 UART: [kat] HMAC-384Kdf
3,292,862 UART: [kat] LMS
3,822,340 UART: [kat] --
3,826,955 UART: [cold-reset] ++
3,829,538 UART: [fht] FHT @ 0x50003400
3,840,593 UART: [idev] ++
3,841,154 UART: [idev] CDI.KEYID = 6
3,842,035 UART: [idev] SUBJECT.KEYID = 7
3,843,284 UART: [idev] UDS.KEYID = 0
3,844,217 ready_for_fw is high
3,844,457 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,987,933 UART: [idev] Erasing UDS.KEYID = 0
6,317,740 UART: [idev] Sha1 KeyId Algorithm
6,341,130 UART: [idev] --
6,344,150 UART: [ldev] ++
6,344,723 UART: [ldev] CDI.KEYID = 6
6,345,638 UART: [ldev] SUBJECT.KEYID = 5
6,346,802 UART: [ldev] AUTHORITY.KEYID = 7
6,348,088 UART: [ldev] FE.KEYID = 1
6,359,459 UART: [ldev] Erasing FE.KEYID = 1
8,833,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,552,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,568,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,584,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,599,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,619,317 UART: [ldev] --
10,624,649 UART: [fwproc] Wait for Commands...
10,627,720 UART: [fwproc] Recv command 0x46574c44
10,629,821 UART: [fwproc] Recv'd Img size: 114168 bytes
14,028,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,098,538 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,167,349 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,485,570 >>> mbox cmd response: success
14,488,458 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,490,576 UART: [afmc] ++
14,491,184 UART: [afmc] CDI.KEYID = 6
14,492,096 UART: [afmc] SUBJECT.KEYID = 7
14,493,260 UART: [afmc] AUTHORITY.KEYID = 5
16,990,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,709,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,710,989 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,726,779 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,742,809 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,758,642 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,782,419 UART: [afmc] --
18,786,777 UART: [cold-reset] --
18,791,449 UART: [state] Locking Datavault
18,797,231 UART: [state] Locking PCR0, PCR1 and PCR31
18,798,883 UART: [state] Locking ICCM
18,800,919 UART: [exit] Launching FMC @ 0x40000130
18,809,373 UART:
18,809,627 UART: Running Caliptra FMC ...
18,810,731 UART:
18,810,889 UART: [state] CFI Enabled
18,818,773 UART: [fht] FMC Alias Private Key: 7
20,575,856 UART: [art] Extend RT PCRs Done
20,577,087 UART: [art] Lock RT PCRs Done
20,578,583 UART: [art] Populate DV Done
20,584,265 UART: [fht] FMC Alias Private Key: 7
20,585,745 UART: [art] Derive CDI
20,586,509 UART: [art] Store in in slot 0x4
20,628,831 UART: [art] Derive Key Pair
20,629,873 UART: [art] Store priv key in slot 0x5
23,056,860 UART: [art] Derive Key Pair - Done
23,069,590 UART: [art] Signing Cert with AUTHO
23,070,892 UART: RITY.KEYID = 7
24,776,752 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,274 UART: [art] PUB.X = FDF991B9EFCD382E53550AD8F2E1242708F8E5D45F14675F2CE60341CB5A96785D6C11BF66E23C7ED51690D8ADEF2450
24,785,542 UART: [art] PUB.Y = 41B637E7D5A3AA48C83A341FAD301689FB54D73259590DE9E4DEDCCE589B91354A07D03F4C5F062EBF448E9ECFAE6282
24,792,786 UART: [art] SIG.R = D5A97BD513E6AFC96774F8B00632A642224B2D885BAB3FB097BE9A9EB02FB950A1C196A10A8C4B228CCF4A786813A807
24,800,167 UART: [art] SIG.S = 4F42B72DF6D88CD57231234526CF64029375209F1F3278EE21BF5F491405CB4729A43BC1975F4E69C1856EBD15967B0C
25,779,354 UART: Caliptra RT
25,780,056 UART: [state] CFI Enabled
25,897,178 UART: [rt] RT listening for mailbox commands...
25,928,591 UART: [rt]cmd =0x46505652, len=4
25,929,889 UART: [rt] FIPS Version
25,930,941 >>> mbox cmd response data (36 bytes)
25,931,626 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,961,610 UART: [rt]cmd =0x46504c54, len=4
25,962,999 >>> mbox cmd response data (8 bytes)
25,963,351 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,993,049 UART: [rt]cmd =0x46504c67, len=4
25,994,506 >>> mbox cmd response: failed
25,995,561 UART: [rt] FIPS self test
25,996,498 UART: [kat] ++
25,996,948 UART: [kat] sha1
26,001,332 UART: [kat] SHA2-256
26,003,162 UART: [kat] SHA2-384
26,005,983 UART: [kat] SHA2-512-ACC
26,008,202 UART: [kat] ECC-384
28,435,582 UART: [kat] HMAC-384Kdf
28,441,440 UART: [kat] LMS
28,638,652 UART: [kat] --
31,968,485 UART: [rt] Verify complete
32,133,569 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,163,412 UART: [rt]cmd =0x46504c67, len=4
32,165,105 >>> mbox cmd response data (8 bytes)
32,165,452 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,195,258 UART: [rt]cmd =0x49444543, len=4
32,202,260 >>> mbox cmd response data (37 bytes)
32,202,879 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,232,591 UART: [rt]cmd =0x49444549, len=4
32,235,472 >>> mbox cmd response data (104 bytes)
32,236,340 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,265,883 UART: [rt]cmd =0x49444550, len=4
32,276,580 >>> mbox cmd response data (8 bytes)
32,276,975 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,306,623 UART: [rt]cmd =0x4c444556, len=4
32,317,809 >>> mbox cmd response data (687 bytes)
32,321,321 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,351,233 UART: [rt]cmd =0x43455246, len=4
32,363,837 >>> mbox cmd response data (887 bytes)
32,368,279 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,398,188 UART: [rt]cmd =0x43455252, len=4
32,409,540 >>> mbox cmd response data (783 bytes)
32,414,262 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,445,691 UART: [rt]cmd =0x53494756, len=196
33,411,005 >>> mbox cmd response data (8 bytes)
33,411,491 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,442,307 UART: [rt]cmd =0x4d454153, len=108
33,460,594 >>> mbox cmd response data (12 bytes)
33,461,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,490,849 UART: [rt]cmd =0x494e464f, len=4
33,495,000 >>> mbox cmd response data (312 bytes)
33,497,517 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,527,327 UART: [rt]cmd =0x54514754, len=24
33,529,652 >>> mbox cmd response data (8 bytes)
33,530,070 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,559,779 UART: [rt]cmd =0x47544744, len=8
33,562,922 >>> mbox cmd response data (104 bytes)
33,563,788 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,593,685 UART: [rt]cmd =0x50435252, len=8
33,595,540 >>> mbox cmd response data (8 bytes)
33,595,871 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,625,824 UART: [rt]cmd =0x50435251, len=36
34,533,641 >>> mbox cmd response data (1848 bytes)
34,542,565 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,572,884 UART: [rt]cmd =0x50435245, len=56
34,575,902 >>> mbox cmd response data (8 bytes)
34,576,346 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,606,042 UART: [rt]cmd =0x44504543, len=20
34,626,111 >>> mbox cmd response data (44 bytes)
34,626,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,656,862 UART: [rt]cmd =0x44504543, len=24
34,682,748 >>> mbox cmd response data (40 bytes)
34,683,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,713,872 UART: [rt]cmd =0x44504543, len=96
34,751,371 >>> mbox cmd response data (56 bytes)
34,752,100 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,782,470 UART: [rt]cmd =0x44504543, len=92
40,800,343 >>> mbox cmd response data (6284 bytes)
40,829,414 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,860,624 UART: [rt]cmd =0x44504543, len=136
45,032,400 >>> mbox cmd response data (136 bytes)
45,033,593 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,063,609 UART: [rt]cmd =0x44504543, len=40
45,089,387 >>> mbox cmd response data (40 bytes)
45,090,083 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,119,776 UART: [rt]cmd =0x44504543, len=28
45,162,552 >>> mbox cmd response data (2076 bytes)
45,172,492 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,202,667 UART: [rt]cmd =0x44504543, len=36
45,232,256 >>> mbox cmd response data (24 bytes)
45,232,833 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,262,609 UART: [rt]cmd =0x4453424c, len=4
47,693,364 >>> mbox cmd response data (8 bytes)
47,693,996 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,723,634 UART: [rt]cmd =0x46505344, len=4
47,833,386 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,695,573 ready_for_fw is high
3,696,237 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,271,182 >>> mbox cmd response: success
14,274,306 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,521,461 UART:
18,521,844 UART: Running Caliptra FMC ...
18,523,020 UART:
18,523,223 UART: [state] CFI Enabled
18,531,221 UART: [fht] FMC Alias Private Key: 7
20,288,101 UART: [art] Extend RT PCRs Done
20,289,315 UART: [art] Lock RT PCRs Done
20,291,158 UART: [art] Populate DV Done
20,296,308 UART: [fht] FMC Alias Private Key: 7
20,297,930 UART: [art] Derive CDI
20,298,756 UART: [art] Store in in slot 0x4
20,341,736 UART: [art] Derive Key Pair
20,342,739 UART: [art] Store priv key in slot 0x5
22,769,394 UART: [art] Derive Key Pair - Done
22,782,401 UART: [art] Signing Cert with AUTHO
22,783,700 UART: RITY.KEYID = 7
24,489,057 UART: [art] Erasing AUTHORITY.KEYID = 7
24,490,544 UART: [art] PUB.X = 0341DCB37046119AD7E4BB53A4F0562A20D415EA428AE43F575B65816D7589307B90BC5DA64C93D0038CDDAE0EDC6667
24,497,787 UART: [art] PUB.Y = 1EF08F2B9473100241EDB0DEADE2D96B83C0581BC82673AF3D4519B533CE5641BF2C71E7E852A67DBDF84011CACF21CD
24,505,086 UART: [art] SIG.R = 1026657A2FD75753370F97335AA933060AEAF7E50972AECCB1014F25995AFB35F38A0E7F7CFB9F884EB0B370C646A11A
24,512,535 UART: [art] SIG.S = 5D430713BAA1A140E918011F4D000C12A582590D6EBE72852879E2C96DCC818094C9EDA5B4ED0CE26E10439E0BB9C19C
25,491,528 UART: Caliptra RT
25,492,235 UART: [state] CFI Enabled
25,609,519 UART: [rt] RT listening for mailbox commands...
25,640,604 UART: [rt]cmd =0x46505652, len=4
25,641,898 UART: [rt] FIPS Version
25,643,121 >>> mbox cmd response data (36 bytes)
25,643,724 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,673,522 UART: [rt]cmd =0x46504c54, len=4
25,675,001 >>> mbox cmd response data (8 bytes)
25,675,345 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,705,850 UART: [rt]cmd =0x46504c67, len=4
25,707,250 >>> mbox cmd response: failed
25,707,970 UART: [rt] FIPS self test
25,708,930 UART: [kat] ++
25,709,378 UART: [kat] sha1
25,713,778 UART: [kat] SHA2-256
25,715,586 UART: [kat] SHA2-384
25,718,317 UART: [kat] SHA2-512-ACC
25,720,535 UART: [kat] ECC-384
28,147,174 UART: [kat] HMAC-384Kdf
28,153,065 UART: [kat] LMS
28,350,266 UART: [kat] --
31,658,818 UART: [rt] Verify complete
31,846,567 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,876,242 UART: [rt]cmd =0x46504c67, len=4
31,877,796 >>> mbox cmd response data (8 bytes)
31,878,143 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
31,908,002 UART: [rt]cmd =0x49444543, len=4
31,914,822 >>> mbox cmd response data (37 bytes)
31,915,417 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
31,944,963 UART: [rt]cmd =0x49444549, len=4
31,947,879 >>> mbox cmd response data (104 bytes)
31,948,748 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
31,978,471 UART: [rt]cmd =0x49444550, len=4
31,989,097 >>> mbox cmd response data (8 bytes)
31,989,507 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,019,174 UART: [rt]cmd =0x4c444556, len=4
32,030,260 >>> mbox cmd response data (687 bytes)
32,033,962 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,063,662 UART: [rt]cmd =0x43455246, len=4
32,076,368 >>> mbox cmd response data (887 bytes)
32,080,758 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,110,573 UART: [rt]cmd =0x43455252, len=4
32,121,579 >>> mbox cmd response data (782 bytes)
32,126,267 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,157,870 UART: [rt]cmd =0x53494756, len=196
33,123,384 >>> mbox cmd response data (8 bytes)
33,123,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,154,286 UART: [rt]cmd =0x4d454153, len=108
33,172,608 >>> mbox cmd response data (12 bytes)
33,173,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,202,746 UART: [rt]cmd =0x494e464f, len=4
33,207,091 >>> mbox cmd response data (312 bytes)
33,209,323 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,239,476 UART: [rt]cmd =0x54514754, len=24
33,241,831 >>> mbox cmd response data (8 bytes)
33,242,169 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,271,656 UART: [rt]cmd =0x47544744, len=8
33,274,803 >>> mbox cmd response data (104 bytes)
33,275,661 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,305,428 UART: [rt]cmd =0x50435252, len=8
33,307,490 >>> mbox cmd response data (8 bytes)
33,307,900 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,337,711 UART: [rt]cmd =0x50435251, len=36
34,245,217 >>> mbox cmd response data (1848 bytes)
34,254,117 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,284,435 UART: [rt]cmd =0x50435245, len=56
34,287,598 >>> mbox cmd response data (8 bytes)
34,288,076 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,318,025 UART: [rt]cmd =0x44504543, len=20
34,338,272 >>> mbox cmd response data (44 bytes)
34,338,971 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,368,830 UART: [rt]cmd =0x44504543, len=24
34,394,673 >>> mbox cmd response data (40 bytes)
34,395,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,425,814 UART: [rt]cmd =0x44504543, len=96
34,462,543 >>> mbox cmd response data (56 bytes)
34,463,332 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,493,967 UART: [rt]cmd =0x44504543, len=92
40,512,101 >>> mbox cmd response data (6284 bytes)
40,541,195 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,572,224 UART: [rt]cmd =0x44504543, len=136
44,744,756 >>> mbox cmd response data (136 bytes)
44,745,963 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,776,013 UART: [rt]cmd =0x44504543, len=40
44,802,374 >>> mbox cmd response data (40 bytes)
44,803,055 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
44,833,203 UART: [rt]cmd =0x44504543, len=28
44,876,070 >>> mbox cmd response data (2076 bytes)
44,885,972 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
44,916,214 UART: [rt]cmd =0x44504543, len=36
44,945,947 >>> mbox cmd response data (24 bytes)
44,946,514 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,976,331 UART: [rt]cmd =0x4453424c, len=4
47,407,157 >>> mbox cmd response data (8 bytes)
47,407,652 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,437,425 UART: [rt]cmd =0x46505344, len=4
47,547,125 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,038 UART:
192,426 UART: Running Caliptra ROM ...
193,573 UART:
193,721 UART: [state] CFI Enabled
261,726 UART: [state] LifecycleState = Unprovisioned
264,098 UART: [state] DebugLocked = No
265,926 UART: [state] WD Timer not started. Device not locked for debugging
271,209 UART: [kat] SHA2-256
461,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,862 UART: [kat] ++
472,338 UART: [kat] sha1
483,075 UART: [kat] SHA2-256
486,092 UART: [kat] SHA2-384
493,231 UART: [kat] SHA2-512-ACC
495,831 UART: [kat] ECC-384
2,947,850 UART: [kat] HMAC-384Kdf
2,973,041 UART: [kat] LMS
3,504,833 UART: [kat] --
3,510,251 UART: [cold-reset] ++
3,511,546 UART: [fht] FHT @ 0x50003400
3,521,966 UART: [idev] ++
3,522,607 UART: [idev] CDI.KEYID = 6
3,523,569 UART: [idev] SUBJECT.KEYID = 7
3,524,816 UART: [idev] UDS.KEYID = 0
3,525,740 ready_for_fw is high
3,525,958 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,669,648 UART: [idev] Erasing UDS.KEYID = 0
6,029,270 UART: [idev] Sha1 KeyId Algorithm
6,051,813 UART: [idev] --
6,055,551 UART: [ldev] ++
6,056,237 UART: [ldev] CDI.KEYID = 6
6,057,150 UART: [ldev] SUBJECT.KEYID = 5
6,058,309 UART: [ldev] AUTHORITY.KEYID = 7
6,059,542 UART: [ldev] FE.KEYID = 1
6,101,460 UART: [ldev] Erasing FE.KEYID = 1
8,607,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,635 UART: [ldev] --
10,416,060 UART: [fwproc] Wait for Commands...
10,418,758 UART: [fwproc] Recv command 0x46574c44
10,421,021 UART: [fwproc] Recv'd Img size: 114168 bytes
13,865,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,055 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,061,198 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,603,348 >>> mbox cmd response: success
14,606,306 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,607,027 UART: [afmc] ++
14,607,674 UART: [afmc] CDI.KEYID = 6
14,608,917 UART: [afmc] SUBJECT.KEYID = 7
14,610,408 UART: [afmc] AUTHORITY.KEYID = 5
17,150,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,832 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,892,026 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,907,188 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,922,224 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,946,568 UART: [afmc] --
18,950,057 UART: [cold-reset] --
18,954,140 UART: [state] Locking Datavault
18,961,017 UART: [state] Locking PCR0, PCR1 and PCR31
18,963,165 UART: [state] Locking ICCM
18,965,698 UART: [exit] Launching FMC @ 0x40000130
18,974,380 UART:
18,974,619 UART: Running Caliptra FMC ...
18,975,721 UART:
18,975,883 UART: [state] CFI Enabled
19,034,814 UART: [fht] FMC Alias Private Key: 7
20,798,423 UART: [art] Extend RT PCRs Done
20,799,645 UART: [art] Lock RT PCRs Done
20,801,234 UART: [art] Populate DV Done
20,806,807 UART: [fht] FMC Alias Private Key: 7
20,808,397 UART: [art] Derive CDI
20,809,213 UART: [art] Store in in slot 0x4
20,867,522 UART: [art] Derive Key Pair
20,868,562 UART: [art] Store priv key in slot 0x5
23,330,860 UART: [art] Derive Key Pair - Done
23,343,688 UART: [art] Signing Cert with AUTHO
23,344,990 UART: RITY.KEYID = 7
25,058,026 UART: [art] Erasing AUTHORITY.KEYID = 7
25,059,542 UART: [art] PUB.X = BD37886A211005BCA30086993131FA7C239820A9001211EB55722C9FD77E23F9BC0EE396F5E29C6937E6CFECD521E055
25,066,733 UART: [art] PUB.Y = 6D95F00CA2DBE9B678E85DBD7277E5497DC0E027645A706BE6897FE32C77C5CB0A52BD8AABDA6E15E65122F003A75934
25,074,012 UART: [art] SIG.R = E449AE59FB21ED41A20AB943BA06D82E1ABB99FE08DBD59A8FBC47883EC415024A62BA7884025BD253E32ED018667D2A
25,081,425 UART: [art] SIG.S = 3B908DD291B83BA2B052C3AB67C9D4215AEB8AA900FDB21F766CCCB7758795A056F457BAA1FF342138EDF779EE09BE32
26,059,962 UART: Caliptra RT
26,060,656 UART: [state] CFI Enabled
26,226,636 UART: [rt] RT listening for mailbox commands...
26,257,948 UART: [rt]cmd =0x46505652, len=4
26,259,194 UART: [rt] FIPS Version
26,260,463 >>> mbox cmd response data (36 bytes)
26,261,168 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,290,972 UART: [rt]cmd =0x46504c54, len=4
26,292,486 >>> mbox cmd response data (8 bytes)
26,292,838 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,322,382 UART: [rt]cmd =0x46504c67, len=4
26,323,677 >>> mbox cmd response: failed
26,324,644 UART: [rt] FIPS self test
26,325,571 UART: [kat] ++
26,326,023 UART: [kat] sha1
26,330,480 UART: [kat] SHA2-256
26,332,280 UART: [kat] SHA2-384
26,335,032 UART: [kat] SHA2-512-ACC
26,337,234 UART: [kat] ECC-384
28,776,584 UART: [kat] HMAC-384Kdf
28,803,435 UART: [kat] LMS
29,000,635 UART: [kat] --
32,330,030 UART: [rt] Verify complete
32,462,542 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,492,391 UART: [rt]cmd =0x46504c67, len=4
32,494,032 >>> mbox cmd response data (8 bytes)
32,494,392 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,523,996 UART: [rt]cmd =0x49444543, len=4
32,531,064 >>> mbox cmd response data (37 bytes)
32,531,662 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,561,317 UART: [rt]cmd =0x49444549, len=4
32,563,924 >>> mbox cmd response data (104 bytes)
32,564,796 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,594,352 UART: [rt]cmd =0x49444550, len=4
32,604,949 >>> mbox cmd response data (8 bytes)
32,605,369 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,635,131 UART: [rt]cmd =0x4c444556, len=4
32,646,268 >>> mbox cmd response data (687 bytes)
32,649,780 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,679,434 UART: [rt]cmd =0x43455246, len=4
32,691,951 >>> mbox cmd response data (887 bytes)
32,696,363 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,726,105 UART: [rt]cmd =0x43455252, len=4
32,737,566 >>> mbox cmd response data (783 bytes)
32,742,253 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,773,711 UART: [rt]cmd =0x53494756, len=196
33,738,968 >>> mbox cmd response data (8 bytes)
33,739,468 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,770,176 UART: [rt]cmd =0x4d454153, len=108
33,789,003 >>> mbox cmd response data (12 bytes)
33,789,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,819,330 UART: [rt]cmd =0x494e464f, len=4
33,823,775 >>> mbox cmd response data (312 bytes)
33,826,069 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,856,150 UART: [rt]cmd =0x54514754, len=24
33,858,800 >>> mbox cmd response data (8 bytes)
33,859,214 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,888,901 UART: [rt]cmd =0x47544744, len=8
33,891,867 >>> mbox cmd response data (104 bytes)
33,892,733 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,922,475 UART: [rt]cmd =0x50435252, len=8
33,924,378 >>> mbox cmd response data (8 bytes)
33,924,728 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,954,703 UART: [rt]cmd =0x50435251, len=36
34,866,844 >>> mbox cmd response data (1848 bytes)
34,875,757 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,906,037 UART: [rt]cmd =0x50435245, len=56
34,908,957 >>> mbox cmd response data (8 bytes)
34,909,546 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,939,282 UART: [rt]cmd =0x44504543, len=20
34,959,865 >>> mbox cmd response data (44 bytes)
34,960,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,990,303 UART: [rt]cmd =0x44504543, len=24
35,026,961 >>> mbox cmd response data (40 bytes)
35,027,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,058,240 UART: [rt]cmd =0x44504543, len=96
35,097,309 >>> mbox cmd response data (56 bytes)
35,098,092 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,128,677 UART: [rt]cmd =0x44504543, len=92
41,227,886 >>> mbox cmd response data (6284 bytes)
41,257,524 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,288,592 UART: [rt]cmd =0x44504543, len=136
45,515,952 >>> mbox cmd response data (136 bytes)
45,517,184 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,547,151 UART: [rt]cmd =0x44504543, len=40
45,584,924 >>> mbox cmd response data (40 bytes)
45,585,666 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,615,773 UART: [rt]cmd =0x44504543, len=28
45,658,688 >>> mbox cmd response data (2076 bytes)
45,668,624 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,698,865 UART: [rt]cmd =0x44504543, len=36
45,728,421 >>> mbox cmd response data (24 bytes)
45,729,033 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,758,692 UART: [rt]cmd =0x4453424c, len=4
48,249,043 >>> mbox cmd response data (8 bytes)
48,249,536 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,279,132 UART: [rt]cmd =0x46505344, len=4
48,388,743 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,440,052 ready_for_fw is high
3,440,475 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,729,724 >>> mbox cmd response: success
14,733,010 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,005,551 UART:
19,005,943 UART: Running Caliptra FMC ...
19,007,092 UART:
19,007,257 UART: [state] CFI Enabled
19,075,026 UART: [fht] FMC Alias Private Key: 7
20,838,694 UART: [art] Extend RT PCRs Done
20,839,927 UART: [art] Lock RT PCRs Done
20,841,695 UART: [art] Populate DV Done
20,847,111 UART: [fht] FMC Alias Private Key: 7
20,848,812 UART: [art] Derive CDI
20,849,551 UART: [art] Store in in slot 0x4
20,907,218 UART: [art] Derive Key Pair
20,908,221 UART: [art] Store priv key in slot 0x5
23,370,808 UART: [art] Derive Key Pair - Done
23,383,704 UART: [art] Signing Cert with AUTHO
23,385,009 UART: RITY.KEYID = 7
25,096,630 UART: [art] Erasing AUTHORITY.KEYID = 7
25,098,145 UART: [art] PUB.X = CFCE7BF99E8404A64DB0879B4BDB7416592667BA066DC7426E66FC807694546655AC32ECCC27DFEAC12197057365C3C8
25,105,388 UART: [art] PUB.Y = D140B05C310C9E2B9C25D3F656BD0FD683CA118D9FF9D45AC84EDD0231EDAC3C6277CB921DCF26764A1C79C401532E03
25,112,661 UART: [art] SIG.R = 27315BF72CE4F30CE43A2F5B8A2B6A5A2113C98A6C393474FDCA4443031AB04A43DAC02A24AC1BB805E290AA789DD4AF
25,120,096 UART: [art] SIG.S = 3817EE3742B1AEBF95147BA8F0ACA2ED5D10DF51D7866A9402AED12DC04F0B2BDC136B63C3764D7D7F73527F1FD76D6E
26,098,689 UART: Caliptra RT
26,099,401 UART: [state] CFI Enabled
26,266,126 UART: [rt] RT listening for mailbox commands...
26,297,371 UART: [rt]cmd =0x46505652, len=4
26,298,657 UART: [rt] FIPS Version
26,299,874 >>> mbox cmd response data (36 bytes)
26,300,541 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,330,135 UART: [rt]cmd =0x46504c54, len=4
26,331,671 >>> mbox cmd response data (8 bytes)
26,332,008 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,362,107 UART: [rt]cmd =0x46504c67, len=4
26,363,592 >>> mbox cmd response: failed
26,364,991 UART: [rt] FIPS self test
26,365,977 UART: [kat] ++
26,366,431 UART: [kat] sha1
26,370,864 UART: [kat] SHA2-256
26,372,699 UART: [kat] SHA2-384
26,375,345 UART: [kat] SHA2-512-ACC
26,377,557 UART: [kat] ECC-384
28,815,901 UART: [kat] HMAC-384Kdf
28,822,350 UART: [kat] LMS
29,019,546 UART: [kat] --
32,329,654 UART: [rt] Verify complete
32,502,895 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,532,989 UART: [rt]cmd =0x46504c67, len=4
32,534,499 >>> mbox cmd response data (8 bytes)
32,534,859 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,564,396 UART: [rt]cmd =0x49444543, len=4
32,571,426 >>> mbox cmd response data (37 bytes)
32,572,019 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,601,586 UART: [rt]cmd =0x49444549, len=4
32,604,351 >>> mbox cmd response data (104 bytes)
32,605,247 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,634,827 UART: [rt]cmd =0x49444550, len=4
32,645,528 >>> mbox cmd response data (8 bytes)
32,645,929 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,675,751 UART: [rt]cmd =0x4c444556, len=4
32,686,817 >>> mbox cmd response data (687 bytes)
32,690,332 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,720,127 UART: [rt]cmd =0x43455246, len=4
32,732,883 >>> mbox cmd response data (887 bytes)
32,737,270 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,766,795 UART: [rt]cmd =0x43455252, len=4
32,778,122 >>> mbox cmd response data (782 bytes)
32,782,825 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,814,431 UART: [rt]cmd =0x53494756, len=196
33,780,029 >>> mbox cmd response data (8 bytes)
33,780,520 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,811,285 UART: [rt]cmd =0x4d454153, len=108
33,829,672 >>> mbox cmd response data (12 bytes)
33,830,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,859,832 UART: [rt]cmd =0x494e464f, len=4
33,864,113 >>> mbox cmd response data (312 bytes)
33,866,382 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,896,235 UART: [rt]cmd =0x54514754, len=24
33,898,701 >>> mbox cmd response data (8 bytes)
33,899,140 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,928,801 UART: [rt]cmd =0x47544744, len=8
33,931,890 >>> mbox cmd response data (104 bytes)
33,932,750 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,962,575 UART: [rt]cmd =0x50435252, len=8
33,964,685 >>> mbox cmd response data (8 bytes)
33,965,029 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,995,088 UART: [rt]cmd =0x50435251, len=36
34,904,008 >>> mbox cmd response data (1848 bytes)
34,913,184 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,943,524 UART: [rt]cmd =0x50435245, len=56
34,946,551 >>> mbox cmd response data (8 bytes)
34,947,001 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,977,034 UART: [rt]cmd =0x44504543, len=20
34,997,506 >>> mbox cmd response data (44 bytes)
34,998,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,028,366 UART: [rt]cmd =0x44504543, len=24
35,064,548 >>> mbox cmd response data (40 bytes)
35,065,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,095,597 UART: [rt]cmd =0x44504543, len=96
35,134,511 >>> mbox cmd response data (56 bytes)
35,135,260 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,165,633 UART: [rt]cmd =0x44504543, len=92
41,266,399 >>> mbox cmd response data (6284 bytes)
41,295,509 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,326,503 UART: [rt]cmd =0x44504543, len=136
45,556,040 >>> mbox cmd response data (136 bytes)
45,557,232 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,587,522 UART: [rt]cmd =0x44504543, len=40
45,624,953 >>> mbox cmd response data (40 bytes)
45,625,606 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,655,424 UART: [rt]cmd =0x44504543, len=28
45,698,399 >>> mbox cmd response data (2076 bytes)
45,708,299 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,738,275 UART: [rt]cmd =0x44504543, len=36
45,767,686 >>> mbox cmd response data (24 bytes)
45,768,258 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,797,820 UART: [rt]cmd =0x4453424c, len=4
48,288,608 >>> mbox cmd response data (8 bytes)
48,289,113 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,318,831 UART: [rt]cmd =0x46505344, len=4
48,428,367 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,489 UART:
192,845 UART: Running Caliptra ROM ...
194,053 UART:
603,676 UART: [state] CFI Enabled
616,779 UART: [state] LifecycleState = Unprovisioned
619,184 UART: [state] DebugLocked = No
621,490 UART: [state] WD Timer not started. Device not locked for debugging
626,916 UART: [kat] SHA2-256
816,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,562 UART: [kat] ++
828,083 UART: [kat] sha1
840,382 UART: [kat] SHA2-256
843,393 UART: [kat] SHA2-384
849,747 UART: [kat] SHA2-512-ACC
852,336 UART: [kat] ECC-384
3,296,607 UART: [kat] HMAC-384Kdf
3,308,490 UART: [kat] LMS
3,840,323 UART: [kat] --
3,843,753 UART: [cold-reset] ++
3,845,331 UART: [fht] FHT @ 0x50003400
3,856,958 UART: [idev] ++
3,857,593 UART: [idev] CDI.KEYID = 6
3,858,549 UART: [idev] SUBJECT.KEYID = 7
3,859,818 UART: [idev] UDS.KEYID = 0
3,860,721 ready_for_fw is high
3,860,937 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,004,857 UART: [idev] Erasing UDS.KEYID = 0
6,333,166 UART: [idev] Sha1 KeyId Algorithm
6,356,355 UART: [idev] --
6,362,084 UART: [ldev] ++
6,362,777 UART: [ldev] CDI.KEYID = 6
6,363,693 UART: [ldev] SUBJECT.KEYID = 5
6,364,915 UART: [ldev] AUTHORITY.KEYID = 7
6,366,011 UART: [ldev] FE.KEYID = 1
6,379,231 UART: [ldev] Erasing FE.KEYID = 1
8,858,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,899 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,260 UART: [ldev] --
10,648,392 UART: [fwproc] Wait for Commands...
10,650,111 UART: [fwproc] Recv command 0x46574c44
10,652,375 UART: [fwproc] Recv'd Img size: 114168 bytes
14,098,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,176,472 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,292,607 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,834,308 >>> mbox cmd response: success
14,837,272 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,837,868 UART: [afmc] ++
14,838,484 UART: [afmc] CDI.KEYID = 6
14,839,718 UART: [afmc] SUBJECT.KEYID = 7
14,841,268 UART: [afmc] AUTHORITY.KEYID = 5
17,344,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,067,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,069,296 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,084,496 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,099,620 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,114,675 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,139,139 UART: [afmc] --
19,143,482 UART: [cold-reset] --
19,146,804 UART: [state] Locking Datavault
19,152,651 UART: [state] Locking PCR0, PCR1 and PCR31
19,154,799 UART: [state] Locking ICCM
19,156,089 UART: [exit] Launching FMC @ 0x40000130
19,164,770 UART:
19,165,003 UART: Running Caliptra FMC ...
19,166,113 UART:
19,166,269 UART: [state] CFI Enabled
19,174,370 UART: [fht] FMC Alias Private Key: 7
20,931,949 UART: [art] Extend RT PCRs Done
20,933,191 UART: [art] Lock RT PCRs Done
20,934,948 UART: [art] Populate DV Done
20,940,142 UART: [fht] FMC Alias Private Key: 7
20,941,717 UART: [art] Derive CDI
20,942,459 UART: [art] Store in in slot 0x4
20,985,425 UART: [art] Derive Key Pair
20,986,424 UART: [art] Store priv key in slot 0x5
23,412,751 UART: [art] Derive Key Pair - Done
23,425,412 UART: [art] Signing Cert with AUTHO
23,426,740 UART: RITY.KEYID = 7
25,131,930 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,431 UART: [art] PUB.X = 4EAFBADE943FBD13615BB7F9771F78BA7C2573DE79280797DB17D2AA0D91D4E58AF76EEBDC75579C692E23E9B759B5AF
25,140,735 UART: [art] PUB.Y = 7E29D3CA63CF3FD440AD6AA5FF0CE6A94A0A8CEBF6682100EDA00C0A754F2F23957487B7C84E5A2CD81223D595495576
25,147,985 UART: [art] SIG.R = B3FDE8C268D526BB5C3B814EB889D586899288A4AAB4BB3B2216A7AF73AA355BF80A8B5B636A74B98CF93A420796503A
25,155,397 UART: [art] SIG.S = A608070483B7C619E19A5D3880C82C259D57971A2D06D85754164B2E952E868EB0767F5D6E493CFEED9C5B32BD0DEB47
26,134,463 UART: Caliptra RT
26,135,195 UART: [state] CFI Enabled
26,251,841 UART: [rt] RT listening for mailbox commands...
26,283,153 UART: [rt]cmd =0x46505652, len=4
26,284,456 UART: [rt] FIPS Version
26,285,778 >>> mbox cmd response data (36 bytes)
26,286,483 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,316,361 UART: [rt]cmd =0x46504c54, len=4
26,317,975 >>> mbox cmd response data (8 bytes)
26,318,327 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,348,454 UART: [rt]cmd =0x46504c67, len=4
26,349,907 >>> mbox cmd response: failed
26,350,935 UART: [rt] FIPS self test
26,351,862 UART: [kat] ++
26,352,310 UART: [kat] sha1
26,356,633 UART: [kat] SHA2-256
26,358,455 UART: [kat] SHA2-384
26,361,386 UART: [kat] SHA2-512-ACC
26,363,625 UART: [kat] ECC-384
28,790,789 UART: [kat] HMAC-384Kdf
28,796,552 UART: [kat] LMS
28,993,730 UART: [kat] --
32,324,370 UART: [rt] Verify complete
32,488,357 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,518,256 UART: [rt]cmd =0x46504c67, len=4
32,519,900 >>> mbox cmd response data (8 bytes)
32,520,248 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,550,042 UART: [rt]cmd =0x49444543, len=4
32,556,789 >>> mbox cmd response data (37 bytes)
32,557,380 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,587,086 UART: [rt]cmd =0x49444549, len=4
32,590,071 >>> mbox cmd response data (104 bytes)
32,590,942 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,620,790 UART: [rt]cmd =0x49444550, len=4
32,631,477 >>> mbox cmd response data (8 bytes)
32,631,886 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,661,483 UART: [rt]cmd =0x4c444556, len=4
32,672,565 >>> mbox cmd response data (687 bytes)
32,676,074 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,705,771 UART: [rt]cmd =0x43455246, len=4
32,718,451 >>> mbox cmd response data (887 bytes)
32,722,850 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,752,370 UART: [rt]cmd =0x43455252, len=4
32,763,717 >>> mbox cmd response data (784 bytes)
32,768,416 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,799,875 UART: [rt]cmd =0x53494756, len=196
33,765,183 >>> mbox cmd response data (8 bytes)
33,765,667 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,795,991 UART: [rt]cmd =0x4d454153, len=108
33,814,461 >>> mbox cmd response data (12 bytes)
33,814,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,844,553 UART: [rt]cmd =0x494e464f, len=4
33,848,809 >>> mbox cmd response data (312 bytes)
33,851,276 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,881,292 UART: [rt]cmd =0x54514754, len=24
33,883,776 >>> mbox cmd response data (8 bytes)
33,884,183 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,914,026 UART: [rt]cmd =0x47544744, len=8
33,916,992 >>> mbox cmd response data (104 bytes)
33,917,851 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,947,756 UART: [rt]cmd =0x50435252, len=8
33,949,761 >>> mbox cmd response data (8 bytes)
33,950,166 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,980,139 UART: [rt]cmd =0x50435251, len=36
34,887,631 >>> mbox cmd response data (1848 bytes)
34,896,548 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,926,705 UART: [rt]cmd =0x50435245, len=56
34,929,834 >>> mbox cmd response data (8 bytes)
34,930,279 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,960,122 UART: [rt]cmd =0x44504543, len=20
34,980,400 >>> mbox cmd response data (44 bytes)
34,981,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,010,904 UART: [rt]cmd =0x44504543, len=24
35,037,157 >>> mbox cmd response data (40 bytes)
35,037,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,068,132 UART: [rt]cmd =0x44504543, len=96
35,105,242 >>> mbox cmd response data (56 bytes)
35,106,015 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,136,540 UART: [rt]cmd =0x44504543, len=92
41,154,707 >>> mbox cmd response data (6284 bytes)
41,183,997 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,215,174 UART: [rt]cmd =0x44504543, len=136
45,387,392 >>> mbox cmd response data (136 bytes)
45,388,611 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,418,565 UART: [rt]cmd =0x44504543, len=40
45,444,694 >>> mbox cmd response data (40 bytes)
45,445,372 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,475,493 UART: [rt]cmd =0x44504543, len=28
45,518,168 >>> mbox cmd response data (2076 bytes)
45,528,098 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,558,116 UART: [rt]cmd =0x44504543, len=36
45,587,383 >>> mbox cmd response data (24 bytes)
45,588,011 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,617,843 UART: [rt]cmd =0x4453424c, len=4
48,048,579 >>> mbox cmd response data (8 bytes)
48,049,070 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,078,852 UART: [rt]cmd =0x46505344, len=4
48,188,332 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
3,760,900 ready_for_fw is high
3,761,334 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,962,422 >>> mbox cmd response: success
14,966,017 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,214,776 UART:
19,215,170 UART: Running Caliptra FMC ...
19,216,366 UART:
19,216,528 UART: [state] CFI Enabled
19,224,174 UART: [fht] FMC Alias Private Key: 7
20,980,692 UART: [art] Extend RT PCRs Done
20,981,927 UART: [art] Lock RT PCRs Done
20,983,608 UART: [art] Populate DV Done
20,988,975 UART: [fht] FMC Alias Private Key: 7
20,990,677 UART: [art] Derive CDI
20,991,495 UART: [art] Store in in slot 0x4
21,033,951 UART: [art] Derive Key Pair
21,034,993 UART: [art] Store priv key in slot 0x5
23,461,601 UART: [art] Derive Key Pair - Done
23,474,552 UART: [art] Signing Cert with AUTHO
23,475,859 UART: RITY.KEYID = 7
25,181,200 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,709 UART: [art] PUB.X = D762FDFC5274BBC06EDF368F3DC33A5E38A41084899C0F013ADB3EC4FFA96AC9A444C52CD8EEAA266ED028AB9FC88514
25,190,029 UART: [art] PUB.Y = 596A51E84602675B6EE8FDB4CADD3D54AA301E8B51A9614581AD4BA31A0DADB84BCB3F9C19ABE25D740BFF31158C8182
25,197,319 UART: [art] SIG.R = 783DF8544C665C332EECD147098D94331F0202CDB5D766D9C4A366EFEF9A903F74852E565C55FB94954005034758E187
25,204,703 UART: [art] SIG.S = 5251806EE81952032FE7A82CEBA15FE055FB97CFA08E6C0702F714E31EB942073C6176D730A86B9DC3923442692D223A
26,183,627 UART: Caliptra RT
26,184,342 UART: [state] CFI Enabled
26,301,739 UART: [rt] RT listening for mailbox commands...
26,333,264 UART: [rt]cmd =0x46505652, len=4
26,334,517 UART: [rt] FIPS Version
26,335,780 >>> mbox cmd response data (36 bytes)
26,336,472 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,366,275 UART: [rt]cmd =0x46504c54, len=4
26,368,029 >>> mbox cmd response data (8 bytes)
26,368,379 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,398,291 UART: [rt]cmd =0x46504c67, len=4
26,399,664 >>> mbox cmd response: failed
26,400,832 UART: [rt] FIPS self test
26,401,850 UART: [kat] ++
26,402,304 UART: [kat] sha1
26,406,658 UART: [kat] SHA2-256
26,408,461 UART: [kat] SHA2-384
26,411,452 UART: [kat] SHA2-512-ACC
26,413,667 UART: [kat] ECC-384
28,840,521 UART: [kat] HMAC-384Kdf
28,846,357 UART: [kat] LMS
29,043,549 UART: [kat] --
32,353,503 UART: [rt] Verify complete
32,538,192 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,568,027 UART: [rt]cmd =0x46504c67, len=4
32,569,497 >>> mbox cmd response data (8 bytes)
32,569,859 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,599,614 UART: [rt]cmd =0x49444543, len=4
32,606,642 >>> mbox cmd response data (37 bytes)
32,607,246 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,636,899 UART: [rt]cmd =0x49444549, len=4
32,639,642 >>> mbox cmd response data (104 bytes)
32,640,526 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,670,286 UART: [rt]cmd =0x49444550, len=4
32,680,653 >>> mbox cmd response data (8 bytes)
32,681,057 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,710,610 UART: [rt]cmd =0x4c444556, len=4
32,721,615 >>> mbox cmd response data (687 bytes)
32,725,131 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,755,144 UART: [rt]cmd =0x43455246, len=4
32,767,786 >>> mbox cmd response data (887 bytes)
32,772,185 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,801,717 UART: [rt]cmd =0x43455252, len=4
32,813,170 >>> mbox cmd response data (782 bytes)
32,817,866 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,849,282 UART: [rt]cmd =0x53494756, len=196
33,814,837 >>> mbox cmd response data (8 bytes)
33,815,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,846,069 UART: [rt]cmd =0x4d454153, len=108
33,864,167 >>> mbox cmd response data (12 bytes)
33,864,663 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,894,431 UART: [rt]cmd =0x494e464f, len=4
33,898,776 >>> mbox cmd response data (312 bytes)
33,901,314 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,931,337 UART: [rt]cmd =0x54514754, len=24
33,933,707 >>> mbox cmd response data (8 bytes)
33,934,116 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,963,824 UART: [rt]cmd =0x47544744, len=8
33,966,907 >>> mbox cmd response data (104 bytes)
33,967,793 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,997,339 UART: [rt]cmd =0x50435252, len=8
33,999,081 >>> mbox cmd response data (8 bytes)
33,999,428 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,029,441 UART: [rt]cmd =0x50435251, len=36
34,937,317 >>> mbox cmd response data (1848 bytes)
34,946,256 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,976,578 UART: [rt]cmd =0x50435245, len=56
34,979,548 >>> mbox cmd response data (8 bytes)
34,979,997 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,010,028 UART: [rt]cmd =0x44504543, len=20
35,030,028 >>> mbox cmd response data (44 bytes)
35,030,777 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,060,735 UART: [rt]cmd =0x44504543, len=24
35,087,358 >>> mbox cmd response data (40 bytes)
35,088,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,118,509 UART: [rt]cmd =0x44504543, len=96
35,154,715 >>> mbox cmd response data (56 bytes)
35,155,478 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,186,121 UART: [rt]cmd =0x44504543, len=92
41,204,345 >>> mbox cmd response data (6284 bytes)
41,233,944 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,265,018 UART: [rt]cmd =0x44504543, len=136
45,437,289 >>> mbox cmd response data (136 bytes)
45,438,548 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,468,643 UART: [rt]cmd =0x44504543, len=40
45,494,304 >>> mbox cmd response data (40 bytes)
45,494,977 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,524,959 UART: [rt]cmd =0x44504543, len=28
45,567,443 >>> mbox cmd response data (2076 bytes)
45,577,509 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,607,442 UART: [rt]cmd =0x44504543, len=36
45,636,492 >>> mbox cmd response data (24 bytes)
45,637,063 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,666,690 UART: [rt]cmd =0x4453424c, len=4
48,096,989 >>> mbox cmd response data (8 bytes)
48,097,490 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,127,370 UART: [rt]cmd =0x46505344, len=4
48,237,202 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,273 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,354 UART: [kat] SHA2-512-ACC
897,255 UART: [kat] ECC-384
902,844 UART: [kat] HMAC-384Kdf
907,446 UART: [kat] LMS
1,475,642 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,743 UART: [fht] Storing FHT @ 0x50003400
1,479,322 UART: [idev] ++
1,479,490 UART: [idev] CDI.KEYID = 6
1,479,850 UART: [idev] SUBJECT.KEYID = 7
1,480,274 UART: [idev] UDS.KEYID = 0
1,480,619 ready_for_fw is high
1,480,619 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,504,786 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,572 UART: [idev] --
1,514,533 UART: [ldev] ++
1,514,701 UART: [ldev] CDI.KEYID = 6
1,515,064 UART: [ldev] SUBJECT.KEYID = 5
1,515,490 UART: [ldev] AUTHORITY.KEYID = 7
1,515,953 UART: [ldev] FE.KEYID = 1
1,521,255 UART: [ldev] Erasing FE.KEYID = 1
1,546,306 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,552 UART: [ldev] --
1,585,827 UART: [fwproc] Waiting for Commands...
1,586,600 UART: [fwproc] Received command 0x46574c44
1,587,391 UART: [fwproc] Received Image of size 114168 bytes
2,884,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,737 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,089 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,746 >>> mbox cmd response: success
3,077,746 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,078,914 UART: [afmc] ++
3,079,082 UART: [afmc] CDI.KEYID = 6
3,079,444 UART: [afmc] SUBJECT.KEYID = 7
3,079,869 UART: [afmc] AUTHORITY.KEYID = 5
3,115,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,430 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,210 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,137,938 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,143,823 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,149,513 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,158 UART: [afmc] --
3,158,206 UART: [cold-reset] --
3,159,152 UART: [state] Locking Datavault
3,160,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,023 UART: [state] Locking ICCM
3,161,469 UART: [exit] Launching FMC @ 0x40000130
3,166,798 UART:
3,166,814 UART: Running Caliptra FMC ...
3,167,222 UART:
3,167,276 UART: [state] CFI Enabled
3,177,761 UART: [fht] FMC Alias Private Key: 7
3,285,280 UART: [art] Extend RT PCRs Done
3,285,708 UART: [art] Lock RT PCRs Done
3,287,086 UART: [art] Populate DV Done
3,295,375 UART: [fht] FMC Alias Private Key: 7
3,296,377 UART: [art] Derive CDI
3,296,657 UART: [art] Store in in slot 0x4
3,382,306 UART: [art] Derive Key Pair
3,382,666 UART: [art] Store priv key in slot 0x5
3,395,792 UART: [art] Derive Key Pair - Done
3,410,244 UART: [art] Signing Cert with AUTHO
3,410,724 UART: RITY.KEYID = 7
3,425,850 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,615 UART: [art] PUB.X = 9121E283572CCD8383E82261580B051E1EAD17A867084C8ABEA0AA3FB6B7768B88DCBA0C0EBC3E32C634A58EB36FB8C7
3,433,384 UART: [art] PUB.Y = 06B628AF9A30CCE9E9C2376E4923C71DB2EDA973917A0FCF377C85B2EB5492C4D115349240B1EE50BAC4E331829DC2F0
3,440,338 UART: [art] SIG.R = ADBBDF5F5F76341BEF880B4371896AE5F755895F702AB19505CE0421D2889ECEA902739D55F0BBE5CEB8BE9A40B6F211
3,447,110 UART: [art] SIG.S = 398C792F4A035E8B928567884A862ADDED3DD0C34A8C56E4C3E90C17231C7FAC93447541A6C61440A34F563C75AE5E1D
3,471,245 UART: Caliptra RT
3,471,498 UART: [state] CFI Enabled
3,579,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,457 UART: [rt]cmd =0x46505652, len=4
3,611,117 UART: [rt] FIPS Version
3,612,238 >>> mbox cmd response data (36 bytes)
3,612,239 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,632 UART: [rt]cmd =0x46504c54, len=4
3,642,818 >>> mbox cmd response data (8 bytes)
3,642,819 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,672,478 UART: [rt]cmd =0x46504c67, len=4
3,673,504 >>> mbox cmd response: failed
3,673,852 UART: [rt] FIPS self test
3,674,183 UART: [kat] ++
3,674,335 UART: [kat] sha1
3,678,662 UART: [kat] SHA2-256
3,680,592 UART: [kat] SHA2-384
3,683,177 UART: [kat] SHA2-512-ACC
3,685,072 UART: [kat] ECC-384
3,694,757 UART: [kat] HMAC-384Kdf
3,699,232 UART: [kat] LMS
3,948,123 UART: [kat] --
6,164,868 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,254 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,486 UART: [rt]cmd =0x46504c67, len=4
6,203,591 >>> mbox cmd response data (8 bytes)
6,203,592 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,232,781 UART: [rt]cmd =0x49444543, len=4
6,239,143 >>> mbox cmd response data (37 bytes)
6,239,144 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,403 UART: [rt]cmd =0x49444549, len=4
6,270,818 >>> mbox cmd response data (104 bytes)
6,270,819 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,296 UART: [rt]cmd =0x49444550, len=4
6,310,455 >>> mbox cmd response data (8 bytes)
6,310,456 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,339,637 UART: [rt]cmd =0x4c444556, len=4
6,350,042 >>> mbox cmd response data (687 bytes)
6,350,043 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,570 UART: [rt]cmd =0x43455246, len=4
6,391,839 >>> mbox cmd response data (920 bytes)
6,391,840 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,421,291 UART: [rt]cmd =0x43455252, len=4
6,432,237 >>> mbox cmd response data (783 bytes)
6,432,238 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,462,915 UART: [rt]cmd =0x53494756, len=196
6,468,545 >>> mbox cmd response data (8 bytes)
6,468,546 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,498,597 UART: [rt]cmd =0x4d454153, len=108
6,519,560 >>> mbox cmd response data (12 bytes)
6,519,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,548,684 UART: [rt]cmd =0x494e464f, len=4
6,552,337 >>> mbox cmd response data (312 bytes)
6,552,338 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,581,687 UART: [rt]cmd =0x54514754, len=24
6,584,043 >>> mbox cmd response data (8 bytes)
6,584,044 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,339 UART: [rt]cmd =0x47544744, len=8
6,615,973 >>> mbox cmd response data (104 bytes)
6,615,974 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,645,389 UART: [rt]cmd =0x50435252, len=8
6,647,001 >>> mbox cmd response data (8 bytes)
6,647,002 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,676,447 UART: [rt]cmd =0x50435251, len=36
6,843,518 >>> mbox cmd response data (1848 bytes)
6,843,519 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,873,252 UART: [rt]cmd =0x50435245, len=56
6,876,882 >>> mbox cmd response data (8 bytes)
6,876,883 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,906,658 UART: [rt]cmd =0x44504543, len=20
6,927,533 >>> mbox cmd response data (44 bytes)
6,927,534 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,957,007 UART: [rt]cmd =0x44504543, len=24
6,982,809 >>> mbox cmd response data (40 bytes)
6,982,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,012,737 UART: [rt]cmd =0x44504543, len=96
7,049,909 >>> mbox cmd response data (56 bytes)
7,049,910 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,079,741 UART: [rt]cmd =0x44504543, len=92
7,307,273 >>> mbox cmd response data (6284 bytes)
7,307,274 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,337,451 UART: [rt]cmd =0x44504543, len=136
7,404,762 >>> mbox cmd response data (136 bytes)
7,404,763 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,434,146 UART: [rt]cmd =0x44504543, len=40
7,460,617 >>> mbox cmd response data (40 bytes)
7,460,618 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,490,319 UART: [rt]cmd =0x44504543, len=28
7,533,590 >>> mbox cmd response data (2076 bytes)
7,533,591 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,563,190 UART: [rt]cmd =0x44504543, len=36
7,593,419 >>> mbox cmd response data (24 bytes)
7,593,420 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,622,915 UART: [rt]cmd =0x4453424c, len=4
7,639,919 >>> mbox cmd response data (8 bytes)
7,639,920 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,669,181 UART: [rt]cmd =0x46505344, len=4
7,777,293 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,783 ready_for_fw is high
1,361,783 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,322 >>> mbox cmd response: success
2,925,322 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,986,360 UART:
2,986,376 UART: Running Caliptra FMC ...
2,986,784 UART:
2,986,838 UART: [state] CFI Enabled
2,997,229 UART: [fht] FMC Alias Private Key: 7
3,104,538 UART: [art] Extend RT PCRs Done
3,104,966 UART: [art] Lock RT PCRs Done
3,106,288 UART: [art] Populate DV Done
3,114,281 UART: [fht] FMC Alias Private Key: 7
3,115,419 UART: [art] Derive CDI
3,115,699 UART: [art] Store in in slot 0x4
3,201,144 UART: [art] Derive Key Pair
3,201,504 UART: [art] Store priv key in slot 0x5
3,214,642 UART: [art] Derive Key Pair - Done
3,229,522 UART: [art] Signing Cert with AUTHO
3,230,002 UART: RITY.KEYID = 7
3,245,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,246,187 UART: [art] PUB.X = A24C3A29ED69A7C29D946EA839FAAAC9194D11366EE7366F655FAA3C1F58505E51FB35B1A2E0A5C7C89B8F14891CE968
3,252,969 UART: [art] PUB.Y = D84B8FCD7EE45A7D9347067722F01920652706F9EF5CAD4EE1372DB40812547EA0F0C1D5FF59F0CDCE07DA4DF12FD031
3,259,921 UART: [art] SIG.R = F5BB95977B1E4E8809A0C623915EEDC2ABDBC55E5841658A8E4182199683F277BCFE1B4C4EFDBA872D1BFF4AF1811790
3,266,702 UART: [art] SIG.S = F571771C00CB21A637BAA00C63DE9AAAB75F1D5F9090B6A6E2E8ED1815CB5A2EC2329A9DFE28C7971DC15938D72CE3B9
3,290,904 UART: Caliptra RT
3,291,157 UART: [state] CFI Enabled
3,400,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,801 UART: [rt]cmd =0x46505652, len=4
3,431,461 UART: [rt] FIPS Version
3,432,688 >>> mbox cmd response data (36 bytes)
3,432,689 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,461,794 UART: [rt]cmd =0x46504c54, len=4
3,463,086 >>> mbox cmd response data (8 bytes)
3,463,087 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,492,748 UART: [rt]cmd =0x46504c67, len=4
3,493,676 >>> mbox cmd response: failed
3,493,892 UART: [rt] FIPS self test
3,494,223 UART: [kat] ++
3,494,375 UART: [kat] sha1
3,498,526 UART: [kat] SHA2-256
3,500,456 UART: [kat] SHA2-384
3,503,139 UART: [kat] SHA2-512-ACC
3,505,034 UART: [kat] ECC-384
3,514,629 UART: [kat] HMAC-384Kdf
3,519,036 UART: [kat] LMS
3,767,927 UART: [kat] --
5,878,048 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,883,437 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,912,709 UART: [rt]cmd =0x46504c67, len=4
5,913,860 >>> mbox cmd response data (8 bytes)
5,913,861 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,943,190 UART: [rt]cmd =0x49444543, len=4
5,949,514 >>> mbox cmd response data (37 bytes)
5,949,515 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,978,908 UART: [rt]cmd =0x49444549, len=4
5,981,345 >>> mbox cmd response data (104 bytes)
5,981,346 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,010,835 UART: [rt]cmd =0x49444550, len=4
6,020,887 >>> mbox cmd response data (8 bytes)
6,020,888 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,050,193 UART: [rt]cmd =0x4c444556, len=4
6,060,414 >>> mbox cmd response data (687 bytes)
6,060,415 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,089,856 UART: [rt]cmd =0x43455246, len=4
6,102,217 >>> mbox cmd response data (920 bytes)
6,102,218 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,131,541 UART: [rt]cmd =0x43455252, len=4
6,142,294 >>> mbox cmd response data (784 bytes)
6,142,295 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,116 UART: [rt]cmd =0x53494756, len=196
6,178,282 >>> mbox cmd response data (8 bytes)
6,178,283 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,208,214 UART: [rt]cmd =0x4d454153, len=108
6,228,941 >>> mbox cmd response data (12 bytes)
6,228,942 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,258,091 UART: [rt]cmd =0x494e464f, len=4
6,261,906 >>> mbox cmd response data (312 bytes)
6,261,907 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,291,372 UART: [rt]cmd =0x54514754, len=24
6,293,662 >>> mbox cmd response data (8 bytes)
6,293,663 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,323,006 UART: [rt]cmd =0x47544744, len=8
6,325,352 >>> mbox cmd response data (104 bytes)
6,325,353 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,354,720 UART: [rt]cmd =0x50435252, len=8
6,356,266 >>> mbox cmd response data (8 bytes)
6,356,267 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,385,998 UART: [rt]cmd =0x50435251, len=36
6,553,567 >>> mbox cmd response data (1848 bytes)
6,553,568 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,583,251 UART: [rt]cmd =0x50435245, len=56
6,586,993 >>> mbox cmd response data (8 bytes)
6,586,994 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,616,243 UART: [rt]cmd =0x44504543, len=20
6,637,310 >>> mbox cmd response data (44 bytes)
6,637,311 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,666,754 UART: [rt]cmd =0x44504543, len=24
6,693,154 >>> mbox cmd response data (40 bytes)
6,693,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,723,156 UART: [rt]cmd =0x44504543, len=96
6,760,162 >>> mbox cmd response data (56 bytes)
6,760,163 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,789,814 UART: [rt]cmd =0x44504543, len=92
7,017,899 >>> mbox cmd response data (6284 bytes)
7,017,900 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,048,271 UART: [rt]cmd =0x44504543, len=136
7,114,782 >>> mbox cmd response data (136 bytes)
7,114,783 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,144,072 UART: [rt]cmd =0x44504543, len=40
7,169,893 >>> mbox cmd response data (40 bytes)
7,169,894 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,199,575 UART: [rt]cmd =0x44504543, len=28
7,242,600 >>> mbox cmd response data (2076 bytes)
7,242,601 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,272,396 UART: [rt]cmd =0x44504543, len=36
7,302,297 >>> mbox cmd response data (24 bytes)
7,302,298 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,331,405 UART: [rt]cmd =0x4453424c, len=4
7,348,763 >>> mbox cmd response data (8 bytes)
7,348,764 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,378,143 UART: [rt]cmd =0x46505344, len=4
7,486,133 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,762 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,501 UART: [kat] SHA2-512-ACC
897,402 UART: [kat] ECC-384
902,899 UART: [kat] HMAC-384Kdf
907,503 UART: [kat] LMS
1,475,699 UART: [kat] --
1,476,616 UART: [cold-reset] ++
1,477,062 UART: [fht] Storing FHT @ 0x50003400
1,479,871 UART: [idev] ++
1,480,039 UART: [idev] CDI.KEYID = 6
1,480,399 UART: [idev] SUBJECT.KEYID = 7
1,480,823 UART: [idev] UDS.KEYID = 0
1,481,168 ready_for_fw is high
1,481,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,139 UART: [idev] Erasing UDS.KEYID = 0
1,505,253 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,109 UART: [idev] --
1,515,018 UART: [ldev] ++
1,515,186 UART: [ldev] CDI.KEYID = 6
1,515,549 UART: [ldev] SUBJECT.KEYID = 5
1,515,975 UART: [ldev] AUTHORITY.KEYID = 7
1,516,438 UART: [ldev] FE.KEYID = 1
1,521,680 UART: [ldev] Erasing FE.KEYID = 1
1,546,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,513 UART: [ldev] --
1,585,790 UART: [fwproc] Waiting for Commands...
1,586,619 UART: [fwproc] Received command 0x46574c44
1,587,410 UART: [fwproc] Received Image of size 114168 bytes
2,882,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,218 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,263 >>> mbox cmd response: success
3,075,263 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,076,301 UART: [afmc] ++
3,076,469 UART: [afmc] CDI.KEYID = 6
3,076,831 UART: [afmc] SUBJECT.KEYID = 7
3,077,256 UART: [afmc] AUTHORITY.KEYID = 5
3,112,299 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,395 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,123 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,008 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,698 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,479 UART: [afmc] --
3,155,501 UART: [cold-reset] --
3,156,377 UART: [state] Locking Datavault
3,157,750 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,354 UART: [state] Locking ICCM
3,158,902 UART: [exit] Launching FMC @ 0x40000130
3,164,231 UART:
3,164,247 UART: Running Caliptra FMC ...
3,164,655 UART:
3,164,798 UART: [state] CFI Enabled
3,175,383 UART: [fht] FMC Alias Private Key: 7
3,283,798 UART: [art] Extend RT PCRs Done
3,284,226 UART: [art] Lock RT PCRs Done
3,286,174 UART: [art] Populate DV Done
3,294,375 UART: [fht] FMC Alias Private Key: 7
3,295,393 UART: [art] Derive CDI
3,295,673 UART: [art] Store in in slot 0x4
3,381,452 UART: [art] Derive Key Pair
3,381,812 UART: [art] Store priv key in slot 0x5
3,394,998 UART: [art] Derive Key Pair - Done
3,409,942 UART: [art] Signing Cert with AUTHO
3,410,422 UART: RITY.KEYID = 7
3,425,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,333 UART: [art] PUB.X = ACC42F3F80E836F569A794FD9C19D397F4FC6C3A2D936F86F63FCAD4140EB1ED05B5E9255019E90DCFB16FFACAFC1A7A
3,433,120 UART: [art] PUB.Y = 8BE8FD6AB10EBAF817B45497ED7A1C983F10362F1050DFA226C4F4F77DD05C95A9BD2885E9ECA3F1847C24C5D400EEA0
3,440,063 UART: [art] SIG.R = 8E658FF2B09220A970283760DAFAC7FC876BA5C0E2295B78C21CCCEE382F6CC989FFCED393FE569418857A0C797EC74B
3,446,844 UART: [art] SIG.S = C580DCA294B240A00DD89B717930CF5241B3C4AA010E20DDFF91185334A2AD7B84AA9996D01B811A758096BF05C50EA1
3,470,786 UART: Caliptra RT
3,471,131 UART: [state] CFI Enabled
3,579,591 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,961 UART: [rt]cmd =0x46505652, len=4
3,610,621 UART: [rt] FIPS Version
3,611,860 >>> mbox cmd response data (36 bytes)
3,611,861 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,641,098 UART: [rt]cmd =0x46504c54, len=4
3,642,260 >>> mbox cmd response data (8 bytes)
3,642,261 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,671,892 UART: [rt]cmd =0x46504c67, len=4
3,672,908 >>> mbox cmd response: failed
3,673,170 UART: [rt] FIPS self test
3,673,501 UART: [kat] ++
3,673,653 UART: [kat] sha1
3,677,772 UART: [kat] SHA2-256
3,679,702 UART: [kat] SHA2-384
3,682,531 UART: [kat] SHA2-512-ACC
3,684,426 UART: [kat] ECC-384
3,694,269 UART: [kat] HMAC-384Kdf
3,698,882 UART: [kat] LMS
3,947,773 UART: [kat] --
6,163,932 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,172,658 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,290 UART: [rt]cmd =0x46504c67, len=4
6,203,477 >>> mbox cmd response data (8 bytes)
6,203,478 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,233,053 UART: [rt]cmd =0x49444543, len=4
6,239,495 >>> mbox cmd response data (37 bytes)
6,239,496 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,268,699 UART: [rt]cmd =0x49444549, len=4
6,271,030 >>> mbox cmd response data (104 bytes)
6,271,031 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,300,446 UART: [rt]cmd =0x49444550, len=4
6,310,784 >>> mbox cmd response data (8 bytes)
6,310,785 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,340,288 UART: [rt]cmd =0x4c444556, len=4
6,350,727 >>> mbox cmd response data (687 bytes)
6,350,728 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,380,135 UART: [rt]cmd =0x43455246, len=4
6,392,290 >>> mbox cmd response data (920 bytes)
6,392,291 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,421,704 UART: [rt]cmd =0x43455252, len=4
6,432,383 >>> mbox cmd response data (784 bytes)
6,432,384 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,462,683 UART: [rt]cmd =0x53494756, len=196
6,467,845 >>> mbox cmd response data (8 bytes)
6,467,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,497,779 UART: [rt]cmd =0x4d454153, len=108
6,519,156 >>> mbox cmd response data (12 bytes)
6,519,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,548,594 UART: [rt]cmd =0x494e464f, len=4
6,552,249 >>> mbox cmd response data (312 bytes)
6,552,250 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,581,823 UART: [rt]cmd =0x54514754, len=24
6,583,943 >>> mbox cmd response data (8 bytes)
6,583,944 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,613,407 UART: [rt]cmd =0x47544744, len=8
6,615,945 >>> mbox cmd response data (104 bytes)
6,615,946 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,645,347 UART: [rt]cmd =0x50435252, len=8
6,646,795 >>> mbox cmd response data (8 bytes)
6,646,796 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,676,321 UART: [rt]cmd =0x50435251, len=36
6,843,414 >>> mbox cmd response data (1848 bytes)
6,843,415 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,872,944 UART: [rt]cmd =0x50435245, len=56
6,876,766 >>> mbox cmd response data (8 bytes)
6,876,767 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,906,052 UART: [rt]cmd =0x44504543, len=20
6,926,819 >>> mbox cmd response data (44 bytes)
6,926,820 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,956,183 UART: [rt]cmd =0x44504543, len=24
6,982,239 >>> mbox cmd response data (40 bytes)
6,982,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,012,125 UART: [rt]cmd =0x44504543, len=96
7,049,955 >>> mbox cmd response data (56 bytes)
7,049,956 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,079,701 UART: [rt]cmd =0x44504543, len=92
7,307,841 >>> mbox cmd response data (6284 bytes)
7,307,842 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,337,851 UART: [rt]cmd =0x44504543, len=136
7,403,906 >>> mbox cmd response data (136 bytes)
7,403,907 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,433,676 UART: [rt]cmd =0x44504543, len=40
7,459,799 >>> mbox cmd response data (40 bytes)
7,459,800 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,489,251 UART: [rt]cmd =0x44504543, len=28
7,532,604 >>> mbox cmd response data (2076 bytes)
7,532,605 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,562,402 UART: [rt]cmd =0x44504543, len=36
7,592,851 >>> mbox cmd response data (24 bytes)
7,592,852 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,622,179 UART: [rt]cmd =0x4453424c, len=4
7,640,013 >>> mbox cmd response data (8 bytes)
7,640,014 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,669,601 UART: [rt]cmd =0x46505344, len=4
7,777,655 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,050 ready_for_fw is high
1,362,050 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,925,965 >>> mbox cmd response: success
2,925,965 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,055 UART:
2,988,071 UART: Running Caliptra FMC ...
2,988,479 UART:
2,988,622 UART: [state] CFI Enabled
2,999,297 UART: [fht] FMC Alias Private Key: 7
3,107,908 UART: [art] Extend RT PCRs Done
3,108,336 UART: [art] Lock RT PCRs Done
3,110,104 UART: [art] Populate DV Done
3,118,503 UART: [fht] FMC Alias Private Key: 7
3,119,453 UART: [art] Derive CDI
3,119,733 UART: [art] Store in in slot 0x4
3,205,412 UART: [art] Derive Key Pair
3,205,772 UART: [art] Store priv key in slot 0x5
3,219,248 UART: [art] Derive Key Pair - Done
3,234,294 UART: [art] Signing Cert with AUTHO
3,234,774 UART: RITY.KEYID = 7
3,250,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,251,059 UART: [art] PUB.X = 83B7435BC64FD03BB6E2B303ACBE64A936111BE2ECF6C379C8EF2C97D1B7A8455589D522EB89E318A5FAE0CFE8DC509F
3,257,846 UART: [art] PUB.Y = E8DF8DD48111F4D2877150A58C6A673DC75036998B5882EF4A1C6904A310A7F946A0CCC173F5DDF94F5A3B6F2D36D5ED
3,264,803 UART: [art] SIG.R = 9ADC41AE98CC1506A22E02BF8CBDC8530D94933B4D7BC8F96DE67F18F881159A87378EBC4536F168F7227277AC88D44F
3,271,572 UART: [art] SIG.S = FE24F677FFA6E91824AD79A66F652E2F2F9CFC0762E9682C816FA9DB132CF3213579E8EBF470B8D362C83D2C391FD6DC
3,295,046 UART: Caliptra RT
3,295,391 UART: [state] CFI Enabled
3,404,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,435,357 UART: [rt]cmd =0x46505652, len=4
3,436,017 UART: [rt] FIPS Version
3,437,078 >>> mbox cmd response data (36 bytes)
3,437,079 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,466,300 UART: [rt]cmd =0x46504c54, len=4
3,467,526 >>> mbox cmd response data (8 bytes)
3,467,527 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,497,402 UART: [rt]cmd =0x46504c67, len=4
3,498,354 >>> mbox cmd response: failed
3,498,694 UART: [rt] FIPS self test
3,499,025 UART: [kat] ++
3,499,177 UART: [kat] sha1
3,503,248 UART: [kat] SHA2-256
3,505,178 UART: [kat] SHA2-384
3,507,769 UART: [kat] SHA2-512-ACC
3,509,664 UART: [kat] ECC-384
3,519,671 UART: [kat] HMAC-384Kdf
3,524,242 UART: [kat] LMS
3,773,133 UART: [kat] --
5,882,946 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,888,115 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,917,255 UART: [rt]cmd =0x46504c67, len=4
5,918,442 >>> mbox cmd response data (8 bytes)
5,918,443 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,947,938 UART: [rt]cmd =0x49444543, len=4
5,954,400 >>> mbox cmd response data (37 bytes)
5,954,401 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,983,762 UART: [rt]cmd =0x49444549, len=4
5,986,135 >>> mbox cmd response data (104 bytes)
5,986,136 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,015,469 UART: [rt]cmd =0x49444550, len=4
6,025,635 >>> mbox cmd response data (8 bytes)
6,025,636 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,055,045 UART: [rt]cmd =0x4c444556, len=4
6,065,416 >>> mbox cmd response data (687 bytes)
6,065,417 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,094,700 UART: [rt]cmd =0x43455246, len=4
6,106,993 >>> mbox cmd response data (920 bytes)
6,106,994 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,136,265 UART: [rt]cmd =0x43455252, len=4
6,146,988 >>> mbox cmd response data (784 bytes)
6,146,989 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,177,752 UART: [rt]cmd =0x53494756, len=196
6,182,698 >>> mbox cmd response data (8 bytes)
6,182,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,212,582 UART: [rt]cmd =0x4d454153, len=108
6,233,771 >>> mbox cmd response data (12 bytes)
6,233,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,263,173 UART: [rt]cmd =0x494e464f, len=4
6,266,708 >>> mbox cmd response data (312 bytes)
6,266,709 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,296,132 UART: [rt]cmd =0x54514754, len=24
6,298,346 >>> mbox cmd response data (8 bytes)
6,298,347 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,327,756 UART: [rt]cmd =0x47544744, len=8
6,330,206 >>> mbox cmd response data (104 bytes)
6,330,207 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,359,342 UART: [rt]cmd =0x50435252, len=8
6,361,072 >>> mbox cmd response data (8 bytes)
6,361,073 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,390,602 UART: [rt]cmd =0x50435251, len=36
6,557,889 >>> mbox cmd response data (1848 bytes)
6,557,890 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,587,571 UART: [rt]cmd =0x50435245, len=56
6,591,227 >>> mbox cmd response data (8 bytes)
6,591,228 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,620,641 UART: [rt]cmd =0x44504543, len=20
6,641,698 >>> mbox cmd response data (44 bytes)
6,641,699 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,671,320 UART: [rt]cmd =0x44504543, len=24
6,697,948 >>> mbox cmd response data (40 bytes)
6,697,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,727,738 UART: [rt]cmd =0x44504543, len=96
6,764,420 >>> mbox cmd response data (56 bytes)
6,764,421 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,794,020 UART: [rt]cmd =0x44504543, len=92
7,022,097 >>> mbox cmd response data (6284 bytes)
7,022,098 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,052,499 UART: [rt]cmd =0x44504543, len=136
7,118,560 >>> mbox cmd response data (136 bytes)
7,118,561 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,148,142 UART: [rt]cmd =0x44504543, len=40
7,174,789 >>> mbox cmd response data (40 bytes)
7,174,790 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,204,463 UART: [rt]cmd =0x44504543, len=28
7,247,584 >>> mbox cmd response data (2076 bytes)
7,247,585 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,277,196 UART: [rt]cmd =0x44504543, len=36
7,306,835 >>> mbox cmd response data (24 bytes)
7,306,836 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,336,109 UART: [rt]cmd =0x4453424c, len=4
7,353,655 >>> mbox cmd response data (8 bytes)
7,353,656 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,383,175 UART: [rt]cmd =0x46505344, len=4
7,491,135 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
902,061 UART: [kat] SHA2-256
904,001 UART: [kat] SHA2-384
906,828 UART: [kat] SHA2-512-ACC
908,729 UART: [kat] ECC-384
918,126 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,789 UART: [fht] FHT @ 0x50003400
1,175,452 UART: [idev] ++
1,175,620 UART: [idev] CDI.KEYID = 6
1,175,980 UART: [idev] SUBJECT.KEYID = 7
1,176,404 UART: [idev] UDS.KEYID = 0
1,176,749 ready_for_fw is high
1,176,749 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,776 UART: [idev] Erasing UDS.KEYID = 0
1,201,267 UART: [idev] Sha1 KeyId Algorithm
1,209,813 UART: [idev] --
1,210,787 UART: [ldev] ++
1,210,955 UART: [ldev] CDI.KEYID = 6
1,211,318 UART: [ldev] SUBJECT.KEYID = 5
1,211,744 UART: [ldev] AUTHORITY.KEYID = 7
1,212,207 UART: [ldev] FE.KEYID = 1
1,217,031 UART: [ldev] Erasing FE.KEYID = 1
1,243,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,485 UART: [ldev] --
1,282,746 UART: [fwproc] Wait for Commands...
1,283,450 UART: [fwproc] Recv command 0x46574c44
1,284,178 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,098 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,402 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,967 >>> mbox cmd response: success
2,772,967 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,093 UART: [afmc] ++
2,774,261 UART: [afmc] CDI.KEYID = 6
2,774,623 UART: [afmc] SUBJECT.KEYID = 7
2,775,048 UART: [afmc] AUTHORITY.KEYID = 5
2,810,627 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,066 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,794 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,679 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,398 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,104 UART: [afmc] --
2,854,210 UART: [cold-reset] --
2,855,078 UART: [state] Locking Datavault
2,856,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,623 UART: [state] Locking ICCM
2,857,139 UART: [exit] Launching FMC @ 0x40000130
2,862,468 UART:
2,862,484 UART: Running Caliptra FMC ...
2,862,892 UART:
2,862,946 UART: [state] CFI Enabled
2,873,299 UART: [fht] FMC Alias Private Key: 7
2,981,412 UART: [art] Extend RT PCRs Done
2,981,840 UART: [art] Lock RT PCRs Done
2,983,650 UART: [art] Populate DV Done
2,991,827 UART: [fht] FMC Alias Private Key: 7
2,992,959 UART: [art] Derive CDI
2,993,239 UART: [art] Store in in slot 0x4
3,078,522 UART: [art] Derive Key Pair
3,078,882 UART: [art] Store priv key in slot 0x5
3,092,268 UART: [art] Derive Key Pair - Done
3,106,815 UART: [art] Signing Cert with AUTHO
3,107,295 UART: RITY.KEYID = 7
3,122,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,250 UART: [art] PUB.X = 59A75A0FB934180C0515E49397F04FEF7C94C301CA4B8D354FD053195B66D13B4129E07FD93C52901E20DF7BFF3CE0B9
3,130,014 UART: [art] PUB.Y = 11BF15BBD65D00E0590E8EAAB888B79D014AA3116FE2E8A0870009A823C73F268CBD903365B8ABCEF0AF70F6F2FBF591
3,136,927 UART: [art] SIG.R = 9F9288150598A8934BD2AE580B928B5973CED1AD73140FBF5834A7F95C998D19DA8B6C268B1984AB4A0738B52B064C72
3,143,682 UART: [art] SIG.S = 97CBA278D9C1988CFC2C2672956743B0F21C0360DBC7F8C2D21EC8099E04805A381D781E9103BF1295843CFF640F25B4
3,167,694 UART: Caliptra RT
3,167,947 UART: [state] CFI Enabled
3,275,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,987 UART: [rt]cmd =0x46505652, len=4
3,306,647 UART: [rt] FIPS Version
3,307,546 >>> mbox cmd response data (36 bytes)
3,307,547 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,336,876 UART: [rt]cmd =0x46504c54, len=4
3,337,904 >>> mbox cmd response data (8 bytes)
3,337,905 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,367,518 UART: [rt]cmd =0x46504c67, len=4
3,368,284 >>> mbox cmd response: failed
3,368,558 UART: [rt] FIPS self test
3,368,889 UART: [kat] ++
3,369,041 UART: [kat] sha1
3,373,096 UART: [kat] SHA2-256
3,375,026 UART: [kat] SHA2-384
3,377,745 UART: [kat] SHA2-512-ACC
3,379,640 UART: [kat] ECC-384
3,389,257 UART: [kat] HMAC-384Kdf
3,393,666 UART: [kat] LMS
3,642,557 UART: [kat] --
5,869,100 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,033 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,907,249 UART: [rt]cmd =0x46504c67, len=4
5,908,328 >>> mbox cmd response data (8 bytes)
5,908,329 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,937,740 UART: [rt]cmd =0x49444543, len=4
5,944,046 >>> mbox cmd response data (37 bytes)
5,944,047 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,973,428 UART: [rt]cmd =0x49444549, len=4
5,975,769 >>> mbox cmd response data (104 bytes)
5,975,770 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,005,101 UART: [rt]cmd =0x49444550, len=4
6,015,020 >>> mbox cmd response data (8 bytes)
6,015,021 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,044,394 UART: [rt]cmd =0x4c444556, len=4
6,054,893 >>> mbox cmd response data (687 bytes)
6,054,894 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,084,239 UART: [rt]cmd =0x43455246, len=4
6,096,274 >>> mbox cmd response data (887 bytes)
6,096,275 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,125,812 UART: [rt]cmd =0x43455252, len=4
6,136,619 >>> mbox cmd response data (784 bytes)
6,136,620 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,167,191 UART: [rt]cmd =0x53494756, len=196
6,172,499 >>> mbox cmd response data (8 bytes)
6,172,500 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,399 UART: [rt]cmd =0x4d454153, len=108
6,222,744 >>> mbox cmd response data (12 bytes)
6,222,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,252,284 UART: [rt]cmd =0x494e464f, len=4
6,255,881 >>> mbox cmd response data (312 bytes)
6,255,882 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,285,229 UART: [rt]cmd =0x54514754, len=24
6,287,483 >>> mbox cmd response data (8 bytes)
6,287,484 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,316,775 UART: [rt]cmd =0x47544744, len=8
6,319,123 >>> mbox cmd response data (104 bytes)
6,319,124 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,348,415 UART: [rt]cmd =0x50435252, len=8
6,349,887 >>> mbox cmd response data (8 bytes)
6,349,888 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,567 UART: [rt]cmd =0x50435251, len=36
6,546,840 >>> mbox cmd response data (1848 bytes)
6,546,841 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,576,636 UART: [rt]cmd =0x50435245, len=56
6,580,136 >>> mbox cmd response data (8 bytes)
6,580,137 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,609,624 UART: [rt]cmd =0x44504543, len=20
6,630,953 >>> mbox cmd response data (44 bytes)
6,630,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,660,431 UART: [rt]cmd =0x44504543, len=24
6,686,163 >>> mbox cmd response data (40 bytes)
6,686,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,716,079 UART: [rt]cmd =0x44504543, len=96
6,752,405 >>> mbox cmd response data (56 bytes)
6,752,406 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,782,371 UART: [rt]cmd =0x44504543, len=92
7,009,932 >>> mbox cmd response data (6284 bytes)
7,009,933 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,040,082 UART: [rt]cmd =0x44504543, len=136
7,106,719 >>> mbox cmd response data (136 bytes)
7,106,720 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,136,287 UART: [rt]cmd =0x44504543, len=40
7,162,214 >>> mbox cmd response data (40 bytes)
7,162,215 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,191,980 UART: [rt]cmd =0x44504543, len=28
7,235,401 >>> mbox cmd response data (2076 bytes)
7,235,402 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,264,987 UART: [rt]cmd =0x44504543, len=36
7,294,610 >>> mbox cmd response data (24 bytes)
7,294,611 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,323,994 UART: [rt]cmd =0x4453424c, len=4
7,340,894 >>> mbox cmd response data (8 bytes)
7,340,895 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,370,352 UART: [rt]cmd =0x46505344, len=4
7,478,856 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,983 ready_for_fw is high
1,059,983 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,034 >>> mbox cmd response: success
2,625,034 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,924 UART:
2,686,940 UART: Running Caliptra FMC ...
2,687,348 UART:
2,687,402 UART: [state] CFI Enabled
2,697,773 UART: [fht] FMC Alias Private Key: 7
2,805,666 UART: [art] Extend RT PCRs Done
2,806,094 UART: [art] Lock RT PCRs Done
2,807,836 UART: [art] Populate DV Done
2,815,871 UART: [fht] FMC Alias Private Key: 7
2,816,883 UART: [art] Derive CDI
2,817,163 UART: [art] Store in in slot 0x4
2,902,588 UART: [art] Derive Key Pair
2,902,948 UART: [art] Store priv key in slot 0x5
2,916,610 UART: [art] Derive Key Pair - Done
2,931,097 UART: [art] Signing Cert with AUTHO
2,931,577 UART: RITY.KEYID = 7
2,946,887 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,652 UART: [art] PUB.X = 6B6B7B79F8434FA69F982C82B61473EF412AB88369F702B7957818BEDE411AE40484B57FBE271D1AD1DF879FF58DE9BB
2,954,426 UART: [art] PUB.Y = 72D2375B3F86B6C87E1C548D83A5AB9E604F4CEBA2889862EE2C1EFFE6CC1A50F59FB0D7C9C22FEC963428E957D73585
2,961,390 UART: [art] SIG.R = FDD6D4D92C7EAA0B908FEC64D5F155FB43D38DBA863EA9B5D1617DA2BFB20AAE967B3126C8E91D710B7C552C4E320915
2,968,168 UART: [art] SIG.S = 4301FF050466CBDFDC88C4049E8513B24E1D2B8EDDB552A2D96582ED3DA76332EC4E751B3D160260E347DB30E13BD3BB
2,992,034 UART: Caliptra RT
2,992,287 UART: [state] CFI Enabled
3,098,772 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,129,180 UART: [rt]cmd =0x46505652, len=4
3,129,840 UART: [rt] FIPS Version
3,131,047 >>> mbox cmd response data (36 bytes)
3,131,048 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,160,299 UART: [rt]cmd =0x46504c54, len=4
3,161,441 >>> mbox cmd response data (8 bytes)
3,161,442 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,191,317 UART: [rt]cmd =0x46504c67, len=4
3,192,205 >>> mbox cmd response: failed
3,192,449 UART: [rt] FIPS self test
3,192,780 UART: [kat] ++
3,192,932 UART: [kat] sha1
3,197,095 UART: [kat] SHA2-256
3,199,025 UART: [kat] SHA2-384
3,201,860 UART: [kat] SHA2-512-ACC
3,203,755 UART: [kat] ECC-384
3,213,498 UART: [kat] HMAC-384Kdf
3,217,925 UART: [kat] LMS
3,466,816 UART: [kat] --
5,588,845 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,591,965 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,621,385 UART: [rt]cmd =0x46504c67, len=4
5,622,392 >>> mbox cmd response data (8 bytes)
5,622,393 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,651,656 UART: [rt]cmd =0x49444543, len=4
5,658,114 >>> mbox cmd response data (37 bytes)
5,658,115 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,687,672 UART: [rt]cmd =0x49444549, len=4
5,690,083 >>> mbox cmd response data (104 bytes)
5,690,084 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,719,389 UART: [rt]cmd =0x49444550, len=4
5,729,461 >>> mbox cmd response data (8 bytes)
5,729,462 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,758,795 UART: [rt]cmd =0x4c444556, len=4
5,769,174 >>> mbox cmd response data (687 bytes)
5,769,175 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,798,342 UART: [rt]cmd =0x43455246, len=4
5,810,533 >>> mbox cmd response data (887 bytes)
5,810,534 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,839,809 UART: [rt]cmd =0x43455252, len=4
5,850,791 >>> mbox cmd response data (783 bytes)
5,850,792 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,881,561 UART: [rt]cmd =0x53494756, len=196
5,886,969 >>> mbox cmd response data (8 bytes)
5,886,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,916,811 UART: [rt]cmd =0x4d454153, len=108
5,937,778 >>> mbox cmd response data (12 bytes)
5,937,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,967,280 UART: [rt]cmd =0x494e464f, len=4
5,970,865 >>> mbox cmd response data (312 bytes)
5,970,866 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,000,305 UART: [rt]cmd =0x54514754, len=24
6,002,629 >>> mbox cmd response data (8 bytes)
6,002,630 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,032,097 UART: [rt]cmd =0x47544744, len=8
6,034,851 >>> mbox cmd response data (104 bytes)
6,034,852 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,064,195 UART: [rt]cmd =0x50435252, len=8
6,065,935 >>> mbox cmd response data (8 bytes)
6,065,936 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,095,531 UART: [rt]cmd =0x50435251, len=36
6,262,908 >>> mbox cmd response data (1848 bytes)
6,262,909 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,292,392 UART: [rt]cmd =0x50435245, len=56
6,296,028 >>> mbox cmd response data (8 bytes)
6,296,029 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,325,616 UART: [rt]cmd =0x44504543, len=20
6,346,753 >>> mbox cmd response data (44 bytes)
6,346,754 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,376,341 UART: [rt]cmd =0x44504543, len=24
6,402,419 >>> mbox cmd response data (40 bytes)
6,402,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,432,511 UART: [rt]cmd =0x44504543, len=96
6,470,699 >>> mbox cmd response data (56 bytes)
6,470,700 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,500,489 UART: [rt]cmd =0x44504543, len=92
6,728,502 >>> mbox cmd response data (6284 bytes)
6,728,503 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,758,654 UART: [rt]cmd =0x44504543, len=136
6,825,409 >>> mbox cmd response data (136 bytes)
6,825,410 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,854,899 UART: [rt]cmd =0x44504543, len=40
6,880,838 >>> mbox cmd response data (40 bytes)
6,880,839 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,910,624 UART: [rt]cmd =0x44504543, len=28
6,954,165 >>> mbox cmd response data (2076 bytes)
6,954,166 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,983,687 UART: [rt]cmd =0x44504543, len=36
7,013,528 >>> mbox cmd response data (24 bytes)
7,013,529 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,856 UART: [rt]cmd =0x4453424c, len=4
7,059,766 >>> mbox cmd response data (8 bytes)
7,059,767 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,089,292 UART: [rt]cmd =0x46505344, len=4
7,197,586 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
893,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,860 UART: [kat] ++
898,012 UART: [kat] sha1
902,200 UART: [kat] SHA2-256
904,140 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,251 UART: [kat] HMAC-384Kdf
922,719 UART: [kat] LMS
1,171,047 UART: [kat] --
1,172,198 UART: [cold-reset] ++
1,172,592 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 ready_for_fw is high
1,176,530 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,381 UART: [idev] Erasing UDS.KEYID = 0
1,201,514 UART: [idev] Sha1 KeyId Algorithm
1,209,962 UART: [idev] --
1,210,858 UART: [ldev] ++
1,211,026 UART: [ldev] CDI.KEYID = 6
1,211,389 UART: [ldev] SUBJECT.KEYID = 5
1,211,815 UART: [ldev] AUTHORITY.KEYID = 7
1,212,278 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,244,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,110 UART: [ldev] --
1,283,565 UART: [fwproc] Wait for Commands...
1,284,265 UART: [fwproc] Recv command 0x46574c44
1,284,993 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,943 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,247 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,828 >>> mbox cmd response: success
2,773,828 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,004 UART: [afmc] ++
2,775,172 UART: [afmc] CDI.KEYID = 6
2,775,534 UART: [afmc] SUBJECT.KEYID = 7
2,775,959 UART: [afmc] AUTHORITY.KEYID = 5
2,811,666 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,828,613 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,341 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,226 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,945 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,605 UART: [afmc] --
2,854,647 UART: [cold-reset] --
2,855,641 UART: [state] Locking Datavault
2,856,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,146 UART: [state] Locking ICCM
2,857,578 UART: [exit] Launching FMC @ 0x40000130
2,862,907 UART:
2,862,923 UART: Running Caliptra FMC ...
2,863,331 UART:
2,863,474 UART: [state] CFI Enabled
2,873,713 UART: [fht] FMC Alias Private Key: 7
2,981,636 UART: [art] Extend RT PCRs Done
2,982,064 UART: [art] Lock RT PCRs Done
2,983,766 UART: [art] Populate DV Done
2,991,595 UART: [fht] FMC Alias Private Key: 7
2,992,587 UART: [art] Derive CDI
2,992,867 UART: [art] Store in in slot 0x4
3,078,642 UART: [art] Derive Key Pair
3,079,002 UART: [art] Store priv key in slot 0x5
3,092,366 UART: [art] Derive Key Pair - Done
3,107,016 UART: [art] Signing Cert with AUTHO
3,107,496 UART: RITY.KEYID = 7
3,123,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,955 UART: [art] PUB.X = 2E2057B3339E6AD3F2EFC2754635965C26A6A6255755DAE96486DBC9BE49A688AF312BC7005B4728A8A4565C7F4BB976
3,130,705 UART: [art] PUB.Y = 990F1D78F86461B8E8886A27A5836AD4693698BCE722A3F8AF4F7B1F61F8EF93D30DEFE10A07CBEA90EC2D4AF3908FCE
3,137,661 UART: [art] SIG.R = F5BD4DE349F9BE84EEF1C2933CF6B4E2E1DC2BE4E51740ABA0E98FF15D6D7938FE254FF5227C33609ED6DEA34630D436
3,144,451 UART: [art] SIG.S = 7BBE3D75ED2282C3A1A1B8A440DB171733E66C2358419BDAE239775BFC572D6E5A9EE134EA200B27FF44FF804181667A
3,168,455 UART: Caliptra RT
3,168,800 UART: [state] CFI Enabled
3,276,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,543 UART: [rt]cmd =0x46505652, len=4
3,307,203 UART: [rt] FIPS Version
3,308,340 >>> mbox cmd response data (36 bytes)
3,308,341 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,337,668 UART: [rt]cmd =0x46504c54, len=4
3,338,676 >>> mbox cmd response data (8 bytes)
3,338,677 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,368,418 UART: [rt]cmd =0x46504c67, len=4
3,369,280 >>> mbox cmd response: failed
3,369,502 UART: [rt] FIPS self test
3,369,833 UART: [kat] ++
3,369,985 UART: [kat] sha1
3,374,210 UART: [kat] SHA2-256
3,376,140 UART: [kat] SHA2-384
3,378,961 UART: [kat] SHA2-512-ACC
3,380,856 UART: [kat] ECC-384
3,390,635 UART: [kat] HMAC-384Kdf
3,395,126 UART: [kat] LMS
3,644,017 UART: [kat] --
5,870,700 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,029 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,908,561 UART: [rt]cmd =0x46504c67, len=4
5,909,598 >>> mbox cmd response data (8 bytes)
5,909,599 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,938,972 UART: [rt]cmd =0x49444543, len=4
5,945,588 >>> mbox cmd response data (37 bytes)
5,945,589 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,098 UART: [rt]cmd =0x49444549, len=4
5,977,373 >>> mbox cmd response data (104 bytes)
5,977,374 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,006,745 UART: [rt]cmd =0x49444550, len=4
6,016,941 >>> mbox cmd response data (8 bytes)
6,016,942 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,046,207 UART: [rt]cmd =0x4c444556, len=4
6,056,512 >>> mbox cmd response data (687 bytes)
6,056,513 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,086,130 UART: [rt]cmd =0x43455246, len=4
6,098,295 >>> mbox cmd response data (887 bytes)
6,098,296 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,621 UART: [rt]cmd =0x43455252, len=4
6,138,325 >>> mbox cmd response data (783 bytes)
6,138,326 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,159 UART: [rt]cmd =0x53494756, len=196
6,174,701 >>> mbox cmd response data (8 bytes)
6,174,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,463 UART: [rt]cmd =0x4d454153, len=108
6,225,400 >>> mbox cmd response data (12 bytes)
6,225,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,254,634 UART: [rt]cmd =0x494e464f, len=4
6,258,349 >>> mbox cmd response data (312 bytes)
6,258,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,287,701 UART: [rt]cmd =0x54514754, len=24
6,289,917 >>> mbox cmd response data (8 bytes)
6,289,918 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,319,109 UART: [rt]cmd =0x47544744, len=8
6,321,533 >>> mbox cmd response data (104 bytes)
6,321,534 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,350,867 UART: [rt]cmd =0x50435252, len=8
6,352,535 >>> mbox cmd response data (8 bytes)
6,352,536 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,381,919 UART: [rt]cmd =0x50435251, len=36
6,549,010 >>> mbox cmd response data (1848 bytes)
6,549,011 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,578,480 UART: [rt]cmd =0x50435245, len=56
6,582,272 >>> mbox cmd response data (8 bytes)
6,582,273 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,611,814 UART: [rt]cmd =0x44504543, len=20
6,632,605 >>> mbox cmd response data (44 bytes)
6,632,606 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,662,207 UART: [rt]cmd =0x44504543, len=24
6,688,121 >>> mbox cmd response data (40 bytes)
6,688,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,718,175 UART: [rt]cmd =0x44504543, len=96
6,755,243 >>> mbox cmd response data (56 bytes)
6,755,244 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,785,185 UART: [rt]cmd =0x44504543, len=92
7,012,406 >>> mbox cmd response data (6284 bytes)
7,012,407 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,594 UART: [rt]cmd =0x44504543, len=136
7,108,639 >>> mbox cmd response data (136 bytes)
7,108,640 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,138,355 UART: [rt]cmd =0x44504543, len=40
7,164,762 >>> mbox cmd response data (40 bytes)
7,164,763 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,194,384 UART: [rt]cmd =0x44504543, len=28
7,237,853 >>> mbox cmd response data (2076 bytes)
7,237,854 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,267,591 UART: [rt]cmd =0x44504543, len=36
7,297,714 >>> mbox cmd response data (24 bytes)
7,297,715 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,327,078 UART: [rt]cmd =0x4453424c, len=4
7,344,172 >>> mbox cmd response data (8 bytes)
7,344,173 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,373,580 UART: [rt]cmd =0x46505344, len=4
7,481,738 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,942 ready_for_fw is high
1,060,942 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,624,499 >>> mbox cmd response: success
2,624,499 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,686,541 UART:
2,686,557 UART: Running Caliptra FMC ...
2,686,965 UART:
2,687,108 UART: [state] CFI Enabled
2,697,851 UART: [fht] FMC Alias Private Key: 7
2,805,834 UART: [art] Extend RT PCRs Done
2,806,262 UART: [art] Lock RT PCRs Done
2,807,736 UART: [art] Populate DV Done
2,815,977 UART: [fht] FMC Alias Private Key: 7
2,817,033 UART: [art] Derive CDI
2,817,313 UART: [art] Store in in slot 0x4
2,902,898 UART: [art] Derive Key Pair
2,903,258 UART: [art] Store priv key in slot 0x5
2,916,698 UART: [art] Derive Key Pair - Done
2,931,343 UART: [art] Signing Cert with AUTHO
2,931,823 UART: RITY.KEYID = 7
2,947,097 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,862 UART: [art] PUB.X = 339A2AAA8AED0366FF912C60AE07611A742074FFDD1A1ED17F9CEB24D534AE15110A01F0A0D63A384DD45CA0288794FE
2,954,634 UART: [art] PUB.Y = 925CD6805A9D269A2FB2958AFF194D630495863F3072387A5046783AECC80D24220C75B5EF94261E24C86FB1613DE446
2,961,569 UART: [art] SIG.R = 16E03E54594719A5C32B7086063D8D2A8D888286A1E49347A64720ACC4BF8FCE30117104B7742E73FC9ACB50ECBB70C0
2,968,335 UART: [art] SIG.S = 18CA4FEC5E4E483A1ECC43E7D41E7833563739EBD1E1BD1EB11464BDFC1CE66AF5272057013B4E72AE9CDF61CD1892B7
2,991,783 UART: Caliptra RT
2,992,128 UART: [state] CFI Enabled
3,100,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,185 UART: [rt]cmd =0x46505652, len=4
3,131,845 UART: [rt] FIPS Version
3,133,080 >>> mbox cmd response data (36 bytes)
3,133,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,162,458 UART: [rt]cmd =0x46504c54, len=4
3,163,418 >>> mbox cmd response data (8 bytes)
3,163,419 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,193,398 UART: [rt]cmd =0x46504c67, len=4
3,194,258 >>> mbox cmd response: failed
3,194,532 UART: [rt] FIPS self test
3,194,863 UART: [kat] ++
3,195,015 UART: [kat] sha1
3,199,172 UART: [kat] SHA2-256
3,201,102 UART: [kat] SHA2-384
3,203,959 UART: [kat] SHA2-512-ACC
3,205,854 UART: [kat] ECC-384
3,215,749 UART: [kat] HMAC-384Kdf
3,220,210 UART: [kat] LMS
3,469,101 UART: [kat] --
5,591,120 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,594,018 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,623,404 UART: [rt]cmd =0x46504c67, len=4
5,624,635 >>> mbox cmd response data (8 bytes)
5,624,636 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,654,055 UART: [rt]cmd =0x49444543, len=4
5,660,463 >>> mbox cmd response data (37 bytes)
5,660,464 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,689,839 UART: [rt]cmd =0x49444549, len=4
5,692,122 >>> mbox cmd response data (104 bytes)
5,692,123 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,721,584 UART: [rt]cmd =0x49444550, len=4
5,731,814 >>> mbox cmd response data (8 bytes)
5,731,815 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,761,106 UART: [rt]cmd =0x4c444556, len=4
5,771,567 >>> mbox cmd response data (687 bytes)
5,771,568 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,800,839 UART: [rt]cmd =0x43455246, len=4
5,813,012 >>> mbox cmd response data (887 bytes)
5,813,013 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,842,556 UART: [rt]cmd =0x43455252, len=4
5,853,386 >>> mbox cmd response data (782 bytes)
5,853,387 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,124 UART: [rt]cmd =0x53494756, len=196
5,889,460 >>> mbox cmd response data (8 bytes)
5,889,461 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,919,416 UART: [rt]cmd =0x4d454153, len=108
5,940,759 >>> mbox cmd response data (12 bytes)
5,940,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,969,997 UART: [rt]cmd =0x494e464f, len=4
5,973,794 >>> mbox cmd response data (312 bytes)
5,973,795 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,003,360 UART: [rt]cmd =0x54514754, len=24
6,005,498 >>> mbox cmd response data (8 bytes)
6,005,499 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,034,650 UART: [rt]cmd =0x47544744, len=8
6,037,028 >>> mbox cmd response data (104 bytes)
6,037,029 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,066,434 UART: [rt]cmd =0x50435252, len=8
6,068,180 >>> mbox cmd response data (8 bytes)
6,068,181 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,097,822 UART: [rt]cmd =0x50435251, len=36
6,265,225 >>> mbox cmd response data (1848 bytes)
6,265,226 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,295,205 UART: [rt]cmd =0x50435245, len=56
6,298,629 >>> mbox cmd response data (8 bytes)
6,298,630 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,328,005 UART: [rt]cmd =0x44504543, len=20
6,349,100 >>> mbox cmd response data (44 bytes)
6,349,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,378,436 UART: [rt]cmd =0x44504543, len=24
6,405,216 >>> mbox cmd response data (40 bytes)
6,405,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,435,234 UART: [rt]cmd =0x44504543, len=96
6,472,324 >>> mbox cmd response data (56 bytes)
6,472,325 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,502,204 UART: [rt]cmd =0x44504543, len=92
6,729,454 >>> mbox cmd response data (6284 bytes)
6,729,455 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,759,842 UART: [rt]cmd =0x44504543, len=136
6,827,449 >>> mbox cmd response data (136 bytes)
6,827,450 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,857,133 UART: [rt]cmd =0x44504543, len=40
6,883,424 >>> mbox cmd response data (40 bytes)
6,883,425 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,913,182 UART: [rt]cmd =0x44504543, len=28
6,956,469 >>> mbox cmd response data (2076 bytes)
6,956,470 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,985,839 UART: [rt]cmd =0x44504543, len=36
7,015,940 >>> mbox cmd response data (24 bytes)
7,015,941 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,045,072 UART: [rt]cmd =0x4453424c, len=4
7,062,512 >>> mbox cmd response data (8 bytes)
7,062,513 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,091,660 UART: [rt]cmd =0x46505344, len=4
7,199,734 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,905 UART: [kat] SHA2-256
901,845 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
920,980 UART: [kat] LMS
1,169,292 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,135 UART: [idev] ++
1,173,303 UART: [idev] CDI.KEYID = 6
1,173,664 UART: [idev] SUBJECT.KEYID = 7
1,174,089 UART: [idev] UDS.KEYID = 0
1,174,435 ready_for_fw is high
1,174,435 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,199,349 UART: [idev] Sha1 KeyId Algorithm
1,208,325 UART: [idev] --
1,209,510 UART: [ldev] ++
1,209,678 UART: [ldev] CDI.KEYID = 6
1,210,042 UART: [ldev] SUBJECT.KEYID = 5
1,210,469 UART: [ldev] AUTHORITY.KEYID = 7
1,210,932 UART: [ldev] FE.KEYID = 1
1,216,160 UART: [ldev] Erasing FE.KEYID = 1
1,242,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,634 UART: [ldev] --
1,282,064 UART: [fwproc] Wait for Commands...
1,282,829 UART: [fwproc] Recv command 0x46574c44
1,283,562 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,268 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,577 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,193 >>> mbox cmd response: success
2,772,193 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,438 UART: [afmc] ++
2,773,606 UART: [afmc] CDI.KEYID = 6
2,773,969 UART: [afmc] SUBJECT.KEYID = 7
2,774,395 UART: [afmc] AUTHORITY.KEYID = 5
2,810,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,073 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,802 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,685 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,404 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,219 UART: [afmc] --
2,853,239 UART: [cold-reset] --
2,854,113 UART: [state] Locking Datavault
2,855,232 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,836 UART: [state] Locking ICCM
2,856,334 UART: [exit] Launching FMC @ 0x40000130
2,861,663 UART:
2,861,679 UART: Running Caliptra FMC ...
2,862,087 UART:
2,862,141 UART: [state] CFI Enabled
2,872,554 UART: [fht] FMC Alias Private Key: 7
2,980,967 UART: [art] Extend RT PCRs Done
2,981,395 UART: [art] Lock RT PCRs Done
2,982,601 UART: [art] Populate DV Done
2,990,566 UART: [fht] FMC Alias Private Key: 7
2,991,684 UART: [art] Derive CDI
2,991,964 UART: [art] Store in in slot 0x4
3,077,625 UART: [art] Derive Key Pair
3,077,985 UART: [art] Store priv key in slot 0x5
3,090,951 UART: [art] Derive Key Pair - Done
3,105,780 UART: [art] Signing Cert with AUTHO
3,106,260 UART: RITY.KEYID = 7
3,121,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,401 UART: [art] PUB.X = 0528D99319A3916FB6B354DF1E3E19FE0E2BA1CEB1641E870215D4442E0052A7CCC0B5A27DF5F6BF708CE59DA3902E5A
3,129,152 UART: [art] PUB.Y = 41B53EC49072363A6569EA69E47393A6566A8C1BF71C2EF824CAAE32E08D3E37A21D659777549128BFDB78097827E488
3,136,095 UART: [art] SIG.R = C35824B0C5BB505FB3B242FA69C68508EB0D41195A6A0149C393AA9E7318B8A7DE79864434B04604E3925AEB1EC102BD
3,142,854 UART: [art] SIG.S = 5FE795C6689C1AD6A622881CDFBF1B8D03D4CDCBA6D909F615F332A49B58AD8FB84A0B9300BF5882A474E7D4C1DB3025
3,166,348 UART: Caliptra RT
3,166,601 UART: [state] CFI Enabled
3,273,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,512 UART: [rt]cmd =0x46505652, len=4
3,305,172 UART: [rt] FIPS Version
3,306,359 >>> mbox cmd response data (36 bytes)
3,306,360 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,335,871 UART: [rt]cmd =0x46504c54, len=4
3,336,991 >>> mbox cmd response data (8 bytes)
3,336,992 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,366,597 UART: [rt]cmd =0x46504c67, len=4
3,367,459 >>> mbox cmd response: failed
3,367,729 UART: [rt] FIPS self test
3,368,060 UART: [kat] ++
3,368,212 UART: [kat] sha1
3,372,211 UART: [kat] SHA2-256
3,374,141 UART: [kat] SHA2-384
3,376,716 UART: [kat] SHA2-512-ACC
3,378,611 UART: [kat] ECC-384
3,388,684 UART: [kat] HMAC-384Kdf
3,393,023 UART: [kat] LMS
3,641,914 UART: [kat] --
5,866,553 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,877,208 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,906,412 UART: [rt]cmd =0x46504c67, len=4
5,907,405 >>> mbox cmd response data (8 bytes)
5,907,406 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,936,873 UART: [rt]cmd =0x49444543, len=4
5,943,481 >>> mbox cmd response data (37 bytes)
5,943,482 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,972,753 UART: [rt]cmd =0x49444549, len=4
5,975,286 >>> mbox cmd response data (104 bytes)
5,975,287 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,004,782 UART: [rt]cmd =0x49444550, len=4
6,014,958 >>> mbox cmd response data (8 bytes)
6,014,959 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,044,256 UART: [rt]cmd =0x4c444556, len=4
6,054,641 >>> mbox cmd response data (687 bytes)
6,054,642 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,084,175 UART: [rt]cmd =0x43455246, len=4
6,096,266 >>> mbox cmd response data (887 bytes)
6,096,267 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,125,516 UART: [rt]cmd =0x43455252, len=4
6,136,260 >>> mbox cmd response data (783 bytes)
6,136,261 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,166,926 UART: [rt]cmd =0x53494756, len=196
6,172,648 >>> mbox cmd response data (8 bytes)
6,172,649 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,202,514 UART: [rt]cmd =0x4d454153, len=108
6,222,915 >>> mbox cmd response data (12 bytes)
6,222,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,252,081 UART: [rt]cmd =0x494e464f, len=4
6,255,718 >>> mbox cmd response data (312 bytes)
6,255,719 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,285,040 UART: [rt]cmd =0x54514754, len=24
6,287,366 >>> mbox cmd response data (8 bytes)
6,287,367 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,316,682 UART: [rt]cmd =0x47544744, len=8
6,319,404 >>> mbox cmd response data (104 bytes)
6,319,405 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,348,982 UART: [rt]cmd =0x50435252, len=8
6,350,320 >>> mbox cmd response data (8 bytes)
6,350,321 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,379,890 UART: [rt]cmd =0x50435251, len=36
6,546,983 >>> mbox cmd response data (1848 bytes)
6,546,984 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,576,617 UART: [rt]cmd =0x50435245, len=56
6,580,235 >>> mbox cmd response data (8 bytes)
6,580,236 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,609,815 UART: [rt]cmd =0x44504543, len=20
6,630,634 >>> mbox cmd response data (44 bytes)
6,630,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,659,984 UART: [rt]cmd =0x44504543, len=24
6,686,322 >>> mbox cmd response data (40 bytes)
6,686,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,716,248 UART: [rt]cmd =0x44504543, len=96
6,753,330 >>> mbox cmd response data (56 bytes)
6,753,331 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,783,438 UART: [rt]cmd =0x44504543, len=92
7,011,944 >>> mbox cmd response data (6284 bytes)
7,011,945 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,042,090 UART: [rt]cmd =0x44504543, len=136
7,108,589 >>> mbox cmd response data (136 bytes)
7,108,590 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,138,085 UART: [rt]cmd =0x44504543, len=40
7,164,002 >>> mbox cmd response data (40 bytes)
7,164,003 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,193,548 UART: [rt]cmd =0x44504543, len=28
7,236,427 >>> mbox cmd response data (2076 bytes)
7,236,428 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,265,861 UART: [rt]cmd =0x44504543, len=36
7,295,774 >>> mbox cmd response data (24 bytes)
7,295,775 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,325,108 UART: [rt]cmd =0x4453424c, len=4
7,342,332 >>> mbox cmd response data (8 bytes)
7,342,333 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,371,750 UART: [rt]cmd =0x46505344, len=4
7,480,178 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,446 ready_for_fw is high
1,055,446 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,617,911 >>> mbox cmd response: success
2,617,911 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,680,129 UART:
2,680,145 UART: Running Caliptra FMC ...
2,680,553 UART:
2,680,607 UART: [state] CFI Enabled
2,690,956 UART: [fht] FMC Alias Private Key: 7
2,798,415 UART: [art] Extend RT PCRs Done
2,798,843 UART: [art] Lock RT PCRs Done
2,800,451 UART: [art] Populate DV Done
2,808,600 UART: [fht] FMC Alias Private Key: 7
2,809,740 UART: [art] Derive CDI
2,810,020 UART: [art] Store in in slot 0x4
2,895,933 UART: [art] Derive Key Pair
2,896,293 UART: [art] Store priv key in slot 0x5
2,909,831 UART: [art] Derive Key Pair - Done
2,924,821 UART: [art] Signing Cert with AUTHO
2,925,301 UART: RITY.KEYID = 7
2,940,693 UART: [art] Erasing AUTHORITY.KEYID = 7
2,941,458 UART: [art] PUB.X = B41471ED35E46400282E29F0C0C035C0EDDB8794DAF8CCB5CAC8DAA1943496F6EF52A8204A5E6F75C620785DFD08484B
2,948,215 UART: [art] PUB.Y = D304E1E2CF3E71EBA44D0DCFEB9BF4A9F61EC1D955B3D9030D4EE417383CCD4ABC966AC8610147209FD54768D863E10B
2,955,165 UART: [art] SIG.R = 2CED19B5D126755ED765B04FA550DD4C2F6D821B7023A25DD3FF1BA81034C4E1F4C3B497D67771718E1E753073350C38
2,961,934 UART: [art] SIG.S = B3C41B3BAECC24E71AFB7B7A26710A9E262254FAF8125905E0B6D44788FCBAE96B58D0CB5454AB759586E8B9AC243FCE
2,985,825 UART: Caliptra RT
2,986,078 UART: [state] CFI Enabled
3,094,515 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,819 UART: [rt]cmd =0x46505652, len=4
3,125,479 UART: [rt] FIPS Version
3,126,512 >>> mbox cmd response data (36 bytes)
3,126,513 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,155,714 UART: [rt]cmd =0x46504c54, len=4
3,156,926 >>> mbox cmd response data (8 bytes)
3,156,927 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,186,478 UART: [rt]cmd =0x46504c67, len=4
3,187,244 >>> mbox cmd response: failed
3,187,524 UART: [rt] FIPS self test
3,187,855 UART: [kat] ++
3,188,007 UART: [kat] sha1
3,192,296 UART: [kat] SHA2-256
3,194,226 UART: [kat] SHA2-384
3,196,873 UART: [kat] SHA2-512-ACC
3,198,768 UART: [kat] ECC-384
3,208,371 UART: [kat] HMAC-384Kdf
3,212,800 UART: [kat] LMS
3,461,691 UART: [kat] --
5,579,052 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,587,004 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,616,328 UART: [rt]cmd =0x46504c67, len=4
5,617,495 >>> mbox cmd response data (8 bytes)
5,617,496 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,646,853 UART: [rt]cmd =0x49444543, len=4
5,653,319 >>> mbox cmd response data (37 bytes)
5,653,320 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,682,593 UART: [rt]cmd =0x49444549, len=4
5,684,802 >>> mbox cmd response data (104 bytes)
5,684,803 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,714,116 UART: [rt]cmd =0x49444550, len=4
5,724,102 >>> mbox cmd response data (8 bytes)
5,724,103 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,753,406 UART: [rt]cmd =0x4c444556, len=4
5,763,941 >>> mbox cmd response data (687 bytes)
5,763,942 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,793,521 UART: [rt]cmd =0x43455246, len=4
5,805,706 >>> mbox cmd response data (887 bytes)
5,805,707 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,835,138 UART: [rt]cmd =0x43455252, len=4
5,846,090 >>> mbox cmd response data (783 bytes)
5,846,091 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,876,788 UART: [rt]cmd =0x53494756, len=196
5,882,394 >>> mbox cmd response data (8 bytes)
5,882,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,912,374 UART: [rt]cmd =0x4d454153, len=108
5,933,555 >>> mbox cmd response data (12 bytes)
5,933,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,963,083 UART: [rt]cmd =0x494e464f, len=4
5,966,884 >>> mbox cmd response data (312 bytes)
5,966,885 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,996,400 UART: [rt]cmd =0x54514754, len=24
5,998,468 >>> mbox cmd response data (8 bytes)
5,998,469 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,027,998 UART: [rt]cmd =0x47544744, len=8
6,030,650 >>> mbox cmd response data (104 bytes)
6,030,651 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,059,894 UART: [rt]cmd =0x50435252, len=8
6,061,594 >>> mbox cmd response data (8 bytes)
6,061,595 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,090,986 UART: [rt]cmd =0x50435251, len=36
6,258,557 >>> mbox cmd response data (1848 bytes)
6,258,558 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,288,271 UART: [rt]cmd =0x50435245, len=56
6,291,975 >>> mbox cmd response data (8 bytes)
6,291,976 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,321,415 UART: [rt]cmd =0x44504543, len=20
6,342,266 >>> mbox cmd response data (44 bytes)
6,342,267 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,371,698 UART: [rt]cmd =0x44504543, len=24
6,398,128 >>> mbox cmd response data (40 bytes)
6,398,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,428,058 UART: [rt]cmd =0x44504543, len=96
6,465,416 >>> mbox cmd response data (56 bytes)
6,465,417 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,495,274 UART: [rt]cmd =0x44504543, len=92
6,722,258 >>> mbox cmd response data (6284 bytes)
6,722,259 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,752,460 UART: [rt]cmd =0x44504543, len=136
6,818,473 >>> mbox cmd response data (136 bytes)
6,818,474 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,848,113 UART: [rt]cmd =0x44504543, len=40
6,874,206 >>> mbox cmd response data (40 bytes)
6,874,207 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,903,736 UART: [rt]cmd =0x44504543, len=28
6,947,365 >>> mbox cmd response data (2076 bytes)
6,947,366 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,976,907 UART: [rt]cmd =0x44504543, len=36
7,007,088 >>> mbox cmd response data (24 bytes)
7,007,089 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,036,666 UART: [rt]cmd =0x4453424c, len=4
7,053,128 >>> mbox cmd response data (8 bytes)
7,053,129 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,082,306 UART: [rt]cmd =0x46505344, len=4
7,190,682 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,989 UART: [state] LifecycleState = Unprovisioned
86,644 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,497 UART: [kat] SHA2-256
892,047 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
896,176 UART: [kat] ++
896,328 UART: [kat] sha1
900,628 UART: [kat] SHA2-256
902,568 UART: [kat] SHA2-384
905,275 UART: [kat] SHA2-512-ACC
907,176 UART: [kat] ECC-384
916,959 UART: [kat] HMAC-384Kdf
921,559 UART: [kat] LMS
1,169,871 UART: [kat] --
1,170,892 UART: [cold-reset] ++
1,171,262 UART: [fht] FHT @ 0x50003400
1,173,942 UART: [idev] ++
1,174,110 UART: [idev] CDI.KEYID = 6
1,174,471 UART: [idev] SUBJECT.KEYID = 7
1,174,896 UART: [idev] UDS.KEYID = 0
1,175,242 ready_for_fw is high
1,175,242 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,270 UART: [idev] Erasing UDS.KEYID = 0
1,200,898 UART: [idev] Sha1 KeyId Algorithm
1,209,700 UART: [idev] --
1,210,873 UART: [ldev] ++
1,211,041 UART: [ldev] CDI.KEYID = 6
1,211,405 UART: [ldev] SUBJECT.KEYID = 5
1,211,832 UART: [ldev] AUTHORITY.KEYID = 7
1,212,295 UART: [ldev] FE.KEYID = 1
1,217,311 UART: [ldev] Erasing FE.KEYID = 1
1,243,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,561 UART: [ldev] --
1,282,933 UART: [fwproc] Wait for Commands...
1,283,640 UART: [fwproc] Recv command 0x46574c44
1,284,373 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,753 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,062 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,532 >>> mbox cmd response: success
2,772,532 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,553 UART: [afmc] ++
2,773,721 UART: [afmc] CDI.KEYID = 6
2,774,084 UART: [afmc] SUBJECT.KEYID = 7
2,774,510 UART: [afmc] AUTHORITY.KEYID = 5
2,810,187 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,596 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,325 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,208 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,927 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,608 UART: [afmc] --
2,853,594 UART: [cold-reset] --
2,854,492 UART: [state] Locking Datavault
2,855,731 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,335 UART: [state] Locking ICCM
2,856,973 UART: [exit] Launching FMC @ 0x40000130
2,862,302 UART:
2,862,318 UART: Running Caliptra FMC ...
2,862,726 UART:
2,862,869 UART: [state] CFI Enabled
2,873,514 UART: [fht] FMC Alias Private Key: 7
2,981,767 UART: [art] Extend RT PCRs Done
2,982,195 UART: [art] Lock RT PCRs Done
2,983,941 UART: [art] Populate DV Done
2,992,038 UART: [fht] FMC Alias Private Key: 7
2,992,976 UART: [art] Derive CDI
2,993,256 UART: [art] Store in in slot 0x4
3,078,929 UART: [art] Derive Key Pair
3,079,289 UART: [art] Store priv key in slot 0x5
3,092,441 UART: [art] Derive Key Pair - Done
3,107,446 UART: [art] Signing Cert with AUTHO
3,107,926 UART: RITY.KEYID = 7
3,123,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,795 UART: [art] PUB.X = 15124D5E88AF0A7721E7F3C7DDE0FE8B62E2E201E7EDA9B11B0EAEB27F26B93A5D8D7C485EEAC899005F36F231C17747
3,130,550 UART: [art] PUB.Y = 955105E147BA73B214FD4385C0C097D8A4D4B16CC2833189257E1E350B0EB8D080DF579B0B200EB98852811F5E189702
3,137,476 UART: [art] SIG.R = 4EE540E3E17B8E42BFE469924E145FD95C646422E020739C637319033976C9195320CB60AC86B7E4950FF0B670EE27AF
3,144,236 UART: [art] SIG.S = 5F2072B8CD3F81C035CEB4710C5C4F342B3D395B95F27283BABEB89748088BE28542C6239CF0EFB724F0CBE441B4AA55
3,168,199 UART: Caliptra RT
3,168,544 UART: [state] CFI Enabled
3,277,003 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,045 UART: [rt]cmd =0x46505652, len=4
3,307,705 UART: [rt] FIPS Version
3,308,748 >>> mbox cmd response data (36 bytes)
3,308,749 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,338,316 UART: [rt]cmd =0x46504c54, len=4
3,339,442 >>> mbox cmd response data (8 bytes)
3,339,443 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,368,886 UART: [rt]cmd =0x46504c67, len=4
3,370,012 >>> mbox cmd response: failed
3,370,274 UART: [rt] FIPS self test
3,370,605 UART: [kat] ++
3,370,757 UART: [kat] sha1
3,375,036 UART: [kat] SHA2-256
3,376,966 UART: [kat] SHA2-384
3,379,849 UART: [kat] SHA2-512-ACC
3,381,744 UART: [kat] ECC-384
3,392,009 UART: [kat] HMAC-384Kdf
3,396,654 UART: [kat] LMS
3,645,545 UART: [kat] --
5,869,808 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,879,761 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,908,917 UART: [rt]cmd =0x46504c67, len=4
5,910,248 >>> mbox cmd response data (8 bytes)
5,910,249 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,939,434 UART: [rt]cmd =0x49444543, len=4
5,945,970 >>> mbox cmd response data (37 bytes)
5,945,971 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,975,282 UART: [rt]cmd =0x49444549, len=4
5,977,597 >>> mbox cmd response data (104 bytes)
5,977,598 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,007,085 UART: [rt]cmd =0x49444550, len=4
6,017,059 >>> mbox cmd response data (8 bytes)
6,017,060 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,046,461 UART: [rt]cmd =0x4c444556, len=4
6,057,092 >>> mbox cmd response data (687 bytes)
6,057,093 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,086,112 UART: [rt]cmd =0x43455246, len=4
6,098,227 >>> mbox cmd response data (887 bytes)
6,098,228 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,127,475 UART: [rt]cmd =0x43455252, len=4
6,138,381 >>> mbox cmd response data (782 bytes)
6,138,382 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,169,191 UART: [rt]cmd =0x53494756, len=196
6,174,501 >>> mbox cmd response data (8 bytes)
6,174,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,204,655 UART: [rt]cmd =0x4d454153, len=108
6,225,210 >>> mbox cmd response data (12 bytes)
6,225,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,254,556 UART: [rt]cmd =0x494e464f, len=4
6,258,187 >>> mbox cmd response data (312 bytes)
6,258,188 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,287,919 UART: [rt]cmd =0x54514754, len=24
6,290,077 >>> mbox cmd response data (8 bytes)
6,290,078 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,319,423 UART: [rt]cmd =0x47544744, len=8
6,322,011 >>> mbox cmd response data (104 bytes)
6,322,012 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,351,423 UART: [rt]cmd =0x50435252, len=8
6,352,823 >>> mbox cmd response data (8 bytes)
6,352,824 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,382,385 UART: [rt]cmd =0x50435251, len=36
6,549,630 >>> mbox cmd response data (1848 bytes)
6,549,631 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,579,214 UART: [rt]cmd =0x50435245, len=56
6,582,784 >>> mbox cmd response data (8 bytes)
6,582,785 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,612,132 UART: [rt]cmd =0x44504543, len=20
6,632,663 >>> mbox cmd response data (44 bytes)
6,632,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,662,363 UART: [rt]cmd =0x44504543, len=24
6,688,363 >>> mbox cmd response data (40 bytes)
6,688,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,718,067 UART: [rt]cmd =0x44504543, len=96
6,754,823 >>> mbox cmd response data (56 bytes)
6,754,824 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,784,871 UART: [rt]cmd =0x44504543, len=92
7,014,216 >>> mbox cmd response data (6284 bytes)
7,014,217 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,044,524 UART: [rt]cmd =0x44504543, len=136
7,112,029 >>> mbox cmd response data (136 bytes)
7,112,030 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,141,825 UART: [rt]cmd =0x44504543, len=40
7,168,130 >>> mbox cmd response data (40 bytes)
7,168,131 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,197,922 UART: [rt]cmd =0x44504543, len=28
7,240,909 >>> mbox cmd response data (2076 bytes)
7,240,910 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,270,365 UART: [rt]cmd =0x44504543, len=36
7,300,638 >>> mbox cmd response data (24 bytes)
7,300,639 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,330,082 UART: [rt]cmd =0x4453424c, len=4
7,347,566 >>> mbox cmd response data (8 bytes)
7,347,567 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,376,790 UART: [rt]cmd =0x46505344, len=4
7,485,210 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,807 ready_for_fw is high
1,055,807 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,619,496 >>> mbox cmd response: success
2,619,496 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,681,564 UART:
2,681,580 UART: Running Caliptra FMC ...
2,681,988 UART:
2,682,131 UART: [state] CFI Enabled
2,692,808 UART: [fht] FMC Alias Private Key: 7
2,800,329 UART: [art] Extend RT PCRs Done
2,800,757 UART: [art] Lock RT PCRs Done
2,802,559 UART: [art] Populate DV Done
2,810,924 UART: [fht] FMC Alias Private Key: 7
2,811,990 UART: [art] Derive CDI
2,812,270 UART: [art] Store in in slot 0x4
2,897,899 UART: [art] Derive Key Pair
2,898,259 UART: [art] Store priv key in slot 0x5
2,911,281 UART: [art] Derive Key Pair - Done
2,926,207 UART: [art] Signing Cert with AUTHO
2,926,687 UART: RITY.KEYID = 7
2,941,611 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,376 UART: [art] PUB.X = 6062A39672C56B8015B38E509010E934A567BE56981BD316A39EAFD9FA0AFFFDA64401A807923288D859EBAA1386A596
2,949,137 UART: [art] PUB.Y = 9769715218B7979AAA9D3F0E8E623CC0102A1CF8CE7E7CAE8FB827D381B0A47EA3DE19CD83F7B797EB97B26E2A053AC5
2,956,097 UART: [art] SIG.R = 754CC379235F2A3B532638216F77F3B63D735DF970B0EB658297E781B0EBA939DC905C0D412DF4F67CCDBC8E558518B4
2,962,868 UART: [art] SIG.S = 1C5D65A796D342D309D5996FCEE861DF2A54828499BFEDD6697859D944E9988C6D8530F7202226F372FB1AD553EB348B
2,986,790 UART: Caliptra RT
2,987,135 UART: [state] CFI Enabled
3,095,430 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,884 UART: [rt]cmd =0x46505652, len=4
3,126,544 UART: [rt] FIPS Version
3,127,635 >>> mbox cmd response data (36 bytes)
3,127,636 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,156,797 UART: [rt]cmd =0x46504c54, len=4
3,157,891 >>> mbox cmd response data (8 bytes)
3,157,892 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,187,603 UART: [rt]cmd =0x46504c67, len=4
3,188,613 >>> mbox cmd response: failed
3,188,831 UART: [rt] FIPS self test
3,189,162 UART: [kat] ++
3,189,314 UART: [kat] sha1
3,193,509 UART: [kat] SHA2-256
3,195,439 UART: [kat] SHA2-384
3,198,124 UART: [kat] SHA2-512-ACC
3,200,019 UART: [kat] ECC-384
3,209,928 UART: [kat] HMAC-384Kdf
3,214,509 UART: [kat] LMS
3,463,400 UART: [kat] --
5,580,585 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,373 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,617,781 UART: [rt]cmd =0x46504c67, len=4
5,619,014 >>> mbox cmd response data (8 bytes)
5,619,015 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,648,454 UART: [rt]cmd =0x49444543, len=4
5,655,020 >>> mbox cmd response data (37 bytes)
5,655,021 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,684,506 UART: [rt]cmd =0x49444549, len=4
5,686,863 >>> mbox cmd response data (104 bytes)
5,686,864 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,716,067 UART: [rt]cmd =0x49444550, len=4
5,726,327 >>> mbox cmd response data (8 bytes)
5,726,328 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,755,681 UART: [rt]cmd =0x4c444556, len=4
5,766,080 >>> mbox cmd response data (687 bytes)
5,766,081 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,795,386 UART: [rt]cmd =0x43455246, len=4
5,807,445 >>> mbox cmd response data (887 bytes)
5,807,446 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,837,043 UART: [rt]cmd =0x43455252, len=4
5,847,857 >>> mbox cmd response data (782 bytes)
5,847,858 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,423 UART: [rt]cmd =0x53494756, len=196
5,884,011 >>> mbox cmd response data (8 bytes)
5,884,012 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,914,047 UART: [rt]cmd =0x4d454153, len=108
5,934,552 >>> mbox cmd response data (12 bytes)
5,934,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,963,892 UART: [rt]cmd =0x494e464f, len=4
5,967,675 >>> mbox cmd response data (312 bytes)
5,967,676 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,997,125 UART: [rt]cmd =0x54514754, len=24
5,999,111 >>> mbox cmd response data (8 bytes)
5,999,112 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,028,625 UART: [rt]cmd =0x47544744, len=8
6,031,307 >>> mbox cmd response data (104 bytes)
6,031,308 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,060,669 UART: [rt]cmd =0x50435252, len=8
6,062,221 >>> mbox cmd response data (8 bytes)
6,062,222 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,091,773 UART: [rt]cmd =0x50435251, len=36
6,258,974 >>> mbox cmd response data (1848 bytes)
6,258,975 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,288,494 UART: [rt]cmd =0x50435245, len=56
6,291,904 >>> mbox cmd response data (8 bytes)
6,291,905 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,321,018 UART: [rt]cmd =0x44504543, len=20
6,341,963 >>> mbox cmd response data (44 bytes)
6,341,964 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,371,285 UART: [rt]cmd =0x44504543, len=24
6,397,503 >>> mbox cmd response data (40 bytes)
6,397,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,427,403 UART: [rt]cmd =0x44504543, len=96
6,464,523 >>> mbox cmd response data (56 bytes)
6,464,524 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,494,479 UART: [rt]cmd =0x44504543, len=92
6,722,924 >>> mbox cmd response data (6284 bytes)
6,722,925 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,753,106 UART: [rt]cmd =0x44504543, len=136
6,820,275 >>> mbox cmd response data (136 bytes)
6,820,276 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,849,665 UART: [rt]cmd =0x44504543, len=40
6,876,174 >>> mbox cmd response data (40 bytes)
6,876,175 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,905,738 UART: [rt]cmd =0x44504543, len=28
6,948,643 >>> mbox cmd response data (2076 bytes)
6,948,644 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,978,219 UART: [rt]cmd =0x44504543, len=36
7,007,946 >>> mbox cmd response data (24 bytes)
7,007,947 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,037,402 UART: [rt]cmd =0x4453424c, len=4
7,054,256 >>> mbox cmd response data (8 bytes)
7,054,257 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
7,083,700 UART: [rt]cmd =0x46505344, len=4
7,191,868 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,651 writing to cptra_bootfsm_go
192,740 UART:
193,116 UART: Running Caliptra ROM ...
194,276 UART:
194,430 UART: [state] CFI Enabled
263,597 UART: [state] LifecycleState = Unprovisioned
265,595 UART: [state] DebugLocked = No
267,623 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,797 UART: [kat] SHA2-256
442,506 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,986 UART: [kat] ++
453,517 UART: [kat] sha1
465,536 UART: [kat] SHA2-256
468,183 UART: [kat] SHA2-384
474,543 UART: [kat] SHA2-512-ACC
476,931 UART: [kat] ECC-384
2,766,529 UART: [kat] HMAC-384Kdf
2,777,808 UART: [kat] LMS
3,968,074 UART: [kat] --
3,972,415 UART: [cold-reset] ++
3,974,142 UART: [fht] Storing FHT @ 0x50003400
3,985,310 UART: [idev] ++
3,985,938 UART: [idev] CDI.KEYID = 6
3,986,851 UART: [idev] SUBJECT.KEYID = 7
3,988,068 UART: [idev] UDS.KEYID = 0
3,989,186 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,010,865 UART: [idev] Erasing UDS.KEYID = 0
7,325,363 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,252 UART: [idev] --
7,351,777 UART: [ldev] ++
7,352,351 UART: [ldev] CDI.KEYID = 6
7,353,285 UART: [ldev] SUBJECT.KEYID = 5
7,354,552 UART: [ldev] AUTHORITY.KEYID = 7
7,355,701 UART: [ldev] FE.KEYID = 1
7,399,033 UART: [ldev] Erasing FE.KEYID = 1
10,730,306 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,014 UART: [ldev] --
13,090,957 UART: [fwproc] Waiting for Commands...
13,094,253 UART: [fwproc] Received command 0x46504c54
13,096,770 UART: [kat] SHA2-256
13,266,406 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,276,752 UART: [kat] ++
13,277,254 UART: [kat] sha1
13,289,118 UART: [kat] SHA2-256
13,291,846 UART: [kat] SHA2-384
13,297,135 UART: [kat] SHA2-512-ACC
13,299,492 UART: [kat] ECC-384
15,605,623 UART: [kat] HMAC-384Kdf
15,616,338 UART: [kat] LMS
16,805,818 UART: [kat] --
16,806,536 >>> mbox cmd response data (8 bytes)
16,807,005 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,808,388 UART: [fwproc] Received command 0x46504c67
16,811,086 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,805,306 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,371,841 >>> mbox cmd response data (8 bytes)
16,372,621 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,373,599 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,528 UART:
192,899 UART: Running Caliptra ROM ...
194,068 UART:
603,641 UART: [state] CFI Enabled
615,354 UART: [state] LifecycleState = Unprovisioned
617,307 UART: [state] DebugLocked = No
618,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,971 UART: [kat] SHA2-256
793,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,274 UART: [kat] ++
804,750 UART: [kat] sha1
814,839 UART: [kat] SHA2-256
817,527 UART: [kat] SHA2-384
821,939 UART: [kat] SHA2-512-ACC
824,277 UART: [kat] ECC-384
3,107,605 UART: [kat] HMAC-384Kdf
3,121,047 UART: [kat] LMS
4,311,150 UART: [kat] --
4,315,305 UART: [cold-reset] ++
4,317,565 UART: [fht] Storing FHT @ 0x50003400
4,328,508 UART: [idev] ++
4,329,070 UART: [idev] CDI.KEYID = 6
4,330,089 UART: [idev] SUBJECT.KEYID = 7
4,331,255 UART: [idev] UDS.KEYID = 0
4,332,386 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,348,219 UART: [idev] Erasing UDS.KEYID = 0
7,618,954 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,207 UART: [idev] --
7,644,913 UART: [ldev] ++
7,645,486 UART: [ldev] CDI.KEYID = 6
7,646,424 UART: [ldev] SUBJECT.KEYID = 5
7,647,689 UART: [ldev] AUTHORITY.KEYID = 7
7,648,844 UART: [ldev] FE.KEYID = 1
7,659,343 UART: [ldev] Erasing FE.KEYID = 1
10,948,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,226 UART: [ldev] --
13,307,732 UART: [fwproc] Waiting for Commands...
13,309,502 UART: [fwproc] Received command 0x46504c54
13,312,017 UART: [kat] SHA2-256
13,481,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,492,014 UART: [kat] ++
13,492,480 UART: [kat] sha1
13,504,230 UART: [kat] SHA2-256
13,506,928 UART: [kat] SHA2-384
13,511,995 UART: [kat] SHA2-512-ACC
13,514,394 UART: [kat] ECC-384
15,798,623 UART: [kat] HMAC-384Kdf
15,810,954 UART: [kat] LMS
17,000,392 UART: [kat] --
17,001,096 >>> mbox cmd response data (8 bytes)
17,001,538 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,002,521 UART: [fwproc] Received command 0x46504c67
17,005,171 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,124,020 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,531,030 >>> mbox cmd response data (8 bytes)
16,531,815 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,534,112 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,140 UART:
192,519 UART: Running Caliptra ROM ...
193,620 UART:
193,767 UART: [state] CFI Enabled
264,751 UART: [state] LifecycleState = Unprovisioned
266,590 UART: [state] DebugLocked = No
268,407 UART: [state] WD Timer not started. Device not locked for debugging
272,000 UART: [kat] SHA2-256
451,129 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,708 UART: [kat] ++
463,239 UART: [kat] sha1
475,633 UART: [kat] SHA2-256
478,663 UART: [kat] SHA2-384
485,076 UART: [kat] SHA2-512-ACC
488,017 UART: [kat] ECC-384
2,945,193 UART: [kat] HMAC-384Kdf
2,970,453 UART: [kat] LMS
3,499,916 UART: [kat] --
3,503,556 UART: [cold-reset] ++
3,505,118 UART: [fht] FHT @ 0x50003400
3,515,562 UART: [idev] ++
3,516,138 UART: [idev] CDI.KEYID = 6
3,517,019 UART: [idev] SUBJECT.KEYID = 7
3,518,235 UART: [idev] UDS.KEYID = 0
3,519,233 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,543,449 UART: [idev] Erasing UDS.KEYID = 0
6,025,853 UART: [idev] Sha1 KeyId Algorithm
6,048,229 UART: [idev] --
6,053,677 UART: [ldev] ++
6,054,267 UART: [ldev] CDI.KEYID = 6
6,055,158 UART: [ldev] SUBJECT.KEYID = 5
6,056,380 UART: [ldev] AUTHORITY.KEYID = 7
6,057,616 UART: [ldev] FE.KEYID = 1
6,088,154 UART: [ldev] Erasing FE.KEYID = 1
8,591,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,361,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,398,822 UART: [ldev] --
10,403,502 UART: [fwproc] Wait for Commands...
10,406,575 UART: [fwproc] Recv command 0x46504c54
10,408,945 UART: [kat] SHA2-256
10,588,145 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,599,780 UART: [kat] ++
10,600,322 UART: [kat] sha1
10,610,884 UART: [kat] SHA2-256
10,613,944 UART: [kat] SHA2-384
10,620,582 UART: [kat] SHA2-512-ACC
10,623,526 UART: [kat] ECC-384
13,069,162 UART: [kat] HMAC-384Kdf
13,092,506 UART: [kat] LMS
13,622,028 UART: [kat] --
13,622,732 >>> mbox cmd response data (8 bytes)
13,623,205 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,623,862 UART: [fwproc] Recv command 0x46504c67
13,626,418 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,269 writing to cptra_bootfsm_go
3,380,997 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,264,604 >>> mbox cmd response data (8 bytes)
13,265,318 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,267,415 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,596 UART:
192,984 UART: Running Caliptra ROM ...
194,193 UART:
603,780 UART: [state] CFI Enabled
616,412 UART: [state] LifecycleState = Unprovisioned
618,277 UART: [state] DebugLocked = No
620,244 UART: [state] WD Timer not started. Device not locked for debugging
624,431 UART: [kat] SHA2-256
803,531 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,137 UART: [kat] ++
815,670 UART: [kat] sha1
825,743 UART: [kat] SHA2-256
828,763 UART: [kat] SHA2-384
835,910 UART: [kat] SHA2-512-ACC
838,901 UART: [kat] ECC-384
3,280,999 UART: [kat] HMAC-384Kdf
3,292,427 UART: [kat] LMS
3,821,910 UART: [kat] --
3,827,754 UART: [cold-reset] ++
3,830,340 UART: [fht] FHT @ 0x50003400
3,840,828 UART: [idev] ++
3,841,388 UART: [idev] CDI.KEYID = 6
3,842,314 UART: [idev] SUBJECT.KEYID = 7
3,843,527 UART: [idev] UDS.KEYID = 0
3,844,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,859,227 UART: [idev] Erasing UDS.KEYID = 0
6,317,837 UART: [idev] Sha1 KeyId Algorithm
6,341,180 UART: [idev] --
6,344,093 UART: [ldev] ++
6,344,667 UART: [ldev] CDI.KEYID = 6
6,345,576 UART: [ldev] SUBJECT.KEYID = 5
6,346,790 UART: [ldev] AUTHORITY.KEYID = 7
6,348,023 UART: [ldev] FE.KEYID = 1
6,357,712 UART: [ldev] Erasing FE.KEYID = 1
8,829,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,597,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,980 UART: [ldev] --
10,622,901 UART: [fwproc] Wait for Commands...
10,625,650 UART: [fwproc] Recv command 0x46504c54
10,628,068 UART: [kat] SHA2-256
10,807,259 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
10,818,891 UART: [kat] ++
10,819,427 UART: [kat] sha1
10,830,855 UART: [kat] SHA2-256
10,833,908 UART: [kat] SHA2-384
10,840,760 UART: [kat] SHA2-512-ACC
10,843,756 UART: [kat] ECC-384
13,284,538 UART: [kat] HMAC-384Kdf
13,297,627 UART: [kat] LMS
13,827,220 UART: [kat] --
13,827,914 >>> mbox cmd response data (8 bytes)
13,828,372 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,829,616 UART: [fwproc] Recv command 0x46504c67
13,832,111 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,175 writing to cptra_bootfsm_go
3,695,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,459,683 >>> mbox cmd response data (8 bytes)
13,460,522 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,461,809 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,315 UART:
192,675 UART: Running Caliptra ROM ...
193,848 UART:
194,008 UART: [state] CFI Enabled
260,472 UART: [state] LifecycleState = Unprovisioned
262,875 UART: [state] DebugLocked = No
264,387 UART: [state] WD Timer not started. Device not locked for debugging
268,426 UART: [kat] SHA2-256
458,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,108 UART: [kat] ++
469,594 UART: [kat] sha1
479,345 UART: [kat] SHA2-256
482,365 UART: [kat] SHA2-384
488,833 UART: [kat] SHA2-512-ACC
491,449 UART: [kat] ECC-384
2,945,405 UART: [kat] HMAC-384Kdf
2,969,717 UART: [kat] LMS
3,501,471 UART: [kat] --
3,505,850 UART: [cold-reset] ++
3,506,697 UART: [fht] FHT @ 0x50003400
3,517,329 UART: [idev] ++
3,518,004 UART: [idev] CDI.KEYID = 6
3,518,956 UART: [idev] SUBJECT.KEYID = 7
3,520,168 UART: [idev] UDS.KEYID = 0
3,521,138 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,542,896 UART: [idev] Erasing UDS.KEYID = 0
6,025,229 UART: [idev] Sha1 KeyId Algorithm
6,048,262 UART: [idev] --
6,053,290 UART: [ldev] ++
6,053,973 UART: [ldev] CDI.KEYID = 6
6,054,858 UART: [ldev] SUBJECT.KEYID = 5
6,056,122 UART: [ldev] AUTHORITY.KEYID = 7
6,057,321 UART: [ldev] FE.KEYID = 1
6,098,808 UART: [ldev] Erasing FE.KEYID = 1
8,602,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,564 UART: [ldev] --
10,410,909 UART: [fwproc] Wait for Commands...
10,412,572 UART: [fwproc] Recv command 0x46504c54
10,415,218 UART: [kat] SHA2-256
10,604,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,615,809 UART: [kat] ++
10,616,329 UART: [kat] sha1
10,627,870 UART: [kat] SHA2-256
10,630,905 UART: [kat] SHA2-384
10,635,985 UART: [kat] SHA2-512-ACC
10,638,572 UART: [kat] ECC-384
13,099,521 UART: [kat] HMAC-384Kdf
13,123,408 UART: [kat] LMS
13,655,227 UART: [kat] --
13,656,075 >>> mbox cmd response data (8 bytes)
13,656,513 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,657,871 UART: [fwproc] Recv command 0x46504c67
13,660,316 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,439,913 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,384,357 >>> mbox cmd response data (8 bytes)
13,385,182 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,386,463 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,465 UART:
192,836 UART: Running Caliptra ROM ...
193,919 UART:
603,830 UART: [state] CFI Enabled
615,067 UART: [state] LifecycleState = Unprovisioned
617,419 UART: [state] DebugLocked = No
619,503 UART: [state] WD Timer not started. Device not locked for debugging
624,776 UART: [kat] SHA2-256
814,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,468 UART: [kat] ++
826,059 UART: [kat] sha1
837,378 UART: [kat] SHA2-256
840,419 UART: [kat] SHA2-384
845,791 UART: [kat] SHA2-512-ACC
848,416 UART: [kat] ECC-384
3,289,481 UART: [kat] HMAC-384Kdf
3,302,710 UART: [kat] LMS
3,834,520 UART: [kat] --
3,839,651 UART: [cold-reset] ++
3,841,314 UART: [fht] FHT @ 0x50003400
3,853,826 UART: [idev] ++
3,854,505 UART: [idev] CDI.KEYID = 6
3,855,522 UART: [idev] SUBJECT.KEYID = 7
3,856,631 UART: [idev] UDS.KEYID = 0
3,857,619 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,870,761 UART: [idev] Erasing UDS.KEYID = 0
6,331,416 UART: [idev] Sha1 KeyId Algorithm
6,353,489 UART: [idev] --
6,358,838 UART: [ldev] ++
6,359,670 UART: [ldev] CDI.KEYID = 6
6,360,593 UART: [ldev] SUBJECT.KEYID = 5
6,361,700 UART: [ldev] AUTHORITY.KEYID = 7
6,362,880 UART: [ldev] FE.KEYID = 1
6,374,336 UART: [ldev] Erasing FE.KEYID = 1
8,850,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,691 UART: [ldev] --
10,639,743 UART: [fwproc] Wait for Commands...
10,642,328 UART: [fwproc] Recv command 0x46504c54
10,644,971 UART: [kat] SHA2-256
10,834,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,845,523 UART: [kat] ++
10,845,991 UART: [kat] sha1
10,856,499 UART: [kat] SHA2-256
10,859,574 UART: [kat] SHA2-384
10,864,545 UART: [kat] SHA2-512-ACC
10,867,119 UART: [kat] ECC-384
13,309,665 UART: [kat] HMAC-384Kdf
13,322,940 UART: [kat] LMS
13,854,848 UART: [kat] --
13,855,521 >>> mbox cmd response data (8 bytes)
13,855,977 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,857,129 UART: [fwproc] Recv command 0x46504c67
13,859,588 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,959 writing to cptra_bootfsm_go
3,757,515 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,589,537 >>> mbox cmd response data (8 bytes)
13,590,201 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,591,264 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,111 UART: [kat] SHA2-256
882,042 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,157 UART: [kat] ++
886,309 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,442 UART: [kat] SHA2-512-ACC
897,343 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,474 UART: [kat] LMS
1,475,670 UART: [kat] --
1,476,683 UART: [cold-reset] ++
1,477,017 UART: [fht] Storing FHT @ 0x50003400
1,479,908 UART: [idev] ++
1,480,076 UART: [idev] CDI.KEYID = 6
1,480,436 UART: [idev] SUBJECT.KEYID = 7
1,480,860 UART: [idev] UDS.KEYID = 0
1,481,205 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,680 UART: [idev] Erasing UDS.KEYID = 0
1,505,564 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,184 UART: [idev] --
1,515,437 UART: [ldev] ++
1,515,605 UART: [ldev] CDI.KEYID = 6
1,515,968 UART: [ldev] SUBJECT.KEYID = 5
1,516,394 UART: [ldev] AUTHORITY.KEYID = 7
1,516,857 UART: [ldev] FE.KEYID = 1
1,522,089 UART: [ldev] Erasing FE.KEYID = 1
1,547,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,002 UART: [ldev] --
1,586,517 UART: [fwproc] Waiting for Commands...
1,587,366 UART: [fwproc] Received command 0x46504c54
1,588,273 UART: [kat] SHA2-256
2,382,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,319 UART: [kat] ++
2,386,471 UART: [kat] sha1
2,390,713 UART: [kat] SHA2-256
2,392,651 UART: [kat] SHA2-384
2,395,342 UART: [kat] SHA2-512-ACC
2,397,242 UART: [kat] ECC-384
2,402,829 UART: [kat] HMAC-384Kdf
2,407,293 UART: [kat] LMS
2,975,489 UART: [kat] --
2,975,727 >>> mbox cmd response data (8 bytes)
2,975,728 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,975,988 UART: [fwproc] Received command 0x46504c67
2,976,942 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,365 >>> mbox cmd response data (8 bytes)
2,717,366 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,686 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,104 UART: [kat] SHA2-256
882,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,150 UART: [kat] ++
886,302 UART: [kat] sha1
890,654 UART: [kat] SHA2-256
892,592 UART: [kat] SHA2-384
895,433 UART: [kat] SHA2-512-ACC
897,334 UART: [kat] ECC-384
903,047 UART: [kat] HMAC-384Kdf
907,801 UART: [kat] LMS
1,475,997 UART: [kat] --
1,477,060 UART: [cold-reset] ++
1,477,546 UART: [fht] Storing FHT @ 0x50003400
1,480,505 UART: [idev] ++
1,480,673 UART: [idev] CDI.KEYID = 6
1,481,033 UART: [idev] SUBJECT.KEYID = 7
1,481,457 UART: [idev] UDS.KEYID = 0
1,481,802 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,489,295 UART: [idev] Erasing UDS.KEYID = 0
1,505,745 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,261 UART: [idev] --
1,515,170 UART: [ldev] ++
1,515,338 UART: [ldev] CDI.KEYID = 6
1,515,701 UART: [ldev] SUBJECT.KEYID = 5
1,516,127 UART: [ldev] AUTHORITY.KEYID = 7
1,516,590 UART: [ldev] FE.KEYID = 1
1,522,012 UART: [ldev] Erasing FE.KEYID = 1
1,547,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,193 UART: [ldev] --
1,586,672 UART: [fwproc] Waiting for Commands...
1,587,393 UART: [fwproc] Received command 0x46504c54
1,588,300 UART: [kat] SHA2-256
2,382,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,386,346 UART: [kat] ++
2,386,498 UART: [kat] sha1
2,390,620 UART: [kat] SHA2-256
2,392,558 UART: [kat] SHA2-384
2,395,359 UART: [kat] SHA2-512-ACC
2,397,259 UART: [kat] ECC-384
2,402,816 UART: [kat] HMAC-384Kdf
2,407,506 UART: [kat] LMS
2,975,702 UART: [kat] --
2,975,940 >>> mbox cmd response data (8 bytes)
2,975,941 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,976,251 UART: [fwproc] Received command 0x46504c67
2,977,205 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,926 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,717,444 >>> mbox cmd response data (8 bytes)
2,717,445 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,767 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,959 UART: [state] WD Timer not started. Device not locked for debugging
88,066 UART: [kat] SHA2-256
893,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,841 UART: [kat] ++
897,993 UART: [kat] sha1
902,079 UART: [kat] SHA2-256
904,019 UART: [kat] SHA2-384
906,794 UART: [kat] SHA2-512-ACC
908,695 UART: [kat] ECC-384
918,480 UART: [kat] HMAC-384Kdf
923,064 UART: [kat] LMS
1,171,392 UART: [kat] --
1,172,221 UART: [cold-reset] ++
1,172,653 UART: [fht] FHT @ 0x50003400
1,175,294 UART: [idev] ++
1,175,462 UART: [idev] CDI.KEYID = 6
1,175,822 UART: [idev] SUBJECT.KEYID = 7
1,176,246 UART: [idev] UDS.KEYID = 0
1,176,591 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,224 UART: [idev] Erasing UDS.KEYID = 0
1,201,437 UART: [idev] Sha1 KeyId Algorithm
1,210,127 UART: [idev] --
1,211,235 UART: [ldev] ++
1,211,403 UART: [ldev] CDI.KEYID = 6
1,211,766 UART: [ldev] SUBJECT.KEYID = 5
1,212,192 UART: [ldev] AUTHORITY.KEYID = 7
1,212,655 UART: [ldev] FE.KEYID = 1
1,217,891 UART: [ldev] Erasing FE.KEYID = 1
1,244,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,667 UART: [ldev] --
1,284,142 UART: [fwproc] Wait for Commands...
1,284,926 UART: [fwproc] Recv command 0x46504c54
1,285,772 UART: [kat] SHA2-256
2,091,422 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,095,547 UART: [kat] ++
2,095,699 UART: [kat] sha1
2,099,991 UART: [kat] SHA2-256
2,101,931 UART: [kat] SHA2-384
2,104,626 UART: [kat] SHA2-512-ACC
2,106,526 UART: [kat] ECC-384
2,116,469 UART: [kat] HMAC-384Kdf
2,120,941 UART: [kat] LMS
2,369,269 UART: [kat] --
2,369,507 >>> mbox cmd response data (8 bytes)
2,369,508 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,369,707 UART: [fwproc] Recv command 0x46504c67
2,370,600 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,663 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,506 >>> mbox cmd response data (8 bytes)
2,112,507 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,991 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
893,635 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,760 UART: [kat] ++
897,912 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,693 UART: [kat] SHA2-512-ACC
908,594 UART: [kat] ECC-384
917,935 UART: [kat] HMAC-384Kdf
922,785 UART: [kat] LMS
1,171,113 UART: [kat] --
1,172,058 UART: [cold-reset] ++
1,172,566 UART: [fht] FHT @ 0x50003400
1,175,217 UART: [idev] ++
1,175,385 UART: [idev] CDI.KEYID = 6
1,175,745 UART: [idev] SUBJECT.KEYID = 7
1,176,169 UART: [idev] UDS.KEYID = 0
1,176,514 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,081 UART: [idev] Erasing UDS.KEYID = 0
1,201,828 UART: [idev] Sha1 KeyId Algorithm
1,210,384 UART: [idev] --
1,211,294 UART: [ldev] ++
1,211,462 UART: [ldev] CDI.KEYID = 6
1,211,825 UART: [ldev] SUBJECT.KEYID = 5
1,212,251 UART: [ldev] AUTHORITY.KEYID = 7
1,212,714 UART: [ldev] FE.KEYID = 1
1,218,122 UART: [ldev] Erasing FE.KEYID = 1
1,244,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,764 UART: [ldev] --
1,283,147 UART: [fwproc] Wait for Commands...
1,283,831 UART: [fwproc] Recv command 0x46504c54
1,284,677 UART: [kat] SHA2-256
2,090,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,452 UART: [kat] ++
2,094,604 UART: [kat] sha1
2,098,738 UART: [kat] SHA2-256
2,100,678 UART: [kat] SHA2-384
2,103,583 UART: [kat] SHA2-512-ACC
2,105,483 UART: [kat] ECC-384
2,115,356 UART: [kat] HMAC-384Kdf
2,119,992 UART: [kat] LMS
2,368,320 UART: [kat] --
2,368,558 >>> mbox cmd response data (8 bytes)
2,368,559 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,718 UART: [fwproc] Recv command 0x46504c67
2,369,611 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,296 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,905 >>> mbox cmd response data (8 bytes)
2,112,906 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,156 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,722 UART: [kat] SHA2-256
891,272 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,679 UART: [kat] SHA2-256
901,619 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,601 UART: [cold-reset] ++
1,170,047 UART: [fht] FHT @ 0x50003400
1,172,839 UART: [idev] ++
1,173,007 UART: [idev] CDI.KEYID = 6
1,173,368 UART: [idev] SUBJECT.KEYID = 7
1,173,793 UART: [idev] UDS.KEYID = 0
1,174,139 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,085 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,722 UART: [ldev] ++
1,208,890 UART: [ldev] CDI.KEYID = 6
1,209,254 UART: [ldev] SUBJECT.KEYID = 5
1,209,681 UART: [ldev] AUTHORITY.KEYID = 7
1,210,144 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,242,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,108 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,834 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,963 UART: [fwproc] Recv command 0x46504c54
1,282,817 UART: [kat] SHA2-256
2,086,367 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,090,496 UART: [kat] ++
2,090,648 UART: [kat] sha1
2,094,688 UART: [kat] SHA2-256
2,096,628 UART: [kat] SHA2-384
2,099,489 UART: [kat] SHA2-512-ACC
2,101,389 UART: [kat] ECC-384
2,111,008 UART: [kat] HMAC-384Kdf
2,115,624 UART: [kat] LMS
2,363,936 UART: [kat] --
2,364,177 >>> mbox cmd response data (8 bytes)
2,364,178 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,462 UART: [fwproc] Recv command 0x46504c67
2,365,366 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,101 >>> mbox cmd response data (8 bytes)
2,104,102 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,104,380 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,278 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,277 UART: [kat] SHA2-512-ACC
906,178 UART: [kat] ECC-384
916,001 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,862 UART: [cold-reset] ++
1,170,394 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,174,312 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,208,746 UART: [idev] --
1,209,937 UART: [ldev] ++
1,210,105 UART: [ldev] CDI.KEYID = 6
1,210,469 UART: [ldev] SUBJECT.KEYID = 5
1,210,896 UART: [ldev] AUTHORITY.KEYID = 7
1,211,359 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,737 UART: [ldev] --
1,282,159 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46504c54
1,283,676 UART: [kat] SHA2-256
2,087,226 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
2,091,355 UART: [kat] ++
2,091,507 UART: [kat] sha1
2,095,749 UART: [kat] SHA2-256
2,097,689 UART: [kat] SHA2-384
2,100,364 UART: [kat] SHA2-512-ACC
2,102,264 UART: [kat] ECC-384
2,112,123 UART: [kat] HMAC-384Kdf
2,116,805 UART: [kat] LMS
2,365,117 UART: [kat] --
2,365,358 >>> mbox cmd response data (8 bytes)
2,365,359 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,533 UART: [fwproc] Recv command 0x46504c67
2,366,437 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,197 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,104,880 >>> mbox cmd response data (8 bytes)
2,104,881 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,105,169 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,196 UART:
192,553 UART: Running Caliptra ROM ...
193,689 UART:
193,837 UART: [state] CFI Enabled
264,760 UART: [state] LifecycleState = Unprovisioned
266,932 UART: [state] DebugLocked = No
269,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,625 UART: [kat] SHA2-256
443,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,838 UART: [kat] ++
454,314 UART: [kat] sha1
465,261 UART: [kat] SHA2-256
467,995 UART: [kat] SHA2-384
474,984 UART: [kat] SHA2-512-ACC
477,354 UART: [kat] ECC-384
2,768,709 UART: [kat] HMAC-384Kdf
2,799,566 UART: [kat] LMS
3,989,868 UART: [kat] --
3,995,237 UART: [cold-reset] ++
3,997,818 UART: [fht] Storing FHT @ 0x50003400
4,008,453 UART: [idev] ++
4,009,043 UART: [idev] CDI.KEYID = 6
4,009,938 UART: [idev] SUBJECT.KEYID = 7
4,011,192 UART: [idev] UDS.KEYID = 0
4,012,154 ready_for_fw is high
4,012,417 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,155,641 UART: [idev] Erasing UDS.KEYID = 0
7,345,733 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,392 UART: [idev] --
7,371,393 UART: [ldev] ++
7,371,962 UART: [ldev] CDI.KEYID = 6
7,372,932 UART: [ldev] SUBJECT.KEYID = 5
7,374,145 UART: [ldev] AUTHORITY.KEYID = 7
7,375,434 UART: [ldev] FE.KEYID = 1
7,421,140 UART: [ldev] Erasing FE.KEYID = 1
10,750,952 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,214 UART: [ldev] --
13,114,455 UART: [fwproc] Waiting for Commands...
13,116,172 UART: [fwproc] Received command 0x46574c44
13,118,355 UART: [fwproc] Received Image of size 113844 bytes
17,162,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,237,502 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,306,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,622,563 >>> mbox cmd response: success
17,623,015 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,626,018 UART: [afmc] ++
17,626,603 UART: [afmc] CDI.KEYID = 6
17,627,690 UART: [afmc] SUBJECT.KEYID = 7
17,628,808 UART: [afmc] AUTHORITY.KEYID = 5
20,979,938 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,281,529 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,283,782 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,298,188 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,313,005 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,327,475 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,349,259 UART: [afmc] --
23,353,179 UART: [cold-reset] --
23,357,528 UART: [state] Locking Datavault
23,365,255 UART: [state] Locking PCR0, PCR1 and PCR31
23,367,013 UART: [state] Locking ICCM
23,368,141 UART: [exit] Launching FMC @ 0x40000130
23,376,539 UART:
23,376,775 UART: Running Caliptra FMC ...
23,377,874 UART:
23,378,032 UART: [state] CFI Enabled
23,441,780 UART: [fht] FMC Alias Private Key: 7
25,779,811 UART: [art] Extend RT PCRs Done
25,781,033 UART: [art] Lock RT PCRs Done
25,782,741 UART: [art] Populate DV Done
25,788,031 UART: [fht] FMC Alias Private Key: 7
25,789,572 UART: [art] Derive CDI
25,790,314 UART: [art] Store in in slot 0x4
25,851,865 UART: [art] Derive Key Pair
25,852,874 UART: [art] Store priv key in slot 0x5
29,145,670 UART: [art] Derive Key Pair - Done
29,158,653 UART: [art] Signing Cert with AUTHO
29,159,963 UART: RITY.KEYID = 7
31,446,410 UART: [art] Erasing AUTHORITY.KEYID = 7
31,447,923 UART: [art] PUB.X = E1746996A49AB55BD91755596DB704B7DD43552E4C5BA0769748BF13DF8D076266BB6CC643EB7EF6C1D77C927B9AB530
31,455,164 UART: [art] PUB.Y = 4DE763178A3F9F83EABD217C223CBEF094070694680F0EF0819FE5BFF64239A818B3B173E4C69EEBEAB5B583ECD684D5
31,462,452 UART: [art] SIG.R = F5B71AA0B768E093D5CD2CD04CE161915B3FEEC53836ABD49293AA1459EEF3884D134CEA8E6B7313D6D30550F6A0F453
31,469,895 UART: [art] SIG.S = C1913CD30428F51C4CEEC17B86A4A74AFB73DFD0C1557EF1513BFB4A4413DFDABAB4AEAD1B357C836B4D4C36BFDCB712
32,774,895 UART: Caliptra RT
32,775,609 UART: [state] CFI Enabled
32,935,143 UART: [rt] RT listening for mailbox commands...
32,966,620 UART: [rt]cmd =0x46504c54, len=4
32,968,143 >>> mbox cmd response data (8 bytes)
32,968,591 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,998,743 UART: [rt]cmd =0x46504c67, len=4
33,000,070 >>> mbox cmd response: failed
33,001,175 UART: [rt] FIPS self test
33,002,114 UART: [kat] ++
33,002,568 UART: [kat] sha1
33,006,963 UART: [kat] SHA2-256
33,008,763 UART: [kat] SHA2-384
33,011,585 UART: [kat] SHA2-512-ACC
33,013,799 UART: [kat] ECC-384
36,292,466 UART: [kat] HMAC-384Kdf
36,299,251 UART: [kat] LMS
36,708,785 UART: [kat] --
40,684,573 UART: [rt] Verify complete
40,842,428 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,872,278 UART: [rt]cmd =0x46504c67, len=4
40,873,861 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,804,944 ready_for_fw is high
3,805,325 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
17,875,117 >>> mbox cmd response: success
17,875,779 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,564,130 UART:
23,564,499 UART: Running Caliptra FMC ...
23,565,629 UART:
23,565,783 UART: [state] CFI Enabled
23,633,530 UART: [fht] FMC Alias Private Key: 7
25,971,239 UART: [art] Extend RT PCRs Done
25,972,459 UART: [art] Lock RT PCRs Done
25,973,929 UART: [art] Populate DV Done
25,979,238 UART: [fht] FMC Alias Private Key: 7
25,980,829 UART: [art] Derive CDI
25,981,645 UART: [art] Store in in slot 0x4
26,042,452 UART: [art] Derive Key Pair
26,043,497 UART: [art] Store priv key in slot 0x5
29,335,587 UART: [art] Derive Key Pair - Done
29,349,389 UART: [art] Signing Cert with AUTHO
29,350,734 UART: RITY.KEYID = 7
31,637,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,639,194 UART: [art] PUB.X = C5DAD6BFB80294FCFA7E558334FD50B08098EF593C9BA5619D142514241AF9F19CC7161AD86C4A663A8AC81D578351CD
31,646,479 UART: [art] PUB.Y = DFCD147C90FE5F1F7AA21E15BA6CF0742D40BDE3E25A2EFCB27C3BC6D8E64C57A826465019F065B83ABED57BC3937400
31,653,688 UART: [art] SIG.R = BA5B1073BFCEDE33834A7F8B2FB3EBDE09B66A595B1F0D6A74A022B3444798D11F6AB82CC51D6E1EC9A175515E547DE8
31,661,165 UART: [art] SIG.S = 63D9F760D6DEC8E2E77AA730B77EC953E376D0A740243F68B59B52777346EEECA5EF0DE735C14ECACE8772A68C5349E6
32,966,406 UART: Caliptra RT
32,967,095 UART: [state] CFI Enabled
33,127,067 UART: [rt] RT listening for mailbox commands...
33,158,488 UART: [rt]cmd =0x46504c54, len=4
33,160,064 >>> mbox cmd response data (8 bytes)
33,160,466 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,190,609 UART: [rt]cmd =0x46504c67, len=4
33,191,989 >>> mbox cmd response: failed
33,192,647 UART: [rt] FIPS self test
33,193,577 UART: [kat] ++
33,194,025 UART: [kat] sha1
33,198,342 UART: [kat] SHA2-256
33,200,182 UART: [kat] SHA2-384
33,202,870 UART: [kat] SHA2-512-ACC
33,205,114 UART: [kat] ECC-384
36,484,753 UART: [kat] HMAC-384Kdf
36,491,440 UART: [kat] LMS
36,900,799 UART: [kat] --
40,855,952 UART: [rt] Verify complete
41,033,924 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,063,610 UART: [rt]cmd =0x46504c67, len=4
41,065,312 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,564 UART:
192,921 UART: Running Caliptra ROM ...
194,110 UART:
603,751 UART: [state] CFI Enabled
617,281 UART: [state] LifecycleState = Unprovisioned
619,203 UART: [state] DebugLocked = No
621,168 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,398 UART: [kat] SHA2-256
795,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,630 UART: [kat] ++
806,078 UART: [kat] sha1
816,575 UART: [kat] SHA2-256
819,298 UART: [kat] SHA2-384
825,789 UART: [kat] SHA2-512-ACC
828,157 UART: [kat] ECC-384
3,112,392 UART: [kat] HMAC-384Kdf
3,124,924 UART: [kat] LMS
4,315,046 UART: [kat] --
4,319,432 UART: [cold-reset] ++
4,320,875 UART: [fht] Storing FHT @ 0x50003400
4,333,637 UART: [idev] ++
4,334,228 UART: [idev] CDI.KEYID = 6
4,335,139 UART: [idev] SUBJECT.KEYID = 7
4,336,390 UART: [idev] UDS.KEYID = 0
4,337,451 ready_for_fw is high
4,337,686 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
4,480,790 UART: [idev] Erasing UDS.KEYID = 0
7,624,542 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,331 UART: [idev] --
7,649,542 UART: [ldev] ++
7,650,113 UART: [ldev] CDI.KEYID = 6
7,651,076 UART: [ldev] SUBJECT.KEYID = 5
7,652,293 UART: [ldev] AUTHORITY.KEYID = 7
7,653,534 UART: [ldev] FE.KEYID = 1
7,664,845 UART: [ldev] Erasing FE.KEYID = 1
10,951,424 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,216 UART: [ldev] --
13,314,938 UART: [fwproc] Waiting for Commands...
13,317,788 UART: [fwproc] Received command 0x46574c44
13,320,033 UART: [fwproc] Received Image of size 113844 bytes
17,373,476 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,454,425 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,523,282 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
17,839,366 >>> mbox cmd response: success
17,839,792 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,843,064 UART: [afmc] ++
17,843,648 UART: [afmc] CDI.KEYID = 6
17,844,614 UART: [afmc] SUBJECT.KEYID = 7
17,845,830 UART: [afmc] AUTHORITY.KEYID = 5
21,154,857 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,447,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,450,185 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,464,549 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,479,382 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,493,828 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,515,542 UART: [afmc] --
23,519,682 UART: [cold-reset] --
23,523,171 UART: [state] Locking Datavault
23,528,365 UART: [state] Locking PCR0, PCR1 and PCR31
23,530,116 UART: [state] Locking ICCM
23,532,129 UART: [exit] Launching FMC @ 0x40000130
23,540,465 UART:
23,540,707 UART: Running Caliptra FMC ...
23,541,743 UART:
23,541,890 UART: [state] CFI Enabled
23,550,416 UART: [fht] FMC Alias Private Key: 7
25,880,931 UART: [art] Extend RT PCRs Done
25,882,163 UART: [art] Lock RT PCRs Done
25,883,710 UART: [art] Populate DV Done
25,889,447 UART: [fht] FMC Alias Private Key: 7
25,891,153 UART: [art] Derive CDI
25,891,892 UART: [art] Store in in slot 0x4
25,934,768 UART: [art] Derive Key Pair
25,935,805 UART: [art] Store priv key in slot 0x5
29,177,686 UART: [art] Derive Key Pair - Done
29,190,847 UART: [art] Signing Cert with AUTHO
29,192,148 UART: RITY.KEYID = 7
31,471,357 UART: [art] Erasing AUTHORITY.KEYID = 7
31,472,864 UART: [art] PUB.X = 95EEE8283758DA18C8CD15B967AFC66E6F8F845356C0CC8BEBD1F8E96F4B0C71AAADBBFAAED74BC07D56F7BA4A136808
31,480,143 UART: [art] PUB.Y = D49FE46F1744A43B3AA95890E14AF924A2FE8066FA3592C190EDA3548386993A78F05C24F87BE53D0068E29F823ABD60
31,487,362 UART: [art] SIG.R = 2297CD661387F2955F67164F3B2ABF7DA449D6ED3319FA588378438EBFFF34F86AA586ABE41AAD59189337D3E959B658
31,494,759 UART: [art] SIG.S = 4736B731E9B2CC3C9187D6208C8E9DEE72469EB73B7C11D70ADF1F90D66DD2CD3787EA35A5AE04806234B66A9DB744D1
32,799,722 UART: Caliptra RT
32,800,422 UART: [state] CFI Enabled
32,917,834 UART: [rt] RT listening for mailbox commands...
32,949,175 UART: [rt]cmd =0x46504c54, len=4
32,950,779 >>> mbox cmd response data (8 bytes)
32,951,203 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,981,615 UART: [rt]cmd =0x46504c67, len=4
32,982,961 >>> mbox cmd response: failed
32,983,850 UART: [rt] FIPS self test
32,984,780 UART: [kat] ++
32,985,229 UART: [kat] sha1
32,989,612 UART: [kat] SHA2-256
32,991,442 UART: [kat] SHA2-384
32,994,157 UART: [kat] SHA2-512-ACC
32,996,400 UART: [kat] ECC-384
36,238,887 UART: [kat] HMAC-384Kdf
36,244,624 UART: [kat] LMS
36,654,132 UART: [kat] --
40,629,765 UART: [rt] Verify complete
40,825,883 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,855,729 UART: [rt]cmd =0x46504c67, len=4
40,857,500 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
4,129,148 ready_for_fw is high
4,129,599 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
18,070,362 >>> mbox cmd response: success
18,071,094 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,713,312 UART:
23,713,688 UART: Running Caliptra FMC ...
23,714,853 UART:
23,715,011 UART: [state] CFI Enabled
23,723,083 UART: [fht] FMC Alias Private Key: 7
26,054,141 UART: [art] Extend RT PCRs Done
26,055,375 UART: [art] Lock RT PCRs Done
26,057,191 UART: [art] Populate DV Done
26,062,603 UART: [fht] FMC Alias Private Key: 7
26,064,212 UART: [art] Derive CDI
26,065,030 UART: [art] Store in in slot 0x4
26,107,634 UART: [art] Derive Key Pair
26,108,635 UART: [art] Store priv key in slot 0x5
29,351,039 UART: [art] Derive Key Pair - Done
29,364,159 UART: [art] Signing Cert with AUTHO
29,365,465 UART: RITY.KEYID = 7
31,644,837 UART: [art] Erasing AUTHORITY.KEYID = 7
31,646,348 UART: [art] PUB.X = F7D1C4CA396BF228A3A4C3AE05142D93EC8DF1649D755B313F3DCD24E820756A2DE02FCAA98C2AFB9A88878C4A516B2E
31,653,605 UART: [art] PUB.Y = 07E9B95DF055510AFD25C5E9116C9C2FA2A8741EC5E6152CD489CD6BA0E1DC52916146D097308C2CF2467F034046C1EC
31,660,860 UART: [art] SIG.R = 6D42C677CF7F2A010C19FB5680D32AA7CACB46DB420087CF24E9EF6404788647522350584071284D6CC09C59CAAB99B5
31,668,186 UART: [art] SIG.S = 096B883E66FF38C18711C7830C9889491292F11593198E2024D7F1425E33E4E826AD19F4B6FBBFF895390A39146D6DD5
32,973,453 UART: Caliptra RT
32,974,155 UART: [state] CFI Enabled
33,092,666 UART: [rt] RT listening for mailbox commands...
33,123,776 UART: [rt]cmd =0x46504c54, len=4
33,125,351 >>> mbox cmd response data (8 bytes)
33,125,765 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,155,460 UART: [rt]cmd =0x46504c67, len=4
33,156,961 >>> mbox cmd response: failed
33,157,953 UART: [rt] FIPS self test
33,158,876 UART: [kat] ++
33,159,326 UART: [kat] sha1
33,163,613 UART: [kat] SHA2-256
33,165,430 UART: [kat] SHA2-384
33,168,306 UART: [kat] SHA2-512-ACC
33,170,546 UART: [kat] ECC-384
36,413,069 UART: [kat] HMAC-384Kdf
36,419,097 UART: [kat] LMS
36,828,451 UART: [kat] --
40,783,289 UART: [rt] Verify complete
40,999,841 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,029,667 UART: [rt]cmd =0x46504c67, len=4
41,031,170 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,106 UART:
192,500 UART: Running Caliptra ROM ...
193,618 UART:
193,759 UART: [state] CFI Enabled
265,680 UART: [state] LifecycleState = Unprovisioned
267,651 UART: [state] DebugLocked = No
269,616 UART: [state] WD Timer not started. Device not locked for debugging
272,958 UART: [kat] SHA2-256
452,085 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
463,684 UART: [kat] ++
464,215 UART: [kat] sha1
476,310 UART: [kat] SHA2-256
479,326 UART: [kat] SHA2-384
486,599 UART: [kat] SHA2-512-ACC
489,541 UART: [kat] ECC-384
2,948,456 UART: [kat] HMAC-384Kdf
2,973,767 UART: [kat] LMS
3,503,183 UART: [kat] --
3,506,815 UART: [cold-reset] ++
3,508,812 UART: [fht] FHT @ 0x50003400
3,520,727 UART: [idev] ++
3,521,311 UART: [idev] CDI.KEYID = 6
3,522,237 UART: [idev] SUBJECT.KEYID = 7
3,523,418 UART: [idev] UDS.KEYID = 0
3,524,345 ready_for_fw is high
3,524,557 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,668,136 UART: [idev] Erasing UDS.KEYID = 0
6,029,651 UART: [idev] Sha1 KeyId Algorithm
6,052,672 UART: [idev] --
6,057,596 UART: [ldev] ++
6,058,169 UART: [ldev] CDI.KEYID = 6
6,059,081 UART: [ldev] SUBJECT.KEYID = 5
6,060,248 UART: [ldev] AUTHORITY.KEYID = 7
6,061,484 UART: [ldev] FE.KEYID = 1
6,101,349 UART: [ldev] Erasing FE.KEYID = 1
8,604,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,336,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,962 UART: [ldev] --
10,390,768 UART: [fwproc] Wait for Commands...
10,392,269 UART: [fwproc] Recv command 0x46574c44
10,394,370 UART: [fwproc] Recv'd Img size: 114168 bytes
13,785,230 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,855,966 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,924,747 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,242,492 >>> mbox cmd response: success
14,242,940 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,246,370 UART: [afmc] ++
14,246,964 UART: [afmc] CDI.KEYID = 6
14,247,875 UART: [afmc] SUBJECT.KEYID = 7
14,249,038 UART: [afmc] AUTHORITY.KEYID = 5
16,790,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,517,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,519,219 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,535,029 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,551,039 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,566,917 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,589,170 UART: [afmc] --
18,593,399 UART: [cold-reset] --
18,597,001 UART: [state] Locking Datavault
18,603,116 UART: [state] Locking PCR0, PCR1 and PCR31
18,604,763 UART: [state] Locking ICCM
18,606,536 UART: [exit] Launching FMC @ 0x40000130
18,614,932 UART:
18,615,166 UART: Running Caliptra FMC ...
18,616,265 UART:
18,616,424 UART: [state] CFI Enabled
18,675,807 UART: [fht] FMC Alias Private Key: 7
20,440,130 UART: [art] Extend RT PCRs Done
20,441,353 UART: [art] Lock RT PCRs Done
20,442,871 UART: [art] Populate DV Done
20,448,227 UART: [fht] FMC Alias Private Key: 7
20,449,926 UART: [art] Derive CDI
20,450,740 UART: [art] Store in in slot 0x4
20,508,525 UART: [art] Derive Key Pair
20,509,564 UART: [art] Store priv key in slot 0x5
22,972,828 UART: [art] Derive Key Pair - Done
22,985,768 UART: [art] Signing Cert with AUTHO
22,987,445 UART: RITY.KEYID = 7
24,699,139 UART: [art] Erasing AUTHORITY.KEYID = 7
24,700,647 UART: [art] PUB.X = D75C1A60EA73DA02CBD312777C649F85FA5604678BD65233E8AA74D70FB992131158DBB3FDABD6652D98F97A115DF076
24,707,869 UART: [art] PUB.Y = 630FC2668859140DBCF90DF8C6E79E9156B648B35548406E19DF2E31EB4FFFD328DFCBAD22F49063DD2FDE7F7AC1F2A1
24,715,180 UART: [art] SIG.R = AA605A79223CFD3ABC113118D0ABD7663B557706D0ABDC0F61369187C0A1510A4241926401E6AB6D2445D065F193238F
24,722,553 UART: [art] SIG.S = 64B907190C735B2768F0D032F3A8FE8232E2FD94B0F4C761705268F0AC26994E4CD0D1AC63E0ACFB65C796D908B0DD82
25,702,138 UART: Caliptra RT
25,702,847 UART: [state] CFI Enabled
25,866,438 UART: [rt] RT listening for mailbox commands...
25,897,878 UART: [rt]cmd =0x46504c54, len=4
25,899,565 >>> mbox cmd response data (8 bytes)
25,899,992 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,930,179 UART: [rt]cmd =0x46504c67, len=4
25,931,468 >>> mbox cmd response: failed
25,932,633 UART: [rt] FIPS self test
25,933,565 UART: [kat] ++
25,934,018 UART: [kat] sha1
25,938,577 UART: [kat] SHA2-256
25,940,370 UART: [kat] SHA2-384
25,943,190 UART: [kat] SHA2-512-ACC
25,945,438 UART: [kat] ECC-384
28,394,333 UART: [kat] HMAC-384Kdf
28,421,286 UART: [kat] LMS
28,618,459 UART: [kat] --
31,947,877 UART: [rt] Verify complete
32,070,579 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,100,217 UART: [rt]cmd =0x46504c67, len=4
32,101,917 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,360,939 ready_for_fw is high
3,361,397 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,048,990 >>> mbox cmd response: success
14,049,727 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,345,621 UART:
18,346,006 UART: Running Caliptra FMC ...
18,347,178 UART:
18,347,334 UART: [state] CFI Enabled
18,414,897 UART: [fht] FMC Alias Private Key: 7
20,178,817 UART: [art] Extend RT PCRs Done
20,180,027 UART: [art] Lock RT PCRs Done
20,181,875 UART: [art] Populate DV Done
20,187,262 UART: [fht] FMC Alias Private Key: 7
20,188,976 UART: [art] Derive CDI
20,189,793 UART: [art] Store in in slot 0x4
20,247,851 UART: [art] Derive Key Pair
20,248,892 UART: [art] Store priv key in slot 0x5
22,711,808 UART: [art] Derive Key Pair - Done
22,724,751 UART: [art] Signing Cert with AUTHO
22,726,060 UART: RITY.KEYID = 7
24,437,469 UART: [art] Erasing AUTHORITY.KEYID = 7
24,438,972 UART: [art] PUB.X = 6689B40143DAFDA8F3859C418562B0A7FB9D670113021D6F112B7B4BE6291222F71D88D25C07987EBCC0910082C4AB83
24,446,212 UART: [art] PUB.Y = 38924523DB8B98801001B3FAB7AE6F99C1FAF863DC1AF9F45AC1DC1F469B4222EFEF4BBF47072DCE834EA6B99F9EA53E
24,453,513 UART: [art] SIG.R = 1428617966BADE177B7CD45B79BC8EB4E64AB907597F4843DC3CC552FDA9343C4C2349FCA74BF07DF924809A7FE8271E
24,460,905 UART: [art] SIG.S = 2876E8F141D64ACC433DDFE34DB041A7803F9F68520C2DE72A9A82ED5E5FC6787587872EEFA2AC98827291ED14328238
25,440,141 UART: Caliptra RT
25,440,859 UART: [state] CFI Enabled
25,604,002 UART: [rt] RT listening for mailbox commands...
25,635,433 UART: [rt]cmd =0x46504c54, len=4
25,636,932 >>> mbox cmd response data (8 bytes)
25,637,341 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,667,426 UART: [rt]cmd =0x46504c67, len=4
25,668,769 >>> mbox cmd response: failed
25,669,660 UART: [rt] FIPS self test
25,670,585 UART: [kat] ++
25,671,034 UART: [kat] sha1
25,675,441 UART: [kat] SHA2-256
25,677,263 UART: [kat] SHA2-384
25,680,181 UART: [kat] SHA2-512-ACC
25,682,434 UART: [kat] ECC-384
28,132,692 UART: [kat] HMAC-384Kdf
28,138,297 UART: [kat] LMS
28,335,500 UART: [kat] --
31,643,519 UART: [rt] Verify complete
31,808,245 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,838,255 UART: [rt]cmd =0x46504c67, len=4
31,839,732 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,485 UART:
192,843 UART: Running Caliptra ROM ...
194,063 UART:
603,763 UART: [state] CFI Enabled
615,938 UART: [state] LifecycleState = Unprovisioned
617,844 UART: [state] DebugLocked = No
619,593 UART: [state] WD Timer not started. Device not locked for debugging
624,204 UART: [kat] SHA2-256
803,365 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
814,932 UART: [kat] ++
815,466 UART: [kat] sha1
825,990 UART: [kat] SHA2-256
829,064 UART: [kat] SHA2-384
835,905 UART: [kat] SHA2-512-ACC
839,005 UART: [kat] ECC-384
3,284,198 UART: [kat] HMAC-384Kdf
3,295,438 UART: [kat] LMS
3,824,977 UART: [kat] --
3,829,397 UART: [cold-reset] ++
3,830,405 UART: [fht] FHT @ 0x50003400
3,841,456 UART: [idev] ++
3,842,046 UART: [idev] CDI.KEYID = 6
3,842,959 UART: [idev] SUBJECT.KEYID = 7
3,844,139 UART: [idev] UDS.KEYID = 0
3,845,070 ready_for_fw is high
3,845,281 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,988,677 UART: [idev] Erasing UDS.KEYID = 0
6,320,974 UART: [idev] Sha1 KeyId Algorithm
6,344,964 UART: [idev] --
6,349,882 UART: [ldev] ++
6,350,451 UART: [ldev] CDI.KEYID = 6
6,351,332 UART: [ldev] SUBJECT.KEYID = 5
6,352,546 UART: [ldev] AUTHORITY.KEYID = 7
6,353,776 UART: [ldev] FE.KEYID = 1
6,364,004 UART: [ldev] Erasing FE.KEYID = 1
8,839,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,555,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,571,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,587,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,603,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,623,304 UART: [ldev] --
10,628,730 UART: [fwproc] Wait for Commands...
10,630,770 UART: [fwproc] Recv command 0x46574c44
10,632,875 UART: [fwproc] Recv'd Img size: 114168 bytes
14,033,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,106,241 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,175,046 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,492,841 >>> mbox cmd response: success
14,493,278 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,497,684 UART: [afmc] ++
14,498,264 UART: [afmc] CDI.KEYID = 6
14,499,180 UART: [afmc] SUBJECT.KEYID = 7
14,500,278 UART: [afmc] AUTHORITY.KEYID = 5
16,998,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,622 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,737,401 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,753,398 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,769,291 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,790,565 UART: [afmc] --
18,795,080 UART: [cold-reset] --
18,797,649 UART: [state] Locking Datavault
18,801,330 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,027 UART: [state] Locking ICCM
18,805,337 UART: [exit] Launching FMC @ 0x40000130
18,813,732 UART:
18,813,973 UART: Running Caliptra FMC ...
18,815,076 UART:
18,815,233 UART: [state] CFI Enabled
18,823,838 UART: [fht] FMC Alias Private Key: 7
20,580,797 UART: [art] Extend RT PCRs Done
20,582,021 UART: [art] Lock RT PCRs Done
20,583,566 UART: [art] Populate DV Done
20,588,976 UART: [fht] FMC Alias Private Key: 7
20,590,511 UART: [art] Derive CDI
20,591,243 UART: [art] Store in in slot 0x4
20,633,346 UART: [art] Derive Key Pair
20,634,386 UART: [art] Store priv key in slot 0x5
23,061,163 UART: [art] Derive Key Pair - Done
23,074,213 UART: [art] Signing Cert with AUTHO
23,075,524 UART: RITY.KEYID = 7
24,781,083 UART: [art] Erasing AUTHORITY.KEYID = 7
24,782,604 UART: [art] PUB.X = E8332453AA6E2172A4115ED3DE39CA02EA80D4E58D6F794A990EBCC61766BB2878C934BB08A7CC8F4620DF0CB3F275B9
24,789,863 UART: [art] PUB.Y = FF75E8A81A8E6FD3D3FFF4505D7173E1840CA90E0FC483894A2431925655DBC20B876028CC7327FB967DF0F0931F6135
24,797,155 UART: [art] SIG.R = 0CF96B5C1DE7206ECE8107A44920608234DB990D428DFD2EC796418F2A5032DE40239193CC651421DEE6C7177386E1D9
24,804,519 UART: [art] SIG.S = 4A5BE04058F0EAAE8F2192F54B76092772F01E9B5ED7AB361DEC4FE1E5F701C6D6EFFDF689024E3E3D33C058FE1F7835
25,783,749 UART: Caliptra RT
25,784,445 UART: [state] CFI Enabled
25,903,097 UART: [rt] RT listening for mailbox commands...
25,934,382 UART: [rt]cmd =0x46504c54, len=4
25,936,128 >>> mbox cmd response data (8 bytes)
25,936,541 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,966,880 UART: [rt]cmd =0x46504c67, len=4
25,968,169 >>> mbox cmd response: failed
25,968,875 UART: [rt] FIPS self test
25,969,809 UART: [kat] ++
25,970,262 UART: [kat] sha1
25,974,719 UART: [kat] SHA2-256
25,976,542 UART: [kat] SHA2-384
25,979,227 UART: [kat] SHA2-512-ACC
25,981,476 UART: [kat] ECC-384
28,408,821 UART: [kat] HMAC-384Kdf
28,414,656 UART: [kat] LMS
28,611,846 UART: [kat] --
31,941,606 UART: [rt] Verify complete
32,106,025 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,135,966 UART: [rt]cmd =0x46504c67, len=4
32,137,741 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,576 writing to cptra_bootfsm_go
3,700,373 ready_for_fw is high
3,700,841 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,270,788 >>> mbox cmd response: success
14,271,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,522,823 UART:
18,523,207 UART: Running Caliptra FMC ...
18,524,460 UART:
18,524,627 UART: [state] CFI Enabled
18,532,414 UART: [fht] FMC Alias Private Key: 7
20,289,406 UART: [art] Extend RT PCRs Done
20,290,632 UART: [art] Lock RT PCRs Done
20,292,532 UART: [art] Populate DV Done
20,298,022 UART: [fht] FMC Alias Private Key: 7
20,299,514 UART: [art] Derive CDI
20,300,284 UART: [art] Store in in slot 0x4
20,342,933 UART: [art] Derive Key Pair
20,343,938 UART: [art] Store priv key in slot 0x5
22,770,922 UART: [art] Derive Key Pair - Done
22,783,951 UART: [art] Signing Cert with AUTHO
22,785,258 UART: RITY.KEYID = 7
24,490,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,492,088 UART: [art] PUB.X = 24D9F3945C11D92C1DD3697D31F5F467591D98604D0FFD72714206CAE9E44056ED57C4AC52970175F551FA5B5F38D8EB
24,499,344 UART: [art] PUB.Y = 54316095F62560D2371A363EC426D389A04F05E235AF58BD5267B4ECB9176E8E0700A1CB31482D721E274764A18862E5
24,506,569 UART: [art] SIG.R = 9AB54057DC1A178D950EDAEF0214474BD7061A5BCD97FE04F93928F190FC5AF0BACCB232A71621C7BB79D02CFBB00603
24,513,959 UART: [art] SIG.S = 49CB155DA6DDC8065DF3C0D5A0E0D93BF6D2BAFB4DBDAB300E9C4FDAEFA50BC66613BFE3EEE411898389727D1811705C
25,493,473 UART: Caliptra RT
25,494,190 UART: [state] CFI Enabled
25,612,334 UART: [rt] RT listening for mailbox commands...
25,643,526 UART: [rt]cmd =0x46504c54, len=4
25,645,163 >>> mbox cmd response data (8 bytes)
25,645,579 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,675,612 UART: [rt]cmd =0x46504c67, len=4
25,676,939 >>> mbox cmd response: failed
25,677,981 UART: [rt] FIPS self test
25,678,853 UART: [kat] ++
25,679,295 UART: [kat] sha1
25,683,844 UART: [kat] SHA2-256
25,685,675 UART: [kat] SHA2-384
25,688,665 UART: [kat] SHA2-512-ACC
25,690,880 UART: [kat] ECC-384
28,117,781 UART: [kat] HMAC-384Kdf
28,123,736 UART: [kat] LMS
28,320,940 UART: [kat] --
31,631,591 UART: [rt] Verify complete
31,815,350 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
31,844,978 UART: [rt]cmd =0x46504c67, len=4
31,846,561 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,447 UART:
192,826 UART: Running Caliptra ROM ...
194,025 UART:
194,182 UART: [state] CFI Enabled
266,767 UART: [state] LifecycleState = Unprovisioned
269,180 UART: [state] DebugLocked = No
270,509 UART: [state] WD Timer not started. Device not locked for debugging
275,618 UART: [kat] SHA2-256
465,472 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,283 UART: [kat] ++
476,818 UART: [kat] sha1
489,759 UART: [kat] SHA2-256
492,786 UART: [kat] SHA2-384
498,642 UART: [kat] SHA2-512-ACC
501,235 UART: [kat] ECC-384
2,949,554 UART: [kat] HMAC-384Kdf
2,974,634 UART: [kat] LMS
3,506,407 UART: [kat] --
3,512,107 UART: [cold-reset] ++
3,513,405 UART: [fht] FHT @ 0x50003400
3,524,532 UART: [idev] ++
3,525,249 UART: [idev] CDI.KEYID = 6
3,526,249 UART: [idev] SUBJECT.KEYID = 7
3,527,431 UART: [idev] UDS.KEYID = 0
3,528,363 ready_for_fw is high
3,528,606 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
3,672,325 UART: [idev] Erasing UDS.KEYID = 0
6,032,506 UART: [idev] Sha1 KeyId Algorithm
6,055,010 UART: [idev] --
6,059,527 UART: [ldev] ++
6,060,219 UART: [ldev] CDI.KEYID = 6
6,061,102 UART: [ldev] SUBJECT.KEYID = 5
6,062,319 UART: [ldev] AUTHORITY.KEYID = 7
6,063,554 UART: [ldev] FE.KEYID = 1
6,104,197 UART: [ldev] Erasing FE.KEYID = 1
8,609,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,873 UART: [ldev] --
10,415,433 UART: [fwproc] Wait for Commands...
10,418,339 UART: [fwproc] Recv command 0x46574c44
10,420,610 UART: [fwproc] Recv'd Img size: 114168 bytes
13,862,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,217 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,060,418 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,601,687 >>> mbox cmd response: success
14,602,136 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,605,156 UART: [afmc] ++
14,605,883 UART: [afmc] CDI.KEYID = 6
14,606,993 UART: [afmc] SUBJECT.KEYID = 7
14,608,539 UART: [afmc] AUTHORITY.KEYID = 5
17,153,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,874,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,876,419 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,891,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,906,746 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,921,766 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,944,740 UART: [afmc] --
18,948,364 UART: [cold-reset] --
18,953,041 UART: [state] Locking Datavault
18,958,629 UART: [state] Locking PCR0, PCR1 and PCR31
18,960,828 UART: [state] Locking ICCM
18,963,522 UART: [exit] Launching FMC @ 0x40000130
18,972,193 UART:
18,972,430 UART: Running Caliptra FMC ...
18,973,533 UART:
18,973,690 UART: [state] CFI Enabled
19,043,741 UART: [fht] FMC Alias Private Key: 7
20,807,852 UART: [art] Extend RT PCRs Done
20,809,071 UART: [art] Lock RT PCRs Done
20,810,429 UART: [art] Populate DV Done
20,816,008 UART: [fht] FMC Alias Private Key: 7
20,817,495 UART: [art] Derive CDI
20,818,257 UART: [art] Store in in slot 0x4
20,877,559 UART: [art] Derive Key Pair
20,878,593 UART: [art] Store priv key in slot 0x5
23,341,896 UART: [art] Derive Key Pair - Done
23,355,122 UART: [art] Signing Cert with AUTHO
23,356,423 UART: RITY.KEYID = 7
25,068,211 UART: [art] Erasing AUTHORITY.KEYID = 7
25,069,723 UART: [art] PUB.X = ECE2F96CB385BD651574AE1E4EBD95659E804F91ADDDBBE953A158641B67730B2A92C150980E1DB8D8ABA0301A6A5981
25,077,029 UART: [art] PUB.Y = B42BEB1FD85640E52BD801BD3FDE1B93D2D37622290B4A9B24A73E0084A06DCB57EB2EB386EB6E616566E69E93A74F14
25,084,262 UART: [art] SIG.R = 5B5821409D2D845177AA5F2B6A9852C9E932CA754ACF7C102565CB04955AE1FFD2F68CC0C49CF4F24429C2338D5AEB21
25,091,689 UART: [art] SIG.S = F132DAB948C77FFAF85715350B4009CA44B0F71447468C99096ACCA2B62505CDBE02CCE83D805F72612BFF95961889C3
26,070,388 UART: Caliptra RT
26,071,094 UART: [state] CFI Enabled
26,235,968 UART: [rt] RT listening for mailbox commands...
26,267,002 UART: [rt]cmd =0x46504c54, len=4
26,268,797 >>> mbox cmd response data (8 bytes)
26,269,221 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,299,284 UART: [rt]cmd =0x46504c67, len=4
26,300,612 >>> mbox cmd response: failed
26,301,516 UART: [rt] FIPS self test
26,302,358 UART: [kat] ++
26,302,799 UART: [kat] sha1
26,307,284 UART: [kat] SHA2-256
26,309,114 UART: [kat] SHA2-384
26,311,924 UART: [kat] SHA2-512-ACC
26,314,166 UART: [kat] ECC-384
28,764,182 UART: [kat] HMAC-384Kdf
28,790,683 UART: [kat] LMS
28,987,881 UART: [kat] --
32,318,051 UART: [rt] Verify complete
32,439,038 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,468,771 UART: [rt]cmd =0x46504c67, len=4
32,470,277 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,439,336 ready_for_fw is high
3,439,819 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,738,356 >>> mbox cmd response: success
14,738,838 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,030,145 UART:
19,030,520 UART: Running Caliptra FMC ...
19,031,648 UART:
19,031,805 UART: [state] CFI Enabled
19,094,725 UART: [fht] FMC Alias Private Key: 7
20,858,810 UART: [art] Extend RT PCRs Done
20,860,024 UART: [art] Lock RT PCRs Done
20,861,737 UART: [art] Populate DV Done
20,867,422 UART: [fht] FMC Alias Private Key: 7
20,869,079 UART: [art] Derive CDI
20,869,819 UART: [art] Store in in slot 0x4
20,927,806 UART: [art] Derive Key Pair
20,928,806 UART: [art] Store priv key in slot 0x5
23,391,666 UART: [art] Derive Key Pair - Done
23,404,660 UART: [art] Signing Cert with AUTHO
23,405,962 UART: RITY.KEYID = 7
25,117,115 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,610 UART: [art] PUB.X = 1CD799D5DCBCA7D6090E959C90534B67B56FB374BD73E519BD80043356B89B793B1AA64168E167FD804A8EA83443E311
25,125,859 UART: [art] PUB.Y = 421058DB349D263BEE82009E9890DE956A08981CCC8B189EF611CC7593DCE6A4EE1A0CE2D19F237F8FE77C4B9267C0F0
25,133,118 UART: [art] SIG.R = DBEE198C52D4C7EF46A51BA6197D4705E78F549FFCAD9DD63BD50F3E23AD6D0F1FE358B6EC7FBAF21249F9877644A7DA
25,140,536 UART: [art] SIG.S = BBEA6A4D6AC3113322A8865F913E78676D5374804A6693C14606600428656FA21E21B3308B426AB39AAE50C8CC799FC2
26,119,671 UART: Caliptra RT
26,120,382 UART: [state] CFI Enabled
26,285,469 UART: [rt] RT listening for mailbox commands...
26,316,765 UART: [rt]cmd =0x46504c54, len=4
26,318,370 >>> mbox cmd response data (8 bytes)
26,318,770 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,348,805 UART: [rt]cmd =0x46504c67, len=4
26,350,101 >>> mbox cmd response: failed
26,351,424 UART: [rt] FIPS self test
26,352,366 UART: [kat] ++
26,352,814 UART: [kat] sha1
26,357,202 UART: [kat] SHA2-256
26,359,018 UART: [kat] SHA2-384
26,361,961 UART: [kat] SHA2-512-ACC
26,364,215 UART: [kat] ECC-384
28,813,060 UART: [kat] HMAC-384Kdf
28,819,379 UART: [kat] LMS
29,016,587 UART: [kat] --
32,326,683 UART: [rt] Verify complete
32,489,535 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,519,269 UART: [rt]cmd =0x46504c67, len=4
32,520,642 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,445 UART:
192,807 UART: Running Caliptra ROM ...
194,005 UART:
603,833 UART: [state] CFI Enabled
617,792 UART: [state] LifecycleState = Unprovisioned
620,049 UART: [state] DebugLocked = No
623,017 UART: [state] WD Timer not started. Device not locked for debugging
628,359 UART: [kat] SHA2-256
818,231 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,028 UART: [kat] ++
829,666 UART: [kat] sha1
842,041 UART: [kat] SHA2-256
845,058 UART: [kat] SHA2-384
851,199 UART: [kat] SHA2-512-ACC
853,783 UART: [kat] ECC-384
3,295,753 UART: [kat] HMAC-384Kdf
3,309,426 UART: [kat] LMS
3,841,232 UART: [kat] --
3,845,440 UART: [cold-reset] ++
3,846,477 UART: [fht] FHT @ 0x50003400
3,857,886 UART: [idev] ++
3,858,608 UART: [idev] CDI.KEYID = 6
3,859,651 UART: [idev] SUBJECT.KEYID = 7
3,860,762 UART: [idev] UDS.KEYID = 0
3,861,665 ready_for_fw is high
3,861,871 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
4,005,628 UART: [idev] Erasing UDS.KEYID = 0
6,337,918 UART: [idev] Sha1 KeyId Algorithm
6,361,264 UART: [idev] --
6,365,742 UART: [ldev] ++
6,366,423 UART: [ldev] CDI.KEYID = 6
6,367,307 UART: [ldev] SUBJECT.KEYID = 5
6,368,525 UART: [ldev] AUTHORITY.KEYID = 7
6,369,763 UART: [ldev] FE.KEYID = 1
6,380,722 UART: [ldev] Erasing FE.KEYID = 1
8,861,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,680 UART: [ldev] --
10,655,028 UART: [fwproc] Wait for Commands...
10,658,110 UART: [fwproc] Recv command 0x46574c44
10,660,428 UART: [fwproc] Recv'd Img size: 114168 bytes
14,109,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,190,281 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,306,405 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
14,848,093 >>> mbox cmd response: success
14,848,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,851,743 UART: [afmc] ++
14,852,439 UART: [afmc] CDI.KEYID = 6
14,853,703 UART: [afmc] SUBJECT.KEYID = 7
14,855,142 UART: [afmc] AUTHORITY.KEYID = 5
17,356,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,080,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,082,034 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,097,230 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,112,382 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,127,393 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,151,344 UART: [afmc] --
19,154,247 UART: [cold-reset] --
19,157,245 UART: [state] Locking Datavault
19,163,311 UART: [state] Locking PCR0, PCR1 and PCR31
19,165,515 UART: [state] Locking ICCM
19,167,241 UART: [exit] Launching FMC @ 0x40000130
19,175,863 UART:
19,176,100 UART: Running Caliptra FMC ...
19,177,224 UART:
19,177,391 UART: [state] CFI Enabled
19,185,155 UART: [fht] FMC Alias Private Key: 7
20,942,294 UART: [art] Extend RT PCRs Done
20,943,536 UART: [art] Lock RT PCRs Done
20,945,246 UART: [art] Populate DV Done
20,950,927 UART: [fht] FMC Alias Private Key: 7
20,952,628 UART: [art] Derive CDI
20,953,450 UART: [art] Store in in slot 0x4
20,996,273 UART: [art] Derive Key Pair
20,997,280 UART: [art] Store priv key in slot 0x5
23,424,414 UART: [art] Derive Key Pair - Done
23,437,700 UART: [art] Signing Cert with AUTHO
23,439,011 UART: RITY.KEYID = 7
25,144,844 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,354 UART: [art] PUB.X = 4058F1A13B28F971EB65951C097AD75603F00C2B9CEC98C2CB70E9630DB8512BDF3056C24380E449EE8E117322BA3BCC
25,153,628 UART: [art] PUB.Y = BF96B2394871C92F345FAF2949A1B0540E8536C7EA591B5C0660BB50470E8C32C6997155A08EBC1D3D454BA88297AC9E
25,160,881 UART: [art] SIG.R = 41471BD64A4CDBDD073E0E5F9480D4389EF04A8F6EF6443105602994B6463838AD84182F5878FAD811A4873DDE8CA341
25,168,247 UART: [art] SIG.S = 35E59F57B2C935631622360065EBF735EAF41B48DB6E872A6F705DE54342B9DDD907EBAFD1C8F12B3A0947DF937C02E9
26,147,354 UART: Caliptra RT
26,148,047 UART: [state] CFI Enabled
26,266,678 UART: [rt] RT listening for mailbox commands...
26,298,029 UART: [rt]cmd =0x46504c54, len=4
26,299,634 >>> mbox cmd response data (8 bytes)
26,300,096 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,330,229 UART: [rt]cmd =0x46504c67, len=4
26,331,685 >>> mbox cmd response: failed
26,332,618 UART: [rt] FIPS self test
26,333,545 UART: [kat] ++
26,334,026 UART: [kat] sha1
26,338,355 UART: [kat] SHA2-256
26,340,192 UART: [kat] SHA2-384
26,342,829 UART: [kat] SHA2-512-ACC
26,345,052 UART: [kat] ECC-384
28,772,429 UART: [kat] HMAC-384Kdf
28,778,283 UART: [kat] LMS
28,975,479 UART: [kat] --
32,305,279 UART: [rt] Verify complete
32,470,838 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,500,803 UART: [rt]cmd =0x46504c67, len=4
32,502,497 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,756,093 ready_for_fw is high
3,756,482 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
14,953,456 >>> mbox cmd response: success
14,954,131 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,203,050 UART:
19,203,451 UART: Running Caliptra FMC ...
19,204,581 UART:
19,204,742 UART: [state] CFI Enabled
19,212,617 UART: [fht] FMC Alias Private Key: 7
20,969,461 UART: [art] Extend RT PCRs Done
20,970,699 UART: [art] Lock RT PCRs Done
20,972,033 UART: [art] Populate DV Done
20,977,563 UART: [fht] FMC Alias Private Key: 7
20,979,268 UART: [art] Derive CDI
20,980,083 UART: [art] Store in in slot 0x4
21,022,840 UART: [art] Derive Key Pair
21,023,859 UART: [art] Store priv key in slot 0x5
23,450,484 UART: [art] Derive Key Pair - Done
23,463,583 UART: [art] Signing Cert with AUTHO
23,464,881 UART: RITY.KEYID = 7
25,170,130 UART: [art] Erasing AUTHORITY.KEYID = 7
25,171,645 UART: [art] PUB.X = 1047EA18A5E0D9568598C8160A04A3FC5204148FCA967DE8CECE347D65761FA64CDD94F593B5A8F14CCC9BCC892CF262
25,178,907 UART: [art] PUB.Y = DC9A42124F8A5AC5E37C93DEA9DFD51586A9034E4688257543355EBE63E6CABA831A5BC076ADD2D6A98E56B7F262EE74
25,186,184 UART: [art] SIG.R = 4500C7E56942866940250B4D94902ECDBDBC8A73D72F8E72CD02D449EACFA6B48E68B5893396AD6E1E0FB53F861EC259
25,193,602 UART: [art] SIG.S = A0DA46A20008B22104F3ADB85D50E571147049B434523EB7DEC0694F29A64D80757E84C31A55A7F4334822E7FD860B8A
26,171,672 UART: Caliptra RT
26,172,383 UART: [state] CFI Enabled
26,289,206 UART: [rt] RT listening for mailbox commands...
26,320,389 UART: [rt]cmd =0x46504c54, len=4
26,322,214 >>> mbox cmd response data (8 bytes)
26,322,644 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,353,049 UART: [rt]cmd =0x46504c67, len=4
26,354,421 >>> mbox cmd response: failed
26,355,870 UART: [rt] FIPS self test
26,356,798 UART: [kat] ++
26,357,248 UART: [kat] sha1
26,361,697 UART: [kat] SHA2-256
26,363,514 UART: [kat] SHA2-384
26,366,404 UART: [kat] SHA2-512-ACC
26,368,619 UART: [kat] ECC-384
28,795,860 UART: [kat] HMAC-384Kdf
28,801,797 UART: [kat] LMS
28,998,979 UART: [kat] --
32,310,515 UART: [rt] Verify complete
32,493,044 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,522,887 UART: [rt]cmd =0x46504c67, len=4
32,524,521 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,227 UART: [kat] SHA2-256
892,165 UART: [kat] SHA2-384
894,906 UART: [kat] SHA2-512-ACC
896,807 UART: [kat] ECC-384
902,376 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,129 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,566 UART: [idev] ++
1,479,734 UART: [idev] CDI.KEYID = 6
1,480,094 UART: [idev] SUBJECT.KEYID = 7
1,480,518 UART: [idev] UDS.KEYID = 0
1,480,863 ready_for_fw is high
1,480,863 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,488,322 UART: [idev] Erasing UDS.KEYID = 0
1,504,384 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,796 UART: [idev] --
1,513,923 UART: [ldev] ++
1,514,091 UART: [ldev] CDI.KEYID = 6
1,514,454 UART: [ldev] SUBJECT.KEYID = 5
1,514,880 UART: [ldev] AUTHORITY.KEYID = 7
1,515,343 UART: [ldev] FE.KEYID = 1
1,520,529 UART: [ldev] Erasing FE.KEYID = 1
1,545,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,176 UART: [ldev] --
1,585,519 UART: [fwproc] Waiting for Commands...
1,586,224 UART: [fwproc] Received command 0x46574c44
1,587,015 UART: [fwproc] Received Image of size 114168 bytes
2,883,159 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,910,391 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,939,743 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,075,362 >>> mbox cmd response: success
3,075,362 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,076,412 UART: [afmc] ++
3,076,580 UART: [afmc] CDI.KEYID = 6
3,076,942 UART: [afmc] SUBJECT.KEYID = 7
3,077,367 UART: [afmc] AUTHORITY.KEYID = 5
3,111,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,128,642 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,129,422 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,135,150 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,141,035 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,146,725 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,154,826 UART: [afmc] --
3,155,838 UART: [cold-reset] --
3,156,628 UART: [state] Locking Datavault
3,157,687 UART: [state] Locking PCR0, PCR1 and PCR31
3,158,291 UART: [state] Locking ICCM
3,158,917 UART: [exit] Launching FMC @ 0x40000130
3,164,246 UART:
3,164,262 UART: Running Caliptra FMC ...
3,164,670 UART:
3,164,724 UART: [state] CFI Enabled
3,175,215 UART: [fht] FMC Alias Private Key: 7
3,282,182 UART: [art] Extend RT PCRs Done
3,282,610 UART: [art] Lock RT PCRs Done
3,284,152 UART: [art] Populate DV Done
3,292,105 UART: [fht] FMC Alias Private Key: 7
3,293,147 UART: [art] Derive CDI
3,293,427 UART: [art] Store in in slot 0x4
3,379,088 UART: [art] Derive Key Pair
3,379,448 UART: [art] Store priv key in slot 0x5
3,391,954 UART: [art] Derive Key Pair - Done
3,406,963 UART: [art] Signing Cert with AUTHO
3,407,443 UART: RITY.KEYID = 7
3,423,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,423,826 UART: [art] PUB.X = 31E370C955B0D495D9A2D0ADEA4141044C11071740F8E5ACD9C5EF8A62DED414844EA286EDA45D544199EDD3401F49E9
3,430,598 UART: [art] PUB.Y = C891EB9F02C1342929B7073F3A22C29DE49E7269CE0B5C1CBC08CF6045C78F01AA14A212C9AB1022153D9099A4D9FE9C
3,437,541 UART: [art] SIG.R = 7005112C48E11E9AE5E9AFD573EF78DD0D56F093F9D969A744E3EFC3592947F08A6EA356DBB53C636E834BBCB1C6B843
3,444,317 UART: [art] SIG.S = C44918F1A14AB5DC7E25E3EE48ADD889DF2524F6098C0F1506F2112EE058699D277F5E0273219111E4A31AC02C0B3052
3,467,737 UART: Caliptra RT
3,467,990 UART: [state] CFI Enabled
3,576,099 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,606,549 UART: [rt]cmd =0x46504c54, len=4
3,607,601 >>> mbox cmd response data (8 bytes)
3,607,602 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,637,227 UART: [rt]cmd =0x46504c67, len=4
3,637,983 >>> mbox cmd response: failed
3,638,261 UART: [rt] FIPS self test
3,638,592 UART: [kat] ++
3,638,744 UART: [kat] sha1
3,643,053 UART: [kat] SHA2-256
3,644,983 UART: [kat] SHA2-384
3,647,924 UART: [kat] SHA2-512-ACC
3,649,819 UART: [kat] ECC-384
3,659,322 UART: [kat] HMAC-384Kdf
3,664,037 UART: [kat] LMS
3,912,928 UART: [kat] --
6,130,617 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,137,733 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,166,967 UART: [rt]cmd =0x46504c67, len=4
6,168,138 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,449 ready_for_fw is high
1,362,449 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,924,586 >>> mbox cmd response: success
2,924,586 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,986,832 UART:
2,986,848 UART: Running Caliptra FMC ...
2,987,256 UART:
2,987,310 UART: [state] CFI Enabled
2,997,471 UART: [fht] FMC Alias Private Key: 7
3,105,758 UART: [art] Extend RT PCRs Done
3,106,186 UART: [art] Lock RT PCRs Done
3,107,980 UART: [art] Populate DV Done
3,116,121 UART: [fht] FMC Alias Private Key: 7
3,117,097 UART: [art] Derive CDI
3,117,377 UART: [art] Store in in slot 0x4
3,203,260 UART: [art] Derive Key Pair
3,203,620 UART: [art] Store priv key in slot 0x5
3,216,720 UART: [art] Derive Key Pair - Done
3,231,329 UART: [art] Signing Cert with AUTHO
3,231,809 UART: RITY.KEYID = 7
3,246,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,247,586 UART: [art] PUB.X = 98AEAFF30FD81AA18F1C2665EF4B22FD776D6D971F9A2A916685BFF489A4175B1B7AD5DDC502DD20E00E5B2054739A49
3,254,361 UART: [art] PUB.Y = DBBCD33B60E9FB3064EEF144944BECBD10FAE808B295C171AF76EDE715A2FCE4672CCA8A83EB0980212B56CA9EE5018B
3,261,326 UART: [art] SIG.R = 5F0ECB9FD160267290C0328ADA431A8060A8508C185D41A97744F0464BE13EF7B659796256FCE9B67E2C5BEE7FF6D3F4
3,268,099 UART: [art] SIG.S = FDCA964F2546D3DB32BE8E7BC89AE02A9851B3D7586A732FEF5FDEA7C62C03BA55B91F3DBD878E6675F0DC44DEA2EA9C
3,291,885 UART: Caliptra RT
3,292,138 UART: [state] CFI Enabled
3,400,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,430,867 UART: [rt]cmd =0x46504c54, len=4
3,432,135 >>> mbox cmd response data (8 bytes)
3,432,136 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,461,887 UART: [rt]cmd =0x46504c67, len=4
3,462,971 >>> mbox cmd response: failed
3,463,211 UART: [rt] FIPS self test
3,463,542 UART: [kat] ++
3,463,694 UART: [kat] sha1
3,467,877 UART: [kat] SHA2-256
3,469,807 UART: [kat] SHA2-384
3,472,502 UART: [kat] SHA2-512-ACC
3,474,397 UART: [kat] ECC-384
3,484,094 UART: [kat] HMAC-384Kdf
3,488,795 UART: [kat] LMS
3,737,686 UART: [kat] --
5,847,485 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,852,732 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,882,194 UART: [rt]cmd =0x46504c67, len=4
5,883,473 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
890,900 UART: [kat] SHA2-256
892,838 UART: [kat] SHA2-384
895,449 UART: [kat] SHA2-512-ACC
897,350 UART: [kat] ECC-384
903,195 UART: [kat] HMAC-384Kdf
908,013 UART: [kat] LMS
1,476,209 UART: [kat] --
1,477,214 UART: [cold-reset] ++
1,477,670 UART: [fht] Storing FHT @ 0x50003400
1,480,485 UART: [idev] ++
1,480,653 UART: [idev] CDI.KEYID = 6
1,481,013 UART: [idev] SUBJECT.KEYID = 7
1,481,437 UART: [idev] UDS.KEYID = 0
1,481,782 ready_for_fw is high
1,481,782 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,489,573 UART: [idev] Erasing UDS.KEYID = 0
1,505,811 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,583 UART: [idev] --
1,515,548 UART: [ldev] ++
1,515,716 UART: [ldev] CDI.KEYID = 6
1,516,079 UART: [ldev] SUBJECT.KEYID = 5
1,516,505 UART: [ldev] AUTHORITY.KEYID = 7
1,516,968 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,548,243 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,351 UART: [ldev] --
1,587,748 UART: [fwproc] Waiting for Commands...
1,588,363 UART: [fwproc] Received command 0x46574c44
1,589,154 UART: [fwproc] Received Image of size 114168 bytes
2,884,970 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,092 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,087 >>> mbox cmd response: success
3,078,087 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,079,293 UART: [afmc] ++
3,079,461 UART: [afmc] CDI.KEYID = 6
3,079,823 UART: [afmc] SUBJECT.KEYID = 7
3,080,248 UART: [afmc] AUTHORITY.KEYID = 5
3,115,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,157 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,937 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,665 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,550 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,240 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,158,167 UART: [afmc] --
3,159,099 UART: [cold-reset] --
3,159,797 UART: [state] Locking Datavault
3,160,944 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,548 UART: [state] Locking ICCM
3,162,028 UART: [exit] Launching FMC @ 0x40000130
3,167,357 UART:
3,167,373 UART: Running Caliptra FMC ...
3,167,781 UART:
3,167,924 UART: [state] CFI Enabled
3,178,491 UART: [fht] FMC Alias Private Key: 7
3,286,674 UART: [art] Extend RT PCRs Done
3,287,102 UART: [art] Lock RT PCRs Done
3,288,648 UART: [art] Populate DV Done
3,296,763 UART: [fht] FMC Alias Private Key: 7
3,297,721 UART: [art] Derive CDI
3,298,001 UART: [art] Store in in slot 0x4
3,383,462 UART: [art] Derive Key Pair
3,383,822 UART: [art] Store priv key in slot 0x5
3,397,408 UART: [art] Derive Key Pair - Done
3,412,394 UART: [art] Signing Cert with AUTHO
3,412,874 UART: RITY.KEYID = 7
3,428,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,429,209 UART: [art] PUB.X = 55206B6123EE07A78B6F22468568422B36109219F57EC054A1E24A548A244AA58DA96E108ABF95DDEF90532BDA97F6FA
3,435,978 UART: [art] PUB.Y = 9848E839A5ADDFA7C33BD53094A8E1D66AD87388EB8E6474F9B1108F66503F3FA1FF2A8908ECF721A4F38CAD1352D2C4
3,442,937 UART: [art] SIG.R = 351435F0901F59B1133BCB33F28A815AC71C0D2C8AE519C38A6E6A9890B70E1ED42B480EB9358B14CFE161A914B859FB
3,449,704 UART: [art] SIG.S = 85C1658FC7F63129B360ECC94758706559497A12DF878A79FCA7480A877B10854136CBBB8E129F19C248D524FE00BC4E
3,473,146 UART: Caliptra RT
3,473,491 UART: [state] CFI Enabled
3,581,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,612,460 UART: [rt]cmd =0x46504c54, len=4
3,613,706 >>> mbox cmd response data (8 bytes)
3,613,707 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,643,280 UART: [rt]cmd =0x46504c67, len=4
3,644,214 >>> mbox cmd response: failed
3,644,384 UART: [rt] FIPS self test
3,644,715 UART: [kat] ++
3,644,867 UART: [kat] sha1
3,648,934 UART: [kat] SHA2-256
3,650,864 UART: [kat] SHA2-384
3,653,543 UART: [kat] SHA2-512-ACC
3,655,438 UART: [kat] ECC-384
3,665,567 UART: [kat] HMAC-384Kdf
3,670,040 UART: [kat] LMS
3,918,931 UART: [kat] --
6,136,158 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,143,964 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
6,173,410 UART: [rt]cmd =0x46504c67, len=4
6,174,507 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,264 ready_for_fw is high
1,363,264 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,093 >>> mbox cmd response: success
2,926,093 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,988,365 UART:
2,988,381 UART: Running Caliptra FMC ...
2,988,789 UART:
2,988,932 UART: [state] CFI Enabled
2,999,421 UART: [fht] FMC Alias Private Key: 7
3,107,298 UART: [art] Extend RT PCRs Done
3,107,726 UART: [art] Lock RT PCRs Done
3,109,440 UART: [art] Populate DV Done
3,117,315 UART: [fht] FMC Alias Private Key: 7
3,118,365 UART: [art] Derive CDI
3,118,645 UART: [art] Store in in slot 0x4
3,204,040 UART: [art] Derive Key Pair
3,204,400 UART: [art] Store priv key in slot 0x5
3,217,502 UART: [art] Derive Key Pair - Done
3,232,755 UART: [art] Signing Cert with AUTHO
3,233,235 UART: RITY.KEYID = 7
3,248,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,556 UART: [art] PUB.X = 23B015ED694BC2A7500218C6FBA526E350BE47884523A20E5C8692469832040185833599A666E09AF0335DD579DAE6BA
3,256,306 UART: [art] PUB.Y = 28092835B3DE928C4619BE2EEB9845BE19E122D6092EF90E84386F5E0E8883467B92FE9B2D02CEA2F6C05D76675F542E
3,263,243 UART: [art] SIG.R = 2D7862FB0B856BA6BC8602CF1F2EC6A8830037E77589EDACDA6E4B34AD30A9BBB01D71B29BF68FC6E5893109E8386778
3,269,994 UART: [art] SIG.S = 3BEAF3A7AB44B9030B3E3713AA877C9D87F210BF3F8F5B42CABB2FAA371C9B9962D4E3E8E587DA232678B71298E2F549
3,293,465 UART: Caliptra RT
3,293,810 UART: [state] CFI Enabled
3,402,514 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,432,890 UART: [rt]cmd =0x46504c54, len=4
3,434,254 >>> mbox cmd response data (8 bytes)
3,434,255 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,463,970 UART: [rt]cmd =0x46504c67, len=4
3,464,984 >>> mbox cmd response: failed
3,465,296 UART: [rt] FIPS self test
3,465,627 UART: [kat] ++
3,465,779 UART: [kat] sha1
3,470,006 UART: [kat] SHA2-256
3,471,936 UART: [kat] SHA2-384
3,474,801 UART: [kat] SHA2-512-ACC
3,476,696 UART: [kat] ECC-384
3,486,699 UART: [kat] HMAC-384Kdf
3,491,398 UART: [kat] LMS
3,740,289 UART: [kat] --
5,850,080 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,854,745 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,884,159 UART: [rt]cmd =0x46504c67, len=4
5,885,354 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
893,264 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,389 UART: [kat] ++
897,541 UART: [kat] sha1
901,665 UART: [kat] SHA2-256
903,605 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,780 UART: [kat] HMAC-384Kdf
922,422 UART: [kat] LMS
1,170,750 UART: [kat] --
1,171,659 UART: [cold-reset] ++
1,172,111 UART: [fht] FHT @ 0x50003400
1,174,882 UART: [idev] ++
1,175,050 UART: [idev] CDI.KEYID = 6
1,175,410 UART: [idev] SUBJECT.KEYID = 7
1,175,834 UART: [idev] UDS.KEYID = 0
1,176,179 ready_for_fw is high
1,176,179 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,184,016 UART: [idev] Erasing UDS.KEYID = 0
1,201,129 UART: [idev] Sha1 KeyId Algorithm
1,209,803 UART: [idev] --
1,210,843 UART: [ldev] ++
1,211,011 UART: [ldev] CDI.KEYID = 6
1,211,374 UART: [ldev] SUBJECT.KEYID = 5
1,211,800 UART: [ldev] AUTHORITY.KEYID = 7
1,212,263 UART: [ldev] FE.KEYID = 1
1,217,375 UART: [ldev] Erasing FE.KEYID = 1
1,243,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,055 UART: [ldev] --
1,282,544 UART: [fwproc] Wait for Commands...
1,283,120 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,608,412 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,716 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,773,317 >>> mbox cmd response: success
2,773,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,774,375 UART: [afmc] ++
2,774,543 UART: [afmc] CDI.KEYID = 6
2,774,905 UART: [afmc] SUBJECT.KEYID = 7
2,775,330 UART: [afmc] AUTHORITY.KEYID = 5
2,810,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,827,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,958 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,686 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,571 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,845,290 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,853,040 UART: [afmc] --
2,853,986 UART: [cold-reset] --
2,854,788 UART: [state] Locking Datavault
2,856,151 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,755 UART: [state] Locking ICCM
2,857,313 UART: [exit] Launching FMC @ 0x40000130
2,862,642 UART:
2,862,658 UART: Running Caliptra FMC ...
2,863,066 UART:
2,863,120 UART: [state] CFI Enabled
2,873,535 UART: [fht] FMC Alias Private Key: 7
2,980,326 UART: [art] Extend RT PCRs Done
2,980,754 UART: [art] Lock RT PCRs Done
2,982,178 UART: [art] Populate DV Done
2,990,653 UART: [fht] FMC Alias Private Key: 7
2,991,583 UART: [art] Derive CDI
2,991,863 UART: [art] Store in in slot 0x4
3,077,100 UART: [art] Derive Key Pair
3,077,460 UART: [art] Store priv key in slot 0x5
3,090,512 UART: [art] Derive Key Pair - Done
3,105,592 UART: [art] Signing Cert with AUTHO
3,106,072 UART: RITY.KEYID = 7
3,121,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,179 UART: [art] PUB.X = 334E625F592BA63B81731CE53B136D966CBFB178DCA68B8406B032308C72412C348F5A9EF9A5B309903DC5079DB38EB5
3,128,942 UART: [art] PUB.Y = 1CF6615CD6AA6FCA996BADCB85A8F8AFD91C70E7E2FEB1B92A66B82D27B6A445609BC8940F0ADC426F898903713308CE
3,135,898 UART: [art] SIG.R = 5499EC2F15B86577090785D981A204161618FFB4182551DD21CD005CE55A13E3E6BC354B357E53F688AE2E67229EAD6C
3,142,635 UART: [art] SIG.S = 500A49ADE48B23BC1257293374F1F22EF3C7224F2D963FB46B65C63FD67BAC0595F2BE580B5A05DB9F4E941C5EF1B3E1
3,166,108 UART: Caliptra RT
3,166,361 UART: [state] CFI Enabled
3,274,156 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,896 UART: [rt]cmd =0x46504c54, len=4
3,306,044 >>> mbox cmd response data (8 bytes)
3,306,045 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,335,768 UART: [rt]cmd =0x46504c67, len=4
3,336,572 >>> mbox cmd response: failed
3,336,746 UART: [rt] FIPS self test
3,337,077 UART: [kat] ++
3,337,229 UART: [kat] sha1
3,341,486 UART: [kat] SHA2-256
3,343,416 UART: [kat] SHA2-384
3,346,193 UART: [kat] SHA2-512-ACC
3,348,088 UART: [kat] ECC-384
3,357,893 UART: [kat] HMAC-384Kdf
3,362,546 UART: [kat] LMS
3,611,437 UART: [kat] --
5,838,178 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,846,321 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,787 UART: [rt]cmd =0x46504c67, len=4
5,877,002 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,865 ready_for_fw is high
1,059,865 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,623,876 >>> mbox cmd response: success
2,623,876 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,686,094 UART:
2,686,110 UART: Running Caliptra FMC ...
2,686,518 UART:
2,686,572 UART: [state] CFI Enabled
2,697,207 UART: [fht] FMC Alias Private Key: 7
2,805,432 UART: [art] Extend RT PCRs Done
2,805,860 UART: [art] Lock RT PCRs Done
2,807,380 UART: [art] Populate DV Done
2,815,533 UART: [fht] FMC Alias Private Key: 7
2,816,539 UART: [art] Derive CDI
2,816,819 UART: [art] Store in in slot 0x4
2,902,602 UART: [art] Derive Key Pair
2,902,962 UART: [art] Store priv key in slot 0x5
2,916,110 UART: [art] Derive Key Pair - Done
2,930,996 UART: [art] Signing Cert with AUTHO
2,931,476 UART: RITY.KEYID = 7
2,946,296 UART: [art] Erasing AUTHORITY.KEYID = 7
2,947,061 UART: [art] PUB.X = 47474FC97C67E80604B59D06034347F9858800A91D709629E962F3AB14A5F6C84D796D842E0C13F36DA805AA237ADB24
2,953,785 UART: [art] PUB.Y = 7E942CBA7B799B48DBD86A7DD6E0E874E3C760F9EFA7014DE6638E619FB0EB3A1E14ECE7E3C650040FC089B3F6A78F97
2,960,744 UART: [art] SIG.R = 12510EBEE2671D0723F09F7C5B43BA03138D2DAE1B44FB494F070AEDAF95BF0B918D209491907F394A5EF7EB1ADFC433
2,967,510 UART: [art] SIG.S = C4885992DC2C61E13AE8F214D6E9141EAC10E2AA6A2A15517E346857537B99557A6EC0B812311A663364EFC1AA2E7F05
2,991,406 UART: Caliptra RT
2,991,659 UART: [state] CFI Enabled
3,099,446 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,130,118 UART: [rt]cmd =0x46504c54, len=4
3,131,336 >>> mbox cmd response data (8 bytes)
3,131,337 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,161,392 UART: [rt]cmd =0x46504c67, len=4
3,162,384 >>> mbox cmd response: failed
3,162,498 UART: [rt] FIPS self test
3,162,829 UART: [kat] ++
3,162,981 UART: [kat] sha1
3,167,282 UART: [kat] SHA2-256
3,169,212 UART: [kat] SHA2-384
3,171,959 UART: [kat] SHA2-512-ACC
3,173,854 UART: [kat] ECC-384
3,183,773 UART: [kat] HMAC-384Kdf
3,188,140 UART: [kat] LMS
3,437,031 UART: [kat] --
5,558,686 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,562,144 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,591,356 UART: [rt]cmd =0x46504c67, len=4
5,592,339 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,891 UART: [state] LifecycleState = Unprovisioned
85,546 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
893,069 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,194 UART: [kat] ++
897,346 UART: [kat] sha1
901,522 UART: [kat] SHA2-256
903,462 UART: [kat] SHA2-384
906,121 UART: [kat] SHA2-512-ACC
908,022 UART: [kat] ECC-384
917,743 UART: [kat] HMAC-384Kdf
922,479 UART: [kat] LMS
1,170,807 UART: [kat] --
1,171,664 UART: [cold-reset] ++
1,172,094 UART: [fht] FHT @ 0x50003400
1,174,807 UART: [idev] ++
1,174,975 UART: [idev] CDI.KEYID = 6
1,175,335 UART: [idev] SUBJECT.KEYID = 7
1,175,759 UART: [idev] UDS.KEYID = 0
1,176,104 ready_for_fw is high
1,176,104 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,901 UART: [idev] Erasing UDS.KEYID = 0
1,201,458 UART: [idev] Sha1 KeyId Algorithm
1,209,900 UART: [idev] --
1,211,022 UART: [ldev] ++
1,211,190 UART: [ldev] CDI.KEYID = 6
1,211,553 UART: [ldev] SUBJECT.KEYID = 5
1,211,979 UART: [ldev] AUTHORITY.KEYID = 7
1,212,442 UART: [ldev] FE.KEYID = 1
1,217,290 UART: [ldev] Erasing FE.KEYID = 1
1,244,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,041 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,036 UART: [ldev] --
1,283,377 UART: [fwproc] Wait for Commands...
1,284,157 UART: [fwproc] Recv command 0x46574c44
1,284,885 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,567 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,871 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,322 >>> mbox cmd response: success
2,772,322 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,773,452 UART: [afmc] ++
2,773,620 UART: [afmc] CDI.KEYID = 6
2,773,982 UART: [afmc] SUBJECT.KEYID = 7
2,774,407 UART: [afmc] AUTHORITY.KEYID = 5
2,810,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,251 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,979 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,864 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,583 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,583 UART: [afmc] --
2,853,627 UART: [cold-reset] --
2,854,559 UART: [state] Locking Datavault
2,855,738 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,342 UART: [state] Locking ICCM
2,856,926 UART: [exit] Launching FMC @ 0x40000130
2,862,255 UART:
2,862,271 UART: Running Caliptra FMC ...
2,862,679 UART:
2,862,822 UART: [state] CFI Enabled
2,873,461 UART: [fht] FMC Alias Private Key: 7
2,981,312 UART: [art] Extend RT PCRs Done
2,981,740 UART: [art] Lock RT PCRs Done
2,983,524 UART: [art] Populate DV Done
2,991,879 UART: [fht] FMC Alias Private Key: 7
2,992,909 UART: [art] Derive CDI
2,993,189 UART: [art] Store in in slot 0x4
3,078,564 UART: [art] Derive Key Pair
3,078,924 UART: [art] Store priv key in slot 0x5
3,091,842 UART: [art] Derive Key Pair - Done
3,106,797 UART: [art] Signing Cert with AUTHO
3,107,277 UART: RITY.KEYID = 7
3,122,549 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,314 UART: [art] PUB.X = 43E7544FF2E077EEC3963B2E88927FA0A0FD327AADBFA3F487F1193C4CB907AC7F9DE7682CFC6CC77663B9F196DDA2D8
3,130,101 UART: [art] PUB.Y = 4C2D4F0164FF491AFC9F3ECCAFA12DA3A2C68D03F666D330C2402C00682B2A940375FAC3D747FE728BDCC580FEEB22C9
3,137,040 UART: [art] SIG.R = 14723749B7D30D6221F6E69B7A6DDE8C5E7ABED45BD2E6BE3C1000B6FD986F1E7A308C686954F84934D36CDEDFA8F7FB
3,143,803 UART: [art] SIG.S = 4D4F8692B5FB3228AE266B80C0115A522E0A8C21FC602E33C58F245602897B1C8DAD0F7B977F4B800DC2A8579C617F47
3,167,540 UART: Caliptra RT
3,167,885 UART: [state] CFI Enabled
3,276,946 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,426 UART: [rt]cmd =0x46504c54, len=4
3,308,512 >>> mbox cmd response data (8 bytes)
3,308,513 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,338,160 UART: [rt]cmd =0x46504c67, len=4
3,339,136 >>> mbox cmd response: failed
3,339,384 UART: [rt] FIPS self test
3,339,715 UART: [kat] ++
3,339,867 UART: [kat] sha1
3,344,210 UART: [kat] SHA2-256
3,346,140 UART: [kat] SHA2-384
3,348,877 UART: [kat] SHA2-512-ACC
3,350,772 UART: [kat] ECC-384
3,360,595 UART: [kat] HMAC-384Kdf
3,365,150 UART: [kat] LMS
3,614,041 UART: [kat] --
5,840,928 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,848,885 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,878,271 UART: [rt]cmd =0x46504c67, len=4
5,879,542 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,756 ready_for_fw is high
1,060,756 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,915 >>> mbox cmd response: success
2,625,915 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,688,575 UART:
2,688,591 UART: Running Caliptra FMC ...
2,688,999 UART:
2,689,142 UART: [state] CFI Enabled
2,699,899 UART: [fht] FMC Alias Private Key: 7
2,807,366 UART: [art] Extend RT PCRs Done
2,807,794 UART: [art] Lock RT PCRs Done
2,809,188 UART: [art] Populate DV Done
2,817,583 UART: [fht] FMC Alias Private Key: 7
2,818,641 UART: [art] Derive CDI
2,818,921 UART: [art] Store in in slot 0x4
2,904,650 UART: [art] Derive Key Pair
2,905,010 UART: [art] Store priv key in slot 0x5
2,918,096 UART: [art] Derive Key Pair - Done
2,932,897 UART: [art] Signing Cert with AUTHO
2,933,377 UART: RITY.KEYID = 7
2,948,891 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,656 UART: [art] PUB.X = 8FF700975C5047B0BAFD9B27CFCE91E732E94923337D1F249F1DC8FEC3E259256D3B5112268B0AC2D8A759035BACE1C3
2,956,408 UART: [art] PUB.Y = 8BD91812D66D612D20C26C962C411B0580F1AB5B9CEB527438523DDCAC4E98DF7C1002A454EAAC5E9990DBE8256D67A4
2,963,362 UART: [art] SIG.R = CABEF99A69E5C6708B5E720412D3AAF14088B70FA061D80E3B2B760FEA27F304524FF7C69A481DF1FA841FC768C080D2
2,970,129 UART: [art] SIG.S = 23294B7DAFA1F60678DEF88C77412EAA0B2E3F69A841406BC2F80F36DDD6BFC67A174EC366F58C1793271C8A9001184D
2,994,076 UART: Caliptra RT
2,994,421 UART: [state] CFI Enabled
3,102,116 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,510 UART: [rt]cmd =0x46504c54, len=4
3,133,596 >>> mbox cmd response data (8 bytes)
3,133,597 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,163,386 UART: [rt]cmd =0x46504c67, len=4
3,164,218 >>> mbox cmd response: failed
3,164,390 UART: [rt] FIPS self test
3,164,721 UART: [kat] ++
3,164,873 UART: [kat] sha1
3,169,270 UART: [kat] SHA2-256
3,171,200 UART: [kat] SHA2-384
3,173,767 UART: [kat] SHA2-512-ACC
3,175,662 UART: [kat] ECC-384
3,185,457 UART: [kat] HMAC-384Kdf
3,190,032 UART: [kat] LMS
3,438,923 UART: [kat] --
5,561,408 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,563,978 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,593,284 UART: [rt]cmd =0x46504c67, len=4
5,594,339 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
915,652 UART: [kat] HMAC-384Kdf
920,074 UART: [kat] LMS
1,168,386 UART: [kat] --
1,169,201 UART: [cold-reset] ++
1,169,707 UART: [fht] FHT @ 0x50003400
1,172,283 UART: [idev] ++
1,172,451 UART: [idev] CDI.KEYID = 6
1,172,812 UART: [idev] SUBJECT.KEYID = 7
1,173,237 UART: [idev] UDS.KEYID = 0
1,173,583 ready_for_fw is high
1,173,583 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,181,043 UART: [idev] Erasing UDS.KEYID = 0
1,198,125 UART: [idev] Sha1 KeyId Algorithm
1,206,879 UART: [idev] --
1,207,738 UART: [ldev] ++
1,207,906 UART: [ldev] CDI.KEYID = 6
1,208,270 UART: [ldev] SUBJECT.KEYID = 5
1,208,697 UART: [ldev] AUTHORITY.KEYID = 7
1,209,160 UART: [ldev] FE.KEYID = 1
1,214,218 UART: [ldev] Erasing FE.KEYID = 1
1,240,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,282 UART: [ldev] --
1,279,740 UART: [fwproc] Wait for Commands...
1,280,503 UART: [fwproc] Recv command 0x46574c44
1,281,236 UART: [fwproc] Recv'd Img size: 114168 bytes
2,576,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,604,120 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,633,429 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,768,981 >>> mbox cmd response: success
2,768,981 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,770,146 UART: [afmc] ++
2,770,314 UART: [afmc] CDI.KEYID = 6
2,770,677 UART: [afmc] SUBJECT.KEYID = 7
2,771,103 UART: [afmc] AUTHORITY.KEYID = 5
2,806,642 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,822,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,823,739 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,829,468 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,835,351 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,841,070 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,848,975 UART: [afmc] --
2,849,879 UART: [cold-reset] --
2,850,817 UART: [state] Locking Datavault
2,851,756 UART: [state] Locking PCR0, PCR1 and PCR31
2,852,360 UART: [state] Locking ICCM
2,853,000 UART: [exit] Launching FMC @ 0x40000130
2,858,329 UART:
2,858,345 UART: Running Caliptra FMC ...
2,858,753 UART:
2,858,807 UART: [state] CFI Enabled
2,868,988 UART: [fht] FMC Alias Private Key: 7
2,977,301 UART: [art] Extend RT PCRs Done
2,977,729 UART: [art] Lock RT PCRs Done
2,979,355 UART: [art] Populate DV Done
2,987,616 UART: [fht] FMC Alias Private Key: 7
2,988,758 UART: [art] Derive CDI
2,989,038 UART: [art] Store in in slot 0x4
3,074,417 UART: [art] Derive Key Pair
3,074,777 UART: [art] Store priv key in slot 0x5
3,088,397 UART: [art] Derive Key Pair - Done
3,102,737 UART: [art] Signing Cert with AUTHO
3,103,217 UART: RITY.KEYID = 7
3,118,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,118,932 UART: [art] PUB.X = E459E9079921CC14083426303DC4DE345376F5BBCB46CE1D2178A57D30D0DE9351E7FE227D3B27C2017AFE305D08273C
3,125,692 UART: [art] PUB.Y = 3DB69A33930F07721B179E0F810FD9B90AE43623FEEA378F0317B45A379D1CD4C6CA56F0AC3C615B90F99E5FA7C3C209
3,132,631 UART: [art] SIG.R = 58A29DB18590D161BE727E06C5A48F7F3B7262C0B12211A75F82AA0DC7ABD0250EC5A7F5D43AE498D3AA1C04AE9A7314
3,139,401 UART: [art] SIG.S = 2687CD0FB80080F78FB1693306D61F78745FBDD19096C246C52A170F814EF316DA08F911CBE89D7BD871F2B0E0235BAF
3,163,572 UART: Caliptra RT
3,163,825 UART: [state] CFI Enabled
3,272,032 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,302,488 UART: [rt]cmd =0x46504c54, len=4
3,303,618 >>> mbox cmd response data (8 bytes)
3,303,619 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,333,320 UART: [rt]cmd =0x46504c67, len=4
3,334,374 >>> mbox cmd response: failed
3,334,606 UART: [rt] FIPS self test
3,334,937 UART: [kat] ++
3,335,089 UART: [kat] sha1
3,339,082 UART: [kat] SHA2-256
3,341,012 UART: [kat] SHA2-384
3,343,635 UART: [kat] SHA2-512-ACC
3,345,530 UART: [kat] ECC-384
3,355,145 UART: [kat] HMAC-384Kdf
3,359,712 UART: [kat] LMS
3,608,603 UART: [kat] --
5,832,620 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,834,124 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,863,582 UART: [rt]cmd =0x46504c67, len=4
5,864,699 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,524 ready_for_fw is high
1,056,524 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,657 >>> mbox cmd response: success
2,620,657 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,682,399 UART:
2,682,415 UART: Running Caliptra FMC ...
2,682,823 UART:
2,682,877 UART: [state] CFI Enabled
2,693,752 UART: [fht] FMC Alias Private Key: 7
2,801,747 UART: [art] Extend RT PCRs Done
2,802,175 UART: [art] Lock RT PCRs Done
2,803,585 UART: [art] Populate DV Done
2,811,804 UART: [fht] FMC Alias Private Key: 7
2,812,810 UART: [art] Derive CDI
2,813,090 UART: [art] Store in in slot 0x4
2,898,553 UART: [art] Derive Key Pair
2,898,913 UART: [art] Store priv key in slot 0x5
2,912,129 UART: [art] Derive Key Pair - Done
2,926,886 UART: [art] Signing Cert with AUTHO
2,927,366 UART: RITY.KEYID = 7
2,942,750 UART: [art] Erasing AUTHORITY.KEYID = 7
2,943,515 UART: [art] PUB.X = 60D21DEBB1F82D939B5B55A4FF52CDB21625999AA2629F9A726C6875C339C18B27C7DC8CB932BC989C9C2719D47F7D17
2,950,293 UART: [art] PUB.Y = AC345035B0210874CE5A7EF242A29C15B3363DA88F1A3CE56F8741432DE496FE8A0E704AE4934566401479792113A845
2,957,229 UART: [art] SIG.R = 0D74CFD8B207BB363410591F5146C7017C56A9C7118CF99FF4030F3A8F9421DECF749C75815EE283611480EA54FE4C27
2,963,984 UART: [art] SIG.S = 2DE3180631E124C50BB68C75AC52B6E325A3E250F00278AB4CC1BDE6794982B0C765DDC54047382430E9EC08B69EF3E9
2,987,791 UART: Caliptra RT
2,988,044 UART: [state] CFI Enabled
3,095,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,125,599 UART: [rt]cmd =0x46504c54, len=4
3,126,759 >>> mbox cmd response data (8 bytes)
3,126,760 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,156,549 UART: [rt]cmd =0x46504c67, len=4
3,157,483 >>> mbox cmd response: failed
3,157,827 UART: [rt] FIPS self test
3,158,158 UART: [kat] ++
3,158,310 UART: [kat] sha1
3,162,601 UART: [kat] SHA2-256
3,164,531 UART: [kat] SHA2-384
3,167,334 UART: [kat] SHA2-512-ACC
3,169,229 UART: [kat] ECC-384
3,178,610 UART: [kat] HMAC-384Kdf
3,183,147 UART: [kat] LMS
3,432,038 UART: [kat] --
5,549,691 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,557,243 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,586,705 UART: [rt]cmd =0x46504c67, len=4
5,587,654 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,780 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [kat] SHA2-256
891,655 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,784 UART: [kat] ++
895,936 UART: [kat] sha1
900,136 UART: [kat] SHA2-256
902,076 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,511 UART: [kat] HMAC-384Kdf
921,171 UART: [kat] LMS
1,169,483 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,882 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 ready_for_fw is high
1,174,916 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,183,072 UART: [idev] Erasing UDS.KEYID = 0
1,200,394 UART: [idev] Sha1 KeyId Algorithm
1,209,198 UART: [idev] --
1,210,319 UART: [ldev] ++
1,210,487 UART: [ldev] CDI.KEYID = 6
1,210,851 UART: [ldev] SUBJECT.KEYID = 5
1,211,278 UART: [ldev] AUTHORITY.KEYID = 7
1,211,741 UART: [ldev] FE.KEYID = 1
1,217,129 UART: [ldev] Erasing FE.KEYID = 1
1,243,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,319 UART: [ldev] --
1,282,827 UART: [fwproc] Wait for Commands...
1,283,530 UART: [fwproc] Recv command 0x46574c44
1,284,263 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,827 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,085 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,394 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,852 >>> mbox cmd response: success
2,771,852 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,773,045 UART: [afmc] ++
2,773,213 UART: [afmc] CDI.KEYID = 6
2,773,576 UART: [afmc] SUBJECT.KEYID = 7
2,774,002 UART: [afmc] AUTHORITY.KEYID = 5
2,809,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,420 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,149 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,032 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,751 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,588 UART: [afmc] --
2,852,582 UART: [cold-reset] --
2,853,330 UART: [state] Locking Datavault
2,854,633 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,237 UART: [state] Locking ICCM
2,855,731 UART: [exit] Launching FMC @ 0x40000130
2,861,060 UART:
2,861,076 UART: Running Caliptra FMC ...
2,861,484 UART:
2,861,627 UART: [state] CFI Enabled
2,871,996 UART: [fht] FMC Alias Private Key: 7
2,980,093 UART: [art] Extend RT PCRs Done
2,980,521 UART: [art] Lock RT PCRs Done
2,981,983 UART: [art] Populate DV Done
2,990,152 UART: [fht] FMC Alias Private Key: 7
2,991,176 UART: [art] Derive CDI
2,991,456 UART: [art] Store in in slot 0x4
3,076,771 UART: [art] Derive Key Pair
3,077,131 UART: [art] Store priv key in slot 0x5
3,090,187 UART: [art] Derive Key Pair - Done
3,104,831 UART: [art] Signing Cert with AUTHO
3,105,311 UART: RITY.KEYID = 7
3,120,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,121,648 UART: [art] PUB.X = DCD51B77F487C7BCF07701363FBA75E3972113EC4BCB724E1B2A712A9D0A580DE2D76CC99DCAA22E2DA401770883C604
3,128,412 UART: [art] PUB.Y = 8D134908BEA2EA74942CFD57B5145B46F2786FCAF834938FDF7B451CED142B528582CFB982350649204F56D70E96E350
3,135,353 UART: [art] SIG.R = A35B051864F1041761804EA352C1FF2BD3FD7D445AF9832E7ED77FC657C52E35824683BFBB093AB94182ECF74F872470
3,142,116 UART: [art] SIG.S = A2E7A341341D0653D3BEBEFEB998B705B507B44291BF8153B95B4D6780CFA1F4527DC46D7EF36DFFBB24A61A3873F880
3,165,456 UART: Caliptra RT
3,165,801 UART: [state] CFI Enabled
3,273,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,304,121 UART: [rt]cmd =0x46504c54, len=4
3,305,453 >>> mbox cmd response data (8 bytes)
3,305,454 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,335,077 UART: [rt]cmd =0x46504c67, len=4
3,336,017 >>> mbox cmd response: failed
3,336,345 UART: [rt] FIPS self test
3,336,676 UART: [kat] ++
3,336,828 UART: [kat] sha1
3,341,007 UART: [kat] SHA2-256
3,342,937 UART: [kat] SHA2-384
3,345,598 UART: [kat] SHA2-512-ACC
3,347,493 UART: [kat] ECC-384
3,357,250 UART: [kat] HMAC-384Kdf
3,361,833 UART: [kat] LMS
3,610,724 UART: [kat] --
5,835,571 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,845,766 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,875,134 UART: [rt]cmd =0x46504c67, len=4
5,876,215 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,173 ready_for_fw is high
1,057,173 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,622,440 >>> mbox cmd response: success
2,622,440 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,684,582 UART:
2,684,598 UART: Running Caliptra FMC ...
2,685,006 UART:
2,685,149 UART: [state] CFI Enabled
2,695,534 UART: [fht] FMC Alias Private Key: 7
2,803,689 UART: [art] Extend RT PCRs Done
2,804,117 UART: [art] Lock RT PCRs Done
2,805,883 UART: [art] Populate DV Done
2,814,212 UART: [fht] FMC Alias Private Key: 7
2,815,258 UART: [art] Derive CDI
2,815,538 UART: [art] Store in in slot 0x4
2,901,313 UART: [art] Derive Key Pair
2,901,673 UART: [art] Store priv key in slot 0x5
2,915,101 UART: [art] Derive Key Pair - Done
2,929,571 UART: [art] Signing Cert with AUTHO
2,930,051 UART: RITY.KEYID = 7
2,945,383 UART: [art] Erasing AUTHORITY.KEYID = 7
2,946,148 UART: [art] PUB.X = 602165608DED1901868A3E43E6D016650DA2CD6D007C4184BB3C0372B817917A2B522A94D2150E93DFFBD3210CF912B4
2,952,879 UART: [art] PUB.Y = 7ED0A9BCD839BA5E4190DDD1401808D36E9CCA61596D1714859A89287A6090CEB95B188788701C57008DBE91510AD0B9
2,959,801 UART: [art] SIG.R = 2B3BE3B2D9322CF37CF28D889141FFA63AE4E61DD01528660710876E507ADDD28F7A3F681DB42469BB1F98F80F7BEDD1
2,966,577 UART: [art] SIG.S = D92F0379332AAFCF00EE512FC2B75314A06199618D34DA31B5CCEFDEA4516834EA8A164C6849FD991AE4CEF43D61CBA7
2,989,797 UART: Caliptra RT
2,990,142 UART: [state] CFI Enabled
3,097,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,991 UART: [rt]cmd =0x46504c54, len=4
3,129,227 >>> mbox cmd response data (8 bytes)
3,129,228 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,158,913 UART: [rt]cmd =0x46504c67, len=4
3,159,783 >>> mbox cmd response: failed
3,160,025 UART: [rt] FIPS self test
3,160,356 UART: [kat] ++
3,160,508 UART: [kat] sha1
3,164,627 UART: [kat] SHA2-256
3,166,557 UART: [kat] SHA2-384
3,169,222 UART: [kat] SHA2-512-ACC
3,171,117 UART: [kat] ECC-384
3,180,916 UART: [kat] HMAC-384Kdf
3,185,353 UART: [kat] LMS
3,434,244 UART: [kat] --
5,552,563 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,559,543 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
5,588,745 UART: [rt]cmd =0x46504c67, len=4
5,589,694 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,212 UART:
192,559 UART: Running Caliptra ROM ...
193,726 UART:
193,878 UART: [state] CFI Enabled
262,936 UART: [state] LifecycleState = Unprovisioned
264,908 UART: [state] DebugLocked = No
267,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,610 UART: [kat] SHA2-256
442,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,796 UART: [kat] ++
453,328 UART: [kat] sha1
464,550 UART: [kat] SHA2-256
467,267 UART: [kat] SHA2-384
473,257 UART: [kat] SHA2-512-ACC
475,597 UART: [kat] ECC-384
2,763,761 UART: [kat] HMAC-384Kdf
2,796,268 UART: [kat] LMS
3,986,576 UART: [kat] --
3,989,070 UART: [cold-reset] ++
3,990,151 UART: [fht] Storing FHT @ 0x50003400
4,002,340 UART: [idev] ++
4,002,913 UART: [idev] CDI.KEYID = 6
4,003,883 UART: [idev] SUBJECT.KEYID = 7
4,005,104 UART: [idev] UDS.KEYID = 0
4,006,318 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,030,160 UART: [idev] Erasing UDS.KEYID = 0
7,342,646 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,336 UART: [idev] --
7,368,864 UART: [ldev] ++
7,369,440 UART: [ldev] CDI.KEYID = 6
7,370,408 UART: [ldev] SUBJECT.KEYID = 5
7,371,628 UART: [ldev] AUTHORITY.KEYID = 7
7,372,867 UART: [ldev] FE.KEYID = 1
7,418,826 UART: [ldev] Erasing FE.KEYID = 1
10,752,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,663 UART: [ldev] --
13,134,392 UART: [fwproc] Waiting for Commands...
13,137,360 UART: [fwproc] Received command 0x46505652
13,139,761 UART: [rt] FIPS Version
13,141,380 >>> mbox cmd response data (36 bytes)
15,359,788 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,504,095 UART: [fwproc] Received command 0x46574c44
15,506,382 UART: [fwproc] Received Image of size 113844 bytes
19,561,833 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,642,748 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,711,671 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,027,537 >>> mbox cmd response: success
20,027,911 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,032,142 UART: [afmc] ++
20,032,724 UART: [afmc] CDI.KEYID = 6
20,033,713 UART: [afmc] SUBJECT.KEYID = 7
20,034,928 UART: [afmc] AUTHORITY.KEYID = 5
23,389,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,693,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,695,437 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,709,801 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,724,685 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,739,113 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,761,270 UART: [afmc] --
25,765,089 UART: [cold-reset] --
25,768,683 UART: [state] Locking Datavault
25,772,901 UART: [state] Locking PCR0, PCR1 and PCR31
25,774,653 UART: [state] Locking ICCM
25,777,209 UART: [exit] Launching FMC @ 0x40000130
25,785,559 UART:
25,785,798 UART: Running Caliptra FMC ...
25,786,902 UART:
25,787,060 UART: [state] CFI Enabled
25,851,767 UART: [fht] FMC Alias Private Key: 7
28,190,023 UART: [art] Extend RT PCRs Done
28,191,253 UART: [art] Lock RT PCRs Done
28,192,965 UART: [art] Populate DV Done
28,198,158 UART: [fht] FMC Alias Private Key: 7
28,199,803 UART: [art] Derive CDI
28,200,636 UART: [art] Store in in slot 0x4
28,260,452 UART: [art] Derive Key Pair
28,261,487 UART: [art] Store priv key in slot 0x5
31,555,106 UART: [art] Derive Key Pair - Done
31,568,098 UART: [art] Signing Cert with AUTHO
31,569,404 UART: RITY.KEYID = 7
33,856,782 UART: [art] Erasing AUTHORITY.KEYID = 7
33,858,292 UART: [art] PUB.X = C953A11A18B1ED6DA97E463A1082C78D269962E375B729B63D1AE0DB8BF761D5E52043E29679B6BD571B9BBCB1166291
33,865,487 UART: [art] PUB.Y = D91C2984693336177A20C26066EB9AA3D12C39DDD8E384783C0E9864206C8F29A7568D350CE134CD68CEB0451A68EAFE
33,872,744 UART: [art] SIG.R = 520F28530968849C9A6D3EBC5F0F06145DA28E28FF25ADCB71CC2AD6C9583B6DB51FBE1D44EBF6BF1CA33A6C6CF271AF
33,880,157 UART: [art] SIG.S = 76F3B6FA3ED8169045495ED467DC47AF043F6E5E8A41D742E5EF3D28F86EC02B6B262C3117833D0E727BC45B6AC2527A
35,184,945 UART: Caliptra RT
35,185,644 UART: [state] CFI Enabled
35,348,194 UART: [rt] RT listening for mailbox commands...
35,379,551 UART: [rt]cmd =0x46505652, len=4
35,380,838 UART: [rt] FIPS Version
35,382,183 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,804,583 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,865,810 >>> mbox cmd response data (36 bytes)
15,090,831 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,257,417 >>> mbox cmd response: success
20,257,948 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,952,656 UART:
25,953,079 UART: Running Caliptra FMC ...
25,954,175 UART:
25,954,337 UART: [state] CFI Enabled
26,022,085 UART: [fht] FMC Alias Private Key: 7
28,359,508 UART: [art] Extend RT PCRs Done
28,360,733 UART: [art] Lock RT PCRs Done
28,362,493 UART: [art] Populate DV Done
28,368,119 UART: [fht] FMC Alias Private Key: 7
28,369,713 UART: [art] Derive CDI
28,370,530 UART: [art] Store in in slot 0x4
28,432,412 UART: [art] Derive Key Pair
28,433,454 UART: [art] Store priv key in slot 0x5
31,725,951 UART: [art] Derive Key Pair - Done
31,738,952 UART: [art] Signing Cert with AUTHO
31,740,277 UART: RITY.KEYID = 7
34,027,883 UART: [art] Erasing AUTHORITY.KEYID = 7
34,029,390 UART: [art] PUB.X = 5E60931EBD4D6D04B020BAE3471886AF43003E9F8BBE26B80C904AF37F4836A455E2E2732D7253C18877B638525A8B39
34,036,639 UART: [art] PUB.Y = CFE856446F462D8EA57032728EB5587889B2D8C780B33BFE5C3A93C37535717560FD5EF3FDE5CAC1612416BFA4715FEC
34,043,872 UART: [art] SIG.R = D2D905522C9D1BF194AE8E0C3AD7C2B80956EC537E64BE1AE2E5C49BE70FED90EC05A30D8610C0C0B20E1A72E733372F
34,051,298 UART: [art] SIG.S = AA5CF80E07C9E6CBA3DE308AA9D3B65CD82AFE6DC5A98B246468400F418DF94C7A72F457CECEC40D1893ABC98A3DB8D0
35,356,858 UART: Caliptra RT
35,357,557 UART: [state] CFI Enabled
35,517,677 UART: [rt] RT listening for mailbox commands...
35,548,978 UART: [rt]cmd =0x46505652, len=4
35,550,226 UART: [rt] FIPS Version
35,551,384 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,478 UART:
192,849 UART: Running Caliptra ROM ...
194,010 UART:
603,747 UART: [state] CFI Enabled
617,835 UART: [state] LifecycleState = Unprovisioned
619,746 UART: [state] DebugLocked = No
622,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,804 UART: [kat] SHA2-256
797,525 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,064 UART: [kat] ++
808,552 UART: [kat] sha1
819,054 UART: [kat] SHA2-256
821,795 UART: [kat] SHA2-384
826,906 UART: [kat] SHA2-512-ACC
829,278 UART: [kat] ECC-384
3,115,372 UART: [kat] HMAC-384Kdf
3,127,413 UART: [kat] LMS
4,317,520 UART: [kat] --
4,322,325 UART: [cold-reset] ++
4,324,689 UART: [fht] Storing FHT @ 0x50003400
4,335,410 UART: [idev] ++
4,335,983 UART: [idev] CDI.KEYID = 6
4,336,953 UART: [idev] SUBJECT.KEYID = 7
4,338,165 UART: [idev] UDS.KEYID = 0
4,339,396 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,353,860 UART: [idev] Erasing UDS.KEYID = 0
7,626,363 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,721 UART: [idev] --
7,653,126 UART: [ldev] ++
7,653,706 UART: [ldev] CDI.KEYID = 6
7,654,669 UART: [ldev] SUBJECT.KEYID = 5
7,655,884 UART: [ldev] AUTHORITY.KEYID = 7
7,657,138 UART: [ldev] FE.KEYID = 1
7,667,575 UART: [ldev] Erasing FE.KEYID = 1
10,954,197 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,189 UART: [ldev] --
13,313,500 UART: [fwproc] Waiting for Commands...
13,315,176 UART: [fwproc] Received command 0x46505652
13,317,585 UART: [rt] FIPS Version
13,319,257 >>> mbox cmd response data (36 bytes)
15,539,516 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
15,683,492 UART: [fwproc] Received command 0x46574c44
15,685,762 UART: [fwproc] Received Image of size 113844 bytes
19,741,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,817,867 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
19,886,754 UART: [fwproc] Loading Runtime at address 0x40005000 len 89140
20,203,880 >>> mbox cmd response: success
20,204,247 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,208,588 UART: [afmc] ++
20,209,174 UART: [afmc] CDI.KEYID = 6
20,210,196 UART: [afmc] SUBJECT.KEYID = 7
20,211,365 UART: [afmc] AUTHORITY.KEYID = 5
23,528,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,822,584 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,824,854 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
25,839,222 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
25,854,071 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
25,868,719 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
25,889,716 UART: [afmc] --
25,893,527 UART: [cold-reset] --
25,898,089 UART: [state] Locking Datavault
25,904,526 UART: [state] Locking PCR0, PCR1 and PCR31
25,906,226 UART: [state] Locking ICCM
25,908,431 UART: [exit] Launching FMC @ 0x40000130
25,916,829 UART:
25,917,066 UART: Running Caliptra FMC ...
25,918,171 UART:
25,918,349 UART: [state] CFI Enabled
25,926,398 UART: [fht] FMC Alias Private Key: 7
28,257,364 UART: [art] Extend RT PCRs Done
28,258,590 UART: [art] Lock RT PCRs Done
28,260,429 UART: [art] Populate DV Done
28,265,917 UART: [fht] FMC Alias Private Key: 7
28,267,513 UART: [art] Derive CDI
28,268,329 UART: [art] Store in in slot 0x4
28,310,348 UART: [art] Derive Key Pair
28,311,360 UART: [art] Store priv key in slot 0x5
31,554,215 UART: [art] Derive Key Pair - Done
31,566,953 UART: [art] Signing Cert with AUTHO
31,568,252 UART: RITY.KEYID = 7
33,847,510 UART: [art] Erasing AUTHORITY.KEYID = 7
33,849,017 UART: [art] PUB.X = BBA3B3A4D0081ADE2F87A1C4224A785F9D7816A281E03E56FE4C28F2E3C91EE38985D833911D2FA55B982EDA73D4D259
33,856,233 UART: [art] PUB.Y = 27E868BDCDEC7B46DBC42F8A512317108AB12E4B202BD41F1DA31850907E8A70ABDB7A13CD08BFEBB46E49FE2D16E151
33,863,493 UART: [art] SIG.R = 563BAC9A701239AE82BA76288E3C0256EBD90591A4C0F1349BE19B1EFD1C1A48189D3DD0F149232A88B143F7BC978512
33,870,933 UART: [art] SIG.S = 7DFB5BC15F9666026548B967DD1DCD2D4ED0F73BC9D23A1F11BFC626F54692B877A1B19B1ABBB0B3D0B895D362E6186C
35,176,132 UART: Caliptra RT
35,176,846 UART: [state] CFI Enabled
35,294,070 UART: [rt] RT listening for mailbox commands...
35,325,380 UART: [rt]cmd =0x46505652, len=4
35,326,658 UART: [rt] FIPS Version
35,327,606 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,136,126 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,051,453 >>> mbox cmd response data (36 bytes)
15,269,864 <<< Executing mbox cmd 0x46574c44 (113844 bytes) from SoC
20,441,765 >>> mbox cmd response: success
20,442,268 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,083,772 UART:
26,084,156 UART: Running Caliptra FMC ...
26,085,306 UART:
26,085,477 UART: [state] CFI Enabled
26,093,605 UART: [fht] FMC Alias Private Key: 7
28,424,202 UART: [art] Extend RT PCRs Done
28,425,433 UART: [art] Lock RT PCRs Done
28,427,167 UART: [art] Populate DV Done
28,432,573 UART: [fht] FMC Alias Private Key: 7
28,434,172 UART: [art] Derive CDI
28,434,989 UART: [art] Store in in slot 0x4
28,477,317 UART: [art] Derive Key Pair
28,478,317 UART: [art] Store priv key in slot 0x5
31,720,873 UART: [art] Derive Key Pair - Done
31,733,775 UART: [art] Signing Cert with AUTHO
31,735,085 UART: RITY.KEYID = 7
34,014,539 UART: [art] Erasing AUTHORITY.KEYID = 7
34,016,067 UART: [art] PUB.X = A64E28850A16C32A831E2F1AECD4EB8F04A23B9B5B240C3042785614C89803D25323BA26FEF6F43BA0F276AEEF90FE0E
34,023,297 UART: [art] PUB.Y = 00B3529849E80CE9E1EC6CF898F7724AD0F4A0F7253CA175D1AF199254A60358C8D3A5F45F3458F45A22E273FEAA007A
34,030,512 UART: [art] SIG.R = 6C26EFDAEE1C6153A06E3527E8AF194D7C11E7163FCB5209606D45E3E85C69784CD53D59208293C9DC3A13EAFBE0AE00
34,037,859 UART: [art] SIG.S = 2ADD5E4BB8825F182DC4F68E8051EAB68060394CD7EC7A141236999870E39B60E90B403A0A33DBC3F3FED1C8F5B7784B
35,342,582 UART: Caliptra RT
35,343,288 UART: [state] CFI Enabled
35,461,461 UART: [rt] RT listening for mailbox commands...
35,492,464 UART: [rt]cmd =0x46505652, len=4
35,493,722 UART: [rt] FIPS Version
35,494,828 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,436 writing to cptra_bootfsm_go
192,599 UART:
192,956 UART: Running Caliptra ROM ...
194,144 UART:
194,300 UART: [state] CFI Enabled
260,421 UART: [state] LifecycleState = Unprovisioned
262,327 UART: [state] DebugLocked = No
264,685 UART: [state] WD Timer not started. Device not locked for debugging
268,935 UART: [kat] SHA2-256
448,072 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
459,652 UART: [kat] ++
460,188 UART: [kat] sha1
472,355 UART: [kat] SHA2-256
475,357 UART: [kat] SHA2-384
482,906 UART: [kat] SHA2-512-ACC
485,891 UART: [kat] ECC-384
2,943,932 UART: [kat] HMAC-384Kdf
2,968,905 UART: [kat] LMS
3,498,365 UART: [kat] --
3,502,500 UART: [cold-reset] ++
3,503,482 UART: [fht] FHT @ 0x50003400
3,513,895 UART: [idev] ++
3,514,466 UART: [idev] CDI.KEYID = 6
3,515,378 UART: [idev] SUBJECT.KEYID = 7
3,516,538 UART: [idev] UDS.KEYID = 0
3,517,730 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,539,985 UART: [idev] Erasing UDS.KEYID = 0
6,023,405 UART: [idev] Sha1 KeyId Algorithm
6,046,258 UART: [idev] --
6,050,524 UART: [ldev] ++
6,051,098 UART: [ldev] CDI.KEYID = 6
6,051,987 UART: [ldev] SUBJECT.KEYID = 5
6,053,223 UART: [ldev] AUTHORITY.KEYID = 7
6,054,461 UART: [ldev] FE.KEYID = 1
6,097,118 UART: [ldev] Erasing FE.KEYID = 1
8,602,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,855 UART: [ldev] --
10,408,120 UART: [fwproc] Wait for Commands...
10,410,378 UART: [fwproc] Recv command 0x46505652
10,412,752 UART: [rt] FIPS Version
10,414,204 >>> mbox cmd response data (36 bytes)
12,633,685 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,778,810 UART: [fwproc] Recv command 0x46574c44
12,780,949 UART: [fwproc] Recv'd Img size: 114168 bytes
16,179,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,256,542 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,325,299 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,642,992 >>> mbox cmd response: success
16,643,349 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,647,909 UART: [afmc] ++
16,648,486 UART: [afmc] CDI.KEYID = 6
16,649,366 UART: [afmc] SUBJECT.KEYID = 7
16,650,579 UART: [afmc] AUTHORITY.KEYID = 5
19,177,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,919,084 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,920,938 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
20,936,746 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
20,952,763 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
20,968,645 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
20,991,800 UART: [afmc] --
20,995,342 UART: [cold-reset] --
21,000,547 UART: [state] Locking Datavault
21,006,021 UART: [state] Locking PCR0, PCR1 and PCR31
21,007,728 UART: [state] Locking ICCM
21,009,396 UART: [exit] Launching FMC @ 0x40000130
21,017,799 UART:
21,018,042 UART: Running Caliptra FMC ...
21,019,149 UART:
21,019,312 UART: [state] CFI Enabled
21,076,839 UART: [fht] FMC Alias Private Key: 7
22,841,403 UART: [art] Extend RT PCRs Done
22,842,630 UART: [art] Lock RT PCRs Done
22,844,502 UART: [art] Populate DV Done
22,850,238 UART: [fht] FMC Alias Private Key: 7
22,851,934 UART: [art] Derive CDI
22,852,691 UART: [art] Store in in slot 0x4
22,908,580 UART: [art] Derive Key Pair
22,909,620 UART: [art] Store priv key in slot 0x5
25,373,168 UART: [art] Derive Key Pair - Done
25,386,115 UART: [art] Signing Cert with AUTHO
25,387,426 UART: RITY.KEYID = 7
27,098,188 UART: [art] Erasing AUTHORITY.KEYID = 7
27,099,681 UART: [art] PUB.X = 1DC17A7F9DBF2A5589AAF408A634560A157AC44A9B55C6DD48B7A9ECC72BADE686793E530EB6427DD8582D5E9A30D739
27,106,975 UART: [art] PUB.Y = 8A162533873572FC3438C37F74EF78DCB6A31F32DEFF9B7EF1DBB0C33703A7AA2CB68882580E4AB1A064874AC258517A
27,114,237 UART: [art] SIG.R = 8BE43996F5668075D33878AE4E499C2855EF1083F7626463A10CF241D5FE4180148AA472F9B8122C6E9C35F995107B91
27,121,545 UART: [art] SIG.S = EB1755A9A514B838E597A7DD742FBB5F94861DFE64445BD517AC4CBACA204AC8AE2C3867726F63C51DDFA76455A36FB3
28,100,300 UART: Caliptra RT
28,101,015 UART: [state] CFI Enabled
28,265,568 UART: [rt] RT listening for mailbox commands...
28,297,035 UART: [rt]cmd =0x46505652, len=4
28,298,285 UART: [rt] FIPS Version
28,299,627 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,162 writing to cptra_bootfsm_go
3,361,981 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,182,601 >>> mbox cmd response data (36 bytes)
12,397,146 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,405,509 >>> mbox cmd response: success
16,405,990 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,694,927 UART:
20,695,329 UART: Running Caliptra FMC ...
20,696,425 UART:
20,696,578 UART: [state] CFI Enabled
20,760,487 UART: [fht] FMC Alias Private Key: 7
22,524,817 UART: [art] Extend RT PCRs Done
22,526,029 UART: [art] Lock RT PCRs Done
22,527,792 UART: [art] Populate DV Done
22,533,030 UART: [fht] FMC Alias Private Key: 7
22,534,580 UART: [art] Derive CDI
22,535,317 UART: [art] Store in in slot 0x4
22,593,144 UART: [art] Derive Key Pair
22,594,179 UART: [art] Store priv key in slot 0x5
25,057,517 UART: [art] Derive Key Pair - Done
25,070,526 UART: [art] Signing Cert with AUTHO
25,071,840 UART: RITY.KEYID = 7
26,783,808 UART: [art] Erasing AUTHORITY.KEYID = 7
26,785,313 UART: [art] PUB.X = E53B9E69E7532B998BBB15D8F10635AC8361CC231863BD3E6462206FAF2EAE525E578A615C4393640EB85795007C8EF5
26,792,595 UART: [art] PUB.Y = 59496DE47253252E3C1E7CC82691A610893E890B7F96F9B012CAAA1E32623F1D0081449E9A97A5874CEED5365EF94E6A
26,799,828 UART: [art] SIG.R = 594D907F3F2A251CF10D0BA793E4FF8DBF424318300DC9FEDDF00C0202E4C6937C8DB9EDEB89D2068CBC4E29626E78A9
26,807,201 UART: [art] SIG.S = 49821444478AE749B5C6FC3867FCA7136855BD08C8B69E62B34A7543865DA74EDFF13C68CD4C53AB35ECBF81D86320D3
27,786,296 UART: Caliptra RT
27,787,010 UART: [state] CFI Enabled
27,966,798 UART: [rt] RT listening for mailbox commands...
27,998,216 UART: [rt]cmd =0x46505652, len=4
27,999,467 UART: [rt] FIPS Version
28,000,677 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
192,773 UART:
193,164 UART: Running Caliptra ROM ...
194,262 UART:
603,731 UART: [state] CFI Enabled
617,981 UART: [state] LifecycleState = Unprovisioned
619,843 UART: [state] DebugLocked = No
621,921 UART: [state] WD Timer not started. Device not locked for debugging
625,890 UART: [kat] SHA2-256
805,051 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,586 UART: [kat] ++
817,035 UART: [kat] sha1
827,969 UART: [kat] SHA2-256
830,974 UART: [kat] SHA2-384
836,706 UART: [kat] SHA2-512-ACC
839,639 UART: [kat] ECC-384
3,282,945 UART: [kat] HMAC-384Kdf
3,295,994 UART: [kat] LMS
3,825,480 UART: [kat] --
3,829,143 UART: [cold-reset] ++
3,829,999 UART: [fht] FHT @ 0x50003400
3,841,360 UART: [idev] ++
3,841,925 UART: [idev] CDI.KEYID = 6
3,842,833 UART: [idev] SUBJECT.KEYID = 7
3,844,044 UART: [idev] UDS.KEYID = 0
3,845,161 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,858,305 UART: [idev] Erasing UDS.KEYID = 0
6,312,780 UART: [idev] Sha1 KeyId Algorithm
6,334,680 UART: [idev] --
6,340,081 UART: [ldev] ++
6,340,672 UART: [ldev] CDI.KEYID = 6
6,341,580 UART: [ldev] SUBJECT.KEYID = 5
6,342,739 UART: [ldev] AUTHORITY.KEYID = 7
6,344,027 UART: [ldev] FE.KEYID = 1
6,353,489 UART: [ldev] Erasing FE.KEYID = 1
8,830,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,550,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,566,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,582,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,598,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,618,381 UART: [ldev] --
10,623,818 UART: [fwproc] Wait for Commands...
10,626,895 UART: [fwproc] Recv command 0x46505652
10,629,212 UART: [rt] FIPS Version
10,630,713 >>> mbox cmd response data (36 bytes)
12,856,182 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,000,924 UART: [fwproc] Recv command 0x46574c44
13,003,116 UART: [fwproc] Recv'd Img size: 114168 bytes
16,402,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,476,216 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,544,982 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,862,727 >>> mbox cmd response: success
16,863,091 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,867,221 UART: [afmc] ++
16,867,800 UART: [afmc] CDI.KEYID = 6
16,868,717 UART: [afmc] SUBJECT.KEYID = 7
16,869,876 UART: [afmc] AUTHORITY.KEYID = 5
19,364,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,086,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,088,647 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,104,384 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,120,442 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,136,262 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,159,289 UART: [afmc] --
21,162,400 UART: [cold-reset] --
21,166,155 UART: [state] Locking Datavault
21,172,414 UART: [state] Locking PCR0, PCR1 and PCR31
21,174,083 UART: [state] Locking ICCM
21,176,836 UART: [exit] Launching FMC @ 0x40000130
21,185,236 UART:
21,185,475 UART: Running Caliptra FMC ...
21,186,576 UART:
21,186,735 UART: [state] CFI Enabled
21,194,888 UART: [fht] FMC Alias Private Key: 7
22,951,758 UART: [art] Extend RT PCRs Done
22,952,969 UART: [art] Lock RT PCRs Done
22,954,593 UART: [art] Populate DV Done
22,960,181 UART: [fht] FMC Alias Private Key: 7
22,961,824 UART: [art] Derive CDI
22,962,640 UART: [art] Store in in slot 0x4
23,004,798 UART: [art] Derive Key Pair
23,005,846 UART: [art] Store priv key in slot 0x5
25,431,913 UART: [art] Derive Key Pair - Done
25,444,804 UART: [art] Signing Cert with AUTHO
25,446,106 UART: RITY.KEYID = 7
27,151,002 UART: [art] Erasing AUTHORITY.KEYID = 7
27,152,512 UART: [art] PUB.X = E37E8C932AF0CE318659BC535A6C8FE97DE16920895D712ADAF7EA2C32C343B8DB07B0A3E1D35B1DE357AEFED0BE8044
27,159,752 UART: [art] PUB.Y = 5CA99CFB26CD1678D98806055A1CFC08E5F0F85E0AE25ED0AD2EA8F1A4D42B791A961375ED603215F01E11762039884D
27,167,029 UART: [art] SIG.R = 7EC518302ABACD77CB9D0E31DC189D047CA4F9FDE683CB8E9726F75B38421B222F04FC3BDC0EE85A38DD110CC5346BCB
27,174,451 UART: [art] SIG.S = 44BD43470C9FA7B28D9A92B32E3EF899B944C0A8B8530C787E3C87ACBB0F1D5DC60449E56A949EF2125C54A04EB6B307
28,153,519 UART: Caliptra RT
28,154,227 UART: [state] CFI Enabled
28,271,233 UART: [rt] RT listening for mailbox commands...
28,302,561 UART: [rt]cmd =0x46505652, len=4
28,303,900 UART: [rt] FIPS Version
28,305,011 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,714 writing to cptra_bootfsm_go
3,702,447 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,415,057 >>> mbox cmd response data (36 bytes)
12,637,483 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
16,648,242 >>> mbox cmd response: success
16,648,754 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,905,201 UART:
20,905,585 UART: Running Caliptra FMC ...
20,906,676 UART:
20,906,830 UART: [state] CFI Enabled
20,914,597 UART: [fht] FMC Alias Private Key: 7
22,671,707 UART: [art] Extend RT PCRs Done
22,672,948 UART: [art] Lock RT PCRs Done
22,674,517 UART: [art] Populate DV Done
22,680,026 UART: [fht] FMC Alias Private Key: 7
22,681,579 UART: [art] Derive CDI
22,682,401 UART: [art] Store in in slot 0x4
22,724,837 UART: [art] Derive Key Pair
22,725,839 UART: [art] Store priv key in slot 0x5
25,152,086 UART: [art] Derive Key Pair - Done
25,164,769 UART: [art] Signing Cert with AUTHO
25,166,109 UART: RITY.KEYID = 7
26,871,744 UART: [art] Erasing AUTHORITY.KEYID = 7
26,873,264 UART: [art] PUB.X = 9CD7D53D0DB5F03E19525BC1229D75FE642A2E6EB241FAB241CFED9B09AAA364051D06EE9D10F3CEB95640D2F70AD845
26,880,578 UART: [art] PUB.Y = 6DE3E6CE30C570DFEABF7F12249711BBB9D49664E6313E6CB190672F4594D31436F2959EFAC4F1A2BE0E9F1DB705AD45
26,887,857 UART: [art] SIG.R = 782B575F11D484998CBB05AC05F7619A52A20927608CD331F1AEC95B67C9E9C2B550DA04CC05AF50064E42EAB664AD09
26,895,210 UART: [art] SIG.S = 7848E7C332EE8EF49BD4F85796F19592301B3CBE8C4DB6355F82E1799ACE4F5B86E83DB64FED163404EA910DCE68FA63
27,874,175 UART: Caliptra RT
27,874,889 UART: [state] CFI Enabled
27,992,333 UART: [rt] RT listening for mailbox commands...
28,023,922 UART: [rt]cmd =0x46505652, len=4
28,025,184 UART: [rt] FIPS Version
28,026,349 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,196 UART:
192,546 UART: Running Caliptra ROM ...
193,707 UART:
193,856 UART: [state] CFI Enabled
262,648 UART: [state] LifecycleState = Unprovisioned
265,036 UART: [state] DebugLocked = No
267,667 UART: [state] WD Timer not started. Device not locked for debugging
272,033 UART: [kat] SHA2-256
461,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,667 UART: [kat] ++
473,148 UART: [kat] sha1
483,691 UART: [kat] SHA2-256
486,744 UART: [kat] SHA2-384
491,927 UART: [kat] SHA2-512-ACC
494,485 UART: [kat] ECC-384
2,947,790 UART: [kat] HMAC-384Kdf
2,969,800 UART: [kat] LMS
3,501,567 UART: [kat] --
3,505,423 UART: [cold-reset] ++
3,506,389 UART: [fht] FHT @ 0x50003400
3,517,029 UART: [idev] ++
3,517,714 UART: [idev] CDI.KEYID = 6
3,518,798 UART: [idev] SUBJECT.KEYID = 7
3,519,920 UART: [idev] UDS.KEYID = 0
3,520,970 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,543,151 UART: [idev] Erasing UDS.KEYID = 0
6,026,247 UART: [idev] Sha1 KeyId Algorithm
6,049,845 UART: [idev] --
6,054,386 UART: [ldev] ++
6,055,072 UART: [ldev] CDI.KEYID = 6
6,056,003 UART: [ldev] SUBJECT.KEYID = 5
6,057,187 UART: [ldev] AUTHORITY.KEYID = 7
6,058,369 UART: [ldev] FE.KEYID = 1
6,099,542 UART: [ldev] Erasing FE.KEYID = 1
8,602,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,441 UART: [ldev] --
10,416,827 UART: [fwproc] Wait for Commands...
10,418,558 UART: [fwproc] Recv command 0x46505652
10,421,099 UART: [rt] FIPS Version
10,422,832 >>> mbox cmd response data (36 bytes)
12,642,610 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
12,787,070 UART: [fwproc] Recv command 0x46574c44
12,789,146 UART: [fwproc] Recv'd Img size: 114168 bytes
16,233,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,310,050 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,426,203 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
16,967,767 >>> mbox cmd response: success
16,968,124 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,971,277 UART: [afmc] ++
16,971,968 UART: [afmc] CDI.KEYID = 6
16,973,213 UART: [afmc] SUBJECT.KEYID = 7
16,974,649 UART: [afmc] AUTHORITY.KEYID = 5
19,517,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,240,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,242,747 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,257,974 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,273,095 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,288,164 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,312,901 UART: [afmc] --
21,315,582 UART: [cold-reset] --
21,319,664 UART: [state] Locking Datavault
21,325,130 UART: [state] Locking PCR0, PCR1 and PCR31
21,327,323 UART: [state] Locking ICCM
21,328,915 UART: [exit] Launching FMC @ 0x40000130
21,337,587 UART:
21,337,826 UART: Running Caliptra FMC ...
21,338,929 UART:
21,339,085 UART: [state] CFI Enabled
21,399,693 UART: [fht] FMC Alias Private Key: 7
23,163,721 UART: [art] Extend RT PCRs Done
23,164,944 UART: [art] Lock RT PCRs Done
23,166,811 UART: [art] Populate DV Done
23,172,026 UART: [fht] FMC Alias Private Key: 7
23,173,517 UART: [art] Derive CDI
23,174,251 UART: [art] Store in in slot 0x4
23,232,347 UART: [art] Derive Key Pair
23,233,388 UART: [art] Store priv key in slot 0x5
25,696,319 UART: [art] Derive Key Pair - Done
25,709,212 UART: [art] Signing Cert with AUTHO
25,710,523 UART: RITY.KEYID = 7
27,422,715 UART: [art] Erasing AUTHORITY.KEYID = 7
27,424,232 UART: [art] PUB.X = 3E0D0608F8AFE5597E5677C5AC8C19A7A0F6891E49BA76C243F11F7C489A81349D47C496D18180241BEF14CC95F9D020
27,431,483 UART: [art] PUB.Y = 92BD801EEB4BC0765F118103A18C8536F297A7EDE5FD9D2F913FE6DE204AC6FFD25645A8E83DECA2E0BA6406CA5E446C
27,438,933 UART: [art] SIG.R = 7A3D80D637EBF76A264641A1032125E62F2627A91F972483F147518F31226C7288735DCFBFB00CAA29A6EDA12873DA92
27,446,148 UART: [art] SIG.S = 158AE028C4C6C73A434C2BFB6B3CED1ABB4D50EF98AA14398F8065FB7935F4F61D4F8A4F510659CF2710488AAC40A199
28,424,903 UART: Caliptra RT
28,425,618 UART: [state] CFI Enabled
28,590,520 UART: [rt] RT listening for mailbox commands...
28,621,635 UART: [rt]cmd =0x46505652, len=4
28,622,887 UART: [rt] FIPS Version
28,624,099 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,436,397 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,246,554 >>> mbox cmd response data (36 bytes)
12,473,556 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
17,105,398 >>> mbox cmd response: success
17,105,893 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,393,171 UART:
21,393,555 UART: Running Caliptra FMC ...
21,394,651 UART:
21,394,803 UART: [state] CFI Enabled
21,464,245 UART: [fht] FMC Alias Private Key: 7
23,228,835 UART: [art] Extend RT PCRs Done
23,230,065 UART: [art] Lock RT PCRs Done
23,231,775 UART: [art] Populate DV Done
23,237,120 UART: [fht] FMC Alias Private Key: 7
23,238,859 UART: [art] Derive CDI
23,239,655 UART: [art] Store in in slot 0x4
23,297,389 UART: [art] Derive Key Pair
23,298,393 UART: [art] Store priv key in slot 0x5
25,761,366 UART: [art] Derive Key Pair - Done
25,774,587 UART: [art] Signing Cert with AUTHO
25,775,894 UART: RITY.KEYID = 7
27,487,304 UART: [art] Erasing AUTHORITY.KEYID = 7
27,488,803 UART: [art] PUB.X = AFBD59198348541D1A0FD69C6E16CB24ED1E35DA01A5BA3D5EA7961C793C10F5F6F1197687E0934670ECF13DCEA00016
27,496,062 UART: [art] PUB.Y = 27A6E9AB9AB914813238D3804FCD567BBCC1E06D53DC65E4A612D30B9A5CF1729C5090C42BD5561507C310FB1F2E34FB
27,503,357 UART: [art] SIG.R = 19298811FA8B20B018E19AF369ECAEF81C647B0E904F5B37A4336E2614586E231CB4A907495BA72750C806586E93A444
27,510,743 UART: [art] SIG.S = 44403486E4525019440BE8123EA54BBC26005FDD3B347A059F275D83E68E2AB988896E6275B58B45C6A7E3E70F80867E
28,489,484 UART: Caliptra RT
28,490,195 UART: [state] CFI Enabled
28,656,657 UART: [rt] RT listening for mailbox commands...
28,687,852 UART: [rt]cmd =0x46505652, len=4
28,689,134 UART: [rt] FIPS Version
28,690,537 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,354 UART:
192,722 UART: Running Caliptra ROM ...
193,891 UART:
603,368 UART: [state] CFI Enabled
620,705 UART: [state] LifecycleState = Unprovisioned
623,097 UART: [state] DebugLocked = No
625,891 UART: [state] WD Timer not started. Device not locked for debugging
630,909 UART: [kat] SHA2-256
820,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,610 UART: [kat] ++
832,200 UART: [kat] sha1
842,654 UART: [kat] SHA2-256
845,671 UART: [kat] SHA2-384
851,379 UART: [kat] SHA2-512-ACC
853,935 UART: [kat] ECC-384
3,293,215 UART: [kat] HMAC-384Kdf
3,306,500 UART: [kat] LMS
3,838,311 UART: [kat] --
3,842,575 UART: [cold-reset] ++
3,844,401 UART: [fht] FHT @ 0x50003400
3,855,540 UART: [idev] ++
3,856,212 UART: [idev] CDI.KEYID = 6
3,857,231 UART: [idev] SUBJECT.KEYID = 7
3,858,393 UART: [idev] UDS.KEYID = 0
3,859,470 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,877,223 UART: [idev] Erasing UDS.KEYID = 0
6,340,366 UART: [idev] Sha1 KeyId Algorithm
6,363,224 UART: [idev] --
6,367,765 UART: [ldev] ++
6,368,451 UART: [ldev] CDI.KEYID = 6
6,369,360 UART: [ldev] SUBJECT.KEYID = 5
6,370,524 UART: [ldev] AUTHORITY.KEYID = 7
6,371,757 UART: [ldev] FE.KEYID = 1
6,384,104 UART: [ldev] Erasing FE.KEYID = 1
8,863,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,379 UART: [ldev] --
10,654,432 UART: [fwproc] Wait for Commands...
10,656,648 UART: [fwproc] Recv command 0x46505652
10,659,238 UART: [rt] FIPS Version
10,660,969 >>> mbox cmd response data (36 bytes)
12,886,265 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
13,031,439 UART: [fwproc] Recv command 0x46574c44
13,033,480 UART: [fwproc] Recv'd Img size: 114168 bytes
16,481,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,558,527 UART: [fwproc] Load FMC at address 0x40000000 len 18800
16,674,657 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
17,215,616 >>> mbox cmd response: success
17,215,981 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,219,671 UART: [afmc] ++
17,220,478 UART: [afmc] CDI.KEYID = 6
17,221,538 UART: [afmc] SUBJECT.KEYID = 7
17,223,039 UART: [afmc] AUTHORITY.KEYID = 5
19,722,164 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,443,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,445,271 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
21,460,420 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
21,475,566 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
21,490,591 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
21,515,163 UART: [afmc] --
21,519,635 UART: [cold-reset] --
21,523,242 UART: [state] Locking Datavault
21,525,854 UART: [state] Locking PCR0, PCR1 and PCR31
21,528,050 UART: [state] Locking ICCM
21,530,423 UART: [exit] Launching FMC @ 0x40000130
21,539,101 UART:
21,539,347 UART: Running Caliptra FMC ...
21,540,452 UART:
21,540,614 UART: [state] CFI Enabled
21,548,610 UART: [fht] FMC Alias Private Key: 7
23,305,664 UART: [art] Extend RT PCRs Done
23,306,910 UART: [art] Lock RT PCRs Done
23,308,569 UART: [art] Populate DV Done
23,313,822 UART: [fht] FMC Alias Private Key: 7
23,315,418 UART: [art] Derive CDI
23,316,207 UART: [art] Store in in slot 0x4
23,359,199 UART: [art] Derive Key Pair
23,360,231 UART: [art] Store priv key in slot 0x5
25,787,107 UART: [art] Derive Key Pair - Done
25,800,052 UART: [art] Signing Cert with AUTHO
25,801,372 UART: RITY.KEYID = 7
27,506,947 UART: [art] Erasing AUTHORITY.KEYID = 7
27,508,456 UART: [art] PUB.X = 67C94DF04CB7BC2D1AF9A4C029CFF4003F132D87F7A98819A9F28FB35A8333F5EE88A60F1CA6567C2767AB484B94BEF4
27,515,707 UART: [art] PUB.Y = DA1D0F2837D6AB3DF69A9560130685AC7BE34D0F1AA4154602E4D9B782CD6CA75342000B6E09E9A959B7E969439F598E
27,522,937 UART: [art] SIG.R = A69F4C5FB126270C73531217E4B2D8DD085C762E25758C0C2EB27A55402EC7F37B7791E44DD8201513C9BE90AF8A0BBD
27,530,330 UART: [art] SIG.S = 6CBAC8159D2833C0A86CF2E8B6A9486566D9B2B3B7E025438BDEC51D31923ACE8C6C94E447077B9D814D1BFE641D271F
28,509,012 UART: Caliptra RT
28,509,720 UART: [state] CFI Enabled
28,627,298 UART: [rt] RT listening for mailbox commands...
28,658,770 UART: [rt]cmd =0x46505652, len=4
28,660,075 UART: [rt] FIPS Version
28,661,258 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,760,094 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,472,486 >>> mbox cmd response data (36 bytes)
12,692,982 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
17,336,023 >>> mbox cmd response: success
17,336,500 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,583,271 UART:
21,583,693 UART: Running Caliptra FMC ...
21,584,839 UART:
21,584,998 UART: [state] CFI Enabled
21,592,992 UART: [fht] FMC Alias Private Key: 7
23,349,466 UART: [art] Extend RT PCRs Done
23,350,691 UART: [art] Lock RT PCRs Done
23,352,511 UART: [art] Populate DV Done
23,357,771 UART: [fht] FMC Alias Private Key: 7
23,359,471 UART: [art] Derive CDI
23,360,211 UART: [art] Store in in slot 0x4
23,402,852 UART: [art] Derive Key Pair
23,403,912 UART: [art] Store priv key in slot 0x5
25,830,868 UART: [art] Derive Key Pair - Done
25,843,932 UART: [art] Signing Cert with AUTHO
25,845,243 UART: RITY.KEYID = 7
27,550,838 UART: [art] Erasing AUTHORITY.KEYID = 7
27,552,352 UART: [art] PUB.X = C3892EC35DA2AAFFA370DBAF6EAA3FDFFA0408F92EAA47BF6BEFF3C7F7A6AD5A72836CF9C2584A19A60797EBDCA3979E
27,559,677 UART: [art] PUB.Y = 6829F10011B5F7EF7EC13697ABF1B7AC8040E8802F873D5093C50B742442DA6DC80D6A8E2F1A4D85A5B78408C3A1C5D8
27,566,890 UART: [art] SIG.R = 6C28E70AEF5680FB6446F1B1B376B9839E8604D78D13C3C1B3AD38ABE24C8F80A346F4DBED3B039DDC848EFCBEBA11A5
27,574,319 UART: [art] SIG.S = 47AFE071E0B3D93F44AD04A9F74DBBA53556775D343A9640B2196930A6AD9CD80A7D9FD2F309653BFE69F345712FA614
28,552,943 UART: Caliptra RT
28,553,641 UART: [state] CFI Enabled
28,671,218 UART: [rt] RT listening for mailbox commands...
28,702,616 UART: [rt]cmd =0x46505652, len=4
28,703,896 UART: [rt] FIPS Version
28,705,217 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,863 UART: [kat] SHA2-256
892,801 UART: [kat] SHA2-384
895,680 UART: [kat] SHA2-512-ACC
897,581 UART: [kat] ECC-384
902,888 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,374 UART: [idev] Erasing UDS.KEYID = 0
1,505,202 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,022 UART: [idev] --
1,515,007 UART: [ldev] ++
1,515,175 UART: [ldev] CDI.KEYID = 6
1,515,538 UART: [ldev] SUBJECT.KEYID = 5
1,515,964 UART: [ldev] AUTHORITY.KEYID = 7
1,516,427 UART: [ldev] FE.KEYID = 1
1,521,451 UART: [ldev] Erasing FE.KEYID = 1
1,546,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,528 UART: [ldev] --
1,585,903 UART: [fwproc] Waiting for Commands...
1,586,732 UART: [fwproc] Received command 0x46505652
1,587,614 UART: [rt] FIPS Version
1,588,167 >>> mbox cmd response data (36 bytes)
1,588,168 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,588,342 UART: [fwproc] Received command 0x46574c44
1,589,133 UART: [fwproc] Received Image of size 114168 bytes
2,885,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,912,957 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,309 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,077,876 >>> mbox cmd response: success
3,077,876 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,079,132 UART: [afmc] ++
3,079,300 UART: [afmc] CDI.KEYID = 6
3,079,662 UART: [afmc] SUBJECT.KEYID = 7
3,080,087 UART: [afmc] AUTHORITY.KEYID = 5
3,115,458 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,131,966 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,746 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,474 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,359 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,049 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,920 UART: [afmc] --
3,158,880 UART: [cold-reset] --
3,159,832 UART: [state] Locking Datavault
3,160,961 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,565 UART: [state] Locking ICCM
3,162,089 UART: [exit] Launching FMC @ 0x40000130
3,167,418 UART:
3,167,434 UART: Running Caliptra FMC ...
3,167,842 UART:
3,167,896 UART: [state] CFI Enabled
3,178,235 UART: [fht] FMC Alias Private Key: 7
3,285,264 UART: [art] Extend RT PCRs Done
3,285,692 UART: [art] Lock RT PCRs Done
3,287,350 UART: [art] Populate DV Done
3,295,303 UART: [fht] FMC Alias Private Key: 7
3,296,283 UART: [art] Derive CDI
3,296,563 UART: [art] Store in in slot 0x4
3,381,954 UART: [art] Derive Key Pair
3,382,314 UART: [art] Store priv key in slot 0x5
3,395,476 UART: [art] Derive Key Pair - Done
3,410,200 UART: [art] Signing Cert with AUTHO
3,410,680 UART: RITY.KEYID = 7
3,426,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,426,795 UART: [art] PUB.X = FB239663E1910C4BF2FD4F69008845B8A5D8C02EB4E2292F59E5DCC492346C67FF4BB634710B4B600F30B8BA44145E50
3,433,538 UART: [art] PUB.Y = DDFF95E369B3CFB8EE44DAA916DE6B901363435536F5FCA43671BE86BDE7654D138F7F71D3FFDF561FE0DB5402591E96
3,440,501 UART: [art] SIG.R = A62F8F0F3C5DB49E62EA0F3CF2E83A0F3AB31029168C24E74092181CDC3F99396CB956206B5C9FFD989D53B73A5A0277
3,447,267 UART: [art] SIG.S = B833DB486A0A84E45DA730C08FB754269642B229908498C0D7FFDDC75A39A3813370AE7DC062807C1EBF92FEBFE5B2A0
3,471,355 UART: Caliptra RT
3,471,608 UART: [state] CFI Enabled
3,578,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,609,506 UART: [rt]cmd =0x46505652, len=4
3,610,166 UART: [rt] FIPS Version
3,611,107 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,187 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,132 >>> mbox cmd response data (36 bytes)
1,442,133 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,927,247 >>> mbox cmd response: success
2,927,247 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,667 UART:
2,988,683 UART: Running Caliptra FMC ...
2,989,091 UART:
2,989,145 UART: [state] CFI Enabled
2,999,934 UART: [fht] FMC Alias Private Key: 7
3,108,017 UART: [art] Extend RT PCRs Done
3,108,445 UART: [art] Lock RT PCRs Done
3,109,787 UART: [art] Populate DV Done
3,118,136 UART: [fht] FMC Alias Private Key: 7
3,119,306 UART: [art] Derive CDI
3,119,586 UART: [art] Store in in slot 0x4
3,205,507 UART: [art] Derive Key Pair
3,205,867 UART: [art] Store priv key in slot 0x5
3,219,035 UART: [art] Derive Key Pair - Done
3,233,831 UART: [art] Signing Cert with AUTHO
3,234,311 UART: RITY.KEYID = 7
3,249,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,250,292 UART: [art] PUB.X = 0A644492A320065C436CAE5AC1601763966FC091AD6000617FB90CD5F4EA4501D42FC27E48AE9A72873D8B3511129EE1
3,257,026 UART: [art] PUB.Y = 7C41200F066F8151D076F92C8D4D7F65408FFD3FB81D6F8761965E3964004A7178C9D0DE8FE3EA48319DFB3984E47A35
3,263,948 UART: [art] SIG.R = 9515EB38E37E8E1BC1B4E0E6F933AF5F49E729FE5B1664BD944D111228E14C7357CD14FCF2791342B25BD158169BBDF4
3,270,726 UART: [art] SIG.S = 1F294341F06BAB9C4C89D5DAA60EA608C95D85CF731FE2BFC65A3E486EC76D72A6D7412B1091175A0C7ACB96F9DE9C81
3,294,266 UART: Caliptra RT
3,294,519 UART: [state] CFI Enabled
3,403,126 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,524 UART: [rt]cmd =0x46505652, len=4
3,434,184 UART: [rt] FIPS Version
3,435,293 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,088 UART: [kat] SHA2-256
882,019 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,134 UART: [kat] ++
886,286 UART: [kat] sha1
890,542 UART: [kat] SHA2-256
892,480 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
902,659 UART: [kat] HMAC-384Kdf
907,227 UART: [kat] LMS
1,475,423 UART: [kat] --
1,476,384 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,697 UART: [idev] Erasing UDS.KEYID = 0
1,505,199 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,785 UART: [idev] --
1,514,852 UART: [ldev] ++
1,515,020 UART: [ldev] CDI.KEYID = 6
1,515,383 UART: [ldev] SUBJECT.KEYID = 5
1,515,809 UART: [ldev] AUTHORITY.KEYID = 7
1,516,272 UART: [ldev] FE.KEYID = 1
1,521,692 UART: [ldev] Erasing FE.KEYID = 1
1,547,279 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,969 UART: [ldev] --
1,586,318 UART: [fwproc] Waiting for Commands...
1,587,041 UART: [fwproc] Received command 0x46505652
1,587,923 UART: [rt] FIPS Version
1,588,476 >>> mbox cmd response data (36 bytes)
1,588,477 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,588,635 UART: [fwproc] Received command 0x46574c44
1,589,426 UART: [fwproc] Received Image of size 114168 bytes
2,886,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,913,226 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,942,578 UART: [fwproc] Loading Runtime at address 0x40005000 len 89484
3,078,101 >>> mbox cmd response: success
3,078,101 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,079,363 UART: [afmc] ++
3,079,531 UART: [afmc] CDI.KEYID = 6
3,079,893 UART: [afmc] SUBJECT.KEYID = 7
3,080,318 UART: [afmc] AUTHORITY.KEYID = 5
3,115,555 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,132,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,132,901 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,138,629 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,144,514 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,150,204 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,157,957 UART: [afmc] --
3,158,955 UART: [cold-reset] --
3,159,819 UART: [state] Locking Datavault
3,160,894 UART: [state] Locking PCR0, PCR1 and PCR31
3,161,498 UART: [state] Locking ICCM
3,162,170 UART: [exit] Launching FMC @ 0x40000130
3,167,499 UART:
3,167,515 UART: Running Caliptra FMC ...
3,167,923 UART:
3,168,066 UART: [state] CFI Enabled
3,179,203 UART: [fht] FMC Alias Private Key: 7
3,287,204 UART: [art] Extend RT PCRs Done
3,287,632 UART: [art] Lock RT PCRs Done
3,289,016 UART: [art] Populate DV Done
3,296,837 UART: [fht] FMC Alias Private Key: 7
3,297,947 UART: [art] Derive CDI
3,298,227 UART: [art] Store in in slot 0x4
3,383,664 UART: [art] Derive Key Pair
3,384,024 UART: [art] Store priv key in slot 0x5
3,396,714 UART: [art] Derive Key Pair - Done
3,411,424 UART: [art] Signing Cert with AUTHO
3,411,904 UART: RITY.KEYID = 7
3,426,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,427,755 UART: [art] PUB.X = 713DD4FF730CBE3765EB2F716B2499E2867F1ED4F27C1E8E6D3439FE3794D91D35B76514140602E8DD89FBFB54292569
3,434,518 UART: [art] PUB.Y = 63E0A66FD8BADFFC358CD2F9CC358CE3EFC9BBA284CDE3535F5F3B4D9632527838325D17660D47D5A462A3375F84F8F5
3,441,479 UART: [art] SIG.R = 4FB8A3A830173D44F7368A154549E73163A952988109DE00E4C3D7D669DADCA764ED1DC7A478242E9D28B8B9BA9B0C7A
3,448,227 UART: [art] SIG.S = FB669244B31611BED97F7F8924614F033282E7A33AE9D154D299A192DFBEF75CE666F0C9BA56727A998B9E718135498C
3,471,641 UART: Caliptra RT
3,471,986 UART: [state] CFI Enabled
3,579,659 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,610,247 UART: [rt]cmd =0x46505652, len=4
3,610,907 UART: [rt] FIPS Version
3,612,128 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,096 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,675 >>> mbox cmd response data (36 bytes)
1,441,676 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,926,130 >>> mbox cmd response: success
2,926,130 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,988,356 UART:
2,988,372 UART: Running Caliptra FMC ...
2,988,780 UART:
2,988,923 UART: [state] CFI Enabled
2,999,652 UART: [fht] FMC Alias Private Key: 7
3,107,803 UART: [art] Extend RT PCRs Done
3,108,231 UART: [art] Lock RT PCRs Done
3,109,941 UART: [art] Populate DV Done
3,118,048 UART: [fht] FMC Alias Private Key: 7
3,119,174 UART: [art] Derive CDI
3,119,454 UART: [art] Store in in slot 0x4
3,204,999 UART: [art] Derive Key Pair
3,205,359 UART: [art] Store priv key in slot 0x5
3,218,169 UART: [art] Derive Key Pair - Done
3,233,112 UART: [art] Signing Cert with AUTHO
3,233,592 UART: RITY.KEYID = 7
3,248,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,249,669 UART: [art] PUB.X = B451179C936A61BD59FFF85EDF9157428BF7D165D03B8F5E98938E3F64C149528EC4F5EF484158C711C811DBDAC55C8B
3,256,447 UART: [art] PUB.Y = EFBB58E39AED419A86A6A3CAC8DC8E7454066F74F24D044411479CC5A19F5FB056B08B2D5B4D37957C49E5C326D2EB57
3,263,403 UART: [art] SIG.R = 47F0CE70607FB68047AE2B2D647472868A9C67585E2B70AA80AA37EBAE158FF2A5835C3F99E0BFEED12994B4E41B5DF0
3,270,185 UART: [art] SIG.S = CB57837BE5CB9BEC8D5147A9DE40761728E7CBB95A4E5AE4FC0B60EC04F58BD16461A06AA8FF034F7D15462C5B0F1F01
3,293,793 UART: Caliptra RT
3,294,138 UART: [state] CFI Enabled
3,402,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,433,059 UART: [rt]cmd =0x46505652, len=4
3,433,719 UART: [rt] FIPS Version
3,434,842 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,586 UART: [state] LifecycleState = Unprovisioned
85,241 UART: [state] DebugLocked = No
85,787 UART: [state] WD Timer not started. Device not locked for debugging
86,912 UART: [kat] SHA2-256
892,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,687 UART: [kat] ++
896,839 UART: [kat] sha1
901,113 UART: [kat] SHA2-256
903,053 UART: [kat] SHA2-384
905,724 UART: [kat] SHA2-512-ACC
907,625 UART: [kat] ECC-384
916,764 UART: [kat] HMAC-384Kdf
921,344 UART: [kat] LMS
1,169,672 UART: [kat] --
1,170,419 UART: [cold-reset] ++
1,170,829 UART: [fht] FHT @ 0x50003400
1,173,638 UART: [idev] ++
1,173,806 UART: [idev] CDI.KEYID = 6
1,174,166 UART: [idev] SUBJECT.KEYID = 7
1,174,590 UART: [idev] UDS.KEYID = 0
1,174,935 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,914 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,577 UART: [ldev] ++
1,208,745 UART: [ldev] CDI.KEYID = 6
1,209,108 UART: [ldev] SUBJECT.KEYID = 5
1,209,534 UART: [ldev] AUTHORITY.KEYID = 7
1,209,997 UART: [ldev] FE.KEYID = 1
1,215,217 UART: [ldev] Erasing FE.KEYID = 1
1,241,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,805 UART: [ldev] --
1,280,306 UART: [fwproc] Wait for Commands...
1,281,000 UART: [fwproc] Recv command 0x46505652
1,281,821 UART: [rt] FIPS Version
1,282,375 >>> mbox cmd response data (36 bytes)
1,282,376 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,282,524 UART: [fwproc] Recv command 0x46574c44
1,283,252 UART: [fwproc] Recv'd Img size: 114168 bytes
2,579,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,606,988 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,292 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,771,809 >>> mbox cmd response: success
2,771,809 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,772,879 UART: [afmc] ++
2,773,047 UART: [afmc] CDI.KEYID = 6
2,773,409 UART: [afmc] SUBJECT.KEYID = 7
2,773,834 UART: [afmc] AUTHORITY.KEYID = 5
2,809,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,825,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,522 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,250 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,135 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,843,854 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,851,784 UART: [afmc] --
2,852,882 UART: [cold-reset] --
2,853,842 UART: [state] Locking Datavault
2,855,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,835 UART: [state] Locking ICCM
2,856,383 UART: [exit] Launching FMC @ 0x40000130
2,861,712 UART:
2,861,728 UART: Running Caliptra FMC ...
2,862,136 UART:
2,862,190 UART: [state] CFI Enabled
2,872,851 UART: [fht] FMC Alias Private Key: 7
2,980,744 UART: [art] Extend RT PCRs Done
2,981,172 UART: [art] Lock RT PCRs Done
2,982,914 UART: [art] Populate DV Done
2,991,127 UART: [fht] FMC Alias Private Key: 7
2,992,149 UART: [art] Derive CDI
2,992,429 UART: [art] Store in in slot 0x4
3,077,948 UART: [art] Derive Key Pair
3,078,308 UART: [art] Store priv key in slot 0x5
3,092,020 UART: [art] Derive Key Pair - Done
3,106,593 UART: [art] Signing Cert with AUTHO
3,107,073 UART: RITY.KEYID = 7
3,122,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,200 UART: [art] PUB.X = 606FC4B6A375BBDC13714B2439454535ED6BEE08DA15067F8BB247B5231A47909E7C0774290A00CD31DE4427F5B9A2F5
3,129,938 UART: [art] PUB.Y = 6A126B73506E27ADEDB6AAB1EC6701A39467E6B59E3FE8E84B4BCB3DD0B7EE5808E0B7B4F5F2DDCD120D41C3D68F9A1A
3,136,905 UART: [art] SIG.R = 553E03DFD9AAB6476DAFC2E378BCA4D613B733D47DDB4A7FE5FD44A331428DDDE0BDA4703763921FBA3217E8D148C047
3,143,690 UART: [art] SIG.S = 0F560422279F304AF26FFFC1E1E19B906A66F0D184A63C54EC1813382BD3F381396A10DF391FA0CAA237714E6131EFF4
3,167,037 UART: Caliptra RT
3,167,290 UART: [state] CFI Enabled
3,274,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,305,309 UART: [rt]cmd =0x46505652, len=4
3,305,969 UART: [rt] FIPS Version
3,306,972 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,637 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,431 >>> mbox cmd response data (36 bytes)
1,140,432 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,626,748 >>> mbox cmd response: success
2,626,748 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,688,324 UART:
2,688,340 UART: Running Caliptra FMC ...
2,688,748 UART:
2,688,802 UART: [state] CFI Enabled
2,699,183 UART: [fht] FMC Alias Private Key: 7
2,807,772 UART: [art] Extend RT PCRs Done
2,808,200 UART: [art] Lock RT PCRs Done
2,809,514 UART: [art] Populate DV Done
2,817,613 UART: [fht] FMC Alias Private Key: 7
2,818,649 UART: [art] Derive CDI
2,818,929 UART: [art] Store in in slot 0x4
2,904,328 UART: [art] Derive Key Pair
2,904,688 UART: [art] Store priv key in slot 0x5
2,917,852 UART: [art] Derive Key Pair - Done
2,933,007 UART: [art] Signing Cert with AUTHO
2,933,487 UART: RITY.KEYID = 7
2,948,273 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,038 UART: [art] PUB.X = 654E21ADFA239B6FD21D672B58ECCFDC657AEB94B95DBC1E61200ECB598DFEC0997532E089AE956202ED2AF054BD25C2
2,955,822 UART: [art] PUB.Y = B6B21CBF85057099754E28889F1EA4C9E80DAD68CE9F39202196529CF72F50AF9F55C8A7F8F41B976F1B04372CF7C709
2,962,764 UART: [art] SIG.R = F94705FCE63734583DBF00D25A76B10FCC786900720E8D89C847E08DFAE99D5BF81F0A147CE9916967D178C494106A52
2,969,478 UART: [art] SIG.S = C57E4717AB4C1730D41B757187BB021AB54061D8C9CC055898837F6F760026C53D94BAEE7F3EF779E9192FFC1AB5D3E3
2,993,541 UART: Caliptra RT
2,993,794 UART: [state] CFI Enabled
3,102,272 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,132,534 UART: [rt]cmd =0x46505652, len=4
3,133,194 UART: [rt] FIPS Version
3,134,251 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,361 UART: [kat] SHA2-256
894,011 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,136 UART: [kat] ++
898,288 UART: [kat] sha1
902,596 UART: [kat] SHA2-256
904,536 UART: [kat] SHA2-384
907,197 UART: [kat] SHA2-512-ACC
909,098 UART: [kat] ECC-384
918,837 UART: [kat] HMAC-384Kdf
923,487 UART: [kat] LMS
1,171,815 UART: [kat] --
1,172,820 UART: [cold-reset] ++
1,173,242 UART: [fht] FHT @ 0x50003400
1,175,843 UART: [idev] ++
1,176,011 UART: [idev] CDI.KEYID = 6
1,176,371 UART: [idev] SUBJECT.KEYID = 7
1,176,795 UART: [idev] UDS.KEYID = 0
1,177,140 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,185,021 UART: [idev] Erasing UDS.KEYID = 0
1,201,956 UART: [idev] Sha1 KeyId Algorithm
1,210,344 UART: [idev] --
1,211,286 UART: [ldev] ++
1,211,454 UART: [ldev] CDI.KEYID = 6
1,211,817 UART: [ldev] SUBJECT.KEYID = 5
1,212,243 UART: [ldev] AUTHORITY.KEYID = 7
1,212,706 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,243,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,612 UART: [ldev] --
1,283,093 UART: [fwproc] Wait for Commands...
1,283,793 UART: [fwproc] Recv command 0x46505652
1,284,614 UART: [rt] FIPS Version
1,285,168 >>> mbox cmd response data (36 bytes)
1,285,169 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,285,415 UART: [fwproc] Recv command 0x46574c44
1,286,143 UART: [fwproc] Recv'd Img size: 114168 bytes
2,581,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,609,373 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,638,677 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,774,198 >>> mbox cmd response: success
2,774,198 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,775,232 UART: [afmc] ++
2,775,400 UART: [afmc] CDI.KEYID = 6
2,775,762 UART: [afmc] SUBJECT.KEYID = 7
2,776,187 UART: [afmc] AUTHORITY.KEYID = 5
2,811,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,828,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,829,125 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,834,853 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,840,738 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,846,457 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,854,381 UART: [afmc] --
2,855,275 UART: [cold-reset] --
2,856,249 UART: [state] Locking Datavault
2,857,356 UART: [state] Locking PCR0, PCR1 and PCR31
2,857,960 UART: [state] Locking ICCM
2,858,624 UART: [exit] Launching FMC @ 0x40000130
2,863,953 UART:
2,863,969 UART: Running Caliptra FMC ...
2,864,377 UART:
2,864,520 UART: [state] CFI Enabled
2,875,429 UART: [fht] FMC Alias Private Key: 7
2,983,048 UART: [art] Extend RT PCRs Done
2,983,476 UART: [art] Lock RT PCRs Done
2,984,652 UART: [art] Populate DV Done
2,992,995 UART: [fht] FMC Alias Private Key: 7
2,994,011 UART: [art] Derive CDI
2,994,291 UART: [art] Store in in slot 0x4
3,079,958 UART: [art] Derive Key Pair
3,080,318 UART: [art] Store priv key in slot 0x5
3,093,700 UART: [art] Derive Key Pair - Done
3,108,701 UART: [art] Signing Cert with AUTHO
3,109,181 UART: RITY.KEYID = 7
3,123,833 UART: [art] Erasing AUTHORITY.KEYID = 7
3,124,598 UART: [art] PUB.X = 3A799D3D15D2A86B12906A6E0ACA6501A7373DC72DA20AD37B3D7F89356F67A304F614646722F31EC25853B299A5BBBB
3,131,360 UART: [art] PUB.Y = A09E849BBA9CE0B7D22BD954777C9B60BB237419EBE2EC04D8B437DE1EEA838D520A2C6240F6BD2E389E46A492B4FAB7
3,138,322 UART: [art] SIG.R = 5CFE61F9CD7C29D3A737EB2E62C89EA88FDBE386A628F7FE562B9F76B2EAAF3E7D9817321A50FE2A89FFED7F8D2DAA44
3,145,120 UART: [art] SIG.S = 64C49BF80C547D8E79553A28B9E26D19DE2D3AAF395CDC74A6BAA351B7378243F0135297C8367E980D498D504AC22AB6
3,168,947 UART: Caliptra RT
3,169,292 UART: [state] CFI Enabled
3,276,553 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,159 UART: [rt]cmd =0x46505652, len=4
3,307,819 UART: [rt] FIPS Version
3,309,014 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,450 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,062 >>> mbox cmd response data (36 bytes)
1,141,063 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,625,867 >>> mbox cmd response: success
2,625,867 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,687,421 UART:
2,687,437 UART: Running Caliptra FMC ...
2,687,845 UART:
2,687,988 UART: [state] CFI Enabled
2,698,857 UART: [fht] FMC Alias Private Key: 7
2,806,608 UART: [art] Extend RT PCRs Done
2,807,036 UART: [art] Lock RT PCRs Done
2,808,628 UART: [art] Populate DV Done
2,816,921 UART: [fht] FMC Alias Private Key: 7
2,818,073 UART: [art] Derive CDI
2,818,353 UART: [art] Store in in slot 0x4
2,904,058 UART: [art] Derive Key Pair
2,904,418 UART: [art] Store priv key in slot 0x5
2,918,242 UART: [art] Derive Key Pair - Done
2,932,957 UART: [art] Signing Cert with AUTHO
2,933,437 UART: RITY.KEYID = 7
2,948,549 UART: [art] Erasing AUTHORITY.KEYID = 7
2,949,314 UART: [art] PUB.X = 1D788E3A8667432278E9C8E65DFB99D9FFE76C8541A887582C8FF00FF8C4A265634F4565820084067834E55C928D4883
2,956,046 UART: [art] PUB.Y = 784B07B9A44D3638D5BDAEADF9F778231FCF5E808E522071D933EDF04D149BF4AEA732D783CC5F0F3B73A7A11DFA06C4
2,963,005 UART: [art] SIG.R = A998FA2DCCE537BD546ED5E963F81843043BC93DA73679217176D9A0F53267629DBF4827F2C9F2A994F5CE0F0A7D9185
2,969,770 UART: [art] SIG.S = 12C33F1DF678450846282C5125FCBDD046E07CE7C90D4273FC5A1C197904E99B24648BFCCB56F3FDC9C99F844BC1DB6B
2,993,056 UART: Caliptra RT
2,993,401 UART: [state] CFI Enabled
3,100,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,131,480 UART: [rt]cmd =0x46505652, len=4
3,132,140 UART: [rt] FIPS Version
3,133,205 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,700 UART: [kat] SHA2-512-ACC
906,601 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,681 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,174,089 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,511 UART: [idev] Erasing UDS.KEYID = 0
1,199,257 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,122 UART: [ldev] ++
1,209,290 UART: [ldev] CDI.KEYID = 6
1,209,654 UART: [ldev] SUBJECT.KEYID = 5
1,210,081 UART: [ldev] AUTHORITY.KEYID = 7
1,210,544 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,242,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,664 UART: [ldev] --
1,281,058 UART: [fwproc] Wait for Commands...
1,281,829 UART: [fwproc] Recv command 0x46505652
1,282,656 UART: [rt] FIPS Version
1,283,217 >>> mbox cmd response data (36 bytes)
1,283,218 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,283,391 UART: [fwproc] Recv command 0x46574c44
1,284,124 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,124 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,636,433 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,091 >>> mbox cmd response: success
2,772,091 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,773,332 UART: [afmc] ++
2,773,500 UART: [afmc] CDI.KEYID = 6
2,773,863 UART: [afmc] SUBJECT.KEYID = 7
2,774,289 UART: [afmc] AUTHORITY.KEYID = 5
2,809,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,086 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,826,837 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,832,566 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,838,449 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,168 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,035 UART: [afmc] --
2,852,985 UART: [cold-reset] --
2,853,949 UART: [state] Locking Datavault
2,855,098 UART: [state] Locking PCR0, PCR1 and PCR31
2,855,702 UART: [state] Locking ICCM
2,856,232 UART: [exit] Launching FMC @ 0x40000130
2,861,561 UART:
2,861,577 UART: Running Caliptra FMC ...
2,861,985 UART:
2,862,039 UART: [state] CFI Enabled
2,872,844 UART: [fht] FMC Alias Private Key: 7
2,980,857 UART: [art] Extend RT PCRs Done
2,981,285 UART: [art] Lock RT PCRs Done
2,982,955 UART: [art] Populate DV Done
2,991,290 UART: [fht] FMC Alias Private Key: 7
2,992,466 UART: [art] Derive CDI
2,992,746 UART: [art] Store in in slot 0x4
3,078,209 UART: [art] Derive Key Pair
3,078,569 UART: [art] Store priv key in slot 0x5
3,091,111 UART: [art] Derive Key Pair - Done
3,105,906 UART: [art] Signing Cert with AUTHO
3,106,386 UART: RITY.KEYID = 7
3,121,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,122,231 UART: [art] PUB.X = D59F0CEA8C8F8FCD2E9BBC502807BE73F70AB2E26620B4CA25168E3EE943889BDD39BB2D91FA16AD1773EF9F85FB8AB7
3,129,016 UART: [art] PUB.Y = EA830F4CB614557BDD9358B14D51270D6095181B04B8625613E4314FD38531AFDEF040EDAF70A18F50C3B6E2DD417AE0
3,135,963 UART: [art] SIG.R = D1DDEA872BDE81721A7F358F9C3D7A0FA4EB6C9EB77FD7AF819E81643314D603FEE47240DC5C6BC9F7559E9AADC8757E
3,142,749 UART: [art] SIG.S = 853ED12A6C33BAE0FA991BC2695BB309F94EB72621CCDE09DE93078E8CC35EFCF780DEF0D26912DFE450553661A45B4B
3,167,459 UART: Caliptra RT
3,167,712 UART: [state] CFI Enabled
3,275,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,306,106 UART: [rt]cmd =0x46505652, len=4
3,306,766 UART: [rt] FIPS Version
3,307,731 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,216 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,140 >>> mbox cmd response data (36 bytes)
1,136,141 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,620,779 >>> mbox cmd response: success
2,620,779 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,681,677 UART:
2,681,693 UART: Running Caliptra FMC ...
2,682,101 UART:
2,682,155 UART: [state] CFI Enabled
2,692,784 UART: [fht] FMC Alias Private Key: 7
2,800,329 UART: [art] Extend RT PCRs Done
2,800,757 UART: [art] Lock RT PCRs Done
2,802,351 UART: [art] Populate DV Done
2,810,574 UART: [fht] FMC Alias Private Key: 7
2,811,736 UART: [art] Derive CDI
2,812,016 UART: [art] Store in in slot 0x4
2,897,507 UART: [art] Derive Key Pair
2,897,867 UART: [art] Store priv key in slot 0x5
2,910,977 UART: [art] Derive Key Pair - Done
2,925,480 UART: [art] Signing Cert with AUTHO
2,925,960 UART: RITY.KEYID = 7
2,941,342 UART: [art] Erasing AUTHORITY.KEYID = 7
2,942,107 UART: [art] PUB.X = EC2347D90FF876A201F0D6D0DC41C925DD9D05250FB81EBC7A4FBCFBD330F34E84E5B1AFD506908D787E9828E013F035
2,948,876 UART: [art] PUB.Y = 74FC59B13E87D236345A90FF83CE476DA6B0E67F9DA02E23DC137D7C20F11F91EFDB0169A90B7C5E25E1D7F9B8764A19
2,955,832 UART: [art] SIG.R = C1516DAB49A27E43B38C8AC87B7FE419B7F8B49D30C15B8119E3F43B70CCE342C5771BD0F82746B588C9411ACC61D5CE
2,962,614 UART: [art] SIG.S = 44B2EB9A5E4C10675391F580A512FB89CDBBF448E17841B3469D56C78D496E912B0FD927A462BD8DF58FA34C168CB2BC
2,986,736 UART: Caliptra RT
2,986,989 UART: [state] CFI Enabled
3,094,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,124,932 UART: [rt]cmd =0x46505652, len=4
3,125,592 UART: [rt] FIPS Version
3,126,693 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
921,087 UART: [kat] LMS
1,169,399 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,584 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,198 UART: [idev] Erasing UDS.KEYID = 0
1,199,262 UART: [idev] Sha1 KeyId Algorithm
1,208,174 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,801 UART: [ldev] Erasing FE.KEYID = 1
1,242,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,419 UART: [ldev] --
1,281,695 UART: [fwproc] Wait for Commands...
1,282,364 UART: [fwproc] Recv command 0x46505652
1,283,191 UART: [rt] FIPS Version
1,283,752 >>> mbox cmd response data (36 bytes)
1,283,753 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
1,283,908 UART: [fwproc] Recv command 0x46574c44
1,284,641 UART: [fwproc] Recv'd Img size: 114168 bytes
2,580,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,607,997 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,637,306 UART: [fwproc] Load Runtime at address 0x40005000 len 89484
2,772,990 >>> mbox cmd response: success
2,772,990 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,774,135 UART: [afmc] ++
2,774,303 UART: [afmc] CDI.KEYID = 6
2,774,666 UART: [afmc] SUBJECT.KEYID = 7
2,775,092 UART: [afmc] AUTHORITY.KEYID = 5
2,810,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,826,907 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,827,658 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,833,387 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,839,270 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,844,989 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,852,710 UART: [afmc] --
2,853,646 UART: [cold-reset] --
2,854,556 UART: [state] Locking Datavault
2,855,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,856,081 UART: [state] Locking ICCM
2,856,569 UART: [exit] Launching FMC @ 0x40000130
2,861,898 UART:
2,861,914 UART: Running Caliptra FMC ...
2,862,322 UART:
2,862,465 UART: [state] CFI Enabled
2,873,190 UART: [fht] FMC Alias Private Key: 7
2,981,539 UART: [art] Extend RT PCRs Done
2,981,967 UART: [art] Lock RT PCRs Done
2,983,727 UART: [art] Populate DV Done
2,991,832 UART: [fht] FMC Alias Private Key: 7
2,993,010 UART: [art] Derive CDI
2,993,290 UART: [art] Store in in slot 0x4
3,079,005 UART: [art] Derive Key Pair
3,079,365 UART: [art] Store priv key in slot 0x5
3,092,759 UART: [art] Derive Key Pair - Done
3,107,556 UART: [art] Signing Cert with AUTHO
3,108,036 UART: RITY.KEYID = 7
3,123,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,123,803 UART: [art] PUB.X = AAC17EBAF5D4BB58E9DC58E374612F836E641ACA34E813F18476DEE002C353F294A7D809EAE0E77FCE8FDD3E8275D661
3,130,585 UART: [art] PUB.Y = 34934C30D55CB5C653E21BC7ADF858E3C4CAFC30ACA74AD23B2711567D9AE186243E9E5A165A136B29905EB3A2050848
3,137,535 UART: [art] SIG.R = EE9EA967BE43965B50824B767419FEB881B217136E1EA1D2C9BA8FFC788F8603F8CBC6E8CD6AD1806E112C1106FE5895
3,144,309 UART: [art] SIG.S = 4886C1F82B2359F81792249D6DD0BD8B236D876CB789AECF12BE8EA5BB02AE2BB60A96C955E421637D187135C18E197D
3,168,542 UART: Caliptra RT
3,168,887 UART: [state] CFI Enabled
3,277,424 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,307,956 UART: [rt]cmd =0x46505652, len=4
3,308,616 UART: [rt] FIPS Version
3,309,721 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,313 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,136,633 >>> mbox cmd response data (36 bytes)
1,136,634 <<< Executing mbox cmd 0x46574c44 (114168 bytes) from SoC
2,621,686 >>> mbox cmd response: success
2,621,686 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,684,520 UART:
2,684,536 UART: Running Caliptra FMC ...
2,684,944 UART:
2,685,087 UART: [state] CFI Enabled
2,695,556 UART: [fht] FMC Alias Private Key: 7
2,803,275 UART: [art] Extend RT PCRs Done
2,803,703 UART: [art] Lock RT PCRs Done
2,805,129 UART: [art] Populate DV Done
2,813,108 UART: [fht] FMC Alias Private Key: 7
2,814,092 UART: [art] Derive CDI
2,814,372 UART: [art] Store in in slot 0x4
2,900,207 UART: [art] Derive Key Pair
2,900,567 UART: [art] Store priv key in slot 0x5
2,913,333 UART: [art] Derive Key Pair - Done
2,927,942 UART: [art] Signing Cert with AUTHO
2,928,422 UART: RITY.KEYID = 7
2,943,456 UART: [art] Erasing AUTHORITY.KEYID = 7
2,944,221 UART: [art] PUB.X = 05BBCFB3E07929526D57551AB48FF89D527D275B927028A7D64A7A22135EFA9D74466F791CD87D38F90D9B896F99054C
2,950,982 UART: [art] PUB.Y = A52DDC2ED28DF53F068564E954AAB7DBC69F1ABF21065C5713377BD9A9FBAF70A787A13523B63D0D86DBCFCEBA25FDEF
2,957,951 UART: [art] SIG.R = C53CC340D27004B235A5DA862244D0E62B662076172D7F57A8BF8D677CD4FD25B1DC95610E3BDA82EBFEBA2859E7C284
2,964,725 UART: [art] SIG.S = 4480AB4E0B53E985B9FE1D2BB86D0AD6BB57C16AB8B744ACCE0A4FE9E110E921BC1C2C780F108587A1EF7FA200071950
2,988,777 UART: Caliptra RT
2,989,122 UART: [state] CFI Enabled
3,097,135 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,127,507 UART: [rt]cmd =0x46505652, len=4
3,128,167 UART: [rt] FIPS Version
3,129,136 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,378 UART:
192,737 UART: Running Caliptra ROM ...
193,825 UART:
193,968 UART: [state] CFI Enabled
260,165 UART: [state] LifecycleState = Unprovisioned
262,167 UART: [state] DebugLocked = No
263,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,848 UART: [kat] SHA2-256
438,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,026 UART: [kat] ++
449,552 UART: [kat] sha1
460,425 UART: [kat] SHA2-256
463,328 UART: [kat] SHA2-384
469,220 UART: [kat] SHA2-512-ACC
471,598 UART: [kat] ECC-384
2,767,460 UART: [kat] HMAC-384Kdf
2,797,830 UART: [kat] LMS
3,988,147 UART: [kat] --
3,991,600 UART: [cold-reset] ++
3,993,113 UART: [fht] Storing FHT @ 0x50003400
4,004,456 UART: [idev] ++
4,005,049 UART: [idev] CDI.KEYID = 6
4,006,092 UART: [idev] SUBJECT.KEYID = 7
4,007,278 UART: [idev] UDS.KEYID = 0
4,008,324 ready_for_fw is high
4,008,553 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,152,849 UART: [idev] Erasing UDS.KEYID = 0
7,347,266 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,624 UART: [idev] --
7,373,828 UART: [ldev] ++
7,374,392 UART: [ldev] CDI.KEYID = 6
7,375,329 UART: [ldev] SUBJECT.KEYID = 5
7,376,540 UART: [ldev] AUTHORITY.KEYID = 7
7,377,827 UART: [ldev] FE.KEYID = 1
7,422,421 UART: [ldev] Erasing FE.KEYID = 1
10,757,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,857 UART: [ldev] --
13,135,964 UART: [fwproc] Waiting for Commands...
13,139,196 UART: [fwproc] Received command 0x46574c44
13,141,389 UART: [fwproc] Received Image of size 114716 bytes
17,195,458 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,778 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,334,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,653,439 >>> mbox cmd response: success
17,653,842 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,657,879 UART: [afmc] ++
17,658,449 UART: [afmc] CDI.KEYID = 6
17,659,367 UART: [afmc] SUBJECT.KEYID = 7
17,660,639 UART: [afmc] AUTHORITY.KEYID = 5
21,027,517 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,795 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,332,052 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,346,497 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,361,291 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,375,741 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,396,275 UART: [afmc] --
23,400,234 UART: [cold-reset] --
23,402,411 UART: [state] Locking Datavault
23,409,939 UART: [state] Locking PCR0, PCR1 and PCR31
23,411,641 UART: [state] Locking ICCM
23,413,534 UART: [exit] Launching FMC @ 0x40000130
23,421,936 UART:
23,422,173 UART: Running Caliptra FMC ...
23,423,274 UART:
23,423,628 UART: [state] CFI Enabled
23,489,187 UART: [fht] FMC Alias Private Key: 7
25,827,104 UART: [art] Extend RT PCRs Done
25,828,323 UART: [art] Lock RT PCRs Done
25,829,790 UART: [art] Populate DV Done
25,835,386 UART: [fht] FMC Alias Private Key: 7
25,836,937 UART: [art] Derive CDI
25,837,669 UART: [art] Store in in slot 0x4
25,897,786 UART: [art] Derive Key Pair
25,898,784 UART: [art] Store priv key in slot 0x5
29,190,210 UART: [art] Derive Key Pair - Done
29,203,589 UART: [art] Signing Cert with AUTHO
29,204,895 UART: RITY.KEYID = 7
31,492,698 UART: [art] Erasing AUTHORITY.KEYID = 7
31,494,205 UART: [art] PUB.X = F395D86F4712EE0553D936CEA1767408BE81343D1C33A4CE4644E3EC624D07B497486BF324E3F1F2975699255E191F02
31,501,420 UART: [art] PUB.Y = 4E1238C6679CCA8E2D4E26A6A4FA6FEB838E6C32FEBE5FA01DFF38D56AD3909266AB20F15C48ADC27EB8789403CB6185
31,508,687 UART: [art] SIG.R = 8C3380F044DFA01032FD12EFFDBA71601D79218E21198B66309E2A2858A7DA05CB2068B7B8FD570335ABA9DE3F8536C2
31,516,057 UART: [art] SIG.S = 389905858733F43B7E7DBCB8EFB04F454206747CD0726F237A707347E7EF2D5A02090930F37F9A0FE37569C068AA75A7
32,821,236 UART: Caliptra RT
32,821,947 UART: [state] CFI Enabled
32,983,913 UART: [rt] RT listening for mailbox commands...
33,015,073 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,784,733 ready_for_fw is high
3,785,261 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
17,887,027 >>> mbox cmd response: success
17,887,570 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,587,434 UART:
23,587,804 UART: Running Caliptra FMC ...
23,588,971 UART:
23,589,133 UART: [state] CFI Enabled
23,657,299 UART: [fht] FMC Alias Private Key: 7
25,994,912 UART: [art] Extend RT PCRs Done
25,996,137 UART: [art] Lock RT PCRs Done
25,997,824 UART: [art] Populate DV Done
26,003,169 UART: [fht] FMC Alias Private Key: 7
26,004,773 UART: [art] Derive CDI
26,005,514 UART: [art] Store in in slot 0x4
26,066,639 UART: [art] Derive Key Pair
26,067,685 UART: [art] Store priv key in slot 0x5
29,360,054 UART: [art] Derive Key Pair - Done
29,373,282 UART: [art] Signing Cert with AUTHO
29,374,585 UART: RITY.KEYID = 7
31,664,215 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,860 UART: [art] PUB.X = C782CD27853E88F209B7F41B05291F24800567440B3471C0F5F9A9BE3155F7D66512466D2A520095937928452B2B8640
31,672,953 UART: [art] PUB.Y = E127A7FB7C152A417D3278F104706FDE1268CFECD0D494096DED907D85AEE20A43108570A979F9B9B72411E16E938CA4
31,680,211 UART: [art] SIG.R = 80402BC5A4E1251BAD5877212EA58203138BD13137119E65A6089DB9AA689CD7FC40CE44F0FD13D9055D4FA49FC706B2
31,687,599 UART: [art] SIG.S = D26729B51A4C56A2AD3AF62220EE945704861069F0B9806F3229D2F852C5E292C56AE264C751118451240EBBDB2053E3
32,992,681 UART: Caliptra RT
32,993,390 UART: [state] CFI Enabled
33,154,235 UART: [rt] RT listening for mailbox commands...
33,185,718 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,318 UART:
192,686 UART: Running Caliptra ROM ...
193,833 UART:
603,613 UART: [state] CFI Enabled
620,114 UART: [state] LifecycleState = Unprovisioned
622,055 UART: [state] DebugLocked = No
623,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,035 UART: [kat] SHA2-256
797,755 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,286 UART: [kat] ++
808,892 UART: [kat] sha1
820,881 UART: [kat] SHA2-256
823,578 UART: [kat] SHA2-384
829,436 UART: [kat] SHA2-512-ACC
831,808 UART: [kat] ECC-384
3,113,623 UART: [kat] HMAC-384Kdf
3,126,261 UART: [kat] LMS
4,316,418 UART: [kat] --
4,322,242 UART: [cold-reset] ++
4,323,905 UART: [fht] Storing FHT @ 0x50003400
4,335,749 UART: [idev] ++
4,336,321 UART: [idev] CDI.KEYID = 6
4,337,318 UART: [idev] SUBJECT.KEYID = 7
4,338,500 UART: [idev] UDS.KEYID = 0
4,339,726 ready_for_fw is high
4,339,977 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
4,484,010 UART: [idev] Erasing UDS.KEYID = 0
7,625,193 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,535 UART: [idev] --
7,652,317 UART: [ldev] ++
7,652,892 UART: [ldev] CDI.KEYID = 6
7,653,834 UART: [ldev] SUBJECT.KEYID = 5
7,655,105 UART: [ldev] AUTHORITY.KEYID = 7
7,656,339 UART: [ldev] FE.KEYID = 1
7,667,493 UART: [ldev] Erasing FE.KEYID = 1
10,949,031 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,889 UART: [ldev] --
13,308,604 UART: [fwproc] Waiting for Commands...
13,310,333 UART: [fwproc] Received command 0x46574c44
13,312,523 UART: [fwproc] Received Image of size 114716 bytes
17,372,420 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,449,581 UART: [fwproc] Loading FMC at address 0x40000000 len 18820
17,518,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 90012
17,838,048 >>> mbox cmd response: success
17,838,458 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,842,462 UART: [afmc] ++
17,843,127 UART: [afmc] CDI.KEYID = 6
17,844,017 UART: [afmc] SUBJECT.KEYID = 7
17,845,233 UART: [afmc] AUTHORITY.KEYID = 5
21,161,314 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,459,467 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,461,729 UART: [afmc] PUB.X = 6E7AD1B8763885D8845591D3760A58350AD0C71DAC55E6F37807209BC408C8D4E37F03080D3EE42AF2A8607EFEF28A29
23,476,119 UART: [afmc] PUB.Y = C7DC356685996C3AF761BFB9FC429B682AC26BF3BC5C401ADBD99F08F6867D5DAFEC93589590D57F851D4A4033B5B303
23,490,940 UART: [afmc] SIG.R = 5E3469508C6DEDE2200C0F8BBD5B3ABD8ABBA9A7D06DD86FD6791E6AE0EC85CB2634EAB2922A6892D8CA78DA0E3C4434
23,505,381 UART: [afmc] SIG.S = 8C0822A23D3B5767247F69048A8D3FA9353905480F0CE728C9157498AA7ADA296523F6DB1DE4DE77A1550F35158CAB85
23,527,344 UART: [afmc] --
23,530,841 UART: [cold-reset] --
23,536,487 UART: [state] Locking Datavault
23,540,212 UART: [state] Locking PCR0, PCR1 and PCR31
23,541,957 UART: [state] Locking ICCM
23,544,298 UART: [exit] Launching FMC @ 0x40000130
23,552,694 UART:
23,552,958 UART: Running Caliptra FMC ...
23,554,065 UART:
23,554,228 UART: [state] CFI Enabled
23,562,356 UART: [fht] FMC Alias Private Key: 7
25,893,730 UART: [art] Extend RT PCRs Done
25,894,964 UART: [art] Lock RT PCRs Done
25,896,716 UART: [art] Populate DV Done
25,902,004 UART: [fht] FMC Alias Private Key: 7
25,903,567 UART: [art] Derive CDI
25,904,385 UART: [art] Store in in slot 0x4
25,946,939 UART: [art] Derive Key Pair
25,947,983 UART: [art] Store priv key in slot 0x5
29,190,117 UART: [art] Derive Key Pair - Done
29,203,247 UART: [art] Signing Cert with AUTHO
29,204,543 UART: RITY.KEYID = 7
31,484,165 UART: [art] Erasing AUTHORITY.KEYID = 7
31,485,687 UART: [art] PUB.X = 7D46EEE8F90C1E1F39B67E9A0C17E975BEA68E47CD023307CB21E8E0D7B90FBAF1D6C16D9D46AEE55E6502AA0503B1F0
31,492,934 UART: [art] PUB.Y = 27070294D30103517524B0ECAA0EF8CC949DA73EB7F49182A34996B24BD0A9E86B25800DC1878FD778C660DBCA0E497D
31,500,173 UART: [art] SIG.R = 1F80442AA785807F4DBDA264DB2154608B2FB24F0FF3029860B3FA8B2C21F4F51FB30A8C735CDE83A771F4DEA1E6A507
31,507,540 UART: [art] SIG.S = 2346784B3C967E57D2286D08B5A7DFDE5607F12444D233F42547660AE6456079B2C8885D31B0B1A9D167304098C8D1F1
32,811,931 UART: Caliptra RT
32,812,644 UART: [state] CFI Enabled
32,930,104 UART: [rt] RT listening for mailbox commands...
32,961,713 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,127,369 ready_for_fw is high
4,127,780 <<< Executing mbox cmd 0x46574c44 (114716 bytes) from SoC
18,090,622 >>> mbox cmd response: success
18,091,327 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,734,152 UART:
23,734,550 UART: Running Caliptra FMC ...
23,735,688 UART:
23,735,870 UART: [state] CFI Enabled
23,743,945 UART: [fht] FMC Alias Private Key: 7
26,074,293 UART: [art] Extend RT PCRs Done
26,075,529 UART: [art] Lock RT PCRs Done
26,076,949 UART: [art] Populate DV Done
26,082,405 UART: [fht] FMC Alias Private Key: 7
26,084,055 UART: [art] Derive CDI
26,084,879 UART: [art] Store in in slot 0x4
26,127,117 UART: [art] Derive Key Pair
26,128,120 UART: [art] Store priv key in slot 0x5
29,370,105 UART: [art] Derive Key Pair - Done
29,382,881 UART: [art] Signing Cert with AUTHO
29,384,193 UART: RITY.KEYID = 7
31,663,678 UART: [art] Erasing AUTHORITY.KEYID = 7
31,665,198 UART: [art] PUB.X = 7B88266E5E30F76CC7E043E96F231F469F121EE0C3C5654CA589A8445C8EDC2F417D6364B3C517055D5E0F8901F9F4F8
31,672,422 UART: [art] PUB.Y = BE068CD20FA69A54B8B697F151A5167C24C621DE2AAEBC5B9AFB6D35A94EFEFFBDBC8586E16C66C4C9B8C7CDAC2F90B2
31,679,725 UART: [art] SIG.R = 70FDEC79EBCB071823A4E275628941714FCAA82399226807BE51E1F07DEC1FDF5869AB86F8E32566FFA5021739385886
31,687,068 UART: [art] SIG.S = 94FBDA473A2BB2656C8545D9CB68AF07B799910B4617AA12AD9A125AE29CA5A99D90D773D1FFA7CA14AF25DEA41F3E78
32,992,391 UART: Caliptra RT
32,993,099 UART: [state] CFI Enabled
33,110,819 UART: [rt] RT listening for mailbox commands...
33,142,384 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,299 UART:
192,677 UART: Running Caliptra ROM ...
193,895 UART:
194,055 UART: [state] CFI Enabled
263,874 UART: [state] LifecycleState = Unprovisioned
265,797 UART: [state] DebugLocked = No
268,342 UART: [state] WD Timer not started. Device not locked for debugging
271,959 UART: [kat] SHA2-256
451,120 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,700 UART: [kat] ++
463,234 UART: [kat] sha1
473,212 UART: [kat] SHA2-256
476,203 UART: [kat] SHA2-384
481,216 UART: [kat] SHA2-512-ACC
484,156 UART: [kat] ECC-384
2,948,065 UART: [kat] HMAC-384Kdf
2,969,547 UART: [kat] LMS
3,498,967 UART: [kat] --
3,504,028 UART: [cold-reset] ++
3,505,182 UART: [fht] FHT @ 0x50003400
3,516,468 UART: [idev] ++
3,517,074 UART: [idev] CDI.KEYID = 6
3,517,994 UART: [idev] SUBJECT.KEYID = 7
3,519,172 UART: [idev] UDS.KEYID = 0
3,520,099 ready_for_fw is high
3,520,303 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,664,819 UART: [idev] Erasing UDS.KEYID = 0
6,025,773 UART: [idev] Sha1 KeyId Algorithm
6,047,448 UART: [idev] --
6,052,695 UART: [ldev] ++
6,053,269 UART: [ldev] CDI.KEYID = 6
6,054,155 UART: [ldev] SUBJECT.KEYID = 5
6,055,373 UART: [ldev] AUTHORITY.KEYID = 7
6,056,631 UART: [ldev] FE.KEYID = 1
6,099,648 UART: [ldev] Erasing FE.KEYID = 1
8,605,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,961 UART: [ldev] --
10,415,124 UART: [fwproc] Wait for Commands...
10,417,657 UART: [fwproc] Recv command 0x46574c44
10,419,703 UART: [fwproc] Recv'd Img size: 115032 bytes
13,828,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,898,900 UART: [fwproc] Load FMC at address 0x40000000 len 18800
13,967,697 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,287,932 >>> mbox cmd response: success
14,288,352 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,292,526 UART: [afmc] ++
14,293,108 UART: [afmc] CDI.KEYID = 6
14,294,181 UART: [afmc] SUBJECT.KEYID = 7
14,295,282 UART: [afmc] AUTHORITY.KEYID = 5
16,827,429 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,462 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,571,252 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,587,258 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,603,117 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,625,481 UART: [afmc] --
18,629,947 UART: [cold-reset] --
18,634,615 UART: [state] Locking Datavault
18,638,013 UART: [state] Locking PCR0, PCR1 and PCR31
18,639,693 UART: [state] Locking ICCM
18,642,390 UART: [exit] Launching FMC @ 0x40000130
18,650,803 UART:
18,651,043 UART: Running Caliptra FMC ...
18,652,149 UART:
18,652,314 UART: [state] CFI Enabled
18,712,041 UART: [fht] FMC Alias Private Key: 7
20,476,303 UART: [art] Extend RT PCRs Done
20,477,528 UART: [art] Lock RT PCRs Done
20,479,379 UART: [art] Populate DV Done
20,484,695 UART: [fht] FMC Alias Private Key: 7
20,486,183 UART: [art] Derive CDI
20,486,943 UART: [art] Store in in slot 0x4
20,545,964 UART: [art] Derive Key Pair
20,547,134 UART: [art] Store priv key in slot 0x5
23,009,892 UART: [art] Derive Key Pair - Done
23,023,084 UART: [art] Signing Cert with AUTHO
23,024,394 UART: RITY.KEYID = 7
24,736,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,737,836 UART: [art] PUB.X = 6A94064AECBD4A3636C49E29BC3B5C5C084E5C4B0CFFC7EECA081D3D14E18B8EFC75B6E92F3FCA9E45A01D9C9DBF6D30
24,745,118 UART: [art] PUB.Y = 4D488683B2533789A94E4DBC8523483AFEED09C41471AC27E76466C97DD6BBCF9A2AD2CC6C471F87114E4167EE322A67
24,752,413 UART: [art] SIG.R = 381EC38D74AA054391508DB82B21E269CF61C123B7E07CAD2E91FF71625AB6E3ECD7ABE77B5584B1F172A06EB3D895A8
24,759,773 UART: [art] SIG.S = 56180FFB3AB5A8EDBAACDE6F1349502A98EE17E2648DC305EABF463A48B68831A1FE08ED06BA300883DCE1588EF8FC42
25,738,654 UART: Caliptra RT
25,739,360 UART: [state] CFI Enabled
25,904,770 UART: [rt] RT listening for mailbox commands...
25,936,331 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,363,208 ready_for_fw is high
3,363,686 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,049,580 >>> mbox cmd response: success
14,050,263 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,349,347 UART:
18,349,735 UART: Running Caliptra FMC ...
18,350,897 UART:
18,351,054 UART: [state] CFI Enabled
18,414,518 UART: [fht] FMC Alias Private Key: 7
20,178,403 UART: [art] Extend RT PCRs Done
20,179,637 UART: [art] Lock RT PCRs Done
20,181,316 UART: [art] Populate DV Done
20,186,677 UART: [fht] FMC Alias Private Key: 7
20,188,224 UART: [art] Derive CDI
20,188,956 UART: [art] Store in in slot 0x4
20,248,033 UART: [art] Derive Key Pair
20,249,035 UART: [art] Store priv key in slot 0x5
22,711,381 UART: [art] Derive Key Pair - Done
22,724,058 UART: [art] Signing Cert with AUTHO
22,725,370 UART: RITY.KEYID = 7
24,437,761 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,243 UART: [art] PUB.X = EA2E49E8073E136A005F5EB8E939817E519965B7C44DEE7BA6157BF809E2AC897F6CE68E9D57B6DBE41E7214EBDBA785
24,446,524 UART: [art] PUB.Y = AB6EBF17D35E28C43268571BB7474537C0B18F4B2E2C44C2F4A1D3C5324DDF4469FA3DBA98E42CA67A1D38994E51803F
24,453,810 UART: [art] SIG.R = 5DC4E27C44F211C3BD18180E6908997371C580002D7C7C8C805DF62CC86073611539AFB066C8E8973A6EDF28517351A8
24,461,158 UART: [art] SIG.S = 0246CB11298C22FDBB3AE676E00B21FC5AD3C627AC739912AEE988402F6B12C0C1AB14E8228F7043C9082C339DCF8D37
25,440,082 UART: Caliptra RT
25,440,802 UART: [state] CFI Enabled
25,606,584 UART: [rt] RT listening for mailbox commands...
25,638,074 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,431 writing to cptra_bootfsm_go
192,772 UART:
193,130 UART: Running Caliptra ROM ...
194,352 UART:
603,704 UART: [state] CFI Enabled
619,155 UART: [state] LifecycleState = Unprovisioned
621,066 UART: [state] DebugLocked = No
622,608 UART: [state] WD Timer not started. Device not locked for debugging
625,441 UART: [kat] SHA2-256
804,573 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
816,161 UART: [kat] ++
816,697 UART: [kat] sha1
827,431 UART: [kat] SHA2-256
830,431 UART: [kat] SHA2-384
836,491 UART: [kat] SHA2-512-ACC
839,436 UART: [kat] ECC-384
3,281,108 UART: [kat] HMAC-384Kdf
3,294,604 UART: [kat] LMS
3,824,153 UART: [kat] --
3,828,152 UART: [cold-reset] ++
3,830,440 UART: [fht] FHT @ 0x50003400
3,842,419 UART: [idev] ++
3,842,993 UART: [idev] CDI.KEYID = 6
3,843,909 UART: [idev] SUBJECT.KEYID = 7
3,845,088 UART: [idev] UDS.KEYID = 0
3,846,071 ready_for_fw is high
3,846,300 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,990,842 UART: [idev] Erasing UDS.KEYID = 0
6,313,985 UART: [idev] Sha1 KeyId Algorithm
6,336,802 UART: [idev] --
6,341,348 UART: [ldev] ++
6,341,922 UART: [ldev] CDI.KEYID = 6
6,342,832 UART: [ldev] SUBJECT.KEYID = 5
6,344,010 UART: [ldev] AUTHORITY.KEYID = 7
6,345,247 UART: [ldev] FE.KEYID = 1
6,356,000 UART: [ldev] Erasing FE.KEYID = 1
8,825,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,543,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,559,652 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,575,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,591,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,612,613 UART: [ldev] --
10,617,887 UART: [fwproc] Wait for Commands...
10,619,649 UART: [fwproc] Recv command 0x46574c44
10,621,760 UART: [fwproc] Recv'd Img size: 115032 bytes
14,033,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,674 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,176,484 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,496,103 >>> mbox cmd response: success
14,496,617 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,500,626 UART: [afmc] ++
14,501,208 UART: [afmc] CDI.KEYID = 6
14,502,089 UART: [afmc] SUBJECT.KEYID = 7
14,503,294 UART: [afmc] AUTHORITY.KEYID = 5
17,001,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,722,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,724,786 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,740,551 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,756,589 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,772,444 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,795,070 UART: [afmc] --
18,799,487 UART: [cold-reset] --
18,802,508 UART: [state] Locking Datavault
18,806,743 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,410 UART: [state] Locking ICCM
18,810,932 UART: [exit] Launching FMC @ 0x40000130
18,819,352 UART:
18,819,586 UART: Running Caliptra FMC ...
18,820,685 UART:
18,820,842 UART: [state] CFI Enabled
18,828,659 UART: [fht] FMC Alias Private Key: 7
20,585,034 UART: [art] Extend RT PCRs Done
20,586,288 UART: [art] Lock RT PCRs Done
20,588,035 UART: [art] Populate DV Done
20,593,523 UART: [fht] FMC Alias Private Key: 7
20,595,019 UART: [art] Derive CDI
20,595,759 UART: [art] Store in in slot 0x4
20,638,281 UART: [art] Derive Key Pair
20,639,310 UART: [art] Store priv key in slot 0x5
23,066,598 UART: [art] Derive Key Pair - Done
23,079,339 UART: [art] Signing Cert with AUTHO
23,080,666 UART: RITY.KEYID = 7
24,786,284 UART: [art] Erasing AUTHORITY.KEYID = 7
24,787,768 UART: [art] PUB.X = 2A28510530110DB4A07689EB29A533E145D4150A8B5C7C0F0663CB824C112668E3AE60B490820D78716C960F2890AE92
24,795,004 UART: [art] PUB.Y = C7B5F6169D8704A2A92E203C3C4408DEC97F681785F3DECDE07660EE85C88313DCCAC4CECF0562D62454942DBA4C757B
24,802,264 UART: [art] SIG.R = 85D18F49726362AE350D765AFD44398BBA2DB8F6391783650B9D1F686815D3BC2CA13D940D7571F955A7D637906DEC4C
24,809,651 UART: [art] SIG.S = E8786C62C45681CD6F1859F821C23D5DB7CE14A3920E017880DB478353E5BDF4F29A6E9F7F9C10C6384C21A04E4BA80B
25,788,973 UART: Caliptra RT
25,789,683 UART: [state] CFI Enabled
25,906,905 UART: [rt] RT listening for mailbox commands...
25,938,147 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,694,944 ready_for_fw is high
3,695,389 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,281,471 >>> mbox cmd response: success
14,282,175 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,534,346 UART:
18,534,725 UART: Running Caliptra FMC ...
18,535,938 UART:
18,536,097 UART: [state] CFI Enabled
18,544,170 UART: [fht] FMC Alias Private Key: 7
20,301,617 UART: [art] Extend RT PCRs Done
20,302,847 UART: [art] Lock RT PCRs Done
20,304,395 UART: [art] Populate DV Done
20,309,765 UART: [fht] FMC Alias Private Key: 7
20,311,359 UART: [art] Derive CDI
20,312,094 UART: [art] Store in in slot 0x4
20,354,633 UART: [art] Derive Key Pair
20,355,675 UART: [art] Store priv key in slot 0x5
22,782,494 UART: [art] Derive Key Pair - Done
22,795,451 UART: [art] Signing Cert with AUTHO
22,796,779 UART: RITY.KEYID = 7
24,502,093 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,601 UART: [art] PUB.X = 304C77B45941934F480139DD92098062E712DCE408FB58C9C7AB279A4C3E051211186B52E3E92B5195C3B40BBB2CCDB0
24,510,846 UART: [art] PUB.Y = 68649F689E46A0A97AFB7AC0F6B03746EA8C4A5697A5453EA8F613708AFC7E539D72F1D8FB59447F801C07FD4499031D
24,518,109 UART: [art] SIG.R = 3EAF324D8BDE47BF8212C51615E6E49797768474AF027A26E3E3B5B99332268F724CEE05C5121AA4012A30B8AB8ACEFE
24,525,478 UART: [art] SIG.S = F4979253A03E31659D31FCD48FAB0D6F5078B855EAA5A33E3664239A61E0C85C75DC5BDA4745089EF4C53037A0742DD6
25,504,617 UART: Caliptra RT
25,505,320 UART: [state] CFI Enabled
25,622,390 UART: [rt] RT listening for mailbox commands...
25,653,520 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,141 UART:
192,499 UART: Running Caliptra ROM ...
193,693 UART:
193,849 UART: [state] CFI Enabled
263,275 UART: [state] LifecycleState = Unprovisioned
265,601 UART: [state] DebugLocked = No
268,135 UART: [state] WD Timer not started. Device not locked for debugging
272,328 UART: [kat] SHA2-256
462,225 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,043 UART: [kat] ++
473,545 UART: [kat] sha1
484,636 UART: [kat] SHA2-256
487,652 UART: [kat] SHA2-384
493,297 UART: [kat] SHA2-512-ACC
495,884 UART: [kat] ECC-384
2,951,145 UART: [kat] HMAC-384Kdf
2,974,099 UART: [kat] LMS
3,505,805 UART: [kat] --
3,509,766 UART: [cold-reset] ++
3,511,775 UART: [fht] FHT @ 0x50003400
3,521,616 UART: [idev] ++
3,522,333 UART: [idev] CDI.KEYID = 6
3,523,253 UART: [idev] SUBJECT.KEYID = 7
3,524,501 UART: [idev] UDS.KEYID = 0
3,525,696 ready_for_fw is high
3,525,956 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
3,670,691 UART: [idev] Erasing UDS.KEYID = 0
6,029,371 UART: [idev] Sha1 KeyId Algorithm
6,050,986 UART: [idev] --
6,057,068 UART: [ldev] ++
6,057,775 UART: [ldev] CDI.KEYID = 6
6,058,688 UART: [ldev] SUBJECT.KEYID = 5
6,059,850 UART: [ldev] AUTHORITY.KEYID = 7
6,061,083 UART: [ldev] FE.KEYID = 1
6,102,460 UART: [ldev] Erasing FE.KEYID = 1
8,611,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,051 UART: [ldev] --
10,416,145 UART: [fwproc] Wait for Commands...
10,417,702 UART: [fwproc] Recv command 0x46574c44
10,419,972 UART: [fwproc] Recv'd Img size: 115032 bytes
13,871,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,463 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,062,605 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,609,547 >>> mbox cmd response: success
14,609,942 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,613,977 UART: [afmc] ++
14,614,660 UART: [afmc] CDI.KEYID = 6
14,615,900 UART: [afmc] SUBJECT.KEYID = 7
14,617,345 UART: [afmc] AUTHORITY.KEYID = 5
17,154,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,878,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,880,437 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
18,895,618 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
18,910,761 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
18,925,832 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
18,948,585 UART: [afmc] --
18,951,875 UART: [cold-reset] --
18,954,998 UART: [state] Locking Datavault
18,959,024 UART: [state] Locking PCR0, PCR1 and PCR31
18,961,205 UART: [state] Locking ICCM
18,963,346 UART: [exit] Launching FMC @ 0x40000130
18,972,002 UART:
18,972,238 UART: Running Caliptra FMC ...
18,973,264 UART:
18,973,411 UART: [state] CFI Enabled
19,034,250 UART: [fht] FMC Alias Private Key: 7
20,798,111 UART: [art] Extend RT PCRs Done
20,799,327 UART: [art] Lock RT PCRs Done
20,800,905 UART: [art] Populate DV Done
20,806,413 UART: [fht] FMC Alias Private Key: 7
20,808,042 UART: [art] Derive CDI
20,808,858 UART: [art] Store in in slot 0x4
20,866,913 UART: [art] Derive Key Pair
20,867,957 UART: [art] Store priv key in slot 0x5
23,331,185 UART: [art] Derive Key Pair - Done
23,344,409 UART: [art] Signing Cert with AUTHO
23,345,718 UART: RITY.KEYID = 7
25,057,172 UART: [art] Erasing AUTHORITY.KEYID = 7
25,058,686 UART: [art] PUB.X = 4FC624DEE961593BA8C65E4F3106E31B7459F8937BB0C31677B015C11997719009C477736CCF0F152E001300A1F99CEA
25,065,905 UART: [art] PUB.Y = C888925ACD5884CA33306F2383D383F4B9000FB3DF394DD2B4B421A36CE76FC23BB8BBB5CB7E2B8461F1424D08E39546
25,073,136 UART: [art] SIG.R = 09C11B0FF6D0052E5A44B34B859AF3FF52B016A5E583E68E00BE6C9A5C14D0EB336B3107A1DE96787925C436DB67F488
25,080,526 UART: [art] SIG.S = 31D0077C215D388AF8F971EDF84B3A5A5E8895513730F4C18719F98699B22A0C06F6145379A85F5D5EF8BC4EA582EFE4
26,059,743 UART: Caliptra RT
26,060,438 UART: [state] CFI Enabled
26,225,250 UART: [rt] RT listening for mailbox commands...
26,256,776 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,419,991 ready_for_fw is high
3,420,410 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,720,153 >>> mbox cmd response: success
14,720,893 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,004,921 UART:
19,005,314 UART: Running Caliptra FMC ...
19,006,484 UART:
19,006,652 UART: [state] CFI Enabled
19,071,314 UART: [fht] FMC Alias Private Key: 7
20,834,876 UART: [art] Extend RT PCRs Done
20,836,099 UART: [art] Lock RT PCRs Done
20,837,714 UART: [art] Populate DV Done
20,843,053 UART: [fht] FMC Alias Private Key: 7
20,844,584 UART: [art] Derive CDI
20,845,346 UART: [art] Store in in slot 0x4
20,903,272 UART: [art] Derive Key Pair
20,904,311 UART: [art] Store priv key in slot 0x5
23,367,136 UART: [art] Derive Key Pair - Done
23,380,337 UART: [art] Signing Cert with AUTHO
23,381,701 UART: RITY.KEYID = 7
25,093,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,094,612 UART: [art] PUB.X = 8B5A8C8C836D38B59B3224B421DC96C7269711187EFADA7FF80DE62EBA41765B1E1F138DF43E0CE63655BD583096D023
25,101,874 UART: [art] PUB.Y = FFD90FD99349141FD3B710FAC3FAEC6A244736B0040D8D45BB0FB708E84AEFC19C1AABBEF96E0214E905B5EAEE887CE6
25,109,144 UART: [art] SIG.R = DE6D5B47DA02B93FB726216B6DC25BFEF93E4F4230B8AC170F64BC6949B74E9214CE8A51A2A97B409403DCD744EE4598
25,116,587 UART: [art] SIG.S = 9226F3972861D21A7B697D0ABA6A3C4074609192CF5D0BE80A13DBCCE50C0D46AD7DE0BEE9AEF3467B732B1F7FC3C801
26,096,344 UART: Caliptra RT
26,097,055 UART: [state] CFI Enabled
26,260,600 UART: [rt] RT listening for mailbox commands...
26,291,938 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,431 UART:
192,796 UART: Running Caliptra ROM ...
193,993 UART:
603,412 UART: [state] CFI Enabled
617,283 UART: [state] LifecycleState = Unprovisioned
619,660 UART: [state] DebugLocked = No
621,552 UART: [state] WD Timer not started. Device not locked for debugging
626,245 UART: [kat] SHA2-256
816,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,948 UART: [kat] ++
827,553 UART: [kat] sha1
837,866 UART: [kat] SHA2-256
840,945 UART: [kat] SHA2-384
846,390 UART: [kat] SHA2-512-ACC
848,988 UART: [kat] ECC-384
3,289,105 UART: [kat] HMAC-384Kdf
3,302,766 UART: [kat] LMS
3,834,591 UART: [kat] --
3,838,887 UART: [cold-reset] ++
3,841,180 UART: [fht] FHT @ 0x50003400
3,851,954 UART: [idev] ++
3,852,593 UART: [idev] CDI.KEYID = 6
3,853,624 UART: [idev] SUBJECT.KEYID = 7
3,854,801 UART: [idev] UDS.KEYID = 0
3,855,741 ready_for_fw is high
3,855,962 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
4,000,516 UART: [idev] Erasing UDS.KEYID = 0
6,334,110 UART: [idev] Sha1 KeyId Algorithm
6,356,438 UART: [idev] --
6,361,263 UART: [ldev] ++
6,361,959 UART: [ldev] CDI.KEYID = 6
6,362,872 UART: [ldev] SUBJECT.KEYID = 5
6,364,034 UART: [ldev] AUTHORITY.KEYID = 7
6,365,213 UART: [ldev] FE.KEYID = 1
6,375,973 UART: [ldev] Erasing FE.KEYID = 1
8,850,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,084 UART: [ldev] --
10,643,046 UART: [fwproc] Wait for Commands...
10,645,154 UART: [fwproc] Recv command 0x46574c44
10,647,427 UART: [fwproc] Recv'd Img size: 115032 bytes
14,103,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,182,808 UART: [fwproc] Load FMC at address 0x40000000 len 18800
14,298,945 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
14,845,167 >>> mbox cmd response: success
14,845,575 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,848,962 UART: [afmc] ++
14,849,679 UART: [afmc] CDI.KEYID = 6
14,850,886 UART: [afmc] SUBJECT.KEYID = 7
14,852,339 UART: [afmc] AUTHORITY.KEYID = 5
17,354,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,075,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,077,023 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
19,092,207 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
19,107,366 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
19,122,406 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
19,146,564 UART: [afmc] --
19,150,805 UART: [cold-reset] --
19,153,483 UART: [state] Locking Datavault
19,157,452 UART: [state] Locking PCR0, PCR1 and PCR31
19,159,603 UART: [state] Locking ICCM
19,160,942 UART: [exit] Launching FMC @ 0x40000130
19,169,599 UART:
19,169,833 UART: Running Caliptra FMC ...
19,170,932 UART:
19,171,091 UART: [state] CFI Enabled
19,179,287 UART: [fht] FMC Alias Private Key: 7
20,935,954 UART: [art] Extend RT PCRs Done
20,937,174 UART: [art] Lock RT PCRs Done
20,938,644 UART: [art] Populate DV Done
20,943,935 UART: [fht] FMC Alias Private Key: 7
20,945,522 UART: [art] Derive CDI
20,946,338 UART: [art] Store in in slot 0x4
20,989,028 UART: [art] Derive Key Pair
20,990,087 UART: [art] Store priv key in slot 0x5
23,416,015 UART: [art] Derive Key Pair - Done
23,429,015 UART: [art] Signing Cert with AUTHO
23,430,320 UART: RITY.KEYID = 7
25,135,812 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,326 UART: [art] PUB.X = AC8BB209426200E9B59D8AA0C04B66FE3A734166D04BD97E1FA7F50E22E87702B6D234A8B6CB3E7A7EAC5487AA83DD7F
25,144,570 UART: [art] PUB.Y = 53AA8748A46C01DF8BD6C9FBA79F142450E0D90F653ACDDB97024EB915E83FAE0E154187A4339E716C66EFC44279386E
25,151,841 UART: [art] SIG.R = CE35DDD360B8B975622DCDFC6495C952B577F751894CAAE273F5FEE311A9F95C00A86086898C0BA8FC9E4A804B0D6967
25,159,228 UART: [art] SIG.S = 58A5D203A4715694F3980F836ABBE599C952BD98BC009A1092DF35529253CE6BB4453BBB6185CCD2F3CD5F57221944C8
26,138,391 UART: Caliptra RT
26,139,092 UART: [state] CFI Enabled
26,256,284 UART: [rt] RT listening for mailbox commands...
26,287,452 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,757,162 ready_for_fw is high
3,757,601 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
14,976,862 >>> mbox cmd response: success
14,977,390 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,234,283 UART:
19,234,649 UART: Running Caliptra FMC ...
19,235,810 UART:
19,235,968 UART: [state] CFI Enabled
19,243,215 UART: [fht] FMC Alias Private Key: 7
20,999,869 UART: [art] Extend RT PCRs Done
21,001,101 UART: [art] Lock RT PCRs Done
21,002,663 UART: [art] Populate DV Done
21,008,009 UART: [fht] FMC Alias Private Key: 7
21,009,518 UART: [art] Derive CDI
21,010,257 UART: [art] Store in in slot 0x4
21,053,225 UART: [art] Derive Key Pair
21,054,268 UART: [art] Store priv key in slot 0x5
23,481,164 UART: [art] Derive Key Pair - Done
23,493,921 UART: [art] Signing Cert with AUTHO
23,495,220 UART: RITY.KEYID = 7
25,201,158 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,683 UART: [art] PUB.X = 13C38F2DA8FF4A70EF6320598FD64D3B40D0F5E735C3F3D7E0EAE9E5C9BDCA8A53F1D31C60EF5067168B36CBBA238C56
25,209,931 UART: [art] PUB.Y = EDD4421B2EAA82E32AAA7A4EB188ACA6F169AB56F0D9A7AA5410641D208A2609333DFB19CC1ED6AA5D0DA9C0E745EB7E
25,217,239 UART: [art] SIG.R = 86EC736AF33D541EF12E5984E95BB25A79FE6AB639846CFBE595E90490850672E5C7E978127EA70E4A21C97F55CD7279
25,224,627 UART: [art] SIG.S = 37AF94AD1E0B254EBCB685B6630003227B71B6769C8CED7D4E7BEB44AF991CB4A3E359F3346C8042C99A37756C927656
26,203,642 UART: Caliptra RT
26,204,353 UART: [state] CFI Enabled
26,321,511 UART: [rt] RT listening for mailbox commands...
26,352,755 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,723 UART: [kat] SHA2-256
892,661 UART: [kat] SHA2-384
895,458 UART: [kat] SHA2-512-ACC
897,359 UART: [kat] ECC-384
902,710 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,663 UART: [cold-reset] ++
1,477,177 UART: [fht] Storing FHT @ 0x50003400
1,480,000 UART: [idev] ++
1,480,168 UART: [idev] CDI.KEYID = 6
1,480,528 UART: [idev] SUBJECT.KEYID = 7
1,480,952 UART: [idev] UDS.KEYID = 0
1,481,297 ready_for_fw is high
1,481,297 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,488,928 UART: [idev] Erasing UDS.KEYID = 0
1,505,224 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,624 UART: [idev] --
1,514,773 UART: [ldev] ++
1,514,941 UART: [ldev] CDI.KEYID = 6
1,515,304 UART: [ldev] SUBJECT.KEYID = 5
1,515,730 UART: [ldev] AUTHORITY.KEYID = 7
1,516,193 UART: [ldev] FE.KEYID = 1
1,521,481 UART: [ldev] Erasing FE.KEYID = 1
1,547,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,708 UART: [ldev] --
1,587,009 UART: [fwproc] Waiting for Commands...
1,587,870 UART: [fwproc] Received command 0x46574c44
1,588,661 UART: [fwproc] Received Image of size 115032 bytes
2,895,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,921,842 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,951,194 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,088,045 >>> mbox cmd response: success
3,088,045 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,089,145 UART: [afmc] ++
3,089,313 UART: [afmc] CDI.KEYID = 6
3,089,675 UART: [afmc] SUBJECT.KEYID = 7
3,090,100 UART: [afmc] AUTHORITY.KEYID = 5
3,125,333 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,141,509 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,142,289 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,148,017 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,153,902 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,159,592 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,167,497 UART: [afmc] --
3,168,499 UART: [cold-reset] --
3,169,271 UART: [state] Locking Datavault
3,170,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,171,272 UART: [state] Locking ICCM
3,171,858 UART: [exit] Launching FMC @ 0x40000130
3,177,187 UART:
3,177,203 UART: Running Caliptra FMC ...
3,177,611 UART:
3,177,665 UART: [state] CFI Enabled
3,187,836 UART: [fht] FMC Alias Private Key: 7
3,295,815 UART: [art] Extend RT PCRs Done
3,296,243 UART: [art] Lock RT PCRs Done
3,297,793 UART: [art] Populate DV Done
3,306,286 UART: [fht] FMC Alias Private Key: 7
3,307,318 UART: [art] Derive CDI
3,307,598 UART: [art] Store in in slot 0x4
3,393,175 UART: [art] Derive Key Pair
3,393,535 UART: [art] Store priv key in slot 0x5
3,406,571 UART: [art] Derive Key Pair - Done
3,421,184 UART: [art] Signing Cert with AUTHO
3,421,664 UART: RITY.KEYID = 7
3,436,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,437,547 UART: [art] PUB.X = 9689A20C0389A9D98843459B1DDC6EC08159C05F2E7FA9F59C290702CAD0C8FB9A7E44F3A9D0EFD1FFBFBDB0F6EE24B3
3,444,327 UART: [art] PUB.Y = 1382F59B1D6B79EDBF64AD2DB903BDA227AF18223A12450271C8A668AD2DA0F100959C8BCDDBABD4025E78465896326A
3,451,256 UART: [art] SIG.R = 52F6490A986A0C3791FB5678B65061AB2B729D3BE8C6EAD58A24084317EB7E1C4C362FA06B6CB56F47E92F3936CB540C
3,458,020 UART: [art] SIG.S = DDE97A0BA20A13F7E02A37144383603C5E13CD7728F14A8360B45221497D44051DC002DDC5864AA873ECF669079F99D5
3,482,124 UART: Caliptra RT
3,482,377 UART: [state] CFI Enabled
3,591,326 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,621,718 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,127 ready_for_fw is high
1,362,127 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,936,215 >>> mbox cmd response: success
2,936,215 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,998,057 UART:
2,998,073 UART: Running Caliptra FMC ...
2,998,481 UART:
2,998,535 UART: [state] CFI Enabled
3,008,806 UART: [fht] FMC Alias Private Key: 7
3,116,229 UART: [art] Extend RT PCRs Done
3,116,657 UART: [art] Lock RT PCRs Done
3,118,169 UART: [art] Populate DV Done
3,126,198 UART: [fht] FMC Alias Private Key: 7
3,127,360 UART: [art] Derive CDI
3,127,640 UART: [art] Store in in slot 0x4
3,213,527 UART: [art] Derive Key Pair
3,213,887 UART: [art] Store priv key in slot 0x5
3,227,413 UART: [art] Derive Key Pair - Done
3,242,419 UART: [art] Signing Cert with AUTHO
3,242,899 UART: RITY.KEYID = 7
3,258,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,259,166 UART: [art] PUB.X = F93EAA3F3C952ED0DEDBDD279372FD652D1B51239EF577FC5CDA075AEA85856933F80605F478D595AF97D254BD853161
3,265,937 UART: [art] PUB.Y = 1CD5395EC4D099DF32BB6B5D71583A565D23FC71BED3A829D03F97675196B09FF4FEB55EE9BB3F36F1D745C743B2EE1A
3,272,903 UART: [art] SIG.R = CCC8DDD4E856BFAEDF8BE94C64EF29562526B978B1B6DD22665DB3E5236B867DE40DF7076E0B98322FA6DC23C6955CBF
3,279,684 UART: [art] SIG.S = FCFD70BD9D0181EB47012B7F8713DFB78E0CE0E840B51E379D28B1BF66EF324176E739AAA56B67647F7353D67DB54779
3,303,962 UART: Caliptra RT
3,304,215 UART: [state] CFI Enabled
3,412,305 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,442,805 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
890,878 UART: [kat] SHA2-256
892,816 UART: [kat] SHA2-384
895,585 UART: [kat] SHA2-512-ACC
897,486 UART: [kat] ECC-384
902,879 UART: [kat] HMAC-384Kdf
907,489 UART: [kat] LMS
1,475,685 UART: [kat] --
1,476,920 UART: [cold-reset] ++
1,477,462 UART: [fht] Storing FHT @ 0x50003400
1,480,025 UART: [idev] ++
1,480,193 UART: [idev] CDI.KEYID = 6
1,480,553 UART: [idev] SUBJECT.KEYID = 7
1,480,977 UART: [idev] UDS.KEYID = 0
1,481,322 ready_for_fw is high
1,481,322 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,489,151 UART: [idev] Erasing UDS.KEYID = 0
1,506,019 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,785 UART: [idev] --
1,515,884 UART: [ldev] ++
1,516,052 UART: [ldev] CDI.KEYID = 6
1,516,415 UART: [ldev] SUBJECT.KEYID = 5
1,516,841 UART: [ldev] AUTHORITY.KEYID = 7
1,517,304 UART: [ldev] FE.KEYID = 1
1,522,434 UART: [ldev] Erasing FE.KEYID = 1
1,547,945 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,417 UART: [ldev] --
1,587,690 UART: [fwproc] Waiting for Commands...
1,588,379 UART: [fwproc] Received command 0x46574c44
1,589,170 UART: [fwproc] Received Image of size 115032 bytes
2,895,131 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,923,069 UART: [fwproc] Loading FMC at address 0x40000000 len 18800
2,952,421 UART: [fwproc] Loading Runtime at address 0x40005000 len 90348
3,089,286 >>> mbox cmd response: success
3,089,286 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,090,476 UART: [afmc] ++
3,090,644 UART: [afmc] CDI.KEYID = 6
3,091,006 UART: [afmc] SUBJECT.KEYID = 7
3,091,431 UART: [afmc] AUTHORITY.KEYID = 5
3,127,088 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,143,506 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,144,286 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
3,150,014 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
3,155,899 UART: [afmc] SIG.R = 6110F7FF17A8F30300D40E27F96F2ACF48A2CBE1B96AD721CD61928325226C72F265D3261A9F134E173BD0CAF2353740
3,161,589 UART: [afmc] SIG.S = E80E2DF6C14F61C3DAC8A662BA64723AF8EF2195F748BC9480BB774468E0EE7AC7B67D7E279CAC43A60F42C41FB0E1FE
3,169,326 UART: [afmc] --
3,170,364 UART: [cold-reset] --
3,171,248 UART: [state] Locking Datavault
3,172,547 UART: [state] Locking PCR0, PCR1 and PCR31
3,173,151 UART: [state] Locking ICCM
3,173,657 UART: [exit] Launching FMC @ 0x40000130
3,178,986 UART:
3,179,002 UART: Running Caliptra FMC ...
3,179,410 UART:
3,179,553 UART: [state] CFI Enabled
3,189,750 UART: [fht] FMC Alias Private Key: 7
3,297,495 UART: [art] Extend RT PCRs Done
3,297,923 UART: [art] Lock RT PCRs Done
3,299,537 UART: [art] Populate DV Done
3,307,606 UART: [fht] FMC Alias Private Key: 7
3,308,648 UART: [art] Derive CDI
3,308,928 UART: [art] Store in in slot 0x4
3,394,745 UART: [art] Derive Key Pair
3,395,105 UART: [art] Store priv key in slot 0x5
3,408,677 UART: [art] Derive Key Pair - Done
3,423,307 UART: [art] Signing Cert with AUTHO
3,423,787 UART: RITY.KEYID = 7
3,439,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,439,786 UART: [art] PUB.X = 1029004C9E9F72272C049CABE38B5EEBB17C9DA1D2DB0BABD7853FD87BE2F939DEA76A7E4D12AF0A69886D3A8D32FF52
3,446,547 UART: [art] PUB.Y = 560912B30BCB0DE94779B221E4DF3C2FF46C3E597239EF13F04757C43664DA651E486B340F16BA05D7418D5372620D83
3,453,475 UART: [art] SIG.R = 1DE53B5A89615BA32E8F79C42ECE1D66C9D632A43BA5A289735FBF77BCB11403101CF1F0957FC6E38DBC08327D1A7DAB
3,460,255 UART: [art] SIG.S = F851B3AFF71E2001021940FFD56A36D4DF1A330905E3967439D82769E2D654150F063A1257E3ABB7FA62DBF1AF5F9F0C
3,484,091 UART: Caliptra RT
3,484,436 UART: [state] CFI Enabled
3,592,787 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,623,233 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,558 ready_for_fw is high
1,363,558 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,938,158 >>> mbox cmd response: success
2,938,158 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,000,070 UART:
3,000,086 UART: Running Caliptra FMC ...
3,000,494 UART:
3,000,637 UART: [state] CFI Enabled
3,011,118 UART: [fht] FMC Alias Private Key: 7
3,118,691 UART: [art] Extend RT PCRs Done
3,119,119 UART: [art] Lock RT PCRs Done
3,120,451 UART: [art] Populate DV Done
3,128,940 UART: [fht] FMC Alias Private Key: 7
3,130,014 UART: [art] Derive CDI
3,130,294 UART: [art] Store in in slot 0x4
3,216,071 UART: [art] Derive Key Pair
3,216,431 UART: [art] Store priv key in slot 0x5
3,229,753 UART: [art] Derive Key Pair - Done
3,244,708 UART: [art] Signing Cert with AUTHO
3,245,188 UART: RITY.KEYID = 7
3,260,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,261,247 UART: [art] PUB.X = 246DA1FE698ACD55761C961D9DE3FB1073C0E2A6CFDA6A6E0F28DA8DB36B9ACA5F6F6E65565F5D1D0B325B43F6BC5EA6
3,268,037 UART: [art] PUB.Y = 36155D9C4A850E556DD0A25E9788756EE08D768700FC6B178BE3B4CA27EA5F16CC55B9250A509E705DFD72A3604AF3F0
3,274,965 UART: [art] SIG.R = DA3CFB1F058E0954A743F3C2E95A47E10FE37572E0BD8C7A6065856C91BD83C40B550A43747344FC4B59A696926B8D6C
3,281,724 UART: [art] SIG.S = 7E07DB4891565F2141DD608BE93D1C70612C5561F713E24DAE667C0AC3102D7A149FB05839C6F686302430C18B35B0BC
3,305,675 UART: Caliptra RT
3,306,020 UART: [state] CFI Enabled
3,413,757 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,444,557 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
901,955 UART: [kat] SHA2-256
903,895 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,544 UART: [kat] LMS
1,170,872 UART: [kat] --
1,171,509 UART: [cold-reset] ++
1,171,871 UART: [fht] FHT @ 0x50003400
1,174,498 UART: [idev] ++
1,174,666 UART: [idev] CDI.KEYID = 6
1,175,026 UART: [idev] SUBJECT.KEYID = 7
1,175,450 UART: [idev] UDS.KEYID = 0
1,175,795 ready_for_fw is high
1,175,795 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,183,832 UART: [idev] Erasing UDS.KEYID = 0
1,201,299 UART: [idev] Sha1 KeyId Algorithm
1,209,719 UART: [idev] --
1,210,933 UART: [ldev] ++
1,211,101 UART: [ldev] CDI.KEYID = 6
1,211,464 UART: [ldev] SUBJECT.KEYID = 5
1,211,890 UART: [ldev] AUTHORITY.KEYID = 7
1,212,353 UART: [ldev] FE.KEYID = 1
1,217,397 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,231 UART: [ldev] --
1,282,498 UART: [fwproc] Wait for Commands...
1,283,202 UART: [fwproc] Recv command 0x46574c44
1,283,930 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,621 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,925 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,914 >>> mbox cmd response: success
2,781,914 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,783,100 UART: [afmc] ++
2,783,268 UART: [afmc] CDI.KEYID = 6
2,783,630 UART: [afmc] SUBJECT.KEYID = 7
2,784,055 UART: [afmc] AUTHORITY.KEYID = 5
2,819,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,513 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,261 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,989 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,874 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,593 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,415 UART: [afmc] --
2,862,381 UART: [cold-reset] --
2,863,379 UART: [state] Locking Datavault
2,864,574 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,178 UART: [state] Locking ICCM
2,865,710 UART: [exit] Launching FMC @ 0x40000130
2,871,039 UART:
2,871,055 UART: Running Caliptra FMC ...
2,871,463 UART:
2,871,517 UART: [state] CFI Enabled
2,882,424 UART: [fht] FMC Alias Private Key: 7
2,990,857 UART: [art] Extend RT PCRs Done
2,991,285 UART: [art] Lock RT PCRs Done
2,992,803 UART: [art] Populate DV Done
3,001,094 UART: [fht] FMC Alias Private Key: 7
3,002,204 UART: [art] Derive CDI
3,002,484 UART: [art] Store in in slot 0x4
3,088,437 UART: [art] Derive Key Pair
3,088,797 UART: [art] Store priv key in slot 0x5
3,101,453 UART: [art] Derive Key Pair - Done
3,116,152 UART: [art] Signing Cert with AUTHO
3,116,632 UART: RITY.KEYID = 7
3,131,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,619 UART: [art] PUB.X = 04A8CCCC90F56AF8F0954AFFBA77C2DA17AAC7B251E920B908C19EA5FE65300CF2E71F21476E38BD2018851108BB0CE7
3,139,390 UART: [art] PUB.Y = FDD29AB2754C2FF10D8E173DDEB98799ED55FA1D6F815C7AF2E624807C12BB8B87143516D9A59E10D4667601CF050064
3,146,315 UART: [art] SIG.R = 9A508928D721FC7AF7174E5BC472AEB7CB52C20F42D5290AF845FF35AA9926A38FAD5A903026835FFCB093F2A8AA0B5F
3,153,090 UART: [art] SIG.S = 3532DF3501780D4A6E0738BEF79201F53191F713172E597B442A12EF21E363471782B0189364300E0BEA1784102B4897
3,177,663 UART: Caliptra RT
3,177,916 UART: [state] CFI Enabled
3,285,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,315,653 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,337 ready_for_fw is high
1,060,337 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,635,909 >>> mbox cmd response: success
2,635,909 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,697,725 UART:
2,697,741 UART: Running Caliptra FMC ...
2,698,149 UART:
2,698,203 UART: [state] CFI Enabled
2,708,842 UART: [fht] FMC Alias Private Key: 7
2,816,387 UART: [art] Extend RT PCRs Done
2,816,815 UART: [art] Lock RT PCRs Done
2,818,309 UART: [art] Populate DV Done
2,826,342 UART: [fht] FMC Alias Private Key: 7
2,827,386 UART: [art] Derive CDI
2,827,666 UART: [art] Store in in slot 0x4
2,913,331 UART: [art] Derive Key Pair
2,913,691 UART: [art] Store priv key in slot 0x5
2,927,241 UART: [art] Derive Key Pair - Done
2,942,062 UART: [art] Signing Cert with AUTHO
2,942,542 UART: RITY.KEYID = 7
2,957,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,427 UART: [art] PUB.X = 3251EEC1F0EC8E3BB075715D156BE4D7991D85FF66B48CB18D991457F73BEBBA3C2D8FF8F6737383963F6B54B6742F5B
2,965,207 UART: [art] PUB.Y = FCE6FBF3BCF260D3988D2A9E3CCB2F2E69031D28E396CC3CCC16B57E713603096629048E21129EEC3849D69B3546FF6B
2,972,155 UART: [art] SIG.R = E74FCB7C14FB1343E3C38C74576D32052BAD09F6A55C3AC6E106C9D2933F65A567D6C7C9C44FFBF7163BC75EC7B34595
2,978,928 UART: [art] SIG.S = 2D430B86E238A4EE7C6B688DC1C244126F573CF08A50EB2EE21B170FCDA9CB62E4FE914CB4CD65502A402655FB64F607
3,002,550 UART: Caliptra RT
3,002,803 UART: [state] CFI Enabled
3,110,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,546 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,759 UART: [state] LifecycleState = Unprovisioned
86,414 UART: [state] DebugLocked = No
87,084 UART: [state] WD Timer not started. Device not locked for debugging
88,347 UART: [kat] SHA2-256
893,997 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,122 UART: [kat] ++
898,274 UART: [kat] sha1
902,576 UART: [kat] SHA2-256
904,516 UART: [kat] SHA2-384
907,193 UART: [kat] SHA2-512-ACC
909,094 UART: [kat] ECC-384
918,719 UART: [kat] HMAC-384Kdf
923,481 UART: [kat] LMS
1,171,809 UART: [kat] --
1,172,756 UART: [cold-reset] ++
1,173,100 UART: [fht] FHT @ 0x50003400
1,175,541 UART: [idev] ++
1,175,709 UART: [idev] CDI.KEYID = 6
1,176,069 UART: [idev] SUBJECT.KEYID = 7
1,176,493 UART: [idev] UDS.KEYID = 0
1,176,838 ready_for_fw is high
1,176,838 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,184,337 UART: [idev] Erasing UDS.KEYID = 0
1,201,870 UART: [idev] Sha1 KeyId Algorithm
1,210,344 UART: [idev] --
1,211,316 UART: [ldev] ++
1,211,484 UART: [ldev] CDI.KEYID = 6
1,211,847 UART: [ldev] SUBJECT.KEYID = 5
1,212,273 UART: [ldev] AUTHORITY.KEYID = 7
1,212,736 UART: [ldev] FE.KEYID = 1
1,217,882 UART: [ldev] Erasing FE.KEYID = 1
1,243,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,094 UART: [ldev] --
1,283,447 UART: [fwproc] Wait for Commands...
1,284,249 UART: [fwproc] Recv command 0x46574c44
1,284,977 UART: [fwproc] Recv'd Img size: 115032 bytes
2,589,835 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,750 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,647,054 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,783,999 >>> mbox cmd response: success
2,783,999 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,785,167 UART: [afmc] ++
2,785,335 UART: [afmc] CDI.KEYID = 6
2,785,697 UART: [afmc] SUBJECT.KEYID = 7
2,786,122 UART: [afmc] AUTHORITY.KEYID = 5
2,821,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,708 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,844,436 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,850,321 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,856,040 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,863,876 UART: [afmc] --
2,865,000 UART: [cold-reset] --
2,865,906 UART: [state] Locking Datavault
2,866,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,443 UART: [state] Locking ICCM
2,868,103 UART: [exit] Launching FMC @ 0x40000130
2,873,432 UART:
2,873,448 UART: Running Caliptra FMC ...
2,873,856 UART:
2,873,999 UART: [state] CFI Enabled
2,884,428 UART: [fht] FMC Alias Private Key: 7
2,992,361 UART: [art] Extend RT PCRs Done
2,992,789 UART: [art] Lock RT PCRs Done
2,994,193 UART: [art] Populate DV Done
3,002,520 UART: [fht] FMC Alias Private Key: 7
3,003,576 UART: [art] Derive CDI
3,003,856 UART: [art] Store in in slot 0x4
3,089,721 UART: [art] Derive Key Pair
3,090,081 UART: [art] Store priv key in slot 0x5
3,103,547 UART: [art] Derive Key Pair - Done
3,118,599 UART: [art] Signing Cert with AUTHO
3,119,079 UART: RITY.KEYID = 7
3,134,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,135,246 UART: [art] PUB.X = 342E7B077E1D0A3DB41D40E61E0A77AFBDB7D50C17B7DDF7E92846A6A92FA07933FECCF299FA5835C60620FC2385D19F
3,142,017 UART: [art] PUB.Y = DD29321A0B0C40B294E7151A314EF01BD3EFC56808F2B234934C3BAA4175816D0450F18167A7801BFE0F5B45A3E4EA44
3,148,956 UART: [art] SIG.R = 9C947309F21669BA7A93222F7560FA5D5D9F0C72224A83DD81E9BD57722FF63B72E330A6A61FCA421C4AA8B8AC424D0D
3,155,725 UART: [art] SIG.S = 068F0D01EFF8B02F77F078E0B8B3599FDD429FB42983DB7E8DE3363968899A84C8943B1EA28AF44BA266E4EBED3A027A
3,179,282 UART: Caliptra RT
3,179,627 UART: [state] CFI Enabled
3,286,786 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,317,336 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,660 ready_for_fw is high
1,060,660 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,636,434 >>> mbox cmd response: success
2,636,434 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,699,820 UART:
2,699,836 UART: Running Caliptra FMC ...
2,700,244 UART:
2,700,387 UART: [state] CFI Enabled
2,711,392 UART: [fht] FMC Alias Private Key: 7
2,818,877 UART: [art] Extend RT PCRs Done
2,819,305 UART: [art] Lock RT PCRs Done
2,820,815 UART: [art] Populate DV Done
2,829,020 UART: [fht] FMC Alias Private Key: 7
2,830,156 UART: [art] Derive CDI
2,830,436 UART: [art] Store in in slot 0x4
2,916,297 UART: [art] Derive Key Pair
2,916,657 UART: [art] Store priv key in slot 0x5
2,930,765 UART: [art] Derive Key Pair - Done
2,945,499 UART: [art] Signing Cert with AUTHO
2,945,979 UART: RITY.KEYID = 7
2,961,119 UART: [art] Erasing AUTHORITY.KEYID = 7
2,961,884 UART: [art] PUB.X = 30DB2ED48E1D6972F1E4920AEF87914E5447E1D24BD1DC3F217188CC5A8DDC99E01BB67795A9E977B48693CCFE550FC7
2,968,660 UART: [art] PUB.Y = 512675A4BE7F1B409F744564FA90E888E07FD305A19FF796027577753B4E700B9954B54AF9417403B53C89805BEC2248
2,975,588 UART: [art] SIG.R = DA1449C1B446F3A53E110E1EDE298E72762904FCF4292A606ABBBAF58C3DA424CB190895F33EBEE744FD502432BD1079
2,982,359 UART: [art] SIG.S = 84C7EDF8B516B83525F5609AF46DFFF9F44D529B98DC11AB7FBCC2074D53907C48F15AB027B0D13A7BE06EED8E057BD3
3,006,090 UART: Caliptra RT
3,006,435 UART: [state] CFI Enabled
3,113,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,144,267 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,697 UART: [kat] ++
895,849 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,640 UART: [kat] SHA2-512-ACC
906,541 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,616 UART: [kat] LMS
1,168,928 UART: [kat] --
1,169,847 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,174,355 ready_for_fw is high
1,174,355 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,181,757 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,909 UART: [idev] --
1,209,004 UART: [ldev] ++
1,209,172 UART: [ldev] CDI.KEYID = 6
1,209,536 UART: [ldev] SUBJECT.KEYID = 5
1,209,963 UART: [ldev] AUTHORITY.KEYID = 7
1,210,426 UART: [ldev] FE.KEYID = 1
1,215,568 UART: [ldev] Erasing FE.KEYID = 1
1,241,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,284 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,986 UART: [ldev] --
1,281,352 UART: [fwproc] Wait for Commands...
1,282,119 UART: [fwproc] Recv command 0x46574c44
1,282,852 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,325 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,634 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,502 >>> mbox cmd response: success
2,781,502 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,782,603 UART: [afmc] ++
2,782,771 UART: [afmc] CDI.KEYID = 6
2,783,134 UART: [afmc] SUBJECT.KEYID = 7
2,783,560 UART: [afmc] AUTHORITY.KEYID = 5
2,818,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,456 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,185 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,068 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,852,787 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,860,546 UART: [afmc] --
2,861,642 UART: [cold-reset] --
2,862,450 UART: [state] Locking Datavault
2,863,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,189 UART: [state] Locking ICCM
2,864,715 UART: [exit] Launching FMC @ 0x40000130
2,870,044 UART:
2,870,060 UART: Running Caliptra FMC ...
2,870,468 UART:
2,870,522 UART: [state] CFI Enabled
2,881,421 UART: [fht] FMC Alias Private Key: 7
2,988,614 UART: [art] Extend RT PCRs Done
2,989,042 UART: [art] Lock RT PCRs Done
2,990,430 UART: [art] Populate DV Done
2,998,715 UART: [fht] FMC Alias Private Key: 7
2,999,661 UART: [art] Derive CDI
2,999,941 UART: [art] Store in in slot 0x4
3,085,724 UART: [art] Derive Key Pair
3,086,084 UART: [art] Store priv key in slot 0x5
3,099,614 UART: [art] Derive Key Pair - Done
3,114,298 UART: [art] Signing Cert with AUTHO
3,114,778 UART: RITY.KEYID = 7
3,130,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,130,919 UART: [art] PUB.X = F6D67ED893190CB8F68177E2AE9C8DB649E3431A523A6B2CA5ACC627B4EB53EDC65CA9AC7235F270D4AA28BF4B7B70A1
3,137,706 UART: [art] PUB.Y = C56F7C58E62CC6AFEF8F67943939B9BAB7A3D5BFE5B8EB3DF2D7D2B1725F3D95AF61A574E309180359D70A76F280F663
3,144,661 UART: [art] SIG.R = C0AA50508233C79FC2783F2E734A1806FA057521566A8E18751A235D791551A4F8362146BAD34C64AEF26685A6606C70
3,151,415 UART: [art] SIG.S = F306B8F53FA861D51FA042D5C5F552C6B9E43AF276227149FF54A0080023020D04078CDC0520C0EC72806114CD5B374D
3,174,975 UART: Caliptra RT
3,175,228 UART: [state] CFI Enabled
3,283,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,313,970 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,890 ready_for_fw is high
1,056,890 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,632,792 >>> mbox cmd response: success
2,632,792 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,695,352 UART:
2,695,368 UART: Running Caliptra FMC ...
2,695,776 UART:
2,695,830 UART: [state] CFI Enabled
2,706,169 UART: [fht] FMC Alias Private Key: 7
2,814,596 UART: [art] Extend RT PCRs Done
2,815,024 UART: [art] Lock RT PCRs Done
2,816,714 UART: [art] Populate DV Done
2,825,175 UART: [fht] FMC Alias Private Key: 7
2,826,131 UART: [art] Derive CDI
2,826,411 UART: [art] Store in in slot 0x4
2,911,856 UART: [art] Derive Key Pair
2,912,216 UART: [art] Store priv key in slot 0x5
2,925,134 UART: [art] Derive Key Pair - Done
2,939,437 UART: [art] Signing Cert with AUTHO
2,939,917 UART: RITY.KEYID = 7
2,955,063 UART: [art] Erasing AUTHORITY.KEYID = 7
2,955,828 UART: [art] PUB.X = EBAC74FA2AE2A39B3B9EAFD8FFF85157A290DB1F637F1C99B573775AB5F6C98D66DD18AAB19A53B7DCBACD4F3BEFBEE8
2,962,636 UART: [art] PUB.Y = B37793934E5F274D55CEE59E82CEAC302A79CE7AB0FDC3CF6F903196EF71C56F11F96228A0496D547D482B46104E9830
2,969,590 UART: [art] SIG.R = D15648E215B86FE313E43C5BF717B9A3B74BEAD9E9AB32FE9D35B8DAD3604FAD45206C52FF73939697F366ACA2A5B7AA
2,976,378 UART: [art] SIG.S = 4029D429E7876A73FCD5F63AF3C798A5FE96E723E479517F7D5E6BE619FFD4FF6AD506C6C0C8667019B1B389D6721A9C
3,000,162 UART: Caliptra RT
3,000,415 UART: [state] CFI Enabled
3,109,998 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,140,414 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,678 UART: [kat] ++
895,830 UART: [kat] sha1
900,198 UART: [kat] SHA2-256
902,138 UART: [kat] SHA2-384
904,767 UART: [kat] SHA2-512-ACC
906,668 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,981 UART: [kat] LMS
1,169,293 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,546 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 ready_for_fw is high
1,174,430 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
1,182,174 UART: [idev] Erasing UDS.KEYID = 0
1,199,224 UART: [idev] Sha1 KeyId Algorithm
1,208,026 UART: [idev] --
1,209,133 UART: [ldev] ++
1,209,301 UART: [ldev] CDI.KEYID = 6
1,209,665 UART: [ldev] SUBJECT.KEYID = 5
1,210,092 UART: [ldev] AUTHORITY.KEYID = 7
1,210,555 UART: [ldev] FE.KEYID = 1
1,216,159 UART: [ldev] Erasing FE.KEYID = 1
1,241,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,695 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,928 UART: [fwproc] Recv command 0x46574c44
1,282,661 UART: [fwproc] Recv'd Img size: 115032 bytes
2,588,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,646 UART: [fwproc] Load FMC at address 0x40000000 len 18800
2,644,955 UART: [fwproc] Load Runtime at address 0x40005000 len 90348
2,781,951 >>> mbox cmd response: success
2,781,951 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,783,012 UART: [afmc] ++
2,783,180 UART: [afmc] CDI.KEYID = 6
2,783,543 UART: [afmc] SUBJECT.KEYID = 7
2,783,969 UART: [afmc] AUTHORITY.KEYID = 5
2,818,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,247 UART: [afmc] PUB.X = EA3F89C8D17CBCFDC6FD8E4B116CA3D95362ECF2A5DE7CFAF4977393CA5B65CC3EFE6C634DBE1AFA06142A34BEC98F97
2,841,976 UART: [afmc] PUB.Y = 78C00D01D9132D7F83634A65D7B017996F5EEA5FBE9E2250B38635D154193CB838FAD49D05981AE87A10D62977D3F8EF
2,847,859 UART: [afmc] SIG.R = E4D6E865DD9EACD3D119BF16F77C638A948EFC2DE1BDB18435D2625ADE2D483DE6035DDCE75D913510FFC59149B5E7C9
2,853,578 UART: [afmc] SIG.S = 10BF5289F9B7C0CF87DBAE55A9B5A803FA66CE6EA11996983F2C055464551244DFD704EA95B6BD149B7D0A57811F23C3
2,861,381 UART: [afmc] --
2,862,373 UART: [cold-reset] --
2,863,137 UART: [state] Locking Datavault
2,864,498 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,102 UART: [state] Locking ICCM
2,865,692 UART: [exit] Launching FMC @ 0x40000130
2,871,021 UART:
2,871,037 UART: Running Caliptra FMC ...
2,871,445 UART:
2,871,588 UART: [state] CFI Enabled
2,882,213 UART: [fht] FMC Alias Private Key: 7
2,990,066 UART: [art] Extend RT PCRs Done
2,990,494 UART: [art] Lock RT PCRs Done
2,992,182 UART: [art] Populate DV Done
3,000,531 UART: [fht] FMC Alias Private Key: 7
3,001,551 UART: [art] Derive CDI
3,001,831 UART: [art] Store in in slot 0x4
3,087,324 UART: [art] Derive Key Pair
3,087,684 UART: [art] Store priv key in slot 0x5
3,100,904 UART: [art] Derive Key Pair - Done
3,115,842 UART: [art] Signing Cert with AUTHO
3,116,322 UART: RITY.KEYID = 7
3,131,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,132,133 UART: [art] PUB.X = FCA889BE54E6F64F0273B555DF6797A4FC6899AD2A3A9E3AD64F07E6BBD1D5787AD76D01946D0BD4592CC4319E565343
3,138,901 UART: [art] PUB.Y = 8B1952B256333C1E5DEE1EEA8AC1895E15A7476253F3A0971CF43E77CABBDF71D5939BC09065A31C6C62730421AC23AA
3,145,856 UART: [art] SIG.R = 74C918DA8FFB9B145EC7628DB4BB2A875BAED09915EE5391578B70921D5109DF90A66B9BDF0097A8EC8DD72A665B8B2F
3,152,615 UART: [art] SIG.S = D5BB6EB9D42E56989D1A1ABE2D2C9772C4722318675FEF0E7ABD4A5CDE00F0202E4E36B73FF8454DCB317CB5A896AF5B
3,176,807 UART: Caliptra RT
3,177,152 UART: [state] CFI Enabled
3,285,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,316,029 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,819 ready_for_fw is high
1,056,819 <<< Executing mbox cmd 0x46574c44 (115032 bytes) from SoC
2,633,351 >>> mbox cmd response: success
2,633,351 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,695,681 UART:
2,695,697 UART: Running Caliptra FMC ...
2,696,105 UART:
2,696,248 UART: [state] CFI Enabled
2,707,389 UART: [fht] FMC Alias Private Key: 7
2,815,236 UART: [art] Extend RT PCRs Done
2,815,664 UART: [art] Lock RT PCRs Done
2,817,398 UART: [art] Populate DV Done
2,825,657 UART: [fht] FMC Alias Private Key: 7
2,826,833 UART: [art] Derive CDI
2,827,113 UART: [art] Store in in slot 0x4
2,912,560 UART: [art] Derive Key Pair
2,912,920 UART: [art] Store priv key in slot 0x5
2,926,928 UART: [art] Derive Key Pair - Done
2,941,660 UART: [art] Signing Cert with AUTHO
2,942,140 UART: RITY.KEYID = 7
2,957,486 UART: [art] Erasing AUTHORITY.KEYID = 7
2,958,251 UART: [art] PUB.X = 24A0B86165C1636553D730BFEC666A600B4C642B248DD798B44EF994878012D56E821A542F5CE1AC3AEEFA6B88672C87
2,965,020 UART: [art] PUB.Y = 89705C8CAC5C10A8E19AE39FD66BB39DFBD5A53288A07E060F6A6C1EA60CBFDDB63F15868D51E5535994EF6F8B8A47AE
2,971,981 UART: [art] SIG.R = 2E6070A89FBA9A2B2E22F1F0A782659DC6FA354DA6D017AEA470AE780B58B101255328406A660CB1D3C53641E55D888F
2,978,746 UART: [art] SIG.S = 55C7D47CABBF8A92A96C85D1EA492C0E567226D239BB93A7A8F6EDA82E95033910EBCA7EA808DD08800BC919A6E6CAD8
3,002,608 UART: Caliptra RT
3,002,953 UART: [state] CFI Enabled
3,111,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005400
3,141,550 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 110 filtered out; finished in 1.19s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,237 UART:
192,583 UART: Running Caliptra ROM ...
193,660 UART:
193,803 UART: [state] CFI Enabled
264,372 UART: [state] LifecycleState = Unprovisioned
266,311 UART: [state] DebugLocked = No
267,973 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,543 UART: [kat] SHA2-256
443,261 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,783 UART: [kat] ++
454,269 UART: [kat] sha1
465,464 UART: [kat] SHA2-256
468,151 UART: [kat] SHA2-384
472,543 UART: [kat] SHA2-512-ACC
474,953 UART: [kat] ECC-384
2,768,189 UART: [kat] HMAC-384Kdf
2,800,887 UART: [kat] LMS
3,991,150 UART: [kat] --
3,995,579 UART: [cold-reset] ++
3,996,588 UART: [fht] Storing FHT @ 0x50003400
4,008,637 UART: [idev] ++
4,009,226 UART: [idev] CDI.KEYID = 6
4,010,149 UART: [idev] SUBJECT.KEYID = 7
4,011,397 UART: [idev] UDS.KEYID = 0
4,012,491 ready_for_fw is high
4,012,697 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,034,474 UART: [idev] Erasing UDS.KEYID = 0
7,346,757 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,413 UART: [idev] --
7,372,816 UART: [ldev] ++
7,373,449 UART: [ldev] CDI.KEYID = 6
7,374,359 UART: [ldev] SUBJECT.KEYID = 5
7,375,574 UART: [ldev] AUTHORITY.KEYID = 7
7,376,860 UART: [ldev] FE.KEYID = 1
7,424,182 UART: [ldev] Erasing FE.KEYID = 1
10,757,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,346 UART: [ldev] --
13,137,310 UART: [fwproc] Waiting for Commands...
13,140,159 UART: [fwproc] Received command 0x46574c44
13,142,339 UART: [fwproc] Received Image of size 7036 bytes
15,892,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,965,602 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,968,682 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
15,975,865 >>> mbox cmd response: success
15,979,734 UART: [afmc] ++
15,980,367 UART: [afmc] CDI.KEYID = 6
15,981,273 UART: [afmc] SUBJECT.KEYID = 7
15,982,539 UART: [afmc] AUTHORITY.KEYID = 5
19,349,111 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,645,215 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,647,471 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,661,933 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,676,797 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,691,194 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,714,031 UART: [afmc] --
21,717,039 UART: [cold-reset] --
21,721,717 UART: [state] Locking Datavault
21,726,746 UART: [state] Locking PCR0, PCR1 and PCR31
21,728,498 UART: [state] Locking ICCM
21,730,806 UART: [exit] Launching FMC @ 0x40000000
21,739,198 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,744,466 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,786,420 ready_for_fw is high
3,786,931 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,692,464 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,423 UART:
192,785 UART: Running Caliptra ROM ...
193,962 UART:
603,482 UART: [state] CFI Enabled
619,275 UART: [state] LifecycleState = Unprovisioned
621,224 UART: [state] DebugLocked = No
622,859 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,157 UART: [kat] SHA2-256
796,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,505 UART: [kat] ++
807,981 UART: [kat] sha1
820,299 UART: [kat] SHA2-256
822,960 UART: [kat] SHA2-384
828,240 UART: [kat] SHA2-512-ACC
830,603 UART: [kat] ECC-384
3,114,492 UART: [kat] HMAC-384Kdf
3,125,670 UART: [kat] LMS
4,315,750 UART: [kat] --
4,320,550 UART: [cold-reset] ++
4,323,193 UART: [fht] Storing FHT @ 0x50003400
4,333,888 UART: [idev] ++
4,334,449 UART: [idev] CDI.KEYID = 6
4,335,358 UART: [idev] SUBJECT.KEYID = 7
4,336,604 UART: [idev] UDS.KEYID = 0
4,337,663 ready_for_fw is high
4,337,867 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
4,353,720 UART: [idev] Erasing UDS.KEYID = 0
7,622,900 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,275 UART: [idev] --
7,649,083 UART: [ldev] ++
7,649,657 UART: [ldev] CDI.KEYID = 6
7,650,637 UART: [ldev] SUBJECT.KEYID = 5
7,651,844 UART: [ldev] AUTHORITY.KEYID = 7
7,653,073 UART: [ldev] FE.KEYID = 1
7,664,204 UART: [ldev] Erasing FE.KEYID = 1
10,956,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,735 UART: [ldev] --
13,317,617 UART: [fwproc] Waiting for Commands...
13,319,552 UART: [fwproc] Received command 0x46574c44
13,321,755 UART: [fwproc] Received Image of size 7036 bytes
16,064,235 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,140,306 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,143,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
16,152,307 >>> mbox cmd response: success
16,156,818 UART: [afmc] ++
16,157,397 UART: [afmc] CDI.KEYID = 6
16,158,279 UART: [afmc] SUBJECT.KEYID = 7
16,159,547 UART: [afmc] AUTHORITY.KEYID = 5
19,474,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,767,207 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,769,475 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,783,917 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,798,781 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,813,147 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,835,361 UART: [afmc] --
21,838,854 UART: [cold-reset] --
21,842,343 UART: [state] Locking Datavault
21,846,721 UART: [state] Locking PCR0, PCR1 and PCR31
21,848,469 UART: [state] Locking ICCM
21,850,969 UART: [exit] Launching FMC @ 0x40000000
21,859,363 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,864,730 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,128,114 ready_for_fw is high
4,128,563 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
15,895,861 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,102 UART:
192,456 UART: Running Caliptra ROM ...
193,540 UART:
193,683 UART: [state] CFI Enabled
264,589 UART: [state] LifecycleState = Unprovisioned
266,508 UART: [state] DebugLocked = No
268,670 UART: [state] WD Timer not started. Device not locked for debugging
271,993 UART: [kat] SHA2-256
451,137 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
462,721 UART: [kat] ++
463,169 UART: [kat] sha1
475,391 UART: [kat] SHA2-256
478,473 UART: [kat] SHA2-384
485,172 UART: [kat] SHA2-512-ACC
488,113 UART: [kat] ECC-384
2,950,347 UART: [kat] HMAC-384Kdf
2,972,498 UART: [kat] LMS
3,501,987 UART: [kat] --
3,506,051 UART: [cold-reset] ++
3,507,274 UART: [fht] FHT @ 0x50003400
3,518,611 UART: [idev] ++
3,519,183 UART: [idev] CDI.KEYID = 6
3,520,096 UART: [idev] SUBJECT.KEYID = 7
3,521,279 UART: [idev] UDS.KEYID = 0
3,522,205 ready_for_fw is high
3,522,418 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,544,763 UART: [idev] Erasing UDS.KEYID = 0
6,028,873 UART: [idev] Sha1 KeyId Algorithm
6,052,697 UART: [idev] --
6,055,286 UART: [ldev] ++
6,055,903 UART: [ldev] CDI.KEYID = 6
6,056,816 UART: [ldev] SUBJECT.KEYID = 5
6,057,884 UART: [ldev] AUTHORITY.KEYID = 7
6,059,180 UART: [ldev] FE.KEYID = 1
6,101,969 UART: [ldev] Erasing FE.KEYID = 1
8,605,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,408 UART: [ldev] --
10,414,596 UART: [fwproc] Wait for Commands...
10,417,232 UART: [fwproc] Recv command 0x46574c44
10,419,324 UART: [fwproc] Recv'd Img size: 7036 bytes
12,506,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,575,770 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,578,740 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,586,811 >>> mbox cmd response: success
12,591,119 UART: [afmc] ++
12,591,706 UART: [afmc] CDI.KEYID = 6
12,592,619 UART: [afmc] SUBJECT.KEYID = 7
12,593,782 UART: [afmc] AUTHORITY.KEYID = 5
15,126,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,849,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,851,302 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,867,198 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,883,078 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,898,889 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,920,555 UART: [afmc] --
16,924,743 UART: [cold-reset] --
16,927,956 UART: [state] Locking Datavault
16,931,362 UART: [state] Locking PCR0, PCR1 and PCR31
16,933,065 UART: [state] Locking ICCM
16,934,103 UART: [exit] Launching FMC @ 0x40000000
16,942,515 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
16,947,923 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,801 writing to cptra_bootfsm_go
3,360,311 ready_for_fw is high
3,360,704 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,377,874 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "92c38d0f250cb2eee89536ab7b9b81e356c0197b365da2ef04aef946347db46690ea51dad0447cf3acf0a9fc235f7951",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,436 UART:
192,793 UART: Running Caliptra ROM ...
193,923 UART:
603,472 UART: [state] CFI Enabled
615,740 UART: [state] LifecycleState = Unprovisioned
617,566 UART: [state] DebugLocked = No
620,372 UART: [state] WD Timer not started. Device not locked for debugging
624,976 UART: [kat] SHA2-256
804,144 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
815,715 UART: [kat] ++
816,191 UART: [kat] sha1
826,354 UART: [kat] SHA2-256
829,376 UART: [kat] SHA2-384
834,800 UART: [kat] SHA2-512-ACC
837,807 UART: [kat] ECC-384
3,280,155 UART: [kat] HMAC-384Kdf
3,291,239 UART: [kat] LMS
3,820,685 UART: [kat] --
3,825,401 UART: [cold-reset] ++
3,827,048 UART: [fht] FHT @ 0x50003400
3,837,176 UART: [idev] ++
3,837,749 UART: [idev] CDI.KEYID = 6
3,838,780 UART: [idev] SUBJECT.KEYID = 7
3,839,887 UART: [idev] UDS.KEYID = 0
3,840,789 ready_for_fw is high
3,840,993 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,856,543 UART: [idev] Erasing UDS.KEYID = 0
6,312,489 UART: [idev] Sha1 KeyId Algorithm
6,336,366 UART: [idev] --
6,340,144 UART: [ldev] ++
6,340,709 UART: [ldev] CDI.KEYID = 6
6,341,779 UART: [ldev] SUBJECT.KEYID = 5
6,342,883 UART: [ldev] AUTHORITY.KEYID = 7
6,344,057 UART: [ldev] FE.KEYID = 1
6,356,649 UART: [ldev] Erasing FE.KEYID = 1
8,829,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,545,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,561,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,577,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,592,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,613,912 UART: [ldev] --
10,617,832 UART: [fwproc] Wait for Commands...
10,620,303 UART: [fwproc] Recv command 0x46574c44
10,622,393 UART: [fwproc] Recv'd Img size: 7036 bytes
12,713,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,792,350 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,795,378 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,803,320 >>> mbox cmd response: success
12,806,824 UART: [afmc] ++
12,807,401 UART: [afmc] CDI.KEYID = 6
12,808,288 UART: [afmc] SUBJECT.KEYID = 7
12,809,502 UART: [afmc] AUTHORITY.KEYID = 5
15,313,118 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,036,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,038,252 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,054,155 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,070,047 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,085,914 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,107,186 UART: [afmc] --
17,110,732 UART: [cold-reset] --
17,114,725 UART: [state] Locking Datavault
17,121,215 UART: [state] Locking PCR0, PCR1 and PCR31
17,122,858 UART: [state] Locking ICCM
17,124,248 UART: [exit] Launching FMC @ 0x40000000
17,132,696 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,138,060 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a0c760bba301d669c7d7ce3f60d9451d2b4ed9f3d9b237a6eaabd6b7d8a7172573d7664c4d1dfc3f519d0babeae702de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
3,690,896 ready_for_fw is high
3,691,335 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,569,922 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,904 writing to cptra_bootfsm_go
193,082 UART:
193,439 UART: Running Caliptra ROM ...
194,621 UART:
194,769 UART: [state] CFI Enabled
262,168 UART: [state] LifecycleState = Unprovisioned
264,603 UART: [state] DebugLocked = No
266,638 UART: [state] WD Timer not started. Device not locked for debugging
270,882 UART: [kat] SHA2-256
460,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,554 UART: [kat] ++
472,036 UART: [kat] sha1
482,943 UART: [kat] SHA2-256
485,997 UART: [kat] SHA2-384
490,826 UART: [kat] SHA2-512-ACC
493,416 UART: [kat] ECC-384
2,949,427 UART: [kat] HMAC-384Kdf
2,972,400 UART: [kat] LMS
3,504,174 UART: [kat] --
3,509,519 UART: [cold-reset] ++
3,511,379 UART: [fht] FHT @ 0x50003400
3,523,645 UART: [idev] ++
3,524,413 UART: [idev] CDI.KEYID = 6
3,525,302 UART: [idev] SUBJECT.KEYID = 7
3,526,482 UART: [idev] UDS.KEYID = 0
3,527,382 ready_for_fw is high
3,527,567 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,543,787 UART: [idev] Erasing UDS.KEYID = 0
6,032,530 UART: [idev] Sha1 KeyId Algorithm
6,056,370 UART: [idev] --
6,061,768 UART: [ldev] ++
6,062,459 UART: [ldev] CDI.KEYID = 6
6,063,386 UART: [ldev] SUBJECT.KEYID = 5
6,064,548 UART: [ldev] AUTHORITY.KEYID = 7
6,065,782 UART: [ldev] FE.KEYID = 1
6,101,655 UART: [ldev] Erasing FE.KEYID = 1
8,610,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,564 UART: [ldev] --
10,418,486 UART: [fwproc] Wait for Commands...
10,420,420 UART: [fwproc] Recv command 0x46574c44
10,422,686 UART: [fwproc] Recv'd Img size: 7036 bytes
12,550,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,630,119 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,633,631 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,645,452 >>> mbox cmd response: success
12,649,515 UART: [afmc] ++
12,650,157 UART: [afmc] CDI.KEYID = 6
12,651,398 UART: [afmc] SUBJECT.KEYID = 7
12,652,838 UART: [afmc] AUTHORITY.KEYID = 5
15,188,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,912,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,914,531 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,929,601 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,944,768 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,959,817 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,985,178 UART: [afmc] --
16,989,114 UART: [cold-reset] --
16,993,252 UART: [state] Locking Datavault
16,998,345 UART: [state] Locking PCR0, PCR1 and PCR31
17,000,536 UART: [state] Locking ICCM
17,002,566 UART: [exit] Launching FMC @ 0x40000000
17,011,245 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,017,284 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,419,048 ready_for_fw is high
3,419,469 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,411,496 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,459 UART:
192,804 UART: Running Caliptra ROM ...
193,987 UART:
603,500 UART: [state] CFI Enabled
617,005 UART: [state] LifecycleState = Unprovisioned
619,384 UART: [state] DebugLocked = No
620,703 UART: [state] WD Timer not started. Device not locked for debugging
624,684 UART: [kat] SHA2-256
814,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,394 UART: [kat] ++
825,867 UART: [kat] sha1
836,981 UART: [kat] SHA2-256
840,000 UART: [kat] SHA2-384
845,503 UART: [kat] SHA2-512-ACC
848,088 UART: [kat] ECC-384
3,289,609 UART: [kat] HMAC-384Kdf
3,302,677 UART: [kat] LMS
3,834,492 UART: [kat] --
3,838,278 UART: [cold-reset] ++
3,839,780 UART: [fht] FHT @ 0x50003400
3,852,398 UART: [idev] ++
3,853,104 UART: [idev] CDI.KEYID = 6
3,853,987 UART: [idev] SUBJECT.KEYID = 7
3,855,234 UART: [idev] UDS.KEYID = 0
3,856,138 ready_for_fw is high
3,856,325 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
3,872,577 UART: [idev] Erasing UDS.KEYID = 0
6,336,057 UART: [idev] Sha1 KeyId Algorithm
6,359,361 UART: [idev] --
6,364,657 UART: [ldev] ++
6,365,341 UART: [ldev] CDI.KEYID = 6
6,366,270 UART: [ldev] SUBJECT.KEYID = 5
6,367,432 UART: [ldev] AUTHORITY.KEYID = 7
6,368,614 UART: [ldev] FE.KEYID = 1
6,380,718 UART: [ldev] Erasing FE.KEYID = 1
8,861,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,880 UART: [ldev] --
10,652,983 UART: [fwproc] Wait for Commands...
10,654,614 UART: [fwproc] Recv command 0x46574c44
10,656,927 UART: [fwproc] Recv'd Img size: 7036 bytes
12,781,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,859,698 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,863,270 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
12,874,256 >>> mbox cmd response: success
12,877,871 UART: [afmc] ++
12,878,506 UART: [afmc] CDI.KEYID = 6
12,879,696 UART: [afmc] SUBJECT.KEYID = 7
12,881,189 UART: [afmc] AUTHORITY.KEYID = 5
15,384,803 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,107,448 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,109,414 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,124,450 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,139,649 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,154,695 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,179,002 UART: [afmc] --
17,183,212 UART: [cold-reset] --
17,189,098 UART: [state] Locking Datavault
17,195,585 UART: [state] Locking PCR0, PCR1 and PCR31
17,197,746 UART: [state] Locking ICCM
17,200,366 UART: [exit] Launching FMC @ 0x40000000
17,209,044 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,215,088 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,756,452 ready_for_fw is high
3,757,078 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
12,645,505 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,190 UART: [kat] SHA2-512-ACC
897,091 UART: [kat] ECC-384
902,624 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,201 UART: [cold-reset] ++
1,476,739 UART: [fht] Storing FHT @ 0x50003400
1,479,610 UART: [idev] ++
1,479,778 UART: [idev] CDI.KEYID = 6
1,480,138 UART: [idev] SUBJECT.KEYID = 7
1,480,562 UART: [idev] UDS.KEYID = 0
1,480,907 ready_for_fw is high
1,480,907 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,488,470 UART: [idev] Erasing UDS.KEYID = 0
1,505,488 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,138 UART: [idev] --
1,515,277 UART: [ldev] ++
1,515,445 UART: [ldev] CDI.KEYID = 6
1,515,808 UART: [ldev] SUBJECT.KEYID = 5
1,516,234 UART: [ldev] AUTHORITY.KEYID = 7
1,516,697 UART: [ldev] FE.KEYID = 1
1,522,001 UART: [ldev] Erasing FE.KEYID = 1
1,546,848 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,646 UART: [ldev] --
1,586,101 UART: [fwproc] Waiting for Commands...
1,586,778 UART: [fwproc] Received command 0x46574c44
1,587,569 UART: [fwproc] Received Image of size 7036 bytes
1,655,056 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,683,136 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,684,300 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,687,343 >>> mbox cmd response: success
1,688,407 UART: [afmc] ++
1,688,575 UART: [afmc] CDI.KEYID = 6
1,688,937 UART: [afmc] SUBJECT.KEYID = 7
1,689,362 UART: [afmc] AUTHORITY.KEYID = 5
1,724,578 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,740,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,741,626 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,747,347 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,753,242 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,758,954 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,766,905 UART: [afmc] --
1,768,011 UART: [cold-reset] --
1,768,929 UART: [state] Locking Datavault
1,770,136 UART: [state] Locking PCR0, PCR1 and PCR31
1,770,740 UART: [state] Locking ICCM
1,771,210 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,776,505 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,778,388 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,415 ready_for_fw is high
1,362,415 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,535,955 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,099 UART: [state] LifecycleState = Unprovisioned
86,754 UART: [state] DebugLocked = No
87,402 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,920 UART: [kat] SHA2-256
882,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,966 UART: [kat] ++
887,118 UART: [kat] sha1
891,288 UART: [kat] SHA2-256
893,226 UART: [kat] SHA2-384
896,207 UART: [kat] SHA2-512-ACC
898,108 UART: [kat] ECC-384
903,789 UART: [kat] HMAC-384Kdf
908,411 UART: [kat] LMS
1,476,607 UART: [kat] --
1,477,520 UART: [cold-reset] ++
1,477,934 UART: [fht] Storing FHT @ 0x50003400
1,480,689 UART: [idev] ++
1,480,857 UART: [idev] CDI.KEYID = 6
1,481,217 UART: [idev] SUBJECT.KEYID = 7
1,481,641 UART: [idev] UDS.KEYID = 0
1,481,986 ready_for_fw is high
1,481,986 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,489,651 UART: [idev] Erasing UDS.KEYID = 0
1,506,175 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,863 UART: [idev] --
1,516,128 UART: [ldev] ++
1,516,296 UART: [ldev] CDI.KEYID = 6
1,516,659 UART: [ldev] SUBJECT.KEYID = 5
1,517,085 UART: [ldev] AUTHORITY.KEYID = 7
1,517,548 UART: [ldev] FE.KEYID = 1
1,522,922 UART: [ldev] Erasing FE.KEYID = 1
1,548,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,873 UART: [ldev] --
1,588,142 UART: [fwproc] Waiting for Commands...
1,588,889 UART: [fwproc] Received command 0x46574c44
1,589,680 UART: [fwproc] Received Image of size 7036 bytes
1,657,177 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,684,937 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,686,101 UART: [fwproc] Loading Runtime at address 0x40005000 len 1088
1,689,152 >>> mbox cmd response: success
1,690,308 UART: [afmc] ++
1,690,476 UART: [afmc] CDI.KEYID = 6
1,690,838 UART: [afmc] SUBJECT.KEYID = 7
1,691,263 UART: [afmc] AUTHORITY.KEYID = 5
1,726,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,742,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,743,629 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,749,350 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,755,245 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,760,957 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,768,926 UART: [afmc] --
1,770,036 UART: [cold-reset] --
1,771,004 UART: [state] Locking Datavault
1,772,183 UART: [state] Locking PCR0, PCR1 and PCR31
1,772,787 UART: [state] Locking ICCM
1,773,387 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,778,682 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,780,565 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,948 ready_for_fw is high
1,362,948 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,537,944 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,656 UART: [kat] SHA2-256
893,306 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,431 UART: [kat] ++
897,583 UART: [kat] sha1
901,881 UART: [kat] SHA2-256
903,821 UART: [kat] SHA2-384
906,542 UART: [kat] SHA2-512-ACC
908,443 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,785 UART: [cold-reset] ++
1,172,289 UART: [fht] FHT @ 0x50003400
1,174,840 UART: [idev] ++
1,175,008 UART: [idev] CDI.KEYID = 6
1,175,368 UART: [idev] SUBJECT.KEYID = 7
1,175,792 UART: [idev] UDS.KEYID = 0
1,176,137 ready_for_fw is high
1,176,137 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,879 UART: [idev] Sha1 KeyId Algorithm
1,209,467 UART: [idev] --
1,210,627 UART: [ldev] ++
1,210,795 UART: [ldev] CDI.KEYID = 6
1,211,158 UART: [ldev] SUBJECT.KEYID = 5
1,211,584 UART: [ldev] AUTHORITY.KEYID = 7
1,212,047 UART: [ldev] FE.KEYID = 1
1,217,081 UART: [ldev] Erasing FE.KEYID = 1
1,243,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,139 UART: [ldev] --
1,282,500 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,892 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,608 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,378,971 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,087 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,382,944 >>> mbox cmd response: success
1,384,076 UART: [afmc] ++
1,384,244 UART: [afmc] CDI.KEYID = 6
1,384,606 UART: [afmc] SUBJECT.KEYID = 7
1,385,031 UART: [afmc] AUTHORITY.KEYID = 5
1,420,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,436,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,360 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,081 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,448,976 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,454,668 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,462,384 UART: [afmc] --
1,463,476 UART: [cold-reset] --
1,464,322 UART: [state] Locking Datavault
1,465,507 UART: [state] Locking PCR0, PCR1 and PCR31
1,466,111 UART: [state] Locking ICCM
1,466,657 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,471,952 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,473,835 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 ready_for_fw is high
1,060,151 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,235,537 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
893,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,700 UART: [kat] ++
897,852 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,803 UART: [kat] SHA2-512-ACC
908,704 UART: [kat] ECC-384
918,001 UART: [kat] HMAC-384Kdf
922,637 UART: [kat] LMS
1,170,965 UART: [kat] --
1,171,868 UART: [cold-reset] ++
1,172,398 UART: [fht] FHT @ 0x50003400
1,175,187 UART: [idev] ++
1,175,355 UART: [idev] CDI.KEYID = 6
1,175,715 UART: [idev] SUBJECT.KEYID = 7
1,176,139 UART: [idev] UDS.KEYID = 0
1,176,484 ready_for_fw is high
1,176,484 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,963 UART: [idev] Erasing UDS.KEYID = 0
1,200,980 UART: [idev] Sha1 KeyId Algorithm
1,209,494 UART: [idev] --
1,210,340 UART: [ldev] ++
1,210,508 UART: [ldev] CDI.KEYID = 6
1,210,871 UART: [ldev] SUBJECT.KEYID = 5
1,211,297 UART: [ldev] AUTHORITY.KEYID = 7
1,211,760 UART: [ldev] FE.KEYID = 1
1,217,200 UART: [ldev] Erasing FE.KEYID = 1
1,243,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,700 UART: [ldev] --
1,283,169 UART: [fwproc] Wait for Commands...
1,283,815 UART: [fwproc] Recv command 0x46574c44
1,284,543 UART: [fwproc] Recv'd Img size: 7036 bytes
1,351,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,379,294 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,380,410 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,383,345 >>> mbox cmd response: success
1,384,359 UART: [afmc] ++
1,384,527 UART: [afmc] CDI.KEYID = 6
1,384,889 UART: [afmc] SUBJECT.KEYID = 7
1,385,314 UART: [afmc] AUTHORITY.KEYID = 5
1,420,596 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,437,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,437,863 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,443,584 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,449,479 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,455,171 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,463,033 UART: [afmc] --
1,464,081 UART: [cold-reset] --
1,464,923 UART: [state] Locking Datavault
1,466,192 UART: [state] Locking PCR0, PCR1 and PCR31
1,466,796 UART: [state] Locking ICCM
1,467,322 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,472,617 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,474,500 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,118 ready_for_fw is high
1,061,118 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,237,374 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [kat] SHA2-256
891,036 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,165 UART: [kat] ++
895,317 UART: [kat] sha1
899,483 UART: [kat] SHA2-256
901,423 UART: [kat] SHA2-384
904,196 UART: [kat] SHA2-512-ACC
906,097 UART: [kat] ECC-384
915,616 UART: [kat] HMAC-384Kdf
920,152 UART: [kat] LMS
1,168,464 UART: [kat] --
1,169,309 UART: [cold-reset] ++
1,169,657 UART: [fht] FHT @ 0x50003400
1,172,317 UART: [idev] ++
1,172,485 UART: [idev] CDI.KEYID = 6
1,172,846 UART: [idev] SUBJECT.KEYID = 7
1,173,271 UART: [idev] UDS.KEYID = 0
1,173,617 ready_for_fw is high
1,173,617 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,181,199 UART: [idev] Erasing UDS.KEYID = 0
1,198,055 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,207,940 UART: [ldev] ++
1,208,108 UART: [ldev] CDI.KEYID = 6
1,208,472 UART: [ldev] SUBJECT.KEYID = 5
1,208,899 UART: [ldev] AUTHORITY.KEYID = 7
1,209,362 UART: [ldev] FE.KEYID = 1
1,214,656 UART: [ldev] Erasing FE.KEYID = 1
1,240,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,020 UART: [ldev] --
1,280,386 UART: [fwproc] Wait for Commands...
1,281,131 UART: [fwproc] Recv command 0x46574c44
1,281,864 UART: [fwproc] Recv'd Img size: 7036 bytes
1,348,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,375,821 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,376,942 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,379,820 >>> mbox cmd response: success
1,381,005 UART: [afmc] ++
1,381,173 UART: [afmc] CDI.KEYID = 6
1,381,536 UART: [afmc] SUBJECT.KEYID = 7
1,381,962 UART: [afmc] AUTHORITY.KEYID = 5
1,417,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,433,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,434,589 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,440,311 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,446,204 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,451,896 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,459,741 UART: [afmc] --
1,460,647 UART: [cold-reset] --
1,461,639 UART: [state] Locking Datavault
1,463,044 UART: [state] Locking PCR0, PCR1 and PCR31
1,463,648 UART: [state] Locking ICCM
1,464,104 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,469,399 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,471,282 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,055,910 ready_for_fw is high
1,055,910 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,230,554 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "080142a8c5cc9ee8db84394ef3b856c189fd685f2f567c1b107dad58d3e3d75e893e99e06ee9aaad92f738fbf10c78c9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 81049C71285DCED9AC5EB7C0C58AD40DB1743E58DDBD29F8F3D482D6409CDE33
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
900,116 UART: [kat] SHA2-256
902,056 UART: [kat] SHA2-384
904,841 UART: [kat] SHA2-512-ACC
906,742 UART: [kat] ECC-384
916,739 UART: [kat] HMAC-384Kdf
921,311 UART: [kat] LMS
1,169,623 UART: [kat] --
1,170,682 UART: [cold-reset] ++
1,171,192 UART: [fht] FHT @ 0x50003400
1,174,010 UART: [idev] ++
1,174,178 UART: [idev] CDI.KEYID = 6
1,174,539 UART: [idev] SUBJECT.KEYID = 7
1,174,964 UART: [idev] UDS.KEYID = 0
1,175,310 ready_for_fw is high
1,175,310 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,183,310 UART: [idev] Erasing UDS.KEYID = 0
1,200,672 UART: [idev] Sha1 KeyId Algorithm
1,209,720 UART: [idev] --
1,210,797 UART: [ldev] ++
1,210,965 UART: [ldev] CDI.KEYID = 6
1,211,329 UART: [ldev] SUBJECT.KEYID = 5
1,211,756 UART: [ldev] AUTHORITY.KEYID = 7
1,212,219 UART: [ldev] FE.KEYID = 1
1,217,485 UART: [ldev] Erasing FE.KEYID = 1
1,243,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,175 UART: [ldev] --
1,282,619 UART: [fwproc] Wait for Commands...
1,283,382 UART: [fwproc] Recv command 0x46574c44
1,284,115 UART: [fwproc] Recv'd Img size: 7036 bytes
1,350,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,377,474 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,378,595 UART: [fwproc] Load Runtime at address 0x40005000 len 1088
1,381,475 >>> mbox cmd response: success
1,382,572 UART: [afmc] ++
1,382,740 UART: [afmc] CDI.KEYID = 6
1,383,103 UART: [afmc] SUBJECT.KEYID = 7
1,383,529 UART: [afmc] AUTHORITY.KEYID = 5
1,418,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,435,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,435,786 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,441,508 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,447,401 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,453,093 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,460,716 UART: [afmc] --
1,461,750 UART: [cold-reset] --
1,462,740 UART: [state] Locking Datavault
1,464,153 UART: [state] Locking PCR0, PCR1 and PCR31
1,464,757 UART: [state] Locking ICCM
1,465,353 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,470,648 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,472,531 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0c390b1c7a8c7c2aeddc828b70bd9b9300da86ca2d3651d6121fd6b6236e3383c1b991c67ed4260d4953e4eac086a688",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,056,233 ready_for_fw is high
1,056,233 <<< Executing mbox cmd 0x46574c44 (7036 bytes) from SoC
1,232,599 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.60s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s